diff --git a/edge/.ipynb_checkpoints/graph_10003728-checkpoint.jsonl b/edge/.ipynb_checkpoints/graph_10003728-checkpoint.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd3ef463524da5e0d95fefbb996e53fdfe3051df --- /dev/null +++ b/edge/.ipynb_checkpoints/graph_10003728-checkpoint.jsonl @@ -0,0 +1,56 @@ +{"26706809|956843": []} +{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]} +{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]} +{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]} +{"6202265|1230643": []} +{"15664727|17325804": []} +{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]} +{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]} +{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]} +{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]} +{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]} +{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]} +{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]} +{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]} +{"5779256|17325804": []} +{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]} +{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]} +{"11319668|6275330": []} +{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]} +{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]} +{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]} +{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]} +{"29902|1940388": []} +{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]} +{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]} +{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]} +{"5779256|17325804": []} +{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]} +{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]} +{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]} +{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]} +{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]} +{"26706809|956843": []} +{"15664727|17325804": []} +{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]} +{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]} +{"6202265|1230643": []} +{"11319668|6275330": []} +{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]} +{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]} +{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]} +{"29902|1940388": []} +{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]} +{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]} +{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]} diff --git a/graph_1000416.jsonl b/edge/.ipynb_checkpoints/graph_1000416-checkpoint.jsonl similarity index 100% rename from graph_1000416.jsonl rename to edge/.ipynb_checkpoints/graph_1000416-checkpoint.jsonl diff --git a/edge/.ipynb_checkpoints/graph_10004491-checkpoint.jsonl b/edge/.ipynb_checkpoints/graph_10004491-checkpoint.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0f6ff1b316e589c26187d32170be4d273a6a95b --- /dev/null +++ b/edge/.ipynb_checkpoints/graph_10004491-checkpoint.jsonl @@ -0,0 +1,2 @@ +{"118230787|206051485": []} +{"1628909|60779308": ["The shape descriptor used in this study is eccentricity, which is defined as the ratio of major to minor axes of a connected component and evaluate elongation of edges (Yang et al., 2008)."]} diff --git a/edge/.ipynb_checkpoints/graph_10011823-checkpoint.jsonl b/edge/.ipynb_checkpoints/graph_10011823-checkpoint.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0fa16f5f399dab102f749efefc834fd0b01e4b3 --- /dev/null +++ b/edge/.ipynb_checkpoints/graph_10011823-checkpoint.jsonl @@ -0,0 +1,7 @@ +{"1428759|1230643": ["Wireless sensor networks (WSNs), comprising of tiny, radio-enabled sensing devices open up new opportunities to observe and interact with the physical world, and have been applied in domains ranging from patient health monitoring through the use of biomedical sensors to military applications such as battlefield surveillance [1].", "Wireless sensor networks have been a very active area of research in recent years (see [1] for a survey)."]} +{"16592951|1230643": ["Such networks have the potential to enable a wide range of applications in environmental monitoring, health, military and security (see [1] for a survey of applications)."]} +{"16102897|1230643": ["Sensor networks have been a very active area of research in recent years (see [1] for a survey), and there is a large body of work on data collection from sensor networks that applies higher-level techniques to sensor network data processing."]} +{"207172599|3330313": []} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} diff --git a/graph_1006459.jsonl b/edge/.ipynb_checkpoints/graph_13427574-checkpoint.jsonl similarity index 100% rename from graph_1006459.jsonl rename to edge/.ipynb_checkpoints/graph_13427574-checkpoint.jsonl diff --git a/edge/.ipynb_checkpoints/graph_13427694-checkpoint.jsonl b/edge/.ipynb_checkpoints/graph_13427694-checkpoint.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d9ea19bb5e3a5b1268ef92dbc0d6416c2f28952 --- /dev/null +++ b/edge/.ipynb_checkpoints/graph_13427694-checkpoint.jsonl @@ -0,0 +1,2 @@ +{"7607342|1400872": ["\u0091Hidden units makes it possible for the network to discover and exploit regularities of the task at hand such as symmetries or replicated structures\u0092 (Pearlmutter, 1995).", "Recurrent neural networks using the backpropagation algorithm, as developed first by (Pineda, 1987), and other extension (Pearlmutter, 1995; Chauvin & Rumelhart, 1995) had to be eliminated because of their long time computation (multiple training steps) and their complex computation (calculating derivatives).", "DRAMA differs from other RNN models by the fact that it uses an unsupervised training algorithm, based on Hebbian rules, while other RNNs use a supervised training algorithm, such as the backpropagation algorithm and other derivatives (Chauvin & Rumelhart, 1995; Pearlmutter, 1995)."]} +{"7124120|1708582": []} diff --git a/graph_1343571.jsonl b/edge/.ipynb_checkpoints/graph_1343571-checkpoint.jsonl similarity index 100% rename from graph_1343571.jsonl rename to edge/.ipynb_checkpoints/graph_1343571-checkpoint.jsonl diff --git a/edge/.ipynb_checkpoints/graph_134378860-checkpoint.jsonl b/edge/.ipynb_checkpoints/graph_134378860-checkpoint.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f064712d0f2ebe62eb9f6454da6f49f8547c917d --- /dev/null +++ b/edge/.ipynb_checkpoints/graph_134378860-checkpoint.jsonl @@ -0,0 +1,2 @@ +{"140693311|1877246": ["For a complete review about this topic, we address to Musialski et al. (2012)."]} +{"15335064|18587623": ["Night light data have been used in the past to study economic variables [1,2], socio-economic properties [3\u20135], population [6,7] and population density [8], built area [9,10], power consumption [11], greenhouse gas emissions [12], gas flaring [13], atmospheric chemistry [14], skyglow (light pollution) [15\u201317], the epidemiology of illness related to light exposure [18], among other analyses [19]."]} diff --git a/graph_1014845.jsonl b/edge/.ipynb_checkpoints/graph_13441159-checkpoint.jsonl similarity index 100% rename from graph_1014845.jsonl rename to edge/.ipynb_checkpoints/graph_13441159-checkpoint.jsonl diff --git a/graph_1344506.jsonl b/edge/.ipynb_checkpoints/graph_1344506-checkpoint.jsonl similarity index 100% rename from graph_1344506.jsonl rename to edge/.ipynb_checkpoints/graph_1344506-checkpoint.jsonl diff --git a/edge/.ipynb_checkpoints/graph_93001387-checkpoint.jsonl b/edge/.ipynb_checkpoints/graph_93001387-checkpoint.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e7cf647b78f119f39aa12907965c148da631e32 --- /dev/null +++ b/edge/.ipynb_checkpoints/graph_93001387-checkpoint.jsonl @@ -0,0 +1,25 @@ +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} +{"32118915|3834736": []} +{"32118915|399542": []} +{"52304629|11381680": ["Moreover, web-based crowdsourcing frameworks, such as Quadrant of Euphoria [21], [22], crowdMOS [34] and QualityCrowd [35], represent a conceptual approach to develop subjective experiments that can be conducted in a web browser [36]."]} +{"52304629|399542": ["Crowdsourcing is an increasingly popular approach for generic subjective QoE assessment methodology [31]\u2013[33].", "The model correlates QoS parameters directly withQoE perceptions by adopting appropriate datamodels such as discriminant analysis approach based on statistics [19], [31], regression analysis [74]\u2013[76], support vector machine [77]\u2013[79], decision tree [20], [78], [80] and rough set [81]."]} +{"52304629|6581557": ["The most widely used FR approaches are Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR) [41], [42], Structural Similarity Index (SSIM) [29], [46]\u2013[48] and Video Quality Metric (VQM) [37], [54].", "The predefined collection context affects the most suitable QoE assessment approach such as FR, RR, NR, and the selection influences the assessment accuracy [37].", "Because VQM has a good correlation with subjective feedback from observers [55], [56], the approach is adopted by the American National Standards Institute as a national standard.", "When gathering information to assess the QoE level, there are three different questions to be answered: (1) Which information should be collected? (2)Where should the information be collected? and (3) How should the collection be performed? [37].", "\u2022 Video Quality Metric (VQM) [37], [54] provides standardized and non-standardized approaches to measure\nVOLUME 6, 2018 48381\nthe perceived video quality by taking into account structural and temporal aspects.", "[55] M. Narwaria, M. P. D. Silva, and P. L. Callet, \u2018\u2018HDR-VQM: An objective quality measure for high dynamic range video,\u2019\u2019 Signal Process., Image Commun., vol. 35, pp. 46\u201360, Jul. 2015 [56] M. Wichtlhuber, G. Wicklein, S. Wilk, W. Effelsberg, and D. Hausheer, \u2018\u2018RT-VQM: Real-time video quality assessment for adaptive video streaming using GPUs,\u2019\u2019 in Proc.", "The implementation of VQM includes three steps: perception-based features extraction, video quality parameters computation (seven in total) and the combination of these parameters to finish the overall model.", "\u2022 Video Quality Metric (VQM) [37], [54] provides standardized and non-standardized approaches to measure"]} +{"70324764|7972041": []} +{"70324764|38911919": []} +{"25575499|5122855": ["[11] summarized the ongoing research topics on QoE-aware HTTP Adaptive Streaming (HAS) where they con-"]} +{"25575499|2261490": ["Barakovi\u0107 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors.", "Barakovic\u0301 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors."]} +{"25575499|64404": [", I, P and B frames [53]) on QoE were studied in [54] with different video contents."]} +{"16630618|763939": []} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"62116074|763939": ["The main building blocks in designing a mobility model are: visualisation tool, output, platform and a class which GTNets (Georgia Tech Network Simulator) [35] and so on are some of the network simulators used for MANET simulation.", "The mobility model [35] is a model or a set of rules for designing random network topologies by using simulators.", "Tables 3 \u2013 5 are adapted from [35]."]} +{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]} +{"31851714|15170341": []} +{"3782888|36280489": ["While this is first survey paper of its kind that primarily focuses on the cooperativeness in vehicular networks, there do exist a number of survey papers that cover cooperative networking [10], [26]\u2013[28] or vehicular communication [29]\u2013[40] in general."]} +{"3782888|3834736": []} +{"3782888|10329355": ["While this is first survey paper of its kind that primarily focuses on the cooperativeness in vehicular networks, there do exist a number of survey papers that cover cooperative networking [10], [26]\u2013[28] or vehicular communication [29]\u2013[40] in general."]} +{"3782888|7434318": []} +{"3782888|2335874": []} +{"3782888|763939": []} +{"399542|10559330": ["Different mechanisms and solutions can be used to form the QoS at the Network Layer, such as, Differentiated Services (DiffServ) [5], Integrated Services [6] and Multi-Protocol Label Switching (MPLS) [7]."]} +{"96447448|64404": []} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} diff --git a/edge/graph_10003728.jsonl b/edge/graph_10003728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd3ef463524da5e0d95fefbb996e53fdfe3051df --- /dev/null +++ b/edge/graph_10003728.jsonl @@ -0,0 +1,56 @@ +{"26706809|956843": []} +{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]} +{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]} +{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]} +{"6202265|1230643": []} +{"15664727|17325804": []} +{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]} +{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]} +{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]} +{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]} +{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]} +{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]} +{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]} +{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]} +{"5779256|17325804": []} +{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]} +{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]} +{"11319668|6275330": []} +{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]} +{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]} +{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]} +{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]} +{"29902|1940388": []} +{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]} +{"6391938|17325804": ["I. INTRODUCTION\nW IRELESS sensor networks (WSNs) comprise a largenumber of inexpensive devices that are deployed for observing and initial processing of physical or environmental changes taking place in their vicinity.", "D norm minimizer is the major source of increased complexity of the EM algorithm compared to the simpler LS algorithm at a particular iteration."]} +{"8267140|17516538": ["The utilization of traffic surveillance includes, but it is not restricted to, detection and avoidance of vehicle accidents, detection of vehicles with unusual behavior, and gathering of statistical information about roadway traffic, among several other applications [1], [2]."]} +{"5779256|17325804": []} +{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]} +{"9931547|17205659": ["The reliability, flexibility, cost-effectiveness and ease of deployment make wireless sensor networks (WSNs) promise to revolutionize our life in a wide range of application domains, including military, civil, and ecological areas [2,3]."]} +{"9931547|1236072": ["Owing to recent advances in wireless communications and electronic technologies, the manufacturing of lowcost, low-power, and multi-functional miniature sensors has become technically and economically feasible [1]."]} +{"14573688|1230643": ["The increasing miniaturization of electronic components and advances in modern communication technologies lead to the development of extreme small, cheap, and smart sensor nodes [1]."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"206257405|1230643": [", 2011) especially for target tracking scenario in order to efficiently obtain network scalability, reduce communication overhead, achieve data aggregation, and minimize energy consumption (Abbasi and Younis, 2007; Akyildiz et al., 2002; Kim et al., 2006).", "The sensor nodes are small in size and can perform many important functions out of which sensing, data processing, and wireless communication with other nodes (Akyildiz et al., 2002; Yong-Min et al., 2009)."]} +{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]} +{"26706809|956843": []} +{"15664727|17325804": []} +{"7334713|6396569": ["Localization over randomly deployed mobile sensor nodes also called MANET, is challenging when compared to localization over a static network [2]."]} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]} +{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]} +{"6202265|1230643": []} +{"11319668|6275330": []} +{"36033198|15300368": ["For this reason, WSNs are widely used nowadays in many applications, such as fire detection [1] or intrusion detection [2], and other environmental and security applications [3]."]} +{"46159657|1230643": ["The rapid development of microelectronic technologies, embedded microprocessors, wireless communications, and networking technologies has made wireless sensor networks of large scale applicable to a wide range of applications, such as environmental monitoring, industrial sensing and diagnosis, situational awareness on the battlefield, space exploration, and healthcare [1]."]} +{"29902|7889189": ["As seen from Section II, if at least one node is compromised, false measurement could lead to wrong decision-making in the network [32],[33]."]} +{"29902|1940388": []} +{"60691644|2835258": ["Many multicast routing protocols [20][ 21 ][23] have been developed for MANETs.", "protocol [13], energy-efficient routing protocols [9][20][ 21 ][23][32], and new sensornet applica-"]} +{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]} +{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]} diff --git a/graph_1028144.jsonl b/edge/graph_1000416.jsonl similarity index 100% rename from graph_1028144.jsonl rename to edge/graph_1000416.jsonl diff --git a/edge/graph_10004491.jsonl b/edge/graph_10004491.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0f6ff1b316e589c26187d32170be4d273a6a95b --- /dev/null +++ b/edge/graph_10004491.jsonl @@ -0,0 +1,2 @@ +{"118230787|206051485": []} +{"1628909|60779308": ["The shape descriptor used in this study is eccentricity, which is defined as the ratio of major to minor axes of a connected component and evaluate elongation of edges (Yang et al., 2008)."]} diff --git a/edge/graph_10011823.jsonl b/edge/graph_10011823.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0fa16f5f399dab102f749efefc834fd0b01e4b3 --- /dev/null +++ b/edge/graph_10011823.jsonl @@ -0,0 +1,7 @@ +{"1428759|1230643": ["Wireless sensor networks (WSNs), comprising of tiny, radio-enabled sensing devices open up new opportunities to observe and interact with the physical world, and have been applied in domains ranging from patient health monitoring through the use of biomedical sensors to military applications such as battlefield surveillance [1].", "Wireless sensor networks have been a very active area of research in recent years (see [1] for a survey)."]} +{"16592951|1230643": ["Such networks have the potential to enable a wide range of applications in environmental monitoring, health, military and security (see [1] for a survey of applications)."]} +{"16102897|1230643": ["Sensor networks have been a very active area of research in recent years (see [1] for a survey), and there is a large body of work on data collection from sensor networks that applies higher-level techniques to sensor network data processing."]} +{"207172599|3330313": []} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} diff --git a/graph_1030380.jsonl b/edge/graph_10012473.jsonl similarity index 100% rename from graph_1030380.jsonl rename to edge/graph_10012473.jsonl diff --git a/edge/graph_10015090.jsonl b/edge/graph_10015090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50c9b36504750c7dce3d21c983d9240cde318417 --- /dev/null +++ b/edge/graph_10015090.jsonl @@ -0,0 +1 @@ +{"61166265|14441987": []} diff --git a/edge/graph_10031526.jsonl b/edge/graph_10031526.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1e7f8248424eef6ad4a1ae496637c41cb26b1b3 --- /dev/null +++ b/edge/graph_10031526.jsonl @@ -0,0 +1,2 @@ +{"2745977|10500613": []} +{"2745977|913718": ["While both database schemas and ontologies provide a vocabulary of terms to describe a domain of interest, database schemas do not make explicit the semantics of their elements while ontologies, by definition (\u201ca formal, explicit, specification of a domain conceptualization\u201d [19]), do [44].", "In the terminology of [44], we describe an element level matcher which relies on the use of external knowledge sources to derive mappings.", "Internal approaches typically explore information provided by the matched ontologies such as their labels, structure or instances [44].", "The approaches developed both for database schemas and ontologies follow two major paradigms depending on the types of information they use to derive mappings [25, 38, 39, 44]."]} diff --git a/graph_1041439.jsonl b/edge/graph_10041852.jsonl similarity index 100% rename from graph_1041439.jsonl rename to edge/graph_10041852.jsonl diff --git a/graph_1041692.jsonl b/edge/graph_10056835.jsonl similarity index 100% rename from graph_1041692.jsonl rename to edge/graph_10056835.jsonl diff --git a/edge/graph_100595306.jsonl b/edge/graph_100595306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fc32d9177fe286a13e7d016f5850e01ed15b0bf --- /dev/null +++ b/edge/graph_100595306.jsonl @@ -0,0 +1,7 @@ +{"1517537|2398835": []} +{"1517537|18189153": ["Routing Attacks [65] Spoo\ufb01ng attacks (IP and URL spoo\ufb01ng), rushing, gray hole, black hole, Cybil, man-in-the-middle attacks, and sleep deprivation."]} +{"1517537|16654832": ["Meanwhile, different communication networks are available, such as Wi-Fi, LTE 3G/4G, and wireless networks, which connect end users to network resource [45]."]} +{"1517537|12815020": ["Port Scanning Scan the free and less secure port for attempting attacks.", "Port Scanning [63] TCP scanning, UDP Scanning, SYN scanning, FIN scanning, ACK scanning, and Window scanning."]} +{"11208721|14287498": ["Keromytis [107], [108] presented two comprehensive surveys of VoIP security, which summarized previous works related to VoIP security and organized them according to an"]} +{"11208721|7060462": ["Keromytis [107], [108] presented two comprehensive surveys of VoIP security, which summarized previous works related to VoIP security and organized them according to an"]} +{"49430339|37424351": ["protocol attacks, threats in network security, breaches in privacy, and configuration attacks [15].", "If an attacker is able to infect multiple smartphones, he may form a botnet that can launch simultaneous attacks on the smart network [15].", "\u201d Attackers may upload malicious smart applications onto an unsuspecting user\u2019s phone in order to infect the device that serves as a connection to the smart city [15].", "An example of an IoT infrastructure project can be seen in Santander, Spain called SmartSantander [15].", "Furthermore, social media websites that house a smartphone user\u2019s personal information may be subject to attack or manipulation when used as a personal identifier in a smart city [15].", "Thus, projects such as SmartSantander are a useful resource for testing solutions and corroborating theories surrounding smart city security and privacy challenges.", "Such attacks could occur through the internet, over unsecured Wi-Fi connections, or unconsented Bluetooth connections.", "SmartSantander is made up of over two thousand IoT devices mimicking an urban environment with the intention of developing a smart network with experimentation support and service provision [15].", "[15] state that \u201c[s]mart phones are one of the core component[s] of IoT infrastructure in a smart city as they give access to various services and smart applications [and] are also the main source of peoples\u2019 role in a smart city.", "IEEE 802.15.11 helps secure Wi-Fi through the Wi-Fi Protected Access (WPA) security protocol, and IEEE 802.15.1 is used in Bluetooth [15].", "Smartphone vulnerabilities that could compromise smart city security include malicious smart applications, botnets, location and gps, spyware, threats from social networks, Wi-Fi, and Bluetooth [15].", "A smartphone user\u2019s privacy and security could be compromised by compromising the GPS features available in smartphones, much like the previously mentioned 80-million-dollar yacht manipulated by researchers [15].", "Experimentation support allows researchers to put their theories to the test in a real life scenario and service provision allows SmartSantander to provide services to people described in the form of use cases [15]."]} diff --git a/edge/graph_10061981.jsonl b/edge/graph_10061981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1cc3506fa484d04b1845edaa2e89e52fd4f3368 --- /dev/null +++ b/edge/graph_10061981.jsonl @@ -0,0 +1,4 @@ +{"30309437|14561706": ["By providing information about human behaviour, an automated system for its recognition can be a useful tool for both Human-Robot Interaction (and cooperation) in smart environments [2] and the purposes of Wearable and Assistive Robotics [3]."]} +{"9621856|16013270": ["The number of stages was determined by cross validation using n = [3, 5, 10, 15] fixed stages.", "Additionally, the number of Gaussians was evaluated with m = [1, 2, 3, 5, 10] Gaussians.", "One good measure of the productivity of the field is the sheer number and variety of datasets that have been produced by researchers in the last few years: A recent survey [3] lists no less than twenty\u2217Part of this work was done at the lab for Computer Vision for Human-Computer Interaction at the Karlsruhe Institute of Technology (http://cvhci."]} +{"14036544|16013270": ["Even when excluding single image action datasets such as the Stanford-40 Action Dataset (Yao et al. 2011b or the Pascal Action Classi\ufb01cation Challenge (Ever-ingham et al. 2011), the number of proposed activity datasets is quite large (Chaquet et al. (2013) survey 68 datasets)."]} +{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]} diff --git a/edge/graph_10064368.jsonl b/edge/graph_10064368.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6933058fe1d254175fb0e194d6c1027dc47d19b5 --- /dev/null +++ b/edge/graph_10064368.jsonl @@ -0,0 +1,10 @@ +{"167536|1708582": []} +{"5854062|1634674": ["We discuss implementation, testing and evaluation in Section 6 and conclude the paper in Section 7."]} +{"3648998|16362395": ["The final class will be that of the majority [63].", "[63] proposed boosting, voting and stacking techniques as classifier combination strategies used in EEG signal analysis."]} +{"3648998|192934": ["The final decision is made based on the outputs of the stacked classifier in conjunction with the outputs of individual classifiers [65]."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"9226899|10817088": ["As such, it can also assist elderly people to age in place while still having sufficient security standards in case of emergency [7]\u2013[9]."]} +{"9226899|1634674": ["A variety of HMM-based variants is presented in a comprehensive survey by Turage et al. [84]."]} +{"11987951|1230643": ["1) Energy Consumption Constraints: From a system perspective, the energy consumption of IoT mainly comes from data communication because the energy expenditure in data sensing and processing is much less compared to data communication [29]."]} +{"5528008|1708582": []} diff --git a/graph_1048595.jsonl b/edge/graph_1006459.jsonl similarity index 100% rename from graph_1048595.jsonl rename to edge/graph_1006459.jsonl diff --git a/graph_1061957.jsonl b/edge/graph_10065043.jsonl similarity index 100% rename from graph_1061957.jsonl rename to edge/graph_10065043.jsonl diff --git a/edge/graph_10067743.jsonl b/edge/graph_10067743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4988f2dfd18315786113a1975115148e0c4a5afc --- /dev/null +++ b/edge/graph_10067743.jsonl @@ -0,0 +1,19 @@ +{"18295491|7988320": []} +{"7854020|7988320": []} +{"999725|2635807": ["Additionally, we note that there are no arcs from biosensors to biosensors and from sinks to sinks.", "Keywords: Body Area Networks, Wireless Sensor Networks, Network Design, Robust Optimization, Traffic Uncertainty, Integer Linear Programming, Linear Relaxations, Metaheuristics.", "\u2026sent from b to each sink s \u2208 S, which is equal to the bitrate dbs, namely:\n\u2212 \u2211\n(b,j)\u2208 AB\u2192R\u222aAB\u2192S\ndbs x bs bj = \u2212 dbs \u2200 b \u2208 B, s \u2208 S (3)\nNote that since we must route the entire data flow of b for s on a single path, the unsplittable flow variables xbsij must be multiplied by the corresponding\u2026"]} +{"26822154|7988320": []} +{"26822154|16514036": []} +{"26822154|1230643": []} +{"26822154|20905429": ["In Pantelopoulos and Bourbakis (2010) the authors introduce a survey on wearable sensor-based systems for health monitoring and a comparison of system implementations was elaborated in order to choose the most important characteristics, which describe the functionality of systems."]} +{"26985018|16514036": ["Chen et al.(2) presented the difference between a wireless sensor network and BAN in terms of mobility, data rate, latency, node density, power supply, network topology, node replacement, security level, etc."]} +{"18049463|7854020": []} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"207223082|7834819": ["Examples of commercially available products are: Vivatec wrist care [27], Tynetec [25], Fallwatch (Vigi\u2019 fall) [4], activPAL [29], and Tunstall fall detector [10]."]} +{"52870530|16514036": []} +{"52870530|8836911": []} +{"10445703|20905429": ["Recently, many mobile-based medical monitoring devices have been developed with the capability of processing certain types of physiological signals [1][2]."]} +{"27415036|16514036": []} +{"11438682|11047930": ["\u2026protocols for WSNs and WBANs are proposed by considering different applications and topologies in Javaid, Khan, Shakir, et al. (2013), Tauqir et al. (2013), Javaid, Khan, Ilahi, et al. (2013), Javaid, Yaqoob, et al. (2013), Zhang and Sawchuk (2013), Tahir et al. (2013), and Javaid et al. (2013)."]} +{"25898379|42497499": ["The low band is divided into three channels and high band is divided into 8 channels [11]."]} +{"7988320|6539555": []} +{"15092326|12030667": ["A great number of studies have been conducted in the literature regarding the TDMA scheduling algorithms in WSNs [5] \u2013 [9].", "Thus, synchronization is a crucial issue in WSNs. Efficient synchronization means mainly lower (a) data loss, (b) interference and (c) power consumption.", "Instead, the communication protocol and the corresponding synchronization have been implemented from scratch not only for simplicity but also for investigating conceptual issues of WSNs.", "In paper [5] authors present sensor network properties that are crucial for the design of TDMA protocols."]} diff --git a/edge/graph_10086984.jsonl b/edge/graph_10086984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dcf2b443fa7b782b83372c701d3e0ccb56dfab6a --- /dev/null +++ b/edge/graph_10086984.jsonl @@ -0,0 +1,2 @@ +{"111220014|10086984": []} +{"109987278|10086984": []} diff --git a/edge/graph_10087812.jsonl b/edge/graph_10087812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..02d37320c3a956526592813e1576559c1cb274fb --- /dev/null +++ b/edge/graph_10087812.jsonl @@ -0,0 +1,7 @@ +{"17832672|1708582": ["The survey by Kaelbling et al. (1996) discusses several approaches to generalisation."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"16198401|1708582": ["In this section we brie\ufb02y review the basic framework of RL on which we will build our arguments."]} +{"7770940|1452734": ["One of the crucial activities in the development process of puppies and babies is self-exploration [7].", "In recent years, studies on the inner mechanisms of human development, pursued in many different areas (such as neuroscience, psychology, developmental sciences, robotics, machine learning) converged to a new field, commonly referred to as developmental robotics [7, 20].", "Developmental robotics has its main source of inspiration in studies from neuroscience and psychology [7], that show how similar mechanisms could be traced in the developmental process of children.", "Because of the complexity of its goal, developmental robotics has many different facets [7]."]} +{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]} +{"204246491|10087812": ["Similarly to reinforcement learning, transfer learning (TL) [1, 9, 10] shows first that humans learn a task better and faster when they have first experienced a similar task [11].", "In this section we present three categories of knowledge transfer that are strongly related to those in [9, 15].", "In the context of RL, transfer training [9, 10] refers to the process of knowledge use, which are acquired in one or more prelearned tasks."]} +{"1223826|1708582": []} diff --git a/edge/graph_10088979.jsonl b/edge/graph_10088979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fc4573a57e409aabfaef4e434f89defa0cf0d7b --- /dev/null +++ b/edge/graph_10088979.jsonl @@ -0,0 +1,5 @@ +{"5753697|9104850": ["With the explosive growth of the World Wide Web, proxy caching has become an important technique to improve network performance [3, 11, 15, 23, 25, 27, 30]."]} +{"15154594|9104850": ["The performance objective is to minimize the total access cost by considering both transmission cost and transcoding cost."]} +{"7589446|816774": []} +{"61770681|8305806": ["Nevertheless, a survey of available multicast techniques in [210] indicated the potential for such a protocol, and efforts to develop a standard reliable multicast protocol that is scalable and efficient continue [219]."]} +{"61770681|7971188": ["Peer-topeer networks also influence grid systems, but because this is also a new technology, reliability has been less extensively researched [26]."]} diff --git a/edge/graph_10089999.jsonl b/edge/graph_10089999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae2bb50caa6cc4df43cf53e3debaad1017f7c2ef --- /dev/null +++ b/edge/graph_10089999.jsonl @@ -0,0 +1,7 @@ +{"11559229|6972141": ["The criteria were as follows: (1) the system is easy to use, (2) the system is easy to learn, (3) the", "The results show no significant difference in the ease of learning between the two conditions, (1) (2) (3) (4)"]} +{"12104564|7788290": ["Many examples of people tracking have used cameras as their primary sensor [19, 26], however laser rangefinders have also been used [52]."]} +{"9945281|1113420": ["Luckily, however, surveys of the most prominent challenges and issues in ubiquitous computing have shown that it is sufficient to localize a user within room-level accuracy for almost all applications [1, 3, 6, 12, 15, 30]."]} +{"16402554|206583375": ["A number of techniques [4]\u2013[7] have been proposed in the last decade for robust indoor positioning."]} +{"17591052|7834819": ["Aside from vision-based solutions, sensor-based approaches are also extensively adopted in biomedical systems [31\u201334]."]} +{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]} +{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]} diff --git a/edge/graph_10091442.jsonl b/edge/graph_10091442.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db04d6e35dcb7ed22ea18fabae5358254e67c91d --- /dev/null +++ b/edge/graph_10091442.jsonl @@ -0,0 +1,15 @@ +{"18282837|18747476": []} +{"17889756|627405": ["identified several issues of electronic search derived from their experience in conducting SLRs (Brereton et al., 2007).", "Brereton et al. (2007) identified several issues of electronic search derived from their experience in conducting SLRs."]} +{"12955359|205435103": ["Two of the papers were published after 30th June 2008 (Beecham et al. 2008; G\u00f3mez et al. 2008) and were excluded from the SLR report but are included in this analysis."]} +{"12955359|7696556": []} +{"12955359|627405": ["These propositions were developed when we started scoping our overall research program (Brereton et al. 2007), but were revised when the specific case was identified.", "We have commented before on the problems of software engineering search engines (Brereton et al. 2007), but it is seems clear that we need better tools to support the overall systematic review process.", "We are currently undertaking a program of case study-based research that is aimed at better understanding the role of systematic literature reviews (SLRs) in software engineering (Brereton et al. 2007)."]} +{"12955359|27317885": ["J\u00f8rgensen and Shepperd (2007) report results from a broad manual search used for a mapping study of a specific software engineering topic (i."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"34200954|627405": ["Like other researchers, [25], we also found that tabulating the data is a useful mean of aggregation."]} +{"5223375|3939683": ["30.95% [S54], [S55], [S56], [S57], [S58], [S59], [S60], [S61], [S62], [S63] Semi-automatic 1.95% [S64], [S65], [S66], [S67], [S68], [S69], [S70], [S71], [S72], [S73], [S74], [S75] Manual 8.67% [S69], [S76], [S77], [S78], [S79], [S80], [S81], [S82], [S83], [S84] Artifact (RQ2) Code 72.89% [S1], [S2], [S3], [S11], [S65], [S85], [S86], [S87], [S88], [S89] Model 59.25% [S1], [S3], [S28], [S29], [S65], [S87"]} +{"5223375|206778272": ["Mens et al. [12] provided an overview of existing research in the \ufb01eld of software refactoring."]} +{"17279013|17446703": ["Guidelines for Performing Systematic Literature Review in Software Engineering.", "Systematic Reviews (SRs), also known as Systematic Literature Reviews, have been recently introduced in the area of Software Engineering (SE) [9] [20] as a structured and systematic methodology for performing literature reviews.", "[16] Salleh, N, Mendes, E. and Grundy, J. (2009) Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review.", "Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review [16]."]} +{"17279013|627405": ["For scoping RQs, perform a systematic preview mapping study [3] and define complementary RQs and unit of analysis [17].", "Difficulty in initial learning [4], lack of domain knowledge [1] [3] and guidance [1], education of the supervisors [1], not clear when to stop the piloting process [17], not finding many studies [5], distributed nature of team complicates the process of protocol development [3], limited quantity and quality of record keeping [3], and lack of consistency among researchers for defining conceptual structure during SR [4].", "We believe that data synthesis is always in accordance with the RQs and should attempt to answer the RQs.", "A review protocol template for optimizing the process of planning and execution [13] and for data extraction - one person extracting data and other acting as a checker [3] is more efficient than two people extracting data and comparing inconsistencies [3].", "In particular, similar problems were faced while formulating the research questions (RQs) and determining the inclusion/exclusion (I/E) and quality\ncriteria.", "Since the formulation of RQs was guided by the structure of PICOC, they found that identifying the PICOC really depended on the SR\u201fs context.", "In addition, some studies also suggest best practices [1] [3] for conducting SRs, challenges faced while conducting SRs [1], and point out a need for improvement in the SR guidelines related to the aspects of quality assessment, experience/examples, simplified version, quantitative analysis, qualitative analysis, and protocol templates [1].", "It is also our experience that creating the data extraction and data synthesis forms while creating the review protocol is an iterative activity, and is largely determined and should be aligned with the RQs.", "Overall Process: The overall process of conducting SRs is time and effort consuming [1], in particular processes of planning [13], execution [13] and data extraction [3].", "The formulation of RQs was also driven by the SR novices\u201f domains of interest, and the challenge was to ensure that the RQs were relevant and appropriate.", "Defining Research Questions (RQs): Problem scoping RQs [3], RQs structure not fitting comfortably with Population, Intervention, Comparison, Outcome, Context (PICOC) [17] and guidelines not considering impact of RQ type on review procedures [4].", "In our case i.e., for novices, we revised the research questions of all three SRs we carried out until we were satisfied that the RQs covered all the aspects of the topic area on which we wanted to collect the evidence.", "We have also observed that while some experiences are common to both novices and experts, certain problems are only faced by novices e.g., formulating RQs, selecting studies, creating data extraction and synthesis forms, etc.", "As the use of SRs in SE is new, various researchers have reported problems relating to different SR activities such as formulation of research questions [17], [3], conducting of literature searches [5] [17], interrater reliability checks [17], selection bias [6], quality assessment of primary studies [6] [5] [17]; and also with the overall SR process as being very time consuming [1] [13].", "The RQs were revised iteratively until consensus was achieved among the review team - a novice (PhD student) and the supervisor (Mendes).", "Gain a good knowledge of the SRs by reading and understanding the SR guidelines before attempting to conduct SRs.\n Expect the RQs as well as other parts of the protocol to evolve while conducting SRs."]} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} +{"8422408|8250043": []} diff --git a/edge/graph_10092092.jsonl b/edge/graph_10092092.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd6c11547f01c7ef8fc785a6c17d93ba5fc5f9d8 --- /dev/null +++ b/edge/graph_10092092.jsonl @@ -0,0 +1,13 @@ +{"6021855|2670121": []} +{"11392154|393948": []} +{"201003|2670121": []} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} +{"7322495|192934": ["We conducted experiments on two types of data, text data and image data, using Amazon product reviews [15] and UCI handwritten digits [11] respectively."]} +{"12935955|7704963": ["Similar techniques can also be found in the research of uncertain data mining [1]."]} +{"11067362|5940452": ["mation literature of using genetic algorithms to automatically learn weights for different parameters [43]."]} +{"15494001|11894197": ["A great deal of work has been conducted on various filter-based approaches to feature selection [7, 10, 27, 21]."]} +{"8500384|14356173": ["The existing literature incorporating statistical or machine learning techniques to detect outliers in healthcare is fairly extensive, using common methods such as decision trees or neural networks [26], [24], [29]."]} +{"8500384|27569632": ["While this paper does not provide a comprehensive discussion on outlier detection methods, we refer the reader to [10], [34]."]} +{"7857907|2670121": ["Figure 1 illustrates the layout and sensor locations for three smart homes from the CASAS datasets [Cook et al., 2013c] used in this paper.", "However, for applications such as sentiment analysis across different languages [Pan, 2010], and activity recognition across different domains [Cook et al., 2013b], the source", "Transfer learning approaches have found success in many applications including activity recognition [Hu et al., 2011; Cook et al., 2013c], sentiment classification [Zhou et al., 2014], document analysis and indoor localization [Pan and Yang, 2010].", "The CASAS dataset [Cook et al., 2013a] is a collection of smart home datasets that are widely used for investigating activity recognition algorithms.", "However, for applications such as sentiment analysis across different languages [Pan, 2010], and activity recognition across different domains [Cook et al., 2013b], the source \u21e4 The author contributed to this work during his internship at IIT Ropar. and target data are represented using\u2026"]} +{"14108784|15888893": ["For example, to predict user behaviors for a new product A where there is not enough training data, but there is useful data from a similar product B, can we use the knowledge learned from B to support predictions about A? Transfer learning has been proposed to address this problem [1,2] and has garnered tremendous attention from researchers [3\u20136]."]} diff --git a/edge/graph_10093798.jsonl b/edge/graph_10093798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08e2bcbf83042f2647fa304d464a8ec96a1fc210 --- /dev/null +++ b/edge/graph_10093798.jsonl @@ -0,0 +1 @@ +{"14369421|10093798": []} diff --git a/edge/graph_10096622.jsonl b/edge/graph_10096622.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..644f29991df3442bbf0ba571c463c0897eac5592 --- /dev/null +++ b/edge/graph_10096622.jsonl @@ -0,0 +1,2 @@ +{"26135040|1230643": ["WSNs have been used in many applications, ranging from environmental and natural habitat monitoring, medical, industry and military applications [1-2]."]} +{"24682427|1230643": ["It has been used in applications such as environmental and natural habitat monitoring, medical instrumentation, industrial automation, and military surveillance [1], [2]."]} diff --git a/graph_1063643.jsonl b/edge/graph_10096898.jsonl similarity index 100% rename from graph_1063643.jsonl rename to edge/graph_10096898.jsonl diff --git a/edge/graph_10098507.jsonl b/edge/graph_10098507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e013574f741841cc3561d9bb213782ba8673d65 --- /dev/null +++ b/edge/graph_10098507.jsonl @@ -0,0 +1,2 @@ +{"2201478|10098507": []} +{"16389868|18691290": ["A survey on this field and a comparison of the different projects is given in [4] and [5]."]} diff --git a/edge/graph_10098641.jsonl b/edge/graph_10098641.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee7b0066ce1582eb3e58519847db35124040779e --- /dev/null +++ b/edge/graph_10098641.jsonl @@ -0,0 +1,2 @@ +{"13053508|14736029": []} +{"23110468|14736029": []} diff --git a/graph_1074202.jsonl b/edge/graph_10099297.jsonl similarity index 100% rename from graph_1074202.jsonl rename to edge/graph_10099297.jsonl diff --git a/edge/graph_10100716.jsonl b/edge/graph_10100716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3d3d3ac7bd6720eed71370a326b6001eedd884b --- /dev/null +++ b/edge/graph_10100716.jsonl @@ -0,0 +1 @@ +{"17151752|10100716": ["It has been successfully used in other studies (Montzka et al., 2012) with diferent applications including soil moisture (Montzka et al., 2011, 2013), snow water equivalent (Leisenring and Moradkhani, 2011), lood inundation mapping (Matgen et al., 2010), radiance data assimilation for operational\u2026", "On the other hand, data assimilation has been successfully used for parameter estimation in subsurface hydrology (Evensen, 2009, Han et al., 2012, 2013, Kurtz et al., 2012, Montzka et al., 2012, Moradkhani et al., 2005b)."]} diff --git a/edge/graph_10116146.jsonl b/edge/graph_10116146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ba6481c89d143208bc4819777c503bcd34b8ba5 --- /dev/null +++ b/edge/graph_10116146.jsonl @@ -0,0 +1,2 @@ +{"7284666|1099309": ["This adds to the findings of [10] where it was demonstrated that LBP features perform better for texture retrieval than the MPEG-7 texture features [15]."]} +{"11291804|192934": []} diff --git a/graph_1078188.jsonl b/edge/graph_10119483.jsonl similarity index 100% rename from graph_1078188.jsonl rename to edge/graph_10119483.jsonl diff --git a/graph_1110872.jsonl b/edge/graph_10120175.jsonl similarity index 100% rename from graph_1110872.jsonl rename to edge/graph_10120175.jsonl diff --git a/edge/graph_10120942.jsonl b/edge/graph_10120942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6992ef87a8cf8151a7af8e91096d3aa5519e0b44 --- /dev/null +++ b/edge/graph_10120942.jsonl @@ -0,0 +1 @@ +{"114113653|10120942": []} diff --git a/edge/graph_10124745.jsonl b/edge/graph_10124745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cad5de33c17d451c56e63814dd7c54c35fd75858 --- /dev/null +++ b/edge/graph_10124745.jsonl @@ -0,0 +1,15 @@ +{"9714082|9913343": ["Existing graphical password schemes can be categorized into recall-based, recognition-based and cued-recall [5]."]} +{"267586|9913343": ["Recent systems have been developed which use easy to remember passwords, including abstract art pictures like in the \u201cDeja vu\u201d system [2], graphical passwords (see survey in [6]), or memorized motor sequences."]} +{"7815763|9913343": ["More graphical password schemes have been summa-rized in a recent survey paper [10]."]} +{"15152094|9913343": ["emory task involved in remembering and entering the password, graphical passwords can be divided into three general categories: recall-based systems, cued-recall systems and recognition-based systems [13, 14]. DAS is the first recall-based graphical password scheme in which the password is a free-form picture drawn on a 2D grid [7]. This scheme releases users from remembering complex text string and has a"]} +{"9852158|9913343": ["An excellent survey of the numerous graphical password schemes that have been developed is [23]."]} +{"3849996|9913343": []} +{"7483764|9913343": ["As mentioned in [10], most recognitionbased graphical passwords tend to have a small password space.", "However, it is more difficult to carry out a brute force attack against graphical passwords than text-based passwords [10].", "the total number of pictures at each round) [10]."]} +{"18485594|9913343": ["More graphical password schemes have been summarized in a recent survey paper [15]."]} +{"208011223|9913343": []} +{"1441826|9913343": ["Many graphical password schemes have been proposed to date, and several surveys are available [29], [21], [26]."]} +{"651758|9913343": ["One might notice that our categorization of graphical passwords differs from most literature [7, 28, 35, 36], where a boundary line was drawn between recognition and recall."]} +{"10922169|9913343": ["One final point - graphical passwords is an active research topic; due to space limit, some interesting work is not covered here, but can be found in a recent survey of this topic in [11]."]} +{"16660466|9913343": ["Graphical password can be categorized into recall-based, recognition-based, and cued-recall [6,7]."]} +{"2084061|9913343": ["Early surveys of graphical passwords are available [Monrose and Reiter \n2005; Suo et al. 2005].", "Permission to make digital or hard copies of part or all of this work \nfor personal or classroom use is granted without fee provided that copies are not made or distributed \nfor pro.t or commercial advantage and that copies show this notice on the .rst page or initial screen \nof a display along\u2026"]} +{"56504976|9913343": []} diff --git a/edge/graph_10137209.jsonl b/edge/graph_10137209.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49a7adc9d63f1e0ad6d445c922ccfbcac357e84d --- /dev/null +++ b/edge/graph_10137209.jsonl @@ -0,0 +1,5 @@ +{"9298269|1895753": ["asp?model=83319, and consists of the implementation of a number of benchmark neuronal network models in several different simulators, associated with a review article on spiking neuronal network simulators [2]."]} +{"1506679|513106": ["In addition to collecting basic demographics [8], [25], [26], the survey will ask participants to consider their own SPI preferences via a pairwise comparison mechanism based on the wiki survey mechanism designed by Salganik et al."]} +{"6168059|10500613": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]} +{"6168059|386036": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]} +{"5970075|6116234": []} diff --git a/edge/graph_10137283.jsonl b/edge/graph_10137283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54cbebdd05e0293038d776c14474833957bd39ac --- /dev/null +++ b/edge/graph_10137283.jsonl @@ -0,0 +1,4 @@ +{"15518330|9240891": []} +{"9230355|9240891": ["There are at the moment few trust systems and models that explicitly take the risk factor into account [8]."]} +{"3127783|9240891": ["The same trust is defined as \u201cthe firm belief in the competence of an entity to act dependably, securely and reliably within a specified context\u201d (assuming dependability covers reliability and timeliness)\u201d [ 8 ]."]} +{"2597225|9240891": ["The essential components of a trust relationship are: the trustor, the trustee, a specific context with associated level of trust, and the conditions under which this relationship becomes active [2] ."]} diff --git a/edge/graph_10137425.jsonl b/edge/graph_10137425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1466112f3ada0f89cdcdfaaaf148abf36a97b413 --- /dev/null +++ b/edge/graph_10137425.jsonl @@ -0,0 +1,28 @@ +{"207239085|5671282": ["To date this problem has not been studied in cross-modal deep hashing methods [36].", "We refer the readers to [36] for a comprehensive survey.", "An advantageous solution to cross-modal retrieval is hashing methods, which compress high-dimensional data into compact binary codes with similar binary codes for similar objects [36]."]} +{"207239085|393948": ["Recently, it has been witnessed that deep learning methods [3], such as deep convolutional networks (CNNs) [21] and deep recurrent networks (RNNs) [35], have made performance breakthroughs on many real-world perception problems."]} +{"2276942|18050848": ["Because visual data provides a stream of information that is separate from the audio and invariant to acoustic noise, AVSR has shown noticable improvements over audio-only speech recognition in both clean and noisy conditions [2, 3, 4, 5, 6, 7, 9]."]} +{"1688357|7983519": ["The task of referring expression generation (REG) has been studied since the 1970s [40,22,30,7], with most work focused on studying particular aspects of the problem in some relatively constrained datasets.", "Referring expression generation has been studied for many years [40,22,30] in linguistics and natural language processing."]} +{"207107473|15369615": []} +{"15512141|18050848": ["Such improvements have been typically demonstrated on databases of small duration, and, in most cases, limited to a very small number of speakers (mostly less than ten, and often singlesubject) and to small vocabulary tasks [18], [ 21 ].", "A number of audio-visual corpora, commonly used in the literature, are listed in Table II. Notice that most are the product of efforts by few university groups or individual researchers with limited resources, and as a result, they suffer from one or more shortcomings [18], [ 21 ], [136]: They contain a single or small number of subjects, affecting the generalizability of developed methods to the wider population; they typically have small ..."]} +{"15512141|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory, an active area of research with many applications [91] [92] [93]."]} +{"206742471|8777381": ["It is well accepted amongst the research community that certain acoustic and prosodic features play an important role in recognising the affective state [28]."]} +{"6733201|18050848": ["Audio-visual integration can be divided into three categories: feature fusion, decision fusion and model fusion [3-5].", "Many studies have shown that the integration of audio and visual features leads to more accurate speaker identification even in noisy environments [1-3]."]} +{"14415655|9835525": ["A popular technique is to compute a set of localized color histograms for each image and use a histogram distance function to detect boundaries [6, 7]."]} +{"162180|9045232": ["Over the years various methods for the detection of faces in images and image sequences are reported, see [95] for a comprehensive and critical survey of current face detection methods.", "Face detection techniques aim to identify all image regions which contain a face, regardless of its three-dimensional position, orientation, and lighting conditions used, and if present return their image location and extents [95]."]} +{"162180|192934": ["According to [37] the four best approaches for pattern recognition are:", "\u2022 Bayes classifier: assigns a pattern to the class which has the maximum estimated posterior probability [37]; \u2022 Decision tree: assigns a pattern to a class based on a hierarchical division of feature space [37]; \u2022 k-Nearest neighbor: assigns a pattern to the majority class among the k patterns with smallest distance in feature space [37]; \u2022 Hidden Markov model (HMM): assigns a pattern to a class based on a sequential model of state and transition probabilities [46, 69];"]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"8745888|7983519": ["Referring expression generation is a classic NLP problem (see e.g., [54, 31]).", "Specifically, our model is based upon recently developed methods that combine convolutional neural networks (CNNs) with recurrent neural networks (RNNs)."]} +{"7332452|393948": ["Recent progress on deep learning is reviewed in [3]."]} +{"4209000|6387482": ["Note that simple fusion strategies, such as the early or late fusion, usually result in limited performance gain since the intrinsic relations among multiple feature representations are overlooked [4]."]} +{"7062194|6387482": []} +{"15315731|12607466": ["The fuzzy logic is applied both as a feature transform operator or a decision operator for image fusion [47, 51, 48, 52, 53, 49, 54, 55, 50, 56, 41, 57, 58, 60, 88, 59, 87, 89, 90, 91, 43, 82, 92].", "There are several applications of fuzzy logic base image fusion such as brain diagnosis [47, 48, 49, 50], cancer treatment [51], image segmentation and integration [51, 52], maximization mutual information [53], deep brain stimulation [54], brain tumor segmentation [55], image retrieval [56, 57], spatial weighted entropy [56], feature fusion [56], multimodal image fusion [41, 58, 59], ovarian cancer diagnosis [60], sensor fusion [88], natural computing methods [87] and gene expression [89, 90].", "The ability to train the neural network to adopt to these changes enable several applications for medical image fusion such as solving the problems of feature generation [36], classification [36], data fusion [36, 19, 27], image fusion [37, 38, 27, 39, 40, 41, 42, 43], micro-calcification diagnosis [19], breast cancer detection [38, 44, 45], medical diagnosis [27, 28, 42], cancer diagnosis [46], natural computing methods [87] and classifier fusion [45].", "The improvements of feature processing and analysis can be improved to fit the fuzzy space better when combined with probabilistic approaches such as fuzzy-neural network [41, 43], fuzzy-genetic-neural network-rough set [87], fuzzy-probability [89] and neuro-fuzzy-wavelet [82].", "Some of examples of these are wavelet-neural network [27, 28, 40], neural-fuzzy [41, 43], fuzzy-genetic-neural network-rough set [87] and SVM-ANN-GMM [45]."]} +{"15315731|10863733": []} +{"2257674|18050848": ["Yet, audio and lip information have been used for speaker identification and/or verification in relatively few works such as [3], [4], [5], [6], [7], [8]."]} +{"1033682|174797842": []} +{"11384576|6387482": []} +{"11384576|10397481": []} +{"11384576|2748484": ["Computational models of single- and multimodal saliency [10]\u2013[13] have been applied to emerging multimedia applications such as automatic video abstraction, summarization, indexing, and browsing [14], [15].", "An extensive survey on methods and taxonomies from the vast literature on video abstraction and summarization can be found in [18] and detailed field overviews in [15], [16]."]} +{"4537870|206602044": ["A number of diarization methods were recently proposed, e.g. [1]."]} +{"12818375|2748484": []} +{"13298437|7185733": ["For a comprehensive survey of hand and arm gesture recognition see Pavlovic et al. [ 17 ]."]} diff --git a/edge/graph_10146579.jsonl b/edge/graph_10146579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e666c303029310f528d39cfb7c1544da595addc5 --- /dev/null +++ b/edge/graph_10146579.jsonl @@ -0,0 +1,30 @@ +{"2119026|417250": ["In FOSD, a program is viewed as a composition of features [1]."]} +{"17031114|8296351": []} +{"9125809|8296351": ["There are different approaches and notations for describing feature models [12].", "Solver technology can be employed to answer a number of questions on feature models including whether a feature selection is valid or whether a feature is always, sometimes, or never present when another feature is present [12], which is interesting information for reference checking.", "Commonly, a feature model defines which feature selections are valid [13], and tools are available that check selections for validity [12,23]."]} +{"9125809|417250": ["A feature is a unit of functionality of a software system that satisfies a requirement, represents a design decision, or provides a configuration option [3].", "Feature-Oriented Software Development (FOSD) is a paradigm for the development of software product lines [3,11,13, 26]."]} +{"2679466|417250": ["feature management) is one of the reasons of the success of contemporary feature-oriented languages and tools [3].", "A feature is a unit of functionality of a program that satisfies a requirement, represents a design decision, or provides a potential configuration option [3]."]} +{"8649253|11607029": ["Often simple rules such as replacement, concatenation, specialization, or overriding suffice, but the approach is open to more sophisticated rules known from multidimensional separation of concerns [16] or software merging [32]."]} +{"13986823|9766972": ["For an overview of the field see a recent survey [52]."]} +{"13986823|14022070": ["Moreover, combinatorial testing allows to compute a set of con-\ufb01gurations that cover all combinations among all n -sized sets of con\ufb01guration options [43, 24].", "Beyond opportunistic and ad-hoc testing of individual con\ufb01gura-tions [32, 43], developers could write simple test cases validating .", "Sampling strategies, e.g. pairwise sampling [43, 24], can help to reduce the test effort, but are intrinsically incomplete."]} +{"8497188|8296351": ["Benavides et al. [37] provide state-of-the-art information on the analysis of feature models, leveraging the operations employed in model veri\ufb01cation."]} +{"8497188|627405": ["The importance of SLR for software engineering has been addressed by a reasonable amount of studies, as deeply discussed in [12\u201315]."]} +{"7092094|8296351": ["There are many different notations and extensions of variability models [9], [19].", "For many of these questions, we may be tempted to use automated analyses of feature models, that has been broadly investigated in literature [9].", "\u2026statistics about feature models and to detect inconsistencies in feature models, e.g., dead features which are not contained in any valid configuration or false optional features which are declared as optional but actually required in all valid configurations due to cross-tree constraints [9].", "There are numerous approaches to reason about valid feature combinations in feature models [9].", "A common form of variability models are feature models [2], [8], [9]."]} +{"7092094|417250": ["Proponents of feature-oriented software development argue that this simple 1:1 mapping is a strength in understanding and structuring the product-line implementation [23]."]} +{"61456903|8296351": []} +{"61456903|16125167": ["For yet other concerns of the system that are currently not configurable, no tracing information may be present in the source code; in such cases, tracing links can be extracted manually or with semi-automatic feature-location tools (Biggerstaff et al. 1993; Robillard and Murphy 2002; Poshyvanyk et al. 2007; Cornelissen et al. 2009)."]} +{"61456903|206778272": []} +{"61456903|11607029": ["In practice, merges are mostly performed in a line-based fashion using textual patches, and only when there is a conflict (that is when different changes are applied to the same line) manual intervention is necessary (Mens 2002).", "Although language-specific merge mechanisms exist (Mens 2002; Apel et al. 2012b), merging is usually performed in a text-based fashion, oblivious to the meaning of the merged artifacts."]} +{"61456903|417250": []} +{"6100651|10146579": ["Recent surveys on product-line analyses give a detailed overview on related work [55] and related tools [37]."]} +{"6100651|9766972": ["Consequently, it seems useful to combine several techniques for product-line verification [55].", "In the last decade, several verification approaches have been proposed that take commonality and variability in a product line into account [55].", "So far, researchers evaluated product-line analyses only for product lines with defects or without [55].", "Recent surveys on product-line analyses give a detailed overview on related work [55] and related tools [37].", "Others specify the expected behavior with an extension of \u03bc-calculus [25], computation tree logic [18], and aspect-oriented programming [4, 6] (for further techniques see [55]), whereas we are the first to check feature-oriented contracts with model checking.", "A well-known strategy is family-based verification, in which all products are verified simultaneously \u2013 either by making tools variability-aware or by transforming compile-time into runtime variability [55].", "A simple strategy for product-line verification is to generate and verify all products individually, known as product-based verification [55]."]} +{"7015696|417250": ["Feature-oriented software development (FOSD) is a paradigm for the construction, customization, and synthesis of software systems (Apel and Ka\u0308stner, 2009).", "Feature-oriented software development (FOSD) is a paradigm for the construction, customization, and synthesis of software systems (Apel and K\u00e4stner, 2009)."]} +{"9766972|8296351": ["\u2026focus only on testing are outside the scope of this article; we refer the reader to dedicated surveys on feature-model analysis [Janota et al. 2008; Benavides et al. 2010] and on product-line testing [Tevanlinna et al. 2004; Engstro\u0308m and Runeson 2011; Da Mota Silveira Neto et al. 2011; Oster et\u2026", ", feature-model analysis) or that focus only on testing are outside the scope of this article; we refer the reader to dedicated surveys on feature-model analysis [Janota et al. 2008; Benavides et al. 2010] and on product-line testing [Tevanlinna et al."]} +{"9766972|14022070": ["A typical strategy is to sample a smaller number of products, usually based on some coverage criteria, such that still reasonable statements on the correctness or other properties of the entire product line are possible [Oster et al. 2010; Perrouin et al. 2010; Nie and Leung 2011].", "While most coverage criteria such as pair-wise or t-wise coverage are often proposed for testing of single systems [Nie and Leung 2011] and product lines [Oster et al. 2010; Perrouin et al. 2010], they have also been applied to scale-type checking [Jayaraman et al. 2007; Liebig et al. 2013], static\u2026", "While most coverage criteria such as pair-wise or t-wise coverage are often proposed for testing of single systems [Nie and Leung 2011] and product lines [Oster et al.", "A frequently stated assumption is that most faults are caused by an interaction of only few features [Nie and Leung 2011; Kuhn et al. 2013].", "reasonable statements on the correctness or other properties of the entire product line are possible [Oster et al. 2010; Perrouin et al. 2010; Nie and Leung 2011]."]} +{"571642|417250": ["Vol. 8, No. 6, September\u2013October 2009"]} +{"16206467|8296351": ["However, a more detailed discussion is outside the scope of this paper; see [7, 14, 32, 62] for more information about using variability models in variability analysis.", "For related work on implementing variability, on the variability-aware lexer, and on variability-aware type systems, see our discussions in prior work [30, 32, 33]; for a comprehensive discussion on variability-model analysis and reasoning about variability, we recommend Benavides\u2019 survey [7]."]} +{"16206467|417250": []} +{"16852033|627405": ["003 since they are considered the world leading publishers for high quality publications [11]."]} +{"17836427|8296351": ["Figure 1: A simple feature model of a mobile phone product line [1], representing the features and their dependencies."]} +{"8018012|417250": []} +{"16076198|8296351": ["Feature model analysis [18] aims at finding inconsistencies in feature models, e."]} +{"16076198|417250": ["Our solution is to create derivatives [13], i."]} diff --git a/graph_1113420.jsonl b/edge/graph_10147053.jsonl similarity index 100% rename from graph_1113420.jsonl rename to edge/graph_10147053.jsonl diff --git a/edge/graph_10148401.jsonl b/edge/graph_10148401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78b169d60f3a5660a150151ac619431792698fee --- /dev/null +++ b/edge/graph_10148401.jsonl @@ -0,0 +1,19 @@ +{"16185925|1236072": []} +{"16948685|1230643": ["therefore, energy conservation is the most important performance objective[ 1 ,2] to extend network lifetime while designing WSN protocols, such as media access control[3], routing [4-5],data aggregation[6]for WSN[7].", "wireless sensor networsk(WSNs)is a new network paradigm that involve the deployment of hundreds-even thousand-of low-cost, energy-limited, small, and applicationspecific sensor nodes to create applications for factory monitoring and control, disaster response, military sensing intelligent house control, and, etc [ 1 ].Since WSN is typically deployed in an uncontrolled or unreachable environment, each sensor node carries a limited, generally ..."]} +{"19799172|1236072": ["Many routing protocols have been specifically designed for the wireless sensor networks where several factors such as energy efficiency, low latency, and success rate are necessary to take into account [2], [4], [5]."]} +{"19799172|1230643": ["Recently, advances in minimization, low-power, low-cost, efficient and multi-functional wireless communication equipment, and improved small-scale energy supplies make a new hi-tech dream achievable: wireless sensor networks [1], [2]."]} +{"19799172|14441987": ["Since the 1970s, wireless networks have been showing huge interest to the computing industry and the research community [3]."]} +{"19799172|1708582": ["However, the Bant uses a reinforcement learning algorithm [18], [19] in order to get a better and more efficient route than the one chosen by the Fant and at the end it updates the routing tables of the reverse-visited sensor nodes."]} +{"13956612|1236072": []} +{"13956612|1230643": []} +{"13416245|15300368": []} +{"13515148|1236072": []} +{"493649|1236072": []} +{"493649|1230643": ["Typical applications include, but are not limited to, data collection, monitoring, surveillance, and medical telemetry [1, 2].", "However, this cause delays in propagation of data through the nodes."]} +{"16154982|1230643": ["Although some applications involve a small number of sensors (10-20), other applications may involve a large number of sensor nodes (100-1000) [5]."]} +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"15225372|1230643": ["With the rapid development of wireless communication technology, micro electromechanical technology and sensor technology, Wireless Sensor Networks [ 1 , 2] has become a research hotspot that receives much attention."]} +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"9809074|1236072": ["Recent advance in micro-electromechanical system technology has made it possible to develop low-power and low-cost sensors with at a much reduced cost, so that large wireless sensor networks with thousands of tiny sensors are well within the realm of reality."]} +{"20991280|1236072": ["Several power-efficient routing protocols have been proposed to address this topic [2]."]} +{"36606936|14441987": ["The traditional routing protocols for wireless ad hoc networks [2] are not well suited for sensors networks."]} diff --git a/graph_1114486.jsonl b/edge/graph_1014845.jsonl similarity index 100% rename from graph_1114486.jsonl rename to edge/graph_1014845.jsonl diff --git a/edge/graph_10148683.jsonl b/edge/graph_10148683.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b40910aef7741968df479f2370549d6ff33d903 --- /dev/null +++ b/edge/graph_10148683.jsonl @@ -0,0 +1,11 @@ +{"186587|6028805": ["Thermal or far infrared imagery has been used for face recognition (cf. a survey paper [36])."]} +{"10566144|9045232": ["Commonly, the performance of face detection systems is expressed in terms of receiver operating curves (ROC), but the term \" successful localization \" is often not explicitly defined [28]."]} +{"11080820|9045232": ["Before introducing the developments and problems in face detection we first give the concept of face detection which is quoted from reference [1]: Given an arbitrary image or an image sequence, the goal of face detection is to determine whether or not there are any faces in the image, and if\u2026"]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"9203730|62198990": ["Invasive eye-tracking techniques have been employed for a number of years by cognitive psychologists seeking to study eye movements with regard to perception [6]."]} +{"34364980|9045232": []} +{"36310764|9045232": []} +{"2557058|9045232": ["Yang et al. [17] proposed two methods which seek to represent the manifold of human faces as a set of subclasses.", "Numerous approaches for face detection have been proposed in the last decade, many of them described and compared in two interesting recent surveys by Yang et al. [1] and Hjelmas et al. [2]."]} +{"2267590|7185733": ["On the side of interaction semantics, recognition of human gestures (see e.g. (Pavlovic et al., 1997)) and expressions (as in (Essa and Pentland, 1997)) can be used to develop natural human\u00b1machine interaction languages, while face recognition (for a recent contribution, see (Lam and Yan, 1998))\u2026", "(Pavlovic et al., 1997)) and expressions (as in (Essa and Pentland, 1997)) can be used to develop natural human\u00b1machine interaction languages, while face recognition (for a recent contribution, see (Lam and Yan, 1998)) can be e\u0080ective for person authentication and surveillance purposes."]} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} diff --git a/graph_1118269.jsonl b/edge/graph_10150488.jsonl similarity index 100% rename from graph_1118269.jsonl rename to edge/graph_10150488.jsonl diff --git a/graph_101513.jsonl b/edge/graph_101513.jsonl similarity index 100% rename from graph_101513.jsonl rename to edge/graph_101513.jsonl diff --git a/edge/graph_10156087.jsonl b/edge/graph_10156087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fb0de469059e9063c444c061c67bbccb3298771 --- /dev/null +++ b/edge/graph_10156087.jsonl @@ -0,0 +1 @@ +{"2233826|5375832": ["\u2026linguistic summaries of large clinical data sets; instead they focus on generating patient information material (often to support behavior change) [26], helping clinicians write routine documents [27], summarizing medical literature [28], and generating explanations for recommendations [29]."]} diff --git a/graph_1119606.jsonl b/edge/graph_10156445.jsonl similarity index 100% rename from graph_1119606.jsonl rename to edge/graph_10156445.jsonl diff --git a/graph_1123458.jsonl b/edge/graph_10157083.jsonl similarity index 100% rename from graph_1123458.jsonl rename to edge/graph_10157083.jsonl diff --git a/edge/graph_10159356.jsonl b/edge/graph_10159356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..070cb2a1c5aa0f5fb663fffd515dc81fe5bc5c14 --- /dev/null +++ b/edge/graph_10159356.jsonl @@ -0,0 +1,3 @@ +{"29817491|6288895": ["For a comprehensive overview and up-to-date shading techniques, we refer to [21], [22], [23], [24], [25]."]} +{"17301869|8520489": ["The incident radiance in the direction \u03c9i from pi to x is approximated by L\u0302(x,\u03c9i) = I(pi) r2 (2) Further author information: (Send correspondence to D.", "In particular, the matrix-valued reflectance function F can produce (1) local illumination, (2) global illumination, (3) shadows without inter-reflection, and (4) inter-reflection without shadows, all within a single algorithm."]} +{"15279383|4361938": ["Eye tracking studies have been conducted in di\ufb00erent research \ufb01elds, such as psychology, marketing, or human-computer interaction [11]."]} diff --git a/graph_1136446.jsonl b/edge/graph_10162051.jsonl similarity index 100% rename from graph_1136446.jsonl rename to edge/graph_10162051.jsonl diff --git a/edge/graph_10174335.jsonl b/edge/graph_10174335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbafd219b9a3b42858347d598b4c45907eacb276 --- /dev/null +++ b/edge/graph_10174335.jsonl @@ -0,0 +1,9 @@ +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"9701786|205286988": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} +{"9701786|1236072": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} +{"18582207|3894519": ["Wireless Sensor Networks (WSNs) [1, 2, 3] have become popular in variety of applications such as military surveillance, environmental, transportation tra \ufb03 c, temperature, pressure and vibration monitoring."]} +{"18582207|1230643": ["onmental, transportation tra\ufb03c, temperature, pressure and vibration monitoring. To achieve fault tolerance, WSNs consist of hundreds or even thousands of sensor randomlydistributed with in the region [4, 5, 6]. All the nodes report sensed data to Base Station (BS) often called sink. Nodes in WSNs are power constrained due to limited battery resource, and they might be placed where they can not be accessed,"]} +{"17042653|1236072": ["LEACH randomly selects a few sensor nodes as cluster heads (CHs) and rotates this role to evenly distribute the energy load among the sensors in the network [1].", "It increases the energy consumption of the sensor network and hence the lifetime [1]."]} +{"15271419|1230643": ["data to BS, often called sink. Usually nodes in WSNs are power constrained due to limited battery resource. It is also not possible to recharge or replace the battery of already deployed sensor nodes [1, 2, 3]. Routing protocols play important role in achieving energy e\ufb03ciency in WSNs. Clustering is used to minimize energy consumption. In this technique members of the cluster elect a CH [4, 5]. All nodes b"]} +{"14099417|1236072": ["LEACH randomly selects a few sensor nodes as cluster heads (CHs) and rotates this role to evenly distribute the energy load among the sensors in the network [1].", "It increases the energy consumption of the sensor network and hence the lifetime [1]."]} +{"10448716|1236072": ["long-distance transmissions should be kept to minimum in order to prolong the network lifetime [2, 3].", "Basically any clustering algorithm is concerned with the management of clusters, which includes: forming a suitable number of clusters, selecting a cluster head for each cluster and controlling the data transmission within clusters and from cluster heads to the base station [2]."]} diff --git a/graph_1142636.jsonl b/edge/graph_10174599.jsonl similarity index 100% rename from graph_1142636.jsonl rename to edge/graph_10174599.jsonl diff --git a/graph_1146543.jsonl b/edge/graph_10175374.jsonl similarity index 100% rename from graph_1146543.jsonl rename to edge/graph_10175374.jsonl diff --git a/edge/graph_10179311.jsonl b/edge/graph_10179311.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..605186e9e3f518b0fb0867afc6ae0027bda678de --- /dev/null +++ b/edge/graph_10179311.jsonl @@ -0,0 +1,2 @@ +{"63776596|40162482": ["Other uses of VW (Second Life) for medical and healthcare education (Douglas, Procter, 2009) have been documented in different articles (Beard, Wilson, 2009; Kamel Boulos, Hetherington, 2007; Kamel Boulos, Ramloll, 2008; Gorini, Gaggiolo, 2008; Hansen, 2008)."]} +{"205712461|15231229": []} diff --git a/edge/graph_10182711.jsonl b/edge/graph_10182711.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76181bc5a760da56602b81de4bcb6ccab74ecdcb --- /dev/null +++ b/edge/graph_10182711.jsonl @@ -0,0 +1,3 @@ +{"353898|60455": ["The related studies include new topic detection algorithms [18][19]."]} +{"2125960|16575201": ["the degree to which \u201ca linguistic unit is related to (or more straightforwardly, represents) domain-specific concepts\u201d [116]."]} +{"18233590|8125630": ["Overall SIMPLE\u2019s GETL engine ingests the patent feeds on an ongoing basis, extracts desired information from them, transforms and cleanses them into standard formats, and loads them into the data warehouse modeled by a standard data warehouse model, e.g., star or snowflake schema [11, 12 ]."]} diff --git a/graph_1018996.jsonl b/edge/graph_1018996.jsonl similarity index 100% rename from graph_1018996.jsonl rename to edge/graph_1018996.jsonl diff --git a/edge/graph_10194753.jsonl b/edge/graph_10194753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b93b9dc790b735c6b6ffe28baefed1a2582ff00d --- /dev/null +++ b/edge/graph_10194753.jsonl @@ -0,0 +1,10 @@ +{"28186267|7988320": ["Then the coordinator will deliver the data to remote medical center through external networks for further analysis [1]."]} +{"28186267|16514036": ["Concerning about that, many energy efficient MAC protocols have been proposed [6] [7]."]} +{"15347035|1230643": ["For example, in a wireless sensor network (WSN) for forest fire detection [12], a large number of sensor nodes ar randomly deployed in a fire-prone forest to detect fires."]} +{"62646787|6539555": []} +{"62646787|1230643": ["Although many protocols and algorithms have been proposed for traditional Wireless Sensor Networks (WSNs) [2], they are not well suited to the unique features and application requirements of WBANs."]} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} diff --git a/edge/graph_10198276.jsonl b/edge/graph_10198276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..544ea317009809e5bd52f9b155b66d1c0a627c16 --- /dev/null +++ b/edge/graph_10198276.jsonl @@ -0,0 +1,8 @@ +{"22911128|7439310": ["Techniques for combating transmission errors have been classified into three categories [159, 160]: (1) sender-side techniques to make the encoded bit stream resilient to potential errors, (2) receiver-side techniques to conceal or alleviate the negative effects incurred by errors, and (3) interactive"]} +{"22911128|18144244": []} +{"19364656|18144244": ["Existing digital forgery detection methods are divided into active [2\u20136], and passive (blind) [7\u201310] approaches."]} +{"23020122|386036": ["It relies on the assumption that duplicated vectors will be close in the sorted list and have the same offset, therefore will be compared during the detection steps[7]."]} +{"7157959|7971188": ["A smaller indicates that the selfish colluder detection and identification process is more robust against framing attacks."]} +{"3716615|18144244": ["Existing digital forgery detection methods are divided into active [2], [3], [4], and passive (blind) [5], [6], [7], [8], [9], [10] approaches."]} +{"4823784|18144244": ["Existing digital forgery detection methods are divided into active [1] [2] [3] and passive (blind) [4] [5] [6] [7] [8] [9] approaches."]} +{"11821654|7971188": []} diff --git a/graph_1020148.jsonl b/edge/graph_1020148.jsonl similarity index 100% rename from graph_1020148.jsonl rename to edge/graph_1020148.jsonl diff --git a/edge/graph_10206347.jsonl b/edge/graph_10206347.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3247f6ed7c03e4d7be48c8b9a218eb45ad53c3de --- /dev/null +++ b/edge/graph_10206347.jsonl @@ -0,0 +1,16 @@ +{"9071416|7988320": ["I. INTRODUCTION\nA Wireless Body Area Network (BAN) consists of inbody and on-body sensor nodes that continuously monitor a patient\u2019s vital information for diagnosis and prescription [1], [2].", "Several protocols have been proposed recently in the area of routing in BANs [1], mostly validated either using theoretical analysis, testbed implementation or simulation, and involve MAC or power control mechanisms.", "Adaptive QoS resource allocation is thus needed to provide bandwidth guarantees, which are essential for reliable data collection in BANs.", "BANs for healthcare put more emphasis on adaptation to changes in context and application requirement, thus, ARBA adopts an adaptive resource allocation policy to continuously meet QoS requirements."]} +{"17245062|1230643": ["Typically a lot of nodes with their sensors gather different types of information and send them hop by hop to a sink for automatic monitoring, controlling and other processes [1]."]} +{"207163460|1230643": ["INTRODUCTION A Wireless Sensor Network (WSN) [Pottie and Kaiser 2000; Akyildiz et al. 2002] is a special \ntype of ad hoc network composed of a large number of nodes equipped with different sensor devices.", "Because of resource rationalization needs of WSNs, data processing is \ncommonly implemented as in-network algorithms [Akyildiz et al. 2002; Intanagonwiwat et al. 2003; Madden \net al. 2005]."]} +{"207163460|4491892": ["Particle .lters are recursive implementations of statistical \nsignal processing [Gilks et al. 1996] known as sequential Monte Carlo methods (SMC) [Crisan and Doucet \n2002]."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"42000734|7788290": []} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"10178899|1230643": ["\u2026for example, random deployment in inaccessible terrains and cooperative effort, offer unprecedented opportunities for a broad spectrum of civilian and military applications, such as industrial automation, military tactical surveillance, national security, and emergency health care [1], [2], [3]."]} +{"15260600|16514036": []} +{"17767204|9240891": ["Therefore, TrE is too simple to ensure the security and efficiency of MSNs."]} +{"2215820|7788290": ["Traditionally, researchers used vision sensors for activity recognition[2][3]."]} +{"8053467|519014": []} +{"8053467|14970359": ["[3-5])."]} +{"11239240|7988320": ["The existing efficient MAC protocols are broadly categorized in [9] as low power listening (LPL), contention-based and time division multiple access (TDMA).", "In a WBAN survey [9] we have found that amongst the well-known protocols, IEEE 802."]} +{"3258354|9240891": ["Most importantly, we observe that since all these works ([7]\u2013[15]) do not consider the unique operational and security requirements of MSNs, they might not be suitable for MSNs."]} +{"24202622|1400872": ["Some remedies have been provided by Hannan and Bishop (1997) and Pearlmutter (1995)\nfor accelerating the convergence and for achieving optimal solutions."]} diff --git a/graph_115441.jsonl b/edge/graph_10212336.jsonl similarity index 100% rename from graph_115441.jsonl rename to edge/graph_10212336.jsonl diff --git a/edge/graph_10213552.jsonl b/edge/graph_10213552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6616ebc8de0f67e231902a8e94066448f32c487 --- /dev/null +++ b/edge/graph_10213552.jsonl @@ -0,0 +1,13 @@ +{"11392154|393948": []} +{"55722974|3205677": ["According to [8], there are two main fault models, Byzantine faults and fail-stop faults, but also a third model called fail-stutter faults."]} +{"15101574|1113420": ["For a survey on context-aware systems and architectures, see Baldauf et al. (2007)."]} +{"14266011|1507400": ["It manages resources in a distributed computing environment using YARN [6] [7], and it can manage a large scale of data processing through the MapReduce algorithm [8] [9]."]} +{"3196617|1507400": []} +{"15494001|11894197": ["A great deal of work has been conducted on various filter-based approaches to feature selection [7, 10, 27, 21]."]} +{"15697734|17323154": ["An extended survey of clustering applied to web engines is presented by [5].", "Other additional steps for dimensionality reduction frequently used are [5]:\n\u2022 Filtering Removes special characters and punctuation that not hold any discriminative power under the vector model."]} +{"12518844|2746910": ["Ensembles have also been applied toward feature selection [1], [26], [30], [36], [42], [43], [44]."]} +{"12518844|11894197": ["Lastly, class imbalance (uneven distribution of samples across the classes) is a frequently occurring problem with DNA microarray datasets [37].", "Due to computational constraints frequently the feature selection methods used will be univariate feature selection techniques due to their reduced computational expense and intuitive output (a ranked lists of genes) which is easy to verify through experimental means [37]."]} +{"16106517|10500613": ["Despite much research from the database and statistics communities [4, 8, 16, 19, 31, 32], little visualization research addresses discovery, wrangling or profiling challenges."]} +{"16106517|386036": ["Prior work [8, 32] lists a number of data wrangling challenges.", "Despite much research from the database and statistics communities [4, 8, 16, 19, 31, 32], little visualization research addresses discovery, wrangling or profiling challenges."]} +{"934826|3330313": []} +{"934826|1230643": ["Manuscript received September 04, 2014; revised February 02, 2015; accepted February 22, 2015."]} diff --git a/edge/graph_10233218.jsonl b/edge/graph_10233218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c934bfe6167b9fc9224ccc619b79c9258dcbbf2 --- /dev/null +++ b/edge/graph_10233218.jsonl @@ -0,0 +1,3 @@ +{"5054739|10559330": []} +{"13825411|713082": []} +{"5890952|10559330": []} diff --git a/edge/graph_102345079.jsonl b/edge/graph_102345079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b52ef49fbc7447337a1292d0bb01d066a279a572 --- /dev/null +++ b/edge/graph_102345079.jsonl @@ -0,0 +1,59 @@ +{"21705149|1230643": ["The wireless sensor node forms clusters and communicates the data to the sink through Cluster Head (CH) [1\u20134]."]} +{"31655230|7876249": ["Among temperature-aware routing algorithms[1], TARA[2] is known as the first protocol that introduced temperature as a routing protocol metric."]} +{"52813145|63317370": []} +{"3969836|7876249": ["Since the elderly aged people are more vulnerable to different health issues and diseases, they require frequent medical check-up, which results in high healthcare costs [2], in this situation WBAN plays an important role."]} +{"3969836|16514036": []} +{"67858826|1230643": []} +{"52897705|7876249": ["In the survey of routing protocols in wireless sensor networks [10,11], the path selection algorithm is based on the principle of minimizing the total energy consumption of the path, the global optimal solution is solved by using the greedy algorithm, which does not consider the protection of individual nodes with small energy, nor the energy consumption ratio of the whole path."]} +{"52897705|17410801": ["In the survey of routing protocols in wireless sensor networks [10,11], the path selection algorithm is based on the principle of minimizing the total energy consumption of the path, the global optimal solution is solved by using the greedy algorithm, which does not consider the protection of individual nodes with small energy, nor the energy consumption ratio of the whole path."]} +{"7876249|3096077": ["In the withdrawal strategy the nodes having hotspots as neighbor nodes send back the data packets to the sender node to find alternative routes to forward the data packet, as shown in Figure 9, redrawn from [15].", "Furthermore, the threshold temperature of any sensor node is computed based on temperature of its own along with its neighbors, which makes it different from other temperature aware routing protocols [15].", "This makes it different from the other thermal-aware routing protocols where threshold is a predefined value [15].", "A sample of how ALTR works is shown in Figure 10b, redrawn from [15].", "Figure 10a, redrawn from [15] shows an example of how LTR works.", "Since the elderly aged people are more vulnerable to different health issues and diseases, they require frequent medical check-up, which results in high healthcare costs [15,16]."]} +{"7876249|17410801": ["The architecture of WBSNs can divided into following three different tiers [18], as shown in Figure 1: Tier 1 \u2014 Intra-WBSN : In Intra-WBSN, the on-body and/or implanted bio-medical sensor nodes send the sensed data to the coordinator or base station.", "Design and development of efficient routing protocols for WBSNs is a challenging job due to their unique requirements and specific characteristics [18]."]} +{"7876249|7988320": ["Different types of sensor nodes are required to sense and monitor the different health parameters of human beings, which may also differ in computation, storage capabilities and energy consumption [19].", "Along with limited energy source, WBSNs also have short Radio Frequency (RF) transmission range, poor computation capabilities, limited storage capacity, as well as low bandwidth\u2014which may keep on changing due to noise and other interferences [19].", "Efficient routing protocol development requires a proper network topology as it effects the overall performance of the communication system [19]."]} +{"53018612|55729907": ["A failure in retrieving the correct data represents amajor concern in WBANs [13].", "\u2022 Network Availability : Since such a system carries important, highly sensitive and potentially lifesaving information, it is paramount that the network is available at all the times [13]."]} +{"3411528|7988320": ["1 shows a sensor node architecture [1], [2]."]} +{"3411528|16514036": ["1 shows a sensor node architecture [1], [2].", "Architecture of WBAN communication [1]."]} +{"31188527|42497499": []} +{"31188527|7988320": ["With the growing needs in ubiquitous communications and recent advances in very-low-power wireless technologies, wireless body area networks (WBAN) has attracted lots of research interests [1\u20134]."]} +{"54462709|205286988": ["In litterature three categories of routing protocols are designed: location-based routing protcols, flat routing protocols and hierarchical routing protocols [3]."]} +{"21024924|7988320": ["The low battery sensor nodes and personal device can be directly connected to access point in order to avoid bit rate and energy challenges [3, 4].", "The fundamental conceptual differences, between WSNs and WBANs, from different aspects are enlisted in Table 1 [2] [3].", "The main aim of this protocol is to reduce the number of direct transmissions from source to sink [3].", "For keeping data of patients in healthcare system tier-3 is used [3].", "Through this gateway, data can be passed from the tier-1 to tier-3 [3]."]} +{"51963805|9280644": []} +{"51963805|16939966": ["coexistence and interference mitigation schemes are surveyed and discussed in [9]."]} +{"26840641|7876249": []} +{"26840641|17410801": ["and communicate the data wirelessly to the sink node [1, 2].", "They can\u2019t provide better performance in case of mobility [1].", "Precise requirement of WBAN impose certain constraints on the design of their routing protocol [1].", "Efficient transmission range: If the range of remitting data is less than the threshold value, choice to select a route for next sensors is reduced [1].", "Temperature aware routing protocols: Mainly designed to minimize the temperature arise due to sensors in body [1].", "Possibility of data loss is high, and therefore, WBAN requires an adaptive routing algorithm that adapts the mobility [1]."]} +{"21733518|1520906": ["Wireless sensor networks (WSNs) consist of sensor nodes with sensing and communication capabilities that have gained enormous attention for their usage in many applications, such as internet of things (IoT) [1,2]."]} +{"57760456|10067743": []} +{"22333262|7988320": ["To minimize energy consumption, the sensor nodes use a one-hop star topology to send their medical data [4]."]} +{"22333262|16514036": ["Subsequently, the LPU transmits the aggregated data to the local access points (APs), which, in turn, send them to the medical servers [1], [2]."]} +{"36017981|7988320": ["In [13], authors discuss routing layer, there is a trade-off between fast routing and energy utilization."]} +{"49230819|55729907": ["Thebase station is in charge of sending the gathered data to the sink node [3, 4].", "The WBSNs also demands the accurate topology in order to withstand several issues in the postural changes of the body, sensors heterogeneous character, constrained energy, and transmission in minimized range [3].", "For this secure aware routing, we impose of the fuzzy inference model for the secured transmission of data [3]."]} +{"49230819|10096622": ["The PSO approach follows the \u2018Fish Schooling\u2019 and \u2018Bird Flocking\u2019 characteristics [1].", "Wireless body sensor networks (WBSNs) are a subset of wireless sensor networks, which can be utilized for early recognition of the distinctive changes of sensor nodes [1, 2]."]} +{"3693407|9040432": ["Wireless Body Area Networks (WBANs) [1] form an attractive area, which have stimulated research interest and have received an increased attention from the research community."]} +{"3693407|7876249": []} +{"3693407|17410801": ["They have given an overview, performance issues of each routing protocol and a comparison through discussions\nMovassaghi and Abolhasan [3] They have classified routing protocols into: (1) temperature-based protocols, (2) cross-layer-based protocols, (3) cluster-based protocols, (4) cost-effective protocols and (5) QoS-based protocols.", "They have given an overview, performance issues of each routing protocol and a comparison through discussions Movassaghi and Abolhasan [3] They have classified routing protocols into: (1) temperature-based protocols, (2) cross-layer-based protocols, (3) cluster-based protocols, (4) cost-effective protocols and (5) QoS-based protocols."]} +{"3693407|16214623": []} +{"3693407|13295407": ["QoS research is not new, prior research has focused on managing and reserving in wireless networks [10] and ad", "[10] CDR [2] M2E2 [6] RE-ATTEMPT [7] Sandhu et al."]} +{"20802900|16335158": ["However, increased delay and more energy consumption of nodes nearer to sink are the major points of concern."]} +{"20802900|16214623": []} +{"20802900|7988320": []} +{"38067252|16939966": []} +{"38067252|42497499": ["The major issues in PHY layer are electromagnetic coupling, inbody communication, antenna design, antenna testing, matching network, base station antennas and implant materials [100, 101].", "To increase throughput for better performance of WBAN communication have to introduce self-adjustable duty cycle [101]."]} +{"38067252|7988320": ["The major issues in PHY layer are electromagnetic coupling, in-body communication, antenna design, antenna testing, matching network, base station antennas and implant materials [100, 101]."]} +{"64850755|3273576": []} +{"64850755|3499442": []} +{"64850755|9280644": []} +{"64850755|10206347": []} +{"64850755|7988320": []} +{"64850755|7854020": ["WBASN has the true potential to transform the healthcare system as it offers sophisticated but easy-to-use diagnosis of diseases and monitoring in real life.(93) According to a study in World Health Organization (WHO),(94) by the year 2050, the global population would be around 2."]} +{"64850755|16514036": ["The wireless technologies like 3G/4G, Cellular, ZigBee, wireless local area network (WLAN), and Bluetooth can be used for this tier.(34,39,66)", "The task of the sink here is to process the collected data and transmit that to Tier-2.(34,39,66) Tier-2: inter-BASN communications", "It is expected to provide a data rate of up to 1 Mbps.(34) It is a relatively better choice for WBASN applications in which less power consumption is required, which is possible using lowduty cycle operation.", "For instance, a patient could be monitored for his blood pressure or heartbeat or temperature or so during his or her daily routine works.(34) A player can be observed during a game or a soldier\u2019s health may be observed during training session or in the battlefield.", "It is expected to provide a data rate of up to 1 Mbps.34 It is a relatively better choice for WBASN applications in which less power consumption is required, which is possible using lowduty cycle operation.62\nUWB and IEEE 802.15.6\nUWB technologies have frequency allocation of 3.1\u2013 10.6 GHz and are projected to be used in WBASNs because of their capabilities like anti-multipath capabilities, large bandwidth availability, and low power consumption.143 It was developed for short range communications and was standardized by IEEE 802.15.6 Task Group 6 (TG-6).144 This technology has frequency range of 3.2448\u20134.7424 GHz in low band and 6.24\u201310.2336 GHz in high-band having 499.2 MHz channel bandwidth.145", "message that the patient\u2019s condition is getting worse (when a situation arises like this) and with the database record, necessary action could be taken before the patient reaches the hospital.(34,39) Medical environment and database are the most important components of Tier-3 as these include the medical history and profile of the user.", "The task of the sink here is to process the collected data and transmit that to Tier-2."]} +{"64850755|6539555": ["Some in-body and on-body applications are shown in Table 3.(61)", "For instance, these sensors are able to diagnose tumors without the need of biopsy.(61)"]} +{"64850755|15300368": ["If transmission occurs, that is performed within the shortest possible time and just after transmitting, the ultra-low power sleep mode is again activated.(147) Overall, it provides data rate of 1 Mb/s."]} +{"64850755|6275330": ["There is a wide range of application scenarios for both structured and unstructured WSNs.3,4 As the sensors used in these networks are pretty small in size, they are often equipped with lightweight energy source.2\u20135 In practice, sensor networks are planned to perform tasks like measurement, tracking, detection, and data classification.", "One of the notable issues that we know is that the sensors in a WBASN are supposed to be relatively smaller than those of the traditional WSNs.", "The challenges that WBASNs face are often different than those of the traditional WSNs.", "There is a wide range of application scenarios for both structured and unstructured WSNs.(3,4) As the sensors used in these networks are pretty small in size, they are often equipped with lightweight energy source."]} +{"64850755|20905429": []} +{"18584449|7876249": []} +{"18584449|17410801": ["Surveys of routing protocols for WBANS are given by [12][13]."]} +{"52880826|3499442": ["However, it results in high packet drop [29]."]} +{"52880826|10206347": ["Sensor nodes have short battery life, the optimal energy consumption is the major problem in WBANs [14,15]."]} +{"19156863|7876249": ["In [5], Bangash et al. have classified the routing protocols into five categories based on their aims into; cluster based, cross layered, postural movement based, QoS aware and temperature aware routing protocols."]} +{"19156863|3096077": ["In [6], a new survey particularly dedicated to temperature-aware routing protocols was proposed."]} +{"19156863|7988320": ["These networks allow the deployment of tiny sensor nodes, inside or outside the human body to sense data, process it, and forward it to a tiers unit to take appropriate measures accordingly [3]."]} +{"56478989|7988320": ["For example, a pacemaker or a glucose monitor would require a lifetime lasting more than \ufb01ve years [5]."]} diff --git a/edge/graph_102350656.jsonl b/edge/graph_102350656.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f55af7636e74f7cd4bfe8716ec4bfd60da061a4 --- /dev/null +++ b/edge/graph_102350656.jsonl @@ -0,0 +1,53 @@ +{"52300109|64404": ["5% bit-rate saving compared with the latest video coding standard, High Efficiency Video Coding (HEVC) [13].", "Extensive experimental results show that the proposed SR method in SR based compression can achieve about 31.5% bit-rate saving compared with the latest video coding standard, High Efficiency Video Coding (HEVC) [13].", "We can see that the proposed SR based video compression outperforms HEVC significantly in a relative large bit-rate range.", "Obviously the proposed SR method benefits the SR based video compression, which achieves over 30% bit-rate saving on average compared with HEVC.", "From Table 1, we can see that the performance of the bicubic interpolation and VDSR is poor on the HEVC compressed images, especially at low bit-rate scenario\ncorresponding to high QPs.", "1, we further show a subjective result for a video frame compressed by HEVC at QP = 44.", "Keywords: Super-resolution \u00b7 Enhancement network Compression artifact reduction \u00b7 Video coding \u00b7 HEVC Convolutional neural network", "These images and videos are downscaled by bicubic interpolation and compressed by HEVC reference software, HM 16.17, under low-delay-P configuration in both training and testing stages.", "In addition, the proposed method also shows its advantage in SR based video coding application, and significant bit-rate saving is obtained compared with HEVC.", "6, we show the rate-distortion (RD) curves of the proposed method and HEVC according to the QPs in Table 2 for video sequence Suzie.", "For the video compression application, Table 3 shows bit-rate saving compared with HEVC according to the QPs in Table 2 when applying the proposed SR method to the SR based video coding framework as shown in Fig."]} +{"3314210|64404": ["HEVC (high efficient video coding [1], the state-of-the-art video coding standard, has supported up to 8K resolution (8K UHD) video."]} +{"3314210|3540699": ["264/AVC [2], there is still a great challenge for further improving the coding efficiency in practical applications of video storage and transmission."]} +{"4133056|64404": []} +{"13743007|64404": ["Lossy image/video codecs, such as JPEG and High Ef\ufb01-ciency Video Coding (HEVC) [12], give a profound impact on image/video compression.", "\u2026factors and our learning-based video compression framework is in its infancy stage to compete with latest H.265/HEVC video coding technologies [12], it still shows great improvement over the \ufb01rst successful video codec MPEG-2 and has enormous potential in the following aspects: \u2022 We provide a\u2026"]} +{"13743007|3540699": ["2) [45] and H.264 (JM 19.0) [46] in our experiments."]} +{"51715172|750942": ["To further improve the coding efficiency, the standard of 3D extensions of High Efficiency Video Coding (3D HEVC) [1] has been issued [4], [5] for joint texture and depth encoding."]} +{"70210035|19645724": ["Tremendous attentions have been focused on convolutional neural network (CNN) based approaches for spatial and angular super-resolution (SR) of LF-4D [3], [9]\u2013[11], which inspire us to investigate the synthesis and compression approach of LF content from the learning perspective.", "Recently, learning based algorithms for LF image processing and compression have achieved promising results [3], [6]\u2013[8].", "DL based approaches have also achieved signi\ufb01cant advances in LF image processing, such as CNN based view synthesis [7], LF reconstruction [3], LF super-resolution [44], LF video caption [6], depth estimation [45]."]} +{"10945521|30747069": ["In [15] high-level syntax and reference picture management in HEVC are described."]} +{"10945521|64404": ["In [10], an overview of the HEVC standard is given."]} +{"206661528|3540699": ["264/AVC, intra coding is based on spatial extrapolation of samples from previously decoded image blocks, followed by discrete cosine transform (DCT)-based transform coding [2].", "264/AVC process as they were rarely available in the traditional macroblock-based coding structure [2], but the hierarchical HEVC coding architecture makes these candidates available more frequently."]} +{"8001944|14545307": ["Instead of output levels, vector quantization (VQ) employs a set of representation vectors (for the one-dimensional case) or matrices (for the two-dimensional case) [17], [18], [19], [20], [12]."]} +{"52188127|64404": ["T i u,v = F i 3 , i \u2208 [1, 128], u, v \u2208 [1, 16] (3)", "High Efficiency Video Coding (HEVC), which is finalized by experts from the Joint Collaborative Team on Video Coding, is the state-of-the-art video coding standard [1].", "Fusionu,v = T i u,v \u00d7 (C2) i u,v, i \u2208 [1, 128], u, v \u2208 [1, 16] (4) Another interpretation of the fusion operation is a piecewise linear modeling of the correlation between the luma and chroma components in the embedded feature space.", "In HEVC, intra prediction operates according to the transform block (TB) size [1]."]} +{"52188127|3540699": ["264 [2], HEVC achieves approximately the same subjective quality with around 50%"]} +{"52186957|64404": ["The existing fractional-pixel interpolation filters can be divided into three categories: fixed interpolation filter [1, 2, 3, 4], adaptive interpolation filter [5, 6] and learning-based interpolation filter [7].", "In the latest video coding standard HEVC, the DCTbased interpolation filter (DCTIF) is adopted [3]."]} +{"52186957|3540699": ["The existing fractional-pixel interpolation filters can be divided into three categories: fixed interpolation filter [1, 2, 3, 4], adaptive interpolation filter [5, 6] and learning-based interpolation filter [7].", ") adopted to perform half-pel interpolation and the simple average filter is used for quarter-pel interpolation for luma component [2]."]} +{"73422882|64404": ["The advanced deblocking filter is then designed in HEVC [4], [5], which is able to accommodate the quad-tree block partition process.", "However, the block-based prediction and quantization [1], [2], [4] in these existing compression framework will introduce the discontinuities along the block boundary, error information around texture contour, as well as the loss of high frequency details, which correspond to the blocking, ringing and blurring artifacts, respectively.", "264/AVC [2], AVS2 [3] and High Efficiency Video Coding (HEVC) [4]."]} +{"73422882|3540699": ["However, the block-based prediction and quantization [1], [2], [4] in these existing compression framework will introduce the discontinuities along the block boundary, error information around texture contour, as well as the loss of high frequency details, which correspond to the blocking, ringing and blurring artifacts, respectively.", "264/AVC [2], AVS2 [3] and High Efficiency Video Coding (HEVC) [4]."]} +{"64404|14889616": ["A luma CTB covers a rectangular picture area of L\u00d7L samples of the luma component and the corresponding chroma CTBs cover each L/2\u00d7L/2 samples of each of the two chroma components."]} +{"64404|3540699": ["It is, rather, a plurality of smaller improvements that add up to the significant gain."]} +{"3808664|64404": ["Those new units makes the picture partition of HEVC is more flexible and precise than H.264/AVC.", "Index Terms\u2014 HEVC, intra coding mode, fast PU mode decision, CNN, corner detection", "Secondly, the number of prediction modes employed by HEVC has been increase up to 35, including DC mode, Planar mode and 33 kinds of angular\nThis work is funded by National Science and Technology Major Project (2016YFB0200505), Projects of International Cooperation and Exchanges NSFC (61325003).\nmodes.", "To improve the accuracy of signal prediction, HEVC introduced more complex prediction algorithms than H.264/AVC in intra coding.", "As compared with H.264/AVC (the previous generation standard), HEVC reduced 50% bit-rate with the same subjective picture quality, especially on the video of high-definition specification.", "In this paper, we propose the algorithm of fast PU mode decision to the intra coding mode of HEVC.", "Firstly, HEVC introduces a new set of units for the splitting of pictures, which including coding unit(CU), prediction unit(PU) and transform unit(TU).", "in where, Ii,j is the entry in matrix I with i, j \u2208 [1, 3].", "Namely, the high compression efficiency of HEVC is achieved at the cost of the high computational complexity[3].", "High Efficiency Video Coding (HEVC)[1], the latest video coding standard, was jointly introduced by International Telecommunications Union (ITU-T) and International Standardization Organization (ISO/IEC) in 2013.", "The proposed algorithm is compared with the HEVC test model reference software HM-15.", "In contrast, H.264/AVC is just equipped with 9 kinds of modes for 4\u00d74 and 8\u00d78 blocks, and 4 modes for 16\u00d716 blocks[2]. experiments revealed that the encoding complexity of HEVC is about 5 times of H.264/AVC\u2019s."]} +{"3473219|64404": ["H IGH Efficiency Video Coding (HEVC) [1], which is the latest video coding standard jointly developed by ITUT Video Coding Experts Group (VCEG) and Moving Picture Experts Group (MPEG), was claimed to achieve potentially more than 50% coding gain compared to H.", "As the variance of compression noise, \u03c3n , is derived at the encoder side, we quantize it into the nearest integer range in [1,16], which are signalled with 4 bits and transmitted in the bitstream."]} +{"3709299|3540699": ["264/AVC [13] that is realized using the popular x264 [14]."]} +{"3940958|64404": []} +{"3940958|3540699": ["[31], H.264/AVC [39] and HEVC [33].", "When transmitting video over the bandwidth-limited Internet, video compression has to be applied to signi\ufb01cantly save the coding bit-rate [31, 39, 33, 26].", "We compress these sequences using various video coding standards, including MPEG-1 [11], MPEG-2 [30], MPEG-4 We compress these sequences using various video coding standards, including MPEG-1 [11], MPEG-2 [30], MPEG-4 [31], H.264/AVC [39] and HEVC [33]."]} +{"17483629|3540699": ["However, the encoding complexity inevitably increases in any case [11].", "264 video encoder include the ME with fractional motion vector (MV) precision and the R-D optimized coding mode decision with variable blocksize ME [11]\u2013[16].", "tistics [11], [12], the complexity increases in direct proportion to the number of modes actually being searched, while the R-D performance gain saturates for only few modes."]} +{"3691031|64404": ["Block-based motion compensated prediction (MCP) is one of the key technologies in a series of video coding standards, including the latest one - High Efficiency Video Coding (HEVC) [1]."]} +{"70006821|64404": ["signal the selected mode to decoder [30].", "First, DCTIF is already adopted in HEVC for fractional pixel interpolation for motion compensation [30], so there is no added issue of implementation.", "One PU can reuse the motion information of its neighboring PUs, which is known as merge [30]."]} +{"3500318|64404": ["2581618 Video Coding (HEVC) [2], because it can exploit the"]} +{"3500318|3540699": ["Advanced Video Coding (AVC) [1] and High Efficiency", "I. INTRODUCTION\nBLOCK-BASED transforms have been widely used inmost popular video coding standards, e.g., H.264/ Advanced Video Coding (AVC) [1] and High Efficiency\nManuscript received October 11, 2015; revised January 14, 2016 and April 16, 2016; accepted June 11, 2016.", "The first in-loop filter adopted into video coding standards is deblocking filter (DF) [4] in H.264/AVC, which applies a set of low-pass filters to 4 \u00d7 4 block boundaries adaptively based on the characteristics of reconstructed samples on both sides of block boundaries, and coding information, such as prediction modes and motion vectors."]} +{"3691204|64404": []} +{"3691204|3540699": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"2763129|64404": []} +{"206726067|64404": ["Manuscript received December 27, 2015; revised June 5, 2016 and July 17, 2016; accepted August 8, 2016."]} +{"52189827|64404": ["As the state-of-the-art video coding standard, High Efficiency Video Coding (HEVC)[1][2] adopts block based hybrid video coding framework, including block based intra/inter prediction and transform."]} +{"12496199|64404": []} +{"146811808|64404": ["Hierarchical B coding structure in HEVC [1], [2].", "As the successor of previous video coding standards, High Efficiency Video Coding (HEVC) [1] [2]"]} +{"57358564|64404": []} +{"57358564|3540699": ["H.264/AVC adopts a 6-tap \ufb01nite impulse response \ufb01lter for half-pixel interpolation and additionally adopts simple linear interpolation for quarter-pixel interpolation [1]."]} +{"3684930|64404": ["265/HEVC [1], outperforms its predecessor H."]} +{"3684930|3540699": ["The High Ef\ufb01ciency Video Coding standard, known as H.265/HEVC [1], outperforms its predecessor H.264/AVC [2] by about 50% in compression ef\ufb01ciency.", "Although CABAC incurs higher computational complexity, its compression ef\ufb01ciency is shown to outperform CAVLC by 5%\u201315% [2]."]} +{"69636587|64404": ["264/AVC [1] and HEVC [2], performs motion-compensation from two reference frame lists.", "Finally, the CNN based bi-prediction is implemented into the HEVC codec for better coding performance.", "There are two typical ways for conveying the motion information in HEVC, including merge and advanced motion vector prediction (AMVP).", "Moreover, we can achieve signi\ufb01cant bitrate savings for the sequence BQSquare , and the reason lies in the fact that the prediction is not accurate enough for this sequence, such that large prediction errors are generated in the original HEVC coding.", "B I-PREDICTION, which serves as an indispensable module in the state-of-the-art video coding standards such as H.264/AVC [1] and HEVC [2], performs motion-compensation from two reference frame lists.", "In order to balance the consumed resource and the performance, we further investigate the trade-off between them to obtain more insights in the network design with the bi-prediction blocks sampled in the HEVC testing sequences.", "Although the coding blocks have various sizes as well as symmetric and asymmetric partitions in HEVC, the statistics of these PUs in Fig.", "To obtain the optimal prediction blocks in terms of rate-distortion performance, the training data are derived from the decoder of HEVC reference software (HM-16 .", "Owning to the powerful representation capability of deep neural network, the end-to-end synthesis process is integrated into the HEVC encoder and decoder."]} +{"69636587|3540699": ["B I-PREDICTION, which serves as an indispensable module in the state-of-the-art video coding standards such as H.264/AVC [1] and HEVC [2], performs motion-compensation from two reference frame lists."]} +{"5569608|64404": ["Lossy image and video compression algorithms, such as JPEG [16] and High Efficiency Video Coding (HEVC) [13], by nature cause distortion and yield artifacts especially at low bit-rates."]} +{"54554425|64404": ["Regarding video coding for compressing the visual content, we follow the latest high-ef\ufb01ciency video coding (HEVC) framework [30], which is designed based on the hybrid prediction-transform coding scheme.", "In the HEVC standard [30], a video frame can be partitioned into quad-tree blocks to increase the \ufb02exibility [35].", "Regarding entropy coding, we utilize the context-based adaptive binary arithmetic coding (CABAC) algorithm [37], which has been adopted in HEVC [30]."]} +{"53086651|64404": ["In the existing video coding standards, such as High Efficiency Video Coding (HEVC) [1], motion compensation is usually performed at block level."]} +{"4789479|64404": ["Currently, the state-of-the-art image coding solution is High Efficiency Video Coding (HEVC) [1] still picture profile, published by Joint Collaborative Team on Video Coding (JCT-VC)."]} +{"18982369|64404": ["HEVC intra coding, one of which can be selected for each block [2].", "We adopt DCTIF in addition to our proposed CNN-based up-sampling, because DCTIF is already adopted in HEVC for fractional pixel interpolation for motion compensation [2], and it is computationally simple but achieves good quality for smooth image regions.", "The state-of-the-art video coding standard, High Efficiency Video Coding (HEVC), supports up to 8K resolution [2]."]} +{"27158933|3540699": ["Encode the flags f associated to all the frame blocks with the CABAC codec [1] and add their rate to the rate associated to both the ALF and ABLF filtering parameters, to obtain R 9."]} +{"53045691|64404": ["265 [16], which is designed based on the hybrid prediction-transform coding framework."]} +{"69565125|64404": []} +{"21692525|64404": ["In loop filtering, Park et al. [7] propose to use CNN as in-loop filter to replace DF and SAO in HEVC and reports bit-rate reduction besides objective quality enhancement.", "For example, the recent standardized HEVC [1], employs sample adaptive offset (SAO) and deblocking filter (DF)."]} diff --git a/edge/graph_102350779.jsonl b/edge/graph_102350779.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..973c40134fbc33fb6d0c7a3bad5d4b36ab457e96 --- /dev/null +++ b/edge/graph_102350779.jsonl @@ -0,0 +1,12 @@ +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"46942855|49527603": ["Due to the fact that private blockchains can no longer be decentralized [48], some blockchain experts do not consider it as a \u201cproper blockchain\u201d, but still, as a type of distributed ledger technology (DLT) [28]."]} +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} +{"11114124|31333609": []} +{"13225686|2294541": [", the vulnerability of reputation systems to sybil attacks has been widely studied [29]."]} diff --git a/edge/graph_102350801.jsonl b/edge/graph_102350801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8997654f5611da2ec692be90325b19f42c4ad40d --- /dev/null +++ b/edge/graph_102350801.jsonl @@ -0,0 +1,7 @@ +{"4074990|17370399": []} +{"13959787|17652653": ["Our work is also closely-related to a problem of paraphrase generation (Madnani and Dorr, 2010; Dong et al., 2017), including methods relying on (phrase-based) back-translation (Ganitkevitch et al.", "Our work is also closely-related to a problem of paraphrase generation (Madnani and Dorr, 2010; Dong et al., 2017), including methods relying on (phrase-based) back-translation (Ganitkevitch et al., 2011; Ganitkevitch and Callison-Burch, 2014)."]} +{"2147973|16534280": ["Information Retrieval researchers recognise that techniques to answer questions from document-sets have wide applications, beyond education; see for example the overview of question-answering in restricted domains (Molla and Vicedo, 2007)."]} +{"17195938|7065220": []} +{"186258485|17370399": []} +{"64731469|17370399": []} +{"5047076|13484515": ["The chatbot discussed by Uthus and Aka [65] can self-select a turn to introduce new topics, but it does not preserve the sequential coherence, because it does not consider the topic being discussed.", "As in a text-based interaction, we do not have \u201csimultaneous talk;\u201d rather, we analyze overlap by looking at entangled messages, which are distant from their response by more than one proposition [29,65].", "Indeed, the literature of human-human and computer-mediated conversations have shown that two-and multi-party interactions have different characteristics [23,25,65].", "Current chatbots are not prepared to self-select turns, and only interact when a turn is explicitly assigned to them [65].", "Uthus and Aha [65] underscored the necessity of developing chatbots capable of participating actively in a chat.", "Besides, the literature on human-to-human interaction has discussed differences between two-and multi-party interactions [23,25,29,65].", "Uthus and Aka [65], on the other hand, propose a chatbot that self-select a turn to introduce a topic from external sources, but this chatbot does not consider the topic being discussed."]} diff --git a/edge/graph_102350916.jsonl b/edge/graph_102350916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..893f2ffa169198604dea00002f4e5b017594fdc7 --- /dev/null +++ b/edge/graph_102350916.jsonl @@ -0,0 +1,4 @@ +{"206744664|393948": ["DNNs have strong ability to learn complex functions from data, being well known for extracting high-level features from low-level raw data, such as images and audios [13].", "Being a germ of representation learning [13], [14], FISM provides state-of-the-art recommendation accuracy and is well suited for online rec-"]} +{"52166626|9340872": []} +{"52166626|10137425": [", 2015), see Baltru\u0161aitis et al. (2018) for an overview.", "\u2022 Multi-modality Multi-modal information has proven useful in many tasks (Baroni, 2016; Baltru\u0161aitis et al., 2018), yet the question of multi-modal fusion remains an open problem."]} +{"59606205|3342225": ["Interestingly, attention could provide a key to interpret and explain, at least to some extent, neural network behaviour (Guidotti, Monreale, Ruggieri, Turini, Giannotti, & Pedreschi, 2018)."]} diff --git a/edge/graph_102351047.jsonl b/edge/graph_102351047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe6e71bc7c20c24caa0005a50d7b82084a3a5107 --- /dev/null +++ b/edge/graph_102351047.jsonl @@ -0,0 +1,10 @@ +{"2894704|17292349": ["ality of L^ deterministically, i.e., the predicates 2L and 2L^ are binary rather than probabilistic. Blackbox fuzzing. Numerous approaches to automated test generation have been proposed; we refer to [2] for a survey. Approaches to fuzzing (i.e., random test case generation) broadly fall into two categories: whitebox (i.e., statically inspect the program to guide test generation) and blackbox (i.e., "]} +{"4587548|7165993": ["eneral, there exists no mechanism that can accurately decide whether or not the program behavior for an input is correct\u2014whether an observed behavior is a bug or a feature of the program. Barr et al. [3] provide an excellent survey of recent advances in tackling the oracle problem. 9.3 Integrating Other Models Into STADS The STADS framework provides opportunities to explore other topics, models, and "]} +{"14161008|17292349": ["Georgiev et al. focus primarily on the incorrect validation\nof hostnames in server certificates at a different level in the software stack\u2014in applications, transport libraries, and Webservices middleware.", "The focus of this paper is on server certificate authentication, which is the most common usage pattern for SSL certificates."]} +{"49862566|206584087": ["Subsequent work on detecting and preventing DoS attacks [9, 25, 64] has typically focused on measuring aggregate resource exhaustion and does not specifically identify input characteristics that exploit worst-case algorithmic complexity."]} +{"33909610|816774": []} +{"17292349|14920988": []} +{"17292349|14022070": []} +{"15232519|17292349": ["For further work, we refer readers to representative surveys [1], [39], [46], [18].", "Adaptive random testing (ART) [8], [1] improves the defect detection effectiveness of random testing by evenly spreading test input selection across the input domain.", "However, it has also been shown that ART has a high computational overhead [2], [45], and has dif\ufb01culties in testing large SUTs that require complex inputs [1]."]} +{"15232519|14920988": ["For further work, we refer readers to representative surveys [1], [39], [46], [18]."]} +{"1285033|14171067": ["We compare derived trees and real trees by calculating their tree edit distance [7].", "According to [7], a tree t1 is included in a tree t2 if and only if t1 can be obtained by deleting nodes from t2."]} diff --git a/edge/graph_102352525.jsonl b/edge/graph_102352525.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc71c8b9a70829bf56c0c7384dc897fc928287c1 --- /dev/null +++ b/edge/graph_102352525.jsonl @@ -0,0 +1,33 @@ +{"6578368|2301292": ["Researchers are already beginning to use 3D sensors and models to improve facial feature tracking and expression recognition [29, 34, 21, 25, 20, 33, 32]."]} +{"19603871|393948": ["Moreover, these descriptors usually take a tedious tune-up procedure, which burdens the extraction and organization of the discriminative information from 3-D meshes when constructing classifiers or other predictors [6]."]} +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"41271490|987239": ["The advancement of modeling, digitizing, and visualizing techniques for 3D models has led to an increasing amount of 3D models in the fields of multimedia, graphics, virtual reality, amusement, design, and manufacturing [1].", "Reviewing the implementations of these techniques, we can find that feature-based methods play an important role and some details could be found in an early work [1] and the latest works [3,4]."]} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} +{"7673899|987239": ["Comprehensive and excellent reviews on descriptor and shape retrieval can be found in an early work [1] and latest work [3]."]} +{"1045322|393948": []} +{"16387148|4351505": []} +{"16387148|9928823": ["Deep Belief Networks (DBNs) are probabilistic generative models consisting of multiple layers of stochastic hidden variables [Deng 2014].", "In Deng [2014], several DL techniques were presented and a categorization of them into three classes, namely, discriminative, generative, and hybrid, was provided.", "These methods can be divided into two general categories based on how they are used [Deng 2014]: (1) discriminative and (2) generative.", "Recently, a few review papers have also become available [Deng 2014; LeCun et al. 2015; Guo et al. 2016b; Schmidhuber 2015]."]} +{"16387148|13946824": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"16387148|987239": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"26760958|987239": []} +{"18238681|41505326": []} +{"18238681|18889901": ["We are more comprehensive than earlier efforts, describing 101 datasets compared with the 14 in [9], 19 in [42]1 and the 44 action datasets in [115]."]} +{"3943864|987239": ["We refer the readers to [34, 13] for a comprehensive survey of 3D shape retrieval."]} +{"14343656|987239": ["Features Global shape descriptors, such as statistics of shapes [21] and distance functions [15], have been used for 3D shape retrieval [25]."]} +{"121199517|2301292": ["A number of 2D facial expression databases have become available (e.g., [1] [2] [7] [8] [16]), as well as some with 3D imaging data (e.g., [9] [14] [15] [24] [25] [45])."]} +{"1281757|393948": ["However, training the parameters in a deep neural network is a challenging task because it largely relies on the parameters across layers [4].", "Therefore, our goal is to find features that represent the 3D objects discriminatively [4]."]} +{"17424196|18889901": ["A survey on the existing RGB-D datasets can also be found in [3]."]} +{"17424196|8983048": ["A review on automatic correspondence is given in [20], a survey and evaluation on range image registration methods in presented in [25]."]} +{"17424196|16620699": []} +{"17424196|987239": ["Two surveys on 3D model retrieval methods can be found in [27] and [6].", "A 3D model retrieval system usually consists of a database with an index structure and an online query engine [27].", "A large number of algorithms have been proposed to address different technological aspects of these applications [1], [16], [5], [27], [7]."]} +{"17424196|6681074": ["A large number of algorithms have been proposed to address different technological aspects of these applications [1], [16], [5], [27], [7].", "methods can be found in [7], [19], [21], [9]."]} +{"18058033|987239": ["There is a host of literature on reasoning about 3D object shapes [1], [2]."]} +{"3454433|987239": ["An overview of the field can be found in review papers like [1, 2, 3] or by looking at the various editions of the SHREC 3D retrieval contest [4]."]} +{"17991374|1482463": ["And a very recent comprehensive study([19]) on rigid and non-rigid registration includes related point features, saliency, and correspondence."]} +{"17991374|987239": ["Previous surveys address global 3D shape retrieval[1,5-11], shape recognition([12]), shape correspondences([13]), non-rigid shape analysis([14]), shape segmentation[15-16], shape deformation([17]), and symmetry in 3D geometry([18]).", "Tangelder and Veltkamp([6]) surveyed many global descriptors in detail.", "Tangelder and Veltkamp[6] surveyed many global descriptors in detail.", "It differs from traditional global shape retrieval mentioned in [1, 5-11], because the precondition of traditional global retrieval is that two shapes should have semantic affinity whereas whole-to-whole retrieval based on partial similarity does not care whether two shapes are globally similar."]} +{"17991374|14208903": ["How to reuse these existent models is a challenging issue."]} +{"23229626|5671282": ["Hashing is a powerful technique for nearest neighbor search with hamming distance computation [6]\u2013[8], because bit-wise XOR operation is performed to calculate the individual similarity, which is advantageous for improving computational efficiency."]} +{"23229626|15093118": ["OVER the past decade, there has been significant research effort dedicated to the development of intelligent driver assistance systems and autonomous vehicles, which is intended to enhance safety by monitoring the on-road environment [1]."]} +{"23229626|393948": ["Recent revolution in deep learning [23] shows the impressive feature representation power of Convolutional Neural Network (CNN) [24]\u2013[26], which has been demonstrated by the progress in many visual tasks, such as image classification [24], [27], [28], object detection [29], face recognition [30] and so on [31], [32]."]} +{"9117881|987239": []} +{"33639583|987239": ["The latter, along with the explosion of the World Wide Web (WWW), has lead to research in the area of 3D content-based search and retrieval (Iyer et al. 2005; Tangelder and Veltkamp 2004; Bustos et al. 2007) using as query text, sketch and/or 3D object(s)."]} diff --git a/edge/graph_102352575.jsonl b/edge/graph_102352575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68ebd45c6abdf7d86794c56647a290107798ae5d --- /dev/null +++ b/edge/graph_102352575.jsonl @@ -0,0 +1,9 @@ +{"4697809|206583943": ["Today, a growing fraction of mobile and home users rely on IPv6 to access web-based services [12, 13, 64] and some mobile providers have deployed IPv6-only networks."]} +{"4697809|10559330": ["Integrated Services [7] was proposed as an architecture to add resource reservations for end-to-end flows."]} +{"4697809|4269723": ["Several survey papers have analyzed this vast literature in details [17, 35, 65]."]} +{"57572916|102352575": ["A comprehensive survey on Segment Routing can be found in [17]"]} +{"58559676|2623404": ["The SDN controller does not need to add extra forwarding rules to each individual switch along a path [9]."]} +{"67867721|13372398": []} +{"67867721|4269723": ["operational expenses through ease of configuration [4].", "nology is radically transforming the network architecture of data centers, network overlays, and carrier networks to overcome most of the aforementioned limitations of the traditional network architectures [2]\u2013[4]."]} +{"8128439|206576469": ["The Transmission Control Protocol (TCP) plays a central role in the performance of many latency-sensitive applications [4], [5].", "These financial applications are only one example among a long list of applications [4], [5] that require both low latency and reliable delivery."]} +{"15968790|15064932": ["Dynamic restoration is a well investigated topic in both optical and multi-layer (e.g., IP over WDM) networks [9,10]."]} diff --git a/edge/graph_102352657.jsonl b/edge/graph_102352657.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e501836c306a297ef99ea94089d3220a9229c033 --- /dev/null +++ b/edge/graph_102352657.jsonl @@ -0,0 +1,5 @@ +{"13688847|49527603": ["In [20], a brief summary of the emerging blockchain-based applications ranging from finance to IoTs is provided."]} +{"13688847|9461213": ["With more and more demands for big-data processing in various fields [226], [227], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secured Multi-Party Computation (MPC)."]} +{"13688847|27262729": [", Sybil attacks [47] and double-spending attacks [21]), node mistakes (e.", "Further, a systematic survey is provided in [21] with respect to the security issues in Bitcoin networks including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", ", fork, in the local views of the blockchain state [3], [21] (see Figure 4)."]} +{"13688847|2457428": ["Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]."]} +{"13688847|3434731": ["In [6], [15], two brief surveys on consensus protocols in blockchain networks are provided.", "backbone of the emerging open-access, distributed Virtual Machines (VMs) [5] for decentralized, token-driven resource management in communication networks and distributed autonomous systems [6], [7]."]} diff --git a/edge/graph_102354172.jsonl b/edge/graph_102354172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bba77a021aee8b1ba9e408c0273af6f5776345ff --- /dev/null +++ b/edge/graph_102354172.jsonl @@ -0,0 +1,12 @@ +{"33610711|18190006": ["\u2026information systems research of examining the research literature itself to better understand the \u201cstate of play\u201d of research in the field, and to discern patterns in the development of the field [Culnan and Swanson, 1986; Alavi and Carlson, 1992; Banker and Kauffman, 2004; Wareham et al., 2005].", "RESEARCH METHOD There is an established tradition in information systems research of examining the research literature itself to better understand the \u201cstate of play\u201d of research in the field, and to discern patterns in the development of the field [Culnan and Swanson, 1986; Alavi and Carlson, 1992; Banker and Kauffman, 2004; Wareham et al., 2005]."]} +{"74510|7257659": ["Understanding, modeling, and evaluation of situational awareness tasks, in particular the understanding of the behavior and intent of agents surrounding a vehicle, is an essential component in the development of such systems [3, 4, 5, 6]."]} +{"74510|1029120": []} +{"65150490|1229096": []} +{"65150490|15093118": []} +{"38809083|912956": ["Using this definition, analytical methods have been provided to guarantee system timeliness using the utilization-based and/or responsetime-based analyses [6]."]} +{"1365948|15093118": ["Learning processes such as neural networks and boosted classifiers [12] have a large computational cost and memory footprint but real-time detection and classification becomes feasible given a properly trained classifier.", "Supervised machine learning for object detectors based on image appearance has shown promising results [12]."]} +{"19578678|15333444": ["The described problem can be traced to a Learning from Demonstration (LfD) problem ([1], [2]), which is a special kind of supervised learning in which the key idea is to observe reference behaviors from humans (or animals) to derive specifications for automating tasks."]} +{"19578678|17292349": ["Test models in software testing, which are reflected by the Testing and Test Control Notation 3 (TTCN-3) as well as by the notion of model based testing [4], depend on time discrete models, which allow reactions of the test environment based"]} +{"12872292|1932843": []} +{"12872292|15929566": []} +{"12872292|1708582": []} diff --git a/graph_1155669.jsonl b/edge/graph_102354461.jsonl similarity index 100% rename from graph_1155669.jsonl rename to edge/graph_102354461.jsonl diff --git a/edge/graph_10235514.jsonl b/edge/graph_10235514.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37e5321c682cadf80bdc9328895223daab689f04 --- /dev/null +++ b/edge/graph_10235514.jsonl @@ -0,0 +1,25 @@ +{"18366580|875676": []} +{"14201229|18148591": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"10322189|15453366": ["A number of open issues and technical challenges have yet to be fully addressed at 60 GHz, and they can be generally classified into the following categories: channel propagation, antenna technologies, RF solutions, and modulation schemes [13], [24]\u2013[27].", "presented an overview of 60 GHz technologies and their potential to provide next generation multi-gigabit wireless communications, along with a series of technical challenges to resolve before large-scale deployments can occur [24]."]} +{"10596988|25929315": ["The random access (RA) procedure [14] is performed by a device in several cases; for example, upon initial network access, in idle mode, during handover, and for connection re-establishment after a radio link failure."]} +{"1182433|15453366": ["However, up to now, some of the 60 GHz worldwide regulations limit the emitted power at power amplifier output to 10 dBm and equivalent isotropic radiated power (EIRP) to 40 dBm [7]."]} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"3180691|13074005": ["Reproduced from [48] with permission.", "[48], [53].", "\u2026SM has recently established itself as a promising transmission concept, which belongs to the single-RF [36] large-scale [41] MIMO wireless systems family, while exploiting the multiple antennas in a novel fashion compared to state-of-the-art high-complexity and power-hungry classic MIMOs [48].", "We conclude this glimpse into the history of SM\u2013 MIMO by mentioning that the first (and only available) survey papers on the SM concept were published in December 2011 and in mid 2012 in [48] and [92], respectively.", "Briefly, this implies that the channel impulse responses of the transmit-to-receive links are sufficiently different from each other [48].", "In SM\u2013MIMO research, this third dimension is termed the \u2018\u2018spatial-constellation diagram\u2019\u2019 [48]."]} +{"3180691|7686677": ["This allows the BSs to turn off the related RF chains with filters and mixers, which saves additional power.", "New infrastructure elements, such as femto/pico BSs, fixed/mobile relays, cognitive radios, unlicensed millimeter-wave radios, and distributed antennas are being deployed, thus making future cellular systems more heterogeneous [293].", "So far, only the baseline point-to-point single-cell cellular network has been studied, where the effect of other-cell interference is neglected and the characteristics of different types of BSs are not taken into account.", "However, in practice, MIMO systems need a multiplicity of associated circuits, such as power amplifiers, RF chains, mixers, synthesizers, filters, etc., which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "For example, the typical RF coaxial cables used in current tower-mounted BSs are more than four centimeters in diameter [42].", "The rationale behind the multi-RF to single-RF paradigm shift in MIMO design originates from the consideration that large numbers of TAs (radiating elements) may be accommodated at the BSs (large-scale MIMO design) [41], [42], especially in the emerging millimeter-wave band [43]\u2013[46], bearing in mind that the complexity and power consumption/dissipation of MIMO communications are mainly determined by the number of simultaneously active TAs, i.e., by the number of active RF chains [40], [47].", "more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "BSs with a variable number of TAs .", "Under the so-called SOTA-2010 power consumption model [31], [32], the EE of various types of BSs (macro, micro, pico, and femto) is investigated by comparing SM to conventional MIMO communications.", "The main idea is to enable the BSs to use only a subset of the available TAs in order to reduce the power consumption.", "Raising dilemmas, such as using a few BSs in combination with large-scale MIMOs, using many small cells illuminated by low-power BSs having a few TA elements each, or whether to combine large-scale MIMOs and small-cell networks, have to be addressed.", "Limiting the number of active RF chains for the sake of reducing the power consumption of BSs has been actively discussed within 3GPP standardization bodies.", ", which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "This finding is important because it brings to our attention that constant-envelope modulation may be a suitable choice for SM\u2013MIMO communications since it may offer an improved power efficiency and a reduced complexity, while mitigating the linearity requirements of the power amplifiers [5], without any performance degradation compared to amplitude modulation schemes.", "The cellular network of the future will be: heterogeneous and characterized by a small-cell infrastructure relying on inexpensive and low-power BSs (femtocells) in order to achieve high data rates [3], [8]; green, by evolving from a throughput-optimized scenario toward throughput-and energy-optimized networks [5], [16], [18]; interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Large-scale MIMO is an emerging technology, where BSs with hundreds of antennas serve a few mobile terminals per channel use [41].", "While each BS connected to the electrical grid may cost approximately $3000 per year to operate, off-grid BSs operating in remote areas generally run on diesel power generators and may cost ten times more [5].", "Compared to baseline single-antenna transmissions, MIMO communications obtain higher data rates and improved error performance at the cost of: \u2022 increasing the signal processing complexity at the receiver, which is caused by the need for counteracting the interference imposed by simultaneously transmitting many data streams; \u2022 more stringent synchronization requirements among the TAs to exploit the benefits of spacetime-coded and multiuser MIMO transmissions; \u2022 multiple RF chains at the transmitter to be able to simultaneously transmit many data streams, which do not scale with Moore\u2019s law and make the transmitter bulky [36]; \u2022 independent power amplifiers for each RF chain, which dissipate the majority of the power consumed at the transmitter, since they are power inefficient due to the stringent linearity requirements of state-of-the-art phase/amplitude modulations [5].", "The reduced linearity requirements of constant-envelope modulation increase the efficiency of power amplifiers, which, in turn, reduce the total power consumption of the transmitters [5].", "\u2022 green, by evolving from a throughput-optimized scenario toward throughput- and energy-optimized networks [5], [16], [18]; \u2022 interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; \u2022 characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; \u2022 relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Consider a relaying-aided MIMO system for application in the downlink of cellular networks relying on fixed RSs, where both BSs and RSs are equipped with multiple antennas [259].", "Furthermore, the employment of low-power BSs has the beneficial effect of reducing the transmission distance between mobile terminals and access points, which results in performance improvements.", "In addition, unlike macro BSs that are usually heavily loaded most of time, the femto BSs are expected to be lightly loaded, which leads to further reduction of the power consumption since they will not be transmitting all the time, hence facilitating sleep-mode-based operation.", "More explicitly, recent studies have clearly shown that the EE gain of MIMO communications increases with the number of antennas, provided that only the transmit power of the BSs is taken into account and their circuit power dissipation is neglected.", "Currently, there are more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "On the other hand, the EE gain of MIMO communications remains modest and decreases with the number of active TAs, if realistic power consumption models are considered for the BSs [33]."]} +{"3180691|12060835": ["An option that is currently gaining momentum in green networking is RF energy harvesting, which can provide additional energy supply for wireless devices [297]."]} +{"13333529|10979806": ["The use of switches at mmWave and massive MIMO has been motivated by the work in [29]\u2013[31]."]} +{"13333529|8323234": ["HYBRID analog/digital architectures are efficient transceivers for millimeter wave (mmWave) systems [1]\u2013[6].", "As mmWave systems will employ large antenna arrays [5], [6], and mmWave channels are expected to be sparse [14], [26], the number of channel paths will likely be less than the number of antennas, i."]} +{"206454765|8909218": []} +{"29005198|19938676": ["In a nutshell, 5G wireless access will consist of an evolution of LTE complemented with new radio technologies and architecture designs [10]."]} +{"29005198|2623404": ["The recent trends of network function virtualization (NFV) (providing abstraction [31]) and software defined networking (SDN) (providing flexibility [32]) are critical in shaping such an envisioned architecture."]} +{"60595118|875676": ["Extra tolerance to time-frequency misalignment [4, 5].", "To this end, the air interface, especially the underlying waveform, should be revisited [4, 5].", "Among all the 5G waveform candidates [4, 5], to the authors at least, f-OFDM appears as the most promising one, in terms of the overall performance, the associated complexity, and the cost and smoothness on the evolution path from 4G LTE."]} +{"537110|8836911": ["in the multi-radio multi-channel MAC are surveyed, and a classification of control separation techniques is provided in [16]."]} +{"3013154|3054454": ["It is worth mentioning that previous published work used intra-cluster subpaths to successfully model the indoor multipath channel [86], [87], [89]."]} +{"15401000|12681089": ["\u2026large scale parameter, channel sounding, measurement data, reference scenario, WINNER\nI. INTRODUCTION n order to derive reliable channel models in particular for evaluation of multi antenna system designs [1] channel measurements within the targeted deployment and propagation scenario are\u2026"]} +{"3021451|15453366": ["2520912 challenge of bandwidth shortage [1]\u2013[3]."]} +{"110408258|3054454": ["In between is the \u201csingle-directional\u201d channel, as described up until now [9, 4 , 5,6]."]} diff --git a/graph_1160684.jsonl b/edge/graph_10241432.jsonl similarity index 100% rename from graph_1160684.jsonl rename to edge/graph_10241432.jsonl diff --git a/graph_116542.jsonl b/edge/graph_10248381.jsonl similarity index 100% rename from graph_116542.jsonl rename to edge/graph_10248381.jsonl diff --git a/edge/graph_102486226.jsonl b/edge/graph_102486226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7860e3bdff6c8704e81d9b241aeab08fe461794 --- /dev/null +++ b/edge/graph_102486226.jsonl @@ -0,0 +1,13 @@ +{"6370804|393948": ["1 Introduction Deep neural networks have recently been applied to various tasks [2, 10], including image processing [9, 20], speech recognition [6, 17], natural language processing [3, 18], and bioinformatics [11, 22]."]} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"13917583|16107476": ["- 1DHMM + Wavelet [128] 100"]} +{"206592484|456491": []} +{"14786967|393948": ["As argued by Bengio et al. (2013), the use of deep networks can offer both computational and statistical ef\ufb01ciency for complex tasks."]} +{"24220815|17054454": []} +{"6515987|8574504": ["While CNNs were first demonstrated for image classification tasks [18] (hence assigning one class per image), they were soon adopted for tasks such as object detection and pixel-wise annotation [8, 12] (semantic segmentation).", "A large number of methods have been suggested for semantic segmentation, but most rely on some variation of the fully convolutional network (FCN) architecture [8, 12].", "learning methods based on convolutional neural networks (CNN) have dominated nearly all tasks involving image recognition, outperforming competing methods by a large margin on almost all existing benchmarks [12, 17, 18]."]} +{"6515987|14578535": ["However, little work has been performed on serially connecting convolutional neural networks in a modular way, such that each net can be trained and used separately [23-25].", "Modular neural networks (MNN) solve a task by dividing it into several subtasks and training an independent neural net for each subtask [19, 21, 24, 25]."]} +{"1033682|174797842": []} +{"32803735|14578535": [", decentralized control [12] and neural networks [4,7]."]} +{"2803311|9828770": ["This is the case in dynamical systems where network structure and function coevolve (Gross and Blasius, 2008)."]} +{"147548|1895753": []} diff --git a/edge/graph_102487993.jsonl b/edge/graph_102487993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d28f608a924fc391c9dbc28964eff8379663513 --- /dev/null +++ b/edge/graph_102487993.jsonl @@ -0,0 +1,11 @@ +{"35738955|2809360": ["It is only in recent years that research of information extraction from clinical documents has reached acceptable levels, however, the application of this research into existing live systems is still very rare [17].", "This compares very well with even much more complex techniques [17, 18]."]} +{"16806546|2809360": []} +{"16806546|15326253": []} +{"32194214|2809360": ["which patients with invasive breast cancer does the tissue bank have more than four tissue blocks in storage and what are their block identifiers? Two excellent overviews on the state-of-the art of IE are presented in [8] and [9] including extensive references to work in the biomedical and clinical domains."]} +{"37193090|14186660": ["In fact, a number of clinical NLP systems have been successfully developed and implemented in a myriad of medical domains with varying focuses.[6-11]"]} +{"9716187|2809360": []} +{"27069968|14434529": []} +{"14717294|15326253": ["The authors used concept hierarchies derived from the UMLS metathesaurus to identify relevant concepts pertaining to colonoscopy."]} +{"49189687|6078908": ["Using the covariance matrix and its eigenvalues and eigenvectors, PCA finds the principal components in data which are uncorrelated eigenvectors, each representing some proportion of variance in the data [34]."]} +{"564263|2809360": ["Each discovered named entity belongs to one of the dictionary semantic types and has attributes for (1) the text span associated with the named entity (\u2018span\u2019 attribute), (2) the terminology/ontology code the named entity maps to (\u2018concept\u2019 attribute), (3) whether the named entity is negated (\u2018negation\u2019 attribute), and (4) the status associated with the named entity with a value of current, history of, family history of, possible (\u2018status\u2019 attribute).", "There are several major sources of errors: (1) sentences starting with titles, especially \u2018Dr \u2019 and \u2018Mr \u2019; (2) sentences", "One set was additionally split into three subsets: (1) for developing the guidelines (150 sentences), (2) for training (400 sentences), and (3) for measuring IAA (200 sentences).", "We did not separately evaluate the off-the-shelf normalizer, which is used to improve the recall defined in equation (2) of the NER annotator.", "Global evaluation and applications We have conducted global evaluations of cTAKES for two largescale phenotype-extraction studies: (1) ascertaining cardiovascular risk factors for a case-control study of peripheral arterial disease using the EMR within the eMERGE(66) and (2) treatment classification for a pharmacogenomics breast cancer treatment study within the PGRN.", "recall 1\u20444 TruePositives TruePositives \u00fe FalseNegatives (2)"]} +{"205127599|2809360": []} diff --git a/edge/graph_102491621.jsonl b/edge/graph_102491621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37be4846072d4ab26d1b4fed288bb00a709a825d --- /dev/null +++ b/edge/graph_102491621.jsonl @@ -0,0 +1,15 @@ +{"15336655|6972141": ["However, artificial robot vision systems have not yet been able to quickly and cheaply extract the wealth information present in the visual environment [8], [20], [31]."]} +{"9631422|6972141": ["In this paper, we propose a robust collision detecting system, which consists of a lobula giant movement detector (LGMD) based neural network and a translating sensitive neural network (TSNN), to recognise objects on a direct collision course in complex dynamic scenes."]} +{"14085744|6972141": ["Many traditional artificial robotic vision systems have not yet been able to rapidly extract the relevant data from the wealth of information in visual scenes [20, 9].", "This system can therefore be used in robots for real time autonomous navigation in complex environments, where the conventional robotic vision techniques are difficult to apply [9]."]} +{"27561942|6972141": ["Nevertheless, artificial robot vision systems have not yet been able to quickly and cheaply extract wealthy visual information [9, 20, 27].", "However, it is still very difficult for a robot to perform well for collision-detecting without human intervention [9, 20]."]} +{"65255976|16051048": []} +{"65255976|469744": []} +{"65255976|205007974": []} +{"10656818|6972141": []} +{"58554066|1716644": ["It was later found in certain amphipod crustaceans [2, 27].", "Unlike other reviews of artificial compound eye imaging systems (mainly from two types: planar and curved) [26, 27], we review it from the perspective of their different structural compositions and divide them into four types."]} +{"16523364|6972141": ["\u2026difficult for a robot to run autonomously without collision in complex, outdoor environments without human intervention (Indiveri and Douglas 2000, DeSouza and Kak 2002) partially because the robot can\u2019t make a fast, reactive decision on how to behave when faced with a particular threat A\u2026", "Collision detection is a very important skill that ensures successful navigation for mobile robots and has been a difficult task to achieve with limited computing power (e.g. Adams 1998, Everettt 1995, Fiala and Basu 2004, DeSouza and Kak 2002, Vahidi and Eskandarian 2003, Manduchi et. al."]} +{"17127774|6972141": []} +{"24935311|6972141": ["For robotic applications, the neuromorphic vision sensors [1], in comparison with traditional sensing modalities using the segmentation and registration based computer vision techniques [2], can cope with the degree of complexity in real physical world for collision detection more efficiently that fulfill the utility in small mobile robots."]} +{"51893841|6972141": ["The vast majority of methods implement object and scene seg10 mentation, estimation or classification algorithms [1, 2]."]} +{"15784293|1029120": []} +{"15784293|6972141": []} diff --git a/edge/graph_10257004.jsonl b/edge/graph_10257004.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..83f1f3e1130b7dc793366c2692627207cd06672a --- /dev/null +++ b/edge/graph_10257004.jsonl @@ -0,0 +1,2 @@ +{"3063694|10257004": ["More on small universal Turing machines, and related notions, can be found in [10,15,27]."]} +{"1090650|10257004": []} diff --git a/graph_1165497.jsonl b/edge/graph_10257296.jsonl similarity index 100% rename from graph_1165497.jsonl rename to edge/graph_10257296.jsonl diff --git a/graph_1184328.jsonl b/edge/graph_10261743.jsonl similarity index 100% rename from graph_1184328.jsonl rename to edge/graph_10261743.jsonl diff --git a/edge/graph_10267045.jsonl b/edge/graph_10267045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7bf7be66393481ebbf91e00b371c784438e8f46 --- /dev/null +++ b/edge/graph_10267045.jsonl @@ -0,0 +1,21 @@ +{"2787313|14122909": ["[1] presented a review of the most significant attempts for automatic segmentation within the field of ultrasonics."]} +{"22354182|2616070": []} +{"1902238|2616070": ["Methods based on a statistical model mainly fall into three categories: shape prior segmentation (Cremers et al., 2007), active shape and appearance models (Heimann and Meinzer, 2009) and atlas-based segmentation techniques (Rohlfing et al."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"9434377|1902238": ["Therefore, \ufb02exible and fast automatic solutions are highly desired and are still being intensively investigated, despite the impressive research effort that has been devoted to LV segmentation Petitjean and Dacher (2011).", "The recent and comprehensive review in Petitjean and Dacher (2011) categorized LV segmentation algorithms along two main veins: (1) LV segmentation based on strong priors and (2) LV segmentation with intensive user inputs."]} +{"30824724|192934": ["In clustering, the aim is to construct decision boundaries based on unlabeled training data.[49] Clustering is the process of finding natural grouping clusters in multidimensional feature space.", "[49] Image segmentation may be considered a clustering[51-53] process in which the pixels are classified into the attribute regions based on the texture feature vector calculated around the pixel local neighborhood.", "At times supervised image segmentation and classification methods become very expensive, difficult and even impossible to correctly select and label the training data with its true category.[49] Training is the main requirement of many ANN based algorithms where the classifiers need to be trained before it can be applied to segmentation and classification problem."]} +{"9594868|2616070": []} +{"26772101|2616070": ["Another class of deformable models is level set based geometric models [8], [21]."]} +{"6863252|7861381": ["The rest of the section is organized by following coarsely and extending the classi\ufb01cation of deformation models given by Holden [14]."]} +{"13837443|2616070": []} +{"11054628|2616070": ["for image thresholding methods [24], medical image segmentation [25-26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on.", "Figure 2: Original images and the segmentation results by the MST based algorithm [27]."]} +{"11054628|14122909": ["The reviews of various segmentation techniques can be found for image thresholding methods [24], medical image segmentation [25,26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on."]} +{"11054628|8953108": ["The reviews of various segmentation techniques can be found for image thresholding methods [24], medical image segmentation [25,26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on."]} +{"16978259|2616070": []} +{"2627349|41104189": []} +{"207252142|2616070": ["In level-set region-based segmentation (Cremers et al. 2007) the energy function is rewritten as: E(\u03a6) = \u222b\n\u03a9\nHe(\u03a6)rf (x) + ( 1 \u2212 He(\u03a6) ) rb(x)d\u03a9 (3)\nAs stated before, the level-set embedding function \u03a6(x) is taken to be a signed distance function (or an approximation thereof).", "We used our video sequences to perform a critical performance analysis comparing the performance of both the\npixel-wise posteriors energy function that we use in this paper and the log likelihood one (like that of Cremers et al. (2007) and Dambreville et al. (2008)), for 3D tracking.", "Bibby and Reid (2008) showed that this yields a better behaved energy function (in the 2D case), when compared to standard level set formulations such as Cremers et al. (2007).", "In level-set region-based segmentation (Cremers et al. 2007) the energy function is rewritten as:"]} +{"12807217|2616070": ["More generally, most of segmentation algorithms are stated as a Bayesian inference problem (Cremers et al. 2007; Boykov and Funka-Lea 2006; Rother et al. 2004; Vicente et al. 2008; Malcolm et al. 2007; Ben Ayed et al. 2006a, 2006b; Jehan-Besson et al. 2003; Mansouri et al. 2006; Zhu and Yuille\u2026", "\u2026and Kornprobst 2006; Samson et al. 2000; Martin et al. 2004; Chan and Vese 2001; Vese and Chan 2002; Morel and Solimini 1995; Mumford and Shah 1989; Cremers et al. 2007; Cremers and Soatto 2005; Gao and Bui 2005; Holtzman-Gazit et al. 2006; Boykov and FunkaLea 2006; Rother et al. 2004; Vicente et\u2026", "Embedding likelihood-based data priors in image segmentation has significantly improved the performances of unsupervised methods (Cremers et al. 2007).", "\u2026regions where image data is approximately constant, the Chan-Vese model has established the potential of region-based active contours, and has been used in a considerable number of studies and applications (Cremers et al. 2007; Cremers and Soatto 2005; Gao and Bui 2005; Holtzman-Gazit et al. 2006).", "Albeit applicable only to segmentation regions where image data is approximately constant, the Chan-Vese model has established the potential of region-based active contours, and has been used in a considerable number of studies and applications (Cremers et al. 2007; Cremers and Soatto 2005; Gao and Bui 2005; Holtzman-Gazit et al. 2006).", "More generally, most of segmentation algorithms are stated as a Bayesian inference problem (Cremers et al. 2007; Boykov and Funka-Lea 2006; Rother et al. 2004; Vicente et al. 2008; Malcolm et al. 2007; Ben Ayed et al. 2006a, 2006b; Jehan-Besson et al. 2003; Mansouri et al. 2006; Zhu and Yuille 1996; Paragios and Deriche 2000, 2002; Rousson and Cremers 2005), where optimization of the data term amounts at finding the partition {Rin,Rout} that minimizes minus the image log-likelihood1", "Following the seminal work of Mumford and Shah (1989), variational formulations, which state image segmentation as the minimization of a functional, have been the focus of an impressive number of theoretical, methodological, and practical studies (Tai et al. 2007; Ben Ayed and Mitiche 2008; Aubert and Kornprobst 2006; Samson et al. 2000; Martin et al. 2004; Chan and Vese 2001; Vese and Chan 2002; Morel and Solimini 1995; Mumford and Shah 1989; Cremers et al. 2007; Cremers and Soatto 2005; Gao and Bui 2005; Holtzman-Gazit et al. 2006; Boykov and FunkaLea 2006; Rother et al. 2004; Vicente et al. 2008; Malcolm et al. 2007; Chang et al. 2007; Riklin-Raviv et al. 2008; S\u00e9gonne 2008; Rousson and Paragios 2008; Ben Ayed et al. 2006a, 2006b, 2008a, 2008b; Jehan-Besson et al. 2003; Mansouri et al. 2006; Zhu and Yuille 1996; Paragios and Deriche 2000, 2002; Rousson and Cremers 2005; Kadir and Brady 2003; Aubert et al. 2003; Freedman and Zhang 2004; Zhang and Freedman 2005; Michailovich et al. 2007; Georgiou et al. 2007; Kim et al. 2005; Mory et al. 2007; Awate et al. 2006; Huang and Metaxas 2008).", "The level set active contour framework has resulted in the most effective, principled and flexible algorithms, mainly because it is amenable to the introduction of various types of constraints in the segmentation functional (Cremers et al. 2007)."]} +{"9572824|15744805": ["As error metrics we have used the average deviation between the contour pixels and the contour in the gold standard, Hausdorff distance, number of over-segmented and under-segmented pixels in relation to the region size [18,19]."]} +{"1205540|15744805": ["Aside from a few exceptions [26][34][35], assessing the performance of image analysis algorithms requires ground-truth data, such as expert-labeled images, physical or computational phantoms with known segments, deformations, or corresponding intrinsic landmarks or external markers [36][33][20]."]} +{"24416856|15744805": ["A survey on this topic has been provided (36)."]} +{"6674407|192934": []} diff --git a/edge/graph_10271586.jsonl b/edge/graph_10271586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc01dbabe3da70d12011ed1b998f8713c9fa1810 --- /dev/null +++ b/edge/graph_10271586.jsonl @@ -0,0 +1 @@ +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} diff --git a/edge/graph_10272167.jsonl b/edge/graph_10272167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..439b27f2f02abcc9998bb2cde3dd8ca07be1e8c8 --- /dev/null +++ b/edge/graph_10272167.jsonl @@ -0,0 +1,36 @@ +{"17779575|13037420": []} +{"17528786|13037420": []} +{"15016975|9452842": ["For this reason, read-before-write schemes are less suitable for caches, which are expected to be designed using STT-RAM and ReRAM, and not PCM. Similarly, some techniques use extra flag bits to denote certain data-patterns (e.g., all-zero) and when the incoming data has such patterns, the write can be avoided by setting the flag to ON and later constructing the data using the flag value [34].", "However, read-before-write schemes are effective mainly for PCM, since its write latency/energy are significantly higher (e.g., six to 10 times) than that its read latency/energy.", "Some researchers propose hybrid DRAM-PCM main memory design which aim to leverage the high performance and write-endurance of DRAM along with high density and low leakage power of PCM [37]."]} +{"15016975|15411200": ["Thus, assume that \u03bb can be varied between range [2,4].", "Further, NVMs are expected to scale to much smaller feature sizes than the charge-based memories since they rely on resistivity rather than charge as the information carrier.", "A crucial limitation of NVMs, however, is that their write endurance is orders of magnitude lower than that of SRAM and DRAM (dynamic random access memory).", "Thus, addressing the limited write-endurance of NVMs remains a crucial research challenge for enabling their wide-spread adoption.", "Furthermore, recent research has highlighted sources of soft-errors in NVMs [2] and a part of our future work will focus on mitigating these errors in NVM caches.", "With ongoing scaling of operating voltage, the critical charge required to flip the value stored in a memory cell has been decreasing [2], and this poses a serious concern for reliability of charge-based memories such as SRAM.", "The write-minimization techniques, aim to reduce the number of writes to NVMs [31,32], while the wear-leveling techniques aim to uniformly distribute the writes to different blocks in the NVM cache [4,5,13,16,19,20].", "NVMs are potential candidates for replacing SRAM for the design of last level caches due to their high density and low leakage power consumption.", "As for NVMs, although their write latency and energy are higher than that of SRAM, it has been shown that their near-zero leakage and high capacity can generally compensate for the overhead of writes [29].", "Under ongoing core-scaling, NVMs offers a practical means of scaling cache capacity in an energy-efficient manner.", "This leads to hard errors in the cache [2] and limits its lifetime significantly.", "For this reason, we have proposed a technique for improving lifetime of NVMs.", "However, since the write endurance of NVMs is orders of magnitude smaller than that of SRAMs, in case of high write traffic, NVM-only caches may show small lifetime since even after wear-leveling and write minimization, the worst-writes on a block may exceed the NVM write endurance.", "Since power consumption is becoming first order design constraint in GPUs as well, our future efforts will focus on studying use of NVMs for designing GPU caches.", "NVMs such as spin transfer torque RAM (STT-RAM) and resistive RAM (ReRAM) have several attractive features, such as read latency comparable to that of SRAM, high-density and CMOS compatibility [7,8].", "Thus, limited endurance of NVMs, along with the large write-variation introduced by the existing cache management techniques, may cause the endurance limit to be reached in a very short duration of time.", "Due to their limited write-endurance, NVMs can be easily attacked and worn-out using repeated address attack (RAA).", "Non-volatile memories (NVMs) hold the promise of providing a low-leakage, high-density alternative to SRAM for designing on-chip caches [3\u20136].", "Researchers have proposed several lifetime enhancement techniques for NVMs, which can be classified as write-minimization or wear-leveling."]} +{"15016975|14583671": ["For STT-RAM, although a write-endurance value of 1015 has been predicted [10], the best write-endurance test so far shows only 4\u00d7 1012 [5,11].", "To mitigate these challenges, researchers have explored several alternative low-leakage technologies, such as eDRAM [10,29], die-stacked DRAM [30] and NVM [5,21], etc."]} +{"15016975|13037420": ["Due to its low density and high leakage power, SRAM caches consume a significant fraction of chip area and power budget [28].", "Although it is possible to use architectural mechanisms to reduce power consumption of SRAM caches [14,28], the savings provided by these techniques is not sufficient to meet the power budget targets of future computing systems."]} +{"206771165|9452842": ["Also, under normal conditions, they retain data for several years without the need of any standby power."]} +{"206771165|15411200": ["and hence, ECC of lower complexity can be used to protect data which reduces the ECC overhead [138]."]} +{"206771165|14583671": ["For example, the size of a typical SRAM cell is in the range of 125\u2013200F (2), while that of a PCM and Flash cell is in the range of 4\u201312F 2 and 4\u20136F (2), respectively, where F denotes the smallest lithographic dimension in a given technology node [36, 86].", "[86], for example, a 16Gb ReRAM prototype has been recently demonstrated [38] which features an 8-bank concurrent DRAM-like core architecture and 1GB/s DDR interface.", "The cell-size of Flash is 4-6F (2), while that of SRAM is 120-200F 2 [86].", "A few previous papers focus on the device-level properties of Flash memory [97] or review use of SCMs for cache and main memory [83, 86].", "For more details on the device-level properties of memory technologies, we refer the reader to previous works [6, 25, 36, 65, 86, 100, 106]."]} +{"206771165|165863": ["The final version is available at http://dx.doi.org/10.1109/TPDS.2015.2442980\nA Survey of Software Techniques for Using Non-Volatile Memories for Storage\nand Main Memory Systems Sparsh Mittal, Member, IEEE, and Jeffrey S. Vetter, Senior Member, IEEE\nAbstract\u2014Non-volatile memory (NVM) devices, such\u2026"]} +{"206771165|13268141": ["The property common to all NVMs is that their write latency/energy are significantly higher than that of read latency/energy."]} +{"14583671|13037420": []} +{"13966578|9452842": ["\u2026Loach and Zhang 2015; Picchi and Zhang 2015; Puaut and Decotigny 2002; Puaut and Pais 2007; Qiu et al. 2013; Sarkar et al. 2015; Zheng and Wu 2014, 2015] Way level locking [Asaduzzaman et al. 2009; Ni et al. 2013; Plazar et al. 2012] Study/optimization objective Predictability/schedulability\u2026", "\u20262012; Loach and Zhang 2015; Picchi and Zhang 2015; Puaut 2006; Qiu et al. 2014; Suhendra and Mitra 2008; Vera et al. 2003, 2007; Zheng and Wu 2014, 2015] Static cache locking [Anand and Barua 2009; Asaduzzaman et al. 2010; Campoy et al. 2005; Ding et al. 2012; Falk et al. 2007; Liang and Mitra\u2026", "For this reason, researchers have recently explored non-volatile memories for designing large caches [Mittal et al. 2015; Mittal 2015] since they have high density and near-zero leakage."]} +{"13966578|14583671": ["For this reason, researchers have recently explored non-volatile memories for designing large caches [Mittal et al. 2015; Mittal 2015] since they have high density and near-zero leakage."]} +{"13966578|17779575": ["As GPUs become increasingly used for general-purpose applications, the size of caches on GPUs is increasing, e.g., the size of the last-level cache on Fermi, Kepler, and Maxwell is 768KB, 1536KB, and 2048KB, respectively [Mittal 2014b].", "The caches in GPUs are much smaller in size compared to those in CPU [Mittal 2014b]."]} +{"13966578|13037420": ["This, however, leads to large performance and energy loss by virtue of increasing memory accesses and bandwidth contention [Mittal 2014c].", "As GPUs become increasingly used for general-purpose applications, the size of caches on GPUs is increasing, e.g., the size of the last-level cache on Fermi, Kepler, and Maxwell is 768KB, 1536KB, and 2048KB, respectively [Mittal 2014b].", "The caches in GPUs are much smaller in size compared to those in CPU [Mittal 2014b].", "In recent years, even low power-budget systems are moving away from single-core systems toward multicore systems [Mittal 2014a]."]} +{"9452842|13037420": ["of computing systems, ranging from embedded systems to data-centers and supercomputers [80] and for all components of computing systems, such as cache and main memory [81, 82]."]} +{"9452842|12904520": []} +{"13320447|15411200": ["Prefetching techniques can increase the soft error rate by increasing the residency time of data in the cache [Mittal and Vetter 2015].", "\u2026memory technologies (e.g., non-volatile memories that are write-agnostic, gigabyte-size DRAM caches that may employ cache line sizes of few KBs [Mittal et al. 2015]) and fabrication approaches (e.g., 3D stacking which demands intelligent data placement and thermal management), and so on."]} +{"13320447|14583671": []} +{"13320447|13037420": ["Large caches incur an energy penalty and consume precious chip area that may be better used for additional cores [Mittal 2014].", "From this time, until a cache miss replaces the block, the block is dead [Mittal 2014]."]} +{"18199517|9452842": []} +{"18199517|15411200": []} +{"18199517|14583671": []} +{"18199517|13037420": ["By comparison, modern scale-out workloads (e.g. business analytics, web search etc.) demand hundreds of megabytes of last level cache [2], [3]."]} +{"18199517|12904520": ["DRAM also requires refresh which consume significant amount of energy and reduces device availability [24].", "We refer the reader to prior work for more details on DRAM architecture [21], [22], [23], [24] and die-stacking technology [2], [6], [25]."]} +{"26978719|13037420": []} +{"26978719|12904520": []} +{"9436861|17779575": ["For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|165863": ["; Mittal and Vetter 2015].", "CPU versus GPU debate [Gregg and Hazelwood 2011; Lee et al. 2010; Mittal and Vetter 2015; Vuduc et al. 2010] toward a CPU and GPU paradigm where the best features of both can be intelligently combined to achieve even further computational gains."]} +{"9436861|13037420": ["However , mobile systems also impose very stringent cost and power budgets [Mittal 2014c].", "For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|12904520": []} +{"14721738|15411200": ["Another promising direction for addressing NVM endurance is the design of SRAM-NVM hybrid caches [Mittal and Vetter 2015c], where write-intensive blocks can be redirected to SRAM for achieving higher device lifetime and performance.", "In DRAM and eDRAM, PV affects the retention time, and the cell with the shortest retention time determines the refresh period of the entire device, which reduces device availability and increases energy consumption [Mittal and Vetter 2015a].", "Yoon et al. [2011] present a \ufb01ne-grained remapping technique to protect NVM main memory from both soft and hard errors [Mittal and Vetter 2015b]."]} +{"14721738|16780247": ["Emerging memory technologies are seen as a solution to power issues [Vetter and Mittal 2015]; however, they do not provide a solution to the PV issue.", "A PV-unaware approach can lead to reduced throughput, thermal emergencies (e.g., when computation-intensive tasks are scheduled on cores with high leakage power), and missed real-time deadlines [Mittal 2015].", "Given the low write endurance of NVMs and nonuniform write pattern of typical applications, wear-leveling techniques are required for achieving reasonable NVM device lifetimes [Mittal et al. 2015].", "They show that the relative advantage of their technique increases further with increasing magnitude of PV. Depending on whether multiple or single data bit(s) are stored in an NVM cell, it is referred to as MLC or SLC [Mittal et al. 2015]."]} +{"14721738|14583671": ["A PV-unaware approach can lead to reduced throughput, thermal emergencies (e.g., when computation-intensive tasks are scheduled on cores with high leakage power), and missed real-time deadlines [Mittal 2015].", "Given the low write endurance of NVMs and nonuniform write pattern of typical applications, wear-leveling techniques are required for achieving reasonable NVM device lifetimes [Mittal et al. 2015].", "They show that the relative advantage of their technique increases further with increasing magnitude of PV. Depending on whether multiple or single data bit(s) are stored in an NVM cell, it is referred to as MLC or SLC [Mittal et al. 2015]."]} +{"14721738|13037420": ["Way-based cache recon\ufb01guration approaches [Mittal 2014] work by turning off some cache ways based on program working set size, such that leakage energy is saved with minimal performance loss.", "Also, to improve ef\ufb01ciency, operational margins can be tightened to provision a \u201cbare minimum\u201d margin [Chandrasekar et al. 2013, 2014].", "\u2026Paul et al. [2011], Schechter et al. [2010], and Wilkerson et al. [2010] NVM wear leveling Cintra and Linkewitsch [2013], Dong et al. [2011], Mittal et al. [2014], Yun et al. [2014], and Zhao et al. [2014] (e)DRAMrefreshpolicy Agrawal et al. [2014], Liang et al. [2007], and Wang et al.\u2026", "Several approaches have been proposed for this: \u2014 Reducing writes or stress: Writes can be reduced using wear-leveling techniques [Cintra and Linkewitsch 2013; Dong et al. 2011; Mittal et al. 2014; Yun et al. 2014; Zhao et al. 2014] or data compression [Zhang and Li 2009].", "Dynamic voltage scaling approaches for cache energy saving [Mittal 2014] work by scaling supply voltages of cold blocks that have not been used in the recent past."]} diff --git a/graph_1197261.jsonl b/edge/graph_10274533.jsonl similarity index 100% rename from graph_1197261.jsonl rename to edge/graph_10274533.jsonl diff --git a/graph_1219725.jsonl b/edge/graph_10277823.jsonl similarity index 100% rename from graph_1219725.jsonl rename to edge/graph_10277823.jsonl diff --git a/edge/graph_10281344.jsonl b/edge/graph_10281344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..692f42ba19933bd7b0a54e5e9512b0c6bacc00e5 --- /dev/null +++ b/edge/graph_10281344.jsonl @@ -0,0 +1,4 @@ +{"1930258|5473785": ["Bayesian Networks (BN) (Neapolitan 1990) are mathematical objects that compactly represent a joint probability distribution J using a graph G annotated with conditional probabilities; J and G are connected by the Markov Condition property: a node is conditionally independent of its non-descendants,\u2026", "Bayesian Networks (BN) (Neapolitan 1990) are mathematical objects that compactly represent a joint probability distribution J using a graph G annotated with conditional probabilities; J and G are connected by the Markov Condition property: a node is conditionally independent of its non-descendants, given its parents."]} +{"2879370|17324444": []} +{"9516350|6116761": ["Given the sophistication of the procedure of model inference, it is not to evaluate how the selected DCM model re\ufb02ects the observed conditional independencies (and this may vary across different types of DCM models).", "We speci\ufb01cally consider causal structures compatible with the state-space models which have recently been recognized as an integrative framework in which re\ufb01nements of Granger causality and DCM converge (Valdes-Sosa et al., 2011).", "In particular, we described how causal models are associated with graphical causal structures, we indicated that Dynamic Causal Models (DCM) (Friston et al., 2003) are sub-sumed in the causal models described by Pearl, and that Pearl\u2019s approach does not exclude feedback connections because feed-back interactions can be represented in acyclic graphs once the temporal dynamics are explicitly considered.", "In neuro-science applications, and in particular in fMRI analysis, there has been a recent controversy comparing Granger causality and DCM (Valdes-Sosa et al., 2011; Friston et al., 2013).", "Furthermore, the framework of network discovery within DCM (Friston et al., 2011) is very powerful evaluating the posterior probability\u2014evidence-for different models, but still does not incorporate an evaluation of the in\ufb02uence of latent variables, like they do the algorithms of causal inference.", "Depending on the type of DCM models used, deterministic or stochastic, the variables { U } can comprise exogenous drivers or noise processes.", "Functional connectivity refers to the statistical dependence between the activity of the regions, while effective connectivity refers, in a broad sense, to the causal in\ufb02uence one neural system exerts over another (Friston, 2011).", "The fundamental difference with the approaches currently used to study the brain\u2019s effective connectivity (Granger causality and DCM) is that the understanding of causation in Pearl\u2019s framework ultimately relies on the notion of an external intervention that actively per-turbs the system.", "For dynamic variables, the functional model consists of a set of differential equations, DCM state equations being a well-known example (Valdes-Sosa et al., 2011).", "This is a crucial question for the mechanistical\u2014and not only statistical\u2014interpretation of DCM models, which, despite their increasing level of biological complexity, necessarily stay at a quite macroscopic level of description.", "The continuous temporal nature of the processes has been indicated as a strong reason to advocate for the use of DCM instead of autoregressive modeling (see Valdes-Sosa et al., 2011 for discussion).", "The motivation of using a generative model of the observed signals from underlying processes, which is at the core of DCM, is the same of proposing Kalman \ufb01lters to improve the estimation of Granger causality (Winterhalder et al., 2005; Nalatore et al., 2007).", "All the considerations regarding the limitations of causal inference due to observational equivalence and latent variables also hold for model-based approaches like DCM.", "This means that, in the same sense that the Granger causality measures are measures of functional connectivity which, in some cases, can be used to infer causal relations, DCM models are functional connectivity models which, to the extent to which they increasingly reproduce the biophysical mechanisms generating the data, converge to causal models.", "We indicate that, although the algorithms here discussed constitute a non-parametric approach to causal inference, our results are also relevant for modeling approaches such as DCM and help to better understand how dif\ufb01cult it is in practice to distinguish functional and effective connectivity.", "We begin reviewing the models of causality described by Pearl (2009) and relating them to DCM (Friston et al., 2003).", "It is thus clear that the models of causality described by Pearl are general and comprise models of the form used in DCM.", "New approaches have been also developed within neuroscience, such as Dynamic Causal Modeling (DCM) (Friston et al., 2003) which explicitly models the biophysical interactions between different neural populations as well as the nature of the recorded neural signals (Friston et al., 2013).", "In DCM the iden-ti\ufb01cation of the model causal structure is partially done a priori, by the selection of the priors of the parameters in the model, and partially carried out together with the parameters estimation.", "The need to understand how the interactions and coordination among brain regions contribute to brain functions has led to an ever increasing attention to the investigation of brain connectivity (Bullmore and Sporns, 2009; Friston, 2011).", "Therefore, even if by de\ufb01nition inside-model causality is well-de\ufb01ned in any DCM model, obtaining a good causal model is much harder than a good statistical model, and cannot be evaluated without interventions on the system."]} +{"6301398|5473785": ["Then we call the triplet \u3008V ,G,J\u3009 a Bayesian network (abbreviated as \u201cBN\u201d), or equivalently a belief network or probabilistic network (Neapolitan, 1990).", "Then we call the triplet\u3008V ,G,J\u3009 a Bayesian network (abbreviated as \u201cBN\u201d), or equivalently a belief network or probabilistic network (Neapolitan, 1990)."]} diff --git a/graph_1222706.jsonl b/edge/graph_1028144.jsonl similarity index 100% rename from graph_1222706.jsonl rename to edge/graph_1028144.jsonl diff --git a/edge/graph_10281911.jsonl b/edge/graph_10281911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c40aed454776e51979e340c8fdde0144beb06eec --- /dev/null +++ b/edge/graph_10281911.jsonl @@ -0,0 +1,2 @@ +{"1157211|14002306": ["In recent years, mobile phone data have been used for human travel pattern visualization (e.g. 25,26,27,28), mobility pattern extraction (e.g. 29,30,31,32,33,34,35, 35), route choice modeling (e.g. 37,38), traffic model calibration (e.g. 39), traffic flow estimation (e.g. 40,41) to name a few."]} +{"17253380|1174262": []} diff --git a/edge/graph_10282549.jsonl b/edge/graph_10282549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39ab16e4ccd84a4c9a69d93a41d121465be31749 --- /dev/null +++ b/edge/graph_10282549.jsonl @@ -0,0 +1,4 @@ +{"8762563|10282549": ["We also compare our approach to the method of [1].", "See [1] for a more detailed discussion.", "3 provides a comparison of the performance of the CPF and the method of [1].", "[1] estimates the location of an external contact point using only proprioceptive information.", "1 explains the residual observer and presents the method of [1].", "As in [20] and [1] we must specify a threshold for determining when there is an external contact.", "In Chapter 3 we describe simulation experiments that validate the performance of our algorithm across a wide range of conditions, and show how our algorithm overcomes the main limitations of the method of [1].", "Following [1] we make the assumption that only forces, and no torques, are applied at r,.", "We present a comparison of our method to [1] in Sections 3.", "[1] performs extensive experiments using a Kuka Light Weight Robot (LWR) characterizing the performance of the residual observer."]} +{"1924791|206051485": ["Similarly, a \u201csuper\u2013resolution\u201d algorithm [151], used in digital image processing to enhance the resolution of images, can be adopted to improve on the tactile sensing resolution, in case of insufficient resolution from the available tactile sensor hardware."]} +{"1924791|14561706": []} +{"138214192|14561706": ["Review articles, e.g. by Argall and Billard [4] or Dahiya et al. [20] show, that the individual challenges can be met, however not all at the same time:\n\u2022 High sensitivity, e.g. Mannsfeld et al. [94]\n\u2022 High spatial resolution, e.g. Kolesar and Dyson [69]\n\u2022 Robust sensor design, e.g. Fritzsche et al. [35]\n\u2022 Integration into a robotic system, e.g. Weiss and W\u00f6rn [177]\nWhen the combination of the ideal properties is considered, conflicts of goals arise.", "by Argall and Billard [4] or Dahiya et al."]} diff --git a/edge/graph_10283038.jsonl b/edge/graph_10283038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a63d8b3cdc328a03feac32dc1ebfed20d6f0ded5 --- /dev/null +++ b/edge/graph_10283038.jsonl @@ -0,0 +1,19 @@ +{"1301344|1230643": []} +{"16594979|1331167": ["Keywords\u2014 Wormhole Attack; Routing protocol for low power and lossy network; Merkle Tree based authentication; Tree based protocols."]} +{"11188070|8839331": []} +{"11188070|207694246": []} +{"11188070|15199849": ["Due to the deployment of these systems, WSNs are especially susceptible to a large number of security attacks [2]."]} +{"11188070|1331167": []} +{"18655328|14068482": ["Thus, the Sensor Web is to sensor resources what the WWW is to general information sources\u2014an infrastructure allowing users to easily share their sensor resources in a well-defined way [15]."]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"13416245|15300368": []} +{"1837420|17205659": ["LoWPAN networks exhibit a large number of vulnerabilities, which make them even more prone to security attacks [8\u201312] than traditional IP networks."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"8727665|6275330": ["Popular WSN platforms available for industrial and academic use [1,7].", "A major classification of WSN applications lies in tracking and environmental monitoring scenarios [7].", "4 further provides support for distributed addressing and use of tree topologies [1,7]."]} +{"8727665|1230643": ["Routing protocol needs to be simple by reducing computational complexity and power efficiency in order to help increase the network lifetime [1].", "Technological advancement in semiconductor design, material sciences and networking are driving the ubiquitous deployment of large scale wireless sensor and actuator networks [1].", "We mainly classify query-and-response based data dissemination into three categories: (1) directed diffusion; (2) distributed indexing and (3) multi-resolution methods [1,2].", "Popular WSN platforms available for industrial and academic use [1,7].", "Hence, a strict categorization for WSN deployment strategy is the structured and non-structured WSN [1].", "Significant research contributions have also made WSN communication more reliable for real time scenarios paving way for a well-established mix of software and hardware solutions in future applications [1].", "4 further provides support for distributed addressing and use of tree topologies [1,7]."]} +{"206634147|1230643": ["The pending data frame is then sent using slotted CSMA-CA or, if possible, immediately after the acknowledgement [3][6] [7][8].", "For example, a temperature sensor and accelerometer could be combined within a single device used for industrial plant monitoring applications[6][7]."]} diff --git a/edge/graph_10283694.jsonl b/edge/graph_10283694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c682f7422f8aa6ee41fa178739331b5cd121cafc --- /dev/null +++ b/edge/graph_10283694.jsonl @@ -0,0 +1 @@ +{"45624143|2457428": []} diff --git a/edge/graph_10287248.jsonl b/edge/graph_10287248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f32c7a88fc447d0bb7c5b0df9432e81ed8b88277 --- /dev/null +++ b/edge/graph_10287248.jsonl @@ -0,0 +1,3 @@ +{"10392012|713082": ["In practice, the needs of applications and practical constraints introduce additional requirements to the multicast problem 7]."]} +{"62528177|15040462": []} +{"61720086|10559330": ["In other scenarios, for example the Internet, the bandwidth reservations may require additional mechanisms, such as RSVP [45], and speci c queuing implementations at the routers [7]."]} diff --git a/edge/graph_10290908.jsonl b/edge/graph_10290908.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77bdb152419e70b794617f3ef9af3f57e542bf0d --- /dev/null +++ b/edge/graph_10290908.jsonl @@ -0,0 +1 @@ +{"9939192|423305": ["These approximations include the Bayesian Information Criterion (BIC) (Schwarz, 1978), which is equivalent to Risannen's (1987) Minimum-Description- Length (MDL) measure, diagonal and block diagonal approximations for the Hessian term in the Laplace approximation (Becker and LeCun, 1988; Buntine and Weigand, 1994), and an approximation suggested by Cheeseman and Stutz (1995).", "\u20261978), which is equivalent to Risannen's (1987) Minimum-Description- Length (MDL) measure, diagonal and block diagonal approximations for the Hessian term in the Laplace approximation (Becker and LeCun, 1988; Buntine and Weigand, 1994), and an approximation suggested by Cheeseman and Stutz (1995)."]} diff --git a/graph_1029120.jsonl b/edge/graph_1029120.jsonl similarity index 100% rename from graph_1029120.jsonl rename to edge/graph_1029120.jsonl diff --git a/edge/graph_10299098.jsonl b/edge/graph_10299098.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58a457faa9ec50072b724c4ca5eff795d75b51f4 --- /dev/null +++ b/edge/graph_10299098.jsonl @@ -0,0 +1,44 @@ +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"9010762|9104850": ["In the past decades, there has been an extensive literature for web caching schemes (see [13]"]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"1999116|8280144": []} +{"3055684|12060835": []} +{"10909342|3055684": ["less Communications and Networking Conference (WCNC), New Orleans, LA, Mar. 2015. radio signal, wind energy, etc [3], and thus it is becoming an indispensable solution for green communication systems [4]. By introducing EH techniques to the next-generation communication systems, it is estimated that a 20% CO2 emission reduction can be achieved [5]. Due to the intermittent nature of the EH processes, "]} +{"10909342|12060835": []} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"8857235|16972183": []} +{"8857235|8909218": ["Email: rganti@ee.iitm.ac.in. and are distinguished by their end-user installation in arbitrary locations, very short range, and possibility of having a closed-subscriber group [10]\u2013[12]."]} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"15784770|2387055": []} +{"3042864|14088590": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|2282515": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|10859599": ["In the second case, the applications execute in a real cloud, for instance, Amazon EC2 [34], Google App Engine [31], and Microsoft Live Mesh [84]."]} +{"2205317|16654832": ["As expected, SMDs are taken as the dominant future computing devices for supporting computationintensive applications, such as interactive gaming, image/video processing, e-commerce, and online social network services [1], [2]."]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"2457101|7800459": ["2b, distance Matrix D is a 4 4 symmetric matrix with each component Dij indicating the expected distance between node i and node j."]} +{"706371|18148591": ["Inter-cell interference is treated as noise at the receiver side and is handled by resorting to improved point-to-point communications between the base station (BS) and the mobile station (MS), using efficient coding and/or single-link multiple-antenna techniques [2]."]} +{"30832236|3540699": ["264 encoder [22]."]} +{"10040669|12029139": ["2 mW RFID, low power device RF Signal [12] unpredictable"]} +{"10040669|8909218": ["r experience. Besides this, the low-cost and low-power SCBSs can be easily installed without costly cell site acquisition, and their self-organization manner further helps save operating expenditures [1, 2]. However, as the SCBSs are densely and irregularly located, some of them may be inaccessible to the power grid. Moreover, the network power consumption of the SCNs will be high despite the small powe"]} +{"10040669|12060835": ["The previous discussions on the three basic tradeoffs in EH-SCNs provide us with the\nfollowing deployment guidelines:\n\u2022 Satisfactory coverage can be guaranteed in EH-SCNs with a reasonable network density."]} +{"18105252|3055684": ["In particular, energy harvesting (EH) technology has recently emerged as a promising approach to power wireless networks with renewable energy sources [2, 3]."]} +{"18105252|7686677": ["Wireless communications is evolving towards a green paradigm with significantly improved energy efficiency and environmental friendliness [1]."]} +{"18105252|12060835": []} +{"31479|469744": ["Augmented reality applications show step-by-step instructions as 3D drawings on the actual equipment [55] as illustrated in Figure 3.", "1a, an application is capable of rendering visualization datasets on a real patient to identify organs, and have precise information on where to perform an incision during a surgery [55]."]} +{"28038835|3042864": []} +{"10632020|8909218": ["Cellular networks traditionally are modelled using hexagonal grids but such models lack tractability and fail to account for ad hoc BS deployment that is a trend of network evolution [2].", "Last, the ongoing deployment of small-cell networks [2] and the advancements in low-power electronics will substantially reduce the required transmission power of mobiles."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"38730704|3330461": ["Multicast D2D transmissions have already been standardized by 3GPP, whereas unicast transmissions so far have only received attention from the scientific community [13], [14]."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"801417|8909218": ["At the same time, an exponential growth in femto deployments is expected [1], [2] due, in part, to the fact that spatial proximity between the handset and the serving femto access point (FAP) enables successful communication with high rates and reduced power."]} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"9121328|1775475": ["In [5], Chalmers et al. explain how context-awareness and missioncritical requirements would be critical issues with respect to managing Quality-of-Service (QoS) in future mobile computing environments."]} +{"1079645|8909218": []} +{"3798371|17713112": ["In addition to the development of efficient software [13] and communication protocols, e."]} +{"3798371|16335158": ["in [22] provide a comprehensive survey of sen-"]} diff --git a/graph_1224063.jsonl b/edge/graph_1030380.jsonl similarity index 100% rename from graph_1224063.jsonl rename to edge/graph_1030380.jsonl diff --git a/edge/graph_10310014.jsonl b/edge/graph_10310014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b6e6b6c179ae187994d269ee29a36a709344c17 --- /dev/null +++ b/edge/graph_10310014.jsonl @@ -0,0 +1,3 @@ +{"61508332|18148591": ["It is based on re-configurable Orthogonal Frequency Division Multiple-Access (OFDMA) with multi-antenna capability (Multiple-Input Multiple-Output MIMO [ 13 ]).", "WIDENS takes advantage of the technology of Mobile Ad hoc NETworks (MANETs) [ 13 ]."]} +{"61508332|10559330": []} +{"32690403|13367219": ["The channel model in [18,19] combines various propagation effects including shadowing, path loss, angular and delay spread, scattering and polarization into one general framework.", "To test the performance of phased array antennas on the RS in a multipath environment, a multipath propagation model was implemented according to [18,19].", "sidered [18], so the 6 highest power multi-paths were used (J = 6) in the following experiments."]} diff --git a/edge/graph_10314834.jsonl b/edge/graph_10314834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e3286ac7ad10896756a52b65bf63e6c58ad2dc1 --- /dev/null +++ b/edge/graph_10314834.jsonl @@ -0,0 +1,2 @@ +{"2432846|17774971": ["The n-level cascaded inverter used in this work has 1 2 n power cells (H-bridge) in series connection and each cell has an isolated capacitor in the dc-bus [1].", "INTRODUCTION Nowadays, the multilevel inverters are used like the power stage in active power filters due to their advantages over other inverter topologies: voltage efforts can be reduced when the number of levels increases; power switches are driven with a low commutation frequency and multilevel converters can synthesize a voltage waveform with very low harmonic content [1].", "The relevant characteristics of this topology are explained in [1]."]} +{"21161237|17774971": []} diff --git a/edge/graph_10315118.jsonl b/edge/graph_10315118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58b250d02ab94b8d99223e66cd3a1d6a43e43a17 --- /dev/null +++ b/edge/graph_10315118.jsonl @@ -0,0 +1 @@ +{"2948186|6327434": ["l (xk) ' l (x) + [ l (x) ]t (xk \u2212 x) + 1 2 (xk \u2212 x) l (x) (xk \u2212 x) (23)"]} diff --git a/edge/graph_10315757.jsonl b/edge/graph_10315757.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3eb4468dbcf9eed48f6a39fba2deabaf1717a2e9 --- /dev/null +++ b/edge/graph_10315757.jsonl @@ -0,0 +1,2 @@ +{"321550|3540699": ["Existing techniques to address the transport requirement mis match fall in two categories: source-coding for compression [33] and error-resilience [34], and end-point adaptation, e.", ", adjust the quality of the video based on the network throughput [33]."]} +{"62016599|8125630": ["Our approach to managing this complexity is inspired by the area of databases where similar challenges arise \u2014 Online Analytic Processing (OLAP) [15, 16, 17]."]} diff --git a/graph_122575.jsonl b/edge/graph_10319038.jsonl similarity index 100% rename from graph_122575.jsonl rename to edge/graph_10319038.jsonl diff --git a/edge/graph_10329355.jsonl b/edge/graph_10329355.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9650141d2cfd6cd4c0714e7973b3d6f054ae4386 --- /dev/null +++ b/edge/graph_10329355.jsonl @@ -0,0 +1,6 @@ +{"13909773|41998167": ["In section IV, we present our scheme in details and evaluate its effectiveness in section V. Finally, we conclude the paper and discuss the future work in Section VI."]} +{"18991370|1230643": ["cost, data processing, wireless communications and a high degree of collaboration [ 3 ]."]} +{"12736301|14441987": ["Unlike traditional routing protocols for mobile ad hoc networks (MANETs) [13], epidemic routing achieves message delivery, even in the case where a connected path from the source to the destination is rarely available."]} +{"2814849|15300368": ["In this context, Wireless Sensor Networks (WSNs) [1,2] offer a new paradigm for oceanography, as in many other disciplines such as precision agriculture, environmental, engineering, etc. WSNs are a type of autonomous, self-organized ad-hoc Wireless Personal Area Networks (WPAN) composed of tens,\u2026"]} +{"2814849|1230643": ["\u2026such systems as not really A-WSNs\u2014that is, systems incorporating considerable computational capacities, power and communications resources and hence contradicting the essential idea of an A-WSN in which the sensor nodes are limited in power, computational capacities, and memory as stated in [1].", "In this context, Wireless Sensor Networks (WSNs) [1,2] offer a new paradigm for oceanography, as in many other disciplines such as precision agriculture, environmental, engineering, etc. WSNs are a type of autonomous, self-organized ad-hoc Wireless Personal Area Networks (WPAN) composed of tens,\u2026", "A-WSNs [1,16] consist of a set of nodes with scanty power supplies, which moreover communicate with one another by way of low-consumption radio modules."]} +{"8098483|1236072": []} diff --git a/graph_124021.jsonl b/edge/graph_10334496.jsonl similarity index 100% rename from graph_124021.jsonl rename to edge/graph_10334496.jsonl diff --git a/graph_1252121.jsonl b/edge/graph_10334828.jsonl similarity index 100% rename from graph_1252121.jsonl rename to edge/graph_10334828.jsonl diff --git a/edge/graph_10342730.jsonl b/edge/graph_10342730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e669d54d0859f2bc933494194efbf1e441b4a5c5 --- /dev/null +++ b/edge/graph_10342730.jsonl @@ -0,0 +1,14 @@ +{"24822119|8909218": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"24822119|18148591": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5].", "To meet the anticipated capacity demand in the existing model of fixed resources including static-licensed spectrum, mobile network operators, in the context of 4G Long Term Evolution (LTE) [3], are exploring many techniques such as higher data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"44532023|2509135": ["SDRs offer previously unseen flexibility due to the presence of reconfigurable physical layer parameters [3] ."]} +{"15289072|17336376": ["Readers are referred to [81] for a detailed survey on virtualization of wireless sensor networks."]} +{"11735843|2623404": ["3 Software-defined networking (SDN) The major insight of \u2018software-defined networking\u2019 (SDNs) is to allow horizontally integrated systems by allowing the separation of the control plane and the data plane [11,107] while providing increasingly sophisticated set of abstractions.", "In particular, it is the culmination of many varied ideas and proposals in the general field of programmable networks [11,18] with many of the initial ideas of programmable networking (of \u2018open interfaces\u2019 and \u2018separation of control and data plane\u2019) espoused by the OpenSig and Active Networking community now maturing in the form of the SDN) architecture.", "Our paper is different from other survey papers [11,18,19] in its focus on wireless programmable networks while the previous papers had focused mainly on generic (wired) programmable networks.", "Applications of programmability include rapid provisioning of services [10], flexible resource management [11], efficient resource sharing [12], and support for new architectures such as cloud computing, Internet of things (IoT) [13], etc."]} +{"11735843|10693567": []} +{"11735843|3189715": ["The lack of programmability of networks has long been recognized, and various approaches have been proposed to address this deficiency [14] [15].", "in 1999 [14], t he impending impact of numerous programming trends is anticipated using surprisingly modern terminology.", "The main reason OpenSig approach could not quite become mainstream was the static nature of the interfaces it defined [14]."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"14906755|485843": ["For instance, since the service requirements for wireless smart grid communications are different from regular traffic [30], the scheduling and management of the network is best handled by the utility provider instead of the infrastructure provider."]} +{"14081529|2854761": ["Scheduler design in wireless networks, especially inWiMAX networks [47], is a hot topic and very relevant to .", "1We point the interested reader to a detailed survey [47] on WiMAX network resource management."]} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} diff --git a/edge/graph_10343195.jsonl b/edge/graph_10343195.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..288a1150c99ab8f05b7ce6c1d934bb0d236b09aa --- /dev/null +++ b/edge/graph_10343195.jsonl @@ -0,0 +1,3 @@ +{"33458385|11283051": []} +{"488084|11283051": []} +{"94911340|11283051": []} diff --git a/edge/graph_10346685.jsonl b/edge/graph_10346685.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f37504dd16e37c222b8d60c5df1b50661c1d2cf --- /dev/null +++ b/edge/graph_10346685.jsonl @@ -0,0 +1 @@ +{"990419|10346685": []} diff --git a/edge/graph_10355303.jsonl b/edge/graph_10355303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d437c79344db94916083d5bfb0bf0e1bc83f364d --- /dev/null +++ b/edge/graph_10355303.jsonl @@ -0,0 +1,27 @@ +{"13365233|14970359": ["Each of the aforementioned problems has been addressed to some extent (e.g., spatiogram [8] for encoding spatial information in histogram)."]} +{"13365233|7788290": ["Each of the aforementioned problems has been addressed to some extent (e.g., spatiogram [8] for encoding spatial information in histogram)."]} +{"2625464|192934": ["Such mixtures are e xible enough to represent a large number of those distributions typically encountered in real applications [21, 13 ]."]} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"40900661|7788290": []} +{"6837802|7788290": []} +{"16364152|17516538": []} +{"3144669|7439310": []} +{"3144669|205131192": []} +{"3144669|9045232": ["Although different researchers provide different categorisations for the various face detection methodologies proposed over the years [3,4], most methods may be broadly categorised as appearancebased or feature-based."]} +{"74434|2616070": ["More sophisticated models for intensity, color, or texture of objects and background could be employed [34]."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"206764452|1029120": ["Unlike [11], this paper focuses on the techniques used in PPSs, rather than on general pedestrian safety.", "The same authors recently presented a survey that reviews infrastructure developments, sensors, and pedestrian detection approaches in a general transport safety context, rather than focusing especially on on-board detection [11]."]} +{"206764452|2113024": ["Recently, Krotosky and Trivedi proposed the use of multimodal stereo analysis to generate candidates, i.e., combining two different sensor types, like VS and TIR to perform stereo [60] or a VS stereo pair matched with TIR imaging [57].", "Krotosky and Trivedi [57] evaluate tetra and tri-sensor systems that utilize both the VS and TIR.", "In 2006, Gandhi and Trivedi [10] followed the same approach, but focused on the aspects of collision prediction and pedestrian behavior analysis."]} +{"206764452|9045232": ["Nevertheless , unlike other fields, such as face or vehicle detection, in which in-depth reviews analyzing the algorithms and successful systems have been presented (e.g., [12], [13]), pedestrian detection for ADAS lacks an exhaustive review."]} +{"55372932|17516538": []} +{"55372932|7788290": []} +{"62054337|14970359": []} +{"62054337|7788290": ["Thorough reviews of human-specific trackers can be found in (Aggarwal & Cai, 1999; Gavrila, 1999; Moselund & Granum, 2001)."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"823678|7788290": ["Tracking people, which raises many challenges due to the presence of large 3D, nonrigid motion, was extensively analyzed in [36], [1], [ 30 ], [73]."]} diff --git a/graph_1035979.jsonl b/edge/graph_1035979.jsonl similarity index 100% rename from graph_1035979.jsonl rename to edge/graph_1035979.jsonl diff --git a/edge/graph_10390713.jsonl b/edge/graph_10390713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d2c423fc68824b0828782722980f7a3ac468abb --- /dev/null +++ b/edge/graph_10390713.jsonl @@ -0,0 +1,2 @@ +{"17605696|10390713": ["That is the process of dismantling monopolistic and oligarchic energy system, by allowing a greater number of parties to operate in a certain role of the energy sector and market."]} +{"110127098|7064380": []} diff --git a/edge/graph_10392510.jsonl b/edge/graph_10392510.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce7e557d142009e427a2e44b7a03dbbc199209fc --- /dev/null +++ b/edge/graph_10392510.jsonl @@ -0,0 +1 @@ +{"16908862|25699143": ["The stereo disparity between the two images from two distinct viewpoints is a powerful cue to 3-D shapes and pose estimation [1], [2]."]} diff --git a/edge/graph_10397481.jsonl b/edge/graph_10397481.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..978fa3d2ad67392be4ed730c64b96568507b0da4 --- /dev/null +++ b/edge/graph_10397481.jsonl @@ -0,0 +1,10 @@ +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} +{"1321024|13365762": []} +{"5544069|13365762": []} +{"14360367|16766019": ["There are a large number of researches on content-based video indexing using low-level features such as color, texture, shape, motion, etc [1][2][3][ 4 ]."]} +{"3705093|9835525": ["from the video sequence, and then selecting \u201ckey frames\u201d according to some criterion from each video shot, [9], [15], [ 20 ]."]} +{"3705093|10972964": ["Exploiting this structure, a dynamic programming (DP) solution based on [30] and [27] is developed.", "The maximum distortion criterion is chosen instead of the average distortion criterion in this case, because it results in more uniformly distributed frame distortion, as is discussed in [27]."]} +{"10301158|13365762": ["[6] J.M.Martinez, \u201cOverview of the MPEG-7 Standard (version 6.0),\u201d ISO/IEC JTC1/SC29/WG11 N4509, December, 2001.", "MPEG-7[6] has been recently standardized to describe the metadata for videos.", "In this paper, we assume the metadata, which is described with MPEG-7, is given to videos beforehand."]} +{"4657009|11239740": []} diff --git a/edge/graph_10398826.jsonl b/edge/graph_10398826.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8176100e026ef9d9dcc802f72533d768debc40d9 --- /dev/null +++ b/edge/graph_10398826.jsonl @@ -0,0 +1 @@ +{"19156|719577": ["give a survey of legacy system modernisation approaches [5]."]} diff --git a/graph_1040047.jsonl b/edge/graph_1040047.jsonl similarity index 100% rename from graph_1040047.jsonl rename to edge/graph_1040047.jsonl diff --git a/edge/graph_10402597.jsonl b/edge/graph_10402597.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..893467e7762ac4ac82e39b5d3d874c7308d7e0d8 --- /dev/null +++ b/edge/graph_10402597.jsonl @@ -0,0 +1,11 @@ +{"3078938|9240891": ["While Yu and Singh\u2019s model demonstrates the power of referrals and the e \ufb00 ectiveness of Dempster Shafter\u2019s theory of evidence in modelling reputation , Schillo et al .", "The probability of a witness lying to the querying agent is actually learnt over multiple interactions in Schillo et al .", "(2002), Sen and Sajja (2002) and Schillo et al .", "Furthermore , Schillo et al .", "This normally entails that they can be authenticated by trusted third parties ( i . e . those that can be relied upon to be trustworthy and as such are authorities in the system ( Grandison & Sloman , 2000).", "In this respect , Schillo et al .", "This necessitates a better evaluation of risks present in the environment ( Yamagishi et al ., 1998; Molm et al ., 2000).", "The former supports a web of trust in that there is no centralised or hierarchical relationship between CAs , while the latter is a strictly hierarchical trust model for authentication ( Grandison & Sloman , 2000).", "These basic requirements can be implemented by a public key encryption and certi\ufb01cate infrastructure ( Grandison & Sloman , 2000).", "Strategic lying : while some reputation mechanisms and models try to deal with this problem ( such as Schillo et al ."]} +{"276405|13407802": ["For the microdata files it is important that the correlations between different attributes are maintained, to maintain the utility of the data collection [24].", "This section gives an overview in basic principles and techniques used; for more details see [7, 8, 24]."]} +{"16803952|70923": ["Although both objects (passive objects) and agents use message-passing to communicate with each other, message-passing for objects is a unique form of method invocation, while agents distinguish different types of messages and model these messages frequently as speech-acts and use complex protocols to negotiate (Wooldridge et al., 2000; Iglesias et al., 1998).", "\u2026to communicate with each other, message-passing for objects is a unique form of method invocation, while agents distinguish different types of messages and model these messages frequently as speech-acts and use complex protocols to negotiate (Wooldridge et al., 2000; Iglesias et al., 1998)."]} +{"19388060|562855": []} +{"6681686|16614482": []} +{"206738598|562855": ["Using these three basic social entities, more complex organizational structures can be modeled, such as federations, bureaucracies, congregations or coalitions, as it is deeply explained in [ 18 ]."]} +{"46192146|13407802": ["Winkler has provided several overview papers on the use of record linkage in the context of privacy [265, 268, 269, 270], and so we will briefly mention some related results.", "frequently used to estimate re-identification probabilities: the probabilities that users in a data set can be re-identified through auxiliary data [268].", "For an overview of different identification rules, see [268, 269, 270]."]} +{"46192146|2318389": ["For a survey of such attacks, see [162].", "An important attack not covered in [162] is the use of linear programming [74, 88]."]} +{"14646850|2294541": ["Hoffmann, Zage and Nita-Rotaru (2009) [8] provide a taxonomy and analysis framework for TRSs proposed for P2P networks, and then give an analysis of 24 of the most prominent TRSs based on 25 different attributes."]} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"2296304|9240891": ["In the area of trust, Grandison et al. in their work \" A survey of trust in Internet application \" (Grandison and Sloman, 2000) examine the various definitions of trust in the literature and provide a working definition of trust for Internet applications."]} diff --git a/graph_1040908.jsonl b/edge/graph_1040908.jsonl similarity index 100% rename from graph_1040908.jsonl rename to edge/graph_1040908.jsonl diff --git a/graph_1040974.jsonl b/edge/graph_1040974.jsonl similarity index 100% rename from graph_1040974.jsonl rename to edge/graph_1040974.jsonl diff --git a/graph_1289787.jsonl b/edge/graph_1041439.jsonl similarity index 100% rename from graph_1289787.jsonl rename to edge/graph_1041439.jsonl diff --git a/edge/graph_10416225.jsonl b/edge/graph_10416225.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5caba91f0f8f6df43ad3a2f3713e9de3d8ddabab --- /dev/null +++ b/edge/graph_10416225.jsonl @@ -0,0 +1 @@ +{"1974364|10500613": ["In [18], a survey on automatic schema matching approaches was conducted."]} diff --git a/graph_1300682.jsonl b/edge/graph_1041692.jsonl similarity index 100% rename from graph_1300682.jsonl rename to edge/graph_1041692.jsonl diff --git a/edge/graph_104292203.jsonl b/edge/graph_104292203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ad69102a0570a486927363676bb50bd862477a2 --- /dev/null +++ b/edge/graph_104292203.jsonl @@ -0,0 +1,33 @@ +{"4269723|2535224": ["At the present, wireless and wired networks uphold diversity and heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional networks.", "\u2026heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional\u2026"]} +{"13142578|15093994": ["However, the bene\ufb01cial effects are clear, and not just from the point of view of the environment [30]."]} +{"13142578|84832337": ["The literature classi\ufb01es attacks mainly according to the speci\ufb01c requirement they compromise [40,41], or the layer of the protocol stack they impact [42]."]} +{"13142578|2535224": ["Initially designed for wired networks, the SDN paradigm has also been widely recognized as an attractive and promising approach to improving wireless and mobile networks [13]."]} +{"13142578|2387055": ["Indeed, an attacker will select the less secure controllers to compromise flow tables [44]."]} +{"13142578|17934515": ["The purpose is to better optimize the inter-vehicular distance [35].", "Platooning is one promising solution for addressing these problems [35].", "Vehicles behind the \ufb01rst in this formation are called followers, and receive downstream information from other vehicles in the platoon, as well as from a supervised vehicle known as the leading vehicle to adjust the distance between them and maintain the stability of the platoon [35]."]} +{"32711727|2535224": []} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"27353195|2835258": []} +{"49557871|2623404": ["Another key feature integrating 5G architecture is the SoftwareDefined-Networking (SDN) paradigm which aims at decoupling the control plane from the data plane and hence offering network programmability and scalability with minimal cost and network congestion [5]."]} +{"49557871|10693567": ["OpenFlow [10] is the most popular protocol promoted by the Open Networking Foundation (ONF)."]} +{"5736121|16489039": ["For example, news websites or search engines can operate without charging users as they get paid by advertisers who compete for buying dedicated slots on those web pages to display ads [4]\u2013[6]."]} +{"17296108|206584087": ["Detecting DDoS attacks has been widely covered [7] especially by focusing on the victim (who is under attack?) without identifying real sources."]} +{"3949590|1762301": ["[25] and [26]."]} +{"11528463|2623404": []} +{"11528463|2387055": []} +{"11528463|206584087": []} +{"52961407|3630870": ["On the contrary, as the name indicates, in a masquerade attack, a malicious vehicle changes its identity [41] to be another vehicle, trying to produce different messages, alter, and replay with information to deceive other vehicles."]} +{"52961407|3583771": ["+is also leads to changes in the security and privacy concerns [20].", "As the content in NDN is decoupled from its original location, NDN follows a content-based security concept [20] that consists of securing the content among different network elements regardless of the used communication channel:"]} +{"29546660|1230643": ["Various aspects of such networks have been already studied and these types of networks are now well-established for many applications ranging from habitat monitoring to surveillance [1]."]} +{"32911245|2623404": ["Since wireless networks bring more latency and packet loss than the traditional SDNs, some previous works focus on control plane problems in wireless networks [14]."]} +{"24764375|11414835": ["(c) Modification of user privileges for application execution: Due to network virtualization, each user can treat the network with its own requirement provided with isolation [15], [61].", "Several threats to the security of the SDN architecture have been identified and discussed in [8]\u2013[15].", "The survey presented in [15] classifies the SDN-based hypervisors with reference to their centralized and distributed architectures.", "One of the possible solutions is to save the topology discovery state in the neighbor controller [15]."]} +{"24764375|2623404": ["ciency, reduced complexity, and better user experience [25].", "The infrastructure plane consists of all the network devices that communicate and share information with each other [25]."]} +{"24764375|2387055": ["There are various possible attacks in the SDN application plane which are briefly discussed as follows: (a) Unauthorized access to applications: An unauthorized access to these applications can help attackers bypass the security level of the controller [58], [59]."]} +{"67876092|39936276": ["Packets which are used in NDN are of two types: Interest and Data packet [5]."]} +{"4311927|2623404": ["In this regard, we believe that Software Defined Networking (SDN) [5][6][7][8] can be an important enabler of ICN, as it promises to facilitate the continuous evolution of networking architectures.", "As regards SDN, the seminal paper on the paradigm can be found at [8], surveys on SDN research issues can be found in [5][6] and [7]."]} +{"5021660|3757239": []} +{"5021660|6909107": ["Additionally, many researchers have studied different aspects of MEC [11]\u2013[13], and many the current study is for proposing architectures and/or derivation and analyzing the computation offloading from mobile nodes to MEC servers."]} +{"53878614|18687271": ["Owing to obvious complementary characteristics of distributed mobility management (DMM) and SDN paradigms, the literature contributes with a number of proposals for implementing DMM approaches in SDNized networks, e.g., [5, 12\u201314 , 21", "Inspired by approaches similar to [12], we implement the MM algorithm for RMM in more realistic settings and evaluate its performance on a richer validation framework, which gives us an edge to study the performance of the MM algorithm with varying topology size and controller loads."]} +{"15236998|2835258": []} +{"35823831|26398795": []} +{"9051060|2623404": []} diff --git a/edge/graph_104293046.jsonl b/edge/graph_104293046.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a86d6e538761d417ea91f06c8750ffb54868071d --- /dev/null +++ b/edge/graph_104293046.jsonl @@ -0,0 +1,9 @@ +{"154800567|719646": []} +{"37764184|5540088": []} +{"4327972|2357830": ["However, such data are sensitive and often related to personal activities and therefore can lead to privacy risks, e.g. pro\ufb01ling [15] and inventorying [9], [11]."]} +{"22197113|62709258": []} +{"2522462|3348390": ["have a considerable number of studies that define core IoT concepts and literature surveying the computing realm relevant to IoT [2, 3].", "relevant to IoT [2, 3], defined key constructs, investigated security issues [4, 5], developed deployment schemes for sustainable IoT [6], and even recommended architecture frameworks [7]."]} +{"1914274|469744": []} +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} +{"14873551|86629084": []} +{"14873551|10817088": ["Such data naturally become sources of contextual and situational information, which can be shared and further used in service adaptability, self-learning, personalization, and proactive delivery [1].", "The intelligent computing paradigm now considers IoT environments that support the people inhabiting them [1]."]} diff --git a/edge/graph_104293233.jsonl b/edge/graph_104293233.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..805398210e888c7cdc5a716f6056d2d24c08a0a5 --- /dev/null +++ b/edge/graph_104293233.jsonl @@ -0,0 +1,16 @@ +{"55900029|69270827": ["[73] discussed it further with regards to the applications of HMCDM methods in sustainability."]} +{"13918564|5822166": ["Ho et al. (2010) reviewed the literature of the MCDM approaches for supplier evaluation and selection.", "Table 1 Economic supplier selection criteria (De Boer et al., 2001; Huang and Keskar, 2007; Wang et al., 2009; Ho et al., 2010; Chen, 2011; Liao and Kao, 2011; Amin and Zhang, 2012).", "A detailed overview of supplier selection methods can be found in De Boer et al. (2001), Huang and Keskar (2007), and Ho et al. (2010)."]} +{"18384188|5822166": ["Ho, Xu and Dey [35] found that 68 research papers (87.", "Ho, Xu and Dey [35] found that 68 research papers (87.18", "Evaluations were based upon the unique advantages of individual techniques, including DEA, rough set theory, PROMETHEE, and VIKOR.", "In selecting both traditional and green suppliers, individual approaches have been found to be more popular than integrated approaches; the top three approaches have been the AHP, the ANP, and data envelopment analysis (DEA) [35,36] as shown in Table 1."]} +{"3754104|4968608": ["In recent years different approaches are proposed to extend the crisp MCDM methods into a fuzzy environment in order to deal with uncertain information [20,27\u201330].", "There have been proposed a huge variety of multi-criteria decision-making methods to solve such types of problems [18\u201322]."]} +{"206726233|5822166": ["Ho et al. (2010) suggested that the most widely adopted criteria for supplier selection were quality, delivery, price (or cost), manufacturing capability, service, management, technology, research and development, finance, flexibility, reputation, relationship, risk, and safety and environment"]} +{"158110342|5822166": []} +{"158627614|14038195": ["Details of AHP applications for different areas are found in the review of Ho (2008)."]} +{"69636317|7252389": []} +{"110265081|5822166": []} +{"157092466|5822166": []} +{"157049869|5822166": []} +{"38767953|14038195": ["[65, 53])."]} +{"154400412|5822166": ["Ho, Xu, and Dey (2010) on their literature review categorised supplier selection approaches into two individual approaches and integrated approaches based on the 78 journal articles published from 2000 to 2008.", "The results of the research accomplished by Ho, Xu, and Dey (2010) revealed that delivery, price and cost are the most used criteria for evaluating the performance of suppliers."]} +{"108810303|5822166": ["This answers calls in recent research (e.g. Ho et al. 2010) to extend the AHP\u2013QFD application into supplier assessment and selection.", "Without considering the impact of \u2018voice\u2019 of company stakeholders to company sustainability strategy and to supplier assessment criteria, the suppliers selected may not provide what the company exactly wants (Ho et al. 2010).", "\u20260020\u20137543 print/ISSN 1366\u2013588X online\n2012 Taylor & Francis http://dx.doi.org/10.1080/00207543.2011.639396 http://www.tandfonline.com\nHo et al. (2010) present a literature review of multi-criteria decision-making approaches for supplier evaluation and selection, and state that\u2026", "In fact, Ho et al. (2010) suggest that QFD is a promising technique for supplier assessment and selection with respect to the customer desires.", "( 2010 ) present a literature review of multi-criteria decision-making approaches for supplier evaluation and selection, and state that although approaches have been presented to deal with multiple and conflicting criteria, they have not taken into consideration the impact of business objectives and requirements of company stakeholders on the evaluating criteria.", "\u2026important information that the QFD provides is the importance weightings of the quality characteristics (HOWs), which are derived by the importance ratings of customer requirements (WHATs) together with the relationship between customer requirements and quality characteristics (Ho et al. 2010)."]} +{"108810303|14038195": ["However, Carnevalli and Miguel ( 2008 ) find some methodological difficulties of QFD, one of which is difficulty in interpreting the customers\u2019 voice.", "A comprehensive review by Ho (2008) has shown that the combined AHP\u2013QFD approach has been applied to various situations, including education requirement selection, teaching method selection, product design selection, capital budgeting project selection, facility location selection, robot selection\u2026", "Ho (2008) also notes that the\nimportance ratings of the \u2018voice\u2019 of the customer is generally determined by the decision-makers arbitrarily, which may result in a certain degree of inconsistency, and therefore degrade the quality of decisions made."]} +{"117553568|5822166": []} diff --git a/graph_1313790.jsonl b/edge/graph_10429487.jsonl similarity index 100% rename from graph_1313790.jsonl rename to edge/graph_10429487.jsonl diff --git a/edge/graph_10430339.jsonl b/edge/graph_10430339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bfc18dbc8f071b8e7e1ca181732d7817cdc224b --- /dev/null +++ b/edge/graph_10430339.jsonl @@ -0,0 +1,11 @@ +{"85548840|9828770": []} +{"12883779|56671641": []} +{"83524358|10430339": []} +{"8313629|9828770": []} +{"453775|9828770": ["The co-evolution of behavior and network dynamics can be studied in several ways, as is apparent from the increasing number of models addressing this issue (Skyrms and Pemantle, 2000; Ebel and Bornholdt, 2002; Zimmermann et al., 2004; Eguiluz et al., 2005; Pacheco et al., 2006a, 2008; Santos et al., 2006a; Hanaki et al., 2007; Tanimoto, 2007; Gross and Blasius, 2008; Poncela et al., 2008, 2009; Szolnoki et al., 2008a; Fu et al., 2009; Szolnoki and Perc, 2009).", "In other words, diversity in frequency and number of interactions emerges naturally when humans make decisions, even when one starts from a non-diverse setup (Skyrms and Pemantle, 2000; Ebel and Bornholdt, 2002; Eguiluz et al., 2005; Pacheco et al., 2006a; Santos et al., 2006a; Hanaki et al., 2007; Tanimoto, 2007; Gross and Blasius, 2008; Szolnoki et al., 2008a; Poncela et al., 2009; Szolnoki and Perc, 2009; Van Segbroeck et al., 2009)."]} +{"122907607|7064380": []} +{"13175901|9828770": []} +{"1431873|1704452": []} +{"1431873|634975": []} +{"7937343|634975": ["Many have since followed the same practice [46, 50, 51] (for a review see [14]), and there exist ample evidence in support of the claim that, especially for games that are governed by gro up interactions [47, 52], using the square lattice suffices to r eveal all the feasible evolutionary outcomes, and also that these are qualitatively independent of the interaction structure."]} +{"11187861|9828770": ["7 For a first attempt, see Section 5 of [146]."]} diff --git a/graph_1325672.jsonl b/edge/graph_10435791.jsonl similarity index 100% rename from graph_1325672.jsonl rename to edge/graph_10435791.jsonl diff --git a/edge/graph_10437489.jsonl b/edge/graph_10437489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77aea4d5607c7ff3c625bf63bc63bb22af3b92da --- /dev/null +++ b/edge/graph_10437489.jsonl @@ -0,0 +1,15 @@ +{"8817353|16525678": []} +{"7214856|5401262": ["According to Pantic et al [15], contextual information is usually extracted from various sources."]} +{"13880080|12127129": ["This section , represents five distinctive background modellings that can be classified to three different categories; Median based- [ 1-7 ], Gaussian based- [8-16] as well as KDE based- [17-19] approaches.", "There are two common approaches of Gaussian based method namely as Running Average Gaussian (RGA) which is the fastest algorithm among adaptive background subtraction methods as background adapts using just one or two parameters[ 6 ] and Gaussian Mixture Model (GMM) [8-9].", "This technique uses recursive filter to estimate median filtering so that it will reduce the computational time and memory consumption of the developed system [ 6-7 ].", "There are many works devoted to the development of background modelling algorithms for real time video processing [ 1-19 ] as it is the a backbone of the BGS algorithms."]} +{"13880080|8953108": ["Besides; brief reviews of thresholding and data validation techniques [ 20-25 ] are also discussed."]} +{"18446469|7788290": ["analysis, we refer the reader to Gavrila [ 44 ], Aggarwal and Cai [45], and the special issue of the"]} +{"7514147|206051485": ["Simple temporal and/or spatial smoothing is often used in the early stage of pre-processing to reduce camera noise and to remove transient environmental noise such as rain and snow captured in outdoor applications."]} +{"7514147|8953108": []} +{"120977895|819377": ["Researchers have made extensively study on issues associated with the model and proposed many improved algorithms[4-6]."]} +{"23125866|60779308": []} +{"783186|12127129": ["Since its introduction, the model has gained vastly in popularity among the computer vision community [4], [7], [11], [42]\u2013[44], and it is still raising a lot of interest as authors continue to revisit the method and propose enhanced algorithms [45]\u2013[50].", "According to [7], a background subtraction technique must adapt to gradual or fast illumination changes (changing time of"]} +{"11272177|7788290": []} +{"110765880|7788290": []} +{"62712512|17516538": ["In automated surveillance, the major categories of classifying moving objects are shape-based or motion-based [1]."]} +{"23744694|17516538": ["There are extensive surveys on moving object detection methods [14], [9]."]} +{"8530796|206051485": ["This estimation problem has been well studied, and several excellent surveys [27]\u2013[30], and software implementations (e.g., the Insight toolkit [31]) are available, so we do not detail registration algorithms here."]} diff --git a/edge/graph_10440280.jsonl b/edge/graph_10440280.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53be62426482313dec86d47eb161a18431ffdf21 --- /dev/null +++ b/edge/graph_10440280.jsonl @@ -0,0 +1,19 @@ +{"109077100|5747564": []} +{"8346242|8783262": []} +{"497003|2509135": ["the world\u2019s most valuable resources) is mostly underutilized [123]."]} +{"497003|1940388": []} +{"497003|15981390": ["control (MAC) [81], [82], routing and fault-tolerance [83],"]} +{"19036280|12083425": []} +{"12103882|17774971": []} +{"12103882|192934": []} +{"5747564|595093": ["Analyzing and implementing smart grid security is a challenging task, especially when considering the scale of the potential damages that could be caused by cyber attacks [46]."]} +{"40660939|17381415": []} +{"40660939|12083425": ["The majority of DER units are interfaced to the microgrid [23] using voltage-sourced converter (VSC) units."]} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"3500624|2906773": []} +{"3500624|18037424": []} +{"154677789|61248451": []} +{"10409172|6959212": []} +{"11292558|1940388": ["\u2022 Security is a serious concern in both, meters and sensors [58]."]} +{"4636647|4631990": []} +{"62899237|2135552": []} diff --git a/edge/graph_10441768.jsonl b/edge/graph_10441768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec55d14e0fe9889d80dfceedf54020b1d2374d8d --- /dev/null +++ b/edge/graph_10441768.jsonl @@ -0,0 +1 @@ +{"15772359|205286988": ["scalability, and others [ 3 ], result in a good performance on"]} diff --git a/graph_104449.jsonl b/edge/graph_104449.jsonl similarity index 100% rename from graph_104449.jsonl rename to edge/graph_104449.jsonl diff --git a/edge/graph_10453203.jsonl b/edge/graph_10453203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b4c4fa53b57059646bbc8f869c05ba35c883d0c --- /dev/null +++ b/edge/graph_10453203.jsonl @@ -0,0 +1,4 @@ +{"2818922|2257431": ["The stride is the number of bits inspected at each step of the prefix match algorithm [4].", "There are many variations to the basic trie scheme that attempt to trade off the memory requirements of the trie table and the number of memory accesses required for lookup [4]."]} +{"16782261|2257431": ["There are variations to the basic trie scheme that attempt to trade off the memory requirements of the trie table and the number of memory accesses required for lookup [10].", "The stride is the number of bits inspected at each step of the prefix match algorithm [10]."]} +{"5313480|14750997": ["RISPs are more flexible than ASIPs (Application Specific Instruction Set Processor), as their instruction set can be adapted on-demand.", "Al: \u201cReconfigurable Instruction Set Processors from a Hardware/Software Perspective\u201d; IEEE Transactions on Software Engineering, Vol. 28, NO.9, Sept. 2002.", "Processor-Level of Hierarchy In the processor-level, each processor can be seen as a RISP (Reconfigurable Instruction Set Processor) [2]."]} +{"21636418|14750997": ["The best known systems that fall into this class are Recon\ufb01gurable Instruction Set Processors (RISPs) [26]."]} diff --git a/graph_1329537.jsonl b/edge/graph_10459409.jsonl similarity index 100% rename from graph_1329537.jsonl rename to edge/graph_10459409.jsonl diff --git a/graph_1046163.jsonl b/edge/graph_1046163.jsonl similarity index 100% rename from graph_1046163.jsonl rename to edge/graph_1046163.jsonl diff --git a/edge/graph_10464056.jsonl b/edge/graph_10464056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a07d41367c388098aec08159c951145c2628147 --- /dev/null +++ b/edge/graph_10464056.jsonl @@ -0,0 +1,5 @@ +{"207171842|8914588": ["2006; Huebscher and McCann 2008].", "point out, trust is not necessarily based on self-adaptive services or its quality [McCann et al. 2006; Huebscher and McCann 2008]."]} +{"207171842|1975139": ["survey several ADLs based on graphs, process algebras, and other formalisms for dynamic software architectures [Bradbury et al. 2004]."]} +{"10464056|8914588": ["Analyzing the characteristics and trends of a large body of literature is a challenging task, consequently results of the exiting surveys [2], [4], [6]\u2013[8], [11], [15], [20] are often significantly limited to application domains or solution domains."]} +{"10464056|2109857": ["In [7], a comprehensive survey has been conducted on different types of control engineering approaches applied to middleware (e.g., web and application servers)."]} +{"38315467|627405": ["The completeness of the search is dependent upon the search criteria used and the scope of the search, and is also influenced by the limitations of the search engines used [4]."]} diff --git a/edge/graph_10464581.jsonl b/edge/graph_10464581.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1cd07bdeeed4b89e594391a9ad0c2e95e9a672ff --- /dev/null +++ b/edge/graph_10464581.jsonl @@ -0,0 +1,3 @@ +{"12322762|9045232": ["This colour space was previously used on face detection and face tracking algorithms with good results (see [7] and [8])."]} +{"245951|387610": ["Bits per pixel (bpp) will be a measure of compression for both tested compression algorithms: JPEG [5] and JPEG2000 [6]."]} +{"15899241|11239740": ["Ahanger et al. [ 17 ] have reviewed present research trends in multimedia applications and the requirements of future data delivery systems which includes a review of few video segmentation techniques."]} diff --git a/graph_1047013.jsonl b/edge/graph_1047013.jsonl similarity index 100% rename from graph_1047013.jsonl rename to edge/graph_1047013.jsonl diff --git a/edge/graph_10472024.jsonl b/edge/graph_10472024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea5bf91927949ee3d3c5bfa139d3c7f9219f4a29 --- /dev/null +++ b/edge/graph_10472024.jsonl @@ -0,0 +1 @@ +{"109901110|7706992": []} diff --git a/graph_1341026.jsonl b/edge/graph_10485376.jsonl similarity index 100% rename from graph_1341026.jsonl rename to edge/graph_10485376.jsonl diff --git a/graph_1363053.jsonl b/edge/graph_1048595.jsonl similarity index 100% rename from graph_1363053.jsonl rename to edge/graph_1048595.jsonl diff --git a/edge/graph_10488654.jsonl b/edge/graph_10488654.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..952eb81ac61c1187371ddc5d743d348c8db4d244 --- /dev/null +++ b/edge/graph_10488654.jsonl @@ -0,0 +1 @@ +{"20005213|11894197": []} diff --git a/graph_1371028.jsonl b/edge/graph_10492771.jsonl similarity index 100% rename from graph_1371028.jsonl rename to edge/graph_10492771.jsonl diff --git a/graph_1377349.jsonl b/edge/graph_10494049.jsonl similarity index 100% rename from graph_1377349.jsonl rename to edge/graph_10494049.jsonl diff --git a/graph_1387401.jsonl b/edge/graph_10494098.jsonl similarity index 100% rename from graph_1387401.jsonl rename to edge/graph_10494098.jsonl diff --git a/graph_1049844.jsonl b/edge/graph_1049844.jsonl similarity index 100% rename from graph_1049844.jsonl rename to edge/graph_1049844.jsonl diff --git a/graph_139363.jsonl b/edge/graph_10500613.jsonl similarity index 100% rename from graph_139363.jsonl rename to edge/graph_10500613.jsonl diff --git a/edge/graph_10505742.jsonl b/edge/graph_10505742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..211f188371ec83fc57bf8a07f3b599c85dcbb10f --- /dev/null +++ b/edge/graph_10505742.jsonl @@ -0,0 +1,13 @@ +{"18744164|6028805": ["\u00c7"]} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"207183151|1708582": ["in terms of reinforcement learning [14], and suggest a control strategy that adjusts node duty cycles based on animal arrival patterns [9]."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"122952522|1230643": ["In addition, wide range coverage can be regarded as the key factor in a wireless sensor system [1-3]."]} +{"53597815|14441987": ["Robots form a wireless network to exchange their findings using table-driven routing protocol (Royer and TohToh, 1999)."]} diff --git a/edge/graph_10505833.jsonl b/edge/graph_10505833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e64d698ec55ff424e41fbae2e875de0867fb586 --- /dev/null +++ b/edge/graph_10505833.jsonl @@ -0,0 +1,2 @@ +{"26435795|10799412": []} +{"13676744|5313655": []} diff --git a/edge/graph_10513458.jsonl b/edge/graph_10513458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d84cdca40e25c1593e98a74d41ee28a3806734f --- /dev/null +++ b/edge/graph_10513458.jsonl @@ -0,0 +1 @@ +{"4729357|15249785": ["It works from domain models consisting of a decision model and generic work products, and was applied to statically evaluate architectures [82]."]} diff --git a/edge/graph_10516794.jsonl b/edge/graph_10516794.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66a97db277384cf823a90da236159f9edd2af163 --- /dev/null +++ b/edge/graph_10516794.jsonl @@ -0,0 +1,2 @@ +{"14236513|10516794": ["The technical assessment of algorithm reproducibility performance is specifically dealt with in Obuchowski.8 Measurand/Reference: A measurand is the true value of the quantity intended to be measured; a reference is the true or accepted value of the measurand; a theoretical or established value based on scientific principles; an assigned value based on experimental work of some national or international organization; or a consensus value based on collaborative experimental work under the auspices of a scientific or engineering group (ISO 5725-1).", "The technical assessment of algorithm reproducibility performance is specifically dealt with in Obuchowski.(8) Measurand/Reference: A measurand is the true value of the quantity intended to be measured; a reference is the true or accepted value of the measurand; a theoretical or established value based on scientific principles; an assigned value based on experimental work of some national or international organization; or a consensus value based on collaborative experimental work under the auspices of a scientific or engineering group (ISO 5725-1).", "A detailed examination of QIB hypothesis tests is found in the QIB algorithm comparison companion paper.(8) One common theme throughout this discussion is the hierarchical progression of study planning for each QIB."]} +{"35205505|10516794": ["Four repeatability metrics are illustrated: within-subject standard deviation (wSD), the repeatability coefficient (RC), the within-subject coefficient of variation (wCV), and the intraclass correlation coefficient (ICC).(5) A test of the equality of wSD and RC between the 5 and 10mm nodules is equivalent to a test of the equality of the mean sample variances of replications between the two nodule sizes.", "In a simple regression of measured change on baseline lesion size, neither slope nor intercept was significantly different from zero for any of the algorithms, suggesting that the measured change is not linearly related to the lesion size and that the mean change does not differ from zero, respectively.(5) This finding is expected since the change measurement is a proportional change measurand.", "5 min apart, so that there is no possibility of a true biological change occurring.(5) These studies offer a valid assessment of algorithms\u2019 reproducibility, as well as their bias for measuring the change in tumor volume when there is no true change.", "Table 4 presents the agreement assessment based on these LOAs, as well as two other measures of agreement: the total deviation index (TDI) with 80 and 95% coverage probability (CP), and the CP for acceptable differences of 10 and 50mm(3).(5) The TDI_80% and TDI_95% are computed nonparametrically by using the quantile regression with SAS procedure QUANTREG, where the response is the absolute difference of measured and true volume, with intercept term only and with quantiles set at 0.", "A test of the equality of wSD and RC between the 5 and 10mm nodules is equivalent to a test of the equality of the mean sample variances of replications between the two nodule sizes.(5) Such a test can be carried out using the SAS procedure GENMOD with sample variance of replications for each nodule as the response and nodule size as the independent variable; identical p-values are obtained for wSD and RC.", "The CP_10 and CP_50 are estimated as the proportion of the absolute difference less than or equal to 10 or 50, respectively.(5) The same CP estimate can also be obtained by fitting a GEE model in SAS procedure GENMOD, where the binary response takes a value of one if the absolute difference of measured volumes and true value is less than or equal to 10 (or 50) and takes a value of 0 otherwise.", "In contrast, repeatability refers to closeness of agreement between repeated measurements taken under the same conditions.(5,6) A condition that changes over repeated measurements may be considered to have either random or fixed effects on the measurement.", "The RC shows the same pattern because it is equivalent to wSD, but with a different interpretation.(5) The wCV, on the other hand, does not exhibit this trend because it is a function of both the standard deviation and the nodule size (i.", "If the conditions under study are all considered to have random effects, then typically the RI takes the symmetrical form \u00f0 RDC,RDC\u00de, where RDC is called the reproducibility coefficient, the least significant difference between two measurements taken under different conditions.(5) If some of the conditions under study are considered to have fixed effects, then the RI can be asymmetric, as we will show below for the QIBA 3a study.", "Bias and precision provide two separate evaluations of algorithm performance, but they do not provide the aggregated impact of bias and precision on the agreement between the measured volume and the true volume.(5) There is a trade-off between bias and precision, and different agreement indices evaluate this trade-off differently."]} diff --git a/graph_1400872.jsonl b/edge/graph_10517577.jsonl similarity index 100% rename from graph_1400872.jsonl rename to edge/graph_10517577.jsonl diff --git a/edge/graph_10526773.jsonl b/edge/graph_10526773.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ccf4a60f2c773822bd55966760bb269713b9cf3 --- /dev/null +++ b/edge/graph_10526773.jsonl @@ -0,0 +1,2 @@ +{"46424742|1902238": []} +{"29215168|1902238": []} diff --git a/graph_141.jsonl b/edge/graph_10529474.jsonl similarity index 100% rename from graph_141.jsonl rename to edge/graph_10529474.jsonl diff --git a/edge/graph_10532321.jsonl b/edge/graph_10532321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47c0082072d69758980358385c081e909911968a --- /dev/null +++ b/edge/graph_10532321.jsonl @@ -0,0 +1,7 @@ +{"16809905|2623404": ["In this work, to avoid delay communication between routers and the centralized controller, we consider the default rule which is just to forward packets to a default port (without contacting the controller), and each switch has exactly one default port [28]."]} +{"16809905|10837932": ["Therefore the green networking has been attracting a growing attention during the last years (see the survey [2]).", "Starting from the pioneering work of Gupta [10], the idea of power proportionality has gained a growing attention in networking research area [2][6]."]} +{"381326|8450611": ["One method \nfor coping with these limi\u00adtations is to use compression schemes to reduce the number of TCAM rules required \nto represent a classi.er."]} +{"2879330|1123458": ["This is related to the so-called S -lemma (or S -procedure) in control (e.g., Boyd et al. [40], P\u00b4olik and Terlaky [119]): The S -lemma essentially gives the boundary between what we can solve exactly, and where solving the subproblem becomes di\ufb03cult."]} +{"15762598|2623404": ["Software-Defined Network (SDN) has been envisioned as the next generation network infrastructure, which promises to simplify network management by decoupling the control plane and data plane [1], [2]."]} +{"14606265|2623404": ["Software Defined Networking (SDN) [13] paradigm is aiming to facilitate the task of network management by transforming switches into programmable entities.", "This assumes that the SDN network is reaching its objective whatever is the path followed across the network (e.g., the cost of using internal links is low, the network is of low diameter, etc.).", "Software Defined Networking (SDN) [13] paradigm is aim-", "In HotSDN, pages 43\u201348.", "HotSDN\u201914, August 22, 2014, Chicago, IL, USA.", "SDN in general and OpenFlow in particular enable fine-grained flow-level traffic control for various management tasks (e.g., rate limitation, access control, accounting).", "One of the major challenges of SDN is to raise the level of abstraction with the objectives of easing network management and facilitating the development, debugging and deployment of new applications.", "OpenFlow [9] is a communication protocol enabling SDN, which has been implemented\nPermission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.", "Through these two aspects, we present a novel way to consider SDN networks composed of OpenFlow switches, yielding further flexibility and better efficiency.", "The idea behind Software Defined Networking (SDN) is to conceive the network as one programmable entity rather than a set of devices to manually configure, and OpenFlow meets this objective."]} +{"7040435|10693567": ["0), and the fields continues to grow as more fields are added in [1].", "In OpenFlow-based SDN, forwarding policies are translated into flow tables to act out[1], [13]."]} diff --git a/graph_141264.jsonl b/edge/graph_10534880.jsonl similarity index 100% rename from graph_141264.jsonl rename to edge/graph_10534880.jsonl diff --git a/edge/graph_10536678.jsonl b/edge/graph_10536678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e7bf5890ed4a14e8759b1581c678da939f4de44 --- /dev/null +++ b/edge/graph_10536678.jsonl @@ -0,0 +1,2 @@ +{"14409303|816774": ["Finally, a taxonomy of Grid scheduling algorithms can be found in [9]."]} +{"13925778|17474643": ["Similarly, in [7] the two models are classi\ufb01ed based on the collaboration type: volunteer, in Federation, or not, in Multi-Cloud."]} diff --git a/edge/graph_10540477.jsonl b/edge/graph_10540477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..850b4b542c2e2bfcda17369f938a8cfe767a305d --- /dev/null +++ b/edge/graph_10540477.jsonl @@ -0,0 +1 @@ +{"7785631|7978903": []} diff --git a/edge/graph_10542290.jsonl b/edge/graph_10542290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4100698f654c8f92b6793e2b5fc3cf24a54fd781 --- /dev/null +++ b/edge/graph_10542290.jsonl @@ -0,0 +1,3 @@ +{"7599280|20178897": ["Population has increased, the traditional grid has worn out thus addition of more and more electric equipments bring instability to the traditional electric power grid [2].", "In this scenario the process of monitoring, controlling and conserving energy in an organization/ building may be termed as energy management [2]."]} +{"7599280|18037424": ["Integration of communication and information technologies (ICT) in electrical power grid will transform the current grid into smart grid [10]."]} +{"206778849|6959212": ["Besides residential premises, smart grid also needs a communication infrastructure to connect the utility assets [14]\u2013[16]."]} diff --git a/edge/graph_10542845.jsonl b/edge/graph_10542845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1cee118a4b818c232fb7c75a7abf6a870f85453d --- /dev/null +++ b/edge/graph_10542845.jsonl @@ -0,0 +1,2 @@ +{"2684130|10542845": []} +{"59777538|8530790": ["A straightforward way to obtain selection pressure towards non-dominated solutions is therefore to count for each solution in the population the number of times it is dominated by another solution in the population, which is called the domination count of a solution [3, 16].", "In the first phase, the domination count [16] of all solutions is first computed as mentioned above."]} diff --git a/edge/graph_10545072.jsonl b/edge/graph_10545072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce7338f360301aa3c482cdae67d707c980163d45 --- /dev/null +++ b/edge/graph_10545072.jsonl @@ -0,0 +1,2 @@ +{"34506027|1176034": ["Temporal and spatial granularity techniques are proposed, respectively, in Bittner (2002), Bittner and Smith (2001) and applied in knowledge discovery (Be\u00b4dard et al ., 2001; Roddick & Spiliopoulou, 2002)."]} +{"17649096|7216558": []} diff --git a/graph_1055296.jsonl b/edge/graph_1055296.jsonl similarity index 100% rename from graph_1055296.jsonl rename to edge/graph_1055296.jsonl diff --git a/edge/graph_10553058.jsonl b/edge/graph_10553058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..328b72c8b94b2932187a2258ff0f0633608b51db --- /dev/null +++ b/edge/graph_10553058.jsonl @@ -0,0 +1,3 @@ +{"37892147|1230643": ["may coexist in the same geographical region in the future [1] [2]."]} +{"205287201|12681089": ["In addition, important techniques such as multi-input multi-output systems for which analytical models are available [53] have not been considered."]} +{"2426770|1230643": ["As an emerging technology, wireless sensor networks (WSNs) have a wide range of potential applications [1] [2] [3], including environment monitoring, smart buildings, medical care, industry and military applications."]} diff --git a/graph_141676.jsonl b/edge/graph_10555832.jsonl similarity index 100% rename from graph_141676.jsonl rename to edge/graph_10555832.jsonl diff --git a/edge/graph_10559330.jsonl b/edge/graph_10559330.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3020b151a69d230d8ce1cc2427e30a49f6c81fd --- /dev/null +++ b/edge/graph_10559330.jsonl @@ -0,0 +1 @@ +{"62528177|15040462": []} diff --git a/edge/graph_10562205.jsonl b/edge/graph_10562205.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1645b733d82b6cfaa88a98748d686d3516269e0 --- /dev/null +++ b/edge/graph_10562205.jsonl @@ -0,0 +1,6 @@ +{"4700370|14441987": []} +{"6584861|14441987": ["Several routing protocols [4] have been developed so far to handle the multi hop, self organizing network."]} +{"7956904|14441987": ["In ad hoc networks, current routing protocols can be classified into proactive (table-driven) [36], reactive (on-demand) [6, 18, 22, 29, 30] or hybrid routing [13, 14, 20, 27, 37]."]} +{"14266212|14441987": ["Recently, more general approaches for a scalable MANET have been explored in the literature [6-18, 32, 33, 36]."]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"7056671|10562205": ["These nodes are often have energy constrained that is, battery power and devices are free to join or leave the network [1-2].", "Routing can be either flat structured or hierarchical structure [1-2]."]} diff --git a/edge/graph_10564019.jsonl b/edge/graph_10564019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..250875d86bf63c0daf8c1fa60b3cbbdc505c4c14 --- /dev/null +++ b/edge/graph_10564019.jsonl @@ -0,0 +1,2 @@ +{"60592603|14799853": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} diff --git a/edge/graph_10565822.jsonl b/edge/graph_10565822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a074311486cb96e24115814016abe85f02ed352b --- /dev/null +++ b/edge/graph_10565822.jsonl @@ -0,0 +1 @@ +{"1777|7515516": ["Current models of text comprehension (Johnson-Laird, 1983; Schmalhofer and Glavanov, 1986; van Dijk and Kintsch, 1983) assume, in addition to the surface form (or verbatim) representation, two distinct, but interacting, levels of cognitive representation: (1) the textbase or propositional\u2026"]} diff --git a/edge/graph_10566759.jsonl b/edge/graph_10566759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37ad9ea3b4bda9eeb5130dce3bbb603aa5accb6b --- /dev/null +++ b/edge/graph_10566759.jsonl @@ -0,0 +1,4 @@ +{"40421842|15744805": []} +{"469739|8953108": ["Sezgin and Sankur [3] described 40 thresholding algorithms and categorized them according to the used information content."]} +{"8953108|15744805": []} +{"7300608|8953108": ["The best method, in this test, is the LLT. Recently, Sezgin and Sankur (2004), compare 40 binarization techniques and they conclude that the local based technique of Sauvola and Pietikainen (2000) as well as the technique of White and Rohrer (IIFA) (Trier and Taxt, 1995b) are the best performing document binarization techniques.", "The best method, in this test, is the LLT. Recently, Sezgin and Sankur (2004), compare 40 binarization techniques and they conclude that the local based technique of Sauvola and Pietikainen (2000) as well as the technique of White and Rohrer (IIFA) (Trier and Taxt, 1995b) are the best performing\u2026", "\u2026existence of all these binarization techniques, it is proved, by evaluations that have been carried out (Trier and Taxt, 1995a; Trier and Jain, 1995; Leedham et al., 2003; Sezgin and Sankur, 2004), that there is not any technique that can be applied effectively to all types of digital documents."]} diff --git a/graph_105791.jsonl b/edge/graph_105791.jsonl similarity index 100% rename from graph_105791.jsonl rename to edge/graph_105791.jsonl diff --git a/graph_1417641.jsonl b/edge/graph_10592271.jsonl similarity index 100% rename from graph_1417641.jsonl rename to edge/graph_10592271.jsonl diff --git a/graph_1421946.jsonl b/edge/graph_10599713.jsonl similarity index 100% rename from graph_1421946.jsonl rename to edge/graph_10599713.jsonl diff --git a/graph_1428199.jsonl b/edge/graph_10604465.jsonl similarity index 100% rename from graph_1428199.jsonl rename to edge/graph_10604465.jsonl diff --git a/graph_145281.jsonl b/edge/graph_10605539.jsonl similarity index 100% rename from graph_145281.jsonl rename to edge/graph_10605539.jsonl diff --git a/graph_1542716.jsonl b/edge/graph_10606961.jsonl similarity index 100% rename from graph_1542716.jsonl rename to edge/graph_10606961.jsonl diff --git a/edge/graph_10608305.jsonl b/edge/graph_10608305.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9cb771d70aa730779b2cdfb679c67dbfc9654c8 --- /dev/null +++ b/edge/graph_10608305.jsonl @@ -0,0 +1 @@ +{"5929770|10658846": []} diff --git a/graph_106176.jsonl b/edge/graph_106176.jsonl similarity index 100% rename from graph_106176.jsonl rename to edge/graph_106176.jsonl diff --git a/graph_1547332.jsonl b/edge/graph_1061957.jsonl similarity index 100% rename from graph_1547332.jsonl rename to edge/graph_1061957.jsonl diff --git a/edge/graph_10633095.jsonl b/edge/graph_10633095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d77b78f49f3caa8941892e3776c824ffb0226ad1 --- /dev/null +++ b/edge/graph_10633095.jsonl @@ -0,0 +1 @@ +{"1136|15485505": ["\u2026and variants of the PCP Theorem and their applications to the study of the approximability of optimization problems are too many to summarize here, and we refer the reader to the chapter on hardness of approximation in Vazirani\u2019s book [Vaz01] and to some recent survey papers [Aro02, Fei02, Tre04]."]} diff --git a/graph_155150.jsonl b/edge/graph_1063643.jsonl similarity index 100% rename from graph_155150.jsonl rename to edge/graph_1063643.jsonl diff --git a/graph_1560135.jsonl b/edge/graph_10639845.jsonl similarity index 100% rename from graph_1560135.jsonl rename to edge/graph_10639845.jsonl diff --git a/edge/graph_106405113.jsonl b/edge/graph_106405113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85d0ac69dc3e21050ff74eaa290872ab0d3d2ce4 --- /dev/null +++ b/edge/graph_106405113.jsonl @@ -0,0 +1 @@ +{"23501|17393937": ["While there has been success having introductory students learn both coding and testing simultaneously [6], quite a few authors caution that novice programmers have difficulty doing so and that a good set of tools that simplify, incentivize and reinforce the testing process is essential [7,8,9]."]} diff --git a/edge/graph_106410481.jsonl b/edge/graph_106410481.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7c7b747906bf8124c61782654701df4b5e954af --- /dev/null +++ b/edge/graph_106410481.jsonl @@ -0,0 +1,12 @@ +{"169770795|3628110": []} +{"169770795|37852736": []} +{"169770795|1464669": []} +{"169770795|3434731": []} +{"169898563|49527603": []} +{"169898563|3628110": ["[31] discusses blockchain security enhancement achievements for blockchain systems like Smart pool, Quantitative framework, Oyente, Hawk and Town Crier.", "The work in [31] explains the unique features of blockchain technology along with its reliable and convenient services [30].", "In [31], the popular blockchain systems such as Ethereum, bitcoin, Monero, and the security threats for blockchain in real time scenarios was deliberates."]} +{"169898563|44461432": ["IoT is defined as a system of interconnected computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction [8, 9]."]} +{"56657898|27262729": ["sting studies on blockchain transaction classi\ufb01cation focus on Bitcoin, their \ufb01ndings are equally relevant to other cryptocurrencies that commonly record the sequence of coin exchange. The authors in [12] argued that the analysis of the blockchain transaction pattern involves three main steps: 1) Transaction graph: the \ufb02ow of the transactions in the blockchain can be represented as a graph. In this mo"]} +{"59314746|49527603": []} +{"59314746|3932531": ["Other reviews focus on security issues of the blockchain (Khan and Salah, 2017; Li et al., 2017a; Meng et al., 2018) and on its potential to enable trust and decentralisation in service systems (Seebacher et al."]} +{"59314746|3628110": []} +{"59314746|27262729": []} diff --git a/edge/graph_106411849.jsonl b/edge/graph_106411849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9b9d16a1a76e97480ba3ad685f5442adad8658e --- /dev/null +++ b/edge/graph_106411849.jsonl @@ -0,0 +1,31 @@ +{"2704042|7185733": []} +{"15958288|16709997": ["Hand has produced an extensive summary of the literature for 3D interaction in desktop and VR applications and usability study results [1997]."]} +{"15800750|17024419": ["Augmented reality (AR), a special case of mixed reality, denotes a real-time representation of the real world that is digitally augmented by adding graphics, sound or video [9]."]} +{"17024419|206986719": ["7a) that show 3D objects, or personal digital assistants/PDAs [161] (Fig."]} +{"17024419|469744": ["Compared to virtual environments, AR tracking devices must have higher accuracy, a wider input variety and band-width, and longer ranges [17].", "Following [17, 19], an AR system: \uf0b7 combines real and virtual objects in a real environment; \uf0b7 registers (aligns) real and virtual objects with each other; and \uf0b7 runs interactively, in three dimensions, and in real time.", "In the meantime, several surveys appeared that give an overview on AR advances, describe its problems, classify and summarise developments [17, 19, 28]."]} +{"14392843|469744": ["Azuma identifies the three key characteristics of Augmented Reality: combining real and virtual images, the virtual imagery is registered with the real world, and it is interactive in real time [1]."]} +{"17488918|7185733": []} +{"26536511|16709997": ["Hand [11] and Bowman [12, 13, 14] identify similar sets of universal tasks for virtual environments; namely object selection, manipulation, and viewpoint control."]} +{"26536511|7185733": ["In an HCI context, the definition of gesture should be extended to include the manipulative use of the hands to allow the user, as Pavlovic suggests, \u201cto perform tasks that mimic both the natural use of the hand as a manipulator, and its use in the human-machine communication\u201d [20]."]} +{"791733|469744": ["In 1997, the first author published a survey [ 3 ] (based on a 1995 SIGGRAPH course lecture) that defined the field, described many problems, and summarized the developments up to that point."]} +{"6980283|45775424": ["However, many manipulation techniques have been arbitrarily implemented in many AR applications without formative evaluation or guidelines [6-7]."]} +{"4625011|3579945": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|13991708": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|4719202": ["Note that picking items represents from 55 % to 65 % of the total cost of warehousing operations [75], which are still mostly carried out through a pick-by-paper approach."]} +{"4625011|469744": ["This definition is broader than the one given by other researchers [3], who disregarded photo-based augmentations, which have proved to be effective in industrial environments."]} +{"206986719|469744": ["Azuma [3] provides a commonly accepted definition of AR as a technology which (1) combines real and virtual imagery, (2) is interactive in real time, and (3) registers the virtual imagery with the real world.", "For OST HMDs, one of the main challenges is the generation of correct occlusion effects between virtual and real objects [3].", "From our own research experience and by studying the existing technology surveys [3][4], it is clear that to provide an effective AR experience there are a number of factors that must be developed, including: (a) Graphics rendering hardware and software that can create the virtual content for overlaying the real world (b) Tracking techniques so that the changes in the viewer\u2019s position can be properly reflected in the rendered graphics (1)Email: zhou0099@ntu.", "[3] and the more recent 2001 Azuma et al."]} +{"18246962|469744": ["The images can be merged using context-aware AR systems; however, problems such as registration between the virtual objects and the real objects needs to be overcome [14]."]} +{"6741106|45775424": ["[9, 10, 47]), or to provide usability-oriented guidelines for design (e."]} +{"108560308|469744": ["\u2026interaction tool that overlays computer-generated information on the real-world environment [2] and can be described as a set of three key features [3]: combination of real and virtual objects in a real environment; real-time interaction with the system, able to reac t to user\u2019s inputs;\u2026"]} +{"12542837|17024419": ["Lately, the performance of mobile devices, such as smartphones and tablet devices, has been increasing at an accelerated rate, and mobile augmented reality (AR) is very popular and used by the general public for commercial or product promotional activities [1,2]."]} +{"1788482|469744": ["The model was a CommitMethod[2] x (Interface[2] x ScreenSize[4]) mixed model ANOVA.", "LucidTouch [24] addresses the problem by introducing pseudo-transparency , a concept borrowed from augmented reality [2]."]} +{"62909121|206986719": []} +{"3089227|16709997": ["Template matching approaches for special hand features like the finger tips restrict the hand in its flexibility of defor-\nmation since the finger tips should always be visible in the camera images [28, 10]."]} +{"3089227|7185733": ["The parameters which are estimated by the calibration procedure are the focal lengths of both cameras, the translation and rotation from one to the other camera and the\nstructure depth with regard to one camera coordinate frame."]} +{"1119376|4668902": ["[283], Mittal [284], and Han and Orshansky [285] describe the reasons behind approximate computing and explore the current approximation techniques in hardware and software."]} +{"1119376|469744": ["[9], who examined the impact of an augmented reality system"]} +{"1119376|17024419": []} +{"492782|29778392": []} +{"44598714|469744": []} +{"37815455|469744": ["AR refers to a combination of real world and virtual computergenerated objects where virtual objects are registered in 3D and can be interacted with real time [1]."]} +{"37815455|17024419": []} diff --git a/edge/graph_106411975.jsonl b/edge/graph_106411975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20eda19ac6ea479bff7fed0af82270dbbc072664 --- /dev/null +++ b/edge/graph_106411975.jsonl @@ -0,0 +1,7 @@ +{"6680874|9976187": ["The exposition are more conceptual and less technical than (Mourad et al., 2013).", "Mourad et al. (2013) surveyed the research on latent tree models as of 2012 in details."]} +{"6961863|16575201": ["Despite these qualms, researchers often accept these assumptions because the assumptions do not necessarily harm the quality of results [24], and the assumptions help simplify the problem so it is computationally tractable [8].", "A number of similar algorithms are reviewed in [8]."]} +{"16448471|9976187": ["We refer the readers to [15] for a detailed survey."]} +{"1011342|1805048": ["Collaborative filtering techniques can be readily applied to our user stance-issue matrix (see [46] for a survey)."]} +{"52917676|2011473": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"52286330|16768404": ["SA can be looked from three different levels of granularity which are documentlevel, sentence-level and aspect-level [2] [3] [4]."]} diff --git a/graph_1567004.jsonl b/edge/graph_10644788.jsonl similarity index 100% rename from graph_1567004.jsonl rename to edge/graph_10644788.jsonl diff --git a/graph_1568096.jsonl b/edge/graph_10652696.jsonl similarity index 100% rename from graph_1568096.jsonl rename to edge/graph_10652696.jsonl diff --git a/edge/graph_10657013.jsonl b/edge/graph_10657013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1be7f114d8589f26b0cdaf69cbabb490190d9cb1 --- /dev/null +++ b/edge/graph_10657013.jsonl @@ -0,0 +1,13 @@ +{"18479183|3330313": []} +{"18559882|8125630": []} +{"14370906|5556391": ["Class imbalance in data can lead to a great performance reduction [20] [21] and poses difficult challenges to online learning including concept drift detection [22].", "Second, too few examples from the minority classes can make the time arbitrarily long until the concept drift is detected, which makes it difficult to infer the source of the error for the minority class \u2013 a drift or merely a result of noise [22]."]} +{"13852924|18567112": []} +{"207223163|15247126": ["A covert channel tries to hide the very existence of any communication [Lampson 1973; Zander et al. 2007] by using a channel that is usually not intended for communication (e.g., timing information in between packets or unused bits in the IP header).", "Afterward, adversary could use covert channels [Zander et al. 2007] to send sensitive data outside the protected network."]} +{"207223163|14697846": []} +{"18567112|6670217": ["art considering the popular mobile OS platforms [31], [32]."]} +{"15109750|7839197": ["A system of intelligent agents using collaborative information and mobile agent technologies [1] [9] is developed to implement a prototype intrusion detection system [3]."]} +{"17504736|13172512": ["Given the off-the-shelf availability of many machine learning (ML) techniques, as well as their high efficiency in dealing with statistical data, they have been extensively used in the traffic classification literature [22]."]} +{"12595430|12815020": []} +{"12595430|6430931": ["Table 1 Summary of popular datasets in the intrusion detection domain [30]"]} +{"3439578|3330313": ["outlier detection [13], [14] are well established areas in their own right, but much less research has been conducted on how to treat unknown samples in an incremental context, which is the focus of this work."]} +{"15087039|14077778": []} diff --git a/edge/graph_10658846.jsonl b/edge/graph_10658846.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2d3d96d887cf161cf89fce13565a10389ea533d --- /dev/null +++ b/edge/graph_10658846.jsonl @@ -0,0 +1,2 @@ +{"11436165|6392800": ["Weintroducetwomechanisms,prediction\u00admisscorrectionandpre-wakeup,toimprovethehitratio andtoreducethedelayoverhead."]} +{"38058229|10658846": []} diff --git a/edge/graph_10663005.jsonl b/edge/graph_10663005.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a7db20f5936c4c8276741d524cb9eb94316acde --- /dev/null +++ b/edge/graph_10663005.jsonl @@ -0,0 +1,10 @@ +{"29014440|7482876": ["The movement of the receiver causes frequency shift in different paths, resulting in Doppler Spread and consequent inter-carrier interference [1]."]} +{"11548770|12681089": []} +{"17331024|15255963": ["useful to obtain more accurate estimates of system performance measures [18], we choose the Lloyd\u2013Max technique [17] instead of the equiprobable method to partition the amplitude of the SNR in this paper."]} +{"7482876|12681089": ["A complete description of the channel is therefore given by the time-variant channel impulse response [2]."]} +{"1721313|2835258": []} +{"206454765|8909218": []} +{"13652874|7686677": []} +{"22071924|22833814": ["To satisfy these demands, HST wireless communication systems have to overcome many challenges resulting from the high speed of the train that can easily exceed 250 km/h, such as fast handover, fast travel through widely diverse scenarios, and large Doppler spreads [2] besides some challenges inherited from conventional trains such as high penetration losses, limited visibility in tunnels, and the harsh electromagnetic environment [3]."]} +{"38007893|25686668": ["However, in straight tunnels, the attenuation rates of different frequencies differ [13]."]} +{"31848895|25686668": ["Variety of tunnel channel models have been developed based on di\ufb00erent modeling methods [4], such as geometrical optics (GO) [5,6], the modal theory [7], and \ufb01nite-state Markov models (FSMMs) [8,9]."]} diff --git a/edge/graph_10668009.jsonl b/edge/graph_10668009.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aeda498d37767e3bae2dc37cc2c4c9eaaba2155d --- /dev/null +++ b/edge/graph_10668009.jsonl @@ -0,0 +1 @@ +{"6674407|192934": []} diff --git a/graph_15707.jsonl b/edge/graph_10682348.jsonl similarity index 100% rename from graph_15707.jsonl rename to edge/graph_10682348.jsonl diff --git a/graph_1574374.jsonl b/edge/graph_10685070.jsonl similarity index 100% rename from graph_1574374.jsonl rename to edge/graph_10685070.jsonl diff --git a/edge/graph_10686346.jsonl b/edge/graph_10686346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d1e3d3982eefd0085d5ddba281ee6b95b4a3bbc --- /dev/null +++ b/edge/graph_10686346.jsonl @@ -0,0 +1,6 @@ +{"12787379|11013798": ["ALTHOUGH the problem of fault detection and localization has been widely studied in general communication networks [1]\u2013[5], it continues to attract extensive research attentions in optical networks [6]\u2013[18] as WDM (Wavelength Division Multiplexing) technology is widely deployed in the past decade."]} +{"8252720|1775475": ["A more thorough survey of QoS in the mobile computing environment is given in [79]."]} +{"8252720|14379823": []} +{"8252720|15471820": ["Solving interworking issues will be greatly facilitated by the pertinence of optical control protocols to IP (e.g., MPLS/GMPLS, RSVP/RSVP-TE) [ 92 ]."]} +{"8252720|11726599": []} +{"1915174|10287248": []} diff --git a/edge/graph_10693567.jsonl b/edge/graph_10693567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19578aefea3c006e89ef62058386e7eaffb14b58 --- /dev/null +++ b/edge/graph_10693567.jsonl @@ -0,0 +1,5 @@ +{"2468884|6611633": ["Over the course of the 1980s, a large number of researchers attempted to realize process migration with varying degrees of success (Smith [7] provides a survey)."]} +{"7464498|10559330": ["Hilmi E. Egilmez 1,3 , Burak Gorkemli 1,2 , A. Murat Tekalp 1,3 , Seyhan Civanlar 2 1 College of Engineering, Ko\u00e7 University, Istanbul, Turkey 2 ARGELA Technologies, Istanbul, Turkey"]} +{"18609967|15540889": []} +{"18609967|15247126": ["In the paper ([4]), the authors summarized the methods to decrease the covert channel\u2019s capacity in the network environment.", "To resolve this problem, we shall allow the high level host send ACK packet to the low level host, but this method may produce new problem, for the mechanism can bring about covert channel([4]), and the covert channel enable the high level host transfer information to the low level host, then the system is not secure."]} +{"9061180|1252121": ["With such approach the routers would forward the data traffic without concern about how the routing decision is processed.", "The Internet is composed by groups of networks connected in a decentralized manner [8]."]} diff --git a/edge/graph_10694510.jsonl b/edge/graph_10694510.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42134f7d5e63c1118db51b4961d266dfd24ff423 --- /dev/null +++ b/edge/graph_10694510.jsonl @@ -0,0 +1,5 @@ +{"2493033|11591301": ["One concept that the LSTM layers likely learn is negation, which is known to be important for sentiment analysis (Wiegand et al., 2010)."]} +{"7973523|15273230": []} +{"9036821|393948": ["A deep neural network intrinsically learns a high level representation of the data [Bengio et al., 2013], thus avoiding laborious work such as feature engineering.", "However, the success of deep learning heavily relies on the availability of large-scale training data [Bengio et al., 2013; Bengio, 2009].", "5dia), the network is more easily to be trapped in saturating regions [Bengio et al., 2013] after long time training.", "Moreover, when is set to a relatively high value (> 0.5dia), the network is more easily to be trapped in saturating regions [Bengio et al., 2013] after long time training."]} +{"16841192|393948": []} +{"886027|393948": ["With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al.", "With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al., 2013a), language modeling (Bengio et al., 2003; Mnih and Hinton, 2009) and NER\u2026"]} diff --git a/graph_1576654.jsonl b/edge/graph_10698492.jsonl similarity index 100% rename from graph_1576654.jsonl rename to edge/graph_10698492.jsonl diff --git a/edge/graph_10709221.jsonl b/edge/graph_10709221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..032af73db5b3afc58f4d2202b1b98fbea70190f2 --- /dev/null +++ b/edge/graph_10709221.jsonl @@ -0,0 +1,2 @@ +{"16042503|12060835": ["The issue of resource harvesting has been widely studied in the electromagnetic communication domain [9, 31].", "A broad study for energy harvesting in electromagnetic communications is given in[31]."]} +{"7298608|12060835": ["Categories and Subject Descriptors C.2.1 [Computer-Communication Networks]: Network Architecture and Design\u2014Wireless Communication\nKeywords Wireless Nanosensor Networks, Energy Harvesting, Terahertz Band Communication, Graphene, Nanowires"]} diff --git a/graph_1071312.jsonl b/edge/graph_1071312.jsonl similarity index 100% rename from graph_1071312.jsonl rename to edge/graph_1071312.jsonl diff --git a/edge/graph_10713483.jsonl b/edge/graph_10713483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..989bac8033a234a0a07703b658632ca526c6105c --- /dev/null +++ b/edge/graph_10713483.jsonl @@ -0,0 +1,4 @@ +{"108945431|10713483": []} +{"108945431|205286988": []} +{"21991001|5660618": []} +{"16247004|1230643": ["In a WSN (Wireless Sensor Network) a group of nodes communicate environmental data to a central device, called sink [1]."]} diff --git a/graph_1596424.jsonl b/edge/graph_10716755.jsonl similarity index 100% rename from graph_1596424.jsonl rename to edge/graph_10716755.jsonl diff --git a/edge/graph_10723959.jsonl b/edge/graph_10723959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a460905cdda55b949117bb5685067aa7b756643 --- /dev/null +++ b/edge/graph_10723959.jsonl @@ -0,0 +1 @@ +{"12871762|7788290": ["that it can handle cases such as nonperiodic motion or complete occlusion.Thesecapabilitiesarepowerfulbecauseconventional model-based motion prediction methods [10], [18], [ 19 ] must use a training process to achieve the same goal."]} diff --git a/edge/graph_10725980.jsonl b/edge/graph_10725980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a33017a9fcd0d106894b74763b8c5cc9383914a1 --- /dev/null +++ b/edge/graph_10725980.jsonl @@ -0,0 +1,2 @@ +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} +{"60995548|8530790": []} diff --git a/edge/graph_10727348.jsonl b/edge/graph_10727348.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06298003dee944806af8f5a16281235b0611904a --- /dev/null +++ b/edge/graph_10727348.jsonl @@ -0,0 +1,3 @@ +{"17222153|14889616": ["In Section IV, we focus on EWF code optimization for scalable EWF multicast of scalable coded video stream encoded by recently introduced extension of H.264 AVC video coding standard [18] called H.264 scalable video coding (SVC) [19].", "With the described setting, the scalable EWF multicast system design reduces to the design of the EWF code such that given quality-of-service (QoS) guarantees for different receiver classes are satisfied."]} +{"17222153|3540699": ["In Section IV, we focus on EWF code optimization for scalable EWF multicast of scalable coded video stream encoded by recently introduced extension of H.264 AVC video coding standard [18] called H.264 scalable video coding (SVC) [19].", "In this section, we discuss a general approach where, as QoS parameters, we select the probabilities of complete reconstruction of different importance classes of the source block at the receivers in different receiver classes."]} +{"6297983|14889616": ["Different kind of MDC codes exist: Scalable Video Coding (SVC) requires the first i descriptions to decode the i + 1 description and increase the quality of the video [11]."]} diff --git a/graph_1596610.jsonl b/edge/graph_10727646.jsonl similarity index 100% rename from graph_1596610.jsonl rename to edge/graph_10727646.jsonl diff --git a/edge/graph_10734291.jsonl b/edge/graph_10734291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51976733a3149773af41ef91d01508fec6f3c63e --- /dev/null +++ b/edge/graph_10734291.jsonl @@ -0,0 +1 @@ +{"32742862|10734291": []} diff --git a/edge/graph_10735169.jsonl b/edge/graph_10735169.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c2c8eb69c1842a675187ee1ee9d76291a16b924 --- /dev/null +++ b/edge/graph_10735169.jsonl @@ -0,0 +1 @@ +{"5972953|8310135": ["For example, the reported figures for entity recognition range from 60 % to 90 % and generally correspond to the type of entities to be extracted [15]."]} diff --git a/edge/graph_10739218.jsonl b/edge/graph_10739218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad8c79ff03243c7f36e5572761384ec0815305d8 --- /dev/null +++ b/edge/graph_10739218.jsonl @@ -0,0 +1 @@ +{"6323590|1708582": ["Fig. 3. Standard reinforcement learning model [ 22 ]."]} diff --git a/edge/graph_10741988.jsonl b/edge/graph_10741988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e52492f94e5731fc2f772ab9fb759df51b40290e --- /dev/null +++ b/edge/graph_10741988.jsonl @@ -0,0 +1,2 @@ +{"16925849|15231229": []} +{"53302365|6746689": []} diff --git a/graph_1601820.jsonl b/edge/graph_1074202.jsonl similarity index 100% rename from graph_1601820.jsonl rename to edge/graph_1074202.jsonl diff --git a/edge/graph_10744611.jsonl b/edge/graph_10744611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f2990dc755a3c239d2a1b62555b3289f37d0abf --- /dev/null +++ b/edge/graph_10744611.jsonl @@ -0,0 +1,3 @@ +{"10310014|206583375": ["A survey of the potential technologies for indoor navigation for personal applications is provided in [81], where the authors describe techniques based on wireless communication, infrared, sound positioning and others and they compare their performance."]} +{"7064439|860072": ["One of the European HSR operators started in 2005 to offer Internet access to its customers [8]."]} +{"7064439|7482876": ["It is randomly time varying: its identifiability from the measurements, the statistical characterization, and the modeling is rather challenging [80], [81]."]} diff --git a/graph_1607655.jsonl b/edge/graph_10745342.jsonl similarity index 100% rename from graph_1607655.jsonl rename to edge/graph_10745342.jsonl diff --git a/graph_1075488.jsonl b/edge/graph_1075488.jsonl similarity index 100% rename from graph_1075488.jsonl rename to edge/graph_1075488.jsonl diff --git a/graph_1076078.jsonl b/edge/graph_1076078.jsonl similarity index 100% rename from graph_1076078.jsonl rename to edge/graph_1076078.jsonl diff --git a/graph_1610911.jsonl b/edge/graph_10762348.jsonl similarity index 100% rename from graph_1610911.jsonl rename to edge/graph_10762348.jsonl diff --git a/graph_1614929.jsonl b/edge/graph_10770351.jsonl similarity index 100% rename from graph_1614929.jsonl rename to edge/graph_10770351.jsonl diff --git a/graph_1077083.jsonl b/edge/graph_1077083.jsonl similarity index 100% rename from graph_1077083.jsonl rename to edge/graph_1077083.jsonl diff --git a/graph_1615097.jsonl b/edge/graph_10771948.jsonl similarity index 100% rename from graph_1615097.jsonl rename to edge/graph_10771948.jsonl diff --git a/graph_1077236.jsonl b/edge/graph_1077236.jsonl similarity index 100% rename from graph_1077236.jsonl rename to edge/graph_1077236.jsonl diff --git a/graph_107731.jsonl b/edge/graph_107731.jsonl similarity index 100% rename from graph_107731.jsonl rename to edge/graph_107731.jsonl diff --git a/edge/graph_10777439.jsonl b/edge/graph_10777439.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45aca91b59bc1001f1b2c9f2d22b4f9d7a54d30e --- /dev/null +++ b/edge/graph_10777439.jsonl @@ -0,0 +1,5 @@ +{"207204246|1805048": ["Model-based CF builds models using data mining techniques, such as clustering, on user ratings and the models are used to make recommendations [18]."]} +{"12859700|2187403": []} +{"3329660|6746689": ["Second, we obtain the skeleton of the road networks by performing a thinning operation based on the algorithm proposed in [9], as depicted in Figure 3(c)."]} +{"1603141|10777439": []} +{"13364278|1805048": ["We choose user-based collaborative filtering for such recommendation (Su and Khoshgoftaar 2009) as shown below:", "We choose user-based collaborative filtering for such recommendation (Su and Khoshgoftaar 2009) as shown below: P t u (l) = v\u2208U s(u, v)r v,l v\u2208U s(u, v) ."]} diff --git a/edge/graph_10780757.jsonl b/edge/graph_10780757.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27fbcf66967c2c11d3394ea9bb9fbcf7ed09b257 --- /dev/null +++ b/edge/graph_10780757.jsonl @@ -0,0 +1,2 @@ +{"5543469|14441987": []} +{"2695265|14441987": ["communication seamlessly through the network [ RT99 ]."]} diff --git a/graph_1631222.jsonl b/edge/graph_1078188.jsonl similarity index 100% rename from graph_1631222.jsonl rename to edge/graph_1078188.jsonl diff --git a/graph_1078272.jsonl b/edge/graph_1078272.jsonl similarity index 100% rename from graph_1078272.jsonl rename to edge/graph_1078272.jsonl diff --git a/edge/graph_10786086.jsonl b/edge/graph_10786086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca62f81c2523d3d98f671920bb92f9e3e3685f34 --- /dev/null +++ b/edge/graph_10786086.jsonl @@ -0,0 +1,2 @@ +{"110612657|16242553": []} +{"8530796|206051485": ["This estimation problem has been well studied, and several excellent surveys [27]\u2013[30], and software implementations (e.g., the Insight toolkit [31]) are available, so we do not detail registration algorithms here."]} diff --git a/graph_1632277.jsonl b/edge/graph_10788277.jsonl similarity index 100% rename from graph_1632277.jsonl rename to edge/graph_10788277.jsonl diff --git a/graph_164835.jsonl b/edge/graph_10791083.jsonl similarity index 100% rename from graph_164835.jsonl rename to edge/graph_10791083.jsonl diff --git a/graph_1666690.jsonl b/edge/graph_10798841.jsonl similarity index 100% rename from graph_1666690.jsonl rename to edge/graph_10798841.jsonl diff --git a/edge/graph_10799412.jsonl b/edge/graph_10799412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a73c152e70f31f1f80c78ba434cb2d82a1a3f88 --- /dev/null +++ b/edge/graph_10799412.jsonl @@ -0,0 +1,10 @@ +{"62225770|6746689": ["[ 4 ] H. V. Sorensen et al., \u201cReal-valued fast Fourier transform algorithms,\u201d"]} +{"33073722|6746689": []} +{"16093385|6746689": ["Thinning algorithms [LLC92, ZW93] have been used on pixel and voxel image data in the areas of pattern recognition and image processing to generate digital skeletons.", "Wave propagation on a non-uniform octree lattice is more challenging than traditional voxel-based approaches [LLC92, ZW93] and is described in Algorithm 1.", "Unlike some of the previous approaches [LLC92], here a more accurate distance metric is used instead of the Manhattan distance metric while calculating the distance travelled by the wave."]} +{"15161082|6746689": ["The skeleton is especially suitable for describing character since they have natural and inherent axes [ 1 ]\u2013[3].", "To compare the new method with others, we illustrate the skeletons obtained from ZSM method [ 1 ], [39], CYM method [16], and Kegl\u2019s method [6] (called KKM hereafter) in Fig. 8(d)\u2013(f), respectively.", "other major problem of the traditional methods is that their results do not always conform to the human perceptions, since they often contain unwanted artifacts such as noisy spurs and spurious short branch in the singular region [ 1 ], [3], [15]\u2013[19]."]} +{"7570708|6746689": ["The thinning-based skeletonisation method has been developed on the base of the thinning function provided in Matlab Image Processing Toolbox [24], which is a modified version of Zhang and Suen thinning [25]."]} +{"10191841|6746689": []} +{"36725473|6746689": ["But, vectorization algorithms require one-pixel-wide lines as input [3].", "At the end of each subiteration, the remaining image is updated for the next subiteration [3].", "For example, in 4-subiteration, we define 4 locally removable sets: LRS4[1] = (p I p in GRS and north@) = 01, LRS4[2] = {p I p in GRS and south@) = 01, LRS4[3] = {p I p in GRS and east@) = 0} and LRS4[4] = (p in GRS and west@) = 0).", "Neighbors having even numbers ( p[O], p[2], p[4], p[6] or north@), east@), south@), west@) ) are 4-neighbors of p ; neighbors with odd numbers @El], p[3], p[5], p[7] or northest@), south-east(p), south-west(p), north-west@)) together with the 4-neighbors7 are call 8-neighbors of p ."]} +{"36360661|6746689": ["A comprehensive survey of thinning algorithms is described by Lam et al. [ 4 ]."]} +{"5089049|6746689": []} +{"1121162|6746689": ["While there has been numerous work on 2D skeletonization (see an excellent survey in [15]), methods for computing 3D skeletons are relatively scarce."]} diff --git a/graph_1695570.jsonl b/edge/graph_10813427.jsonl similarity index 100% rename from graph_1695570.jsonl rename to edge/graph_10813427.jsonl diff --git a/edge/graph_10817088.jsonl b/edge/graph_10817088.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a74b1b30f363aa6f51177e21d0a75e4b5b3e029e --- /dev/null +++ b/edge/graph_10817088.jsonl @@ -0,0 +1,20 @@ +{"12705753|13726263": [", f\u0304m(I) are pruned if Equation 1 and Equation 2 hold [31]."]} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"9757651|20905429": ["Keywords: Smartphone, Body Sensor Networks, Health, Wellbeing."]} +{"15395523|1634674": ["More recently, Turaga et al. [9] and Aggarwal et al. [31] present surveys focusing on highlevel representation of complex activities and corresponding recognition techniques."]} +{"15395523|20905429": ["Over the past decade, sensor technologies, especially low-power, low-cost, high-capacity, and miniaturized sensors, wired and wireless communication networks [11]\u2013[13],"]} +{"15395523|7788290": ["HMMs have more recently been adopted as a model of choice in computer vision for modeling sequential (video) data (see [5] and [7] for surveys, and [94] and [102] for early examples).", "However, it is worth pointing out that while visual monitoring is intuitive and information-rich, vision-based activity recognition suffers from issues relating to privacy and ethics [4], [5], [8] as cameras are generally perceived as recording devices.", "Gavrila [5] and Poppe [6] present surveys mainly on tracking human movement via 2-D or 3-D models and the enabled action recognition techniques."]} +{"16614853|9270553": []} +{"16271071|11009327": ["Figure 1 shows how iMAT fits in a chain of information systems and tools for medication use process: It complements computerized physician order entry (CPOE) systems [9-14] at the top level by supporting the dispensing and administration stages of the process."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"9242151|6952653": []} +{"13251604|38476": ["In the sequential supervised learning problem [23], our task is to construct a hypothesis (or classifier) h from a training set that contains a set of labeled sequences."]} +{"17767204|9240891": ["Therefore, TrE is too simple to ensure the security and efficiency of MSNs."]} +{"920724|5401262": ["The information provided by the sensors is used to drive systems that automatically analyse human behaviour [26]."]} +{"920724|14970359": ["Most prominent in the visual domain are face detection and identi cation [34], person and object tracking [24], [37], [40], facial expression recognition [33], body posture recognition [15], [38], attention direction sensing [32], hand tracking and hand gesture recognition [27]."]} +{"920724|7185733": ["Most prominent in the visual domain are face detection and identi cation [34], person and object tracking [24], [37], [40], facial expression recognition [33], body posture recognition [15], [38], attention direction sensing [32], hand tracking and hand gesture recognition [27]."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"20385562|14970359": ["Traditional part-based representation of the human body divides into four forms: blob, silhouette, box and point (more details can be found in a recent survey (Moeslund and Granum 2001; Moeslund et al. 2006)."]} diff --git a/edge/graph_10817266.jsonl b/edge/graph_10817266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3be24a590671967818757cb20b904a034c78327 --- /dev/null +++ b/edge/graph_10817266.jsonl @@ -0,0 +1,4 @@ +{"33677815|1099309": ["This functionality is based on MPEG-7 XM software and MPEG-7 Visual Standard [50]."]} +{"33677815|13365762": ["In the last years some standards have been defined and implemented to manage multimedia information content; in the following an overview on MPEG-7 standardized in ISO/IEC 15938 is presented and an extended overview about it is in [13]."]} +{"33677815|6627566": ["Moreover, several approaches based on a combination of techniques such as low-level multimedia feature extraction and common semantic representation schemes for features and concepts are used in multimedia retrieval systems to improve the quality of retrieval process and achieve higher-level understanding of multimedia content [44,54]."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} diff --git a/edge/graph_10819899.jsonl b/edge/graph_10819899.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e743839c067fc308e6cc97dc9b330d23c4b1472c --- /dev/null +++ b/edge/graph_10819899.jsonl @@ -0,0 +1,2 @@ +{"18199961|1805048": ["Collaborative Filtering (CF) [Breese et al., 1998, Su and Khoshgoftaar, 2009] is a widely used technique in recommender systems."]} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} diff --git a/graph_1082096.jsonl b/edge/graph_1082096.jsonl similarity index 100% rename from graph_1082096.jsonl rename to edge/graph_1082096.jsonl diff --git a/graph_1735702.jsonl b/edge/graph_10823204.jsonl similarity index 100% rename from graph_1735702.jsonl rename to edge/graph_10823204.jsonl diff --git a/graph_1750279.jsonl b/edge/graph_10824066.jsonl similarity index 100% rename from graph_1750279.jsonl rename to edge/graph_10824066.jsonl diff --git a/edge/graph_108293854.jsonl b/edge/graph_108293854.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b089629cc75d09854ba6dcf8ee63b8425069853 --- /dev/null +++ b/edge/graph_108293854.jsonl @@ -0,0 +1,2 @@ +{"8014928|2457428": ["Furthermore, these schemes have two main problems on scalability and security degradation which include forward and backward secrecy [13, 14, 32, 38].", "Because users may change their attributes frequently, the mechanism of user revocation is essential in many group-based applications [29, 32]."]} +{"17346364|2457428": ["Furthermore, these methods have the problems of scalability and security degradation in terms of the backward and forward security [11], [13]\u2013[15]."]} diff --git a/edge/graph_108297415.jsonl b/edge/graph_108297415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2eb9b5e809fd051dec47886911a43c3e9df69276 --- /dev/null +++ b/edge/graph_108297415.jsonl @@ -0,0 +1,2 @@ +{"23087420|17774971": []} +{"107849587|17774971": ["26\n27\nTable 2.3 Binary Switching States for the Five-Level Neutral Point Clamp Inverter [12]\nS1 S2 S3 S4 S\u20191 S\u20192 S\u20193 S\u20194 Voltage\nI 1 1 1 1 0 0 0 0 Vdc/2 II 0 1 1 1 1 0 0 0 Vdc/4\nIII 0 0 1 1 1 1 0 0 0 IV 0 0 0 1 1 1 1 0 -Vdc/4 V 0 0 0 0 1 1 1 1 -Vdc/2\nS1A\nS2A\nS3A\nS4A\nS\u20191A\nS\u20192A\nS\u20193A\nS\u20194A\nC1\nC2\nC3\nC4\nVC1\nVC2\nVC3\nVC4\n+\n+\n+\n+ -\n-\n-\n-\n+\n-\nFigure 2.14 Five-Level, Neutral Point Clamped Switching States (States I-III shown)\n28\nTable 2.3 provides the five different switching states of the five-level NPC inverter with\nassociated voltage outputs.", "Provided that the voltage rating of each capacitor used is the same as that of the main power switch, an n-level inverter will require a total of [(n-1) x (n-2)]/2 clamping capacitors per phase in addition to (n-1) DC bus capacitors (like the NPC inverter) [12].", "107\u00a0 APPENDIX A ............................................................................................................................ 110\u00a0 APPENDIX B ............................................................................................................................ 115\u00a0 BIBLIOGRAPHY ..................................................................................................................... 120\u00a0\nix\nLIST OF TABLES\nTable 2.1 Summary of Power Semiconductors used in Power Converters and Drives [4] ......... 10\u00a0 Table 2.2 Binary Switching States for the Three-Level Neutral Point Clamp Inverter [11] ....... 25\u00a0 Table 2.3 Binary Switching States for the Five-Level Neutral Point Clamp Inverter [12] ......... 27\u00a0 Table 2.4 Binary Switching States for the Five-Level Flying Capacitor Topology [12] ............ 31\u00a0 Table 4.1 Induction Motor Equivalent Circuit Parameters [18] .................................................. 61\u00a0 Table 4.2 Mechanical Parameters of GE Wind Turbine [24] ...................................................... 67\u00a0 Table 4.3 Bidirectional DC-to-DC Converter Parameters [17] ...................................................", "3 Binary Switching States for the Five-Level Neutral Point Clamp Inverter [12] .", "4 Binary Switching States for the Five-Level Flying Capacitor Topology [12] S1 S2 S3 S4 S\u20191 S\u20192 S\u20193 S\u20194 Voltage I 1 1 1 1 0 0 0 0 Vdc / 2 II 1 1 1 0 1 0 0 0 Vdc / 4 0 1 1 1 0 0 0 1 1 0 1 1 0 0 1 0 III 1 1 0 0 1 1 0 0 0 0 0 1 1 0 0 1 1 1 0 1 0 1 0 1 0 1 0 0 1 0 1 1 0 0 1 0 1 0 1 0 1 0 1 1 0 1 0 0 1 IV 1 0 0 0 1 1 1 0 -Vdc / 4 0 0 0 1 0 1 1 1 0 0 1 0 1 0 1 1 V 0 0 0 0 1 1 1 1 -Vdc / 2", "This asset of multilevel inverter designs is referred to in the literature as voltage level redundancy [12].", "3 Binary Switching States for the Five-Level Neutral Point Clamp Inverter [12] S1 S2 S3 S4 S\u20191 S\u20192 S\u20193 S\u20194 Voltage I 1 1 1 1 0 0 0 0 Vdc/2 II 0 1 1 1 1 0 0 0 Vdc/4 III 0 0 1 1 1 1 0 0 0 IV 0 0 0 1 1 1 1 0 -Vdc/4 V 0 0 0 0 1 1 1 1 -Vdc/2", "If the control strategy for the switches is based on PWM, the diode reverse recovery of the clamping diodes becomes the major design challenge in high-power applications [12].", "4 Binary Switching States for the Five-Level Flying Capacitor Topology [12] .", "The main and probably the most important difference between the NPC topology and the FC topology is that the FC has a modular structure and can be easily extended to achieve a higher number of voltage levels and higher power ratings [12]."]} diff --git a/edge/graph_108317149.jsonl b/edge/graph_108317149.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb648dde2271ba91bad6fad8de0161b06daa1579 --- /dev/null +++ b/edge/graph_108317149.jsonl @@ -0,0 +1,11 @@ +{"9017015|6857179": ["[1], [2]), only few studies report the simultaneous"]} +{"34203593|6387482": []} +{"8107077|49273945": []} +{"8107077|17221751": []} +{"7203951|6387482": ["From each utterance, we extract the linguistic, acoustic, and visual features described above, which are then combined using the early fusion (or feature-level fusion) approach (Hall and 1997; Atrey et al., 2010)."]} +{"17498620|2301292": []} +{"17498620|2355696": []} +{"73548|8777381": ["Yet another important feature representing emotional states is the speech spectral information which has been found to be useful for emotion classification [5][10]."]} +{"44477920|1118130": []} +{"52883723|2355696": ["In line with INTERSPEECH 2013\u2019s theme Speech in Life Sciences and Human Societies, social signals (Vinciarelli et al., 2009) and conflicts in communication (Roth and Tobin, 2010) as occurring in real-life were detected and localised."]} +{"52883723|1118130": []} diff --git a/edge/graph_10834022.jsonl b/edge/graph_10834022.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2ebaf4fd5578521672c6f50e79f9918261e861a --- /dev/null +++ b/edge/graph_10834022.jsonl @@ -0,0 +1,4 @@ +{"16922796|2798946": []} +{"2372603|9123526": ["For this purpose, we \ufb01rst automatically build a repository of Cloud services in web service modeling language (WSML) [2] and then enrich it with experts\u2019 knowledge (lawyers, software engineers, system administrators, etc.) on the afore-mentioned constraints."]} +{"10026726|15264530": []} +{"10026726|6159806": ["Lenk et al. (2009) state that the Cloud is the \u201cgrass-root\u201d evolution of a wide range of technologies from successful Web 2.0 enterprises."]} diff --git a/graph_1083483.jsonl b/edge/graph_1083483.jsonl similarity index 100% rename from graph_1083483.jsonl rename to edge/graph_1083483.jsonl diff --git a/edge/graph_108354880.jsonl b/edge/graph_108354880.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..214a2b0b63edf190617e194b9855b503465198e6 --- /dev/null +++ b/edge/graph_108354880.jsonl @@ -0,0 +1,9 @@ +{"5701279|14122909": ["\u2026the ultrasound imaging of the LV is analyzed by an expert (e.g., a cardiologist), who segments the endocardial border of the LV at the end-systole and end-diastole phases, which are then used to provide a quantitative functional analysis of the heart in order to diagnose cardiopathies [2]."]} +{"3849381|14866098": ["For example, the [16, 4] \u00d7 [2, 16] model configuration, while performing the best on P300, was slightly worse in SMR and among the worst models for MRCP.", "When we ranked the 12 EEGNet models in descending order per dataset (so the 1st model performed the best and 12th model performed the worst) and averaged over the 4 datasets, we found that the [2, 32]\u00d7[8, 4] model configuration seemed to perform the best overall (Table 3), although it is difficult to determine statistical significance, given only four data points per model configuration.", "While these stages are largely the same across BCI paradigms, each paradigm relies on manually specified methods for signal processing [4], feature extraction [5] and classification [6], a process which often requires significant subject-matter expertise and/or a priori knowledge about the expected EEG signal.", "We see that the [2, 32] \u00d7 [8, 4] model ranks the best among all kernel configurations.", "The EEGNet model with the [2, 32] \u00d7 [8, 4] configuration will be used for the remainder of the manuscript."]} +{"3849381|16362395": ["methods [9], a process which often requires significant subject-"]} +{"9776095|15380857": ["Better signalprocessing procedures, such as those being developed for brain\u2013computer interfaces, could be applied to studies of visual processing (Davila, Srebro, & Ghaleb, 1998; Friman, Volosyak, & Graser, 2007; Garcia Molina & Zhu, 2011; Zhu et al., 2010)."]} +{"1661234|9270553": ["A brain computer interface (BCI) system allows human subjects to use their brains to directly communicate with or control an external device [1]."]} +{"16362395|9270553": ["Indeed, BCI systems enable a subject to send commands to an electronic device only by means of brain activity [ 2 ]."]} +{"16362395|192934": []} +{"38852082|9270553": ["BCI research involves four steps \u2013 signal acquisition, signal pre processing, signal classification and computer interaction [2].", "The data had been recorded on healthy subjects typing a keyboard using either their left or right index/little fingers [2]."]} +{"20765816|16362395": ["Nonlinear classifiers, such as neural networks, hidden Markov model, and k-nearest neighbor [1], [5], can approximate a wide range of functions, allowing discrimination of"]} diff --git a/edge/graph_10837932.jsonl b/edge/graph_10837932.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbe789dd81a526fbd7c7c73cf31bd3579bbddf89 --- /dev/null +++ b/edge/graph_10837932.jsonl @@ -0,0 +1,2 @@ +{"16604460|10658846": []} +{"48855|10658846": ["For instance , by using Dynamic Power Management for components [3] and manufacturing computers that follow the U.S. EPA Energy Star program [11]."]} diff --git a/edge/graph_108379849.jsonl b/edge/graph_108379849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68452030a4e9f63ca994abf140a83f6a62e62445 --- /dev/null +++ b/edge/graph_108379849.jsonl @@ -0,0 +1,20 @@ +{"38888004|264691": []} +{"38888004|1230643": []} +{"66920949|4382139": ["In [26], basics of QoS support were discussed along with the necessity of QoS in each protocol layer."]} +{"66920949|3423198": ["Ant colony optimization (ACO) [38, 39], particle swarm optimization (PSO) [22], bee colony optimization (BCO) [24] are various SI based meta-heuristic algorithms used for routing.", "Multi-Objective Optimization (MOO) techniques along with swarm intelligence algorithms were presented to introduce the development efforts for surveillance and monitoring [24].", "In arti\ufb01cial bee colony (ABC) [24], the possible solution for routing is the position of food source and quality corresponds to the nectar amount."]} +{"66920949|206901977": ["Physical layer optimizations and routing solutions for network layer were suggested to provide an energy ef\ufb01-cient solution for \ufb01xing the energy consumption issue in application speci\ufb01c WSN [16]."]} +{"66920949|14133285": ["In [20], a conceptual illustration of various opportunistic routing protocols was presented with their performance metrics and advantages."]} +{"538438|41998167": ["Although some QoS-related surveys have lately explored domain-wise applicability such as Yigitel et al.,101 Misra et al.103 review WMSN,25 Tobo\u0301n et al. discuss wireless body area network (WBAN), and Suriyachai et al.71 focus on mission critical applications, there still remains an open area of research.", "Lately, Yigitel et al.19 review QoS-aware MAC protocols in WSN.", "Third, the notions of QoS in WSN, for the first time, are defined by Chen and Varshney;(20) thereafter, many studies have attended to the topic, which we have covered in detail in a sub-section on QoS in section \u2018\u2018Review of surveys,\u2019\u2019 among them Yigitel et al.(19) is notable as it comprehensively reviews and outlines related issues.", "Lately, Yigitel et al.(19) review QoS-aware MAC protocols in WSN.", "Third, the notions of QoS in WSN, for the first time, are defined by Chen and Varshney;20 thereafter, many studies have attended to the topic, which we have covered in detail in a sub-section on QoS in section \u2018\u2018Review of surveys,\u2019\u2019 among them Yigitel et al.19 is notable as it comprehensively reviews and outlines related issues."]} +{"538438|8618569": ["We reproduce Table 5 from Christin et al.28 to show quantitative QoS parameterization.", "We reproduce Table 5 from Christin et al.(28) to show quantitative QoS parameterization.", "Christin et al.,28 in a very pertinent study, focus on QoS and security for industrial automation applications."]} +{"538438|15981390": []} +{"538438|20905429": []} +{"1634316|1230643": ["These networks are different from the traditional wireless ad hoc networks, because the nodes in an ad hoc network are in general less energy constrained [1]."]} +{"12862144|41901402": ["As stated in [3], there are three techniques to monitor forest fire: satellite-based system, an optical sensor and digital camera, and Wireless Sensor Network (WSN)."]} +{"19919815|41998167": []} +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"10004542|9321930": ["[13] demonstrated a comprehensive survey on the cooperativeMAC protocols for wireless communication in order to find the performance ofMACprotocolswhenMAC layer cooperates with other layers."]} +{"25576812|8618569": ["Surveys on WSN technologies for industrial automation are also available in [79], [80]."]} +{"19751529|17769444": ["A survey of hardware systems for wireless sensor networks can be found in [3]."]} +{"19751529|141053": ["One such classification adapted from works in [7, 8, 10] is shown in Figure 3.", "Authors in [10] have presented a classification for MAC protocols for adhoc networks into two broad classes: contention-based and contention-free."]} +{"20344700|512561": []} +{"20344700|562065": []} diff --git a/graph_175549.jsonl b/edge/graph_10842593.jsonl similarity index 100% rename from graph_175549.jsonl rename to edge/graph_10842593.jsonl diff --git a/graph_1084990.jsonl b/edge/graph_1084990.jsonl similarity index 100% rename from graph_1084990.jsonl rename to edge/graph_1084990.jsonl diff --git a/edge/graph_10851295.jsonl b/edge/graph_10851295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26d192df0de0cec0f2e001af7ae58a3d8e6ec804 --- /dev/null +++ b/edge/graph_10851295.jsonl @@ -0,0 +1,3 @@ +{"5842782|10287248": ["QoS routing has been receiving increasingly intensive attention in the wireline network domain [10].", "source node or by a distributed computation [10]."]} +{"3345066|14088590": ["In multi-hop MANETs, as discussed in [5], contention-free MAC schemes such as time division multiple access (TDMA) or code division multiple access (CDMA) are difficult to implement due to the lack of centralised control and the dynamically changing network topology.", "decoupling: as discussed in the context of QoS-aware routing in [5], protocols can benefit from directly accessing MAC layer information.", "Many of the challenges are the same as those posed to QoS-aware routing protocols, which were discussed in [5].", "Many metrics employed for specifying and measuring QoS were explained in [5].", "In [5] we discussed several of the general design trade-offs in MANETs that may also impact QoS-aware protocol design.", "Again, the network resources relevant to QoS have been discussed in [5]."]} +{"3345066|141053": ["higher directional interference, difficulty in maintaining the correct transmission direction in the face of mobility and deafness to certain transmissions [64].", "Some MAC protocols for addressing these issues have been proposed [64], but higherlayer protocols still require attention."]} diff --git a/edge/graph_10859599.jsonl b/edge/graph_10859599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a824160cddec98a4491a73db5b0db2605311231a --- /dev/null +++ b/edge/graph_10859599.jsonl @@ -0,0 +1,8 @@ +{"7836941|2835258": []} +{"7836941|14441987": ["Support for hierarchy is missing from most ad hoc routing protocols [34] with the exception of a few approaches, such as CGSR and MMWN."]} +{"15651086|44944144": []} +{"11135536|1230643": ["This technology has mainly been made possible by the convergence of micro-electromechanical systems technology, wireless communications, and digital electronics, enabling the construction of low-cost, lowpower, multifunctional sensor nodes that are small in size and communicate untethered in short distances, thus forming the sensor network [93]."]} +{"11135536|14441987": ["Data Dispersal This approach is based on Rabin\u2019s algorithm [11], which takes advantage of the existence of multiple routes from a source to a destination to increase reliability when transmitting packets.", "in [11]; it has been omitted since it requires a rigorous mathematical pre-", "(A survey of the two classes of routing protocols is available in [11]."]} +{"21589886|141053": ["networks and a review of existing solutions can be found in [16], [17]."]} +{"195918573|14441987": ["An example of the routing challenges currently faced by mobile ad hoc networks is outlined in a previous review paper [2].", "Also known as proactive, these protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [2].", "The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth, and high error rates [2]."]} +{"6438719|14441987": []} diff --git a/edge/graph_10859746.jsonl b/edge/graph_10859746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e8a682848071322d71a795cdb3f8362f210b8ff --- /dev/null +++ b/edge/graph_10859746.jsonl @@ -0,0 +1 @@ +{"85571055|469744": []} diff --git a/graph_1770055.jsonl b/edge/graph_10861421.jsonl similarity index 100% rename from graph_1770055.jsonl rename to edge/graph_10861421.jsonl diff --git a/graph_1775475.jsonl b/edge/graph_10862852.jsonl similarity index 100% rename from graph_1775475.jsonl rename to edge/graph_10862852.jsonl diff --git a/edge/graph_10863733.jsonl b/edge/graph_10863733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b73afa8b3938aa00ec3cd9043fd14edc6baa086 --- /dev/null +++ b/edge/graph_10863733.jsonl @@ -0,0 +1 @@ +{"2528592|10863733": []} diff --git a/graph_1803317.jsonl b/edge/graph_10863969.jsonl similarity index 100% rename from graph_1803317.jsonl rename to edge/graph_10863969.jsonl diff --git a/graph_180339.jsonl b/edge/graph_10865944.jsonl similarity index 100% rename from graph_180339.jsonl rename to edge/graph_10865944.jsonl diff --git a/edge/graph_10869869.jsonl b/edge/graph_10869869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56028d41615df13aec30004762f4bdcc86005c29 --- /dev/null +++ b/edge/graph_10869869.jsonl @@ -0,0 +1,2 @@ +{"14757739|13172512": [", [27, 54, 49, 23, 25]) and machine learning algorithms pervade several contexts of information technology.", "For example, classification and regression models are employed to analyze current and historical trends to make predictions in financial markets [24, 33, 8], to study biological problems [54], to support medical diagnosis [30, 42, 57], to classify network traffic or detect anomalies [22, 28, 39, 12, 49].", "SVM for network traffic classification As shown by the extensive literature on this topic [28, 27, 49, 15], network traffic classification is commonly realized by means of Machine Learning algorithms, like K-Means, HMM, decision trees, and SVM."]} +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} diff --git a/graph_1088717.jsonl b/edge/graph_1088717.jsonl similarity index 100% rename from graph_1088717.jsonl rename to edge/graph_1088717.jsonl diff --git a/graph_1819274.jsonl b/edge/graph_10892530.jsonl similarity index 100% rename from graph_1819274.jsonl rename to edge/graph_10892530.jsonl diff --git a/edge/graph_10897227.jsonl b/edge/graph_10897227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b122e1713a61def86bf2e94e92777306fd46e404 --- /dev/null +++ b/edge/graph_10897227.jsonl @@ -0,0 +1,5 @@ +{"6672490|10658846": ["Thus, reducing the voltage, which consequently lead to the frequency reduction, provides substantial savings in power at the cost of slower program execution [18]."]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} diff --git a/edge/graph_10900788.jsonl b/edge/graph_10900788.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1521b4033f0d412e83b07bea8a61edcab5b7a449 --- /dev/null +++ b/edge/graph_10900788.jsonl @@ -0,0 +1 @@ +{"15920570|2774711": []} diff --git a/edge/graph_10903568.jsonl b/edge/graph_10903568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d68636d5828f9c392f3b6a6896aa84c04eb693b9 --- /dev/null +++ b/edge/graph_10903568.jsonl @@ -0,0 +1,4 @@ +{"8166920|7706992": []} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"1031237|9045232": ["The development of algorithms for finding a face in an image has been an active research area in its own right [6]."]} +{"37125951|62568680": []} diff --git a/edge/graph_10907226.jsonl b/edge/graph_10907226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f54d7f6a0f7283af4bf22c1b5272b55fe8d0879d --- /dev/null +++ b/edge/graph_10907226.jsonl @@ -0,0 +1,2 @@ +{"9832541|10907226": ["Second, because of an intimate connection between the free boundary case and so-called \u201creconstruction problems\u201d on trees [34] (in which the edges are noisy channels and the goal is to reconstruct a value transmitted from the root), we obtain an alternative proof of the best known value of the noise parameter under which reconstruction is impossible [35]."]} +{"16214042|10907226": ["We refer the reader to Section 1.2 and to [3, 7, 21 , 22] for background."]} diff --git a/graph_1825689.jsonl b/edge/graph_10907786.jsonl similarity index 100% rename from graph_1825689.jsonl rename to edge/graph_10907786.jsonl diff --git a/edge/graph_10908575.jsonl b/edge/graph_10908575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b88858d446607b46c5e5716cb3a41eb9408e2007 --- /dev/null +++ b/edge/graph_10908575.jsonl @@ -0,0 +1 @@ +{"4673069|12060835": ["In the current low-power wireless sensors, it is possible to include some energy harvesting techniques in order to gain energy from different sources such as solar batteries [88], [89], [90]."]} diff --git a/edge/graph_10921965.jsonl b/edge/graph_10921965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e22c406db159f8889acafdfef315b8863fae479 --- /dev/null +++ b/edge/graph_10921965.jsonl @@ -0,0 +1 @@ +{"3407743|9770908": []} diff --git a/edge/graph_10923018.jsonl b/edge/graph_10923018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bb60a552f2e467b3046ca528e9fcd32fd12f448 --- /dev/null +++ b/edge/graph_10923018.jsonl @@ -0,0 +1 @@ +{"9338346|10923018": []} diff --git a/graph_1837720.jsonl b/edge/graph_109233082.jsonl similarity index 100% rename from graph_1837720.jsonl rename to edge/graph_109233082.jsonl diff --git a/graph_184678.jsonl b/edge/graph_10926328.jsonl similarity index 100% rename from graph_184678.jsonl rename to edge/graph_10926328.jsonl diff --git a/graph_1847891.jsonl b/edge/graph_10929935.jsonl similarity index 100% rename from graph_1847891.jsonl rename to edge/graph_10929935.jsonl diff --git a/graph_1850236.jsonl b/edge/graph_10937383.jsonl similarity index 100% rename from graph_1850236.jsonl rename to edge/graph_10937383.jsonl diff --git a/graph_1859317.jsonl b/edge/graph_10941697.jsonl similarity index 100% rename from graph_1859317.jsonl rename to edge/graph_10941697.jsonl diff --git a/graph_1864309.jsonl b/edge/graph_109465635.jsonl similarity index 100% rename from graph_1864309.jsonl rename to edge/graph_109465635.jsonl diff --git a/edge/graph_10947138.jsonl b/edge/graph_10947138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26c68c04592ed97ce9c8dc0379171200664dedd1 --- /dev/null +++ b/edge/graph_10947138.jsonl @@ -0,0 +1 @@ +{"9572824|15744805": ["As error metrics we have used the average deviation between the contour pixels and the contour in the gold standard, Hausdorff distance, number of over-segmented and under-segmented pixels in relation to the region size [18,19]."]} diff --git a/edge/graph_10948183.jsonl b/edge/graph_10948183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7ca19833ffc42b459719a72a02dda6af8361189 --- /dev/null +++ b/edge/graph_10948183.jsonl @@ -0,0 +1,12 @@ +{"302368|62198990": ["Human eye movements can be grouped into several categories [10, 27 ].", "Science Laboratories (Waltham, Mass.) Model 3250R corneal reflection eye tracker [17, 27 ].", "Further details on this and the other eye tracking methods discussed here can be found in [ 27 ]."]} +{"1028698|62198990": ["3 Such systems determine gaze direction by comparing the pupil position in an image of a user's eye with the light pattern that occurs when incident light is reflected from the convex surface of the cornea [8]\u2013[10]."]} +{"1418397|9270553": ["A discussion of bit rate in BCI can be found in [ 1 ].", "Great progress has been made in brain\u2010computer interface (BCI) research over the past 20 years [ 1 ].", "The average transfer rate is around 10\u201025 b/min [ 1 ].", " Digital Object Identifier 10.1109/TNSRE.2003.814449 brain\u2019s normal output pathway [ 1 ]."]} +{"6020548|9270553": []} +{"23726454|9270553": ["Wolpaw [11] introduced the information transfer rate of a BCI as bits per trial (bits per decision) and bits per minute with 12 selections per minute (trial length is 5 s)."]} +{"206608942|9270553": ["Current systems can reach no more than 25 bits/min,1 even under optimal conditions [13]."]} +{"11804564|9270553": ["Participants donned a 16-channel electrode cap (Electro-Cap International Inc., Eaton, OH), which measured a The degree of speech impairment varied from dif\ufb01cult to understand to no speech at all. and transmitted their EEG signals to a computer via a g.USBamp ampli\ufb01er (Guger Technologies, Graz, Austria) or a Pentusa ampli\ufb01er and signal processing system (Tucker-Davis Technologies, Alachua, FL, USA).", "Theintent of EEG-based BCI use is to enable control using only motor imagery, without muscle involvement.", "Eight able-bodied participants (\ufb01ve men and three women) aged 19\u201329 (mean age = 25.7 years), who also participated in another study on EEG-based BCIs, were recruited for this experiment based on participation in more than \ufb01ve 1 h sessions and consistent task accuracy exceeding 90%.", "During each trial, the EEG power spectral content of the chosen signals was measured continuously, and the signal magnitude was the independent variable in a linear equation that controlled cursor motion in real time.", "The fact that EEG-based BCI target acquisition tasks can be carried out by at least some disabled subjects reinforces the notion that even with non-invasive recording methods, appropriate neural signals can be generated to represent four movement directions.", "A screening procedure was performed during the \ufb01rst experimental session to determine the EEG spectral frequency components of speci\ufb01c electrodes that subjects could self-modulate by using motor imagery.", "electroencephalogram or EEG) [12, 24, 26], the surface of the brain (i.", "Previous studies have demonstrated that humans can operate a computer cursor using neural signals from the scalp (i.e. electroencephalogram or EEG) [12, 24, 26], the surface of the brain (i.e. electrocorticogram or ECoG) [6, 13] or within the brain (i.e. local \ufb01eld potentials and action potentials) [8, 10].", "All subjects were na\u00a8\u0131ve to the BCI task upon enrollment in the main study, with the exception of one able-bodied subject who participated in ECoG-based BCI experiments 1.5 years prior to commencing participation in the EEG experiments presented here.", "This study evaluated a computer-based target acquisition task executed with a BCI system that measured EEG signals from the scalp in both able-bodied and disabled participants.", "A BCI is a communication system that does not depend on the brain\u2019s normal input/output pathways of peripheral nerves and muscles [24]."]} +{"17571592|16362395": ["In their review of the literature on BCI classifiers, Lotte et al. 16 concluded that SVMs are particularly efficient, attributing the efficiency to their regularization property and immunity to the curse of dimensionality.", "While many early BCI studies satisfied this requirement, 24,38 later studies were often based on offline analyses of pre-recorded data 1 ; for example, the Lotte et al. 16 review of studies evaluating BCI signal-classification algorithms found most used offline analyses."]} +{"17571592|9270553": []} +{"17571592|192934": []} +{"15098774|9270553": ["Various assistive technologies that support individual communication have been developed for disabled people based on a brain-computer interface [1]\u2013[4]."]} +{"205222501|16362395": ["Good overviews can be found in (Dornhege et al., 2007) and in (Wolpaw et al., 2002), while Lotte et al. (2007) provides a review of classification algorithms.", "Numerous authors have considered methods of tracking this motion using implanted coils which are electrically connected to external equipment and are electromagnetically coupled to external excitation coils (Carstens, 2008; Scho\u0308nle et al., 1987; Hummel et al., 2006)."]} diff --git a/graph_1870730.jsonl b/edge/graph_10951351.jsonl similarity index 100% rename from graph_1870730.jsonl rename to edge/graph_10951351.jsonl diff --git a/graph_1097238.jsonl b/edge/graph_1097238.jsonl similarity index 100% rename from graph_1097238.jsonl rename to edge/graph_1097238.jsonl diff --git a/graph_1872858.jsonl b/edge/graph_10972964.jsonl similarity index 100% rename from graph_1872858.jsonl rename to edge/graph_10972964.jsonl diff --git a/graph_1876323.jsonl b/edge/graph_10975328.jsonl similarity index 100% rename from graph_1876323.jsonl rename to edge/graph_10975328.jsonl diff --git a/edge/graph_10977361.jsonl b/edge/graph_10977361.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6457f79e5164b033b7da52bbd98fbcc690966aa7 --- /dev/null +++ b/edge/graph_10977361.jsonl @@ -0,0 +1,2 @@ +{"7452865|1400872": ["The following task, though, is more difficult than the above benchmark problems: it cannot be solved at all in reasonable time by RS (we tried various architectures) nor any other recurrent net learning algorithm we are aware of (see [13] for \u00b7an overview)."]} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} diff --git a/edge/graph_10979806.jsonl b/edge/graph_10979806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a490cf0852f473ba821bf669b5ca71dbed927bc9 --- /dev/null +++ b/edge/graph_10979806.jsonl @@ -0,0 +1,36 @@ +{"19684011|7686677": []} +{"22856714|14765802": ["Thus, current researches focus on energyefficient transmission techniques for downlink mobile traffic [6]."]} +{"17226958|17109970": ["Only an implicit discussion can be found in [6], which summarizes existing approaches that addresses either throughput or energy efficiency separately in the context of power control for CDMA networks."]} +{"42120997|17966235": ["referred to a recent survey in [12] for more information on"]} +{"407813|2833151": []} +{"14959264|7686677": ["H. Shin is with the Department of Electronics and Radio Engineering, Kyung Hee University, Gyeonggi-do 446-701, Korea (e-mail: hshin@khu.ac.kr) (corresponding author)."]} +{"14959264|8909218": ["A heterogeneous network uses a mixture of macrocells and small cells such as microcells, picocells, and femtocells."]} +{"4807693|16412228": ["According to the taxonomy introduced in the survey article [16], our approach applies to cellular, homogeneous, ultra-dense networks (including dense WLAN"]} +{"4807693|7686677": ["surveyed in [14], [15], in which also a broad overview on the trade-offs between quality-of-service and EE, power-saving BS"]} +{"4807693|10096622": ["or swarming algorithms [21], [22]."]} +{"61736931|17109970": ["In [120, 121, 32], the algorithms provided in [63, 148] are extended considering also transceiver design, whereas [118] and [119] consider competitive power control in MC systems and in presence of maximum communication delay constraints."]} +{"5831954|16412228": ["One promising way to deal with these issues is to optimize the energy efficiency (EE) of future wireless systems, which has received considerable interest in both academia and industry [13]\u2013[15]."]} +{"15718417|7686677": ["the mobile operators rely on diesel generators (DG) to run the BSs as a solution for these cases, which is not only expensive due to its price and transportation [11], but also one of the most pollutant sources of energy.", "Another approach is proposed by [13], where the authors considered sizing the renewable energy (PV) and storage system of next generation cellular networks envisions adopting the heterogeneous architecture described in [11]."]} +{"1760740|36610012": []} +{"598907|17109970": ["\u2026issues related to EE in wireless networks, [4] presents four fundamental\nC. Isheden was with the Vodafone Chair Mobile Communications Systems, Technische Universit\u00e4t Dresden, D-01069 Dresden, G rmany, and is currently with Actix GmbH, D-01067 Dresden, Germany, e-mail: christian.isheden@actix.com."]} +{"802697|15453366": ["Based on measurement results of millimeter wave channels in [28], [40], [41], the Rayleigh fading model can be adopted to describe the considered millimeter wave wireless channels."]} +{"326150|15255963": []} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"537110|8836911": ["in the multi-radio multi-channel MAC are surveyed, and a classification of control separation techniques is provided in [16]."]} +{"13516410|17109970": ["\u03b7(p) is the energy-efficiency [7], and its unit is expressed in bits per joule.", "Compared with others, the \u201cthroughput per Joule\u201d metric, which represents the total number of bits delivered to the destination per joule of energy consumed [7], is particularly suitable for scenarios where energy-efficiency is more important than just achieving a high throughput."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"14620991|7686677": ["As a result, EER can achieve a high efficiency over a wide range of signal which is three to five times those of linear amplifiers from HF band to L band."]} +{"14620991|10837932": []} +{"24053362|7686677": ["A quick survey [8], [9] of recent research works clearly points out towards the impending necessity and major global research works related to C-RAN and green cellular networks.", "The seminal survey of Bhargava and his group [9] illustrates different methods and projects related to network energy efficiency."]} +{"2573986|12029139": ["the power loss in battery charging [7], the first equation is due to the finite property of the battery, and the second one is due to the discrete property of the battery.", "As concluded in [7], energy harvesting receiving architectures and power management models are two essential units to realize wireless-powered cooperative relay commu nications.", "In the former model, the harvested energy is directly used and energy accumulation is not allowed due to lack of storage units, while in the later model, the harvested energy is first accumulated and stored with the help of a battery and then adaptively utilized in informatio n transmission [7]."]} +{"2573986|15255963": []} +{"2573986|12060835": []} +{"1878392|17109970": ["This same utility function is also used in [11] for energy-efficient power control in ultra-wideband (UWB) communications, while the survey paper [ 12 ] reviews recent advances in the application of a game-theoretic framework for energy-efficient resource allocation.", "The utility function (4) is widely accepted and indeed it has been already used in a number of previous studies such as [7]\u2010[ 12 ]."]} +{"2723416|7686677": ["For example, the total energy cost of China Mobile, a Chinese state-owned telecommunication company, is almost 3 billion US dollars in the year of 2011 [4], and is still increasing considerably year by year."]} +{"3055684|12060835": []} +{"35076520|8909218": ["Femtocells will also provide power and battery savings due to short range transmissions [1]."]} +{"206862196|7686677": ["nventional energy consumed, because it is only then cost-effective to deploy renewable energy sources and storage. A survey of issues involved in deploying renewable energy sources in BSs is given in [3]. Related work on deploying renewable energy sources in smart grids, not necessarily constrained to a communications systems setup can be found in [4], [5] and the references therein. Other than work "]} diff --git a/graph_1098341.jsonl b/edge/graph_1098341.jsonl similarity index 100% rename from graph_1098341.jsonl rename to edge/graph_1098341.jsonl diff --git a/graph_1877442.jsonl b/edge/graph_10985225.jsonl similarity index 100% rename from graph_1877442.jsonl rename to edge/graph_10985225.jsonl diff --git a/graph_1888038.jsonl b/edge/graph_10986104.jsonl similarity index 100% rename from graph_1888038.jsonl rename to edge/graph_10986104.jsonl diff --git a/edge/graph_109926907.jsonl b/edge/graph_109926907.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bfdf5ff07df3f782f7d830bd7c07df67b1de079 --- /dev/null +++ b/edge/graph_109926907.jsonl @@ -0,0 +1,20 @@ +{"10050878|5724477": []} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"7551351|17747015": ["Activity recognition methods are classified into three main types of vision-based [1], radio-based [2], and sensor-based [3] methods."]} +{"19766325|10206347": []} +{"10985974|1634674": []} +{"19476662|5724477": ["[42]."]} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"27204466|13088291": []} +{"49568078|535786": ["2b) by relying on the additional data collected from magnetometer, and gyroscope sensors [5]."]} +{"17203637|5401262": []} +{"17203637|17516538": []} +{"17203637|987239": []} +{"17203637|7185733": []} +{"17203637|7788290": ["Among the various motion analysis related surveys, Gavrilla [2], Moeslund et al. [6] [18], Buxton [20], Wang et al. [19], Aggarwal et al. [3] [21] [23] covered the issues related to human motion recognition extensively."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} diff --git a/graph_1099309.jsonl b/edge/graph_1099309.jsonl similarity index 100% rename from graph_1099309.jsonl rename to edge/graph_1099309.jsonl diff --git a/edge/graph_109932071.jsonl b/edge/graph_109932071.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f25f7925d10c67a4bb9d2ec050bc33b330bfb8d --- /dev/null +++ b/edge/graph_109932071.jsonl @@ -0,0 +1 @@ +{"109932071|35411853": ["The American Society of Testing and Materials has defined NIR spectroscopy as the interaction between samples and electromagnetic radiation in the NIR region, corresponding to the wavelength of 780\u20132,526 nm, located between visible light and MIR region (Wang and Yu, 2015)."]} diff --git a/edge/graph_109938363.jsonl b/edge/graph_109938363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7357e8b962095b91d86cd17904be5a024ba9973d --- /dev/null +++ b/edge/graph_109938363.jsonl @@ -0,0 +1,72 @@ +{"11737359|1230643": ["But for better communication and data sending from one node to another, acoustics waves are used as it can provide high speed communication among the nodes[11] and can carry digital data through the channel."]} +{"52916939|8974063": ["\uf0b7 Spectrum Decision: After detection of available channels, CR network needs to decide that which available vacant bands are best suitable for use according to the QOS (quality of service) requirements of the secondary user [10]."]} +{"49869020|24110634": ["[5] addressed the challenges and design requirement for SD-WSN."]} +{"46963367|6583734": ["Network function virtualization (NFV) [64]\u2013[66] can be employed based on SDN.", "Toy, \u2018\u2018Software-defined network virtualization: An architectural framework for integrating SDN and NFV for service provisioning in future networks,\u2019\u2019 IEEE Netw., vol. 30, no. 5, pp. 10\u201316, Sep./Oct. 2016.", "ABBREVIATION\nUASNs Underwater acoustic sensor networks WSNs Wireless sensor networks SDN Software-defined networking SDR Software definition radio MAC Media access control AUVs Autonomous underwater vehicles OvS Open vSwitch HN Header node API Application programming interface NFV Network function virtualization MIMO Multiple-Input Multiple-Output LA Learning Automata CDS The connected dominating set d-CDS The degree constrained connected domination set ASF Action-Set Formation RM Response message APV Activity probability vector ACT Active message MC Monte Carlo BFS Breadth-first search SLP Sleep Message AS Autonomous systems STP Spanning Tree Protocol EPD Equal Probability Distribution BER Bit error rate GUI Graphical user interface TUNE Traditional UASNs with Node_Elect_cluster TULA Traditional UASNs with Learning_Automata_cluster SUNE SDN_based UASNs of Node_Elect_cluster SULA&LB SDN_based UASNs using\nLearning_Automata_cluster and Load Balancing\nVOLUME 6, 2018 25711\nREFERENCES [1] J. Heidemann,M. Stojanovic, andM.", "NFV enables the achievement of reasonable substantiality by using numerous physical entities or creating physically sustainable logical entities [67]\u2013[69]."]} +{"46963367|31355144": ["UASNs have gained significant attention for use in underwater applications [2] such as marine data acquisition, environmental monitoring, subaquatic resource surveying, earthquake and tsunami monitoring, auxiliary navigation, submarine robots, etc."]} +{"46963367|4269723": ["At the northbound interface [61]\u2013[63], an API is used to implement the interaction between the controller and application layers."]} +{"4735659|9651858": ["Reference [28] outlined the spectrum sharing mechanism for the next generation cellular networks to overcome the"]} +{"4735659|13019489": ["Reference [25] studied the concept of dynamic spectrum sharing, and investigated various existing spectrum sharing scenarios with different network topologies, features, challenges, and probable use cases."]} +{"4735659|19938676": ["With the rapid development of broadband wireless access and mobile terminal technology, people are eager to obtain information and services from the Internet at anytime, anywhere and even in the process of moving, and the mobile Internet has been developed rapidly in such a background [2]."]} +{"4735659|12029139": ["Electromagnetic waves energy harvested by CR focused by many scholars, and there have been a number of representative studies [106], [129], [130], including hardware design and efficient energy sensing algorithms, etc."]} +{"4735659|3348390": ["As it can be seen, by the year 2020, when 33 billion devices like machine to machine (M2M), smart objects, smart grid, smart home, smartphones, PCs, tablets and wearable devices will be in use [10], [11]."]} +{"4735659|15116409": ["In order to satisfy the needs of cognitive users to detect spectrum opportunities reliably in a wide frequency range in the future, [20] summarized various wideband spectrum sensing algorithms and discusses the advantages and disadvantages of each algorithm and their challenging problems.", "In spite of the extensive literature on CR, there are few papers to discuss the available spectrum exploration issues toward 5G, while several studies separate overview the spectrum sensing [20] and spectrum access [26] in CR networks.", "Based on the compressed sensing theory, compressive spectrum sensing algorithm was presented in [20], [76], and [77], which can extract and detect the wideband signal directly to achieve efficient wideband"]} +{"4735659|8974063": ["Reference [23] presented an up-to-date survey of spectrum decision in CRNs based on spectrum characterization, spectrum selection, and CR reconfiguration."]} +{"4735659|2509135": ["In order to improve the utilization of licensed spectrum as much as possible, various multiplexing technologies such as Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Multiple-Input Multiple-Output (MIMO) techniques are used to support more users on the limited spectrum resources [32], but they cannot fundamentally solve the problem of spectrum resources scarcity caused by fixed allocation policy."]} +{"4735659|31662905": ["energy crisis, and the spectrum sharing between satellite telecommunication networks and terrestrial has been surveyed in [29], which focuses on the investigation of the feasibility of spectrum sharing between geostationary orbit and non-geostationary orbit satellite systems."]} +{"4735659|15453366": ["Many countries, including the United States and Europe, have divided 60GHz band into 5GHz \u223c 7GHz unlicensed continuous spectrum resources for general use [38]."]} +{"3552149|18392886": ["to adapt it to large-scale networks with different ASes such as the Internet [79].", "This classification has been recently adopted by [79].", "Moreover, Espresso achieves higher availability (reliability) when compared to existing router-centric Internet protocols.", "Digital Object Identifier 10.1109/COMST.2017.2782482\nthe recent emergence of the Internet of Things (IoT) has allowed for the creation of new advanced services with more stringent communication requirements in order to support its innovative use cases.", "Another different class of solutions has been recently introduced by DISCO which promoted a logically distributed control plane based on existing ASs within the Internet.", "The main advantage of the DISCO solution is the possibility to adapt it to large-scale networks with different ASes such as the Internet [79].", "However, that main feature of logically-centralized control which has been leveraged by most SDN solutions to improve\nnetwork management at the intra-domain level, cannot be fully exploited for controlling heterogeneous networks involving multiple Autonomous Systems (ASes) under different administrative authorities (e.g., the Internet).", "Considered as a large-scale SDN deployment for the public Internet, Espresso, which has been in production for more than two years, routes over 22% of Google\u2019s total\ntraffic to the Internet.", "I. INTRODUCTION\nTHE UNPRECEDENTED growth in demands and datatraffic, the emergence of network virtualization along with the ever-expanding use of mobile equipment in the modern network environment have highlighted major problems that are basically inherent to the Internet\u2019s conventional architecture.", "Finally, another important feature of Espresso is that it provides full interoperability with the rest of the Internet and the traditional heterogeneous peers.", "2) SDX-Based Controllers: Different from DISCO which proposes per-domain SDN controllers with inter-domain functions for allowing autonomous end-to-end flow management across SDN domains, recent trends have considered deploying SDN at Internet eXchange Points (IXPs) thus, giving rise to the concept of Software-Defined eXchanges (SDXes).", "In the same spirit, INRIA\u2019s D-SDN [92] enables a logical distribution of the SDN control plane based on a hierarchy of Main Controllers and Secondary Controllers, matching the organizational and administrative structure of current and future Internet."]} +{"3552149|11414835": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-", "In the case of an underlying physical SDN network, this could be implemented using an SDN network hypervisor that creates multiple logically-isolated virtual network slices (called vSDNs), each is managed by its own vSDN controller [14]."]} +{"3552149|2623404": ["In particular, surveys published in IEEE CST over the last few years elaborated on various topics within the SDN scope such as the concept, benefits and historical roots [9, 10], the architecture elements and", "the design challenges [9, 10, 11, 12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management challenge in SDN [16] and the application of SDN in wireless networks [17]."]} +{"3552149|4269723": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-"]} +{"18150208|870434": []} +{"18373940|902018": ["Here, we remark that the propagation speed of an acoustic wave is slower than that of a radio wave by five orders of magnitude [5]; moreover, compared with a radio channel, an acoustic channel has higher power loss, more limited bandwidth, and higher bit error rate.", "Localization is a process of finding such location information of the sensor nodes in a given coordinate system."]} +{"30811865|61132": ["It is a big issue because, in a communication network, topology changes frequently that affects both the network control and performance [20], [27]."]} +{"45617842|2535224": []} +{"45617842|36974339": []} +{"24110634|9495329": ["The surveys in [22] and [27] review SDN application in IoT, furthermore Bizanis and Kuipers [28] review the conjunction of SDN and NFV for IoT."]} +{"24110634|6583734": ["Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|11414835": ["The virtualizer ensures that all information collected is collated to form a virtualisation of the network state to the controller [29], [141]."]} +{"24110634|801245": ["WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization."]} +{"24110634|9040432": ["The survey study below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in\u2026"]} +{"24110634|2535224": ["\u2026below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in IoT [22], [27].", "Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|2623404": ["Large networks also become heterogeneous due to the use of different proprietary protocols, which fundamentally means they consist of different network islands that only cooperate at lower levels of communication [13], [33], [36].", "If no match is found, then appropriate rules are actioned, i.e. drop the packet, pass it to the next \ufb02ow table or send it to the controller for new rules to be made [13].", "The LFB has a speci\ufb01c function (such as routing) to process the packets [43], and enables the CE to control the FE [13].", "Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "If they match, appropriate actions are applied and if more than one entry match is found, prioritization, based on the highest degree of match, applies [13], [40].", "The instruction \ufb01eld determines what action should be taken upon a packet match [13].", "Recent research has focused on the development of both the southbound and northbound API standard-isation, with more focus on the southbound API [13].", "They both conform to the principle of decoupling the control and the data plane, but are fundamentally different [13].", "SDN introduces bene\ufb01ts such as vendor independence, heterogeneous network management, reliability and security not possible in traditional networks [12], [13], [16], [34], [35].", "Traditional networks are also mostly hierarchical, tree based and static, which leads to what most have termed \u2018\u2018ossi\ufb01cation\u2019\u2019 [13]."]} +{"24110634|10693567": ["The two most popular southbound interface speci\ufb01ca-tions are Forwarding and Control element separation (ForCes) [38], [39] and OpenFlow [40]\u2013[42]."]} +{"24110634|11735843": ["Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "The issue of virtualisation and cloud computing services has also necessitated a shift from conventional data storage towards SDN-oriented data storage and management [14].", "Another area which is the crux of this paper, is wireless sensor networks [14], [32], [56], [58]."]} +{"24110634|1230643": ["As Akyildiz et al. [8] and Qin et al. [106] allude, there has been less focus on the NB interface, whereas much attention has been dedicated to SB interfaces.", "WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization.", "Radio communication also consumes a huge chunk of power [8], it involves data transmission and reception."]} +{"24110634|10532321": ["The memory management techniques explored in [180] could be investigated from the SDWSN perspective.", "The rules placement problem is expounded with a comprehensive review of different solutions in [180]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"27062725|12601073": ["research has been done in ection schemes like energy d filter detection [15, 16, 17], n [18, 19, 20], and co-variance , 23, 24]."]} +{"20990528|902018": ["Underwater sensor deployment is a very crucial process as it decides the achievable sensing and communication coverage [46], [47]."]} +{"20990528|870434": ["In UWSN there is an unavoidable delay due to the propagation speed of the signals [89]."]} +{"32621400|31355144": ["Environmental Monitoring One of the most commonly used IoUT application types is environmental monitoring [8], including water quality monitoring, chemical and biological pollution monitoring, thermal pollution monitoring, pressure and temperature monitoring, and fishes tracking.", "In the last decade, researchers have presented numerous potential IoUT applications [8][9][10]][11][12]."]} +{"263015|2623404": ["[38] present programable networks in the context of SDN."]} +{"263015|1230643": ["Wireless Sensor Networks (WSNs) [57], [58] differ substantially from WCNs with respect to network and node"]} +{"9158767|8316096": ["Authors in [1], [2], and [18] provide an overview of existing networking protocols for underwater networks."]} +{"3493586|2623404": ["Although all these solutions adequately and automatically reconfigure the edge network, the static and manually configured core of the network remains the same [15].", "In SDN, research is gaining momentum to secure both the control and data plane [15]."]} +{"52288814|24110634": ["According to the main characteristics of SDN (shown as Figure 1), an integrated architecture based on the combination of SDN and WSN (SD-WSN) is presented [28], [29]."]} +{"52288814|9495329": ["Moreover, mobile WSNs are further classified into two categories: ordinary mobile WSNs and mobile agent WSNs where ordinary mobile WSNs are similar to mobile ad hoc networks presenting more limitations in terms of energy, so the use of mobile agent mode has been wisely proposed [36]."]} +{"52288814|270804": ["Routing protocol [8], [9], [10], [11], [12]: The transmission of data packets between nodes is mainly supported by a routing protocol which selects and controls the most suitable data path from a source node to a destination node through different hops."]} +{"39913756|9495329": ["Latter, SDN has been extended to support the next-generation wireless networks, such as Internet of Things [44] and 5G [45]."]} +{"39913756|4395259": [", impulse response of the reciprocal channel, frequency selectivity, received signal strength, to name a few, in the wireless channel can be found extensively in the literature [30], [31]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"52006577|8316096": ["For the underwater ad-hoc network, one of the most important issues is the routing algorithm design, which guarantees reliable and effective data transmission from the source node to the destination node (because the underwater environment is more harsh than that of the terrestrial environment, such as the propagation delay, the bandwidth, the energy consumption, the dynamic topology) [1].", "Therefore, the ad-hoc network becomes more and more popular to be used in underwater environment, such as the applications introduced in [1]."]} +{"24100891|2623404": ["To cope with the demand of these technologies smart networking solutions are required [9-11] to support flexible reliable, secure and well managed computer networks."]} +{"21725816|207262843": ["works on SDN and virtualization in LTE mobile networks is given in [18]."]} +{"21725816|2623404": ["In large scale networks such Arpanet, multiple domains with probably different transmission technologies are created and multiple controllers should be placed [11].", "A detailed survey on SDN functionalities and concepts is given in [11]."]} +{"2565970|2623404": ["The author of this paper has detailed the results in paper [11].", "The detailed compare can be found in [11, 13].", "ForCES and OpenFlow are often introduced as two well-known supporting technologies for SDN architecture [11, 12]."]} +{"53745558|3474164": ["A survey highlighting the improvement in the management aspect of WSNs by applying the SDN concept, is presented in [82]."]} +{"53745558|6909107": []} +{"53745558|24110634": [", switches and routers), and therefore these devices are equipped with only simple data forwarding functionalities [81].", "Comprehensive reviews in this context are carried out in [81] and [83], which summarize current work in this area and discuss design challenges, requirements and open issues.", "Encouraged by the success of SDN on both wired networks and wireless networks [79], [164], [170], SDN is envisioned as a promising technology to solve inherent problems with both terrestrial and underwater WSNs [5], [80], [81], [166], [171]."]} +{"53745558|30575518": ["The network layer is responsible for discovering and maintaining routes between a source and a destination node [1], [16], [21], [30]."]} +{"53745558|206578365": [", fog computing and edge computing [201]\u2013[203]) into UWSNs pour new vitality for further development."]} +{"53745558|8316096": ["In [23], more recently developed routing approaches are overviewed, including machine learning-based routing protocols.", "Several papers reviewed underwater routing techniques [16], [21], [23]."]} +{"53745558|31355144": ["The application layer performs various application-specific tasks by utilizing sensed data as well as the underlying physical infrastructure [27].", "1) UWSN Applications: UWSNs can be applied to a broad range of applications, which can roughly be classified in terms of environment monitoring, exploration, disaster prevention, assisted navigation and maritime military applications [1], [27], [43].", "In [27], a survey that focuses on the applications of UWSNs is carried out, in which the applications are classified into five groups in terms of monitoring activities, disaster management, military, navigation and sports."]} +{"53745558|801245": ["Hence, it provides users flexibility to implement multiple underwater applications efficiently by sharing the same underlying physical communication infrastructure [78].", "The concept of virtualization is applied to both terrestrial and underwater sensor networks [5], [11], [77], [78], [186].", "A few papers reviewed the gradual development of virtualization concept in terrestrial wireless sensor networks (WSNs) [77], [78].", "entire physical computing resources into softwarized network functions, which can be adaptively reconfigured and allocated quickly with high flexibility to meet diverse requirements [78].", "A more detailed overview is presented in [78], in which virtualization approaches are categorized into node-level, network-level and hybrid solutions."]} +{"53745558|2623404": ["Encouraged by the success of SDN on both wired networks and wireless networks [79], [164], [170], SDN is envisioned as a promising technology to solve inherent problems with both terrestrial and underwater WSNs [5], [80], [81], [166], [171]."]} +{"53745558|902018": ["Deployment algorithms are comprehensively surveyed in [20], in which these algorithms are categorized into three groups based on node mobility, such as static deployment, self-adjusted deployment and movement-assisted deployment."]} +{"53745558|3348390": ["in any place [187], [188]."]} +{"53745558|16335158": ["sor networks with cloud computing tightly in order to fulfill more complex service-oriented application requirements [84], [85], [199], [200].", "the concept of which manages connected sensors, data storage, processing and sharing [85].", "Two research papers surveyed terrestrial sensor-cloud in [84] and [85].", "Furthermore, in [85], sensor-cloud is overviewed in detail including its definition, architecture and applications."]} +{"53745558|870434": ["solutions [1]\u2013[4], [22], [43], [67], [72], [73]."]} +{"53745558|1708582": ["For example, in [146], reinforcement learning technique is integrated to the policy engine [148]."]} diff --git a/edge/graph_109938441.jsonl b/edge/graph_109938441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8601f340baaa7f54f917fa6a40a16ca6ecfc7ca5 --- /dev/null +++ b/edge/graph_109938441.jsonl @@ -0,0 +1,8 @@ +{"7033727|2742199": []} +{"110427943|1230643": ["Introduction While considerable effort has recently been focused on development of networked sensors for operation in air [1\u20139], sensor network technology has not been developed for application to liquid"]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"16337059|1236072": ["Finally, several user-oriented attributes, including fairness, latency, throughput and enhanced data querying schemes (i.e., time-driven [4] or query-driven) need to be taken into account even if they could be considered secondary with respect to our application purposes, as a WSN usually trades\u2026"]} +{"8411530|1503157": ["ZigBee protocol stack that defines three objects according its functions: network coordinator, routers, and semi-functional nodes [13]."]} +{"8411530|2937482": ["Time synchronization is an important performance in WSNs, because it is a key factor in the process called data fusion [14]."]} +{"8411530|1230643": ["A WSN (wireless sensor network) is an ad-hoc network system composed of a great number of tiny low cost and low power consumption sensing nodes which are capable of sensing, calculating and communicating data [2]."]} diff --git a/edge/graph_109939482.jsonl b/edge/graph_109939482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee7c6ecdaf9d9d1c143c44ffa0f94a1ef32df371 --- /dev/null +++ b/edge/graph_109939482.jsonl @@ -0,0 +1,3 @@ +{"138491249|42279552": []} +{"138491249|20905429": []} +{"23533839|109939482": []} diff --git a/edge/graph_109939628.jsonl b/edge/graph_109939628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6e742e3f9949a8fe89a0c2c2ab913fb501e8bfd --- /dev/null +++ b/edge/graph_109939628.jsonl @@ -0,0 +1,18 @@ +{"100860|15300368": ["Despite all these drawbacks, various case studies of monitoring of marine ecosystems using WSNs can be found in the literature [18].", "Thus, sensor buoys can be installed at the locations required by the instrumentation as nodes of a Wireless Sensor Network (WSN) [21,22] to make up measurement systems that are large and dense enough to provide the requisite spatial coverage.", "As noted above, the deployment of WSNs in marine environments is currently a challenge.", "By using different topologies and taking advantage of the possibilities of WSNs, data can be gathered from buoys located several miles off the coast.", "It has shown that the cost of the design and implementation of the buoy is low, that it can be integrated in a WSN, and that it can be deployed and will retain stability in aggressive and dynamic environments like the sea.", "None of these solutions fully satisfies our requirements because either they do not allow the integration of a wide range of marine sensors, or they were not designed to be part of a WSN with RF communications.", "However the design, implementation and deployment of a wireless buoy network for oceanographic applications, poses new challenges different from those posed by the deployment of WSNs on land, as the marine environment imposes limits on the sensor networks, affecting their development."]} +{"100860|1230643": ["Despite all these drawbacks, various case studies of monitoring of marine ecosystems using WSNs can be found in the literature [18].", "Thus, sensor buoys can be installed at the locations required by the instrumentation as nodes of a Wireless Sensor Network (WSN) [21,22] to make up measurement systems that are large and dense enough to provide the requisite spatial coverage.", "As noted above, the deployment of WSNs in marine environments is currently a challenge.", "By using different topologies and taking advantage of the possibilities of WSNs, data can be gathered from buoys located several miles off the coast.", "It has shown that the cost of the design and implementation of the buoy is low, that it can be integrated in a WSN, and that it can be deployed and will retain stability in aggressive and dynamic environments like the sea.", "None of these solutions fully satisfies our requirements because either they do not allow the integration of a wide range of marine sensors, or they were not designed to be part of a WSN with RF communications.", "However the design, implementation and deployment of a wireless buoy network for oceanographic applications, poses new challenges different from those posed by the deployment of WSNs on land, as the marine environment imposes limits on the sensor networks, affecting their development."]} +{"56176064|13172512": ["We are interested in spectrograms since by observing the literature [29] they effectively show the characteristics of sounds w."]} +{"14650873|1230643": ["UN CO RR EC TE D are densely deployed and collaborate to monitor and analyze a phenomenon of interest [66].", "For example, in the past, novel trends [66] have emerged in the agricultural sector converged in the socalled \u2018\u2018precision agriculture\u2019\u2019, which concentrates on providing the means for observing, assessing, and controlling agricultural practices."]} +{"31355144|13475127": []} +{"1516250|14441987": ["Mobile Ad-hoc Networks (MANETs) are a popular telecommunication technology that can easily be applied to almost any environment having fast configuration and no need for any underlying infrastructure support [4]."]} +{"19262113|30575518": ["Topology control can increase bandwidth and deal with the communication void region problem that diminishes the performance of geographic routing (Coutinho et al. 2017a; Ghoreyshi et al. 2017).", "This topology control methodology has been used to determine suitable UWSN topology reducing void nodes (Ghoreyshi et al. 2017), improve data collection (Forero et al. 2014), or enable much richer underwater applications relying on multimedia content (Fan et al. 2016)."]} +{"23986949|18744521": []} +{"13314107|870434": ["A system with a central controller can use contention-based MAC as well.", "Frequency Division Multiple Access (FDMA) divides the available bandwidth into several sub-bands and assigns one of them to a particular user.", "It is found that the absorption of electromagnetic energy in sea water is about f\u00d745 dB per kilometer, where f is frequency in Hertz; In contrast, the absorption of acoustic signal over most frequencies of interest is about three orders of magnitude lower [31]."]} +{"59552976|13475127": []} +{"16326047|17205659": ["In [41], it is proposed to add forward and backward secrecy, as new sensors are being deployed and old sensors fail."]} +{"18479344|1230643": ["D ISTRIBUTED environmental monitoring with wireless sensor networks (WSNs) is one of the most challenging research activities faced by the embedded system community in the last decade [1], [2], and [3]."]} +{"4650817|13475127": []} +{"110427943|1230643": ["Introduction While considerable effort has recently been focused on development of networked sensors for operation in air [1\u20139], sensor network technology has not been developed for application to liquid"]} +{"6956956|1230643": ["In recent years, technological developments have allowed designing compact systems for collecting and processing information characterized by low power consumption and connected in wireless networks [1][2][3]; network protocols used are simple, tuned to supporting small quantities of data."]} +{"62187922|870434": ["However, two critical characteristics, low transmission rates and long preambles, found in the commercial modem-based real systems, severely degrade the performance of existing MAC protocols in the real world."]} +{"2814849|15300368": ["In this context, Wireless Sensor Networks (WSNs) [1,2] offer a new paradigm for oceanography, as in many other disciplines such as precision agriculture, environmental, engineering, etc. WSNs are a type of autonomous, self-organized ad-hoc Wireless Personal Area Networks (WPAN) composed of tens,\u2026"]} +{"2814849|1230643": ["\u2026such systems as not really A-WSNs\u2014that is, systems incorporating considerable computational capacities, power and communications resources and hence contradicting the essential idea of an A-WSN in which the sensor nodes are limited in power, computational capacities, and memory as stated in [1].", "In this context, Wireless Sensor Networks (WSNs) [1,2] offer a new paradigm for oceanography, as in many other disciplines such as precision agriculture, environmental, engineering, etc. WSNs are a type of autonomous, self-organized ad-hoc Wireless Personal Area Networks (WPAN) composed of tens,\u2026", "A-WSNs [1,16] consist of a set of nodes with scanty power supplies, which moreover communicate with one another by way of low-consumption radio modules."]} diff --git a/graph_1891338.jsonl b/edge/graph_10995949.jsonl similarity index 100% rename from graph_1891338.jsonl rename to edge/graph_10995949.jsonl diff --git a/edge/graph_10996225.jsonl b/edge/graph_10996225.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8161b13954f3c74f7a0c545935f9c69e8c0f69cc --- /dev/null +++ b/edge/graph_10996225.jsonl @@ -0,0 +1 @@ +{"960776|192934": ["This seems underconstrained, especially when rules of thumb suggest that one needs ten times more examples than features [18]."]} diff --git a/edge/graph_10997547.jsonl b/edge/graph_10997547.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bca73f2a520c903b27def8ff4e0824d44dbb47b1 --- /dev/null +++ b/edge/graph_10997547.jsonl @@ -0,0 +1,11 @@ +{"1022282|1230643": []} +{"29818168|16514036": ["It is envisioned that BANs will be an indispensable component inside/on/around a person in the era of \u201cInternet of Things (IOT)\u201d [ 1 ].", "A Body Area Network (BAN) is a network of advanced inter- and intra- communicating sensors implanted in or around a human body [ 1 ]."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"8034286|8909218": []} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"303976|6539555": ["As the sensing technology advances, future mHealth applications are expected to emerge [7,8], such as cancer detection (through the monitoring of cancer cells), management of heart condition (through the monitoring of biochemical markers) and vision enhancement (through implanted retina prosthesis chips), to name a few."]} diff --git a/graph_189201.jsonl b/edge/graph_11001001.jsonl similarity index 100% rename from graph_189201.jsonl rename to edge/graph_11001001.jsonl diff --git a/edge/graph_11003991.jsonl b/edge/graph_11003991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f5801fe53bf1fe9e9965892ee6cf6625e985f3b --- /dev/null +++ b/edge/graph_11003991.jsonl @@ -0,0 +1 @@ +{"154887543|1289787": []} diff --git a/edge/graph_11004059.jsonl b/edge/graph_11004059.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c79104b5937d5f52cddb968da4bcea57e4541de7 --- /dev/null +++ b/edge/graph_11004059.jsonl @@ -0,0 +1 @@ +{"8244972|5969994": ["Ant Colony Optimization Algorithm Ant Colony Optimization (ACO) [18, 19] algorithm is a new kind of simulated evolutionary algorithm [20] and it has been successfully applied to several NP-hard combinatorial optimization problems ([21])."]} diff --git a/graph_1892195.jsonl b/edge/graph_11009327.jsonl similarity index 100% rename from graph_1892195.jsonl rename to edge/graph_11009327.jsonl diff --git a/graph_1896164.jsonl b/edge/graph_11010591.jsonl similarity index 100% rename from graph_1896164.jsonl rename to edge/graph_11010591.jsonl diff --git a/edge/graph_11013798.jsonl b/edge/graph_11013798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f49aca1f02073bc2321f82015830da16866edf9 --- /dev/null +++ b/edge/graph_11013798.jsonl @@ -0,0 +1,3 @@ +{"2511458|5473785": ["algorithm for singly connected Bayesian networks [3], [ 4 ] and call it Algorithm Pearl's algorithm deals directly with the conditional probability P ( x | u1 , ..., ), which is a matrix assuming all nodes are binary valued.", "The inference model is a network, i.e., a directed graph (DAG) where the nodes are random variables and certain independence assumptions hold [3], [ 4 ], [19].", "The DAG in Fig. 3 and probability distributions of (3) (6) constitute the inference model for the LLN of Fig. 2. This model is an of the so called sian networks [3], [ 4 ].", "The applicability of the two techniques to the LLN model remains an open The third method, conditioning, involves breaking the loops by instantiating a selected set of nodes to render network singly connected, so that belief updating algorithm can be applied [ 4 ].", "There is one in this model, formed by the B , O1 , N4 , O2 , C , O3 , and . There are three general approaches of belief for multiply connected Bayesian networks: clustering , conditioning , and [3], [ 4 ].", "For singly connected Bayesian networks (namely, networks with no more one path between any two RVs), the belief updating can be done in polynomial [3], [ 4 ].", "Algorithm 2. (Pearl's belief updating algorithm [3], [ 4 ].) A node X is when it receives messages from its parents, or the", "Two belief updating algorithms are presented in Section 4. Section and the Appendix summarizes the belief updating algorithm for a singly inference model originally proposed by Pearl [3], [ 4 ]."]} +{"14420985|6327434": ["There is an implicit assumption that the system being monitored is not amenable to standard linear modeling so that the standard linear systems approach to fault detection described in the control theory literature [ 2 ]-[4] is not applicable-this is frequently the case with complex real-world systems."]} +{"28470831|11013798": ["\u2026services between neighboring nodes on a path from a to b.\nDiagnosis of end-to-end network service failures [20] is a subtask of fault localization [8], [12], [21], [22] that isolates node-to-node services responsible for availability or performance problems experienced by end-to-end services."]} diff --git a/edge/graph_11013868.jsonl b/edge/graph_11013868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35158fa6db2d069b1589ee7f8002a2d6e9bbb88f --- /dev/null +++ b/edge/graph_11013868.jsonl @@ -0,0 +1,9 @@ +{"16604460|10658846": []} +{"11239559|10658846": []} +{"3204947|15813404": ["See Shabtay and Steiner [24] for a survey of these results."]} +{"37925315|12681089": []} +{"1591212|10658846": ["Device Power Management (DPM) is another commonly used energy management technique, aiming at reducing device energy consumption [4], [6], [7], [10].", "DPM techniques can be classified as stochastic, predictive, and timeout-based [4]."]} +{"2169695|11013868": ["For further results on energy-efficient scheduling we refer the interested reader to the reviews [2, 3, 21]."]} +{"14561425|10658846": ["The reader is referred to [5], [9], [36], [37] for comprehensive surveys."]} +{"42468384|10658846": ["Furthermore, there co uld be overhead in stopping at intermediate states, resulting in non-additive transition costs (see [4] for an e xample).", "The e mbedded systems community has invested a great deal of effort into devising policies governing the se lection of power states during idle periods (termed Dynamic Power Management in their literature); see, for example, [4] for a survey."]} +{"15174012|10658846": ["Some previous work on Dynamic Power Management does incorporate the latency involved in transitioning from the on to the sleep state and vice versa [ 1 ].", "Benini, Bogliolo and De Micheli give an excellent review of this work [ 1 ]."]} diff --git a/edge/graph_11026696.jsonl b/edge/graph_11026696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..654bfc8bddf36fa5a6b3dd533176220b07a7b75a --- /dev/null +++ b/edge/graph_11026696.jsonl @@ -0,0 +1,2 @@ +{"1437214|53680608": ["More extensive reviews have been written by Barron [1984] and by Aggarwal and Nandhakumar [1988] .", "Feature extraction and matching is an additional way to measure the flow field (for reviews of feature tracking methods, see Barron [1984] or Aggarwal and Nandhakumar [1988] ."]} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} diff --git a/graph_1898159.jsonl b/edge/graph_11028590.jsonl similarity index 100% rename from graph_1898159.jsonl rename to edge/graph_11028590.jsonl diff --git a/graph_1898434.jsonl b/edge/graph_110292214.jsonl similarity index 100% rename from graph_1898434.jsonl rename to edge/graph_110292214.jsonl diff --git a/graph_1906759.jsonl b/edge/graph_11034388.jsonl similarity index 100% rename from graph_1906759.jsonl rename to edge/graph_11034388.jsonl diff --git a/edge/graph_11034610.jsonl b/edge/graph_11034610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffba824cc19868a4121c24db678b396151c8bb8a --- /dev/null +++ b/edge/graph_11034610.jsonl @@ -0,0 +1,4 @@ +{"38469976|289357": ["Although both color-coding and dynamic programming across subsets appear in other work [5, 15, 17], it is our kernelization technique that permits the improvements."]} +{"3982106|289357": []} +{"118118762|289357": []} +{"117930143|15847982": []} diff --git a/edge/graph_11038925.jsonl b/edge/graph_11038925.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07d472a8527a30b7551199c2fea2ab812473946d --- /dev/null +++ b/edge/graph_11038925.jsonl @@ -0,0 +1,3 @@ +{"51373|14545307": []} +{"1526800|14545307": []} +{"61612996|14545307": []} diff --git a/edge/graph_11042075.jsonl b/edge/graph_11042075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3252212704ed9e762d0f7fec6eb99cea0931c25d --- /dev/null +++ b/edge/graph_11042075.jsonl @@ -0,0 +1,17 @@ +{"14556216|7788290": ["The study of human gait has been increased extensive interests in various fields such as clinical analysis, computer animation, athletic performance analysis, visual surveillance, robotics, and biometrics [6].", "It is well-known that biometrics are a powerful tool for reliable automated person identification [6][12]."]} +{"35128171|7788290": []} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"1863679|7788290": ["Although there is a rich body of work describing vision systems to deal with human detection, tracking, and action recognition [ 23 ], [51], computer vision researchers have only recently begun to investigate gait as a biometric feature.", "There is a great deal of related studies on gait, including physical medical studies [33]\u2013[35], psychology [29], [42], and approaches aiming to model human body and to track human motion [21], [ 23 ], [39], [51]."]} +{"1120094|7788290": ["Visual analysis of human movements [ 2 ] aims to detect, track and recognize people, and more generally, to understand human behaviours."]} +{"1622910|14970359": ["These works are reviewed by [1] and more recently [20]."]} +{"8164641|38476": ["However, the meaning and the labeling of the states are mostly unavailable in sequence classification [12]; for example, to recognize the sign \u201cbrother\u201d, how can the human labeler precisely supervise the training for the first state when he does not even know the state\u2019s meaning or how many states comprise the sign? In such situations, SBHMMs provide a solution to obtain similar discriminative classifiers in a unsupervised manner.", "The second corresponds to the sliding window methods [12] with fixed [8] or empirically determined [14] size.", "If the state can be clearly identified, for example in word tagging [10] and video segmentation [11], conditional models such as Conditional Random Fields (CRF) can be successfully applied to perform sequential classification [12]."]} +{"2371570|14970359": ["In computer vision research, human motion has been studied intensively [32], and there are a number of works on human gait analysis and recognition."]} +{"14117770|7788290": ["We review vision methods used in detection, tracking and recognition of human movement in general, as they are closely related to gait recognition ([7, 5, 13 ] are good surveys on this topic)."]} +{"13874338|7788290": ["There have been some allied studies such as biomechanics [21], physical medicine studies for therapy [38], psychological studies [37], and approaches aiming to model and track a human through an image sequence, though usually not for recognition [17], [25], [2], [15].", "There has been a rich amount of work on human modeling and tracking [17], [25].", "VISUAL analysis of human motion [17], [25] attempts to detect, track, and identify people, and, more generally, to understand human behaviors from image sequences involving humans."]} +{"7693282|14970359": ["A more recent, extensive survey [10] looks at more than 130 publications in computer vision-based human motion analysis and classifies them based on the issues addressed: Initialization (eight publications), tracking (48 publications), pose estimation (64 publications), and recognition (16\u2026"]} +{"7693282|7788290": []} +{"4536769|17516538": ["From the aforementioned examples, we can understand that the correlations between the different gait factors/components are very signi\ufb01cant for human recognition and gender recognition."]} +{"4536769|14970359": ["Some important surveys along with detailed comparisons of different algorithms can be found in [1], [13], [16], and [27]."]} +{"4536769|7788290": ["Some important surveys along with detailed comparisons of different algorithms can be found in [1], [ 13 ], [16], and [27]."]} +{"1049642|7788290": []} +{"9194043|7788290": ["from videos. A survey of work in human motion analysis can be found in [ 48 ]."]} diff --git a/edge/graph_11044594.jsonl b/edge/graph_11044594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f43cb50b9baef9f9040bbda617bc1abda0a0acf5 --- /dev/null +++ b/edge/graph_11044594.jsonl @@ -0,0 +1,2 @@ +{"2691882|11044594": ["For more detail on optimizing CHR compilation, see [Holzbaur et al. 2005; Schrijvers 2005; Duck 2005; Sneyers et al. 2008].", "Gentler introductions to CHR can be found in [Fr\u00fchwirth 1998], [Schrijvers 2005], [Fr\u00fchwirth 2008], and [Sneyers et al. 2008]."]} +{"17336406|11044594": []} diff --git a/edge/graph_11047851.jsonl b/edge/graph_11047851.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5cf25b881e2ac669ae98d25be276e08fcd66739 --- /dev/null +++ b/edge/graph_11047851.jsonl @@ -0,0 +1,2 @@ +{"2282460|14288295": [", and the Hidden Markov Models [Nelson et al. 1994; Bourlard and Morgan, 1998]."]} +{"2282460|15782139": ["Types of signature verification, methods and performance evaluation can be found in [Plamondon and Lorette, 1989; Leclerc and Plamondon, 1994; Plamondon and Srihari, 2000]."]} diff --git a/edge/graph_11047930.jsonl b/edge/graph_11047930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..280997cbce94a5f33088a41e239d3d3cfc1f55d2 --- /dev/null +++ b/edge/graph_11047930.jsonl @@ -0,0 +1 @@ +{"109985132|1230643": ["One of the primary advantages of deploying a wireless sensor network is its low deployment cost and freedom from requiring a messy wired communication backbone [1, 4]."]} diff --git a/edge/graph_11050081.jsonl b/edge/graph_11050081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f3937678e15c3a51fd7434178c86ee334ecbe21 --- /dev/null +++ b/edge/graph_11050081.jsonl @@ -0,0 +1,3 @@ +{"16263110|13726263": ["An important part of the most recent work is related to data streams; see the survey [12] and the references there."]} +{"18559882|8125630": []} +{"1919384|14140377": []} diff --git a/edge/graph_11050791.jsonl b/edge/graph_11050791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb0e425d1d324dd09c6e5901ea23633eb6580b9b --- /dev/null +++ b/edge/graph_11050791.jsonl @@ -0,0 +1,4 @@ +{"17103288|206986719": []} +{"17103288|18418184": ["Besides MFCCs, features like spectral flatness, tone peaks, and band energy are also used for audio fingerprinting [11].", "QBE uses audio fingerprinting technique [11].", "Similarity measures used for matching include Euclidean, Manhattan, and Hamming distances [11]."]} +{"12585270|1805048": ["on collaborative filtering techniques [2, 25], which predict a user\u2019s interest in an item by mining the patterns from the past rating information of other similar users and/or items."]} +{"63667922|192934": ["Jain and Zongker (1997) have written a good overview of experimental feature selection methods as well as an empirical study of their relative performance. Kirby (2001) offers a good resource for those looking for more specialized techniques than those discussed here.", "Jain and Zongker (1997) have written a good overview of experimental feature selection methods as well as an empirical study of their relative performance."]} diff --git a/graph_1919905.jsonl b/edge/graph_11057185.jsonl similarity index 100% rename from graph_1919905.jsonl rename to edge/graph_11057185.jsonl diff --git a/graph_192934.jsonl b/edge/graph_110583527.jsonl similarity index 100% rename from graph_192934.jsonl rename to edge/graph_110583527.jsonl diff --git a/graph_1939062.jsonl b/edge/graph_11061482.jsonl similarity index 100% rename from graph_1939062.jsonl rename to edge/graph_11061482.jsonl diff --git a/edge/graph_11068865.jsonl b/edge/graph_11068865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58eaa3740a453130b43c0e1f22068d4e5ad3f1fb --- /dev/null +++ b/edge/graph_11068865.jsonl @@ -0,0 +1,14 @@ +{"14380979|14303607": ["Therefore, Martinez and Du [15] proposed a new theoretical model for the description of multiple compound emotion categories such as happy or angry surprise.", "These challenging facial emotion recognition tasks also motivate us to employ theoretical research of Martinez and Du [15] to guide finer classifications of these compound negative and positive facial emotions."]} +{"7566628|5401262": ["Lastly, we describe the used regularizers and the inference procedure.", "Index Terms\u2014FACS, action unit intensity, spontaneous facial behavior, facial expression analysis, ordinal regression, conditional random fields, context modeling\n\u00c7"]} +{"1921438|5401262": []} +{"1921438|9036392": ["(The details of this procedure were presented in [30]."]} +{"1921438|192934": ["As reported in [35], an acceptable rule of thumb for the size of the", "Feature selection was preferred to PCA in this case since the needed reduction was lower, permitting us to retain a large number of the original features, together with their physical interpretation [35]."]} +{"11457137|8777381": ["But the confusion level for emotions of the same arousal level is very large [1].", "One of the major problems to determine the best features for emotion identification is that there is no solid theoretical basis relating the characteristics of the voice with the emotional state of the speaker [1]."]} +{"753606|14866098": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"753606|16362395": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"17784788|17574321": ["Continuous features are important in delivering the emotional cues of speakers [7], [9], [11] and thus have been widely used in speech emotion recognition [1], [7], [22]."]} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} +{"14646458|5401262": ["In addition, it is still an open question how to learn the grammars in defining dynamic features, and handle ambiguities in the input data [14]."]} +{"9969117|393948": ["Recently, it has been shown that unsupervised feature leaning is very helpful for ASR [43] and image understanding [2], [10]."]} +{"1187196|2301292": ["Given a query video, we extract video-patches from it, represent them as points on the manifold and match these points with the learnt SVM models followed by a voting based strategy to decide about the class of the query video.", "Index Terms\u2014Facial expression recognition, 3D videos, Grassmannian manifold, spectral clustering, SVM on Grassmannian manifold\n\u00c7"]} +{"9017015|6857179": ["[1], [2]), only few studies report the simultaneous"]} diff --git a/edge/graph_11074234.jsonl b/edge/graph_11074234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2035d728c9bfec82e2146a275696b3a47fd4b84e --- /dev/null +++ b/edge/graph_11074234.jsonl @@ -0,0 +1,6 @@ +{"44337427|9036392": []} +{"44337427|9045232": ["[10])."]} +{"242970|62198990": []} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} +{"45708844|4361938": ["The same is true for eye gaze tracking [15]."]} +{"45708844|9045232": [", identification of all regions in the scene that contain a human face [89], [44]."]} diff --git a/graph_1107573.jsonl b/edge/graph_1107573.jsonl similarity index 100% rename from graph_1107573.jsonl rename to edge/graph_1107573.jsonl diff --git a/graph_1942523.jsonl b/edge/graph_110761698.jsonl similarity index 100% rename from graph_1942523.jsonl rename to edge/graph_110761698.jsonl diff --git a/graph_1949367.jsonl b/edge/graph_110783042.jsonl similarity index 100% rename from graph_1949367.jsonl rename to edge/graph_110783042.jsonl diff --git a/edge/graph_110896416.jsonl b/edge/graph_110896416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13983cf0a122b6d8f89309bcc557dc49ff0e416d --- /dev/null +++ b/edge/graph_110896416.jsonl @@ -0,0 +1,9 @@ +{"2431645|6327434": [", bq characterizing the faulty behavior: (1) Find an estimate i of the process variable from a most consistent subset of measurements\u2022 (2) Identify the faulty measurement by parity checks\u2022 Obviously, to detect a single fault among p components at least p - 1 parity relations are required\u2022 This concept was generalized by Chow and Willsky (1984) and Lou et al.", ", bq characterizing the faulty behavior: (1) Find an estimate i of the process variable from a most consistent subset of measurements\u2022 (2) Identify the faulty measurement by parity checks\u2022 Obviously, to detect a single fault among p components at least p - 1 parity relations are required\u2022 This concept was generalized by Chow and Willsky (1984) and Lou et al. (1986) for the case of using the temporal redundancy relations of the dynamic system\u2022 Suppose the system is given by the linear discrete state equations", ") A popular approach is based on multiple hypotheses testing (Willsky, 1976).", "The multiple hypotheses testing can, for example, be carried out using Bayesian decision theory (Willsky, 1976)."]} +{"11487346|6327434": ["Several state observers are designed for a definite fault signal and detected by a hypothesis test (Willsky, 1976).", "Process model-based fault-detection methods Different approaches for fault-detection using mathematical models have been developed in the last 20 years, see, e.g., (Chen & Patton, 1999; Frank, 1990; Gertler, 1998; Himmelblau, 1978; Isermann, 1984, 1997; Patton, Frank, & Clark, 2000; Willsky, 1976)."]} +{"110630454|6327434": []} +{"2712168|6327434": []} +{"1859069|6327434": ["Generalized Likelihood Ratio (GLR) testing and Sequential Probability Ratio Testing (SPRT) (Willsky, 1976; Basseville, 1988) can be used to examine the residual and, subsequently to diagnose faults.", ", 1975; Clark, 1979; Frank, 1987; Frank, 1990; Patton and Kangethe, 1989; Patton and Chen, 1997) or Kalman filter(s) in a stochastic setting (Mehra and Peschon, 1971; Willsky, 1976; Frank, 1987; Basseville, 1988; Tzafestas and Watanabe, 1990; Da and Lin, 1996; Zolghadri, 1996; Sohlberg, 1998).", "\u2022 Sequential probability ratio testing (SPRT) (Wald, 1947; Willsky, 1976; Tzafestas and Watanabe, 1990; Grainger, Holst, Isaksson and Ninness, 1995) and modified SPRT (Gai and Gurry, 1977; Speyer and White, 1984; Tzafestas and Watanabe, 1990).", "Many variants of the idea of hypothesis testing for FDI have been published since (Willsky, 1976; Basseville, 1988; Tzafestas and Watanabe, 1990; Nikoukhah, 1994; Chang and Chen, 1995; Zolghadri, 1996; Basseville, 1997; Sohlberg, 1998).", "10 Fault Diagnosis for Stochastic Systems For stochastic systems, the FDI is based on statistical testing of the residuals (Willsky, 1976; Basseville and Benveniste, 1986; Basseville, 1988; Tzafestas and Watanabe, 1990; Basseville and Nikiforov, 1993; Da and Lin, 1996; Zolghadri, 1996; Basseville, 1997; Sohlberg, 1998), for example:"]} +{"122976178|6327434": []} +{"55987796|6327434": []} +{"108711497|6327434": []} +{"60554532|6327434": []} diff --git a/edge/graph_11089739.jsonl b/edge/graph_11089739.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e604a6130272735713b55928d74be69743a6964 --- /dev/null +++ b/edge/graph_11089739.jsonl @@ -0,0 +1,2 @@ +{"19700047|8835588": ["Context can be considered a key element for enabling semantic interoperability (Bre\u00b4zillon 1999).", "Context can be considered a key element for enabling semantic interoperability (Brezillon 1999 )."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} diff --git a/graph_1972930.jsonl b/edge/graph_11093548.jsonl similarity index 100% rename from graph_1972930.jsonl rename to edge/graph_11093548.jsonl diff --git a/graph_1981516.jsonl b/edge/graph_11095868.jsonl similarity index 100% rename from graph_1981516.jsonl rename to edge/graph_11095868.jsonl diff --git a/edge/graph_110988281.jsonl b/edge/graph_110988281.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aec2380b7ca37a81d83e76a0f8051a1a8b7d9a1d --- /dev/null +++ b/edge/graph_110988281.jsonl @@ -0,0 +1,12 @@ +{"122883785|54009499": []} +{"10638307|54009499": ["The PLSP is based on the assumption that at most one setup may occur within a period.", "Recently, another new type of model has been published which is called the proportional lot sizing and scheduling problem (PLSP) [5].", "For a review of lot-sizing and scheduling models we refer to [5].", "Hence, the DLSP and PLSP are called small-bucket problems and the CLSD is a large-bucket problem.", "But in contrast to the DLSP and PLSP many items are producible per period.", "As in the PLSP, the setup state can be preserved over idle time."]} +{"1634580|2135552": ["However, scheduling is not the main focus and we refer the reader to Floudas & Lin (2004, [42]), Jia and Ierapetritou (2004,[65]), Janak et al.", "While for scheduling problems, there is not yet a commonly accepted state-of-the-art technology and the majority of software packages is still based on pure heuristics there is light at the end of the tunnel: A promising approach, continuous-time formulation has been developed [42], and batch scheduling problems leading to MILP problems can be extended to multi-stage stochastic optimization solved by special decomposition techniques."]} +{"27704706|54009499": ["[3,27,13] of scheduling models that deal with batching and lotsizing issues in Ref."]} +{"27704706|62204132": []} +{"17460314|54009499": []} +{"17460314|62204132": []} +{"62242696|54009499": []} +{"108578029|54009499": ["Heuristic methods can also be found in the literature (see the review in Drexl and Kimms (1997).", "For an extensive review of lot-sizing problems and solution methods, see Pochet and Wolsey (1995), Constantino (1995) and Drexl and Kimms (1997)."]} +{"6849168|7773456": ["Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12.0). BrumeUe & Sidney [1982] show that Johnson's [1954] algorithm for F21 I C max also applies to the exponential case.", "Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12."]} +{"7575846|54009499": ["Drexl and Kimms (1997) provide a broad survey of the lot-sizing and scheduling literature."]} +{"123826139|62204132": []} diff --git a/graph_1983971.jsonl b/edge/graph_110995515.jsonl similarity index 100% rename from graph_1983971.jsonl rename to edge/graph_110995515.jsonl diff --git a/edge/graph_11101499.jsonl b/edge/graph_11101499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c317fad2fe0556089ff9e10b6df7b21b4856287 --- /dev/null +++ b/edge/graph_11101499.jsonl @@ -0,0 +1,3 @@ +{"51373|14545307": []} +{"2177538|14545307": []} +{"20848435|192934": []} diff --git a/graph_1987550.jsonl b/edge/graph_11103391.jsonl similarity index 100% rename from graph_1987550.jsonl rename to edge/graph_11103391.jsonl diff --git a/graph_1991294.jsonl b/edge/graph_11104597.jsonl similarity index 100% rename from graph_1991294.jsonl rename to edge/graph_11104597.jsonl diff --git a/graph_180217.jsonl b/edge/graph_11105012.jsonl similarity index 100% rename from graph_180217.jsonl rename to edge/graph_11105012.jsonl diff --git a/graph_1991786.jsonl b/edge/graph_111053365.jsonl similarity index 100% rename from graph_1991786.jsonl rename to edge/graph_111053365.jsonl diff --git a/graph_2000872.jsonl b/edge/graph_11108095.jsonl similarity index 100% rename from graph_2000872.jsonl rename to edge/graph_11108095.jsonl diff --git a/graph_2016509.jsonl b/edge/graph_1110872.jsonl similarity index 100% rename from graph_2016509.jsonl rename to edge/graph_1110872.jsonl diff --git a/edge/graph_11110068.jsonl b/edge/graph_11110068.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df576f0fc797c0a0bbd5f7825e5ad18e799d6b89 --- /dev/null +++ b/edge/graph_11110068.jsonl @@ -0,0 +1,5 @@ +{"156860777|9948664": []} +{"156860777|54878689": []} +{"18306900|15164501": ["\u2026present conceptualizations of key constructs, identify methods and methodological weaknesses, detect major themes in a body of literature, and highlight how understanding about a phenomenon might be extended [Boell and Cecez-Kecmanovic, 2014; Leidner and Kayworth, 2006; Webster and Watson, 2002]."]} +{"14990549|15164501": []} +{"14990549|35897447": []} diff --git a/edge/graph_11112426.jsonl b/edge/graph_11112426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d871dc18b43042aa754ce9d8aee1607fa61a3533 --- /dev/null +++ b/edge/graph_11112426.jsonl @@ -0,0 +1,6 @@ +{"8588000|192934": []} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"15904801|1188683": []} +{"11927662|11112426": ["ng model, the observed hyperspectral vectors belong to a simplex set whose vertices correspond to the endmembers. Therefore, \ufb01nding the endmembers amounts to identifying the vertices o f that simplex [1, 2, 19, 17, 4, 14, 21]. Sparse regression is another direction recently explored for HU [2, 10], which has connections with both the statistical and the geometrical frameworks. In this approach, the problem is formulated a", "the-shelf methods in terms of speed and accuracy. 1. INTRODUCTION Hyperspectral unmixing (HU) is a source separation problem with applications in remote sensing, analytical chemistry, and other areas [2, 11, 12, 13]. Given a set of observed mixed hyperspectral vectors, HU aims at estimating the number of reference spectra (the endmembers), their spectral signatures, and their fractional abundances, usually under", "lity of the data, places HU beyond the reach of most standard source separation algorithms, thus fostering active research in the \ufb01eld. Most HU methods can be classi\ufb01ed as statistical or geometric al [2]. In the (statistical) Bayesian framework, all inference relies on the posterior probability density of the unknowns, given the observations. According to Bayes\u2019 law, the posterior probability density"]} +{"41699975|192934": ["al [59] define pattern recognition as the study of how machines can observe the environment, learn to distinguish patterns of interest from their background, and make sound and reasonable decisions about the categories of the patterns.", "On contrary, if the form of class-conditional densities is unknown, then we operate in a nonparametric mode [59].", "In the case of unsupervised learning, algorithms generally are based on the following two popular clustering techniques: iterative square-error partitional clustering and hierarchical clustering [59].", "Some of them may be: (i) the small number of samples relative to the number of features (known as curse of dimensionality to which we will refer later); (ii) the classifier is too intensively optimized on the training set (overfitting); (iii) the number of unknown parameters associated with the classifier is too large [59]."]} +{"25772266|1188683": []} diff --git a/edge/graph_11118693.jsonl b/edge/graph_11118693.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd50808635a70453964eeb5b3a56f1dc757eb177 --- /dev/null +++ b/edge/graph_11118693.jsonl @@ -0,0 +1,3 @@ +{"16890095|2795037": ["We have implemented a prototype system based on the proposed query model to verify the applicability of established optimization techniques [3, 6] in the context of query plans with automata constructs.", "We adopt the tuple model in this layer to simplify the design of operators and particularly to leverage various established query optimization techniques developed specifically for the tuple model [3, 6].", "While previous work [2, 8, 14, 11] has shown that automata theory is suited for XPath-like pattern retrieval over token-based XML data streams, we find these automata-based approaches suffer from being not as flexibly optimizable as, for example, traditional database systems that are based on query algebras [3, 6].", "On the other hand, the traditional database literature [7, 3, 6, 9] has advocated algebraic systems as the suitable foundation for query optimization and evaluation.", "Hence traditional query optimization techniques such as equivalent rewriting [3, 6] are not directly applicable."]} +{"10046418|11118693": ["The structures for which Immerman has obtained his logical characterization of DSPACE(logn) are ordered, i.e., they are equipped with a total order \u2264, which can either be specified directly or, as transitive closure is available in the logical language, by a direct successor relation.", "Second, Immerman [33] showed that these languages can be specified using first-order logic with an additional deterministic transitive closure operator \u2013 it is one of the main results in the field of descriptive complexity [16, 35].", "Thus, for k = 1 (single-head automata vs. unary transitive closure), our main characterization for tree languages, Theorem 5.3, can be seen as a \u2018regular\u2019 restriction of the result of Immerman characterizing DSPACE(logn); on the one hand only (single-head) automata with nested pebbles are allowed, while on the other hand we consider only unary transitive closure, i.e., transitive closure for \u03c6(x, y) where x, y are single variables.", "This refines our earlier result that placed these automata between first-order and monadic second-order logic on trees."]} +{"10046418|6848297": ["For an overview on logics for unranked trees, see [39]."]} diff --git a/graph_2021789.jsonl b/edge/graph_11122825.jsonl similarity index 100% rename from graph_2021789.jsonl rename to edge/graph_11122825.jsonl diff --git a/graph_2034384.jsonl b/edge/graph_111279453.jsonl similarity index 100% rename from graph_2034384.jsonl rename to edge/graph_111279453.jsonl diff --git a/graph_2036805.jsonl b/edge/graph_1113420.jsonl similarity index 100% rename from graph_2036805.jsonl rename to edge/graph_1113420.jsonl diff --git a/graph_2077573.jsonl b/edge/graph_11136930.jsonl similarity index 100% rename from graph_2077573.jsonl rename to edge/graph_11136930.jsonl diff --git a/edge/graph_111389166.jsonl b/edge/graph_111389166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f9dbed4648481e2fddc906b48b3310425079cf6 --- /dev/null +++ b/edge/graph_111389166.jsonl @@ -0,0 +1,8 @@ +{"18606008|5401262": ["\u2026for Motivation: Using a Single Wearable Accelerometer to Detect People s Interests Gwenn EnglebienneHayley \nHung University of Amsterdam University of Amsterdam Science Park 904 Science Park 904 1098XH Amsterdam \n1098XH Amsterdam G.Englebienne@uva.nl hayleyhung@gmail.com ABSTRACT This paper\u2026", "Mining for Motivation: Using a Single Wearable Accelerometer to Detect People s Interests Gwenn EnglebienneHayley \nHung University of Amsterdam University of Amsterdam Science Park 904 Science Park 904 1098XH Amsterdam \n1098XH Amsterdam G.Englebienne@uva.nl hayleyhung@gmail.com ABSTRACT This paper presents a novel investigation \nof how motion as measured with just a single wearable accelerometer is infor\u00admative of people s interests \nand motivation during crowded social events.", "Our experiments show that despite the challenge of the pro\u00adposed task, useful automated predictions are \npossible and demonstrate the potential for further research in this area."]} +{"8922219|5238287": ["However, automated gender identification by computer is still a challenging task [1].", "A detailed survey of gender identification using gait and face biometrics is presented in [1, 6]."]} +{"16301944|17516538": ["Vision-based systems are widely used in recent years, such as [9, 10, 11, 12]."]} +{"16301944|7185733": ["The common methodologies that have been used for arm gesture recognition are: (1) template matching [15]; (2) neural networks [15]; (3) statistical method, and (4) multi-modal probabilistic combination [16]."]} +{"15064544|7834819": ["Accelerometers have advantages over other techniques in quantitatively measuring human movement [8].", "The most popular sensor location is on waist as it is close to the centre of mass of a whole body and can better represent human movement [8]."]} +{"12628004|18599847": ["Deep Learning has however comparatively been used poorly to process time series data such as motion sensors [52]."]} +{"32884417|192934": ["Cross-validation is a well-established technique used in pattern recognition experiments to avoid training and testing on the same data when only small data sets are available (13).", "The first approach was n-fold cross validation (n-fold validation) (13)."]} +{"5005302|7834819": []} diff --git a/graph_2080455.jsonl b/edge/graph_11139156.jsonl similarity index 100% rename from graph_2080455.jsonl rename to edge/graph_11139156.jsonl diff --git a/graph_2090796.jsonl b/edge/graph_11141470.jsonl similarity index 100% rename from graph_2090796.jsonl rename to edge/graph_11141470.jsonl diff --git a/graph_2095850.jsonl b/edge/graph_1114486.jsonl similarity index 100% rename from graph_2095850.jsonl rename to edge/graph_1114486.jsonl diff --git a/graph_2109604.jsonl b/edge/graph_11152872.jsonl similarity index 100% rename from graph_2109604.jsonl rename to edge/graph_11152872.jsonl diff --git a/edge/graph_11154506.jsonl b/edge/graph_11154506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc6f0e00ac73802352f2ae3331ea363a93dce520 --- /dev/null +++ b/edge/graph_11154506.jsonl @@ -0,0 +1,5 @@ +{"16028707|1400872": ["Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al.", "Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al., 2002), and statistical learning algorithms (e.g. locally weighted regression ) for dynamical systems\u2026"]} +{"206093928|17464562": []} +{"16472569|1400872": []} +{"12769414|1708582": []} +{"17044754|14171067": ["The error between two trees was computed based on the edit distance (Bille, 2005; Shasha & Zhang, 1997)."]} diff --git a/graph_2109857.jsonl b/edge/graph_11158870.jsonl similarity index 100% rename from graph_2109857.jsonl rename to edge/graph_11158870.jsonl diff --git a/edge/graph_11159330.jsonl b/edge/graph_11159330.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5cc8ab0362ed1acf27a3f9e3bf5fc947490afb65 --- /dev/null +++ b/edge/graph_11159330.jsonl @@ -0,0 +1,20 @@ +{"36277406|14022133": ["Despite the great amount of work done in ontology-based data integration, an important problem that most of the systems tend to ignore is that ontologies are living artifacts and subject to change [3].", "When using ontologies to integrate data, one is required to produce mappings [3], to link similar concepts or relationships from the ontology/ies to the sources by way of an equivalence."]} +{"2898750|1574374": ["In its simplest form, this might consist of the date when the change is valid in the real world, conform tovalid datein temporal databases [18] (in this terminology, the \u201cdate\u201d in the descriptive meta-data is called transaction date )."]} +{"396211|1574374": []} +{"5580885|14022133": ["The field of ontology debugging addresses the problem of resolving invalidities in ontologies [28].", "A detailed survey of the field appears in [28].", "Ontology evolution deals with adapting an ontology to changes in its domain or conceptualization [28].", "This work is related to different research fields, including ontology evolution [28], belief revision [31], database repairs [1,4], ontology debugging [28] and updating databases through views [5,37].", "Surveys of existing ontology debugging approaches can be found at [28,35].", ", due to entity resolution or disambiguation [51]), and other eventualities [28,57,61]."]} +{"14022133|12860838": ["It is a common practice in the literature to consider heterogeneity resolution to be an internal part of ontology merging or integration (De Bruijn et al. 2004), (Choi et al. 2006), (He\ufb02in et al. 1999), (Pinto et al. 1999).", "The interested reader is referred to (De Bruijn et al. 2004), (Choi et al. 2006), (Euzenat et al. 2004), (Euzenat & Shvaiko, 2007), (Kalfoglou & Schorlemmer 2003), where a more extensive list of systems and works related to these research areas can be found.", "Equivalently, we could say that ontology matching is the task of creating links between two ontologies (Choi et al. 2006).", "Therefore, the task of relating (matching) the heterogeneous elements of the source ontologies constitutes the \ufb01rst step (and a major part) of the task of ontology merging or integration (Choi et al. 2006).", "An extensive list of works related to ontology merging can be found in (De Bruijn et al. 2004), (Choi et al. 2006), (Pinto et al. 1999)."]} +{"14022133|10500613": ["A detailed classi\ufb01cation appears in \ufb01gure 2 (Manakanatas & Plexousakis 2006), which is an extended and improved version of a \ufb01gure appearing in (Rahm & Bernstein 2001)."]} +{"14022133|913718": ["Notice that, in several cases, e.g., (Aumueller et al. 2005), (David et al. 2006), (Giunchiglia et al. 2006), (Hu & Qu 2006), (Shvaiko & Euzenat 2005), (Zhdanova & Shvaiko 2006), the term ontology (schema) matching is used to refer to ontology alignment and the two terms are used interchangeably\u2026", "Due to the close relationship between these topics, sometimes the terms ontology alignment (in (Euzenat et al. 2004)), ontology mapping (in (Kalfoglou & Schorlemmer 2003)), or ontology-schema matching (in (Shvaiko & Euzenat 2005)) are used to refer collectively to all these areas."]} +{"8390013|1574374": ["In [21] a survey on schema versioning and evolution is presented, whereas a categorization of the overall issues regarding evolution and change in data management is presented in [20]."]} +{"17779155|14022133": ["There has been comparatively little previous research on efficient ontology versioning for large ontologies [3]."]} +{"11363830|14022133": ["Despite the great amount of work done in ontology-based data integration, an important problem that most of the systems tend to ignore is that ontologies are living artifacts and subject to change [2]."]} +{"8007753|10500613": ["Rahm and Bernstein (2001) survey the approaches that use linguistic techniques to look for synonyms, machine-learning techniques to propose matches based on instance data, information-retrieval techniques to compare information about attributes, and so on.", "Rahm and Bernstein (2001) survey the approaches that use linguistic techniques to look for synonyms, machine-learning techniques to propose matches based on instance data, information-retrieval techniques to compare information about attributes, and so on. Cupid (Madhavan, Bernstein, & Rahm 2001), for example, integrates many of these approaches in an algorithm that starts by matching leaf concepts in the hierarchy and then proceeding ..."]} +{"8007753|1574374": []} +{"18890896|14022133": []} +{"18890896|10500613": []} +{"6448211|14022133": ["This mapping is produced by a matcher [Euzenat and Shvaiko 2007; Ferrara et al. 2011; Flouris et al. 2008], which is used to identify terminological changes.", "Mappings are computed by matchers [Euzenat and Shvaiko 2007; Ferrara et al. 2011; Flouris et al. 2008], which employ various sophisticated, heuristic-based techniques that consider the neighborhood of RDF Graph nodes and/or application-specific information to identify nodes with different names that correspond to the same real world entity.", "This mapping is produced by a matcher [Euzenat and Shvaiko 2007; Ferrara \net al. 2011; Flouris et al. 2008], which is used to identify terminological changes."]} +{"14776642|14022133": ["A comprehensive overview on the field of ontology change is given in [4]."]} +{"2941712|14140377": []} +{"17232263|1574374": ["The terms that we use are known from the database schema versioning literature Roddick (1995).", "This addition is a monotonic extension to the ontology and the new version can be considered as being backward compatible with the first version.\nclass-defProfessionalEducation subclass-ofEducation disjoint AcadamicEducation ProfessionalEducation class-defHBO\nsubclass-ofHigher-Education-Institute\u2026"]} +{"6497230|14022133": []} +{"6783584|1574374": []} diff --git a/graph_1116024.jsonl b/edge/graph_1116024.jsonl similarity index 100% rename from graph_1116024.jsonl rename to edge/graph_1116024.jsonl diff --git a/edge/graph_11163715.jsonl b/edge/graph_11163715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55f315d18a937b324f4051150ed4c56af11fa9a3 --- /dev/null +++ b/edge/graph_11163715.jsonl @@ -0,0 +1 @@ +{"3384796|8450611": ["Extensive overviews of state-of-the-art traffic classification can also be found in [20], [28], [17], [24] Taxonomy of internet traffic classification as analyzed and proposed by Zhang et al. [32] Encryption is an effective way of protecting the traffic from unauthorized observation."]} diff --git a/edge/graph_11167066.jsonl b/edge/graph_11167066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f046e875e907c7f20b058bc3ffa6b404e3af799 --- /dev/null +++ b/edge/graph_11167066.jsonl @@ -0,0 +1,4 @@ +{"280556|17516538": []} +{"280556|14970359": ["In Section 5, we provide a computational example.", "In Section 2, the definition of the Cayley\u2013Menger determinant is introduced as well as related classic results in Distance Geometry.", "Now suppose that inaccurate distances \u00af d 0i , i =1, 2, 3 acquired by either noisy range measurements or computations [9\u201311], are available while the d ij , the accurate Euclidean distances between anchor nodes with i = j , i, j = 1, 2, 3, are known."]} +{"280556|7788290": []} +{"9973912|15326253": []} diff --git a/graph_2119856.jsonl b/edge/graph_11167958.jsonl similarity index 100% rename from graph_2119856.jsonl rename to edge/graph_11167958.jsonl diff --git a/edge/graph_11172617.jsonl b/edge/graph_11172617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51fda4c8ed4d2b1da3ecbb7cac5f93569071fdb4 --- /dev/null +++ b/edge/graph_11172617.jsonl @@ -0,0 +1,4 @@ +{"39152635|53531425": []} +{"207713272|2511280": ["Then, the average treatment effect (ATE) is estimated as follows: Note that several approaches for finding optimal pairs of units have been proposed [50]."]} +{"7778144|3348390": []} +{"8620989|2003896": ["Most of the previous studies propose interruptibility management systems that leverage the concept of anticipatory computing [8] to predict opportune moments"]} diff --git a/graph_2120546.jsonl b/edge/graph_11176923.jsonl similarity index 100% rename from graph_2120546.jsonl rename to edge/graph_11176923.jsonl diff --git a/graph_2128503.jsonl b/edge/graph_11177938.jsonl similarity index 100% rename from graph_2128503.jsonl rename to edge/graph_11177938.jsonl diff --git a/edge/graph_11179184.jsonl b/edge/graph_11179184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6069f667d40d11fdf01bbf55c3e33de04983850d --- /dev/null +++ b/edge/graph_11179184.jsonl @@ -0,0 +1,25 @@ +{"7590658|7399829": ["The generation of membership function is very important [6][7]."]} +{"15023882|6028805": ["For the detailed review on current advances in visual and thermal face recognition refer to [16]."]} +{"17666400|6028805": []} +{"186587|6028805": ["Thermal or far infrared imagery has been used for face recognition (cf. a survey paper [36])."]} +{"12199031|6028805": ["For the detailed review on current advances in visual and thermal face recognition refer to [21]."]} +{"8378624|192934": ["The last row of Table VI shows the generalization ability of the SFBS-based ensemble formation.", "0 experiments, where four fusion schemes (SUM, PLUR, HC, and MOD-PLUR) and four ensemble-construction algorithms (Ens-All, Ens-SFBS, Ens-Cluster, and Ens-BestN) are presented.", "Ens-All: All 16 experts in the ensemble, Ens-SFBS: Subset of face experts selected by the SFBS method, Ens-Cluster: Selection of best experts from each cluster (see Fig.", "The ninth row of Table VI shows the selected experts found by the SFBS algorithm on the v2.", "The SFBS-based construction of the face ensembles has shown that some of the base classifiers are redundant and that their inclusion may lead to suboptimal identification rates.", "In analogy to the feature-selection methods, we consider each classifier as a feature and apply the SFBS [60] to find the near-optimal subset for each fusion technique.", "The SFBS-based classifier-selection algorithm can be stated as follows.", "0) where SFBS-based ensemble construction algorithm selects diverse experts and obtains the best identification accuracy.", "10(a) (black dotted curve), whereas the two lines correspond to the accuracies of the total ensemble (the N = 16 case) and the SFBS ensemble, respectively.", "It should be noted that these subsets were found by applying SFBS for experiment E1, and the recognition accuracies of the other experiments were reported for these specific subsets.", "The optimal ensemble formation is given by the SFBS algorithm.", "We have chosen to report the accuracies for experiments E2, E3, and E4 in order to test the generalization ability of the SFBS-based classifier-selection algorithm.", "As expected, the indiscriminate ensemble of the best ones performs worse than the judiciously chosen SFBS subset case.", "We have applied the SFBS algorithm to SUM, PRODUCT, PLUR, HC, and MOD-PLUR fusion schemes and found nearoptimal subsets for E1.", "Although the performance gradually improves by adding new base experts, it is always suboptimal when compared to the SFBS-ensemble performance.", "It is more appropriate to apply the SFBS algorithm to a separate validation set and then to report the final classification rates on an independent test set.", "The choices of SFBS indicate the importance of diversity and complementariness in ensemble formation."]} +{"16150417|6028805": ["It has several drawbacks also like: glasses block most of thermal energy; due to speed and window glasses it is not possible to recognize vehicle occupants; ambient temperature or activity level may change thermal characteristics, low image resolution [4]."]} +{"32264759|16620699": []} +{"19027553|6028805": ["Thermal or far infrared imagery has been used for face recognition ( cf. and a survey paper [10])."]} +{"359842|16620699": ["Comprehensive recent surveys of literature on 3D face recognition can be found in [251] and [252]."]} +{"359842|6028805": ["A comprehensive review of recent advances in face recognition from infra-red imagery may be found in [268]."]} +{"359842|9045232": ["\u2026one or more of the following: low quality images (though image quality may be enhanced by exploiting super-resolution techniques [220-223]); cluttered backgrounds (which complicate face detection [224]); the presence of more than one face in the picture; and a large amount of data to process [71]."]} +{"359842|192934": ["A couple of classifiers described in [211] are then applied to identify the individual in the frame and, finally, a super-classifier based on a voting scheme [212] performs the final classification for the entire video sequence (Figs."]} +{"5011800|9045232": ["grayscale images [12]."]} +{"14068010|6028805": []} +{"18744164|6028805": ["\u00c7"]} +{"8680490|6028805": ["Multimodal Approaches: Recently, there have been various studies that combine 3D geometry information with 2D texture [7, 20, 33, 35] or IR data [19, 9, 29, 37]."]} +{"16108325|6028805": ["Prior research has been done on detection using mid and long wave IR (thermal imaging) [4]."]} +{"2377597|16620699": ["However, even when it is acknowledged that 2D currently appears to offer better recognition performance, this is often thought to be a temporary situation\u2014 \u2018\u2018Although 2D face recognition still seems to outperform the 3D face recognition methods, it is expected that this will change in the near future\u2019\u2019 [51].", "[51] give an alternate survey of some of the earlier work in 3D face recognition."]} +{"207218990|5171123": ["Many papers are written and many real-world systems are being developed and distributed [1, 12, 19, 22]."]} +{"207218990|6028805": ["Many papers are written and many real-world systems are being developed and distributed [1, 12, 19, 22].", "[12] and [5], yet no available database provides such images."]} +{"6985540|16620699": ["The independence from the lighting conditions, as well as the study of a 3D object such as the human face by means of 3D techniques are some of the advantages of these methods respect of 2D cases [2, 3, 4]."]} +{"30225422|16620699": []} +{"24987418|6028805": ["While, the visible spectrum eigenfaces contain mostly low-frequency information, the corresponding IR thermal eigenfaces have fewer low-frequency components and many more high-frequency components [15].", "Earlier approaches were based on determining the thermal shape of the face and used it directly for identification [15]."]} +{"15263913|16620699": []} diff --git a/graph_2128658.jsonl b/edge/graph_11181167.jsonl similarity index 100% rename from graph_2128658.jsonl rename to edge/graph_11181167.jsonl diff --git a/graph_1118130.jsonl b/edge/graph_1118130.jsonl similarity index 100% rename from graph_1118130.jsonl rename to edge/graph_1118130.jsonl diff --git a/graph_2131792.jsonl b/edge/graph_1118269.jsonl similarity index 100% rename from graph_2131792.jsonl rename to edge/graph_1118269.jsonl diff --git a/edge/graph_11187079.jsonl b/edge/graph_11187079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ff23db9cd4082ee0a73741a51360c384598508c --- /dev/null +++ b/edge/graph_11187079.jsonl @@ -0,0 +1,4 @@ +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"2377597|16620699": ["However, even when it is acknowledged that 2D currently appears to offer better recognition performance, this is often thought to be a temporary situation\u2014 \u2018\u2018Although 2D face recognition still seems to outperform the 3D face recognition methods, it is expected that this will change in the near future\u2019\u2019 [51].", "[51] give an alternate survey of some of the earlier work in 3D face recognition."]} +{"11962297|14970359": []} +{"11962297|7788290": []} diff --git a/graph_2134574.jsonl b/edge/graph_11188605.jsonl similarity index 100% rename from graph_2134574.jsonl rename to edge/graph_11188605.jsonl diff --git a/graph_1119376.jsonl b/edge/graph_1119376.jsonl similarity index 100% rename from graph_1119376.jsonl rename to edge/graph_1119376.jsonl diff --git a/edge/graph_11194782.jsonl b/edge/graph_11194782.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7b05ac6367e4b721a90f191748b590a0b4f4dff --- /dev/null +++ b/edge/graph_11194782.jsonl @@ -0,0 +1,3 @@ +{"6405402|206051485": ["There exists many image alignment techniques, see [4] for a survey."]} +{"117247543|11026696": []} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} diff --git a/graph_2144172.jsonl b/edge/graph_11195746.jsonl similarity index 100% rename from graph_2144172.jsonl rename to edge/graph_11195746.jsonl diff --git a/graph_2147845.jsonl b/edge/graph_1119606.jsonl similarity index 100% rename from graph_2147845.jsonl rename to edge/graph_1119606.jsonl diff --git a/graph_2166540.jsonl b/edge/graph_11197428.jsonl similarity index 100% rename from graph_2166540.jsonl rename to edge/graph_11197428.jsonl diff --git a/graph_2178565.jsonl b/edge/graph_11201892.jsonl similarity index 100% rename from graph_2178565.jsonl rename to edge/graph_11201892.jsonl diff --git a/edge/graph_11206792.jsonl b/edge/graph_11206792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be91802b42e9736478b88bfb487dc9c556bded6e --- /dev/null +++ b/edge/graph_11206792.jsonl @@ -0,0 +1,14 @@ +{"3546433|2835258": ["The question on how to select the next hop for optimum multihop communication has long been considered in packet radio networks [5],[1],[2],[6].", "Various distributed forwarding schemes have been proposed for multihop wireless communication networks, where transmitting nodes select one of their neighbors to relay data packets toward the destination [1],[2]."]} +{"12779827|2835258": ["We refer the reader to [3] for a complete description of geographic routing."]} +{"14554436|2835258": ["SectionIV outlines possible modifications to CBF that facilitate its use in VANETs and enable street-geocasting.", "On the other hand, the network is significantly more dynamic (e.g., high node mobility) compared to other mobile ad hoc networks."]} +{"14554436|14441987": ["low communication between nodes that cannot reach each other directly [1]."]} +{"15841069|763939": []} +{"15841069|2835258": []} +{"11380140|2835258": ["The idea of position-based routing was originally developed for packet radio networks in the 1980s [1,2]."]} +{"11380140|14441987": ["Ad hoc routing protocols can be classified into topology-based [11] and position-based schemes [12]."]} +{"35066030|1230643": ["Excellent surveys include [95] and [22], and [2] for sensors networks specifically."]} +{"35066030|14441987": ["Excellent surveys include [95] and [22], and [2] for sensors networks specifically."]} +{"8841451|2835258": ["The former algorithm is a DTN variation of existing location-based greedy algorithms [11, 12] where the packet is forwarded to the neighbour that is closest to the destination (if closer than the position of the current carrier).", "A number of existing geographic routing protocols are available [13, 12]."]} +{"11149662|2835258": ["While several proposals for location services have recently been made in the literature [12], in this paper we make use of a very simple reactive location service (RLS) described in Section 3."]} +{"6438719|14441987": []} +{"24636284|2835258": ["A survey on position-based routing protocol is proposed in [10]."]} diff --git a/graph_1874975.jsonl b/edge/graph_11210789.jsonl similarity index 100% rename from graph_1874975.jsonl rename to edge/graph_11210789.jsonl diff --git a/graph_2185499.jsonl b/edge/graph_112112098.jsonl similarity index 100% rename from graph_2185499.jsonl rename to edge/graph_112112098.jsonl diff --git a/edge/graph_11211443.jsonl b/edge/graph_11211443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8acebcdbf8d69c1f29b9a4fecd5fc8a366cebe76 --- /dev/null +++ b/edge/graph_11211443.jsonl @@ -0,0 +1,7 @@ +{"16864206|38476": ["We discuss feature selection in Section 8 and draw conclusions in Section 9."]} +{"206592258|12663580": ["SVM has been successfully applied to a number of pattern recognition applications involving face detection, verification, and recognition, recognition of handwritten digits and character recognition, and so on [16]."]} +{"4626096|5473785": []} +{"15087039|14077778": []} +{"60174371|2502158": ["There are many works in the literature that deal with IDS [ 1 ]."]} +{"9446238|12894036": ["The choice of representation can have a significant impact on learning algorithms [6]."]} +{"116649162|6430931": ["Several machinelearning techniques including neural networks, fuzzy logic [11], support vector machines (SVM) [9, 11] have been studied for the design of IDS."]} diff --git a/edge/graph_11214708.jsonl b/edge/graph_11214708.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..207b693ad4b1bc3d3095d59fbb89f511a1959f71 --- /dev/null +++ b/edge/graph_11214708.jsonl @@ -0,0 +1 @@ +{"9478268|15782139": ["As the user submits the CAPTCHA an \u2018Authentication\u2019 window will appear to user for further authentication [ 15 ]."]} diff --git a/edge/graph_11214736.jsonl b/edge/graph_11214736.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cd1b89b51ef7cda0e05713e35c441e188c78bb9 --- /dev/null +++ b/edge/graph_11214736.jsonl @@ -0,0 +1,8 @@ +{"207190379|469744": ["While this arrow is overlaid on the video, it is not fully an AR interface as it does not strictly follow the definition of Azuma [3]: it is not registered in 3D with the environment,"]} +{"207214926|3330313": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"15623755|17516538": ["Here, we use affine moment invariants to identify the extracted objects as human full body, human\u2019s head-shoulder or non-human."]} +{"15534101|17516538": ["In general, the first step for automatic video surveillance is adaptive background subtraction to extract foreground regions from the incoming frames [ 1 ].", "One of the most important technologies for intelligent video surveillance is to track objects over time in natural busy scenes and to keep a consistent identity for each target object through the sequence [ 1 ]\u2013[5].", "For a surveillance camera capturing a scene with wide coverage, the resolutions of target objects are usually low in the images [ 1 ].", "group at t \u2212 1, whose value ranges within [0, 1 ]. The higher the visibility value is, the more part of the object is visible.", "However, when multiple tracked objects merge into groups with various complexities of occlusion, tracking each individual object through crowds becomes a challenging task [ 1 ]."]} +{"24980284|13215551": ["In comparison with other heuristics, such as GA, GP, and ACO, the performance of PSO is more stable on highdimensional problems [41], [57]."]} +{"24980284|1437067": ["The first approach makes the individuals (chromosomes) simpler and syntactically shorter, but it does not take rule interactions into account and thus is difficult to compute the quality of the rule set as a whole [13]."]} +{"120672059|17516538": ["Meanwhile, optical \ufb02ow is computationally expensive [19] ."]} diff --git a/edge/graph_11216705.jsonl b/edge/graph_11216705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9f646920e42dead2701fce28fb64e748e80d313 --- /dev/null +++ b/edge/graph_11216705.jsonl @@ -0,0 +1,3 @@ +{"43214606|6189942": []} +{"32662502|6189942": ["14 Within national assessments of literacy, 15 only a few document literacy questions investigate selected aspects of graph comprehension, but most of these items are relatively complex and require an advanced understanding of graphs."]} +{"1293123|6189942": ["For example, the type of statistic being presented (eg, effectiveness of a drug over time vs likelihood of experiencing impotence as a result of treatment) can make certain formats more vs less effective (22,23,25)."]} diff --git a/edge/graph_11219813.jsonl b/edge/graph_11219813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5e0a85ab21974c08a8645216b88c8438b4ef472 --- /dev/null +++ b/edge/graph_11219813.jsonl @@ -0,0 +1,2 @@ +{"5087378|14858505": ["[12] (see also Yen and Wan [13] and Kanet and Sridharan [14]).", "A recent bibliography of the results on scheduling problems, with various models of due date and due window assignment with earliness and tardiness penalties, was provided by Gordon et al. [12] (see also Yen and Wan [13] and Kanet and Sridharan [14])."]} +{"39957396|14858505": []} diff --git a/graph_2186746.jsonl b/edge/graph_11222759.jsonl similarity index 100% rename from graph_2186746.jsonl rename to edge/graph_11222759.jsonl diff --git a/graph_2188672.jsonl b/edge/graph_11231579.jsonl similarity index 100% rename from graph_2188672.jsonl rename to edge/graph_11231579.jsonl diff --git a/graph_219028.jsonl b/edge/graph_1123458.jsonl similarity index 100% rename from graph_219028.jsonl rename to edge/graph_1123458.jsonl diff --git a/graph_2207146.jsonl b/edge/graph_11235259.jsonl similarity index 100% rename from graph_2207146.jsonl rename to edge/graph_11235259.jsonl diff --git a/edge/graph_11237609.jsonl b/edge/graph_11237609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04c69174efb5b00173572d18cbcbe433ebfb1c65 --- /dev/null +++ b/edge/graph_11237609.jsonl @@ -0,0 +1,2 @@ +{"62579809|3054454": []} +{"110408258|3054454": ["In between is the \u201csingle-directional\u201d channel, as described up until now [9, 4 , 5,6]."]} diff --git a/edge/graph_11238636.jsonl b/edge/graph_11238636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fef86f96f85b41c3967c10638b7e7b79f63c5c9 --- /dev/null +++ b/edge/graph_11238636.jsonl @@ -0,0 +1 @@ +{"2386168|62924": ["This work devises a complex cloud negotiation mechanism by using negotiation strategies and protocols in multiagent systems [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20] as the basic building blocks (Section 3)."]} diff --git a/graph_2207564.jsonl b/edge/graph_11239740.jsonl similarity index 100% rename from graph_2207564.jsonl rename to edge/graph_11239740.jsonl diff --git a/graph_2208818.jsonl b/edge/graph_11243395.jsonl similarity index 100% rename from graph_2208818.jsonl rename to edge/graph_11243395.jsonl diff --git a/edge/graph_11246470.jsonl b/edge/graph_11246470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7346a47ff7d91406ffcfd88d5f272ae0ab9e0b5d --- /dev/null +++ b/edge/graph_11246470.jsonl @@ -0,0 +1,5 @@ +{"17559667|6430931": ["Hence, data reduction, such as alert aggregation, alert filtering and reducing false alerts, without losing valuable information is essential [4][14][15]."]} +{"207172599|3330313": []} +{"7966941|191396": ["Most clustering methods, used distant or similarity measure, between objects as a criterion to create a cluster, although the measuring approaches differs between individuals[17]."]} +{"11655376|8450611": ["In [28], Taylor classified the packet classification techniques into four categories: exhaustive search, decision tree, tuple space and decomposition."]} +{"36455229|7158350": []} diff --git a/graph_1124694.jsonl b/edge/graph_1124694.jsonl similarity index 100% rename from graph_1124694.jsonl rename to edge/graph_1124694.jsonl diff --git a/graph_2213096.jsonl b/edge/graph_11248289.jsonl similarity index 100% rename from graph_2213096.jsonl rename to edge/graph_11248289.jsonl diff --git a/graph_2220473.jsonl b/edge/graph_11256998.jsonl similarity index 100% rename from graph_2220473.jsonl rename to edge/graph_11256998.jsonl diff --git a/graph_2246.jsonl b/edge/graph_11257413.jsonl similarity index 100% rename from graph_2246.jsonl rename to edge/graph_11257413.jsonl diff --git a/graph_1125871.jsonl b/edge/graph_1125871.jsonl similarity index 100% rename from graph_1125871.jsonl rename to edge/graph_1125871.jsonl diff --git a/edge/graph_11262595.jsonl b/edge/graph_11262595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b42ab0a44b2823447dec50080d4ba53f03da46d --- /dev/null +++ b/edge/graph_11262595.jsonl @@ -0,0 +1 @@ +{"18905797|11262595": ["If certain property of about its behaviour is known, such as number of extrema in the domain, or some property of smoothness, the required number of rules can be decreased significantly [19], [20], [21], [22]."]} diff --git a/graph_2246892.jsonl b/edge/graph_11266367.jsonl similarity index 100% rename from graph_2246892.jsonl rename to edge/graph_11266367.jsonl diff --git a/graph_2253457.jsonl b/edge/graph_11266709.jsonl similarity index 100% rename from graph_2253457.jsonl rename to edge/graph_11266709.jsonl diff --git a/graph_2256372.jsonl b/edge/graph_11283051.jsonl similarity index 100% rename from graph_2256372.jsonl rename to edge/graph_11283051.jsonl diff --git a/edge/graph_11293874.jsonl b/edge/graph_11293874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1aa8e925830f817e98d2041fcaeb81f7ed852c3f --- /dev/null +++ b/edge/graph_11293874.jsonl @@ -0,0 +1,4 @@ +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"7598188|12278223": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} diff --git a/edge/graph_11295746.jsonl b/edge/graph_11295746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0865d611a7ebbdd74a2651ec0a53910914ca894f --- /dev/null +++ b/edge/graph_11295746.jsonl @@ -0,0 +1,5 @@ +{"8175234|17324444": ["\u2026philosophical topic, causality has been studied and utilised in almost all disciplines, e.g., medicine, epidemiology, biology, economics, physics, and social science, as a basic and effective tool for explanation, prediction, and decision making [Guyon et al. 2010; Kleinberg and Hripcsak 2011]."]} +{"8175234|2511280": ["] is the expectation of a random variable.", "Many other similarity measures can be used for \ufb01nding matched pairs of records, e.g. Euclidean distance, Jaccard distance [Han and Kamber 2005], Mahalanobis distance and propensity score [Stuart 2010], each having its own merit and disadvantages."]} +{"6301398|5473785": ["Then we call the triplet \u3008V ,G,J\u3009 a Bayesian network (abbreviated as \u201cBN\u201d), or equivalently a belief network or probabilistic network (Neapolitan, 1990).", "Then we call the triplet\u3008V ,G,J\u3009 a Bayesian network (abbreviated as \u201cBN\u201d), or equivalently a belief network or probabilistic network (Neapolitan, 1990)."]} +{"14900819|5473785": []} +{"1930258|5473785": ["Bayesian Networks (BN) (Neapolitan 1990) are mathematical objects that compactly represent a joint probability distribution J using a graph G annotated with conditional probabilities; J and G are connected by the Markov Condition property: a node is conditionally independent of its non-descendants,\u2026", "Bayesian Networks (BN) (Neapolitan 1990) are mathematical objects that compactly represent a joint probability distribution J using a graph G annotated with conditional probabilities; J and G are connected by the Markov Condition property: a node is conditionally independent of its non-descendants, given its parents."]} diff --git a/edge/graph_11311635.jsonl b/edge/graph_11311635.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a20f169ca349c7c1522e92992af7b571295a7efc --- /dev/null +++ b/edge/graph_11311635.jsonl @@ -0,0 +1,11 @@ +{"12588302|393948": ["the work in [3] shows that the performance will drop slightly when removing the fully-connected layers.", "CNN Between Single and Multi-Labels: Using CNN for single label prediction is intensively studied [3], [24].", "It has also been shown that CNN is able to generate robust and generic features [3], [40].", "CNN for Feature Learning: CNN was born in the Deep Learning (DL) era [3], [6], [24]; its goal is to model high-level abstractions of visual data by using multiple non-linear transformation architectures."]} +{"12588302|11608263": ["If the problem is adapted as is, a challenge arises when the number of labels increases and the potential output label combinations become intractable [54].", "Attributes and Multi-Labeling: Image multi-labeling is simply learning to assign multiple labels to an image [37], [54].", "It is also more likely to appear in real word scenarios, at which point, an image would need to be tagged with a set of labels from a predefined pool [41], [54]."]} +{"2088951|456491": ["The choice of kernel \u0393 induces a joint representation of the inputs as well as a structure among the output components (\u00c1lvarez et al., 2012); In the rest of the paper we will focus on so-called separable kernels, where these two aspects are factorized.", "(\u00c1lvarez et al., 2012) and references therein), with connections to structured learning (Bakir et al.", "A closed form solution for the coefficient matrix C returned by the SUPERVISEDSTEP is (see for instance (\u00c1lvarez et al., 2012)):"]} +{"1012756|456491": ["This idea is at the basis of the field of multi-task learning, where the joint solution of different problems has the potential to exploit tasks relatedness (structure) to improve learning."]} +{"7151900|2355696": ["Unfortunately, people do not frequently display such strong expressions as anger or disgust in everyday life [24].", "It has seen so much activity that it already contributed to the creation of three new research directions: Affective Computing [17], Social Signal Processing [24], and Behaviomedics [22]."]} +{"18887428|206739910": []} +{"1368481|456491": ["The multi-task kernel on input and output is assumed to be decoupled as the product of a scalar kernel and the output kernel, which is a positive semidefinite matrix [1, 13, 14, 15].", "This identity is known for vector-valued RKHS, see [15] and references therein."]} +{"1025328|1805048": ["the data sparsity problem [26] which means that the rating matrix is extremely sparse.", "According to a survey on CF [26], different CF techniques can be classified into three categories: memorybased methods, model-based methods, and hybrid methods."]} +{"11206415|393948": ["Convolutional neural networks (CNNs) are a class of deep learning models that were designed to simulate the visual signal processing in central nervous systems [1, 10, 13]."]} +{"15557175|11608263": ["In this paper, five performance measures designed for multi-label learning from [Schapire and Singer 2000; Tsoumakas and Katakis 2007] are used, i.", "Readers are referred to [Tsoumakas and Katakis 2007; Tsoumakas et al. 2010] for a review of multi-label learning methods in the literature."]} +{"7683572|10087812": ["\u2026referred to as multi-task reinforcement learning (MTRL), the objective is to simultaneously solve multiple tasks and exploit their similarity to improve the performance w.r.t. single-task learning (we refer to [28] and [15] for a comprehensive review of the more general setting of transfer RL)."]} diff --git a/graph_2257431.jsonl b/edge/graph_11324648.jsonl similarity index 100% rename from graph_2257431.jsonl rename to edge/graph_11324648.jsonl diff --git a/edge/graph_11336879.jsonl b/edge/graph_11336879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f130c5d0954447749ac0fd5ff0adfb9db49abd0f --- /dev/null +++ b/edge/graph_11336879.jsonl @@ -0,0 +1 @@ +{"14348782|14792235": ["For instance, Ward and Barker reported that the performance of di\ufb00erent virtual machines (VMs) of the same type provided by Amazon Web Service (AWS) [1] could be vary up to 29% [20]."]} diff --git a/graph_1133865.jsonl b/edge/graph_1133865.jsonl similarity index 100% rename from graph_1133865.jsonl rename to edge/graph_1133865.jsonl diff --git a/graph_2259204.jsonl b/edge/graph_113401212.jsonl similarity index 100% rename from graph_2259204.jsonl rename to edge/graph_113401212.jsonl diff --git a/edge/graph_113501528.jsonl b/edge/graph_113501528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e4aa5b5a0b4c109b49d41d4cd60f2376f719f6d --- /dev/null +++ b/edge/graph_113501528.jsonl @@ -0,0 +1,3 @@ +{"27954030|6959212": ["The recent advancement in the field of wireless sensor networks (WSN) suggests it to be a suitable choice for EPS/smart grid [22] [25 - 29].", "Since the installation of wired communication system is an expensive issue, it is not widely implemented looking the huge size of power system [22]."]} +{"12103882|17774971": []} +{"12103882|192934": []} diff --git a/edge/graph_11361235.jsonl b/edge/graph_11361235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ed925be4f9a785d04b259e2e05da0b5dc7e6656 --- /dev/null +++ b/edge/graph_11361235.jsonl @@ -0,0 +1,11 @@ +{"9689409|206051485": ["[11][12] In order to address these issues, a block-based election approach is proposed."]} +{"691081|192934": []} +{"18747945|14545307": []} +{"205015030|6746689": ["(6) contour profiles; (7) zoning; (8) geometric moment invariants;"]} +{"14066088|1188683": []} +{"1692308|14545307": ["Compression is the reference application area of VQ [10] in two\u2013dimensional (2-D) signal processing [11].", "this paper, so we refer the reader to the vast specific literature on this subject [10], [11]."]} +{"2557058|9045232": ["Yang et al. [17] proposed two methods which seek to represent the manifold of human faces as a set of subclasses.", "Numerous approaches for face detection have been proposed in the last decade, many of them described and compared in two interesting recent surveys by Yang et al. [1] and Hjelmas et al. [2]."]} +{"11072856|15782139": ["[4] In the past, a number of techniques have been proposed for locating the desired plate through visual image processing."]} +{"11180391|1099309": []} +{"11180391|13365762": ["A detailed analysis on MPEG-7 Visual Motion Descriptors is available in [12]-[14]."]} +{"39853518|192934": []} diff --git a/graph_2289178.jsonl b/edge/graph_1136446.jsonl similarity index 100% rename from graph_2289178.jsonl rename to edge/graph_1136446.jsonl diff --git a/graph_1136727.jsonl b/edge/graph_1136727.jsonl similarity index 100% rename from graph_1136727.jsonl rename to edge/graph_1136727.jsonl diff --git a/edge/graph_11369156.jsonl b/edge/graph_11369156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..687db94b97f9510415c157bb61991126d13a1af7 --- /dev/null +++ b/edge/graph_11369156.jsonl @@ -0,0 +1,4 @@ +{"99732|5701967": ["Entropy is widely recognized measure of portfolio diversification [2].", "Also, to enhance the diversity of portfolio, some approaches include entropy in its formulations [2]."]} +{"3900139|124142082": []} +{"207633921|4474193": ["Evolutionary algorithms which have been widely studied for static optimization problems attracted an increasing attention over the past years on dynamic optimization problems (DOPs) (Branke, 2002; Jin & Branke, 2005; Morrison, 2004; Weicker, 2003)."]} +{"106974279|15830743": []} diff --git a/edge/graph_11370061.jsonl b/edge/graph_11370061.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3cfd340a855a257472f6deab17adb54ddcb17198 --- /dev/null +++ b/edge/graph_11370061.jsonl @@ -0,0 +1,16 @@ +{"1553095|1146513": []} +{"1553095|14122909": []} +{"27667015|2616070": []} +{"27667015|14122909": []} +{"2716246|14122909": ["In [1], segmentation methods were classified based on whether the output was a detected contour or curve, or a grouping of pixels into regions, among other criteria such as dimensionality of the data.", "The Field II package provides an excellent framework for simulating ultrasound images using linear acoustics [1], and has been used for", "Many authors have attempted to determine contours from various types of vessels in ultrasound images, some of which were reviewed in [1].", "However, image segmentation is made difficult by shadowing and speckle typical of ultrasound images [1].", "A broad review of ultrasound segmentation methods has been presented in [1], which focuses on -mode imaging and specific clinical application areas [echocardiography, breast ultrasound, transrectal ultrasound (TRUS), and intravascular ultrasound (IVUS)], and where multiple methods that use assumed feature geometry are presented.", "Also addressed in [1] is the use of filters in order to improve segmentation."]} +{"37367345|14122909": []} +{"14415030|15744805": ["Supervised evaluation methods [5,6], also known as relative evaluation methods [7] or empirical discrepancy methods [4], evaluate segmentation algorithms by comparing the resulting segmented image against a manually-segmented reference image, which is often referred to as a gold standard [8] or ground-truth.", "Analytic methods [4,71] assess segmentation algorithms independently of their output, evaluating them based on certain properties of the segmentation algorithms, such as processing strategy (parallel, sequential, iterative, or mixed), processing complexity, resource efficiency, and segmentation resolution, which are usually not deemed effective for assessing the segmentation quality (e.", "Whereas supervised methods evaluate segmented images against a reference image, unsupervised evaluation methods [45], also known as stand-alone evaluation methods [38] or empirical goodness methods [4] do not require a reference image, but instead evaluate a segmented image based on how well it matches a broad set of characteristics of segmented images as desired by humans."]} +{"17031226|11370061": []} +{"15011621|14122909": ["Index Terms\u2014B-mode, Bayesian model, carotid artery, expectation maximization (EM) algorithm, exploration selection algorithm, mixtures of gamma distributions, mixtures of Nakagami distributions, segmentation, stochastic optimization, ultrasound."]} +{"39087784|2616070": []} +{"24098725|2616070": ["Recently, the multiphase model has been described allowing the segmentation of multiple objects in the same image (see [14])."]} +{"14407681|1146513": []} +{"2502944|14122909": ["17 As can be verified in Figure 4b, the application of the anisotropic diffusion filter proposed by Perona and Malik (1990) is satisfactory, allowing the correct distinction of the carotid artery from other near vessels and small features, which greatly facilitates the posterior detection of the carotid boundaries for the definition of the initial contours to be used in the application of the Chan-Vese-based geometrical segmentation model.", "Figure 3 demonstrates this step of our algorithm in the identification of lumen edge pixels: Figure 3a illustrates the cropped image in grayscale, here with pixel intensities varying from 0 (zero - black) to 255 (white), and Figure 3b shows the same image after the application of the anisotropic filter proposed by Perona and Malik (1990) for speckle removal."]} +{"11726987|15744805": ["An active contour is a parametric contour and it is a curve [48] which has been represented by a two-dimensional function as X(s) = [x(s), y(s)], where (x, y) [ R(2) denotes the spatial coordinates of an image and s [ [0, 1] represents the parametric domain.", "This leads in difference in the IMT measurements done by the intra-observer and interobserver as reported elsewhere [48]."]} +{"1641893|14122909": ["Plethora of ultrasound-segmentation techniques have been reviewed in recent surveys by Noble and Boukerroui [29] and Molinari et al.", "Plethora of ultrasound-segmentation techniques have been reviewed in recent surveys by Noble and Boukerroui [29] and Molinari et al. [30]."]} +{"18496370|14122909": ["In [43], where a review on ultrasound image segmen-"]} diff --git a/edge/graph_11370991.jsonl b/edge/graph_11370991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f222501956ce44ccd4248a52799ec98aa3336ad9 --- /dev/null +++ b/edge/graph_11370991.jsonl @@ -0,0 +1,18 @@ +{"2169695|11013868": ["For further results on energy-efficient scheduling we refer the interested reader to the reviews [2, 3, 21]."]} +{"1066415|10658846": ["To see this, suppose two jobs come at time 0, one with intervals [0, 1] and [1, 2] and the other with intervals [0, 1] and [2, 3]; we cannot tell which job to run at time 0, for fear of a third job coming at time 1 or 2 and requiring immediate execution.", ", the recent surveys in theory [7] and in practice [3]."]} +{"11889258|10608305": []} +{"11889258|10837932": []} +{"11889258|9817990": []} +{"20094|10837932": ["In the research area of green networking, some survey papers [22,36] have summarized many novel network power saving technologies appearing in recent years."]} +{"13739988|10837932": ["Comprehensive surveys of a number activities for minimizing energy consumption in networks are recently published in [11] and [35]."]} +{"952575|10658846": ["In the (embedded system) literature, there are different energy-efficient strategies to bring a processor to sleep during a period of zero load [10]."]} +{"16604460|10658846": []} +{"10723386|17504384": ["Another case in point is the scheduling with processing processor restrictions aimed at minimizing the makespan has been studied extensively in algorithmic (See [13] for an excellent survey)."]} +{"15174012|10658846": ["Some previous work on Dynamic Power Management does incorporate the latency involved in transitioning from the on to the sleep state and vice versa [ 1 ].", "Benini, Bogliolo and De Micheli give an excellent review of this work [ 1 ]."]} +{"42468384|10658846": ["Furthermore, there co uld be overhead in stopping at intermediate states, resulting in non-additive transition costs (see [4] for an e xample).", "The e mbedded systems community has invested a great deal of effort into devising policies governing the se lection of power states during idle periods (termed Dynamic Power Management in their literature); see, for example, [4] for a survey."]} +{"13054771|10608305": ["Some authors classify DVFS under DPM techniques [17]."]} +{"13054771|10837932": ["This technique is known as the Adaptive Link Rate (ALR), stated by many [28,29] as the future of \u201cGreen Networking\u201d."]} +{"13054771|10658846": ["[19]."]} +{"3204947|15813404": ["See Shabtay and Steiner [24] for a survey of these results."]} +{"2669699|10658846": ["This is a limitation of most predictive strategies as well [Benini \net al. 2000].", "Stochastic optimum control \nis a well\u00adresearched area [Benini et al. 1999; 2000; Chung et al. 1999a; Qiu and Pedram 1999; Qiu et \nal."]} +{"6857539|10658846": ["In the (embedded systems) literature, there are different energy-efficient strategies to bring a processor to sleep during a period of zero load [6]."]} diff --git a/graph_1137487.jsonl b/edge/graph_1137487.jsonl similarity index 100% rename from graph_1137487.jsonl rename to edge/graph_1137487.jsonl diff --git a/edge/graph_11381530.jsonl b/edge/graph_11381530.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2924e1d2238e837d0af00b195c8f5d9ff51c1fa --- /dev/null +++ b/edge/graph_11381530.jsonl @@ -0,0 +1,15 @@ +{"8496895|15707": []} +{"3086699|13299749": ["There are many works in the literature that discuss about intrusion detection system [1], [14], [15], [16], [18], [19].", "There are many works in the literature on classification techniques [11] [14] [15] [16]."]} +{"14342975|6430931": ["As lots of machine learning methods such as Neural Network [3], Fuzzy Logic [4, 5], and Hidden Markov Model [6] have made great achievements in IDS."]} +{"11572265|14823953": ["Any action that significantly deviates from the normal behavior is considered intrusive [3]."]} +{"15385391|6430931": []} +{"16196020|11632848": ["While, Multi-Classifier [3] is a type of hybrid intelligent system that combines two or more classification algorithms to produce the final model."]} +{"9928823|393948": ["(2013) extended the recursive neural network to its tensor, in a similar way that the DNN was extended to its tensor version (Yu et al., 2013), and"]} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"18434328|12815020": []} +{"15636306|2142482": []} diff --git a/edge/graph_11381680.jsonl b/edge/graph_11381680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2423a293b40cc01d1c28a659718c3d1e59199506 --- /dev/null +++ b/edge/graph_11381680.jsonl @@ -0,0 +1 @@ +{"15747468|11381680": ["The authors of [1] provide a comprehensive overview of crowdsourcing approaches for subjective evaluations of image and video content and [2] discusses and compares the corresponding existing implementation frameworks."]} diff --git a/graph_2290665.jsonl b/edge/graph_11385769.jsonl similarity index 100% rename from graph_2290665.jsonl rename to edge/graph_11385769.jsonl diff --git a/edge/graph_11392986.jsonl b/edge/graph_11392986.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59784d4001c6a832f7e9f52b48a6bdf824ce1f41 --- /dev/null +++ b/edge/graph_11392986.jsonl @@ -0,0 +1 @@ +{"5553200|16717715": []} diff --git a/edge/graph_11394526.jsonl b/edge/graph_11394526.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fee011faa9be6776b8927799bfa7a425034f7779 --- /dev/null +++ b/edge/graph_11394526.jsonl @@ -0,0 +1,13 @@ +{"207185454|6116761": []} +{"5995257|192934": ["Then, we built mathematical models that could automatically classify these 241 neurons according to the values of their morphological parameters 38,39 ."]} +{"14888968|9431428": ["Na\u00efve Bayes\u2014", "Na\u00efve Bayes produced comparable results to AdaBoost, when a large number of components were considered.", "In our observations, high performance with few features was achieved with both AdaBoost and Na\u00efve Bayes.", "In all but one of the classifiers, the number of components needed to achieve specified classification accuracy would be reduced using the rise time criterion, as illustrated for AdaBoost and Na\u00efve Bayes (Fig.", "Na\u00efve Bayes produced correct classification rates comparable to AdaBoost, but required more ICs to achieve this accuracy, and had several classification rates below 80%.", "Classification accuracy was assessed as the percentage of data instances that were labeled correctly after repeating this process ten times (Pereira et al., 2009).", "Maximum a posteriori thresholding P(C i |x) was then applied: As individual features are assumed to be statistically independent in the IC computation, we extend this to assume independent conditional probabilities, as is the case in the Na\u00efve Bayes classifier, computed for each (j = 1, \u2026N) IC time course: Support vector classifier\u2014 Support vector machine (SVM) (Vapnik, 2000; Burges, 1998) were assessed for their belief/disbelief discrimination capability, since SVM algorithms are computationally stable, generalize well, and have been applied successfully to microarray (Golub et al., 1999) and fMRI (LaConte et al., 2005) data.", "Neural networks (Hanson et al., 2004), Na\u00efve Bayes (Pereira et al., 2009), and support vector machine classifiers (LaConte et al., 2005) each have yielded varying levels of predictive capability.", "We applied Na\u00efve Bayes' classification to our belief, disbelief discrimination task as follows."]} +{"17637854|5473785": []} +{"7962237|11894197": ["5 One way to cope with a large number of features is to perform feature selection, which remains an open and important area of research.(6) 7 If a subset of features is strongly predictive of the target outcome and it can be located, then selecting those features may result in excellent classification."]} +{"222575|9431428": ["In spite of the na\u00efve assumption, the GNB was shown to perform well for many examples of neuroimaging datasets and to be fast and robust (e.g. Pereira et al., 2009).", "\u2026derive the relative importance of features in the classification problems we estimated weights for each of the n features as:\nwi \u00bc 1 \u03c32i \u03bc\u00fei \u2212\u03bc \u2212 i\n\u00f04\u00de\nwhere \u03c3i2 represents the estimated variance and \u03bci+ (\u03bci\u2212) represent the mean of the two classes (+,\u2212) for the ith feature (Pereira et al., 2009)."]} +{"222575|14866098": ["Compared to our approach, analyses in BCI experiments often employ more sophisticated preprocessing and feature selection techniques (e.g. Laplacian filtering, common spatial patterns, genetic algorithms Bashashati et al., 2007; vanGerven et al., 2009).", "\u2026machine-learning techniques such as linear discriminant analysis (e.g. Duda et al., 2001) and support vector machines (Vapnik, 1995), which take feature correlations into account, have been previously applied to EEG datasets in the context of BCI (e.g. Bashashati et al., 2007; Lotte et al., 2007).", "For the same reason sophisticated feature selection or reduction methods were applied in BCI systems (see Bashashati et al., 2007)."]} +{"222575|16362395": ["For example, limiting the information to pre-defined temporal windows of interest is essential to many realizations of EEG-based brain-computer interface (BCI) systems (e.g. Birbaumer, 2006; Blankertz et al., 2011; Wolpaw et al., 2002).", "For the same reason sophisticated feature selection or reduction methods were applied in BCI systems (see Bashashati et al., 2007).", "\u2026machine-learning techniques such as linear discriminant analysis (e.g. Duda et al., 2001) and support vector machines (Vapnik, 1995), which take feature correlations into account, have been previously applied to EEG datasets in the context of BCI (e.g. Bashashati et al., 2007; Lotte et al., 2007).", "Concerning the spatial (channel) domain, many BCI systems employed spatial filters (i.e. linear combinations of channels; see Blankertz et al., 2011) to enhance performances.", "Compared to our approach, analyses in BCI experiments often employ more sophisticated preprocessing and feature selection techniques (e.g. Laplacian filtering, common spatial patterns, genetic algorithms Bashashati et al., 2007; vanGerven et al., 2009).", "In particular, our classification performances were lower than those typically reported in EEG-based BCI experiments (e.g. ~70\u201390% for motor imagery based BCIs Lotte et al., 2007).", "First, our experimental paradigm included stimuli and conditions that result in largely\nsimilar EEG signals (low CNR) compared to BCI paradigms that are constructed to maximize response differences between classes.", "Other machine-learning techniques such as linear discriminant analysis (e.g. Duda et al., 2001) and support vector machines (Vapnik, 1995), which take feature correlations into account, have been previously applied to EEG datasets in the context of BCI (e.g. Bashashati et al., 2007; Lotte et al., 2007).", ", 2001) and support vector machines (Vapnik, 1995), which take feature correlations into account, have been previously applied to EEG datasets in the context of BCI (e.g. Bashashati et al., 2007; Lotte et al., 2007).", "Most frequently, learning algorithms are based upon linear models (e.g. Lotte et al., 2007; Rieger et al., 2008; van Gerven et al., 2009) due to their fast computation, robustness and simplicity of results interpretation."]} +{"7215230|11608263": ["For an overview of multi-label classi\ufb01cation, see Tsoumakas and Katakis (2007) and Tsoumakas et al. (2010); for an overview of the technical issues involved, see Madjarov et al. (2012)."]} +{"16293868|6116761": ["In addition, other aspects of the model, such as the presence or absence of cyclic connections add complexity to the discovery (Friston, 2011).", "Many attempts to deduce this information via other methods have been noted, but the accuracy of these methodologies has recently been challenged (Smith et al 2011, Friston 2011).", "Many attempts to deduce this information via other methods have been noted, but the accuracy of these methodologies has recently been challenged (Friston, 2011; Smith et al., 2011).", "Thus, while apparently better than traditional correlation analyses, the PC algorithm may not perform optimally in \u201creal world\u201d systems (Friston, 2011)."]} +{"17329421|5473785": []} +{"14390527|11894197": ["In this article, we apply an FSS method based on a filter approach (Guyon and Elisseef, 2003; Saeys et al., 2007), which focuses on evaluating features by analysing general data characteristics (not taking into account the classifier learning algorithm)."]} +{"5189808|17324444": []} diff --git a/edge/graph_11400447.jsonl b/edge/graph_11400447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbd404d5738861b911cd5653913301c66de4589c --- /dev/null +++ b/edge/graph_11400447.jsonl @@ -0,0 +1,4 @@ +{"11174611|4967411": []} +{"16660885|4967411": ["E-mail addresses: martin@ujaen.es (L. Mart\u0131\u0301nez)\nMany real world problems need to deal with uncertainty, therefore the management of such uncertainty is usually a big challenge."]} +{"30643962|53531425": []} +{"13911107|15790998": ["\u2026method \u2212 where the roles of various types of uncertainty are reflected in the aggregated information (e.g., adopted the weighted average approach in some situations), this actually requires the investigation of theories and methods about how to rationally achieve this kind of \u201ccompromise\u201d."]} diff --git a/edge/graph_11407374.jsonl b/edge/graph_11407374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48321a15a300bbb981cd4a83e9f4a99c9dfd2f99 --- /dev/null +++ b/edge/graph_11407374.jsonl @@ -0,0 +1 @@ +{"42781821|192934": ["To do this, several classification methods have been investigated [15,16]."]} diff --git a/edge/graph_11414835.jsonl b/edge/graph_11414835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ca79d3c233f4259c60f34bb7c7b22c2360866eb --- /dev/null +++ b/edge/graph_11414835.jsonl @@ -0,0 +1,31 @@ +{"18319131|2623404": ["SDN: Network control in SDR is decoupled from forwarding and directly programmable, which enables the underlying infrastructure to be abstracted for applications and network services and treats the network as a logical or virtual entity [8]."]} +{"10694409|2623404": ["One of the most relevant use case scenario for Software Defined Networks (SDN) is network virtualization [1]."]} +{"32377418|2623404": ["Control granularity is another issue associated with SDN [45]."]} +{"32377418|3189715": ["I NTRODUCTION N ETWORK programmability was the main objective of two schools of thought that dominated the networking research agenda in the mid-90 s up until the early 2000 s: Active [1] and Programmable Networks [2] (A&PN)."]} +{"1645630|10837932": ["In this context, network virtualization has increasingly been seen as a solution to Internet ossification (the benefits of network virtualization go beyond Internet ossification to other contexts such as green networking [2])."]} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"31850245|29060869": []} +{"31850245|485843": []} +{"31850245|5747564": []} +{"31850245|6959212": ["\u2022 Security: Wireless nature of WSN also makes the system vulnerable to various external denial of service (DoS) attacks [47,48], physical and cyber threats."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"15035771|2623404": ["Nunes et al. [1] presented a standard survey with emphasis on past, present and future implementations of SDN.", "In [1] and [7] a list of hardware switches is given, all OpenFlow compliant."]} +{"15035771|4608889": ["[6] take a similar approach concerning OpenFlow technologies in carrier-grade and data center networks."]} +{"15035771|10693567": ["The controllers contain the forwarding logic, but can be enhanced with additional routing logic.", "OpenFlow has attracted many researchers, organizations and foundations, so a wide collection of open-source software is available in the form of OpenFlow controllers (section III-C), as well as physical and virtual switch implementations (section III-D).", "In [7], Lara et al. provide an extensive survey on network innovations using OpenFlow, where the OpenFlow speci\ufb01cation is discussed in detail and recent experiences with OpenFlow deployments on campus networks and testbeds are shared."]} +{"15035771|2387055": ["A survey on security in SDN is given by Scot-Hayward et al. [3]."]} +{"15035771|14276831": ["Multiple schemes can be applied to recover paths in case of link failures, where a distinction can be made between protection and restoration schemes [24].", "To create a robust and resilient network, the network topology must include redundant paths [24]."]} +{"20786481|2623404": ["forwarding in ICN is aligned with the decoupling of the data plane and control plane in SDN [18].", "Current Internet is information-driven, yet networking technology is still focused on the idea of location-based addressing and host-to-host communications [18].", "OpenFlow provides optional support for encrypted Transport Layer Security (TLS) communication and a certificate exchange between the switches and the controller(s) [18].", "ONF presents a high-level architecture for SDN that is vertically split into three main functional layers including infrastructure layer, control layer and application layer [9], [11], [18]\u2013[20], as shown in Fig."]} +{"20786481|10693567": ["DDoS defender can monitor the flows of OpenFlow switch and detect the DDoS attack via volume counting [31], [77].", "SDN as follows [10], [11], [31], [70], [71].", "architecture is that if a switch fails, the availability of the network can be maintained [31].", "4) Software-based traffic analysis: Software-based traffic analysis greatly enables innovation, as it is possible to improve the capabilities of a switch using any software-based technique [31]."]} +{"20786481|2387055": ["3) Programmability of the network by external applications: The programmability of SDN supports a process of harvesting intelligence from existing Intrusion Detection Systems (IDSs) [72] and Intrusion Prevention Systems (IPSs) [33].", "Security analysis has showed that the SDN framework suffers many security threats, including [33]:", "The authors of [33] point out that three issues of SDN include trust between all involved layers, SDN\u2019s control plane centralization and limited space in flow-tables.", "Based on the analysis, new or updated security policy can be propagated across the network in the form of flow rules [33]."]} +{"20786481|206584087": ["every packet passing through the router using Bloom Filter, which is a hash structure to reduce the memory requirement to store packet records [35].", "They generally consume less bandwidth and are stealthier in nature compared to volumetric attacks, since they are very similar to benign traffic [35].", "1) Network/transport-level DDoS flooding attacks: These attacks have been mostly launched using TCP, UDP, ICMP and DNS protocol packets and focus on disrupting legitimate user\u2019s connectivity by exhausting victim network\u2019s bandwidth [35].", "HTTP sessions and employs rate-limiting as the primary defense mechanism [35], [63]).", "Since attackers cooperate to perform successful attacks, defenders must also form alliances and collaborate with each other to defeat DDoS attacks [35].", "The authors of [35] focus on DDoS flooding attacks and defense mechanisms in wired network", "Multiple locations defensive is comprised of multiple defense nodes deployed at various locations such as source, destination or networks [35].", "fication to each packet) so that the victim can identify the path of attack traffic and distinguish it from legitimate traffic after the detection [35].", "Several taxonomies of DDoS attacks defense mechanisms have been presented in the literature [35], [37], [54].", "However, application-level DDoS flooding attacks usually have the same impact to the services since they target specific characteristics of applications, such as HTTP, DNS, or Session Initiation Protocol (SIP) [35]."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"27153649|14132386": ["Besides matching flow table item, center node needs to identify various existing WSNS routing protocols, by reserved interface it is convenient for extensions in the future [17]."]} +{"6726835|3189715": []} +{"6909552|5551880": ["Other works have presented classifications of security issues at different levels, such as network, host or application [2]."]} +{"16219347|15947359": ["We refer readers interested in specific VSN topics which are not in the scope of our survey to other relevant surveys in the literature written on various aspects of VSNs (general overview [44], challenging issues [5], multimedia streaming [29], security [16], cross-layer design [51]).", "Availability of low-cost CMOS cameras has created the opportunity to build lowcost Visual Sensor Network (VSN) platforms able to capture, process, and disseminate visual data collectively [44].", "tracking applications, environmental observation systems [14], security and surveillance applications [14], emergency response systems [14], assisted living applications and smart homes [5, 42, 44], water conservatory engineering [57], virtual reality and telepresence systems [5, 44] and smart meeting rooms [44].", "Other surveys (such as [5, 44]) give a more general perspective on VSNs."]} +{"16219347|17516538": ["Well-known visual computing techniques, such as object recognition or object tracking [21], can reduce the amount of raw data to be transmitted."]} diff --git a/graph_2290994.jsonl b/edge/graph_11415214.jsonl similarity index 100% rename from graph_2290994.jsonl rename to edge/graph_11415214.jsonl diff --git a/edge/graph_11421382.jsonl b/edge/graph_11421382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3e8b51566f5d38c053d13e157d34162760927c7 --- /dev/null +++ b/edge/graph_11421382.jsonl @@ -0,0 +1,6 @@ +{"1757990|2018781": ["The Service-Oriented Architecture (SOA) paradigm [1][2] is fundamentally changing the way systems are created and operated, as it pav\u00e9s the way for reuse and collaboration in a dynamic, distributed context [3]."]} +{"1757990|2840997": ["This base algorithm has been heavily optimized in the recent years, by adopting strategies such as conflict analysis techniques (which try to obtain the reason for an assignment conflict), conflict-driven learning (adding clauses to avoid the same conflict in the future) or the incorporation of heuristics to detect conflicts before they occur and optimizing the way the search space is explored [24], which has greatly extended the domains where this technique can be applied."]} +{"14407551|417250": ["For ex\u00adample, some approaches use feature models to describe dependen\u00adcies between \nfeatures and to reason about runtime variability of DSPLs [10, 19, 21, 37]."]} +{"15436165|8914588": ["Some research issues and questions are also presented."]} +{"6093454|16378248": [", by specifying parameters [19]), or 3) by just post-editing the resulting target model."]} +{"6093454|11717357": []} diff --git a/graph_1142274.jsonl b/edge/graph_1142274.jsonl similarity index 100% rename from graph_1142274.jsonl rename to edge/graph_1142274.jsonl diff --git a/graph_2298017.jsonl b/edge/graph_11424050.jsonl similarity index 100% rename from graph_2298017.jsonl rename to edge/graph_11424050.jsonl diff --git a/edge/graph_11425223.jsonl b/edge/graph_11425223.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7bedc4fe3b18951d96593f4fc927ad828b7933e --- /dev/null +++ b/edge/graph_11425223.jsonl @@ -0,0 +1,8 @@ +{"1514569|534755": ["To include transport processes into the model, time-delay differential equations (DDEs) or partial differential equations (PDEs) are used (see, e.g. [23, 29, 85]).", "Still, the level of detail they provide on the system modeled is rather coarse [29].", "This is mainly due to the incomplete knowledge on the chemical reactions underlying gene regulation, and the lack of detailed kinetic parameters and concentration measurements required for these models [29].", "The probability of a system to be in state X at time t + \u2206 t is given by see, for example [29].", "Finally, a stochastic kinetics modeling approach provides the by far most detailed level of description [29,44,85], but also has the highest computational cost [44].", "Other rate constants, such as rates of phosphorylation of a transcription factor subsequent to a stimulus, are hard to verify experimentally [15,29,85].", "PDEs describe spatial inhomogeneities and diffusion processes and distinguish be-tween different cell compartments, for example nucleus and cytoplasm [29].", "Furthermore, learning Bayesian networks from data is NP-hard, hence heuristic search methods have to be used, which do not guarantee that the globally optimal solution is found [29].", "They can thus deal with noisy measurements and stochastic aspects of gene expression in a natural way [29,65], and they are easily extended to deal with missing data [45].", "How important such factors may be can be seen from recent reports indicating that the spatial distribution of proteins within a cell seems to have an effect on the embryonic development in eukaryotes [29]."]} +{"44694713|534755": []} +{"15574046|534755": ["The results, which were obtained for the small S.O.S. DNA repair system of\nE.coli, seem promising.", "One important characteristic of this causal network approach by Friedman et al. [8] is the search for features that are often found in highscoring networks, instead of searching for one single model that explains the data."]} +{"2486574|1400872": ["Neural Networks literature [Pea95]."]} +{"42422171|534755": []} +{"9232671|15082313": []} +{"9232671|534755": ["Outstanding review articles covering the field of data-driven inference of GRNs are from De Jong (2002), van Someren et al. (2002a), Gardner and Faith (2005), Filkov (2005), Van Riel (2006), Bansal et al. (2007), Goutsias and Lee (2007), Cho et al. (2007) as well as Markowetz and Spang (2007).", "Well-structured overviews of the general idea behind GRN inference and diverse common mathematical modelling schemes can be found in De Jong (2002) and Filkov (2005). van Someren et al. (2002a) arranged reverse engineering techniques according to the characteristics of their underlying model and\u2026", "However, many GRN inference approaches based on differential equations consider linear models or are limited to very specific types of non-linear functions (Voit, 2000; De Jong, 2002; see Section 3.3.2)."]} +{"2261995|534755": []} diff --git a/graph_2302916.jsonl b/edge/graph_11426077.jsonl similarity index 100% rename from graph_2302916.jsonl rename to edge/graph_11426077.jsonl diff --git a/graph_2318389.jsonl b/edge/graph_1142636.jsonl similarity index 100% rename from graph_2318389.jsonl rename to edge/graph_1142636.jsonl diff --git a/graph_1143625.jsonl b/edge/graph_1143625.jsonl similarity index 100% rename from graph_1143625.jsonl rename to edge/graph_1143625.jsonl diff --git a/edge/graph_11452661.jsonl b/edge/graph_11452661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78170a9b099fb99b6d11205421c50bdcb750fb03 --- /dev/null +++ b/edge/graph_11452661.jsonl @@ -0,0 +1,7 @@ +{"2165201|14441987": ["In proactive scheme [1], all nodes maintain their routing tables for all possible destinations irrespective of the need of routes."]} +{"6438719|14441987": []} +{"3878396|1110872": ["References [16] and [17] represent, at the best of the authors' knowledge, the more recent tutorial papers on the topic: various possible improvements both at the transport level and at the application and network level are summarized and referenced."]} +{"25088037|870434": ["DTN represents a broad class of networks such as interplanetary internets [1], underwater sensor networks [2], and vehicular networks."]} +{"5641711|14441987": ["Researchers in Mobile Ad Hoc NETworks (MANETs) have tackled mobility problems with a major focus on routing [9], [14], [15], [16].", "Work in MANETs has mainly focused on routing, introducing various protocols that find end-to-end paths between nodes [9], [14], [15], [16].", "Research in the areas of MANETs [9], [14], [15], [16], disconnected mobile networks [12], [20], [19], sparse sensor networks [17], and delay tolerant networks (DTNs) [4], [8], [6], have addressed issues related to the challenges stated in Section 1."]} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} diff --git a/graph_2324636.jsonl b/edge/graph_11453832.jsonl similarity index 100% rename from graph_2324636.jsonl rename to edge/graph_11453832.jsonl diff --git a/edge/graph_11453858.jsonl b/edge/graph_11453858.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18b39b6e8530176230de05eb2bbf7843a2002742 --- /dev/null +++ b/edge/graph_11453858.jsonl @@ -0,0 +1,7 @@ +{"2189441|2593345": []} +{"207172599|3330313": []} +{"5700060|1507400": ["An overview of the Hadoop platform, MapReduce framework and its current applications [26,27] has been reported for the field of bioinformatics."]} +{"16472693|17346817": [", spatial data, image or videos) may require specialized approaches [38\u201340]."]} +{"6584884|239537": []} +{"18082431|469744": ["For a survey of AR issues, see Azuma (1997); perceptual issues in AR are discussed by Drascic and Milgram (1996) A second issue in VEs not dealt with in the four I\u2019s is health and safety hazards .", "For a survey of AR issues, see Azuma (1997); perceptual issues in AR are discussed by Drascic and Milgram (1996) A second issue in VEs not dealt with in the"]} +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} diff --git a/edge/graph_11459632.jsonl b/edge/graph_11459632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ced101990ab722e6d4bd1fddb60c41390df2fbd6 --- /dev/null +++ b/edge/graph_11459632.jsonl @@ -0,0 +1,2 @@ +{"5755816|11459632": []} +{"5755816|16362395": []} diff --git a/graph_2326457.jsonl b/edge/graph_11460679.jsonl similarity index 100% rename from graph_2326457.jsonl rename to edge/graph_11460679.jsonl diff --git a/graph_1146513.jsonl b/edge/graph_1146513.jsonl similarity index 100% rename from graph_1146513.jsonl rename to edge/graph_1146513.jsonl diff --git a/graph_2336721.jsonl b/edge/graph_1146543.jsonl similarity index 100% rename from graph_2336721.jsonl rename to edge/graph_1146543.jsonl diff --git a/graph_2338214.jsonl b/edge/graph_11471272.jsonl similarity index 100% rename from graph_2338214.jsonl rename to edge/graph_11471272.jsonl diff --git a/edge/graph_11475865.jsonl b/edge/graph_11475865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81146c0d7da1c8e206d9aeefc3c83a104947d26c --- /dev/null +++ b/edge/graph_11475865.jsonl @@ -0,0 +1,2 @@ +{"187060|8983048": ["According to (Rodrigues et al., 2002), no optimal solution exists, and the ICP method remains a state-of-the-art algorithm (Salvi et al., 2007)."]} +{"33274647|11475865": ["In (Otepka, Ghuffar, Waldhauser, Hochreiter, & Pfeifer, 2013) examples for processing point clouds from image matching and airborne laser scanning with the same methods in OPALS are shown."]} diff --git a/graph_2341328.jsonl b/edge/graph_11476091.jsonl similarity index 100% rename from graph_2341328.jsonl rename to edge/graph_11476091.jsonl diff --git a/graph_2341679.jsonl b/edge/graph_11497061.jsonl similarity index 100% rename from graph_2341679.jsonl rename to edge/graph_11497061.jsonl diff --git a/edge/graph_11498812.jsonl b/edge/graph_11498812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0802738e2abfbb03bb04dc37d1b1aa9adbad5e94 --- /dev/null +++ b/edge/graph_11498812.jsonl @@ -0,0 +1,18 @@ +{"109601308|860072": ["Many efforts have been made to design an advanced communication system for extreme environmental conditions, and to develop the overall working capabilities of newly proposed standards such as LTE-R and WiMAX [2-3]."]} +{"43506765|18148591": ["It has been shown in [4] that, in order to achieve reasonably low correlation, antenna spacing has to be at least half a wavelength, resulting in increasing equipment size.", "2152319 pattern, orientation, polarization, angular spread, angle of arrival, power angular profile) [3], [4]."]} +{"25822604|7482876": ["For this channel, 50 references appear in the review of [44], and more than 20 additional references appear in [45], for a total of at least 77 references on this channel."]} +{"17514822|7482876": ["Many measurement campaigns have demonstrated high Doppler and delay spreads and even nonstationarities of the channel statistics [3]\u2013[7]."]} +{"2023556|7482876": ["Many measurement campaigns have demonstrated high Doppler and delay spreads and even nonstationarities of the channel statistics (see [1] and [4] for an overview and further references)."]} +{"22833814|860072": ["diverse scenarios, and large Doppler spreads [11], [12] besides some challenges inherited from conventional trains such as high penetration losses, limited visibility in tunnels, and the harsh"]} +{"22833814|7482876": ["that have been thoroughly investigated in the literature [2]\u2013[10], a comprehensive study of HST communication channels is still missing."]} +{"59441240|12681089": ["The geometry-based stochastic channel model (GSCM) is widely used in MIMO channel modeling [5]."]} +{"62597602|13367219": []} +{"62597602|3054454": []} +{"1721313|2835258": []} +{"5589605|7482876": []} +{"14915576|15255963": ["It can implement the simulation, comparison and evaluation of the communication system [2,3,7]."]} +{"964298|860072": ["The study in [5] also identifies several implementations based on switched Ethernet in an aggregation network and the trend of using 4 G technologies such as IEEE 802.", "A complete survey on current deployments and research studies on broadband communication technologies in the railway domain in general (not specifically high speed), focused mainly on Internet services for passengers, is covered in [5]."]} +{"11390343|15255963": [", [4], the existing models are based on the assumption that the average received signal to noise ratio (SNR) remains unchanged."]} +{"11548770|12681089": []} +{"6806007|12681089": ["Both deterministic and stochastic models of propagation channels in high-speed railway environments are of importance for designing these algorithms and techniques [1]."]} +{"6674936|36610012": ["HIGH-SPEED data transmission services have been highly demanded in future wireless communications [1]."]} diff --git a/edge/graph_115146155.jsonl b/edge/graph_115146155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..760d8c2574bf408bc41459b86bb309d5570eebaa --- /dev/null +++ b/edge/graph_115146155.jsonl @@ -0,0 +1,13 @@ +{"33902671|469744": []} +{"40913035|469744": []} +{"7271974|469744": ["Based on his early survey on AR [4], Azuma published a complementary paper [3] that also explicitly names industrial application domains for AR, such as supporting the assembly of wire bundles in aircrafts or using AR for factory floor or pipeline planning."]} +{"7271974|17024419": []} +{"14161163|469744": ["AR combines natural and artificial stimuli by projecting computer graphics on a transparent plane (Azuma, 1997; Azuma et al., 2001)."]} +{"148966978|15622882": []} +{"46059122|469744": []} +{"15218665|206986719": []} +{"15218665|469744": ["For example, as proposed by Azuma (1997), AR can be defined as a system that fulfills three basic features: a combination of real and virtual worlds, realtime interaction, and accurate 3D registration of virtual and real objects.", "As being defined as a situation, AR signifies a variation of virtual reality, and plays a supplemental role rather than a replacement of reality (Azuma, 1997; Martin-Gutierrez et al., 2010).", "As being defined as a situation, AR signifies a variation of virtual reality, and plays a supplemental role rather than a replacement of reality, (Azuma, 1997; Martin-Gutierrez, et al., 2010).", "For example, as proposed by Azuma (1997), AR can be defined as a system that fulfills three basic features: a combination of real and virtual worlds, real time interaction, and accurate 3D registration of virtual and real objects.", "As being defined as a situation, AR signifies a variation of virtual reality, and plays a supplemental role rather than a replacement of reality, (Azuma, 1997; Martin-Gutierrez, et al., 2010). To describe to what extent reality is supplemented or augmented, previous research has been developed several taxonomies of AR. Milgram et al. (1994) proposed a so-called Reality-Virtuality continuum, ranging from a completely real environment to a completely virtual one."]} +{"205177322|469744": ["One strategy for providing timely information on the trajectory of oncoming vehicles is augmented reality (AR), which combines real and artificial cues to improve operator performance (Azuma, 1997; Azuma et al., 2001)."]} +{"56390038|469744": ["The information conveyed by the virtual objects helps a user perform real-world tasks (Azuma, 1997).", "Augmented Reality is still a new concept and it is not commonly used by general public despite the fact that it has been described in the nineties already (Azuma, 1997; Bimber and Raskal, 2005; Schmalstieg and Wagner, 2007)."]} +{"5781095|469744": ["Especially the area of augmented reality as a part of the \u201cmixed realities\u201d [11] is a growing technology, e.g. using it in a medical context as a training tool or during surgeries [3]."]} +{"151883856|469744": []} diff --git a/edge/graph_115197495.jsonl b/edge/graph_115197495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4ec015aa9293a85366427f822fc91d9d2b390f0 --- /dev/null +++ b/edge/graph_115197495.jsonl @@ -0,0 +1,4 @@ +{"3498483|13413518": ["Furthermore, even in the case of the evaluation of road defects, dedicated monitoring methods are required to support high efficiency repairs [2,3]."]} +{"56324162|13413518": []} +{"56324162|11194782": ["Mathavan et al. (2014) proposed to use this LCMS in combination with high-resolution 2D imaging for the detection of ravelling.", "Mathavan, Kamal, and Rahman (2015), on the contrary, aimed their research at the collection techniques, but confined themselves to three-dimensional (3-"]} +{"56324162|16502294": []} diff --git a/edge/graph_115198485.jsonl b/edge/graph_115198485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..961569b5d53c15511011c22e054d9651bbd8cd65 --- /dev/null +++ b/edge/graph_115198485.jsonl @@ -0,0 +1,48 @@ +{"70020168|64404": []} +{"4570087|3693305": ["We refer readers to [67] for a survey of ANN approaches.", "For learning to hash, a recent survey [67] categorizes it into quantization and pairwise similarity preserving."]} +{"16387148|4351505": []} +{"16387148|9928823": ["Deep Belief Networks (DBNs) are probabilistic generative models consisting of multiple layers of stochastic hidden variables [Deng 2014].", "In Deng [2014], several DL techniques were presented and a categorization of them into three classes, namely, discriminative, generative, and hybrid, was provided.", "These methods can be divided into two general categories based on how they are used [Deng 2014]: (1) discriminative and (2) generative.", "Recently, a few review papers have also become available [Deng 2014; LeCun et al. 2015; Guo et al. 2016b; Schmidhuber 2015]."]} +{"16387148|13946824": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"16387148|987239": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"52143225|49564729": ["Three main brain inspired learning architectures that we consider in this work are neural networks [5], [16], [17], [20], HTM [18] and LSTM [19].", "rents, the most widely used architecture for the crossbar synapses is 1 transistor 1 memristor 1T1M [20], [59], [60]."]} +{"52143225|13687435": ["HTM is divided into two parts: (1) Spatial Pooler (SP) and (2) Temporal Memory (TM) [33], [34]."]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"3269862|18188725": []} +{"3269862|393948": []} +{"12971705|6681074": []} +{"1103605|3608506": ["For a comprehensive overview of defogging/dehazing algorithms, we point the reader to [43,71].", "Non-local dehazing has also been found to operate best at medium levels of fog [43], which results in a similar performance trend to DCP. E\ufb00ect of Dehazing Preprocessing on Real-world Performance and Discussion .", "More speci\ufb01cally, MSCNN is slightly conservative in removing fog, as was found for other learning-based dehazing methods in [43], and operates best under lighter fog, providing a signi\ufb01cant improvement in this setting with regard to point 2."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"58593215|3693305": ["Thus, hashing technique [62], [63] can be also introduced in our model to accelerate the multiview learning speed."]} +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} +{"5024194|393948": ["Deep learning methods, especially convolutional neural networks (CNNs), have recently led to breakthroughs in many computer vision tasks such as object detection and recognition, and image segmentation and captioning [22]\u2013[24].", "Deep learning has completely transformed the performance of many computer vision tasks [23], [24]."]} +{"17424196|18889901": ["A survey on the existing RGB-D datasets can also be found in [3]."]} +{"17424196|8983048": ["A review on automatic correspondence is given in [20], a survey and evaluation on range image registration methods in presented in [25]."]} +{"17424196|16620699": []} +{"17424196|987239": ["Two surveys on 3D model retrieval methods can be found in [27] and [6].", "A 3D model retrieval system usually consists of a database with an index structure and an online query engine [27].", "A large number of algorithms have been proposed to address different technological aspects of these applications [1], [16], [5], [27], [7]."]} +{"17424196|6681074": ["A large number of algorithms have been proposed to address different technological aspects of these applications [1], [16], [5], [27], [7].", "methods can be found in [7], [19], [21], [9]."]} +{"15771800|6681074": []} +{"206592484|456491": []} +{"21011865|2323881": []} +{"21011865|393948": []} +{"53147766|2088679": ["Recently, deep learning algorithms have been successfully applied to medical image processing and analysis (Litjens et al., 2017)."]} +{"94642|393948": ["Socher et al. [7] proposed a combined single-layer CNN and multiple fixed-tree\n978-1-4673-6795-0/15/$31.00 \u00a92015 IEEE\nRecursive Neural Networks (RNNs) to separately learn RGB and depth features.", "The online feature extraction + classification time is over four times faster than CNN-RNN and about 7 times faster than SP+HMP.\nC. 2D3D Object Dataset\nFor the second experiment, we evaluated the proposed LDELM on the 2D3D object dataset [19].", "On the contrary, feature learning has been extensively studied on other neural networks such as Deep Autoencoders (DAE) [29], [30], [12], [31], Deep Belief Net (DBN) [32] and Convolutional Neural Networks (CNN) [11], [3], [18], [16], [17].", "In the last decade, visual representation methods have evolved from conventional hand-\ncrafted techniques such as the design of feature detectors and descriptors (e.g. SIFT [13], HOG [14])), feature encoding schemes (e.g. Bag of Features (BoF) [2], [1]) to more sophisticated learning techniques such as those based on dictionary learning [15] and supervised deep networks (e.g. Convolutional Neural Networks (CNN) [3], [16], [17], [18]).", "3) Execution Time: We perform an additional experiment to compare the computational performance of the proposed method with the two methods whose code is available namely the Convolutional-Recursive NN (CNN-RNN) 1 and Hierarchical Matching Pursuit (SP+HMP) 2."]} +{"4351505|18889901": []} +{"31989242|393948": []} +{"8063966|8983048": ["Two reviews on 3D modeling and range image registration by [30] and [31] are also worth mentioning.", "Moreover, computing the intersection of a sphere with the surface is not easy, especially when the surface is represented as a point cloud or a mesh [30]."]} +{"8063966|6681074": []} +{"53080520|7185733": ["All these applications raise an interesting question that training a computer to automatically recognize human gestures will be very useful in different aspects including human computer interaction [1]\u2013[4], robot control [5]\u2013[7], sign language recognition [8], [9], augmented reality [10] and so on."]} +{"60602467|393948": ["Representation learning seeks to learn representations of the data and is making it easier for the process of extracting useful information when building a classifier or other predictors [34]\u2013[36]."]} +{"42942628|16362395": []} +{"4562004|4110304": ["Our previous paper [39] provides a comprehensive survey of recent studies in exploring visual interpretability of neural networks, including 1) the visualization and diagnosis of CNN representations, 2) approaches for disentangling CNN representations into graphs or trees, 3) the learning of CNNs with disentangled and interpretable representations, and 4) middle-to-end learning based on model interpretability."]} +{"9225133|6387482": []} +{"17730048|13946824": ["2) Generalized Shape Distributions (GSD): Liu et al [33] proposed a novel technique for 3D shape retrieval called the Generalized Shape Distributions (GSD), which is a 3D histogram.", "According to Liu [22], the advantages of a VBD are twofold: 1) It does not require the explicit virtual model information, which makes the method robust to real practical applications."]} +{"17730048|60779308": ["1) Fourier Descriptor (FD): A Fourier descriptor (FD) is a representation of the shape obtained after the application of Fourier transform on the coefficients of the shape signature of the shape.", "The function is integrated over the whole body to make it invariant to the starting point and is also normalized to achieve scale invariance.", "These descriptors are very efficient at filtering out the results based on the boundary points because of their low computation complexity."]} +{"17730048|987239": []} +{"17730048|6746689": ["Several methods have been proposed to perform Skeletonization such as distance transform [35], thinning [36], or Voronoi-based methods [37]."]} +{"23569888|24222234": ["Clearly, visual perception is only one of the possible sensory modalities equipping modern robots, that can be involved in the object recognition process (see for example (Luo et al 2017; Higy et al 2016))."]} +{"18238681|41505326": []} +{"18238681|18889901": ["We are more comprehensive than earlier efforts, describing 101 datasets compared with the 14 in [9], 19 in [42]1 and the 44 action datasets in [115]."]} diff --git a/edge/graph_115198512.jsonl b/edge/graph_115198512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..824cdc2960175d399222152635c9ea77b7c6946b --- /dev/null +++ b/edge/graph_115198512.jsonl @@ -0,0 +1,11 @@ +{"3318618|27895355": ["Regarding the self-organized trust establishment models, the trustworthiness of vehicles is built and maintained in a distributed fashion [9], [10].", "Exchanged information needs to be evaluated according to its particular context [9], [12]."]} +{"3318618|84832337": ["In addition, a vehicle must be able to trust the received information in a reasonable short time [3], [4], [25], [26]."]} +{"3318618|1333339": ["In addition, a vehicle must be able to trust the received information in a reasonable short time [3], [4], [25], [26].", "Trust systems provide other network security services such as access control, authentication, malicious vehicles detection and secure resources sharing [4], [7], [8].", "Recently, trust models are proposed as an emerging technique allowing the establishment of the minimal security level between cooperative nodes [4]\u2013[6].", "There exists two main categories of trust computing protocols: infrastructure-based and self-organized [4]."]} +{"3318618|62617427": ["Trust is also used in designing secure routing protocols [36], [37]."]} +{"49326208|17279511": []} +{"58828847|2142482": []} +{"58828847|207209718": ["In this paper, we make the following contributions:\n\u2022 We present the first taxonomy of IDS characteristics and architectures designed for vehicles \u2022 We produce the first systematic review of the broad landscape of IDS techniques designed for vehicles, with 66 techniques reviewed in total \u2022 We identify open issues in developing IDS for vehicles where further research can have considerable impact\nThe adoption of computing in a diverse range of applications has led to a similarly diverse range of related surveys, with Modi et al. [5] specialising in threats to cloud computing, Mitchell and Chen in wireless networks [6], and Butun et al. [7] in sensor networks.", "\u2022 S: Autonomous UAV Network \u2022 D/DA: Onboard (distributed) / Collaborative \u2022 AT/T: Behaviour / Rule-based \u2022 AF: (Physical) Onboard sensor data \u2022 AA: (Integrity) Malicious tampering of flight control \u2022 EA: Experimental \u2022 TRL: 4\nAn interesting alternative approach is to use behaviour specification, such as in the work of Mitchell and Chen [52], which uses a behaviour rule state machine.", "An exception is the 2014 survey and taxonomy of IDS for cyber-physical systems by Mitchell and Chen [10], which, however, was published before attacks against vehicles became the vibrant area for research that", "Here, the research community has largely settled in terms of knowledge-based versus behaviour-based approaches [10].", "An exception is the 2014 survey and taxonomy of IDS for cyber-physical systems by Mitchell and Chen [10], which, however, was published before attacks against vehicles became the vibrant area for research that it now is, and as a result, before the recent influx of IDS techniques proposed specifically for vehicles.", "A particular subtype is behaviour specification [10], where what is normal is determined by identifying the complete set of normal states of a vehicle based on its specification and", "As a result, behaviourbased approaches can exhibit high false positive rates [10]."]} +{"58828847|17464562": ["Each vehicle is assumed to be equipped with a learning automaton, which is code able to take decisions by learning the optimal action through repeated interaction with the environment [97]."]} +{"58828847|12815020": []} +{"32835242|10283694": ["Cryptographic techniques were extensively studied in the literature to prevent misbehaving vehicles from impacting the applications and networks [7, 8]."]} +{"45624143|2457428": []} diff --git a/edge/graph_115200953.jsonl b/edge/graph_115200953.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec13622d739ba06125962a412741dd0c0c809740 --- /dev/null +++ b/edge/graph_115200953.jsonl @@ -0,0 +1,56 @@ +{"69957285|206578365": []} +{"125225918|205286988": []} +{"2783099|3936425": ["A key centerpiece in making the radio spectrum efficient is LTE heterogeneous networks (LTE HetNets) or small cell networks [21]."]} +{"49558588|22221919": ["In order to overcome this issue, non-orthogonal multiple access (NOMA) has been actively researched as one of the promising methods for the ef\ufb01cient and \ufb02exible use of both energy and the spectrum, as well as for system throughput improvements [31]."]} +{"49558588|10979806": ["2929809 of transmitting information to other devices [3], [4]."]} +{"61806265|206491434": ["limited energy, limited computation, and limited processing capabilities [7]."]} +{"61806265|3656886": ["It supports two way communication thereby acknowledges all transmissions, further in order to maintain QoS and to assure reliability Automatic retransmission request (ARQ) and Forward Error Correction (FEC) is used [36]."]} +{"61806265|9651858": ["Fig.18 demonstrates the percentage of carbon emissions due to various such activities [136]."]} +{"61806265|4427557": ["Long Range (LoRa), SigFox, RPMA, N-Wave and Dash 7 are unlicensed, NBIoT, EC-GSM-IoT, LTE-M are licensed technologies [31], [32]."]} +{"61806265|206901977": ["[125] classified the energy efficiency techniques classified into five categories of radio"]} +{"61806265|3494096": ["Therefore to select an optimal technology for an application various factors such as power consumption, security issues, deployment cost, communication range, data rate, throughput, latency are required to be considered [26], [27]."]} +{"2722298|15453366": []} +{"52012534|206578224": []} +{"52012534|15449163": []} +{"52012534|18503837": []} +{"52012534|393948": []} +{"52012534|8909218": []} +{"7289663|8909218": ["Extreme densification of heterogeneous small cells is necessary to meet this demand [4]."]} +{"51988843|22221919": ["NOMA schemes are briefly introduced in [11] and [12]."]} +{"51988843|3270620": []} +{"52038249|3330461": ["D2D communications enable wireless point-to-point services directly between two mobile devices as well as offload the traffic of cellular base stations (BSs), which contribute to the improvement of the network EE and SE due to high spectral utilization and the physical proximity between D2D pairs [5], [6]."]} +{"13008643|21930333": ["More than 40,000 small cells were deployed in 2015 [65], and this number is expected to increase in the future upon the deployment of 5G technology [66]."]} +{"13008643|14765802": ["The increasing number of BSs has significantly increased energy consumption because these stations account for around 57% of the total consumed energy in cellular networks [2,3] as shown in Figure 1a; these BSs also increase the operational expenditures (OPEX) of cellular networks that are mostly spent on electricity bills [1,5].", "Breakdown of power consumption in a cellular network and BS [2,3].", "The green communication initiative primarily aims to improve the energy efficiency, reduce the OPEX, and eliminate the GHG emissions of BSs to guarantee their future evolution [2,3].", "Consequently, the relatively new research discipline of \u201cgreen communication\u201d was recently introduced [2,3].", "The data traffic and the number of mobile subscribers have also increased exponentially [2], thereby prompting cellular network operators to install additional cellular base stations (BSs) to meet the increasing demand [3].", "Breakdown of power consu in a cellular network and BS [2,3].", "The number of BSs worldwide has doubled between 2007 and 2012 [4] and exceeded more than four million today [2]."]} +{"13008643|16412228": []} +{"13008643|24491750": ["Cellular BSs are classified into macro-, micro-, femto- (indoor), and pico-BSs according to their coverage area, and each cell has a unique size, output power, and data rate [19,20].", "High-efficiency PA techniques and their classifications are further described in [19,41].", "While switching these elements on/off can conserve energy, this approach may negatively affect the radio service (coverage) and quality of service (QoS) of the network unless specific remedial solutions are adopted [19].", "Each BS type in this architecture has a unique capability, transmit power, range, power consumption, access, backhaul, and operating functionality [19,20]."]} +{"13008643|7686677": ["The increasing number of BSs has significantly increased energy consumption because these stations account for around 57% of the total consumed energy in cellular networks [2,3] as shown in Figure 1a; these BSs also increase the operational expenditures (OPEX) of cellular networks that are mostly spent on electricity bills [1,5].", "Breakdown of power consumption in a cellular network and BS [2,3].", "The green communication initiative primarily aims to improve the energy efficiency, reduce the OPEX, and eliminate the GHG emissions of BSs to guarantee their future evolution [2,3].", "Consequently, the relatively new research discipline of \u201cgreen communication\u201d was recently introduced [2,3].", "The data traffic and the number of mobile subscribers have also increased exponentially [2], thereby prompting cellular network operators to install additional cellular base stations (BSs) to meet the increasing demand [3].", "Breakdown of power consu in a cellular network and BS [2,3].", "Unfortunately, the low electrification progress in rural areas (Figure 2), which can be attributed to their geographical limitations and economic challenges, has prompted cellular network operators to use diesel generator (DG) in powering their BSs, which increases their OPEX by 10 times [3,8]."]} +{"49726523|4735659": ["General review of 5G [15], [16], as well as reviews on specific topics including energy-efficient techniques [17], network slicing [18] and user association [19], and dynamic spectrum access [20], [21], along with cloud support [22], have been presented in the literature."]} +{"49726523|206456479": ["General review of 5G [15], [16], as well as reviews on specific topics including energy-efficient techniques [17], network slicing [18] and user association [19], and dynamic spectrum access [20], [21], along with cloud support [22], have been presented in the literature."]} +{"49726523|2301325": ["In the context of 5G, a discussion of the D2D concept is presented in [66]and [67]."]} +{"49726523|10979806": ["General review of 5G [15], [16], as well as reviews on specific topics including energy-efficient techniques [17], network slicing [18] and user association [19], and dynamic spectrum access [20], [21], along with cloud support [22], have been presented in the literature."]} +{"49726523|19938676": ["General review of 5G [15], [16], as well as reviews on specific topics including energy-efficient techniques [17], network slicing [18] and user association [19], and dynamic spectrum access [20], [21], along with cloud support [22], have been presented in the literature."]} +{"49726523|3330461": []} +{"49726523|7851743": ["Scalabilitymaintains complexity despite increasing number of nodes in distributed networks, stability traverses a finite number of states within an acceptable finite time period without oscillation, and agility adapts to the changes in the operating environment acutely [13].", "The CC concept has a close resemblance to the concept of self-organization [13], [14].", "In general, self-organization enables nodes to maintain their objectives in the presence of network dynamics without the presence of a centralized controller (or a leader), as seen in a flock of cranes maintaining a delta formation during a group flight [13].", "While the selforganization concept has been investigated in a wide range of context including ad hoc networks, wireless sensor networks, and cellular networks [13], the CC concept has been limited to CR, and even more so to the dynamic channel access application."]} +{"49726523|8909218": ["Nevertheless, both macrocells and small cells can use any of the frequency bands [45].", ", picocells and femtocells [45]) transmit with lower transmission power in higher frequency bands."]} +{"7942157|1049844": []} +{"7942157|206578224": ["The new core network includes some new entities such as SDN, MEC, and NFV as well as new backhaul techniques [11], [12], [176].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [11], [12], caching [13], [14], backhaul [15], resource management [16] and data centric network [17], [18] are available."]} +{"7942157|25911553": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available."]} +{"7942157|3757239": ["system performance and high latency which can not meet the 5G vision [179].", "BS level caching [179]."]} +{"7942157|4502294": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "5G back-haul requires higher capacity, lower latency, synchronization, security, and resiliency [13]."]} +{"7942157|206576469": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"7942157|3555631": ["Split of control plane (C-plane) and data plane (D-plane) in the architecture and the carrier frequency could be performed in order to have separate provision of capacity and coverage [21]."]} +{"7942157|8650651": []} +{"7942157|76603": ["In mission critical communication (MCC), both the latency and reliability issues need to be addressed [6]."]} +{"7942157|19938676": ["Fifth generation (5G) cellular network is the wireless access solution to ful\ufb01ll the wireless broadband communication speci\ufb01cations of 2020 and beyond [3], [4].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "With an ambition of signi\ufb01cant enhancements over 4G cellular networks, we need drastic changes in the architecture for meeting 5G visions such as 1000 times capacity enhancement, 100 billions connections and close to zero latency [3], [4]."]} +{"7942157|875676": ["The overall comparison among IDMA, SCMA and GFDM is presented in Table V. Filter bank multi carrier (FBMC) has been a strong candidate waveform for 5G [3], [85]."]} +{"7942157|35906806": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"57467825|19938676": []} +{"57467825|12206204": []} +{"33463672|10837932": ["However, considering the compromise betw e n network performance and energy savings, designing an efficient resource allocation strategy to limit the network ene rgy consumption is a real challenge [7]\u2013[9]."]} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"3939194|7686677": ["To address the power consumption challenge, it is essential to consider various techniques, such as energy-efficient base-station deployments, energy-efficient protocols and architecture designs, opportunistic network access, smart grids [4], [5], etc."]} +{"12755109|8909218": ["Also using PPP models, spectral efficiencies in range expanded picocell networks have been analyzed in [8] for the cases with and without ICIC (see also [9] for a related spectral efficiency analysis)."]} +{"116213374|14765802": ["Ever increasing energy consumption is one of the important issues related to the problem of global warming [1] and reducing the energy consumption of mobile communication networks has gained significant attentions since it takes a major part of the total energy consumption of information and communication technology (ICT)."]} +{"116213374|7686677": ["\u2026the state of a BS is coverage hole scheme was load and cell zooming the zoom out In contrast to the activation and deactivation schemes of BSs [4\u20137], the cell zooming scheme was introduced in [8], where cells are zooming-in and is not congested, the BS zooms out, while neighbor BSs zoom in.\u2026", "Reference [4] considers the base station (BS) to be the major source of energy consumption of mobile communication networks and the energy consumption of the BS depends on the traf\ufb01c load which varies depending on the geographical location.", "The basic principle of the work to reduce the energy consumption of a BS is to turn off the components of the BS as much as possible, when they are no longer needed [4].", "In [6], greedy-on and greedy-off schemes were In contrast to the activation and deactivation schemes of BSs [4\u20137], the cell zooming scheme was introduced in [8], where cells are zooming-in and zooming-out depending on the traffic load and channel condition of BSs by controlling the coverage area of\u2026"]} +{"18439755|2509135": []} +{"8631497|15116409": ["Serval subsequent approaches have been proposed since then (see [16] and the references therein)."]} diff --git a/graph_2355873.jsonl b/edge/graph_115204214.jsonl similarity index 100% rename from graph_2355873.jsonl rename to edge/graph_115204214.jsonl diff --git a/edge/graph_115302851.jsonl b/edge/graph_115302851.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b8304f0b43bf48647e0c08d419b78d7ed267da0 --- /dev/null +++ b/edge/graph_115302851.jsonl @@ -0,0 +1 @@ +{"110469769|627405": []} diff --git a/edge/graph_115307666.jsonl b/edge/graph_115307666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe3bb7ed9060fa8b5e12fd7f621d23d82104606a --- /dev/null +++ b/edge/graph_115307666.jsonl @@ -0,0 +1,2 @@ +{"2542379|1113420": []} +{"119504507|6486398": []} diff --git a/edge/graph_11532387.jsonl b/edge/graph_11532387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56631ad04b242b043aaaab3405412a2b6827e9d5 --- /dev/null +++ b/edge/graph_11532387.jsonl @@ -0,0 +1 @@ +{"13785718|18212759": []} diff --git a/edge/graph_11540239.jsonl b/edge/graph_11540239.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4819101d7ceb7c8e3747bad89240f170bef0c422 --- /dev/null +++ b/edge/graph_11540239.jsonl @@ -0,0 +1,4 @@ +{"16518635|2471981": ["X-Codewasusedastheprogramming environment."]} +{"29035966|7761990": []} +{"2154749|7761990": []} +{"15165853|9431428": ["While standard analyses (e.g. Worsley et al., 2002) are mass-univariate, multivariate analyses may show greater sensitivity (Pereira et al., 2009) to detect significantly different patterns of activation or structural differences between groups, when these differences are spread out over several\u2026", ", 2002) are mass-univariate, multivariate analyses may show greater sensitivity (Pereira et al., 2009) to detect significantly different patterns of activation or structural differences between groups, when these differences are spread out over several regions.", "Toward this end, we use multivariate machine learning (ML) techniques (Haynes and Rees, 2006; Norman et al., 2006; O'toole et al., 2007; Pereira et al., 2009).", "To avoid biasing the classification accuracy estimator (Pereira et al., 2009), the following steps were performed only on the training data for each cross-validation run."]} diff --git a/graph_2357830.jsonl b/edge/graph_115441.jsonl similarity index 100% rename from graph_2357830.jsonl rename to edge/graph_115441.jsonl diff --git a/edge/graph_115448219.jsonl b/edge/graph_115448219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb1be7b48ddb88d3bb79797cca0b451ce8862750 --- /dev/null +++ b/edge/graph_115448219.jsonl @@ -0,0 +1,15 @@ +{"41685211|17774971": ["MULTILEVEL converter technology is a very efficient alternative for medium-voltage and high-power applications and also for other applications where high-quality voltages and currents are required [1], [2]."]} +{"9632565|17774971": ["iNPx = \u23aa\u23a8 \u23aa\u23a9 d\u22121 x \u00b7 ix, ux \u2208 [\u22122,\u22121) d\u22121 x \u00b7 ix + dx \u00b7 ix, ux \u2208 [\u22121, 0) dx \u00b7 ix, ux \u2208 [0, 1) 0, ux \u2208 [1, 2].", "d(1)x = { ux, ux \u2208 [0, 1) 2\u2212 ux, ux \u2208 [1, 2].", "MULTILEVEL converters have received increasing attention in recent years due to the requirement of high power and high voltage in power industrial applications [1]\u2013 [9].", "iNPx = \u23aa\u23a8 \u23aa\u23a9 0, ux \u2208 [\u22122,\u22121) dx \u00b7 ix, ux \u2208 [\u22121, 0) dx \u00b7 ix + d(1)x \u00b7 ix, ux \u2208 [0, 1) d(1)x \u00b7 ix, ux \u2208 [1, 2]."]} +{"1547377|17381415": ["This is nowadays considered standard to solve with a PLL [20]."]} +{"1547377|12083425": []} +{"14202515|17758458": []} +{"10845482|17774971": ["Another commutation introduced in [2] as type 2 takes place between one outer and one inner device.", "Highly popular are the voltage-source multilevel inverters, which can be divided into three categories, according to their topology: neutral point clamped (NPC), flying capacitor (FLC), and cascade H-bridge [1], [2]."]} +{"115499271|17774971": []} +{"7376688|17774971": []} +{"115006863|17774971": []} +{"42386675|17774971": []} +{"21048263|15700537": []} +{"11732316|17774971": []} +{"28702837|17381415": ["When operated in island mode, the inverters are voltage-controlled, generating the output voltage at a specified amplitude and frequency [ 5 ], [6]."]} +{"110865421|17774971": ["In general these approaches fall into two categories [10]: \u2022 High switching frequency PWM techniques."]} +{"25149521|17774971": ["However, the addition of a zero-sequence triplen harmonic voltage to these sinusoidal reference voltages does not produce zero-sequence currents in three-phase three-wire systems, and it enables to increase the modulation index by 15% before the overmodulation occurs [15], [20]."]} diff --git a/graph_115456.jsonl b/edge/graph_115456.jsonl similarity index 100% rename from graph_115456.jsonl rename to edge/graph_115456.jsonl diff --git a/graph_2368628.jsonl b/edge/graph_1155669.jsonl similarity index 100% rename from graph_2368628.jsonl rename to edge/graph_1155669.jsonl diff --git a/edge/graph_115601761.jsonl b/edge/graph_115601761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3df5f7eaf42ffbc054b066e42417cce436a1704f --- /dev/null +++ b/edge/graph_115601761.jsonl @@ -0,0 +1,12 @@ +{"1434572|7085121": []} +{"5052420|6909107": []} +{"45386590|2335874": ["The speci\ufb01c characteristics of vehicular networks favor the development of attractive and challenging services and applications [10, 11]."]} +{"19552313|10299098": ["The choice of the right service model is application and environment-depending, and may also depend on the level of context-awareness of the involved devices [33].", "nodes is a still challenging research issue [33]\u2013[35].", "Under this perspective, the FC paradigm differs from the related Mobile Edge Computing (MEC) one [7], [8], [33], [34], in which only edge nodes are employed for the device augmentation."]} +{"19552313|32360363": ["The final goal is the \u2018\u2018smart\u2019\u2019 management of the overall city asset [98]."]} +{"19552313|3330461": ["However, due to the multi-hop nature of the Internet backbone and the short-range capability of the network technologies currently envisioned for the support of inter-device communication [25], [26], guaranteeing reliable network connections is a challenging task in the envisioned IoE realm [27], [28].", "However, these (positive) attributes are counterbalanced by the fact that: (i) FNs are small-size data centers with reduced fault-tolerance capability; and (ii) the Device-Fog communication typically relies on short-range WiFi/UWB/\nVOLUME 5, 2017 9887\nBluetooth-based connections that are intermittent, interferenceaffected and failure-prone [58]\u2013[60].", "11/15 transmission technologies, like WiFi, UWB and Bluetooth [25], [126].", "However, in this case, the resulting perconnection round-trip-time RTT becomes quite sensitive on the corresponding (generally, time-varying) inter-vehicle distance d (m) and tends to scale up/down proportionally to it, that is [25], [137], [135]:", "Since the IoE devices could be randomly distributed over the SG, it is expected that theNetwork layer relies on short/mediumrange wireless transmission technologies, like WiFi, UWB and/or Bluetooth [26];\n(iii) the Fog layer is responsible for the management of the massive volume of metered data.", "However, we note that [25]: (i) due to fading and path-loss, the energy consumption of D2D links increases with the inter-thing distance in an (at least) cubic way; (ii) due to thing mobility, D2D mobile links are intermittent, and their average failure rates typically increase with the average thing speeds [131]; and, (iii) under the D2D model, the initiator thing needs, at first, to discover proximate things, and, then, must perform task distribution, thing synchronization and task retrieval.", "For this purpose, the cooperating devices build up D2D links, that typically rely on short-range wireless communication technology, like UWB, WiFi or Bluetooth [25], [26].", "9 will rely on short/medium-range wireless networking technologies, like WiFi, UWB and/or Bluetooth [26]; (iii) thank to the virtualization of the underlying manufacturing things, it is expected that the Fog layer of Fig.", "It operates under the same vehicular scenario previously described for the V-FoE test-bed, but, according to [25], [137], it utilizes only \u201cad-hoc\u201d D2D IEEE802.", "For this purpose, the cooperating devices build up D2D links, that typically rely on shortrange wireless communication technology, like UWB, WiFi or Bluetooth [25], [26]."]} +{"19552313|18037424": ["The underlying networking infrastructure acts as glue: it allows the SG to perform remote metering by (possibly) exploiting the support of smart Energy Storage Devices [95], [96]."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"55689939|10283694": ["It is because of the realization of smart Intelligent Transport System (ITS) applications, and architectural similarity between Mobile Cloud Computing (MCC) and Vehicular Ad-hoc Networks (VANETs) [1-3]."]} +{"7703219|16335158": ["In the CC, MCC and Sensor-cloud architecture, a physical datacentre unit is in charge of performing the data computation and storage (Hossain, 2013), (Dinh, Lee, 2011)."]} +{"7703219|16654832": ["However, the mobile devices suffer from computing resources limitations, battery restriction and processing time (Shiraz et al., 2012)."]} +{"13888005|763939": ["VanetMo-biSimisbasedonCanuMobiSim[27]thatsupportsbothmicroandmacrolevelmobility[28]."]} diff --git a/edge/graph_115605589.jsonl b/edge/graph_115605589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34b5a878d8351dc455127e7c5f3b148c496ca6f1 --- /dev/null +++ b/edge/graph_115605589.jsonl @@ -0,0 +1,10 @@ +{"103143231|10599713": []} +{"103143231|16514036": []} +{"103143231|1503157": []} +{"103143231|20905429": []} +{"109329976|31246274": []} +{"8100286|1230643": []} +{"20870120|31246274": ["Moreover, the sensors based on CNT/ polymer offer advantages in terms of environmental conditions such as low operating temperature [3-4] and can be"]} +{"18480970|31246274": ["In general, the properties of a gas sensor are mentioned in terms of sensitivity, selectivity, response time, recovery time, operating temperature, stability and sensitivity to humidity [5]."]} +{"14102195|31246274": ["A possible way to reset the sensor to its initial state should be to expose it to UV light during a long time as in [19] but this is an issue outside the scope of this paper.", "According to a sensitivity study of CNTs in [19], several gases can be detected such as NO2, NH3, and CO2.", "Indeed, it has been shown that CNT and graphene sheets present a strong sensitivity to various gases [19]\u2013[22] and other physical parameters."]} +{"19621413|1230643": []} diff --git a/edge/graph_115605688.jsonl b/edge/graph_115605688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..536e50ba6b7fd35a99ac58187dbdcc61d19b4858 --- /dev/null +++ b/edge/graph_115605688.jsonl @@ -0,0 +1,14 @@ +{"2944283|7919236": ["An integrated view on the user experience of recommender systems can be obtained by means of user-centric development (McNee et al. 2006b) and evaluation (Pu and Chen 2010; Pu et al. 2012).", "Pu and Chen (2010, see also Pu et al. 2012) provide an extensive questionnaire to test several specific experience concepts of recommender systems.", "\u2026the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012).", "However, several researchers have argued that there are other factors that influence the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012)."]} +{"2944283|14148655": ["\u2026recommenders let users rate items, (e.g. youtube.com, see also McNee et al. 2002; Cena et al. 2010; Gena et al. 2011), critique items (see also Chen and Pu 2012; Viappiani et al. 2006), assign weights to item attributes (see also H\u00e4ubl et al. 2004), or indicate their specific needs (e.g.\u2026", "The research on these different preference elicitation methods shows that they have a substantive impact on the user experience (Chen and Pu 2012).", "\u2026users may indicate their preference by assigning weights to attributes (H\u00e4ubl et al. 2004; Kramer 2007), prioritizing user needs (Felix et al. 2001; Stolze and Nart 2004; Hu and Pu 2009) or critiquing examples (Pu and Chen 2006; Pu et al. 2008; Chen and Pu 2012; Viappiani et al. 2006, 2008).", "Hu and Pu (2011, see also Chen and Pu 2012) show that putting a logical structure on the list of recommendations (specifically, categorizing the recommendations to reflect different trade-offs) leads to a higher perceived categorical diversity of the recommendations, a higher satisfaction and\u2026", "Whereas a substantial amount of research considers the individual qualities of these recommendations, little research has considered the composition of the list (Hu and Pu 2011; Chen and Pu 2012; Ziegler et al. 2005; Cooke et al. 2002)."]} +{"14990549|15164501": []} +{"14990549|35897447": []} +{"19446858|627405": ["\u2026and developing guidelines are grounded in several other IS research publications (e.g., Bandara et al., 2011; Boell & Cecez-Kecmanovic, 2014; Brereton et al., 2007; Kitchenham, 2004; Levy & Ellis, 2006; Okoli & Schabram, 2010; Turner et al., 2008; Webster & Watson, 2002; Wolfswinkel et al.,\u2026", "Identifying the challenges and developing guidelines are grounded in several other IS research publications (e.g., Bandara et al., 2011; Boell & Cecez-Kecmanovic, 2014; Brereton et al., 2007; Kitchenham, 2004; Levy & Ellis, 2006; Okoli & Schabram, 2010; Turner et al., 2008; Webster & Watson, 2002; Wolfswinkel et al., 2013)."]} +{"19446858|15164501": ["\u2026while Ngai and Gunasekaran (2007) applied broader descriptors in their review of mobile commerce research (\u201cmobile commerce\u201d, \u201cm-commerce\u201d), as did Leidner and Kayworth (2006) (\u201cIT culture\u201d, \u201cinformation systems culture\u201d, \u201cIT values\u201d) and Wareham et al. (2005) (\u201ceCommerce\u201d, \u201celectronic\u2026", "For instance, Leidner and Kayworth (2006) grounded their review of culture in IS research in nonempirical manuscripts and leading books to broaden their understanding of the empirical studies in the field, Melville, Kraemer, and Gurbaxani (2004) collected studies on IT and organizational\u2026", "For instance, Leidner and Kayworth (2006) grounded their review of culture in IS research in nonempirical manuscripts and leading books to broaden their understanding of the empirical studies in the field, Melville, Kraemer, and Gurbaxani (2004) collected studies on IT and organizational performance based on keywords from a definition of IT business value they developed at the outset of their review, and"]} +{"19446858|35897447": ["\u2026(2004) used the citations of papers they identified in their keyword search as sources for their review on IT and organizational performance, and Piccoli and Ives (2005) collected\u2014as part of their review on IT-dependent strategic initiatives\u2014a large number of papers from journals other than\u2026"]} +{"28018995|9463047": ["Readers can find a good example of a detailed description of the literature search process in Muller & Ulrich (2013) (cf. Figure 5), although the description does not explicitly show the cycles of the search process.", "Overview of Literature Reviews\u2019 Phases, Tasks, and Structure\nTasks Structure Schryen (2013) (Dibbern, Goles, Hirschheim, & Jayatilaka, 2004) (Roberts, Galluch, Dinger, & Grover, 2012) (Muller & Ulrich, 2013)\nFr am\nin g\nMUGS Introduction 1."]} +{"28018995|7653502": ["Tasks Structure Schryen (2013) (Dibbern, Goles, Hirschheim, & Jayatilaka, 2004) (Roberts, Galluch, Dinger, & Grover, 2012) (Muller & Ulrich, 2013)", "\u2026in theory and informed by existing IT business value research; (2) use the model to synthesize what is known about IT business value; and (3)\n3 Schryen (2010b) provides examples of IS (business value) fields where research needs to get intensified before literature reviews can be applied to\u2026", "3 Schryen (2010b) provides examples of IS (business value) fields where research needs to get intensified before literature reviews can be applied to synthesize findings.", "Overview of Literature Reviews\u2019 Phases, Tasks, and Structure\nTasks Structure Schryen (2013) (Dibbern, Goles, Hirschheim, & Jayatilaka, 2004) (Roberts, Galluch, Dinger, & Grover, 2012) (Muller & Ulrich, 2013)\nFr am\nin g\nMUGS Introduction 1.", "Schryen (2010a) briefly overviews them.", "More precisely, I draw on Schryen (2013). I chose this review not because it is in any way superior to others in terms of quality but rather because I not only know the product\u2014the literature review itself\u2014but also am familiar with the process of compiling it.", "In Schryen (2013), a separate section describes the constructs \u201cinformation systems\u201d; \u201cIS business value\u201d in terms of examination level (individual level, firm level, industry level, and economy level), object of examination (IS assets and non-IS assets), and time of evaluation (\u201cex post\u201d); and, finally, the theoretical paradigms used in IS business value research."]} +{"28018995|62709258": [", [Riedl et al., 2011]) analyzes to what extent the existing literature supports a particular proposition or reveals an interpretable pattern."]} +{"28018995|15164501": ["\u2026are the reviews of Joseph, Ng, Koh, and Ang (2007), who propose a theoretical model of IT turnover, including propositions for future research, and Leidner and Kayworth (2006), who develop a theory of IT, values and conflict and propositions concerning three types of cultural conflict and the\u2026"]} +{"28018995|40709161": ["\u20262013) or in a separate methodology section (see, e.g., Aguirre-Urreta & Marakas, 2008; Aksulu & Wade, 201015; Arnott, Pervan, & Dodson, 2005; Beaudry & Carillo, 2006; Corley, Jourdan, & Ingram, 2013; Grahlmann, Helms, Hilhorst, Brinkkemper, & van Amerongen, 2012; Miaskiewicz & Monarchi, 2008)."]} +{"28018995|33644565": ["In their literature review \u201cFraming the Frameworks: A Review of IT Governance Research\u201d, Brown and Grant (2005) clearly acknowledge the importance of providing definitions of key concepts by naming their", "In their literature review \u201cFraming the Frameworks: A Review of IT Governance Research\u201d, Brown and Grant (2005) clearly acknowledge the importance of providing definitions of key concepts by naming their\n4 The level of analysis can be individual, firm, branch, or/and national level.", "\u2026the lens of systems theory, in Beaudry and Carillo (2006), who review the customercentered B2C literature through the lens of activity theory, in Brown and Grant (2005), who use a conceptual framework for IT governance research, in Demirhan (2005), who applies an IT investment framework in the\u2026"]} +{"13985464|8313190": ["\u2026active CIMs such as lead user workshops, focus groups, toolkits, and innovation communities enable customers to actively execute tasks such as getting involved in the generation of ideas, and/or in the design of products or services (F\u00fcller and Matzler, 2007, Zogaj and Bretschneider, 2012)."]} diff --git a/graph_2381561.jsonl b/edge/graph_11567103.jsonl similarity index 100% rename from graph_2381561.jsonl rename to edge/graph_11567103.jsonl diff --git a/graph_2382521.jsonl b/edge/graph_11567363.jsonl similarity index 100% rename from graph_2382521.jsonl rename to edge/graph_11567363.jsonl diff --git a/graph_2388738.jsonl b/edge/graph_115681896.jsonl similarity index 100% rename from graph_2388738.jsonl rename to edge/graph_115681896.jsonl diff --git a/edge/graph_115682194.jsonl b/edge/graph_115682194.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35c3ea839811dd87462369152b6e87cde6d95ea0 --- /dev/null +++ b/edge/graph_115682194.jsonl @@ -0,0 +1,3 @@ +{"33284523|2623404": []} +{"33233541|35426346": []} +{"9178290|2762484": ["The physical software workloads at shop-floor layer are most of the times proprietary (custom hardware and custom software) or in some cases semiproprietary (standard hardware and operating system and custom software) and are responsible with direct real time control of the physical resources and of the material flow on the shop floor [29]."]} diff --git a/graph_239537.jsonl b/edge/graph_115692340.jsonl similarity index 100% rename from graph_239537.jsonl rename to edge/graph_115692340.jsonl diff --git a/graph_2396555.jsonl b/edge/graph_11575230.jsonl similarity index 100% rename from graph_2396555.jsonl rename to edge/graph_11575230.jsonl diff --git a/edge/graph_115758427.jsonl b/edge/graph_115758427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0de84959c0324c8f5fe623f4329b44f00ffbe0ac --- /dev/null +++ b/edge/graph_115758427.jsonl @@ -0,0 +1,13 @@ +{"9873325|1229096": ["The path planning and control methods reviewed for self-driving cars by [34] usually require real-time GPS information to formulate a real trajec-"]} +{"5696519|15093118": ["Two-frame methods require this information between every pair of frames; the more complex multi-frame methods employ techniques, i.a., bundle adjustment to track the scale for varying amounts of time [81]."]} +{"5696519|206739910": ["Two-frame methods require this information between every pair of frames; the more complex multi-frame methods employ techniques, i.a., bundle adjustment to track the scale for varying amounts of time [81]."]} +{"5696519|206764452": ["Two-frame methods require this information between every pair of frames; the more complex multi-frame methods employ techniques, i.a., bundle adjustment to track the scale for varying amounts of time [81]."]} +{"5696519|1029120": ["Two-frame methods require this information between every pair of frames; the more complex multi-frame methods employ techniques, i.a., bundle adjustment to track the scale for varying amounts of time [81]."]} +{"23116076|15093118": ["on vision-based on-road vehicle detection can be found in [1]."]} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"21386240|9594629": ["As can be seen on Table III, the least relevant information set for our detection and classification architecture corresponds to intensity values acquired by the LiDAR, as it might be expected due to many factors affecting reflectance measurements [22]."]} +{"114862052|15093118": ["For more information on conventional hand-crafted feature/cue based approaches, interested readers may refer to the following survey papers: [68,69] for lane line marking detection, [70] for road surface detection, [71,72] for vehicle detection and [73] for pedestrian detection."]} +{"5325247|15093118": ["It is also recommend to read other comprehensive reviews [12] and [13] for driver safety systems.", "This paper is different from [13] due to addition of survey on sensors (active and passive), their comparison and literature for motorcycle detection techniques.", "The latter [13], is an up-to-date and thorough survey of vision-based vehicle detection, tracking and behavior analysis.", ", hardware and software solution for CAS while [13] addresses the driver behavior analysis and techniques for vehicle detection with minor details"]} +{"31409046|15093118": []} +{"115843016|6198785": []} +{"115843016|15093118": []} diff --git a/graph_2399855.jsonl b/edge/graph_11578342.jsonl similarity index 100% rename from graph_2399855.jsonl rename to edge/graph_11578342.jsonl diff --git a/graph_240618.jsonl b/edge/graph_11583064.jsonl similarity index 100% rename from graph_240618.jsonl rename to edge/graph_11583064.jsonl diff --git a/graph_240747.jsonl b/edge/graph_115844465.jsonl similarity index 100% rename from graph_240747.jsonl rename to edge/graph_115844465.jsonl diff --git a/graph_2410132.jsonl b/edge/graph_11585698.jsonl similarity index 100% rename from graph_2410132.jsonl rename to edge/graph_11585698.jsonl diff --git a/edge/graph_115876964.jsonl b/edge/graph_115876964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f156a1b7f0b84b322335f4819a29c6daca90f6d6 --- /dev/null +++ b/edge/graph_115876964.jsonl @@ -0,0 +1,10 @@ +{"106700603|35426346": ["Multi-agent systems approach is being applied in several domains, namely electronic commerce, manufacturing and logistics (see e.g., Leit\u00e3o (2009) for a deeper analysis), and constitutes a suitable technology to implement the intelligent product paradigm."]} +{"106700603|2762484": ["This group division is also aligned with the levels of intelligence proposed by Meyer et al. (2009).", "The third dimension is related to the kind of aggregation of the product intelligence, ranging from intelligence only about the product itself or also aware of the components that it is made of (Meyer et al., 2009).", "A possible definition is provided by Meyer et al. (2009) that defines intelligent product as a \u201cphysical order or product instance that is linked to information and rules governing the way it is intended to be made, stored and transported that enables the product to support or influence these\u2026", "The concept of intelligent products is being studied by the research community in intelligent manufacturing field (a state of the art in the field can be found in (Meyer et al., 2009; McFarlane et al., 2013)).", "According to the framework established by Meyer et al. (2009), the positioning of the GRACE PA agent as intelligent product is illustrated in Fig.", "Meyer et al. (2009) introduced a three dimensional framework to analyse the intelligence product concept, based on the levels of intelligence, location of the intelligence and aggregation level of intelligence."]} +{"116469816|18540390": ["Knowledge management is best de \ufb01 ned by its life cycle that involves the following generic activities: knowledge creation, knowledge capture, knowledge organisation (based on knowledge representation) and knowledge dissemination and sharing (Satyadas, Harigopal, and Cassaigne 2001)."]} +{"30615391|10500613": ["Indeed, the mapping of knowledge is at the present semi-automatic (Kalfoglou & Schorlemmer, 2003; Rahm & Bernstein, 2001)."]} +{"5892588|2762484": []} +{"297887|15527933": []} +{"1572880|73685973": ["As a result, companies are not willing to spend the amount of resources required for employing tools such as life cycle assessment, environmental impact assessment, life cycle costing, process energy analysis, social life cycle assessment, and cost-benefit analysis [18\u201321]."]} +{"946174|10500613": ["The second class (SDI) also interests many scientists but it involves many theories and postulates that are, at least currently, difficult to prove (Rahm and Bernstein, 2001)."]} +{"8283771|35426346": []} +{"8283771|2762484": ["Product Intelligence [Aggregation Levels] (Meyer et al., 2009)", "There are two main ways to implement an intelligent product: putting its intelligence at the object or through the network (Meyer et al., 2009).", "Technological enablers The issue of enabling technologies is perhaps the most studied one in the literature of intelligent products and there are many remarkable review papers available (Fr\u00e4mling et al., 2007; Meyer et al., 2009; Yang et al., 2009; Kiritsis, 2011), also from the literature of smart objects (L\u00f3pez et al.", ", 2003b) (Meyer et al., 2009) (Brintrup et al.", "\u2022 On board/off board intelligence: A key deployment decision is to what extent information and also potentially decision-making capabilities are directly embedded on the physically order or product (Meyer et al., 2009).", "Levels of product intelligence Further, product intelligence has also been examined by a number of authors (Meyer et al., 2009; Brintrup et al., 2011) in terms of defined levels associated with that mode.", "several authors (Meyer et al., 2009; Jedermann & Lang, 2008; Scholz-Reiter et al., 2008) further differentiate the Level 2 between problem identification and decision analysis."]} diff --git a/edge/graph_11591301.jsonl b/edge/graph_11591301.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..796c0d6cde15c15ecffc3214b17716223d5692c3 --- /dev/null +++ b/edge/graph_11591301.jsonl @@ -0,0 +1 @@ +{"1211005|38476": []} diff --git a/edge/graph_116024458.jsonl b/edge/graph_116024458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2cab72d1cb2fae4297412c3f6cd142b099c6279a --- /dev/null +++ b/edge/graph_116024458.jsonl @@ -0,0 +1 @@ +{"4869535|16323798": ["In further detail, [10] identifies two main approaches: Bayesian classifiers and heuristic methods.", "This noise can be measured and categorised into on/off transient noise, steady-state line voltage noise and steady-state continuous noise [10].", "\u2022 Pattern Recognition: This approach detects appliances by means of clustering and mapping state-changes to a feature space [10]."]} diff --git a/edge/graph_116052592.jsonl b/edge/graph_116052592.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f05c60d6ec5d83d0b959b90b97748aa097768e9 --- /dev/null +++ b/edge/graph_116052592.jsonl @@ -0,0 +1,9 @@ +{"34892602|17774971": ["The AC-DC stage on this topology is based on a diodeclamped multilevel rectifier; therefore, input voltage sharing does not require a modular configuration [19], [ 20 ].", "In order to perform topology comparison, a number of available topologies for SST as well as for general AC-AC power conversion have been considered herein [1]-[ 20 ]."]} +{"31493016|12083425": ["and others [2], and renewable energy systems, especially in large penetration of renewable resources, such as solar and wind [3], [4]."]} +{"31493016|17774971": ["Type C topologies may not face such a problem because lots of work has been done for HVAC/HVDC conversion [62]."]} +{"8253653|31086789": []} +{"8253653|17381415": []} +{"21316634|12083425": ["Ther are several SST architectures, having different complexity, d sign characteristics and performances [1-4].", "There are several SST architectures, having different complexity, design characteristics and performances [1-4].", "There are several architectures, having different complexity, design characteristics and performances [1-4]."]} +{"108982149|12083425": []} +{"7048210|17774971": ["enables the modular design of the power stage therefore the system can be easily extended to a higher voltage and power rating [45]."]} +{"42080623|17381415": ["The multiple converter paralleled structure greatly enhances the flexibility and redundancy of such system, while brings in the tradeoff of complexity as well as stability issues [4-6]."]} diff --git a/graph_2415608.jsonl b/edge/graph_1160684.jsonl similarity index 100% rename from graph_2415608.jsonl rename to edge/graph_1160684.jsonl diff --git a/graph_2424020.jsonl b/edge/graph_11607029.jsonl similarity index 100% rename from graph_2424020.jsonl rename to edge/graph_11607029.jsonl diff --git a/graph_244288.jsonl b/edge/graph_11608263.jsonl similarity index 100% rename from graph_244288.jsonl rename to edge/graph_11608263.jsonl diff --git a/graph_2445985.jsonl b/edge/graph_11609497.jsonl similarity index 100% rename from graph_2445985.jsonl rename to edge/graph_11609497.jsonl diff --git a/edge/graph_116186987.jsonl b/edge/graph_116186987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29ff30950e4aafe0e3fb62cac1aaded282df70ae --- /dev/null +++ b/edge/graph_116186987.jsonl @@ -0,0 +1,5 @@ +{"18775119|26257441": []} +{"110669922|6415369": []} +{"110669922|26257441": []} +{"111015012|26257441": []} +{"111538512|26257441": []} diff --git a/edge/graph_116256893.jsonl b/edge/graph_116256893.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81da5b29b8afdd61a7336163a1972d9ab50f29e8 --- /dev/null +++ b/edge/graph_116256893.jsonl @@ -0,0 +1 @@ +{"110756797|27836806": []} diff --git a/edge/graph_11627792.jsonl b/edge/graph_11627792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e167b9997ef009ea8ceb1885a5121f103b603806 --- /dev/null +++ b/edge/graph_11627792.jsonl @@ -0,0 +1,2 @@ +{"206467239|31333609": []} +{"15684306|1163508": ["The most difficult approach is to construct an ontology manually by collecting all concepts and defining relationships between them."]} diff --git a/graph_116294.jsonl b/edge/graph_116294.jsonl similarity index 100% rename from graph_116294.jsonl rename to edge/graph_116294.jsonl diff --git a/edge/graph_11630083.jsonl b/edge/graph_11630083.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52959391a37da39cc107030ea52d8a357f92a512 --- /dev/null +++ b/edge/graph_11630083.jsonl @@ -0,0 +1,4 @@ +{"6722528|10559330": ["For example, we can introduce IntServ [15] or DiffServ [16] to Network Layer for IP-based QoS management."]} +{"16094899|10559330": ["There are two main QoS provisioning models in the Internet that have been developed by IETF: (i) Integrated services (IntServ) [2] and (ii) Differentiated services (DiffServ) [3]."]} +{"58723948|10559330": []} +{"9124911|141053": ["Several good surveys [ 11 ], [12] have been conducted for QoS support in multihop networks."]} diff --git a/edge/graph_11632848.jsonl b/edge/graph_11632848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..093372309b1cd7423fa6d3f8783b3b1d91a36aba --- /dev/null +++ b/edge/graph_11632848.jsonl @@ -0,0 +1,28 @@ +{"8485558|192934": ["There are numerous models of classifiers and methods how to train them [9]."]} +{"28066215|192934": ["In many review articles this trend has been mentioned as one of the most promising in field of the pattern recognition [ 3 ]."]} +{"10433837|9431428": []} +{"7177454|192934": ["In many review articles this trend has been mentioned as one of the most promising in the pattern recognition [14]."]} +{"1914653|8125630": ["3.2 Aggregation \nCapabilities One of the key characteristics of multidimensional databases is the ability to store measurements \n(such as sales numbers) in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "Moreover, this method \ncombines some of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "When con\u00adsidering multiple dimensions, we will \nfollow the multidimensional data model used for data warehousing and OLAP applications in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "\u2026his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "However, there are certain idiosyncrasies \npertaining to our model that make it different from the classical OLAP models used in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "This multidimensional approach is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions.", "Then, as shown in Figure 2, we \ncan compute an overall rating of how John Doe likes action movies as a genre by aggregating his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "\u2026is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions."]} +{"19973243|50458504": []} +{"2276633|192934": ["It is intuitively accepted that classifiers to be combined should be diverse.", "Keywords Combining classifiers, diversity, dependence."]} +{"9738819|1708582": ["The most widely-used model of optimal behavior for an RL agent is the infinite-horizon discounted model [14], which takes the long-run reward of the agent into account, but future rewards are geometrically discounted according to discount factor \u03b3, 0 \u2264 \u03b3 < 1:"]} +{"17560001|1097238": []} +{"92618|192934": []} +{"2976898|1097238": []} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"2633916|5246835": ["A summary of these is given in [28], which reviews analytic techniques for general fraud detection, including credit card fraud."]} +{"18354903|9045232": ["In the context of video surveillance applications, the following problems can seriously affect face recognition performances: - the scene complexity, that can strongly affect face detection performances [ 3 ]; - the quality of video sequence, that can be very low due to the poor performance of the surveillance cameras, and the very large variations of lighting conditions; - the small size of acquired faces; - the very large variations of ..."]} +{"5837607|1097238": ["It is therefore ironic that after so much time and effort, we still have no uniquely agreed definition for \u201cdiversity\u201d [3, 4]."]} +{"1632078|192934": ["In particular this holds if the feature spaces are different, but also combinations of classifiers trained in the same feature space by the same training set may show improved results [5,12]."]} +{"37959237|5246835": []} +{"37959237|6923178": []} +{"1767838|18782652": []} +{"10015777|1097238": []} +{"36077370|192934": []} +{"12947678|192934": ["Therefore, methods that can exploit the strengths of individual classifiers are currently the focus of intense research (Jain et al., 2000)."]} +{"8908785|1097238": ["Static selection schemes select an EoC for all test patterns, and dynamic selection schemes select different classifiers for different test patterns.", "Keywords: Oracle; Combining classifiers; Classifier selection; Ensemble selection; Pattern recognition; Majority voting; Ensemble of learning machines"]} +{"17471133|5246835": ["\u2026challenges in detecting telecommunication fraud are: (1) to deal with the high volume of call traffic in an efficient manner; (2) to be effective at identifying small percentage calls which are fraudulent; and (3) to be done at a reasonably low cost (Kou et al., 2004; Xing and Girolami, 2007)."]} +{"26557460|192934": ["In many review articles this trend has been mentioned as one of the most promising in the field of the pattern recognition [ 12 ]."]} +{"27760212|192934": ["The main achievement devoted to MCSs is that they make possible to avoid selection of the worst classifier [1], to obtain the most sensible solution in problems where for some reasons different training data sets exist [2], to help solving instability issue of some classification algorithms as neural networks with random initial weights [ 2 ] as well as to use different domains of competence [3].", "The main achievement devoted to MCSs is that they make possible to avoid selection of the worst classifier [1], to obtain the most sensible solution in problems where for some reasons different training data sets exist [ 2 ], to help solving instability issue of some classification algorithms as neural networks with random initial weights [2] as well as to use different domains of competence [3]."]} +{"33327855|192934": ["In many review articles, this trend has been mentioned as one of the most promising one in the pattern recognition [1]."]} +{"29266977|9431428": ["In particular, it is now popular to use machine learning techniques to train classifiers to decode brain states or stimuli from fMRI data [8].", "Since our data are normalized to PSC, the t-test tests the hypothesis that the mean is different from 0 [8].", "The classifiers that have most often been employed in previous works are Gaussian Naive Bayes (GNB), k-nearest neighbor (k-NN), Fisher linear discriminant (FLD) and support vector machines (SVM) [15,13,12,8]."]} diff --git a/graph_1163508.jsonl b/edge/graph_1163508.jsonl similarity index 100% rename from graph_1163508.jsonl rename to edge/graph_1163508.jsonl diff --git a/graph_2446461.jsonl b/edge/graph_116467247.jsonl similarity index 100% rename from graph_2446461.jsonl rename to edge/graph_116467247.jsonl diff --git a/edge/graph_11649076.jsonl b/edge/graph_11649076.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..694fb896b88e3b601bad04b66e8d6ebf8d26e3cc --- /dev/null +++ b/edge/graph_11649076.jsonl @@ -0,0 +1,18 @@ +{"45601295|3330313": ["see [1] [2]) and reference therein)."]} +{"15531873|1580493": ["Networks of this type have been generating substantial research interest recently, with extensive studies dedicated to their design and performance evaluation [3]\u2013[9]."]} +{"45028398|1507400": []} +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"10582187|2443013": ["In cellular networks, a constant problem is the management of network resources [5]."]} +{"207016868|191396": []} +{"19084734|34643772": []} +{"19008847|7851743": ["[9] [10].", "The reader is referred to [9] for further details on operation timescales of SON.", "While these projections promise that capacity targets of 5G are theoretically achievable, it is alarming to note that the complexity of operation, OPEX, CAPEX, and shrinking profit margins are already major challenges for operators of state-of-the-art cellular networks [9].", "A detailed review of the state-of-the-art SON functions for legacy cellular networks can be found in [9]."]} +{"3309638|4909423": []} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"206485523|10150488": ["Please refer to [276] and [277] for more details on this topic."]} +{"206485523|16403716": ["Multimedia indexing and retrieval concerns the description, storage, and organization of multimedia information to help people find multimedia resources conveniently and quickly [218]."]} +{"7389270|207372751": ["Study has shown that the gather characteristics of social networking for accurate relationship forecasting methods have an important influence [76]."]} +{"3147582|63927538": ["The 4 A's serve to highlight these measures [20].", "1 Architecture layers of big data analytics [20]"]} diff --git a/graph_2448554.jsonl b/edge/graph_11650495.jsonl similarity index 100% rename from graph_2448554.jsonl rename to edge/graph_11650495.jsonl diff --git a/graph_2457428.jsonl b/edge/graph_116542.jsonl similarity index 100% rename from graph_2457428.jsonl rename to edge/graph_116542.jsonl diff --git a/graph_2457664.jsonl b/edge/graph_1165497.jsonl similarity index 100% rename from graph_2457664.jsonl rename to edge/graph_1165497.jsonl diff --git a/edge/graph_11659767.jsonl b/edge/graph_11659767.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a66566f7f526f14310e51117b757c6444e1dd739 --- /dev/null +++ b/edge/graph_11659767.jsonl @@ -0,0 +1,17 @@ +{"12977363|3540699": ["Many of the first 3D video systems are likely to use the Multiview Video Coding (MVC) extension [1] of the Advanced Video Coding (H.264/AVC) standard [2] as the compression format."]} +{"15585951|396631": ["From Table I, compared with MVC, the mean bit-rate savings and PSNR gain of TSGP are 5.3% and 0.19 dB, respectively.", "From the experimental results, both of the proposed geometry partitioning approaches can improve the R-D performance achieved by MVC without geometry partitioning and by the simplified wedge-based geometry partitioning approach [6], especially for high bit-rate coding.", "The simulation software is based on the JMVC 6.0 reference software for the MVC extensions of H.264/MPEG-4 [10].", "The MVV and depth data are usually encoded independently using multi-view video coding (MVC) [9].", "Compared with MVC without geometry partitioning, the curves labeled by \u201cFS\u201d, \u201cTSGP\u201d and \u201cTDSGP\u201d represent the PSNR improvements achieved by the FS, TSGP and TDSGP approaches, respectively.", "TDSGP and TSGP can achieve almost\nthree-quarters and one third of the PSNR gain between the FS approach and the baseline MVC without geometry partitioning, respectively.", "Incorporating geometry partition prediction into MVC can provide about 8% bit-rate savings [3]."]} +{"15184298|40596005": ["D) space, and is widely used in computer vision and computer graphics fields to represent 3-"]} +{"23314759|64404": ["Recently, a Joint Collaborative Team for 3DV (JCT-3 V), which was established by Moving Pictures Experts Group (MPEG) of International Organization for Standardization (ISO) and Video Coding Experts Group (VCEG) of International Telecommunication Union (ITU), developed a new MVC encoder based on the state of the art High Efficiency Video Coding (HEVC) Standard [4] in order to further improve the coding efficiency."]} +{"19842722|396631": []} +{"19842722|3540699": ["264/MPEG-4 AVC video coding standard [1], a tree-structured variable block-size (TVBS) partitioning is employed for motion estimation (ME) and motion-"]} +{"22613676|396631": ["Similar to the motion vector (MV) in MCP, the disparity used in DCP is also obtained by the block matching algorithm [19].", "At the encoder, MVV and depth are independently encoded using MVC [19]."]} +{"18279489|396631": []} +{"18279489|3540699": ["MVC is based on the single-view video compression standard H.264/AVC [14], [ 48 ]."]} +{"15154116|17516538": []} +{"8570551|3540699": ["264/MPEG-4 AVC video coding standard [1], cannot precisely represent the arbitrary boundaries of true discontinuous motion vector fields."]} +{"396631|14889616": ["D video, while the video\n632 Proceedings of the IEEE | Vol. 99, No. 4, April 2011\ndata associated with the additional views are encapsulated in an extension NAL unit type that is used for both scalable video coding (SVC) [45] and multiview video.", "The best approach for this may involve some\ncombination of MVC with another set of recent extensions of H.264/MPEG-4 AVCVnamely, the SVC extension [45]Vperhaps along with additional new technology.", "In February 2002, hewas appointed as the Editor of the H.264/MPEG-4 AVC video coding standard and its extensions (FRExt and SVC).", "A flag is specified to distinguish whether the NAL unit is associated with an SVC bitstream or an MVC bitstream.", "264/MPEG-4 AVCVnamely, the SVC extension [45]Vperhaps along with additional new technology.", "data associated with the additional views are encapsulated in an extension NAL unit type that is used for both scalable video coding (SVC) [45] and multiview video."]} +{"396631|3540699": ["For more detailed information about H.264/MPEG-4 AVC, thereaderisreferredtothestandard itself [1] and the various overview papers that have discussed it (e.g., [ 41 ]\u2013[43]).", "Although its basic design is very similar to that of prior video coding standards such as H.261, MPEG-1, H.262/MPEG-2, H.263, or MPEG-4 Visual, H.264/MPEG-4 AVC includes new features that enable it to achieve a significant improvement in compression efficiency relative to any prior video coding standard [ 41 ]\u2013[43]."]} +{"21597134|15090212": ["3-DV is the visual content of the well-known 3-D television (3-DTV) [1] and free"]} +{"21597134|1020148": ["There are a lot of scene representation technologies as summarized in [3]."]} +{"17605400|3540699": []} +{"2725865|3540699": ["264 standard [1], a macroblock (MB) in P-picture may have up to 16 different motion vectors, while an MB in B-picture may even have up to"]} diff --git a/edge/graph_116691391.jsonl b/edge/graph_116691391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..558a07debc669b714ee9159500468fbbcc6a648b --- /dev/null +++ b/edge/graph_116691391.jsonl @@ -0,0 +1,14 @@ +{"26821262|469744": []} +{"14233114|469744": []} +{"110090164|469744": ["The most significant factor that hinders the effective development and use of AR systems is the requirement of accurate, long-range sensors and trackers [27]."]} +{"20612325|469744": []} +{"206986719|469744": ["Azuma [3] provides a commonly accepted definition of AR as a technology which (1) combines real and virtual imagery, (2) is interactive in real time, and (3) registers the virtual imagery with the real world.", "For OST HMDs, one of the main challenges is the generation of correct occlusion effects between virtual and real objects [3].", "From our own research experience and by studying the existing technology surveys [3][4], it is clear that to provide an effective AR experience there are a number of factors that must be developed, including: (a) Graphics rendering hardware and software that can create the virtual content for overlaying the real world (b) Tracking techniques so that the changes in the viewer\u2019s position can be properly reflected in the rendered graphics (1)Email: zhou0099@ntu.", "[3] and the more recent 2001 Azuma et al."]} +{"40826055|206986719": []} +{"40826055|469744": ["ugmented Reality (AR) is a technology that allows computer-generated virtual imagery information to be overlaid onto a live direct or indirect real-world environment in real time (Azuma, 1997; Zhou, Duh, & Billing-hurst, 2008)."]} +{"6409661|469744": ["The term Augmented Reality (AR) is used to describe systems that blend computer generated virtual objects or environments with real environments [1, 2]."]} +{"62626678|469744": ["Irrespective of the technology applied, such asmost of virtual environments, users are not required to move in the real world [41].", "Specifically, AR can superimpose 3D virtual models on real-time videos [41].", "All the AR devices and system need to be stable and capable of surviving in the environment [41]."]} +{"109719837|33211520": []} +{"109719837|206986719": []} +{"109719837|469744": []} +{"17024419|206986719": ["7a) that show 3D objects, or personal digital assistants/PDAs [161] (Fig."]} +{"17024419|469744": ["Compared to virtual environments, AR tracking devices must have higher accuracy, a wider input variety and band-width, and longer ranges [17].", "Following [17, 19], an AR system: \uf0b7 combines real and virtual objects in a real environment; \uf0b7 registers (aligns) real and virtual objects with each other; and \uf0b7 runs interactively, in three dimensions, and in real time.", "In the meantime, several surveys appeared that give an overview on AR advances, describe its problems, classify and summarise developments [17, 19, 28]."]} diff --git a/graph_2457805.jsonl b/edge/graph_116725019.jsonl similarity index 100% rename from graph_2457805.jsonl rename to edge/graph_116725019.jsonl diff --git a/edge/graph_11675147.jsonl b/edge/graph_11675147.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2167c5bbac5a425c801bad995589b693d7ac73c0 --- /dev/null +++ b/edge/graph_11675147.jsonl @@ -0,0 +1,2 @@ +{"9575750|1805048": []} +{"8604051|1805048": []} diff --git a/edge/graph_116784395.jsonl b/edge/graph_116784395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f641bd6713c0367b836c261fb4474d05486bb8d --- /dev/null +++ b/edge/graph_116784395.jsonl @@ -0,0 +1,5 @@ +{"37929275|9504064": []} +{"156860777|9948664": []} +{"156860777|54878689": []} +{"28803536|13069188": []} +{"2611723|18747476": ["Rosemann et al. (2008) and Sch\u00f6nenberg et al. (2008) have recently argued that flexibility is an important requirement in business process design."]} diff --git a/graph_2461269.jsonl b/edge/graph_11679656.jsonl similarity index 100% rename from graph_2461269.jsonl rename to edge/graph_11679656.jsonl diff --git a/edge/graph_11683862.jsonl b/edge/graph_11683862.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..684c8766b6dff0b6cd4a2c7e611155896a33efa3 --- /dev/null +++ b/edge/graph_11683862.jsonl @@ -0,0 +1,9 @@ +{"6258204|13558235": ["The superiority of the proposed method in comparison to JPEG, JPEG2000, SPIHT [6], and several of the latest DCT- and DWT-based methods on a set of test images is shown in Section VI."]} +{"3287381|14545307": []} +{"10622311|9307657": ["The use of vector quantization to encode image subbands is quite common [13] and has its rationale in the well-known principle of information theory which states that it is always possible to improve the encoding performance by quantizing vectors (blocks of samples) instead of scalars.", "Although no claim of optimality can be made for the WT, it is no doubt a powerful tool for signal processing in general and image coding in particular [12], [13].", "These properties (among the others) motivate an intense research on wavelet transform (WT) in the image coding field [13], also with reference to multispectral images (e."]} +{"122015201|13558235": []} +{"12908643|13558235": []} +{"6936905|9307657": ["The use of subband decomposition in data compression and coding has a long history [ 4 ]."]} +{"6936905|14545307": ["Codebook design is an essential process in lossy image compression techniques based on vector quantization [8], [9], [ 21 ]."]} +{"996834|13558235": []} +{"3008599|14545307": []} diff --git a/edge/graph_116864981.jsonl b/edge/graph_116864981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89955335a4fea047d5cdacae75abcf8a13448dd9 --- /dev/null +++ b/edge/graph_116864981.jsonl @@ -0,0 +1,3 @@ +{"85524798|44964640": []} +{"5429882|44461432": ["Recently, the emerging technologies (e.g., Internet of Things (IoT) [1\u20133], wireless sensor networks [4, 5], big data [6], cloud computing [7\u20139], embedded system [10], and mobile Internet [11]) are being introduced into the manufacturing environment, which ushers in a fourth industrial revolution."]} +{"5429882|37052879": ["The IWN is superior to wired network in a manufacturing environment; but the existing IWNstandards such asWIA-PA [29] andWirelessHART [30] cannot provide enough bandwidth for heavy communication and high-volume data transfer."]} diff --git a/edge/graph_11701828.jsonl b/edge/graph_11701828.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46a55d5f1e875cce9f17decdef5fdf91b7219a89 --- /dev/null +++ b/edge/graph_11701828.jsonl @@ -0,0 +1,4 @@ +{"21403936|11407374": ["MoXs have a large range of applications and have been employed in the detection of a wide variety of gases [14-16]."]} +{"21403936|1503157": ["Therefore, WSNs has been used for environmental monitoring and monitoring of fugitive CH4 emissions [10], coal fields or biomass degradation (landfills) [11], and NH3 and N2O gases released from fertilizer use [12, 13]."]} +{"110555883|926226": []} +{"31401451|240747": ["Future work will be the implementation of algorithms for automatic control and routing toward the gas source, and methods which extend remarkably the autonomy, such as energy harvesting techniques [17] or alternative energy storage devices [18]."]} diff --git a/graph_2463419.jsonl b/edge/graph_11704555.jsonl similarity index 100% rename from graph_2463419.jsonl rename to edge/graph_11704555.jsonl diff --git a/edge/graph_11714872.jsonl b/edge/graph_11714872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e07c595e40f4c99476590deee68ad9599e8a87d --- /dev/null +++ b/edge/graph_11714872.jsonl @@ -0,0 +1,10 @@ +{"16413717|16125167": ["In the software engineering research literature, these two activities\u2014known as feature location [10] and program comprehension [9]\u2014are the subject of entire sub\ufb01elds of research."]} +{"16413717|14171067": ["An alternative strategy for comparing subtrees is to globally summarize changes using tree matching algorithms [18] or tree edit distance algorithms [3]."]} +{"2014800|16125167": ["A good example of an Ajax application is Gmail, which uses Ajax technologies to update only a part of the page when you open an email conversation, and to suggest email addresses of recent correspondents as you type."]} +{"2025859|14920988": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|8250043": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|16125167": ["To conduct a systematic mapping, a classification scheme (also called systematic map or attribute framework [18]) needs to be derived by a careful analysis of the primary studies [47]."]} +{"6880727|14920988": []} +{"6880727|8250043": []} +{"4562450|16125167": ["Unfortunately, despite its importance and challenges, there is currently not much research dedicated to supporting program comprehension for web applications [10]."]} +{"17200064|16125167": ["The study of a program\u2019s execution, known as dynamic program analysis, has become a common technique in this respect [3]."]} diff --git a/edge/graph_11717357.jsonl b/edge/graph_11717357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd42e618a14d4e7528393662a68eb362e14dfe39 --- /dev/null +++ b/edge/graph_11717357.jsonl @@ -0,0 +1 @@ +{"41589109|11717357": []} diff --git a/edge/graph_11718709.jsonl b/edge/graph_11718709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e6f537a5861be8f12ec5fbb9faf5f0afd0b83b6 --- /dev/null +++ b/edge/graph_11718709.jsonl @@ -0,0 +1 @@ +{"2272567|8530790": []} diff --git a/edge/graph_11720829.jsonl b/edge/graph_11720829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9550609d170442b950390d8a17c4114a7e294fa --- /dev/null +++ b/edge/graph_11720829.jsonl @@ -0,0 +1,3 @@ +{"1241484|41035405": []} +{"8553815|3054454": []} +{"5746141|3054454": []} diff --git a/edge/graph_11726599.jsonl b/edge/graph_11726599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90855ad7bec5d12ef70605efe9fbb5d3adbb96ac --- /dev/null +++ b/edge/graph_11726599.jsonl @@ -0,0 +1,2 @@ +{"61326597|14379823": []} +{"408429|47147736": ["For the controllable data services we adopt the rate-based approach recommended by the ATM Forum (see, e.g., [ 6 ]).", "We adopt the ATM Forum recommendation for traffic control of the CTP (ABR) service class (see, e.g., [ 6 ]).", "According to the ATM-Forum recommendations (see, e.g., [ 6 ]) one can recognize five service categories at the ATM layer: constant bit rate (CBR), real-time variable bit rate (VBR-RT), non-real-time variable bit rate (VBR-NRT), available bit rate (ABR), and unspecified bit rate (UBR).", "Congestion notification (see, e.g., [ 6 ]) and window mechanisms (see, e.g., [7], [8]) are examples of the second type."]} diff --git a/graph_2465991.jsonl b/edge/graph_11732290.jsonl similarity index 100% rename from graph_2465991.jsonl rename to edge/graph_11732290.jsonl diff --git a/edge/graph_11735843.jsonl b/edge/graph_11735843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c7f801c1759e3f6a23d7f93df59f012988b6df3 --- /dev/null +++ b/edge/graph_11735843.jsonl @@ -0,0 +1,25 @@ +{"52807410|14697846": ["An extensive survey on P2P networks can be found in [6]."]} +{"15289072|17336376": ["Readers are referred to [81] for a detailed survey on virtualization of wireless sensor networks."]} +{"206650877|205286988": []} +{"1451944|3189715": []} +{"16142834|10559330": []} +{"27525950|10859599": []} +{"204899989|9923206": ["Various works have been proposed for protocol veri\ufb01cation including rigorous speci\ufb01cation and conformance testing techniques for network protocols [212], rigorous treatment of the TCP protocol [165] [196], veri\ufb01cation of ad-hoc routing protocols for wireless sensor networks: [213]."]} +{"204899989|8974063": ["For furt her details, interested readers are referred to the survey pape rs [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occu pancy are reviewed in detail."]} +{"204899989|6507312": []} +{"204899989|12401050": ["It has been posited that for practical purposes of analyzing DSA/ CRNs, a simple two-state semi-Markov ON-OFF model is adequate for modeling spectrum usage [155] (table IV may be referred to see the popularity of this model).", "For further details, interested readers are referred to the survey papers [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occupancy are reviewed in detail."]} +{"204899989|6400766": ["In addition, RL can work with very large number of states when used along with function approximation [67].", "In RL, instead of explicit specification of the tr ansition probabilities, the transition probabilities can be en visioned to be accessed through a simulator that typically is restart ed from a uniformly random initial state many times [67]."]} +{"204899989|17062686": ["Indeed, there has been a lot of work in applying various economics-based approaches to wireless networkin g [40].", "Cooperative spectrum selection : [43]; Game Theory Resource allocation : see references in [40] [41]; Routing games[44] [45] [46]; Spectrum Sharing : [47] [48]; Mitigating selfish routing[49] [50] [51]; Medium Access Control (MAC) : [52]; Modeling routing: see references in [29]."]} +{"204899989|8589228": ["The key insight is to use hypothesis testing with a simulation based approach to deduce from some sample executions if the system under test satisfies the specification [132]."]} +{"204899989|15929566": ["We note here that reinforcement learning is also known by alternate monikers such as neuro-dynamic programming (NDP) [64] and adaptive (or approximate) dynamic programming (ADP) [65] [25].", "Therefore, classical DP techniques are rather ineffective at solving large-scale complex MDPs [25].", "We also discussed in section III-A that classical DP techniques are ineffective at solving large-s cale complex MDPs [25] [66]."]} +{"204899989|17109970": []} +{"204899989|12452682": []} +{"204899989|2840997": ["With the preclusion of approximation techniques, this method then becomes unwieldy for large-scale problems complex problems."]} +{"204899989|1708582": []} +{"15377165|10559330": ["The potential diversity and flexibility requirements of user level services and applications far exceed that of typical AIN services demanding all the more an open environment for design, installation, and operation.", "\u2022 A content provider by making available content for public\naccess and advertising its availability through a directory service.", "In the Telephone Network, historical assumptions about CPE capabilities have led to a two tiered architecture consisting of a user domain and a network domain."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"2468884|6611633": ["Over the course of the 1980s, a large number of researchers attempted to realize process migration with varying degrees of success (Smith [7] provides a survey)."]} diff --git a/graph_2471981.jsonl b/edge/graph_11739876.jsonl similarity index 100% rename from graph_2471981.jsonl rename to edge/graph_11739876.jsonl diff --git a/graph_2477727.jsonl b/edge/graph_11741494.jsonl similarity index 100% rename from graph_2477727.jsonl rename to edge/graph_11741494.jsonl diff --git a/edge/graph_11741610.jsonl b/edge/graph_11741610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba49c6202acdfed7cc0d64ba8b326bc176629760 --- /dev/null +++ b/edge/graph_11741610.jsonl @@ -0,0 +1,9 @@ +{"2448554|7193476": []} +{"17758034|7193476": []} +{"9047694|7193476": []} +{"13889514|7193476": []} +{"15112734|10500613": ["For example, publication title [12] contains many common words and its title pattern (\u201csurvey * approaches * * schema matching\u201d) therefore contains four terms, whereas one single word is already sufficient for [14] (\u201ciFuice\u201d) due to the uncommon acronym iFuice(1)."]} +{"15112734|386036": ["Object Matching aims at identifying object instances in (different) data sources that refer to the same real world entity (see [5] for a recent survey)."]} +{"16721362|2448554": ["Hoyer and Fischer [7] distinguish between Consumer and Enterprise Mashups, where both are used to combine data elements from different sources and aggregate them.", "[7]\n\u2022 Consequently, a Mashup platform is a Web based tool that allows the creation of Mashups by piping resources into Gadgets and wiring Gadgets together.", "[7] V. Hoyer and M. Fischer."]} +{"17252964|7193476": ["In this paper we present Mashlight: a lightweight framework for creating and executing mashups that combines these two worlds."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} diff --git a/graph_1174262.jsonl b/edge/graph_1174262.jsonl similarity index 100% rename from graph_1174262.jsonl rename to edge/graph_1174262.jsonl diff --git a/graph_2479237.jsonl b/edge/graph_11744067.jsonl similarity index 100% rename from graph_2479237.jsonl rename to edge/graph_11744067.jsonl diff --git a/edge/graph_11746788.jsonl b/edge/graph_11746788.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c20ca5b4961a77a8f7ad9a5079cdd156ef3b9396 --- /dev/null +++ b/edge/graph_11746788.jsonl @@ -0,0 +1,4 @@ +{"31237456|16534280": ["A comprehensive overview of restricted domain question answering with a list of applications is available in [88].", "They often target a category of users who know and use the domain-specific terminology in their query formulation, as, for example, in the medical domain [156,122,88]."]} +{"6308361|7983519": ["A good survey of work in this area is provided in Krahmer and van Deemter (2012).", "Previous work on REG has made significant progress toward understanding how people generate expressions to refer to objects (a recent survey of techniques is provided in Krahmer and van Deemter (2012))."]} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"8745888|7983519": ["Referring expression generation is a classic NLP problem (see e.g., [54, 31]).", "Specifically, our model is based upon recently developed methods that combine convolutional neural networks (CNNs) with recurrent neural networks (RNNs)."]} diff --git a/edge/graph_11752018.jsonl b/edge/graph_11752018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6f8a2968cf0555b19899edf67d97f993dda1bca --- /dev/null +++ b/edge/graph_11752018.jsonl @@ -0,0 +1,16 @@ +{"15748761|469744": ["AR is the process of a user viewing the physical world and virtual information simultaneously, where the virtual information is overlaid and aligned with the physical world view (Azuma 1997; Starner Schiele, & Pentland 1998)."]} +{"55880933|469744": []} +{"59617117|17024419": []} +{"62197294|469744": []} +{"1261533|469744": ["It provides personalized Augmented Reality tours [1] and reconstructions of ruined cultural"]} +{"2927858|45775424": ["[9] conducted a survey on publications about AR between 1992 and 2007.", "Our approach has been little utilised in the field of AR [9] and is highly topical: the recent and yet widely publicly discussed and adopted AR applications have not been evaluated with scientific meticulousness and by a large number of users."]} +{"9216848|469744": ["This makes exact calibration of the HMD, i.e., the precise determination of the projective transformation between 3-D-coordinates and the HMD\u2019s display coordinates, and sophisticated real time tracking of the HMD necessary [1].", "Besides using a display system that allows for merging real and virtual views, a second requirement is the accurate tracking of the position of the viewer relative to the viewed scene [1]."]} +{"28739979|469744": []} +{"59621839|45775424": []} +{"59621839|469744": []} +{"17024419|206986719": ["7a) that show 3D objects, or personal digital assistants/PDAs [161] (Fig."]} +{"17024419|469744": ["Compared to virtual environments, AR tracking devices must have higher accuracy, a wider input variety and band-width, and longer ranges [17].", "Following [17, 19], an AR system: \uf0b7 combines real and virtual objects in a real environment; \uf0b7 registers (aligns) real and virtual objects with each other; and \uf0b7 runs interactively, in three dimensions, and in real time.", "In the meantime, several surveys appeared that give an overview on AR advances, describe its problems, classify and summarise developments [17, 19, 28]."]} +{"63352914|45775424": []} +{"63352914|206986719": []} +{"63352914|469744": ["In one of the most commonly accepted definitions, researcher Ron Azuma says that Augmented Reality is technology that has three key requirements [Azuma, 1997]:", "As discussed in section 2, for a system to meet Azuma\u2019s definition of Augmented Reality system [Azuma, 1997], it must fulfill three main requirements:"]} +{"63352914|17024419": ["[2001], Van Krevelen and Poelman [2010] and Carmigniani et al. [2011] and the research survey of Zhou et al.", "[2001], Van Krevelen and Poelman [2010] and Carmigniani et al. [2011] and the research survey of Zhou et al. [2008]. In the next section we provide a more formal definition of AR and related taxonomies, then a history of the AR development over the last 50 years."]} diff --git a/graph_2481856.jsonl b/edge/graph_117537725.jsonl similarity index 100% rename from graph_2481856.jsonl rename to edge/graph_117537725.jsonl diff --git a/graph_1176034.jsonl b/edge/graph_1176034.jsonl similarity index 100% rename from graph_1176034.jsonl rename to edge/graph_1176034.jsonl diff --git a/edge/graph_11761017.jsonl b/edge/graph_11761017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60c59bfdc543fc4138f3f102fc3c89f9b779ee10 --- /dev/null +++ b/edge/graph_11761017.jsonl @@ -0,0 +1 @@ +{"15104306|5473785": []} diff --git a/graph_2499424.jsonl b/edge/graph_11761535.jsonl similarity index 100% rename from graph_2499424.jsonl rename to edge/graph_11761535.jsonl diff --git a/edge/graph_11762115.jsonl b/edge/graph_11762115.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39bc7bee4978563a901b00147608eef354b7344d --- /dev/null +++ b/edge/graph_11762115.jsonl @@ -0,0 +1 @@ +{"38150885|6686730": ["\u2026Molecular diffusion at the laminar interface is the only mode of mass transfer between the two streams.9 Considering diffusive dispersion, Wu and Nguyen10 used hydrodynamic focusing to control the width and the position of a liquid stream, and this mode of mass transfer was used for\u2026"]} diff --git a/edge/graph_117680556.jsonl b/edge/graph_117680556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c8b8f2fb77a86958de9f2e2408dc1e394371228 --- /dev/null +++ b/edge/graph_117680556.jsonl @@ -0,0 +1,2 @@ +{"1364861|1230643": ["The integration of all of the above technology accelerates the development of wireless intelligent sensor networks [61]."]} +{"1364861|7278743": ["485 GHz ISM (industrial, scientific, medical) band utilizing low-transmit power radios and the frequency-hopping spread spectrum technique [40]."]} diff --git a/edge/graph_11768278.jsonl b/edge/graph_11768278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df3f09eed3171ec35a555905ab4ef27f90b8c430 --- /dev/null +++ b/edge/graph_11768278.jsonl @@ -0,0 +1,46 @@ +{"207262843|2535224": []} +{"207262843|2623404": []} +{"207262843|2387055": []} +{"207262843|3330461": []} +{"52870530|16514036": []} +{"52870530|8836911": []} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} +{"18242131|2854761": ["This property has been widely investigated in EPONs [7], [8], [17] and WiMAX [18] separately, but few work has been done in the integration.", "Previous research efforts on WiMAX scheduling, resource allocation, and admission control in the downstream direction have been extensively reported [18], and the additional consideration of EPON on top of WiMAX has not brought up more issues due to the broadcast-in-nature transmission in both systems."]} +{"14967850|1580493": ["OFDM-based EONs have several advantages relative to existing WDM networks, including [7,9]", "recent survey of optical OFDM and related technologies, and how they impact network and control algorithm design, we refer the reader to [9].", ", beyond 100 Gbps) optical transmission [9]."]} +{"801245|17336376": []} +{"801245|1230643": []} +{"801245|12060835": []} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"1645630|10837932": ["In this context, network virtualization has increasingly been seen as a solution to Internet ossification (the benefits of network virtualization go beyond Internet ossification to other contexts such as green networking [2])."]} +{"1580493|11720829": ["Depending on the relationship between the signals transmitted from different antennas, MIMO schemes can be used to either increase the overall capacity of the system, or to reduce the probability of outage [59][61]."]} +{"14966192|1580493": ["Therefore, by the adoption of the flexible grid paradigm, the optical spectrum can be sliced in a flexible manner, and optical paths can be established with variable bit rates by bandwidth-variable transceivers [11]."]} +{"10437714|8280144": ["Furthermore, in [92], the authors showed\n9Alpha-stable distributions generalize Gaussian distributions and have heavier tails [10, Sec."]} +{"15289072|17336376": ["Readers are referred to [81] for a detailed survey on virtualization of wireless sensor networks."]} +{"16972183|3936425": [", coordinated multi-point transmission and reception (CoMP), to cope with the increased interference between cells [15]."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"17061671|19454977": []} +{"17061671|141053": []} +{"40232144|1580493": []} +{"341121|2623404": ["Various open interfaces [3] have been defined to communicate between the control plane and data plane (south bound interface), and OpenFlow [4] is a de-facto standard."]} +{"16210411|1110872": ["In High Performance Computing and Communication \n& 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), June 2012.", "\u2026Area Data Transfer Protocols for 100 Gbps Networks and Beyond Ezra Kissel School of \nInformatics and Martin SwanySchool of Informatics and ComputingIndiana UniversityBloomington, IN 47405ezkissel@indiana.edu \nComputingIndiana UniversityBloomington, IN 47405swany@iu.edu Eric PouyoulLawrence\u2026", "In Proceedings of \nthe 2012 ACM/IEEE international Conference For High Performance Computing, Networking, Storage and Analysis,Nov \n2012.", "In Proceedings of the 14th IEEE International Conference \non High Performance Computing and Communications (HPCC-12),2012.", "3.2 ESnet 100G Testbed Our performance analysis uses resources from ESnet s 100G Testbed5, which includes \na 100 Gbps wave connecting the National Energy Research Scienti.c Computing Center6 (NERSC) in Oakland, \nCA to StarLight7 in Chicago, IL.", "In Proceedings \nof the 2012 ACM/IEEE international Conference For High Performance Computing, Networking, Storage and \nAnalysis, SC Companion,Nov2012.", "Ef.cient Wide Area Data Transfer Protocols for 100 Gbps Networks and Beyond Ezra Kissel School of \nInformatics and Martin SwanySchool of Informatics and ComputingIndiana UniversityBloomington, IN 47405ezkissel@indiana.edu \nComputingIndiana UniversityBloomington, IN 47405swany@iu.edu Eric PouyoulLawrence Berkeley NationalLaboratoryBerkeley, \nCA 94720epouyoul@lbl.gov Brian Tierney Lawrence Berkeley National Laboratory Berkeley, CA 94720 bltierney@lbl.gov \n Due to a number of recent technology developments, now is the right time to re-examine the use of TCP \nfor very large data transfers.", "In IEEE/ACM Annual SuperComputing Conference (SC13), Denver CO, USA, 2013."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"7607567|7686677": ["to ensure eco-sustainability and to keep low operative costs [70]."]} +{"7607567|12884178": ["Therefore, with this kind of relaying, the RRM module has to cope with the presence of both multi-hop connections and MBSFN frame structure (an overview on RRM schemes for OFDMA-based wireless networks with relay nodes can be found in [84]); this has impact on the end-to-end packet delays."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"5969377|1580493": ["BVTs [15] are used to tune the bandwidth by adjusting", "[11] presented a spectrum efficient elastic optical network based on OFDM technology [15], [18].", "optical networks [11]\u2013[15] have been shown to be a promising", "Recent studies [15], [59], [60] on modulation based spectrum allocation claim that this type of spectrum allocation scheme increases the spectral utilization by approximately 9%\u201360% compared to fixed-modulation based spectrum allocation in the elastic optical network."]} diff --git a/edge/graph_11769756.jsonl b/edge/graph_11769756.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3abc15986a9051404cb675733e354fe0d37eed62 --- /dev/null +++ b/edge/graph_11769756.jsonl @@ -0,0 +1,2 @@ +{"17915842|10739218": ["Actu ally, there is some equivalence between fuzzy rule-based systems and neural networks [23]."]} +{"3540990|11894197": ["Feature selection methods can be classified into three categories, depending on their integration into the classification method [4, 5, 8].", "[5], this article focuses only on penalization methods.", "the same time being far less computationally intensive than wrapper methods\u2019 [5].", "[5] and the \u2018Introduction\u2019 section for related discussions."]} diff --git a/graph_1177069.jsonl b/edge/graph_1177069.jsonl similarity index 100% rename from graph_1177069.jsonl rename to edge/graph_1177069.jsonl diff --git a/edge/graph_117722163.jsonl b/edge/graph_117722163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f1b14096859832e3f46180a583b49e6530b910a --- /dev/null +++ b/edge/graph_117722163.jsonl @@ -0,0 +1,21 @@ +{"22337449|8323234": []} +{"9122404|2623404": ["Interested readers are referred to [12], [13] and the refere nc s therein."]} +{"9122404|7971188": ["From a networking perspective, CMuHC will inevitably require the formation of a peer-to-peer overlay in order to orchestrate the participation of multiple users in additio n the facilitation of a number of other necessary functions perta ining to the tasks of overlay maintenance and operation [9]."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"206697033|16992768": ["There has been a significant amount of effort in the design of the modern aircraft from a holistic perspective, especially with regard to the human-machine interaction in the airplane [35, 36]."]} +{"3336030|2736673": []} +{"149260|10346685": []} +{"67865865|8323234": ["At epoch k, the received signal at the UE is [13]"]} +{"52120730|1230643": []} +{"14094808|7465328": ["An autonomous wireless connection among vehicles imposes serious security threats such as eavesdropping [75], identity spoofing [14, 74], sybil attack [58], wormhole attack [63], replay attack [96], message content tampering [11], impersonation [6], denial of service attack (DoS) [2] and MitM attack [43]."]} +{"14094808|763939": ["In the very near future, vehicles will interact with several other vehicles to coordinate actions [31] and to provide heterogenous media services [107]."]} +{"206745338|13372227": []} +{"44068413|17325804": ["[19] 2008 Wireless Survey of positioning algorithms and theoretical limits for wireless networks."]} +{"44068413|164835": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "For instance, the use of registration update messages in the IS-95A standard was proposed in [7] for time-based localization, called reverse link."]} +{"44068413|13372227": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "As an example, several survey articles [6]\u2013[10] reviewed the challenges and performance of cellular positioning in April 1998.", "way system (IVHS) applications [5] or to support emergency services based on proprietary location solutions [6], such as Grayson Wireless with a joint TDoA and AoA solution or"]} +{"44068413|206583375": ["On the one hand, fingerprinting techniques are typically implemented in WLAN systems [15], [18], [20], [26], to take advantage of"]} +{"13753006|17325804": ["In UTDOA, LMUs measure the time of arrival (TOA) of bursts ordinarily generated by the MS while in dedicated mode (circular multilateration [29, 34] is not viable in this scenario, as the instant when the MS transmitted its burst cannot be known; there is no synchronization between LMUs and MSs) [35].", "As the LMUs share the same clock reference, it is possible to calculate the TDOA between pairs of LMUs, each one yielding a hyperbolic LOPwhose focuses are located at the LMUs coordinates (which are known).", "OTD24, measured by theMS, and RTD24, measured by the LMU, are then reported back to the SMLC.\nFigure 9(a) shows the geometry of an OTDOA-PE positioning, with one single-cell Node B and three PEs (as a minimum of four reference points is needed to provide three hyperbolic LOPs), all placed at known coordinates.", "There is a TDOA measurement for each pair of reference nodes, yielding a hyperbolic line-of-position (LOP) (a LOP is the loci of all points (coordinates) where theMS can be located; i.e., the LOP is the set of all candidate solutions for the MS positioning problem), with the two reference stations as focuses.", "At the SMLC, a system of at least three hyperbolic LOPs is obtained.", "Each pair of reference BTSs yields a hyperbolic LOP [29].", "As two hyperbolas might intercept at two points, at least three hyperbolic LOPs\u2014and therefore four reference nodes\u2014are required to yield an unambiguous position fix."]} +{"13753006|13372227": ["The Federal Communications Commission (FCC) issued the first regulation concerning the availability and accuracy of the localization of such calls in the USA, as far back as 1996 [1, 2]."]} +{"15053215|1230643": []} diff --git a/edge/graph_117730481.jsonl b/edge/graph_117730481.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd5e5928f47d659b68258a538969d6eda05f1c40 --- /dev/null +++ b/edge/graph_117730481.jsonl @@ -0,0 +1,2 @@ +{"17938746|6746689": ["Suen, et al, investigated more than 100 kinds of thinning algorithms[2]."]} +{"1058786|5803350": ["In our previous work [5], we demonstrated that the configuration of three manually-assembled MEMS-based hot-wire resistors 120 degrees apart around a cylinder enables the sensor to detect airflow velocity and direction with high sensitivity."]} diff --git a/edge/graph_117731981.jsonl b/edge/graph_117731981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2eff6d5281167a130aa10df8b5c8eb5b8008472c --- /dev/null +++ b/edge/graph_117731981.jsonl @@ -0,0 +1,7 @@ +{"63440283|2301292": ["Papers by Bettadapura [2009] and Sandbach et al. [2012] provide overviews of recent work in the automatic recognition of non-verbal behavior."]} +{"6030672|8777381": ["In contrast with these pragmatic phenomena, which may be relatively contextualised or short-lived, personality is usually considered to be a longer term, more stable, aspect of individuals (Scherer, 2003).", "The model has also been useful in identifying observable cues that mediate convergences between judgments of latent attributes and more direct measures of those attributes (Scherer, 2003; Heinrich & Borkenau, 1998)."]} +{"27281190|206988459": ["Apart from this, a comparative study of current research on this domain was done by Crawford et al. [4] and as enormous amount of review data being generated on daily basis the authors have suggested Big Data Analysis techniques for review spam detection."]} +{"3880109|206988459": []} +{"3880109|393948": ["These methods can be divided in two categories: supervised and unsupervised feature learning[1]."]} +{"10712707|206988459": ["The dataset of Ott et al. [14] may not provide an accurate indication of real world performance [39]."]} +{"49189687|6078908": ["Using the covariance matrix and its eigenvalues and eigenvectors, PCA finds the principal components in data which are uncorrelated eigenvectors, each representing some proportion of variance in the data [34]."]} diff --git a/edge/graph_11774866.jsonl b/edge/graph_11774866.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..988df53b2d6af6185bfbf6f7c13a6a05e810ce1c --- /dev/null +++ b/edge/graph_11774866.jsonl @@ -0,0 +1,2 @@ +{"15666078|12068725": ["We would argue that the procedural persona method could potentially be of greater use to search based procedural content generation processes [15] that are either wholly procedural or based on mixed-initiative co-creative processes where a human designer and an AI-driven support tool\u2026"]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} diff --git a/edge/graph_11776999.jsonl b/edge/graph_11776999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..013270c4e4f5db119689884de5b4bf26093ee7ec --- /dev/null +++ b/edge/graph_11776999.jsonl @@ -0,0 +1 @@ +{"10599954|1983971": []} diff --git a/edge/graph_11777996.jsonl b/edge/graph_11777996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6863f5a659dde2bccbd33ef12b97262ede57e3c --- /dev/null +++ b/edge/graph_11777996.jsonl @@ -0,0 +1,2 @@ +{"2201076|16575201": ["(Kageura & Umino 1996) summarized five groups of weighting measure: (i) a word which appears in a document is likely to be an index term; (ii) a word which appears frequently in a document is likely to be an index term; (iii) a word which appears only in a limited number of documents is likely to\u2026"]} +{"550766|11608263": ["Keyphrase extraction can also be considered as a multi-label classification problem (Tsoumakas and Katakis, 2007), in which each keyphrase is regarded as a category label.", "Keyphrase extraction can also be considered as a multi-label classi\ufb01-cation problem (Tsoumakas and Katakis, 2007), in which each keyphrase is regarded as a category label."]} diff --git a/edge/graph_11779430.jsonl b/edge/graph_11779430.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4368fce00fda3ef28717b86e36e1f9d18aeb0837 --- /dev/null +++ b/edge/graph_11779430.jsonl @@ -0,0 +1 @@ +{"34069921|15782139": ["On-line handwriting recognition refers to automatically recognizing handwritten characters/words using real-time information such as pressure and the order of strokes made by a writer usually employing a stylus and pressure sensitive tablet [2].", "In general, the former approach uses a strategy based on the recognition of individual characters or patterns whereas the latter deals with the recognition of the word image as a whole [2]."]} diff --git a/edge/graph_11780810.jsonl b/edge/graph_11780810.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d0cdc1f989f66c47a943e0a2944de4e2ef788c0 --- /dev/null +++ b/edge/graph_11780810.jsonl @@ -0,0 +1,3 @@ +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/edge/graph_11786999.jsonl b/edge/graph_11786999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4a0c9214c09aba08c5dbce6bda7a5d98fdc1c40 --- /dev/null +++ b/edge/graph_11786999.jsonl @@ -0,0 +1,13 @@ +{"11962297|14970359": []} +{"11962297|7788290": []} +{"10242377|8533795": []} +{"6795574|5972227": ["Recently, a survey is presented for a wired-sensor network, focusing on the capability of methods to give a simple estimation for the position of the object [23]."]} +{"6795574|18546648": ["For instance, in shadow detection [48] pixel level evaluation is advised [49]."]} +{"15287463|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} +{"62054337|14970359": []} +{"62054337|7788290": ["Thorough reviews of human-specific trackers can be found in (Aggarwal & Cai, 1999; Gavrila, 1999; Moselund & Granum, 2001)."]} +{"57003930|17516538": []} +{"691081|192934": []} diff --git a/edge/graph_11791723.jsonl b/edge/graph_11791723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04e80549781494674895684588f6a159fc709c0b --- /dev/null +++ b/edge/graph_11791723.jsonl @@ -0,0 +1,23 @@ +{"1043118|5404353": ["Although such requirement may incur in additional energy consumption, the actual impact depends on the adopted MAC technology and wireless radio [19], and the inclusion of optimization information in data packets is a common approach largely adopted by the academic community [9].", "Different routing approaches have been investigated in recent years for wireless sensor networks, addressing issues as energy-efficiency, delay constraints and data packet prioritization [3][8][9]."]} +{"1043118|16120075": ["innovative multimedia sensing functions [1][2]."]} +{"1043118|1236072": ["Additionally, we assume that the transmission paths are already created using some routing protocol [8] and that the available paths are known by router nodes.", "Different routing approaches have been investigated in recent years for wireless sensor networks, addressing issues as energy-efficiency, delay constraints and data packet prioritization [3][8][9]."]} +{"17609097|15947359": ["Besides collecting these scalar data (e.g., temperature) from the environment, a newer trend on the WSN is to deploy sensor node with camera to capture and transmit the image data back to the sink node."]} +{"107324921|15947359": []} +{"107324921|205286988": ["Though, majority of the routing process are classical routing protocols as surveyed in [12]."]} +{"4690684|15947359": ["Numerous applications for VSNs have been conceived such as surveillance of public places or remote areas, environments monitoring for animal habitats or hazardous areas, smarthomes for babies and elderly people, and virtual reality [3]."]} +{"17877557|396631": ["Figures 2(a) and 2(b) show the first frame of the views corresponding to cameras 0 and 6 of the Kendo sequence, respectively."]} +{"5808401|1230643": ["The major objectives behind the research and deployment of Wireless Sensor Networks (WSNs) [1] lie in the following two broad aspects: (i) event detection (sensing) and data communication through node coordination and (ii) conservation of energy to maximize the post-deployment, active lifetime of individual sensor"]} +{"9957336|1230643": []} +{"1773554|3540699": []} +{"3484517|15947359": ["WVSN consists of tiny camera sensor nodes, embedded processor, and wireless transceiver [1]."]} +{"18637174|396631": ["For spatially correlated frames, differential coding could be achieved through inter-frame prediction such as motion estimation or disparity compensation [25] in H."]} +{"18637174|15947359": []} +{"12012646|2685137": []} +{"7147161|15947359": ["These networks now emerge in a large number of applications ranging from surveillance, monitoring and traffic control to advanced health care delivery, automated assistance for the elderly and telepresence [1], [2]."]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"16219347|15947359": ["We refer readers interested in specific VSN topics which are not in the scope of our survey to other relevant surveys in the literature written on various aspects of VSNs (general overview [44], challenging issues [5], multimedia streaming [29], security [16], cross-layer design [51]).", "Availability of low-cost CMOS cameras has created the opportunity to build lowcost Visual Sensor Network (VSN) platforms able to capture, process, and disseminate visual data collectively [44].", "tracking applications, environmental observation systems [14], security and surveillance applications [14], emergency response systems [14], assisted living applications and smart homes [5, 42, 44], water conservatory engineering [57], virtual reality and telepresence systems [5, 44] and smart meeting rooms [44].", "Other surveys (such as [5, 44]) give a more general perspective on VSNs."]} +{"16219347|17516538": ["Well-known visual computing techniques, such as object recognition or object tracking [21], can reduce the amount of raw data to be transmitted."]} +{"16266843|14441987": ["Many different approaches to handle routing in ad hoc networks were proposed in recent years [54\u201356].", "In TORA there is a potential for oscillations to occur, especially when multiple sets of coordinating nodes are concurrently detecting partitions, erasing routes, and searching new paths based on each other [56]."]} +{"17247129|15947359": ["Recently, the advances in low cost CMOS imaging sensors have made wireless multimedia sensor networks (WMSNs) possible [1][5]."]} +{"3243098|3540699": [", context-adaptive variable-length coding or context-based adaptive binary arithmetic coding) [28]."]} +{"14729547|3540699": ["However, the resource constraints of the sensor nodes bring new challenges when applying source coding globally in the entire network.", "As a result, the visual information retrieved from adjacent camera nodes usually exhibits high levels of correlation, which gives rise to considerable data redundancy in the network."]} diff --git a/edge/graph_11792588.jsonl b/edge/graph_11792588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3843ee53d6b4888ac1c2620ca7637f804024b2fd --- /dev/null +++ b/edge/graph_11792588.jsonl @@ -0,0 +1,6 @@ +{"15782139|2762290": []} +{"15782139|6746689": []} +{"29713321|6746689": []} +{"34585287|205131192": ["survey on moment-based pattern recognition systems can be found in [ 3 ]."]} +{"41049994|6746689": []} +{"5073616|6746689": []} diff --git a/edge/graph_11794756.jsonl b/edge/graph_11794756.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00d9214dbd8d8cebcfba51b6fd0e702c6ed53b05 --- /dev/null +++ b/edge/graph_11794756.jsonl @@ -0,0 +1 @@ +{"7554459|15453366": ["Hence, the LOS link is easily broken by a moving person, which is termed as human body blockage effect [3]."]} diff --git a/edge/graph_11795007.jsonl b/edge/graph_11795007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b025e87eb1b955efa8e4229d9091c221ad4b463 --- /dev/null +++ b/edge/graph_11795007.jsonl @@ -0,0 +1,16 @@ +{"20925569|1720774": ["EMT has no LOS constraint and is becoming more widely used in laparoscopic surgery, but is vulnerable to ferromagnetic distortion [2], [17]."]} +{"16990327|1720774": ["Most of the approaches can be divided into two categories: local interpolation [7- 12] and polynomial fit [7, 13, 14], local interpolation is faster in computation, whereas polynomial fit have better overall error correction quality [ 6 ].", "In the past, most magnetic tracker calibration research has been done in the virtual reality research community [ 6 ]."]} +{"11032192|1720774": []} +{"22754354|1720774": []} +{"8824281|15744805": ["Finally, discrepancy may be computed on general characteristics related to the segmented objects or structures, such as position and number of incorrectly segmented objects or values of segmented object features [33]."]} +{"37209175|1720774": ["According to published reports [21], [28], we assume that the distortion is well approximated by a polynomial [ 28 ] and depends only on the position of the magnetic receiver [21].", "According to published reports [21], [ 28 ], we assume that the distortion is well approximated by a polynomial [28] and depends only on the position of the magnetic receiver [21].", "Fourth-degree polynomials are typically used for calibration of magnetic distortion when the polynomial is fitted to uniformly and densely sampled distortion data [ 28 ]."]} +{"43922004|1720774": []} +{"108757861|1720774": ["Multiple authors have investigated techniques for compensating static EM field distortions by performing a preprocedural calibration procedure [12, 13]."]} +{"14442863|1720774": []} +{"39345345|206051485": ["PPA occurs frequently in surgical navigation [2, 9 ] and there are well-developed algorithms available, in part because most of the tracking systems directly provide position measurements."]} +{"21142296|1720774": ["Besides the pulse dc excitation method, synchronization of the sampling rate of the sensor, and the software data filtering proposed in Section II, it had better use an all-around calibration method, such as 3-D interpolation [12], to further improve the performance of the system.", "There are many calibration methods [12] such as trilinear interpolation, local interpolation, and Hardy\u2019s multiquadric interpolation, which are employed to reduce the errors caused by the distortion of the"]} +{"10717215|1720774": []} +{"6261733|11960624": [", for medical augmented reality [22], where the in-plane error is most important."]} +{"6261733|1720774": ["To compensate for erroneous measurements caused by stationary objects, various calibration techniques have been proposed [19]."]} +{"13989356|1720774": ["Many calibration techniques have been presented to correct measurement errors caused by the presence of stationary ferromagnetic objects [9]."]} +{"206448721|1720774": []} diff --git a/edge/graph_11810221.jsonl b/edge/graph_11810221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4881a38401f44d2ee3ac60c2696d250be98ec997 --- /dev/null +++ b/edge/graph_11810221.jsonl @@ -0,0 +1 @@ +{"110024227|15915200": []} diff --git a/edge/graph_11810373.jsonl b/edge/graph_11810373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58d61600978dbcb8f3a97ffb05157992c4ae0778 --- /dev/null +++ b/edge/graph_11810373.jsonl @@ -0,0 +1 @@ +{"9970234|987239": []} diff --git a/edge/graph_11814056.jsonl b/edge/graph_11814056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0770631c7070d6d7681b2df4aae9accf9a58aa54 --- /dev/null +++ b/edge/graph_11814056.jsonl @@ -0,0 +1,3 @@ +{"30821498|9504064": ["\u2026design stage, interchange standards (e.g. XML Process Definition Language (XPDL)) for sharing information, execution standards (e.g. BPEL) for the enactment of business processes, and diagnosis standards (e.g. Business Process Runtime Interface (BPRI)) for the diagnosing stage (Ko et al., 2009).", "Workflow management is a technology that allows process design, system configuration, process enactment, and diagnosis (Hill et al., 2008; Ko et al., 2009; Ko, 2009).", "Among many scripts or languages used to define a workflow, the Business Process Execution Language (BPEL) has become the most popular workflow language accepted in industries (Ko et al., 2009).", "Scientific workflows and business workflows have different characteristics: data tokens vs. shared variables, self-concurrency vs. self-sequential behavior, individual semantics vs. collective semantics, and system-centric (automated) vs. human-centric (Ko et al., 2009; Migliorini et al., 2011)."]} +{"275706|3336775": []} +{"15992154|386036": []} diff --git a/graph_118142.jsonl b/edge/graph_118142.jsonl similarity index 100% rename from graph_118142.jsonl rename to edge/graph_118142.jsonl diff --git a/edge/graph_11822214.jsonl b/edge/graph_11822214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90d148171a632ea4c024dfad03d47c6e8875768d --- /dev/null +++ b/edge/graph_11822214.jsonl @@ -0,0 +1 @@ +{"6738698|11822214": ["The algorithm Approx2 can be derandomized by enumerating all possible choices in line 9.", "Let Approx1 be a polynomial-time r-approximation algorithm for Max-CSP(B).", "Thus for any 0 r |R B|\n|B|k , we have a randomized polynomial-time r-\napproximation algorithm: follow the Approx algorithm when |A| > k|B| 1\u2212r |B|k\n|RB|\n,\nand tabulate the solution otherwise.", "Consider the following algorithm, which we call Approx.", "Then for a given relational structure A, output a precalculated solution if |A| \u2264 N0; and execute Approx2 with the instance A otherwise.", "Our main result is a complexity dichotomy for MaxSur-CSP(B) on the Boolean domain and 3-element domains: every such problem is either APX-complete or has a PTAS (Polynomial-Time Approximation Scheme).", "Consider first the following randomized algorithm:\nApprox2(A) 1 h\u2190 Approx1(A) 2 if h is surjective 3 then return h 4 else h\u2217 \u2190 h 5 for each b \u2208 B such that y is not an image of h\u2217\n6 do T \u2190 {x \u2208 A | \u2203 y \u2208 A\\{x}, s.t. h\u2217(x) = h\u2217(y)} 7 if T = \u2205 8 then return No Solution.", "5 Approximability for Max-Sur-CSP(B)\nIn this section we describe a PTAS for Max-Sur-CSP(B), given that MaxCSP(B) is in PO.", "We say that an NP maximization problem \u03a0 has a PolynomialTime Approximation Scheme (PTAS) if there is an approximation algorithm that takes as input both an instance I and a fixed rational parameter \u01eb > 0, and outputs a solution which is (1 \u2212 \u01eb)-approximate in time polynomial in |I|."]} diff --git a/edge/graph_11829698.jsonl b/edge/graph_11829698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f975ecc79e98923f7aa28e7f535f20a4e7616905 --- /dev/null +++ b/edge/graph_11829698.jsonl @@ -0,0 +1 @@ +{"34012167|15261053": ["A low-power chipset for a portable multimedia was introduced for on-way full-motion video in [ 7 ]."]} diff --git a/edge/graph_11833085.jsonl b/edge/graph_11833085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ad991bc1d4ef69f4f307f9f7fa7943df7552355 --- /dev/null +++ b/edge/graph_11833085.jsonl @@ -0,0 +1 @@ +{"15304753|192934": ["Many tools exist involving both supervised and unsupervised training (Jain et al., 2000).", "Adding these results to the system would also increase the amount of training data it has available, eventually enabling multivariate analysis as opposed to the univariate methods used in this study to avoid the curse of dimensionality (Jain et al., 2000).", "Many tools exist involving both supervised and unsupervised (Jain et al., 2000).", "Several machine learning algorithms exist to reduce unnecessary dimensionality of inputs, such as principle component analysis and other multidimensional scaling techniques (Jain et al., 2000).", "In practice, however, it has been observed that additional dimensions will actually degrade performance of a classifier for a constant sample size, a property that has become known as the curse of dimensionality (Jain et al., 2000)."]} diff --git a/edge/graph_11833443.jsonl b/edge/graph_11833443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f750fcbd6b0346d50e1bb1241faaaf2a45f359e4 --- /dev/null +++ b/edge/graph_11833443.jsonl @@ -0,0 +1,3 @@ +{"24186571|11960624": ["still face critical handling challenges and raise concerns regarding reliability during medical procedures, which have prevented their wide-spread adoption up to now [29]."]} +{"24186571|469744": ["The medical field has long been recognized as an application area of AR with potential for great benefit [4]."]} +{"27631927|29778392": []} diff --git a/edge/graph_11836628.jsonl b/edge/graph_11836628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6fc1469ed892ae97d42be4da6764d312d42448b --- /dev/null +++ b/edge/graph_11836628.jsonl @@ -0,0 +1,2 @@ +{"110967344|8125630": ["Typically, OLTP focuses on day-to-day activities such as order entries and bank transactions which store specific values for individual fields [13].", "Thus, as indicated by previous studies, a data warehouse provides a summarized and consolidated view of the relevant data rather than a detailed and individual view [13,15]."]} +{"111242768|8125630": []} diff --git a/graph_1184288.jsonl b/edge/graph_1184288.jsonl similarity index 100% rename from graph_1184288.jsonl rename to edge/graph_1184288.jsonl diff --git a/graph_2502158.jsonl b/edge/graph_1184328.jsonl similarity index 100% rename from graph_2502158.jsonl rename to edge/graph_1184328.jsonl diff --git a/edge/graph_11843485.jsonl b/edge/graph_11843485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b407fd608a3d19db9234c58057a79c389cb295c --- /dev/null +++ b/edge/graph_11843485.jsonl @@ -0,0 +1 @@ +{"9472595|2685137": []} diff --git a/edge/graph_11852241.jsonl b/edge/graph_11852241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13cf89572e8263cc75ab6edce40b947d0223de2b --- /dev/null +++ b/edge/graph_11852241.jsonl @@ -0,0 +1,4 @@ +{"29344342|2669421": []} +{"3329018|15683881": [") and learning behavior in order to automate the construction of student models [89]."]} +{"18019486|15683881": []} +{"13157332|5473785": ["As aforementioned, each node must represent a propositional variable [140], which is defined to be as a variable that takes an exhaustive and mutually exclusive number of values.", "For more information about what the conditional independence assumptions mean, see [140] or [153]."]} diff --git a/graph_2507429.jsonl b/edge/graph_118527236.jsonl similarity index 100% rename from graph_2507429.jsonl rename to edge/graph_118527236.jsonl diff --git a/edge/graph_11853471.jsonl b/edge/graph_11853471.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11e2056355e42c041e5bccdb5de12ec20f49ae71 --- /dev/null +++ b/edge/graph_11853471.jsonl @@ -0,0 +1 @@ +{"20714|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} diff --git a/edge/graph_11855628.jsonl b/edge/graph_11855628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a43602208543af8c0d4a488bb7beb039b0d34963 --- /dev/null +++ b/edge/graph_11855628.jsonl @@ -0,0 +1 @@ +{"2667210|11855628": ["This work has been presented in invited lectures by B. Courcelle [ 17 ] and P."]} diff --git a/graph_1185580.jsonl b/edge/graph_1185580.jsonl similarity index 100% rename from graph_1185580.jsonl rename to edge/graph_1185580.jsonl diff --git a/graph_2507931.jsonl b/edge/graph_11859031.jsonl similarity index 100% rename from graph_2507931.jsonl rename to edge/graph_11859031.jsonl diff --git a/graph_3232122.jsonl b/edge/graph_118638740.jsonl similarity index 100% rename from graph_3232122.jsonl rename to edge/graph_118638740.jsonl diff --git a/edge/graph_118642762.jsonl b/edge/graph_118642762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0478821d5383137bbcc2e99b97a2401b3ca7137 --- /dev/null +++ b/edge/graph_118642762.jsonl @@ -0,0 +1 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_118646666.jsonl b/edge/graph_118646666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3d71d1703e274588580b8a584d1f879f9dbd5fb --- /dev/null +++ b/edge/graph_118646666.jsonl @@ -0,0 +1 @@ +{"59291894|3390598": ["There exist various IoT frameworks such as Apple HomeKit, SmartThing, Azure IoT Suite, IBM Watson IoT platform, Brillo/Weave platform by Google, Calvin IoT platform by Ericsson, ARM mbed IoT platform, Kura IoT project by Eclipse, interested readers may refer [3, 7] for more details."]} diff --git a/edge/graph_118649017.jsonl b/edge/graph_118649017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6fad78cd903ca277022bec4fd381255e49da3c6e --- /dev/null +++ b/edge/graph_118649017.jsonl @@ -0,0 +1,14 @@ +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"206592484|456491": []} +{"29465096|15562587": ["It is conceivable that for many of the problems for which neural networks perform well, a hidden hierarchical input-output relationship of the form (6) is present with small values t i ; cf. [35, 40]."]} +{"3509777|15562587": [" showed that the trajectories of input variables attain exponentially greater length and curvature with greater network depth. Work including Daniely (2017); Eldan & Shamir (2016); Pinkus (1999); Poggio et al. (2017); Telgarsky (2016) shows that there exist functions that require exponential width to be approximated by a shallow network. Barron (1994) provides bounds on the error in approximating general function", "essarily homogeneous) multivariate polynomial by a feedforward neural network, even with a single hidden layer, without increasing the number of neurons past a certain bound. (See also Corollary 1 in Poggio et al. (2017).) Theorem 3.4. Suppose that p(x) is a degree-dmultivariate polynomial and that the nonlinearity \u02d9 has nonzero Taylor coef\ufb01cients up to degree d. Let m k (p) be the minimum number of neurons in a dep", "in the following upper bound on muniform k (p), which we conjecture to be essentially tight. Our approach leverages the compositionality of polynomials, as discussed e.g. in Mhaskar et al. (2016) and Poggio et al. (2017), using a tree-like neural network architecture. Theorem 5.1. Let p(x) equal the product x 1x 2 x n, and suppose \u02d9has nonzero Taylor coef\ufb01- cients up to degree n. Then, we have: muniform k (p) = O n", ") constructions we have presented, it suf\ufb01ces to increase the number of layers by a factor of log 2 10 \u02c73, to log 2 n. The key property we use in our constructions is compositionality, as detailed in Poggio et al. (2017). It is worth noting that as a consequence our networks enjoy the property of locality mentioned in Cohen et al. (2016), which is also a feature of convolutional neural nets. That is, each neuron in a"]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"1033682|174797842": []} +{"49310446|3766791": ["While use of vector-Jacobian products for solving the adjoint method has been explored in optimal control (Andersson, 2013), we explore a fully general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) and highlight its potential in deep learning and generative modeling.", "\u2026for solving the adjoint method has been explored in optimal control (Andersson, 2013; Andersson et al., In Press, 2018), we highlight the potential of a general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) for deep learning and generative modeling."]} +{"49310446|1400872": ["The use of the adjoint method for training continuous-time neural networks was previously proposed (LeCun et al., 1988; Pearlmutter, 1995), though was not demonstrated practically."]} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"67772985|14242212": ["[DR16] M."]} +{"3797027|18599847": ["The original BMs have not been demonstrated to be useful for practical problems, while RBMs are commonly used in deep learning.", "For instance, deep belief networks (DBNs) and stacks of restricted Boltzmann machines (RBMs) [3,48,49] have been applied in speech and image recognition [3,45,50] and natural language processing [51].", "Similar to AEs, RBMs can also pre-train parameters for a complex network.", "For instance, sequenced-based predictor of protein disorder using boosted ensembles of deep networks (DNdisor-der), a deep neural network with multi-layers of RBMs [184], achieved an average balanced accuracy of 0.82 and an AUC of 0.90.", "This restriction ensures the conditional independency of hidden units and visible units [91], i.e. , P \u00f0 h j v \u00de \u00bc P i p \u00f0 h i j v \u00de P \u00f0 v j h \u00de \u00bc P j p \u00f0 v j j h \u00de \u00f0 10 \u00de Furthermore, most RBMs rely on the assumption that all units in the network take only one of the two possible values 0 or 1, i.e. , m j ; h i 2 \u00f0 0 ; 1 \u00de .", "To predict splice junction at the DNA level, Yoon and his collaborators developed a novel DBN-based method that was trained on the RBMs by boosting contrastive divergence with categorical gradients [156].", "SAEs and RBMs can extract patterns from unlabeled data [186] as well as labeled data when stacked with a classi\ufb01er [156].", "A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101].", "Inaddition to feature extraction, RBMs can also learn distributions of unlabeled data as generative models, and classify labeled data as discriminative models (regard the hidden units as labels).", "RBMs restrict the BMs to a bipartite graph, i.e. , there are no connections within visible units m \u00bc x or hidden units (cid:2) h .", "RBMs are generative graphical models that aim to learn the distribution of training data.", "Similar to RBMs, DBNs can learn the distribution of the samples, or learn to classify the inputs given class labels [3].", "Overall, given the network architectures and optimized parameters, the distribution of the visible units could be computed as: A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101]."]} +{"49214673|2088679": ["Consequently, their use has been limited in fields such as medicine (e.g. medical image classification (Litjens et al., 2017)), policy-making (e.g. classification aiding public policy makers (Brennan & Oliver, 2013)), and science (e.g. interpreting the contribution of a stimulus to a biological\u2026", "medical image classification [1]), policy-making (e."]} diff --git a/graph_2511656.jsonl b/edge/graph_11865505.jsonl similarity index 100% rename from graph_2511656.jsonl rename to edge/graph_11865505.jsonl diff --git a/graph_2515019.jsonl b/edge/graph_118672369.jsonl similarity index 100% rename from graph_2515019.jsonl rename to edge/graph_118672369.jsonl diff --git a/edge/graph_118684904.jsonl b/edge/graph_118684904.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc4f4a1369a4b6e46dbf490e63f8e855111a6f76 --- /dev/null +++ b/edge/graph_118684904.jsonl @@ -0,0 +1,4 @@ +{"46937991|393948": ["While the successful artificial neural networks may not operate the same way as the brain, both of them utilize highly parallel and hierarchical architectures that gradually abstract input data to more meaningful concepts [8, 51, 16]."]} +{"19496174|18803401": ["A plethora of hand gesture datasets have been created in recent years, as thoroughly reviewed in [37]."]} +{"3993392|393948": ["In the last few years, the availability of large datasets [16, 37] and effective learning algorithms [32, 26, 68] shifted the research direction towards data driven learning of feature representations [2, 22]."]} +{"14255496|9045232": ["This area has been dominated in the recent years by appearance-based methods [6]."]} diff --git a/edge/graph_11869538.jsonl b/edge/graph_11869538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da4bf5525e9e923488e09a9e9f39010af1ab0cf1 --- /dev/null +++ b/edge/graph_11869538.jsonl @@ -0,0 +1,13 @@ +{"16845113|16052126": ["Instead of exploring the biomedical significance of the association mining results, we are particularly interested in developing high-performance parallel association mining algorithms using the MapReduce paradigm [10]."]} +{"423509|6923178": []} +{"11950543|10739218": []} +{"31009839|16575201": []} +{"3883098|4626023": ["Neves and Leser (14) present a comparative analysis of thirteen text annotation and curation tools, based on 35 criteria; these authors concluded that although comprehensive and easyto-use solutions exist for many use cases, no tool fully satisfied all initial criteria.", "Neves and\nLeser (14) present a comparative analysis of thirteen text annotation and curation tools, based on 35 criteria; these authors concluded that although comprehensive and easyto-use solutions exist for many use cases, no tool fully satisfied all initial criteria."]} +{"37297639|3420321": ["Numerous algorithms have been developed to perform alignment of a sequence to the reference genome so that mutations can be identified [9]."]} +{"170031|1271753": []} +{"170031|15279105": []} +{"170031|431089": []} +{"17128470|431089": ["The study demonstrated that each individual database or resource has some synonyms not covered by other databases or resources, and a list of names compiled from multiple databases would be desired for systems requiring high recall."]} +{"3528702|1271753": []} +{"3528702|18526204": ["Text mining also known as Intelligent Text Analysis [1] is the process of extracting non-trivial and interesting information and knowledge from unstructured text."]} +{"14365591|431089": []} diff --git a/graph_1188683.jsonl b/edge/graph_1188683.jsonl similarity index 100% rename from graph_1188683.jsonl rename to edge/graph_1188683.jsonl diff --git a/edge/graph_11890281.jsonl b/edge/graph_11890281.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4b6df83504a8f72efaf46555c440d59748ea80e7 --- /dev/null +++ b/edge/graph_11890281.jsonl @@ -0,0 +1 @@ +{"3683269|11890281": ["A I]\nKeywords\u2014 Reinforcement Learning, Discount Function, Time Consistency, Monte Carlo"]} diff --git a/edge/graph_11894197.jsonl b/edge/graph_11894197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28627e0910126f5d484e21e8cb6e46b92ec36f79 --- /dev/null +++ b/edge/graph_11894197.jsonl @@ -0,0 +1,2 @@ +{"14170117|192934": ["Principal component analysis (PCA) has been widely used as a standard way for this purpose in many other data mining applications [129]."]} +{"423509|6923178": []} diff --git a/edge/graph_11894335.jsonl b/edge/graph_11894335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7939ca8bcc899f118a21d8469ab9d4acd7c492b8 --- /dev/null +++ b/edge/graph_11894335.jsonl @@ -0,0 +1,6 @@ +{"33321549|14441987": []} +{"6659898|713082": ["Multipoint communications [13] have emerged as one of the most researched areas in the field of networking."]} +{"33832960|1775475": []} +{"33832960|14441987": []} +{"8554066|14441987": ["A multicast extension of the Ad Hoc On Demand Distance Vector(AODV) [ 1 ] is presented in [2] and is called MAODV for Multicast AODV."]} +{"16461414|10287248": ["There are two basic types of routing strategies [ 16 ]: 1) source routing, and 2) distributed routing.", "An overview and comparison of different multicast routing algorithms can be found in [ 16 ], [17]."]} diff --git a/edge/graph_11901107.jsonl b/edge/graph_11901107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62b893bc6437efc532e3c6dba92c178cee42c6e1 --- /dev/null +++ b/edge/graph_11901107.jsonl @@ -0,0 +1,3 @@ +{"2375324|7788290": []} +{"3420056|18105696": []} +{"14956420|12127129": ["I. INTRODUCTION\nF OREGROUND detection is fundamental in many systemsrelated to video technology [1], [2]."]} diff --git a/edge/graph_119050000.jsonl b/edge/graph_119050000.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5425a1e5774d681e9ce8efbebf91c07b7e1d4a6 --- /dev/null +++ b/edge/graph_119050000.jsonl @@ -0,0 +1 @@ +{"22826340|17858209": []} diff --git a/edge/graph_11905372.jsonl b/edge/graph_11905372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba437c3b00d39b243e77adc1bdd7f2a74cd8fbcf --- /dev/null +++ b/edge/graph_11905372.jsonl @@ -0,0 +1,30 @@ +{"6678690|11905372": ["rizon with small error in most of the cases, outperforming three state-of-the-art methods. I. INTRODUCTION Horizon detection is useful in maritime electro optical data processing for various purposes [1], including registration for mobile sensor platforms such as buoys, maritime vessels, unmanned aerial vehicles [2], [3] and restricting the object search region [4], [5], [6]. In maritime scenario, ho", "e y-axis (i.e., the number of pixels in the frame along the vertical direction, see inset of 1), (Y n Y s)=max(y) is the relative vertical distance between horizon candidates (n;s) and ranges between [0;1]. The normalization by max(y) is done because both Hough transform and IVA approaches gives candidates with the value of Y in the range [0;max(y)]. Consequently, 1 (Y n Y s)=max(y) represents the prox"]} +{"2685240|17516538": []} +{"12570116|819377": ["A recent complete survey of these improvements can be found in [4]."]} +{"2959433|12127129": ["Alternatively , background subtraction [7] compares images with a background model and detects the changes as obj ects.", "It is popularly used for multimodal background modeling and has proven to be very competitive compared with other more sophisticated techniques for background subtra ction [7], [65].", "Moreover, it usually assumes that the video is captured by a static camera [7]."]} +{"11926236|819377": ["I. INTRODUCTION Background subtraction (also referred as foreground extraction) has been extensively studied in decades[1], [2], [3], [4], [5], [6], yet it still remains open in real surveillance applications due to the following challenges:\n\u2022 Dynamic backgrounds.", "The initial learning is performed at the beginning of system deployment, when only a few foreground objects move in the scene."]} +{"33365505|17516538": []} +{"17803066|2355696": []} +{"16467616|12127129": []} +{"7514147|206051485": ["Simple temporal and/or spatial smoothing is often used in the early stage of pre-processing to reduce camera noise and to remove transient environmental noise such as rain and snow captured in outdoor applications."]} +{"7514147|8953108": []} +{"17409272|12127129": ["Thanks to the on-line model creation mechanism, there is no need to store in memory the N scene samples, that is the main drawback of the nonrecursive BS techniques [24]."]} +{"12758993|17516538": ["There is a wide spectrum of promising applications for automatic detection of objects motion and behaviors (see [20] for a survey).", "Video-surveillance systems have been extensively experimented for observing and tracking vehicles and people in dynamic scenes (see [13, 20])."]} +{"22572103|206051485": ["The purpose of the image registration module is to register all frames of the video sequence in the common coordinate system [56].", "Image registration methods transform two or more sets of image data into one coordinate system in order to align images of the same scene [55, 56, 57]."]} +{"3740732|819377": ["The landmark paper in this regard was [5], with much of the current research based on this approach [6].", "Since then there have been various other pixel based methods [6] that have improved upon this method.", "4 of [6] focuses on the different approaches to adapt the learning rate in MoG)."]} +{"18637075|11905372": ["WHILE computer vision techniques have advanced video processing and intelligence generation for several challenging dynamic scenarios, research in computer vision for maritime is still in nascent state and several challenges remain open in this field [1]."]} +{"111154005|206051485": []} +{"17358916|12127129": ["Many background modelling techniques have been developed and widely used for detecting moving objects in videos, some of these are reviewed in [9]."]} +{"9128073|15744805": ["These are results are plotted as the receiver operating characteristic (ROC) curves (Egan, 1975) that are used for evaluation and comparison (Zhang, 1996)."]} +{"207104134|819377": ["Numerous improvements of the original method developed by Stauffer and Grimson [2] have been proposed over the recent years and a good survey of these improvements is presented in [4]."]} +{"10685279|12127129": []} +{"10056363|469744": ["MOVING object detection [1], [2] is one of the most important and challenging tasks in computer vision, which plays a core role for various applications, such as object tracking [3], behavior recognition [4], scene understanding, and augmented reality [5], [6]."]} +{"10056363|17024419": ["MOVING object detection [1], [2] is one of the most important and challenging tasks in computer vision, which plays a core role for various applications, such as object tracking [3], behavior recognition [4], scene understanding, and augmented reality [5], [6]."]} +{"8088635|12127129": ["Due to its pervasiveness in various contexts, background subtraction has been afforded by several researchers, and plenty of literature has been published (see surveys in [5, 11, 14], and more recently in [7])."]} +{"6837802|7788290": []} +{"46533025|14970359": []} +{"18152430|18546648": ["Shadows Features: Colors, edges, textures [206][317][3][219][9][25][246] Strategies: Markov Random Fields (MRF) [246]", "Complete studies and surveys can be found in [206][317][3][219][9]."]} +{"18152430|819377": ["So, the previous surveys made by Bouwmans et al. focus only on some categories [38][34] or sub-categories [37][33][40] of background models as follows: is the most common approach ."]} +{"18152430|12127129": ["In 2004, Piccardi [201] provided a review on 7 methods and an original categorization based on speed, memory requirements and accuracy."]} +{"13521657|387610": ["Index Terms\u2014 Motion Saliency Detection, Low-rank and Sparse Decomposition, Video Analysis"]} +{"8348812|1029120": ["For instance, in pedestrian detection, the camera\u2019s FOV has a radius of up to 40 meters [15]."]} diff --git a/edge/graph_119078262.jsonl b/edge/graph_119078262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7afb3e8a70cbada19972972b52e234318b4c4f1f --- /dev/null +++ b/edge/graph_119078262.jsonl @@ -0,0 +1,9 @@ +{"10724249|11810221": ["Herroelen and Leus (2005) provide an exhausive survey of the limited volume of works.", "Herroelen and Leus (2005) provide an exhaustive survey of the limited volume of works."]} +{"10724249|1619901": []} +{"114920627|2135552": ["In general, one distinguishes between discrete- and continuous-time models, and there is a large body of work in the literature discussing different formulations and their strengths and limitations (Floudas & Lin, 2004; Me\u0301ndez et al., 2006; Sundaramoorthy & Maravelias, 2011)."]} +{"114920627|26257441": ["This is a fairly generic problem and in our proposed algorithm, we apply concepts from various areas, such as computational geometry, mixed-integer programming, polyhedral theory, metamodeling (Simpson et al., 2001), clustering (Jain, 2010), and pattern recognition (Jain et al."]} +{"114920627|192934": [", 2001), clustering (Jain, 2010), and pattern recognition (Jain et al., 2000)."]} +{"7324114|641916": []} +{"36593493|13985031": []} +{"1364567|534755": []} +{"2683711|26257441": []} diff --git a/edge/graph_11909843.jsonl b/edge/graph_11909843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6e5dedf204089366fba165928a8037ade8a3e0a --- /dev/null +++ b/edge/graph_11909843.jsonl @@ -0,0 +1,11 @@ +{"18827245|14276831": []} +{"1404972|2373140": ["In the Sichuan Earthquake, some recovery vehicles were not able to reach failure locations, and repairmen went there on foot because roads were damaged, while for some mountain areas without ground access after the earthquake, army helicopters transported repairmen and equipment [3]."]} +{"1404972|18435528": ["A disaster may cause failures of multiple network elements, and they cannot be restored at the same time because of the limitation of the recovery resources, such as repairmen, recovery vehicles, and repaired network materials for replacement."]} +{"12454639|14441987": ["Mobile ad hoc networks (MANETs) [3] can be deployed with no pre-existing communication infrastructure.", "receiver node at any point in time [2], [3]."]} +{"12848458|18435528": ["possible but rare [8], the focus tends to be on single"]} +{"12237313|11013798": ["Fault ? error ? failure chain A fault is a flaw in the system that can cause an error [9] [10]."]} +{"12237313|1230643": ["The third contributor is energy-constrained networks, exemplified by wireless sensor networks [39], in which nodes that have drained their battery can no longer contribute to network connectivity [40,41]."]} +{"12237313|1991786": []} +{"17900274|1991786": ["Multilevel resilience [101] is needed in three orthogonal dimensions: Protocol layers in which resilience at each layer provides a foundation for the next layer"]} +{"6315562|14276831": []} +{"14784353|14276831": ["Kuipers provides an overview of survivability algorithms [13]."]} diff --git a/edge/graph_119114298.jsonl b/edge/graph_119114298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a5451df8664e98499421da429f13185d5b9deeb --- /dev/null +++ b/edge/graph_119114298.jsonl @@ -0,0 +1,25 @@ +{"4505261|3273340": []} +{"4505261|19034128": ["supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "There are three main types of learning, i.e. supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "One of the representative learning methodologies is Machine Learning, that is related to changes in the systems that perform tasks associated with artificial intelligence such as recognition, diagnosis, prediction, etc. [23]."]} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"31392985|3330313": ["It is ideal for situations where negative examples are very hard to obtain in real life situations [26,60].", "The choice of an appropriate discordancy test for a given data depends on: knowledge of the data distribution, knowledge of the distribution parameters, and the number and type of expected outliers needed, which accounts for the many discordancy tests available for finding distribution-based outliers [20,26].", "[26] outlines several practical applications of outlier mining."]} +{"31392985|5246835": []} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"7381206|3330313": ["Although a wide variety of anomaly detection algorithms have been developed and applied to these tasks [20, 11, 5, 31], a shortcoming of most published work is that there is no standard methodology for comparing anomaly detection methods."]} +{"19713317|11381530": ["The taxonomies including the previous works of shallow and deep learning algorithms to ID is briefly outlined by [5].", "41 features were composed of 34 continuous and 7 discrete valued and grouped into basic features in the range [1-9], content features in the range [10-22], traffic features with in a time window of in the range [23-31] and features based on host in the range [3241]."]} +{"19713317|302716": []} +{"17427022|18353243": ["Approaches for anomaly detection exist in various domains, ranging from video analysis [1] to remote sensing [2]."]} +{"8255138|16156203": ["Temporal data mining [96] incorporates time dimension into data mining process."]} +{"8255138|1176034": ["Spatio - temporal data mining deals with database models to accommodate temporal aspects [121, 130]."]} +{"52007797|39860496": []} +{"53015016|207209718": ["[33], anomaly detection techniques used in ICS intrusion detection can be broadly divided into supervised, unsupervised, and semi-supervised techniques.", "[33], ICS anomaly detection methods include knowledge and behavior-based methods."]} +{"41082528|1805048": []} +{"3562477|3330313": []} +{"3562477|50458504": []} +{"19002372|393948": ["The composition of linear operations yields another linear operation [61].", ", the depth of the representation) has shown promising results in tackling data complexity and the curse of dimensionality issues [61,17]."]} +{"207172599|3330313": []} diff --git a/edge/graph_119116017.jsonl b/edge/graph_119116017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..983992c59bf684cde58edb4003894331f837d75e --- /dev/null +++ b/edge/graph_119116017.jsonl @@ -0,0 +1,11 @@ +{"16182497|1708582": ["RL has been widely used as a practical computational tool to learn an optimal control policy [1].", "For each element in state vector, we impose a dynamic range of [21, 1]."]} +{"871178|1708582": ["We refer to [8] for a survey of RL techniques."]} +{"56487646|1185580": []} +{"12660045|562855": ["Therefore the information can be summarized, approximated or processed otherwise to reduce the load in higher levels [6]."]} +{"19934639|9928823": ["By utilising advances in deep learning and its application to different domains [11, 26, 27], deep learning has gained attention in the area of traffic management systems."]} +{"1708582|17464562": []} +{"15911052|1708582": ["This chapter does not contain a full review of MDPs; see [26, 14] for such reviews, and [10, 31, 15] for reviews of multi-agent variations of MDPs."]} +{"65581045|1185580": []} +{"65581045|1708582": []} +{"116225125|1185580": []} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} diff --git a/edge/graph_11911865.jsonl b/edge/graph_11911865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da2d5efbaadd562662904c1cf6d89027e4eba521 --- /dev/null +++ b/edge/graph_11911865.jsonl @@ -0,0 +1,5 @@ +{"16831230|17381415": []} +{"516716|8953108": []} +{"207110384|468992": ["[12], who proposed two taxonomies for swarm robotics studies: methods and collective behaviors."]} +{"207110384|8767649": ["[6] used cooperation as the first level of a multi-level characterization of robot swarms; cooperative systems are"]} +{"2396461|8953108": []} diff --git a/edge/graph_119120892.jsonl b/edge/graph_119120892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac847056b0c505bec594629f4525ed82d6156783 --- /dev/null +++ b/edge/graph_119120892.jsonl @@ -0,0 +1,2 @@ +{"13980455|393948": ["This strategy is different from the dominant paradigm in recent neural network literature of unsupervised tranfer learning (see [40] for a survey covering unsupervised pre-training and represetation learning more generally)."]} +{"14862572|18454590": ["A variety of different architectures and training algorithms have been proposed in the literature (see the comprehensive survey in [37])."]} diff --git a/edge/graph_119132377.jsonl b/edge/graph_119132377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5aa4db4e3798e92d00afed512433ac12264ca33e --- /dev/null +++ b/edge/graph_119132377.jsonl @@ -0,0 +1,13 @@ +{"3106434|1123458": []} +{"17908474|1676762": []} +{"2319461|16427275": ["The interested reader can find many of these results in the edited volume of Pardalos [35] or in the survey papers of de Klerk [15], and Blondel and Tsitsiklis [7]."]} +{"37556291|1123458": []} +{"125130749|1123458": []} +{"42984547|1123458": ["The key idea is to apply the classical S-Lemma with an inequality q(x) \u2264 0 [14, 21].", "If (P) is attained, the optimal solution x\u2217 of (22) can be obtained by applying the matrix rank-one decomposition procedure [14, 17] to an optimal solution Z\u2217 of (SDR).", "Again, with the help of Lemma 3, (22) can now be solved by a tight SDP relaxation, followed by the standard rank one decomposition procedure [14, 17] to get x\u2217 in polynomial time.", "The key for solving (28) and (29) is the standard S-lemma under the Slater condition [14, 21] (cf."]} +{"13718564|1123458": ["Let us recall the S-lemma [10], which states the equivalence of the following two statements under Slation condition: (S1) (\u2200x \u2208 Rn) h(x) \u2264 0 \u21d2 f(x) \u2265 0."]} +{"15087822|1123458": ["Thus, in the previously considered cases for problem T (Q, c,G, P ) we have |S| = 2, |K| = m = 0 (Ye-Zhang), |S| = 1, |K| = 0 andm = 2 and so |F\u2217| = 3 (Ye-Zhang and Burer-Anstreicher) and |S| = 1, |K| = 0 and also |F\u2217| \u2264 m + 1 (Burer-Yang)."]} +{"19642354|1123458": []} +{"119136187|1123458": []} +{"40554178|1123458": ["For a historical perspective on the S-procedure, we refer the reader to [46, 78]."]} +{"17868546|1123458": []} +{"207055346|1123458": ["Yakubovich\u2019s proof (see also [27]) had to rely on (i) a homogenization scheme which transforms the nonhomogeneous system of (S1) and (S2) into homogeneous ones; (ii) if f and h are quadratic forms, the joint numerical range {(f(x), h(x)) : x \u2208 Rn} is convex [9]; and (iii) Slater\u2019s condition for applying the separation theorem to provide the existence of \u03bc \u2265 0.", "S-Condition 1([27]): h(x) is strictly concave (or strictly convex)."]} diff --git a/graph_2530790.jsonl b/edge/graph_11918465.jsonl similarity index 100% rename from graph_2530790.jsonl rename to edge/graph_11918465.jsonl diff --git a/graph_2538212.jsonl b/edge/graph_11919330.jsonl similarity index 100% rename from graph_2538212.jsonl rename to edge/graph_11919330.jsonl diff --git a/graph_2543328.jsonl b/edge/graph_119199178.jsonl similarity index 100% rename from graph_2543328.jsonl rename to edge/graph_119199178.jsonl diff --git a/edge/graph_119298504.jsonl b/edge/graph_119298504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5289d8049aa0e62fe5beacedc207efbbfab4439 --- /dev/null +++ b/edge/graph_119298504.jsonl @@ -0,0 +1,39 @@ +{"26533371|15705163": ["There are two main strategies to improve data quality according to [1], [2]; data-driven and process-driven."]} +{"1972898|1230643": ["Firstly, the local measured data from these monitoring stations need to be transmitted to a control center, and the communication infrastructure connecting these parties may suffer from random failures [2]."]} +{"1972898|1805048": ["So this method has been applied to solve problems in various engineering research fields, such as social network [5] and power system [6]."]} +{"1972898|289357": []} +{"4016999|7774517": []} +{"22029828|3330313": []} +{"22029828|1230643": []} +{"16282605|674920": ["The integration of sequencing data is challenging due to the complexity and size of datasets as well as lack of standards for file formats and meta-data [19].", "For example, the same protein is assigned different identifiers in Ensembl, RefSeq and UniProt systems [19]."]} +{"30963055|12574246": ["Machine learning approaches can be categorized to supervised and unsupervised approaches [31].", "Supervised methods utilize training data (input/output about the phenomenon) for classification or regression type of algorithms [31]."]} +{"49645129|1353379": []} +{"49645129|13991708": []} +{"49645129|2398835": []} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"13990559|15705163": ["In [15],[12] the authors point out, that to improve data quality, there are two strategies (1) data-driven and (2) process-driven.", "According to [15][12][16], a data quality dimension offers a way to measure and manage data quality.", "In [12], Sidi et al."]} +{"52964767|2082499": []} +{"52964767|15705163": []} +{"5860048|1940388": ["In addition, malicious attacks such as denial of service, sinkhole, black hole, selective forwarding, and wormhole attacks [3,14\u201320] may also contribute to generating such inaccurate and low quality data."]} +{"5860048|7774517": ["efficiency in utilizing the limited network resources [9].", "Besides, additional energy is required for processing large-scale and multivariate data [1,3,9,29].", "Besides, the large amount of data produced due to network size expansion is also a challenge for real time detection [9].", "A cluster is said to be anomalous if it is either smaller than or distant from other clusters in the dataset [9,27,68,69].", "According to [9], the spatial and temporal correlation between sensing data attributes help to specify the source of anomaly.", "It was reported by [9] that the purpose of using a WSN is not only to collect data from the field of deployment, but more importantly the analysis of this data at timely manner that allows for making some important decisions.", "Many statistical techniques have been used for anomaly detection in WSNs and categorized in [9,18] into parametric and non-parametric techniques.", "The classifications in [9,27,28] are technique-based, although they have slight differences in the classification.", "Although similar to the classification of [9], our classification is more comprehensive and cover the most recent published models."]} +{"5860048|17205659": ["Many statistical techniques have been used for anomaly detection in WSNs and categorized in [9,18] into parametric and non-parametric techniques.", "Therefore, a modification of these techniques or a design of new suitable techniques especially for WSNs is required [18,23,24]."]} +{"5860048|6275330": ["and control; and military applications such as enemy target monitoring and tracking [1\u20133]."]} +{"5860048|1236072": ["On the network layer, routing protocols are classified according to network structure into flat-based, hierarchical-based, and location-based [35]."]} +{"5860048|3330313": ["Another definition in [21] as \u201can observation that appears to be inconsistent with the reminder of a dataset\u201d.", "An anomaly is defined in [21] as an observation that seems to be inconsistent with the rest of a dataset.", "and first used for one dimensional data sets [21]."]} +{"5860048|1230643": ["Besides, additional energy is required for processing large-scale and multivariate data [1,3,9,29].", "Wireless sensor networks (WSNs) are networks of tiny, low cost, low energy, and multifunctional sensors which are densely deployed to monitor a phenomenon, track an object, or control a process [1].", "Besides, physical interruptions such as destruction or movements of sensor devices caused by humans or animals may affect the data collection process and lead to anomalous measurements [1].", "The fast advancement in communication technologies has introduced cheap, low-power and multifunctional devices which leverage the idea of the sensor [1].", "Three more additional units may be incorporated in the sensor structure depends on the application which are the energy generator that supplies the sensor with additional energy sources, the mobilizer which is sometimes used for supporting the mobility of sensor nodes, and the position finding system that determines the current position of mobile sensor nodes [1].", "Two unique features that differentiate WSNs from other networks were mentioned in [1]: first, the position of sensor nodes is not determined or engineered beforehand and this allows the random deployment at inaccessible environments and disaster relief operations; this feature poses a challenge for designing a selforganizing algorithms and protocols; second, the distributed data processing; instead of sending raw data to fusion node (base station or cluster head), the nodes can use their processing capabilities to locally carry out some simple required computations and send only the summary that is beneficial for decision making.", "However, the cost of data transmission is several orders of magnitude higher than the cost of data processing [1]."]} +{"11173881|207231270": ["Paper [6] reviews the related work and derives general principles and a classi\ufb01cation of approaches within this domain."]} +{"66909471|1489715": ["Research work from different aspects for WSN sensor data prediction has been published in [4\u20138], which demonstrated the feasibility of different methods for providing precise prediction of unknown or upcoming sensor data."]} +{"52193856|11453858": ["In [35], [39]\u2013[49], the authors emphasized many data quality issues and their effects in Big data lifecycle stages; as preprocessing, processing, and storage.", "In this category, two important aspects of Big Data were targeted in [31],[35],[39]\u2013[41],[44],[46]\u2013[59] that are its characteristics (V\u2019s) and management.", "Data quality has been fully investigated in the following work [25], [31], [39], [41]\u2013[46], [48]\u2013[59], [61] which confirm its"]} +{"52193856|15705163": ["In [19], [34], The authors addressed a compilation of poor data causes classified by DQD, granularity level, and data source type while highlighting the causality mapping between these.", "1) Definition: it is recognized that DQ has many definitions that are related to the context, domain, area or the fields in which it is used [19], [20].", "2) Data Quality Dimensions(DQD\u2019s): according to [19], [22], [23], a DQD offers a way to measure and manage data quality.", "In [19], data quality is defined as the appropriateness for use or meeting user needs."]} +{"3914763|10011823": ["Although some researches have studied data management in the area of data assessment and data cleaning [14], the relationship between data quality indicators is still a challenging issue."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"6104234|2294541": ["An important issue here is that data representing such observations is often inconsistent because of noise, hardware faults, or false data injection by malicious nodes [1]."]} +{"6104234|7774517": []} +{"5651019|7774517": []} +{"12252982|7774517": []} +{"12252982|6275330": ["\u2026form 3 October 2012 Accepted 7 November 2012 Available online xxxx\nKeywords: Outlier detection Ellipsoidal support vector machine Spatial correlation Temporal correlation Wireless sensor networks\n1570-8705/$ - see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.adhoc.2012.11.001\n\u21d1\u2026"]} +{"16199748|7774517": ["Outlier detection has attracted much attention in the field of WSNs , and in recent years many outlier detection techniques specifically developed for WSNs have emerged ( Zhang et al ."]} +{"16199748|6275330": ["A recent development in data acquisition concerns the use of wireless sensors, consisting of nodes that measure environmental variables such as temperature, humidity, sound, pressure, light, vibration or motion (Arampatzis et al. 2005)."]} +{"18255832|15705163": ["In healthcare domain the increase of electronic medical data, advocated the use of sophisticated health systems to support health Big Data transfer, processing, storage, replication, analysis and retrieval."]} diff --git a/graph_2548500.jsonl b/edge/graph_119304121.jsonl similarity index 100% rename from graph_2548500.jsonl rename to edge/graph_119304121.jsonl diff --git a/graph_2552155.jsonl b/edge/graph_11931455.jsonl similarity index 100% rename from graph_2552155.jsonl rename to edge/graph_11931455.jsonl diff --git a/edge/graph_11953775.jsonl b/edge/graph_11953775.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3400454871721e81580d73a8597684844d7df8af --- /dev/null +++ b/edge/graph_11953775.jsonl @@ -0,0 +1 @@ +{"2452372|192934": ["The performance of a classifier is measured by the accuracy to correctly predict unseen test images using the same set of input features (Jain et al. 2000)."]} diff --git a/graph_2555576.jsonl b/edge/graph_11954512.jsonl similarity index 100% rename from graph_2555576.jsonl rename to edge/graph_11954512.jsonl diff --git a/graph_2561969.jsonl b/edge/graph_11955095.jsonl similarity index 100% rename from graph_2561969.jsonl rename to edge/graph_11955095.jsonl diff --git a/graph_2565171.jsonl b/edge/graph_11955283.jsonl similarity index 100% rename from graph_2565171.jsonl rename to edge/graph_11955283.jsonl diff --git a/edge/graph_11960624.jsonl b/edge/graph_11960624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4656d4f478b20751bec17d3b452379c8282b641c --- /dev/null +++ b/edge/graph_11960624.jsonl @@ -0,0 +1,8 @@ +{"9216848|469744": ["This makes exact calibration of the HMD, i.e., the precise determination of the projective transformation between 3-D-coordinates and the HMD\u2019s display coordinates, and sophisticated real time tracking of the HMD necessary [1].", "Besides using a display system that allows for merging real and virtual views, a second requirement is the accurate tracking of the position of the viewer relative to the viewed scene [1]."]} +{"8117270|469744": ["Registration inaccuracy is one of the most important problems limiting augmented reality applications today [ 11 ]."]} +{"6108923|469744": []} +{"791733|469744": ["In 1997, the first author published a survey [ 3 ] (based on a 1995 SIGGRAPH course lecture) that defined the field, described many problems, and summarized the developments up to that point."]} +{"1174054|14122909": ["[90], non-rigid image-to-image registration has been reviewed by Crum et al."]} +{"1174054|1720774": ["Although a static distortion can be compensated by means of calibration procedures [57], dynamic changes in surgical environment are difficult to compensate."]} +{"988484|469744": []} +{"16408692|1720774": []} diff --git a/graph_2592807.jsonl b/edge/graph_119640357.jsonl similarity index 100% rename from graph_2592807.jsonl rename to edge/graph_119640357.jsonl diff --git a/edge/graph_119665323.jsonl b/edge/graph_119665323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e31a88c47588f0f169b5a4f88e810d5b705eef9c --- /dev/null +++ b/edge/graph_119665323.jsonl @@ -0,0 +1,7 @@ +{"2865118|13193330": []} +{"7263959|13193330": []} +{"118132557|13193330": ["A variant of the following result has appeared in the work of Butkovic [But94].", "Butkovic\u030c proved two results which can be formulated equivalently as follows."]} +{"2641972|13193330": ["problem. Then, we de\ufb01ne the digraph G with nodes 1,...,n, and an arc from i to j whenever Aij = ui +vj. Butkovi\u02c7c proved two results which can be formulated equivalently as follows. Theorem 6.14 (See [But94] and [But95] ). Let A \u2208 Mn(R max), and assume that perA 6= 0 . Then, checking whether the optimal assignment problem has at least two optimal solutions reduces to \ufb01nding a cycle in the digraph G, wher"]} +{"119632670|119665323": ["This paper focuses on the first two parts; the third has involved several additional papers in the last two years, including [4,5,23,48,49,62]."]} +{"119144982|119665323": ["Much of this section is a review of [21], as summarized in [22], and also as in [15]."]} +{"119137751|119665323": []} diff --git a/graph_2598183.jsonl b/edge/graph_11968735.jsonl similarity index 100% rename from graph_2598183.jsonl rename to edge/graph_11968735.jsonl diff --git a/edge/graph_11972113.jsonl b/edge/graph_11972113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81aaad1ad26315465fed336d216e1f0776891d69 --- /dev/null +++ b/edge/graph_11972113.jsonl @@ -0,0 +1,4 @@ +{"6493647|10093798": ["Using dynamical systems as computers has become increasingly attractive over the last ten years or so among physicists, computer scientists, and others exploring the physical basis of computation [131\u2013134].", "[133] P."]} +{"6870251|41035405": ["Good surveys of the multiuser area may be found in El Gamal and Cover [44] van der Meulen [144] and Berger [12] Traditional noiseless coding theorems and actual codes such as the Huffman codes are not considered in depth because quite good treatments exist in the literature, e."]} +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} diff --git a/graph_2598486.jsonl b/edge/graph_1197261.jsonl similarity index 100% rename from graph_2598486.jsonl rename to edge/graph_1197261.jsonl diff --git a/edge/graph_11977718.jsonl b/edge/graph_11977718.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ccc4e47f6f27cd3ede3654b224d77895ba810bd --- /dev/null +++ b/edge/graph_11977718.jsonl @@ -0,0 +1,2 @@ +{"112011364|1188683": []} +{"2989031|1188683": ["This observation was confirmed by precedent research ( [18], [89], [15]).", "It is possible to do \u201cbackground loading\u201d [15] where one context is active while another is in the process of being programmed for later activation.", "It can also be considered as \u201cloading multiple memory bits for each programming bit location\u201d [15].", "4: Partial, Single and Multi-Context Reconfiguration [15]", "FPGAs tend to map inefficiently to any problem with the typically less than 10% of chip area utilized for logic [15], the remaining being devoted to routing resources."]} diff --git a/edge/graph_11979239.jsonl b/edge/graph_11979239.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e33f9094e6b2567f9a876dd674da5c90dc4665e --- /dev/null +++ b/edge/graph_11979239.jsonl @@ -0,0 +1 @@ +{"28573669|30443041": []} diff --git a/graph_2601045.jsonl b/edge/graph_119797769.jsonl similarity index 100% rename from graph_2601045.jsonl rename to edge/graph_119797769.jsonl diff --git a/edge/graph_11985139.jsonl b/edge/graph_11985139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9da9861d7938d5eaacdf4f9639b810dc108c5666 --- /dev/null +++ b/edge/graph_11985139.jsonl @@ -0,0 +1 @@ +{"12227393|913718": ["The semantic interoperability problem induced by the inevitable occurrence of heterogeneous ontologies used for semantic service annotation can be addressed by appropriate ontology alignment techniques [13]."]} diff --git a/graph_2612055.jsonl b/edge/graph_11988348.jsonl similarity index 100% rename from graph_2612055.jsonl rename to edge/graph_11988348.jsonl diff --git a/edge/graph_11990420.jsonl b/edge/graph_11990420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46c44da8a7b5b1f326d2c81f662c0c3e4150063b --- /dev/null +++ b/edge/graph_11990420.jsonl @@ -0,0 +1 @@ +{"28522079|6952653": ["Some novel approaches for network forensics are discussed for the first time, such as network forensics server, network forensics database, network forensics agents, forensics data integration and active real time network forensic."]} diff --git a/graph_2621834.jsonl b/edge/graph_11990480.jsonl similarity index 100% rename from graph_2621834.jsonl rename to edge/graph_11990480.jsonl diff --git a/edge/graph_11997636.jsonl b/edge/graph_11997636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f92a04b658270f299110eb32e7bff7d457cfef0 --- /dev/null +++ b/edge/graph_11997636.jsonl @@ -0,0 +1,5 @@ +{"24119401|9045705": []} +{"14136014|6116761": []} +{"12325375|9045705": []} +{"1101827|7761990": ["\u2026and that the unmixing matrix (group ICA output) is therefore separable across subjects, GIFT performs a back reconstruction of individual subjects\u2019 time courses and spatial maps based on the output group components and information from the PCA data reduction steps (Calhoun et al.,\n2001, 2009)."]} +{"143196226|9045705": []} diff --git a/graph_2635807.jsonl b/edge/graph_12008176.jsonl similarity index 100% rename from graph_2635807.jsonl rename to edge/graph_12008176.jsonl diff --git a/graph_2650198.jsonl b/edge/graph_12017064.jsonl similarity index 100% rename from graph_2650198.jsonl rename to edge/graph_12017064.jsonl diff --git a/graph_2652752.jsonl b/edge/graph_12027976.jsonl similarity index 100% rename from graph_2652752.jsonl rename to edge/graph_12027976.jsonl diff --git a/edge/graph_12029139.jsonl b/edge/graph_12029139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f02176c1b32e8a4db605ab1d6b28846089b0a1cc --- /dev/null +++ b/edge/graph_12029139.jsonl @@ -0,0 +1,22 @@ +{"17679909|12060835": ["Recently, alternative methods for powering sensor nodes, which convert the ambient energy from environments into electricity to power sensor nodes, are being actively studied [ 1 ], [2]."]} +{"11125784|8280144": ["Stochastic-geometry is a useful the oretical tool in order to model the geometric characteristi cs of a large-scale network and derive its statistical propertie s [23]\u2013 [25].", ", [25], [29], our analysis/result concerns a diff erent problem and is based on different system assumptions."]} +{"10632020|8909218": ["Cellular networks traditionally are modelled using hexagonal grids but such models lack tractability and fail to account for ad hoc BS deployment that is a trend of network evolution [2].", "Last, the ongoing deployment of small-cell networks [2] and the advancements in low-power electronics will substantially reduce the required transmission power of mobiles."]} +{"2508452|387610": ["Layered transmission is a promising approach for achieving a better resource utilization in multimedia applications and has been implemented in different multimedia standards such as JPEG2000 and H.264/SVC [8], [9]."]} +{"3517744|12060835": ["For energy-constrained wireless networks such as sensor networks, harvesting energy from the environment is a convenient and sustainable solution to energy replenishment [1]."]} +{"35964873|2357830": ["Fig. 5 . ADC sampling circuit with level-shifting capability", "Inspired by the wide applications of RFID sensors, significant research efforts have been devoted to address the design challenges of RFID sensors at both software and hardware sides [2], [3], [4], [ 5 ], [6].", "Then, the bottom plate ofC S is switched to ground by alteringS 5 -S 5 and, consequently, the voltage at node A becomesV SEN !V REF . After that, the ADC will follow the same charge redistribution procedure to determine the rest output bits.", "In the proposed RDC design, we eliminate the constraint of the design,V REF >V SEN , by using a novel circuit technique, which is sketched in Figure 5 . In the figure,C S is the sampling capacitor of the ADC circuit.", "Then, the bottom plate ofC S is switched to ground by alteringS 5 -S 5 and, consequently, the voltage at node A becomesV SEN !V REF . After that, the ADC will follow the same charge redistribution procedure to determine the rest output bits.", "After the sampling operation, the ADC comparator first comparesV REF andV SEN . If V REF >V SEN ,0is assigned to the MSB of the RDC output; the status of switchS 5 is not altered and hence the voltage at node A remainsV SEN . Thereafter, the ADC circuit operates as a typical CR ADC circuit to generate the rest bits of the RDC output."]} +{"2550751|7686677": ["N\nI] 1\n8 A\nSpectrum efficiency and energy efficiency are two critical issues in designing wireless networks."]} +{"17054413|12029139": []} +{"16191957|12060835": []} +{"7518568|12029139": ["The motivations lie in two aspects: the multiple antenna can greatly improve the WPT efficiency by energy beamforming [6]; and a low-complexity design with simple multi-user access scheme other than [11] is highly appreciated [1].", "The interested readers are referred to [1] and references therein for a comprehensive survey on RF-EH based wireless communication networks."]} +{"23562296|7686677": ["Energy Harvesting in Cognitive Radio Networks Like other communications systems, energy efficiency and energy harvesting are important issues for cognitive radio [4]."]} +{"3965797|12029139": []} +{"12412620|1230643": []} +{"6783658|1230643": ["W IRELESS SENSOR NETWORKs (WSNs) are generally composed of a large number of small and low-cost sensor nodes, usually operated with small batteries which are difficult, or even impossible, to be replaced or recharged by direct human intervention [1]."]} +{"41228153|2357830": ["Juels [54] presents a scheme for a reader R and a tag Ti to maintain synchronized states up to no more than d mismatches (it is assumed that initially R and Ti share a secret key ki)."]} +{"8034476|12029139": ["from the received signal by switching its working mode from the EH mode to ID mode [38]."]} +{"17778918|12029139": []} +{"6611238|12060835": ["Various energy sources, such as light, vibration or heat are available to be harvested [5]."]} +{"3899178|12060835": ["Examples of energy that can be harvested include solar energy, piezoelectric energy, bioenergy and thermal energy [1], etc."]} +{"6094829|12060835": ["Furthermore, [10] presents a detailed survey on ambient energy harvesting options such as sun, vibration, body heat, foot strike and so on."]} +{"16593269|7686677": ["y footprint of communications, modern architectures consider energy not as an unlimited resource, as it traditionally was, but as a scarce resource which plays a signi\ufb01cant role in system design [3], [4]. In line with the contemporary trend towards renewable sources, energy harvesting appears as a viable solution to powering wireless communications nodes [5]\u2013[7]. In addition, energy harvesting offers"]} +{"16593269|12060835": []} diff --git a/graph_1204089.jsonl b/edge/graph_1204089.jsonl similarity index 100% rename from graph_1204089.jsonl rename to edge/graph_1204089.jsonl diff --git a/graph_266462.jsonl b/edge/graph_12047910.jsonl similarity index 100% rename from graph_266462.jsonl rename to edge/graph_12047910.jsonl diff --git a/graph_2669135.jsonl b/edge/graph_12050023.jsonl similarity index 100% rename from graph_2669135.jsonl rename to edge/graph_12050023.jsonl diff --git a/graph_2669421.jsonl b/edge/graph_12053320.jsonl similarity index 100% rename from graph_2669421.jsonl rename to edge/graph_12053320.jsonl diff --git a/edge/graph_12060835.jsonl b/edge/graph_12060835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e1d573dad9cd6169605ec474b21c20afdda9475 --- /dev/null +++ b/edge/graph_12060835.jsonl @@ -0,0 +1,9 @@ +{"1284934|14441987": ["Most previous research on ad-hoc network routing [17, 13, 23, 24, 26, 30, 19, 18] focused on the protocol design and performance evaluation in terms of the message overhead and loss rate."]} +{"30192451|2835258": ["Parameter combination Representative topological routing\n1-hop \u2014 Flat Edge Forwarding, Liu's Flooding Algorithm\n1-hop \u2014 Hierarchical CBRP\nk-hop \u2014 Flat ZRP, IZRP, TZRP\nk-hop \u2014 Hierarchical k-hop cluster-based DSR\nD-hop \u2014 Flat DSDV\nD-hop \u2014 Hierarchical N/A\n\u25a0 Table 2.", "By maintaining two different zones, TZRP aims to decouple the capability of the protocol to adapt to traffic characteristics from the capability of adapting to mobility.", "In another ZRP variant, Two Zone Routing Protocol (TZRP) [9], each node maintains two zones: a crisp zone and a fuzzy zone."]} +{"11444935|14441987": ["Since research on ad hoc routing began with packet radio networks, numerous protocols have been proposed [7]."]} +{"14883250|1230643": ["While many researchers assume that all nodes in a sensor network are battery-driven [1, 4, 12, 13], nodes can also be powered by other energy sources such as gravitation or solar power."]} +{"14314501|205286988": []} +{"206575935|1230643": ["Therefore, a sensor node's lifetime, presents a unique dependence on battery lifetime [1].", "Sensor nodes deployed in a sensor field (redrawn from [1])."]} +{"3606260|1230643": ["suitable for bursty traffic and is not a good choice here [1].", ", in transmitter and receiver) is the dominant factor [1]."]} +{"6809369|1236072": ["In general, routing in WSNs can be classified as either flat-based routing or hierarchical routing, depending on the network structure [2]."]} +{"7056671|10562205": ["These nodes are often have energy constrained that is, battery power and devices are free to join or leave the network [1-2].", "Routing can be either flat structured or hierarchical structure [1-2]."]} diff --git a/edge/graph_12068725.jsonl b/edge/graph_12068725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a09533013b6e94b8b2aece737d47d38feefc69bc --- /dev/null +++ b/edge/graph_12068725.jsonl @@ -0,0 +1,6 @@ +{"3068042|12068725": ["EDPCG primarily focuses on bottom-up, search-based [6] approaches for generating content, which are driven by computational heuristics of player experience.", "employing PCG algorithms since the 80s, academic research on PCG methods (such as the search-based PCG paradigm [6]) has bloomed only in the last five years.", "global optimization techniques such as evolutionary algorithms and particle swarm optimization [6]."]} +{"3068042|3387861": ["Such signals are obtained through electrocardiography (ECG) [13], galvanic skin response (GSR) [11], respiration [13], electroencephalography (EEG) [15], and electromyography (EMG).", "For instance, existing techniques for physiological recording require physical contact between body parts (e.g., head, fingertips) and sensors, making physiological signals such as EEG and skin conductance impractical and intrusive.", "through electrocardiography (ECG) [13], galvanic skin response (GSR) [11], respiration [13], electroencephalography (EEG) [15], and electromyography (EMG).", "On a positive note, recent advances in sensor technology have resulted in low-cost unobtrusive biofeedback devices appropriate for gaming applications (such as the Emotiv2 EEG system and Empatica\u2019s Embrace bracelet3)."]} +{"10938202|12068725": ["Another very interesting area, in which there is growing interest both from the CI and AI research communities and from game developers, is procedural content generation (PCG)."]} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} +{"15301715|1708582": ["\u2026traditional reinforcement learning (RL) techniques such as temporal differences and Q-learning have many of these properties in simple domains (Kaelbling et al. 1996; Santamaria et al. 1998; Sutton and Barto 1998; Watkins and Dayan 1992), they do not currently scale up well to the complexity\u2026"]} +{"16364858|8530790": ["1A more appropriate method of evolving against these criteria may be to use a multi-objective approach [19]."]} diff --git a/graph_2670373.jsonl b/edge/graph_12075520.jsonl similarity index 100% rename from graph_2670373.jsonl rename to edge/graph_12075520.jsonl diff --git a/graph_2685137.jsonl b/edge/graph_12076108.jsonl similarity index 100% rename from graph_2685137.jsonl rename to edge/graph_12076108.jsonl diff --git a/graph_1207973.jsonl b/edge/graph_1207973.jsonl similarity index 100% rename from graph_1207973.jsonl rename to edge/graph_1207973.jsonl diff --git a/edge/graph_12083425.jsonl b/edge/graph_12083425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c08cd65450d6c532e96636c04431114dc50dc21 --- /dev/null +++ b/edge/graph_12083425.jsonl @@ -0,0 +1,3 @@ +{"19595908|17774971": []} +{"33468222|17774971": []} +{"313806|17774971": ["power-reducing voltage stress on the power-switching devices and to produce high-quality output voltages [7]\u2013[15]."]} diff --git a/edge/graph_12092129.jsonl b/edge/graph_12092129.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9dfc078cb30ad97df49c1c056c961a0453fe0178 --- /dev/null +++ b/edge/graph_12092129.jsonl @@ -0,0 +1,7 @@ +{"2266786|1497912": []} +{"6920755|12068725": ["PCG is a search-based approach wherein parts of the game (e.g. maps, textures, items, quests, etc.) are generated algorithmically rather than being hand-designed (Togelius et al. 2011).", "Of particular note are EC and other meta-heuristic approaches (Togelius et al. 2011) that can further save on development costs and may be able to produce unique content beyond what human designers might have created.", "Search-based procedural content generation (PCG) is a recent topic of interest in video game research (Togelius et al. 2011) wherein parts of the game are created algorithmically rather than being hand-designed.", "This section reviews related work on procedural content generation and also the technologies that enable the flower encoding introduced in this paper."]} +{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]} +{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} +{"4612779|12068725": ["In particular, evolutionary computation and other searchbased approaches [3] can limit the need for hand-designed rules, and may thus further save on PCG development costs.", "A promising technique for automatically creating new game content is procedural content generation (PCG; [1], [2], [3]).", ") to be generated algorithmically rather than through direct human design [3], [5]."]} +{"15514191|12068725": ["Other successful CPPN-based applications include Picbreeder [19], MaestroGenesis [9], EndlessForms [4], the GAR video game [7], folded wire robots [17], and virtual soft-body robots [3].", "The flowers in Petalz are generated by a variation of artificial neural networks (ANNs), called compositional pattern producing networks (CPPNs [22]), which differ in their set of activation functions and how they are applied.", "This section first discusses social and casual games, as well as existing work combining PCG with traditional video games."]} diff --git a/graph_2703920.jsonl b/edge/graph_12096466.jsonl similarity index 100% rename from graph_2703920.jsonl rename to edge/graph_12096466.jsonl diff --git a/edge/graph_12098072.jsonl b/edge/graph_12098072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a750ff0fc46b9bead7b30f3c5a944a4f22f71281 --- /dev/null +++ b/edge/graph_12098072.jsonl @@ -0,0 +1,2 @@ +{"18319107|8783262": []} +{"7978698|17774971": ["826 Proceedings of the IEEE |V ol. 95, No. 4, April 2007 high-frequency pulsewidth-modulation (PWM) multilevel inverters, and the fundamental-frequency multilevel inverters [ 51 ], [52]."]} diff --git a/graph_1210137.jsonl b/edge/graph_1210137.jsonl similarity index 100% rename from graph_1210137.jsonl rename to edge/graph_1210137.jsonl diff --git a/graph_2713392.jsonl b/edge/graph_12103141.jsonl similarity index 100% rename from graph_2713392.jsonl rename to edge/graph_12103141.jsonl diff --git a/graph_2714078.jsonl b/edge/graph_12112439.jsonl similarity index 100% rename from graph_2714078.jsonl rename to edge/graph_12112439.jsonl diff --git a/graph_2717662.jsonl b/edge/graph_12115866.jsonl similarity index 100% rename from graph_2717662.jsonl rename to edge/graph_12115866.jsonl diff --git a/edge/graph_12120167.jsonl b/edge/graph_12120167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..424d1ee2094d53b5323f54e78e8ac86026b56d7e --- /dev/null +++ b/edge/graph_12120167.jsonl @@ -0,0 +1,7 @@ +{"59706135|9175918": ["Chaos theory with excellent unpredictability is suitably used in encryption system [3-4]."]} +{"1850737|8649087": ["An overview of current requirements and implementations of content protection systems for digital multimedia data is given in [ 3 ]."]} +{"17942728|9175918": []} +{"18342884|9175918": ["Chaotic systems are indeed characterized by sensitive dependence on initial conditions and similarity to random behavior, properties which seem pretty much the same required by several cryptographic primitives (see [20] for a brief overview)."]} +{"8243698|3540699": ["264[31]: is a block-oriented motion-compensation-based codec standard, and contains a number of new features that allow it to compress video much more effectively than older standards and to provide more flexibility for application to a wide variety of network environments."]} +{"8243698|15126268": []} +{"314070|9175918": ["The nonlinearity of the encryption function f is measured using the linear approximation probability ( LP f ), de\ufb01ned as (see [Jakimoski & Kocarev, 2001]): where a and b are two bit masks, and \u2022 denotes the parity of bit-wise product.", "As a result of investigating the above relationship, a rich variety of chaos-based cryptosystems for end-to-end communications have been put forward [Hasler, 1998; \u00b4Alvarez et al. , 1999b; Silva & Young, 2000; Kocarev, 2001; Li, 2003; Yang, 2004; Li, 2005a,b].", "For a comprehensive survey of digital chaos-based cryptosystems, see [\u00b4Alvarez et al. , 1999b; Silva & Young, 2000; Kocarev, 2001; Li, 2003, 2005b].", "For a comprehensive survey of digital chaos-based cryptosystems, see [\u00c1lvarez et al., 1999b; Silva & Young, 2000; Kocarev, 2001; Li, 2003, 2005b].", "Digital chaos-based cryptosystems (also called digital chaotic ciphers), on the other hand, are designed for digital computers, where one or more chaotic maps are implemented in \ufb01nite computing precision to encrypt the plain-message in a number of ways, such as the following ones: \u2022 Stream ciphers based on chaos-based PRNG (pseudo-random number generators) [Wolfram, 1985; Matthews, 1989; Berstein & Lieberman, 1991; Zhou & Ling, 1997a; Li et al. , 2001; Lee et al. , 2003]; \u2022 Chaotic stream ciphers via inverse system approach (with ciphertext feedback) [Frey, 1993; Zhou & Ling, 1997b; Zhou & Feng, 2000; L\u00a8u et al. , 2004]; \u2022 Block ciphers based on chaotic round function or S-boxes [Kocarev et al. , 1998; Guo et al. , 1999; Jakimoski & Kocarev, 2001; Papadimitriou et al. , 2001; Tang et al. , 2005]; \u2022 Block ciphers based on forward/backward chaotic iterations [Habutsu et al. , 1991; Fridrich, 1998; U\u00b4\u0131s et al. , 1998; Masuda & Aihara, 2002]; \u2022 Chaotic ciphers based on searching plain-bits in a chaotic pseudo-random sequence [Baptista, 1998; \u00b4Alvarez et al. , 1999a; Wong et al. , 2001; Li et al. , 2004c; Huang & Guan, 2005; Xiao et al. , 2005].", "\u2026Zhou & Feng, 2000; L\u00a8u et al. , 2004]; \u2022 Block ciphers based on chaotic round function or S-boxes [Kocarev et al. , 1998; Guo et al. , 1999; Jakimoski & Kocarev, 2001; Papadimitriou et al. , 2001; Tang et al. , 2005]; \u2022 Block ciphers based on forward/backward chaotic iterations [Habutsu et al.\u2026", "The di\ufb00erential approximation probability of a given map f ( DP f ) is de\ufb01ned as (see [Jakimoski & Kocarev, 2001]): where 2 n is the cardinality of P ."]} diff --git a/edge/graph_12122055.jsonl b/edge/graph_12122055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af879d8074d88fbc8ba9a8b044b78edc8f85ca94 --- /dev/null +++ b/edge/graph_12122055.jsonl @@ -0,0 +1,10 @@ +{"122907607|7064380": []} +{"15254027|634975": ["As a result, many authors within several disciplines have developed and analyzed games that include the effects of punishment as a way to foster cooperation among humans [7\u20139]."]} +{"13961767|634975": ["Very recently [328] the attention of the community has been extended to the n-player (n > 2) generalization of the PDG, also called Public Goods Game (PGG) [343]."]} +{"14989546|9828770": []} +{"2415158|6923178": ["The other summary statistic for the raw closeness to the network is the Matthews Correlation Coefficient (MCC) [75,72].", "The MCC is defined as follows:\nMCC = TP \u00b7 TN \u2212 FP \u00b7 FN\u221a (TP + FP)(TP + FN)(TN + FP)(TN + FN) .", "(9)\nThe ACC, F1 score, and MCC provide a summary of the TP, TN, FP, and FN.", "This measure is proportional to the Q\u03b1 measure discussed in [72]."]} +{"118376889|9828770": []} +{"118376889|15604179": ["BC models have been recently reviewed in (Lorenz, 2007)."]} +{"8313629|9828770": []} +{"18708604|634975": []} +{"7937343|634975": ["Many have since followed the same practice [46, 50, 51] (for a review see [14]), and there exist ample evidence in support of the claim that, especially for games that are governed by gro up interactions [47, 52], using the square lattice suffices to r eveal all the feasible evolutionary outcomes, and also that these are qualitatively independent of the interaction structure."]} diff --git a/edge/graph_12126073.jsonl b/edge/graph_12126073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec275308a5ae76dd0fead53995d1029b3bad852c --- /dev/null +++ b/edge/graph_12126073.jsonl @@ -0,0 +1 @@ +{"948461|3148588": []} diff --git a/graph_2728814.jsonl b/edge/graph_12127129.jsonl similarity index 100% rename from graph_2728814.jsonl rename to edge/graph_12127129.jsonl diff --git a/edge/graph_12127373.jsonl b/edge/graph_12127373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36029dfad951eb572a8187e6e3d3acac32ec485a --- /dev/null +++ b/edge/graph_12127373.jsonl @@ -0,0 +1 @@ +{"40355090|16362395": []} diff --git a/graph_121289.jsonl b/edge/graph_121289.jsonl similarity index 100% rename from graph_121289.jsonl rename to edge/graph_121289.jsonl diff --git a/edge/graph_12130888.jsonl b/edge/graph_12130888.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f3475c94942c60dbf822b2fbd7f609f6ebd0d5e --- /dev/null +++ b/edge/graph_12130888.jsonl @@ -0,0 +1,10 @@ +{"37238955|7971188": ["The resource is then accessible by any peers within the overlay using an unique key called hash [27]."]} +{"61286612|14697846": []} +{"214976|14889616": []} +{"214976|973730": ["To address this, various streaming systems have proposed using scalable coding techniques such as layered coding [12], [25]."]} +{"14682967|7439310": []} +{"15264793|973730": ["Many multimedia applications, such as NetTV and news broadcast, involve live media streaming from a source to a large population of users [18].", "There have been significant studies on video over IP multicast in the past decade; see a survey in [18]."]} +{"1294859|10287248": ["Some heuristic QoS routing algorithms have been proposed (see [17, 86] for an excellent survey of existing multicast QoS routing schemes).", "There has been extensive research into multicast routing algorithms and protocol [17, 73, 86]."]} +{"22801067|15516254": ["Detailed studies of these elements can be found in [ 6-9 ].", "Net\u00ad work support in the form of agents or special router mecha\u00ad nisms may benefit the designers of congestion control schemes [ 6 ]."]} +{"22801067|713082": []} +{"22801067|6265393": []} diff --git a/graph_2762290.jsonl b/edge/graph_12135664.jsonl similarity index 100% rename from graph_2762290.jsonl rename to edge/graph_12135664.jsonl diff --git a/edge/graph_12140853.jsonl b/edge/graph_12140853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62d0910a5e809d73dfcc5a69f59ada6e5efb3870 --- /dev/null +++ b/edge/graph_12140853.jsonl @@ -0,0 +1,3 @@ +{"2486574|1400872": ["Neural Networks literature [Pea95]."]} +{"39595422|393948": []} +{"1611540|6923178": []} diff --git a/edge/graph_12150819.jsonl b/edge/graph_12150819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0edc57e8528e8bee7b5928b34ad9f316e4f99eb --- /dev/null +++ b/edge/graph_12150819.jsonl @@ -0,0 +1,4 @@ +{"55920039|3348390": ["[13] derived context acquisition, context modelling, context reasoning, and context dissemination as four phases in a typical context management system."]} +{"34875838|3348390": []} +{"15649786|26336776": []} +{"15537063|17474643": ["Some of the main cloud federation works being developed are funded by the European Union: Contrail, Reservoir and mOSAIC [13]."]} diff --git a/edge/graph_12159323.jsonl b/edge/graph_12159323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1be436d061f806e39fa36c10e25d6ee89cb0875a --- /dev/null +++ b/edge/graph_12159323.jsonl @@ -0,0 +1,4 @@ +{"13094487|14022133": ["The survey [14] provides a thorough classification of the types of changes that occur in ontologies."]} +{"13094487|2034384": ["To cope with the history of data changes, temporal models have been proposed for the relational [38] and ER [16] models, for semi-structured data [5], XML [36] and for RDF [17].", "A survey on temporal extensions to the Entity-Relationship (ER) model is presented by Gregersen and Jensen [16]."]} +{"5894402|7216558": ["Very often, TDLs are constructed as a combination of a standard description logic (e.g., ALC) with a standard temporal logic (e.g., LTL); see (Lutz, Wolter, and Zakharyashev 2008)."]} +{"2564186|7216558": ["This de\ufb01ciency has been recognized in the Semantic Web community, and a number of approaches for the representation, reasoning, and querying of validity time were developed [22, 23, 24, 25, 26, 27, 28, 29]; we discuss various aspects of these approaches in Section 7.", "There are numerous proposals in the literature for extending description logics with validity time; Artale and Franconi [26] and Lutz et al. [27] presented comprehensive surveys of the relevant results."]} diff --git a/graph_2762484.jsonl b/edge/graph_12159857.jsonl similarity index 100% rename from graph_2762484.jsonl rename to edge/graph_12159857.jsonl diff --git a/edge/graph_12161567.jsonl b/edge/graph_12161567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6548b5ca891d86a8bb475986d87cfbc4661c8a23 --- /dev/null +++ b/edge/graph_12161567.jsonl @@ -0,0 +1,6 @@ +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"828421|885218": ["Our research is closely related to ontology-based information extraction (OBIE) which combines information extraction with knowledge representation by using ontologies to guide information extraction [8]."]} +{"11564235|885218": ["To find these candidates, systems leverage a small amount of training data and use bootstrapping to find extraction patterns[7], which in turn are used to generate additional candidate facts from text."]} +{"14785033|386036": ["Entity resolution has been studied under various names including record linkage, merge/purge, deduplication, reference reconciliation, object identification, and others (see [15], [14] for recent surveys)."]} +{"207372751|1805048": ["tering 2 framework [30]. 2 Collaborative \ufb01ltering is the process of \ufb01ltering for information or patterns using techniques involving collaboration among multiple agents, viewpoints, data sources, etc. [29] 5 Node similarity can be de\ufb01ned by using the essential attributes of nodes: two nodes are considered to be similar if they have many common features [31]. However, the attributes of nodes are general"]} +{"51758607|6486398": ["1.3 HITS and TOPHITS Many methods for analyzing the web, like PageRank [43] and HITS [27], are based on the adjacency matrix of a graph of a collection of web pages; see, e.g., Langville and Meyer [33, 34] for a general survey of these methods.", ", Langville and Meyer [33, 34] for a general survey of these methods."]} diff --git a/edge/graph_12162909.jsonl b/edge/graph_12162909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..674d9599aa23df063f4555f373d5835e1b23bcf6 --- /dev/null +++ b/edge/graph_12162909.jsonl @@ -0,0 +1,7 @@ +{"207224679|16467945": []} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"33928876|16467945": ["Such exact methods have complementary strengths to stochastic metaheuristic, and recent surveys have emphasized the importance of research into such hybridizations [7, 6, 26, 46 ]."]} +{"33928876|63137": ["ACO is also closely related to some forms of EDAs [15, 58 ], specifically to the univariate marginal distribution algorithm (UMDA) [39, 38] and to", "We use Ant Colony Optimization (ACO [22]), a particular constructive model-based metaheuristic [7, 58 ], as the vehicle for this exploration."]} +{"33928876|15527933": ["However, the results of this research have not always been useful in practice for a variety of reasons among them the over-simplification of the scheduling problems to make them tractable by the techniques applied [ 57 ]."]} +{"9305297|16467945": ["An overview of such approaches is presented in [8]."]} diff --git a/graph_1216662.jsonl b/edge/graph_1216662.jsonl similarity index 100% rename from graph_1216662.jsonl rename to edge/graph_1216662.jsonl diff --git a/edge/graph_12166652.jsonl b/edge/graph_12166652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..437c9ad5078d953251c47766852fcdc6f9ff0331 --- /dev/null +++ b/edge/graph_12166652.jsonl @@ -0,0 +1,2 @@ +{"17281359|3102110": ["In this study, the affinity-based association rule mining algorithm (Shyu et al., 1999) and the basic association rule mining approach (Agrawal et al., 1993; Chen et al., 1996) are compared by using the same database management systems in the discovery of the quasi-equivalence relationships.", "In other words, the support factor indicates the frequencies of the occurring patterns in the rule, and the confidence factor denotes the strength of implication of the rule (Chen et al., 1996).", ", 1999) and the basic association rule mining approach (Agrawal et al., 1993; Chen et al., 1996) are compared by using the same database management systems in the discovery of the quasi-equivalence relationships."]} +{"45769180|16766019": ["The SIC techniques are useful to speed up the retrieval process in content-based image searching systems [12,17]."]} diff --git a/edge/graph_12177903.jsonl b/edge/graph_12177903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..594e369d13f2cfcae14e35c56f12376261777616 --- /dev/null +++ b/edge/graph_12177903.jsonl @@ -0,0 +1 @@ +{"16919759|9240891": []} diff --git a/graph_2769147.jsonl b/edge/graph_12186658.jsonl similarity index 100% rename from graph_2769147.jsonl rename to edge/graph_12186658.jsonl diff --git a/edge/graph_12187684.jsonl b/edge/graph_12187684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9f942d80432f0d97a2097e43729ad2174734fe3 --- /dev/null +++ b/edge/graph_12187684.jsonl @@ -0,0 +1,65 @@ +{"14412285|3540699": ["periodically using a Group of Pictures (GOP) structure as in [ 22 ][23], which lasts a period of T time"]} +{"1079645|8909218": []} +{"24813895|7851743": ["SON has been addressed as inevitable solution in different sources [1], [5] for MBN optimization.", "Strategies for optimizing energy consumption in MBNs presented in [1], [6] can be subdivided into physical optimization, e."]} +{"24813895|7686677": ["Strategies for optimizing energy consumption in MBNs presented in [1], [6] can be subdivided into physical optimization, e."]} +{"9704070|2509135": ["Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)", "spaces via cognitive radio techniques [157], e) dynamic"]} +{"9704070|12884178": ["expressive power of context representations [25], d) relay and mesh-enabled networks development with cooperative communication features in OFDMA-based wireless network technologies [126] [156] and exploitation of spectrum white", "Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)"]} +{"9704070|14745481": []} +{"9413775|8606364": ["There are articles on the methodological aspects [19], [28], guidelines [26], [27], and time-domain modeling [29], [30] of spectrum measurements.", "The use of equipment that is not matched to the signals present in the environment has led to dubious findings and conclusions, such as the claim in [29], where several papers report that the satellite bands below 3 GHz are unutilized.", "The data is processed to estimate the spectrum occupancy and models are developed [29], [79] to characterize the use of the spectrum being studied.", "Furthermore, a useful survey on spectrum occupancy modeling [29] provided good insight especially on time-"]} +{"9413775|2398835": [", graphical processing units (GPU) [98] in conjunction with distributed database storage, processing and access [99] are becoming mainstream in the development", "To overcome the scaling problem for large scale datasets, sparse approximation methods [73] and parallel computing approaches [99] can be applied."]} +{"9413775|5621151": ["Our work extends the previous research reported in [19] and [26]\u2013[35]."]} +{"3386782|14889616": ["E-mail: Partha.Dutta@xerox.com."]} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"12357259|8363289": []} +{"3214405|8909218": ["Among the main factors influencing the QoE are the (1) amount of time spent in rebuffering and the distribution of rebuffering event over the streaming session, (2) the average and minimum video quality during the streaming session, (3) the number and distribution of quality changes, and (4) the\u2026", "In addition, an increasing fractionof the video content is distributed via wireless networks, including mobile networks, leading to a dramatic increase of wireless data traffic."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"6004579|7686677": ["This traffic growth is not only adding more pressure to the network and user device energy drain but also increases network operational expenditures (OPEXs) and negatively impacts the environment [1]."]} +{"33832960|1775475": []} +{"33832960|14441987": []} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"18738609|8909218": ["\u2026in traf\ufb01c volume, mobile data of\ufb02oading , where the traf\ufb01c originally targeted for cellular network is delivered over other complementary networks (such as Wi-Fi [2] or femtocell [3]), is a cost-ef\ufb01cient solution to alleviate the increasingly severe congestion problem in the cellular networks [2].", "We take into account the operation cost (e.g., the backhaul, energy, and management cost [3], [4]), queueing delay , and traf\ufb01c load in different networks when optimizing the network selection."]} +{"22573491|20905429": ["The aggregated biometric data will then utilize an Internet connection to some higher supervisory level, such as a remote medical center, within the network [1]\u2013[3]."]} +{"10870557|14889616": ["Overview of the scalable \nvideo coding extension of the H.264/AVC standard.", "Cross-layer adaptive H.264/AVC \nstreaming over IEEE 802.11e experimental testbed.", "A cross-layer design to \nimprove the H.264 video stream over IEEE wireless networks is proposed by Mai et al. [2010].", "Several similar preload approaches use (hierarchical, layered) scalable \nvideo codecs like scalable MPEG (SPEG) [Huang et al. 2003; Krasic et al. 2003], Multiple Description \nCoding (MDC) [Goyal 2001] and the Scalable Video Coding (SVC) extension to H.264 [Schwarz et al. 2007] \nto adapt to varying network conditions.", "\u2026approaches use (hierarchical, layered) scalable \nvideo codecs like scalable MPEG (SPEG) [Huang et al. 2003; Krasic et al. 2003], Multiple Description \nCoding (MDC) [Goyal 2001] and the Scalable Video Coding (SVC) extension to H.264 [Schwarz et al. 2007] \nto adapt to varying network conditions.", "Thus, we do not have need for H.264/SVC, which is not available on most mobile \ndevices today anyway."]} +{"14129863|17428811": ["Scalable video coding (SVC) is one approach to enable flexible video transmission over channels with varying throughput [1], [2]."]} +{"1838785|64404": ["Note that, in a video stream, the video frames are partitioned in Groups of Pictures (GoPs) and the video data rate can only be adapted at the boundary of GoPs [32], [33]."]} +{"1838785|14889616": ["To address this problem, various video rate-adaptation techniques based on scalable video coding or adaptive bitrate switching have been proposed to match the video data rate to the varying channel capacity [5]\u2013[9]."]} +{"1838785|3540699": ["Note that, in a video stream, the video frames are partitioned in Groups of Pictures (GoPs) and the video data rate can only be adapted at the boundary of GoPs [32], [33].", "Note that, in a video stream, the video frames are partitioned in Groups of Pictures (GoPs) and the video data rate can only be adapted at the boundary of GoPs [29] [30]."]} +{"9347860|7686677": ["UE. objective function and Resource Sharing Factor \u2013 During \u03c4, the BS resource elements can be shared in arbitrary ratios between the users. We define the Therefore, the resource sharing factor \ud835\udc65\ufffd,\ufffd\u2208 [0, 1] as the fraction of time that the BS resources are assigned to user upcomini at each time slot t. The received data rate is then \ud835\udc65\ufffd,\ufffd\ud835\udc5f\ufffd,\ufffd . Lower air-time corresponds to less energy consumption as the", "rain at both the network and end user. Consequently, research and standardization efforts are focusing on devising green mechanisms to save energy across all network elements, as well as user devices [1]. Among the wireless network elements, Base Stations (BSs) account for more than 50 percent of the network energy consumption [2]. Therefore, devising green radio access strategies is vital for overal"]} +{"9539823|9207335": ["Our proposal is suitable for many technologies: cellular environments [18], especially from 3G to 4G, could benefit from our prediction scheme, as well as more recent WLAN families [19]."]} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"19754216|11726599": ["admission control [1], dynamic bandwidth allocation [2], and adaptive traffic rate control for the available bit rate (ABR) service [3]."]} +{"26951797|14889616": ["264/SVC) [10] is used to encode video content into base and several enhancement layer content to support progressive transmission."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"2003896|2355696": []} +{"2003896|20905429": []} +{"2003896|1118130": ["This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the anticipated stress level is within healthy boundaries.", "This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the\u2026"]} +{"512561|6556803": ["These small motes can be deployed for large number of applications, for example, indoor sensing, industrial automation, forest fire detection, remote surveillance, and collecting weather information [57]\u2013 [64]."]} +{"512561|2443013": ["In [3], authors classified various spectrum aggregation schemes and revealed that channel aggregation is a powerful mechanism of improving throughput, however, the rate of throughput increase does not follow the same pattern in case of high traffic flow.", "Two of the relevant works in this context are [3] and [4], where both have focused on channel aggregation techniques.", "Strategies for optimum channel selection can help to satisfy QoS requirements for channel aggregation in high speed networks [3]."]} +{"512561|1503157": ["WSNs have recently been introduced in this process where the temperature of each container, along with its location, is regularly sensed and monitored from a remote location [150]."]} +{"512561|1230643": ["However, in the context of CRSNs, we need to investigate whether the same relationship between throughput and channel width exists considering the specific set of constraints faced by CRSNs.", "To make this investigation more meaningful, we discuss it through the following example scenarios where sensor nodes have been replaced with CRSNs.", "An important thing to note is that CRSNs lie at the center of these requirements as all these requirements are equally important for their successful implementation.", "The efficient radio resource allocation in CRSNs is important due to the dynamic channel selection of CR nodes.", "WSNs enriched with the additional capabilities of cognitive radio has led to the evolution of cognitive radio sensor networks (CRSNs) [20], [21].", "CB in CRSNs also face certain challenges which are needed to be optimized for its wide applicability in future applications.", "Although these schemes work quite well in traditional networks, the concept of self-organizing and self-healing nodes makes them inappropriate for CRSNs [14].", "The next section i.e Section II discusses the related work; Section III provides background on wireless networks and major requirements in their applications; CB is introduced in Section IV; CB schemes in the cellular networks, WLANs, WSNs, CRNs, and CRSNs are discussed in Sections V, VI, VII, VIII and IX respectively; Section X provides the guidelines on using CB for CRSNs, and Section XI concludes the paper.", "To our knowledge, there exists no protocol for CB in CRSNs.", "CRSNs having high bandwidth requirements, for instance, wireless multimedia sensor networks (WMSNs) can get benefit of CB approach to satisfy network requirements.", "By implementing CB in cellular networks, WLANs, WSNs, CRNs and CRSNs, one can satisfy the requirements of bandwidthhungry nodes.", "Wireless Body area networks (WBANs), emerging as promising approach for ubiquitous health monitoring systems [22]\u2013[24], are also an application area of CRSNs and CB plays an important role for providing high bandwidth to these systems.", "CB in CRSNs has to cope with twofold issues [147]; firstly, it has to use low transmit power due to life time of the powerconstrained sensor nodes; and secondly, it has to provide maximum capacity gain to CR nodes.", "Due to potential advantages of CRSNs, it can be deployed in many applications [16].", "Hence, it is interesting to investigate whether and how CB can help CRSNs.", "Therefore, energy constraints have been much investigated at all the layers of these networks [14], [65], [66].", "A comprehensive survey on radio resource allocation in CRSNs has been presented recently in [148].", "WSNs have attracted a lot of attention in industrial automation [13], defense applications [14], utility metering and home automation [15], just to name a few."]} +{"37925315|12681089": []} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"2261490|6581557": ["Traffic collection closer to the end user will provide input for a more accurate estimate of QoE, as discussed also in [85]."]} +{"31417645|8974063": []} +{"19011758|206901977": ["Many metric-based routing protocols for mesh\nnetworks that track Link Quality (LQ) and select higherquality links have been proposed to minimize traffic congestion and maximize delivery rate [5], [6], [7], [8].", "Therefore, DTRACK adapts path sampling rates to minimize the number of missed changes based on NN4\u2019s predictions."]} +{"19011758|4730": []} +{"19011758|207372751": ["Moreover, routing algorithms should avoid weak links as soon as possible [9], and whenever possible [10].", "In summary, the main contributions of this work are (1) the employ of time series analysis to estimate link quality in the routing layer for real-world WMCN, (2) the detailed evaluation of results, assuming several learning algorithms to show the potentiality of time series analysis for estimating\u2026", "This predictor is based on Rule-Fit, a well-known machine learning technique, that takes into account inputs as route prevalence, route age, number of past route changes, and number of times a route appeared in the past."]} +{"898501|1805048": ["Su and Khoshgoftaar [36] concentrated more on CF methods, including memory-based, model-based, and hybrid methods.", "Category Algorithms Constant Baseline User Average Item Average User-based [36] Memory User-based w/ Default [5] -based Item-based [31] Item-based w/ Default Regularized SVD [25] Matrix NMF [19] Factorization PMF [30] -based Bayesian PMF [29] Non-linear PMF [17] Slope-One [20] Others NPCA [41] Rank-based CF [37]"]} diff --git a/edge/graph_12187956.jsonl b/edge/graph_12187956.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e021706255759b6a8a276ba8af86b8450a936a1 --- /dev/null +++ b/edge/graph_12187956.jsonl @@ -0,0 +1 @@ +{"56691794|17003768": ["A list-coloring problem (LCP) is a GCP in which Li, available colors for each vertex vi, can be different [24,28].", "The GCP Solutions\nThe GCP, well known to be an NP-hard problem [24,25,29], involves finding the smallest integer k such\nthat a valid k-coloring exists for graph G.", "The LCP is harder to solve than the GCP and is also known to be NP-hard [28].", "This approach may result in a global optimum solution, but it suffers from several disadvantages:\nHigh complexity: Centralized approaches solve an NP-hard optimization problem which is computationally expensive.", "This problem is well-known to be NP-hard and finding its exact solution is computationally intensive."]} diff --git a/graph_278772.jsonl b/edge/graph_12191011.jsonl similarity index 100% rename from graph_278772.jsonl rename to edge/graph_12191011.jsonl diff --git a/edge/graph_12191695.jsonl b/edge/graph_12191695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6b012ebd6b74259a9b0debcdad1508ad774eaf0 --- /dev/null +++ b/edge/graph_12191695.jsonl @@ -0,0 +1,7 @@ +{"5928833|1708582": ["have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996).", "\u2026is a self-contained and yet relatively short summary that can help newcomers to the field to develop a good sense of the state of the art, as well as existing researchers to broaden their overview of the field, an article, similar to that of Kaelbling et al. (1996), but with an updated contents.", "In 1996, Kaelbling et al. have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996)."]} +{"16931611|1708582": ["In RL, the learning agent interacts with an initially unknown environment and modifies its action policies to maximize its cumulative payoffs [1], [2]."]} +{"1146665|1708582": []} +{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]} +{"1522994|17464562": []} +{"7503127|1708582": ["The domain which has been chosen for the experiments is a discrete two dimensional maze-world (e.g., Kaelbling et al., 1996).", "The domain which has been chosen for the experiments is a discrete two dimensional maze-world (e.g., Kaelbling, Littman, and Moore, 1996 )."]} +{"6230754|1708582": ["In reinforcement learning (RL) [1], [2], an agent seeks an optimal control policy for a sequential decision problem."]} diff --git a/graph_2795037.jsonl b/edge/graph_1219725.jsonl similarity index 100% rename from graph_2795037.jsonl rename to edge/graph_1219725.jsonl diff --git a/edge/graph_12202532.jsonl b/edge/graph_12202532.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba5cbd63655f7c51de891e1fbdfffaf9bc766e06 --- /dev/null +++ b/edge/graph_12202532.jsonl @@ -0,0 +1,6 @@ +{"13605305|16766019": ["Conventional content-based image retrieval (CBIR) methods use these image features to define image similarity [ 21 ].", "In order to take spatial distribution into account, several regional methods have been developed [19], [14], [25], [ 21 ], [1].", "Automatic image classification yields limited access, in such a way that only few objects (like faces or cars) can be recognized reliably from general images [5], [ 21 ]."]} +{"45867119|192934": ["The semantic template (ST) which is learned from a collection of sample images is used to bridge the gap between high-level concept and low-level visual features [14, 15]."]} +{"14163097|9045232": []} +{"5247375|192934": ["\u2019s [13] analysis, we chose k1\u204441, which allows a reasonable classification to assign a training example\u2019s keyword to the nearest testing image easily and simply.", "Most applications of CBIR are based on supervised machine learning techniques, such as k-NN [13,33] and SVMs [20], which are susceptible to noise in the training examples."]} +{"17248708|8197990": ["Many authors have studied the queries and behavior of people looking for textual information on the Web [Goodrum 2000; Goodrum and Spink 1999; Jansen et al. 2000].", "Many au\u00adthors \nhave studied the queries and behav\u00adior of people looking for textual informa\u00adtion on the Web [Goodrum \n2000; Goodrum and Spink 1999; Jansen et al. 2000]."]} +{"252932|2616070": []} diff --git a/edge/graph_12204996.jsonl b/edge/graph_12204996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..becfcee7ee8af64efbaaa5fff2cf48f969365bc5 --- /dev/null +++ b/edge/graph_12204996.jsonl @@ -0,0 +1,6 @@ +{"16070327|14580698": ["In addition, Universal features seem reasonable to begin with [1], [2], [3].", "Accelerometer (ADC & UART) Handwritten character recognition has undergone intensive research in the last decade [1], [2]."]} +{"16070327|15782139": []} +{"6944829|11894197": []} +{"6944829|1708582": []} +{"10142298|7185733": ["Speech recognition [1], vision-based gesture recognition [2] and on-line handwriting recognition [3] are popular examples."]} +{"10142298|15782139": ["Speech recognition [1], vision-based gesture recognition [2] and on-line handwriting recognition [3] are popular examples."]} diff --git a/graph_3706010.jsonl b/edge/graph_12206204.jsonl similarity index 100% rename from graph_3706010.jsonl rename to edge/graph_12206204.jsonl diff --git a/edge/graph_122093367.jsonl b/edge/graph_122093367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e868fe539199f77cf599861d222765f40e00a3f8 --- /dev/null +++ b/edge/graph_122093367.jsonl @@ -0,0 +1 @@ +{"152753073|60455": []} diff --git a/graph_2798065.jsonl b/edge/graph_12209805.jsonl similarity index 100% rename from graph_2798065.jsonl rename to edge/graph_12209805.jsonl diff --git a/graph_1221257.jsonl b/edge/graph_1221257.jsonl similarity index 100% rename from graph_1221257.jsonl rename to edge/graph_1221257.jsonl diff --git a/graph_1221621.jsonl b/edge/graph_1221621.jsonl similarity index 100% rename from graph_1221621.jsonl rename to edge/graph_1221621.jsonl diff --git a/graph_122255.jsonl b/edge/graph_122255.jsonl similarity index 100% rename from graph_122255.jsonl rename to edge/graph_122255.jsonl diff --git a/graph_2802048.jsonl b/edge/graph_1222706.jsonl similarity index 100% rename from graph_2802048.jsonl rename to edge/graph_1222706.jsonl diff --git a/graph_1222880.jsonl b/edge/graph_1222880.jsonl similarity index 100% rename from graph_1222880.jsonl rename to edge/graph_1222880.jsonl diff --git a/edge/graph_12237811.jsonl b/edge/graph_12237811.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ac1fde31ed797eddf704b2d04e54b91505b1775 --- /dev/null +++ b/edge/graph_12237811.jsonl @@ -0,0 +1,2 @@ +{"2342929|1708582": []} +{"41091318|8530790": ["In this instance we have a multi-objective genetic optimization ( Fonseca & Fleming, 1995 )."]} diff --git a/graph_1223851.jsonl b/edge/graph_1223851.jsonl similarity index 100% rename from graph_1223851.jsonl rename to edge/graph_1223851.jsonl diff --git a/graph_2830636.jsonl b/edge/graph_1224063.jsonl similarity index 100% rename from graph_2830636.jsonl rename to edge/graph_1224063.jsonl diff --git a/graph_2837012.jsonl b/edge/graph_12243484.jsonl similarity index 100% rename from graph_2837012.jsonl rename to edge/graph_12243484.jsonl diff --git a/graph_1225103.jsonl b/edge/graph_1225103.jsonl similarity index 100% rename from graph_1225103.jsonl rename to edge/graph_1225103.jsonl diff --git a/edge/graph_12251210.jsonl b/edge/graph_12251210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..358719584361ae1eda4c310e2d03f9a59e99c09f --- /dev/null +++ b/edge/graph_12251210.jsonl @@ -0,0 +1,14 @@ +{"8126641|10559330": ["To support QoS in the Internet, the IETF has deened two architectures: the Integrated Services or Intserv 211, and the Diierentiated Services or Diiserv 33.", "While Diiserv is more scalable than Intserv in terms of implementation, services provided with existing Diiserv solutions usually have l o wer exibility, utilization, and assurance levels than Intserv services.", "Diiserv is more scalable, but cannot provide services that are comparable to Intserv.", "Existing approaches for providing guaranteed services require routers to manage per ow states and perform per ow operations [9, 21].", "In Section 2, we give a n o verview of Intserv and Diiserv, and discuss the tradeoos of these two architectures in providing QoS.", "At the service deenition level, Intserv provides end-to-end guaranteed 233 or controlled load service 344 on a per ow individual or aggregate basis, while Diiserv provides a coarser level of service diierentiation (d) (c) (b) (a) Figure 2: The illustration of the Dynamic Packet State DPS technique used to implement a SCORE network: a-b upon a packet arrival the ingress node inserts some state into the packet header; b-c a core node processes the packet based on this state, and eventuallyupdatesboth its internal state and the packet state before forwarding it. c-d the egress node removes the state from the packet header. among a small number of traac classes.", "To support QoS in the Internet, the IETF has de ned two architectures: the Integrated Services or Intserv [21], and the Di erentiated Services or Di serv [3].", "By pushing the complexity to the edge and maintaining a simple core, Diiserv's data plane is much more scalable than Intserv.", "The corresponding examples of stateful solutions are Fair Queueing [8] for congestion control and Integrated Service (Intserv) [21] for QoS."]} +{"8755361|10559330": []} +{"13039332|10559330": []} +{"6004978|12251210": ["Details including pseudocode can be found in [3].", "An overview of existing techniques is provided in [3].", "An overview of PCN including a multitude of AC and FT mechanisms is given in [3]."]} +{"14688994|12251210": ["Network providers and manufacturers have recently recognized the need for new admission control concepts for the Internet that are simpler and more scalable than the Resource reSerVation Protocol (RSVP) [1] in terms of operation and state management."]} +{"3102433|10287248": ["Therefore, many extensions to existing routing protocols, for example [19, 20], as well as totally new proposals \u2013 QoS routing schemes such as [21, 22, 23 , 24] and load balancing routing schemes as proposed in [25, 26] \u2013 have been put forward."]} +{"3102433|10559330": []} +{"42716702|14379823": ["Different aspects of CAC design and performance analysis, particularly in the context of broadband integrated service digital network (B-ISDN) based on asynchronous transfer mode (ATM) technology, have been investigated in [2]."]} +{"11726599|14379823": ["Many admission control methods have been proposed to date [ 6 ].", "Although a survey on CAC methods exists [ 6 ], the best of our knowledge no detailed survey on measure\u00ad ment-based admission methods has yet been compiled."]} +{"15292386|10559330": ["Integrated services [28], or IntServ is a QoS architecture that supports admission control and resource reservation."]} +{"532831|12251210": ["However, SM-PCN does not work well with multipath routing [10] an d AC methods do not work well with small IEAs.", "In addition, it doe s not work well with multipath routing and when single edge-to-edge aggregates c rry only little traffic [10].", "Various FT algorithms exist and a survey is given in [10].", "This section illustrates the basic idea of PCN-based admissi on control (AC) and flow termination (FT) using the nomenclature of [10].", "Various packet marking schemes as wel l as AC and FT methods are proposed [10]."]} +{"532831|10559330": []} +{"9973705|12251210": ["An overview of existing techniques is provided in [3].", "The overview in [3] presents different algorithms for these purposes which are not necessarily compatible with each other.", "Most other FT methods [3] fail under these circumstances.", "An overview of PCN including a multitude of AC and FT mechanisms is given in [3]."]} +{"2207350|12251210": ["We do not further elaborate on FT methods as any method presented in [3] can be applied.", "IV, we review simple PCN-based AC- and FT-methods [3].", "overview of existing techniques is provided in [3].", "within these restrictions, and argues that existing FT methods [3] can be reused.", "The overview in [3] presents different algorithms for these purposes.", "IV, we review simple PCN-based AC-and FT-methods [3].", "However, the fact that CE marks of the inner header are not visible in the outer header may be a problem for excess marking as it takes already marked traffic into account and also for some flow termination methods that require preferential dropping of CEmarked packets [3]."]} diff --git a/edge/graph_12252805.jsonl b/edge/graph_12252805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bed80716bbcebe7df6424364d367ce27d124a106 --- /dev/null +++ b/edge/graph_12252805.jsonl @@ -0,0 +1,2 @@ +{"16971371|6430931": ["Most of the research works are aimed to introduce the most time efficient methodologies [2]."]} +{"15087039|14077778": []} diff --git a/edge/graph_12256243.jsonl b/edge/graph_12256243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1022a137b2640464ed509c811392a6e857486fd --- /dev/null +++ b/edge/graph_12256243.jsonl @@ -0,0 +1,6 @@ +{"16324015|1230643": []} +{"26450362|1236072": []} +{"26450362|1230643": []} +{"15621636|2835258": ["Recently, some algorithms for distributed location services have been developed [17].", "Greedy routing strategies [17]. which selects the neighbor closest to the straight line between sender and destination.", "Below we summarize some forwarding strategies proposed in the networking literature [17][14][15] 1) Greedy Packet Forwarding:: Using greedy packet forwarding, the sender of a packet includes the approximate position of the recipient in the packet.", "2) Re-active Routing Protocols:: Contrary to pro-active routing protocols, re-active or on-demand routing protocols determine the route only when required, that is, when a communication needs to take place [17][11][13][7].", "An example of this problem is depicted in Fig.2 [17].", "In traditional geographical or position-based routing [14][15][17], the source node starting the routing has to know the current location of the destination node.", "They can be further divided into proactive, reactive and hybrid approaches [17].", "The rapidly varying topology is taken care of by continuous evaluation of the known routes and at the same time it tries to discover new routes and thereby providing an up-to-date network topology [17][11][13][7].", "These are illustrated in Fig.1 [17], where S and D denote the source and destination nodes of a packet, respectively."]} +{"15621636|14441987": []} +{"42629128|62453632": []} diff --git a/graph_2839618.jsonl b/edge/graph_122562895.jsonl similarity index 100% rename from graph_2839618.jsonl rename to edge/graph_122562895.jsonl diff --git a/graph_2840272.jsonl b/edge/graph_122575.jsonl similarity index 100% rename from graph_2840272.jsonl rename to edge/graph_122575.jsonl diff --git a/edge/graph_12259931.jsonl b/edge/graph_12259931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ac2b2641194a4610d5b024b6b8a96b291c6ae3b --- /dev/null +++ b/edge/graph_12259931.jsonl @@ -0,0 +1 @@ +{"39057946|885218": []} diff --git a/graph_2843620.jsonl b/edge/graph_12260436.jsonl similarity index 100% rename from graph_2843620.jsonl rename to edge/graph_12260436.jsonl diff --git a/edge/graph_12260867.jsonl b/edge/graph_12260867.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3bfe24301bb4fa8c3c48c89cb986a45effbfd38 --- /dev/null +++ b/edge/graph_12260867.jsonl @@ -0,0 +1 @@ +{"7473847|12894036": []} diff --git a/edge/graph_12264412.jsonl b/edge/graph_12264412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f31051102637c3601fe362e3696d3e0dff7f7a63 --- /dev/null +++ b/edge/graph_12264412.jsonl @@ -0,0 +1,14 @@ +{"16260939|2937482": ["Depending on the way nodes exchange information for collecting raw measurements of the clock mismatches, synchronization protocols were devised in, e.g., [1]\u2013[4]; a comparison in terms of message-passing strategy and achieved performance of the aforementioned protocols was presented in [5]."]} +{"8195446|1230643": ["A WSN consists of a large number of such tiny devices, called nodes, that are connected in an ad hoc manner without assuming any centralized infrastructure [3]."]} +{"23402311|17325804": ["Target localization and tracking are other applications of WSNs in which clock synchronization is mandatory in order to obtain satisfactory results [2], [3]."]} +{"23402311|1230643": ["RECENT technology advancements in wireless sensor networks (WSNs) have enabled a distributed implementation of various network operations via the exchange of either raw or pre-processed data between nodes [1]."]} +{"1249462|1230643": ["With their feasibility rapidly growing, WSNs have been regarded as fundamental infrastructures for future ubiquitous communications due to a variety of promising potential applications, such as monitoring of the health status of humans and the environment and control and instrumentation of industrial machines and home appliances [1]\u2013[3]."]} +{"12230244|1230643": ["Wireless sensor networks (WSNs) are a special type of ad hoc networks formed by networking these tiny devices in a certain area without any infrastructure [1], [2]."]} +{"14650873|1230643": ["UN CO RR EC TE D are densely deployed and collaborate to monitor and analyze a phenomenon of interest [66].", "For example, in the past, novel trends [66] have emerged in the agricultural sector converged in the socalled \u2018\u2018precision agriculture\u2019\u2019, which concentrates on providing the means for observing, assessing, and controlling agricultural practices."]} +{"1832324|1230643": ["\u2026are used in industrial and commercial applications to monitor data that would be difficult or inconvenient to monitor using wired equipment, such as monitoring the health status of environment, controlling industrial machines and home appliances, fire detection and object tracking, etc. [1] [2]."]} +{"26556854|1230643": ["These sensors are able to monitor a wide variety of ambient conditions such as temperature, humidity, vehicular movement, lightning condition, pressure, soil makeup, noise levels, the presence or absence of certain kinds of objects, mechanical stress levels on attached objects, and speed, direction, and size of an object [16]."]} +{"63908162|1230643": ["These tiny sensor nodes, which consist of sensing, data processing, and communicating components, leveraging the idea of sensor networks based on collaborative effort of a large number of nodes .[2] A large number of micro-sensor nodes can be used by WSN to collect high-precision data in various circumstances."]} +{"2937482|1230643": ["In other words, data from each sensor is collected to produce a single meaningful result value [5]."]} +{"18525327|3330313": ["We note that other outlier-rejection strategies are possible [37], but are not presented here; see [38] for an extensive survey."]} +{"4855405|1230643": ["01], [-10, 10]ms and [1, 10]ms, respectively.", "Wireless Sensor Networks (WSNs) have widely been used for monitoring habitat environments, controlling industrial machines, object tracking and event detection [1], [2]."]} +{"33604752|10271586": []} diff --git a/edge/graph_12264500.jsonl b/edge/graph_12264500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d768f03dc69e4a22c90de9f0f9ab04347d23b275 --- /dev/null +++ b/edge/graph_12264500.jsonl @@ -0,0 +1,5 @@ +{"108499504|8363289": ["Then the horizon moves forward a step and the process is repeated, which can be called the receding horizon optimization ( Mayne et al., 2000 ).", "The inaccuracy in modeling the disturbance vector can be compensated by the feedback scheme and receding horizon optimization, which is also the advantage of MPC ( Mayne et al., 2000; Bemporad et al., 2002).", "A model predictive control (MPC) framework ( Mayne et al., 2000 ) with multi-objectives is adopted for the design."]} +{"16706555|8363289": ["From a dynamic programming (DP) perspective, the NMPC-based i-HEV ACC problem is a typical multistage decision problem over each prediction horizon [17]."]} +{"6907139|13427574": ["for manipulators and mobile platforms [36, 37]."]} +{"6907139|36510460": ["RRT [25, 98], or heuristic search, e."]} +{"106958182|8363289": []} diff --git a/graph_2847597.jsonl b/edge/graph_12266282.jsonl similarity index 100% rename from graph_2847597.jsonl rename to edge/graph_12266282.jsonl diff --git a/edge/graph_12269716.jsonl b/edge/graph_12269716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c1697d616bb4f7a8d484cd0278cf466537d35063 --- /dev/null +++ b/edge/graph_12269716.jsonl @@ -0,0 +1 @@ +{"680683|239537": ["For example, many methods have been developed to minimize edge crossings or to position nodes in close proximity when they share a large number of edges [31]."]} diff --git a/edge/graph_12274161.jsonl b/edge/graph_12274161.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6305e5608f1122abedae54e28e1324486d5f71fd --- /dev/null +++ b/edge/graph_12274161.jsonl @@ -0,0 +1 @@ +{"15696243|205131192": [", Prokop and Reeves [1992])."]} diff --git a/graph_2847792.jsonl b/edge/graph_122749362.jsonl similarity index 100% rename from graph_2847792.jsonl rename to edge/graph_122749362.jsonl diff --git a/edge/graph_12278223.jsonl b/edge/graph_12278223.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e2dcabf1e83a8fd8133b1fad8ab4b6769a9f790 --- /dev/null +++ b/edge/graph_12278223.jsonl @@ -0,0 +1 @@ +{"1681407|19004624": []} diff --git a/graph_2874621.jsonl b/edge/graph_12280702.jsonl similarity index 100% rename from graph_2874621.jsonl rename to edge/graph_12280702.jsonl diff --git a/graph_2877147.jsonl b/edge/graph_12286588.jsonl similarity index 100% rename from graph_2877147.jsonl rename to edge/graph_12286588.jsonl diff --git a/graph_2877460.jsonl b/edge/graph_12289603.jsonl similarity index 100% rename from graph_2877460.jsonl rename to edge/graph_12289603.jsonl diff --git a/graph_1229096.jsonl b/edge/graph_1229096.jsonl similarity index 100% rename from graph_1229096.jsonl rename to edge/graph_1229096.jsonl diff --git a/graph_289357.jsonl b/edge/graph_12296054.jsonl similarity index 100% rename from graph_289357.jsonl rename to edge/graph_12296054.jsonl diff --git a/edge/graph_12303588.jsonl b/edge/graph_12303588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92fc310daa54a34b7561231f79164b74499df4b5 --- /dev/null +++ b/edge/graph_12303588.jsonl @@ -0,0 +1 @@ +{"135939621|1596610": []} diff --git a/graph_1230643.jsonl b/edge/graph_1230643.jsonl similarity index 100% rename from graph_1230643.jsonl rename to edge/graph_1230643.jsonl diff --git a/edge/graph_12309533.jsonl b/edge/graph_12309533.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e19e5fee6754a0f8df43b9866e630061b70d7ed --- /dev/null +++ b/edge/graph_12309533.jsonl @@ -0,0 +1 @@ +{"16460039|11607029": ["\u2026model composition approaches in different application domains: requirements engineering [Nuseibeh03] [Chitchyan07], design by aspects [Baniassad04] [France04], development by subjects [Clarke02] [Ossher96], software merging [Mens02], composition of concerns in software architectures [Barais05]."]} diff --git a/graph_2904567.jsonl b/edge/graph_12317269.jsonl similarity index 100% rename from graph_2904567.jsonl rename to edge/graph_12317269.jsonl diff --git a/edge/graph_12323589.jsonl b/edge/graph_12323589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1de6150b9a5433eefedc983471cc0583271aff6 --- /dev/null +++ b/edge/graph_12323589.jsonl @@ -0,0 +1,3 @@ +{"145266|14140377": ["There is a long line of research on temporal databases [10], [36], [37], [38]."]} +{"8773819|8125630": ["OLAP systems [8] utilizing a high amount of table scans face the same problem."]} +{"3227259|12260867": []} diff --git a/edge/graph_12325031.jsonl b/edge/graph_12325031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c324da843597d90f61a2fb67456295111079d4f4 --- /dev/null +++ b/edge/graph_12325031.jsonl @@ -0,0 +1,47 @@ +{"17282224|14889616": ["Each sequence is composed of 100 frames encoded in SVC, with an H.264/AVC compatible base layer, and two CGS enhancement layers.", "The scalable video coding (SVC) project provides spatial, temporal, and signal-to-noise ratio (SNR) scalability which ensures graceful degradation in video quality when faced with channel fluctuations [1].", "We assume that users (indexed by ) are equipped with scalable video encoders delivering video bitstreams that conform with SVC [6].", "SVC Scalable video coding.", "First, we consider a multiuser WLAN system where each user is equipped with a scalable video-quality encoder delivering video bitstream that conforms with scalable video coding (SVC) [6], which is the scalable extension of H.264/AVC.", "In MGS/CGS scalability, enhancement-layer packets contain refinements on the quantization of residual texture information [6].", "Each user has a fixed packet arrival rate and the incoming packets are SVC bitstreams with both base and enhancement layers.", "1) Rate Model: Here, we present the rate model for base and CGS enhancement-layer SVC-coded video frames.", "This paper considers a time-slotted multiuser WLAN system where each user delivers SVC video bitstream.", "This can be realized by allowing all users to broadcast their state information (buffer size, channel) during the guard interval at the beginning of each time slot.", "In SVC, quality scalability is achieved by using medium-grained or coarse-grained scalability (MGS/CGS) where scalable enhancement packets deliver quality refinements to a preceding layer representation by requantizing the residual signal using a smaller quantization step size and encoding only the quantization refinements in the enhancement layer packets [6].", "We quantize the range of to achieve a video variability state space denoted by .", "The MGS/CGS [4] base and enhancement layer bit rate in SVC can be expressed as follows:\n(2)\nwhere is a model parameter, and is a power factor that depends on the frame type, so that for intercoded frames and for intracoded frames [9], [10]."]} +{"9833516|17428811": []} +{"862793|1708582": []} +{"18920975|3042022": []} +{"738212|8974063": ["O PPORTUNISTIC spectrum access (OSA) is a promising solution for dealing with the spectrum shortage problem in wireless communications today since it provides flexible and efficient spectrum usage [2]\u2013[4]."]} +{"858285|1185580": ["As a result, it would be more easily to implement the policy knowledge transfer in Section IV, compared to other critic-only algorithms like \u03b5-greed and Q-learning [30], .", "As a result, it would be more easily to implement the policy knowledge transfer in Section IV, compared to other critic-only algorithms like \u03b5 -greed and Q-learning [30], ."]} +{"68423|56671641": ["Proof of Corollary 5.5 (ii): Let =\ufffd R+ \u00d7 0 \u2192 0 denote the semiflow of (P), and let y and \u00af y denote the minimal and maximal points in 0 . By part (i) of the corollary, we have that T= \ufffdt\ufffd y \u2264 T= \ufffdt\ufffd x \u2264 T= \ufffdt\ufffd \u00af y for all t \u2265 0 and x \u2208 0 . The forward invariance of 0 and Theorem 1.2.1 of Smith (1995) imply that =\ufffdt\ufffd y and =\ufffdt\ufffd \u00af y both converge to rest points of (P) as t grows large.", "The forward invariance of \u03a3 and Theorem 1.2.1 of Smith (1995) imply that \u03c6(t, y) and \u03c6(t, y ) both converge to rest points of (P) as t grows large.", "Theorem 4.1.1 of Smith (1995), part (iii) from Theorem 2.4.7 of Smith (1995) , part (iv) (after a reversal of time) from Theorem 1.1 of Hirsch (1998), and part (v) from Theorems 1.6 and 1.7 of Hirsch (1999) (also see Theorem 3.3 and Corollary 3.4 of Benaim and Hirsch (1999b)).", "Proof: In light of Proposition 5.3 and Theorem 5.4, part (i) follows from Theorem 4.1.1 of Smith (1995), part (iii) from Theorem 2.4.7 of Smith (1995), part (iv) (after a reversal of time) from Theorem 1.1 of Hirsch (1988), and part (v) from Theorems 1.6 and 1.7 of Hirsch (1999) (also see Theorem\u2026", "Theorem 4.1.1 of Smith (1995) , part (iii) from Theorem 2.4.7 of Smith (1995), part (iv) (after a reversal of time) from Theorem 1.1 of Hirsch (1998), and part (v) from Theorems 1.6 and 1.7 of Hirsch (1999) (also see Theorem 3.3 and Corollary 3.4 of Benaim and Hirsch (1999b))."]} +{"2509135|12452682": []} +{"8164608|7439310": ["This has the potential to increase the accuracy in predicting any missing packet, but at the cost of an increase in run\u2010time complexity of the decoder [ 6 ].", "FEC codes consist in adding redundancy to source video packets [ 6 ].", "EC consists in exploiting the spatial and temporal correlations of audio or video to interpolate missing packets from the surrounding available packets [ 6 ]."]} +{"9704070|2509135": ["Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)", "spaces via cognitive radio techniques [157], e) dynamic"]} +{"9704070|12884178": ["expressive power of context representations [25], d) relay and mesh-enabled networks development with cooperative communication features in OFDMA-based wireless network technologies [126] [156] and exploitation of spectrum white", "Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)"]} +{"9704070|14745481": []} +{"234450|1708582": []} +{"234450|17464562": []} +{"11508732|8909218": ["Recently, a new type of indoor Base Station (BS), called femtocell, has gained the attention of the industry [1].", "Femtocells are expected to bene\ufb01t both end-users and network operators [1]."]} +{"9876634|17109970": ["Naturally, gametheoretic tools have been widely applied over the last decade to study such competitive situations in wireless networks (see [4] and [5] for recent surveys).", "The self-gain coefficients hmm are chosen uniformly at random (from the interval [2, 4]), and so do the cross-gain coefficients hkm (from the interval [0, 2])."]} +{"2661363|1708582": []} +{"16771575|7851743": []} +{"13513101|2509135": ["N RECENT years, cognitive radio technology [1] [2] [3] has been proposed as a promising communication paradigm to solve the conflict between the limited spectrum resources and the increasing demand for wireless services."]} +{"10511015|1708582": ["For further details, please refer to the texts of Sutton and Barto (1998) and Bertsekas and Tsitsiklis (1996), and the survey of Kaelbling, Littman and Moore (1996) ."]} +{"36530625|14441987": ["Although a lot of work has been done on inter-domain routing protocols or architectures for multi-domain networks with gateway nodes [8], [14]\u2013[16], the selection and deployment of gateway nodes have been investigated only in a few existing studies [1]\u2013[4]."]} +{"8640836|17062686": ["However, if the secondary users are selfish, they will not collaborate with each other for cooperative sensing without any incentive [12]."]} +{"125723693|17464562": []} +{"15642971|8909218": ["traditional Macro-basestations (BS) and femtocells [1]."]} +{"15642971|12452682": []} +{"949292|8909218": ["Recently, femtocells have been considered as a promising technique to improve the indoor experience of the mobile users [2]."]} +{"13982503|17109970": ["the selected channel j. In this power-control game, the stage reward function for SU i can be defined as effective transmission rate per joule, similarly to [ 37 ], i.e.,", "In power control games among WSTAs in interference channels, the myopic adaptation has been proven to converge to the Nash equilibrium point [ 37 ], which generally leads to a lower system performance for the user than the collaborative case, where a moderator will compel the WSTAs to operate on the Pareto surface.", "(For instance, the distributed power control games in, e.g., [35] and [ 37 ] or the contention games in [39] can be represented using the stochastic game formulation presented here.) In the distributed stochastic game, the WSTAs simultaneously implement the internal and external actions."]} +{"214800301|8909218": ["For a general survey of this technology, the reader is referred to [99, 521, 250].", "Various benefits of using FAPs have been identified [99, 521, 250]."]} +{"214800301|7971188": ["Meanwhile, the peers can use a tracker or other well-known peer-discovery algorithm such as in [74, 304, 168] to learn of the presence of other peers downloading from the seed.", "Consequently, numerous research activities [304, 394, 385, 112, 80, 36, 426, 311, 408] have focused on studying and analyzing peerto-peer systems from various perspectives, ranging from data exchange [394], resource reciprocation [385], and cooperative download [36] to legal issues [408].", "Finally, the use of the correlated equilibrium in wireless and communication networks has recently attracted increased attention; see [283, 304] and the references therein.", "Different architectures, including tree-based [73] andmesh-based approaches [304, 295], are analyzed for content dissemination in P2P networks.", "In particular, correlated equilibrium has been used in solving problems related to multiple-access and wireless transmission (see [283] and references therein) as well as peer-to-peer networks [304].", "Using peer-discovery algorithms such as trackers [168, 74, 304], the peers discover the presence of other peers at the seed."]} +{"2931697|12452682": []} +{"14887600|8909218": ["120959 range, low-power, and low-cost base stations underlaying the macro-cellular network [1], [4]\u2013[6]."]} +{"6084926|8909218": ["An effective solution to increase the capacity of wireless links would be to reduce the cell size and therefore the transmission distance [2]."]} +{"19706|1708582": ["For more information on reinforcement learning techniques, [230, 14, 118] are good starting points."]} +{"1708582|17464562": []} +{"871178|1708582": ["We refer to [8] for a survey of RL techniques."]} +{"1185580|15929566": []} +{"1185580|1708582": []} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"16671606|1708582": ["In reinforcement learning problems [1, 27] reactive and adaptive agents are given a description of the current state and have to choose the next action from a set of possible actions so as to maximize a scalar reinforcement or feedback received after each action."]} +{"5955353|1708582": []} +{"5528008|1708582": []} +{"507972|8909218": []} +{"4853986|15255963": ["Several works [9], [ 31 ] have proposed finite-state Markov chain (FSMC) to model the transition of channel SNR across time slots."]} +{"4853986|3540699": ["264/AVC codec [27] with target bit rate of 1."]} +{"16279144|2509135": ["Recent surveys on CRs can be found in [41], [54], [55].", "In distributed cooperative spectrum sensing [55], [172], on the other hand, secondary users within a CRN exchange their local sensing results among themselves without requiring a backbone or centralized infrastructure."]} +{"16279144|12452682": []} +{"16279144|2340253": []} diff --git a/edge/graph_12325560.jsonl b/edge/graph_12325560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ba7e1c63d1621a3818f917188526ef315ba28bd --- /dev/null +++ b/edge/graph_12325560.jsonl @@ -0,0 +1,7 @@ +{"18967128|15589021": ["gained momentum due to their high sensitivity, selectivity and stability [9]."]} +{"9187780|6396569": []} +{"15914831|1230643": ["-grained, high-precision sensing data [1]."]} +{"42447288|1230643": ["1 Introduction Advances in embedded microprocessors and wireless networking have enabled sensor networks applicable to localization and tracking problem in both civilian and military applications [1]."]} +{"39271736|1230643": ["Thousands of small sensors are distributed over a vast field to obtain fme-grained, high-precision sensing data [1]."]} +{"15968818|1230643": ["The BS collects data from all connected nodes, concludes the activities in the ROI, and serves as a bridge to connect the WSN with outside users [ 2 , 19]."]} +{"17844594|15589021": ["By means of preset threshold detection, alarms are raised alerting workers and plant operators [7]."]} diff --git a/graph_2905351.jsonl b/edge/graph_123455196.jsonl similarity index 100% rename from graph_2905351.jsonl rename to edge/graph_123455196.jsonl diff --git a/edge/graph_12346369.jsonl b/edge/graph_12346369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93998c2faae1cb33b48aa73bce1b55894fa0002e --- /dev/null +++ b/edge/graph_12346369.jsonl @@ -0,0 +1,9 @@ +{"14784353|14276831": ["Kuipers provides an overview of survivability algorithms [13]."]} +{"16954125|15453366": []} +{"207262843|2535224": []} +{"207262843|2623404": []} +{"207262843|2387055": []} +{"207262843|3330461": []} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"23435757|1230643": ["The battery power is consumed by all the sensors activities: sensing, processing, storing and communication; however the optimization of the energy spent in the communications is one of the most important problems in energy efficiency [6], in fact, the radio consumes a significant part of the energy budget of the sensors, furthermore the major energy savings are achieved by turning off the radio, which however means disconnecting the sensors from the rest of the WSN."]} diff --git a/edge/graph_12347712.jsonl b/edge/graph_12347712.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1de31692a76c5673204b9ceb408bdb932fc2f662 --- /dev/null +++ b/edge/graph_12347712.jsonl @@ -0,0 +1,3 @@ +{"14913791|1230643": ["Introduction Networking unattended wireless sensors is expected to have significant impact on the efficiency of many civil applications, such as disaster management, environment monitoring and security [1][2][3]."]} +{"32661437|1230643": []} +{"1232531|10658846": ["While system-level power management is in itself a wellresearched area ( [6], [31]), recent research has proposed new power management schemes that specifically target batteryefficiency rather than average power."]} diff --git a/graph_2910221.jsonl b/edge/graph_12356530.jsonl similarity index 100% rename from graph_2910221.jsonl rename to edge/graph_12356530.jsonl diff --git a/graph_1235863.jsonl b/edge/graph_1235863.jsonl similarity index 100% rename from graph_1235863.jsonl rename to edge/graph_1235863.jsonl diff --git a/edge/graph_12358655.jsonl b/edge/graph_12358655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3c8f1f7af21abbb8b41694943b9aee91006dc0a --- /dev/null +++ b/edge/graph_12358655.jsonl @@ -0,0 +1,77 @@ +{"15466707|9835525": ["Different gradual transition methods proposed by different researchers are fade-out/fade- in detection [3], wipe detection [4], and dissolve detection [5]."]} +{"15466707|9045232": ["Fuzzy logic have been successfully applied in various fields such as automatic process control system, classification of different data, decision analyser expert systems, and computer vision[8,9]."]} +{"56197914|5401262": ["In particular, hand gesture recognition has been studied by many researchers in HCI research.", "Visual surveillance often employs gross and intermediate level recognition, and detailed level recognition mainly aims for developing the gesture based human-computer interfaces (HCI) [56]."]} +{"56197914|17516538": ["Visual surveillance techniques have initiated a wide variety of applications in access control, person specific identification, anomaly detection and alarming in academic community as well as industry and government [1]."]} +{"56197914|16169670": ["A survey of different techniques for camera calibration can be found in [83]."]} +{"41892562|1634674": ["The plethora of movement recognition algorithms that have been proposed can be divided in three categories, depending on the adopted camera setup and their ability to perform view-independent human movement recognition: single-view, single-view/view-invariant and multi-view ones [9, 10]."]} +{"14170474|192934": ["Following [19], we divide the existing work into three major categories: template matching, statistical classification and neural networks."]} +{"7097839|12127129": ["There are many background subtraction methods and the most recent surveys can be found in [3][7][35]."]} +{"6111169|1634674": ["For a detailed description of recent work on the action recognition field the reader is referred to [7], [11]."]} +{"6111169|12127129": ["In order to extract binary images denoting the person\u2019s ROIs, image segmentation techniques [9], [3] are applied to the frames of the action videos captured by all the N cameras."]} +{"27898359|819377": []} +{"8979634|5755403": ["As a proof-of-concept, we focus on trajectory-based human activity analysis [8]."]} +{"18443139|1634674": ["Depending on the number of cameras used to obtain the visual information, action recognition techniques can be categorized in single-view and multi-view ones [2]."]} +{"8495981|14970359": ["To address some internal issues, much previous work adopted human body models of various complexities to sufficiently use the prior knowledge relevant to the physical structure of the human body (see surveys [1,2,8,19] for more information)."]} +{"8495981|7788290": ["In practice, a tracking procedure is often involved with two stages: pose prediction and pose refinement [1].", "To address some internal issues, much previous work adopted human body models of various complexities to sufficiently use the prior knowledge relevant to the physical structure of the human body (see surveys [1,2,8,19] for more information).", "; u10}: The general method to this problem is known as analysis-bysynthesis, and is used in predict-match-update fashion [1]."]} +{"37152340|7185733": ["In order to take advantage of gestures in HCI, a mean by which the computer can understand the gesture must be provided [16]."]} +{"14775089|12127129": ["Generally the reference frame often call ed the \u201cbackground image\u201d or \u201cbackground model\u201d must be a representation of the scene without moving objects and must be kept regularly updated so as to adapt to the varying luminance conditions and geometry settings [30]."]} +{"14775089|17516538": ["dent on the performance of the human detection [25], [26], [29].", "Motion segmentation is used to detect regions corresponding to moving objects that can be potential targets in natural scenes in order to provide a focus of attention for later processes such as tracking and activity analyses [26]."]} +{"14775089|14970359": []} +{"44953587|17516538": ["Figure 1 shows the general framework of detecting moving abnormal model in video sequence [2].", "The aim is to develop intelligent visual surveillance to replace the traditional passive video surveillance which has proved to be ineffective when the number of cameras exceeds the capability of human operators to monitor [2]."]} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} +{"2353450|819377": ["A recent complete survey of these improvements can be found in [57]."]} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"58763640|11038925": ["Another method is fuzzy c-means (FCM) clustering algorithm, which can not only provide a data partition that is more meaningful and stable than hard clustering approaches (k-means) but also decrease dependency on initialization and reduce the presence of dead units [12, 13]."]} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"11470070|12127129": ["To take into account these problems o f robustness and adaptation, many background modeling methods have been develop ed and the most recent surveys can be found in [2, 7, 8]."]} +{"12570116|819377": ["A recent complete survey of these improvements can be found in [4]."]} +{"59809172|12127129": []} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"8088635|12127129": ["Due to its pervasiveness in various contexts, background subtraction has been afforded by several researchers, and plenty of literature has been published (see surveys in [5, 11, 14], and more recently in [7])."]} +{"6192159|14970359": ["The condensation algorithm is one of dominant tracking algorithms; for detailed human-motion tracking algorithms, see [1], [22], and [33]."]} +{"6192159|7185733": []} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"58297365|7185733": []} +{"13477691|2355696": []} +{"13477691|1634674": ["The definition of activity as a complex and coordinated organization of simple actions is exploited in [7]."]} +{"13477691|17516538": ["An essay on the different components of a typical video surveillance system, with emphasis on the activity analysis , is reported in [6]."]} +{"13477691|7788290": []} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"40100916|206764452": []} +{"40100916|1634674": []} +{"40100916|1029120": ["tems [38]\u2013[40], transit applications [31], while others are more general."]} +{"40100916|5401262": [", tracking [35], human\u2013computer interactions [36], rehabilitation [37], pedestrian protection sys-"]} +{"40100916|16525678": []} +{"40100916|3330313": ["For example, [47] and [48] present statistical approaches to novelty detection, while [49] and [50] did a comparative"]} +{"40100916|17516538": []} +{"40100916|14970359": []} +{"40100916|7185733": []} +{"40100916|7788290": []} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"3287381|14545307": []} +{"14970359|7185733": []} +{"14970359|7788290": ["A survey by Gavrila [44] describes work prior to 1998 and gives a good general introduction to the topic with a special focus on applications.", "This provides a good overview of 2D and 3D approaches, as seen in the surveys by Aggarwal and Cai [1] and Gavrila [44], respectively."]} +{"1334552|53680608": ["A recent survey [Aggarwal and Nandhakumar 1988] shows the current \nstate-of-the-art up to 1988 not only for optical flow algorithms, but also for feature-based motion algo\u00adrithms \nthat require a solution to the cor\u00adrespondence problem, and for motion and lTAs opposed to the computation \nof optical\u2026"]} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"40583809|17516538": ["Thus, only magnitudes of the first 20 significant DFT coefficients, i.e., FH [1]\u2013FH [20] and FV [ 1 ]\u2013FV [20], are used.", "Thus, only magnitudes of the first 20 significant DFT coefficients, i.e., FH [ 1 ]\u2013FH [20] and FV [1]\u2013FV [20], are used.", "VISUAL surveillance system attempts to detect, recognize, and track certain objects from the image sequences [ 1 ]."]} +{"40583809|14970359": ["Visual surveillance implementation increases understanding and description of human behaviors [2], [3]."]} +{"40583809|7788290": ["Visual surveillance implementation increases understanding and description of human behaviors [ 2 ], [3]."]} +{"39650506|12127129": []} +{"16051814|11042075": ["Gait recognition has gained researchers\u2019 attention in the last decade and numerous such methods have been proposed in the literature [2]\u2013[5]."]} +{"16051814|12127129": ["traction [26], [27] or color-based image segmentation methods Fig."]} +{"2857532|53680608": []} +{"17073538|14970359": ["The majority of systems developed have used multiple cameras to capture the subject [2,3,7].", "The traditional tracking approach to human motion capture [7] is to perform manual initialisation at the beginning of the sequence and then update the estimate of the reconstruction over time in accordance with the incoming data."]} diff --git a/graph_1236072.jsonl b/edge/graph_1236072.jsonl similarity index 100% rename from graph_1236072.jsonl rename to edge/graph_1236072.jsonl diff --git a/edge/graph_12361739.jsonl b/edge/graph_12361739.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da9077b94930a83334341496576ade1fce000ac2 --- /dev/null +++ b/edge/graph_12361739.jsonl @@ -0,0 +1,3 @@ +{"38194551|12361739": []} +{"5535167|12361739": []} +{"8627309|12361739": ["Lattice graphs, longest cycles."]} diff --git a/graph_2935788.jsonl b/edge/graph_12369038.jsonl similarity index 100% rename from graph_2935788.jsonl rename to edge/graph_12369038.jsonl diff --git a/edge/graph_12377645.jsonl b/edge/graph_12377645.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6916050d4b1e91357e847891fe49c67121f3d8ec --- /dev/null +++ b/edge/graph_12377645.jsonl @@ -0,0 +1,4 @@ +{"12377645|627405": []} +{"12377645|10565822": []} +{"11291939|12377645": ["Copyright 2011 ACM 978-1-4503-1052-9/11/11 \n$10.00."]} +{"11291939|10565822": ["Govender and Grayson \nin [3] state that effective teachers of programming need detailed knowledge not only about their subject \nmatter but also about the subject matter for teaching."]} diff --git a/graph_2951180.jsonl b/edge/graph_123906593.jsonl similarity index 100% rename from graph_2951180.jsonl rename to edge/graph_123906593.jsonl diff --git a/edge/graph_12395887.jsonl b/edge/graph_12395887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91b9ef08c9978ac88ae0641bd0be4ed1926ef094 --- /dev/null +++ b/edge/graph_12395887.jsonl @@ -0,0 +1 @@ +{"17613760|6430931": ["The level of improvement in detection rate shown in (Wu and Banzhaf, 2010) should be considered as a step in the right direction since it made the algorithm competitive to the rest of machine learning solutions.", "a Laboratory of Information and Communication Systems Security, University of the Aegean, Samos GR-83200, Greece bDepartment of Information and Communication Systems Engineering, University of the Aegean, Samos GR-83200, Greece\na r t i c l e i n f o\nArticle history: Received 9 January 2011 Received\u2026", "Although in the past, some works (Wu and Banzhaf, 2010) have touched upon a limited number of such systems, the current one is exhaustive and focuses solely on SI-inspired IDS."]} diff --git a/graph_295128.jsonl b/edge/graph_12401050.jsonl similarity index 100% rename from graph_295128.jsonl rename to edge/graph_12401050.jsonl diff --git a/graph_295283.jsonl b/edge/graph_124021.jsonl similarity index 100% rename from graph_295283.jsonl rename to edge/graph_124021.jsonl diff --git a/edge/graph_12402627.jsonl b/edge/graph_12402627.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33937200e927dfe8cf4398912553796f502b0ee7 --- /dev/null +++ b/edge/graph_12402627.jsonl @@ -0,0 +1,11 @@ +{"37238955|7971188": ["The resource is then accessible by any peers within the overlay using an unique key called hash [27]."]} +{"1872293|973730": ["2) Locality-aware buffer management scheme\nAs the behavior of peers in upper layers have a larger impact on QoS than that of peers in the lower layers, AnySee employs a layer-aware buffer management scheme.", "We first evaluate the QoS of the AnySee service in a stable environment.", "With the help of locality-aware strategies [10][11] and optimization schemes such as DONet in CoolStreaming [12], Narada in ESM [13], QoS of live streaming P2Ps have significantly improved.", "Results show that AnySee outperforms previous schemes in resource utilization and the QoS of streaming services.", "When one active streaming path is cut off due to its poor QoS or peer\u2019s leaving, a new streaming path is selected from the backup set.", "Third, the inter-overlay optimization manager explores appropriate paths, builds backup links, and cuts off paths with low QoS for each end peer.", "Significant progress has been made on the efficient distribution of live streams in a real-time manner over a large population of spectators with good QoS [4]."]} +{"16489112|17428811": ["MPEG-4 Fine Grain Scalable (FGS) [13] is a popular scheme for creating layered coding.", "With FGS or SVC, the rate of the base layer must be sufficiently high so that an acceptable quality can be recovered from the base layer only, and that the enhancement layer can be coded efficiently.", "An FGS encoder encodes the video into a base layer and a scalable enhancement layer.", "This is true for both MPEG-4 FGS vs. MPEG-4 and SVC vs. H.264.", "To create a scalable video, we code a video sequence in CIF (352x288) resolution with a frame rate of 30 frame/sec into a FGS bit stream using the most advanced SVC codec [21] with the SNR scalable mode."]} +{"23195619|14889616": ["Scalable video coding [65] is the new amendment to H264/ AVC: Advanced Video Coding standard.", "A prominent example of LVC is the scalable video coding (SVC) standard [65]."]} +{"23195619|1462862": ["A more elaborate analysis is given in [53]."]} +{"20385652|14697846": ["substrate network, usually the Internet, to share computing power, storage, and communication bandwidth [2]."]} +{"62163777|8730885": ["In this paper, we propose a peer-to-peer (P2P) streaming method for mobile devices [4]."]} +{"214976|14889616": []} +{"214976|973730": ["To address this, various streaming systems have proposed using scalable coding techniques such as layered coding [12], [25]."]} +{"7200100|17428811": []} +{"7200100|7439310": []} diff --git a/graph_2957250.jsonl b/edge/graph_124057150.jsonl similarity index 100% rename from graph_2957250.jsonl rename to edge/graph_124057150.jsonl diff --git a/edge/graph_12407288.jsonl b/edge/graph_12407288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44745e476aaa04b9e1064301e69f8d762d596f36 --- /dev/null +++ b/edge/graph_12407288.jsonl @@ -0,0 +1 @@ +{"125204862|270804": []} diff --git a/edge/graph_124142082.jsonl b/edge/graph_124142082.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c0d231a484786e6a20c82f663ee04b1f96e2585 --- /dev/null +++ b/edge/graph_124142082.jsonl @@ -0,0 +1,3 @@ +{"11891953|11003991": ["For models related to this context, we refer the reader to Cardoen et al. (2009, 2010) and to Van Oostrum et al. (2008).", "routing & 1d packing Carrabs et al. (2007) 1d, LIFO loading, P&D, TSP 1-step, VNS Battarra et al."]} +{"11891953|54009499": ["A survey of scheduling and lotsizing problems and their extensions can be found in Drexl and Kimms (1997)."]} +{"37033675|13640443": ["2005), often leading to different distribution channels, such as direct shipment from producers to consumers (Agatz et al., 2008).", "In recent years, online retailing has increased (Boyer and Hult 2005), often leading to different distribution channels, such as direct shipment from producers to consumers (Agatz et al. 2008)."]} diff --git a/graph_2965443.jsonl b/edge/graph_12419623.jsonl similarity index 100% rename from graph_2965443.jsonl rename to edge/graph_12419623.jsonl diff --git a/edge/graph_12420192.jsonl b/edge/graph_12420192.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..228f796840a53a5a70be4d4bac1d36d2ecd0abe1 --- /dev/null +++ b/edge/graph_12420192.jsonl @@ -0,0 +1,7 @@ +{"16083475|13372227": ["Localization of the nodes in these networks plays a key enabling role in WSN applications [ 4-6 ].", "Various localization techniques have been developed to estimate the locations of the sensors using a priori knowledge of range measurements between the node and the specified references (anchors) [ 6 ,7]."]} +{"18178579|1230643": []} +{"13893202|14441987": []} +{"133319|1230643": ["2046411 with thousands of tiny and inexpensive sensor nodes, which are scattered over a vast field for the sensing tasks [1]."]} +{"13292799|39636809": ["The more recent survey [7] narrowed down its focus to an ant colony optimization (ACO)-based approach to solve several issues in WSNs."]} +{"13292799|10096622": ["In [9], some issues of WSNs have been addressed using only PSO."]} +{"13292799|1230643": ["Wireless Sensor Networks (WSNs) are critically resource-constrained by their limited power supply, memory, processing performance and communication bandwidth [1]."]} diff --git a/edge/graph_12420484.jsonl b/edge/graph_12420484.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0e7964c7eb4024113e92dafb0bea9b3e197b146 --- /dev/null +++ b/edge/graph_12420484.jsonl @@ -0,0 +1,4 @@ +{"29325489|9072047": []} +{"15092760|1876323": ["Piezoceramics is perceived as a promising alternative of improved sensing and active control of vibration for the next generation of large flexible spacecraft."]} +{"109320405|5768126": []} +{"23550144|1876323": []} diff --git a/graph_2979954.jsonl b/edge/graph_12422172.jsonl similarity index 100% rename from graph_2979954.jsonl rename to edge/graph_12422172.jsonl diff --git a/graph_3003898.jsonl b/edge/graph_12422399.jsonl similarity index 100% rename from graph_3003898.jsonl rename to edge/graph_12422399.jsonl diff --git a/graph_3015999.jsonl b/edge/graph_12434256.jsonl similarity index 100% rename from graph_3015999.jsonl rename to edge/graph_12434256.jsonl diff --git a/edge/graph_12435762.jsonl b/edge/graph_12435762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61ffe68fb49a450fc33424bbb9902fa281daaada --- /dev/null +++ b/edge/graph_12435762.jsonl @@ -0,0 +1,4 @@ +{"2537616|3102110": ["A variety of data mining algorithms for mining in relational as well as spatial databases have been proposed in the literature ( Fayyad et al. 1996 , Chen et al. 1996."]} +{"385307|3102110": []} +{"15633545|8125630": ["We believe that the advancement of OLAP tools is partially related to the ability of the OLAP systems to provide multi-level, multidimensional presentation of data stored in large data warehouses [22].", "Temperature measured in the east-central region of British Columbia is in the range [22, 30]."]} +{"15633545|3102110": []} diff --git a/graph_3024182.jsonl b/edge/graph_124371729.jsonl similarity index 100% rename from graph_3024182.jsonl rename to edge/graph_124371729.jsonl diff --git a/edge/graph_12439632.jsonl b/edge/graph_12439632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e5e5cdcf1de970eb6045d8cf00f4b56ebeab4d2 --- /dev/null +++ b/edge/graph_12439632.jsonl @@ -0,0 +1,2 @@ +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} diff --git a/edge/graph_12443199.jsonl b/edge/graph_12443199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64fbd73ea952daaa5ebcd5106b569da8488b41b6 --- /dev/null +++ b/edge/graph_12443199.jsonl @@ -0,0 +1,2 @@ +{"18279489|396631": []} +{"18279489|3540699": ["MVC is based on the single-view video compression standard H.264/AVC [14], [ 48 ]."]} diff --git a/edge/graph_12447321.jsonl b/edge/graph_12447321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2b1ac70197109d0b901d9ad4b93c5a32935ef07 --- /dev/null +++ b/edge/graph_12447321.jsonl @@ -0,0 +1,9 @@ +{"109352569|6327434": []} +{"113924061|24110634": []} +{"113924061|2623404": []} +{"2479537|15300368": ["Wireless sensor networks (WSNs) [6,7], on the other hand, are a much more robust and efficient option to monitor pipelines."]} +{"8887289|1230643": []} +{"9833140|1230643": ["All rights reserved."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"36126091|1230643": []} +{"36126091|12060835": []} diff --git a/graph_3024483.jsonl b/edge/graph_12452682.jsonl similarity index 100% rename from graph_3024483.jsonl rename to edge/graph_12452682.jsonl diff --git a/graph_302716.jsonl b/edge/graph_12454277.jsonl similarity index 100% rename from graph_302716.jsonl rename to edge/graph_12454277.jsonl diff --git a/graph_3054454.jsonl b/edge/graph_12455431.jsonl similarity index 100% rename from graph_3054454.jsonl rename to edge/graph_12455431.jsonl diff --git a/edge/graph_12457965.jsonl b/edge/graph_12457965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21d8a481bfbd91a3cd9b2d70ac0920ffe48458fa --- /dev/null +++ b/edge/graph_12457965.jsonl @@ -0,0 +1 @@ +{"4916881|191396": ["To evaluate the generalization capability of the RPCL ensemble network, we also conduct experiments for clusteringbased classification."]} diff --git a/edge/graph_12467547.jsonl b/edge/graph_12467547.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cadf08de256458c46f85b0a492e89073f379846 --- /dev/null +++ b/edge/graph_12467547.jsonl @@ -0,0 +1,8 @@ +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"1174664|1236072": ["However, research in routing for wireless sensor networks has extensively investigated this issue [1]."]} +{"1174664|2835258": ["The coordinates can have physical meaning, such as GPS coordinates, as has been studied for mobile adhoc networks [31]."]} +{"1174664|14441987": ["There is a huge body of work on routing protocols [12, 13, 1, 15] and metrics [16, 4, 5] for this environment."]} +{"2465022|2835258": []} +{"2892242|870434": ["In underwater acoustic networks [1,26], DTNs are more critical as no \ufb01xed infrastructure exists and less than ten expensive autonomous underwater vehicles may roam an area hundreds of km in diameter carrying acoustics transducers that reach only 2\u20135 km."]} +{"566714|14441987": []} diff --git a/graph_1247112.jsonl b/edge/graph_1247112.jsonl similarity index 100% rename from graph_1247112.jsonl rename to edge/graph_1247112.jsonl diff --git a/edge/graph_12474089.jsonl b/edge/graph_12474089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b6514159db077d7236e3f79103f9aa74f21c78e --- /dev/null +++ b/edge/graph_12474089.jsonl @@ -0,0 +1 @@ +{"18012557|53692127": []} diff --git a/graph_3057614.jsonl b/edge/graph_12479038.jsonl similarity index 100% rename from graph_3057614.jsonl rename to edge/graph_12479038.jsonl diff --git a/edge/graph_12482333.jsonl b/edge/graph_12482333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7876d8ca0f405729f9781eb498c3a3bde807512 --- /dev/null +++ b/edge/graph_12482333.jsonl @@ -0,0 +1,4 @@ +{"15944844|11607029": ["It remains to be investigated if the above mechanism is feasible, or if a merging algorithm is required which would consider more differences in parallel [3] [8]."]} +{"361671|10500613": ["There, the identification of interconnections is referred to as schema matching [29, 30, 31]."]} +{"14920149|16378248": ["An informative survey of transformation language features can be found in the paper by Czarnecki [16]."]} +{"13468951|10500613": ["In database design, finding correspondences between database schemata is referred to as schema matching [24]."]} diff --git a/edge/graph_12487207.jsonl b/edge/graph_12487207.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d7bceabc63c57a973400873189462af9140d0d5 --- /dev/null +++ b/edge/graph_12487207.jsonl @@ -0,0 +1 @@ +{"206764581|6137971": []} diff --git a/graph_1248862.jsonl b/edge/graph_1248862.jsonl similarity index 100% rename from graph_1248862.jsonl rename to edge/graph_1248862.jsonl diff --git a/edge/graph_12489337.jsonl b/edge/graph_12489337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..179aed03cb33cbeb47a87c6de656160c6cced58d --- /dev/null +++ b/edge/graph_12489337.jsonl @@ -0,0 +1,10 @@ +{"18729612|206459491": []} +{"16624833|14294629": ["Detect : (href , hsus) 7\u2192 s \u2208 [0, 1].", "(\u03c4 -perceptual robustness): Let \u03c4 \u2208 [0, 1], the \u03c4 -perceptual robustness of a SPH relatively to a detection tool Det, a set of transformations Fpre and a data complexity N , is the probability that the similarity score of a reference IP and its transformation by F \u2208 Fpre is larger than \u03c4 : PeRo\u03c4 (Det,Fpre) , PrIP,X\u2208XN ,F\u2208Fpre [Det (SPH(IP,X),SPH(F (IP), X)) \u2265 \u03c4 ] .", "(\u03c4 -content sensitivity): Let \u03c4 \u2208 [0, 1], the \u03c4 -content sensitivity of a SPH relatively to a detection tool Det, a set of transformations Fpre and a data complexity N , is the probability that the similarity score of a reference IP and its transformation by F\u0304 \u2208 F\u0304pre is smaller than \u03c4 : CoSe\u03c4 (Det, F\u0304pre) , PrIP,X\u2208XN ,F\u0304\u2208F\u0304pre [ Det ( SPH(IP,X),SPH(F\u0304 (IP), X) ) \u2264 \u03c4 ] ."]} +{"1731177|206459491": ["We conclude this section with Section 4.3 with some practical considerations, specifically, scalability and layout-anonymization."]} +{"18244078|206459491": ["It is a time-based activation mechanism of Trojan [5], [6]."]} +{"206710245|14294629": []} +{"206710245|206459491": []} +{"2181944|14294629": ["A survey on IP watermarking techniques is provided in [11] where requirements for general IP watermarking solutions are also presented."]} +{"61834260|206459491": ["An SHTrepresents a malicious design alteration, realized by an FSM that triggers abnormal functionality on a sequence of rare events inside a design [11].", "The logic testing based approaches [11] aim to cause rare events at internal nodes to trigger arbitrary Trojans while the sidechannel based approaches [11] aim at observing Trojan effect on a physical parameter, such as the power trace or the critical path delay.", "Moreover, the Trojans can be tiny relative to the original circuit which makes them difficult to detect by side-channel measurements [11].", "Hardware Trojan The issue of hardware Trojan has emerged recently due to the widely prevalent industrial practice of fabrication of ICs in potentially untrusted foundries [11]."]} +{"314143|14376565": ["IC lifetime is influenced by a variety of phenomena that have been studied by the material science and semiconductor communities, including electromigration (EM) [11], stress migration (SM) [12], time dependent dielectric breakdown (TDDB) [13], thermal cycling (TC) [14], oxide breakdown [9], vertical interconnect access (VIA) [15][16], negative bias temperature instability (NBTI) [17], and hot-carrier injection (HCI) [18][19]."]} +{"314143|206459491": ["Instead, we refer the interested readers to a comprehensive survey on this topic [28]."]} diff --git a/graph_3067314.jsonl b/edge/graph_124915901.jsonl similarity index 100% rename from graph_3067314.jsonl rename to edge/graph_124915901.jsonl diff --git a/graph_3086072.jsonl b/edge/graph_124919031.jsonl similarity index 100% rename from graph_3086072.jsonl rename to edge/graph_124919031.jsonl diff --git a/edge/graph_12492988.jsonl b/edge/graph_12492988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a08d846c20c3003442213a0c62c314e14fa988c0 --- /dev/null +++ b/edge/graph_12492988.jsonl @@ -0,0 +1,6 @@ +{"12895606|5747564": ["For more works about security issues for SG communications, the reader may refer to [3] and [19].", "SG communication technologies are anticipated to enable electric distribution systems to incorporate large amounts of distributed energy resources into the grid and to deal with the intermittent nature of renewable energy [3]."]} +{"12895606|6959212": []} +{"5747564|595093": ["Analyzing and implementing smart grid security is a challenging task, especially when considering the scale of the potential damages that could be caused by cyber attacks [46]."]} +{"43423481|17381415": []} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} diff --git a/graph_3102110.jsonl b/edge/graph_12498289.jsonl similarity index 100% rename from graph_3102110.jsonl rename to edge/graph_12498289.jsonl diff --git a/graph_3102935.jsonl b/edge/graph_125033391.jsonl similarity index 100% rename from graph_3102935.jsonl rename to edge/graph_125033391.jsonl diff --git a/edge/graph_125045987.jsonl b/edge/graph_125045987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d236457450f8bbe9d18f8c7e91b0c42d9d1f8b5 --- /dev/null +++ b/edge/graph_125045987.jsonl @@ -0,0 +1,50 @@ +{"3329621|2355696": ["It involves computer vision, machine learning and behavioral sciences, and can be used for many applications such as security [20], human-computer-interaction [ 23 ], driver safety [24], and health-care [17]."]} +{"16573415|469744": []} +{"2411113|16514036": []} +{"54435303|17221751": ["version the Multi-PIE database [13]; and the Genki-4K database [14], have been developed (see Table 1) [6], [15]."]} +{"16010181|393948": ["Another promising way to adaptively learn features is by virtue of deep learning (Bengio et al, 2013) which achieves state-of-the-art performance on many computer vision tasks."]} +{"16010181|9045232": ["CLM-based methods consist of a shape model and a number of local experts, each of which is utilized to detect a facial feature point.", "FFPD usually starts from a rectangular bounding box returned by face detectors (Viola and Jones, 2004; Yang et al, 2002) which implies the location of a face."]} +{"7565574|6028805": ["Because of the success of Infra-Red images in other facial analysis problems [1,2,20], its applicability to FER is now gaining interest as we will explain next.", "[20] provide a comprehensive and recent review of various facial analysis techniques."]} +{"51611746|20905429": []} +{"3808289|2473564": ["In the 19th century, the worth of Emotion Recognition was recognized when \u201cThe Expression of Emotion in Man and Animals\u201d was written by Charles Darwin [8].", "Corneanu et al., Matusugu et al., and Viola et al. [8,10,11] gave a primary classi\ufb01cation for the emotion recognition using multimodal approaches."]} +{"3808289|11068865": ["JAFFE [24] is a database of static images that was created in laboratory conditions where emotions were acted.", "Signi\ufb01cant experimentation was performed on databases like FERET [28], Faces94 [29], JAFFE [24], Georgia Tech [30], Shef\ufb01eld [31], ORL [32], and YALE [33].", "The few databases used in this study were CMU Advanced Multimedia Processing (AMP) database, AR database, Cohn\u2013Kanade (CK) database [23], Yale database, Japanese Female Facial Expression (JAFFE) database [24], and /hlBinghamton University 3D Facial Expression (BU-3DFE) database [25,26]."]} +{"40776|207060556": ["The interested reader may refer to [67] for recent advances in face detection \u201din-the-wild\u201d."]} +{"40776|17221751": ["\u2026to achieve state-of-the-art results in a series of important computer vision applications, such as face recognition/veri\ufb01cation and facial expression analysis, it is important to provide an enhanced representation of the face that contains the locations of several key facial landmarks [47, 52]."]} +{"6578368|2301292": ["Researchers are already beginning to use 3D sensors and models to improve facial feature tracking and expression recognition [29, 34, 21, 25, 20, 33, 32]."]} +{"44228047|2323881": ["Face analysis is convoluted by the variation in face appearance caused due to pose [2] and illumination changes [3] [4]."]} +{"44228047|5171123": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"31244764|7360895": ["More recently, a number of social robots have been designed and already or potentially applied to people\u2019s everyday lives as companions, assistants, and entertainment toys [8]."]} +{"31244764|14970359": ["There are several surveys of motion feature extraction methods [124\u2013126], where Cedras and Shah [124] reviewed the development of motion detection and recognition in computer vision, Moeslund and Granum [125] investigated human motion detection, and Wang and Singh [126] surveyed motion analysis from the video processing aspect."]} +{"3203588|9079835": ["Due to its simplicity and effectiveness, this algorithm is used inn different domains such as robotics (Couceiro, Rocha, & Ferreira, 2011; Nakisa, Nazri, Rastgoo, & Abdullah, 2014; Nakisa, Rastgoo, Nasrudin, & Nazri, 2014; Rastgoo, Nakisa, & Nazri, 2015) and job scheduling (Sha & Hsu, 2006; G.\u2026"]} +{"25720339|18440098": ["American Sign Language (ASL) was also focused in various hand gesture researches [49]\u2013[52]."]} +{"16667712|6028805": ["Further investigation \nin this direction might result in a better AFEC and AAR functionality and could help other communities \nsuch as physicians, psychologists, and criminal investigators.", "Earlier works and relevant literature suggest that facial skin temperature \nmeasurements might assist in achieving the AFEC and AAR functionality.", "In many studies, thermal infrared imaging could supplement automated facial expression classi\u00ad.cation \n(AFEC) and automated affect recognition (AAR) [Bolle 2004; Kakadiaris et al. 2005a; Kakadiaris et al. \n2005b; Khan et al. 2004; Kong et al. 2005; Kunzmann and Gruhn 2005; Kurse 2001; Matsuzaki and Mizote \n1996; McGimpsey et al. 2000; Ogasawara et al. 2001].", "Is it possible to use the transient facial \nthermal variations for developing a reliable AFEC and AAR capable system?", "Thermal infrared imaging, \na noninvasive technology, was used to measure the skin thermal features ACM Transactions on Applied Perception, \nVol. 6, No. 1, Article 6, Publication date: February 2009. related transient information in these AFEC \nand AAR systems [Khan 2008; Khan et al. 2006; Pavlidis 2004; Puri et al. 2005; Sugimoto et al. 2000; \nYoshitomi et al. 2000].", "In many studies, thermal infrared imaging could supplement automated facial expression classification (AFEC) and automated affect recognition (AAR) [Bolle 2004; Kakadiaris et al. 2005a; Kakadiaris et al. 2005b; Khan et al. 2004; Kong et al. 2005; Kunzmann and Gruhn 2005; Kurse 2001; Matsuzaki and Mizote 1996; McGimpsey et al. 2000; Ogasawara et al. 2001].", "8.2 \nIndividual Differences Several researchers have highlighted the importance of examining the differences \nbetween various racial, ethnic, and geographically separate groups for designing the AFEC and AAR capable \nsystems.", "The future AFEC and AAR capable \nsystems might possibly be able to employ the non-invasive, thermal infrared measurements of facial skin \ntemperature.", "However, \nthe physical locations of the identi.ed discriminator variables obtained from the TIV data measured at \nthe FTFPs suggested that the AFEC and AAR might require monitoring the thermal changes at multiple locations \non the face along the major facial muscles.", "\u2026facial expression classi\u00ad.cation \n(AFEC) and automated affect recognition (AAR) [Bolle 2004; Kakadiaris et al. 2005a; Kakadiaris et al. \n2005b; Khan et al. 2004; Kong et al. 2005; Kunzmann and Gruhn 2005; Kurse 2001; Matsuzaki and Mizote \n1996; McGimpsey et al. 2000; Ogasawara et al. 2001].", "PROPOSED DIRECTIONS OF FUTURE WORK The results of this investigation allowed setting \nup an agenda for future research on AFEC and AAR us\u00ading the facial skin temperature.", "Human skin temperature, a biophys\u00adiological signal, \ncould be acquired through noncontact means and used in AFEC and AAR systems."]} +{"125165443|9045232": []} +{"2609831|2355696": ["FACIAL expression recognition has become an increasingly active research topic in the field of computer vision, as it plays an important role in many applications such as human-computer interaction [1] and health care [2]."]} +{"11724192|393948": ["and temporal and spatial coherence [3]."]} +{"2482804|2355696": []} +{"2482804|1118130": ["Understanding social relation is an important research topic in social signal processing [4, 29, 30, 36, 37], an important multidisciplinary problem that has attracted a surge of interest from computer vision community."]} +{"17221751|2301292": ["from naturalistic environments with spontaneous affective behaviour [118] as existing datasets [122], [138], [176] contain exaggeratedly posed affective behaviour.", "the recognition of expressions that might be hardly noticeable using only 2D appearance [118]."]} +{"753606|14866098": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"753606|16362395": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"37903861|18050848": ["Indeed, various important human-computer components, such as speaker identification, verification [7], localization [8], speech event detection [9], speech signal separation [10], coding [11], video indexing and retrieval [12], and text-to-speech [13], have been shown to benefit from the visual channel [14]."]} +{"3434428|2301292": []} +{"7326413|9045232": ["AUTOMATIC face recognition (AFR) has been studied for over 30 years [1]\u2013[3]."]} +{"2473564|17221751": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12].", "For a more processing oriented review of the literature the reader is mainly referred to [10], [12]."]} +{"2473564|16010181": ["This work introduces them briefly, referring the reader to more specific surveys for each topic [176], [180], [181]."]} +{"2473564|1482463": ["For RGB images , Viola&Jones [60] still is one of the most used algorithms [10], [61], [177]."]} +{"2473564|2301292": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12]."]} +{"2473564|2355696": []} +{"2473564|14303607": ["FE recognition techniques are grouped into categorical and continuous depending on the target expressions [184]."]} +{"24124097|17221751": ["key core of affective computing, facial expression recognition has attracted substantial attentions for researchers over the past decade and is increasingly applied in related fields such as computer vision, pattern recognition, security surveillance, and so on [9, 17].", "To resolve multi-class classification in machine learning, the classifiers such Artificial Neural Network (ANN), Decision Trees, Conditional Random Field (CRF), Hidden Markov Model (HMM), Bayesian Network (BN),and Support Vector Machine (SVM) can be applied [9, 14, 17].", "SVM classifier has commonly been used in the facial expression recognition tasks and is a competitive approach [9, 14, 17, 21]."]} +{"24124097|2323881": []} +{"62600805|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"3659309|14303607": ["In addition, configuration and shape representations play an important role in human vision for the perception of facial expressions [37]."]} +{"16240219|207060556": []} +{"16240219|17221751": ["This progress is, arguably, one of the most important steps towards high performance face recognition and verification [36], as well as facial expression recognition [34]."]} +{"19525052|17221751": ["Expression classification from visual data: While much work has been done on automatically inferring human expressions from images, nearly all of it focuses on unoccluded, frontal faces (see [27, 14, 5, 32] for recent surveys)."]} +{"126959218|2473564": []} +{"32529271|18599847": []} +{"15993113|6857179": ["When it comes to associations between AUs and dimensional models of emotion, such as the valence-arousal model, little research is available [25]."]} +{"15993113|6387482": ["Some works have also attempted a combination of both methods in hybrid fusion [32].", "The most common modalities to be merged are combinations of audio, video and text modalities [32]."]} +{"2301292|1118130": ["prototypical expressions of emotions [5,4,6,7]."]} diff --git a/graph_3104600.jsonl b/edge/graph_12513771.jsonl similarity index 100% rename from graph_3104600.jsonl rename to edge/graph_12513771.jsonl diff --git a/edge/graph_12516503.jsonl b/edge/graph_12516503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31c7adbab38ad956c10b69953dbabbe4893d3a2e --- /dev/null +++ b/edge/graph_12516503.jsonl @@ -0,0 +1 @@ +{"207245256|15790998": ["The cost of computing the model is polynomial, \nsince CB is a stratified logic program [Cadoli and Schaerf 1993]."]} diff --git a/graph_1251893.jsonl b/edge/graph_1251893.jsonl similarity index 100% rename from graph_1251893.jsonl rename to edge/graph_1251893.jsonl diff --git a/graph_3113514.jsonl b/edge/graph_1252121.jsonl similarity index 100% rename from graph_3113514.jsonl rename to edge/graph_1252121.jsonl diff --git a/graph_3115258.jsonl b/edge/graph_12526628.jsonl similarity index 100% rename from graph_3115258.jsonl rename to edge/graph_12526628.jsonl diff --git a/edge/graph_12527758.jsonl b/edge/graph_12527758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a432a0dda8aa8dbf788762e16811380d3c2eb656 --- /dev/null +++ b/edge/graph_12527758.jsonl @@ -0,0 +1 @@ +{"12529161|14889616": []} diff --git a/graph_3125111.jsonl b/edge/graph_12530985.jsonl similarity index 100% rename from graph_3125111.jsonl rename to edge/graph_12530985.jsonl diff --git a/graph_3139686.jsonl b/edge/graph_12534101.jsonl similarity index 100% rename from graph_3139686.jsonl rename to edge/graph_12534101.jsonl diff --git a/edge/graph_12537501.jsonl b/edge/graph_12537501.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d5fc3d923208bf58388e35543068893585ec44f --- /dev/null +++ b/edge/graph_12537501.jsonl @@ -0,0 +1,42 @@ +{"12699980|121289": ["This leads to larger overall data volumes and a high degree of complexity which needs to be handled by the ICT infrastructure [2]."]} +{"35296887|12083425": ["The induction generator stator is directly connected to the grid, while the rotor winding is connected via slip rings to an ac/dc/ac converter [45]."]} +{"8440916|29060869": ["A survey on energy-efficient communication systems and data centers in the smart grid is presented in [8]."]} +{"8440916|3330461": ["An extensive review of available literature on D2D communications in cellular networks was presented in [11]."]} +{"8440916|485843": ["In [10] and [54], the major types of traffic that a smart grid communication network is anticipated to carry are studied along with their QoS requirements."]} +{"8440916|595093": []} +{"8440916|25929315": ["A survey of alternative solutions for the Random Access Channel (RACH) was provided in [55].", "Dynamic configuration of the contention resources results in a trade-off with the resources available for actual communication [55]."]} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"26876575|485843": ["In view of their efficient use, the latter, in partnership with telecom operators and smartmeter vendors, are developing pilot projects aiming to realize envisioned SG applications [6], [7]."]} +{"26876575|4631990": ["[2] show that the EcoGrid project is the first time that real-time control issues and marketbased price formation have a common ground.", "By providing intelligent distributed generation and distribution, long-distance transport and the associated energy losses are reduced or eliminated [2]; cost is optimized by the wide use of building automation and smart loads, thus enhancing energy efficiency, security, and comfort in buildings and industry [3]\u2013[5]."]} +{"26876575|6959212": ["All these partnerships define the main requirements and features of the necessary communications infrastructure, integrating distribution automation, advanced sensors, smart meters, monitoring systems, outage detection, line-fault and electric-fraud detection, underground cable system monitoring, tower and pole monitoring, conductor temperature and dynamic thermal rating, and computer hardware (HW), software (SW), and data management systems that enable the collection and distribution of information between meters and utilities [8]\u2013[10]."]} +{"15992471|4631990": ["N the latest years, advances in information and communication technology have opened the possibility to create smart home/building environments, aimed at increasing comfort and security, making management easier, reducing energy consumption, and minimizing environmental impact [1]."]} +{"29060869|485843": []} +{"29060869|595093": ["The readers who are interested on a detailed survey on smart grid security are referred to [24], [25]."]} +{"29060869|5747564": []} +{"29060869|7686677": ["Interested readers can refer to [13]\u2013[16] for energy efficient wireless communications, [17], [18] for energy efficient optical commu-", "Furthermore, femtocells and picocells are energy efficient alternatives to macrocells, however when they are densely deployed, they may reduce the efficiency of the macrocell as the primary BS will operate under low traffic [16]."]} +{"29060869|8909218": []} +{"29060869|121289": ["been discussed in detail in [9], [10]."]} +{"29060869|2373572": ["In addition, the technique known as Power Line Communications (PLC) emerges as a strong candidate for the AMI [33], [34]."]} +{"485843|4631990": ["The fundamental task of the HEM system is energy efficiency [11], data measurement, and transmission."]} +{"485843|6959212": ["From a slightly different perspective, a \u201csmart grid\u201d can be considered as a data communication network that achieves, with the support of specific power management hardware devices, flexible, seamless inter-operation abilities among different advanced components of the system for efficient utilization of the energy [12]."]} +{"485843|121289": ["values for power system control signals should not exceed 15 ms [44].", "TABLE I REQUIREMENTS OF SG APPLICATIONS [44], [60]"]} +{"12103882|17774971": []} +{"12103882|192934": []} +{"14741413|485843": []} +{"14741413|17381415": ["Taking advantage of the V2G capability and technology, the batteries on PHEVs can be used to boost DERs by feeding electricity back to the grid when they are parked.", "The authors in [87] apply the PSO approach to solve the problem of cooperative scheduling of pervasive DERs, due to its easy implementation and manageable computational time duration.", "Integrating the uncertain and intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46].", "\u2026intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46]."]} +{"14741413|12083425": ["\u2026intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46]."]} +{"14741413|8783262": ["As a popular existence of energy storage, PHEVs are emerging as a transportation alternative to reduce greenhouse gas emissions; however, the large electricity demand of widespread adoption of PHEVs will also pose significant challenges to the existing stable grid [60]\u2013 [64]."]} diff --git a/edge/graph_12538766.jsonl b/edge/graph_12538766.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd7584426efc71dabb9c76a45bd10c1f944fb783 --- /dev/null +++ b/edge/graph_12538766.jsonl @@ -0,0 +1 @@ +{"2265594|2835258": ["If network nodes have access to position information, also position-based algorithms [11] can be used."]} diff --git a/graph_3144583.jsonl b/edge/graph_12547296.jsonl similarity index 100% rename from graph_3144583.jsonl rename to edge/graph_12547296.jsonl diff --git a/edge/graph_12554008.jsonl b/edge/graph_12554008.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ced95fc7079b1a42728fe4b0f9e25067977f45a0 --- /dev/null +++ b/edge/graph_12554008.jsonl @@ -0,0 +1 @@ +{"40539724|14441987": []} diff --git a/graph_3148588.jsonl b/edge/graph_125554957.jsonl similarity index 100% rename from graph_3148588.jsonl rename to edge/graph_125554957.jsonl diff --git a/graph_3175951.jsonl b/edge/graph_12562494.jsonl similarity index 100% rename from graph_3175951.jsonl rename to edge/graph_12562494.jsonl diff --git a/edge/graph_12562564.jsonl b/edge/graph_12562564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0ba0008b5b46e3eee28a6593830cf317b4bc8a8 --- /dev/null +++ b/edge/graph_12562564.jsonl @@ -0,0 +1 @@ +{"28953495|8953108": ["Sezgin and Sankur [5] present a survey of different thresholding algorithms and various performance criteria used.", "[5] M. Sezgin and B. Sankur, \u201cSurvey over image thresholding techniques and quantitative performance evaluation,\u201d J. Electron."]} diff --git a/graph_3176028.jsonl b/edge/graph_125647803.jsonl similarity index 100% rename from graph_3176028.jsonl rename to edge/graph_125647803.jsonl diff --git a/graph_3183240.jsonl b/edge/graph_125648105.jsonl similarity index 100% rename from graph_3183240.jsonl rename to edge/graph_125648105.jsonl diff --git a/graph_12569.jsonl b/edge/graph_12569.jsonl similarity index 100% rename from graph_12569.jsonl rename to edge/graph_12569.jsonl diff --git a/graph_3183613.jsonl b/edge/graph_12570972.jsonl similarity index 100% rename from graph_3183613.jsonl rename to edge/graph_12570972.jsonl diff --git a/edge/graph_125722785.jsonl b/edge/graph_125722785.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2356d46fa829d9014faa7b734dc0a040cd6fbe47 --- /dev/null +++ b/edge/graph_125722785.jsonl @@ -0,0 +1 @@ +{"37925315|12681089": []} diff --git a/edge/graph_12572872.jsonl b/edge/graph_12572872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb8fef24c2b4e9df7555f4d9a7326e5e10bf8e9a --- /dev/null +++ b/edge/graph_12572872.jsonl @@ -0,0 +1,2 @@ +{"14519680|11266709": ["Presence is a much-debated concept, with many different definitions having been proposed [106,107], The current definition of presence in a VE is \u2018the feeling of being there\u2019."]} +{"14519680|14970359": ["this could be waiting for an event to occur, gathering information or controlling hardware [25]."]} diff --git a/graph_3184786.jsonl b/edge/graph_12574246.jsonl similarity index 100% rename from graph_3184786.jsonl rename to edge/graph_12574246.jsonl diff --git a/graph_3185872.jsonl b/edge/graph_125742755.jsonl similarity index 100% rename from graph_3185872.jsonl rename to edge/graph_125742755.jsonl diff --git a/graph_3204760.jsonl b/edge/graph_12574304.jsonl similarity index 100% rename from graph_3204760.jsonl rename to edge/graph_12574304.jsonl diff --git a/edge/graph_12577817.jsonl b/edge/graph_12577817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dcdfc492a1f4e913577532406ef546526b2ca6d6 --- /dev/null +++ b/edge/graph_12577817.jsonl @@ -0,0 +1 @@ +{"45688236|10608305": ["The recent departure from classical scaling laws [37] has placed Moore\u2019s Law in jeopardy, and thus the expected scalability of future multicore systems.", "However, due to the ever-increasing demand for computational power, the reduction in the energy consumption remains one of the key focus areas when designing such systems [37]."]} diff --git a/edge/graph_125781582.jsonl b/edge/graph_125781582.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0329f379bfd656b12c18afc95038bb1e65e407d1 --- /dev/null +++ b/edge/graph_125781582.jsonl @@ -0,0 +1,2 @@ +{"20612993|4967411": []} +{"67867582|55111989": ["The major application areas of edge detection techniques are the process of image segmentation, object detection, image enhancement, image compression, robotics, military, medical diagnosis, meteorology, computer vision, pattern recognition, geography, etc. [3, 4, 6, 9, 15, 18\u201321, 23\u201327, 33\u201336, 40]."]} diff --git a/graph_321117.jsonl b/edge/graph_125887462.jsonl similarity index 100% rename from graph_321117.jsonl rename to edge/graph_125887462.jsonl diff --git a/edge/graph_12594004.jsonl b/edge/graph_12594004.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe643f1a30363ee4c747793591e28d7153d73d96 --- /dev/null +++ b/edge/graph_12594004.jsonl @@ -0,0 +1 @@ +{"1740593|18977370": ["Some of them areStatistical based, Operational orthreshold metric model, Markov Process or Marker Model,Statistical Moments or mean and standard deviation model,Univariate Model, Multivariate Model, Time series Model,Cognition based, Finite State Machine Model, Descriptionscript Model, Adept System Model, Machine Learning based,Bayesian Model, Genetic Algorithm model, Neural NetworkModel, Fuzzy Logic Model, Outlier Detection Model,Computer Immunology based and User Intention basedModel [12,20]."]} diff --git a/edge/graph_12595430.jsonl b/edge/graph_12595430.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99c899658f49ef02d50fcd85c8b9b5c40713f6f1 --- /dev/null +++ b/edge/graph_12595430.jsonl @@ -0,0 +1,6 @@ +{"60053723|16525678": []} +{"60053723|206051485": []} +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} +{"61167697|33286487": []} +{"638368|5473785": ["Although some of these algorithms can give good results on some benchmark data sets, there are still several problems such as node ordering requirement, lack of efficiency and lack of publicly available learning tools (Neapolitan, 1990)."]} +{"17396854|6430931": ["We focus on the framework aspect, however for further reading on the topic of distributed detection we refer to the dedicated work of Xu and Ling on alert correlation [49], or surveys dedicated to detection mechanisms such as anomaly detection [13] or the application of computational intelligence to intrusion detection [47]."]} diff --git a/graph_1259855.jsonl b/edge/graph_1259855.jsonl similarity index 100% rename from graph_1259855.jsonl rename to edge/graph_1259855.jsonl diff --git a/graph_3220291.jsonl b/edge/graph_125988328.jsonl similarity index 100% rename from graph_3220291.jsonl rename to edge/graph_125988328.jsonl diff --git a/edge/graph_12601073.jsonl b/edge/graph_12601073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..738c9590465c22a96a6e367c2d3ef31615429ccd --- /dev/null +++ b/edge/graph_12601073.jsonl @@ -0,0 +1 @@ +{"14213139|30443041": ["The search for robustness began long time ago [9], [10].", "After this seminal work, there have been quite a few researches in this area [10].", "However, most of them can only be used when the uncertainty has very special and well defined properties, for example, the -contamination class [9], [10]."]} diff --git a/edge/graph_12604503.jsonl b/edge/graph_12604503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..086d9359a02a7c2165fb4d10c97f5e39273619c6 --- /dev/null +++ b/edge/graph_12604503.jsonl @@ -0,0 +1,2 @@ +{"14580084|270804": ["An exhaustive list and analysis of transport protocols for WSNs can be found in [3] and [4]."]} +{"12775237|1230643": ["Therefore, while traditional networks aim to achieve high quality of service (QoS) provisions, sensor network protocols must focus primarily on power conservation [1]."]} diff --git a/graph_3230168.jsonl b/edge/graph_126068458.jsonl similarity index 100% rename from graph_3230168.jsonl rename to edge/graph_126068458.jsonl diff --git a/edge/graph_12607466.jsonl b/edge/graph_12607466.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bddde0d5647aa64863a05367b03ff4034cbbe81 --- /dev/null +++ b/edge/graph_12607466.jsonl @@ -0,0 +1,3 @@ +{"1716851|1400872": ["Once the network structure is well known, a more detailed model may be used to estimate individual mechanism-related parameters, such as binding and decay constants."]} +{"18221187|6923178": ["Several indices can be used to score the e ciency of the algorithm [5]."]} +{"15343954|6923178": ["Thus, inference in BRNNs is more efficient than in bidirectional IOHMMs, where complexity is O(T n 3 ) (Baldi et al., 1999b).", "While inference in this network can be shown to be tractable, the corresponding time complexity of O(n 3 ) for each time step (here n is the typical number of states in the chains) limits their practical applicability to the SS prediction task (Baldi et al., 1999b).", "Throughout this article, we use the standard performance measures reviewed in Baldi et al. (1999a).", "Throughout this article, we use the standard performance measures reviewed in Baldi et al. (1999a). Unless we specify otherwise,Q3 percentages are measured on a per residue basis.", "Throughout this article, we use the standard performance measures reviewed in Baldi et al. (1999a). Unless we specify otherwise,Q3 percentages are measured on a per residue basis. Prediction of SS based on single sequences and local windows seem to be limited to <65\u201369% accuracy. Increasing the size of the window, however, does not lead to improvements because of the overfitting problem associated with large networks. Building upon the work ofQian and Sejnowski (1988), for a long time the best SS prediction performance has been achieved by the PHD scheme ( Rost and Sander , 1993, 1994)."]} diff --git a/edge/graph_126087791.jsonl b/edge/graph_126087791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc73e7e899ec334c9c231dc043724ab6d3036b33 --- /dev/null +++ b/edge/graph_126087791.jsonl @@ -0,0 +1,7 @@ +{"17984299|2340253": []} +{"17984299|1708582": ["For instance, a detailed literature survey of reinforcement learning research has been authored by Kael, Littman , and Moore (1997)."]} +{"17984299|1995121": []} +{"26044553|12083425": ["This application includes active front end (AFE) for high performance drives, rectifiers, grid integration of renewable energies like wind or PV, energy storage systems, and are also used in FACTS devices as STATCOM, active power filter, or as a part of an UPFC or UPQC [15]\u2013[17].", "These inverters are also employed when a voltage source is needed like in FACTS devices as SSSC, DVR or as a part of an UPFC or UPQC."]} +{"205866696|8363289": ["The underlying theory of MPC methods and a growing body of results have been recently surveyed Mayne et al. (2000)."]} +{"123514673|1876323": []} +{"52840404|207150075": ["This compliance scheme is similar in nature to the model reference adaptive compliance presented in (Khan et al., 2010b, 2014b), Khan and Herrmann (2014) and Colbaugh et al. (1996) However, here this scheme is much simpler and solely based on ISMC.", "Compliance (low stiffness) control can help addressing some safety issues (Khan et al., 2014a).", "While in Khan et al. (2010b, 2014b), Khan and Herrmann (2014) and Colbaugh et al. (1996) the reference model is \u201cexternal\u201d where, tracking demand is modified (using force feedback) to compensate the external forces.", "However, we have addressed this issue to some extent in our previous work (Khan et al., 2014b, 2010a)."]} diff --git a/graph_3264875.jsonl b/edge/graph_126106025.jsonl similarity index 100% rename from graph_3264875.jsonl rename to edge/graph_126106025.jsonl diff --git a/edge/graph_126180710.jsonl b/edge/graph_126180710.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0ba6c2bbde04162c01cfd58d0132cdd91b6d9e4 --- /dev/null +++ b/edge/graph_126180710.jsonl @@ -0,0 +1,18 @@ +{"11567426|1651267": ["Different from the traditional single saliency detection model, co-saliency detection model aims at discovering the common salient objects from an image group containing two or more relevant images, while the categories, intrinsic characteristics, and locations of the salient objects are entirely unknown [19]."]} +{"6283383|1223851": ["Therefore, the object detection data set is more suitable for solving saliency co-occurrence problem [3]."]} +{"4546146|1223851": ["As mentioned by the previous studies [7], [43], and [44], in the branch of bottom-up SOD, approaches are to detect saliency under free viewing, which is automatically determined by the physical characteristics of the scene, while approaches in the other branch are to detect the task-driven saliency determined by the current goals of the observer."]} +{"9086132|8953108": ["Hundreds of algorithms exist [30] and we choose the standard algorithm by Otsu [31] which determines the threshold that minimises the within class variance of the two groups of pixels separated by the thresholding operator."]} +{"2329405|387610": ["Extracted saliency maps are widely used in many computer vision applications including objectof-interest image segmentation [13, 18], object recognition [25], adaptive compression of images [6], contentaware image editing [28, 33, 30, 9], and image retrieval [4]."]} +{"3876725|10355303": ["It plays an important role in a large number of video analysis tasks [14, 37, 65, 68, 95, 117, 121] such as traffic monitoring, visual tracking, surveillance, and video summarization."]} +{"4470071|1223851": ["We refer interested readers to [2] and [3] for surveys and benchmark comparisons."]} +{"59606057|13407903": []} +{"52000557|1223851": ["The early works mainly explore various hand-crafted features and feature fusing strategies [1]."]} +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"21727227|206487032": ["Many methods have been proposed for this topic, as surveyed in [43]."]} +{"17561765|15744805": ["Zhang [26] published a survey on these methods in 1996."]} +{"31793010|17252389": ["Salient object detection methods commonly serve as the first step for a variety of computer vision applications including image and video compression [15, 20], image segmentation [10], content-aware image editing [9], object recognition [44, 48], visual tracking [2], non-photo-realist rendering [43, 16], photo synthesis [6, 14, 19], information discovery [35, 53, 8], image retrieval [18, 12, 8], etc."]} +{"22726592|1223851": ["\u2026crucial in evaluating and comparing various computer vision algorithm for applications such as object detection [6, 8, 24, 40], saliency prediction [5, 20, 42], image segmentation [41], content-based image retrieval [12, 15, 22], semantic segmentation [21,45,46] and image collection browsing\u2026"]} +{"22726592|17252389": ["computer vision algorithm for applications such as object detection [6,8,24,40], saliency prediction [5,20,42], image segmentation [41], contentbased image retrieval [12,15,22], semantic segmentation [21,45,46] and image collection browsing [10,14,29]. As a speci\ufb01c example, here we focus on salient object detection models [4,6,7,16], although the proposed measure is general and can be used for other purpose"]} +{"19690742|1223851": ["[5] for more details on unsupervised meth-ods.", "A salient object is often de\ufb01ned as a region whose visual features differ from the rest of the image and whose shape follows some a priori criteria [5]."]} +{"19690742|393948": ["CNNs were \ufb01rst developed to perform image classi\ufb01cation [22, 4, 24, 23]."]} +{"641747|4361938": ["The interested reader is referred to [22], [23], [127] for eye movement studies and [24] for a breadth-first survey of eye tracking applications."]} diff --git a/edge/graph_126187890.jsonl b/edge/graph_126187890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..326baef07c802ae760faa371ee9d50fdc4e13c32 --- /dev/null +++ b/edge/graph_126187890.jsonl @@ -0,0 +1,29 @@ +{"17680647|2616070": ["We extend our system on still images to video sequences in Sec."]} +{"3596181|469744": []} +{"15027919|15767558": ["Other features, such as motion, can also be included with an increased computational load."]} +{"16280029|10355303": ["For a detailed review we refer to [21, 29]."]} +{"54475412|10175374": ["We conducted two further experiments to disentangle the effect of multi-task learning [8, 53] to the one of using the MBR box (from a binary mask) as representation for the target object instead of a traditional axis-aligned bounding box."]} +{"1828261|195346070": ["Multi-target tracking has been and still is an extremely popular research field in computer vision [39]."]} +{"783186|12127129": ["Since its introduction, the model has gained vastly in popularity among the computer vision community [4], [7], [11], [42]\u2013[44], and it is still raising a lot of interest as authors continue to revisit the method and propose enhanced algorithms [45]\u2013[50].", "According to [7], a background subtraction technique must adapt to gradual or fast illumination changes (changing time of"]} +{"468651|15767558": ["Spatiotemporal segmentation methods can be divided into two categories, layer-based approaches and generic segmentation techniques (a good review is provided in Megret\nand DeMenthon 2002)."]} +{"29263955|6863252": []} +{"52044681|1932843": ["Reinforcement learning has obtained successes in areas like robotics [17] and control [23], where real agents and environments are involved naturally."]} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"4322524|195346070": []} +{"2519672|10355303": ["The signi\ufb01cant activity in the \ufb01eld over last two decades is re\ufb02ected in the abundance of review papers [1\u20139]."]} +{"2519672|17516538": []} +{"2519672|14970359": []} +{"2519672|7788290": []} +{"206591471|819377": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness.", "We refer to the work of Bouwmans et al. [4] for a comprehensive list.", "This originates from the quick weight up-date of the Gaussian mode, while the Gaussian distribution itself is adapted very slowly (cf. [4])."]} +{"206591471|12127129": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness."]} +{"11311842|15744805": ["Although several measures have been developed for still image segmentation [1]\u2013[7], they are not directly applicable to video object segmentation and tracking."]} +{"205396611|13365762": []} +{"1514006|10397481": ["With the goal of providing an efficient way to overview the large collection of videos, video summarization has attracted intensive attention over the past decade [27] [34].", "Video summarization has been tackled from various perspectives [27] [34]."]} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} +{"29152511|1185580": ["To reduce variance in the estimator, it is common to replace R t by an estimate A t of the advantage function, A ( h t , a t ) = Q ( h t , a t ) \u2212 V ( h t ) [7]."]} +{"18645439|2616070": []} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"15287463|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} diff --git a/graph_1262076.jsonl b/edge/graph_1262076.jsonl similarity index 100% rename from graph_1262076.jsonl rename to edge/graph_1262076.jsonl diff --git a/graph_1262156.jsonl b/edge/graph_1262156.jsonl similarity index 100% rename from graph_1262156.jsonl rename to edge/graph_1262156.jsonl diff --git a/edge/graph_126285328.jsonl b/edge/graph_126285328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f438707abc0317bd83ff14f0895deda1a7398f10 --- /dev/null +++ b/edge/graph_126285328.jsonl @@ -0,0 +1,7 @@ +{"122898661|30443041": ["It is known that this approach may lead to poor estimation performance (Kassam and Poor 1985 , Khargonekar et al ."]} +{"9614092|1517662": ["Some systems contain discontinuities (for example, the process model might be jump-linear [14], in which the parameters can change abruptly, or the sensor might return highly quantized sensor measurements [15]), others have singularities (for example, perspective projection equations [16]), and in others the states themselves are inherently discrete (e.g., a rule-based system for predicting the evasive behavior of a piloted aircraft [ 17 ])."]} +{"797194|4491892": []} +{"10138368|4491892": ["A survey of some con vergence results for SMC is provided by Crisan and Doucet (2002)."]} +{"17515415|8363289": ["Our framework is deterministic."]} +{"10951922|1188683": ["To allow for an unspecified number of iterations, complicated control structures in hardware are needed [15]."]} +{"27941016|8363289": []} diff --git a/edge/graph_12637571.jsonl b/edge/graph_12637571.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2611e55a229a198a0d0369baefcc3ef45ae65c76 --- /dev/null +++ b/edge/graph_12637571.jsonl @@ -0,0 +1,2 @@ +{"369523|18701981": ["It represents a starting point for more complex tasks such as search tasks, collective mapping tele\u2010operation by a single operator of a group of robots, etc. (Navarro & Mat\u00eda, 2013)."]} +{"25250804|468992": ["Because of these similarities, some of the principles of animal \ufb02 ocking models can be integrated into the control dynamics of autonomous robots [9]."]} diff --git a/edge/graph_12663580.jsonl b/edge/graph_12663580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ad468c7d128bc034182d631abb8dbae6682b895 --- /dev/null +++ b/edge/graph_12663580.jsonl @@ -0,0 +1,3 @@ +{"10602784|15782139": []} +{"13613167|9045232": []} +{"9074165|7185733": []} diff --git a/edge/graph_12673419.jsonl b/edge/graph_12673419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b307e5d5516bc1da795c29aca8e07a084f7714d --- /dev/null +++ b/edge/graph_12673419.jsonl @@ -0,0 +1,3 @@ +{"206454765|8909218": []} +{"19289058|11720829": ["that the channel matrix is perfectly known to the receiver via a training sequence, and that the signals from individual LEDs are independent and equi-powered, then the SE of the MIMO channels is given by [7], [16]", "Since the previous work has analyzed the SNR for indoor VLCs in detail [1], we only present a brief discussion on the achievable SNR with the fisheye-lens-based imaging receiver.", "Consequently, this fisheye-lens-based imaging receiver scheme is a potential candidate for highperformance indoor MIMO VLCs.", "On the other hand, the use of MIMO techniques enables high capacity without the need for additional power or bandwidth [7].", "Multiple-input-multiple-output (MIMO) is another potential solution to realize high-speed indoor VLCs [7].", "Zeng et al. investigated non-imaging and imaging MIMO VLCs, and indicated that the imaging receiver can potentially offer higher spatial diversity [9]."]} +{"40281040|16050825": []} diff --git a/edge/graph_12675271.jsonl b/edge/graph_12675271.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..122dd285c851ece84ce215c6d28c539567b79977 --- /dev/null +++ b/edge/graph_12675271.jsonl @@ -0,0 +1,14 @@ +{"2220499|7329149": []} +{"2220499|1598350": ["T HE INTERNET of Things (IoT) [1] has become popular over the past decade."]} +{"8622994|7774517": ["The problem of detecting sensory measurements that mismatch with the expected pattern of observed data has been thoroughly studied in the literature [11], with the aim of eliminating outliers from the fusion process."]} +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"18070225|15545863": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"18070225|913718": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"9496996|12815020": []} +{"206470388|3348390": ["Additional definitions on IoT are also listed in [2].", "\u2026provide sufficient information, aggregated data from number of physical devices and virtual sensors (e.g. social media such as Facebook, Twitter) [2] can provide a wealth of knowledge for important application areas including disaster management, customer sentiment analysis, smart cities, and\u2026", "It is predicted that, by 2020, there will be 50 to 100 billion devices connected to the Internet [2].", "Data collected through smart wearable and smart home devices can be used to generate contextually [2] enriched information.", "The IoT allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/network and Any service [2]."]} +{"7329149|3348390": ["The term was \ufb01rst coined in 1998 and later de\ufb01ned as \u201cThe Internet of Things allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/ network and Any service\u201d [1]."]} +{"7329149|485843": ["Smart grid is one of the domains in which academia, industry, and governments are interested and invested significantly [72], [73]."]} +{"7329149|20905429": ["In addition to the industry IoT solutions, academic solutions in the wearable computing area are discussed in [26], [27]."]} +{"8587389|1113420": ["Accordingly, a number of solutions for context gathering and modeling have been suggested [1, 3] or already found their ways into practice.", "CoBrA (Context Broker Architecture) [4] and DAIDALOS [16] are two powerful approaches that \u2013 similar to our concept \u2013 comply to the Blackboard model using a central component for storage, management and provision of context data [1]."]} +{"14727437|7644489": ["In this paper, we propose a light-weight relay UE discovery mechanism by leveraging proximity services (ProSe) [7], [8], [9] to achieve low overheads of discovery messages."]} diff --git a/edge/graph_12681089.jsonl b/edge/graph_12681089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfa4ea2448beb8f484e405adf21781a080101ae0 --- /dev/null +++ b/edge/graph_12681089.jsonl @@ -0,0 +1,8 @@ +{"2494137|3054454": ["For an overview of the numerous scattering models, see [10]."]} +{"487603|3054454": ["For the design, performance evaluation, and cell planning with AAs, we need realistic spatial channel models [5], [6]."]} +{"122816240|3054454": ["Thus, the interest in the directional nature of the urban mobile radio channel has rapidly increased over the last years [ 2 ], [3]."]} +{"2722543|3054454": []} +{"1241484|41035405": []} +{"1574615|3054454": ["Various survey articles have recently appeared which have a large number of references on indoor propagation [9], [10], [11], and one discusses statistical channel modeling for both indoor and outdoor channels [12]."]} +{"62435899|3054454": []} +{"8553815|3054454": []} diff --git a/graph_3266540.jsonl b/edge/graph_12692482.jsonl similarity index 100% rename from graph_3266540.jsonl rename to edge/graph_12692482.jsonl diff --git a/graph_3266931.jsonl b/edge/graph_12701922.jsonl similarity index 100% rename from graph_3266931.jsonl rename to edge/graph_12701922.jsonl diff --git a/edge/graph_12707446.jsonl b/edge/graph_12707446.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72849ae08733e2c4a4bc9e777b0073fb2e569178 --- /dev/null +++ b/edge/graph_12707446.jsonl @@ -0,0 +1,6 @@ +{"18825243|485843": ["T HE transformation of the legacy electric grid into a smart grid [1], [2], which includes renewable energy resources [3], [4] and electrified transportation fleets [5], requires real time and optimal operations of the power system [6]."]} +{"18825243|6607209": ["Interested readers can refer to [27]\u2013[29] for a detailed discussion.", "In general, market-based approaches share some underlying elements [27] that can also be recognized for the ED.", "This paper proposes an optimization technique based on the market-based paradigm for multi-agent systems [27] and auction theory [28], [29]."]} +{"109495252|175549": []} +{"27965518|1708582": []} +{"18031495|8530790": []} +{"109485561|8530790": ["Fonseca CM [20] applied evolutionary algorithm method."]} diff --git a/graph_328134.jsonl b/edge/graph_12713288.jsonl similarity index 100% rename from graph_328134.jsonl rename to edge/graph_12713288.jsonl diff --git a/graph_3290545.jsonl b/edge/graph_12715779.jsonl similarity index 100% rename from graph_3290545.jsonl rename to edge/graph_12715779.jsonl diff --git a/graph_1271753.jsonl b/edge/graph_1271753.jsonl similarity index 100% rename from graph_1271753.jsonl rename to edge/graph_1271753.jsonl diff --git a/edge/graph_12724190.jsonl b/edge/graph_12724190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..964793a607f588c43280d604195eec729edb157c --- /dev/null +++ b/edge/graph_12724190.jsonl @@ -0,0 +1,68 @@ +{"17067636|14970359": ["An overview of markerless motion capture systems and algorithms is given in [7]."]} +{"17278013|5664472": ["This is due to its huge potential in a wide spectrum of areas, such as human-machine interaction, psychology [3], surveillance security, healthcare and social assistance, video games, and so on.", "This is based on a combination of transported square-root vector fields (TSRVFs) of trajectories and the standard Euclidean norm, that allows computational efficiency."]} +{"17278013|16013270": ["Rather than covering all ideas exhaustively, we direct interested readers to some recent surveys [5], [6], [7], [9] that together overview this research area.", "Earlier studies in such behavior analysis used videos produced by conventional cameras [5], [6], [7], [8], [9], [10]."]} +{"14537727|1634674": ["[3] and most recently by Aggarwal and Ryoo [4] for a comprehensive analysis)."]} +{"14537727|14970359": ["Over the last few decades , a large number of methods have been proposed for human motion analysis (see the surveys by Moeslund et al. [1] [2] and Turaga et al. [3] and most recently by Aggarwal and Ryoo [4] for a comprehensive analysis)."]} +{"3154525|60455": ["image and video retrieval [2], web content analysis [3],"]} +{"3154525|7185733": ["human-computer interaction [4], and biometrics [5]."]} +{"12627049|18440098": ["Recognizing signs of visual-gestural languages like the American sign language (ASL) is a very active field [145, 146, 147, 148, 149, 150, 151]."]} +{"14970359|7185733": []} +{"14970359|7788290": ["A survey by Gavrila [44] describes work prior to 1998 and gives a good general introduction to the topic with a special focus on applications.", "This provides a good overview of 2D and 3D approaches, as seen in the surveys by Aggarwal and Cai [1] and Gavrila [44], respectively."]} +{"6726756|14116122": ["Among these ones, action and activity recognition displays a crucial role in human-robot interaction, autonomous driving vehicles and video-surveillance [2]."]} +{"14206911|12724190": ["When heterogeneous multimodal features are available, it is well accepted that different types of skeletal features show varying performance on recognizing different behaviors [4].", "1(a), provides the possibility to achieve real-time robot awareness of human behaviors [3], which also provides bene\ufb01ts in comparison to local features, including the invariance to viewpoint, human body scale and motion speed [4], [5].", "Because of these advantages, skeleton-based action understanding methods have attracted increasing attention, and many skeletal features and representations have been implemented during the last few years , see [4] and references therein, i.e. joint rotation matrix [6], BIPOD [5], etc.", "Methods using 3D skeletal data to identify human actions attracted increasing attention after the release of the affordable structured-light 3D sensing technology [4]."]} +{"16175428|11894197": ["The reader is referred to [1] and [20] for a more comprehensive analysis."]} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"206651803|1634674": ["Surveys of activity recognition approaches on such data can be found in [6], [7] and [8]."]} +{"14989571|7185733": ["Therefore, gesture recognition has applications in many research areas, such as human machine interaction (HMI), human robot interaction (HRI) and social assistive robotics (SAR) [2], [3]."]} +{"7689769|1634674": ["Although most previous work on feature extraction focused on using 2D videos [2], several approaches to extract features from 3D videos have been proposed in the past few years."]} +{"1889948|1634674": []} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"15178364|206764452": ["Recent reviews on human behavior understanding focused on specific aspects of the overall problem, such as monocular pedestrian detection [11], human detection for driver-assistance systems [12], and pedestrian detection benchmarks [13], [14].", "Algorithms based on appearance features are specialized detectors trained on large pedestrian databases [11], [12]."]} +{"15178364|1634674": ["[20], [128], [129], which represent the human body in terms", "Note that this definition differs from that of [20], which made no distinctions between activities and interactions.", "From these atomic elements, it is possible to compose actions, namely, temporal concatenations of gestures [20]."]} +{"15178364|5755403": ["Morris and Trivedi [15] surveyed features and model motion trajectories focusing on trajectory analysis."]} +{"15178364|5401262": ["The interest in behavior understanding has dramatically increased in recent years, motivated by societal needs that include security [1], natural interfaces [2], gaming [3], affective computing [4], and assisted living [5]."]} +{"13181540|14970359": []} +{"4632519|9976187": ["Latent Tree Models, in particular, are interesting as they are able to represent complex relationships in the data [11] and, furthermore, recent methods for constructing these models ([2, 7]) enable us to learn consistent and minimal latent tree models in a computationally efficient manner."]} +{"28817124|1634674": []} +{"28817124|25699143": []} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"10270124|1634674": ["The long history of automatically recognising gestures from visual or kinematic measurements is reviewed in [23] [32] [31] [2].", "The problems of detecting and recognizing gestures from human body movements captured using videos or 3D skeletal data have been extensively studied in the computer vision and machine learning communities [2, 31, 32, 23]."]} +{"10042178|7788290": ["An effective solution to this problem has many applications in areas such as video coding, visual surveillance, human gesture recognition, biomechanics, video indexing and retrieval, character animation, and man-machine interaction [ 6 , 18, 8]."]} +{"6933411|1634674": ["These RGB-D based approaches also benefit from the large number of works published in the last two decades on human activity recognition in 2D video sequences (see for example the recent surveys in [21], [22], [23], [24])."]} +{"7165654|1634674": ["Over the last few decades, a large number of approaches have been proposed for human action recognition (see the reviews (Aggarwal and Ryoo 2011; Turaga et al. 2008))."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"14775089|12127129": ["Generally the reference frame often call ed the \u201cbackground image\u201d or \u201cbackground model\u201d must be a representation of the scene without moving objects and must be kept regularly updated so as to adapt to the varying luminance conditions and geometry settings [30]."]} +{"14775089|17516538": ["dent on the performance of the human detection [25], [26], [29].", "Motion segmentation is used to detect regions corresponding to moving objects that can be potential targets in natural scenes in order to provide a focus of attention for later processes such as tracking and activity analyses [26]."]} +{"14775089|14970359": []} +{"7283643|7788290": ["A survey of action recognition research by Gavrila, in [5], classifies different approaches into three categories: (1) 2D approaches without shape models, (2) 2D approach with shape models and (3) 3D approaches."]} +{"363733|17516538": []} +{"19281669|1634674": ["General reviews of activity recognition are conducted in [6], [7]."]} +{"11279201|14970359": ["A short summary of different approaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to (Gavrila 1999) and (Moeslund and Granum 2001).", "A short summary of different ap proaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [24] and [44]."]} +{"11279201|7788290": ["A short summary of different approaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to (Gavrila 1999) and (Moeslund and Granum 2001).", "A short summary of different ap proaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [24] and [44]."]} +{"14827406|7788290": ["Even though many approaches to tracking and modeling people from video sequences have been and continue to be proposed [10, 22, 21], the problem remains far from solved."]} +{"15391916|1634674": ["Typically, a distinction is made between \u2018\u2018action\u2019\u2019 and \u2018\u2018activity\u2019\u2019 [1].", "Action recognition has been extensively studied during the past two decades [1]."]} +{"207107224|393948": ["To some extent, using deep network to learn the features of the data simulates the hierarchical working mechanism of the cortical, which has achieved great success in various applications, such as audio, image, video, and language processing [21]."]} +{"2018737|7185733": []} +{"1262156|1634674": []} +{"18803401|16013270": []} +{"18803401|7185733": []} +{"5664472|1634674": ["[92] focus on the recognition of actions and activities and not on the lower-level processing modules such as detection and tracking."]} +{"5664472|5401262": ["Finally, human activity recognition tasks constitute the foundation of human behavior understanding, which requires additional contextual information such as W5+ (who, where, what, when, why, and how) [144]."]} +{"5664472|16525678": ["Valera and Velastin [89] survey the automated visual surveillance systems."]} +{"5664472|12127129": ["The most common method for static camera segmentation is background subtraction due to its simplicity and efficiency [98]."]} +{"5664472|14970359": ["Depending on whether the use or not an explicit a priori body model [90,108], the body modeling can be roughly categorized in three classes [90,108], i."]} +{"5664472|192934": ["ANNs use the concept of biological neuron networks to supply nonlinear capability via more discriminative feature transformation through hidden layers, resulting in more effective classification through multilayer perceptrons (MLPs), which apply the back propagation (BP) supervised learning algorithms to compute suitable connection weights and biases of the network.", "On the other hand, discriminative models learn the conditional (posterior) probability distribution P(Y|X)over an unobserved fixed-length class label Y on a given observed fixed-length feature vector X, such as support vector machines (SVMs) [79,80], relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84].", "Fiaz and Ijaz [83] propose a method to design an ANN-based intelligent human activity monitoring system to detect and track suspicious activity in a surveillance environment.", "On the other hand, discriminative models (static classifiers) such as Support Vector Machine (SVM) [18,19,79,80], Relevant Vector Machine (RVM) [54,81,82] and Artificial Neural Network (ANN) [29,83,84], can also be used in this stage.", "Generative models, that explicitly simulate the generation process of the data sequences as achieved by the hidden Markov model (HMM) [75] and dynamic Bayesian network (DBN) [78], learn the joint probability distribution , relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84].", "The examples of discriminative models are described below, including support vector machines (SVMs) [18,19,79,80], relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84] is one of the most popular margin-based supervised classifier in the pattern recognition.", "With a systematically sequential training procedure, an ANN can train the model to adapt to the input data.", "The examples of discriminative models are described below, including support vector machines (SVMs) [18,19,79,80], relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84].", "Similarly, Fiaz and Ijaz [83] also perform suspicious activity detection and tracking using ANNs.", "An ANN [84] is a mathematical model to describe the problems in a network of directed graphs, whose nodes are represented as artificial neurons and the weighted directed edges in the graphs are", "Szczodrak et al. [127] use optical flow combined with artificial neural network (ANN) to evaluate the types of crowd behavior.", "Although ANNs have the ability to implicitly describe complex nonlinear relationships between dependent and independent variables, they have higher computation burden during the learning, and are prone to over-fitting of the data.", "The normal behavior (walking), diverging, and abnormal behavior are classified by ANN.", "As mentioned in [84], an ANN enables to learn complex nonlinear input-output relationships with a universal approximation (a black box) model.", "Among classification algorithms for human activities, in addition to DTW, generative models such as HMMs and DBNs, and discriminative models such as SVMs, RVMs and ANNs, there are also many other potential techniques can be adopted, such as Kalman filters [10,86], binary trees [20,87], multidimensional indexing [21], and k nearest neighbors [22] is a set of mathematical equations to minimize the mean square errors (MSEs) and estimate the state of the dynamic process."]} +{"14458914|7788290": ["For a comparative discussion on various other representations, we refer the reader to [ 16 ]."]} +{"1851093|16013270": ["We set G = [5, 10, 15, 20] respectively when \u03bb = 100 and \u03b2 = \u22120.", "Recognition of human gestures, actions, and activities has been extensively surveyed in recent publications [1, 5, 23, 30]."]} +{"1851093|1634674": ["Recognition of human gestures, actions, and activities has been extensively surveyed in recent publications [1, 5, 23, 30]."]} +{"27637541|1634674": ["[118] distinguish between actions and activities by defining that", "Inside 2D-template-based approaches described in [118], temporal templates are estimated for each action class.", "methods shown in [118]); or based on the extraction of features from each silhouette and model the dynamics of the action explicitly (again, similarly to the aforementioned \u2018holistic\u2019 approaches).", "\u2019s [118] action modelling classification.", "[118], approaches for modelling actions can be categorised into three major classes: nonparametric, volumetric, and parametric time-series approaches (see Fig.", "In volumetric approaches, in contrast, features are not extracted on a frame-by-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case [118]."]} +{"27637541|12127129": []} +{"27637541|17516538": ["[41]; this paper is highly comprehensive, as it starts with motion detection and object classification and tracking, but also deals with HBU; it divides the approaches to this task", "There are handfuls of previous surveys which analyse and describe \u201chuman motion\u201d or \u201chuman behaviour understanding\u201d [41, 88, 43, 87, 121]; earlier works, as is logic, review lower level techniques (e.", "At the motion level, tasks such as movement detection, and background extraction and segmentation are faced [41, 72, 89]."]} +{"27637541|14970359": ["Moeslund et al. [72] defined an action taxonomy which has been adopted in later works and subsequent surveys.", "The work by Moeslund et al. [72], from 2006, can be divided into two major parts: pose and motion capture, and action recognition.", "In the work by Moeslund [71], bigger emphasis is given to the recognition of motion and actions, whereas activities and behaviours are treated to a minor extent.", "Pose estimation techniques are introduced next, and they are classified into three groups as in [71], according to the presence and use of an explicit model: model-free, indirect model use, direct model use.", "An evolution of the works presented under this section of Moeslund\u2019s work, can be seen in the papers by Bandouch, Beetz, et al. [7, 9]; which are commented later on.", "Nevertheless, the techniques revealed in [71] allow a greater understanding of current methods, and thus, both this and [34] can be used to introduce the"]} +{"27637541|7788290": []} +{"44771051|7788290": []} diff --git a/edge/graph_127253155.jsonl b/edge/graph_127253155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cba79b7e02cc2238d1f81f9c6ee7537a2aa4eec1 --- /dev/null +++ b/edge/graph_127253155.jsonl @@ -0,0 +1 @@ +{"18127437|5660618": ["Such networked control systems (NCSs) have been used in various areas, such as the automotive industry, tele-autonomy, tele-operation of robots and automated manufacturing systems [1,2].", "In addition, long transmission delays sometimes also amounts to a packet dropout if the receiver discards \u201coutdated\u201d arrivals [1].", "When a continuous-time signal is transmitted over a network, the overall delay between sampling and eventual decoding at the receiver can be highly variable because both the network access delays and the transmission delays depend on highly variable network conditions such as congestion and channel quality [1]."]} diff --git a/edge/graph_12727410.jsonl b/edge/graph_12727410.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cac33d1369ba87effee27c1a712894bf3c308f64 --- /dev/null +++ b/edge/graph_12727410.jsonl @@ -0,0 +1,8 @@ +{"16125167|205435103": ["Search strategies in literature surveys often involve automatic keyword searches (e.g., [55], [56])."]} +{"16125167|627405": ["[57], we enforced this criterion by utilizing predefined selection criteria that clearly define the scope, and evaluated these criteria through a pilot study that yielded positive results (Section 3.", "sions [57]; borderline cases are resolved by discussion", "[57] recently pointed out that: 1) Current software engineering digital libraries do not provide good support for the identification of relevant research and the selection of primary studies and 2) in comparison to other disciplines, the standard of abstracts in software engineering publications is poor.", "[57], who state that \u201ccurrent software engineering search engines are not designed to support systematic literature reviews;\u201d this observation is confirmed by Staples and Niazi [83]."]} +{"7630279|16125167": ["Another systematic survey of feature location approaches utilizing execution information can be found in a comprehensive survey of approaches to program comprehension via dynamic analysis [31].", "Dynamic analysis has a rich research history in the area of program comprehension [31], and feature location Table II."]} +{"6494201|2481856": []} +{"6494201|239537": ["Despite all of these advantages, models and diagrams are often not as intuitive to ordinary users as matrices or crossreferences, as they can often become huge and thus, hard to understand [86]."]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"15267632|1113420": ["Merging these areas may be a promising research topic, since awareness is already being discussed in ubiquitous computing for some time (Baldauf et al. 2007)."]} +{"8116409|239537": ["[8] suggest incremental exploration of graphs by placing a window on top of the graph, so that one logical frame is shown at a time."]} diff --git a/graph_3294633.jsonl b/edge/graph_12734157.jsonl similarity index 100% rename from graph_3294633.jsonl rename to edge/graph_12734157.jsonl diff --git a/edge/graph_12743696.jsonl b/edge/graph_12743696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc3e0d408a8299f0b212294044b77871ac970157 --- /dev/null +++ b/edge/graph_12743696.jsonl @@ -0,0 +1,2 @@ +{"53141267|33286487": []} +{"6886445|8212328": ["This modeling method is not the solution to support all the issues previously mentioned but it seems to fit in the context of complex systems modeling (Weber et al., 2012).", "As underlined in the previous section, BN appear to be a solution to model complex systems in the context of this work (Weber et al., 2012)."]} diff --git a/edge/graph_127476241.jsonl b/edge/graph_127476241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86dea4cea3140b26c94a2f1da5c57a4d2415c2fa --- /dev/null +++ b/edge/graph_127476241.jsonl @@ -0,0 +1,2 @@ +{"46054681|18190006": ["For DEA research \u201ereal\u201f seminals are Sherman (1984), Berg et al.\n(1993), Tyteca (1996), Coelli and Perelman (1999), Cooper et al. (1999), Seiford and Zhu (1999)\nas well as Banker and Kauffman (2004)."]} +{"153913739|7139420": []} diff --git a/edge/graph_12753051.jsonl b/edge/graph_12753051.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..873035e406cc797c6d461a8275da6ccd335835ac --- /dev/null +++ b/edge/graph_12753051.jsonl @@ -0,0 +1,12 @@ +{"9615004|15516254": ["Congestion control for streaming multimedia takes care of not only the fairness and responsiveness of the transport protocol, but also the rate smoothness to help the application achieve better playback quality[1]."]} +{"12629834|15516254": ["Congestion control for streaming multimedia has to take into account not only the fairness and responsiveness of the transport protocol, but also the smoothness of the sending rate to help the multimedia application achieve better playback quality [5]."]} +{"306102|7439310": ["request (ARQ), must be adapted to take into consideration the delay constraint and the error propagation problem [4]."]} +{"141053|1775475": []} +{"141053|14441987": []} +{"2655864|141053": []} +{"2655864|3540699": ["The introduction of the most updated error concealment/resilient tools in video coding can be found in [20], and the overview of existing error resilient and error concealment techniques in video coding can be found in [21, 22], respectively."]} +{"2655864|17428811": ["263 andMPEG-4, layered coding techniques can be categorized into three classes: temporal, spatial, and signal-tonoise ratio (SNR) scalability [11].", "The fine granularity scalability (FGS), which adopts a method called bit-plane coding, can overcome this problem, that is, the enhancement layers can be truncated anywhere while maintaining some degree of quality improvement [11]."]} +{"2655864|7439310": ["The introduction of the most updated error concealment/resilient tools in video coding can be found in [20], and the overview of existing error resilient and error concealment techniques in video coding can be found in [21, 22], respectively."]} +{"6377366|10233218": ["Jitter destroys the temporal relationships between periodically transmitted media unit that constitute a real-time media stream [115]."]} +{"6377366|17428811": ["It was developed specially in MPEG-4 in response to the growing need on a video coding standard for streaming video over the Internet [40].", "One of the major requirements for the successful and wide deployment of such applications is the efficient transmission of multimedia content (audio, video, text, images) over a broad range of bandwidth-constrained access network infrastruc\u00ad tures, in particular Internet protocol (IP)-based next-generation networks.", "Today's Internet traffic is dominated by transmission control protocol (TCP)."]} +{"11094815|3540699": ["That, in turn, depends on features related to the structure of the bitstream with frame-wise granularity and classification of the frames, which limits the scope of the features considered to the following list (for a complete list of features one can refer to [ 16 ] or [17]): \u2022 Indication of frame boundaries."]} diff --git a/edge/graph_127539575.jsonl b/edge/graph_127539575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f56565f0517223563978397928c5a811e7cd73f3 --- /dev/null +++ b/edge/graph_127539575.jsonl @@ -0,0 +1,13 @@ +{"29910972|16525678": ["pervasive applications in video surveillance [4], intelligent transportation [5], and urban computing [6], which can quickly discover, locate, and track the target vehicles in large-scale surveillance videos."]} +{"1291435|14545307": []} +{"15744514|1099309": ["Even if good accuracy could be achieved from some of the existed methods, they may still be insufficiently accurate to be used in practical situations such as the recognition of a suspected vehicle during traffic surveillance."]} +{"3285930|16403716": ["image retrieval [8], [9], content-based video search [10], and object instance search [11], vehicle Re-Id is to find the vehi-"]} +{"3285930|16525678": ["Vehicle Re-Id can be pervasively applied in intelligent surveillance systems [5], smart transportation [6], and urban"]} +{"6471474|5755403": ["\u2026al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an object is then treated as\u2026"]} +{"6471474|16525678": ["While some existing reviews Valera and Velastin (2004) and Aghajan and Cavallaro (2009) tried to cover all the aspects of 0167-8655/$ -see front matter \u00d3 2012 Elsevier B.V.", "Many intelligent multi-camera video surveillance systems have been developed (Collins et al., 2001; Aghajan and Cavallaro, 2009; Valera and Velastin, 2004)."]} +{"6471474|12127129": ["Background subtraction (Piccardi, 2004) is widely used for detecting moving objects in video surveillance with static cameras."]} +{"6471474|17516538": ["\u2026and Grimson, 2000; Oliver et al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an\u2026"]} +{"4315873|15093118": []} +{"6946733|15093118": ["One of the applications of video surveillance is traffic monitoring such as traffic flow detection, cars license plate recognition, vehicle tracking, and vehicle motion analysis[1][2]."]} +{"207214926|3330313": []} +{"759048|9415965": ["The two recently main research topics in digital forensics include: i) judgment on the integrity and reliability of digital data [3]-[4]; and ii) efficient and accurate digital evidence mining from digital data [5]-[9], where the amount of data may be extremely huge."]} diff --git a/graph_3300588.jsonl b/edge/graph_12757479.jsonl similarity index 100% rename from graph_3300588.jsonl rename to edge/graph_12757479.jsonl diff --git a/edge/graph_12757876.jsonl b/edge/graph_12757876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef6969302606585bb983dc09334238d36362362e --- /dev/null +++ b/edge/graph_12757876.jsonl @@ -0,0 +1,3 @@ +{"129199564|15082313": ["\u2026can be used to extract properties of coupling between different variables, such as Granger causality, partial correlations [Opgen-Rhein and Strimmer, 2007], Bayesian inference [Knuth, 2005], directional nonlinear modeling [Veeramani et al., 2004], and Gaussian models [Markowetz and Spang, 2007].", "[6] There are many methods that can be used to extract properties of coupling between different variables, such as Granger causality, partial correlations [Opgen-Rhein and Strimmer, 2007], Bayesian inference [Knuth, 2005], directional nonlinear modeling [Veeramani et al., 2004], and Gaussian models [ Markowetz and Spang, 2007 ]."]} +{"130239195|3330313": []} +{"131673251|55850333": ["The Mann-Kendall trend analysis was applied to minimize the problems associated with differentiating between natural variability and data trends (Burn and Hag Elnur, 2002; Burn et al. 2004; Kundzewicz and Robson, 2004)."]} diff --git a/graph_3301109.jsonl b/edge/graph_12764117.jsonl similarity index 100% rename from graph_3301109.jsonl rename to edge/graph_12764117.jsonl diff --git a/edge/graph_12765024.jsonl b/edge/graph_12765024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65f9269c7524ae267255374de9d8ef0e11508d36 --- /dev/null +++ b/edge/graph_12765024.jsonl @@ -0,0 +1,2 @@ +{"60929349|1188683": []} +{"60929349|10739218": []} diff --git a/graph_3304059.jsonl b/edge/graph_12765832.jsonl similarity index 100% rename from graph_3304059.jsonl rename to edge/graph_12765832.jsonl diff --git a/graph_3334451.jsonl b/edge/graph_12766686.jsonl similarity index 100% rename from graph_3334451.jsonl rename to edge/graph_12766686.jsonl diff --git a/edge/graph_12769752.jsonl b/edge/graph_12769752.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7cdc7627376e1992c2aa7baf6236a4401bac1bd --- /dev/null +++ b/edge/graph_12769752.jsonl @@ -0,0 +1,3 @@ +{"14876373|744951": ["Anand and Panneerselvam [2015] provide a recent review of the various open shop scheduling problems."]} +{"14876373|6742930": ["There is an extensive body of literature in the systems community on adopting role mechanisms [Zhu and Zhou 2008; Fuchs et al. 2011]."]} +{"207245256|15790998": ["The cost of computing the model is polynomial, \nsince CB is a stratified logic program [Cadoli and Schaerf 1993]."]} diff --git a/edge/graph_12778743.jsonl b/edge/graph_12778743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7496d06a5abef119ac964482bb9ad96a9703f64b --- /dev/null +++ b/edge/graph_12778743.jsonl @@ -0,0 +1,8 @@ +{"7329149|3348390": ["The term was \ufb01rst coined in 1998 and later de\ufb01ned as \u201cThe Internet of Things allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/ network and Any service\u201d [1]."]} +{"7329149|485843": ["Smart grid is one of the domains in which academia, industry, and governments are interested and invested significantly [72], [73]."]} +{"7329149|20905429": ["In addition to the industry IoT solutions, academic solutions in the wearable computing area are discussed in [26], [27]."]} +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} +{"7917275|14033856": ["erstand what data about them are collected and how they are used. Transparency-enhancing technologies (or: transparency tools) may comprise various properties that promote privacy and data protection [115, 118, 52]: (1) provision of information about the intended 50 http://csrc.nist.gov/groups/ST/PEC2011/presentations2011/toft.pdf 51 http://www.dyadicsec.com/technology/ 52 https://sharemind.cyber.ee/ Privacy an", "ivacy seals. 18 http://www.cnil.fr/linstitution/labels-cnil/procedures-daudit/ 19 https://www.commoncriteriaportal.org/ 20 https://www.european-privacy-seal.eu/EPS-en/Home 21 This section is based on [118]. Privacy and Data Protection by Design \u2013 from policy to engineering December 2014 Page 17 Software architecture involves the set of significant decisions about the organisation of a software system22"]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"32528|2357830": ["NIMISE startegy belong to this strategy as well, as they contribute to achieve unlinkability. For RFID tags, protocols exist that only reveal the identity of the tag to a small set of trusted readers [23]. More generally it would be good practice in wireless network design to verify the authenticity of the access point before trying to connect to it (and thus making yourself known). This is similar to"]} diff --git a/edge/graph_12780705.jsonl b/edge/graph_12780705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57319c04584a583d570757d8d8fbef8b9326a372 --- /dev/null +++ b/edge/graph_12780705.jsonl @@ -0,0 +1 @@ +{"154841241|393948": ["Disentangled Seasonal-Trend Representation Learning and Its Causal Interpretation As discussed in Bengio et al. (2013), complex data arise from the rich interaction of multiple sources \u2013 a good representation should be able to disentangle the various explanatory sources, making it robust to complex\u2026"]} diff --git a/graph_3350876.jsonl b/edge/graph_12783410.jsonl similarity index 100% rename from graph_3350876.jsonl rename to edge/graph_12783410.jsonl diff --git a/edge/graph_12792588.jsonl b/edge/graph_12792588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1cd67e6dea19517e0dd8b290038c523a5258ef6a --- /dev/null +++ b/edge/graph_12792588.jsonl @@ -0,0 +1,2 @@ +{"17615441|11038925": ["In literature are present many approaches to the clustering problem (Baraldi & Blonda 1999)."]} +{"28911771|8530790": []} diff --git a/graph_3354138.jsonl b/edge/graph_12797704.jsonl similarity index 100% rename from graph_3354138.jsonl rename to edge/graph_12797704.jsonl diff --git a/edge/graph_12801953.jsonl b/edge/graph_12801953.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..911becff58bfbe1bf5896eb355371366934c8b36 --- /dev/null +++ b/edge/graph_12801953.jsonl @@ -0,0 +1,2 @@ +{"5171123|9045232": ["013 [6], Pantic and Rothkrantz [7] surveyed the automatic facial expression analysis, Daugman [3] pointed out several critical issues involved in an effective face recognition system, while the most recent and comprehensive survey is possibly from that of Zhao et al."]} +{"5171123|192934": []} diff --git a/graph_3366529.jsonl b/edge/graph_12810037.jsonl similarity index 100% rename from graph_3366529.jsonl rename to edge/graph_12810037.jsonl diff --git a/graph_3374040.jsonl b/edge/graph_12815020.jsonl similarity index 100% rename from graph_3374040.jsonl rename to edge/graph_12815020.jsonl diff --git a/graph_3387861.jsonl b/edge/graph_128154578.jsonl similarity index 100% rename from graph_3387861.jsonl rename to edge/graph_128154578.jsonl diff --git a/edge/graph_12817488.jsonl b/edge/graph_12817488.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dceb232e7b94b9a732cad2d9a53751e24eacc121 --- /dev/null +++ b/edge/graph_12817488.jsonl @@ -0,0 +1 @@ +{"1665247|1230643": ["They have a wide range of applications, from military to civil, that may be realized by using different type of sensor devices with different capabilities for different kinds of environments [1]."]} diff --git a/graph_3420321.jsonl b/edge/graph_12819628.jsonl similarity index 100% rename from graph_3420321.jsonl rename to edge/graph_12819628.jsonl diff --git a/edge/graph_12819773.jsonl b/edge/graph_12819773.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e2d9dc947976f83bd40d5bf35a12c767030a1fa --- /dev/null +++ b/edge/graph_12819773.jsonl @@ -0,0 +1,16 @@ +{"18941413|17474643": []} +{"10590243|7842253": ["In other words, the amount of resources should be minimum for a workload to maintain a required level of service quality or to minimize the workload completion time (or maximize through-put) of a workload automatically [Zhan et al. 2015]."]} +{"10590243|17675973": ["Basically, there are three types of scheduling architecture in the cloud: hierarchical, centralized, and decentralized [Mastelic et al. 2014]."]} +{"10590243|8914588": ["There is a need for an autonomic resource management system that considers all the important QoS parameters like availability, security, execution time, SLA violation rate, and so forth for better resource management [Huebscher et al. 2008; Simonin et al. 2013]."]} +{"15400947|7193476": []} +{"15400947|6159806": ["Service composition is a very active area of research and more than that, in many cases there is research from the \ufb01elds of work\ufb02ows and software components that can be leveraged [Dustdar and Schreiner 2005].", "\u2026Benslimane et al. 2008], scienti\ufb01c work\ufb02ows [Barker and Van Hemert 2008], life cycle [Pessoa et al. 2008], QoS of the composition [Strunk 2010], service description and interaction languages and protocols [Dustdar and Schreiner 2005], and semantic service composition [Bartalos and Bielikov\u00b4a 2011]."]} +{"15400947|10500613": ["A data\ufb02ow de\ufb01nes how data are passed among Web services in terms of the actions performed on the output of a service that is transferred as input to another service [Rahm and Bernstein 2001]."]} +{"14983111|38476": ["In addition, we incorporate sliding window [15] and crossvalidation [11,12] techniques in the training and prediction stages and consequently evaluate the validity of the learning algorithms for prediction accuracy using statisticalmetrics, as discussed in the following sections.", "The sliding window technique [15] maps an input sequence x of size k to an individual output y by using a prediction model; this approach is very effective in the data mining field e."]} +{"2339709|8914588": ["\u201d Since then, many research have been devoted to the methodology; see [11] for a recent comprehensive survey on autonomic computing."]} +{"2339709|1708582": ["A survey of reinforcement learning technology from a computer science perspective can be seen in [14]."]} +{"9756186|1975139": ["One particularly important class of self-adaptation approach relies primarily on architectural models of the system in the control layer [8, 9, 10].", "To date, many dynamic software architectures and architecture-based adaptation frameworks have been proposed and developed [8, 9, 10], often targeting specific architectural styles (e."]} +{"8227705|17474643": ["Interested readers can find a thorough survey and taxonomy of architectures and application brokering mechanisms across multiple clouds in an article by Grozev and Buyya [2012]. Their work is mostly focused on application-specific brokering mechanisms and can be positioned as a part of a broader view of interconnected cloud environments presented in this article."]} +{"5929770|10658846": []} +{"15823263|1344506": ["If you want to explore how to use different paradigms in one program, we recommend a multiparadigm language like Oz [34], Alice [38], Curry [4], or CIAO [23]."]} +{"8628292|17437856": ["Another scheduling approach that focuses more on reliability and guaranteed task completion in faulty environments is redundant scheduling [22], [23], [24]."]} +{"10497634|15619069": ["From the side of quality evaluation at design time, modern Model Driven Quality Prediction (MDQP) techniques [21], [22] propose the following approach: (i) Designers work only at the abstraction levels which they are used to, possibly augmented with concepts and information about non-functional properties, (ii) Quality models are then automatically derived from high-level abstractions and solved by tools to predict the non-functional properties of interest."]} diff --git a/edge/graph_12823034.jsonl b/edge/graph_12823034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc23cc1f8c4a1d1af22dd0fd59e73fc2af95cade --- /dev/null +++ b/edge/graph_12823034.jsonl @@ -0,0 +1,4 @@ +{"714047|10500613": ["As a consequence, the problem handling heterogeneous information sources becomes a coordination task that reoccurs whenever two peers want to cooperate.", "In the remainder of this paper, we propose an approach where the communication between peers relies on a limited shared vocabulary between them."]} +{"6630463|10500613": ["The problem of ontology schema mapping has been investigated by many research groups which have proposed a large variety of approaches [1, 7]."]} +{"6630463|913718": ["The problem of ontology schema mapping has been investigated by many research groups which have proposed a large variety of approaches [1, 7].", "The importance of mapping for the SW has been widely recognized [1] and a range of techniques and tools have already been developed."]} +{"14181461|1708582": []} diff --git a/graph_3421099.jsonl b/edge/graph_12825749.jsonl similarity index 100% rename from graph_3421099.jsonl rename to edge/graph_12825749.jsonl diff --git a/graph_3439503.jsonl b/edge/graph_128358546.jsonl similarity index 100% rename from graph_3439503.jsonl rename to edge/graph_128358546.jsonl diff --git a/edge/graph_128358941.jsonl b/edge/graph_128358941.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e425f6cfdc4c0eb25790329306ac17f4e776931f --- /dev/null +++ b/edge/graph_128358941.jsonl @@ -0,0 +1,7 @@ +{"97989031|18986679": []} +{"8682026|6923178": []} +{"126197443|17772052": ["On the other hand, an electronic nose also requires attention to pattern recognition methods to achieve reliable recognition by using signals obtained from sensors [18,19]."]} +{"10574953|9928823": []} +{"10574953|393948": []} +{"6831636|393948": []} +{"13714070|6923178": []} diff --git a/edge/graph_128362695.jsonl b/edge/graph_128362695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9296c5dc651b734d7965741540d6509fd7bab0af --- /dev/null +++ b/edge/graph_128362695.jsonl @@ -0,0 +1,7 @@ +{"13688847|49527603": ["In [20], a brief summary of the emerging blockchain-based applications ranging from finance to IoTs is provided."]} +{"13688847|9461213": ["With more and more demands for big-data processing in various fields [226], [227], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secured Multi-Party Computation (MPC)."]} +{"13688847|27262729": [", Sybil attacks [47] and double-spending attacks [21]), node mistakes (e.", "Further, a systematic survey is provided in [21] with respect to the security issues in Bitcoin networks including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", ", fork, in the local views of the blockchain state [3], [21] (see Figure 4)."]} +{"13688847|2457428": ["Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]."]} +{"13688847|3434731": ["In [6], [15], two brief surveys on consensus protocols in blockchain networks are provided.", "backbone of the emerging open-access, distributed Virtual Machines (VMs) [5] for decentralized, token-driven resource management in communication networks and distributed autonomous systems [6], [7]."]} +{"1053619|15782139": ["Plamondon and Srihari [16] provide an extensive survey of this work."]} +{"14206230|14077778": []} diff --git a/graph_34714.jsonl b/edge/graph_128382576.jsonl similarity index 100% rename from graph_34714.jsonl rename to edge/graph_128382576.jsonl diff --git a/graph_1284183.jsonl b/edge/graph_1284183.jsonl similarity index 100% rename from graph_1284183.jsonl rename to edge/graph_1284183.jsonl diff --git a/edge/graph_12846121.jsonl b/edge/graph_12846121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17becd5ed0fa7775dcde6966e3a554690df2638a --- /dev/null +++ b/edge/graph_12846121.jsonl @@ -0,0 +1,5 @@ +{"110516373|7839197": []} +{"110024227|15915200": []} +{"60631515|15915200": []} +{"15275673|15527933": []} +{"62565068|1708582": []} diff --git a/graph_3480971.jsonl b/edge/graph_12846704.jsonl similarity index 100% rename from graph_3480971.jsonl rename to edge/graph_12846704.jsonl diff --git a/graph_348701.jsonl b/edge/graph_12848454.jsonl similarity index 100% rename from graph_348701.jsonl rename to edge/graph_12848454.jsonl diff --git a/edge/graph_12851049.jsonl b/edge/graph_12851049.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a457afccd208355ce88ab5bd754e0e394f480a05 --- /dev/null +++ b/edge/graph_12851049.jsonl @@ -0,0 +1,2 @@ +{"15195356|2906926": ["Denial of service (DoS) is another type of problem which can be caused by attackers whose aim is to disrupt an RFID system [6,7]."]} +{"15195356|2357830": ["RFID tags may also be used by some malicious organizations or dealers that sell fake RFID embedded items and forge them as valuable items [5].", "In addition to tracking people, RFID tags may also be used to extract personal information such as the type of clothes somebody wears, the specific brands in which an individual is interested in or some medical information about the patient carrying an RFID-embedded container of medicine [5].", "Most RFID researchers, however, believe that the industry needs simple and low cost RFID tags (below 5 cents per item) with limited number of logical gates [5],[16]."]} diff --git a/edge/graph_12860838.jsonl b/edge/graph_12860838.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08e4e96cce1c649cf529669076f6c8a46c49b70c --- /dev/null +++ b/edge/graph_12860838.jsonl @@ -0,0 +1,6 @@ +{"2898789|10500613": ["\u2026approaches underlying these tools are usually based on heuristics that identify structural and naming similarities between models (Noy & Musen 2000; Rahm & Bernstein 2001) or on using machine learning to learn mappings (Doan, Domingos , & Halevy 2001; Lacher & Groh 2001; Doan et al. 2002; Berlin &\u2026", "Our recent work on the problem of generating mappings (Doan, Domingos , & Halevy 2001; Madhavan, Bernstein, & Rahm 2001; Doan et al. 2002) has led us to the conclusion that in order to make further progress on the problem we need a well 80 AAAI-02 founded representation of mappings.", "In (Rahm & Bernstein 2001) the authors survey the schema matching techniques in the database literature."]} +{"593561|10500613": []} +{"1849443|10500613": ["Rahm and Bernstein [24] survey the approaches that use linguistic techniques to look for synonyms, machine-learning techniques to propose matches based on instance data, information-retrieval techniques to compare information about attributes, and so on.", "In the database-schema research, Bernstein and colleagues [4] also argue that we can view such tasks as schema mapping and untraced evolution in a similar way."]} +{"1849443|1574374": ["Database researchers distinguish between schema evolution and schema versioning ( Roddick 1995 )."]} +{"16050963|1574374": []} +{"1110051|10500613": ["ontology alignment) has received steady attention in the database and AI communities over the years (see [19] for a recent survey and [17, 2, 3, 5, 8, 9, 12, 27, 24] for work since)."]} diff --git a/edge/graph_12884178.jsonl b/edge/graph_12884178.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2309bda8edf19322dcb89ee3dcb4839e31f2a663 --- /dev/null +++ b/edge/graph_12884178.jsonl @@ -0,0 +1,2 @@ +{"17057473|14441987": ["Peer-to-peer relaying technology originates in packet radio and ad-hoc networks where the traffic signals have to be relayed through one or more intermediate node(s), depending on the distance between the source and the destination nodes [1], [2]."]} +{"11030952|14441987": ["The type field encodes the nature of the object represented, but the routing algorithm may change this parameter, since election of any participating network node to a clusterhead [ 8 ] or controlling node, or demoting it to a passive node at the end of a routing chain may be modelled simply b y a redesignation of th e node's type."]} diff --git a/edge/graph_12886544.jsonl b/edge/graph_12886544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e5b6a03de265f4ebcb4a7966432d02ae3074d3f --- /dev/null +++ b/edge/graph_12886544.jsonl @@ -0,0 +1,3 @@ +{"60806958|1708582": []} +{"13157332|5473785": ["As aforementioned, each node must represent a propositional variable [140], which is defined to be as a variable that takes an exhaustive and mutually exclusive number of values.", "For more information about what the conditional independence assumptions mean, see [140] or [153]."]} +{"41168576|3330313": ["The broad review of such methods was presented in [ 47 ]."]} diff --git a/edge/graph_12894036.jsonl b/edge/graph_12894036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec1e0dc74bf88780287b50acfdf88b030d884fb3 --- /dev/null +++ b/edge/graph_12894036.jsonl @@ -0,0 +1,5 @@ +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"6674407|192934": []} +{"22128087|12894036": ["Furthermore, the reader can refer to [3] for a survey on kernel (and spectral) methods for clustering and vector quantization."]} +{"51373|14545307": []} diff --git a/graph_3503030.jsonl b/edge/graph_12894679.jsonl similarity index 100% rename from graph_3503030.jsonl rename to edge/graph_12894679.jsonl diff --git a/graph_3535777.jsonl b/edge/graph_1289787.jsonl similarity index 100% rename from graph_3535777.jsonl rename to edge/graph_1289787.jsonl diff --git a/edge/graph_12904520.jsonl b/edge/graph_12904520.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d07953602fa4fc3b52f065f29073cfc7031b9554 --- /dev/null +++ b/edge/graph_12904520.jsonl @@ -0,0 +1,2 @@ +{"195861458|10658846": ["The energy val\u00adues shown in this .gure \nhave been obtained from the measured cur\u00adrent values associated with memory modules documented in mem\u00adory \ndata sheets (for a 3.3 V, 2.5 nanoseconds cycle time, 8 MB memory) [13]."]} +{"5408104|15343401": []} diff --git a/edge/graph_12908858.jsonl b/edge/graph_12908858.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a351e02092884299591059a122ef9c97f60d9240 --- /dev/null +++ b/edge/graph_12908858.jsonl @@ -0,0 +1,2 @@ +{"60919579|53531425": []} +{"13072941|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment (Bohg et al., 2014)."]} diff --git a/graph_353822.jsonl b/edge/graph_12914269.jsonl similarity index 100% rename from graph_353822.jsonl rename to edge/graph_12914269.jsonl diff --git a/edge/graph_12925459.jsonl b/edge/graph_12925459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32cad3a1a89ac8fe5cdb9924214795e4d5c48172 --- /dev/null +++ b/edge/graph_12925459.jsonl @@ -0,0 +1,3 @@ +{"3137380|1708582": ["3For reviews and in-depth presentations of value function and actor-critic methods, see [16]\u2013[18].", "Value iteration uses a value function to evaluate and improve policies (see [16] for a tutorial introduction and [18] for a full overview of these algorithms)."]} +{"5625400|12027976": []} +{"6811155|12925459": []} diff --git a/graph_3538708.jsonl b/edge/graph_12929871.jsonl similarity index 100% rename from graph_3538708.jsonl rename to edge/graph_12929871.jsonl diff --git a/graph_3551655.jsonl b/edge/graph_12947542.jsonl similarity index 100% rename from graph_3551655.jsonl rename to edge/graph_12947542.jsonl diff --git a/graph_3552171.jsonl b/edge/graph_12948993.jsonl similarity index 100% rename from graph_3552171.jsonl rename to edge/graph_12948993.jsonl diff --git a/edge/graph_12950264.jsonl b/edge/graph_12950264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de8326781769a8f05318098afeff92166895e72e --- /dev/null +++ b/edge/graph_12950264.jsonl @@ -0,0 +1,14 @@ +{"17167517|14441987": []} +{"15986473|14962807": ["By comparison with the routing scheme in Theorem 3 (fixed-port model) and the routing scheme in [4] (designer-port model), the two following lower bounds are optimal.", "In trees, a common strategy consists in setting the addresses via a DepthFirst Search (DFS) traversal of the tree, and then to use the interval routing scheme (IRS) of [11,13] (see [4] for a survey on IRS).", "Actually, if we insist on small memory space, [4] shows that there exists a routing scheme for trees with [1, n]-range addresses, \u03b1 \u221a n bits of memory, where \u03b1 \u2248 3."]} +{"16810882|14441987": ["Ad hoc routing protocols for WMNs are classified into: (a) proactive, (b) reactive, and (c) hybrid approaches [2][3]."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"5922349|14441987": ["The multi-NIC approach has been discussed in some past work [21] [22], however no distributed channel assignment\nalgorithm has been proposed that can indeed realize the true performance potential of this architecture [28]."]} +{"22240962|141053": ["In fact, the associated Medium Access Control (MAC) protocol [5], which operates in the same frequency band, may suffer heavy co-channel interference in physical and data link layers."]} +{"6600915|14441987": ["A vast array of routing algorithms have been proposed and reviewed in several articles [14][15].", "A comprehensive survey of these routing protocols can be found in [14] and [15]."]} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} +{"7724994|7414579": ["Dancing with music is a human nature to express meaning of music or to show people's emotion.", "We focus on extracting motion beats from videos, which play an essential role in constituting ROM."]} +{"7724994|3540699": []} +{"7724994|18148591": []} +{"7724994|17428811": []} +{"7724994|16352922": ["Success of any health monitoring system heavily depends on the reliability of the employed sensors."]} +{"7724994|17718674": []} diff --git a/edge/graph_12957829.jsonl b/edge/graph_12957829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80cbde356115c806343ef88fe5add0520f836837 --- /dev/null +++ b/edge/graph_12957829.jsonl @@ -0,0 +1,21 @@ +{"35669839|175549": ["There are three critical steps when using evolutionary algorithms to solve any problem: choosing appropriate (1) representations, (2) selection processes, and (3) parameter settings [4,17].", "It was highlighted by Spears in 1993 that very little work had been conducted on adaptation of population size up to that point in time [17]."]} +{"11123217|175549": []} +{"915248|12957829": ["As such, they share or exchange accumulated information during their search operations, while their dynamics are maintained [106].", "[106] present a thorough review of the state-of-the-art hybridization perspectives of PSO and DE algorithms, as well as several other representative hybrids.", "Furthermore, based on the hybrid evolutionary algorithm taxonomy presented in [106], our preliminary work [25], and its extensions in the current study belong to the collaboration-based hybrid PSO/DE approaches.", "To improve the performance and the convergence behavior of Particle Swarm Optimization algorithm, several hybrid approaches have been proposed [73,75,77,49,87,5,2,38,106,99].", "Several hybridization perspectives of the PSO algorithm have been proposed in the literature, amongst others the interested reader should refer to the following review papers [106,99]."]} +{"6376410|16467945": ["Following [9,13], there exist integrative (coercive) and collaborative (cooperative) combinations.", "G\u00fcnther R. Raidl local optimality in complex solution spaces, especially those procedures that utilize one or more neighborhood structures as a means of defining admissible moves to transition from one solution to another, or to build or destroy solutions in constructive and destructive processes.", "Several publications exist which give taxonomies for hybrid metaheuristics or particular subcategories [9,10,11,12,13,14].", "Classifications with particular respect to parallel metaheuristics are partly adopted from El-Abd and Kamel [14] and Cotta et al. [12] and with respect to the hybridization of metaheuristics with exact optimization techniques from Puchinger and Raidl [13].", "An overview on promising combinations of metaheuristics and integer linear programming (ILP) techniques is given in [13].", "[12] and with respect to the hybridization of metaheuristics with exact optimization techniques from Puchinger and Raidl [13]."]} +{"34704195|16467945": ["In [68], Puchinger and Raidl, propose a survey of the state-ofthe-art approaches that combine exact methods and metaheuristics."]} +{"13168458|8530790": ["[6], Fonseca and Fleming [7], [8], Murata and Ishibuchi [9], and Tamakiet al."]} +{"206682327|4474193": []} +{"206682327|8113021": ["Elaborations on some of the applications cited above are available in [71] and [78]."]} +{"13776940|191396": ["A major advancement in genetic experimental technologies, DNA microarray analysis provides a systematic method to characterize genetic functions, discriminate disease types, and test drug effects (McLachlan, Do, & Ambroise, 2004; Xu & Wunsch II, 2005)."]} +{"13776940|534755": ["\u2026way to measure the gene expression levels of up to tens of thousands of genes simultaneously under many different conditions, which makes it possible to investigate gene relations and interactions when taking the entire genome into consideration (De Jong, 2002; D'haeseleer et al., 2000).", "Several computational models have been proposed to infer regulatory networks through the analysis of gene expression data (De Jong, 2002; D'haeseleer et al., 2000; Xu et al., 2004a).", "Despite such restrictions, simplification has the advantage of measurements over a very large scale, and the use of mRNA expression-based microarrays has led to many interesting and important results (Bar-Joseph, 2004; De Jong, 2002; D'haeseleer et al., 2000)."]} +{"15370058|175549": []} +{"19810662|2359588": []} +{"11876784|13867280": ["several new design methodologies of memetic algorithms [ 27 ]-[29], [54], [55], and specialized memetic"]} +{"17750941|63137": ["Such methods are called model-based methods [8], [9].", "Such methods are called instance-based methods [8], [9]."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"18173747|8530790": ["In multiobjective problems, since the conventional concept of optimality does not hold [42]\u2013[46], dominance and Pareto-op-timality are invoked."]} +{"11058655|191396": ["where j corresponds to the dimension of the individual that is to be mutated, \u03b3 \u2208 [0, 2 ] is a scaling factor that can be selected based on the application as a constant or can vary randomly in some certain range, as w in PSO, \u03c6 is the uniform random function in the range of [0, 1], and pr is the crossover rate that controls the occurrence of the mutation procedure for each dimension in the individual.", "S one of the most important and primitive activities of human beings, clustering, also known as unsupervised classification or exploratory data analysis, attempts to explore the unknown nature of data by separating a finite data set, with little or no ground truth, into a finite and discrete set of \u201cnatural,\u201d hidden data structures [ 1-3 ]."]} +{"11003004|508912": ["General surveys of various adaptive systems in evolutionary computations and their influences can be found in [16] and [17]."]} +{"818688|508912": []} +{"44761686|1708582": []} diff --git a/edge/graph_12966318.jsonl b/edge/graph_12966318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d81cecbc5d74c025838644f6ff0b1009e01870d2 --- /dev/null +++ b/edge/graph_12966318.jsonl @@ -0,0 +1,5 @@ +{"12018322|2177212": []} +{"61826818|8042219": ["When creating obfuscations to restrict the usefulness of program slicing, Majumdar et al [19] found that loop transformations were helpful in decreasing the effectiveness of slicing but not every program uses a loop.", "However, Majumdar et al [19] discuss how it is possible to \u201cfake\u201d a loop.", "Majumdar et al [21] surveyed control-flow obfuscations and highlighted two techniques which we will discuss in Sections 2.2.1 and 2.2.5.", "Extending the scope of the induction variables tries to ensure that the first loop would be included in a backwards slice for i (as used in Majumdar et al [18]).", "The obfuscations considered in Majumdar et al [18] all increased the metrics and so decreased the effectiveness of slicing.", "When creating slicing obfuscations, Majumdar et al [19] used opaque predicates to extend the scope of variables.", "Majumdar et al [21] surveyed control-flow obfuscations and highlighted two techniques which we will discuss in Sections 2."]} +{"12898606|8042219": ["The goal of software protection through code obfuscation is to transform the source code of an application to the point that it becomes unintelligible to automated program comprehension tools or becomes unanalysable to a human adversary interpreting the output of program analyses run on the obfuscated application [19]."]} +{"7046577|15114906": []} +{"10987937|17292349": ["low if CC \u2208 [1,10], moderate if CC \u2208 [11,20], high if CC \u2208 [21,50] and very high if CC is above 50.", "Many papers [32, 43, 1, 4] suggest that the complexity of branch conditions is a program characteristic with high impact on symbolic execution.", "1 void f(int *in , int *out) { 2 long s[2], local1 = 0; 3 // Expansion phase 4 s[0] = in[0] + 762; 5 s[1] = in[0] | (9 << (s[0] % 16 | 1)); 6 // Mixing phase 7 while (local1 < 2) { 8 s[1] |= (s[0] & 15) << 3; 9 s[( local1 + 1) % 2] = s[local1 ]; 10 local1 += 1; 11 } 12 if (s[0] > s[1]) { 13 s[0] |= (s[1] & 31) << 3; 14 } else { 15 s[1] |= (s[0] & 15) << 3; 16 } 17 s[0] = s[1]; 18 // Compression phase 19 out [0] = (s[0] << (s[1] % 8 | 1)); 20 } 21 void main(int ac , char* av[]) { 22 int out; 23 f(av[1], &out); 24 if (out == 0xa199abd8) 25 printf(\"You win!\"); 26 }"]} diff --git a/edge/graph_12970117.jsonl b/edge/graph_12970117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ef0d0dae2329e01df31e2f8fcddda3c1721f298 --- /dev/null +++ b/edge/graph_12970117.jsonl @@ -0,0 +1,7 @@ +{"18595965|1230643": ["Although sensing activity, communication and data processing are three domains to be considered for energy consumption, the communication overhead is responsible for the bulk of the energy consumption [16] in a WSN."]} +{"15678247|1230643": ["Wireless sensor networks [1,2] have been a popular monitoring facility in our daily life."]} +{"61283952|1230643": []} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"13887365|1230643": ["Wireless sensor networks are envisioned to be economic solu tions to many important applications, such as real-time tra ffic monitoring, military surveillance, and homeland security [1] ."]} +{"18707193|9554464": ["From this function, the follow cases can be calculated in the hierarchical wireless sensor network [ 15 ].", "in = ! collects sensing data i d at time t , the data aggregation function is defined as follow [9, 15 ]:"]} +{"18707193|1230643": ["Privacy concerns have become the main obstacle to success when people are participants in wireless sensor networks [1,4,13]."]} diff --git a/edge/graph_12972725.jsonl b/edge/graph_12972725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d76a5608db6867acb1c650529806e8b21731569 --- /dev/null +++ b/edge/graph_12972725.jsonl @@ -0,0 +1,3 @@ +{"26963781|25206420": []} +{"26963781|206584087": []} +{"12017064|12815020": ["In [36], we discussed existing NIDS approaches to Cloud."]} diff --git a/graph_3567579.jsonl b/edge/graph_12974382.jsonl similarity index 100% rename from graph_3567579.jsonl rename to edge/graph_12974382.jsonl diff --git a/edge/graph_12980526.jsonl b/edge/graph_12980526.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c87f5ce36e253debfbbe7478c13ef47b90f35b23 --- /dev/null +++ b/edge/graph_12980526.jsonl @@ -0,0 +1,4 @@ +{"5291184|7706992": ["These reviews differ from the present one in terms of methods and aims (Maguire, 1999; Marghescu, 2008).", "For example, Maguire (1999) reviews the general guidelines of user interface design for self-service and public information kiosk systems."]} +{"2367926|29395800": ["Mangold [39], Wang et al."]} +{"2483363|14022133": ["[10] present a survey on ontology change."]} +{"6777891|29395800": ["There are several architectural proposals for semantic search solutions, such those described in Mangold [15]; Reis et al.", "Regarding semantic search but not strictly related to SNS context, several proposals and solutions are illustrated by the survey of Mangold [15] and Wei et al.", "There are several architectural proposals for semantic search solutions, such those described in Mangold [15]; Reis et al. [22] describe an overview of semantic search solutions applied to SNS.", "Regarding semantic search but not strictly related to SNS context, several proposals and solutions are illustrated by the survey of Mangold [15] and Wei et al. [29]."]} diff --git a/graph_357173.jsonl b/edge/graph_12984564.jsonl similarity index 100% rename from graph_357173.jsonl rename to edge/graph_12984564.jsonl diff --git a/edge/graph_12988013.jsonl b/edge/graph_12988013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbb0ecc93b4b31f0f223d3eb70e75d9c932478e7 --- /dev/null +++ b/edge/graph_12988013.jsonl @@ -0,0 +1,6 @@ +{"15941034|627405": ["[1] highlight the difficulty with primary studies when they state that the quality of the abstracts is too low, and hence in many cases it is impossible to judge the relevance of a paper for inclusion or exclusion in a systematic literature review based on the title and abstract."]} +{"7128700|2018781": ["We performed automated searches with query string on the following scientific sources: IEEE Xplore, ACM Digital Library, CiteSeerX, SciVerse Scopus, SpringerLink, and Web of Science/ISI Web of Knowledge, which are common sources used in systematic reviews on computer science areas and give a reasonable confidence of covering relevant publications [23]."]} +{"7128700|205435103": ["We were also inspired and supported by previous systematic reviews conducted in Software Engineering [30, 36,41], as well as by previous experiences of our group [61].", "We were also inspired and supported by previous systematic reviews conducted in Software Engineering [5,17,26], as well as by previous experiences of our group [54]."]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"6033936|11139156": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"6033936|205435103": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} diff --git a/edge/graph_129943863.jsonl b/edge/graph_129943863.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ced0f535c6af5b4a94d4aa424f75a578d767d19 --- /dev/null +++ b/edge/graph_129943863.jsonl @@ -0,0 +1,73 @@ +{"29963227|2398835": []} +{"29963227|13726263": []} +{"28051344|6879093": ["The freedom for an end-user to install, manage and use personalized applications creates additional challenges in that investigators may no longer know if the data of interest are encrypted, stored locally or in the Cloud (Kechadi et al., 2015)."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"51613885|207209718": ["Some surveys [25, 89] have discussed intrusion detection systems (IDS) in wireless sensor networks and Internet of Things and have provided analysis and comparison of the main existing IDSs."]} +{"40404217|15021357": []} +{"53045279|2829149": ["The tools used to breach the security are also become very sophisticated [3-9].", "Different techniques are used to block the transfer of information which are discuss below [3-5, 7-8].", "In IoT many devices are distributed in open environment and are unattended provide the opportunity to attackers to physically temper the device and disturb the communication [7-8]."]} +{"46192657|1708582": ["The third category, also known as the online learning, refers to process of handling the problems that an agent opposes when he must learn behavior via trial-and-error exchanges with an active environment [9]."]} +{"5385031|7320605": ["Moreover, the surveys on applications of game theory for wireless sensor network focus on general problems not specifically from economic and pricing aspects [12], [13].", "\u2022 Strategy: Player\u2019s strategy is a complete plan of actions/instructions that the player can choose [12], and the payoff depends on not only its own actions but also the actions of others."]} +{"5385031|1756215": [", the attacker and the WSN owners) which strengthen the network security [222]."]} +{"5385031|12817488": ["redundancy as well as saving the energy required for information transmission to the sink node [99], [100]."]} +{"5385031|17205659": ["Various WSN security protocols were classified and evaluated in [221]."]} +{"115585602|1420935": ["The realization of the TE concept between prosumers depends on the availability of the essential communication infrastructures to guarantee reliable information dissemination [10].", "TE has potential to optimize the use of DER [34] and reduce system operation cost [10].", "As reported in [10], existing literature works assume perfect communication between prosumers exchanging energy [10].", "Such characteristics empower energy prosumers [6,7] to use, share, exchange [8,9] or trade their excess generated energy; thus turning prosumers into proactive prosumers by actively participating in the growing economy [10].", "In that regard, this paper provides a detailed discussion of the energy trading and sharing techniques, structure and motivation beyond a basic review such as [10].", "Based on the structure given in [10], the literature on energy trading and sharing is classi\ufb01ed into one of three coverage areas as shown in Figure 1."]} +{"9496996|12815020": []} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"52882934|3628110": []} +{"52882934|7971188": []} +{"204984597|8186802": ["Brown and Sreenan [37] studied the different techniques for software updating in WSNs, and the possible problems affecting the reliability of code transfer mechanism."]} +{"51979739|2829149": ["[7], [8]."]} +{"65242993|1333339": []} +{"294159|6519244": ["as the employees use their mobile devices to access both the Internet and the corporate intranet, these devices are vulnerable to be either infected by viruses and Trojan horses or compromised by attackers, which may directly lead to the data exposure [9]."]} +{"2332366|18740719": ["Research challenges faced by SCADA systems in risk assessment are outlined in [37] and [38]."]} +{"2332366|86629084": []} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"204985156|3767252": []} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"58845493|2829149": ["Among the list of possible security attacks at different layers of IoT architecture [9], [10], sybil attack can be launched at both perception and network layer."]} +{"34664429|12815020": ["In 2013, Modi et al. (2013) argued that a firewall is not sufficient to provide security to data stored in a cloud system."]} +{"86464517|49564949": ["Moreover, to the best of our knowledge, there is no standard 107 architecture for fog computing [19]."]} +{"86464517|25374274": []} +{"86464517|3543288": ["These devices can potentially cooperate and collaborate to provide diverse services like, for example, smart cities, smart communities, emergency response, smart metering, home automation, intelligent transportation system, and the Internet of connected vehicles [1,2] Interconnected IoT nodes generate a massive amount of data that are needed to be private and confidential."]} +{"86464517|8523192": ["However, in the cloud-based IoT applications, there remain unresolved issues such as the requirement of high capacity client access link, variable latency, lack of mobility support, and security and location-awareness [6,7].", "This approach reduces service latency, improves the Quality of Service (QoS), and provides a superior experience to end-users [7,9]."]} +{"86464517|3390598": ["Each thing possesses uniquely identifiable characteristics that are embedded in its computer system to interoperate with existing Internet infrastructure [19]."]} +{"30180580|14849079": []} +{"30180580|3348390": []} +{"30180580|10150488": []} +{"35986198|21386749": []} +{"4778020|42895686": ["to ours is the systematic literature review of insider threats offered by [7] ."]} +{"27523616|58988543": ["Post deployment maintenance is not possible in these regions, so efforts to enhance efficiency and durability are being made [2]."]} +{"5680434|2623404": ["A flow entity consists of match fields, counters, and a set of instructions to match to the incoming packets, collect statistics regarding the current flow, and handle a matched packet.", "\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"5680434|10693567": ["\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"15031785|4528002": ["4) As discussed previously and demonstrated repeatedly by many researchers [4]\u2013[6], [32], [33], any successful malware attack to a vehicle can cause significantlymore severe consequences than compromising consumer electronics.", "Once on a vehicle, malware can cause a wide range of disruptions and damages [4]\u2013[6], [32], [33].", "Themost damaging security threats, however, are only emerging as vehicles connect to the Internet, provide onboard Wi-Fi hotspot services, communicate with other vehicles and Intelligent Transportation System (ITS) infrastructures, and support advanced applications such as over-the-air (OTA)ECUfirmware update [4], [6], [32], [33].", "Knownvulnerabilities in thedesignand implementation of onboard communication systems, hardware, software, and applications [6], [33], [37] can be exploited by malware to infect a vehicle."]} +{"15031785|12815020": []} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"115583875|33984499": ["Speci\ufb01c protocols such as Kademlia and Gia have improved performance than other protocols [24], and are therefore studied.", "Among the structured P2P protocols, Kademlia [25] has been shown as the most robust protocol for mobile networks [14] and for pervasive environment in terms of lookup, dynamicity, churn, security and queries [24].", "For instance, a review presented in [24] showed that inactivity period of peers result in high overhead and performance degradation in Chord protocol compared with Kademlia [25] that is more robust through redundancy for fault or failure of peers.", "In addition, considering the unstructured protocol Gia [26], a topology adaptation algorithm implemented makes the network more robust in high churn rates (connection and disconnection of peers) [24]."]} +{"115583875|1420935": [", service charges by utility company, and active participation of prosumers in growing the economy [6]."]} +{"115583875|485843": ["Meter data management systems have the capability to manage other meter types including electric, heat, and gas, by turning it on and off and transmitting data when appropriate [44].", "Some of the key indicators that can be balanced by asset management includes the assets, system performance, maintenance cost, failure risks and reliability through the use of a communication infrastructure [44].", "Depleted batteries of the EVs are charged in G2V mode, and the EVs supply energy to the grid through its charged batteries in V2G mode [43,44]."]} +{"8091637|14441987": ["Many routing protocols have been proposed for WSNs; for instance, see a good survey by Royer and Toh [5]."]} +{"51873696|12815020": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"53087956|4577512": ["The paradox described before produces increasingly challenging environment for the IoT and its community [15].", "During recent years, the number of IoT devices and the data handled by them has increased significantly [15].", "The Internet of Things (IoT) is intended for ubiquitous connectivity among different entities or \u201cthings\u201d [15]."]} +{"86431350|8523192": ["In this case, the main requirements involve (1) real-time support to guarantee a high level of availability in case of faults or intermittent connectivity problems, (2) scalability to cope with large volumes of data transfer at variable rates without compromising performance, (3) infrastructure security to protect data both at rest in the cloud and in transit, (4) high availability (eg, reliability and resilience to reduce interruption), (5) least charges of transitioning and maintaining the cloud service, (6) dynamic provisioning to adapt to varying workloads and to cope with BAKER ET AL.", "Using sip helps in implementing three-level encryption: (1) adding more elements (ie, bytes) to the request via inserting the IP of the server (addBytes, line 8), (2) shifting the elements (shiftRows, line 9) by the size of sip;, and (3) mixing the elements of the massage via (mixColumns, line 10)."]} +{"86431350|2332366": ["Hence, we consider a specific scenario of adding and removing VMs and storage on a specific server on the cloud, and then, we monitor and compare the response time of adding and removing these resources under three scenarios: the proposed SeFoP approach, the MLAC approach,51 and the \u201cno security\u201d approach.", "Then, we ran another experiment to evaluate performance of SeFoP against MLAC when adding an extreme number of VMs (1000 VMs) all at the same time.", "The results from the experiments demonstrate a superior performance of the secure fog-based platform, which is around 2.8 seconds when adding five virtual machines (VMs), 3.2 seconds when adding 10 VMs, and 112 seconds when adding 1000 VMs, compared to the multilevel user access control platform.", "The total time needed to add 1000 VMs through SeFoP is around 112 seconds.", "In fact, as may be seen in Figure 5, when adding or removing cloud resources (VMs and storage in our case), the overall system performance improves with SeFoP compared to MLAC, and\nthis performance is remarkably comparable to that of a plain-text solution approach (ie, with no security features).", "Our results, as shown in Figure 7, illustrate that compared to MLAC, the performance gain brought by SeFoP is around 2.8 seconds when adding five VMs and 3.2 seconds when adding 10 VMs, and it is less than 7 seconds in other instances.", "For this purpose, we, first, ran multiple simulations that involve an increasing number of VMs (5-50) and measured the overall performance with and without SeFoP."]} +{"49658784|32360363": ["This step resulted in a final selection of 32 scientific articles which form references [1-32] in the reference list of this paper."]} +{"3639079|3628110": ["Despite providing robust approaches for securing IoT, the blockchain systems are also vulnerable [136]."]} +{"3639079|3767252": []} +{"3639079|2142482": ["Similarly, the authors in [12, 13, 14] target a comparative evaluation of intrusion detection systems."]} +{"3639079|16209841": ["The security analyses presented in [9, 10, 11] discuss and compare different key management systems and cyrptographic algorithms."]} +{"3639079|2181694": ["The energy constrained devices in IoT are vulnerable to \u201dsleep deprivation\u201d attacks by causing the sensor nodes to stay awake [36].", "5 Sleep deprivation attack Energy consumption Link layer Low-level Multi-layer based intrusion detection system [36]", "A framework for mitigating sleep deprivation attacks in wireless sensor networks is described in [36]."]} +{"3639079|9646739": []} +{"3639079|925507": ["The authors in [126] have categorized 18 use cases of blockchain, out of which four cases are for IoT."]} +{"52821281|18011174": ["The reactive jammer continuously monitors the communication medium and upon sensing a packet transmission immediately transmits a radio signal in order to cause a collision at the receiver [1, 6].", "The maximizer strives to reach the highest level of gains, whereas the minimizer aims to keep its losses at the lowest level [1]."]} +{"52821281|6779551": []} +{"46961073|595093": []} +{"20903702|10817088": ["Mobile applications that are associated with wearables learn from the users the reasons regarding their intensions of using the device and help them plan in achieving their fitness goals [20]."]} diff --git a/edge/graph_129944338.jsonl b/edge/graph_129944338.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2cbb84a2607035edbb2a878b9e55d7ef2383a20 --- /dev/null +++ b/edge/graph_129944338.jsonl @@ -0,0 +1,14 @@ +{"64585060|2037989": []} +{"16362395|9270553": ["Indeed, BCI systems enable a subject to send commands to an electronic device only by means of brain activity [ 2 ]."]} +{"16362395|192934": []} +{"46812797|16362395": []} +{"59222116|49862415": ["Recent advances in this area can be found in [52]."]} +{"59222116|2088679": ["This is made evident by the availability of several books which introduce and discuss the different deep learning approaches, as well as by the number of papers describing its use in different application fields such us medical imaging [22], health informatics [31], feature learning [50], etc."]} +{"110519141|9270553": []} +{"33682292|16362395": ["The comparison of different classification algorithms is presented in the literature [8], [26]\u2013[30].", "Specifically, [8] and [26] provide an extensive study of different classifiers; however, CNN and LSTM were not included in the study.", "in [26] and presented SVM as the superior classifier.", "The comparison studies between various classifiers have been presented in [8], [26]\u2013[30]."]} +{"1698611|16362395": ["SVM was selected because of its good generalization properties [35]."]} +{"206943636|1334629": ["They are discussed in subsequent sections, while a more detailed description of the eye gaze tracking techniques may be found in Lupu et al. (2013), Van der Geest and Frens (2002), Chennamma and Yuan (2013), and Ferhat and Vilarin\u0303o (2016).", "\u2026and tracking is an extensive topic and different methods have been developed to extract pupil or iris from an eye image, which in the literature are divided into two main groups appearance-based and feature-based (Chennamma and Yuan, 2013; Feng Lu et al., 2011; Lai et al., 2014; Wang et al., 2016)."]} +{"101513|4361938": []} +{"1627181|9270553": ["Bit rate is shown both as bits/trial (i.e. bits/selection ), and as bits/min when 12 selections are made per min (a rate comparable to that of several current BCIs (e.g. Birbaumer et al., 2000; Donchin et al., 2000; Pfurtscheller et al., 2000a; Wolpaw et al., 2000b )).", "Epidural and subdural electrodes can provide EEG with high topographical resolution, and intracortical electrodes can follow the activity of individual neurons (Schmidt, 1980; Ikeda and Shibbasaki, 1992; Heetderks and Schmidt, 1995; Levine et al., 1999, 2000; Wolpaw et al., 2000a).", "It is also valuable for selecting the electrode location and frequency band used to determine mu-or beta-rhythm amplitude (e.g. Wolpaw et al., 2000b).", "Sample EEG traces (bottom) also indicate that the mu rhythm is prominent when the target is at the top and minimal when it is at the bottom (Wolpaw et al., 1991, 2000b; McFarland et al., 1997a).", "The Wadsworth BCI With the BCI system of Wolpaw, McFarland, and their colleagues (Wolpaw et al., 1991, 2000b; McFarland et al., 1997a), people with or without motor disabilities learn to control mu-or beta-rhythm amplitude and use that control to move a cursor in one or two dimensions to targets on\u2026", "The spectral and topographical analyses that can detect such artifacts and the procedures that can prevent them from affecting BCI operation or misleading investigators are extremely important in BCI research (Wolpaw et al., 2000a).", "\u2026the frequency domain (e.g. mu or beta-rhythm amplitudes) ( Farwell and Donchin, 1988; Lopes da Silva and Mars, 1987; Parday et al., 1996; Lopes da Silva, 1999; Donchin et al., 2000; Kennedy et al., 2000; Wolpaw et al., 2000b; Pfurtscheller et al., 2000a; Penny et al., 2000; Kostov and Polak, 2000).", "It can also help select applications (Wolpaw et al., 2000a).", "Extant BCIs use a variety of translation algorithms, ranging from linear equations, to discriminant analysis, to neural networks (e.g. Wolpaw et al., 2000b; Pfurtscheller et al., 2000a; Kostov and Polak, 2000).", "\u2026questions/min, or one/3 s), control the environment (e.g. lights, temperature, television, etc.), perform slow word processing (i.e. with a predictive program, 25 bits/min could produce 2 words/ min), or even operate a neuroprosthesis (reviewed in Wolpaw et al., 2000a; K\u00fcbler et al., 2001)."]} +{"1627181|192934": ["This algorithm might use linear methods (e.g. classical statistical analyses (Jain et al., 2000) or nonlinear methods (e.g. neural networks).", "These include supervised learning approaches such as linear discriminate analysis (e.g. Jain et al., 2000 ) and non-linear discriminate analysis (e.g. an adaptive logic network (Kostov and Polak, 2000)."]} +{"27250610|16362395": []} diff --git a/edge/graph_129947643.jsonl b/edge/graph_129947643.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66bed3c1e60ef913cc248025e9541ead97bb25a0 --- /dev/null +++ b/edge/graph_129947643.jsonl @@ -0,0 +1,5 @@ +{"3688981|12574246": []} +{"53011234|16343144": []} +{"25557835|11894197": ["Many algorithms were developed to assist selecting the best features for a given problem [2, 8]."]} +{"158733655|16768404": ["Features that are commonly used in documents are term presence, term frequency, the position of a word and negations (Medhat et al., 2014).", "Features that are commonly used in documents are term presence, term frequency, the position of a word and negations (Medhat et al. , 2014)."]} +{"4251721|12925459": ["Traditional portfolio management methods can be classified into four classes: \u201cFollow-the-Winner\u201d, \u201cFollow-theLoser\u201d, \u201cPattern-Matching\u201d and \u201cMeta-Learning\u201d [3].", "The performance of our back-test is compared that of three recent portfolio selection algorithms, summarised and implemented by Hoi [3], in the same cryptocurrency exchange.", "The \u201dMeta-Learning\u201d method Online Newton Step , \u201dFollow-the-Loser\u201d method Passive Aggressive Mean Reversion (PAMR) and our CNN Agent performs well, gaining \ufb01nal portfolio value larger than the best single asset of all.", "The last class, \u201dMeta-Learning\u201d method, tries to combine multiple classes of methods to achieve better performance [7] [8].", "Traditional portfolio management methods can be classi\ufb01ed into four classes, \u201dFollow-the-Winner\u201d, \u201dFollow-the-Loser\u201d, \u201dPattern-Matching\u201d and \u201dMeta-Learning\u201d [3]."]} diff --git a/edge/graph_12998110.jsonl b/edge/graph_12998110.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..165a75edca4265819f87560185c3d5889437b1f9 --- /dev/null +++ b/edge/graph_12998110.jsonl @@ -0,0 +1,22 @@ +{"16056316|1708582": ["Reinforcement Learning (RL) [1] is a powerful control learning technique based on a trial and error process guided by reward signals received from the environment .", "A Markov Decision Process is a tuple < SA T R > , where S is the set of all possible states, A is the set of all possible actions, T is a stochastic state transition function, T : S \u00d7 A \u00d7 S \u2192 \u211c, and R is a stochastic reward function, R : S \u00d7 A \u2192 \u211c [1]."]} +{"29753465|1708582": []} +{"2665519|7788290": ["[9, 12], in Refs [13, 14], as well as in a more recent one by Moeslund et al."]} +{"778117|6327434": []} +{"15929566|1708582": ["The optimism expressed about RL in the early surveys (Keerthi and Ravindran , 1994; Kaelbling et al., 1996; Mahadevan, 1996) has been bolstered by several success stories."]} +{"13381961|1819274": ["There are a few surveys available [12, 13, 14, 15]."]} +{"15139976|1708582": ["Within the field of machine learning, both reinforcement learning (Kaelbling et al., 1996) and inductive logic programming (or relational learning) (Muggleton & De Raedt, 1994; Lavra\u010d & D\u017eeroski, 1994) have received a lot of attention since the early nineties.", "Within the \ufb01eld of machine learning, both reinforcement learning (Kaelbling et al., 1996) and inductive logic programming (or relational learning) (Muggleton & De Raedt, 1994; Lavra\u02c7c & D\u02c7zeroski, 1994) have received a lot of attention since the early nineties.", "Relational reinforcement learning employs the Q-learning method (Watkins & Dayan, 1992; Kaelbling et al., 1996; Mitchell, 1997) where the Q-function is learned using a relational regression tree algorithm (see (De Raedt & Blockeel, 1997; Kramer, 1996)).", "This formulation of reinforcement learning is typical (cf. (Mitchell, 1997; Kaelbling et al., 1996))."]} +{"59705497|7158350": []} +{"14121149|778117": ["Other robotics monitoring systems are surveyed in [78] and characterized into three classes: analytical approaches, data-driven approaches and knowledge-based approaches."]} +{"26200231|1932843": []} +{"26200231|1708582": []} +{"26200231|14997956": []} +{"6957672|7788290": ["The problem of locating people is the problem of determining their x\u2013y-location relative to the robot.1 Previous approaches to people tracking in robotics are feature-based: they analyze sensor measurements (images, range scans) for the presence of features [ 15 ,26] as the basis of tracking."]} +{"11296818|1708582": ["We assume the reader is familiar with the basic concepts of MDPs (see, e.g., ( Kaelbling, Littman & Moore 1996 ))."]} +{"8660085|18374428": [", a sensorimotor representation of the body used for action (Hoffmann et al. 2010)."]} +{"35926145|7813891": ["Goal reasoning (e.g., Norman & Long, 1996; Cox, 2007; Hawes, 2011; Klenk, Molineaux, & Aha, 2013; Jaidee, Mufioz-Avila, & Aha, 2013) challenges this interpretation and strives for autonomy of goals - in addition to autonomy of actions, an intelligent agent should be aware of its own goals and\u2026", "Goal reasoning (e.g., Norman & Long, 1996; Cox, 2007; Hawes, 2011; Klenk, Molineaux, & Aha, 2013; Jaidee, Mu\u00f1oz-Avila, & Aha, 2013) challenges this interpretation and strives for autonomy of goals \u2013 in addition to autonomy of actions, an intelligent agent should be aware of its own goals and deliberate upon them."]} +{"15585902|778117": ["In the following we review some of the work done in the area, the reader is referred to [12] for a recent survey of the topic."]} +{"6138609|778117": ["See Pettersson [60] for an overview of systems related to execution monitoring."]} +{"5889262|7360895": ["HRI is a younger sub-domain of robotics [85], [18, 22, 29, 40]."]} +{"1708582|17464562": []} +{"9979704|1452734": ["Finally, a third line of inspiration takes its sources in developmental psychology, giving rise to the so called developmental robotics or epigenetic robotics [15]."]} +{"9979704|14997956": ["This part starts with a chapter by [27] which provides an overview of imitation learning methods in robots."]} diff --git a/graph_1299833.jsonl b/edge/graph_1299833.jsonl similarity index 100% rename from graph_1299833.jsonl rename to edge/graph_1299833.jsonl diff --git a/graph_3583921.jsonl b/edge/graph_13000434.jsonl similarity index 100% rename from graph_3583921.jsonl rename to edge/graph_13000434.jsonl diff --git a/graph_130060.jsonl b/edge/graph_130060.jsonl similarity index 100% rename from graph_130060.jsonl rename to edge/graph_130060.jsonl diff --git a/graph_3598420.jsonl b/edge/graph_1300682.jsonl similarity index 100% rename from graph_3598420.jsonl rename to edge/graph_1300682.jsonl diff --git a/edge/graph_13018804.jsonl b/edge/graph_13018804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fdc9d71dbdcacff93f082c530b76a3c3901b02f --- /dev/null +++ b/edge/graph_13018804.jsonl @@ -0,0 +1 @@ +{"1628448|1517662": ["Global optimization problems appear in critical applications such as air traffic conflict detection and resolution algorithms [23], floating point analysis [14], and uncertainty and reliability analysis of dynamic and control systems [10, 17]."]} diff --git a/edge/graph_13019489.jsonl b/edge/graph_13019489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..939304c1aecd88280f3df40dc8c4bd4cbb5c7d43 --- /dev/null +++ b/edge/graph_13019489.jsonl @@ -0,0 +1,51 @@ +{"11553741|12452682": []} +{"31417645|8974063": []} +{"24822119|8909218": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"24822119|18148591": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5].", "To meet the anticipated capacity demand in the existing model of fixed resources including static-licensed spectrum, mobile network operators, in the context of 4G Long Term Evolution (LTE) [3], are exploring many techniques such as higher data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"6713970|5621151": []} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"4122595|15116409": ["of the examples are [11]: (i) Random Filtering, (ii) Com-"]} +{"4122595|8974063": []} +{"4122595|2509135": []} +{"4122595|12601073": ["Several survey papers exist in the literature in the context of CR communications covering a wide range of areas such as spectrum occupancy measurement campaigns [8], Spectrum Sensing (SS) [9]\u2013[13], spectrum management [14], emerging applications [15], spectrum decision [16], spect rum assignment [17], spectrum access strategies [18], resourc e allocation [19], [20], machine-learning techniques [21] a nd"]} +{"8974063|8443371": ["For a detailed comparison of different CR platforms see [88], where five different platforms are discussed and compared: the Universal Software Radio Peripheral (USRP) hardware [89] and GNU Radio software [90] platform; the Wireless Open Access Research Platform (WARP); the OpenAirInterface."]} +{"8974063|5621151": ["In the absence of signalling between PUs and SUs, spectrum holes may be identified by performing direct spectrum sensing, using geo-location databases, beaconing techniques, or by combining spectrum sensing with geo-location database information [7], [12].", "TVWS refers to large portions of RF spectrum, in the very high frequency (VHF) and ultra high frequency (UHF) bands, that will become vacant after the switch-over from analogue to digital TV [7].", "22 standard would be in sparsely populated rural areas [7]."]} +{"21473687|2833151": []} +{"21473687|12452682": []} +{"14786385|15453366": ["This mainly refers to frequency bands at 60 and 80 GHz, whose propagation properties enable operation with rather low interference risk and at the same time offer extremely high, gigabit capacities [7]-[11], making these bands promising candidates for building backhaul network for LTE."]} +{"5686943|12452682": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"18392084|14028362": []} +{"18392084|8909218": ["(UE) to the cellular core network through subscribers broadband internet access [4], [11].", "provide high speed communication to end users [4].", "industrial critics see significant potential for the use of technology, so called femtocells [2], [4], [11], [19]\u2013[21].", "the cellular functionalities to the end users [2], [4], [11]."]} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"1945165|8909218": ["In our future work, we will use the concept of hierarchy to investigate power control schemes for femtocells networks [34]."]} +{"1945165|12452682": []} +{"34527487|12452682": []} +{"17926950|2443013": ["Recent technology developments in the mobile communication systems arising from research are already paving the way spectrum sharing, see [55] for an overview for LTE-Advanced."]} +{"1548375|5621151": ["For example, agile modulation and spectrum pooling techniques are PHY layer transmission techniques being able to aggregate fragmented TVWS spectrum [6].", ", [5,6]), we consider more novel issues, e.", "For example, geo-location/database access for the discovery of spectrum opportunities was discussed in [5,6], but the authors only introduced basic concepts on this method."]} +{"9474430|8974063": ["Furthermore, a survey on spectrum decision in cognitive radio networks was presented in [30], machinelearning techniques in cognitive radios was surveyed in [31], techniques for improving reliability of wireless networks using cognitive radios were surveyed in [32] and a survey of artificial intelligence for cognitive radios was presented in [33]."]} +{"9474430|12187956": []} +{"9474430|1708582": ["where the optimal Q-value Q\u2217(s, a) of each state-action pair (s, a) can be calculated by the value iteration method [136] or Q-learning [138].", "The optimal policy is given by: where the optimal Q-value Q \u2217 ( s, a ) of each state-action pair ( s, a ) can be calculated by the value iteration method [136] or Q-learning [138]."]} +{"12667429|13019489": ["The most recent survey [28] provides a comprehensive overview of licensed spectrum sharing mechanisms for cellular systems.", "Total system bandwidth is 10 MHz at 2 GHz center frequency and it is equally divided among the OPs.", "However, different ICIC methods would require fast/real-time information exchange among base stations of different MNOs so they are not feasible methods for spectrum sharing [28].", "Promising frequency bands for light licensing are around 60 GHz and 80 GHz [28].", "[9] \u201cWorld Radiocommunication Conference 2015,\nhttp://www.itu.int/en/ITU-R/conferences/wrc/2015/.\u201d [10] P. Ahokangas, K. Horneman, H. Posti, M. Matinmikko, T. Ha\u0308nninen,\nS. Yrjo\u0308la\u0308, and V. Goncalves, \u201cDefining co-primary spectrum sharing A new business opportunity for MNOs?\u201d in9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), Jun. 2014, pp. 395\u2013400.", "Lot of discussion is going on regarding\n2 spectrum sharing at 3.5 GHz band in small cells which is in agenda of WRC-15 [7].", "One important aspect of spectrum sharing is the business aspect for MNOs [28].", "Mobile network operators (MNOs), which we will refer to as operators (OPs) hereafter in current wireless communication networks have commonly acquired exclusive usage rights for certain frequency bands a have little incentives to share it with other operators, despit significant research and regulatory efforts."]} +{"12667429|19938676": []} +{"12667429|1588237": ["ICIC techniques can be classified into mitigation and avoidance techniques [22]."]} +{"12667429|8974063": []} +{"12667429|55697421": ["In wireless networks, as mentioned earlier, the main idea of graph coloring is to assign different colors for adjacent base stations [95]."]} +{"33451360|8909218": []} diff --git a/edge/graph_13022232.jsonl b/edge/graph_13022232.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e94b8ec2d1d900fa949ab96fad30ae301be770a2 --- /dev/null +++ b/edge/graph_13022232.jsonl @@ -0,0 +1,3 @@ +{"17437981|913718": ["This problem is a well known one in the research area of ontology matching [6][7]."]} +{"15992154|386036": []} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} diff --git a/graph_3608506.jsonl b/edge/graph_13030259.jsonl similarity index 100% rename from graph_3608506.jsonl rename to edge/graph_13030259.jsonl diff --git a/edge/graph_13031661.jsonl b/edge/graph_13031661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f13bea4e03e42912756dc32813e5d7bd67b72dd7 --- /dev/null +++ b/edge/graph_13031661.jsonl @@ -0,0 +1,2 @@ +{"14680670|14148655": ["[2]."]} +{"15813474|5935762": ["Recommender systems [5] support users in identifying relevant candidates from an item assortment."]} diff --git a/edge/graph_13034818.jsonl b/edge/graph_13034818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b32a1672191ebfc3d73ecd2aa969212250c7317a --- /dev/null +++ b/edge/graph_13034818.jsonl @@ -0,0 +1 @@ +{"2503573|13034818": ["An overview of these technologies appears as a companion paper [2] in this issue of the IBM Journal of Research and Development.", "[2] provide an overview of SCM candidate device technologies and then compare them in terms of their potential for scaling to ultrahigh areal density [2]."]} diff --git a/graph_1303485.jsonl b/edge/graph_1303485.jsonl similarity index 100% rename from graph_1303485.jsonl rename to edge/graph_1303485.jsonl diff --git a/edge/graph_13037420.jsonl b/edge/graph_13037420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..590dad6ac5d7817413956d17ff912d2929a72894 --- /dev/null +++ b/edge/graph_13037420.jsonl @@ -0,0 +1,2 @@ +{"16218921|12904520": ["Since modern processors employ large last level caches (LLCs), their leakage energy consumption has become an important concern in modern chip design."]} +{"33421176|12904520": ["Many studies have been done to save power consumption by caches and main memories [35]."]} diff --git a/edge/graph_13038186.jsonl b/edge/graph_13038186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86dd70d5dc36163eb6207010088c7e1961028ec1 --- /dev/null +++ b/edge/graph_13038186.jsonl @@ -0,0 +1,7 @@ +{"14269584|11792588": []} +{"14269584|2762290": []} +{"44958546|6746689": []} +{"5073616|6746689": []} +{"28172707|6746689": ["In a parallel algorithm, the deletion of pixels in the nth iteration would depend only on the result that remains after the (n \u2212 1)th; therefore, all pixels can be examined independently in a parallel manner in each iteration [67].", "That is, the deletion of p in the nth iteration depends on all the operations that have been performed so far, that is, on the result of the (n \u2212 1)th iteration as well as on the pixels already processed in the nth iteration [67]."]} +{"57603956|11792588": ["The statistical, global transformation and series expansion, and geometrical and topological techniques are the commonly used feature extraction methods in handwritten character or document representation [6, 7]."]} +{"57603956|192934": ["It extracts a set of descriptors, various characteristic attributes, the relevant information associated to form a representation of input pattern [1-4]."]} diff --git a/graph_3610740.jsonl b/edge/graph_13038295.jsonl similarity index 100% rename from graph_3610740.jsonl rename to edge/graph_13038295.jsonl diff --git a/graph_3634303.jsonl b/edge/graph_13046985.jsonl similarity index 100% rename from graph_3634303.jsonl rename to edge/graph_13046985.jsonl diff --git a/edge/graph_13067364.jsonl b/edge/graph_13067364.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1be5e77a3b7d45e3d47ba930f37c333f1f31c1ff --- /dev/null +++ b/edge/graph_13067364.jsonl @@ -0,0 +1 @@ +{"16772266|3540699": ["Scene change detection is of great importance for a number of applications today."]} diff --git a/edge/graph_13069188.jsonl b/edge/graph_13069188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..577d411cc8d3fa672c17fb6feb444a8a6175693d --- /dev/null +++ b/edge/graph_13069188.jsonl @@ -0,0 +1,4 @@ +{"28803536|13069188": []} +{"154622417|6592804": []} +{"207173468|9504064": ["Ko, Lee, and Lee\u2019s [20] survey on BPM standards."]} +{"3907622|35897447": ["The RBV has been used frequently in IS literature to explain how IS creates competitive advantage (Melville et al., 2004; Piccoli and Ives, 2005).", "IT projects; and\n4. pre-emption coupled with two dynamic capabilities which reinforce these four barriers:\no organizational learning; and\no asset stock accumulation (Piccoli and Ives, 2005)."]} diff --git a/edge/graph_13074005.jsonl b/edge/graph_13074005.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b253ae165a98be06ecd79daf71268f1b13d5faf --- /dev/null +++ b/edge/graph_13074005.jsonl @@ -0,0 +1,3 @@ +{"36307590|11720829": [", Pr (C \u2264 Cout,q) = (100\u2212 q)%, and the ergodic capacity is defined as C\u0304 = E {C}, where E denotes the expectation operator and the expectation is with respect to the channel realizations [7]."]} +{"7902298|11720829": ["The combination of STBCs with MIMO-OFDM was, for example, considered in [19],"]} +{"7902298|18148591": []} diff --git a/graph_363532.jsonl b/edge/graph_13082795.jsonl similarity index 100% rename from graph_363532.jsonl rename to edge/graph_13082795.jsonl diff --git a/graph_3637412.jsonl b/edge/graph_13088291.jsonl similarity index 100% rename from graph_3637412.jsonl rename to edge/graph_13088291.jsonl diff --git a/graph_3649647.jsonl b/edge/graph_13093354.jsonl similarity index 100% rename from graph_3649647.jsonl rename to edge/graph_13093354.jsonl diff --git a/graph_3709199.jsonl b/edge/graph_13099106.jsonl similarity index 100% rename from graph_3709199.jsonl rename to edge/graph_13099106.jsonl diff --git a/edge/graph_13107747.jsonl b/edge/graph_13107747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3259ccef11d18d25b0b7760ba613c6825959348a --- /dev/null +++ b/edge/graph_13107747.jsonl @@ -0,0 +1 @@ +{"18747945|14545307": []} diff --git a/edge/graph_13108162.jsonl b/edge/graph_13108162.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0a2105e4202f624a2d6efa518164b400798d0a4 --- /dev/null +++ b/edge/graph_13108162.jsonl @@ -0,0 +1 @@ +{"3338596|4528002": ["Researchers found out that neither controller area network (CAN) bus nor FlexRay include sufficient security features to resist security attacks [30, 29, 35].", "As shown in multiple studies and surveys [29, 30, 31] today\u2019s vehicles are vulnerable to security threats which can adversely affect the safety."]} diff --git a/graph_371337.jsonl b/edge/graph_13113675.jsonl similarity index 100% rename from graph_371337.jsonl rename to edge/graph_13113675.jsonl diff --git a/graph_3721039.jsonl b/edge/graph_13115032.jsonl similarity index 100% rename from graph_3721039.jsonl rename to edge/graph_13115032.jsonl diff --git a/graph_3731816.jsonl b/edge/graph_131193085.jsonl similarity index 100% rename from graph_3731816.jsonl rename to edge/graph_131193085.jsonl diff --git a/edge/graph_13128481.jsonl b/edge/graph_13128481.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..174648f7db6e59419218131b654088063ae034e2 --- /dev/null +++ b/edge/graph_13128481.jsonl @@ -0,0 +1,5 @@ +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"14911142|9045232": ["There are comprehensive surveys written on face recognition (Zhao et al., 2003) and on face detection (Hjelm\u00e5s and Low, 2001; Yang et al., 2002).", "Detailed analysis of different face detection methods can be read, for example, in the surveys by Hjelm\u00e5s and Low (2001) and by Yang et al. (2002)."]} diff --git a/graph_3732796.jsonl b/edge/graph_13132742.jsonl similarity index 100% rename from graph_3732796.jsonl rename to edge/graph_13132742.jsonl diff --git a/graph_3775239.jsonl b/edge/graph_131363205.jsonl similarity index 100% rename from graph_3775239.jsonl rename to edge/graph_131363205.jsonl diff --git a/graph_3807622.jsonl b/edge/graph_1313790.jsonl similarity index 100% rename from graph_3807622.jsonl rename to edge/graph_1313790.jsonl diff --git a/graph_1314237.jsonl b/edge/graph_1314237.jsonl similarity index 100% rename from graph_1314237.jsonl rename to edge/graph_1314237.jsonl diff --git a/graph_3815882.jsonl b/edge/graph_13145601.jsonl similarity index 100% rename from graph_3815882.jsonl rename to edge/graph_13145601.jsonl diff --git a/edge/graph_13151033.jsonl b/edge/graph_13151033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb770fef5bc0948b643297e4f7c4b7fca24d22bc --- /dev/null +++ b/edge/graph_13151033.jsonl @@ -0,0 +1,11 @@ +{"1757354|3330313": []} +{"207172599|3330313": []} +{"3721623|8310135": ["Approaches to ner are surveyed in [48].", "Establishing a sensible evaluation metric for ner is challenging [48]."]} +{"14914272|3330313": []} +{"1604537|11385769": []} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"633413|1142636": ["In reviewing the benchmark described in [29], where there were six semantic annotation approaches evaluated,", "A survey by [29] defines semantic annotation as the mapping between ontology instances and classes."]} +{"633413|8310135": ["Our problem then is closely related to the entity recognition problem in information extraction, i.e., the process of recognizing entities and their type (e.g., a person, location or organization) [11], [12], [13].", "Nadeau and Sekine [12] speci\ufb01cally address unstructured text and provide a survey of named entity recognition that includes both supervised to unsupervised approaches."]} +{"633413|913718": ["The survey by [19] formalizes the schema/ontology matching problems and highlights promising work.", "Interoperability and integration are core problems addressed in database and ontology matching [17], [18], [19], [20], [21], [22]."]} +{"5865347|50458504": ["Finally, due to the wide-range of application domains, fraud detection has attracted many surveys (Edge and Falcone Sampaio 2009; Flegel et al. 2010; Phua et al. 2010).", "For a general survey on various fraud detection techniques, we refer the reader to [Bolton and Hand, 2002] and [Phua et al., 2010].", "Finally, due to the wide-range of application domains, fraud detection has attracted many surveys [Edge and Sampaio, 2009, Flegel et al., 2010, Phua et al., 2010]."]} +{"6025109|9180844": ["This pro\ufb01le is suf\ufb01ciently expressive for many biomedical ontologies, such as the very large ontology SNOMED CT [13], and basic reasoning problems for OWL 2 EL can be decided in polynomial time."]} diff --git a/edge/graph_13158536.jsonl b/edge/graph_13158536.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb8aa73a1616e5fcc6ed21fae0873cdb60880367 --- /dev/null +++ b/edge/graph_13158536.jsonl @@ -0,0 +1 @@ +{"35402964|16944441": []} diff --git a/graph_1315930.jsonl b/edge/graph_1315930.jsonl similarity index 100% rename from graph_1315930.jsonl rename to edge/graph_1315930.jsonl diff --git a/graph_3821062.jsonl b/edge/graph_13161071.jsonl similarity index 100% rename from graph_3821062.jsonl rename to edge/graph_13161071.jsonl diff --git a/edge/graph_13171013.jsonl b/edge/graph_13171013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f5a933f276e57657aa57887f19b3d37a3db1f79 --- /dev/null +++ b/edge/graph_13171013.jsonl @@ -0,0 +1,14 @@ +{"2661363|1708582": []} +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} +{"5528008|1708582": []} +{"1708582|17464562": []} +{"983224|1708582": ["Reinforcement learning (RL) is a form of machine learning used to solve problems of interaction (Bertsekas & Tsitsiklis, 1996; Kaelbling, Littman & Moore, 1996; Sutton & Barto, 1998)."]} +{"871178|1708582": ["We refer to [8] for a survey of RL techniques."]} +{"765279|1708582": ["The action selection strategy that we have chosen for our research is the Boltzmann strategy ( Kaelbling, Littman, & Moore 1996 ) which states that agent chooses an action to perform in the next iteration of the game with a probability that is based on its current estimate of the usefulness of that", "1 In ( Kaelbling, Littman, & Moore 1996 ), the estimated value is introduced as expected reward (ER)."]} +{"1734426|1708582": ["We assume the reader is familiar with the basic concepts of MDPs (see, e.g., Kaelbling et al. [9])."]} +{"18224337|3042022": []} +{"18224337|1708582": ["There has also been quite some effort to extend these RL techniques to Partially Observable Markovian decision problems and non-Markovian settings [20]."]} +{"18224337|17464562": ["The term LA was for the first time introduced in the work of Narendra and Thathacher in 1974 [25]."]} +{"44377399|1708582": ["For this purpose, researchers have investigated Reinforcement Learning (RL) [15,11]."]} +{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]} +{"125723693|17464562": []} diff --git a/edge/graph_13172512.jsonl b/edge/graph_13172512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee13e880f25ce35e50f8e693dc8178004ddff6d9 --- /dev/null +++ b/edge/graph_13172512.jsonl @@ -0,0 +1,3 @@ +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"9811539|10559330": ["It has resulted in a number of standards and approaches, such as Integrated Services (IntServ) [1], the Resource Reservation Protocol (RSVP) [2] and Differentiated Services (DiffServ) [3]."]} diff --git a/edge/graph_131768452.jsonl b/edge/graph_131768452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d29379a6d531ae3989a127d6f69ae440ad0b9a0b --- /dev/null +++ b/edge/graph_131768452.jsonl @@ -0,0 +1,38 @@ +{"57967705|6387482": ["Different types of sample information form the heterogeneous data for the same problem [3]."]} +{"56175274|55620284": []} +{"1740355|1708582": []} +{"1740355|14843594": ["Bayesian optimization has also been used (Shahriari et al., 2016) for automatic selection of network architectures (Bergstra et al., 2013; Domhan et al., 2015) and hyperparameters (Snoek et al., 2012; Swersky et al., 2013)."]} +{"31141814|16422199": ["As pointed out in [98], data collection methods need to leverage Big Data techniques and distributed intelligence to be able to facilitate cooperative sensing and transparent access to data processing mechanisms."]} +{"1291435|14545307": []} +{"206592484|456491": []} +{"29910972|16525678": ["pervasive applications in video surveillance [4], intelligent transportation [5], and urban computing [6], which can quickly discover, locate, and track the target vehicles in large-scale surveillance videos."]} +{"50769151|9270553": ["systems [2], [3], and is also considered a promising technique for human-machine interactions [4]."]} +{"206594346|7788290": ["Second, dynamic hand gestures generally contain three temporally overlapping phases: preparation, nucleus, and retraction [8, 14], of which the nucleus is most discriminative."]} +{"4404566|393948": ["The success of predictive algorithms largely depends on feature selection and data representation 12,13 .", "Despite the success of feature learning with text, multimedia, and marketing 12 , as well as the rising popularity of deep learning 17 (i.e., learning based on hierarchies of neural networks), these techniques have not been used broadly with EHR data.", "These challenges have made it difficult for machine learning methods to identify patterns that produce predictive clinical models for real-world applications 12 .", "SDAs are sequences of three-layer neural networks with a central layer to reconstruct high-dimensional input vectors 12,17,18,41 .", "We compared the deep patient representation with other well-known feature learning algorithms having demonstrated utility in various domains including medicine 12 ."]} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"11952894|1230643": []} +{"11952894|60455": ["Harvesting information from social media feeds is in essence a web-mining process (Kosala and Blockeel 2000, Sakaki et al. 2010, Russell 2011)."]} +{"4346470|16528630": []} +{"3776155|393948": ["\u20262013; Sermanet et al., 2014; Krizhevsky et al., 2012) trained to locate the LV; (ii) the shape of the LV is inferred using stacked autoencoders (Bengio et al., 2013; Bengio, 2009; Vincent et al., 2008; Baldi, 2012; Deng and Yu, 2014; Vincent et al., 2010) trained to delineate the LV; (iii) the\u2026", "complex problem of LV segmentation utilizing a combined deep-learning (LeCun et al., 2015; Hinton and Salakhutdinov, 2006; Bengio, 2009; Bengio et al., 2013; Ng, accessed July., 2015; Deng and Yu, 2014; Baldi, 2012) and deformablemodels approach.", "\u2026is the ground truth in cardiac MRI, we tackle the complex problem of LV segmentation utilizing a combined deep-learning (LeCun et al., 2015; Hinton and Salakhutdinov, 2006; Bengio, 2009; Bengio et al., 2013; Ng, accessed July., 2015; Deng and Yu, 2014; Baldi, 2012) and deformable-models approach.", ", 2012) trained to locate the LV; (ii) the shape of the LV is inferred using stacked autoencoders (Bengio et al., 2013; Bengio, 2009; Vincent et al., 2008; Baldi, 2012; Deng and Yu, 2014; Vincent et al., 2010) trained to delineate the LV; (iii) the inferred shape is used for initialization and also is incorporated into deformable models for segmentation."]} +{"3776155|1902238": ["\u2026imaging (MRI) is now routinely being used for the evaluation of the function and structure of the cardiovascular system (Yuan et al., 2002; Lima and Desai, 2004; Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "However, it is very difficult to build a model that is general enough to cover all possible shapes and dynamics of the heart chambers (Petitjean and Dacher, 2011; Jolly et al., 2009).", "First, the gap between slices (vertical dimension) in most routine acquisitions is relatively large (around 7-8 mm) and the pixel intensities between the slices cannot be reliably estimated (Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Petitjean et al., 2015; Queiros et al., 2014).", "However, manual segmentation is tedious, time consuming and prone to intra- and inter-observer variability (Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "Due to these technical barriers the task of automatic segmentation of the heart chambers from cardiac MR images is still a challenging problem (Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Suinesiaputra et al., 2014).", "Pixel classi\ufb01cation, image-based and deformable methods su\ufb00er from a low robustness and accuracy and require extensive user interaction (Petitjean and Dacher, 2011).", "A review of these methods can be found in (Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "To summarize, there are several challenges in the automated segmentation of the LV in cardiac MRI datasets: heterogeneities in the brightness of LV cavity due to blood flow; presence of papillary muscles with signal intensities similar to that of the myocardium; complexity in segmenting the apical and basal slice images; partial volume effects in apical slices due to the limited resolution of cardiac MRI; inherent noise associated with cine cardiac MRI; dynamic motion of the heart and inhomogeneity of intensity; considerable variability in shape and intensity of the heart chambers across patients, notably in pathological cases, etc (Tavakoli and Amini, 2013; Petitjean and Dacher, 2011; Queiros et al., 2014).", "\u2026noise associated with cine cardiac MRI; dynamic motion of the heart and inhomogeneity of intensity; considerable variability in shape and intensity of the heart chambers across patients, notably in pathological cases, etc (Tavakoli and Amini, 2013; Petitjean and Dacher, 2011; Queiros et al., 2014).", "However, it is very di\ufb03cult to build a model that is general enough to cover all possible shapes and dynamics of the heart chambers (Petitjean and Dacher, 2011; Jolly et al., 2009).", "Pixel classification, image-based and deformable methods suffer from a low robustness and accuracy and require extensive user interaction (Petitjean and Dacher, 2011).", "Cardiac magnetic resonance imaging (MRI) is now routinely being used for the evaluation of the function and structure of the cardiovascular system (Yuan et al., 2002; Lima and Desai, 2004; Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "First, the gap between slices (vertical dimension) in most routine acquisitions is relatively large (around 7-8 mm) and the pixel intensities be-tween the slices cannot be reliably estimated (Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Petitjean et al., 2015; Queiros et al., 2014).", "However, manual segmentation is tedious, time consuming and prone to intra-and inter-observer variability (Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014)."]} +{"11566780|3102110": []} +{"17500448|3330313": []} +{"1033682|174797842": []} +{"5868677|9270553": ["Brain-computer interfaces (BCI) allow people to control the external environment through direct measures of brain signal [1]."]} +{"207214926|3330313": []} +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"1520906|3348390": ["Although some reviews about IoT have been conducted recently (e.g., Atzori et al., 2010; Zeng et al., 2011; An et al., 2013; Perera et al., 2013; Li et al., 2016; Yan et al., 2014), they focus on high level general issues and are mostly fragmented."]} +{"12709407|18388986": ["One of the most well-known data fusion classifications was provided by Dasarathy [36]."]} +{"19319715|1599458": ["aware sensing networks and intelligent services for the IoT [24], [94] and IoP."]} +{"19319715|3348390": ["The second potential direction from the intersection of the domains would be improving and developing new contextaware sensing networks and intelligent services for the IoT [24], [94] and IoP.", "Smart meters and home devices may require ZigBee, 6LOWPAN, BLE, WiFi, which is dependent on the type of sensors and IoT devices used in the system.", "The work in [24] surveyed many research efforts and placed emphasis on the development of", "Considering the 3GPP which affects most of the device-to-device communication in the smart cities, [31]\u2013[33] proposes that, to meet with the new connectivity requirements of the emerging massive IoT segment, there is a need for new standards that will address the following: 1) low device cost; 2) improved battery life; 3) improved coverage; and 4) support for massive numbers of IoT connections.", "Their proposal advocates the use of smartphones to learn about its owner and context to improve the connection between people and the IoT (e.g., to enable context-aware sensing).", "To the best of our knowledge, the classification presented in this paper would have a different emphasis from other previous surveys on big data [16]\u2013[19], smart cities [20]\u2013[22], and/or IoTs [23]\u2013[25].", "The connectivity and communication of\nsystems and/or platforms in most cases require the IoT.", "The convergence of the three domains in the big sensor framework, and the emergence of the IoP as well as the current IoT enables new sensing applications to be designed and developed.", "more context-aware applications would be targeted toward deriving advantages for the smart things/objects [24] in the sensing system.", "The intersection of the Internet/communications domain with the sensor/things domain results in technologies like WSNs and the Internet of Things (IoT).", "The boundary for the IoT does not include the people/creature domain.", "New futuristic applications for smart cities are envisioned with the emergence of new technological concepts, such as big data analytics, semantic sensor networks, sensor-cloud computing, context-aware sensing, etc. Gubbi et al. [92] considered some open challenges and identified some challenges for the future IoT, such as energy efficient sensing, security and reprogrammable networks, participatory sensing, and new networking protocols.", "aware sensing networks and intelligent services for the IoT [24], [94] and IoP."]} +{"19319715|10505742": ["ing and tracking [5], [6] would also be classified into this domain."]} +{"19319715|16335158": ["new developments and improvements of the sensor-cloud infrastructure [97]\u2013[99]."]} +{"19319715|1230643": ["As reported in [26], practical realization of most services in the smart cities are not affected by technical issues, but are affected by the lack of widely accepted service architectures and communication protocols [27].", "situations, for information not to be lost in case a sensor dies [26], [29].", "To observe physical phenomena and make all devices in the urban area to become smart devices, big sensor data systems require a high-density deployment of sensors and a large number of sensors for proper connectivity [26]."]} +{"3543594|393948": ["DEEP learning (DL) algorithm, which is materialized by deep neural networks (DNNs) for learning meaningful representations [1], is a very hot research area during recent"]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"125371943|3110415": []} +{"125371943|393948": []} +{"26902521|1520906": ["Sensor data has been described as frequently updated, timestamped and structured data (FUTS) [7], which change rapidly along not only the temporal dimension, but also the spatial dimension.", "The FUTS data can be described according to the lightweight semantic model shown in Figure 2 and stored in a time-series database in an edge cloud."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} diff --git a/edge/graph_131774042.jsonl b/edge/graph_131774042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29d626dc8aba77d8640c29ad9a7711f0d66bb444 --- /dev/null +++ b/edge/graph_131774042.jsonl @@ -0,0 +1,3 @@ +{"8599018|3330313": ["4 using boxplot [9] where outliers are identified as values outside inner fences numerical boundaries2."]} +{"22173349|11608263": ["There are two ways of handling multi-label classification: algorithm adaptation and problem transformation [18]."]} +{"3794211|12454277": []} diff --git a/edge/graph_131774101.jsonl b/edge/graph_131774101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9e04e900e01098f179bcca2155fbc30c8dfe7c1 --- /dev/null +++ b/edge/graph_131774101.jsonl @@ -0,0 +1,9 @@ +{"19831625|18599847": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"21106538|6751108": ["unsupervised taggers based on the degree of automation of the training and tagging process [10].", "Supervised taggers work with pre-tagged corpora whereas unsupervised taggers do not depend on pre-tagged corpora [10].", "Both supervised and unsupervised models are mainly divided as rule-based and stochastic tagging [10]."]} diff --git a/edge/graph_131775725.jsonl b/edge/graph_131775725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..055d19047344e3f59f15fdc4b780d1bf62f37de0 --- /dev/null +++ b/edge/graph_131775725.jsonl @@ -0,0 +1,80 @@ +{"10373922|3053192": []} +{"9631509|3053192": ["More on hyper-heuristics can be found in [5]."]} +{"9631509|2373140": ["There are many studies on different types of VRPs [8], [9], [10], [11].", "Many different solution techniques have been proposed for many variants of this problem [8], [9], [10], [11]."]} +{"14074696|1708582": ["The process is then iterated."]} +{"59554097|15090494": ["[6] classified surrogate models depend-"]} +{"53750327|69981142": []} +{"53750327|3053192": ["Another approach for online algorithm selection and the selection of an appropriate algorithm for a given problem instance is provided by so-called hyper-heuristics; these are algorithms for selecting or generating solvers for a given problem from a set of given heuristic components (Burke et al., 2013).", "\u2026approach for online algorithm selection and the selection of an appropriate algorithm for a given problem instance is provided by so-called hyper-heuristics ; these are algorithms for selecting or generating solvers for a given problem from a set of given heuristic components (Burke et al., 2013)."]} +{"53750327|33583074": ["Overviews on the early works related to this problem class can be found in Pitzer and Affenzeller (2012), Malan and Engelbrecht (2013), Sun et al. (2014) and Mu\u02dcnoz Acosta et al. (2015b)."]} +{"53750327|14659766": ["Over the years, algorithm selection techniques have achieved remarkable results in several research areas \u2013 especially for discrete combinatorial problems (see, e.g., Smith-Miles, 2009; Kotthoff, 2014).", "A more recent overview on algorithm selection was published by Kotthoff (2014).", "The ASAP planning system is based on similar ideas (Vallati et al., 2013, 2014)."]} +{"52938664|7782275": ["There exists a rich body of earlier work (Brazdil et al., 2009; Lemke et al., 2015; Giraud-Carrier, 2008; Luo, 2016) on building meta-models for algorithm selection (Bensusan and Giraud-Carrier, 2000; Pfahringer et al."]} +{"52938664|5281246": []} +{"12973317|1142274": []} +{"12973317|62204132": []} +{"3053192|13867280": []} +{"3053192|1708582": ["One of the commonly used methods in hyper-heuristics is reinforcement learning , see Kaelbling et al (1996) and Sutton and Barto (1998) for more details."]} +{"18702854|1386147": []} +{"18702854|4474193": ["If an expensive optimization is time-varying, evolutionary algorithms for solving dynamic optimization problems must be adopted to track the moving optima or moving Pareto front [97]."]} +{"2202629|365692": [", [13], [23]), the generality level is raised by having an evolutionary algorithm searching for the best decision-tree induction algorithm that may be effectively applied to several different classification problems (a hyper-heuristic approach).", "For parameters 1\u20134, we have defined values commonly used in the literature of evolutionary algorithms for decisiontree induction [23], namely, 100 individuals, 100 generations,"]} +{"2202629|18782652": ["for composing a tree node\u2019s test and for pruning a decision tree [15], [16]."]} +{"39024728|3053192": ["More sophisticated acceptance algorithms such as Simulated Annealing(SA), Late Acceptance (LA) and Great Deluge (GD) can be found in the scientific literature (Burke et al., 2013).", "Hyper-heuristics are high level improvement search methodologies exploring space of heuristics (Burke et al., 2013)."]} +{"27910748|1386147": ["The advantages of applying Pareto-based learning is thoroughly explained and compared with a single and scalerized objective in [295]."]} +{"27910748|18454590": ["Such problem can be addressed through the integration of FNN with statistical methods like the one usually done with hidden Markov model [348]."]} +{"27910748|7158350": ["Therefore, a wide range of problems is solved by the FNNs, such as pattern recognition [3], clustering and classification [4], function approximation [5], control [6], bioinformatics [7], signal processing [8], speech processing [9], etc."]} +{"27910748|1708582": ["Contrary to the supervised learning paradigm, there are two other learning forms for the spacial cases of FNNs: 1) the unsupervised learning\u2014for the unlabeled training data [35], and 2) the reinforcement learning\u2014for the training data with insufficient input\u2013output relations [36]."]} +{"27910748|192934": ["Therefore, a wide range of problems is solved by the FNNs, such as pattern recognition [3], clustering and classification [4], function approximation [5], control [6], bioinformatics [7], signal processing [8], speech processing [9], etc."]} +{"52110398|14659766": []} +{"38422528|3053192": ["Selection hyper-heuristics operate at a high-level to choose the next operator, from a low-level heuristic pool, to guide the search [6], [7], [25], [30].", "Hyper-heuristics are high-level strategies that choose or generate a set of low-level heuristics to solve difficult search and optimization problems [7], [24]."]} +{"38422528|33583074": ["Several evolvability metrics have been proposed in the literature [18]."]} +{"26570646|3053192": ["A hyper-heuristic is a high-level automated methodology for selecting or generating a set of heuristics (Burke, et al., 2013).", "A traditional selection hyper-heuristic model consists of two levels, as shown in Figure II (Burke, et al., 2013).", "These two categories can be defined as \u2018heuristics to select heuristics\u2019 and \u2018heuristics to generate heuristics\u2019 respectively (Burke, et al., 2013).", "Perturbative LLH There are many different pairwise combinations of LLH selection and move acceptance methods in the literature (Burke, et al., 2013)."]} +{"207175852|1097238": ["[12] give a good account of why diversity is necessary in neural network ensembles and present a taxonomy of methods that enforce it and which are in practise.", "[12] and Chandra and Yao [16] have also described the relationship between accuracy and diversity from the individual member output distribution perspective.", "Brown [12] gives an extensive survey of ensemble methods.", "A theoretical account of why ensembles perform better than single learners is also presented here [12].", "In order to measure the diversity with respect to the test set (which basically is the actual definition of diversity as given in [12, 41]), we would similarly need the failure patterns of each individual in the ensemble over the test set.", "In the classification context, according to Hansen and Salamon [28] and as also mentioned in [12], a necessary and sufficient condition for a majority voting ensemble of classifiers to be more accurate than any of its component classifiers is that the components be both accurate and diverse."]} +{"37925315|12681089": []} +{"1830113|1708582": ["The competition rules are inspired from the principles of reinforcement learning [21] [36].", "Nareyek [24] [25] also proposed a hyperheuristic method which uses ideas based on reinforcement learning [21] [36] in order to choose which heuristic to apply at each decision point."]} +{"16865554|32584958": ["JSSP Potts & Strusevich [117] 2009 Journal of the Operational Research Society."]} +{"5959987|3053192": ["and applying them to the solution in hand for iterative improvement or generating and testing new heuristics built from available components [2]."]} +{"5646762|191396": ["data objects and disclosed clusters [132].", "Several dissimilarity measures can be employed for clustering tasks [72], [132].", "It is important to stress that comprehensive surveys on clustering have been previously published, such as the outstanding papers by Jain et al. [73], Jiang et al. [74], and Xu and Wunsch II [132], just to mention a few.", "[74], and Xu and Wunsch [132], just to mention a few."]} +{"32960213|33583074": ["There are several methods developed for continuous optimization problems, most of which have been adapted from combinatorial optimization (Pitzer and Affenzeller, 2012; Malan and Engelbrecht, 2013)."]} +{"32960213|14659766": ["The extensive and successful work on algorithm selection for discrete and analytical problems (Smith-Miles, 2009; Hutter et al., 2014; Smith-Miles et al., 2014; Kotthoff, 2014) demonstrates the power of linking problem characteristics to the performance of algorithms."]} +{"42937655|13867280": [", [105, 199, 230], where the memes, either directly encoded within the candidate solutions or evolving in parallel to them, take part in the evolution and undergo recombination and selection in order to select the most promising operators", "Populations of genes and memes evolve separately and simultaneously and their solutions are linked, see [196, 197, 198, 199]."]} +{"42937655|4474193": ["In the survey proposed in [81] the sources of uncertainties are categorized as 1) uncertainties due to approximation 2) uncertainties due to robustness 3) uncertainties due to noise 4) uncertainties due to time-variance."]} +{"42937655|8530790": []} +{"18396559|3053192": ["However, whilst hyper-heuristics have been shown to be very effective at solving a range of single-objective combinatorial optimisation problems [8], few examples of multi-objective approaches exist in the literature."]} +{"27488308|3053192": ["cross-fertilization also with other hyper-heuristic concepts, such as hyper-heuristics for heuristic selection [3]."]} +{"9607044|5646762": []} +{"9607044|1386147": []} +{"9607044|191396": []} +{"9607044|7158350": []} +{"9701598|13867280": ["However, we mention here some related areas of research: adaptation and self-adaptation of algorithm parameters [2, 21, 32], algorithm configuration [33], racing algorithms [8], reactive search [6, 7], adaptive memetic algorithms [34, 35, 43, 44, 47, 48, 56 ], and algorithm portfolios [26, 31]."]} +{"21811179|3053192": ["The naive way to pick a heuristic algorithm from the candidate pool is to rely on a random process [9].", "Because there are many successful examples in using the hyper-heuristic algorithm to solve the combinatorial optimization problem, several reviews of hyper-heuristic algorithms [9], [12], [13] are given to differentiate them and to make them easier to use.", "In addition to combining one or more heuristic algorithms into a single search algorithm (called hybrid-heuristics), the hyper-heuristic algorithm [9], an important branch of heuristics, provides an alternative way to integrate multiple heuristic algorithms into a single search algorithm."]} +{"21811179|191396": ["Among all the COPs, the clustering problem has long been an active research subject because solution for it can be applied to many other problems, such as image and speech recognition, data compression, and data analysis [1]."]} +{"51964162|3053192": ["A comprehensive survey on hyper-heuristics may be found in [91]."]} +{"51964162|1766884": ["The reader can \ufb01nd more details in the applications of metaheuristics to unsupervised learning in the surveys [141, 142]."]} +{"51964162|16793463": ["These metaheuristics have been employed in a wide range of \ufb01elds such as routing [112, 113], scheduling [114], and nutrition [115]."]} +{"51964162|5646762": ["The reader can \ufb01nd more details in the applications of metaheuristics to unsupervised learning in the surveys [141, 142]."]} +{"24352132|14843594": ["The earliest meta-modeling approaches were based on genetic algorithms [9, 11, 13] or Bayesian optimization [2, 10]."]} +{"16897832|1929234": ["ture selection can be seen in [7], [8], [12], and [13], which focus mainly on non-EC-based methods.", "Although there are some existing fast evaluation measures, such as mutual information [12], [32], [34], [240], they evaluate features individually rather than a group of features."]} +{"17240638|5646762": []} +{"63086559|27488308": ["[20] suggested that the publication of entire simulators (e.g. Jasima from [44]) would greatly help replicability and facilitate fair comparisons.", "In the last decade, genetic programming[6,67]hasbeenthedominatingtechniqueforautomated design for production scheduling heuristics [20].", "Recently, Branke et al. [20] presented the most comprehensive survey of existing studies on hyper-heuristics and production scheduling."]} +{"63086559|3053192": ["[24]providedagen-eral survey of related studies on hyper-heuristics developed to deal with a wide range of scheduling and combinatorial optimisation problems."]} +{"63086559|12846121": ["Although there are a number survey papers for production scheduling such as Ouelhadj and Petrovic [109] and Hart et al. [43], they just focused on traditional meta-heuristics to \ufb01nd optimal solutions for a set of static scheduling instances.", "Strategies for dynamic scheduling in production systems [109] WhileGPhasbeenappliedtomanystudiestoevolveprior-ity rules, there is no study on predictive-reactive scheduling."]} +{"13974929|1708582": []} +{"3455278|3053192": ["Hyper-heuristics form a class of high-level methods which search a space of low-level heuristics or components, rather than solutions, while solving computationally hard problems [7]."]} +{"3455278|13867280": ["An overview of some adaptation schemes using multiple memes can be found in [50, 62]."]} +{"3455278|1708582": ["variant, a Steady-state Multimeme Memetic Algorithm (SSMMA), supports the adaptation of genetic operators including hill climbing and their settings through the use of Reinforcement Learning [30] with the memeplex encoding.", "The utility score for each option is separately maintained within each individual in a population and gets updated using a strategy inspired by Reinforcement Learning [30, 57].", "The proposed MMA variant, a Steady-state Multimeme Memetic Algorithm (SSMMA), supports the adaptation of genetic operators including hill climbing and their settings through the use of Reinforcement Learning [30] with the memeplex encoding.", "In the case that the Child solution is an improvement over the parent, the scores for each of the \ufb01ve memes within the memeplex of the Child are modi\ufb01ed using an additive Reinforcement Learning scheme [57], with each value incremented by 1.", "We intend to continue our work in this area in future by analysing the e\ufb00ect of the Reinforcement Learning mechanism used to select a low-level heuristic of a given type and memory length."]} +{"8230902|3053192": []} +{"8230902|1708582": []} +{"365692|14808716": ["It is important to stress that comprehensive surveys on decision trees have been previously published, such as the papers by Safavian and Landgrebe [24], Murthy [25], and Rokach and Maimon [26]."]} +{"53109768|53280687": ["For example, Landmark regularization is proposed by [160] to improve the consistency between the performance rankings of the supernet model and that of the standalone architectures."]} +{"6695982|17887301": ["Many SI and EC algorithms have been applied in various optimization problems in different domains, such as bioinformatics [23], machine learning [40], and engineering problems [2, 12]."]} +{"15076915|3053192": []} +{"69247011|27488308": []} +{"69247011|3053192": []} +{"43607964|1097238": []} +{"29666166|3053192": ["Hyper-heuristics are (meta-)heuristics that choose or generate a set of low level (meta-)heuristics in an attempt to solve di\ufb03cult search and optimization problems [1, 2]."]} +{"33821369|6707996": ["Unfortunately, the quality of the result is dependent on the initial points and may converge to a local minimum of the criterion function value if the initial partition is not properly chosen [23, 24]."]} +{"33821369|17323154": ["To obtain good results in web document clustering the algorithms must meet the following specific requirements [1, 3]: Automatically define the number of clusters that are going to be created; generate relevant clusters for the user and assign these documents to appropriate clusters; define labels\u2026", "Such systems usually consist of four main components: search results acquisition, preprocessing of input, cluster construction and labeling , and visualization of resulting clusters [1].", "There are three types of algorithms [1]: data-centric, description-aware and description-centric.", "[1, 8-13] are designed specifically for web document clustering, seeking a balance between the quality of clusters and the description (labeling) of them.", "These results have in mind that the maximum execution time of the algorithm is 1500 milliseconds (1.5 seconds, an appropriate time for web clustering documents based on [1]) for each data set.", "Data-centric algorithms are the algorithms traditionally used for data clustering (partitional, hierarchical, density-based, etc.) [1, 4-7].", "In recent years, web document clustering has become a very interesting research area among academic and scientific communities involved in information retrieval (IR) and web search [1].", "This proposal is a data-centric algorithm [1], it does not define the number of clusters automatically and it does not show appropriate cluster labels.", "In IR, these web document clustering systems are called web clustering engines and the main exponents in the field are Carrot, Vivisimo, SnakeT, Dynamic SVD and STC [1]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"14051623|4474193": []} +{"824773|3053192": []} +{"824773|1708582": []} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} diff --git a/edge/graph_131776192.jsonl b/edge/graph_131776192.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fcc39b2aacc315081fc3e2b93926f50205f78ea2 --- /dev/null +++ b/edge/graph_131776192.jsonl @@ -0,0 +1 @@ +{"1980573|469744": ["Even today, most work in augmented environments requires cumbersome sensing and head-mounted display gear [1]."]} diff --git a/edge/graph_131777219.jsonl b/edge/graph_131777219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81c5184d08ab99db7696e04f3237a5a6302799cf --- /dev/null +++ b/edge/graph_131777219.jsonl @@ -0,0 +1,12 @@ +{"36279912|393948": ["Deep CNNs can hierarchically extract features of inputs, which tend to be invariant and robust [9]."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"13556461|5605271": ["Since smart energy data are characterized by volume, velocity, variety, and value, which are the key elements of big data, the concept of energy big data is introduced [5].", "[5] first gave a comprehensive overview on energy big data covering energy big data\u2019s infrastructure, applications, algorithms, and security analysis."]} +{"1730638|206988459": ["[70]."]} +{"10453356|1507400": ["HBase has rich data types and is different from RDBMS storage mode, which has only a simple string types and all of the types must be dealed with [28]."]} +{"23781891|624120": ["In addition, remote sensing data analysis can be used to global insurance markets, such as crop damage and flood and fire risk assessment [46]."]} +{"135059094|12323589": ["Therefore, the multi-dimensional array-based data model is used to represent geospatial raster data in both industry and scienti \ufb01 c communities (Rusu and Cheng 2013; Li et al. 2017a; Yang et al. 2017a)."]} +{"31835212|18657007": ["broadcasting protocols/schemes [24].", "The solutions can be mainly categorized as Mobile Ad Hoc Networks (MANETs) [23], [24], [27], Delay Tolerance Networks (DTNs) [28], [29], and Movable Base Stations (MBSs) [1], [30]\u2013[32].", "proven to be the most efficient routing protocol in several studies [35]\u2013[37], [24], compared to others, e."]} +{"31835212|2830636": ["(3) Spatial Co-location Discovery: Spatial co-location pattern discovery is the process of finding the subsets of features that are frequently located together in the same geographic area [110]."]} +{"12937103|17966235": []} +{"12937103|2535224": ["CR is also one of the dominant candidate technologies for the fifth generation (5G) wireless communication technologies [11, 12]."]} +{"54457893|3750204": []} diff --git a/edge/graph_131778847.jsonl b/edge/graph_131778847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..531348b08df628bc207afb42fbede88b7aed2e85 --- /dev/null +++ b/edge/graph_131778847.jsonl @@ -0,0 +1,27 @@ +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"21707051|102352657": []} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"49343495|34643772": []} +{"67870253|13688847": ["Private blockchain networks are only accessed by a specific, limited organization and cannot be widely adopted in diverse trading activities [1].", "Recruiting more verifiers can avoid centralized block verification and decrease impacts of compromised verifiers leading to more reliable and secure blockchain network [1], [5].", ", proof-of-stake) among a set of pre-selected miners to maintain the distributed ledger, in which the efficient consensus management is achieved [1], [3].", "Blockchain provides immutable ledgers and decentralized platforms for various practical scenarios [1]."]} +{"26193763|27262729": ["This process can be referred as the speed game among the miners with different computing capacities [3], [4]."]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"86722298|49574823": ["Some variants [18], such as Delegated PoS (DPoS), Transactions as PoS (TaPoS), PoS-Velocity (PoSV), Delegated Byzantine Fault Tolerance (DBFT) and Bitcoin-NG, select some ones to generate and validate blocks to improve the scalability, throughput and latency."]} +{"86722298|27262729": ["2) Security and Privacy: Despite the original security and privacy issues of blockchain [96], outsourcing services at the edges in the integrated system of blockchain and edge computing presents new security and privacy challenges."]} +{"86722298|206578365": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "With these short propagation distances, edge computing has the potential of realizing tactile-level latency for many latency critical applications that may require tactile speed with latency approaching 1ms [29]."]} +{"86722298|9495329": ["The virtual resources of network virtualization share many common elements in notions and interchangeably terms with SDN [53]."]} +{"86722298|3818445": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "Nonetheless, its security and privacy are signi\ufb01cant challenges, due to the interplay of heterogeneous edge nodes and the migration of services across edge nodes [5].", "Nonetheless, its security is a signi\ufb01cant challenge [5], [30], [31].", "These promised gains make it a key technology for realizing various visions for next-generation Internet, such as IoT [5] and Tactile Internet (with millisecond-scale reaction time) [28]."]} +{"86722298|3434731": ["Therefore, the integration of blockchain and edge computing into one system becomes a natural trend [6]\u2013[8].", "The sidechain scheme permits developers to connect new sidechains to the mainchain (e.g., Ethereum) with to-and-from transferring of the ledger assets [6]."]} +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"13746346|27262729": ["Since permissionless blockchain networks admit no identity con-trol, they can be vulnerable to a series of insider attacks by malicious consensus nodes [6].", "Among different types of attacks, double spending [7] is the most fundamental one and can be executed through various attacks such as gold\ufb01nger attacks, netsplit attacks and brute-force attacks [6]."]} +{"47011238|18372496": []} +{"206456796|27262729": ["This consensus mechanism guarantees the security and dependability of blockchain systems [4], [5].", "The core point to guarantee transaction integrity and validity in blockchain is a computational process defined as mining [4], [5]."]} diff --git a/edge/graph_13178381.jsonl b/edge/graph_13178381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3a3fcb6b84ece6613d5c838b21d6ba42d2509f5 --- /dev/null +++ b/edge/graph_13178381.jsonl @@ -0,0 +1,3 @@ +{"1758645|8280144": ["This is a suitable model for decentralized networks with nodes having substantial mobility [15]."]} +{"7447007|4395259": []} +{"9202826|8280144": ["The derivation of the secrecy transmission capacity involves two main steps: 1) Use the connection outage constraint \u03c3 to find the value of Rt. 2) Use the secrecy outage constraint\nto find the value of Re.", "The transmission capacity framework is used to characterize the area spectral efficiency of secure transmissions with constraints on both the quality of service (QoS) and the level of security."]} diff --git a/edge/graph_13178821.jsonl b/edge/graph_13178821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34f5ee241799cdd664299be1a6a0aeb199c74195 --- /dev/null +++ b/edge/graph_13178821.jsonl @@ -0,0 +1,10 @@ +{"12754054|16082889": []} +{"18777214|27527196": ["Parameters that are optimized with respect to the validation accuracy include the connection point distance D \u2208 {3, 5, 7, 9} for graph-based representation, the deletion and insertion cost Cn, Ce \u2208 {0, 0.4D, 0.6D, . . . , 1.4D} of the graph edit distance, and the number of Gaussian mixtures G \u2208 {1, 2, . . . , 30} of the HMM. Optimal parameter values are adopted from previous studies [8] conducted with the approximate edit distance s.", "In this paper, we employ hidden Markov models (HMM) [6] for word recognition.", "On the historical Parzival database it was demonstrated for an HMMbased word recognition task that a speedup factor of 12.9 could be achieved without significant loss in accuracy.", "For a single word recognition task with graph similarity features and HMMbased recognition (see Section 2), the similarity function h\u2032\u2032 obtained from the modified Hausdorff distance is compared with the Hausdorff distance h, its variant h\u2032, and the approximate edit distance s (see Section 3).", ", hidden Markov models [6] and recurrent neural networks [7]."]} +{"6988903|15782139": ["C[1, 1] = Dist[tIC1 , t T C1 ], C[1, 2] = Dist[tIC1 , t T C2 ], C[2, 1] = Dist[tIC2 , t T C1 ], C[1, 3] = Dist[tIC1 , t T C3 ] (9) The minimum one of the above four values is selected as the start point of the searching path.", "Online signature verification can be a strong candidate to provide high security for identification [2]."]} +{"12731573|987239": ["Relying on the general concept of graph-based shape retrieval (see [26] for an overview), they consist of attributed nodes representing rooms and their associated geometric properties like floor area or room type."]} +{"18031822|17133230": ["Graham and Kennedy used directed acyclic graphs to agglomerate multiple trees [28] and also provide a comprehensive survey of work on in the area of visualizing multiple trees [29]."]} +{"18031822|2593345": ["These demand some aggregation to allow scalable analysis [20]."]} +{"18031822|239537": ["There has been substantial work in the area of graph visualization, including layout algorithms, methods for visualizing large graphs, and techniques for interacting with them [31, 47]."]} +{"35758164|13178821": []} +{"1514951|192934": []} +{"4850944|60779308": []} diff --git a/edge/graph_131815035.jsonl b/edge/graph_131815035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc974c8083c29dab9d82f56fff969487acef360c --- /dev/null +++ b/edge/graph_131815035.jsonl @@ -0,0 +1,16 @@ +{"1209682|700123": ["The selection of textile materials for the development of antennas is critical, as discussed in [14].", "The wearable antennas should be thin, lightweight, of easy or no maintenance, robust, and resistant to washing cycles and usage and, moreover, must be low cost for manufacturing and commercializing [14]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"734620|20905429": []} +{"136396598|700123": []} +{"135693087|700123": []} +{"117614696|700123": ["In order to improve the wearable antenna performance, it is essential to evaluate the dielectric properties of the substrate textile materials and the conductivity of the yarns, and to optimize the manufacturing techniques.(3) Typically, low dielectric constant (\"r) substrate textile materials are preferred to minimize surface waves and improve the antenna bandwidth."]} +{"115153757|700123": []} +{"21607616|700123": ["01 both estimated based on fitted simulation results, which broadly agree with the measured values for cotton textiles in [32], [33]."]} diff --git a/graph_3821646.jsonl b/edge/graph_13181649.jsonl similarity index 100% rename from graph_3821646.jsonl rename to edge/graph_13181649.jsonl diff --git a/edge/graph_131819060.jsonl b/edge/graph_131819060.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc48f0bf80841ae9a6290630efeb8683497d7cf3 --- /dev/null +++ b/edge/graph_131819060.jsonl @@ -0,0 +1,19 @@ +{"20127523|14422660": ["Nevertheless, interested readers could refer to [6] surveying data hiding for VoIP-based applications in a more general and comprehensive manner."]} +{"20127523|15247126": ["Asit is usually done in the literature (see, e.g., [1, 2]), in the following, we characterize stegVAD in terms of steganographic bandwidth, undetectability, and robustness.", "To this aim, possible carriers are: unused fields available in the protocol headers, some statistics of the traffic such as the inter-packet time or the throughput, as well as the volume produced by a specific set of applications or protocols [1].", "For the case of network steganography, the presence of a covert channel could be revealed by anomalies such as incoherent protocol behaviors, inflated data volumes or uncommon timing statistics [1, 2].", "Asregards the usage of steganographic techniques to create network covert channels, [1] discusses how the process mutated during the years, e.g., from secrets injected into unused fields of the IP header, to sophisticated cloud-based mechanisms. work [2] surveys techniques targeting modern\u2026", "In addition, the availability of a rich literature on multimedia analysis for detecting artifacts (see, e.g., [1, 2] and references therein) requires to completely preserve the overall quality of the conversation."]} +{"32791891|15098718": ["The first category utilizes the specific protocols of VoIP as the carriers and embeds secret messages into unused or optional fields of protocol headers [13\u201315] or by modulating inter-packet times (packet rates) [16\u201318], while the other one employs the payloads as the carriers and conceals secret messages into the redundant parts of digital speech signals."]} +{"32791891|14422660": ["That is to say, it can be applied in the presence of all speech codecs used in VoIP, in that steganography in speech streams encoded by various codecs is feasible [9].", "More recently, a novel dynamic steganographic cover, Voice over Internet Protocol (VoIP, also named IP telephony), has attracted increasing attention [6\u201312], which possesses three main", "Among them, because of its relatively high capacity and low complexity, LSB steganography has gained the most attention [8,9,11].", "For more details we refer the interested reader to an up-to-date comprehensive survey given by Mazurczyk [9]."]} +{"32791891|9176080": []} +{"110288|14422660": ["Such censorship is often performed in repressive regimes, where the government wants to prevent citizens from freely accessing the Internet.", "However, the underlying idea of providing unobservability [30] (i.", "To overcome the restrictions of Internet censorship, several circumvention schemes have been proposed; [30] provides an overview.", "In response, di\ufb00erent kinds of censorship circumvention systems were developed in the last years that enable unrestricted access to the Internet [9,11,12,18,20,29,30].", "In di\ufb00erent parts of the world, Internet Service Providers (ISPs) perform censorship to \ufb01lter certain content and pro-hibit users from accessing speci\ufb01c information.", "In response, different kinds of censorship circumvention systems were developed in the last years that enable unrestricted access to the Internet [9,11,12,18,20,29,30].", "Those systems have in common that they embed the hidden messages in cover traffic that censors cannot block in practice since such blocking would have significant side-effects (so-called unblockability [30]).", "VoIP allows for exchanging audio and video data between communication parties over the Internet."]} +{"41207145|14422660": ["Compared with traditional carriers, VoIP has many specific advantages, such as instantaneity, large volume of carrier data and flexible conversation length [2], [3], and is thereby widely deemed a promising vehicle for covert communications [2]\u2013[5].", "In recent years, with the increasing popularity of Voice over IP (VoIP, also called IP telephony), hiding information into VoIP streams has become a new hotspot [2]\u2013[5].", "2659718 the research community in the past years [2]\u2013[4].", "So far, extensive research has been conducted on VoIP-based steganography, which generally falls into two categories [2], [3]: approaches stemmed from protocol steganography and ones by means of payload modification."]} +{"56755301|15098718": ["Mazurczyk and Lubacz et al. [10,11], Druid [12] and Kratzer et al. [13] developed various methods of hiding data in VoIP streams, suggesting synchronization mechanisms between the sending party and the receiving party.", "\u2026using RTP header fields as cover objects [4], PCM-LSB , e is the hiding feature using the lowest bit position in PCM code as cover objects [5,6,11,19,20], G.723.1-LSB e is the hiding feature using G.723.1 compression parameters as cover objects [7], is the hiding feature using G.729A\u2026"]} +{"56755301|15540889": []} +{"56755301|15247126": ["For example, in [1 \u2013 3] researchers studied ways to hide data by means of TCP/IP protocols, suggesting headers substitu-tion-based algorithms for hiding data in unused header fields."]} +{"13949269|14422660": []} +{"32082609|14422660": []} +{"6942509|14422660": ["Next, in Sections V and VI we will describe the experiments and their results, which will be followed by Section VII that will conclude the paper."]} +{"11603402|15098718": ["\u2026based on VoIP has two main categories: the first one employs the specific (unused or optional fields of) protocols of VoIP as the carriers to hide secret messages, or conceal secret messages by modulating inter-packet times (packet rates) [4-5]; the other one uses the payloads as the carriers\u2026"]} +{"11603402|14422660": ["More recently, Voice over Internet Protocol (VoIP), which is a new dynamic cover for steganography, has attracted increasing attention [3]."]} +{"13633911|15540889": []} +{"13633911|15247126": []} +{"17087762|14422660": []} +{"206896786|14422660": ["The inerested reader could also refer to a recent exhaustive survey given by azurczyk [5] for more details.", "011 unication and also make VoIP-based steganography even harder o detect [5].", "In virtue of these advanced characteristics, VoIPased steganography provides an effective solution for secure covert ommunication [5]."]} diff --git a/edge/graph_131825078.jsonl b/edge/graph_131825078.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..426bf876f54402d80dbc7cbc8bd68d3acc31b211 --- /dev/null +++ b/edge/graph_131825078.jsonl @@ -0,0 +1 @@ +{"46598143|194321": []} diff --git a/graph_3827930.jsonl b/edge/graph_13187484.jsonl similarity index 100% rename from graph_3827930.jsonl rename to edge/graph_13187484.jsonl diff --git a/graph_383108.jsonl b/edge/graph_13188945.jsonl similarity index 100% rename from graph_383108.jsonl rename to edge/graph_13188945.jsonl diff --git a/graph_38476.jsonl b/edge/graph_13193330.jsonl similarity index 100% rename from graph_38476.jsonl rename to edge/graph_13193330.jsonl diff --git a/graph_385243.jsonl b/edge/graph_131945630.jsonl similarity index 100% rename from graph_385243.jsonl rename to edge/graph_131945630.jsonl diff --git a/graph_387610.jsonl b/edge/graph_13195667.jsonl similarity index 100% rename from graph_387610.jsonl rename to edge/graph_13195667.jsonl diff --git a/edge/graph_132053537.jsonl b/edge/graph_132053537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56262b73fb439519b08c5ec4a04d5cb177c36805 --- /dev/null +++ b/edge/graph_132053537.jsonl @@ -0,0 +1,2 @@ +{"16915526|15563159": []} +{"1873829|18232089": ["Despite the fact that sense-annotated corpora for a number of languages have been around for more than a decade (Petrolito and Bond, 2014), they either include few samples per word sense, or only cover a restricted set of ambiguous words (Passonneau et al., 2012); as a result, multilingual WSD was\u2026"]} diff --git a/edge/graph_132081297.jsonl b/edge/graph_132081297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..572e748fb59c0a9a8516163abbadae578c9ff91d --- /dev/null +++ b/edge/graph_132081297.jsonl @@ -0,0 +1,5 @@ +{"19507467|12098072": ["E LECTRICAL machines equipped with permanent magnets (PMs) can produce a larger torque density and exhibit higher efficiency [1], [2]."]} +{"60552596|18985591": []} +{"60552596|17774971": []} +{"27864627|17774971": ["Table I compares the performance of T-NPC three-level topology with two-level topology and diode-clamped NPC (D-NPC) three-level topology [11]\u2013[13]."]} +{"266389|17774971": ["Also, standard topologies of the multilevel inverters, their advantages with respect to two-level inverters, pulsewidth modulation (PWM) control strategies, and applications are nowadays well understood [2], [3]."]} diff --git a/edge/graph_13210924.jsonl b/edge/graph_13210924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4766e028dba3d77a9256edc6843dcf029f9b54e1 --- /dev/null +++ b/edge/graph_13210924.jsonl @@ -0,0 +1 @@ +{"11875067|7971188": ["The performance metrics for evaluating a DHT include fault-tolerance, load-balancing, efficiency of look-ups and inserts, and proximity awareness [ 23 ]."]} diff --git a/edge/graph_132150752.jsonl b/edge/graph_132150752.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b54e7acb63f527812d71cf8c585717028a460981 --- /dev/null +++ b/edge/graph_132150752.jsonl @@ -0,0 +1,2 @@ +{"14283205|16665885": ["This trend seems continuing and more applications areas would benefit from the advancements of the technologies and data sources (Blaschke et al., 2011; Weng, 2011)."]} +{"14283205|10859746": ["The early RS data had limited spatial, spectral and temporal resolutions which were the major cause of the limitation in RS based change detection methodologies (Boyd and Foody, 2011).", "The higher spatial resolution is also linked to the mixed pixel problem, which is considered as one of the largest source of error and uncertainty in land cover CD (Boyd and Foody, 2011)."]} diff --git a/graph_3886594.jsonl b/edge/graph_13215297.jsonl similarity index 100% rename from graph_3886594.jsonl rename to edge/graph_13215297.jsonl diff --git a/edge/graph_13215551.jsonl b/edge/graph_13215551.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b66bd295a5ec98a00e9d1718cbf08364087b0b04 --- /dev/null +++ b/edge/graph_13215551.jsonl @@ -0,0 +1,9 @@ +{"1002750|1437067": ["In rule classifier systems there are two distinct approaches to individual or particle representation: the Michigan and the Pittsburgh approaches [11]."]} +{"14074696|1708582": ["The process is then iterated."]} +{"990486|205286236": []} +{"990486|9141490": []} +{"990486|63137": ["\u2026ACO algorithms and probabilistic learning algorithms such as the stochastic gradient ascent and the cross-entropy method; \ufb01nally, Zlochin et al. [160] have proposed a unifying framework for so-called model-based search algorithms that allows a better understanding of what are the important\u2026"]} +{"7692424|1097238": ["The diversity of the component classifiers is very important in ensemble approaches, because component classifiers must make different errors to make the overall ensemble more accurate [5], [1].", "Recall that to make an effective ensemble it is very important that the component classifiers be diverse, even if at the expense of some accuracy [34], [5], [1]."]} +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"27997474|192934": ["In order to make possible the visual exploration of high-dimensional data, dimensionality reduction techniques deal with the transformation of high dimensional space into a two- or three-dimensional map, while retaining most of its meaningful structure (Jain et al. 2000)."]} +{"7847316|18782652": ["Rule pruning is a commonplace technique in data mining [3].", "tually, there are several classification-rule discovery algorithms that were explicitly designed to improve rule set simplicity, even at the expense of reducing the predictive accuracy [1], [3], [4]."]} diff --git a/edge/graph_132159698.jsonl b/edge/graph_132159698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..87c2e73478f8a2f5235305ea1e0ea2c7dc18cdbe --- /dev/null +++ b/edge/graph_132159698.jsonl @@ -0,0 +1,5 @@ +{"195926962|6959212": ["So, how to effectively evaluate the comprehensive performance and choose one or hybrid appropriate communication networks used in smart electricity information acquisition system is one of the important issues concerned by the power management departments [9-10]."]} +{"34719723|627405": ["Brereton et al \n(2007) was one of the first papers that commented on issues connected with performing SLRs and many such \npapers have followed since covering topics such as: .", "EBSE requires a systematic and unbiased method of \naggregating empirical studies and has encouraged software engineering researches to undertake systematic \nliterature reviews (SLRs) of Software Engineering topics and research questions."]} +{"52298802|30102381": ["Many testbeds have been developed in various research institutes and companies [35]."]} +{"52298802|121289": ["However, on the other hand, the increasing dependency of smart grids on the cyber infrastructure also brings about system vulnerabilities to cyber-attacks [1]-[4].", "The vulnerable points in the cyber system of smart grids that can be used for performing cyber-attacks by corrupted personnel and unauthorized parties were summarized in [1] and [4]."]} +{"4040150|33077286": []} diff --git a/graph_3892110.jsonl b/edge/graph_13219647.jsonl similarity index 100% rename from graph_3892110.jsonl rename to edge/graph_13219647.jsonl diff --git a/edge/graph_13227763.jsonl b/edge/graph_13227763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a51e41a0f200a9c9fb74c00aec5adc387379d76 --- /dev/null +++ b/edge/graph_13227763.jsonl @@ -0,0 +1 @@ +{"9358297|13227763": []} diff --git a/graph_3892600.jsonl b/edge/graph_13227764.jsonl similarity index 100% rename from graph_3892600.jsonl rename to edge/graph_13227764.jsonl diff --git a/edge/graph_132289552.jsonl b/edge/graph_132289552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fc613ef5a8821416971f9f11dfa3b3637a3833d --- /dev/null +++ b/edge/graph_132289552.jsonl @@ -0,0 +1,6 @@ +{"11121463|2037989": ["Stage 4: Pupil Detection Owing to the hardware requirements referred to in the first stage, different methodologies were checked in this stage [29\u201331], although some of them were not able to be applied owing to hardware limitations."]} +{"5550363|4361938": ["Due to technological advances the eye tracking research is in the fourth era of progress distinguished by the emergence of interactive applications [1].", "Despite the progress on eye tracking technology, gaze location is not precise as pointing with a mouse because of noisy images, drifts, fovea [1]."]} +{"6250875|4361938": []} +{"18903040|4361938": ["Since Bolt [5] introduced the possibility of using the eyes in multimodal interfaces more than 25 years ago, lots of researchers have explored the feasibility of eye-based interactions in the field of human-computer interaction (HCI) [14, 6].", "Researchers in the HCI field have proposed different multimodal systems integrated with eye gaze input to overcome problems such as the \" Midas-Touch \" problem.", "Since Bolt [5] introduced the possibility of using the eyes in multimodal interfaces more than 25 years ago, lots of researchers have explored the feasibility of eye-based interactions in the field of human-computer interaction (HCI) [14] [6]."]} +{"11068878|62198990": ["Other popular systems are gaze estimators based on measuring the electro-oculographic potential or corneal reflections [20, 32, 46, 52\u201354]."]} +{"1028698|62198990": ["3 Such systems determine gaze direction by comparing the pupil position in an image of a user's eye with the light pattern that occurs when incident light is reflected from the convex surface of the cornea [8]\u2013[10]."]} diff --git a/graph_3898063.jsonl b/edge/graph_13229921.jsonl similarity index 100% rename from graph_3898063.jsonl rename to edge/graph_13229921.jsonl diff --git a/edge/graph_13231279.jsonl b/edge/graph_13231279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77926a97e98513d8df9f52b8edc9d014d1a86778 --- /dev/null +++ b/edge/graph_13231279.jsonl @@ -0,0 +1,2 @@ +{"9365379|385243": []} +{"10523453|6464919": []} diff --git a/edge/graph_132350371.jsonl b/edge/graph_132350371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f2430b25b8e80e7ab88924ea435fa2862a6c08b --- /dev/null +++ b/edge/graph_132350371.jsonl @@ -0,0 +1,14 @@ +{"9666028|17205659": ["Assaults in WSNs don't simply include the bundles' adjustment; enemies can likewise infuse extra false parcels [3]."]} +{"28282671|5002530": ["Mobile WSNs are useful for applications like adaptive sampling, improving network connectivity of static sensor deployment and event detection (Ren et al., 2011)."]} +{"28282671|6396569": ["In mobile WSNs, mobility plays a key role in the execution of the application (Amundson and Koutsoukos, 2009) as the introduction of mobile entities can resolve some problems and offer many advantages over the static WSNs like the integration of mobility in WSN can improve the coverage and utility of the sensor network deployment and enables more versatile sensing applications as well.", "Figure 1 An MWSN that monitors wildfires (Amundson and Koutsoukos, 2009) (see online version for colours)"]} +{"28282671|1230643": [", 2008; Akyildiz et al., 2002). The open nature and unattended operations of WSNs are the factors which demand security for sensor networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments (Shi and Perrig, 2004). WSNs are susceptible to a wide variety of attacks and according to Zhu et al. (2012) attacks on WSNs are classified into two types: application dependent attacks and application independent attacks.", "These sensor nodes are smart low power devices equipped with one or more sensors, a processor, memory, a power supply, a radio and an actuator (Yick et al., 2008; Akyildiz et al., 2002).", "The prime difference between static and mobile WSNs is that mobile nodes are able to reposition and organise themselves in the network and after initial deployment the nodes spread out to gather information (Yick et al., 2008; Akyildiz et al., 2002)."]} +{"208744|14650419": ["Bu [100] describes a feasible idea based on slotted Aloha [120], [121] (Figure 8).", "[105] suggest a hybrid design based on slotted Aloha and breadth-first tree traversal [121], [124] (Figure 10)."]} +{"208744|180217": []} +{"208744|1842882": ["Note that RFID authentication is a much broader area [1], [75]\u2013[77], albeit not all authentication protocols bear anticloning in mind [57], [58]."]} +{"208744|2357830": ["Continuous growth of RFID thus solicits solutions against security and privacy issues raised by RFID applications [1].", "Note that RFID authentication is a much broader area [1], [75]\u2013[77], albeit not all authentication protocols bear anticloning in mind [57], [58]."]} +{"208744|206583375": ["lives, RFID tags deliver applications like human tracking [4], object monitoring [5]\u2013[7], mobile payment [8], and"]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"42553000|5258936": []} +{"39275105|15199849": ["Authentication and encryption techniques can hinder an outsider from starting a Sybil attack on the sensor network [21]."]} +{"39275105|17205659": ["Cryptography is mainly the current solution to these types of attacks [23]."]} +{"33644397|206584087": ["These features, as we will analyze later, make routers and gateways a popular choice to launch DoS attacks [2], [3]."]} diff --git a/edge/graph_132457341.jsonl b/edge/graph_132457341.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc8886a40364ee786d908148e41727da256dafd6 --- /dev/null +++ b/edge/graph_132457341.jsonl @@ -0,0 +1,15 @@ +{"15472226|64404": ["Decoder-sided HEVC Quantization Parameter Esti- mation We also tested the proposed method on the problem of decoder-sided estimation of the quantization parameter in image and video forensics.", "For compression we choose the BPG image format [17], that is based on a subset of coding tools of the Main 4:4:4 16 Still Picture Profile [18] of HEVC [19].", "The network architecture is also evaluated in the context of decoder-sided estimation of the quantization parameter in High Efficiency Video Coding (HEVC) relevant in image forensics [8] and also here achieve a considerable prediction performance."]} +{"15472226|9415965": ["The network architecture is also evaluated in the context of decoder-sided estimation of the quantization parameter in High Efficiency Video Coding (HEVC) relevant in image forensics [8] and also here achieve a considerable prediction performance."]} +{"10512190|393948": [", by training a restricted Boltzmann machine or an autoencoder [4] with convolutional layers.", "By contrast, deep-learning models employ multiple levels of linear and nonlinear transformations to generate highly general data representations, thereby greatly decreasing dependence on the selection of features, which are often reduced simply to raw pixel values [2], [4].", "A more complicated model, such as a multilayer perception or recurrent NN [4], could also be used for aggregation [Figure 4(d)]."]} +{"12578656|192934": ["As far as classifiers are concerned, we decide to cover the three different classification families described by Jain et al. (2000): probabilistic, geometric and tree-based."]} +{"23133771|9045232": ["a generic retinal image quality estimation system that employed just noticeable blur (JNB), an HVS characteristic [16], combined with texture features [17]."]} +{"23133771|192934": ["Instead of finding an explicit template, implicit templates were utilized later on [10], including machine learning techniques such as the distance threshold of the k-Nearest Neighbours Classifier [18], support vectors embedded in a Support Vector Machine (SVM) [19], or weights in a Neural Network [20]."]} +{"11654786|393948": ["First, making the network deeper will raise the learning capacity significantly [1]."]} +{"7885416|18263962": ["T. Wiegand is with the Fraunhofer Heinrich Hertz Institute (Fraunhofer HHI), 10587 Berlin, Germany and with the Image Communication Laboratory, Berlin Institute of Technology, 10587 Berlin, Germany (e-mail: twiegand@ieee.org).\nfor evaluation is expensive, slow and cumbersome."]} +{"7011750|64404": []} +{"54948323|44132017": []} +{"54948323|14545307": []} +{"13088241|393948": ["One way to overcome the absence of ground truth targets is to utilize unsupervised learning, such as restricted Boltzmann machines and autoencoders [23]."]} +{"206813484|12562564": ["A document quality prediction system can be used in many practical applications [1]."]} +{"1334960|387610": ["The focus of this paper is the automatic detection of visually salient regions in images, which is useful in applications such as adaptive content delivery [22], adaptive region-of-interest based image compression [4], image segmentation [18, 9], object recognition [26], and content aware image resizing [2]."]} +{"17443268|12562564": ["For fast sharing among different devices, it is important to acquire, compress,\nManuscript received November 4, 2014; revised March 10, 2015 and May 25, 2015; accepted July 28, 2015."]} diff --git a/graph_3900204.jsonl b/edge/graph_132529056.jsonl similarity index 100% rename from graph_3900204.jsonl rename to edge/graph_132529056.jsonl diff --git a/graph_392830.jsonl b/edge/graph_1325672.jsonl similarity index 100% rename from graph_392830.jsonl rename to edge/graph_1325672.jsonl diff --git a/graph_393825.jsonl b/edge/graph_13264062.jsonl similarity index 100% rename from graph_393825.jsonl rename to edge/graph_13264062.jsonl diff --git a/graph_3942371.jsonl b/edge/graph_13268141.jsonl similarity index 100% rename from graph_3942371.jsonl rename to edge/graph_13268141.jsonl diff --git a/edge/graph_132694257.jsonl b/edge/graph_132694257.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92cae5b76e5d7de951a1772eac91f80da0e4f05b --- /dev/null +++ b/edge/graph_132694257.jsonl @@ -0,0 +1,26 @@ +{"3642817|9928823": []} +{"3257099|10175374": ["This uni\ufb01ed network is an instance of multi-task architectures (Ruder, 2017), since the model is optimised to perform two tasks at once, namely predicting whether the domain is malicious, and which malware it comes from."]} +{"2262661|393948": ["DNN has deep architectures\u2014including multiple hidden layers\u2014and each hidden layer alone conducts a non-linear transformation from the previous layer to the next [29,30]."]} +{"3502091|12594004": ["The domain of using machine learning (speci\ufb01cally anomaly detection) for implementing NIDSs was extensively researched in the past [13], [14], [15], [16], [17]."]} +{"49866160|2340740": ["[8] present the formal formulation of Malicious URL Detection as a machine-learning task and"]} +{"49866160|12815020": []} +{"1764821|18977370": ["From a methodological point of view, intrusion detection systems can also be clas-si\ufb01ed into two classes (Jyothsna et al., 2011): signature-based and anomaly-based."]} +{"58669786|15273230": ["The techniques we employed on CIDDS-001 to handle imbalanced class distributions, include the following [9]: 1) up-sampling the minority class [9], [10]; 2) down-sampling the majority class [9], [10]; 3) spread subsample [9], [10]; 4) class balancer In our experiments, we apply the synthetic minority reconstruction technique (SMRT) using variational autoencoder (VAE) as a classifier with only the original class distribution of CIDDS-001."]} +{"46847954|393948": ["In this paper, we propose a network intrusion detection model by stacking dilated convolutional autoencoders which actually combines the concepts of self-taught learning [6] and representation learning [7]."]} +{"1033682|174797842": []} +{"22701194|11381530": ["A Convolutional Neural Network (CNN), is a specialised architecture of ANN that employs a convolution operation in at least one of its layers [20] [21]."]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"9302624|10996225": ["Machine learning has been applied to malware detection at least since [25], with numerous approaches since (see reviews [12, 17])."]} +{"3720713|29145577": ["According to the difference of ISO/OSI layer, traffic encryption techniques can be divided into application layer encryption, presentation layer encryption and network layer encryption [2].", "[2] on 26 papers about encrypted traffic classification in the 2005-2015 period, 12 papers use flow features, while 5 papers use packet features, 7 papers use the combination of flow and packet features and 2 papers use other features.", "There are two main types of features which are most frequently used by those researches [2]: flow features (e.", "[2] on 26 papers about encrypted traffic classification in the 2005-2015 period, only 6 papers used public dataset."]} +{"32098729|12595430": ["Nowadays intrusion detection includes analysis of big data, which is defined as one of the challenging research topic where conventional computing technologies cannot deal with the huge volume of data [4], [5]."]} +{"3725747|393948": ["Representation learning is a new rapidly developing machine learning approach in recent years that automatically learning features from raw data and to a certain extent has solved the problem of hand-designing features [4]."]} +{"14342975|6430931": ["As lots of machine learning methods such as Neural Network [3], Fuzzy Logic [4, 5], and Hidden Markov Model [6] have made great achievements in IDS."]} +{"3824585|11381530": ["In computer networks, anomaly detection has been a subject of study for decades, and many approaches have been explored [12], [15] while the deep learning perspective has received special attention in recent years [16]."]} +{"3824585|5538934": ["A complete survey dealing with solutions to quickly classify collected network flows and detect attacks, or malicious code, can be found in [9]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"8407788|6430931": ["In particular, Swarm Intelligence techniques [66], Markov Chain [67] based ones as well as other soft computing methods [68] seem to possess desirable characteristics in"]} +{"49656174|5538934": ["Competent adversaries use novel strategies to evade detectors based on machine learning algorithms [5].", "For example, papers such as [4] and [5] discuss ML methods for two cyber security problems, but they do not consider the different training and testing environments of the analysed works.", "Other academic papers compare ML solutions for cyber security by considering one specific application (e.g.: [4], [3], [5]) and are typically oriented to Artificial Intelligence (AI) experts rather than to security operators.", "DBN [13] SAE [14] Unsupervised Clustering [29] Association [30] Unsupervised Clustering [5] RF [19] NB [19] SVM [19] LR [20] KNN [21] SNN [22] Botnet Clustering [31] RF [23] HMM [23] DGA FNN [10] CNN [11] RNN [12] DBN [15] SAE [16] Clustering [24] Association [32] RF [24] NB [24] SVM [24] LR [24]\u2026", "We also consider recent results emphasizing the effectiveness of adversarial attacks [6] [5] in evading ML detectors."]} +{"49656174|12595430": ["[39] R."]} +{"49656174|14774186": []} +{"49656174|17157304": ["For example, papers such as [4] and [5] discuss ML methods for two cyber security problems, but they do not consider the different training and testing environments of the analysed works.", "Other academic papers compare ML solutions for cyber security by considering one specific application (e.g.: [4], [3], [5]) and are typically oriented to Artificial Intelligence (AI) experts rather than to security operators."]} diff --git a/graph_3957028.jsonl b/edge/graph_13277694.jsonl similarity index 100% rename from graph_3957028.jsonl rename to edge/graph_13277694.jsonl diff --git a/edge/graph_13278753.jsonl b/edge/graph_13278753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df4ed66a99d01dfcb156b922cc1f7c7f49324c40 --- /dev/null +++ b/edge/graph_13278753.jsonl @@ -0,0 +1 @@ +{"18808003|1230643": ["Nodes are capable of self-organizing into a collaborative network, and subsequently benefit from spatial diversity through data sharing and multi-hop connectivity [1], [2]."]} diff --git a/graph_3963000.jsonl b/edge/graph_13282374.jsonl similarity index 100% rename from graph_3963000.jsonl rename to edge/graph_13282374.jsonl diff --git a/edge/graph_13287576.jsonl b/edge/graph_13287576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..420665485e0a76c02026acd2f8fce826194938d9 --- /dev/null +++ b/edge/graph_13287576.jsonl @@ -0,0 +1,3 @@ +{"15283798|12663580": ["The SVM is already known as the best learning algorithm for binary classi\ufb01cation [5,6,12,17,20,23,28,37,40,42].", "The SVM, originally a type of pattern classi\ufb01er based on a statistical learning technique for classi\ufb01cation and regression with a variety of kernel functions [12,23,37,42], has been successfully applied to a number of pattern recognition applications [6]."]} +{"3094246|14081693": ["Distributed management organizational models [9], [22], addressed these issues, but failed to address the critical issue of how to use collected statistics."]} +{"18184945|192934": ["Detailed descriptions of the back-propagation algorithm can be found in [4][9].", "RBF networks have been proven to be universal approximators and have the properties of fast convergence, easy solution to regularization, and robustness to outliers [4]."]} diff --git a/edge/graph_13292799.jsonl b/edge/graph_13292799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9957877bfb410d811508bb0a38f04d1964deae4e --- /dev/null +++ b/edge/graph_13292799.jsonl @@ -0,0 +1,40 @@ +{"26234961|26257441": ["Surrogate models are approximate techniques to construct response surface models, or metamodels [ 22 ]."]} +{"14892779|1236072": ["GRASS embodies optimal (exact) as well as heuristic approaches to find the minimum number of aggregation points while routing data to the BS such that the network lifetime is maximized."]} +{"14892779|1230643": ["Wireless Sensor Networks (WSNs) is a class of wireless ad hoc networks in which sensor nodes collect, process, and communicate data acquired from the physical environment to an external Base-Station (BS) [1].", "A major technical challenge for WSNs, however, lies in the node energy constraint and its limited computing resources, which may pose a fundamental limit on the network lifetime [1]."]} +{"13544858|1230643": ["The key applications of WSN are habitat monitoring, target tracking, surveillance, and security management [1] [2]."]} +{"16933217|1230643": ["Wireless sensor networks have been considered in many potential applications, such as surveillance, biolog cal detection, and traffic, pollution, habitat, and civil infra structure monitoring [2, 3, 6, 11, 13]."]} +{"10096622|12817488": ["PSO algorithms for WSN localization are summarized in Table I."]} +{"13997318|8530790": []} +{"14471312|1236072": ["Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities [1]."]} +{"14471312|1230643": ["Also, nodes have to operate unattended, causes node localization problem, because it is impossible to service a large number of nodes in remote and possibly inaccessible locations like mountains, sea and mine, and remote geographic areas [12]-[14]."]} +{"40995300|205286988": []} +{"40995300|1230643": []} +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"15019605|1230643": ["Due to the node\u2019s limited power, data gathering protocols must minimize energy consumption [1]."]} +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6973519|1236072": ["Keyword; Energy Balance, WSN, Ant Colony Optimization, Energy Conservation\nI. INTRODUCTION Even though Sensor Nodes (SNs) may link directly to the processing sinks in the form of local area networks [1], extending these SNs to gather data and transmit them to central sink is more significant\u2026"]} +{"7453327|8953108": ["their relative quantitative performance analysis is presented in [5].", "The basic question is: how are the threshold levels determined? Many methods have been proposed in literature, a survey of which is presented in [5]."]} +{"19037104|1230643": []} +{"26135040|1230643": ["WSNs have been used in many applications, ranging from environmental and natural habitat monitoring, medical, industry and military applications [1-2]."]} +{"6342690|1940388": ["A review of security threats to WSNs and a survey of defense mechanisms is presented in [26]."]} +{"6342690|12817488": ["A survey of data aggregation algorithms used in WSNs is presented in [22]."]} +{"6342690|1230643": ["This scenario is used in most monitoring applications in agriculture [7], [8], microclimate [4], [5], [9] and habitat surveillance [10]\u2013[12], military operations [13], and disaster relief [14]."]} +{"6342690|1708582": ["RL [41], [42] is a sub-area of machine learning concerned with how an agent should take actions in an environment so as to maximize some notion of a long-term reward."]} +{"6342690|6555395": ["A survey of NN learning methods, their properties and applications is presented in [32]."]} +{"15208503|1236072": []} +{"15208503|1230643": ["A wireless sensor network (WSN) [1] [2] [3] is a special ad hoc network spatially deployed with a large number of autonomous nodes equipped with sensors to cooperatively monitor physical or environmental conditions."]} +{"30280928|1236072": ["Al-Karaki and Kamal in [2] classi\ufb01ed routing protocols based on network structure into \ufb02at, hierarchical and location-based ones."]} +{"3060863|1236072": ["The flooding technique [4]-[5] is used to establish a local routing table for each sensor node in the routing table establishment phase.", "Classic flooding is an old technique that can also be used for routing in sensor networks [4]-[5].", "There has been much research in the field of network layer protocols for wireless sensor networks, such as flooding [4]-[5], directed diffusion [6], sequential assignment routing [7], gradient-based routing [8] to mention a few.", ", nodes broadcast using the same transmission power level without any power control [4]-[8]."]} +{"2360798|1230643": ["UE to the recent advances in micro-electro-mechanical systems (MEMS) technology, wireless communications, and digital electronics, development of low-cost, low-power sensor nodes that are small in size and can communicate in short distances has become possible [1].", "Therefore, while traditional networks aim to achieve high quality of service (QoS) provisions, sensor network protocols must focus primarily on power conservation [1], [2]."]} +{"44006073|205286988": ["Although the capability of an individual sensor node is limited, a sensor network is usually able to perform bigger tasks through the collaborative efforts of a large number (hundreds or even thousands) of nodes that are densely deployed within the sensing field [1], [2], [3]."]} +{"44006073|1230643": ["Although the capability of an individual sensor node is limited, a sensor network is usually able to perform bigger tasks through the collaborative efforts of a large number (hundreds or even thousands) of nodes that are densely deployed within the sensing field [1], [2], [3].", "The transmission power dissipated by a sender node to transmit each bit of data to a receiver node greatly increases with the increase of the distance between the sender and the receiver [1], [2], [4], [6], [7], [8].", "Recent technological advances in the field of micro-electromechanical systems (MEMS) have made the development of tiny, low-cost, low-powered and multi-functional sensor nodes technically and economically feasible [1], [2].", "deployment of nodes by dropping them from helicopter/airplane or delivering them in artillery shell or missiles) [1], [2]."]} +{"12988235|7514463": ["A number of routing protocols have been developed for WSN which can be found in [15], [16], [17] and their references."]} +{"12988235|1230643": ["[1], [2]."]} +{"8671944|1230643": ["The key applications of WSN are habitat monitoring, target tracking, surveillance, and security management [1] [2]."]} +{"2698746|1230643": []} +{"207752995|10096622": ["As discussed in literature [18], PSO has provided optimization in several aspects of data aggregation as follows."]} +{"33202245|1230643": ["Their algorithm creates clusters with uniform size so that the distance between sensor member nodes and CHs is minimized; this minimization helps reduce the cost of transmission energy [1,9].", "But in all these fields, energy is the determining factor for the performance of wireless sensor networks [1]."]} +{"15371731|1230643": []} diff --git a/edge/graph_13295171.jsonl b/edge/graph_13295171.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..201e66a58637fc8908b2ef6645283a26fbe190c5 --- /dev/null +++ b/edge/graph_13295171.jsonl @@ -0,0 +1,3 @@ +{"19960046|3205677": []} +{"2271520|6611633": []} +{"17867133|582949": ["Power \u2248 B \u00d7 l 2 / A (2) This has the following consequences to system design [6] [16]: \u2022 Power consumed increases proportionally to the bit-rate, so as we move to ultrahigh-bandwidth links, the power requirements will become an increasing concern."]} diff --git a/graph_3968122.jsonl b/edge/graph_1329537.jsonl similarity index 100% rename from graph_3968122.jsonl rename to edge/graph_1329537.jsonl diff --git a/edge/graph_13295407.jsonl b/edge/graph_13295407.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5983730633295d3fc5dd0539c198c3ea63b54d9 --- /dev/null +++ b/edge/graph_13295407.jsonl @@ -0,0 +1,7 @@ +{"11444935|14441987": ["Since research on ad hoc routing began with packet radio networks, numerous protocols have been proposed [7]."]} +{"13416245|15300368": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"14137281|1230643": ["[1], wireless sensor networks present several limitations.", "9, 1] and the delay in the range [1, 50] ms.", "Similarly, the energy consumption between node s1 and node s is given by [1].", "They consist of a large number of tiny nodes, each node being regarded as a cheap computer deployed inside the phenomenon or very closed to it [1] to perform sensing, computation and communication."]} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"15165106|1236072": []} +{"14811849|10287248": ["There are two categories of multipath routing [ 4 ]."]} diff --git a/graph_1329644.jsonl b/edge/graph_1329644.jsonl similarity index 100% rename from graph_1329644.jsonl rename to edge/graph_1329644.jsonl diff --git a/edge/graph_13299749.jsonl b/edge/graph_13299749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..702cf611e2ab2dfcef6acce6890bcb48f8012aad --- /dev/null +++ b/edge/graph_13299749.jsonl @@ -0,0 +1,4 @@ +{"36176167|6430931": ["For explicit review of current development, refer to the recent review (Tsai, Hsu, Lin, & Lin, 2009; Wu & Banzhaf, 2010)."]} +{"121779402|3330313": ["Anomaly detection can be applied to many fields, such as credit card fraud detection, security systems, medical diagnosis, network intrusion detection, and information recovery [1, 2].", "c1 and c2 are acceleration constants, \u03c41 and \u03c42 are the random numbers between [0,1].", "This is similar to a semi-supervised recognition or detection task, which aims to define a boundary of normalcy [1, 21]."]} +{"45081771|6430931": []} +{"16864206|38476": ["We discuss feature selection in Section 8 and draw conclusions in Section 9."]} diff --git a/edge/graph_13301611.jsonl b/edge/graph_13301611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffc92819e51b9c0be04c71674ad1a0c07cb70e59 --- /dev/null +++ b/edge/graph_13301611.jsonl @@ -0,0 +1,6 @@ +{"18320|6116761": ["These tools allow the estimation of the so-called functional brain connectivity [16]."]} +{"14635907|16082889": ["Despite more than 30 years of handwriting recognition research [2], [3], [ 4 ], [5], developing a reliable, general-purpose system for unconstrained text line recognition remains an open problem."]} +{"14635907|15782139": []} +{"1721126|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs).", "Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"1721126|18782652": ["Breslow and Aha (1997) survey methods of tree simplification to improve their comprehensibility.", "Breslow and Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"206608942|9270553": ["Current systems can reach no more than 25 bits/min,1 even under optimal conditions [13]."]} diff --git a/edge/graph_13304449.jsonl b/edge/graph_13304449.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b29266c833cd59777413e6dbd3952fbf25dbb2c --- /dev/null +++ b/edge/graph_13304449.jsonl @@ -0,0 +1 @@ +{"67839528|6308019": []} diff --git a/edge/graph_133058343.jsonl b/edge/graph_133058343.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b608f01ac4b47d12bd32d889bacafdff34394d23 --- /dev/null +++ b/edge/graph_133058343.jsonl @@ -0,0 +1,9 @@ +{"6340275|192934": []} +{"9247797|15178364": []} +{"32588286|12815020": ["\u2026technique such as Fussy Logic (FL), Nave Bayse (NB) networks, K-Nearest Neighbor (KNN), Artificial Neural Network (ANN), Support Vector Machine (SVM), Logistic Regression (LR), etc. (Ahmed et al., 2016; Garcia-Teodoro et al., 2009; Ghorbani et al., 2009; Modi et al., 2013; Tsai et al., 2009).", "It is widely used in different fields and can be used in\nintrusion detection by selecting the appropriate network features to improve the IDS accuracy (Garcia-Teodoro et al., 2009; Modi et al., 2013).", "\u2026to cloud computing suffers from several types of attacks that can exploit systems vulnerabilities to reach a specific purpose, such as IP spoofing, Denial of Service (DoS), flooding, User to Root (U2R), Remote to Local (R2L), port scanning, probes, etc. (Ghorbani et al., 2009; Modi et al., 2013).", "To ameliorate the computational ability of ANNs and increase the intrusion detection accuracy, the number of hidden layers and neurons per layers should be increased (Modi et al., 2013)."]} +{"32588286|6430931": ["The evaluation criteria adopted by most of papers to assess the performance of their approaches are accuracy, detection rate (DR), and false positive rate (FPR) (Lin et al., 2015; Wu and Banzhaf, 2010)."]} +{"8297836|12894036": []} +{"45081771|6430931": []} +{"6813167|11894197": ["Furthermore, feature selection needs to be performed only once, after which different classifiers can be evaluated [1].", "One of the most basic and popular methods involves filters [1], which select the subset of features as a pre-processing step, independent of the chosen classifier.", "Some of the features will add little discriminatory power on top of previously selected features, although ranked relatively high individually [1,18]."]} +{"96191442|11894197": []} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} diff --git a/edge/graph_13310760.jsonl b/edge/graph_13310760.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3cf1cf992fb548869b8a4edf65199e400a31e58 --- /dev/null +++ b/edge/graph_13310760.jsonl @@ -0,0 +1,4 @@ +{"1622875|1236072": ["SAR [25] is one of the first protocols for wireless sensor networks that provide the notion of QoS routing criteria."]} +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"207181487|205286988": []} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} diff --git a/graph_1331167.jsonl b/edge/graph_1331167.jsonl similarity index 100% rename from graph_1331167.jsonl rename to edge/graph_1331167.jsonl diff --git a/graph_3968293.jsonl b/edge/graph_13317072.jsonl similarity index 100% rename from graph_3968293.jsonl rename to edge/graph_13317072.jsonl diff --git a/graph_396979.jsonl b/edge/graph_13320447.jsonl similarity index 100% rename from graph_396979.jsonl rename to edge/graph_13320447.jsonl diff --git a/graph_1333339.jsonl b/edge/graph_1333339.jsonl similarity index 100% rename from graph_1333339.jsonl rename to edge/graph_1333339.jsonl diff --git a/edge/graph_13337121.jsonl b/edge/graph_13337121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddd3cae2217225eeff81872a1ca7959d871690a0 --- /dev/null +++ b/edge/graph_13337121.jsonl @@ -0,0 +1,2 @@ +{"124379465|18689435": []} +{"166562104|14295689": []} diff --git a/edge/graph_13343447.jsonl b/edge/graph_13343447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..084b38d0d61fba499ca3576c95cfc81818e3b2cc --- /dev/null +++ b/edge/graph_13343447.jsonl @@ -0,0 +1,5 @@ +{"42764888|18050848": ["A significant progress however, has been made in independent processing of face only or voice only based authentication approaches (Chibelushi et al (2002), Pan et al (2000), Chaudari et. al.", "However, most of these state-of-the-art authentication approaches are based on independently processing the voice and face information and then fusing the scores \u2013 the score fusion (Chibelushi et al (2002), Pan et al (2000), Chaudari et. al."]} +{"30166626|7788290": ["For example, silhouette features are commonly used in human motion recognition [14,15,16]."]} +{"1236102|9045232": ["A survey of face detection methods using landmarks is given in [1] and [17].", "\" Challenges in face detection generally comprise varying illumination, expression changes, (partial) occlusion, pose extremities [1], and requirements on real-time computations.", "When attempting to detect faces (or locate a single face) in a visual representation, image-based and landmark-based methods may be primarily distinguished between [1] and [2]."]} +{"1087857|5171123": ["Such systems include face recognition systems for gate control applications [1] or facial occlusion detection built inside the automated teller machines (ATMs) [2]."]} +{"18678873|53680608": ["KEYWORDS: Biometrics Technology, Live Face Detection, Fourier Spectra"]} diff --git a/graph_1334629.jsonl b/edge/graph_1334629.jsonl similarity index 100% rename from graph_1334629.jsonl rename to edge/graph_1334629.jsonl diff --git a/edge/graph_133481997.jsonl b/edge/graph_133481997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc2a31530be97bc117ab914efae1a6fe39891e83 --- /dev/null +++ b/edge/graph_133481997.jsonl @@ -0,0 +1,9 @@ +{"126391310|6577460": []} +{"107036928|627405": ["Electronic Libraries We chose the digital libraries for scientific literature that have been recognized as high valuable sources of papers in software engineering [12] [13] [14]: ACM Digital Library, IEEE Xplore Digital Library, ScienceDirect, Scopus, Web of Science.", "We ensure also the depth of our research by investigating for primary studies in the most accessed and complete scientific forum for scientific publications [11][12][13][14]."]} +{"49540725|1229096": ["Path planning can be defined as: provided a mobile base and a model of its environment, generating a dynamic feasible path with cluttered obstacles that connects a valid given start and goal configuration with optimal indexes such as minimum distance, away from obstacles, minimum run time, maximum speed and minimum energy consumed [1]."]} +{"65212933|4680026": ["According to the mastery degree of the knowledge about space environment that robots have obtained, the path planning of obstacle avoidance can be divided into global path planning, based on the complete prior information, and local path planning, based on the information obtained by sensors.(5) Generally, the real-time information provided by sensors helps to know the location of the robot itself and the obstacles nearby, which are used for real-time path planning."]} +{"36510460|18315024": ["Both surveys [66], [67] focus on RRT and PRM for computational biology and physics-based simulation and modeling.", "In computational biology, molecules and proteins are modeled as articulated bodies and sampling based planners are used to simulate protein folding and protein-ligand interactions [66], [67]."]} +{"7306633|18315024": ["Beyond robotics, the sampling-based motion planners have been successfully applied in computational biology in studies related to protein folding [3], [1], [6], [2], [31], [26], [33], [18], ligand docking [6], [22], [25], or analysis of loop motions [7]."]} +{"10886602|36510460": ["For each algorithm, GO sampling was compared to the basic sampling, the 10% goal biasing sampling recommended as the efficient percentage [13] and the Pre-GO sampling."]} +{"9849236|873842": []} +{"34013163|36510460": [", it finds a solution, if one exists, provided with infinite run time [4, 8].", "Initial complete practical planners such as Road Map (RM), Potential Fields, and Cell Decomposition (CD) techniques are unable to deal with dynamic and complex high dimension problems [1, 7-10].", "Recent state of the art [41] is inclined to apply kinematic constraint model while searching the path to avoid complexities of post processing [8, 60].", "Major advantages of Sampling Based Planning (SBP) are low computational cost, applicability to high dimensional problems and better success rate for complex problems [8, 29].", "PRM based methods [7, 32] are mostly used in highly structured static environment such as factory floors [11, 29, 33].", "Sampling Based Planning (SBP) approaches are the most influential advancement in path planning [7, 8].", "A survey on Sampling Based Planning (SBP) approaches for mobile robots was presented in [8].", "Most popular SBP algorithms are Probabilistic Roadmap (PRM) [7, 8, 30], Rapidly-exploring Random Tree (RRT) [11, 31] and Rapidly-exploring Random Tree Star (RRT*) [7].", "Therefore, metric should be a true representative of the effort, or time-to-go between two configurations, otherwise highly sub-optimal paths are produced [8]."]} diff --git a/graph_3993284.jsonl b/edge/graph_13348951.jsonl similarity index 100% rename from graph_3993284.jsonl rename to edge/graph_13348951.jsonl diff --git a/graph_4009814.jsonl b/edge/graph_133594398.jsonl similarity index 100% rename from graph_4009814.jsonl rename to edge/graph_133594398.jsonl diff --git a/edge/graph_13359913.jsonl b/edge/graph_13359913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da8adddd5116bc7bd47ee9fa135fc01276035bbb --- /dev/null +++ b/edge/graph_13359913.jsonl @@ -0,0 +1,2 @@ +{"9938173|14376565": []} +{"9938173|1666690": ["T. Bjerregaard and S. Mahadevan With the emerging of the GALS concept of globally asynchronous locally \nsynchronous systems [Chapiro 1984; Meincke et al. 1999], implementing links using asynchronous circuit \ntechniques [Spars\u00d8 and Furber 2001; Hauck 1995] is an obvious possibility."]} diff --git a/edge/graph_133603697.jsonl b/edge/graph_133603697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e111a98d9ed5fa209039783096233d73d35a1c22 --- /dev/null +++ b/edge/graph_133603697.jsonl @@ -0,0 +1,11 @@ +{"7109928|10608305": ["A lot of interesting examples of recently developed static and dynamic power and energy management techniques in the distributed computing environments are presented in the following surveys [5, 40, 43, 44]."]} +{"42444128|193574": []} +{"20125939|165863": ["Therefore, it is critical to explore innovative methods to manage GPU power efficiently (Mittal and Vetter, 2015)."]} +{"64226044|193574": ["The network is considered negligible for energy consumption of HPC servers as it typically reaches only 2% of the overall server\u2019s consumption [14] and it does not exhibit large variations related to traffic [41].", "These aforementioned factors (network, memory and storage), are typically accounted for in the static part of a server\u2019s power consumption [41].", "As it is commonly accepted [41], power consumption breaks into two parts: a static part, which represents the consumption when the server is on but idle; and the dynamic part, which is linear with the server utilization and depends on the nature of computational workload (e.", "In contemporary HPC nodes, processors are responsible for the lion\u2019s share of the energy consumption [41] as modern processors consist of several billion transistors [14].", "However, the relation between a CPU\u2019s power consumption and load (CPU utilization) is linear for a given application at a given frequency as explained in [41] and shown in Section 6."]} +{"17675973|10837932": []} +{"10328907|3540699": ["[18] suggests splitting video frames into so called slices and decoding slices on the available CPUs."]} +{"64737355|193574": ["Over the years, several technical solutions have been proposed to improve the e \ufb03 ciency of processors [5, 6], data storage solutions and network equipment [7].", "Other general surveys on energy-e \ufb03 cient resource allocation mechanisms have been presented [5, 14] where many of the surveyed mechanisms require monitoring of some type."]} +{"64737355|16015853": ["surveyed approaches on energy modelling and measurement [11]."]} +{"5929770|10658846": []} +{"60499010|193574": ["A survey of techniques that aim to improve the energy e\ufb03ciency of computing and network resources is given in [80], covering techniques that operate both on parallel and distributed system levels."]} +{"60499010|12817488": ["Alternatives are statistical models [83], time series approaches [67], and data \ufb01ltering with a distributed analysis that produces small trace \ufb01les with a small runtime overhead [60, 84]."]} diff --git a/edge/graph_13360461.jsonl b/edge/graph_13360461.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94b9afc775ea378314c009628458e0e1165bd1f1 --- /dev/null +++ b/edge/graph_13360461.jsonl @@ -0,0 +1,3 @@ +{"202342721|1805048": [", to predict users\u2019 rating of unrated items [210]."]} +{"207172599|3330313": []} +{"18164904|15224686": ["Some references are Liu et al. (2006); Thomas et al. (2006); Sun et al. (2007); Khoshgoftaar et al. (2007, 2011); Fernandez et al. (2012)."]} diff --git a/edge/graph_133605388.jsonl b/edge/graph_133605388.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b62a57ddf39a1e6e63c49f4a91aa9801db76d049 --- /dev/null +++ b/edge/graph_133605388.jsonl @@ -0,0 +1,15 @@ +{"4091270|2607051": []} +{"4091270|7487572": ["Given the ecological and economical importance of mangrove forests, there is an increasing need to monitor and evaluate their condition and geographical distribution in order to help guide conservation and restoration efforts (Dronova 2015)."]} +{"8731725|18744521": ["Tourism, shipping, urbanization and human intervention are damaging coral colonies, with 19% of the world\u2019s coral reefs having been destroyed by 2011 and 75% threatened [4]."]} +{"15637777|8584223": [") or based on an iterative error minimization [3], [4], [5], [6], [7]."]} +{"51965408|18744521": ["Alternatively, the airborne hyperspectral images have limited coverage for large areas, are more expensive than multispectral satellite images, are computationally hard to process, and the produced datasets from these images are voluminous even when covering comparatively small areas [23].", "More information about ecological monitoring studies has been discussed at length in literature [23]."]} +{"133272002|17054454": ["\u2026reduction (D\u00f3pido et al., 2012) and classification techniques (Lu and Weng, 2007) have been applied to hyperspectral images for vegetationmapping (Xie et al., 2008 for review of vegetation mapping), all of which have advantages and limitations that should be considered in relation to the\u2026"]} +{"504111|17054454": []} +{"43365550|393948": ["Neural network has experienced a resurgence thanks to breakthroughs in deep learning that has achieved remarkable performance in a number of object recognition benchmarks [1]."]} +{"45890476|9010313": ["A spectrally correlated model is used because a large part of the noise is residual surface glint, even after images have been glint corrected (Kay et al., 2009), and so is not independently random in each band."]} +{"15163486|8953108": ["The Otsu method remains one of the most cited threshold methods (Sezgin and Sankur, 2004; Kuleli, 2010; Kuleli et al., 2011)."]} +{"130549337|8953108": []} +{"125246247|9010313": []} +{"131370925|10859746": ["Although mixed pixels continue to occur at boundaries between features regardless of feature size or sensor resolution (Schowengerdt, 2006), the issue can be alleviated by either using the finest resolution imagery available or employing spectral unmixing classifiers (Boyd and Foody, 2011)."]} +{"122847687|9010313": []} +{"129795789|10859746": ["Several studies have highlighted the need to account for sources of error when using remote-sensing data to map and quantify landscape pattern (Lunetta et al. 1991; Hess 1994; Li and Wu 2004; Shao and Wu 2008; Foody 2008; Boyd and Foody 2011)."]} diff --git a/edge/graph_133606519.jsonl b/edge/graph_133606519.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a787a22aa7534ce701837f771bee8ab66f311771 --- /dev/null +++ b/edge/graph_133606519.jsonl @@ -0,0 +1,3 @@ +{"41742952|17774971": ["The most recent advances in the area of high-power high-voltage multilevel converters have been discussed in detail in [18]\u2013[21]."]} +{"49728854|12083425": ["ESS can be applied for energy arbitrage [29], peak shaving [30], load flowing [31], spinning reserve [32], voltage support [33], black start [33], [34], frequency regulation [24], power quality [35], [36], power reliability [37], renewable FIGURE 2."]} +{"34855144|17774971": []} diff --git a/graph_40249.jsonl b/edge/graph_13360654.jsonl similarity index 100% rename from graph_40249.jsonl rename to edge/graph_13360654.jsonl diff --git a/edge/graph_133607460.jsonl b/edge/graph_133607460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a284d90d5c280d6e81ae4013cca65e521508e9be --- /dev/null +++ b/edge/graph_133607460.jsonl @@ -0,0 +1,10 @@ +{"49642131|1353379": []} +{"49642131|64404": []} +{"49642131|14889616": []} +{"37225910|14382980": []} +{"13749282|21386749": []} +{"26499519|14382980": []} +{"26499519|17474643": []} +{"32509183|14427591": ["Zuiderwijk et al. (2014) argue that the diversity of theories that are currently implicated in open data research is likely to be a result of the topic being an emerging phenomenon.", "Similarly, Zuiderwijk et al. (2014) This review of the literature finds support for Zuiderwijk et al. \u2019 s (2014) suggestions that much of the existing research has oriented towards data provision.", "BOLD creates innovation opportunities for both the public and private sectors, from innovation of processes and products to developments in the supply chain and new markets (Jetzek et al. 2014; Zuiderwijk et al. 2014)."]} +{"37976266|1520906": []} +{"37976266|44461432": ["[58] provide a systematic review of data mining in technique view, knowledge view, and application view, supported with the latest application cases related mostly to business intelligence.", "[58] provide a thorough survey on data mining techniques and algorithms."]} diff --git a/edge/graph_133609164.jsonl b/edge/graph_133609164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ecede0546ed43e1a9e8645454be6cd0e69833a6e --- /dev/null +++ b/edge/graph_133609164.jsonl @@ -0,0 +1,59 @@ +{"68107134|51613885": []} +{"68107134|3546180": []} +{"68107134|7465328": []} +{"21728329|206578365": ["Meanwhile, edge computing also covers a wide range of technologies, including IoT edge computing [7]\u2013[12], mobile edge computing [5], [13]\u2013[16], cloud computing [17]\u2013[20], fog computing [21], [22], distributed data storage [23], [24], autonomic self-healing networks [25], remote cloud services [26], augmented reality [27], and so on [28], [29]."]} +{"21728329|3767252": ["Meanwhile, edge computing also covers a wide range of technologies, including IoT edge computing [7]\u2013[12], mobile edge computing [5], [13]\u2013[16], cloud computing [17]\u2013[20], fog computing [21], [22], distributed data storage [23], [24], autonomic self-healing networks [25], remote cloud services [26], augmented reality [27], and so on [28], [29].", "[5] gave a survey and analysis of security threats and challenges in mobile edge computing."]} +{"21728329|191396": ["Fbk ,dj (1t) [45]\u2013[47], which can overcome the limitations of traditional trust schemes, whereby the trust factors are weighted manually or subjectively."]} +{"4483521|2294541": ["Hoffman et al. [28] discuss five common attacks in P2P trust models: self-promoting, white-washing, slandering, orchestrated, and denial of service attacks."]} +{"28952352|2294541": ["Bad-mouthing and ballot-stuffing attacks are the most common forms of reputation attacks [30]."]} +{"36203745|9240891": ["Internet applications [2], on-line social networks [3], on-line service provisioning systems [4] and many others have already created a solid background regarding managing trust."]} +{"4562284|31245252": []} +{"4562284|17205659": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"17776808|14441987": []} +{"504223|3348390": ["Generally, context modeling can be classified as six categories: key-value, markup, graphical, object-based, logicbased, and ontology-based [17]."]} +{"26974550|19938676": []} +{"14849884|1333339": ["Trust Predictions: Trust prediction is a method of predicting potentially unknown trust between nodes using the present and past behavior of nodes and also the recommendations received from other nodes [17].", "The core factor to be considered for trust propagation is cooperation in the network in transporting the trust information [17, 18].", "The chain of nodes that transmits the trust information about target node to the trust requesting node constitutes a trust path [17, 18]."]} +{"14849884|1462862": []} +{"14849884|10137283": []} +{"14849884|9240891": ["The contributions of this paper are: (1) to give a clear definition of trust in the communication and networking field, drawing upon definitions from different disciplines; (2) to extensively survey the existing trust management schemes developed for MANETs and investigate their general trends; and\u2026", "Also, confidence level is used as a weight to evaluate trust of other nodes based on a Bayesian approach."]} +{"14553540|9240891": ["Trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship as well as monitoring and reevaluating existing trust relationships ; and automating the process [7].", "Others make use of a trust policy language to specify the criteria of trust [7]."]} +{"52810953|3474164": ["The use of cognitive radio methods uses an energy detector to select the communication channel [116].", "They foster a distributed architecture thereby eliminating a single point of failure, which can improve network reliability and management [116]."]} +{"52810953|6664074": []} +{"52810953|801245": []} +{"52810953|7889189": []} +{"52810953|3494096": []} +{"30825704|1333339": ["An important component of a trust service platform is trust evaluation; and despite the large amount of research on trust, a complete trust evaluation mechanism in the IoT is still under investigation [6], [7].", "In social and cognitive psychology, indicators of trust are principally from the three sources: (i) what the trustor hear about the trustee from other people (trustee\u2019s reputation, recommendations on the trustee); (ii) trustor\u2019s experiences on the trustee based on previous interactions; and (iii) understandings of the trustor on the trustee based on direct observations (knowledge) [6]\u2013 [8]."]} +{"30825704|14745481": ["An important component of a trust service platform is trust evaluation; and despite the large amount of research on trust, a complete trust evaluation mechanism in the IoT is still under investigation [6], [7]."]} +{"3046076|1520906": []} +{"20897828|9240891": ["Our trust in another individual can be grounded in our evaluation of another\u2019s ability, benevolence, and integrity [5][10][13], which is carried out through trust establishment process.", "KeyNote [2], RoleBased Trust Management [8] and Subjective Probability Model [6] as well as dynamic trust models [9][15]; trust establishment schemes such as access control [11], trust negotiation [14], and trust reputation [12]; and logic reasoning and interpretation [2][5-8][10].", "It generally means a binary relation between two entities: one entity\u2019s confidence, belief and expectation that another entity will act or intend to act beneficially [5-7][10][13].", "Trust is an important concept in distributed computing systems in that it is widely used to ensure the system security through trust management so that valid and effective information services can be provided [3][5-12][14-15].", "Trust is widely used in distributed systems for ensuring the system security through trust management in order for the systems to provide valid and relevant information services [3][5-12][14-15].", "The trust relation following this conditional transitivity is called trust recommendation [5][8], trust delegation [2][7][8] or trust reputation [7-8][12] if the information about the trust on \u03b3 from \u03b2 is suggestive, instructive or informative, respectively."]} +{"86464517|49564949": ["Moreover, to the best of our knowledge, there is no standard 107 architecture for fog computing [19]."]} +{"86464517|25374274": []} +{"86464517|3543288": ["These devices can potentially cooperate and collaborate to provide diverse services like, for example, smart cities, smart communities, emergency response, smart metering, home automation, intelligent transportation system, and the Internet of connected vehicles [1,2] Interconnected IoT nodes generate a massive amount of data that are needed to be private and confidential."]} +{"86464517|8523192": ["However, in the cloud-based IoT applications, there remain unresolved issues such as the requirement of high capacity client access link, variable latency, lack of mobility support, and security and location-awareness [6,7].", "This approach reduces service latency, improves the Quality of Service (QoS), and provides a superior experience to end-users [7,9]."]} +{"86464517|3390598": ["Each thing possesses uniquely identifiable characteristics that are embedded in its computer system to interoperate with existing Internet infrastructure [19]."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"125476571|36250251": []} +{"125476571|1353379": ["[16] focused on the data fusion in smart ubiquitous environments but ignored the security and privacy issues in IoT.", "The literatures [15-18] have provided deep discussion and introduction to these methods.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT environments Ignore privacy and security in IoT data fusion [17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life Do not touch the privacy issues and the difference and relationships among different applications in IoT [20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation Do not touch the privacy issues and the difference and relationships among different applications in IoT Our work Specify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods"]} +{"125476571|3119314": ["Different from cloud computing, edge computing [123-126] as a decentralized paradigm is proposed to support real-time services, location awareness and mobility, which is appropriate for various real-time application scenarios, such as smart gird and smart traffic [127], etc."]} +{"125476571|3767252": []} +{"125476571|5664472": ["However, visual data affect the privacy of inhabitants, which calls for privacy preserving approaches in videos and images [54, 63-65]."]} +{"125476571|16051476": ["The literatures [15-18] have provided deep discussion and introduction to these methods.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT\nenvironments Ignore privacy and security in IoT data fusion\n[17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life\nDo not touch the privacy issues and the difference and relationships among different applications in IoT\n[20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation\nDo not touch the privacy issues and the difference and relationships among different applications in IoT\nOur work\nSpecify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods\nTable 1 compares existing related surveys with our work.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT environments Ignore privacy and security in IoT data fusion [17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life Do not touch the privacy issues and the difference and relationships among different applications in IoT [20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation Do not touch the privacy issues and the difference and relationships among different applications in IoT Our work Specify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods", "[15] provided a review on data fusion techniques, but they did not give a discussion on the data fusion specifically designed for IoT big data."]} +{"1933897|9554464": ["A related problem is secure data aggregation in wireless sensor networks and it has been widely researched in [16,17]."]} +{"1933897|12817488": []} +{"1333339|14745481": ["Applications of trust management is enormous in mobile networks [20].", "Apart from these, some application specific attack models are discussed in [20], [101], [102].", "The detailed survey on various trust computation mechanisms, trust dynamics and their inter operations are missing in [20].", "There is a recent survey on trust management for MANET in [20]."]} +{"1333339|10137283": []} +{"1333339|9240891": []} +{"1333339|10859599": ["Apart from these, some application specific attack models are discussed in [20], [101], [102]."]} +{"1046396|787638": ["These tools can be classified [12], identifying the knowledge of the system (motes) about the monitoring process, as:", "More clearly, Schoofs [12] classifies wireless sensor network tools into two groups: pre-deployment tools and post-deployment tools.", "Schoofs\u2019 [12] tools classification lists."]} +{"1046396|15300368": ["Following this approach, many researchers and standardization organisms have promoted the standardization of WSNs in the last years [6\u201310]."]} +{"3528624|1333339": ["Researchers have pointed out that in some scenarios such as MANETs, due to high mobility, it is challenged to maintain a centralized system for managing third-party information, resulting in only direct observation information is possibly obtained; and they have to adapt the trust models based on constrains of the environments [25,26]."]} +{"3528624|14745481": ["Researchers have pointed out that in some scenarios such as MANETs, due to high mobility, it is challenged to maintain a centralized system for managing third-party information, resulting in only direct observation information is possibly obtained; and they have to adapt the trust models based on constrains of the environments [25,26]."]} +{"3528624|9240891": ["Grandison and Sloman have defined this variant of trust as \u201cinfrastructure trust\u201d [15]."]} +{"3503216|3579945": ["Note that, although this improvement in the energy efficiency is especially useful for battery-operated gateways, the increase on the level of security may also benefit other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which can be the target of cyberwarfare attacks [20]."]} +{"3503216|13991708": ["\u2026gateways, the increase on the level of security may also bene\ufb01t other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which\u2026", "As explained in [16], the fog layer must provide horizontal integration between different layer protocols."]} +{"8026205|2142482": ["such attack is handled by intrusion detection techniques [18], [29], [34], [35] and is not addressed in this paper."]} +{"46714820|7971188": ["However, P2P networks can consist of heterogeneous nodes with varying capabilities, so nodes with less computing power may become the bottleneck in the network (Lua et al. , 2005)."]} diff --git a/edge/graph_13361214.jsonl b/edge/graph_13361214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3821e1bc4df80664a16e0df768b0c626506f84df --- /dev/null +++ b/edge/graph_13361214.jsonl @@ -0,0 +1,7 @@ +{"15645582|1236072": ["This layer addresses mainly the issues of QoS versus the amount of energy needed to provide such service a good work can be found on [34]."]} +{"5172416|270804": ["However, these traditional transport protocols cannot be directly implemented over wireless sensor network [6, 49] because WSN in general and WMSN in particular have their distinctive features, which make them different than typical Internet network, and they have very wide range of applications that need special requirements."]} +{"5172416|1236072": ["The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"5172416|1230643": ["WSNs are becoming more low-cost, low-power, multi-functional, and viable due to the advances in micro-electro-mechanical systems (MEMS), low power and highly integrated digital electronics, and proliferation of wireless communications [1].", "The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"25375988|14441987": ["In [10] routing protocols designed for ad hoc mobile wireless networks are discussed and compared."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"16931654|1230643": []} diff --git a/graph_1336603.jsonl b/edge/graph_1336603.jsonl similarity index 100% rename from graph_1336603.jsonl rename to edge/graph_1336603.jsonl diff --git a/edge/graph_13367074.jsonl b/edge/graph_13367074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f3dbc2b667a161e6831b3d6e862fb18f2229b44 --- /dev/null +++ b/edge/graph_13367074.jsonl @@ -0,0 +1 @@ +{"3253074|5358365": ["Existing surveys were either conducted several years ago [47,143] or focus on a specific topic of visualization such as graph visualization [145], software visualization [24], or visualization of network security events [124]."]} diff --git a/edge/graph_13367219.jsonl b/edge/graph_13367219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..600bff7c55993f3eaa6c1d65501329a09df39602 --- /dev/null +++ b/edge/graph_13367219.jsonl @@ -0,0 +1,5 @@ +{"5159434|3054454": []} +{"13043009|3054454": ["Several modeling approaches for directional channels have been presented in the last few years [2], [3]; one that has become very popular is the geometry-based stochastic model [4]."]} +{"487603|3054454": ["For the design, performance evaluation, and cell planning with AAs, we need realistic spatial channel models [5], [6]."]} +{"61939404|3054454": []} +{"122816240|3054454": ["Thus, the interest in the directional nature of the urban mobile radio channel has rapidly increased over the last years [ 2 ], [3]."]} diff --git a/edge/graph_13367514.jsonl b/edge/graph_13367514.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..227b3d05f00212058401ba74494208faf64fd241 --- /dev/null +++ b/edge/graph_13367514.jsonl @@ -0,0 +1,3 @@ +{"640978|13367514": []} +{"6905561|2840997": ["Satisfiability provides a powerful and general formalism for solving various important problems including hardware and software verification and planning [8, 64, 100, 56]."]} +{"52871605|15664781": ["With a randomized classical verifier, families of tautologies with polynomial-size proofs fall into the complexity class of \u201cMerlin-Arthur games\u201d (MA), which, modulo plausible conjectures in computational complexity, is the same class as NP [ 97 , 84]."]} diff --git a/edge/graph_13370607.jsonl b/edge/graph_13370607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb43f40464b29b2d2c7420b3f5d0f95d357ad819 --- /dev/null +++ b/edge/graph_13370607.jsonl @@ -0,0 +1,4 @@ +{"1636407|4626023": []} +{"9644487|18812309": ["We used ClusterONE because of its ability to identify overlapping cohesive sub networks in weighted networks and was shown previously to detect meaningful local structures in various biological networks [31,32]."]} +{"2965434|14205872": ["[77]."]} +{"8997979|1507400": ["The Hadoop MapReduce system [8\u2013 10] represents a novel program framework with the potential to greatly accelerate data-intensive application."]} diff --git a/edge/graph_13372398.jsonl b/edge/graph_13372398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a755e9010f6bc25f327852912beb490ac3c92fd5 --- /dev/null +++ b/edge/graph_13372398.jsonl @@ -0,0 +1,12 @@ +{"18843804|2623404": ["The first aim is to describe the basic issues, the technical approaches, and the methodologies for the implementation of power management primitives in the context of the emerging Software Defined Networking (SDN) architectures [8], [9]."]} +{"16349549|2623404": ["Compared to recent surveys [5, 6], this paper tackles most of the SDN challenges with their causes and existing solutions in a comprehensive and detailed manner."]} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"16809905|2623404": ["In this work, to avoid delay communication between routers and the centralized controller, we consider the default rule which is just to forward packets to a default port (without contacting the controller), and each switch has exactly one default port [28]."]} +{"16809905|10837932": ["Therefore the green networking has been attracting a growing attention during the last years (see the survey [2]).", "Starting from the pioneering work of Gupta [10], the idea of power proportionality has gained a growing attention in networking research area [2][6]."]} +{"954107|29060869": []} +{"954107|193574": []} +{"15531146|8450611": ["The process of classifying the packet and searching the flow table has been well studied [12], [13] and is known to be a time-consuming and critical stage in the switch pipeline."]} +{"14930776|17872696": ["are given in [56, 57]."]} +{"14930776|205286988": ["A thorough analysis and a discussion of energy-aware routing protocols for wireless sensor networks are given in [58, 59 ]."]} diff --git a/edge/graph_13378711.jsonl b/edge/graph_13378711.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2d47e8741b732b45ab753ffa5cc678bb6654e8b --- /dev/null +++ b/edge/graph_13378711.jsonl @@ -0,0 +1,7 @@ +{"18848252|8250043": ["The challenges in testing service based applications are summarized in [4] depending on the viewpoint of different stakeholders (developer, provider, integrator, third-party, end-user) and on the different level of testing (unit, integration, regression, etc."]} +{"7435008|8250043": ["The problem is that the very features that make SOA attractive, mainly loose coupling and implementation neutrality, also make it more difficult to test [7].", "Two facts are anyhow evident: on one side the realization of SOCT makes SOA applications more reliable and raises their trustworthiness; on the other, only an agreed STG can make it feasible, since only a standardized and agreed setting can make the three-party SOCT scenario interoperable."]} +{"24489293|8250043": ["Testing of SOA, in general, is discussed in [8, 9, 10, 22].", "None of the stakeholders in a SOA is its (complete) owner [9]."]} +{"37178797|8250043": []} +{"11056674|8250043": []} +{"34038701|8250043": ["[23] Gerardo Canfora and Massimiliano Di Penta."]} +{"17894552|8250043": []} diff --git a/edge/graph_13382977.jsonl b/edge/graph_13382977.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2236b02c5dbe08a0d2da1e19cf241fafe84fc9b7 --- /dev/null +++ b/edge/graph_13382977.jsonl @@ -0,0 +1 @@ +{"2088789|15782139": []} diff --git a/graph_4030148.jsonl b/edge/graph_13385255.jsonl similarity index 100% rename from graph_4030148.jsonl rename to edge/graph_13385255.jsonl diff --git a/graph_4040035.jsonl b/edge/graph_133922392.jsonl similarity index 100% rename from graph_4040035.jsonl rename to edge/graph_133922392.jsonl diff --git a/edge/graph_13392386.jsonl b/edge/graph_13392386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bbb4abf3e0cdc579829693c93c17039bdf7fb3c --- /dev/null +++ b/edge/graph_13392386.jsonl @@ -0,0 +1,6 @@ +{"967595|3102110": ["Interested readers should consult references such as [33; 24]."]} +{"27379625|7624176": ["Because the user\u2019s location is known only inaccurately, we use a from-region visibility algorithm [14].", "[14] present an overview of visibility algorithms from a computer graphics research point of view."]} +{"6897968|2187403": ["Differently, in [6] the authors propose a survey focused on data-oriented context models.", "Di\ufb00erently, in Bolchini et al (2007) the authors propose a survey focused on data-oriented context models."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"58792962|8125630": []} +{"1108414|1805048": ["In particular, numerous role \nmining approaches have been proposed in the context of RBAC (Role-Based Access Control) in which only \ntwo dimensions of parameters are considered (i.e.,"]} diff --git a/edge/graph_13394431.jsonl b/edge/graph_13394431.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f74866ea6bcba49df516128833799a2b86b71b17 --- /dev/null +++ b/edge/graph_13394431.jsonl @@ -0,0 +1,7 @@ +{"8138217|7834819": ["Numerous accelerometer-based activity monitors have been described in the literature [66]."]} +{"9680244|15167343": ["For instance, a miniaturized fiber optic tactile force sensors based on FPI has been proposed to provide tactile feedback and measure the forces of interactions during needle-based percutaneous procedures in an MRI, or in vitreoretinal microsurgery applications [103,104]."]} +{"9680244|155150": ["Fiber-optic based sensors are very attractive for many applications of medical field, such as the immunity to electromagnetic interference and MRI compatibility, biocompatibility, non-toxicity and chemical inertness, robustness, flexibility, high versatility and the feasibility of being miniaturized [97\u201399]."]} +{"9680244|14485408": ["The paper of Lee was one of the most complete reviews within the nineties [23], followed by the paper of Eltaib about tactile sensing technology for minimally invasive surgery in 2003 [24] and the paper of Tiwana and colleagues in 2012 [25], concluding with the review of Lucarotti and colleagues about bio-artificial tactile sensing [26]."]} +{"25311332|155150": []} +{"5727561|5791119": ["The Fabry\u2013Perot interferometer is based on the principle of interferometry [92,95]."]} +{"5727561|155150": ["This makes OFS-based device compatible with the medical environment where EMI is central to a range of diagnostic and treatment techniques, such as as MRI, computed tomography (CT) scan, RF/microwave thermal ablation and other imaging and invasive medical procedures [70,89]."]} diff --git a/edge/graph_13394693.jsonl b/edge/graph_13394693.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79e5ade314cda7467c9b50b2e4a1b872d0e4e69b --- /dev/null +++ b/edge/graph_13394693.jsonl @@ -0,0 +1 @@ +{"261174|2374977": []} diff --git a/graph_4056929.jsonl b/edge/graph_13397464.jsonl similarity index 100% rename from graph_4056929.jsonl rename to edge/graph_13397464.jsonl diff --git a/edge/graph_13401268.jsonl b/edge/graph_13401268.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f811fdd886001033ce8ca3c7b662482c327abac9 --- /dev/null +++ b/edge/graph_13401268.jsonl @@ -0,0 +1,4 @@ +{"93128488|9770908": []} +{"38900318|6988077": []} +{"25678821|9770908": []} +{"97089266|9770908": []} diff --git a/edge/graph_13405422.jsonl b/edge/graph_13405422.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6e61629db103f19b069f57d3cdbd866b0e7ff78 --- /dev/null +++ b/edge/graph_13405422.jsonl @@ -0,0 +1,8 @@ +{"18243128|14441987": []} +{"15994073|206051485": ["MLFFT is a necessary addition to the pseudopolar FFT for the following reasons: It has lower interpolation errors in both polar and log-polar Fourier transforms, it reaches better accuracy with the nearly same computing complexity as the pseudopolar FFT, and provides a mechanism to increase the\u2026"]} +{"207323266|5729190": ["Several methods have been developed for text detection and recognition in video in the past decade [1,2].", "As a result, they are popular compared to connected component and texture based methods because of simplicity and effectiveness in gradient and edge operations [1,2].", "In the same way, there are lots of methods proposed for text recognition in literature [1].", "To overcome the problem of complex background, many methods have been proposed by using texture features for text detection in video [1,2]."]} +{"36867871|8953108": ["Many optimization methods have been proposed in the literature [2]."]} +{"118066544|206051485": []} +{"14885202|206051485": ["Keywords- Image registration; Fractional Fourier Transform; Multilayer-Pseudopolar grid\nI. INTRODUCTION Image registration represents a vital preprocessing step to many image processing tasks [1], such as image mosaic, image compression, video enhancement, and scene representation to name a few\u2026"]} +{"35091669|18050848": []} +{"35091669|192934": []} diff --git a/graph_4071247.jsonl b/edge/graph_13406069.jsonl similarity index 100% rename from graph_4071247.jsonl rename to edge/graph_13406069.jsonl diff --git a/graph_4161061.jsonl b/edge/graph_13407049.jsonl similarity index 100% rename from graph_4161061.jsonl rename to edge/graph_13407049.jsonl diff --git a/edge/graph_13407802.jsonl b/edge/graph_13407802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7cf375a03b916a31c35705a7e4cec9f1a76233a1 --- /dev/null +++ b/edge/graph_13407802.jsonl @@ -0,0 +1,2 @@ +{"60467185|2082499": []} +{"60467185|386036": []} diff --git a/edge/graph_13407903.jsonl b/edge/graph_13407903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb30ada31449ad4d5f0161da4b2e7d5d937ac92e --- /dev/null +++ b/edge/graph_13407903.jsonl @@ -0,0 +1,8 @@ +{"1983341|6387482": ["As combining these functions can be viewed as a multi-modal fusion problem, we choose to use a linear weighted sum, an effective strategy for multi-modal fusion according to [1]."]} +{"6373200|1097238": ["From an information fusion perspective [3], diversity in base tag relevance estimators is important for effective fusion."]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"10682507|1176034": ["Additional references can be found in [74, 148] for temporal analysis and in [53, 96, 125] for spatial analysis."]} +{"16228361|13365762": ["D MPEG-7 Color layout [1], and 80-", "D MPEG-7 Edge Histogram [1]."]} +{"15571753|6387482": ["C o m p ared w th th e b aelin e [5 2 ], w e o b tain a retive im p ro em en t in term s o f P @ 2 0 b y 1 5 .", "As combining these functions can be viewed as a multi-modal fusion problem, we choose to use a linear weighted sum, an effective strategy for multi-modal fusion according to [5].", "It has been recognized that for generic multimedia analysis, fusing multiple sources of evidence is beneficial [5]."]} +{"15571753|1097238": []} +{"7116208|13407903": ["Our work falls in the broad area of image annotation and search [34].", "Mean Average Precision (mAP) is another widely used metric [37, 34]; it directly measures ranking quality, so it naturally handles multiple labels and does not require"]} diff --git a/graph_4231727.jsonl b/edge/graph_1341026.jsonl similarity index 100% rename from graph_4231727.jsonl rename to edge/graph_1341026.jsonl diff --git a/graph_423305.jsonl b/edge/graph_13413518.jsonl similarity index 100% rename from graph_423305.jsonl rename to edge/graph_13413518.jsonl diff --git a/edge/graph_134181373.jsonl b/edge/graph_134181373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cc20e43a433ca3ec45155a03a31df943d53d63e --- /dev/null +++ b/edge/graph_134181373.jsonl @@ -0,0 +1,5 @@ +{"34963005|1503157": ["advanced state of medical biotelemetry equipment and its applications (Akyildiz et al., 2002; N. F. G\u00fcler & \u00dcbeyli, 2002; Budinger, 2003; Lewis & Goldfarb, 2003; Strydis, 2005; Byrne & Lim, 2007; Luong et al., 2008; Ruiz-Garcia et al., 2009; Lin et al., 2010; Yilmaz et al., 2010).", "For more in-depth reviews and overviews of biotelemetry systems, the reader is referred to the following sources (Hamrita et al., 1997; Akyildiz et al., 2002; Budinger, 2003; G\u00fcler, N. F. & \u00dcbeyli, 2002; Hawkins et al., 2004; Luong et al., 2008; Morton et al., 2003; Ruiz-Garcia et al., 2009; Strydis, 2005; Wang et al., 2006; Wathes et al., 2008).", "\u2026Telemetry 178\nadvanced state of medical biotelemetry equipment and its applications (Akyildiz et al., 2002; N. F. G\u00fcler & \u00dcbeyli, 2002; Budinger, 2003; Lewis & Goldfarb, 2003; Strydis, 2005; Byrne & Lim, 2007; Luong et al., 2008; Ruiz-Garcia et al., 2009; Lin et al., 2010; Yilmaz et al., 2010)."]} +{"34963005|1230643": ["advanced state of medical biotelemetry equipment and its applications (Akyildiz et al., 2002; N. F. G\u00fcler & \u00dcbeyli, 2002; Budinger, 2003; Lewis & Goldfarb, 2003; Strydis, 2005; Byrne & Lim, 2007; Luong et al., 2008; Ruiz-Garcia et al., 2009; Lin et al., 2010; Yilmaz et al., 2010).", "For more in-depth reviews and overviews of biotelemetry systems, the reader is referred to the following sources (Hamrita et al., 1997; Akyildiz et al., 2002; Budinger, 2003; G\u00fcler, N. F. & \u00dcbeyli, 2002; Hawkins et al., 2004; Luong et al., 2008; Morton et al., 2003; Ruiz-Garcia et al., 2009; Strydis, 2005; Wang et al., 2006; Wathes et al., 2008).", "\u2026field and they give insight into the\nwww.intechopen.com\nModern Telemetry 178\nadvanced state of medical biotelemetry equipment and its applications (Akyildiz et al., 2002; N. F. G\u00fcler & \u00dcbeyli, 2002; Budinger, 2003; Lewis & Goldfarb, 2003; Strydis, 2005; Byrne & Lim, 2007; Luong et al., 2008;\u2026"]} +{"1503157|2762484": ["In the next years, the lowering cost of WST will provide the opportunity to track and trace not only large and expensive products, but small and cheap ones, creating a new generation of intelligence products [92]."]} +{"1503157|6275330": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "strain-gage, and various piezo and capacitive transducers for proximity, position, velocity, acceleration and vibration measurements [20]; and according to several research works, connecting wires to these devices can be more problematic than doing it by means of wireless designs [21,22]."]} +{"1503157|1230643": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "A WSN is a system comprised of radio frequency (RF) transceivers, sensors, microcontrollers and power sources [10].", "A general WSN protocol consists of the application layer, transport layer, network layer, data link layer, physical layer, power management plane, mobility management plane and the task management plane [10].", "Normally, these sensor nodes consist of three components: sensing, processing and communicating [10].", "Sensor networks are used for a variety of applications, including wireless data acquisition, machine monitoring and maintenance, smart buildings and highways, environmental monitoring, site security, automated on-site tracking of expensive materials, safety management, and in many other areas [10].", "02 dB/km for a rain rate of 150 mm/hr [10]."]} diff --git a/graph_4236971.jsonl b/edge/graph_13427574.jsonl similarity index 100% rename from graph_4236971.jsonl rename to edge/graph_13427574.jsonl diff --git a/edge/graph_13427694.jsonl b/edge/graph_13427694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d9ea19bb5e3a5b1268ef92dbc0d6416c2f28952 --- /dev/null +++ b/edge/graph_13427694.jsonl @@ -0,0 +1,2 @@ +{"7607342|1400872": ["\u0091Hidden units makes it possible for the network to discover and exploit regularities of the task at hand such as symmetries or replicated structures\u0092 (Pearlmutter, 1995).", "Recurrent neural networks using the backpropagation algorithm, as developed first by (Pineda, 1987), and other extension (Pearlmutter, 1995; Chauvin & Rumelhart, 1995) had to be eliminated because of their long time computation (multiple training steps) and their complex computation (calculating derivatives).", "DRAMA differs from other RNN models by the fact that it uses an unsupervised training algorithm, based on Hebbian rules, while other RNNs use a supervised training algorithm, such as the backpropagation algorithm and other derivatives (Chauvin & Rumelhart, 1995; Pearlmutter, 1995)."]} +{"7124120|1708582": []} diff --git a/edge/graph_1343571.jsonl b/edge/graph_1343571.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d808dce2606f067c050a9a188f89331dcc954054 --- /dev/null +++ b/edge/graph_1343571.jsonl @@ -0,0 +1,9 @@ +{"316681|2357830": ["Related work While a number of papers discuss the privacy problems raised by RFID techonologies (see for example [14, 15, 20]), very few precisely define what they mean by untraceability."]} +{"17637042|12269716": []} +{"7936685|5108469": ["The following paragraph fromtheconclusionsof a surveyof algebraicpropertiesused in cryptographicprotocols [12] summarizes theactual situation in protocol verification:"]} +{"9854544|5108469": ["These theories are useful to model many security protocols (see [13]), as well as for modeling low level properties of encryption schemes and chaining modes."]} +{"638010|5108469": []} +{"14885059|2357830": ["RFID technologies (see for example [16], [18], [24]) but very few precisely define what they mean by unlinkable1."]} +{"2834718|14271395": ["it is computationally sound to consider only ACf [18].", "To be really faithul to algebraic properties of ElGamal re-encryption, ACf should probably be extended to AGf , unless e.g. it is computationally sound to consider only ACf [18].", "The classical Dolev-Yao theory for public-key encryption is modeled by the signature FDY = {enc, dec, pub, \u3008, \u3009, \u03c01, \u03c02} and the subterm-convergent equational theory EDY = (RDY, \u2205), where\nRDY = { dec(enc(x, pub(y), z), y) \u2192 x, \u03c01(\u3008x, y\u3009) = x, \u03c02(\u3008x, y\u3009) = y }\nThe re-encryption property of public-key encryption schemes like El-Gamal can be modeled by the signature Frenc = {enc, renc, f} and the equational theory Erenc = (Rrenc,ACf ), where\nRrenc =\n{\nrenc(enc(x, y, z), z\u2032) \u2192 enc(x, y, f(z, z\u2032)) renc(renc(x, z), z\u2032) \u2192 renc(x, f(z, z\u2032))\n1.2 Processes and operational semantics.", "Recall that, for all term u, u\u2193 represents the normalization of u wrt to R only, not considering ACf :\nDefinition 9 (Locality function Lf).", "Given an input theory E = (R\u2032\u222aRrenc,ACf ) \u2208 InpTh, let\nR\u22121renc be the inverse of Rrenc, that is: R \u22121 renc =\n{\nenc(x, y, f(z, z\u2032)) \u2192 renc(enc(x, y, z), z\u2032) renc(x, f(z, z\u2032)) \u2192 renc(renc(x, z), z\u2032)\nNote that R\u22121renc is convergent modulo AC.", "Lemma 7 simplifies reasoning modulo AC, by showing that ACf does not interfere with rewriting.", "The motivation of our work is that, when given as input this task (even without ACf , EmixP and EdecP), ProVerif does not terminate.", "We have EPaV = (RPaV,ACf ), with RPaV = RDY \u222aRrenc \u222aRdecP \u222aRmixP \u222aRvote.", "We define the weak symbols of E = (R,ACf ) by W(E) = {g \u2208 F | l \u2192 r \u2208 R & g \u2208 sig(l) =\u21d2 r \u2208 F0}."]} +{"2834718|5108469": ["In order to not miss attacks, and sometimes even to be able to execute the protocols, the formal model has to take into account relevant algebraic properties of cryptographic primitives that are used [17]."]} +{"9306815|5108469": []} diff --git a/edge/graph_134378860.jsonl b/edge/graph_134378860.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f064712d0f2ebe62eb9f6454da6f49f8547c917d --- /dev/null +++ b/edge/graph_134378860.jsonl @@ -0,0 +1,2 @@ +{"140693311|1877246": ["For a complete review about this topic, we address to Musialski et al. (2012)."]} +{"15335064|18587623": ["Night light data have been used in the past to study economic variables [1,2], socio-economic properties [3\u20135], population [6,7] and population density [8], built area [9,10], power consumption [11], greenhouse gas emissions [12], gas flaring [13], atmospheric chemistry [14], skyglow (light pollution) [15\u201317], the epidemiology of illness related to light exposure [18], among other analyses [19]."]} diff --git a/graph_4261497.jsonl b/edge/graph_13441159.jsonl similarity index 100% rename from graph_4261497.jsonl rename to edge/graph_13441159.jsonl diff --git a/edge/graph_1344506.jsonl b/edge/graph_1344506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ac6767f180f7d02ec1623436f068d1f79bc4d5d --- /dev/null +++ b/edge/graph_1344506.jsonl @@ -0,0 +1 @@ +{"1439260|3067314": []} diff --git a/graph_431089.jsonl b/edge/graph_13448554.jsonl similarity index 100% rename from graph_431089.jsonl rename to edge/graph_13448554.jsonl diff --git a/graph_4311204.jsonl b/edge/graph_13453010.jsonl similarity index 100% rename from graph_4311204.jsonl rename to edge/graph_13453010.jsonl diff --git a/edge/graph_13454399.jsonl b/edge/graph_13454399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53b7a21b16159d395317aa7eb982f85cf5e67bd8 --- /dev/null +++ b/edge/graph_13454399.jsonl @@ -0,0 +1,20 @@ +{"16096426|14441987": ["Existing ad hoc routing protocols can be generally categorized into three classes: table-driven (or proactive, such as DSDV and WRP), on-demand(or reactive, such as DSR and AODV), and hybrid (the combination of the two, such as ZRP) [ 38 ]."]} +{"15251371|1236072": ["Some solutions addressing the network lifetime problem are based on energy-aware routing mechanisms , which construct paths using some energy metrics [1]."]} +{"14809393|1230643": ["Recent advances in wireless communications and Micro-Electro-Mechanical systems have enabled the development of wireless sensor networks (WSN) which consist of many sensor nodes with sensing, computing and communication capabilities [1]."]} +{"13295407|1236072": ["Many routing solutions that have been specifically designed for WSNs have been proposed [8, 9]."]} +{"206583097|10287248": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"38784760|1236072": []} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} +{"7133723|205286988": []} +{"7133723|1236072": ["Anahit Martirosyan, 2008."]} +{"37394652|1236072": ["Depending on the network structure adopted, the routing protocols for WSNs can be classified into flat network routing, hierarchical network routing, and location-based routing [2].", "This may result in early network partition [2]."]} +{"37394652|1230643": ["An N-to-1 multipath discovery protocol is proposed in Reference [17].", "Other applications of WSNs can be found in Reference [1].", "In Reference [19], the multipath routing is formulated as a linear programming problem with an objective to maximize the time until the first sensor node runs out of energy.", "We further assume that each sensor node carries an omni antenna and the energy consumptions for idle time, transmission and reception are 35, 660 and 395 mW; respectively (the same parameters as in Reference [5]).", "Various link cost functions have been proposed in the literature (e.g. Reference [26]).", "In this paper, we use the data aggregation algorithm proposed in Reference [25].", "Various data aggregation algorithms have proposed in the literature (e.g. References [22\u201325]).", "Finally, the multipath-based routing protocols, such as the schemes proposed in References [9\u201311], tend to enhance the reliability through the use of multiple paths.", "Directed transmission proposed in Reference [18] is one of the probabilistic routing techniques, which are derived from the flooding.", "In Reference [11], a multipath routing approach is proposed for the directed diffusion [5] to improve the resilience to node failures.", "In Reference [20], the multipath routing is formulated as a constrained optimization problem by using deterministic network calculus.", "The energy-aware routing is proposed in Reference [9]."]} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"15165106|1236072": []} +{"23440810|205286988": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} +{"23440810|1236072": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} diff --git a/edge/graph_134545156.jsonl b/edge/graph_134545156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94424f40af00e8a2d81c6880090e0a8fd6e25030 --- /dev/null +++ b/edge/graph_134545156.jsonl @@ -0,0 +1,6 @@ +{"15965595|1503157": ["An overview of WSNs technology in the field of agriculture and food can be found in Ruiz-Garcia et al. [5]."]} +{"8580663|1230643": ["To this end, wireless sensor networks provide a promising solution to realize real-time environment monitoring, large-area coverage, on-site data processing, and rapid information delivery [2]."]} +{"44315695|1734833": ["In our system, we use an arrhythmia classificatory similar that described in [33].", "Other sensors, like heart rate, can help to detect this feature [33]."]} +{"18587158|3330461": ["D2D communications in wireless network are termed as the direct communication between two devices without the use of the network infrastructure [18]."]} +{"18587158|10310014": ["The functions that CR should provide include spectrum sensing, spectrum management, spectrum sharing and spectrum mobility [26].", "The disaster scenarios identified in Table III require different services and capabilities from disaster communication systems [26].", "The adoption of LTE technology enables delivering the increasingly data-intensive applications demanded by the disaster management system [26]."]} +{"34603564|17708892": []} diff --git a/edge/graph_13455452.jsonl b/edge/graph_13455452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b2b11a42438aeefd5254de9d64a18348aa9b5bb --- /dev/null +++ b/edge/graph_13455452.jsonl @@ -0,0 +1,10 @@ +{"952753|14441987": []} +{"43500308|14441987": ["Most of the on-demand protocols [12] use the shortest path as their route selection metric."]} +{"6438719|14441987": []} +{"6090100|41035405": ["In contrast, cooperative diversity schemes proposed by the information theory community [20, 14] suggest that traditional routing may not be the best approach."]} +{"8310972|1230643": []} +{"41998167|15947359": ["technology, have enabled the use of video sensors and this resulted in a new class of WSNs, called visual or multimedia sensor networks [5,6], that can be used for various potential applications, such as telepresence and surveillance.", "Besides these, the availability of low-cost hardware and rapid development of tiny cameras and microphones have enabled a new class of WSNs: multimedia or visual wireless sensor networks [5,6] and this new class has contributed to new potential WSN applications, such as surveillance.", "It is certain that, these networks also have tighter QoS requirements, such as low data delay and maximum reliability, compared to traditional WSNs [6]."]} +{"41998167|270804": ["The reader can refer to [24\u201329] for QoS support at the network layer, and to [30\u201333] at the transport layer and to [34] for different layers."]} +{"41998167|10559330": ["In this context, reservationbased approaches, such as Integrated Services or IntServ [8], are widely used in providing QoS guarantees.", "IntServ model maintains service on a per-flow basis and can be considered as a reservation-based approach.", "1 shows the concepts of IntServ and DiffServ models discussed in this section.", "However, IntServ model has a number of disadvantages which makes it inappropriate for WSNs. Firstly, it is hard to provide guaranteed service quality due to time varying channel capacity on the wireless medium.", "Third, IntServ model requires a reliable in-band or out-of-band QoS signaling within the sensor network for resource reservation which is very hard to assure in WSNs.\nDiffServ model maintains service on a per-packet basis and can be considered as a reservation-less approach.", "There are two service differentiation models proposed for conventional computer networks, Integrated services (IntServ) [8] and differentiated services (DiffServ) [16]."]} +{"5964562|14441987": []} +{"5727305|14441987": ["DSR routing method consists of major two phases: route discovery and route maintenance[5].", "The most typical protocols are DSDV(Destination-Sequenced Distance Vector), WRP(Wireless Routing Protocol) and CGSR(Clusterhead Gateway Switch Routing), and so on[5]."]} diff --git a/edge/graph_13456854.jsonl b/edge/graph_13456854.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2824f86e311ccd3984f92c74268fba607669002a --- /dev/null +++ b/edge/graph_13456854.jsonl @@ -0,0 +1,2 @@ +{"195233516|7971188": []} +{"195233516|6430931": []} diff --git a/graph_4314193.jsonl b/edge/graph_13457230.jsonl similarity index 100% rename from graph_4314193.jsonl rename to edge/graph_13457230.jsonl diff --git a/edge/graph_13458311.jsonl b/edge/graph_13458311.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dca44e97b01917d5e3a88f4b39e1f0dca063b44a --- /dev/null +++ b/edge/graph_13458311.jsonl @@ -0,0 +1 @@ +{"481381|239537": []} diff --git a/edge/graph_13458486.jsonl b/edge/graph_13458486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f0683d83a2ee1313c1e85a2666f7a8f8dcbdb7f --- /dev/null +++ b/edge/graph_13458486.jsonl @@ -0,0 +1,10 @@ +{"11433365|270804": ["To the best of our knowledge, jointly use of packet inter-arrival and packet service times as in ICD to measure congestion in WSNs has not been done in the past.", "The packetbased computation could be practical for WSNs considering: 1) a WSN generally has small packet forwarding rate and\ntherefore the unit time to forwarding one packet could be long enough for a sensor node to perform certain computation even though its computation capability is limited; 2) although WSNs, at most time, are deployed with limited energy and lacks recharging approach.", "We believe that, in WSNs, every packet might contain useful information, which can be utilized through packet-based computation, and furthermore utilized to enhance congestion control.", "This paper studies upstream congestion control for WSNs, especially for multimedia applications of WMSNs.", "PCCP is designed with such motivations: 1) In WSNs, sensor nodes might have different priority due to their function\nor location.", "This paper investigates the problem of upstream congestion control in WSNs through traffic control.", "We compare PCCP with CCF [3], since both share some similarities and CCF is one of the latest and typical congestion control protocol for WSNs. Fig.", "Those existing congestion control protocols for WSNs have two primary limitations.", "In recent years, several new congestion control protocols have been proposed for WSNs [6].", "2) With the fact that multi-path routing [9] is used to improve system performance of WSNs, congestion control protocols need to be able to support both single-path routing and multi-path routing.", "According to the control behavior, there are two general methods for traffic control in WSNs: end-to-end and hop-byhop.", "For WSNs where wireless channels are shared by several nodes using CSMAlike (Carrier Sense Multiple Access) protocols, collisions could occur when multiple active sensor nodes try to seize the channel at the same time.", "Two types of congestion could occur in WSNs [3] (see Fig.", "None of existing congestion control protocol for WSNs considers the support of multi-path routing.", "In this paper, we propose a hop-by-hop upstream congestion control protocol for WSNs, called PCCP. PCCP detects congestion jointly using packet inter-arrival and service times; it introduces node priority index and realizes weighted fairness; it works for both single-path and multi-path routing."]} +{"11433365|1230643": ["This paper studies upstream congestion control for WSNs, especially for multimedia applications of WMSNs."]} +{"37394652|1236072": ["Depending on the network structure adopted, the routing protocols for WSNs can be classified into flat network routing, hierarchical network routing, and location-based routing [2].", "This may result in early network partition [2]."]} +{"37394652|1230643": ["An N-to-1 multipath discovery protocol is proposed in Reference [17].", "Other applications of WSNs can be found in Reference [1].", "In Reference [19], the multipath routing is formulated as a linear programming problem with an objective to maximize the time until the first sensor node runs out of energy.", "We further assume that each sensor node carries an omni antenna and the energy consumptions for idle time, transmission and reception are 35, 660 and 395 mW; respectively (the same parameters as in Reference [5]).", "Various link cost functions have been proposed in the literature (e.g. Reference [26]).", "In this paper, we use the data aggregation algorithm proposed in Reference [25].", "Various data aggregation algorithms have proposed in the literature (e.g. References [22\u201325]).", "Finally, the multipath-based routing protocols, such as the schemes proposed in References [9\u201311], tend to enhance the reliability through the use of multiple paths.", "Directed transmission proposed in Reference [18] is one of the probabilistic routing techniques, which are derived from the flooding.", "In Reference [11], a multipath routing approach is proposed for the directed diffusion [5] to improve the resilience to node failures.", "In Reference [20], the multipath routing is formulated as a constrained optimization problem by using deterministic network calculus.", "The energy-aware routing is proposed in Reference [9]."]} +{"15165106|1236072": []} +{"14811849|10287248": ["There are two categories of multipath routing [ 4 ]."]} +{"14137281|1230643": ["[1], wireless sensor networks present several limitations.", "9, 1] and the delay in the range [1, 50] ms.", "Similarly, the energy consumption between node s1 and node s is given by [1].", "They consist of a large number of tiny nodes, each node being regarded as a cheap computer deployed inside the phenomenon or very closed to it [1] to perform sensing, computation and communication."]} +{"16461626|47147736": ["Raj Jain pointed that the selection of congestion control schemes should depend upon the characteristic of congestion [4]."]} +{"13295407|1236072": ["Many routing solutions that have been specifically designed for WSNs have been proposed [8, 9]."]} +{"16096426|14441987": ["Existing ad hoc routing protocols can be generally categorized into three classes: table-driven (or proactive, such as DSDV and WRP), on-demand(or reactive, such as DSR and AODV), and hybrid (the combination of the two, such as ZRP) [ 38 ]."]} diff --git a/edge/graph_13468422.jsonl b/edge/graph_13468422.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2dd33c7382b3f84434f0979fe8283ad74e9981fe --- /dev/null +++ b/edge/graph_13468422.jsonl @@ -0,0 +1,3 @@ +{"15379285|164835": ["Several radio-location methods are proposed for locating the Mobile Stations (MSs) in cellular systems [ 4 ]: the Signal Strength method, the Angle of Arrival (AOA) method, the Time of Arrival (TOA) and Time Difference of Arrival (TDOA) methods."]} +{"10823280|164835": ["Cellular localization [27\u201330] takes advantage of the mobile cellular infrastructure present in most urban environments to estimate the position of an object."]} +{"108748132|164835": []} diff --git a/edge/graph_13475127.jsonl b/edge/graph_13475127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08baaa1ac2446efb45b1157aaedab78eb868da42 --- /dev/null +++ b/edge/graph_13475127.jsonl @@ -0,0 +1,23 @@ +{"110427943|1230643": ["Introduction While considerable effort has recently been focused on development of networked sensors for operation in air [1\u20139], sensor network technology has not been developed for application to liquid"]} +{"18711230|2758659": []} +{"100860|15300368": ["Despite all these drawbacks, various case studies of monitoring of marine ecosystems using WSNs can be found in the literature [18].", "Thus, sensor buoys can be installed at the locations required by the instrumentation as nodes of a Wireless Sensor Network (WSN) [21,22] to make up measurement systems that are large and dense enough to provide the requisite spatial coverage.", "As noted above, the deployment of WSNs in marine environments is currently a challenge.", "By using different topologies and taking advantage of the possibilities of WSNs, data can be gathered from buoys located several miles off the coast.", "It has shown that the cost of the design and implementation of the buoy is low, that it can be integrated in a WSN, and that it can be deployed and will retain stability in aggressive and dynamic environments like the sea.", "None of these solutions fully satisfies our requirements because either they do not allow the integration of a wide range of marine sensors, or they were not designed to be part of a WSN with RF communications.", "However the design, implementation and deployment of a wireless buoy network for oceanographic applications, poses new challenges different from those posed by the deployment of WSNs on land, as the marine environment imposes limits on the sensor networks, affecting their development."]} +{"100860|1230643": ["Despite all these drawbacks, various case studies of monitoring of marine ecosystems using WSNs can be found in the literature [18].", "Thus, sensor buoys can be installed at the locations required by the instrumentation as nodes of a Wireless Sensor Network (WSN) [21,22] to make up measurement systems that are large and dense enough to provide the requisite spatial coverage.", "As noted above, the deployment of WSNs in marine environments is currently a challenge.", "By using different topologies and taking advantage of the possibilities of WSNs, data can be gathered from buoys located several miles off the coast.", "It has shown that the cost of the design and implementation of the buoy is low, that it can be integrated in a WSN, and that it can be deployed and will retain stability in aggressive and dynamic environments like the sea.", "None of these solutions fully satisfies our requirements because either they do not allow the integration of a wide range of marine sensors, or they were not designed to be part of a WSN with RF communications.", "However the design, implementation and deployment of a wireless buoy network for oceanographic applications, poses new challenges different from those posed by the deployment of WSNs on land, as the marine environment imposes limits on the sensor networks, affecting their development."]} +{"8411530|1503157": ["ZigBee protocol stack that defines three objects according its functions: network coordinator, routers, and semi-functional nodes [13]."]} +{"8411530|2937482": ["Time synchronization is an important performance in WSNs, because it is a key factor in the process called data fusion [14]."]} +{"8411530|1230643": ["A WSN (wireless sensor network) is an ad-hoc network system composed of a great number of tiny low cost and low power consumption sensing nodes which are capable of sensing, calculating and communicating data [2]."]} +{"6956956|1230643": ["In recent years, technological developments have allowed designing compact systems for collecting and processing information characterized by low power consumption and connected in wireless networks [1][2][3]; network protocols used are simple, tuned to supporting small quantities of data."]} +{"25839828|6305682": []} +{"25839828|6275330": ["In such context, Wireless Sensor Networks (WSNs) are generally used in medicine, industrial automation, domotics and lately, in ecology and ecoinformatics research for modelling and prediction of different phenomena [2][3]."]} +{"25839828|1230643": ["The sensor nodes were equipped with the MSP430F149 low-power microcontroller in tandem with GPRS connectivity.", "The \u03bcNodes motes were equipped with an MSP430 microcontroller and 48 KB of flash memory together with a ZigBee transmitter.", "The sensor nodes were based on the MSP430F1612 microcontroller, CC2420 IEEE 802.15.4 transmitter and the MMA72609 accelerator.", "These nodes were based on the MSP430 and a ZigBee transceiver (CC2420).", "TABLE I DETAILS OF COMMERCIAL SENSOR NODES [6]", "The sensor nodes were based on the MSP430F1611 low-power microcontroller together with a 802.15.4 transceiver.", "These sensor nodes are generally based on low-power microcontrollers such as the MSP430 [6]."]} +{"3300077|8618569": ["ment monitoring, workforce productivity, and plant management [13].", "as there is no apparent physical boundary of the transmission medium [13].", "attack consists of attacking nodes by running malicious code in them [13]."]} +{"3300077|1940388": ["Most symmetric schemes use key predistribution to ease the difficulty of key management [58].", "This way it shows its different identities to nodes in the network and can significantly reduce the effectiveness of fault tolerant schemes such as distributed storage [10], dispersity [11], multipath [31], and topology [32], [33], [58].", "Symmetric key cryptography is difficult for key deployment and management [58]."]} +{"3300077|1230643": ["them an ideal choice for ensuring energy-efficient services and reliable management at hazardous plants, assembly lines, and high-asset protection applications [2], [3]."]} +{"1424415|205286988": ["WSN research has been very active in the last two decades with researchers focusing on issues such as the development of energy-efficient communication protocols to improve network lifetime [1]."]} +{"17614523|1230643": ["Wireless Sensor Networks (WSNs) are solutions where cables are replaced by wireless\ncommunication fitted into small intelligent devices called nodes [2]."]} +{"14650873|1230643": ["UN CO RR EC TE D are densely deployed and collaborate to monitor and analyze a phenomenon of interest [66].", "For example, in the past, novel trends [66] have emerged in the agricultural sector converged in the socalled \u2018\u2018precision agriculture\u2019\u2019, which concentrates on providing the means for observing, assessing, and controlling agricultural practices."]} +{"31752897|6275330": ["Because WSNs are flexible to deploy in various situations, they have been widely used in different areas [2, 3], such as environmental monitoring [4], infrastructure monitoring, manufacturing monitoring, health care monitoring [5, 6] and home monitoring [7]."]} +{"16588075|6959212": ["Installation flexibility and easy configuration enable better usability and maintenance than traditional communication technologies [1].", "Traditionally, applications in industrial environments are based on wired communication solutions [1]."]} +{"2814849|15300368": ["In this context, Wireless Sensor Networks (WSNs) [1,2] offer a new paradigm for oceanography, as in many other disciplines such as precision agriculture, environmental, engineering, etc. WSNs are a type of autonomous, self-organized ad-hoc Wireless Personal Area Networks (WPAN) composed of tens,\u2026"]} +{"2814849|1230643": ["\u2026such systems as not really A-WSNs\u2014that is, systems incorporating considerable computational capacities, power and communications resources and hence contradicting the essential idea of an A-WSN in which the sensor nodes are limited in power, computational capacities, and memory as stated in [1].", "In this context, Wireless Sensor Networks (WSNs) [1,2] offer a new paradigm for oceanography, as in many other disciplines such as precision agriculture, environmental, engineering, etc. WSNs are a type of autonomous, self-organized ad-hoc Wireless Personal Area Networks (WPAN) composed of tens,\u2026", "A-WSNs [1,16] consist of a set of nodes with scanty power supplies, which moreover communicate with one another by way of low-consumption radio modules."]} +{"8503622|1230643": ["Contents lists available at ScienceDirect\nAd Hoc Networks\njournal homepage: www.elsevier .com/locate /adhoc\nPrivacy preservation in wireless sensor networks: A state-of-the-art survey\nNa Li a,*, Nan Zhang b, Sajal K. Das a, Bhavani Thuraisingham c\na Department of Computer Science and Engineering, The University of Texas at Arlington, Box 19015, 416 Yates St., Room 300, Nedderman Hall, Arlington, TX 76019-0015, United States b Department of Computer Science, The George Washington University, 801 22nd Street NW, Suite 704, Washington DC 20052, United States c Department of Computer Science, Erik Jonsson School of Engineering & Computer Science, The University of Texas at Dallas, 800 W. Campbell Road, MS EC31, Richardson, TX 75080, United States\na r t i c l e i n f o\nAvailable online 22 April 2009\nKeywords: Wireless sensor network Privacy\n1570-8705/$ - see front matter 2009 Elsevier B.V doi:10.1016/j.adhoc.2009.04.009\n* Corresponding author.", "\u2026survey\nNa Li a,*, Nan Zhang b, Sajal K. Das a, Bhavani Thuraisingham c\na Department of Computer Science and Engineering, The University of Texas at Arlington, Box 19015, 416 Yates St., Room 300, Nedderman Hall, Arlington, TX 76019-0015, United States b Department of Computer Science, The\u2026"]} +{"14319895|1230643": ["using Time-Division Multiple Access TDMA [3], [15]).", "The sensors detect & measure a certain (target) phenomenon via its changing parameters [3]\u2013[5], [22], [24].", "To reduce power consumption at the sensor nodes, contention-free protocols have been proposed (e.g. using Time-Division Multiple Access TDMA [3], [15]).", "A cooperative DSN uses a fault-tolerant clustering protocol [3], [17], [31] that is re-executed in the event of a topology change.", "An important feature of DSN is self-organizing capabilities that allow random deployment of the sensors, and dynamic reconfiguration of the network topology in the presence of sensor failures or replacements [3], [4].", "\u2022 We assume a contention-free protocol, such as TDMA/FDMA-based protocol, Time Division Multiple Access/Frequency Division Multiple Access [3], [15], and that redundant messages are detected, and ignored.", "Although the main function of sensors is information gathering, sensors can act as repeater nodes to relay (forward) messages toward the data sinks (or end user) [3]."]} diff --git a/graph_4332346.jsonl b/edge/graph_13475195.jsonl similarity index 100% rename from graph_4332346.jsonl rename to edge/graph_13475195.jsonl diff --git a/graph_4341100.jsonl b/edge/graph_13484515.jsonl similarity index 100% rename from graph_4341100.jsonl rename to edge/graph_13484515.jsonl diff --git a/graph_4362634.jsonl b/edge/graph_13489039.jsonl similarity index 100% rename from graph_4362634.jsonl rename to edge/graph_13489039.jsonl diff --git a/graph_4376791.jsonl b/edge/graph_13489501.jsonl similarity index 100% rename from graph_4376791.jsonl rename to edge/graph_13489501.jsonl diff --git a/edge/graph_13490401.jsonl b/edge/graph_13490401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58c0e3f90d0a630a3f67d9fac10b401d81dc0710 --- /dev/null +++ b/edge/graph_13490401.jsonl @@ -0,0 +1,2 @@ +{"6550722|386036": ["Entity resolution is a well-established problem that has been studied extensively in [12][5]."]} +{"14130903|1805048": ["| So we can do collaborative recommendation based on either the community map or association document parameter P ( z d ) (Su and Khoshgoftaar, 2009)."]} diff --git a/graph_4394609.jsonl b/edge/graph_13493163.jsonl similarity index 100% rename from graph_4394609.jsonl rename to edge/graph_13493163.jsonl diff --git a/graph_1349348.jsonl b/edge/graph_1349348.jsonl similarity index 100% rename from graph_1349348.jsonl rename to edge/graph_1349348.jsonl diff --git a/graph_4451760.jsonl b/edge/graph_13496834.jsonl similarity index 100% rename from graph_4451760.jsonl rename to edge/graph_13496834.jsonl diff --git a/edge/graph_13500363.jsonl b/edge/graph_13500363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..753e4c9af32b7abd44f76f6027c514471bc33996 --- /dev/null +++ b/edge/graph_13500363.jsonl @@ -0,0 +1,18 @@ +{"1593586|9045232": ["Learning from examples dominated the face detection scene since the early 90s and contributed to obtaining promising solutions that deal with view-point changes, rotations, scale and illumination variations (Yang et al. 2002; Osuna et al. 1997; Schneiderman and Kanade 2000).", "Mol@ulb.ac.be\nLandweber \u00b7 Face detection \u00b7 Face authentication \u00b7 Real-time system"]} +{"14354903|387610": ["We borrow the notion of region-of-interest (ROI) from JPEG 2000 [4], which is referred to in our model as a spatial region or segment within an image that corresponds to an AO.", "The ROI coding scheme and spatial/SNR scalability in JPEG 2000 [4] has provided a functionality of progressive encoding and display."]} +{"1902452|2616070": []} +{"15051824|7788290": ["We refer the reader to the survey [8] for further investigations."]} +{"23754130|9045232": ["Compared to face recognition systems which have low accuracy, face detection systems\n(whose goal is to identify the location of faces) have higher accuracy (Yang et al., 2002).", "\u2026extract relevant metadata directly from images including: event identification, object identification, face detection/recognition, content-based categorization and so on (Cooper et al., 2003; Naaman et al., 2004; Riya.com, 2005; Yang et al., 2002; Yoshitaka and Ichikawa, 1999; Zhao et al., 2003)."]} +{"23754130|16766019": ["\u2026extract relevant metadata directly from images including: event identification, object identification, face detection/recognition, content-based categorization and so on (Cooper et al., 2003; Naaman et al., 2004; Riya.com, 2005; Yang et al., 2002; Yoshitaka and Ichikawa, 1999; Zhao et al., 2003)."]} +{"122558596|14970359": []} +{"14352217|4361938": []} +{"4523132|191396": ["As suggested in [41], for all the clustering algorithms, we independently repeat the experiments for 20 times with random initializations to reduce"]} +{"10368601|9045232": []} +{"7610725|9045232": ["Face detection has been extensively studied within the image processing literature, e.g. [2-7]."]} +{"275296|9045232": ["An extensive survey on face detection with more than 150 references appeared only recently [16]."]} +{"14415030|15744805": ["Supervised evaluation methods [5,6], also known as relative evaluation methods [7] or empirical discrepancy methods [4], evaluate segmentation algorithms by comparing the resulting segmented image against a manually-segmented reference image, which is often referred to as a gold standard [8] or ground-truth.", "Analytic methods [4,71] assess segmentation algorithms independently of their output, evaluating them based on certain properties of the segmentation algorithms, such as processing strategy (parallel, sequential, iterative, or mixed), processing complexity, resource efficiency, and segmentation resolution, which are usually not deemed effective for assessing the segmentation quality (e.", "Whereas supervised methods evaluate segmented images against a reference image, unsupervised evaluation methods [45], also known as stand-alone evaluation methods [38] or empirical goodness methods [4] do not require a reference image, but instead evaluate a segmented image based on how well it matches a broad set of characteristics of segmented images as desired by humans."]} +{"4632718|530484": ["It should be noted that we do not try to eliminate the intensity inhomogeneity from the images which is still not a completely solved problem [38].", "However, due to the complexity that causes the intensity inhomogeneity, it is difficult for ones to model the intensity inhomogeneity under a variety of image acquisition conditions [38]."]} +{"684692|9045232": ["We choose this domain because a great many pictures of interest show human faces, and also because face detection methods have begun to achieve high accuracy and efficiency [22].", "[22] surveys the numerous methods proposed for face detection."]} +{"62537820|18440098": []} +{"207059176|9045232": ["Also, a survey of face detection methods (including ones using skin detection) can be found in [8]."]} +{"684724|9045232": ["Many researchers have focused on methods of identifying people in photo collections, having first detected faces using face detection techniques [3]."]} diff --git a/edge/graph_13501911.jsonl b/edge/graph_13501911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eabdeb5ab1e4db2448e58cf83216857d30a793f5 --- /dev/null +++ b/edge/graph_13501911.jsonl @@ -0,0 +1,11 @@ +{"7314067|1029120": []} +{"7434171|1113420": ["For such contextaware applications there have been many studies about how the overall framework need to be designed, such as the pioneering work of the Cyberguide [9] and ones introduced later in [10], [11], [12], etc."]} +{"35739369|15093118": ["An interesting survey in this direction is carried out by [11], where the authors compare various on-road vision based vehicle detection approaches.", "The main threats that a driver is facing are commonly from other vehicles and most of the fatal crashes involve more than one vehicle on road environment [10], [11].", "Inspired by the categories introduced by [11], we analyze the research literature following the domains highlighted in Fig."]} +{"35739369|206764452": []} +{"35739369|1029120": ["in road environment is a critical task for ADAS as addressed in [38]\u2013[41] to avoid vehicle to pedestrian accidents."]} +{"34894462|17934515": []} +{"9647051|1029120": ["Solutions based on vehicle embedded sensors (e.g. camera, laser, and radar) and computer vision technologies have been proposed [3], [8].", "Much attention has been put in detecting pedestrians and predicting the possibility of collisions using sensors and computer vision techniques [3].", "An important lesson provided by [5] and [6] is that without denying the possibilities of using both the systems in a combined way, Wi-Fi seems to be the primary choice especially for low-latency direct V2P communications."]} +{"7880448|8363289": ["Traditionally, MPC is used for a single-agent system, where the control input is obtained by numerically optimizing a finite horizon optimal control problem, where both nonlinearity and constraints can be explicitly handled [23]."]} +{"16139801|763939": ["Additionally, it can be used at an early stage to shed relevant guidelines for the design of CCA applications, by disclosing the influence of kinematic parameters on the collision process.", "Finally, conclusions and future work are remarked in Section 6."]} +{"1029120|2113024": ["The survey paper [32] covers not only the recent research on pedestrian detection but also describes the research on collision prediction using pedestrian"]} +{"1029120|206051485": ["A survey of registration methods is presented in [107]."]} diff --git a/graph_4473963.jsonl b/edge/graph_13509391.jsonl similarity index 100% rename from graph_4473963.jsonl rename to edge/graph_13509391.jsonl diff --git a/edge/graph_13510042.jsonl b/edge/graph_13510042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..582293da464cc93dea6b8d1ac1a449985a77beca --- /dev/null +++ b/edge/graph_13510042.jsonl @@ -0,0 +1,2 @@ +{"10960845|3102110": ["Deriving association rules from transaction databases is often the objective of data mining [2\u201311]."]} +{"19881938|3102110": []} diff --git a/graph_1352041.jsonl b/edge/graph_1352041.jsonl similarity index 100% rename from graph_1352041.jsonl rename to edge/graph_1352041.jsonl diff --git a/edge/graph_13526777.jsonl b/edge/graph_13526777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57617f8e63db0c8296b50f27cb3911b58878daa9 --- /dev/null +++ b/edge/graph_13526777.jsonl @@ -0,0 +1,3 @@ +{"9632567|30443041": []} +{"122654159|33286487": ["Thus, the BP or MF method may outperform the traditional signal representation methods, such as the short-time Fourier transform (STFT) [20], the Wigner distribution (WD) and its smoothed versions [ 21 ], and other OSR methods, such as MP [16], the method of frame (MOF)[18] and best orthogonal basis (BOB) [19]."]} +{"32819487|30443041": []} diff --git a/graph_4491892.jsonl b/edge/graph_13527831.jsonl similarity index 100% rename from graph_4491892.jsonl rename to edge/graph_13527831.jsonl diff --git a/graph_1353379.jsonl b/edge/graph_1353379.jsonl similarity index 100% rename from graph_1353379.jsonl rename to edge/graph_1353379.jsonl diff --git a/graph_4495234.jsonl b/edge/graph_13536847.jsonl similarity index 100% rename from graph_4495234.jsonl rename to edge/graph_13536847.jsonl diff --git a/graph_4518464.jsonl b/edge/graph_135371113.jsonl similarity index 100% rename from graph_4518464.jsonl rename to edge/graph_135371113.jsonl diff --git a/edge/graph_13543356.jsonl b/edge/graph_13543356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52649d83e2d421a3a69b2a5bd1d1cde4c8cf28dd --- /dev/null +++ b/edge/graph_13543356.jsonl @@ -0,0 +1,6 @@ +{"15992894|33286487": ["As pointed out by Cohen (1989), in signal processing the uncertainty principle merely relates the time duration of a signal to the frequency spread of its Fourier spectrum."]} +{"121714849|51852912": ["Loutas and Kostopoulos [3] presented a recent review on the applications of WT in rotating machinery diagnostics and prognostics.", "Authors requiring further information\nregarding Elsevier\u2019s archiving and manuscript policies are encouraged to visit:\nhttp://www.elsevier.com/authorsrights\nBearing fault detection based on hybrid ensemble detector and empirical mode decomposition\nGeorge Georgoulas a, Theodore Loutas b, Chrysostomos D. Stylios a,n, Vassilis Kostopoulos b\na Department of Informatics and Telecommunications Technology, Technological Educational Institute of Epirus, GR-47100, Greece b Department of Mechanical Engineering and Aeronautics, University of Patras, GR-26500, Greece\na r t i c l e i n f o\nArticle history: Received 11 October 2012 Received in revised form 18 February 2013 Accepted 25 February 2013 Available online 14 May 2013\nKeywords: Bearings Empirical Mode Decomposition Hilbert Huang transform Anomaly detection One-class classification Ensemble detector\na b s t r a c t\nAiming at more efficient fault diagnosis, this research work presents an integrated anomaly detection approach for seeded bearing faults."]} +{"207168547|33286487": []} +{"119391599|33286487": []} +{"110788047|33286487": ["the time localization and frequency resolution cannot be obtained at their highest simultaneously, either of them can only be enhanced at the expense of the other one, so that their time\u2013frequency resolution is limited [16\u201318].", "Various reduced interference distributions may suppress the negative effect of cross terms, but at the expense of a worse time\u2013frequency resolution or suppression of auto terms [16\u201318]."]} +{"108893941|33286487": []} diff --git a/edge/graph_135466805.jsonl b/edge/graph_135466805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9948c3489af4ce88c7602f5dd0839ef945fff826 --- /dev/null +++ b/edge/graph_135466805.jsonl @@ -0,0 +1,15 @@ +{"14020873|393948": ["[6] have considered this problem by proposing a theoretical framework to learn irreducible representations having both invariances and equiv-ariances, coming up with the best representation for any given task is an open question."]} +{"21011865|2323881": []} +{"21011865|393948": []} +{"3847983|20404279": ["Also, there is a recent review paper on GAN [15] which reviews several GAN architectures and training techniques, and introduces some applications of GAN."]} +{"3847983|4875951": ["This problem is related to style transfer [68] [69], which takes a content image and a style image and output an image with the content of the content image and the style of the style image."]} +{"52847135|2473564": ["Facial expression recognition (FER) is one of the most important tasks in computer vision which plays a crucial role in numerous applications in psychology, medicine, security, digital entertainment, and driver monitoring, to name a few [41, 5, 14, 6, 3]."]} +{"52847135|2323881": ["Most methods are conducted on classical hand-crafted visual features, such as local binary pattern (LBP) [64], histograms of oriented gradients (HOG) [11], and scaled-invariant feature transform (SIFT) [46], which have the limited representation power and may not handle the challenge of nonlinear facial texture warping caused by pose variation well [2, 8]."]} +{"18704280|206986719": ["Issues such as how to improve tracking and rendering [19,32] or how to integrate AR when using wearables [6] have been dominating the research agenda.", "Previous research on AR has predominantly focused on the technical challenges when using AR technology to superimpose the surroundings with virtual annotations [2,6,19,32]."]} +{"18704280|17024419": ["Issues such as how to improve tracking and rendering [19,32] or how to integrate AR when using wearables [6] have been dominating the research agenda.", "BACKGROUND Previous research on AR has predominantly focused on the technical challenges when using AR technology to superimpose the surroundings with virtual annotations [2,6,19,32]."]} +{"17024419|206986719": ["7a) that show 3D objects, or personal digital assistants/PDAs [161] (Fig."]} +{"17024419|469744": ["Compared to virtual environments, AR tracking devices must have higher accuracy, a wider input variety and band-width, and longer ranges [17].", "Following [17, 19], an AR system: \uf0b7 combines real and virtual objects in a real environment; \uf0b7 registers (aligns) real and virtual objects with each other; and \uf0b7 runs interactively, in three dimensions, and in real time.", "In the meantime, several surveys appeared that give an overview on AR advances, describe its problems, classify and summarise developments [17, 19, 28]."]} +{"20007182|393948": ["Disentangled representations [15, 16] allow conditional generative models that can generate sample data by changing corresponding factor codes."]} +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} +{"3100155|393948": ["To this end, we build on the success of deep learning \u2013 especially unsupervised autoencoder networks \u2013 to learn \u201cgood\u201d representations from large amounts of data [4]."]} +{"3273601|393948": ["Of all criteria of learning good representations as discussed in Bengio et al. (2013), disentangling factors of variation is an important one that helps separate various explanatory factors."]} diff --git a/graph_452134.jsonl b/edge/graph_135466824.jsonl similarity index 100% rename from graph_452134.jsonl rename to edge/graph_135466824.jsonl diff --git a/edge/graph_13558235.jsonl b/edge/graph_13558235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e9dddd06bb12783d70dba9f31b6aa7448110f4f --- /dev/null +++ b/edge/graph_13558235.jsonl @@ -0,0 +1,6 @@ +{"118539642|14545307": []} +{"7432925|14545307": []} +{"11577902|13558235": ["This suspicion is supported by the tendency for the most effective fractal coding algorithms not to rely on a purely self-affine representation, but to incorporate aspects of alternative coding strategies [13]."]} +{"6141692|14545307": []} +{"937637|14545307": []} +{"16011443|9020157": []} diff --git a/edge/graph_13558545.jsonl b/edge/graph_13558545.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d3526677c7a24a94c2223ade3b2442826855e40 --- /dev/null +++ b/edge/graph_13558545.jsonl @@ -0,0 +1 @@ +{"12606701|3204760": []} diff --git a/edge/graph_13564808.jsonl b/edge/graph_13564808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c301b1c6894a413ce5827d421db6bba6aef62855 --- /dev/null +++ b/edge/graph_13564808.jsonl @@ -0,0 +1,7 @@ +{"51614496|13564808": ["Some of the aforementioned HD representations were used for modeling of human\u2019s long-term associative memory (AM) [31], [32]."]} +{"11921974|5671282": ["Here, we note that the problem of designing an associative memory is closely related to the well studied nearest neighbor search (NNS) problem and its relaxation approximate nearest neighbor search (A-NNS) problem (Indyk and Motwani 1998; Andoni and Indyk 2008; Samet 2005; Wang et al. 2014)."]} +{"125616749|3693305": ["\u2026representations (embeddings, sketches, and LSH hashes) preserving similarity with the use of learning from existing data [17, 37, 38, 43, 56, 151, 152] (without a teacher, i.e., based on the preservation of initial distance/similarity measures between data or with a teacher, i.e., based on\u2026"]} +{"125616749|1596835": ["\u2026vector representations (embeddings, sketches, and LSH hashes) preserving similarity with the use of learning from existing data [17, 37, 38, 43, 56, 151, 152] (without a teacher, i.e., based on the preservation of initial distance/similarity measures between data or with a teacher, i.e., based on\u2026"]} +{"125616749|5671282": ["\u2026binary vector representations (embeddings, sketches, and LSH hashes) preserving similarity with the use of learning from existing data [17, 37, 38, 43, 56, 151, 152] (without a teacher, i.e., based on the preservation of initial distance/similarity measures between data or with a teacher, i.e.,\u2026", "It is partly compensated by the presence of the already developed arsenal of LSH families (mainly, for vectors) [41, 56, 43].", "Note that locality-sensitive hashing with a slightly other formulation was initially proposed for sublinear similarity search with the help of hash tables addressed by LSH hashes [39\u201343].", "\u2026binary or integer-valued components formed by LSH functions developed for concrete distance/similarity measures between the initial vectors are directly used for approximate sublinear search based on distance/similarity measures corresponding to these LSH functions in tabular structures [39\u201343]."]} +{"2739806|1596835": []} +{"2739806|5671282": []} diff --git a/graph_1357965.jsonl b/edge/graph_1357965.jsonl similarity index 100% rename from graph_1357965.jsonl rename to edge/graph_1357965.jsonl diff --git a/graph_2496836.jsonl b/edge/graph_13583748.jsonl similarity index 100% rename from graph_2496836.jsonl rename to edge/graph_13583748.jsonl diff --git a/edge/graph_13587055.jsonl b/edge/graph_13587055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8658d9e48bd949f9aee49591ad63ff2aaf8d65f7 --- /dev/null +++ b/edge/graph_13587055.jsonl @@ -0,0 +1 @@ +{"15822461|7839197": []} diff --git a/graph_4528002.jsonl b/edge/graph_13592072.jsonl similarity index 100% rename from graph_4528002.jsonl rename to edge/graph_13592072.jsonl diff --git a/graph_4551015.jsonl b/edge/graph_135984067.jsonl similarity index 100% rename from graph_4551015.jsonl rename to edge/graph_135984067.jsonl diff --git a/graph_456491.jsonl b/edge/graph_136108105.jsonl similarity index 100% rename from graph_456491.jsonl rename to edge/graph_136108105.jsonl diff --git a/graph_4582104.jsonl b/edge/graph_13621029.jsonl similarity index 100% rename from graph_4582104.jsonl rename to edge/graph_13621029.jsonl diff --git a/graph_4583335.jsonl b/edge/graph_1363053.jsonl similarity index 100% rename from graph_4583335.jsonl rename to edge/graph_1363053.jsonl diff --git a/edge/graph_13639132.jsonl b/edge/graph_13639132.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a8f3e9e52f087f2db66430317dd5e6cf114ee67 --- /dev/null +++ b/edge/graph_13639132.jsonl @@ -0,0 +1,17 @@ +{"10101876|6952653": ["With the development of the Internet, we find ourselves in hybrid artificial societies, where real world assumptions and the whole range of possible behaviors including deception must be taken into account (Ramchurn et al, 2004; Wooldridge and Jennings, 1994)."]} +{"1758012|20905429": ["However, recent technological advances in physiological sensors, processing capabilities, and wireless communications have enabled individuals to monitor their health status outside of hospitals via wearable biosensor systems [3]."]} +{"6824019|2294541": []} +{"6824019|1462862": []} +{"6824019|9240891": ["Some of them are based on online trust and reputation related systems (Jsang et al. 2007; Grandison and Sloman 2000; Artz and Gil 2007; Grabner-Kruter and Kaluscha 2003), others on trust and reputation in peer-to-peer systems (Koutrouli and Tsalgatidou 2006; Suryanarayana and Taylo 2004)."]} +{"109773833|622308": ["The brain fuses all this available information to perform a decision task [2, 6].", "Fusion of multi-sensor data has significant advantages over single source data [1-7]."]} +{"17511828|991041": ["Practically, the limited number of influence factors considered in the existing algorithms [5, 7, 12-16] cannot deliver enough performance."]} +{"3574892|1932843": []} +{"3574892|14148655": ["A recently emerging approach, thoroughly reviewed in [41], applicable in conjunction with any of the methods and family of methods described above, is the Elicitation by Critiquing, in which third party participants in the elicitation process are asked to critique SMEs actions or the resultant products of their actions in order to generate meaningful knowledge about"]} +{"7227073|7681233": ["Therefore, in trust modeling for MASs research field, most of the existing trust models are assessed using simulation or synthetic data [3].", "As each agent has only limited capabilities, it may need to rely on the services or resources from other agents in order to accomplish its goals [3].", "It is often difficult to find suitable real world data set for comprehensive evaluation of trust models, since the effectiveness of various trust models needs to be assessed under different environmental conditions and misbehaviors [3].", "For this reason, many researchers design their own simulation environments when assessing the performance of their proposed trust models [3].", "Recent survey such as [3][14] provide more insight on existing work in the field of MAS trust modeling.", "According to [3], most existing research on trust evaluation models can be divided into four main categories: direct trust evaluation models, that depends on past experience, indirect or reputation-based trust evaluation models, that depends on third-party testimonials from other agents in the same environment, socio-cognitive trust evaluation models, that depends on examining the social connections among agents to determine their trustworthiness, and organizational trust evaluation models, that depends on some organizational affiliations or"]} +{"7227073|1708582": ["The exploit-vs explore dilemma can be addressed by using the Boltzmann exploration strategy [20]."]} +{"7231580|2814871": ["Nowadays, performing gait analysis with inertial sensors as an important group of wearable sensors [1,2] has become indispensable in several \ufb01elds of research including biomechanics, neurorehabilitation, sport medicine, etc. [3\u20137]."]} +{"499750|700123": ["It is necessary to find a compromise between efficiency and bandwidth, well as to influences the geometric sizing of the antenna [125].", "Therefore, lowering the dielectric constant increases spatial waves and hence increases the impedance bandwidth of the antenna [125]."]} +{"499750|30383344": ["Fabric-based sensing has been a large field of research in the biomedical and safety communities [2]."]} +{"2296304|9240891": ["In the area of trust, Grandison et al. in their work \" A survey of trust in Internet application \" (Grandison and Sloman, 2000) examine the various definitions of trust in the literature and provide a working definition of trust for Internet applications."]} +{"1734833|30383344": ["Today, there are several reviews on the topic which provide an overview of the current state of the art [6\u20139]."]} +{"1734833|20905429": ["Today, there are several reviews on the topic which provide an overview of the current state of the art [6\u20139].", "are meaningful for decision [8]."]} diff --git a/edge/graph_13640443.jsonl b/edge/graph_13640443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d3d9f356ccd5604f26a0f663a94eceb84394993e --- /dev/null +++ b/edge/graph_13640443.jsonl @@ -0,0 +1,3 @@ +{"154794221|6308019": ["For example, in the airline industry, given a booking request that asks for seats in an itinerary in a speci\u00dec booking class, the fundamental revenue management decision is whether to accept or reject this booking, i.e., overbooking and seat inventory control [51].", "\u2026the pricing literature from the operations research/management science community that focus on revenue management for \u00dexed, perishable capacity [6] [51], and coordinated pricing and production/procurement decisions [12] [82], from the marketing community that focus on how markets behave [55],\u2026", "\u2026the goal of balancing demand and supply, early applications of dynamic pricing methods have been mainly in industries where the short term capacity (supply) is difficult to change, such as airlines, cruise ships, hotels, electric utilities, sporting events, and health care [28] [29] [51] [81] 2 ."]} +{"18615306|6308019": []} +{"32315930|6308019": ["revenue management literature is provided by McGill and van Ryzin (1999) ."]} diff --git a/edge/graph_13647359.jsonl b/edge/graph_13647359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b645c7ae7907cc866d4509cddf3c390723814d6 --- /dev/null +++ b/edge/graph_13647359.jsonl @@ -0,0 +1,6 @@ +{"18060|15299188": ["A survey on XML compression is presented in [7]."]} +{"202139|816774": ["Although PAX employs in-\npage vertical partitioning, it incurs minimal record reconstruction costs, because it does not need to perform a join to construct a result tuple."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} +{"7690873|12860838": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down."]} +{"7690873|10500613": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down."]} +{"7690873|913718": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down.", "There have been different formalizations of the matching operation and its result [11, 14, 19\u201321]."]} diff --git a/graph_4599995.jsonl b/edge/graph_13650919.jsonl similarity index 100% rename from graph_4599995.jsonl rename to edge/graph_13650919.jsonl diff --git a/graph_4606157.jsonl b/edge/graph_136700401.jsonl similarity index 100% rename from graph_4606157.jsonl rename to edge/graph_136700401.jsonl diff --git a/graph_2840997.jsonl b/edge/graph_13670251.jsonl similarity index 100% rename from graph_2840997.jsonl rename to edge/graph_13670251.jsonl diff --git a/graph_4606224.jsonl b/edge/graph_13678813.jsonl similarity index 100% rename from graph_4606224.jsonl rename to edge/graph_13678813.jsonl diff --git a/edge/graph_13681632.jsonl b/edge/graph_13681632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7a02ccd16b1fed3056c28ae1bf5c1a8d62b26bf9 --- /dev/null +++ b/edge/graph_13681632.jsonl @@ -0,0 +1,7 @@ +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"18016674|2623404": ["Compared with virtualized IT infrastructures, the current network infrastructures that connect the datacenters present ossification to provide emerging Internet services [1]."]} +{"206309520|3189715": []} +{"5969377|1580493": ["BVTs [15] are used to tune the bandwidth by adjusting", "[11] presented a spectrum efficient elastic optical network based on OFDM technology [15], [18].", "optical networks [11]\u2013[15] have been shown to be a promising", "Recent studies [15], [59], [60] on modulation based spectrum allocation claim that this type of spectrum allocation scheme increases the spectral utilization by approximately 9%\u201360% compared to fixed-modulation based spectrum allocation in the elastic optical network."]} +{"25828557|8650651": ["One can refer to a comprehensive survey in [34] for discussion on variations of the OVNE problem that take the energy-efficiency and survivability into account."]} +{"1580493|11720829": ["Depending on the relationship between the signals transmitted from different antennas, MIMO schemes can be used to either increase the overall capacity of the system, or to reduce the probability of outage [59][61]."]} +{"7493450|8530790": ["[85] compared different ordering methods in a simple (\u03bc + \u03bb) elitist framework without recombination: an adaptation of a co-evolutionary approach based on goal vectors [69], the non-dominated sorting and crowding scheme from NSGA-II [24], a combination of average ranking [19], and a sharing scheme based on the Epanechnikov kernel [35].", "conflicting objectives due to the increase in the number of non-dominated solutions, however, they did not provide further analysis [35]."]} diff --git a/edge/graph_13682164.jsonl b/edge/graph_13682164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9764cb46b257130dff4b4e33b703f55472d381c --- /dev/null +++ b/edge/graph_13682164.jsonl @@ -0,0 +1,5 @@ +{"10114193|7530272": ["Hidden Markov Models (HMMs) [18] are a class of well-studied models of sequential observations that have been widely applied in the context of sequence classi\ufb01cation [24].", "Existing approaches to predictive monitoring [14, 7] essentially map the problem to that of early sequence classi\ufb01cation [24]."]} +{"12189994|7530272": ["These examples illustrate that the problem of predictive process monitoring is a problem of early sequence classification [2]: given a trace of an uncompleted case (which can be modeled as a sequence of events with data payloads), we seek to predict as early as possible whether the outcome of the case will fall into a positive class or a negative class."]} +{"117248575|18188725": []} +{"117248575|8516210": []} +{"117248575|17403085": []} diff --git a/graph_4621813.jsonl b/edge/graph_13684121.jsonl similarity index 100% rename from graph_4621813.jsonl rename to edge/graph_13684121.jsonl diff --git a/edge/graph_13687435.jsonl b/edge/graph_13687435.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70c38c915b701d37da15e5aa66e77c18a4638262 --- /dev/null +++ b/edge/graph_13687435.jsonl @@ -0,0 +1,7 @@ +{"46895244|1798273": ["The matcher circuit is based on XNOR threshold logic gates [24] and the averaging operation to produce the output, which demonstrates the weighted value of how many bits from the testing image are similar to the bits of"]} +{"7673168|1798273": ["the proposed work utilizes memristive threshold logic gate [27], [28], owing to their efficiency."]} +{"4389085|1798273": ["Memristor devices due to its ability to memories and being able to mimic neurons \ufb01nd various applications [15,16,17]."]} +{"3937908|38476": ["Most supervised sequence learning algorithms use a batch-training paradigm, where a cost function, such as prediction error, is minimized on a batch training data set (Bishop, 2006; Dietterich, 2002)."]} +{"11924833|14681793": []} +{"11924833|7414579": ["Various implementations of LTGs have been investigated [64]."]} +{"1798273|7414579": ["The performance analysis of DRTLG and interconnect design was evaluated by comparing the performance of DRTL with 4-input LUT based CMOS FPGA [33], for some ISCAS-85 benchmarks.", "Modelling a neuron as a threshold logic gate (TLG) that fires when input reaches a threshold has been the basis of the research on neural networks (NNs) and their hardware implementation in standard CMOS logic [18].", "xn) = sgn(w1x1 + w2x2 + \u00b7 \u00b7 \u00b7 + wnxn) = sgn( n i=1wi xi \u2212 T ) (1) where the values of wi are the synaptic weights associated with the inputs xi , and T is the threshold that the gate needs to meet to fire, and n is the fan-in of the TLG [63].", "The first simplified mathematical model of the biological neuron was introduced by McCulloch and Pitts [17] in 1943 in the form of the threshold logic gate (TLG).", "The survey in [63] concludes with an interesting observation.", "The spin-torque switches based on magneto-metallic domain wall (DW) motion [91], [92] allows ultra-low voltage operation of mem-ristive TLGs leading to low energy dissipation at the gate level.", "[63] offer another insight: \u201cLastly, because nano (and reconfigurable) computing will probably get center-stage positions in the (near) future, TL will surely benefit from that.", "According to the analysis carried out in Matlab-Simulink/Cadence, the TLGs with Ag-Ch memristive devices had a fan-in of > 10, switched at > 1 GHz speed and dissipated lower static power than a corresponding CMOS implementation.", "The performance analysis done on common benchmarks show that the proposed hardware can achieve more than 100x improvement in energy and 1000x improvement in energy-delay product, as compared to the state of the art CMOS FPGA based TLG. Threshold logic computing using hybrid Memristive-CMOS cell architecture designed for Fast Fourier Transform and Vedic Multiplication have been proposed by James A.P. et al. in 2014 [93].", "The design exploration of reconfigurable Threshold Logic Gates (TLG) implemented using Silver-chalcogenide memristive Fig.", "The design was extended to the implementation of an image classifier which classifies a 3x5 image into a rectangle or a triangle using three 5-input TLG in the first level and a Goto pair based majority voter as shown in Fig.", "\u201d The fundamental reason, the authors point out, is that TLGs need full custom design and have been in direct competition with Boolean gates and a lot of research effort has been spent on improving boolean logic gates since the 1970s.", "The proposed re-programmable TLG shown in Fig.", "the literature, a comprehensive survey of which can be found in [63].", "The distinguishing feature of PTLA was the combination of Negative Differential Resistance (NDR) based molecular switch and a multi-level resistance memristor leading to the where w i are the synaptic weights associated to inputs x i and T the threshold that the gate needs to meet to fire, and n is the fan-in of the TLG [63]."]} diff --git a/edge/graph_13688847.jsonl b/edge/graph_13688847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a50a57308da3227b1157d46701b5565e6f33d10 --- /dev/null +++ b/edge/graph_13688847.jsonl @@ -0,0 +1,31 @@ +{"53019600|4880047": ["Therefore, it requires the UDN to ensure that all APs that interact with UE must also be secure [14]."]} +{"13746346|27262729": ["Since permissionless blockchain networks admit no identity con-trol, they can be vulnerable to a series of insider attacks by malicious consensus nodes [6].", "Among different types of attacks, double spending [7] is the most fundamental one and can be executed through various attacks such as gold\ufb01nger attacks, netsplit attacks and brute-force attacks [6]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"3546145|21386749": ["[44] reviewed the advances in health care which relies on Internet of Things (IoT) technologies.", "In particular, the work [44] also included security related taxonomies in the context of healthcare."]} +{"10184200|14171067": ["In computational science, the matrix dimension n can grow up to Billions [57], [36], [7], [28], and thus a petaflops machine may take several months to solve the matrix product, which may serve as an PoX for cryptocurrencies.", "The choice behind matrixbased problems is two-fold: (1) matrices have interesting composability properties that help in tuning difficulty, collaborative verification, and pool-mining (see later); and (2) matrix-based problems span a wide range of useful real world problems, being a principle abstraction for most scientific computation problems, among them: DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15],", ") as in DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15], [2], collaborative-filtering recommendation, data mining [28], computational geometry [19],"]} +{"46936025|13756844": []} +{"52902867|3757239": ["There are many different derivations of edge computing, including MEC, fog computing and cloudlet [11]."]} +{"52136125|13688847": ["To overcome the flaws and vulnerability caused by centralization at the data processing stage, we resort to the emerging technology of permissionless blockchains [5].", "Blockchains use the public key infrastructure (PKI) mechanism and the data structure of hash linked list to ensure that the time order and the content of a data record (also known as a transaction) cannot be tampered without being noticed once it is confirmed on the chain [5].", "The blockchain network adapts the scheme of Proof-of-Work (PoW) [6] for Sybil attack prevention [5].", "However, since most of the popular Bitcoin-like blockchains rely on the Nakamoto protocol [6] for achieving probabilistic consensus, they are severely limited by their throughput bottleneck1 [5].", "To ensure that the blockchain\u2019s data processing capability matches the volume of data traffic from the sensor cloud, we adopt the scalable consensus protocol based on sharding [5] in the considered sensing system."]} +{"6634488|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [93], [94], [95]."]} +{"49863956|206578486": ["1, which includes edge, fog, and cloud stratum [21]."]} +{"49863956|8523192": ["models enable real-time surveillance leveraging the fog computing paradigm [20]."]} +{"19258692|3488022": ["With regard to this, Fingasa and Brownb [7] collected a variety of airborne big data in different seas where oil spills occurred previously.", "[7] M. Fingasa and C. Brownb, \u201cReview of oil spill remote sensing,\u201d Marine Pollution Bull., vol. 83, no. 1, pp. 9\u201323, Jun. 2014."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"52296722|56895323": []} +{"52296722|13688847": ["BLOCKCHAIN networks were first designed to be the backbone of a distributed, permissionless/public database for recording the transactional data of cryptocurrencies in a tamper-proof and totally ordered manner [2], [3]."]} +{"52296722|27262729": []} +{"26619090|18973396": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"26619090|3241708": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"3434731|1598350": []} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"206456796|27262729": ["This consensus mechanism guarantees the security and dependability of blockchain systems [4], [5].", "The core point to guarantee transaction integrity and validity in blockchain is a computational process defined as mining [4], [5]."]} +{"69787562|3767252": ["edge computing are extensively discussed in [46]."]} +{"51908762|37109390": ["Unfortunately, these proposals have not seen significant adoption in practice, primarily due to a lack of sufficient peer participation [4, 37]."]} +{"4610350|18125683": ["These costs can be expressed as a function of the needed resources and the network overhead or follow monetary policies [19]."]} +{"64681061|3205677": ["In contrast to the so called \u201ccrash recovery\u201d fault which does not impact the rest of the system, \u201cByzantine\u201d fault means that even when a node fails with an arbitrary and inconsistent behavior, it may continue interacting with the rest of the system, or collude in order to devise more malicious output [32]."]} diff --git a/edge/graph_13689658.jsonl b/edge/graph_13689658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f4456845baa462ea11f3f7d7603690bc39d266f --- /dev/null +++ b/edge/graph_13689658.jsonl @@ -0,0 +1,13 @@ +{"6575064|14970359": []} +{"6575064|9045232": []} +{"15298586|207060556": ["We denote this initial estimate as x, which for face alignment is commonly a mean face aligned to the output of a face detector [60]."]} +{"3629260|206764452": ["In the context of autonomous cars a driving assistance system could take advantage of head pose estimation for decelerating the car when pedes-trians do not notice the presence of the vehicle [2]."]} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"13877746|11187079": ["A rel vant but different problem is 3D face reconstruction, which recovers the detailed 3D surface model from one image, multiple images, or an image collection [9, 27]."]} +{"2752739|16010181": ["Given its importance, face alignment has been an active research topic since 1990s [29], with the well-known Active Shape Model [5] and Active Appearance Model (AAM) [15, 13]."]} +{"62600805|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"7877172|14303607": ["Accurate localization of detailed facial features provides an important building block for many applications including identification [3] and analysis of facial expressions [17]."]} +{"215721|14303607": ["Accurate object shape computation is key to many visual tasks; for instance, classification of facial expression [17, 30], facial identity [38], action analysis [4], and fine-grained categorization [34, 3, 18, 40] require accurate registration of a (deformable, part-based) model to the image."]} +{"215721|9045232": ["The shape of human bodies and human faces has attracted particular attention [43, 46, 33, 2]."]} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"641127|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} diff --git a/edge/graph_13691029.jsonl b/edge/graph_13691029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..215e7126d6cfc82e8de0551ecc588df132196326 --- /dev/null +++ b/edge/graph_13691029.jsonl @@ -0,0 +1,8 @@ +{"206086325|2128503": []} +{"206086325|15589021": []} +{"94337069|13187484": []} +{"206457434|7260566": []} +{"96700961|11407374": ["[1] Y."]} +{"93200757|15589021": []} +{"93399142|11407374": []} +{"26404543|11407374": []} diff --git a/edge/graph_13695008.jsonl b/edge/graph_13695008.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..367b40ff31a1b17364b850a2122f1c1be77ef9d3 --- /dev/null +++ b/edge/graph_13695008.jsonl @@ -0,0 +1,9 @@ +{"15062193|1230643": ["The stick installs as USB device on the PC/PDA.", "Keywords: Wireless sensor networks; Low-power; Auto-configuration; Self-organising networks"]} +{"673793|194321": ["Nevertheless, many users would still accept installing the sensing application in order to participate in opportunistic sensing because they can receive incentives [25,26], or are altruistic by themselves for the greater societal benefit."]} +{"23344039|1230643": ["A wireless sensor network (WSN) [1] is a special type of ad-hoc network composed of resource-constrained devices, called sensor nodes."]} +{"18306152|7988320": []} +{"18306152|7085121": []} +{"18306152|562065": []} +{"18306152|15300368": []} +{"18306152|1503157": ["This issue can be addressed by integrating RFID with WSN as WSN provides longer reading range as well as other benefits like different network topologies and flexibility, variety of sensors that are already implemented and low power consumption [31]."]} +{"18306152|1236072": ["techniques [7, 13, 14], MAC protocols [15\u201317], congestion control [18, 19], data col-"]} diff --git a/edge/graph_13696533.jsonl b/edge/graph_13696533.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7eb4d88cfec2f9825002045179362855a1ffe4ee --- /dev/null +++ b/edge/graph_13696533.jsonl @@ -0,0 +1,15 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"16915526|15563159": []} +{"13999578|393948": ["On the other hand, representation learning obtains data representations that make it easier to extract useful information when building classifiers or other predictors [9].", ", graph analytics [8] and representation learning [9]."]} +{"9648797|7983519": []} +{"9648797|17323154": ["These are two well-known tasks referred to in the literature as text categorization [182] and document clustering [33], respectively."]} +{"9648797|8310135": ["The task of recognizing NEs is a well-known problem in NLP (see [126] for a survey) and it has attracted a lot of interest in recent years, since information about NEs can benefit a variety of high-end applications such as, for instance, Web search [12]."]} +{"207238980|393948": []} +{"207238980|11608263": ["In a typical node classification task, we are interested in predicting the most probable labels of nodes in a network [33]."]} +{"11202498|12161567": ["the place of birth attribute is missing for 71% of all people included in FreeBase (Nickel et al. 2015)."]} +{"2127100|12161567": ["We begin by introducing notation to de\ufb01ne the task, largely following the terminology in Nickel et al. (2015).", "This has motivated research in automatically deriving new facts to extend a manually built knowledge base, by using information from the existing knowledge base, textual mentions of entities, and semi-structured data such as tables and web forms (Nickel et al., 2015).", "Several approaches (Nickel et al., 2015) use a margin-based loss function."]} +{"52076072|13696533": []} +{"31814909|2565171": []} +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"52109970|13696533": ["Therefore, these embeddings are unable to reflect the dynamic nature of ambiguous words(1), in that they can correspond to different (potentially unrelated) meanings depending on their usage in context (Camacho-Collados and Pilehvar, 2018)."]} +{"214815108|393948": ["This is a typical init method in neural nets research (Goldberg, 2015; Bengio et al., 2013)."]} diff --git a/edge/graph_13702914.jsonl b/edge/graph_13702914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b2f167044056670833da7633c1f4823ad8b91f6 --- /dev/null +++ b/edge/graph_13702914.jsonl @@ -0,0 +1,3 @@ +{"35197122|3350723": ["Unfortunately TORO is unlikely to be available outside DLR. Recent robots such as REEM-C have encoders both at the motor and at the joint side.", "This goal can be reached when the design of the robot is done in collaboration with an industrial partner mastering the integration known-how, or with institutes having strong technological centers such as DLR [8] and IIT [2].", "[8], the Atlas robot provides high torques with high bandwidth, but it is generating loud sounds, needs high power and has high friction/stiction that complexify its control.", "Torque controlled robots such as TORO [8] or DURUS [5] are very promising to deal with unplanned contact with the environment and humans."]} +{"206775580|205007974": ["[25] provide a thorough review and classification of the many ways to provide and modulate stiffness in VSAs."]} +{"15131414|14350495": ["To address these problems, CHIMP leverages techniques from telerobotics (Sheridan 1992), including a virtualized/augmented reality interface (Kanade, Rander, & Narayanan, 1997; Tzafestas, 2006) that is incrementally updated in real time (Kelly et al., 2011).", "CHIMP, the CMU Highly Intelligent Mobile Platform\n\u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022 \u2022\nAnthony Stentz, Herman Herman, Alonzo Kelly, Eric Meyhofer, G. Clark Haynes, David Stager, Brian Zajac,"]} diff --git a/graph_4634283.jsonl b/edge/graph_13709071.jsonl similarity index 100% rename from graph_4634283.jsonl rename to edge/graph_13709071.jsonl diff --git a/edge/graph_13709273.jsonl b/edge/graph_13709273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d3cb4df172102f08d69561871d2b7ff7f67c6eb --- /dev/null +++ b/edge/graph_13709273.jsonl @@ -0,0 +1,24 @@ +{"8882198|15255963": ["accurately modeled as a finite-state Markov channel in a slow fading environment [18], [19], [20]."]} +{"8960203|2623404": []} +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} +{"52805691|1932843": ["\u2026of trees or controller nodes ~q while starting at state s is given recursively by:\nV (~q, s) = R(~a~q, s) + \u2211 s\u2032,~o T (s\u2032,~a~q, s)O(~o,~a~q, s\u2032)V (~q~o, s\u2032),\nwhere ~a~q are the actions defined at ~q, while ~q~o are the subtrees or resulting nodes of ~q that are visited after ~o have been seen."]} +{"205692867|10329355": []} +{"47112135|8909218": ["Digital Subscriber Line (DSL) or cable moderm) [1]."]} +{"9474430|8974063": ["Furthermore, a survey on spectrum decision in cognitive radio networks was presented in [30], machinelearning techniques in cognitive radios was surveyed in [31], techniques for improving reliability of wireless networks using cognitive radios were surveyed in [32] and a survey of artificial intelligence for cognitive radios was presented in [33]."]} +{"9474430|12187956": []} +{"9474430|1708582": ["where the optimal Q-value Q\u2217(s, a) of each state-action pair (s, a) can be calculated by the value iteration method [136] or Q-learning [138].", "The optimal policy is given by: where the optimal Q-value Q \u2217 ( s, a ) of each state-action pair ( s, a ) can be calculated by the value iteration method [136] or Q-learning [138]."]} +{"11508732|8909218": ["Recently, a new type of indoor Base Station (BS), called femtocell, has gained the attention of the industry [1].", "Femtocells are expected to bene\ufb01t both end-users and network operators [1]."]} +{"1708582|17464562": []} +{"27089751|18507919": []} +{"27089751|12204996": ["In recent years, many learning algorithms have been developed in an attempt to maximize system performance in non-deterministic settings.(8,11,12) Generally, learning algorithms guarantee that collective behavior converges to a coarse equilibrium status."]} +{"8557115|18507919": ["This model must be able to balance network availability with information accuracy in delivering data [4\u20138].", "A fundamental challenge of QoS management is that relatively scarce network resources must be selected and allocated in a prudent manner to maximize system performance [7, 8]."]} +{"6556803|14132386": ["Moreover, routing protocols are responsible for discovering the optimized routes in multi-hop transmissions [48]."]} +{"6556803|28670512": ["can be transformed to an MDP with belief state [34], [35]."]} +{"6556803|9494512": ["In many locations, solar energy is considered the most practical source for WSN recharging [88]."]} +{"6556803|12060835": [", thermal and radiant energy, for a sensor node\u2019s battery [85]."]} +{"9431951|17109970": []} +{"2436829|9862516": ["IoT finds an interesting application in monitoring the environment [5], [6] in and around the industry, thus leading to the term green IoT [7]."]} +{"5555943|12452682": []} +{"15528648|3348390": [", [4] and [44]), it is established that one of the most appropriate formats to manage context is ontology."]} +{"957566|1708582": ["For any learning algorithm, there are two important performance criteria: consistency and regret bounds [3]."]} +{"16590948|12452682": []} diff --git a/edge/graph_13709403.jsonl b/edge/graph_13709403.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e33afc6856551e82c4b0e6e6ae299a1c8185f96 --- /dev/null +++ b/edge/graph_13709403.jsonl @@ -0,0 +1,21 @@ +{"206769463|7788290": []} +{"13164291|17516538": []} +{"1398960|5755403": []} +{"206592484|456491": []} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"4236070|4915696": ["[39]"]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"5968923|9045232": ["Although the results of our evaluations are encouraging, they confirm that there is still room for improvement in terms of robustness to out-of-plane rotation, blur and occlusion.", "The image patch covered by the window is accepted as a face if the combined score exceeds a threshold."]} +{"5962058|5755403": ["A lot of works have been done on trajectory clustering (Hu et al, 2004; Morris and Trivedi, 2008)."]} +{"5962058|17516538": ["A lot of works have been done on trajectory clustering (Hu et al, 2004; Morris and Trivedi, 2008)."]} +{"4915696|5755403": ["Although many algorithms have been developed to track, recognize and understand the behaviors of various objects in video [9], they were mainly designed for common scenes with a low density of population [5], [6], [10]."]} +{"4915696|17516538": ["Motion patterns learning is important in automated visual surveillance [5], [6], [21].", "To fuse information from multi-sensors is always an effective way to reduce the confusion and to improve the accuracy [6].", "Video analysis and scene understanding usually involve object detection, tracking and behavior recognition [5], [6].", "In this work, we use the Horn/Schunk - Lucas/Kanade method proposed by Bruhn et al. [6] which we found to be a good compromise between precision and speed.", "Although many algorithms have been developed to track, recognize and understand the behaviors of various objects in video [9], they were mainly designed for common scenes with a low density of population [5], [6], [10]."]} +{"12066020|4875951": ["[24], and they point out that no generative methods can adjust the brush stroke size in real-time."]} +{"1192198|1029120": ["Gandhi and Trivedi [20] focus on the pedestrian protection application in the intelligent vehicle domain."]} +{"1192198|192934": ["multilayer neural networks [33] implement linear discriminant functions in the feature space in which input patterns have been mapped nonlinearly, e.", ", mean squared error [33]."]} +{"1192198|7788290": ["The authors of [ 21 ], [47], [57] cover methods for people detection, body pose estimation, and activity recognition.", "At this point, we omit discussion of complex 3D human shape models [ 21 ] and focus on 2D pedestrian shape models that are commonly learned from shape contour examples."]} +{"207565051|5755403": []} +{"207565051|43033940": []} +{"207565051|17516538": []} diff --git a/graph_4668524.jsonl b/edge/graph_1371028.jsonl similarity index 100% rename from graph_4668524.jsonl rename to edge/graph_1371028.jsonl diff --git a/edge/graph_13710933.jsonl b/edge/graph_13710933.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..febe80b3969aebe5e9439abaa78adbeedccbc244 --- /dev/null +++ b/edge/graph_13710933.jsonl @@ -0,0 +1,2 @@ +{"206699243|17381415": ["Voltage and frequency monitoring is typically used in order to trip the inverter in case of OUV or OUF, and thus, islanding detection is achieved [33].", "itoring techniques showing robustness over grid background harmonics and disturbances are reported in [33], where different phase-locked-loops (PLL) structures are"]} +{"12440312|12083425": []} diff --git a/graph_4694555.jsonl b/edge/graph_13717517.jsonl similarity index 100% rename from graph_4694555.jsonl rename to edge/graph_13717517.jsonl diff --git a/edge/graph_13726263.jsonl b/edge/graph_13726263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..805e5bd8624f4b5a12c499a89d96b42730d36982 --- /dev/null +++ b/edge/graph_13726263.jsonl @@ -0,0 +1,2 @@ +{"12307797|3102110": ["This technique is referred to as scan reduction in [6]."]} +{"3489319|3102110": ["This feature is very interesting since unsupervised classication is another important problem in data mining [ 6 ] and in machine learning."]} diff --git a/edge/graph_13738536.jsonl b/edge/graph_13738536.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..049f360c9825668466558165b62da30df4c25b36 --- /dev/null +++ b/edge/graph_13738536.jsonl @@ -0,0 +1,53 @@ +{"1639699|3054454": ["Because the statistic channel characteristics are functions of the multipath\u2019s mean angle of arrival [34], its coherence period is generally much longer than that of the instantaneous channel realizations (e."]} +{"109453770|14889616": ["For the Scalable Video Coding (SVC) extension (ITU-T 2007; Schwarz and Marpe 2007) of the advanced video coding (AVC) standard H."]} +{"109453770|41035405": []} +{"26256624|15985428": ["Here, the edge graph-coloring problem can efficiently mitigate interference conflicts in different timeslots through Bi-partite graphs [44].", "The objective of this problem is to minimize the number of colors so as no vertex can use two edges with the same color [44][45]."]} +{"26256624|7892994": ["Several review papers in literature [6], [9], [10] discuss inter-cell interference coordination in the context of emerging wireless technologies.", "Furthermore, [10] discusses in general terms scheduling through Interference Avoidance / Coordination to mitigate interference in a multi-cell environment."]} +{"17021375|7851743": [", backhaul capabilities, large system or sparse system structures, energy efficiencies), which constitute the wir eless environment and network situations, see [60]\u2013[70] for examples driving thi s trend."]} +{"7921587|8909218": ["layout of micro-sites [48]\u2013[51], picocells and femtocells [52]\u2013[58], and CoMP technology [59] as well as the new", "Heterogeneous Networks [44-61] Network architecture design", "A detailed description of femtocellular networks from both the technical and business aspects can be found in [58], where the challenges of implementing these networks and some potential research opportunities are also introduced.", "The energy-efficient MIMO and OFDMA schemes in multi-cell scenarios need to be further investigated. only BS site Not introduced in this paper - Service Differentiation [42,43] both BS site and Terminal site - Heterogeneous Networks [44-61] Network architecture design Relay and Cooperative Communications [62-71] both BS site and Terminal site - MIMO [72,73,75] both BS site and Terminal site - - [28,29,74,76-78] only Terminal site OFDMA [81,82,84] both BS site and Terminal site - [32,79] only BS site [80,83] existing work only considers the single cell scenarios.", "It is indicated in [58] that femtocellular networks must deal with additional timing and synchronization, as well as interference management issues, which cause more signaling overhead and potentially more energy consumption."]} +{"7921587|16629628": []} +{"8462498|9321930": ["Thirdly, the format of relay: 1) amplify-relay, decode-relay or compress-relay, and 2) single relay or multiple relays [101]."]} +{"8462498|2926549": ["The false deduction from composite STA signals may propagate the error to following calculations [25]."]} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"14444258|3054454": ["antenna spacing is sufficiently large [27], which means that the elements of \u03bbR are of similar magnitude."]} +{"2494137|3054454": ["For an overview of the numerous scattering models, see [10]."]} +{"17591210|11720829": ["THE SUCCESS story of MIMO technology in terrestrial applications now spans more than a decade with spectacular results, as it offers substantial leverage in realizing the next generation gigabit wireless [1].", "[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"17591210|18148591": ["[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"7607567|7686677": ["to ensure eco-sustainability and to keep low operative costs [70]."]} +{"7607567|12884178": ["Therefore, with this kind of relaying, the RRM module has to cope with the presence of both multi-hop connections and MBSFN frame structure (an overview on RRM schemes for OFDMA-based wireless networks with relay nodes can be found in [84]); this has impact on the end-to-end packet delays."]} +{"2133180|10937383": []} +{"706371|18148591": ["Inter-cell interference is treated as noise at the receiver side and is handled by resorting to improved point-to-point communications between the base station (BS) and the mobile station (MS), using efficient coding and/or single-link multiple-antenna techniques [2]."]} +{"26121715|18148591": ["A LTHOUGH the utilization of multiple-input\u2013multipleoutput (MIMO) technology at the physical layer of wireless systems would significantly improve their performance [1], an efficient scheduling algorithm at the data link layer is needed in multiuser systems to efficiently exploit the benefits of that leading-edge technology."]} +{"7286287|18148591": ["This is an expansion of the analysis presented in [15] for CDMA communications and therefore it is directly linked to it.", "This relation comes from the fact that channel taps in MIMO systems have an effect similar to the one from spreading signatures in CDMA [16].", "Although the analysis in [15] is done for multiple access interference (MAI) present in code division multiple access (CDMA) schemes, it can be modified and applied to the ICI that exists in MIMO systems as will be shown in this paper."]} +{"8508945|17966235": []} +{"7902298|11720829": ["The combination of STBCs with MIMO-OFDM was, for example, considered in [19],"]} +{"7902298|18148591": []} +{"114338764|1588237": ["This approach can be Inria compared to fractional frequency reuse schemes [1], where an amount of resources is dedicated to edge users.", "Common schemes include reuse-n schemes where neighboring cells do not interference on each over resources, as well as fractional frequency reuse (FFR) schemes [1]."]} +{"12069073|7851743": []} +{"12069073|12884178": ["Conversely, the survey in [30] provides neither an in-depth discussion nor an analysis in terms of interference mitigation, resource utilization and QoS.", "Several surveys and reviews [23], [27]\u2013[30] related to the RRM for HetNets with femtocells and RNs have been published recently."]} +{"12069073|8909218": ["\u2022 Improved QoS satisfaction: Since a femtocell typically serves a small number of mobile users, more resources can be received by each user, thus leading to better QoS [24].", "This \u201cplug and play\u201d feature enables mobile operators to save the backhaul cost as the traffic of the femtocell can be carried via subscribers\u2019 broadband communication links (such as the digital subscriber line [24], fiber optic and satellite links [36]) to the core network.", "1) Femtocells: A femtocell, also known as the Home evolved NodeB (HeNB), serves as a short-range BS with low transmission power, mainly to be deployed in indoor environments [24]."]} +{"15987497|7686677": []} +{"206576720|7686677": ["Meanwhile, with excessive power consumption in wireless communications networks, both carbon emissions and operator expenditure increase year by year [2], [3]."]} +{"13951414|3054454": ["A metropolitan or wide-area scenario is considered with the channel vector distributed as , where the covariance matrix, , is assumed to be dominated by a single (or a few) eigenmodes; that is, there is significant correlation, which is typical for cellular systems with elevated base stations [15]."]} +{"19970930|11720829": ["In particular, the spatial multiplexing capability of SU-MIMO is determined by signal-to-interference-plus-noise ratio (SINR), correlation of channels among antenna elements, and the minimum number of the transmit and receive antennas [1].", "INTRODUCTION Multiple-input multiple-output (MIMO) can provide spatial multiplexing gain, diversity gain, and interference reduction capability [1]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"18296948|11720829": ["I. INTRODUCTION\nUSING the spatial multiplexing technique to transmitsignals over a point-to-point multiple-input-multipleoutput (MIMO) channel has attracted great attentions because of its capability to deliver remarkable capacity gain [1]- [3]."]} +{"110210460|47147736": []} +{"8538839|8909218": ["Massive MIMO schemes, with hundreds of antennas at each cell site [3]\u2013[5], and in the form of multi-tier networks of densely deployed small-cells [6], [7]."]} +{"42716702|14379823": ["Different aspects of CAC design and performance analysis, particularly in the context of broadband integrated service digital network (B-ISDN) based on asynchronous transfer mode (ATM) technology, have been investigated in [2]."]} +{"20061348|18148591": ["Reference [3] and the works cited therein give an overview of the various aspects and issues involved in MIMO systems and their performance."]} +{"32602976|11720829": []} +{"32602976|7892994": []} +{"4939166|13738536": ["USER scheduling is one of the crucial issues in MU-MIMO which supports multiple users simultaneously in the same frequency and time based on spatial-division multiplexing [2].", "Since it was revealed that the performance degradation of linear beamforming schemes compared to optimal dirty-paper coding (DPC) [3]\u2013[5] for a Gaussian MIMO broadcast channel is negligible with proper user scheduling as the number of users in the cell becomes large [6], [7], extensive research has been conducted on user scheduling for MU-MIMO for the last decade (see [2] and references therein)."]} +{"3021451|15453366": ["2520912 challenge of bandwidth shortage [1]\u2013[3]."]} +{"37925315|12681089": []} +{"1508227|1230643": ["In view of the fact that the functionality of a eukaryotic cell relies on the complex network of biochemical processes, which must be highly regulated and controlled, two kinds of signalling pathways, i.e., intracellular signalling and intercellular signalling, are emphasized in cellular processes."]} +{"10239043|7892994": ["For example, the work in [1] provides a survey for scheduling and interference mitigation algorithms in LTE, but does not offer any qualitative or quantitative evaluations."]} +{"17458674|8323234": ["Such large antenna array can provide sufficient antenna gain to compensate the excess free space propagation loss via beamforming [3].", "This is because that wavelengths at mmWave frequencies are small compared to the size of the obstacles encountered during propagation, leading to p oor diffraction [3].", "On one hand, mmWave can provide more than 2 GHz bandwidth for communication [2], which is much wider than the 20 MHz bandwidth in current 4G wireless communication system.", "On the other hand, the short wavelengths associated with mmWave frequencies enable a large antenna array to be packed in a small physical dimensio n, which means that MIMO with a large antenna array can be easily employed at mmWave frequencies to considerably improve the spectrum efficiency [3].", "The bandwidth at mmWave frequencies is in order of GHz, which is much wider than, for example, 20 MHz for current 4G wireless communication systems at cellular frequencies [1].", "Precoding can support multi-user/multi-stream transmiss ion by maximizing desired signal strength and eliminating inte rfernces among users/streams at the transmitter in advance [3] , which plays an indispensable role in MIMO systems.", "Therefore, th e large number of RF chains with the prohibitively high energy consumption is a bottleneck for mmWave MIMO systems with large antenna arrays in practice [1], [3].", "For example, in [3], the authors propose an adaptive channel estimation scheme, which combines the adaptive CS algorith m with the idea of multi-resolution codebook in traditional analog beamforming [6].", "One key challenging problem is that each antenna in MIMO systems usually requires one dedicated radio-frequency (R F) chain, including low-noise amplifiers, high-resolution di gitalto-analog converters (DACs), and so on [3].", "For example, due to the high frequency and wide bandwidth of mmWave, the energy consumption of each RF chain at mmWave frequencies (30-300 GHz) is about 250 mW, which is much larger than 30 mW per RF chain at cellular frequencies (sub-6 GHz) [3].", "A study has shown that the average number of NLoS clusters in a 28 GHz outdoor mmWave communications is only 2.4 [2].", "It has been shown in [3] that the proposed adaptive channel estimation scheme can accuratel y estimate the entries of multipath channel with low SNR.", "However, mmWave MIMO systems are expected to be broadband, where the bandwidth of channel is in the order of GHz, much larger than the coherence bandwidth.", "Moreover, though scattering occurs due to irregularities and roughnesses of surfaces, the scatterin g at mmWave frequencies induces additional 15-20 dB attenuation [3], leading to a limited number of NLoS clusters with small power.", "For example, at 28 GHz, the atmospheric loss is only 0.1 dB/km (including vapor and oxygen), while the rain attenuation is about 1 dB/km (moderate rain) [2]."]} +{"5412001|19938676": ["identified as a key technology in the architecture for 5G cellular networks [5], [125], [126]."]} +{"8212331|3054454": ["One scenario where this applies is the downlink of cellular systems with elevated base stations [18]."]} +{"21381783|15453366": ["The millimeter wave channel characteristics, to a large extent, dictate the choice of physical (PHY) layer and medium access control (MAC) layer schemes as well as the hardware implementation [11], [12]."]} diff --git a/edge/graph_13743252.jsonl b/edge/graph_13743252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c7d431e0fafcc898cd665a280d569b54a666f6c --- /dev/null +++ b/edge/graph_13743252.jsonl @@ -0,0 +1,15 @@ +{"37925315|12681089": []} +{"10045985|6909107": ["By deploying MEC servers therein, wireless devices can offload part or all of their computation-heavy and latency-sensitive tasks to APs and/or BSs for remote execution [1]\u2013[3]."]} +{"10045985|10299098": ["We consider partial offloading, and assume that the computation task can be arbitrarily partitioned into various parts to be computed in parallel [2], [3].", "Accordingly, the user\u2019s energy consumption for local computing is [3]", "Depending on whether the computation tasks are partitionable, the computation offloading can be generally categorized into two classes, namely binary and partial offloading [3]."]} +{"10045985|206578365": ["Accordingly, the user\u2019s energy consumption for local computing is [2]", "Depending on whether the computation tasks are partitionable or not, the computation offloading can be generally categorized into two classes, namely binary and partial offloading, respectively [2]."]} +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"5569656|3994942": []} +{"3645740|7851743": ["In contrast to other surveys in the area, such as [10], which", "In SON, the concept of self-optimization can be defined as a function that constantly monitors the network parameters and its environment and updates its parameters accordingly in order to guarantee that the network performs as efficiently as possible [10].", "The concept of SON in cellular networks was defined in [10]", "needs to reconfigure its parameters [10].", "feeding more data to the system, adding more features to the input data or adding more layers in a NN, without it limitlessly increasing its complexity [10].", "work that is also scalable, stable and agile enough to maintain its desired objectives [10].", "These categories are: self-configuration, self-optimization and self-healing and are commonly denoted jointly as self-x functions [10].", "Based on that, it is assumed that the reader already is familiar with SON concepts and its use cases, otherwise the reader can refer to [10].", "Self-healing in cellular systems can occur in terms of network troubleshooting (fault detection), fault classification, and cell outage management [10]\u2013[13]."]} +{"3645740|6105131": ["which focused on basic definitions and concepts of selforganizing systems and how could self-organization be applied in the context of wireless sensor networks, or even [21],"]} +{"3645740|1708582": ["For readers interested in Reinforcement Learning, please refer to: [184] and [185]."]} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"912812|7686677": ["Current technologies that address energy-efficient resource management for cooperative and competitive HetNet systems under a variety of network objectives and constraints is not yet fully developed [20]."]} +{"3055684|12060835": []} diff --git a/edge/graph_13745207.jsonl b/edge/graph_13745207.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e67d0ee694468c145ff1598174b523f49041249 --- /dev/null +++ b/edge/graph_13745207.jsonl @@ -0,0 +1,58 @@ +{"19518939|31245252": ["Internet of things (IoT) [1], [2] is an integral part in today\u2019s development of smart city."]} +{"19518939|2623404": ["To overcome these shortcomings, software defined wireless networking (SDWN) [15] was proposed based on the paradigm of software defined networking (SDN) [17].", "[15] S. Costanzo, L. Galluccio, G. Morabito, and S. Palazzo, \u2018\u2018Software defined wireless networks: Unbridling SDNs,\u2019\u2019 in Proc.", "(EWSDN), Oct. 2012, pp. 1\u20136."]} +{"36997628|7842253": []} +{"12655649|1230643": ["Wireless sensor networks (WSN) play an important role in many industrial [1], health [2] and body monitoring systems [3,4], seismic vibration sensing [5], ad-hoc systems [6] and spectrum sensing [7] applications.", ", if the value of one objective function is in the range [0, 1] and the value of second objective is in the range [0, x] (where 1 < x \u2264 \u221e), then the second objective produces bias in the weighted fitness function.", "In this work, we normalize all the objective values within the range [0, 1]."]} +{"11810527|12029139": ["In the context of our system, the wireless energy sources fall into two categories of dedicated sources and Ambient sources [27].", "A more attractive energy harvesting approach is wireless (RF) energy harvesting which provides key advantages in virtue of being controllable, lower cost and smaller form factor implementation [15], [27].", "Extensive studies exist in the literature investigating on techniques to improve the performance of WEH unit [27], [29]."]} +{"769186|9830350": []} +{"769186|1230643": []} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"196191596|17708892": ["There are several possibilities for these type of transmissions, yet the recent development of the Low Power Wide Area Network (LPWAN) protocols present new opportunities with the benefits of a reduced energy consumption and moderate data rate [29,30]."]} +{"196191596|13475127": ["Long-range (LoRa) transmissions require either a previously established infrastructure, such as a ground base station, or satellite connectivity [1].", "which, in many cases, are lost to strong currents or vandalism [1]."]} +{"41341919|10837932": ["Many current green networking techniques have been committed to make the energy consumption figures proportional against their utilization level (Bianzino et al., 2012).", "\u2026Applications (2015), http://dx.doi.org/10.1016/j.jnca.2015.07.016i\ninfrastructure with the sole purpose of taking over the duty when another device fails, further adding to the overall energy consumption; however, these objectives are underutilized during normal operation (Bianzino et al., 2012).", "As a solution to this problem, green technologies are devoted to make the energy consumption nearly proportional to the traffic load through approaches, such as resource consolidation and selective connectedness (Bianzino et al., 2012).", "The issue of energy managing mechanisms exploiting network-specific features, such as in an ad hoc network, that must be added into wired network is referred to as green networking (Bianzino et al., 2012)Q3 .", "By Bianzino et al. (2012), Networking infrastructure involves high-performance and high-availability machines.", "Moreover, the redundancy of network equipment is neglected,\nwhich is a strong assumption as the redundant devices are not fully passive (Bianzino et al., 2012).", "Traditionally, networking systems are designed and dimensioned according to principles that are inherently in opposition with green networking objectives: namely, over-provisioning and redundancy, which cause overall energy consumption (Bianzino et al., 2012)."]} +{"38777028|19938676": ["Next generation architectures are expected to support various heterogeneous technologies and networks given in [113]."]} +{"38777028|3936425": []} +{"38777028|41035405": ["The Gaussian relay channel was introduced in [69] and [70]."]} +{"41474655|3330461": ["In [20], the authors explored some crucial points and challenges for the D2D design on LTE and proposed a simple approach to share spectrum resource."]} +{"41474655|25929315": ["However, the main drawbacks of the ACB mechanism are (i) the increased delay that some M2M devices may experience and (ii) an unfair competition for the restricted M2M devices [7].", "Most of the available approaches are based on the initial proposals compiled by 3GPP [7].", "Thus, there is an urge to propose an ef \ufb01 cient method for M2M communication on the LTE-A network to improve the congestion problem [5 \u2013 7]."]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"46736766|3348390": []} +{"4798422|17675973": ["\u2026consolidation in the\ncloud using ant colony system\nAdnan Ashraf\u2217 and Ivan Porres\nFaculty of Natural Sciences and Technology, A\u030abo Akademi University, Finland\nIn this paper, we present a novel multi-objective ant colony system algorithm for virtual machine (VM) consolidation in cloud data centers."]} +{"13272651|10837932": []} +{"20306034|34643772": ["Consequently, SDN-enabled network devices can also implement security functions, lowering the total operational costs and energy bill [58]."]} +{"20306034|14258620": ["64% of the IT industry aremeeting their targets of energy saving by using renewable energy technology [51].", "Researchers [51] suggest that the technology industry seems more concerned about analytics efficiency than environmental sustainability and computational complexity."]} +{"20306034|2357830": ["The passive tags depend on harvesting energy from the signal of the readers following the principle of induction [36]."]} +{"21668528|25929315": []} +{"22923383|19938676": ["namely Device\u2013to\u2013Device (D2D) communication, emerges as a promising solution for cellular network offloading [2]."]} +{"9413021|17623152": []} +{"9413021|2357830": []} +{"9413021|1236072": []} +{"9413021|1230643": ["Multihopping is a common technique to save energy and overcome the scalability issue [123]\u2013[125]."]} +{"6758639|978927": ["Mittal et al. presented a survey on GPU energy efficiency [43].", "[48], Mittal [49] Data center power management 2014 Gu et al.", "Mittal\u2019s survey on techniques for improving energy efficiency in embedded computing systems [42] is in the same line as Venkatachalam et al. work.", "Another similar survey on power management techniques for data centers was presented by Mittal [49]."]} +{"6758639|165863": ["presented a survey on GPU energy efficiency [43].", "[43] GPU Energy Efficiency 2014 Hammadi et al."]} +{"6758639|193574": ["[41] Energy efficiency of computing and network resources 2014 Mittal [42] Energy efficiency in embedded computing systems 2014 Mittal et al.", "Another metric used in data center energy efficiency measurement is Data Center Infrastructure Efficiency (DCiE) which is expressed as follows [41][305],", "[41] surveyed techniques to improve the energy efficiency of computing and network resources, but did not focus on modeling and prediction."]} +{"6758639|15136738": []} +{"19552313|10299098": ["The choice of the right service model is application and environment-depending, and may also depend on the level of context-awareness of the involved devices [33].", "nodes is a still challenging research issue [33]\u2013[35].", "Under this perspective, the FC paradigm differs from the related Mobile Edge Computing (MEC) one [7], [8], [33], [34], in which only edge nodes are employed for the device augmentation."]} +{"19552313|32360363": ["The final goal is the \u2018\u2018smart\u2019\u2019 management of the overall city asset [98]."]} +{"19552313|3330461": ["However, due to the multi-hop nature of the Internet backbone and the short-range capability of the network technologies currently envisioned for the support of inter-device communication [25], [26], guaranteeing reliable network connections is a challenging task in the envisioned IoE realm [27], [28].", "However, these (positive) attributes are counterbalanced by the fact that: (i) FNs are small-size data centers with reduced fault-tolerance capability; and (ii) the Device-Fog communication typically relies on short-range WiFi/UWB/\nVOLUME 5, 2017 9887\nBluetooth-based connections that are intermittent, interferenceaffected and failure-prone [58]\u2013[60].", "11/15 transmission technologies, like WiFi, UWB and Bluetooth [25], [126].", "However, in this case, the resulting perconnection round-trip-time RTT becomes quite sensitive on the corresponding (generally, time-varying) inter-vehicle distance d (m) and tends to scale up/down proportionally to it, that is [25], [137], [135]:", "Since the IoE devices could be randomly distributed over the SG, it is expected that theNetwork layer relies on short/mediumrange wireless transmission technologies, like WiFi, UWB and/or Bluetooth [26];\n(iii) the Fog layer is responsible for the management of the massive volume of metered data.", "However, we note that [25]: (i) due to fading and path-loss, the energy consumption of D2D links increases with the inter-thing distance in an (at least) cubic way; (ii) due to thing mobility, D2D mobile links are intermittent, and their average failure rates typically increase with the average thing speeds [131]; and, (iii) under the D2D model, the initiator thing needs, at first, to discover proximate things, and, then, must perform task distribution, thing synchronization and task retrieval.", "For this purpose, the cooperating devices build up D2D links, that typically rely on short-range wireless communication technology, like UWB, WiFi or Bluetooth [25], [26].", "9 will rely on short/medium-range wireless networking technologies, like WiFi, UWB and/or Bluetooth [26]; (iii) thank to the virtualization of the underlying manufacturing things, it is expected that the Fog layer of Fig.", "It operates under the same vehicular scenario previously described for the V-FoE test-bed, but, according to [25], [137], it utilizes only \u201cad-hoc\u201d D2D IEEE802.", "For this purpose, the cooperating devices build up D2D links, that typically rely on shortrange wireless communication technology, like UWB, WiFi or Bluetooth [25], [26]."]} +{"19552313|18037424": ["The underlying networking infrastructure acts as glue: it allows the SG to perform remote metering by (possibly) exploiting the support of smart Energy Storage Devices [95], [96]."]} +{"16580150|7686677": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|14388097": ["While most studies analyze multimedia streaming in the regular client-server architecture, a survey on the research on quality of service for peer-to-peer media distribution was presented in [113]."]} +{"16580150|10837932": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|17428811": ["[38] included SVC for an MPEG-4 FGS streaming system [65], in which a mobile client can control its decoding capability according to the energy management policy."]} +{"37949742|26793080": ["in [1], [2], [3], [4], 5], [6], [7], [8], [9], [10)."]} +{"10636199|2469117": []} +{"16410171|21738890": []} +{"16410171|17262196": []} +{"16410171|1598350": []} +{"11035558|44461432": []} +{"113867430|205286988": []} +{"113867430|1236072": []} +{"10641690|39174599": ["SI is the quality of a system in which the collective behaviours of the naive agents that are interacting locally with their environment will lead to a coherent functional global pattern (Kumar and Thakur, 2012)."]} +{"10641690|25929315": ["Laya et al. (2013) suggested that the M2M devices organise themselves locally with the aid of short-range radio technologies such as Body Area Networks (BAN), Wi-Fi and WSN, creating an M2M area network.", "Laya et al. (2013) observed that the random access channels of LTE and LTE-A networks are prone to congestions in M2M cases."]} diff --git a/edge/graph_13745783.jsonl b/edge/graph_13745783.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20ea5a197f45cc9695041b4df66e49fe8605a656 --- /dev/null +++ b/edge/graph_13745783.jsonl @@ -0,0 +1,36 @@ +{"109284374|12817488": []} +{"2820313|1230643": []} +{"6745457|12817488": []} +{"373050|15300368": ["Almost any application, in fact, could be classified into two categories: event detection (ED) and spatial process estimation (SPE) [1].", "This is a very familiar system model, and almost any application of event detection (ED) category or spatial process estimation (SPE) category can use this model.", "In ED, sensors are deployed to detect an event, for example a fire in a forest, a quake, etc. [2\u20134], whereas in SPE the WSNs aim at estimating a given physical phenomenon (e.g., the atmospheric pressure in a wide area, or\nthe ground temperature variations in a small volcanic site), which can be modelled as a bi-dimensional random process."]} +{"373050|1236072": []} +{"29572719|1236072": ["Mhatre and Rosenberg [9] presents a comprehensive survey on single hop or multi-hop mode of communication for data forwarding along with some results that could serve as procedure to decide which type of communication model should be adopted for given settings in WSNs. Al-Karaki and Kamal [2] presents the architect level challenges for designing protocols for ef\ufb01cient routing in WSNs and a comprehensive survey on routing techniques in WSNs is discussed.", "Al-Karaki and Kamal [2] presents the architect level challenges for designing protocols for efficient routing in WSNs and a comprehensive survey on routing techniques in WSNs is discussed."]} +{"20764069|1236072": ["Designing the WSNs is very difficult because the sensor nodes have limited computation capability, limited power and small memory size[5][7]."]} +{"20764069|1230643": ["Designing the WSNs is very difficult because the sensor nodes have limited computation capability, limited power and small memory size[5][7]."]} +{"61722154|20473693": ["With the development of technology and expansion of applications, the connotation of the IoT has changed signi \ufb01 cantly [1]."]} +{"61722154|3348390": ["[49] surveyed context awareness from an IoT perspective, provided an in-depth analysis of the context lifecycle, and evaluated a subset of 50 projects from 2001 to 2011 based on their respective taxonomies."]} +{"61722154|7971188": ["Over-lay networks [27] have several advantages including being distributed, lacking centralized control, and sharing resources."]} +{"1227567|1236072": ["For simplicity, we assume that all cell IDs are positive.", "After receiving Uplink_reply, the cell head with ID [1, 1] will set its uplink to be [2, 2] and transmit the aggregated data to the cell head of the new uplink cell [2, 2].", "When a cell head never receives acknowledgement Ack_cycle from the uplink cell head for a certain time, it broadcasts a Uplink_poll message containing the IDs [Xm, Ym] and [Xd, Yd] of the uplink cell and itself.", "Figure 1 illustrates an example sensor field partitioned into a logical grid of 4 \u00d7 4 cells, where the cell IDs are enclosed by square brackets.", "Owing to the cell head of cell [2, 2] with downlink the same as [1, 2], it will set the downlink to be [1, 1] and reply a Uplink_reply message containing its own ID [2, 2].", "For example, consider the cell [1, 2] is a void cell, where all nodes are dead, as shown in Figure 4.", "From left to right, the cell IDs are [0, 0], [1, 0], [2, 0] and [3, 0] in the first row, the cell IDs are [0, 1], [1, 1], [2, 1] and [3, 1] in the second row, and so on and so forth.", "When the cell head of cell [1, 1] never receives acknowledgement Ack_cycle from the uplink cell [1, 2] for a certain time, it broadcasts a Uplink_poll message with the IDs [1, 2] and [1, 1] of the uplink cell and itself."]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"39407480|9830350": ["Cluster-based and grid-based techniques [4, 5] are used to cope with this problem."]} +{"18211163|205286988": []} +{"41879418|1236072": []} +{"30176615|9830350": ["After gathering data and performing data aggregation to omit the redundant data, the data are transmitted to the BS [6\u20138]."]} +{"40377888|6275330": ["cation [25]\u2013[28], and n is usually taken three."]} +{"8623518|10817088": ["[1\u20136]."]} +{"16425341|1230643": ["I. INTRODUCTION\nWith the growth of wireless communication and device technology, the sensors having sensing, computation and communication capability are widely used in various fields."]} +{"17289366|5419878": ["Diop et al. (2013) presented a well balance between energy consumption overhead and security level in the protocol design analysis through some selected schemes."]} +{"17289366|7465328": ["Attacks on wireless sensor networks are not limited to simply DoS attacks but rather encompass a variety of techniques (Martins and Guyennet, 2010)."]} +{"17289366|7889189": ["This requirement is especially needed when the WSNs adapt shared keys for message communication, where an adversary can launch a replay attack using old keys as the new key is being updated and then disseminated to all the nodes in the WSN environment (Sen, 2009).", "Authentication requires that the nodes participating in the network environment are the ones they claim to be (Sen, 2009)."]} +{"17289366|1940388": ["A confidential message is resistant to revealing its contents to an eavesdropper during the data transmission phase (Chen et al., 2009).", "Active attacks can be classified as external or internal (Chen et al., 2009).", "Since security overhead will degrade other performances of WSNs, the tradeoff between security and QoS needs to be evaluated (Chen et al., 2009).", "Furthermore, data aggregation is purposely designed to reduce the communication overhead of routing operation (Chen et al., 2009)."]} +{"17289366|17205659": ["Extensive surveys concerning on securing WSNs routing can be found in Yong et al. (2006), Yun et al. (2008), El-Semary and Abdel-Azim (2013), and Singla and Sachdeva (2013).", "Security provisioning presents the most challenging task in designing routing protocols for WSNs (Al-Karaki et al., 2010), several security challenges have been discussed in the literature such as Perrig et al. (2004), Yong et al. (2006), and Pathan et al. (2006)."]} +{"17289366|205286988": ["Routing in sensor networks is very challenging due to the salient characteristics that distinguish them from contemporary wireless ad hoc networks in many aspects (Perrig et al., 2002; Akkaya and Younis, 2005; Dou et al., 2009; Raghunandan and Lakshmi, 2011).", "Although plethora of works on surveying the state-of-the-art of routing in WSNs are performed before (Akyildiz et al., 2002; Akkaya and Younis, 2005; Sha et al., 2013), our work differs from the previous efforts in terms of timeliness, emphasis, and comprehensiveness.", "Routing protocols in WSN are also highly influenced by the data reporting model (Akkaya and Younis, 2005)."]} +{"17289366|1236072": ["Classifications of WSN routing protocols.\ndesign parameters that have been inherited from Al-Karaki and Kamal (2004), and Nikjoo et al. (2007)."]} +{"64353095|6275330": []} +{"5840473|1230643": ["While there have been numerous efforts at developing routing and communication protocols for WSNs [1], the fundamental problem of identifying and developing an appropriate middleware for fully realizing the capability of sensor technologies and applications remains to be addressed."]} +{"16158036|1230643": ["Wireless sensor networks (WSNs) have numerous applications in a variety of disciplines, both military and civilian [1][2]."]} +{"14930230|1230643": ["These units should be small so that power consumption will be less [5]."]} +{"13754100|12256243": ["A survey of the location-based routing protocols that support the sink mobility is presented in [12]."]} +{"13754100|10206347": []} +{"13754100|9830350": ["The cluster properties and the sensor capabilities are the two main issues in the clustering attributes [21, 22]."]} +{"13797059|1236072": ["As a result, the entire sensor area will receive a copy of the data [2].", "The sensor nodes inform the appropriate cluster heads that they will be a member of the cluster [2]."]} +{"13797059|1230643": ["On the other hand, this also means that sensor network protocols and algorithms must possess self-organizing capabilities [1].", "[1] presented a survey on wireless sensor network."]} diff --git a/edge/graph_13745820.jsonl b/edge/graph_13745820.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55c473038a0d1b26becb64e2a2ba35c663330c63 --- /dev/null +++ b/edge/graph_13745820.jsonl @@ -0,0 +1,15 @@ +{"8597930|30430657": []} +{"13019489|8606364": ["The spectrum occupancy in 20MHz-to-3GHz was found to be 32% for indoor scenarios (in the case of outdoor, however, almost 100%, of this range is utilised), and very low in 3-to-6GHz [136], [62]."]} +{"13019489|4122595": ["Although the performance of other sensing techniques such as; feature detection, covariance, matched filter-based techniques may be superior, the implementation and computational complexity remain prohibitive [61], [95]."]} +{"13019489|42449870": ["For instance, in Cognitive Radio Networks (CRNs), many surveys on Opportunistic Spectrum Access (OSA) and Dynamic Spectrum Access (DSA) have been carried out.", "This type of spectrum sharing is similar to the interweave approach in CRNs, i.e., exclusive shared spectrum access where no interference is tolerable and almost always the actual owner of the spectrum (who is referred to as host operator) has the priority to access the band [57].", "Spectrum leasing policies have been applied to offer a more robust (in terms of access guarantees) form of OSA/DSA schemes in licensed bands in CRNs [66], where for example, the white spaces are leased to SUs subject to pre-negotiation with PUs.", "The authors also study the architectures of CRNs, as well as the cognitive-based spectrum sensing approaches, routing protocols, and interference mitigation schemes for smart grids.", "=> Spectrum assignment in CRNs is discussed.", "In CRNs, radios are capable of learning/monitoring theenvironment and change their transmission parameters adaptively based on the observations [42].", "A wide range of sensing techniques have been proposed and investigated in CRNs.", "In [38], a survey on resource allocation challenges in CRNs according to different design techniques such as, SINR-based, transmission power-based, centralised and distributed methods of decision making, is presented.", "It can be observed from the previous section that, there are extensive literature surveys that focus on spectrum sharing and access techniques in CRNs.", "The latter however, involves all OSA sharing types in CRNs incorporating distributed techniques (sensing technique in this work is mainly considered).", "Various schemes, which are defined under this authorisation regime, have been widely applied in CRNs under DSA/OSA contexts and based on prioritisation of the users into primary and secondary hierarchies.", "Spectrum sharing in future cellular systems (namely 5G), has a scope far beyond that addressed in previous studies of CRNs.", "These surveys mainly focus on the principals of CRNs and investigate the applicability of a wide range of available coordination protocols/methods, as well as the spectrum access/allocation/assignment techniques under various licensing regimes covering different spectrum ranges.", "Various enabling techniques that have been studied extensively in CRNs, comprise wide ranges of sensing techniques [61], Geo-location database, beacon signalling, etc. [37], in order to enable SUs to exploit the PUs\u2019 spectrum in an opportunistic manner.", "However, in contrast to the CRNs interweave approach, and based on the agreement among operators, access to the spectrum as well as QoS must be guaranteed for both sharing players.", "The term mapping is referred to the spectrum situational awareness with the aid of transmission observations which facilitates characterisation of CRNs, e.g., identification of how particular bands are being used and estimate spectrum occupancy and usage throughout the particular area [153].", "In [35] and [36], the authors provide a comprehensive survey of challenges related to the spectrum decision/assignment in CRNs, including spectrum characterisation process and primary-system activity modelling, spectrum selection, and reconfiguration.", "of OSA/DSA schemes in licensed bands in CRNs [66], where for example, the white spaces are leased to SUs subject to pre-negotiation with PUs.", "posed varieties of trading schemes for the pricing such as channel-quality based price, game-theoretic based (such as NE), and also demand-supply model in which the shared bands are assigned to the highest bidders [102], and spectrum leasing [66].", "Radio Networks: A Survey\u201d [35] => An overview of CRNs is presented."]} +{"13019489|8974063": ["In [35] and [36], the authors provide comprehensive survey on the challenges related to the spectrum decision/assignment in CRNs including; \u201cspectrum characterisation process\u201d, \u201cprimary-system activity modelling\u201d, \u201cspectrum selection\u201d, and \u201creconfiguration\u201d."]} +{"44760596|5621151": ["A number of the requirements to operate in TVWS are based on cognitive radio technology including location awareness and spectrum sensing [1].", "These locally unused channels are called TV white space (TVWS) [1].", "\u2026services [2] can be revealed by considering the information included in geolocation databases (GL-DBs) [3] if available, which provide for a certain location the list of the free DTT channels and the allowable maximum radiated power to transmit without harmful interference to DTT users [1, 4]."]} +{"7944487|8606364": ["Several excellent review papers on global spectrum measurement campaigns have been published [2], [3]."]} +{"7944487|5621151": ["A sustained interest in the secondary usage of the UHF bands that are traditionally reserved for broadcasting services has been spurred by the excellent propagation characteristics of UHF spectrum bands, a growing appetite for broadband services, and spectrum reforms driven by regulatory support [13]\u2013[15]."]} +{"9413775|8606364": ["There are articles on the methodological aspects [19], [28], guidelines [26], [27], and time-domain modeling [29], [30] of spectrum measurements.", "The use of equipment that is not matched to the signals present in the environment has led to dubious findings and conclusions, such as the claim in [29], where several papers report that the satellite bands below 3 GHz are unutilized.", "The data is processed to estimate the spectrum occupancy and models are developed [29], [79] to characterize the use of the spectrum being studied.", "Furthermore, a useful survey on spectrum occupancy modeling [29] provided good insight especially on time-"]} +{"9413775|2398835": [", graphical processing units (GPU) [98] in conjunction with distributed database storage, processing and access [99] are becoming mainstream in the development", "To overcome the scaling problem for large scale datasets, sparse approximation methods [73] and parallel computing approaches [99] can be applied."]} +{"9413775|5621151": ["Our work extends the previous research reported in [19] and [26]\u2013[35]."]} +{"32475393|10908575": ["In the crowded radio spectrum it is not a simple task to find the appropriate radio bands for cognitive terrestrial devices [3, 4]."]} +{"32475393|5621151": ["Furthermore, especially to avoid the interference additional techniques would be also desirable, for example, pilot detection, cyclostationary feature detection, or cyclic prefix and autocorrelation detection [32].", "On the other hand, it should be also considered that, in order to minimise the harmful interference caused by the cognitive secondary user devices, the TV signal sensing margin should be much lower than that of TV receivers required for high quality receiving [32]."]} +{"1142029|30430657": ["0 system, to provide higher data capacity, more robust performance, better spectrum efficiency, and to enable new services [1]."]} +{"2449705|12601073": ["Classical detection needs a priori information from the noise power and signal(s) present [7], [8]."]} diff --git a/edge/graph_13747497.jsonl b/edge/graph_13747497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79a96cf54d48024e863dd05ba14514ac1cf2188e --- /dev/null +++ b/edge/graph_13747497.jsonl @@ -0,0 +1,2 @@ +{"7586217|534755": ["The dynamics of GRN can be modeled using different approaches (De Jong, 2002; Smolen et al., 2000; Mason et al., 2004).", "Robustness and evolvability are two central properties of biological systems (Srtelling et al., 2004; de Visser et al., 2003; Kirschner and Gerhart, 1998; Nehaniv, 2003; Poole et al., 2003; Wagner, 2005a)."]} +{"17785368|534755": ["Any given genetic regulatory network, formed by the genes (nodes) and their interactions (edges) (22), can be tightly controlled to robustly converge to a fixed almost-deterministic attractor\u2014i.", "sN) can be thought of as the on/off state of the different N genes in its (Boolean) genetic regulatory network (19, 21, 22)."]} diff --git a/graph_47125.jsonl b/edge/graph_13751368.jsonl similarity index 100% rename from graph_47125.jsonl rename to edge/graph_13751368.jsonl diff --git a/edge/graph_13752797.jsonl b/edge/graph_13752797.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3a4f09d58fb3408da3ee9891967ebef258460ae --- /dev/null +++ b/edge/graph_13752797.jsonl @@ -0,0 +1,16 @@ +{"6745457|12817488": []} +{"10489913|8649087": ["The Digital Millennium Copyright Act (DMCA) can be used in the case of deliberate removal or attacks of watermark (98) thus providing the minimal legal support for watermarking schemes.", "Invisible watermarking has the greatest need for standardization (46; 97), which requires the formation of a standards body (98; 1; 46; 35; 3).", "Thus, digital watermarking can also be used as a back up protection along with cryptographic technology (98)."]} +{"60077606|7530272": []} +{"60077606|2656838": []} +{"60077606|14047190": []} +{"60077606|14297493": []} +{"60077606|8310135": []} +{"60077606|192934": []} +{"19023663|8649087": ["Because digital devices store content in digital form, there is no degradation in quality of data after copy is made [7]."]} +{"5864871|7366975": ["This is not the case when indels occur in ncDNA sections; however, the fact is that the exact Shannon capacity of a channel with insertions and deletions is currently unknown even in the simplest case of a binary channel [20]."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"29044845|207424188": []} +{"62571305|41768464": ["The common digital watermark embedding algorithms include airspace algorithm [ 17 ] , patchwork algorithm [18] ,n ippon electric company (NEC) algorithm [19] , physiological model algorithm [20] , etc."]} +{"62571305|18144244": ["The common digital watermark embedding algorithms include airspace algorithm [17] , patchwork algorithm [18] ,n ippon electric company (NEC) algorithm [ 19 ] , physiological model algorithm [20] , etc."]} +{"41299790|15540889": []} +{"41299790|15247126": ["Under this general definition, Zander et al. identified two main techniques to build these channels [12]."]} diff --git a/edge/graph_13753587.jsonl b/edge/graph_13753587.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ef92e15635f0f17d4bc436356996a7782a4a80d --- /dev/null +++ b/edge/graph_13753587.jsonl @@ -0,0 +1,4 @@ +{"1033682|174797842": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} +{"206592484|456491": []} diff --git a/edge/graph_13754234.jsonl b/edge/graph_13754234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8db209448e03c45fcd9b70338e2500df7db17fe4 --- /dev/null +++ b/edge/graph_13754234.jsonl @@ -0,0 +1,4 @@ +{"18008053|9724084": ["diseases [3] and for individuals, especially the elderly who are at higher risk of dehydration [3,4]."]} +{"12304742|30383344": ["Hii gave a general idea of how to achieve health monitoring using smart phonea [2] and Custodio and his co-workers provided a review of different potential communication technologies for healthcare applications [3]."]} +{"26985018|16514036": ["Chen et al.(2) presented the difference between a wireless sensor network and BAN in terms of mobility, data rate, latency, node density, power supply, network topology, node replacement, security level, etc."]} +{"8264235|2357830": []} diff --git a/edge/graph_13756560.jsonl b/edge/graph_13756560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0915818c8a3808ba6a5b10135ca766415bf73d6f --- /dev/null +++ b/edge/graph_13756560.jsonl @@ -0,0 +1 @@ +{"14514527|206583375": ["Ranging in wireless sensor networks is typically achieved through measuring the time-of-arrival (TOA) and/or the received signal strength (RSS) of acoustic or radio signals [6], [7]."]} diff --git a/edge/graph_13756844.jsonl b/edge/graph_13756844.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af0b323cdfc027225faaa49e8ff593d099dedfd8 --- /dev/null +++ b/edge/graph_13756844.jsonl @@ -0,0 +1,2 @@ +{"14493264|15126268": ["There exist a plethora of term rewriting engines, including ASF [24], Elan [1], Maude [4, 5], OBJ [9], Stratego [25], Tom [23, 14], and others."]} +{"6921060|15126268": []} diff --git a/edge/graph_13757012.jsonl b/edge/graph_13757012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7cc5d2195c638ca54f707f76aa20f73907e14ad7 --- /dev/null +++ b/edge/graph_13757012.jsonl @@ -0,0 +1,27 @@ +{"60235990|9321930": ["Moreover, related work [11] identifies complexity issues when bringing cooperation techniques to allocationbased MAC protocols.", "of token-passing [10] and complexity issues of cooperation techniques in allocation-based protocols [11].", "Numerous work has been done on theoretical benefits [19], but also on cooperation strategies that address the questions of when and how to cooperate [11], [20], [21].", "In principle, different approaches exist to determine the best relay [11].", "This refutes concerns [11] that noncontention-based DLL protocols suffer from complex channel management when using cooperative communication.", "The frequently exchanged token replaces the need of other techniques to exchange explicit control packets [11]."]} +{"55398088|1236072": ["Routing techniques pursue bounded end-to-end delays for multi-hop scenarios in a broad number of possible ways [9]."]} +{"55398088|1230643": ["The rapid expansion of wireless sensor networks (WSN) [1] in an increasing number of application domains contributes to a growing demand of network services with thorough performance requirements."]} +{"1837434|1236072": ["A large body of research on communication issues in mobile sensor networks has been carried out [Wang et al. 2007; Al-Karaki and Kamal 2004].", "\u2026and Reijers 2003]; time synchronization protocols [Elson and Roemer 2003; Sundararaman et al. 2005]; distributed storage services [Ratnasamy et al. 2002; Luo et al. 2007]; code deployment and reprogramming functionality [Wang et al. 2006]; and routing protocols [Al-Karaki and Kamal 2004].", "2006], and routing protocols [Al-Karaki and Kamal 2004]."]} +{"109965913|1236072": []} +{"109965913|1230643": []} +{"18180453|1236072": ["Routing protocols for WISNs must be carefully designed, to consider resource constraints such as low processing power, small memory and limited energy of sensor nodes [11], [12]."]} +{"18180453|1230643": ["Routing protocols for WISNs must be carefully designed, to consider resource constraints such as low processing power, small memory and limited energy of sensor nodes [11], [12]."]} +{"941667|1230643": ["In the past few years, advances in miniaturization led to the emergence of wireless sensor networks (WSN) [2], cooperative embedded computer systems designed to monitor one or more parameters in their environment."]} +{"11464809|1230643": ["Wireless sensor networks are autonomous network systems consisting of quantities of low-cost tiny sensor nodes with abilities of sensing, computation and communication, and are \u201cintelligent\u201d systems which may accomplish various monitoring tasks autonomously according to the environment [3]."]} +{"10690328|5660618": ["Within this context, a significant number of research\nworks are addressing the provision of Quality of Service (QoS) within wireless networks [2, 12, 16, 17].", "In traditional approaches, many of these controllers assume no data losses during the control cycle."]} +{"18534179|29997805": ["Some important factors should be considered when developing a routing protocol such as an energy balanced network, node mobility and integration of fixed with mobile networks, and QoS [9\u201312]."]} +{"14619499|3755658": ["Several works in the literature show that the configuration of IEEE 802.15.4 MAC parameters has a direct impact on the performance of WSNs, in what concerns energy efficiency, wide-scale deployments and time-sensitive message transfers [15,18].", "Castalia (The Castalia Simulator for Wireless Sensor Network: https://castalia.forge.nicta.com.au.) is an open-source discrete event simulator for WSNs, Body Area Networks (BAN) and general low-power embedded networks, that was developed at National ICT Australia (NICTA) and is based on the OMNeT++ platform.", "Within the context of this paper, we are particularly interested in works that address throughput in IEEE 802.15.4 cluster-tree WSNs, using CAP communication mechanisms.", "Jurc\u00edk et al. [33] used network calculus theory to model cluster-tree WSNs according to several network parameters, such as: depth, maximum number of child nodes and maximum number of child routers.", "Thus, it is necessary to provide adequate guidelines for setting-up the MAC configuration parameters, in order to build efficient wide-scale cluster-tree WSNs.", "Typical WSNs application deployments have multiple sensor nodes and one coordinator, generally located in the middle of the topology (star topology).", "Sensors 2017, 17, 249; doi:10.3390/s17020249 www.mdpi.com/journal/sensors\nIEEE (Institute of Electrical and Electronics Engineers) 802.15.4 standard [5] and ZigBee specification [6] define the most widely used protocols to deploy WSNs.", "Di francesco et al. [9] analysed the impact of MAC parameters upon the network communication behaviour and proposed an adaptive cross-layer framework to minimise the energy consumption for single and multihop WSNs.", "In recent years, multiple research works have been presented addressing some of the most relevant challenges concerning cluster-tree WSNs, including network formation schemes, communication mechanisms, MAC protocol configuration, energy-efficiency, scalability, admission and congestion control, and beacon scheduling.", "WSNs are special wireless ad hoc networks composed of a large number of low-power, low-cost and low-rate devices, which are capable of sensing, processing and sending information related to environment variables [4].", "Moreover, important features to simulate WSNs are available, such as: realistic node behaviour, node clock drift, and energy consumption models.", "Cluster-tree is one of the most suitable topologies to deploy wide-scale WSNs [10]."]} +{"6935459|18469839": ["For elderly and health care, with the incorporation of some telemedicine devices, it is possible to remotely monitor the patients\u2019 body temperature, blood pressure, breathing activity, and so forth [4]."]} +{"56451226|1230643": ["Introduction The term \u201cWireless Sensor Networks\u201d (WSN) includes all the monitoring infrastructures made up of a set of sensing platforms, called Sensor Nodes, communicating both among them and with the outside world through radio connection [1]."]} +{"13531450|41998167": ["Moreover, they need to satisfy requirements of real time applications wherever the most important ones\u2019 can be summarized in: respecting deadlines, minimizing the transfer delay, improving transfer reliability and offering the best tradeoff between Energy consumption, delay and reliability [4], [5]."]} +{"13531450|10713483": ["Some protocols are based on Personal Area Network (PAN) networks, such as the GTS of IEEE 802.15.4, i-GAME, ART-GAS, AGA, Knapsack, GSA [7], this category is characterized by the low data rate, the reduced number of nodes, and the limited size of the networks (few meters).", "A large amount of WSN MAC protocols that intend to reduce latency and increase reliability have been proposed in the literature and an exhaustive list is presented in [3][7].", "4, i-GAME, ART-GAS, AGA, Knapsack, GSA [7], this category is characterized by the low data rate, the reduced number of nodes, and the limited size of the networks (few meters)."]} +{"13531450|17960632": ["Moreover, there are some protocols that support only the one-hop communication, such as Alert, LPRT and TOMAC [6], this category is well adapted to 1-hop star network, and can be used especially in Body Area Network (BAN).", "can arrive late, because the system will consider it as a total failure [4]-[6].", "The AREA-MAC [6] protocol organizes the network in a grid manner, and each node is identified by its position coordinates in the grid.", "Thus, the I-EDF[6] protocol is based on a cellular backbone, and each cellule has an hexagonal form.", "The RT-Mac [6] protocol is not based on a specific topology; however it is limited to an only single data stream from the source node to the sink.", "The Dual Mode Mac [6] protocol offers real time guarantee to linear WSN.", "The PEDAMACS [6] protocol is not based on a specific topology but it assumes that the sink can communicate directly with all nodes of the network."]} +{"6224540|205286988": []} +{"6224540|1230643": ["In WSN, sensors gather information about the physical world and the base station or the sink node makes decision and performs appropriate actions upon the environment [1]."]} +{"7995068|10817088": ["Furthermore, multimedia service leads to develop remarkable applications in medical sensor networks and body area networks [9\u201312] where strict QoS requirements are given."]} +{"7995068|17960632": ["For the real-time MAC protocols, two literatures [26, 27] have classi\ufb01ed the existing protocols and presented comparison results in various aspects such as duty cycle [28, 29]."]} +{"15432746|1230643": ["A wireless sensor network (WSN) comprises of sensor nodes, which monitor the terrain where they are deployed and gather the physical environmental parameters which they communicate to the base station [1]."]} +{"18518208|1230643": ["Dual-Mode Real-Time MAC protocol for Wireless Sensor Networks: a Validation/Simulation Approach Thomas \nWatteyne* , Isabelle Aug\u00e9-Blum* and St\u00e9phane Ub\u00e9da* *CITI Laboratory, INSA Lyon, France."]} +{"13342495|205286988": ["In this paper, we have proposed the state-of-the-art routing technique using SPEED protocol and NN technique to choose an alternative path in WSNs.\nKEYWORDS\nSPEED, Routing, Wireless sensor network, neural network.", "This involves the next component\n\u2022 An API\n\u2022 A neighbor beacon exchange sch\n\u2022 A delay estimation scheme\n\u2022 The Stateless Non-determ Forwarding algorithm (SNGF)\n\u2022 A Neighborhood Feedback Loop\n\u2022 Backpressure Rerouting\n\u2022 Last mile processing\nReceiver\nols for WSN [2, 3].\nhas been used for s been seen that it\nPEED protocol [5] e guaranteed speed\n[6] protocol then es of layers at fixed 7] latency has been\nn in [8] AODV has consumption.", "\u2022 Last mile processing Receiver ols for WSN [2, 3].", "In this work, we have enhanced the proficiency of WSN based, hierarchal directing convention, SPPED by executing an enhancement strategy, NN.", "161978-1-5090-5256-1/16/$31.00 c\u00a92016 IEEE\nFig.1 WSN Architecture\nThe energy-aware adjustment of a state is:\nand the energy-adjusted distance of a state is:\nSo in the proposed work, SPEED fusion of neural network will be optimi a real \u2013instance QoS routing protocol w deliver a data packet to the destina certain time period, if the packet cann within the time period, the packet is decreasing the performance of speed p failure or congestion leads to, larg dropping of the data packets, which devastating consequences."]} +{"13342495|1230643": ["The sensor nodes can be mobile or static depending on the application [1]."]} +{"17958035|14441987": ["network so that messages can be delivered in a timely manner during mobility and changing topology [4]."]} diff --git a/graph_1376201.jsonl b/edge/graph_1376201.jsonl similarity index 100% rename from graph_1376201.jsonl rename to edge/graph_1376201.jsonl diff --git a/graph_3894151.jsonl b/edge/graph_13765327.jsonl similarity index 100% rename from graph_3894151.jsonl rename to edge/graph_13765327.jsonl diff --git a/edge/graph_13768192.jsonl b/edge/graph_13768192.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d81367aee342069e57eb69b5802a72abb965530 --- /dev/null +++ b/edge/graph_13768192.jsonl @@ -0,0 +1,4 @@ +{"18985069|393825": []} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"31308628|6923178": []} +{"3792181|12204996": ["For a survey of multi-task learning in computational biology, see Xu and Yang (2011).", "For a survey of multitask learning in computational biology, see Xu and Yang (2011) ."]} diff --git a/graph_4715059.jsonl b/edge/graph_1377349.jsonl similarity index 100% rename from graph_4715059.jsonl rename to edge/graph_1377349.jsonl diff --git a/edge/graph_13773623.jsonl b/edge/graph_13773623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0804ff0e89ee4990cbfb6228d75f6b47ad6d5545 --- /dev/null +++ b/edge/graph_13773623.jsonl @@ -0,0 +1 @@ +{"207622994|11810221": ["Following this research, many papers focus on resource allocation problems under a fuzzy environment [17\u201319] where the duration was oftenmodelled as a fuzzy variable."]} diff --git a/edge/graph_13780557.jsonl b/edge/graph_13780557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f5b80ae2236d1afdd0f711f665cdf5c1e108e073 --- /dev/null +++ b/edge/graph_13780557.jsonl @@ -0,0 +1,3 @@ +{"14713085|1507400": []} +{"3283451|10213552": []} +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} diff --git a/edge/graph_13785718.jsonl b/edge/graph_13785718.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb766668825f9564ff23b2e162d125c31605fd68 --- /dev/null +++ b/edge/graph_13785718.jsonl @@ -0,0 +1,3 @@ +{"33625171|10658846": ["The servers left by the schedulers idle are powered down using DPM technique to reduce power consumption.", "On the contrary, the DPM scheme can power down computing servers (that includes all components), which makes such a technique very energy efficient.", "Implemented energy-efficient optimization techniques include DVFS [27] and DPM [4] approaches.", "The Dynamic Voltage and Frequency Scaling (DVFS) technology, adjusts hardware power consumption according to the applied computing load and the Dynamic Power Management (DPM), achieves most of energy savings by powering down devices at runtime.", "To make DPM scheme efficient, a scheduler must consolidate data center jobs on a minimum set of computing resources to maximize the amount of unloaded servers that can be powered down (or put to sleep) [22].", "There are two main approaches for reducing energy consumption in computing servers: (a) DVFS [27] and (b) DPM [4]."]} +{"20555763|2457428": ["We refer to [10], [11] as two excellent surveys."]} +{"2785008|9817990": ["Another dimension of this work is energy conservation, there has been a lot of work of a reason on the afore mentioned topic, which are covered by surveys such as [8], [9], [20], [21]."]} diff --git a/edge/graph_13787722.jsonl b/edge/graph_13787722.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c244fda1122517e3f26bfe44d2d2539d8669945 --- /dev/null +++ b/edge/graph_13787722.jsonl @@ -0,0 +1,60 @@ +{"2466592|1400872": []} +{"16974618|14814753": ["A large body of research has tackled the problem of action categorization from short video clips [14]."]} +{"2654595|12724190": []} +{"4554078|41505326": []} +{"4554078|12724190": []} +{"151460|13787722": []} +{"151460|41505326": []} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"21819689|1262156": ["Kinect revolution makes inexpensive infrared cameras providing image depth information available, thus multimodalities (including RGB, Depth, Optical Flow, Skeleton) based gesture recognition methods emerge [4, 18] after that."]} +{"10087484|7788290": ["While these approaches have been successful for the recognition of actions from articulated objects such as humans (see [9] for a review), they are not expected to be useful in the case of less articulated objects such as rodents [5]."]} +{"16742013|12724190": []} +{"21011865|2323881": []} +{"21011865|393948": []} +{"41505326|1262156": ["However, available RGB-D-based datasets have insofar only been briefly summarised or enumerated without comprehensive coverage and in-depth analysis in the survey papers, such as [9,10], that mainly focus on the development of RGB-D-based action recognition algorithms.", "[10] summarised the major applications from the algorithm development perspective in [10]."]} +{"41505326|12358655": []} +{"41505326|18803401": ["Review papers categorizing and summarizing their characteristics are available to help researchers in evaluating their algorithms [5, 6, 7]."]} +{"41505326|16013270": ["Review papers categorizing and summarizing their characteristics are available to help researchers in evaluating their algorithms [5, 6, 7]."]} +{"1040307|41505326": ["According to the survey of RGB-D datasets [63], we chose two public benchmark datasets, which contain both RGB+depth modalities and have relatively large training samples to evaluate the proposed method."]} +{"12699455|41505326": []} +{"12699455|12724190": []} +{"2857532|53680608": []} +{"17068353|41505326": [", Kinect) in 2010, many methods [2], [3], [4], [5], [6], [7], [8], [9] for action recognition have been proposed based on specific hand-crafted feature descriptors extracted from depth or skeleton data."]} +{"2666813|14814753": []} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"15928602|4351505": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|41505326": ["It is worth mentioning, there are more than 40 datasets speci\ufb01cally for 3D human action recognition [47].", "For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|12724190": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|1262156": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"12724190|1262156": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|18803401": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|15178364": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|5664472": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|27637541": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|393948": ["Since the performance of machine learning and reasoning methods heavily relies on the design of data representation [23], human representations are intensively investigated to address human-centered research problems (e."]} +{"12724190|16280711": ["As an integral component of reasoning systems, approaches to construct human representations have been widely used in a variety of real-world applications, including video analysis [1], surveillance [2], robotics [3], humanmachine interaction [4], augmented and virtual reality [5], assistive living [6], smart homes [7], education [8], and many others [9], [10], [11]."]} +{"12724190|14970359": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [35], [36], [37], [38], [39], [40], [41], [43], [47], [48], as well as their applications [42], [46], as summarized by the complete list in Table 1.", "[47] Vision-based human motion capture and analysis 2001 Moeslund and Granum [48] Computer vision-based human motion capture"]} +{"14298099|12724190": ["Skeleton-based human representation has attracted increasing attention for recognizing human actions thanks to its high level representation and robustness to variations of locations and appearances (Han et al. 2016)."]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"4521017|7788290": ["Gavrila [38] proposed VideoLSTMwhich performs LSTM on the two-dimensional spatial features directly, but the 2-D convolutional features of VGG-16 do not take the short-term temporal information into consideration.", "Generally, gestures contain three temporally overlapping phases: preparation, nucleus, and retraction [38]."]} +{"206594346|7788290": ["Second, dynamic hand gestures generally contain three temporally overlapping phases: preparation, nucleus, and retraction [8, 14], of which the nucleus is most discriminative."]} +{"1904265|4351505": ["For a more extensive conclusion of activity analysis we refer to corresponding survey papers [5, 56, 1, 7]."]} +{"1904265|41505326": ["For a more extensive conclusion of activity analysis we refer to corresponding survey papers [5, 56, 1, 7]."]} +{"14602383|8034133": ["tems: mAP increases from 1.7% to 7.4% on MEXaction2 and increases from 15.0% to 19.0% on THUMOS 2014. 1. Introduction Impressive progress has been reported in recent literature for action recognition [42,28,2,3,39,40,24,18,31, 44,13,37]. Besides detecting action in manually trimmed short video, researchers start to develop techniques for detecting actions in untrimmed long videos in the wild. This trend motivates another challenging", " problem and adopt a temporal sliding window approach, where each window is considered as an action candidate subject to classi\ufb01cation [25]. Surveys about action classi\ufb01cation methods can be found in [42,28,2,3]. Recently, two directions lead the state-of-the-art: (1) Wang et al. [39] proposed extracting HOG, HOF, MBH features along dense trajectories, and later on they took camera motion into consideration "]} +{"18720131|7185733": ["Youtian et al. (2006) defined five classes of gestures for HCI and developed a DBN-based model which used local features (contour, moment, height) and global features (velocity, orientation, distance) as observations.", "\u2026modality in daily life, and the techniques of gesture recognition can be widely applied in many areas, such as human computer interaction (HCI) (Pavlovic et al., 1997; Zhu et al., 2002), robot control (Malima et al., 2006; Shan et al., 2007), sign language recognition (Gao et al., 2004; T.\u2026", "Human gestures frequently provide a natural and intuitive communication modality in daily life, and the techniques of gesture recognition can be widely applied in many areas, such as human computer interaction (HCI) (Pavlovic et al., 1997; Zhu et al., 2002), robot control (Malima et al., 2006; Shan et al., 2007), sign language recognition (Gao et al., 2004; T. Starner and Pentland, 1998) and augmented reality (Reifinger et al., 2007)."]} +{"206594947|12724190": []} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"3243570|14814753": ["Traditionally, the community has focused on activity recognition in the domain of RGB videos [34, 13]."]} +{"3243570|12724190": ["Even without the context information and visual cues, early work [17] in biological perception and more recent methods [9, 10, 31] provide strong evidence that encoding humans as a 3D skeleton yields both a discriminative and a robust representation for activity analysis.", "Naturally, computer vision methods leveraging on the 3D structure provided by such 3D sensors, namely RGB+D methods, have been an active area of research [9]."]} +{"3243570|1634674": ["Traditionally, the community has focused on activity recognition in the domain of RGB videos [34, 13]."]} +{"17265715|41505326": ["Since the first work of such a type [2] reported in 2010, many methods [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13] have been proposed based on specifical handcrafted feature descriptors extracted from depth/skeleton."]} +{"10270124|1634674": ["The long history of automatically recognising gestures from visual or kinematic measurements is reviewed in [23] [32] [31] [2].", "The problems of detecting and recognizing gestures from human body movements captured using videos or 3D skeletal data have been extensively studied in the computer vision and machine learning communities [2, 31, 32, 23]."]} +{"16606094|12724190": ["HUMAN action recognition has received increasing attention [1]\u2013[7] due to its wide range of applications such as video surveillance, human\u2013machine interaction, and robot control [8]."]} +{"4545045|41505326": []} +{"413488|41505326": ["With the advent of depth sensors, such as Microsoft Kinect, Asus Xtion, and Intel RealSense, action recognition using 3D skeleton sequences has attracted a lot of research attention, and lots of advanced approaches have been proposed [33, 14, 1, 72]."]} +{"413488|12724190": ["With the advent of depth sensors, such as Microsoft Kinect, Asus Xtion, and Intel RealSense, action recognition using 3D skeleton sequences has attracted a lot of research attention, and lots of advanced approaches have been proposed [33, 14, 1, 72]."]} +{"17032894|14814753": []} diff --git a/edge/graph_13794961.jsonl b/edge/graph_13794961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b73b681c4543ef28096315ea61a24740c7a36bab --- /dev/null +++ b/edge/graph_13794961.jsonl @@ -0,0 +1,15 @@ +{"38084950|11894197": ["It leads to the degradation of classi\ufb01er system performance in high-dimensional data sets because irrelevant features not only lead to insuf-\ufb01cient classi\ufb01cation accuracy, but also add extra dif\ufb01cul-ties in \ufb01nding potentially useful knowledge (Oh et al. 2004; Saeys et al. 2007)."]} +{"38084950|10739218": ["The neuro-fuzzy approach is a typical approach for the developing of such types of systems (Mitra and Hayashi 2000; Nieto and Torres 2003; Russo and Jain 2001; Verma and Zakos 2001).", "The neurofuzzy approach is a typical approach for the developing of such types of systems (Mitra and Hayashi 2000; Nieto and Torres 2003; Russo and Jain 2001; Verma and Zakos 2001)."]} +{"7527280|11894197": ["Feature selection is an important topic in data mining and machine learning and has been studied for many years in literature [10, 19, 26, 31]."]} +{"2411481|43059": ["Another important, more complex constrained CPD model, which can be represented graphically as nested 2PARALIND is abbreviation of PARAllel with LINear Dependencies, while CONFAC means CONstrained FACtor model (for more detail see [42] and references therein.", "Similarly, we can define PARALIND/CONFAC-(K, N) models2described as [42] X \u223c= G\u00d71 B(1) \u00d72 B(2) \u00b7 \u00b7 \u00b7 \u00d7N B(N) (15) = JI; B(1)\u03a6(1), .", "Tucker-(K, N) model is the PARATUCK-(K, N) model (see review paper of Favier and de Almeida [42] and references therein)."]} +{"2411481|7761990": ["In the case of statistical independence constraints, the problem can be related to models of group ICA through suitable pre-processing, dimensionality reduction and post-processing procedures [22]."]} +{"23887205|8281388": []} +{"23887205|11894197": []} +{"13054771|10608305": ["Some authors classify DVFS under DPM techniques [17]."]} +{"13054771|10837932": ["This technique is known as the Adaptive Link Rate (ALR), stated by many [28,29] as the future of \u201cGreen Networking\u201d."]} +{"13054771|10658846": ["[19]."]} +{"95591095|18986679": []} +{"95591095|192934": []} +{"84862819|3420321": ["18,19 Mapping strategies 20,21 and variant calling methods are also heterogeneous, and while variant callers tend to identify similar base substitutions, 22 they often differ dramatically in assigning indels and copy number variants."]} +{"527532|206742377": ["Information extraction is necessary to structuralize the raw data so that they can be easily digested by analysis algorithms [2, 3]."]} +{"881376|1230643": ["Meanwhile, in order to achieve satisfactory coverage, typical WSNs are densely deployed in sensor field [7]."]} diff --git a/edge/graph_13798508.jsonl b/edge/graph_13798508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e30e5236267813c4114e986e6f5521fc2b2d2f1a --- /dev/null +++ b/edge/graph_13798508.jsonl @@ -0,0 +1 @@ +{"12432306|15164501": ["Cultural compatibility refers to the closeness of behavior patterns, values, and norms within a partnership [ 43 ].", "Cultural compatibility refers to the closeness of behavior patterns, values and norms within a partnership [ 43 ]."]} diff --git a/edge/graph_13808741.jsonl b/edge/graph_13808741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ace40480f45a400470743c754ecd8cb693cd1fd --- /dev/null +++ b/edge/graph_13808741.jsonl @@ -0,0 +1,19 @@ +{"26096860|4474193": []} +{"26096860|17516538": ["60 Expert Systems, February 2011, Vol. 28, No. 1 c 2010 Blackwell Publishing Ltd\nsurveillance systems (Hu et al., 2004; Cucchiara et al., 2007)."]} +{"41342509|17516538": []} +{"15841940|1708582": ["Index Terms\u2014Object tracking, abrupt motion, Wang-Landau method, density-of-states, N-fold way, Markov Chain Monte Carlo\n\u00c7"]} +{"62054337|14970359": []} +{"62054337|7788290": ["Thorough reviews of human-specific trackers can be found in (Aggarwal & Cai, 1999; Gavrila, 1999; Moselund & Granum, 2001)."]} +{"7440515|17516538": ["problems, such as tracking [8, 16, 27] and sensor fault detection [26]."]} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"13365233|14970359": ["Each of the aforementioned problems has been addressed to some extent (e.g., spatiogram [8] for encoding spatial information in histogram)."]} +{"13365233|7788290": ["Each of the aforementioned problems has been addressed to some extent (e.g., spatiogram [8] for encoding spatial information in histogram)."]} +{"4646924|11042075": []} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} diff --git a/edge/graph_13812507.jsonl b/edge/graph_13812507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..475bb8ebb3ecbb20185545ab7a703fccf31d0472 --- /dev/null +++ b/edge/graph_13812507.jsonl @@ -0,0 +1,2 @@ +{"12579401|1014845": ["B\u00b4ona summarizes the subsequent results (again, mainly combinatorial) in his survey [22].", "Noticeably, the new results appeared only after a gap of twenty years, with the work of Atkinson et al., B\u00b4ona et al., or West (see the survey of B\u00b4ona [22] for references)."]} +{"55046800|17929320": []} diff --git a/edge/graph_13812825.jsonl b/edge/graph_13812825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..694e4fef93cb3520cf6f3e1d795200e8887871b3 --- /dev/null +++ b/edge/graph_13812825.jsonl @@ -0,0 +1 @@ +{"23623180|191396": []} diff --git a/edge/graph_13818577.jsonl b/edge/graph_13818577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a3e2f9f917e44090ea4e7dfd0fea39fcdfceea2 --- /dev/null +++ b/edge/graph_13818577.jsonl @@ -0,0 +1,13 @@ +{"14854256|16481413": ["In the literature, there exists a vast amount of DSLs targeted at different applications domains [11], such as pick and place [12] and assembly [5], and different technological components such as perception [13] and control [14]."]} +{"18249238|535695": ["Therefore, active estimation of uncertain parameters more accurately has also been a focus of research [22]."]} +{"9276182|535695": ["For tasks in assembly, robotic systems have to be able to cope with uncertainty arising from an unstructured environment [16], [20]."]} +{"46889597|16481413": []} +{"4473003|14970359": ["A number of detailed surveys (Aggarwal and Cai 1999; Moeslund and Granum 2000; Moeslund et al. 2006, among others) have already explored how such actions can be captured, analysed and understood; what this paper will concentrate on is the different approaches to move beyond the demonstrated\u2026"]} +{"17745495|8815923": ["Lots of studies have been devoted to individual problems like assembly planning [3], picking-up and placing-down objects [4, 5], regrasping [6\u20138], as well as motion planning [9]."]} +{"31305687|15830743": ["According to (Jimenez, 2013), an assembly is an object composed of individual parts in given relative placements, such that they do not overlap and each part is touching a subset of the assembly.", "Programming of industrial robot assembly tasks involves specifying low-level control algorithms to perform assembly operations (Nevins & Whitney, 1980) as well as the specification of an appropriate sequence of assembly operations that lead to the final product assembly (Jimenez, 2013)."]} +{"940587|1452734": ["To address these challenges, we adopt two fundamental metaphors: (i) learning by imitation [1] as a powerful means to teach a complex humanoid (social) robot and (ii) a developmental approach to balance the system complexity at the various levels of functional performance [2], [3], [4].", "These observations suggested the Developmental Approach to Robotics ([2], [3], [4])."]} +{"18176831|1932843": ["Often applied paradigm for motion adaptation is reinforcement learning (RL) applying probabilistic algorithms [5], which can deal with high dimensionality spaces induced by parameterised policies [6]."]} +{"1876898|15369615": ["Currently, such edge detectors are only used to generate fundamental cues to construct more robust features or provide complementary information for semantic mapping systems [53]."]} +{"5561593|4019175": []} +{"14765077|14868015": []} +{"14592634|9107727": ["A broad range of these models encompasses sparse subspace clustering [6], DP-space clustering [7], parsimonious models [8], mixture of factor analyzers (MFA) [9] or mixture of probabilistic principal component analyzers (MPPCA) [10]."]} diff --git a/graph_1382531.jsonl b/edge/graph_1382531.jsonl similarity index 100% rename from graph_1382531.jsonl rename to edge/graph_1382531.jsonl diff --git a/graph_4718876.jsonl b/edge/graph_13835884.jsonl similarity index 100% rename from graph_4718876.jsonl rename to edge/graph_13835884.jsonl diff --git a/edge/graph_13836751.jsonl b/edge/graph_13836751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..395f06e3d46db8a29a215defcc1f60998397fe2e --- /dev/null +++ b/edge/graph_13836751.jsonl @@ -0,0 +1 @@ +{"3147007|6337591": ["This dialogue literature thus widely applies reinforcement learning (Walker, 2000; Schatzmann et al., 2006; Gasic et al., 2013b; Singh et al., 1999; Singh et al., 2000; Singh et al., 2002) to train dialogue policies."]} diff --git a/edge/graph_13839053.jsonl b/edge/graph_13839053.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2db086454ffc31f23d29a5c9c8f112ca752eafc --- /dev/null +++ b/edge/graph_13839053.jsonl @@ -0,0 +1,2 @@ +{"5688927|11608263": ["Multilabel classification methods can be categorized into two different groups [1]: i) problem transformation methods, and ii) algorithm adaptation methods.", "Table 1 shows certain standard statistics of these datasets, such as the number of examples in the train and test sets, the number of numeric and discrete attributes and the number of labels, along with multilabel data statistics, such as the number of distinct label subsets, the label cardinality and the label density [1]."]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} diff --git a/edge/graph_13846123.jsonl b/edge/graph_13846123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f9e256f69604935f8044e98a5bed545e3114440 --- /dev/null +++ b/edge/graph_13846123.jsonl @@ -0,0 +1,8 @@ +{"38407065|4967411": []} +{"43212761|4967411": ["The use of linguistic information implies the need for computing with words (CWW) processes [12, 17, 41] that can be carried out by different linguistic computational models [12, 17]."]} +{"7594979|4967411": ["This domain is key in our case study because the global assessments will be expressed in it in order to offer results easy to interpret, following the CWW methodology.", "The CWW methodology considers that inputs and output results should be expressed in a linguistic domain in order to be close to human natural language, providing interpretable and understandable results [28, 29].", "To obtain results close to human beings and taking into account the linguistic modeling of the unified information, we shall implement processes of computing with words (CWW) [28, 29], by using a multi-step aggregation process, considering the ordered weighted average operator, the weighted arithmetic average operator and the Choquet integral as aggregation operators, because they take into account reviewers weights and the interaction among criteria.", "Section 3 reviews a CWW approach based on linguistic 2-tuple model to deal with heterogeneous information.", "The previous fuzzy sets are conducted into linguistic 2-tuples which facilitate the processes of CWW and produce interpretable results [21].", "In this phase of our case study, we have obtained linguistic results for each employee in each step of the multi-step aggregation process following the CWW methodology.", "The linguistic 2-tuple representation model has a linguistic computing model associated that accomplishes CWW processes in a precise way.", "The CWW methodology considers that inputs and output results should be expressed in a linguistic domain to be close to human cognitive model (natural language) and provide interpretable and understandable results.", "The processes of computing with words (CWW) [39,40] accomplished during the decision analysis process will be carried out, by a multi-step aggregation procedure that considers the interaction among the evaluated criteria and the relevance of the different reviewers.", "CWW is a methodology in which objects of computation are words or sentences from a natural language.", "The linguistic 2-tuple model [21] and its extended approaches (see [16,20,22,37]) provide methods to deal with complex decision making problems, following the CWW methodology."]} +{"16660885|4967411": ["E-mail addresses: martin@ujaen.es (L. Mart\u0131\u0301nez)\nMany real world problems need to deal with uncertainty, therefore the management of such uncertainty is usually a big challenge."]} +{"11174611|4967411": []} +{"14868263|4967411": ["2010 ) not only since Zadeh ( 1996 ) coined it, but also since the early 1980s, when different researchers such as Tong and Bonissone ( 1980 ), Schmucker ( 1984 ), and Yager ( 1981 ) started to propose different computing schemes to operate with linguistic information."]} +{"46223238|787899": []} +{"4962188|4967411": []} diff --git a/graph_4776337.jsonl b/edge/graph_13849423.jsonl similarity index 100% rename from graph_4776337.jsonl rename to edge/graph_13849423.jsonl diff --git a/graph_1386147.jsonl b/edge/graph_1386147.jsonl similarity index 100% rename from graph_1386147.jsonl rename to edge/graph_1386147.jsonl diff --git a/edge/graph_13867280.jsonl b/edge/graph_13867280.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f04bfa1f83088eac605f0c61d3265bba239bae7 --- /dev/null +++ b/edge/graph_13867280.jsonl @@ -0,0 +1,4 @@ +{"1830113|1708582": ["The competition rules are inspired from the principles of reinforcement learning [21] [36].", "Nareyek [24] [25] also proposed a hyperheuristic method which uses ideas based on reinforcement learning [21] [36] in order to choose which heuristic to apply at each decision point."]} +{"818688|508912": []} +{"11003004|508912": ["General surveys of various adaptive systems in evolutionary computations and their influences can be found in [16] and [17]."]} +{"62247182|508912": []} diff --git a/graph_4796356.jsonl b/edge/graph_13867632.jsonl similarity index 100% rename from graph_4796356.jsonl rename to edge/graph_13867632.jsonl diff --git a/edge/graph_13868111.jsonl b/edge/graph_13868111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6783aa2167b9d1776507ab342e6a4cf3e2faf2f --- /dev/null +++ b/edge/graph_13868111.jsonl @@ -0,0 +1,11 @@ +{"16619644|9436861": ["Existing work has systematically studied the literature about GPU-accelerated systems [10], compared programming productivity of OpenACC and CUDA using a group of students to parallelize sequential codes [7], or used kernels for comparing execution time of OpenCL and CUDA-based implementations.", "Mittal and Vetter [10], provide a comprehensive coverage of literature for GPU-accelerated computing systems."]} +{"20125939|165863": ["Therefore, it is critical to explore innovative methods to manage GPU power efficiently (Mittal and Vetter, 2015)."]} +{"9436861|17779575": ["For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|165863": ["; Mittal and Vetter 2015].", "CPU versus GPU debate [Gregg and Hazelwood 2011; Lee et al. 2010; Mittal and Vetter 2015; Vuduc et al. 2010] toward a CPU and GPU paradigm where the best features of both can be intelligently combined to achieve even further computational gains."]} +{"9436861|13037420": ["However , mobile systems also impose very stringent cost and power budgets [Mittal 2014c].", "For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|12904520": []} +{"9895676|9436861": ["However, due to different performance characteristics of their processin g elements, achieving a good workload distribution across multi ple devices on heterogeneous systems is non-trivial [4], [5], [ 6]."]} +{"9895676|7893490": []} +{"15411954|7893490": ["The performance model [28]\u2013[30] enables us to ensure that the implementation behaves as expected."]} +{"2665925|7158350": ["Several machine learning algorithms are available, including Neural Networks [16], Support Vector Machines\n(SVMs) [17] and Decision Trees [18].", "Several machine learning algorithms are available, including Neural Networks [16], Support Vector Machines (SVMs) [17] and Decision Trees [18]."]} +{"29482512|7893490": []} diff --git a/graph_484056.jsonl b/edge/graph_13872322.jsonl similarity index 100% rename from graph_484056.jsonl rename to edge/graph_13872322.jsonl diff --git a/graph_4850963.jsonl b/edge/graph_1387401.jsonl similarity index 100% rename from graph_4850963.jsonl rename to edge/graph_1387401.jsonl diff --git a/edge/graph_13881738.jsonl b/edge/graph_13881738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4591341cd13baf16c6bb9b42c57dcffb5918bd1 --- /dev/null +++ b/edge/graph_13881738.jsonl @@ -0,0 +1,7 @@ +{"21936705|2383780": ["Elmenreich [8] gave a review and the comparison between different models of MFI."]} +{"5609860|20905429": ["Recent research has shown that, by carefully managing system resources dynamically, wearable wireless units can collect data for several days without recharging their batteries [8], [ 9 ]."]} +{"206712275|2383780": ["Elmenreich [5] gave a review and comparison between proposed models of MFI."]} +{"37505515|191396": ["\u2026clustering algorithms are used as feature weighting method where they transform the extracted non-linearly separable features to linearly separable features and also to map the features according to the distributions ( 1967; Bezdek 1981; Chiu 1994; Yager and Filev 1994; Xu and Wunsch 2005).", "Several clustering algorithms have been proposed in the literature (MacQueen 1967; Bezdek 1981; Chiu 1994; Yager and Filev 1994; Xu and Wunsch 2005)."]} +{"32433931|191396": ["\u2026\u00bd u i , j (cid:2) cxN is the fuzzy partition matrix and u i , j 2 \u00bd 0, 1 (cid:2) the membership coefficient of the j th object in the i th cluster (Xu and Wunsch 2005); M \u00bc \u00bd m 1 , . . . , m c (cid:2) the cluster prototype matrix; m 2 \u00bd 1, 1(cid:2) the fuzzification parameter; and D ij \u00bc D \u00f0 x j\u2026", "FCM attempts to find a partition for a set of data points x j 2 R d , j \u00bc 1, . . . , N while minimising the cost function (Equation (1)) (Xu and Wunsch 2005) where U \u00bc \u00bd u i , j (cid:2) cxN is the fuzzy partition matrix and u i , j 2 \u00bd 0, 1 (cid:2) the membership coefficient of the j th object in\u2026"]} +{"118420008|9020157": []} +{"118420008|33286487": []} diff --git a/graph_4855722.jsonl b/edge/graph_13882724.jsonl similarity index 100% rename from graph_4855722.jsonl rename to edge/graph_13882724.jsonl diff --git a/edge/graph_13888651.jsonl b/edge/graph_13888651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68ba6ae85d757dd8c19ec7f421a4e6d7527c3d6e --- /dev/null +++ b/edge/graph_13888651.jsonl @@ -0,0 +1,4 @@ +{"207327661|1708582": ["Reinforcement learning is an iterative process where at first the learners take almost random actions, but are continually exploring their action spaces to find actions that lead to high values of the reward function (Kaelbing et al., 1996; Sutton and Barto, 1998).", "In this manner, under benign assumptions, the value of taking action a, Va (i.e., the expected reward), converges to the true reward of choosing vote a (Kaelbing et al., 1996; Sutton and Barto, 1998).", "The votes of the VACs are adapted using a simple reinforcement learning algorithm (Kaelbing et al., 1996; Sutton and Barto, 1998).", ", the expected reward), converges to the true reward of choosing vote a (Kaelbing et al., 1996; Sutton and Barto, 1998)."]} +{"54141573|14808716": []} +{"54141573|191396": ["Segundo Handl et al. (2005), para a ana\u0301lise explorato\u0301ria deve-se considerar a aplicac\u0327a\u0303o de va\u0301rias medidas de validac\u0327a\u0303o em resultados obtidos com algoritmos conceitualmente diferentes, considerando os diversos n\u0301\u0131veis de refinamento poss\u0301\u0131veis.", "Xu and Wunsch 2005).", "\u2026do agrupamento e\u0301 encontrar uma estrutura de clusters nos dados, em que cada cluster conte\u0301m objetos que compartilham algumas caracter\u0301\u0131sticas ou propriedades consideradas relevantes para o dom\u0131\u0301nio dos dados estudados (Jain and Dubes 1988; Monti et al. 2003; Handl et al. 2005; Xu and Wunsch 2005).", "Pore\u0301m, a maioria das medidas de validac\u0327a\u0303o e\u0301 tendenciosa, cada uma favorecendo um crite\u0301rio de agrupamento diferente (Handl et al. 2005).", "O objetivo do agrupamento e\u0301 encontrar uma estrutura de clusters nos dados, em que cada cluster conte\u0301m objetos que compartilham algumas caracter\u0301\u0131sticas ou propriedades consideradas relevantes para o dom\u0131\u0301nio dos dados estudados (Jain and Dubes 1988; Monti et al. 2003; Handl et al. 2005; Xu and Wunsch 2005).", "A ana\u0301lise de agrupamento e\u0301 de grande utilidade na ana\u0301lise explorato\u0301ria de dados sobre os quais existe pouco ou nenhum conhecimento pre\u0301vio dispon\u0301\u0131vel (Jain and Dubes 1988; Handl et al. 2005; Xu and Wunsch 2005).", "Existem inu\u0301meras te\u0301cnicas de validac\u0327a\u0303o de agrupamento descritas na literatura que podem auxiliar tanto na selec\u0327a\u0303o do algoritmo mais apropriado, uma vez que va\u0301rios algoritmos tenham sido aplicados aos dados (Halkidi et al. 2001; Handl et al. 2005; Faceli et al. 2005d), quanto na selec\u0327a\u0303o da melhor partic\u0327a\u0303o, dada a aplicac\u0327a\u0303o de um algoritmo com va\u0301rios valores para seus para\u0302metros."]} +{"657888|14297493": ["Three representative multiplicative perturbation methods like rotation perturbation, projection perturbation and geometric perturbation were proposed by Chen and Liu (2008)."]} diff --git a/edge/graph_13892164.jsonl b/edge/graph_13892164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a9c8010b2e42dee626e2adbb88fe451991c61a6 --- /dev/null +++ b/edge/graph_13892164.jsonl @@ -0,0 +1 @@ +{"6440535|1666690": ["Asynchronous selftimed circuits based on the Quasi-Delay-Insensitive (QDI) model [5] is a feasible solution to the timing margin problems because self-timed circuits which do not have timing-dependent constraints can work in accordance with delay variations."]} diff --git a/graph_1389516.jsonl b/edge/graph_1389516.jsonl similarity index 100% rename from graph_1389516.jsonl rename to edge/graph_1389516.jsonl diff --git a/graph_4867108.jsonl b/edge/graph_13897660.jsonl similarity index 100% rename from graph_4867108.jsonl rename to edge/graph_13897660.jsonl diff --git a/graph_1389915.jsonl b/edge/graph_1389915.jsonl similarity index 100% rename from graph_1389915.jsonl rename to edge/graph_1389915.jsonl diff --git a/edge/graph_13902036.jsonl b/edge/graph_13902036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d37703996c206bfb7774d574a34582d7a4c80476 --- /dev/null +++ b/edge/graph_13902036.jsonl @@ -0,0 +1,15 @@ +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"7657963|1805048": []} +{"2377549|7020971": ["afeguards on step sizes we propose are quite important in practice: without these checks, we observe divergence when the initial step sizes are chosen too large. Motivated by the convergence proof in [Ber11], for each row, we seek a step size on the order of 1=kg ik 2, where g i is the gradient of the objective function with respect to x i. We start by choosing an initial step size scale i for each row o", "size rule t = 1=tguarantees convergence to the globally optimal Xif Y is xed, while using a xed, but suciently small, step size guarantees convergence to a small O() neighborhood around the optimum [Ber11]. The technical condition required on the step size is that t <1=L, where Lis the Lipshitz constant of the gradient of the objective function. Bolte et al. have shown that the iterates xt i and yt "]} +{"8311160|14697846": ["The users are connected using one of the existing P2P platforms [1].", "In [3] the authors proposed basing privacy preservation on pure decentralized Peer-to-Peer (P2P) communication between the users [1]."]} +{"13649911|1805048": []} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"663386|1805048": ["RELATED WORK Collaborative Filtering (CF) [35] techniques have been known to have several attractive advantages over other recommendation strategies, such as Content-based Filtering [22] in Personalized Recommender Systems [21].", "Recently, MF approaches have gained great popularity as they usually outperform traditional methods [35, 12] and have achieved state-of-the-art performance, especially on large-scale recommendation tasks [17].", "To gain better prediction accuracies and to overcome the shortcomings of memory-based algorithms, modelbased approaches have been investigated extensively, which estimate or learn a model on user-item rating matrices to make rating predictions [35, 21]."]} +{"4876217|14148655": ["\u2026users tend to visit very popular items and select similar items, while old users usuallyhavemorespecificinterests[53,54],andusersbehavemuchdifferentlybetweenlow-risk(e.g.,collectingbookmarks, downloading music, etc.) and high-risk (e.g., buying a computer, renting a house, etc.) activities [55,56]."]} +{"4876217|4859605": ["The tripartite network representation has found its application in collaborative tagging systems (also called folksonomies in the literature) [79, 80, 81, 82], where users assign tags to online resources, such as photographs in flickr.", "In [82], the present tag-aware algorithms are"]} +{"4876217|207372751": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices.", "Some challenges can also be partially solved by hybridization, for example, the link prediction algorithm can be used to generate artifical links that could eventually improve the recommendation in very sparse data [123, 319]."]} +{"4876217|18540015": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices."]} +{"4876217|1805048": ["For additional information see the recent review articles [123,124], and [125] is a nice survey that contains a number of similarity indices.", "[15,123]), many hybrid algorithms are proposed to avoid certain weaknesses in each approach and thereby improve the recommendation performance."]} +{"7259012|1805048": ["Following the classification of traditional CF-based RSs [2,3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches.", "CF approaches can be further grouped into model-based CF and neighborhood-based CF [2,3].", "Following the classification of traditional CF-based RSs [2] [3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches."]} +{"16506488|1805048": ["Categories and \nSubject Descriptors G.1.0 [Mathematics of Computing]: NUMERICAL ANAL\u00adYSIS Parallel algorithms General \nTerms Algorithms, Design, Performance Keywords Semi-sparse Algorithm, Reduce Vector, Thread Pool, Mes\u00adsage \nPassing Interface, Recommendation System 1."]} +{"51734399|1805048": ["There has been a good deal of research over the last 20 years on how to automatically recommend things to people and a wide variety of methods have been proposed [1, 140]."]} diff --git a/edge/graph_13902799.jsonl b/edge/graph_13902799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7347dc0040db1a0e0de8d3729d3231ccdae907b9 --- /dev/null +++ b/edge/graph_13902799.jsonl @@ -0,0 +1,5 @@ +{"14654993|15247126": ["Hence, future countermeasure development can focus on patterns, and the development of real-world protection against covert channels is greatly simplified.", "\u2026considered a serious threat to Internet users [Gianvecchio and Wang 2007], because they can be used to hide command and control traffic of botnets, coordinate DDoS attacks, hide military and secret service communications, and secretly leak sensitive data [Lucena et al. 2006; Zander et al. 2007].", "Protection techniques against covert channels aim to eliminate a covert channel, limit a channel\u2019s capacity, or detect a covert channel [Zander et al. 2007].", "We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns.", "Although coarse categorizations of network covert channel techniques exist [Zander et al. 2007; Meadows and Moskowitz 1996; Shen et al. 2005; Llamas et al. 2005; Zhiyong and Yong 2009], no comprehensive and current catalog of the existing techniques is available.", "On the other hand, network covert channels are a dual-use good and can prevent illicit information transferred by journalists or whistle-blowers from being detected, and thus support the freedom of speech in networks with censorship [Zander et al. 2007]."]} +{"55902318|15247126": ["Often the simple fact that communication exists is enough to raise suspicion and take further actions.", "Examples include government agencies versus criminal organisations, hackers or corporate spies versus company IT departments, or dissenting citizens versus their governments."]} +{"9365379|385243": []} +{"6023739|1230643": []} +{"18697239|15247126": ["The working model of most malware is to compensate for their lack of access rights by trying to escalate their privileges to those of a more powerful user (preferably the root), mainly through exploiting software bugs."]} diff --git a/edge/graph_139100733.jsonl b/edge/graph_139100733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82fd69d9dfcff4583d54590db43c59717e17f5ad --- /dev/null +++ b/edge/graph_139100733.jsonl @@ -0,0 +1,3 @@ +{"22714123|17373041": ["Regarding the value from distributed ASD, such as production cost savings and quick time delivery [33], examining TD in distributed ASD becomes important."]} +{"2560733|206778272": []} +{"17417249|206778272": ["A variety of refactoring work has been proposed in the literature [8][9][10][15][19][20][22][28].", "The results confirm the efficiency of our technique to provide better refactoring management compared to several existing refactoring techniques [18][20][15][17]."]} diff --git a/edge/graph_139102221.jsonl b/edge/graph_139102221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aeed0083edda6d37cd40edc8fab67a27bda5608c --- /dev/null +++ b/edge/graph_139102221.jsonl @@ -0,0 +1,15 @@ +{"13896124|19739314": ["We refer to the survey [23] for a description and classification of the major community detection methods, and algorithms according to their input and output data."]} +{"7639544|3646491": ["However, (a) pattern mining over graph databases [24,27] cannot be used to mine GPARs, as their anti-monotonic property does not hold in a single graph [25].", "There have been algorithms for pattern mining in graph databases [22,24] (see [25] for a survey).", "However, as observed in [7, 13, 25], this conventional notion is not anti-monotonic."]} +{"7639544|207372751": ["The need for graph-pattern association rules (GPARs) is evident in social media marketing, community structure analysis, social recommendation, knowledge extraction and link prediction [33]."]} +{"5739566|4939643": ["(Cai et al. 2016) Survey Evolutionary techniques for the identification communities in networks", "The comprehensive overview of the community detection techniques can be found in (Cai et al. 2016; Fortunato and Hric 2016; Fortunato 2010)."]} +{"5739566|11918465": ["\u2026et al. 2015) Survey Uncovering communities in dynamic social networks (Dhumal and Kamde 2015) Survey Community discovery in online social networks (Drif and Boukerram 2014) Literature Survey Dynamic community identification and social network models (Dhumal and Kamde 2015) Survey and empirical\u2026", "(Drif and Boukerram 2014) Survey Techniques for uncovering communities in social networks", "\u2026identification and social network models (Dhumal and Kamde 2015) Survey and empirical evaluation Community identification in large-scale networks (Drif and Boukerram 2014) Survey Techniques for uncovering communities in social networks (Y.-X. Ma et al. 2013) Visual Analysis Community discovery\u2026", "(Drif and Boukerram 2014) Literature Survey Dynamic community identification and social network models"]} +{"5739566|19739314": ["2013) Visual Analysis Community discovery of multi-context mobile social networks (Planti\u00e9 and Crampes 2013) Survey Social community identification (Malliaros and Vazirgiannis 2013) Survey Community discovery in directed networks", "\u2026for uncovering communities in social networks (Y.-X. Ma et al. 2013) Visual Analysis Community discovery of multi-context mobile social networks (Planti\u00e9 and Crampes 2013) Survey Social community identification (Malliaros and Vazirgiannis 2013) Survey Community discovery in directed networks\u2026"]} +{"173990393|139102221": ["Recently, many other dense subgraph models [24], such as k-core [7, 47, 51, 23, 22, 20, 25, 26, 67, 12], k-truss [15, 37, 69, 39, 38], k-(r, s) nucleus [60, 58, 61, 59] (a generalization of k-core and k-truss), k-clique [16, 34], k-edge connected components [35, 36]."]} +{"62597678|49842767": []} +{"4646619|207372751": []} +{"16037049|207372751": ["Analyzing the graph structure has been shown to be highly beneficial in targeted advertising [36], fraud-detection [27], missing link prediction [23, 18], locating functional modules of interacting proteins [33, 16], identifying new\nThis work is licensed under the Creative Commons\u2026"]} +{"41018890|19739314": []} +{"42453914|8125630": ["As evidenced by e.g., Chaudhuri and Dayal (1997); Sarawagi et al. (1998); Rizzi (2007) basic peculiarities of typical datawarehouse exploration can be summarized by:\n1.", ", Chaudhuri and Dayal (1997); Sarawagi et al. (1998); Rizzi (2007) basic peculiarities of typical datawarehouse exploration can be summarized by:"]} +{"7885409|7389705": ["It is hard to model these interacted objects as homogeneous networks, while it is natural to model different types of objects and relations among them as heterogeneous networks."]} +{"17084176|17981371": []} +{"17084176|386036": []} diff --git a/graph_4878703.jsonl b/edge/graph_139103431.jsonl similarity index 100% rename from graph_4878703.jsonl rename to edge/graph_139103431.jsonl diff --git a/graph_4895282.jsonl b/edge/graph_13910350.jsonl similarity index 100% rename from graph_4895282.jsonl rename to edge/graph_13910350.jsonl diff --git a/edge/graph_139107630.jsonl b/edge/graph_139107630.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4b84ef206b0464c08c675cd6e83ad66033101700 --- /dev/null +++ b/edge/graph_139107630.jsonl @@ -0,0 +1,47 @@ +{"18012971|17381415": ["In both configurations, i.e., with and without the local load, the prime objective of the DG system is to transfer a high-quality current (grid current) into the utility grid with the limited total harmonic distortion (THD) of the grid current at 5%, as recommended in the IEEE 1547 standards [15].", "Date of publication April 25, 2014; date of current version September 12, 2014."]} +{"26052437|17381415": ["ac buses can work on bidirectional power control mode, dc link voltage control mode, or ac link voltage control mode [56]\u2013[58]."]} +{"26052437|12083425": ["ac buses can work on bidirectional power control mode, dc link voltage control mode, or ac link voltage control mode [56]\u2013[58]."]} +{"28783167|17381415": ["In addition to environmental aspects, their shorter build time may be a motivating force accelerating development [1]."]} +{"29895353|17381415": ["In fact, several advanced grid synchronization systems, able to operate under generic conditions, have been reported previously in [7]-[8]."]} +{"6747610|17381415": ["Thanks to the achievements in the control strategy, the grid interfacing converters (IFCs), like interfacing VSI in DG systems as well as the hybrid ac/dc grid interlinking converters, are being developed to multifunctional power conversion equipment instead of a simple active power supplier [1]."]} +{"44268|17381415": ["Some control approaches for grid-connected converters applied to distributed power generation can be found in the literature [10]."]} +{"44268|12083425": ["Therefore, back-to-back multilevel converters [15]\u2013[19] are suitable to connect variable-speed wind turbines to the grid."]} +{"9120777|12083425": ["To ensure the robust interconnection of these RESs, the interfacing converter with LCL filter is normally placed between RESs and the main grid [1], [2]."]} +{"25051407|17381415": ["ergy, such as wind energy, microhydroenergy, and solar energy, which are rapidly increasing their share in distributed generation (DG) [1]."]} +{"8926342|17381415": ["the grid reliably [1]."]} +{"23325882|17381415": ["Voltage and Current Controllers Due to the difficulties of using PI controllers to track non-dc variables, proportional-resonant (PR) controllers are usually preferred to control the voltage and current in the stationary reference frame [47]."]} +{"23325882|17758458": ["Compensation of voltage unbalance is usually done using series active power filter through injection of negative sequence voltage in series with the power distribution line [13]-[15]."]} +{"9692429|4643404": ["A large variation of the dclink voltage can lead to efficiency and performance degradation of its downstream converters [1], increased voltage stresses of the system [2], and interference between the dc and ac utilities due to the coupling effect.", "and has a relatively short lifetime, while film capacitor has low capacitance density, which leads to large form factor [1]."]} +{"11959283|17381415": ["monic controllers [11]\u2013[13] and linear harmonic compensators [5], [14], [15]."]} +{"12031662|17381415": ["Vector controllers generally include three-phase reduced-dynamics phase-locked loops (PLLs) for their synchronization with the grid [13]."]} +{"106649308|17381415": []} +{"23002664|17381415": ["The grid-connected inverter is usually used as the interface between the green power source and the utility grid [1]."]} +{"13342118|17758458": ["provide a comprehensive review of active filter technology [68] and review ac/dc converters for improved power quality [69], [70], which can be the foundation for power quality improvements in electrified railway systems."]} +{"9881379|17381415": ["As shown in [20], there are different ways to structure the grid converter control, and here, the implementation in a \u03b1\u03b2 stationary reference frame using a dead beat current controller has been selected.", "These strategies can be an add-on feature to the basic control structures of gridconnected power generation systems [20] in order to facilitate different options when running through grid disturbances."]} +{"9881379|12083425": ["interconnection of the DPGS to the utility grid [2]\u2013[4]."]} +{"24702285|17381415": ["A S A NEW means of power generation, distributed generation (DG) systems are experiencing rapid growth along with the increasing demand for electrical energy, the deregulation of electricity markets and the thrust to reduce greenhouse gas emissions from the traditional electric power generation systems [1], [16].", "In grid-connected DG systems, three-phase pulsewidth-modulation (PWM) voltage-source inverters (VSIs) are often employed for power conversion, grid synchronization and control optimization [2], [16]."]} +{"24702285|12083425": ["In grid-connected DG systems, three-phase pulsewidth-modulation (PWM) voltage-source inverters (VSIs) are often employed for power conversion, grid synchronization and control optimization [2], [16]."]} +{"2970688|17381415": ["Proportional-Resonant Voltage and Current Controllers Due to the difficulties of using proportional-integral (PI) controllers to track non-dc variables, proportional-resonant (PR) controllers are usually preferred to control the voltage and current in stationary reference frame [33]."]} +{"2970688|17758458": ["Compensation of voltage unbalance is usually done using series active power filter through injection of negative sequence voltage in series with the distribution line [2]-[4]."]} +{"14359975|8783262": ["battery chargers can produce deleterious harmonic effects on electric utility distribution systems [5], [6], although chargers with an active rectifier front end can mitigate this impact."]} +{"8907860|19792818": []} +{"8907860|6959212": []} +{"8907860|121289": ["energy, reduce cost, increase reliability, efficiency and transparency [91]."]} +{"18953069|17381415": []} +{"11663766|17381415": ["In addition, the reduction of the network congestion, the improvement of local power quality, and the provision of ancillary services are notable advantages of the present distributed power generation scenario [2]."]} +{"11663766|12083425": []} +{"2057899|17381415": ["As a DG unit is normally connected to a distribution system with power electronics-based interface, the control of power electronics converter is the key for the robust integration of DG units [1], [2]."]} +{"33984258|17381415": ["quality ac power and inject it into the grid reliably [1]."]} +{"10064066|17381415": ["A S an interface between distributed power generation systems and the power grid, a grid-connected inverter is important in power conversion and guaranteeing to inject high-quality power into the grid [1]."]} +{"46896736|17381415": ["PR a1 = kr1 \u2217 Ts \u2212 2kp1; a2 = kp1 \u2212 kr1 \u2217 Ts ; b1 = 2 \u2217 cos(\u03c9s Ts ); x[0] = ig err ; y[0] = b1 \u2217 y[1] \u2212 y[2] + kp1 \u2217 x[0] +a1 \u2217 x[1] + a2 \u2217 x[2]; x[2] = x[1]; x[1] = x[0]; y[2] = y[1]; y[1] = y[0]; 214", "PI x[0] = ig err ; y[0] = y[0] + kp \u2217 (x[0] \u2212 x[1]) +ki \u2217 Ts \u2217 x[0]; x[1] = x[0]; 28", "extract maximum available power from the energy source but also is expected to transfer high quality current to the utility grid to comply with grid interconnection standards [1]."]} +{"24682925|17381415": []} +{"5209200|17381415": []} +{"646999|17381415": ["(4)\nDeveloping (3) and (4), the reference current generator canbe formulated by using the reference powersP andQ as [30]\ni\u2217\u03b1 = 2 3 \u23a1\u23a2\u23a2\u23a2\u23a3 v\u03b1 v2\u03b1 + v2\u03b2 P + v\u03b2 v2\u03b1 + v2\u03b2Q \u23a4\u23a5\u23a5\u23a5\u23a6 (5) i\u2217\u03b2 = 2 3 \u23a1\u23a2\u23a2\u23a2\u23a3 v\u03b2 v2\u03b1 + v2\u03b2 P + \u2212v\u03b1 v2\u03b1 + v2\u03b2Q \u23a4\u23a5\u23a5\u23a5\u23a6 ."]} +{"108529191|17381415": []} +{"108529191|12083425": []} +{"2238831|17381415": []} +{"11627662|12083425": ["The current paradigm in the control of wind- or solar-power generators is to extract the maximum power from the power source and inject them all into the power grid (see, for example, [1]\u2013[3])."]} +{"6388362|17381415": ["The design of this loop has been widely described in the literature and will therefore not be considered here [2], [23].", "considerations have been briefly discussed in [19], [23]\u2013[26],"]} +{"6388362|12083425": ["PHOTOVOLTAIC (PV) installations usually have a flexible design [1], [2].", "The design of this loop has been widely described in the literature and will therefore not be considered here [2], [23]."]} +{"7708183|17381415": ["In order to eliminate the current harmonic distortion effectively, multiresonant controllers (MRCs) are plugged into the PR controller [13]\u2013[15], [23], [25].", "Thus, the PR controller becomes a popular current regulator for grid-connected single-phase systems [13]\u2013[15], [23], [25]\u2013[31].", "Notably, the double-stage system has a low-power PV simulator and a dc\u2013dc boost converter [13], which is different from the PV system shown in Fig.", "of the current and future grid-connected inverters [13].", "As for the dc-link voltage variations, a prior-art study has shown that the dc-link voltage typically contains a double grid frequency component [13], [57].", "resonant controllers in parallel for the harmonics of interest, can eliminate selective harmonic distortions at a much faster speed [13], [14], [30], [31].", "a wide frequency band around the fundamental frequency [13], which can tolerate the grid frequency variation impacts to some extent.", "and reactive power, respectively, and vg\u03b1 and vg\u03b2 are the \u03b1\u03b2 components of the grid voltage generated by the secondorder generalized integrator-based orthogonal generation system [13]\u2013[15]."]} +{"13420672|17381415": ["One control goal of the grid-connected inverter is to achieve a unity power factor, and thus, a second-order generalized integrator-based phase-locked loop (PLL) system [1] is adopted to synchronize the grid current with the grid voltage.", "at the corresponding harmonic frequency [1], [11].", "power electronics interfaced loads [1]\u2013[4]."]} diff --git a/edge/graph_139108682.jsonl b/edge/graph_139108682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3644611168a15b2743abf8c140021882a1e6bf69 --- /dev/null +++ b/edge/graph_139108682.jsonl @@ -0,0 +1,26 @@ +{"69999531|10235514": ["The performance of wireless systems and transmission technologies is ultimately limited by radio channels [9]\u2013[12]."]} +{"69999531|22833814": ["between the RRU and the Rx is LOS dominance, the impact of the sparse scatterers will be noticed at the Rx represented by non-LOS (NLOS) components after a certain distance [28]."]} +{"11673523|7482876": []} +{"53019183|10663005": ["4 GHz band, a position-based model was presented under a viaduct [17], and propagation channels inside various tunnels have been measured and modeled [18], [19]."]} +{"53019183|22833814": []} +{"53019183|10744611": ["In the sub-6 GHz band, there have been many studies on railway channels at various frequencies [9]."]} +{"53019183|25686668": ["4 GHz band, a position-based model was presented under a viaduct [17], and propagation channels inside various tunnels have been measured and modeled [18], [19]."]} +{"7064439|860072": ["One of the European HSR operators started in 2005 to offer Internet access to its customers [8]."]} +{"7064439|7482876": ["It is randomly time varying: its identifiability from the measurements, the statistical characterization, and the modeling is rather challenging [80], [81]."]} +{"117526336|22833814": ["distance, the impact of the sparse scatterers will be noticed at the Rx represented by non-LoS (NLoS) components [30]."]} +{"2843176|13367219": ["Even though the GSCM developed in this paper is rather simple, the modeling concepts are fully applicable to more sophisticated GSCM implementations (such as [1] \u2013 [3]), as well and it should be straightforward to extend those models to handle the multi-link scenario.", "Examples of GSCMs, which all rely on the cluster approach, are the COST 259 [1], COST 273 [2], and WINNER [3] channel models."]} +{"4885843|22833814": []} +{"41850355|860072": ["A large number of technologies, including the system architecture [9], [10], [11], [12], signal processing methods at the physical layer [13], [14], [15], [16], novel seamless handover algorithms [17], [18], have been proposed to mitigate impacts due to the high mobility in the literature."]} +{"4941832|13367219": ["In addition, the above models usually rely on the assumption of individual scatterer distribution and do not consider the cluster structure [28]\u2013[32], where clusters are usually defined as a group of multipath components (MPCs) showing similar"]} +{"5589605|7482876": []} +{"6806007|12681089": ["Both deterministic and stochastic models of propagation channels in high-speed railway environments are of importance for designing these algorithms and techniques [1]."]} +{"58675921|22833814": ["However, after a certain distance, the impact of the sparse scatterers will be noticed at the Rx represented by non-LoS (NLoS) components [33]."]} +{"9752801|13367219": ["To extend the algorithm to cover different polarizations, a polarimetric matrix needs to be applied to the power term as in [18], and all the formulations of the KPD algorithm need to be extended to incorporate this matrix.", "Over the past 20 years, the clustering of MPCs have been widely observed in many environments [15]\u2013[17] and cluster based channel modeling has been widely adopted in many channel models, such as COST 259 [18], COST 2100 [10], 3GPP Spatial Channel Model [19], and WINNER [20] ."]} +{"9752801|191396": ["Even though clustering analysis is a hot research topic in the \ufb01eld of machine learning [22], considerable effort has to be made to adapt the results to clustering of MPCs in wireless channels.", "The Calinski-Harabasz and Davies-Bouldin indices [22] are used to determine the optimal cluster number."]} +{"53016561|21557844": []} +{"53016561|10663005": ["These applications require a bandwidth of several GHz to accommodate up to dozens of Gbps data rates in the \u201ctrain-to-infrastructure\u201d link, which is the main interface between the network on-train and the fixed network [3], [4]."]} +{"53016561|22833814": []} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"195382469|22833814": ["This special phenomenon was called echo channel effect (ECE) in [4] and [5]."]} +{"1695768|16972183": ["Once the models agree, the system-level models can easily be scaled to hundreds of users, higher bandwidth and longer transmit durations with high likelihood to correctly resemble such behavior [10]."]} diff --git a/edge/graph_139108728.jsonl b/edge/graph_139108728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47960ec2f66fb907e4895d9b5ca3a0f9c2ea9251 --- /dev/null +++ b/edge/graph_139108728.jsonl @@ -0,0 +1,32 @@ +{"3504656|8397295": ["Thismakes actions instantaneous (similarly to many timed process calculi [50]) reflecting the assumption that participants can always meet deadlines, if they want to."]} +{"51935081|51613885": ["Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper In contrast to work presented in [5\u20139, 12", "ICO stands for \u201cInitial Coin Offering\u201d wherein a share of the cryptocurrency is offered to early investors in exchange for legal tender or other cryptocurrencies\u2014for example, Factom [23] and Civic [24]; (iii) Asset-backed tokens : The tokens that are linked to a physical asset\u2014for example, Tether [25]; (iv) Participation tokens : The tokens which are distributed among the participants to decide their share in future revenues without legal obligation\u2014for example, DigixDAO [26], Crypto-One-Stop-Solution (COSS) [27], BitDice [28]; (v) Partnership tokens : The tokens which are distributed to decide the share of the shareholders.", "[6] presented a general survey of security challenges in IoT with BC being one of the solutions.", "Solutions like PriWatt [60], IBM Adept[64], Huh et al. [74] and Sikorski et al. [86] are at a theoretical level and do not present a Proof-of-Concept.", "Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper"]} +{"51935081|925507": ["Conoscenti et al. [12] analyzed literature extensively about the possible applications of BC, presenting its different forms to solve some of the security challenges.", "Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper In contrast to work presented in [5\u20139, 12"]} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"59314746|49527603": []} +{"59314746|3932531": ["Other reviews focus on security issues of the blockchain (Khan and Salah, 2017; Li et al., 2017a; Meng et al., 2018) and on its potential to enable trust and decentralisation in service systems (Seebacher et al."]} +{"59314746|3628110": []} +{"59314746|27262729": []} +{"52158502|21386749": ["[2] Applications of Blockchain to healthcare domain have been extensively explored to enable interoperability between several Health Units in a secure and auditable way."]} +{"46936025|13756844": []} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} +{"567397|3148588": ["We also re-proved handshake log integrity and properties such as partial inverses between parsing and marshalling messages directly in F \u22c6 , without relying on Coq.", "For example, with Hoare Type Theory, Nanevski et al. (2008) extend Coq with support for interactive proofs of imperative programs.", "Unlike Coq, F \u22c6 does not generate induction principles for datatypes.", "This language would provide the nearly arbitrary expressive power of a logic like Coq\u2019s, but with a richer, effectful dynamic semantics.", "While this illustrates the power of F \u22c6 \u2019s termination check, we found that the detour via accessibility predicates is very rarely needed (as opposed to Coq, for instance).", "Thus, while Coq (The Coq development team) and Agda (Norell 2007) are functional programming languages, one does not typically use them for general-purpose programming\u2014that they are implemented in OCaml and Haskell is a case in point.", "This approach is attractive in that one retains all the tools for speci\ufb01cation and interactive proving from Coq.", "While the new proof is considerably shorter (4466 lines of F \u22c6 , compared to 8577 lines of Coq), it takes over half an hour to verify.", "The style of mechanization is rather different than what is typical in tools like Coq.", "Outside dependent type theory, veri\ufb01cation-oriented languages like Dafny (Leino 2010) and WhyML (Filli\u02c6atre and Paske-vich 2013) provide good support for effects and semi-automated proving via SMT solvers, but have logics that are much less powerful than Coq or Agda, and only limited support (if at all) for higher-order programming.", "Proving that parallel substitutions terminate is tricky\u2014e.g., Adams (2006); Benton et al. (2012); Sch\u00a8afer et al. (2015) all give examples of ad hoc workarounds to Coq\u2019s termination checker.", "This is enabled by our heavy reliance on SMT solving and termination arguments based on lexical orderings\u2014lacking these features, such a style of proof seems unthinkable in Coq and maybe even Agda.", "Non-syntactic termination checks Most dependent type theories rely crucially on normalization for consistency, many researchers have been investigating improving on Coq\u2019s syntactic termination check via more semantic approaches.", "Our starting point is miTLS (Bhargavan et al. 2013), a reference implementation of TLS (from SSL 3.0 to TLS 1.2) with detailed proofs of functional correctness, authentication, and con\ufb01dentiality. miTLS is veri\ufb01ed using a patchwork of SMT-based proofs in F7 (Bhargavan et al. 2010), Coq proofs where F7 is inadequate, code reviews, and manual arguments.", "Adding effects to a type-theory based proof assistant Nanevski et al. (2008) develop Hoare type theory (HTT) as a way of extending Coq with effects.", "In addition, we have ported the proof of injectivity of handshake message formatting from Coq to F \u22c6 .", "We aim for a language that spans the capabilities of interactive proof assistants like Coq and Agda, general-purpose programming languages like OCaml and Haskell, and SMT-backed semi-automated program veri\ufb01cation tools like Dafny and WhyML.", "On the downside, one also inherits Coq\u2019s limitations, e.g., the syntactic termination check and lack of SMT-based automation.", "One cohort of researchers mainly use interactive tools like Coq and Is-abelle/HOL; another uses SMT-based tools like Dafny and F7.", "The strategy there is to provide an axiomatic extension of Coq with a single catch-all monad in which to encapsulate imperative code\u2014the discussion about a single monad in \u00a7 2.1 applies to HTT as well.", "Our style of termination proofs is in contrast with the type theories underlying systems like Coq, which rely instead on a syntactic \u201cguarded by destructors\u201d criterion.", "Using a technique similar to the one in Coq (Letouzey 2008), F \u22c6 implements code extraction to OCaml and F#.", "While it is premature to claim that F \u22c6 is simultaneously a replacement for, say, Coq, OCaml and Dafny, our initial experience is encouraging\u2014we know of no other language that supports semi-automated proving and general-purpose programming to the same extent as F \u22c6 ."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"59316859|3628110": ["These consensus algorithms are different in identity management mechanism, energy saving, and tolerating power of adversary [3]."]} +{"31840250|925507": ["In addition to bugs and vulnerabilities due to poor design and technological choices, smart meters have limited computational power, like most IoT devices.", "The integration of the IoT with smart grids has opened new opportunity in the energy market, by relying on the interoperability and interconnection of devices.", "This work has been supported by the EPSRC grant PETRAS Research Hub under the project Blockchain-empowered Infrastructure for IoT (BlockIT).", "Keywords: IoT security, blockchain, smart meter, smart contract, transactive energy", "IoT is pushing the bar opening to new interesting business opportunities and smart meters are the key driver of this digital revolution.", "Indeed, nowadays smart grid developments are heavily driven by IoT, and smart meters are advancing by featuring higher connectivity and stronger sensing capabilities.", "While the topic of transactive energy has been investigated in several papers (see, e.g., [9] for a survey), as well as many authors have explored the possibilities of using blockchain and smart contract technologies for IoT [4], very few academic works exist on integrating these technologies within smart grids.", "The compelling evolution of Internet-of-Things (IoT) is expected to disrupt several key technological areas, including Smart Energy.", ", [9] for a survey), as well as many authors have explored the possibilities of using blockchain and smart contract technologies for IoT [4], very few academic works exist on integrating these technologies within smart grids."]} +{"53099546|9352595": ["Federated Identity Management (FIM) is the most used solution to overcome these issues; especially the cross-domain issues [2], [4], [5].", "This approach simplifies the user experience by using cross-domain Single Sign-On features [5], and reduces the costs of administrating user accounts [4]."]} +{"49867601|5313655": ["However most biometric cryptosystems need biometric dependent information (helper data) which could potentially reveal signi\ufb01cant information about the original biometric template [38]."]} +{"59554580|53046901": []} +{"59554580|49527603": ["Existing literature reveals that researchers studied blockchain and AI in isolation, and their applications in various vertical domains and businesses [14]\u2013[27]."]} +{"59554580|52903603": ["of studies discussed the integration of AI and blockchain, and the implications of such integration on the way we live, work, interact, and transact [9], [28]."]} +{"59554580|51935081": ["Many shortcomings of AI and blockchain can be addressed effectively by combining both technological ecosystems [19], [41].", "Such platform can also be used to host a trusted trail of all records taken by AI algorithms before, during, and after the learning and decision making process [19]."]} +{"59554580|49574823": []} +{"59554580|3628110": ["and predictive analysis, the blockchain systems are vulnerable to cyber-attacks as that of 51% attack [26]."]} +{"59554580|10137425": []} +{"59554580|43447335": []} +{"59554580|4503761": ["Finding a set of best solutions from all possible solutions is one of the main features of AI-enabled applications and systems [51]."]} +{"59554580|468992": ["[45] outline the nature of swarm robots to purview the objective and to record the key information about the discovery such as the location of the discovered object, time, date, etc.", "ing networks and to solve scheduling issues [45], [47]."]} +{"59554580|3434731": []} +{"49222558|49527603": ["), they have gained a lot of attentions from both industry and academic in recent years [21, 35]."]} +{"9702233|13756844": []} +{"52301248|51935081": ["The pieces of the best quality are then marked with QR code stickers, to enhance and certify the timber and its origin.", "Different kinds of IoT open source devices and tags were used, and a specific app aiming the forest operations was developed to collect and store in a centralized database information such as species, date, position, number of logs produced for each tree, dendrometric and commercial information."]} diff --git a/edge/graph_13912209.jsonl b/edge/graph_13912209.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..063e99fbaf058e37828f8c4c721865753dfe8033 --- /dev/null +++ b/edge/graph_13912209.jsonl @@ -0,0 +1 @@ +{"5508065|17464562": []} diff --git a/edge/graph_13916303.jsonl b/edge/graph_13916303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e70b789913bc57ab0afed8472c8e85b179286b6 --- /dev/null +++ b/edge/graph_13916303.jsonl @@ -0,0 +1,3 @@ +{"9562182|1188683": ["Riding on Moore\u2019s law [4], FPGAs have grown in logic capacity while maintaining affordable cost for many applications [5]."]} +{"1216439|10658846": []} +{"23306214|1188683": ["The first approach suffers from the performance lateness and the second approach has the problem of increasing the cost and time-to-market [1]."]} diff --git a/graph_4903316.jsonl b/edge/graph_13916820.jsonl similarity index 100% rename from graph_4903316.jsonl rename to edge/graph_13916820.jsonl diff --git a/edge/graph_13917583.jsonl b/edge/graph_13917583.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..994ec8f50080b01c06e26e9dfc41d636b7011148 --- /dev/null +++ b/edge/graph_13917583.jsonl @@ -0,0 +1,17 @@ +{"2875084|9045232": ["In recent years, many face detection methods have been published [6]."]} +{"2823926|359842": ["Over the years, researchers from all over the world have done many researches, but due to variability in the practical application environment such as the non uniqueness and non rigidness, face images make a certain distance between all kinds of recognition algorithm performance and practical business application requirements[1]."]} +{"17633579|5171123": ["Local methods have two advantages compared to holistic methods [12, 13]."]} +{"30861530|192934": ["Fisher linear Discriminant Analysis (FLD), which is also referred to as Linear Discriminant Analysis (LDA), is one of the widely used discrimination criterion in face recognition [8][ 9 ]."]} +{"2377597|16620699": ["However, even when it is acknowledged that 2D currently appears to offer better recognition performance, this is often thought to be a temporary situation\u2014 \u2018\u2018Although 2D face recognition still seems to outperform the 3D face recognition methods, it is expected that this will change in the near future\u2019\u2019 [51].", "[51] give an alternate survey of some of the earlier work in 3D face recognition."]} +{"61619894|6314374": ["To get a general idea about most of these algorithms, especially those who have made a true originality and advanced sensitive in this area, one can consult summaries of the state of the art [1] [2] [3] [4] [5]."]} +{"61619894|5171123": ["To get a general idea about most of these algorithms, especially those who have made a true originality and advanced sensitive in this area, one can consult summaries of the state of the art [1] [2] [3] [4] [5]."]} +{"61619894|3053914": ["To get a general idea about most of these algorithms, especially those who have made a true originality and advanced sensitive in this area, one can consult summaries of the state of the art [1] [2] [3] [4] [5]."]} +{"9623639|2301292": ["Please see more technical details in 3D FER from two specific surveys [34] [111].", "While its drawback is that users\u2019 faces are restricted into a limited amount of area not only covered by the projected light but also visible to the camera, maybe leading to artifacts [111]."]} +{"9623639|16620699": [", changes in lighting and pose [2] [9].", "This paper is an update and expansion of [2] as well as several contemporaneous work [9] [8], and it extensively reviews recent advances in 3D face analysis (not limited to 3D FR, but embracing other related issues, such as 3D FER, GEC, FAE) from then on, in which the progress on these targeting directions [2] is particularly summarized."]} +{"3727579|15261053": []} +{"22203509|192934": ["Principal Component Analysis (PCA) is a classical algorithm for feature extraction, which is widely used in pattern recognition and computer vision [ 1-4 ]."]} +{"45735125|9045232": ["It is inevitable that a face is localized correctlywith minor scale variation [31]."]} +{"917076|9045232": ["The second one assumes that an image as single or multiple arrays of pixel values[19]."]} +{"60075163|393948": ["11 Autoencoders are one form of unsupervised learning algorithm."]} +{"186587|6028805": ["Thermal or far infrared imagery has been used for face recognition (cf. a survey paper [36])."]} +{"12811092|359842": ["Now a day\u2019s face recognition is the more interesting and active research area but it still has some limitation that is to recognize the individual person in any environment is the most challenging task [1]."]} diff --git a/edge/graph_13922338.jsonl b/edge/graph_13922338.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d0d74a2a613c079418fe2731e7d7fb32ccfc054 --- /dev/null +++ b/edge/graph_13922338.jsonl @@ -0,0 +1 @@ +{"14439484|1230643": ["Keywords Sensor networks, TinyOS, programming models, event-driven model, cooperative multitasking, coroutines\nTechnical Areas Programming abstractions for sensor networks, operating system and middleware support"]} diff --git a/edge/graph_13926377.jsonl b/edge/graph_13926377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf11775a6ce8f29ad649da1ee629853e85ef002d --- /dev/null +++ b/edge/graph_13926377.jsonl @@ -0,0 +1,3 @@ +{"6438719|14441987": []} +{"13088762|14441987": ["For instance, some of the literature [11, 13] examines and evaluates various routing"]} +{"62208878|15516254": ["To improve TCP performance, researchers have been primarily working in the fields of TCP flow control [15], TCP congestion control [4 - 14][16][17][18], and TCP offloading [19][20]."]} diff --git a/graph_4909423.jsonl b/edge/graph_13927374.jsonl similarity index 100% rename from graph_4909423.jsonl rename to edge/graph_13927374.jsonl diff --git a/edge/graph_139324200.jsonl b/edge/graph_139324200.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..601a341f646c2485736e67414f2068f670b8c6f0 --- /dev/null +++ b/edge/graph_139324200.jsonl @@ -0,0 +1,3 @@ +{"14743726|17381415": []} +{"14743726|12083425": ["THE ADVANCING wind-power technologies have increased the use of wind-energy conversion systems (WECSs) for distributed generation to satisfy the grid energy demand [1]\u2013[6]."]} +{"102821808|15368636": []} diff --git a/edge/graph_13932708.jsonl b/edge/graph_13932708.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..894a8cf98f285bcd28da93d08a7579e59010895c --- /dev/null +++ b/edge/graph_13932708.jsonl @@ -0,0 +1 @@ +{"109603447|13932708": []} diff --git a/graph_4946947.jsonl b/edge/graph_139363.jsonl similarity index 100% rename from graph_4946947.jsonl rename to edge/graph_139363.jsonl diff --git a/graph_4952154.jsonl b/edge/graph_13938485.jsonl similarity index 100% rename from graph_4952154.jsonl rename to edge/graph_13938485.jsonl diff --git a/graph_4967411.jsonl b/edge/graph_139390145.jsonl similarity index 100% rename from graph_4967411.jsonl rename to edge/graph_139390145.jsonl diff --git a/edge/graph_13941421.jsonl b/edge/graph_13941421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6359c2ada6922ca88f6e25d35a7b502239ea28a --- /dev/null +++ b/edge/graph_13941421.jsonl @@ -0,0 +1,2 @@ +{"13843514|2795037": []} +{"13843514|8125630": []} diff --git a/edge/graph_13944900.jsonl b/edge/graph_13944900.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1afb39876578cd6a1a0200f86cf4ef9af3cc651 --- /dev/null +++ b/edge/graph_13944900.jsonl @@ -0,0 +1 @@ +{"6340275|192934": []} diff --git a/edge/graph_13946824.jsonl b/edge/graph_13946824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b06102589100b11dee7d92826bd4e3f70ae4466 --- /dev/null +++ b/edge/graph_13946824.jsonl @@ -0,0 +1,12 @@ +{"1868797|987239": []} +{"31936626|987239": []} +{"29777194|987239": []} +{"5468851|987239": ["A complete survey on 3-D shape retrieval can be found in Tangelder and Veltkamp [13].", "D shape retrieval can be found in Tangelder and Veltkamp [13]."]} +{"14106275|14545307": []} +{"17445560|14808716": []} +{"17879431|987239": ["Therefore, efficient 3-D object retrieval and recognition technologies [3]\u2013[6] are of great importance for many applications, including computeraided design (CAD) [7] and molecular biology [8]."]} +{"17879431|6681074": ["2199502 paper refers to 3-D object retrieval [1] and recognition [9] as the tasks of finding relevant objects for a given query and categorizing an object into one of a set of classes, respectively."]} +{"7455724|6681074": ["For a broad introduction to this literature, please consult the survey paper by Campbell and Flynn [7]."]} +{"33639583|987239": ["The latter, along with the explosion of the World Wide Web (WWW), has lead to research in the area of 3D content-based search and retrieval (Iyer et al. 2005; Tangelder and Veltkamp 2004; Bustos et al. 2007) using as query text, sketch and/or 3D object(s)."]} +{"15612208|987239": ["The proposed method visually compares single depth map of the query with depth maps of a 3D model rendered from multiple viewpoints."]} +{"14506370|987239": ["The primary challenge to a content-based 3D model retrieval system [1] is to extract proper features for discriminating the diverse shapes of 3D models for efficiently indexing similar ones."]} diff --git a/edge/graph_13949763.jsonl b/edge/graph_13949763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ef37c33972a8c6d3299f3ba029c62b07d76dc9d --- /dev/null +++ b/edge/graph_13949763.jsonl @@ -0,0 +1 @@ +{"10305213|763939": []} diff --git a/graph_5006064.jsonl b/edge/graph_13958681.jsonl similarity index 100% rename from graph_5006064.jsonl rename to edge/graph_13958681.jsonl diff --git a/graph_508912.jsonl b/edge/graph_13959792.jsonl similarity index 100% rename from graph_508912.jsonl rename to edge/graph_13959792.jsonl diff --git a/graph_513106.jsonl b/edge/graph_139624690.jsonl similarity index 100% rename from graph_513106.jsonl rename to edge/graph_139624690.jsonl diff --git a/graph_5177848.jsonl b/edge/graph_13965372.jsonl similarity index 100% rename from graph_5177848.jsonl rename to edge/graph_13965372.jsonl diff --git a/graph_519014.jsonl b/edge/graph_13971270.jsonl similarity index 100% rename from graph_519014.jsonl rename to edge/graph_13971270.jsonl diff --git a/edge/graph_13975354.jsonl b/edge/graph_13975354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..387459ed27c65383f85e8ae48fb7707cbe849802 --- /dev/null +++ b/edge/graph_13975354.jsonl @@ -0,0 +1 @@ +{"5631654|192934": ["In vehicle images, areas around the license plate are, compared to other areas, rich in edge points and texture, and rectangular with a fixed aspect ratio [27,28]."]} diff --git a/graph_5204591.jsonl b/edge/graph_13978846.jsonl similarity index 100% rename from graph_5204591.jsonl rename to edge/graph_13978846.jsonl diff --git a/edge/graph_13980068.jsonl b/edge/graph_13980068.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b73161ceeb195799b40167295750e1ba2765df4f --- /dev/null +++ b/edge/graph_13980068.jsonl @@ -0,0 +1,4 @@ +{"10520543|1142274": ["The state-of-the-art research works on parallel machines scheduling problems with setup time could be found in Allahverdi et al. (1999, 2008) .", "The state-of-the-art research works on parallel machines scheduling problems with setup time could be found in Allahverdi et al. (1999, 2008)."]} +{"62675271|54009499": ["For example, Sen et al. [1] provide a framework for studying due date related scheduling problems, Allahverdi et al. [2] review scheduling research involving setup consideration, Sox et al. [3] review the stochastic lot scheduling problem, and Drexl and Kimms [ 4 ] survey the lot sizing and scheduling issues."]} +{"62675271|62204132": ["Potts and Van Wassenhove [ 5 ], Albers and Brucker [6], Webster and Baker [7], Brucker et al. [8], and Potts and Kovalyov [9] provide a good analysis of both types of scheduling with batching."]} +{"2902296|62204132": ["There are reviews of models which combine scheduling with batching by Potts and Van Wassenhove [63] and Webster and Baker [79].", "Potts and Van Wassenhove [63] observe that, for anticipatory setups, the search for an optimal permutation schedule may be restricted to schedules in which the jobs within each family are sequenced according to the algorithm of Johnson [48]."]} diff --git a/edge/graph_13984793.jsonl b/edge/graph_13984793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56e3036d80d2d6a61127910eb143dc0a264d6e29 --- /dev/null +++ b/edge/graph_13984793.jsonl @@ -0,0 +1,5 @@ +{"6821635|1582463": ["A survey of different kinds of watchdog processors is given in [16]."]} +{"30006808|912956": []} +{"16119912|14920988": []} +{"16119912|14166294": ["Techniques for detecting equivalent mutants (based on code optimization, constraint solving, and program slicing [Madeyski et al. 2014]) are computationally expensive, and they cannot detect all equivalent mutants since proving program equivalence is an undecidable problem.", "The main issue of higher-order mutation testing is represented by the combinatorial explosion of injectable mutants [Jia and Harman 2009; Madeyski et al. 2014].", "\u2026since several simple mutants can be replaced by only one higher-order mutant that combines them; and (3) higher-order mutants are much less likely to be equivalent mutants than simple mutants, as shown by several empirical studies [Offutt 1992; Madeyski et al. 2014; Papadakis and Malevris 2010].", "The potential benefits of this approach are threefold: (1) higher-order mutants can be harder to kill than their constituent mutants, since constituent mutants can partially mask each other and, in some cases, their combination requires test cases able to cover new corner cases; (2) using higher-order mutants can reduce the number of mutants and thus the testing effort, since several simple mutants can be replaced by only one higher-order mutant that combines them; and (3) higher-order mutants are much less likely to be equivalent mutants than simple mutants, as shown by several empirical studies [Offutt 1992; Madeyski et al. 2014; Papadakis and Malevris 2010]."]} +{"16119912|6177735": []} diff --git a/edge/graph_13985031.jsonl b/edge/graph_13985031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84422c390cdfb3bb651860cf63aca72941a05194 --- /dev/null +++ b/edge/graph_13985031.jsonl @@ -0,0 +1,10 @@ +{"62171511|26257441": ["polynomial response surfaces, kriging models, radial basis functions, neural networks, multivariate adaptive regression splines), and recent reviews and comparisons of many of these approximation model types can be found in ( Simpson et al. 2001b, c; Jin et al. 2001; Sobieszczanski-Sobieski and Haftka 1997; Haftka et al. 1998; Barthelemy and Haftka 1993; Barton 1998)."]} +{"110258010|26257441": []} +{"5650798|26257441": []} +{"29993723|26257441": []} +{"5494377|26257441": []} +{"56010146|26257441": ["It is also a good choice for deterministic computer models since it interpolates the observed or known data points [4,5]."]} +{"36296676|13985031": ["We also refer to the recent review on Kriging in [16]."]} +{"13068209|14843594": ["Therefore, Gaussian process based ef\ufb01cient global optimization 1 (Jones et al., 1998; Shahriari et al., 2015), as a sample-ef\ufb01cient method to solve black-box optimization problems (Xu et al., 2022a), has recently been becoming more and more popular."]} +{"125028286|26257441": []} +{"195718377|33452313": ["Details including extensive Monte Carlo experiments, a case study concerning a logistic system in China, and the validation of the MSB assumptions are given in Kleijnen (2015, pp. 159(cid:150)172) and Shi and Kleijnen (2017).", "We base this tutorial on Kleijnen (2017), which is a recent review based on Kleijnen (2015)."]} diff --git a/edge/graph_13988670.jsonl b/edge/graph_13988670.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f0fa23fe77fde1b3894047d8e65069e19edd11c --- /dev/null +++ b/edge/graph_13988670.jsonl @@ -0,0 +1,6 @@ +{"5220242|1097238": []} +{"9481781|11608263": ["Finally, section 7 concludes this work and points to future research directions."]} +{"2976898|1097238": []} +{"7879207|9431428": ["State-of-the-art of pattern recognition and machine learning have been explored for suitable techniques to help in this quest [41], [42].", "Therefore, we decided to follow previous studies [11], [42] that suggest carrying out a", "Various classifier models have been applied for fMRI classification [41], [42]."]} +{"7879207|1097238": ["We start from the postulate that accurate and diverse individual classifiers make the best ensembles [5], [6], [28]."]} +{"205486257|11792588": ["This brings in a lot of research in recent times (Arica & Yarman-Vural, 2001, 2002; Camastra, 2007; Camastra & Vinciarelli, 2001; Chim, Kassim, & Ibrahim, 1998; Cruz, Cavalcanti, & Ren, 2010; Fujisawa, 2008; Kavallieratou, Sgarbas, Fakotakis, & Kokkinakis, 2003; Oliveira, Sabourin, Bortolozzi, &\u2026", "A survey of different feature extraction methods is available in Arica and Yarman-Vural (2001, 2002), Fujisawa (2008)."]} diff --git a/graph_521509.jsonl b/edge/graph_139902671.jsonl similarity index 100% rename from graph_521509.jsonl rename to edge/graph_139902671.jsonl diff --git a/edge/graph_13991708.jsonl b/edge/graph_13991708.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdb4674f02fa1084b7d0e6f93fb84a080db6393f --- /dev/null +++ b/edge/graph_13991708.jsonl @@ -0,0 +1,46 @@ +{"5892952|15760124": ["The concepts \u2014 key management, gateway formation and network address translation \u2014 have been researched for secure strategic networks [2-4]; they are also well researched individually for MANETs [5, 6], [7, 8], [9, 10]."]} +{"40931594|6275330": ["The latest evolution of sensor networks is Wireless Sensor Networks (WSNs), which have been thoroughly studied for their application in different fields [31], from wearable computing [32] to the management of the power grid [33], or even to musical activities [34]."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"11894156|10310014": ["[2] G.", "PSS operators, governments, and research communities are working to amend this gap; in particular, the Long Term Evolution-Advanced (LTE-A) mobile radio technology has widely been envisaged as a basic technology for the evolution of PSS communication systems [1, 2]."]} +{"21738890|3348390": ["[22] highlights context-awareness from an IoT perspective, and presents the background of IoT paradigm, context-aware essentials and their relations to sensor networks."]} +{"21738890|3202525": ["[23], [24] survey context-awareness for recommender systems to build such intelligent systems that can better predict and anticipate the needs of users, and act more efficiently in response to their behaviors."]} +{"21738890|1077083": []} +{"21738890|8909218": []} +{"21738890|2187403": []} +{"21738890|1113420": ["[18] presents a detailed explanation of context, context types along", "In this regard, many context modeling schemes have been proposed [18], [21], [27]\u2013[29]."]} +{"21738890|20905429": []} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"16194849|1230643": ["The use of WSN for air pollution monitoring may have a great interest which can be mainly ascribed to the cost reduction, the node autonomy, the fine spatial and temporal granularity and to the self organization and self healing of the network without heavy infrastructure [4]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"3057478|14420517": ["There are several security standard specifications [79] such as Security Assertion Markup Language (SAML), WSSecurity, Extensible Access Control Markup (XACML), XML Digital Signature, XML Encryption, Key Management Specification (XKMS), WS-Federation, WS-Secure Conversation, WS-Security Policy and WS-Trust."]} +{"3057478|30548952": ["b) Data may be located in different jurisdictions which have different laws [19,54,55]"]} +{"3057478|627405": ["We have carried out a systematic review [13-15] of the existing literature regarding security in Cloud Computing, not only in order to summarize the existing vulnerabilities and threats concerning this topic but also to identify and analyze the current state and the most important security issues for Cloud Computing."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"2440631|2357830": ["This protocol uses the dynamic framed-slotted ALOHA technique to identify nearby tags, and takes advantage of an adaptive algorithm called the Q-algorithm to determine the number of time slots required at each query."]} +{"1024448|10824066": ["However, the selections of a number of recommendations [7-9; 20-24] have identified about eight", "[20] has provided an extensive survey on security requirements methods which help to identify security requirements systematically and structure them."]} +{"17390182|7774517": ["Some common approaches to ensure data quality rely on oversampling and subsequent filtering of outlier values [23]."]} +{"14833292|14441987": []} +{"934826|3330313": []} +{"934826|1230643": ["Manuscript received September 04, 2014; revised February 02, 2015; accepted February 22, 2015."]} +{"3464044|13392386": []} +{"3464044|16654832": ["Its main function is to migrate the compute-intensive tasks from a mobile device to cloud, in order to overcome the limitation of mobile device computing power, storage capacity, and battery life [11]."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"13150813|1207973": ["In this context, we can classify faults as either transient or permanent [7]."]} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} +{"9077942|1819274": ["In terms of middleware support, middleware systems for ad hoc networks, robotics, and wireless sensor networks are surveyed in [5] [6] [7], however, no survey could be found for middleware platforms designed specifically for IoT."]} +{"14408055|206743327": []} +{"14408055|7186978": ["\u2026the last decade has explored a variety of architectures and approaches similar to AAFID, with a number of recent trends also favouring autonomy and architectural distribution of all or most constituents of a cyber defence (especially intrusion-*) system: e.g. agent-based systems [9]; cloud-based\u2026"]} +{"13809820|7774517": ["runs an outlier detection algorithm [28] to detect possibly altered data so that trustworthiness of the"]} +{"36868439|2445817": ["Surveys on service discovery protocols have been published in the literature [1], [16], [17], [18]."]} +{"6556803|14132386": ["Moreover, routing protocols are responsible for discovering the optimized routes in multi-hop transmissions [48]."]} +{"6556803|28670512": ["can be transformed to an MDP with belief state [34], [35]."]} +{"6556803|9494512": ["In many locations, solar energy is considered the most practical source for WSN recharging [88]."]} +{"6556803|12060835": [", thermal and radiant energy, for a sensor node\u2019s battery [85]."]} +{"2986694|4631990": ["Home automation systems are focused on improving the interaction with devices and appliances typically found indoors [3\u20135]."]} diff --git a/graph_5219659.jsonl b/edge/graph_13994926.jsonl similarity index 100% rename from graph_5219659.jsonl rename to edge/graph_13994926.jsonl diff --git a/graph_5221730.jsonl b/edge/graph_139996738.jsonl similarity index 100% rename from graph_5221730.jsonl rename to edge/graph_139996738.jsonl diff --git a/edge/graph_14001563.jsonl b/edge/graph_14001563.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e84e92a4a3e07139375077dbf13e5d84e313e630 --- /dev/null +++ b/edge/graph_14001563.jsonl @@ -0,0 +1,17 @@ +{"14251445|1940388": ["A number of methods have been developed to make wireless sensor networks secure and reliable [15]."]} +{"1333339|14745481": ["Applications of trust management is enormous in mobile networks [20].", "Apart from these, some application specific attack models are discussed in [20], [101], [102].", "The detailed survey on various trust computation mechanisms, trust dynamics and their inter operations are missing in [20].", "There is a recent survey on trust management for MANET in [20]."]} +{"1333339|10137283": []} +{"1333339|9240891": []} +{"1333339|10859599": ["Apart from these, some application specific attack models are discussed in [20], [101], [102]."]} +{"206446574|1230643": []} +{"17767204|9240891": ["Therefore, TrE is too simple to ensure the security and efficiency of MSNs."]} +{"28652264|1230643": ["They are limited by resources, computation and communication capabilities for monitoring the physical and environmental conditions [1]."]} +{"11972743|14745481": ["At the SN level, each SN is responsible to report its peer-to-peer trust evaluation results towards other SNs in the same cluster to its CH which applies statistical analysis and", "The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"11972743|1940388": ["The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"6888234|1236072": ["Unfortunately, most existing routing protocols for WSNs either assume the honesty of nodes and focus on energy efficiency [12], or attempt to exclude unauthorized participation by encrypting data and authenticating packets."]} +{"195727044|12817488": []} +{"99520|14441987": ["Reproduction for academic, not-for profit purposes permitted provided this text is included.\nby Royer and Toh (1999) as Reactive and Proactive.", "The model introduces the notion of belief and provides a dynamic measure of reliability and trustworthiness in an ad hoc network."]} +{"206256786|2294541": ["The diverse attacks (Hoffman et al., 2009; Lopez et al., 2009; Karlof and Wagner, 2003; Xiao and Yu, 2006; Xiao et al., 2007a) that target sensor networks will be concluded as the Table 1.", "Furthermore, Hoffman et al. (2009) surveyed the defense mechanisms employed by existing reputation systems and suggests five defense strategies against attackers for reputation systems in common networks.", "A few existing surveys on trust and security issues can be found (Fern\u00e1ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|1940388": ["The security mechanisms for sensor networks have been raised by many researchers (Chen et al., 2009b; Lopez et al., 2009; Law and Havinga, 2005; Kyriazanos et al., 2008).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|9240891": ["This problem is subsequently discussed in various literature, providing diverse trust classification (Grandison and Sloman, 2000) and evaluation models in various domains, such as E-commerce, P2P, ad hoc networks etc."]} +{"27888199|14441987": ["Several ad hoc routing protocols have been proposed, which include AODV [1], [2], DSR [3], ZRP [4], TORA [5], DSDV [6], TBRPF [7], and others."]} diff --git a/graph_522297.jsonl b/edge/graph_14002196.jsonl similarity index 100% rename from graph_522297.jsonl rename to edge/graph_14002196.jsonl diff --git a/edge/graph_14002306.jsonl b/edge/graph_14002306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75c91325bab201e0fbee6f5d54944f2c3f613a92 --- /dev/null +++ b/edge/graph_14002306.jsonl @@ -0,0 +1 @@ +{"3329660|6746689": ["Second, we obtain the skeleton of the road networks by performing a thinning operation based on the algorithm proposed in [9], as depicted in Figure 3(c)."]} diff --git a/edge/graph_140059353.jsonl b/edge/graph_140059353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bb3a803260c2c7cfa538d91c33091e4a7af56e4 --- /dev/null +++ b/edge/graph_140059353.jsonl @@ -0,0 +1,2 @@ +{"122175292|8953108": ["There are various thresholding techniques for image segmentation that have been proposed and published [46]."]} +{"136081122|16502294": []} diff --git a/edge/graph_14007841.jsonl b/edge/graph_14007841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48d7ca11cdd6a22f767c4e93c715f6976da6e5b8 --- /dev/null +++ b/edge/graph_14007841.jsonl @@ -0,0 +1,2 @@ +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} diff --git a/graph_5244140.jsonl b/edge/graph_1400872.jsonl similarity index 100% rename from graph_5244140.jsonl rename to edge/graph_1400872.jsonl diff --git a/graph_1401440.jsonl b/edge/graph_1401440.jsonl similarity index 100% rename from graph_1401440.jsonl rename to edge/graph_1401440.jsonl diff --git a/edge/graph_14017332.jsonl b/edge/graph_14017332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1db338d87c5c947ecbcea31012987dd509d4d343 --- /dev/null +++ b/edge/graph_14017332.jsonl @@ -0,0 +1,17 @@ +{"8777501|17003768": []} +{"6407623|17003768": []} +{"117930143|15847982": []} +{"7617025|17003768": []} +{"46061975|17003768": ["List coloring has received increasing attention since the beginning of 90\u2019s, and there are very good surveys [1, 17 ] and books [11] on the subject."]} +{"6408948|17003768": ["There are some very good surveys [1,28] and a book [22] on the subject."]} +{"42569274|17003768": []} +{"32430184|17003768": []} +{"40983012|17003768": []} +{"45017622|17003768": []} +{"206025963|17003768": []} +{"2669375|17003768": ["Many of the recent results on choosability can be found in the survey papers [3,20,19] and their many references."]} +{"26891900|985458": []} +{"9966948|14017332": ["From this summary we note that not only the case when H1 = P4 or H2 = P4 but thirteen other maximal classes of (H1, H2)-free graphs for which COLOURING is known to be polynomialtime solvable can be obtained by combining Theorem 7 with the results of Kobler and Rotics [27] and Oum [30] (see also [58]).", "This updated summary (and a proof of it) can be found in the recent survey paper of Golovach, Johnson, Paulusma and Song [58].", "As can be readily verified from [58], the complexity of COLOURING is unknown for only 15 of these classes."]} +{"22851919|17003768": []} +{"2439356|17003768": []} +{"1909697|17003768": []} diff --git a/edge/graph_140210721.jsonl b/edge/graph_140210721.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41ae5a0af0568e870e2a8c3f0057b34a5182a8e3 --- /dev/null +++ b/edge/graph_140210721.jsonl @@ -0,0 +1,13 @@ +{"119704306|17300331": []} +{"122932454|17300331": []} +{"1461684|17300331": []} +{"119228686|17300331": []} +{"119070492|17300331": []} +{"3907949|7023859": ["The state update rule acts synchronously at every position called the lattice point where the unit cells of the lattice are all identical with the underlying graph being regular [54]."]} +{"2351651|17300331": ["njoyed wide success in quantitative modeling of physical phenomena. In the quantum setting, quantum cellular automata [2,3,13,33,45,50,55], quantum lattice gases [8\u201310,34\u201338] and quantum random walks [1,12,28] have all attracted considerable attention. In particular the one dimensional cellular automata for the Dirac equation, originally described by Feynman in a problem in [17], has been investigated and "]} +{"55806969|17300331": ["The dynamics of Quantum Walks (QW for short) have become a popular topic in the Quantum Computing community as the simplest quantum generalization of classical random walks, see for example the reviews [3], [20], [23]."]} +{"119614447|17300331": []} +{"140316771|140210721": ["Coincidentally, another review was written at the same time as this one [33], which is quite complementary to this one, as it has a detailed discussion of intrinsic universality, a topic that is mentioned only briefly here in section 4."]} +{"59477883|17300331": []} +{"119127236|17300331": []} +{"46070280|17300331": []} diff --git a/edge/graph_140220040.jsonl b/edge/graph_140220040.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f03058bcacaa99b10170b628ef48e612b38eebb --- /dev/null +++ b/edge/graph_140220040.jsonl @@ -0,0 +1,12 @@ +{"27399592|192934": ["As a rule of thumb, the number of samples per class should be at least ten times the feature vector\u2019s dimensionality [7]."]} +{"13697966|11732290": ["Recently, there have been many efforts to develop accurate localization methods for WCE and we refer to [27] for an extended review on this topic."]} +{"10550008|11732290": ["A good review of existing localization techniques for the WCE is given in [1]."]} +{"60424017|11050081": ["In (72), AdWin is referred to as reference algorithm for sequence-based adaptive sliding window."]} +{"15150932|12434256": ["978-1-4799-6288-4/14/$31.00 \u00a92014 IEEE 355"]} +{"24182011|11732290": []} +{"14493663|6863252": ["Although a wide range of registrationmethods have been developed over recent decades [21, 22], there is an absence of a gold standard for the evaluation of gastroscopic sequence registrations."]} +{"68947241|13365762": ["[23\u201327] favour colour and texture descriptors drawn from the MPEG-7 standard [28] and have evaluated these for detecting a variety of events in CE video."]} +{"73132706|6392800": ["In the last decade, numerous methods were proposed for the power consumption estimation of mixed components (processors, memories, digital IP, and RF system) [6\u201313]."]} +{"77789|1099309": []} +{"77789|13365762": ["The previous standards (MPEG-1, -2, and -4) focused on coding and representation of audio-visual content, but MPEG-7 focuses on description of multimedia content [2],"]} +{"2842992|60779308": []} diff --git a/graph_5246835.jsonl b/edge/graph_14022070.jsonl similarity index 100% rename from graph_5246835.jsonl rename to edge/graph_14022070.jsonl diff --git a/edge/graph_14022133.jsonl b/edge/graph_14022133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7d2c497a3211babe7d7650c419229bab891f0ae --- /dev/null +++ b/edge/graph_14022133.jsonl @@ -0,0 +1,28 @@ +{"1110051|10500613": ["ontology alignment) has received steady attention in the database and AI communities over the years (see [19] for a recent survey and [17, 2, 3, 5, 8, 9, 12, 27, 24] for work since)."]} +{"17655829|10500613": ["Many surveys about ontology and schema matching have been proposed in litterature [10], [15], [16]."]} +{"17655829|913718": ["The survey [15] focuses on the database schema matching approaches, while [16] reuses this classification for ontology matching."]} +{"7354580|1574374": []} +{"17232263|1574374": ["The terms that we use are known from the database schema versioning literature Roddick (1995).", "This addition is a monotonic extension to the ontology and the new version can be considered as being backward compatible with the first version.\nclass-defProfessionalEducation subclass-ofEducation disjoint AcadamicEducation ProfessionalEducation class-defHBO\nsubclass-ofHigher-Education-Institute\u2026"]} +{"16830874|10500613": ["This paper focuses on schema matching. There are many algorithms to solve it [ 8 ]."]} +{"13169021|10500613": ["To reduce the manual effort required, many techniques and prototypes have been developed to semi-automatically solve the match problem [6], [11]."]} +{"8007753|10500613": ["Rahm and Bernstein (2001) survey the approaches that use linguistic techniques to look for synonyms, machine-learning techniques to propose matches based on instance data, information-retrieval techniques to compare information about attributes, and so on.", "Rahm and Bernstein (2001) survey the approaches that use linguistic techniques to look for synonyms, machine-learning techniques to propose matches based on instance data, information-retrieval techniques to compare information about attributes, and so on. Cupid (Madhavan, Bernstein, & Rahm 2001), for example, integrates many of these approaches in an algorithm that starts by matching leaf concepts in the hierarchy and then proceeding ..."]} +{"8007753|1574374": []} +{"22746|10500613": ["Many diverse solutions to the matching problem have been proposed so far, see for example surveys in [20, 21] and concrete solutions [13, 15, 6, 18, 24, 3, 19, 17, 8], etc."]} +{"22746|913718": ["Many diverse solutions to the matching problem have been proposed so far, see for example surveys in [20, 21] and concrete solutions [13, 15, 6, 18, 24, 3, 19, 17, 8], etc."]} +{"3903523|10500613": ["In the field of schema matching (please see [18] for a survey), iMap [4] is semiautomatically discovers both the 1:1 and complex mappings (e."]} +{"17113476|10500613": ["There exists a number of semi-automated schema/ontology matching systems, recent surveys on the topic are provided in [21, 22, 19, 7], while state of the art matching approaches can be found in [15, 12, 20, 17, 9, 8]5.", "A rationale behind the alignment reuse is that many ontologies to be matched are similar to already matched ontologies, especially if they are describing the same application domain [21, 22]."]} +{"17113476|913718": ["A rationale behind the alignment reuse is that many ontologi es to be matched are similar to already matched ontologies, especially if they a re describing the same application domain [21, 22].", "Following [10, 22], we define a mapping element (mapping) as a 5-uple:\u3008id, e, e, n, R\u3009, whereid is a unique identifier of the given mapping element; e ande are the entities (e.", "There exists a number of semi-automated schema/ontology ma tching systems, recent surveys on the topic are provided in [7, 19, 21, 22], while sta te of the art matching approaches can be found in [8, 9, 12, 15, 17, 20] 5.", ", equivalence, subsumption) holding between these entities [7, 19, 22]."]} +{"913718|10500613": ["The classification of [62] distinguishes between elementary (individual) matchers and combinations of matchers.", "Good surveys through the recent years are provided in [39, 62, 75]; while the major contributions of the last decades are presented in [3, 41, 42, 66].", "In particular, in the Granularity/Input Interpretation layer we detail further (with respect to [62]), the element- and structure-level of matching by introducing the syntactic vs semantic vs external criteria.", "On the contrary, the survey of [62] is devoted to a classification of database schema matching approaches and a comparative", "We present a new classification of schema/ontology matching techniques that builds on the work of [62] augmented in [29, 67] and [28].", "We omit here a discussion of matching keys as these techniques appear in our classification without changes with respect to the original publication [62].", "1 Prominent solutions of instance-based schema/ontology matching as well as possible extensions of the instance-based part of the classification of [62] can be found in [23] and [40]", "As indicated in introduction, we build on the previous work of classifying automated schema matching approaches of [62].", "To emphasize the differences with the initial classification of [62], the new categories/classes are marked in bold face.", "This criterion is the same as first introduced in [62]."]} +{"6783584|1574374": []} +{"12874197|10500613": ["Rahm and Bernstein (Rahm and Bernstein, 2001) survey schema-integration approaches."]} +{"9209653|913718": ["in [11]."]} +{"396211|1574374": []} +{"11224550|3821062": ["An overview of some proposed approaches in this direction is presented in [4], even if limited concrete results have appeared in the literature."]} +{"10786028|10500613": ["It becomes a basic problem in many application domains, such as data integration and coordination (Theoretical foundations of these issues can be found in [13, 14, 28]), data warehousing and semantic query processing [26, 11, 15].", "Currently, most of match prototypes determine correspondences between schema elements (element-level matches [26]) and use similarity values between 0 (strong dissimilarity) and 1 (strong similarity) to ind icate the plausibility of the correspondences.", "According [26, 15] schema matching approaches can be classified in the following way: \u2022 Hybrid or composite."]} +{"802286|10500613": ["A reference survey on schema matching is given in [ 13 ] while ontology matching is surveyed according to different classification frameworks in [14, 15, 16, 17]."]} +{"802286|913718": ["A reference survey on schema matching is given in [13] while ontology matching is surveyed according to different classification frameworks in [ 14 , 15, 16, 17]."]} +{"60923968|2034384": ["Formally, this partial order defines some sort of \u201ctemporal structure\u201d which leads us to consider the evolving data as a (formal) temporal database with a temporally extended conceptual data model [14, 2]."]} +{"60923968|1574374": ["The problems of schema evolution and schema versioning support have been diffusively studied in relational and object-oriented database papers: [22] provides an excellent survey on the main issues concerned.", "The problems of schema evolution and versioning arose in the context of long-lived database applications, where stored data were considered worth surviving changes in the database schema [22]."]} +{"1640541|10500613": []} +{"593561|10500613": []} +{"2898750|1574374": ["In its simplest form, this might consist of the date when the change is valid in the real world, conform tovalid datein temporal databases [18] (in this terminology, the \u201cdate\u201d in the descriptive meta-data is called transaction date )."]} diff --git a/graph_5252693.jsonl b/edge/graph_14022349.jsonl similarity index 100% rename from graph_5252693.jsonl rename to edge/graph_14022349.jsonl diff --git a/edge/graph_14027106.jsonl b/edge/graph_14027106.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5e663bc1f6c90aa304142b72470f1b7c273a13c --- /dev/null +++ b/edge/graph_14027106.jsonl @@ -0,0 +1 @@ +{"5409381|205131192": ["The moment-based method has been widely used to represent local characteristics of images in pattern recognition and image processing [20-24]."]} diff --git a/edge/graph_14027121.jsonl b/edge/graph_14027121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..298571a4cab83c066a09f300c1a0903b1fd2aab9 --- /dev/null +++ b/edge/graph_14027121.jsonl @@ -0,0 +1 @@ +{"3489319|3102110": ["This feature is very interesting since unsupervised classication is another important problem in data mining [ 6 ] and in machine learning."]} diff --git a/graph_5275998.jsonl b/edge/graph_140275762.jsonl similarity index 100% rename from graph_5275998.jsonl rename to edge/graph_140275762.jsonl diff --git a/graph_530484.jsonl b/edge/graph_14028362.jsonl similarity index 100% rename from graph_530484.jsonl rename to edge/graph_14028362.jsonl diff --git a/graph_5333379.jsonl b/edge/graph_140284266.jsonl similarity index 100% rename from graph_5333379.jsonl rename to edge/graph_140284266.jsonl diff --git a/edge/graph_14030353.jsonl b/edge/graph_14030353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca15452a945a4129f29a6c318db247da0b52aa54 --- /dev/null +++ b/edge/graph_14030353.jsonl @@ -0,0 +1 @@ +{"6837802|7788290": []} diff --git a/graph_5342321.jsonl b/edge/graph_14031008.jsonl similarity index 100% rename from graph_5342321.jsonl rename to edge/graph_14031008.jsonl diff --git a/graph_5366837.jsonl b/edge/graph_14033856.jsonl similarity index 100% rename from graph_5366837.jsonl rename to edge/graph_14033856.jsonl diff --git a/edge/graph_14037972.jsonl b/edge/graph_14037972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d71fcc3e6c69e5b60bff3cc354b30a3b5b9ddcd --- /dev/null +++ b/edge/graph_14037972.jsonl @@ -0,0 +1,4 @@ +{"18064859|8953108": ["Sezgin and Sankur [14] carried out an exhaustive survey of image thresholding methods."]} +{"14360367|16766019": ["There are a large number of researches on content-based video indexing using low-level features such as color, texture, shape, motion, etc [1][2][3][ 4 ]."]} +{"9767458|8953108": ["Local methods are shown to perform better according to recent exhaustive survey of image binarization methods presented in [15]."]} +{"46633426|8953108": ["In different image processing applications object pixels are substantially different from background [1].", "[1] Mehmet Sezgin and Bulent Sankur present a survey over image thresholding methods.", "[1] Mehmet Sezgin and Bulent Sankur described 40 thresholding methods.", "Thresholding can be used in many widespread applications, such as: extracting logous, musical scores, endoscopic images, graphical context, cell images or knowledge representation [1], and in this paper dealing with text extraction.", "Recently there has been significant investigations in using the wavelet transform as a tool for improving thresholding [1, 3, 4, 5]."]} diff --git a/graph_5395271.jsonl b/edge/graph_14038195.jsonl similarity index 100% rename from graph_5395271.jsonl rename to edge/graph_14038195.jsonl diff --git a/edge/graph_14038892.jsonl b/edge/graph_14038892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e04a4bd4f6cc84eaea008e02653b487a6794658e --- /dev/null +++ b/edge/graph_14038892.jsonl @@ -0,0 +1,2 @@ +{"640233|8520489": ["Many rendering algorithms have been developed to exploit visual importance; see Christensen [ Chr03 ] for a survey."]} +{"195564|7624176": []} diff --git a/graph_5408762.jsonl b/edge/graph_14039733.jsonl similarity index 100% rename from graph_5408762.jsonl rename to edge/graph_14039733.jsonl diff --git a/graph_5429500.jsonl b/edge/graph_14042585.jsonl similarity index 100% rename from graph_5429500.jsonl rename to edge/graph_14042585.jsonl diff --git a/edge/graph_14043655.jsonl b/edge/graph_14043655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89a9ffe5a4f783989a8e9b16f5647c4176936187 --- /dev/null +++ b/edge/graph_14043655.jsonl @@ -0,0 +1,24 @@ +{"468726|14583671": []} +{"4668902|15411200": ["Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015].", "Conventional error-correction mechanisms such as redundant execution and use of ECC incur high overhead [Mittal and Vetter 2015]."]} +{"4668902|16780247": ["Different memory technologies have different limitations, for example, SRAM and (e)DRAM consume high leakage and refresh power, respectively, and NVMs have high write energy/latency and low write endurance [Vetter and Mittal 2015; Mittal et al. 2015].", "\u20262012a, 2012b; Liu et al. 2012; McAfee and Olukotun 2015; Misailovic et al. 2014; Moreau et al. 2015; Ringenburg et al. 2014; Sampson et al. 2011, 2015; Shi et al. 2015; Shoushtari et al. 2015; Vassiliadis et al. 2015; Yazdanbakhsh et al. 2015a, 2015b] Use of OpenMP-style pragma [Rahimi et al.\u2026", "Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015].", "\u2026[Grigorian et al. 2015; Grigorian and Reinman 2014; Hegde and Shanbhag 1999; Khudia et al. 2015; Mahajan et al. 2015; Ringenburg et al. 2014, 2015; Roy et al. 2014; Samadi and Mahlke 2014; Yeh et al. 2007; Zhang et al. 2014] Annotating [Amant et al. 2014; Ansel et al. 2011; Carbin et al.\u2026"]} +{"4668902|14583671": ["Different memory technologies have different limitations, for example, SRAM and (e)DRAM consume high leakage and refresh power, respectively, and NVMs have high write energy/latency and low write endurance [Vetter and Mittal 2015; Mittal et al. 2015].", "Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015]."]} +{"4668902|978927": ["In fact, the electricity consumption of just the US data centers is expected to increase from 61 billion kWh (kilowatt hour) in 2006 [Mittal 2014a] and 91 billion kWh in 2013 to 140 billion kWh in 2020 [NRDC 2013]."]} +{"4668902|13037420": ["In fact, the electricity consumption of just the US data centers is expected to increase from 61 billion kWh (kilowatt hour) in 2006 [Mittal 2014a] and 91 billion kWh in 2013 to 140 billion kWh in 2020 [NRDC 2013].", "For example, by intelligently reducing the eDRAM/DRAM refresh rate or SRAM supply voltage, the energy consumed in storage and memory access can be reduced with minor loss in precision [Mittal 2012, 2014b]."]} +{"4668902|12904520": ["For example, by intelligently reducing the eDRAM/DRAM refresh rate or SRAM supply voltage, the energy consumed in storage and memory access can be reduced with minor loss in precision [Mittal 2012, 2014b]."]} +{"17779575|13037420": []} +{"14721738|15411200": ["Another promising direction for addressing NVM endurance is the design of SRAM-NVM hybrid caches [Mittal and Vetter 2015c], where write-intensive blocks can be redirected to SRAM for achieving higher device lifetime and performance.", "In DRAM and eDRAM, PV affects the retention time, and the cell with the shortest retention time determines the refresh period of the entire device, which reduces device availability and increases energy consumption [Mittal and Vetter 2015a].", "Yoon et al. [2011] present a \ufb01ne-grained remapping technique to protect NVM main memory from both soft and hard errors [Mittal and Vetter 2015b]."]} +{"14721738|16780247": ["Emerging memory technologies are seen as a solution to power issues [Vetter and Mittal 2015]; however, they do not provide a solution to the PV issue.", "A PV-unaware approach can lead to reduced throughput, thermal emergencies (e.g., when computation-intensive tasks are scheduled on cores with high leakage power), and missed real-time deadlines [Mittal 2015].", "Given the low write endurance of NVMs and nonuniform write pattern of typical applications, wear-leveling techniques are required for achieving reasonable NVM device lifetimes [Mittal et al. 2015].", "They show that the relative advantage of their technique increases further with increasing magnitude of PV. Depending on whether multiple or single data bit(s) are stored in an NVM cell, it is referred to as MLC or SLC [Mittal et al. 2015]."]} +{"14721738|14583671": ["A PV-unaware approach can lead to reduced throughput, thermal emergencies (e.g., when computation-intensive tasks are scheduled on cores with high leakage power), and missed real-time deadlines [Mittal 2015].", "Given the low write endurance of NVMs and nonuniform write pattern of typical applications, wear-leveling techniques are required for achieving reasonable NVM device lifetimes [Mittal et al. 2015].", "They show that the relative advantage of their technique increases further with increasing magnitude of PV. Depending on whether multiple or single data bit(s) are stored in an NVM cell, it is referred to as MLC or SLC [Mittal et al. 2015]."]} +{"14721738|13037420": ["Way-based cache recon\ufb01guration approaches [Mittal 2014] work by turning off some cache ways based on program working set size, such that leakage energy is saved with minimal performance loss.", "Also, to improve ef\ufb01ciency, operational margins can be tightened to provision a \u201cbare minimum\u201d margin [Chandrasekar et al. 2013, 2014].", "\u2026Paul et al. [2011], Schechter et al. [2010], and Wilkerson et al. [2010] NVM wear leveling Cintra and Linkewitsch [2013], Dong et al. [2011], Mittal et al. [2014], Yun et al. [2014], and Zhao et al. [2014] (e)DRAMrefreshpolicy Agrawal et al. [2014], Liang et al. [2007], and Wang et al.\u2026", "Several approaches have been proposed for this: \u2014 Reducing writes or stress: Writes can be reduced using wear-leveling techniques [Cintra and Linkewitsch 2013; Dong et al. 2011; Mittal et al. 2014; Yun et al. 2014; Zhao et al. 2014] or data compression [Zhang and Li 2009].", "Dynamic voltage scaling approaches for cache energy saving [Mittal 2014] work by scaling supply voltages of cold blocks that have not been used in the recent past."]} +{"15411200|14583671": []} +{"15411200|17779575": []} +{"15411200|13037420": []} +{"9452842|13037420": ["of computing systems, ranging from embedded systems to data-centers and supercomputers [80] and for all components of computing systems, such as cache and main memory [81, 82]."]} +{"9452842|12904520": []} +{"14182694|15411200": ["bit has been decreasing and hence, SRAM-based RF is becoming increasingly susceptible to particle-strike induced soft-errors [27]."]} +{"14182694|4668902": []} +{"14182694|9436861": ["For more details on GPU architecture and power modeling, we refer the reader to previous work [3], [4], [12], [13], [14], [15]."]} +{"14182694|14583671": ["TABLE 2 A comparison of memory technologies [11, 17, 29, 31]", "We now briefly discuss their working and relevant properties and refer the reader to previous work [29, 30] for more details."]} +{"14182694|17779575": ["[25]."]} +{"14182694|165863": ["The RF resources are generally over-provisioned to meet the peak performance targets, however, their average utilization remains low [22], [23], [24]."]} +{"14182694|13037420": []} diff --git a/edge/graph_140439701.jsonl b/edge/graph_140439701.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48810c5d024e876f5f14144e61ff73123ef10f1b --- /dev/null +++ b/edge/graph_140439701.jsonl @@ -0,0 +1,2 @@ +{"3531572|17485266": ["A detailed comparison is available in [18].", "A comparison of major GD methods is presented in Table II and an overview of gradientbased optimization algorithms is provided in [18]."]} +{"14459736|393948": []} diff --git a/edge/graph_14044393.jsonl b/edge/graph_14044393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c67f642fd2793e5db92f9e922c94f848739eb85 --- /dev/null +++ b/edge/graph_14044393.jsonl @@ -0,0 +1 @@ +{"15948595|713082": ["A readable introduction to DIS is provided in DIS Steering Committee (1994). The August 1995 issue of the Proceedings of the IEEE includes several articles concerning DIS, and the March 1997 issue of IEEE Spectrum concerning distributed virtual environments."]} diff --git a/edge/graph_14044589.jsonl b/edge/graph_14044589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21cdc2f3f814f6210d4bc31db158d34dea66833e --- /dev/null +++ b/edge/graph_14044589.jsonl @@ -0,0 +1 @@ +{"119703065|14044589": []} diff --git a/edge/graph_14046529.jsonl b/edge/graph_14046529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c64d307d5b3c77ba5124e6455a24a5cad4b64c2 --- /dev/null +++ b/edge/graph_14046529.jsonl @@ -0,0 +1,13 @@ +{"6393471|17474643": ["A Multi-Cloud is a type of Inter-Cloud, in which clients utilize mul\u00adtiple clouds without relying \non any interoperability functionalities implemented by the providers [Ferrer et al. 2012; Petcu 2013; \nGrozev and Buyya 2012].", "Application deployment across clouds has recently attracted interest and resulted \nin the emer\u00adgence of at least 20 projects facilitating cross-cloud deployment [Grozev and Buyya 2012]."]} +{"5746950|13210924": ["The performance of the auto-scaler will depend on the quality of the available metrics, the sampling granularity, and the overheads (and costs) of obtaining the metrics [38]."]} +{"39245183|1932843": []} +{"39245183|8914588": []} +{"39245183|1708582": []} +{"18861385|16515612": ["Calzarossa and Serazzi [49] discuss the steps for modeling a workload."]} +{"16716424|2340253": ["However, the controllers need to coordinate better to control the number of standby servers which would require further exploration of multi-agent reinforcement learning [3] techniques."]} +{"1149110|1708582": ["In [12] authors state that selecting untried actions requires O(n(2)) interactions to observe all state-action pairs, while random selection policy requires O(2) interactions."]} +{"53759852|38476": ["In addition, we incorporate sliding window [16] and cross-validation [15], [12] techniques in the training and prediction stages and consequently evaluate the validity of the learning algorithms for prediction accuracy using statistical metrics, as discussed in the following sections.", "The sliding window technique [16] maps an input sequence x of size k to an individual output y by using a prediction model; this approach is very effective in data mining \ufb01eld e.g. Protein Secondary Structure Prediction [18], Pronouncing of English Words [17] etc. Similarly, we map the challenge of\u2026"]} +{"1519520|3042022": ["Therefore, if in repeating an n number of actions \u03b1i is selected, then for the repetition of n+1 we will have the following [13,14,15]: \uf0b7 For optimal response(\u03b2=0):"]} +{"15929442|8914588": []} +{"12522853|15619069": ["Other proposed meta-models include CSM, PCM and KLAPER [18].", "To support modeling large applications and concurrently involve multiple developers, the PCM's model is split into five sub-models: The repository model consists of interface and component specifications.", "In order to capture the time behavior and resource consumption of a component, PCM takes four factors into account [1].", "Figure 3 gives an overview of how the structure of the resulting PCM performance model looks like.", "Model The predictions of the SPECjEnterprise2010 application are conducted using a PCM model as performance model.", "One of the most advanced component-based performance modeling languages, in terms of parametrization and tool support, is the Palladio Component Model (PCM) [18].", "The PCM model is semi-automatically extracted from a running benchmark application instance.", "PCM Figure 1: The system reconfiguration process [16] . allows modeling processing resources like, e.g., CPUs and disk drives.", "In PCM, the performance-relevant control flow of a component service is modeled as an RDSEFF.", "To derive predictions from the PCM models, we use the Simucom framework [1] that implements a queueing-network based simulation.", "In this paper, we use the PCM as architecture-level performance model since it allows to explicitly model different usage profiles and resource allocations."]} +{"17567221|8914588": ["A recent comprehensive survey of autonomic computing works can been seen in [11]."]} diff --git a/edge/graph_14047190.jsonl b/edge/graph_14047190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..521512b284a5097490535b5659051157c08b37d6 --- /dev/null +++ b/edge/graph_14047190.jsonl @@ -0,0 +1 @@ +{"8429228|14047190": []} diff --git a/graph_544688.jsonl b/edge/graph_14056879.jsonl similarity index 100% rename from graph_544688.jsonl rename to edge/graph_14056879.jsonl diff --git a/edge/graph_14060561.jsonl b/edge/graph_14060561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18492dad5e19bb04c615d0631f8a9985bb2faf70 --- /dev/null +++ b/edge/graph_14060561.jsonl @@ -0,0 +1,4 @@ +{"27128590|4967411": []} +{"12034630|5822166": []} +{"205458652|4967411": ["However, the use of the fuzzy linguistic approach have presented some limitations, specially regarding information modelling and computational processes, the so-called processes of computing with words (CW) (see [9,18,20])."]} +{"122064350|1708582": []} diff --git a/graph_5473785.jsonl b/edge/graph_14061775.jsonl similarity index 100% rename from graph_5473785.jsonl rename to edge/graph_14061775.jsonl diff --git a/edge/graph_14065459.jsonl b/edge/graph_14065459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0893a48e9fba3c08e390bd253475325198f6ee4 --- /dev/null +++ b/edge/graph_14065459.jsonl @@ -0,0 +1 @@ +{"14290576|1983971": ["More in-\nterestingly, while we find performance on selection tasks is much better on the IPT,\nfor manipulation tasks there is little difference between the two display technolo-\ngies.", "Comparisons have been made between IVEs and desktop displays (Pausch, Proffitt, & Williams, 1997, Schroeder et al., 2001, Bowman, Datey, Ryn, Farooq & Vasniak, 2002) and they tend to show an advantage to immersion in some applications.", "An overview of strategies for evaluation of virtual environments has been provided by Bowman, Gabbard, and Hix (2002).", "He found that performance on searching and navigation tasks was significantly impaired on an HMD with a 112\u00b0 field compared with an HMD with a 176\u00b0 field of view."]} diff --git a/edge/graph_14068482.jsonl b/edge/graph_14068482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b94164ebf9c24574a6fb0fc192bf8a44712f3d1 --- /dev/null +++ b/edge/graph_14068482.jsonl @@ -0,0 +1 @@ +{"16592951|1230643": ["Such networks have the potential to enable a wide range of applications in environmental monitoring, health, military and security (see [1] for a survey of applications)."]} diff --git a/edge/graph_14070411.jsonl b/edge/graph_14070411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..436cb58fcba09b36a4ef34c28c241eb2c8e77a56 --- /dev/null +++ b/edge/graph_14070411.jsonl @@ -0,0 +1,16 @@ +{"15538672|192934": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"6674407|192934": []} +{"206592484|456491": []} +{"14635907|16082889": ["Despite more than 30 years of handwriting recognition research [2], [3], [ 4 ], [5], developing a reliable, general-purpose system for unconstrained text line recognition remains an open problem."]} +{"14635907|15782139": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"2958085|8575576": ["Most biomedical images used for clinical treatment of patients\u2014magnetic resonance imaging (MRI) [116, 117], radiographic imaging [118, 119], positron emission tomography (PET) [120] and histopathology imaging [121]\u2014have been used as input data for deep learning algorithms."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"16585863|14288295": ["The use of this type of discriminative model for ASR has been documented and summarized in detail in [90]\u2013[92] and analyzed recently in [93]."]} diff --git a/edge/graph_14070968.jsonl b/edge/graph_14070968.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67066a3b2f8fe47d8921da29c64cde4344e1f724 --- /dev/null +++ b/edge/graph_14070968.jsonl @@ -0,0 +1 @@ +{"5943362|9913343": ["These principles guide the use of persuasion in authentication mechanisms to teach users how to authenticate more securely.", "Various forms of graphical passwords (Suo et al. 2005) have been proposed because people are better at recalling images than text (Nelson et al. 1976)."]} diff --git a/edge/graph_14074802.jsonl b/edge/graph_14074802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6b3d10fb7095e6ab8f9adb467d70d0b7a225fd3 --- /dev/null +++ b/edge/graph_14074802.jsonl @@ -0,0 +1,19 @@ +{"8463827|386036": ["Keywords Blocking, Link Discovery, Identity Resolution, Duplicate Detection, Record Linkage, Linked Data"]} +{"13224943|12860838": ["In this context, ontology matching [2, 3, 4, 5, 6] and instance matching [9] are the two most-studied sub-problems of interlinking."]} +{"11668048|386036": ["RELATED WORK There is a large body of related work on record linkage [5] and duplicate detection [4] within the database community as well as on ontology matching [6] in the knowledge representation community."]} +{"15793869|2281773": ["One of the most promising research areas in question answering in the past years is the conversion of natural language to SPARQL queries [28,18,27], which allows a direct deployment of such systems on top of a triple store.", "There is a range of approaches to QA over structured data, for an overview see [18]."]} +{"15793869|16534280": ["In contrast, previous approaches have been limited either with respect to their access to deep web data behind scripted forms [21] by targeting only common-sense, surface web data, or by requiring user action for form navigation (Morpheus, [11])."]} +{"15793869|206742377": ["To extract the relevant data from the real estate agencies, we can resort essentially to three alternatives in web data information extraction [7], namely traditional information extraction, unsupervised data extraction, or supervised data extraction, with OXPath falling into the last category."]} +{"16535573|386036": ["Numerous similarity functions may be employed, in particular generic string similarity measures (see [20] [25] for a comprehensive comparison)."]} +{"16603916|386036": ["Albeit Link Discovery is closely related with record linkage [7] and deduplication [4], it is important to notice that Link Discovery goes beyond these two tasks as Link Discovery aims to provide themeans to link entities via arbitrary relations."]} +{"22476550|386036": ["The problem of reconciliation was originally studied in the database community where it is known as record linkage or object identification [3]."]} +{"15886037|10500613": []} +{"15886037|386036": ["Thus, in order to determine suitable classification criteria for data linking techniques, we considered both the techniques themselves and existing classification schemas proposed in the literature on database record linkage (Elmagarmid et al., 2007; Winkler, 2006; K\u00f6pcke & Rahm, 2010) and schema matching (Rahm & Bernstein, 2001; Euzenat & Shvaiko, 2007).", ", 2003), (Elmagarmid et al., 2007), (Winkler, 2006)) and we refer the reader to these papers for the detailed description of different similarity functions.", "In the record linkage research there is a distinction between field matching and record matching techniques, which focus on two different stages of the linkage process (Elmagarmid et al., 2007).", "In this case we talk about anaphora resolution or named entity disambiguation (Elmagarmid et al., 2007)."]} +{"7214|386036": ["There is a large body of related work on record linkage [7] and duplicate detection [9] within the database community as well as on ontology matching [10] in the knowledge representation community."]} +{"5976219|10500613": []} +{"1958116|12860838": ["In this context, ontology matching [10, 11, 15] (ontology alignment) and instance matching are the two most-studied sub-problems of interlinking.", "The ontology-matching problem mentioned in the literature [13, 14, 15], refers to RDF data that represents a taxonomy or a vocabulary."]} +{"18138526|386036": ["A related problem called record linkage or duplicate detection has been investigated for decades in the realm of databases [9, 20]."]} +{"6111745|386036": ["The task of discovering links between knowledge bases is closely related with record linkage [22, 9] and de-duplication [7]."]} +{"15461038|386036": ["Instance matching (IM) , refers to the problem of identifying instances that describe the same real-world object [1, 2, 3, 4, 5]."]} +{"13069297|386036": ["Note that the task of discovering links between knowledge bases is closely related with record linkage [30,10,5,17]."]} +{"15747212|386036": ["The entity resolution (ER) problem (see [14,3] for surveys) shares many similarities with link discovery."]} diff --git a/graph_551238.jsonl b/edge/graph_14076440.jsonl similarity index 100% rename from graph_551238.jsonl rename to edge/graph_14076440.jsonl diff --git a/edge/graph_14077349.jsonl b/edge/graph_14077349.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20a45572b18560dd64efd03e1f831bc0b13b7d62 --- /dev/null +++ b/edge/graph_14077349.jsonl @@ -0,0 +1,5 @@ +{"8575417|14077349": ["These solutions are motivated by the increase of the devices density and are aimed at sharing neighboring devices connectivity."]} +{"139061|14441987": ["Comprehensive reviews and performance comparisons of ad hoc routing protocol have been presented in many publications [4, 5, 15, 28, 29, 37, 41, 62, 68].", "Ad hoc routing protocols may generally be categorized as being either proactive or on-demand (reactive) according to their routing strategy [68]."]} +{"25531281|1110872": ["Although the number of users who have prepared multiple paths is increasing, the single TCP cannot provide sufficient throughput if packets are delivered via multiple network paths [2, 3]."]} +{"1767748|12765832": ["The idea of providing Internet connectivity on transportation has attracted increasing popularity in recent years [1]-[3], and several commercial systems [4]-[6] have already been implemented."]} +{"5948240|1110872": ["The ordinary single TCP cannot provide sufficient throughput if packets are delivered via multiple network paths [2,3]."]} diff --git a/edge/graph_14077778.jsonl b/edge/graph_14077778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4c44b38ed792fb9f53dcf2bd7e49e377357cd62 --- /dev/null +++ b/edge/graph_14077778.jsonl @@ -0,0 +1 @@ +{"206852205|14077778": []} diff --git a/graph_5540088.jsonl b/edge/graph_14078382.jsonl similarity index 100% rename from graph_5540088.jsonl rename to edge/graph_14078382.jsonl diff --git a/edge/graph_14081693.jsonl b/edge/graph_14081693.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c331b6db93eb8973e41bd61769966c36c594f0c --- /dev/null +++ b/edge/graph_14081693.jsonl @@ -0,0 +1 @@ +{"14971994|6952653": ["The 4 properties that any IAg should offer are [ 66 ] :", "[ 66 ]). KQML [16] currently seems to be the most popular cooperation protocol for knowledge sharing used in DNM.", "emerged at about the same time : mobile code languages, initially devised for large-scale distributed systems ; OMG CORBA [54], devised by the object-oriented community to address the interoperability of distributed objects ; and Intelligent Agents (IAgs) [ 66 ], coming from the Distributed Artificial Intelligence (DAI) community."]} diff --git a/edge/graph_14088200.jsonl b/edge/graph_14088200.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bb544a67c3408d183fd43883790dd7502ba907b --- /dev/null +++ b/edge/graph_14088200.jsonl @@ -0,0 +1,5 @@ +{"14468987|1099309": ["For instance, the MPEG-7 Visual Part [15] supports color (e.g. dominant colors, color layout), texture, shape (e.g. region/contour-based), and motion (local or global) descriptors .", "Although the construction of the VDO is tightly coupled with the specification of the MPEG-7 Visual Part [18], several modifications were carried out in order to adapt to the XML Schema provided by MPEG-7 to an ontology and the data type representations available in RDF Schema.", "For instance, the MPEG-7 Visual Part [15] supports color (e."]} +{"14468987|13365762": ["Although new multimedia standards, such as MPEG-4 and MPEG-7 [1], provide important functionalities for the manipulation and transmission of objects and associated metadata, the extraction of semantic descriptions and annotation of the content with the corresponding metadata is out of the scope of these standards and is left to the content manager."]} +{"162180|9045232": ["Over the years various methods for the detection of faces in images and image sequences are reported, see [95] for a comprehensive and critical survey of current face detection methods.", "Face detection techniques aim to identify all image regions which contain a face, regardless of its three-dimensional position, orientation, and lighting conditions used, and if present return their image location and extents [95]."]} +{"162180|192934": ["According to [37] the four best approaches for pattern recognition are:", "\u2022 Bayes classifier: assigns a pattern to the class which has the maximum estimated posterior probability [37]; \u2022 Decision tree: assigns a pattern to a class based on a hierarchical division of feature space [37]; \u2022 k-Nearest neighbor: assigns a pattern to the majority class among the k patterns with smallest distance in feature space [37]; \u2022 Hidden Markov model (HMM): assigns a pattern to a class based on a sequential model of state and transition probabilities [46, 69];"]} +{"7531257|7185733": ["The choice of FSMs is motivated by the advantages in dealing with multiple sources of observation, as opposed to standard HMMs [14]; another advantage is the simplicity in modeling the temporal duration of the highlights, as opposed to other techniques such as coupled HMMs or dynamic Bayesian networks [3, 5, 16].", "In particular, standard HMMs perform well when dealing with single-object actions (such as the recognition of a hand movement [14]), but tend to fail when discrete observation variables may assume a high number of different values and comes from multiple sources of observation (as in the case of games where visual cues are observed over the whole playfield).", "Recognition of relevant soccer highlights (free kicks, corner kicks, and penalty kicks) was presented in [1]: HMMs encoding players\u2019 distribution and camera motion were used to discriminate between the three highlights.", "The same sport has been studied using hidden Markov models (HMMs) to detect play/break segments in [13].", "This problem can be tackled by factorizing state and observation variables, and, hence, deriving a more complicated HMM topology like coupled HMMs [5], or a generic dynamic Bayesian network [16].", "hand movement [14]), but tend to fail when discrete observation variables may assume a high number of different values and comes from multiple sources of observation (as in the case of games where visual cues are observed over the whole playfield)."]} diff --git a/edge/graph_14088590.jsonl b/edge/graph_14088590.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5118fca1390a5ac16848098e351c882eff1c999 --- /dev/null +++ b/edge/graph_14088590.jsonl @@ -0,0 +1,13 @@ +{"11254296|14441987": ["Much work on routing in ad hoc networks has focused on finding a shortest path and achieving a high degree of route availability, which mostly deals with the best-effort data traffic [1]\u2013[3]."]} +{"5307978|14441987": []} +{"5307978|10559330": ["QoS protocols such as the resource reservation protocol (RSVP) [35] and integrated service (IntServ) [36] protocol lie above the Internet protocol (IP) in the protocol stack and are predicated on the assumption that a router can control all of the capacity on an outgoing link."]} +{"13403320|14441987": ["Basically, there are two approaches in providing ad hoc network connectivity: \u2022 Flat-routed network architecture \u2022 Hierarchical network architectures [1] In the flat-routed network architecture, all the nodes are equal and packet routing is done based on peer-to-peer connections.", "In general, existing routing protocols can be classified as either: \u2022 Table-driven \u2022 On-demand \u2022 Hybrid [1, 2] Table-driven protocols attempt to continuously update the routes within the network so that when a packet needs to be forwarded, the route is already known and can immediately be used."]} +{"6092075|10287248": []} +{"6438719|14441987": []} +{"41841281|991041": []} +{"28283810|17428811": ["Layer coding standard such as Fine Granular Scalability (FGS) [1][2][3] video targets a broad range of multimedia applications such as interactive video communications and video mail applications over IP networks, etc."]} +{"5842782|10287248": ["QoS routing has been receiving increasingly intensive attention in the wireline network domain [10].", "source node or by a distributed computation [10]."]} +{"11154258|2835258": ["The GPSR uses a technique called greedy packet forwarding [4], [13]."]} +{"38624985|14441987": ["Much work has been done on routing in MANETs [1, 2]."]} +{"38624985|10287248": ["The QoS routing has been receiving increasingly intensive attention in the wireline network domain [3, 4]."]} +{"10655821|14441987": ["We discuss the implementation of Dynamic Source Routing (DSR) \nprotocol using the Click modular router on a real life test-bed consisting of laptops and wireless Ethernet \ncards."]} diff --git a/edge/graph_14091554.jsonl b/edge/graph_14091554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a47b6f8ab0c289af0642d6b1df703d9d16b4ed1e --- /dev/null +++ b/edge/graph_14091554.jsonl @@ -0,0 +1,3 @@ +{"16580226|469744": ["These existing characteristics include: \u2022 the type of data provided to the user [3,12,16], which may be textual, 2D or 3D graphics, gesture, sound, speech or haptic, and \u2022 the potential physical targets of enhancement, in order to combine physical and digital data [14]; the target may be users,\u2026"]} +{"2295796|239537": []} +{"238607|11717357": []} diff --git a/edge/graph_14098594.jsonl b/edge/graph_14098594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85b7910739b89daf64e3503cb04486de8918cabb --- /dev/null +++ b/edge/graph_14098594.jsonl @@ -0,0 +1,3 @@ +{"207998550|16570307": ["Although a number of survey papers on a variety of congestion con-trol algorithms have appeared in the literature [28, 50.", "The resource power gets to its maximum value at the knee point, where the average queue size is close to one, including the packet in service [28]."]} +{"207998550|15040462": []} +{"41057047|15040462": ["Some of the alternatives that have been described in the literature are window (cid:13)ow-control, Xon/Xo(cid:11) 7], rate (cid:13)ow-control [5], etc. [ In the window (cid:13)ow-control scheme, the destination speci(cid:12)es a limit on the number of packets that the source may send without further permission from the destination.", "Some of the alternatives that have been described in the literature are window ow-control, Xon/Xo [7], rate ow-control [5], etc."]} diff --git a/edge/graph_14098709.jsonl b/edge/graph_14098709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8317de59cf05aa9ad333a3a11a6ababfba24289 --- /dev/null +++ b/edge/graph_14098709.jsonl @@ -0,0 +1,3 @@ +{"408185|47147736": ["Furthermore, it has been shown that ATM\u2019s creditbased flow control approaches, such as the N23 scheme, eliminate cell loss due to buffer overflows [16], a feature that makes such approaches similar to Tor, where no packets may be dropped to signal congestion."]} +{"6438719|14441987": []} +{"9480509|1462862": ["sions on this topic can be found in [86, 15, 54])."]} diff --git a/graph_5540781.jsonl b/edge/graph_141.jsonl similarity index 100% rename from graph_5540781.jsonl rename to edge/graph_141.jsonl diff --git a/graph_5551880.jsonl b/edge/graph_14102342.jsonl similarity index 100% rename from graph_5551880.jsonl rename to edge/graph_14102342.jsonl diff --git a/graph_5556391.jsonl b/edge/graph_14102427.jsonl similarity index 100% rename from graph_5556391.jsonl rename to edge/graph_14102427.jsonl diff --git a/graph_141053.jsonl b/edge/graph_141053.jsonl similarity index 100% rename from graph_141053.jsonl rename to edge/graph_141053.jsonl diff --git a/edge/graph_14108756.jsonl b/edge/graph_14108756.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e277e7992b9324d5882cf6b4128e0aa2399db9d --- /dev/null +++ b/edge/graph_14108756.jsonl @@ -0,0 +1 @@ +{"14644936|10559330": ["DiffServ uses in-band signalling and so the IP packets are marked with priority information, which intermediate routers use for the traffic shaping.", "All machines were standard PC\u2019s running Linux."]} diff --git a/graph_5557385.jsonl b/edge/graph_14111543.jsonl similarity index 100% rename from graph_5557385.jsonl rename to edge/graph_14111543.jsonl diff --git a/edge/graph_14111742.jsonl b/edge/graph_14111742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11d34c784836bb5091f3d5e7de716a2ca9dc30ce --- /dev/null +++ b/edge/graph_14111742.jsonl @@ -0,0 +1 @@ +{"444521|5991846": []} diff --git a/edge/graph_14116122.jsonl b/edge/graph_14116122.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff61b74e3ec70c1b8719d9b0fd4f92141eac8a19 --- /dev/null +++ b/edge/graph_14116122.jsonl @@ -0,0 +1,94 @@ +{"9621856|16013270": ["The number of stages was determined by cross validation using n = [3, 5, 10, 15] fixed stages.", "Additionally, the number of Gaussians was evaluated with m = [1, 2, 3, 5, 10] Gaussians.", "One good measure of the productivity of the field is the sheer number and variety of datasets that have been produced by researchers in the last few years: A recent survey [3] lists no less than twenty\u2217Part of this work was done at the lab for Computer Vision for Human-Computer Interaction at the Karlsruhe Institute of Technology (http://cvhci."]} +{"123081582|14970359": [", [18], [19] provide a broad overview of over three hundred papers and numerous approaches for analyzing human motion in videos, including human motion capture, tracking, segmentation and recognition."]} +{"123081582|7788290": []} +{"28307198|1634674": ["Particularly, researchers give more attention on human activity analysis due to huge applications in surveillance and security systems [1], [38], [56]."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"1080962|1634674": ["Human action and activity recognition is a broad and active area of research in computer vision, and comprehensive reviews of the proposed methods can be found in [42], [48]."]} +{"340162|1634674": ["For a more complete survey, we refer the reader to [24]."]} +{"109860|1634674": ["\u2026where Tl are a local neighboring pixels, h is a global smoothing parameter, P is the total number of samples in a local analysis window around a sample position at x i , and the matrix C l \u2208 R (2 \u00d7 2) is a covariance matrix estimated from a collection of \ufb01rst derivatives along spatial axes."]} +{"7062194|6387482": []} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} +{"18262615|1634674": ["Recognizing human action has been an active research topic in computer vision due to its wide range of applications such as behavioral biometrics, content-based video analysis, and surveillance [23]."]} +{"10087484|7788290": ["While these approaches have been successful for the recognition of actions from articulated objects such as humans (see [9] for a review), they are not expected to be useful in the case of less articulated objects such as rodents [5]."]} +{"3084800|2355696": []} +{"3084800|1634674": []} +{"3084800|5401262": []} +{"3084800|7788290": []} +{"5540604|2355696": []} +{"13298437|7185733": ["For a comprehensive survey of hand and arm gesture recognition see Pavlovic et al. [ 17 ]."]} +{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]} +{"16051814|11042075": ["Gait recognition has gained researchers\u2019 attention in the last decade and numerous such methods have been proposed in the literature [2]\u2013[5]."]} +{"16051814|12127129": ["traction [26], [27] or color-based image segmentation methods Fig."]} +{"9568944|1634674": ["Recent progress on human activity analysis from video data has been well documented in [1] and [2]."]} +{"9568944|8365617": []} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"2857532|53680608": []} +{"13936136|1634674": ["For example, [30] compiled published works within a period of 20 years devoted to human actions and activities."]} +{"8729004|7788290": ["We will only mention a few of the more recent works on human detection here \u2013 see Gavrilla\u2019s survey [ 7 ] for older references."]} +{"5401262|4361938": ["The same is true for eye gaze tracking [15]."]} +{"5401262|9045232": [", identification of all regions in the scene that contain a human face [89], [44]."]} +{"9361658|2355696": []} +{"15751455|9045232": []} +{"17814249|1634674": ["A summary of recent and past literature on action and activity recognition is presented in [29]."]} +{"7747000|12127129": ["Moving object segmentation techniques [25], [26] are applied to each action video frame to create binary images depicting person\u2019s body in white and the background in black."]} +{"10736337|6857179": ["16 A recent emerging trend in affective computing is the adoption of real-valued, continuous dimensional emotion descriptions for learning tasks [1].", ", valence with facial features, arousal with audio features [1], [4])."]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"281190|14405917": ["T HE coordination of verbal and nonverbal human behavior during interpersonal interactions has been studied in many diverse areas including neuroscience, engineering, psychology and behavioral sciences [1]."]} +{"15919728|192934": ["applications of SVMs have been demonstrated in previous research [16]."]} +{"45560866|5664472": []} +{"45560866|1634674": []} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"12627049|18440098": ["Recognizing signs of visual-gestural languages like the American sign language (ASL) is a very active field [145, 146, 147, 148, 149, 150, 151]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"9469305|5755403": ["There are many options when clustering trajectories, ranging from the choice of clustering algorithm to the measure of similarity between tracks [24].", "A more detailed examination of techniques is presented in the review by Morris and Trivedi [24], which highlights a wide range of applications, challenges, and common approaches to trajectory learning and modeling."]} +{"8360759|27637541": []} +{"8360759|1113420": ["Key-value models [Baldauf et al. 2007] are one of the approaches that serve to describe service capabilities in service discovery matching.", "\u2026Behavior Recognition 43:19 Other examinations evaluate different ontologies focusing on licensing (open or free to use), maturity (showing evidence of use), structure (modularity, design), granularity of management tools, expressiveness, and so forth [Feliu and Cabr\u00b4e 2002; Baldauf et al. 2007].", "Finally, ontology-based models describe concepts and relationships in a high and formal expressiveness level [Baldauf et al. 2007].", "Interoperability solutions based on the ontology expressive models ful\ufb01lling requirements for modeling context information [Baldauf et al. 2007].", "Different physical sensors are available for diverse types of contexts, for example, light, visual context, audio, motion, acceleration, location, touch, temperature, or physical attributes such as biosensors [Baldauf et al. 2007] or nonvisual tracking systems in general [Zhou and Hu 2008]."]} +{"7877423|14970359": ["For a detailed review of the literature, we refer the reader to the following survey papers [27,33,61 , 67].", "For a detailed review of the literature,\nwe refer the reader to the following survey papers (Forsyth et al. 2006; Gavrila 1999; Moeslund and Granum 2001; Poppe 2007a)."]} +{"7877423|7788290": ["we refer the reader to the following survey papers (Forsyth et al. 2006; Gavrila 1999; Moeslund and Granum 2001; Poppe 2007a).", "For a detailed review of the literature,\nwe refer the reader to the following survey papers (Forsyth et al. 2006; Gavrila 1999; Moeslund and Granum 2001; Poppe 2007a)."]} +{"950462|2355696": ["However, only few works have so far attempted to recognize social attitudes like interest, politeness and flirting [ 2 ]."]} +{"12152883|14970359": []} +{"8042572|1113420": ["Context aware intelligent spaces[56][57] are good example of systems that can exploit complementary information across modalities by extracting information from different sensors based on the context."]} +{"8042572|7360895": ["Human-robot interaction [50][36] and avatar"]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"11384576|6387482": []} +{"11384576|10397481": []} +{"11384576|2748484": ["Computational models of single- and multimodal saliency [10]\u2013[13] have been applied to emerging multimedia applications such as automatic video abstraction, summarization, indexing, and browsing [14], [15].", "An extensive survey on methods and taxonomies from the vast literature on video abstraction and summarization can be found in [18] and detailed field overviews in [15], [16]."]} +{"7332452|393948": ["Recent progress on deep learning is reviewed in [3]."]} +{"8322669|2355696": ["As automatic analysis of social interactions attracts increasingly more attention in the computing community [3] [ 8 ], publicly available benchmarks become a crucial element for the progress of the domain."]} +{"2257674|18050848": ["Yet, audio and lip information have been used for speaker identification and/or verification in relatively few works such as [3], [4], [5], [6], [7], [8]."]} +{"16081117|2301292": ["[28, 29] pointed out in their surveys, they are not stable enough for the large changes in communications and a consistent facial pose is necessary when 2D features are used, which showed that 2D feature-based algorithms are not adequately robust to recognize continuous emotions."]} +{"16081117|6857179": ["A lot of methods have been designed to recognize continuous emotions [16]."]} +{"16081117|7360895": ["By classifying emotions as different categories, some human-centered systems like [12, 20] have been designed to react differently for different user emotion categories, which provide better interactive experiences for users and show the importance and necessity of emotion estimation in human-computer interactions."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"18362546|206764452": ["In this case, the Histogram of Oriented Gradients (HOG) is one of the preferred descriptors because of its tolerance to illumination changes and noise [27]."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"4997662|2355696": []} +{"28817124|1634674": []} +{"28817124|25699143": []} +{"12384541|1634674": ["In recent years, a large number of researchers have addressed this problem as evidenced by several extended survey papers on this topic [1, 4, 10, 18].", "Current approaches to modeling and recognizing actions of single actors can be classified into one of three major classes: nonparametric, volumetric, and parametric timeseries approaches [18]."]} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"16086791|17516538": []} +{"16086791|205131192": ["Prokop and Reeves [37] proved that Zernike moments are best among multiple invariant moments in terms of overall performance."]} +{"2014969|5401262": ["\u2026cite this article in press as: A. Oikonomo (2009), doi:10.1016/j.imavis.2009.05.010\nThe extraction and quantization of local image and video descriptors for the subsequent creation of visual codebooks is a technique that has proved very effective for image and video retrieval\u2026"]} +{"6264276|6387482": ["In general, existing fusion algorithms can be formed into two categories, namely, feature-level fusion and decision-level fusion [39], [40]."]} +{"6264276|8042572": ["In general, existing fusion algorithms can be formed into two categories, namely, feature-level fusion and decision-level fusion [39], [40]."]} +{"6264276|1634674": ["computer vision for decades, and many efforts have been made in various aspects [1]\u2013[3].", "2226575 plications, such as behavioral biometrics, content-based video analysis, and surveillance [1]\u2013[3]."]} +{"10270124|1634674": ["The long history of automatically recognising gestures from visual or kinematic measurements is reviewed in [23] [32] [31] [2].", "The problems of detecting and recognizing gestures from human body movements captured using videos or 3D skeletal data have been extensively studied in the computer vision and machine learning communities [2, 31, 32, 23]."]} +{"15391916|1634674": ["Typically, a distinction is made between \u2018\u2018action\u2019\u2019 and \u2018\u2018activity\u2019\u2019 [1].", "Action recognition has been extensively studied during the past two decades [1]."]} diff --git a/graph_5571651.jsonl b/edge/graph_14117722.jsonl similarity index 100% rename from graph_5571651.jsonl rename to edge/graph_14117722.jsonl diff --git a/edge/graph_14119643.jsonl b/edge/graph_14119643.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ad012036487fc3622749a26818f1974f744bd86 --- /dev/null +++ b/edge/graph_14119643.jsonl @@ -0,0 +1,6 @@ +{"7807670|14970359": ["A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "The initial model is then refined using a Bayesian network that imposes human body proportions onto the body part size estimates."]} +{"7807670|7788290": ["55], 100 UAm [1], 200 UAm0 [1], 100 LowerArm [0.", "9], 100 Thm [1], 200 Thm0 [1], 100 Calf [1], 100 Cm [1], 200 Cm0 [1], 100 UpperArm [0.", "A reliable motion capture system would be valuable in many applications [1, 2].", "A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "75], 100 LAm [1], 200 LAm0 [1], 100 Torso (\u03bc, \u03c3) = (500, 300) Height [1, 1, 1], 100 Table 3 The parameters used in the Bayesian network shown in Figure 13."]} +{"2375324|7788290": []} +{"7514147|206051485": ["Simple temporal and/or spatial smoothing is often used in the early stage of pre-processing to reduce camera noise and to remove transient environmental noise such as rain and snow captured in outdoor applications."]} +{"7514147|8953108": []} +{"10546858|819377": ["As shown in [30] and [31], during the initial phase of the video processing, this causes a very slow learning of the Bg."]} diff --git a/graph_5583050.jsonl b/edge/graph_14120985.jsonl similarity index 100% rename from graph_5583050.jsonl rename to edge/graph_14120985.jsonl diff --git a/edge/graph_14122909.jsonl b/edge/graph_14122909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d218cdb2229341769ae4571571082017ff6a5cf --- /dev/null +++ b/edge/graph_14122909.jsonl @@ -0,0 +1,7 @@ +{"42400329|53680608": []} +{"19996299|6681074": ["Several methods have been developed for representing shapes [8], [10]."]} +{"19996299|15744805": ["The error of model fitting and image segmentation could be measured with area-based or distance-based metrics [48]."]} +{"5460575|7839197": []} +{"30729523|3102110": ["In fact, data mining consists of several different technical approaches, such as clustering, data summarization, learning classification rules, finding dependency networks, analyzing changes and detecting anomalies, and so on (Shankar et al. 1993; Chen et al. 1996; Mullich et al. 1997; Anand et al. 1997; Cios et al. 1998).", "\u2026of several different technical approaches, such as clustering, data summarization, learning classification rules, finding dependency networks, analyzing changes and detecting anomalies, and so on (Shankar et al. 1993; Chen et al. 1996; Mullich et al. 1997; Anand et al. 1997; Cios et al. 1998)."]} +{"25778742|3102110": []} +{"16177486|192934": []} diff --git a/graph_5592896.jsonl b/edge/graph_14126122.jsonl similarity index 100% rename from graph_5592896.jsonl rename to edge/graph_14126122.jsonl diff --git a/graph_560790.jsonl b/edge/graph_141264.jsonl similarity index 100% rename from graph_560790.jsonl rename to edge/graph_141264.jsonl diff --git a/graph_5612073.jsonl b/edge/graph_14127201.jsonl similarity index 100% rename from graph_5612073.jsonl rename to edge/graph_14127201.jsonl diff --git a/graph_1413177.jsonl b/edge/graph_1413177.jsonl similarity index 100% rename from graph_1413177.jsonl rename to edge/graph_1413177.jsonl diff --git a/edge/graph_14132386.jsonl b/edge/graph_14132386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a026d005356b47e3252f0a35a5d91996d356db6 --- /dev/null +++ b/edge/graph_14132386.jsonl @@ -0,0 +1,5 @@ +{"8596680|1230643": ["A wireless sensor network [ 2 ] consists of many tiny and inexpensive sensor nodes that are distributed over a vast field to obtain sensing data."]} +{"1071507|2835258": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"62559379|1236072": ["Yarvis et al. [9] proposed a three-layer architecture for heterogeneous WSNs.", "Message\nSize (MB)\nPower\nconsumed in\nRandom Selection\nMethod (J/mS)\nPower\nconsumed in\nProposed\nHomogeneous\nSelection\nMethod\n(J/mS)\nMessage\nSize (MB)\nPower\nconsumed\nin Random\nSelection\nMethod\n(J/mS)\nPower\nconsumed in\nProposed\nHomogeneous\nSelection\nMethod\n(J/mS)\n0.01 0.0375 0.021 0.11 0.4125 0.231 0.02 0.075 0.042 0.12 0.45 0.252 0.03 0.1125 0.063 0.13 0.4875 0.273 0.04 0.15 0.084 0.14 0.525 0.294\n0.05 0.1875 0.105 0.15 0.5625 0.315 0.06 0.225 0.126 0.16 0.6 0.336 0.07 0.2625 0.147 0.17 0.6375 0.357 0.08 0.3 0.168 0.18 0.675 0.378 0.09 0.3375 0.189 0.19 0.7125 0.399\n0.1 0.375 0.21 0.2 0.75 0.42\nBattery power being scarce resources of sensors, energy efficiency is one of the main challenges in the design of protocols for WSNs.", "According to the way that data are collected, cluster based WSNs classified into three broad categories namely (i)homogeneous sensor networks, (ii) heterogeneous sensor networks, and (iii) hybrid sensor networks\nIn homogeneous sensor networks, all the sensor nodes and base stations are identical in terms of hardware capability and initial battery power.", "Despite the innumerable applications of WSNs, these networks have several restrictions, e.g., limited energy supply, limited computing power, and limited bandwidth of the wireless links connecting sensor nodes.", "The design of routing protocol in WSNs is influenced by the limited power of sensor nodes that mandates the design of energy-efficient communication protocol with or without security.", "Even with the constraints in terms of energy, processing, transmission range, and bandwidth, routing from a source base station to a destination base station is accomplished by using MANET protocols in hybrid WSNs [11].", "Researchers have devised many protocols for communication, and security in wireless networks life infrastructure based networks, ad-hoc networks, mobile networks etc [2-16]."]} +{"62559379|14441987": ["Hybrid sensor networks can achieve longer lifetime and can also improve the efficiency of data gathering [9-10].", "Researchers have devised many protocols for communication, and security in wireless networks life infrastructure based networks, ad-hoc networks, mobile networks etc [2-16]."]} diff --git a/edge/graph_14133285.jsonl b/edge/graph_14133285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5be1110a5beff7a4ef5a9aa8ab26b7441f31e04e --- /dev/null +++ b/edge/graph_14133285.jsonl @@ -0,0 +1,3 @@ +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"33116194|1230643": []} +{"33116194|14441987": []} diff --git a/graph_5622647.jsonl b/edge/graph_14134186.jsonl similarity index 100% rename from graph_5622647.jsonl rename to edge/graph_14134186.jsonl diff --git a/graph_5626535.jsonl b/edge/graph_14136020.jsonl similarity index 100% rename from graph_5626535.jsonl rename to edge/graph_14136020.jsonl diff --git a/graph_141366.jsonl b/edge/graph_141366.jsonl similarity index 100% rename from graph_141366.jsonl rename to edge/graph_141366.jsonl diff --git a/graph_1413700.jsonl b/edge/graph_1413700.jsonl similarity index 100% rename from graph_1413700.jsonl rename to edge/graph_1413700.jsonl diff --git a/graph_5650180.jsonl b/edge/graph_14139129.jsonl similarity index 100% rename from graph_5650180.jsonl rename to edge/graph_14139129.jsonl diff --git a/graph_5655753.jsonl b/edge/graph_14140377.jsonl similarity index 100% rename from graph_5655753.jsonl rename to edge/graph_14140377.jsonl diff --git a/graph_5660618.jsonl b/edge/graph_141481213.jsonl similarity index 100% rename from graph_5660618.jsonl rename to edge/graph_141481213.jsonl diff --git a/edge/graph_141482165.jsonl b/edge/graph_141482165.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e373e95f7a8cd6fd81f65ce1b50a3054c2765da5 --- /dev/null +++ b/edge/graph_141482165.jsonl @@ -0,0 +1,18 @@ +{"874053|9270553": []} +{"2411113|16514036": []} +{"1091993|17370399": ["A chatbot is a computer program that mimics conversation with users via a chat interface, either text or voice based (Abdul-Kader and Woods, 2015)."]} +{"44104746|4566470": ["I. INTRODUCTION Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason.", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|24855581": ["Deep learning has shown significant potential in approximating and reducing large, complex datasets into highly accurate predictive and transformational output, greatly facilitating human-centered smart systems [25], [98].", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|4884302": ["An alternative to the quality function, the advantage function represents relative state-action values, as opposed to absolute state-action values [19].", "The state-action value function, otherwise known as the quality function, is the source of Q-learning [19], [21].", "The model was tested both in simulated and in real environments, and experiments were conducted to evaluate appropriate model horizons and bootstrapping efficacy, sample efficiency of classification and regression for value versus collision probability predictions, and performance against various double Q-learning approaches.", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "This type of deep learning has been heavily applied to the field of robotics and computer vision [19].", "[169] J. Zhu, Y. Song, D. Jiang, and H. Song, \u2018\u2018A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things,\u2019\u2019 IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2759728.", "The two primary means of reinforcement can be divided between policy search and value function approximation, though hybrids of both have been introduced [19].", "As a seminal work on the application of Q-learning and Deep Q-Networks (DQN), Mnih et al. [93] implemented a DQN to play 49 different Atari 2600 videogames, observing four frames as environment data, extracting the game score as reward, with controller and button combinations encoded as actions.", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning.", "These typically output parameters for a probability distribution, either for continuous or discreet actions, resulting in a stochastic policy [19].", "[21] A. Bonarini, A. Lazaric, F. Montrone, and M. Restelli, \u2018\u2018Reinforcement distribution in fuzzy Q-learning,\u2019\u2019 Fuzzy Sets Syst., vol. 160, no. 10, pp. 1420\u20131443, 2009.", "For example, Zhu et al. [169] implemented stacked auto-encoders (SAEs) to realize Q-learning for transmission scheduling in cognitive IoT relays."]} +{"44104746|3645740": ["Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|31245252": [", network congestion and latency are only going to increase without a diverse array of complementary solutions [80], [82], [125], [127], [143], [147], [148], [161].", "With the unceasing growth of IoT and smart-world systems driven by the advance of CPS, in which all devices are network connected and able to communicate sensed data and monitor physical objects, larger and larger datasets are becoming available for the application of deep learning, poised to materially impact our daily lives [36], [81], [82], [89], [91], [143], [144], [161].", "Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151].", "[58], [80], [82], [94], [125], [127], [143], [145], [147], [148], [161], [165].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|2829149": ["Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151]."]} +{"44104746|3818445": ["Securing the data, operation, and mechanisms of deep learning are all the more relevant in considering edge computing, which can be a viable computing infrastructure to provision deep learning schemes [155], supporting a variety of smart-world systems (smart cities, smart manufacturing, smart grid, smart transportation, and many others).", ") are also forthcoming [13], [155], [157].", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"49665108|10175374": ["In this way, information coming from related tasks is ignored, which might help HAR models do better [27]."]} +{"4400132|1734833": [", by using commercial devices like the FitBit), has led researchers to explore new ways for collecting [13], structuring [14,15], visualizing [16,17], prompting [18,19], and using [20] personal data."]} +{"11801048|20905429": ["\u2026work has reported a global accuracy around 89% when classifying calm and distress condition, other works based on electrodermal activity as reported in very interesting reviews on wearable sensors for remote health monitoring [37\u201339], state stress detection rates ranging from 75% to 95% [40\u201343]."]} +{"17659954|17221751": ["Facial expression analysis Measurement and interpretation of facial expressions (Zeng et al. 2009; Sariyanidi et al. 2015)", "\u20262007; Kleinsmith and Bianchi-Berthouze 2013) Facial expression analysis Measurement and interpretation of facial expressions (Zeng et al. 2009; Sariyanidi et al. 2015) Facial recognition Recognition of human faces, including if background clutter and variable image quality (Zhao et al. 2003;\u2026"]} +{"17659954|1734833": ["Finally, there was no discussion of automation bias (unthinking reliance on technology) in relation to patient monitoring, which may be of concern given the quality of many sensors used in smartphones and wearables (Puentes et al. 2013; Baig and Gholamhosseini 2013; Banaee et al. 2013; Burns et al. 2011; Meltzer et al. 2015; Goode 2016).", "\u2026bias (unthinking reliance on technology) in relation to patient monitoring, which may be of concern given the quality of many sensors used in smartphones and wearables (Puentes et al. 2013; Baig and Gholamhosseini 2013; Banaee et al. 2013; Burns et al. 2011; Meltzer et al. 2015; Goode 2016)."]} +{"17659954|5401262": ["With the coming of the Internet of Things, the next evolutionary step in computing is widely seen as computers reading human emotions (Pantic et al. 2007; Zeng et al. 2009; Cambria 2016).", "\u2026and devices, there will be human-centered artificial intelligence-based cognitive assistants that understand natural language, read emotions from facial expressions, voice and text, and become essential helpers throughout the day (Pantic et al. 2007; Ebling 2016; Google 2016b; Lardinois 2016).", "The recognition of emotion will be based on be multimodal, context-dependent systems, including facial expression and voice data (Pantic et al. 2007; Zeng et al. 2009) (Table 2)."]} +{"17659954|192934": ["Pattern recognition Automated recognition, description, and classification of patterns, often involving statistical classification and neural networks (Jain et al. 2000)", "\u2026recognition Automated recognition, description, and classification of patterns, often involving statistical classification and neural networks (Jain et al. 2000) Sensors Identification of emotion using physiological signals such as heart rate, breathing, skin conduction, physical activity\u2026"]} +{"53399785|18599847": ["Convolutional neural networks (CNN) are a widely used deep learning al-gorithm which performs especially well for images input data, although they are now increasingly applied in time series data including human physiological data and \ufb01nancial data [42, 21]."]} diff --git a/edge/graph_14148579.jsonl b/edge/graph_14148579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79f50a1013558121b1380c394cc62ba056402e71 --- /dev/null +++ b/edge/graph_14148579.jsonl @@ -0,0 +1,5 @@ +{"5810491|3330313": ["An extensive survey of anomaly detection methods using machine learning approaches is provided by Hodge and Austin [14]."]} +{"114406131|4449": ["For instance, educational institutions, educators, and individual learners may be deeply concerned about the growing threats to data security and privacy [7-8], given that in most cases learners are allowed to use their own mobile devices to access m-learning services and resources."]} +{"114406131|17756238": ["For these challenges one can find peripheral literature such as [65] for challenge #3, [66-68] for #4, and [22-24] for #9, but for the time being no work addresses them specifically for m-learning.", "Such concerns have already started to attract attention in the general literature [21-24], but as discussed further in the next section have not been yet addressed specifically for u-learning."]} +{"63968369|14736029": ["Most analysts have assumed that electronic markets would come to dominate the e-business landscape (18)."]} +{"6136436|3102110": ["[31] ."]} diff --git a/edge/graph_14148655.jsonl b/edge/graph_14148655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0250c103960ef1207f7451fa9142f12216c5aca --- /dev/null +++ b/edge/graph_14148655.jsonl @@ -0,0 +1,3 @@ +{"8996665|7919236": ["Pu et al. (2012) provides a more detailed review of preference elicitation and refinement research to improve recommender system user experience.", "Pu et al. (2012) provides a more detailed review of preference elicitation and refinement research to"]} +{"8996665|17756238": []} +{"8996665|14148655": ["The FindMe systems spawned a wide range of more interactive, exploratory recommender systems, including many of the systems now known as critiquing-based systems (Chen and Pu 2012).", "recommender systems, including many of the systems now known as critiquing-based systems (Chen and Pu 2012)."]} diff --git a/edge/graph_14155142.jsonl b/edge/graph_14155142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37ca28f55629738c466146b58ee16e86ea6d7d01 --- /dev/null +++ b/edge/graph_14155142.jsonl @@ -0,0 +1,19 @@ +{"3450434|6857179": ["Moreover, many studies focus on continous emotions [21,42] (assigning an intensity level of recognition) and the recognition of action units [47]."]} +{"2355696|1029120": ["Also automatic posture recognition has been addressed in few works, mostly aiming at surveillance [57] and activity recognition [206] (See [54][116][153] for extensive overviews of the past work in the field)."]} +{"2355696|5401262": ["Although the importance of social signals in everyday life situations is evident, and in spite of recent advances in machine analysis and synthesis of relevant behavioural cues like gaze exchange, blinks, smiles, head nods, crossed arms, laughter, and similar [137][138], the research efforts in machine analysis and synthesis of human social signals like attention, empathy, politeness, flirting, (dis)agreement, etc.", ", general-purpose W4 technology does not exist yet [138][137]), answering the why and how questions in a W4-context-sensitive manner when analysing human behaviour is virtually unexplored area of research."]} +{"2355696|8777381": ["The prosody conveys a wide spectrum of socially relevant cues: emotions like anger or fear are often accompanied by energy bursts in voice (shouts) [168], the pitch influences the perception of dominance and extroversion (in general it is a personality marker [167]), the speaking fluency (typically corresponding to high rythm and lack of hesitations) increases the perception of competence and results into higher persuasiveness [167]."]} +{"2355696|14970359": ["train stations or streets) [62][115]."]} +{"2355696|9045232": ["sis [199] (see [81][215] for extensive surveys on face detection techniques)."]} +{"2355696|7788290": []} +{"19033070|7360895": ["In general, a social robot is an autonomous agent that can act in a socially appropriate manner based on its role in an interaction [16, 21], such as interacting with a child with ASD."]} +{"2705346|14405917": []} +{"2705346|1452734": []} +{"18796637|7360895": ["One subarea of robotics, termed social robotics, involves robots that engage in some form of social interaction with humans, through speech, gestures, or other media (18, 19)."]} +{"7360895|7185733": ["Two excellent overviews of vision-based gesture recognition are [124,166].", "[124] V."]} +{"7360895|7788290": ["A broad survey of human tracking is presented in [ 66 ].", "Passive sensors, such as CCD cameras, are cheap, require minimal infrastructure, and can be used for a wide range of perception tasks [2,36, 66 ,118]."]} +{"15430001|2355696": []} +{"14405917|2355696": ["First,\nwe present definitions and functions of synchrony in youth and adulthood."]} +{"179325|7360895": ["first efforts towards having socially assistive robotic systems for the elderly have been focused towards constructing robot-pet companions aimed at reducing stress and depression [5, 11]."]} +{"21758081|2355696": ["Hidden Markov models, boosting, Bayesian classifiers, and support vector machines, fed with both audio and video features, are the most common techniques applied also to detectroles(see[ 6 ]and[10]forasurvey).However,theseworks do not address the subtler aspects of social interaction such as emotional contagion and empathy.", "Current research on social interaction (e.g., see [ 6 ] and the"]} +{"14011095|14405917": ["Being able to automatically assess imitation between social partners (including agents) is required for developing socially intelligent robots [6, 1].", "Here, imitation is considered as a communicative act allowing to sustain interaction [1].", "Interpersonal dynamics, usually termed interpersonal synchrony [1] is a very complex phenomenon including various concepts such as imitation, mimicking, turn-taking...", "Face-to-face interactions are considered as highly dynamic processes [1, 2] based on multimodal exchanges such as turn-taking, backchannels (e.g, head nod, \ufb01lled pauses...)."]} +{"14011095|1634674": ["In the last few years, many researches have emerged in this domain as described in numerous reviews [17], [18], [19]."]} diff --git a/graph_567127.jsonl b/edge/graph_14156424.jsonl similarity index 100% rename from graph_567127.jsonl rename to edge/graph_14156424.jsonl diff --git a/edge/graph_14159066.jsonl b/edge/graph_14159066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94755e7aa25b221f570f0c9bfc685963642c5638 --- /dev/null +++ b/edge/graph_14159066.jsonl @@ -0,0 +1,5 @@ +{"16419613|1110872": []} +{"6480408|14441987": ["Ad hoc wireless networks [ 1 ,2] are envisioned as an infrastructure-less networks where each node is a mobile router, equipped with a wireless transceiver."]} +{"18736710|1110872": ["For more information about TCP, please refer to Ref. [ 6 ] and the references therein."]} +{"3070805|141053": ["Moreover, let PA and PD denote the initial transmission power for node A and D and we assume that PA = PD and the same transmission rate r[2] is adopted for both senders.", "Let r[1], r[2] and r[3] denote the available transmission rates with SINR thresholds SINRth[1], SINRth[2] and SINRth[3] respectively.", "Here, the increase in interference at node C from the increase in transmission power of node A, does not make the SINR value at node C fall below SINRth[2].", "Thus, recently the development of efficient MAC protocols for multihop ad-hoc networks has been the focus of extensive research [2], [3], [4].", "With transmission power control, node A can increase its transmission power PA up to the an appropriate value, P \u2032 A, where it sustains a higher data rate r[3] with SINR threshold SINRth[3], while not disturbing the other concurrent transmission from D to C with data rate r[2].", "With transmission power control, node A can increase its transmission power PA up to the an appropriate value, P \u2032A, where it sustains a higher data rate r[3] with SINR threshold SINRth[3], while not disturbing the other concurrent transmission from D to C with data rate r[2]."]} +{"3070805|11979239": ["It is to be noted that there have been several attempts to design MAC protocols and appropriate methods to solve the above problems; we refer the reader to [105], [3], [106], [107], [108], [109], [110], [111], [112], [103], [113] for such proposals."]} diff --git a/graph_5701967.jsonl b/edge/graph_14159611.jsonl similarity index 100% rename from graph_5701967.jsonl rename to edge/graph_14159611.jsonl diff --git a/graph_141637.jsonl b/edge/graph_141637.jsonl similarity index 100% rename from graph_141637.jsonl rename to edge/graph_141637.jsonl diff --git a/edge/graph_14164279.jsonl b/edge/graph_14164279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9be78b59edecf260ea7d80fc70504967d2674d46 --- /dev/null +++ b/edge/graph_14164279.jsonl @@ -0,0 +1,15 @@ +{"7288584|17069874": ["(16) As in the 2-D case, take the real part of \u03c8(x, y, z) to get an oriented real 3-D wavelet: Real Part{\u03c8(x, y, z)} = \u03c8h(x)\u03c8h(y)\u03c8h(z) \u2212 \u03c8g(x)\u03c8g(y)\u03c8h(z) \u2212 \u03c8g(x)\u03c8h(y)\u03c8g(z) \u2212 \u03c8h(x)\u03c8g(y)\u03c8g(z)."]} +{"7311180|7439310": ["Clearly, error concealment techniques can be applied to improve the reconstruction quality, by essentially interpolating the missing blocks from surrounding received blocks [17]."]} +{"12323675|387610": ["Image Tiling The term \u201ctiling\u201d refers to the partition of the original (source) image into rectangular nonoverlapping blocks (tiles), which are compressed independently, as though they were entirely distinct images [ 13 ], [24], [38], [39], [48], [63]."]} +{"5117836|387610": []} +{"18198644|3540699": []} +{"17237878|7439310": []} +{"2233231|14545307": []} +{"18567902|17428811": ["However, in this case, scalability is obtained by substantially modifying the encoding algorithm, and this results in an increase in complexity and a decrease of quality for a given bit rate [6].", "In [6], Li deeply investigated this problem, in the general case and more specifically for MPEG-4 fine grain scalability (FGS)."]} +{"17082642|9020157": ["The lifting [2], [3] implementation of these subband coding schemes ensures a low complexity thus being the most widely adopted approach to 3-"]} +{"16373408|387610": ["Several excellent review papers about JPEG 2000 Part 1 have recently appeared in the literature [3, 13 ,16,18,27,37], and a comprehensive book describing all of the technical aspects of the standard has been published [45]."]} +{"31310427|15261053": ["Herein we utilize a typical hierarchical block-matching scheme (see [ 23 ] or [24]) to estimate pixel displacements (motion vectors) between successive frames in the sequence."]} +{"12481215|387610": ["The coder used thereafter is a context based arithmetic coder [27] from the JPEG2000 [46], [47] standard."]} +{"11631634|387610": ["Below this bit rate, the orientation selection rule of the decoder starts to deviate from that of the encoder at arbitrary image locations."]} +{"10622311|9307657": ["The use of vector quantization to encode image subbands is quite common [13] and has its rationale in the well-known principle of information theory which states that it is always possible to improve the encoding performance by quantizing vectors (blocks of samples) instead of scalars.", "Although no claim of optimality can be made for the WT, it is no doubt a powerful tool for signal processing in general and image coding in particular [12], [13].", "These properties (among the others) motivate an intense research on wavelet transform (WT) in the image coding field [13], also with reference to multispectral images (e."]} +{"14967640|3540699": ["The efficiency of coupling MCP and WT lies in correctly resolving the phase uncertainty of wavelet coefficients for phase carries critical information about motion accuracy."]} diff --git a/edge/graph_14164493.jsonl b/edge/graph_14164493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00f19497abfc387c427c015f21760ec8d27529ae --- /dev/null +++ b/edge/graph_14164493.jsonl @@ -0,0 +1 @@ +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} diff --git a/edge/graph_14166294.jsonl b/edge/graph_14166294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e82715bfccc54c27dfe1dbe6c2e6c982e189de93 --- /dev/null +++ b/edge/graph_14166294.jsonl @@ -0,0 +1,7 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"62159629|27317885": ["[22] MS 2."]} +{"4378525|32856349": ["Costa et al. [8] have identi\ufb01ed models and tools for supporting the GSD through a systematic literature review and found that since 2000 the number of studies on GSD has signi\ufb01cantly increased."]} +{"4378525|11139156": ["Hossain et al. [14] have conducted a systematic literature review that reports the use of Scrum practices in GSD projects.", "However, like other researchers of SLR this is not a systematic omission [14]."]} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} +{"56547299|627405": ["Researchers have also reported best practise and experiences of conducting and reporting systematic reviews [4, 8, 24, 2].", "\u2026of this research methodology, researchers have also been working for providing methodological support and reporting their experiences and lessons learned as is evident from the guidelines for performing systematic reviews in SE reported in [15, 3] and lessons learned reported in [4, 24, 8].", "It has been widely reported that the current SE speci\ufb01c bibliographic databases are not designed to facilitate systematic reviews [4, 8, 24]."]} diff --git a/graph_5707431.jsonl b/edge/graph_141676.jsonl similarity index 100% rename from graph_5707431.jsonl rename to edge/graph_141676.jsonl diff --git a/edge/graph_14170176.jsonl b/edge/graph_14170176.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68b612f5b7139a475d875edb6344dffcd56c9a69 --- /dev/null +++ b/edge/graph_14170176.jsonl @@ -0,0 +1,4 @@ +{"7620529|8777381": []} +{"15318804|5401262": ["Recent advances \nin automated facial expression measurement open up the possibility of automatically differentiating posed \nfrom real pain using computer vision systems (e.g. Bartlett et al., 2006; Littlewort et al., 2006; Cohn \n& Schmidt, 2004; Pantic et al., 2006).", "Subcortically initiated facial \nexpressions (the spontaneous group) are characterized by synchronized, smooth, symmetrical, consistent, \nand reflex-like facial muscle movements whereas cortically initiated facial expressions (posed expressions) \nare subject to volitional real-time control and tend to be less smooth, with more variable dynamics (Rinn, \n1984; Frank, Ekman, & Friesen, 1993; Schmidt, Cohn & Tian, 2003; Cohn & Schmidt, 2004).", "(1), mouth open and jaw drop (25 and 26), cheek raise (6), lip raise (10), fear brow (1+2+4), nose wrinkle (9), mouth stretch (20), and lower lid raise (7).", "[2] \nCohn, J.F. & Schmidt, K.L. (2004)."]} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} +{"16748301|5401262": ["In the past several years, significant progress has been made in the machine learning to automatically recognize facial expressions related to emotion [6, 7]."]} diff --git a/graph_576581.jsonl b/edge/graph_14171067.jsonl similarity index 100% rename from graph_576581.jsonl rename to edge/graph_14171067.jsonl diff --git a/edge/graph_14173470.jsonl b/edge/graph_14173470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d6f44ac0bffdfadd1f25d0c2daf1ed238c339088 --- /dev/null +++ b/edge/graph_14173470.jsonl @@ -0,0 +1,7 @@ +{"12237313|11013798": ["Fault ? error ? failure chain A fault is a flaw in the system that can cause an error [9] [10]."]} +{"12237313|1230643": ["The third contributor is energy-constrained networks, exemplified by wireless sensor networks [39], in which nodes that have drained their battery can no longer contribute to network connectivity [40,41]."]} +{"12237313|1991786": []} +{"1521488|2623404": []} +{"1521488|10693567": ["Similarly, in case of new flows, if an OpenFlow switch receives a packet that does not match any forwarding rule, its first 200 bytes are next sent to the controller to initiate path computations, and installation of the respective switching rules (which can be also time-consuming [96]).", "The controller, being a dedicated software program designed to provide manipulation of the flow tables of switches, has a network-wide knowledge of a communication system [96].", "Data plane resilience [96] Explanation of time-consuming communications with the controller to provide forwarding rules of new flows", "The former solution being a single physical entity to manage all forwarding devices is, however, characterized by limited resilience capabilities due to representing a single point of failure, as well as reduced scalability [96]."]} +{"1521488|10559330": ["Behind this consideration, one can draw a parallel with the IntServ [62] / RSVP [63] protocol design: by driving routing decisions out of the network topology alone, RSVP provided no means to prevent the most impacting effect of shortest path routing: hyperaggregation while exacerbating memory scaling limits of \u201cshortest-path\u201d routing.", "To close the loop of our analysis, as IntServ parameters alone were unable to deliver proper routing metrics and decisions, if name spaces (and the entities / objects they relate to) are not associated to proper distance metrics, they will also be unable to provide proper routing decisions.", "One could thus characterize this second generation by its aim to reconcile Webcontent services with IntServ [62] / Resource Reservation Protocol (RSVP) [63] principles."]} +{"14936883|1991786": ["Real communication networks are complex multilevel graphs [62,101,132]."]} diff --git a/edge/graph_14173838.jsonl b/edge/graph_14173838.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da2ab627b02c1217669c8cfe047dac198dcd0e91 --- /dev/null +++ b/edge/graph_14173838.jsonl @@ -0,0 +1,9 @@ +{"7815680|6746689": ["\u2026an adaptive thresholding algorithm [20] to compute the binary image from the input gray scale fingerprint image; (2) use a thinning algorithm [21] [22] to compute the fingerprint skeleton from the binary image; (3) use Rutovitz Crossing Number to extract minutiae from the skeleton of fingerprint\u2026"]} +{"36360661|6746689": ["A comprehensive survey of thinning algorithms is described by Lam et al. [ 4 ]."]} +{"5106238|6746689": ["We compare the executed time of the proposed Wavelet-Based method for thinning the ridges with that of Zou\u2019s method (ZM) [7], Zhang and Suen\u2019s\nmethod (ZSM) [6] , and Principal-curve-based method (PCBA) [16] by testing three fingerprint images which are randomly selected from the database in [1].", "method (ZSM) [6] , and Principal-curve-based method (PCBA) [16] by testing three fingerprint images which are randomly selected from the database in [1].", "Thinned algorithms can be classified into direct and indirect computing methods [6, 7]."]} +{"15589989|192934": ["to find the optimal decision boundaries [9]."]} +{"1649205|6746689": ["A comprehensive survey of thinning algorithms is described by Lam et al [11]."]} +{"38424801|6746689": ["Also, thinning is performed for the binary image [4].", "Thinning is performed for the obtained binary image [4]."]} +{"11434731|192934": ["One can for instance think of K-nearest neighbor, neural networks, and so forth to find the optimal decision boundaries [6]."]} +{"7766270|6746689": []} +{"16905891|1230643": []} diff --git a/edge/graph_14176218.jsonl b/edge/graph_14176218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..054a5e5ac884be420c9b46cadedcf20d4a829e2f --- /dev/null +++ b/edge/graph_14176218.jsonl @@ -0,0 +1,2 @@ +{"6642587|2840272": []} +{"5243489|17323154": ["[10], covers all the latest research on Web clustering."]} diff --git a/graph_582949.jsonl b/edge/graph_1417641.jsonl similarity index 100% rename from graph_582949.jsonl rename to edge/graph_1417641.jsonl diff --git a/graph_1418.jsonl b/edge/graph_1418.jsonl similarity index 100% rename from graph_1418.jsonl rename to edge/graph_1418.jsonl diff --git a/edge/graph_14180522.jsonl b/edge/graph_14180522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1565aa2811b6da188917b009108b9209cec2e99e --- /dev/null +++ b/edge/graph_14180522.jsonl @@ -0,0 +1 @@ +{"18623340|14180522": []} diff --git a/edge/graph_14182363.jsonl b/edge/graph_14182363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b86e9d51482ede7ed03cac11219ee88cf0a8c06a --- /dev/null +++ b/edge/graph_14182363.jsonl @@ -0,0 +1,2 @@ +{"2465022|2835258": []} +{"60468427|870434": ["Applications of DTNs include large-scale disaster recovery networks, sensor networks for ecological monitoring [36], ocean sensor networks [28, 24], vehicular networks [26, 6], and projects such as TIER [2], Digital Study Hall [15], and One Laptop Per Child [1] to benefit developing nations."]} diff --git a/edge/graph_14182694.jsonl b/edge/graph_14182694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51268ef2191141215a847d8ddfc049b5e4637f56 --- /dev/null +++ b/edge/graph_14182694.jsonl @@ -0,0 +1,9 @@ +{"9436861|17779575": ["For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|165863": ["; Mittal and Vetter 2015].", "CPU versus GPU debate [Gregg and Hazelwood 2011; Lee et al. 2010; Mittal and Vetter 2015; Vuduc et al. 2010] toward a CPU and GPU paradigm where the best features of both can be intelligently combined to achieve even further computational gains."]} +{"9436861|13037420": ["However , mobile systems also impose very stringent cost and power budgets [Mittal 2014c].", "For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|12904520": []} +{"14583671|13037420": []} +{"15411200|14583671": []} +{"15411200|17779575": []} +{"15411200|13037420": []} +{"165863|12904520": ["Due to these trends, in recent years, the energy cost of high-performance computing clusters has been estimated to contribute more than the hardware acquisition cost of IT equipment itself [Bianchini and Rajamony 2004; Mittal 2012]."]} diff --git a/graph_585363.jsonl b/edge/graph_14183608.jsonl similarity index 100% rename from graph_585363.jsonl rename to edge/graph_14183608.jsonl diff --git a/graph_594415.jsonl b/edge/graph_14186351.jsonl similarity index 100% rename from graph_594415.jsonl rename to edge/graph_14186351.jsonl diff --git a/edge/graph_14186660.jsonl b/edge/graph_14186660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d2aa4aebfa5643bb2e4edeac86b04f168aa4fca --- /dev/null +++ b/edge/graph_14186660.jsonl @@ -0,0 +1,2 @@ +{"564263|2809360": ["Each discovered named entity belongs to one of the dictionary semantic types and has attributes for (1) the text span associated with the named entity (\u2018span\u2019 attribute), (2) the terminology/ontology code the named entity maps to (\u2018concept\u2019 attribute), (3) whether the named entity is negated (\u2018negation\u2019 attribute), and (4) the status associated with the named entity with a value of current, history of, family history of, possible (\u2018status\u2019 attribute).", "There are several major sources of errors: (1) sentences starting with titles, especially \u2018Dr \u2019 and \u2018Mr \u2019; (2) sentences", "One set was additionally split into three subsets: (1) for developing the guidelines (150 sentences), (2) for training (400 sentences), and (3) for measuring IAA (200 sentences).", "We did not separately evaluate the off-the-shelf normalizer, which is used to improve the recall defined in equation (2) of the NER annotator.", "Global evaluation and applications We have conducted global evaluations of cTAKES for two largescale phenotype-extraction studies: (1) ascertaining cardiovascular risk factors for a case-control study of peripheral arterial disease using the EMR within the eMERGE(66) and (2) treatment classification for a pharmacogenomics breast cancer treatment study within the PGRN.", "recall 1\u20444 TruePositives TruePositives \u00fe FalseNegatives (2)"]} +{"13197166|2809360": ["Methods and resources to automatically extract clinical information from documents in the EHR have been evaluated by several groups, as described by Meystre et al 5 and Uzuner et al ."]} diff --git a/edge/graph_14191476.jsonl b/edge/graph_14191476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4d0574bebf3695e48be08918564042130fd59f7 --- /dev/null +++ b/edge/graph_14191476.jsonl @@ -0,0 +1,10 @@ +{"7807961|1940388": ["Following table 3 shows the comparative chart for security evaluation for the broad key management schemes[20-21]."]} +{"1973443|17205659": ["Therefore, it is extremely difficult to develop and implement security solution that would be sufficiently adaptable and satisfying for all possible WSN application scenarios [4-6]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"8370601|9176080": []} +{"8370601|15247126": ["Ahsan and Kundur presented two novel approaches that exploit the redundancy in the IPv4 header of the TCP/IP protocol suite to convey the secret message over the communication channel without detection [21], [22], [23], [24]."]} +{"12441264|38476": []} diff --git a/edge/graph_14193005.jsonl b/edge/graph_14193005.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7104792db51f18ea830d3a0ea1b1a15cf3d0cdbb --- /dev/null +++ b/edge/graph_14193005.jsonl @@ -0,0 +1,2 @@ +{"62536191|34621298": []} +{"109090903|7158350": ["For comprehensive review of neural networks, see Zhang (2000)."]} diff --git a/edge/graph_14193725.jsonl b/edge/graph_14193725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04462a9a72750a3c917d5f6a65c906cbe3090b18 --- /dev/null +++ b/edge/graph_14193725.jsonl @@ -0,0 +1,2 @@ +{"8406601|1230643": ["Other challenges relate to implementing the desired sensor network behavior, such as coordinated sensing of events and mobile code that be transmitted easily to another node and run immediately [13]."]} +{"270456|2000518": ["Besides multi-monitor systems, MDEs are also widespread in specialized contexts such as control rooms, audio-video production facilities, and smart offices in research labs [Johanson et al., 2001; Ni et al., 2006; Nunamaker et al., 1991; Rekimoto and Saitoh, 1999; Tandler et al., 2001; Wigdor et al, 2006; Wigdor et al, 2009]."]} diff --git a/edge/graph_14194092.jsonl b/edge/graph_14194092.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a32558d855d9a5b8ffbe0274e0b1d7a9c2fc7c3a --- /dev/null +++ b/edge/graph_14194092.jsonl @@ -0,0 +1,2 @@ +{"1367241|2357830": ["Some cautionary notes are in order, however: RFID tags do not have a single, definitive read range [23]."]} +{"14078866|2357830": ["[3, 4], but at the same time there are several examples, including comprehensive industrial and government guidelines, of"]} diff --git a/edge/graph_14201195.jsonl b/edge/graph_14201195.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2298cdb050798527e7ba4163aadada8af1c72c41 --- /dev/null +++ b/edge/graph_14201195.jsonl @@ -0,0 +1,3 @@ +{"16780755|954543": []} +{"30540746|14415030": ["Most often the following image properties are considered as image segments homogeneity, compactness, density, statistical properties, shape exactness with a great deal of specialized frameworks such as fuzzy properties, rough properties [8], [20]."]} +{"37992065|191396": []} diff --git a/graph_599958.jsonl b/edge/graph_14202611.jsonl similarity index 100% rename from graph_599958.jsonl rename to edge/graph_14202611.jsonl diff --git a/graph_1420330.jsonl b/edge/graph_1420330.jsonl similarity index 100% rename from graph_1420330.jsonl rename to edge/graph_1420330.jsonl diff --git a/edge/graph_14203403.jsonl b/edge/graph_14203403.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2409838c40f95a930e5e8663d9cbf57794fcee6d --- /dev/null +++ b/edge/graph_14203403.jsonl @@ -0,0 +1,11 @@ +{"206465713|33286487": []} +{"14572896|33286487": ["The presented approach can be generalized to the kernels from the Cohen class of time\u2013frequency representations [5,6,8]", "The aim of reduced interference distributions from the Cohen class [5,6,8] is to 9nd optimal representations that would significantly decrease the cross-terms without degrading the auto-terms."]} +{"29757211|33286487": []} +{"1648098|33286487": []} +{"29671548|33286487": []} +{"11927063|33286487": []} +{"117282492|33286487": []} +{"5321322|33286487": []} +{"14793409|33286487": []} +{"110440926|33286487": []} +{"11148644|33286487": ["which is also employed in the study of the Cohen class [20], [19].", "The Wigner distribution W,(t, f ) of a signal 2 can be defined in terms of the time-domain representation of that signal x ( t ) as [19], [20] W,(t, f ) = Im x( t + t / / 2 ) x * ( t - t\u2019/2)e-2Tift\u2019 dt\u2019."]} diff --git a/edge/graph_14205872.jsonl b/edge/graph_14205872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00b6e223091dfb000b00fda8c913869c3fd01f46 --- /dev/null +++ b/edge/graph_14205872.jsonl @@ -0,0 +1,2 @@ +{"13128327|239537": []} +{"6809024|239537": ["GRAPH visualization is an important component of VisualAnalytics that can be used in a variety of applications from engineering to sociology to biology.", "\u00c7", "However, it is notoriously difficult to generate a good overview of large graphs."]} diff --git a/graph_60515.jsonl b/edge/graph_14208503.jsonl similarity index 100% rename from graph_60515.jsonl rename to edge/graph_14208503.jsonl diff --git a/edge/graph_14208903.jsonl b/edge/graph_14208903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..429f03d911a15b766edce202dc055bb391fb157a --- /dev/null +++ b/edge/graph_14208903.jsonl @@ -0,0 +1,3 @@ +{"6257335|205131192": [", First-Tier) and for higher-order moments, which are known to be sensitive to noise [45].", "The simplest approach of this type is to evaluate distances between feature vectors [22] in a multidimensional space where the axes encode global geometric properties, such as circularity, eccentricity, or algebraic moments [45, 53]."]} +{"8346174|205131192": []} +{"14561665|205131192": ["In this case, the moments produce minimal information redundancy [38].", "Examples of later methods include various Fourier [25, 26, 27, 28, 29] and moment-based [35, 36, 37, 38] procedures for shape analysis.", "Examples of global methods include the medial axis (also called symmetric axis) transform (MAT) proposed by Blum and described in [30, 31, 32, 17, 33, 34, 20, 22], moment based approaches [35, 36, 37, 38], and methods of shape decomposition into other primitive shapes [39, 40, 41, 42].", "Recent surveys of the field were written by Prokop and Reeves(38) and Weiss,(159) who take a more general approach.", "Recent surveys of the eld were written by Prokop and Reeves [38], and Weiss [159], who takes a more general approach."]} diff --git a/graph_1420935.jsonl b/edge/graph_1420935.jsonl similarity index 100% rename from graph_1420935.jsonl rename to edge/graph_1420935.jsonl diff --git a/graph_614770.jsonl b/edge/graph_14210987.jsonl similarity index 100% rename from graph_614770.jsonl rename to edge/graph_14210987.jsonl diff --git a/graph_617887.jsonl b/edge/graph_14211043.jsonl similarity index 100% rename from graph_617887.jsonl rename to edge/graph_14211043.jsonl diff --git a/graph_624120.jsonl b/edge/graph_14212858.jsonl similarity index 100% rename from graph_624120.jsonl rename to edge/graph_14212858.jsonl diff --git a/graph_627405.jsonl b/edge/graph_14212995.jsonl similarity index 100% rename from graph_627405.jsonl rename to edge/graph_14212995.jsonl diff --git a/edge/graph_14214758.jsonl b/edge/graph_14214758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65c9838ddd1c882b0ef3f3d3c5e8f17bc4a04466 --- /dev/null +++ b/edge/graph_14214758.jsonl @@ -0,0 +1,2 @@ +{"10564537|17069874": []} +{"221956|53680608": []} diff --git a/edge/graph_14215645.jsonl b/edge/graph_14215645.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e92cdbca04c4901c1be0ca9c30209a5567fdaffc --- /dev/null +++ b/edge/graph_14215645.jsonl @@ -0,0 +1,2 @@ +{"510732|39332633": ["With this design, PSO is highly successful at performing optimizations in continuous space [3, 20]."]} +{"1178921|1708582": ["In the Artificial Intelligence community, problems of this sort are often modeled as Markov Decision Processes [5, 6, 14, 17, 18].", "In order to encourage the robot to perform the tasks that we want, and to do so in a timely manner, a standard objective considered in MDPs is to maximize discounted reward[14, 17, 18]."]} diff --git a/graph_631999.jsonl b/edge/graph_1421946.jsonl similarity index 100% rename from graph_631999.jsonl rename to edge/graph_1421946.jsonl diff --git a/edge/graph_14221868.jsonl b/edge/graph_14221868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..790a93d138ad241159ffa018e09f8bf63cc18385 --- /dev/null +++ b/edge/graph_14221868.jsonl @@ -0,0 +1,3 @@ +{"9377500|8250043": ["In order to manage long-lived WS transactions several standard specifications have been proposed [2,3,4], including Web Service Coordination (WS-COOR) [5], Web Service Atomic Transactions (WS-AT) [6] and Web Service Business Activity (WS-BA) [7]."]} +{"18406662|8250043": ["perspectives, such as collaborative testing architecture, test case generation, distributed test execution, test con \u0304dence and model checking [10]."]} +{"2735862|8250043": ["Despite the fact that the literature presents a number of approaches and techniques on WS testing, there is a lack of research work on testing WS transactions [2]."]} diff --git a/edge/graph_14223090.jsonl b/edge/graph_14223090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c76a8ca471205f1ba67d9106363edacf04273b38 --- /dev/null +++ b/edge/graph_14223090.jsonl @@ -0,0 +1 @@ +{"15194195|14223090": []} diff --git a/graph_633630.jsonl b/edge/graph_14224873.jsonl similarity index 100% rename from graph_633630.jsonl rename to edge/graph_14224873.jsonl diff --git a/edge/graph_14225710.jsonl b/edge/graph_14225710.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f54d271c732179cd268bbc96adef016931b08e2d --- /dev/null +++ b/edge/graph_14225710.jsonl @@ -0,0 +1 @@ +{"201720|38476": ["However, it is well-known that this approach fails to exploit a lot of significant information [5]."]} diff --git a/edge/graph_14228694.jsonl b/edge/graph_14228694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1bf4e2f30908b458c6eafa802ba0388aa67171b --- /dev/null +++ b/edge/graph_14228694.jsonl @@ -0,0 +1 @@ +{"60743240|62204132": []} diff --git a/edge/graph_14229975.jsonl b/edge/graph_14229975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a65d6a1d291fa040c321dbc51121a2affa63da7 --- /dev/null +++ b/edge/graph_14229975.jsonl @@ -0,0 +1,3 @@ +{"108512675|21106824": []} +{"108512675|586521": ["Accordingly, several other research works use machine learning or data mining techniques to make medical science predictions [17\u201320]."]} +{"2569486|627405": ["Hence, the objective of the reported research is to carry out an internal validation of SLR methodology within SE research community."]} diff --git a/edge/graph_14231881.jsonl b/edge/graph_14231881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5dad5e667b4efcc62784f47fabb5a095c6afe7ce --- /dev/null +++ b/edge/graph_14231881.jsonl @@ -0,0 +1,3 @@ +{"30432662|7761990": ["[Color figure can be viewed in the online issue, which is available at wileyonlinelibrary.com.]\nr 1157 r\nrelated activation [Calhoun et al., 2009].", "To obtain TCN priors, NESOI adopts ICA to group brain areas that share response patterns [Beckmann et al., 2005; Calhoun et al., 2009; Chen and Yao, 2004; Hyva\u0308rinen and Oja, 1997].", "In recent years, ICA, a data-driven approach, has been increasingly utilized to examine brain activation [Beckmann et al., 2005; Calhoun et al., 2009; Chen and Yao, 2004].", "In recent years, ICA, a data-driven approach, has been increasingly utilized to examine brain activation [Beckmann et al., 2005; Calhoun et al., 2009; Chen and\nYao, 2004].", "To obtain TCN priors, NESOI adopts ICA to group brain areas that share response patterns [Beckmann et al., 2005; Calhoun et al., 2009; Chen and Yao, 2004; Hyv\u00e4rinen and Oja, 1997]."]} +{"5303478|6116761": ["The following section will not review these methods in detail due to limited space, and recent excellent reviews are available [12] [13] ."]} +{"28298062|7761990": ["ICA is intrinsically a multivariate approach and is particularly useful for data fusion of multiple tasks or data modalities (Calhoun et al., 2009b).", "It may help explain the complex relationships between distributed cerebral sites in the brain and possibly provide new understanding of neurological and psychiatric disorders (Calhoun et al., 2009a; Lei et al., 2011b)."]} diff --git a/edge/graph_14237569.jsonl b/edge/graph_14237569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23e8e6f4a32eb3802cc1c1135bdc9f6805b96748 --- /dev/null +++ b/edge/graph_14237569.jsonl @@ -0,0 +1,5 @@ +{"12527150|913718": ["Major research efforts have also been directed towards tackling some of the barriers to realising the semantic web mentioned in Section 1, and considerable progress has been made in areas such as ontology alignment (reconciling ontologies that describe overlapping domains) [18], ontology extraction (extracting ontologies from, e.", "One such problem is the tradeoff between conflicting requirements for expressive power in the language used for semantic annotations and scalability of the systems used to process them [7]; another is that integrating different ontologies may prove to be at least as hard as integrating the resources that they describe [18]."]} +{"2188414|6952653": ["An agent must therefore also be able to communicate with other agents and the execution environment itself [7, 8]."]} +{"7571713|14205872": ["In addition, systems for visualizing ontologies [34] and methods to analyze ontologies [35] have been developed."]} +{"15992154|386036": []} +{"28333457|10500613": ["[Rahm & Bernstein 2001] E. Rahm and P. A. Bernstein."]} diff --git a/edge/graph_14239778.jsonl b/edge/graph_14239778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e70282df6a366bc8136eef21477209d2ab0560d2 --- /dev/null +++ b/edge/graph_14239778.jsonl @@ -0,0 +1 @@ +{"28569524|16352922": ["Figure 3. 3 Physical layout of our experimgt", "Certainly, the function agents will send control messages to all associated space agents, which take charge of the EAs we want to control. 2.2. 3 Personal Preference Agent", "Based on our previous statement about condition variables and services of function agents, we will now explain how a personal preference agent can take advantage of those designed features and how a control strategy can be guaranteed. One example is shown in Figure 2. 3 ", "3 Experiment 3 .1 Experiment Environment In our experiment, we construct the purposed architecture in the Intelligent Robotics Laboratory in NTU.", "Intouch, and there are some virtual EAs in it. The virtual Figure 3.2 Virtual home 3 .2 System Setup", "Figure 3 .3 Physical layout of our experimgt", "The physical layout of our system is shown in Figure 3. 3 .", "The physical layout of our system is shown in Figure 3 .3.", "In section 3 , the proposed integrated home control architecture is actually implemented.", "The development of information appliances (IA) is a hot topic in the recent years. The definition of IA is in [ 3 ].", "Intouch, and there are some virtual EAs in it. The virtual Figure 3 .2 Virtual home 3.2 System Setup", "Control Architecture Figure 3 .1 Architecture of implementation", "Step 1. Send resource allocation requests to the kemel Step 2. Send control messages Step 3 . Send resource release messages to the kernel Every function agent and personal preference agent has one priority value and these priority values will be compared in step 1 by the resource access right control kernel if necessary.", "Figure 2. 3 An example of making strategy 2.2.4 Resource Access Right Control Kernel", "Generally speaking, once a resource is allocated to some agent, we can not allocate it anymore until step 3 is finished, but there is one exception."]} diff --git a/edge/graph_14239944.jsonl b/edge/graph_14239944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b151a26862762b96ef43a3a88969c5071d2b25d --- /dev/null +++ b/edge/graph_14239944.jsonl @@ -0,0 +1,3 @@ +{"146918|141053": ["Medium access control protocols for wireless networks [30] may be classified into two major categories: contention-based and contention-free MAC.", "Conventional wireless MAC protocols were designed to overcome the challenges of the wireless medium such as hidden terminal problem and exposed terminal problem [30]."]} +{"146918|11979239": ["Although there are a couple of survey papers found in the literature [34]\u2013[36], they are incomplete and outdated."]} +{"1328138|11720829": ["In this section we provide a qualitative discussion of some issues that we consider important in modeling and designing simpler and more effective protocols."]} diff --git a/edge/graph_14240830.jsonl b/edge/graph_14240830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..414570e4a08887c6bb47a6990cf5e4ba205c16eb --- /dev/null +++ b/edge/graph_14240830.jsonl @@ -0,0 +1,4 @@ +{"21628579|8128972": ["Alternatively, field study can be the option prior to the laboratory, which is the actual environment where people will make use of the technology being evaluated [8].", "Based on report in [8], most of the evaluations of educational computer programs have been done in natural setting, for example at the children\u2019s schools or kindergartens.", "Most of the studies with the children report that children feel more at ease and focus in their natural environments such as in schools ([8], [10] and [14])."]} +{"16774799|2532914": ["As a result the question of what is useful and what is perceived problematic from a user perspective has not been adequately addressed (Kjeldskov and Graham, 2003)."]} +{"18865171|8128972": ["Jensen and Skov [ 15 ] found that 67% of the research on interaction design and children applied some sort of systematic field or laboratory evaluations."]} +{"58411238|8128972": []} diff --git a/graph_637717.jsonl b/edge/graph_14240886.jsonl similarity index 100% rename from graph_637717.jsonl rename to edge/graph_14240886.jsonl diff --git a/edge/graph_14242212.jsonl b/edge/graph_14242212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6fedac53191276563098c0e19aefa5b1809110a --- /dev/null +++ b/edge/graph_14242212.jsonl @@ -0,0 +1,2 @@ +{"15673678|14242212": ["O C\n] 5\nF eb"]} +{"119666915|1363053": []} diff --git a/edge/graph_14242763.jsonl b/edge/graph_14242763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2aede9efc6d9849a7547fa8d82608025d40c87c1 --- /dev/null +++ b/edge/graph_14242763.jsonl @@ -0,0 +1,2 @@ +{"5769709|9743176": []} +{"35346514|15164501": []} diff --git a/graph_658495.jsonl b/edge/graph_14245364.jsonl similarity index 100% rename from graph_658495.jsonl rename to edge/graph_14245364.jsonl diff --git a/edge/graph_14247248.jsonl b/edge/graph_14247248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d77f3d1cb0ec8fbc62f1d276a6eb4cfbf5b162e --- /dev/null +++ b/edge/graph_14247248.jsonl @@ -0,0 +1,7 @@ +{"2470516|9932808": ["This TLS problem can be easily solved using the classical solution based on the singular value decomposition (SVD) [8].", "We thus estimate the reciprocity filters in the frequency domain using the SVD-based TLS solution from [8] per subcarrier (cf.", "Strictly speaking, this TLS problem slightly violates the assumption of a standard TLS problem [8].", "We thus estimate the reciprocity filters in the frequency domain using the SVD-based TLS solution from [8] per subcarrier (cf. Section 3.1).", "(8)\nThis TLS problem can be easily solved using the classical solution based on the singular value decomposition (SVD) [8].", "The main part of computation is to find the right singular vectors of a Nc by 2 matrix [\u011d, \u0125] [8], which are also the right eigenvectors of a 2 by 2 matrix [\u011d, \u0125] \u00b7 [\u011d, \u0125]."]} +{"1938671|8909218": ["As our analysis and simulations suggest, the proposed methods significantly outperform existing self calibration methods without requiring additional signaling overhead and can enable TDD reciprocity for calibration of noncolocated networks."]} +{"13554636|11720829": ["Multiple-input multiple-output (MIMO) technology has been a basic approach to improve SE over the past 20 years [4], [5]."]} +{"1655731|8909218": ["wireless networks in the last few decades is associated [1] with cell sizes (that affect interference management schemes) and the amount of available bandwidth, the aforementioned issues become more important."]} +{"2221695|3054454": []} +{"187749|8909218": ["The latter pertains to the use of small cells [3], such that multiple short-range low-power links can co-exist on the same time-frequency channel resource thanks to sufficient spatial separation."]} +{"187749|2459674": ["This is possible by finding an L(1, 1)labeling (see [35] and references therein) of the subgraph (A, E(A)), and associating pilot bursts to the labeling colors."]} diff --git a/graph_667684.jsonl b/edge/graph_14248790.jsonl similarity index 100% rename from graph_667684.jsonl rename to edge/graph_14248790.jsonl diff --git a/edge/graph_14252668.jsonl b/edge/graph_14252668.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9062e38b3f7c8531b584dd199c61becd006feb3 --- /dev/null +++ b/edge/graph_14252668.jsonl @@ -0,0 +1,2 @@ +{"17555088|12823034": ["Most of the methodologies proposed for semantic search [ 1 , 2, 3, 4, 9] consider accessing documents using metadata only and do not consider the cases where metadata is unavailable.", "we selected a form-based approach [ 1 ]), and technical (e.g.", "In [ 1 ] Uren et al classify the approaches according to: keywords-based approaches, view-based approaches, natural language approaches and form-based approaches.", "... edge\u201d) with associated metadata (provenance y z) involving: \ufffb an instance of discoloration \u2013 (discoloration y) \ufffb an instance of component where the provenance text contains the word \u201cblade\u201d (component x) & (provenance-text-contains x \u201cblade\u201d) \ufffb the component is affected by the discoloration (located-on y x) To our knowledge, no other approaches allows such flexibility in qiuerying, as most of them just allow queries based on metadata ...", "triples). Differently from previous literature [ 1 , 2, 3, 4, 9], we consider the issue of working in a complex environment where metadata only partially covers the user information needs."]} +{"1178691|205131192": ["Other shape representations, such as Extended Gaussian Images [38], Spherical Attribute Images [27, 28], moments [68, 84], and wavelets [34], require a priori registration into a canonical coordinate system, which is difficult to achieve robustly.", "The simplest approach represents objects with feature vectors [29] in a multidimensional space where the axes encode global geometric properties, such as circularity, eccentricity, or algebraic moments [68, 84].", "Other shape rep\u00adresentations, such as Extended Gaussian Images [Horn 1984], Spherical Attribute \nImages [Delingette et al. 1992, 1993], moments [Prokop and Reeves 1992; Taubin and Cooper 1992], and \nwavelets [Gain and Scott 1999], require a priori registration into a canonical coordinate system,\u2026", "The simplest approach \nrepre\u00adsents objects with feature vectors [Duda et al. 2001] in a multidimensional space where the axes \nencode global geometric properties, such as circularity, eccentricity, or algebraic moments [Prokop and \nReeves 1992; Taubin and Cooper 1992]."]} diff --git a/graph_677242.jsonl b/edge/graph_14255678.jsonl similarity index 100% rename from graph_677242.jsonl rename to edge/graph_14255678.jsonl diff --git a/edge/graph_14258620.jsonl b/edge/graph_14258620.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..95b058c8b22e7d6310b5db17d148ef9c9405154e --- /dev/null +++ b/edge/graph_14258620.jsonl @@ -0,0 +1,5 @@ +{"2746910|22548642": ["Various computational techniques, especially machine learning algorithms [1], are applied, for example, to select genes or proteins associated with the trait of interest and to classify different types of samples in gene expression of microarrays data [2] or mass spectrometry (MS)-based proteomics data [3], to identify disease associated genes, gene-gene interactions, and gene-environmental interactions from genome wide association (GWA) studies [4], to recognize the regulatory elements in DNA or protein sequences [5], to identify protein-protein interactions [6], or to predict protein structure [7].", "3 The application of ensemble methods to regulatory elements prediction Regulatory elements prediction is a general term that encompasses tasks such as promoter region recognition [5, 65], transcription start sites prediction [66], or glycosylation site and phosphorylation site prediction [67]."]} +{"2746910|11894197": ["This is commonly known as the \u201ccurse-of-dimensionality\u201d [26], and selecting the most relevant features [27, 28] and making the most use of the limited data samples [29] are the key issues in microarray or MS-based proteomics classification problem."]} +{"2746910|17953874": [") with a limited number of samples [25]."]} +{"9928823|393948": ["(2013) extended the recursive neural network to its tensor, in a similar way that the DNN was extended to its tensor version (Yu et al., 2013), and"]} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} diff --git a/graph_700029.jsonl b/edge/graph_14261802.jsonl similarity index 100% rename from graph_700029.jsonl rename to edge/graph_14261802.jsonl diff --git a/edge/graph_14269689.jsonl b/edge/graph_14269689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec70b995aa51e00f267a1e2d1ca7e5a85a105408 --- /dev/null +++ b/edge/graph_14269689.jsonl @@ -0,0 +1,3 @@ +{"14489592|7158350": ["Neural networks have been extensively studied in the literature and an excellent review of the use of feed-forward neural networks for classification is given by Zhang (2000). The inductive learning of neural networks from data is referred to as training this network, and the most popular method of training is back-propagation (Rumelhart and McClelland, 1986)."]} +{"14990917|13227763": []} +{"10204914|11632848": []} diff --git a/graph_700123.jsonl b/edge/graph_14270013.jsonl similarity index 100% rename from graph_700123.jsonl rename to edge/graph_14270013.jsonl diff --git a/edge/graph_14271395.jsonl b/edge/graph_14271395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b26e6348a705fb56d0c9b532e7aa2c2669e1618 --- /dev/null +++ b/edge/graph_14271395.jsonl @@ -0,0 +1,3 @@ +{"10205503|5108469": ["Studying soundness of equational theories is mot vated by the numerous recent works on extending the classical Dolev-Yao result with equations wh ich are intended to capture algebraic properties of cryptographic primitives (see [6] for a survey on such alg ebraic properties)."]} +{"41309048|5108469": ["Indeed, for several years, formal models have considered equational theories like the theory of exclusive OR, abelian groups or homomorphic encryption (for a survey on algebraic properties see for instance [5, 6]) in order to model some cryptographic aspects.", "This simple but important primitive has been largely used in cryptographic constructions such as the One-Time Pad and in protocols (see [6] for examples)."]} +{"665316|2457428": ["We exemplify the use of our soundness theorem in the analysis of group key distribution protocols, like those used in multicast applications [23, 6, 22]."]} diff --git a/edge/graph_14271544.jsonl b/edge/graph_14271544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d48d1352cbcae2de612dc455c21063cd93116e58 --- /dev/null +++ b/edge/graph_14271544.jsonl @@ -0,0 +1,26 @@ +{"1085310|8909218": ["Femtocells [1][2] are short-range, low-cost, low-power cellular base stations that can improve home coverage and increase the capacity for user traffic."]} +{"15498954|1236072": ["[ AKK04 ]. For sensor networks in particular, routing algorithms that have been proposed may be divided into two categories, depending on the network structure adopted, as discussed in Section 2: \u221eat and hierarchical routing algorithms."]} +{"17312258|1588237": ["Traditionally this problem is majorly addressed by carefully planning the spectral resource [1], including conventional frequency planning"]} +{"16721059|12452682": []} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"17975552|2796899": []} +{"18248174|7686677": ["Accordingly, a new research area called \" green cellular networks \" has recently emerged to enable various energy-efficient cellular networks [7], [8]."]} +{"9876634|17109970": ["Naturally, gametheoretic tools have been widely applied over the last decade to study such competitive situations in wireless networks (see [4] and [5] for recent surveys).", "The self-gain coefficients hmm are chosen uniformly at random (from the interval [2, 4]), and so do the cross-gain coefficients hkm (from the interval [0, 2])."]} +{"18920975|3042022": []} +{"1605141|17109970": []} +{"17077357|8909218": ["Another practical motivation comes from the recent interests in femtocell networks, in which consumers can install home base stations (BSs) for better indoor wireless voice and data communications [3]."]} +{"6167535|2833151": []} +{"6167535|8909218": ["The considered model, as will be better explained in the sequel, is general enough to model the uplink of a standard multi-cell wireless data network, an ad-hoc network with multiple peer-to-peer links (the so-called interference channel), and a wireless network equipped with femtocells [26].", "- Uplink of a Multi-cell wireless network with femtocells : Femtocells, also known as home base stations [25, 26, 27], are low-power base stations aimed at indoor coverage of a small number of users."]} +{"55762559|1230643": ["A wireless sensor network (WSN) usually consists of a large number of static sensor nodes that organize themselves into multihop networks [1]."]} +{"18167274|8974063": []} +{"2567110|17109970": [", [2], [1], [6], and [8] for a survey)."]} +{"4208040|5660618": ["such as packet drop and delay, are inevitable issues in developing control policies [7]."]} +{"4208040|1230643": ["deployed for various applications [1]\u2013[3]."]} +{"36900515|1588237": ["Moreover, Algorithms 1 and 2 adopt the 1/1 frequency reuse scheme [24], while Algorithms 3 and 4 consider the traditional 1/3 frequency reuse scheme [24]."]} +{"28378440|8909218": ["R ECENT research shows that more than 50% of voice calls and more than 70% of data traffic are generated indoors [1]."]} +{"41963453|8909218": []} +{"32166332|870434": ["Recently, there has been growing interest in the application of sensor networks in underwater environments to enable and enhance applications such as ocean resource exploration, pollution monitoring, and tactical surveillance [1\u20133]."]} +{"2189123|8909218": ["Moreover, installation of fBSs can share the traffic load of its coexisting macrocell BSs (mBSs) [3]."]} +{"14887600|8909218": ["120959 range, low-power, and low-cost base stations underlaying the macro-cellular network [1], [4]\u2013[6]."]} +{"24023952|8909218": []} +{"5473897|870434": ["Many applications for underwater environments have been made, such as ocean resource exploration, pollution monitoring, and tactical surveillance (Partan et al., 2006)."]} diff --git a/edge/graph_14275189.jsonl b/edge/graph_14275189.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2fa6b0af0fdec2a5e17bdc134c2447985b868fc --- /dev/null +++ b/edge/graph_14275189.jsonl @@ -0,0 +1,2 @@ +{"6870251|41035405": ["Good surveys of the multiuser area may be found in El Gamal and Cover [44] van der Meulen [144] and Berger [12] Traditional noiseless coding theorems and actual codes such as the Huffman codes are not considered in depth because quite good treatments exist in the literature, e."]} +{"15278011|15380857": []} diff --git a/edge/graph_14275950.jsonl b/edge/graph_14275950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f288aac51c03a87a6e68cf26195519459d76d23c --- /dev/null +++ b/edge/graph_14275950.jsonl @@ -0,0 +1 @@ +{"2382334|14275950": ["See a survey of distinct generalizations in [21]."]} diff --git a/edge/graph_14276831.jsonl b/edge/graph_14276831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a570d2a93ba7c0a55dcd0341bb19606390de4c1 --- /dev/null +++ b/edge/graph_14276831.jsonl @@ -0,0 +1,6 @@ +{"14985638|991041": ["The problem tackled in this paper falls under the area of inter-domain multiconstrained routing [11], where multiple constraints such as delay, bandwidth, jitter, and reliability need to be satisfied, with the objective of optimizing metrics such as path cost."]} +{"10666612|18325863": []} +{"62806657|14276831": ["see [17], [12], [6], [18], [19], [20], [21], [7].", ", see [6], [7])."]} +{"745481|18435528": [", probability) that a connection is in the operating state, and seek to find a path pair satisfying minimum availability requirement [18], [19] or a path pair with maximum availability [20]."]} +{"19791887|7064380": []} +{"1626491|1991786": ["ENHANCING QUALITY OF PROTECTION\nAs we have seen from the heuristics in the previous section, the pair of single-failure recovery trees can be constructed by choosing an initial cycle and then adding paths and cycles iteratively until all nodes are covered.", "I. INTRODUCTION\nPROTECTION and restoration in high-speed networks isan important issue that has been studied extensively [1], [6], [7], [13]\u2013[15], [17], [19], [20], [22], [25], [26], [30]\u2013[33]."]} diff --git a/graph_704458.jsonl b/edge/graph_14278575.jsonl similarity index 100% rename from graph_704458.jsonl rename to edge/graph_14278575.jsonl diff --git a/edge/graph_14280572.jsonl b/edge/graph_14280572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6e89276e8d58f16daca19ae2e92905c0191e3c6 --- /dev/null +++ b/edge/graph_14280572.jsonl @@ -0,0 +1 @@ +{"14087197|2795037": ["To this end, query processing involves the phases of translation, optimization and execution, which have been the topic of investigation for many decades, resulting in a broad range of efiective and e\u2010cient techniques (e.g., [ 8 ,25,30])."]} diff --git a/graph_707347.jsonl b/edge/graph_14281756.jsonl similarity index 100% rename from graph_707347.jsonl rename to edge/graph_14281756.jsonl diff --git a/graph_708095.jsonl b/edge/graph_1428199.jsonl similarity index 100% rename from graph_708095.jsonl rename to edge/graph_1428199.jsonl diff --git a/graph_713082.jsonl b/edge/graph_14287498.jsonl similarity index 100% rename from graph_713082.jsonl rename to edge/graph_14287498.jsonl diff --git a/graph_741652.jsonl b/edge/graph_14287707.jsonl similarity index 100% rename from graph_741652.jsonl rename to edge/graph_14287707.jsonl diff --git a/graph_750172.jsonl b/edge/graph_14288295.jsonl similarity index 100% rename from graph_750172.jsonl rename to edge/graph_14288295.jsonl diff --git a/edge/graph_14290416.jsonl b/edge/graph_14290416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33a4002a0d4ca908398714a0304665da549da002 --- /dev/null +++ b/edge/graph_14290416.jsonl @@ -0,0 +1,2 @@ +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} diff --git a/edge/graph_14290834.jsonl b/edge/graph_14290834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f10358c1d38bd28dd5d40d41d32913ec73ab7fae --- /dev/null +++ b/edge/graph_14290834.jsonl @@ -0,0 +1,2 @@ +{"31023537|2457428": ["Undoubtedly, these approaches have two main problems, which consists of security degradation in terms of the backward and forward security [1,5]."]} +{"206770714|2457428": ["They realize revocation by revoking attribute itself using timed rekeying mechanism, which is implemented by setting expiration time on each attribute."]} diff --git a/graph_75696.jsonl b/edge/graph_14294629.jsonl similarity index 100% rename from graph_75696.jsonl rename to edge/graph_14294629.jsonl diff --git a/graph_764622.jsonl b/edge/graph_14295525.jsonl similarity index 100% rename from graph_764622.jsonl rename to edge/graph_14295525.jsonl diff --git a/edge/graph_14295689.jsonl b/edge/graph_14295689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c55b329a998aed1e0946c6914cd7649d24b3ca40 --- /dev/null +++ b/edge/graph_14295689.jsonl @@ -0,0 +1,5 @@ +{"62135570|11810221": []} +{"15508463|11810221": ["\u2026been devoted to the development of performing procedures for scheduling projects under various types of resource constraints (for recent reviews, we refer to Brucker et al. 1999; Demeulemeester and Herroelen 2002; Herroelen et al. 1998a; Herroelen and Leus 2004a, 2005a; Kolisch and Padman 2001).", "Herroelen and Leus (2005b) identify and illuminate popular misconceptions about project scheduling in a resource-constrained environment.", "Exact and suboptimal procedures for generating stable schedules have recently been developed by Leus (2003), Herroelen and Leus (2004b, 2005a), and Leus and Her-roelen (2004)."]} +{"23781309|14295689": []} +{"61547049|54009499": ["Hence, operational production planning including lot-sizing has received much attention in the literature (see the overview by Drexl and Kimms 1997)."]} +{"40696988|14295689": ["While an abundant amount of literature addresses the (single-project) RCPSP (several reviews are available: e.g., Brucker et al., 1999; Hartmann and Briskorn, 2009; Herroelen, 2005; Kolisch and Hartmann, 2005), the single-project approach to solving RCMPSPs has several drawbacks (Chiu and Tsai,\u2026"]} diff --git a/graph_771819.jsonl b/edge/graph_14297493.jsonl similarity index 100% rename from graph_771819.jsonl rename to edge/graph_14297493.jsonl diff --git a/graph_778467.jsonl b/edge/graph_14301906.jsonl similarity index 100% rename from graph_778467.jsonl rename to edge/graph_14301906.jsonl diff --git a/edge/graph_14303607.jsonl b/edge/graph_14303607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..999fb332c8009b93278cab436a18524d043905ce --- /dev/null +++ b/edge/graph_14303607.jsonl @@ -0,0 +1,4 @@ +{"18011207|9045232": ["This template is learned from a set of sample images; for example, estimating the distribution or manifold defining the appearance (pixel map) of the object [31]."]} +{"2591356|7185733": ["For gesture recognition, see Pavlovic et al. [45]."]} +{"2591356|7788290": []} +{"2589832|9045232": ["In general, this is due to the limited information carried by the learned statistical model."]} diff --git a/graph_780365.jsonl b/edge/graph_14307102.jsonl similarity index 100% rename from graph_780365.jsonl rename to edge/graph_14307102.jsonl diff --git a/edge/graph_14311585.jsonl b/edge/graph_14311585.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd7f483a59d6d24a339db57dcd0bbc60166f80a0 --- /dev/null +++ b/edge/graph_14311585.jsonl @@ -0,0 +1,5 @@ +{"60159894|62205927": []} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} +{"12832927|8125630": []} +{"108827917|17120461": ["Moreover, ERP systems require many organizational changes which could impose high risks if the implementations are not thoroughly planned, executed, and managed, as statistics from literature and practice show high rates of implementation failures [7]; [8]; [9]."]} +{"5120196|16403716": []} diff --git a/graph_787899.jsonl b/edge/graph_14311753.jsonl similarity index 100% rename from graph_787899.jsonl rename to edge/graph_14311753.jsonl diff --git a/graph_822353.jsonl b/edge/graph_14314216.jsonl similarity index 100% rename from graph_822353.jsonl rename to edge/graph_14314216.jsonl diff --git a/edge/graph_14314911.jsonl b/edge/graph_14314911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c59a3b3826787f73e0c38c4f15dfe02597995f79 --- /dev/null +++ b/edge/graph_14314911.jsonl @@ -0,0 +1,3 @@ +{"11054628|2616070": ["for image thresholding methods [24], medical image segmentation [25-26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on.", "Figure 2: Original images and the segmentation results by the MST based algorithm [27]."]} +{"11054628|14122909": ["The reviews of various segmentation techniques can be found for image thresholding methods [24], medical image segmentation [25,26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on."]} +{"11054628|8953108": ["The reviews of various segmentation techniques can be found for image thresholding methods [24], medical image segmentation [25,26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on."]} diff --git a/edge/graph_14315321.jsonl b/edge/graph_14315321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..157fedecebe6b1b223c78079bda4b491e6f52457 --- /dev/null +++ b/edge/graph_14315321.jsonl @@ -0,0 +1,2 @@ +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} diff --git a/edge/graph_14315774.jsonl b/edge/graph_14315774.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbbcd3d9515dcc282f662e9c2461a09a7e111cd3 --- /dev/null +++ b/edge/graph_14315774.jsonl @@ -0,0 +1,3 @@ +{"51769686|18418184": []} +{"1844877|192934": []} +{"8846703|18418184": []} diff --git a/graph_1432258.jsonl b/edge/graph_1432258.jsonl similarity index 100% rename from graph_1432258.jsonl rename to edge/graph_1432258.jsonl diff --git a/graph_826064.jsonl b/edge/graph_14322743.jsonl similarity index 100% rename from graph_826064.jsonl rename to edge/graph_14322743.jsonl diff --git a/graph_837447.jsonl b/edge/graph_14323396.jsonl similarity index 100% rename from graph_837447.jsonl rename to edge/graph_14323396.jsonl diff --git a/graph_1432873.jsonl b/edge/graph_1432873.jsonl similarity index 100% rename from graph_1432873.jsonl rename to edge/graph_1432873.jsonl diff --git a/graph_853333.jsonl b/edge/graph_14329101.jsonl similarity index 100% rename from graph_853333.jsonl rename to edge/graph_14329101.jsonl diff --git a/edge/graph_14340163.jsonl b/edge/graph_14340163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3182e4e6cb21402275e0992a05cc517a1938289 --- /dev/null +++ b/edge/graph_14340163.jsonl @@ -0,0 +1,12 @@ +{"16505943|1097238": ["In general, the error patterns of classifiers are used to measure the diversity [7].", "A survey on generating diverse classifiers for ensemble has been conducted by Brown [7].", "Selecting precise and diverse base classifiers is very important in making a good ensemble [7]."]} +{"14843439|6923178": ["Note that N, the total number of instances used for evaluation of the classifier is given by N = TP + FP + FN + TN. Commonly used performance measures include accuracy, correlation coefficient (CC), specificity + , sensitivity + , specificity \u00ff , and sensitivity \u00ff (Baldi et al. 2000).", "We report results obtained with classifiers trained to obtain an optimal correlation coefficient (CC) because CC is a more meaningful measure than specificity or sensitivity for comparing different classifiers (see Materials and Methods; Baldi et al. 2000).", "Thus, it is desirable to consider multiple performance measures collectively to evaluate the performance of a classifier and compare its performance with other classifiers (Baldi et al. 2000; Yan et al. 2004b).", "In the case of data sets in which there is a large difference between the number of instances belonging to the two classes, using accuracy alone to evaluate the classifier can be misleading (Baldi et al. 2000; Yan et al. 2004a,b).", "In experiments not reported here, we did not obtain significant improvement in classifier performance by incorporating sequence conservation information derived from multiple sequence alignments or residue solvent accessibility information derived from known structures of proteins in the training data set (see Materials and Methods; data not shown).", "correlation coefficient (CC), specificity, sensitivity, specificity , and sensitivity (Baldi et al. 2000)."]} +{"26492304|6923178": []} +{"18745004|6923178": []} +{"10866950|6923178": ["As in the case of all discriminative methods [37] , the performance of SVM classification can be measured by the quantity of true positives T P , true negatives T N, false positives F P , false negatives F N, sensitivity SE = T P/(T P + F N), specificity SP = T N/(T N + F P ), the overall accuracy (Q) and Matthews Correlation Coefficient (MCC) [25] are given below: "]} +{"5274573|880321": []} +{"21181609|6923178": ["The quantities of true positives (TP), true negatives (TN), false positives (FP), and false negatives (FN) are often used in the assessment of discriminative methods (Baldi et al., 2000)."]} +{"38720984|6923178": []} +{"21565296|6923178": ["In order to assess the accuracy of the prediction algorithms, the overall accuracy, the sensitivity and specificity for each type of the membrane proteins are calculated [27], and", "[27]; resubstitution test and the jackknife test are denoted as Resub and Jack,"]} +{"24842901|6923178": ["We use the following measures to assess different aspects of the quality of classification: accuracy (ACC), sensitivity (SN), specificity (SP),(6) and correlation coefficient (CC).(24) These measures are defined as follows:"]} +{"18025374|11894197": ["The primary goals of feature selection [62-65] are to gain a more thorough understanding of the underlying processes influencing the data and to identify discriminative and useful features for classification and prediction."]} +{"18025374|6923178": ["For the G-protein coupled receptor, 39 of 484 features were included, and the accuracy of the classification was dramatically improved by feature selection (77.07 to 98.17), as was the AUC (0.69 to 0.984).", "The formula for the AUC of a classifier is as follows: where S 0 = \u2211 r i , r i is the rank of the i th positive sample in the ranked list, n 0 is the number of positive samples, and n 1 is the number of negative samples [74,75].", "By comparing the AUCs averaged over all 11 protein classes, the RF_CFS method was found to outperform the other methods (i.e. 0.995).", "An AUC and MCC of 1 indicate perfect prediction accuracy.", "The larger the AUC, the better is the performance of the model.", "AUC is an effective means of comparing the overall prediction performance of different methods because it provides a single measure of overall threshold-independent accuracy.", "The following measures were used to assess the performance of the classifiers used in this study: accuracy, sensitivity, F-measure, Matthew's correlation coefficient (MCC) [71,72], and the area under the receiver operating characteristic curve (AUC) [42,71].", "For example, the accuracy of transmembrane protein classification improved (79.81 to 97.84) and the AUC increased (0.706 to 0.978).", "Detailed results for each method are presented in Tables 6, 7, 8, and 9, with a focus on sensitivity, specificity, F-measure, and MCC.", "When comparing the SVM_FF and SVM_CFS methods, translation was the only protein class for which the SVM_FF method (AUC of 0.906, accuracy of 98.67) performed better than the SVM_CFS method (AUC of 0.844, accuracy of 97.78).", "Although the accuracy of the random forest method was not significantly improved by feature selection, the AUC value for RF_CFS was slightly higher than that for RF_FF, except for the amino acid biosynthesis, acetylcholine receptor inhibitor, and G-protein coupled receptor classes.", "For classification of transport, transcription, amino acid biosynthesis, G-protein coupled receptor, and transmembrane proteins, both accuracy levels and AUCs significantly improved when feature selection was used.", "In terms of accuracy and AUC, SVM with feature selection has distinct performance advantages with this type of data, indicating that removal of the many redundant and irrelevant features by feature selection can improve prediction performance."]} diff --git a/edge/graph_14340623.jsonl b/edge/graph_14340623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..407b8760dc470ceba2ea488e6d594e985910b55d --- /dev/null +++ b/edge/graph_14340623.jsonl @@ -0,0 +1,6 @@ +{"60559398|12452682": []} +{"207172280|12452682": ["[6] provides a game theoretical overview of dynamic spectrum sharing from three aspects: analysis of network users\u2019 behaviors, efficient dynamic distributed design and optimality analysis."]} +{"29674068|12452682": []} +{"207641390|141053": ["Aside from local bargaining and game-theoretical approaches, some authors suggest that the spectrum sharing problems are similar to MAC issues [23], where several users try to access the same channel and their access should be coordinated with the neighboring users to avoid interferences."]} +{"15777201|141053": ["According to some current research works, spectrum sharing problems are similar to medium access control (MAC) issues [9] [32], where several users try to access the same channel and their access should be shared with the neighboring users to avoid the interferences."]} +{"50134395|12187956": ["KEYWORDS\nCognitive radio, multi-agent systems, radio spectrum management, wireless network"]} diff --git a/edge/graph_14341962.jsonl b/edge/graph_14341962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e27563eab95e1a630014b06c1ba1bb53198eb1cb --- /dev/null +++ b/edge/graph_14341962.jsonl @@ -0,0 +1,9 @@ +{"12087677|191396": ["partitioning clustering are two common type of clustering methods and each of them has its own traits [27]."]} +{"314423|3241708": ["not just because it results in a goal that, unlike its alternative, is attainable, but because (1) the guarantees it provides are in practice what nodes that engage in crowd-sourcing [47]"]} +{"12335636|15219853": ["Biometrics are categorized as either physiological or behavioral [31]."]} +{"1649239|2294541": []} +{"14553563|191396": ["For an in-depth discussion of clustering algorithms and techniques, we refer the reader to [45]."]} +{"207190974|15782139": []} +{"6733582|15782139": ["Behavioral biometrics \u2014 voice [47], gait [48], handwriting [49], keystroke dynamics [50], etc."]} +{"1837859|2294541": ["Our evaluation shows that DSybil would continue to provide high-quality recommendations even when a millionnode botnet uses an optimal strategy to launch a sybil attack."]} +{"6397074|49842767": ["It is worth noting that results from the literature of clustering stability [29] can not be directly exploited to this end, since the noise induced by adversarial manipulations is not generally stochastic but specifically targeted against the clustering algorithm."]} diff --git a/edge/graph_143422145.jsonl b/edge/graph_143422145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df27c0cc578b038a34239ccfcd1af3ba2b0a55cf --- /dev/null +++ b/edge/graph_143422145.jsonl @@ -0,0 +1,2 @@ +{"5415347|206602044": ["In the speech recognition literature, this is the subtask of speaker diarisation (Miro et al., 2012; Tranter et al., 2006)."]} +{"5415347|6337591": ["User simulation models are particularly useful in the development of dialogue systems based on reinforcement learning methods (Singh et al., 2002; Schatzmann et al., 2006; Pietquin and Dutoit, 2006; Frampton and Lemon, 2009; Jurc\u030c\u0131\u0301c\u030cek et al., 2012; Png and Pineau, 2011; Young et al., 2013).", "User simulation models are particularly useful in the development of dialogue systems based on reinforcement learning methods (Singh et al., 2002; Schatzmann et al., 2006; Pietquin and Dutoit, 2006; Frampton and Lemon, 2009; Jur\u010d\u0131\u0301\u010dek et al., 2012; Png and Pineau, 2011; Young et al., 2013)."]} diff --git a/edge/graph_143424259.jsonl b/edge/graph_143424259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d911550ce7830a0bd5f4aea8f52ffc37c72e2891 --- /dev/null +++ b/edge/graph_143424259.jsonl @@ -0,0 +1 @@ +{"35514634|6923178": []} diff --git a/graph_871285.jsonl b/edge/graph_14343378.jsonl similarity index 100% rename from graph_871285.jsonl rename to edge/graph_14343378.jsonl diff --git a/graph_873842.jsonl b/edge/graph_14350495.jsonl similarity index 100% rename from graph_873842.jsonl rename to edge/graph_14350495.jsonl diff --git a/graph_880321.jsonl b/edge/graph_14354860.jsonl similarity index 100% rename from graph_880321.jsonl rename to edge/graph_14354860.jsonl diff --git a/edge/graph_14355482.jsonl b/edge/graph_14355482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c240b2add244011648432978deaff7cd7194a68 --- /dev/null +++ b/edge/graph_14355482.jsonl @@ -0,0 +1,2 @@ +{"993844|14077778": ["The binary algorithm and its variants [MvOV96, Gor98 ] can be used to eciently compute mD. The main operations in the algorithm are group addition and group doubling."]} +{"11887106|14077778": []} diff --git a/edge/graph_14356173.jsonl b/edge/graph_14356173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2c68697856abc9ba2f5e23c45b22ab660364c2d --- /dev/null +++ b/edge/graph_14356173.jsonl @@ -0,0 +1,10 @@ +{"17813062|3102110": []} +{"12950191|192934": ["exponentially during the last few years [ 1 ].", "For the structural mutations, the number of RBFs that can be added or removed in a structural mutation is within the [\ufffd min ,\ufffd max ]= [ 1 , 2] interval.", "variable in the interval [0, 1 ], T (g) = 1\u2212 A(g) the temperature of the neural net, and \ufffd min and \ufffd max a minimum and maximum number of nodes specified as parameters.", "u is a random uniform variable in the interval [0, 1 ], \ufffd o and \ufffd h are previously defined ratios of number of connections in the hidden and the output layer, and no and nh are the current number of connections in the output and the hidden layers."]} +{"7294094|15916359": ["Jyoti Soni, et al. [3] research work, intend to provide a survey of current techniques of knowledge discovery in databases using data mining techniques that are in use in today \u2019 s medical research particularly in Heart Disease Prediction."]} +{"9262676|11894197": ["Finally, the data should be normalized [ 13 ].", "known test statistic has a distribution of Fk-J,Il -k [ 13 ]."]} +{"16781185|1437067": ["Classification rules are typically usefully for medical problems that have been applied particularly in the area of medical diagnosis (Freitus, 2002)."]} +{"15916359|15986963": []} +{"17893189|15986963": ["The predictive model is obtained from the rule based classifiers independently; then, the predictive models are combined employing the post mining procedure adopted from [18]."]} +{"18364429|7158350": ["It is advantageous to limit the number of input features in a classifier in order to have a good predictive and less computationally intensive model (Zhang, 2000).", "a good predictive and less computationally intensive model (Zhang, 2000).", "It is advantageous to limit the number of input features in a classifier in order to have\na good predictive and less computationally intensive model (Zhang, 2000)."]} +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} diff --git a/graph_882740.jsonl b/edge/graph_14357954.jsonl similarity index 100% rename from graph_882740.jsonl rename to edge/graph_14357954.jsonl diff --git a/graph_902436.jsonl b/edge/graph_14368770.jsonl similarity index 100% rename from graph_902436.jsonl rename to edge/graph_14368770.jsonl diff --git a/edge/graph_14370469.jsonl b/edge/graph_14370469.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85fb47945e2d0acdfc4fd6372e84fb4020e4f5da --- /dev/null +++ b/edge/graph_14370469.jsonl @@ -0,0 +1,2 @@ +{"13839656|14370469": []} +{"15841323|7046385": ["State-based modeling (Zwick and Johnson, 2002) defines the constraints of the model (that is, the specifics of how the model must match the observed data) in terms of specific states of the data or its margins, rather than being defined by complete margins only."]} diff --git a/graph_1437067.jsonl b/edge/graph_1437067.jsonl similarity index 100% rename from graph_1437067.jsonl rename to edge/graph_1437067.jsonl diff --git a/edge/graph_14371765.jsonl b/edge/graph_14371765.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fec4f992e994f299d433ff47ffe87e315d030714 --- /dev/null +++ b/edge/graph_14371765.jsonl @@ -0,0 +1,2 @@ +{"4461063|1363053": []} +{"14674633|12127129": ["ground subtraction, the reader is referred to [25]."]} diff --git a/graph_905827.jsonl b/edge/graph_14374022.jsonl similarity index 100% rename from graph_905827.jsonl rename to edge/graph_14374022.jsonl diff --git a/edge/graph_14376565.jsonl b/edge/graph_14376565.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb1ec6b2f8bc8762a261bf6ce5a7c2eb419e3377 --- /dev/null +++ b/edge/graph_14376565.jsonl @@ -0,0 +1,2 @@ +{"17965751|2381561": ["Figure 1-5: Package-level 3-D integration by vertical stacking of multi-chip modules [28].", "In [28, 29] reviews of various packaging approaches to 3-D integration have been provided.", "28 1-5 Package-level 3-D integration by vertical stacking of multi-chip modules [28]."]} +{"9460050|582949": ["an optimistic view that might neglect all additional capacitances in a real gate and assume that the peak current flows at all voltages, and a more pessimistic heuristic that gives about four times the gate delay metric [3]."]} diff --git a/graph_912956.jsonl b/edge/graph_14379823.jsonl similarity index 100% rename from graph_912956.jsonl rename to edge/graph_14379823.jsonl diff --git a/edge/graph_14380847.jsonl b/edge/graph_14380847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b912c1ac76c293d8d306ff79371cbaa5e6d8923 --- /dev/null +++ b/edge/graph_14380847.jsonl @@ -0,0 +1,26 @@ +{"5968604|15782139": ["The stroke sequence estimation is built on the extracted stroke so as to simulate the dynamic writing processing, which can help to distinguish forgery [10]."]} +{"15572382|6746689": ["We selected an algorithm, which removes pixels so that an object without holes shrinks to a minimally connected stroke, and an object with holes shrinks to a connected ring halfway between each hole and the outer boundary [12]."]} +{"15317873|6746689": ["The skeleton follows the centerline of the original image, and was obtained through a standard thinning algorithm [27\u201330]."]} +{"15249249|2762290": []} +{"29135780|15782139": []} +{"43706595|15782139": ["While\nmore sophisticated architectures have been developed (Plamondon and Srihari, 2000) and proved their interest in terms of recognition rate, the point here is to focus on the complementarity between online and offline features for designing an offline recognition system.", "Overall structure of t more sophisticated architectures have been developed (Plamondon and Srihari, 2000) and proved their interest in terms of recognition rate, the point here is to focus on the complementarity between online and offline features for designing an offline recognition system."]} +{"3217073|6746689": ["A much-cited parallel thinning algorithm developed by Zhang and Suen [15] is adopted here since it is simple, fast and immune to contour noise [14].", "Thinning is generally referred to as a process of reducing elongated patterns to a line-like representation named skeleton [14]."]} +{"14800042|15782139": ["Online signature verification systems are extremely precise but require the presence of the author during both the acquisition of the reference data and the verification process restricting their use to specific applications [1\u20136].", "Offline systems solve these problems but lack in efficiency [3, 7\u20139].", "Most of them aim at the robust extraction of basic entities called \u201cstrokes\u201d from the original skeleton of the words [1\u20133, 10\u201312] where the exact meaning of a stroke varies according to the segmentation method used as well as the kind of data extracted (dynamic or static)."]} +{"16850059|6746689": ["In writer identi.cation the features are aimed at dis\u00adtinguishing \nbetween writers and thus need to emphasize the di.erences in shapes of the same characters written by \ndif\u00adferent writers."]} +{"7628974|2762290": []} +{"8151403|6746689": ["Many effective thinning algorithms have already been proposed [14]."]} +{"22773977|6746689": []} +{"6528347|15782139": ["On-line systems generally present a better performance than the off-line ones but require the necessary presence of the author during both the acquisition of the reference data and the verification process limiting its use certain kind of applications [1,2,3].", "Off-line systems generally don\u2019t require the use of any complex apparatus rather than a simple scanner but usually require a more complex or refined preprocessing step, generating also a greater database size [1,2,3]."]} +{"18809553|6746689": []} +{"18809553|15782139": []} +{"18017156|14580698": []} +{"18017156|6746689": []} +{"1455669|6746689": ["It works well for strokes with smooth contours, but in noisy or stroke junction areas where the contours are eroded or overlapped, the skeleton may include artifact lines [1], [4], [19], [23].", "The thinning procedure iteratively deletes unnecessary contour pixels until a skeleton of 1-pixel width remains without altering the topological structure of the input image [23].", "structure of the original image [23], we can use the"]} +{"1455669|15782139": ["It works well for strokes with smooth contours, but in noisy or stroke junction areas where the contours are eroded or overlapped, the skeleton may include artifact lines [1], [4], [19], [23].", "Online recognition has found acceptance in many applications with commercial success, while offline recognition for unconstrained handwriting remains a hard problem [1], [2], [3], [4].", "INTRODUCTION Automatic handwriting recognition has received significant attention for more than 40 years [1]."]} +{"17874864|6746689": ["It is assumed that the static script is a binarized skeleton, where the skeleton of an image is approximately one pixel wide and coincides mostly with the centerline of the original image [9]."]} +{"17874864|15782139": ["These trajectories are particularly useful for automatic handwritten character or word recognition, or for the verification of signatures; see [13, 6] for more detail.", "Thus, on-line systems, which rely on dynamic handwriting, include more context, making them significantly more reliable than off-line systems which rely on static handwriting [13]."]} +{"29713321|6746689": []} +{"4606897|16082889": []} +{"4606897|14580698": []} +{"4606897|6746689": []} +{"4606897|15782139": ["HARINGmany of the trajectory singularities, loops appear as one of the most dominant features available in cursive handwriting processing [1], [ 2 ], [3], [4], [5].", "Unfortunately, such a transformation is not straightforward [ 2 ]."]} diff --git a/edge/graph_14381609.jsonl b/edge/graph_14381609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ea7ebf7ea5bedd079fd827a97b81ee48d14e03a --- /dev/null +++ b/edge/graph_14381609.jsonl @@ -0,0 +1,3 @@ +{"15436697|191396": ["The analysis of the available clustering algorithms, the clustering initialization, and the selection of the number of clusters is beyond the scope of this paper [51] but, for the cluster"]} +{"59470821|14170176": []} +{"59470821|2473564": []} diff --git a/edge/graph_14382980.jsonl b/edge/graph_14382980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fc905e601d7ef60c43c8ac8c2c004da1ccbc849 --- /dev/null +++ b/edge/graph_14382980.jsonl @@ -0,0 +1,3 @@ +{"5974343|508178": ["\u201d The issues and challenges of trust in cloud computing have been widely discussed from different perspectives [2-10]."]} +{"1686577|2795037": []} +{"61048129|2795037": ["Note that since we are interested in minimizing the query evaluation cost, a query optimizer can be used to select the fragment that allows the execution of more selective queries by the server, thus decreasing the workload of the application and maximizing the efficiency of the execution [25]."]} diff --git a/graph_916507.jsonl b/edge/graph_14387128.jsonl similarity index 100% rename from graph_916507.jsonl rename to edge/graph_14387128.jsonl diff --git a/graph_925507.jsonl b/edge/graph_14388079.jsonl similarity index 100% rename from graph_925507.jsonl rename to edge/graph_14388079.jsonl diff --git a/graph_926166.jsonl b/edge/graph_14388097.jsonl similarity index 100% rename from graph_926166.jsonl rename to edge/graph_14388097.jsonl diff --git a/graph_926226.jsonl b/edge/graph_14394558.jsonl similarity index 100% rename from graph_926226.jsonl rename to edge/graph_14394558.jsonl diff --git a/edge/graph_14395478.jsonl b/edge/graph_14395478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f63a8fcb522371eabc585564f78db87447bdc6f8 --- /dev/null +++ b/edge/graph_14395478.jsonl @@ -0,0 +1,12 @@ +{"4978598|206051485": ["in overlaying images by geometric transformations, increases in general with the growing diversity of imaging methods and the amount of image data produced (14)."]} +{"708195|7861381": ["We characterize the smoothness of GEBS defo rmati n by the same energy functionalET (TPS bending energy), which is commonly used in registratio n [19, 23]."]} +{"6863252|7861381": ["The rest of the section is organized by following coarsely and extending the classi\ufb01cation of deformation models given by Holden [14]."]} +{"9130407|206051485": ["Ehyb(T ) =Mico(I \u25e6 T \u25e6 Tgeo, J) +Rico(T \u25e6 Tgeo) , (15)", "A complete overview is out of the scope of this article, and we would like to point the reader to the books by Hajnal et al. (12) and Modersitzki (13), the surveys by Maintz and Viergever (14), Zitova and Flusser (15), and the tutorial by Szeliski (16).", "(12) and Modersitzki (13), the surveys by Maintz and Viergever (14), Zitova and Flusser (15), and the tutorial by Szeliski (16).", "Zitova B, Flusser J. 2003."]} +{"12410054|206051485": ["lished summarizing the research on this important topic [1]\u2013[8]."]} +{"8783848|206051485": []} +{"3089225|7861381": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"19867539|6536700": ["Image guidance for this type of neurosurgery is typically achieved through optical tracking and the pre-operative volumes registered to the patient [68], or using fiducial markers around the targets to provide the transformation [7]."]} +{"3548164|6863252": ["Multimodal registration is a very challenging problem in medical imaging commonly faced during image-guided interventions and data fusion [13].", "The minimization is commonly solved in a continuous or discrete optimization framework [13], depending on the nature of \u03b8."]} +{"2461209|6863252": ["A general survey of deformable image registration may be found in [5, 6, 7, 8, 9]."]} +{"16147379|6863252": ["Graph-based image registration, where the task is conceived as a discrete labeling problem on a graph, constitutes one of the most ef\ufb01cient and accurate state-of-the-art meth-ods for image registration [11]."]} diff --git a/edge/graph_14397159.jsonl b/edge/graph_14397159.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fce206d2908330edecc4570c4225bc7eb49646f --- /dev/null +++ b/edge/graph_14397159.jsonl @@ -0,0 +1,14 @@ +{"28721461|15947359": ["Smart camera networks attract a lot of attention in research [13]."]} +{"41756188|9045232": []} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"371451|14288295": ["The HMMs can be trained by using forward-backward algorithms (see [17] for details)."]} +{"7178101|7788290": ["Although there has been much work on human motion analysis over the past two decades (see reviews [ 1 ]\u2013[3]), activity understanding still remains challenging.", "For clarity, we roughly divide the existing work into three major categories, based on the used low-level feature cues, as follows: 1) Feature Tracking Based Methods: Many traditional methods of activity recognition are based on feature tracking in either 2-D or 3-D space [ 1 ], [2]."]} +{"12674247|17516538": ["New-generation visual surveillance systems can benefit from new advances in digital video communication (video compression, bandwidth reduction, and convenient networking), digital video processing, and broadband access network infrastructures [1][2]."]} +{"23378153|192934": ["The feature selection procedure reduces the cost of the pattern recognition process, and provides better classification accuracy due to finite training dataset size effects [ 21 ]."]} +{"920724|5401262": ["The information provided by the sensors is used to drive systems that automatically analyse human behaviour [26]."]} +{"920724|14970359": ["Most prominent in the visual domain are face detection and identi cation [34], person and object tracking [24], [37], [40], facial expression recognition [33], body posture recognition [15], [38], attention direction sensing [32], hand tracking and hand gesture recognition [27]."]} +{"920724|7185733": ["Most prominent in the visual domain are face detection and identi cation [34], person and object tracking [24], [37], [40], facial expression recognition [33], body posture recognition [15], [38], attention direction sensing [32], hand tracking and hand gesture recognition [27]."]} +{"6281712|7360895": []} +{"60570812|14970359": ["(See [2, 1, 17, 34 ] for review.) In this paper, we will concentrate on recent developments in one area"]} +{"60570812|7185733": ["Pavlovic et al. [46] surveyed the literature on visual interpretation of hand gestures in the context of its role in HCI."]} +{"60570812|7788290": ["(See [2, 1, 17 , 34] for review.) In this paper, we will concentrate on recent developments in one area"]} diff --git a/graph_932651.jsonl b/edge/graph_14397836.jsonl similarity index 100% rename from graph_932651.jsonl rename to edge/graph_14397836.jsonl diff --git a/edge/graph_14398341.jsonl b/edge/graph_14398341.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a62f5de622733c40c038983b3b435119960fe35 --- /dev/null +++ b/edge/graph_14398341.jsonl @@ -0,0 +1 @@ +{"61017667|191396": ["Significant research has focused on the problem of estimating k, using very different approaches [30].", "In particular, we employed the standard k-means algorithm, which is probably the bestknown partitional clustering algorithm [29, 30], to cluster particles according to their pbest, the previous best position."]} diff --git a/graph_1440555.jsonl b/edge/graph_1440555.jsonl similarity index 100% rename from graph_1440555.jsonl rename to edge/graph_1440555.jsonl diff --git a/edge/graph_14405917.jsonl b/edge/graph_14405917.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..459674ca1de57c2a3d61179636ce1fddfd1a94f5 --- /dev/null +++ b/edge/graph_14405917.jsonl @@ -0,0 +1,9 @@ +{"2355696|1029120": ["Also automatic posture recognition has been addressed in few works, mostly aiming at surveillance [57] and activity recognition [206] (See [54][116][153] for extensive overviews of the past work in the field)."]} +{"2355696|5401262": ["Although the importance of social signals in everyday life situations is evident, and in spite of recent advances in machine analysis and synthesis of relevant behavioural cues like gaze exchange, blinks, smiles, head nods, crossed arms, laughter, and similar [137][138], the research efforts in machine analysis and synthesis of human social signals like attention, empathy, politeness, flirting, (dis)agreement, etc.", ", general-purpose W4 technology does not exist yet [138][137]), answering the why and how questions in a W4-context-sensitive manner when analysing human behaviour is virtually unexplored area of research."]} +{"2355696|8777381": ["The prosody conveys a wide spectrum of socially relevant cues: emotions like anger or fear are often accompanied by energy bursts in voice (shouts) [168], the pitch influences the perception of dominance and extroversion (in general it is a personality marker [167]), the speaking fluency (typically corresponding to high rythm and lack of hesitations) increases the perception of competence and results into higher persuasiveness [167]."]} +{"2355696|14970359": ["train stations or streets) [62][115]."]} +{"2355696|9045232": ["sis [199] (see [81][215] for extensive surveys on face detection techniques)."]} +{"2355696|7788290": []} +{"655122|8777381": ["The study of how emotion is expressed by properties of speech has advanced greatly over recent years (Scherer, 2003; Devillers et al., 2005; World-Wide Web Consortium, 2009; Schuller et al., 2009; Batliner et al., 2010), motivated in part by dissatisfaction with the perceived cold, robotic nature\u2026", "The study of how emotion is expressed by properties of speech has advanced greatly over recent years (Scherer, 2003; Devillers et al., 2005; World-Wide Web Consortium, 2009; Schuller et al., 2009; Batliner et al., 2010), motivated in part by dissatisfaction with the perceived cold, robotic nature of most spoken dialog systems."]} +{"171437|1452734": ["\u2026also known as epigenetic robotics, or autonomous mental development methodology, is a novel approach to the study of cognitive robots that takes direct inspiration from developmental mechanisms and phenomena studied in children (Lungarella et al. 2003; Cangelosi and Riga 2006; Weng et al. 2001).", "These milestones provide a possible set of cognitive robotics goals and test-scenarios, thus acting as a research roadmap for future work on cognitive developmental robotics."]} +{"21758081|2355696": ["Hidden Markov models, boosting, Bayesian classifiers, and support vector machines, fed with both audio and video features, are the most common techniques applied also to detectroles(see[ 6 ]and[10]forasurvey).However,theseworks do not address the subtler aspects of social interaction such as emotional contagion and empathy.", "Current research on social interaction (e.g., see [ 6 ] and the"]} diff --git a/edge/graph_14409099.jsonl b/edge/graph_14409099.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b078854007511b208983302c0435f6d92f51c662 --- /dev/null +++ b/edge/graph_14409099.jsonl @@ -0,0 +1 @@ +{"8079055|207164119": []} diff --git a/edge/graph_14414383.jsonl b/edge/graph_14414383.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fa93d2beb610acc0f16c1ce0aa7030fd847182e --- /dev/null +++ b/edge/graph_14414383.jsonl @@ -0,0 +1,7 @@ +{"3951572|3330313": []} +{"207172599|3330313": []} +{"5179917|3330313": ["There is extensive work on anomaly detection techniques [1, 11 , 14], but most of these techniques look for individual objects that are different from normal objects."]} +{"7560532|3330313": ["[18] provide extensive overview of outlier detection techniques."]} +{"10500134|3330313": ["Outlier (or anomaly) detection [10,18] is a very broad field and has been studied in the context of a large number of application domains."]} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} diff --git a/edge/graph_14415030.jsonl b/edge/graph_14415030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4595d9786eb21e0c5f44a0c196bdc2f6f2c420c --- /dev/null +++ b/edge/graph_14415030.jsonl @@ -0,0 +1,11 @@ +{"9920225|15744805": ["Narrowing the score range to [1, 5] may make training set easier to generate, but the same problem still exists."]} +{"12547533|15744805": ["These metrics build on the existing knowledge on segmentation quality evaluation and also on some relevant aspects from the video quality evaluation field."]} +{"15367929|15744805": ["A segmentation result can be judged according to general criteria of good segmentation or by comparison with a reference segmentation result representing the ideal segmentation [5]."]} +{"1165849|15744805": ["In his survey on evaluation methods for image segmentation [ 4 ], Zhang proposes this definition of image segmentation:", "Zhang\u2019s categories [ 4 ], but can be seen as a unification of all categories into a consistent framework, defining a general comparison method incorporating multiple measures, rather than advocating the use of a single particular measure.", "\u201c[Image segmentation] consists of subdividing an image into its constituent parts and extracting these parts of interest (objects).\u201d [ 4 ]", "Zhang [ 4 ] proposes a classification of evaluation methods as \u201canalytical\u201d, \u201cempirical goodness\u201d, or \u201cempirical discrepancy\u201d."]} +{"554747|15744805": ["To address this problem, it has been widely agreed that a benchmark, which includes a large set of test images and some objective performance measures, is necessary for image segmentation evaluation."]} +{"42537619|15744805": ["Zhang [ 2 ] classifies the segmentation assessment into the analytical methods and the empirical methods.", "Three types of measure have been established [ 2 ] for region segmentation : goodness based on intra-region uniformity [5, 6], inter-region contrast [7, 8] and region shape [9]."]} +{"2995392|15744805": ["Actually, many works have been performed to solve the more general problem of the evaluation of image segmentation results [11], [5].", "Among all the methods proposed in the literature [11], we selected five supervised evaluation criteria : Multi-features quality measurement (Quality) [10] : this technique combines the computation of an objective divergence (between the extracted contours and those proposed by the experts) and a subjective evaluation of the different possible errors."]} +{"11311842|15744805": ["Although several measures have been developed for still image segmentation [1]\u2013[7], they are not directly applicable to video object segmentation and tracking."]} +{"11230108|15744805": ["segmentation of images have been published (Levine and Nazif, 1985; Zhang, 1996)."]} +{"15225236|15744805": ["In the often-cited article by Zhang [2], evaluation methods are broadly divided into two categories: analytical methods and empirical methods.", "In [13] and [14], Zhang suggests the use of the so called \u201cultimate measurement accuracy\u201d: \u201cIf the goal of image segmentation is to obtain measurements of object features, the accuracy of these measurements obtained from the segmented images can be used as a quantitative evaluation criteria.\u201d"]} +{"3067600|15744805": []} diff --git a/edge/graph_14419714.jsonl b/edge/graph_14419714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c586132c37d78db3c8bdf663dbae801af8cbffd5 --- /dev/null +++ b/edge/graph_14419714.jsonl @@ -0,0 +1,2 @@ +{"16117322|3420321": ["For mapping reads on a reference sequence, solutions exist that index reads with hash tables [6,29]."]} +{"7529644|14370469": ["It is unclear whether this framework offers any advantage over more standard statistical methods of modelling of the same predictor variables as, in most cases, the conditional probability statements that are implied by the two approaches are equivalen"]} diff --git a/edge/graph_14420171.jsonl b/edge/graph_14420171.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ec56d1998ad25837f19d9b820b4073a62da1fd8 --- /dev/null +++ b/edge/graph_14420171.jsonl @@ -0,0 +1,14 @@ +{"16391456|18440098": []} +{"18019460|18440098": ["\u2026120-749, South Korea (wxman, hrbyun)@yonsei.ac.kr\nJ.-H. Ahn is with the Division of Computer & Media Engineering, Kangnam University, Gugal-dong 6-2, Giheung-gu, Yongin, Gyeonggi-do, South Korea jungho@kangnam.ac.kr\nto model sequential information, HMM were dominantly used in the past decade [13]."]} +{"36676817|14970359": ["However, they may also be readily computed using low-cost video camera arrays, as suggested by the state of the art regarding body kinematics recovery from video [27,40, 26 ,39,5]."]} +{"2270858|7185733": []} +{"2127240|14970359": ["Automatic gesture recognition from continuous video streams has a variety of potential applications varying from smart surveillance, human-machine interaction to biometrics [1, 2 ]. In most naturally occurring scenarios, gestures are linked together in a continuous varying stream, without any obvious pause or break between individual gestures."]} +{"37777845|16540884": ["of inputs [35], mainly involving speech and gesture signals in our scope."]} +{"37777845|18454590": ["Recently others proposed hybrid ANN/HMM approaches [28]."]} +{"16224442|7185733": []} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"8787115|7788290": ["In contrast, hand tracking can become irrevocably lost, requiring manual resets ( Gavrila 1999 ).", "In contrast, hand tracking can become irrevocably lost, requiring manual resets (Gavrila 1999)."]} +{"5829923|7788290": ["In contrast, hand tracking can become irrevocably lost, requiring manual resets (Gavrila, 1999)."]} +{"30600081|7185733": []} +{"33191951|7185733": ["Comprehensive overviews of gesture recognition in computer vision including the problem of hand-shape recognition can be found in [ 50 ] and [68]."]} diff --git a/edge/graph_14420517.jsonl b/edge/graph_14420517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d76f24554d2fbac559fd4af426aae028e13f355 --- /dev/null +++ b/edge/graph_14420517.jsonl @@ -0,0 +1 @@ +{"15907278|116542": ["For example, [5] and [6] propose patterns for web services composition, while [7] and [8] identify security patterns."]} diff --git a/edge/graph_14422660.jsonl b/edge/graph_14422660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a853f0f3cc6f2af1dcd5c1fe7f93618d8808b64 --- /dev/null +++ b/edge/graph_14422660.jsonl @@ -0,0 +1,11 @@ +{"14364550|15247126": ["Many new methods have been proposed and analyzed, e.g. [ 1], [ 2] or [ 3]."]} +{"14336157|15247126": []} +{"13633911|15540889": []} +{"13633911|15247126": []} +{"14136236|15247126": ["HTTP (Hypertext Transfer Protocol) or ICMP (Internet Control Message Protocol) results in fields that are either unused or optional [1], [18]."]} +{"7292767|15540889": []} +{"7292767|15247126": []} +{"17977089|15247126": ["\u201cThe huge amount of data and vast number of different protocols in the Internet makes it ideal as a high-bandwidth vehicle for covert communications [ 2 ].\u201d In a model of a typical covert channel in computer network protocol, the sender embeds the message into the header of the packet, and the receiver extracts it later.", "Thus, it demonstrates that the attacker can easily detect the covert channel if the jitter field is naively used [ 2 ]."]} +{"13341979|17234703": ["Hence the embedding process shall not degrade the quality of the underlying audio data [6]."]} +{"206078|15247126": [", can be found in [37]); these solutions target specific VoIP protocol fields (e."]} +{"5504448|15247126": [", can be found in [48]) \u2013 these solutions target specific VoIP protocol fields (e."]} diff --git a/graph_1442447.jsonl b/edge/graph_1442447.jsonl similarity index 100% rename from graph_1442447.jsonl rename to edge/graph_1442447.jsonl diff --git a/edge/graph_14424486.jsonl b/edge/graph_14424486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ffe14df4df27571cdcfeac1c806c3d1df65103f --- /dev/null +++ b/edge/graph_14424486.jsonl @@ -0,0 +1,2 @@ +{"60806958|1708582": []} +{"53911132|239537": ["It should be noted that the enhanced ability to visually detect patterns is not arbitrary, but is attained by virtue of visualization algorithms from the field of graph drawing [Di Battista et al. 1994; Herman et al. 2000]."]} diff --git a/edge/graph_14427591.jsonl b/edge/graph_14427591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc2e2778ea7c22ee5a716908ee2d1dc40a91d676 --- /dev/null +++ b/edge/graph_14427591.jsonl @@ -0,0 +1 @@ +{"942711|7876633": ["Data hosting services often package various types of data into a dataset."]} diff --git a/edge/graph_14429013.jsonl b/edge/graph_14429013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8be6929e285fb4f3a3a482f7da1ccc401198198f --- /dev/null +++ b/edge/graph_14429013.jsonl @@ -0,0 +1,13 @@ +{"1817342|7761990": ["Another approach has also been proposed by Calhoun et al. (2009) based on parallel Independent Component Analysis in order to combine functional MRI data and SNPs from candidate regions."]} +{"2125207|9431428": []} +{"2125207|7761990": ["\u2026(which captures brain function presumably reflecting both genetic and environmental influences) with genetic information, is potentially a useful way to help classify schizophrenia (Hariri and Weinberger, 2003; Pearlson and Folley, 2008; Calhoun et al., 2009; Liu et al., 2009; Potkin et al., 2009)."]} +{"6398642|7761990": ["The application of ICA to multimodal data fusion [35] and genetics [96], [97] is another very important area which has been applied to study brain disease which should be considered though it is beyond the scope of this particular review paper."]} +{"5761431|7761990": ["As we discuss in a recent review article, group ICA approaches can be organized into five categories [Calhoun et al., 2009]."]} +{"16535214|7761990": ["There are new developments or other variants of ICA methods such as the group ICA [29] and we are currently exploring their use in integrated genomic data analysis.", "ICA has been recently successfully used for the joint analysis of fMRI, EEG and genomic imaging data [29,30].", "[29,30], but applied to gene expression and copy number separately.", "Joint ICA [29,30] is an approach that enables us to jointly analyze data from multiple modalities collected in the same set of subjects."]} +{"8998642|7761990": [", [43] and [181] for a review on ICA for multimodal data analysis the reader is referred to [72]."]} +{"215520737|7761990": ["Multimodality approaches Exploit joint information in several\nimaging modalities or other biomarkers at the same time\nMultimodal data fusion using ICA (Calhoun et al. 2009) Seemingly Unrelated Regression to pool information across simultaneous models (SUR; Jahanshad et al. 2013c) More work required to analyse multiple data modalities at once (e.g., anatomical MRI and DTI)\nnot replicate in subsequent analysis.", "By 2009, meta-analyses of GWAS from multiple elderly cohorts had implicated a trio of new AD risk genes\u2014CLU , CR1 and PICALM (Harold et al. 2009).", "Multimodality approaches Exploit joint information in several imaging modalities or other biomarkers at the same time Multimodal data fusion using ICA (Calhoun et al. 2009) Seemingly Unrelated Regression to pool information across simultaneous models (SUR; Jahanshad et al.", "Based on using multivariate statistics Use multiple predictors in the genome or image or both (reviewed inHibar et al. 2011a; Thompson et al. 2013; Meda et al. 2012);\nSparse regression (Vounou et al. 2010, 2012; Ge et al. 2012; Silver et al. 2012), compressive sensing, parallel ICA, machine learning methods\nCan search both the image and the genome simultaneously Difficult to apply to distributed remote datasets for meta-\nanalysis andmay be difficult to interpret the biological relevance of the signal\n3."]} +{"15361260|7761990": ["All doi:10.1016/j.neuroimage.2011.12.076\na b s t r a c t a r t i c l e i n f o", "This variant of ICA was designed for multimodality processing that extracts components using an entropy term based on information theory to maximize independence and enhances the interconnection bymaximizing the linkage function in a joint estimation process (Calhoun et al., 2009; Liu et al., 2008).", "\u2026identifies simultaneously clusters of associated, likely interacting genes related to either: (a) functional brain networks, (b) related structural brain regions, or (c) physiologic processes e.g. EEG patterns or other potential endophenotypes and shows their relationships (Calhoun et al., 2009).", "Parallel independent component analysis (Para-ICA) a novel multivariate data-driven, hypothesis-free statistical technique, extends ICA to analyze multiple modalities simultaneously (Calhoun et al., 2009)."]} +{"16745963|7761990": ["In order to do so, group ICA was performed using temporal concatenation as implemented in the GIFT 1.3i program (Calhoun et al., 2009).", "To alleviate potential concerns about the performance of para-ICA in the null case in which no relationship exist between data modalities, and to assess the robustness of para-ICA in scenarios with unbalanced data dimensions, simulations were performed.", "More accurate, informative, and complex relationships between datasets can be identi\ufb01ed by simultaneously considering all data in a multivariate and multimodal fashion (Calhoun et al., 2009).", "These maps can then used to compare the spatial and temporal characteristics of identi\ufb01ed components between groups (Calhoun et al., 2001, 2009).", "\u2026of the expression (loading parameter) of a single component for one data type is correlated across subject with the expression of a single component from the second data type, resulting in pairs of correlated components ( Figure 3 ) from each data modality (Liu et al., 2008; Calhoun et al., 2009).", "One major bene\ufb01t of para-ICA, along with the related method joint ICA, is that it is a completely data-driven second-level technique, requiring no a priori hypothesis regarding the relationship between modalities (Calhoun et al., 2009).", "Twenty participants were right handed, one was left handed, and three were ambidextrous based on the Edinburgh Handedness Inventory.", "For in depth description of para-ICA analysis see the following papers (Calhoun et al., 2009; Liu et al., 2009). program at a threshold of t = 35 .", "Less connectivity of this area of the precuneus to the temporo-parietal attention network negatively covaried with response time in congruent Stroop trials, but positively covaried with greater response time in incongruent Stroop trials."]} +{"36545817|16049649": ["This procedure is to mimic various screening methods, such as sure independence screening (SIS), for discarding covariates in high-dimensional linear models [Fan and Lv, 2010]."]} +{"9994130|7761990": []} +{"29035966|7761990": []} diff --git a/edge/graph_14429229.jsonl b/edge/graph_14429229.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d93209b0ead631817c0fa0627f1b24c3352b548a --- /dev/null +++ b/edge/graph_14429229.jsonl @@ -0,0 +1,3 @@ +{"63062129|16374808": []} +{"9263669|15315731": ["U S In recent years, pixel-level image fusion has been used in a wide variety of applications, such as remote sensing [7, 116], medical diagnosis[10], surveillance[29], and photography[70] applications.", "imaging \ufb01eld, James and Dasarathy summarize the state-of-the-art image fusion methods in [10].", "Pixel-level image fusion, as mentioned above, is widely sensing[8], medical imaging[10], and computer vision [6]."]} +{"9263669|11112426": []} diff --git a/graph_941910.jsonl b/edge/graph_14432114.jsonl similarity index 100% rename from graph_941910.jsonl rename to edge/graph_14432114.jsonl diff --git a/edge/graph_14433834.jsonl b/edge/graph_14433834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..766ea2a0ab5249ec29f6b56be0b8b50ad5b8c1d2 --- /dev/null +++ b/edge/graph_14433834.jsonl @@ -0,0 +1,18 @@ +{"6770567|206583375": ["Wireless-based indoor positioning system [6] by Liu et al."]} +{"31823070|33211520": []} +{"31823070|206986719": []} +{"31823070|469744": ["According to Azuma [10], \u201cone of the most basic problems currently limiting Augmented Reality applications is the registration problem\u201d.", "According to Azuma [10], \u201cAR allows the user to see the real world, with virtual objects superimposed upon or composited with the real\nack loop (adapted from [8]).\nworld.", "According to Azuma [10], \u201cAR allows the user to see the real world, with virtual objects superimposed upon or composited with the real", "The conceptual model of FM and SA integration [10].", "Equipped with a three-axis gyroscope, accelerometer, Wi-Fi, and digital compass hardware, an iPad\u00ae utilizing the GeoSpots would reduce the problem of \u201cwhen the real and virtual do not align properly the illusion is compromised\u201d [10]."]} +{"56524218|469744": ["There are a number of such systems in the literature [1,2]."]} +{"12155956|11266367": ["Nevertheless, as far as we are concerned, this is the most recent survey about energy-efficient techniques on mobile operating systems since the one published in 1995 by Welch [1]."]} +{"15936745|469744": []} +{"32547997|469744": []} +{"2435746|469744": ["Active tracking systems require calibrated sensors and signal sources in a prepared and calibrated environment [2], [10], [22].", "For example, AR annotation can identify specific components on a subassembly or portion of structure that moves throughout an assembly facility [2], [19], [29].", "Since the tracking measurements are made with the same camera used to view the scene, the measurement error is minimized for the view direction and scaled relative to the size of the object(s) in the image [2], [20].", "The AR metaphor of displaying information in the spatial context of the real world has a wide range of potential applications in multimedia computing and human-computer interaction [2], [5], [7], [21], [24], [26]."]} +{"791733|469744": ["In 1997, the first author published a survey [ 3 ] (based on a 1995 SIGGRAPH course lecture) that defined the field, described many problems, and summarized the developments up to that point."]} +{"129529553|469744": ["In this particular example, all GPS data with less than 7 captured satellites and which DOP value is higher than 2.1 will be ejected. ( 1 ) (2)", "n W W ( 1 ) where n t is the feedback adjustment factor to correct 3D gyro data."]} +{"15327381|469744": []} +{"13510240|469744": ["Azuma points to three important aspects that define AR (Azuma 1997)."]} +{"14198687|469744": ["Specifically, this section will briefly overview: (1) tracking and registration techniques, (2) tangible interfaces, (3) Magic Lens displays, and (4) Integrative modeling."]} +{"7203177|469744": ["Augmented Reality [ 6 ] and Augmented Virtuality user interfaces lie in the middle of this continuum as they rely on a mixture of real and virtual interface elements and thus are jointly referred to as Mixed Reality."]} +{"6409661|469744": ["The term Augmented Reality (AR) is used to describe systems that blend computer generated virtual objects or environments with real environments [1, 2]."]} +{"2223242|469744": ["and 1D head orientation in an indoor environment."]} +{"1560734|469744": ["Augmented reality (AR) refers to combining interactive media, such as graphics, with our perception of the real world, so that the added media are geometrically registered in 3D with the real world, interactively and in real time [6]."]} diff --git a/edge/graph_14434529.jsonl b/edge/graph_14434529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14435082.jsonl b/edge/graph_14435082.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14438457.jsonl b/edge/graph_14438457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eefdf997af779c8770e738ccd169fbeb6d1004d5 --- /dev/null +++ b/edge/graph_14438457.jsonl @@ -0,0 +1,8 @@ +{"2840399|1188683": ["functions: As devices are migrated to more advanced technologies, the number of transistors that can be devoted to the reconfigurable logic fabric increases.", "At the same time, the power consumption targets, the acceptable packaging and manufacturing costs, and the time-to-market requirements of these computation units are all decreasing rapidly, especially in the embedded hand-held devices market."]} +{"1131757|1188683": []} +{"9418097|14750997": ["A RISP (Reconfigurable Instruction Set Processor) [5] consists of a microprocessor core that has been extended with a reconfigurable fabric.", "A novel methodology for instruction set customization of RISPs (Reconfigurable Instruction Set Processors) is presented in this paper.", "Barat, F., Lauwereins, R., Deconinck, G.: Reconfigurable Instruction Set\nProcessors from a Hardware/Software Perspective, IEEE Transactions on Software Engineering, Vol. 28, No. 9, 2002, pp. 847-862 6."]} +{"21247426|14750997": ["A RISP (Reconfigurable Instruction Set Processor) consists of a microprocessor core that is tightly coupled with a RFU (Reconfigurable Functional Unit) [6]."]} +{"21247426|1188683": []} +{"21247426|15331799": ["However, FPGAs are becoming more popular than their ASIC counterparts as the increasing NRE costs of ASIC begin to outweigh the per-unit-cost of FPGAs for high-volume applications [11]."]} +{"14859111|1188683": ["One of the major continuous concerns of general-purpose processors is performance.", "In our proposal, for a given instruction set architecture, a onetime instruction set extension of eight instructions is sufficient to implement the reconfigurable functionality of the processor."]} +{"2489881|1188683": ["For further technical documentation the reader is directed to [7, 149], and for a comprehensive review of reconfigurable computing, to the survey papers by Compton [28] and Todman [133]."]} diff --git a/edge/graph_14440854.jsonl b/edge/graph_14440854.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..654b1dfe06ce9840a02fafcdcc36439fc4c2ec4b --- /dev/null +++ b/edge/graph_14440854.jsonl @@ -0,0 +1 @@ +{"316653|33286487": ["Quadratic time-frequency representations or bilinear expansions have received considerable attention in the literature [83]."]} diff --git a/edge/graph_14440860.jsonl b/edge/graph_14440860.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14441987.jsonl b/edge/graph_14441987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3bfc257d259a30fdc55adff894be515d58fb7f3 --- /dev/null +++ b/edge/graph_14441987.jsonl @@ -0,0 +1 @@ +{"6438719|14441987": []} diff --git a/edge/graph_14457334.jsonl b/edge/graph_14457334.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14457910.jsonl b/edge/graph_14457910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..750fae34a41f117faa1fd65801b2af8f17e0dccd --- /dev/null +++ b/edge/graph_14457910.jsonl @@ -0,0 +1,3 @@ +{"6516231|14441987": ["Routing: Two approaches of uni-cast routing algorithms are considered for ad hoc networks [12]: Proactive, table driven algorithms and reactive, source initiated, on-demand routing protocols."]} +{"5543469|14441987": []} +{"25414932|6959212": []} diff --git a/edge/graph_14471582.jsonl b/edge/graph_14471582.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14472159.jsonl b/edge/graph_14472159.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14472531.jsonl b/edge/graph_14472531.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7eef0b6ba0d0e59a6c438c3b6a1e287fddbbb564 --- /dev/null +++ b/edge/graph_14472531.jsonl @@ -0,0 +1 @@ +{"17596222|3420321": ["Li et al give an overview of algorithms and tools currently in use [19].", ", human) [19] or - without a reference genome - they can be assembled de novo [23].", "More specifically, large amounts of data has to be uploaded into the cloud before the processing starts, which not only causes significant data transfer latencies, but also adds to the cloud storage costs [19], [26].", "Li et al state that cloud computing might be a possible solution for small labs, but also raises concerns about data transfer bottlenecks and storage costs [19]."]} diff --git a/edge/graph_14478191.jsonl b/edge/graph_14478191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06274ca8bb2de18b95ddb5d8ebc0dcb239a3dcdb --- /dev/null +++ b/edge/graph_14478191.jsonl @@ -0,0 +1,18 @@ +{"5938812|1708582": ["For example, in (Kaelbling et al. 1996), (Strehl and Littman 2004), and (Strehl and Littman 2005), measures of confidence are used to guide exploration."]} +{"190725|8530790": ["Finding the appropriate\nM.C. Monard and J.S. Sichman (Eds.)"]} +{"471562|1708582": ["Comprehensive overviews may be found in [2, 7]."]} +{"11278867|1708582": ["Although most research in optimal control [1] and reinforcement learning [6], [8] involves a single scalar reward value to define the goal for an agent, there has been some research in using multiple objectives in a reinforcement learning setting [5], [4], [12], [3], [7]."]} +{"11848757|64292": []} +{"13201358|1708582": ["\u2026reward during the learning process (either total or average-per-time-step), or via the regret metric (Berry and Fristedt 1985, as recommended by Kaelbling et al. 1996), which is the accumulated loss of reward during the learning process compared to following the optimal policy from the\u2026", "On-line performance can be measured in two main ways\u2014as the accumulated reward during the learning process (either total or average-per-time-step), or via the regret metric (Berry and Fristedt 1985, as recommended by Kaelbling et al. 1996 ), which is the accumulated loss of reward during the learning process compared to following the optimal policy from the beginning of this process.", "Kaelbling et al. (1996, p. 242) refer to this as a \u201ctrain/test perspective\u201d on evaluation, as it is similar to the evaluation structure commonly used in supervised learning."]} +{"7284938|28670512": ["The Partially Observable Markov Decision Process (POMDP) ( \u00a8Astrom, 1965; Sondik, 1971; Monahan, 1982; White, 1991; Lovejoy, 1991b; Kaelbling, Littman, & Cassan-dra, 1998; Boutilier, Dean, & Hanks, 1999) has emerged as possibly the most general representation for (single-agent) planning under\u2026"]} +{"29618092|1708582": []} +{"36482639|8530790": ["nament selection make scaling information negligible (Fonseca and Fleming, 1994; Fonseca and Fleming, 1995d)."]} +{"17311631|1708582": []} +{"10580421|1708582": ["Keywords: Water Resources Management, Reinforcement Learning, Optimal Control", "Algorithms based on Reinforcement Learning (see for instance Kaelbling et al. (1997) and Barto and Sutton (1998)), originally developed in the Robotics and Artificial Intelligence fields, have been shown to be able to generate control policies that make an effective use of qualitative information."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} +{"10373780|13475195": ["The preferences can be among a set of objects, in which case we speak of object ranking (Kamishima et al. 2011), or among a set of labels that are attached to a set of objects, in which case we speak of label ranking (Vembu and G\u00e4rtner 2011).", "Correspondingly, they solve an object ranking problem, with objects given by parametrized policies, making use of standard learning-to-rank methods (Kamishima et al. 2011)."]} +{"12705488|1708582": []} +{"12705488|8363289": []} +{"1765539|28670512": ["Equation 13 is equiv-alent to using Monahan's (1982) ltering algorithm inIncPrune, Equation 15 is equivalent to using Lark's ltering algorithm (White 1991) in IncPrune (i.e., IP,as described earlier).", "The most basicincremental pruning algorithm is given by implement-ing Filter by Lark's algorithm (Figure 1); we callthe resulting algorithm IP.", "The algorithm is due to Lark (White 1991);Littman, Cassandra, & Kaelbling (1996) analyze thealgorithm and describe the way that the argmax op-erators need to be implemented for the analysis tohold (ties must be broken lexicographically).", "\u2026observable Markov decision processes(pomdps) model decision theoretic planning problemsin which an agent must make a sequence of decisionsto maximize its utility given uncertainty in the e ectsof its actions and its current state (Cassandra, Kael-bling, & Littman 1994; White 1991).", "10 then F F n f g11 else ! argmax 2F x 12 W W [ f!g13 F F n f!g14 return WFigure 1: Lark's algorithm for purging a set of vectors."]} +{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]} +{"16058389|8530790": ["The reported solutions to this problem using genetic algorithms have used niches [3] or non generational behavior [11] to maintain distributed solutions over the Pareto front.", "Figure 4 shows the Pareto solutions in the Pareto front, which has more evenly distributed solutions when compared against our previous proposal (MOAQ) [8] and the solutions reported by [3] and [11] using genetic algorithms.", "The evolutionary algorithms (EAs) community has been specially interested in the generation of Pareto fronts as they evolve populations of candidates solutions, rather than a single point in the search space [3, 11]."]} diff --git a/edge/graph_14481074.jsonl b/edge/graph_14481074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4fa4e0dd14c4966648d6451d15c8daf0c8b94394 --- /dev/null +++ b/edge/graph_14481074.jsonl @@ -0,0 +1,3 @@ +{"14528634|1099309": ["Key words: Indexing Techniques; Image Database; Content-Based Image Retrieval; Color-Based Feature Selection; Color Image Segmentation; Color Image Indexing; Combining Color and Shape Information; Integrated Color-Shape-Location Index", "According to the Huber\u2019s minmax norm, we get the following:\n\u03c8 (r,K) = r/K if |r| <= K\n= sign(r) if |r| > K (3)\nHere, as the value of K increases, the diffusion decreases as a higher value of K implies that the diffusion could be less for the same gradient."]} +{"14528634|8197990": ["Dominant regions within each image are indexed using integrated color, shape and location features."]} +{"12974382|17054454": ["A Review", The Canadian society for engineering in agriculture, food and biological systems, paper 05-002 - Imran Ahmed, Awais Adnan, Salim Gul, Md Islam, 2008, " Edge based real time weed recognition system for selective herbicides", Proceedings of IMECS, Vol-1."]} diff --git a/edge/graph_14485408.jsonl b/edge/graph_14485408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79012d4aa890d149c605ea2221f05d51406c695c --- /dev/null +++ b/edge/graph_14485408.jsonl @@ -0,0 +1 @@ +{"13115970|1708582": ["The learning of tactile skills is done here within the framework of reinforcement learning (e.g., Kaelbling et al., 1996)."]} diff --git a/edge/graph_14488244.jsonl b/edge/graph_14488244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f610596a33ad8258ab86368ceccbe6e282188426 --- /dev/null +++ b/edge/graph_14488244.jsonl @@ -0,0 +1,3 @@ +{"153520|17381415": []} +{"153520|2769379": ["Besides information flow in layers, different agents in one layer may also be able to communicate with each other [57]."]} +{"15406990|6959212": ["Early communication technologies like power line carrier and microwave communication have their own\nlimitations in reliability, scalability and robustness [7]-[9].", "Among these, the key features of fiber optics that have been high channel capacity, high data transfer rate, low transmission loss, immunity to electromagnetic interference and low cost, make it the most suitable candidate for WAMS applications [7], [14]-[16]."]} diff --git a/edge/graph_14496155.jsonl b/edge/graph_14496155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..221077a1f714d04f2715a326ed48394679051e58 --- /dev/null +++ b/edge/graph_14496155.jsonl @@ -0,0 +1 @@ +{"18291604|1230643": []} diff --git a/edge/graph_14497139.jsonl b/edge/graph_14497139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14499561.jsonl b/edge/graph_14499561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82634c12e306f824053ee4964154f58c5bc10e28 --- /dev/null +++ b/edge/graph_14499561.jsonl @@ -0,0 +1,6 @@ +{"5847535|1097238": ["In other words, the saliency map of a certain face image is determined in the testing phase (i.e., in an online manner), whereas the discriminative image patches in our method are determined in the training phase (i.e., in an offline manner)."]} +{"62713841|12663580": ["For a detailed survey of SVMs for different pattern recognition applications refer to Byun and Lee [ 37 ]."]} +{"62713841|192934": ["The template itself is often learned from the training set [ 47 ]."]} +{"9140319|192934": ["Can the classification be improved using feature subset selection methods? Selecting the optimal features is a problem of exponential time complexity and various suboptimal heuristics have been proposed [12], [13].", "tain number (thecurse of dimensionality[4], [12], [29])."]} +{"207561477|8197990": ["There has been a significant amount of computer science research on content-based image retrieval in which a particular query image (possibly a sketch or primitive graphic) is used to find matching relevant images [5]."]} +{"2629186|9045232": ["Automatic detectors exist for several broad classes of objects, such as faces [22] or signs [20]."]} diff --git a/graph_1450024.jsonl b/edge/graph_1450024.jsonl similarity index 100% rename from graph_1450024.jsonl rename to edge/graph_1450024.jsonl diff --git a/edge/graph_14501998.jsonl b/edge/graph_14501998.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79096a36997bd290c38147cdd08d8ecafe6e3aee --- /dev/null +++ b/edge/graph_14501998.jsonl @@ -0,0 +1 @@ +{"1076078|14639861": ["There are many definitions of the flexibility in literature [54]."]} diff --git a/edge/graph_145023054.jsonl b/edge/graph_145023054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91dab20f6a007978a0a2bf8eefa208ba9af2fb06 --- /dev/null +++ b/edge/graph_145023054.jsonl @@ -0,0 +1,3 @@ +{"11878470|2390193": []} +{"93949228|2390193": []} +{"96434590|145023054": []} diff --git a/edge/graph_14502524.jsonl b/edge/graph_14502524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46f3826dca2006251f5a65d74fd2607e1617efe7 --- /dev/null +++ b/edge/graph_14502524.jsonl @@ -0,0 +1,7 @@ +{"15628315|17718674": []} +{"27344803|17718674": []} +{"27344803|8397295": []} +{"17528758|17718674": ["In the current literature, such logics usually contain qualititative since-until logic as a proper fragment, and thus trivially inherit PSpacehardness [2,10,13].", "While the FVA is an appropriate condition in classical control theory and most computer science applications [2], we believe that there are at least four reasons to study also the non-FVA case: first, qualitative temporal logic originated in philosophy and mathematics to study time itself, rather than the behavior of systems with discrete state changes as considered in most computer science applications."]} +{"6450374|17718674": ["A great many formalisms have been proposed for the specification of real-time properties of programs [Alur and Henzinger 1993; 1992]. Many of those are various extensions of temporal logic. They are usually restricted, however, to the propositional case. Propositional Metric Temporal Logic (with future and past-tense connective) was proposed and studied in Koymans [1990; 1989]. A first-order version of this logic was used in Dubois et al. [1988] and Morzenti et al.", "6.3 Real-Time Properties A great many formalisms have been proposed for the specification \nof real-time properties of programs [Alur and Henzinger 1993; 1992]."]} +{"7574072|17718674": ["[ AH92 ; Koy89]. The first-order version of this logic has been applied to the specification of real-time integrity constraints [Cho95], and real-time logic pro\u00ad grams [Brz93; Brz95]."]} +{"9982953|17718674": ["Among the well-known extensions of classical temporal logics, we can mention real-time TLs (see for example [2, 3, 7]) where it is possible to add timing constraints in properties (for example, one can specify that an event A follows an eventB in at most 5 time units) or probabilistic TLs (see [10] for such an extension of CTL) where it is possible to express properties like \u201cevent A will occur with probability 0."]} diff --git a/edge/graph_14503236.jsonl b/edge/graph_14503236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13ad45c5aeb987aa7775164ab2a0c4ae469c2c75 --- /dev/null +++ b/edge/graph_14503236.jsonl @@ -0,0 +1,7 @@ +{"11841538|14441987": ["Thirdly, in MANET, even though there are various routing protocols proposed for different network scenarios [14], there is no common and widely used standard for routing data in such environment."]} +{"17636287|14441987": ["A detailed review and classification of Routing protocols for Ad Hoc Networks has been given in [7] and [8]."]} +{"17636287|1762301": ["A detailed review and classification of Routing protocols for Ad Hoc Networks has been given in [7] and [8]."]} +{"3500147|44944144": ["Mobile ad hoc network (MANET), which is characterized as multi-hop wireless communications between mobile devices [ 1 ] , will enable more and more multimedia applications such as sharing and exchange of documents, pictures, music, and movies on mobile devices, such as laptop, Personal Digital Assistance (PDA), etc., that can spontaneously self-organize into a communication structure without any fixed infrastructure."]} +{"3500147|2835258": []} +{"44939880|14441987": ["protocols [4]."]} +{"195707785|1230643": []} diff --git a/edge/graph_145048842.jsonl b/edge/graph_145048842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..483cf66e86a355a5fa48d7da339a40f0e9ee7d24 --- /dev/null +++ b/edge/graph_145048842.jsonl @@ -0,0 +1,5 @@ +{"158798753|12925459": ["our PM strategy selects a collection of trading periods that are similar to the kth trading period and we then calculate m\u02c6 and S\u02c6 based on the collection, which is the methodology of Pattern-Matching[11]. The problem remains to be solved is how to define similarity between trading periods, where we define it as the Pearson Correlation between market backgrounds of trading periods. We now go specifica", "n some consecutive trading periods based on investors\u2019 return-risk profile [9], is a crucial problem in both theoretical and practical aspects of finance. There are mainly four types of PM strategies [11] proposed from both industry and academia, i.e. Follow-the-Winner, which allocates wealth to the best performed asset; Followthe-Loser, which allocates wealth to the worst performed asset; Pattern-Mat"]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"41923363|12925459": ["Most of the strategies to be compared in this work were surveyed by Li and Hoi (2014), including Aniticor (Borodin et al., 2004), Online Moving Average Reversion (OLMAR) (Li et al., 2015b), Passive Aggressive Mean Reversion (PAMR) (Li et al., 2012), Con\ufb01-dence Weighted Mean Reversion (CWMR) (Li et\u2026", "Three benchmarks (italic), the integrated CNN (iCNN) previous proposed by the authors (Jiang and Liang, 2017), and some recently reviewed a strategies (Li et al., 2015a; Li and Hoi, 2014) are also tested.", "Traditional portfolio management methods can be classi\ufb01ed into four categories, \u201dFollow-the-Winner\u201d, \u201dFollow-the-Loser\u201d, \u201dPattern-Matching\u201d, and \u201dMeta-Learning\u201d (Li and Hoi, 2014).", "The performance of the three EIIEs are compared with some recently published or reviewed portfolio selection strategies (Li et al., 2015a; Li and Hoi, 2014).", "\u2026Uniform Buy and Hold (UBAH), a portfolio management approach simply equally spreading the total fund into the preselected assets and holding them without making any purchases or selling until the end (Li and Hoi, 2014), and Uniform Constant Rebalanced Portfolios (UCRP) (Kelly, 1956; Cover, 1991).", "The last class, \u201dMeta-Learning\u201d method combine multiple strategies of other categories to attain more consistent performance (Vovk and Watkins, 1998; Das and Banerjee, 2011)."]} +{"53947946|12925459": ["Several major categories of portfolio management approaches including \u201dFollow-the-Winner\u201d, \u201dFollow-the-Loser\u201d, \u201dPatternMatching\u201d and \u201dMeta-Learning Algorithms\u201d have been pro-\n1https://github.com/qq303067814/Reinforcement-learning-in-portfoliomanagement-\nposed.", "Deep reinforcement learning is in fact the combination of \u201dPattern-Matching\u201d and \u201dMeta-Learning\u201d [1]."]} +{"59291986|12925459": ["Classical approaches to this problem include dynamic programming and convex optimization, which require discrete actions and thus suffer from the \u2018curse of dimensionality\u2019 (e.g., (Cover, 1991; Li & Hoi, 2014; Feng et al., 2015))."]} diff --git a/edge/graph_145049282.jsonl b/edge/graph_145049282.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..797e60b012d531016f8d624f69688210386f57cb --- /dev/null +++ b/edge/graph_145049282.jsonl @@ -0,0 +1,37 @@ +{"56895360|53016938": ["As it is categorized in [14], there are three input features heavily used for network traffic classification tasks: time series features (such as packet length and inter-arrival time), statistical features obtained from the entire flow (such as average packet length and average byte sent per\u2026", "Typically, network traffic classifiers use one or combination of the following features [14]: statistical features, time series, and header/payload contents.", "The choice of input features depends on many factors, which are comprehensively explained in [14].", "A survey paper [14] presents a general framework, covering all previous deep learning-based traffic classifiers, was introduced that can deal with any typical network traffic classification task."]} +{"56895360|29145577": ["In pre-deep learning era, traditional machine learning algorithms had been commonly used for traffic classification [16]."]} +{"3725747|393948": ["Representation learning is a new rapidly developing machine learning approach in recent years that automatically learning features from raw data and to a certain extent has solved the problem of hand-designing features [4]."]} +{"3502091|12594004": ["The domain of using machine learning (speci\ufb01cally anomaly detection) for implementing NIDSs was extensively researched in the past [13], [14], [15], [16], [17]."]} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"67865805|13172512": ["Traffic classification [1] [2] [3] plays an important role in troubleshooting the network issues for Internet service provider (ISPs)."]} +{"128543|13172512": ["Finally, approaches based on host communication patterns use heuristics that can effectively complement payload inspection techniques, especially for obfuscated traffic."]} +{"3441568|11246470": ["Anomalybased IDS also have a high false alarm rate (FAR), which seriously restricts its practical application [3].", "The second serious problem of the anomaly-based intrusion detection method is its high FAR, which is a major obstacle to its practical application [3]."]} +{"3441568|393948": ["The representation learning approach [4] is a promising method for solving both these problems."]} +{"20792087|13172512": ["Thus, statistical classification methods circumvent these issues by using payload-independent parameters such as packet length, inter-arrival time and flow duration [1].", "The first survey [1], focuses solely on statistical traffic classification approaches.", "For such approaches, we refer the reader to the survey presented in [1] which performs an exhaustive analysis and comparison between the most significant works based on the mentioned approaches.", "For this evaluation, the common used metrics True Positives (TPs), False Positives (FPs), False Negatives (FNs) and True Negatives (TNs), which are described in detail in [1], are applied.", "date from 2008 and 2009 [1] [2], respectively.", "For a complete description of works published prior to 2008, we refer the reader to the survey presented in [1] since, in the following section we only focus on works published after the mentioned survey.", "In addition, the mentioned surveys [1] [2] solely reported"]} +{"49270387|121289": ["INTRODUCTION More and more Internet of Things (IoT) applications have been deployed in human-centered smart system to enable efficient perception and monitoring of the smart systems like smart home or smart grid [1], [2]."]} +{"35187639|3536399": []} +{"35187639|29145577": ["First, the increasing demand for user\u2019s privacy and data encryption has tremendously raised the amount of encrypted traffic in today\u2019s Internet (Velan et al. 2015).", "Finally, many of the Internet service providers (ISPs) block P2P \ufb01le sharing applications because of their high bandwidth consumption and copyright issues [7].", "According to [5, 6] only 30% to 70% of the current Internet tra\ufb03c can be classi\ufb01ed using port-based classi\ufb01cation methods.", "Furthermore, the increasing demand for user\u2019s privacy and data encryption has tremendously raised the amount of encrypted tra\ufb03c in today\u2019s Internet [4].", "Their scheme was able to identify a broader range of protocols including \ufb01le transfer protocol (FTP), Internet Message Access Protocol (IMAP), SSH, and TELNET with accuracy up to 87%.", "A VPN is a private overlay network among distributed sites which operates by tunneling tra\ufb03c over public communication networks (e.g., the Internet).", "Emergence of new applications as well as interactions between various components on the Internet, have dramatically increased the complexity and diversity of this network which makes the tra\ufb03c classi\ufb01cation a di\ufb03cult problem per se.", "VoipBuster is an application which o\ufb00ers voice communications over Internet infrastructure.", "Traffic classification has attracted a lot of interests in both academia and industrial activities related to network management (e.g., see Dainotti et al. 2012; Finsterbusch et al. 2014; Velan et al. 2015) and the references therein).", "Tor was proposed to protect users against Internet surveillance known as \u201ctra\ufb03c analysis.\u201d"]} +{"7810393|29145577": []} +{"36992736|13172512": ["We compare our method with other 4 popular classifiers including Support Vector Machine (SVM), MultiLayer Perception (MLP), Na\u0131\u0308ve Bayes Classifier (NB) and Decision Tree (DT) which has been widely used for IP traffic classification in literature [13].", "Accurate IP traffic classification is the key step towards Quality of Service, pricing, network intrusion detection, malware detection etc, and thus attain persistent attention from the networking and machine learning communities over the decades [1], [3], [4], [12], [13]."]} +{"705210|18654252": ["The aim of anomaly detection or outlier detection is to separate anomalous and normal data by using machine learning techniques [5].", "In unsupervised training, the model is trained using completely unlabeled data and then in the test stage, the trained model tries to cluster the anomalous and normal data into separate clusters [5].", "An anomaly detection model can be trained in supervised, unsupervised [5] or semi-supervised manner [7]."]} +{"705210|7158350": ["They are appropriate for classification tasks because of their ability to convergence to complex decision boundaries due to their non-linear activation functions [14], [15]."]} +{"32277598|44414506": ["Overall, the results in this section show that using ACGAN to generate synthesized data for network traffic classification problem helps improving the performance of supervised learning algorithms in solving compared to using synthesized data and some recent techniques for handling imbalanced data such as SMOTE-SVM [17],BalanceCascade [15].", "The second augmented dataset is synthesized by the ensemble BalanceCascade technique which is the best method to handle imbalanced dataset that is created from 10000 random samples with two classes [15]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"126933467|13172512": ["The above reasons are being motivating the advanced research on ML-based NTC, since ML essentially provides accurate and fast classifiers respecting users\u2019 privacy [1]\u2013[3]."]} +{"31403034|13172512": ["There are several approaches to NTC: port-based, payload-based, and \ufb02ow statistics-based [3], [4].", "These methods usually rely on machine learning techniques to perform service prediction [3]."]} +{"3720713|29145577": ["According to the difference of ISO/OSI layer, traffic encryption techniques can be divided into application layer encryption, presentation layer encryption and network layer encryption [2].", "[2] on 26 papers about encrypted traffic classification in the 2005-2015 period, 12 papers use flow features, while 5 papers use packet features, 7 papers use the combination of flow and packet features and 2 papers use other features.", "There are two main types of features which are most frequently used by those researches [2]: flow features (e.", "[2] on 26 papers about encrypted traffic classification in the 2005-2015 period, only 6 papers used public dataset."]} +{"24944315|13172512": ["Clearly, at some point labels have to be attached to be able to compare the mechanisms, but the actual learning is independent of pre-labeled flows that are hard to obtain in good quality and/or high numbers [2], [9].", "Currently, Internet traffic classification is used to improve Quality-of-Service (QoS) or Quality-of-Experience (QoE) [2], [3].", "The survey of Nguyen and Armitage [2] compares the results of various machine learning approaches applied to network traffic classification."]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"53016921|10064368": ["6) The max pooling in the second layer has a size of [2,2] and step size 2.", "In each step, the max pooling processes a [2, 2] input as follows:", "INTRODUCTION A smart home has a network that supports various types of smart devices, including home automation, health care and entertainment [1], [2].", "Smart devices can be generally divided into three types: home automation, healthcare and entertainment [2]."]} +{"53016921|393948": ["Recently, researchers have tried to apply deep learning [34], [35] to traffic classification [36], [37]."]} +{"53016921|13172512": ["Traffic classification has been widely studied in the network management domain with three major approaches, port based [25]\u2013[27], statistical approach [28], [29] and payload based [21], [22], [30], [31].", "Besides some customized statistical methods, many researcheswere carried out usingMachine Learning (ML) algorithms [29], [32], [33]."]} +{"14042725|10693567": ["Being one particular technology for Software-Defined Networking (SDN), it separates the control plane and data plane of networking devices [22]."]} +{"14042725|13456854": ["Since IPFIX is still in its early days and NetFlow deployment is far more mature [3], most literature on flow data artifacts is about NetFlow (especially v9).", "For example, a recent survey among both commercial and research network operators has shown that 70% of the participants have devices that support flow export [3]."]} +{"14042725|8364569": ["The central observation points at which flow export devices are usually deployed make flow export especially useful for the detection of the following attacks and malwares [84]: DDoS attacks, network scans, worm spreading, and botnet communication.", "survey on flow-based intrusion detection provided in [84]."]} diff --git a/edge/graph_145052378.jsonl b/edge/graph_145052378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..badac54a64d7b0463a4d06afd53629a361677e23 --- /dev/null +++ b/edge/graph_145052378.jsonl @@ -0,0 +1,15 @@ +{"22582078|9495329": ["However, an interesting argument of the works covered in [213] is that IoT urban deployments should allow for the same set of sensor nodes to support multiple applications from multiple developers across the same shared physical infrastructure via software only.", "Moreover, substantial research on interconnecting Wireless Sensor Networks (WSNs) into wider IoT frameworks by leveraging SDN and virtualization has already been completed [213], [218].", "We mention this work to provide another aspect of emerging technologies with regard to SDN-IoT infrastructure, and refer the reader to [213], [221], for a more complete overview.", "As a result, anywhere from 20 billion to 50 billion devices are projected to connect to the Internet by 2020 [213], and many network operators are also trying to adapt their networks for what is now being dubbed the Internet of Things (IoT).", "However, work to optimize \ufb02ow scheduling for the backbone network is still not fully developed [213].", "\u2026of application requirements as they relate to QoS and geographical sensor location, inner sensor node con\ufb01gurations, sharing of sensors amongst competing applications, transmitting optimized and QoS-aware data \ufb02ows towards end-servers, and ef\ufb01cient distribution of data for cloud processing [213].", "Additionally, fully centralized SDN controller architectures do not adequately address the different access networks expected to comprise the urban-scale IoT mobile multi-networks, such as LTE, WiFi, or ZigBee [213].", "For instance, the concept of Information-Centric Network (ICN) is combined with virtualization in [213] and [226] to provide network slicing and node caching within a wireless network.", "While we provide a brief description below, we refer the reader to [213] and [221] for further details.", "For instance, a natural application to address the heterogeneous QoS requirements of IoT is to include network slicing [213]."]} +{"22582078|6583734": ["A greater variety of network functions considered for NFV can be found in [2] and [114]."]} +{"22582078|2623404": ["Network operators are also challenged to address new routing protocols aimed at improving efficiency of content delivery and content availability for their clients [2], [58].", "One such architecture is Information-Centric Networking (ICN) or Content-Centric Networking (CCN) where packets are routed based on desired content instead of traditional, location-based, addressing [58]."]} +{"51868940|12815020": ["It can be designed based on detection techniques, deployment location, and alert mechanism (Abraham et al. 2007; Modi et al. 2013)."]} +{"3947719|2387055": ["Applications running on the controller can be used to correlate threats from different security assessment tools and take necessary action as noted in et al [18]."]} +{"108393727|12815020": []} +{"108393727|13785718": []} +{"2943343|1708582": []} +{"14681173|206584087": ["While there have been plenty of detection and mitigation mechanisms for DDoS [4], they become obsolete due to the recent shift of the attacked targets, from directly attacking a specific target to indirect attack (e.g., [5] [6])."]} +{"5164729|12815020": ["In this subsection, we discuss the techniques used to detect malware and the measures for each step of an APT attack [9,10]."]} +{"38199539|2623404": [", protocols, topology) [8], [9]."]} +{"67909666|206990002": []} +{"67909666|3330313": ["Approaches and Methods: Hodge and Austin [48] have surveyed different outlier (anomaly) detection approaches and methodologies.", "In addition to the anomaly detection techniques classi\ufb01ed and discussed by Hodge and Austin [48], Chandola et al. discussed two other anomaly detection techniques\u2014information theoretic anomaly detection techniques and spectral anomaly detection techniques, both of which can operate in unsupervised\u2026"]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} diff --git a/graph_145081.jsonl b/edge/graph_145081.jsonl similarity index 100% rename from graph_145081.jsonl rename to edge/graph_145081.jsonl diff --git a/edge/graph_14512151.jsonl b/edge/graph_14512151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59b3a05cc9146f3ac250ca1f4225526355e78e56 --- /dev/null +++ b/edge/graph_14512151.jsonl @@ -0,0 +1,5 @@ +{"9499943|6952653": ["Such an architecture is hybrid, according to the terminology found in [43].", "Even if this point of view leads to a weak notion of what an agent is [43], it is sufficient to model complex systems for simulation needs and to help in understanding their behavior."]} +{"142016|534755": ["Diverse formalisms are used for modeling biological systems ( de Jong 2002 ); among them traditional continuous, deterministic, macro models can be found as well as a variety of discrete event modeling formalisms (Ewald et al. 2007), like stochastic pi, stochastic petri nets, state charts, or DEVS.", "Diverse formalisms are \nused for modeling biological systems(de Jong 2002); among them traditional continuous, deterministic, \nmacro models can be found as well as a varietyof discreteevent modeling formalisms(Ewaldetal."]} +{"26506436|1704452": ["\u2026differential equations (PDEs), one important limitation of this method is that PDEs may not capture the discrete nature of multicellular biological systems consisting of individual cells and can become cumbersome when solving complex processes involving several variables (Hwang et al. 2009)."]} +{"6861628|2798946": ["1 INTRODUCTION Environments \nplay an important role in the functioning of multi-agent systems, as agents being situated is one of \ntheir salient features (Weyns et al. 2005; Platon et al. 2006; Wooldridge 2009).", "MODELING AGENTS AND THEIR ENVIRONMENT IN MULTI-LEVEL-DEVS Alexander Steiniger \nFrank Kr \u00a8 uger Adelinde M. Uhrmacher University of Rostock Albert-Einstein-Stra\u00dfe 22 D-18059 Rostock, \nGERMANY ABSTRACT Environments play an important role in multi-agent systems.", "The environment can \nbe perceived as constraining the interaction between agents (Platon et al. 2006), but also as a shared \nmedium for interaction, e.g., deploying pheromones in the environment (Parunak 1997)."]} +{"352885|14370469": ["Alternatively, statistical methods and data mining may be employed to find predictive relationships between variables belonging to different domains (Zwick 2004; Klir 1975, 1976)."]} diff --git a/edge/graph_14513433.jsonl b/edge/graph_14513433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14514583.jsonl b/edge/graph_14514583.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3e10680feb170184ab40e6afee1a0076cf09cf7 --- /dev/null +++ b/edge/graph_14514583.jsonl @@ -0,0 +1,2 @@ +{"9124911|141053": ["Several good surveys [ 11 ], [12] have been conducted for QoS support in multihop networks."]} +{"14232575|41035405": []} diff --git a/edge/graph_14516538.jsonl b/edge/graph_14516538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14519452.jsonl b/edge/graph_14519452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69994a05f2f95ef45dfaab625014d1d8113e1042 --- /dev/null +++ b/edge/graph_14519452.jsonl @@ -0,0 +1,4 @@ +{"39456899|1236072": ["Hierarchical protocols aim at clustering the nodes so that cluster heads can do some aggregation and reduction of data in order to save energy [8]."]} +{"14324222|1230643": []} +{"7465328|1236072": ["To limit the number of communications, because they consume a lot of energy, wireless sensor networks need protocols with effective routes [8]."]} +{"7465328|1230643": ["Wireless sensor networks are specific ad-hoc networks [7] with a larger number of nodes, a limited energy and a lower computing power."]} diff --git a/edge/graph_14520202.jsonl b/edge/graph_14520202.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1e03be5efa96316acc2411bb6e1855c73404553 --- /dev/null +++ b/edge/graph_14520202.jsonl @@ -0,0 +1,12 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"9935055|206764452": ["In this section we present an overview of current pedestrian detection algorithms, with particular focus on motion-based methods."]} +{"1115082|206764452": ["Meanwhile, pedestrian detection is also a key module in the Advanced Driver Assistance System (ADAS) for intelligent vehicles to realize automatic collision avoidance [2]."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"14420606|12127129": ["The MOG-algorithm is widely used for background subtraction because of its accuracy [ 21 ]."]} +{"15441533|2113024": ["From this observation, many method s to detect human beings were developed in computer vision based on monocular or stereoscopic images [3] [4]."]} +{"7309016|206764452": ["However, it is difficult to detect pedestrians accurately in various scenes by obtaining training samples."]} +{"15440950|206764452": ["For a comprehensive survey of recent works in visionbased pedestrian detection, refer to [7], [15].", "[15] focuses on pedestrian protection systems for advanced driver assistance systems which utilize tracking, scene geometry, and stereo systems."]} +{"42907459|206764452": ["Most surveys in this field are based on monocular pedestrian detection [1] [2] [3] [4] [5] [6] [7]."]} +{"42907459|1029120": []} +{"10729633|206764452": ["In addition to the references presented here, other comprehensive surveys have been recently published [8], [9], which broadly review the topic of shape-based methods."]} diff --git a/edge/graph_145218979.jsonl b/edge/graph_145218979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14521941.jsonl b/edge/graph_14521941.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1b7f728807154976a905659ba8f9eccb6de2bff --- /dev/null +++ b/edge/graph_14521941.jsonl @@ -0,0 +1,2 @@ +{"46192146|13407802": ["Winkler has provided several overview papers on the use of record linkage in the context of privacy [265, 268, 269, 270], and so we will briefly mention some related results.", "frequently used to estimate re-identification probabilities: the probabilities that users in a data set can be re-identified through auxiliary data [268].", "For an overview of different identification rules, see [268, 269, 270]."]} +{"46192146|2318389": ["For a survey of such attacks, see [162].", "An important attack not covered in [162] is the use of linear programming [74, 88]."]} diff --git a/edge/graph_14526964.jsonl b/edge/graph_14526964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c5958919023465b0fa1363ad166e2ae4ee30222 --- /dev/null +++ b/edge/graph_14526964.jsonl @@ -0,0 +1,6 @@ +{"31964589|5473785": []} +{"9115562|16717715": []} +{"6832395|5818865": ["The problems in this domain typically start off with a collection of objects at various locations in various cities, and the goal is to redistribute these objects to their new locations."]} +{"1708582|17464562": []} +{"7885581|1708582": ["Since tabled Q-learning is exploration insensitive\u2014i.e., the Q-values will converge to the optimal values, independent of the exploration strategy used ( Kaelbling, Littman, and Moore, 1996 )\u2014the non-optimality of the used policy will have no negative effect on the convergence of the Q-table.", "This also illustrates that the exploration insensitivity of table-based Q-learning ( Kaelbling, Littman, and Moore, 1996 ) does not carry over to Q-learning with generalization.", "The RRL algorithm explores the state space using Boltzmann exploration (Kaelbling, Littman, and Moore, 1996) based on the values predicted by the partial Q-function.", "Since tabled Q-learning is exploration insensitive\u2014i.e., the Q-values will converge to the optimal values, independent of the exploration strategy used (Kaelbling, Littman, and Moore, 1996)\u2014the non-optimality of the used policy will have no negative effect on the convergence of the Q-table."]} +{"986257|14441987": ["The Distance Vector Routing (DVR) algorithm is widely used in network routing (Royer & Toh, 1999)."]} diff --git a/graph_1452734.jsonl b/edge/graph_1452734.jsonl similarity index 100% rename from graph_1452734.jsonl rename to edge/graph_1452734.jsonl diff --git a/edge/graph_14527507.jsonl b/edge/graph_14527507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f44a05360c7c461b8f320a09f1bf83261861e4c5 --- /dev/null +++ b/edge/graph_14527507.jsonl @@ -0,0 +1,22 @@ +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"649820|4395259": ["A detailed investigation of the impact of multiuser interference on the secrecy performance was carr ied out in [27], and thus multiuser scheduling was called for secrecy performance enhancement."]} +{"17591210|11720829": ["THE SUCCESS story of MIMO technology in terrestrial applications now spans more than a decade with spectacular results, as it offers substantial leverage in realizing the next generation gigabit wireless [1].", "[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"17591210|18148591": ["[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"7977582|4395259": ["Recently, physical-layer security (PLS) approaches have attracted a great deal of attention in the information-theoretic society since the accompanying techniques can afford an extra security layer on top of the traditional cryptographic approaches [18]\u2013[24]."]} +{"8729097|30443041": ["In other words, the channel-diagonalizing property still holds for some particular kinds of statistical CSIT."]} +{"706371|18148591": ["Inter-cell interference is treated as noise at the receiver side and is handled by resorting to improved point-to-point communications between the base station (BS) and the mobile station (MS), using efficient coding and/or single-link multiple-antenna techniques [2]."]} +{"7286287|18148591": ["This is an expansion of the analysis presented in [15] for CDMA communications and therefore it is directly linked to it.", "This relation comes from the fact that channel taps in MIMO systems have an effect similar to the one from spreading signatures in CDMA [16].", "Although the analysis in [15] is done for multiple access interference (MAI) present in code division multiple access (CDMA) schemes, it can be modified and applied to the ICI that exists in MIMO systems as will be shown in this paper."]} +{"13738536|29464310": ["This might occur due to CSIT inaccuracy, highly correlated multiuser channels (IUI), and irreducible ICI."]} +{"13738536|8323234": ["hardware characteristics [193], [197], [253].", "digital and analog precoders [188], [193], [197], [256], [258]."]} +{"13738536|6407074": ["For instance, EE has been jointly optimized with peak rates, WSR, or load balance in heterogeneous networks, see [291], [292], [293], [294] and references therein."]} +{"13738536|206576720": ["known as massive MIMO or large-scale MIMO [12], [13], few hundreds of antennas are employed at the BS to send simultaneously different data streams to tens of users.", "of wireless networks, where new and evolving technologies such as mmWave and massive MIMO have already been considered [13], [197], [332], [333].", "domains can provide significant gains in throughput and EE [13], [49], [315], [316].", "These schemes rely on instantaneous or statistical CSI, and can be classified as [13]: hierarchical and coupled precoders.", "Spatial clustering based on k, \u2200k, has been recently proposed to identify users with similar channel statistics in massive MIMO settings, see [13], [129], [138]."]} +{"13738536|8462498": ["Other methods for channel estimation are described in [215] and references therein.", "standard will define the conditions and methods for user grouping/association [215]."]} +{"32602976|11720829": []} +{"32602976|7892994": []} +{"13172835|13074005": ["First, in SK-based transmission techniques, a block of bits is mapped to spatial positions of the transmit antennas in the array [23]\u2013[28]."]} +{"37925315|12681089": []} +{"18194124|6779551": [", [2]) and proactive eavesdropping [4]\u2013[8] are two approaches implemented at the physical layer, in which authorized parties can deploy dedicated wireless monitors to overhear the targeted wireless communications, especially the"]} +{"15595880|1123458": ["This uncertainty model will be considered in Section V."]} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"5412001|19938676": ["identified as a key technology in the architecture for 5G cellular networks [5], [125], [126]."]} diff --git a/edge/graph_145281.jsonl b/edge/graph_145281.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14529270.jsonl b/edge/graph_14529270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9956b865d7f82a4cc376dc25065d6dd63b15c2c0 --- /dev/null +++ b/edge/graph_14529270.jsonl @@ -0,0 +1,7 @@ +{"7082026|11239740": ["Ananger and Little [4] presented a survey in video indexing, including some techniques for temporal video segmentation mainly in uncompressed domain."]} +{"14468987|1099309": ["For instance, the MPEG-7 Visual Part [15] supports color (e.g. dominant colors, color layout), texture, shape (e.g. region/contour-based), and motion (local or global) descriptors .", "Although the construction of the VDO is tightly coupled with the specification of the MPEG-7 Visual Part [18], several modifications were carried out in order to adapt to the XML Schema provided by MPEG-7 to an ontology and the data type representations available in RDF Schema.", "For instance, the MPEG-7 Visual Part [15] supports color (e."]} +{"14468987|13365762": ["Although new multimedia standards, such as MPEG-4 and MPEG-7 [1], provide important functionalities for the manipulation and transmission of objects and associated metadata, the extraction of semantic descriptions and annotation of the content with the corresponding metadata is out of the scope of these standards and is left to the content manager."]} +{"7531257|7185733": ["The choice of FSMs is motivated by the advantages in dealing with multiple sources of observation, as opposed to standard HMMs [14]; another advantage is the simplicity in modeling the temporal duration of the highlights, as opposed to other techniques such as coupled HMMs or dynamic Bayesian networks [3, 5, 16].", "In particular, standard HMMs perform well when dealing with single-object actions (such as the recognition of a hand movement [14]), but tend to fail when discrete observation variables may assume a high number of different values and comes from multiple sources of observation (as in the case of games where visual cues are observed over the whole playfield).", "Recognition of relevant soccer highlights (free kicks, corner kicks, and penalty kicks) was presented in [1]: HMMs encoding players\u2019 distribution and camera motion were used to discriminate between the three highlights.", "The same sport has been studied using hidden Markov models (HMMs) to detect play/break segments in [13].", "This problem can be tackled by factorizing state and observation variables, and, hence, deriving a more complicated HMM topology like coupled HMMs [5], or a generic dynamic Bayesian network [16].", "hand movement [14]), but tend to fail when discrete observation variables may assume a high number of different values and comes from multiple sources of observation (as in the case of games where visual cues are observed over the whole playfield)."]} +{"162180|9045232": ["Over the years various methods for the detection of faces in images and image sequences are reported, see [95] for a comprehensive and critical survey of current face detection methods.", "Face detection techniques aim to identify all image regions which contain a face, regardless of its three-dimensional position, orientation, and lighting conditions used, and if present return their image location and extents [95]."]} +{"162180|192934": ["According to [37] the four best approaches for pattern recognition are:", "\u2022 Bayes classifier: assigns a pattern to the class which has the maximum estimated posterior probability [37]; \u2022 Decision tree: assigns a pattern to a class based on a hierarchical division of feature space [37]; \u2022 k-Nearest neighbor: assigns a pattern to the majority class among the k patterns with smallest distance in feature space [37]; \u2022 Hidden Markov model (HMM): assigns a pattern to a class based on a sequential model of state and transition probabilities [46, 69];"]} +{"6968858|13365762": ["In 1998, first MUVIS system has been implemented for indexing large image databases and retrieval via search and query techniques based on semantic and visual features [15]."]} diff --git a/edge/graph_14532963.jsonl b/edge/graph_14532963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4cda3d2039fed3450bdc14ee2b7bfe0a4d47923b --- /dev/null +++ b/edge/graph_14532963.jsonl @@ -0,0 +1,4 @@ +{"6106791|1902238": []} +{"3970771|2616070": []} +{"60319694|1902238": ["We refer the reader to [2,3] for detailed reviews on the topic."]} +{"1902238|2616070": ["Methods based on a statistical model mainly fall into three categories: shape prior segmentation (Cremers et al., 2007), active shape and appearance models (Heimann and Meinzer, 2009) and atlas-based segmentation techniques (Rohlfing et al."]} diff --git a/graph_1453418.jsonl b/edge/graph_1453418.jsonl similarity index 100% rename from graph_1453418.jsonl rename to edge/graph_1453418.jsonl diff --git a/graph_1453547.jsonl b/edge/graph_1453547.jsonl similarity index 100% rename from graph_1453547.jsonl rename to edge/graph_1453547.jsonl diff --git a/edge/graph_14536942.jsonl b/edge/graph_14536942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3d0c66cf6a83051188a47f5f31e5732655b527e --- /dev/null +++ b/edge/graph_14536942.jsonl @@ -0,0 +1,4 @@ +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"14660200|991041": ["Other works such as [39] aim at modeling routing strategies as solutions of a constrained optimization problem, which is related to our contribution (routing as a multi-commodity flow problem) but their focus is set on wired networks."]} +{"17148609|10559330": ["In [5] the work is divided into two parts: the first part, the compared protocols are: AODV, DSR, DSDV and OLSR, using a fixed topology and other mobile on wireless mesh network with NS -2."]} +{"7764499|1230643": ["Figure 2 shows the throughput comparison between our algorithm and the two representative routing algorithms in the literature: minimum energy routing and max-min routing [1] (See Section I for a brief description of these two algorithms).", "However, studies on shortrange communication with low radiation power show that the transmission and reception energy costs could nearly be the same [1]."]} diff --git a/edge/graph_14540337.jsonl b/edge/graph_14540337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14541779.jsonl b/edge/graph_14541779.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14543002.jsonl b/edge/graph_14543002.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2577578a9f21a0faa8beeb1dedc49fcb6f51c12f --- /dev/null +++ b/edge/graph_14543002.jsonl @@ -0,0 +1,19 @@ +{"501534|7788290": ["Visual analysis of human movements [ 1 ] concerns the detection, tracking and recognition of people, and more generally, understanding of human activities."]} +{"2371570|14970359": ["In computer vision research, human motion has been studied intensively [32], and there are a number of works on human gait analysis and recognition."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"9194043|7788290": ["from videos. A survey of work in human motion analysis can be found in [ 48 ]."]} +{"13374207|17516538": ["Keywords: Gait, silhouette, Fourier descriptor, histogram matching, dynamic time warping, Krawtchouk moments."]} +{"18585846|14970359": ["Our indexing and sequencing-based approach differs from all the methods surveyed by Gavrila [10] and Moeslund and Granum [17] since it combines the static and dynamic recognition approaches.", "More recently, there has been a survey by Moeslund and Granum [17] which describes various computer vision-based human motion capture."]} +{"18585846|7788290": ["However, since this paper is focused on a novel method for human activity recognition and since there are many other methods for human tracking (see a survey in [ 10 ]), we shall describe our method very briefly in the Appendix.", "A paper by Gavrila [ 10 ] is an excellent reference which conducts an intensive survey on the different methodologies for visual analysis of human movement.", "Our indexing and sequencing-based approach differs from all the methods surveyed by Gavrila [ 10 ] and Moeslund and Granum [17] since it combines the static and dynamic recognition approaches."]} +{"1022120|1634674": ["Detailed surveys can be found in several papers including [1]."]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"29629802|7788290": []} +{"7693282|14970359": ["A more recent, extensive survey [10] looks at more than 130 publications in computer vision-based human motion analysis and classifies them based on the issues addressed: Initialization (eight publications), tracking (48 publications), pose estimation (64 publications), and recognition (16\u2026"]} +{"7693282|7788290": []} +{"11042075|12127129": ["The most widely used method is background subtraction, which attempts to separate objects from the difference between the modeled background and the current frame [5]."]} +{"2338294|7788290": ["\u2026while most of the multimedia documents available nowadays are in the MPEG [21] compressed form, to facilitate easy storage and transmission, majority of the existing techniques for human action recognition are pixel domain based [35,8,27,5,32,13,1,26] which are computationally very expensive."]} +{"13874338|7788290": ["There have been some allied studies such as biomechanics [21], physical medicine studies for therapy [38], psychological studies [37], and approaches aiming to model and track a human through an image sequence, though usually not for recognition [17], [25], [2], [15].", "There has been a rich amount of work on human modeling and tracking [17], [25].", "VISUAL analysis of human motion [17], [25] attempts to detect, track, and identify people, and, more generally, to understand human behaviors from image sequences involving humans."]} diff --git a/edge/graph_14543932.jsonl b/edge/graph_14543932.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..389f3d9be5360f10daf0bfed0668a764e5cc20ce --- /dev/null +++ b/edge/graph_14543932.jsonl @@ -0,0 +1,6 @@ +{"34137276|18685876": ["In the future it would be wise to think about the security aspect of the ISL and overall\ndistributed wireless network.", "To implement ISL link to utilize a different frequency band such as Ka or X band for\nhigh data rate applications and gain high bandwidth, we could simply change some code as well as the FPGA board to reflect this.", "Due to the movement of LEO satellites along orbits, communication devices cannot be optimized for static geometric parameters only; otherwise the performance of ISL communication between satellites will degrade with time [53].", "Establishment and stability of the ISL are impacted by factors such as the satellite orbit and attitude, antenna configuration, constellation topology, mobility, and link range.", "The physical layer, related to the trade-offs among several system drivers such as power, frequency, data rate, and bandwidth, has been found to be of primary concern, since it has the largest role to play when it comes to reliable and efficient communication via ISL [38].", "The results below in Figure 9, from [35] prove that IEEE 802.11 is feasible for ISL range for up 10 km by redefining the inter-frame delays without any modifications to the standard.", "The constant changing of position of the LEO satellite and effects of noise and fading can cause the geometric parameters of the ISL to vary significantly.", "The solution proposed is the use of SDR as a reconfigurable and adaptive tool for designing the ISL.", ".................................................................................................. 54\nList of Acronyms\nADC \u2013 Analog Digital Converter AES \u2013 Advanced Encryption Standard AWGN \u2013 Additive White Gaussian Noise BER \u2013 Bit Error Rate BPSK \u2013 Binary Phase Shift Keying CDMA \u2013 Code Division Multiple Access CLIDE - Cross Link Integrated Development Program COM DEV- Communications Development COTS - Commercial-Off-The-Shelf CPU \u2013 Central Processing Unit CRC \u2013 Cyclic Redundancy Check CSI \u2013 Channel Side Information DAC \u2013 Digital Analog Converter DDC - Digital Down Converter DICE - Dynamic Ionosphere CubeSat Experiment DSA - Dynamic Spectrum Access DS CDMA \u2013 Direct Sequence Code Division Multiple Access DSP \u2013 Digital Signal Processor DSS \u2013 Distributed Space System DUC \u2013 Digital Up Converter FDMA \u2013 Frequency Division Multiple Access FFT \u2013 Fast Fourier Transform\nFOB \u2013 Security token FPGA \u2013 Field Programmable Gate Array FSK \u2013 Frequency Shift Keying FTP \u2013 File Transfer Protocol GEO \u2013 Geostationary Earth Orbit GNSS \u2013 Global Navigation Satellite System GPS \u2013 Global Positioning System GPSDO \u2013 Global Positioning System Disciplined Oscillator GRC \u2013 GNU Radio Companion GSM \u2013 Global System for Mobile HTTP \u2013 Hypertext Transfer Protocol IF \u2013 Intermediate Frequency ISL \u2013 Inter Satellite Link ISM \u2013 Industrial Scientific and Medical ISS \u2013 International Space System JHU APL \u2013 John Hopkins University Applied Physics Laboratory LEO \u2013 Low Earth Orbit MAC \u2013 Media Access Control MEO \u2013 Medium Earth Orbit MIMO \u2013 Multiple Input Multiple Output MPSK \u2013 Minimum Phase Shift Keying MQAM \u2013 M-ary Quadrature Amplitude Modulation NASA \u2013 National Aeronautics and Space Administration\nNTP \u2013Network Time Protocol OFDM \u2013 Orthogonal Frequency Division Multiplexing OSI \u2013 Open Systems Interconnection PLL \u2013 Phase Locked Loop PSK \u2013 Phase Shift Keying RF \u2013 Radio Frequency SCAN - Space Communications and Navigation SNR \u2013 Signal to Noise Ratio SBX \u2013 Transceiver name SDR \u2013 Software Defined Radio SLV \u2013 Small Launch Vehicle STRS \u2013 Space Telecommunication Radio System TCP/IP \u2013 Transmission Control Protocol/Internet Protocol TDMA \u2013 Time Division Multiple Access TFTP - Trivial File Transfer Protocol UDP/IP \u2013 User Datagram Protocol/Internet Protocol UHD \u2013 USRP Hardware Driver UHF \u2013 Ultra High Frequency USRP \u2013 Universal Software Radio Peripheral VHDL \u2013 VHSIC Hardware Description Language VHF \u2013", "The SDR application in the ISL enables this system to perform ISL communication up to 10 km in range [33].", "LEO is advantageous in sending small satellites into orbit, running the experiments, and returning them in a relatively short time as well as ISL\u2019s in LEO utilizing Radio Frequency (RF) or laser/optical transmission technologies.", "S-band is chosen as the frequency for the ISL due to achievable high data rates, which in turn assists in faster exchange of data.", "The majority of CubeSat projects in the last eight years, and that are planned to launch in the next two years still\nutilize transceivers and beacons downlinking in the UHF band with no ISL [34].", "GNU Radio comes with several pre-built modulation and encoding packages that can support our small satellite and the ISL.", "An alternative option for multiple accesses could be the implementation of IEEE 802.11 physical layer and MAC layer integrated with smart antennas for ISL applications.", "However, in [36] a self-steering array that permits secure ISL communication between small satellites moving randomly in space is proposed and proven by the author.", "The inter-satellite link (ISL) allows the satellites to\nexchange information and share resources to achieve the performance goal while reducing the traffic load to ground.", "Inter-satellite links (ISL) enable the satellites to exchange information and share resources while reducing the traffic load to the ground.", "The transmission range of the ISL is said to be between 10-20 km with data rates of 3-8 Mbps.", "Areas of inquiry for small satellites using software defined have included space and\npower limitations, data rates, radio frequency allocation, ISL optimization using IEEE 802.11, and antenna design for ISL.", "In regards to the implementation of SDR\u2019s for ISL, Tethers Unlimited SWIFT-RelNav\n[33] is a SDR RF-based system that provides relative range and attitude determination capabilities as well as inter-satellite communications.", "An ISL equipped with SDR can\nenable changes in protocols for different frequency bands, such as Ka band or X band, for high data rate applications and higher bandwidth.", "utilize transceivers and beacons downlinking in the UHF band with no ISL [34].", "The idea of using other physical layer models for space communications, primarily for\nISL has been discussed but never implemented.", "The optimization of the ISL has been achieved by designing a DS-CDMA communication using SDR. Figure 1 shows a diagram of the Galileo Atmospheric Data Enhancement Mission, GADEM, used for measuring atmospheric data to improve Galileo navigation data by using two K-band frequencies [52].", "The benefits of SDR in small satellites such as, cognitive and adaptive operation, multi-mode operation, radio reconfiguration, and remote upgrade are some of the elements the ISL will be able to exhibit.", "The self-steering features of retro-directive antennas make them attractive for secure\nsmall satellite ISL applications.", "This would be ideal for short range LEO clusters in formation flying missions while IEEE 802.16 would be ideal for ISL lengths of few hundred kilometers [54]."]} +{"25152758|11720829": ["ISSN 1045-9243/2012/$26 \u00a92014 IEEE As new requirements for greater bandwidth, higher data rates, and improved quality of service (QoS) emerge, the multiple-input multiple-output (MIMO) technology [4] has played an important role in revolutionizing terrestrial wireless networks, leading to growing acknowledgement from the research community, industry, and wireless standardization bodies, e.", "As new requirements for greater bandwidth, higher data rates, and improved quality of service (QoS) emerge, the multiple-input multiple-output (MIMO) technology [4] has played an important role in revolutionizing terrestrial wireless networks, leading to growing acknowledgement from the research community, industry, and wireless standardization bodies, e."]} +{"36362781|18685876": []} +{"31417645|8974063": []} +{"17591210|11720829": ["THE SUCCESS story of MIMO technology in terrestrial applications now spans more than a decade with spectacular results, as it offers substantial leverage in realizing the next generation gigabit wireless [1].", "[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"17591210|18148591": ["[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} diff --git a/edge/graph_14550243.jsonl b/edge/graph_14550243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14552902.jsonl b/edge/graph_14552902.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..439b781fbb3a1a6f2fc45ca7768e0aad99b0e8d3 --- /dev/null +++ b/edge/graph_14552902.jsonl @@ -0,0 +1,4 @@ +{"260331|2835258": []} +{"260331|41035405": []} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"6090100|41035405": ["In contrast, cooperative diversity schemes proposed by the information theory community [20, 14] suggest that traditional routing may not be the best approach."]} diff --git a/edge/graph_14553382.jsonl b/edge/graph_14553382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14558197.jsonl b/edge/graph_14558197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14561706.jsonl b/edge/graph_14561706.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bb447c2c8acf25c983e84707e1ca6704a926a87 --- /dev/null +++ b/edge/graph_14561706.jsonl @@ -0,0 +1,2 @@ +{"17278270|7360895": []} +{"1846400|7360895": [", they outwardly appear to be socially intelligent, even if the internal design does not have a basis in cognitive science) [8].", "This capability can be dynamic and may include a user model that helps the robot recognize human behavior and react appropriately [8]."]} diff --git a/edge/graph_14561955.jsonl b/edge/graph_14561955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2250f5095246aa26b81e166f1a4f133769117f3 --- /dev/null +++ b/edge/graph_14561955.jsonl @@ -0,0 +1,3 @@ +{"44962053|14561955": []} +{"11411815|14561955": ["[14] surveyed the most of the recent results in online buffer-management policies for different switch architectures and queueing models."]} +{"11722620|14561955": []} diff --git a/edge/graph_14575782.jsonl b/edge/graph_14575782.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7cd007a98a703a8862508f0b0d2a43b49d4e8717 --- /dev/null +++ b/edge/graph_14575782.jsonl @@ -0,0 +1,3 @@ +{"62675271|54009499": ["For example, Sen et al. [1] provide a framework for studying due date related scheduling problems, Allahverdi et al. [2] review scheduling research involving setup consideration, Sox et al. [3] review the stochastic lot scheduling problem, and Drexl and Kimms [ 4 ] survey the lot sizing and scheduling issues."]} +{"62675271|62204132": ["Potts and Van Wassenhove [ 5 ], Albers and Brucker [6], Webster and Baker [7], Brucker et al. [8], and Potts and Kovalyov [9] provide a good analysis of both types of scheduling with batching."]} +{"6849168|7773456": ["Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12.0). BrumeUe & Sidney [1982] show that Johnson's [1954] algorithm for F21 I C max also applies to the exponential case.", "Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12."]} diff --git a/edge/graph_14578535.jsonl b/edge/graph_14578535.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e65c87e13d21165729a07d81c8b6dcf0f433f5cb --- /dev/null +++ b/edge/graph_14578535.jsonl @@ -0,0 +1 @@ +{"15589572|6746689": ["Detailed description can be found in [17] [18], [19] and [20]."]} diff --git a/graph_1457933.jsonl b/edge/graph_1457933.jsonl similarity index 100% rename from graph_1457933.jsonl rename to edge/graph_1457933.jsonl diff --git a/edge/graph_14580431.jsonl b/edge/graph_14580431.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7da5c0baff12ace722afaad7ecdc2e63109020c8 --- /dev/null +++ b/edge/graph_14580431.jsonl @@ -0,0 +1 @@ +{"13554495|7971188": ["1In a traditional peer-to-peer file sharing system, all hosts behave both as clients and servers and are called \u201cservents\u201d [22]."]} diff --git a/edge/graph_14580698.jsonl b/edge/graph_14580698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..683e227f8490ca887faf1c034efb6f4e599c5d41 --- /dev/null +++ b/edge/graph_14580698.jsonl @@ -0,0 +1,3 @@ +{"30591842|16717715": []} +{"16456820|2762290": []} +{"205015030|6746689": ["(6) contour profiles; (7) zoning; (8) geometric moment invariants;"]} diff --git a/edge/graph_14583671.jsonl b/edge/graph_14583671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54d462298bb92700e7b1a640df0bb4222b9bba0e --- /dev/null +++ b/edge/graph_14583671.jsonl @@ -0,0 +1,8 @@ +{"13496960|12904520": ["To ful\ufb01ll the performance requirements of state-of-the-art resource-intensive applications (e.g. [1]), while also meeting the constraint posed by chip power budget, achieving high energy ef\ufb01ciency has become vital in modern processor design to continue to scale performance [2], [3]."]} +{"16652281|12904520": []} +{"478590|13037420": []} +{"16550469|13034818": []} +{"40525716|13034818": []} +{"40525716|13268141": []} +{"16850377|12904520": ["In recent years, the total power consumption of embedded systems, data centers and supercomputers has significantly increased [12, 13], which has also increased the carbon footpr int of IT.", "Since a large fraction (upto 40% [9, 12, 16]) of energy spent in server-class systems is consumed by the main memory, the techniques for saving"]} +{"17227249|13037420": ["Our wear-leveling approach also provides the bene\ufb01t of write density minimization [13] which can help in lowering the chip-temperature and cooling cost.", "However, SRAM has large leakage power consumption and hence, large LLCs designed with SRAM consume huge amount of power and chip area [13].", "Since caches show both inter-set and intra-set write variation [13], wear-leveling can be performed at the level of inter-set [5, 18] or intra-set [18]."]} diff --git a/edge/graph_145857381.jsonl b/edge/graph_145857381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c33e39d05692a202288afc2f629200879384f86 --- /dev/null +++ b/edge/graph_145857381.jsonl @@ -0,0 +1,19 @@ +{"40353291|18078738": ["[13]\u2013[15] and obtain huge success, particularly spectrum techniques based on the synchronously sampled data."]} +{"12808805|905827": []} +{"15992894|33286487": ["As pointed out by Cohen (1989), in signal processing the uncertainty principle merely relates the time duration of a signal to the frequency spread of its Fourier spectrum."]} +{"128080079|54440351": ["series, which has been widely applied in the fault diagnosis of rotating machinery [42]."]} +{"125976702|393948": ["Various deep learning algorithms, such as autoencoders, stacked autoencoders [103], DBM and DBN [16], have been applied successfully also in fault diagnosis."]} +{"5038723|18078738": ["duced [136]."]} +{"54440351|7076154": []} +{"54440351|14755547": ["[20] developed the hierarchical decomposition and proposed the hierarchical sample entropy (HSE)."]} +{"104572134|9800396": []} +{"125852633|14755547": []} +{"14537961|905827": ["Some methods combine conventional time-frequency analysis with other techniques suitable for transients detection, such as bispectrum-based method [28, 19] and spectral kurtosis (SK) based methods [7, 6, 85, 12]."]} +{"126898446|31194450": []} +{"124051677|905827": []} +{"119987632|905827": []} +{"119391599|33286487": []} +{"44582031|18078738": ["E FFECTIVE fault diagnosis of rotating machines in industrial systems can assist engineers to reduce or even prevent system downtime and save economic losses to the customers [1]."]} +{"108893941|33286487": []} +{"55381320|33286487": ["2012\u201310:40am] [1\u20139] K:/PIC/PIC 460628."]} +{"17980867|905827": ["In order to overcome that problem wavelet decomposition methods are used by the researchers [6],[11].", "Otherwise, sometimes meaningless current or vibration spectrum appears due to loose connections and load variations [6].", "Over the last two decades a lot of research on condition monitoring techniques has been carried out for fault detection and diagnosis of IM [4-10]."]} diff --git a/edge/graph_145857853.jsonl b/edge/graph_145857853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a9128ab0fc325188a04b1dd85c2f129604a92d6 --- /dev/null +++ b/edge/graph_145857853.jsonl @@ -0,0 +1,9 @@ +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"146918|141053": ["Medium access control protocols for wireless networks [30] may be classified into two major categories: contention-based and contention-free MAC.", "Conventional wireless MAC protocols were designed to overcome the challenges of the wireless medium such as hidden terminal problem and exposed terminal problem [30]."]} +{"146918|11979239": ["Although there are a couple of survey papers found in the literature [34]\u2013[36], they are incomplete and outdated."]} +{"62577969|1230643": ["Now, this dream is being realized step by step with the rapid development and deployment of wireless networks, such as wireless local area networks (WLANs), wireless ad hoc networks (WANETs) including mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) [ 1 ], and wireless mesh networks"]} +{"22940098|19938676": ["others [8], [10], [11]."]} +{"141053|1775475": []} +{"141053|14441987": []} +{"3111551|18148591": ["This multiplexing gain can provide a linear increase in the asymptotic Shannon link capacity C, which is given by the following equation [13],"]} +{"1048159|18148591": ["This is consistent with practical linear multiuser detection schemes such as minimum mean squared error (MMSE) [4].", "The amountof resourcesthat needto be sacrificed(expended)at a nodeto suppress an interferencedependson theactualstrengthof the interferenceandthedegreeof spatialcorrelation[4], [16].", "An adaptive array receiver constructi vely combinesthe copies,yielding array gain, which is the factor increasein the averageSNR equalto the numberof antennas[4].", "WhenM = N = k, the capacityis given by the following equation[4],", "This is consist ent with practical linear multi-user detectionschemessuch as minimum meansquarederror (MMSE) [4]5.", "Thus, while switched/steeredbeamantennasare ineffective in handlingmultipath [7], and fully adapti ve array antennasmerely mitigate the effect of multipath, MIMO links actually exploit multipath to provide the spatialmultiplexing gain [4]."]} diff --git a/edge/graph_14586568.jsonl b/edge/graph_14586568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_145897673.jsonl b/edge/graph_145897673.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9e2323763f2e5a66130644359227121137aab47 --- /dev/null +++ b/edge/graph_145897673.jsonl @@ -0,0 +1,2 @@ +{"3457066|256317": ["as authentication systems [1, 2], health-care applications [3, 4], and several vehicular services [5\u20138]."]} +{"3457066|206739910": []} diff --git a/edge/graph_145903553.jsonl b/edge/graph_145903553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4404036a039803a77b23d3e5607581e10fa6f75 --- /dev/null +++ b/edge/graph_145903553.jsonl @@ -0,0 +1,17 @@ +{"196135923|13277694": ["This technique is simple, yet it is efficient for contrast enhancement [3]."]} +{"45431119|8953108": []} +{"14460018|8953108": ["Entropy-based method uses entropy to calculate the foreground and background regions, and the cross-entropy between the original and binarized image [28].", "Local methods adapt the threshold value on each pixel to the local image characteristic [28].", "Based on above problems, many researchers discovered different methods to facilitate the clear readings and writings on which manuscript possess damages in antecedent images, such ([2]-[3], [6]\u2013[13], [15]-[19], [21]-[28], [31])."]} +{"11738248|8953108": ["Many document binarization methods [1] have been re-ported in the literature that can be roughly categorized into two groups: one is global thresholding methods [2], [3] which assign a single threshold for the whole document image, the other is local thresholding methods [4], [5], [6], [7], [8],\u2026"]} +{"10736853|8953108": ["This makes binarization , as the first step in document understanding, a challenging task [29]."]} +{"8929037|15782139": ["The field of offline handwritten recognition has been a topic of intensive research for many years [1\u20134].", "are codified as gray-levels in the interval [0,1], where 0 means \u201cblack\u201d and 1 means \u201cwhite\u201d.", "Due to the linear activation function, the output may be out of range, but, in practice, values were in the interval [0,1]."]} +{"56632202|2762290": []} +{"15896034|15782139": ["Optical character recognition takes one character at a time and then it optically recognizes it with other characters and finally changes it into machine-encoded text, but OCR is variable for different languages [1][2][3][4][5][6] and it is not suitable for handwriting and unlimited vocabulary set."]} +{"46568503|8953108": []} +{"2478119|2762290": ["AN important task in document image analysis is text segmentation [1], [2].", "Many segmentation and binarization approaches have been reported in the literature [2], [3], [4], [5], [6], [7]."]} +{"18686642|619938": ["[5, 10, 11] When the horizontal projection profile is applied on an M \u00d7 N image, a column vector of size M \u00d7 1 is obtained."]} +{"16832138|8953108": ["In [2], [17] it is reported that texture is used to provide a threshold selection.", "Most of these methods are applied for text region extraction or region segmentation [2], [14], [15].", "However there is an exception if the contrast is below a certain threshold [2]."]} +{"12186824|8953108": ["However, the classical algorithms described in [1] do not produce good results in the binarization of historical documents.", "RELATED WORKS An extensive study of algorithms for binarization is presented in [1] which contains a brief description of 40 different algorithms."]} +{"18660196|8953108": ["According to [3], the binarization techniques can be divided into six groups: - Histogram-based methods: the methods of this class perform a thresholding based on the form of the histogram.", "The FBS is generally done using a cut-off value \u201cthe threshold\u201d [3][11].", "In spite of the ANNs\u2019 success in various image processing applications, their contribution in image binarization is still limited and have not generated much research [3][4].", "This last is defined in [34] as follow: DRD k is given as follow (eq.7): We also compared our method with several well known state-of-the-art methods of document binarization [3][10][11].", "The literature is rich in methods for document image binarization based on thresholding [1][2][3][11]."]} +{"1014963|15782139": ["There are two approaches for developing such systems, the on-line verification and the off-line verification (Plamondon & Srihari, 2000; Impedovo, Modugno, Pirlo, & Stasolla, 2008).", "In the former, signatures are acquired via an electronic device such as tablets and an instrumented stylus that captures temporary information such as the x-y coordinates, velocity or acceleration (Plamondon & Srihari, 2000).", "The literature reports a lot of research works using various feature generation and verification methods (Plamondon & Srihari, 2000; Impedovo, Modugno, Pirlo, & Stasolla, 2008)."]} +{"1522080|8953108": ["In 2004, Sezgin and Sankur [13] compared 40 binarization methods, indicating that the local based approach of Sauvola and the method of Trier [14] perform the best in terms of document binarization methods."]} +{"53566251|8953108": []} diff --git a/edge/graph_145930790.jsonl b/edge/graph_145930790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85f0e755831a8e9de3eb743fabace3de56b7b875 --- /dev/null +++ b/edge/graph_145930790.jsonl @@ -0,0 +1,11 @@ +{"46829400|206778480": []} +{"46829400|627405": ["To do so it employs the same model as we used in an earlier (and widely-cited) paper [8], where the experiences of conducting systematic reviews were codi-95 \ufb01ed by structuring them as a set of \u2018lessons for practice\u2019."]} +{"46923508|9530487": []} +{"16756949|11139156": []} +{"16756949|205435103": []} +{"16756949|7696556": []} +{"54444611|8323376": []} +{"54444611|14229975": []} +{"54444611|2774711": []} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} diff --git a/edge/graph_14594841.jsonl b/edge/graph_14594841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88d6d40aef40f5217299bacdab18e093a4ae6add --- /dev/null +++ b/edge/graph_14594841.jsonl @@ -0,0 +1,8 @@ +{"112420402|16783458": ["Technologies for touch are still divided in two major categories: force- feedback devices that return to the user forces and torques (a review can be found in [8]), and tactile displays that communicate through the skin [9]."]} +{"30718608|206986719": []} +{"3699965|6415369": []} +{"16352120|14561706": ["stop a robot\u2019s movements in a human-centric perspective [17]."]} +{"206647728|17670369": []} +{"5702128|6415369": ["The Dependency Structure Matrix (DSM) is an established method for capturing the complex interaction of design tasks (Browning 2001) and is used to capture the dependencies.", "A number of algorithms have been developed to sequence the activities to the lower diagonal to minimize such iterations (Browning 2001, Eppinger, Browning 2012, Eppinger, Whitney & Gebala 1992)."]} +{"14707098|207584909": []} +{"14707098|2289178": ["The existing STEP (ISO 10303) standard captures adequately geometric data, while data pertaining to history based modelling [92], assembly [93], and kinematics linkages are less well represented [94]."]} diff --git a/edge/graph_14596200.jsonl b/edge/graph_14596200.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14599642.jsonl b/edge/graph_14599642.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14599895.jsonl b/edge/graph_14599895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0004564b8ea44ff9bfaa2c0993f2527c6d52fce --- /dev/null +++ b/edge/graph_14599895.jsonl @@ -0,0 +1,2 @@ +{"207190974|15782139": []} +{"12412442|8364569": ["(iii) Flow-based abstraction can deal with encrypted attack payload [12], which cannot be dealt with by packet-level analysis."]} diff --git a/edge/graph_146004391.jsonl b/edge/graph_146004391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_146005566.jsonl b/edge/graph_146005566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..120a5885a1643daae5d50902d5889517185a0789 --- /dev/null +++ b/edge/graph_146005566.jsonl @@ -0,0 +1,2 @@ +{"206714165|4019175": []} +{"9849236|873842": []} diff --git a/edge/graph_146008074.jsonl b/edge/graph_146008074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3dcfa738f5cc587efeff6941df9395caa81cbb0 --- /dev/null +++ b/edge/graph_146008074.jsonl @@ -0,0 +1,2 @@ +{"110589151|469744": []} +{"16949715|1230643": ["Research within the WSN community has led to the development of new computing models ranging from distributed computing to large-scale pervasive computing environments [2]."]} diff --git a/edge/graph_14602562.jsonl b/edge/graph_14602562.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03720e6eed83af9b011d64302bc3363de440e8a5 --- /dev/null +++ b/edge/graph_14602562.jsonl @@ -0,0 +1 @@ +{"6257811|1230643": ["Recent advances in miniaturization and lowcost , low-power design have led to active research in large-scale networks of small, wireless, low-power sensors and actuators [1]."]} diff --git a/edge/graph_146031886.jsonl b/edge/graph_146031886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_146044323.jsonl b/edge/graph_146044323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_146055585.jsonl b/edge/graph_146055585.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b426379043dd8f090c1ec1a0e81af77827d6c7e --- /dev/null +++ b/edge/graph_146055585.jsonl @@ -0,0 +1,15 @@ +{"16358528|15305793": ["The median filter method is able to maintain the edges and keep image\u2019s quality better than the average filter method [15].", "This method reduces speckle noise and eliminate marking the ultrasound image and keep the edges of the image and the image information value properly [15][16]."]} +{"14982308|8953108": ["Over the past years, many technologies have been proposed for selecting the threshold automatically."]} +{"18893224|8953108": ["These techniques have been described and evaluated extensively in a number of survey papers [Weszka and Rosenfeld 1978; Palumbo et al. 1986; Sahoo et al. 1988; Lee et al. 1990; Glasbey 1993; Trier and Jain 1995; Sezgin and Sankur 2004].", "Further examples and comparisons can be found in [Venkateswarlu and Boyle 1995; Sezgin and Sankur 2004]."]} +{"2026284|205131192": []} +{"22465881|8953108": ["Local thresholding methods [5], on the other hand, calculate a different threshold value for each pixel based on local statistics."]} +{"32383127|8516210": []} +{"32383127|8540351": []} +{"34846324|14415030": ["Qualitative comparison is the most common method for evaluation the effectiveness of a segmentation algorithm, in which a human visually compares the image segmentation result for separate segmentation algorithm [49]."]} +{"34846324|15744805": ["However various attempts have been made and studied [47][48] to define parameters to assess the performance of image segmentation."]} +{"45989335|8953108": []} +{"124002553|8953108": []} +{"29325535|6746689": []} +{"30985583|64404": ["264/AVC [2][3]."]} +{"17843829|1184328": []} +{"18654479|8953108": []} diff --git a/edge/graph_146058780.jsonl b/edge/graph_146058780.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ca3300e0d72a4774d735b60ba94d5d6a19ee4b6 --- /dev/null +++ b/edge/graph_146058780.jsonl @@ -0,0 +1,4 @@ +{"14713085|1507400": []} +{"9063246|8424228": ["To the best of our knowledge there are currently neither books nor other other tutorials that systematically categorize and comprehensively survey the vast landscape of NoSQL database systems."]} +{"4889615|14697846": ["There are three types of P2P networks: (1) purely decentralized, (2) partially centralized, and (3) hybrid decentralized [1]."]} +{"3167919|10500613": ["Another important research domain related to data transformation is that of schema matching and mapping.(19,20) It is"]} diff --git a/edge/graph_146059665.jsonl b/edge/graph_146059665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3699ecc7bfdfe0be658858ea11d62272ee6758b0 --- /dev/null +++ b/edge/graph_146059665.jsonl @@ -0,0 +1 @@ +{"62679557|8310135": []} diff --git a/edge/graph_14609248.jsonl b/edge/graph_14609248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a05434fdf8d59081056736c8c25d22d8a630b15e --- /dev/null +++ b/edge/graph_14609248.jsonl @@ -0,0 +1,11 @@ +{"926487|3540699": ["\u0081 It is worthwhile to extend the implementation of the proposed system to be backwards-compatible to H.264 [ 3 ], as it has demonstrated significantly superior compression performance as compared to previous codecs."]} +{"11860059|3540699": ["264/AVC standard has already shown to provide superior compression efficiency and error-resilient transmission over varied networks [1]\u2013[3], and the very recently proposed scalable extension of H."]} +{"16525678|16169670": []} +{"16525678|7788290": []} +{"22949879|7439310": ["Various error-resilience techniques have been proposed to address this problem [2]."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"11962297|14970359": []} +{"11962297|7788290": []} diff --git a/edge/graph_146099570.jsonl b/edge/graph_146099570.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..725b5100d473421d67905284c6c1cf22d1858c01 --- /dev/null +++ b/edge/graph_146099570.jsonl @@ -0,0 +1,5 @@ +{"44162448|14356173": ["through deeply digging Big Data using various data mining techniques [11]."]} +{"12095710|2623404": ["networking paradigm in which the forwarding hardware is decoupled from control plane [55]."]} +{"12095710|393948": ["entangle and hide more or less the different explanatory factors of variation behind the data [57]."]} +{"55186354|52877341": ["Alterna-tively, meta-based-approaches can be used to conducting a literature review and include the work of Mishra, Gunasekaran, Papadopoulos, and Childe (2016), which adopt a bibliometric and network analysis approach to obtain and compare in \ufb02 uential work in a speci \ufb01 c domain (in this example,\u2026"]} +{"55186354|2652752": ["\u2026and Teuteberg (2014) \u2013 BD logistics; Eembi, Ishak, Sidi, Affendey, and Mamat (2015) \u2013 on data veracity research for pro \ufb01 ling digital news portal, and Abdellatif, Capretz, and Ho (2015) \u2013 on software analytics (a distinct branch of BDA), this paper attempts to broaden the scope of their\u2026"]} diff --git a/edge/graph_146100556.jsonl b/edge/graph_146100556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5902b45614fdf5d931237c5a3016d19353706200 --- /dev/null +++ b/edge/graph_146100556.jsonl @@ -0,0 +1,14 @@ +{"70327049|2088679": ["This highly repurposable nature of deep learning models has been amply demonstrated through several cross-domain image classification studies, especially in the area of medical image analysis [50].", "It has been demonstrated in image analysis competitions that the top performers are often distinguished from the rest by their ability to incorporate their domain expertise in some way into a deep learning pipeline along with the use of some data warping strategies [50].", "Variational auto-encoders (VAEs) and generative adversarial networks (GANs) are two innovative unsupervised strategies that could be explored further for end-to-end unsupervised deep learning of representative features from large amounts of unlabeled pavement images [50]."]} +{"70327049|16502294": []} +{"60385584|3330313": []} +{"60385584|1097238": []} +{"60385584|15273230": []} +{"60385584|192934": ["Jain, Duin and Mao (2000) include a section on classi\ufb01er combination.", "Jain, Duin and Mao (2000) list eighteen classi\ufb01er combination schemes; Witten and Frank (2000) detail four methods of combining multiple models: bagging, boosting, stacking and error-correcting output codes whilst Alpaydin (2004) covers seven methods of combining multiple learners: voting,\u2026"]} +{"4703567|10329355": ["By accessing the realtime traffic data, the vehicle traffic management system controller could response instantly to control the urban traffic flow [10].", "2012 [10] Kapileswar Nellore and Gerhard P."]} +{"206592484|456491": []} +{"390409|535786": []} +{"390409|2398835": ["The phenomenon of big data has long been characterized by volume, velocity, and a variety of data types that have been created at everincreasing rates (Khan et al., 2014)."]} +{"15528648|3348390": [", [4] and [44]), it is established that one of the most appropriate formats to manage context is ontology."]} +{"196010852|35990525": []} +{"53278182|206578365": []} +{"53278182|7278743": []} diff --git a/edge/graph_146108857.jsonl b/edge/graph_146108857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43f2b30475834b3e21c527355dfff1c10e48bed1 --- /dev/null +++ b/edge/graph_146108857.jsonl @@ -0,0 +1,3 @@ +{"4865148|11042075": ["Gait has long been studied for video-based person identification [7, 21, 27]."]} +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} +{"206595765|4570087": ["Re-ranking methods have been successfully studied to improve object retrieval accuracy [53]."]} diff --git a/edge/graph_146118902.jsonl b/edge/graph_146118902.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1691c6816a06fe0b18c207ecc9ba3ab812508ea --- /dev/null +++ b/edge/graph_146118902.jsonl @@ -0,0 +1,24 @@ +{"9554221|11026696": []} +{"3417348|10179311": []} +{"3417348|206986719": ["Currently, an AR platform is defined as a system that has several of the following features: it combines virtual and real objects in a single real environment, it runs interactively in real time [10] and it registers virtual and real objects reciprocally [11,12]."]} +{"206986719|469744": ["Azuma [3] provides a commonly accepted definition of AR as a technology which (1) combines real and virtual imagery, (2) is interactive in real time, and (3) registers the virtual imagery with the real world.", "For OST HMDs, one of the main challenges is the generation of correct occlusion effects between virtual and real objects [3].", "From our own research experience and by studying the existing technology surveys [3][4], it is clear that to provide an effective AR experience there are a number of factors that must be developed, including: (a) Graphics rendering hardware and software that can create the virtual content for overlaying the real world (b) Tracking techniques so that the changes in the viewer\u2019s position can be properly reflected in the rendered graphics (1)Email: zhou0099@ntu.", "[3] and the more recent 2001 Azuma et al."]} +{"51923160|469744": []} +{"6863252|7861381": ["The rest of the section is organized by following coarsely and extending the classi\ufb01cation of deformation models given by Holden [14]."]} +{"26908295|469744": []} +{"11926474|469744": ["Azuma [1] has defied that AR is an integration of the virtual world and the real world with real-time interactions via three-dimensional registrations."]} +{"1119376|4668902": ["[283], Mittal [284], and Han and Orshansky [285] describe the reasons behind approximate computing and explore the current approximation techniques in hardware and software."]} +{"1119376|469744": ["[9], who examined the impact of an augmented reality system"]} +{"1119376|17024419": []} +{"45657924|469744": ["In the early 1990s, Tom Caudell of the Boeing Company first put forward the term \u201caugmented reality (AR),\u201d and in 1997 Azuma (1997) defined the AR area."]} +{"22617959|13082795": []} +{"57737772|355736": ["These highly ranked articles represent a few types of studies that may serve as predictive indicators, namely review papers (Mingers & Leydesdorff, 2015; Waltman, 2016), applications of bibliometric studies to specific domains, software tools for science mapping (Cobo et al., 2012), new metrics and\u2026", "In 2015, two bibliometric studies are followed by a review of theory and practice in scientometrics (Mingers & Leydesdorff, 2015)."]} +{"57737772|239537": []} +{"3327978|2323881": ["W ITH the rapid development of computer vision applications, point set registration technology, widely researched in pattern recognition and computer vision domains, for instance face recognition [1], stereo matching [2], and shape recognition [3]\u2013[6], has received great attention over the last few decades."]} +{"4625011|3579945": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|13991708": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|4719202": ["Note that picking items represents from 55 % to 65 % of the total cost of warehousing operations [75], which are still mostly carried out through a pick-by-paper approach."]} +{"4625011|469744": ["This definition is broader than the one given by other researchers [3], who disregarded photo-based augmentations, which have proved to be effective in industrial environments."]} +{"4885388|17024419": ["To make the users see a world which have a real environment and generated by the computer graphics over a real scene [2]."]} +{"52057916|4625011": ["Consequently, operators must be equipped with certain devices to provide an interface for human-machine communication and collaboration, and even to provide decision support to help optimize operator actions in the industry environment [4]."]} +{"45760734|469744": []} +{"20512699|469744": []} diff --git a/edge/graph_146120676.jsonl b/edge/graph_146120676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2c5ac6663af05a2fbb443a6b9b21bb8e160e708 --- /dev/null +++ b/edge/graph_146120676.jsonl @@ -0,0 +1 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} diff --git a/edge/graph_14612306.jsonl b/edge/graph_14612306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14612594.jsonl b/edge/graph_14612594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e19935eaa007a4910d8143be83b5c7231a4fff2 --- /dev/null +++ b/edge/graph_14612594.jsonl @@ -0,0 +1,5 @@ +{"25760390|9270553": ["A discussion of bit rate in BCI can be found in [1].", "814449 brain\u2019s normal output pathway [1].", "Great progress has been made in brain\u2013computer interface (BCI) research over the past 20 years [1]."]} +{"1648953|9270553": ["Current generation BCIs generally rely on the brain\u2019s electrical activity measured using surface EEG but implanted electrodes are also used (Wolpaw et al 2000).", "Since this technique was first reported in 1977 (Jobsis 1977), various studies have examined brain activity due to motor, cognitive, visual and auditory functions (Okada et al 1997, Benaron et al 2000, Wolf et al 2002, Izzetoglu et al 2003, Syr\u00b4 e et al 2000, Keenan et al 2002) using this modality.", "It has been termed the Event Related Optical Signal (Gratton et al 2001, Wolf et al 2002 ).", "While our current system is limited by the nature of the slow vascular response, recent studies have revealed a fast optical signal (Gratton and Fabiani 2001, Wolf et al 2002 ), showing that there is continuing development of NIR imaging technology.", "Currently no BCI performs well in all these aspects (Wolpaw et al 2000)."]} +{"17571592|16362395": ["In their review of the literature on BCI classifiers, Lotte et al. 16 concluded that SVMs are particularly efficient, attributing the efficiency to their regularization property and immunity to the curse of dimensionality.", "While many early BCI studies satisfied this requirement, 24,38 later studies were often based on offline analyses of pre-recorded data 1 ; for example, the Lotte et al. 16 review of studies evaluating BCI signal-classification algorithms found most used offline analyses."]} +{"17571592|9270553": []} +{"17571592|192934": []} diff --git a/graph_1461335.jsonl b/edge/graph_1461335.jsonl similarity index 100% rename from graph_1461335.jsonl rename to edge/graph_1461335.jsonl diff --git a/edge/graph_14613668.jsonl b/edge/graph_14613668.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14616669.jsonl b/edge/graph_14616669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..330b90cd58d5336faa618d51679516cd02afaa86 --- /dev/null +++ b/edge/graph_14616669.jsonl @@ -0,0 +1 @@ +{"30447047|14122909": []} diff --git a/edge/graph_14617309.jsonl b/edge/graph_14617309.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ecf1d56724a2a32faec3a2a380138715105e052 --- /dev/null +++ b/edge/graph_14617309.jsonl @@ -0,0 +1,3 @@ +{"19509491|9270553": ["The main interest of this research is to develop a communication channel for persons with severe motor disabilities [ 3 ]."]} +{"12032224|33286487": ["It is a special case of Cohen\u2019s Class [2] of time-frequency energy distributions.", "In contrast to the quadratic nature of Cohen\u2019s Class distributions, the Gabor transform (GT) and the complex wavelet transform (WT) are linear operations [4].", "The problem of cross-term interferences is alleviated by other representants of Cohen\u2019s Class at the cost of smoothing that reduces the time-frequency resolution [3].", ", it can indicate activity in the time-frequency plane where there should be none [2]."]} +{"121537777|33286487": []} diff --git a/edge/graph_14617477.jsonl b/edge/graph_14617477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..023f3f80dffb7571448d9a653f12c5b66c31bc72 --- /dev/null +++ b/edge/graph_14617477.jsonl @@ -0,0 +1,3 @@ +{"8186395|17300331": ["More recently, other algorithmic approaches based on quantum walks (Kempe 2003; Ambainis 2003) or quantum Markov chains (Szegedy 2004; Magniez et al. 2007; S\u00e1ntha 2008) have emerged."]} +{"1492185|19986865": []} +{"1492185|14617477": []} diff --git a/edge/graph_14617547.jsonl b/edge/graph_14617547.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14619034.jsonl b/edge/graph_14619034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_146195.jsonl b/edge/graph_146195.jsonl similarity index 100% rename from graph_146195.jsonl rename to edge/graph_146195.jsonl diff --git a/edge/graph_14621045.jsonl b/edge/graph_14621045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d66321793948a89c2cd52ae6b9928ef803cba4b --- /dev/null +++ b/edge/graph_14621045.jsonl @@ -0,0 +1,8 @@ +{"2576107|8649087": ["Companies [4-9] and standardization bodies such as DVB (Digital Video Broadcasting) [1] and OMA (Open Mobile Alliance) are investigating and developing the concept of Authorized Domains."]} +{"11512819|8649087": ["In the past years there has been an increasing interest in developing digital rights management (DRM) systems [19, 9, 10].", "On the other hand, the lack of continuous network connectivity among all devices in the domain makes impractical to use some of the centralized content distribution/storage mechanisms employed by other DRM architectures [9].", "The concept of Authorized Domain (AD) has originated from work on content protection in the home environment [19, 9, 12]."]} +{"6298715|9743176": []} +{"10489913|8649087": ["The Digital Millennium Copyright Act (DMCA) can be used in the case of deliberate removal or attacks of watermark (98) thus providing the minimal legal support for watermarking schemes.", "Invisible watermarking has the greatest need for standardization (46; 97), which requires the formation of a standards body (98; 1; 46; 35; 3).", "Thus, digital watermarking can also be used as a back up protection along with cryptographic technology (98)."]} +{"24178539|16426674": ["Embedded hardware works as a tamper-resistant hardware and it provides the trust to the LP [53, 54]."]} +{"41032849|14757367": ["detect the watermark at lower design levels [30].", "of tracking and extracting the watermark at lower levels [30].", "However, these techniques cannot be detected except at the same level of abstraction [30]."]} +{"31648909|2457428": []} +{"154653242|8649087": ["9 Since a large-scale commercial pirate can be expected to be able to break down a cryptographic system, watermarking seems to be the more relevant DRM tool in the context of large-scale commercial piracy (cf. Eskicioglu and Delp (2001), pp. 683\u2013684).", "8 For a survey, see Eskicioglu and Delp (2001)."]} diff --git a/edge/graph_14622714.jsonl b/edge/graph_14622714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1462862.jsonl b/edge/graph_1462862.jsonl similarity index 100% rename from graph_1462862.jsonl rename to edge/graph_1462862.jsonl diff --git a/edge/graph_14632827.jsonl b/edge/graph_14632827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c5ebb76adae70e11847fcf81f93dc4b7e1be4039 --- /dev/null +++ b/edge/graph_14632827.jsonl @@ -0,0 +1,5 @@ +{"10402467|11894197": ["The major disadvantage of those methods is that each subset of features is evaluated regarding their dependencies, thereby ignoring the function regulation among features [13]."]} +{"11423352|1708582": ["of problems, rather than as a set of techniques [13], [25]."]} +{"6415922|15744805": ["To date, no standard evaluation method prevails [25], and different measures may yield distinct rankings [24] (as an aside note, the present authors are nowadays developing image noise measures by mathematical morphology [21], allowing for instance, his use in image filtering design by GAs)."]} +{"8755430|192934": ["Another drawback is that if it is difficult to segment the original object as a single homogeneous region, it may still be equally difficult to segment its lower-level components."]} +{"8918363|15744805": []} diff --git a/edge/graph_14636260.jsonl b/edge/graph_14636260.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14638537.jsonl b/edge/graph_14638537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52fbb6a254a33d877d5c16c4c511ebbb32a277bd --- /dev/null +++ b/edge/graph_14638537.jsonl @@ -0,0 +1,7 @@ +{"16262688|10500613": ["Approaches of schema matching can be categorized into label-based and instance-based, according to the different information on which they rely [40]."]} +{"3105676|8125630": ["More information can be found in [ 41 ], [42].", "Regarding structural data from different sources, we can utilize mature database techniques, such as virtual views and data warehouse techniques [ 41 ], to integrate data relations from different sources via join and/ or union operations."]} +{"29601697|60455": []} +{"6682219|3102110": ["\u2026\nmining as\u00adsociation rules in databases has received much attention recently [Aggarawal and Yu 1998; Agrawal \net al. 1993a, 1993b; Bayardo 1998; Brin et al. 1997; Chen et al. 1996; Han et al. 2000; Park et al. 1997; \nShintani and Kitsuregawa 1998; Srikant and Agrawal 1996, 1997; Tsur et al. 1998].", "INTRODUCTION By de.nition [Agrawal et al. 1993b; Chen et al. 1996], an association rule is an implication \nof the form A =B, where A and B are frequent itemsets in a transaction database and A nB =n.", "A frequent itemset (also called large itemset [Chen et al. 1996]) is an item\u00adset that meets the \nuser-speci.ed minimum support.", "By extending the de.nition \nin [Agrawal et al. 1993b and Chen et al. 1996], negative association rule discovery seeks rules of the \nform A =\u00acB with their support and con.dence greater than, or equal to, user-speci.ed minimum sup\u00adport \nand minimum con.dence thresholds respectively, where A and B are\u2026"]} +{"60692534|60455": ["Using phrases for the text representation still has doubts in increasing performance over domains of text categorisation tasks [77, 130], meaning that there exists no particular representation method with dominating advantage over others [68, 129]."]} +{"9881462|7839197": []} +{"6101|7839197": []} diff --git a/edge/graph_14639620.jsonl b/edge/graph_14639620.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90e2dddd8642d988273eeca9a1ed273fe60a07d5 --- /dev/null +++ b/edge/graph_14639620.jsonl @@ -0,0 +1,10 @@ +{"6004405|1113420": ["I. INTRODUCTION\nMobile devices, such as cellular phones, PDAs, and smart phones, are becoming pervasive and they are used in more and more applications and services."]} +{"15667455|1113420": ["Context models can be classified into six different model categories, namely Key-value models, markup scheme models, graphical models, object oriented models, logic based models and ontology based models [ 2 ]."]} +{"6848757|2532914": ["Although many new emerging mobile research methods have been introduced recently, they still suffer from issues of scale, breadth, and artificial environments [17], [19], [28], [30]."]} +{"2187403|1113420": ["Although interesting comparisons of context models already exist [5,30, 39,45], we felt the need to establish a framework to systematically evaluate them, by defining a set of relevant, objective and rather general categories.", "Interesting surveys on context-aware systems and models have already been presented in [5, 14, 39, 45]; we contribute with a review on recent evolutions and new systems for context modeling, and challenge each model with respect to the problem of context-aware data tailoring."]} +{"9704070|2509135": ["Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)", "spaces via cognitive radio techniques [157], e) dynamic"]} +{"9704070|12884178": ["expressive power of context representations [25], d) relay and mesh-enabled networks development with cooperative communication features in OFDMA-based wireless network technologies [126] [156] and exploitation of spectrum white", "Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)"]} +{"9704070|14745481": []} +{"983713|1113420": ["Several studies of context-aware systems have already been conducted, such as in [8]."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"14126766|1113420": ["Baldauf, Dustdar, and Rosenberg (2007) suggested the abstract layer architecture for context-aware systems and introduced various existent middleware and serverbased approaches to ease the development of context-aware applications , where each layer is explained based on various research."]} diff --git a/edge/graph_14639861.jsonl b/edge/graph_14639861.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14641730.jsonl b/edge/graph_14641730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14644374.jsonl b/edge/graph_14644374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4980726a5d07a8ebb882d877b563ce4db36c57b6 --- /dev/null +++ b/edge/graph_14644374.jsonl @@ -0,0 +1 @@ +{"35430439|191396": ["\u2026a set of objects into clusters (subsets) by virtue of their observations so that objects are similar to one another within the same cluster and are dissimilar to the objects in other clusters (Murtagh, 1983; Grabmeier & Rudolph, 2002; Xu & Wunsch, 2005; Li, Wang, & Li, 2006; Malik et al., 2010)."]} diff --git a/edge/graph_14644479.jsonl b/edge/graph_14644479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d8252d39da9c1af6b86f266b2b00dab0f6e595d --- /dev/null +++ b/edge/graph_14644479.jsonl @@ -0,0 +1,13 @@ +{"2745469|1188683": []} +{"27453201|8450611": ["TCAMs cost about 30 times more per bit of storage than DDR SRAMs [14].", "30 times more per bit of storage than DDR SRAMs [14]."]} +{"17081468|2257431": ["Although there exists enough potential to improve and optimize the update speed of the pattern compiler, for example, by replacing the linear searches in the current implementation by ef\ufb01cient pre\ufb01x search algorithms [23], this has not yet been done."]} +{"2906773|8364569": ["Many infrastructure security solutions are based on network traffic analysis [3, 101]."]} +{"2906773|8450611": ["Taylor's survey in 2004 [105] summarized the major packet classification techniques.", "A \u2019cut\u2019 in multidimensional space is isomorphic to a branch in a decision tree [105].", "The reported research work in this area has been well summarized and categorized into four basic types by Taylor [105].", "Taylor\u2019s survey in 2004 [105] summarized the major packet classification techniques.", "Our analysis follows the same categorization and is complementary to Taylor's work.", "While Taylor's survey focuses on the description of techniques, we focus on the analysis of hardware-based application of these techniques."]} +{"2906773|9240891": ["Securing the network infrastructure has become a high priority due to its underlying effects for data protection, ecommerce and even national security [44]."]} +{"2906773|15331799": ["of software and the high performance of hardware [41]."]} +{"31235055|2906773": ["The need for high bandwidth network intrusion detection processing has led to investigation of hardware supported approaches [2]."]} +{"1739527|8793295": ["Some excellent surveys can be found in [6], [18]."]} +{"12644472|8450611": ["Implementation results show that our architecture can store on a single Xilinx Virtex-5 \nFPGA the full set of packet header rules extracted from the latest Snort NIDS and sustains 100 Gbps throughput \nfor minimum size (40 bytes) packets.", "The header classi.cation results identify the re\u00adlated rule \noptions that will be checked in the follow-up pat\u00adtern matching.", "Categories and Subject \nDescriptors C.1.4 [Processor Architectures]: Parallel Architectures; C.2.0 [Computer Communication Networks]: \nGeneral Security and protection General Terms Algorithms, Design, Performance, Security Keywords \nFPGA, multi-match packet classi.cation, NIDS, SRAM * This work\u2026", "Categories and Subject \nDescriptors C.1.4 [Processor Architectures]: Parallel Architectures; C.2.0 [Computer Communication Networks]: \nGeneral Security and protection General Terms Algorithms, Design, Performance, Security Keywords \nFPGA, multi-match packet classi.cation, NIDS, SRAM * This work is supported by the United States National \nSci\u00adence Foundation under grant No."]} +{"108531799|12815020": []} +{"108531799|42459080": []} +{"6794287|8450611": []} diff --git a/graph_1464669.jsonl b/edge/graph_1464669.jsonl similarity index 100% rename from graph_1464669.jsonl rename to edge/graph_1464669.jsonl diff --git a/edge/graph_14647085.jsonl b/edge/graph_14647085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e31c3ca772a53ec4384e17ebf01a1efa871264f7 --- /dev/null +++ b/edge/graph_14647085.jsonl @@ -0,0 +1,2 @@ +{"9923206|1230643": ["A wireless sensor network is composed of a large number of sensor nodes, which are densely deployed either inside the phenomenon to be supervised or very close to it [1]."]} +{"9923206|14441987": ["Ad hoc routing protocols fall into two categories: table-driven and on-demand [31]."]} diff --git a/edge/graph_14649057.jsonl b/edge/graph_14649057.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14650419.jsonl b/edge/graph_14650419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_14651358.jsonl b/edge/graph_14651358.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56f2d55ce602b9be8144dbcc2f6cbc0875bacc1b --- /dev/null +++ b/edge/graph_14651358.jsonl @@ -0,0 +1,6 @@ +{"59809172|12127129": []} +{"17341425|17516538": ["Among various approaches so far [1], eigen-background is initially proposed by Oliver et al. [2]."]} +{"14096827|12127129": ["Excellent survey papers can be found in [6] and [7]."]} +{"206591471|819377": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness.", "We refer to the work of Bouwmans et al. [4] for a comprehensive list.", "This originates from the quick weight up-date of the Gaussian mode, while the Gaussian distribution itself is adapted very slowly (cf. [4])."]} +{"206591471|12127129": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness."]} +{"819377|12127129": ["To take into account these problems of robustness and adaptation, many background modeling methods have been developed and the most recent surveys can be found in [2, 11, 12]."]} diff --git a/edge/graph_1542716.jsonl b/edge/graph_1542716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15428874.jsonl b/edge/graph_15428874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0af287ac234233012758251fde437c633dd8b7a --- /dev/null +++ b/edge/graph_15428874.jsonl @@ -0,0 +1,3 @@ +{"10642170|880321": []} +{"207146735|1895753": ["Spiking neural network (SNN) models are emerging as a plausible paradigm for characterizing neural dynamics in the cerebral cortex (Brette et al., 2007; Maass & Bishop, 2001).", "Existing SNN simulators such as NEST, PCSIM (see Brette et al. (2007) for more details on spiking neuron simulations) have demonstrated a parallel version that runs on simple clusters (Morrison, Mehring, Geisel, Aertsen & Diesmann, 2005; Plesser, Eppler, Morrison, Diesmann & Gewaltig, 2007)."]} +{"7336078|15428874": ["multi layer perceptrons [71, 91], self organising networks [88] and spiking neural networks [110]), fuzzy logic [34], genetic algorithms [22, 107, 80, 97, 72, 85, 95] and genetic programming [65, 70, 77, 18, 90, 29, 28, 33, 27, 10, 43, 57, 92, 102, 3, 15, 30, 62, 73, 93, 103, 7, 17, 16, 35, 36, 45, 46, 56, 74, 75, 94, 100, 104, 6, 8, 13, 19, 31, 32, 47, 49, 63, 64, 87, 96, 108].", "As we described under the heading of \u201cThe Computational Cube\u201d in [47], one of the virtues of the SIMD GP interpreter is that it gives different ways to access the huge amount of parallelism inherent in having a population of individuals and multiple training cases which they need to be evaluated upon."]} diff --git a/edge/graph_15430262.jsonl b/edge/graph_15430262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15430879.jsonl b/edge/graph_15430879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14941bacefcacf47656bbf5874782d4c12706174 --- /dev/null +++ b/edge/graph_15430879.jsonl @@ -0,0 +1,2 @@ +{"61650822|15930299": ["The Dark Web is conformed by Virtual Communities of Interests (VCoI) [9, 16] are communities which members are reunited by their shared interests in a topic, like fan clubs of artists."]} +{"15522151|60455": ["Web mining techniques can be categorized into three types: content mining, structure mining, and usage mining (Kosala and Blockeel, 2000)."]} diff --git a/edge/graph_15438029.jsonl b/edge/graph_15438029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..817c6cb0f7fa7892116f099b50ccb7a8dedba009 --- /dev/null +++ b/edge/graph_15438029.jsonl @@ -0,0 +1,6 @@ +{"2892242|870434": ["In underwater acoustic networks [1,26], DTNs are more critical as no \ufb01xed infrastructure exists and less than ten expensive autonomous underwater vehicles may roam an area hundreds of km in diameter carrying acoustics transducers that reach only 2\u20135 km."]} +{"33832960|1775475": []} +{"33832960|14441987": []} +{"206416644|14799853": ["The proposed scheme is compared with AODV and FSR using NS2 [21], [22]."]} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"2465022|2835258": []} diff --git a/edge/graph_15449163.jsonl b/edge/graph_15449163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bdd125426e6ac74fcc18e78d0d385295753d068 --- /dev/null +++ b/edge/graph_15449163.jsonl @@ -0,0 +1,22 @@ +{"10596988|25929315": ["The random access (RA) procedure [14] is performed by a device in several cases; for example, upon initial network access, in idle mode, during handover, and for connection re-establishment after a radio link failure."]} +{"6956645|5747564": ["Supporting technologies and standards are being developed where necessary by groups such as IETF\u2019s Protocol to Access White Space database (PAWS) working group."]} +{"2937151|8909218": ["Typically, a femto AP supports one to four active mobile phones in a residential setting [2]."]} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"14094808|7465328": ["An autonomous wireless connection among vehicles imposes serious security threats such as eavesdropping [75], identity spoofing [14, 74], sybil attack [58], wormhole attack [63], replay attack [96], message content tampering [11], impersonation [6], denial of service attack (DoS) [2] and MitM attack [43]."]} +{"14094808|763939": ["In the very near future, vehicles will interact with several other vehicles to coordinate actions [31] and to provide heterogenous media services [107]."]} +{"33118584|2623404": []} +{"33118584|10693567": []} +{"33118584|3189715": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"5054763|2623404": []} +{"6335755|25929315": ["The current cellular access mechanisms, considering all the associated overhead, cannot support this kind of operation [3]."]} +{"1307949|2509135": []} +{"1307949|12601073": ["Note that the available hardware approaches \u2014- match filter, energy filter, feature filter, inference temperature management [7] and spectrum sensing techniques [40, 45, 43] \u2013\u2013 are capable enough to detect the presence of PUs (by any CR)."]} +{"26697205|2623404": ["More information regarding the technical challenges and open issues with respect to the NVF/SDN concept can be found in [99] and the references therein."]} +{"26697205|875676": ["FBMC can provide improved spectral efficiency compared to OFDM, while still being implemented through FFT/IFFT blocks or polyphase filter structures [49],[50] that are common for OFDM implementation."]} +{"26697205|8909218": ["Although open access reduces the macrocell load, the higher numbers of users communicating with each small cell will strain the backhaul to provide suf\ufb01cient capacity and raise privacy concerns for home users [69].", "This access is the most ef\ufb01cient and provides the best performances in terms of areal reuse and overall system capacity [69\u201373]."]} +{"21583900|8909218": ["THE deployment of femtocell base stations (FBSs) enhances the received signal power and extends the coverage of cellular systems [1]."]} +{"206454765|8909218": []} diff --git a/edge/graph_15449480.jsonl b/edge/graph_15449480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15453366.jsonl b/edge/graph_15453366.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ec8637f68deaa8403a42965077ea029630471a8 --- /dev/null +++ b/edge/graph_15453366.jsonl @@ -0,0 +1,2 @@ +{"2722543|3054454": []} +{"7396969|3054454": ["Numerous channel models have been reported in the literature [1], [2]."]} diff --git a/edge/graph_15455595.jsonl b/edge/graph_15455595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15456615.jsonl b/edge/graph_15456615.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3d0bda24c7efdd511d16e4dc1365d6f52b5307e --- /dev/null +++ b/edge/graph_15456615.jsonl @@ -0,0 +1,5 @@ +{"91676|8022785": ["names several benefits and challenges of cloud computing [6].", "Data encryption is as well important to ensure data privacy [1,6,13,17,26,48,83,102].", "Ahuja and colleagues have recently tried to survey the current state of cloud computing in the healthcare domain [6].", "Many examples for improving data privacy and reducing confidentiality risks by authentication and authorization mechanisms are described [1,6,13,17,18,25,51,66,83,88,94].", "Our literature research revealed 22 theoretical papers that did not describe a specific cloud project but provided more common information on cloud computing in healthcare [4-6,8,14,23,24,26,49-52,56,79-87]."]} +{"3883098|4626023": ["Neves and Leser (14) present a comparative analysis of thirteen text annotation and curation tools, based on 35 criteria; these authors concluded that although comprehensive and easyto-use solutions exist for many use cases, no tool fully satisfied all initial criteria.", "Neves and\nLeser (14) present a comparative analysis of thirteen text annotation and curation tools, based on 35 criteria; these authors concluded that although comprehensive and easyto-use solutions exist for many use cases, no tool fully satisfied all initial criteria."]} +{"8410430|431089": []} +{"13991505|1507400": []} +{"503215|14434529": []} diff --git a/edge/graph_15459551.jsonl b/edge/graph_15459551.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cabdc0847d48ca5b48e88aaf7b6989c809cb121a --- /dev/null +++ b/edge/graph_15459551.jsonl @@ -0,0 +1 @@ +{"17794891|38476": ["There is a rich literature on different methods of time series prediction that has evolved from statistics, mathematics, computer science, economics, and engineering [13]\u2013[15]."]} diff --git a/graph_154648.jsonl b/edge/graph_154648.jsonl similarity index 100% rename from graph_154648.jsonl rename to edge/graph_154648.jsonl diff --git a/edge/graph_15465464.jsonl b/edge/graph_15465464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15465803.jsonl b/edge/graph_15465803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a45ae9ad9fdc079edbd900a714258205fd038709 --- /dev/null +++ b/edge/graph_15465803.jsonl @@ -0,0 +1,2 @@ +{"17641462|3202525": []} +{"17641462|1805048": []} diff --git a/graph_1546662.jsonl b/edge/graph_1546662.jsonl similarity index 100% rename from graph_1546662.jsonl rename to edge/graph_1546662.jsonl diff --git a/edge/graph_15468128.jsonl b/edge/graph_15468128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15471820.jsonl b/edge/graph_15471820.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1547332.jsonl b/edge/graph_1547332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15480190.jsonl b/edge/graph_15480190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15485264.jsonl b/edge/graph_15485264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15485505.jsonl b/edge/graph_15485505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15494433.jsonl b/edge/graph_15494433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92bc3d89eb0fea22ab87ecf70c1f833493b3eda9 --- /dev/null +++ b/edge/graph_15494433.jsonl @@ -0,0 +1 @@ +{"16455109|33644565": []} diff --git a/edge/graph_15496510.jsonl b/edge/graph_15496510.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15501047.jsonl b/edge/graph_15501047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b9a63a23990ecd43c308d3d77bafa0a4ca696ec --- /dev/null +++ b/edge/graph_15501047.jsonl @@ -0,0 +1,26 @@ +{"25497830|20905429": ["Although battery-powered wireless sensors communicate over greater distances than passive sensors, their relatively large (battery-limited) size and the need for periodic battery replacement [17, 18] are serious limitations in numerous applications including food and medical packaging [19, 20], singleuse biopharmaceutical manufacturing [21], and wearable electronics [17, 22]."]} +{"109329976|31246274": []} +{"6423787|3054454": ["ment (such as carrier frequency, patterns of the applied antennas, path loss exponent, and delay profile) [16]\u2013[18]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"37046|206583375": ["Classical wireless approaches to positioning employ triangulation using received signal strength indicator (RSSI) as in cell phones and time difference of arrival (TDOA) as in GPS. Good overviews of wireless positioning techniques can be found in [1-5]."]} +{"14655387|12029139": []} +{"14655387|1503157": []} +{"34111917|34657644": []} +{"14102195|31246274": ["A possible way to reset the sensor to its initial state should be to expose it to UV light during a long time as in [19] but this is an issue outside the scope of this paper.", "According to a sensitivity study of CNTs in [19], several gases can be detected such as NO2, NH3, and CO2.", "Indeed, it has been shown that CNT and graphene sheets present a strong sensitivity to various gases [19]\u2013[22] and other physical parameters."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"5783729|20905429": ["In addition, the relative complexity of UWB transmitters and receivers must be overcome in a cost-effective way before UWB can compete with standards already established in the market, such as Bluetooth and ZigBee.", "6 Task Group is seeking to address these issues and indications are that the new standard will have the following characteristics [62]:", "The battery life for ZigBee is expected to be months, whereas battery life is limited to days for Bluetooth.", "Another wireless enabling technology is ZigBee, built on the IEEE 802.15.4 standard, used for low power and low data rate communication.", "There is, at present, no single \u2018ideal\u2019 standard available for physiological measurement systems based on wireless body sensor networks (WBSNs) [62].", "With its simple architecture and the low power requirements, ZigBee is more suited to medical applications, compared to Bluetooth.", "The target market for ZigBee is low data-rate, low energy applications.", "Data transmission security is protected by the use of the Advanced Encryption Standard (AES) in ZigBee [62]."]} +{"1862633|14650419": []} +{"1862633|2357830": ["Objects in an IoT must be able to communicate and exchange data with each other autonomously (Juels 2006; Mitrokotsa et al. 2013).", "For example, Juels proposed the method of \u201cblock tag\u2019 to prevent the unauthorized tracing (Juels 2006)."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"101959259|9553820": []} +{"45110438|31246274": []} +{"15494373|2357830": []} +{"56408297|7988320": ["However, the majority of published PL models do not take this particular situation into account [1-3, 16].", "propagation refers to the process of radio waves suffering from reflection, diffraction and scattering when they propagate from the Tx to the Rx [1-4].", "According to the existing literature [3, 4, 9, 45], AWGN noise at the receiver side is the only noise source which needs to be considered, basically representing thermal noise.", "energy consumption, transmission rate, and quality transmission distance issues [1-5].", "INTRODUCTION Wireless body area networks (WBANs) are becoming increasingly significant for numerous applications in e-health and biosensor technology for a number of reasons, including low power consumption, simple structure requirements and potentially fast transmission data rates [1-3].", "considered in the simulation process, thus allowing the simulation results to be more accurate [3, 36-39]."]} +{"56408297|7854020": ["considered in the simulation process, thus allowing the simulation results to be more accurate [3, 36-39]."]} +{"56408297|20905429": ["An important feature in the development of WBANs is the characterization of the physical layer [4-7]."]} +{"110440|1230643": ["Current state-of-theart WSNs have been seemingly integrated into many aspects of every-day life and are constantly deployed for a plethora of monitoring and/or control applications in some of the most diverse fields [1]."]} +{"8948252|17325804": ["However, it soon became desirable not only to simply read a tag, but also to determine the direction of motion and location of a tag [2][4][12][16][17]."]} diff --git a/edge/graph_15505033.jsonl b/edge/graph_15505033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23c39afea36afa319c206ec0819c922a2eb777bf --- /dev/null +++ b/edge/graph_15505033.jsonl @@ -0,0 +1 @@ +{"25531281|1110872": ["Although the number of users who have prepared multiple paths is increasing, the single TCP cannot provide sufficient throughput if packets are delivered via multiple network paths [2, 3]."]} diff --git a/edge/graph_15507079.jsonl b/edge/graph_15507079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_155093065.jsonl b/edge/graph_155093065.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b11d3a82b41c6aa9bbd92d0c092bdc39b07dab3 --- /dev/null +++ b/edge/graph_155093065.jsonl @@ -0,0 +1,40 @@ +{"54092798|7788290": []} +{"17198145|15178364": ["Chaquet et al. [10] presented a survey on datasets for people\u2019s actions and activity recognition, and Borges et al. [5] a survey on human behavior understanding.", "Individual motion patterns can be directly used for detecting interactions such as one-to-one interactions, groupings and group interactions [5, 43], or to detect body parts to infer detailed interactions, such as the engagement of individuals within a group (e.g., conversations) [37]."]} +{"17198145|16013270": []} +{"15139224|14970359": ["Good surveys on tracking and activity/action recognition are those in Moeslund and Granum (2001) and Gavrila (1999) and Wang and Singh (2003).", "Good surveys on tracking and activity/action recognition are those in Moeslund and Granum (2001) and Gavrila (1999) and Wang and Singh (2003)."]} +{"15139224|7788290": ["The general methodology consists in approaching the action recognition problem as a classification problem involving time-varying data (Gavrila, 1999).", "Good surveys on tracking and activity/action recognition are those in Moeslund and Granum (2001) and Gavrila (1999) and Wang and Singh (2003)."]} +{"13441612|7257659": ["This is where predictive decision support ADASs can help [4]\u2013[6]."]} +{"13441612|1029120": ["There has been a wealth of good work done on pedestrian detection [2]."]} +{"21657320|15093118": ["A comprehensive survey of maneuver-based models can be found in [1], [6]."]} +{"46938830|5755403": ["Autonomous systems such as social and household robots [1, 8, 14], security systems [21, 24, 23], and self driving cars can do tasks like delivery, cleaning, security, and driving."]} +{"83458829|44096871": ["Furthermore, the emergence of autonomous vehicles requires to understand and robustly predict the motion of pedestrians in urban traf\ufb01c scenarios [27, 16, 13]."]} +{"4990939|5755403": ["In contrast to trajectory-based motion learning algorithms [7], our model focuses on the local area and does not require tracking humans in motion, which greatly simplifies the implementation and application of our method.", "In terms of summarizing long-term observations of human movements, our method takes a location-based point of view, which is different from the trajectory-based methods focusing on characterizing long continuous trajectories [7]."]} +{"49556098|1229096": ["For automated vehicles, forecasting the future locations of traffic participants is a crucial input to plan safe, comfortable and efficient paths though traffic (Althoff et al. 2009; Paden et al. 2016).", "For automated vehicles, forecasting the future locations of traf\ufb01c participants is a crucial input to plan safe, comfortable and ef\ufb01cient paths though traf\ufb01c (Althoff et al. 2009; Paden et al. 2016)."]} +{"1328947|7788290": []} +{"1001575|16013270": ["Because there has been little work in the \ufb01eld of visual prediction, existing datasets are mostly inappropriate for our evaluation [43,44]."]} +{"1001575|5755403": ["Trajectory-based activity analysis is a traditional way of modeling human activities [38,24], which leverages motion statistics to recognize different activities."]} +{"3409113|17516538": []} +{"13749542|5755403": ["Classical forecasting approaches [38] adopted Kalman \ufb01lters [29], linear [37] or Gaussian regression models [44, 45, 57, 58], autoregressive models [2] and time-series analysis [43]."]} +{"57610383|9141490": ["\u2026car [11] Another popular global planner is the A* search algorithm [16], which is a deterministic planner that utilizes the distance between the current processing node and the goal node on the solution space as heuristic [17] components to return a globally shortest path as shown in Figure 2."]} +{"8220442|5755403": ["With this paper, we aim to propose an alternative which\n1For an example of cost function modeling and learning, we refer the reader to [10].\nkeeps these advantages while addressing the corresponding weaknesses.", "The problem has also been widely studied by the computer vision community in areas such as video surveillance [2] and multiple object tracking [3]."]} +{"59159139|1303485": ["A detailed literature on the recent works in crowd analysis, especially regarding the topics of crowd dynamic modeling, social activity forecasting, and group segmentation, can be found in some recent surveys [24][13][20]."]} +{"59159139|4915696": ["A detailed literature on the recent works in crowd analysis, especially regarding the topics of crowd dynamic modeling, social activity forecasting, and group segmentation, can be found in some recent surveys [24][13][20]."]} +{"3186405|6327434": ["Traditional model-based fault detection and isolation (FDI) techniques (e.g., [ 1 ], [2]) are frequently used to identify faults in artifacts."]} +{"13238353|1932843": ["Indeed, it was observed that value based methods rarely work out-of-the-box in robotic applications [12], and that the best performing methods rely on a lot of prior knowledge and reward shaping [13, 17].", "First, as noted in [12], usually in robotics, we may only be able to \ufb01nd some approximate notion of a Markovian behaving state.", "Traditionally, machine learning approaches for planning are studied under the framework of Reinforcement Learning (RL) \u2014 see [4, 10, 22, 23] for a general overview and [12] for a comprehensive review of reinforcement learning in robotics."]} +{"13238353|1708582": ["e describe a machine learning algorithmic framework for the planning part. Traditionally, machine learning approaches for planning are studied under the framework of Reinforcement Learning (RL) \u2014 see [4, 10, 22, 23] for a general overview and [12] for a comprehensive review of reinforcement learning in robotics. Typically, RL is performed in a sequence of consecutive rounds. At round t, the planner (a.k.a. the a"]} +{"13238353|28670512": ["One possible solution to this problem is to use partially observed MDPs [27], in which we still assume that there is a Markovian state, but we only get to see an observation that is distributed according to the hidden state."]} +{"5962058|5755403": ["A lot of works have been done on trajectory clustering (Hu et al, 2004; Morris and Trivedi, 2008)."]} +{"5962058|17516538": ["A lot of works have been done on trajectory clustering (Hu et al, 2004; Morris and Trivedi, 2008)."]} +{"797194|4491892": []} +{"76661377|18599847": []} +{"17633382|1634674": ["Both plan recognition and activity recognition deal with agent intentions (see, e.g. , [10, 21])."]} +{"28755044|8363289": []} +{"9695675|1517662": ["A general overview of methods for conflict detection and resolution especially for air traffic is given in [15]."]} +{"8979634|5755403": ["As a proof-of-concept, we focus on trajectory-based human activity analysis [8]."]} +{"9854676|5755403": []} +{"53670210|1932843": ["Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs. By computing the \u201cdistance\" between nearby data windows, Kohlmorgen and Lemm [2001] segments human motion data using unsupervised learning.", "Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs.", "To address this issue, reinforcement learning can be used to improve the learned policy [Kober et al., 2013, Mnih et al., 2015, Silver et al., 2016].", "Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs. By computing the \u201cdistance\" between nearby data windows, Kohlmorgen and Lemm [2001] segments human motion data using unsupervised learning. Kuli\u0107 et al. [2008] proposed a method for segmenting and clustering whole body motions by using factorized HMMs.", "\u2026learning literature, methods that learn a forward model of the system and leverage it for learning a policy are often referred to as model-based, while methods that do not explicitly learn a forward model of the system are referred to as model-free [Kober et al., 2013, Deisenroth et al., 2013b]."]} +{"18500464|1517662": []} +{"5889262|7360895": ["HRI is a younger sub-domain of robotics [85], [18, 22, 29, 40]."]} +{"1033682|174797842": []} +{"3225104|206764452": ["Remarkable surveys on visionbased state-of-the-art pedestrian detection systems can be found on [3][4][5][6]."]} +{"3225104|1029120": ["Remarkable surveys on visionbased state-of-the-art pedestrian detection systems can b e found on [3][4][5][6]."]} diff --git a/edge/graph_155099815.jsonl b/edge/graph_155099815.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29ed11fd86566401581efb611e97a9c306182541 --- /dev/null +++ b/edge/graph_155099815.jsonl @@ -0,0 +1,11 @@ +{"52301585|8815923": ["Previous methods for object pose estimation largely depend on RGB-D data about the 3D working environment [1]\u2013[4]."]} +{"52938159|6972141": ["A related problem is visual servoing, where visual feedback is used to reach a goal configuration [14, 15, 16]."]} +{"6781584|7559976": ["There has recently been a signi\ufb01cant amount of work on domain adaptation, particularly for computer vision [16], [17]."]} +{"6781584|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment [2].", "However, the complexity of unstructured realworld scenes has a tendency to confound these assumptions, and learning-based methods have emerged as a powerful complement [2], [3], [4], [5], [6].", "neural networks into the grasp selection process [2], [5], [4], [7]."]} +{"46968412|8815923": [", 2016) and the MPI Grasping Dataset (Bohg et al., 2014).", "The recent development of machine learning techniques, especially deep learning, has enabled a surge of research that applies data-driven methods to robotic grasping (Bohg et al., 2014; Kappler et al., 2015)."]} +{"13072941|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment (Bohg et al., 2014)."]} +{"6138957|8815923": ["known objects to models in the database [4, 5, 8, 23, 27].", "performance according to physical models such as the ability to resist external wrenches [45], and empirical (or data-driven) methods [4], which typically use human labels [2] or the ability to lift the object in physical trials [43]."]} +{"8815923|118142": ["[1], the authors divide the methodologies into analytic and empirical.", "[1] divide the data-driven methods that are based on whether they employ object features or observation of humans during grasping."]} +{"3689180|8815923": ["Prior work in robotic manipulation has sought to address the grasping problem through a wide range of methods, from analytic grasp metrics [43], [36] to learning-based approaches [2]."]} +{"206428120|6681074": ["Extensive reviews over other descriptors are covered in [4, 14, 16]."]} +{"52815395|8815923": ["These techniques can be broadly categorized into physically-based approaches [3], [13], [15], [29] and data-driven approaches [5], [12], [17], [33], [41].", "Different methods have been proposed to determine the object categories automatically [26], [30], and define an object representation and a similarity metric for grasp transfer [5]."]} diff --git a/edge/graph_155099852.jsonl b/edge/graph_155099852.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b3053e6bc37a6c23346ab436b8a9c1c63bb9d5b --- /dev/null +++ b/edge/graph_155099852.jsonl @@ -0,0 +1,4 @@ +{"52984817|13151033": ["These influence factors can further be used to filter a knowledge graph [80] constructed from publicly available"]} +{"52984817|393948": ["Consequently, to reach a level of usable intelligence, we need (1) to learn from prior data, (2) to extract knowledge, (3) to generalize, (4) to fight the curse of dimensionality, (5) to disentangle the underlying explanatory factors of the data [14] and (6) to understand the data in the context of an application domain."]} +{"52984817|14843594": ["The ML community today is concentrating on automatic machine learning (aML) approaches, with the grand goal of bringing humans-out-of-the-loop [28], resulting in fully autonomous solutions."]} +{"49416376|10903568": []} diff --git a/edge/graph_155100097.jsonl b/edge/graph_155100097.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..161a3c043b93cc1553e4021ab2018dd192b4995a --- /dev/null +++ b/edge/graph_155100097.jsonl @@ -0,0 +1,137 @@ +{"15659119|386036": ["(Standard) Blocking algorithms use some blocking key to partition a set of records into disjoint partitions (blocks) [4], [8].", "Duplicate detection, also known as entity matching or record linkage, is the problem of identifying pairs of records that represent the same real-world entity [8], [13]."]} +{"479755|2082499": ["Separately, blocking has witnessed much speci\ufb01c research, with Christen surveying blocking methods [9].", "The \ufb01rst step, blocking , mitigates brute-force pairwise comparisons on all entities by clustering entities into blocks and then comparing pairs of entities only within blocks [9].", "In contrast, DNF-BSLs can be applied generally , with multiple studies showing strong empirical performance [21, 3, 6, 16]."]} +{"479755|386036": []} +{"13563854|386036": []} +{"2067543|2082499": ["Different indexing techniques are summarized in [6]."]} +{"2067543|386036": ["The entity resolution process encompasses several steps [7]: Data Preprocessing, which cleans and standardizes the data to be used; Indexing, which creates candidate records that potentially correspond to matches; Record Pair Comparison, which compares the candidate records using one or more similarity matching functions [10]; Classification, where candidate record pairs are classified into"]} +{"899958|191396": ["Clustering techniques that are robust against noise have been studied extensively in the past [2, 14]."]} +{"899958|386036": ["Entity Resolution has been studied under various names including record linkage, merge/purge, deduplication, reference reconciliation, object identification, and others (see [4, 15] for recent surveys)."]} +{"17847964|386036": ["A thorough overview of the existing work in this area can be found in surveys [11,20]."]} +{"13970666|191396": ["There exists a wealth of literature on clustering algorithms including several books [35, 40, 51], surveys [18, 23, 28, 36, 50], and theses [2, 39, 44, 47, 48]."]} +{"13970666|12894036": ["There exists a wealth of literature on clustering algorithms including several books [35, 40, 51], surveys [18, 23, 28, 36, 50], and theses [2, 39, 44, 47, 48]."]} +{"13970666|386036": []} +{"1687246|386036": ["This problem has been extensively studied in both database and natural language processing areas [7,9]."]} +{"18536078|386036": ["This problem is also known as duplicate detection, record linkage and merge/purge, and it has been extensively studied by different communities such as statistics, databases, and artificial intelligence (see [10] for a recent survey)."]} +{"44063437|386036": ["Related EMWork: EM has received much attention [9, 19, 24, 55, 63]."]} +{"29251214|2082499": ["For comparison, we generate the datasets according to parameters specified by Christen [3].", "Figure 2 provides a comparison of the average F-measure and standard deviation of the best performing algorithms [3] and Algorithm 1.", "Experiments analysis reported by Christen [3] indicates that the effectiveness of all blocking approaches begins to decline with the size of the dataset (see Figure 7).", "This algorithm is based on the sorted neighborhood algorithm, [23, 1] whose performance is recorded as inferior to other algorithms [3].", "Figure 7 compares the F-measure of Algorithm 1 with other blocking algorithms [3] on synthetic datasets.", ", sorted neighborhood [1], canopy clustering [2], and q-gram indexing [3].", "When comparing our algorithm to 12 other blocking techniques implemented in FEBRL [15], we have relied on the authors\u2019 selection of blocking keys as well as other parameters (similarity function, similarity threshold, q-gram size) that were set in [3].", "All experiments were conducted using FEBRL [15] and followed the guidelines provided by Christen [3].", "We now compare the performance of Algorithm 1 with the blocking algorithms surveyed in [3] on three real-world datasets.", "The blocking algorithms were assessed using three measures, namely Recall (known in the entity resolution literature as Pairs Completeness PC), Reduction Ratio (RR) [21] and Precision (known as Pairs Quality PQ) [3]."]} +{"29251214|386036": ["provided a comprehensive survey covering the complete Deduplication process [28]."]} +{"2444840|386036": ["Entity resolution is a very active research topic and many approaches have been proposed and evaluated as described in recent surveys [12, 18].", "Many approaches for entity resolution have been proposed [2, 12, 18, 20] and included in matching frameworks [4, 6]."]} +{"3749479|14074802": [", [10, 12]) and not yet for newer execution platforms based on Apache Spark or Apache Flink."]} +{"3749479|13151033": ["Knowledge graphs physically integrate entities from multiple sources with their properties, relationships and concepts in a graph-like structure [16, 14]."]} +{"3749479|386036": []} +{"11994312|14074802": ["A large number of tools for semi-automatic link discovery has been developed to facilitate the generation of new links (mostly of type owl:sameAs) [1].", "Link discovery has been studied intensively and a large number of approaches and prototypes has been developed as surveyed in [1]."]} +{"11994312|12161567": ["The matching entities of a cluster with their different properties can be easily fused to derive a more comprehensive, integrated entity representation that can be centrally maintained and accessed, e.g., within a knowledge graph [6], [7]."]} +{"6034409|1176034": ["Several temporal data models [15] and temporal knowledge discovery paradigms [16] have been proposed in the past."]} +{"6034409|14140377": ["Several temporal data models [15] and temporal knowledge discovery paradigms [16] have been proposed in the past."]} +{"6034409|386036": ["Record matching takes a collection of records and determines which records belong to the same real world entity (see [8, 12] for recent surveys)."]} +{"18765581|2082499": ["Although multiple methods have investigated the use of a given scheme in a variety of ways [2], there has been negligible research on learning the scheme itself.", "employed in the record linkage and blocking key literature [2], and can be found in the SecondString1 toolkit.", "The blocking step is comprehensively surveyed by Christen [2].", "This is because blocking methods require a blocking scheme, a function assumed to be provided by a domain expert [2].", "Two metrics, Reduction Ratio and Pairs Completeness are employed to express these goals [2], [6]."]} +{"18765581|386036": ["This final candidate set of pairs becomes the input to the second step of the record linkage process, which essentially involves classifying each pair as a match, non-match or possible match [1].", "Record Linkage typically requires two primary steps [1].", "Record Linkage, or the identification of entities within a database that are coreferent, is a long standing problem with no less than eight separate terms referring to the same problem [1]."]} +{"4332951|10500613": ["There are several surveys on schema matching and ontology alignment [18], [22], [23], [31], [55], [57], [61]."]} +{"4332951|913718": ["There are several surveys on schema matching and ontology alignment [18], [22], [23], [31], [55], [57], [61].", "Considerable work has been made on automating the process of ontology alignment, either focusing on specific applications or aiming at providing a generic way for various applications, as summarized in recent surveys [7], [18], [31], [49], [61], [57], [22]."]} +{"81990042|2082499": ["This also requires revisiting the blocking (aka indexing) techniques used to reduce the number of candidate pairs [7].", "Thus, the main objective of blocking is to achieve a good trade-off between minimizing the number of suggested comparisons and minimizing the number of missed matches [7].", "In general, blocking methods are defined over key values that can be used to decide whether or not an entity description could be placed in a block using an indexing function [7]."]} +{"979951|8155077": ["A more complete summary of dependency discovery could be found in [2] or [12].", "While [2] consider a more general view of data profiling, [12] focus specifically on the relaxed extensions of FDs, including conditions and similarity metrics."]} +{"979951|386036": ["MDsare \ufb01rst proposed in [20] to specify matching rules for record matching (also known as record linkage or object identi\ufb01-cation, see [19] for a survey).", "For the similarity operator \u2248 on the remaining attributes, we use cosine similarity on q-grams [19] with threshold 0.8."]} +{"16955731|10500613": ["To do so, we studied the related literature on schema matching [66], mapping [36], information integration [54] investigated in many real applications, and we studied various benchmarks from different areas, such as TPC-H,12 XBenchMatch [31], and most importantly our own STBenchmark [2]."]} +{"16955731|386036": ["The evaluation scenarios should include not only cases of different heterogeneities, but also scenarios with varying data sizes that can test how well the under evaluation matching system can cope with data at different scales [32].", "To better understand the aspects of matching system that a benchmark should evaluate, it is important to understand the way entity matching operates [26,32,38,39]."]} +{"38463562|2082499": ["In this context, the following measures are typically used for estimating the effectiveness of a block collection B that is extracted from the input entity collection E [4, 5, 22]: (i) Pairs Quality (PQ) corresponds to precision, assessing the portion of comparisons that involve a non-redundant pair of duplicates.", "To assess the effectiveness of a blocking method, we follow the best practice in the literature, which treats entity matching as an orthogonal task [4, 5, 7].", "Entity Resolution has been the focus of numerous works that aim to tame its quadratic complexity and scale it to large volumes of data [4, 8].", "To assess the effectiveness of a restructured block collection B\u2032, we use four established measures [4, 5, 22]: (i) its cardinality ||B\u2032||, i.", "Depending on the input entity collection(s), we identify two ER tasks [4, 21, 22]: (i) Dirty ER takes as input a single entity collection with duplicates and produces as output a set of equivalence clusters.", "In the context of Databases, the former task is called Deduplication and the latter Record Linkage [4].", "Typically, ER scales to these volumes of data through blocking [4].", "to achieve high recall in the context of noisy and heterogeneous data [4].", "They also rely on redundancy, placing every entity profile into multiple blocks so as to reduce the likelihood of missed matches [4, 22]."]} +{"38463562|386036": ["Entity Resolution has been the focus of numerous works that aim to tame its quadratic complexity and scale it to large volumes of data [4, 8].", "compare the profiles within each block [7, 8]."]} +{"1314877|386036": ["The Builder \ufb01rst partitions the data set into blocks of similar records, so that instead of comparing O ( n 2 ) objects, we need only compare O ( b 2 ) objects [7], provided blocking functions separate dissimilar records.", "Developments in entity resolution have been recently surveyed in [7, 17, 5]."]} +{"13374222|2082499": []} +{"13374222|386036": []} +{"3131450|386036": ["Record matching is a critical and well known problem (see [7, 9] for recent surveys)."]} +{"2056381|2082499": ["As is common with other blocking techniques, we can also improve the robustness of our approaches by running them multiple times with di\ufb00erent lists of blocking keys for a single ER task [3].", "Blocking (also called indexing ) for ER is an area of active research and several recent surveys have been conducted [3, 7, 15]."]} +{"2056381|191396": ["To combine the pairwise similarity between BKVs into an overall block similarity measure, denoted as \u03c2(b1,b2), we make use of three traditional approaches [24]: (1) single link \u03c2(b1,b2) = max(T ), (2) average link \u03c2(b1,b2) = mean(T ) and (3) complete link \u03c2(b1,b2) = min(T ), where T = {\u03b6(v1, v2) : v1 \u2208 V (b1) and v2 \u2208 V (b2)}."]} +{"2056381|386036": ["Entity resolution (ER) is a common data cleaning and pre-processing task that aims to determine which records in one or more data sets refer to the same real-world entities [7].", "Blocking (also called indexing ) for ER is an area of active research and several recent surveys have been conducted [3, 7, 15].", "For example, possible functions include the \ufb01rst two characters ( F2 ), exact value ( Ext ) and a Soundex encoding ( Sdx ) [7].", "Phonetic encodings such as Soundex and Double Metaphone [7], which have hard limits on the maximum number of unique BKVs they can create, can be particularly e\ufb00ective in this regard.", "To evaluate our approaches we compared performance with standard blocking [8], Soundex encoding [7], and sorted neighbourhood based indexing [11]."]} +{"7195313|2082499": ["This means that the schema-based blocking keys have to be manually con\ufb01gured in most of the cases, a requirement that signi\ufb01cantly restricts their utility [7].", "A bulk of relevant research has focused on improving its e \ufb03 ciency [6, 7, 11].", "The schema-based con\ufb01guration exploits a-priori schema information to come up with blocking keys that summarize the content of the attributes with the most distinctive values and / or the lowest levels of noise [6, 7].", "This task is also called Deduplication [6, 7] in the context of homogeneous data collections and involves a quadratic time complexity, as every entity has to be compared with all the possibly matching pro\ufb01les.", "The e \ufb00 ectiveness of a block collection B is assessed using three well-known measures [6, 7, 26, 27]: (M1) Pairs Completeness ( PC ) estimates the recall of B , i.e., the portion of duplicates from the input entity collection(s) that co-occur in at least one block.", "On the other hand, the performance of schema-based con\ufb01guration is very sensitive to the de\ufb01nition of the blocking keys, where minor modi\ufb01cations can result in major di \ufb00 erences in the quality of the produced blocks [6, 7].", "The most popular approach in this direction is blocking [3, 7, 26].", "For each method, we compare its schema-agnostic con\ufb01guration with 3 different schema-based ones that have been used in [7].", "The schema-based con\ufb01guration is typically applied to blocking methods like Sorted Neighborhood and Su \ufb03 x Arrays that are crafted for homogeneous data collections [6, 7, 10].", "Its size ( | B | ) denotes the number of blocks it contains, while its cardinality denotes the total number of comparisons it involves: Following the best practice in the literature, we consider entity matching as an orthogonal task to blocking [6, 7, 26, 27]."]} +{"7195313|386036": ["General discussions about blocking methods can be found in several surveys, books and tutorials about Entity Resolution [6, 11, 13, 14, 20].", "A bulk of relevant research has focused on improving its e \ufb03 ciency [6, 7, 11]."]} +{"2467151|386036": ["Entity Resolution has been studied under various names including record linkage [19], merge/purge [12], deduplication [20], reference reconciliation [7], object identification [21], and others (see [8, 23, 9] for recent surveys)."]} +{"44005138|2082499": ["According to a comprehensive analysis of blocking algorithms in [7], traditional blocking is one of the fastest approaches, however, there are several drawbacks.", "Higher pair quality for a blocking approach shows that this approach is more efficient and generates mostly true matched candidate pairs while a lower pair quality value means a large number of non-matches are also generated [7]."]} +{"44005138|386036": ["Our system follows the standard high-level structure of a record linkage pipeline [10] by being divided into four major components: 1) data cleaning 2) blocking 3) pairwise linkage and 4) clustering.", "where a single real-world entity gives rise to multiple records (see [10] for an overview)."]} +{"13372189|386036": ["A comprehensive overview of the existing work in this domain can be found in [6], [14], [15].", "rizing the values of selected attributes, and operate exclusively on it [6]."]} +{"183627|386036": ["Entity Resolution has been studied under various names including record linkage, merge/purge, deduplication, reference reconciliation, object identification, and others (see [7, 20] for recent surveys)."]} +{"16711198|2082499": ["We explain the bene\ufb01ts of blocking and refer to the qualitative measures that assess its performance [6].", "We conclude with their pros and cons and present an assessment of their relative performance, based on the experimental analysis of a recent survey [6]."]} +{"16711198|386036": ["We begin with an introduction to the main concepts of Entity Resolution, based on recent surveys [4] and books [5]."]} +{"8378506|386036": ["This problem has been studied extensively in the database community and is known as entity matching, record linkage, coreference resolution and deduplication [12, 16, 31]."]} +{"12964914|2082499": ["A recent survey on duplicate detection has argued that the matching phase is typically much more expensive than the blocking phase [13]."]} +{"12964914|386036": ["This problem has been extensively studied for several decades [22]."]} +{"26200578|14074802": ["As a consequence, there has been much research effort to develop link discovery (LD) frameworks [16] for automatic link generation.", "Link discovery (LD) has been widely investigated and there are many approaches and prototypes available as surveyed in [16].", "Link discovery (LD) has been studied intensively and there is a large number of approaches and prototypes available [16]."]} +{"26200578|12161567": ["However, there is an increasing need to evaluate the effectiveness of multisource clustering, as holistic data integration scenarios like the construction of knowledge graphs gains increasing research interest [3,20]."]} +{"43338354|386036": ["This problem has been an important challenge in data management [4, 6], and will become even more so in the age of Big Data and data science.", "EM has received much attention [4, 6]."]} +{"16535573|386036": ["Numerous similarity functions may be employed, in particular generic string similarity measures (see [20] [25] for a comprehensive comparison)."]} +{"198190157|9060471": []} +{"198190157|3241708": ["Other forms include crowdsourced labels [41,63], rules and heuristics for labeling data [47,65], and others [33,34,34,55,64]."]} +{"14923249|2082499": []} +{"14923249|386036": ["refer to this as the structural heterogeneity problem [5].", "Blocking is critical in data integration systems [5],[3].", "Blocking has been extensively studied in the record linkage community [5], with a comprehensive survey by Christen [3]."]} +{"11668048|386036": ["RELATED WORK There is a large body of related work on record linkage [5] and duplicate detection [4] within the database community as well as on ontology matching [6] in the knowledge representation community."]} +{"6814936|2082499": ["S0 has the purpose to increase the possible exploration of the graph when another strong source of information (which is not from the graph) can be used, and corresponds to the standard blocking or indexing heuristics in record linkage [8].", "On the other hand, the related problem of identifying duplicate entities known as record linkage or duplicate detection in the database field, and co-reference resolution in the natural language processing field, do have scalable solutions using indexing techniques [8, 13], though these do not typically"]} +{"6814936|12860838": ["A significant amount of research has been done in this area \u2013 particularly under the umbrella term of ontology matching [7, 16, 12]."]} +{"1793818|2082499": ["To enhance the efficiency of ER, blocking is typically used [2, 3].", "In this category fall practically all blocking methods that are inherently crafted for relational data [2]."]} +{"26644079|386036": []} +{"8854385|386036": []} +{"53081790|2082499": []} +{"13164308|386036": ["tities [17]: One would have been the result of the merging of e1 and e2, consisting of the union of their respective attributes, and the other would have been the entity e3.", "Query answering is then performed on the merged dataset [17].", "Some recent works explain how to turn these beliefs into probabilities [3, 16, 17].", "The solutions follow various directions such as measuring structural similarities among data structures [17], string similarities [8], innerrelationships [14, 24], clustering [7], and blocking [33]."]} +{"38373472|386036": ["attribute values, followed by either an unsupervised or supervised classification of pairs of records into matches and non-matches [6,14]."]} +{"7822730|2082499": ["Within the database literature, this task is related to record linkage [11], duplicate detection [5], or entity identi\ufb01cation [34] when performed over two relational databases."]} +{"2690556|386036": ["A variety of methods ( e.g., [3, 10, 12, 16, 17, 18, 19, 21, 20, 23, 27, 30, 32, 33]) and tools ( e.g., Febrl, TAILOR , WHIRL , BigMatch) have been developed for record matching (see [14] for a recent survey).", "Third, we have so far focused on 1-1 correspondences between attributes, as commonly assumed for record matching after data standardization [14].", "\u2026comparable , i.e., for each j \u2208 [1 , | X 1 | ] , X 1 [ j ] \u2208 R 1 , X 2 [ j ] \u2208 R 2 , and dom ( X 1 [ j ]) = dom ( X 2 [ j ]) (to simplify the discussion, we assume w.l.o.g. that X 1 [ j ] and X 2 [ j ] have the same domain, which can be achieved by data standardization; see [14] for details).", "In light of these demands a variety of approaches have been proposed for record matching: probabilistic ( e.g., [17, 21, 34, 32]), learning [12, 27, 30], distance-based [19], and rule-based [3, 20, 23] (see [14] for a recent survey).", "To handle large relations it is common to partition the relations into blocks based on blocking keys (discriminating attributes), such that only tuples in the same block are compared (see, e.g., [14]).", "It is known that matching keys typically assure high match accuracy [14].", "As remarked in Section 1, to improve match quality we often need to repeat blocking, windowing and matching processes multiple times, each using a different key [14].", "The operator can be any similarity metric used in record matching, e.g., q -grams, Jaro distance or edit distance (see [14] for a survey), such that x \u2248 y is true if x and y are \u201cclose\u201d enough w.r.t. a prede\ufb01ned threshold."]} +{"17829491|913718": []} +{"53238020|14074802": ["There is a huge amount of literature about ER and there are several books and surveys to provide an overview about the main methods and tools, e.g. [1], [2], and [9]."]} +{"53238020|3750204": ["FAMER utilizes Apache Flink which is similar to Apache Spark and both frameworks improve on MapReduce due to a better utilization of in-memory processing and better support for iterative algorithms as needed for clustering [16]."]} +{"2893307|10500613": ["There are several techniques that are relevant, at various levels, for entity integration: information extraction [9], schema matching [20], schema mapping [11], entity resolution [10], data fusion [3]."]} +{"2893307|386036": ["Our HIL framework bridges two lines of data integration research: schema mapping [11] and entity resolution [10].", "There are several techniques that are relevant, at various levels, for entity integration: information extraction [9], schema matching [20], schema mapping [11], entity resolution [10], data fusion [3]."]} +{"14433445|2082499": ["The most important ER blocking methods are summarized in [3].", "2 Metric Space for Blocking Techniques To meet the goal of high PC in the context of noisy or heterogeneous information spaces, blocking methods typically rely on redundancy: entities are associated with multiple, overlapping blocks, thus minimizing the likelihood of missed matches [3, 19, 24, 25]."]} +{"14433445|386036": ["They typically associate each record with a Blocking Key Value (BKV), which summarizes the values of selected attributes, and operate exclusively on it [6].", "Thus, instead of operating on the entire collection, it suffices to handle the data inside each block separately [6].", "A comprehensive overview of the most important works in this domain can be found in [6]."]} +{"1190647|386036": ["have compiled a survey of existing algorithms and techniques for duplicate detection [11]."]} +{"103063|2082499": ["Index Terms\u2014Information integration, entity resolution, blocking methods\n\u00c7", "2) high levels of noise: they suffer from incomplete information, as their usergenerated part involves missing or inconsistent data, with extraction errors.", "The most prominent among these techniques is data blocking, which clusters similar entities into blocks and performs comparisons only among entities in the same block."]} +{"103063|386036": ["THE amount of global, digital information has exhibitedan annual increase of 30 percent in the last few years [16], due to the distributed production of information in businesses and organizations, the increased ability and interest for automatic extraction of information from raw data, and the\u2026", "Index Terms\u2014Information integration, entity resolution, blocking methods\n\u00c7"]} +{"39969935|2082499": []} +{"39969935|386036": []} +{"1404764|10500613": ["Similar ideas are proposed in the domain of schema matching [26]."]} +{"1404764|386036": ["Some surveys can be found in [33], [34] and [11].", "Some existing instance matching (record linkage[11]) approaches also extract such a feature vector for classification, while each di computes the similarity of two values, one from each instance, that belong to a pair of matching properties (fields)."]} +{"12017023|2082499": ["[4]presentsasystemforautomaticallydeterminingthepolarityofrelationsbetweenactors,e.g. politiciansandparties,andissues,suchasunemploymentandhealthcare,inDutchtext.", "Blocking methods may place each entity pro\ufb01le into only one block, forming disjoint blocks, or into multiple blocks, creating redundancy [4].", "We apply them to seven synthetic datasets that were created by FEBRL [5] and have been widely used in the literature for this purpose [4, 13].", "It is de\ufb01ned as: Note that we follow a known best practice [1, 4, 18, 25], examining the quality of a block collection independently of pro\ufb01le matching techniques.", "Redundancy constitutes an indispensable and reliable means of reducing the likelihood of missed matches in the context of highly heterogeneous information spaces (HHIS), such as the Web of Data [4] and Datas-paces [16]."]} +{"12017023|386036": ["The same applies to other related methods, such as the Adaptive Sorted Neighborhood [33] and the Sorted Blocks approach [11].", "For example, even though Canopy Clustering and the Sorted Neighborhood approaches are scalable to large entity collections, they require an a-priori known schema in order to create blocks.", "In the middle of these two extremes lie redundancy-neutral blocking methods, which involve the same number of common blocks across all pairs of entity pro\ufb01les (e.g., Sorted Neighborhood [17]).", ", Sorted Neighborhood [12], Suffix Array [7], HARRA [14], Canopy Clustering [17], and q-grams blocking [10]) group entities based on knowledge about the semantics of their attributes.", "Schema-based methods (e.g., Sorted Neighborhood [12], Suf-\ufb01x Array [7], HARRA [14], Canopy Clustering [17], and q-grams blocking [10]) group entities based on knowledge about the semantics of their attributes."]} +{"14046686|386036": ["For a recent overview survey and a tutorial see [5] and [8], respectively."]} +{"4566376|2082499": ["provided more detailed discussions and evaluations for existing blocking techniques [74] [16].", "[74] in 2016 focused also on blocking (also called indexing) techniques used in ER, which has the same focus as [16].", "Christen [16] in 2012 focused on indexing techniques used in ER and gave a detailed discussion of six indexing techniques with a total of twelve variations of them, which included a theoretical analysis of their complexity and an empirical evaluation of these techniques."]} +{"4566376|386036": ["[28] in 2007 gave a thorough analysis of approaches on duplicate record detection, which specifically includes techniques used to match records with single attribute or multiple attributes, techniques for improving the efficiency and scalability of approximate duplicate detection algorithms, a few commercial tools used in industry and a brief discussion of open problems."]} +{"122426450|386036": ["A nice overview of such techniques can be found in [8]."]} +{"1976084|386036": ["One of the most critical tasks in data integration is entity resolution [9, 14, 17, 21, 29, 30, 40, 39]."]} +{"2082499|386036": ["While statisticians and health researchers commonly name the task of matching records as data or record linkage [11] (the term used in this paper), the computer science and database communities refer to the same process as data or field matching [12], data integration [13], data scrubbing or cleaning [14], [15], data cleansing [16], duplicate detection [17], [18], information integration [19], entity resolution [20], [21], [22], reference reconciliation [23], or as the merge/purge problem [24].", "Two recent surveys have provided overviews of record linkage and deduplication techniques and challenges [4], [18]."]} +{"11280427|2082499": [", [4, 8, 14, 18, 16, 28, 20, 7, 21]) has been identified as a standard technique for scaling deduplication: The basic idea is to find a set of (possibly overlapping) subsets of the entire dataset (called blocks), and then compute similarity scores only for pairs of entities appearing in the same block."]} +{"11280427|386036": ["As a post-processing step to automatically generated blocks, CBLOCK rolls-up smaller blocks to increase recall."]} +{"8693820|386036": ["Classical record linkage typically relies on similarity measures between strings and between records [8, 1].", "The problem has received much attention in the literature [1, 8]."]} +{"4946049|2082499": []} +{"4946049|10500613": []} +{"4946049|386036": []} +{"52889483|6923178": ["Matthews correlation coe\ufb03cient (MCC) [4] is de\ufb01ned as Heuristically, a value of 0.2 or lower is considered as good [35], i.e., D S can be used as a source for D T .", "Two datasets might be di\ufb00er-ent from each other in terms of prior probability distribution Train classi\ufb01er M on D 7: Evaluate performance of M on D S \u222a D T \\ D 8: Compute MCC using Equation 12 9: if average MCC over 10 runs \u2264 0 .", "Matthews correlation coefficient (MCC) [4] is defined as", "One can use Algorithm 5 and rank the datasets based on MCC."]} +{"52889483|386036": ["ER has been widely studied by using (a) declarative rules [49, 9] (b) ML-based models [30, 19, 29], and (c) experts or crowdsourcing [54, 23] (see surveys [20, 38] for more details)."]} +{"8509218|2082499": ["To show how precise comparison candidates are chosen, we evaluated the pairs quality PQ [19] of PSNM, PB, and SNM over time."]} +{"8509218|386036": ["\u202623: bPairs bPairs [ pBPs 24: procedure compare(blocks, pBPs, order) 25: for pBP 2 pBPs do 26: dPairs;cNum h i comp(pBP, blocks, order) 27: emit(dPairs) 28: pBP[2] dPairs j j/ cNum At first, PB calculates the number of records per partition pSize by using a pessimistic sampling function in Line 2.", "Much research on duplicate detection [2], [3], also known as entity resolution and by many other names, focuses on pairselection algorithms that try to maximize recall on the one hand and efficiency on the other hand."]} +{"35439586|2082499": ["This process is commonly called Entity Resolution (ER) [Christen 2012a].", "However, such attribute values are often of low quality, as they can be incomplete, contain errors, or change over time [Christen 2012a].", "We also provide a comparative evaluation of our proposed indexing technique with an existing q-gram technique that has previously been used for ER [Baxter et al. 2003; Christen 2012b; McCallum et al. 2000].", "Standard blocking [Christen 2012b] is based on inserting records into blocks according to blocking key criterion and only comparing records that are in the same block.", "Assuming we rank the tree nodes N i , 1 \u2264 i \u2264 k , according to their sizes (number of records in a node\u2019s list I ), the size of a node S i is calculated as where the denominator is the Harmonic number of the partial harmonic sum [Christen 2012b].", "The ER process encompasses several steps [Christen 2012a]: data preprocessing , which cleans and standardizes the data to be used; indexing , which reduces the number of candidate record pairs to be compared in detail; record comparison , which compares candidate record pairs in detail using a set\u2026", "To expand the window forwards (next), we compare the SKV of node N 6 with the SKV \u201crobinstevens\u201d of its next neighbor N 3 using the edit distance approximate string comparison function [Christen 2012a].", "The second baseline approach is a q-gram-based inverted index (QGI) [Baxter et al. 2003; Christen 2012b; McCallum et al. 2000] that converts the attribute values of each record in the database into a list of q grams.", "Whole records (for each record identi\ufb01er within C ) are then retrieved from the inverted index or database table D , and the attributes of q are compared with the retrieved records using similarity comparison functions [Christen 2012a] appropriate to the content of each attribute (line 9).", "Then the query record q is compared with all unique records in C in detail using similarity comparison functions [Christen 2012a] in the same way as is done in the DySNI."]} +{"35439586|386036": ["ManyER models were proposed in previous years (see Christen [2012a], Elmagarmid et al. [2007], and Winkler [2006] for existing ER models).", "However, such identi\ufb01ers are commonly not available, and therefore ER approaches need to be employed [Elmagarmid et al. 2007; Naumann and Herschel 2010]."]} +{"6111745|386036": ["The task of discovering links between knowledge bases is closely related with record linkage [22, 9] and de-duplication [7]."]} +{"8422849|386036": ["Reference [8] defines the \u201cmost informative\u201d question as the question that will cause the \u201cbiggest\u201d change in the current clustering, after the answer for that question is retrieved.", "References [8, 14, 19] study similar problems to the question selection for ER.", "As opposed to [8, 14, 19], our definition for the \u201cmost beneficial\u201d question, along with our results and algorithm, are based on a Maximum Likelihood formulation."]} +{"21976137|386036": ["[42] present a good survey on data matching, but they emphasize approaches that perform data value analysis rather than structure analysis."]} +{"15021425|386036": ["A comprehensive overview of the existing work in this domain can be found in [4, 6, 13].", "They define blocks on the equality (or similarity) of BKVs and compare solely the entities that are contained in the same block [6].", "To enhance its efficiency, blocking methods are typically employed [6, 11, 15]; they extract from every entity profile (or record) a Blocking Key Value (BKV) that encapsulates its most distinguishing information and define blocks on the equality (or similarity) of BKVs."]} +{"21906815|386036": []} +{"10494745|386036": ["We refer the reader to [25] and references therein for details of numerous clustering algorithms used for duplicate detection.", "There is a large body of work on clustering, including the use of clustering for information retrieval [6,34] and record linkage [25,35,39,41].", "Partitioning is a common algorithm used in early entity resolution work [25,35], and is included as a baseline."]} +{"14296387|10500613": ["2, discovery algorithms for mds need to leverage schema matching techniques [6,35] and expec-", ", the methods supported by COMA++ [6] or Clio [23]; see [35] for a survey), expectation maximization (em) algorithms [29,46] and methods for dependency discovery (e."]} +{"14296387|386036": [", q-grams, Jaro distance or edit distance (see [15] for a survey), such that x \u2248 y is true", ", Febrl, TAILOR, WHIRL, BigMatch) have been developed for record matching (see [15] for a recent survey).", "that R1[A j ] and R2[B j ] have the same domain, which can be achieved by data standardization (see [15] for details).", "It is known that matching keys typically assure high match accuracy [15].", ", [20,29,46, 48]), learning-based [13,36,42], distance-based [22], and rule-based [2,24,31] (see [15] for a recent survey).", "As remarked in Section 1, to improve match quality, we often need to repeat blocking, windowing and matching processes multiple times, each using a different key [15].", "butes, as commonly assumed for record matching after data standardization [15]."]} +{"12256374|386036": ["For a more comprehensive overview on general duplicate detection see [7]."]} +{"1776335|2082499": []} +{"1776335|386036": []} +{"1871232|386036": ["However, their fundamental assump\u00adtions are broken by the (semi-)structured \ndata sets of the Web of Data,due to the inherent characteristics of the latter: Loose schema binding, \nsince the schemata describing entities may range from locally de.ned to pure tag-style annotations.", "A complete overview of the existing work in this domain can be found in [5, 7, 15].", "As demonstrated by other approaches [7, 23], it is better to split the data into blocks, such that profiles within a block are more likely to generate matches in comparison to profiles in separate blocks.", "In IIWeb, 2003.", "Applying \na schema matching method to address this problem is not possible in the settings we consider, due to \nthe overabundance of schemata and attributes, the high change rates, and the subtle di.erences in the \nmeaning of attributes that the (user-generated) Web data encompasses [16].", "Web-scale data integration: You can a.ord to pay as you go.", "INTRODUCTION \nDue to the success of Social and Semantic Web applications, as well as the establishment of standards \nand best practices for pub\u00adlishing and exchanging data on the Web, a large and quickly grow\u00ading volume \nof structured and semi-structured data sets has become available on the Web.", "To make ER techniques applicable to large data sets, blocking mechanisms [7, 4, 22] have been introduced.", "Therefore, it cannot deal with the unstructured \nand semi-structured noisy data coming from the Web [7].", "Ef.cient Entity Resolution for Large Heterogeneous Information Spaces George Papadakis Ekaterini Ioannou \nL3S Research Center L3S Research Center Hannover, Germany Hannover, Germany papadakis@L3S.de ioannou@L3S.de \nABSTRACT We have recently witnessed an enormous growth in the volume of structured and semi-structured \ndata sets available on the Web.", "In our experiments, we had n = 7 and i \u2208 [1, 7] with a step of 0, 5, which results in dhmax values that span several orders of magnitude.", "It is suitable, therefore, for representing data both \nin Web [24] and dataspace applications [10].", "A variety of effective and efficient ER approaches exist [7, 23].", "Therefore, it cannot deal with the unstructured and semi-structured noisy data coming from the Web [7].", "As noted in [7], the prevalent method for enhancing the efficiency of the resolution process is data blocking."]} +{"15112957|2082499": ["This assumption is also predicated by the blocking step, which can only be applied if the vast majority of pairs are assumed to be non-duplicates [11].", "Traditionally, the blocking step uses a function called a blocking scheme in an algorithm called a blocking method [11].", "1 4 [11], including a variety of methods specifically designed for heterogeneous information spaces such as the Web of Linked Data [13].", "html In the record linkage literature, Restaurants is unambiguously considered real-world and not artificial [11].", "Entities sharing a blocking are paired and become candidates for further evaluations by an expensive link specification function in the classification step [11].", "The efficiency and effectiveness of blocking are evaluated by the special metrics Reduction Ratio and Pairs Completeness respectively [11].", "In recent years, as the state-of-the-art has steadily become more sophisticated, it has become the norm to only cover one part of the two-step instance matching pipeline in an individual work [6], [11]."]} +{"15112957|10500613": ["A survey of RDB schema matching was provided by Rahm and Bernstein [60]."]} +{"15112957|386036": ["A typical instance matching workflow runs in two steps and is supervised [6].", "The problem has important applications over structured [3], semistructured [1] and unstructured data models [4], and goes by many different names, including record linkage [5], deduplication [6] the merge-purge problem [7], data linking [8], entity resolution [9], link discovery [10] and co-reference resolution [4].", "Instance matching has emerged as an important research problem in the structured [6], semistructured [8] and unstructured data communities [4].", "It has been observed that these approaches tend to work well only if the data is well-structured and meets some stringent conditions [41, 6].", "[6], Winkler [5], K \u0308opcke and Rahm [15], Ferraram et al.", "test cases, which is quite typical for many instance-matchers [6].", "In recent years, as the state-of-the-art has steadily become more sophisticated, it has become the norm to only cover one part of the two-step instance matching pipeline in an individual work [6], [11]."]} +{"16691132|2082499": ["We actually follow the best practice in the literature and consider entity matching as an orthogonal task to blocking [5, 24, 27].", "Standard Blocking ( StBl ) [5, 26] has a parameter-free functionality: every distinct token t i in the input creates a separate block b i that contains all entities having t i in their attribute values as long as t i is shared by at least 2 entities (Figure 2).", "These cover all datasets and almost all techniques considered in [5].", "Typically, two duplicate entities are considered detected as long as they co-occur in at least one block \u2013 independently of the selected entity matching technique [2, 5, 22, 26].", "As an illustrating example, consider Figure 2, which demonstrates the functionality of Standard Blocking [5] when using the unsupervised, schema-agnostic keys proposed in [24].", "In the context of homogeneous data (databases), the former task is called Record Linkage and the latter Deduplication [5].", "Standard Blocking (StBl) [5, 26] has a parameter-free functionality: every distinct token ti in the input creates a separate block bi that contains all entities having ti in their attribute values as long as ti is shared by at least 2 entities (Figure 2).", "Christen\u2019s survey [5] examines the main blocking methods for structured data, concluding that they all require careful fine-tuning of internal parameters in order to yield high performance.", "Our experimental analysis builds on two previous surveys of approximate blocking methods for structured data [5, 24].", "In the example of Q-grams Blocking ( QGBl ) [15] transforms the blocking keys of StBl into a format more resilient to noise: it converts every token into sub-sequences of q characters ( q -grams) and builds blocks on Standard Blocking ( StBl ) [5,26] Sorted Neighborhood ( SoNe ) [16] Q-grams Blocking ( QGBl ) [15] Extended Q-grams Blocking ( EQGBl ) [5] Suffix Arrays ( SuAr ) [1] Extended Suffix Arrays ( ESuAr ) [5] Canopy Clustering ( CaCl ) [21] Extended Canopy Clustering ( ECaCl ) [5] Attribute Clustering ( ACl ) [26] TYPiMatch ( TYPiM ) [20] MFIBlocks ( MFIB ) [18] Extended Sorted Neighborhood ( ESoNe ) [5] Figure 3: The relations between lazy and proactive methods. their equality.", "Extended Sorted Neighborhood (ESoNe) [5] sorts the blocking keys of StBl in alphabetical order and slides a window of size w over them.", "Three measures are used for estimating the effectiveness of a block collection B [5, 24]: (E1) Pairs Completeness (PC) assesses the portion of the duplicate entities that co-occur at least once in B (also known as recall in other research fields)."]} +{"16691132|386036": ["The blocking techniques for ER [6, 9, 10, 12] can be distinguished in two broad categories: the approximate methods sacrifice recall to a minor extent in an effort to achieve significantly higher precision, whereas the exact methods guarantee that all pairs of duplicates are identified [17, 23].", "ESoNe w \u2208 [2, 100] 1 99 99 QGBl q \u2208 [2, 6] 1 5 5 EQGBl q \u2208 [2, 6] 1 5 20 t \u2208 [0.", "provide a comprehensive survey covering the complete deduplication process [6].", "ECaCl q \u2208 [2, 6] (inherent) 1 5 4,775 n1 \u2208 [1, 10] 1 10 n2 \u2208 [n1, 100] 1 \u2264100 SuAr lm \u2208 [2, 6] 1 5 495 bM \u2208 (1, 100] 1 99 ESuAr lm \u2208 [2, 6] 1 5 495 bM \u2208 (1, 100] 1 99"]} +{"16748895|2082499": ["Most of the previous work on data deduplication is situated in a centralized setting [4, 6, 7], and does not leverage the capabilities of a distributed environment to scale out computation; hence, it does not scale to large distributed data."]} +{"16748895|386036": ["Data deduplication has been extensively covered in many surveys [12, 13, 17].", "Data deduplication is a pervasive problem, and is extremely important for data quality and data integration [12].", "Since one blocking function might miss placing duplicate tuples in the same block, thus resulting in a false negative (for example, zipcode can be wrong or obsolete), multiple blocking functions [12] are often employed to reduce the number of false negatives."]} +{"14891551|2082499": []} +{"14891551|386036": [", record linkage1 [7]), where duplicates are merged or removed, is critical to ensure big data repositories are managed efficiently and effectively.", "Large-scale record linkage frameworks involve three fundamental data-intensive steps [7]."]} +{"34328658|2082499": ["More formally, two established measures are used for assessing the performance of a block collection [11, 2, 3, 10]:", "To assess the effectiveness of the (restructured) block collections, we employ four established measures [2, 3, 10, 11, 17]: (i) Pairs Completeness (PC) expresses recall \u2013 see Section 2.", ", placing every entity into multiple blocks, is employed by most blocking methods that handle noisy data [2, 3].", "A comprehensive survey can be found in [3]."]} +{"34328658|386036": ["Comprehensive surveys of the relevant techniques can be found in [1, 20, 21, 22, 23, 24, 25]."]} +{"17300055|2082499": ["Figure 2(a) shows the remaining ten pairs 1 In practice, we can adopt some indexing techniques such as blocking and Q-gram based indexing [7] to avoid all-pairs comparison.", "There are also some studies on blocking which consider partitioning of a table of records to maximize matching record pairs co-occurring in given partitions [7]."]} +{"17300055|386036": ["It has been studied extensively for several decades (see [11] for a survey).", "There has been signi\ufb01cant work in developing automated algorithms for entity resolution (see [11] for a recent survey)."]} +{"207239169|8372620": []} +{"966063|386036": []} +{"14804641|2082499": ["Compared with supervised meta-blocking, Blast yields a lower F1-score only with ar1, though \u2206PC is +6%.", "We also consider the F1-score [5], useful to compare block collections that present different values of both PC and PQ.", "While, compared to traditional CNP techniques, Blast yields a lower PQ and F1-score than cnp2 only in ar2; though \u2206PCpBcnp2 ,BBlastq is `12%.", "We also consider the F1-score [5], useful to compare block collections that present different values of both PC and PQ. Formally:\nPCpBq\u201c", "Metrics: We employ Pair Completeness (PC) and Pair Quality (PQ) [5] to evaluate the quality of a block collection B, which are surrogates of recall and precision, respectively.", "Hence, we compare Blast meta-blocking in three different settings (chi, wsh, and bch) described in the following. chi: We run Blast switching off the aggregate entropy, i.e., the weights of the blocking graph are computed using \u03c72 without the multiplicative entropy factor. wsh: We run Blast replacing the \u03c72-based weighting function with the traditional weighting scheme\n10Standard Blocking is equivalent to Token Blocking modified to exploit schema-mapping to disambiguate tokens according to the attribute in which they appear.", "Finally, we compare Blast against schema-based Standard Blocking [5, 17] on the fully-mappable datasets (ar1, ar2, and prd).", "One fundamental step in data integration is Entity Resolution (ER), namely the task of matching records (the entity profiles) from several data sources (the entity collections) that refer to the same real-world entity [5].", "Overall, the experimental results presented above show that Blast outperforms traditional meta-blocking (both WNP and CNP) in terms of PQ and F1-score on 2 out of 3 of the fully-mappable dataset comparisons, and on 2 out of 2 of the partially-mappable ones.", "Blocking Background: Traditional schema-based blocking techniques generate blocks according to a blocking criterion (blocking key), either based on a single attribute, or a combination of attributes [5].", "To evaluate the performances of Blast we compared it against traditional meta-blocking techniques on 3 real-world benchmark datasets [5].", "Standard Blocking is one of the best performing approaches in the literature [5], and is compatible with meta-blocking10.", "In fact, Blast achieves significantly higher F1-score than the one achieved by traditional meta-blocking, maintaining high level of PC. Differently, Token Blocking combined with LMI and traditional meta-blocking achieves a slightly higher F1score than that achieved by Token Blocking alone.", "Standard Blocking is one of the best performing approaches in the literature [5], and is compatible with meta-blocking(10).", "Evaluation Metrics: We evaluate the quality of the produced block collections in terms of precision and recall, through their surrogates PC, PQ and F1-score (section 2).", "Blast achieves higher PQ and F1-score than traditional WNP, and a slightly lower PC."]} diff --git a/edge/graph_155100337.jsonl b/edge/graph_155100337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e7f2fb4a908fa209c890a8ad39b91d252d1a8a4 --- /dev/null +++ b/edge/graph_155100337.jsonl @@ -0,0 +1,40 @@ +{"13080404|3330313": ["All the techniques discussed here are not exhaustive, rather representative of the different approaches (more comprehensive reviews can be found in [13, 26]).", "Anomaly detection, given its wide range of applications, has been extensively studied over the past decades [13, 21, 26].", "edu mainly through statistical and machine learning techniques [13, 21, 26]."]} +{"30774633|207743293": ["Specific systems have been proposed to detect rumors [66]."]} +{"13329164|1174262": ["Movement data has recently received substantial attention in the visualization community (see [5] for a survey)."]} +{"13329164|2593345": []} +{"1555160|239537": ["In line with the next step of the Visual Information Seeking Mantra [29], SocialAction allows users to zoom and filter, since users\u2019 perceptual clarity improves when the number of visualized elements is limited [18].", "However, there are great challenges when visualizing networks [9, 18]."]} +{"5865347|50458504": ["Finally, due to the wide-range of application domains, fraud detection has attracted many surveys (Edge and Falcone Sampaio 2009; Flegel et al. 2010; Phua et al. 2010).", "For a general survey on various fraud detection techniques, we refer the reader to [Bolton and Hand, 2002] and [Phua et al., 2010].", "Finally, due to the wide-range of application domains, fraud detection has attracted many surveys [Edge and Sampaio, 2009, Flegel et al., 2010, Phua et al., 2010]."]} +{"1141362|2593345": ["Due to the scale and noisiness of data, important attributes of the threads, such as the actual message contents, features used in the anomaly detection, and other meta-data information, should be visually summarized and aggregated when appropriate, to facilitate the discovery of interesting subsets of data [22, 39].", "Second, by manipulating the slider on the toolbar, FluxFlow allows a user to quickly collapse all nodes below certain tree level, shown in the compact forms, which is suggested as the above traversal paradigm in [22]."]} +{"174114|2593345": []} +{"207172599|3330313": []} +{"5554263|37590153": ["To the best of our knowledge, the visual analytics approaches to detecting the rating fraud are rare, although they are similar to some existed network security problems [23, 29, 10, 8, 25]."]} +{"2354472|5246835": []} +{"2354472|10975328": ["Regarding the visualization of time-series data and the available techniques, an overview can be found in [24]\u2013[26]."]} +{"2354472|50458504": ["An overview of existing publications on data-mining can be found in [2]\u2013[5]."]} +{"59528442|51909308": ["\u2026behavior may change over time, for instance, the nature of anomaly had changed so signi\ufb01cantly and that it remained unnoticed at Maroochy water treatment plant, for a long time which resulted in leakage of 150 million liters of untreated sewerage to local waterways (Ramotsoela et al. [2018])."]} +{"59528442|49669060": ["A survey of traditional anomaly detection techniques and its challenges to detect anomalies in social networks is a well studied topic in literature (Liu and Chawla [2017], Savage et al. [2014], Anand et al. [2017], Yu et al. [2016], Cao et al. [2018b], Yu et al. [2016])."]} +{"59528442|52043210": []} +{"59528442|4097106": ["Several works have studied the state-of-the-art deep models for video anomaly detection and have classi\ufb01ed them based on the type of model and criteria of detection (Kiran et al. [2018], Chong and Tay [2015]).", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017].", "\u2026contributions as follows: \u2022 Most of the existing surveys on DAD techniques either focus on a particular application domain or speci\ufb01c research area of interest (Kiran et al. [2018], Mohammadi et al. [2017], Litjens et al. [2017], Kwon et al. [2017], Adewumi and Akinyelu [2017], Ball et al. [2017]).", "The state-of-the-art deep learning based methods for video anomaly detection along with various categories have been presented in Kiran et al. [2018].", "A review of deep learning based semi-supervised techniques for anomaly detection is presented by Kiran et al. [2018] and Min et al. [2018]."]} +{"59528442|9461213": ["al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.al Ball et al. [2017]. The state-of-the-art deep learning based methods for video anomaly detection along with various categories has been presented in Kiran et al. [2018]. Although there are a number of reviews in applying DAD techniques, there is shortage of comparative analysis of deep learning architecture adopted for outlier detection.", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017].", "domain is presented by Mohammadi et al. [2018]. In this section we present some of the DAD techniques used in this domain in Table 14.", "al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.al Ball et al. [2017]. The state-of-the-art deep learning based methods for video anomaly detection along with various categories has been presented in Kiran et al.", "[2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.", "al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.", "[2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017]. 1 2 3 4 5 6 7"]} +{"59528442|2088679": ["\u2026contributions as follows: \u2022 Most of the existing surveys on DAD techniques either focus on a particular application domain or speci\ufb01c research area of interest (Kiran et al. [2018], Mohammadi et al. [2017], Litjens et al. [2017], Kwon et al. [2017], Adewumi and Akinyelu [2017], Ball et al. [2017]).", "An extensive review of using DAD techniques in the medical domain is presented by Litjens et al. [2017].", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017]."]} +{"59528442|18188725": ["Several studies have been conducted to understand the theoretical and practical applications of deep learning in medical and bio-informatics (Min et al. [2017], Cao et al. [2018a], Zhao et al. [2016], Khan and Yairi [2018])."]} +{"59528442|8965636": ["Many traditional machine learning algorithms have been applied successfully in fraud detection (Sorournejad et al. [2016])."]} +{"59528442|17195518": ["7 Brown et al. [2018], Zhang et al."]} +{"59528442|1828831": ["Several works have studied the state-of-the-art deep models for video anomaly detection and have classi\ufb01ed them based on the type of model and criteria of detection (Kiran et al. [2018], Chong and Tay [2015])."]} +{"59528442|18599847": []} +{"12597448|239537": ["Once this pre-processing stage is done, the network is visualized using graph or network visualization techniques [Ead84, KV06, HMM00]."]} +{"16075748|239537": ["[22] surveyed other network visualization techniques beyond our paper\u2019s scope.", "While the research topics in network visualization are as numerous as the visualizations themselves [22, 38], in this work, we consider network visualization techniques and tools that are pertinent to multivariate geospatial network data.", "While various systems and techniques for network visualization have been proposed [22], few support analyzing both multivariate network data (e."]} +{"16991844|11632848": ["\u2026in Section 4, the representation of the user data is described and explained; in Section 5, the main proposal of our paper, i.e., a method of the user accounts visualization on the SOM, is presented; in Section 6, the actual fraud detection is described; in Section 7, the experimental results\u2026"]} +{"16991844|5246835": ["The general problem of fraud detection has been reviewed in [36,28,37\u201339]."]} +{"16991844|12815020": []} +{"3456865|14414383": []} +{"3456865|9236463": ["The traditional software analysis is based on the source code inspection [13, 25, 31] because the runtime analytics of software can evolve billions of executions per second and generate a huge volume of monitoring data."]} +{"13941520|10817088": []} +{"16877651|5246835": ["Many of the existing works on fraud detection in general, use data-mining (Bolton and Hand, 2002), (Kou et al., 2004), (Phua et al."]} +{"16877651|50458504": []} +{"2453613|5246835": ["[20] presented a survey of techniques for identifying the same types of fraud as described in [32]."]} +{"16133104|239537": []} +{"44081370|14414383": [". Classic anomalous and signi\ufb01cant subgraphs refer to subgraphs, in which the behaviors (attributes) of the nodes or edges are signi\ufb01cantly different from the behaviors of those outside the subgraphs [48]. Anomalous and signi\ufb01cant subgraphs in social network can be used for early detection of emerging events such as civil unrest prediction, rare disease outbreak detection, and early detection of human"]} +{"5837127|10975328": ["ral visualization (for a survey, see Silva [26])."]} +{"8606391|18986679": []} +{"10783452|50458504": ["Despite the wide amount of available outlier detection techniques in the literature, most solutions implement machine learning approaches [PLSG10, YWW \u2217 07]."]} diff --git a/edge/graph_155100638.jsonl b/edge/graph_155100638.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d6aa09c3e4d15b866a4eb62f50e5edd8bda8aa5d --- /dev/null +++ b/edge/graph_155100638.jsonl @@ -0,0 +1,2 @@ +{"5072524|3273340": []} +{"18481880|1188683": ["This allows the CGRA to act as \u201cvirtual hardware\u201d [25]."]} diff --git a/edge/graph_155101573.jsonl b/edge/graph_155101573.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3a0f60680567a95af10e8889361982d92ddb739 --- /dev/null +++ b/edge/graph_155101573.jsonl @@ -0,0 +1 @@ +{"13562080|13493163": ["Since then the application of fluorescent molecules has become standard during preclinical molecular imaging applications (in vitro and in vivo) [36\u201338] and in medicine, where perfusionmeasurements using fluorescein [39] and indocyanine green (ICG) are routinely used [15, 40]."]} diff --git a/edge/graph_155105898.jsonl b/edge/graph_155105898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93505ee36374db68f5cbf75a0dba52978f109aef --- /dev/null +++ b/edge/graph_155105898.jsonl @@ -0,0 +1,81 @@ +{"8611847|819377": []} +{"206767859|819377": ["The spatiotemporal constraints for GMMs have been shown as robust to sudden changes in [34]."]} +{"26932094|12127129": ["For a detailed survey, please refer to [25] and [26]."]} +{"1655294|12127129": ["Concerning the computational efforts of the per-pixel processes, in [9] a good analysis is given: speed and memory usage of some widely used algorithms are taken into account."]} +{"11279201|14970359": ["A short summary of different approaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to (Gavrila 1999) and (Moeslund and Granum 2001).", "A short summary of different ap proaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [24] and [44]."]} +{"11279201|7788290": ["A short summary of different approaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to (Gavrila 1999) and (Moeslund and Granum 2001).", "A short summary of different ap proaches with evaluation and error measures employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [24] and [44]."]} +{"43979806|13808741": ["[203] S. Dubuisson and C. Gonzales, A survey of datasets for visual tracking\u201d, Machine Vision and Applications, 27(1), (2016), 23-52.", "Recently, Dubuisson and Gonzales [203] provided an excellent review on datasets available for visual tracking."]} +{"43979806|8968641": []} +{"43979806|18546648": ["[67] followed the work done in [66] but with comparing recent publications and using a more comprehensive set of test sequences."]} +{"43979806|17516538": ["Introduction In the field of computer vision, detection of moving objects from a video sequence, which is based on representing moving objects by a binary mask in each frame, is an important issue and interested in many vision based applications such as action recognition [1], traffic controlling [2], industrial inspection [3], human behavior identification [4], and intelligent video surveillance [5]."]} +{"57825693|11905372": []} +{"57825693|819377": ["To have an overview about the fundamental research in this field, the reader can refer to numerous surveys on background initialization [235][236][47][171] and background subtraction methods [46][43][128][45][41][42][50][44][49]."]} +{"35782884|7860973": []} +{"12549541|819377": ["\u2022 Bouwmans et al., 2008 [5] survey only GMMmethods and use the Wallflower dataset.", ", 2008 [5] survey only GMMmethods and use the Wallflower dataset."]} +{"12783309|819377": ["DPGrimsonGMMBGS Gaussian Mixture Model [38] MixtureOfGaussianV1BGS Gaussian Mixture Model [25] MixtureOfGaussianV2BGS Gaussian Mixture Model [49] DPZivkovicAGMMBGS Gaussian Mixture Model [49] LBMixtureOfGaussians Gaussian Mixture Model [6]"]} +{"1252712|17516538": ["Usually, the most important objects to consider are people and vehicles [4, 6], and, in particular, distinguishing different vehicles is a hard task due to the several characteristics of each vehicle [8]."]} +{"53293308|49862415": []} +{"53293308|49867084": []} +{"53293308|47022048": []} +{"53293308|4951598": []} +{"53293308|21656238": []} +{"53293308|22163846": []} +{"53293308|206603045": []} +{"53293308|8574504": []} +{"39057096|12127129": ["Background subtraction is multifaceted and an active area of research, with a large number of variants proposed by researchers, and a number of detailed reviews comparing them are discussed in the literature [24\u201327]."]} +{"7245772|819377": ["years (extensive surveys can be found in [5], [8], [67], and [68])."]} +{"11518157|8446711": ["Recent studies have gone beyond the traditional tasks and applied thermal imaging to monitoring of wild animals, noninvasive food inspection, and heat loss detection [1], [2]."]} +{"27362834|18546648": []} +{"27362834|14415030": []} +{"7018628|819377": ["For the depth classifier, the Gaussians have a single dimension; for the color based classifier, Gaussians have three component s that are assumed to be independen t, thus reducing the computa tional cost of the algorithm as widely consid ered in the literature [6,26].", "5 (used for matched component identification in MoG models [26]) as the distance for which CLC is considered a very reliable classifier, reaching the maximum weight Wmax for d\u00f0x\u00de 1\u20444 2."]} +{"570584|64404": ["The use of multiple reference frames (MRFs) with variable block sizes typically provides better coding performance than the single reference frame approach [1]-[4] for video with repetitive motion, uncovered background, non-integer pixel displacement, lighting change, etc.", "The latest HEVC video coding standard [1] has improved the coding performance by applying a number of innovative tools compared to its predecessor H."]} +{"570584|3540699": ["264/AVC [2][3] including a wider range of variable block size motion estimation (ME), motion compensation (MC), prediction, and transformation units."]} +{"4187680|15178364": ["MOVING object detection (MOD) from a video stream plays a core role for many high-level computer vision tasks, such as automatic video surveillance [1], object-based video coding [2], and behavior recognition [3]."]} +{"67400563|18546648": ["A number of standard image feature descriptors based on colour, intensity, edge, texture and gradient have been proposed to differentiate shadows from objects [17]."]} +{"14956420|12127129": ["I. INTRODUCTION\nF OREGROUND detection is fundamental in many systemsrelated to video technology [1], [2]."]} +{"15491850|12127129": ["Some of them are very general like [16] [3] or on the contrary, focus on specific application like traffic jam analysis [6].", "They use different measures like speed, memory requirement or accuracy and compare different methods [16, 6, 8, 2]."]} +{"15482841|12127129": ["Piccardi [12] investigated the computational complexity, memory requirements, and theoretical accuracy of seven BGS algorithms."]} +{"14741894|1235863": ["[29] present a comprehensive survey of recent research results to address the problems of intra-camera tracking, topological structure learning, target appearance modeling, and global activity understanding in sparse camera networks."]} +{"14741894|17516538": ["Visual surveillance techniques have initiated a wide variety of applications in access control, person specific identification, anomaly detection and alarming in academic community as well as industry and government [24]."]} +{"8393773|819377": ["They try to model the background using either generative methods [1, 4, 26, 36], or non-parametric methods [3, 19].", "They model the background using either generative methods, such as a Bayesian model [1], self-organized map [26], Gaussian mixture model [4], independent component analysis [36], foregroundbackground mixture model [27] or non-parametric methods [3, 19]."]} +{"8393773|17024419": []} +{"4952110|819377": []} +{"4952110|12127129": ["There are many background subtraction methods [1]\u2013[13] in the literature.", "Other than the above models, there are also methods based on support vector machines and other approaches which can be found in several survey papers [1]\u2013[13] as mentioned in the beginning of this Section.", "Other approaches, which go beyond the scope of this paper, can be found in several survey papers [1]\u2013[13]."]} +{"18152430|18546648": ["Shadows Features: Colors, edges, textures [206][317][3][219][9][25][246] Strategies: Markov Random Fields (MRF) [246]", "Complete studies and surveys can be found in [206][317][3][219][9]."]} +{"18152430|819377": ["So, the previous surveys made by Bouwmans et al. focus only on some categories [38][34] or sub-categories [37][33][40] of background models as follows: is the most common approach ."]} +{"18152430|12127129": ["In 2004, Piccardi [201] provided a review on 7 methods and an original categorization based on speed, memory requirements and accuracy."]} +{"17580315|8042572": ["IVS and IVA provide effective means of sensing in intelligent environments [113], which is much related with the recent concepts of CPS or Internet of Things (IoT)."]} +{"21994234|12127129": []} +{"7237772|12127129": []} +{"31358607|17516538": []} +{"49744838|7559976": ["There have been many methods proposed for domain adaptation in classification [41]."]} +{"10420698|52260786": ["Furthermore, the different robust problem formulations based on the decomposition into lowrank plus additive matrices often outperform state-of-the-art methods in several computer vision applications [46][229]."]} +{"10420698|819377": ["Moreover, we believe that we are living in a key transition in the field of background subtraction as we are progressively migrating from the conventional statistical models as MOG [357][33], KDE [95][30] and naive subspace learning models [29] to models based on robust decomposition into low-rank plus additive matrices (RPCA, RNMF, RMC, RSR, RST, LRM) which can achieve at least the same performance in terms of precision than the conventional statistical models [36].", "Many foreground detection methods have been developed [33][29][30][31][34][321], and several implementations are available in the BGS Library [346]."]} +{"121788508|18546648": []} +{"121788508|12127129": []} +{"62436546|819377": ["This paper is an extended and updated paper of the surveys on Mixture of Gaussians for background modeling [48] and Subspace Learning for background modeling [334].", "All the developed improvements can be classified following the strategies and a complete survey over 100 papers in the period 1999-2007 can be found in [48]."]} +{"7807670|14970359": ["A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "The initial model is then refined using a Bayesian network that imposes human body proportions onto the body part size estimates."]} +{"7807670|7788290": ["55], 100 UAm [1], 200 UAm0 [1], 100 LowerArm [0.", "9], 100 Thm [1], 200 Thm0 [1], 100 Calf [1], 100 Cm [1], 200 Cm0 [1], 100 UpperArm [0.", "A reliable motion capture system would be valuable in many applications [1, 2].", "A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "75], 100 LAm [1], 200 LAm0 [1], 100 Torso (\u03bc, \u03c3) = (500, 300) Height [1, 1, 1], 100 Table 3 The parameters used in the Bayesian network shown in Figure 13."]} +{"47022048|35937139": ["Structured light [30]: A structured light sensor consists of an IR emitter and an IR camera.", "Structured light [30]: A structured light sensor consists of an IR emitter and an IR camera. temporally, and noise is content-dependent and hence dif\ufb01cult to remove by traditional \ufb01ltering The emitter projects an IR speckle pattern onto the scene; the camera captures the re\ufb02ected pattern and\u2026"]} +{"47022048|7860973": ["Several RGBD datasets exist for different tasks, including object detection and tracking, object and scene recognition, human activity analysis, 3D-simultaneous localization and mapping (SLAM), and hand gesture recognition (e.g., see surveys in [24,86,87]).", "In [24], Camplani et al. survey multiple human tracking in RGBD data."]} +{"47022048|4351505": ["Several RGBD datasets exist for different tasks, including object detection and tracking, object and scene recognition, human activity analysis, 3D-simultaneous localization and mapping (SLAM), and hand gesture recognition (e.g., see surveys in [24,86,87])."]} +{"14737467|9022135": []} +{"14737467|819377": []} +{"14737467|12127129": []} +{"14737467|17516538": []} +{"16467616|12127129": []} +{"3740732|819377": ["The landmark paper in this regard was [5], with much of the current research based on this approach [6].", "Since then there have been various other pixel based methods [6] that have improved upon this method.", "4 of [6] focuses on the different approaches to adapt the learning rate in MoG)."]} +{"206591471|819377": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness.", "We refer to the work of Bouwmans et al. [4] for a comprehensive list.", "This originates from the quick weight up-date of the Gaussian mode, while the Gaussian distribution itself is adapted very slowly (cf. [4])."]} +{"206591471|12127129": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness."]} +{"3309733|819377": ["Some cameras apply automatic exposure adjustment resulting in global brightness fluctuations in time."]} +{"3309733|12127129": ["Piccardi, 2004 [20] Review of 7 background subtraction methods which highlights their strengths and weaknesses."]} +{"17741666|819377": []} +{"8738523|819377": []} +{"21645371|12127129": []} +{"3923651|7361943": ["can be effectively tackled by taking necessary steps to alleviate the congestions resulting from these incidents [2]."]} +{"783186|12127129": ["Since its introduction, the model has gained vastly in popularity among the computer vision community [4], [7], [11], [42]\u2013[44], and it is still raising a lot of interest as authors continue to revisit the method and propose enhanced algorithms [45]\u2013[50].", "According to [7], a background subtraction technique must adapt to gradual or fast illumination changes (changing time of"]} +{"5487260|24856837": []} +{"5487260|819377": []} +{"5487260|12127129": []} +{"17803066|2355696": []} +{"59699346|12127129": []} diff --git a/edge/graph_155107740.jsonl b/edge/graph_155107740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1f20ef876047d8b5d3af8abfa0d2d3f11fe248d --- /dev/null +++ b/edge/graph_155107740.jsonl @@ -0,0 +1,38 @@ +{"1756768|3348390": ["[30], intelligence should be a major characteristic of IoT systems."]} +{"49656937|17267830": ["In order to guide the design of our proposed solution, the Kill Chain attack model [20] was considered."]} +{"207627910|21386749": ["dustry of Internet of Things (IoT) devices [1] is to be found in the streams of data generated by those devices. Application areas where interest in IoT data streams is growing range from health care [2] to personal \ufb01tness, smart cities [3], optimization of energy consumption at home, and many more. In each of these areas, the value of IoT is only delivered when the continuous data streams produced a"]} +{"207627910|7329149": ["ing that a viable business model can indeed be associated with our technical approach. INTRODUCTION Much of the expected value associated with the growing industry of Internet of Things (IoT) devices [1] is to be found in the streams of data generated by those devices. Application areas where interest in IoT data streams is growing range from health care [2] to personal \ufb01tness, smart cities [3], opti"]} +{"52882934|3628110": []} +{"52882934|7971188": []} +{"49654796|21386749": ["17 numSkip\u2190 m\u00d7 (1)e 18 for t = 1 to numTrials do 19 Shuffle(ratings) 20 bestRating\u2190 ratings[1] 21 candidate\u2190\u22121", "INTRODUCTION Internet of Things(IoT) [1] applications in the modern healthcare system include devices, services and wireless sensors that detect physiological signs with wearable or ingestible sensors [2] that stream data to remote, and often Cloud based servers."]} +{"49654796|6332923": ["Further, Kumar and Lee [23] pointed that hardware built in cryptosystem in Alarm-net makes the application highly platform dependent."]} +{"3686134|3767252": ["Roman et al. (2018) performed a holistic analysis on the security threats and challenges of edge computing."]} +{"3639079|3628110": ["Despite providing robust approaches for securing IoT, the blockchain systems are also vulnerable [136]."]} +{"3639079|3767252": []} +{"3639079|2142482": ["Similarly, the authors in [12, 13, 14] target a comparative evaluation of intrusion detection systems."]} +{"3639079|16209841": ["The security analyses presented in [9, 10, 11] discuss and compare different key management systems and cyrptographic algorithms."]} +{"3639079|2181694": ["The energy constrained devices in IoT are vulnerable to \u201dsleep deprivation\u201d attacks by causing the sensor nodes to stay awake [36].", "5 Sleep deprivation attack Energy consumption Link layer Low-level Multi-layer based intrusion detection system [36]", "A framework for mitigating sleep deprivation attacks in wireless sensor networks is described in [36]."]} +{"3639079|9646739": []} +{"3639079|925507": ["The authors in [126] have categorized 18 use cases of blockchain, out of which four cases are for IoT."]} +{"49476583|925507": []} +{"56061733|12150819": ["Using a collection of cheap sensors and interconnected objects, information can be collected from our environment that will allow improving our way of living [1]."]} +{"49692015|49527603": []} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"3782634|3628110": ["Based on this attack model, we analyzed the proposed process with the vulnerabilities speci\ufb01ed in the literature of escrow protocol [23], blockchain [24\u201326], and smart contract [27,28,48], in order to identify the possible attacks.", "Thus, the transporter counts the number of gas-costly instructions in the function, such as SLOAD , SSTORE , BALANCE , and SUICIDE [26,28] and compare it with that of the reference function (Line 10).", "Luu et al. [24], Halpin et al. [25] and Li et al. [26] systematically surveyed the vulnerabilities of blockchain consensus, smart contracts and attacks."]} +{"2685460|2623404": ["Software-Defined IoT Components Software-defined networking (SDN) [12, 13] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic).", "Network Virtualization [15] goes beyond SDN by focussing on the virtualization of all components resulting in the ability to define customized virtual networks.", "Software-defined networking (SDN) [12] [13] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic)."]} +{"51935081|51613885": ["Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper In contrast to work presented in [5\u20139, 12", "ICO stands for \u201cInitial Coin Offering\u201d wherein a share of the cryptocurrency is offered to early investors in exchange for legal tender or other cryptocurrencies\u2014for example, Factom [23] and Civic [24]; (iii) Asset-backed tokens : The tokens that are linked to a physical asset\u2014for example, Tether [25]; (iv) Participation tokens : The tokens which are distributed among the participants to decide their share in future revenues without legal obligation\u2014for example, DigixDAO [26], Crypto-One-Stop-Solution (COSS) [27], BitDice [28]; (v) Partnership tokens : The tokens which are distributed to decide the share of the shareholders.", "[6] presented a general survey of security challenges in IoT with BC being one of the solutions.", "Solutions like PriWatt [60], IBM Adept[64], Huh et al. [74] and Sikorski et al. [86] are at a theoretical level and do not present a Proof-of-Concept.", "Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper"]} +{"51935081|925507": ["Conoscenti et al. [12] analyzed literature extensively about the possible applications of BC, presenting its different forms to solve some of the security challenges.", "Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper In contrast to work presented in [5\u20139, 12"]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"51877600|3932531": []} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"3434731|1598350": []} diff --git a/edge/graph_155109548.jsonl b/edge/graph_155109548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7aa07ee611ea4004a0bd233fa723f96df6288f0 --- /dev/null +++ b/edge/graph_155109548.jsonl @@ -0,0 +1,8 @@ +{"14875534|118527236": []} +{"119611273|8363289": []} +{"121651181|15604179": ["Among others are game theory [1,16], multiagent models [12,17,23,24,28], measure theory [7,11], spin systems [9,15,26], and kinetic theory [5,6,10,14,21,27]."]} +{"42222284|15604179": ["[2, 7, 17, 24, 25]."]} +{"7367094|15604179": []} +{"54362373|15604179": []} +{"14555023|15604179": ["Different models have been introduced to study opinion dynamics [2, 3, 10, 12, 13, 15\u201317, 21].", "1 Introduction Thanks to the development of social media, the dynamics of opinion formation has recently generated much interest [1,4,10,11,17,20,21]."]} +{"2861634|15604179": ["are involved in the dynamics, has been considered in [34]\u2013[36]."]} diff --git a/edge/graph_15514398.jsonl b/edge/graph_15514398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e9e238cf44990a7ddd48e0c8a8cf663aa3f6d07 --- /dev/null +++ b/edge/graph_15514398.jsonl @@ -0,0 +1,8 @@ +{"207561477|8197990": ["There has been a significant amount of computer science research on content-based image retrieval in which a particular query image (possibly a sketch or primitive graphic) is used to find matching relevant images [5]."]} +{"11177824|6387482": []} +{"207237568|5671282": ["Refer to [22] for a comprehensive survey.", "In the case that the reference database is large-scale or that the distance calculation between query item and database item is costly, an efficient solution to enabling similarity search is hashing based methods [22], which perform approximate nearest neighbor (ANN) search with both computation efficiency and acceptable accuracy."]} +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} +{"7903406|5671282": ["For a more thorough survey of hashing work, we refer readers to [18] and [19]."]} +{"1033682|174797842": []} diff --git a/edge/graph_155150.jsonl b/edge/graph_155150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15516254.jsonl b/edge/graph_15516254.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f2b7f06dbca7abda45126bc11c6599857667f87 --- /dev/null +++ b/edge/graph_15516254.jsonl @@ -0,0 +1 @@ +{"14649254|15516254": []} diff --git a/edge/graph_15517134.jsonl b/edge/graph_15517134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3373c947406cb3096b3d7c23b9dd150be629c11d --- /dev/null +++ b/edge/graph_15517134.jsonl @@ -0,0 +1,2 @@ +{"35848586|8363289": ["The prediction horizon N = 10 allows a solution to the minimization problem (26) to be found sufficiently fast, without compromising stability and control performance [43], [44]."]} +{"12229638|1517662": ["[4, 5] conducted detail surveys of conflict resolution methods."]} diff --git a/edge/graph_15518066.jsonl b/edge/graph_15518066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15521257.jsonl b/edge/graph_15521257.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_155258606.jsonl b/edge/graph_155258606.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94b4bb9f4e20dc729cf334474d0b37970b8534d6 --- /dev/null +++ b/edge/graph_155258606.jsonl @@ -0,0 +1,9 @@ +{"13879593|1204089": []} +{"13879593|44461432": ["Feng et al. [27] It proposes and gives an overview of data mining in knowledge, application views techniques and counting classification, assembling, and analyses of connotation, outlier and time series.", "The arrangements of medical records played an aggregation between clustering rules and learning model in [27], forming diverse data sources and investigating and mixing the same sources."]} +{"56801729|8540171": []} +{"64790253|8540171": []} +{"8540171|19032874": ["The main factors that any content integrity protection and verification mechanism must have are as follows [36]\u2013[38]: 1."]} +{"49332742|8540171": []} +{"15304024|10416225": ["\u2026Caliusco, Stegmayer, Coronel, & Fabrizi, 2012; Todorov, Geibel, & K\u00fchnberger, 2010), probabilistic methods (Cal\u0131`, Lukasiewicz, Predoiu, & Stuckenschmidt, 2008; Spiliopoulos, Vouros, & Karkaletsis, 2010) or those that consider the user's involvement (Lin & Sandkuhl, 2008b) in the matching process.", "Other articles developed the subject of (iii) external sources for ontology matching (Fugazza & Vaccari, 2011; Lin & Sandkuhl, 2008a), these techniques take advantage of auxiliary or external resources in order to find matchings to terms based on linguistic relations between them such as synonymy\u2026"]} +{"15304024|913718": []} +{"3940850|3420321": ["This motivation resulted in a very large number of read mapping algorithms and associated software programs, we refer to [13] for a survey."]} diff --git a/edge/graph_15527933.jsonl b/edge/graph_15527933.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15528470.jsonl b/edge/graph_15528470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c682f7422f8aa6ee41fa178739331b5cd121cafc --- /dev/null +++ b/edge/graph_15528470.jsonl @@ -0,0 +1 @@ +{"45624143|2457428": []} diff --git a/edge/graph_15529291.jsonl b/edge/graph_15529291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a2b99f8de2b12ef8c6c8f9ce3b0a659dfb5b3b2 --- /dev/null +++ b/edge/graph_15529291.jsonl @@ -0,0 +1,2 @@ +{"15178183|386036": ["Readers may refer to many other literatures (Elmagarmid et al., 2007; Gu et al., 2003; Winkler, 2006) that provide an excellent survey of synonymous name matching."]} +{"19676845|386036": ["Two similarity functions will be used in experiments in this paper: the Levenshtein edit distance [Levenshtein 1966] and the trigram similarity function [Elmagarmid et al. 2007]."]} diff --git a/edge/graph_15531834.jsonl b/edge/graph_15531834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45b32b46ef4da5591e4d712b6565e04a72bddd20 --- /dev/null +++ b/edge/graph_15531834.jsonl @@ -0,0 +1,5 @@ +{"10378855|1230643": ["Applications of WSNs include battlefield surveillance, environmental monitoring, biological detection, smart spaces, industrial diagnostics, and so on [1]."]} +{"206446574|1230643": []} +{"14273842|1230643": ["Environmental monitoring, battlefield intelligence, emergency response support, and real-time data fusion and collection are among their frequently cited applications [2] [12] [14] [8]."]} +{"111001096|1230643": []} +{"10585332|1230643": ["After being deployed into the target field, these nodes can self-organize into a multihop wireless sensor network [13], [5], [4], [31]."]} diff --git a/edge/graph_15534064.jsonl b/edge/graph_15534064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f79cd96d17ebb878767cc9760462fddd37874936 --- /dev/null +++ b/edge/graph_15534064.jsonl @@ -0,0 +1,3 @@ +{"30787649|206742377": ["There are many studies about information extraction from the Web [2].", "For example, if a man/woman need information about local area in Hokkaido, he/she can obtain such information by entering queries Hokkaido AND sight seeing into a search engine and reading Web pages of search results.", "Some methods have been proposed to extract reviews of commercial items and movies from the Web.", "The 100 blogs were separated into four subsets including 25 blogs and shown using a Web browser.", "(1) calculates a rate of the number of Web pages including the place keyword to the number of Web pages including the object keyword.", "The size of a window of a Web browser was 1,200 x 1,920 pixels.", "Though the proposed system also extracts information from the Web, the proposed system extracts information about personal experience instead of information attracted by the public.", "The first reason is that users can not watch the whole of outputs and can not quickly judge whether texts about personal experiences are written or not if the extracted keywords and pictures are shown together in a Web browser."]} +{"44587140|8310135": ["Since the latter tasks can be achieved with an accuracy varying from 80 to 90% [ 2 ], obtaining precision/recall figures oscillating around 60% for event extraction (usually involving several entities and relations) is considered to be a good result."]} +{"9234833|16534280": ["In QA systems for document collections (Voorhees, 2001; Pasca, 2003; Harabagiu & Moldovan, 2003; Molla\u0301 & Vicedo, 2007), a question may be phrased differently than in a document that contains the answer, and taking such variations into account can improve system performance significantly\u2026"]} diff --git a/edge/graph_15535684.jsonl b/edge/graph_15535684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d1ab88d4a398266deb112e180b7929ca42548a5 --- /dev/null +++ b/edge/graph_15535684.jsonl @@ -0,0 +1 @@ +{"35412226|14171067": ["[14] defines cost of each transformation operations, this paper uses consistent notations and definitions as follows: suppose the labels in OT are chosen from a finite alphabet \u03a3."]} diff --git a/edge/graph_155368979.jsonl b/edge/graph_155368979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7195331c9a4e4032320dfcc4db3a6dab76e21770 --- /dev/null +++ b/edge/graph_155368979.jsonl @@ -0,0 +1,37 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"18599847|17772052": ["The traditional approach of analyzing e-nose data involves extracting information in the static and dynamic phases of the signals [44] for the use of static pattern analysis techniques (PCA, discriminant function analysis, cluster analysis and neural networks)."]} +{"18599847|38476": ["Analysis of 5 time-series data has been the subject of active research for decades (Keogh 6 and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu 7 (2006) as one of the top 10 challenging problems in data mining due to 8 its unique properties.", "Analysis of time-series data has been the subject of active research for decades (Keogh and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu (2006) as one of the top 10 challenging problems in data mining due to its unique properties."]} +{"53304118|9928823": []} +{"53304118|393948": []} +{"36116862|5014732": ["The games are vastly more complex with the temporal dimension, and the solution space is estimated to have several orders of magnitude larger than the game of Go [13]."]} +{"116706338|393948": []} +{"34170710|393948": ["Deep learning has the ability to yield useful and important features from data that can ultimately be useful for improving predictive power [20]."]} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"125490713|18078738": ["Approaches of both model based [5] and data driven [6] have been developed in the past few decades."]} +{"53141267|33286487": []} +{"40884206|393948": ["The main algorithms of deep learning [6] include the Deep Belief Network (DBN) based on the Restricted Boltzmann Machine (RBM), Deep Neural Network (DNN) using the stacked auto-encoder and the Convolutional Neural Network (CNN)."]} +{"110988692|9928823": []} +{"110988692|393948": []} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"29936334|393948": ["And this ability to automatically learn powerful and proper features will make the mechanical fault diagnosis system real artificial intelligence and become increasingly important as the amount and kind of industrial system continue to grow [21]."]} +{"3721696|18078738": ["Gao et al. [5,6] systematically reviewed the fault diagnosis with model-based, signal-based, knowledge-based, and hybrid/active approaches."]} +{"11393480|9928823": ["When these operators with the same parameters are applied on local signals (or their mapping) at different time segments, a form of translation invariance is obtained [2,7,8].", "Recently, a family of learning models has emerged called as deep learning that aim to learn higher level abstractions from the raw data [2,7], deep learning models doesn\u2019t require any hand crafted features by people, instead they will automatically learn a hierarchical feature representation from raw data."]} +{"11393480|393948": ["In this paper we treat RUL estimation problem as multivariate time series regression and solve it by adapting one particular deep learning model, namely Convolutional Neural Network (CNN) adapted from deep learning model for image classification [1,12,13], which is the first attempt to leverage deep learning to estimate RUL in prognostics."]} +{"38021499|10086984": []} +{"14507270|3126100": ["In [3] there is an example of this: \u201cin KBL theory, data x in the input space \ud835\udef8 is projected onto a potentially much higher dimensional feature space \u2131 via a nonlinear mapping \u03a6 : In this context, for a given learning problem, the calculations can be made with the mapped data \u03a6 (x) \u2208\u2131 instead of x\u2026", "Deep Learning (DL) , as [3] refers in contrast to most traditional learning techniques, which are considered using shallow-structured learning architectures, mainly uses supervised and/or unsupervised strategies in deep architectures to automatically learn hierarchical representations [11].", "Representation Learning (RL) : RL [17], is used to learn the useful and meaningful representations of the data that make it easier to extract useful information when building classifiers or other predictors, achieved impressive performance on many dimensionality reduction tasks [3, 18].", "\u2026space into an high - (even infinite) - dimensional implicit feature space, without computing the coordinates of the data in that space, but rather computing the inner products between the images of all pairs of data in the feature space, which can be calculated directly via a kernel function [3].", "In this way, the original nonlinear problem can be transformed into a linear formulation in a higher dimensional space \u2131 with an appropriate kernel k [13]: The most widely used kernel functions include Gaussian kernels and Polynomial kernels and they perform well in most cases [3].", "As the big data era is established, with large and complex datasets traditional ML techniques are not working well with these high volumes of data [3].", "In ML algorithms the major assumption is that the training and test data are drawn from the same feature space and have the same distribution [3].", "ISBN 978-1-4503-4789-1/16/11\u2026$15.00 DOI: http://dx.doi.org/10.1145/3003733.3003767 inputs and without desired targets [3].", "The diversity of feature spaces gives more choices to gain better performance, while in practice, the choice itself of a proper mapping for any given real-world problem may generally be nontrivial [3].", "In [3] the above features are complemented with veracity, to emphasize the importance of addressing and managing the uncertainty and incompleteness on data quality."]} +{"14507270|18503837": ["To fix the issue of the inability of learning algorithms to use all the data to learn within a reasonable time, DPL is used, since allocating the learning process among several workstations is a natural way of scaling up learning algorithms [22]."]} +{"14507270|393948": ["Representation Learning (RL) : RL [17], is used to learn the useful and meaningful representations of the data that make it easier to extract useful information when building classifiers or other predictors, achieved impressive performance on many dimensionality reduction tasks [3, 18].", "RL aims to achieve that a reasonably sized learned representation can capture a huge number of possible input configurations, which can facilitate improvements in both computational efficiency and statistical efficiency [17]."]} +{"14507270|30443041": ["In practice, we may not even know the probability distribution of W , but we assume that we do have access to observations of W , either from a physical process or by randomly generating realizations from a mathematical model [44]."]} +{"3126100|18503837": []} +{"3126100|393948": ["Representation learning aims to achieve that a reasonably sized learned representation can capture a huge number of possible input configurations, which can greatly facilitate improvements in both computational efficiency and statistical efficiency [25].", "Fortunately, representation learning [25, 26], a promising solution to learn the meaningful and useful representations of the data that make it easier to extract useful information when building classifiers or other predictors, has been presented and achieved impressive performance on many dimensionality reduction tasks [27]."]} +{"111838731|905827": []} +{"189904031|6327434": []} +{"11962339|1097238": ["among its base learners tends to achieve better generalization performance [36].", "Many works [36]\u2013[39] have demonstrated that a single method can seldom perform consistently well across a variety of applications."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} diff --git a/edge/graph_15538273.jsonl b/edge/graph_15538273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..155b8e97c7bd1d3302ef494904475a2192387db3 --- /dev/null +++ b/edge/graph_15538273.jsonl @@ -0,0 +1,2 @@ +{"1780949|4631990": ["A comprehensive overview of communication protocols in building automation can be found in [1], which also introduces different BAS products and other discussions on building automation."]} +{"263297|2457428": []} diff --git a/edge/graph_15539513.jsonl b/edge/graph_15539513.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15540889.jsonl b/edge/graph_15540889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_155411544.jsonl b/edge/graph_155411544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5a2f68ecb6b09aac562b89835f25368a78c5a4d --- /dev/null +++ b/edge/graph_155411544.jsonl @@ -0,0 +1,141 @@ +{"59601593|206578224": ["Formerly known as Mobile Edge Computing, MEC aims at providing computing service closer to the end user and is primarily a key enabler for the 5th generation mobile networks [14]."]} +{"59601593|29859741": ["\u2026of health-care because the fog can process medical data with lower latency than the cloud, thus enabling real-time alerts or anomaly detection [16], and indoor localization [17], where devices in the vicinity collaborate to minimize the energy expenditure of performing computing tasks related\u2026"]} +{"59601593|6909107": ["Distributed computing paradigms, including MCC, FC and mobile edge computing (MEC), have emerged to overcome such limitations [4], [5]."]} +{"46896639|18973396": ["In recent years, crowdsourcing-based systems are widely used in many domains [12]\u2013[16] (see Fig."]} +{"46896639|13151033": []} +{"46896639|3241708": [", article writing or image classification) [30]."]} +{"207214926|3330313": []} +{"13991708|21738890": ["Relevant projects that estimate the network location of objects to perform context-aware services are reviewed in [98]."]} +{"13991708|6556803": ["The survey [109] reviews applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs, like data exchange and topology formation, resource and power optimization, area coverage, event tracking solutions, and\u2026"]} +{"13991708|7774517": ["Approaches to ensure data quality often rely on oversampling and \ufb01ltering of outlier values [70], reputation schemes that provide trustworthy sensing for public safety [71], or trust network-based human intervention approaches."]} +{"13991708|10310014": ["Over the last years, some research papers focused on evolving PS organizations have been published [21\u201325]."]} +{"49299634|16378550": []} +{"49299634|17787193": []} +{"49299634|3330461": []} +{"32704838|194321": []} +{"24875288|3757239": []} +{"51719593|3834736": ["Therefore, the status of the driver and fuel level can be determined, and the arrival time of smart vehicles can be predicted [8]."]} +{"51719593|16335158": ["Although several studies [3, 7] have been conducted on sensor clouds, no study has focused on data collection in sensor clouds.", "The study in [7] reveals that sensor clouds are largely responsible for the emergence of various smart community applications, such as real-time monitoring of agriculture and irrigation systems, by providing strong computation capabilities."]} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"19965427|10089999": ["A comprehensive review can be found in [12]."]} +{"19965427|9060471": ["Interested readers can refer to [10] for a comprehensive survey on truth discovery.", "A comprehensive survey on truth discovery can be found at [10]."]} +{"19965427|2906926": ["Security threats in NFC and RFID have been studied in [7, 8]."]} +{"3918668|6909107": ["tion, processing and storage [7]: In the context of MCS it is used to process MCS data between mobile devices and cloud services, as shown in Figure 1(b).", "The MEC can act as a gateway between devices which interact through diverse communication technologies serving as an aggregation point towards the cloud layer [7].", "This is in accordance with a proposed deployment of MEC servers presented in [7]."]} +{"52962631|9060471": [", when most of the data are unreliable, the above estimation procedure may have bad performance [16].", "Besides, without the prior knowledge of truth and reliability measures, typical truth discovery algorithms are likely to fail, when the majority of data are inaccurate [16].", "However, all of these works are based on unsupervised learning models, and thus may suffer from the reliability initialization problem when most data are inaccurate [16]."]} +{"29005198|19938676": ["In a nutshell, 5G wireless access will consist of an evolution of LTE complemented with new radio technologies and architecture designs [10]."]} +{"29005198|2623404": ["The recent trends of network function virtualization (NFV) (providing abstraction [31]) and software defined networking (SDN) (providing flexibility [32]) are critical in shaping such an envisioned architecture."]} +{"24110634|9495329": ["The surveys in [22] and [27] review SDN application in IoT, furthermore Bizanis and Kuipers [28] review the conjunction of SDN and NFV for IoT."]} +{"24110634|6583734": ["Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|11414835": ["The virtualizer ensures that all information collected is collated to form a virtualisation of the network state to the controller [29], [141]."]} +{"24110634|801245": ["WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization."]} +{"24110634|9040432": ["The survey study below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in\u2026"]} +{"24110634|2535224": ["\u2026below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in IoT [22], [27].", "Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|2623404": ["Large networks also become heterogeneous due to the use of different proprietary protocols, which fundamentally means they consist of different network islands that only cooperate at lower levels of communication [13], [33], [36].", "If no match is found, then appropriate rules are actioned, i.e. drop the packet, pass it to the next \ufb02ow table or send it to the controller for new rules to be made [13].", "The LFB has a speci\ufb01c function (such as routing) to process the packets [43], and enables the CE to control the FE [13].", "Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "If they match, appropriate actions are applied and if more than one entry match is found, prioritization, based on the highest degree of match, applies [13], [40].", "The instruction \ufb01eld determines what action should be taken upon a packet match [13].", "Recent research has focused on the development of both the southbound and northbound API standard-isation, with more focus on the southbound API [13].", "They both conform to the principle of decoupling the control and the data plane, but are fundamentally different [13].", "SDN introduces bene\ufb01ts such as vendor independence, heterogeneous network management, reliability and security not possible in traditional networks [12], [13], [16], [34], [35].", "Traditional networks are also mostly hierarchical, tree based and static, which leads to what most have termed \u2018\u2018ossi\ufb01cation\u2019\u2019 [13]."]} +{"24110634|10693567": ["The two most popular southbound interface speci\ufb01ca-tions are Forwarding and Control element separation (ForCes) [38], [39] and OpenFlow [40]\u2013[42]."]} +{"24110634|11735843": ["Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "The issue of virtualisation and cloud computing services has also necessitated a shift from conventional data storage towards SDN-oriented data storage and management [14].", "Another area which is the crux of this paper, is wireless sensor networks [14], [32], [56], [58]."]} +{"24110634|1230643": ["As Akyildiz et al. [8] and Qin et al. [106] allude, there has been less focus on the NB interface, whereas much attention has been dedicated to SB interfaces.", "WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization.", "Radio communication also consumes a huge chunk of power [8], it involves data transmission and reception."]} +{"24110634|10532321": ["The memory management techniques explored in [180] could be investigated from the SDWSN perspective.", "The rules placement problem is expounded with a comprehensive review of different solutions in [180]."]} +{"33871283|26728811": ["ipation have been largely investigated in the literature [86], [87], along with surveys and reviews to design effective incentive mechanisms in mobile crowd-sensing [22], [25], [88]."]} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} +{"33309928|7834819": ["medical related emergencies could result in the possibility of minimizing human intervention in ubiquitous health monitoring through; an example of this would be fall detection [1], [4]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"90263061|10235514": ["The limited spectrum available below 6 GHz makes it difficult for current systems to sustain the data rates required to meet traffic demands that are growing at a staggering pace [5]."]} +{"32793970|10089999": ["Several work [27], [28] has considered the use of MCS to collect location-dependent fingerprints."]} +{"8353483|763939": ["Although there are numerous mobility prediction methods [31], we just use the statistical result of a worker\u2019s location records to measure the probability that she will pass by the location of a task."]} +{"30679204|3330461": []} +{"32517552|20905429": []} +{"57756528|9514634": ["The sensing quality metric can be diverse for different applications (e.g., spatial\u2013temporal coverage, quality-of-information, mean error rate, etc.) [20]."]} +{"57756528|14435082": ["Learning participants\u2019 abilities and reputations can help selecting more capable and reliable participants [35], [36], [37], [38], [39]."]} +{"57756528|9060471": ["Recently, a survey has comprehensively summarized this topic [51], where most of the literature [52], [53] use voting-based strategies, such as majority voting, weighted voting, Bayesian voting, etc."]} +{"550904|205286988": []} +{"550904|1236072": ["Many studies have proposed data gathering protocols to realize efficient communication between sensor nodes in wireless sensor networks (WSNs) [2]\u2013[5]."]} +{"9514634|9060471": ["The field of truth discovery has recently attracted enormous attention from the data mining and crowdsourcing communities [102, 175]."]} +{"9514634|3330313": ["Outlier detection can be broadly classified as either model-based or consensus-based techniques [73]."]} +{"9660548|3055684": [", throughput, delay, energy consumption) are investigated in prior works which can be referred to in a recent survey [25]."]} +{"21738890|3348390": ["[22] highlights context-awareness from an IoT perspective, and presents the background of IoT paradigm, context-aware essentials and their relations to sensor networks."]} +{"21738890|3202525": ["[23], [24] survey context-awareness for recommender systems to build such intelligent systems that can better predict and anticipate the needs of users, and act more efficiently in response to their behaviors."]} +{"21738890|1077083": []} +{"21738890|8909218": []} +{"21738890|2187403": []} +{"21738890|1113420": ["[18] presents a detailed explanation of context, context types along", "In this regard, many context modeling schemes have been proposed [18], [21], [27]\u2013[29]."]} +{"21738890|20905429": []} +{"18306152|7988320": []} +{"18306152|7085121": []} +{"18306152|562065": []} +{"18306152|15300368": []} +{"18306152|1503157": ["This issue can be addressed by integrating RFID with WSN as WSN provides longer reading range as well as other benefits like different network topologies and flexibility, variety of sensors that are already implemented and low power consumption [31]."]} +{"18306152|1236072": ["techniques [7, 13, 14], MAC protocols [15\u201317], congestion control [18, 19], data col-"]} +{"57378792|36250251": ["However, mobile crowdsourcing systems still face many challenges with regards to security, privacy and trust [23], [38].", "[23] identifies mobile crowdsourcing applications based on the properties of a crowdsourcing task and human assistance including 1) mobile crowd computing, 2) mobile crowdsensing, and 3) human-assisted crowdsourcing.", "A recent survey [23], [137], [138] thoroughly discussed the core issues of SC, including task assignment, incentive mechanism, privacy protection, the absence of real-world datasets, scalability and quality of reported data.", "Moreover, several challenging security and privacy concerns are raised in mobile crowdsourcing networks [2], [23], [37], [89]."]} +{"57378792|3450996": ["There are some research studies to explore techniques to enhance throughput for mobile devices suffering from low cellular data rates [81]\u2013[83]."]} +{"57378792|8308538": ["The study in [24] classified mobile crowdsensing applications into three categories namely group, community, and urban sensing.", "The participants come from a strongly bonded group or community, with established social ties and trust among members [24]."]} +{"57378792|8523192": ["It also works on crowdsourced IoT data for milliseconds response-time applications and delivers the selected data to the cloud for historical analysis and longerterm storage for future use [42], [43]."]} +{"57378792|16830291": ["[70] study crowdsourcing platforms with a focus on solving micro-tasks and complex tasks."]} +{"57378792|57048228": ["crowded in the protest, potholes on the road) [3], [85], [125]."]} +{"57378792|28756420": ["puting involves awareness of the device and its environment [3], [38], [89], [124].", "The quality of the results highly depends on the task design [39], [89], so that the key aspects of tasks such as, types of tasks, the process of executing tasks, the correspondence of instructions and constraints must be determined before assigning tasks to the crowd.", "Moreover, several challenging security and privacy concerns are raised in mobile crowdsourcing networks [2], [23], [37], [89]."]} +{"2003896|2355696": []} +{"2003896|20905429": []} +{"2003896|1118130": ["This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the anticipated stress level is within healthy boundaries.", "This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the\u2026"]} +{"7298347|7774517": ["Once all sensing data are collected for a set of tasks, for each task, an outlier detection algorithm [42] is run on the set of sensor readings, and the outliers are marked as negative readings whereas the rest are marked as positive readings."]} +{"13809820|7774517": ["runs an outlier detection algorithm [28] to detect possibly altered data so that trustworthiness of the"]} +{"5559058|21738890": ["Then all participants can determine whether they can contribute the requested data taking into account their cost of sensing and reporting and on the basis of the environmental context [37], [38]."]} +{"14356939|3348390": []} +{"3786171|19938676": ["5G Network [40] is the \ufb01fth generation cellular network architecture, designed to support great amounts of data, high speed, con\ufb01gurability, etc. from new emerging technologies such as Internet of Things."]} +{"3786171|15589021": ["Nowadays, we can \ufb01nd a wide variety of sensing technologies (see Figure 18) for gas detection (Metal oxide semiconductor, polymer, carbon nanotubes, moisture absorbing materials, Optics, Acoustics, etc.) as shown in [80]."]} +{"3786171|1230643": ["Normally, the sensing process is made through a Wireless Sensor Network (WSN) [64,65], which is composed by a set of nodes or sensors that collect data and send it towards a central sink or gateway."]} +{"52966539|3241708": ["Resources and data from crowd users have been leveraged in applications [19] including voting systems, information sharing systems, and social games."]} +{"49535806|5385031": ["design in mobile crowdsensing [15], [16], [17], [18], [19] according to whether user mobility has been explicitly taken into account in the design.", "important to take into account the life cycle of the MCS process [14] and design incentive mechanisms [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25] or pricing mechanisms [26], [27], [28] accordingly to motivate the users\u2019 participation, which are both open areas with active research."]} +{"11671115|2003896": ["[12] V.", "Accordingly, new research trends at the crossroads of MCS, MSNs, and ad hoc sensor networks share with our proposal the goal of facilitating community identification and formation to enable informed scheduling of MCS tasks not only to single volunteers, but also to communities of volunteers [12]."]} +{"8731186|21738890": ["ered in the literature to capture contextual information from sensors while minimizing the energy consumed, and surveys have been published to discuss the existing work [12], [13], [14]."]} +{"58951799|9514634": []} +{"15011864|1708582": ["A computation distribution component based on multi-criteria decision theory [19] dynamically decides where to perform computation of tasks such as data analysis and clas-si\ufb01cation, by considering the importance given to each of the dimensions: energy, latency, and data sent over the network.", "Therefore, we design an adaptive sampling technique that balances the energy-accuracy-latency trade-o\ufb00s through the use of linear reward-inaction learning [5, 18] that is based on the theory of learning automata [26]."]} +{"52816411|21557844": []} +{"52816411|4427557": []} +{"52816411|37424351": []} +{"52816411|3055684": []} +{"52816411|8215225": []} +{"52816411|37052879": []} +{"49640857|12675271": []} +{"49640857|1520906": []} +{"49640857|16335158": []} +{"3970496|36400013": ["Several solutions to establish the inter-vehicle trust have been proposed in the literature and based on the revocation target they are generally classified into entity-oriented, dataoriented, and hybrid models [13], [14]."]} +{"3970496|28756420": ["However, these solution are mostly based on smartphones and do not consider any security issue [11]."]} +{"25568949|3241708": ["The literature shows that incentivizing people to participate in crowdsourcing projects has always been a challenge [10, 11].", "As it is beyond the scope of this article to provide an in-depth discussion of crowdsourcing, we refer to recent surveys by [10, 11] as an outline and a list of applications."]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"52926289|1303485": []} +{"52926289|4915696": ["These dynamics generally consist of crowd count [6], [7], [11], [13], [16], [48]\u2013[51], crowd trajectories/mobility [9], [14], [31], [52], [53], crowd sentiment [20], and crowd behavior [17], [19], [50], [54]\u2013[59].", "analysis [17], [19], [57]\u2013[59], the video data has also been employed in, understanding traffic flow [80], [81], and crowd", ", infrared or IR devices) [16], video surveillance [17]\u2013[19], in"]} +{"52926289|12574246": ["In [39], Batrinca and Treleaven reviewed techniques, software tools, and platforms for social media analytics."]} +{"52926289|10819899": ["Different data mining techniques and models for social media analysis were reported in [40], [41]."]} +{"52926289|18388986": ["There are three types of fusion methods [107], [108]: a) complementary fusion,"]} +{"4655501|1708582": ["RL [28] is not deep learning, but we can consider it as a kind of machine learning techniques."]} +{"21425105|24110634": ["Network control is a function of network management and configuration, scalability, energy, routing, mobility localization, interoperability and security [52]."]} +{"2119461|1142274": ["Besides, according to classic parallel machine scheduling mechanisms, we also design and implement another algorithm, denoted by LF (Largest-First) [2].", "Such characteristics make our problem different from traditional parallel machine scheduling problems [1], [2], [4], [5].", "Literatures [2], [5] have made a detailed review on these works."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} diff --git a/edge/graph_15543876.jsonl b/edge/graph_15543876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0997f2086dc4641439db22dd0abccdb818f2ab0f --- /dev/null +++ b/edge/graph_15543876.jsonl @@ -0,0 +1 @@ +{"7770634|14065459": ["[Otto et al. 2006] and [Wolff et al. 2007] provided a solid analysis of the requirements for supporting closely coupled collaborative tasks in a shared virtual workspace for non-co-located users, which also apply to a certain extent to co-located collaboration."]} diff --git a/edge/graph_15545030.jsonl b/edge/graph_15545030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bc3aab03165b8565e1613015070a7534541231b --- /dev/null +++ b/edge/graph_15545030.jsonl @@ -0,0 +1,9 @@ +{"582421|17718674": ["The idea is to use timing constraints tagging temporal modalities [ AH92 ]."]} +{"13112160|17718674": ["It has in fact been claimed that, in the interval-based and the point-based semantics alike, any logic strong enough to express the above requirement will automatically be undecidable\u2014see [6], [7], [15], among others.", "One of the earliest and most popular suggestions for extending temporal logic to the real-time setting is to replace the temporal operators by time-constrained versions; see [6] and references therein."]} +{"16322562|17718674": []} +{"41759517|17718674": ["For a detailed discussion of this so-called digital-clock (or ctitious-clock) model of time, and its applications, we refer the reader to [AH92b] or [Hen91].", "For a detailed survey of recent developments, we refer the reader to [AH92b]."]} +{"27344803|17718674": []} +{"27344803|8397295": []} +{"6894032|9232628": []} +{"53223910|17718674": []} +{"15628315|17718674": []} diff --git a/edge/graph_15545863.jsonl b/edge/graph_15545863.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15546978.jsonl b/edge/graph_15546978.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15548957.jsonl b/edge/graph_15548957.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15552414.jsonl b/edge/graph_15552414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15553087.jsonl b/edge/graph_15553087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..507ead647de65f54ffcc7d72b1b7b2e136c7f463 --- /dev/null +++ b/edge/graph_15553087.jsonl @@ -0,0 +1,7 @@ +{"206792794|11038925": []} +{"206792794|192934": []} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"34167448|191396": []} +{"34167448|11038925": []} +{"34167448|12894036": []} diff --git a/edge/graph_15560513.jsonl b/edge/graph_15560513.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15562587.jsonl b/edge/graph_15562587.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20db06d86fe57c38c5854c39958a759c835d37d0 --- /dev/null +++ b/edge/graph_15562587.jsonl @@ -0,0 +1 @@ +{"11790493|6746689": ["S3a) that reduces the line width to one pixel (68) (Fig."]} diff --git a/edge/graph_15562798.jsonl b/edge/graph_15562798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15563159.jsonl b/edge/graph_15563159.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6f4bb72f34516f6eb05b553c2eeed6eb2a48893 --- /dev/null +++ b/edge/graph_15563159.jsonl @@ -0,0 +1,6 @@ +{"16915526|15563159": []} +{"1167912|15563159": []} +{"8516348|15563159": []} +{"16217436|2762290": []} +{"15380232|60455": []} +{"15380232|6486398": []} diff --git a/edge/graph_15563848.jsonl b/edge/graph_15563848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27736e890b4b72362a1fc94b67619d734343c5b7 --- /dev/null +++ b/edge/graph_15563848.jsonl @@ -0,0 +1 @@ +{"16104539|1877246": []} diff --git a/edge/graph_15569285.jsonl b/edge/graph_15569285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_155700831.jsonl b/edge/graph_155700831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e23e2c43cd1f057c369c9eb574a1d2bf4cb7ccc --- /dev/null +++ b/edge/graph_155700831.jsonl @@ -0,0 +1 @@ +{"109411804|17976726": []} diff --git a/edge/graph_155726808.jsonl b/edge/graph_155726808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ceb0de9177edd3ebcedc71a17dee6e32d326d61 --- /dev/null +++ b/edge/graph_155726808.jsonl @@ -0,0 +1,7 @@ +{"14034209|12127373": ["The first one is a method based on examining the driver's physiological information; the second is a method based on the driver's behavior; the third one is a method based on monitoring the situation of the motor vehicle [3,4] ."]} +{"55081178|12127373": ["The following techniques or measures have been developed and used widely to monitor the level of drowsiness of the driver by vehicle-based measures, behavioral and psychological measures [1-5]."]} +{"13199047|12127373": ["Although these approaches have proven relatively effective for examining physiological and cognitive states in humans, issues with wearability, particularly for EEG devices, have limited the feasibility of using these systems in real-world driving conditions.", "to detect drowsiness using EEG and ECG alone, and combining both modalities to improve the performance of the system; \u2022 to propose a channel reduction paradigm to reduce the number of electrodes and to increase the practicality of the proposed technique in real driving environments.", "These measures include steering wheel movement, speed variability and standard deviation of lateral position [7\u201310].", "Although driver behavioral measures are non-intrusive, such measures have not been found to be reliable for the detection of drowsiness, because their detection capabilities are strongly affected by variations in environmental factors and driving conditions [25\u201327].", "Recent approaches for detecting driver drowsiness can be divided into four main categories: vehicle-based measures, subjective measures, driver behavioral measures and physiological measures [3].", "Other studies have also used ECG for the detection of drowsiness, and HRV derived from ECG has been used to differentiate between alertness and drowsiness [32\u201335].", "Therefore, the present study sought to examine the performance of these physiological measures in detecting driver drowsiness."]} +{"3322281|14866098": []} +{"11728663|12127373": []} +{"625587|12127373": []} +{"3341117|12127373": ["These reported systems have achieved good results [15]; however, the recorded data are analyzed in a simulated environment.", "Non-intrusive methods provide a fatigue warning based on the facial features [9,10] or the behavioral characteristics [11\u201315] of the driver."]} diff --git a/edge/graph_15573834.jsonl b/edge/graph_15573834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e86c095407583bb3d19c87a72dbb240f19053ba4 --- /dev/null +++ b/edge/graph_15573834.jsonl @@ -0,0 +1,2 @@ +{"11640056|2854761": []} +{"11717538|2854761": ["In this scenario, the unique connection identifier (CID) helps separate the subscribers."]} diff --git a/edge/graph_15578362.jsonl b/edge/graph_15578362.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15579019.jsonl b/edge/graph_15579019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..525517ac0099a7ca34da87ed20b376e3b858347a --- /dev/null +++ b/edge/graph_15579019.jsonl @@ -0,0 +1 @@ +{"29327418|8363289": ["EGP comprises a direct glucose signal and a delayed insulin signal12 (4) where the delayed insulin signal Id (pmol/liter) is given by (5)"]} diff --git a/edge/graph_15589021.jsonl b/edge/graph_15589021.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0aa2dc6c9be75200c2410bc2648df5a34737ef9a --- /dev/null +++ b/edge/graph_15589021.jsonl @@ -0,0 +1,6 @@ +{"12176239|17772052": ["Finally, K-fold cross validation was used to calculate the classification rates as a well-known estimation of prediction error [38,49,55].", "It can also define as a linear projection (W) that makes following objective function maximum [31,38,48,49]:", "This regression can be trained by adjusting weights of elements of the network, using a gradient descent method, which is called back propagation (BP) of errors [38,47,53].", "Projections of extracted features by LDA are also applied to study the compactness of features from the same class and variance of the features from different classes [38,43].", "Quadratic classifier, multi layer perceptron (MLP) classifier and k-nearest neighbor (k-NN) classifier are the most well-known methods in the area of gas classification [38,43].", "to extract features, as the most applied method for dimension reduction in the machine olfaction [38].", "Among different types of feature reduction methods, principal component analysis (PCA) and linear discriminant analysis (LDA) are widely used in gas identification system and machine olfaction [38,43].", "This manipulation based on the differential method was applied in subtracting each sampling by the initial baseline value of transient response [31,38,42]:", "The quadratic classifier is the simplest approach to approximate the largest posterior probability by assuming that for each class likelihood function is unimodal Gaussian density, and generate quadratic hyper surfaces as decision boundaries between classes [38,48]."]} +{"12176239|192934": ["Finally, K-fold cross validation was used to calculate the classification rates as a well-known estimation of prediction error [38,49,55]."]} +{"15770872|31246274": []} +{"44052589|17772052": []} +{"5973089|17772052": ["MOS sensors have low selectivity, so the multivariate response of an array of chemical gas sensors with broad and partially overlapping selectivity can be used as an \u2015electronic fingerprint\u2016 to characterize a wide range of odors or volatile compounds by pattern-recognition means [18]."]} +{"13429936|17772052": []} diff --git a/edge/graph_15591197.jsonl b/edge/graph_15591197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ab5467d346e92dd8ab221ce8fb835162999ddb5 --- /dev/null +++ b/edge/graph_15591197.jsonl @@ -0,0 +1,12 @@ +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"25483789|189201": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} diff --git a/edge/graph_155941663.jsonl b/edge/graph_155941663.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..189b3bd6e90d879079cb3865bec898323e62f321 --- /dev/null +++ b/edge/graph_155941663.jsonl @@ -0,0 +1,3 @@ +{"18908270|14441987": []} +{"18908270|1762301": []} +{"40349657|763939": ["For this purpose, an ample amount of research[26, 27, 28] has been made to include mobility in the design of VANET."]} diff --git a/edge/graph_15594382.jsonl b/edge/graph_15594382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15595198.jsonl b/edge/graph_15595198.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ea051de38636acc78d539c00418a887b0957cbc --- /dev/null +++ b/edge/graph_15595198.jsonl @@ -0,0 +1,3 @@ +{"12584610|14171067": ["40 This means there exists no polynomial time approximation scheme unless P = NP."]} +{"3329986|60455": ["In a sense, this would be like trying to use a stop-word to cluster text documents [18]."]} +{"8530796|206051485": ["This estimation problem has been well studied, and several excellent surveys [27]\u2013[30], and software implementations (e.g., the Insight toolkit [31]) are available, so we do not detail registration algorithms here."]} diff --git a/edge/graph_1560135.jsonl b/edge/graph_1560135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15604179.jsonl b/edge/graph_15604179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_156050749.jsonl b/edge/graph_156050749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72e3967a3f47c9ad6e49da1ea175721e8dc4d0d2 --- /dev/null +++ b/edge/graph_156050749.jsonl @@ -0,0 +1,4 @@ +{"17686366|12017064": []} +{"17686366|30548952": ["The impacts can be losing the provider's business reputations (which can be important for customers when deciding to buy cloud products [31]), or these attacks can be an indicator of vulnerabilities in the provider infrastructure.", "This is because customers may buy the cloud product based on providers' reputations [31] ."]} +{"7108394|2018781": ["Analyse all papers that address scalability In the realm of software engineering, both [56] and [39] agree that electronic sources are sufficient in the domain of software engineering.", "1 Threats to Validity Like Gu and Lago[39], we use the suggestion in Perry[81] to explicitly state the threats to validity that accompany any empirical study: (a) construct validity (b) internal validity (c) external validity."]} +{"7108394|38476": ["The Sliding Window technique [30] is a sampling technique to allow the learning algorithm to view the same dataset from different sample perspectives."]} diff --git a/edge/graph_156050941.jsonl b/edge/graph_156050941.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81a684992f0b6583b6578d7b08ef2cf74287a5d3 --- /dev/null +++ b/edge/graph_156050941.jsonl @@ -0,0 +1,8 @@ +{"110096018|47147736": ["The selection of a particular mechanism for congestion control has to be used based on the nature of congestion encountered in WSNs [4]."]} +{"14418536|11632848": ["A naive Bayes classifier considers each of these features to contribute independently to the probability that this fruit is an apple, regardless of any possible correlations between the color, roundness and diameter features.", "The superiority of the solution proposed by this paper, compared to other classification methods (e.g. k-Nearest Neighbor algorithm, decision tree and Naive Bayes Classifier) is due to its efficiency in dealing with the complex data.", "The error rate of test data in Naive Bayes technique is 0.55.", "We have chosen SVMs rather than other traditional classification methods such as Decision Tree, Naive Bayes classifier and nearest neighbor classifiers.", "Naive Bayes classifier.", "Naive Bayes [31] is a simple way to categorize phenomena, based on the probability of occurrence or nonoccurrence of this phenomenon."]} +{"148469|206986475": ["Proposing mobility solutions based on IP compliance and being interoperable with 6loWPAN behaviors could facilitate the scalability use [Ghaleb et al. 2016]."]} +{"148469|2295142": []} +{"148469|270804": ["So, retransmission of lost packets at the loss happening could be more energy efficient [Wang et al. 2006].", "If the packet loss is due to congestion and therefore buffer overflow, it is a must to control this congestion through rate reduction or other control and delaying any retransmissionbased recovery, since it will be lost until the congestion level is reduced [Wang et al. 2006; Mahmood et al. 2015].", "If, on the other hand, the loss is due to channel error, there is no bene\ufb01t to reduce sources\u2019 rates before recovering the losses, as this will underuse the channel capacity, lowering the throughput [Wang et al. 2006].", "On the other side, channel errors affect both the reliability and energy depletion [Wang et al. 2006].", "It is the charge of the sender to detect any loss by the observation of sequence number gaps or time-outs [Wang et al. 2006].", "Also, from a transport point of view, congestion must be treated to avoid related losses, and the bandwidth fairness allocation must be guaranteed, especially for faraway nodes [Sharma and Aseri 2012; Wang et al. 2006; Mahmood et al. 2015].", "In general, link failures could be related to the quality of low-cost sensors that characterize most of the market\u2019s sensors and that leads to unreliable, low-bandwidth, error-prone, and time-varying wireless mediums, or due to the harsh environment that dominates the use of WSN including noise, interference, packet collisions, signal attenuation, channel fading, and near-ground positioning [Katiyar et al. 2012; Wang et al. 2006; Mahmood et al. 2015].", "It is the charge of the sender to detect any loss by the observation of sequence number gaps or timeouts [Wang et al. 2006].", "So, retransmission of lost packets at the loss happening could be more energy ef\ufb01cient [Wang et al. 2006].", "If the packet loss is due to congestion and therefore buffer over\ufb02ow, it is a must to control this congestion through rate reduction or other control and delaying any retransmission-based recovery, since it will be lost until the congestion level is reduced [Wang et al. 2006; Mahmood et al. 2015].", "If the recovery node is not the same as the loss one, the number of hops between the two nodes is called the recovery distance, which gives an estimation about the involved cost in terms of energy [Wang et al. 2006].", "\u2026error-prone, and time-varying wireless mediums, or due to the harsh environment that dominates the use of WSN including noise, interference, packet collisions, signal attenuation, channel fading, and near-ground positioning [Katiyar et al. 2012; Wang et al. 2006; Mahmood et al. 2015]."]} +{"148469|17374870": []} +{"29773156|8215225": ["[12] reviews the state of the art on distributed data aggregation algorithms and characterize the different types of aggregation functions.", "Distributed [22] Precision Constrained [16] Linear Programming [12] Energy (MLDA) Shortest Path based [65] Multi-criterion decision-making (Pareto Optimal Based) Learning Automata based (LAG) End-to-end delay (RSSI)"]} +{"29773156|12817488": ["Rajagopalan and Varshney [11] has done an innovative literature review in the field of data aggregation in WSNs. Jesus et al. [12] reviews the state of the art on distributed data aggregation algorithms and characterize the different types of aggregation functions.", "Existing research by Rajagopalan and Varshney [11] and Jesus et al. [12] reflect research issues.", "Improved Distributed [66] Timeout Control Scheme [85] [11]", "In hierarchical network, aggregation of data has been done at special node, which is used to reduce energy consumption and number of data packets to destination [6, 11, 107, 108].", "Existing research by Rajagopalan and Varshney [11] and Jesus et al.", "2 Related Surveys Rajagopalan and Varshney [11] has done an innovative literature review in the field of data aggregation in WSNs."]} diff --git a/edge/graph_156051839.jsonl b/edge/graph_156051839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a367d507922f917c91b2b54c69468296a1e1d0b4 --- /dev/null +++ b/edge/graph_156051839.jsonl @@ -0,0 +1,9 @@ +{"10657013|12595430": [", [5]\u2013[7], some specifically discussing machine learning intrusion detection techniques [1], [8]\u2013[10]."]} +{"10657013|18567112": ["This can be seen by comparing our survey to parts of [20], in which Faruki et al."]} +{"6207817|10657013": ["Something to take into account as well are the \ufb01ndings from [3].", "Several techniques can be employed to perform signature matching, including exact/partial matching, formal grammars, and machine learning [3]."]} +{"6207817|12815020": []} +{"14383042|36784649": []} +{"31330156|10657013": ["In a recent survey, Rudd et al. [11] demonstrated that NIDSs cannot rely on the fact that it knows all types of possible attacks."]} +{"206596260|393948": ["We interpret the network as a trainable feature extractor, \u03c6 : X \u2192 R, followed by a single classification layer with as many sigmoid output nodes as classes observed so far [3].", "The recent success of (deep) neural networks can in large parts be attributed to their ability to learn not only classifiers but also suitable data representations [3, 21, 25, 36], at least in the standard batch setting."]} +{"3439578|3330313": ["outlier detection [13], [14] are well established areas in their own right, but much less research has been conducted on how to treat unknown samples in an incremental context, which is the focus of this work."]} +{"5369612|3330313": ["\u2026cluster (or a set of clusters) to allow the identification of155 new patterns that were not present in the originally defined training156 dataset (Hodge & Austin, 2004) \u2013 any previously unseen pattern is157 defined as novelty.158 It is possible to use one-class classifiers in novelty detection\u2026"]} diff --git a/edge/graph_15619069.jsonl b/edge/graph_15619069.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8c0d9534b7fd0de6a33180c6261db09e5664369 --- /dev/null +++ b/edge/graph_15619069.jsonl @@ -0,0 +1,3 @@ +{"9999476|8397295": ["An overview of the main issues in de-ning a timed process algebra can be found in [82]."]} +{"15342116|1975139": []} +{"3021646|16515612": ["The methodology we employ includes seven steps."]} diff --git a/edge/graph_15619463.jsonl b/edge/graph_15619463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..763dd77bf106ceb9a3c9457c96ac5d8894d0e8f1 --- /dev/null +++ b/edge/graph_15619463.jsonl @@ -0,0 +1,5 @@ +{"17948192|16675828": []} +{"35196885|16675828": []} +{"15112413|16675828": []} +{"16675828|17003768": ["1991 Mathematics Subject Classification: 05C15, 05C35, 05C75, 03D15, 06B05, 06D05."]} +{"3474053|18976841": ["Odense, Denmark J\u00f8rgen Bang-Jensen London, UK Gregory Gutin August 2000", "the surveys [61, 66] by Bang-Jensen and Gutin, [126] by Bondy, [368] by Gutin and [728, 729] by Volkmann.", "Some sufficient conditions for the existence of a hamiltonian cycle in a bipartite tournament are described in the survey paper [368] by Gutin.", "Adrian Bondy, Thomas Bo\u0308hme, Samvel Darbinyan, Reinhard Diestel, Odile Favaron, Herbert Fleischner, Andra\u0301s Frank, Vladimir Gurvich, Fre\u0301de\u0301ric\nPreface xiii\nHavet, Bill Jackson, Hao Li, Martin Loebl, Wolfgang Mader, Crispin NashWilliams, Jarik Nes\u030cetr\u030cil, Gert Sabidussi, Paul Seymour, Alexander Schrijver, Ste\u0301phan Thomasse\u0301, Carsten Thomassen, Bjarne Toft and Ke-Min Zhang.", "The reader can find more information on the topic in the survey papers [65, 66] by Bang-Jensen and Gutin [368] by Gutin and [728] by Volkmann, the theses [345, 362, 692, 745], by Guo, Gutin, Tewes and Yeo respectively and the papers cited there.", "Budapest\nWe dedicate this book to our parents, especially to our fathers, B\u00f8rge Bang-Jensen and the late Mikhail Gutin, who, through their very broad\nknowledge, stimulated our interest in science enormously."]} diff --git a/edge/graph_15620053.jsonl b/edge/graph_15620053.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67f3165e48a2dc2f30d2b97272d785fea37e12dc --- /dev/null +++ b/edge/graph_15620053.jsonl @@ -0,0 +1,3 @@ +{"14689578|206051485": ["Principally, according to its feature space, medical image registration can be classified into intensity-based registration and feature-based registration."]} +{"15616200|397187": ["In IEEE International Conference on Image Processing \u2013 ICIP\u201999, IEEE Computer Society Press, Los Alamitos, CA, vol. III, 1999, pp. 435\u2013439.", "For an in-depth discussion of the technique we refer to a more elaborate paper [4]."]} +{"17961280|6280485": []} diff --git a/edge/graph_15620102.jsonl b/edge/graph_15620102.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4988ea4cca4f9642d48db5ea98103b40095f8a27 --- /dev/null +++ b/edge/graph_15620102.jsonl @@ -0,0 +1,4 @@ +{"17166573|870434": [", building underwater sensor networks) to enable/enhance applications such as oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications [9], [8], [2], [4], [3], [7]."]} +{"1420402|870434": ["In this section, we briefly overview the localization techniques proposed in UWA-SNs."]} +{"1420402|164835": ["It is a modified version of the indoor S-V channel model [27]."]} +{"25033620|870434": ["Recently, much research on underwater wireless sensor networks (UWSNs) has been performed to support practical applications such as underwater tactical surveillance, undersea exploration, underwater disaster prevention, seismic monitoring, etc [1][2][ 3 ]."]} diff --git a/edge/graph_15622882.jsonl b/edge/graph_15622882.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5cd8251ab553094dcd719a4fae23785e1c4c9f4f --- /dev/null +++ b/edge/graph_15622882.jsonl @@ -0,0 +1,2 @@ +{"11421581|469744": []} +{"1280050|469744": ["While VR substitutes the existing physical environment with a virtual one, AR uses virtual elements to build upon the existing environment (Azuma, 1997; Azuma et al., 2001)."]} diff --git a/edge/graph_15627472.jsonl b/edge/graph_15627472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..274e87dfc829cc824045eab911c19ca993f90e52 --- /dev/null +++ b/edge/graph_15627472.jsonl @@ -0,0 +1,3 @@ +{"17187414|1634674": ["Action recognition has been the subject to a large body of work in computer vision [15, 24]."]} +{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]} +{"378809|1634674": ["Action and activity recognition have been the subject of a vast amount of research in computer vision literature [22, 32].", "Understanding human activities from video is a fundamental problem in computer vision which has spawned a rich literature [22, 32]."]} diff --git a/edge/graph_15628537.jsonl b/edge/graph_15628537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75922ded827fa0c6b146eecdb28d1644f3a8c75e --- /dev/null +++ b/edge/graph_15628537.jsonl @@ -0,0 +1,4 @@ +{"8457091|15628537": ["See [6, 18, 25] for recent surveys on the theory of Sturmian and episturmian words."]} +{"3251184|15628537": ["Notice that this directive word is exactly the one that arises from the equivalent definition of epistandard words that uses palindromic closure [5,9,13] and, in the binary case, it is related to the continued fraction of the slope of the straight line represented by a standard word (see [20]).", "See also [9] for a recent survey on episturmian theory."]} +{"1635295|15628537": [", see [10, 21, 18]), which includes the well-known Sturmian words, comprises a special class of uniformly recurrent rich infinite words."]} +{"1175851|15628537": ["See also [ 17 ] for a recent survey on episturmian theory."]} diff --git a/edge/graph_15631328.jsonl b/edge/graph_15631328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15634816.jsonl b/edge/graph_15634816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bef4c2828e9dda3563afaba8ef2f8363dbaf547 --- /dev/null +++ b/edge/graph_15634816.jsonl @@ -0,0 +1,3 @@ +{"33520628|1230643": ["Such networks usually consist of hundreds or even thousands of small-sized, low power, inexpensive sensors to monitor some specific phenomenon cooperatively [ 1 ]."]} +{"55849529|1236072": ["Generally, routing protocol in WSN can be classified into three different categories; flat, hierarchical and location based routing ([6])."]} +{"206446574|1230643": []} diff --git a/edge/graph_15634935.jsonl b/edge/graph_15634935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..959ffea84b36263ee649f74459d3f3ac266607dc --- /dev/null +++ b/edge/graph_15634935.jsonl @@ -0,0 +1,2 @@ +{"8987526|9045232": ["Despite the large amount of research performed on the detection of human skin in scenes with complex background, it still remains a difficult problem of pattern recognition (Chellapa et al., 1995; Garcia and Tziritas, 1999; Herodotou et al., 1999; Plataniotis and Venetsanopoulos, 2000; Wu et al., 1999; Yang and Huang, 1994; Yang et al., 2002).", "The results of the research performed on the skin detection show that (Chellapa et al., 1995; Herodotou et al., 1999; Yang et al., 2002)"]} +{"18352697|9045232": []} diff --git a/edge/graph_15636504.jsonl b/edge/graph_15636504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9331aabebd35c303badecc19f505ae4951f55be5 --- /dev/null +++ b/edge/graph_15636504.jsonl @@ -0,0 +1,2 @@ +{"6917625|17033313": ["Furon [17] highlights the concerns of watermarking security with the help of some useful signal processing tools to hack watermarking schemes.", "The importance of security in watermarking has already been realized and a few authors tried to address that from different perspective of steganalysis [17, 22] or cryptanalysis [1, 16, 18] or, sometimes, using an information theoretic model [23]."]} +{"36509600|18144244": ["The criteria for generic watermarking authentication [10] can be applied to the medical domain."]} diff --git a/edge/graph_15636829.jsonl b/edge/graph_15636829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15640936.jsonl b/edge/graph_15640936.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15642034.jsonl b/edge/graph_15642034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..059e176d5248735b789410ccea74b0aa6c7b5e7d --- /dev/null +++ b/edge/graph_15642034.jsonl @@ -0,0 +1 @@ +{"8476557|7704963": ["In the past few years, several algorithms [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16] have been proposed for FIM on uncertain transaction datasets, among which [10, 11, 14] are for data streams and the others are for static datasets.", "In recent years, frequent itemsets mining (FIM) on uncertain datasets [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16] has been a topic in data mining with the emergence of uncertain datasets in many applications."]} diff --git a/edge/graph_15647745.jsonl b/edge/graph_15647745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15650183.jsonl b/edge/graph_15650183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15662958.jsonl b/edge/graph_15662958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5289a1dd7e7183f71676a4748064002266e7a92f --- /dev/null +++ b/edge/graph_15662958.jsonl @@ -0,0 +1,3 @@ +{"149260|10346685": []} +{"10722197|10346685": []} +{"14088665|7889189": ["Security in sensor networks is a well researched problem (Sen 2012b; Sen & Ukil, 2010; Sen, 2010a; Sen 2010b; Sen, 2009)."]} diff --git a/edge/graph_15664316.jsonl b/edge/graph_15664316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15664781.jsonl b/edge/graph_15664781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3ab93afbd5104bd2c02591aeab3c5d82f901992 --- /dev/null +++ b/edge/graph_15664781.jsonl @@ -0,0 +1,2 @@ +{"35385119|15664781": []} +{"826139|15664781": []} diff --git a/edge/graph_15667487.jsonl b/edge/graph_15667487.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15669036.jsonl b/edge/graph_15669036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6892a41f83d6d2a753269f33bb7d403720cd3bdd --- /dev/null +++ b/edge/graph_15669036.jsonl @@ -0,0 +1 @@ +{"504418|386036": ["Record linkage has been studied for more than four decades [11].", "Private linkage is a challenging problem, and previous research [11] has shown that, in many situations, uniquely-identifying information may not be available, and linkage is performed based on matching of other information, such as age, occupation, etc."]} diff --git a/edge/graph_1567004.jsonl b/edge/graph_1567004.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15675156.jsonl b/edge/graph_15675156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15679332.jsonl b/edge/graph_15679332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15679891.jsonl b/edge/graph_15679891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1568096.jsonl b/edge/graph_1568096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15682917.jsonl b/edge/graph_15682917.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15683871.jsonl b/edge/graph_15683871.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32990f530e762aad3c0341c6c400706b1e633f6d --- /dev/null +++ b/edge/graph_15683871.jsonl @@ -0,0 +1,3 @@ +{"8655035|8983048": ["The process can be achieved in three different ways [60][61]: 1."]} +{"130486327|25699143": ["In the vision community, two-frame stereo-correspondence algorithms are predominantly used (Dhond and Aggarwal, 1989; Brown, 1992; Scharstein and Szeliski, 2002), producing a dense disparity map consisting of a parallax estimate at each pixel."]} +{"39766406|8983048": ["The scans registration is generally done in two steps: (a) a pair-wise manual or automatic coarse alignment using targets or few homologues features and (b) final global alignment based on iterative closest points [112] or least squares method procedures [113]."]} diff --git a/edge/graph_15683881.jsonl b/edge/graph_15683881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..093daebaa64d85602ae49a2f55384779f26f157c --- /dev/null +++ b/edge/graph_15683881.jsonl @@ -0,0 +1,2 @@ +{"15235483|1437067": ["In general the main motivation for using evolutionary algorithms for rule discovery is that they perform a global search and cope better with attribute interaction than greedy rule algorithms often used in data mining (Freitas, 02)."]} +{"14716919|5473785": []} diff --git a/edge/graph_15686373.jsonl b/edge/graph_15686373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..145f60295830df284ec21e190158efb223fd23a7 --- /dev/null +++ b/edge/graph_15686373.jsonl @@ -0,0 +1,3 @@ +{"12224652|15686373": ["system issues related to human-automation interaction (see [8] for a deeper survey)."]} +{"113072406|56144874": []} +{"110146113|56144874": ["(1959) and McRuer and Jex (1967) applied the control-loop model to human pilot control of aircraft in turbulence. Kleinman, Baron, and Levison (1970) applied the more recent optimal control theory to pilot instrument scanning and control of an aircraft during approach. These and other adaptations of engineering theories to simple sensorimotor skills have been reviewed by various authors (Rouse, 1980; Sheridan & Ferrell, 1974), but none of the aforementioned modeling efforts really dealt with human-automation interaction. Many classical papers (including the classical control papers mentioned earlier) were recently reprinted in Moray (2005). Understanding the physical interactions of the processes to be controlled, setting of goals and constraints, and devising a control strategy (all part of planning); communicating the model, the goals, constraints, and control strategy to a computer (teaching); allocating attention and estimating system state (monitoring); preparing for emergency action (intervening); and learning from experience (learning) are all relatively high level cognitive tasks\u2014and we really do not have an acceptably robust quantitative model for even one of these functions, let alone all of them working together.", "(1959) and McRuer and Jex (1967) applied the control-loop model to human pilot control of aircraft in turbulence. Kleinman, Baron, and Levison (1970) applied the more recent optimal control theory to pilot instrument scanning and control of an aircraft during approach.", "(1959) and McRuer and Jex (1967) applied the control-loop model to human pilot control of aircraft in turbulence."]} diff --git a/edge/graph_15687284.jsonl b/edge/graph_15687284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7f81bf988fc4c8c2d4efdfc8af24c1aa7e6c45e --- /dev/null +++ b/edge/graph_15687284.jsonl @@ -0,0 +1,2 @@ +{"20600175|17612458": ["The nature of the environment itself imposes some disadvantages: Internet is a network of worldwide level, constantly changing and non-structured [1]."]} +{"14745299|16866891": ["In the last two decades, more than a dozen new algorithms such as particle swarm optimisation, di\ufb00erential evolution, bat algorithm, \ufb01re\ufb02y algorithm and cuckoo search have appeared and they have shown great potential in solving tough engineering optimisation problems [32, 5, 16, 27, 34, 35, 17]."]} diff --git a/edge/graph_15692518.jsonl b/edge/graph_15692518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15692640.jsonl b/edge/graph_15692640.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b966e070a97612965189ea72818760cf9fe9ce8 --- /dev/null +++ b/edge/graph_15692640.jsonl @@ -0,0 +1,2 @@ +{"15508463|11810221": ["\u2026been devoted to the development of performing procedures for scheduling projects under various types of resource constraints (for recent reviews, we refer to Brucker et al. 1999; Demeulemeester and Herroelen 2002; Herroelen et al. 1998a; Herroelen and Leus 2004a, 2005a; Kolisch and Padman 2001).", "Herroelen and Leus (2005b) identify and illuminate popular misconceptions about project scheduling in a resource-constrained environment.", "Exact and suboptimal procedures for generating stable schedules have recently been developed by Leus (2003), Herroelen and Leus (2004b, 2005a), and Leus and Her-roelen (2004)."]} +{"14295689|11810221": ["We restrict ourselves to deterministic approaches (for an introduction to stochastic problems, the reader is referred to Neumann [133] and Herroelen and Leus [86])."]} diff --git a/edge/graph_15694215.jsonl b/edge/graph_15694215.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..445b9c0cb30650c8bdc32f23fe0461fe1bf0f348 --- /dev/null +++ b/edge/graph_15694215.jsonl @@ -0,0 +1,11 @@ +{"206446574|1230643": []} +{"2835258|14441987": ["A survey and comparison of topology-based approaches can be found in [ 10 , 11]."]} +{"195918573|14441987": ["An example of the routing challenges currently faced by mobile ad hoc networks is outlined in a previous review paper [2].", "Also known as proactive, these protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [2].", "The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth, and high error rates [2]."]} +{"5922349|14441987": ["The multi-NIC approach has been discussed in some past work [21] [22], however no distributed channel assignment\nalgorithm has been proposed that can indeed realize the true performance potential of this architecture [28]."]} +{"2624871|10559330": ["The idea behind IntServ [2] is borrowed from the paradigm of the telephony world and B-ISDN, i."]} +{"14398863|14441987": []} +{"16270489|15640936": ["For instance, [13, 9, 20] discuss several aspects of routing in a mobile environment and compare different solutions including Mobile-IP."]} +{"4700370|14441987": []} +{"141053|1775475": []} +{"141053|14441987": []} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} diff --git a/edge/graph_15700537.jsonl b/edge/graph_15700537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c5287f62de34cb5af667aa1d530d9cb63455c06 --- /dev/null +++ b/edge/graph_15700537.jsonl @@ -0,0 +1 @@ +{"62186357|6327434": []} diff --git a/edge/graph_15705163.jsonl b/edge/graph_15705163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8d040b4c1a02f8adf849c7b581e15ce319e50f8 --- /dev/null +++ b/edge/graph_15705163.jsonl @@ -0,0 +1,2 @@ +{"34032182|8125630": []} +{"29029524|386036": ["A relevant example of comparison function is offered by the Edit distance [18]."]} diff --git a/edge/graph_157060637.jsonl b/edge/graph_157060637.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76150f6844b15eee3ced43c109e8ae46acd9ef87 --- /dev/null +++ b/edge/graph_157060637.jsonl @@ -0,0 +1,13 @@ +{"64484084|31860478": []} +{"4870856|1599458": ["izes machine-to-machine communication with the actual world [1], [2]."]} +{"4870856|18011174": ["modeled in IoT security problems [21]\u2013[28], with which we realize the target of maximizing the suppression of malware diffusion in IoT networks and minimizing privacy leakage of"]} +{"4870856|207231270": ["malware can corrupt and damage IoT networks in many ways, such as compromising smart objects, inserting deceitful data leading to fallacious measurements, wastefully spending smart objects\u2019 energy, and obstructing regular communications among smart objects [4]\u2013[10]."]} +{"4870856|5551880": ["it furnishes various computation, storage, and security services through infrastructure as a service, platform as a service, and software as a service (SaaS) models [14], [15]."]} +{"4877226|206578365": ["in [15] provided a comprehensive survey of the state-of-the-art mobile edge computing (MEC) research with a focus on joint radio-and-computational resource management."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"35055807|7774517": []} +{"12597119|6275330": []} +{"96459144|2762484": []} diff --git a/edge/graph_157063151.jsonl b/edge/graph_157063151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d191c7d0eb4aa5c7ca044437a0ab33a653d3b94 --- /dev/null +++ b/edge/graph_157063151.jsonl @@ -0,0 +1,6 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"38610613|206764452": ["The literature contains descriptions of many methods for detecting people in images and these are described in detail in the surveys by [3] and [5] ."]} +{"26629683|7185733": ["Some of the basic research has been devoted to doing face recognition (as a way of doing person identification) [7], gesture recognition [ 15 ] and tracking human body (for surveillance)."]} +{"105629|8446711": ["The thermal camera is an alternative sensor that has recently become popular for e.g., pedestrian detection [1]."]} +{"4927117|206764452": ["HUMAN DETECTION is the key part in the systems of human-centered image retrieval, visual surveillance, pedestrian detection [30], [43], and gait recognition.", "Rectangle features are formed by computing the pixel difference between two rectangular areas in different configurations, which can be regarded as a derivative at a large scale [30]."]} +{"123396447|1634674": []} diff --git a/edge/graph_157063393.jsonl b/edge/graph_157063393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..547df97aab22e45fabe8985393ced54456bf2efd --- /dev/null +++ b/edge/graph_157063393.jsonl @@ -0,0 +1,3 @@ +{"74140693|7191751": []} +{"7325058|10565363": ["[156] reports on emotion theories as well as on affect detection systems using physiological and speech signals (also reviewed in [243]), face expression and movement analysis."]} +{"10206774|20905429": []} diff --git a/edge/graph_15707.jsonl b/edge/graph_15707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15712804.jsonl b/edge/graph_15712804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15713373.jsonl b/edge/graph_15713373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15717479.jsonl b/edge/graph_15717479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15723340.jsonl b/edge/graph_15723340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a558b370bf262c1cbb4b1bab7d663ee2b70b8b82 --- /dev/null +++ b/edge/graph_15723340.jsonl @@ -0,0 +1,11 @@ +{"5929770|10658846": []} +{"17220441|10464056": []} +{"17220441|8914588": ["Con\ufb02ict arises when a newly added policy satis\ufb01es the same condition as an existing policy but prescribes different actions [Huebscher and McCann 2008]."]} +{"17220441|627405": ["The importance of bridging the gap between state-of-art and -practice is given special focus in the discourse that follows.", "This limitation has made our synthesis of the data largely qualitative, as is the practice in most systematic reviews in software engineering [Brereton et al. 2007].", "It has been discovered that following all steps of the SLR methodology may be a pitfall in some cases [Brereton et al. 2007].", "For example, the metaanalysis step (i.e., statistically integrating evidences across multiple studies) is infrequently applied in software engineering [Brereton et al. 2007], and when applied it may detect trivial biases [Stapi\u00b4c et al. 2012]."]} +{"10590243|7842253": ["In other words, the amount of resources should be minimum for a workload to maintain a required level of service quality or to minimize the workload completion time (or maximize through-put) of a workload automatically [Zhan et al. 2015]."]} +{"10590243|17675973": ["Basically, there are three types of scheduling architecture in the cloud: hierarchical, centralized, and decentralized [Mastelic et al. 2014]."]} +{"10590243|8914588": ["There is a need for an autonomic resource management system that considers all the important QoS parameters like availability, security, execution time, SLA violation rate, and so forth for better resource management [Huebscher et al. 2008; Simonin et al. 2013]."]} +{"14797896|8914588": ["According to [6] a MAPE-K loop stores knowledge (K) required for decision-making in a knowledge base (KB) that is accessed by the individual phases.", "Then, an up- or down-trend is randomly drawn, as well as a duration of this trend between a pre-defined number of iterations (for our evaluation this interval of iterations equals [2, 6]), both with equal probability."]} +{"1222880|816774": []} +{"1230811|191396": ["The k-means clustering is a popular data-clustering algorithm to divide n observations into k clusters, in which values are partitioned in relation of the selected dimensions and grouped around cluster centroids [19].", "To determine the set of profiles for users and tasks we use k-means clustering [19] on a sample population from the tracelog to classify tasks and users based on to their respective dimensions."]} +{"7467177|8914588": ["Therefore, the design of the framework follows the MAPE-K loop [6], which is a well-established concept in autonomic computing.", ", Concept of Utility, Reinforcement Learning, Bayesian Techniques) [6].", "The adaptive framework tackling this challenge on a per-job-basis relies on well-known concepts from autonomic computing [5,6], particularly on the MAPE-K loop containing a monitor, analyzer, planner, executor, and knowledge component."]} diff --git a/graph_1572378.jsonl b/edge/graph_1572378.jsonl similarity index 100% rename from graph_1572378.jsonl rename to edge/graph_1572378.jsonl diff --git a/graph_1572419.jsonl b/edge/graph_1572419.jsonl similarity index 100% rename from graph_1572419.jsonl rename to edge/graph_1572419.jsonl diff --git a/edge/graph_15725124.jsonl b/edge/graph_15725124.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15726127.jsonl b/edge/graph_15726127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15735687.jsonl b/edge/graph_15735687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fec100ddb530b054337efbc956921c8b4e06b5b8 --- /dev/null +++ b/edge/graph_15735687.jsonl @@ -0,0 +1,2 @@ +{"25405306|15931066": []} +{"6159806|116542": []} diff --git a/edge/graph_15738153.jsonl b/edge/graph_15738153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15738552.jsonl b/edge/graph_15738552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15741849.jsonl b/edge/graph_15741849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23a1d9bf05775736c266eb2f83b7c42d175552ed --- /dev/null +++ b/edge/graph_15741849.jsonl @@ -0,0 +1 @@ +{"18898453|10559330": ["Internet such as Integrated Services (IntServ) [6] and Differentiated Services (DiffServ) [7]."]} diff --git a/edge/graph_15743724.jsonl b/edge/graph_15743724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbc2d8c97aca2646a0cef86962557a0752471fdd --- /dev/null +++ b/edge/graph_15743724.jsonl @@ -0,0 +1,11 @@ +{"14051479|12765832": ["Keywords IPsec, NEMO, MIPv6\nI. INTRODUCTION\nAs the pervasion of wireless networks, almost everyone owns more than one mobile device, say a smart phone, a tablet pc, and a notebook; and further expects to connect to the Internet from anywhere in anytime."]} +{"7422798|18435528": []} +{"7422798|15640936": ["So the current trend in mobile wireless network evolution is directed toward an all-IP network [ 2 ].", "However, link-layer-independent solutions for 4G require mobility management to be defined at the network layer (i.e., IP-oriented mobility support [ 2 ]).", "In this updated survey over [ 2 ], we begin with a description of MIP and then review all the related protocols that give the current trends in network evolution directed toward an all-IP network."]} +{"17474344|164835": ["These solutions are difficult to provide the expected results in the case of harsh environments due to the propagation model characteristics arising from the physical environment [1]."]} +{"16685362|1236072": ["Many protocols have been proposed for routing in LoWPAN [36, 37].", "Routing metrics used by 6LoWPAN routing protocols are dependent on the application where they are being used [37]."]} +{"16685362|1230643": ["4 [1] protocol defines the physical (PHY) and the MAC layers for such networks and is a de facto protocol for WSNs [3, 18, 19].", "Self-organizing, self-optimizing and fault-tolerance are the main characteristics of such networks [3].", "The IEEE 802.15.4 [1] protocol defines the physical (PHY) and the MAC layers for such networks and is a de facto protocol for WSNs [3, 18, 19].", "In most applications, these nodes have to collaborate to fulfill a common task [2, 3]."]} +{"12949361|6275330": ["Compared to traditional sensor networks, IP-WSN is applied to real-time network systems[16,17] such as healthcare and surveillance systems.", "IP-WSN is being applied to healthcare systems in hospitals [17]."]} +{"14358806|763939": []} +{"17911612|205286988": []} +{"2346295|17205659": ["G: The gateway (GW) which is assumed to be trusted [23]."]} +{"14435862|20905429": []} diff --git a/edge/graph_1574374.jsonl b/edge/graph_1574374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15744805.jsonl b/edge/graph_15744805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3cd5cfdf33230dc1af0d52b216a41385176e3164 --- /dev/null +++ b/edge/graph_15744805.jsonl @@ -0,0 +1,2 @@ +{"54948323|44132017": []} +{"54948323|14545307": []} diff --git a/edge/graph_15745289.jsonl b/edge/graph_15745289.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..983c4079f15de0703e7295dcf7777fab4aa7db6f --- /dev/null +++ b/edge/graph_15745289.jsonl @@ -0,0 +1,2 @@ +{"15176769|9240891": ["However only a small number of these models have addressed the issues of integrating trust with security in mobile agent based systems [19].", "The host protection has been a subject of a large interest and has emphasized a number of techniques such as code signing [40] sandboxing [19, 44], proof carrying code [38] state appraisal [14] and path histories [11]."]} +{"38173008|9240891": ["Our definition differs from [20, 26, 42] with respect to the inherent measurability and the subjective nature of trust.", "For example, [20] emphasises that trust is a belief in the competence of an entity within a specified context, while [28, 30] lay stress on that the entity that manifests trust (the \u201ctrustor\u201d) is the human - not the system.", "On the other hand, as it is highlighted in [20], many researchers assume an (unprovided) definition of trust and use the term in a very specific way related to authentication and authorisation or to paying for purchases.", "Grandison and Sloman survey in [20] various definitions of trust.", "Furthermore, our definition differs from [5, 19, 28, 20, 28] in that trust differentiates between services and it is active for critical periods of time."]} diff --git a/graph_1574544.jsonl b/edge/graph_1574544.jsonl similarity index 100% rename from graph_1574544.jsonl rename to edge/graph_1574544.jsonl diff --git a/edge/graph_15746017.jsonl b/edge/graph_15746017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9edf01ba7b8d00131f7673803b32f751e4e60974 --- /dev/null +++ b/edge/graph_15746017.jsonl @@ -0,0 +1,3 @@ +{"2609569|28294111": ["Some of those new bibliography databases are discipline-oriented, like Chemical Abstracts produced by the American Chemical Society, MathSciNet by the American Mathematical Society and PsycINFO by the American Psychological Association (Neuhaus and Daniel (2008))."]} +{"17722496|431089": []} +{"16213156|2609569": []} diff --git a/edge/graph_15747860.jsonl b/edge/graph_15747860.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15750985.jsonl b/edge/graph_15750985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eab60c0cb22a671839e3565030a26f6a7cec8af9 --- /dev/null +++ b/edge/graph_15750985.jsonl @@ -0,0 +1,37 @@ +{"23440810|205286988": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} +{"23440810|1236072": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} +{"29617759|1230643": []} +{"1711061|3330313": []} +{"10178899|1230643": ["\u2026for example, random deployment in inaccessible terrains and cooperative effort, offer unprecedented opportunities for a broad spectrum of civilian and military applications, such as industrial automation, military tactical surveillance, national security, and emergency health care [1], [2], [3]."]} +{"10125212|1236072": []} +{"10125212|1230643": []} +{"2210228|1230643": []} +{"2193971|9072047": ["Fuzzy-logic control has been proved to be a very successful control approach to many complex nonlinear systems [4,5]."]} +{"13110999|2774524": []} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"41291591|7320605": []} +{"41291591|15947359": []} +{"41291591|1230643": []} +{"12237313|11013798": ["Fault ? error ? failure chain A fault is a flaw in the system that can cause an error [9] [10]."]} +{"12237313|1230643": ["The third contributor is energy-constrained networks, exemplified by wireless sensor networks [39], in which nodes that have drained their battery can no longer contribute to network connectivity [40,41]."]} +{"12237313|1991786": []} +{"18485482|205286988": []} +{"18485482|1236072": ["Additionally, at any time, we assume that each sensor node is able to compute its residual energy, and its available buffer size, as well as record the link performance between itself and its neighboring node in terms of signal-tonoise ratio (SNR)."]} +{"6438719|14441987": []} +{"57733268|10096622": []} +{"10398529|1230643": ["In recent years, numerous applications have fueled research on WSNs [5]."]} +{"9426802|17205659": ["Given the limited communication and computational resources available at each sensor, security is expected to be a key challenge in WSNs [2], [3], [4].", "Following their original work, a large number of key predistribution schemes have been proposed; see the survey articles [4], [5] (and references therein)."]} +{"9426802|1230643": ["Wireless sensor networks (WSNs) are distributed collection of small sensor nodes that gather security-sensitive data and control security-critical operations in a wide range of industrial, home and business applications [1]."]} +{"26584403|205286988": ["Due to these special characteristics, many routing solutions specifically designed for WSNs have been proposed (refer to [1], [2], and [3] for a surveys on routing in WSNs)."]} +{"26584403|1236072": ["Due to these special characteristics, many routing solutions specifically designed for WSNs have been proposed (refer to [1], [2], and [3] for a surveys on routing in WSNs)."]} +{"55592516|1230643": ["The advent of Wireless Sensor Networks (WSNs) [1] stimulates a tremendous number of applications, such as forest monitoring, factory automation, secure installation, and battlefield surveillance."]} +{"8309788|1230643": ["Wireless sensor network has received intensive research attentions due to its enormous application potentials [1]."]} +{"8066031|2835258": []} +{"18299658|1230643": ["In recent years, a growing list of applications have attracted research interest on wireless sensor networks (WSNs) [1,2]."]} +{"10776249|1230643": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"8059543|1762301": ["\u2217Corresponding author (fjimenez@cos.ufrj.br)."]} +{"6445551|17205659": []} +{"6445551|1230643": ["D\nM ]\nKeywords: Wireless Sensor Networks, Key Predistribution, Random Graphs, Minimum Node Degree, k-connectivity, Zero-one Laws."]} +{"33345716|1230643": []} diff --git a/edge/graph_15757638.jsonl b/edge/graph_15757638.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d52111eb62bdb21da0e77d83c33d2bb139734e2 --- /dev/null +++ b/edge/graph_15757638.jsonl @@ -0,0 +1,10 @@ +{"114828013|7185733": []} +{"2362147|7185733": ["In most of the previously proposed methods, image regions corresponding to human skin are typically extracted either by color segmentation or by background image subtraction[5]."]} +{"14626169|18440098": ["For HCI and other application, the sensing techniques which have used in static hand gesture recognition algorithm have been divided mostly into vision-based techniques [1-11] and glove-based techniques [12-13].", "Proper design of gesture recognition algorithm have focused in developing advanced hand gesture interfaces resulting in successful applications like robotics, assistive systems, sign language communication and virtual reality [1].", ", x[1] = i and y[1] = j and set i1 = 0, i2 = 0, j1 = 0, j2 = 0 and search next contour pixel."]} +{"14626169|7185733": []} +{"59761894|7185733": []} +{"62741251|7185733": []} +{"62741251|7788290": []} +{"18981266|14970359": ["Some reviews covering human body pose estimation can be found in [30] [31] [32] [33] [34] [35]."]} +{"18981266|7185733": ["Dating back to late 70s [18], the dominant method pursued in the implementation of CV-based interaction has been appearancebased modeling of hand motion [19] [20]."]} +{"18981266|7788290": []} diff --git a/edge/graph_15760124.jsonl b/edge/graph_15760124.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..febafab8125f8701684d0105173cbe3269a05699 --- /dev/null +++ b/edge/graph_15760124.jsonl @@ -0,0 +1 @@ +{"8824263|2457428": ["Group key management protocols can be roughly classified into three categories; centralised, decentralised, and distributed (Rafaeli and Hutchison, 2003)."]} diff --git a/edge/graph_15762316.jsonl b/edge/graph_15762316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7892751e411c9f8d08278ab27bb0eb20a80e4750 --- /dev/null +++ b/edge/graph_15762316.jsonl @@ -0,0 +1 @@ +{"3212818|1230643": []} diff --git a/edge/graph_15765887.jsonl b/edge/graph_15765887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5e6a82a3ffb02fec084d8f6bc6721ac51b2610d --- /dev/null +++ b/edge/graph_15765887.jsonl @@ -0,0 +1,3 @@ +{"18779088|9045232": []} +{"106909419|7158350": ["A global sketch of this idea is shown in Figure 3-6 as a framework to relate brain activity elicited by hearing sounds and watching colors [150]."]} +{"33839|11859031": ["Finally, incremental refinement refers to the process of developing an idea based on the interplay of the former two components [2].", "Through decades-long research and analysis, three primary components of sketching have been distinguished in the literature: feedback, oversketching and incremental refinement [1], [2]."]} diff --git a/edge/graph_1576654.jsonl b/edge/graph_1576654.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15767558.jsonl b/edge/graph_15767558.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e61ca09589d8ac97ef6e71ca20635d5ac9427e69 --- /dev/null +++ b/edge/graph_15767558.jsonl @@ -0,0 +1,2 @@ +{"60528960|7185733": ["Certains syst\u00e8mes visent \u00e0 extraire une description des activit\u00e9s se d\u00e9roulant dans une sc\u00e8ne : la vid\u00e9osurveillance des activit\u00e9s humaines [22] ou du trafic routier [48], l\u2019analyse des gestes pour lire les l\u00e8vres [18] ou comprendre le langage des signes [72], ainsi que l\u2019analyse de sc\u00e8nes dans le domaine de la vision par ordinateur [9]."]} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} diff --git a/edge/graph_15778270.jsonl b/edge/graph_15778270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15778412.jsonl b/edge/graph_15778412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15790998.jsonl b/edge/graph_15790998.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15792673.jsonl b/edge/graph_15792673.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e4cb12abaceb041ab97da357c1116d32da6755b --- /dev/null +++ b/edge/graph_15792673.jsonl @@ -0,0 +1 @@ +{"7847316|18782652": ["Rule pruning is a commonplace technique in data mining [3].", "tually, there are several classification-rule discovery algorithms that were explicitly designed to improve rule set simplicity, even at the expense of reducing the predictive accuracy [1], [3], [4]."]} diff --git a/edge/graph_15797536.jsonl b/edge/graph_15797536.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d23d21e4dfe0a8f1bc3b0300580233cac62b013 --- /dev/null +++ b/edge/graph_15797536.jsonl @@ -0,0 +1 @@ +{"6849168|7773456": ["Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12.0). BrumeUe & Sidney [1982] show that Johnson's [1954] algorithm for F21 I C max also applies to the exponential case.", "Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12."]} diff --git a/edge/graph_15798159.jsonl b/edge/graph_15798159.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7e70c2c3aae691a3f22da095068b8446ca8c5aa --- /dev/null +++ b/edge/graph_15798159.jsonl @@ -0,0 +1,16 @@ +{"99520|14441987": ["Reproduction for academic, not-for profit purposes permitted provided this text is included.\nby Royer and Toh (1999) as Reactive and Proactive.", "The model introduces the notion of belief and provides a dynamic measure of reliability and trustworthiness in an ad hoc network."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"1100811|14441987": ["In the field of ad hoc wireless networking [Broch98, Royer99 ], previous work on secure routing employs public key cryptography to perform authentication ([Kong01, NAI, Papadimitratos02b, Zhou99, Zhang98])."]} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} +{"13490534|17205659": ["Various attacks on WSNs and their countermeasures (Wang et al., 2006)", "Time-released key chain for source authentication (Wang et al. 2006) Fig."]} +{"13490534|1236072": []} +{"13490534|2457428": ["In some cases, the entire group of nodes is responsible for key management (Rafaeli et al., 2003).", "Section 6 discusses secure broadcasting and multicasting techniques based on group key management protocols (Rafaeli et al., 2003) and directed diffusion-based mechanism (Di Pietro et al., 2003) etc. Section 7 presents some of the well-known existing secure routing protocols for WSNs such as \u03bcTESLA\u2026", "To handle this problem, several key management schemes have been devised: centralized group key management protocols, decentralized key management protocols, and distributed key management protocols (Rafaeli et al., 2003)."]} +{"11186959|164835": []} +{"25414932|6959212": []} +{"7465328|1236072": ["To limit the number of communications, because they consume a lot of energy, wireless sensor networks need protocols with effective routes [8]."]} +{"7465328|1230643": ["Wireless sensor networks are specific ad-hoc networks [7] with a larger number of nodes, a limited energy and a lower computing power."]} +{"7570331|13372227": ["Jane installs necessary software in her car and is ready to go."]} +{"206446574|1230643": []} +{"14351892|1230643": ["works [2],in which a large number of sensor nodes collaborate to monitor certain environment."]} +{"6516231|14441987": ["Routing: Two approaches of uni-cast routing algorithms are considered for ad hoc networks [12]: Proactive, table driven algorithms and reactive, source initiated, on-demand routing protocols."]} diff --git a/edge/graph_15800577.jsonl b/edge/graph_15800577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f05fef96f3cf06054c65e8f50ff22fc46ea4315f --- /dev/null +++ b/edge/graph_15800577.jsonl @@ -0,0 +1 @@ +{"15888664|57670950": ["The ideas for pMatlab maps are principally drawn from the High Performance Fortran (HPF) community [Loveman1993, Zosel1993], MIT Lincoln Laboratory Space-Time Adaptive Processing Library (STAPL) [DeLuca1997], and Parallel Vector Library (PVL) [Lebak2005]."]} diff --git a/edge/graph_158046985.jsonl b/edge/graph_158046985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1d919b7434aa873201a2ba72d24b1d4dd13c52b --- /dev/null +++ b/edge/graph_158046985.jsonl @@ -0,0 +1,10 @@ +{"62471040|16549840": ["However, although CBR is simple in principle, and has been successfully used in engineering problem solving, it still lacks a generally theoretically sound framework[1].", "As a significant branch of Artificial Intelligence (AI), Case-Based Reasoning (CBR) has received more and more research attention[1]."]} +{"198190013|3342225": ["Adifferent stream of approaches, still in the XbD setting, focuses on the local behavior of a black box (Guidotti et al. 2018b), searching for an explanation of the decision made for a speci\ufb01c instance.", "Our group has designed LORE (Guidotti et al. 2018a), a local explanator that builds a focused exploration around the target point, and delivers explanations in the form of highly expressive rules together with counterfactuals ,suggestingthechangesintheinstance\u2019s features that would lead to a different outcome.", "We refer to our comprehensive, up-to-date survey (Guidotti et al. 2018b), and account brie\ufb02y here for the major recent trends.", "When the training set is available, decision rules are also widely used to proxy a black box model by directly designing a transparent classi\ufb01er (Guidotti et al. 2018b) which is locally or globally interpretable on its own (Lakkaraju, Bach, and Leskovec 2016; Malioutov et al. 2017; Craven and\u2026", "On the other hand, purely lo-cal models, such as LIME or our method LORE mentioned above, do not yield an overall proxy of the black box, hence cannot solve the XbD and BBX problems in general terms.", "( see our recent paper (Guidotti et al. 2018a).)", "Our group has designed LORE (Guidotti et al. 2018a), a local explanator that builds a focused exploration around the target point, and delivers explanations in the form of highly expressive rules together with counterfactuals ,suggestingthechangesintheinstance\u2019s features that would lead to a\u2026"]} +{"15019293|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"52965836|3342225": ["[63] reviewed methods for explaining black-box models at a large scale including data mining as well as machine learning."]} +{"52965836|17779926": ["One effort to gain insight into highly complex models is the use of rule extraction [114]\u2013[116]."]} +{"5063596|7306130": []} +{"5063596|17779926": ["Other works explored how to design for implicit interaction with sensing-based systems [14, 75, 86, 175], and help people predict what will happen through feedforward [12, 176].", "Furthermore, while rule extraction is an old research area, and quite separated from the recent developments in iML and FAT, there have been new papers within the past few years, such as methods for rule extraction from deep neural networks [187, 75]."]} +{"53230917|3342225": ["ways to provide explanations for predictions made by machine learning systems. Although there is currently an active debate in the field about how best to conceptualize and operationalize these terms [11, 13], recent research has broadly fallen into two camps. Some work has focused on models that are inherently interpretable, such that an explanation for a decision can be given in terms that are easily un"]} +{"53231403|3342225": ["(Guidotti et al. 2018a) proposed LORE method for local rule extraction.", "In regulated areas, such as banking, interpretability is high-priority because of legislation compliance issues (Guidotti et al. 2018b).", "\u2022 Model-agnostic methods (Guidotti et al. 2018b): they include (but are not limited to) those methods that distill a NN with a simple and interpretable model (Ba and Caru-ana 2014; Hinton, Vinyals, and Dean 2015)."]} +{"52961370|393948": ["While Deep Learning can be applied to learn from large volumes of labeled data, it can also be attractive for learning from large amounts of unlabeled/unsupervised data [4][5][6], making it attractive for extracting meaningful representations and patterns from Big Data."]} diff --git a/graph_1580493.jsonl b/edge/graph_1580493.jsonl similarity index 100% rename from graph_1580493.jsonl rename to edge/graph_1580493.jsonl diff --git a/edge/graph_15805243.jsonl b/edge/graph_15805243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15805505.jsonl b/edge/graph_15805505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15807196.jsonl b/edge/graph_15807196.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15813404.jsonl b/edge/graph_15813404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f5b782d7130372204c9cdbaec724e542c7d5135 --- /dev/null +++ b/edge/graph_15813404.jsonl @@ -0,0 +1,10 @@ +{"27283459|62204132": ["Conway, Maxwell and Miller (1967) and Potts and Van Wassenhove (1991) have given practical examples of scheduling multiple groups of similar products on one machine.", "Earlier results in this area have been reviewed in (Ham, Hitomy and Yoshida, 1985; Potts and Van Wassenhove, 1991 ).", "j =1 w(j,f ) ,f = 1 ,...,g . Lemma 1 ( Potts and Van Wassenhove, 1991 )."]} +{"43468926|17438822": []} +{"23811579|7773456": []} +{"41026997|62204132": []} +{"59856032|62204132": []} +{"6849168|7773456": ["Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12.0). BrumeUe & Sidney [1982] show that Johnson's [1954] algorithm for F21 I C max also applies to the exponential case.", "Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12."]} +{"36344184|62204132": []} +{"10225618|62204132": []} +{"62191796|62204132": []} +{"37351322|62204132": []} diff --git a/graph_1581367.jsonl b/edge/graph_1581367.jsonl similarity index 100% rename from graph_1581367.jsonl rename to edge/graph_1581367.jsonl diff --git a/edge/graph_15826391.jsonl b/edge/graph_15826391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15830413.jsonl b/edge/graph_15830413.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15830743.jsonl b/edge/graph_15830743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..12320354e13b08dea331a1985136d34bfe8dc852 --- /dev/null +++ b/edge/graph_15830743.jsonl @@ -0,0 +1 @@ +{"110018005|8530790": ["For a comprehensive review of multiple-objective GAs, the reader is referred to the overviews of the di(cid:128) erent methods presented in Fonseca and Fleming (1995), Coello (1999) and Van Veldhuizenth (1999).", "Fonseca and Fleming (1995) proposed a method called multi-objective ranking."]} diff --git a/edge/graph_15838538.jsonl b/edge/graph_15838538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15842276.jsonl b/edge/graph_15842276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0aca96785a5f0c0765a86aa274b3be53c2dae7dc --- /dev/null +++ b/edge/graph_15842276.jsonl @@ -0,0 +1,4 @@ +{"11875067|7971188": ["The performance metrics for evaluating a DHT include fault-tolerance, load-balancing, efficiency of look-ups and inserts, and proximity awareness [ 23 ]."]} +{"14983111|38476": ["In addition, we incorporate sliding window [15] and crossvalidation [11,12] techniques in the training and prediction stages and consequently evaluate the validity of the learning algorithms for prediction accuracy using statisticalmetrics, as discussed in the following sections.", "The sliding window technique [15] maps an input sequence x of size k to an individual output y by using a prediction model; this approach is very effective in the data mining field e."]} +{"14755515|7971188": ["monitor system components based on decentralized messaging and information indexing infrastructure, called Distributed Hash Tables (DHTs) [ 26 ]."]} +{"12522853|15619069": ["Other proposed meta-models include CSM, PCM and KLAPER [18].", "To support modeling large applications and concurrently involve multiple developers, the PCM's model is split into five sub-models: The repository model consists of interface and component specifications.", "In order to capture the time behavior and resource consumption of a component, PCM takes four factors into account [1].", "Figure 3 gives an overview of how the structure of the resulting PCM performance model looks like.", "Model The predictions of the SPECjEnterprise2010 application are conducted using a PCM model as performance model.", "One of the most advanced component-based performance modeling languages, in terms of parametrization and tool support, is the Palladio Component Model (PCM) [18].", "The PCM model is semi-automatically extracted from a running benchmark application instance.", "PCM Figure 1: The system reconfiguration process [16] . allows modeling processing resources like, e.g., CPUs and disk drives.", "In PCM, the performance-relevant control flow of a component service is modeled as an RDSEFF.", "To derive predictions from the PCM models, we use the Simucom framework [1] that implements a queueing-network based simulation.", "In this paper, we use the PCM as architecture-level performance model since it allows to explicitly model different usage profiles and resource allocations."]} diff --git a/edge/graph_15844013.jsonl b/edge/graph_15844013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15844304.jsonl b/edge/graph_15844304.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1a27b8cdc21e12bdb568e2f0c31cf022794ed73 --- /dev/null +++ b/edge/graph_15844304.jsonl @@ -0,0 +1,2 @@ +{"18658456|9104850": ["Through satisfying requests from the local storage, they not only reduces the bandwidth consumption, but also minimizes the access latency [11]."]} +{"53833741|14697846": []} diff --git a/edge/graph_15847221.jsonl b/edge/graph_15847221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15847982.jsonl b/edge/graph_15847982.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15849973.jsonl b/edge/graph_15849973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15850652.jsonl b/edge/graph_15850652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15851544.jsonl b/edge/graph_15851544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f43c0b9279c4159d31fcb3bc8e7bb0de7c4a976 --- /dev/null +++ b/edge/graph_15851544.jsonl @@ -0,0 +1,16 @@ +{"7211651|15412731": []} +{"7211651|205435103": ["For a fair comparison across studies, the data was normalized as performed in [1] (TABLE I).", "In this work, the guidelines provided by [5] the structure of the presentation of [1] are followed."]} +{"2828091|15412731": ["This decision is very complex as it has to include multiple factors and criteria [22, 23].", "The drivers were collected based on the factors suggested by CoBRA, a literature research, and the results of previous empirical studies [23]."]} +{"18927305|11139156": ["These publications deal with the skills required in GSD, and how to deal with the main problems identified in teaching these skills."]} +{"43314096|1113420": ["Merging these areas should be a promising research topic, since awareness is already being discussed in ubiquitous computing for some time [1]."]} +{"1094963|627405": ["Eight digital libraries were selected based on experiences shared by other groups [9,20,23,24] and on the subject under review."]} +{"15641792|16907530": ["The same argument is shared by Kotlarsky and Oshri (Kotlarsky and Oshri, 2005) and Nurdiani et al. (Nurdiani et al, 2011)."]} +{"15641792|11139156": ["Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge exchange is found to be one of the critical success factors for o \u21b5 shore software development by Khan et al. (Khan et al, 2009).", "Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge\u2026"]} +{"17889756|627405": ["identified several issues of electronic search derived from their experience in conducting SLRs (Brereton et al., 2007).", "Brereton et al. (2007) identified several issues of electronic search derived from their experience in conducting SLRs."]} +{"444589|15412731": ["There exist some research papers on the processes and criteria currently applied in practice that are based on empirical studies and observations [1] [15] [3].", "However, despite the differences, we observed that, in general, the assignment of work is done rather unsystematically in practice, without any specific process or defined decision procedure [3].", "In an extensive empirical study on the practice of distributed development, we identified three main criteria for task allocation: labor cost rates, availability of people, and expertise [3]."]} +{"6801355|11139156": ["Smite et al. (2010) and Hossain et al. (2009) classified collaboration modes into two categories: inter-organizational (between two companies) and intra-organizational (within the same company).", ", 2010; Hossain et al., 2009). Prikladnicki and Audy (2010) distinguish between offshore outsourcing (when development is moved to an external third party in another country), internal offshoring (when development is moved to a division of a specific company established in another country) and offshoring (used as a generic term when the relationship is unknown). Smite et al. (2010) and Hossain et al. (2009) classified collaboration modes into two categories: inter-organizational (between two companies) and intra-organizational (within the same company).", ", 2010; Hossain et al., 2009). Prikladnicki and Audy (2010) distinguish between offshore outsourcing (when development is moved to an external third party in another country), internal offshoring (when development is moved to a division of a specific company established in another country) and offshoring (used as a generic term when the relationship is unknown).", "Classification of knowledge in the GSE field is also performed in recent systematic reviews (Prikladnicki and Audy, 2010; Smite et al., 2010; Hossain et al., 2009)."]} +{"10359697|11139156": []} +{"10359697|15412731": []} +{"15267632|1113420": ["Merging these areas may be a promising research topic, since awareness is already being discussed in ubiquitous computing for some time (Baldauf et al. 2007)."]} +{"24397200|11139156": []} +{"14585844|11139156": ["Confirming the findings of the previous works [22][12], the existing research in the area is exploratory in nature and mostly reports the cases in which some challenges were faced and some strategies were applied."]} diff --git a/edge/graph_15855304.jsonl b/edge/graph_15855304.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fab2e416a5d693cb322b5464d26fb85e04f56424 --- /dev/null +++ b/edge/graph_15855304.jsonl @@ -0,0 +1 @@ +{"8306384|11720829": []} diff --git a/edge/graph_158647743.jsonl b/edge/graph_158647743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15865431.jsonl b/edge/graph_15865431.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b63ee20ae9a16aa13742eb3a04ce0af7a68452d --- /dev/null +++ b/edge/graph_15865431.jsonl @@ -0,0 +1,3 @@ +{"206256778|3330313": ["Moreover, an anomaly in a dataset is defined as an observation that appears to be inconsistent with the remainder of the dataset (Hodge and Justin, 2004)."]} +{"46417765|17205659": ["One of major concerns in the sensor network applications is how the confidentiality of the sensed data and the control message exchanged among sensor nodes can be guaranteed [1\u20134]."]} +{"13962444|1230643": ["Key Distribution Mechanisms for Wireless Sensor\nNetworks: a Survey\nSEYIT A. C\u0327AMTEPE and BU\u0308LENT YENER\nRensselaer Polytechnic Institute\nAdvances in technology introduce new application areas for sensor networks.", "Sensors are inexpensive, low-power devices which have limited resources [Akyildiz et al. 2002]."]} diff --git a/edge/graph_15867134.jsonl b/edge/graph_15867134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61bd5ca6b4fb773f55190200fdd6aaf5bf8b5190 --- /dev/null +++ b/edge/graph_15867134.jsonl @@ -0,0 +1,3 @@ +{"98198343|11407374": []} +{"206413233|2128503": []} +{"206413233|15589021": []} diff --git a/edge/graph_15874426.jsonl b/edge/graph_15874426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15874831.jsonl b/edge/graph_15874831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15875837.jsonl b/edge/graph_15875837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b3fb1bb4ae911f19a158e89937d86e97753eab1 --- /dev/null +++ b/edge/graph_15875837.jsonl @@ -0,0 +1 @@ +{"206079889|8813834": ["Others Introduction/foundational [16,21,29,46,58,76,95,96,104,108,114,126,129,133,143,148,163,165,166,168,171,175, 176,178,187,195,209,223,229,237,238,247,257,274,277,289] General usage [33,43,54,60,106,110,134,142,149,174,186,191\u2013193,221,231,233,240,242,243,250,251, 256,262,279] E.", "The authors gratefully acknowledge the Editor and reviewers' constructive comments on an earlier Table 5 Classification of reviewed literature Reference Applications Interorganizational systems [30] [36] [45] [49] [51] [61] [68] [70] [78] [79] [102] [112] [113] [120] [136] [146] [147] [170] [197] [199] [202] [204] [208] [210] [216] [224] [225] [245] [249] [254] [255] [261] [270] Electronic payment systems [23] [41] [50] [64] [138] [184] [226] [276] Financial services [42] [63] [137] Retailing [24] [34] [116] [119] [121] [157] [203] [212] [234] [275] [278] Publishing [77] [82] [124] [172] [182] [280] Auctions [135] [258] [285] [288] Intraorganizational EC [37] [59] [99] [139] [162] [211] [236] [273] Education and training [55] [71] [103] [161] [206] [215] [259] Marketing and advertising [53] [93] [128] [131] [183] [185] [198] [230] Other applications [48] [69] [89] Technological issues Security [18,19,31,32,40,72,80,83,84,86,101,105,109,150\u2013153,180,181,190,219,222,235,252, 264,265,267,272,281\u2013283,286,287] Technological component [56] [74] [75] [92] [159] [160] [177] [179] [213] [227] [232] [241] [284] Network technology [57] [97] [100] Support systems [20] [26] [39] [85] [117] [118] [122] [125] [130] [140] [144] [154] [164] [173] [194] [248] [260] [266] Methodology/algorithm [65] [66] [98] [115] [132] [155] [214] [246] [263] [271] Other technological issues [38] [145] Support and implementation Public policy Taxation [167] Legal issues [15] [52] [188] Privacy [25] [35] [62] [67] [205] [269] Fraud [28] Trust [111] [200] [201] Corporate strategy [17] [22] [27] [73] [81] [87] [88] [90] [91] [94] [107] [123] [127] [141] [156] [158] [169] [189] [196] [207] [217] [218] [220] [228] [239] [244] [253] Other support and implementation [44] [47] [268] Others Introduction/foundational [16] [21] [29] [46] [58] [76] [95] [96] [104] [108] [114] [126] [129] [133] [143] [148] [163] [165] [166] [168] [171] [175] [176] [178] [187] [195] [209] [223] [229] [237] [238] [247] [257] [274] [277] [289] General usage [33,43,54,60,106,110,134,142,149,174,186,191\u2013193,221,231,233,240,242,243,250,251, 256,262,279] H.K. Bhargava, R. Krishnan, R. M\u00fcller, Electronic commerce in decision technologies: a business cycle analysis, H.K. Bhargava, R. Krishnan, R. M\u00fcller, Decision support on demand: emerging electronic markets for decision technologies , Decision Support Systems 19 (3), 1997, pp. 193\u2013 214."]} diff --git a/edge/graph_15879478.jsonl b/edge/graph_15879478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15879980.jsonl b/edge/graph_15879980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b62e548041388288eab36538786ac73babc738f4 --- /dev/null +++ b/edge/graph_15879980.jsonl @@ -0,0 +1,5 @@ +{"1876898|15369615": ["Currently, such edge detectors are only used to generate fundamental cues to construct more robust features or provide complementary information for semantic mapping systems [53]."]} +{"17580315|8042572": ["IVS and IVA provide effective means of sensing in intelligent environments [113], which is much related with the recent concepts of CPS or Internet of Things (IoT)."]} +{"27550462|12127129": ["This algorithm is adaptive to dynamic background changes, easy to implement and fast and applicable for real-time implementation, as in [6-7].", ")[6-8], differing in their capabilities and requirements."]} +{"38136192|16525678": ["Some important applications are in the field of security, given the ever-increasing demand in this domain, which includes, but not limited to, access control, crowd control, human detection and recognition, traffic analysis, vehicular tracking, Unmanned Aerial Vehicle (UAV) and detection of military targets [1]."]} +{"207107473|15369615": []} diff --git a/edge/graph_15880277.jsonl b/edge/graph_15880277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2356d46fa829d9014faa7b734dc0a040cd6fbe47 --- /dev/null +++ b/edge/graph_15880277.jsonl @@ -0,0 +1 @@ +{"37925315|12681089": []} diff --git a/edge/graph_15880829.jsonl b/edge/graph_15880829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74e6bc543f000940a0818403bf3307f989584386 --- /dev/null +++ b/edge/graph_15880829.jsonl @@ -0,0 +1,11 @@ +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"110983031|15199849": []} +{"110983031|1236072": ["Rumor routing maintains only one path between the source and its destination as opposed to Directed Diffusion where data can be sent through multiple paths at low rates.[3][9]"]} +{"110983031|1230643": []} +{"14549087|10287248": ["[30]. Although this has been thoroughly studied in conventional networks (wired infrastructure) [ 9 ] and"]} +{"62171473|141053": []} +{"62171473|1299833": []} +{"62171473|1236072": []} +{"62171473|2835258": []} +{"62171473|14441987": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} diff --git a/edge/graph_15882097.jsonl b/edge/graph_15882097.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..070f2c8e31ee253782458340d6c556cdfe8ee54b --- /dev/null +++ b/edge/graph_15882097.jsonl @@ -0,0 +1 @@ +{"504324|16449507": ["In the context of scienti\ufb01c work\ufb02ows, systems such as myGrid/Taverna [27], Kepler [7], and VisTrails [15] now capture and store provenance information, and a standard for provenance representation called the Open Provenance Model (OPM) [24] has been designed.", "capture and store provenance information, and a standard for provenance representation called the Open Provenance Model (OPM) [17] has been designed."]} diff --git a/graph_1588237.jsonl b/edge/graph_1588237.jsonl similarity index 100% rename from graph_1588237.jsonl rename to edge/graph_1588237.jsonl diff --git a/edge/graph_15883244.jsonl b/edge/graph_15883244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90f8d29ec7eb7f6595dafcb96fcc123c0cb9a0d7 --- /dev/null +++ b/edge/graph_15883244.jsonl @@ -0,0 +1,2 @@ +{"32045532|15915200": []} +{"16537002|6952653": []} diff --git a/edge/graph_15888893.jsonl b/edge/graph_15888893.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bddfdcb83139f5da7dc7e27d19310fb399d03fa7 --- /dev/null +++ b/edge/graph_15888893.jsonl @@ -0,0 +1,4 @@ +{"29799910|2253457": ["For a nice summary of approaches to identifying context attributes see Turney (1996a).", "The survey article (Turney 1996b) discusses five strategies for managing contextsensitive features in supervised machine learning.", "Although we do not explore this in this paper, there is evidence from prior research (Matwin and Kubat 1996; Turney 1996a, 1996b) that real-valued contextual cues can make a significant difference during learning.", "Related work on context-sensitive machine learning can be found in Matwin and Kubat (1996), Turney (1996a, 1996b)."]} +{"8197602|393948": ["The advantage of DTL is that it o\ufb00ers a far greater \ufb02exibility in extracting high-level features and transferring it from a source to a target problem, and unlike the classical approach, it is not a\ufb00ected by experts bias [2].", "Deep Transfer Learning (DTL) is an alternative to transfer learning with shallow architectures [2]."]} +{"8083835|2670121": ["This process of transferring information is a fundamental aspect of the FuzzyTL methodology, and highlights the use of an IU [28] TL method.", "The term IU transfer learning was introduced by Cook, Feuz and Krishnan [28]."]} +{"8083835|12204996": []} diff --git a/edge/graph_15891636.jsonl b/edge/graph_15891636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15895606.jsonl b/edge/graph_15895606.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bad206461863d68ffa9030a836930f22af30f86 --- /dev/null +++ b/edge/graph_15895606.jsonl @@ -0,0 +1,22 @@ +{"108880637|8364569": ["However, three main trends can be observed in modern deployments: (i) SCADA networks are becoming increasingly interconnected, allowing communication with corporate networks, remote access from engineers and system administrators, and even communication with the Internet; (ii) the use of commercial off-the-shelf devices, such as Windows desktops; and (iii) the adoption of the TCP/IP protocol stack.", "Three main trends can be identified in modern installations: (i) increased interconnection, allowing communication with corporate networks, remote access from engineers and system administrators, and even communication with the Internet; (ii) the use of low cost Commercial Off-The-Shelf (COTS) devices, such as Windows computers; and (iii) the adoption of the TCP/IP protocol stack [87].", "In the end of 2012, the United States Industrial Control Systems Cyber Emergency Response Team published in their trimestral report [78] the results of the Project Shine, which included a list of approximately 7200 Industrial Control System (ICS) devices directly reachable via the Internet (see Figure 1.3).", "The breach in Maroochy water services in Australia [131] by a disgruntled employee exposes the risk of insider attacks, the slammer worm infection at US DavisBesse nuclear plant [17] shows that critical infrastructures can be affected by common Internet malware and the Stuxnet that attack targeted a specific industrial control system likely in Iran [55], demonstrated how much damage a resourceful attacker can cause.", "In addition, due to the increasing interest in Intrusion Detection Systems (IDS) for SCADA [145, 37], we consider time series analysis to be of particular importance, as it is widely used in IDS developed for traditional IT networks and the Internet [136]."]} +{"108880637|16156203": ["The problem of periodicity detection in time series also has been addressed by the data mining community [97]."]} +{"15028120|4528002": ["Automotive systems need to increase their security as various attacks are already possible [2], [3].", "In our opinion this is an important step for a secure on-board network, as the current widely used automotive bus systems lack security properties [2] [3] [4] [6] [8] [7] [19]."]} +{"12103882|17774971": []} +{"12103882|192934": []} +{"16431647|4528002": ["A more comprehensive survey on the works presented in Sections 2 and 3 can be found in [19]."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"11484430|13034818": []} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} +{"18245268|2457428": ["chical group key management methods [26], [27]."]} +{"42455857|1940388": ["The 2003 Eastern blackout was caused by the fact that programs for key areas were abnormal and failed to provide the system operators the correct state information [2]."]} +{"15805291|7988320": []} +{"15805291|6332923": ["However, the study in [43] identified security flaws in [42] and showed that the scheme is susceptible to information leakage attacks."]} +{"15805291|16514036": []} +{"18497287|10859599": ["Parameter Meaning Default value n network size 128 n\u0304 number of neighbors within radio range 32 pfn per-host false negative probability [1-5]% pfp per-host false positive probability [1-5]% \u03bb per-node capture rate [1-24]/day TIDS intrusion detection interval [0-700] sec m number of intrusion detectors per node [3,11] \u03b1 number of ranging operations 5 Et energy for transmission per node 0.", "[6] surveys survivability in mobile ad hoc networks designs."]} +{"11472225|7988320": ["Access to medical devices is a common problem that limits researchers\u2019 ability to validate prior results; food-grade meat as a phantom also complicates reproducibility due to its inaccurate approximation of a human body [8], [21]."]} +{"11472225|6332923": ["The system should also satisfy data origin authentication; the source of any received data should be verifiable."]} +{"207229852|2357830": ["RFID protective shields and blockers [27, 15] are commonly used as countermeasure to the first form of cloning attacks discussed above."]} +{"207229852|6327434": []} +{"207881413|595093": ["(A more detailed discussion on Smart Grid domains can be found in [14] [15] [16].)"]} +{"207881413|6959212": ["Compared with legacy power systems, the Smart Grid is envisioned to fully integrate high-speed and two-way communication technologies [4] [5] [6] [7] [8] into millions of power equipments to establish a dynamic and interactive infrastructure with new energy management capabilities, such as advanced\u2026"]} +{"207881413|2457428": ["As key management for conventional computer networks has been well categorized and summarized in several survey papers [117,118], in the following, we focus on the new requirements of key management for the Smart Grid, and present an overview of existing key management schemes for power systems."]} diff --git a/edge/graph_15898213.jsonl b/edge/graph_15898213.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_159040929.jsonl b/edge/graph_159040929.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64e333222b82904c0c700032bce9a443cab29f5d --- /dev/null +++ b/edge/graph_159040929.jsonl @@ -0,0 +1 @@ +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} diff --git a/edge/graph_159041060.jsonl b/edge/graph_159041060.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aefc45950f55089226ddcb88ad5ebd6ab89eb830 --- /dev/null +++ b/edge/graph_159041060.jsonl @@ -0,0 +1,80 @@ +{"7551351|17747015": ["Activity recognition methods are classified into three main types of vision-based [1], radio-based [2], and sensor-based [3] methods."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"6020221|14116122": []} +{"10712736|15136738": ["D a ta c o ll ec ti o n Sources Discovery Support Initial set with incremental crawling results: [11] Context monitoring + position prediction: [12]", "Energy-efficient solutions for managing data from mobile data sources were outlined in [12]."]} +{"356547|3348390": ["An entity is defined as \u201ca person, place or objects that is considered relevant to the interaction between a user and an application, including the user and applications themselves\u201d [79]."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"5120196|16403716": []} +{"9997901|11894197": ["Information Gain Ratio (IGR) has been chosen for feature selection because it usually performs well in practice [50] and because it is independent of the clas-si\ufb01cation model (by contrast with wrapping attribute selection methods [68])."]} +{"15158283|8618569": ["\u2026mentioned earlier are generic in the sense that they can be applied to both wired and wireless solutions, the wireless nature of the communication between sensors and devices makes these objectives more vulnerable, as there is no apparent physical boundary of the transmission medium [8] .", "In an outside attack, an outsider adversary or attacker is not a participant of the network while an inside attack consists of attacking nodes by running malicious code in them [8]."]} +{"88502187|8125630": ["Finally, the transformed data will be stored persistently 612 into staging tables to support the computations for predicting and designing out 613 construction waste [57, 56].", "1 Building Model Analysis \u00d7 \u00d7 \u00d7 \u00d7 \u00d7 1, 2, 4 [54, 55, 56, 57] 3."]} +{"205299982|3750204": ["[11] for a detailed explanation on their comparison and selection criterion.", "Spark is reported to have ten times faster than MR on disk-resident tasks, whereas hundred times faster for memory-resident tasks [11]."]} +{"55186354|52877341": ["Alterna-tively, meta-based-approaches can be used to conducting a literature review and include the work of Mishra, Gunasekaran, Papadopoulos, and Childe (2016), which adopt a bibliometric and network analysis approach to obtain and compare in \ufb02 uential work in a speci \ufb01 c domain (in this example,\u2026"]} +{"55186354|2652752": ["\u2026and Teuteberg (2014) \u2013 BD logistics; Eembi, Ishak, Sidi, Affendey, and Mamat (2015) \u2013 on data veracity research for pro \ufb01 ling digital news portal, and Abdellatif, Capretz, and Ho (2015) \u2013 on software analytics (a distinct branch of BDA), this paper attempts to broaden the scope of their\u2026"]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"14894961|7923463": []} +{"9385544|16362395": []} +{"9385544|8365617": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"11149239|14808716": ["9 represents any top-down decision tree induction algorithm (Rokach and Maimon 2005a) with the following modification: the decision tree is not pruned and at each node, rather than choosing the best split among all attributes, the inducer randomly samples N of the attributes and choose the best\u2026"]} +{"11149239|1097238": ["These techniques alter the way the induction algorithm traverses the hypothesis space (Brown et al. 2005).", "However, in the classification context, there is no complete and agreed upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005).", "Brown et al. (2005) suggested a taxonomy of methods for creating diversity in ensembles of classifiers: varying the starting points within the hypothesis space; varying the set of hypotheses that are accessible by the ensemble members (for instance by manipulating the training set); and varying the\u2026", "While it is very simple way to gain diversity, it is now generally accepted that it is not sufficient for achieving good diversity (Brown et al. 2005).", "upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005)."]} +{"18488847|14970359": ["A performance comparison of the classification techniques is provided in terms of their correct differentiation rates, confusion matrices, and computational cost, as well as their preprocessing, training, and storage requirements."]} +{"8096709|5401262": []} +{"22844028|21386749": ["Internet of Things (loT) has become one of the emerging topics for human life and technologies [1-4]."]} +{"5783729|20905429": ["In addition, the relative complexity of UWB transmitters and receivers must be overcome in a cost-effective way before UWB can compete with standards already established in the market, such as Bluetooth and ZigBee.", "6 Task Group is seeking to address these issues and indications are that the new standard will have the following characteristics [62]:", "The battery life for ZigBee is expected to be months, whereas battery life is limited to days for Bluetooth.", "Another wireless enabling technology is ZigBee, built on the IEEE 802.15.4 standard, used for low power and low data rate communication.", "There is, at present, no single \u2018ideal\u2019 standard available for physiological measurement systems based on wireless body sensor networks (WBSNs) [62].", "With its simple architecture and the low power requirements, ZigBee is more suited to medical applications, compared to Bluetooth.", "The target market for ZigBee is low data-rate, low energy applications.", "Data transmission security is protected by the use of the Advanced Encryption Standard (AES) in ZigBee [62]."]} +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} +{"76306|1634674": ["Learning the rule of the grammar from training data is a promising alternative, but it has proved to be extremely difficult in the general case [39]."]} +{"76306|1400872": ["have discussed well known learning algorithms, including a gradient descent optimisation method [116,117] and resilient backprogagation algorithms [118]."]} +{"110161147|3348390": []} +{"110161147|1113420": []} +{"3032303|11293874": ["Delahoz and Labrador [19] present a review of the state-of-the-art in fall detection and fall prevention systems along with qualitative comparisons among various studies."]} +{"3032303|8928686": ["Pannurat et al. [22] present another review for automatic fall detection by categorizing the existing platforms based on either wearable and ambient devices, and the classi\ufb01cation methods are divided into rule-based and machine learning techniques."]} +{"3032303|5664472": ["Research in activity recognition has led to the successful realization of intelligent pervasive environments that can provide context, assistance, monitoring and analysis of a subject\u2019s activities that are usually backed up by advanced machine learning and vision algorithms [1, 2, 3]."]} +{"106640163|1805048": ["It is based on the idea that if the advisors have similar preferences to the user, he/she is much more likely to take their opinions into account (Su and Khoshgoftaar 2009)."]} +{"2666574|1520906": ["To integrate the sensory data collected from heterogeneous sources is challenging [14,38].", "The most recent advances made in IoT began when RFID tags were put into use more frequently, lower cost sensors became more available, web technology developed, and communication protocols changed [14,15]."]} +{"2666574|44461432": ["[11] introduced a systematic method for reviewing data mining knowledge and techniques in most common applications."]} +{"2666574|3330313": []} +{"2666574|38476": ["In these cases, data points consist of sequences of \u00f0 x ; y \u00de pairs rather than being drawn in an i.i.d. manner from a joint distribution p \u00f0 x ; y \u00de ; and such the sequences exhibit signi \ufb01 cant sequential correlations [55,127].", "It is worth noting that there is another closely-related task, called sequence classi \ufb01 cation , in which the goal is to predict the desired single categorical output y given an input sequence x [127]."]} +{"2666574|17374870": []} +{"17759638|9318802": ["[31]), such the ones related to temporal or frequency-based domains (e.", "[31]), or CASA (as in the works by Peltonen et al."]} +{"17759638|17574321": ["[5]), speaker recognition and identification (Kinnunen and Li [6]), and speech recognition (Pieraccini [7]), to name a few."]} +{"10542290|17737221": ["It has been reported that 40% of the global power consumption takes place inside residential buildings [8]."]} +{"10542290|20178897": []} +{"30642788|51877788": ["[18] Arxiv 2018 282 ML applications in the internet of things \u2248 \u2248 \u221a \u221a"]} +{"30642788|3645740": ["[14] IEEE COMST 2017 269 ML in SONs \u2248 \u00d7 \u00d7 \u221a"]} +{"30642788|11381530": ["[17] ArXiv 2017 154 ML for Network Intrusion Detection \u2248 \u221a \u00d7 \u00d7"]} +{"30642788|8604408": ["with PGM and latent variable models forms a probabilistic frameworkwhere deep learning is used as a substrate formaking improved learning architecture for recommender systems, topic modeling, and control systems [105]."]} +{"30642788|9040432": ["With unsupervised ML, the pipe dream is that every algorithm for adjusting network parameters (be it, TCP congestion window or rerouting network traffic during peak time) will optimize itself in a self-organizing fashion according to the environment and application, user, and network Quality of Service (QoS) requirements and constraints [6]."]} +{"30642788|2142482": ["Unsupervised learning based applications of anomaly detection schemes for wireless personal area networks, wireless sensor networks, cyber-physical systems, and WLANs are surveyed in [212]."]} +{"30642788|2623404": ["SDN is applicable in a wide variety of areas ranging from enterprise networks, data centers, infrastructure based wireless access networks, optical networks to home and small businesses, each providing many future research opportunities [285].", "1) Software De\ufb01ned Networks: SDN is a disruptive new networking architecture that simpli\ufb01es network operating and managing tasks and provides infrastructural support for novel innovations by making the network programmable [285]."]} +{"30642788|9928823": ["a class of machine learning, where hierarchical architectures are used for unsupervised feature learning and these learned features are then used for classification and other related tasks [23]."]} +{"30642788|399542": ["References [232] and [233] suggested different measurable factors to determine the overall approximation of QoS such as error rates, bit rate, throughput, transmission delay, availability, jitters, etc."]} +{"30642788|2261490": ["\u2026CNN, being widely employed for computer vision applications, can be employed in computer networks for optimization of Quality of Experience (QoE) and Quality of Service (QoS) of multimedia content delivery over networks, which is an open research problem for next generation computer networks [48]."]} +{"30642788|7851743": ["most used unsupervised learning schemes utilized for parameter optimization and feature learning in SON [290].", "Application of ML techniques in SON has become a very important research area as it involves learning from the surroundings for intelligent decision-making and reliable communication [2].", "Application of different ML-based SON for heterogeneous networks is considered in [297], this paper also describes the unsupervised ANN, hidden Markov models and reinforcement learning techniques employed for better learning from the surroundings and adapting accordingly.", "Turkka et al. [281] used PCA for dimensionality reduction of drive test samples to detect cell outages autonomously in SON.", "Next generation network architectures such as Software de\ufb01ned Networks (SDN), Self Organizing Networks (SON), and Internet of Things (IoT) are expected to be the basis of future intelligent, adaptive, and dynamic networks [284].", "Dimensionality reduction techniques and tools have been utilized in all kinds of networks and we present some recent examples related to self-organizing networks (SONs) and software de\ufb01ned radios (SDRs).", "This subsection covers the recent applications of unsupervised ML techniques in SDNs, SONs, and IoTs.", "2) Self Organizing Networks: Self organizing networks (SON) is another new and popular research regime in networking, SON are inspired from the biological system which works in self organization and achieve the task by learning from the surrounding environment.", "As the connected network devices are growing exponentially, and the communication cell size has reduced to femtocells, the property of self-organization is becoming increasingly desirable [290].", "Moysen et al. [32] ANN Authors expressed ANN as a recommended system to learn the hierarchy of the output, which is later used in SON.", "PCA and clustering are the two mostly used unsupervised learning schemes utilized for parameter optimization and feature learning in SON where as reinforcement learning, fuzzy reinforcement learning, Q learning, double Q learning and deep reinforcement learning are the major schemes used for interacting with the environment [294].", "Feasibility of SON application in \ufb01fth generation (5G) of wireless communication is studied in [296] and the study shows that without (supervised as well as unsupervised) ML support, SON is not possible.", "Liao et al. [278] proposed a semi supervised learning scheme for anomaly detection in SON based on dimensionality reduction and fuzzy classi\ufb01cation technique.", "Zoha et al. [251] used multi-dimensional scaling (MDS), a dimensionality reduction scheme, as part of the preprocessing step for cell outage detection in SON.", "Game theory is another unsupervised learning approach used for designing self optimization and greedy self con\ufb01guration design of SON systems [298].", "Authors in [299] proposed an unsupervised ANN for link quality estimation of SON which outperformed simple moving average and exponentially weighted moving averages.", "Another data driven approach by Zoha et al. [280] also uses MDS for getting low dimensional embedding of target key point indicator vector as a preprocessing step to automatically detect cell outage in SON."]} +{"30642788|13172512": []} +{"30642788|191396": ["Clustering can be divided into three main types [68], namely hierarchical clustering, Bayesian clustering, and partitional clustering."]} +{"30642788|15707": ["Authors in [207] surveyed anomaly detection research from 2009 to 2014 and find out the unique algorithmic similarity for anomaly detection in Internet traffic: most of the algorithms studied have following sim-"]} +{"30642788|26690303": ["Network intrusion anomaly detection system (NIDS) based on K-means clustering are surveyed in [211]; this survey is unique as it provides distance and similarity measure of the intrusion detection and this perspective has not"]} +{"30642788|12815020": ["Another application of unsupervised intrusion detection system for clouds is surveyed in [210], where fuzzy logic based intrusion detection system using supervised and unsupervised"]} +{"28709696|2357830": ["The human body consists primarily of liquid which makes it difficult to scan a RFID tag attached to human body (Juels, 2006)."]} +{"28572232|28392119": ["This necessitates emergence of HGs that are able to connect these devices together, enable troubleshooting and provide improved manageability [21]."]} +{"5334243|4915696": ["scene analysis [20], and other techniques [21], where computers truly imitate human perception to create more harmonious human and machine interactions."]} +{"112648481|10542290": []} +{"112648481|20178897": ["The advent of smart grids has fostered the deployment of smart meters, low-cost sensors and smart load devices, and the integration of ICTs in residential energy management programs [19,26].", "Considering that primary energy used in buildings worldwide accounts for approximately 40% of global primary energy usage [18], the improvement of energy efficiency in buildings constitutes a critical issue concerning primary energy saving and a corresponding carbon footprint reduction [19]."]} +{"112648481|7278743": ["1 \u2013 Extremely high (1) Ease of access; (2) No configuration requirement;Secure connection [53,54]"]} +{"6006612|5556391": ["[22] for a recent book on that subject), and has also been studied to some extent in the online, stream-based setting (see [23] for a recent survey).", "However, among the few existing stream-based approaches, most do not pay attention to drift of the minority class, and as [23] pointed out, a more rigorous evaluation of these algorithms on real-world data needs yet to be done."]} +{"482252|33247252": ["The application and services provided by the IoT can be both residential and commercial ranging from e-health [24], e-marketing [25], intelligent car parking system [26], intelligent transportation system [27], [28], automation, and logistic services."]} +{"1791586|10817088": ["In recent years there has been a lot of work on ambient sensor networks for monitoring human activities in a home environment, see [1, 2] for surveys."]} +{"13292363|1113420": []} +{"17957409|16335158": []} +{"113113479|3750204": []} +{"113113479|8125630": []} +{"18117609|11894197": []} +{"890737|1932843": ["\u2026it will be useful to also de\ufb01ne the value function V \u03c0 ( x t , u t ) and advantage function A \u03c0 ( x t , u t ) of a given policy \u03c0 : (Deisenroth et al., 2013; Kober & Peters, 2012), two are particularly relevant for this work: iterative LQG (iLQG) (Li & Todorov, 2004) and Dyna-Q (Sutton, 1990).", "Model-free reinforcement learning (RL) has been successfully applied to a range of challenging problems (Kober & Peters, 2012; Deisenroth et al., 2013), and has recently been extended to handle large neural network policies and value functions (Mnih et al., 2015; Lillicrap et al., 2016; Wang et\u2026"]} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} diff --git a/edge/graph_159068090.jsonl b/edge/graph_159068090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15915200.jsonl b/edge/graph_15915200.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15916359.jsonl b/edge/graph_15916359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15925872.jsonl b/edge/graph_15925872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15929566.jsonl b/edge/graph_15929566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4dab9da14eabfc03a7587000869e2282cd49fdd9 --- /dev/null +++ b/edge/graph_15929566.jsonl @@ -0,0 +1,12 @@ +{"125723693|17464562": []} +{"206400834|17464562": []} +{"53939299|1708582": ["(See Kaelbling, Littman, and Moore (1996) for a survey.)"]} +{"386824|1708582": ["Additional information about RL can be found in several references (e.g., [2] [5] [32] [72])."]} +{"11691568|1708582": []} +{"1708582|17464562": []} +{"30597685|17464562": []} +{"15115997|1708582": ["For an overview of work in reinforcement learning using the discounted criterion, see the excellent survey paper by Kaelbling 15].", "For an overview of work in reinforcement learning using the discounted criterion, see the excellent survey paper by Kaelbling [15]."]} +{"16360743|28670512": []} +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} +{"6530684|17464562": []} +{"16487039|6308019": ["In fact, according to a recent review paper on revenue management written by McGill and van Ryzin (1999): \" Recently developed approximation methods for dynamic programming and stochastic programming (RL) may be useful in revenue management.", "In fact, according to a recent review paper on revenue management written by McGill and van Ryzin (1999) : \u201cRecently developed approximation methods for dynamic programming and stochastic programming (RL) may be useful in revenue management.\u201d Hence RL obviously seems to have the potential for offering solutions here."]} diff --git a/edge/graph_15930299.jsonl b/edge/graph_15930299.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15931066.jsonl b/edge/graph_15931066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15932929.jsonl b/edge/graph_15932929.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15947359.jsonl b/edge/graph_15947359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bbbe3dc6339c8b584b68966193ada886dd048da --- /dev/null +++ b/edge/graph_15947359.jsonl @@ -0,0 +1,15 @@ +{"13891324|14970359": []} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} +{"39780440|1236072": [", sensor\u2019s failure and battery depletion) [2, 3]."]} +{"14810513|16525678": []} +{"9957336|1230643": []} +{"8010161|10658846": ["Dynamic PM policies have been previously studied in [6]."]} +{"1856779|205286988": ["With the recent advances in wireless sensor networks (WSNs), it is foreseeable that video sensors will be supported in such networks, for applications such as battlefield intelligence, security monitoring, emergency response, and environmental tracking [1, 2 ]."]} +{"1856779|1236072": ["With the recent advances in wireless sensor networks (WSNs), it is foreseeable that video sensors will be supported in such networks, for applications such as battle\ufb01eld intelligence, security monitoring, emergency response, and environmental tracking [1,2]."]} +{"13622583|16525678": ["Valera and Velastin [12] undertake a comprehensive survey of the whole field of automated video surveillance."]} +{"3165019|10658846": ["\u2026to analyze and model power consumption over long periods of time, and therefore predict the lifetime of a node and change the control policy accordingly, it is useful to consider a number of elementary tasks whose scheduling and execution are controlled by a resource manager [Benini et al. 2000].", "Previous work has provided energy consumption values for other types of simpler sensor network platforms, such as Berkeley\u2019s motes [Woo 2000, Shnayder et al. 2004], or for small granularity tasks involving switching the state of a microprocessor [Benini et al. 2000]."]} +{"14514967|16525678": ["They are called human gestures and they constitute a large field in computer vision research[11], [18], [6], [2], [19]."]} +{"14514967|17516538": ["They are called human gestures and they constitute a large field in computer vision research[11], [18], [6], [2], [19]."]} +{"10201381|1230643": ["Pervasive networks of such sensors and actuators open new vistas for many potential applications, such as battlefield surveillance, environment monitoring and biological detection [11], [15], [ 2 ], [20]."]} diff --git a/edge/graph_15959145.jsonl b/edge/graph_15959145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bde2e0b34e7a5375571102322eec29e49ed1b87c --- /dev/null +++ b/edge/graph_15959145.jsonl @@ -0,0 +1 @@ +{"8158076|170825": []} diff --git a/edge/graph_1596424.jsonl b/edge/graph_1596424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15964461.jsonl b/edge/graph_15964461.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1596610.jsonl b/edge/graph_1596610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_15966894.jsonl b/edge/graph_15966894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1596835.jsonl b/edge/graph_1596835.jsonl similarity index 100% rename from graph_1596835.jsonl rename to edge/graph_1596835.jsonl diff --git a/edge/graph_15971774.jsonl b/edge/graph_15971774.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c5c8a48545d97a129da2b7e56569f25c989a284b --- /dev/null +++ b/edge/graph_15971774.jsonl @@ -0,0 +1,40 @@ +{"5784821|14441987": []} +{"23440810|205286988": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} +{"23440810|1236072": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} +{"8558455|14441987": ["In this work we describeAntHocNet , a multipath routing algorithm for mobile ad hoc networks (MANETs) [31]."]} +{"6676879|7439310": ["Even though some packet loss is tolerable, the quality of reconstructed video or audio will be impaired and errors will propagate to consecutive frames because of the dependency introduced among frames belonging to one group of pictures at the encoder [32]."]} +{"206583097|10287248": []} +{"6970737|14441987": ["Mobile Ad Hoc Networks (MANETs) [38] are networks in which all nodes are mobile and communicate with each other via wireless connections."]} +{"6970737|1762301": ["In recent years a large number of MANET routing algorithm have been proposed (see [1] for an overview)."]} +{"16096426|14441987": ["Existing ad hoc routing protocols can be generally categorized into three classes: table-driven (or proactive, such as DSDV and WRP), on-demand(or reactive, such as DSR and AODV), and hybrid (the combination of the two, such as ZRP) [ 38 ]."]} +{"2959810|14441987": ["The proposals in [1] focus on discovering the shortest available route, according to some metrics, and all the traffic is routed over that path."]} +{"8520359|5895133": ["Rate-based congestion control has been proposed in [34], [43] and has been shown to achieve promising results.", "These include reactive response to congestion, burstiness, RTT-unfairness, slow \ufb02ow completion time, \ufb02ow-synchronisation and inherent ability to clog the network with data and cause congestion [15], [43]."]} +{"3009927|2295142": ["Due to the broadcast nature of shared wireless channel and unreliability of low-power radio communications, the main purpose of developing most of the existing multipath routing protocols was to support fault tolerance and reliable data delivery [1, 24, 31].", "org (Marjan Radi) sidered this issue in their route construction mechanism or constructing several paths with low interference imposes a high overhead to the network [24, 31].", "a node or link failure occurs along the active path for fault tolerance purpose [24].", "Since both of these factors require the general network connectivity graph for identifying a set of minimum interfering paths between every node pair, calculation of these metrics in large-scale wireless sensor networks causes a high computational overhead [24, 31]."]} +{"3009927|3755658": ["In this regard, designing efficient routing protocols to establish high-quality multi-hop paths from each event area towards the sink is one of the most important issues in developing wireless sensor networks [14, 17, 29, 37]."]} +{"6260388|16570307": ["the `Gateway Congestion Control Survey' [ RFC1254 ], recommendations on AQM [RFC2309], `Congestion Control Principles' [RFC2914], `General Architectural and Policy Considerations' [RFC3426] and IAB Concerns Regarding Congestion Control for Voice Traffic [RFC3714]);"]} +{"6272066|1230643": ["A wireless sensor network is similar to mobile ad hoc networks, but it differs from them in the sense that the nodes have much reduced functionalities, such as limited transmission range and battery power [1]."]} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"37394652|1236072": ["Depending on the network structure adopted, the routing protocols for WSNs can be classified into flat network routing, hierarchical network routing, and location-based routing [2].", "This may result in early network partition [2]."]} +{"37394652|1230643": ["An N-to-1 multipath discovery protocol is proposed in Reference [17].", "Other applications of WSNs can be found in Reference [1].", "In Reference [19], the multipath routing is formulated as a linear programming problem with an objective to maximize the time until the first sensor node runs out of energy.", "We further assume that each sensor node carries an omni antenna and the energy consumptions for idle time, transmission and reception are 35, 660 and 395 mW; respectively (the same parameters as in Reference [5]).", "Various link cost functions have been proposed in the literature (e.g. Reference [26]).", "In this paper, we use the data aggregation algorithm proposed in Reference [25].", "Various data aggregation algorithms have proposed in the literature (e.g. References [22\u201325]).", "Finally, the multipath-based routing protocols, such as the schemes proposed in References [9\u201311], tend to enhance the reliability through the use of multiple paths.", "Directed transmission proposed in Reference [18] is one of the probabilistic routing techniques, which are derived from the flooding.", "In Reference [11], a multipath routing approach is proposed for the directed diffusion [5] to improve the resilience to node failures.", "In Reference [20], the multipath routing is formulated as a constrained optimization problem by using deterministic network calculus.", "The energy-aware routing is proposed in Reference [9]."]} +{"25070990|10559330": []} +{"11735843|2623404": ["3 Software-defined networking (SDN) The major insight of \u2018software-defined networking\u2019 (SDNs) is to allow horizontally integrated systems by allowing the separation of the control plane and the data plane [11,107] while providing increasingly sophisticated set of abstractions.", "In particular, it is the culmination of many varied ideas and proposals in the general field of programmable networks [11,18] with many of the initial ideas of programmable networking (of \u2018open interfaces\u2019 and \u2018separation of control and data plane\u2019) espoused by the OpenSig and Active Networking community now maturing in the form of the SDN) architecture.", "Our paper is different from other survey papers [11,18,19] in its focus on wireless programmable networks while the previous papers had focused mainly on generic (wired) programmable networks.", "Applications of programmability include rapid provisioning of services [10], flexible resource management [11], efficient resource sharing [12], and support for new architectures such as cloud computing, Internet of things (IoT) [13], etc."]} +{"11735843|10693567": []} +{"11735843|3189715": ["The lack of programmability of networks has long been recognized, and various approaches have been proposed to address this deficiency [14] [15].", "in 1999 [14], t he impending impact of numerous programming trends is anticipated using surprisingly modern terminology.", "The main reason OpenSig approach could not quite become mainstream was the static nature of the interfaces it defined [14]."]} +{"15479712|14132386": []} +{"15479712|1236072": []} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"43669357|205286988": []} +{"15251371|1236072": ["Some solutions addressing the network lifetime problem are based on energy-aware routing mechanisms , which construct paths using some energy metrics [1]."]} +{"16995478|10287248": ["[18], [19] and references therein), where arriving connections are routed dynamically and each link performs admission control."]} +{"16995478|991041": ["[18], [19] and references therein), where arriving connections are routed dynamically and each link performs admission control."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"17237878|7439310": []} +{"38059874|8424228": []} +{"7187901|1230643": ["A wireless sensor network is similar to mobile ad hoc networks , but it differs from them in that the sensors have much reduced capabilities, such as limited transmission range, limited or no mobility, and limited battery power [1]."]} +{"16999600|17205659": ["[11] overview routing protocols according to the network\u2019s structure and also discuss, to some extend, the broadcast authentication problem and provide a short reference to a few secure routing schemes [23,25,26].", "The main approach in the literature towards the routing threat model is focused in specifying the adversary\u2019s capabilities according to the resources he has in his possession and whether he is an insider or outsider threat [11,16,31]."]} +{"16999600|205286988": []} +{"16999600|1236072": ["In [9,10], the authors have performed a review of the design issues that affect the routing process in WSN and an extensive survey of WSN routing protocols; their classification is based on the network\u2019s structure and the protocols\u2019 operation."]} +{"16999600|1230643": ["[17,19] have provided a broad survey of WSN-related issues, focusing on an analysis of the protocols developed for each layer of the WSN\u2019s protocol stack."]} +{"14811849|10287248": ["There are two categories of multipath routing [ 4 ]."]} +{"12155956|11266367": ["Nevertheless, as far as we are concerned, this is the most recent survey about energy-efficient techniques on mobile operating systems since the one published in 1995 by Welch [1]."]} +{"2073113|7439310": ["A common technique used for this purpose is motion-compensated temporal interpolation [32]."]} diff --git a/graph_1597963.jsonl b/edge/graph_1597963.jsonl similarity index 100% rename from graph_1597963.jsonl rename to edge/graph_1597963.jsonl diff --git a/edge/graph_15981390.jsonl b/edge/graph_15981390.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1598350.jsonl b/edge/graph_1598350.jsonl similarity index 100% rename from graph_1598350.jsonl rename to edge/graph_1598350.jsonl diff --git a/edge/graph_15985318.jsonl b/edge/graph_15985318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69117aa476233bc8de3ea680d96a09814456b13b --- /dev/null +++ b/edge/graph_15985318.jsonl @@ -0,0 +1,2 @@ +{"1530593|10500613": []} +{"1530593|913718": []} diff --git a/edge/graph_15985428.jsonl b/edge/graph_15985428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..830339a490d482192469a1d8dead404563734ee2 --- /dev/null +++ b/edge/graph_15985428.jsonl @@ -0,0 +1 @@ +{"6600915|14441987": ["A vast array of routing algorithms have been proposed and reviewed in several articles [14][15].", "A comprehensive survey of these routing protocols can be found in [14] and [15]."]} diff --git a/edge/graph_15986619.jsonl b/edge/graph_15986619.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a78604f573968023c654b19f0812b4c85969fa8f --- /dev/null +++ b/edge/graph_15986619.jsonl @@ -0,0 +1,2 @@ +{"1298163|8424228": []} +{"14247903|15640936": ["protocols implicitly assume that hosts do not change their physical location over time [ BPT96 ]."]} diff --git a/edge/graph_15986963.jsonl b/edge/graph_15986963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70a124beb36bc6b96877f2ae997a86f762bd969c --- /dev/null +++ b/edge/graph_15986963.jsonl @@ -0,0 +1 @@ +{"17030953|18782652": []} diff --git a/edge/graph_15990130.jsonl b/edge/graph_15990130.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9dbe98cf12e304eda48fdf2becef31f4c645f322 --- /dev/null +++ b/edge/graph_15990130.jsonl @@ -0,0 +1,3 @@ +{"206583580|7971188": ["Example applications include overlay networks [1], [2], Peer-to-Peer networks [3], [4], and network visualization [5]."]} +{"144138|15990130": ["(6) can be replaced with \u03b4\u2032a(k) \u2261 \u03b4a(k)\u2212\u03b4f (k) and\u03b4\u2032b(k) \u2261 \u03b4b(k)\u2212\u03b4f (k), respectively."]} +{"11300288|1230643": ["Due to the stochastic nature of the channels, communication links between sensors are also subject to fading and interference [1], [2]."]} diff --git a/edge/graph_15993259.jsonl b/edge/graph_15993259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1599458.jsonl b/edge/graph_1599458.jsonl similarity index 100% rename from graph_1599458.jsonl rename to edge/graph_1599458.jsonl diff --git a/edge/graph_160003591.jsonl b/edge/graph_160003591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_160009503.jsonl b/edge/graph_160009503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8555aa191a0a4d85144bc6d9f12fa4065961b191 --- /dev/null +++ b/edge/graph_160009503.jsonl @@ -0,0 +1,3 @@ +{"14944096|8953108": ["Other commonly used tradeoffs include likelihood versus prior in Bayesian methods [1], loss versus penalty in pattern recognition [47] and image thresholding algorithms [39]."]} +{"92997094|93000954": ["The VerifyThis program verification is held in 2019 for the 8 time; earlier editions were held at FoVeOOS 2011 [6], FM 2012 [15,20], Dagstuhl (April 2014) [4], and ETAPS 2015\u20132018 [21,18,16,17], the next event takes place as part of TOOLympics at ETAPS 2019 [2].", "What we would like to emphasise up-front is that VerifyThis is different from most other competitions of formal method tools at TOOLympics(6) at ETAPS 2019, see the TOOLympics proceedings [2] (this volume) for more details on each of them."]} +{"92997094|12269716": ["CBMC [27] 1 CIVL [32] 3 F:1 Dafny [28] 12 ESC/Java [8] 1 F* [34] 1 Frama-C [24] 2 Isabelle [30] 1 O:1 jStar [10] 1 KeY [1] 7 KIV [11] 5 S:3 mCRL2 [9] 2 F:1 MoCHi [26] 1 PAT [33] 1 Spark/Ada/GNATprove [14] 1 F:1 VCC [7] 1 VerCors [5] 5 VeriFast [22] 4 O:2 Viper [29] 2 F:1 Why3 [12] 9 O:2, S:4, F:1", "We have also had several tools used in the competition that fall outside of this classification, such as the bounded model checkers CIVL [32] and CMBC [27], the model checker mCRL2 [9], the interactive theorem prover Isabelle [30], and the termination prover AProVE [13]."]} diff --git a/edge/graph_160020985.jsonl b/edge/graph_160020985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f4a5f6ccda9ff78d6589b5e71ffcde55fc942f3 --- /dev/null +++ b/edge/graph_160020985.jsonl @@ -0,0 +1,7 @@ +{"121304133|19032874": []} +{"122185725|18144244": ["From the viewpoint of a receiver, on the other hand, a particular design for integrity veri\ufb01cation needs to be established to prevent the item from being tampered without proper authorization [17, 24, 25, 32]."]} +{"6085243|18144244": ["Generally, the digital watermarking for integrity veri\ufb01cation is called fragile watermarking as compared to robust watermarking for copyright protection [1]."]} +{"1965509|18144244": ["\u2026Studies\n5-2010 A Singular-Value-Based Semi-Fragile Watermarking Scheme for Image Content Authentication with Tampering Localization Xing Xin Utah State University\nFollow this and additional works at: https://digitalcommons.usu.edu/etd\nPart of the Computer Sciences Commons\nThis Thesis is\u2026", "Utah State University DigitalCommons@USU\nAll Graduate Theses and Dissertations Graduate Studies\n5-2010 A Singular-Value-Based Semi-Fragile Watermarking Scheme for Image Content Authentication with Tampering Localization Xing Xin Utah State University\nFollow this and additional works at: https://digitalcommons.usu.edu/etd\nPart of the Computer Sciences Commons\nThis Thesis is brought to you for free and open access by the Graduate Studies at DigitalCommons@USU."]} +{"6854878|13752797": ["[31] describe four main properties of any watermarking system; namely, invisibility, capacity, robustness and security.", "Invisibility is the property whereby the watermark should be imperceptible by a human; capacity refers to the amount of data that can be embedded; robustness is the ability of the watermarking scheme to withstand alterations or distortions to the signal; and security is the watermarking scheme\u2019s resistance against any intentional attempt by an adversary to impair the watermark [10, 31].", "The embedding of additional information in the original signal, also known as host data, must be done in a way that does not interfere with the normal usage of data [31]."]} +{"33238478|9176080": ["1 Overview of a data security system [12] Digital Watermarking System Applications Watermarking algorithms are application dependent."]} +{"33238478|55130357": []} diff --git a/edge/graph_16010181.jsonl b/edge/graph_16010181.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..466afdb0ad2c1dd78a0f5b76938e2892768a8b09 --- /dev/null +++ b/edge/graph_16010181.jsonl @@ -0,0 +1,11 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"5445052|192934": ["\u2026Xidian University, Xi\u2019an 710071, People\u2019s Republic of China e-mail: nannanwang.xidian@gamil.com\nX. Gao e-mail: xbgao@mail.xidian.edu.cn\nJ. Li e-mail: leejie@mail.xidian.edu.cn\nD. Tao Centre for Quantum Computation & Intelligent Systems, Faculty of Engineering & Information Technology,\u2026", "Face images, compared to other kinds of biometrics such as fingerprint, iris, and retina, can be acquired in a more convenient, natural, and direct way because they are collected in a non-intrusive manner (Jain et al. 2000)."]} +{"215721|14303607": ["Accurate object shape computation is key to many visual tasks; for instance, classification of facial expression [17, 30], facial identity [38], action analysis [4], and fine-grained categorization [34, 3, 18, 40] require accurate registration of a (deformable, part-based) model to the image."]} +{"215721|9045232": ["The shape of human bodies and human faces has attracted particular attention [43, 46, 33, 2]."]} +{"2625464|192934": ["Such mixtures are e xible enough to represent a large number of those distributions typically encountered in real applications [21, 13 ]."]} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"2589832|9045232": ["In general, this is due to the limited information carried by the learned statistical model."]} +{"62600805|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"6955490|9045232": ["Face detection has received considerably attention during the past several years [16]."]} +{"641127|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"10162727|206051485": ["In this paper, we focus on this seemingly arbitrary choice of the roles and reveal how it may lead to biased warp estimates in the presence of relative scaling."]} diff --git a/edge/graph_16013270.jsonl b/edge/graph_16013270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a277b2f4c26cff19615906479717463cb8863b5 --- /dev/null +++ b/edge/graph_16013270.jsonl @@ -0,0 +1,56 @@ +{"18011170|17516538": ["Human action recognition is currently a very active topic (see [7, 17] for recent surveys)."]} +{"7751620|7788290": ["Visual analysis of human movement [4] aims to detect, track and recognize people, and more generally, to understand human activities from video sequences.", "Two major strategies have been studied for motion modeling and recognition, namely template-matching methods and state-space methods [4].", "Given an action video consisting of T image frames V = {I(x, y, t)}t=1, we assume that the associated sequence of silhouettes {S(x, y, t)}t=1 can be obtained either by motion detection techniques such as background subtraction and temporal differencing or by a contour tracker [4]."]} +{"1291116|17516538": ["The analysis of crowd movements and behaviour is of particular interest in surveillance domain [ 8 ]."]} +{"14449726|1634674": ["The literature on complex activity modeling and recognition can be classified into three categories: graphical, syntactic, and logical approaches [12, 24].", "Activity recognition has been widely studied, but most of the literature has concentrated on relatively simple activities as evidenced in the KTH or Wiezmann datasets [24]."]} +{"10560937|7788290": ["[ 10 ], [4]). Advanced visual surveillance systems not only need to track moving objects but also interpret their patterns of behavior [5]."]} +{"16964414|17516538": ["The analysis of crowd movements and behaviour is of particular interest in surveillance domain [8]."]} +{"14970359|7185733": []} +{"14970359|7788290": ["A survey by Gavrila [44] describes work prior to 1998 and gives a good general introduction to the topic with a special focus on applications.", "This provides a good overview of 2D and 3D approaches, as seen in the surveys by Aggarwal and Cai [1] and Gavrila [44], respectively."]} +{"12410940|17516538": ["However, in recent years computer vision systems are trying to model and interpret different sorts of human activities [ 7 ] including the behaviour of crowds [8]."]} +{"40100916|206764452": []} +{"40100916|1634674": []} +{"40100916|1029120": ["tems [38]\u2013[40], transit applications [31], while others are more general."]} +{"40100916|5401262": [", tracking [35], human\u2013computer interactions [36], rehabilitation [37], pedestrian protection sys-"]} +{"40100916|16525678": []} +{"40100916|3330313": ["For example, [47] and [48] present statistical approaches to novelty detection, while [49] and [50] did a comparative"]} +{"40100916|17516538": []} +{"40100916|14970359": []} +{"40100916|7185733": []} +{"40100916|7788290": []} +{"2665519|7788290": ["[9, 12], in Refs [13, 14], as well as in a more recent one by Moeslund et al."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"16781590|5755403": ["A deeper review of the state of the art in trajectory classification and clustering can be found in [15]."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"15338198|17516538": ["Given a stabilized video with tracks of human actors, the purpose of our preprocessing stage is to acquire figure-centric action sequences from the tracks."]} +{"15338198|7788290": ["The survey papers by Aggarwal and Cai [1], Gavrila [ 11 ], and Hu et al. [14] provide an extensive review of algorithms and systems for human tracking, motion analysis, action representation, and behavior recognition."]} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"14775089|12127129": ["Generally the reference frame often call ed the \u201cbackground image\u201d or \u201cbackground model\u201d must be a representation of the scene without moving objects and must be kept regularly updated so as to adapt to the varying luminance conditions and geometry settings [30]."]} +{"14775089|17516538": ["dent on the performance of the human detection [25], [26], [29].", "Motion segmentation is used to detect regions corresponding to moving objects that can be potential targets in natural scenes in order to provide a focus of attention for later processes such as tracking and activity analyses [26]."]} +{"14775089|14970359": []} +{"1469677|1634674": ["Except in very special cases, data does not lie on a linear subspace, thus requiring methods that can learn the intrinsic geometry of the manifold from a large number of samples [3].", "Human action recognition and pose recovery have been studied extensively in recent years, see [2] and [3] for a survey."]} +{"1469677|17516538": ["Human action recognition and pose recovery have been studied extensively in recent years, see [2] and [3] for a survey."]} +{"109860|1634674": ["\u2026where Tl are a local neighboring pixels, h is a global smoothing parameter, P is the total number of samples in a local analysis window around a sample position at x i , and the matrix C l \u2208 R (2 \u00d7 2) is a covariance matrix estimated from a collection of \ufb01rst derivatives along spatial axes."]} +{"9333559|1634674": ["Dynamic time warping (DTW) algorithms and hidden Markov models (HMMs) have been popularly used to recognize actions by analyzing sequential changes in features extracted per frame (e.g. joint angles) [15]."]} +{"2857532|53680608": []} +{"16738269|1634674": ["recognition is given in [8]."]} +{"14603305|14970359": []} +{"27637541|1634674": ["[118] distinguish between actions and activities by defining that", "Inside 2D-template-based approaches described in [118], temporal templates are estimated for each action class.", "methods shown in [118]); or based on the extraction of features from each silhouette and model the dynamics of the action explicitly (again, similarly to the aforementioned \u2018holistic\u2019 approaches).", "\u2019s [118] action modelling classification.", "[118], approaches for modelling actions can be categorised into three major classes: nonparametric, volumetric, and parametric time-series approaches (see Fig.", "In volumetric approaches, in contrast, features are not extracted on a frame-by-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case [118]."]} +{"27637541|12127129": []} +{"27637541|17516538": ["[41]; this paper is highly comprehensive, as it starts with motion detection and object classification and tracking, but also deals with HBU; it divides the approaches to this task", "There are handfuls of previous surveys which analyse and describe \u201chuman motion\u201d or \u201chuman behaviour understanding\u201d [41, 88, 43, 87, 121]; earlier works, as is logic, review lower level techniques (e.", "At the motion level, tasks such as movement detection, and background extraction and segmentation are faced [41, 72, 89]."]} +{"27637541|14970359": ["Moeslund et al. [72] defined an action taxonomy which has been adopted in later works and subsequent surveys.", "The work by Moeslund et al. [72], from 2006, can be divided into two major parts: pose and motion capture, and action recognition.", "In the work by Moeslund [71], bigger emphasis is given to the recognition of motion and actions, whereas activities and behaviours are treated to a minor extent.", "Pose estimation techniques are introduced next, and they are classified into three groups as in [71], according to the presence and use of an explicit model: model-free, indirect model use, direct model use.", "An evolution of the works presented under this section of Moeslund\u2019s work, can be seen in the papers by Bandouch, Beetz, et al. [7, 9]; which are commented later on.", "Nevertheless, the techniques revealed in [71] allow a greater understanding of current methods, and thus, both this and [34] can be used to introduce the"]} +{"27637541|7788290": []} +{"9772401|7788290": ["the monograph by [24] and the survey paper by [7] for overviews of early works."]} +{"11119725|17516538": ["There is nowadays a stronger demand for automated video surveillance systems which can infer or understand more complex behaviour and scene semantics [4]."]} +{"45708844|4361938": ["The same is true for eye gaze tracking [15]."]} +{"45708844|9045232": [", identification of all regions in the scene that contain a human face [89], [44]."]} +{"40431653|1634674": []} +{"40431653|7788290": []} +{"2596985|17516538": ["The analysis of crowd movements and behaviour is of particular interest in the surveillance domain [ 7 ]."]} +{"14779543|1634674": ["Here we overview a few related work but refer the reader to [1,2] for a more complete survey."]} diff --git a/edge/graph_16015853.jsonl b/edge/graph_16015853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16016699.jsonl b/edge/graph_16016699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1601820.jsonl b/edge/graph_1601820.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16021516.jsonl b/edge/graph_16021516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8984671dd5c5532af6f5e9c0f97c6320a2bb802f --- /dev/null +++ b/edge/graph_16021516.jsonl @@ -0,0 +1,4 @@ +{"30202517|33286487": ["Several techniques of examining the time-varying nature of the spectrum have been proposed in the past; among them are the Gabor transform [7], the related short time Fourier transforms, the continuous wavelet transform [8] and the bilinear class of time-frequency distributions known as Cohen\u2019s class [4], of which the Wigner distribution [9] is a member.", "This is an advantage over the bilinear class of TFRs (see \u201cpropagation of noise\u201d in [4] ), where one \u00a3nds TFR{data} = TFR{signal} + TFR{noise} +2 \u2217 TFR{signal} \u2217 TFR{noise}."]} +{"6366561|33286487": ["The underlying principle of the Huang\u2019s EMD method is the concept of instantaneous frequency defined as the derivative of the phase of an analytic signal [24]."]} +{"118420008|9020157": []} +{"118420008|33286487": []} diff --git a/edge/graph_16023210.jsonl b/edge/graph_16023210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8420e10604deaa622b105969f6bd2f2ef658055e --- /dev/null +++ b/edge/graph_16023210.jsonl @@ -0,0 +1,26 @@ +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"17086021|1236072": ["Currently, two types of routing protocols can support this kind of network [2]: 1) flat routing protocols include PBR [3] and ACQUIRE [4] etc."]} +{"17086021|1230643": ["A wireless sensor network is made up of a large number of inexpensive devices that are networked via low power wireless communications [1]."]} +{"1282309|1230643": ["INTRODUCTION, \nCONTRIBUTION AND RELATED WORK Wireless Sensor Networks are visioned as very large col\u00adlections of smart \nsensor nodes that form ad hoc distributed sensing and data propagation networks that collect quite detailed \ninformation about the ambient environment."]} +{"19799172|1236072": ["Many routing protocols have been specifically designed for the wireless sensor networks where several factors such as energy efficiency, low latency, and success rate are necessary to take into account [2], [4], [5]."]} +{"19799172|1230643": ["Recently, advances in minimization, low-power, low-cost, efficient and multi-functional wireless communication equipment, and improved small-scale energy supplies make a new hi-tech dream achievable: wireless sensor networks [1], [2]."]} +{"19799172|14441987": ["Since the 1970s, wireless networks have been showing huge interest to the computing industry and the research community [3]."]} +{"19799172|1708582": ["However, the Bant uses a reinforcement learning algorithm [18], [19] in order to get a better and more efficient route than the one chosen by the Fant and at the end it updates the routing tables of the reverse-visited sensor nodes."]} +{"23440810|205286988": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} +{"23440810|1236072": ["Refer to [7,8,9] for surveys on routing protocol for WSNs.", "Finally, in many applications, such as remote field status monitoring, sensors may be located close to ground, which causes ground wave absorption [7][8].", "Routing in sensor networks is a very challenging task and different from routing in either wired or other wireless networks (refer to [7], [8], and [9] for a surveys on routing in WSNs), because of the many special characteristics of WSNs."]} +{"14414363|205286988": ["protocols considering the unique characteristics of WSNs are covered in survey articles presented in [3, 22].", "Routing protocols proposed for WSNs [3, 22] can be classified into three groups depending on the methods used for finding the path, proactive routing in which all paths are computed and maintained in advance and stored in a 2009 Third International Conference on Sensor Technologies and Applications"]} +{"14414363|1236072": ["protocols considering the unique characteristics of WSNs are covered in survey articles presented in [3, 22].", "Routing protocols proposed for WSNs [3, 22] can be classified into three groups depending on the methods used for finding the path, proactive routing in which all paths are computed and maintained in advance and stored in a 2009 Third International Conference on Sensor Technologies and Applications"]} +{"14414363|1230643": ["Wireless Sensor Networks (WSNs) [1] have recently attracted significant research attention due to its wide range of applications that may not need human supervision."]} +{"14056371|1236072": ["proposed SPIN family protocols that disseminate all the information in the network assuming that all nodes are potential base nodes [5]."]} +{"15771961|1230643": ["A large number of sensors can be distributed in mass by scattering them from airplanes, rockets, or missiles [1].", "A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [1,8]."]} +{"1208019|1236072": ["In [3], they proposed 2 protocols for SPIN \u2013 SPIN-1 and SPIN-2 as well as their comparison."]} +{"7187901|1230643": ["A wireless sensor network is similar to mobile ad hoc networks , but it differs from them in that the sensors have much reduced capabilities, such as limited transmission range, limited or no mobility, and limited battery power [1]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"16324015|1230643": []} +{"9133308|1230643": ["Networking unattended wireless sensors is expected to have significant impact on the efficiency of many civil and military applications, such as disaster management, environment monitoring, combat field surveillance and security [1][2][3][4][5][6]."]} +{"11444935|14441987": ["Since research on ad hoc routing began with packet radio networks, numerous protocols have been proposed [7]."]} +{"14260079|1230643": ["[1][4].", "A WSN can be employed to collect the data about physical phenomena of interest [1][2][3]."]} +{"14739051|1236072": ["Based on the structure of the network, routing in WSN can\nbe categorized into three types [21]: flat-based routing, Cluster based (hierarchical-based) routing, and location-based routing.", "Hence, a sensor node would not only sense and send its own data but also act as router and propagate the data of its neighbors."]} +{"2662934|1236072": ["A comprehensive survey of routing protocols in WSN has been presented in [4]."]} +{"2662934|1230643": ["In this context, the vision of ubiquitous Wireless Multimedia Sensor Networks (WMSNs) [1][2][3] has become a reality."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} diff --git a/edge/graph_16024051.jsonl b/edge/graph_16024051.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16030979.jsonl b/edge/graph_16030979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13991cbf429f9d94a6225512386eadf5e4dfe85e --- /dev/null +++ b/edge/graph_16030979.jsonl @@ -0,0 +1,6 @@ +{"56937606|11792588": ["In 1965, Zadeh [2] introduced a modified settheory namely known as fuzzy sets.", "There is, howev er, still a long way to go in order to reach the ultimate goa l of machine simulation of fluent human reading, especia lly for unconstrained on-line and off-line handwriting [2].", "In 1965, Zadeh [2] introduced a modified set theory namely known as fuzzy sets.", "The feature extraction phase in a handwriting recog nition system is agreed by many [2][16][17] to hold a very important role.", "The re are hundreds of topological and geometrical representat ions than can be grouped to a few categories [2].", "According to Arica and Yarman-Vural in their review of character recognition (CR), the CR systems have evo lv d in three stages [2]."]} +{"56937606|15782139": ["However, they are now good enough that the y have a significant economic impact in specialized domain s such as interpreting handwritten postal addresses on envelo pes and reading courtesy amounts on bank cheques [1].", "On-line systems for handwriting recognition are available in hand-held computers su ch as PDAs with acceptable performance [1]."]} +{"377868|3102110": ["For the purpose of classification problems, the classifying system has usually been implemented with rules using if-then clauses, which state the conditions of certain attributes and resulting rules [2], [3]."]} +{"15782139|2762290": []} +{"15782139|6746689": []} +{"16661238|15782139": []} diff --git a/edge/graph_16037215.jsonl b/edge/graph_16037215.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73d535b5726e719f3f41c6225f12eb027e684f52 --- /dev/null +++ b/edge/graph_16037215.jsonl @@ -0,0 +1,8 @@ +{"515712|60455": ["Experimentation results are provided in Section 3 and some conclusions are provided towards the end.", "Based on several reserch studies we can broadly classify Web mining into three domains: content , structure and usage mining [8][9]."]} +{"13473479|1932843": []} +{"13473479|192934": ["The related methods are described in survey articles 29 or textbooks 4, 5 and are not summarized in this paper."]} +{"15400375|8125630": ["Online analytical processing (OLAP) technology is generally used for multidimensional analysis of a vast amount of data from many perspectives [7]."]} +{"2804275|60455": ["As mentioned earlier, Table I describes various kinds of document representation (used for IR) and the tasks performed (for generalization) [2] in WCM.", "Table I [2] shows the different techniques used by various authors for document representation in IR of web content mining (to be explained in detail in Section III) for semistructured documents."]} +{"2804275|954543": ["A recent review [51] is a testimony in this regard."]} +{"14450020|1142636": []} +{"7120895|3102110": ["An overview of data mining from the database perspective can be found in [CHY96]."]} diff --git a/edge/graph_16038433.jsonl b/edge/graph_16038433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0cd3cc825d05314937bc2a1b0502ed6e5b62dca --- /dev/null +++ b/edge/graph_16038433.jsonl @@ -0,0 +1 @@ +{"9186472|44132017": []} diff --git a/edge/graph_16041166.jsonl b/edge/graph_16041166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16042824.jsonl b/edge/graph_16042824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16049411.jsonl b/edge/graph_16049411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a5538cb3beac2068c8c7a84892aef947ab9c9b9 --- /dev/null +++ b/edge/graph_16049411.jsonl @@ -0,0 +1,5 @@ +{"49536806|1708582": ["Although many of these algorithms are eventually guaranteed to find sub-optimal policies, their use of the accumulated data acquired over the learning process is inefficient, and they require a significant amount of experience to achieve good performance [ 4 ]."]} +{"49539680|1708582": ["Although many of these algorithms are eventually guaranteed to find sub-optimal policies in sequential decision-making problems under uncertainty, their use of the accumulated data acquired over the learning process is inefficient, and they require a significant amount of experience to achieve acceptable performance [21]."]} +{"49539680|8363289": ["Model predictive control [13-17] is a popular approach in a variety of control system design contexts, and in particular, in chemical process control."]} +{"6205579|5660618": ["Opportunities to implement plug and play control systems are emerging in systems consisting of smart components connected by bi-directional communication networks [5]."]} +{"1434166|8363289": ["For discussion of MPC from the point of view of optimal control, see [21]\u2013[23]; for a survey of stability and optimality results, see [24]."]} diff --git a/edge/graph_16049649.jsonl b/edge/graph_16049649.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16050394.jsonl b/edge/graph_16050394.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16050825.jsonl b/edge/graph_16050825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24b8f89a0184f92bdb9e03d9b3b11132b16f2b5d --- /dev/null +++ b/edge/graph_16050825.jsonl @@ -0,0 +1,5 @@ +{"15051092|18148591": ["MIMO is widely used in radio communications [9], where scattering and interference creates channels that are decorrelated from one another.", "The simple matrix inversion and multiplication used to obtain an estimate of the transmitted data is susceptible to noise, and computationally inefficient compared with many of the advanced RF techniques in use [9], and there are likely to be substantial gains to be made with use of some"]} +{"12231978|1165497": ["SC pulsed modulation schemes such as on-off keying (OOK) and pulse position modulation (PPM) are widely used modulation formats in IR wireless communications [10]."]} +{"15772363|582949": []} +{"26304576|11720829": ["Depending on the relationship between the signals transmitted from different antennas MIMO schemes can be used to either increase the overall capacity of the system, or to reduce the probability of outage [48], [49]."]} +{"34316036|15453366": ["Furthermore, in practice, the maximum FSO transmit power P1,max and the maximum RF transmit power P2,max are both limited [2], [30]."]} diff --git a/edge/graph_16051048.jsonl b/edge/graph_16051048.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c16d666bb58670956662876d0527ae7b0d2072f --- /dev/null +++ b/edge/graph_16051048.jsonl @@ -0,0 +1,2 @@ +{"16364858|8530790": ["1A more appropriate method of evolving against these criteria may be to use a multi-objective approach [19]."]} +{"15885460|17183431": ["\u2026networking scenarios, which can possibly include global communications, (ii) is much less constrained by limitations in energy or computational power, and (iii) is intrinsically more \u201copen\u201d to handle a heterogeneous set of devices and content (data, knowledge, media) (Zambonelli and Viroli, 2011).", "Due to the intrinsic complexity of such systems, metaphors inspired by nature are typically adopted for their design and implementation (Zambonelli and Viroli, 2011).", "On the other hand, some differences from WSNs are worth noting: pervasive computing (i) appears to handle a wider set of networking scenarios, which can possibly include global communications, (ii) is much less constrained by limitations in energy or computational power, and (iii) is intrinsically more \u201copen\u201d to handle a heterogeneous set of devices and content (data, knowledge, media) (Zambonelli and Viroli, 2011)."]} diff --git a/edge/graph_16051476.jsonl b/edge/graph_16051476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97597c37656f0b4ce015166d5ff8bc8fe9d44715 --- /dev/null +++ b/edge/graph_16051476.jsonl @@ -0,0 +1,11 @@ +{"42514866|1619901": ["Each phase encloses many decision points, where management decides about the future of the project [26]."]} +{"110086809|8540351": []} +{"6332715|1230643": []} +{"6332715|4491892": ["4.2.3 Particle Filter Particle .lters are recursive \nimplementations of statistical signal processing known as sequential Monte Carlo meth\u00adods (SMC) [31].", "Particle filters are recursive implementations of statistical signal processing known as sequential Monte Carlo methods (SMC) [31]."]} +{"13099189|28670512": ["Mathematically this is a partially observed Markov decision problem [44,75] as formulated in the following.", "The above problem is a special case of the \ufb01nite-state, \ufb01nite-observation, partially observed Markov decision problems addressed in [44,75]."]} +{"12152883|14970359": []} +{"61167697|33286487": []} +{"33999569|1230643": []} +{"56709389|1230643": ["Typical applications of such sensor networks are event detection, event identification, and location sensing [2]."]} +{"205431833|206051485": []} +{"205431833|10863733": ["[55] fused multimodality medical images to improve diagnosis and treatment planning."]} diff --git a/edge/graph_16052126.jsonl b/edge/graph_16052126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b89bb9aa77c6cb6dd49ebdc278e10142dd9cd2e8 --- /dev/null +++ b/edge/graph_16052126.jsonl @@ -0,0 +1,6 @@ +{"47178135|386036": ["[12] is a recent survey on this topic."]} +{"1878208|1507400": ["The use of MapReduce for data intensive scientific analysis and bioinformatics are well studied in [41, 80]."]} +{"16666272|8125630": ["As mentioned previously, the main advantage columnstores have over traditional row-wise storage, is that only a fraction of the data needs to be accessed when processing typical queries (accessing often only ten or less out of thousands of columns)."]} +{"9901292|2795037": ["In general, AQUA follows the principles of conventional query optimization approaches, as query optimization in traditional database systems [19, 9], parallel database systems [18] and distributed database systems [7] has been studied for years, and many state-of-the-art solutions have been\u2026", "As the plan space is extremely large for a complex query, most relational database systems only consider the left-deep plan in query optimization [9]."]} +{"17573130|2795037": ["In a DBMS, when converting a logical query plan tree to the final physical plan, each logical operation is replaced with one pre-implemented physical operator [17]."]} +{"202139|816774": ["Although PAX employs in-\npage vertical partitioning, it incurs minimal record reconstruction costs, because it does not need to perform a join to construct a result tuple."]} diff --git a/edge/graph_16052133.jsonl b/edge/graph_16052133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af36f89800b69cb7680dc4c154feca9d14105e93 --- /dev/null +++ b/edge/graph_16052133.jsonl @@ -0,0 +1 @@ +{"45735125|9045232": ["It is inevitable that a face is localized correctlywith minor scale variation [31]."]} diff --git a/edge/graph_16056023.jsonl b/edge/graph_16056023.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16061274.jsonl b/edge/graph_16061274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a03e49f810e3a461afc046caa86c2f92af1ea71d --- /dev/null +++ b/edge/graph_16061274.jsonl @@ -0,0 +1,3 @@ +{"947252|10290908": []} +{"44897745|14866098": []} +{"9048865|10290908": ["Indeed, it is worth mentioning that the best performance arises when complete waveshape representations are available [62,63]."]} diff --git a/edge/graph_16061523.jsonl b/edge/graph_16061523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16061878.jsonl b/edge/graph_16061878.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16076228.jsonl b/edge/graph_16076228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1607655.jsonl b/edge/graph_1607655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16079696.jsonl b/edge/graph_16079696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d197fe43faa0d866df0acfffe13d5ab7a560cfc --- /dev/null +++ b/edge/graph_16079696.jsonl @@ -0,0 +1 @@ +{"8717021|534755": []} diff --git a/edge/graph_16081379.jsonl b/edge/graph_16081379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16082889.jsonl b/edge/graph_16082889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..632eef6cd1b2d397549960e7b2efa2b12541e948 --- /dev/null +++ b/edge/graph_16082889.jsonl @@ -0,0 +1 @@ +{"20411856|6746689": ["As (11) must hold regardless of the parameter \u03c3y, it is easy to obtain cos [2\u03c0f(\u2212W/2 + t)] \u2265 cos [2\u03c0f(W/2 + t)] ."]} diff --git a/edge/graph_16084499.jsonl b/edge/graph_16084499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31c17bf83122bed95087008694f9f0383d945a4a --- /dev/null +++ b/edge/graph_16084499.jsonl @@ -0,0 +1,4 @@ +{"6894307|1188683": ["Third IEEE EMBS Information Technology Applications in Biomedicine \u2013 Workshop of the International Telemedical Information Society ITAB ITIS 2000, Arlington, Virginia, November 2000, pp. 22-27."]} +{"15347035|1230643": ["For example, in a wireless sensor network (WSN) for forest fire detection [12], a large number of sensor nodes ar randomly deployed in a fire-prone forest to detect fires."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"18486787|1230643": ["Usually a BS is a much more powerful laptop-class node that connects the sensor nodes to the rest of the world [1,2]."]} diff --git a/edge/graph_16087532.jsonl b/edge/graph_16087532.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26dd564d87c9d544f415f097c11aa4854495a9c6 --- /dev/null +++ b/edge/graph_16087532.jsonl @@ -0,0 +1,11 @@ +{"153691185|15273230": []} +{"31392985|3330313": ["It is ideal for situations where negative examples are very hard to obtain in real life situations [26,60].", "The choice of an appropriate discordancy test for a given data depends on: knowledge of the data distribution, knowledge of the distribution parameters, and the number and type of expected outliers needed, which accounts for the many discordancy tests available for finding distribution-based outliers [20,26].", "[26] outlines several practical applications of outlier mining."]} +{"31392985|5246835": []} +{"50458504|3330313": []} +{"50458504|5246835": []} +{"27434345|5246835": ["[47] highlight that an important advantage of data mining is that it can be used to develop a new class of models to identify new attacks before"]} +{"27434345|50458504": ["[58] describe fraud as leading to the abuse of a profit organization's systemwithout necessarily leading to direct legal consequences.", "2 consists of two layers, the first comprising the aforementioned financial fraud based categories and the second comprising the six data mining application classes of classification, clustering, prediction, outlier detection, regression, and visualization [13,24,32,48,58,61,74,76], supported by a set of algorithmic approaches to extract the relevant relationships in the data [73].", "[58] point out that fraud detection has become one of the best established applications of data mining in both industry and government.", "[58] present a survey of data mining-based fraud detection research, including credit transaction fraud, telecoms subscription fraud, automobile insurance fraud and the like.", "2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"27434345|954543": ["2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"954543|60455": []} +{"954543|10739218": []} +{"15696161|192934": []} diff --git a/edge/graph_16090101.jsonl b/edge/graph_16090101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16090198.jsonl b/edge/graph_16090198.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16096875.jsonl b/edge/graph_16096875.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9e9df1c6b414effc31fb032aeac6b04fa830f5e --- /dev/null +++ b/edge/graph_16096875.jsonl @@ -0,0 +1 @@ +{"15929475|206778272": []} diff --git a/edge/graph_16107476.jsonl b/edge/graph_16107476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16108469.jsonl b/edge/graph_16108469.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b56213d1d6ac6970f5b4b20167dde00344b31ea --- /dev/null +++ b/edge/graph_16108469.jsonl @@ -0,0 +1,3 @@ +{"36157633|627405": ["Before starting on the study, we first developed a comprehensive research protocol detailing our plans (Budgen et al. 2007b).", "(Again, a fuller analysis is presented in the research protocol (Budgen et al. 2007b).)"]} +{"29969772|206778480": ["Considerable research has modeled relationships between attributes that can be measured early and those measured later [12], [35].", "Software aging [12] Architectural smells [10]", "2) Specify the Research Questions: The major focus of this review is identifying techniques and metrics to assess code decay without including a general literature on fault prediction performance in software engineering [12], or the literature on fault prediction metrics [35]."]} +{"4729357|15249785": ["It works from domain models consisting of a decision model and generic work products, and was applied to statically evaluate architectures [82]."]} diff --git a/edge/graph_1610911.jsonl b/edge/graph_1610911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16117378.jsonl b/edge/graph_16117378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16120075.jsonl b/edge/graph_16120075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a7ec94bdeff00334936ac5997c764fae8e9d3fe --- /dev/null +++ b/edge/graph_16120075.jsonl @@ -0,0 +1,28 @@ +{"20456243|1230643": ["Recently sensor networks have attracted tremendous research interests due to its vast potential applications [ 1 ,2]."]} +{"3165019|10658846": ["\u2026to analyze and model power consumption over long periods of time, and therefore predict the lifetime of a node and change the control policy accordingly, it is useful to consider a number of elementary tasks whose scheduling and execution are controlled by a resource manager [Benini et al. 2000].", "Previous work has provided energy consumption values for other types of simpler sensor network platforms, such as Berkeley\u2019s motes [Woo 2000, Shnayder et al. 2004], or for small granularity tasks involving switching the state of a microprocessor [Benini et al. 2000]."]} +{"2295358|1230643": ["WSNs have many advantages over traditional sensing modalities including wide coverage, robustness, scalability, and the ability to observe large scale phenomena distributed over space and time [1, 2]."]} +{"14214287|1230643": ["In a real sensor network, these links are formed by radio, infrared, or optical media [1, 28].", "Such networks will be essential for 21st century military, environmental, and surveillance applications [1], but pose many challenges to traditional vision."]} +{"11272177|7788290": []} +{"3117516|1236072": []} +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"15419689|1230643": ["In general, WSN are densely deployed for offering fine-grained monitoring [1]."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"11586611|206051485": []} +{"3148973|206051485": []} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"15843811|1230643": ["In a usual scenario, these networks are largely deployed in areas of interest (such as inaccessible terrains or disaster places) for fine-grained monitoring in various classes of applications [1]."]} +{"10053793|1230643": ["The main focus of WSN research, as well as wireless ad-hoc network research in general, has been on different protocol layers, reviewed in [2, 3, 4, 5, 6, 7, 8] and on energy efficiency [9, 10].", "Surveys concerning application layer issues and prototype implementations are fairly limited [4, 12, 13]."]} +{"14897482|11720829": ["Recent multiple-input, multiple-output (MIMO) techniques [143], [144] like the upcoming IEEE 802."]} +{"14897482|1387401": ["In realistic environments the wireless channel suffers from phenomena like path loss and shadowing, multipath propagation and thermal noise [132]\u2013[134]."]} +{"14897482|1230643": ["Wireless sensor networks (WSN) [55], [56], [30], [57], [58], [59], [60] consist of a large number of small, energy- and resource-constrained sensor nodes."]} +{"9957336|1230643": []} +{"14125339|10658846": []} +{"1856779|205286988": ["With the recent advances in wireless sensor networks (WSNs), it is foreseeable that video sensors will be supported in such networks, for applications such as battlefield intelligence, security monitoring, emergency response, and environmental tracking [1, 2 ]."]} +{"1856779|1236072": ["With the recent advances in wireless sensor networks (WSNs), it is foreseeable that video sensors will be supported in such networks, for applications such as battle\ufb01eld intelligence, security monitoring, emergency response, and environmental tracking [1,2]."]} +{"5794285|14441987": ["Initially, protocol design focused on efficiently finding shortest path routes in the presence of node mobility [12]."]} diff --git a/edge/graph_16125167.jsonl b/edge/graph_16125167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a415a7df0dc69d45bff7bcb4a105a0b08078112a --- /dev/null +++ b/edge/graph_16125167.jsonl @@ -0,0 +1,2 @@ +{"16125167|205435103": ["Search strategies in literature surveys often involve automatic keyword searches (e.g., [55], [56])."]} +{"16125167|627405": ["[57], we enforced this criterion by utilizing predefined selection criteria that clearly define the scope, and evaluated these criteria through a pilot study that yielded positive results (Section 3.", "sions [57]; borderline cases are resolved by discussion", "[57] recently pointed out that: 1) Current software engineering digital libraries do not provide good support for the identification of relevant research and the selection of primary studies and 2) in comparison to other disciplines, the standard of abstracts in software engineering publications is poor.", "[57], who state that \u201ccurrent software engineering search engines are not designed to support systematic literature reviews;\u201d this observation is confirmed by Staples and Niazi [83]."]} diff --git a/edge/graph_16133836.jsonl b/edge/graph_16133836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6008ce1a468240d044a7d2e60f40e28c066b5b50 --- /dev/null +++ b/edge/graph_16133836.jsonl @@ -0,0 +1,2 @@ +{"2551960|15849973": ["Algorithms for file sharing between computers have mostly been studied in the context of data replication [1].", "The technique of replication is largely applied in Content Distribution Networks (CDNs), where content from a core server is replicated at multiple servers (usually placed at the edge of the provider\u2019s network) [1,2]."]} +{"29395992|9104850": ["Caching web objects at various components in the network (such as servers, proxies, and clients) is an important approach for enhancing web content delivery [1], [ 2 ], [3]."]} diff --git a/edge/graph_16136766.jsonl b/edge/graph_16136766.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..787a4d4008a3e776d56abba651fc554546a36494 --- /dev/null +++ b/edge/graph_16136766.jsonl @@ -0,0 +1,4 @@ +{"14159611|2018781": ["Business-IT alignment is recognized as a research challenge [6] and the need of integrating technical architecture (e."]} +{"18214919|1975139": []} +{"15894661|9123526": []} +{"62557757|18035353": ["These algorithms were implemented [41] using MIP, CP, and explanation-based CP [ 60 ]."]} diff --git a/edge/graph_16142239.jsonl b/edge/graph_16142239.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb8ff663955f9ca795f8649c005241ed72feae95 --- /dev/null +++ b/edge/graph_16142239.jsonl @@ -0,0 +1,6 @@ +{"8773543|3898063": ["The main references of this paper and other packing problems are the last chapter of Bolloba\u00b4 s\u2019s book [1], the 4th Chapter of Yap\u2019s book [10] and the survey papers [ 11 ] and [8]."]} +{"36127171|3898063": ["This result was first generalized in [4] and led to a great amount of work on packings of two graphs [2, 3, 5, 7, 8, 13]."]} +{"42363527|3898063": []} +{"7029087|3898063": ["The main references of the paper and of other packing problems are the last chapter of Bollob as\u2019s book [1], the 4th Chapter of Yap\u2019s book [15] and the survey papers [16,14]."]} +{"26515747|3898063": []} +{"35260112|3898063": ["as\u2019s book [1], the 4th Chapter of Yap\u2019s book [15] as well the survey papers [13,16]."]} diff --git a/edge/graph_16145478.jsonl b/edge/graph_16145478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16146346.jsonl b/edge/graph_16146346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ac7c36d8db9afefaaca5c75ebbd5d4c4157e8c9 --- /dev/null +++ b/edge/graph_16146346.jsonl @@ -0,0 +1 @@ +{"7852586|16146346": []} diff --git a/edge/graph_1614929.jsonl b/edge/graph_1614929.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1615097.jsonl b/edge/graph_1615097.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16153186.jsonl b/edge/graph_16153186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f782127d59cf5349a03021ec8fa3bb236b494043 --- /dev/null +++ b/edge/graph_16153186.jsonl @@ -0,0 +1,7 @@ +{"5488904|2457428": ["These attribute revocable ABE schemes [13, 15, 16] have a security degradation problem in terms of the backward and forward secrecy [17]."]} +{"206446574|1230643": []} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"207063673|14077778": ["Input A public key Q xQ yQ associated with valid domain parameters q FR a b G n h Output Acceptance or rejection of the validity of Q\nCheck that Q O Check that xQ and yQ are properly represented elements of Fq i e integers in the interval\np in the case q p and bit strings of length m bits in the case q m Check that Q lies on the elliptic curve de ned by a and b\nCheck that nQ O If any check fails then Q is invalid otherwise Q is valid\nProof of Possession of a Private Key\nIf an entity C is able to certify A s public key Q as its own public key then C can claim that A s signed messages originated from C To avoid this the CA should require all entities A to prove possession of the private keys corresponding to its public keys before the CA certi es the public key as belonging to A This proof of possession can be accomplished by a variety of means for example by requiring A to sign a message of the CA s choice or by using zero knowledge techniques see Chaum Evertse and van de Graaf Note that proof of possession of a private key provides di erent assurances from public key validation The former demonstrates possession of a private key even though it may correspond to an invalid public key while the latter demonstrates validity of a public key but not ownership of the corresponding private key Doing both provides a high level of assurance\nECDSA Signature Generation and Veri cation\nThis section describes the procedures for generating and verifying signatures using the ECDSA\nECDSA Signature Generation To sign a message m an entity A with domain parameters D q FR a b G n h and associated key pair d Q does the following\nSelect a random or pseudorandom integer k k n Compute kG x y and r x mod n If r then go to step\nCompute k mod n\nCompute e SHA m\nCompute s k e dr mod n If s then go to step\nA s signature for the message m is r s\nECDSA Signature Verification To verify A s signature r s on m B obtains an authen tic copy of A s domain parameters D q FR a b G n h and associated public key Q It is recommended that B also validates D and Q see x and x B then does the following Verify that r and s are integers in the interval n Compute e SHA m\nCompute w s mod n\nCompute u ew mod n and u rw mod n\nCompute X u G u Q If X O then reject the signature Otherwise compute v x mod n where X x y\nAccept the signature if and only if v r\nProof that Signature Verification Works If a signature r s on a message m was indeed generated by A then s k e dr mod n Rearranging gives\nk s e dr s e s rd we wrd u u d mod n\nThus u G u Q u u d G kG and so v r as required\nConversion Between Data Types ANSI X speci es a method for converting eld elements to integers This is used to convert the eld element x to an integer in step of signature generation and step of signature veri cation prior to computing x mod n ANSI X also speci es a method for converting bit strings to integers This is used to convert the output e of SHA to an integer prior to its use in the modular computation in step of signature generation and step of signature veri cation\nPublic Key Certificates Before verifying A s signature on a message B needs to obtain an authentic copy of A s domain parameters D and associated public key Q ANSI X does not specify a mechanism for achieving this In practice authentic public keys are most commonly distributed via certi cates A s public key certi cate should include a string of information that uniquely identi es A such as A s name and address her domain parameters D if these are not already known from context her public key Q and a certifying authority s CA s signature over this information B can then use his authentic copy of the CA s public key to verify A s certi cate thereby obtaining an authentic copy of A s static public key\nRationale for Checks on r and s in Signature Verification Step of signature veri cation checks that r and s are integers in the interval n These checks can be performed very e ciently and are prudent measures in light of known attacks on related ElGamal signature schemes which do not perform these checks for example of such attacks see Bleichenbacher The following is a plausible attack on ECDSA if the check r and more generally r mod n is not performed Suppose that A is using the elliptic curve y x ax b over Fp\nwhere b is a quadratic residue modulo p and suppose that A uses a base point G p b of prime order n It is plausible that all entities may select a base point with x coordinate in order\nto minimize the size of domain parameters An adversary can now forge A s signature on any message m of its choice by computing e SHA m It can easily be checked that r s e is a valid signature for m\nComparing DSA and ECDSA Conceptually the ECDSA is simply obtained from the DSA by replacing the subgroup of order q of Z p generated by g with the subgroup of points on an elliptic curve that are generated by G The only signi cant di erence between ECDSA and DSA is in the generation of r The DSA does this by taking the random element X gk mod p and reducing it modulo q thus obtaining an integer in the interval q The ECDSA generates r in the interval n by taking the x coordinate of the random point kG and reducing it modulo n\nSecurity Considerations\nThe security objective of ECDSA is to be existentially unforgeable against a chosen message attack The goal of an adversary who launches such an attack against a legitimate entity A is to obtain a valid signature on a single message m after having obtained A s signature on a collection of messages not including m of the adversary s choice\nECDSA has not been proven to be existentially unforgeable against chosen message attack\nHowever slight variants of DSA and hence also slight variants of ECDSA have been proven secure by Pointcheval and Stern under the assumptions that the discrete logarithm problem is hard and that the hash function employed is a random function\nThe possible attacks on ECDSA can be classi ed as follows\nAttacks on the elliptic curve discrete logarithm problem\nAttacks on the hash function employed\nOther attacks\nThis section summarizes the current knowledge of these attacks and how they can be avoided in practice\nThe Elliptic Curve Discrete Logarithm Problem\nOne way in which an adversary can succeed is to compute A s private key d from A s domain pa rameters q FR a b G n h and public key Q The adversary can subsequently forge A s signature on any message of its choice\nProblem Definition The elliptic curve discrete logarithm problem ECDLP is the following given an elliptic curve E de ned over a nite eld Fq a point P E Fq of order n and a point Q lP where l n determine l\nKnown Attacks\nThis subsection overviews the algorithms known for solving the ECDLP and discusses how they can be avoided in practice\nNaive Exhaustive Search In this method one simply computes successive multiples of P P P P P until Q is obtained This method can take up to n steps in the worst case\nPohlig Hellman Algorithm This algorithm due to Pohlig and Hellman exploits the factorization of n the order of the point P The algorithm reduces the problem of recovering l to the problem of recovering l modulo each of the prime factors of n the desired number l can then be recovered by using the Chinese Remainder Theorem\nThe implications of this algorithm are the following To construct the most di cult instance of the ECDLP one must select an elliptic curve whose order is divisible by a large prime n Preferably this order should be a prime or almost a prime i e a large prime n times a small integer h For the remainder of this section we shall assume that the order n of P is prime\nBaby Step Giant Step Algorithm This algorithm is a time memory trade o of the method of exhaustive search It requires storage for about p n points and its running time is roughly p n steps in the worst case\nPollard s Rho Algorithm This algorithm due to Pollard is a randomized version of the baby step giant step algorithm It has roughly the same expected running time p n steps as the baby step giant step algorithm but is superior in that it requires a negligible amount of storage\nGallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm can be sped up by a factor of p Thus the expected running time of Pollard s rho method with this speedup is p n steps\nParallelized Pollard s Rho Algorithm Van Oorschot and Wiener showed how Pollard s rho algorithm can be parallelized so that when the algorithm is run in parallel on r processors the expected running time of the algorithm is roughly p n r steps That is using r processors results in an r fold speed up\nPollard s lambda method This is another randomized algorithm due to Pollard Like Pollard s rho method the lambda method can also be parallelized with a linear speedup The parallelized lambda method is slightly slower than the parallelized rho method The lambda method is however faster in situations when the logarithm being sought is known to lie in a subinterval b of n where b n Multiple Logarithms R Silverman and Stapleton observed that if a single instance of the ECDLP for a given elliptic curve E and base point P is solved using parallelized Pollard s rho method then the work done in solving this instance can be used to speed up the solution of other instances of the ECDLP for the same curve E and base point P More precisely if the rst instance takes expected time t then the second instance takes expected time p t t Having solved these two instances the third instance takes expected time p p t Having solved these three instances the fourth instance takes expected time p p t And so on Thus subsequent instances of the ECDLP for a particular elliptic curve become progressively easier Another way of looking at this is that\nsolving k instances of the ECDLP for the same curve E and base point P takes only p k as much work as it does to solve one instance of the ECDLP This analysis does not take into account storage requirements\nConcerns that successive logarithms become easier can be addressed by ensuring that the elliptic parameters are chosen so that the rst instance is infeasible to solve\nSupersingular Elliptic Curves Menezes Okamoto and Vanstone and Frey and R uck showed how under mild assumptions the ECDLP in an elliptic curve E de ned over a nite eld Fq can be reduced to the ordinary DLP in the multiplicative group of some extension eld Fqk for some k where the number eld sieve algorithm applies The reduction algorithm is only practical if k is small this is not the case for most elliptic curves as shown by Balasubramanian and Koblitz To ensure that the reduction algorithm does not apply to a particular curve one only needs to check that n the order of the point P does not divide qk for all small k for which the DLP in Fqk is tractable in practice when n then k su ces An elliptic curve E over Fq is said to be supersingular if the trace t of E is divisible by the characteristic p of Fq For this very special class of elliptic curves it is known that k It follows that the reduction algorithm yields a subexponential time algorithm for the ECDLP in supersingular curves For this reason supersingular curves are explicitly excluded from use in the ECDSA by the above divisibility check\nMore generally the divisibility check rules out all elliptic curves for which the ECDLP can be e ciently reduced to the DLP in some small extension of Fq These include the supersingular elliptic curves and elliptic curves of trace elliptic curves E over Fq for which E Fq q Prime Field Anomalous Curves An elliptic curve E over Fp is said to be prime eld anomalous if E Fp p Semaev Smart and Satoh and Araki showed how to e ciently solve the ECDLP for these curves The attack does not extend to any other classes of elliptic curves Consequently by verifying that the number of points on an elliptic curve is not equal to the cardinality of the underlying eld one can easily ensure that the Semaev Smart Satoh Araki attack does not apply\nCurves Defined Over a Small Field Suppose that E is an elliptic curve de ned over the nite eld F e Gallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm for computing elliptic curve logarithms in E F ed can be\nfurther sped up by a factor of p d thus the expected running time of Pollard s rho method\nfor these curves is p n d steps For example if E is a Koblitz curve see x then Pollard s rho algorithm for computing elliptic curve logarithms in E F m can be sped up by a factor of p m This speedup should be considered when doing a security analysis of elliptic curves whose coe cients lie in a small sub eld\nCurves Defined Over F m m Composite Galbraith and Smart expanding on earlier work of Frey discuss how the Weil descent might be used to solve the ECDLP for elliptic curves de ned over F m where m is composite such elds are sometimes called composite elds More recently Gaudry Hess and Smart re ned these ideas to provide\nstrong evidence that when m has a small divisor l e g l the ECDLP for elliptic curves de ned over F m can be solved faster than with Pollard s rho algorithm In light of these results it seems prudent to not use elliptic curves over composite elds\nIt should be noted that some ECC standards including the draft ANSI X explicitly exclude the use of elliptic curves over composite elds The ANSI X F committee also agreed in January to exclude the use of such curves in a forthcoming revision of ANSI X\nNon Applicability of Index Calculus Methods Whether or not there exists a general subexponential time algorithm for the ECDLP is an important unsettled question and one of great relevance to the security of ECDSA It is extremely unlikely that anyone will ever be able to prove that no subexponential time algorithm exists for the ECDLP However much work has been done on the DLP over the past years and more speci cally on the ECDLP over the past years and no subexponential time algorithm has been discovered for the ECDLP Miller and J Silverman and Suzuki have given convincing arguments for why the most natural way in which the index calculus algorithms can be applied to the ECDLP is most likely to fail\nXedni Calculus Attacks A very interesting line of attack on the ECDLP called the xedni calculus attack was recently proposed by J Silverman One intriguing aspect of the xedni calculus is that it can be adapted to solve both the ordinary discrete logarithm and the integer factorization problems However it was subsequently shown by a team of researchers including J Silverman see Jacobson et al that the attack is virtually certain to fail in practice\nHyperelliptic Curves Hyperelliptic curves are a family of algebraic curves of arbitrary genus that includes elliptic curves Hence an elliptic curve can be viewed as a hyperelliptic curve of genus Adleman DeMarrais and Huang see also Stein M uller and Thiel presented a subexponential time algorithm for the discrete logarithm problem in the jacobian of a large genus hyperelliptic curve over a nite eld However in the case of elliptic curves the algorithm is worse than naive exhaustive search\nEquivalence to Other Discrete Logarithm Problems Stein and Zuccherato\nshowed that the discrete logarithm problem in real quadratic congruence function elds\nof genus is equivalent to the ECDLP Since no subexponential time algorithm is known for the former problem this may provide further evidence for the hardness of the ECDLP\nExperimental Results\nThe best general purpose algorithm known for the ECDLP is the parallelized version of Pollard s rho algorithm which has an expected running time of p n r steps where n is the prime order of the base point P and r is the number of processors utilized\nCerticom s ECC Challenge Certicom initiated an ECC challenge in November in order to encourage and stimulate research on the ECDLP Their challenges consist of instances of the ECDLP on a selection of elliptic curves The challenge curves are divided into three categories\nlisted below In the following ECCp k denotes a random curve over a eld Fp ECC k denotes a random curve over a eld F m and ECC K k denotes a Koblitz curve see x over F m k is the bitlength of n In all cases the bitsize of the order of the underlying nite eld is equal or slightly greater than k so curves have either prime order or almost prime order\nRandomly generated curves over Fp where p is prime ECCp ECCp ECCp ECCp\nECCp ECCp ECCp ECCp and ECCp\nRandomly generated curves over F m where m is prime ECC ECC ECC ECC ECC ECC ECC ECC and ECC\nKoblitz curves over F m where m is prime ECC K ECC ECC ECC ECC and ECC\nResults of the Challenge Escott et al report on their implementation of the parallelized Pollard s rho algorithm which incorporates some improvements of Teske The hardest instance of the ECDLP they solved was the Certicom ECCp challenge For this task they utilized over machines from at least countries and found the answer in days The total number of steps executed was about elliptic curve additions which is close to the expected time p n where n Escott et al conclude that the running time of Pollard s rho algorithm in practice ts well with the theoretical predictions They estimate that the ECCp challenge could be solved by a network of PentiumPro MHz machines in about months\nHardware Attacks\nVan Oorschot and Wiener examined the feasibility of implementing parallelized Pollard s rho algorithm using special purpose hardware They estimated that if n then a machine with r processors could be built for about US ! million that could compute a single elliptic curve discrete logarithm in about days Since ANSI X mandates that the parameter n should satisfy n such hardware attacks appear to be infeasible with today s technology\nAttacks on the Hash Function\nDefinition A cryptographic hash function H is a function that maps bit strings of arbitrary lengths to bit strings of a xed length t such that\nH can be computed e ciently\npreimage resistance For essentially all y f gt it is computationally infeasible to nd a bit string x such that H x y and\ncollision resistance It is computationally infeasible to nd distinct bit strings x and x such that H x H x\nSHA Security Requirements The following explains how attacks on ECDSA can be suc cessfully launched if SHA is not preimage resistant or not collision resistant\nIf SHA is not preimage resistant then an adversary E may be able to forge A s signatures as follows E selects an arbitrary integer l and computes r as the x coordinate of Q lG reduced modulo n E sets s r and computes e rl mod n If E can nd a message m such that e SHA m then r s is a valid signature for m\nIf SHA is not collision resistant then an entity A may be able to repudiate signatures as follows A rst generate two messages m and m such that SHA m SHA m such a pair of messages is called a collision for SHA She then signs m and later claims to have signed m note that every signature for m is also a signature for m\nIdeal Security A t bit hash function is said to be have ideal security if both i given a hash output producing a preimage requires approximately t operations and ii producing a collision requires approximately t operations SHA is a bit hash function and is believed to have ideal security The fastest method known for attacking ECDSA by exploiting properties of SHA is to nd collisions for SHA Since this is believed to take steps attacking ECDSA in this way is computationally infeasible Note however that this attack imposes an upper bound of\non the security level of ECDSA regardless of the size of the primary security parameter n Of course this is also the case with all present signature schemes with appendix since the only hash functions that are widely accepted as being both secure and practical are SHA and RIPEMD\nsee Dobbertin Bosselaers and Preneel both of which are bit hash functions\nVariable Output Length Hash Functions It is envisioned that SHA will eventually be replaced by a family of hash functions Hl where Hl is an l bit hash function having ideal security If one uses ECDSA with parameter n then one would use Hl where l blog nc as the hash function In this case attacking ECDSA by solving the ECDLP and attacking ECDSA by nding collisions for Hl both take approximately the same amount of time\nOther Attacks\nSecurity Requirements for Per Message Secrets The per message secrets k in ECDSA signature generation have the same security requirements as the private key d This is because if an adversary E learns a single per message secret k which was used by A to generate a signature\nr s on some message m then E can recover A s private key since d r ks e mod n where e SHA m see step of ECDSA signature generation Hence per message secrets must be securely generated securely stored and securely destroyed after they have been used\nRepeated Use of Per Message Secrets The per message secrets k used to sign two or more messages should be generated independently of each other In particular a di erent per message secret k should be generated for each di erent message signed otherwise the private key d can be recovered Note that if a secure random or pseudorandom number generator is used then the chance of generating a repeated k value is negligible To see how private keys can be recovered if per message secrets are repeated suppose that the same per message secret k was used to generate ECDSA signatures r s and r s on two di erent messagesm and m Then s k e dr\nmod n and s k e dr mod n where e SHA m and e SHA m Then ks e dr mod n and ks e dr mod n Subtraction gives k s s e e mod n If s s mod n which occurs with overwhelming probability then k s s e e mod n Thus an adversary can determine k and then use this to recover d\nVaudenay s Attacks Vaudenay demonstrated a theoretical weakness in DSA based on his insight that the actual hash function used in the DSA is SHA modulo q not just SHA where q is a bit prime Since SHA is a bit hash function some of its outputs when converted to integers are larger than q Hence in general SHA m SHA m mod q This weakness allows the selective forgery of one message if the adversary can select the domain parameters This weakness is not present in ECDSA because of the requirement that n the analogous quantity to q in the DSA be greater than\nDuplicate Signature Key Selection A signature scheme S is said to have the duplicate signature key selection DSKS property if given A s public key PA and given A s signature sA on a message M an adversary E is able to select a valid key pair PE SE for S such that sA is also E s signature on M Note that this de nition requires that SE is known to E Blake Wilson and Menezes showed how this property can be exploited to attack a key agreement protocol which employs signatures scheme They also demonstrated that if entities are permitted to select their own domain parameters then ECDSA possesses the DSKS property To see this suppose that A s domain parameters are DA q FR a b G n h A s key pair is QA dA and r s is A s signature on M The adversary E selects an arbitrary integer c c n such that t s e s rc mod n computes X s eG s rQ where e SHA M and G t mod n X E then forms DE q FR a b G n h and QE cG Then it is easily veri ed that DE and QE are valid and that r s is also E s signature on M\nIf one mandates that the generating point G be selected veri ably at random during domain parameter generation using a method akin to those in x for generating elliptic curves veri ably at random then it appears that ECDSA no longer possesses the DSKS property It must be emphasized that possession of the DSKS property does not constitute a weakness of the signature scheme the goal of a signature scheme is to be existentially unforgeable against an adaptive chosen message attack Rather it demonstrates the importance of auditing domain parameter and public key generation\nImplementation Attacks ANSI X does not address attacks that could be launched against implementations of ECDSA such as timing attacks Kocher di erential fault analysis Boneh DeMillo and Lipton di erential power analysis Kocher Ja e and Jun and attacks which exploit weak random or pseudorandom number generators Kelsey et al\nImplementation Considerations\nBefore implementing ECDSA several basic choices have to be made including\nType of underlying nite eld Fq Fp or F m\nField representation e g polynomial or normal basis for F m\nType of elliptic curve E over Fq e g random curve or Koblitz curve\nElliptic curve point representation e g a ne or projective coordinates\nThere are many factors that can in uence the choices made All of these must be considered simultaneously in order to arrive at the best solution for a particular application The factors include\nSecurity considerations Suitability of methods available for optimizing nite eld arithmetic addition multiplication squaring and inversion\nSuitability of methods available for optimizing elliptic curve arithmetic point addition point doubling and scalar multiplication\nApplication platform software hardware or rmware Constraints of a particular computing environment e g processor speed storage code size gate count power consumption\nConstraints of a particular communications environment e g bandwidth response time\nSelected References to the Literature The most detailed and comprehensive reference available on techniques for e cient nite eld and elliptic curve arithmetic is IEEE P See Gordon for a detailed survey of various methods for scalar multiplication For an implemen tation report of elliptic curve operations over Fp and F m see Schroeppel et al De Win et al\nand Hasegawa Nakajima and Matsui\nInteroperability Considerations\nThe goals of cryptographic standards are twofold\nTo facilitate the widespread use of cryptographically sound and well speci ed techniques\nTo promote interoperability between di erent implementations\nFactors Affecting Interoperability Interoperability is encouraged by completely specifying the steps of the cryptographic schemes and the formats for shared data such as domain parameters keys and exchanged messages and by limiting the number of options available to the implemen tor For elliptic curve cryptography and in particular the ECDSA the factors that can impact interoperability include\nThe number and types of allowable nite elds\nThe number of allowable representations for the elements of an allowable nite eld\nThe number of allowable elliptic curves over an allowable nite eld\nThe formats for specifying eld elements elliptic curve points domain parameters public keys and signatures\nECDSA Standards\nAmong the standards and draft standards which specify ECDSA the ones which have been o cially approved by their respective accredited organizations are ANSI X FIPS IEEE P and ISO The salient features of these standards are described rst and then the standards are compared with regards to their compatibility with each other This is followed by a brief overview of some other standards that specify or use ECDSA", "ANSI X Public Key Cryptography for the Financial Services Industry Elliptic Curve Key Agreement and Key Transport Protocols working draft August\nD Ash I Blake and S Vanstone Low complexity normal bases Discrete Applied Mathe matics\nR Balasubramanian and N Koblitz The improbability that an elliptic curve has subexpo nential discrete log problem under the Menezes#Okamoto#Vanstone algorithm Journal of Cryptology\nL Bassham D Johnson and T Polk Representation of Elliptic Curve Digital Signature Algo rithm ECDSA Keys and Signatures in Internet X Public Key Infrastructure Certi cates Internet Draft June Available at http www ietf org\nM Bellare R Canetti and H Krawczyk A modular approach to the design and analysis of authentication and key exchange protocols Proceedings of the th Annual ACM Symposium on the Theory of Computing\nS Blake Wilson and A Menezes Entity authentication and authenticated key transport protocols employing asymmetric techniques Proceedings of the th International Workshop on Security Protocols Lecture Notes in Computer Science\nS Blake Wilson and A Menezes Unknown key share attacks on the station to station STS protocol Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nD Bleichenbacher Generating ElGamal signatures without knowing the secret key Ad vances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nD Boneh R DeMillo and R Lipton On the importance of checking cryptographic protocols for faults Advances in Cryptology Eurocrypt Lecture Notes in Computer Science\nSpringer Verlag\nCerticom ECC Challenge November http www certicom com\nD Chaum J H Evertse and J van de Graaf An improved protocol for demonstrating pos session of discrete logarithms and some generalizations Advances in Cryptology Eurocrypt\nLecture Notes in Computer Science Springer Verlag\nT Dierks and B Anderson ECC Cipher Suites for TLS Internet Draft March Available at http www ietf org\nW Di e P van Oorschot and M Wiener Authentication and authenticated key exchanges Designs Codes and Cryptography\nH Dobbertin A Bosselaers and B Preneel RIPEMD A strengthened version of RIPEMD Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nT ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory\nA Escott J Sager A Selkirk and D Tsapakidis Attacking elliptic curve cryptosystems using the parallel Pollard rho method CryptoBytes The Technical Newsletter of RSA Laborato ries volume number Winter Also available at http www rsasecurity com\nG Frey How to disguise an elliptic curve Weil descent talk at ECC Slides available at http www cacr math uwaterloo ca\nG Frey and H R uck A remark concerning m divisibility and the discrete logarithm in the divisor class group of curves Mathematics of Computation\nS Galbraith and N Smart A cryptographic application of Weil descent Codes and Cryp tography Lecture Notes in Computer Science Springer Verlag\nR Gallant R Lambert and S Vanstone Improving the parallelized Pollard lambda search on binary anomalous curves to appear in Mathematics of Computation\nP Gaudry F Hess and N Smart Constructive and destructive facets of Weil descent on el liptic curves preprint January Available from http www hpl hp com techreports\nHPL html\nS Goldwasser S Micali and R Rivest A digital signature scheme secure against adaptive chosen message attacks SIAM Journal on Computing\nD Gordon Designing and detecting trapdoors for discrete log cryptosystems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nD Gordon Discrete logarithms in GF p using the number eld sieve SIAM Journal on Discrete Mathematics\nD Gordon A survey of fast exponentiation methods Journal of Algorithms\nT Hasegawa J Nakajima and M Matsui A practical implementation of elliptic curve cryp tosystems over GF p on a bit microcomputer Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nIEEE P Standard Speci cations for Public Key Cryptography ballot draft Drafts available at http grouper ieee org groups index html\nISO IEC Information Technology Security Techniques Entity Authentication Mech anisms Part Entity authentication Using a Public Key Algorithm rst edition\nISO IEC Information Technology Security Techniques Key Management Part\nMechanisms Using Asymmetric Techniques\nISO IEC Information Technology Security Techniques Digital Signatures with Appendix Part Certi cate Based Mechanisms\nISO IEC Information Technology Security Techniques Cryptographic Techniques Based on Elliptic Curves Committee Draft CD\nT Izu J Kogure M Noro and K Yokoyama E cient implementation of Schoof s algo rithm Advances in Cryptology Asiacrypt Lecture Notes in Computer Science\nSpringer Verlag\nM Jacobson N Koblitz J Silverman A Stein and E Teske Analysis of the xedni calculus attack Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nD Johnson Key validation Contribution to ANSI X F working group\nB Kaliski and Y Yin Storage e cient nite eld basis conversion Selected Areas in Cryp tography Lecture Notes in Computer Science Springer Verlag\nJ Kelsey B Schneier D Wagner and C Hall Cryptanalytic attacks on pseudorandom number generators Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nN Koblitz Elliptic curve cryptosystems Mathematics of Computation\nN Koblitz Constructing elliptic curve cryptosystems in characteristic Advances in Cryp tology Crypto Lecture Notes in Computer Science Springer Verlag\nN Koblitz CM curves with good cryptographic properties Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nN Koblitz A Course in Number Theory and Cryptography nd edition Springer Verlag\nP Kocher Timing attacks on implementations of Di e Hellman RSA DSS and other sys tems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nP Kocher J Ja e and B Jun Di erential power analysis Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nG Lay and H Zimmer Constructing elliptic curves with given group order over large nite\nelds Algorithmic Number Theory Lecture Notes in Computer Science Springer\nVerlag\nR Lercier Computing isogenies in F n in Henri Cohen editor Algorithmic Number Theory Proceedings Second Intern Symp ANTS II Lecture Notes in Computer Science Springer Verlag\nR Lercier Finding good random elliptic curves for cryptosystems de ned F n Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Lercier and F Morain Counting the number of points on elliptic curves over nite elds strategies and performances Advances in Cryptology Eurocrypt Lecture Notes in Com puter Science Springer Verlag\nR Lidl and H Niederreitter Introduction to Finite Fields and their Applications Cambridge University Press\nC Lim and P Lee A key recovery attack on discrete log based schemes using a prime order subgroup Advances in Cryptology Crypto Lecture Notes in Computer Science\nR McEliece Finite Fields for Computer Scientists and Engineers Kluwer Academic Publish ers Boston\nW Meier and O Sta elbach E cient multiplication on certain nonsupersingular elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nA Menezes Elliptic Curve Public Key Cryptosystems Kluwer Academic Publishers Boston\nA Menezes T Okamoto and S Vanstone Reducing elliptic curve logarithms to logarithms in a nite eld IEEE Transactions on Information Theory\nA Menezes P van Oorschot and S Vanstone Handbook of Applied Cryptography CRC Press\nV Miller Uses of elliptic curves in cryptography Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nF Morain Building cyclic elliptic curves modulo large primes Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Mullin I Onyszchuk S Vanstone and R Wilson Optimal normal bases in GF pn Discrete Applied Mathematics\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nAvailable at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nDecember Available at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nFebruary Available at http csrc nist gov fips\nNational Institute of Standards and Technology Secure Hash Standard SHS FIPS Publica tion April Available at http csrc nist gov fips\nNational Institute of Standards and Technology Entity Authentication using Public Key Cryp tography FIPS Publication Available at http csrc nist gov fips\nNational Institute of Standards and Technology Recommended Elliptic Curves for Federal Gov ernment Use May revised July Available at http csrc nist gov encryption\nNational Institute of Standards and Technology Advanced Encryption Standard work in progress Information available at http csrc nist gov encryption aes aes home htm\nNational Security Agency SKIPJACK and KEA algorithm speci cation Version May\nAlso available at http csrc nist gov encryption skipjack kea htm\nK Nyberg and R Rueppel A new signature scheme based on the DSA giving message recovery st ACM Conference on Computer and Communications Security\nK Nyberg and R Rueppel Message recovery for signature schemes based on the discrete logarithm problem Designs Codes and Cryptography\nP van Oorschot and M Wiener Parallel collision search with cryptanalytic applications Journal of Cryptology\nS Pohlig and M Hellman An improved algorithm for computing logarithms over GF p and its cryptographic signi cance IEEE Transactions on Information Theory\nD Pointcheval and J Stern Security proofs for signature schemes Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nJ Pollard Monte Carlo methods for index computation mod p Mathematics of Computa tion\nM Rabin Digitalized signatures and public key functions as intractable as factorization MIT LCS TR MIT Laboratory for Computer Science\nR Rivest A Shamir and L Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM\nR Rueppel A Lenstra M Smid K McCurley Y Desmedt A Odlyzko and P Landrock\nThe Eurocrypt controversial issue # Trapdoor primes and moduli Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nT Satoh and K Araki Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves Commentarii Mathematici Universitatis Sancti Pauli\nO Schirokauer Discrete logarithms and local units Philosophical Transactions of the Royal Society of London A\nC Schnorr E cient signature generation by smart cards Journal of Cryptology\nR Schoof Elliptic curves over nite elds and the computation of square roots mod p Mathematics of Computation\nR Schroeppel H Orman S O Malley and O Spatscheck Fast key exchange with elliptic curve systems Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nI Semaev Evaluation of discrete logarithms in a group of p torsion points of an elliptic curve in characteristic p Mathematics of Computation\nJ Silverman The xedni calculus and the elliptic curve discrete logarithm prob lem Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nJ Silverman and J Suzuki Elliptic curve discrete logarithms and the index calculus Ad vances in Cryptology Asiacrypt Lecture Notes in Computer Science Springer Verlag\nR Silverman and J Stapleton Contribution to ANSI X F working group\nN Smart The discrete logarithm problem on elliptic curves of trace one Journal of Cryp tology\nM Smid and D Branstad Response to Comments on the NIST Proposed Digital Signature Standard Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nJ Solinas An improved algorithm for arithmetic on a family of elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nJ Solinas Generalized Mersenne numbers Technical report CORR Dept of C$O Uni versity of Waterloo Available from http www cacr math uwaterloo ca\nJ Solinas Improved algorithms for arithmetic on anomalous binary curves Tech nical report CORR Dept of C$O University of Waterloo Available from\nhttp www cacr math uwaterloo ca\nA Stein Equivalences between elliptic curves and real quadratic congruence function elds Journal de Th eorie des Nombres de Bordeaux\nA Stein V M uller and C Thiel Computing discrete logarithms in real quadratic congruence function elds of large genus Mathematics of Computation\nE Teske Speeding up Pollard s rho method for computing discrete logarithms in J P Buh ler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nS Vanstone Responses to NIST s Proposal Communications of the ACM July\ncommunicated by John Anderson\nS Vaudenay Hidden collisions on DSS Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nWAP WTLS Wireless Application Protocol Wireless Transport Layer Security Spec i cation Wireless Application Protocol Forum February Drafts available at http www wapforum org\nM Wiener and R Zuccherato Faster attacks on elliptic curve cryptosystems Selected Areas in Cryptography Lecture Notes in Computer Science Springer Verlag\nE De Win S Mister B Preneel and M Wiener On the performance of signature schemes based on elliptic curves in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nR Zuccherato The equivalence between elliptic curve and quadratic function eld discrete logarithms in characteristic in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag", "Introduction\nDigital Signature Schemes\nBackground The Digital Signature Algorithm DSA\nFinite Fields\nThe Finite Field Fp The Finite Field F m\nPolynomial Basis Representations Normal Basis Representations\nElliptic Curves Over Finite Fields\nElliptic Curves Over Fp Elliptic Curves Over F m Basic Facts\nECDSA Domain Parameters\nDomain Parameters Generating an Elliptic Curve Veri ably at Random\nThe Case q p The Case q m\nDomain Parameter Generation Domain Parameter Validation\nECDSA Key Pairs\nKey Pair Generation Public Key Validation Proof of Possession of a Private Key\nECDSA Signature Generation and Veri cation\nSecurity Considerations\nThe Elliptic Curve Discrete Logarithm Problem\nKnown Attacks Experimental Results Hardware Attacks\nAttacks on the Hash Function Other Attacks\nImplementation Considerations\nInteroperability Considerations\nECDSA Standards NIST Recommended Curves\nRandom Elliptic Curves Over Fp Koblitz Elliptic Curves Over F m Random Elliptic Curves Over F m Converting Between Polynomial and Normal Basis Representations\nConclusions\nReferences\nIntroduction\nThe Digital Signature Algorithm DSA was speci ed in a U S Government Federal Information Processing Standard FIPS called the Digital Signature Standard DSS Its security is based on the computational intractability of the discrete logarithm problem DLP in prime order sub groups of Z p\nElliptic curve cryptosystems ECC were invented by Neal Koblitz and Victor Miller\nin They can be viewed as elliptic curve analogues of the older discrete logarithm DL cryptosystems in which the subgroup of Z p is replaced by the group of points on an elliptic curve over a nite eld The mathematical basis for the security of elliptic curve cryptosystems is the computational intractability of the elliptic curve discrete logarithm problem ECDLP\nSince the ECDLP appears to be signi cantly harder than the DLP the strength per key bit\nis substantially greater in elliptic curve systems than in conventional discrete logarithm systems Thus smaller parameters can be used in ECC than with DL systems but with equivalent levels of security The advantages that can be gained from smaller parameters include speed faster computa tions and smaller keys and certi cates These advantages are especially important in environments where processing power storage space bandwidth or power consumption is constrained\nThe Elliptic Curve Digital Signature Algorithm ECDSA is the elliptic curve analogue of the DSA ECDSA was rst proposed in by Scott Vanstone in response to NIST s National Institute of Standards and Technology request for public comments on their rst proposal for DSS It was accepted in as an ISO International Standards Organization standard ISO accepted in as an ANSI American National Standards Institute standard ANSI X and accepted in as an IEEE Institute of Electrical and Electronics Engineers standard IEEE P and a FIPS standard FIPS It is also under consideration for inclusion in some other ISO standards In this paper we describe the ANSI X ECDSA present rationale for some of the design decisions and discuss related security implementation and interoperability issues\nThe remainder of this paper is organized as follows In x we review digital signature schemes and the DSA A brief tutorial on nite elds and elliptic curves is provided in x and x respec tively In x methods for domain parameter generation and validation are considered while x discusses methods for key pair generation and public key validation The ECDSA signature and veri cation algorithms are presented in x The security of ECDSA is studied in x Finally some implementation and interoperability issues are considered in x and x\nDigital Signature Schemes\nBackground\nDigital signature schemes are designed to provide the digital counterpart to handwritten signatures\nand more A digital signature is a number dependent on some secret known only to the signer the signer s private key and additionally on the contents of the message being signed Signatures must be veri able if a dispute arises as to whether an entity signed a document an unbiased third party should be able to resolve the matter equitably without requiring access to the signer s\nprivate key Disputes may arise when a signer tries to repudiate a signature it did create or when a forger makes a fraudulent claim\nThis paper is concerned with asymmetric digital signatures schemes with appendix Asym\nmetric means that each entity selects a key pair consisting of a private key and a related public key The entity maintains the secrecy of the private key which it uses for signing messages and makes authentic copies of its public key available to other entities which use it to verify signatures\nAppendix means that a cryptographic hash function is used to create a message digest of the message and the signing transformation is applied to the message digest rather than to the message itself\nSecurity Ideally a digital signature scheme should be existentially unforgeable under chosen message attack This notion of security was introduced by Goldwasser Micali and Rivest Informally it asserts that an adversary who is able to obtain entity A s signatures for any messages of its choice is unable to successfully forge A s signature on a single other message\nApplications Digital signature schemes can be used to provide the following basic cryptographic services data integrity the assurance that data has not been altered by unauthorized or unknown means data origin authentication the assurance that the source of data is as claimed and non repudiation the assurance that an entity cannot deny previous actions or commitments Digital signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication e g FIPS ISO IEC and Blake Wilson and Menezes authenticated key transport e g Blake Wilson and Menezes ANSI X and ISO IEC and authenticated key agreement e g ISO IEC Di e van Oorschot and Wiener and Bellare Canetti and Krawczyk\nClassification The digital signature schemes in use today can be classi ed according to the hard underlying mathematical problem which provides the basis for their security\nInteger Factorization IF schemes which base their security on the intractability of the inte ger factorization problem Examples of these include the RSA and Rabin signature schemes\nDiscrete Logarithm DL schemes which base their security on the intractability of the or dinary discrete logarithm problem in a nite eld Examples of these include the ElGamal\nSchnorr DSA and Nyberg Rueppel signature schemes\nElliptic Curve EC schemes which base their security on the intractability of the elliptic curve discrete logarithm problem\nThe Digital Signature Algorithm DSA\nThe DSA was proposed in August by the U S National Institute of Standards and Technology\nNIST and was speci ed in a U S Government Federal Information Processing Standard FIPS\ncalled the Digital Signature Standard DSS The DSA can be viewed as a variant of the\nElGamal signature scheme Its security is based on the intractability of the discrete logarithm problem in prime order subgroups of Z p\nDSA Domain Parameter Generation Domain parameters are generated for each entity in a particular security domain See also the note below on secure generation of parameters\nSelect a bit prime q and a bit prime p with the property that q j p Select a generator g of the unique cyclic group of order q in Z p Select an element h Z p and compute g h p q mod p Repeat until g Domain parameters are p q and g\nDSA Key Pair Generation Each entity A in the domain with domain parameters p q g does the following\nSelect a random or pseudorandom integer x such that x q Compute y gx mod p\nA s public key is y A s private key is x\nDSA Signature Generation To sign a message m A does the following\nSelect a random or pseudorandom integer k k q Compute X gk mod p and r X mod q If r then go to step\nCompute k mod q\nCompute e SHA m Compute s k fe xrg mod q If s then go to step A s signature for the message m is r s\nDSA Signature Verification To verify A s signature r s on m B obtains authentic copies of A s domain parameters p q g and public key y and does the following\nVerify that r and s are integers in the interval q Compute e SHA m\nCompute w s mod q\nCompute u ew mod q and u rw mod q\nCompute X gu yu mod p and v X mod q\nAccept the signature if and only if v r\nSecurity Analysis Since r and s are each integers less than q DSA signatures are bits in size The security of the DSA relies on two distinct but related discrete logarithm problems One is the discrete logarithm problem in Z p where the number eld sieve algorithm see Gordon and Schirokauer applies this algorithm has a subexponential running time More precisely the expected running time of the algorithm is\nO exp c o lnp ln ln p\nwhere c and lnn denotes the natural logarithm function If p is a bit prime then the expression represents an infeasible amount of computation thus the DSA using a bit prime p is currently not vulnerable to this attack The second discrete logarithm problem works to the base g given p q g and y nd x such that y gx mod p For large p e g bits the best algorithm known for this problem is Pollard s rho method and takes aboutp\nq\nsteps If q then the expression represents an infeasible amount of computation thus the DSA is not vulnerable to this attack However note that there are two primary security parameters for DSA the size of p and the size of q Increasing one without a corresponding increase in the other will not result in an e ective increase in security Furthermore an advance in algorithms for either one of the two discrete logarithm problems could weaken DSA\nSecure Generation of Parameters In response to some criticisms received on the rst draft\nsee Rueppel et al and Smid and Branstad FIPS speci ed a method for generating primes p and q veri ably at random This feature prevents an entity e g a central authority generating domain parameters to be shared by a network of entities from intentionally constructing\nweak primes p and q for which the discrete logarithm problem is relatively easy For further discussion of this issue see Gordon FIPS also speci es two methods based on DES and SHA for pseudorandomly generating private keys x and per message secrets k FIPS mandates the use of these algorithms or any other FIPS approved security methods\nFinite Fields\nWe provide a brief introduction to nite elds For further information see Chapter of Koblitz\nor the books by McEliece and Lidl and Niederreitter\nA nite eld consists of a nite set of elements F together with two binary operations on F\ncalled addition and multiplication that satisfy certain arithmetic properties The order of a nite\neld is the number of elements in the eld There exists a nite eld of order q if and only if q is a prime power If q is a prime power then there is essentially only one nite eld of order q this\neld is denoted by Fq There are however many ways of representing the elements of Fq Some representations may lead to more e cient implementations of the eld arithmetic in hardware or in software\nIf q pm where p is a prime and m is a positive integer then p is called the characteristic of Fq and m is called the extension degree of Fq Most standards which specify the elliptic curve cryptographic techniques restrict the order of the underlying nite eld to be an odd prime q p or a power of q m In x we describe the elements and the operations of the nite eld Fp In x elements and the operations of the nite eld F m are described together with two methods for representing the eld elements polynomial basis representations and normal basis representations\nThe Finite Field Fp\nLet p be a prime number The nite eld Fp called a prime eld is comprised of the set of integers\nf p g\nwith the following arithmetic operations\nAddition If a b Fp then a b r where r is the remainder when a b is divided by p and r p This is known as addition modulo p\nMultiplication If a b Fp then a b s where s is the remainder when a b is divided by p and s p This is known as multiplication modulo p\nInversion If a is a non zero element in Fp the inverse of a modulo p denoted a is the unique integer c Fp for which a c\nExample The nite eld F The elements of F are f g Examples of the arith metic operations in F are\nThe Finite Field F m\nThe eld F m called a characteristic two nite eld or a binary nite eld can be viewed as a vector space of dimension m over the eld F which consists of the two elements and That is there exist m elements m in F m such that each element F m can be uniquely written in the form\na a am m where ai f g\nSuch a set f m g is called a basis of F m over F Given such a basis a eld element can be represented as the bit string a a am Addition of eld elements is performed by bitwise XOR ing the vector representations The multiplication rule depends on the basis selected\nThere are many di erent bases of F m over F Some bases lead to more e cient software or hardware implementations of the arithmetic in F m than other bases ANSI X permits two kinds of bases polynomial bases discussed in x and normal bases discussed in x\nPolynomial Basis Representations", "See Gordon [36] for a detailed survey of various methods for scalar multiplication."]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"801752|1230643": []} diff --git a/edge/graph_16155383.jsonl b/edge/graph_16155383.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d840a2e4f8107361f737984d4febfc990363927 --- /dev/null +++ b/edge/graph_16155383.jsonl @@ -0,0 +1,3 @@ +{"481942|7360895": ["The design of teleoperation interfaces may be influenced by a broad set of factors ranging from human to technological factors, addressed in a variety of different fields such as human\u2013computer interaction [8], [13] and human\u2013robot interaction [ 14 ]."]} +{"14046730|7360895": ["Recently robots have been produced whose appearances closely resemble humans and research on such minimal designs has started [10,4,16,18,19]."]} +{"5649579|16155383": ["A second issue is to provide adaptive support which can offer services to assist in coping with age-related impairments."]} diff --git a/edge/graph_16156203.jsonl b/edge/graph_16156203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..466e5fb34cf61ed9c9e5f9264100867ef080043a --- /dev/null +++ b/edge/graph_16156203.jsonl @@ -0,0 +1,6 @@ +{"3489319|3102110": ["This feature is very interesting since unsupervised classication is another important problem in data mining [ 6 ] and in machine learning."]} +{"6090026|8125630": ["In this paper, we develop an efficient method for mining multiple-level segment-wise periodicity in timerelated database by integration of three teclmiques: (1) data cube structure (Chaudhuri & Dayal 1997), (2) bit-mapping technique, and (3) the Apriori mining technique (Agrawal & Srikant 1994)."]} +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} +{"16066492|534755": [", Durbin et al. [1998]). For the reader interested in the research aspects of bioinformatics, the compendium edited by Salzberg et al. [1998] is recommended. The encyclopedic book by Mount [2001], is an excellent reference text. An interesting article by Luscombe et al. [2001] defining the goals of bioinformatics is certainly worth reading.", ", Durbin et al. [1998]). For the reader interested in the research aspects of bioinformatics, the compendium edited by Salzberg et al. [1998] is recommended. The encyclopedic book by Mount [2001], is an excellent reference text. An interesting article by Luscombe et al. [2001] defining the goals of bioinformatics is certainly worth reading. An aper\u00e7u of recent advances in bioinformatics appears in Goodman [2002]. Several texts in bioinformatics have been published recently."]} +{"16066492|10762348": ["2000]; a discussion of the specific problems of comparing two genomes is presented in Miller [2001]. An interesting method of entire genome comparison using suffix trees is described in Delcher et al."]} diff --git a/edge/graph_16160793.jsonl b/edge/graph_16160793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f98f9f796e384b3f33ceb1d5c759440a384d4ca0 --- /dev/null +++ b/edge/graph_16160793.jsonl @@ -0,0 +1,5 @@ +{"7844555|10606961": ["Algorithmic debugging (also called declarative debugging), \ufb01rst discussed in Shapiro\u2019s dissertation [325] with more details in [328], [402], decomposes a complex computation into a series of sub-computations to help locate program bugs."]} +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} +{"10191873|7844555": ["Fault localization techniques [31], [46] aim to locate the root cause of an error in the target program (i.e., the second step of debugging) by observing test runs."]} +{"18716551|7844555": ["A developer, then, is to inspect PUT following the order of statements in the given ranking, in the hope that the faulty statement will be encountered near the top of the ranking [26]."]} +{"7020586|7844555": ["\u2026a fault-localization literature survey by Wong and Debroy discusses 19 separate articles that explicitly address specialized CFL techniques (Wong and Debroy 2009), and many of the earlier CFL techniques are cited several hundreds of times by other scholarly work that extends the techniques\u2026", "For example, a fault-localization literature survey by Wong and Debroy discusses 19 separate articles that explicitly address specialized CFL techniques [35], and many of the earlier CFL techniques are cited several hundreds of times by other scholarly work that extends the techniques (e."]} diff --git a/edge/graph_16165999.jsonl b/edge/graph_16165999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b324188297afd1cdabb5162d0e4d312fc097540 --- /dev/null +++ b/edge/graph_16165999.jsonl @@ -0,0 +1 @@ +{"168818|1110872": ["One issue with that scheme is that it can only tell that some wireless node along the TCP connection is behaving.", "In this scheme, all wireless nodes collect the TCP timeout events.", "Specifically, packet dropping can cause huge degradation to TCP traffic due to the slow start nature of TCP [6].", "If there is no corresponding DSR route error message or ICMP destination unreachable message to some TCP timeout event, such TCP timeout is taken as being caused by some misbehaving node."]} diff --git a/edge/graph_16167709.jsonl b/edge/graph_16167709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16168112.jsonl b/edge/graph_16168112.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16168694.jsonl b/edge/graph_16168694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16169670.jsonl b/edge/graph_16169670.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16170884.jsonl b/edge/graph_16170884.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16173043.jsonl b/edge/graph_16173043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69fa78f32d276f75f2480f4ad7891e8c4bc3debd --- /dev/null +++ b/edge/graph_16173043.jsonl @@ -0,0 +1 @@ +{"18523933|10762348": ["The aims of bioinformatics, as conceived by biologists, are outlined in [10]."]} diff --git a/edge/graph_16173969.jsonl b/edge/graph_16173969.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba052af572f8d181b357f5d777962d0f7115ebb5 --- /dev/null +++ b/edge/graph_16173969.jsonl @@ -0,0 +1,2 @@ +{"716773|15166896": []} +{"8545966|987239": ["Traditional methods for matching shapes [Besl and Jain 1985; Loncaric 1998; Tangelder and Veltkamp 2004] have focused on whole-object matching, providing methods for finding models whose overall shape is similar to a query.", "Traditional methods for matching shapes [Besl and Jain 1985; Loncaric 1998; Tangelder and Veltkamp 2004] have focused on whole-object matching, providing methods for (cid:2)nding models whose overall shape is similar to a query."]} diff --git a/edge/graph_16174597.jsonl b/edge/graph_16174597.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4af91a8dbb9f85c6bc4355005c0d214336c5e874 --- /dev/null +++ b/edge/graph_16174597.jsonl @@ -0,0 +1,5 @@ +{"1986192|1819274": []} +{"10953170|1819274": ["A Survey of other robotic frameworks is presented in [6]."]} +{"18691290|1819274": ["\u2026for robotic applications and to provide abstractions that makes robotic applications both portable and reusable on di \ufb00 erent hardware platforms\u201d [3] MRDS Provides a robotic software platform supporting a wide variety of hardware devices and a set of useful tools that facilities the programming\u2026", "\u2026software development process for mobile robots and enable interaction between robots and enterprise systems using the distributed object paradigm\u201d [3] OpenRTMaist Provides e \ufb03 cient development for robotic systems by proposing a modular software structure platform and \u201csimpli\ufb01es the process of\u2026", "\u2026by simply combining selected modules\u201d [3] ASEBA \u201cAllows distributed control and e \ufb03 cient resources utilization of robots with multiprocessors\u201d [3] MARIE \u201cCreates \ufb02exible distributed components that allows developers to share, reuse, and integrate new or existing software programs for rapid\u2026", "\u2026from simulation to real robots with as little e \ufb00 ort as possible Orca \u201cEnables software reuse in robotics using component-based development\u201d [3] Miro \u201cImproves the software development process for mobile robots and enable interaction between robots and enterprise systems using the\u2026", "\u2026systems by proposing a modular software structure platform and \u201csimpli\ufb01es the process of building robots by simply combining selected modules\u201d [3] ASEBA \u201cAllows distributed control and e \ufb03 cient resources utilization of robots with multiprocessors\u201d [3] MARIE \u201cCreates \ufb02exible distributed\u2026", "\u2026components that allows developers to share, reuse, and integrate new or existing software programs for rapid robotic application development\u201d [3] and integrates other middleware in a single robot RSCA \u201cProvides real-time support for robotic applications and to provide abstractions that makes\u2026", "Mohamed et al. [3] provide a short overview of several research projects in middleware for robotics and their main objective."]} +{"16389868|18691290": ["A survey on this field and a comparison of the different projects is given in [4] and [5]."]} +{"1819274|6972141": ["[4] focused on surveying vision for mobile robot navigation, while [5] presented different robotic mapping techniques."]} diff --git a/edge/graph_16186076.jsonl b/edge/graph_16186076.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16186295.jsonl b/edge/graph_16186295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac84dc12fd6e648a6bbdb08f70f4508810e9aef1 --- /dev/null +++ b/edge/graph_16186295.jsonl @@ -0,0 +1 @@ +{"1472671|1708582": []} diff --git a/edge/graph_16186842.jsonl b/edge/graph_16186842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1618938.jsonl b/edge/graph_1618938.jsonl similarity index 100% rename from graph_1618938.jsonl rename to edge/graph_1618938.jsonl diff --git a/edge/graph_16192940.jsonl b/edge/graph_16192940.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75188a453c8c81f82c88d9b0f3fc7434abef7bcb --- /dev/null +++ b/edge/graph_16192940.jsonl @@ -0,0 +1 @@ +{"17345347|15738153": []} diff --git a/edge/graph_16194727.jsonl b/edge/graph_16194727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..933e29d0f69ca0e2c370ea3ef557b455cdc6ff51 --- /dev/null +++ b/edge/graph_16194727.jsonl @@ -0,0 +1 @@ +{"10825052|816774": ["Krauter et al. surveyed a few existing Grid resource management systems in [ 14 ].", "Facing varying situations intelligent Grid environments need different scheduling policies and algorithms to handle different kinds of tasks [ 14 ].", "One interesting implementation method is to build job scheduling services on top of Grid middleware to meet the requirements of specific applications [ 14 ]."]} diff --git a/edge/graph_16194799.jsonl b/edge/graph_16194799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3dd6fbfb6db135d1da32f6173b3f6a4ff3399fe2 --- /dev/null +++ b/edge/graph_16194799.jsonl @@ -0,0 +1,10 @@ +{"14720465|1099309": []} +{"18139161|14088200": ["An important step towards efficient manipulation and retrieval of visual media is semantic information representation [ Calic et al. 2005 ], [Bloehdorn et al., 2004]."]} +{"18139161|13365762": []} +{"5790292|50041": ["Multi-modal approaches for video classification have been surveyed in [19]."]} +{"15799718|1634674": ["Roach et al. [19] utilize a quantitative measure of the rate of change in the motion of the foreground objects along with a simple parametric camera motion model for identifying the genre of videos."]} +{"15799718|17516538": ["[22], [23] and news [24], [25] video analysis, and human action recognition [26], [27], [28]."]} +{"8112675|1634674": ["Ryoo, [111] Poppe and [139] Turaga et al."]} +{"8112675|50041": ["Brezeale and Cook [17] surveyed text, video, and audio features for classifying videos into a predefined set of genres, e.g., \" sports \" or \" comedy \" .", "Brezeale and Cook [17] surveyed text, video, and audio features for classifying videos into a predefined set of genres, e."]} +{"61557420|10397481": ["Extensive overviews of methods for summarization are presented in [153] and [239]."]} +{"61557420|192934": ["\u2026concept-based video retrieval methods, the interested reader is referred to recent books [16] [18] [19] [74] [128] [147] [199], review papers [48] [103] [140] [213] [241] [261], special issues [75] [270], and online proceedings [171], that provide further entry points into the literature on\u2026"]} diff --git a/edge/graph_16196181.jsonl b/edge/graph_16196181.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe20baee9f80d8720ea85fe6ba23536d487f574a --- /dev/null +++ b/edge/graph_16196181.jsonl @@ -0,0 +1,9 @@ +{"31027799|18050848": ["To further improve the performance of the multi-modal systems, there are several methods that propose adaptation of the fusion mechanisms (see [ 8 ] for a comprehensive list)."]} +{"1045112|1400872": ["Methods for controllingthe dynamics of recurrent neural networks through adaptive mechanisms are reviewed in Pearlmutter (1995)."]} +{"539333|1895753": []} +{"19984147|16362395": ["The most common types are EEG [10,15,41] and fMRI data [58] (examples are shown in figs.3 and 4 respectively).", "\u00a9 Springer-Verlag Berlin Heidelberg 2012\nIndex Terms: evolving neurogenetic brain cube, spatio/spectro-temporal brain data, pattern recognition, spiking neural networks, gene regulatory networks, computational neuro-genetic modelling, probabilistic modeling, personalized modeling, EEG, fMRI.", "Continuous value input data is transferred into spikes so that the current value of each input variable (e.g. pixel, EEG channel, voxel) is entered into a population of neurons that emit spikes based on their receptive fields [4-6] \u2013 fig.6a.", "Software simulations of different brain data will be conducted in the future, including: EEG pattern recognition and comparing results with previous studies of using reservoir computing [57]; EEG pattern recognition for BCI [41,48]; fMRI pattern recognition and comparison with previous studies [58].", "The Cube is spatially structured to match the spatial distribution of the EEG-, or\nfMRI- data, or both.", "Applications included moving object recognition [40,8,34], sign language recognition [52], EEG pattern recognition [48].", "EEG-, fMRI and other brain data is directly entered into the main module \u2013 the NeuCube.", "If this is a frame (a vector) of EEG data of 64 channels, for example, each channel value is entered into a population of spiking neurons from the NeuCube module that are spatially located.", "Recorded brain signals (EEG, fMRI, combined, other) can be used to build a NeuCube model in the following way:", ", using deSNN); robot control through EEG signals [41] and robot navigation [2] (e.", "There are two types of SSTD used for both training a particular NeuCube and to recall it on new data:\n(a) SSTD, measuring the activity of the brain (e.g. EEG, fMRI) when certain stimuli are presented.", "The most common types are EEG [10,15,41] and fMRI data [58] (examples are shown in figs.", "A concrete model, built with the use of the NeuCube architecture, would have a specific structure and a set of algorithms depending on the problem and the application, e.g.: classification of EEG signals; recognition of fMRI data; BCI; emotional cognitive robotics; modeling AD."]} +{"19984147|1895753": ["Models of single neurons as well as computational SNN models, along with their respective applications, have been already developed [1,5,7,35,42,64], including evolving connectionist systems and evolving spiking neural networks (eSNN) in particular [35]."]} +{"19984147|18960196": ["pixel, EEG channel, voxel) is entered into a population of neurons that emit spikes based on their receptive fields [4-6] \u2013 fig.", "Many other techniques for collecting brain spatio-temporal data exist [19,9,6]."]} +{"61651712|534755": []} +{"18715820|534755": ["A large number of computational models for GRNs have been suggested [ 20 ][21] [22] [23] [24]."]} +{"9785047|18050848": ["See Chibelushi, Deravi, and Mason (2002) for an extensive and comprehensive list.", "A more specific review of the speechbased audiovisual integration problem (speech and speaker recognition) is provided in Chibelushi et al. (2002)."]} diff --git a/edge/graph_16198650.jsonl b/edge/graph_16198650.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1619901.jsonl b/edge/graph_1619901.jsonl similarity index 100% rename from graph_1619901.jsonl rename to edge/graph_1619901.jsonl diff --git a/edge/graph_16207035.jsonl b/edge/graph_16207035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e3e2b217510df91933a9ddca96554c6a4f8205d --- /dev/null +++ b/edge/graph_16207035.jsonl @@ -0,0 +1 @@ +{"17877731|10500613": ["Based on a survey of literature (Rahm and Bernstein, 2001; Xu and Newman, 2006; Botta-Genoulaz et al., 2005; Dom\u00ednguez and Zapata, 2000) and collective industrial experience in NoE Interop (Interop, 2005) and IP Athena (Athena, 2005) we identify and characterise a set of interoperability issues in\u2026", "Hence the enterprise architecture has to take the support of the main technical middleware frameworks in a coherent way into account."]} diff --git a/edge/graph_16209841.jsonl b/edge/graph_16209841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9ceb7fa2a91fa68a6a4f21f6eca4a3d5f4eee30 --- /dev/null +++ b/edge/graph_16209841.jsonl @@ -0,0 +1 @@ +{"44138404|6664074": []} diff --git a/edge/graph_16213681.jsonl b/edge/graph_16213681.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16214623.jsonl b/edge/graph_16214623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eec4b3088102da72eb3b93c5351af670d4b82827 --- /dev/null +++ b/edge/graph_16214623.jsonl @@ -0,0 +1,9 @@ +{"32661437|1230643": []} +{"6204105|7988320": []} +{"1022282|1230643": []} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"11797493|7988320": ["We refer the interested reader to more comprehensive surveys [21, 22, 23]."]} +{"8220723|1110872": ["[36] present a survey on the various suggestions to improve TCP behavior over heterogeneous networks."]} +{"10186907|1230643": ["Moreover, controlling the transmission of sensor nodes has also been investigated in the application layer in terms of topology control [2]."]} +{"14067851|205286988": []} +{"14067851|1230643": ["It is useful for many applications, such as military, industry, agriculture, traffic control, environment or habitat monitoring and other important domain [1][2][3]."]} diff --git a/edge/graph_16214989.jsonl b/edge/graph_16214989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_162168691.jsonl b/edge/graph_162168691.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19abd582dfb01e6df43d75cdca8eda693a3ea603 --- /dev/null +++ b/edge/graph_162168691.jsonl @@ -0,0 +1,19 @@ +{"24083957|1029120": ["The most important sensorbased non-cooperative VRU safety systems have been categorized and surveyed in [11]."]} +{"14366345|10137283": ["overview of general trust management approaches can be found in [2], [3]."]} +{"30481824|3834736": ["In [6] the authors provide an extensive survey of adaptive beaconing for C-ITS."]} +{"49322393|30189749": ["In this case, we minimize transient engine operation, thus we can have direct benefits in fuel consumption and emissions since internal combustion engines are optimized over steady state operating points (constant torque and speed); see Rios-Torres and Malikopoulos (2017b) and Malikopoulos (2013). In this problem, ti , v 0 i are known upon arrival of CAV i at the CZ and ti is also specified.", "A detailed discussion of research efforts in this area can be found in Rios-Torres and Malikopoulos (2017a).", "In this case, we minimize transient engine operation, thus we can have direct benefits in fuel consumption and emissions since internal combustion engines are optimized over steady state operating points (constant torque and speed); see Rios-Torres and Malikopoulos (2017b) and Malikopoulos (2013)."]} +{"53073486|30189749": ["Alternative solutions to cooperative onramp merging onto highways can be found in [16]."]} +{"14464107|1083483": ["Because the SIoV is a combination of social and vehicular networks, evaluations need to use a selection of privacy metrics from both domains [135,136]."]} +{"14464107|14745481": ["Experience can be borrowed from reputation and trust management in social networks to support trust-based decision-making in the SIoV [113]."]} +{"14464107|17934515": ["Platooning describes the automated coupling of vehicles by electronic means, with the first vehicle taking control [86]."]} +{"29064401|17934515": ["Many of them recognize this as a problem, but some also point it out as an opportunity, claiming that automation could increase safety compared to manual driving [2].", "Driving simulation is also mentioned [2] as an important method for determining human factors issues in CACC, together with other techniques such"]} +{"42761895|12264500": []} +{"17934515|7085121": ["As an important complement to vehicular networking, wireless sensor networks (WSNs) also have been deployed along the roadside to enhance traffic safety and efficiency [41]\u2013[43]."]} +{"17934515|763939": ["Some other reviews were stated from the special aspects: such as communication protocols for green environment [24], mobility models in VANET [18], and simulators develop-"]} +{"114862052|15093118": ["For more information on conventional hand-crafted feature/cue based approaches, interested readers may refer to the following survey papers: [68,69] for lane line marking detection, [70] for road surface detection, [71,72] for vehicle detection and [73] for pedestrian detection."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"15528648|3348390": [", [4] and [44]), it is established that one of the most appropriate formats to manage context is ontology."]} +{"51882070|30399972": []} +{"51882070|8523192": []} +{"69772886|21386749": []} +{"28438802|15438029": ["Another reason to apply DRL to social vehicle swarms is because socially aware networking alone is not capable of social learning in order to analyze data or to recognize patterns [10]."]} diff --git a/edge/graph_16217621.jsonl b/edge/graph_16217621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_162183364.jsonl b/edge/graph_162183364.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92bde8d7ca11b3c337d2c7d5fe5a2c269645aada --- /dev/null +++ b/edge/graph_162183364.jsonl @@ -0,0 +1,10 @@ +{"2131526|913718": ["There is significant work on schema and ontology matching and mapping [21,6]."]} +{"24608179|14205872": ["The survey revealed that a multi-paradigm design combining multiple representation and interaction paradigms is key to address a broad range of user groups having frequent, unpredicted and sophisticated information needs [71, 87]."]} +{"39728702|14205872": []} +{"53033817|44064877": ["In standard OBDA [18], an OBDA specification P = (O,M,S) consists of an ontology O, a (relational) data source schema S, and a mappingM from S to O.", "Ontology-based data access (OBDA) is a popular paradigm to provide a high-level conceptual view of the underlying data [18]."]} +{"15395304|2398112": ["Indeed, as pointed out in Merono-Penuela et al. (2015), reasoning is one of the key mechanisms of the Semantic Web still to be used in historical research.", "A more comprehensive list of available joint initiatives of historians and computer scientists in the use of Semantic Web methods and technologies in historical research can be found in Merono-Penuela et al. (2015).", "\u2026examples of the second kind, that is, implementations of e-Culture portals, resulted mostly in webbased virtual museum applications, collecting heterogeneous contents (e.g., digital representations of paintings, music, movies, books) from various distributed sources (Merono-Penuela et al., 2015)."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} +{"53085284|13022232": ["Rowe [15] conducted a survey on both approaches."]} +{"53085284|239537": ["Geometric zooming [28] and interactive filtering [55] are two", "In the previous version of the RMLEditor, scalability was only addressed using geometric zooming [28], but interactive filtering [55] was introduced to address usability issues with large graphs (more details are available at Section 6."]} +{"52204621|44064877": ["We recall the traditional OBDA paradigm for accessing relational DBs through an ontology [22].", "The OBDA paradigm [22] has emerged as a proposal to simplify access to relational data for endusers, by letting them formulate high-level queries over a conceptual representation of the domain of interest, provided in terms of an ontology."]} +{"2700370|2281773": ["Natural Language Interfaces (NLI) [14] use NL in various forms, going from full natural language (e.", "Natural Language Interfaces (NLI) [14] use NL in various forms, going from full natural language (e.g., PowerAqua [15]) to mere keywords (e.g., NLPReduce [13]).", "Some systems integrate the UI approach in NLIs to alleviate the habitability problem [13], in which users have not a precise knowledge about what can be understood by the NLI system, and therefore can be frustrated by syntax errors or empty results.", "The novelty of SPARKLIS is to combine in an integrated fashion different search paradigms: Faceted Search (FS), Query Builders (QB), and Natural Language Interfaces (NLI).", "The important difference is that questions are built through successive user choices in SPARKLIS instead of being freely input in NLIs.", "This section explains how SPARKLIS integrates the principles of Faceted Search (FS), Query Builders\n(QB), and Natural Language Interfaces (NLI).", "A few NLI systems, like Ginseng [13], are based on a controlled NL and auto-completion to suggest the next words in a question.", "Finally, we want to avoid the habitability problem [13], found in NLIs, in which users have not a precise knowledge about what can be understood and answered by the system, and therefore can be frustrated by syntax errors or empty results.", "This makes SPARKLIS a kind of Natural Language Interface (NLI), like PowerAqua [15]."]} diff --git a/edge/graph_162183399.jsonl b/edge/graph_162183399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..107bf1a000138298bf2f1d587afe8a7f39438287 --- /dev/null +++ b/edge/graph_162183399.jsonl @@ -0,0 +1,12 @@ +{"69230801|49527603": []} +{"69230801|13475127": ["covering all things in the world, and provide all kinds of information services for supply chain enterprises over the Internet [2], [3]."]} +{"53951647|3628110": []} +{"53951647|1313790": []} +{"3639079|3628110": ["Despite providing robust approaches for securing IoT, the blockchain systems are also vulnerable [136]."]} +{"3639079|3767252": []} +{"3639079|2142482": ["Similarly, the authors in [12, 13, 14] target a comparative evaluation of intrusion detection systems."]} +{"3639079|16209841": ["The security analyses presented in [9, 10, 11] discuss and compare different key management systems and cyrptographic algorithms."]} +{"3639079|2181694": ["The energy constrained devices in IoT are vulnerable to \u201dsleep deprivation\u201d attacks by causing the sensor nodes to stay awake [36].", "5 Sleep deprivation attack Energy consumption Link layer Low-level Multi-layer based intrusion detection system [36]", "A framework for mitigating sleep deprivation attacks in wireless sensor networks is described in [36]."]} +{"3639079|9646739": []} +{"3639079|925507": ["The authors in [126] have categorized 18 use cases of blockchain, out of which four cases are for IoT."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} diff --git a/edge/graph_162183782.jsonl b/edge/graph_162183782.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22dc503e1fc0552b555a9f98985ad615ab78f714 --- /dev/null +++ b/edge/graph_162183782.jsonl @@ -0,0 +1,3 @@ +{"116402932|10435791": ["Jointly driven by a strong demand for economic and social development, the penetration of the Internet, the emergence of cloud computing and big data, the development of the Internet of Things (IoT), and rapid changes in the information environment, there has been an accelerating development of strategic breakthroughs in new-generation AI technologies; these include big data intelligence, human-machine hybrid-augmented intelligence, crowd intelligence, and cross-media intelligence [24,40,41].", "Intelligent production is the main activity of new-generation intelligent manufacturing [40,59,60], and intelligent production lines, intelligent workshops, and intelligent plants are the main carriers of intelligent production [61\u201363]."]} +{"116402932|2762484": ["The former is the value carrier of intelligent manufacturing, while the latter is the precondition and foundation for implementing intelligent manufacturing [58]."]} +{"116402932|6415369": ["With the intelligent manufacturing cloud and the Industrial Internet, integration, sharing, collaboration, and optimization can be achieved among enterprises\u2014result-ing in horizontal integration [69\u201372]."]} diff --git a/edge/graph_16219347.jsonl b/edge/graph_16219347.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9b6e9c2d060319fcf0943fc0edd7ef24bae08d3 --- /dev/null +++ b/edge/graph_16219347.jsonl @@ -0,0 +1,8 @@ +{"10668680|3540699": ["26x [7]\u2013[10], video encoding is the primary computationally intensive task with the complexity dominated by the motion-search operation."]} +{"4825470|3540699": []} +{"1837434|1236072": ["A large body of research on communication issues in mobile sensor networks has been carried out [Wang et al. 2007; Al-Karaki and Kamal 2004].", "\u2026and Reijers 2003]; time synchronization protocols [Elson and Roemer 2003; Sundararaman et al. 2005]; distributed storage services [Ratnasamy et al. 2002; Luo et al. 2007]; code deployment and reprogramming functionality [Wang et al. 2006]; and routing protocols [Al-Karaki and Kamal 2004].", "2006], and routing protocols [Al-Karaki and Kamal 2004]."]} +{"11265198|3540699": ["264/AVC intraframe encoder [3] to form the key frame bits.", "264/AVC intraframe coding [3], and our previous low-complexity single-view video encoder (denoted by Single) [6] were employed for comparisons with the proposed video encoder.", "However, to achieve higher coding efficiency, current video compression approaches usually perform complex encoding operations [3], which will consume a significant portion of the battery power in a VSN."]} +{"14315331|3540699": ["\u2026VIDEO ENCODING Implementations of current video compression standards, such as the ISO MPEG schemes or the ITU-T recommendations H.263 and H.264 [56], [57] require much more computation for the encoder than for the decoder; typically the encoder is 5\u201310 times more complex than the decoder."]} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} diff --git a/edge/graph_16223531.jsonl b/edge/graph_16223531.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16229142.jsonl b/edge/graph_16229142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a82a6ba63898763fb30a4cee98845f77593812ae --- /dev/null +++ b/edge/graph_16229142.jsonl @@ -0,0 +1,11 @@ +{"8570551|3540699": ["264/MPEG-4 AVC video coding standard [1], cannot precisely represent the arbitrary boundaries of true discontinuous motion vector fields."]} +{"22613676|396631": ["Similar to the motion vector (MV) in MCP, the disparity used in DCP is also obtained by the block matching algorithm [19].", "At the encoder, MVV and depth are independently encoded using MVC [19]."]} +{"14537727|1634674": ["[3] and most recently by Aggarwal and Ryoo [4] for a comprehensive analysis)."]} +{"14537727|14970359": ["Over the last few decades , a large number of methods have been proposed for human motion analysis (see the surveys by Moeslund et al. [1] [2] and Turaga et al. [3] and most recently by Aggarwal and Ryoo [4] for a comprehensive analysis)."]} +{"14400258|11239740": ["In ergonomic analysis, the current approaches for analyzing video sequences involves either trained observers [1] to numerically score task \u201crepetitiveness,\u201d or manually partitioning the video and annotating the video with text and estimated joint angles [2], [3], [4]."]} +{"15585951|396631": ["From Table I, compared with MVC, the mean bit-rate savings and PSNR gain of TSGP are 5.3% and 0.19 dB, respectively.", "From the experimental results, both of the proposed geometry partitioning approaches can improve the R-D performance achieved by MVC without geometry partitioning and by the simplified wedge-based geometry partitioning approach [6], especially for high bit-rate coding.", "The simulation software is based on the JMVC 6.0 reference software for the MVC extensions of H.264/MPEG-4 [10].", "The MVV and depth data are usually encoded independently using multi-view video coding (MVC) [9].", "Compared with MVC without geometry partitioning, the curves labeled by \u201cFS\u201d, \u201cTSGP\u201d and \u201cTDSGP\u201d represent the PSNR improvements achieved by the FS, TSGP and TDSGP approaches, respectively.", "TDSGP and TSGP can achieve almost\nthree-quarters and one third of the PSNR gain between the FS approach and the baseline MVC without geometry partitioning, respectively.", "Incorporating geometry partition prediction into MVC can provide about 8% bit-rate savings [3]."]} +{"7979910|7788290": ["S YSTEMS that can detect, recognize, and synthesize human motion are of interest in both research and industry due to the large number of potential applications in virtual reality, smart surveillance systems for advanced user interfaces, and motion analysis (see [1], [2], [3] for a review)."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} diff --git a/edge/graph_16233199.jsonl b/edge/graph_16233199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16237860.jsonl b/edge/graph_16237860.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b77e48ce02e7f5ec2511970295abf469174e1073 --- /dev/null +++ b/edge/graph_16237860.jsonl @@ -0,0 +1,6 @@ +{"13433189|47147736": ["In the ATM ABR context the primary concern has been to develop algorithms which adapt quickly to congestion while trying to be fair in a so-called sense [5], [13], [16]."]} +{"446992|10559330": ["INTRODUCTION\nQuality of service(QoS)provisioning in the Internethasattractedconsiderableinterestin recentyears."]} +{"153973617|10559330": []} +{"14339319|8909218": []} +{"1978019|16237860": ["To bridge these gaps, many CSPs are considering Smart Data Pricing (SDP) practices to create new revenue streams and optimize the costs of existing services [1], [2].", "One theme in these proposals is the goal of reducing peak demand on CSP networks, thus lowering CSP cost and potentially increasing revenue [2], [6].", "While SDP\u2019s different pricing proposals have great potential to reduce CSP costs [2], they also depend heavily on user behavior and consumer acceptance of SDP measures.", "This rationale, however, is increasingly invalid, with the ubiquity of smartphones and tablets driving a need for \"smarter\" services such as time or congestion based pricing, app-base pricing, sponsored pricing, and toll-free (zero-rated) access to specific applications [2].", "Similarly, an appbased pricing plan can allow providers to charge based on the bandwidth requirements of different application classes, but such pricing has privacy and network neutrality implications [2]."]} +{"7881846|10559330": []} diff --git a/edge/graph_16242473.jsonl b/edge/graph_16242473.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a53ac22e7b54cf4c8608f6215cdb044ddc191d13 --- /dev/null +++ b/edge/graph_16242473.jsonl @@ -0,0 +1 @@ +{"10866122|35897447": []} diff --git a/edge/graph_16242553.jsonl b/edge/graph_16242553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16243328.jsonl b/edge/graph_16243328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_162478.jsonl b/edge/graph_162478.jsonl similarity index 100% rename from graph_162478.jsonl rename to edge/graph_162478.jsonl diff --git a/graph_162600.jsonl b/edge/graph_162600.jsonl similarity index 100% rename from graph_162600.jsonl rename to edge/graph_162600.jsonl diff --git a/graph_1626075.jsonl b/edge/graph_1626075.jsonl similarity index 100% rename from graph_1626075.jsonl rename to edge/graph_1626075.jsonl diff --git a/edge/graph_16260792.jsonl b/edge/graph_16260792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89854044fee90f386ee07f1cbbeb8ccb8fc01cca --- /dev/null +++ b/edge/graph_16260792.jsonl @@ -0,0 +1 @@ +{"17270744|8125630": ["A Personalization Framework for OLAP Queries Ladjel Bellatreche Arnaud Giacometti Dominique Laurent \nLISI / ENSMA Patrick Marcel Universit \u00b4e de Cergy T \u00b4eleport 2, 1, av. C. Ader Pontoise, LICP \u00b4Hassina \nMouloudi 86960 Futuroscope, FRANCE Universit \u00b4e Franc\u00b8ois-Rabelais 95302 Cergy-Pontoise, de Tours, LI \nFRANCE bellatreche@ensma.fr 3, pl. Jean Jaur `es dominique.laurent@dept\u00ad 41000 Blois, FRANCE info.u-cergy.fr \n giaco@univ-tours.fr ABSTRACT OLAP users heavily rely on visualization of query answers for their interactive \nanalysis of massive amounts of data.", "A Personalization Framework for OLAP Queries Ladjel Bellatreche Arnaud Giacometti Dominique Laurent \nLISI / ENSMA Patrick Marcel Universit \u00b4e de Cergy T \u00b4eleport 2, 1, av. C. Ader Pontoise, LICP \u00b4Hassina \nMouloudi 86960 Futuroscope, FRANCE Universit \u00b4e Franc\u00b8ois-Rabelais 95302 Cergy-Pontoise, de\u2026"]} diff --git a/edge/graph_16261067.jsonl b/edge/graph_16261067.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7de17b2bd5dcb16ae1d737605c296320aeb5684f --- /dev/null +++ b/edge/graph_16261067.jsonl @@ -0,0 +1,10 @@ +{"9798903|10658846": ["Traditional approaches to control power consumption and throughput are based on slowing or shutting down system resources of a system-on-chip platform [5]."]} +{"14933478|10658846": []} +{"11823477|912956": ["Hard real-time (HRT) theory [16] has traditionally addressed the analysis of time critical systems by relying on worst-case workloads."]} +{"1024220|14441987": []} +{"4788815|912956": ["The vast majority of existing research into hard real-time scheduling on manycore systems assumes workloads to be known in advance, so that traditional scheduling analysis can be applied to check statically whether a particular taskset is schedulable on a given platform [5].", "Dynamic workloads do not necessarily follow simple periodic or sporadic task models and it is rather difficult to find a many-core system scheduling analysis that relies on more sophisticated models [5, 11].", "Usually hard real-time scheduling requires a priori knowledge of the worstcase execution time (WCET) of each task to guarantee the schedulability of the whole system [5].", "from [5]), which is performed for each core with task \u03c4l added to its taskset as long as a schedulable assignment is not found.", "The HPC community experience with these tasksets could help introducing novel workload models to many-core system schedulability analysis [5].", "If the approximate test is passed, the exact schedulability, characterised with a relatively high computational complexity [5], is performed."]} +{"10014083|912956": ["Several global and hybrid algorithms were proven optimal for scheduling asynchronous sets of implicit-deadline periodic tasks [7]."]} +{"12807360|1188683": []} +{"9574270|10658846": ["State of the art DPM policies predict the resources\u2019 idle time with stochastic or history based approaches in the operating system or the hardware [12]."]} +{"9574270|16016699": ["This challenge was one of the major motivating factors to propose a new programming paradigm called invasive computing [4]."]} +{"6039984|16016699": ["Resource-aware programming is one of the key ideas of invasive computing [31, 32], a new paradigm for resource-aware computing that integrates research on MPSoC architectures, compilers, simulation, applications, and run-time support."]} diff --git a/edge/graph_16265465.jsonl b/edge/graph_16265465.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16270029.jsonl b/edge/graph_16270029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd97738078877098f6832ef1ea580672466aec76 --- /dev/null +++ b/edge/graph_16270029.jsonl @@ -0,0 +1 @@ +{"14130903|1805048": ["| So we can do collaborative recommendation based on either the community map or association document parameter P ( z d ) (Su and Khoshgoftaar, 2009)."]} diff --git a/edge/graph_16273661.jsonl b/edge/graph_16273661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3779498072a456d6828effb94aaa75708b64ea51 --- /dev/null +++ b/edge/graph_16273661.jsonl @@ -0,0 +1,3 @@ +{"3423390|15380857": []} +{"3162405|16540884": ["Lags may occur due to technology (as in the case of automatic speech recognition or BCI), multimodal system architecture, or user differences in multimodal integration patterns (Dumas et al., 2009).", "For this reason, multiagent architectures are desirable for distributing the processes and coordinating the modalities.", "We base our discussion on the driving principles of MMI as mentioned by Dumas, Lalanne, and Oviatt (2009) as well as Jaimes and Sebe (2007).", "However multimodal \ufb01ssion may play a role in the functioning of BCIs."]} +{"11180100|9270553": ["Brain-computer interfaces (BCIs) can provide a direct communication and control channel between the brain and external devices, independent of the brain\u2019s normal output pathways of peripheral nerves and muscles ( Wolpaw et al., 2000 )."]} diff --git a/edge/graph_16278148.jsonl b/edge/graph_16278148.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f305decd665e74c9076fdf2de7c305b5e1cb3947 --- /dev/null +++ b/edge/graph_16278148.jsonl @@ -0,0 +1,6 @@ +{"14113758|45443560": ["Similarly, the coordinator nodes regularly check whether there are enough other coordinators in their neighborhood in which case they can go to sleep mode.", "For our implementations in the case study, we will follow their example."]} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} diff --git a/edge/graph_16280101.jsonl b/edge/graph_16280101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb6f668fabd2d1eb7af6d8ba29cc6fafb310d544 --- /dev/null +++ b/edge/graph_16280101.jsonl @@ -0,0 +1,10 @@ +{"12067841|14022070": [", [21, 33]), we decided to use CASA [18, 19] since (i) it provides an effective and fast algorithm for"]} +{"1944703|14022070": ["As we know, combinatorial testing (CT), a black-boxing testing technique, is widely used in combinatorial test spaces to generate an effective test suite (named CT test suite) for detecting interaction faults that are triggered by interactions among parameters in the SUT [12\u201314].", "Detailed FSCS-based and RRT-based algorithms of generating CT test suites are shown as follows."]} +{"16280101|17292349": ["RQ6: Which tools support mixed covering arrays?"]} +{"16280101|14022070": ["\u2022 Variable strength Interaction or mixed strength interaction: This is an extension to the t-wise criterion that requires t-wise interaction among a subset of parameters and q-wise interaction among the remaining parameters [44].", "RQ6: Which tools support mixed covering arrays?"]} +{"17292349|14920988": []} +{"17292349|14022070": []} +{"9982054|14022070": ["A t-way covering array, for a given a input space model, is a set of configurations in which each valid combination of factor values for every combination of t factors appears at least once [7].", "This is the most common case, and is typically realized through the use of a combinatorial structure called a covering array [7].", "We encourage readers interested in learning more broadly about this topic refer to a comprehensive survey, such as that of Nie and Leung [7].", "In practice, several empirical studies suggest that low strength coverage tends to be correlated with high statement and branch coverage [7].", "In practice, therefore, this sampling is commonly performed with techniques collectively referred to as combinatorial interaction testing, (or CIT) [5], [7].", "These studies also suggest that a majority of factor-related failures are caused by the interactions of only a small number of factors [7]."]} +{"8933889|14022070": ["Conceptually, all the t-tuples included in the seed are considered to be already covered and a new set of con\ufb01gurations are generated only to cover the rest of the valid t-tuples."]} +{"7866796|14022070": ["Building from the CA and MCA notations, the variable-strength notation VSCA (m; t, p, (v1, v2, . . ., vp), C) represents an m \u00d7 p CA or MCA of strength t containing C, which is a CA or MCA, and a subset of the p columns each of strength >t (Cohen, 2004; Nie and Leung, 2011; Yilmaz et al., 2004a).", ", vp), C) represents an m \u00d7 p CA or MCA of strength t containing C, which is a CA or MCA, and a subset of the p columns each of strength >t (Cohen, 2004; Nie and Leung, 2011; Yilmaz et al., 2004a).", "Although seful, \u201cpure\u201d computational-based strategies often do not produce ptimal results (Afzal et al., 2009; Nie and Leung, 2011).", "All rights reserved. oi:10.1016/j.jss.2011.06.004\npossible configurations would be impossible due to factors such as time, cost, and resource constraints (Cohen et al., 2007, 2008; Nie and Leung, 2011; Williams and Probert, 2002).", "Much like existing t-way strategies, generating the VS test uite can either be one-parameter-at-a-time or one-test-at-a-time Grindal et al., 2005; Nie and Leung, 2011).", "004 possible configurations would be impossible due to factors such as time, cost, and resource constraints (Cohen et al., 2007, 2008; Nie and Leung, 2011; Williams and Probert, 2002).", "Here, t indicates the interaction strength or the order of component interactions, and takes a fixed or uniform integer value greater than one (Cohen et al., 2003; Nie and Leung, 2011; Yilmaz et al., 2004a).", "As generating the t-way and VS interactions test suite is NP comlete (Cohen et al., 2003; Nie and Leung, 2011; Yilmaz et al., 2004a; u and Tai, 1998), researchers have tried various methods for onstruction."]} +{"15991147|14022070": ["However, there is no unique solution to this NP-hard problem [16-18]."]} diff --git a/edge/graph_16280711.jsonl b/edge/graph_16280711.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9506315d06bec95e043db0930eb4f25afe922519 --- /dev/null +++ b/edge/graph_16280711.jsonl @@ -0,0 +1,2 @@ +{"1473978|469744": ["As can be seen from section II, there are some issues in AR that cannot right now be solved in the general case because of technical and fundamental problems."]} +{"9403432|7360895": ["They need to have more freedom of action and be able to drive the interaction with humans."]} diff --git a/edge/graph_16287533.jsonl b/edge/graph_16287533.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16295085.jsonl b/edge/graph_16295085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16295711.jsonl b/edge/graph_16295711.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..427b7d88debffe205acf241a5f460901929ed3f6 --- /dev/null +++ b/edge/graph_16295711.jsonl @@ -0,0 +1,4 @@ +{"14973325|1077083": ["In [25], the authors present and describe the basic components that compose context-aware systems in Web services environments (see figure 1)."]} +{"9841395|1077083": ["To enable runtime changes to the system, its contexts, and their relationships, they all have their runtime representation, so that they can be manipulated and managed at runtime."]} +{"9841395|8914588": ["To enable runtime changes to the system, its contexts, and their relationships, they all have their runtime representation, so that they can be manipulated and managed at runtime.", "Our approach explicitly separates but relates the context model and the system model, so that their relationships, changes, and change impacts across the system and its contexts can be clearly captured and managed."]} +{"9841395|1113420": []} diff --git a/edge/graph_16298606.jsonl b/edge/graph_16298606.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9edfd4f26e0092deea17580d0ca326c2818db0ab --- /dev/null +++ b/edge/graph_16298606.jsonl @@ -0,0 +1,2 @@ +{"2047180|10500613": ["The definition of such a framework is a particularly challenging research issue of semantic data integration [11]."]} +{"206745338|13372227": []} diff --git a/graph_1629899.jsonl b/edge/graph_1629899.jsonl similarity index 100% rename from graph_1629899.jsonl rename to edge/graph_1629899.jsonl diff --git a/edge/graph_16311418.jsonl b/edge/graph_16311418.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c41e3112e7145825a3f9521e8b0b283808b6efff --- /dev/null +++ b/edge/graph_16311418.jsonl @@ -0,0 +1,4 @@ +{"60316651|206764452": []} +{"60316651|1029120": []} +{"52804106|6809492": ["In [3], Monmasson and Cirstea provided the overview of design techniques employed in design of various FPGA-based industrial controllers.", "Monmasson and Cirstea propose to use FPGA-based controllers designed using various optimization techniques such as A and/or pipelining in order to achieve very low latency of execution of the control algorithm in the range of microseconds, unavailable in purely programmed solutions [3].", "The case study is limited to microcontrollers as sample use of FPGAs has been covered recently elsewhere [1], [3]."]} +{"8648406|206764452": ["Applications such as traffic surveillance [6, 23], vehicle classification [8] or advanced driver assistance systems (ADAS) [10, 11, 27] are becoming more and more popular."]} diff --git a/edge/graph_16311619.jsonl b/edge/graph_16311619.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49168c6230c8ef75793bc8e9539dbf6e6be09471 --- /dev/null +++ b/edge/graph_16311619.jsonl @@ -0,0 +1,5 @@ +{"16600308|7185733": []} +{"2064114|14970359": ["It has a wide range of applications, and has gained much interest lately [12]."]} +{"2813531|16709997": ["Designers also lack a direct physical interaction with evolving shape models, which is provided naturally, for instance, by claying and carving [6]."]} +{"2857532|53680608": []} +{"39152635|53531425": []} diff --git a/edge/graph_1631222.jsonl b/edge/graph_1631222.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16312625.jsonl b/edge/graph_16312625.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16313703.jsonl b/edge/graph_16313703.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..efbbcb9bdba62d7fec5117c9423a2e469c7ca5af --- /dev/null +++ b/edge/graph_16313703.jsonl @@ -0,0 +1,26 @@ +{"2394490|3330461": ["The scheme S.4 is classified as a network-assisted link underlay solution that, based on the collected Channel State Information (CSI) and PROut selects the maximum allowed rate, R\u2217B , of the cellular link B-U2."]} +{"2394490|7644489": []} +{"52870530|16514036": []} +{"52870530|8836911": []} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"36868439|2445817": ["Surveys on service discovery protocols have been published in the literature [1], [16], [17], [18]."]} +{"206491103|3330461": ["Generally speaking, there are two D2D communication modes to reuse cellular spectrum resources [2]: underlay D2D communications and overlay D2D communications.", "In summary, underlay mode incurs a larger overhead over the control channel than overlay mode, and is expected to achieve a tighter spectrum reuse factor than overlay mode [2]."]} +{"9951503|5621151": []} +{"1841699|3330461": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"5547171|8909218": []} +{"206584313|41998167": ["A lot of MAC protocols for WSNs have been proposed in the literature, and numerous surveys on WSN MAC protocols can be found in [53], [52], and [51].", "Despite the long history of MAC/Routing protocols, Problems remain and others keep emerging with regard to the rapid growth of M2M applications [52], [53], [51], [54], [55], [56]."]} +{"206584313|1230643": ["services, as they are focused on energy efficiency, wireless networking, and protocols [14]."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"6956645|5747564": ["Supporting technologies and standards are being developed where necessary by groups such as IETF\u2019s Protocol to Access White Space database (PAWS) working group."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"7634310|25929315": ["Various works have been proposed to improve the performance of LTE networks serving MTC devices [10]."]} +{"16139052|7482876": ["Due to high mobility of vehicles, communication channels are susceptible to fast fading, whereby reliable links cannot be guaranteed [98]."]} +{"16139052|763939": ["In the literature, many research studies have been undertaken so as to provide a close-to-reality mobility model for VANETs [129,130]; however, those proposed models are suitable for only a small number of scenarios (e."]} +{"18049463|7854020": []} diff --git a/edge/graph_163159931.jsonl b/edge/graph_163159931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..666646af5cf60979ad403da6743fe31303227126 --- /dev/null +++ b/edge/graph_163159931.jsonl @@ -0,0 +1,3 @@ +{"14778584|586521": ["This algorithm is also suitable for clustering of the large datasets since it has much less computational complexity, though this complexity grows linearly by increasing of the data points [5]."]} +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} diff --git a/edge/graph_16318015.jsonl b/edge/graph_16318015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16318808.jsonl b/edge/graph_16318808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a604d8bb9d2179cc89b076cbfd7f3d9f3352db54 --- /dev/null +++ b/edge/graph_16318808.jsonl @@ -0,0 +1,34 @@ +{"5489074|10500613": []} +{"5859503|10500613": []} +{"6118758|1574374": ["A survey on schema versioning and evolution is presented in [13], whereas a categorization of the overall issues regarding evolution and change in data management is presented in [12]."]} +{"9324787|1574374": ["The long standing problems of schema evolution and versioning [14, 15] have been the subject of several research efforts surveyed in [16], and more recent approaches were proposed in [17\u201320]."]} +{"8007753|10500613": ["Rahm and Bernstein (2001) survey the approaches that use linguistic techniques to look for synonyms, machine-learning techniques to propose matches based on instance data, information-retrieval techniques to compare information about attributes, and so on.", "Rahm and Bernstein (2001) survey the approaches that use linguistic techniques to look for synonyms, machine-learning techniques to propose matches based on instance data, information-retrieval techniques to compare information about attributes, and so on. Cupid (Madhavan, Bernstein, & Rahm 2001), for example, integrates many of these approaches in an algorithm that starts by matching leaf concepts in the hierarchy and then proceeding ..."]} +{"8007753|1574374": []} +{"12403884|10500613": ["For example, we could use a matching tool to find corresponding portions of the two schema versions [32] and then use a mapping creation tool to add semantics to these correspondences [31].", "Schema matching [32] is a common first step that generates a set of syntactic correspondences between portions of two schemas."]} +{"11915082|16378248": ["Model transformations are mechanisms for establishing\u2014and re-establishing, in the presence of change\u2014the relationships among models and code [26]."]} +{"9989830|10500613": ["Various languages have been proposed for specifying these mappings [20, 25] and multiple techniques developed for creating these mappings semi-automatically [30]."]} +{"9067786|1574374": ["We can classify the different efforts, in several categories [Rodd00]: (a) evolution of object-oriented databases, mainly characterized by generalization hierarchies of classes [RaRu95, Bane87, Zica91], (b) evolution of entity-relationship diagrams, taking the special role of relationships into consideration [LiCC94], (c) schema evolution and schema versioning (a detailed survey can be found in [ Rodd95 ]), and", "[ Rodd95 ] presents a survey on schema versioning and evolution, whereas in [Rodd00] a categorization of the overall issues regarding evolution and change in data management is presented."]} +{"5311631|1574374": ["Whilst there is a large body of work into database schema evolution, it is usually more database focused thanPRISM, and focused on reconciling the database itself, or focused on minimising impacts upon applications [Roddick, 1995]."]} +{"433746|10500613": []} +{"17057460|17981371": ["This motivates the need for a review of existing RFD s, since in the literature we can only \ufb01nd analysis on some speci\ufb01c aspects, such as the types of algorithms for discovering them from data [13].", "A survey on discovery methods for RFD s is provided in [13]."]} +{"17057460|386036": ["\u2026is necessary that one of the following comparisons be true: Formally, a C o D with general comparison functions over a dataspace S can be de\ufb01ned as where Song and Chen [46] introduced differential dependencies to express constraints on attribute value differences by means of a metric distance [18].", "As an example, f can be de\ufb01ned in terms of a similarity metric (cid:6) , like for instance the edit or Jaro distances (see [18] for a survey), such that a (cid:6) b is true if a and b are \u201cclose\u201d enough w.r.t. a prede\ufb01ned threshold."]} +{"7407016|1574374": ["With the proliferation of web services \nand mash-ups, there is also a need for web application developers to query and transform XML messages."]} +{"15388913|10500613": ["Sometimes this relationship can be discovered semi-automatically [ RB01 ] but ultimately Match depends on human feedback (and hence may be partial or even inaccurate)."]} +{"1437537|8125630": ["For example, [16, 5] use a dimensional model; [4, 1, 19, 12] use an ER model, or extensions of it; [20] uses a multidimensional CDM called MAC; [10] describes a framework for data warehouse design based on its Dimensional"]} +{"59810754|10500613": ["Except for SemInt, correspondences are of 1:1-local cardinality (using the taxonomy of (Rahm and Bernstein 2001)), providing a common basis for determining match quality.", "Some of the problems were borrowed from research papers (Miller et al. 2000; Doan et al. 2001; Rahm and Bernstein 2001).", "A taxonomy of automatic match techniques and a comparison of the match approaches followed by the various systems is provided in (Rahm and Bernstein 2001).", "(Rahm and Bernstein 2001), we do not offer a formal definition of what constitutes a correct output morphism.", "The key ideas that we exploit were presented in (Rahm and Bernstein 2001; Do and Rahm 2002; Halevy et al. 2003; Kementsietsidis et al. 2003)."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} +{"8208500|10500613": ["To minimize the amount of manual post-processing, existing schema matching tools deploy various techniques surveyed in [23], such as machine learning [4], etc.", "So like the previous literature on Match [23], we do not offer a formal definition of what constitutes a correct output morphism."]} +{"2039733|10500613": ["There is a big literature on this topic, offering many different algorithms to compute correspondences [86][92]."]} +{"2039733|8125630": []} +{"2039733|913718": []} +{"14284484|10500613": ["Schema matching [22] is a common first step that generates a set of syntactic correspondences between portions of two schemas.", "Furthermore, mapping creation, although aided tremendously by modern tools that suggest (syntactic) schema matches [22] and full (semantic) mappings [21], still requires input from human experts.", "For example, we could using a matching tool to find corresponding portions of the two schema versions [22] and then use a mapping creation tool to add semantics to these correspondences [21]."]} +{"13543505|1574374": ["While these and other interesting attempts provide solid theoretical foundations and interesting methodological approaches, the lack of operational tools for graceful schema evolution observed by Roddick in [29] remains largely unsolved twelve years later."]} +{"60923968|2034384": ["Formally, this partial order defines some sort of \u201ctemporal structure\u201d which leads us to consider the evolving data as a (formal) temporal database with a temporally extended conceptual data model [14, 2]."]} +{"60923968|1574374": ["The problems of schema evolution and schema versioning support have been diffusively studied in relational and object-oriented database papers: [22] provides an excellent survey on the main issues concerned.", "The problems of schema evolution and versioning arose in the context of long-lived database applications, where stored data were considered worth surviving changes in the database schema [22]."]} +{"11257074|10500613": ["in the area of semi-automatic schema matching [14]."]} +{"14745479|13365762": ["With the attribute Features, we abstractly refer to a subset of MPEG-7 features used for indexing the images for retrieval purposes [8]."]} +{"26284671|1574374": []} +{"9047694|7193476": []} +{"14504657|1574374": ["Schema versioning is accommodated when the database allows the accessing of all data,\nboth retrospectively and prospectively, through user definable version interfaces [Roddick 1995]."]} +{"15112734|10500613": ["For example, publication title [12] contains many common words and its title pattern (\u201csurvey * approaches * * schema matching\u201d) therefore contains four terms, whereas one single word is already sufficient for [14] (\u201ciFuice\u201d) due to the uncommon acronym iFuice(1)."]} +{"15112734|386036": ["Object Matching aims at identifying object instances in (different) data sources that refer to the same real world entity (see [5] for a recent survey)."]} diff --git a/edge/graph_16319937.jsonl b/edge/graph_16319937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1632277.jsonl b/edge/graph_1632277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16323798.jsonl b/edge/graph_16323798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a1d62215e62b65d2ad0c9c30988b968481bdbe0 --- /dev/null +++ b/edge/graph_16323798.jsonl @@ -0,0 +1 @@ +{"14370320|10658846": ["Dynamic power management [ 4 ] is a powerful technique for reducing device power consumption by taking advantage of idle periods during the operation of the device."]} diff --git a/edge/graph_16324149.jsonl b/edge/graph_16324149.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97c72ee4294a32c034d78db2e23fdfb9b9078a47 --- /dev/null +++ b/edge/graph_16324149.jsonl @@ -0,0 +1,9 @@ +{"15594905|4491892": ["Particle filtering techniques have the advantage that they provide computational tractability [51], have provable convergence properties [ 12 ], and are applicable under the most general of circumstances, as there is no assumption made on the form of the density [15]."]} +{"16074310|4491892": []} +{"14909457|4491892": ["The word approximation is used in the sense that this is a \ufb01nite sample size approximation, which becomes exact as the sample size approaches in\ufb01nity, provided certain regularity conditions are met [32]."]} +{"110936820|4491892": ["lim E[ ((k)) f (s(k))p(s(k)Z(k))ds(k)]2 =0 This convergence result is due to [5] , i."]} +{"24811264|4491892": ["Under some regularity conditions the sum in (20) converges to skjk(x) as N!1 [18]."]} +{"17667350|4491892": []} +{"122590405|4491892": ["SMC approaches have the advantages of providing computational tractability [14], having provable convergence properties [9] and are applicable under the most general circumstances since there is no assumption made on the form of the density."]} +{"921880|6327434": ["Prior to [29], a GLR-based maneuver detector was proposed in [30] in a less general setting.", "The above GLR detector was proposed in [29] for fault detection and used in many MTT algorithms.", "More details were given in [29, 19]."]} +{"6713529|30443041": []} diff --git a/edge/graph_16328653.jsonl b/edge/graph_16328653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16332018.jsonl b/edge/graph_16332018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e72f51885031f8aaac4afd7d3387cec4ce7addd --- /dev/null +++ b/edge/graph_16332018.jsonl @@ -0,0 +1,3 @@ +{"3996173|10559330": []} +{"18086240|15619069": ["Current architecture-level performance models for component-based architectures, surveyed in [6] provide a foundation to build on.", "An attempt to address the first issue was made by recent efforts in the area of component-based performance engineering [6]."]} +{"12522853|15619069": ["Other proposed meta-models include CSM, PCM and KLAPER [18].", "To support modeling large applications and concurrently involve multiple developers, the PCM's model is split into five sub-models: The repository model consists of interface and component specifications.", "In order to capture the time behavior and resource consumption of a component, PCM takes four factors into account [1].", "Figure 3 gives an overview of how the structure of the resulting PCM performance model looks like.", "Model The predictions of the SPECjEnterprise2010 application are conducted using a PCM model as performance model.", "One of the most advanced component-based performance modeling languages, in terms of parametrization and tool support, is the Palladio Component Model (PCM) [18].", "The PCM model is semi-automatically extracted from a running benchmark application instance.", "PCM Figure 1: The system reconfiguration process [16] . allows modeling processing resources like, e.g., CPUs and disk drives.", "In PCM, the performance-relevant control flow of a component service is modeled as an RDSEFF.", "To derive predictions from the PCM models, we use the Simucom framework [1] that implements a queueing-network based simulation.", "In this paper, we use the PCM as architecture-level performance model since it allows to explicitly model different usage profiles and resource allocations."]} diff --git a/edge/graph_16332566.jsonl b/edge/graph_16332566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08b0d8ec7cd7e00fb7c89a26e2800aa45aabf585 --- /dev/null +++ b/edge/graph_16332566.jsonl @@ -0,0 +1,3 @@ +{"120762337|8363289": []} +{"37320380|16332566": ["Since the 1980s, quantum control theory has drawn wide interest and many powerful tools in classical control theory have been introduced to the control analysis and design of quantum systems (Mabuchi and Khaneja 2005; Dong and Petersen 2010)."]} +{"120253493|31044354": []} diff --git a/graph_2122433.jsonl b/edge/graph_16333448.jsonl similarity index 100% rename from graph_2122433.jsonl rename to edge/graph_16333448.jsonl diff --git a/edge/graph_16333689.jsonl b/edge/graph_16333689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16335158.jsonl b/edge/graph_16335158.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c45d371cdc7619913533d0b12757fd533ae3c737 --- /dev/null +++ b/edge/graph_16335158.jsonl @@ -0,0 +1,4 @@ +{"2219832|2457428": ["All group key management approaches can be divided into three main classes: centralized group key management protocol , decentralized architectures and Distributed key management protocols [8]."]} +{"8917447|1230643": ["To provide support to existent sensors in environment we considered aspects of wireless sensor networks (WSN) [7] [8].", "Although we acknowledge that our solution is not a WSN per se, we re-used concepts from this field of research such as:\n\u2022 methods for resource management, including indexing, discovery and monitoring;\n\u2022 methods for ubiquitous communication between mobile computing and stationary computing devices;\n\u2022 methods for implementing security, including confidentiality of the transferred data, authentication, authorization, and;\n\u2022 programming interfaces for mobile computing and stationary computing devices."]} +{"11572184|1230643": ["Integration of wireless sensor networks with the cloud environment requires a middleware which should have a few characteristics like energy efficiency and resource management, Quality of Service etc [5][7]."]} +{"17336376|205286988": []} diff --git a/edge/graph_16340510.jsonl b/edge/graph_16340510.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fc6c6f9be6571656a97e95f4f4005120a43ab73 --- /dev/null +++ b/edge/graph_16340510.jsonl @@ -0,0 +1 @@ +{"18003714|1386147": []} diff --git a/edge/graph_16343144.jsonl b/edge/graph_16343144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d99290e1ba8ac6deb83e485468db96e2f2f9a3a --- /dev/null +++ b/edge/graph_16343144.jsonl @@ -0,0 +1,2 @@ +{"8431047|1708582": []} +{"22424157|2840272": ["These data are used to train predictors based on linear or non-linear regressions, machine learning, or model-based methods [1], the latter being the hardest way to do prediction since they require deep insight into the observed phenomenon."]} diff --git a/edge/graph_16346221.jsonl b/edge/graph_16346221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3825ced4e573740769870d1adeea15bf31a157c6 --- /dev/null +++ b/edge/graph_16346221.jsonl @@ -0,0 +1,3 @@ +{"16408046|3241708": []} +{"45604505|1805048": []} +{"58985719|3241708": ["At the end of the period, a subset of submissions is selected, and the corresponding workers are granted the reward by the requesters [12].", "The crowdsourcing site exhibits a list of available tasks, associating with reward and time period, that are presented by requesters; and during the period, workers compete to provide the best submission [12].", "10 and less, most of the tasks are usually also offered in chunks to multiple AMT workers [12,20]."]} diff --git a/graph_1634674.jsonl b/edge/graph_1634674.jsonl similarity index 100% rename from graph_1634674.jsonl rename to edge/graph_1634674.jsonl diff --git a/edge/graph_16348520.jsonl b/edge/graph_16348520.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16352922.jsonl b/edge/graph_16352922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16354615.jsonl b/edge/graph_16354615.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b22243cb89c0fed52b3b31b7776c11aa98d76c4 --- /dev/null +++ b/edge/graph_16354615.jsonl @@ -0,0 +1 @@ +{"719883|2457428": ["These attribute-revocable ABE schemes [5], [8], [10] have the security degradation problem in terms of the backward and forward secrecy [11]."]} diff --git a/edge/graph_16358643.jsonl b/edge/graph_16358643.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92d4e617f2554f53320c27b5c73cf0f910d7c39b --- /dev/null +++ b/edge/graph_16358643.jsonl @@ -0,0 +1 @@ +{"466870|3402363": []} diff --git a/edge/graph_16362191.jsonl b/edge/graph_16362191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16362395.jsonl b/edge/graph_16362395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b9d71e51632b079327edc526217f8f0d68d6f49 --- /dev/null +++ b/edge/graph_16362395.jsonl @@ -0,0 +1,11 @@ +{"6909786|9270553": ["Specifically, EEG based BCI technologies that do not depend on peripheral nerves and muscles have received much attention as possible modes of communication for the disabled [1,2,4,5,7,8,10,11].", "Reviews of some of these technologies and developments in this area are given by Vaughan et al [10] and Wolpaw et al [11]."]} +{"18055706|9270553": []} +{"17571592|16362395": ["In their review of the literature on BCI classifiers, Lotte et al. 16 concluded that SVMs are particularly efficient, attributing the efficiency to their regularization property and immunity to the curse of dimensionality.", "While many early BCI studies satisfied this requirement, 24,38 later studies were often based on offline analyses of pre-recorded data 1 ; for example, the Lotte et al. 16 review of studies evaluating BCI signal-classification algorithms found most used offline analyses."]} +{"17571592|9270553": []} +{"17571592|192934": []} +{"38852082|9270553": ["BCI research involves four steps \u2013 signal acquisition, signal pre processing, signal classification and computer interaction [2].", "The data had been recorded on healthy subjects typing a keyboard using either their left or right index/little fingers [2]."]} +{"6456220|9270553": ["There is an increasing interest in finding new communication channels between human and environment instead of using nerves and muscles (termed as brain\u2013computer interface, BCI) (Wolpaw et al., 2000; Vaughan et al., 2003)."]} +{"460136|9270553": []} +{"550080|9270553": ["Over the last 20 years, several research groups have shown the possibility to create a new communication system, called Brain Computer Interface (BCI), which enables a person to operate computers or other devices by using only the electrical activity of the brain, recorded by electrodes placed over the scalp, without involving the muscular activity [7]."]} +{"12900122|9270553": ["Introducing EEG signal, hopes to use it for communications and environment control with no need to limbs and peripheral nerves arose [1].", "Nowadays, research groups are trying to provide such communication channels, namely Brain-Computer Interfaces, for patients suffering from severe motor control disabilities [1-3]."]} +{"23726454|9270553": ["Wolpaw [11] introduced the information transfer rate of a BCI as bits per trial (bits per decision) and bits per minute with 12 selections per minute (trial length is 5 s)."]} diff --git a/edge/graph_16364156.jsonl b/edge/graph_16364156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16367369.jsonl b/edge/graph_16367369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fb8916c868cbfe3fcc1ea18655985a2b9e0052a --- /dev/null +++ b/edge/graph_16367369.jsonl @@ -0,0 +1 @@ +{"93505312|26257441": []} diff --git a/edge/graph_16372095.jsonl b/edge/graph_16372095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e1809b4abb49c1169137b98399e1e2f5a12b82d --- /dev/null +++ b/edge/graph_16372095.jsonl @@ -0,0 +1,7 @@ +{"15131578|60455": ["The rapid expansion of the web is causing the constant growth of this information, leading to several problems: an increased difficulty of finding relevant information, extracting potentially useful knowledge and learning about consumers or individual users [1].", "Web mining is traditionally decomposed in four stages [1]: \u2022 Resource identification is the process of retrieving the intended web documents.", "It is categorized in three areas of interest: web usage mining, web structure mining and web content mining [1]."]} +{"57655880|60455": ["[7] discussed various categories of the web content mining such as text mining which is mining of unstructured texts and multimedia data mining which is mining of multiple types of data such as unstructured and image data."]} +{"57655880|3102110": ["The machine learning and data mining [20] techniques are common used."]} +{"16216683|10500613": []} +{"8359013|60455": ["cluster6 \u21d2 / \u0303prof07 [3, 86] User prof07 provides over eighty percent of / \u0303prof07 \u21d2 cluster 7 [10, 59] administration pages, however more than", "177 \u21d2 cluster7 [3,52] CS building are for general information.", "Web Mining is categorized into three categories according to what part of the web is mined [1, 2]: Web Content Mining [3], which focuses on the discovery of useful information from the Web contents; Web Structure Mining [4], which attempts to discover the model underlying the link structure of the Web; and 1 For privacy reasons, the user information from the www.cs.dal.ca data is anonymized.", "Web Mining is categorized into three categories according to what part of the web is mined [1, 2]: Web Content Mining [3], which focuses on the discovery of useful information from the Web contents; Web Structure Mining [4], which attempts to discover the model underlying the link structure of the Web; and Web Usage Mining [5], which attempts to discover knowledge from the data generated by the", "Association Rules Rules in plain language cluster5 \u21d2 / \u0303prof11 [3, 51] A majority of Java programming pages are", "The general area of Web Mining is typically divided into the sub-areas of:\n\u2013 Web Content Mining, which is concerned with the content of Web pages, \u2013 Web Stucture Mining, concerned with the link structure of the Web, and \u2013 Web Usage Mining, concerned with the patterns of user behaviour when\nusing the Web.", "For example, the knowledge about user profiles is considered to be a part of Web usage mining [3] and it is hard to learn something useful about user profiles without consulting the content of the visited pages.", "224 \u21d2 cluster7 [3,53] / \u0303prof10 \u2227 afternoon \u21d2 cluster7 [1,53] A majority of accesses to user prof10 \u2019s"]} +{"967595|3102110": ["Interested readers should consult references such as [33; 24]."]} +{"60762696|60455": ["Web content mining focuses on the discovery of useful information from the web contents ( Kosala and Blockeel, 2000 ).", "schema, type hierarchy, useful/frequent sub-structure, as well as setting up multilevel databases ( Kosala and Blockeel, 2000 )."]} diff --git a/edge/graph_16374808.jsonl b/edge/graph_16374808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16378248.jsonl b/edge/graph_16378248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4108cca662775e0cee8ee6152134daa9e64b4062 --- /dev/null +++ b/edge/graph_16378248.jsonl @@ -0,0 +1,5 @@ +{"15773851|6695790": ["However, one can easily specify two different metamodels and their interrelationships within the same type graph, as shown in [5]."]} +{"15137123|206778272": ["A result of this work is the capability to perform model refactoring rapidly using user-specified transformation rules."]} +{"3217787|18794279": ["\u2026AI systems [Biermann 1976], production systems \n[Davis and King 1975], expert sys- tems [Michie 1979, 1981], verification sys- tems [Igarashi et al. \n1975], data structure selection systems [Low 1978; Schonberg et al. 1979], or general software development \nenvironments [Hesse 1981; Hiinke 1981].", "1975], data structure selection systems [Low 1978; Schonberg et al. 1979], or general software development environments [Hesse 1981; Hiinke 1981]."]} +{"3217787|53531425": ["It is difficult to contrast transformation systems to related systems such as general AI systems [Biermann 1976], production systems [Davis and King 1975], expert systems [Michie 1979, 1981], verification systems [Igarashi et al.", "\u2026This Survey It is difficult to contrast \ntransformation systems to related systems such as general AI systems [Biermann 1976], production systems \n[Davis and King 1975], expert sys- tems [Michie 1979, 1981], verification sys- tems [Igarashi et al. \n1975], data structure selection systems [Low\u2026"]} +{"2295796|239537": []} diff --git a/edge/graph_16378550.jsonl b/edge/graph_16378550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32f39a6be8465acdd68880217c0e87318c694a7a --- /dev/null +++ b/edge/graph_16378550.jsonl @@ -0,0 +1,13 @@ +{"206491103|3330461": ["Generally speaking, there are two D2D communication modes to reuse cellular spectrum resources [2]: underlay D2D communications and overlay D2D communications.", "In summary, underlay mode incurs a larger overhead over the control channel than overlay mode, and is expected to achieve a tighter spectrum reuse factor than overlay mode [2]."]} +{"64428928|3330461": []} +{"206490982|7644489": []} +{"7110131|8909218": ["To keep up with the surging demand, small cells densely deployed underlying the conventional homogeneous macrocell network have been proposed to create the dual bene\ufb01ts of higher quality links and more spatial reuse [18], [19]."]} +{"42394375|7644489": ["received a great deal of attention recently because a good quality of D2D service can be provided to users only when it is done correctly [1], [6].", "By contrast, in proximity-beacon-based discovery schemes, D2D users find their nearby peers using predefined proximity beacons1 [1], [3], [9]\u2013[11].", "While the D2D service is similar to conventional ad hoc networks, it is more practical and efficient because the whole process of communication can be managed by BSs [1].", "[1] \u201cCisco visual networking index: Global mobile data traffic forecast update,\u201d Cisco Syst.", ", time) for beacon transmission is allocated periodically, such that each user transmits beacons periodically [1], [3].", "By adopting the D2D service, excessive load imposed on BSs can be reduced, and new location-based services can be provided, all of which holds attraction for service providers and operators of MCSs [5].", "Base stations (BSs) of mobile communications systems (MCSs) in the current topology will very soon experience difficulties in processing the resulting huge volume of data traffic.", "Recently, MCSs have begun to adopt device-to-device (D2D) services in which direct communications between users are enabled to address the problems described earlier [1]\u2013[3]."]} +{"28588833|3330461": ["Device-to-device (D2D) communication, as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage, can enormously reduce the cost and burden on the base station (BS) [4]\u2013[6]."]} +{"28588833|7644489": []} +{"10351640|3330461": ["2442975 device-to-device (D2D) communication [1]\u2013[3]."]} +{"47348741|8909218": []} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"644671|17109970": ["In [14], a number of noncooperative power control games for resource allocation in code-division multiple-access networks with emphasis on EE were presented, where the users can choose their uplink receivers, transmission rates, and carrier-allocation strategies, in addition to choosing their transmit powers."]} diff --git a/edge/graph_16382890.jsonl b/edge/graph_16382890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6bece6c771e37f558dfd8ced81de806398bd2775 --- /dev/null +++ b/edge/graph_16382890.jsonl @@ -0,0 +1,4 @@ +{"1881691|1230643": ["[1] I.", "Introduction: A wireless sensor network [1], consisting of a large number of small low cost devices called sensor nodes or motes [2]."]} +{"13949735|1230643": []} +{"13564985|1230643": ["Depending on the application, the number may reach an extreme value of millions [7].", "5 hours (if no power management techniques would be applied) [7].", "The current generation of sensor platforms uses about 2 \u03bcJ per bit of data transmitted [7]."]} +{"15053215|1230643": []} diff --git a/edge/graph_16387640.jsonl b/edge/graph_16387640.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d3e41f283eba4e38471ea5c88cb966dd2a5472a --- /dev/null +++ b/edge/graph_16387640.jsonl @@ -0,0 +1,9 @@ +{"8227705|17474643": ["Interested readers can find a thorough survey and taxonomy of architectures and application brokering mechanisms across multiple clouds in an article by Grozev and Buyya [2012]. Their work is mostly focused on application-specific brokering mechanisms and can be positioned as a part of a broader view of interconnected cloud environments presented in this article."]} +{"46434649|11608263": ["\u2026of D is defined as follows:\nLC(D) = \u2211 =\nD\ni\ni Y\nD 1\n1 and LD(D) = \u2211\n=\nD\ni\ni\nL\nY\nD 1\n1\nThe label cardinality of D is the average number of labels of the examples in D, and the label density of D is the average number of labels of the examples in D divided by |L| (Tsoumakas and Katakis, 2007).", "The affect can be analyzed through two concepts, namely label cardinality and label density, introduced in Tsoumakas and Katakis (2007).", "for multi-label classification, might be problematic since it may lead to data sets with a large number of classes and few examples per class (Tsoumakas and Katakis, 2007).", "Let D be a multi-label test data set with |D| multi-label examples (xi, Yi) where i = 1\u2026|D| and Yi subset of L; let H be a multi-label classifier and Zi = H(xi) be the set of labels predicted by H for xi (Tsoumakas and Katakis, 2007).", "|D| and Yi subset of L; let H be a multi-label classifier and Zi = H(xi) be the set of labels predicted by H for xi (Tsoumakas and Katakis, 2007).", "The following metrics (Tsoumakas and Katakis, 2007) were used for performance evaluation: (1) Hamming Loss (Schapire and Singer, 2000), (2) accuracy, (3)", "The label combination approach that we follow, for multi-label classification, might be problematic since it may lead to data sets with a large number of classes and few examples per class (Tsoumakas and Katakis, 2007).", "Problem transformation methods force the learning problem into the traditional single-label classification where algorithm adaptation methods adapt an algorithm to directly perform multi-label classification (Tsoumakas and Katakis, 2007).", "The following metrics (Tsoumakas and Katakis, 2007) were used for performance evaluation: (1) Hamming Loss (Schapire and Singer, 2000), (2) accuracy, (3) precision, and (4) recall (Godbole and Sarawagi, 2004)."]} +{"42226543|16387640": ["Furthermore, network interactions are more and more encrypted by default, which renders DPI-based observation unpractical [104].", "Especially technologies from web information systems have contributed to this success because of widespread availability on numerous platforms [104].", "Today\u2019s web and cloud architectures are built upon many heterogeneous technologies: TCP/IP and HTTP as transport mechanism; Hypertext Markup Language (HTML), JavaScript Object Notation (JSON), and XML to encode structured information; numerous media types; and interactivity through JavaScript [104].", "Call argument data is serialized according to an agreed-upon data serialization method and typically has an individual media type in web-oriented RPC frameworks used in today\u2019s PaaS or SaaS clouds [104].", "In this section, based on the review of monitoring literature and a survey of communication technologies [104], we enumerate potential observation points to monitor for service failures, errors, or symptoms for assessing the security and, in general, quality of a service in cloud delivery models.", "Communication protocols for information exchange in today\u2019s computer networks are layered; in particular, we consider the Transmission Control Protocol (TCP)/Internet Protocol (IP) stack [177] as the state of the art for network communication between clients and cloud services [104].", "web applications, mashups, apps, mobile devices, and enterprise-grade services [104].", "A middleware interconnects heterogeneous systems and services for integration purposes, and various types of middleware do exist in cloud computing [104].", "We focus specifically on XML, a semistructured language and essential for many protocols in today\u2019s web and cloud services [104].", ", asynchronous JavaScript and XML (AJAX) [69] in web applications or SOAP in web services [104]."]} +{"42226543|2294541": []} +{"58268333|11741610": []} +{"58268333|6159806": ["to composite web services [71, 171] is evident, so that methods from both sides"]} +{"207083892|6159806": ["This paper builds upon many research contributions within the area of Web service composition languages [41,42]."]} +{"3917198|17474643": ["According to [158], the term Multi-Cloud denotes the usage of multiple and independent Clouds by a client or a service.", "As the authors of [158] have correctly noted, mOSAIC can be mapped to the second category, of services.", "According [158], the brokering mechanisms are: SLA-based, i."]} +{"16287518|6159806": ["A. IBM FileNet Business Process Manager It\u2019s a comprehensive Business Process Management (BPM) suite that helps companies improve their business outcomes by addressing creation, management and optimization of processes.", "It is maintained at OASIS, having been developed by Microsoft, BEA, and IBM [25].", "However, platform-independent applications of WSC, which are implemented once and run everywhere motivate research and business communities to continue researching in the area of WSC\n0 10 20 30 40 50 60 70 80 90\n100\nAgu Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Agu\nCODE WSMT IBM FileNet Intalio|BPMS ProcessMaker BonitaSoft BPM Activiti uEngine Eclipse BPEL Oracle BPEL Process Manager ActiveMatrix BusinessWorks Orchestra Solution Silver ."]} diff --git a/graph_1639025.jsonl b/edge/graph_1639025.jsonl similarity index 100% rename from graph_1639025.jsonl rename to edge/graph_1639025.jsonl diff --git a/edge/graph_16392439.jsonl b/edge/graph_16392439.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5fd198e2ffb61b92eac6d3e65ec06645ce5be36 --- /dev/null +++ b/edge/graph_16392439.jsonl @@ -0,0 +1,9 @@ +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} +{"29963227|2398835": []} +{"29963227|13726263": []} +{"14849079|239537": ["It is an approach proposed to provide friendly presentation of data and services to smart city application users [80]."]} +{"1667692|14258620": []} +{"1667692|3646491": ["Search strategy There are two basic search strategies employed for mining frequent subgraphs [19, 35]: the depth first search (DFS) strategy and the breadth first search (BFS) strategy."]} +{"17492301|10150488": []} +{"5120196|16403716": []} +{"11217311|191396": ["See [158] for a survey."]} diff --git a/edge/graph_16393025.jsonl b/edge/graph_16393025.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16398233.jsonl b/edge/graph_16398233.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16400805.jsonl b/edge/graph_16400805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33e1371d4036753abcd43758cd997dd113442734 --- /dev/null +++ b/edge/graph_16400805.jsonl @@ -0,0 +1 @@ +{"15672111|25699143": ["The first topic investigates how to recover 3D geometry based on multiple images captured from different perspectives [4, 13]."]} diff --git a/edge/graph_16401366.jsonl b/edge/graph_16401366.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16403716.jsonl b/edge/graph_16403716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f1085c7551e88b5e1081fd8258b9ed48a86a1cd --- /dev/null +++ b/edge/graph_16403716.jsonl @@ -0,0 +1,53 @@ +{"9496737|11239740": ["We assume that the video sequence is segmented into shots, for which any of the methods found in the literature [1]\u2013[3], [8], [15] can be used.", "It is generally accepted that content analysis of video sequences requires a preprocessing procedure that first breaks up the sequences into temporally homogeneous segments called shots [1]\u2013[3], [8], [15], then condenses these segments into one or a few representative frames ( key frames ) [4], [7], [20], [23], and finally determines the relationship between shots on the basis of their audiovisual characteristics (e."]} +{"9593709|13365762": ["For example, in order to convey the desperate effort of Carolyn Burnham to sell a house in The American Beauty, the filmmaker joins many different shots of the character showing customers and different parts of the house."]} +{"5321585|13365762": []} +{"5321585|192934": []} +{"2748484|192934": ["For this example, the meanshift algorithm [41] was applied to each feature curve to segment the movie into multiple story elements, whose boundaries are marked by vertical lines."]} +{"14748066|13365762": []} +{"646474|9835525": ["F5 Edge change ratio described in [7] 192 F6 Novel feature described in section 4."]} +{"10535458|13365762": []} +{"16972177|8953108": ["Although there is extensive research on text detection from printed, scanned, or camera-recorded documents [17], [18], the effects of occlusions and the noise in instructional videos still cannot be effectively handled."]} +{"11765430|1099309": ["The use of one histogram as color descriptor for a group of frames has been accepted as the MPEG-7 standard(Sikora 2001)."]} +{"8212554|192934": ["We measure average precision performance of all parameter combinations and select the combination that yields the best performance, ~q\ufffd . Here, we use a three-fold cross validation [ 26 ] to prevent overfitting of parameters."]} +{"16269507|9835525": []} +{"16269507|11239740": ["An alternative is given in [30], where first the statistical distribution of discontinuity values within a shot is measured."]} +{"18801136|9835525": ["The performance is evaluated by the estimated quadratic coef\ufb01cient \u02c6 2 > 0, see [29] and the ratio \u03c8 [5] where | and m is the position with the lowest value in the DCD, N is the size of the DCD and i is the interval number.", "The \ufb01rst DCD feature is the quadratic coef-\ufb01cient of this parabola [29]."]} +{"7636121|11239740": []} +{"3813357|16766019": ["However, despite the fact that video was invented for more than 50 years ago and has been widely accepted as an excellent and popular tool to represent information, one can finds that it has never been an easy operation to extract or explore knowledge from video data [2], [3], [4], [5]."]} +{"11871854|15767558": []} +{"15766831|16766019": ["Nowadays, users not only want to query video sequence based on simple, non-semantic features but also require more schemes which can offer flexible and semantic meaningful queries [2]."]} +{"3705333|9835525": ["The reconstructed video sequence is generated from the video summary by substituting the missing frames by the previous frames in the summary (zero-order hold)."]} +{"3705333|10972964": ["Video summarization can be viewed as a lossy temporal compression process and a rate-distortion framework [18]\u2013[20] is well suited for solving this problem.", "Exploiting this structure, a dynamic programming (DP) solution [19], [20] is developed next."]} +{"11216940|11239740": ["1 Introduction There are many shot detection methods already proposed in past decades [1], [2].", "Only some simple solutions to this problem have been proposed in [2], [3]."]} +{"16483842|16717715": ["When CC is not available, ASR is often extracted as an important supplementary text source, which is obtainable through automatic speech recognition (Huang et al.1993; Gauvain et al.2002).", "The ASR is a mixture of the NIST-provided transcripts and the outputs from a large vocabulary, speaker independent speech recognizer with the word error rate around 30% (Huang et al.1993)."]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"195707933|192934": ["Furthermore, we are interesting in developing computable features for mid-level and high-level information, as an inter-dependent multi-level analysis is envisaged."]} +{"21535850|987239": []} +{"552176|5835346": ["We used the max fusion, average fusion, and linear weighted fusion [18] (the weight is selected according to the AP of each single modality) on the SVM outputs."]} +{"17487188|1099309": ["Energy DCT Moment 6 Motion Activity [32] 4 Face Area [17] 1 Static Attention [21] 1", "Color Color Moment 9 Color Histogram [32] 64 Dominant Color [19] 64 HSV Coherence [29] 128 Brightness 1 Image Quality 1"]} +{"4657009|11239740": []} +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} +{"8585079|7788290": ["Classical approaches to activity analysis and recognition are based on building a parametric or non-parametric model for a restricted set of pre-de\ufb01ned activities [1],[2]."]} +{"36004220|9835525": ["Through above analysis, we realize that in the whole transition period, almost all pixels intensity of corresponding feature windows always ascends for fade in and descends for fade out [15]."]} +{"3705093|9835525": ["from the video sequence, and then selecting \u201ckey frames\u201d according to some criterion from each video shot, [9], [15], [ 20 ]."]} +{"3705093|10972964": ["Exploiting this structure, a dynamic programming (DP) solution based on [30] and [27] is developed.", "The maximum distortion criterion is chosen instead of the average distortion criterion in this case, because it results in more uniformly distributed frame distortion, as is discussed in [27]."]} +{"18240752|11239740": ["A good survey of technologies for parsing digital video was given by Ahangera and Little [21]."]} +{"9987236|9835525": ["Lienhart proposes detecting fades by fitting a regression line on the frame standard deviation curve [8]."]} +{"8160907|9835525": ["In this paper, we present quantitative methods for selecting keyframes that areboth representative and discriminative."]} +{"1804165|585863": ["concentrated on comparing the computational complexity of various approaches [23].", "With the emergence of numerous SBD approaches, several excellent surveys have been presented [8], [9] [15], [21]\u2013[23]."]} +{"1804165|9835525": ["The related surveys with discussions on thresholding scheme can be found in [8], [9].", "In [8], [9], [15], [21], the performances of various approaches were evaluated.", "In [8], Lienhart identified several core techniques underlying the various SBD schemes and reviewed their roles in detecting CUTs, fades and dissolves.", "The relatively comprehensive surveys can refer to [8] and [9].", "The relatively satisfactory results have been reported in [8].", "With the emergence of numerous SBD approaches, several excellent surveys have been presented [8], [9] [15], [21]\u2013[23].", "The effectiveness of monochrome frame detection has been reported in [8], [36], and [40]."]} +{"1804165|8365617": ["Similar problems exist in the related fields, such as temporal data segmentation [63], signal segmentation [64], and image segmentation [65]."]} +{"462544|9835525": ["Examples of \u2018mined\u2019 objects are shown for a feature length film and a sitcom."]} +{"15479962|1097238": ["[3]."]} +{"2806993|15767558": ["According to the order of spatial and temporal features used, object-based segmentation methods using clustering approaches are classified into three types: segmentation with spatial priority, segmentation with temporal priority, and joint spatial and temporal segmentation in [8]."]} +{"2718362|1634674": ["There have been several previous efforts to survey this area of research [8, 9, 10, 11]."]} +{"2718362|17516538": ["This term is equivalent to other terms in the literature including \u201cbehavior\u201d [12], \u201cactivity\u201d [18], \u201caction\u201d [19], and", "There have been several previous efforts to survey this area of research [9]\u2013[12].", "[12] refer to \u201cobject behaviors,\u201d which is defined as timevarying data."]} +{"29800100|3540699": ["Referencing order and display order are decoupled as well, allowing the encoder to choose the ordering of pictures with a higher degree of flexibility [32].", "264/AVC improves the coding efficiency of gradual changes such as fades and dissolves [32].", "264/AVC video coding standard [32] performs significantly better than any prior standard in terms of coding efficiency, it can be expected that a significant amount of future video content will be encoded in this format.", "264/AVC contains a number of new coding tools compared to prior standards for digital video coding [32]."]} +{"6189414|3102110": ["We use the association analysis [7], [ 8 ] and temporal rules to enhance the performance of semantic concept detection for video data."]} +{"9921540|9045232": ["Several face detection algorithms have been proposed in the literature,[14]."]} +{"17000678|9835525": ["[4] is used to eliminate the influence of flashlight and video-in-video."]} +{"5544069|13365762": []} +{"61557420|10397481": ["Extensive overviews of methods for summarization are presented in [153] and [239]."]} +{"61557420|192934": ["\u2026concept-based video retrieval methods, the interested reader is referred to recent books [16] [18] [19] [74] [128] [147] [199], review papers [48] [103] [140] [213] [241] [261], special issues [75] [270], and online proceedings [171], that provide further entry points into the literature on\u2026"]} diff --git a/edge/graph_16404386.jsonl b/edge/graph_16404386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc42a4e459136d80b8050608d1e1eb5cb276bb0e --- /dev/null +++ b/edge/graph_16404386.jsonl @@ -0,0 +1,2 @@ +{"10715511|2746910": []} +{"10715511|11894197": ["In [1], univariate nonparametric filter techniques are split in two groups: pure model-free methods and methods based on random permutation associated to parametric tests.", "Different strategies have been proposed over the last years for feature/gene selection: filter, wrapper, embedded [1], and more recently ensemble techniques [5].", "filter methods in an extended taxonomy inspired from [1].", "According to [1], univariate methods for FS can be either parametric or nonparametric.", "1) has many common points with the one presented in [1].", "[1] also stress on the practical advantages of these methods stating that \u201ceven when the subset of features is not optimal, they may be preferable due to their computational and statistical scalability."]} diff --git a/graph_1995121.jsonl b/edge/graph_16404525.jsonl similarity index 100% rename from graph_1995121.jsonl rename to edge/graph_16404525.jsonl diff --git a/edge/graph_16406787.jsonl b/edge/graph_16406787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16412228.jsonl b/edge/graph_16412228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2140c13335e49037c71bbd6cc7fb8b8266a3a47d --- /dev/null +++ b/edge/graph_16412228.jsonl @@ -0,0 +1,5 @@ +{"14565499|8909218": ["As a result, an extensive deployment of femtocells is expected in the near future."]} +{"1314876|10837932": []} +{"6655943|7686677": ["Sleep modes are today considered one of the most promising approaches to reduce the power consumption of cellular networks [5], [6], [7], [8], [9], [10], [11], [12], [13], [14]."]} +{"17811384|7686677": ["Many theoretical studies have been performed to achieve high EE or good QoS and the balance between them [41], [50], [51]."]} +{"19441227|8909218": ["To take advantage of this usage evolution, cellular networks can integrate femtocell access points (FAPs) also known as Home evolved Node-Bs (HeNBs) [1]."]} diff --git a/edge/graph_16422199.jsonl b/edge/graph_16422199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa0f1da05c4cc5594f8af6b1cc86ca0dd4db11d9 --- /dev/null +++ b/edge/graph_16422199.jsonl @@ -0,0 +1,12 @@ +{"46567031|3348390": []} +{"18875973|14441987": ["MobiComp came into being when mobile clients appeared in 1990s such that building applications required the support of mobile networking [10] [11], mobile information access [12] and application adaptation [13]."]} +{"18875973|15640936": ["MobiComp came into being when mobile clients appeared in 1990s such that building applications required the support of mobile networking [10] [11], mobile information access [12] and application adaptation [13]."]} +{"852535|1236072": ["Proactive protocols compute routes for sensor nodes before they actually need them, while reactive protocols do so on demand [2]."]} +{"852535|1230643": ["\u2019s survey [1], \u2018\u2018."]} +{"206275366|7923075": ["However, Rakhmawati et al. (2013) remarked that 68.14% of data sources provide linked data through their SPARQL endpoints.", "There are two surveys (Rakhmawati et al. , 2013; Saleem et al. , 2015) on this approach that discuss some of the systems in query federation.", "According to the data source location, linked data querying infrastructure can be categorized as central repository and distributed repository (Rakhmawati et al ., 2013)."]} +{"7218247|14441987": ["Nevertheless, conventional search engines fail due to the reason that they implicitly assume that web content changes slowly, so that it is sufficient to index at a frequency of days, weeks, months even years."]} +{"7218247|15640936": []} +{"12605838|1142636": ["classes and properties, semantic annotation frameworks to identify and map instance data into ontology classes [21], as well as reasoning engines to infer complex facts from basic data items (e."]} +{"11413328|3348390": ["Another review on semantics for the Internet of Things [7] has also recognised resource (e.g., a sensor or an actuator) search and discovery functionality as one of the most important functionalities that are required in IoT.", "A survey on context aware computing for the Internet of Things [6] has recognised sensor search and selection as a critical task in automated sensor con\ufb01guration and context discovery processes.", "A survey on context aware computing for the Internet of Things [6] has recognised sensor search and selection as a critical task in automated sensor configuration and context discovery processes.", "Dyser is a search engine proposed by Ostermaier et al. [15] for real-time Internet of Things, which uses statistical models to make predictions about the state of its registered objects (sensors).", "This protocol has been proposed to be used in the Web of Things (WoT) domain with the objective of dealing with a massive number of web services (e.g. sensors wrapped in web services).", "Specifically, sensor search and selection techniques using context information [6] have not been explored substantially."]} +{"11413328|1775475": ["After evaluating a number of research efforts conducted in the quality of service domain relating to web services [31], mobile computing [32], mobile data collection [33], and sensor ontologies [5], we extracted the following context properties to be stored and maintained in connection with each sensor."]} +{"17320319|3348390": ["Discovering various shared knowledge on the Web is mandatory on loT[8]."]} diff --git a/edge/graph_16425448.jsonl b/edge/graph_16425448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16426065.jsonl b/edge/graph_16426065.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44643307f97ca0b5e092355a70fc48e1a1261b52 --- /dev/null +++ b/edge/graph_16426065.jsonl @@ -0,0 +1,11 @@ +{"18008565|387610": ["Hence, we focused on image processing and selected the JJ2000 library [12], a reference implementation for the jpeg2000 standard [13, 8 , 20].", "An example for a separately testable part of the IUT is the decomposition [ 8 , 20] of the image to be compressed."]} +{"16422094|8250043": ["Testing Web service under SOA calls for new techniques (Bartolini, Bertolino, Elbaum, & Marchetti, 2009; Canfora & Penta, 2009; Farooq, Georgieva, & Dumke, 2008; Sun, 2011)."]} +{"13019512|8296351": ["Catalogues with up to 30 analysis operations on feature models have been reported [5, 44].", "We estimate that this technique could be used to test, at least, 16 out of the 30 analysis operations identified in [5].", "The automated analysis of feature models deals with the computer\u2013aided extraction of information from feature models [5].", "Catalogues with up to 30 analysis operations identified on feature models are reported in the literature [5, 44]."]} +{"37294377|7165993": []} +{"37294377|14022070": []} +{"12123547|387610": []} +{"3443669|18372496": ["These faults thereby may result in behaviors or operations that are not expected by the model or specification [5].", "In practice, some patches of security protocols such as OpenSSL and OpenSSH are annually reported due to low-level implementation bugs [5]."]} +{"13048711|387610": []} +{"15272060|7165993": []} +{"14264364|880321": ["are extremely difficult [24], our \u201csimilar\u201d means that execution traces of If and Ip share a common prefix that is as long as possible."]} +{"7259091|14920988": ["For a detailed overview of symbolic execution techniques, we refer the reader to previously published surveys in the area, such as [11, 19, 32, 34]."]} diff --git a/edge/graph_16426108.jsonl b/edge/graph_16426108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8aa458f4aa392f284ca6d5c3efbdb88c0780d7e0 --- /dev/null +++ b/edge/graph_16426108.jsonl @@ -0,0 +1,4 @@ +{"5333791|2835258": ["A survey on mobility models in ad hoc networks can be found in [3], and a number of position based routing protocols are summarized in [2].", "A number of routing protocols have been proposed for MANETs during the recent years[1], [2]."]} +{"5333791|14441987": ["A number of routing protocols have been proposed for MANETs during the recent years[1], [2]."]} +{"23011737|14441987": []} +{"10343563|14441987": []} diff --git a/edge/graph_16426674.jsonl b/edge/graph_16426674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..691af27acfb643ee6662111a2dcd54333788cc27 --- /dev/null +++ b/edge/graph_16426674.jsonl @@ -0,0 +1,2 @@ +{"60964460|8649087": []} +{"11156835|192934": ["The system's complexity is low enough to allow operation on today's personal computers and other cost-effective computing platforms and the described algorithm is based on well-known feature extraction/pattern recognition concepts [13].", "The audio identification system presented here follows a general pattern recognition paradigm as described in [13]."]} diff --git a/edge/graph_164272671.jsonl b/edge/graph_164272671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16427275.jsonl b/edge/graph_16427275.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16428983.jsonl b/edge/graph_16428983.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6725b05ea8dbe7047b462b39b6068144d3508d5a --- /dev/null +++ b/edge/graph_16428983.jsonl @@ -0,0 +1,9 @@ +{"7765338|25699143": []} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"1334552|53680608": ["A recent survey [Aggarwal and Nandhakumar 1988] shows the current \nstate-of-the-art up to 1988 not only for optical flow algorithms, but also for feature-based motion algo\u00adrithms \nthat require a solution to the cor\u00adrespondence problem, and for motion and lTAs opposed to the computation \nof optical\u2026"]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"24604587|25699143": ["There has also been a lot of work on stereo vision for the recovery of dense scene structure from multiview images (e.g., [ 12 ]\u2010[14])."]} +{"33232432|25699143": []} +{"5144613|25699143": [", [13, 14, 6, 22, 18]) have been proposed in the literature (see [7, 8] for literature surveys on earlier work."]} +{"8729004|7788290": ["We will only mention a few of the more recent works on human detection here \u2013 see Gavrilla\u2019s survey [ 7 ] for older references."]} +{"41823768|53680608": ["Interested readers are referred to previous surveys by Aggarwal and Nandhakumar [1], Barron et al. [2], Otte and Nagel [16], Mitiche and Bouthemy [14], and Stiller and Konrad [23]."]} diff --git a/edge/graph_16430528.jsonl b/edge/graph_16430528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16433723.jsonl b/edge/graph_16433723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0633582d79a0bc3124a284eadb6c788654831647 --- /dev/null +++ b/edge/graph_16433723.jsonl @@ -0,0 +1,9 @@ +{"14067501|10500613": []} +{"15923711|7065220": ["Related work There are numerous examples of specialized applications aimed at creating intelligent user interfaces to assist humans in specific domains (Middleton 2002).", "There are numerous examples of specialized applications aimed at creating intelligent user interfaces to assist humans in specific domains (Middleton 2002)."]} +{"12118210|10500613": []} +{"7050134|12860838": ["Defining ontology matching, mapping and alignment: There exist no clear standard for defining the terms matching, mapping, and alignment (Kalfoglou and Schorlemmer, 2003; De Bruijn et al., 2003; Choi et al., 2006)."]} +{"7050134|3821062": ["Ding and Foo (2002), in addition report that alignment is considered as links established between two ontologies, and ontology mapping is represented as conditional rules, functions, logic, or a set of tables and procedures.", "Hence as Ding and Foo (2002), already concluded in their study, human experts are an essential part of the mapping process."]} +{"14664554|10500613": ["We also consider, as [28], hybrid and composite matchers, at combining matcher level.", "Different approaches to the matching problem have been proposed in the literature, see for example [28][30] and [31] for a taxonomy of the past approaches.", "[28] distinguishes between individual and combining matchers.", "As in [28], we distinguish between individual and combining matchers.", "Then, as [28], we distinguish between element-level matcher and structure level matcher.", "The previous work of [28], [30] and [31] present a broad overview of the various approaches on automated ontology matching, classifying the mapping approaches in terms of input and techniques utilized in the mapping process."]} +{"14664554|913718": ["[31] introduces new criterias which are based on (i) general properties of matching techniques, i.", "The previous work of [28], [30] and [31] present a broad overview of the various approaches on automated ontology matching, classifying the mapping approaches in terms of input and techniques utilized in the mapping process.", "Different approaches to the matching problem have been proposed in the literature, see for example [28][30] and [31] for a taxonomy of the past approaches.", "At the element-level we consider, according to [31], semantic and external matchers."]} +{"18880610|16540884": ["One of the conclusions from [7] leaves further space for improvements: \"most researchers process each channel (visual, audio) independently, and multimodal fusion is still in its infancy\".", "Since [7] is more recent we will use it as a basis for further investigation in this field.", "The current state of the art in multimodal HCI is presented in [7] and [20]."]} +{"206606456|913718": ["There are many matching algorithms that are able to produce such alignments [14].", ") holding between e and e\u2032 asserted by the correspondence [14]."]} diff --git a/edge/graph_16435854.jsonl b/edge/graph_16435854.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_164361559.jsonl b/edge/graph_164361559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1644191.jsonl b/edge/graph_1644191.jsonl similarity index 100% rename from graph_1644191.jsonl rename to edge/graph_1644191.jsonl diff --git a/edge/graph_16449507.jsonl b/edge/graph_16449507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_164554550.jsonl b/edge/graph_164554550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16459638.jsonl b/edge/graph_16459638.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cdb3fea6aec1b1c358b7a14ba1812299f69d39c1 --- /dev/null +++ b/edge/graph_16459638.jsonl @@ -0,0 +1 @@ +{"10831854|61248451": []} diff --git a/graph_1646227.jsonl b/edge/graph_1646227.jsonl similarity index 100% rename from graph_1646227.jsonl rename to edge/graph_1646227.jsonl diff --git a/edge/graph_164623037.jsonl b/edge/graph_164623037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47d4abaed931dbaf2cc7ece8b9c197f705782e3b --- /dev/null +++ b/edge/graph_164623037.jsonl @@ -0,0 +1,2 @@ +{"113328510|14240886": []} +{"158021833|21459580": []} diff --git a/edge/graph_16463750.jsonl b/edge/graph_16463750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16464295.jsonl b/edge/graph_16464295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ff0e7580b90d5b8f4ef7e453320d8fe6fb4b51d --- /dev/null +++ b/edge/graph_16464295.jsonl @@ -0,0 +1,7 @@ +{"6159447|2357830": ["1 Introduction\nSecurity and privacy issues on Radio Frequency IDentification (RFID) and Electronic Product Code (EPC) technologies are gaining great importance in information security research.", "The communication channel between the components of the ID system, i.e., RFID tags and readers, is a, potentially insecure, wireless channel."]} +{"8468526|2357830": ["In general, a large number of security threats may arise within an RFID system [4][5]."]} +{"13046853|2357830": ["There are many privacy threats connected to RFID [12][13]:"]} +{"8585643|2357830": ["A lot of work has already been conducted in this area and several proposals are put forward to address the issue of privacy [9, 11, 12, 13, 14, 17, 20, 21, 22, 23, 24].", "However, as pointed out by Juels (2005), removing or killing the tags can restrict the post purchase benefits of RFID tags like receiptless item returns [11]."]} +{"21414610|2357830": []} +{"25414997|2357830": ["However, as pointed out by Juels (2005), removing or killing the tags can restrict the post purchase benefits of RFID tags like receiptless item returns [11]."]} +{"17351861|2357830": ["Despite the fact that some RFID tags are able to perform cryptographic operations because of their internal logic circuitry, the majority of RFID devices have not real capabilities for cryptanalysis functions in part due to their power constrains [8]."]} diff --git a/edge/graph_164655074.jsonl b/edge/graph_164655074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a1b4cbe02383a156201d27fc62c6256cd51f956 --- /dev/null +++ b/edge/graph_164655074.jsonl @@ -0,0 +1,2 @@ +{"148835981|27533715": ["To account for the level of agreement that could be achieved by chance (Hallgren 2012), we also reported Cohen\u2019s kappa, as shown in Equation (1).", "Kappa values indicate slight (.00 to .20), fair (.21 to .40), moderate (.41 to .60), substantial (.61 to .80), and perfect (.81 to 1.00) agreement (Hallgren 2012)."]} +{"27840787|16362395": ["In general, EEg is effective in identifying the brain activities triggered by quick stimuli in providing up to 2,000 measurements every second [8, 62]."]} diff --git a/edge/graph_16467945.jsonl b/edge/graph_16467945.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..330b3897ae9ca17c89cf27d655df7fa3fad4cd82 --- /dev/null +++ b/edge/graph_16467945.jsonl @@ -0,0 +1,2 @@ +{"1862396|54009499": ["for the lot-sizing and scheduling problem, consult the following surveys (( DK97 ) which", "of research for many years ( DK97 ) and results show that a considerable computational"]} +{"16360743|28670512": []} diff --git a/edge/graph_16471251.jsonl b/edge/graph_16471251.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4967bd655541a97cb4b8aa69ad3a7e2002a3e0e1 --- /dev/null +++ b/edge/graph_16471251.jsonl @@ -0,0 +1,2 @@ +{"18824895|1252121": ["With this scheme, an ISP may propose its rich path diversity (at least partially) to its customers, in order to perform advanced traffic engineering (e.g. fast recovery, load balancing...) based on richer and more flexible path selection policies (e.g., considering price, performance or stability\u2026"]} +{"14755256|11013798": ["For example, if there is a fiber cut in a link of an IP over alloptical multilayer network: \u2022 The outgoing photonic cross-connect (PXC) detects a loss\nof light (LoL) in all its input ports connected to the faulty fiber that carries an active channel."]} diff --git a/edge/graph_16471363.jsonl b/edge/graph_16471363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16475344.jsonl b/edge/graph_16475344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_164761030.jsonl b/edge/graph_164761030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bee1c01c2c067ef423f68df4bb14b4694a01e61c --- /dev/null +++ b/edge/graph_164761030.jsonl @@ -0,0 +1,11 @@ +{"8497188|8296351": ["Benavides et al. [37] provide state-of-the-art information on the analysis of feature models, leveraging the operations employed in model veri\ufb01cation."]} +{"8497188|627405": ["The importance of SLR for software engineering has been addressed by a reasonable amount of studies, as deeply discussed in [12\u201315]."]} +{"7259091|14920988": ["For a detailed overview of symbolic execution techniques, we refer the reader to previously published surveys in the area, such as [11, 19, 32, 34]."]} +{"785838|8742997": ["of articles Experiment [6][7][8][9][10][11][12][13][14][15] 10 Industrial Case [16][17][18][19][20][21][22] 7 Experience [23][24][25][26][27][3][28][29] 8", "10 Industrial Case [16][17][18][19][20][21][22] 7 Experience [23][24][25][26][27][3][28][29] 8 Tables IV and V provide an overview of the benefits and limitations identified in the literature review."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"59000572|19024555": []} +{"30384578|627405": ["This paper was developed considering the three phases suggested by Kitchenham [16]: planning, execution and data collection."]} +{"43413418|8742997": ["They were: (1) a SLR on fault-based mutation testing techniques and tools for Aspect-J [63], and (2) a SLR on automated acceptance testing [64]."]} +{"6880727|14920988": []} +{"6880727|8250043": []} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} diff --git a/edge/graph_16479005.jsonl b/edge/graph_16479005.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16481413.jsonl b/edge/graph_16481413.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_164835.jsonl b/edge/graph_164835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_164887589.jsonl b/edge/graph_164887589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a1ffa71b15935f701dde94c5ba2acd529727559 --- /dev/null +++ b/edge/graph_164887589.jsonl @@ -0,0 +1,20 @@ +{"21183097|6863252": []} +{"53719446|3558190": []} +{"51952604|2088679": []} +{"51952604|3761015": []} +{"54479440|2088679": []} +{"54479440|4583883": []} +{"54479440|15315731": []} +{"56486613|3558190": ["At the same time, the groundbreaking performance of convolutional neural networks in computer vision such as ImageNet(16) has led to a rapid ascent of interest in the application of deep learning to medical imaging.(17,18) In cases where the sample size is small, deep learning can be used for representation learning."]} +{"13770553|393948": ["Unlike RF approaches, which need variable specific features for classification, CNN-based methods have shown the advantages with respect to learning the hierarchy of complex features from in-domain data automatically.(31) They are usually used in image recognition systems,(24)"]} +{"52892286|2088679": []} +{"206093726|2088679": ["A recent article from Litjens et al (2017) provides an excellent review of the current trends in the application of deep learning techniques to medical image analysis."]} +{"4310374|2088679": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"31505427|17887877": ["These platforms are able to integrate large data sets of clinical information with omics data [19]."]} diff --git a/edge/graph_16489039.jsonl b/edge/graph_16489039.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16490750.jsonl b/edge/graph_16490750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5cc6f450bab3b1b0366f41b5ad7aaf72c8cd844 --- /dev/null +++ b/edge/graph_16490750.jsonl @@ -0,0 +1,2 @@ +{"17166573|870434": [", building underwater sensor networks) to enable/enhance applications such as oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications [9], [8], [2], [4], [3], [7]."]} +{"11188425|870434": ["As a promising solution to aquatic environmental monitoring and exploration, Underwater Sensor Network (UWSN) has attracted significant attention recently from both academia and industry [1], [2], [3], [4], [5]."]} diff --git a/edge/graph_16493126.jsonl b/edge/graph_16493126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8329f16d10cee9ae03eb909814b7f3e784a84e48 --- /dev/null +++ b/edge/graph_16493126.jsonl @@ -0,0 +1,2 @@ +{"88521018|1932843": []} +{"10431152|7530272": ["Because it is such a common approach, many authors already tackled TSC tasks in a feature-based fashion [27, 28, 29, 31, 34, 35]."]} diff --git a/edge/graph_16496205.jsonl b/edge/graph_16496205.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9aec2671917e6b1d9f69edd09ff5c3c428138e0 --- /dev/null +++ b/edge/graph_16496205.jsonl @@ -0,0 +1 @@ +{"2617513|62198990": []} diff --git a/edge/graph_16496984.jsonl b/edge/graph_16496984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..533a4b7a41f2f849d493690d655877ef88d9a75b --- /dev/null +++ b/edge/graph_16496984.jsonl @@ -0,0 +1,9 @@ +{"36272737|1580493": []} +{"1645630|10837932": ["In this context, network virtualization has increasingly been seen as a solution to Internet ossification (the benefits of network virtualization go beyond Internet ossification to other contexts such as green networking [2])."]} +{"26571640|2623404": []} +{"16436570|2623404": []} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"8483995|2623404": ["Hindawi Publishing Corporation Journal of Electrical and Computer Engineering Volume 2016, Article ID 4067186, 10 pages http://dx.doi.org/10.1155/2016/4067186\nThe growing trend toward implementing networking functionalities by means of software [3] on general-purpose machines and of making more aggressive use of virtualization\u2014as represented by the paradigms of Software Defined Networking (SDN) [4] andNetwork FunctionsVirtualization (NFV) [5]\u2014would also not be sufficient in itself to reduce power consumption, unless accompanied by \u201cgreen\u201d optimization and consolidation strategies acting as energy-aware traffic engineering policies at the network level [6].", "As introduced in the previous section, the key enabling paradigms that will considerably affect the dynamics of ICT networks are SDN and NFV, which are discussed in recent surveys [10\u201312].", "The growing trend toward implementing networking functionalities by means of software [3] on general-purpose machines and of making more aggressive use of virtualization\u2014as represented by the paradigms of Software Defined Networking (SDN) [4] andNetwork FunctionsVirtualization (NFV) [5]\u2014would also not be sufficient in itself to reduce power consumption, unless accompanied by \u201cgreen\u201d optimization and consolidation strategies acting as energy-aware traffic engineering policies at the network level [6]."]} +{"14017373|8530790": []} diff --git a/edge/graph_165017158.jsonl b/edge/graph_165017158.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66ddd45bd868ae35d34385bfce883d206c8f74cc --- /dev/null +++ b/edge/graph_165017158.jsonl @@ -0,0 +1,6 @@ +{"16747721|16783458": ["\u2026NED University of Engr. and Tech, Karachi Pakistan hafiz nabeel91@hotmail.com\naqeelkashan@gmail.com, nomanashraf93@gmail.com mudassir.awan@hotmail.com,mkhurrum@neduet.edu.pk mkhurrum@neduet.edu.pk\nof which is Pacini Corpuscle under the class of RAII, lays 2mm beneath the surface of the skin."]} +{"12698719|14485408": []} +{"2995304|56144874": ["Further, the compensatory task itself ensures that any absolute cues that the participant receives come from auxiliary feedback and removes the ability of the participant to succeed without paying attention to the referred feedback by eliminating feed-forward control.", "There exists a large body of literature related to analysis of tracking results, placing many techniques at our disposal [11], [13]."]} +{"8908491|16783458": ["Tactile display devices can mainly be classified into four categories: mechanotactile devices, vibrotactile devices, electrotactile devices, and thermal devices [3]."]} +{"8530306|16783458": []} +{"52878874|7370231": []} diff --git a/edge/graph_16502294.jsonl b/edge/graph_16502294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a6546614a7a9389ec65611d8b63054bc10dc1497 --- /dev/null +++ b/edge/graph_16502294.jsonl @@ -0,0 +1,4 @@ +{"54913236|3330313": ["The outlier analysis, in its simplest form, is implemented by assuming that the underlying features follow a normal distribution (for more rigorous treatment about modeling the distribution of outliers, one may refer to [25]).", "An outlier analysis, in its simplest form, is implemented by assuming that the underlying features follow a normal distribution (for more rigorous treatment about modeling the distribution of outliers and other approaches, one may refer to [25])."]} +{"110079673|206051485": ["Image registration [21] is a method of aligning two or more images taken at different times, from different viewpoints or by using different imaging devices, after application of the geometric transformations."]} +{"55053462|3330313": ["An outlier analysis has been implemented, which assumes that the underlying features follow a normal distribution (Hodge and Austin, 2004)."]} +{"55053462|206051485": ["The methods in direct alignment can be grouped into three themes: the Correlation-like, Fourier and Mutual information methods (Zitov\u00e1 and Flusser, 2003).", "Image registration is also applied in other areas of study, such as medical imaging and remote sensing (Zitov\u00e1 and Flusser, 2003).", "The figure and modified caption are taken from Zitov\u00e1 and Flusser (2003).", "The correlation-like methods have two drawbacks, which are the flatness of the similarity measure maxima and high computational complexity (Zitov\u00e1 and Flusser, 2003)."]} diff --git a/edge/graph_16502474.jsonl b/edge/graph_16502474.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16502602.jsonl b/edge/graph_16502602.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1651267.jsonl b/edge/graph_1651267.jsonl similarity index 100% rename from graph_1651267.jsonl rename to edge/graph_1651267.jsonl diff --git a/edge/graph_16514036.jsonl b/edge/graph_16514036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45798767f2a73b9398115d37b01e7146bc0ba3e6 --- /dev/null +++ b/edge/graph_16514036.jsonl @@ -0,0 +1 @@ +{"196177|8777381": ["\u2026of these stimuli cannot be predicted from a single acoustic\u2013perceptual parameter in speech, but rather, require attention to multiple cue changes over time (e.g., changes in relative pitch height and variation, voice quality, speech rate, and amplitude, Banse and Scherer, 1996; Scherer, 2003)."]} diff --git a/edge/graph_16515612.jsonl b/edge/graph_16515612.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_165157703.jsonl b/edge/graph_165157703.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c406cac177880797c18bc559f15b32efba7edc6 --- /dev/null +++ b/edge/graph_165157703.jsonl @@ -0,0 +1 @@ +{"34149823|12127129": ["2) Background Subtraction Background subtraction [8, 9] is a widely used approach for detecting objects from static cameras."]} diff --git a/edge/graph_16515889.jsonl b/edge/graph_16515889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b6933e2f209872536e14897874136e222f63ccd --- /dev/null +++ b/edge/graph_16515889.jsonl @@ -0,0 +1,12 @@ +{"35792789|10559330": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"2523102|2382521": ["When the target database system does not verify the input received from the user, SQL injection attacks can allow malicious users to both read and modify data [64,65].", "Simple denial of service attacks can knock them offline [88] and cross site scripting can be used to hijack legitimate users\u2019 accounts [64].", "EMIS Attack on satellite sensing Inaccurate mapping Satellite sensing countermeasures (Table 2) SQL injection and other database attacks [64,65] Inaccurate database information, breach of data confidentiality Database protection measures"]} +{"2523102|825893": []} +{"2777591|5660618": ["[8] Hespanha, J."]} +{"30166091|5660618": ["framework, in [86] on wireless control network where the entire network itself acts as the controller, in [87], [88] on decentralized control problems, the references in [72] and in [89], [90] for a survey of this field."]} +{"30166091|1236072": ["The protocol itself may be flat, hierarchical or even location-based [202]."]} +{"18543133|5747564": []} +{"17702586|9240891": ["Grandison and Sloman [5] have provided a survey of trust in Internet applications."]} +{"52807410|14697846": ["An extensive survey on P2P networks can be found in [6]."]} +{"6972118|17683338": ["TinyOS (Ramamurthy et al., 2005; Sugihara & Gupta, 2008; Omer & Kunz, 2011) originally developed by the University of California, Berkeley and Intel is one of the most popular operating systems for Wireless Sensor Networks(WSNs)."]} diff --git a/edge/graph_16516315.jsonl b/edge/graph_16516315.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a51df5de6c712f73463611de06f3d6adcb5669d --- /dev/null +++ b/edge/graph_16516315.jsonl @@ -0,0 +1 @@ +{"31006893|1582463": []} diff --git a/edge/graph_165164011.jsonl b/edge/graph_165164011.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6affaa0d60f540ba36941a4a09aa918c54de981b --- /dev/null +++ b/edge/graph_165164011.jsonl @@ -0,0 +1,6 @@ +{"152282845|165164011": []} +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} +{"86649741|4570087": ["Re-ranking technologies are widely used in image retrieval tasks [31], [32]."]} +{"4796796|15361180": ["The models for crossmodality retrieval can be classified into real-value representation and binary representation learning [43]."]} +{"7693739|12127129": ["Some of these topics include moving target detection, which has been dealt with in surveillance using background subtraction techniques [Piccardi 2004]; people tracking, which exploits time coherency to follow the same object/person along time and space [Yilmaz et al. 2006]; and people detection by\u2026", "DOI: http://dx.doi.org/10.1145/2543581.2543596"]} +{"7693739|6644671": []} diff --git a/edge/graph_16520440.jsonl b/edge/graph_16520440.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b50b10b678f125c2715ef3b8a1e92d19e365232e --- /dev/null +++ b/edge/graph_16520440.jsonl @@ -0,0 +1,2 @@ +{"38416329|16362395": ["\u2026models such as linear discriminant analysis (LDA) and support vector machine (SVM) classifiers are most commonly used in BCI for classification, and heuristic optimization and search algorithms for maximizing single-trial classification performance (Lotte et al. 2007; Mason et al. 2007).", "Discriminative models such as linear discriminant analysis (LDA) and support vector machine (SVM) classifiers are most commonly used in BCI for classification, and heuristic optimization and search algorithms for maximizing single-trial classification performance (Lotte et al. 2007; Mason et al. 2007)."]} +{"29518215|6819068": []} diff --git a/edge/graph_16520749.jsonl b/edge/graph_16520749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e71d68fe6de724dd98f53e367800451f25452fd --- /dev/null +++ b/edge/graph_16520749.jsonl @@ -0,0 +1 @@ +{"17272302|8953108": []} diff --git a/edge/graph_16522577.jsonl b/edge/graph_16522577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16525678.jsonl b/edge/graph_16525678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66307cb86d2cfbe85c096f8f8b4dd512da3082ac --- /dev/null +++ b/edge/graph_16525678.jsonl @@ -0,0 +1,7 @@ +{"2000177|9045232": ["Compared to face detection [1], pedestrian detection has received dramatically less attention in the literature."]} +{"60716863|16525678": []} +{"60716863|1666690": []} +{"6837802|7788290": []} +{"11272177|7788290": []} +{"16169670|469744": ["A key use of such a system is as a solution to the registration problem of augmented reality; the estimation of the alignment between the real and virtual world [3]."]} +{"17375415|713082": ["DVE. The session model for multiuser DVEs is based on the concept of group (or multipoint) communication [ 32 ], where a group corresponds to a set of participating processes, as shown in Fig. 3. One of the main concerns for a DVE is to maintain consistency, while allowing multiple user interactions."]} diff --git a/edge/graph_16525711.jsonl b/edge/graph_16525711.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a8bb5edf6a7f6da6e1c346b8aa5173831d7700c --- /dev/null +++ b/edge/graph_16525711.jsonl @@ -0,0 +1 @@ +{"8204535|289357": ["For overviews and introductions to the field see the recent surveys by Fomin, Grandoni, and Kratsch [24], Iwama [31], Scho\u0308ning [41], and Woeginger [46, 47].", "Grandoni, and Kratsch [24], Iwama [31], Sch\u00f6ning [41], and Woeginger [46, 47]."]} diff --git a/edge/graph_16526126.jsonl b/edge/graph_16526126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16527268.jsonl b/edge/graph_16527268.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e8f208049c1082901c2c6c74bfb77de8add441d --- /dev/null +++ b/edge/graph_16527268.jsonl @@ -0,0 +1,12 @@ +{"3018373|710141": []} +{"20590250|15219853": ["Similarly in surveys dedicated to person identification based on specific modalities such as face recognition (Zhao et al, 2003), 3D face recognition (Bowyer et al, 2006), speaker identification (Bimbot et al, 2004), fingerprint recognition (Yager and Anim, 2004) and behavioural biometrics (Yampolskiy and Govindaraju, 2008) the topic of aging is not considered in detail.", "Body Movement Biometrics Body movement biometric templates fall under the general category of behavioural biometrics (Yampolskiy and Govindaraju, 2008)."]} +{"3482608|20905429": ["Categories\u00a0and\u00a0Subject Descriptors C.3 [Special\u00adPurpose \nand Application\u00adBased Systems] Signal Processing Systems J.3 [Life and Medical Sciences] Health, Medical \nInformation General\u00a0Terms Algorithms, Design, Reliability, and Verification Keywords Electrocardiogram \n(ECG), Biometrics, Wearable\u2026"]} +{"13978367|9045232": ["[37], and the overview of photometric face normalisation methods in [31]."]} +{"30539276|16760578": []} +{"61524665|1734833": ["long and healthy life [1]."]} +{"61524665|1097238": []} +{"3154215|15219853": [", retinal patterns [9], fingerprint [13], facial features [17]) could provide stable and accurate verification rate for the their trait of static, behavioral biometrics [15] have advantage over traditional biometric technologies due to their non-obtrusive."]} +{"9782125|15219853": [", [32]."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"7693282|14970359": ["A more recent, extensive survey [10] looks at more than 130 publications in computer vision-based human motion analysis and classifies them based on the issues addressed: Initialization (eight publications), tracking (48 publications), pose estimation (64 publications), and recognition (16\u2026"]} +{"7693282|7788290": []} diff --git a/edge/graph_16527482.jsonl b/edge/graph_16527482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c94c5a44172017dc3f84bdc2329536e3deff7ab --- /dev/null +++ b/edge/graph_16527482.jsonl @@ -0,0 +1 @@ +{"10922169|9913343": ["One final point - graphical passwords is an active research topic; due to space limit, some interesting work is not covered here, but can be found in a recent survey of this topic in [11]."]} diff --git a/edge/graph_16528630.jsonl b/edge/graph_16528630.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..364bda0b6cf814724b2fcd149274b2963e54b0fc --- /dev/null +++ b/edge/graph_16528630.jsonl @@ -0,0 +1,2 @@ +{"15512141|18050848": ["Such improvements have been typically demonstrated on databases of small duration, and, in most cases, limited to a very small number of speakers (mostly less than ten, and often singlesubject) and to small vocabulary tasks [18], [ 21 ].", "A number of audio-visual corpora, commonly used in the literature, are listed in Table II. Notice that most are the product of efforts by few university groups or individual researchers with limited resources, and as a result, they suffer from one or more shortcomings [18], [ 21 ], [136]: They contain a single or small number of subjects, affecting the generalizability of developed methods to the wider population; they typically have small ..."]} +{"15512141|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory, an active area of research with many applications [91] [92] [93]."]} diff --git a/edge/graph_16532505.jsonl b/edge/graph_16532505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16534280.jsonl b/edge/graph_16534280.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16534827.jsonl b/edge/graph_16534827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16540884.jsonl b/edge/graph_16540884.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80722e310b7bd04ac477938cd3ddebe34ede101f --- /dev/null +++ b/edge/graph_16540884.jsonl @@ -0,0 +1,4 @@ +{"61734383|7185733": ["(See [ 12 ] for a recent survey of visionbased AGR.) However, we use the context of the particular virtual environment to develop an appropriate set of gestural \u201ccommands.\u201d The gesture recognition is done by analyzing the sequence of images from a pair of cameras positioned such that they facilitate robust analysis of the hand images.", "These actions include hand gestures [ 12 ], lip movement [23], gaze [25]\u2010[27], facial expressions [28], and head and other body movements [29], [30].", "Whether they use a stylus or a glove or are vision based, they are still constrained to the recognition of few predefined hand movements and are burdened by cables or strict requirements on background and camera placement [ 12 ].", "The problem, such as visual interpretation of hand gestures, is still not well understood, particularly when it is desirable not to put restrictions on the hand movements for more natural HCI [ 12 ]."]} +{"1824296|14970359": ["We conclude the paper in Section IX with a summary of the novel W5 technology and recommendations for further research and tool development."]} +{"1824296|7185733": ["Toward that end we suggest an integrated system approach that can measure the corresponding perceptual and cognitive states of the user, and then can adapt the HCI in an intelligent fashion for enhanced human performance and satisfaction.", "We conclude the paper in Section IX with a summary of the novel W5 technology and recommendations for further research and tool development."]} +{"1824296|7788290": []} diff --git a/edge/graph_16544012.jsonl b/edge/graph_16544012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16549840.jsonl b/edge/graph_16549840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16554578.jsonl b/edge/graph_16554578.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..135c1baf7ac4e20f8fe785e79d9e1976888794b3 --- /dev/null +++ b/edge/graph_16554578.jsonl @@ -0,0 +1,2 @@ +{"8974506|11038925": []} +{"122907607|7064380": []} diff --git a/edge/graph_16557526.jsonl b/edge/graph_16557526.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82524ced8ab2ebc490991ee52433264353ac6bc0 --- /dev/null +++ b/edge/graph_16557526.jsonl @@ -0,0 +1 @@ +{"3150908|9907884": ["The results for the hydrogeology data were also evaluated by domain experts."]} diff --git a/edge/graph_16559155.jsonl b/edge/graph_16559155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16560403.jsonl b/edge/graph_16560403.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d4a3c3b4840854abbf466c62267b545dfe95329 --- /dev/null +++ b/edge/graph_16560403.jsonl @@ -0,0 +1 @@ +{"6385392|5473785": []} diff --git a/edge/graph_16562723.jsonl b/edge/graph_16562723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..214a63e2c94fc59036aa12a546bd774ee135864e --- /dev/null +++ b/edge/graph_16562723.jsonl @@ -0,0 +1,5 @@ +{"45660198|14038195": ["Generally, implementing AHP is based on the experience and knowledge of the experts or users to determine the factors affecting the decision process (Ho 2008; Dweiri and Al-Oqla 2006).", "AHP can be combined with techniques such as quality function deployment (QFD), and data envelopment analysis (DEA), and thus integrated it can be applied to a wide variety of fields especially in the logistic and manufacturing areas (Ho 2008)."]} +{"7281991|1437067": ["Classification rules are useful for solving medical problems and have been applied particularly in the area of medical diagnosis [5]."]} +{"10396770|14038195": ["Further determination of medical record economy and efficiency requires a more probing analysis undertaken by a well-planned operational auditing program [1]."]} +{"22291620|14038195": ["However, it was not until early 2000 before it became widely used and studied and translational research publications have been increasing significantly. Additionally, several programs have been initiated to better understand and evaluate translational research and its impact on healthcare outcomes. The National Institute of Health (NIH) managers explicitly made translational research a central priority in their 2003 medical research roadmap (Zerhouni, 2003). As a way to accelerate translational research, NIH staff launched the Clinical and Translational Science Award (CTSA) program in 2006. Currently, there are 62 US academic and medical institutions that receive support from the CTSA. Although there have been over 5,000 publications during 2010 in diverse domains across the translational research spectrum, there is still little agreement on how to measure impact on healthcare outcomes. Poor evaluation and tracking in translational research occurs because it took long to move from basic research to clinical practice; i.e., 17 years for new discoveries to become practiced regularly and just 14% enter day-to-day clinical practice (Westfall et al., 2007). Discrepancies in translational research definitions generated various models. Nevertheless, researchers agree that it is important for improving health (Woolf, 2008). The most popular models to understand the translational research continuum are based on T phases or translational blocks. Sung et al., (2003) described the translational process in two phases:", "Ho (2008) concluded that integrating QFD and AHP is appropriate since they complement each other.", "However, little attention has been paid to adapting engineering tools to improve and accelerate translational research. Schweikhart and Dembe (2009) apply Lean and Six Sigma to clinical and translational research, arguing that these process-focused strategies can help to accomplish the NIH vision of a more efficient and cost-effective translational science enterprise."]} +{"19633954|14038195": []} diff --git a/edge/graph_16570307.jsonl b/edge/graph_16570307.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e37f626155c47429708e836138376551c478a6a --- /dev/null +++ b/edge/graph_16570307.jsonl @@ -0,0 +1,4 @@ +{"62528177|15040462": []} +{"17030370|15040462": []} +{"58714990|15040462": ["Some authors [7] consider congestion control to be a special case of ow control, while others [20] distinguish them as above.", "Some of the schemes that have been described in the literature are window ow-control, Xon/Xo [7], rate ow-control [5], etc.", "The Xon/Xo scheme is a special case of window ow-control in which the window is either in nity (Xon) or zero (Xo )."]} +{"822716|15040462": []} diff --git a/edge/graph_16575201.jsonl b/edge/graph_16575201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16583791.jsonl b/edge/graph_16583791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_165863.jsonl b/edge/graph_165863.jsonl similarity index 100% rename from graph_165863.jsonl rename to edge/graph_165863.jsonl diff --git a/edge/graph_16587383.jsonl b/edge/graph_16587383.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae62249ba28608d99907ec1dcca52c6e6042b375 --- /dev/null +++ b/edge/graph_16587383.jsonl @@ -0,0 +1 @@ +{"15922693|1165497": ["OW offers almost limitless bandwidth to cope with the future demand of indoor wireless access to realtime bandwidth-intensive applications such as Voice over IP (VoIP), streaming video and music, and network attached storage (NAS) [1, 2]."]} diff --git a/edge/graph_16587593.jsonl b/edge/graph_16587593.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16602037.jsonl b/edge/graph_16602037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16608815.jsonl b/edge/graph_16608815.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d166f4c7054d970d11d911ac584d2a3a2f30491 --- /dev/null +++ b/edge/graph_16608815.jsonl @@ -0,0 +1,12 @@ +{"13659557|14171067": []} +{"13659557|11607029": ["Mens has conducted a survey on existing software merging techniques in [28]."]} +{"8582728|11607029": ["\u2026Notkin, \nDan Grossman Computer Science & Engineering University of Washington Seattle WA, USA {miryung, notkin, \ndjg}@cs.washington.edu Abstract Mapping code elements in one version of a program to corresponding code \nelements in another version is a funda\u00admental building block for many\u2026", "Automatic Inference of Structural Changes for Matching Across Program Versions Miryung Kim, David Notkin, \nDan Grossman Computer Science & Engineering University of Washington Seattle WA, USA {miryung, notkin, \ndjg}@cs.washington.edu Abstract Mapping code elements in one version of a program to corresponding code \nelements in another version is a funda\u00admental building block for many software engineering tools."]} +{"6422532|11607029": ["According to Mens [23], software merging techniques can be distinguished \nbased on how soft\u00adware artifacts are represented.", "[22] T. Mens.", "According to Mens [23], software merging techniques can be distinguished based on how software artifacts are represented.", "[23] T. Mens.", "G irba, J. Ratzinger, R. Marinescu, \nT. Mens, B. D. Bois, D. Janssens, S. Ducasse, M. Lanza, M. Rieger, H. Gall, and M. El-Ramly.", "Operation-based merge approach can improve conflict detection and allows better conflict solving [23]."]} +{"2659467|206778272": []} +{"16201370|206778272": ["A full survey of recent refactoring work can be found in [15] In terms of automating the refactoring process, research by Tokuda and Batory [23] has shown that three types of design evolution, including that of hot-spot identification are possible."]} +{"11371729|206778272": ["Mens and Tourw\u00e9 [9] have performed a very extensive literature survey on refactoring research.", "As clearly identified in [9], a wide variety of techniques and formalisms have been proposed and used to deal with restructuring and refactoring."]} +{"1069225|206778272": ["Refactoring is defined as the process of changing a software system in such a way that it does not alter the external behavior of the code and improves its internal structure [Fowler 1999, Mens and Tourw\u00e9 2004].", "They may also be refactored (for instance, rename method) by the tools since they may rely on the program structure that is modified by the refactoring [Mens and Tourw\u00e9 2004]."]} +{"15395666|206778272": ["However, while the raw effects of such changes may be plainly evident in the new artifacts, the original context of the design changes is often lost."]} +{"15395666|11607029": ["Without losing any existing flexibility, we intend to add more automated support for pattern detection in the future."]} +{"11844101|206778272": []} +{"1210336|206778272": []} diff --git a/edge/graph_16608951.jsonl b/edge/graph_16608951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16614482.jsonl b/edge/graph_16614482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16619359.jsonl b/edge/graph_16619359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3eeaa30b6c96c26fb94675194aef0f9e22f2e9d4 --- /dev/null +++ b/edge/graph_16619359.jsonl @@ -0,0 +1,6 @@ +{"9273628|8296351": ["variation degree) [5] and commonality [4], together with some other notions form important measurements for evaluating feature models [14]."]} +{"9235666|8296351": ["As a result, the automated analysis of feature diagrams is an active area of research in the SPL community [7].", "Nevertheless, proposals for computing commonality are rare [7].", "(a) PList[A] = #ProductsOD([7,3,7],1,3) = 8 \u00b7 4 \u00b7 8\u2212 1 = 255.", "(b) For the subtree under B, P \u2032 A = TakeOneOut(255,1,3,[7,3,7],7) = 32 and then, PList[B] = 7\u00b732 = 224, PList[E] = PList[F] = PList[G] = 4 \u00b7 32 = 128.", "(c) For the subtree under C, P \u2032 A = TakeOneOut(255,1,3,[7,3,7],3) = 64, so PList[C] = 3 \u00b7 64 = 192.", "To the extent of our knowledge [7], the only proposals to compute commonality alternative to our approach are [5, 4].", "The relevance of commonality to estimate the costs and benefits of developing and evolving a SPL has been recognized by a number of surveys [7], theses [5, 32] and economic models [11]."]} +{"17260933|8296351": ["It has several primary uses: SAT reasoning is used (i) to validate products (Benavides et al. 2010), (ii) to find viable alternative solutions if a product is not valid (White et al.", "Such analysis can range from simple things, e.g. detecting anomalies (Benavides et al. 2010) like for instance dead features and false optional features, to reasoning about non-functional properties of the product lines (Siegmund et al. 2011).", "niques how to detect such inconsistencies (Benavides et al. 2010), however this is not", "The first and foremost problem would be if the decision model itself already contained inconsistencies, there exist techniques how to detect such inconsistencies (Benavides et al. 2010), however this is not the focus of the paper.", "It has several primary uses: SAT reasoning is used (i) to validate products (Benavides et al. 2010), (ii) to find viable alternative solutions if a product is not valid (White et al. 2008) or auto complete partial products (Mendonca et al. 2009a), and (iii) to provide guidance during the\u2026", "detecting anomalies (Benavides et al. 2010) like for instance dead features and false optional features, to reasoning about non-functional properties of the product lines (Siegmund et al."]} +{"419648|8296351": []} +{"14338733|8296351": ["Different techniques for the automated analysis of feature models have been developed during the last 20 years [10].", "other feature models, products or product configurations; see [8, 10].", "The Boolean representation of feature models used in this paper is based on [10, 13].", "For the definition of the transformation of a feature model into a CSP, see [6, 10]."]} +{"14338733|8921624": ["A contemporary state of the art analysis for general formal verification techniques \u2013 also including techniques that use BDD, CSP and SAT solvers \u2013 is given in [14]."]} diff --git a/edge/graph_16620699.jsonl b/edge/graph_16620699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46ca49500ad044b9ea3bd11bc2049b75578cb44f --- /dev/null +++ b/edge/graph_16620699.jsonl @@ -0,0 +1,3 @@ +{"62185766|53680608": []} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} diff --git a/edge/graph_16621677.jsonl b/edge/graph_16621677.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_166220316.jsonl b/edge/graph_166220316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f0d0d488cdd05dbfbd76c69521b3f670f570f9a --- /dev/null +++ b/edge/graph_166220316.jsonl @@ -0,0 +1 @@ +{"15848480|2916525": []} diff --git a/edge/graph_16623749.jsonl b/edge/graph_16623749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16626249.jsonl b/edge/graph_16626249.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bae774fc37e5845fe5baf914a38e836fa0624f56 --- /dev/null +++ b/edge/graph_16626249.jsonl @@ -0,0 +1,6 @@ +{"61658966|16378248": [", code generation, model mapping and synchronization, model evolution, and reverse engineering [1])."]} +{"18398804|16378248": ["[13] for an overview) have been developed in the last decade, whereas most of them are based on the abstract syntax of modeling languages which is defined by"]} +{"18398804|10500613": ["[37,40] for an overview)."]} +{"18398804|913718": ["[37,40] for an overview)."]} +{"2600850|206778272": ["Since it is not possible to provide all refactorings out-of-the-box\u2014this is especially the case if domain specific modeling languages (DSMLs) are employed\u2014the modeling editor should offer extension points for editing and adding user-defined refactorings [16]."]} +{"15178979|16378248": ["The main reasons for the choice of ATL are: its the wide technical support [1] for Eclipse; and its wide use [3] due to its hybrid approach between declarative and imperative, and its mechanisms for modularization and traceability."]} diff --git a/edge/graph_16627158.jsonl b/edge/graph_16627158.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70877fe6ee9448ab66a53388207a4e152702f7cf --- /dev/null +++ b/edge/graph_16627158.jsonl @@ -0,0 +1,2 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"40014009|10091442": ["Following the examples of other systematic reviews (see, e.g., Mahdavi-Hezavehi et al., 2013; Radjenovic\u0301 et al., 2013), the papers placed in the poor quality category were excluded from our review."]} diff --git a/edge/graph_16629385.jsonl b/edge/graph_16629385.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df044a5c6eb0ddff9463b14451be565547446cd6 --- /dev/null +++ b/edge/graph_16629385.jsonl @@ -0,0 +1,7 @@ +{"236411|16082889": ["There are three ways to approach word recognition problems [9]."]} +{"236411|14580698": []} +{"16201062|11792588": ["The on-line methods have been shown to be superior to their off-line counterparts in recognizing handwritten characters due to the temporal information available with the former [3]."]} +{"16201062|2762290": ["Segmentation In the segmentation stage, an image of sequence of characters is decomposed into sub-images of individual character [11]."]} +{"16201062|15782139": ["However, in the off-line systems, the neural networks have been successfully used to yield comparably high recognition accuracy levels [4]."]} +{"1288118|15782139": ["INTRODUCTION Online handwriting recognition is one of the very complex and challenging problems [1][2][3] because of variability on size, writing style of hand-printed characters [4], and duplicate pixels caused by a hesitation in writing or interpolate non-adjacent consecutive pixels caused by fast writing."]} +{"14396667|15782139": ["Various designers have been actively involved in developing perfect optical character recognition (OCR) systems (Mantas 1986; Govindan & Shivaprasad 1990; Mori et al 1992; Plamondon & Srihari 2000); still the state-of-the-art accuracy levels have room for improvement."]} diff --git a/edge/graph_16629628.jsonl b/edge/graph_16629628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16631951.jsonl b/edge/graph_16631951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7df785ed488d971b3bf37ad623807320d95fd21 --- /dev/null +++ b/edge/graph_16631951.jsonl @@ -0,0 +1,6 @@ +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} +{"13938291|17120461": []} +{"40960276|18190006": ["\u2026and Drury, 1999; Claver et al., 2000; Vessey et al., 2002; Glass et al., 2004; Palvia et al., 2004; Gable et al., 2008; Dwivedi et al., 2009; Banker and Kauffman, 2004) uses a single2 The five articles in 1991 were not considered sufficient for a separate volume; thus those five articles\u2026"]} +{"18623919|33644565": ["\u2026et al. Researchers and practicing managers alike have been concerned about how best to organize, structure, control, and evaluate IT services in organizations since the early years of computerization (Brown and Grant, 2005; Brown and Magill, 1994; Grant and Ulbrich, 2010; Olson and Chervany, 1980)."]} diff --git a/edge/graph_16636831.jsonl b/edge/graph_16636831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16642348.jsonl b/edge/graph_16642348.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16645868.jsonl b/edge/graph_16645868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..670fd3dc3ba2b676b24eec641d5a7c5c6523e167 --- /dev/null +++ b/edge/graph_16645868.jsonl @@ -0,0 +1,9 @@ +{"1100811|14441987": ["In the field of ad hoc wireless networking [Broch98, Royer99 ], previous work on secure routing employs public key cryptography to perform authentication ([Kong01, NAI, Papadimitratos02b, Zhou99, Zhang98])."]} +{"14829928|7774517": ["For quality of data, a survey paper [12] discussed about outlier detection based on statistical or data mining techniques."]} +{"14829928|1236072": ["A survey paper [19] intensively reviewed routing protocols in wireless sensor networks."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"10912003|1230643": []} diff --git a/edge/graph_16650186.jsonl b/edge/graph_16650186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16654832.jsonl b/edge/graph_16654832.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ab348ed3ad69a9d6e751d5c2513973a8f42a697 --- /dev/null +++ b/edge/graph_16654832.jsonl @@ -0,0 +1,10 @@ +{"9190777|7971188": ["Also the device can voluntarily get disconnected to conserve energy or move around; absence of wireless network signals can disconnect the node from the network; network partitions can occur; a node can fail because the user turned off the device or it may crash."]} +{"9190777|6611633": ["PM is extensively surveyed in [2, 3] and a number of approaches are available in [4, 5, 6, 7, 8]."]} +{"482049|14441987": ["\u2022 mobile networking, including Mobile IP [2], ad hoc protocols [27], and techniques for improving TCP performance in wireless networks [1, 5]."]} +{"482049|15640936": ["\u2022 mobile networking, including Mobile IP [2], ad hoc protocols [27], and techniques for improving TCP performance in wireless networks [1, 5]."]} +{"482049|2256372": ["\u2022 remote information access, including caching, function shipping, distributed file systems, and distributed databases [30]."]} +{"482049|8424228": ["\u2022 high availability, including optimistic and pessimistic replica control [9], mirrored execution [4], and optimistic recovery [37]."]} +{"8796556|16717715": ["Cyber foraging is most useful for applications that can be divided into loosely-coupled components; otherwise the cost of communication between the client and the surrogate will offset the performance or energy benefits of using a surrogate."]} +{"6777321|2445817": ["Some researches [14], [42]\u2013[44] have addressed surrogate discovery."]} +{"6777321|1775475": ["\u2026the world are increasingly using their cell phones for daily tasks such as Internet banking, emailing, and emergencies such as viewing online traffic map or using routing applications to find the best next course or connecting to a medical information system to take a prescription urgently [2]."]} +{"6777321|10859599": []} diff --git a/edge/graph_16656299.jsonl b/edge/graph_16656299.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b0089273d78a3c6dcea530997d9af945bbda0f8 --- /dev/null +++ b/edge/graph_16656299.jsonl @@ -0,0 +1 @@ +{"547736|8953108": ["For that, leaf region was segmented by using Otsu method [15; 12; 13]."]} diff --git a/graph_16662.jsonl b/edge/graph_16662.jsonl similarity index 100% rename from graph_16662.jsonl rename to edge/graph_16662.jsonl diff --git a/edge/graph_16662325.jsonl b/edge/graph_16662325.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f80de7a02ceb1103ff89a2ec074941d8cd51186e --- /dev/null +++ b/edge/graph_16662325.jsonl @@ -0,0 +1,10 @@ +{"2792410|10500613": ["has been widely studied in the literature [20].", "1This operation is also called \u201cmatching\u201d, for example in the field of schema matching [20]."]} +{"10034242|10500613": ["org (2)These linguistic matching techniques are also widely employed in the field of schema matching [14].", "Given that process similarity can be measured on the basis of an alignment, the problem of similarity search can be related to alignment problems such as schema matching [14]."]} +{"14058462|14171067": ["After translating a PM into a tree this way, algorithms for comparing trees [34] are used."]} +{"14058462|7308363": ["They range from intelligent process repositories [3] to similarity search over the models.", "These repositories provide various functions, such as adding and removing models, annotating models and searching for models [3]."]} +{"8278225|10500613": ["The problem of process model similarity search can be related to that of schema matching [47]."]} +{"7432317|7308363": ["[29] comprehensively studied process model repositories currently available for industry and academia."]} +{"16154775|10500613": ["All these approaches only identify 1:1 matches between activities, just as many approaches from schema matching do [3,7].", "While this contribution is significant to the process model matching field, it also has implications for schema matching in general [3].", "] are currently hardly treated at all\u2019 [3]."]} +{"6967469|10500613": ["Moreover, techniques from the area of schema and ontology matching can be exploited [27, 56]."]} +{"10353983|10500613": ["To determine the similarity of labels, techniques from schema matching [9] and ontology matching [10] are used."]} +{"901477|10500613": ["Overviews of the various techniques are provided in [36], [44], [45]."]} diff --git a/edge/graph_16664710.jsonl b/edge/graph_16664710.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3970d3931d6395b8ee2b0caa20b52c2f24009d3c --- /dev/null +++ b/edge/graph_16664710.jsonl @@ -0,0 +1,5 @@ +{"2776140|17428811": ["Fine granular scalability (FGS) [ 9 ] encodes the video into a base layer and one enhancement layer."]} +{"2776140|7439310": ["The information loss probability is mainly motivated by error concealment and error resilience techniques [49] that allow for the decoding of partially received video frames.", "The client may use error concealment techniques [49] to conceal the missing video information."]} +{"9149497|17428811": ["Layered encoding for quality adaptive streaming is achieved by using the MPEG-FGS profile [4], [5], which partitions the video file into two layers; the base layer and the enhancement layer."]} +{"17012697|17428811": ["The tools of the EvalVid framework are continuously extended to support other video codecs as H.263, H.26L and H.264 and to address additional codec functionalities like fine grained scalability (FGS) [ 13 ] and intra frame resy nchronisation."]} +{"7132544|14889616": ["Two such approaches are the use of scalable video coding for video streaming [19, 20, 25] and the prioritization of packets in a video stream [10]."]} diff --git a/edge/graph_16665885.jsonl b/edge/graph_16665885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3a92fd9f273344a9d77b216bcc52eef75973265 --- /dev/null +++ b/edge/graph_16665885.jsonl @@ -0,0 +1 @@ +{"2334790|1626075": ["Mayer (1999) presents a comprehensive survey onthat may mislead the extraction process. the techniques used for image-based building extraction."]} diff --git a/edge/graph_1666690.jsonl b/edge/graph_1666690.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1666791.jsonl b/edge/graph_1666791.jsonl similarity index 100% rename from graph_1666791.jsonl rename to edge/graph_1666791.jsonl diff --git a/edge/graph_16669269.jsonl b/edge/graph_16669269.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..607f2fe85017ca0379b12deb96157cadd648cbf4 --- /dev/null +++ b/edge/graph_16669269.jsonl @@ -0,0 +1,7 @@ +{"62185766|53680608": []} +{"62586218|2680824": ["the behavioural economics life activities in Kahneman et al. (2004)).", "the behavioural economics life activities in Kahneman et al. (2004)). As implementations of concept detection become faster and more accurate, we are likely to witness a progression from small numbers of carefully chosen concepts to large-scale generic concept detection. Recent progress in video search allows a user who is searching for a known item video which s/he has seen previously and recall as something obscure, like \u201cYellow single-decker bus driving towards a camera with vegetation and cityscape in the background, in the daytime\" to build a concept detector for that topic on-the-fly using positive and negative examples, Oneata et al. (2012); Chatfield and Zisserman (2012)."]} +{"62586218|14290416": []} +{"8033147|9045232": ["For recent surveys, see [5], [27]."]} +{"143129648|2538212": []} +{"8162013|8953108": ["As a result we investigate two thresholding techniques, one non-parametric (Kapur) and one parametric (Mean) [7]."]} +{"6699575|8953108": ["We compared two thresholding techniques, one non-parametric (Kapur) and one parametric (Mean) (Sezgin & Sankur, 2004)."]} diff --git a/edge/graph_16675828.jsonl b/edge/graph_16675828.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb36a3d970170aaba38851b32ede991f64837e70 --- /dev/null +++ b/edge/graph_16675828.jsonl @@ -0,0 +1,2 @@ +{"17345059|16675828": ["According to [2], [3] we list some of them to introduce the neccesary notions which will be used in the paper.", "All additive minor hereditary (hereditary) properties of graphs, partially ordered by a set-inclusion, form a lattice Ta, ( L) with \u2229 as a meet operation and O as the smallest element (see [2])."]} +{"17003768|16675828": ["This concept is discussed in detail in the paper [33], therefore we shall only mention a couple of related references at some points."]} diff --git a/edge/graph_16683210.jsonl b/edge/graph_16683210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1669837.jsonl b/edge/graph_1669837.jsonl similarity index 100% rename from graph_1669837.jsonl rename to edge/graph_1669837.jsonl diff --git a/edge/graph_16698842.jsonl b/edge/graph_16698842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16700909.jsonl b/edge/graph_16700909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a291c3ade5ab4bdc88ce0354dcbb9b218786a807 --- /dev/null +++ b/edge/graph_16700909.jsonl @@ -0,0 +1,6 @@ +{"15974232|7889189": ["This requirement is especially important when the WSN nodes use sharedkeys for message communication, where a potential adversary can launch a replay attack using the old key as the new key is being refreshed andpropagated to all the nodes in the WSN[20].", "The integrity mechanism should ensure that no adversary can manipulate the communicated data[20].", "An adversary can easily inject the messages in the network, so receiver should ensure that the received message is originated by the correct source[20].", "Different mechanisms have been proposed by the researches to achieve this goal[20].", "While communicating the data in the network, no one can understood except intended recipient[20]."]} +{"15974232|1236072": ["Routing protocols in WSNs mainly classified in two categories[1]: Network Structure and Protocol Operation.", "Unlike LEACH, PEGASIS avoids cluster formation and uses only one node in a chain to transmit to the base-station[1].", "Reservation-based scheduling, collision avoidance, data aggregation by cluster head, uniform energy dissipation, fair allocation of channel and lower latency are some characteristics of hierarchical topology routing protocol[1]."]} +{"2377349|1230643": ["The model is shown in Figure 4 and it relyes on the assumption that the routing table are periodically updated [24]."]} +{"16505729|14441987": ["INTRODUCTION A mobile ad-hoc network (MANET) is a collection of wireless mobile nodes \nserves organized to create a temporary connection between them."]} +{"14116581|1230643": ["Wireless Sensor Networks (WSN) [1] contain hundreds or thousands of sensor nodes equipped with sensing, computing and communication devices."]} +{"8109819|1762301": []} diff --git a/edge/graph_16706905.jsonl b/edge/graph_16706905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eba97ba56d590ac7fcbd6cde7fe486cbea7fe90b --- /dev/null +++ b/edge/graph_16706905.jsonl @@ -0,0 +1,3 @@ +{"8421497|33644565": ["Decentralized IT governance allows greater responsiveness and flexibility with regard to business needs and customized solutions for each business unit [Peterson 2004; Brown and Grant 2005].", "Moreover, several IT governance models exist, such as centralized and decentralized IT governance [Brown 1997; Sambamurthy and Zmud 1999; Brown and Grant 2005].", "Scholars investigated the relationship \nbetween organiza\u00adtions ITgovernancedesign and organizational contextfactors[Brown1997; SambamurthyandZmud1999;Korac-KakabadseandKakabadse2001;Brown \nand Grant 2005; Weill and Ross 2005].", "Decentralized \nIT governance allows greater responsiveness and .exibility with regard to business needs and customized \nsolutionsfor eachbusiness unit[Peterson2004;Brown and Grant2005].", "IT governance research has analyzed the organizational placement of decision-making authority and the organizational structuring of IT activities in large, multi-divisional organizations [Brown 1997; Brown and Magill 1998; Peterson 2004; Brown and Grant 2005].", "IT governance re\u00adsearch has \nanalyzed the organizationalplacement ofdecision-making author\u00adityandthe organizational structuring ofIT \nactivitiesinlarge, multi-divisional organizations [Brown 1997; Brown and Magill 1998; Peterson 2004; \nBrown and Grant 2005].", "As some IT governance publications question the applicability of this factor as well [Brown and Grant 2005], it was deleted.", "Scholars investigated the relationship between organizations\u2019 IT governance design and organizational context factors [Brown 1997; Sambamurthy and Zmud 1999; Korac-Kakabadse and Kakabadse 2001; Brown and Grant 2005; Weill and Ross 2005].", "Moreover, several IT governance mod\u00adels exist, such as centralized anddecentralizedITgovernance[Brown1997; \nSambamurthy and Zmud 1999; Brown and Grant 2005]."]} +{"13843514|2795037": []} +{"13843514|8125630": []} diff --git a/edge/graph_16709997.jsonl b/edge/graph_16709997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16712827.jsonl b/edge/graph_16712827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6fd8b80a2c32507de6312d4f4035c3beda0fdc3 --- /dev/null +++ b/edge/graph_16712827.jsonl @@ -0,0 +1,5 @@ +{"26986403|24248164": []} +{"2851404|14434529": ["The first computerized clinical record systems were implemented in mid 1960s [1] and thus far NLP has proven capable in coding electronic medical documents [2]."]} +{"2851404|2809360": ["Medical Language Extraction and Encoding(MedLEE) is the one of the most widely used NLP software in the medical research community [4], and it has successfully interpreted findings from raw text procedure reports such as head CT imaging for stroke and chest radiography for pneumonia [5], [6]."]} +{"8861540|11608263": ["Most discriminative approaches to multi-label classification have employed some variant of the \u201cbinary problemtransformation\u201d technique, in which the multi-label classification problem is transformed into a set of binary-classification problems, each of which can then be solved using a suitable binary classifier (Rifkin and Klautau 2004; Tsoumakas and Katakis 2007; Tsoumakas et al. 2009; Read et al. 2009).", "\u2026technique, in which the multi-label classification problem is transformed into a set of\nbinary-classification problems, each of which can then be solved using a suitable binary classifier (Rifkin and Klautau, 2004; Tsoumakas and Katakis, 2007; Tsoumakas et al., 2009; Read et al., 2009).", "In terms of discriminative approaches to multi-label classification, there is a large body of prior work, which has been well-summarized elsewhere in the literature (e.g., see Tsoumakas and Katakis, 2007; Tsoumakas et al., 2009)."]} +{"18627128|10762348": []} diff --git a/edge/graph_16717715.jsonl b/edge/graph_16717715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..947b7096721897108188949493431a2567c92142 --- /dev/null +++ b/edge/graph_16717715.jsonl @@ -0,0 +1 @@ +{"19127|16717715": []} diff --git a/edge/graph_16720653.jsonl b/edge/graph_16720653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84b28689bb69e4a38de614f757765c6ae5896905 --- /dev/null +++ b/edge/graph_16720653.jsonl @@ -0,0 +1,8 @@ +{"19855173|3189715": ["In recent years, much research effort has been invested in the dynamic creation, deployment and management of novel network services [8]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"295946|7971188": ["Some of the major problems addressed by the overlay research community include performance guarantees [54], availability of the Internet routing [6], multicasting [29, 41, 21, 18], QoS guarantees [57], protection from Denial of Service attacks [43, 7], content distribution [45], file sharing [49], and storage systems [23]."]} +{"295946|3189715": ["Programmable network research [16] attracted the research community because of its claim of on-demand services on the fly."]} +{"14183703|14889616": ["Virtual Network Mapping: virtual network mapping is usually defined as a mapping M from Gvi to a subset of Gs, such that some predefined constraints are satisfied."]} diff --git a/edge/graph_16720993.jsonl b/edge/graph_16720993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44a4819af1f516309c1384bbf7875c006d23f6b0 --- /dev/null +++ b/edge/graph_16720993.jsonl @@ -0,0 +1,3 @@ +{"2209704|7185733": ["1 Introduction The use of hand gestures has become an important part of human computer interaction in recent years [11]."]} +{"8103501|12127129": []} +{"22159059|7185733": []} diff --git a/edge/graph_16721675.jsonl b/edge/graph_16721675.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_167217274.jsonl b/edge/graph_167217274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f77887caa38ca0539bbb80d4595b6853312d5ae5 --- /dev/null +++ b/edge/graph_167217274.jsonl @@ -0,0 +1,73 @@ +{"51873019|16050825": []} +{"53287286|16050825": ["In [5]\u2013[7], a thorough review of the advantages of VLC was given, whereas, in [8], the potential of VLC for indoor communications was discussed."]} +{"52911168|6779551": []} +{"16012932|4395259": ["Physical-layer security refers to the techniques which exploit the channel characteristics in order to hide information from unauthorized receivers, without reliance on upper-layer encryption [3]\u2013[9]."]} +{"23192358|4395259": ["Physical-layer security techniques exploit channel characteristics in securing information from eavesdroppers without the help of upper layers [9]."]} +{"3180691|13074005": ["Reproduced from [48] with permission.", "[48], [53].", "\u2026SM has recently established itself as a promising transmission concept, which belongs to the single-RF [36] large-scale [41] MIMO wireless systems family, while exploiting the multiple antennas in a novel fashion compared to state-of-the-art high-complexity and power-hungry classic MIMOs [48].", "We conclude this glimpse into the history of SM\u2013 MIMO by mentioning that the first (and only available) survey papers on the SM concept were published in December 2011 and in mid 2012 in [48] and [92], respectively.", "Briefly, this implies that the channel impulse responses of the transmit-to-receive links are sufficiently different from each other [48].", "In SM\u2013MIMO research, this third dimension is termed the \u2018\u2018spatial-constellation diagram\u2019\u2019 [48]."]} +{"3180691|7686677": ["This allows the BSs to turn off the related RF chains with filters and mixers, which saves additional power.", "New infrastructure elements, such as femto/pico BSs, fixed/mobile relays, cognitive radios, unlicensed millimeter-wave radios, and distributed antennas are being deployed, thus making future cellular systems more heterogeneous [293].", "So far, only the baseline point-to-point single-cell cellular network has been studied, where the effect of other-cell interference is neglected and the characteristics of different types of BSs are not taken into account.", "However, in practice, MIMO systems need a multiplicity of associated circuits, such as power amplifiers, RF chains, mixers, synthesizers, filters, etc., which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "For example, the typical RF coaxial cables used in current tower-mounted BSs are more than four centimeters in diameter [42].", "The rationale behind the multi-RF to single-RF paradigm shift in MIMO design originates from the consideration that large numbers of TAs (radiating elements) may be accommodated at the BSs (large-scale MIMO design) [41], [42], especially in the emerging millimeter-wave band [43]\u2013[46], bearing in mind that the complexity and power consumption/dissipation of MIMO communications are mainly determined by the number of simultaneously active TAs, i.e., by the number of active RF chains [40], [47].", "more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "BSs with a variable number of TAs .", "Under the so-called SOTA-2010 power consumption model [31], [32], the EE of various types of BSs (macro, micro, pico, and femto) is investigated by comparing SM to conventional MIMO communications.", "The main idea is to enable the BSs to use only a subset of the available TAs in order to reduce the power consumption.", "Raising dilemmas, such as using a few BSs in combination with large-scale MIMOs, using many small cells illuminated by low-power BSs having a few TA elements each, or whether to combine large-scale MIMOs and small-cell networks, have to be addressed.", "Limiting the number of active RF chains for the sake of reducing the power consumption of BSs has been actively discussed within 3GPP standardization bodies.", ", which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "This finding is important because it brings to our attention that constant-envelope modulation may be a suitable choice for SM\u2013MIMO communications since it may offer an improved power efficiency and a reduced complexity, while mitigating the linearity requirements of the power amplifiers [5], without any performance degradation compared to amplitude modulation schemes.", "The cellular network of the future will be: heterogeneous and characterized by a small-cell infrastructure relying on inexpensive and low-power BSs (femtocells) in order to achieve high data rates [3], [8]; green, by evolving from a throughput-optimized scenario toward throughput-and energy-optimized networks [5], [16], [18]; interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Large-scale MIMO is an emerging technology, where BSs with hundreds of antennas serve a few mobile terminals per channel use [41].", "While each BS connected to the electrical grid may cost approximately $3000 per year to operate, off-grid BSs operating in remote areas generally run on diesel power generators and may cost ten times more [5].", "Compared to baseline single-antenna transmissions, MIMO communications obtain higher data rates and improved error performance at the cost of: \u2022 increasing the signal processing complexity at the receiver, which is caused by the need for counteracting the interference imposed by simultaneously transmitting many data streams; \u2022 more stringent synchronization requirements among the TAs to exploit the benefits of spacetime-coded and multiuser MIMO transmissions; \u2022 multiple RF chains at the transmitter to be able to simultaneously transmit many data streams, which do not scale with Moore\u2019s law and make the transmitter bulky [36]; \u2022 independent power amplifiers for each RF chain, which dissipate the majority of the power consumed at the transmitter, since they are power inefficient due to the stringent linearity requirements of state-of-the-art phase/amplitude modulations [5].", "The reduced linearity requirements of constant-envelope modulation increase the efficiency of power amplifiers, which, in turn, reduce the total power consumption of the transmitters [5].", "\u2022 green, by evolving from a throughput-optimized scenario toward throughput- and energy-optimized networks [5], [16], [18]; \u2022 interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; \u2022 characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; \u2022 relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Consider a relaying-aided MIMO system for application in the downlink of cellular networks relying on fixed RSs, where both BSs and RSs are equipped with multiple antennas [259].", "Furthermore, the employment of low-power BSs has the beneficial effect of reducing the transmission distance between mobile terminals and access points, which results in performance improvements.", "In addition, unlike macro BSs that are usually heavily loaded most of time, the femto BSs are expected to be lightly loaded, which leads to further reduction of the power consumption since they will not be transmitting all the time, hence facilitating sleep-mode-based operation.", "More explicitly, recent studies have clearly shown that the EE gain of MIMO communications increases with the number of antennas, provided that only the transmit power of the BSs is taken into account and their circuit power dissipation is neglected.", "Currently, there are more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "On the other hand, the EE gain of MIMO communications remains modest and decreases with the number of active TAs, if realistic power consumption models are considered for the BSs [33]."]} +{"3180691|12060835": ["An option that is currently gaining momentum in green networking is RF energy harvesting, which can provide additional energy supply for wireless devices [297]."]} +{"31048368|6779551": []} +{"31048368|3453202": ["In particular, multiple-antenna relaying [24], [25], multipleantenna jamming [26], [27], multiuser downlink or multiple access [28], [29], massive MIMO [30], [31], and multipleantenna directional modulation [32]\u2013[35], are exploited to improve the secrecy performance."]} +{"31048368|12029139": ["Generally speaking, a power receiver is usually closer to the source than the information receiver, since the energy harvesting circuitry is less sensitive than the information decoding circuitry [238], [239]."]} +{"31048368|13178381": []} +{"31048368|4395259": ["[61] gave a primary investigation on multi-antenna techniques in multiuser wireless secrecy net-"]} +{"25962583|3345556": ["1) Mutual Information Design: For a wiretap channel, finite alphabet inputs may allow both the receiver and the eavesdropper to decode a transmitted message accurately if the transmit power is high enough [410]."]} +{"25962583|13074005": ["A new spatial modulation technique that simultaneously activates only a few of the antennas comprising the entire antenna array has been described in [231]\u2013[233]."]} +{"59231967|52008841": ["For more clari\ufb01cation and comparison between the proposed techniques in PLS of VLC systems, readers can refer to [56]."]} +{"59231967|4395259": ["For the PLS in the RF networks, we refer the readers to the works in [7] and [8]."]} +{"69934881|16050825": ["Borah et al. [4], Khalighi and Uysal [5], and Karunatilaka et al. [6] presented a review of VLC, whereas Elgala et al. [7] discussed its potential for indoor communications."]} +{"52008841|52125636": ["Some review articles focused on specific aspects of VLC such as VLC channel modeling methods [28], noise optical sources and noise mitigation mechanisms [29], VLC-based positioning techniques for indoor and outdoor applications [30], and the pertinent issues associated with the outdoor usage of VLC in vehicular communication [31]."]} +{"52008841|3930401": ["In [27], authors explored the differences among optical wireless communications (OWC) technologies such as infrared communications, VLC, lightfidelity (LiFi), free space optical (FSO) communications, etc."]} +{"52008841|22221919": ["More details on NOMA in traditional RF networks are provided in [143], [144]."]} +{"52008841|10235514": []} +{"52008841|10979806": ["The EE can be improved by efficient resources optimization, power allocation, energy transfer and harvesting, and hardware solutions [87]."]} +{"52008841|12206204": ["95 exabyte-per-month in 2021 [1]), there is an urgent need to develop a fifth-generation (5G) of networks with a higher system-level spectral efficiency that will offer higher data rates, massive device connectivity, higher energy efficiency (EE), lower traffic fees, a more robust security, and ultralow latency [2]\u2013[4]."]} +{"52008841|12029139": ["Extensive work has been done to design, evaluate, and optimize simultaneous wireless information and power transfer in RF networks [160], [161]."]} +{"52008841|4395259": ["For the PLS in RF networks, readers can refer to [177] and [178]."]} +{"59554778|3930401": ["\u03b2 [4] j,i = \u03b7 2 j,i \u2211M m=1H [rf] j,E (m) \u2211M m=1H [rf] j,E (m) H , and", "\u03b2 [1] j,i \u2212 \u03b2 [2] j,i \u2212 \u03b2 [3] j,i +\u03b2 [4] j,i", "Optical wireless communication (OWC) technologies has recently introduced as an alternative technology that resolves the problem of RF spectrum shortage [4]."]} +{"59554778|6414421": ["For instance, key generation schemes over wireless channels are reviewed in [36], while [37] proposes to use zero-forcing beamforming (ZFBF) strategy to direct the signal away from the eavesdropper in order to achieve the required secrecy rate."]} +{"59554778|6779551": ["In [35], to secure the communication, the authors consider the PLS techniques such as diversity-assisted security, physical-layer key generation, artificial-noise-aided security, information-theoretic security, and security-oriented beamforming approaches."]} +{"59554778|4395259": ["Since PLS utilizes the randomness of the communication channels and noise, it can be used to restrict the information reception by an unauthorized user [34]."]} +{"52125636|17165859": ["Another difference from [15] and [24] is that the discussion of all the key features of the VLC positioning system are tightly connected with the positioning system (i.e., channel model, multiplexing protocols, \ufb01eld of view, noise, multipath, and error).", "The work [24] focused on the positioning algorithms while many characteristics of the VLC positioning (e.g., multiplexing protocols, \ufb01eld of view, and rolling shutter effect) were only generally discussed or mentioned.", "In the article [24], an intensive effort was made to present the published literature of VLC positioning systems."]} +{"52125636|4491892": ["The PF, which is a Monte Carlo method, uses a set of weighted particles to approximate the real posterior distribution [90-93].", "Unlike KF, linearity and Gaussian distribution are not required in PF process [90-93]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"808134|16050825": ["In [3]- [4]- [5], the authors presented a review of VLC, whereas the authors of [6] discussed the potential of VLC for indoor communications."]} +{"52284955|6779551": ["As a complement to the conventional upper-layer solutions, such as cryptographic techniques, various physical layer secrecy (PLS) techniques have been proposed to provide perfect security in wireless communication systems [9]\u2013[12], which were first studied in the context of wiretap channels by Wyner [13] for point-to-point communication systems and later for broadcast channels by Csiszar and Korner [14], and for Gaussian wiretap channels in [15]."]} +{"3141460|16050825": ["the emergence of visible light communication (VLC) products [17]\u2013[23], the market has begun to show future promise [24],"]} +{"3141460|13074005": ["optical spatial modulation (OSM) where only one \u201con\u201d slot is transmitted from the multiple beams at a given channel-use in order to avoid inter-channel interference [301], [302]."]} +{"3141460|11720829": ["data rate and to reduce the fading effect on the quality of signal transmission [284]."]} +{"49188033|10235514": ["Furthermore, the growing number of devices imposes a big challenge of providing seamless and lowdelay communication [1], [2]."]} +{"209971970|16050825": ["In [3]\u2013[5], the authors presented a review of VLC, whereas the authors of [6]\u2013[9] discussed its potential and limitations for indoor communications."]} +{"26090902|6779551": ["[159] gave a survey, which summarized the security requirements and security attacks of wireless networks, followed by security protocols and algorithms in existing wireless network standards."]} +{"26090902|3453202": ["This attack was investigated in [163] and [168], which wants to send jamming signals to minimize secrecy capacities.", "It is worth mentioning that [163] made a con-"]} +{"26090902|4395259": ["The survey in [158] divided PHY-security issues into two categories: i.", "Finally and most importantly, different from the survey in [158], we discuss the newest precoding techniques in signal processing areas, such as transmit precoding and cooperation schemes in MIMO and relay systems, which are emerging technologies in next generation wireless communications.", "Third, the organization on PHY-security in this paper is different with the survey in [158]."]} +{"26090902|18148591": ["The advancement in wireless technologies has improved communication service quality significantly, by exploring spatial diversities and multiplexing gains with the help of multiantennas technologies [152] or using cooperative strategies with the help of relays [153].", "To further enhance the transmission rates with the constraints of PHY-security, many investigators developed multi-antenna technologies [152], [190] to increase secrecy"]} +{"3930401|10235514": []} +{"3930401|4502294": []} +{"3930401|12206204": ["prise ultra-dense heterogeneous networks for which mobile data volume per area will be 1000 times and the number of connected wireless devices will be 100 times higher compared to those in existing wireless networks [1].", "It will offer new services with ultra-high system capacity, massive device connectivity, ultra-low latency, ultra-high security, ultra-low energy consumption, and extremely high quality of experience [1]\u2013[6].", "Therefore, upcoming networks must have the capability to support high user data rates, low power consumption, and negligible endto-end delays [1]\u2013[6]."]} +{"3930401|16050825": ["There exist few literature reviews [14]\u2013[16], [18], [20], [44]\u2013[48] in different aspects of OWC."]} +{"11970435|4395259": ["A key performance metric of the wiretap channel is the secrecy capacity defined as the maximum communication rate at which Bob can reliably decode the transmitted message, while Eve cannot infer information at any positive rate [2]\u2013[4]."]} +{"59158900|1541773": ["As stated in [176], the metric of secret bits per Joule is more popular since it is convenient to capture the degree of proportionality between the energy consumption and different levels of load."]} +{"59158900|6779551": ["For instance [14], the reliability and throughput of the"]} +{"59158900|3453202": ["Even worse, the process of channel estimation may be attacked by pilot contamination attack which not only dramatically reduces the achievable secrecy capacity but is also difficult to detect [17]."]} +{"59158900|4395259": ["with separate confidential messages of each user in which each downlink message must be kept secret from all other unintended users (each user is seen as an eavesdropper for messages not intended to it) [10].", "air interface, and the constraints of network resources [10].", "The typical wiretap channel models usually include multiple-input multiple-output (MIMO) wiretap channels, broadcast wiretap channels, multiple-access wiretap channels, interference wiretap channels, and relay wiretap channels [10], etc.", "Relay nodes can be used for not only cooperative relaying but also cooperative jamming [10], [11], [116]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"109587591|15453366": []} +{"11997454|16050825": ["In [3], the authors present a review of communication oriented VLC whereas the authors in [4] present the potential of the VLC for indoor communication."]} +{"51988843|22221919": ["NOMA schemes are briefly introduced in [11] and [12]."]} +{"51988843|3270620": []} +{"19888241|16050825": ["short-range wireless transmission [33], [34]."]} +{"19888241|13074005": ["Generalised Space Shift Keying (GSSK): GSSK is a subset of spatial modulation [146], [147], where spatial domain is exploited to modulate information [148]."]} +{"49325841|6779551": []} +{"52129083|17165859": ["Explicitly, Do and Yoo [19] provided an\nin-depth survey of VLC-based positioning systems, while Ca\u030cilean and Dimian [17] summarized the existing solutions designed for integrating VLC into vehicular communications.", "Explicitly, Do and Yoo [19] provided an"]} +{"52129083|64404": []} +{"52129083|14889616": ["According to [172], if a carefully constructed subsets of the original video sequence may lead to video reconstruction either at a reduced picture size or at a reduced frame rate compared to the original one, then this video scheme is deemed to exhibit either spatial or temporal scalability, respectively."]} +{"52129083|7439310": ["become a popular research topic, including efficient compression standards [156]\u2013[158], error-concealment/error-resilient streaming techniques [154], [159], [160], as well as reliable"]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"88492340|52008841": ["Please refer to [22] and [23] for further details on PLS for VLC systems."]} +{"49727825|22221919": []} +{"58675059|73678081": ["DEMANDS for underwater communication systems are increasing due to the ongoing expansion of human activities in underwater environments such as environmental monitoring, underwater scientific data collection, maritime archaeology, offshore oil field exploration, port security and tactical surveillance [1]."]} diff --git a/edge/graph_167217864.jsonl b/edge/graph_167217864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3dbad9bdb6a7dbc80cae5872985f81af035bb023 --- /dev/null +++ b/edge/graph_167217864.jsonl @@ -0,0 +1,80 @@ +{"15621217|1230643": ["In [5], design and implementation issues for a reliable WSN system using magnetic sensors are presented, which can track available parking spaces in real time and communicate that information to the users.", "In recent years, wireless sensor networks (WSN) [1] have inspired tremendous research interest in diverse application domains such as structural health monitoring [23], underwater marine life monitoring [2], military and security surveillance, health-care, smart homes, automotive industry, etc."]} +{"12337968|10837932": []} +{"3350771|6583734": ["high-data-rate services (such as video service) and low-datarate services (such as meter reading service) [4]."]} +{"3350771|25929315": ["Researches generally set service arrival process as a homogeneous/compound Poisson process or an independent Bernoulli process [41] with identical distribution [40] and retransmission user number and packet retransmission number at queue head or channel state (busy/idle) in a certain time slot as state variables to obtain a stabilized design scheme [42] on the premise of completing the multi-channel S-ALOHA steady-state performance analysis [43], [44].", "In order to solve the overload of LTE access network when a large number of MTC terminals enter network simultaneously, researchers focused analyses on the load pressure of LTE RACH and its overload control mechanisms, such as classified controlled access, exclusive RACH resources, dynamic RACH resources allocation, exclusive backoff mechanism, time division access and active paging mechanism [19], [40]."]} +{"5693578|5476476": ["But the accuracy of RSS-based approach is limited since characterizing radio propagation in an environment is challenging due to severe multipath and numerous site-speci\ufb01c parameters.", "This kind of sensor uses the ToA-based technique to measure the distance traveled and is able to provide a positioning accuracy within a few centimeters, which is several times better than RSS-based positioning systems.", "The user measures the received signal strength (RSS) [1], time of arrival (ToA) [2], or angle of arrival (AoA) [3] to anchors and infers its position in the environment.", "Various wireless devices, i.e. Wi\ufb01, UWB, and RFID, provide the raging information, for example RSS and ToF (time of \ufb02ight), which can infer the potential location of a target.", "Due to the wide availability of RSS in many wireless devices, a number of model-based or \ufb01ngerprinting-based techniques[8] [9] have been proposed to locate a device.", "As compared to the visual-based sensors mentioned above, the RSS is available even without line of sight.", "Many off-the-shelf devices (i.e. smart phones) are able to provide the RSS, which can be used to infer mobile\u2019s locations[13] [14]."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"17930389|3330313": ["The outlier detection problem (Hodge and Austin 2004) requires to identify abnormal instances from a given data set."]} +{"5476476|206583375": ["Thus, the survey in \u200e[12] is somewhat outdated, whereas the authors of \u200e[8] focus only on ultrasonic positioning systems.", "WLAN is the most known solution for indoor positioning \u200e[11]\u200e[12].", "The security and privacy factors are considered important to discuss with Indoor Positioning Systems (IPSs) within Personal Network \u200e[12], where users position people and objects in their home.", "For instance, position system architecture dealing with self-localization can guarantee high degree of privacy and security for users when the estimation of the position is done at the target device \u200e[12].", "The reader may refer to \u200e[8]-\u200e[12] for more information."]} +{"125476571|36250251": []} +{"125476571|1353379": ["[16] focused on the data fusion in smart ubiquitous environments but ignored the security and privacy issues in IoT.", "The literatures [15-18] have provided deep discussion and introduction to these methods.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT environments Ignore privacy and security in IoT data fusion [17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life Do not touch the privacy issues and the difference and relationships among different applications in IoT [20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation Do not touch the privacy issues and the difference and relationships among different applications in IoT Our work Specify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods"]} +{"125476571|3119314": ["Different from cloud computing, edge computing [123-126] as a decentralized paradigm is proposed to support real-time services, location awareness and mobility, which is appropriate for various real-time application scenarios, such as smart gird and smart traffic [127], etc."]} +{"125476571|3767252": []} +{"125476571|5664472": ["However, visual data affect the privacy of inhabitants, which calls for privacy preserving approaches in videos and images [54, 63-65]."]} +{"125476571|16051476": ["The literatures [15-18] have provided deep discussion and introduction to these methods.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT\nenvironments Ignore privacy and security in IoT data fusion\n[17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life\nDo not touch the privacy issues and the difference and relationships among different applications in IoT\n[20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation\nDo not touch the privacy issues and the difference and relationships among different applications in IoT\nOur work\nSpecify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods\nTable 1 compares existing related surveys with our work.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT environments Ignore privacy and security in IoT data fusion [17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life Do not touch the privacy issues and the difference and relationships among different applications in IoT [20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation Do not touch the privacy issues and the difference and relationships among different applications in IoT Our work Specify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods", "[15] provided a review on data fusion techniques, but they did not give a discussion on the data fusion specifically designed for IoT big data."]} +{"57864825|206578365": ["However, such an approach may suffer large internet delay and high energy consumption, due to long distance communication [9], [10], [11], [12]."]} +{"57864825|3042864": ["To alleviate resource scarcity of mobile devices, one effective way is to offload their complex or resourcedemanded tasks to remote cloud [5], [6], [7], [8] through pay as you go."]} +{"961984|9554464": ["Indeed, it is already being actively researched for the related problem of data aggregation within sensor network community [178,179], which further signifies the importance of considering security-related issues while developing modern decentralized fusion systems."]} +{"961984|4491892": ["Probabilistic [32,40,45] Represents sensory data using probability", "Particle filters are a recursive implementation of the SMC algorithm [45]."]} +{"18168645|1503157": ["The real time information from the fields will provide a solid base for farmers to adjust strategies timely, instead of making decisions based in hypothetical average condition (Ruiz-Garcia et al. 2009).", "Ruiz-Garcia et al. (2009), Ruiz-Garcia and Lunadei (2011) have reviewed the RFID and WSN technologies for farming environmental monitoring, fire detection, farm machinery, pest control, animal tracking, viticulture, precision irrigation, greenhouse, food traceability, precision livestock, supply\u2026", "The literatures include Tajima 2007; Tsironi et al. 2011; Jedermann et al. 2011; Tsironi et al. 2008; Choe et al. 2009; Ruiz-Garcia et al. 2009; Yoo et al. 2007; Lea-Cox et al. 2007; Anastasi et al. 2009; Kim et al. 2008; Strauss et al. 2009; Claire 2011, and Hong et al. 2011.", "For precession agriculture applications, soil moisture and ambient light are measured and analyzed to control automatic irrigation systems and/or greenhouse control systems (Ruiz-Garcia et al. 2009)."]} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} +{"14894961|7923463": []} +{"18740420|4427557": []} +{"18740420|17708892": ["Some of the most pronounced LPWA candidates are SigFox, LoRa, Weightless, and Ingenu [1].", "In fact, most of these studies are either review articles [1], [3], [4], or measurement reports [5], [6].", "2647247 Despite this success, LoRa has not yet attracted similar levels of attention from the academic and research community with only very few peer-reviewed studies published to date [1], [3]\u2013[7].", "b) Coverage probabilities \u2118[X ] for X = {H1, Q1, H1Q1} using the same colouring and markers as in a) for different mean values of end-devices N\u0304 \u2208 [1, 2000]."]} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"61807869|5476476": ["To name a few, proactive environment change for elderly [12], real-time cloud-based activity tracking [13] to help remotely monitor the older adults at home [14], and radio frequency identification-based location tracking to ensure the safety of older adults in smart homes [15]."]} +{"61807869|17641462": ["THE ubiquitous nature of smartphones nowadays has made mobile crowdsensing a more convenient method to collect data from masses with the emerging concepts of the internet of people [1] and smart communities [2]."]} +{"14714738|1230643": ["As surveyed in the [4,5], WSN has been widely embraced by the researchers from di\ufb00erent sectors such as power systems, transportation, disaster and security systems, health-care systems, and environmental systems."]} +{"18434328|12815020": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"19121365|4528002": ["ower grids or cellular communication systems that provide service to the ITSs [6], [7]. Recently, a number of security solutions have been proposed for addressing intra-vehicle security problems [8]\u2013 [11]. In [8], the authors identi\ufb01ed the key vulnerabilities of a vehicle\u2019s controller and proposed a number of intrusion detection algorithms to secure this controller. Moreover in [9], the authors show t", "s of plug-in electric vehicles, while accounting for their impact on the power system. Moreover, a survey on security threats and protection mechanisms in embedded automotive networks is presented in [11]. Furthermore, vehicular communication security challenges and solutions have also been studied recently in [12]\u2013 [16]. In [12], the security vulnerabilities of current vehicular communication archite"]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"49557547|29859741": ["[79] review and discuss the usage of fog computing in healthcare."]} +{"49557547|1353379": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|3757239": ["A detailed discussion on the mobile edge can be found in [48]."]} +{"49557547|4427557": ["Other standards proposed by various researchers can be found in [62], [65], and [66].", "These features make LPWAN a suitable candidate for a large number of healthcare applications that do not require significant data rate and low latency [65]."]} +{"49557547|86629084": []} +{"49557547|21386749": ["A survey on the use of IoT for healthcare can be found in [70]."]} +{"49557547|62658395": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|393948": ["A thorough discussion of deep learning is covered in [50]\u2013[52]."]} +{"49557547|13172512": ["DEEP LEARNING NETWORK TRAFFIC CLASSIFICATION (DLNTC) COMPONENT Traffic classification is fundamental for any network, especially mobile cloud networks for determining anomalies, for traffic prioritization over a limited bandwidth, to ensure Quality of Service (QoS) [128], [129]."]} +{"1541773|24491750": ["In [40], authors have presented an overview of the energy consumption problems of wireless communication networks and described different techniques in general that have been used to improve the energy efficiency of these networks."]} +{"1541773|7686677": ["Survey in [42] presented a brief survey of current efforts for the standardization of the green metrics, the challenges that lay ahead and also considered the energy consumption issue in heterogeneous cognitive networks.", "The important aspects of a green communications include defining green metrics, bringing architectural changes in base stations, network planning, and efficient system design [42]."]} +{"1541773|10837932": ["Authors in [39] provide a survey on green networking research from a system design perspective."]} +{"18811944|8323234": []} +{"18388986|4491892": ["Particle filters are recursive implementations of the sequential Monte Carlo methods [39]."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"53116740|2088679": ["Recently, convolutional neural networks (CNN) and long short-term memory (LSTM) networks have emerged as efficient methods in many pattern recognition application domains such as computer vision [6], [7], surveillance [8], [9], and medicine [10]."]} +{"53116740|18188725": ["Since the RUL estimation problem is closely related to pattern recognition, similar techniques can be applied to solve the RUL estimation problem as well [11]."]} +{"25827396|5476476": []} +{"17947354|8363289": ["The first one follows the work presented in [7] and uses a nonlinear vehicle model to predict the future evolution of the system [26].", "This is done in the spirit of model predictive control (MPC) [14], [26] along the lines of our ongoing internal research efforts dating from early 2000", "The main concept of MPC is to use a model of the plant to predict the future evolution of the system [6], [14], [17], [26], [27]."]} +{"54475893|15093994": []} +{"54475893|32360363": []} +{"70211248|14382980": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"206608231|393948": ["Index Terms\u2014Big Data, cross-domain datamining, data fusion, multi-modality data representation, deep neural networks, multi-view learning, matrix factorization, probabilistic graphical models, transfer learning, urban computing\n\u00c7"]} +{"52934164|64404": ["11, an image can be segmented into homogeneous regions with the HEVC coding tool [33]."]} +{"206778849|6959212": ["Besides residential premises, smart grid also needs a communication infrastructure to connect the utility assets [14]\u2013[16]."]} +{"13190096|12595430": ["\u2022 Value: value given to organizations by having the ability of making decisions based on processing raw data In paper [9], Big Data is characterized by the 5V\u2019s, that adds Veracity and Value to the 3 V\u2019s: Volume, Velocity, and Variety."]} +{"114284502|3348390": ["It allows devices communication with each other with minimum human intervention [12]."]} +{"1353379|9667820": []} +{"1353379|44461432": []} +{"1353379|9928823": []} +{"1353379|18388986": []} +{"1353379|3127198": []} +{"19750691|11632848": []} +{"13692664|6332923": ["Therefore, it is necessary to develop an efficient model to ensure the security and integrity of the patient\u2019s diagnostic data transmitted and received from IoT environment [2]\u2013[8]."]} +{"41235929|3126100": ["[58]) to improve predictive capabilities and identification accuracy of tourism demand forecasting."]} +{"41235929|2398835": []} +{"537110|8836911": ["in the multi-radio multi-channel MAC are surveyed, and a classification of control separation techniques is provided in [16]."]} +{"390409|535786": []} +{"390409|2398835": ["The phenomenon of big data has long been characterized by volume, velocity, and a variety of data types that have been created at everincreasing rates (Khan et al., 2014)."]} +{"3269862|18188725": []} +{"3269862|393948": []} diff --git a/edge/graph_167217933.jsonl b/edge/graph_167217933.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f39799a1039c54a64d3d949d7e8174d7886c5d8 --- /dev/null +++ b/edge/graph_167217933.jsonl @@ -0,0 +1,66 @@ +{"42875077|393948": ["Recent advances in deep unsupervised learning have shown that autoencoders can successfully learn very complex low-dimensional representations of data for various tasks [Bengio et al. , 2013]."]} +{"57573724|1479507": ["\u008ce goal of the representation learning is to \u0080nd a mapping of vertices to a vector representation such that distances between these vector representations meaningfully relate to similarities in the local structure of the vertices [41]."]} +{"57573724|11608263": ["Representations learning for graphs is an important problem due to its application for tasks such as link prediction [7] and vertex classification [37]."]} +{"13765266|14849079": []} +{"13765266|207372751": []} +{"6071257|12161567": ["(15), we are estimating a probability distribution over possible states of the knowledge graph which allows us to predict the probability of any possible triple in the graph (Nickel et al. 2015).", "For a review of machine learning on knowledge graphs see also Nickel et al. (2015).", "(15), we are estimating a probability distribution over possible states of the knowledge graph which allows us to predict the probability of any possible triple in the graph Nickel et al. (2015)."]} +{"4328400|12161567": []} +{"3215337|12161567": ["\u2026work, which we do not review in detail here\u2014including latent space models of social networks [32], embedding methods for statistical relational learning [42], manifold learning algorithms [37], and geometric deep learning [7]\u2014all of which involve representation learning with graph-structured data.", "We refer the reader to [32], [42], [37], and [7] for comprehensive overviews of these areas.", "Indeed, the literature on knowledge-graph completion\u2014where the goal is predict missing relations in knowledge graphs\u2014contains many related techniques for decoding a large number of edge types ( i.e. , relations) [42].", "A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12] and (ii) extend pairwise decoders with type-speci\ufb01c parameters [42, 52].", "More generally, link prediction is closely related to statistical relational learning [24], where a common task is to predict missing relations between entities in a knowledge graph [42].", "Adapted from [60]. edge types, the standard inner-product edge decoder ( i.e. , z i z j \u2248 A i,j ) can be replaced with a bilinear form [12, 42, 52]: where \u03c4 indexes a particular edge type and A \u03c4 is a learned parameter speci\ufb01c to edges of type \u03c4 ."]} +{"3215337|18986679": []} +{"1479507|3951790": ["Recently, [24], [25] extend to cover work leveraging other side information, such as vertex attributes and/or vertex labels, to harness representation learning."]} +{"1479507|207372751": ["theway for awide range of network analytic tasks to be easily and efficiently tackled in the new vector space, such as node classification [10], [11], link prediction [12], [13], clustering [2], recommendation [14], [15], similarity search [16], and visualization [17].", "Readers can refer to the survey papers [12], [73] for the recent progress in this field."]} +{"1479507|239537": ["[80] surveys a range of methods used to visualize graphs from an information visualization perspective."]} +{"9986936|207372751": ["2006; Murata and Moriyasu 2007) or precision on the top K predictions (Lu and Zhou 2011; Wang et al. 2007), both approaches have some drawbacks.", "Although there are some studies that evaluate link prediction performance by prediction accuracy (Hasan et al. 2006; Murata and Moriyasu 2007) or precision on the top K predictions (Lu and Zhou 2011; Wang et al. 2007), both approaches have some drawbacks."]} +{"54444869|12161567": []} +{"59222740|56517517": ["For example, (Zhang et al., 2018) and (Zhou et al., 2018) present two systematical and comprehensive surveys over a series of variants of graph neural networks.", "[14] and [15] present two systematical and compreensive surveys over a series of variants of graph neural networks.", "Unfortunately, most existing variants of graph neural etworks [14,15] are not applicable to the high-order structure enoded by hyperedges.", "Unfortunately, most existing variants of graph neural networks (Zhang et al., 2018; Zhou et al., 2018) are not applicable to the high-order structure encoded by hyperedges.", "Some of them are inherited from the limitation of graph neural networks, such as training substantially deeper models with more than a hundred of layers (He et al., 2016), handling dynamic structures (Zhang et al., 2018; Zhou et al., 2018), batch-wise model training, etc .", "Some of them are inherited from the limitation of raph neural networks, such as training substantially deeper modls with more than a hundred of layers [2] , handling dynamic tructures [14,15] , batch-wise model training, etc ."]} +{"59222740|54559476": [", 2016), handling dynamic structures (Zhang et al., 2018; Zhou et al., 2018), batch-wise model training, etc.", "Unfortunately, most existing variants of graph neural networks (Zhang et al., 2018; Zhou et al., 2018) are not applicable to the high-order structure encoded by hyperedges."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"52171640|12161567": ["Link prediction [25], recommender systems [48], and knowledge base completion [28] are all instances of this common task, where the goal is to predict unobserved edges between nodes in a graph using an observed set of training edges.", "Recent years have seen significant progress in using machine learning to reason with relational data [16], especially within the context of knowledge graph embeddings [6, 23, 18, 28, 29, 45], probabilistic soft logic [3], and differentiable tensor-based logic [11, 33].", "Following a long line of successful work on encoding edge and path relationships in knowledge graphs [23, 18, 28, 29], we implement P as follows: P(q, \u03c4) = R\u03c4q, (4) where Rd\u00d7d \u03c4 is a trainable parameter matrix for edge type \u03c4 ."]} +{"53035265|3907100": ["ties, types, and predicates in the KB: mapping \u2018Neymar\u2019 to the uniquelyidenti\ufb01edentity,\u2018teams\u2019 totheKBtypefootballCluband \u2018played for\u2019 to the KB predicate memberOf. State-of-the-art KB-QA (seesurveys [9,18])canhandle simplequestions liketheaboveexamplevery well,butstruggle withcomplex questions that involve Permission to make digital or hard copies of all or part of this work for personal or classroomus"]} +{"35288341|12161567": ["in knowledge graphs [19], as shown in [15, 17]."]} +{"53691235|44843617": [", every second/millisecond) [21], [22], [23], [24] and therefore can be used for a variety of applications requring real-time performance [25], [26], [27]."]} +{"207238964|393948": ["Representation learning has long been an important problem of machine learning and many works aim at learning representations for samples [3, 35]."]} +{"3398916|14140377": []} +{"3674966|12161567": []} +{"3674966|1259855": ["Several recent surveys and comparative studies describe and compare the approaches in one or more of these categories on several tasks (Kimmig et al., 2015; Nickel et al., 2016a; Kazemi et al., 2017)."]} +{"5842463|393948": ["The number of patients who made at least two visits is 2,695, and the number of unique diagnosis code (3-digit ICD-9 code) is 767, which is a subset of Sutter dataset."]} +{"3375355|12161567": ["Nickel et al. (2016) survey models in all paradigms for knowledge graph completion.", "\u2022 One of the claimed advantages of models based on weighted rule learning compared to other relational models is that they can be easily explained to a broad range of people (Nickel et al., 2016).", "For instance, Nickel et al. (2016)describethemastwoseparateclassesofmodelsforlearning fromrelationaldataintheirsurvey."]} +{"3375355|1259855": ["Kimmig et al. (2015) survey the models based on weighted rule learning."]} +{"14332931|12161567": []} +{"49310446|3766791": ["While use of vector-Jacobian products for solving the adjoint method has been explored in optimal control (Andersson, 2013), we explore a fully general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) and highlight its potential in deep learning and generative modeling.", "\u2026for solving the adjoint method has been explored in optimal control (Andersson, 2013; Andersson et al., In Press, 2018), we highlight the potential of a general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) for deep learning and generative modeling."]} +{"49310446|1400872": ["The use of the adjoint method for training continuous-time neural networks was previously proposed (LeCun et al., 1988; Pearlmutter, 1995), though was not demonstrated practically."]} +{"9884935|12161567": ["Information about these datasets is given in Table 2.", "However, because knowledge bases are typically incomplete, it is useful to be able to perform link prediction, i.e., predict whether a relationship not in the knowledge base is likely to be true."]} +{"13756305|1259855": ["What distinguishes LRNNs from these previous works is that, following the lifted modelling strategy (Kimmig et al., 2015), we construct a different ground network for each example, exploiting each example\u2019s particular relational properties.", "What distinguishes LRNNs from these previous works is that, following the lifted modelling strategy (Kimmig et al., 2015), we construct a di\ufb00erent ground network for each example, exploiting each example\u2019s particular relational properties."]} +{"13756305|47023662": ["There have been a few other approaches which adapt neural networks for relational learning (Franca, Zaverucha, & Garcez, 2014; Botta, A, & Piola, 1997; Bader & Hitzler, 2005; Ramon & De Raedt, 2000; Uwents, Monfardini, Blockeel, Gori, & Scarselli, 2011).", "While there are many other approaches to neural-symbolic integration that rely on relational (and \ufb01rst-order) representations (Bader & Hitzler, 2005), e.g. based on the CORE method (H\u00a8olldobler, Kalinke, & St\u00a8orr, 1999), they typically search for a neural network modelling a given logic program,\u2026"]} +{"19370455|12161567": ["Various statistical relational learning methods (Getoor, 2007; Nickel et al., 2015) have been proposed for this task, among which vector-space embedding models are most particular due to their advantageous performance and scalability (Bordes et al.", "Various statistical relational learning methods (Getoor, 2007; Nickel et al., 2015) have been proposed for this task, among which vector-space embedding models are most particular due to their advantageous performance and scalability (Bordes et al., 2013)."]} +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"15150247|12161567": ["However, due to time constraints and the complexity of an ef\ufb01cient implementation of HolE, we record the original results for HolE as reported in Nickel et al. (2016b).", "However, the asymmetry in the composition function in HolE stems from the asymmetry of circular correlation, an O ( nlog ( n )) operation, whereas ours is inherited from the complex inner product, in O ( n ) .", "In HolE the circular correlation is used for combining entity embeddings, measuring the covariance between embeddings at different dimension shifts.", "Indeed, the DistMult and TransE models are outperformed here by ComplEx and HolE, which are on par with respective \ufb01l-tered MRR scores of 0.941 and 0.938.", "Furthermore, we chose TransE, DistMult and HolE as baselines since they are the best performing models on those datasets to the best of our knowledge (Nickel et al., 2016b; Yang et al., 2015).", "For a given fact r(s,o) in which subject s is linked to object o through relation r , the score can then be recovered as a multi-linear product between the embedding vectors of s , r and o (Nickel et al., 2016a).", "In these cases all eigenvalues and eigenvectors live in the real space and E is orthogonal: DistMult (Yang et al., 2015) < w r , e s , e o > w r \u2208 R K O ( K ) O ( K ) HolE (Nickel et al., 2016b) w Table 1.", "Since ranking measures are used, previous studies generally preferred a pairwise ranking loss for the task (Bordes et al., 2013b; Nickel et al., 2016b).", "On FB15K, the gap is much more pronounced and the ComplEx model largely outperforms HolE, with a \ufb01ltered MRR of 0.692 and 59.9% of Hits at 1, compared to 0.524 and 40.2% for HolE.", "\u2026sign-pattern as Y : This is theoretically justi\ufb01ed by the fact that the sign-rank is a natural complexity measure of sign matrices (Linial et al., 2007) and is linked to learnability (Alon et al., 2015), and empirically con\ufb01rmed by the wide success of factorization models (Nickel et al., 2016a).", "A recent novel way to handle antisymmetry is via the Holographic Embeddings (HolE) model by (Nickel et al., 2016b)."]} +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"19218953|12161567": ["on et al. 2016) with a recent survey in (Nguyen 2017). Except RESCAL (Nickel, Tresp, and Kriegel 2012), all other works along this line only focus on predicting new relations from existing ones (cf. (Nickel et al. 2016) section X.A). As described in (Kazemi et al. 2017), for aggregation problems studied in this work, RESCAL\u2019s proposal ends up memorizing the training labels and does not generalize to unseen cases. Th", "Except RESCAL (Nickel, Tresp, and Kriegel 2012), all other works along this line only focus on predicting new relations from existing ones (cf. (Nickel et al. 2016) section X."]} +{"3087701|12161567": ["Knowledge graph completion (KGC) (Nickel et al., 2015) aims at augmenting missing knowledge in an incomplete knowledge graph automatically.", "In recent years, methods based on vector embeddings of graphs have been actively pursued as a scalable approach to KGC (Bordes et al., 2011; Socher et al., 2013; Guu et al., 2015; Yang et al., 2015; Nickel et al., 2016; Trouillon et al., 2016b).", "These models are simple yet achieve the current state-of-the-art performance in KGC."]} +{"207681776|14414383": ["Anomaly detection (a.k.a outlier detection) in dynamically changing networks is a long-standing problem deeply motivated in a number of application domains, such as social media, security, public health, and computational biology [1, 5, 7, 16, 33].", "We have presented NetWalk to detect anomalies in dynamic networks, by learning faithful network representations which can be updated dynamically as the network evolves over time."]} +{"4570891|207372751": ["The first factor is akin to that in static network link prediction [L\u00fc and Zhou, 2011; Hasan and Zaki, 2011].", "The first factor is akin to that in static network link prediction [Lu\u0308 and Zhou, 2011; Hasan and Zaki, 2011]."]} +{"13019454|38476": []} +{"67855526|207372751": ["Similarity indices, like Common Neighbor (CN) [15] and Resource Allocation Index (RA) [16], are widely used in link prediction of static networks [17], but they can hardly deal with the changes of the network structure directly."]} +{"67855526|18037424": ["NETWORKS are often used to describe complex systems in various areas, such as social science [1], [2], biology [3], electric system [4], economics [5], etc."]} +{"13741853|14414383": ["and dynamic mixed-membership role models [22, 59], anomaly detection in dynamic networks [55], influence modeling and online advertisement [24], finding important entities in dynamic networks [23, 49] temporal network centrality and measures [29]."]} +{"13741853|44843617": [", every second/millisecond) [2, 3, 5, 27] and therefore can be used for a variety of applications requring real-time performance [6, 12, 53]."]} +{"53046735|4791166": ["Neural networks have recently been shown to perform well for every step (Dong, 2018)."]} +{"3385146|12161567": ["Large-scale knowledge bases (KB) such as DBPedia (Lehmann et al. 2015) or YAGO (Rebele et al. 2016) contain millions of entities and facts, but they are nevertheless far from being complete (Nickel et al. 2016)."]} +{"8040343|12161567": ["Other sophisticated models include Holographic Embeddings (HoLE) (Nickel et al., 2016b) that employs circular correlation on entity embeddings and Neural Association Models (NAM) (Liu et al., 2016), a deep network used for probabilistic reasoning.", "(Nickel et al., 2016a) and (Yang et al., 2015; Toutanova & Chen, 2015) contains comprehensive reviews and empirical comparison of relational learning techniques respectively."]} +{"16407324|12161567": ["However, due to time constraints and the complexity of an efficient implementation of HolE, we record the original results for HolE as reported in Nickel et al. (2016b).", "For a given fact r(s,o) in which the subject entity s is linked to the object entity o through the relation r, a score for the fact can be recovered as a multilinear product between the embedding vectors of s, r and o, or through more sophisticated composition functions (Nickel et al., 2016a).", "We instead compare to the HolE model (Nickel et al., 2016b), as it is the state-of-art-model on these datasets.", "A recent novel way to handle antisymmetry is via the Holographic Embeddings (HolE) model by Nickel et al. (2016b).", "Since ranking measures are used, previous studies generally preferred a max-margin ranking loss for the task (Bordes et al., 2013b; Nickel et al., 2016b).", "Learnable relation patterns can be efficiently approximated with a low-rank factorization using complex-valued embeddings.", "As stated in the experimental section, the comparison with the HolE scoring function is not fair as results are reported from the original paper (Nickel et al., 2016b), in which a different loss is used.", "For evaluation, we measure the quality of the ranking of each test triple among all possible subject and object substitutions : r(s\u2032, o) and r(s, o\u2032), for each s\u2032, o\u2032 in E , as used in previous studies (Bordes et al., 2013b; Nickel et al., 2016b).", "\u2026low-sign rank assumption is theoretically justified by the fact that the sign-rank is a natural complexity measure of sign matrices (Linial et al., 2007) and is linked to learnability (Alon et al., 2015) and empirically confirmed by the wide success of factorization models (Nickel et al., 2016a).", "More recently the HolE model\n(Nickel et al., 2016b) proposes a solution that has quasi-linear complexity in time and linear space complexity.", "Keywords: complex embeddings, tensor factorization, knowledge graph, matrix completion, statistical relational learning"]} +{"52183483|12161567": [", p , o ) (Nickel et al., 2016)."]} +{"7647615|207372751": []} +{"7647615|3042022": []} +{"7647615|386036": []} +{"52823666|17195518": ["Graph-based learning has been applied to various machine learning tasks to utilize entity relations [2, 11, 26, 41 ?"]} +{"19135805|13151033": [", completion or de-duplication) of the input KG [123], from different viewpoints and application context."]} +{"19135805|12161567": ["For more details about these combined models, refer to [36] and references therein.", "Minimizing the pairwise ranking loss has an additional advantage: it does not assume that negative examples are necessarily false, just that they are more invalid than those positive ones [36].", "[36] have made a survey of statistical relational learning methods on KGs, including embedding techniques, path ranking algorithms [37], [38], [39], and Markov logic networks [40], [41], [42].", "For more details about tensor representation of KGs and tensor factorization models, refer to [13], [36] and references therein."]} +{"15900661|207372751": ["Of these, four indices use local topological structures, namely, Common Neighbor,Jaccard,Adamic/Adar andPreferential Attachment [1].", "It assigns relative scores to all nodes in the network based on the principle that connections to highscoring nodes contribute more to the score of the node in question than similar connections to low-scoring nodes [1].", "The remaining index, Katz, uses a global topological structure [1].", "For the traditional methods, we used the similarity measurements of Common Neighbor, Jaccard, Adamic/Adar, Katz, and Preferential Attachment, denoted as CN, JC, AA, Katz, and PA, respectively.", "In a social security network, link prediction is used to identify hidden groups of terrorists or criminals [1], while in networks of human behavior, link prediction is used to detect and classify the behavior and motion of people [2]."]} +{"3951790|207372751": ["Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention (Liben-Nowell and Kleinberg 2007; Lu\u0308 and Zhou 2011).", "Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention [7], [82]."]} +{"3951790|239537": ["\u2026and analysis tasks such as node classi\ufb01cation (Sen et al. 2008; Perozzi, Al-Rfou, and Skiena 2014), node clustering (Wang et al. 2017b), network visualization (Herman, Melanc\u00b8on, and Marshall 2000; Wang, Cui, and Zhu 2016) and link prediction (Liben-Nowell and K-leinberg 2007; Ou et al. 2016).", "Network embedding, as a promising way of network representation, is capable of supporting subsequent network processing and analysis tasks such as node classification [2], [3], node clustering [4], network visualization [5], [6] and link prediction [7], [8]."]} +{"207238980|393948": []} +{"207238980|11608263": ["In a typical node classification task, we are interested in predicting the most probable labels of nodes in a network [33]."]} diff --git a/edge/graph_167220747.jsonl b/edge/graph_167220747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64f90a9f04c5c5f2a4d3addc87e345c397d794bc --- /dev/null +++ b/edge/graph_167220747.jsonl @@ -0,0 +1,14 @@ +{"58411845|7704963": []} +{"14544742|13093354": []} +{"3428955|2355696": []} +{"44500774|16768404": []} +{"44500774|12574246": ["Social media information overload and the diversity of information create difficulties and challenges in information processing, presentation and analysis (Batrinca and Treleaven, 2015, Schuller et al., 2015)."]} +{"18872194|16768404": ["Our work also differs from others that address general approaches for sentiment analysis [Medhat et al. 2014; Feldman 2013; Tsytsarau and Palpanas 2012; Liu 2012; Montoyo et al. 2012; Vinodhini and Chandrasekaran 2012]."]} +{"45581351|56279118": []} +{"52274379|10694510": []} +{"52274379|6543150": []} +{"52049564|19739314": ["There have been a number of state of the art research proposed for community detection [14, 23, 33, 42, 43] which has discussed and compared various community detection algorithms."]} +{"207238769|393948": ["To address these limitations, researchers started exploring algorithms that are capable of obtaining learning representations of the data and these make it easier to extract useful information for building the classi\ufb01er [Bengio et al. 2013].", "Recently, researchers started exploring algorithms that are capable of learning representations of data to overcome these limitations [Bengio et al. 2013]."]} +{"5837127|10975328": ["ral visualization (for a survey, see Silva [26])."]} +{"11952894|1230643": []} +{"11952894|60455": ["Harvesting information from social media feeds is in essence a web-mining process (Kosala and Blockeel 2000, Sakaki et al. 2010, Russell 2011)."]} diff --git a/edge/graph_167222315.jsonl b/edge/graph_167222315.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41c0a60e6e012f13668acd63a7b44f9a444d88a1 --- /dev/null +++ b/edge/graph_167222315.jsonl @@ -0,0 +1,41 @@ +{"35187639|3536399": []} +{"35187639|29145577": ["First, the increasing demand for user\u2019s privacy and data encryption has tremendously raised the amount of encrypted traffic in today\u2019s Internet (Velan et al. 2015).", "Finally, many of the Internet service providers (ISPs) block P2P \ufb01le sharing applications because of their high bandwidth consumption and copyright issues [7].", "According to [5, 6] only 30% to 70% of the current Internet tra\ufb03c can be classi\ufb01ed using port-based classi\ufb01cation methods.", "Furthermore, the increasing demand for user\u2019s privacy and data encryption has tremendously raised the amount of encrypted tra\ufb03c in today\u2019s Internet [4].", "Their scheme was able to identify a broader range of protocols including \ufb01le transfer protocol (FTP), Internet Message Access Protocol (IMAP), SSH, and TELNET with accuracy up to 87%.", "A VPN is a private overlay network among distributed sites which operates by tunneling tra\ufb03c over public communication networks (e.g., the Internet).", "Emergence of new applications as well as interactions between various components on the Internet, have dramatically increased the complexity and diversity of this network which makes the tra\ufb03c classi\ufb01cation a di\ufb03cult problem per se.", "VoipBuster is an application which o\ufb00ers voice communications over Internet infrastructure.", "Traffic classification has attracted a lot of interests in both academia and industrial activities related to network management (e.g., see Dainotti et al. 2012; Finsterbusch et al. 2014; Velan et al. 2015) and the references therein).", "Tor was proposed to protect users against Internet surveillance known as \u201ctra\ufb03c analysis.\u201d"]} +{"51873696|12815020": []} +{"3306364|11381530": ["[25] have produced a comprehensive taxonomy and survey on notable NIDSs approaches that utilise deep and shallow learning."]} +{"3306364|18188725": ["[2] presented a state-of-the-art survey of deep learning applications within machine health monitoring.", "Not only is this a labour intensive and expensive process but it is also error prone [2].", "One of the most prominent techniques currently used within deep learning research is DBNs [1], [2], [7]."]} +{"53290395|55524073": ["Bringer et al. [49] they made a review of more than 80 papers based on honeypot intrusion detection system."]} +{"1868394|207209718": ["In the literature, privacy preservation data mining techniques have emerged in order to protect sensitive information [1] [3] [4], but the above limitations for SCADA data are still an active area of research.", "SCADA systems organize manifold software and hardware components, which allow industrial institutions to gather, monitor, and process data, and also, cooperate with control technologies that are connected over Human Machine Interface (HMI) software and record events into a log file [4][15].", "Data mining and machine learning algorithms are widely used for establishing an effective IDS [4] because of their capability to handle a large volume of historical data, as it is hard for people to deduce primary traffic patterns in such SCADA\u2019s data.", "Intrusion Detection Systems (IDSs) for SCADA systems have become an active domain of research [2][3][4][5].", "Although it offers relatively high detection rates (DRs) and low false positive rates (FPRs), it cannot identify new attacks [3] [4]."]} +{"37097438|8364569": ["For example, in Ping of Death attack, an echo request message is sent to the host with a size larger than the normal packet size (Sperotto et al., 2010)."]} +{"37097438|15247126": ["As an example, IP spoofing attack is based on a spoofed IP address in the IP header to enable an intruder to appear as a trusted node and establish connection with a victim node (Zander et al., 2007)."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"1641347|13172512": ["This practice should be avoided for statistical reasons [38].", "This last practice should be avoided for statistical reasons [38]."]} +{"53779029|37564067": ["in [115] provide a comprehensive review of economic and pricing approaches for detecting security attacks against wireless networks, such as eavesdropping, jamming and black hole attacks."]} +{"53779029|2142482": ["Likewise, Mitchell and Chen [112] classify existing anomaly, signature based and hybrid IDS techniques according to the type of system they will be deployed to.", "Cheng et al. [24] tested five different IDS evasion techniques against known misuse-based systems like SNORT."]} +{"53779029|8364569": ["On the contrary, a flow-based NIDS inspects only the packet headers and uses input data in the form of NetFlow or IPFIX [16].", "inspects only the packet headers and uses input data in the form of NetFlow or IPFIX [16]."]} +{"53779029|191396": ["The goal of clustering is to separate a finite unlabelled dataset into a finite and discrete set of \u201cnatural\u201d, hidden data structures, rather than providing an accurate characterization of unobserved samples generated from the same probability distribution [40]."]} +{"11381530|207209718": ["These threats can be devastating, for example, Denial of service (DoS) denies or prevents legitimate users resource on a network by introducing unwanted traffic [5]."]} +{"11381530|9928823": ["[138] Li Deng, \u201cA tutorial survey of architectures, algorithms, and applications for deep learning,\u201d APSIPA Trans.", "To train RNN as a discriminative model, training data needs to be presegmented and a post-processing to transform the output to a labelled data [138].", "Other forms are stacked auto encoder and de noising auto encoder a [138].", "The joint statistical distribution of the variables can be written as products of the nodes and their associated variables [136], [138].", "Its structure is an offspring of a general Boltzmann machine (BM) which is a network of units based on stochastic decisions to determine their on and off states [138]."]} +{"11381530|11211443": ["The traffic activities gathered by the system application files and system [20] are called the audit trails [22]\u2013[24]."]} +{"11381530|18977370": ["a) Mean, standard deviation and any other form of correlations are known as moments in statistics [35], [45]."]} +{"11381530|12815020": ["One advantage is that it offers the ability to detect attacks which are new to the system [34]."]} +{"11381530|6430931": ["The model compares an input vector to a single neuron\u2019s weight (weight vector) [118], [126].", "The outcomes are True Negative (TN), True Positive (TP), False Positive (FP) and False Negative (FN) [118], [119].", "The supervised models are made up of ARTMAP, Fuzzy ARTMAP and Gaussian ARTMAP [118].", "Anomaly events can thus be identified by analysing the normal and abnormal events from the mapping [118], [126].", "It classifies by taking a measurement of the distance between the inputs and the centre of hidden neurons [118]."]} +{"11381530|192934": ["[78] developed a model of statistical pattern recognition as shown in Fig."]} +{"11024200|16621677": ["This paper deals with the idea to maintain the security and stability of Networked critical Infrastructures (NCI).", "[19] Jaipal Singh Parihar, Jitendra Singh Rathore, Kzvita Burse, \u201cAgent Based intrusion Detection Sytem to find Layers Attack, \u201cin IEEE International conference on Communication Systems and Network Technologies, 2014,pp.685-689.", "[10] J.Sathya priya, M.Ramkrishnan, S.P. Rajagopalan, \u201cDetection of DDoS attacks using IP Traceback and Network Coding Technique, \u201c in journal of theoritical and applied Information Technology,chennai,2014,pp.99-106.", "[25] Michael Riecker, Daniel Thies and Matthias Hollick, \u201cMeasuring the Impact of Denial of Service attack in wireless Sensor nodes, \u201cin 39th annual IEEE conference on Local Computer Networks,2014,pp.296-304.", "[3] Jisa David,Ciza Thomas, \u201dDDoS Detection using Fast Entropy Approach on Flow Based Network Traffic, \u201c 2nd International Symposium on Big Data and cloud computing(ISBCC\u2019 15), vol.50,2015,pp.30-36.", "REFERENCES [1] Ashish Patil,Rahul Gaikwad, \u201dComparative analysis of the\nPrevention Techniques of Denial of Service attacks in Wireless Mesh Network, \u201cin ICCC, vol.48,Bhubaneswar,2015,pp.387-393.", "[11] Michael riecker, Daniel Thies, Matthias Hollick, \u201cMeasuring the Impact of Denial of Service attack on Wireless Sensor Networks, \u201cin IEEE conference,Germany,2014,pp.296-304.", "[21] Munish Dhar, Rajeshwar Singh, \u201cA Review of Security Issues and Denial of Service Attacks in Wireless Sensor Networks, \u201cin International Journal of Computer Science and Information Technology Reasearch,vol.3,2015,pp.27-33.", "[18] Omar Al-Jarrah, Ahmad Arafat, \u201cNetwork intrusion Detection System using attack Behaviour classification, \u201c in IEEE International Conference on Information and Communication Systems,2014."]} +{"13815452|8364569": ["Using NetFlow records were also employed in the past from detecting various attacks including botnets [25]."]} +{"3927014|16762549": ["The concept of IoT dates back to the early 1980s, where a vending machine selling Coca-Cola beverages located at the Carnegie Mellon University was connected to the Internet, so that its inventory could be accessed online to determine if drinks were available [32].", "power and some form of network communication capabilities that allow a user to remotely access and use their services or view information collected by them [32, 33]."]} +{"3927014|6155039": []} +{"53247975|18341905": []} +{"32441310|13172512": ["Machine learning has been extensively used for network traffic classification [78]."]} +{"26249349|31245252": ["Data-related security problems are investigated as well [13]\u2013 [17]."]} +{"25188727|8569776": ["Ensuring high crop production yield is critical in maintaining global food security [1][2][3]."]} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} +{"45436012|206584087": ["[38] presented a survey of defense methods against DDoS flooding attacks."]} +{"45436012|54746333": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} diff --git a/edge/graph_167222332.jsonl b/edge/graph_167222332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f574715acb585fddf3ffa084cdade7bee706214c --- /dev/null +++ b/edge/graph_167222332.jsonl @@ -0,0 +1,5 @@ +{"17365448|8310135": ["Extracting atomic identifying and sensitive attributes (such as name, address, and disease name) from unstructured text such as pathology reports can be seen as an application of named entity recognition (NER) problem [17, 22].", "We leverage the latest Named Entity Extraction techniques [17, 22], in particular, conditional random fields based techniques to effectively extract identifying and sensitive information from unstructured data, and 3) Anonymization."]} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"2206177|16153186": []} +{"2206177|17205659": []} diff --git a/edge/graph_16723776.jsonl b/edge/graph_16723776.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16724897.jsonl b/edge/graph_16724897.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_167275631.jsonl b/edge/graph_167275631.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16731628.jsonl b/edge/graph_16731628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eaa4a9b97a09217b91533f0f46f18fdaa1d75023 --- /dev/null +++ b/edge/graph_16731628.jsonl @@ -0,0 +1,4 @@ +{"6014277|12419623": ["Andrad\u00f3ttir (1998) and \nAzadivar (1999) provided reviews of simulation optimization tech\u00adniques.", "\u2026Research Institution of Industrial \nEngineering Lawrence Technological University Chongqing University Southfield, MI 48975, USA Chongqing, \nP.R. CHINA Ziming Yang Jay Lee Jun Ni Dept. of Mechanical Engineering Dept. of Mechanical Engineering \nDept. of Mechanical Engineering University of\u2026", "OPTIMIZED MAINTENANCE DESIGN FOR MANUFACTURING PERFORMANCE IMPROVEMENT USING \nSIMULATION Ahad Ali Xiaohui Chen Dept. of Mechanical Engineering Research Institution of Industrial \nEngineering Lawrence Technological University Chongqing University Southfield, MI 48975, USA Chongqing, \nP.R. CHINA Ziming Yang Jay Lee Jun Ni Dept. of Mechanical Engineering Dept. of Mechanical Engineering \nDept. of Mechanical Engineering University of Michigan Ann Arbor University of Cincinnati University \nof Michigan Ann Arbor Ann Arbor, MI 48109, USA Cincinnati, OH 45221, USA Ann Arbor, MI 48109, USA ABSTRACT \nThis research presents optimized maintenance design using simulation to analyze the capability of auto \npart manufac\u00adturing production system."]} +{"9734430|34621298": []} +{"40468743|34621298": ["Three types of interaction on multi component systems can be considered: economic dependence, structural dependence and stochastic dependence (Dekker et al .", "Dekker et al .", "In the case of these three opportunistic maintenance policies, it is di\ufb03cult to de\ufb01ne a mathematical model to evaluate the cost and the availability corresponding to a set of parameters (Dekker et al ."]} +{"13599661|207584909": ["Further, if the probability distribution varies with time, then it may be impossible to generate analytical solutions and for such problems."]} diff --git a/edge/graph_16731904.jsonl b/edge/graph_16731904.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e68c592c20d5c115ec6303475fa41c68dad63a69 --- /dev/null +++ b/edge/graph_16731904.jsonl @@ -0,0 +1,3 @@ +{"29542575|16731904": ["For graphs, hypergraphs, and related set systems several types of products have been investigated, see [18, 14] for recent overviews.", "The Cartesian product is associative, commutative, and the trivial one-vertex hypergraph K1 without arcs serves as unit [18, 25]."]} +{"8408175|239537": []} +{"11974468|16731904": ["products arise in a variety of different contexts, from computer science [1, 30] to theoretical biology[18, 43], computationalengineering[31, 32] or just as natural structures in discrete mathematics [8, 37, 17, 22, 19]. Standard references with respect to graph products are due to Imrich, Klavz\u02c7ar, Douglas and Hammack[24, 25, 10]. In this contribution we are concernedwith the prime factor decomposition,PFD for shor"]} diff --git a/edge/graph_16732688.jsonl b/edge/graph_16732688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29c7076556214d4576807912d390d7f723b2c9b5 --- /dev/null +++ b/edge/graph_16732688.jsonl @@ -0,0 +1,20 @@ +{"15747067|16156203": ["Data mining can help reveal potential locations of some (as yet undetected) natural resources or assist in building early warning systems for floods."]} +{"15747067|3102110": ["Mining temporal data was also proposed in a study on temporal database and decision making in flood control problems [ 7 ]."]} +{"23697142|1708582": []} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"19277476|13726263": ["All data mining problems comprise an interesting challenge in a streaming environment [6\u20138] mainly because of the one-pass requirement and strict memory limitations.", "For kmeans with k = 2 we observe that vectors 0 to 5 (representing period [0\u2013300]), 12\u201317 ([600\u2013900]) and 24\u201329 ([1,200\u20131,500]) are assigned to the same cluster (Cluster 0)."]} +{"9119649|16156203": ["We compare the results obtained using this method with those reached by traditional global analysis."]} +{"9119649|1176034": ["We compare the results obtained using this method with those reached by traditional global analysis."]} +{"16592739|4474193": ["So, we propose a new categorization for concept drift, seeking inspiration from the dynamic optimisation problems area [27]\u2013[29]."]} +{"16592739|1097238": ["Although there are some theoretical results, they are highly restricted and make strong assumptions unlikely to be hold in practice [39]."]} +{"207172599|3330313": []} +{"16920625|14171067": ["All of them are known to be NP-hard and also known to be difficult to approximate [3, 17]."]} +{"16695133|2253457": []} +{"5961630|5333379": ["\u00a9 Springer-Verlag Berlin Heidelberg 2007\nKeywords: Generalization, Dimensionality, Evolution, Learning, Multi-agent systems, Neural networks, Sample size."]} +{"108187599|5835346": ["Consequently, existing surveys on ensemble methods for classification [Kuncheva, 2004; Ranawana and Palade, 2006] are not suitable for providing an overview of existing approaches for regression."]} +{"108187599|1097238": ["[Brown et al., 2005]."]} +{"15116717|3330313": ["(Hodge and Austin 2004; Markou and Singh 2003a, 2003b).", "[11, 16, 17]."]} +{"9789095|4474193": ["magnitudes of change are easier to adapt to, primarily by \u201ctransferring knowledge from the past\u201d [9, p 311] which may help to accelerate the rate of convergence after a change has occurred."]} +{"597270|4474193": ["A main concern of evolutionary algorithms (EAs) for solving dynamic optimization problems (DOPs) is to maintain the genetic diversity of the population [6,10, 16] in order to guarantee continuing and sustainable"]} +{"32356557|1097238": ["Extensive surveys on ensemble building methods can be found in [5] and in [20]."]} diff --git a/edge/graph_16735221.jsonl b/edge/graph_16735221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16742625.jsonl b/edge/graph_16742625.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9662ea8ce6aa4e6d3e1724bcf2fea710149c39ea --- /dev/null +++ b/edge/graph_16742625.jsonl @@ -0,0 +1 @@ +{"36857539|2511280": ["If the extreme weights arise from a correct model for the odds of inclusion in one trial versus another, then the decreased statistical power is an honest reflection of the information available for cross-trial comparison.([35]) For example, if baseline charac-"]} diff --git a/edge/graph_16743385.jsonl b/edge/graph_16743385.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ecb2db19896fe1fdcbee19d354f4a25bef4ea87b --- /dev/null +++ b/edge/graph_16743385.jsonl @@ -0,0 +1,4 @@ +{"17139706|8953108": ["The histogram is approximated in the least square sense by a sum of Gaussian distributions, and statistical decision procedures applied [9]."]} +{"17734164|9045232": []} +{"15782139|2762290": []} +{"15782139|6746689": []} diff --git a/edge/graph_167443325.jsonl b/edge/graph_167443325.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16746916.jsonl b/edge/graph_16746916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16748080.jsonl b/edge/graph_16748080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..187900b5b0c2dc970aeccf804fd6221e0f18f5df --- /dev/null +++ b/edge/graph_16748080.jsonl @@ -0,0 +1,15 @@ +{"1710915|50041": []} +{"5252801|14889616": []} +{"2329226|2854761": ["Most standard network architectures can provide four different QoS classes: conversational, streaming, interactive and background [96], [33], [121], [21]."]} +{"2329226|8909218": ["The advent of Femtocells access points, for example, will certainly improve indoor coverage and provide reliable connectivity without the need for the cost-inefficient deployment of additional base stations [119], [22]."]} +{"12629834|15516254": ["Congestion control for streaming multimedia has to take into account not only the fairness and responsiveness of the transport protocol, but also the smoothness of the sending rate to help the multimedia application achieve better playback quality [5]."]} +{"8042720|3540699": ["More recently, an error robust rate distortion optimization method, referred to as ER-RDO, has been developed for video coding in packet-loss environment [14], [15], which has been adopted in the H.264/AVC test model [ 16 ], [17]."]} +{"8042720|7439310": ["Another category of solutions is based on the error control strategy in source coding, e.g., error-resilient video coding [ 2 ]."]} +{"15809720|3540699": ["Hence, although the concepts proposed in this paper can potentially be deployed with state-of-the-art nonscalable coding with bitstream switching [11], [12] this usually entails higher complexity and smaller granularity for real-time packet prioritization and adaptive retransmissions."]} +{"28587215|17113548": ["Bandwidth can be dynamically renegotiated according to changes in the bit stream level statistics [8]."]} +{"9615004|15516254": ["Congestion control for streaming multimedia takes care of not only the fairness and responsiveness of the transport protocol, but also the rate smoothness to help the application achieve better playback quality[1]."]} +{"701724|10559330": []} +{"29301579|3540699": ["H.264 is the latest international video coding standard developed by ITU-IT Video Coding Experts Group along with Moving Picture Experts Group (MPEG) as a joint effort known as JVT (Joint Video Team) and was first published in 2003 [3, 13 ]."]} +{"4412002|7185733": ["Some of the modes of communication include gestures [15], speech [16], haptics [17], eye blinks [18], and many others."]} +{"24376795|15516254": ["One area focuses on congestion control for multimedia transmission, where the adjustment of the transmission rate either follows the AIMD style of TCP [21, 25] or the rate achieved is TCP friendly [23, 24, 26].", "Both window-based [3, 12] and rate-based [14, 22, 26] congestion control approaches have some mechanisms similar to the Additive Increase Multiplicative Decrease (AIMD) of TCP."]} +{"31195732|3540699": ["264 [14], we define a slice to be a row of macroblocks (MBs)."]} diff --git a/edge/graph_16755687.jsonl b/edge/graph_16755687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac50c71c6916d38120792266bd295bbbf9071e83 --- /dev/null +++ b/edge/graph_16755687.jsonl @@ -0,0 +1,17 @@ +{"55209497|2835258": ["However, one important drawback of current greedy approaches is that the position of the destination needs to be known with an accuracy of a one-hop transmission range, otherwise the packets cannot be delivered [13].", "Routing is mainly greedy, but if a mobile host fails to find a neighbor closer than itself to the destination, it switches the message from \u2018greedy\u2019 state to \u2018face\u2019 state [13].", "GPSR guarantees that a path will be found from the source to the destination if there exists at least one such path in the original non-planar graph [13].", "Greedy forwarding is both efficient and very well suited for use in Ad-Hoc networks with a highly dynamic topology [13].", "Greedy protocols do not establish and maintain paths from source to the destination; instead, a source node includes the approximate position of the recipient in the data packet and selects the next hop depending on the optimization criteria of the algorithm; the closest neighbor to the destination for example [13], [20].", "Unfortunately, greedy routing may not always find the optimal route, and it may even fail to find a path between source and destination when one exists [13].", "Compass routing algorithms, such as DIR [4], try to minimize the spatial distance that a packet travels and are based on forwarding the packet to the neighboring node that minimizes the angle between itself, the previous node and the destination [13].", "It returns to greedy mode when it reaches a node closer to the destination than the node where the packet entered the recovery mode [13].", "There are different kinds of position-based protocols which are categorized into three main groups: restricted directional flooding, greedy and hierarchical routing protocols [13] (to be discussed in Section 2).", "The four possible combinations can be abbreviated as some-for-some, some-for-all, all-for-some and all-for-all [13]."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"25033620|870434": ["Recently, much research on underwater wireless sensor networks (UWSNs) has been performed to support practical applications such as underwater tactical surveillance, undersea exploration, underwater disaster prevention, seismic monitoring, etc [1][2][ 3 ]."]} +{"2835258|14441987": ["A survey and comparison of topology-based approaches can be found in [ 10 , 11]."]} +{"16694529|205286988": []} +{"16694529|2835258": ["Others focus only on certain aspects, like mobility [10] or forwarding strategies and the local minima problem [11].", "While some surveys are very detailed covering numerous algorithms, they do not take into consideration some novel protocols because of their date of publication [5] [7-10].", "[7 ] 10."]} +{"16490750|16514036": []} +{"16490750|870434": ["\u2026environmental conditions as well as some system constraints, an underwater sensor network is usually viewed as an Intermittently Connected Network (ICN) or Delay/disruption Tolerant Network (DTN) which requires specialized routing protocols [Guo et al., 2008; Partan, Kurose, and Levine, 2006]."]} +{"16731606|14441987": []} +{"5178260|141053": ["There has been intensive recent research on MAC protocols fo r ad hoc [17] and wireless terrestrial sensor networks [16]."]} +{"5178260|1762301": ["In recent years there has been a great interest to develop new routing protocols for terrestrial ad hoc [1] and wireless se nsor networks [2]."]} +{"14655853|2835258": ["Among the proposed packet forwarding schemes based on the individual node position, some main categories can be identified [6].", "A completely different geographic routing category uses restricted directional flooding [6].", "In contrast to generic MANETs, where mostly topology-based routing protocols are being developed, many of the VANET projects use position-based routing mechanisms [6] for establishing connectivity between vehicles."]} +{"17166573|870434": [", building underwater sensor networks) to enable/enhance applications such as oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications [9], [8], [2], [4], [3], [7]."]} +{"30192451|2835258": ["Parameter combination Representative topological routing\n1-hop \u2014 Flat Edge Forwarding, Liu's Flooding Algorithm\n1-hop \u2014 Hierarchical CBRP\nk-hop \u2014 Flat ZRP, IZRP, TZRP\nk-hop \u2014 Hierarchical k-hop cluster-based DSR\nD-hop \u2014 Flat DSDV\nD-hop \u2014 Hierarchical N/A\n\u25a0 Table 2.", "By maintaining two different zones, TZRP aims to decouple the capability of the protocol to adapt to traffic characteristics from the capability of adapting to mobility.", "In another ZRP variant, Two Zone Routing Protocol (TZRP) [9], each node maintains two zones: a crisp zone and a fuzzy zone."]} +{"133176415|3826739": ["In spite of the existence of a considerable number of papers about geographic routing in mobile ad hoc networks (MANETs) [3] [5], we perceived a lack of a speci\ufb01c overview involving the use of geographic routing protocols in vehicular ad hoc networks (VANETs)."]} +{"133176415|2835258": []} diff --git a/edge/graph_16760578.jsonl b/edge/graph_16760578.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16762549.jsonl b/edge/graph_16762549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6351de2b4c799c6ad779cb4a71e2a603a521a13a --- /dev/null +++ b/edge/graph_16762549.jsonl @@ -0,0 +1,26 @@ +{"1757761|1184288": ["Also, when time-varying data from constrained objects are incorporated or web services act upon the real-world issues such as consistency, failures, correct execution of all transactions as described by Gao et al. (2011) need to be explored in view of a constrained environment."]} +{"14602396|16323798": ["To monitor each component separately in the total power consumption of a household or an industrial site over time, cost effective and readily available solutions include Non-Intrusive Load Monitoring (NILM) techniques [27]."]} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"1862633|14650419": []} +{"1862633|2357830": ["Objects in an IoT must be able to communicate and exchange data with each other autonomously (Juels 2006; Mitrokotsa et al. 2013).", "For example, Juels proposed the method of \u201cblock tag\u2019 to prevent the unauthorized tracing (Juels 2006)."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"20473693|3348390": ["[43] surveyed context awareness from an IoT perspective, provided an in-depth analysis of context lifecycle, and evaluated a subset of 50 projects from 2001 to 2011 based on their own taxonomy."]} +{"20473693|1230643": ["The sensors work together to complete themonitoring of specific surrounding environmental conditions, including temperature, humidity, chemical composition, pressure, sound, displacement, vibration, and contamination particles [22]."]} +{"3969300|18295771": ["Wang and Wang [37] discuss the importance of user-generated content in today\u2019s distributed environment where sensor-based data are automatically collected and grouped over the IoT.", "Society level [8], [13], [15], [18], [21], [22], [37]", "[37] Wang, J., and Z. Wang, \"A Survey on Personal Data Cloud\", The Scientific World Journal, 2014.", "Wang and Wang [37] analyze the impact of personal data over the IoT in various industries."]} +{"2829149|116294": ["Attacks on network availability: The denial of service (DoS) ([16], [17]) attack falls under this category."]} +{"2829149|15199849": []} +{"2829149|7889189": ["This prevention of accessibility of information to legitimate users by unknown third party intruders can take place on different layers of a network [8],[14],[15]:", "Some additional DoS attacks are as follows [7], [14], [15], [36] According to [26], the threats looming over WSN can further be classified as follows: i. External versus internal attacks ii."]} +{"2829149|1940388": ["According to [12], the attacks on WSN can be classified as: i."]} +{"12049975|2445817": ["Different tasks consume different kinds of resources, e.g., image processing consumes CPU resources (FLOPS) and data transmission consumes bandwidth resources (Mbps)."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"206468086|180217": ["RFID security protocols with hash algorithms are introduced in literatures [3] and [4]."]} +{"9498010|20905429": ["In this regard, certain degree of \u2018symbiotic\u2019 knowledge could be used wherein we could potentially use people as mules, and use their personal phones/gadgets as the tracker to map out the location beacons instrumented in the space-of-interest; and track their location individually."]} +{"20703436|3330313": ["Communication overhead in global approaches is prohibitive, so BG models are mainly useful as a baseline for comparing different algorithms, but see [8, 9] for good introductions to outlier detection with BG models."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} diff --git a/edge/graph_167656106.jsonl b/edge/graph_167656106.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..05c24cbc6b046279b0316c1c083c84ab87bfdab0 --- /dev/null +++ b/edge/graph_167656106.jsonl @@ -0,0 +1,5 @@ +{"2970688|17381415": ["Proportional-Resonant Voltage and Current Controllers Due to the difficulties of using proportional-integral (PI) controllers to track non-dc variables, proportional-resonant (PR) controllers are usually preferred to control the voltage and current in stationary reference frame [33]."]} +{"2970688|17758458": ["Compensation of voltage unbalance is usually done using series active power filter through injection of negative sequence voltage in series with the distribution line [2]-[4]."]} +{"2689295|18037424": ["1, and defined seven crucial domains as follows: bulk generation, transmission, distribution, customers, operations, markets, and service providers [1]\u2013[4]."]} +{"7333077|595093": ["Thus, smart grid has attracted great attention not only from government but also from the industry and academia for its high fidelity powerflow control, self-healing, energy reliability, and energy security [5,6]."]} +{"7333077|121289": ["Because group communications are indispensable in SCADA as mentioned before, group key is one of the most important key management paradigms that should be well-designed [15]."]} diff --git a/edge/graph_16766019.jsonl b/edge/graph_16766019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1676762.jsonl b/edge/graph_1676762.jsonl similarity index 100% rename from graph_1676762.jsonl rename to edge/graph_1676762.jsonl diff --git a/edge/graph_16768404.jsonl b/edge/graph_16768404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccfe1051569b3a8f7185a9561eda79ee51fae4c4 --- /dev/null +++ b/edge/graph_16768404.jsonl @@ -0,0 +1,2 @@ +{"33946714|11608263": ["^ ^ ^ ^ ^ ^ ^ ^ x 1 x \u00f0N\u00de 2 y x n c \u00f0N\u00de 1 c \u00f0N\u00de 2 y c m problems with a single class variable that can take more than two values, multi-task [9]: an inductive transfer approach, where a main task is predicted with the help of the prediction of some extra tasks, or multi-label classification [51]: where an instance can be classified with several different labels.", "Multi-label learning [51], which deals with problems with several labels per each instance, could also be viewed as a potential solution to this problem."]} +{"17302430|17652653": ["These fragments most commonly take the form of syntactic phrases, such as ( < very happy , so glad > and < take over , assume control of > ) they may also be patterns with linked variables, for example, < Y was happy by X , X madeY glad > (Madnani and Dorr 2010).", "A recent survey by Madnani and Dorr (2010) in paraphrases extraction and generation provided a definition of the concept of paraphrasing.", "A recent survey by Madnani and Dorr (2010) in paraphrases extraction and generation provided a de\ufb01nition of the concept of paraphrasing.", "Madnani and Dorr (2010) also explored in detail the corpus-based paraphrase generation and extraction approaches that have emerged and have become popular in the last decade or so.", "In their survey, Madnani and Dorr (2010) categorized applications of paraphrase extraction and generation into following categories.", "Madnani and Dorr (2010) organized the corpus-based paraphrases generation and extraction by the type of corpora used to generate the paraphrases."]} diff --git a/edge/graph_16770050.jsonl b/edge/graph_16770050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d5c5205743366f6f06d7fd9ec4d70ee583518fa --- /dev/null +++ b/edge/graph_16770050.jsonl @@ -0,0 +1,20 @@ +{"32584207|7185733": ["Recognition of human activity is an attractive goal for computer vision [1,15].", "In each type of approach, the representation of human body evolves from stick figures to 2-D contour models to 3-D volumes as the complexity of the model increases.[5,6,15]."]} +{"32584207|7788290": ["Generally there are two typical approaches to the motion analysis of human body parts, depending on whether a priori models are used [4, 12 ]."]} +{"42831462|18440098": ["In the field of sign language recognition, reference methods such as neural networks, Hidden Markov Models and their variants [9] have been used for dynamic sign recognition."]} +{"9337871|7185733": [", [6, 21]) information flows bottom-up: the video is input into the analysis m odule, which estimates the hand pose and shape model parameter s, and these parameters are in turn fed into the recognition mod ule, which classifies the gesture [14]."]} +{"12004269|18440098": ["Additionally, the used databases differ in language, vocabulary size, grammar restriction, and selection of signs (Ong and Ranganath, 2005)."]} +{"8380877|6681074": ["Also the computational complexity of these techniques is prohibitive for real-time application [4].", "Several approaches have been recently proposed for the recognition of free form objects from range image data (See [4] for an extensive review)."]} +{"8380877|7185733": ["Under these constraints, skin color-based segmentation, motion detection and background subtraction based on a previously trained background model have demonstrated relatively good performance [25].", "Visionbased recognition of hand gestures in particular, promises natural, unobtrusive, human-computer interaction [25]."]} +{"62141876|7185733": ["In addition, the full hand articulation of 27 DOFs [22, 16] and the unrestrained movement provide user with a rich set of interaction primitives.", "In addition, the full hand articulation of 27 DOFs [22] [16] and the unrestrained movement provide user with a rich set of interaction primitives.", "Gestures in HCI can be defined as intentionalmovements having specific purposes and can classified into two groups: manipulative and communicative [22]."]} +{"2826797|18440098": ["Studies show that recognition accuracy for unregistered signers is relatively good when only hand shapes and/or limited motion are considered [30]."]} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"18440098|7185733": ["\u2026is highly complex and understanding it involves a substantial commonality with research in machine analysis and understanding of human action and behavior; for example, face and facial expression recognition [84], [104], tracking and human motion analysis [53], [148], and gesture recognition [106]."]} +{"18440098|6028805": ["\u2026is highly complex and understanding it involves a substantial commonality with research in machine analysis and understanding of human action and behavior; for example, face and facial expression recognition [84], [104], tracking and human motion analysis [53], [148], and gesture recognition [106]."]} +{"18440098|7788290": []} +{"10441363|7185733": ["The ultimate aim is to bring HCI to a regime where interactions with computers will be as natural as interactions between humans, and to this end, incorporating gestures in HCI is an important research area [1]."]} +{"5783320|7185733": []} +{"21983656|7185733": ["This group is best represented by the so-called glove-based devices [2], [3], [4], [5], [6]."]} +{"9073685|7185733": ["[3] surveyed problems and issues in visual hands gestures."]} +{"2064582|7185733": ["Vision-based gesture recognition has been widely studied for various applications such as computer games, virtual navigation, and sign language recognition [1]."]} +{"632523|7185733": ["Hand gestures are an important modality for human computer interaction (HCI) [15].", ", [4, 21]) information flows bottom-up: the video is input into the analysis module, which estimates the hand pose and shape model parameters, and these parameters are in turn fed into the recognition module, which classifies the gesture [15].", "\u2022 Unlike HMMs and CONDENSATION-based gesture recognition our method requires no knowledge of ob-\nInspired by previous vision-based HCI systems (e.g., the virtual whiteboard by Black and Jepson [1], and the virtual drawing package by Isard [9], to name a few), we evaluate our framework on a vision-based character recognition task."]} diff --git a/edge/graph_16780247.jsonl b/edge/graph_16780247.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..09c788c3d0cbd7203cd20f368aeca5bc96f40e74 --- /dev/null +++ b/edge/graph_16780247.jsonl @@ -0,0 +1,6 @@ +{"165863|12904520": ["Due to these trends, in recent years, the energy cost of high-performance computing clusters has been estimated to contribute more than the hardware acquisition cost of IT equipment itself [Bianchini and Rajamony 2004; Mittal 2012]."]} +{"978927|13037420": ["Dynamic voltage and frequency scaling (DVFS) is a widely-us ed power-management technique where the clock frequency of a processor is dynamically adjusted t o allow a corresponding reduction in the supply voltage to achieve power saving [94]."]} +{"978927|12904520": []} +{"15411200|14583671": []} +{"15411200|17779575": []} +{"15411200|13037420": []} diff --git a/edge/graph_16780476.jsonl b/edge/graph_16780476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70b1f6a948dd686ecc8cf8968533f835b42defaa --- /dev/null +++ b/edge/graph_16780476.jsonl @@ -0,0 +1,9 @@ +{"12197270|15273230": ["Discovering classification knowledge from imbalanced data received much research interest in recent years [2,4,11].", "Here we discuss only focused re-sampling methods, as they are most related to our approach and further experiments \u2013 for reviews see [2,11].", "Receiver Operating Characteristics curve and the area under this curve are also often used to summarize performance of a classifier [2].", "SMOTE was also used in combination with ensemble classifiers as SMOTEBoost [2]."]} +{"21492497|7561567": []} +{"22903588|5835346": ["Dietterich, in 1998 ([6], [7]) indicates that the use of an ensemble of classifiers could achieve better recognition rates that those obtained through a singular classifier when:"]} +{"14752169|15273230": ["2In the paper introducing original version of SMOTE [3] it was expressed in percentage, e.", "Learning from imbalanced data has received growing research interest in the last decade and several specialized methods have been proposed (see [2], [3] for a review)."]} +{"16253787|15273230": ["[1\u2013 4])."]} +{"3042872|3330313": []} +{"3042872|15273230": ["Learning algorithms that do not consider class-imbalance tend to be overwhelmed by the major class and ignore the minor one (Chawla, 2005)."]} +{"18164904|15224686": ["Some references are Liu et al. (2006); Thomas et al. (2006); Sun et al. (2007); Khoshgoftaar et al. (2007, 2011); Fernandez et al. (2012)."]} +{"16880506|7561567": ["A second approach is to estimate the \u201creliability of individual regression predictions\u201d [8], through sensitivity analysis, local averaging or other techniques, which can be applied to any regression method, as shown in [9]."]} diff --git a/edge/graph_16781041.jsonl b/edge/graph_16781041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d436d5b1e434dfb68ea8c0b7de53860c52acaba --- /dev/null +++ b/edge/graph_16781041.jsonl @@ -0,0 +1,2 @@ +{"1080001|86629084": []} +{"1080001|7191751": ["These are the same essential criteria governing the quality benchmarking of online medical/health-related information resources and Web sites in general (prior to the apps era) [118,119]."]} diff --git a/edge/graph_16783458.jsonl b/edge/graph_16783458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b98ae1330f097ee641e870dc48605a45e7160f3f --- /dev/null +++ b/edge/graph_16783458.jsonl @@ -0,0 +1,2 @@ +{"10152331|469744": ["Augmented reality (AR)[2] is an engineer's approach to this dream."]} +{"13999972|469744": ["Augmented reality (AR) [2] is an engineer\u2019s alternative."]} diff --git a/edge/graph_16788512.jsonl b/edge/graph_16788512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6bb9064a82cfce524c67974fdb70c3f6a8a439ad --- /dev/null +++ b/edge/graph_16788512.jsonl @@ -0,0 +1,2 @@ +{"163149|3202525": []} +{"9868448|2669421": []} diff --git a/edge/graph_16789883.jsonl b/edge/graph_16789883.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de67e3fc444b6f29604c23564bf2126576959590 --- /dev/null +++ b/edge/graph_16789883.jsonl @@ -0,0 +1,3 @@ +{"8615783|192934": ["In addition, more stringent performance requirements like speed, accuracy, and cost demand more sophisticated methods [2]."]} +{"9475634|17643168": ["Satellite remote sensing has doubtless become the most important technology to monitor agricultural land use and changes therein [17\u201321]."]} +{"22559562|16364156": ["Plenty of models are proposed to describe SAR images [13], whereas their statistical characters vary for different spatial resolutions and wavelengths."]} diff --git a/edge/graph_16790142.jsonl b/edge/graph_16790142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f20beee39540dd15be1bf3eb3e363f3883c05296 --- /dev/null +++ b/edge/graph_16790142.jsonl @@ -0,0 +1,2 @@ +{"1098870|60455": ["Document clustering has been studied intensively because of its wide applicability in areas such as web mining [30, 22], information retrieval [45], and topological analysis."]} +{"2903860|191396": []} diff --git a/edge/graph_16790158.jsonl b/edge/graph_16790158.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16790191.jsonl b/edge/graph_16790191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e95f158b022374ce7bb78e8bf10672666b6337c5 --- /dev/null +++ b/edge/graph_16790191.jsonl @@ -0,0 +1,6 @@ +{"7121489|16082889": ["A complete representation of all the hypothesized segmentations of the image of a handwritten input string usually takes the form of a hypothesis graph (for recent uses and reviews, see [2, 5, 6, 7]): a directed, acyclic graph whose nodes are character hypotheses and whose edges are adjacency relationships.", "In many approaches to off-line, connected handwriting recognition, a distinct segmentation step plays a crucial role (for reviews, see [5, 6, 7])."]} +{"7121489|14580698": ["A complete representation of all the hypothesized segmentations of the image of a handwritten input string usually takes the form of a hypothesis graph (for recent uses and reviews, see [2, 5, 6, 7]): a directed, acyclic graph whose nodes are character hypotheses and whose edges are adjacency relationships.", "In many approaches to off-line, connected handwriting recognition, a distinct segmentation step plays a crucial role (for reviews, see [5, 6, 7])."]} +{"32580697|15744805": ["Although a number of thresholding and edge detection algorithms are available [60],[61], low contrast or degraded documents may still constitute a problem."]} +{"32580697|6746689": ["Thinning [62] followed by polygonal approximation is the most common vectorization method."]} +{"2813627|192934": ["There are many traditional statistical pattern classification techniques, such as Nearest Neighbor, decision tree, and Neural Network [18,29]."]} +{"14284576|192934": ["For a more general and detailed discussion of pattern recognition, many excellent surveys and books can be found in the literature [85, 86, 87, 88]."]} diff --git a/edge/graph_16792864.jsonl b/edge/graph_16792864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f429ee622fe74cdb7790bee540789f48a1676afc --- /dev/null +++ b/edge/graph_16792864.jsonl @@ -0,0 +1,2 @@ +{"3365953|60455": ["Addressing information overload problems traditionally falls into the area of information retrieval (IR)1 [10]."]} +{"356120|13484515": ["Separating overlapping conversations in chat data is challenging, and there are many techniques for doing so [29]."]} diff --git a/edge/graph_16793463.jsonl b/edge/graph_16793463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16794863.jsonl b/edge/graph_16794863.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_167972673.jsonl b/edge/graph_167972673.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16800273.jsonl b/edge/graph_16800273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c166a836deffb3f0757eb6f0ef2e20057c634ee7 --- /dev/null +++ b/edge/graph_16800273.jsonl @@ -0,0 +1,2 @@ +{"61618702|2445817": ["A Progressive Exposure Approach for Service\nDiscovery in Pervasive Computing Environments,\u201din Proceedings of the 3rd IEEE Int\u2019l Conf. on Pervasive Computing and Communications (PerCom 2005)\n[2] Dipanjan Chakraborty, Anupam Joshi, Yelena Yesha, and", "Bonjour is a technology developed by Apple to provide service and device discovery among computers, electronic appliances and other networked devices (e.g. printers, faxes etc.).", "They do not depend on the context or state of other services.", "SERVICE DISCOVERY PROTOCOLS\nVarious service discovery protocols discussed above in this paper are compared taking various criteria as type of network, architecture, storage of service information, search methods Event notification , Service description, Service selection and usage , Fault tolerance and mobility support , Network scalability and Security(Appendix A)", "[11] http://www.jini.org/wiki/Lookup\n[12] http://www.upnp.org/\n[13] Http://www.salutation.org\n[14] Apple Inc \u201cBonjour Technology White paper\u201d\n[15] PAAL E. ENGELSTAD, YAN ZHENG, RAJEEV KOODLI, CHARLES E. PERKINS \u201cService Discovery\nArchitectures for On-Demand Ad Hoc Networks\u201d in Ad Hoc & Sensor Wireless Networks, Vol. 1, 2006\n[16] Michel Barbeau\u201d Service Discovery Protocols for Ad Hoc"]} +{"137175022|2445817": []} diff --git a/edge/graph_168015296.jsonl b/edge/graph_168015296.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_168016516.jsonl b/edge/graph_168016516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c57be911a2e7cbdea52653cac78796c0802e805e --- /dev/null +++ b/edge/graph_168016516.jsonl @@ -0,0 +1,2 @@ +{"12630796|17067678": ["An attacker may fabricate such reporting messages and tell other nodes in the network to add that node to their blacklists and isolate legitimate nodes from the network [9].", "12) Sleep Deprivation: In sleep deprivation attack, the resources of the specific node/nodes of the network are consumed by constantly keeping them engaged in routing decisions [9]."]} +{"12630796|7986140": ["18) Wormhole Attack: In a wormhole attack, an attacker receives packets at one point in the network, \u201ctunnels\u201d them to another point in the network, and then replays them into the network from that point [2].", "A vulnerability is a weakness in security system [2].", "The types of passive attacks are eavesdropping, traffic analysis and snooping: 2) Denial of service attack: Denial of service attacks are aimed at complete disruption of routing information and therefore the whole operation of ad-hoc network [2].", "\u2026with set of intermediate, or intermediate nodes that working alone within network carry out attacks such as creating routing loops ,forwarding packets through non \u2013optimal paths or selectively dropping packets which results in disruption or degradation of routing services within the network [2]."]} diff --git a/edge/graph_16801958.jsonl b/edge/graph_16801958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0af01fda0e2a5e28de9552c828259687fca4515e --- /dev/null +++ b/edge/graph_16801958.jsonl @@ -0,0 +1 @@ +{"6819065|1457933": ["We refer the reader to [15,18] for an introduction to these methods."]} diff --git a/graph_1680300.jsonl b/edge/graph_1680300.jsonl similarity index 100% rename from graph_1680300.jsonl rename to edge/graph_1680300.jsonl diff --git a/edge/graph_168030235.jsonl b/edge/graph_168030235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16803763.jsonl b/edge/graph_16803763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bc7f24cc5cbb920c9371ca473c9a3b41b1eb6fc --- /dev/null +++ b/edge/graph_16803763.jsonl @@ -0,0 +1,2 @@ +{"8023452|239537": ["a cognitive perspective, it would not make sense to display a very large amount of data [8]."]} +{"2593345|18986679": ["However, overview is becoming increasingly difficult to effectively achieve with the ever-increasing size of real-world datasets."]} diff --git a/edge/graph_16804028.jsonl b/edge/graph_16804028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16806429.jsonl b/edge/graph_16806429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16808394.jsonl b/edge/graph_16808394.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7200e9232ec9310253fb7e2fe9bd677e80df49f8 --- /dev/null +++ b/edge/graph_16808394.jsonl @@ -0,0 +1 @@ +{"1467798|1123458": ["Structural conditions are often related to the validity of S-Lemma or S-property (see [ 28 ])."]} diff --git a/edge/graph_16815953.jsonl b/edge/graph_16815953.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23ba9487e15a5bcd1018b36ddab6928602f10f01 --- /dev/null +++ b/edge/graph_16815953.jsonl @@ -0,0 +1,15 @@ +{"18484516|11392986": ["In a more recent survey on the theory and practice of requirements elicitation [6], more approaches were examined including those based on goals [5], scenarios [13], viewpoints [15], and domain knowledge [16]."]} +{"1807218|9240891": []} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"14662196|6952653": ["In conventional knowledge engineering and AI, various subject logics and social ontologies to represent belief, knowledge, desire, and intention of autonomous agents have been proposed [10, 11, 12, 13, 14, 17]."]} +{"482049|14441987": ["\u2022 mobile networking, including Mobile IP [2], ad hoc protocols [27], and techniques for improving TCP performance in wireless networks [1, 5]."]} +{"482049|15640936": ["\u2022 mobile networking, including Mobile IP [2], ad hoc protocols [27], and techniques for improving TCP performance in wireless networks [1, 5]."]} +{"482049|2256372": ["\u2022 remote information access, including caching, function shipping, distributed file systems, and distributed databases [30]."]} +{"482049|8424228": ["\u2022 high availability, including optimistic and pessimistic replica control [9], mirrored execution [4], and optimistic recovery [37]."]} +{"15264530|6159806": ["Several surveys[5][7][22][31][33] dealt with service composition.", "The process of developing a composite service is called service composition[7].", "Many surveys[5][7] [22][31][33] list service composition middleware according to predefined criteria or properties.", "Many of them[7][31] classified the middleware under exclusive criteria such as manual versus automated, static versus dynamic, and so on.", "As depicted Figure 1, the SCM interacts with the application layer by receiving functionality requests from users or applications[5][7]."]} +{"207171842|8914588": ["2006; Huebscher and McCann 2008].", "point out, trust is not necessarily based on self-adaptive services or its quality [McCann et al. 2006; Huebscher and McCann 2008]."]} +{"207171842|1975139": ["survey several ADLs based on graphs, process algebras, and other formalisms for dynamic software architectures [Bradbury et al. 2004]."]} +{"8986029|8914588": ["The autonomic computing framework is a notable example of general approach to the design of such systems [16].", "Figure 1 shows the core elements of the MOSES framework, their overall organization and their mapping onto the Monitor-AnalyzePlan-Execute (MAPE) model of adaptation proposed within the Autonomic Computing framework [16]."]} +{"38316898|18194234": []} +{"6159806|116542": []} +{"15194849|15264530": []} diff --git a/edge/graph_16816436.jsonl b/edge/graph_16816436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_168170457.jsonl b/edge/graph_168170457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8d788b6eb0364dcfae135667e9182371d522fdc --- /dev/null +++ b/edge/graph_168170457.jsonl @@ -0,0 +1,86 @@ +{"11444935|14441987": ["Since research on ad hoc routing began with packet radio networks, numerous protocols have been proposed [7]."]} +{"19799172|1236072": ["Many routing protocols have been specifically designed for the wireless sensor networks where several factors such as energy efficiency, low latency, and success rate are necessary to take into account [2], [4], [5]."]} +{"19799172|1230643": ["Recently, advances in minimization, low-power, low-cost, efficient and multi-functional wireless communication equipment, and improved small-scale energy supplies make a new hi-tech dream achievable: wireless sensor networks [1], [2]."]} +{"19799172|14441987": ["Since the 1970s, wireless networks have been showing huge interest to the computing industry and the research community [3]."]} +{"19799172|1708582": ["However, the Bant uses a reinforcement learning algorithm [18], [19] in order to get a better and more efficient route than the one chosen by the Fant and at the end it updates the routing tables of the reverse-visited sensor nodes."]} +{"3629353|17905276": []} +{"3629353|485843": []} +{"9227908|205286988": ["It contains seven major steps, and the complete description of every phase is summarized in this subsection [18-19].", "In some existing protocols [19], nodes route message through intermediate nodes instead of direction communication through cluster head."]} +{"15045668|13292799": ["These naturally inspired or bio-mimic algorithms are the most recent suitable methods for global optimization [5].", "Moreover, finding the optimal shortest route to the base stations that inspired form the nature of particle swarm will significantly extend the WSN`s lifetime [5].", "This greatly affects the cost of communication links in WSNs [5].", "The contribution of applying ACO techniques in WSNs` energy efficient clustering and routing, is that it is converge the lifetime of WSNs` to better performance as well as maximize the data delivery from nodes to base station [5]."]} +{"1071507|2835258": []} +{"57379941|17262196": []} +{"57379941|29060869": []} +{"57379941|2398835": []} +{"57379941|18691290": []} +{"57379941|5747564": []} +{"57379941|7350786": []} +{"57379941|121289": []} +{"57379941|18037424": []} +{"8787020|14132386": []} +{"8787020|17872696": ["Baranidharan and Shanti (2010) survey work was based on energy efficient protocols and on classical routing."]} +{"8787020|205286988": ["\u2026due to technological advancement has encouraged researchers in the past years to engage in an intensive research on addressing the potential of collaboration among sensors in data gathering, processing, coordination, and management of the sensed data flow to the sink (Akkaya and Younis, 2005).", "In a similar survey, Akkaya and Younis (2005) survey was still based on classical routing protocols, and not much different from that of Karaki and Kamal (2004), even as it was more recent, did not capture in their work protocols that were designed as of 2004.", "\u2026the main function of wireless sensor nodes is to sense and collect information (data) from a target area, process, and transmit the information via a radio transmitter back to a command center where the underlying application resides (sink) (Akkaya and Younis, 2005; Sohraby et al., 2007).", "Routing in sensor networks involves a lot of challenges due to differences in some properties between them and contemporary communication and wireless ad hoc networks (Akkaya and Younis, 2005).", "\u2026and the differences in the way data are forwarded from the nodes to the sink, leads to classifying the routing protocols as either classical or swarm intelligence based, and or data-centric, hierarchical, location based, network flow and quality of service (QoS) awareness (Akkaya and Younis, 2005).", "\u2026is an infrastructure composed of sensing (measuring), computing, and communication elements that gives a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment (Akkaya and Younis, 2005; Sohraby et al., 2007; Akyildiz et al., 2002).", "Each node has a GPS sensor on it indicating its location so as to associate itself with a point on the virtual grid (Akkaya and Younis, 2005).", "The clusters formation is based on the energy reserve of sensor nodes and its proximity to the cluster head (Akkaya and Younis, 2005; Lin and Gerla, 1997).", "Its main idea is to maintain the number of hops when the interest is diffused through the network (Akkaya and Younis, 2005).", "RR (Akkaya and Younis, 2005; Braginsky and Estrin, 2002; Patra et al., 2010) is another improved version of Directed Diffusion."]} +{"8787020|1236072": ["Data aggregation and multi-hop relays can affect latency (Zaman and Abdullah, 2010; Karaki and Kamal, 2004).", "In a similar survey, Akkaya and Younis (2005) survey was still based on classical routing protocols, and not much different from that of Karaki and Kamal (2004), even as it was more recent, did not capture in their work protocols that were designed as of 2004.", "Karaki and Kamal (2004) surveyed different routing techniques in WSNs."]} +{"8787020|1230643": ["Hence, the stability of the routing data is an important design issue in addition to energy consumptions and bandwidth utilization (Akyildiz et al., 2002; Chong and Kumar, 2003; Singh et al., 2010).", "The characteristics of sensor networks and application requirements have direct impact on the network design issues in terms of network performance and capabilities (Akyildiz et al., 2002).", "For applications in the battle field where it is virtually impossible to access the sensors and recharge their batteries (Akyildiz et al., 2002; Chong and Kumar, 2003), routing protocols design for sensor networks should be as energy efficient as possible to extend their lifetime, and hence,\u2026", "A sensor network is an infrastructure composed of sensing (measuring), computing, and communication elements that gives a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment (Akkaya and Younis, 2005; Sohraby et al., 2007; Akyildiz et al., 2002).", "As sensor nodes are battery powered and expected to operate and execute their duties without attendance for a long duration of time during the application, it is difficult and even impossible to change or recharge batteries for the sensor nodes (Akyildiz et al., 2002; Chong and Kumar, 2003).", "\u2026is an infrastructure composed of sensing (measuring), computing, and communication elements that gives a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment (Akkaya and Younis, 2005; Sohraby et al., 2007; Akyildiz et al., 2002).", "For applications in the battle field where it is virtually impossible to access the sensors and recharge their batteries (Akyildiz et al., 2002; Chong and Kumar, 2003), routing protocols design for sensor networks should be as energy efficient as possible to extend their lifetime, and hence, prolong the network lifetime without performance degradation.", "Akyildiz et al. (2002) surveyed protocols on wireless sensor networks, while dealing with few of the classical routing protocols and their methods of information forwarding."]} +{"22632531|205286988": ["As mentioned in [3] and [4], nodes have typically low mobility and are limited in capabilities, energy supply and bandwidth."]} +{"14852114|1236072": ["The majority of the routing protocols for WSNs are designed by researchers in the classical networking community as surveyed in [1]."]} +{"5808401|1230643": ["The major objectives behind the research and deployment of Wireless Sensor Networks (WSNs) [1] lie in the following two broad aspects: (i) event detection (sensing) and data communication through node coordination and (ii) conservation of energy to maximize the post-deployment, active lifetime of individual sensor"]} +{"195964110|5875539": []} +{"195964110|1230643": []} +{"13731915|1236072": []} +{"11331151|1236072": ["Cluster-based networking has some benefits, especially for large-scale WSN, such as energy saving and scalability [1].", "Lots of previous works have been carried out to address this issue [1,2]."]} +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"38235305|1236072": []} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"1620158|10096622": ["Swarm intelligence algorithms have been widely used in solving WSN issues (Kulkarni and Venayagamoorthy, 2011; Zungeru et al ., 2012; Saleem et al ., 2011)."]} +{"1620158|10271586": ["The local clock of available sensor nodes should be synchronized in order to attain the accurate time of each sensed data (Ranganathan and Nygard."]} +{"37107541|205286988": ["In a WSN, energy efficiency refers to the ratio of the number of data packets received at the sink node by the total consumed energy [ 9 ]."]} +{"37107541|1236072": ["Although some routing schemes for WSNs have been proposed based on the graph theory and the greedy search algorithm in the literature [1, 2 ], the high performance routing is still a research topic.", "With the rapid growth of modern electronic and wireless communication techniques, wireless sensor networks (WSNs) become more and more effective in many fields, such as battlefield surveillance, biological monitor, smart space, intrusion detection and tracking for temperature, object movement, sound and light [1, 2 ,3,4]."]} +{"37107541|1230643": ["For any si ,s j \u2208 V ,i fdij \u2264 r ,a ndsi and sj both are active, that is, si and sj both are working, then there is an undirected edge (si, sj, \u03c8ij(t)) \u2208 E. Here, the weight \u03c8ij(t) \u2208 [0, 1 ] is the cost to deliver a data packet from si to sj at instant t. For any si \u2208 V , the residual energy of si is denoted as ei(t )a t instant t .T raditionally, the set ofsi\u2019s neighbors is defined as follows.", "With the rapid growth of modern electronic and wireless communication techniques, wireless sensor networks (WSNs) become more and more effective in many fields, such as battlefield surveillance, biological monitor, smart space, intrusion detection and tracking for temperature, object movement, sound and light [ 1 ,2,3,4].", "Although some routing schemes for WSNs have been proposed based on the graph theory and the greedy search algorithm in the literature [ 1 ,2], the high performance routing is still a research topic."]} +{"15946728|1230643": []} +{"6438719|14441987": []} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} +{"19844568|1230643": ["(28) Construct the BA [S, M[2], Ph, d]; (29) L2: Next-Hop-Selection;", "A sensor network is an infrastructure composed of sensing, computing, and communication elements that give a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment [1, 2].", "(16) [dp]\u22c5SPDT \u2190 Pid; (17) } (18) D = Destination ID (sink ID); (19) FA [S, M[2], D] = forward ant [source ID, memory of forward ant, Destination ID]; (20) Ph = amount of Pheromone; (21) C = initial energy; (22)BA [S, M[2], Ph, D] = Backward Ant [Source ID, Memory of backward ant, Pheromone value, Destination ID]; (23) E[] = visibility array; (24) r = Intermediate node ID; Function 2: Decision making (25) //If the intermediate node is equal to the destination node, then calculate the pheromone and construct the backward ant (26) L1: If (r = d)"]} +{"110317215|12817488": []} +{"110317215|1236072": ["There is no infrastructure, wireless links are unreliable, sensor nodes may fail, and routing protocols have to meet strict energy saving requirements [5]."]} +{"110317215|1230643": []} +{"1161967|3826739": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|1236072": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|14441987": ["The requirements of routing protocols for WSNs are similar to those of routing protocols for mobile ad hoc networks (MANETs) [69].", ", see [19,69] for more extensive discussions and examples)."]} +{"45793208|1230643": []} +{"33307416|1230643": ["A sensor network is an infrastructure composed of sensing, computing, and communication elements that give a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment (Zungeru et al., 2012; Akyildiz et al., 2002)."]} +{"9171235|763939": ["Themobility models described in [54] and [170] can be exploited in order to study how these models affect both the convergence of the algorithms as well as the lifetime of WSNs. Amplifying or decoding and remodulating the signals before forwarding them is capable of achieving energy savings, as\u2026"]} +{"9171235|1230643": ["Therefore, the NL is constrained by the battery of the individual sensors in the WSN considered [1], [2].", "We note that the sensed information is processed relying on a speci\ufb01c hardware component, which is distinct from the transceiver component of the particular sensor device [1], [2]."]} +{"9171235|12060835": []} +{"8887289|1230643": []} +{"31655587|1236072": []} +{"36029380|1236072": ["Moreover, the protocols must be scalable, and performance-efficient, with an ability to keep the network alive for a longer period of time [3]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"13416245|15300368": []} +{"1795063|205286988": []} +{"1795063|1230643": ["WSNs have broad application fields such as military surveillance, environment monitoring and forecast, structural monitoring and target tracking, home network and healthcare etc. [1\u20134]."]} +{"6003797|205286988": []} +{"14657763|1236072": ["After deployment, once one or more sensor nodes sense the target stimulus in their monitored area, one node (known as the \"source\") immediately reports back the relevant data, such as location and temperature, to the observer (known as the \"sink\") via the wireless channel to a laptop or hand-held mobile device [2]."]} +{"2574917|12817488": ["\u2026node because the number of sensor nodes is very huge This leads to data-centric routing approach which is query-based protocol in which Base station sends query to a collection of particular nodes in a area and waits\nKirola, Rawat, Bhatt and Bhatt 134\nfor response of data from the sensors placed\u2026"]} +{"2574917|1236072": ["\u2026every node because the number of sensor nodes is very huge This leads to data-centric routing approach which is query-based protocol in which Base station sends query to a collection of particular nodes in a area and waits e t for response of data from the sensors placed in the certain area[4-6]."]} +{"2574917|1230643": ["projects in the last few years have explored hierarchical clustering in WSN from different perspectives [2].", "sensor network (WSN) is a network consist various spatially circulated devices which uses sensors to supervise the environment at different locations, such as temperature, sound, vibration, pressure, motion or pollutants [1-3].", "In a accommodating network collection of sensor node are organized in homogenous or heterogeneous sensor nodes to form a wireless sensor network is [2]."]} +{"63493149|205286988": []} +{"63493149|1230643": []} +{"12231284|1236072": ["As we know that in static WSNs, the sensor nodes close to the sink will deplete their energy quickly because they have to forward messages originating from many other nodes, and thus shorten the lifetime of the entire network [12]."]} +{"12231284|1230643": ["It can be used for a wide range of applications such as military surveillance, industry control, traffic control, and ambient conditions detection [1\u20133]."]} +{"10723238|1230643": []} +{"26929195|562065": ["These SNs can be randomly deployed for mon-itoringandprocessingvariousapplications[4,5],suchasmil-itary operations, health care operations, technological operations, forest \ufb01re monitoring, localization based operations [6,7] etc."]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"19319715|1599458": ["aware sensing networks and intelligent services for the IoT [24], [94] and IoP."]} +{"19319715|3348390": ["The second potential direction from the intersection of the domains would be improving and developing new contextaware sensing networks and intelligent services for the IoT [24], [94] and IoP.", "Smart meters and home devices may require ZigBee, 6LOWPAN, BLE, WiFi, which is dependent on the type of sensors and IoT devices used in the system.", "The work in [24] surveyed many research efforts and placed emphasis on the development of", "Considering the 3GPP which affects most of the device-to-device communication in the smart cities, [31]\u2013[33] proposes that, to meet with the new connectivity requirements of the emerging massive IoT segment, there is a need for new standards that will address the following: 1) low device cost; 2) improved battery life; 3) improved coverage; and 4) support for massive numbers of IoT connections.", "Their proposal advocates the use of smartphones to learn about its owner and context to improve the connection between people and the IoT (e.g., to enable context-aware sensing).", "To the best of our knowledge, the classification presented in this paper would have a different emphasis from other previous surveys on big data [16]\u2013[19], smart cities [20]\u2013[22], and/or IoTs [23]\u2013[25].", "The connectivity and communication of\nsystems and/or platforms in most cases require the IoT.", "The convergence of the three domains in the big sensor framework, and the emergence of the IoP as well as the current IoT enables new sensing applications to be designed and developed.", "more context-aware applications would be targeted toward deriving advantages for the smart things/objects [24] in the sensing system.", "The intersection of the Internet/communications domain with the sensor/things domain results in technologies like WSNs and the Internet of Things (IoT).", "The boundary for the IoT does not include the people/creature domain.", "New futuristic applications for smart cities are envisioned with the emergence of new technological concepts, such as big data analytics, semantic sensor networks, sensor-cloud computing, context-aware sensing, etc. Gubbi et al. [92] considered some open challenges and identified some challenges for the future IoT, such as energy efficient sensing, security and reprogrammable networks, participatory sensing, and new networking protocols.", "aware sensing networks and intelligent services for the IoT [24], [94] and IoP."]} +{"19319715|10505742": ["ing and tracking [5], [6] would also be classified into this domain."]} +{"19319715|16335158": ["new developments and improvements of the sensor-cloud infrastructure [97]\u2013[99]."]} +{"19319715|1230643": ["As reported in [26], practical realization of most services in the smart cities are not affected by technical issues, but are affected by the lack of widely accepted service architectures and communication protocols [27].", "situations, for information not to be lost in case a sensor dies [26], [29].", "To observe physical phenomena and make all devices in the urban area to become smart devices, big sensor data systems require a high-density deployment of sensors and a large number of sensors for proper connectivity [26]."]} diff --git a/edge/graph_16819251.jsonl b/edge/graph_16819251.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16821200.jsonl b/edge/graph_16821200.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_168252.jsonl b/edge/graph_168252.jsonl similarity index 100% rename from graph_168252.jsonl rename to edge/graph_168252.jsonl diff --git a/edge/graph_16825825.jsonl b/edge/graph_16825825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16827727.jsonl b/edge/graph_16827727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16828740.jsonl b/edge/graph_16828740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d04bf8bc2d20f40704909345c86a1f95b64a07a --- /dev/null +++ b/edge/graph_16828740.jsonl @@ -0,0 +1,5 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"11163715|1107573": ["This is done by attacking the routing substrate of the P2P network which is based normally on distributed hash tables [3]."]} +{"10614697|3348390": ["Furthermore, by integrating the sensing, communication, and computation capabilities [8], [9], IoT can offer diverse intelligent services [10] to form smart home [11], smart grid [12]\u2013[14], smart community [15], and smart city [16], [17], as shown in Fig."]} +{"10614697|20905429": ["One of the most value-added functionalities of IoT is to sense the environments including the living environment [28] and human body [29]\u2013[31], enabling users to interact with the physical world [32]."]} +{"8058441|11163715": ["Indeed, that is the easiest way to break a quantum cryptographic system if there are not enough safeguards in the authentication of the two parties during their communication [28]; (ii) such attacks are also important in P2P networks [29]."]} diff --git a/edge/graph_16830121.jsonl b/edge/graph_16830121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3469e3da66ddcef96a8813e5c7f68e10be56febc --- /dev/null +++ b/edge/graph_16830121.jsonl @@ -0,0 +1,16 @@ +{"2100682|18440098": []} +{"9282404|18440098": ["Other approaches have typically required manual training data to be generated for each sign [6, 8, 15, 20, 25, 26, 27], i."]} +{"6199139|18440098": ["There are also studies that try to improve SLR performance by lip reading [10].", "Among different kinds of HMM architectures, left-to-right HMMs with either discrete or continuous observations are preferred for their simplicity and suitability to the hand gesture and SLR.", "In HMM-based SLR, each HMM typically models a different hypothesis for the sign to be recognized.", "Hand gesture analysis [3] is very important for SLR since the manual signals are the basic components that form the signs.", "SLR is a very complex task: a task that uses hand shape recognition, gesture recognition, face and body parts\n\u2217 Corresponding author.", "Initial studies on SLR have concentrated on static signs, attempting to recognize either the finger spelling alphabet or some selected static signs.", "There are only a couple of studies that integrate non-manual and manual cues for SLR [4].", "Current multimodal SLR systems either integrate lip motion and hand gestures or only classify either the facial expression or the head movement.", "Among several methods for modeling temporal data, hidden Markov models (HMMs) are used the most extensively and have proven successful in several kinds of SLR systems.", "For SLR, we have the necessity to make a decision on which a reasonable mistake is acceptable, but one needs to reject a bet when excessive amount of information is missing: when classifying a sign with both manual and non-manual information, we accept a part of indecision on the non-manual gesture, but we have to make a complete decision on its manual part (see next sections).", "Contrarily, the analysis of non-manual signals is a must for building a complete SLR system: two signs with the same manual component and different non-manual components can have completely different meanings.", "The problem of sign language recognition (SLR) can be defined as the analysis of all components that form the language and the comprehension of a single sign or a whole sequence of sign language communication.", "In a SLR problem, where each sign is modeled by a generative model, such as an HMM, the classification can be done via the maximum likelihood approach, where the sign class of the HMM that gives the maximum likelihood is selected."]} +{"121199517|2301292": ["A number of 2D facial expression databases have become available (e.g., [1] [2] [7] [8] [16]), as well as some with 3D imaging data (e.g., [9] [14] [15] [24] [25] [45])."]} +{"2803986|6857179": ["Recently, there has been more interest in the automatic recognition of dimensional affect [22], [23], [46]."]} +{"11058856|18440098": ["However, review [2] of sign language recognition indicates that the dominant interest in sign language recognition has been in hand gesture recognition."]} +{"18440098|7185733": ["\u2026is highly complex and understanding it involves a substantial commonality with research in machine analysis and understanding of human action and behavior; for example, face and facial expression recognition [84], [104], tracking and human motion analysis [53], [148], and gesture recognition [106]."]} +{"18440098|6028805": ["\u2026is highly complex and understanding it involves a substantial commonality with research in machine analysis and understanding of human action and behavior; for example, face and facial expression recognition [84], [104], tracking and human motion analysis [53], [148], and gesture recognition [106]."]} +{"18440098|7788290": []} +{"14608692|18440098": ["A number of approaches have been proposed for sign language recognition (see [14] for a recent review)."]} +{"15512141|18050848": ["Such improvements have been typically demonstrated on databases of small duration, and, in most cases, limited to a very small number of speakers (mostly less than ten, and often singlesubject) and to small vocabulary tasks [18], [ 21 ].", "A number of audio-visual corpora, commonly used in the literature, are listed in Table II. Notice that most are the product of efforts by few university groups or individual researchers with limited resources, and as a result, they suffer from one or more shortcomings [18], [ 21 ], [136]: They contain a single or small number of subjects, affecting the generalizability of developed methods to the wider population; they typically have small ..."]} +{"15512141|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory, an active area of research with many applications [91] [92] [93]."]} +{"16263741|18440098": []} +{"6502903|18440098": ["However, it is clear that a full understanding of sign language, particularly with respect to its lexical variety, language idioms and grammatical structures is not possible without further exploring the remaining information channels [4]."]} +{"1297591|18440098": ["From the review of SLR by Ong and Ranganath [82], one of their main observations is the lack of attention that non-manual features has received in the literature.", "Given that much of the meaning in sign language is conveyed through manual features, this has been the area of focus of the research up to the present as noted by Ong and Ranganath in their 2005 survey [82]."]} +{"2301292|1118130": ["prototypical expressions of emotions [5,4,6,7]."]} diff --git a/edge/graph_16830291.jsonl b/edge/graph_16830291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99747f756c15d1b335392c114e1a5f23142eed75 --- /dev/null +++ b/edge/graph_16830291.jsonl @@ -0,0 +1,6 @@ +{"14072887|913718": []} +{"9309068|3241708": ["0 technology, crowdsourcing websites attract much attentions at present [10],"]} +{"9309068|12715779": ["[9]."]} +{"3241708|12715779": ["Because of the popularity of Web 2.0 technology, crowdsourcing websites attract much attentions at present [91], [90]."]} +{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]} +{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]} diff --git a/edge/graph_16839827.jsonl b/edge/graph_16839827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1684367.jsonl b/edge/graph_1684367.jsonl similarity index 100% rename from graph_1684367.jsonl rename to edge/graph_1684367.jsonl diff --git a/edge/graph_16844049.jsonl b/edge/graph_16844049.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11f1f861d6f24e5238dc68a37a032ec8ff78f7d4 --- /dev/null +++ b/edge/graph_16844049.jsonl @@ -0,0 +1 @@ +{"27353195|2835258": []} diff --git a/edge/graph_16852337.jsonl b/edge/graph_16852337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16854146.jsonl b/edge/graph_16854146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_168615898.jsonl b/edge/graph_168615898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16865362.jsonl b/edge/graph_16865362.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1686572.jsonl b/edge/graph_1686572.jsonl similarity index 100% rename from graph_1686572.jsonl rename to edge/graph_1686572.jsonl diff --git a/edge/graph_168659083.jsonl b/edge/graph_168659083.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16866891.jsonl b/edge/graph_16866891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f56ed49932d457a6f32ffd5c98b88f9fa0df2f7c --- /dev/null +++ b/edge/graph_16866891.jsonl @@ -0,0 +1,2 @@ +{"8401612|191396": ["... function which makes the partition of clusters a well defined optimization problem (see ([13, 25, 29]) for an analytical survey of the clustering algorithms), the cluster validation where external indices, internal indices, and relative indices are used for cluster validity analysis ([13, 29]) and the results interpretation where experts in the relevant fields interpret the data par\u00ad tition in order to guarantee the reliability of the ...", "... selection a~go\u00ad rithms) or feature extraction where some transformatIons are used in order to generate useful and novel features from the original ones, the clusteringalgorithm design or selec\u00ad tion that is usually combined with the selection of a corre\u00ad sponding proximity measure ([13, 25]) and with the con\u00ad struction of a clustering criterion function which makes the partition of clusters a well defined optimization problem ...", "... selec\u00ad tion that is usually combined with the selection of a corre\u00ad sponding proximity measure ([13, 25]) and with the con\u00ad struction of a clustering criterion function which makes the partition of clusters a well defined optimization problem (see ([13, 25, 29]) for an analytical survey of the clustering algorithms), the cluster validation where external indices, internal indices, and relative indices are used for cluster validity ...", "Clustering analysis identifies clusters (groups) embedded in the data, where each cluster consists of objects that are similar to one another and dissimilar to objects in other clusters ([13, 25, 29 ])."]} +{"36266607|1708582": ["Indeed, it can be shown that PI converges faster to the optimal value than VI in terms of the number of iterations if both algorithms begin with the same value [24] and it is known that VI is usually outperformed by PI in practical applications [20]."]} diff --git a/graph_1687471.jsonl b/edge/graph_1687471.jsonl similarity index 100% rename from graph_1687471.jsonl rename to edge/graph_1687471.jsonl diff --git a/edge/graph_16874948.jsonl b/edge/graph_16874948.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6654f641d71be9f88a9f3698034b831644ef8899 --- /dev/null +++ b/edge/graph_16874948.jsonl @@ -0,0 +1 @@ +{"23204187|17003768": []} diff --git a/edge/graph_168755958.jsonl b/edge/graph_168755958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6aec575277ac2c0f9816f048d4a73f20ef04c30 --- /dev/null +++ b/edge/graph_168755958.jsonl @@ -0,0 +1,16 @@ +{"19987740|20905429": ["With advances of communications and of biosensors with wearable devices, ubiquitous (u-) healthcare systems have great potentiality for prevention from and early detection of diseases utilizing vital signs acquired from wearable devices with biosensors such as Electrocardiogram (ECG), body temperature, and the like [2, 3]."]} +{"530421|20905429": ["In a home healthcare system, a typical architecture involves body sensors, ambient and smart sensors, devices, actuators and software services that collect data from a target user who lives alone and has some kind of disability [1].", "The continuous BP level of a patient is determined by examining systolic BP (SBP) and diastolic BP (DBP) values in mmHg using a body worn BP sensor, and HR is measured in bpm using the ECG sensor [1], [35].", "AN ambient assisted living (AAL) system consists of heterogeneous sensors and devices which generate huge amounts of patient-specific unstructured raw data everyday [1], [2]."]} +{"3284064|14186660": []} +{"3284064|15279105": ["One specific area of focus has been the use of text mining for the interpretation of molecular biology and genomic data, including genes, proteins, cells, tissues and whole organisms, with a range of applications to gene expression data [37], genome-wide association studies [38, 39], pharmacogenomics [40], interpretation of genetic variants such as singular nucleotide polymorphisms (SNPs) [41, 42], and systems biology network modeling [43]."]} +{"14874327|8281388": ["Many other works based on Hadoop are present in literature [33\u201336]; for example, some specific libraries were developed as Hadoop-BAM, a library for distributed processing of genetic data from next generation sequencer machines [37], and Seal, a suite of distributed applications for aligning short DNA reads, manipulating short read alignments, and analyse the achieved results [38], was also developed relying on this framework."]} +{"14874327|1507400": ["Many other works based on Hadoop are present in literature [33\u201336]; for example, some specific libraries were developed as Hadoop-BAM, a library for distributed processing of genetic data from next generation sequencer machines [37], and Seal, a suite of distributed applications for aligning short DNA reads, manipulating short read alignments, and analyse the achieved results [38], was also developed relying on this framework."]} +{"204984093|2357830": ["The content of the chip can be read/written with an RFID reader which is connected to the server [1,2].", "However, interested readers can refer to [1,23] for more details."]} +{"9119161|2488484": ["The major goal of health informatics research is to improve Health Care Output (HCO) or patients\u2019 quality of care [Herland et al. 2014].", "Herland et al. [2014] discuss various studies being done in Health Informatics branches using big data based on sub\ufb01elds such as bioinformatics, public health informatics, and neuroinformatics.", "\u2026have been done using big data tools and approaches in health informatics focusing on biomedical [Raghupathi and Raghupathi 2014; Feldman et al. 2012; Costa 2014; White 2014] and computational aspects [Herland et al. 2014; Merelli et al. 2014; Yoo et al. 2012; Herland et al. 2013], respectively."]} +{"9119161|1734833": ["A typical healthcare data preprocessing procedure usually includes the following steps depending on the source and format of the data [Banaee et al. 2013; Sow et al. 2013]: \u2014Data cleaning: This step involves the removal of noise in healthcare data, which includes artifacts [Singh et al. 2011; Mao\u2026", "Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Independent Component Analysis (ICA) are the most commonly used algorithms for dimension reduction and feature selection in the healthcare domain [Banaee et al. 2013].", "Until now, various research studies have been conducted on machine learning and data mining that outline advantages and disadvantages of multiple machine-learning algorithms in healthcare informatics [Austin et al. 2013; Dittman et al. 2013; Banaee et al. 2013].", "Other utilizations of decision trees in medical and healthcare informatics are presented in Banaee et al. [2013].", "This learning method has been successfully used in a wide variety of medical diagnostic systems [Dittman et al. 2013; Banaee et al. 2013]."]} +{"9119161|14356173": ["Further information regarding clustering algorithms for healthcare are discussed in Tomar and Agarwal [2013]."]} +{"13871210|21386749": ["Related Works As mentioned in the introduction, IoT is revolutionizing the overall medical system by introducing novel instruments and methodologies for deploying innovative and healthcare services [7]-[11],[33]."]} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"37079185|206743327": []} +{"37079185|16335158": []} +{"207016868|191396": []} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} diff --git a/edge/graph_16876833.jsonl b/edge/graph_16876833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7727ce8d043a1bbdde922c3b74ec70e4e8f13531 --- /dev/null +++ b/edge/graph_16876833.jsonl @@ -0,0 +1,24 @@ +{"10738002|7439310": ["A variety of techniques, inclusive of forward error correction (FEC), error-resilient intra refreshment, multiple description coding (MDC), has been proposed to deal with channel errors [1]."]} +{"614891|3540699": ["Both predictions are followed by residual coding [14][4].", "264/AVC standard [3][4], and the scalable extension of H."]} +{"9612347|12127129": []} +{"129201464|3540699": ["Key frames are encoded using the conventional Intra coding of Advanced Video Coding (AVC) [2].", "the two side views are coded using a conventional AVC Intra encoder [2].", "MVC is an extension of the recent Advanced Video Coding (AVC) standard [2]."]} +{"1581264|53680608": []} +{"15460678|3540699": []} +{"744648|43033940": ["In [7] a state-of-the-art review for video surveillance performance metrics is presented."]} +{"8753756|7439310": ["The approaches include (i) error correction and data interleaving [7], (ii) error detection and localization by channel coding [7][8], (iii) resynchronization and data partitioning [7][9][10], (iv) error detection on the video decoder side, and (v) error concealment [11]."]} +{"2436912|16525678": ["To solve the issues of operators\u2019 workloads and network traffic, the use of an intelligent (smart) camera system was proposed [1]."]} +{"823678|7788290": ["Tracking people, which raises many challenges due to the presence of large 3D, nonrigid motion, was extensively analyzed in [36], [1], [ 30 ], [73]."]} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} +{"61990592|7439310": []} +{"14365494|14889616": []} +{"14288624|3540699": ["264/AVC is the newest standard for digital video coding [1]."]} +{"1408385|7439310": []} +{"7936533|14889616": ["We can see the similarity between the proposed video codec and the scalable video coding (SVC) [11]."]} +{"14889616|3540699": ["For more detailed information about H.264/AVC, the reader is referred to the standard [6] or corresponding overview papers [23]\u2013[26] While the VCL creates a coded representation of the source content, the NAL formats these data and provides header information in a way that enables simple and\u2026"]} +{"15253067|7439310": ["2) Complex Error Concealment: A broad review of error concealment techniques can be found in [31], [32]."]} +{"2286359|12127129": ["Detection of moving objects is traditionally achieved by background subtraction methods [1, 21] which segment background and moving objects in a sequence of surveillance video frames."]} +{"278875|40596005": []} +{"278875|3540699": []} +{"363564|17516538": ["The technical problems in multiple camera systems are several and they have been summarized in [1] into six classes: installation, calibration, object matching, switching, data fusion, and occlusion handling."]} diff --git a/edge/graph_168800330.jsonl b/edge/graph_168800330.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c73006f6080d358d2fcbc767f782cfed4772947c --- /dev/null +++ b/edge/graph_168800330.jsonl @@ -0,0 +1,8 @@ +{"18843804|2623404": ["The first aim is to describe the basic issues, the technical approaches, and the methodologies for the implementation of power management primitives in the context of the emerging Software Defined Networking (SDN) architectures [8], [9]."]} +{"5929770|10658846": []} +{"606960|193574": ["The major energy consumers are the air conditioning, the network infrastructure (routers, switches) and the servers [2].", "EPAVE provides a complete view of the energy costs related to the hosting of virtual machines.", "This section gives a non-exhaustive outlook on the application of EPAVE, and more generically of the utilization of energy-aware cost models."]} +{"13054771|10608305": ["Some authors classify DVFS under DPM techniques [17]."]} +{"13054771|10837932": ["This technique is known as the Adaptive Link Rate (ALR), stated by many [28,29] as the future of \u201cGreen Networking\u201d."]} +{"13054771|10658846": ["[19]."]} +{"61770681|8305806": ["Nevertheless, a survey of available multicast techniques in [210] indicated the potential for such a protocol, and efforts to develop a standard reliable multicast protocol that is scalable and efficient continue [219]."]} +{"61770681|7971188": ["Peer-topeer networks also influence grid systems, but because this is also a new technology, reliability has been less extensively researched [26]."]} diff --git a/edge/graph_16880123.jsonl b/edge/graph_16880123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16888186.jsonl b/edge/graph_16888186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d81ac3499c1463311989a99c467909e5ed63abb --- /dev/null +++ b/edge/graph_16888186.jsonl @@ -0,0 +1,10 @@ +{"11648264|1940388": ["Thus symmetric cryptographic solutions such as the Advanced Encryption Standard are more appropriate for WSNs, but such systems need to deal with key management and distribution issues [15], [16]."]} +{"11648264|1230643": ["2158312 inexpensive, low-power sensors possible [1]."]} +{"60782892|1940388": []} +{"60782892|17205659": []} +{"60782892|1230643": []} +{"11879005|16888186": []} +{"11879005|4395259": ["\u2026E-mail: (xiaoxig@student.unimelb.edu.au); A. S. Leong is with the Department of Electrical Engineering (EIM-E), Paderborn University, Paderborn 33098, Germany, E-mail: (alex.leong@upb.de); S. Dey is with the Department of Engineering Science, Uppsala University, Uppsala 75236, Sweden, E-mail:\u2026"]} +{"11879005|1230643": []} +{"13531597|17205659": []} +{"13531597|1230643": []} diff --git a/edge/graph_168925233.jsonl b/edge/graph_168925233.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e7952ad5f476d8cb4037072469f1fb2e23d5edc --- /dev/null +++ b/edge/graph_168925233.jsonl @@ -0,0 +1,3 @@ +{"36103396|15930299": []} +{"33871308|9743176": ["As hypothesised, the e\ufb00ect of SN has a much stronger impact on intention than previous studies have indicated (Davis 1989, Lucas and Spitler 2000, Brown and Venkatesh 2005, Nysveen et al. 2005, Hsu and Lu 2007, Shin 2007, Dahlberg et al. 2008, Shen and Eder 2011).", "While trust is considered crucial for converting site visitors into buyers in e-commerce (Dahlberg et al. 2008, Chung and Kwon 2009), it plays a more signi\ufb01cant role in s-commerce than e-commerce (De Vries and Midden 2008, Nutley 2010).", "\u2026subjective perceptions of social in\ufb02uence play an important role in determining a person\u2019s behavioural intention and actual behaviour (Davis 1989, Lucas and Spitler 2000, Venkatesh and Morris 2000, Brown and Venkatesh 2005, Nysveen et al. 2005, Hsu and Lu 2007, Dahlberg et al. 2008, Shin 2008)."]} +{"31384585|16631951": []} diff --git a/edge/graph_16897832.jsonl b/edge/graph_16897832.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62bff98e71cfbc490f343b1d60c8c1da58446573 --- /dev/null +++ b/edge/graph_16897832.jsonl @@ -0,0 +1,33 @@ +{"207172308|12278223": ["There are works employing evolutionary approaches to perform FS [7,19,35,36,38] as well as others for improving the information retrieval (IR) [6,9,32].", "A review on the application of evolutionary computation to boost information retrieval is found in [6].", "Works on improving information retrieval mainly employ relevance feedback approaches [3,4,6,15,21,30,41] and similarity function learning (or ranking function learning) [9,32]."]} +{"33112475|11894197": ["To better underst and the inner instrument of each approach and the commonalities and differences between them, several taxonomies have emerged such as those proposed by Dash and Liu (1997), (Liu and Yu, 2005; Saeys et al ., 2007)."]} +{"16548770|192934": ["So a number of suboptimal heuristic search techniques have been proposed in the literature, which essentially trade-off the optimality of the selected subset for computational efficiency [4]."]} +{"17337072|14047190": []} +{"6340275|192934": []} +{"121869126|15273230": ["Table 4 shows ETS for prediction after 3 hours and the effect of undersampling [22] and normalization for 3 randomly chosen stations."]} +{"42386975|990486": ["Ant colony optimization (ACO) meta-heuristic [6] was proposed by Dorigo et al."]} +{"41263302|11894197": []} +{"30715548|9045232": ["These techniques differ in the concept of operation and can be classified into four categories [1]."]} +{"26210433|63137": []} +{"12385361|3053192": ["In the work presented in this paper, GP is used as a hyperheuristic method [25] for the automatic design of SPs that include sequencing/DRs and DDARs for dynamic JSS problems.", "In order to address drawbacks of existing methods, three important aspects are considered in our proposed algorithms: 1) representations of different scheduling rules; 2) evolutionary optimization to evolve the tradeoffs in SPs; and 3) reusability (ability to be reused on new unseen problems [25], [26]) of the evolved SPs."]} +{"12385361|32584958": ["A comprehensive review of these methods is given in Ouelhadj and Petrovic [52] and Potts and Strusevich [53].", "and Petrovic [52] and Potts and Strusevich [53]."]} +{"12385361|12846121": ["A comprehensive review of these methods is given in Ouelhadj and Petrovic [52] and Potts and Strusevich [53].", "and Petrovic [52] and Potts and Strusevich [53]."]} +{"5434642|192934": ["is termed as the \u201ccurse of dimensionality\u201d [3,4].", "Feature selection [4] is one of the important tasks for reducing the dimensionality."]} +{"7758477|17157304": ["This representation is a more natural form that is closer to the problem to be solved and has the advantage of not requiring a mapping function, when compared with the popular binary representation, since each individual contains the explicit words used by the CBF.", "Collaborative Filtering (CF) and Content-Based Filtering (CBF) are the two main approaches used currently to fight spam.(5,6) The CF approach is based on sharing general identification information about spam messages, while CBF uses a Data Mining (DM)(7) classifier that learns to discriminate spam from specific message characteristics (e.", "As previously mentioned, there are two main approaches to fight spam: CF and CBF.(5,6) CF strategies are based in sharing information about spam messages (e.", "As previously mentioned, there are two main approaches to fight spam: CF and CBF.5,6 CF strategies are based in sharing information about spam messages (e.g., spam message hash, source domain, spammer IP address, etc.) in a community of users.", "The differences between the distinct methods may seem small, with AUC improvements of 0.3 to 2.4 pp of EAS over CBF."]} +{"207546037|11894197": ["A common disadvantage of this approach is that the performance of the prediction model may be inferior (Saeys et al., 2007)."]} +{"6282735|1386147": ["As suggested in [43], solutions around the knee point of the", "The Pareto-based approach has witnessed great success in evolutionary multiobjective optimization [41], [42] as well as in evolutionary multiobjective learning [43]."]} +{"6282735|4474193": ["This is consistent with the findings in evolutionary robust optimization [50], which suggest that robust optimal solutions can be"]} +{"62582177|8530790": []} +{"12213933|2558103": []} +{"27504113|7158350": []} +{"14717593|192934": [", gradient descent, stochastic search, or evolutionary computation techniques, are widely available [10], [11], and [12]."]} +{"10745913|11894197": []} +{"10745913|7158350": []} +{"14253544|11894197": []} +{"11921446|28457848": []} +{"6008457|192934": []} +{"31986225|6028805": ["Since detection of geometric facial features is not required, this class of approaches is usually more practical and easier to implement as compared to geometric feature-based approaches [2].", "Existing face recognition approaches can be classified into two main analytic and holistic categories [1,2]."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"7964357|10542845": ["EDA are a class of evolutionary stochastic optimization methods [15, 26], where the search for an optimal solution is guided by constructing and sampling probabilistic models of good candidate solutions.", "The procedure involves generating a population of individuals/solutions, where each individual/solution is encoded as a bit vector [15].", "There are different variations of EDA that have been reported earlier in the literature [12-15, 21-25]."]} +{"7964357|1221621": ["EDA are a class of evolutionary stochastic optimization methods [15, 26], where the search for an optimal solution is guided by constructing and sampling probabilistic models of good candidate solutions."]} +{"27328618|10542845": ["Hauschild and Pelikan 56 give a good introduction and review of developments in EDA, including the algorithm pseudo code."]} +{"27328618|1437067": []} diff --git a/edge/graph_169014234.jsonl b/edge/graph_169014234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a9e7160f4cbabee26ec56302121867126598660 --- /dev/null +++ b/edge/graph_169014234.jsonl @@ -0,0 +1,5 @@ +{"7955865|184678": []} +{"11557280|8436865": ["[16] Z.", "In the context of adapting new Health IT systems, such as EHR or computerized provider order entry systems, changes are often introduced in the common workflow [16]."]} +{"299420|913718": ["32 In the next section, we describe the ontology engineering approaches used to construct the epilepsy ontology."]} +{"3394511|32559576": []} +{"15802816|16449507": []} diff --git a/edge/graph_169032532.jsonl b/edge/graph_169032532.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b9fa69a8c2b0a028f18485108b9a81efce3d5fc --- /dev/null +++ b/edge/graph_169032532.jsonl @@ -0,0 +1,27 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"7332452|393948": ["Recent progress on deep learning is reviewed in [3]."]} +{"12063392|1805048": ["A common approach to represent the latent reasons is using clustering techniques [2,3,21] where Vs is modeled by the product of matrix PNs\u00d7C and QC\u00d7K ."]} +{"3611592|10137425": ["\u2026multi-modal SVM-MD (Support Vector Machine Multimodal Dictionary) [46] C-MKL (Convolutional Multiple Kernel Learning) [25] is a multimodal RF (Random Forest) is a baseline intended for comparison to a Random is a baseline which always predicts a random sentiment intensity between [ 3 , \u2212 3 ] [46]."]} +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} +{"25162465|15514398": ["As indicated in [3], we mainly introduce three categories of existing methods as follows, namely traditional statistical correlation analysis methods, cross-modal graph regularization methods and DNN-based methods.", "Different from the traditional single-modal retrieval, such as image retrieval [1] and video retrieval [2], which is limited in providing retrieval results of the same single modality with query, cross-modal retrieval is more flexible to retrieve relevant multimodal information by submitting one query of any modality [3]."]} +{"3888535|15514398": ["Cross-media retrieval [28] is such a kind of technique to flexibly provide data of different media types, with one query of any media type.", "XMediaNet [28] dataset is adopted to serve as the source domain."]} +{"6419793|7020971": ["Stochastic gradient descent (SGD) is a fundamental and popular optimization method for machine learning problems [1], [2], [3], [4], [5]."]} +{"4560834|15361180": ["For fair and objective comparison, we exactly follow the dataset partition and feature extraction strategies of [19, 36] in the experiments."]} +{"4560834|3693305": ["More related works can be referred to the latest literature review in [33]."]} +{"19153102|15514398": ["Owing to the effectiveness and flexibility of cross-modal hashing, users can submit whatever they have to retrieve whatever they want (Peng, Huang, and Zhao 2017; Peng et al. 2017).", "Owing to the effectiveness and \ufb02exibility of cross-modal hashing, users can submit whatever they have to retrieve whatever they want (Peng, Huang, and Zhao 2017; Peng et al. 2017)."]} +{"19153102|1596835": ["To address this issue, there are many hashing meth-ods (Wang et al. 2016; Gionis, Indyk, and Motwani 1999; Zhang and Peng 2017) proposed to accomplish ef\ufb01cient retrieval.", "There are large numbers of hashing methods applied to single modality retrieval (Wang et al. 2016), by which users can only retrieve data by a query with the same modality, such as text retrieval (Baeza-Yates and Ribeiro-Neto 1999) and image retrieval (Wang et al. 2016).", "2016), by which users can only retrieve data by a query with the same modality, such as text retrieval (Baeza-Yates and Ribeiro-Neto 1999) and image retrieval (Wang et al. 2016).", "There are large numbers of hashing methods applied to single modality retrieval (Wang et al. 2016), by which users can only retrieve data by a query with the same modality, such as text retrieval (Baeza-Yates and Ribeiro-Neto 1999) and image retrieval (Wang et al."]} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"3485252|6387482": ["Simple fusion strategies like the early or the late fusion usually have limited performance improvement since the intrinsic relations among multiple feature representations are often overlooked [46]."]} +{"23672393|15361180": ["In order to provide an answer to the above challenge, research towards reliable solutions for cross-modal applications [37, 38], e.g. cross-modal retrieval [32], which operate across modality boundaries, has gained significant momentum recently.", "For a fair comparison, we exactly follow the dataset partition and feature extraction strategies from [22, 32]."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"8355505|15514398": ["In this way, the heterogeneity gap among the data of different modalities can be reduced, so that the heterogeneous data can be correlated together more easily to realize various practical application, such as cross-modal retrieval [3], where the data of different modalities can be retrieved at the same time by a query of any"]} +{"8771159|393948": []} +{"1033682|174797842": []} +{"206592484|456491": []} +{"69194991|26071662": ["Recently, several related surveys [4], [24], [25], [26], [27] of"]} +{"69194991|393948": ["Inspired by the success of deep neural networks [5], [6], [7], deep CCAs [8] have been", "An autoencoder is an unsupervised neural network which learns latent representation through input reconstruction [7]."]} +{"69194991|6387482": ["Recently, several related surveys [4], [24], [25], [26], [27] of"]} diff --git a/edge/graph_169035483.jsonl b/edge/graph_169035483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4b1cc1b46be9af738d6bd6921429368d3d9fb47 --- /dev/null +++ b/edge/graph_169035483.jsonl @@ -0,0 +1 @@ +{"14780427|8125630": ["A data distribution server was created to receive one stream from Embry-Riddle Aeronautical University (ERAU), record the ASDI data, and make it available locally."]} diff --git a/edge/graph_16907530.jsonl b/edge/graph_16907530.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ea92a54dd89911cb93e11d0ee9694dbe98ace77 --- /dev/null +++ b/edge/graph_16907530.jsonl @@ -0,0 +1,3 @@ +{"7211651|15412731": []} +{"7211651|205435103": ["For a fair comparison across studies, the data was normalized as performed in [1] (TABLE I).", "In this work, the guidelines provided by [5] the structure of the presentation of [1] are followed."]} +{"10745630|11139156": ["We have identified, through a SLR, a number of risks that may restrict the use of Scrum in GSD projects.", "In order to identify the primary GSD papers that discuss the use of Scrum, we conducted a Systematic Literature Review (SLR), which involved several activities, such as the development of a review protocol, the identification and selection of primary papers, data extraction and synthesis, and reporting the results.", "A comprehensive description of our SLR and findings can be found in Hossain et al [6].", "We chose \u201cScrum\u201d, as GSD project managers have shown interest in using Scrum practices in their day-to-day project management [7].", "Our SLR identified twenty primary papers [9-28] that discuss the use of Scrum practices in GSD.", "Our conceptual framework is based on twenty primary papers identified through a SLR that addressed the use of Scrum in GSD projects.", "But project stockholder distribution in GSD projects is often characterized by temporal, geographical and socio-cultural distances and creates a number of challenges or risks that may impact on communication and collaboration processes [7].", "For identifying the risks and related strategies, we identified primary papers that discuss the use of Scrum in GSD based on a previous Systematic Literature Review (SLR) [6-7]."]} diff --git a/edge/graph_16908400.jsonl b/edge/graph_16908400.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c24f65a17bd458019fa8a6797d87e8ac8a44bf99 --- /dev/null +++ b/edge/graph_16908400.jsonl @@ -0,0 +1 @@ +{"10165614|239537": ["The heuristics which followed this direction, such as [12], [13], [14], are reviewed in a recent survey [ 15 ]."]} diff --git a/graph_1691097.jsonl b/edge/graph_1691097.jsonl similarity index 100% rename from graph_1691097.jsonl rename to edge/graph_1691097.jsonl diff --git a/graph_1691571.jsonl b/edge/graph_1691571.jsonl similarity index 100% rename from graph_1691571.jsonl rename to edge/graph_1691571.jsonl diff --git a/edge/graph_16920842.jsonl b/edge/graph_16920842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71b9b26fd05b2a97e5d6080f1d77b47440dc993e --- /dev/null +++ b/edge/graph_16920842.jsonl @@ -0,0 +1,3 @@ +{"74979|508912": []} +{"27447745|508912": ["To provide adaptive capability of genetic algorithms is an active research area [14]."]} +{"62557757|18035353": ["These algorithms were implemented [41] using MIP, CP, and explanation-based CP [ 60 ]."]} diff --git a/edge/graph_169224458.jsonl b/edge/graph_169224458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9048ab112352e5e3f1919921bebe37d5410f7e91 --- /dev/null +++ b/edge/graph_169224458.jsonl @@ -0,0 +1,5 @@ +{"32136795|6396569": ["WSN and its extensions, such as mobile WSN [2] and underwater WSN [4], may lead to new innovative applications in ports, as seen in a recent project in the Port of Las Palmas (Spain) [35].", "The application of WSN technologies might be an interesting extension of common AIS.", "Due to multiple constraints of sensor devices that are usually battery-powered, various standards for wireless communication in WSN have been proposed.", "Heilig and Vo\u00df [57] present a cloud-based system service-oriented architecture (SOA) that integrates context-aware information on transport vehicles and containers (e.g., to monitor internal and external conditions, such as position, temperature, humidity, status of e-seals, etc.) based on RFID, WSN, and mobile technologies.", "In combination, actuators and sensors form the new generation of WSNs also referred to as wireless sensor actuator networks (WSAN) [93].", "A wireless sensor network (WSN) describes a large-scale system consisting of interconnected wireless sensors deployed within an area of interest in order to cooperatively monitor large physical or environmental conditions, such as temperature, humidity, and position [1].", "5 Types of network topologies for wireless sensor networks [20] from a connected WSN that links one or multiple containers.", "A METRANS project [83] investigates WSN security and aims to study the application of WSN in a pilot implementation program at one of the terminals of the Ports of Long Beach and Los Angeles.", "As current sensor-based control techniques have some considerable disadvantages, such as related to their maturity, installation, sensitivity to weather conditions, and \ufb01xed detection spots, research has been devoted to the application of WSN technology (for an overview see, e.g., [145]) enabling a more accurate monitoring and measurement of vehicle numbers and speed in real-time [139].", "ZigBee has emerged as de facto wireless standard for the deployment of WSN.", "In contrast to other wireless network standards, such as the well-known IEEE 802.11 family of standards for implementing wireless local area networks (WLAN), communication standards for WSN aim to reduce energy consumption [8].", "Yet, the application of WSN technology in port operations is mainly explored from a theoretical perspective.", "Moreover, ZigBee supports a large number of nodes (up to 65.000) and thus can be used to build a large scale WSN. ZigBee is based on the IEEE 802.15.4 standard which de\ufb01nes the lower network layers and furthermore supports mesh networking and automated routing, making it a highly reliable wireless communication standard [26].", "Heilig and Vo\u00df [57] propose a system architecture that utilizes mobile device capabilities to integrate GPS-based positioning data and WSN sensor data from containers."]} +{"32136795|1230643": ["A wireless sensor network (WSN) describes a large-scale system consisting of interconnected wireless sensors deployed within an area of interest in order to cooperatively monitor large physical or environmental conditions, such as temperature, humidity, and position [1]."]} +{"13592720|15875837": ["Electronic Data Interchange (EDI) systems [1-3] can support such processes through the sending and receiving of electronic business documents (e."]} +{"46052892|9504064": []} +{"46052892|17929320": []} diff --git a/edge/graph_16925069.jsonl b/edge/graph_16925069.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16933085.jsonl b/edge/graph_16933085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16933762.jsonl b/edge/graph_16933762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_169341740.jsonl b/edge/graph_169341740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8116bfa421aeaef20fe03c2574fe34ed5e715c70 --- /dev/null +++ b/edge/graph_169341740.jsonl @@ -0,0 +1,6 @@ +{"92980514|15496510": ["In the past decade, extensive comprehensive reviews on DTA models or their components have been conducted (e.g., Hoogendoorn and Bovy, 2001; Peeta and Ziliaskopoulos, 2001; Szeto and Lo, 20 05; 20 06; Jeihani, 2010; Mun, 2007; Rakha and Tawfik, 2009; Szeto and Wong, 2012; Bliemer et al., 2017 )."]} +{"92980514|35990525": ["Such transportation network design problems have been extensively studied using STA models in the literature (see Farahani et al., 2013 )."]} +{"52003530|1708582": ["If each state and action pairs are visited infinitely often; then Q(s, a) converges to Q\u2217(s, a) [14]."]} +{"7562431|15929566": []} +{"7562431|1708582": []} +{"60916049|15496510": []} diff --git a/edge/graph_169360393.jsonl b/edge/graph_169360393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..220aaa4dc51ed74c9e8e63987fee99e7964f8aa2 --- /dev/null +++ b/edge/graph_169360393.jsonl @@ -0,0 +1,6 @@ +{"3142574|6308019": ["McGill and van Ryzin [15] start with the assumption of a known distribution with unknown parameter values.", "Two papers [15], [20] have taken some steps in this direction.", "Both RM practice and RM models have largely employed two basic assumptions: (i) that demand can be forecast with reasonable accuracy; and, because individual booking decisions are extremely frequent and have low stakes, (ii) that a risk-neutral approach is justi\ufb01ed; see, e.g., [7, 21, 15]."]} +{"14350305|6308019": ["(1972), Richter, H. (1982), and for more than two fare classes in Belobaba, P."]} +{"12920589|6308019": ["There\nare several other papers on the single-leg problem with various assumptions on demand or arrivals\n(see Brumelle and Walczak, 2003, McGill and van Ryzin, 1999, and Talluri and van Ryzin, 2004a)."]} +{"26452077|6308019": ["McGill and van Ryzin [ 25 ] and the references therein also provide a thorough review of different issues in revenue management, for example, seat inventory control, overbooking, and pricing models."]} +{"157764578|6308019": ["Our work differs from other survey papers such as Weatherford and Bodily [83] or McGill and van Ryzin [56] since we do not attempt to provide a taxonomy or an exhaustive enumeration of all the publications in the field.", "Readers are referred to the survey papers by Belobaba [7] and McGill and van Ryzin [56] for a more systematic review of the inventory (seat) control literature."]} +{"2879330|1123458": ["This is related to the so-called S -lemma (or S -procedure) in control (e.g., Boyd et al. [40], P\u00b4olik and Terlaky [119]): The S -lemma essentially gives the boundary between what we can solve exactly, and where solving the subproblem becomes di\ufb03cult."]} diff --git a/edge/graph_16939966.jsonl b/edge/graph_16939966.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..761ee53fdc6c04abcdd4df0895ec93a3073c8c1b --- /dev/null +++ b/edge/graph_16939966.jsonl @@ -0,0 +1,22 @@ +{"17470814|7854020": ["In the near future, WBANs are expected to serve many application domains, both medical and nonmedical, including collecting vital patient information continuously and forwarding it to a remote monitoring station for further analysis, and supporting monitoring of forgotten things, data file transfers, gaming, and social networking applications [2]."]} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"25504|11047930": ["Today, wireless biomedical communication technologies empower the development of new applications and services to improve the quality of medical care provided to the citizens through ubiquitous healthcare environments [5,6,11,12] raising two crucial issues: (a) RF transmissions can cause electromagnetic interference among biomedical devices, which could as a result critically malfunction or conclude with unsuccessful transmission [13] and (b) different types of electronic health (e-Health) applications and services require different quality of service support [14,15]."]} +{"14033171|7988320": ["Wireless Body Area Networks (WBANs) [1] is an emerging short-range wireless communication technology with tiny sensor devices which are implanted inside the human body for medical applications."]} +{"20224564|16214623": []} +{"20224564|7988320": ["An additional important issue mentioned in [2] is traffic classification.", "Physical (PHY) layer: Physical characteristics like electromagnetic coupling, antenna design, radiofrequency communications, propagation pattern, and movement of the body were discussed in [2].", "Although these published surveys provide a comprehensive overview of WBAN technologies and protocols, context awareness is only mentioned briefly in [1, 2].", "Medium Access Control (MAC) layer: MAC layer communication requirements were outlined in [2] and [3]."]} +{"20224564|16514036": ["Although these published surveys provide a comprehensive overview of WBAN technologies and protocols, context awareness is only mentioned briefly in [1, 2].", "Radio-frequency communications, in turn, were described in [3] and channel modeling in [1].", "Sensor devices: Commercially available sensors employed in WBAN systems and their typical data rates were described in [1] and [3].", "Most notably, the following groundwork topics have been covered: Architecture: The general architecture of a WBAN monitoring system was described in [1].", "Energy-efficient MAC protocols were described in [1], including reliable protocols with low delay and packet loss using quality-of-service (QoS) techniques."]} +{"20224564|9429730": ["Context awareness may be defined as \u201cassociating physiological user activity and the environment to the sensed signals of the user\u201d [4]."]} +{"13661206|7988320": []} +{"13661206|7854020": ["The available frequencies for WBANs vary in different countries and can be generally divided into three frequency bands [10]."]} +{"16136054|28210515": ["Since the CFP eliminates the need for CCAs and backoffs, it is widely accepted as the default mode of operation for WBANs."]} +{"46869737|16514036": ["Unlike a sensor network focused on static or low mobility scenarios [6], a WBAN has a higher moving speed and more frequent topology changes due to user movement [3,5].", "measurements [2,3,4,5], and thus has wide applications in ubiquitous health monitoring and advanced athlete performance enhancement."]} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} diff --git a/edge/graph_16944441.jsonl b/edge/graph_16944441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b7943a7def1e61e33e66f6656c369ce509c7157 --- /dev/null +++ b/edge/graph_16944441.jsonl @@ -0,0 +1,6 @@ +{"167870165|16944441": []} +{"62656442|16944441": []} +{"954080|16944441": []} +{"145277419|16944441": []} +{"29031952|16944441": []} +{"35402964|16944441": []} diff --git a/edge/graph_169456118.jsonl b/edge/graph_169456118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be5b0fb30938a9cd050a8afbe76208352c4bce48 --- /dev/null +++ b/edge/graph_169456118.jsonl @@ -0,0 +1,46 @@ +{"4098572|7834819": []} +{"18162258|9045232": ["We employ a combination of the latter two techniques, as they require little offline training and can localize each facial feature position [4]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"40855145|16335158": ["A comprehensive review on sensor-cloud can be found in [7]."]} +{"356547|3348390": ["An entity is defined as \u201ca person, place or objects that is considered relevant to the interaction between a user and an application, including the user and applications themselves\u201d [79]."]} +{"5592081|14970359": ["focus of this review, interested readers can refer to the literature [72,73] for more details."]} +{"207399600|12817488": ["There also exist surveys that concentrate on only one energy-efficient mechanism (like energy-efficient routing protocols or data aggregation techniques [37,38]) since every category of solution often represents a whole research area in itself."]} +{"207399600|12060835": []} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"40113050|25467178": ["As such, mobile applications have entered the race with the wide spread and adoption of smart mobile devices such as smart phones and tablet computers into our daily workflow, including the healthcare [36][37]."]} +{"40113050|16977533": ["Most recent studies have relied on Inertial Measurements Units (IMUs) (accelerometer, gyroscope, and magnetometer or a combination of these) [21] for medication intake detection."]} +{"40113050|10206347": ["The reason from using IMUs is the fact that they can be used for accurately recognizing the intensity, direction, and angle of movement in a 3-dimensional coordinate system [22]."]} +{"578419|6332923": ["[24, 25] Potential points of data interception for an ingestible biosensor system include ingestion data packets from the radiofrequency sensor, SMS relay to the cloud based server, and interventions sent from the interface.[26, 27] Methods to mitigate security breaches include using proprietary radiofrequencies to mask ingestion data, placing the Hub in close proximity to the radiofrequency signal minimizing the distance of transmission and the potential for interception, and creating personalized intervention messages."]} +{"4354870|7834819": ["What can consumer wearables do?Heart rate can be measured with an oximeter built into a ring [3], muscle activity with an electromyographic sensor embedded into clothing [4], stress with an electodermal sensor incorporated into a wristband [5], and physical activity or sleep patterns via an accelerometer in a watch [6,7]."]} +{"22652011|2814871": []} +{"13504353|2003896": []} +{"10652672|1634674": ["Many other works describe various approaches to classifying motion using accelerometers and gyroscopes [10], [11]."]} +{"6618916|6332923": ["Set to specific bands of communications, RFID signals can be intercepted during transmission to the receiver, or as the receiver sends a signal to an online server [20]."]} +{"42340747|2332366": ["The adaption to technology depends mostly on the perception of the user of that technology (Garc\u00eda-G\u00f3mez et al. 2014; Helb-ing 2015; Kirkham and Greenhalgh 2015; Wang et al. 2015; Sajid, Abbas, and Saleem 2016)."]} +{"42340747|86629084": ["The phenomena cover many allied aspects in the application of smart computing in different spheres (Silva et al. 2015) as shown in Table 1."]} +{"40462024|5766836": ["The aforementioned issues have been resolved via a dynamic routing algorithm [21]."]} +{"40462024|14745481": ["Cho et al. (2011) have assembled a review of prevalent schemes for the mobile wireless sensor network, while keeping a certain parameter as the center of research.", "Chen et al., 2011 studied the reduction of air conditioning energy utilization.", "Various parameters include accepted classi\ufb01cations, potential attacks, performance metrics, and trust metrics on the mobile wireless sensor network [22]."]} +{"40462024|1230643": ["Wireless sensor networks that enable the network bounded delay guarantee, which is essential for the end to end packet delivery, are termed as real-time WSN [1,2]."]} +{"6161031|17514014": []} +{"6161031|20905429": ["\u2026the niche recreational fitness arena catered to by current devices, researchers have also considered applications of such technologies in clinical applications in remote health monitoring systems for long term recording, management and clinical access to patient\u2019s physiological information [4]\u2013[8].", "Most proposed frameworks for remote health monitoring leverage a three tier architecture: a Wireless Body Area Network (WBAN) consisting of wearable sensors as the data acquisition unit, communication and networking and the service layer [4], [7]\u2013[10]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"7231580|2814871": ["Nowadays, performing gait analysis with inertial sensors as an important group of wearable sensors [1,2] has become indispensable in several \ufb01elds of research including biomechanics, neurorehabilitation, sport medicine, etc. [3\u20137]."]} +{"10206347|7988320": ["Reference [35] placed emphasis on network communication, discussing the issues of physical layer, MAC layer, network layer and routing protocols in detail.", "Finally, the trade-off between energy efficiency and the complexity of fast routing algorithms also needs to be figured out [35].", "IEEE 802.15.6 has defined many BSN band standards, so developing many upper layer protocols which support a variety of physical layer channel is an inevitable trend [35]."]} +{"10206347|6332923": ["Therefore, QoS and the real-time prosperity of data transmission must be considered [17,18]."]} +{"10206347|1230643": ["Since the memory module and data sending module consume lots of energy [26], data compression can lower power consumption effectively on BSN sensors, by reducing information stored in memory and transmitted by the transceiver.", "As communication consumes more power than local computation, wireless data transmission uses a large amount of power [26].", "In the aspect of data fusion, research mainly includes the design and implementation of denoising [23], feature extraction [24], data classification [25], data compression [26], and other key technologies."]} +{"24705525|6275330": ["Purposes of WSN in this area are different [3], below are some of them.", "them in categories ([3] with alterations)."]} +{"16977533|7834819": ["Due to the miniaturization and lightweight of wearable motion sensors, they can be integrated into clothing or accessories from an ergonomic point of view [78]."]} +{"16977533|20905429": ["Additionall, risks of radiation and other kinds of health hazards should be eliminated [76].", "Additionall, risks of radiation and other ki ds of health hazards should be eliminate [76]."]} +{"41014293|270804": []} +{"41014293|1236072": []} +{"41014293|1230643": []} +{"15307908|1230643": ["Index Terms\u2014 background suppression, medication intake monitoring, noise-robustness, quality measure, multiscale morphology."]} diff --git a/edge/graph_16948293.jsonl b/edge/graph_16948293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1100c0df99299cd6e2cd8ce5bea46f1e2ae6cd8 --- /dev/null +++ b/edge/graph_16948293.jsonl @@ -0,0 +1 @@ +{"96440607|18645534": []} diff --git a/edge/graph_16954591.jsonl b/edge/graph_16954591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1695570.jsonl b/edge/graph_1695570.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1695607.jsonl b/edge/graph_1695607.jsonl similarity index 100% rename from graph_1695607.jsonl rename to edge/graph_1695607.jsonl diff --git a/edge/graph_16956500.jsonl b/edge/graph_16956500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57ff92475137862007392bc60ad85d0418c0c407 --- /dev/null +++ b/edge/graph_16956500.jsonl @@ -0,0 +1,3 @@ +{"19013775|11792588": ["Diverse algorithms/schemes for handwritten character recognition have been evolved in [2]."]} +{"62561636|15782139": ["There are many pieces of work towards handwritten recognition of Roman, Japanese, Chinese and Arabic scripts, and various approaches have been proposed by the researchers towards handwritten character recognition [1-3]."]} +{"16661238|15782139": []} diff --git a/edge/graph_169570837.jsonl b/edge/graph_169570837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f62f490c15d1dc34bfe435f10ba058e5a2e957eb --- /dev/null +++ b/edge/graph_169570837.jsonl @@ -0,0 +1,5 @@ +{"67258090|3348390": ["Besides helping to build adaptive IoT systems that better fit the dynamic application needs and execution context, context awareness plays a key role in IoT to decide what data needs to be processed, based on its relevance to a given context [4].", "Context awareness is recognized as an important requirement of IoT systems [4] to properly accommodate the scale and heterogeneity factors and to provide useful information to meet application demands."]} +{"44182431|3474164": ["managing the state information of massive number of IoT devices is also an issue that needs to be considered [62, 63]."]} +{"44182431|2871699": ["M2M communicaiton has been extensively reviewed in [54, 55, 56, 57, 58].", "The ETSI standard and applications has been discussed in [54] and [55], in which mobile devices are used as mobile gateways for resource constrained IoT devices."]} +{"44182431|3494096": ["The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time [1, 20, 21].", ", have been used in IoT applications, in which billion of devices will be connected by wireless communication technologies [20].", "The 3G and 4G are widely used for IoT but not fully optimized for IoT applications [20].", "Existing communication technologies are diverse and it is challenge for the fifth generation (5G) mobile network to meet the requirements of applicaitons in IoT [20].", "To ensure that M2M applications, the three generation partnership project (3GPP) proposed Enhanced Machine-Type Communication (eMTC), Extended Coverage-Global System for Mobile Communications for the IoT (EC GSM-IoT) and Narrowband-IoT (NB-IoT) as cellular-based LPWA technologies for the IoT [20].", "by inferences, such as WiFi signals, buildings, microwaves, etc [20]."]} +{"22150944|3348390": ["[7][12][10][19][36][37] analyzed the need to address architecture and network relationship management issue.", "\uf0b7 Compatibility Context-aware deployment of IoT [36] \uf0b7 Automated configuration of sensors"]} diff --git a/edge/graph_169630522.jsonl b/edge/graph_169630522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16963100.jsonl b/edge/graph_16963100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16972183.jsonl b/edge/graph_16972183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f6522ecb7642d0d3f24c0f075a2c4287b81055d --- /dev/null +++ b/edge/graph_16972183.jsonl @@ -0,0 +1,3 @@ +{"8857235|16972183": []} +{"8857235|8909218": ["Email: rganti@ee.iitm.ac.in. and are distinguished by their end-user installation in arbitrary locations, very short range, and possibility of having a closed-subscriber group [10]\u2013[12]."]} +{"16712297|8909218": ["Unlike cellular systems with fixed relays [12], [13], DAS does not incur an over-the-air penalty for transmissions to and from the RRU."]} diff --git a/edge/graph_16975785.jsonl b/edge/graph_16975785.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16977533.jsonl b/edge/graph_16977533.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41cc01081fedfcdad33b25a709a50f6c08d6b128 --- /dev/null +++ b/edge/graph_16977533.jsonl @@ -0,0 +1 @@ +{"1615503|9429730": []} diff --git a/edge/graph_16980954.jsonl b/edge/graph_16980954.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d28495b4da86f7ca6fe30345457bfa2c53e99998 --- /dev/null +++ b/edge/graph_16980954.jsonl @@ -0,0 +1,4 @@ +{"13918176|987239": []} +{"7212045|1877246": []} +{"207218131|1482463": []} +{"8061430|4491892": ["This leads to a crucial property: SIS with resampling can produce reasonable statistics only for systems that \u201cexponentially forget\u2019\u2019 their past [8] (i."]} diff --git a/edge/graph_16985447.jsonl b/edge/graph_16985447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16985522.jsonl b/edge/graph_16985522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f23685964475bf2e5fbe3de03935e0ecf9c8d2f --- /dev/null +++ b/edge/graph_16985522.jsonl @@ -0,0 +1,3 @@ +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"5790745|8777381": ["The vocal emotions explored may have been induced or acted or they may be have been elicited from more \u201creal\u201d, lifelike contexts [1], [2]."]} diff --git a/edge/graph_16988556.jsonl b/edge/graph_16988556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d66dac34fa5ade7f8863484cba9003c0a7e09d67 --- /dev/null +++ b/edge/graph_16988556.jsonl @@ -0,0 +1,15 @@ +{"38372010|15744805": ["All the results are quantitatively evaluated using the empirical objective segmentation assessing method (Zhang, 1996), \u2018\u2018 discrepancy based on the number of mis-segmented pixels \u2019\u2019.", "All quantitative evaluations were performed using the powerful empirical discrepancy method (Zhang, 1996) discrepancy based on the number of mis-segmented pixels ."]} +{"17217452|2616070": []} +{"12602561|7185733": ["Keywords: color segmentation, hand localization, transductive learning, self-organizing map"]} +{"14955408|15744805": []} +{"985345|954543": ["Kohonen i n 1981 [7, 8]) have turned out to be very powerful for gaining insight into data r epartition [5, 10, 12]."]} +{"3331677|2616070": []} +{"771112|530484": ["Recently, Michailovich et al. [20] proposed an active contour model using the Bhattacharyya difference between the intensity distributions inside and outside a contour."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} +{"16108937|530484": ["where fd,k(V\u0398\u0302(Nj)) is the kth robust feature computed on the normalized image V\u0398\u0302, and the normalization is done by intensity correction based on the matched regions in the adaptive atlas to the template image [8]."]} +{"14047848|6707996": ["Clustering is one of the widely used image segmentation techniques which classify patterns in such a way that samples of the same group are more similar to one another than samples belonging to different groups [3,9,10].", "Fuzzy C means is a method of clustering which allows one pixel to belong to one or more clusters[9,10]."]} +{"13949175|8953108": ["To measure such performance , a parameter\u03b7, based on the misclassification error, has been used [17].", "An exhaustive survey of image thresholding methods can be found in [17]."]} +{"18686065|8953108": []} +{"18162999|14415030": ["The latter one is known as atlas-based segmentation where the a prior knowledge can be incorporated in both atlas construction (atlas size, orientation or shape) and atlas fitting procedure (energy function and optimization procedure)."]} +{"18162999|14122909": ["Index Terms\u2014Atlas-based image segmentation, medical image registration, atlas construction, statistical model, unbiased atlas selection, transformation, mappings, similarity measure, optimization algorithm, survey."]} +{"18162999|206051485": ["Further, we will discuss image registration."]} diff --git a/edge/graph_16992768.jsonl b/edge/graph_16992768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16993506.jsonl b/edge/graph_16993506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16997416.jsonl b/edge/graph_16997416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16998325.jsonl b/edge/graph_16998325.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_16999283.jsonl b/edge/graph_16999283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d6dcc702cd2930a054a8a4030b055a37445fe38 --- /dev/null +++ b/edge/graph_16999283.jsonl @@ -0,0 +1,2 @@ +{"16294032|9913343": []} +{"62654640|6159806": ["of services on the Cloud using a declarative [ 2 ] genetic", "Generally, the complexity is due to the following reasons [ 2 ]:"]} diff --git a/edge/graph_17003244.jsonl b/edge/graph_17003244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a757d84b38aad3ed6a05ee65fe2a699a09faf97 --- /dev/null +++ b/edge/graph_17003244.jsonl @@ -0,0 +1 @@ +{"14747651|14962807": ["Compact representations of graphs are fundamentally important and useful in many applications, including representing the meshes in finite element analysis, terrain models of GIS, three-dimensional (3D) models of graphics [48, 64, 80, 81, 82, 85, 89, 92], and VLSI design [56, 84], designing compact routing tables of computer networks [1, 3, 16, 35, 36, 38, 66, 77, 94, 95], and compressing the link structure of the Internet [2, 5, 7, 15, 21, 88]."]} diff --git a/edge/graph_17003499.jsonl b/edge/graph_17003499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17003768.jsonl b/edge/graph_17003768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..380f5e93656984f463bb89595093743498ba1c42 --- /dev/null +++ b/edge/graph_17003768.jsonl @@ -0,0 +1 @@ +{"5931910|17003768": []} diff --git a/edge/graph_17005826.jsonl b/edge/graph_17005826.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddbb4365c47c7db660ca53b29c9b131ef28afced --- /dev/null +++ b/edge/graph_17005826.jsonl @@ -0,0 +1,2 @@ +{"99478|15540889": ["being the Protocol Data Unit (PDU) of a certain protocol but, generally, it may be any intrinsic property of a protocol or a number of protocols [4]."]} +{"99478|15247126": []} diff --git a/edge/graph_17008289.jsonl b/edge/graph_17008289.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17008959.jsonl b/edge/graph_17008959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17009788.jsonl b/edge/graph_17009788.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7bbb395dd56cdb07da2889014298486b6e6a152 --- /dev/null +++ b/edge/graph_17009788.jsonl @@ -0,0 +1 @@ +{"4471572|17033313": ["For a fair comparison between the original and the watermarked work there are efficient distortion metrics [5].", "The proposed intrusion detection approach uses a combined watermarking technique that derives from Lattice and Block-Wise ([3], [4], [5]) methods."]} diff --git a/edge/graph_17011725.jsonl b/edge/graph_17011725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84c71dc0efcd16ee6d06b9124ad3d695f4ec2eff --- /dev/null +++ b/edge/graph_17011725.jsonl @@ -0,0 +1 @@ +{"61902989|1437067": ["The labels in each quadrant of the matrix have following meaning [30]:"]} diff --git a/edge/graph_17014608.jsonl b/edge/graph_17014608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc498b6dc604543aa0147da658bbfe75449a719c --- /dev/null +++ b/edge/graph_17014608.jsonl @@ -0,0 +1,2 @@ +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"7501530|6486398": ["Notice that in order to evaluate Z(t), we use a trick similar to the one used in PageRank [12]: a dummy absorbing state linked to all the states of the Markov chain is created with a very small probability of jumping to this state."]} diff --git a/edge/graph_17015572.jsonl b/edge/graph_17015572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4eb3708eaa84341fa33399d9d137ee43c252707 --- /dev/null +++ b/edge/graph_17015572.jsonl @@ -0,0 +1 @@ +{"20720056|1775475": []} diff --git a/edge/graph_17019038.jsonl b/edge/graph_17019038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46dd64d606cee7bbece02150dcc07315776c6310 --- /dev/null +++ b/edge/graph_17019038.jsonl @@ -0,0 +1 @@ +{"2233231|14545307": []} diff --git a/edge/graph_17023265.jsonl b/edge/graph_17023265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1e934393170df81baf35745aebcf436c33af814 --- /dev/null +++ b/edge/graph_17023265.jsonl @@ -0,0 +1,2 @@ +{"18111126|206051485": ["Image Mosaic is widely used in remote sensing, medical image, pattern recognition and computer vision[1,2].", "According to the different types of registration, Image Mosaic is mainly divided into two sorts, one is regionbased and the other is feature-based[2]."]} +{"9177303|7788290": ["Gavrila [2] provides a survey of this work."]} diff --git a/edge/graph_17024419.jsonl b/edge/graph_17024419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e78f7c22bec5340cf50f6a602aa35ad3a7f8cfd --- /dev/null +++ b/edge/graph_17024419.jsonl @@ -0,0 +1,16 @@ +{"584487|469744": ["Means of application and integration in term study by Gittler and Gluck [2], \nthe positive effects of mathematics and geometry education at high school as well as geometry education \non the improvement of spatial intelligence university level are being discussed."]} +{"6409661|469744": ["The term Augmented Reality (AR) is used to describe systems that blend computer generated virtual objects or environments with real environments [1, 2]."]} +{"16617185|469744": []} +{"15732465|469744": ["In his classical definition of AR, Azuma [2] states three requirements: real-time performance, user registration in three dimensions and a combined presentation of both virtual and real information."]} +{"314669|469744": ["In contrast to the proliferation of computing devices in such an environment, augmented reality(AR) [4] typically focuses on the use of personal displays (such as see-through head-worn displays) to enhance a user\u2019s senses by overlaying a directly perceptible virtual layer on the physical world."]} +{"16829159|469744": []} +{"1318641|12127129": ["The gown is segmented from the webcam image using a Gaussian-model background subtraction approach (see [22] for a review)."]} +{"250183|469744": ["Due to the real-time demands of AR, researchers often have to take refuge to putting \u2018markers\u2019 or \u2018landmarks\u2019 into the scene [ 1 ]."]} +{"1261533|469744": ["It provides personalized Augmented Reality tours [1] and reconstructions of ruined cultural"]} +{"5403998|469744": ["Another fundamental alternative approach to building mixed reality workplaces is threedimensional Augmented Reality (AR) (Azuma, 1997).", "MR systems create advanced user interfaces and environments where interactive virtual objects are overlaid on the 3D physical environment, naturally blending with it in real time (Azuma, 1997; Milgram, Takemura, Utsumi, et al., 1994).", "There are many potential uses for such interfaces, ranging from industrial , to medical and entertainment applications (e.g. Bajura, Fuchs et al. 1992; Poupyrev, Berry et al. 2000, see also Azuma, 1997 for survey)."]} +{"15540360|469744": ["Augmented reality (AR) is the process of a user viewing the physical world and virtual information simultaneously, where the virtual information is overlaid and aligned to the physical world view [1]."]} +{"2925287|469744": ["Many different types of sensors have been used to achieve this including : GPS, gyroscopes, cameras, hybrid vision, accelerometers and many more which have been summarized in [1, 2]."]} +{"206986719|469744": ["Azuma [3] provides a commonly accepted definition of AR as a technology which (1) combines real and virtual imagery, (2) is interactive in real time, and (3) registers the virtual imagery with the real world.", "For OST HMDs, one of the main challenges is the generation of correct occlusion effects between virtual and real objects [3].", "From our own research experience and by studying the existing technology surveys [3][4], it is clear that to provide an effective AR experience there are a number of factors that must be developed, including: (a) Graphics rendering hardware and software that can create the virtual content for overlaying the real world (b) Tracking techniques so that the changes in the viewer\u2019s position can be properly reflected in the rendered graphics (1)Email: zhou0099@ntu.", "[3] and the more recent 2001 Azuma et al."]} +{"791733|469744": ["In 1997, the first author published a survey [ 3 ] (based on a 1995 SIGGRAPH course lecture) that defined the field, described many problems, and summarized the developments up to that point."]} +{"206947194|469744": ["A video see-through HMD offers the following advantages over an optical see-through HMD [ 3 ].", "The following 2 problems common to video seethrough HMDs [ 3 ] still remain with the HMD developed on this occasion.", "It is said that such parallax leads to spatial perception errors [ 3 ]."]} +{"7127975|469744": []} diff --git a/edge/graph_17027506.jsonl b/edge/graph_17027506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6c4ca0741a3b52994d2d1146fce688113c8c955 --- /dev/null +++ b/edge/graph_17027506.jsonl @@ -0,0 +1 @@ +{"17082508|1113420": []} diff --git a/edge/graph_17030627.jsonl b/edge/graph_17030627.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b5bdfe41b88dd29e21c4a0be9122034a504b75c --- /dev/null +++ b/edge/graph_17030627.jsonl @@ -0,0 +1,7 @@ +{"2798470|14441987": ["Many issues need to be addressed in ad hoc networking, one of the most relevant being the packet route selection [32]."]} +{"182836|36610012": []} +{"18361204|7278743": []} +{"62555662|141053": ["By using two out-of-band busy tones to signal the ongoing transmissions, multi-channel protocols [14,18], including dual busy tone multiple access (DBTMA) [19], had proved to have better immunity against the hidden terminal problem and the exposed terminal problem.", "In single channel schemes [7,14,15], IEEE 802.", "Although a lot of research works have been done in the field of MAC protocols in ad hoc networks [11,14],"]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"39945968|713082": []} +{"39658336|141053": []} diff --git a/edge/graph_17033313.jsonl b/edge/graph_17033313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17036197.jsonl b/edge/graph_17036197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..986b6414a3dcd1bb78ecc9960893d0ec7608563f --- /dev/null +++ b/edge/graph_17036197.jsonl @@ -0,0 +1,32 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"4649347|195346070": ["Part 1 \u2013 Comparison with Generic Multi-object Track-ers In this part, we compare our automatic topic discovery (ATD) algorithm with two state-of-the-art generic multi-object trackers, GMOT (Luo and Kim 2013) and BLP (Luo et al. 2014).", "Please refer to (Luo, Zhao, and Kim 2014) for a more extensive review.", "\u2026(Zhang, Li, and Nevatia 2008; Pellegrini et al. 2009; Xing, Ai, and Lao 2009; Pirsiavash, Ramanan, and Fowlkes 2011; Milan, Schindler, and Roth 2013; Luo et al. 2014; Leal-Taix \u00b4 e et al. 2014), however, issues like tracking management, appearance variations and occlusions remain challenging.", "For the second problem, we employ public six data sets from (Luo et al. 2014) named Zebra, Crab, Goose, Hockey, Sailing , and Antelope .", "An existing trajectory may be terminated in the case of a single missing detection, resulting in fragmentation in some sequential approaches (Luo and Kim 2013; Luo et al. 2014).", "For fairness, all algorithms are given the same detection results from (Luo et al. 2014).", "GMOT-ATD and BLP-ATD are the proposed algorithms based on the same detection results from the corresponding counterparts.", "The results of GMOT and BLP are quoted from (Luo and Kim 2013) and (Luo et al. (4) BL: a baseline method of our algorithm without temporal dynamics, i.e. the video sequence is treated as a single document without division into epochs.", "In the \ufb01rst part we compare our approach to existing sequential approaches (Luo and Kim 2013; Luo et al. 2014) in solving the generic multi-object tracking problem.", "\u2026algorithm to two problems, (1) multi-pedestrian tracking, requiring the output of an off-line trained pedestrian detector as input and (2) generic multi-object tracking (Zhao, Gong, and Medioni 2012; Luo and Kim 2013; Luo et al. 2014), where multiple objects of any type are detected and tracked.", "The proposed automatic topic discovery (ATD) is applied to GMOT (Luo and Kim 2013) and BLP (Luo et al. 2014) and is evaluated in terms of MT, ML, FM and IDS values."]} +{"14988444|2616070": ["This combination is made possible by the great progress LS segmentation and tracking approaches have made in recent years [12].", "To our knowledge, ours is the first approach that integrates segmentation-based LS-trackers [13, 12] with a tracking-by-detection framework for street-level mobile tracking.", "The LS tracking framework has originally been developed for following individual targets over time and has mostly been evaluated for tasks where a manual initialization is given [12, 13]."]} +{"62054337|14970359": []} +{"62054337|7788290": ["Thorough reviews of human-specific trackers can be found in (Aggarwal & Cai, 1999; Gavrila, 1999; Moselund & Granum, 2001)."]} +{"4231589|5755403": ["Reviews and comparisons of different trajectory clustering methods can be found in [8, 20, 21]."]} +{"4231589|17516538": ["Reviews and comparisons of different trajectory clustering methods can be found in [8, 20, 21]."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"1850291|2616070": []} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} +{"6471474|5755403": ["\u2026al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an object is then treated as\u2026"]} +{"6471474|16525678": ["While some existing reviews Valera and Velastin (2004) and Aghajan and Cavallaro (2009) tried to cover all the aspects of 0167-8655/$ -see front matter \u00d3 2012 Elsevier B.V.", "Many intelligent multi-camera video surveillance systems have been developed (Collins et al., 2001; Aghajan and Cavallaro, 2009; Valera and Velastin, 2004)."]} +{"6471474|12127129": ["Background subtraction (Piccardi, 2004) is widely used for detecting moving objects in video surveillance with static cameras."]} +{"6471474|17516538": ["\u2026and Grimson, 2000; Oliver et al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an\u2026"]} +{"14662457|8953108": ["Image thresholding methods were investigated by Sezgin and Sankur [3]."]} +{"14662457|9045232": ["Numerous techniques have been proposed to detect faces in images and video [41], [42]."]} +{"55372932|17516538": []} +{"55372932|7788290": []} +{"56197914|5401262": ["In particular, hand gesture recognition has been studied by many researchers in HCI research.", "Visual surveillance often employs gross and intermediate level recognition, and detailed level recognition mainly aims for developing the gesture based human-computer interfaces (HCI) [56]."]} +{"56197914|17516538": ["Visual surveillance techniques have initiated a wide variety of applications in access control, person specific identification, anomaly detection and alarming in academic community as well as industry and government [1]."]} +{"56197914|16169670": ["A survey of different techniques for camera calibration can be found in [83]."]} +{"11307543|9932808": []} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} diff --git a/edge/graph_17043669.jsonl b/edge/graph_17043669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1704452.jsonl b/edge/graph_1704452.jsonl similarity index 100% rename from graph_1704452.jsonl rename to edge/graph_1704452.jsonl diff --git a/edge/graph_17047696.jsonl b/edge/graph_17047696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c34870032204797dd0c07db3d8dcbb2fa752b95d --- /dev/null +++ b/edge/graph_17047696.jsonl @@ -0,0 +1 @@ +{"13317006|60455": ["Knowledge discovery in databases is now established are which has incorporated analytical capabilities into diverse data formats, while graph mining (Chakarbatti and Faloutsos 2006), numerals mining (David and Dursun 2008; Han and Kamber 2001), text mining (Grover et al. 2004), web mining ( Kosala and Blockeel 2000 ), among others are increasing its acceptance in the field of data mining.", "\u2026capabilities into diverse data formats, while graph mining (Chakarbatti and Faloutsos 2006), numerals mining (David and Dursun 2008; Han and Kamber 2001), text mining (Grover et al. 2004), web mining (Kosala and Blockeel 2000), among others are increasing its acceptance in the field of data mining."]} diff --git a/edge/graph_17051174.jsonl b/edge/graph_17051174.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd8ef288b158a1e4c0b0496dd9a5a4c305feeae8 --- /dev/null +++ b/edge/graph_17051174.jsonl @@ -0,0 +1 @@ +{"14106275|14545307": []} diff --git a/edge/graph_17054454.jsonl b/edge/graph_17054454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17056891.jsonl b/edge/graph_17056891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..005225ff96aa033139e01ab9417e509beb3c7f15 --- /dev/null +++ b/edge/graph_17056891.jsonl @@ -0,0 +1,2 @@ +{"58041721|1188683": ["Introduction With the increasing computational requirement \nof applications, the low-end embedded processors are insuf.cient to meet the require\u00adment."]} +{"18636661|6392800": []} diff --git a/edge/graph_17062686.jsonl b/edge/graph_17062686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c44d20c797b5fcd24c1521a97e9a35e940cf173a --- /dev/null +++ b/edge/graph_17062686.jsonl @@ -0,0 +1,2 @@ +{"207172280|12452682": ["[6] provides a game theoretical overview of dynamic spectrum sharing from three aspects: analysis of network users\u2019 behaviors, efficient dynamic distributed design and optimality analysis."]} +{"2057096|17109970": ["A recent summary on game theoretical approaches used for energy efficient resource allocation in wireless networks can be found in [ 9 ].", "Thus, these schemes are essentially similar to the power control schemes in traditional wireless networks [ 9 ]."]} diff --git a/edge/graph_17067678.jsonl b/edge/graph_17067678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4b32555b2a5bcc19e78f6ceb8c194c4bcd7610f8 --- /dev/null +++ b/edge/graph_17067678.jsonl @@ -0,0 +1,5 @@ +{"17499959|14441987": ["The broadcast transmission is used by most MANET routing protocols [2]."]} +{"6438719|14441987": []} +{"29348434|14441987": ["To combat the inefficiency and overhead encountered by message flooding, many MANET routing protocols [ 5 , 6] utilize a two-phased process."]} +{"1027180|14441987": []} +{"14398863|14441987": []} diff --git a/edge/graph_17069874.jsonl b/edge/graph_17069874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3efbfc19a5d1b5522f31791bc3738272ed5a4348 --- /dev/null +++ b/edge/graph_17069874.jsonl @@ -0,0 +1,2 @@ +{"62044921|17069874": []} +{"58013611|33286487": ["[ 5 ]. The local spectrum in a spatiotemporal neighborhood of the point (Xo, to) as defined by the windowed Fourier transform is given by"]} diff --git a/edge/graph_17070129.jsonl b/edge/graph_17070129.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bba7027d0668d226f38e26b2f151c5eb8df68b4 --- /dev/null +++ b/edge/graph_17070129.jsonl @@ -0,0 +1,3 @@ +{"5766103|4796356": ["This of course is still an open problem [12].", "\u2022 Restrictions on n, p, and m can be imposed so that the Kimura\u2013Davison conditions [12] are satisfied for (A11; A12; C1).", "However, systems involving constrained Lyapunov equations are in most cases nonsquare [4], [5], [12]."]} +{"33234674|1876323": ["Although the effect of output disturbance for every subsystem is reduced or partially rejected, a better performance of CLMR can be improved by a switching control [19], [20]."]} +{"42530985|4796356": ["Compared with state feedback, the static output feedback control problem is much more difficult, even for systems without delay [17]."]} diff --git a/edge/graph_17070848.jsonl b/edge/graph_17070848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17071125.jsonl b/edge/graph_17071125.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2f1c0548e984dd0e50c17f9eab81524a5aa0a07 --- /dev/null +++ b/edge/graph_17071125.jsonl @@ -0,0 +1,12 @@ +{"2300568|9045232": ["1999], face detection [Yang et al. 2002], and face recognition [Zhao et al.", "In particular, there\u2019s an extensive body of literature on facial modeling and animation [Parke and Waters 1996; Lee et al. 1995; Guenter et al. 1998; Pighin et al. 1998; Blanz and Vetter 1999; O\u2019Toole et al. 1999], face detection [Yang et al. 2002], and face recognition [Zhao et al. 2003]."]} +{"62185766|53680608": []} +{"15751455|9045232": []} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"33645252|9045232": []} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"27605580|7158350": ["A survey into the field can be found in an article by Zhang [13].", "A tutorial on Principal Components Analysis, University of Otago, 2002., http://www.cs.otago.ac.nz/cosc453/student_tutorials /principal_components.pdf [13] Zhang, G. P., Neural Networks for Classification: A Survey, IEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews, Vol. 30, NO. 4, 2000."]} +{"3512071|2355696": []} +{"7831559|9045232": ["In this work, we choose to use the wellknown methods proposed in feature-based face detection approaches since such methods have proven reliable and computationally efficient [ 19-22 ], with main references to Graf et al. [23] and Yaw and Cipolla [22]."]} +{"8107077|49273945": []} +{"8107077|17221751": []} diff --git a/graph_170825.jsonl b/edge/graph_170825.jsonl similarity index 100% rename from graph_170825.jsonl rename to edge/graph_170825.jsonl diff --git a/edge/graph_17084176.jsonl b/edge/graph_17084176.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3bd4f8541d81e293e4d7293abe875ea57e4c940 --- /dev/null +++ b/edge/graph_17084176.jsonl @@ -0,0 +1 @@ +{"15465964|191396": ["1.1 Related surveys\nThere are a number of surveys on traditional clustering (Jain et al. 1999; Berkhin 2006; Xu and Wunsch 2005).", "This problem of determining the number of clusters is known as the \u201cfundamental problem of cluster validity\u201d, and a number of solutions can be found in (Xu and Wunsch 2005).", "Xu and Wunsch (2005) present the clustering algorithms\nfrom three different perspectives, namely statistical, computer science and machine learning, and some applications of traditional clustering are also given.", "There are a number of surveys on traditional clustering (Jain et al. 1999; Berkhin 2006; Xu and Wunsch 2005)."]} diff --git a/edge/graph_17084360.jsonl b/edge/graph_17084360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e8f0249e1c1b0f432e73ee64fc16fbc24ba0e03 --- /dev/null +++ b/edge/graph_17084360.jsonl @@ -0,0 +1 @@ +{"32201845|193574": ["In [7], a survey on the most popular techniques for im-"]} diff --git a/graph_1708582.jsonl b/edge/graph_1708582.jsonl similarity index 100% rename from graph_1708582.jsonl rename to edge/graph_1708582.jsonl diff --git a/edge/graph_17092924.jsonl b/edge/graph_17092924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17094092.jsonl b/edge/graph_17094092.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..359e9c4a78a256a0fa59384cfc8881896181cc06 --- /dev/null +++ b/edge/graph_17094092.jsonl @@ -0,0 +1,10 @@ +{"14317333|677242": ["When combined with an array of graphics displays, we achieve an environment where we can exercise computational steering[11] of families of related simulations."]} +{"5468061|2000518": ["See the recent survey on the hardware, software, and human-factor aspects of large high-resolution displays [29] to get a comprehensive review of the options for building such displays.", "A recent survey on large high-resolution displays cite scalability to large tiles, high-performance rendering, and integration into a computing environment as among the top 10 research challenges faced today [29]."]} +{"7190220|2000518": ["However, the importance of the mouse cursor for interaction and the increased size and pixel density of these workspaces can create usability issues [5]."]} +{"229402|7185733": ["Standard interface devices limit speed of interaction, creating a bottleneck in data analysis [26].", "Multi-touch interfaces enable simple gestures which can convey complicated interactions [26], many of which have become standardized over different multi-touch platforms."]} +{"14352403|2000518": []} +{"44747102|7185733": []} +{"15015226|2000518": ["jBricks adopts a client-server model [15]: as shown in Figure 2, a single instance of the application runs on a client node, generating the geometry (populating virtual spaces with glyphs) and distributing it to render servers running on cluster nodes.", "tems, wireless multitouch devices, in order to enable multidevice and/or multi-user interaction with the displayed data [14, 15]."]} +{"991910|16540884": []} +{"9160141|2000518": []} +{"18523492|7624176": ["A pathway is commonly drawn as a streamline [23] or a streamtube ([21], among many) whose color and thickness are chosen according to the pathway metadata and the per-point attributes; the entire dataset is visualized by drawing each pathway in the collection using a graphics API such as OpenGL."]} diff --git a/edge/graph_17100266.jsonl b/edge/graph_17100266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c149e8f5be5752935b77640d97872229b08254e --- /dev/null +++ b/edge/graph_17100266.jsonl @@ -0,0 +1 @@ +{"14278660|41035405": []} diff --git a/edge/graph_17104560.jsonl b/edge/graph_17104560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d15cda5dc0f3fe3e18f48e9b80d4d7c0ae896a2 --- /dev/null +++ b/edge/graph_17104560.jsonl @@ -0,0 +1 @@ +{"6367149|206051485": ["Proper registration techniques can suppress large and complex geometric distortions (usually just up to a small betweenimage shift)."]} diff --git a/edge/graph_171088248.jsonl b/edge/graph_171088248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17109970.jsonl b/edge/graph_17109970.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b8d08617a8eef155eee565290e68a44351c4055 --- /dev/null +++ b/edge/graph_17109970.jsonl @@ -0,0 +1 @@ +{"1760740|36610012": []} diff --git a/edge/graph_17113548.jsonl b/edge/graph_17113548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70fd710df4994cf09702036cc1fca83dd018394b --- /dev/null +++ b/edge/graph_17113548.jsonl @@ -0,0 +1,2 @@ +{"16740502|12280702": []} +{"6574886|12280702": ["2) For step k, k is its support length, and k measures the support's distance from the origin, somewhat analogously to polar coordinates; see [8, 20] for motivation and further details.", ", Figures 6 and 17 in [20]), while simultaneously preserving the uniformity of fUng (see Lemma 2 in [19]).", "An extensive overview of TES processes and the corresponding modeling methodology appears in [20], and a more condensed version in [21].", "These are discussed in some detail in references [19, 8, 20]."]} diff --git a/edge/graph_17113841.jsonl b/edge/graph_17113841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17114506.jsonl b/edge/graph_17114506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07e8e1bc4922d94924cb7985e7f1c3103ca5b66f --- /dev/null +++ b/edge/graph_17114506.jsonl @@ -0,0 +1,14 @@ +{"117790|7439310": []} +{"2359106|7439310": ["Examples of techniques include layered source coding, classified bit streams, combined source-channel coding, FEC, ARQ, error concealment, and combinations of the above [1]."]} +{"32442795|7439310": ["classified into spatial- and temporal-domain approaches [3], [4].", "In addition to the obvious scalable benefits, layered coding with transport prioritization is the most popular and effective scheme for facilitating error resilience in a video transport system [3].", "from packet loss rely on the decoder alone to perform error concealment through post-processing [3]."]} +{"15511043|7439310": ["With the rapid growth of the Internet and wireless networks, video transmission over lossy environments has become an important issue [1]."]} +{"15726249|7439310": []} +{"7200100|17428811": []} +{"7200100|7439310": []} +{"1408385|7439310": []} +{"16786990|7439310": ["In recent years, numerous error-concealment schemes have been proposed in the literature (refer to [60] for a good", "However, most error-concealment techniques discussed in [60] are only applicable to either ATM or wireless environments, and require substantial additional computation complexity, which is acceptable for decoding still images but not tolerable in decoding real-time video.", "Since human eyes can tolerate a certain degree of distortion in video signals, error concealment is a viable technique to handle packet loss [60]."]} +{"16786990|10559330": [", integrated services [6], [11], [42], [65] or differentiated services [2], [27], [35])."]} +{"12132121|7439310": ["Fortunately, the standardization of higher bandwidth networks, such as the universal mobile telecommunications system (UMTS) [1], [2], is well underway, and, together with continued progress in video\nManuscript received January 27, 1998; revised March 11, 1998.", "Nevertheless, residual transmission errors cannot be avoided with a mobile radio channel, even when FEC and ARQ are combined.", "We discuss these measures and the interframe propagation of the remaining picture impairment in this section."]} +{"2436898|17428811": ["The server encodes the video stream into multiple layers [7], [8]."]} +{"2436898|7439310": [", the residual loss rate, is kept below a certain value [2]\u2013[4]."]} +{"61990592|7439310": []} diff --git a/edge/graph_17119557.jsonl b/edge/graph_17119557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17119567.jsonl b/edge/graph_17119567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17120461.jsonl b/edge/graph_17120461.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17123336.jsonl b/edge/graph_17123336.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e76594f719c329dd94406d4da566ebf82c5dc17 --- /dev/null +++ b/edge/graph_17123336.jsonl @@ -0,0 +1,10 @@ +{"12197270|15273230": ["Discovering classification knowledge from imbalanced data received much research interest in recent years [2,4,11].", "Here we discuss only focused re-sampling methods, as they are most related to our approach and further experiments \u2013 for reviews see [2,11].", "Receiver Operating Characteristics curve and the area under this curve are also often used to summarize performance of a classifier [2].", "SMOTE was also used in combination with ensemble classifiers as SMOTEBoost [2]."]} +{"29779442|15273230": ["For instance, SMOTEBoost is an integration of SMOTE with classical AdaBoost to focus successive classifiers on the minority class [10].", "The quality of the classifier performance is reflected by the area under a ROC curve (so called AUC measure) [10, 37, 38]."]} +{"9591832|1097238": ["Diversity in classi \ufb01 er ensembles, that is, being composed of different classi \ufb01 ers giving different outputs, is crucial and has been widely studied in the literature [8,52]."]} +{"22903588|5835346": ["Dietterich, in 1998 ([6], [7]) indicates that the use of an ensemble of classifiers could achieve better recognition rates that those obtained through a singular classifier when:"]} +{"14752169|15273230": ["2In the paper introducing original version of SMOTE [3] it was expressed in percentage, e.", "Learning from imbalanced data has received growing research interest in the last decade and several specialized methods have been proposed (see [2], [3] for a review)."]} +{"8750466|15273230": ["In some real-life problems, the distribution of examples in classes is highly imbalanced, which means that one of the classes (further called a minority class) includes much smaller number of examples than the other majority classes [1,3].", "This problem has been intensively researched in the last decade and several methods have been proposed (see [1,3] for a review)."]} +{"3042872|3330313": []} +{"3042872|15273230": ["Learning algorithms that do not consider class-imbalance tend to be overwhelmed by the major class and ignore the minor one (Chawla, 2005)."]} +{"18164904|15224686": ["Some references are Liu et al. (2006); Thomas et al. (2006); Sun et al. (2007); Khoshgoftaar et al. (2007, 2011); Fernandez et al. (2012)."]} +{"124477902|7561567": []} diff --git a/edge/graph_17133134.jsonl b/edge/graph_17133134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00221737a5412ef98716772e88191bbfef8b240b --- /dev/null +++ b/edge/graph_17133134.jsonl @@ -0,0 +1,10 @@ +{"6780768|1230643": ["A large number of sensors can be distributed in mass by scattering them from airplanes, rockets, or missiles [1].", "A wireless sensor network (WSN) consists of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [1]."]} +{"17332078|8767649": []} +{"8061430|4491892": ["This leads to a crucial property: SIS with resampling can produce reasonable statistics only for systems that \u201cexponentially forget\u2019\u2019 their past [8] (i."]} +{"7793417|7360895": []} +{"17408580|8767649": [", [35] presented a taxonomy of multi-robot systems and address some multi-robot system studies in their taxonomy."]} +{"499112|1230643": [", self-healing property), which is cr ucial for operating in dynamic, uncertain environments [1].", "SENSOR networks have recently received significant attention in the areas of networking [1], embedded systems, pervasive computing, and multi-agent systems [2] due to its wide array of real-world applications (e."]} +{"16129066|6607209": ["More sophisticated methods try to coordinate the different robots so that they do not tend to move toward the same frontier cell [2, 3]."]} +{"1009884|1230643": ["Due to the inextricable relation with the physical world, the proper deployment of sensors is very important for the successful completion of the sensing tasks issued [5], [6], [ 7 ]."]} +{"53376522|17516538": []} +{"12104564|7788290": ["Many examples of people tracking have used cameras as their primary sensor [19, 26], however laser rangefinders have also been used [52]."]} diff --git a/edge/graph_17133230.jsonl b/edge/graph_17133230.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fcc126804426ce4eda9519e041496ab15b6ea2dd --- /dev/null +++ b/edge/graph_17133230.jsonl @@ -0,0 +1,12 @@ +{"60655395|239537": []} +{"566909|10500613": ["Rahm and Bernstein [ 15 ] overview a variety of approaches to schema mapping, and, in particular, algorithms for generating automatic mappings.", "As it is impossible to fully automate a mapping correspondence determination process [ 15 ], users interactively accept, reject or defer suggested correspondences.", "This computes a function that works out the \u201cLevenshtein distance\u201d between two names, which is the number of edit operations needed to convert one name into another: the smaller the distance, the closer the match [ 15 ]."]} +{"1517555|10500613": ["Previously, Rahm and Bernstein surveyed schema matching in databases [18]."]} +{"1517555|913718": ["To further validate our approach, we aligned three sets of ontologies provided by the Ontology Alignment Evaluation Initiative (OAEI) [19].", "The state of the art of ontology and schema alignment methodologies was recently surveyed by Shvaiko and Euzenat [19].", "The Ontology Alignment Evaluation Initiative (OAEI) [19] intends to provide such a method of comparison."]} +{"1889771|239537": []} +{"11690957|239537": []} +{"1195231|10500613": []} +{"939014|239537": []} +{"13169021|10500613": ["To reduce the manual effort required, many techniques and prototypes have been developed to semi-automatically solve the match problem [6], [11]."]} +{"15969817|10500613": ["The survey [10] focuses on the database schema matching approaches, while [11] reuses this classification for ontology matching.", "Many surveys about ontology and schema matching have been proposed in literature [9], [10], [11]."]} +{"15969817|913718": ["The survey [10] focuses on the database schema matching approaches, while [11] reuses this classification for ontology matching.", "Many surveys about ontology and schema matching have been proposed in literature [9], [10], [11]."]} +{"14206074|14171067": ["Bille [3] surveyed the problem of comparing labeled trees based on simple local operations of deleting, inserting, and relabeling nodes."]} diff --git a/edge/graph_17137472.jsonl b/edge/graph_17137472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_171394882.jsonl b/edge/graph_171394882.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e922b19972a51b3cb311209e07e9cebb7c413c27 --- /dev/null +++ b/edge/graph_171394882.jsonl @@ -0,0 +1,4 @@ +{"86471628|12092129": []} +{"8529355|508912": ["Let us first revisit a well-known classification of adaptive EAs [23], [24] (see Fig."]} +{"54473556|9316331": ["Because the game rules are known (even if stochastic) and all information is available to all players, it is possible to use strong theoretical guarantees from Monte-Carlo Tree Search (Browne et al., 2012) about bounded regret in order to produce such an operator.", "So at least within the scope of strategies implied by the (\ufb01xed) rules of such games, networks coupled with Monte-Carlo Tree Search are capable of discovering more complexity than they are directly provided."]} +{"84186827|33583074": ["(2013) [26] identifies eleven characteristics of fitness, which make them more or less difficult to solve."]} diff --git a/edge/graph_17139869.jsonl b/edge/graph_17139869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a76eb66dee628a1490484daa047cd267e7fd463 --- /dev/null +++ b/edge/graph_17139869.jsonl @@ -0,0 +1 @@ +{"15237611|17003768": []} diff --git a/edge/graph_17149897.jsonl b/edge/graph_17149897.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_171538993.jsonl b/edge/graph_171538993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17157304.jsonl b/edge/graph_17157304.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7255b548c450eec1ffbe6a65fa43e93420819b1 --- /dev/null +++ b/edge/graph_17157304.jsonl @@ -0,0 +1 @@ +{"7430704|7839197": ["But beyond basic prototypes, user agents still present many problems before they can be actually implemented for users to use in every day tasks (Nwana, 1995; Wooldridge and Jennings, 1995)."]} diff --git a/edge/graph_17165859.jsonl b/edge/graph_17165859.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b491ceed9f1f1c5cc667a8e90d09465819e4f817 --- /dev/null +++ b/edge/graph_17165859.jsonl @@ -0,0 +1,17 @@ +{"2443662|206583375": ["Although accurate dedicated localization systems have been proposed [1], they are expensive, require customized hardware and calibration and thus are unsuitable for widespread implementation."]} +{"42886751|13372227": ["To use the triangulation technique, it is required to measure the angle or distance between a reference point and a mobile terminal, and there are several methods to measure for this purpose such as, angle of arrival (AOA), time of arrival (TOA), time difference of arrival (TDOA), and received signal strength intensity (RSSI) [11], [12]."]} +{"36520730|206583375": ["[1]\u2013[4] Until now there is still no standard for indoor positioning system due to several challenges:"]} +{"111032533|206583375": ["\u2026indoor localization systems (ILSs) based on IR, Ultrasound, RFID, WLAN, Bluetooth, and UWB have been proposed, but these systems have limitations such as the necessity of additional infrastructure, low accuracy, noises, electromagnetic interference, multi-path effects, low security, and etc [5, 6]."]} +{"40528904|18148591": ["MIMO techniques are largely used in radio communications [40], where scattering and interference create channels decor-"]} +{"109397421|7365537": []} +{"9417644|6972141": ["A comprehensive survey of older works can be found in DeSouza and Kak [2]."]} +{"43879184|206583375": ["Hence, investigations toward a new positioning technology that meets accurate ranging requirements are necessary and ongoing [1]."]} +{"2403411|206583375": ["A lot of positioning techniques using GPS, IR, RFID, Ultrasound, Bluetooth, Wifi [1,2] have been researched but there is no standard method for indoor positioning like using GPS in outdoor positioning systems."]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"2393401|206583375": ["Radio frequency (RF) signals are also used along with ultrasonic signals for synchronization [7], which make these systems more computationally complex."]} +{"631795|6972141": ["Since this represents a weaker constraint on the region, the size of the region can only increase, yielding a smaller number of larger regions covering the environment."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"482057|206583375": ["Hence, searching for a new positioning technology that meets all the requirements is necessary and is ongoing in various fields [1-2]."]} +{"17001832|206583375": []} +{"123196592|206583375": ["The conventional positioning techniques have usually the difficulties due to the problems such as a positioning estimation error, a high cost of system infrastructure, and a limited service area [3]."]} diff --git a/edge/graph_17166133.jsonl b/edge/graph_17166133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9789647323546b6cd796b9523f69adab7df39d14 --- /dev/null +++ b/edge/graph_17166133.jsonl @@ -0,0 +1 @@ +{"18781224|13872322": []} diff --git a/graph_1716644.jsonl b/edge/graph_1716644.jsonl similarity index 100% rename from graph_1716644.jsonl rename to edge/graph_1716644.jsonl diff --git a/edge/graph_17172098.jsonl b/edge/graph_17172098.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55360daadcd00ca0546c743f29fe6c59701be42f --- /dev/null +++ b/edge/graph_17172098.jsonl @@ -0,0 +1 @@ +{"12905100|192934": ["The reduction in the feature space avoids many problems related to high dimensional feature spaces, such as the \u201ccurse of dimensionality\u201d problem [33], where the indexing structures degrade and the significance of each feature decreases, making the process of storing, indexing and classifying extremely time consuming.", "A large number of classifier combinations have been proposed in the literature [33].", "The advantage of this architecture is the high efficiency and flexibility in exploiting the discriminant power of different types of features [33].", "A large number of studies have shown that classifier combination can improve recognition accuracy [33]."]} diff --git a/graph_1717286.jsonl b/edge/graph_1717286.jsonl similarity index 100% rename from graph_1717286.jsonl rename to edge/graph_1717286.jsonl diff --git a/edge/graph_17174103.jsonl b/edge/graph_17174103.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20611754f002f9be704a63d5d61008a2dd03deac --- /dev/null +++ b/edge/graph_17174103.jsonl @@ -0,0 +1 @@ +{"18058808|60455": ["It is mainly approached from the text analysis of the HTML documents through WWW[1] [2] [3] [4].", "Mining on WWW is classified into three areas, (l)Web usage mining, (2)Web structure mining and (3) Web content mining.", "It is mainly approached from the text analysis of the HTML documents through WWW[1-4]."]} diff --git a/edge/graph_17174108.jsonl b/edge/graph_17174108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17174635.jsonl b/edge/graph_17174635.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f95b1300bfc812d292110a2b3649b62c31b012a --- /dev/null +++ b/edge/graph_17174635.jsonl @@ -0,0 +1,2 @@ +{"4626096|5473785": []} +{"207172599|3330313": []} diff --git a/edge/graph_17176546.jsonl b/edge/graph_17176546.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17177287.jsonl b/edge/graph_17177287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0478821d5383137bbcc2e99b97a2401b3ca7137 --- /dev/null +++ b/edge/graph_17177287.jsonl @@ -0,0 +1 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_17177918.jsonl b/edge/graph_17177918.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17183431.jsonl b/edge/graph_17183431.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88adabbaf178d1ec9dbebb3cbc1bb6d35396a5dc --- /dev/null +++ b/edge/graph_17183431.jsonl @@ -0,0 +1,7 @@ +{"206390197|17183431": []} +{"6299618|14697846": ["for P2P computing [41, 10 ], then one could think of relying on such a virtual space for tuple propagation."]} +{"6299618|16352922": ["Computing is becoming intrinsically pervasive and mobile [46, 22]."]} +{"14808659|1230643": ["The Wireless Sensor Network component of our test bed represents a subset of Wireless Mesh Networks [20].", "The focus application areas of our research are classified according to these categories, as follows: envision a decentralized communication system consisting of Wireless Mesh Networks [8] that operate on node-based architectures with emergent management capabilities.", "Wireless Sensor Network component of our test bed represents a subset of Wireless Mesh Networks [20]."]} +{"16947838|7839197": [", either of Franklin and Graesser (1997) or Nwana (1996). Also, why did we introduce two di\u0080erent schemes of classi\u00aecation in the two parts of this paper? To answer the \u00aerst part of this question: the Franklin\u00b1Graesser taxonomy has been a general, rather philosophical attempt to structure the \u00aeeld."]} +{"1024220|14441987": []} +{"7671770|12715779": ["Humans are very powerful devices in themselves and \u2013 in several cases \u2013 have sensing, actuating, and computing capabilities that go well beyond those available (now and in the near future) with ICT devices [20]."]} diff --git a/edge/graph_17195518.jsonl b/edge/graph_17195518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..312c553850b36bf09b9e807c5b234225ca226fd4 --- /dev/null +++ b/edge/graph_17195518.jsonl @@ -0,0 +1,2 @@ +{"1076010|1176034": ["Moreover, many business to scientific applications which serve mainly to support diagnosis and predict future behaviors effectively deal with temporal sequences [31], encouraging the development of the related \u201ctime-series mining\u201d research field.", "Time-series mining is an active field of research (see [2, 31] for overviews of temporal data mining)."]} +{"207172599|3330313": []} diff --git a/edge/graph_17202214.jsonl b/edge/graph_17202214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17205659.jsonl b/edge/graph_17205659.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0910c55b95e94d0e80cdda937b8b3cf14f3ca8bc --- /dev/null +++ b/edge/graph_17205659.jsonl @@ -0,0 +1,6 @@ +{"13962444|1230643": ["Key Distribution Mechanisms for Wireless Sensor\nNetworks: a Survey\nSEYIT A. C\u0327AMTEPE and BU\u0308LENT YENER\nRensselaer Polytechnic Institute\nAdvances in technology introduce new application areas for sensor networks.", "Sensors are inexpensive, low-power devices which have limited resources [Akyildiz et al. 2002]."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"1100811|14441987": ["In the field of ad hoc wireless networking [Broch98, Royer99 ], previous work on secure routing employs public key cryptography to perform authentication ([Kong01, NAI, Papadimitratos02b, Zhou99, Zhang98])."]} +{"14351892|1230643": ["works [2],in which a large number of sensor nodes collaborate to monitor certain environment."]} +{"14655853|2835258": ["Among the proposed packet forwarding schemes based on the individual node position, some main categories can be identified [6].", "A completely different geographic routing category uses restricted directional flooding [6].", "In contrast to generic MANETs, where mostly topology-based routing protocols are being developed, many of the VANET projects use position-based routing mechanisms [6] for establishing connectivity between vehicles."]} +{"14410720|14441987": []} diff --git a/edge/graph_17206258.jsonl b/edge/graph_17206258.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c55889030a2d2305e6b7a3175612b19cd5d8fb6 --- /dev/null +++ b/edge/graph_17206258.jsonl @@ -0,0 +1,17 @@ +{"27353195|2835258": []} +{"17697881|1230643": ["However, nodes in MANETs have several restrictions such as limited coverage area, limited lifetime, memory, and cost [1]."]} +{"998551|1236072": ["Many articles in the literature [1-3] address the typical challenges of sensor networks: (1) resource constraints such as limited processing speed, communication bandwidth and supply of energy, and (2) routing challenges due to the dense deployment of sensor nodes either deterministically or randomly distributed."]} +{"207443163|1230643": ["However, nodes in MANETs have several restrictions such as limited coverage area, limited lifetime, memory, and cost (Akyildiz et al. 2002)."]} +{"1570182|2835258": ["[35] Martin Mauve, Jorg Widmer, and Hannes Harenstein, \u201cA survey on position-based routing in mobile ad hoc networks,\u201dIEEE Network Magazine, vol. 15, no. 6, pp. 30\u201339, 2001.", "For the review of the state of the art of routing protocols, see surveys by Royer and Toh [33], by Ramanathan and Steenstrup [34], and by Mauve, Widmer and Harenstein [35].", "strup [34], and by Mauve, Widmer and Harenstein [35]."]} +{"1570182|14441987": ["One of the key challenges in the design ofad hocnetworks is the development of dynamic routing protocols that can efficiently find routes between two communication nodes."]} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} +{"6551378|1236072": ["To send a bit over 10 or 100 m distance, sensor nodes consume energy that can perform thousands to millions of arithmetic operations [4]."]} +{"7091368|763939": ["mobility models [33,37] and for tactical mobile networks [4]."]} +{"6438719|14441987": []} +{"18908270|14441987": []} +{"18908270|1762301": []} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"1360344|17402408": []} +{"17175796|2835258": ["This paper shows that mobility can affect the accuracy of hop count based distance estimation."]} +{"14649691|2835258": ["Vehicular Ad-Hoc networks (V ANet) [1] significantly differs from Mobile ad hoc networks (MANet) [ 2 ], since the vehicle nodes have higher mobility than mobile nodes."]} diff --git a/graph_1720774.jsonl b/edge/graph_1720774.jsonl similarity index 100% rename from graph_1720774.jsonl rename to edge/graph_1720774.jsonl diff --git a/edge/graph_17220234.jsonl b/edge/graph_17220234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17221751.jsonl b/edge/graph_17221751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ad208ae5e81d2b805e68578da456be79bcfb231 --- /dev/null +++ b/edge/graph_17221751.jsonl @@ -0,0 +1,30 @@ +{"9219829|6857179": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"41741618|6857179": ["Dimensional and continuous recognition or prediction of emotions is a relatively unexplored area in the field of affective computing, with the first workshop organized on this topic only recently [15]."]} +{"2685973|6857179": []} +{"18544245|14288295": []} +{"18544245|9045232": []} +{"6600989|14303607": ["Interested readers may refer to [11, 21, 32] for more complete surveys of AU detection methods."]} +{"2026284|205131192": []} +{"58731|5401262": []} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"2397089|5401262": ["pervasive computing, ambient intelligence, human computing) will need to develop human-centred user interfaces that respond readily to naturally occurring, multi-modal, human communication [24]."]} +{"18011207|9045232": ["This template is learned from a set of sample images; for example, estimating the distribution or manifold defining the appearance (pixel map) of the object [31]."]} +{"3329621|2355696": ["It involves computer vision, machine learning and behavioral sciences, and can be used for many applications such as security [20], human-computer-interaction [ 23 ], driver safety [24], and health-care [17]."]} +{"30604231|9045232": []} +{"15748780|3241708": ["[27] and another by Quinn and Bederson [18] present a general overview of the topics on crowdsourcing and human computation."]} +{"15748780|5401262": ["Overview of our approach for crowdsourcing micro-level video annotations, with a focus on our new \ninterface, called OCTAB, and evaluation procedure for multimodal behavior annotations, called MM-Eval."]} +{"15748780|51338": ["Although there are quite a number of software for making annotations on videos [3], such full-fledged tools are not suitable to be used for crowdsourcing due to a relatively steep learning curve and the", "Integrability (with Amazon Mechanical Turk) Popular annotation software applications like ELAN or ANVIL [3] allow annotators to make sophisticated annotations on video and audio files, but they are not suitable for the purpose of crowdsourcing.", "Integrability \n(with Amazon Mechanical Turk) Popular annotation software applications like ELAN or ANVIL [3] allow annotators \nto make sophisticated annotations on video and audio files, but they are not suitable for the purpose \nof crowdsourcing."]} +{"11034879|5401262": ["This resulted from the need to develop automatic and, in some cases, real-time human centered interfaces, where the face plays a crucial role [4, 5]."]} +{"9488382|1118130": ["Social Signal Processing addresses all verbal and non-verbal communicative signalling during social interactions, be they of an affective nature or not [27]."]} +{"3511972|2355696": []} +{"2301292|1118130": ["prototypical expressions of emotions [5,4,6,7]."]} +{"15570523|14303607": ["In computer vision, automated AU detection has become an active area of research [2, 6, 19, 27, 28, 31, 39] with a wide range of applications,\nTask 1: Frame detection\nTask 2: Segment detection\nTask 3: Transition detection\n...\nonset offset\nCascade of Tasks (CoT)\nGround truth Frame detection\nGround\u2026"]} +{"9901162|6857179": ["happiness, sadness) are suitable to model posed affective behaviour, they are limited in terms of describing naturalistic affective states of daily life [11]."]} +{"9901162|2355696": ["1 Introduction Affect recognition is a fundamental building block for personal robotics, novel humancomputer interfaces and a variety of assistive technologies in healthcare [10, 37]."]} +{"10451129|14288295": []} +{"12663702|6857179": []} +{"12663702|2355696": []} +{"1324483|6857179": ["A recent emerging trend in affective computing is the adoption of real-valued, continuous dimensional emotion descriptions for learning tasks [1]."]} +{"14646458|5401262": ["In addition, it is still an open question how to learn the grammars in defining dynamic features, and handle ambiguities in the input data [14]."]} +{"1969798|5401262": ["Detailed surveys of previous work can be found in [6][7][8][9][1][10]."]} diff --git a/graph_1722293.jsonl b/edge/graph_1722293.jsonl similarity index 100% rename from graph_1722293.jsonl rename to edge/graph_1722293.jsonl diff --git a/edge/graph_17225137.jsonl b/edge/graph_17225137.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f553dd2b340eefbf467607b744473e4f58798f54 --- /dev/null +++ b/edge/graph_17225137.jsonl @@ -0,0 +1,8 @@ +{"15415502|3732796": ["Some other forensic techniques can be obtained in [7, 8]."]} +{"1577073|3732796": ["Some other forgery detection techniques can be found in [6]."]} +{"5789620|2877147": ["For interlaced video, we show that the motion between fields of a single frame and across fields of neighboring frames should be equal."]} +{"16122360|3732796": ["Recently a number of forgery detecting techniques for images without watermarking have been studied [14]."]} +{"10299788|9415965": ["In the last years, Video Forensics has emerged as a discipline aiming at investigating the processing history of DVs in a blind fashion [1]."]} +{"113533|8785789": []} +{"11285357|9415965": []} +{"24193397|9415965": ["However, the reports about video forensics are relatively fewer [10]."]} diff --git a/edge/graph_17233496.jsonl b/edge/graph_17233496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17233734.jsonl b/edge/graph_17233734.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9dead14f802f8476b2b239c787e3cdcd82d637c --- /dev/null +++ b/edge/graph_17233734.jsonl @@ -0,0 +1,9 @@ +{"39283051|30579357": []} +{"26953688|30579357": []} +{"122786149|30579357": []} +{"42059623|30579357": []} +{"123497774|30579357": []} +{"1873231|30579357": []} +{"10486098|30579357": []} +{"33917139|30579357": []} +{"517554|30579357": []} diff --git a/edge/graph_17234703.jsonl b/edge/graph_17234703.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17242214.jsonl b/edge/graph_17242214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3922e6976a1dba98f69513f924cf52cf9eeccfea --- /dev/null +++ b/edge/graph_17242214.jsonl @@ -0,0 +1,7 @@ +{"15551235|3540699": []} +{"20545291|3540699": []} +{"46149173|3540699": ["It uses a combination of novel advanced coding technologies based on the mature hybrid block-based coding framework and achieves up to 50% coding gains compared with MPEG-2 standard [ 2 ]."]} +{"9402474|3540699": ["264 or AVC (Advanced Video Coding), is a new digital video codec standard which achieves a very high compression efficiency [1] compared to earlier standards."]} +{"11166284|3540699": ["264/AVC [1-2] has significantly improved video compression performance and its network friendliness, compared to the existing standards such as MPEG-2 [3], and H.", "264/AVC, two statistical coding methods are supported: Exp-Golomb coding and CAVLC [2]."]} +{"6539923|3540699": ["It has been proved that H.264/ AVC provides a 50% bit rate saving for equivalent perceptual quality relative to the performance of prior standards [ 10 , 11]."]} +{"25579316|3540699": ["264/AVC video coding standard provides a significant compression gain over previous standards [1].", "Normalization is performed by shifting so that \u2019s value is always in [1, 2)."]} diff --git a/edge/graph_17245028.jsonl b/edge/graph_17245028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1724544.jsonl b/edge/graph_1724544.jsonl similarity index 100% rename from graph_1724544.jsonl rename to edge/graph_1724544.jsonl diff --git a/edge/graph_17247398.jsonl b/edge/graph_17247398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbc63fa580ef78048ac2fc36b39b7c085f1a341e --- /dev/null +++ b/edge/graph_17247398.jsonl @@ -0,0 +1 @@ +{"195702173|14441987": ["A review of current routing protocols can be found in [21].", "In on-demand routing [17, 18, 21], a node floods the network to discover a path when it initiates communication to another node and then caches the path for later use."]} diff --git a/edge/graph_17248887.jsonl b/edge/graph_17248887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17252389.jsonl b/edge/graph_17252389.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0224c1889a0134016e014071db39f89f4acbb71a --- /dev/null +++ b/edge/graph_17252389.jsonl @@ -0,0 +1,12 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"14568616|11608263": []} +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} +{"2329405|387610": ["Extracted saliency maps are widely used in many computer vision applications including objectof-interest image segmentation [13, 18], object recognition [25], adaptive compression of images [6], contentaware image editing [28, 33, 30, 9], and image retrieval [4]."]} +{"1192198|1029120": ["Gandhi and Trivedi [20] focus on the pedestrian protection application in the intelligent vehicle domain."]} +{"1192198|192934": ["multilayer neural networks [33] implement linear discriminant functions in the feature space in which input patterns have been mapped nonlinearly, e.", ", mean squared error [33]."]} +{"1192198|7788290": ["The authors of [ 21 ], [47], [57] cover methods for people detection, body pose estimation, and activity recognition.", "At this point, we omit discussion of complex 3D human shape models [ 21 ] and focus on 2D pedestrian shape models that are commonly learned from shape contour examples."]} +{"12299303|14970359": ["A short summary of di\ufb00erent approaches with evaluation and error metrics employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [8] and [19]."]} +{"12299303|7788290": ["A short summary of different approaches with evaluation and error metrics employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [ 8 ] and [19]."]} +{"47405606|60779308": ["The length ratio is defined as the ratio of distance between \u00ed \u00b5\u00ed\u00b1\u009d and \u00ed \u00b5\u00ed\u00b1\u009e and distance between \u00ed \u00b5\u00ed\u00b1\u009d \u2032 and \u00ed \u00b5\u00ed\u00b1\u009e \u2032 :", "Use compact hashing (e.g., PCA hashing (PCH) or SPICA hashing [9] ) instead of random hash functions like Locality Sensitive Hashing (LSH) [5]."]} diff --git a/edge/graph_17253721.jsonl b/edge/graph_17253721.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2fa86ead30fe4d5a502e9adf214169fe34dd9fe2 --- /dev/null +++ b/edge/graph_17253721.jsonl @@ -0,0 +1,24 @@ +{"15793054|30815820": []} +{"7555898|15117557": ["Rafols and Meyer (2010) elaborated this measure as one among three different operationalizations of \u201cinterdisciplinarity\u201d (Leydesdorff & Rafols, 2011; Wagner et al., 2011)."]} +{"14941407|28609491": ["Examples abound for organisms which differ greatly in the size, scale and individual motility at which the networks emerge (for example patterns in bacterial communication networks [6], plant leaf stomata dynamics [20], fungal mycelium growth [13], dynamic communication networks in insects [7] and vasculogenesis in human blood transport networks [5])."]} +{"1118130|2355696": ["An attitude is a set of beliefs, evaluations, social emotions , social dispositions, tendencies to act, that together determine (and are determined by) preferences and intentions [13].", "Social Signal Processing (SSP) [13] is the new, emerging domain addressing such a challenge by providing computers with social intelligence [14], the facet of our cognitive abilities that guides us through our everyday social interactions, whether these require us to be a respected colleague on the workplace, a careful parent at home, a leader in our community, or simply a person others like to have around in a moment of relaxation.", "An important collaborative effort towards the collection of resources useful for research in social signal processing is being done by the European project titled Social Signal Processing Network of Excellence (SSPNet).", "The survey considers as well the application domains where SSP has played, or is likely to play, a major role (see Section 5).", "Hence, SSP is about W5+.", "\u2026a relation between two (or more) persons that have common or related goals, that is, in which the pursuit, achievement, or thwarting of a goal of one of these persons determines or is determined in some way by the pursuit, achievement, or thwarting of a goal of the other involved person [13], [71].", "However, the collection of appropriate SSP corpora faces three main problems:", "Social Signal Processing (SSP) [13] is the new, emerging domain addressing such a challenge by providing computers with social intelligence [14], the facet of our cognitive abilities that guides us through our everyday social interactions, whether these require us to be a respected colleague on the\u2026", "It is therefore not surprising that some of the most successful works in SSP so far use features extracted from multiple modalities (for an extensive overview of the past works, see [13]).", "This is the aspect of the problem most specific to SSP and the rest of this section focuses on it.", "Most SSP works revolve around these questions and involve a tight, multidisciplinary collaboration between human sciences (psychology, anthropology, sociology, etc.) on one hand, and computing sciences (computer vision, speech analysis and synthesis, machine learning, signal processing, etc.) on the other hand.", "A relatively large number of databases is available for SSP purposes (see [86] for an extensive survey of this aspect).", "Social interaction is a simple or complex event in which an agent A performs some social actions addressed at another agent that is actually or virtually present [13].", "This article is the first survey of SSP that includes the three major aspects of the domain (and the most important challenges they involve), namely modeling, analysis and synthesis of nonverbal behaviour in social interactions ."]} +{"1118130|5401262": []} +{"1118130|8777381": ["\u2026concept); in Ethology, a cue is any feature of the world or property of an organism that influences an animal's behaviour [44]; in Psychology, a trait or state works as an indicator, encompassing single cues, that once received as a percept is attributed information through a decoding process [45]."]} +{"1118130|9045232": []} +{"122907607|7064380": []} +{"15751455|9045232": []} +{"1208168|14697846": []} +{"3190150|12715779": ["The centerpiece of this vision is the idea of Human Computation which relies on systems that makes use of human abilities for computation to solve problems that are trivial for humans, but complex for machines [7].", "[7] give a survey on various human computational systems, defining the categories and their characteristics.", "According to [7], other examples of distributed human computation can be found in some anti-spam mechanisms (e.", "However, there are some studies that analyze and categorize specific aspects of related topics such as human computation [7][8] and knowledge acquiring systems [9]."]} +{"62373059|6952653": []} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"206745338|13372227": []} +{"10393627|17323154": ["A recent review of this relatively large body of literature is given in [Carpineto et al. 2009]."]} +{"2003896|2355696": []} +{"2003896|20905429": []} +{"2003896|1118130": ["This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the anticipated stress level is within healthy boundaries.", "This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the\u2026"]} +{"14261802|29395800": ["In a survey about semantic-based approaches, Mangold (2007) provides an overview of the different types of adaptation that can be applied to user queries.", "5 In a survey about semantic-based approaches, Mangold (2007) provides an overview of the different types of adaptation that can be applied to user queries."]} +{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]} +{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"9351953|24817150": []} diff --git a/edge/graph_17254670.jsonl b/edge/graph_17254670.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2cb9422b1185a8773785572e242191357a426d18 --- /dev/null +++ b/edge/graph_17254670.jsonl @@ -0,0 +1 @@ +{"3970190|15782139": ["Handwriting recognition systems use a multitude of techniques and approaches, including neural networks, hidden Markov models, and model matching [24, 20].", "Most relevant to the current work are those methods used in pen-gesture recognition [13, 17] or handwriting recognition [24, 20].", "Decades of research and development effort have been invested in handwriting recognition technology [20, 24], resulting in increasingly practical commercial systems such as Graffiti for Palm OS, Jot for Pocket PC, and the handwriting recognition built into the Microsoft Windows Tablet PCs."]} diff --git a/edge/graph_17258048.jsonl b/edge/graph_17258048.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f73bbd1b8eba53fe3d4b32d8a812fa0e186f0cec --- /dev/null +++ b/edge/graph_17258048.jsonl @@ -0,0 +1 @@ +{"6954302|9005398": []} diff --git a/edge/graph_17262196.jsonl b/edge/graph_17262196.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..031ab10c8f3c37746104f7e88b2e4634e9c569c1 --- /dev/null +++ b/edge/graph_17262196.jsonl @@ -0,0 +1,9 @@ +{"799455|12029139": ["Generally, in the context of IoT, wireless sensor networks (WSNs) and radio-frequency identification (RFID) tags, wireless energy sources can be classified into two categories [6]: 1) Dedicated source : Dedicated RF sources are deployed to provide a predictable energy supply to the device.", "Relay techniques utilized by 5G can benefit wireless/RF energy harvesting [6]."]} +{"799455|12060835": ["Thus, energy harvesting is a promising approach for the emerging IoT [4]."]} +{"15523822|6974127": [", [38\u201350]."]} +{"15523822|7971188": ["The use of back-end servers have a crucial role in combatting the various scalability and reliability issues found in pure peer-to-peer and ad-hoc -type systems [62\u201364]."]} +{"15523822|14697846": ["The use of back-end servers have a crucial role in combatting the various scalability and reliability issues found in pure peer-to-peer and ad-hoc -type systems [62\u201364]."]} +{"11347711|1230643": ["[37] do not have any explicit discussion on adding semantics to the data."]} +{"10641690|39174599": ["SI is the quality of a system in which the collective behaviours of the naive agents that are interacting locally with their environment will lead to a coherent functional global pattern (Kumar and Thakur, 2012)."]} +{"10641690|25929315": ["Laya et al. (2013) suggested that the M2M devices organise themselves locally with the aid of short-range radio technologies such as Body Area Networks (BAN), Wi-Fi and WSN, creating an M2M area network.", "Laya et al. (2013) observed that the random access channels of LTE and LTE-A networks are prone to congestions in M2M cases."]} +{"9255870|7278743": ["Bluetooth LE has been designed for ultralow-power applications, yet keeping similarities with classic Bluetooth [6]."]} diff --git a/edge/graph_17262824.jsonl b/edge/graph_17262824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..814828c8daea9a37c3c95db03365d74dfa71fce8 --- /dev/null +++ b/edge/graph_17262824.jsonl @@ -0,0 +1,3 @@ +{"17578456|9045232": []} +{"12119248|15782139": ["online and offline handwritten recognition is given in [6]."]} +{"205015030|6746689": ["(6) contour profiles; (7) zoning; (8) geometric moment invariants;"]} diff --git a/edge/graph_17267830.jsonl b/edge/graph_17267830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20d38d4d1e525b9eaf451cd4ccc314154ce87863 --- /dev/null +++ b/edge/graph_17267830.jsonl @@ -0,0 +1 @@ +{"23990242|50458504": ["Thus, a sophisticated correlation of data of different sources and methods is a requirement for an EWS [32]."]} diff --git a/edge/graph_17270313.jsonl b/edge/graph_17270313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72efb1bc925ee6b1ac9700b00bb7551f64e71864 --- /dev/null +++ b/edge/graph_17270313.jsonl @@ -0,0 +1,2 @@ +{"16520917|3102110": []} +{"3489319|3102110": ["This feature is very interesting since unsupervised classication is another important problem in data mining [ 6 ] and in machine learning."]} diff --git a/edge/graph_17276201.jsonl b/edge/graph_17276201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6414ed72ab54442329ac3fa90567ae62927ad8ea --- /dev/null +++ b/edge/graph_17276201.jsonl @@ -0,0 +1,2 @@ +{"6838728|15033413": ["One year later, [3] presents another review"]} +{"7100288|205131192": ["Another strand of research has focussed on moment invariants for greyvalue intensity patterns under di erent types of geometric and / or photometric changes [1, 4, 8, 10, 15, 16, 19]."]} diff --git a/edge/graph_17279511.jsonl b/edge/graph_17279511.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..782fcfa678b05fd52014027d479067ce59eb69ca --- /dev/null +++ b/edge/graph_17279511.jsonl @@ -0,0 +1 @@ +{"801752|1230643": []} diff --git a/graph_1728079.jsonl b/edge/graph_1728079.jsonl similarity index 100% rename from graph_1728079.jsonl rename to edge/graph_1728079.jsonl diff --git a/graph_1728336.jsonl b/edge/graph_1728336.jsonl similarity index 100% rename from graph_1728336.jsonl rename to edge/graph_1728336.jsonl diff --git a/edge/graph_17283639.jsonl b/edge/graph_17283639.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17287266.jsonl b/edge/graph_17287266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17290408.jsonl b/edge/graph_17290408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17292349.jsonl b/edge/graph_17292349.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6bc08f36f386783c2b1757707edab0e828323df --- /dev/null +++ b/edge/graph_17292349.jsonl @@ -0,0 +1,7 @@ +{"2728683|14022070": ["Furthermore t-way combinatorial testing is a proven NP-complete [Nie and Leung 2011; \nTai and Lie 2002] problem, and current solutions [Lei et al. 2008; Nie and Leung 2011; Tai and Lie 2002] \nonly approximate a minimum spanning array.", "Furthermore t-way combinatorial testing is a proven NP-complete [Nie and Leung 2011; Tai and Lie 2002] problem, and current solutions [Lei et al. 2008; Nie and Leung 2011; Tai and Lie 2002] only approximate a minimum spanning array.", "Furthermore t-way combinatorial testing is a proven NP-complete [Nie and Leung 2011; Tai and Lie 2002] problem, and current solutions [Lei et al."]} +{"53244963|880321": ["The reader is referred to [9] for more details."]} +{"623729|14920988": ["A second thread of related work targets improvements to the performance, scalability, and applicability of symbolic execution More specifically, many efforts have studied how to reduce, guide, and enrich the space explored by symbolic execution [14]."]} +{"14121127|8250043": ["While service unit testing is usually well researched [7]\u2013 [10] and consistently deployed in practice, other testing activities pose several new challenges [11], [12].", "Section VI describes our plans on investing some more research in the area and Section VII concludes the paper."]} +{"930443|7923260": []} +{"427517|14920988": ["Note that this paper is not meant to provide a comprehensive survey of symbolic execution techniques; such surveys can be found elsewhere [19, 44, 49]."]} +{"15954853|191396": ["For example, NW values can be in any range and, except for symmetry, does not feature any other well-known property of distance/similarity measures [8]."]} diff --git a/edge/graph_17300331.jsonl b/edge/graph_17300331.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17307264.jsonl b/edge/graph_17307264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17307323.jsonl b/edge/graph_17307323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17309146.jsonl b/edge/graph_17309146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38e0096b38c695b43b9e5dfd66b64bf52a8420fb --- /dev/null +++ b/edge/graph_17309146.jsonl @@ -0,0 +1 @@ +{"207084071|7193476": []} diff --git a/edge/graph_17316118.jsonl b/edge/graph_17316118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_173188052.jsonl b/edge/graph_173188052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53bb861aca68de0618370f439633c6d4e3d67918 --- /dev/null +++ b/edge/graph_173188052.jsonl @@ -0,0 +1,6 @@ +{"44853183|18567112": []} +{"7555361|12692482": ["The most popular techniques used for the detection of malwares are signature matching, heuristics based detection, malware normalization, machine learning, etc [24].", "On the basis of how variants are generated in malware, second generation malwares are further classified into Encrypted, Oligormorphic, Polymorphic and Metamorphic Malwares [24]."]} +{"7555361|10996225": ["In recent years, machine learning techniques are studied by many authors and proposed different approaches [4] [11] [19], which can supplement traditional anti-malware system (signature matching)."]} +{"3540363|12692482": ["Static and dynamic analysis are the two main approaches applied for detection of android malware [28].", "It appears that so far proposed approaches are not suffice to detect the advanced malware to limit/prevent the damages [28]."]} +{"92996248|12692482": ["But, it appears that the proposed methods are not good enough to effectively detect the advanced malware [21] in the fast-growing internet and Android based smart devices usage into our daily life."]} +{"18567112|6670217": ["art considering the popular mobile OS platforms [31], [32]."]} diff --git a/edge/graph_17319303.jsonl b/edge/graph_17319303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17320709.jsonl b/edge/graph_17320709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64a6955def556d670082431175afe94135fb5d5e --- /dev/null +++ b/edge/graph_17320709.jsonl @@ -0,0 +1 @@ +{"62530326|17718674": []} diff --git a/edge/graph_17323154.jsonl b/edge/graph_17323154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a8dc2cbbbc1c25cfdfec486beb7096b63f69de7 --- /dev/null +++ b/edge/graph_17323154.jsonl @@ -0,0 +1,5 @@ +{"9917397|239537": ["As pointed out by many authors (see, for example, [14], [15], [16]), the following goals should be taken into account in the design of a graph visualization paradigm: ."]} +{"14205872|239537": []} +{"62655828|17323154": []} +{"942629|192934": []} +{"17242305|192934": ["Further theoretical study based on information theory can be found on (Koller & Sahami, 1996) and complete reviews can be found on (Blum & Langley, 1997; Jain et al., 2000; Yang & Pedersen, 1997)."]} diff --git a/edge/graph_17324089.jsonl b/edge/graph_17324089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17324444.jsonl b/edge/graph_17324444.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dcdbdc8cab373feec56db899a6f1608145274df1 --- /dev/null +++ b/edge/graph_17324444.jsonl @@ -0,0 +1,2 @@ +{"5189808|17324444": []} +{"16322562|17718674": []} diff --git a/edge/graph_17325804.jsonl b/edge/graph_17325804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbf9b7f8c5af9bf129cf84ee0aacfa47988f9f17 --- /dev/null +++ b/edge/graph_17325804.jsonl @@ -0,0 +1,6 @@ +{"9250150|13372227": ["2 For a more complete description of these different techniques, see, e.g. [ 8 ]\u2013[10], and the references therein."]} +{"58589431|164835": []} +{"2136255|13372227": ["Various wireless location schemes which have been extensively investigated [1]\u2013[3] can be classified to two categories: 1) time based location, where the time of arrival (TOA) or the time difference of arrival (TDOA) of the incoming signals is measured and 2) angle based location, where the angle\u2026"]} +{"8813362|13372227": ["In the United States, the Federal Communications Commission (FCC) has mandated cellular system operators to estimate the position of an emergency caller with error of less than 100 meters in the Enhanced 911 (E-911) service [1]."]} +{"14132192|164835": []} +{"47197744|164835": ["Moreover, by analogy with FCC requirements [18], the CDF of the location error has been used as the performance measure of the system."]} diff --git a/edge/graph_17326575.jsonl b/edge/graph_17326575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17329705.jsonl b/edge/graph_17329705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17332374.jsonl b/edge/graph_17332374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a4f44d522927ea298f04003eb19e37a348cfc5b --- /dev/null +++ b/edge/graph_17332374.jsonl @@ -0,0 +1,11 @@ +{"950593|1236072": ["There has been a large number of one-to-one, single-path routing protocols proposed for wireless ad-hoc networks in the recent years [3]."]} +{"206446574|1230643": []} +{"1100811|14441987": ["In the field of ad hoc wireless networking [Broch98, Royer99 ], previous work on secure routing employs public key cryptography to perform authentication ([Kong01, NAI, Papadimitratos02b, Zhou99, Zhang98])."]} +{"28628245|15199849": ["As WSNs are deployed in hostile environment, it is susceptible to many physical attacks such as node destruction, node replacement, node replication, battery replacement, or reprogramming of node with malicious code [12, 13]."]} +{"28628245|7889189": ["In WSN, the multihop route from source to destination is vulnerable to many active and passive attacks [17, 18]."]} +{"6391459|1236072": ["\u2026agent also monitors packets which are addressed directly to the node, although developing a lightweight detection technique for every existent protocol is out of scope of this paper because of large number of protocols and packet formats present in the literature (e.g., routing algorithms [17])."]} +{"6391459|1230643": []} +{"18574760|1940388": []} +{"7170677|2181694": ["In fact, in spite of the presence of some partial works like [15], [79], [81], [85], till this date there have not been any survey paper that collects all the significant IDSs and gives overviews of those works in terms of the underlying techniques they use along with important observations and obtained results."]} +{"7170677|7774517": ["In fact, in spite of the presence of some partial works like [15], [79], [81], [85], till this date there have not been any survey paper that collects all the significant IDSs and gives overviews of those works in terms of the underlying techniques they use along with important observations and obtained results."]} +{"7170677|17205659": ["The node replication [30], [31], [88] Add extra node to the network with the same cryptographic secrets Neglect and greed [70] Deny transmission of legitimate packets and give higher priority to own packets", "HELLO flood [32] Flood with HELLO packets Unfairness [70] Unfair resource allocation on MAC protocols", "most vulnerable to this type of attack [70].", "5) Unfairness: This attack is a weaker form of DoS attack located in the link layer.", "Note that providing fairness in WSNs is often viewed as a separate research issue [70]."]} diff --git a/edge/graph_17336376.jsonl b/edge/graph_17336376.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6126e06731d3d2743c44448db8ee9291be17b0ba --- /dev/null +++ b/edge/graph_17336376.jsonl @@ -0,0 +1,12 @@ +{"36120651|205286988": ["A sensor network consists of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [1-5].", "In the recent past the research community mostly paid attention to issues of sensor networks, such as energy efficient routing issues, security and reliable transmission and data aggregation[1-2]."]} +{"137495|1236072": ["For one time queries (or long aggfreqs), the directed diffusion approach is not very efficient, since gradients have to be set up for queries which use the path only once [1]; in such cases CDR is used."]} +{"38152747|1230643": ["A large number of challenging applications ranging from creating smart environments to embedded agile systems are being contemplated that involve a massive random deployment of sensors, numbering in the tens of thousands or even millions [2,9,13,19,25,28,37].", "These protocols are typically used to organize the network into several clusters [2,3,6,7,21,32,33] or to construct a spanning tree [12,16,18,21,42] infrastructure for data collection and delivery."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"6750932|1236072": []} +{"6750932|1230643": ["Such systems are being developed for a vast array of applications ranging from monitoring environmental phenomena, monitoring animals, location and tracking of targets, and emergency rescue [2, 8]."]} +{"8536143|205286988": []} +{"5720819|10559330": []} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"203668282|270804": ["As for transport protocols they can be divided into congestion control and reliability guarantee [4], with the last one divided into upstream and downstream."]} diff --git a/edge/graph_17339050.jsonl b/edge/graph_17339050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea1725c4a6e3441dc2ac77b91501409f5a040e09 --- /dev/null +++ b/edge/graph_17339050.jsonl @@ -0,0 +1 @@ +{"12957288|6415369": []} diff --git a/edge/graph_17345638.jsonl b/edge/graph_17345638.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17346817.jsonl b/edge/graph_17346817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..652467ade6c1cf75dc771d4dc559b0960154d959 --- /dev/null +++ b/edge/graph_17346817.jsonl @@ -0,0 +1,6 @@ +{"122523543|33286487": []} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"6216470|9020157": []} +{"1336452|710141": []} +{"1232567|6137971": ["The bandlet transform, [19, 25], uses an adaptive scheme to approximate an image."]} +{"206764581|6137971": []} diff --git a/graph_1734833.jsonl b/edge/graph_1734833.jsonl similarity index 100% rename from graph_1734833.jsonl rename to edge/graph_1734833.jsonl diff --git a/edge/graph_17351726.jsonl b/edge/graph_17351726.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5da3199da584af3f4d03e33f2ddda70b9a00967 --- /dev/null +++ b/edge/graph_17351726.jsonl @@ -0,0 +1 @@ +{"7634598|18454590": ["A complete survey about this subject can be found in [20]."]} diff --git a/edge/graph_1735702.jsonl b/edge/graph_1735702.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17361480.jsonl b/edge/graph_17361480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17365575.jsonl b/edge/graph_17365575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17366742.jsonl b/edge/graph_17366742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfecb7c5b9d59fc37313f556193a38b821ea9387 --- /dev/null +++ b/edge/graph_17366742.jsonl @@ -0,0 +1,2 @@ +{"648324|2635807": []} +{"34057027|17366742": ["General (p, q, s)-Helly hypergraphs were characterized in [6]."]} diff --git a/edge/graph_17367221.jsonl b/edge/graph_17367221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17370399.jsonl b/edge/graph_17370399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17373041.jsonl b/edge/graph_17373041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17374870.jsonl b/edge/graph_17374870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5173c46a03914a4393b61d9fc9d2ef8db7955420 --- /dev/null +++ b/edge/graph_17374870.jsonl @@ -0,0 +1 @@ +{"17182026|16525678": ["Right now people mainly get the global traffic information by cameras [3] and micro-wave sensors [4], but they cannot get the accurate information of every single vehicle."]} diff --git a/edge/graph_17379362.jsonl b/edge/graph_17379362.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..354c473e6a62f173d63e968c9b59e0f307b72eb4 --- /dev/null +++ b/edge/graph_17379362.jsonl @@ -0,0 +1 @@ +{"15462784|1762301": ["Such protocols generally attempt to use reactive and proactive routing under one protocol framework, albeit in different scenarios, which exploit their strength and hence can result in a higher levels of scalability [8]."]} diff --git a/edge/graph_17381201.jsonl b/edge/graph_17381201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17381365.jsonl b/edge/graph_17381365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17381415.jsonl b/edge/graph_17381415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17383371.jsonl b/edge/graph_17383371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2baf1515183854b22423b0904dfb3cb8d2e5b4dd --- /dev/null +++ b/edge/graph_17383371.jsonl @@ -0,0 +1,4 @@ +{"18039574|8530790": []} +{"15346765|8530790": []} +{"59711015|8530790": []} +{"26211096|8530790": ["It uses also the concept of Pareto dominance to provide the Optimal Pareto Set of non-dominated solutions [ 9 ].", "Fitness sharing [ 9 ][10] is one of the most used parameter-based techniques in MOEA."]} diff --git a/edge/graph_17387157.jsonl b/edge/graph_17387157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17388653.jsonl b/edge/graph_17388653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17391432.jsonl b/edge/graph_17391432.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d1f0fa45550726d52ad655f0004e6e5a3639fc9 --- /dev/null +++ b/edge/graph_17391432.jsonl @@ -0,0 +1 @@ +{"6952873|6486398": ["1 implies that C is irreducible besides column-stochastic, so that \u03c3 is in fact the unique Perron-Frobenius eigenvector of C (see, for example, [23], p."]} diff --git a/edge/graph_17393937.jsonl b/edge/graph_17393937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17394093.jsonl b/edge/graph_17394093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a20b0640df2db5187202c290dfb3a71325b2653a --- /dev/null +++ b/edge/graph_17394093.jsonl @@ -0,0 +1,6 @@ +{"206921073|8436865": ["41 The workflow changes that result \u2014 which include the need to continuously interact with the system, shifting of roles among providers, and creation of work-arounds to avert problems with the system \u2014 have been implicated in the high-profile abandonment of some systems after implementation, 42\u2026"]} +{"42055725|9180844": ["In biology and medicine, DLs have increasingly been used, from projects GALEN and GALEN-in-use [82,15], over the SNOMED variants CT and RT [59] to the OBO Foundry ontologies [40]."]} +{"14021598|7494281": []} +{"7494281|207014621": ["Some studies pro-pose critical factors for adopting electronic health records, but they do not recommend the elements for supporting their adoption by automatic means [15,18]."]} +{"7494281|184678": ["Fifty four studies determined user attitudes towards systems as a critical factor for adopting electronic health records [4,5,11,15,22,24-70,87,89].", "User attitude towards information systems 24 [5,15,22,24-42,66,67] 13 [43-50,68-70,87,89] 7 [51-57] 2 [58,59] 8 [4,11,60-65]", "Twenty four descriptive studies defined user attitude (interest, perceived usefulness, and motivation in working with it) towards these systems as a significant factor contributing to the user acceptance [5,15,22,24-42,66,67].", "[36] System quality, information quality, user satisfaction, individual impact."]} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} diff --git a/edge/graph_17394722.jsonl b/edge/graph_17394722.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17396440.jsonl b/edge/graph_17396440.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17396515.jsonl b/edge/graph_17396515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..925f19ed9e47ebeb86714071277ecffecd003c43 --- /dev/null +++ b/edge/graph_17396515.jsonl @@ -0,0 +1,2 @@ +{"24416856|15744805": ["A survey on this topic has been provided (36)."]} +{"16815557|397187": []} diff --git a/edge/graph_17397315.jsonl b/edge/graph_17397315.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7dc9013d779fff78e8312b8498f2b15e6de0e78a --- /dev/null +++ b/edge/graph_17397315.jsonl @@ -0,0 +1,14 @@ +{"47178135|386036": ["[12] is a recent survey on this topic."]} +{"52865894|16052126": []} +{"13894565|10346685": ["Private Information Retrieval: Private Information Retrieval (and similarly oblivious transfer and oblivious RAM) has received a lot of attention [9, 13, 19, 22, 29, 32, 33, 35].", "Those optimizations as well as amortization techniques discussed by Ostrovsky and Skeith [33] are out of scope.", "In general, any of the \u201ctraditional\u201d PIR techniques based on group homomorphic encryption [29, 33] is suited for use within PRISM."]} +{"15592556|2082499": []} +{"21644355|18212759": ["Many other surveys of cloud computing are available (e.g., [8\u201310]) with more breadth but much less technical detail on the application of MapReduce to multimedia computations."]} +{"41231463|12017064": []} +{"11477596|3042864": ["The aforementioned limitations served as motivation for a new computing paradigm called MCC that enhances the abilities of mobile devices by moving the storage and compute intensive tasks of mobile to the cloud [56,82]."]} +{"11477596|13210924": ["The resources are provided to the users and released based on demands from the pool of shared resources [4].", "The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]."]} +{"11477596|13916820": []} +{"11477596|12017064": ["The security solutions have also been presented in [71].", "[71] reviewed the security issues at different levels of cloud computing."]} +{"53917475|2294541": []} +{"6108634|17397315": ["Details of security and privacy concerns in MapReduce may be found in [10]."]} +{"16226203|16052126": ["Techniques for MapReduce-based join evaluation are proposed in [5,6,17, 32].", "The interested reader may find in [23] a survey of NoSQL systems, while [32,73] cover MapReduce variations and other massively parallel data management frameworks."]} +{"11217311|191396": ["See [158] for a survey."]} diff --git a/edge/graph_173990595.jsonl b/edge/graph_173990595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..185b458839fe7eebafb03ca573bd686931edd489 --- /dev/null +++ b/edge/graph_173990595.jsonl @@ -0,0 +1,20 @@ +{"3147007|6337591": ["This dialogue literature thus widely applies reinforcement learning (Walker, 2000; Schatzmann et al., 2006; Gasic et al., 2013b; Singh et al., 1999; Singh et al., 2000; Singh et al., 2002) to train dialogue policies."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"16946362|42645": []} +{"16946362|1770055": ["Our discussion will be brief, since image captioning has recently been the subject of an extensive review by Bernardi et al. (2016), and has also been discussed against the background of broader issues in research on the visionlanguage interface by Barnard (2016).", "\u2026et al., 2007; Cahill & Josef, 2006; Espinosa et al., 2010; Belz et al., 2011) and occasionally also to evaluate short texts characteristic of data-driven systems in domains such as weather reporting (e.g. Reiter & Belz, 2009; Konstas & Lapata, 2013) and image captioning (see Bernardi et al., 2016).", "Similar to the model of Biber (1988), personality is here given a multidimensional definition, via the classic \u2018Big 5\u2019 model (e.", "An important precedent for this view is Biber\u2019s corpus-based multidimensional approach to style and register variation (Biber, 1988), roughly a contemporary of the grammar-inspired approach of DiMarco and Hirst (1993). Biber\u2019s model was at the heart of work by Paiva and Evans (2005), which exhibits some characteristics in common with the \u2018global\u2019 statistical approaches to nlg discussed in Section 3.", "In the ms-coco Evaluation Challenge, some systems outperformed a human-human upper bound when compared to reference texts using automatic metrics, but no system reached this level in an evaluation based on human judgements (see Bernardi et al., 2016, for further discussion).", "In their recent review Bernardi et al. (2016) note a similar issue in image captioning system evaluation.", "A detailed overview of datasets is provided by Bernardi et al. (2016). Ferraro et al. (2015) offer a systematic comparison of datasets for both caption generation and visual question answering with an accompanying online resource.", "Our discussion will be brief, since image captioning has recently been the subject of an extensive review by Bernardi et al. (2016), and has also been discussed against the background of broader issues in research on the vision-", "A detailed overview of datasets is provided by Bernardi et al. (2016). Ferraro et al.", "A detailed overview of datasets is provided by Bernardi et al. (2016), while Ferraro et al. (2015) offer a systematic comparison of datasets for both caption generation and visual question answering with an accompanying online resource6.", "Since performance depends on the coverage and accuracy of detectors (Kuznetsova et al., 2014; Bernardi et al., 2016), some work has also explored generation from gold standard image annotations (Elliott & Keller, 2013; Wang & Gaizauskas, 2015; Muscat & Belz, 2015) or artificially created scenes in\u2026", "Since performance depends on the coverage and accuracy of detectors (Kuznetsova et al., 2014; Bernardi et al., 2016), some work has also explored generation from gold standard image annotations (Elliott & Keller, 2013; Wang & Gaizauskas, 2015; Muscat & Belz, 2015) or artificially created scenes in which the components are known in advance (Ortiz et al."]} +{"16946362|7983519": ["In a human evaluation, Midge was shown to outperform both the system by Kulkarni et al. (2011) and Yang et al. (2011) on a number of criteria, including humanlikeness and correctness.", "In a human evaluation, Midge was shown to outperform both the system by Kulkarni et al. (2011) and Yang et al."]} +{"16946362|12068725": ["\u2026a few endeavours to enhance the variety of linguistic expressions used in virtual environments (e.g., Orkin & Roy, 2007), nlg technology is relatively unrepresented in research on games, despite significant progress on dynamic content generation in game environments (e.g., Togelius et al., 2011)."]} +{"7356547|6337591": ["Previous works in this direction mainly focus on either rule-based or learning-based methods (Williams and Young, 2007; Schatzmann et al., 2006; Misu et al., 2012; Litman et al., 2000)."]} +{"13550936|7983519": []} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"68167178|5523008": ["(Chen et al., 2017a) reviewed popular deep neural network models for dialogue, focusing only on supervised learning approaches.", "This tutorial expands the scope of (Chen et al., 2017a) and (Serban et al."]} +{"68167178|1708582": ["t learning that is most relevant to the discussions in later chapters. For a comprehensive survey, interested readers are referred to excellent textbooks and reviews, such as Sutton and Barto (2018); Kaelbling et al. (1996); Bertsekas and Tsitsiklis (1996); Szepesvari (2010); Wiering and van Otterlo (2012); Li (2019).\u00b4 2.3.1 Foundations Reinforcement learning is a learning paradigm where an intelligent agent learns to m"]} +{"68167178|6337591": ["non-static user goals during the conversations, among others. Here, we highlight two dimensions, and refer interested users to a survey for further details on creating and evaluating user simulators (Schatzmann et al., 2006): Along the granularity dimension, the user simulator can operate either at the dialogue-act level (also known as intention level), or at the utterance level (Jung et al., 2009). Along the methodolo"]} +{"13141934|7983519": ["This has been an eminently successful approach, as documented e.g. in the overview article of Krahmer and van Deemter (2012) and a variety of recent shared tasks involving RE generation (Gatt and Belz, 2010; Belz et al., 2008; Koller et al., 2010)."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} diff --git a/edge/graph_173991036.jsonl b/edge/graph_173991036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bec2fc17c4657fbe636edbca42854073c20b6cec --- /dev/null +++ b/edge/graph_173991036.jsonl @@ -0,0 +1,12 @@ +{"6753050|1995121": ["Our approach is related to model predictive control (MPC), as argued by the authors of [35].", "According to [35], the MPC method is a type of rollout algorithm (an approximation method to solve Markov decision processes (MDPs) and POMDPs) with a particular base policy, where the stability property of MPC is a special case of the cost improvement property of rollout algorithms that employ a sequentially improving base policy."]} +{"14129892|4491892": ["This finite-sample approximate analysis is also complemented with the asymptotic MSE performance of SMC-PF as the number of particles grows large to establish that the MMSE is indeed attained asymptotically; see also [9] and [26]."]} +{"7358842|4491892": ["This approximates over intervals in , with convergence results given in [31]."]} +{"107269420|1230643": ["1, a sensor network is composed of a large number of sensor nodes that are densely deployed either inside the region where the phenomenon is taking place or very close to it [2]."]} +{"51881266|1686572": ["In this paper, we focus on one particular class of security attacks, known as the Byzantine data attack [79], [80] (also referred to as the data falsification attack)."]} +{"51881266|16888186": []} +{"5048966|1230643": [", receiver and transmitter) is the dominant factor among all the power consumption components [14]."]} +{"14854105|8363289": []} +{"1090575|8363289": []} +{"1800812|1230643": ["The sensor nodes are usually scattered in a sensor field [2], [5], [20].", "The protocol stack used by the sink and all sensor nodes combines power and routing awareness, integrates data with networking protocols, communicates power efficiently through the wireless medium, and promotes cooperative efforts of sensor nodes [1], [2], [9], [13], [22].", "To fulfill requirements of collaborative [13] and low-power consumption [2], [13], localized algorithms become attractive since only a subset of nodes in the network are invoked for a specific task [9], [13], [14], [21], [22], [24].", "Such technology can revolutionize information gathering and processing in many application areas, such as health, military, and security [1], [2], [5].", "RECENT advances in processor, memory and radio technology have enabled small and cheap nodes capable of wireless communication and significant computation [1], [2], [5], [20]."]} +{"52158639|24856837": ["For example, CI cannot be used straightforwardly in such scenarios where several sensors track a number of objects or even a single object whose dynamical and observation models vary randomly in time [20]."]} +{"15476826|1932843": ["However, RL often suffers from the curse of dimensionality when applied on robots with a high Degree of Freedom (DoF) [3], [4], [5]."]} diff --git a/edge/graph_173991065.jsonl b/edge/graph_173991065.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6280998454cfbf53b3ffdbf9d6d2683b8f37a85f --- /dev/null +++ b/edge/graph_173991065.jsonl @@ -0,0 +1,82 @@ +{"5575228|17403085": []} +{"53428422|21418": []} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"202660787|173991065": ["nerable to malicious attacks such as trojaning attack [227] and poisoning attack [228]. Hence, security countermeasures to remedy these vulnerabilities are expected. The recent advances in blockchain [229] may help to improve the security of big data analytics. VIII. FUTURE RESEARCH DIRECTIONS Table VIII summarizes the solutions to challenges in big data analytics for large scale wireless networks in t"]} +{"202660787|52336302": []} +{"202660787|49527603": []} +{"202660787|3645740": []} +{"202660787|10235514": ["tion of mobile communication systems. For example, the downlink data rate of a wireless device in the 5G mobile networks is greater than 20 Gbps, which is about 100 times of that in 4G mobile systems [17]. This shift also exhibits in the wide diversity of data types (e.g., 4k video streams, high \ufb01delity audio, RAW pictures, heart rate, spatial and temporal data in 5G mobile networks). Note that the da"]} +{"202660787|3273340": ["Recently, deep learning architectures have received extensive attention [190]."]} +{"202660787|31245252": ["ctions for BDA of wireless networks However, it is still challenging to enforce the privacypreserved operations in data storage [241], especially when data storage service is offered by a third party [242]. Mobile Edge Computing (MEC) [243] can essentially offer a solution to the privacy-preservation in data storage by of\ufb02oading the data from the untrusted third party to the trusted MEC server (deploye"]} +{"202660787|6909107": ["Mobile Edge Computing (MEC) [243] can essentially offer a solution to the privacy-preservation in data storage by offloading the data from the untrusted third party to the trusted MEC server (deployed in proximity to the user)."]} +{"202660787|3649200": []} +{"202660787|3423198": []} +{"202660787|4427557": ["ransferring the data to another sensor node or a sink. There are a number of wireless communication technologies proposed to support the data communications of WSNs including Bluetooth, IEEE 802.15.4 [46], etc. Data sources of WSNs have similar features to the aforementioned networks including a wide range of data types (including temperature, light, pressure and speed), various physical dimensions an"]} +{"202660787|3126100": []} +{"202660787|38911919": []} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"69511851|3757239": ["2876298 by computation-intensive applications, thus resulting in bottlenecks and making it challenging for the vehicles to ensure the required level of quality of service (QoS) [1], [2].", "Mobile edge computing (MEC) can alleviate the need of heavy computation from the vehicles, yet enable such applications by providing computation capabilities at the edge of the radio access network and in close proximity to mobile users [1]\u2013[4]."]} +{"69511851|6909107": []} +{"69511851|206578365": ["2876298 by computation-intensive applications, thus resulting in bottlenecks and making it challenging for the vehicles to ensure the required level of quality of service (QoS) [1], [2]."]} +{"195832739|3645740": ["Artificial intelligence (AI) is a promising technique to address such challenges and can assist in complex resource allocation [11]."]} +{"51961148|3757239": ["By moving the network functions and resources closer to the end users, i.e., the network edge, many bene\ufb01ts can be obtained, such as high data rates, low delay, improved energy ef\ufb01ciency, and \ufb02exible network deployment and management [1]."]} +{"51961148|61132": ["An extensive survey of UAV communication networks can be found in [8]."]} +{"86850570|49527603": ["In order to ensure that all management hubs are trusted, some consensus algorithms must be applied to the architecture, such as Proof of Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT), etc. [19]."]} +{"86850570|2521001": ["requirements: confidentiality, integrity, and availability (CIA), which can be referred to as the CIA requirement [26]."]} +{"51612715|925507": []} +{"32711727|2535224": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"86808679|18750590": ["In [18], Luong et al. proposed a comprehensive literature survey of pricing-based incentive mechanisms for resource allocation in cloud-enabled wireless networks."]} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"46894900|36400013": ["Past studies have suggested different approaches to this problem and concluded that the most efficient solution consists of a distributed network of trusted validators [2]."]} +{"70292548|3450996": ["downlink offloading technologies of mobile data is provided in [10]."]} +{"70292548|21418": ["a surjective relationship between SE and EE [6], such that EE increases in SE up to a threshold value."]} +{"70292548|5385031": ["Furthermore, a logarithmic function has been widely used for describing utility for user equipment [12], [30], [31] and for wireless sensor network [32]\u2013[34]."]} +{"198310479|173991065": ["onal complexity and high energy consumption shall be developed for MIoT in the future. Blockchain, featured with security and reliability, can potentially improve the security and reliability of MIoT [81]. Privacy preservation and security assurance in data preprocessing and storage. After data acquisition, MIoT data will be preprocessed and stored locally (at servers of factories or other departmen"]} +{"198310479|3126100": []} +{"198310479|7158350": ["Typical Machine learning algorithms include support vector machines (SVMs) [50], naive Bayes [51], Decision tree learning [52], k-Nearest Neighbors (k-NN) [53], hidden Markov model, Bayesian networks [54], neural networks [55], Ensemble methods [56], k-means [57], singular value decomposition (SVD), Principal Component Analysis (PCA) [58] and reinforcement learning algorithms such as Qlearning [52]."]} +{"49474917|49527603": []} +{"206456796|27262729": ["This consensus mechanism guarantees the security and dependability of blockchain systems [4], [5].", "The core point to guarantee transaction integrity and validity in blockchain is a computational process defined as mining [4], [5]."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"34330359|28628245": ["There raise a number of security threats in IoT, especially inWNoT, where the conventional security countermeasures used in wired networks may not work well in WNoT due to the following inherent constraints of WNoT: (i) the wireless medium is open for any nodes [15]; (ii) it is extremely difficult to deploy centralized control mechanisms in such distributed WNoT [2, 16, 17]."]} +{"34330359|5747564": ["The typical killer applications of IoT include the logistic management with RFID technology [3], environmental monitoring with wireless sensor networks [4], smart homes [5], e-health [6], smart grids [7], Maritime Industry [8], and so forth."]} +{"34330359|4395259": ["An alternate approach is either to design light-weighted encryption schemes [34] or to generate noise to limit the amount of information that can be extracted by an eavesdropper [35, 36]."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"171096642|51935081": ["Since forming blockchain requires a mining task, that is, proof-of-work (PoW), which demands both heavy computation resources and energy, it is hard to widely facilitate blockchain in a wireless network [5]."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"6634488|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [93], [94], [95]."]} +{"56178064|49574823": ["As for the underlying transaction model, the framework supports an UTXO model for financial transactions and a smart contract for the spatiotemporal activity log of a patient [21].", "Sidechains, off-chains, and altchains are assumed to be loosely coupled with the chain and will not be part of a main blockchain consensus mechanism within the permissioned consensus mechanisms in the proposed private or public shared blockchain ledger system to support scalability and avoid latency problems [21].", "A bridge among different therapy applications running on different types of blockchain models can be maintained to support altchains [21].", "While reading or querying the file, the patient has to first authenticate with the private key to obtain the hash of the distributed file pointers and then acquire the actual file by providing the distributed hash to the cloud controller [21].", "A comprehensive survey on blockchain for IoT applications can be found in [21]."]} +{"56178064|4880047": ["In addition to security and privacy, aMECnode can be used in tandem with other scalability solutions, such as 5G interIoT node and IoT-to-MEC node communication [20], [25]."]} +{"56178064|3434731": []} +{"207063673|14077778": ["Input A public key Q xQ yQ associated with valid domain parameters q FR a b G n h Output Acceptance or rejection of the validity of Q\nCheck that Q O Check that xQ and yQ are properly represented elements of Fq i e integers in the interval\np in the case q p and bit strings of length m bits in the case q m Check that Q lies on the elliptic curve de ned by a and b\nCheck that nQ O If any check fails then Q is invalid otherwise Q is valid\nProof of Possession of a Private Key\nIf an entity C is able to certify A s public key Q as its own public key then C can claim that A s signed messages originated from C To avoid this the CA should require all entities A to prove possession of the private keys corresponding to its public keys before the CA certi es the public key as belonging to A This proof of possession can be accomplished by a variety of means for example by requiring A to sign a message of the CA s choice or by using zero knowledge techniques see Chaum Evertse and van de Graaf Note that proof of possession of a private key provides di erent assurances from public key validation The former demonstrates possession of a private key even though it may correspond to an invalid public key while the latter demonstrates validity of a public key but not ownership of the corresponding private key Doing both provides a high level of assurance\nECDSA Signature Generation and Veri cation\nThis section describes the procedures for generating and verifying signatures using the ECDSA\nECDSA Signature Generation To sign a message m an entity A with domain parameters D q FR a b G n h and associated key pair d Q does the following\nSelect a random or pseudorandom integer k k n Compute kG x y and r x mod n If r then go to step\nCompute k mod n\nCompute e SHA m\nCompute s k e dr mod n If s then go to step\nA s signature for the message m is r s\nECDSA Signature Verification To verify A s signature r s on m B obtains an authen tic copy of A s domain parameters D q FR a b G n h and associated public key Q It is recommended that B also validates D and Q see x and x B then does the following Verify that r and s are integers in the interval n Compute e SHA m\nCompute w s mod n\nCompute u ew mod n and u rw mod n\nCompute X u G u Q If X O then reject the signature Otherwise compute v x mod n where X x y\nAccept the signature if and only if v r\nProof that Signature Verification Works If a signature r s on a message m was indeed generated by A then s k e dr mod n Rearranging gives\nk s e dr s e s rd we wrd u u d mod n\nThus u G u Q u u d G kG and so v r as required\nConversion Between Data Types ANSI X speci es a method for converting eld elements to integers This is used to convert the eld element x to an integer in step of signature generation and step of signature veri cation prior to computing x mod n ANSI X also speci es a method for converting bit strings to integers This is used to convert the output e of SHA to an integer prior to its use in the modular computation in step of signature generation and step of signature veri cation\nPublic Key Certificates Before verifying A s signature on a message B needs to obtain an authentic copy of A s domain parameters D and associated public key Q ANSI X does not specify a mechanism for achieving this In practice authentic public keys are most commonly distributed via certi cates A s public key certi cate should include a string of information that uniquely identi es A such as A s name and address her domain parameters D if these are not already known from context her public key Q and a certifying authority s CA s signature over this information B can then use his authentic copy of the CA s public key to verify A s certi cate thereby obtaining an authentic copy of A s static public key\nRationale for Checks on r and s in Signature Verification Step of signature veri cation checks that r and s are integers in the interval n These checks can be performed very e ciently and are prudent measures in light of known attacks on related ElGamal signature schemes which do not perform these checks for example of such attacks see Bleichenbacher The following is a plausible attack on ECDSA if the check r and more generally r mod n is not performed Suppose that A is using the elliptic curve y x ax b over Fp\nwhere b is a quadratic residue modulo p and suppose that A uses a base point G p b of prime order n It is plausible that all entities may select a base point with x coordinate in order\nto minimize the size of domain parameters An adversary can now forge A s signature on any message m of its choice by computing e SHA m It can easily be checked that r s e is a valid signature for m\nComparing DSA and ECDSA Conceptually the ECDSA is simply obtained from the DSA by replacing the subgroup of order q of Z p generated by g with the subgroup of points on an elliptic curve that are generated by G The only signi cant di erence between ECDSA and DSA is in the generation of r The DSA does this by taking the random element X gk mod p and reducing it modulo q thus obtaining an integer in the interval q The ECDSA generates r in the interval n by taking the x coordinate of the random point kG and reducing it modulo n\nSecurity Considerations\nThe security objective of ECDSA is to be existentially unforgeable against a chosen message attack The goal of an adversary who launches such an attack against a legitimate entity A is to obtain a valid signature on a single message m after having obtained A s signature on a collection of messages not including m of the adversary s choice\nECDSA has not been proven to be existentially unforgeable against chosen message attack\nHowever slight variants of DSA and hence also slight variants of ECDSA have been proven secure by Pointcheval and Stern under the assumptions that the discrete logarithm problem is hard and that the hash function employed is a random function\nThe possible attacks on ECDSA can be classi ed as follows\nAttacks on the elliptic curve discrete logarithm problem\nAttacks on the hash function employed\nOther attacks\nThis section summarizes the current knowledge of these attacks and how they can be avoided in practice\nThe Elliptic Curve Discrete Logarithm Problem\nOne way in which an adversary can succeed is to compute A s private key d from A s domain pa rameters q FR a b G n h and public key Q The adversary can subsequently forge A s signature on any message of its choice\nProblem Definition The elliptic curve discrete logarithm problem ECDLP is the following given an elliptic curve E de ned over a nite eld Fq a point P E Fq of order n and a point Q lP where l n determine l\nKnown Attacks\nThis subsection overviews the algorithms known for solving the ECDLP and discusses how they can be avoided in practice\nNaive Exhaustive Search In this method one simply computes successive multiples of P P P P P until Q is obtained This method can take up to n steps in the worst case\nPohlig Hellman Algorithm This algorithm due to Pohlig and Hellman exploits the factorization of n the order of the point P The algorithm reduces the problem of recovering l to the problem of recovering l modulo each of the prime factors of n the desired number l can then be recovered by using the Chinese Remainder Theorem\nThe implications of this algorithm are the following To construct the most di cult instance of the ECDLP one must select an elliptic curve whose order is divisible by a large prime n Preferably this order should be a prime or almost a prime i e a large prime n times a small integer h For the remainder of this section we shall assume that the order n of P is prime\nBaby Step Giant Step Algorithm This algorithm is a time memory trade o of the method of exhaustive search It requires storage for about p n points and its running time is roughly p n steps in the worst case\nPollard s Rho Algorithm This algorithm due to Pollard is a randomized version of the baby step giant step algorithm It has roughly the same expected running time p n steps as the baby step giant step algorithm but is superior in that it requires a negligible amount of storage\nGallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm can be sped up by a factor of p Thus the expected running time of Pollard s rho method with this speedup is p n steps\nParallelized Pollard s Rho Algorithm Van Oorschot and Wiener showed how Pollard s rho algorithm can be parallelized so that when the algorithm is run in parallel on r processors the expected running time of the algorithm is roughly p n r steps That is using r processors results in an r fold speed up\nPollard s lambda method This is another randomized algorithm due to Pollard Like Pollard s rho method the lambda method can also be parallelized with a linear speedup The parallelized lambda method is slightly slower than the parallelized rho method The lambda method is however faster in situations when the logarithm being sought is known to lie in a subinterval b of n where b n Multiple Logarithms R Silverman and Stapleton observed that if a single instance of the ECDLP for a given elliptic curve E and base point P is solved using parallelized Pollard s rho method then the work done in solving this instance can be used to speed up the solution of other instances of the ECDLP for the same curve E and base point P More precisely if the rst instance takes expected time t then the second instance takes expected time p t t Having solved these two instances the third instance takes expected time p p t Having solved these three instances the fourth instance takes expected time p p t And so on Thus subsequent instances of the ECDLP for a particular elliptic curve become progressively easier Another way of looking at this is that\nsolving k instances of the ECDLP for the same curve E and base point P takes only p k as much work as it does to solve one instance of the ECDLP This analysis does not take into account storage requirements\nConcerns that successive logarithms become easier can be addressed by ensuring that the elliptic parameters are chosen so that the rst instance is infeasible to solve\nSupersingular Elliptic Curves Menezes Okamoto and Vanstone and Frey and R uck showed how under mild assumptions the ECDLP in an elliptic curve E de ned over a nite eld Fq can be reduced to the ordinary DLP in the multiplicative group of some extension eld Fqk for some k where the number eld sieve algorithm applies The reduction algorithm is only practical if k is small this is not the case for most elliptic curves as shown by Balasubramanian and Koblitz To ensure that the reduction algorithm does not apply to a particular curve one only needs to check that n the order of the point P does not divide qk for all small k for which the DLP in Fqk is tractable in practice when n then k su ces An elliptic curve E over Fq is said to be supersingular if the trace t of E is divisible by the characteristic p of Fq For this very special class of elliptic curves it is known that k It follows that the reduction algorithm yields a subexponential time algorithm for the ECDLP in supersingular curves For this reason supersingular curves are explicitly excluded from use in the ECDSA by the above divisibility check\nMore generally the divisibility check rules out all elliptic curves for which the ECDLP can be e ciently reduced to the DLP in some small extension of Fq These include the supersingular elliptic curves and elliptic curves of trace elliptic curves E over Fq for which E Fq q Prime Field Anomalous Curves An elliptic curve E over Fp is said to be prime eld anomalous if E Fp p Semaev Smart and Satoh and Araki showed how to e ciently solve the ECDLP for these curves The attack does not extend to any other classes of elliptic curves Consequently by verifying that the number of points on an elliptic curve is not equal to the cardinality of the underlying eld one can easily ensure that the Semaev Smart Satoh Araki attack does not apply\nCurves Defined Over a Small Field Suppose that E is an elliptic curve de ned over the nite eld F e Gallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm for computing elliptic curve logarithms in E F ed can be\nfurther sped up by a factor of p d thus the expected running time of Pollard s rho method\nfor these curves is p n d steps For example if E is a Koblitz curve see x then Pollard s rho algorithm for computing elliptic curve logarithms in E F m can be sped up by a factor of p m This speedup should be considered when doing a security analysis of elliptic curves whose coe cients lie in a small sub eld\nCurves Defined Over F m m Composite Galbraith and Smart expanding on earlier work of Frey discuss how the Weil descent might be used to solve the ECDLP for elliptic curves de ned over F m where m is composite such elds are sometimes called composite elds More recently Gaudry Hess and Smart re ned these ideas to provide\nstrong evidence that when m has a small divisor l e g l the ECDLP for elliptic curves de ned over F m can be solved faster than with Pollard s rho algorithm In light of these results it seems prudent to not use elliptic curves over composite elds\nIt should be noted that some ECC standards including the draft ANSI X explicitly exclude the use of elliptic curves over composite elds The ANSI X F committee also agreed in January to exclude the use of such curves in a forthcoming revision of ANSI X\nNon Applicability of Index Calculus Methods Whether or not there exists a general subexponential time algorithm for the ECDLP is an important unsettled question and one of great relevance to the security of ECDSA It is extremely unlikely that anyone will ever be able to prove that no subexponential time algorithm exists for the ECDLP However much work has been done on the DLP over the past years and more speci cally on the ECDLP over the past years and no subexponential time algorithm has been discovered for the ECDLP Miller and J Silverman and Suzuki have given convincing arguments for why the most natural way in which the index calculus algorithms can be applied to the ECDLP is most likely to fail\nXedni Calculus Attacks A very interesting line of attack on the ECDLP called the xedni calculus attack was recently proposed by J Silverman One intriguing aspect of the xedni calculus is that it can be adapted to solve both the ordinary discrete logarithm and the integer factorization problems However it was subsequently shown by a team of researchers including J Silverman see Jacobson et al that the attack is virtually certain to fail in practice\nHyperelliptic Curves Hyperelliptic curves are a family of algebraic curves of arbitrary genus that includes elliptic curves Hence an elliptic curve can be viewed as a hyperelliptic curve of genus Adleman DeMarrais and Huang see also Stein M uller and Thiel presented a subexponential time algorithm for the discrete logarithm problem in the jacobian of a large genus hyperelliptic curve over a nite eld However in the case of elliptic curves the algorithm is worse than naive exhaustive search\nEquivalence to Other Discrete Logarithm Problems Stein and Zuccherato\nshowed that the discrete logarithm problem in real quadratic congruence function elds\nof genus is equivalent to the ECDLP Since no subexponential time algorithm is known for the former problem this may provide further evidence for the hardness of the ECDLP\nExperimental Results\nThe best general purpose algorithm known for the ECDLP is the parallelized version of Pollard s rho algorithm which has an expected running time of p n r steps where n is the prime order of the base point P and r is the number of processors utilized\nCerticom s ECC Challenge Certicom initiated an ECC challenge in November in order to encourage and stimulate research on the ECDLP Their challenges consist of instances of the ECDLP on a selection of elliptic curves The challenge curves are divided into three categories\nlisted below In the following ECCp k denotes a random curve over a eld Fp ECC k denotes a random curve over a eld F m and ECC K k denotes a Koblitz curve see x over F m k is the bitlength of n In all cases the bitsize of the order of the underlying nite eld is equal or slightly greater than k so curves have either prime order or almost prime order\nRandomly generated curves over Fp where p is prime ECCp ECCp ECCp ECCp\nECCp ECCp ECCp ECCp and ECCp\nRandomly generated curves over F m where m is prime ECC ECC ECC ECC ECC ECC ECC ECC and ECC\nKoblitz curves over F m where m is prime ECC K ECC ECC ECC ECC and ECC\nResults of the Challenge Escott et al report on their implementation of the parallelized Pollard s rho algorithm which incorporates some improvements of Teske The hardest instance of the ECDLP they solved was the Certicom ECCp challenge For this task they utilized over machines from at least countries and found the answer in days The total number of steps executed was about elliptic curve additions which is close to the expected time p n where n Escott et al conclude that the running time of Pollard s rho algorithm in practice ts well with the theoretical predictions They estimate that the ECCp challenge could be solved by a network of PentiumPro MHz machines in about months\nHardware Attacks\nVan Oorschot and Wiener examined the feasibility of implementing parallelized Pollard s rho algorithm using special purpose hardware They estimated that if n then a machine with r processors could be built for about US ! million that could compute a single elliptic curve discrete logarithm in about days Since ANSI X mandates that the parameter n should satisfy n such hardware attacks appear to be infeasible with today s technology\nAttacks on the Hash Function\nDefinition A cryptographic hash function H is a function that maps bit strings of arbitrary lengths to bit strings of a xed length t such that\nH can be computed e ciently\npreimage resistance For essentially all y f gt it is computationally infeasible to nd a bit string x such that H x y and\ncollision resistance It is computationally infeasible to nd distinct bit strings x and x such that H x H x\nSHA Security Requirements The following explains how attacks on ECDSA can be suc cessfully launched if SHA is not preimage resistant or not collision resistant\nIf SHA is not preimage resistant then an adversary E may be able to forge A s signatures as follows E selects an arbitrary integer l and computes r as the x coordinate of Q lG reduced modulo n E sets s r and computes e rl mod n If E can nd a message m such that e SHA m then r s is a valid signature for m\nIf SHA is not collision resistant then an entity A may be able to repudiate signatures as follows A rst generate two messages m and m such that SHA m SHA m such a pair of messages is called a collision for SHA She then signs m and later claims to have signed m note that every signature for m is also a signature for m\nIdeal Security A t bit hash function is said to be have ideal security if both i given a hash output producing a preimage requires approximately t operations and ii producing a collision requires approximately t operations SHA is a bit hash function and is believed to have ideal security The fastest method known for attacking ECDSA by exploiting properties of SHA is to nd collisions for SHA Since this is believed to take steps attacking ECDSA in this way is computationally infeasible Note however that this attack imposes an upper bound of\non the security level of ECDSA regardless of the size of the primary security parameter n Of course this is also the case with all present signature schemes with appendix since the only hash functions that are widely accepted as being both secure and practical are SHA and RIPEMD\nsee Dobbertin Bosselaers and Preneel both of which are bit hash functions\nVariable Output Length Hash Functions It is envisioned that SHA will eventually be replaced by a family of hash functions Hl where Hl is an l bit hash function having ideal security If one uses ECDSA with parameter n then one would use Hl where l blog nc as the hash function In this case attacking ECDSA by solving the ECDLP and attacking ECDSA by nding collisions for Hl both take approximately the same amount of time\nOther Attacks\nSecurity Requirements for Per Message Secrets The per message secrets k in ECDSA signature generation have the same security requirements as the private key d This is because if an adversary E learns a single per message secret k which was used by A to generate a signature\nr s on some message m then E can recover A s private key since d r ks e mod n where e SHA m see step of ECDSA signature generation Hence per message secrets must be securely generated securely stored and securely destroyed after they have been used\nRepeated Use of Per Message Secrets The per message secrets k used to sign two or more messages should be generated independently of each other In particular a di erent per message secret k should be generated for each di erent message signed otherwise the private key d can be recovered Note that if a secure random or pseudorandom number generator is used then the chance of generating a repeated k value is negligible To see how private keys can be recovered if per message secrets are repeated suppose that the same per message secret k was used to generate ECDSA signatures r s and r s on two di erent messagesm and m Then s k e dr\nmod n and s k e dr mod n where e SHA m and e SHA m Then ks e dr mod n and ks e dr mod n Subtraction gives k s s e e mod n If s s mod n which occurs with overwhelming probability then k s s e e mod n Thus an adversary can determine k and then use this to recover d\nVaudenay s Attacks Vaudenay demonstrated a theoretical weakness in DSA based on his insight that the actual hash function used in the DSA is SHA modulo q not just SHA where q is a bit prime Since SHA is a bit hash function some of its outputs when converted to integers are larger than q Hence in general SHA m SHA m mod q This weakness allows the selective forgery of one message if the adversary can select the domain parameters This weakness is not present in ECDSA because of the requirement that n the analogous quantity to q in the DSA be greater than\nDuplicate Signature Key Selection A signature scheme S is said to have the duplicate signature key selection DSKS property if given A s public key PA and given A s signature sA on a message M an adversary E is able to select a valid key pair PE SE for S such that sA is also E s signature on M Note that this de nition requires that SE is known to E Blake Wilson and Menezes showed how this property can be exploited to attack a key agreement protocol which employs signatures scheme They also demonstrated that if entities are permitted to select their own domain parameters then ECDSA possesses the DSKS property To see this suppose that A s domain parameters are DA q FR a b G n h A s key pair is QA dA and r s is A s signature on M The adversary E selects an arbitrary integer c c n such that t s e s rc mod n computes X s eG s rQ where e SHA M and G t mod n X E then forms DE q FR a b G n h and QE cG Then it is easily veri ed that DE and QE are valid and that r s is also E s signature on M\nIf one mandates that the generating point G be selected veri ably at random during domain parameter generation using a method akin to those in x for generating elliptic curves veri ably at random then it appears that ECDSA no longer possesses the DSKS property It must be emphasized that possession of the DSKS property does not constitute a weakness of the signature scheme the goal of a signature scheme is to be existentially unforgeable against an adaptive chosen message attack Rather it demonstrates the importance of auditing domain parameter and public key generation\nImplementation Attacks ANSI X does not address attacks that could be launched against implementations of ECDSA such as timing attacks Kocher di erential fault analysis Boneh DeMillo and Lipton di erential power analysis Kocher Ja e and Jun and attacks which exploit weak random or pseudorandom number generators Kelsey et al\nImplementation Considerations\nBefore implementing ECDSA several basic choices have to be made including\nType of underlying nite eld Fq Fp or F m\nField representation e g polynomial or normal basis for F m\nType of elliptic curve E over Fq e g random curve or Koblitz curve\nElliptic curve point representation e g a ne or projective coordinates\nThere are many factors that can in uence the choices made All of these must be considered simultaneously in order to arrive at the best solution for a particular application The factors include\nSecurity considerations Suitability of methods available for optimizing nite eld arithmetic addition multiplication squaring and inversion\nSuitability of methods available for optimizing elliptic curve arithmetic point addition point doubling and scalar multiplication\nApplication platform software hardware or rmware Constraints of a particular computing environment e g processor speed storage code size gate count power consumption\nConstraints of a particular communications environment e g bandwidth response time\nSelected References to the Literature The most detailed and comprehensive reference available on techniques for e cient nite eld and elliptic curve arithmetic is IEEE P See Gordon for a detailed survey of various methods for scalar multiplication For an implemen tation report of elliptic curve operations over Fp and F m see Schroeppel et al De Win et al\nand Hasegawa Nakajima and Matsui\nInteroperability Considerations\nThe goals of cryptographic standards are twofold\nTo facilitate the widespread use of cryptographically sound and well speci ed techniques\nTo promote interoperability between di erent implementations\nFactors Affecting Interoperability Interoperability is encouraged by completely specifying the steps of the cryptographic schemes and the formats for shared data such as domain parameters keys and exchanged messages and by limiting the number of options available to the implemen tor For elliptic curve cryptography and in particular the ECDSA the factors that can impact interoperability include\nThe number and types of allowable nite elds\nThe number of allowable representations for the elements of an allowable nite eld\nThe number of allowable elliptic curves over an allowable nite eld\nThe formats for specifying eld elements elliptic curve points domain parameters public keys and signatures\nECDSA Standards\nAmong the standards and draft standards which specify ECDSA the ones which have been o cially approved by their respective accredited organizations are ANSI X FIPS IEEE P and ISO The salient features of these standards are described rst and then the standards are compared with regards to their compatibility with each other This is followed by a brief overview of some other standards that specify or use ECDSA", "ANSI X Public Key Cryptography for the Financial Services Industry Elliptic Curve Key Agreement and Key Transport Protocols working draft August\nD Ash I Blake and S Vanstone Low complexity normal bases Discrete Applied Mathe matics\nR Balasubramanian and N Koblitz The improbability that an elliptic curve has subexpo nential discrete log problem under the Menezes#Okamoto#Vanstone algorithm Journal of Cryptology\nL Bassham D Johnson and T Polk Representation of Elliptic Curve Digital Signature Algo rithm ECDSA Keys and Signatures in Internet X Public Key Infrastructure Certi cates Internet Draft June Available at http www ietf org\nM Bellare R Canetti and H Krawczyk A modular approach to the design and analysis of authentication and key exchange protocols Proceedings of the th Annual ACM Symposium on the Theory of Computing\nS Blake Wilson and A Menezes Entity authentication and authenticated key transport protocols employing asymmetric techniques Proceedings of the th International Workshop on Security Protocols Lecture Notes in Computer Science\nS Blake Wilson and A Menezes Unknown key share attacks on the station to station STS protocol Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nD Bleichenbacher Generating ElGamal signatures without knowing the secret key Ad vances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nD Boneh R DeMillo and R Lipton On the importance of checking cryptographic protocols for faults Advances in Cryptology Eurocrypt Lecture Notes in Computer Science\nSpringer Verlag\nCerticom ECC Challenge November http www certicom com\nD Chaum J H Evertse and J van de Graaf An improved protocol for demonstrating pos session of discrete logarithms and some generalizations Advances in Cryptology Eurocrypt\nLecture Notes in Computer Science Springer Verlag\nT Dierks and B Anderson ECC Cipher Suites for TLS Internet Draft March Available at http www ietf org\nW Di e P van Oorschot and M Wiener Authentication and authenticated key exchanges Designs Codes and Cryptography\nH Dobbertin A Bosselaers and B Preneel RIPEMD A strengthened version of RIPEMD Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nT ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory\nA Escott J Sager A Selkirk and D Tsapakidis Attacking elliptic curve cryptosystems using the parallel Pollard rho method CryptoBytes The Technical Newsletter of RSA Laborato ries volume number Winter Also available at http www rsasecurity com\nG Frey How to disguise an elliptic curve Weil descent talk at ECC Slides available at http www cacr math uwaterloo ca\nG Frey and H R uck A remark concerning m divisibility and the discrete logarithm in the divisor class group of curves Mathematics of Computation\nS Galbraith and N Smart A cryptographic application of Weil descent Codes and Cryp tography Lecture Notes in Computer Science Springer Verlag\nR Gallant R Lambert and S Vanstone Improving the parallelized Pollard lambda search on binary anomalous curves to appear in Mathematics of Computation\nP Gaudry F Hess and N Smart Constructive and destructive facets of Weil descent on el liptic curves preprint January Available from http www hpl hp com techreports\nHPL html\nS Goldwasser S Micali and R Rivest A digital signature scheme secure against adaptive chosen message attacks SIAM Journal on Computing\nD Gordon Designing and detecting trapdoors for discrete log cryptosystems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nD Gordon Discrete logarithms in GF p using the number eld sieve SIAM Journal on Discrete Mathematics\nD Gordon A survey of fast exponentiation methods Journal of Algorithms\nT Hasegawa J Nakajima and M Matsui A practical implementation of elliptic curve cryp tosystems over GF p on a bit microcomputer Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nIEEE P Standard Speci cations for Public Key Cryptography ballot draft Drafts available at http grouper ieee org groups index html\nISO IEC Information Technology Security Techniques Entity Authentication Mech anisms Part Entity authentication Using a Public Key Algorithm rst edition\nISO IEC Information Technology Security Techniques Key Management Part\nMechanisms Using Asymmetric Techniques\nISO IEC Information Technology Security Techniques Digital Signatures with Appendix Part Certi cate Based Mechanisms\nISO IEC Information Technology Security Techniques Cryptographic Techniques Based on Elliptic Curves Committee Draft CD\nT Izu J Kogure M Noro and K Yokoyama E cient implementation of Schoof s algo rithm Advances in Cryptology Asiacrypt Lecture Notes in Computer Science\nSpringer Verlag\nM Jacobson N Koblitz J Silverman A Stein and E Teske Analysis of the xedni calculus attack Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nD Johnson Key validation Contribution to ANSI X F working group\nB Kaliski and Y Yin Storage e cient nite eld basis conversion Selected Areas in Cryp tography Lecture Notes in Computer Science Springer Verlag\nJ Kelsey B Schneier D Wagner and C Hall Cryptanalytic attacks on pseudorandom number generators Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nN Koblitz Elliptic curve cryptosystems Mathematics of Computation\nN Koblitz Constructing elliptic curve cryptosystems in characteristic Advances in Cryp tology Crypto Lecture Notes in Computer Science Springer Verlag\nN Koblitz CM curves with good cryptographic properties Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nN Koblitz A Course in Number Theory and Cryptography nd edition Springer Verlag\nP Kocher Timing attacks on implementations of Di e Hellman RSA DSS and other sys tems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nP Kocher J Ja e and B Jun Di erential power analysis Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nG Lay and H Zimmer Constructing elliptic curves with given group order over large nite\nelds Algorithmic Number Theory Lecture Notes in Computer Science Springer\nVerlag\nR Lercier Computing isogenies in F n in Henri Cohen editor Algorithmic Number Theory Proceedings Second Intern Symp ANTS II Lecture Notes in Computer Science Springer Verlag\nR Lercier Finding good random elliptic curves for cryptosystems de ned F n Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Lercier and F Morain Counting the number of points on elliptic curves over nite elds strategies and performances Advances in Cryptology Eurocrypt Lecture Notes in Com puter Science Springer Verlag\nR Lidl and H Niederreitter Introduction to Finite Fields and their Applications Cambridge University Press\nC Lim and P Lee A key recovery attack on discrete log based schemes using a prime order subgroup Advances in Cryptology Crypto Lecture Notes in Computer Science\nR McEliece Finite Fields for Computer Scientists and Engineers Kluwer Academic Publish ers Boston\nW Meier and O Sta elbach E cient multiplication on certain nonsupersingular elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nA Menezes Elliptic Curve Public Key Cryptosystems Kluwer Academic Publishers Boston\nA Menezes T Okamoto and S Vanstone Reducing elliptic curve logarithms to logarithms in a nite eld IEEE Transactions on Information Theory\nA Menezes P van Oorschot and S Vanstone Handbook of Applied Cryptography CRC Press\nV Miller Uses of elliptic curves in cryptography Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nF Morain Building cyclic elliptic curves modulo large primes Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Mullin I Onyszchuk S Vanstone and R Wilson Optimal normal bases in GF pn Discrete Applied Mathematics\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nAvailable at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nDecember Available at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nFebruary Available at http csrc nist gov fips\nNational Institute of Standards and Technology Secure Hash Standard SHS FIPS Publica tion April Available at http csrc nist gov fips\nNational Institute of Standards and Technology Entity Authentication using Public Key Cryp tography FIPS Publication Available at http csrc nist gov fips\nNational Institute of Standards and Technology Recommended Elliptic Curves for Federal Gov ernment Use May revised July Available at http csrc nist gov encryption\nNational Institute of Standards and Technology Advanced Encryption Standard work in progress Information available at http csrc nist gov encryption aes aes home htm\nNational Security Agency SKIPJACK and KEA algorithm speci cation Version May\nAlso available at http csrc nist gov encryption skipjack kea htm\nK Nyberg and R Rueppel A new signature scheme based on the DSA giving message recovery st ACM Conference on Computer and Communications Security\nK Nyberg and R Rueppel Message recovery for signature schemes based on the discrete logarithm problem Designs Codes and Cryptography\nP van Oorschot and M Wiener Parallel collision search with cryptanalytic applications Journal of Cryptology\nS Pohlig and M Hellman An improved algorithm for computing logarithms over GF p and its cryptographic signi cance IEEE Transactions on Information Theory\nD Pointcheval and J Stern Security proofs for signature schemes Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nJ Pollard Monte Carlo methods for index computation mod p Mathematics of Computa tion\nM Rabin Digitalized signatures and public key functions as intractable as factorization MIT LCS TR MIT Laboratory for Computer Science\nR Rivest A Shamir and L Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM\nR Rueppel A Lenstra M Smid K McCurley Y Desmedt A Odlyzko and P Landrock\nThe Eurocrypt controversial issue # Trapdoor primes and moduli Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nT Satoh and K Araki Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves Commentarii Mathematici Universitatis Sancti Pauli\nO Schirokauer Discrete logarithms and local units Philosophical Transactions of the Royal Society of London A\nC Schnorr E cient signature generation by smart cards Journal of Cryptology\nR Schoof Elliptic curves over nite elds and the computation of square roots mod p Mathematics of Computation\nR Schroeppel H Orman S O Malley and O Spatscheck Fast key exchange with elliptic curve systems Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nI Semaev Evaluation of discrete logarithms in a group of p torsion points of an elliptic curve in characteristic p Mathematics of Computation\nJ Silverman The xedni calculus and the elliptic curve discrete logarithm prob lem Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nJ Silverman and J Suzuki Elliptic curve discrete logarithms and the index calculus Ad vances in Cryptology Asiacrypt Lecture Notes in Computer Science Springer Verlag\nR Silverman and J Stapleton Contribution to ANSI X F working group\nN Smart The discrete logarithm problem on elliptic curves of trace one Journal of Cryp tology\nM Smid and D Branstad Response to Comments on the NIST Proposed Digital Signature Standard Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nJ Solinas An improved algorithm for arithmetic on a family of elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nJ Solinas Generalized Mersenne numbers Technical report CORR Dept of C$O Uni versity of Waterloo Available from http www cacr math uwaterloo ca\nJ Solinas Improved algorithms for arithmetic on anomalous binary curves Tech nical report CORR Dept of C$O University of Waterloo Available from\nhttp www cacr math uwaterloo ca\nA Stein Equivalences between elliptic curves and real quadratic congruence function elds Journal de Th eorie des Nombres de Bordeaux\nA Stein V M uller and C Thiel Computing discrete logarithms in real quadratic congruence function elds of large genus Mathematics of Computation\nE Teske Speeding up Pollard s rho method for computing discrete logarithms in J P Buh ler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nS Vanstone Responses to NIST s Proposal Communications of the ACM July\ncommunicated by John Anderson\nS Vaudenay Hidden collisions on DSS Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nWAP WTLS Wireless Application Protocol Wireless Transport Layer Security Spec i cation Wireless Application Protocol Forum February Drafts available at http www wapforum org\nM Wiener and R Zuccherato Faster attacks on elliptic curve cryptosystems Selected Areas in Cryptography Lecture Notes in Computer Science Springer Verlag\nE De Win S Mister B Preneel and M Wiener On the performance of signature schemes based on elliptic curves in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nR Zuccherato The equivalence between elliptic curve and quadratic function eld discrete logarithms in characteristic in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag", "Introduction\nDigital Signature Schemes\nBackground The Digital Signature Algorithm DSA\nFinite Fields\nThe Finite Field Fp The Finite Field F m\nPolynomial Basis Representations Normal Basis Representations\nElliptic Curves Over Finite Fields\nElliptic Curves Over Fp Elliptic Curves Over F m Basic Facts\nECDSA Domain Parameters\nDomain Parameters Generating an Elliptic Curve Veri ably at Random\nThe Case q p The Case q m\nDomain Parameter Generation Domain Parameter Validation\nECDSA Key Pairs\nKey Pair Generation Public Key Validation Proof of Possession of a Private Key\nECDSA Signature Generation and Veri cation\nSecurity Considerations\nThe Elliptic Curve Discrete Logarithm Problem\nKnown Attacks Experimental Results Hardware Attacks\nAttacks on the Hash Function Other Attacks\nImplementation Considerations\nInteroperability Considerations\nECDSA Standards NIST Recommended Curves\nRandom Elliptic Curves Over Fp Koblitz Elliptic Curves Over F m Random Elliptic Curves Over F m Converting Between Polynomial and Normal Basis Representations\nConclusions\nReferences\nIntroduction\nThe Digital Signature Algorithm DSA was speci ed in a U S Government Federal Information Processing Standard FIPS called the Digital Signature Standard DSS Its security is based on the computational intractability of the discrete logarithm problem DLP in prime order sub groups of Z p\nElliptic curve cryptosystems ECC were invented by Neal Koblitz and Victor Miller\nin They can be viewed as elliptic curve analogues of the older discrete logarithm DL cryptosystems in which the subgroup of Z p is replaced by the group of points on an elliptic curve over a nite eld The mathematical basis for the security of elliptic curve cryptosystems is the computational intractability of the elliptic curve discrete logarithm problem ECDLP\nSince the ECDLP appears to be signi cantly harder than the DLP the strength per key bit\nis substantially greater in elliptic curve systems than in conventional discrete logarithm systems Thus smaller parameters can be used in ECC than with DL systems but with equivalent levels of security The advantages that can be gained from smaller parameters include speed faster computa tions and smaller keys and certi cates These advantages are especially important in environments where processing power storage space bandwidth or power consumption is constrained\nThe Elliptic Curve Digital Signature Algorithm ECDSA is the elliptic curve analogue of the DSA ECDSA was rst proposed in by Scott Vanstone in response to NIST s National Institute of Standards and Technology request for public comments on their rst proposal for DSS It was accepted in as an ISO International Standards Organization standard ISO accepted in as an ANSI American National Standards Institute standard ANSI X and accepted in as an IEEE Institute of Electrical and Electronics Engineers standard IEEE P and a FIPS standard FIPS It is also under consideration for inclusion in some other ISO standards In this paper we describe the ANSI X ECDSA present rationale for some of the design decisions and discuss related security implementation and interoperability issues\nThe remainder of this paper is organized as follows In x we review digital signature schemes and the DSA A brief tutorial on nite elds and elliptic curves is provided in x and x respec tively In x methods for domain parameter generation and validation are considered while x discusses methods for key pair generation and public key validation The ECDSA signature and veri cation algorithms are presented in x The security of ECDSA is studied in x Finally some implementation and interoperability issues are considered in x and x\nDigital Signature Schemes\nBackground\nDigital signature schemes are designed to provide the digital counterpart to handwritten signatures\nand more A digital signature is a number dependent on some secret known only to the signer the signer s private key and additionally on the contents of the message being signed Signatures must be veri able if a dispute arises as to whether an entity signed a document an unbiased third party should be able to resolve the matter equitably without requiring access to the signer s\nprivate key Disputes may arise when a signer tries to repudiate a signature it did create or when a forger makes a fraudulent claim\nThis paper is concerned with asymmetric digital signatures schemes with appendix Asym\nmetric means that each entity selects a key pair consisting of a private key and a related public key The entity maintains the secrecy of the private key which it uses for signing messages and makes authentic copies of its public key available to other entities which use it to verify signatures\nAppendix means that a cryptographic hash function is used to create a message digest of the message and the signing transformation is applied to the message digest rather than to the message itself\nSecurity Ideally a digital signature scheme should be existentially unforgeable under chosen message attack This notion of security was introduced by Goldwasser Micali and Rivest Informally it asserts that an adversary who is able to obtain entity A s signatures for any messages of its choice is unable to successfully forge A s signature on a single other message\nApplications Digital signature schemes can be used to provide the following basic cryptographic services data integrity the assurance that data has not been altered by unauthorized or unknown means data origin authentication the assurance that the source of data is as claimed and non repudiation the assurance that an entity cannot deny previous actions or commitments Digital signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication e g FIPS ISO IEC and Blake Wilson and Menezes authenticated key transport e g Blake Wilson and Menezes ANSI X and ISO IEC and authenticated key agreement e g ISO IEC Di e van Oorschot and Wiener and Bellare Canetti and Krawczyk\nClassification The digital signature schemes in use today can be classi ed according to the hard underlying mathematical problem which provides the basis for their security\nInteger Factorization IF schemes which base their security on the intractability of the inte ger factorization problem Examples of these include the RSA and Rabin signature schemes\nDiscrete Logarithm DL schemes which base their security on the intractability of the or dinary discrete logarithm problem in a nite eld Examples of these include the ElGamal\nSchnorr DSA and Nyberg Rueppel signature schemes\nElliptic Curve EC schemes which base their security on the intractability of the elliptic curve discrete logarithm problem\nThe Digital Signature Algorithm DSA\nThe DSA was proposed in August by the U S National Institute of Standards and Technology\nNIST and was speci ed in a U S Government Federal Information Processing Standard FIPS\ncalled the Digital Signature Standard DSS The DSA can be viewed as a variant of the\nElGamal signature scheme Its security is based on the intractability of the discrete logarithm problem in prime order subgroups of Z p\nDSA Domain Parameter Generation Domain parameters are generated for each entity in a particular security domain See also the note below on secure generation of parameters\nSelect a bit prime q and a bit prime p with the property that q j p Select a generator g of the unique cyclic group of order q in Z p Select an element h Z p and compute g h p q mod p Repeat until g Domain parameters are p q and g\nDSA Key Pair Generation Each entity A in the domain with domain parameters p q g does the following\nSelect a random or pseudorandom integer x such that x q Compute y gx mod p\nA s public key is y A s private key is x\nDSA Signature Generation To sign a message m A does the following\nSelect a random or pseudorandom integer k k q Compute X gk mod p and r X mod q If r then go to step\nCompute k mod q\nCompute e SHA m Compute s k fe xrg mod q If s then go to step A s signature for the message m is r s\nDSA Signature Verification To verify A s signature r s on m B obtains authentic copies of A s domain parameters p q g and public key y and does the following\nVerify that r and s are integers in the interval q Compute e SHA m\nCompute w s mod q\nCompute u ew mod q and u rw mod q\nCompute X gu yu mod p and v X mod q\nAccept the signature if and only if v r\nSecurity Analysis Since r and s are each integers less than q DSA signatures are bits in size The security of the DSA relies on two distinct but related discrete logarithm problems One is the discrete logarithm problem in Z p where the number eld sieve algorithm see Gordon and Schirokauer applies this algorithm has a subexponential running time More precisely the expected running time of the algorithm is\nO exp c o lnp ln ln p\nwhere c and lnn denotes the natural logarithm function If p is a bit prime then the expression represents an infeasible amount of computation thus the DSA using a bit prime p is currently not vulnerable to this attack The second discrete logarithm problem works to the base g given p q g and y nd x such that y gx mod p For large p e g bits the best algorithm known for this problem is Pollard s rho method and takes aboutp\nq\nsteps If q then the expression represents an infeasible amount of computation thus the DSA is not vulnerable to this attack However note that there are two primary security parameters for DSA the size of p and the size of q Increasing one without a corresponding increase in the other will not result in an e ective increase in security Furthermore an advance in algorithms for either one of the two discrete logarithm problems could weaken DSA\nSecure Generation of Parameters In response to some criticisms received on the rst draft\nsee Rueppel et al and Smid and Branstad FIPS speci ed a method for generating primes p and q veri ably at random This feature prevents an entity e g a central authority generating domain parameters to be shared by a network of entities from intentionally constructing\nweak primes p and q for which the discrete logarithm problem is relatively easy For further discussion of this issue see Gordon FIPS also speci es two methods based on DES and SHA for pseudorandomly generating private keys x and per message secrets k FIPS mandates the use of these algorithms or any other FIPS approved security methods\nFinite Fields\nWe provide a brief introduction to nite elds For further information see Chapter of Koblitz\nor the books by McEliece and Lidl and Niederreitter\nA nite eld consists of a nite set of elements F together with two binary operations on F\ncalled addition and multiplication that satisfy certain arithmetic properties The order of a nite\neld is the number of elements in the eld There exists a nite eld of order q if and only if q is a prime power If q is a prime power then there is essentially only one nite eld of order q this\neld is denoted by Fq There are however many ways of representing the elements of Fq Some representations may lead to more e cient implementations of the eld arithmetic in hardware or in software\nIf q pm where p is a prime and m is a positive integer then p is called the characteristic of Fq and m is called the extension degree of Fq Most standards which specify the elliptic curve cryptographic techniques restrict the order of the underlying nite eld to be an odd prime q p or a power of q m In x we describe the elements and the operations of the nite eld Fp In x elements and the operations of the nite eld F m are described together with two methods for representing the eld elements polynomial basis representations and normal basis representations\nThe Finite Field Fp\nLet p be a prime number The nite eld Fp called a prime eld is comprised of the set of integers\nf p g\nwith the following arithmetic operations\nAddition If a b Fp then a b r where r is the remainder when a b is divided by p and r p This is known as addition modulo p\nMultiplication If a b Fp then a b s where s is the remainder when a b is divided by p and s p This is known as multiplication modulo p\nInversion If a is a non zero element in Fp the inverse of a modulo p denoted a is the unique integer c Fp for which a c\nExample The nite eld F The elements of F are f g Examples of the arith metic operations in F are\nThe Finite Field F m\nThe eld F m called a characteristic two nite eld or a binary nite eld can be viewed as a vector space of dimension m over the eld F which consists of the two elements and That is there exist m elements m in F m such that each element F m can be uniquely written in the form\na a am m where ai f g\nSuch a set f m g is called a basis of F m over F Given such a basis a eld element can be represented as the bit string a a am Addition of eld elements is performed by bitwise XOR ing the vector representations The multiplication rule depends on the basis selected\nThere are many di erent bases of F m over F Some bases lead to more e cient software or hardware implementations of the arithmetic in F m than other bases ANSI X permits two kinds of bases polynomial bases discussed in x and normal bases discussed in x\nPolynomial Basis Representations", "See Gordon [36] for a detailed survey of various methods for scalar multiplication."]} +{"56027811|13019489": ["The light licensing regime is usually implemented in situations where radio spectrum is not scarce and no interference issues are expected (Tehrani et al., 2016).", "Given these circumstances, the light licensing regime is usually implemented in high frequency bands, whose poor propagation properties allow for provision of high data capacity over short distances (Tehrani et al., 2016).", "According to Tehrani et al. (2016), the use of a geo-location database is more suitable for static spectrum sharing, which is the case of the LSA regime."]} +{"52059869|206578224": ["[8] focus on how Multi-access Edge Computing", "intelligence and control as advocated by [8] and [93]."]} +{"52059869|206456479": []} +{"52059869|25911553": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|10342730": ["To the best knowledge of the authors, there are no detailed surveys on the topic of network slicing in the literature, except those presented in [6], [7], [9].", "Likewise, in [7], the authors describe how wireless network resources can be adequately allocated to network slices without the resources of one slice negatively impacting the quality of others and with a focus on the Radio Access Net-"]} +{"52059869|6583734": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|11414835": []} +{"52059869|12017064": ["Security concerns in virtual or cloud platforms are well determined [167], [168]."]} +{"52059869|4269723": ["SDN provides key characteristics such as flexibility, service-oriented adaptation, scalability, and robustness [72], which are essential for"]} +{"51935081|51613885": ["Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper In contrast to work presented in [5\u20139, 12", "ICO stands for \u201cInitial Coin Offering\u201d wherein a share of the cryptocurrency is offered to early investors in exchange for legal tender or other cryptocurrencies\u2014for example, Factom [23] and Civic [24]; (iii) Asset-backed tokens : The tokens that are linked to a physical asset\u2014for example, Tether [25]; (iv) Participation tokens : The tokens which are distributed among the participants to decide their share in future revenues without legal obligation\u2014for example, DigixDAO [26], Crypto-One-Stop-Solution (COSS) [27], BitDice [28]; (v) Partnership tokens : The tokens which are distributed to decide the share of the shareholders.", "[6] presented a general survey of security challenges in IoT with BC being one of the solutions.", "Solutions like PriWatt [60], IBM Adept[64], Huh et al. [74] and Sikorski et al. [86] are at a theoretical level and do not present a Proof-of-Concept.", "Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper"]} +{"51935081|925507": ["Conoscenti et al. [12] analyzed literature extensively about the possible applications of BC, presenting its different forms to solve some of the security challenges.", "Challenges & Existing platforms [5,8], this paper Security Challenges in IoT and BC as Solution [6,12], this paper Internet of Things (IoT) Security and Stalker Attack [7], this paper (partially) Consensus (mechanisms) Taxonomy [9], this paper In contrast to work presented in [5\u20139, 12"]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} diff --git a/edge/graph_173991145.jsonl b/edge/graph_173991145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2334cf076d6d905a46ee14dbc002d40decedfa21 --- /dev/null +++ b/edge/graph_173991145.jsonl @@ -0,0 +1,7 @@ +{"49564729|13687435": ["HTM consists of HTM SP, which encodes the input patterns and produces sparse distributed representation of input data useful for visual data processing and HTM TM, which can be used for prediction making [10].", "architectures such as deep learning neural network (DNN) [31], [32], convolutional neural network (CNN) [33], [34], LSTM [12], [13], HTM [10], [11], and generative adversarial networks [35] that has grown prominence in the last decade.", "We present the clear overview of various neuromorphic architectures, such as different types of neural networks [9], hierarchical temporal memory (HTM) [10], [11], long short-term memory (LSTM) [12], [13], learning architectures, and circuits for memorybased computing and storage.", "8) Hierarchical Temporal Memory: HTM is a machine learning algorithm and architecture mimicking the structure and functionality of human neocortex [10], [124]."]} +{"49564729|4795312": ["6) Convolutional Neural Network: Convolutional Neural Network (ConvNN) is a machine learning algorithm based on a convolution operation that has been proven to be an efficient solution for various classification tasks, image recognition problems [65], [66] and video analysis [67]."]} +{"49564729|31245252": ["1) Push From Market and Users: The increased number of edge devices in IoT and cyber physical system frameworks is driven by the needs from the users for applications such as for gaming, object detection, augmented reality, artificial intelligence, video analytic, and mobile computing [134], [135]."]} +{"49564729|1509636": ["implementations of memristor-based logic gate and threshold logic functions are shown in [95], [96], [97], [98]."]} +{"49564729|1798273": ["implementations of memristor-based logic gate and threshold logic functions are shown in [95], [96], [97], [98]."]} +{"9365379|385243": []} +{"155388078|49564729": ["Table IV illustrate the effect of variable resistance of memristive devices on the performance accuracy of memristive ANN, BNN and CNN simulated for off-chip training MNIST database [19] (the memristive weights are predetermined and preprogrammed).", "CNN was simulated with 2 convolutional layers of size 32 and 64 and dense network with 1600 inputs, 250 hidden units and 10 output neurons.", "Therefore, in this paper, we investigate effect of non-idealities of\nmemristive devices and memristive crossbar on the performance accuracy of ANN, BNN and CNN [8].", "Therefore, in this paper, we investigate effect of non-idealities of memristive devices and memristive crossbar on the performance accuracy of ANN, BNN and CNN [8].", "The effect of these variabilities on memristive neuromorphic architectures, as such ANN, CNN and BNN, during classification with off-chip training and on-chip training were estimated."]} diff --git a/edge/graph_173991203.jsonl b/edge/graph_173991203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b3435ebc4005eeed1ccbb7672e3aa00bebe6a74 --- /dev/null +++ b/edge/graph_173991203.jsonl @@ -0,0 +1,8 @@ +{"18591424|1230643": ["As a consequence, computing models for such systems are typically event-driven and asynchronous [2]."]} +{"3201452|2818055": ["In order to correctly recompute all the reactive expressions once a event stream or behaviour is triggered, most libraries construct a dependency graph [2] behind the scenes."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} diff --git a/edge/graph_17402408.jsonl b/edge/graph_17402408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f47593760c05c81ac6c9a95f016af98f2352d82f --- /dev/null +++ b/edge/graph_17402408.jsonl @@ -0,0 +1,2 @@ +{"16613771|2835258": []} +{"16427351|14441987": ["It is a network without infrastructure that consists of a collection of wireless mobile hosts to form a temporary network without the aid of any centralized administration or standard support services [1]."]} diff --git a/edge/graph_17403085.jsonl b/edge/graph_17403085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe01561b190638a6dd064206afd60f50e0766cee --- /dev/null +++ b/edge/graph_17403085.jsonl @@ -0,0 +1,15 @@ +{"154910553|3102110": []} +{"184750|3102110": ["Data mining, also referred to as \u2018knowledge discovery\u2019, means the process of extracting nontrivial, implicit, previously unknown and potentially useful information from databases (Chen, Han, & Yu, 1996; Han & Kamber, 2001).", "Thus, designing a useful interestingness measurement is becoming an important issue (Brin, Motwani et al., 1997; Chen et al., 1996; Han & Kamber, 2001; Tan & Kumar, 2000)."]} +{"36838772|15915200": []} +{"36838772|15527933": []} +{"34015170|3102110": ["These goals of data mining are achieved by using data mining tasks, such as summarization [ 11 ], [12], association [13], [14], classification [15], [16], and clustering [17], [18], as well as basic statistical analyzes, such as hypothesis testing, estimation, and regression."]} +{"22554416|3102110": ["; and bF: A large number of efficient algorithms for mining association rules have been proposed [27].", "Data mining has been well recognized for decision support by efficient knowledge discovery of previously unknown and potentially useful patterns of information from past data [27].", "Association rule mining is one of the major forms of data mining and is perhaps the most common form of knowledge discovery in unsupervised learning systems [27]."]} +{"954543|60455": []} +{"954543|10739218": []} +{"15580994|8125630": []} +{"15580994|3102110": []} +{"17386920|3102110": []} +{"17588038|8530790": ["The second algorithm is based on the concepts from evolutionary computation (Fonseca and Fleming 1995)."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"7395123|3102110": ["Data mining [Chen et al. 1996] is the process of extracting interesting (non-trivial, implicit, previously unknown and potentially useful) information or patterns from large information repositories such as: relational database, data warehouses, XML repository, etc."]} diff --git a/graph_1740951.jsonl b/edge/graph_1740951.jsonl similarity index 100% rename from graph_1740951.jsonl rename to edge/graph_1740951.jsonl diff --git a/edge/graph_17410801.jsonl b/edge/graph_17410801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0eca086af0e8f2a0dd2ad9750a011d6cc2f15db2 --- /dev/null +++ b/edge/graph_17410801.jsonl @@ -0,0 +1,10 @@ +{"22845636|1236072": ["A number of QoS support routing protocols have been proposed for wireless sensor networks recently [2][3]."]} +{"22845636|1708582": ["Detailed information on reinforcement learning can be found in [9]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"7988320|6539555": []} +{"7854020|7988320": []} +{"14357918|1236072": ["Also use of greater number of sensors results in sensing ability over larger areas with greater accuracy [ 4-5 ].", "One of the problems of large-scale mass production of cheap sensor motes and their large-scale deployment is that in near future it will not be possible to assign unique hardware identifiers to each mote manufactured [ 5-7 ].", "The innumerable applications of wireless motes include intrusion detection, security and tactical surveillance, disaster management, weather monitoring, habitat monitoring applications and monitoring of different biological parameters inside the human body [ 1-5 ]."]} +{"16372481|7988320": ["Similar WBAN settings can be found in [3], [10]."]} +{"5137547|1236072": ["They deal with various design constraints like load-balancing, energy efficiency and delay constraints [2,3].", "The innumerable applications of wireless sensor motes include intrusion detection, security and tactical surveillance, disaster management, weather forecast, habitat monitoring, air traffic control, traffic surveillance, video surveillance, industrial andmanufacturing automation, distributed robotics and monitoring of different critical biological conditions inside the human body [2,3,4,5,20]."]} +{"37546126|7988320": ["Nodes in BANs have a heterogenous structure in terms of available energy and computing power which needs to be considered to minimize interference and avoid tissue heating [2]."]} +{"15305984|1236072": ["Recently, many routing protocols, such as Cluster-Tree Algorithm [2] and NST-AODV [3], have been proposed for sensor networks [4], [5]."]} diff --git a/edge/graph_17412524.jsonl b/edge/graph_17412524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1741631.jsonl b/edge/graph_1741631.jsonl similarity index 100% rename from graph_1741631.jsonl rename to edge/graph_1741631.jsonl diff --git a/edge/graph_17418719.jsonl b/edge/graph_17418719.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17421961.jsonl b/edge/graph_17421961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00d62bfae7b25058951918500c59fe1c580a6b39 --- /dev/null +++ b/edge/graph_17421961.jsonl @@ -0,0 +1,10 @@ +{"1418429|70923": ["Therefore, when developing a MAS, this can be viewed as a society, similar to a human society, consisting of entities that possess characteristics similar to humans such as mobility, intelligence and the capability of communicating [13].", "AOSE introduces an alternative approach in analysing and designing complex distributed computerised systems [13,15,36], according to which a complex computerised system is viewed as a multi-agent system (MAS) [13] in which a collection of autonomous software agents (subsystems) interact with each other in order to satisfy their design objectives."]} +{"565477|9240891": ["The mechanism of CR has \nsimilarities to trust policy man\u00adagement engines such as PolicyMaker [3] and Trust-Serv [9].", "The mechanism of CR has similarities to trust policy management engines such as PolicyMaker [3] and Trust-Serv [9]."]} +{"12198584|7839197": ["While we assume the classical AI definition of software agent, that is, a software having properties such as autonomy, social ability, reactivity, proactivity, as given, for instance in [24], in Tropos we define a role as an abstract characterization of the behavior of a social actor within some specialized context or domain of endeavor, and a position BRESCIANI ET AL."]} +{"14365510|70923": ["Many agent-oriented software engineering methodologies have been proposed [3, 4, 5] each one of those offering different approaches in modeling multi-agent systems."]} +{"13975932|6952653": []} +{"3078938|9240891": ["While Yu and Singh\u2019s model demonstrates the power of referrals and the e \ufb00 ectiveness of Dempster Shafter\u2019s theory of evidence in modelling reputation , Schillo et al .", "The probability of a witness lying to the querying agent is actually learnt over multiple interactions in Schillo et al .", "(2002), Sen and Sajja (2002) and Schillo et al .", "Furthermore , Schillo et al .", "This normally entails that they can be authenticated by trusted third parties ( i . e . those that can be relied upon to be trustworthy and as such are authorities in the system ( Grandison & Sloman , 2000).", "In this respect , Schillo et al .", "This necessitates a better evaluation of risks present in the environment ( Yamagishi et al ., 1998; Molm et al ., 2000).", "The former supports a web of trust in that there is no centralised or hierarchical relationship between CAs , while the latter is a strictly hierarchical trust model for authentication ( Grandison & Sloman , 2000).", "These basic requirements can be implemented by a public key encryption and certi\ufb01cate infrastructure ( Grandison & Sloman , 2000).", "Strategic lying : while some reputation mechanisms and models try to deal with this problem ( such as Schillo et al ."]} +{"13150320|14368770": []} +{"13150320|35426346": []} +{"6648528|70923": ["This decision took place because we are interested in enabling an agent oriented software engineering methodology to model security, rather than creating one more methodology on the (already) large amount of existing ones [13,17,20,21,42,44].", "In general, developers of agent oriented methodologies have neglected security and although the agent oriented software engineering is progressing rapidly and many agent oriented methodologies [13, 17, 20, 21, 42, 44] have developed during the last few years; agent oriented software engineering practices and methodologies do not meet the needs for resolving the security related problems, and fail to provide evidence of successfully integrating security concerns.", "AOSE introduces an alternative approach in analysing and designing complex distributed computerised systems [24, 43, 21], according to which a complex computerised system is viewed as a multiagent system [43], in which a collection of autonomous software agents (subsystems) interact with each other in order to satisfy their design objectives."]} +{"2296304|9240891": ["In the area of trust, Grandison et al. in their work \" A survey of trust in Internet application \" (Grandison and Sloman, 2000) examine the various definitions of trust in the literature and provide a working definition of trust for Internet applications."]} diff --git a/edge/graph_17423404.jsonl b/edge/graph_17423404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a360920b6c55cbe838696d9227ccaf1b0e34dcd --- /dev/null +++ b/edge/graph_17423404.jsonl @@ -0,0 +1,2 @@ +{"1610929|25929315": ["[11] J.-P. Cheng, C. han Lee, and T.-M. Lin, \u201cPrioritized random access with dynamic access barring for RAN overload in 3GPP LTE-A networks,\u201d in Proc.", "Physical layer configuration in LTE-A [22].\nfor Uj will be simply pj = ti/tj , which further simplifies the optimization process at the BS.", "Physical layer configuration in LTE-A [22].", "The conventional random access approach, which is currently used in the LTE-A standard uses backoff approach [7].", "This can be easily obtained through several approaches in current LTE and LTE-A standards [22].", "More specifically, we assume maximum number of RA attempts Nra = 10 and backoff indexesXi \u2208 {10, 20, 30, 40, 60, 80, 120, 160, 240, 320, 480, 960} [22].", "We first compare our proposed MA-AFC approach with the conventional massive RA technique in the LTE-A standard [32].", "[22] A. Laya, L. Alonso, and J. Alonso-Zarate, \u201cIs the randomaccess channel of LTE and LTE-A suitable for M2M communications? a survey of alternatives,\u201d IEEE Commun.", "We also consider a contention-based random access strategy in M2M communications, whereNs different random access preambles, which are orthogonal frequency division multiplexing (OFDM) symbols in the LTE-Advanced standard [7], are selected in a random access attempt."]} +{"18202275|25929315": ["Some of the most relevant contributions are summarized in Table I and a comprehensive survey can be found in [16]."]} diff --git a/edge/graph_17424207.jsonl b/edge/graph_17424207.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17428811.jsonl b/edge/graph_17428811.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17430505.jsonl b/edge/graph_17430505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17435753.jsonl b/edge/graph_17435753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17436003.jsonl b/edge/graph_17436003.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0569900f96fd37459f7418c66d88ac9d57be536a --- /dev/null +++ b/edge/graph_17436003.jsonl @@ -0,0 +1 @@ +{"5392983|1876323": []} diff --git a/edge/graph_17437856.jsonl b/edge/graph_17437856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17438822.jsonl b/edge/graph_17438822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54eecbce2a8970af0dea5b11333105d44d1da2ec --- /dev/null +++ b/edge/graph_17438822.jsonl @@ -0,0 +1 @@ +{"3405104|62204132": ["Lee and Vairaktarakis [11] and Potts and van Wassenhove [ 16 ], this problem can be denoted by 1jsfjFh(IjCmax).", "Single-criterion multiple-job class problems are discussed in Psaraftis [17], Monma and Potts [14] and Potts and van Wassenhove [ 16 ] in which the term batching was coined for scheduling multiple job classes."]} diff --git a/edge/graph_17442795.jsonl b/edge/graph_17442795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17449824.jsonl b/edge/graph_17449824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17455480.jsonl b/edge/graph_17455480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65cbb7917d3cb7c9b67e961a10045f0bd86764ff --- /dev/null +++ b/edge/graph_17455480.jsonl @@ -0,0 +1,2 @@ +{"16226203|16052126": ["Techniques for MapReduce-based join evaluation are proposed in [5,6,17, 32].", "The interested reader may find in [23] a survey of NoSQL systems, while [32,73] cover MapReduce variations and other massively parallel data management frameworks."]} +{"4910656|9970562": ["There have been some interesting efforts to extract entities from RDF depositary[20][21][22]."]} diff --git a/edge/graph_17457126.jsonl b/edge/graph_17457126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a7307130e8e759b6d3180303d330e75c1e8d00b --- /dev/null +++ b/edge/graph_17457126.jsonl @@ -0,0 +1 @@ +{"18361204|7278743": []} diff --git a/edge/graph_17464562.jsonl b/edge/graph_17464562.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17468674.jsonl b/edge/graph_17468674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17473474.jsonl b/edge/graph_17473474.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..354e8ec2173a578b53d69bf866ac97a7efd3974b --- /dev/null +++ b/edge/graph_17473474.jsonl @@ -0,0 +1,2 @@ +{"15715678|17252389": []} +{"3041509|17252389": ["Existing patch-based interactive editing systems usually require the user to provide semantic guidance or constraints to the low-level patch synthesis algorithms to achieve semantically meaningful results [Hu et al. 2013]."]} diff --git a/edge/graph_17474643.jsonl b/edge/graph_17474643.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e1d597dffbbcabaa99e714fb6ca0952a1608dd7 --- /dev/null +++ b/edge/graph_17474643.jsonl @@ -0,0 +1,2 @@ +{"14755515|7971188": ["monitor system components based on decentralized messaging and information indexing infrastructure, called Distributed Hash Tables (DHTs) [ 26 ]."]} +{"5929770|10658846": []} diff --git a/edge/graph_174778933.jsonl b/edge/graph_174778933.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5532dfcee44f808ec38780c72a097f9fc1705f59 --- /dev/null +++ b/edge/graph_174778933.jsonl @@ -0,0 +1,6 @@ +{"52148358|14116122": ["In literature, different statistical learning models have been used for Human action recognition [1], [2].", "Human activity recognition has been an active research topic in the last few years for several applications related to computer vision and pattern recognition [1], [2], [3], [4]."]} +{"57378345|192934": ["In particular, finite Gaussian mixture models (GMM) have been widely used and have played an important role in data classification and machine learning [27], [40], [41]."]} +{"37705866|12663580": ["Our online self-trained classi\ufb01er is mainly based on SVMs [36], which is one of the most successful learning algorithms [37,38]."]} +{"15283798|12663580": ["The SVM is already known as the best learning algorithm for binary classi\ufb01cation [5,6,12,17,20,23,28,37,40,42].", "The SVM, originally a type of pattern classi\ufb01er based on a statistical learning technique for classi\ufb01cation and regression with a variety of kernel functions [12,23,37,42], has been successfully applied to a number of pattern recognition applications [6]."]} +{"139107613|6430931": ["RELATED WORKS Due to the importance of this area of research, complete and extensive surveys have been provided in [5]\u2013[8] where interested readers can found sophisticated descriptions of various techniques for cyber intrusion detection."]} +{"59526025|14116122": []} diff --git a/edge/graph_174787625.jsonl b/edge/graph_174787625.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..267aec6bedf2d9a98c8f085a8ce7ac2a2940e12b --- /dev/null +++ b/edge/graph_174787625.jsonl @@ -0,0 +1,9 @@ +{"17170586|1333339": ["Trust establishment is tagged in many existing research works for peer to peer, sensors, and mobile ad hoc networks [1] [2].", "The trust and reputation models [1] are proposed as new approaches to circumvent with this constraint and to filter out inaccurate messages and malicious vehicles."]} +{"16681688|2835258": ["I. INTRODUCTION\nVehicular ad hoc networks (VANETs) have emerged with a great strength gaining a lot of interest by government, traffic authorities, car manufacturers, and operators due to the different possibilities that they offer related to the car industry."]} +{"9095936|44944144": []} +{"53435987|12538766": ["An overview of security approaches for VANETs was presented in [17] and [18]."]} +{"53435987|38911919": ["VANETs aim to enhance wide variety of applications, including road and security applications, for example, notifications of traffic congestion, emergency notifications, and peer-to-peer communications for sharing information.", "Due to the openness of the ad-hoc network, launching attack or malicious nodes are natural in VANETs.", "[42] Y. Hao, Y. Cheng, C. Zhou, and W. Song, \u2018\u2018A distributed key management framework with cooperative message authentication in VANETs,\u2019\u2019 IEEE J. Sel.", "I. INTRODUCTION Vehicular ad-hoc networks (VANETs) are the foundation of next-generation intelligent transportation systems (ITSs), which are a subset of mobile ad-hoc networks (MANETs).", "REFERENCES [1] S. Boussoufa-Lahlah, F. Semchedine, and L. Bouallouche-Medjkoune,\n\u2018\u2018Geographic routing protocols for vehicular ad hoc networks (VANETs): A survey,\u2019\u2019 Veh.", "Performing channel estimation and the according routing can significantly improve VANETs [3].", "An overview of security approaches for VANETs was presented in [17] and [18].", "According to the various applications, VANETs have been used to create intelligent systems through vehicle-to-vehicle (V2V) communication [4].", "[19] J. Molina-Gil, P. Caballero-Gil, and C. Caballero-Gil, \u2018\u2018Countermeasures to avoid noncooperation in fully self-organized VANETs,\u2019\u2019 Sci. World J., vol. 2014, Jun. 2014, Art. no. 589563.", "Furthermore, a distributed key management framework for reducing the computational overhead in VANETs was presented.", "More challenges are involved in secure and efficient exchange of information in VANETs than for any other type of adhoc network.", "[18] C. Ponikwar, and H.-J. Hof, \u2018\u2018Overview on security approaches in intelligent transportation systems: Searching for hybrid trust establishment solutions for VANETs,\u2019\u2019 in Proc."]} +{"34420171|62617427": ["Many variations of pseudonyms usage in VANETs were proposes [23, 24]."]} +{"36400013|10137283": ["Trust can be defined as a subjective belief of a peer about other peers belonging to the same society or geographical zone [9]."]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} diff --git a/edge/graph_174797842.jsonl b/edge/graph_174797842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94c301d7ce58a8f41fda79ebed33ff2670b589e3 --- /dev/null +++ b/edge/graph_174797842.jsonl @@ -0,0 +1,4 @@ +{"3147007|6337591": ["This dialogue literature thus widely applies reinforcement learning (Walker, 2000; Schatzmann et al., 2006; Gasic et al., 2013b; Singh et al., 1999; Singh et al., 2000; Singh et al., 2002) to train dialogue policies."]} +{"14106275|14545307": []} +{"1033682|174797842": []} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} diff --git a/edge/graph_174797957.jsonl b/edge/graph_174797957.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c11aacbdad7a72caf0e139f59d77cd272f3712d --- /dev/null +++ b/edge/graph_174797957.jsonl @@ -0,0 +1,26 @@ +{"9496996|12815020": []} +{"66908204|14414383": []} +{"66908204|12595430": []} +{"66908204|12815020": []} +{"66908204|6430931": []} +{"21073761|485843": ["\u2022 Geo-distribution: Power generators, energy transformers and distribution networks form the infrastructure of the smart grid [31]."]} +{"21073761|121289": ["Using such two-way communication, Advanced Metering Infrastructure (AMI) ensures delivery of a reliable, secure and cost-effective service throughout the system [14]."]} +{"4763380|32360363": ["There are multiple research topics related to smart cities technology, starting from the sensors technologies, which generate a relevant part of the city information, the sensors devices organization, including technologies such as the Internet of Things (IoT), the Internet of Everything (IoE), other Service Oriented Architectures (SOA), or even a combination of these [2], using different communications technologies, such as wired Ethernet, or wireless WiFi, 3G/4G networks, or other ad-hoc low-power wide-area networks (LPWAN), and providing these data and resources available to create new and sophisticated services that ease life in the city according to the city\u2019s social, economic, and environmental models."]} +{"4763380|8215225": ["The other view extends the previous view to go beyond ubiquitous and distributed scenarios (instead of focusing on specific devices and network) such as big data [16], cloud and distributed computing [16, 20], web technologies [21, 22], or real-time systems [19].", "With respect to distributed data aggregation, a recent survey [20] presents a taxonomy for distributed data aggregation approaches."]} +{"213122917|2663804": ["For privacy in smart grids, some approaches were introduced by [39] to maintain security and prevent privacy leaks that focus on data aggregation."]} +{"213122917|207209718": ["Various IDSs have been proposed for protecting cyber physical power systems against cyber attacks [4], [20], [21]."]} +{"4885356|206578224": ["A detailed survey of the enabling technologies is provided in [24]; we summarize the most", "An MEC platform can also be deployed as a gateway in indoor environments and provide services including augmented reality, building management and social network applications [24]."]} +{"4885356|6909107": ["and functionality [22]\u2013[24]."]} +{"4885356|206578365": []} +{"4885356|469744": ["and reliability constraints for immersive applications, such as virtual and augmented reality [41], [42]."]} +{"34664429|12815020": ["In 2013, Modi et al. (2013) argued that a firewall is not sufficient to provide security to data stored in a cloud system."]} +{"2282184|8523192": ["To summary, Edge computing [11]\u2013[13] is totally edgelocalized, however, fog computing extends the computing and communication resources towards edge of the network."]} +{"2282184|2756896": ["Location privacy, as discussed in [28], is one of the most important models for privacy, since the place of equipment can be linked to the owners."]} +{"2282184|3348390": ["As resources of EU\u2019s devices are shared among other geographically close devices to support context-aware services [63], [64], location, massive amount data and other information of EU need to be protected in very secure manner."]} +{"2282184|12815020": ["SCADA [65], cloud [66], smart grid [67] etc."]} +{"25374274|8523192": ["Like Cloud systems, a Fog system is composed of Infrastructure, Platform, and Software-as-a-Service (IaaS, PaaS, and SaaS, respectively), along with the addition of Data services [12, 13]."]} +{"25374274|3374322": ["As many Fog systems are also deployed on smart-phones and tablets such as in BCI applications, they can become a source of malware infection [125]."]} +{"25374274|84832337": []} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} diff --git a/edge/graph_174799171.jsonl b/edge/graph_174799171.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a667481b78417a51781fe96b0cfa520f6a33da6 --- /dev/null +++ b/edge/graph_174799171.jsonl @@ -0,0 +1,37 @@ +{"14000743|1932843": ["negative cost) is also considered in the rather large area of reinforcement learning (RL), see [16] for a survey."]} +{"15342220|1932843": ["ot need to be placed perfectly to be kicked and the kick speed can be adjusted. Additionally, the underlying DMPs are easy to extend and lend themselves well to a multitude of optimization algorithms [7]. The kick motion presented in this paper has been successfully used in the corner kick challenge competition at RoboCup 2015. Acknowledgement We would like to thank the members of the team B-Human fo"]} +{"13072941|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment (Bohg et al., 2014)."]} +{"3822383|1932843": ["We save these functions in the importance sampler of length Li [9].", "Modern stochastic reinforcement learning algorithms [9] can deal also with such large scale problems.", "In order to speed up learning and reject the unsuccessful attempts, the input data to (14) are reordered after each learning cycle using the importance sampling [9]."]} +{"10242377|8533795": []} +{"3444932|1708582": ["The interaction is characterized by two relevant aspects, being perception and action [6]; Each time an action is taken (driving actuators), a state transition can occur and a scalar reward is calculated using the observed results (evaluation of the quality of the action)."]} +{"3177253|8815923": []} +{"18389147|1932843": ["Neural networks are powerful function approximators, but they have significantly more parameters than the simpler linear models that are often used in robotic learning [23], [8].", "However, practical real-world applications of RL typically require significant engineering beyond the learning algorithm itself: an appropriate representation for the policy or value function must be chosen so as to achieve training times that are practical for physical hardware [8], and example demonstrations must often be provided to initialize the policy and mitigate safety concerns during training [9]."]} +{"18389147|6988770": ["Accelerating robotic learning by pooling experience from multiple robots has long been recognized as a promising direction in the domain of cloud robotics, where it is typically referred to as collective robotic learning [31], [32], [33], [34]."]} +{"2305273|1932843": ["Previous work on Reinforcement Learning typically do not consider highdimensional perceptual inputs [48]."]} +{"3978028|1932843": ["Policy search is a widely used technique to learn skills in robotics (Kober et al. 2013).", "Policy search is a widely used technique to learn skills in robotics (Kober et al., 2013)."]} +{"5349381|1932843": ["Reinforcement learning has been applied to a wide range of robotic problems, ranging from locomotion and manipulation to autonomous helicopter \ufb02ight [14, 4]."]} +{"3467239|1932843": ["The key insight is that, whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling\u2026", "\u2026whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling injured animals to\u2026", "The results also indicate that Intelligent Trial and Error signi\ufb01cantly outperforms previous algorithms for both damage recovery 63,12,64,65,66 and gait learning 67,62,68,48,69,32,61,42,17,49 , and can therefore be considered the state of the art.", "However, state-of-the-art learning algorithms are impractical because of the \u201ccurse of dimensionality\u201d 17 : the fastest algorithms constrain the search to a few behaviors (e.g. tuning only 2 parameters, requiring 5-10 minutes) or require human demonstrations 17 .", "Algorithms without these limitations take several hours 17 .", "7d, maximum p-value over each time step 10 \u2212 16 ), which is the current state of the art technique for direct policy search in robotics 32,61,42,17 .", "42 \u2022 Variant 3 (MAP-Elites in 6 dimensions + policy gradient): evaluates the bene\ufb01t of Bayesian optimization compared to a more classic, local search algorithm 17,62 ; there is no obvious way to use priors in policy gradient algorithms.", "This approach is a classic reinforcement learning algorithm for locomotion 17 and it is a baseline in many papers 32 .", "These results are consistent with the previously published results 62,32,42,17 , which optimize in 4 to 10 dimensions in a few hundred trials."]} +{"3467239|15700537": ["\u2026are expensive, because self-monitoring sensors are expensive, and are dif\ufb01-cult to design, because robot engineers cannot foresee every possible situation: this approach often fails either because the diagnosis is incorrect 12,13 or because an appropriate contingency plan is not provided 14 .", "Current damage recovery in robots typically involves two phases: self-diagnosis, and then selecting the best, pre-designed contingency plan 11,12,13,14 ."]} +{"30038641|8815923": ["Task frames can be generalized between objects by detecting object parts with similar shapes and estimating their poses [18], [19], [20].", "We will also investigate using pose synthesis methods to predict suitable object-object poses for establishing contacts between objects [36], [19]."]} +{"6206564|1932843": ["The choice of policy representation has often been a crucial component in the success of a RL procedure (Deisen-roth et al., 2013; Kober et al., 2013).", "Related Work The choice of policy representation has often been a crucial component in the success of a RL procedure (Deisenroth et al., 2013; Kober et al., 2013).", "Model-free methods have the advantage of handling arbitrary dynamical systems with minimal bias, but tend to be substantially less sampleefficient (Kober et al., 2013; Schulman et al., 2015).", "Model-free methods have the advantage of handling arbitrary dynamical systems with minimal bias, but tend to be substantially less sample-ef\ufb01cient (Kober et al., 2013; Schulman et al., 2015)."]} +{"15169885|206982591": ["[3] and Degallier & Ijspeert [4]."]} +{"1021085|18374428": []} +{"5240721|8815923": ["This makes the problem of grasping significantly more challenging (Bohg et al., 2014), as the algorithm must use more limited and potentially noisier information to detect a good grasp."]} +{"5240721|118142": ["[53], Bicchi and Kumar [2] and Shimoga [58]."]} +{"31305687|15830743": ["According to (Jimenez, 2013), an assembly is an object composed of individual parts in given relative placements, such that they do not overlap and each part is touching a subset of the assembly.", "Programming of industrial robot assembly tasks involves specifying low-level control algorithms to perform assembly operations (Nevins & Whitney, 1980) as well as the specification of an appropriate sequence of assembly operations that lead to the final product assembly (Jimenez, 2013)."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} +{"206093928|17464562": []} +{"10495010|1708582": ["Instead of recovering unknown or noisy state variables with recurrent neural networks, we use the POMDP agent [9] shown in Figure 1.", "complete observability is necessary for this assumption to be valid [9]."]} +{"2902050|1708582": ["Early approaches were thus limited to low-dimensional and discrete state and action spaces [4]."]} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"21047001|2265977": ["When coupled with state estimation [25], [26], it may be possible to define dynamic cost functions that change depending on the current state of a task."]} +{"52196235|7120308": ["as Nilsson\u2019s Teleo-Reactive programs [7] or as Hierarchical Task Networks [3], although the latter are typically used to plan ahead.", "They come in different forms, e. g. as Nilsson\u2019s Teleo-Reactive programs [7] or as Hierarchical Task Networks [3], although the latter are typically used to plan ahead."]} +{"53670210|1932843": ["Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs. By computing the \u201cdistance\" between nearby data windows, Kohlmorgen and Lemm [2001] segments human motion data using unsupervised learning.", "Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs.", "To address this issue, reinforcement learning can be used to improve the learned policy [Kober et al., 2013, Mnih et al., 2015, Silver et al., 2016].", "Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs. By computing the \u201cdistance\" between nearby data windows, Kohlmorgen and Lemm [2001] segments human motion data using unsupervised learning. Kuli\u0107 et al. [2008] proposed a method for segmenting and clustering whole body motions by using factorized HMMs.", "\u2026learning literature, methods that learn a forward model of the system and leverage it for learning a policy are often referred to as model-based, while methods that do not explicitly learn a forward model of the system are referred to as model-free [Kober et al., 2013, Deisenroth et al., 2013b]."]} +{"44154690|4884302": []} +{"44154690|1932843": ["(2009) for a survey on imitation learning and Kober and Peters (2012); Deisenroth et\u00a0al."]} +{"6138957|8815923": ["known objects to models in the database [4, 5, 8, 23, 27].", "performance according to physical models such as the ability to resist external wrenches [45], and empirical (or data-driven) methods [4], which typically use human labels [2] or the ability to lift the object in physical trials [43]."]} +{"3704450|11761017": ["\u2026et al. 2003); 7. review of free-form surface inspection techniques (Li and Gu 2004); 8. review of active recognition through next view planning (Roy et al. 2004); 9. review of 3D measurement quality metrics by environmental factors (MacKinnon et al. 2008b);\n10. review of multimodal sensor\u2026", "A review of sensor planning for active recognition can be found in Roy et al. (2004).", "review of active recognition through next view planning (Roy et al. 2004); 9."]} +{"12762691|1932843": ["RL has been a popular control method in robotics when dynamics are unknown or uncertain [16]."]} +{"12762691|4106288": ["While model-based deformation planning is relatively well-explored [16], highly accurate perception is often required for execution, e."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} diff --git a/edge/graph_174801039.jsonl b/edge/graph_174801039.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..962385326d507d6617ba2fd701609c63c2f4741b --- /dev/null +++ b/edge/graph_174801039.jsonl @@ -0,0 +1,75 @@ +{"125797142|14478191": [", Roijers et al. (2013). In our approach, we focus on retrieving an approximate Pareto-frontier, so that we do not have to commit to a particular family of scalarization functions."]} +{"699198|14843594": ["Although any conjugate distribution can be used as a prior in BO [32], we chose Gaussian Process because it is widely accepted as a good surrogate model for BO [33]."]} +{"44137785|9766972": ["nnnnnnn In fact, ensuring that all supposedly valid configurations of an SPL lead to well-formed and acceptable products has been a challenge for decades [20, 36, 37]."]} +{"44137785|8296351": ["A variability model defines the configuration options of an SPL; various formalisms ( e.g., attributed feature models, decision models) can be employed to structure and encode information [4, 5]."]} +{"67749648|9766972": ["Numerous techniques have been developed to verify product lines and configurable systems either based on testing, type checking, model checking, or theorem proving [40].", "It has a single, numeric parameter named coupling inner dimensionwhose domain of values is the interval [30, 40]."]} +{"104291797|17485266": ["), learning rate decays and improved stochastic gradient descent methods [29] (e."]} +{"104291797|9766972": []} +{"104291797|8296351": ["We start by modelling the variability within DNN architectures in a Feature1 Model (FM) [15] extended with attributes and feature cardinalities [2, 4, 5, 23], where each valid configuration (aka variant, product) of our FM corresponds to a deployable DNN architecture."]} +{"8395709|14022070": ["A natural choice in any approach to testing a software product line (with its characteristic feature combinations) is the use of Combinatorial Interaction Testing (CIT) [122]."]} +{"51987740|10091442": []} +{"51987740|8296351": ["Product configuration can be defined as = C S D ( , ) where S is the set of selected features, D is the set of deselected features, S, D\u2286F, and \u2229 = \u2205 S D (Benavides et al., 2010).", "Filter is an automated analysis operation where a reduced search space is explored in order to select a PL configuration (Benavides et al., 2010).", "Then, a subset of products S\u2032 are obtained S\u2032\u2286S from a complete set of products or solutions S (Benavides et al., 2010; Czarnecki and Kim, 2005)."]} +{"51987740|627405": ["To find and select relevant approaches for the SLR, we searched in five databases known as having relevant research in the field of computer science and engineering (Brereton et al., 2007), namely ACM Digital Library, Science Direct, IEEE Xplore, Scopus, and Springer Link."]} +{"51987740|11421382": ["However, a new research problem related to dynamic PLs has born to face this issue and is a wellknown challenge in the PL field (Capilla et al., 2014)."]} +{"575659|417250": ["The general idea is to model features at the domain level and implement a feature accordingly [24]."]} +{"11034812|9766972": ["Regarding software product lines, Th\u00fcm et al. survey analysis strategies [23], but they do not explore data-flow analysis approaches, neither performance or energy consumption estimation."]} +{"140068171|8296351": ["Mandatory configuration options can be easily computed based on the given constraints of the variability model [26]."]} +{"23879882|2795037": ["Historically, such models are developed manually using domain-specific knowledge [1, 12].", "When compared to manually-developed performance models [1, 6, 12], an important difference becomes apparent."]} +{"14770655|6076208": ["In addition, we will explore the potential of using our approach for configuration optimization [1], [9], [18], test generation [27], and bug prediction [12]."]} +{"14770655|417250": ["\u2026Guo\u2217, Krzysztof Czarnecki\u2217, Sven Apel\u2020, Norbert Siegmund\u2020, and Andrzej Wa\u0328sowski\u2021 \u2217University of Waterloo, Canada \u2020University of Passau, Germany\n\u2021IT University of Copenhagen, Denmark\nAbstract\u2014Configurable software systems allow stakeholders to derive program variants by selecting features.", "Variability-Aware Performance Prediction: A Statistical Learning Approach\nJianmei Guo\u2217, Krzysztof Czarnecki\u2217, Sven Apel\u2020, Norbert Siegmund\u2020, and Andrzej Wa\u0328sowski\u2021 \u2217University of Waterloo, Canada \u2020University of Passau, Germany\n\u2021IT University of Copenhagen, Denmark\nAbstract\u2014Configurable software systems allow stakeholders to derive program variants by selecting features."]} +{"3891296|9766972": ["Though formal methods and variability-aware program analysis can identify some defects [13, 53, 73], a significant effort would be needed to handle them in this technologically diverse stack.", "Though formal methods and program analysis can identify some classes of defects [13,73] \u2013 leading to variability-aware testing approaches (e.", ", [15,19,73]) to compare such approaches, many focused on subsets to make the anal-", ", [38]) to benefit from state-of-the-art reasoning techniques developed in software product line engineering [3,5,11,12,73]."]} +{"3891296|8296351": [", [38]) to benefit from state-of-the-art reasoning techniques developed in software product line engineering [3,5,11,12,73]."]} +{"78088771|8296351": ["These efforts led to a variety of tool-aided analyses that use constraint solvers [6]."]} +{"6940039|14022070": ["classify the methods for generating covering arrays into four main categories [30]: random search-based methods [34], heuristic search-based methods [6], [13], [15], [22], [36], mathematical methods [23], [24], [39], [40], and greedy methods [3], [5], [7], [12], [17], [26], [37], [38]."]} +{"9766972|8296351": ["\u2026focus only on testing are outside the scope of this article; we refer the reader to dedicated surveys on feature-model analysis [Janota et al. 2008; Benavides et al. 2010] and on product-line testing [Tevanlinna et al. 2004; Engstro\u0308m and Runeson 2011; Da Mota Silveira Neto et al. 2011; Oster et\u2026", ", feature-model analysis) or that focus only on testing are outside the scope of this article; we refer the reader to dedicated surveys on feature-model analysis [Janota et al. 2008; Benavides et al. 2010] and on product-line testing [Tevanlinna et al."]} +{"9766972|14022070": ["A typical strategy is to sample a smaller number of products, usually based on some coverage criteria, such that still reasonable statements on the correctness or other properties of the entire product line are possible [Oster et al. 2010; Perrouin et al. 2010; Nie and Leung 2011].", "While most coverage criteria such as pair-wise or t-wise coverage are often proposed for testing of single systems [Nie and Leung 2011] and product lines [Oster et al. 2010; Perrouin et al. 2010], they have also been applied to scale-type checking [Jayaraman et al. 2007; Liebig et al. 2013], static\u2026", "While most coverage criteria such as pair-wise or t-wise coverage are often proposed for testing of single systems [Nie and Leung 2011] and product lines [Oster et al.", "A frequently stated assumption is that most faults are caused by an interaction of only few features [Nie and Leung 2011; Kuhn et al. 2013].", "reasonable statements on the correctness or other properties of the entire product line are possible [Oster et al. 2010; Perrouin et al. 2010; Nie and Leung 2011]."]} +{"3282867|417250": []} +{"824863|9766972": ["Although researchers have proposed approaches to analyze complete configuration spaces in a sound fashion for some classes of defects [15, 20, 21, 54, 55], the vast majority of mature quality-assurance techniques consider only a single configuration at a time.", "However, detecting all configuration options from header files in a sound way is a difficult and expensive task, which requires some form of variability-aware analysis [2, 10, 20, 55]."]} +{"824863|14022070": ["For instance, they perform analyses per file instead of globally, and they ignore constraints among configuration options, header files, and build-system information [23, 25, 37, 47].", "Several researchers used the t-wise sampling algorithm to cover all t configuration option combinations [18,29,38,40], many studies without considering constraints [23, 25, 37, 47].", "In the second study, we explored the influence of considering constraints, header files, build-system information, and global analysis, which are often neglected in the literature and practice [23,25,37,47].", "[37] performed a survey with combinatorial testing approaches, but without considering the complexities of C, such as header files and build-system information."]} +{"14209744|8296351": ["The analysis of variability models deals with the computer-aided extraction of valuable information from variability models (Benavides et al. 2010).", "These anomalies were already identified and supported by other approaches when using feature models (Benavides et al. 2010; Trinidad et al. 2008).", "The specification of variability can be extended with measurable quality attributes (e.g., CPU and memory consumption) and constraints on these attributes, in order to express quality information about different products (Benavides et al. 2010).", "Although in this approach the authors provide a way to add attributes to features, they do not provide much detail about the values of the attributes, as acknowledged in Benavides et al. (2010).", "There are several proposals providing automated analysis of basic or cardinality-based feature models (Benavides et al. 2010).", "Currently, there are some approaches that extend feature models with quantitative attributes and constraints (Benavides et al. 2005, 2010).", "Benavides et al. (2010) define a conceptual framework, in which they propose a process for the automated analysis of feature models.", "However, feature models extended with attributes, where numerical values are included, have not received much attention (Benavides et al. 2010).", "As stated by Benavides et al. (2010), most proposals agree that an attribute should consist of a name, a domain and a value.", "As stated by Benavides et al. (2010), there is no consensus on a notation to define attributes.", ", CPU and memory consumption) and constraints on these attributes, in order to express quality information about different products (Benavides et al. 2010)."]} +{"16059634|14843594": ["By default, this function is set to a constant \u03bc(x) := \u03bc, which is inferred from the observations [30].", ", the number of configuration parameters), \u03b8` adjust the scales along the function dimensions and \u03b4 is a function gives the distance between two categorical variables using Kronecker delta [14], [30].", "Although several different criteria exist in the literature (see [30]), BO4CO uses Lower Confidence Bound (LCB) [30].", "LCB selects the next configuration by trade-off between exploitation and exploration:\nuLCB(x|M,S1:n) = argmin x\u2208X \u00b5t(x)\u2212 \u03ba\u03c3t(x), (10)\nwhere \u03ba can be set according to the objectives.", "d} on different dimensions as suggested in [37], [30], this technique is called Automatic Relevance Determination (ARD).", "Bayesian optimization is a sequential design strategy that allows us to perform global optimization of blackbox functions [30].", "BO4CO requires to store 3 vectors of size |X| for mean, variance and LCB estimates and a matrix of size |S1:t|\u00d7|S1:t| for K and of size |S1:t| for observations, making the memory requirement of O(3|X|+ |S1:Nmax |(|S1:Nmax |+ 1)) in total.", "Sections III-E1 and III-E2), we maximize the marginal likelihood [30] of the observations S1:t.", "Using Bayesian optimization [30], the tuning process can account for all the available prior information about a system and the acquired configuration data, and apply a variety of kernel estimators [23] to locate regions where optimal configuration may lie.", "The selection criteria is defined as u : X \u2192 R that selects xt+1 \u2208 X, should f(\u00b7) be evaluated next (step 7):\nxt+1 = argmax x\u2208X\nu(x|M,S1:t) (9)\nAlthough several different criteria exist in the literature (see [30]), BO4CO uses Lower Confidence Bound (LCB) [30]."]} +{"52839728|14843594": ["For instance, Bayesian optimization [55], a sequential design strategy, have been used for"]} +{"174803901|8296351": ["A feature model is a compact representation of the set of products of a software product line or configurations of a system, in terms of features and logical relationships among them [4]."]} +{"21670116|9766972": ["Numerous techniques have been developed to verify product lines and configurable systems either based on testing, type checking, model checking, or theorem proving [62], [62]\u2013[70]."]} +{"21670116|15273230": ["Other classi-\ufb01cation algorithms ( e.g., bagging, random forest, boosted trees), sampling ( e.g., over-sampling, under-sampling, or T-wise sampling), or dimensionality reduction techniques can be considered in the future [35], [36], [77]."]} +{"15627930|417250": ["In Software Product-Line (SPL) engineering, many software systems include a set of configuration options, called features [15, 1], that allow stakeholders to build system products fulfilling their functional requirements."]} +{"52067041|2213096": ["[32] focused on two popular DMSs (Kafka and AMQP) and explored the divergence in their features as well as their performance under varied testing workloads."]} +{"52067041|15619069": ["Koziolek et al. [38] surveyed the model-basedperformanceevaluationmethodsforcomponent-based softwaresystems."]} +{"18529089|9766972": ["Another research direction focuses on the identification of relevant products to test [10, 20, 21, 31, 32].", "Numerous techniques have been developed to verify efficiently a product line based on testing, type checking, model checking, or theorem proving [32]."]} +{"750363|960896": []} +{"7402885|16280101": ["CIT has a wealth of research literature and has been successfully applied to different types of software systems [7], [8], [9].", "Rationale: There has been a large number of techniques and algorithms developed for CIT that have been surveyed and analyzed (e.g. [9]), however their application focusing to SPL testing has not been collectively mapped and studied."]} +{"7402885|8296351": ["These relations are called Cross-Tree Constraints (CTCs) and as well as hierarchical feature relations they are usually expressed and checked using propositional logic, for further details refer to [18]."]} +{"7402885|14022070": ["CIT has a wealth of research literature and has been successfully applied to different types of software systems [7], [8], [9]."]} +{"40668993|206778480": ["[49] and Catal [50] provide recent reviews of the software fault prediction literature."]} +{"61456903|8296351": []} +{"61456903|16125167": ["For yet other concerns of the system that are currently not configurable, no tracing information may be present in the source code; in such cases, tracing links can be extracted manually or with semi-automatic feature-location tools (Biggerstaff et al. 1993; Robillard and Murphy 2002; Poshyvanyk et al. 2007; Cornelissen et al. 2009)."]} +{"61456903|206778272": []} +{"61456903|11607029": ["In practice, merges are mostly performed in a line-based fashion using textual patches, and only when there is a conflict (that is when different changes are applied to the same line) manual intervention is necessary (Mens 2002).", "Although language-specific merge mechanisms exist (Mens 2002; Apel et al. 2012b), merging is usually performed in a text-based fashion, oblivious to the meaning of the merged artifacts."]} +{"61456903|417250": []} +{"14338733|8296351": ["Different techniques for the automated analysis of feature models have been developed during the last 20 years [10].", "other feature models, products or product configurations; see [8, 10].", "The Boolean representation of feature models used in this paper is based on [10, 13].", "For the definition of the transformation of a feature model into a CSP, see [6, 10]."]} +{"14338733|8921624": ["A contemporary state of the art analysis for general formal verification techniques \u2013 also including techniques that use BDD, CSP and SAT solvers \u2013 is given in [14]."]} +{"16519740|8296351": ["Moreover Benavides et al. [13] state that one of the research challenge in feature modeling is \"to include feature attribute relationships for analyses on FMs and propose new operations of analysis leveraging extended FMs\" .", "Our restriction to propositional FMs means that our DSL does not fully support extended FMs with feature attributes or constraints expressed in logics that go beyond propositional logic (e.g., [13, 52, 53]).", "The presence of an Or-group in fm 1 can be seen as an anomaly , since the variability information is not correctly modeled [65, 13].", "An FM is basically an AND-OR graph with propositional constraints that characterizes the set of legal con\ufb01gurations supported by an SPL. FMs with formal semantics, reasoning techniques and tooling [6, 10, 11, 13] have become the de facto standard for managing variability.", "Listing 20: Setting the reasoning back-end for particular operations We now discuss empirical results, reported in the literature [47, 72, 13, 30, 73, 45], that can help to e \ufb03 ciently choose such reasoning back-ends for operators of FAMILIAR.", "The set of dead features of FM is noted deads The presence of dead features is usually considered as an anomaly [13] Such \"anomalies\" can be reported to an FM user.", "Benavides et al. conduct a literature review and claim that [13]: \"From the analysis of current solutions, we conclude that the analysis of FMs is maturing with an increasing number of contributions, operations, tools and empirical works.\"", "When applied to realistic SPLs, FMs can be large and complex , with possibly thousands of features related by numerous complex constraints [13, 15, 16].", "\u2026typically de\ufb01ned as the set of con\ufb01gurations that satisfy the constraints expressed in the FM. Automated analysis of FMs focuses on properties of an FM, for example, checking that an FM contains at least one product, and determining the number of valid con\ufb01gurations characterized by an FM [9, 13].", "The translation of FMs into logic representations allows to use reasoning techniques for numerous automated FM analyses, for example, enumerating con\ufb01gurations, counting con\ufb01gurations, interactive guidance during con\ufb01guration [13, 37]."]} +{"16519740|417250": ["An FM is basically an AND-OR graph with propositional constraints that characterizes the set of legal con\ufb01gurations supported by an SPL. FMs with formal semantics, reasoning techniques and tooling [6, 10, 11, 13] have become the de facto standard for managing variability.", "The variability of an SPL is usually described in terms of features, where a feature is a domain abstraction relevant to stakeholders, typically an increment in program functionality [5, 6]."]} +{"784510|14843594": ["While SMBO is gaining some popularity in other domains [5], [48], [49], this article is the first reporting a successful application of SMBO to software configuration."]} +{"1738167|15619069": ["Recent performance engineering research approaches [14] use architectural information and detailed performance behavior descriptions in order to build prediction models."]} +{"52175379|193574": []} +{"8497188|8296351": ["Benavides et al. [37] provide state-of-the-art information on the analysis of feature models, leveraging the operations employed in model veri\ufb01cation."]} +{"8497188|627405": ["The importance of SLR for software engineering has been addressed by a reasonable amount of studies, as deeply discussed in [12\u201315]."]} +{"174801039|53750327": []} +{"174801039|51987740": ["[64], there are three types of stakeholders\u2019 requirements: resource constraints (threshold such as response time < 1 hour), stakeholders\u2019 preferences (e."]} +{"174801039|4096056": []} +{"174801039|206988459": ["There are several reviews investigating the use of learning-based techniques in many other scenarios, such as spam filtering [134, 135], text-documents classification [136], automated planning [137], genomic medicine [138], electricity load forecasting [139], and others."]} +{"174801039|9766972": ["on sampling for product line testing, we refer to [19, 50, 54, 56, 102]."]} +{"174801039|8296351": ["Software product lines (SPLs), software generators, dynamic, self-adaptive systems, variability-intensive systems are well studied in the literature and enter in this class of configurable software systems [8, 12, 13, 32, 58, 71, 81, 95, 98]."]} +{"174801039|14774186": ["There are several reviews investigating the use of learning-based techniques in many other scenarios, such as spam filtering [134, 135], text-documents classification [136], automated planning [137], genomic medicine [138], electricity load forecasting [139], and others."]} +{"174801039|14526964": []} +{"52313565|8296351": ["Constraint solvers allow to derive consistent configurations from feature models with context properties [3].", "To guarantee this property at runtime, we perform design-time consistency checks as shown in [3, 44]."]} +{"205437084|8296351": [": Automated analysis of feature models 20 years later: A literature review [43] journal 2010 352 AUT-ANLYS Czarnecki et al."]} +{"15571638|14022070": ["Good surveys of ongoing research in CIT can be found in [15], [24], while an introduction to CIT and its efficacy in practice can be found in [20], [26]."]} +{"18098814|8296351": []} +{"46731283|8296351": ["Overall, users can encode variability information into an attributed feature model [3]."]} +{"52313318|9766972": ["The effort for each product can be reduced by applying regression techniques to software product lines [33, 55, 58, 68\u201370, In contrast to product-based analyses, a software product line can also be analyzed in a feature-based or family-based fashion [81].", "Special toolsareneeded fortheanalysisitselfor at least to transform the product line into a metaproduct simulating the behavior of all products [63, 75, 81, 83].", "While the family-based strategy has been extensively studied for static analyses [81] and is known to outperform sample-based analyses [24, 51], recent applications to testing indicate that product sampling is still necessary to complement family-based testing [63, 73, 76].", "Family-based analyses also consider domain artifacts instead of generated products, but incorporate valid combinations of features as defined in the feature model [56, 81].", "We first performed a targeted search and produced a sample of the key results in the field and we started with an initial classification given our experience in this area [2, 3, 39, 40, 81, 82] and adapted it in the process of studying the literature.", "Product sampling as discussed in this survey aims to reduce the number of products and is also known as sample-based analysis [81] or simply as sampling [82].", "However, this way feature interactions are not covered by the analyses [81].", "Considering all products separately in an unoptimized product-based analysis is typically not feasible [81].", "There are numerous strategies to cope with many software products during analysis and testing of software product lines [56, 81, 82]."]} +{"52313318|8296351": ["Features in a product line have different relations that can be described compactly by means of feature models [54], which can be graphically represented as a feature diagram ."]} +{"52313318|14022070": ["While our focus is on sampling for product lines, the roots of this research area are in combinatorial interaction testing [77].", "NIE et al. [77] discuss the combinatorial interaction testing techniques with respect to their important issues, methods, and applications."]} +{"50772985|8914588": ["This allows humans to remain in-the-loop [4] in order to: verify the system\u2019s behavior, react in emergency situations, and testify for the accountability of the adaptation policies [2, 17]."]} +{"57575050|8296351": []} diff --git a/edge/graph_174801251.jsonl b/edge/graph_174801251.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16c428788a6cf93e824141ad2170ecd48d14b5b2 --- /dev/null +++ b/edge/graph_174801251.jsonl @@ -0,0 +1,3 @@ +{"29958760|2818055": []} +{"24155228|2818055": []} +{"207770770|14078382": ["However, other alternatives may be more convenient [Hanson and Widom 1993]: to ignore the rule that raised the error and to continue processing other rules; to backtrack to the state when rule processing started and either restart rule processing or continue with the transaction; to adopt some contingency plan that endeavors to recover from the error state, possibly using the exception mechanism of the underlying database system.", "However, other alternatives may be more conve\u00adnient [Hanson and Widom 1993]: to ig\u00adnore the rule that \nraised the error and to continue processing other rules; to backtrack to the state when rule pro\u00adcessing \nstarted and either restart rule processing or continue with the transac\u00adtion; to adopt\u2026"]} diff --git a/edge/graph_174801551.jsonl b/edge/graph_174801551.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df6b84651b2d3b6aff1a426e0c3eea021db895d0 --- /dev/null +++ b/edge/graph_174801551.jsonl @@ -0,0 +1,15 @@ +{"51682527|239537": ["Thus, various methods of graph embedding have been developed and applied to different domains, such as visualisation [8], community and cluster identification [18], localisation of wireless devices [16], network routing [15] etc."]} +{"8008668|7064380": ["For instance, the Fiedler vector [1] [ 12 ] [13], i.e."]} +{"3215337|12161567": ["\u2026work, which we do not review in detail here\u2014including latent space models of social networks [32], embedding methods for statistical relational learning [42], manifold learning algorithms [37], and geometric deep learning [7]\u2014all of which involve representation learning with graph-structured data.", "We refer the reader to [32], [42], [37], and [7] for comprehensive overviews of these areas.", "Indeed, the literature on knowledge-graph completion\u2014where the goal is predict missing relations in knowledge graphs\u2014contains many related techniques for decoding a large number of edge types ( i.e. , relations) [42].", "A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12] and (ii) extend pairwise decoders with type-speci\ufb01c parameters [42, 52].", "More generally, link prediction is closely related to statistical relational learning [24], where a common task is to predict missing relations between entities in a knowledge graph [42].", "Adapted from [60]. edge types, the standard inner-product edge decoder ( i.e. , z i z j \u2248 A i,j ) can be replaced with a bilinear form [12, 42, 52]: where \u03c4 indexes a particular edge type and A \u03c4 is a learned parameter speci\ufb01c to edges of type \u03c4 ."]} +{"3215337|18986679": []} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"782975|12161567": ["It has many applications, such as friend recommendation in social networks [2], product recommendation in e-commerce [3], knowledge graph completion [4], finding interactions between proteins [5], and recovering missing reactions in metabolic networks [6]."]} +{"782975|207372751": ["Empirical comparisons of these heuristics on different networks can be found in [10, 17].", "For example, common neighbors may work well when predicting friendships in social networks or predicting coauthorships in collaboration networks, but has been shown to have poor performance on electrical grids and biological networks [10].", "A survey paper compared over 20 different heuristics and found that none of them performs consistently well across all networks [10]."]} +{"15705371|207372751": ["\u2026many computational methods have been developed to predict missing links from networks (Fouss et al., 2007; Li and Horvath, 2007; Ruan and Zhang, 2006; Radicchi et al., 2004; Tong et al., 2006), and reviewed in (Lu\u0308 and Zhou, 2011), some of which have been successfully applied to PPI networks.", "Recent advances in high-throughput techniques, such as yeast two-hybrid (Y2H) and tandem affinity purification, have enabled the production of a large amount of protein\u2013protein interaction (PPI) data (Gavin et al., 2006; Krogan et al., 2006; Tarassov et al., 2008; Yu et al., 2008)."]} +{"207238964|393948": ["Representation learning has long been an important problem of machine learning and many works aim at learning representations for samples [3, 35]."]} +{"207372751|1805048": ["tering 2 framework [30]. 2 Collaborative \ufb01ltering is the process of \ufb01ltering for information or patterns using techniques involving collaboration among multiple agents, viewpoints, data sources, etc. [29] 5 Node similarity can be de\ufb01ned by using the essential attributes of nodes: two nodes are considered to be similar if they have many common features [31]. However, the attributes of nodes are general"]} +{"14862572|18454590": ["A variety of different architectures and training algorithms have been proposed in the literature (see the comprehensive survey in [37])."]} +{"14873637|6116234": ["A survey of major visualization systems for biological network analysis, outlining their capabilities and functionality, is given by Pavlopoulos, Wegener, and Schneider (2008)."]} +{"14873637|15082313": ["As pointed out by Markowetz and Spang (2007) and Markowetz et al. (2007), high-dimensional phenotypic pro\ufb01les obtained from perturbation experiments in the form of expression data offer the potential for obtaining a comprehensive view of cellular functions, even though they exhibit a number of\u2026"]} +{"967595|3102110": ["Interested readers should consult references such as [33; 24]."]} +{"206595534|11746788": ["The task of Visual Question Answering has received growing interest in the recent years (see [17, 4, 25] for example)."]} diff --git a/edge/graph_174802426.jsonl b/edge/graph_174802426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6cbdd47f01af6e93f0737448239fbcf010a35598 --- /dev/null +++ b/edge/graph_174802426.jsonl @@ -0,0 +1,8 @@ +{"16196524|1596835": ["We refer the reader to two recent surveys by Wang et al. (2014) and Wang et al. (2015) for an overview of the binary hashing literature."]} +{"16196524|5671282": ["We refer the reader to two recent surveys by Wang et al. (2014) and Wang et al. (2015) for an overview of the binary hashing literature."]} +{"885218|1142636": []} +{"33652198|885218": ["A more formal de\u0080nition of OBIE was given by Wimalasuriya and Dou in [29]: \u201ca system that processes unstructured or semi-", "Ontology-based information extraction (OBIE) is a sub eld of information extraction.", "A more formal de nition of OBIE was given by Wimalasuriya and Dou in [29]: \u201ca system that processes unstructured or semistructured natural language text through a mechanism guided by ontologies to extract certain types of information and presents the output using ontologies.\u201d", "A very important part in an ontology-based information extraction system is the semantic lexicon [29].", "\u008cis step corresponds to the \u201cpreprocessor\u201d component of OBIE [29].", "But in many ways, our methodology is signi cantly di erent than that of [11]. at di erence exists despite incremented inconsistency nding being common to the two approaches. e main di erence is the fact that in [11], the inconsistencies were found by adding the discovered triplets to the existing ontology and running reasoners on it to see if the ontology has become inconsistent. is study, on the other hand, uses the ontology as a tool in information extraction, as per the concept of OBIE, and does the inconsistency detection outside.", "\u008cis methodology can be considered as a new way of doing OBIE in addition to the traditional and established methods discussed in [29].", "A base REGEX is built on the common usages of miRNA in abstracts and is matched to the counterparts in OMIT as per the descriptions in [29].", "As mentioned above, we use OBIE methods utilizing the OMIT ontology to extract the said concepts from the abstracts.", "Ontology-Based Information Extraction (OBIE) is a sub\u0080eld of information extraction where an ontology is used to guide the information extraction process [29].", "Even though it has a very extensive hierarchy of concepts and instances, it contains li le to no relationships between the said entities. us some of the most powerful conventional OBIE methods cannot be used alongside OMIT.", "Because OMIT lacks relationship data, such that traditional OBIE methods were not applicable, we used the Open Language Learning for Information Extraction (OLLIE) [21].", "One most important component of an ontology for an OBIE system is the set of relationships present in the ontology. ey are the ones that can be used to build extraction rules for the information extraction system. is is exactly the problem with OMIT.", "Ontology-Based Information Extraction (OBIE) is a sub eld of information extraction where an ontology is used to guide the information extraction process [29].", "Instead, it was decided to use the XML interface provided by PubMed and extract the abstracts locally. is step corresponds to the \u201cpreprocessor\u201d component of OBIE [29].", "Since these inconsistencies are rooted in very domain speci c medical jargon, they need to be analyzed by medical experts before ge ing incorporated into future studies.\nis study had to face the problem of the ontology that was being used not having the relationship rules that most of the established OBIE systems use. us, this study came up with a novel way to solve this problem by involving open information extraction systems to extract the relationships and then using the conventional OBIE systems to do the information extraction. is methodology can be considered as a new way of doing OBIE in addition to the traditional and established methods discussed in [29].", "\u008ce \u0080rst information extraction step is a gaze\u008aeer list approach as described in [29].", "Given that open information extraction does not depend on pre-con gured rules, we are using Open Information Extraction as a bridge between OMIT, which is an ontology with li le to no relations as described in section 2.1.1, and the conventional OBIE methods described in 2.1.2.", "Given that this study is focusing on the miRNA domain, we used the Ontology for MIcroRNA Targets (OMIT) [14] as the guiding ontology for the OBIE process."]} +{"21106538|6751108": ["unsupervised taggers based on the degree of automation of the training and tagging process [10].", "Supervised taggers work with pre-tagged corpora whereas unsupervised taggers do not depend on pre-tagged corpora [10].", "Both supervised and unsupervised models are mainly divided as rule-based and stochastic tagging [10]."]} +{"195833046|10929935": ["Languages with smaller digital data presence fail in producing better results using deep learning [7].", "The rule based approach was used in simple Sinhala natural language tasks [7]."]} +{"30016407|18487363": ["According to [2] and [8] Confidence Measuring techniques can be mainly divided in to two categories."]} +{"54439823|15782139": []} diff --git a/edge/graph_174804162.jsonl b/edge/graph_174804162.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d149987a092f83a07fac4047f6fbb16923d21d62 --- /dev/null +++ b/edge/graph_174804162.jsonl @@ -0,0 +1,5 @@ +{"12311042|17393937": []} +{"30574971|627405": ["Software maintenance has been under investigation for more than forty years, with numerous kinds of analysis performed by numerous authors, including those of this paper, and dealing with a variety of process and product aspects [1, 2, 3, 4, 5, 6, 15, 16, 17, 18, 19].", "Moreover, to avoid excluding any paper, we ran the queries in seven source engines (ACM digital Library, IEEEXplore Digital Library, Science Direct, Scopus, Google Scholar, Citeeser library, Inspec, Springer link, as suggested by Kitchenham [14] [15]."]} +{"17779241|206778272": ["Most of the research done in refactoring can be classified into three different categories (Mens and Tourw\u00e9, 2004): 1) Refactoring and the code structure: How does refactoring change the internal structure of the software? Such approaches use different techniques such as abstract syntax tree representation of source code to analyze which kind of graph transformations are achieved by refactoring and how different software metrics (coupling, cohesion, complexity etc."]} +{"22714123|17373041": ["Regarding the value from distributed ASD, such as production cost savings and quick time delivery [33], examining TD in distributed ASD becomes important."]} +{"13397760|206778480": ["[11] reported a systematic literature on studies about the performances of prediction models.", ", the estimation of where faults are likely to occur in the code) supports test effort, reduces costs, and improves the quality of software [11].", "The specific prediction model used in MIND is Linear Regression which is a standard reliable model for estimating variables expressed in a ratio scale WEKA [10] [11]."]} diff --git a/edge/graph_174804421.jsonl b/edge/graph_174804421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..739eb5c03e71fe3be98ec1b2d7f6dd2b1a643803 --- /dev/null +++ b/edge/graph_174804421.jsonl @@ -0,0 +1,15 @@ +{"18956074|1230643": ["Additionally, distributed MAC protocols have relatively low scalability, relatively low frequency spatial-reuse efficiency [ 3 ]."]} +{"39444322|205286988": []} +{"12024543|1230643": ["Section 4 describes the proposed algorithm to the problem of 3D localization in WSNs. Section 5 presents the simulation results.", "The definition of a localization system for sensor nodes [10], [11], [12], [13], [14] is a necessary prerequisite for many WSN applications.", "The importance of a localization system for WSNs arises from the need to appoint the collected data [5] and events associated with their place of occurrence [15].", "This positioning is done by a localization system, which is a key part of WSNs.", "Typically, localization systems for WSNs use a recursive approach [12], where a node estimates its location based on position information of three or more reference nodes (neighbors that know their positions).", "In this work, we propose an algorithm for the 3D localization problem in WSNs.", "The next section presents the definitions of localization systems in WSNs.", "A WSN is composed by n sensor nodes with rc communication range.", "Thus, we propose a 3D localization system that features three different contributions to the area of localization systems in WSNs.", "In this section we discuss some approaches in the literature for the localization problem in WSNs.", "Keywords-Wireless Sensor Networks, 3D Localization, Unmanned Aerial Vehicle;\nI. INTRODUCTION\nA Wireless Sensor Network (WSN) [1], [2], [3] is designed to detect events of interest of an application, collect data related to these events and report these data to a monitoring station.", "These nodes create the basis of most localization systems for WSNs.", "The simplest way to solve the localization problem in a WSN is to equip each sensor node with a GPS receiver.", "A Wireless Sensor Network (WSN) [1], [2], [3] is designed to detect events of interest of an application, collect data related to these events and report these data to a monitoring station.", "The localization problem in WSN is essential for many applications in this type of network."]} +{"61808702|61132": ["2016 [2] thorough survey of important issues in uAv networking", "Research on UAV-enabled networking is developing rapidly [1], [2], and various works have focused on security issues of UAV communications [3]; UAVs that coexist with device-to-device (D2D) links [4]; UAVenabled relaying systems [5]; optimal placement of UAVs [6]; UAV-enabled heterogeneous networks (HetNets) [7]; and energy-consumption optimization [8].", "Second, the wireless backhaul that connects UAVs to the core network is capacity limited, which causes significant energy consumption [2]."]} +{"3382645|61132": ["In [16], Gupta et al . discussed the key issues of routing and protocol in UAV-aided communications."]} +{"16906989|2206212": []} +{"16906989|1230643": ["Recent advances in micro-electro-mechanical systems (MEMS), low power and highly integrated digital electronics have led to the development of micro sensors [1,17]."]} +{"53281175|61132": ["Unmanned aerial vehicles (UAVs) are promising as a new application area for military and civil use due to the rapid deployment of network technologies such as low-cost Wi-Fi radio interfaces, sensors, global positioning system (GPS), and micro-embedded computers [1]."]} +{"56595844|22380247": ["Figure 3 shows the standardized protocol stacks for IoT defined by IEEE and IETF [6], [39]."]} +{"56595844|63317370": []} +{"56595844|1230643": ["INTRODUCTION Recent development of tiny, low-power, low-cost, and multi-functional wireless sensor nodes has been accelerated by advances in manufacturing, electronics, communication, and miniaturization [1]\u2013[3]."]} +{"14987990|1230643": ["WSNs are distributed systems of sensor nodes which are interconnected over wireless links [1], [2]."]} +{"19782726|2142482": []} +{"34707759|61132": ["Correspondingly, the performance of both the schemes in Case I is better than that in Case II, due to the fact that the interference will become stronger when the users served by UAV and BSs become closer, no matter which optimization is taken.", "In the proposed scheme, three adjacent cells were considered, and the trajectory was optimized to maximize the sum rate of edge users by avoiding the interference between BSs and UAV, with the rate requirements of all the mobile users satisfied.", "However, the traditional cellular networks are deployed typically with static base stations (BSs), which have several challenges.", "Assume that there is no interference between the users served by different BSs, due to the long distance.", "Nevertheless, no ground BSs were considered in [18], but the interference between BSs and UAV will affect the QoS of mobile users severely, which should be properly avoided by optimizing the UAV trajectory.", "The average rate of the kth edge user served by the UAV over N time slots can be expressed as\nR[k] = 1\nN N\u2211 n=1 \u03b1k[n] log2 ( 1 + puhuk I [k] u + \u03c32 ) ,\u2200k \u2208 K, (8)\nwhere\nI [k]u = 3\u2211\nm=1\nP\u03c10\n\u2225Gm\u2212Wk\u22252 (\u2211 i\u2208Im \u2223\u2223\u2223h[k]muv[i]m\u2223\u2223\u22232 )\n(9)\nis the interference to the kth edge user served by UAV from the BSs. h[k]mu accounts for small-scale channel fading from the mth BS to the kth edge user served by the UAV.", "Consider a cellular network with three adjacent BSs1 and a single UAV jointly serving the ground users, as shown in Fig.", "As a result, there has been growing interest in hybrid cellular networks assisted by unmanned aerial vehicle (UAV) as mobile BSs [3], due to their mobility and flexibility.", "Moreover, edge users often suffer from poor quality of service (QoS) due to long distances from BSs.", "First, the pressure on BSs is becoming more and more serious with increasing data traffic.", "Motivated by this, in this paper, we study a hybrid cellular network with UAV-aided offloading at the edges of multiple cells, by accounting for the interference between ground BSs and UAV.", "UAVs can not only help ground BSs to offload data traffic, but also enhance the channel conditions of edge users by flying close to them to provide line-of-sight (LOS) links [4].", "Finally,\n2\nsimulation results are presented to show the effectiveness of the proposed UAV trajectory scheme with the existence of multiple BSs.\nNotation: Italic letter a or A denotes that it is a scalar, and bold-face lower-case letter a and bold-face upper-case letter A denote a vector and a matrix, respectively. aT represents its transpose and \u2225a\u2225 denotes its Euclidean norm."]} +{"18896414|1230643": ["Studies in [2]-[4] also confirmed that power consumption was one of the key research concerns in wireless sensor networks."]} diff --git a/edge/graph_174809963.jsonl b/edge/graph_174809963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c37400eb46a16dd72380275d51d4ded2a7a99479 --- /dev/null +++ b/edge/graph_174809963.jsonl @@ -0,0 +1,6 @@ +{"33648105|15305793": []} +{"21696899|206051485": ["The integration is accomplished in two steps: registration (finding the geometric transformations) and then fusion (generating a single image from the two registered images) [5-6]."]} +{"11365288|15305793": ["B REAST cancer is one of the leading causes of death for women worldwide and it is expected that more than 8% of women will develop breast cancer during their lifetime [1]."]} +{"199615145|14122909": ["The segmentation results can be further enhanced via the application of maximum a posteriori segmentation estimation scheme based on the Bayesian learning paradigm [102]."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"51880861|2088679": ["In recent years, the CNNs were also gaining more popularity in analyzing medical images acquired by various modalities including detection tasks [18], [19]."]} diff --git a/edge/graph_174818808.jsonl b/edge/graph_174818808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..735b1fe85243a176cfeca36747118c023e1f62d0 --- /dev/null +++ b/edge/graph_174818808.jsonl @@ -0,0 +1,35 @@ +{"13873978|13392386": ["[19] presented a survey on mobile context-aware recommendation, which introduces"]} +{"21740903|365692": [", Logistic, Naive Bayes(NB),Decision Tree(DT) and Support Vector Machine) [20]\u2013[23].", ", Logistic [21], Naive Bayes (NB) [22], and Decision Tree (DT) [23])."]} +{"21740903|1805048": ["Intuitively, we attempt to optimize the prediction by leveraging Collaborative Filtering (CF) [29], [30], which is sensitive to data sparseness [31]."]} +{"16543136|27533715": ["The ICC is a commonly-used statistic for assessing IRR for ordinal data [21] such as ours."]} +{"30899409|8323376": ["The interested reader can \ufb01nd a comprehensive literature review in the work by Martin et al. [26]."]} +{"205437607|8323376": ["Though there has been previous work on app store analysis [6] , Harman et al."]} +{"3273328|8323376": []} +{"4030757|1805048": ["Collaborative filtering (CF) [34] uses the known preferences of a group of users to make recommendations or predictions of the unknown preferences for other users.", "Well-known model-based CF techniques include Bayesian belief nets (BNs) CF models [34], clustering CF models [36], and Singular Value Decomposition (SVD) CF models [22].", "There are generally two ways to build CF systems: memory-based methods and model-based methods [34]."]} +{"207208835|13392386": ["These context sensors can capture the rich [Sohn et al. 2005], and context-aware recommendation [Bader et al. 2011; Liu et al. 2013; jae Kim et al. 2010; Karatzoglou et al. 2010; Woerndl et al. 2007]."]} +{"12623142|11608263": []} +{"8651249|8323376": ["The app store is used to collect reviews and user meta-data in efforts to analyze how to enhance the apps [13].", "[13] who analyzed 45 studies on app store reviews performed between 2012 and 2015.", "While supporting app development currently is limited to app store mining [13], [18], [15], our work shows the importance of looking beyond the fence of the existing scourers of information to support development of apps [12]."]} +{"18973396|7165993": ["5) Oracle Problem: An oracle is typically needed to de- 1200 termine the required output of a program for a given input (Weyuker, 1982; Barr et al., 2015).", "5) Oracle Problem: An oracle is typically needed to determine the required output of a program for a given input [232], [233]."]} +{"18973396|3241708": ["The use of such an undefined workforce inherently1690 raises quality questions for crowdsourcing in general (Ipeirotis et al., 2010; Yuen et al., 2011; Allahbakhsh et al., 2013) as well as Crowdsourced Software Engineering (Stol and Fitzgerald, 2014c; Li et al., 2013; LaToza et al., 2013a;\u2026", "raises quality questions for crowdsourcing in general (Ipeirotis et al., 2010; Yuen et al., 2011; Allahbakhsh et al., 2013) as well as Crowdsourced Software Engineering (Stol and Fitzgerald, 2014c; Li et al."]} +{"18973396|205435103": ["Motivation is viewed as a critical factor for the success of a software project (Sharp et al., 2009; Beecham et al., 2008; 1650 Boehm et al., 1981)."]} +{"6911407|3913780": ["Thanks to the availability of the video content and related popular ity data via YouTube platform, where every minute over 100 hours of video is uploaded [21], resear chers were able to investigate other aspects related to the video content distribution, such as p rediction of the peak popularity time of the video [22] or identifying popularity evolution pattern s [23].", "Vi deo content exhibits similar heavytailed distribution, while its popularity is typically mea sured by the number of views [21]."]} +{"4666773|8323376": ["The ease of distribution and the large number of potential users, has made mobile applications development an attractive field for software engineers, but has also led to an increasing competition between developers [3] [4]."]} +{"4666773|8310135": ["For example, to improve the results for the Compatibility category we could employ a Named Entity Recognition [30] approach to locate and extract the names of mobile phones in user reviews and use that as a feature during the training of the URR classifiers.", "employ a Named Entity Recognition [30] approach to locate and extract the names of mobile phones in user reviews and use that as a feature during the training of the URR classifiers."]} +{"21738890|3348390": ["[22] highlights context-awareness from an IoT perspective, and presents the background of IoT paradigm, context-aware essentials and their relations to sensor networks."]} +{"21738890|3202525": ["[23], [24] survey context-awareness for recommender systems to build such intelligent systems that can better predict and anticipate the needs of users, and act more efficiently in response to their behaviors."]} +{"21738890|1077083": []} +{"21738890|8909218": []} +{"21738890|2187403": []} +{"21738890|1113420": ["[18] presents a detailed explanation of context, context types along", "In this regard, many context modeling schemes have been proposed [18], [21], [27]\u2013[29]."]} +{"21738890|20905429": []} +{"14504768|8323376": ["For an overview of app store analysis literature, we point the reader to our survey on app store analysis for software engineering [26]."]} +{"14504768|10281344": ["Causal Impact Analysis [6] is a form of causal inference [17, 21], which we use in this paper to identify sets of app releases that have caused a statistically significant (p \u2264 0."]} +{"13925572|13392386": ["Some of these works focus on constructing context-aware recommender systems on the platform of mobile device, which contains rich context-aware information (e.g., location, social network, and activity) [Zheng et al. 2010; Karatzoglou et al. 2012; Zhu et al. 2012; Liu et al. 2013]."]} +{"27262869|3913780": ["In recent years, popularity prediction on social media has attracted extensive attention because of its widespread applications, such as online marketing, trend detection and resource allocation (Tatar et al. 2014)."]} +{"27060711|10693567": []} +{"13907106|12161567": ["Many relational machine learning methods have been devised [24]."]} +{"28342216|18973396": []} +{"18069330|8323376": ["We constructed a dictionary containing the modal verb phrases for prohibitions and obligations respectively."]} +{"8323376|18973396": ["[119] argued that app store reviews can be used for \u201ccrowdsourcing\u201d [150]."]} +{"5447812|11608263": ["In machine learning the classification of documents into one or more categories is referred to as multi-label classification and can be solved via the binary relevance method [13] where a classifier for each category is trained."]} +{"3636121|393948": ["Following the convention in Representation Learning (RL) literature, in this work we will refer inherent factor vectors as lower-dimensional embedding or representation vectors interchangeably [2]."]} diff --git a/edge/graph_174820117.jsonl b/edge/graph_174820117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..325c2c3786f6c3c99b138943fb8c69ed7399c5e2 --- /dev/null +++ b/edge/graph_174820117.jsonl @@ -0,0 +1,9 @@ +{"51708607|9188816": []} +{"32832492|5313655": []} +{"3761653|9188816": []} +{"54512492|53112128": ["Therefore, Bloom Filter is deployed to various domains, namely, Big Data [9], Deduplication [10], [11], [12], Network Security [4], [13], Network Traf\ufb01c control [14], Name Lookup [15], [16], IP address lookup [17], [18], Biometric [19], [20], Bioin-formatics [21], [22], File System [23], Indexing,\u2026", "Let us assume, K j be a random query element where j = 1 , 2 , 3 , . . . . Article [4] de\ufb01nes false positive, true positive, false negative, and true negative as follows-\u2022 follows-\u2022 False positive: If K j (cid:54)\u2208 S and Bloom Filter returns K j \u2208 B , then the result of Bloom Filter is a false\u2026"]} +{"70340595|53112128": ["Moreover, Bloom Filter is also applied numerous areas, namely, Big Data, Cloud Computing, Networking, Security [2], Database, IoT, Bioinformatics, Biometrics, and Distributed system."]} +{"51646429|1508362": []} +{"59528690|11894197": []} +{"28507177|2623404": ["With the development of cloud computing [2] and Software-Defined Networking [3], this problem is becoming more and more serious [4]."]} +{"196088695|9188816": ["Fast point queries are helpful in downstream analysis, for example, in de Bruijn graph traversal (Chikhi and Rizk, 2013), and search (Solomon and Kingsford, 2016), and are also important for computing inner-products between datasets (Vinga and Almeida, 2003; Murray et al. , 2016)."]} diff --git a/edge/graph_174820155.jsonl b/edge/graph_174820155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1942d0ede0a3786443c03c73dbe925f4c09d5540 --- /dev/null +++ b/edge/graph_174820155.jsonl @@ -0,0 +1,15 @@ +{"125743874|8841611": []} +{"114146451|8841611": []} +{"23797417|5660618": ["However, the information exchange between the controller, sensor, and actuator through it makes the analysis and the design of an NCS complex, since it imposes additional challenges to the control system due to several issues: fixed or randomly distributed delays in transmitting information between components, unreliable communication links with information losses (packet dropout), or the consideration of band-limited channels (see [2],[3],[4],[5] for more information)."]} +{"12994589|5660618": ["Recent reviews of NCS solutions may be found in [11]\u2013[13]."]} +{"13803327|12998110": ["[59] argue that goal reasoning is also essential", "[59], the authors give examples of plan-invariant approaches.", ", beliefs and intentions the robot has [59]."]} +{"13803327|13427574": ["The literature on Human-Robot Interaction (HRI) is mainly concerned with safety [82\u201385]."]} +{"13803327|1932843": ["There are many types of architectures for implementing the \u201cthinking;\u201d some architectures may integrate Artificial Intelligence (AI) [16] techniques such as planning [14] and learning [17]."]} +{"13803327|18691290": ["[128] and [129]."]} +{"13803327|778117": ["As expected, the main disadvantage of MBD approaches is the overhead cost of constructing such analytical models [12].", "Pettersson [12] surveys execution monitoring approaches in robotics.", "As opposed to DX approaches, FDI approaches use numeric analytical behavioral models [12].", "The strength of knowledge-based approaches is the opportunity to combine model-based and data-driven approaches in a hybrid FDD approach [12], e.", "Given a plan, execution monitoring [12, 61] can compare the observed outcome of an action to the expected outcome.", "Note that execution monitoring for low-level components can be done by either model-based, Knowledge-based, data-driven approaches or a hybrid combination of the three [12].", "Some faults can only be detected within the context of another data instance; therefore, multivariate approaches are preferable to univariate approaches [12].", "In recent years, a few surveys have been presented [12, 13].", "In a broader sense, the combination of different data-driven approaches may result in a better, more accurate approach \u2013 by taking the advantages of each [12, 20].", "Statistical data-driven approaches, such as outlier-detection [52], may not be an attractive choice for an FDD mechanism as large amounts of data are to be processed online, carrying a heavy computational load, and might not detect the fault in time [12, 20]."]} +{"13803327|3330313": ["A statistical match (small deviation) classifies the online data as normal, and outliers (large deviations) are classified as anomalies or unknown faults [105]."]} +{"13803327|8767649": ["On the other hand, the interaction between robots is extensively researched, even in the context of interaction related faults [86]."]} +{"132343592|53065110": ["During these years, several investigations have been done about reviewing FO-controllers [29, 5, 6, 30]."]} +{"49654024|9588126": ["[17] overviews the main progress and results in distributed multi-agent coordination since 2006."]} +{"53626679|4895965": ["Particle Swarm Optimization (PSO) [78,79] [80,81] Ant Colony Optimization (ACO) [82] [83] Artificial Bees Colony Optimization (ABCO) [84,85] [86] Artificial Fish Swarm Algorithm (AFSA) [87,88] [89] Bacteria Foraging Optimization (BFO) [90] [91] Glowworm Swarm Optimization (GSO) [92] [93] Firefly Algorithm (FA) [94] [95] Bat Algorithm (BA) [96] [97] Grey Wolf Optimizer (GWO) [98] [99]"]} +{"4570156|1876323": [", robust variable structure control [15], stochastic fuzzy control [16], [17], neural-networkbased adaptive control [18], fuzzy adaptive control [19]\u2013[22]) to deal with these circumstances."]} diff --git a/edge/graph_174820302.jsonl b/edge/graph_174820302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddac462f0bbd7f127e3f35069067d0c1fb33f900 --- /dev/null +++ b/edge/graph_174820302.jsonl @@ -0,0 +1,63 @@ +{"17988817|3042864": []} +{"17988817|16335158": ["For example, it is very common in our daily life that \u2018\u2018usually someone (say, Bob) will do something (say, watch a talk show) with some mobile device during some time period (e.g., 2:00 pm to 3:00 pm)\u2019\u2019."]} +{"17988817|1230643": []} +{"21327091|17157304": []} +{"3161070|3042864": []} +{"35707005|1143625": ["Authors of a study 14 discuss processing and managing social media data concerning emergency events."]} +{"26603398|10505833": ["The biometric-based authentication [18, 19, 20] can be used to provide a unique and portable way for client identi\ufb01cation via making use of client\u2019s bio-characteristics, such as voice, face, iris and \ufb01ngerprint [21]."]} +{"34535167|3042864": []} +{"39694764|3042864": []} +{"39694764|13916820": []} +{"39694764|16654832": []} +{"106407576|13785718": []} +{"3031110|16654832": ["In the previous works [14\u201319], the MCC domain have been comprehensively investigated from various perspectives."]} +{"3031110|7287857": []} +{"3031110|2905017": ["Nonetheless, a guarantee of the persistency and redundancy of data is a challenging task in this architecture due to node mobility and a participants disconnection, which may cause data loss when the participant leaves the network or powers off the device [46]."]} +{"10820020|13785718": ["scenario [11]: theWBSN (signal acquisition, signal processing, and"]} +{"20811267|86629084": []} +{"3042864|14088590": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|2282515": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|10859599": ["In the second case, the applications execute in a real cloud, for instance, Amazon EC2 [34], Google App Engine [31], and Microsoft Live Mesh [84]."]} +{"205488613|37061063": ["Cloud computing adopts a service oriented architecture (SOA) and supports the functionalities of an integrated e-Health system as a number of inter-operable software services [25]."]} +{"14949705|16654832": ["Other limitations include CPU power, memory and battery life [5] and heterogeneous mobile platforms [6], [7].", "MCC is a concept which aims to mitigate these limitations by extending the capabilities of smart devices by employing cloud services, as required [5]."]} +{"14949705|8022785": ["Some challenges of IT medical services include security, data protection, data ownership, quality of services, mobility [34], privacy and compliance with regulations [35]."]} +{"1315434|3042864": ["[21] propose a model that is based on elastic applications technique [4].", "Currently, one of the main issues in the adoption of mobile cloud computing is that the traditional mobile application models do not support computation offloading [4] and the cloud service integration is only limited to storage and application-specific services, such as Apple\u2019s Siri and iCloud service.", "GPS, sensors), and user interaction frequency [4].", "For more details on how to achieve these objectives, readers are encouraged to read [4].", "Researchers refer to the term mobile cloud in multiple perspectives, namely infrastructure based and adhoc mobile cloud [4].", "However, the mobile devices are size constrained, due to which the advances in smartphone hardware are unable to cater to users/applications computational power and energy demands [4].", "Keeping a complete smartphone clone in the cloud is not an effective solution in terms of bandwidth utilization, storage space, application piracy [20], and data privacy [4].", "Moreover, the traditional cloud service solutions are unsuitable for mobile environment due to variation in the functional requirements of both technologies [4].", "The selection of data offloading scheme depends on the application type and plays a vital role in providing high generality in terms of application support [4].", "CloneCloud partitions the applications dynamically using static flow control graph [4]."]} +{"1315434|13785718": []} +{"16488720|20905429": []} +{"64094296|885218": ["In particular, we restrict the focus to semantic-based text annotation solutions that have proved their effectiveness for texts coming from various sources, while for an extensive survey on approaches and tools for ontology-based information extraction, we refer interested readers to [24]."]} +{"29627628|16514036": ["M-health applications will also benefit from the integration of more sophisticated body area network systems [24] that provide improved real-time sensing capability of health parameters."]} +{"29627628|13785718": ["Many of the recently proposed mobile cloud security frameworks tend to offload the security/privacy related tasks to the cloud [8]."]} +{"39542257|44461432": []} +{"39542257|16514036": []} +{"2901312|3042864": ["The emergence of mobile cloud computing (MCC) [10], [25], [34] facilitates reduction of task-execution time and real-time communication latency for such Smart Healthcare applications in the Smart City environment [12] [7] [37] [28] [1]."]} +{"3649350|16335158": ["Recently, integration of MCC with WSNs has been proposed in several research works [7], [8], [9], [10], [11], [12], [13], [14], [15]."]} +{"3649350|1230643": [", temperature, sound, pressure) [4], [5], [6]."]} +{"49557547|29859741": ["[79] review and discuss the usage of fog computing in healthcare."]} +{"49557547|1353379": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|3757239": ["A detailed discussion on the mobile edge can be found in [48]."]} +{"49557547|4427557": ["Other standards proposed by various researchers can be found in [62], [65], and [66].", "These features make LPWAN a suitable candidate for a large number of healthcare applications that do not require significant data rate and low latency [65]."]} +{"49557547|86629084": []} +{"49557547|21386749": ["A survey on the use of IoT for healthcare can be found in [70]."]} +{"49557547|62658395": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|393948": ["A thorough discussion of deep learning is covered in [50]\u2013[52]."]} +{"49557547|13172512": ["DEEP LEARNING NETWORK TRAFFIC CLASSIFICATION (DLNTC) COMPONENT Traffic classification is fundamental for any network, especially mobile cloud networks for determining anomalies, for traffic prioritization over a limited bandwidth, to ensure Quality of Service (QoS) [128], [129]."]} +{"40373772|3348390": ["The wide usages of emerging mobile Internet and Internet of Things (IoT) in industries have changed the way that information is acquired, stored, accessed, and delivered (He and Xu 2015; Xu, He, and Li 2014; Perera et al. 2014)."]} +{"4781659|27466065": ["[7]."]} +{"4923474|3042864": ["Recent work shows that cloud-computing technology [3]\u2013[7] provides a promising opportunity to save the energy of mobile devices [8]\u2013[10]."]} +{"2457101|7800459": ["2b, distance Matrix D is a 4 4 symmetric matrix with each component Dij indicating the expected distance between node i and node j."]} +{"37513083|16654832": []} +{"1217125|13785718": ["Agile Security and Privacy Mechanisms: Security and privacy are important concerns that impede successful deployment of clouds across the Internet (Khan et al., 2012)."]} +{"14782481|20905429": ["A body sensor network (BSN) consists of various miniaturized body sensors [1], [2] placed on a human body."]} +{"25112306|12434256": ["Similarly, in case of wireless capsule endoscopy (WCE), a number of images of small bowl are produced by a wireless capsule swollen by patient [9, 26]."]} +{"18886261|3348390": ["That means the communication protocol is responsible for the determination of the user\u2019s request (e.g., sending a newmedical data on bleeds, retrieving information on bleeds, and updating existing health data)."]} +{"2004321|13785718": ["According to survey 74% of IT Executives and Chief Information Officers are not willing to adopt cloud services due to the risks associated with security and privacy [4]."]} +{"5432702|3042864": []} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"6307044|3042864": ["We limit our survey to infrastructure based MCC applications where the hardware infrastructure remains static and provides services to the mobile users [9]."]} +{"10867548|16654832": ["Diverse objective functions are considered [4]; saving processing power, efficient bandwidth utilization, saving energy consumption [38], user preferences and execution cost [14].", "However, in spite of all the advancements in the recent years, SMDs are still low potential computing devices and mobile applications on the latest generation of smartphones and tablets are constraint by battery power, CPU potentials and memory capacity of the SMDs [4].", "Recently, a number of mobile cloud applications are witnessed which employ cloud computing to mitigate resources constraints of SMDs. Apple\u2019s iCloud [20] provides on demand access automatically to applications such as music, photos, apps, calendars, documents.", "Elastic applications are partitioned at runtime for the establishment of distributed processing platform [4]."]} +{"10445703|20905429": ["Recently, many mobile-based medical monitoring devices have been developed with the capability of processing certain types of physiological signals [1][2]."]} +{"8098012|7287857": ["However, smartphones\u2019 computational capabilities are constraint by miniature nature and current technological limitations that obligate computational augmentation [4], [5]."]} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"3634130|16514036": ["For example, although studies are focused on the interconnection between body area networks (BANs) [16]"]} +{"14151298|20905429": []} diff --git a/edge/graph_174821001.jsonl b/edge/graph_174821001.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..12b99fa471281aa866653b03ae9c0ad7c44e39cb --- /dev/null +++ b/edge/graph_174821001.jsonl @@ -0,0 +1,22 @@ +{"52075440|16392439": []} +{"106407449|13794961": []} +{"106407449|4909423": []} +{"106407449|3126100": []} +{"106407449|10213552": []} +{"106407449|14258620": []} +{"106407449|58311097": []} +{"17297515|16049649": ["For an overview, see [40, 70, 71]."]} +{"55186354|52877341": ["Alterna-tively, meta-based-approaches can be used to conducting a literature review and include the work of Mishra, Gunasekaran, Papadopoulos, and Childe (2016), which adopt a bibliometric and network analysis approach to obtain and compare in \ufb02 uential work in a speci \ufb01 c domain (in this example,\u2026"]} +{"55186354|2652752": ["\u2026and Teuteberg (2014) \u2013 BD logistics; Eembi, Ishak, Sidi, Affendey, and Mamat (2015) \u2013 on data veracity research for pro \ufb01 ling digital news portal, and Abdellatif, Capretz, and Ho (2015) \u2013 on software analytics (a distinct branch of BDA), this paper attempts to broaden the scope of their\u2026"]} +{"4077274|8125630": ["E-cube [21] introduces OLAP for multi-dimensional event stream analysis.", "Efficient online analytical processing (OLAP) [17] over such data is therefore required.", "In addition, they do not support OLAP functionality for multi-dimensional event analysis.", "Our proposal is based on online analytical processing (OLAP) systems [17] and multi-query optimisation [43].", "Page 45 of 48 Ac ce pt ed M an us cr ip t [17] S.", "An event concept hierarchy and an E-Cube hierarchy of queries with query concept refinement and query pattern refinement are introduced for supporting OLAP operations over multi-dimensional event streams.", "Others [13, 16] fail to support the optimisation of multiple nested pattern queries or OLAP functionality for multi-dimensional event analysis."]} +{"13489785|17769444": ["In [6], the authors mentioned that the Mica2 mote \u2013 based on the Atmel ATMega 128L microcontroller \u2013 takes roughly 3."]} +{"13489785|1230643": ["TinyOS operating system is used on this processor, which has 3500 bytes OS code space and 4500 bytes available code space [5]."]} +{"37413671|11050081": []} +{"65375395|22352825": []} +{"65375395|6736412": []} +{"65375395|3126100": []} +{"65375395|10213552": []} +{"65375395|5544758": []} +{"65375395|2398835": []} +{"117197616|1507400": []} +{"49558317|206743327": ["A data stream is abstracted into a Discrete Stream (DStream) structure that internally creates and uses a series of continuous RDDs [12].", "Spark is a framework that presents a data abstraction for big data analytics, called resilient distributed dataset (RDD) [10].", "1) Apache Spark \u2013 Spark Streaming\nSpark is a framework that presents a data abstraction for big data analytics, called resilient distributed dataset (RDD) [10].", "Spark Streaming supports RDD transformations as well as stream-specific operations for stream processing, resulting in new DStreams.", "RDDs support operations called transformations, which are applied to the entire dataset and result in new RDDs.", "As noted in [10], the batching introduces a latency of several seconds, depending on the", "They also possess a persistence model, which can persist datasets in memory, disks, or both, and a light-weight fault-tolerance mechanism which makes it possible to recreate RDDs from their dependent RDDs by using transformation logs (i.e. lineage) [11]."]} diff --git a/edge/graph_174821012.jsonl b/edge/graph_174821012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d49aba010895ad720844f27266f79168ecee75d6 --- /dev/null +++ b/edge/graph_174821012.jsonl @@ -0,0 +1,27 @@ +{"3147582|63927538": ["The 4 A's serve to highlight these measures [20].", "1 Architecture layers of big data analytics [20]"]} +{"59830444|14644374": []} +{"60333053|18879624": ["His recent research [50] opens a new path to assess objective Full Type-2, to Full Type-n fuzzy system research."]} +{"158801112|4909423": ["In order for this Big Data to be utilized effectively new challenges arise concerning fast analytics and data science as part of business intelligence (Larson, 2016)."]} +{"158801112|16866891": ["\u2026of natural selection for modelling stochastic systems (Whitley, 2001) and approaches such as genetic algorithms, genetic programming and swarm intelligence optimisation algorithms (Dreier, 2002) (Poi, 2008) (Parpinelli, 2011) can be used for optimising complex real-world systems and processes."]} +{"3126100|18503837": []} +{"3126100|393948": ["Representation learning aims to achieve that a reasonably sized learned representation can capture a huge number of possible input configurations, which can greatly facilitate improvements in both computational efficiency and statistical efficiency [25].", "Fortunately, representation learning [25, 26], a promising solution to learn the meaningful and useful representations of the data that make it easier to extract useful information when building classifiers or other predictors, has been presented and achieved impressive performance on many dimensionality reduction tasks [27]."]} +{"36011601|3126100": ["presented different machine learning algorithms for big data processing [7].", "From a data processing point of view, both supervised and unsupervised learning techniques are preferred for data analysis and reinforcement techniques are preferred for decision making problems [7]."]} +{"36011601|9928823": ["[9]."]} +{"36011601|393948": ["It is found that the performances of the machine learning algorithms are strongly influenced by the selection of data representation (or features) [16]."]} +{"13825257|10213552": ["In this section, several popular big data mining tools are discussed (Bifet 2013; Chen et al. 2014; Landset et al. 2015)."]} +{"13825257|2398835": ["Such a high volume of big data poses great challenges in capture, storage, sharing, analysis, and visualization (Khan et al. 2014).", "Specifically, the data include individual collections of photos and videos; social media data from YouTube, Face-book, Twitter, Instagram, and so on; and e-mails, sensor data, medical records, genomic datasets, geospatial maps, and so on (Khan et al. 2014).", "On the other hand, big data surveys mainly concentrate on big data challenges, techniques, and general applications (Siddiqa et al. 2016; Khan et al. 2014; Tsai et al. 2015).", "\u2026et al. 2007; Bhatt and Kankanhalli 2011; Hu et al. 2011) and big data analysis (Song et al. 2017; Siddiqa et al. 2016; Hashem et al. 2016; Agrawal et al. 2011; Che et al. 2013; Chen et al. 2014; Chen and Zhang 2014; Gandomi and Haider 2015; Hashem et al. 2015; Khan et al. 2014; Tsai et al. 2015).", "It is defined as all forms of structured/unstructured \u201chuman information\u201d (including text, image, audio, video, sensor, and social data) (Khan et al. 2014)."]} +{"13825257|16403716": ["For instance, content-based image/video retrieval, one of the most significant topics in current multimedia research, is studied in Hu et al. (2011), Bhatt and Kankanhalli (2011) review the challenges and opportunities in multimedia data mining, and multimedia wireless sensor networks are also\u2026", "\u2026into two main areas: multimedia analysis (Gao et al. 2017; Wang et al. 2017; Rawat et al. 2014; Akyildiz et al. 2007; Bhatt and Kankanhalli 2011; Hu et al. 2011) and big data analysis (Song et al. 2017; Siddiqa et al. 2016; Hashem et al. 2016; Agrawal et al. 2011; Che et al. 2013; Chen et al.\u2026", "Related work can be divided into two main areas: multimedia analysis (Gao et al. 2017; Wang et al. 2017; Rawat et al. 2014; Akyildiz et al. 2007; Bhatt and Kankanhalli 2011; Hu et al. 2011) and big data analysis (Song et al.", "(Hu et al. 2011) - Video retrieval An overview on content-based video indexing and retrieval - Discussing a single multimedia data type - Lack of big data background and its technical challenges"]} +{"13825257|6387482": ["To tackle such multi-modalities and obtain beneficial insight about the multimedia data, numerous fusion approaches have been developed in the literature (Atrey et al. 2010; Benmokhtar and Huet 2014).", "In general, multi-modal features can be categorized into visual (e.g., image and video), audio, and textual features as described in Atrey et al. (2010), Yang (2015), and Chen et al. (2006)."]} +{"13825257|1230643": []} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"15158310|31973880": ["In [32], in the context of compressive spectrum sensing [33], the authors used a Bayesian based recovery to recover the compressed signal at the received by exploiting the advantages of Bayesian models to deal with uncertainty in measurements during the compressive sensing processes."]} +{"15158310|15116409": ["In order to advance the use of DSA, several solutions have been proposed, including cognitive radio [1, 7]."]} +{"15158310|8974063": ["Recent studies have shown that with the current fixed spectrum allocation (FSA), radio frequency band utilization ranges from 15% to 85% [1].", "Consequently, an increase in demand of radio spectrum frequency bandwidth has been resulted [1, 10].", "In order to advance the use of DSA, several solutions have been proposed, including cognitive radio [1, 7].", "In 2003, the FCC suggested the opportunistic spectrum access (OSA), also called dynamic spectrum analysis (DSA), as a solution to address the spectrum allocation problems [1, 4]."]} +{"15158310|12601073": ["However, due to multipath fading, shadowing, or varying channel conditions [5, 11, 12], uncertainty affects this first process.", "It has the ability to observe and learn from its environment, adapt to the environmental conditions, and make decisions in order to use the radio spectrum more efficiently [5]."]} +{"5120196|16403716": []} +{"23887205|8281388": []} +{"23887205|11894197": []} +{"5947607|3330313": ["Indeed, most traditional data cleaning techniques belong to the data collection stage."]} +{"15483454|13867280": ["[Conference proceedings on memetic algorithms] [132] J."]} +{"11392154|393948": []} diff --git a/edge/graph_174821037.jsonl b/edge/graph_174821037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dca35554e4f70cb489a00aa83a1e7f41377b2346 --- /dev/null +++ b/edge/graph_174821037.jsonl @@ -0,0 +1,31 @@ +{"64970283|5664472": []} +{"126208198|393948": []} +{"4559772|4915696": []} +{"205466215|4351505": []} +{"13266485|4915696": ["This can be noticed by the number of papers that addressed the problem in the last ten years [1], [2].", "In this paper, we focus on trajectory-based and pixel-based approaches for unsupervised abnormal behavior detection [2]."]} +{"46959012|13808741": ["Visual tracking has been a subject of very active research and there are some surveys that review existing visual tracking algorithms [26], [58] and benchmarks [16]."]} +{"28242551|16525678": []} +{"28242551|12127129": [", 1997) which in 860 some environments is not as robust as the other two but is likely the fastest background subtraction technique robust enough to be used in real sites (Piccardi, 2004).", "However if we look at computational com-930 plexity, RGA is clearly simpler than methods based on Fourier Transforms (Piccardi, 2004) (Ozaktas et al., 1996).", "plexity, RGA is clearly simpler than methods based on Fourier Transforms (Piccardi, 2004) (Ozaktas et al.", "We have also implemented Running Gaussian Average (RGA) (Wren et al., 1997) which in860 some environments is not as robust as the other two but is likely the fastest background subtraction technique robust enough to be used in real sites (Piccardi, 2004).", "lists conventional approaches for motion detection: background subtraction (Piccardi, 2004), temporal filtering (Lipton et al.", "(Kim and Street, 2004)320 lists conventional approaches for motion detection: background\nsubtraction (Piccardi, 2004), temporal filtering (Lipton et al., 1998), and optical flow (Barron et al., 1994).", "(Piccardi, 2004) compares performance and accuracy of dif-385 ferent background subtraction methods, \u201dRunning Gaussian Average\u201d has the best speed performance while \u201dMixture of Gaussians\u201d (Stauffer and Grimson, 1999) or \u201dKernel density estimation\u201d (Elgammal et al., 2000) give better accuracy.", "Our IDS is not as robust as other methods in the literature but is faster1045 (Piccardi, 2004).", "(Piccardi, 2004) compares performance and accuracy of dif385 ferent background subtraction methods, \u201dRunning Gaussian Average\u201d has the best speed performance while \u201dMixture of Gaussians\u201d (Stauffer and Grimson, 1999) or \u201dKernel density estimation\u201d (Elgammal et al."]} +{"28242551|17516538": ["Another important weakness is that optical flow algorithms are very sensitive to noise, which is very330 common in video from CCTV cameras (Hu et al., 2004).", "common in video from CCTV cameras (Hu et al., 2004)."]} +{"28242551|2762290": []} +{"53103863|15093118": ["Currently, cameras are generally adopted to control the behavior of vehicles through tracking the traces of vehicles [8]\u2013[11] and thus can monitor different traffic conditions on roads, such as accidents and long queues [12], [13]."]} +{"53103863|1029120": ["The lower bound and the upper bound of a filter are determined by considering the relationship between the frequency and the mel-scale [5].", "Road traffic surveillance mainly includes the detection of accidents or road disruptions for quickly ensuring the intervention of rescue teams [5]."]} +{"64430186|1303485": []} +{"64430186|4915696": []} +{"64430186|61238909": []} +{"64430186|27637541": []} +{"64430186|17516538": []} +{"49536569|5664472": ["IN RECENT years, the task of human action recognition from video has been tackled with computer vision and machine learning techniques, see surveys [1]\u2013[3]."]} +{"49536569|1634674": []} +{"115997812|12724190": []} +{"115997812|14116122": []} +{"67753457|1303485": []} +{"45015382|1029120": []} +{"53038191|3110415": []} +{"3427632|14814753": []} +{"206592484|456491": []} +{"52812155|207060556": []} +{"52812155|9045232": []} +{"52007160|1634674": ["A detailed survey of anomalous event detection is presented in [4]."]} +{"39564351|1828831": []} +{"5417454|14970359": ["\u2026movements of the body [Fujiyoshi and Lipton 1998; Parameswaran and Chellappa 2006], simple action recognition such as walking and kicking [Moeslund and Granum 2001; Fathi and Mori 2008], and the recognition of complex actions that combine a series of singular actions, such as ballet\u2026"]} diff --git a/graph_1748480.jsonl b/edge/graph_1748480.jsonl similarity index 100% rename from graph_1748480.jsonl rename to edge/graph_1748480.jsonl diff --git a/edge/graph_17485266.jsonl b/edge/graph_17485266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..747547a3c353eca34bfd5b0e5321ce721fcd58c5 --- /dev/null +++ b/edge/graph_17485266.jsonl @@ -0,0 +1 @@ +{"12485056|393948": []} diff --git a/edge/graph_17500666.jsonl b/edge/graph_17500666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1750279.jsonl b/edge/graph_1750279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17504384.jsonl b/edge/graph_17504384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb5c0c26f43a9ee3fef5826e84a08c990c3d75e0 --- /dev/null +++ b/edge/graph_17504384.jsonl @@ -0,0 +1,4 @@ +{"59746235|62204132": ["Reviews on models of this type are given by Potts & Van Wassenhove [436] and Webster & Baker [554].", "Thus, as observed by Potts & Van Wassenhove [436], for xed F , there is a polynomial time dynamic programming algorithm of the type described above for problem F2jsf jCmax."]} +{"15215153|17504384": ["As a result, every job has a restricted set of machines to which it may be assigned, called its processing set, while the processing time of a job is independent of all the machines assigned to it; see, for example, [6, 20, 23]."]} +{"20772934|17504384": []} +{"62617749|17504384": ["As a result, every job has a restricted set of machines to which it may be assigned, called its processing set, while the processing time of a job is independent of all the machines assigned to it; see, for example, [6, 20, 23]."]} diff --git a/edge/graph_17508886.jsonl b/edge/graph_17508886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc607a89a995840fb358377a2af0bb25c7aabd42 --- /dev/null +++ b/edge/graph_17508886.jsonl @@ -0,0 +1,2 @@ +{"16993821|14077778": ["We can use any of the fast exponentiation methods (see [8]) to calculate this value (with some care), and also use (9) sometimes to speed things up further.", "A good recent survey of fast exponentiation methods is found in [8]."]} +{"11177956|385243": ["Specific fault attacks were developed for all widely used cryptographic algorithms including DES, AES, RSA and ECC; good surveys can be found in [14,30].", "Various methods of physical device manipulation and fault injection techniques exist; many of them were described in [2,6,14,36].", "A fault attack description must specify a fault model it assumes [14,30]."]} diff --git a/edge/graph_17514014.jsonl b/edge/graph_17514014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cd356c15c01767dd875bf9509fe088a72e9f63c --- /dev/null +++ b/edge/graph_17514014.jsonl @@ -0,0 +1,4 @@ +{"6576802|6116234": ["Comprehensive surveys of these tools comparing features and availability have been published recently 14 \u2013 16 , and we recommend them for an in-depth discussion of the network-based tools."]} +{"15919755|534755": []} +{"1965110|6116234": []} +{"14577343|16024051": []} diff --git a/edge/graph_17516538.jsonl b/edge/graph_17516538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13ce28c94025bb1fbf9ea39a58f833e5a59ce0ca --- /dev/null +++ b/edge/graph_17516538.jsonl @@ -0,0 +1,18 @@ +{"1049642|7788290": []} +{"3706389|7185733": ["Aiming at developing more natural and non-invasive human computer interfaces and recognizing human actions visually, tremendous research efforts have been devoted to visual tracking and analysis of human movements (Gavrila, 1999; Pavlovi\u0107 et al., 1997; Wu and Huang, 2001a)."]} +{"3706389|7788290": ["Aiming at developing more natural and non-invasive human computer interfaces and recognizing human actions visually, tremendous research efforts have been devoted to visual tracking and analysis of human movements (Gavrila, 1999; Pavlovi\u0107 et al., 1997; Wu and Huang, 2001a)."]} +{"18446469|7788290": ["analysis, we refer the reader to Gavrila [ 44 ], Aggarwal and Cai [45], and the special issue of the"]} +{"5402638|7788290": ["Many recent model-based methods have been proposed as described in [1] and in [6]."]} +{"6837802|7788290": []} +{"10496544|7788290": []} +{"14297649|53680608": ["Many of the goals are tracking the moving objects or recovering the 3D objects (Aggarwal and Nandhakumar , 1986) using optical flow or feature correspondence .", "Many of the goals are tracking the moving objects or recovering the 3D objects (Aggarwal and Nandhakumar, 1986) using optical flow or feature correspondence."]} +{"8714546|7185733": []} +{"8714546|7788290": []} +{"8150245|7788290": ["For more detailed descriptions of past works in the human tracking domain, see [1] and [ 14 ]."]} +{"46737148|7788290": ["More sophisticated tapered cylinders [7,21] or superquadrics [8] could be employed.", "Estimation of human motion is an active and growing research area [8]."]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"1917965|7788290": []} +{"2974306|7788290": ["We review vision methods used in detection, tracking and recognition of human movement in general, as they are closely related to gait recognition ([8, 1, 14 ] are good surveys on this topic)."]} +{"20477174|7788290": ["This paper provides a comprehensive taxonomy of the field that complements earlier reviews [1, 3]."]} +{"10962002|14970359": ["Good survey on visual analysis of human motion and vision-based motion-capture can be found in [7], [13]."]} +{"10962002|7788290": ["Good survey on visual analysis of human motion and vision-based motion-capture can be found in [7], [13]."]} diff --git a/edge/graph_17517833.jsonl b/edge/graph_17517833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d66412ff5a10c03628e3d651d21efd6f584a9717 --- /dev/null +++ b/edge/graph_17517833.jsonl @@ -0,0 +1,2 @@ +{"15838114|60455": ["Hartley et al. (2010) outline several active EI systems, Kosala and Blockeel\u2019s paper on mining the Web (Kosala and Blockeel 2000) raises many issues that are still relevant today and Howard Global Public Health 745 Burkom\u2019s tutorial slides 13 from ISDS 2008 provide an excellent foundation for\u2026", "( 2010 ) outline several active EI systems, Kosala and Blockeel's paper on mining the Web (Kosala and Blockeel 2000 ) raises many issues that are still relevant today and Howard Burkom's tutorial slides 13 from ISDS 2008 provide an excellent foundation for getting to grips with aberration detection along with R project software packages 10 ."]} +{"15838114|8310135": ["Following from NER is usually a stage of normalisation so that surface forms of names get linked to a unique identifier in a dictionary or ontology (i.e., a structured conceptual representation of the terms and relationships in the domain).", "\u2026start with a specialised module for recognising the names of important entities in the text (cid:1) a process called named entity recognition (NER) (Nadeau and Sekine 2007), which can be done using either data driven techniques such as support vector machines (SVMs) or rule-based techniques.", "Widely used open source toolkits include NLTK 9 , the R project's text mining package 10 and Sheffield University's GATE project 11 . ", "@Most text mining systems start with a specialised module for recognising the names of important entities in the text \u2013 a process called named entity recognition (NER) (Nadeau and Sekine 2007 ), which can be done using either data driven techniques such as support vector machines (SVMs) or rule-based techniques.", "@For computers to extract high quality information from text requires some degree of linguistic understanding. Systems typically require two sets of knowledge \u2013 domain knowledge that show the classes of objects of interest and their relationships and the patterns that show how these relationships are realised in the language of an actual text. ", "Most text mining systems start with a specialised module for recognising the names of important entities in the text (cid:1) a process called named entity recognition (NER) (Nadeau and Sekine 2007), which can be done using either data driven techniques such as support vector machines (SVMs) or rule-based techniques."]} diff --git a/edge/graph_17523051.jsonl b/edge/graph_17523051.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17525838.jsonl b/edge/graph_17525838.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17532138.jsonl b/edge/graph_17532138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2fbefaf49858cbdba2817909a6a082aa25e73a7 --- /dev/null +++ b/edge/graph_17532138.jsonl @@ -0,0 +1,4 @@ +{"16688823|4474193": ["Jin and Branke [30] give a comprehensive survey, which includes other ways of dealing with noisy fitness functions."]} +{"17456919|8530790": []} +{"20932183|10096622": ["In recent years, PSO has been extensively studied [42]\u2013[46] and widely used [47]\u2013[51]."]} +{"207419963|12419623": ["For a more detailed discussion about simulation-based optimization see the book [4] and papers [5], [6], [7] and [8] among others."]} diff --git a/edge/graph_17535534.jsonl b/edge/graph_17535534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45c4b391b7666207ce8821a80c77602d3e1e1192 --- /dev/null +++ b/edge/graph_17535534.jsonl @@ -0,0 +1 @@ +{"16806784|1895753": ["The largest simulation run on NCS had about 1 million single-compartment neurons connected by 1 trillion synapses and required about 30 min on 120 CPUs to simulate one biological second [37].", "Models are created based on an interpreted language (similar to C) [37], and one can write additional functions in the NMODL language.", "It has been used for biochemical reactions as well as more realistic small and large neural networks [37]."]} diff --git a/edge/graph_17542426.jsonl b/edge/graph_17542426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17554793.jsonl b/edge/graph_17554793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9191d269775c63d701cbc1c677707c4c78a8f916 --- /dev/null +++ b/edge/graph_17554793.jsonl @@ -0,0 +1,2 @@ +{"7638712|9270553": ["EEG-based BCIs can be operated by modulations of EEG rhythmic activity located over scalp sensorimotor areas that are induced by motor imagery tasks [ 4 ]; these modulations can be used to control a cursor on a computer screen [5] or a prosthetic device for limited hand movements [6][7]."]} +{"18261749|9270553": ["The idea of direct brain-computer communication was first mentioned in (Vidal 1973), and nowadays, more than 20 research groups all over the world are working on this problem (see Wolpaw et al. 2000b).", "\u2026knew the meaning of the firing of each and every neuron (and we are far away from that), the exact interpretation (the literal translation) of a \" thought \" would not be possible, since only the common firing of larger assemblies of neurons can be seen in EEG traces (see also Wolpaw et al. 2000a).", "\u2026classes (probably with the help of a neural net classifier, see section 6), and the minimum number of reliably discernible classes is two (e.g. Wolpaw et al. 2000b), since any human-computer interaction can be realized with a sufficiently large number of consecutive yes-no-questions (which\u2026"]} diff --git a/edge/graph_175549.jsonl b/edge/graph_175549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17557655.jsonl b/edge/graph_17557655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0de276af29e4ab04e7b03d6e53faa701722e1d24 --- /dev/null +++ b/edge/graph_17557655.jsonl @@ -0,0 +1,7 @@ +{"10207378|7800459": []} +{"1569392|7800459": []} +{"7068622|7800459": ["A recent survey [26] details the various works on exact repairs.", ", random linear network codes), or deterministic [26]\u2013[30]."]} +{"14903347|7800459": ["Recent works on this problem are surveyed in [9]."]} +{"1855604|7800459": ["\u2026or under investigation are Cloud storage systems, archival storage, and peer-to-peer storage systems like Cleversafe and Wuala (see e.g. [2], [3], [5], [8], [12]) One central problem in erasure coded distributed storage systems is that of maintaining an encoded representation when failures occur.", "One well-known class of erasure codes that have this property is the family of maximum distance separable (MDS) codes [5], [10].", "Explicit code constructions exist for the the two extreme points on this bandwidth-storage tradeoff, see e.g. [2], [5].", "Our second requirement is ef\ufb01cient exact repair [5]."]} +{"6101591|7800459": ["The question of whether this lower bo und is achievable via code constructions has received considerable attention in recent literature [4]\u2013[10]."]} +{"2302386|7800459": []} diff --git a/edge/graph_17561208.jsonl b/edge/graph_17561208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4265b6462684ab8227c586053bec7c168d090607 --- /dev/null +++ b/edge/graph_17561208.jsonl @@ -0,0 +1,2 @@ +{"6641619|5473785": []} +{"8615783|192934": ["In addition, more stringent performance requirements like speed, accuracy, and cost demand more sophisticated methods [2]."]} diff --git a/graph_1756215.jsonl b/edge/graph_1756215.jsonl similarity index 100% rename from graph_1756215.jsonl rename to edge/graph_1756215.jsonl diff --git a/edge/graph_17563582.jsonl b/edge/graph_17563582.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e4a28ba99d67854432a9c99e099f251ba3c8824 --- /dev/null +++ b/edge/graph_17563582.jsonl @@ -0,0 +1 @@ +{"8466561|9020157": []} diff --git a/edge/graph_17567998.jsonl b/edge/graph_17567998.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17572218.jsonl b/edge/graph_17572218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bcfe29b94fa3a383a6bf06b666af7b9e2a2dbe6 --- /dev/null +++ b/edge/graph_17572218.jsonl @@ -0,0 +1 @@ +{"14501088|205131192": []} diff --git a/edge/graph_17574321.jsonl b/edge/graph_17574321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c066cffcff9806c344b9bffedfc079b801979d18 --- /dev/null +++ b/edge/graph_17574321.jsonl @@ -0,0 +1 @@ +{"8970593|17574321": ["Even though VQ is often used for computational speedup techniques and lightweight practical implementations, it also provides competitive accuracy when combined with background model adaptation [4]."]} diff --git a/graph_1757577.jsonl b/edge/graph_1757577.jsonl similarity index 100% rename from graph_1757577.jsonl rename to edge/graph_1757577.jsonl diff --git a/edge/graph_17580068.jsonl b/edge/graph_17580068.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad979aa778d71416f34beafca98ac8cbb82e5cb9 --- /dev/null +++ b/edge/graph_17580068.jsonl @@ -0,0 +1,3 @@ +{"2694288|33644565": ["Furthermore, scholars have investigated the relationship between organizations\u2019 IT governance design and contingency factors using contingency theory (Brown 1997, Grant and Brown 2005, Sambamurthy and Zmud 1999, Weber et al. 2009, Weill and Ross 2005, Yajiong et al. 2008)."]} +{"5156422|35897447": ["According to the strategic IS literature, IT-dependent strategic initiatives consist of identifiable competitive moves that depend on the use of IT to be enacted, and are designed to lead to sustained improvements in a firm\u2019s competitive position (Piccoli and Ives, 2005)."]} +{"173580|15164501": []} diff --git a/edge/graph_17580183.jsonl b/edge/graph_17580183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17593458.jsonl b/edge/graph_17593458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17594297.jsonl b/edge/graph_17594297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2963cd7f078ff3afa0220cfc3c355fef28bb2891 --- /dev/null +++ b/edge/graph_17594297.jsonl @@ -0,0 +1,4 @@ +{"18000401|2457428": ["All of contributory key agreements can be divided into two classes: constant round key agreement, and non-constant round key agreement."]} +{"15436006|10334828": []} +{"2964711|17205659": []} +{"61819678|14441987": ["So if adopt our architecture and add related resource parameters in node data structure as shown in Table (1),( 2 ), they can provide many evaluating information for making decision."]} diff --git a/edge/graph_17594958.jsonl b/edge/graph_17594958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..def991462778a4feabebf286e299fd7b9fbd4ddc --- /dev/null +++ b/edge/graph_17594958.jsonl @@ -0,0 +1 @@ +{"121389452|9020157": ["For an introduction to wavelet theory, we refer to the extensive literature, for example, we mention Mallat (1998), Strang and Nguyen (1996), and Jawerth and Sweldens (1994)."]} diff --git a/edge/graph_17600064.jsonl b/edge/graph_17600064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1760234.jsonl b/edge/graph_1760234.jsonl similarity index 100% rename from graph_1760234.jsonl rename to edge/graph_1760234.jsonl diff --git a/edge/graph_17607030.jsonl b/edge/graph_17607030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f5370fd047af28f9caae74650c710b9e0deb7a7 --- /dev/null +++ b/edge/graph_17607030.jsonl @@ -0,0 +1,2 @@ +{"1502317|18194234": ["trust and reputation [45], Goal [46], Domain [47] and etc, which we call other context."]} +{"1502317|9123526": ["DAML-S [19], OWL-S [20], WSDL-S [21], WSML [22] and the like."]} diff --git a/edge/graph_17610410.jsonl b/edge/graph_17610410.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd3a936ea2a5e80fb11fc2adcbdb6dbde66766a1 --- /dev/null +++ b/edge/graph_17610410.jsonl @@ -0,0 +1 @@ +{"14336157|15247126": []} diff --git a/edge/graph_17611671.jsonl b/edge/graph_17611671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44ab002d0861d61ea6c1633ccc4fe4c12a923b45 --- /dev/null +++ b/edge/graph_17611671.jsonl @@ -0,0 +1 @@ +{"33382852|9175918": ["The close relationship has been observed in [4][5][6][7] between chaotic maps and cryptographic algorithms."]} diff --git a/edge/graph_17612458.jsonl b/edge/graph_17612458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17621502.jsonl b/edge/graph_17621502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1762301.jsonl b/edge/graph_1762301.jsonl similarity index 100% rename from graph_1762301.jsonl rename to edge/graph_1762301.jsonl diff --git a/edge/graph_17623152.jsonl b/edge/graph_17623152.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ecf00828af4ecb3e299311eea37820d1ac0232d3 --- /dev/null +++ b/edge/graph_17623152.jsonl @@ -0,0 +1 @@ +{"10957116|2357830": ["Ari Juels [7] summarized many previously proposed security models for tag-reader mutual authentication, which allow the tag to respond to only authorized and genuine readers."]} diff --git a/edge/graph_17623572.jsonl b/edge/graph_17623572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b7284fb617b0cd29f1a8e5ca948ca71f42e535c --- /dev/null +++ b/edge/graph_17623572.jsonl @@ -0,0 +1,2 @@ +{"1027180|14441987": []} +{"13088762|14441987": ["For instance, some of the literature [11, 13] examines and evaluates various routing"]} diff --git a/edge/graph_17629673.jsonl b/edge/graph_17629673.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bacadf6e9b076b57df45247f9f3b0921307373e7 --- /dev/null +++ b/edge/graph_17629673.jsonl @@ -0,0 +1 @@ +{"17013727|11894197": ["Basically, feature selection can be divided into four categories: Wrapper, Filter, Hybrid and Embedded methods [2],[3],[4]."]} diff --git a/edge/graph_17629688.jsonl b/edge/graph_17629688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36936fd207385afc6ef7f1591d7f1279b5a97c33 --- /dev/null +++ b/edge/graph_17629688.jsonl @@ -0,0 +1,5 @@ +{"16459995|9104850": ["Hierarchical caching in proxy servers has been extensively analyzed [35, 37]."]} +{"15600989|2256372": []} +{"2549945|9104850": []} +{"10311311|15849973": []} +{"27306371|10559330": []} diff --git a/edge/graph_17630359.jsonl b/edge/graph_17630359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17633335.jsonl b/edge/graph_17633335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d4431b064ff60a74269d9d62ac0b2dc4122e63a --- /dev/null +++ b/edge/graph_17633335.jsonl @@ -0,0 +1 @@ +{"53961807|9223669": ["To make the movingwindow size determination more reasonable, future trends should focus on the improved semi-variogram modeling (Garrigues et al., 2006) as well as local variances, fractals, and the wavelet transform (Wu & Li, 2009)."]} diff --git a/edge/graph_17633958.jsonl b/edge/graph_17633958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3459e6cef868e92943cbde5ed22907a4cb66e0af --- /dev/null +++ b/edge/graph_17633958.jsonl @@ -0,0 +1,2 @@ +{"7686374|15082313": []} +{"7686374|534755": []} diff --git a/edge/graph_17636314.jsonl b/edge/graph_17636314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17639145.jsonl b/edge/graph_17639145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17639662.jsonl b/edge/graph_17639662.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70f1a30ad3fa9819d4cf6816a52fa28eb408194a --- /dev/null +++ b/edge/graph_17639662.jsonl @@ -0,0 +1,2 @@ +{"205015030|6746689": ["(6) contour profiles; (7) zoning; (8) geometric moment invariants;"]} +{"10986469|15261053": []} diff --git a/edge/graph_17641462.jsonl b/edge/graph_17641462.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c0f38e758aa19a84e83b280be685346996ce13b --- /dev/null +++ b/edge/graph_17641462.jsonl @@ -0,0 +1,6 @@ +{"11934270|60455": ["It has severe problems."]} +{"1914653|8125630": ["3.2 Aggregation \nCapabilities One of the key characteristics of multidimensional databases is the ability to store measurements \n(such as sales numbers) in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "Moreover, this method \ncombines some of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "When con\u00adsidering multiple dimensions, we will \nfollow the multidimensional data model used for data warehousing and OLAP applications in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "\u2026his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "However, there are certain idiosyncrasies \npertaining to our model that make it different from the classical OLAP models used in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "This multidimensional approach is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions.", "Then, as shown in Figure 2, we \ncan compute an overall rating of how John Doe likes action movies as a genre by aggregating his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "\u2026is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"700267|8125630": []} +{"13889663|2357830": ["Although this is not the focus of our work, iScope can leverage existing third-party infrastructures for authentication and privacy/data protection [13, 14, 15, 16]."]} +{"21041169|1113420": ["Baldauf in [1] presented a survey on context-aware systems that contains"]} diff --git a/edge/graph_17643168.jsonl b/edge/graph_17643168.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17645320.jsonl b/edge/graph_17645320.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd3d590cc28dcbc7560b5469c3f9d035dc8ae906 --- /dev/null +++ b/edge/graph_17645320.jsonl @@ -0,0 +1,3 @@ +{"16129985|619938": []} +{"46633426|8953108": ["In different image processing applications object pixels are substantially different from background [1].", "[1] Mehmet Sezgin and Bulent Sankur present a survey over image thresholding methods.", "[1] Mehmet Sezgin and Bulent Sankur described 40 thresholding methods.", "Thresholding can be used in many widespread applications, such as: extracting logous, musical scores, endoscopic images, graphical context, cell images or knowledge representation [1], and in this paper dealing with text extraction.", "Recently there has been significant investigations in using the wavelet transform as a tool for improving thresholding [1, 3, 4, 5]."]} +{"9767458|8953108": ["Local methods are shown to perform better according to recent exhaustive survey of image binarization methods presented in [15]."]} diff --git a/edge/graph_17651388.jsonl b/edge/graph_17651388.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5f5dbf71f0c8ba7a31bb6ae3f6a968f0d0dd553 --- /dev/null +++ b/edge/graph_17651388.jsonl @@ -0,0 +1,3 @@ +{"33110597|1236072": ["Since wireless sensor nodes are power-constrained devices, long-distance transmissions should be kept to minimum in order to prolong the network lifetime [1], [2].", "Basically, any clustering algorithm in sensor networks is concerned with the management of clusters, which includes forming a suitable number of clusters, selecting a cluster head for each cluster, and controlling the data transmission within clusters and from cluster heads to the base station [1].", "It has been shown by Jamal and Ahmed [1] that within the three categories, cluster-based routing can effectively prolong network lifetimes."]} +{"29637718|1236072": ["I. INTRODUCTION\nIN-NETWORK data fusion and clustering have been shownas two effective techniques in reducing energy consumption in WSNs [1], [2], [3], [4].", "IN-NETWORK data fusion and clustering have been shown as two effective techniques in reducing energy consumption in WSNs [1], [2], [3], [4].", "In WSNs, sample data collected from different nodes can be with high spatial-temporal correlations [11].", "In this paper, a delay-aware network structure for WSNs with in-network data fusion is proposed.", "In this work, a delay-aware network structure WSNs with in-network data fusion is proposed."]} +{"18749275|1236072": ["By organizing wireless sensor nodes into clusters, energy dissipation is reduced by decreasing the number of nodes involved in long distance transmission [1]."]} diff --git a/edge/graph_17652653.jsonl b/edge/graph_17652653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17658947.jsonl b/edge/graph_17658947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..152ac7d164adcb6edd7d7f875b1e1dfe6e4d6955 --- /dev/null +++ b/edge/graph_17658947.jsonl @@ -0,0 +1,18 @@ +{"1738470|10500613": []} +{"1692360|10500613": ["Much research has been spent on developing the algorithms used by these tools, and indeed the authors of [13, 15] cite more than 20 different algorithms that can be used to generate candidate mappings."]} +{"1692360|913718": []} +{"11327119|191396": ["Above the timeline the central part of the visualisation can bee seen showing clusters as streams stacked over each other."]} +{"1517555|10500613": ["Previously, Rahm and Bernstein surveyed schema matching in databases [18]."]} +{"1517555|913718": ["To further validate our approach, we aligned three sets of ontologies provided by the Ontology Alignment Evaluation Initiative (OAEI) [19].", "The state of the art of ontology and schema alignment methodologies was recently surveyed by Shvaiko and Euzenat [19].", "The Ontology Alignment Evaluation Initiative (OAEI) [19] intends to provide such a method of comparison."]} +{"9318211|10500613": ["A recent survey on automatic schema matching proposed a solution taxonomy differentiating between schema-and instance-level, element-and structure-level, and language-and constraint-based matching approaches [ 18, 12].", "For this purpose, previous prototypes have followed either a so-called hybrid or composite combination of match techniques [ 18]."]} +{"499626|10500613": []} +{"7164601|10500613": ["Research into schema and ontology matching has been going on for more than 25 years now (see surveys [5, 79, 69, 73, 81] and various online lists, e."]} +{"7164601|913718": ["Research into schema and ontology matching has been going on for more than 25 years now (see surveys [5, 79, 69, 73, 81] and various online lists, e.", "There have been different formalizations of matching and its result, see, for example, [11, 53, 49, 16, 81, 24, 30]."]} +{"14205872|239537": []} +{"29697415|10500613": ["There has been important background work that can be used for ontology alignment: in discrete mathematics for matching graphs and trees [7, 11], in databases for reconciling and merging schemas [12], in machine learning for clustering compound objects described in a restricted \ufb01rst order logic [1].", "Roughly speaking, they can be classi\ufb01ed as (this complements the taxonomy provided in [12] and only considers features found in actual systems): terminological (T) comparing the labels of the entities; string-based (TS) does the terminological matching through string structure dissimilarity (e.g.,\u2026"]} +{"12874197|10500613": ["Rahm and Bernstein (Rahm and Bernstein, 2001) survey schema-integration approaches."]} +{"13169021|10500613": ["To reduce the manual effort required, many techniques and prototypes have been developed to semi-automatically solve the match problem [6], [11]."]} +{"1640541|10500613": []} +{"60792240|10500613": ["These approaches can be broadly categorized as: (a) Ontology Mapping (Maedche et al. 2002, Scharffe & de Bruijn 2005), (b) Ontology Alignment (Ehrig & Staab 2004, Ehrig & Sure 2004, Rahm & Bernstein 2001, Doan et al. 2004) and (c) Ontology Merging ((Noy & Musen 2000b, Dou et al. 2002)).", "Ontology alignment is generally described as the application of the so-called Match operator (cf. ( Rahm & Bernstein 2001 ))."]} +{"60792240|913718": ["For a more detailed classification of alignment techniques we refer to ( Shvaiko & Euzenat 2005 ).", "For more elaborate and detailed surveys we refer the reader to ( Shvaiko & Euzenat 2005, Noy 2004, Doan & Halevy 2005, Kalfoglou & Schorlemmer 2003)."]} +{"9073367|3821062": ["Ontologies provide a shared and common understanding about a specific domain [7]."]} diff --git a/edge/graph_17659316.jsonl b/edge/graph_17659316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd5a63a1969faee22172843867a36ed4b5b43ca4 --- /dev/null +++ b/edge/graph_17659316.jsonl @@ -0,0 +1,4 @@ +{"110316428|14441987": []} +{"55948814|14441987": []} +{"17623572|14441987": ["have been completed in recent decades [17,18]."]} +{"195918573|14441987": ["An example of the routing challenges currently faced by mobile ad hoc networks is outlined in a previous review paper [2].", "Also known as proactive, these protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [2].", "The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth, and high error rates [2]."]} diff --git a/edge/graph_17660476.jsonl b/edge/graph_17660476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17666847.jsonl b/edge/graph_17666847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..598c47c7ba3024dab2e3ad45fdcd0a886b29aa83 --- /dev/null +++ b/edge/graph_17666847.jsonl @@ -0,0 +1,6 @@ +{"15174012|10658846": ["Some previous work on Dynamic Power Management does incorporate the latency involved in transitioning from the on to the sleep state and vice versa [ 1 ].", "Benini, Bogliolo and De Micheli give an excellent review of this work [ 1 ]."]} +{"1870875|1236072": []} +{"18038729|1188683": ["It is therefore possible to spend a large amount of time for finding an optimal allocati on and scheduling offline and then deploy it on the field, instead of using on-line, dynamic (sub-optimal) schedulers [17, 18]."]} +{"195861552|10658846": []} +{"195869392|10658846": []} +{"17600862|10658846": ["In addition to processors, DPM can reduce power of input\u2013output (IO) devices [6], such as hard disks, network cards, and displays.", "The break-even time ( ) is the minimum length of an idle period to save power [6]; it depends on the device and is independent of requests or policies (Table I summarizes the symbols and their meanings in this paper)."]} diff --git a/graph_1766884.jsonl b/edge/graph_1766884.jsonl similarity index 100% rename from graph_1766884.jsonl rename to edge/graph_1766884.jsonl diff --git a/edge/graph_17669480.jsonl b/edge/graph_17669480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..272c7b6f051c50dd62dda32aa32a14d9fee3190d --- /dev/null +++ b/edge/graph_17669480.jsonl @@ -0,0 +1,12 @@ +{"17146413|1230643": []} +{"8249893|991041": ["Many papers have targeted the QoS routing problem, but only a few dealt with the general MCP problem [26]."]} +{"11154258|2835258": ["The GPSR uses a technique called greedy packet forwarding [4], [13]."]} +{"24745155|15471820": ["The GMPLS extends the features of the MPLS technology [6] and provides the means to manage heterogeneous network elements, such as an IP/MPLS routers and OXCs in the considered case."]} +{"7039303|11726599": []} +{"2624871|10559330": ["The idea behind IntServ [2] is borrowed from the paradigm of the telephony world and B-ISDN, i."]} +{"6458948|2835258": ["This assumption is the same as GPCR and many other position-based routing protocols [22], [23], [24]."]} +{"5842782|10287248": ["QoS routing has been receiving increasingly intensive attention in the wireline network domain [10].", "source node or by a distributed computation [10]."]} +{"6981637|10559330": ["Generally, these components work together to achieve specific goals that are specified by a QoS service model [18\u201320]."]} +{"10991789|141053": ["Several approaches are presented in [1,20]."]} +{"10991789|1762301": ["[6] provide a recent review of routing protocols developed for the ad hoc paradigm."]} +{"52801886|1775475": ["Numerous schemes have been proposed in the literature to overcome these shortcomings of the DCF mode (see survey papers [5], [ 6 ])."]} diff --git a/edge/graph_17670369.jsonl b/edge/graph_17670369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33ffabdb6e415a1d3eff2fac836d89e16e46614c --- /dev/null +++ b/edge/graph_17670369.jsonl @@ -0,0 +1,4 @@ +{"268920|15231229": []} +{"14846062|16709997": []} +{"16701201|15231229": ["Surveys use different classification criteria [1, 3, 4, 5], for instance, some gather algorithms for nonpolygonal models [1], while others consider simple primitives [3].", "Dynamic problems do not appear in the bibliography as often as the static ones, but they have been broadly studied [3, 39, 40, 41]."]} +{"1323931|16709997": ["An overview of 3D interaction techniques is presented by [ Han97 ]."]} diff --git a/edge/graph_17675973.jsonl b/edge/graph_17675973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c93a7d1b64606569997900c84495baa20f01f407 --- /dev/null +++ b/edge/graph_17675973.jsonl @@ -0,0 +1,12 @@ +{"116321298|8909218": ["The end result is a winwin situation: a higher satisfaction quotient from the subscribers\u2019 standpoint, and benefits to the network operators including a reduction in capital expenditures, macrocell traffic offloading, and increased revenues [4]."]} +{"18042732|3994942": ["Power saving mechanisms based on network and topology control are currently founded on the extension of traffic engineering and routing criteria to use (see [78] for a recent survey"]} +{"1297322|10658846": ["In [9], Lin et al. adopted DPM scheme.", "In contrast, the DPM scheme can save more energy by powering down all the components of computing servers.", "There are two main approaches for reducing energy consumption in computing servers: dynamic voltage frequency scaling (DVFS) [7] and dynamic power management (DPM) [8].", "There are two main approaches for reducing energy consumption in computing servers: dynamic voltage frequency scaling (DVFS) [7] and dynamic power management\n(DPM) [8]."]} +{"46223980|10837932": []} +{"13054771|10608305": ["Some authors classify DVFS under DPM techniques [17]."]} +{"13054771|10837932": ["This technique is known as the Adaptive Link Rate (ALR), stated by many [28,29] as the future of \u201cGreen Networking\u201d."]} +{"13054771|10658846": ["[19]."]} +{"10393256|7971188": ["The SWORD [45] resource discovery service builds upon a DHT, a structured overlay [46]."]} +{"4733938|10837932": ["Digital Object Identifier 10.1109/SURV.2012.102512.00019\nlinks and interfaces, which have been extensively surveyed in [2], [3] and [4]."]} +{"6672490|10658846": ["Thus, reducing the voltage, which consequently lead to the frequency reduction, provides substantial savings in power at the cost of slower program execution [18]."]} +{"35076520|8909218": ["Femtocells will also provide power and battery savings due to short range transmissions [1]."]} +{"13739988|10837932": ["Comprehensive surveys of a number activities for minimizing energy consumption in networks are recently published in [11] and [35]."]} diff --git a/edge/graph_17683338.jsonl b/edge/graph_17683338.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3243c652dab5da915bc576123569ff022414719c --- /dev/null +++ b/edge/graph_17683338.jsonl @@ -0,0 +1,4 @@ +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} diff --git a/edge/graph_17683961.jsonl b/edge/graph_17683961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17690746.jsonl b/edge/graph_17690746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..090b09e68e6e629f5f0ac6c79c9b81b62e24c53f --- /dev/null +++ b/edge/graph_17690746.jsonl @@ -0,0 +1,2 @@ +{"6903883|17690746": ["Recent reviews can be found in [12], [13]."]} +{"2024103|3054454": ["For example, in microphone arrays [36] or antenna arrays [37], we can divide the samples from each microphone / antenna into time intervals in order to obtain the ensemble of sampled signals B."]} diff --git a/edge/graph_17694107.jsonl b/edge/graph_17694107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6479cf83237720a675ce8fb54fd44d0c316837f7 --- /dev/null +++ b/edge/graph_17694107.jsonl @@ -0,0 +1,9 @@ +{"10691071|2457428": ["Significant amount of work has been done in the field of secure group communication on multicast networks (survey [16])."]} +{"16357250|2457428": ["The focus of the works in this area is on group key management ([19, 9, 22])."]} +{"2741260|14077778": []} +{"7852408|2457428": ["There exists a number of scalable key management protocols for secure group communication[13]."]} +{"12849396|2457428": ["The functions blind and mix are de.ned based on Dif.e-Hellman \nLogical Key Hi\u00aderarchy (DH-LKH) [Rafaeli and Hutchison 2003] as follows: blind(x)= gH(x) mod p and mix(gH(x) \nmod p, y)= gH(x)H(y) mod p.The parameter p is a large prime such that discrete log problem in the .eld \nZp is computationally intractable.", "A significant amount of work has been done in the field of secure group communication on multicast networks (survey [Rafaeli and Hutchison 2003]).", "The functions blind and mix are de.ned based on Dif.e-Hellman \nLogical Key Hi\u00aderarchy (DH-LKH) [Rafaeli and Hutchison 2003] as follows: blind(x)= gH(x) mod p and mix(gH(x) \nmod p, y)= gH(x)H(y) mod p.The parameter p is a large prime such that discrete log problem in the .eld \nZp is computationally\u2026", "The functions blind and mix are defined based on Diffie-Hellman logical key hierarchy (DH-LKH) [Rafaeli and Hutchison 2003] as follows: blind(x) = g mod p and mix(g mod p, y) = g mod p."]} +{"951593|2457428": []} +{"7692003|2457428": ["There are a number of scalable key management protocols for secure group communication [15]."]} +{"16289294|2457428": ["Significant amount of work has been done in the field of secure group communication [16, 5, 11] on multicast networks (survey [13])."]} +{"1323334|2457428": ["The alternative approach, used in this paper, relies on the structure of notifications (which are collections of attributevalue pairs)."]} diff --git a/edge/graph_17697651.jsonl b/edge/graph_17697651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1770055.jsonl b/edge/graph_1770055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17701359.jsonl b/edge/graph_17701359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94b2be441c0051e6cbac966b8029de6f83be6d7f --- /dev/null +++ b/edge/graph_17701359.jsonl @@ -0,0 +1,2 @@ +{"691081|192934": []} +{"823678|7788290": ["Tracking people, which raises many challenges due to the presence of large 3D, nonrigid motion, was extensively analyzed in [36], [1], [ 30 ], [73]."]} diff --git a/graph_1770774.jsonl b/edge/graph_1770774.jsonl similarity index 100% rename from graph_1770774.jsonl rename to edge/graph_1770774.jsonl diff --git a/edge/graph_17708140.jsonl b/edge/graph_17708140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17708892.jsonl b/edge/graph_17708892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49bf44faf60f4ca3752fdd40d8f834c4cae9f8f7 --- /dev/null +++ b/edge/graph_17708892.jsonl @@ -0,0 +1,2 @@ +{"21991783|14650419": ["In an effort to mitigate tag collision problem, various proposals aim at the design of collision resolution techniques for the performance improvement of FSA in RFID systems [8]."]} +{"21991783|25929315": ["The consideration of massive MTC in 3GPP systems has motivated the proposal of multiple amendments and alternative solutions to efficiently resolve congestion based on large number of devices, as compared in [14].", "3 The modules where validated in [14] and [53] by replicating the simulation conditions and parameters provided by the 3GPP in [54] and comparing the performance results."]} diff --git a/edge/graph_17710716.jsonl b/edge/graph_17710716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17713112.jsonl b/edge/graph_17713112.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..871a53cb49b54b820f278b435ab46d98b7eaebe5 --- /dev/null +++ b/edge/graph_17713112.jsonl @@ -0,0 +1,3 @@ +{"629325|14441987": []} +{"707282|905827": ["High delity data can also be used for fault detection [ 12 ], power grid health monitoring and fault forecasting [17]."]} +{"1837434|1236072": ["A large body of research on communication issues in mobile sensor networks has been carried out [Wang et al. 2007; Al-Karaki and Kamal 2004].", "\u2026and Reijers 2003]; time synchronization protocols [Elson and Roemer 2003; Sundararaman et al. 2005]; distributed storage services [Ratnasamy et al. 2002; Luo et al. 2007]; code deployment and reprogramming functionality [Wang et al. 2006]; and routing protocols [Al-Karaki and Kamal 2004].", "2006], and routing protocols [Al-Karaki and Kamal 2004]."]} diff --git a/edge/graph_17715655.jsonl b/edge/graph_17715655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17718436.jsonl b/edge/graph_17718436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17718674.jsonl b/edge/graph_17718674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17723546.jsonl b/edge/graph_17723546.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17726392.jsonl b/edge/graph_17726392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ecf398df7a4c7842e0d960dcb8cb2b33873c088 --- /dev/null +++ b/edge/graph_17726392.jsonl @@ -0,0 +1 @@ +{"18505094|6923178": ["Alternatively, the sensitivity is often plotted against the specificity (TP/(TP+FP)) (Baldi et al. (2000)).", "In any multi-class prediction problem with K classes, one obtains a K\u00d7K confusion matrix Z = zi j where zi j represents the number of times the observed value is predicted to be in class j whilst belonging to class i (Baldi et al. (2000)).", "In any multi-class prediction problem with K classes, one obtains a K \u00d7K confusion matrix Z = z i j where z i j represents the number of times the observed value is predicted to be in class j whilst belonging to class i (Baldi et al. (2000))."]} diff --git a/edge/graph_17728472.jsonl b/edge/graph_17728472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52a62b2428138c912b4312d500dc188a62cc350f --- /dev/null +++ b/edge/graph_17728472.jsonl @@ -0,0 +1,2 @@ +{"11423352|1708582": ["of problems, rather than as a set of techniques [13], [25]."]} +{"8918363|15744805": []} diff --git a/edge/graph_17734055.jsonl b/edge/graph_17734055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebc045d119f94b8ae1f795151da2c130b1b0ed70 --- /dev/null +++ b/edge/graph_17734055.jsonl @@ -0,0 +1,2 @@ +{"10393627|17323154": ["A recent review of this relatively large body of literature is given in [Carpineto et al. 2009]."]} +{"14181461|1708582": []} diff --git a/edge/graph_17736557.jsonl b/edge/graph_17736557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17737221.jsonl b/edge/graph_17737221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17745407.jsonl b/edge/graph_17745407.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17747015.jsonl b/edge/graph_17747015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56d47a8fce19783a4ee085bb20b04949fa922f6d --- /dev/null +++ b/edge/graph_17747015.jsonl @@ -0,0 +1,3 @@ +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"12705753|13726263": [", f\u0304m(I) are pruned if Equation 1 and Equation 2 hold [31]."]} +{"5689507|16013270": ["However, video is restricted by the sensor\u2019s field of vision while audio is limited to general locations or situations [8]."]} diff --git a/edge/graph_17750560.jsonl b/edge/graph_17750560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17751646.jsonl b/edge/graph_17751646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1775475.jsonl b/edge/graph_1775475.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17756238.jsonl b/edge/graph_17756238.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..315dbec225773764ecfd1146dab715810366af6a --- /dev/null +++ b/edge/graph_17756238.jsonl @@ -0,0 +1,9 @@ +{"5821839|13372227": []} +{"2944283|7919236": ["An integrated view on the user experience of recommender systems can be obtained by means of user-centric development (McNee et al. 2006b) and evaluation (Pu and Chen 2010; Pu et al. 2012).", "Pu and Chen (2010, see also Pu et al. 2012) provide an extensive questionnaire to test several specific experience concepts of recommender systems.", "\u2026the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012).", "However, several researchers have argued that there are other factors that influence the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012)."]} +{"2944283|14148655": ["\u2026recommenders let users rate items, (e.g. youtube.com, see also McNee et al. 2002; Cena et al. 2010; Gena et al. 2011), critique items (see also Chen and Pu 2012; Viappiani et al. 2006), assign weights to item attributes (see also H\u00e4ubl et al. 2004), or indicate their specific needs (e.g.\u2026", "The research on these different preference elicitation methods shows that they have a substantive impact on the user experience (Chen and Pu 2012).", "\u2026users may indicate their preference by assigning weights to attributes (H\u00e4ubl et al. 2004; Kramer 2007), prioritizing user needs (Felix et al. 2001; Stolze and Nart 2004; Hu and Pu 2009) or critiquing examples (Pu and Chen 2006; Pu et al. 2008; Chen and Pu 2012; Viappiani et al. 2006, 2008).", "Hu and Pu (2011, see also Chen and Pu 2012) show that putting a logical structure on the list of recommendations (specifically, categorizing the recommendations to reflect different trade-offs) leads to a higher perceived categorical diversity of the recommendations, a higher satisfaction and\u2026", "Whereas a substantial amount of research considers the individual qualities of these recommendations, little research has considered the composition of the list (Hu and Pu 2011; Chen and Pu 2012; Ziegler et al. 2005; Cooke et al. 2002)."]} +{"206745338|13372227": []} +{"9574924|17756238": []} +{"9574924|14826104": ["[4,90,17,47])."]} +{"9574924|60455": ["As a result, a parallel strand of work was developed, which is still very active, and aims at discovering patterns in Web structure, often called Web structure mining [40]."]} +{"9574924|1805048": ["A full account and survey of related work is beyond its scope and the interested reader is referred to earlier efforts (e.g. Mobasher 2007; Pierrakos et al. 2003; Su and Khoshgoftaar 2009)."]} +{"813983|2357830": ["Unfortunately, these systems are incompatible with the oft-cited goal of location privacy [17, 22, 23] since the device-tracking services can always monitor the location of an Internet-enabled device \u2014 even while the device is in its owner\u2019s possession."]} diff --git a/edge/graph_17758458.jsonl b/edge/graph_17758458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..efc72cab3eddf78f0b8ca72c1672fa6c9404c42e --- /dev/null +++ b/edge/graph_17758458.jsonl @@ -0,0 +1 @@ +{"110081619|1876323": []} diff --git a/edge/graph_17759638.jsonl b/edge/graph_17759638.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac97e1a01ed2fa72d470e7f51602bb13a6eef22e --- /dev/null +++ b/edge/graph_17759638.jsonl @@ -0,0 +1,10 @@ +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"118420008|9020157": []} +{"118420008|33286487": []} +{"18552662|206602044": ["The combination of reverberation and other adverse phenomena typical of meeting scenarios, e.g. poor Signal-to-Noise Ratio (SNR) or variable speech levels, further reduces the performance of such diarization systems [3]."]} +{"16829017|8777381": ["Furthermore, the concept of perceptual features is the same as the proximal cues used in, for example, the Brunswikian lens model of vocal/musical communication of emotion (e.g., Scherer, 2003; Juslin, 2000)."]} +{"11156835|192934": ["The system's complexity is low enough to allow operation on today's personal computers and other cost-effective computing platforms and the described algorithm is based on well-known feature extraction/pattern recognition concepts [13].", "The audio identification system presented here follows a general pattern recognition paradigm as described in [13]."]} +{"17574321|192934": []} +{"2571151|1225103": ["While this has many variations due to different speakers and their emotional state [29], it is still relatively well defined compared to general sound events.", "These include the speaking rate, the emotion and accent of the speaker [29] and also code-switching of the spoken language [65]."]} +{"2571151|17639662": ["Note that there are also previous works on geometry-based methods for object detection, typically using active shape models or geometric primitives such as boxes, spheres, etc [191, 192]."]} +{"13214920|33286487": ["In our technique, we selected Gaussian functions because of the best TF localization properties [11]."]} diff --git a/edge/graph_17766425.jsonl b/edge/graph_17766425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbe4802592b508c802e2fa906160a864b3bc173a --- /dev/null +++ b/edge/graph_17766425.jsonl @@ -0,0 +1,2 @@ +{"9881462|7839197": []} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} diff --git a/graph_177679.jsonl b/edge/graph_177679.jsonl similarity index 100% rename from graph_177679.jsonl rename to edge/graph_177679.jsonl diff --git a/edge/graph_17769444.jsonl b/edge/graph_17769444.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adea021650aea11b7bada32181f79b119c086e69 --- /dev/null +++ b/edge/graph_17769444.jsonl @@ -0,0 +1 @@ +{"7670339|1775475": ["Packet loss is a quality-of-service metric that indicates the effective end-to-end application throughput [4]."]} diff --git a/edge/graph_17772052.jsonl b/edge/graph_17772052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d20481928000c5e60bccc6b257d868216dffbc5 --- /dev/null +++ b/edge/graph_17772052.jsonl @@ -0,0 +1 @@ +{"98647831|8530790": []} diff --git a/edge/graph_17772382.jsonl b/edge/graph_17772382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d0f6dd72cf41c23b2ca2de56919d6b212f7ece0 --- /dev/null +++ b/edge/graph_17772382.jsonl @@ -0,0 +1,2 @@ +{"12912416|192934": ["Although sometimes the term incremental is used to define some learning method [3, 4, 5, 6], incrementality generally refers to the possibility of adjusting some parameters in the model on the grounds of new observations that become available when the system is already operational.", "A wide variety of algorithms have been published for detecting tables and analyzing their structure, and a number of surveys on table recognition and processing are available [3, 4, 5, 6, 7, 8].", "A similar tree-structured representation of the page layout is adopted in the work by Ishitani [6]."]} +{"14921089|14171067": ["The tree edit distance [15] provides a measure of distance (similarity) between two trees, defined as the least cost of edit operation to change a tree to another tree."]} diff --git a/edge/graph_17774107.jsonl b/edge/graph_17774107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08923e19189349d9fa3f5e9c7e0a3c529bbd4fba --- /dev/null +++ b/edge/graph_17774107.jsonl @@ -0,0 +1,5 @@ +{"19001140|12601073": []} +{"2509135|12452682": []} +{"21131380|12601073": ["In the literature, numerous different spectrum sensing techniques, each with their pros and cons, have been proposed; see for example [1] and references therein."]} +{"16324268|30443041": ["he problem of differentiating WM signals from other narrow-band signals is not considered in this work and may require techniques from patter recognition or robust statistics for an ef\ufb01cient solution [30], [31]. The paper is organized as follows. The noise characteristics are brie\ufb02y studied by using over-the-air signals in Section II. As expected, the noise comes out to be stationary with a nearGaussi"]} +{"24024656|12601073": ["There are methods based on energy detection, feature detection, as well as newly emerging methods such as eigenvalue-based and covariance based sensing (see for example [1] and references therein)."]} diff --git a/edge/graph_17774971.jsonl b/edge/graph_17774971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17776695.jsonl b/edge/graph_17776695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6db0a3e071f8a8c11ced2d48efa1794ab89590b2 --- /dev/null +++ b/edge/graph_17776695.jsonl @@ -0,0 +1,9 @@ +{"1612022|12127129": ["median of squares (LMeds), eigen-backgrounds, and illumination distribution analysis have been proposed [5], [6], [24], [25].", "An excellent review of background subtraction techniques is given in [24].", "A number of efficient silhouette extraction algorithms have been developed in the literature [24]."]} +{"18525978|27637541": []} +{"27637541|1634674": ["[118] distinguish between actions and activities by defining that", "Inside 2D-template-based approaches described in [118], temporal templates are estimated for each action class.", "methods shown in [118]); or based on the extraction of features from each silhouette and model the dynamics of the action explicitly (again, similarly to the aforementioned \u2018holistic\u2019 approaches).", "\u2019s [118] action modelling classification.", "[118], approaches for modelling actions can be categorised into three major classes: nonparametric, volumetric, and parametric time-series approaches (see Fig.", "In volumetric approaches, in contrast, features are not extracted on a frame-by-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case [118]."]} +{"27637541|12127129": []} +{"27637541|17516538": ["[41]; this paper is highly comprehensive, as it starts with motion detection and object classification and tracking, but also deals with HBU; it divides the approaches to this task", "There are handfuls of previous surveys which analyse and describe \u201chuman motion\u201d or \u201chuman behaviour understanding\u201d [41, 88, 43, 87, 121]; earlier works, as is logic, review lower level techniques (e.", "At the motion level, tasks such as movement detection, and background extraction and segmentation are faced [41, 72, 89]."]} +{"27637541|14970359": ["Moeslund et al. [72] defined an action taxonomy which has been adopted in later works and subsequent surveys.", "The work by Moeslund et al. [72], from 2006, can be divided into two major parts: pose and motion capture, and action recognition.", "In the work by Moeslund [71], bigger emphasis is given to the recognition of motion and actions, whereas activities and behaviours are treated to a minor extent.", "Pose estimation techniques are introduced next, and they are classified into three groups as in [71], according to the presence and use of an explicit model: model-free, indirect model use, direct model use.", "An evolution of the works presented under this section of Moeslund\u2019s work, can be seen in the papers by Bandouch, Beetz, et al. [7, 9]; which are commented later on.", "Nevertheless, the techniques revealed in [71] allow a greater understanding of current methods, and thus, both this and [34] can be used to introduce the"]} +{"27637541|7788290": []} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"14397159|1634674": ["1) and uses various computer vision approaches [2, 23, 39, 64, 65].", "Background subtraction is popularly used to separate moving objects (human shape here) in the scene by segmenting into background and foreground [64] and many methods are proposed in the literature [9, 14, 27, 54]."]} diff --git a/edge/graph_17776990.jsonl b/edge/graph_17776990.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17779575.jsonl b/edge/graph_17779575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f00a946eba18add140c7c8d831f038ca8dcad461 --- /dev/null +++ b/edge/graph_17779575.jsonl @@ -0,0 +1 @@ +{"33421176|12904520": ["Many studies have been done to save power consumption by caches and main memories [35]."]} diff --git a/edge/graph_17779926.jsonl b/edge/graph_17779926.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..606883937080d9d4cd2ea3ce58d6ac4ff31982a3 --- /dev/null +++ b/edge/graph_17779926.jsonl @@ -0,0 +1,2 @@ +{"6002419|3102110": []} +{"206592484|456491": []} diff --git a/edge/graph_17783665.jsonl b/edge/graph_17783665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c594aa1a42984c0d09269c0a7f2461076a9ff14 --- /dev/null +++ b/edge/graph_17783665.jsonl @@ -0,0 +1 @@ +{"6518311|2257431": []} diff --git a/edge/graph_17787193.jsonl b/edge/graph_17787193.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0488294f87adda2d4b6133ebbe9d743455d8addb --- /dev/null +++ b/edge/graph_17787193.jsonl @@ -0,0 +1,16 @@ +{"11973670|8909218": ["A promising alternative is to deploy femtocells (Chandrasekhar et al., 2008; Claussen et al., 2008) within people\u2019s homes and businesses to offload the macro network."]} +{"16798537|12884178": ["It is widely used to assess fairness in resource allocation in wireless communications, mainly in terms of achievable data rates [38]."]} +{"20723070|14889616": ["The video is encoded using the SVC coding standard where the base layer is broadcasted to all MTs within the cell.", "A serious limitation in SVC is that the loss of a lower layer hinders the device from decoding the dependent higher layer which requires an increase in coding rate.", "The SNC approach of [91] is applied in [96] for H.264 scalable video coding (SVC) where layered coding (LC) is applied assuming only a base\nlayer and one enhancement layer.", "Video source rate scalability can be achieved with temporal, spatial, or quality scalability [35].", "Hence, MDC offers an improved error resiliency to packet loss, but at the cost of increased required data rates due to redundancy techniques, such as forward error correction (FEC).", "In the case of SVC, the base layer is sent to a subset of the MTs on the LR, whereas one enhancement layer is sent to each MT on the LR.", "Regarding the segmentation approach, some works do not specify the content segmentation method (e.g., equal packets, MDC, SVC, etc.).", "If the content is a video, then it is usually segmented according to a video codec design such as H.264/AVC [34], SVC [35] or MDC [35], but still some works assume that the video is divided into packets without using a specific video codec [21].", "Descriptions can have the same importance (balanced MDC schemes) or different importance (unbalanced MDC schemes).", "The basic level of quality is supported by the base layer, which can be decoded by an H.264/AVC decoder, whereas the incremental improvements are provided by the enhancement layers which are specific to SVC. Video source rate scalability can be achieved with temporal, spatial, or quality scalability [35].", "Multiple description coding (MDC) provides error resilience since the video is encoded into several descriptions and it can be decoded with an arbitrary number of received descriptions [36].", "In the case of MDC, a description is assumed to be sent to each MT on LR.", "The architectures in [63], [64] investigate energy efficient cooperative video distribution for different video coding schemes such as MDC and SVC assuming time division multiplexing over both the LR and SR wireless interfaces.", "Another scenario is studied in the case of SVC when channel state information\n(CSI) is available at the BS.", "The increased coding overhead for MDC compared to SVC is also analyzed in [64].", "264/AVC [34], SVC [35] or MDC [35], but still some works assume that the video is divided into packets without using a specific video codec [21].", "To provide a networkfriendly design, the scalable video coding (SVC) extension of H.264 allows rate scalability at the bit-stream level by generating embedded bit-streams that are partially decodable at different bit rates with degrading quality [35].", "264 allows rate scalability at the bit-stream level by generating embedded bit-streams that are partially decodable at different bit rates with degrading quality [35]."]} +{"20723070|3540699": ["264/AVC is a block-oriented motion-compensation-based codec, it is designed to provide high coding efficiency that is suitable for wireless video transmission [34].", "264/AVC [34], SVC [35] or MDC [35], but still some works assume that the video is divided into packets without using a specific video codec [21]."]} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"9747089|1230643": ["At roughly the same time, there was growing interest in wireless sensor networks (WSNs), a topic which itself has spawned numerous conferences, journals, theses, and some commercial activities [5]."]} +{"647916|14889616": ["Finally, note that even with , i.e., without ad-hoc relay, the SV-BCMCS still outperforms BCMCS due to the employment of SVC coding and the optimal resource allocation.", "2) Scalable Video Settings: Three standard SVC test video sequences, Mobile, Football, and Bus in QCIF resolution (176 144 pixels) with a frame rate of 15 frames/s are used in the simulations.", "We use JSVM 9.19.7 reference software to encode the video sequences into one base layer and five SVC fidelity enhancement layers with medium-grain fidelity scalability (MGS), based on the SVC extensions of H.264/AVC [4].", "1 depicts the system architecture of SV-BCMCS as with eleven multicast users and three layers of SVC video, denoted by , , and .", "In SV-BCMCS, through SVC coding, video is encoded into one base layer and multiple enhancement layers.", "In [18] and [19], PSNR is modeled as a linear/piece-wise linear function of the video rate with SVC.", "In [15], the distortion with SVC is modeled as discrete values depending on the number of layers received by the user.", "In our solution, video is encoded into one base layer and multiple enhancement layers using scalable video coding (SVC) [4].", "However, the aforementioned works did not make use of SVC coded streams, which allow cellular operators to flexibly select the operating point so as to strike the right balance between the system-wide aggregate performance and individual users\u2019 perceived video quality."]} +{"16731587|8909218": ["Femto base stations [2] are currently receiving a lot of attention for this purpose."]} +{"9082268|8909218": ["A literature review about the technical details and challenges of femtocells can be found in Chandrasekhar et al. [13]."]} +{"258747|8909218": ["HNBs, however, pose a number of technical challenges as e.g. outlined in [ 2 ]."]} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"2465022|2835258": []} +{"16290804|8909218": ["We believe that this architecture can provide a low-cost solution in parallel with other solutions like HSPA and femtocells [5].", "Femtocell technique was initially proposed to improve indoor voice and data services of cellular networks [5]."]} +{"43686894|8909218": ["spectrum of cellular macro-cells to offer better indoor coverage to subscribers [10]."]} +{"5635417|8909218": ["We used the following notation (in x-y coordinate system): w i;j = weight (i.e., data request frequency)) of cell (i,j) The binary variable y i;j indicates if cell ( i; j ) is covered by any small frame.", "There are some previous studies that focus on an interesting type of o(cid:15)oading strategy called delay tolerant o(cid:15)oad-ing."]} +{"16135597|8909218": ["Among the existing solutions are traffic offloading via deployment of Femtocels for indoor environments whereby facing the technical challenges found in [22] and via WiFi APs."]} diff --git a/edge/graph_17789186.jsonl b/edge/graph_17789186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17790934.jsonl b/edge/graph_17790934.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17791256.jsonl b/edge/graph_17791256.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17794150.jsonl b/edge/graph_17794150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd34999071420693dd8d198a1939be73e059c3d8 --- /dev/null +++ b/edge/graph_17794150.jsonl @@ -0,0 +1,3 @@ +{"8063237|14295689": []} +{"54224505|191396": ["Clustering methods identify groups or better say clusters of a data set using a step by step approach in the sense that in each cluster there are objects similar to each other, yet different from those in other clusters (Lee & Yang, 2009; Rokach & Maimon, 2005; Xu & WunschII, 2005)."]} +{"40813780|191396": ["The goal is to find the set of partitions that optimizes the sum of costs for all clusters [36].", "Agglomerative Hierarchical Algorithm The agglomerative hierarchical algorithm implemented in this work uses the centroid linkage method based on [36] to determine the dissimilarity between clusters."]} diff --git a/edge/graph_17798299.jsonl b/edge/graph_17798299.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17798762.jsonl b/edge/graph_17798762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6079b33bda36e448847cc0fcc27c9ca2e0e9fde --- /dev/null +++ b/edge/graph_17798762.jsonl @@ -0,0 +1,3 @@ +{"229853|873842": ["Zelinsky [15] increases efficiency by using a quad-tree [ 131 to represent free and obstacle space, thus reducing the number of states to search in the planning space."]} +{"17611953|1708582": ["Reinforcement learning is learning from rewards and penalties that can be delayed (Kaelbling, Littman, and Moore 1996; Sutton and Barto 1998)."]} +{"5870037|1708582": []} diff --git a/edge/graph_17816684.jsonl b/edge/graph_17816684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f394eaf0b964647c94bbbfce5e50e33ee79c9f0c --- /dev/null +++ b/edge/graph_17816684.jsonl @@ -0,0 +1,5 @@ +{"14686298|2835258": ["The main benefit of position-based routing with respect to existing topology-based routing is the fact that no global route from the source to the destination must be created and maintained [12]."]} +{"2104866|7439310": ["We find that what makes video transport over the Internet and certain wireless networks successful is the existence of a relatively reliable path from the source to the receiver, such that packet losses and delays are within a predictable range, which can be effectively dealt with by applying appropriate error control and error concealment techniques [1]."]} +{"59803257|2835258": []} +{"59803257|14441987": ["In contrast to topology-based routing [11], position-based routing [4], [5] relies on vehicles\u2019 geographic position to"]} +{"8915906|2835258": ["With standard PBR, neighbor table entries time out periodically and can become stale.", "The VANET uses position-based routing (PBR) [8], because it outperforms topology-based routing in highly dynamic vehicular environments [9].", "The analysis of connectivity and delivery ratio of the PBR routing protocol is given in [6][7][14].", "Figure 3 illustrates loss probability over distance for standard PBR and PBR with lost link enhancement.", "Loss probability over distance (standard and lost-link enhanced PBR).", "3 0 0.2 0.4 0.6 0.8 1\n2500200015001000500\nF ra\nct io\nn o\nf p\nac k\net s\nlo st\nDistance between source and destination [m]\nStandard PBR PBR with \"lost link\"\nFig.", "The packet loss ratio for a constant packet stream is, however, huge: For a distance of 2000m, standard PBR shows a packet loss rate of almost two thirds, which can be significantly reduced to 22% when using cross-layer integration.", "However, PBR forwards packets \u2019on the fly\u2019 via different paths and flow state maintenance at intermediate hops is not possible.", "Thus, mechanisms such as static feedback or route failure feedback (i.e., assuming a single route per communication pair) are not applicable for VANETs using PBR.", "With standard PBR, loss probability increases to 26% for 500m distance.", "The second curve shows a linear increase of packet loss probability for PBR with the lost link enhancement."]} diff --git a/edge/graph_17818556.jsonl b/edge/graph_17818556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1addfbe07508ed8cace098f7717ab9a2bbcb12a4 --- /dev/null +++ b/edge/graph_17818556.jsonl @@ -0,0 +1,8 @@ +{"39780440|1236072": [", sensor\u2019s failure and battery depletion) [2, 3]."]} +{"38235305|1236072": []} +{"10092023|12817488": ["At each round, one of the SNs on the chain acts as a leader and sends the data collected from all other SNs directly to the base station."]} +{"20252443|15981390": []} +{"20252443|1230643": []} +{"9235879|205286988": ["An extended classification of the routing protocols suitable for sensor networks is given in (Akkaya and Younis, 2005).", "On the other hand, M/M/1 was considered for Akkaya and Younis (2005) like adequate for real-time traffic in WSNs."]} +{"30158855|1762301": ["However, some recent protocols are considered multipath hierarchical routing protocols such as Zone-based Hierarchical Link State (ZHLS) routing protocol (Joa-Ng and Lu, 1999) which can be considered a multipath if more than one virtual link exist (Abolhasan et al., 2004)."]} +{"5098464|1230643": []} diff --git a/edge/graph_17821707.jsonl b/edge/graph_17821707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..247b8642669b63629a3a79e60652a4dcbeb0f897 --- /dev/null +++ b/edge/graph_17821707.jsonl @@ -0,0 +1,7 @@ +{"67769263|5646762": []} +{"153831727|11608263": ["Therefore, each internal R&D project is assigned to one or several technologies from a specific technology list or taxonomy [8] by multi-label classification [9]."]} +{"32344880|60455": ["This enables to collect information based on an automated process for scanning all relevant internet websites (Kosala & Blockeel, 2000)."]} +{"7120895|3102110": ["An overview of data mining from the database perspective can be found in [CHY96]."]} +{"2184926|3241708": []} +{"54934748|10274533": ["Journal of King Saud Uni.1016/j.jksuci.2014.03.009\n2005; Thet et al., 2007), while others have applied OM to the mining of newspapers and websites in an effort to extract public opinion (Liang et al., 2011; Maragoudakis et al., 2011; Stepinski and Mittal, 2007).", ", 2007), while others have applied OM to the mining of newspapers and websites in an effort to extract public opinion (Liang et al., 2011; Maragoudakis et al., 2011; Stepinski and Mittal, 2007)."]} +{"54934748|8310135": ["According to a survey on named entity recognition (Nadeau and Sekine, 2007), the research on this task was relatively slow until 1995, which is evidenced by the fact that only 8 publications were found for the period 1991\u20131995."]} diff --git a/edge/graph_17827658.jsonl b/edge/graph_17827658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8a57eaee9c2a47a342fd464cf1c801fe4c99626 --- /dev/null +++ b/edge/graph_17827658.jsonl @@ -0,0 +1,2 @@ +{"33895868|508912": []} +{"33895868|8530790": []} diff --git a/edge/graph_17828359.jsonl b/edge/graph_17828359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17828887.jsonl b/edge/graph_17828887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c78893ec1effa3ffdd16355fe58c1e9f92b75a3b --- /dev/null +++ b/edge/graph_17828887.jsonl @@ -0,0 +1,2 @@ +{"44267490|62635091": []} +{"214797895|8530790": []} diff --git a/edge/graph_17844093.jsonl b/edge/graph_17844093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..592949d2886a10e37a6dd7560d6a474994f4ce5e --- /dev/null +++ b/edge/graph_17844093.jsonl @@ -0,0 +1 @@ +{"10530856|12817488": ["Generally, sensors are constrained in battery power, communication, and computation capability; therefore, reducing the power consumption is a critical concern for a WSN. Recently, a practical solution called data aggregation [1], [2], [3] was introduced."]} diff --git a/edge/graph_17857669.jsonl b/edge/graph_17857669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17858209.jsonl b/edge/graph_17858209.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17862523.jsonl b/edge/graph_17862523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0bb608fca52c4544ad8e64d0a31d236f0beeee9 --- /dev/null +++ b/edge/graph_17862523.jsonl @@ -0,0 +1,2 @@ +{"7395123|3102110": ["Data mining [Chen et al. 1996] is the process of extracting interesting (non-trivial, implicit, previously unknown and potentially useful) information or patterns from large information repositories such as: relational database, data warehouses, XML repository, etc."]} +{"8085527|60455": ["As a general data structure, graphs have become increasingly important in modeling sophisticated structures and their interactions, with broad applications including chemical informatics, bioinformatics, computer vision, video indexing, text retrieval, and Web analysis.", "and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "Web usage mining is focused on the analysis of users\u2019 activities when they browse and navigate through the Web.", "Web content mining is a knowledge discovery task of \ufb01nding information within web pages, while web structure mining aims to discover knowledge hidden in the structures linking web pages.", "Web mining is the application of data mining techniques to discover patterns and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "There are many applications involving sequence data, such as customer shopping sequences, Web clickstreams, and biological sequences.", "Web access patterns via association rule mining in web logs were proposed by (Chen et al. 1996; Pei et al. 2000; Srivastava et al. 2000; Punin and Krishnamoorthy 2001)."]} diff --git a/edge/graph_17864827.jsonl b/edge/graph_17864827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0ed0f09985a0f618fa170d7ad090941d9eff7a0 --- /dev/null +++ b/edge/graph_17864827.jsonl @@ -0,0 +1 @@ +{"16590035|1517662": ["The question answered in this paper is: what is the optimal strategy for an aircraft to avoid a convective weather region or other aircraft and reach its planned destination without incurring too much extra cost?", "In NextGen, the system\u2019s safety can be maintained or enhanced through three stages: aircraft trajectory prediction, conflict detection, and conflict resolution [3]."]} diff --git a/edge/graph_17869045.jsonl b/edge/graph_17869045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17872696.jsonl b/edge/graph_17872696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..629169751656900dc78b4a903ac371e3d6da16c7 --- /dev/null +++ b/edge/graph_17872696.jsonl @@ -0,0 +1 @@ +{"2480895|1230643": ["Another important category of multi-hop wireless networks is called wireless sensor networks [7], which comprise of a larger number of nodes (in thousands and more) scattered over some region."]} diff --git a/edge/graph_17872909.jsonl b/edge/graph_17872909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..144770eadcc21b79f6ef07f96e0f724f2f9d83ca --- /dev/null +++ b/edge/graph_17872909.jsonl @@ -0,0 +1,4 @@ +{"18382867|6746689": ["A lot of algorithms have been detailed in literature to solve the problem, both in sequential or parallel fashion (according to the classification proposed by Lam et al. (1992))."]} +{"36336399|3102110": []} +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} diff --git a/graph_1788607.jsonl b/edge/graph_1788607.jsonl similarity index 100% rename from graph_1788607.jsonl rename to edge/graph_1788607.jsonl diff --git a/edge/graph_17887301.jsonl b/edge/graph_17887301.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed416707db638f3e5731e7dbe96e0fe2ed9a3a1b --- /dev/null +++ b/edge/graph_17887301.jsonl @@ -0,0 +1 @@ +{"41910939|10762348": []} diff --git a/edge/graph_17887877.jsonl b/edge/graph_17887877.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17896770.jsonl b/edge/graph_17896770.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17904357.jsonl b/edge/graph_17904357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c17078eae1acbddbd655ac8c0628a49c88399569 --- /dev/null +++ b/edge/graph_17904357.jsonl @@ -0,0 +1,2 @@ +{"14966880|17904357": []} +{"10722197|10346685": []} diff --git a/edge/graph_17905276.jsonl b/edge/graph_17905276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e40551b273f9efa6162fd732f28e118d8748ffc --- /dev/null +++ b/edge/graph_17905276.jsonl @@ -0,0 +1,10 @@ +{"8532117|21841235": []} +{"15165057|1230643": []} +{"61167697|33286487": []} +{"14407540|1230643": ["The paper explores ways for using the mobility of network components in large multi-hop networks of resource constrained devices, like wireless sensor networks (WSNs) [1], [2]."]} +{"2666751|1230643": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"15319861|1230643": ["Recent advances in the development of Wireless Sensor Networks (WSNs) [1] reveal a new paradigm for monitoring infrastructure health [2], [3] and environmental conditions [4] owing to the availability of low powered millimetre-scale CPUs, highly integrated wireless transceiver circuits and various\u2026"]} +{"30043786|21841235": ["Since the origins of the railway in the XIX century most of the innovation and deployment efforts have been focused on aspects related to traffic management, driving support and monitoring of the train state [12]."]} +{"7064439|860072": ["One of the European HSR operators started in 2005 to offer Internet access to its customers [8]."]} +{"7064439|7482876": ["It is randomly time varying: its identifiability from the measurements, the statistical characterization, and the modeling is rather challenging [80], [81]."]} diff --git a/edge/graph_17906899.jsonl b/edge/graph_17906899.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17915182.jsonl b/edge/graph_17915182.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21e9b0b9d7c1f195acac3203a791de2b69588745 --- /dev/null +++ b/edge/graph_17915182.jsonl @@ -0,0 +1,3 @@ +{"15668013|495481": ["In this section, feature extraction and decision fusion strategy are explained in detail.", "\u2026complex conjugate and Vpq denotes a Zernike polynomial of order p and repetition q, which can be written as follows:\nVpq\u00f0r; h\u00de \u00bc Rpq\u00f0r\u00deejqh: \u00f02\u00de\nRpq is a real-valued radial polynomial of the form\nRpq\u00f0r\u00de \u00bc Xp jqj2 k\u00bc0 \u00f0 1\u00dek \u00f0p k\u00de! k! p\u00fe qj j2 k ! p qj j2 k ! rp 2k; \u00f03\u00de\nwhere p P q and p jqj is even."]} +{"15668013|36705207": []} +{"30450571|60779308": []} diff --git a/edge/graph_17917849.jsonl b/edge/graph_17917849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17917862.jsonl b/edge/graph_17917862.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d24a0388f2225702bb8e7b0cc8a5a9347ca4bce0 --- /dev/null +++ b/edge/graph_17917862.jsonl @@ -0,0 +1,3 @@ +{"1815901|14597368": []} +{"14630323|14597368": []} +{"15961223|14597368": []} diff --git a/edge/graph_17920117.jsonl b/edge/graph_17920117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eecc33d008918adefc3702de11fa5b9f1984c218 --- /dev/null +++ b/edge/graph_17920117.jsonl @@ -0,0 +1,6 @@ +{"17147450|12098072": ["Two kinds of E-CVT have been developed: double-rotor induction machines [20], [23] and doublerotor permanent-magnet machines [24].", "For this reason, they are also called electric CVT (E-CVT or EVT) [24].", "To reduce the system weight and size, the two machines can be merged, creating a single machine with double rotor [24]."]} +{"8687401|6327434": ["An application of the SPRT to the health monitoring of a satellite system has been reported in [87] and [117].", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12],", "The development of the change detection problem was stimulated by Wald in 1947 when \u201cSequential Analysis\u201d was published and a Sequential Probability Ratio Test (SPRT) was introduced.", "something has gone wrong or that everything is fine, and of determining the location as well as nature of the fault [12].", "Page also pointed out that this rule is equivalent to performing a SPRT.", "Given a sequence of observations , the Sequential Probability Ratio Test (SPRT) computes the cumulative sum of the log-likelihood ratio recursively as follows:\n(36)\nwhere\n(37)\nNote that denote the conditional PDF of the observation , which depends on the parameter .", "To overcome this, a multiple-hypothesis test based on the Shiryayev SPRT is used to enhance the robustness of the FDI scheme.", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12], [25], [26].", "The SPRT has been used to develop a dynamics sensor validation system for a reusable launch vehicle [116].", "Various survey papers on the change detection methods can be found in [12], [23], [25], and [113].", "It has been shown that for a certain criterion of optimality, this generalized Shiryayev SPRT detects and isolates a change in hypothesis in the conditionally independent measurement sequence in minimum time.", "In the rest of this section, we describe the details of the following hypothesis test techniques: the SPRT, the CUMSUM algorithm, the generalized likelihood ratio test, and the local approach.", "The CUSUM algorithm is equivalent to a repeated SPRT in which the test is restarted as long as the decision is taken in\nfavor of .", "The SPRT is used with a multivariate state estimation technique as core elements of a commercial dynamics sensor validation system, which is designed to improve launch vehicle mission safety and system dependability by enabling rapid development and cost effective maintenance of embeddable real-time software to reliably detect process-critical sensor failures.", "The well-known examples of these statistical test techniques are as follows:\na) sequential probability ratio test (SPRT); b) cumulative sum (CUSUM) algorithm; c) generalized likelihood ratio test; d) local approach.", "Malladi and Speyer [114] have derived an online multiple hypothesis Shiryayev SPRT [115] by adopting a dynamic programming approach."]} +{"30940579|905827": []} +{"11487346|6327434": ["Several state observers are designed for a definite fault signal and detected by a hypothesis test (Willsky, 1976).", "Process model-based fault-detection methods Different approaches for fault-detection using mathematical models have been developed in the last 20 years, see, e.g., (Chen & Patton, 1999; Frank, 1990; Gertler, 1998; Himmelblau, 1978; Isermann, 1984, 1997; Patton, Frank, & Clark, 2000; Willsky, 1976)."]} +{"14602225|6327434": []} +{"47573591|6327434": []} diff --git a/edge/graph_17926243.jsonl b/edge/graph_17926243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17929320.jsonl b/edge/graph_17929320.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de3571ec28650e8fa33e674af2f9f3ef4371b2e4 --- /dev/null +++ b/edge/graph_17929320.jsonl @@ -0,0 +1 @@ +{"120169988|18105696": []} diff --git a/edge/graph_17933903.jsonl b/edge/graph_17933903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17934515.jsonl b/edge/graph_17934515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07dd0b49ab78639f5a59b7757f2d5c89349f4e8e --- /dev/null +++ b/edge/graph_17934515.jsonl @@ -0,0 +1,13 @@ +{"14849693|5660618": ["Note that, although the string of vehicles is always in a leader\u2013follower configuration, different topologies may arise depending on the communication technology and its specific transmission ranges [26]."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"8940094|763939": ["Several mobility models have been proposed for ad hoc networks [76]."]} +{"35856505|12765832": ["A survey of NEMO is conducted in[17]."]} +{"16139052|7482876": ["Due to high mobility of vehicles, communication channels are susceptible to fast fading, whereby reliable links cannot be guaranteed [98]."]} +{"16139052|763939": ["In the literature, many research studies have been undertaken so as to provide a close-to-reality mobility model for VANETs [129,130]; however, those proposed models are suitable for only a small number of scenarios (e."]} +{"10544398|12765832": ["1); and B) by using multi-hop connections to reach the fixed network,\ni.e., vehicles connect to neighboring vehicles in order to reach the infrastructure (see MR2 in Fig."]} +{"15938319|12765832": ["NEMO BS Scheme in [45] Scheme in [49] Scheme in [50] SIP-NEMO Protocol layers L3 L3 L3 L3 L5 Route optimization support NO YES YES YES YES Signalling overheads HIGH LOW LOW Adaptive HIGH Handover latency and packet loss HIGH LOW LOW LOW HIGH Change to current architecture HA HA HA and MAP HA and MAP NO Change to current protocol stack YES YES YES YES NO Technique specific NO NO NO NO NO Cross layer information need NO NO YES NO NO H A: Home Agent MAP: Mobility Anchor Point", "follows [49]:", ", standard IPv6 nodes) [49]."]} +{"11022734|763939": ["In the rest of this section, we briefly review the most well known, but an extended survey and comparison of such tools can be found in [30]."]} +{"5555943|12452682": []} +{"7085121|14132386": ["surveys [48,88,89], as well as in more specific ones, such as [90] which deals with real-time protocols."]} +{"7085121|17960632": ["In the scientific literature, many MAC protocols suited for WSNs can be found as well as survey works according to different purposes, including [77], where real-time MAC protocols are considered, and [75], which deals with energy-aware protocols."]} +{"7085121|1236072": ["surveys [48,88,89], as well as in more specific ones, such as [90] which deals with real-time protocols.", "As a consequence, it is mostly used for smart parking applications [29,47], in which sensor nodes are installed on every parking slot forming a grid layout which suits the use of generic routing protocols for flat networks [48].", "In an analogous way to the preceding section, the classification introduced in [48] (flat/hierarchical/ location-based) will be used to guide this subsection in order to explain the different contributions to routing done by the authors of the reviewed works.", "The former fact is reflected on [48], which proposes"]} diff --git a/edge/graph_17939564.jsonl b/edge/graph_17939564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17939756.jsonl b/edge/graph_17939756.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9939b7919204a34736d489c3efebad2b48c0cb9 --- /dev/null +++ b/edge/graph_17939756.jsonl @@ -0,0 +1,2 @@ +{"17391033|15064932": ["\u2026circuit provisioning in the core area have already been specified in different proposals including generalized multiprotocol label switching (GMPLS) [7] [8], automatic switched transport network (ASTN) [9] , optical channel (OCh) and optical data unit (ODU) switching [11,12], and TCP switching\u2026", "Different signaling mechanisms for a more dynamic circuit provisioning in the core area have already been specified in different proposals including generalized multiprotocol label switching (GMPLS) [7] [8], automatic switched transport network (ASTN) [9] , optical channel (OCh) and optical data unit (ODU) switching [11,12], and TCP switching [13]."]} +{"17391033|15471820": ["\u2026provisioning in the core area have already been specified in different proposals including generalized multiprotocol label switching (GMPLS) [7] [8], automatic switched transport network (ASTN) [9] , optical channel (OCh) and optical data unit (ODU) switching [11,12], and TCP switching [13]."]} diff --git a/graph_1794715.jsonl b/edge/graph_1794715.jsonl similarity index 100% rename from graph_1794715.jsonl rename to edge/graph_1794715.jsonl diff --git a/edge/graph_17950466.jsonl b/edge/graph_17950466.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5cb06777825df747fa0b36c526bfcf8d3fa1350 --- /dev/null +++ b/edge/graph_17950466.jsonl @@ -0,0 +1,3 @@ +{"207404363|15219853": ["Yampolskiy and Govindaraju (2008) classified behavioural biometrics into five categories: authorship, human-computer interaction, indirect human-computer interaction, motor-skills and pure behavioural biometrics."]} +{"1345369|192934": ["In classifier design, it is generally accepted that there must be 10 times more instances (training samples) per class than the number of features [20]."]} +{"3035274|18315586": ["Moreover, the use of arti\ufb01cial rhythms to improve authentication performance has been discussed in [21], while the use of pressure information, derived from the pressed area for keystrokes\u2019 acquisition in"]} diff --git a/edge/graph_17953874.jsonl b/edge/graph_17953874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d3d30888466985174e57b171831a777f78f8c6c --- /dev/null +++ b/edge/graph_17953874.jsonl @@ -0,0 +1,4 @@ +{"16265701|534755": ["... such as a Boolean network that simplifies gene expression as a binary logical value to infer the induction of a gene as a deterministic function of the state of a group of other genes [44\u201346] and a Bayesian network that models interactions among genes, evaluates different models and assigns them probability scores [47,48] (readers are referred to two excellent reviews on these and other methods for reverse engineering of networks [ 49 ,50])."]} +{"3069530|192934": ["Although many heuristic search strategies (Jain et al., 2000) can be employed, these gene subset ranking methods are still too computationally expensive."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} diff --git a/edge/graph_17960632.jsonl b/edge/graph_17960632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ad40de5dcdba745a1709e2a6523b0913713418b --- /dev/null +++ b/edge/graph_17960632.jsonl @@ -0,0 +1,3 @@ +{"21153344|1230643": []} +{"18518208|1230643": ["Dual-Mode Real-Time MAC protocol for Wireless Sensor Networks: a Validation/Simulation Approach Thomas \nWatteyne* , Isabelle Aug\u00e9-Blum* and St\u00e9phane Ub\u00e9da* *CITI Laboratory, INSA Lyon, France."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} diff --git a/edge/graph_17962754.jsonl b/edge/graph_17962754.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d6a6b5bc85b88d67a724b5e851e07770f187a6a6 --- /dev/null +++ b/edge/graph_17962754.jsonl @@ -0,0 +1,14 @@ +{"17776808|14441987": []} +{"16162260|2457428": ["\u2026of Information Engineering, University of Parma, Italy b Guglielmo Srl, Pilastro di Langhirano, Parma, Italy\na r t i c l e i n f o a b s t r a c t\nArticle history: Received 15 October 2012 Received in revised form 28 March 2013 Accepted 20 May 2013 Available online xxxx\nKeywords: Internet of\u2026"]} +{"16162260|1230643": ["1 Iolus [6] for example, is a scheme that interferes with th packet stream, since a group security intermediary has to dec encrypt all the packets transiting in its own group."]} +{"26417125|2357830": ["\u2026in recent years many technological challenges have already been solved through the extension and adaptation of wireless communication technologies and protocols such as 6LoWPAN [25] or RFID [24,39], security and privacy still remain as the main barriers for the IoT deployment on a broad scale [36]."]} +{"8026205|2142482": ["such attack is handled by intrusion detection techniques [18], [29], [34], [35] and is not addressed in this paper."]} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"17849927|5747564": ["We believe these are important since the industry is leaning toward employing open-standard based IPv6 networks for smart grid not only for network protocols but also for security mechanisms [6], [20]."]} diff --git a/edge/graph_17966235.jsonl b/edge/graph_17966235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b76938a5bd0f8c923c627b132107f9b9ad362c21 --- /dev/null +++ b/edge/graph_17966235.jsonl @@ -0,0 +1,18 @@ +{"12297783|15453366": ["Millimeter-wave operates in the license-free frequency band from 57 to 64 GHz [4], and its emission power limit imposed by the Federal Communications Commission is much less restrictive than that for ultrawideband communications.", "However, at 60 GHz, the signals suffer from high path loss due to oxygen absorption and atmospheric attenuation."]} +{"6314925|15453366": ["These range from the deployment of highly directional antennas [12], [14]\u2013[16] to the application of multi-beam directional arrays that radiate in multiple directions [17], [18]."]} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"2722298|15453366": []} +{"1739350|1775475": ["Numerous schemes have been proposed in the literature to overcome these shortcomings of the DCF mode (see survey papers [3], [4])."]} +{"10179100|8280144": []} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"2017985|15453366": ["Hence, the antenna weights at CE field indexes 1,2,3,4 are: At CE 1: w n [1] = 0.", "A 7-GHz of bandwidth at 60 GHz carrier frequency is allocated by most regulatory bodies worldwide for unlicensed uses [1]."]} +{"15814757|15453366": []} +{"507972|8909218": []} +{"10412000|3054454": []} +{"7109015|15453366": ["Regulations in the United States, Japan, Canada, and Australia have already been set for 60-GHz operation, whereas in Korea and Europe, intense efforts are currently underway [1]."]} +{"7554459|15453366": ["Hence, the LOS link is easily broken by a moving person, which is termed as human body blockage effect [3]."]} +{"109587591|15453366": []} +{"2187722|15453366": []} +{"537110|8836911": ["in the multi-radio multi-channel MAC are surveyed, and a classification of control separation techniques is provided in [16]."]} diff --git a/edge/graph_17968208.jsonl b/edge/graph_17968208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17970161.jsonl b/edge/graph_17970161.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e2a6fa3e3892aeaf5fadc79e375106509b41925 --- /dev/null +++ b/edge/graph_17970161.jsonl @@ -0,0 +1 @@ +{"15265826|1099309": []} diff --git a/edge/graph_17976726.jsonl b/edge/graph_17976726.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1797913.jsonl b/edge/graph_1797913.jsonl similarity index 100% rename from graph_1797913.jsonl rename to edge/graph_1797913.jsonl diff --git a/edge/graph_17981371.jsonl b/edge/graph_17981371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7bd48be1a6f4d4d6e7209e64b2c1799ee136312 --- /dev/null +++ b/edge/graph_17981371.jsonl @@ -0,0 +1,2 @@ +{"42895002|10500613": ["Rahm and Bernstein [5] give an overview over some recent schema-integration projects; an earlier survey is [24].", "Such discovery algorithms have a variety of uses, notably in database design, data integration, schema matching [5], and query rewriting [6]."]} +{"15879792|10500613": ["Two approaches can be distinguished [16]."]} diff --git a/edge/graph_17981768.jsonl b/edge/graph_17981768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41d767f2f7df2a9d1553c1058b1c15f7ba9b7843 --- /dev/null +++ b/edge/graph_17981768.jsonl @@ -0,0 +1 @@ +{"29939979|2762290": []} diff --git a/edge/graph_17982453.jsonl b/edge/graph_17982453.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d6ae3190f695e11c58d4f6745533cd47be285ec --- /dev/null +++ b/edge/graph_17982453.jsonl @@ -0,0 +1 @@ +{"803817|3102110": ["Our work differs from traditional data mining [8][9] because instead of focusing on discovering patterns and relationships out of their repetition in the data, we approach discovery as goal driven and we do not intend to develop models of the data , we provide search techniques that find out whether the associations exist in the data."]} diff --git a/graph_1798273.jsonl b/edge/graph_1798273.jsonl similarity index 100% rename from graph_1798273.jsonl rename to edge/graph_1798273.jsonl diff --git a/graph_1799176.jsonl b/edge/graph_1799176.jsonl similarity index 100% rename from graph_1799176.jsonl rename to edge/graph_1799176.jsonl diff --git a/edge/graph_17992570.jsonl b/edge/graph_17992570.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_17996903.jsonl b/edge/graph_17996903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c0ce081875a0f708f9661ce2da106fb83882150 --- /dev/null +++ b/edge/graph_17996903.jsonl @@ -0,0 +1,2 @@ +{"786570|12243484": ["Intelligent tutoring systems, knowledge components, learning events, tutoring", "Although ITS tutorials (Beck, Stern, & Haugsjaa, 1996; Corbett, Koedinger, & Anderson, 1997; Rickel, 1989; Shute & Psotka, 1996; Woolf, 1992) emphasized their structure (i.e., the software modules and knowledge sources), this description emphasizes their behavior."]} +{"14361757|7147372": ["Moursund & Bielefeldt (1999) Mumtaz (2000) Nantz & Lundgren (1998)"]} diff --git a/edge/graph_17997983.jsonl b/edge/graph_17997983.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18000496.jsonl b/edge/graph_18000496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2a6dc46568a6109183bdce1ee3ad5e3a0f2abaa --- /dev/null +++ b/edge/graph_18000496.jsonl @@ -0,0 +1,12 @@ +{"55948814|14441987": []} +{"6984609|2509135": ["For local spectrum sensing, the most common techniques are energy detection [7-9], matched filter [10-11] and cyclostationary detection [11-13]."]} +{"1016842|12601073": ["A number of test statistics for the problem of spectrum sensing have been proposed in the literature [33, 34, 35]."]} +{"27525950|10859599": []} +{"61875227|1299833": []} +{"28770266|1940388": ["However, the CR wireless networks are susceptible to various attacks [3]\u2013[6]."]} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"14359021|14441987": ["Early research work on route establishment in MANET has mainly focused on the probability and the efficiency [2-3], and assumes nodes are trustworthy and cooperative."]} +{"22554286|3540699": ["covers video summarization [5], [19], [20], video compression [21], [22], source packetization [23], QoS provisioning [24], [25], application-centric routing, queueing analysis [26], link adaptation [27]."]} diff --git a/edge/graph_18005424.jsonl b/edge/graph_18005424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eda54f85762952da3a08790f129c4e48994925ff --- /dev/null +++ b/edge/graph_18005424.jsonl @@ -0,0 +1,4 @@ +{"205420407|3420321": []} +{"2004416|3420321": []} +{"10842743|8302050": []} +{"3392068|3420321": ["Depending on library preparation and sequencing technology, it is possible to sequence reads that are of a known chromosomal distance [26].", "Most alignment algorithms follow the seed-and-extend paradigm, where one or more of so-called seeds are searched followed by an extension to cover the whole query sequence [26].", "However, these articles review only selected components of the NGS data analysis pipeline such as mapping and assembly [24], sequence alignments [26], algorithms for SNP and genotype calling [25] or detection of structural variations (SVs) and copy number variations (CNVs) [27].", "ment methods have been published elsewhere [26, 67, 78], we do not report a comprehensive list but"]} diff --git a/edge/graph_18007143.jsonl b/edge/graph_18007143.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18008356.jsonl b/edge/graph_18008356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18011174.jsonl b/edge/graph_18011174.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67f026c0b8c92da8dd3b2c7bc011420b17d1a88f --- /dev/null +++ b/edge/graph_18011174.jsonl @@ -0,0 +1,41 @@ +{"206256786|2294541": ["The diverse attacks (Hoffman et al., 2009; Lopez et al., 2009; Karlof and Wagner, 2003; Xiao and Yu, 2006; Xiao et al., 2007a) that target sensor networks will be concluded as the Table 1.", "Furthermore, Hoffman et al. (2009) surveyed the defense mechanisms employed by existing reputation systems and suggests five defense strategies against attackers for reputation systems in common networks.", "A few existing surveys on trust and security issues can be found (Fern\u00e1ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|1940388": ["The security mechanisms for sensor networks have been raised by many researchers (Chen et al., 2009b; Lopez et al., 2009; Law and Havinga, 2005; Kyriazanos et al., 2008).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|9240891": ["This problem is subsequently discussed in various literature, providing diverse trust classification (Grandison and Sloman, 2000) and evaluation models in various domains, such as E-commerce, P2P, ad hoc networks etc."]} +{"5742298|4395259": ["In recent years, security issues in CR networks have been hot topics."]} +{"29532810|1230643": ["While modern research on sensor networks started on the late seventies [6], this paradigm acquired an identity of its own at the beginning of the twenty-first century [21]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"28305595|8618569": []} +{"28305595|1940388": ["Many surveys have been proposed for the security in WSN in general (Yun et al ., 2008; Chen et al ., 2009; Christin et al ., 2010; Walters et al ., 2007); however, all of them discussed only the prevention based schemes as well as the secure routing protocols."]} +{"28305595|7774517": []} +{"28305595|17205659": []} +{"28305595|1236072": ["Table 1: Taxonomy of attacks according to WSN layer s (Al-Karaki and Kamal, 2004)", "Other two surveys about the routing in WSN have been proposed (Al-Karaki and Kamal, 2004; Akkaya and Younis, 2005) however, they did not discuss the security issues."]} +{"28305595|1230643": []} +{"206502845|1230643": []} +{"1732106|10862852": ["Group communication [1], [15] implies a many-to-many communication and it goes beyond both one-to-one communication (i."]} +{"5853420|1230643": []} +{"6568227|16514036": ["Besides eHealth, WBANs have also been widely applied in sports, entertain-ments and military [5\u20137]."]} +{"15397183|1230643": []} +{"7855317|1333339": ["Bad mouthing attack is very common in recommendation based trust computing methods [19].", "A fairly comprehensive survey on various trust computing approaches geared towards MANETs is provided in [19].", "As well, a significant body of work has been dedicated to survey existing trust-based defense approaches for mobile ad hoc networks [11], [14], [15], [19], [23], [41], [47].", "Over recent years, a number of research [11], [14], [15], [19] has been carried out overviewing recent advancements and trends in providing trust management frameworks for MANETs."]} +{"7855317|17067678": ["A significant number of research papers [3], [26], [38] are dealt with generalized security issues and possible countermeasures in MANETs."]} +{"7855317|10837932": ["Along with recent green trend which aims at diminishing the environmental pollution of Information and Communication Technology (ICT) sector [8],"]} +{"7855317|14745481": ["As well, a significant body of work has been dedicated to survey existing trust-based defense approaches for mobile ad hoc networks [11], [14], [15], [19], [23], [41], [47].", "mouthing attacker can frame good nodes, disseminating false accusation that a disciplined node is malicious or misbehaving [11], also referred to as blackmailing.", "2496147 allow nodes infer how much they can trust on other nodes\u2019 behavior [11].", "Over recent years, a number of research [11], [14], [15], [19] has been carried out overviewing recent advancements and trends in providing trust management frameworks for MANETs.", "In [11], authors provided an overview on various potential attacks in MANETs and enumerated metrics used in the literature to measure the performance of existing trust frameworks."]} +{"5182800|1230643": ["Their application include military, factory instrumentation, climate control, environmental monitoring, and building safety [1, 2]."]} +{"17767204|9240891": ["Therefore, TrE is too simple to ensure the security and efficiency of MSNs."]} +{"61439086|4395259": []} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"62059316|1680300": ["Despite its optimality, LB method requires too much computational resources due to the averaging or integral operation [2], [5].", "In general, there are two AMC algorithms [2], i."]} +{"1750333|12060835": ["Therefore, the required energy for small cells may need to be harvested locally from the ambient environment [6], rather than being provided by using a fixed power supply."]} +{"38962153|1230643": []} +{"21717887|16514036": []} +{"29569409|1230643": ["A WSN is a network of cheap and simple processing autonomous devices, called sensor nodes, that are spatially distributed in an area of interest in order to cooperatively monitor physical or environmental phenomena [1]."]} +{"11972743|14745481": ["At the SN level, each SN is responsible to report its peer-to-peer trust evaluation results towards other SNs in the same cluster to its CH which applies statistical analysis and", "The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"11972743|1940388": ["The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"14684794|1756215": []} +{"14684794|1230643": ["With the dramatic growth of the communication systems, the deployment of WSNs represents an e cient way in di\u21b5erent applications such as health monitoring, intruder tracking, fire monitoring, structural health monitoring, and earthquake detection [1-3]."]} +{"155344168|9646739": []} +{"155344168|14441987": []} +{"7320605|1756215": ["[6] had proposed a taxonomy which divides current existing typical game theory approaches for WSN security into four categories: preventing DoS attacks, intrusion detection, strengthening security, and coexistence with malicious sensor nodes.", "A relatively smaller portion of the contributions in this area has been summarized in [5,6].", "[6] summarized 30 publications of the existing game theoretical approaches that are designed to strengthen WSN security."]} +{"15499632|7320605": ["If not the node is eligible to go to sleep.", "Then, CER runs at node i as follows [4]:\n1) For each node j \u2208 N(i), calculate the distance \"d(i,j)\" and the segment of node j covered by node i \"arc(i,j)\", 2) For each m \u2208 N(j), calculate \"arc(j,m)\", 3) Add all the point generated and the step 1 and 2 in angle\nlist AL and sort it."]} +{"1756215|1940388": []} +{"1756215|17205659": []} diff --git a/edge/graph_18013544.jsonl b/edge/graph_18013544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18015916.jsonl b/edge/graph_18015916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b2c3140f493d10436573ff1fed097e73f11a01a --- /dev/null +++ b/edge/graph_18015916.jsonl @@ -0,0 +1 @@ +{"40870313|8137826": ["what have been developed to share and analyze data in distributed IDS [29] ."]} diff --git a/edge/graph_180217.jsonl b/edge/graph_180217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c5267a078303382052515fd74652bdbb15db6231 --- /dev/null +++ b/edge/graph_180217.jsonl @@ -0,0 +1 @@ +{"2480393|2357830": ["2An excellent overview of currently proposed methods can be found in [5].", "In contrast to most of today\u2019s proposed RFID privacy technology [5], deploying Shamir Tags is simple and cost efficient."]} diff --git a/edge/graph_18027450.jsonl b/edge/graph_18027450.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0ae572ab58515da3a9bf6e79cc29ee78ad28bea --- /dev/null +++ b/edge/graph_18027450.jsonl @@ -0,0 +1,11 @@ +{"54493644|8777381": ["A multimodal account of emotional expression in music should be based on a Brunswikian perspective (Brunswik, 1956), as suggested by Juslin (1995, 2000) and Scherer (1978, 2003), respectively for musical expression and for emotional expression.", "This implies that a comprehensive account of emotion communication requires the inclusion of both expression and perception (Scherer, 1978, 2003)."]} +{"58731|5401262": []} +{"53234823|2355696": ["Existing work in affect recognition focuses primarily on the recognition of emotions [13, 14], and does so largely by leveraging the visual [15-17] and acoustic [18, 19] signals found in the speech, actions, and faces of people."]} +{"53612459|5401262": ["We do so becuase cues identifying attitudinal states like interest and boredom, to those underlying moods, and to those disclosing social signaling like empathy and antipathy are all visualy detectable from someone\u2019s facial expressions (Pantic et al., 2005, 2006).", "Since the problem of context-sensing is extremely difficult to solve (if possible at all) for a general case, pragmatic approaches (e.g., activity/application- and user-centered approach) should be taken when learning the grammar of human facial behavior (Pantic et al., 2005a, 2006).", "communicated by rapid facial signals include the following (Ekman & Friesen, 1969; Pantic et al., 2006): (a) affective / attitudinal states and moods,1 e.g., joy, fear, disbelief, interest, dislike, stress, (b) emblems, i.e., culture-specific communicators like wink, (c) manipulators, i.e.,\u2026", "communicated by rapid facial signals include the following (Ekman & Friesen, 1969; Pantic et al., 2006): (a) affective / attitudinal states and moods,1 e.", "\u2026questions like who is the user, where is he or she, and what is he or she doing, has witnessed recently a number of significant advances (Nock et al., 2004, Pantic et al. 2006), the complexity of this problem makes context-sensitive facial expression analysis a significant research challenge."]} +{"53612459|9045232": ["Numerous techniques have been developed for face detection in still images (Yang et al., 2002; Li & Jain, 2005)."]} +{"3182407|15300368": ["I. INTRODUCTION Sensors and various sensing methods have been at the center of research and many literatures [1] illustrate multiple aspects of sensing."]} +{"1345369|192934": ["In classifier design, it is generally accepted that there must be 10 times more instances (training samples) per class than the number of features [20]."]} +{"18790814|3241708": []} +{"12265820|17950466": ["Keyboard as a Proxy Monitoring the dynamics of keyboard usage has been widely studied in different areas such as biometric authentication [1, 22] and personality characterization [13]."]} +{"17151325|14866098": ["Signal processing [3] and classification algorithms [4] for EEG have been developed in the context of building Brain Computer Interfaces (BCI), and we are seeking ways for developing similar approaches to recognizing affective states from EEG and other physiological signals."]} +{"17151325|16362395": ["Signal processing [3] and classification algorithms [4] for EEG have been developed in the context of building Brain Computer Interfaces (BCI), and we are seeking ways for developing similar approaches to recognizing affective states from EEG and other physiological signals."]} diff --git a/edge/graph_18027763.jsonl b/edge/graph_18027763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..246a184c3eeae6c6b4f8112b9f07c52f0e5e8119 --- /dev/null +++ b/edge/graph_18027763.jsonl @@ -0,0 +1,5 @@ +{"34500486|1987550": ["\u2026any other care provider) about treatment In healthcare, giving patients the means to obtain information for themselves will alleviate the mounting pressures within the system. and other options because the healthcare provider is the only one with the information (Leonard 2004; Ross and Lin 2003)."]} +{"132905|3174919": []} +{"33251934|1987550": []} +{"10976184|1987550": ["Health information sharing between patients and their heath care providers may improve diagnoses, increase patient education and promote self-care [1,2].", "[1] S."]} +{"19957679|1987550": []} diff --git a/edge/graph_1803317.jsonl b/edge/graph_1803317.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_180339.jsonl b/edge/graph_180339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18035353.jsonl b/edge/graph_18035353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..697bf17b97436b020bdec31ca4a5b5bdc401f3ad --- /dev/null +++ b/edge/graph_18035353.jsonl @@ -0,0 +1 @@ +{"10757431|1708582": ["Markov decision processes (MDPs) have been adopted as the model of choice for DTP problems in much recent work [12, 26, 28, 30, 61, 78], and have also provided the underlying foundations for most work in reinforcement learning [48, 76, 77, 84]."]} diff --git a/edge/graph_18035804.jsonl b/edge/graph_18035804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18036564.jsonl b/edge/graph_18036564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4da65adb14caa67df14322e6fefcc963ec9a6eed --- /dev/null +++ b/edge/graph_18036564.jsonl @@ -0,0 +1,6 @@ +{"9952140|1113420": []} +{"2329405|387610": ["Extracted saliency maps are widely used in many computer vision applications including objectof-interest image segmentation [13, 18], object recognition [25], adaptive compression of images [6], contentaware image editing [28, 33, 30, 9], and image retrieval [4]."]} +{"1192198|1029120": ["Gandhi and Trivedi [20] focus on the pedestrian protection application in the intelligent vehicle domain."]} +{"1192198|192934": ["multilayer neural networks [33] implement linear discriminant functions in the feature space in which input patterns have been mapped nonlinearly, e.", ", mean squared error [33]."]} +{"1192198|7788290": ["The authors of [ 21 ], [47], [57] cover methods for people detection, body pose estimation, and activity recognition.", "At this point, we omit discussion of complex 3D human shape models [ 21 ] and focus on 2D pedestrian shape models that are commonly learned from shape contour examples."]} +{"16964349|387610": ["The automatic detection of salient image regions is important for applications like adaptive content delivery [19], adaptive region-of-interest-based image compression [20], [21], video summarization [22], progressive image transmission [23], image segmentation [24], [25], image and video quality assessment [26], [27], [28], object recognition [29], and content-aware image resizing [30]."]} diff --git a/edge/graph_18037424.jsonl b/edge/graph_18037424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59872c2497973f7112707d3d06f818a53c0786d0 --- /dev/null +++ b/edge/graph_18037424.jsonl @@ -0,0 +1,4 @@ +{"18341724|6959212": []} +{"18341724|7278743": ["The IEEE 802.15.1 Bluetooth operates at about 1mW and can support data rates between 1 to 3Mbps and a delay of about 10 sec [13, 14]."]} +{"3500624|2906773": []} +{"3500624|18037424": []} diff --git a/edge/graph_18038464.jsonl b/edge/graph_18038464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd8a3680bfd991d753db853296e661556b18278b --- /dev/null +++ b/edge/graph_18038464.jsonl @@ -0,0 +1,14 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"15604320|2355696": ["Facial expression recognition has attracted significant attention because of its usefulness in many applications such as human-computer interaction, face animation and analysis of social interaction [1, 2 ]."]} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"15298586|207060556": ["We denote this initial estimate as x, which for face alignment is commonly a mean face aligned to the output of a face detector [60]."]} +{"62600805|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"16010181|393948": ["Another promising way to adaptively learn features is by virtue of deep learning (Bengio et al, 2013) which achieves state-of-the-art performance on many computer vision tasks."]} +{"16010181|9045232": ["CLM-based methods consist of a shape model and a number of local experts, each of which is utilized to detect a facial feature point.", "FFPD usually starts from a rectangular bounding box returned by face detectors (Viola and Jones, 2004; Yang et al, 2002) which implies the location of a face."]} +{"207060608|2301292": []} +{"641127|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"206592484|456491": []} +{"215721|14303607": ["Accurate object shape computation is key to many visual tasks; for instance, classification of facial expression [17, 30], facial identity [38], action analysis [4], and fine-grained categorization [34, 3, 18, 40] require accurate registration of a (deformable, part-based) model to the image."]} +{"215721|9045232": ["The shape of human bodies and human faces has attracted particular attention [43, 46, 33, 2]."]} diff --git a/edge/graph_18044357.jsonl b/edge/graph_18044357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18045291.jsonl b/edge/graph_18045291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5269a5ec7466ff2a112e3325e7757ff77350cf15 --- /dev/null +++ b/edge/graph_18045291.jsonl @@ -0,0 +1 @@ +{"967578|1230643": ["The cluster centers at each level are initialized using those returned at the coarser level of representation."]} diff --git a/edge/graph_18047585.jsonl b/edge/graph_18047585.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e7b7ce4634a4ae4098c5f136550314d45a350a8 --- /dev/null +++ b/edge/graph_18047585.jsonl @@ -0,0 +1,3 @@ +{"8921973|53680608": []} +{"29531568|6972141": []} +{"1448404|6681074": ["COMPUTER vision methods, especially those referring to object classification and pose determination [1], [2], are extensively used in robot manipulation of rigid objects."]} diff --git a/graph_1805048.jsonl b/edge/graph_1805048.jsonl similarity index 100% rename from graph_1805048.jsonl rename to edge/graph_1805048.jsonl diff --git a/edge/graph_18050848.jsonl b/edge/graph_18050848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fe48fa6e260c5041e67dc1da3637ab65c8ec73e --- /dev/null +++ b/edge/graph_18050848.jsonl @@ -0,0 +1,2 @@ +{"14599894|192934": ["A number of classifier fusion techniques can be used [ 19 ]."]} +{"61167697|33286487": []} diff --git a/edge/graph_18056032.jsonl b/edge/graph_18056032.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..503806a6ea02b012fde40566a0e71a6f16ec4ac2 --- /dev/null +++ b/edge/graph_18056032.jsonl @@ -0,0 +1,3 @@ +{"166679090|18212759": []} +{"3329018|15683881": [") and learning behavior in order to automate the construction of student models [89]."]} +{"1163134|1437067": ["Genetic Algorithms have been shown to be an effective tool to use in data mining and pattern recognition. [ 7 ], [10], [6], [16], [15], [13], [4]."]} diff --git a/edge/graph_18056109.jsonl b/edge/graph_18056109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18059483.jsonl b/edge/graph_18059483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18060188.jsonl b/edge/graph_18060188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f79ebfa3b8c3ed21db3727fda1c209bcac34d0b8 --- /dev/null +++ b/edge/graph_18060188.jsonl @@ -0,0 +1,2 @@ +{"18422824|19032874": ["On the other hand fragile watermarking algorithms perform better than algorithm based on conventional cryptography [32]."]} +{"1493582|19032874": ["In fact a wide range of powerful digital video processing tools are available in the market that allow extensive access, manipulations and reuse of visual materials[32].", "On the other hand fragile watermarking algorithms perform better than algorithm based on conventional cryptography [32]."]} diff --git a/edge/graph_18069636.jsonl b/edge/graph_18069636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f5370fd047af28f9caae74650c710b9e0deb7a7 --- /dev/null +++ b/edge/graph_18069636.jsonl @@ -0,0 +1,2 @@ +{"1502317|18194234": ["trust and reputation [45], Goal [46], Domain [47] and etc, which we call other context."]} +{"1502317|9123526": ["DAML-S [19], OWL-S [20], WSDL-S [21], WSML [22] and the like."]} diff --git a/edge/graph_18069725.jsonl b/edge/graph_18069725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f895ef1b4bfddd9995521dfb2d028d8996f8e3b --- /dev/null +++ b/edge/graph_18069725.jsonl @@ -0,0 +1,11 @@ +{"16598070|13365762": []} +{"53223600|16766019": ["Improving Image Retrieval Effectiveness via Multiple Queries Xiangyu Jin Department of Computer Science \nUniversity of Virginia Charlottesville, VA 22904 xj3a@cs.virginia.edu ABSTRACT Conventional approaches \nto image retrieval are based on the assumption that relevant images are physically near the query image \nin some feature space.", "\u2026via Multiple Queries Xiangyu Jin Department of Computer Science \nUniversity of Virginia Charlottesville, VA 22904 xj3a@cs.virginia.edu ABSTRACT Conventional approaches \nto image retrieval are based on the assumption that relevant images are physically near the query image \nin some feature\u2026"]} +{"61243388|1099309": ["Four standardized MPEG-7 visual descriptors [11] are used in the system including the Dominant Color Descriptor (DCD), Color Layout Descriptor (CLD), Edge Histogram Descriptor (EHD) and the Homogeneous Texture Descriptor (HTD).", "The content of images is characterized by visual features such as visual descriptors suggested in MPEG7 visual tools [11, 6]."]} +{"14022622|192934": ["Adding features may incur the peaking problem [10]."]} +{"6561699|3330313": ["selection and average point strategies which are sensitive to noise, we apply a new strategy to choose a reliable positive image as the prototype based on the idea of -medoids approach [27]."]} +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} +{"16984936|1708582": ["Reinforcement learning addresses the issue of how an agent can learn a task through a sequence of trial-and-error interactions with its environment [18], [19]."]} +{"206750993|13365762": ["3: Role of MPEG-7 in Facilitating Inter-operable Services and Applications [5].", ", search engine, filtering agent or navigation) [5].", "3 Role of MPEG-7 in Facilitating Inter-operable Services and Applica\u00ad tions [5]."]} +{"206750993|192934": ["The pdf of this random variable is then defined as [38]\n(1)\nwhere are the mixing probabilities and is the parameter set representing the th component and . is the number of components in the mixture."]} diff --git a/edge/graph_18074548.jsonl b/edge/graph_18074548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18078738.jsonl b/edge/graph_18078738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c2f7aceae77ed49bb30996ecce2a780d5cba573 --- /dev/null +++ b/edge/graph_18078738.jsonl @@ -0,0 +1,32 @@ +{"109499033|6327434": []} +{"15680349|18985591": ["compare failure rates of semiconductors devices of standard multilevel converters and ones with fault-tolerant design [31].", "petrochemical industry, for fans in cement industry, for pumps in water pumping stations, and for steel rolling mills in metal industry, reactive power compensation, and grid interface of renewable energy resources, an unexpected shutdown would cause significant production loss [31]."]} +{"110311547|33286487": ["Moreover, it has broad implications in signal processing [27]."]} +{"206683955|9072047": ["Therefore, the last decade witnessed a rapidly growing interest in T\u2013S fuzzy systems, and many important results have been reported in [2], [3], [7], [10], [13], [17], [21]\u2013[24], and references therein.", "Specifically, the stability analysis and stabilization are studied in [2], [3], [10], and [13]."]} +{"119391599|33286487": []} +{"44230475|18400226": ["[64] H."]} +{"44230475|9030703": []} +{"11078379|6327434": ["The first major survey was written by Willsky (1976).", "The first major survey was written by Willsky (1976) ."]} +{"110479704|905827": []} +{"8834875|6327434": ["The sequential likelihood ratio test has been applied to Kalman filter innovations by Chien and Adams (1976), Willsky and Jones (1976), Bonivento and Tonielli (1984), and Uosaki (1985), and to residuals from inputoutput parity equations by Deckert et al. ( 1977).", "This is either a preset nominal value (Chien and Adams, 1976) or is obtained by maximum likelihood estimation from the innovations (Willsky and Jones, 1976)."]} +{"1978853|6327434": []} +{"35220565|6327434": []} +{"2716707|18985591": []} +{"7597670|6327434": ["Model-based approaches for continuous systems [4]\u2013[8] are inappropriate for monitoring and diagnosing hybrid behaviors exhibited by many physical systems."]} +{"109358014|6327434": ["Fault diagnosis algorithms were reviewed in Willsky (1976) and Frank (1990)."]} +{"109202250|6327434": []} +{"207172599|3330313": []} +{"14083817|905827": ["The most common fault detection techniques based on vibration signal focus on the vibration signal\u2019s frequencies and magnitude, which are dealing with one dimension domain [7] to [16], [20] to [21]."]} +{"13635082|6327434": ["These include Kalman filter approaches that utilized assumed models and anticipated fault behaviors [4], [12]; stochastic approaches with Whiteness and Chi-squared tests of the residuals of Kalman filter [13]; a generalized likelihood ratio test which relies on a correlation of the observed residual with presumed fault signatures [9]; and fault-sensitive filters that amplify certain direction in the state space in which the fault resides [5], [6], [11].", "Model-based fault diagnosis approach has received considerable attention during the last two decades [3], [9]\u2013[11]."]} +{"8687401|6327434": ["An application of the SPRT to the health monitoring of a satellite system has been reported in [87] and [117].", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12],", "The development of the change detection problem was stimulated by Wald in 1947 when \u201cSequential Analysis\u201d was published and a Sequential Probability Ratio Test (SPRT) was introduced.", "something has gone wrong or that everything is fine, and of determining the location as well as nature of the fault [12].", "Page also pointed out that this rule is equivalent to performing a SPRT.", "Given a sequence of observations , the Sequential Probability Ratio Test (SPRT) computes the cumulative sum of the log-likelihood ratio recursively as follows:\n(36)\nwhere\n(37)\nNote that denote the conditional PDF of the observation , which depends on the parameter .", "To overcome this, a multiple-hypothesis test based on the Shiryayev SPRT is used to enhance the robustness of the FDI scheme.", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12], [25], [26].", "The SPRT has been used to develop a dynamics sensor validation system for a reusable launch vehicle [116].", "Various survey papers on the change detection methods can be found in [12], [23], [25], and [113].", "It has been shown that for a certain criterion of optimality, this generalized Shiryayev SPRT detects and isolates a change in hypothesis in the conditionally independent measurement sequence in minimum time.", "In the rest of this section, we describe the details of the following hypothesis test techniques: the SPRT, the CUMSUM algorithm, the generalized likelihood ratio test, and the local approach.", "The CUSUM algorithm is equivalent to a repeated SPRT in which the test is restarted as long as the decision is taken in\nfavor of .", "The SPRT is used with a multivariate state estimation technique as core elements of a commercial dynamics sensor validation system, which is designed to improve launch vehicle mission safety and system dependability by enabling rapid development and cost effective maintenance of embeddable real-time software to reliably detect process-critical sensor failures.", "The well-known examples of these statistical test techniques are as follows:\na) sequential probability ratio test (SPRT); b) cumulative sum (CUSUM) algorithm; c) generalized likelihood ratio test; d) local approach.", "Malladi and Speyer [114] have derived an online multiple hypothesis Shiryayev SPRT [115] by adopting a dynamic programming approach."]} +{"2431645|6327434": [", bq characterizing the faulty behavior: (1) Find an estimate i of the process variable from a most consistent subset of measurements\u2022 (2) Identify the faulty measurement by parity checks\u2022 Obviously, to detect a single fault among p components at least p - 1 parity relations are required\u2022 This concept was generalized by Chow and Willsky (1984) and Lou et al.", ", bq characterizing the faulty behavior: (1) Find an estimate i of the process variable from a most consistent subset of measurements\u2022 (2) Identify the faulty measurement by parity checks\u2022 Obviously, to detect a single fault among p components at least p - 1 parity relations are required\u2022 This concept was generalized by Chow and Willsky (1984) and Lou et al. (1986) for the case of using the temporal redundancy relations of the dynamic system\u2022 Suppose the system is given by the linear discrete state equations", ") A popular approach is based on multiple hypotheses testing (Willsky, 1976).", "The multiple hypotheses testing can, for example, be carried out using Bayesian decision theory (Willsky, 1976)."]} +{"10075730|6327434": ["Recent surveys on failure detection methods in general are given by Himmeiblau (1978), Pau (1981 ), and on dass (2) by Willsky (1976).", "In general, dynamic relationships do exist x(t) =f{ u, }. t',. ( A comprehensive survey of methods for the detection of abrupt faults which appear in the state variables and output variables of dynamic systems is given by Willsky (1976)."]} +{"17850764|5660618": ["This model of packet drop has widely been used in the networked control and FD systems literature [4], [21]."]} +{"19581888|17381415": []} +{"11487346|6327434": ["Several state observers are designed for a definite fault signal and detected by a hypothesis test (Willsky, 1976).", "Process model-based fault-detection methods Different approaches for fault-detection using mathematical models have been developed in the last 20 years, see, e.g., (Chen & Patton, 1999; Frank, 1990; Gertler, 1998; Himmelblau, 1978; Isermann, 1984, 1997; Patton, Frank, & Clark, 2000; Willsky, 1976)."]} +{"1859069|6327434": ["Generalized Likelihood Ratio (GLR) testing and Sequential Probability Ratio Testing (SPRT) (Willsky, 1976; Basseville, 1988) can be used to examine the residual and, subsequently to diagnose faults.", ", 1975; Clark, 1979; Frank, 1987; Frank, 1990; Patton and Kangethe, 1989; Patton and Chen, 1997) or Kalman filter(s) in a stochastic setting (Mehra and Peschon, 1971; Willsky, 1976; Frank, 1987; Basseville, 1988; Tzafestas and Watanabe, 1990; Da and Lin, 1996; Zolghadri, 1996; Sohlberg, 1998).", "\u2022 Sequential probability ratio testing (SPRT) (Wald, 1947; Willsky, 1976; Tzafestas and Watanabe, 1990; Grainger, Holst, Isaksson and Ninness, 1995) and modified SPRT (Gai and Gurry, 1977; Speyer and White, 1984; Tzafestas and Watanabe, 1990).", "Many variants of the idea of hypothesis testing for FDI have been published since (Willsky, 1976; Basseville, 1988; Tzafestas and Watanabe, 1990; Nikoukhah, 1994; Chang and Chen, 1995; Zolghadri, 1996; Basseville, 1997; Sohlberg, 1998).", "10 Fault Diagnosis for Stochastic Systems For stochastic systems, the FDI is based on statistical testing of the residuals (Willsky, 1976; Basseville and Benveniste, 1986; Basseville, 1988; Tzafestas and Watanabe, 1990; Basseville and Nikiforov, 1993; Da and Lin, 1996; Zolghadri, 1996; Basseville, 1997; Sohlberg, 1998), for example:"]} +{"26504374|6327434": []} +{"6624424|18985591": ["On the other hand, the probability of switch failures over a specific time interval in multilevel inverters is higher than conventional inverters [36]."]} +{"6624424|18956392": ["fault diagnosis of electric machines and drives [1] have been performed, with some specifically focused on fault diagnosis of semiconductor devices and inverters [2]\u2013[4]."]} +{"62317917|6327434": []} +{"18301198|6327434": []} +{"119614334|6327434": []} diff --git a/edge/graph_18081102.jsonl b/edge/graph_18081102.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f84aa2ebaedfdb863ab3ba79ffe8acafc286c24 --- /dev/null +++ b/edge/graph_18081102.jsonl @@ -0,0 +1,2 @@ +{"4502899|1983971": ["The HumanComputer Interaction (HCI) community has proposed varying general VE systems design approaches including those that focus on perceptual issues [17,18], usability [19,20], or combined perceptual and usability models [21,22]."]} +{"3329638|11266709": []} diff --git a/edge/graph_18090012.jsonl b/edge/graph_18090012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82dc0d5573475d7c325b5a537f0ed86df5c6fabb --- /dev/null +++ b/edge/graph_18090012.jsonl @@ -0,0 +1 @@ +{"17365448|8310135": ["Extracting atomic identifying and sensitive attributes (such as name, address, and disease name) from unstructured text such as pathology reports can be seen as an application of named entity recognition (NER) problem [17, 22].", "We leverage the latest Named Entity Extraction techniques [17, 22], in particular, conditional random fields based techniques to effectively extract identifying and sensitive information from unstructured data, and 3) Anonymization."]} diff --git a/edge/graph_18090044.jsonl b/edge/graph_18090044.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a74487e1ff2299cb070e84182d0d3a1a0d579d2b --- /dev/null +++ b/edge/graph_18090044.jsonl @@ -0,0 +1,23 @@ +{"30441853|14132386": ["LEACH is one of the most popular clustering algorithms[3] for WSNs[1,16]."]} +{"38741178|1230643": []} +{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]} +{"10416337|17769444": [", very low, low [93])."]} +{"10416337|1230643": ["Wireless sensor networks (WSNs) are critically resource constrained by limited power supply, memory, processing performance and communication bandwidth [1]."]} +{"13049149|1230643": ["These sensor networks consist of massively distributed low-cost, low-power and small size sensor nodes, which have sensing, data precessing and communication capabilities [1].", "In WSNs, power consumption of sensor nodes can be divided into three domains which are sensing, communication and data processing [1]."]} +{"900822|12817488": ["For a comprehensive overview of data gathering approaches with respect to differ-rent network architectures, survey papers like [4] can be referred to."]} +{"5272771|1230643": ["A typical characteristic of WSNs is that their resources\u2014including the power supply, computing and communication capabilities of sensor nodes\u2014are strictly constrained [1]."]} +{"110981460|1230643": []} +{"505582|4491892": ["Further, most convergence results as surveyed in [56] are restricted to bounded functions of the state g(x) such that|g(x)| < C for someC."]} +{"23193402|1230643": []} +{"13223240|5972227": ["The authors of [16] reviewed energy efficiency in collaborative target"]} +{"8591586|1230643": ["A Wireless Sensor Network (WSN) [1] is a special type of ad-hoc network composed of resource-constrained devices, called sensor nodes."]} +{"20798448|1230643": []} +{"12120476|14441987": ["Although there are many well-known routing protocols [32], we recommend a hybrid system based on a leaky-feeder system (LFS) and a wireless mesh network (WMN), similar to that installed at a coal mine in West Virginia, USA [7]."]} +{"17964493|1230643": ["For an introduction to WSNs see [15] [16]."]} +{"21153344|1230643": []} +{"2870208|4491892": ["The two methods are sequential statistical signal processing procedures with distinct features but with similar algorithmic outline."]} +{"17727065|1230643": ["Due to the limited energy resource in each sensor node, sensors are usually deployed in high density and take turns to work in order to prolong the network lifetime [1]."]} +{"17782454|1230643": ["Wireless sensor networks have been widely used in building structure monitoring and control, environmental monitoring and protection, military defense and other fields [ 1 ,2]."]} +{"14378895|1236072": ["The majority of research literature in predictive target tracking favours hierarchical, decentralized, dis-\n1545-0678/11 $26.00 \u00a9 2011 IEEE DOI 10.1109/ICDCSW.2011.60\n2984\ntributed cluster based approaches [2], [3], [5], [6], [16], [17]."]} +{"16584367|1230643": []} +{"15638902|12127129": ["It is one of the main sections of this paper, here the video which is converted to frames are compared and the foreground moving objects which are different between the frames are separated [8].", "In [8] a pixel is marked as foreground if"]} diff --git a/edge/graph_18093722.jsonl b/edge/graph_18093722.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7340efd32f68abae0a5c95a6fb51d9fda98e6db --- /dev/null +++ b/edge/graph_18093722.jsonl @@ -0,0 +1,4 @@ +{"15729548|206051485": []} +{"1522722|9431428": []} +{"20545440|6863252": ["More recently, thanks to the substantial development of deformable image registration techniques in the last decade [Sotiras et al., 2013; Shen et al., 1999; Tang et al., 2009; Xue et al., 2006; Yap et al., 2009], automatic spatial normalization has become the fundamental step in morphometric pattern analysis, which allows quantitative comparison of different subjects/populations within a common space.", "More recently, thanks to the substantial development of deformable image registration techniques in the last decade [Sotiras et al., 2013; Shen et al., 1999; Tang et al., 2009; Xue et al., 2006; Yap et al., 2009], automatic spatial normalization has become the fundamental step in morphometric\u2026"]} +{"20844969|6116761": []} diff --git a/edge/graph_18105207.jsonl b/edge/graph_18105207.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a41884aaad4f7c6178288688844109b1ed403003 --- /dev/null +++ b/edge/graph_18105207.jsonl @@ -0,0 +1 @@ +{"41349228|11720829": []} diff --git a/edge/graph_18105696.jsonl b/edge/graph_18105696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18111745.jsonl b/edge/graph_18111745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e52e270a17b5092233c20380741e686d3db05db --- /dev/null +++ b/edge/graph_18111745.jsonl @@ -0,0 +1 @@ +{"4168679|431089": []} diff --git a/edge/graph_18112919.jsonl b/edge/graph_18112919.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d98a9ff998b7408e9d81cbe68e66f785fd3d4ee --- /dev/null +++ b/edge/graph_18112919.jsonl @@ -0,0 +1,3 @@ +{"18023504|10500613": ["field of data modeling and databases [29]; comparison of UML models or metamodels in the context of model-driven engineering [34,7]; the computation of refactorings from different OO program versions [26, 5]."]} +{"15154520|7923260": []} +{"10590298|16125167": []} diff --git a/edge/graph_18115528.jsonl b/edge/graph_18115528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a741f938171a5f385c32b332bbfd5edeb05924a4 --- /dev/null +++ b/edge/graph_18115528.jsonl @@ -0,0 +1,8 @@ +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"9037062|1230643": []} +{"17166573|870434": [", building underwater sensor networks) to enable/enhance applications such as oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications [9], [8], [2], [4], [3], [7]."]} +{"38834550|42347181": []} +{"38834550|870434": []} +{"38834550|1236072": []} +{"10283322|870434": []} +{"46139527|870434": ["First of all, bandwidth of acoustic communication is limited to 40 km\u22c5kbps in deep water [3]."]} diff --git a/edge/graph_18117372.jsonl b/edge/graph_18117372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..662a1b348b9d34240b404c769bfa5f9b61e8bca1 --- /dev/null +++ b/edge/graph_18117372.jsonl @@ -0,0 +1,6 @@ +{"4700370|14441987": []} +{"1513664|14441987": ["Several data dissemination mechanisms (LEACH [Heinzelman et al. 2000] \nand directed diffusion [Intanagonwiwat et al. 2000]), and ad hoc routing protocols [Royer and Toh 1999] \nhave been proposed in the literature."]} +{"15379285|164835": ["Several radio-location methods are proposed for locating the Mobile Stations (MSs) in cellular systems [ 4 ]: the Signal Strength method, the Angle of Arrival (AOA) method, the Time of Arrival (TOA) and Time Difference of Arrival (TDOA) methods."]} +{"16461414|10287248": ["There are two basic types of routing strategies [ 16 ]: 1) source routing, and 2) distributed routing.", "An overview and comparison of different multicast routing algorithms can be found in [ 16 ], [17]."]} +{"16082707|1230643": ["We propose a system architectur and a set of lightweight collaborative signal processing algorithms that achieve real-time behavior while minimizing inter-node communication to extend the system lifetime."]} +{"47158101|2835258": ["Knowledge of location can be used to report the geographical origin of events, to assist in target tracking, geographic aware routing [11], to administer the sensor network and evaluate its coverage [12]."]} diff --git a/edge/graph_18121337.jsonl b/edge/graph_18121337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f72869c46bae34071c7e884c16c45107b9349d93 --- /dev/null +++ b/edge/graph_18121337.jsonl @@ -0,0 +1 @@ +{"26274280|3102110": []} diff --git a/edge/graph_18125683.jsonl b/edge/graph_18125683.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18126947.jsonl b/edge/graph_18126947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e04403a09c9b996d3b38048480cf782f6b66d77 --- /dev/null +++ b/edge/graph_18126947.jsonl @@ -0,0 +1 @@ +{"15273985|8659730": ["Basic task of within-network classification [1, 12] is to assign the correct labels to the unlabeled nodes from a set of the possible class labels."]} diff --git a/edge/graph_18132552.jsonl b/edge/graph_18132552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_181328950.jsonl b/edge/graph_181328950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e43a3d54d06234f1afed70d9eb9326f261a28e9 --- /dev/null +++ b/edge/graph_181328950.jsonl @@ -0,0 +1,7 @@ +{"18100723|12098072": ["DUE TO HIGH efficiency and high power density, permanent magnet (PM) motors have been widely accepted for industrial and vehicular applications [1], [2]."]} +{"114586031|12098072": ["Permanent magnet (PM) machines benefit from high torque density and high efficiency, which have been extensively investigated and employed [1], [2]."]} +{"24320718|12098072": []} +{"59601328|12098072": ["To extend their constant power speed range (CPSR), the flux-weakening (FW) control is generally required due to the constant PM fields, which is widely recognized as a challenging issue for traction applications [2], [3]."]} +{"42412617|12098072": ["Although permanent magnet (PM) machines benefit from high efficiency and high torque density, the relatively fixed magnetic field of PMs brings challenges to effective and efficient flux-weakening during high-speed operations [1], [2]."]} +{"36490553|12098072": ["PERMANENT MAGNET (PM) machines are highly desirable for renewable energy conversion and vehicular propulsion applications due to their high efficiency, highpower density, and low-cost maintenance [1]."]} +{"32594693|12098072": ["In the integrated EVT in Fig.", "3(b) shows the 1997 Toyota electric variable transmission (EVT) [5]].", "The brushes can be removed; and radial and axial flux examples of integrated brushless machines that could be utilized in the EVT are shown in Fig.", "In an HEV, the space for the drive train is more restricted due to the presence of the ICE and the EVT; EVs tend to be more straightforward, and thus, they are more amenable to IM use.", "(b) Toyota Prius power split device [5].", "Integration of two PM motors into the EVT [5], [6] (one brushless machine now has a rotating stator winding; thus, slip rings are required)."]} diff --git a/edge/graph_18133274.jsonl b/edge/graph_18133274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d1ef467bf145785388bbd7682a05c5697db15f1 --- /dev/null +++ b/edge/graph_18133274.jsonl @@ -0,0 +1,4 @@ +{"23560521|5473785": []} +{"8932338|7158350": ["Some approaches to this problem are based on various functional representations such as decision trees, neural networks, decision graphs [2,23,29,42], associated with decision rules."]} +{"8932338|192934": ["In order to describe symbols, a lot of different shape descriptors have been proposed (see surveys [15,33,40]) but one descriptor is usually not enough to describe all kinds of shapes properly and therefore to give satisfactory shape recognition rates."]} +{"18334978|17516538": ["readers to a recent survey [3]."]} diff --git a/edge/graph_181336525.jsonl b/edge/graph_181336525.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18137319.jsonl b/edge/graph_18137319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7a14b3cd80e3a7473544d8257607146cf2d6b57 --- /dev/null +++ b/edge/graph_18137319.jsonl @@ -0,0 +1 @@ +{"14241853|14037972": []} diff --git a/edge/graph_18137378.jsonl b/edge/graph_18137378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7dce9f7df97eb12b34ca825db02cd02b0cf67b6 --- /dev/null +++ b/edge/graph_18137378.jsonl @@ -0,0 +1 @@ +{"12492569|2795037": ["Chaudhuri [7] discussed the fundamental requirements such as search spaces, an accurate cost estimation technique, an efficient algorithm and an optimizer to generate the best", "Therefore, it is obviously not an easy task for an optimizer to generate an optimal plan [7].", "optimization Chaudhuri [7] Selecting the best execution plan for a", "Query evaluation and its optimization belong to a broader class of research, and much work has been performed in this field since the early 1970s [7]."]} diff --git a/edge/graph_18144244.jsonl b/edge/graph_18144244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18148591.jsonl b/edge/graph_18148591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..87b12e5f50a63dbe6d72fb8685deeaa1864bb898 --- /dev/null +++ b/edge/graph_18148591.jsonl @@ -0,0 +1,5 @@ +{"7517522|3054454": ["An alternative approach to ray-tracing simulations is to use scattering models [9], [12] to characterize the spatial fading cor-"]} +{"7164155|3054454": ["Transmission takes place in a possibly correlated fading channel represented by the M \u00d7N channel matrix H."]} +{"2494137|3054454": ["For an overview of the numerous scattering models, see [10]."]} +{"5879463|36610012": []} +{"8553815|3054454": []} diff --git a/edge/graph_18149616.jsonl b/edge/graph_18149616.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18151539.jsonl b/edge/graph_18151539.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03d7b82d0db1c033621e84b1a2c4fb6ba2b5eb17 --- /dev/null +++ b/edge/graph_18151539.jsonl @@ -0,0 +1,2 @@ +{"6609086|39332633": ["The basic PSO has shown to perform robustly well on various relatively low-dimensional optimization problems [6], however often poorly on high-dimensional problems [7]\u2013 [9], which is usually caused by premature convergence."]} +{"1778326|1517662": []} diff --git a/edge/graph_18159377.jsonl b/edge/graph_18159377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d6d4789ee80a8f3acf6693bb236f3b7c9b87e434 --- /dev/null +++ b/edge/graph_18159377.jsonl @@ -0,0 +1 @@ +{"15805776|11118693": [" p. \u2013 starts-with(p;w): tests if the string wis a pre\ufb01x of a string selected by p. 5.1 Tree Automata Representation Tree automata are a well-known and popular tool for reasoning about XML, see, e.g., [24,39,49,55]. Only seldomly have they been used as a tool for query evaluation. In [27] automata are used to evaluate, on an XML stream, many (very simple) XPath queries in parallel. It is well-known that Core XP"]} diff --git a/edge/graph_18161174.jsonl b/edge/graph_18161174.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b4af93cba02188ee4858e1568afdde4298941d6 --- /dev/null +++ b/edge/graph_18161174.jsonl @@ -0,0 +1 @@ +{"110090164|469744": ["The most significant factor that hinders the effective development and use of AR systems is the requirement of accurate, long-range sensors and trackers [27]."]} diff --git a/edge/graph_181615746.jsonl b/edge/graph_181615746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_181631491.jsonl b/edge/graph_181631491.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f73b1268e8c3ef5656e2d5def6a9c14f048a7b6 --- /dev/null +++ b/edge/graph_181631491.jsonl @@ -0,0 +1,11 @@ +{"26619090|18973396": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"26619090|3241708": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"6634488|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [93], [94], [95]."]} +{"32730475|195881905": []} +{"32730475|181631491": []} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"169770795|3628110": []} +{"169770795|37852736": []} +{"169770795|1464669": []} +{"169770795|3434731": []} diff --git a/edge/graph_18163830.jsonl b/edge/graph_18163830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18167210.jsonl b/edge/graph_18167210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..579b58bcb083ee99b956aae218e263dd6a7e2d9e --- /dev/null +++ b/edge/graph_18167210.jsonl @@ -0,0 +1,50 @@ +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"8649353|7193476": ["4) As new technologies and devices are constantly introduced into industrial systems, user interface integration for industrial systems poses many new problems [27] like various interface types, standards, de \ufb01 nitions, and service interfaces (functional, discovery, binding, etc.) [71].", "Data integration involves a lot of data mapping and conversion among different elements including data source schema, targeted data schema, and the mapping relationship between data source schema and targeted data schema [25], [27].", "The integration in the presentation layer mainly focuses on the user interface (UI) integration [27].", "A traditional way for the application integration involves complex system and network programming [25], [27].", "So far, the research community has not done enough work at the presentation level [27].", "The drawback of data integration is that developers will have to understand and maintain the underlying schemas regularly to address any changes [27].", "Further work on effective standardization and instructional design at the presentation level is needed for effective user interface integration to take place [27]."]} +{"31381421|16335158": ["Sensor-cloud computing: sensor-cloud computing refers to the on-field WSN applications empowered with cloud computing (Ojha et al., 2014; Alamri et al., 2013; Zhu et al., 2014)."]} +{"31381421|1503157": ["Among all these technologies, the agriculture domain is mostly explored concerning the application of WSNs in improving the traditional methods of farming (ur Rehman et al., 2014; Zhao et al., 2013; Wang et al., 2006; Akyildiz et al., 2002a,b; Akyildiz and Kasimoglu, 2004; Yick et al., 2008; Ruiz-Garcia et al., 2009)."]} +{"31381421|1230643": []} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"18290508|595093": ["Different categories of security attacks specific to the smart grid domain have been discussed and identified in previous survey papers [117,21,295,296,24,297]."]} +{"18290508|5747564": []} +{"18290508|14088590": []} +{"18290508|6959212": ["The IEEE 802.16 standard, commercialized under the name of WiMAX, was firstly released in 2001 to support long-distance (up to 7\u201310 km) broadband (up to 100 Mbps) wireless communications, especially in rural and suburban areas [147].", "In general, the trend is to prefer licensed wireless technologies, such as WiMAX [11] [83] and GSM/GPRS [45] [172], for the communications in the neighborhood area networks, because grid operators can establish their own private network infrastructure, which makes easier to guarantee the required communication reliability and QoS.", "In general, the trend is to prefer licensed wireless technologies, such as WiMAX [11] [83] and GSM/GPRS [45] [172], for the communications in the neighborhood area networks, because grid operators can establish their own private network infrastructure, which makes easier to guarantee the required\u2026", "As for 802.11, different versions of WiMAX technologies exist.", "IEEE 802.16-based networks (WiMAX).", "Furthermore, a base station is deployed to serve an area containing multiple NANs, which receives the data sent by NAN concentrators over dedicated WiMAX channels, and forwards this information to the regional control center over a wired network (e.g., using the Internet core backbone).", "WMNs have the potential to bring many advantages also to the smart grid communication system and many studies have advocated the use of WMNs in smart grids [11] [16].", "Finally, as observed in Section 5.2 most popular wireless technologies, including WiFi, ZigBee and WiMAX, are now including amendments to their standards to provide support for multi-hop communications (e.g, 802.11s and 802.16j)."]} +{"18290508|7971188": ["For instance, multipoint-to-point (MP2P) communications are important in monitoring applications, which require to periodically and simultaneously collect status information from a large number of sensors.", "\u2026i.e., distributed systems in which devices (peers) self-organize into a network and cooperate with each other by contributing part of their (storage, computing, bandwidth ) resources to offer useful services, such as data search, distributed storage, or computational intelligence [107] [108].", "Furthermore, middleware is increasingly used to create peer-to-peer (P2P) overlays, i.e., distributed systems in which devices (peers) self-organize into a network and cooperate with each other by contributing part of their (storage, computing, bandwidth ) resources to offer useful services, such as data search, distributed storage, or computational intelligence [107] [108].", "Distributed communication architectures have emerged in the past to support Internet services in a scalable manner, such as peer-to-peer networks (P2P) [107], which could also be applied in the smart grid context.", "Therefore, other studies have considered alternative approaches based on self-organizing P2P technologies.", "Thus, other studies argue that unstructured P2P networks, which do not maintain a rigid overlay network, are more suitable for smart grid applications in which data must be distributed to a large number of interested parties at the same time [241].", "Given the ability of P2P technologies to scale with increasing numbers of devices and services, several studies have proposed to use P2P-based middleware technologies to deal with the complexity of managing and controlling smart grids [109]."]} +{"18290508|1236072": ["It is also important to point out that in the last few years there has been a growing interest from the research community in designing optimized networking protocols for WSNs, which could potentially match the requirements of the smart grid (interested readers are referred to [186,187,205] for detailed surveys)."]} +{"18290508|10559330": ["Several QoS-based frameworks have been proposed for the Internet, such as Integrated Services (IntServ) [216], Differentiated Services (DiffServ) [217], and Multi-Protocol Label Switching (MPLS) [218], which could be applied"]} +{"18290508|121289": []} +{"18290508|18037424": ["Similarly, different measurements of scalability can be considered, such as the size of routing tables as the number of nodes increases, or the amount of communication resources used by each node [115] [16].", "A variety of technologies, network topologies and communication protocols are considered for each of these categories [14] [16].", "These networks are commonly named Field Area Networks (FANs), or Neighborhood Area Networks (NANs) [14] [16].", "WMNs have the potential to bring many advantages also to the smart grid communication system and many studies have advocated the use of WMNs in smart grids [11] [16].", "To recognize those similarities is important because they motivate the adoption of Internet design principles when designing scalable, reliable and secure networking solutions for the smart grid [14] [165] [16].", "\u2026the communication infrastructure in terms of channel bandwidth to ensure low transmission delays and reduce packet losses on transmission buffers [16] The key capabilities for smart grid communications can be summarized as follows: Scalability: A smart grid can involve millions of users and\u2026"]} +{"12638820|1113420": []} +{"11258877|1077083": ["Based on the data structure used for expressing and exchanging contextual information, papers [28\u201330,49] have summarized context models that have been proposed earlier.", "Although several survey papers can be found in literature, focusing on context modeling techniques [27\u201330] and service discovery protocols for PvC environments [31\u201333], the current paper is a comprehensive survey, which summarizes the general issues, characteristics and design considerations of available PvC middleware solutions."]} +{"11258877|1113420": ["Based on the data structure used for expressing and exchanging contextual information, papers [28\u201330,49] have summarized context models that have been proposed earlier.", "Although several survey papers can be found in literature, focusing on context modeling techniques [27\u201330] and service discovery protocols for PvC environments [31\u201333], the current paper is a comprehensive survey, which summarizes the general issues, characteristics and design considerations of available PvC middleware solutions."]} +{"11258877|12817488": ["Data aggregation [58] is the process of aggregating data from multiple sensors to eliminate redundant transmission and provide fused information to the base station in an energy-efficient manner while reducing latency."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"9413021|17623152": []} +{"9413021|2357830": []} +{"9413021|1236072": []} +{"9413021|1230643": ["Multihopping is a common technique to save energy and overcome the scalability issue [123]\u2013[125]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"33172940|62453632": ["[36]."]} +{"40932686|10693567": []} +{"206634147|1230643": ["The pending data frame is then sent using slotted CSMA-CA or, if possible, immediately after the acknowledgement [3][6] [7][8].", "For example, a temperature sensor and accelerometer could be combined within a single device used for industrial plant monitoring applications[6][7]."]} +{"17369195|18717047": ["It is can be flexible for resource representation [20], and for ubiquitous service application with wireless communication [21]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"16142834|10559330": []} +{"9003374|6959212": []} +{"29538755|2357830": ["However, alternative methods such as Radio Frequency Identification (RFID) tags (Juels, 2006), optical tags (Kainka, 2003) and Infra-red based motion sensors (Moore, 1999) have been used where image acquisition and analysis is not possible due to issues such as privacy, disk space, and computational cost."]} +{"29538755|6275330": []} +{"29538755|16525678": []} +{"29538755|16352922": []} +{"6502061|7329149": []} +{"6502061|1598350": []} +{"6502061|206901977": ["Regarding greenWSN, the following techniques should be adopted [7], [9], [29], [30]: 1) Make sensor nodes only work when necessary, while spending the rest of their lifetime in a sleep mode to save energy consumption; 2) Energy depletion (e."]} +{"6502061|16335158": ["OVERVIEW OF SENSOR-CLOUD Defined by IntelliSys,1 sensor-cloud is \u2018\u2018an infrastructure that allows truly pervasive computation using sensors as an interface between physical and cyber worlds, the datacompute clusters as the cyber backbone and the internet as the communication medium\u2019\u2019 [13], [14].", "Attracting increasing interest from both academic and industrial communities, sensor-cloud [13], [14], [53] is actually a new paradigm, motivated by complementing 1) the ubiquitous data sensing and data gathering capabilities of WSNs as well as 2) the powerful data storage and data processing abilities of CC.", "With sensor-cloud integration, there are many favorable advantages [13], [14], benefiting the users and the WSN as well as the cloud.", "With that, towards green IoT, we review the latest developments in sensor-cloud [13], [14] which is a novel paradigm in green IoT, and further envision the future sensor-cloud.", "com/system-overview powerful cloud computing technologies to provide excellent data scalability, rapid visualization, and user programmable analysis\u2019\u2019 [13], [14]."]} +{"6502061|14650419": []} +{"6502061|2357830": ["\u2022 RFID (radio-frequency identification) [16]: a small electronic device that consists of a small chip and an antenna, automatically identifying and tracking tags attached to objects."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"9951503|5621151": []} +{"154567956|13932708": []} +{"32558312|1113420": ["This context-awareness has the potential to revolutionize new mobile social applications by taking into account not only friends\u2019 profiles but also their locations when starting conversations or establishing new friendships (Hansen and Bouvin, 2009; Baldauf et al., 2007).", "The method of context-data acquisition is very important when designing context-aware systems because it predefines the architectural style of the system, at least to some extent (Baldauf et al., 2007)."]} diff --git a/edge/graph_18170583.jsonl b/edge/graph_18170583.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18171133.jsonl b/edge/graph_18171133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1fdf1d248fa9e6b2bdbe8e3e3e5d312d4fb49c8 --- /dev/null +++ b/edge/graph_18171133.jsonl @@ -0,0 +1,10 @@ +{"9485309|1560135": ["(1999) (approximation algorithms), Val\u00e9rio de Carvalho (2002) (linear programming methods) and Clautiaux et al. (2010) (lower bounds).", "The interest reader is referred to the surveys by Coffman et al. (1999) (approximation algorithms), Val\u00e9rio de Carvalho (2002) (linear programming methods) and Clautiaux et al. (2010) (lower bounds).", "(1999) (approximation algorithms), Val\u00e9rio de Carvalho (2002) (linear programming methods) and Clautiaux et al. (2010) (lower bounds). The BPP-P inherits from the BPP all its great theoretical interest in combinatorial optimization. An extension of the BPP-P is the Generalized Bin Packing Problem (G-BPP), that was introduced by Garey et al. (1976) and consists of a multidimensional version of the BPP-P where items and bins have s \u2265 1 dimensions.", "The interest reader is referred to the surveys by Coffman et al. (1999) (approximation algorithms), Val\u00e9rio de Carvalho (2002) (linear programming methods) and Clautiaux et al.", "(1999) (approximation algorithms), Val\u00e9rio de Carvalho (2002) (linear programming methods) and Clautiaux et al. (2010) (lower bounds). The BPP-P inherits from the BPP all its great theoretical interest in combinatorial optimization. An extension of the BPP-P is the Generalized Bin Packing Problem (G-BPP), that was introduced by Garey et al. (1976) and consists of a multidimensional version of the BPP-P where items and bins have s \u2265 1 dimensions. In the G-BPP each item j has weights w(1) j , w 2 j , . . . , w s j and each bin has capacities C (1), C(2), . . . , C. The problem asks for a packing of all the items in the minimum number of bins, so that the bin capacities are not exceeded and the precedences are satisfied. In Garey et al. (1976) the authors presented simple heuristic algorithms and proved an asymptotic worst case performance of 2."]} +{"1332066|7922155": []} +{"207565901|1560135": ["The most relevant approach of this kind (somehow anticipated by Wolsey [155] in 1977) was presented in 1999 by Vale\u0301rio de Carvalho [145] for the CSP.", "Similar considerations hold for the BPP.\nVale\u0301rio de Carvalho [147] proposed dual cuts to accelerate the column generation process for the CSP.", "For further details, we refer the reader to the specific survey by Ben Amor and Vale\u0301rio de Carvalho [14], who show how the set covering formulation (24)-(26) can be derived from various compact formulations though Dantzig-Wolfe decompositions.", "\u2022 Pseudo-polynomial formulations solved via ILP (see Section 4):\n\u2013 ONECUT, C++ implementation of the one-cut model by Rao [114], Dyckhoff [49], and Stadtler [139], solving the resulting ILP through CPLEX 12.6.0, available at the BPPLIB;\n\u2013 ARCFLOW, C++ implementation of the arc-flow model by Vale\u0301rio de Carvalho [145], solving the resulting ILP through CPLEX 12.6.0, available at the BPPLIB;\n\u2013 DPFLOW, C++ implementation of the DP-flow model by Cambazard and O\u2019Sullivan [22], solving the resulting ILP through CPLEX 12.6.0, available at the BPPLIB;\n\u2013 VPSOLVER, C++ implementation by Branda\u0303o and Pedroso [19], which uses Gurobi 5.6 as inner routine, available at https://code.google.com/p/vpsolver.", "An effective CSP pseudo-polynomial formulation, denoted arc-flow, was presented by Vale\u0301rio de Carvalho [145], who used it in a branch-and-price algorithm (see Section 6).", "Vale\u0301rio de Carvalho [145] proposed however a number of improvements to the above basic model, aimed at reducing the number of arcs.", "Vale\u0301rio de Carvalho [146] presented a survey of the most popular Linear Programming (LP) methods for the BPP and the CSP.", "In the late nineties, Vale\u0301rio de Carvalho [145] proposed a column generation approach which is not based on the traditional Gilmore-Gomory model but on the arc-flow formulation of Section 4.4.", "They start with a multi-graph generalization of the arc-flow formulation by Vale\u0301rio de Carvalho [145] which uses a level per item type and can be seen as a CSP version of the DP-flow formulation.", "We refer the reader to Clautiaux, Alves, and Val\u00e9rio de Carvalho [28] for a recent survey on these functions and their use for the computation of BPP lower bounds, and to the recent article by Rietz, Alves, and Val\u00e9rio de Carvalho [113].", "We anticipate its description in Section 4.3, since this makes it easier to understand the Vale\u0301rio de Carvalho model, which is then discussed in Section 4.4 together with a recently proposed variant."]} +{"31372471|2854761": []} +{"46219993|2854761": []} +{"46219993|16629628": []} +{"34161232|7139869": ["System improvement/extension [46,48,60,67].", "Recon\ufb01guration, recon\ufb01gurable systems [5,6,7,11,12,18,22,45,46,48,50,53,60,67] 6."]} +{"34161232|7922155": ["The system composition problem can be based on multiple choice problem or morphological clique problem (while taking into account compatibility between the selected DAs) [46,48,50,53,55,67].", "Morphological system design (combinatorial synthesis) based on hierarchical multicriteria morphological design (HMMD) approach (an hierarchical extension of morphological analysis while taking into account ordinal estimates of DAs and their compatibility) [46,48,53,55,67].", "Recon\ufb01guration, recon\ufb01gurable systems [5,6,7,11,12,18,22,45,46,48,50,53,60,67] 6.", "Products/systems con\ufb01guration [13,14,25,38,46,48,50,53,55,67,79,80,90,95,96,97,98,99,100,102] 5."]} +{"34161232|1188683": ["Recon\ufb01guration, recon\ufb01gurable systems [5,6,7,11,12,18,22,45,46,48,50,53,60,67] 6."]} +{"54726779|18105696": ["Main reference includes the following: (Ahuja and Orlin, 2000, 2001; Burkard et al., 2008; Burton and Toint 1992; Chung and Demange, 2008, 2012; Heuberger, 2004)."]} diff --git a/edge/graph_18172024.jsonl b/edge/graph_18172024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18175529.jsonl b/edge/graph_18175529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_181761152.jsonl b/edge/graph_181761152.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2698317679dfb75139a1ed2be215043e86d54ed9 --- /dev/null +++ b/edge/graph_181761152.jsonl @@ -0,0 +1,54 @@ +{"68245425|3628110": ["The survey in [3] describes different kinds of security threats in blockchain-based systems and security-related enhancement solutions for them."]} +{"18108642|205286988": []} +{"18108642|1236072": []} +{"18108642|7278743": []} +{"15136060|17421961": []} +{"35445699|17818556": ["In contrast to SIP, MIP overcomes the weaknesses of using SIP, especially on a massive scale of WSN.32,33\nFigure 6 shows that the multi-MAs are dispatched to the network area with two different itineraries.", "This process of sampling the information and transmitting data from nodes to the sink is called data gathering,2 which is considered as one of the challenges in designing a WSN.3\nMany researchers have widely pursued data gathering to minimize the power consumption in WSNs.", "In contrast to SIP, MIP overcomes the weaknesses of using SIP, especially on a massive scale of WSN.(32,33) Figure 4."]} +{"8802226|43033940": []} +{"5607129|6415369": []} +{"26548607|17205659": ["One such attack is the exhaustion attack, in which an attacker exploits repeated collisions causing resource exhaustion, by letting a node retransmit the packets continuously [22]."]} +{"18306152|7988320": []} +{"18306152|7085121": []} +{"18306152|562065": []} +{"18306152|15300368": []} +{"18306152|1503157": ["This issue can be addressed by integrating RFID with WSN as WSN provides longer reading range as well as other benefits like different network topologies and flexibility, variety of sensors that are already implemented and low power consumption [31]."]} +{"18306152|1236072": ["techniques [7, 13, 14], MAC protocols [15\u201317], congestion control [18, 19], data col-"]} +{"41496104|4915696": []} +{"41496104|5664472": []} +{"41496104|5401262": []} +{"41496104|16525678": []} +{"41496104|8729078": []} +{"30815117|206901977": ["[23] Along this line, data fusion techniques have been developed to enable energy and spectral savings through aggregating raw data at intermediate SNs and forwarding only higher-level information."]} +{"30815117|17818556": ["However, SIP algorithms do not scale on larger deployments (traveling MAs accumulate data from visited SNs; thus, the end-to-end delay and the overall energy expenditure grow rapidly as the network scale increases[8, 16])."]} +{"6820964|6959212": []} +{"6275330|1230643": ["Other applications of wireless sensors to healthcare that have been proposed include tracking and monitoring doctors and patients, or tracking drug usage inside hospitals [36]."]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"54562201|1734833": []} +{"45277381|1230643": []} +{"17358207|15947359": []} +{"17358207|12127129": []} +{"8215225|10837932": ["there is still need for energy efficient approaches [7]."]} +{"8215225|9554464": ["presented in [10], and on security in [11], [12]."]} +{"8215225|12817488": ["presented in [10], and on security in [11], [12]."]} +{"4604166|9171235": ["Network lifetime is de\ufb01ned in this work as the duration when the \ufb01rst sensor node in the network dies because of the depletion of its energy [30]."]} +{"4604166|35445699": ["In large-scale networks, SIP exhibits the following drawbacks [9]: 1) Long delays because of migration to hundreds of source nodes 2) An increase in MA\u2019s packet size due to the aggregation of data from a huge number of visited source nodes 3) Low reliability when MA accumulates a considerable\u2026"]} +{"4604166|17818556": []} +{"45554310|5574189": ["Visual sensor networks (VSNs) are special kinds of wireless sensor networks (WSNs) that form the resource constraining self-organizing sensor nodes where some or all of them are equipped with a low-power camera for a group of multimedia sensing tasks [1\u20133]."]} +{"45554310|15947359": ["\u2026area in the form of conventional or infrared images and video streaming, and can foster the development of monitoring and surveillance applications [4\u20136], including traf\ufb01c control systems, person locator services [7], industrial process control systems, seismic sensing and hazardous environment\u2026"]} +{"45554310|12127129": ["According to literatures, most of the previous approaches used the different background subtraction techniques for object detection in VSNs [16].", "Many approaches were suggested for each camera node using a background subtraction technique to detect the presence of moving objects [16]."]} +{"3300077|8618569": ["ment monitoring, workforce productivity, and plant management [13].", "as there is no apparent physical boundary of the transmission medium [13].", "attack consists of attacking nodes by running malicious code in them [13]."]} +{"3300077|1940388": ["Most symmetric schemes use key predistribution to ease the difficulty of key management [58].", "This way it shows its different identities to nodes in the network and can significantly reduce the effectiveness of fault tolerant schemes such as distributed storage [10], dispersity [11], multipath [31], and topology [32], [33], [58].", "Symmetric key cryptography is difficult for key deployment and management [58]."]} +{"3300077|1230643": ["them an ideal choice for ensuring energy-efficient services and reliable management at hazardous plants, assembly lines, and high-asset protection applications [2], [3]."]} +{"51878494|15947359": []} +{"51878494|12127129": ["The plan behind the method is extracting the moving objects from the difference between the foreground and background images [12].", "Then each camera node used background subtraction technique for detecting the objects [12].", "According to literature, most of the traditional approaches in VSNs are based on background subtraction techniques [12]."]} +{"3983369|10329355": ["Using the data from the traffic sensor networks, ITS can offer solutions to solve many traffic related problems [10] such as traffic jams in certain zones or time slots."]} +{"3983369|10096622": ["Kulkarni and Venayagamoorthy [16] show a study on the use of Particle Swarm Optimization (PSO) in WSN to optimize the number and location of sensors in terms of coverage, connectivity and energy efficiency."]} +{"3566167|35445699": ["However, in a large-scale networks, SIP incurs the following drawbacks [14]:", "The itinerary planning algorithms can be classified into single itinerary planning (SIP) and multi itinerary planning (MIP) [14]."]} +{"3566167|8652282": ["low energy adaptive clustering hierarchy (LEACH), hybrid energy-efficient distributed clustering approach (HEED), and energy-efficient opportunistic routing (EEOR) have been proposed to minimize energy consumption and increase the network\u2019s lifetime [3]."]} +{"3566167|17818556": ["A WSN is defined as a complete graph G = (V, E) [11], consisting of a set of N vertices, |V| = N, where each vertex i, (i = 0, 1, 2, .", "The use of the MA-based computing paradigm provides several advantages [11,12] in the field of WSNs, including:", "Although the MIP did overcome the weaknesses of the SIP algorithms, its design is complicated due to the introduction of several challenging issues [11], which include:"]} +{"12797509|6275330": []} +{"20156489|1230643": ["In these unattended environments, these sensors cannot be easily replaced or recharged, and energy consumption is the most critical problem that must be considered [2], [3]."]} +{"2111430|1230643": ["Compared with sensing and computation, communication is the most expensive operation (in terms of energy consumption) in the context of data gathering [8].", "We adopt the reasonable approximation that sending a data packet consumes the same amount of energy as receiving a data packet [8]."]} diff --git a/edge/graph_18177241.jsonl b/edge/graph_18177241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_181827100.jsonl b/edge/graph_181827100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e4bc5994b330cbac2f8150850867022ad4fac3e --- /dev/null +++ b/edge/graph_181827100.jsonl @@ -0,0 +1 @@ +{"26096667|6392800": ["The power map for a given IC chip can be estimated using voltages and currents in each device or in circuit blocks [30]."]} diff --git a/edge/graph_18183559.jsonl b/edge/graph_18183559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..503d1346795812716559afa79e4b2f514dfa4da1 --- /dev/null +++ b/edge/graph_18183559.jsonl @@ -0,0 +1,13 @@ +{"6742026|15082313": []} +{"6742026|534755": []} +{"12925450|534755": ["Recently, dynamic modeling of gene regulatory networks from time series data has received more and more research interest [10], [35]."]} +{"5633313|534755": []} +{"15882041|534755": ["important biological implications include S-systems [27] and sigmoid functions [ 7 ]."]} +{"11427017|534755": ["As described in the literature, various methods have been proposed for modeling GRNs including Boolean Networks, Differential Equations, Markov Chains, Neural Networks, and methods that are hybrids of these; refer to [15] for a review and [1], [10] for a comparison of some of the recently proposed methods."]} +{"3099524|534755": ["There are many approaches for network formation, ranging from Boolean circuits to very complicated nonlinear spatial models; see [1] and the references therein."]} +{"13776940|191396": ["A major advancement in genetic experimental technologies, DNA microarray analysis provides a systematic method to characterize genetic functions, discriminate disease types, and test drug effects (McLachlan, Do, & Ambroise, 2004; Xu & Wunsch II, 2005)."]} +{"13776940|534755": ["\u2026way to measure the gene expression levels of up to tens of thousands of genes simultaneously under many different conditions, which makes it possible to investigate gene relations and interactions when taking the entire genome into consideration (De Jong, 2002; D'haeseleer et al., 2000).", "Several computational models have been proposed to infer regulatory networks through the analysis of gene expression data (De Jong, 2002; D'haeseleer et al., 2000; Xu et al., 2004a).", "Despite such restrictions, simplification has the advantage of measurements over a very large scale, and the use of mRNA expression-based microarrays has led to many interesting and important results (Bar-Joseph, 2004; De Jong, 2002; D'haeseleer et al., 2000)."]} +{"6087278|534755": ["\u2026Republic of Korea c College of Medicine, Seoul National University, Jongno-gu, Seoul 110-779, Republic of Korea\nReceived 15 January 2007; accepted 30 March 2007\nbstract\nOrdinary differential equations (ODE) have been widely used for modeling and analysis of dynamic gene networks in systems biology.", "\u2026ave been applied with some success, they are mostly demanding n the data along with a certain degree of a priori information.\nor instance, a popular approach using steady state gene expresion data has been proved to be highly effective in simplifying he mathematical formulations to infer small\u2026", "\u2026data with noise, (2) reconstruction of a ene network from synthetic gene expression data with time-delay, (3) reconstruction of a gene network from synthetic gene expression data with oise and time-delay, and (4) reconstruction of a gene network from experimental time-series data in budding\u2026"]} +{"7741432|15082313": ["Readers are encouraged to consult several reviews on inferring gene networks [14\u201324]."]} +{"7741432|534755": ["models can be found in the literature [37].", "Boolean networks are easy to simulate and are therefore less computationally taxing, but it has been proven that Boolean networks are not able to capture certain system behaviors that can be captured by continuous models [37]."]} +{"2683776|534755": ["It has been adapted and extended from [21] to allow added functionality and illustrate items important to our methods.", "The oval boxes represent data, knowledge, or biological cells, while the square boxes represent functionality, and the arrows represent data flow (adapted from De Jong [21])."]} diff --git a/edge/graph_18188725.jsonl b/edge/graph_18188725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e18fcb314ae7ec8af5bd8fdc02833b9878049ca7 --- /dev/null +++ b/edge/graph_18188725.jsonl @@ -0,0 +1,30 @@ +{"63900366|8516210": ["However,\nrequired to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al. [2], existing methods roughly be divided into four main categories: statistical, structu filter based, and model based.", "However, required to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al.", "References\n[1] Xie X (2008) A Review of Recent Advances in Surface Defect Detection Using Texture Analysis Techniques."]} +{"474078|1400872": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"114470829|9928823": []} +{"53304118|9928823": []} +{"53304118|393948": []} +{"113760761|211215557": []} +{"1326074|393948": ["Our architecture uses hidden variables that jointly represent features in\ngenomic sequences and tissue types when making predictions."]} +{"9776971|9928823": ["A more detailed survey of the latest deep learning studies can be found in [22]."]} +{"268486|15888893": []} +{"53141267|33286487": []} +{"110988692|9928823": []} +{"110988692|393948": []} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"3721696|18078738": ["Gao et al. [5,6] systematically reviewed the fault diagnosis with model-based, signal-based, knowledge-based, and hybrid/active approaches."]} +{"11393480|9928823": ["When these operators with the same parameters are applied on local signals (or their mapping) at different time segments, a form of translation invariance is obtained [2,7,8].", "Recently, a family of learning models has emerged called as deep learning that aim to learn higher level abstractions from the raw data [2,7], deep learning models doesn\u2019t require any hand crafted features by people, instead they will automatically learn a hierarchical feature representation from raw data."]} +{"11393480|393948": ["In this paper we treat RUL estimation problem as multivariate time series regression and solve it by adapting one particular deep learning model, namely Convolutional Neural Network (CNN) adapted from deep learning model for image classification [1,12,13], which is the first attempt to leverage deep learning to estimate RUL in prognostics."]} +{"5522822|15888893": ["Many examples in knowledge engineering areas have been found where domain adaptation can be truly beneficial and promising, including image classification, natural language processing, object recognition, and feature learning [2], [3]."]} +{"5522822|18078738": []} +{"111838731|905827": []} +{"11962339|1097238": ["among its base learners tends to achieve better generalization performance [36].", "Many works [36]\u2013[39] have demonstrated that a single method can seldom perform consistently well across a variety of applications."]} +{"21169013|18078738": ["In model-based methods, fault diagnosis algorithms are developed to monitor the consistency between the measured outputs of the practical systems and the model-predicted outputs [2]."]} +{"4681367|14808716": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} diff --git a/edge/graph_18189153.jsonl b/edge/graph_18189153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8aec4d0c835743eb3f040df9751c948294d0f255 --- /dev/null +++ b/edge/graph_18189153.jsonl @@ -0,0 +1,9 @@ +{"6438719|14441987": []} +{"9369280|14441987": ["Hence in addition to acting as a host, each mobile node has the function of routing and relaying messages for other nodes [1]."]} +{"1027180|14441987": []} +{"4471572|17033313": ["For a fair comparison between the original and the watermarked work there are efficient distortion metrics [5].", "The proposed intrusion detection approach uses a combined watermarking technique that derives from Lattice and Block-Wise ([3], [4], [5]) methods."]} +{"5543469|14441987": []} +{"17623572|14441987": ["have been completed in recent decades [17,18]."]} +{"42483682|14441987": []} +{"15044264|1230643": ["Based on the collaborative efforts of a large number of sensor nodes, WSNs have become good candidates to provide economically viable solutions for a wide range of applications, such as environmental monitoring, scientific data collection, health monitoring, and military operations [ 1 ]."]} +{"12877829|14441987": []} diff --git a/edge/graph_18190006.jsonl b/edge/graph_18190006.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18190870.jsonl b/edge/graph_18190870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef95b34bd83cd16c99722b579c31246cab681390 --- /dev/null +++ b/edge/graph_18190870.jsonl @@ -0,0 +1 @@ +{"12177082|6486398": ["The problem common to both PageRank and HITS is topic drift (Langville & Meyer, 2005) because they give the same weight to all edges.", "The problem common to both PageRank and HITS is topic drift ( Langville & Meyer, 2005 ) because they give the same weight to all edges."]} diff --git a/edge/graph_1819274.jsonl b/edge/graph_1819274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18193930.jsonl b/edge/graph_18193930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b09e9626fda3004263ec9ad3a6d2c585dbf79cc3 --- /dev/null +++ b/edge/graph_18193930.jsonl @@ -0,0 +1 @@ +{"10240347|25699143": []} diff --git a/edge/graph_18194234.jsonl b/edge/graph_18194234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6778e1d4f611dc32236331d3a7644ca551eb0a0 --- /dev/null +++ b/edge/graph_18194234.jsonl @@ -0,0 +1,3 @@ +{"10188907|9240891": ["1The terms \u201ctrust context\u201d [9] and \u201ctrust purpose\u201d [10] have been used in the literature with the same meaning.", "A good overview of access trust systems can be found in Grandison & Sloman (2000) [9].", "In order to be more specific when talking about trust, classes of trust scopes have been defined, such as Grandison & Sloman\u2019s classification (2000) [9] illustrated in Fig.", "A good overview of access trust sy tems can be found in Grandison & Sloman (2000) [9]."]} +{"1807218|9240891": []} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} diff --git a/edge/graph_18198936.jsonl b/edge/graph_18198936.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18201804.jsonl b/edge/graph_18201804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..055a4bf9fc8b2df71187ea7a69310bf2b86f29fb --- /dev/null +++ b/edge/graph_18201804.jsonl @@ -0,0 +1,3 @@ +{"13369374|5724477": []} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"4883076|14776754": []} diff --git a/edge/graph_18207813.jsonl b/edge/graph_18207813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18209379.jsonl b/edge/graph_18209379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a2daa7345885db88069b5af06848fd8912d9f2a --- /dev/null +++ b/edge/graph_18209379.jsonl @@ -0,0 +1,2 @@ +{"1071507|2835258": []} +{"206892177|7839197": ["The orthogonal properties provide strong notion of the agents [9,10]."]} diff --git a/edge/graph_182097258.jsonl b/edge/graph_182097258.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18212759.jsonl b/edge/graph_18212759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b44bebd72c1b9f06483db8ccb3ad80e9092e802 --- /dev/null +++ b/edge/graph_18212759.jsonl @@ -0,0 +1 @@ +{"7117209|14697846": ["indirectly shaped today\u2019s cloud computing technology, including peer-to-peer (P2P) computing [1], SOA [2] and autonomic computing [3]."]} diff --git a/edge/graph_18214482.jsonl b/edge/graph_18214482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15db8b8f28df8b04bbe79598c8f1560dda7e53ce --- /dev/null +++ b/edge/graph_18214482.jsonl @@ -0,0 +1,3 @@ +{"23310506|5660618": ["N ETWORKED control systems (NCSs) have been widely studied in recent years due to their extensive applications, existing ones of which include smart home, remote surgery, and smart transportation, just to name a few, and a lot of potentials are also expected in the near future [1]."]} +{"14851937|5660618": []} +{"6766548|5660618": ["Despite the advantages of the remote and distributed control that NCSs brings, the communication constraints in NCSs generally degrade the system performance or even destabilize the system at certain conditions, which therefore present a new challenge for conventional control theory [1]\u2013[5]."]} diff --git a/edge/graph_18221168.jsonl b/edge/graph_18221168.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18232089.jsonl b/edge/graph_18232089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18233859.jsonl b/edge/graph_18233859.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18234170.jsonl b/edge/graph_18234170.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_182377363.jsonl b/edge/graph_182377363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab5314e10410646de8d30a6891ca58fa526f2e35 --- /dev/null +++ b/edge/graph_182377363.jsonl @@ -0,0 +1,22 @@ +{"113923835|2298017": []} +{"132024894|17561208": []} +{"2042894|8446711": ["Some problems related to obtaining orthoimages from thermal imaging are as follows: (1) the spatial resolution of commercial thermal chambers is still low, with commercial product resolutions varying from 160 \u00d7 120 to 1280 \u00d7 1024 [41], (2) vanadium oxide microbolometers have a higher noise level compared to other sensors [52], (3) compared to optical images, thermal images have low resolution and weak local contrast [53], and (4) in the particular case of non-refrigerated cameras, the acquisition of a time series of thermal images may fluctuate due to changes in sensor temperature [54].", "Thermal cameras are used in a wide range of different applications and, compared with conventional sensors, they do not depend on any external energy source [41]."]} +{"12291678|18388986": []} +{"12291678|11112426": ["Although nonlinear mixing effects are well-acknowledged in vegetated areas [54], [55], [14], [96], [97], linear mixing models have proven to be adequate in the monitoring of vegetative systems [59], [60]."]} +{"9874361|2910221": ["Remote sensing of plant nutrients has mostly been applied to nitrogen (Mun\u0303oz-Huerta et al. 2013; Mahajan et al. 2014), with only a limited number that have attempted to classify potassium deficiency, including wheat (Pimstein et al. 2011; Mahajan et al. 2014) and rice (Chen et al. 2014).", "Keywords Potassium deficiency Arthropod performance Remote sensing Green peach aphid Canopy reflectance", "With regards to nutrient deficiencies, canopy reflectance data has mostly been applied to classification of nitrogen (Mun\u0303oz-Huerta et al. 2013; Mahajan et al. 2014)."]} +{"125918542|8569776": []} +{"125918542|2910221": []} +{"52107672|17054454": ["\u2026is largely accomplished using traditional field surveys (Fuller et al. 1998), which are time and labor intensive, and via satellite remote sensing (Xie et al. 2008), which provide coarse spatial and temporal resolution, or through manned aerial flights (Fensham and Fairfax 2002), which are\u2026", "1998), which are time and labor intensive, and via satellite remote sensing (Xie et al. 2008), which provide coarse spatial and temporal resolution, or through manned aerial flights (Fensham and Fairfax 2002), which are expensive and difficult to acquire, especially in remote, rugged terrain which results in little or no temporal repeatability."]} +{"117764485|28771682": ["If all bands are simultaneously captured, i.e. within the same exposure and thus, the full image cube is recorded without a scanning process, the cameras are referred to as snapshot cameras (Hagen, 2012)."]} +{"15006448|8446711": []} +{"134961625|7062181": []} +{"3773590|8446711": []} +{"4186970|427994": ["The role of remote sensing methods to assess and quantify the impacts of invasive pathogens in broad scale has increased exponentially [27,28]."]} +{"4186970|6104298": ["In sum, the integration of site-based and remote sensing frameworks have boosted the capabilities of these surveillance solutions by combining data from abiotic and biotic factors and spectral responses, respectively [54]."]} +{"8665024|11112426": ["According to Bioucas-Dias [54] spectral unmixing (see, for example, [74,75]) purpose is to restore the ability of ascertain materials, i."]} +{"53603857|2910221": []} +{"2100544|2910221": ["For example, the calculation of the NNI involves the cutting of fresh biomass, subsequent drying and the determination of Nt using the Dumas or Kjeldahl method in the laboratory [17]."]} +{"9291626|206051485": ["In that case, more sophisticated methods like automatic feature detection based image-to-image registration algorithms should be considered [46,47]."]} +{"89909868|2910221": ["As far as nitrogen (N) fertilization is concerned, the total N rate should be defined with due accuracy because it is the main factor affecting N use efficiency and thus the chance to obtain high yield with limited N loss to the environment (Mu\u00f1oz-Huerta et al., 2013).", "Alternative quick tests have been proposed for in-field destructive or non-destructive monitoring of the crop N status, e.g., chlorophyll meter readings (SPAD), VIS\u2013NIR spectroscopy, and nitrate-N concentration in the petiole sap (sap test) (Mu\u00f1oz-Huerta et al., 2013; Ulissi et al., 2011)."]} +{"15263986|206051485": ["We have chosen for this study to correct these different effects only by means of the georeferencing process, performed by warping any image on the basis on a single reference image for all the dates and frames [60-61-62]."]} +{"134021562|8569776": ["\u2026content, pigment composition, photosynthetic status, water content, leaf and canopy senescence, and yield under field conditions (Li et al. 2010; Li, Zhang, and Huang 2014; Claudio et al. 2006; Mistele and Schmidhalter 2008; Schlemmer et al. 2005; Ferrio et al. 2004; Cabrera-Bosquet et al.\u2026", "\u2026only three spectral broad bands are analysed, whereas spectroradiometers provide many spectral narrow bands allowing for a more accurate analysis (Li, Zhang, and Huang 2014) and assessment of VIs that correlate with a wider range of biophysical traits such as radiation use efficiency (Garbulsky\u2026"]} diff --git a/edge/graph_18240676.jsonl b/edge/graph_18240676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_182527340.jsonl b/edge/graph_182527340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18252922.jsonl b/edge/graph_18252922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18253650.jsonl b/edge/graph_18253650.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc2d1b23873fd75dd2894170e26b709649b1f5b4 --- /dev/null +++ b/edge/graph_18253650.jsonl @@ -0,0 +1,2 @@ +{"6090100|41035405": ["In contrast, cooperative diversity schemes proposed by the information theory community [20, 14] suggest that traditional routing may not be the best approach."]} +{"9382860|1230643": ["A generic survey on WSNs is given by Akyildiz [2], where the architecture, communication protocols, and algorithms for different aspects of WSN are discussed."]} diff --git a/edge/graph_1825689.jsonl b/edge/graph_1825689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_182617035.jsonl b/edge/graph_182617035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..825131a4b9bf1ee9a3fce5d35447fd9561b687f5 --- /dev/null +++ b/edge/graph_182617035.jsonl @@ -0,0 +1,49 @@ +{"49864113|2497115": ["In order to bring out accurate location information timely, many techniques have been developed based on the global positioning system (GPS) as well as wireless networks [1], [2], most of which depend on the assumption that the wireless signals propagate along the line-of-sight (LOS)."]} +{"12841589|164835": []} +{"1234760|8323234": ["The sparsity of the ch annel in the angular domain can be exploited for an effective estimation of the AoA and AoD vi a CS techniques [34], [35], [73]."]} +{"1234760|17388653": ["Since the span of impulse noise is short in time and thus can be considered as a sparse vector, we can use the CS technique to mitigate this noise [51], [52]."]} +{"1234760|2509135": ["1) Spectrum Sensing: As a means to improve the overall spectrum efficiency, cognitive radio (CR) has received much attention recently [53]."]} +{"9972747|14242212": []} +{"52303700|21557844": ["Penetration loss of several materials and the O2I penetration loss models are given in [45, Tables IX and X], respectively.", "Large-scale path loss models in 3GPP and NYUSIM are listed and compared in [45, Tables IV and V] for the UMi and UMa scenarios, respectively, where the CI models in 5GCM represent the path loss models in NYUSIM.", "\u2026denotes the probability that a given user terminal (UT) or UE is in a LOS condition with respect to the BS. LOS probability models in 3GPP [11] and NYUSIM [16] channel models for urban microcell (UMi) and urban macrocell (UMa) scenarios are contained in [45, Tables I and II], respectively."]} +{"52303700|10235514": ["\u2026MIMO [5] (cid:2) Network densi\ufb01cation using smaller cell coverage zones [6] (cid:2) New modulation waveforms A discussion of the above is given in [7] and references therein, but it is clear that new waveforms will offer the smallest capacity increase, while increased spectrum bandwidth and\u2026", "With dense networks, capacity increases in conventional ultra-high frequency (UHF)/microwave networks, interference will be the limiting factor, thus the peak rates cannot be achieved [7]."]} +{"52162202|8999817": ["These training BF vectors can be efficiently realized with any available HBF architecture [14] by including switches to the analog phase shifters.", "This cost and energy efficient BF scheme, which is sufficient for the channel estimation presented in this letter, can be realized with any available HBF architectures [14]."]} +{"52162202|8323234": ["Note also that (2) may introduce additional errors due to the angle discretization effect [1], [3].", "This knowledge is, however, very challenging to acquire in practice due to the very large numbers of transceiver antenna elements and the high channel variability [1]."]} +{"21381783|15453366": ["The millimeter wave channel characteristics, to a large extent, dictate the choice of physical (PHY) layer and medium access control (MAC) layer schemes as well as the hardware implementation [11], [12]."]} +{"53779243|8999817": ["To further reduce the complexity, analog and hybrid analog-digital schemes have been investigated [5], and the attainable fundamental localization limits using different array configurations have been investigated [6]."]} +{"115441594|9928823": []} +{"115441594|15093118": []} +{"115441594|1708582": []} +{"10433273|8323234": []} +{"67865886|8323234": ["Due to the unknown channel sparsity, power leakage [3], and channel delay, the parameter can be set according to the practical noise variance.", "Channel estimation in such hybrid MIMO architecture system is challenging, due to the indirect access to receiving antennas, the large dimension channel matrix and low signalto-noise-ratio (SNR) before beamforming [3].", "By leveraging the extended virtual channel model [3], the vector form of channel in (4) is given by vec(Hd) = (A \u2217 T AR)diag(\u039bd)"]} +{"16101170|18148591": []} +{"16101170|2835258": ["W IRELESS positioning has received increasing attention over the past decade [1]\u2013[5]."]} +{"16844001|164835": ["Some survey articles on this research area are [2], [3], [5], [1].", "This distance information can be obtained via time of arrival, received signal strength or other techniques [2], [3]."]} +{"22337449|8323234": []} +{"678032|8323234": ["Rain attenuation in different frequency bands [35]. needs to increase with the bandwidth if the signal-to-noise ratio (SNR) should remain intact [14].", "[14] is a recent overview paper on signal processing for mmWave MIMO.", "However, since the analog circuit can only partly adjust the signals, it is hard to adjust the beam to the channel conditions and this leads to a considerable performance loss [14], particularly for mobile users.", "However, realizing a fully digital MIMO implementation at mmWave frequencies is a non-trivial task, using current circuit design technology [14].", "The analog circuits of the hybrid architecture can be implemented by different circuit networks, leading to different hardware constraints [14], [115], [116].", "Yet, reference [14] is focused in mmWave MIMO and other topics e.g., recent developments of channel measure/modeling, multiple access, standardization, \ufb01eld test are missing.", "Note that references [7], [12]\u2013[14], [16] gave excellent overviews of some aspects of mmWave mobile networks from different aspects.", "In addition, fully analog architecture can only support single-stream transmission, which cannot achieve the multiplexing gain to improve spectral ef\ufb01ciency [14]."]} +{"52121943|512561": ["the cognitive radio can only use the frequency band with their cognitive ability [248], [249]."]} +{"52121943|6556803": ["[30] reviewed the localization methods to address data transfer, topology formulation, power optimization, resource optimization, sensing coverage, object discovery and security challenges."]} +{"52121943|6939676": ["[24] have evaluated localization strategies as"]} +{"52121943|11732290": ["imaging [240], Computer Aided Tomography (CAT) [242], 3D Magnetic Resonance Imaging (MRI) [241], 3D X-ray [239] and hybrid RF [243]."]} +{"52121943|6396569": ["Mobile WSNs are analyzed and classified by Amundson and Koutsoukos [13]."]} +{"52121943|1230643": ["\u2018Things\u2019 refers to device or sensors that sense physical world signals and records it in digital forms [1]."]} +{"52121943|34657644": ["As discussed, the majority of survey is only based on either range-based and range-free [11], [19], [25], [29] or Centralized", "[25] have studied localization approaches based on different range measurement techniques."]} +{"54481900|14242212": ["Recently, low-rank decomposition of incomplete matrices or tensors has attracted a lot of attention (Davenport and Romberg 2016; Tan et al. 2014; Yokota and Cichocki 2016)."]} +{"54481900|8323234": ["Each path (cid:7) is described by its direction of arrival pair ( \u03b8 R ,(cid:7) , \u03d5 R ,(cid:7) ), direction of departure pair ( \u03b8 T ,(cid:7) , \u03d5 T ,(cid:7) ), delay \u03c4 (cid:7) , complex gain \u03b1 (cid:7) and Doppler shift v (cid:7) (Heath et al. 2016).", "In general, the frequency domain channel response H ( t , f ) can be described as (Heath et al. 2016) \u2013 Case 1 If the channel is slowly varying over the signal duration of interest, the Doppler shifts of all the paths are small."]} +{"6258377|3054454": ["Let R d denotes the expected maximum scatter radius of the geometrically based single bounce macrocell circular model (GBSBCM) [6] with respect to the ith BS, we obtain 0 \u2264 r m = |xi + jyi \u2212 (xm + jym)| \u2264 R d.", "Let Rid denotes the expected maximum scatter radius of the geometrically based single bounce macrocell circular model (GBSBCM) [6] with respect to the ith BS, we obtain\n0 \u2264 rim = |xi + jyi \u2212 (xm + jym)| \u2264 Rid.", "3 are calculated when the radius of GBSBCM around the MS for BS1, R1d, is set at 0.15 km, and for the neighboring BSs varied from 0.15 km to 0.45 km."]} +{"3859495|8323234": ["Usually, channel estimation is accomplished by resorting to pilot-assisted (beam training) schemes [6], [7].", "The digital part performs baseband processing using microprocessors, while the analog part is implemented at the RF domain by using phaseshifter networks [3], [5], [6].", "The works [3], [6] discuss the problem of channel estimation for HB architectures, where solutions based on compressive sensing (CS) are developed."]} +{"6697621|13372227": ["An introduction to the basics of MS localization is given in [2]\u2013[6]."]} +{"6697621|164835": ["An introduction to the basics of MS localization is given in [2]\u2013[6]."]} +{"22900479|8323234": ["\u2026features: a) the spatial sparsity of channels due to the high path-loss of NLOS paths, b) the low signal-to-noise-ratio (SNR) experienced before beamforming, and c) the much smaller number of RF chains than that of the antennas due to the hardware constraints in mmWave communications [11], [12].", "(24) in 11], where s is the sparse channel vector in the angular domain, the hybrid precoding and combining matrices as well as the angular domain transform matrix compose \u0398 .", "However, the operation of this CS-based hybrid precoding scheme is limited to narrow-band channels, while practical broadband mmWave channels exhibit frequency-selective fading, which leads to a frequency-dependent hybrid precoding across the bandwidth [11].", "To this end, hybrid analog-digital precoding relying on a much lower number of RF chains than that of the antennas has been proposed, where the phase-shifter network can be used for partial beamforming in the analog RF domain for the sake of an improved spatial multiplexing [11].", "In order to reduce the training overhead required for accurate channel estimation, CS-based estimation schemes have been proposed in [11], [12] by exploiting the sparsity of mmWave channels.", "As another promising candidate, mmWave communications is capable of facilitating high data rates with the aid of its wider bandwidth [1], [11], [12].", "(18) in 11]."]} +{"18407461|10817088": ["A recent survey on ambient intelligence in health care [1] illustrates the wide range of applications that could be supported by a cm-accuracy indoor positioning system alone: activity recognition, behavioral pattern discovery, anomaly detection, and decision support methods can all be based on such a sensor modality.", "60 IEEE SIgnal ProcESSIng MagazInE | March 2016 | before/during/after meals) or as an orthotic and rehabilitation tool for individuals suffering from cognitive decline, geofencing for people with dementia, and even as a navigation aid for visually impaired (see [1] and the references therein)."]} +{"7500426|7761990": ["and (ii) the corresponding latent variables are statistically independent [107], [108], both quite stringent and limiting assumptions."]} +{"5779256|17325804": []} +{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]} +{"13147044|13372227": ["For instance, the likelihood of finding three BSs with a received signal-strength indicator stronger than \u2212100 dB was only 35% in rural areas, whereas it was approximately 84% in urban areas [20]."]} +{"1063592|12187956": ["In spectrum sensing, the index set of the occupied frequency band usually varies slowly [12]."]} +{"62666017|6555395": []} +{"14713786|164835": ["Cell phone radio-location services such as E911 commonly employ TDOA and are centralized, absolute, and noncooperative [ 78 ], [79]."]} +{"44068413|17325804": ["[19] 2008 Wireless Survey of positioning algorithms and theoretical limits for wireless networks."]} +{"44068413|164835": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "For instance, the use of registration update messages in the IS-95A standard was proposed in [7] for time-based localization, called reverse link."]} +{"44068413|13372227": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "As an example, several survey articles [6]\u2013[10] reviewed the challenges and performance of cellular positioning in April 1998.", "way system (IVHS) applications [5] or to support emergency services based on proprietary location solutions [6], such as Grayson Wireless with a joint TDoA and AoA solution or"]} +{"44068413|206583375": ["On the one hand, fingerprinting techniques are typically implemented in WLAN systems [15], [18], [20], [26], to take advantage of"]} +{"8374606|13372227": ["The proposed localization scheme requires two or more signal paths, which can be either Line-of-Sight (LOS) signals or NLOS multipath signals that undergo one-bound scattering."]} diff --git a/edge/graph_18263901.jsonl b/edge/graph_18263901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d768c9cea394106cb43151bd891098c9acc3941c --- /dev/null +++ b/edge/graph_18263901.jsonl @@ -0,0 +1,2 @@ +{"4714730|9270553": ["Several present-day BCI systems rely on mu (8 \u2013 12 Hz) or beta (18 \u2013 24 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000).", "Several present-day BCI systems rely on mu (8\u201312 Hz) or beta (18\u201324 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000)."]} +{"10620173|9270553": ["EEG-classification algorithms are applied to these datasets with the task of differentiating between classes of signals and/or determining the subjects\u2019 intent.", "The parameter settings that yielded the least cross-validation error were used."]} diff --git a/edge/graph_18263962.jsonl b/edge/graph_18263962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac5ac20672f0d5d461b6af266fd839b99fd6d4a7 --- /dev/null +++ b/edge/graph_18263962.jsonl @@ -0,0 +1,10 @@ +{"9776095|15380857": ["Better signalprocessing procedures, such as those being developed for brain\u2013computer interfaces, could be applied to studies of visual processing (Davila, Srebro, & Ghaleb, 1998; Friman, Volosyak, & Graser, 2007; Garcia Molina & Zhu, 2011; Zhu et al., 2010)."]} +{"54136425|2877147": []} +{"54136425|7439310": []} +{"48359900|3540699": ["Here, the observers were asked to assign one of the following adjectival ratings to each of the sequences: \u2019Imperceptible (5)\u2019, \u2019Perceptible, but not annoying (4)\u2019, \u2019Slightly annoying (3)\u2019, \u2019Annoying (2)\u2019, and \u2019Very annoying (1)\u2019."]} +{"16622896|7439310": ["[5]\u2013[7], 2) error resilient encoding [8]\u2013[14], and 3) error concealment [15]\u2013[21]."]} +{"535645|1708582": ["This conundrum is often referred to as the trade-off between exploitation and exploration (e.g., Kaelbling et al. 1996)."]} +{"16752994|9318802": ["\u2026models for speech, audio, image, graphics, and video; interested readers can refer to \nthe recent surveys in such modeling and applica\u00adtions (e.g., [Campbell et al. 2009; Lin and Kuo 2011; \nM \u00a8 oller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010]).", "Since the emphasis of this article is on mulsemedia, we will not discuss in detail \nperception-based models for speech, audio, image, graphics, and video; interested readers can refer to \nthe recent surveys in such modeling and applica\u00adtions (e.g., [Campbell et al. 2009; Lin and Kuo 2011; \nM \u00a8 oller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010]).", ", [Campbell et al. 2009; Lin and Kuo 2011; M\u00f6ller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010])."]} +{"4890757|64404": []} +{"4890757|16362395": ["For a more detailed review on CSP analysis and its application to EEG signal processing, please refer to Lemm et al (2005), Lotte et al (2007), Blankertz et al (2008), Sannelli et al (2011), Samek et al (2012)."]} +{"16780716|64404": []} diff --git a/edge/graph_18265326.jsonl b/edge/graph_18265326.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1827354.jsonl b/edge/graph_1827354.jsonl similarity index 100% rename from graph_1827354.jsonl rename to edge/graph_1827354.jsonl diff --git a/edge/graph_18277349.jsonl b/edge/graph_18277349.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18277605.jsonl b/edge/graph_18277605.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dca3e066ac698614be76f824d9f8588529980503 --- /dev/null +++ b/edge/graph_18277605.jsonl @@ -0,0 +1,4 @@ +{"122912137|6327434": []} +{"120566057|6327434": []} +{"15327293|6327434": ["The practical and theoretical interest in this eld are re ected in a large number of surveys, for instance [2], [3], [4], [6], [10], [11], [14]."]} +{"13350251|6327434": []} diff --git a/edge/graph_18281414.jsonl b/edge/graph_18281414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bec947b79daed66abedc2e427b0397b5445dfae5 --- /dev/null +++ b/edge/graph_18281414.jsonl @@ -0,0 +1 @@ +{"1002750|1437067": ["In rule classifier systems there are two distinct approaches to individual or particle representation: the Michigan and the Pittsburgh approaches [11]."]} diff --git a/edge/graph_18281682.jsonl b/edge/graph_18281682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18284918.jsonl b/edge/graph_18284918.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3f84b870595a63c84f8426312acad910ee156ab --- /dev/null +++ b/edge/graph_18284918.jsonl @@ -0,0 +1,11 @@ +{"17114496|7185733": []} +{"17114496|192934": []} +{"3335890|7185733": ["Pavlovic et. all [3] concludes in this paper that the gestures perform by the users should be logically explainable for designing the human computer interface, as the cutting edge in the domain of computer vision based techniques for gesture recognition is not in a state of providing a acceptable\u2026"]} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"15602760|7185733": ["[Pavlovic et al., 1997] Quek, F. K. H., Mysliviec, T., and Zhao, M. (1995).", "Two types of cues, color cues and motion cues, are often applied for hand image segmentation [Pavlovic et al., 1997]."]} +{"342972|7185733": []} +{"61523312|192934": []} +{"1923606|14970359": ["Although recent reviews [6], [7][18][17][19][20][1] in computer vision based have explained the importance of gesture recognition system for human computer interaction (HCI), this work concentrates on vision based techniques method and it\u2019s up-to-date."]} +{"1923606|7185733": ["3D Model can be classified into volumetric and skeletal models [16][24].", "Volumetric models deal with 3D visual appearance of human hand [16] and usually used in real time applications [5][24].", "Hand posture recognition sill an open research area [15], since the human hand is a complex articulated object with many connected joints and links, which forms the 27 degrees of freedom [16] for the hand.", "Skeletal models overcome volumetric hand parameters problem by limiting the set of parameters to model the hand shape from 3D structure [16][5].", "The main problem with this modeling technique is that it deals with all the parameters of the hand which are huge dimensionality [16]."]} +{"20502830|7185733": ["High level features such as fingertips, fingers, joint locations, and the links between joints are very meaningful [2, 43] but also very difficult to obtain from the segmented hand shape.", "Systems that employ skin-color based hand detection [2, 3, 16] are not reliable by themselves.", "Many approaches have been developed based on skin color, movement of the hand, fingertips and the pattern detection methods [2, 3, 4, 5, 6, 7, 8, 9]."]} diff --git a/edge/graph_18287489.jsonl b/edge/graph_18287489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1828831.jsonl b/edge/graph_1828831.jsonl similarity index 100% rename from graph_1828831.jsonl rename to edge/graph_1828831.jsonl diff --git a/edge/graph_182886987.jsonl b/edge/graph_182886987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18293490.jsonl b/edge/graph_18293490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_182950556.jsonl b/edge/graph_182950556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7762ed351dc4bdd399d9fa7fb624c9d393c5ff7f --- /dev/null +++ b/edge/graph_182950556.jsonl @@ -0,0 +1,11 @@ +{"625587|12127373": []} +{"1826773|33286487": ["Typical methods of time-frequency decomposition such as the shorttime Fourier transform (47), Wigner-Ville (19), or the timedependent parametric models (16) are generally based on dividing the time trace into successive windows and then assessing the power spectrum in every window.", "The short-time Fourier transform (18, 47), time-dependent autoregressive models (16, 18), Wigner-Ville distribution (18, 19, 44, 46), discrete wavelet transform (DWT; Ref.", "This time window is frequency dependent: long for low frequencies and short for high frequencies, unlike most methods of time-frequency decomposition, such as the short-time Fourier transform (47), Wigner-Ville (19), or the time-dependent parametric models (16)."]} +{"40355090|16362395": []} +{"6454470|12127373": [", and under monotonous or boredom working conditions [7], [8].", "PERCLOS is still considered as the most effective measurement of drivers\u2019 drowsiness for vision-based non-intrusive approaches [1], [7], [9], [28].", "Research to detect driver drowsiness can be classi\ufb01ed into three categories: 1) vehicle-basedapproaches, 2)behavior-based approaches, and 3) physiological-signal based approaches (see [7], [9] for a good review).", "However, these approaches might be too slow to detect driver drowsiness [7].", "To evaluate the effectiveness of our system for drowsy driving detection, we compared the PERCLOS generated by our method with that computed on ground truths of eye openness levels, since the PERCLOS has been evaluated as an effective measure of driver fatigue on visual signal [7], [9], [28]."]} +{"6454470|9045232": ["However, the intrusive nature of measuring physiological signals can hinder driving, especially for prolonged driving periods."]} +{"26758392|9045232": ["The techniques range from classic knowledge based 3D-models which are projected and fitted on the image, to modern algorithms based on machine learning and artificial neural networks [17].", "The potential for orientation sensors to be used in a moving platform, like planes or vehicles, has been investigated based on static simulators [17]."]} +{"3456398|18078738": ["While several general reviews of data fusion [9,50\u201352] and data inconsistency [46,53,54] exists; this paper is intended to provide readers with the methodology of fusion under unknown correlation and data inconsistency in the context of distributed data fusion."]} +{"3456398|18388986": ["However, processing all the information at a central node poses various issues, such as a large computational load on the central node, large communication bandwidth requirement, the possibility of failure (due to failure of the central node) and inflexibility to changes in architecture [50,52,55].", "While several general reviews of data fusion [9,50\u201352] and data inconsistency [46,53,54] exists; this paper is intended to provide readers with the methodology of fusion under unknown correlation and data inconsistency in the context of distributed data fusion.", "Interested readers can refer to References [50,52] for more general perspectives and approaches to multisensor data fusion."]} +{"55081178|12127373": ["The following techniques or measures have been developed and used widely to monitor the level of drowsiness of the driver by vehicle-based measures, behavioral and psychological measures [1-5]."]} +{"4025268|206764452": ["At first, the research of pedestrian analysis was studied in vision-based localization in traffic safety systems [1,2]."]} +{"13199047|12127373": ["Although these approaches have proven relatively effective for examining physiological and cognitive states in humans, issues with wearability, particularly for EEG devices, have limited the feasibility of using these systems in real-world driving conditions.", "to detect drowsiness using EEG and ECG alone, and combining both modalities to improve the performance of the system; \u2022 to propose a channel reduction paradigm to reduce the number of electrodes and to increase the practicality of the proposed technique in real driving environments.", "These measures include steering wheel movement, speed variability and standard deviation of lateral position [7\u201310].", "Although driver behavioral measures are non-intrusive, such measures have not been found to be reliable for the detection of drowsiness, because their detection capabilities are strongly affected by variations in environmental factors and driving conditions [25\u201327].", "Recent approaches for detecting driver drowsiness can be divided into four main categories: vehicle-based measures, subjective measures, driver behavioral measures and physiological measures [3].", "Other studies have also used ECG for the detection of drowsiness, and HRV derived from ECG has been used to differentiate between alertness and drowsiness [32\u201335].", "Therefore, the present study sought to examine the performance of these physiological measures in detecting driver drowsiness."]} diff --git a/edge/graph_182952502.jsonl b/edge/graph_182952502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2e10311d2caa4ed44841dc8796c543d9e32780e --- /dev/null +++ b/edge/graph_182952502.jsonl @@ -0,0 +1,3 @@ +{"173991054|5014732": ["Learning to play a complete real-time strategy game, including unit building, resources gathering, defence, invasion, scouting, and expansion, remains a challenging problem [15], in particular due to the complexity and variations of commercially successful games (e."]} +{"1160900|9316331": [", Monte-Carlo Tree Search (MCTS) [7, 30, 25]) and Self-Play, in which at one time step, a single environment might emit multiple states processed by multiple models, or one-to-many.", "We can also incorporate forwardplanning methods (e.g., Monte-Carlo Tree Search (MCTS) [7, 30, 25]) and Self-Play, in which at one time step, a single environment might emit multiple states processed by multiple models, or one-to-many.", "Rooted at the current game state, MCTS builds a game tree that is biased towards paths with high win rate.", "Also, MCTS runs much slower (2-3sec per move) than the trained RL AI (\u2264 1msec per move).", "Monte-Carlo Tree Search (MCTS) can be used for planning when complete information about the game is known.", "As shown in Tbl. 7, MCTS achieves a comparable win rate to models trained with RL. Note that the win rates of the two methods are not directly comparable, since RL methods have no knowledge of game dynamics, and its state knowledge is reduced by\nthe limits introduced by the fog-of-war."]} +{"15458100|393948": ["We plan to use CLEVR to study models with explicit short-term memory, facilitating comparisons between values [13, 18, 39, 42]; explore approaches that encourage learning disentangled representations [5]; and investigate methods that compile custom network architectures for different patterns of reasoning [2, 3]."]} diff --git a/edge/graph_182952667.jsonl b/edge/graph_182952667.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_182952898.jsonl b/edge/graph_182952898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19aab444f87f38603e364963bb7b125e98a6d0e3 --- /dev/null +++ b/edge/graph_182952898.jsonl @@ -0,0 +1 @@ +{"7228830|17652653": []} diff --git a/edge/graph_182953001.jsonl b/edge/graph_182953001.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4cba2e0c0445964c478d2aec5e36a8f9bb87740f --- /dev/null +++ b/edge/graph_182953001.jsonl @@ -0,0 +1,75 @@ +{"17516613|7365537": ["A review of literature [2], [3], [4], shows various technology options for the design of an ILS which may be ultrasonic(US), infrared (IR), radio-frequency (RF) based systems which may be radio-frequency identification (RFID), received signal strength (RSS) of RF signals, Bluetooth, wireless local area network (WLAN), ultra-wideband (UWB), camera based vision analysis etc."]} +{"17516613|206583375": []} +{"5212559|31355144": ["While UASNs are very promising with the unique features they offer, unpredictable underwater conditions such as high water pressure, uneven depths of underwater surface, and unpredictable activities make it difficult to design and deploy underwater networks.(87) In addition, sensors used in UASN nodes are susceptible to underwater challenges, and their effectiveness may decrease severely.", "Moreover, traditional positioning and localization systems do not work underwater.(87) As it is very difficult to deploy the networks, which can work reliably and efficiently, although they are associated with high initial and maintenance costs, in some specific, highly critical applications, tethered connections may be preferred."]} +{"5212559|902018": ["Due to their limited spectrum and slow acoustic propagation velocity, high frequency utilization and network throughput must be achieved in UASNs.", "Section 4 presents existing and emerging localization algorithms proposed for UASNs.", "5 Localization is of critical importance and one of the most important tasks in UASNs, especially in mobile UASNs.", "The mobile sensor nodes such as autonomous underwater vehicles AUVs, unmanned underwater vehicles (UUVs), and gliders follow a predefined trajectory to patrol over a specific region to cooperate with other underwater sensor nodes to fulfil specific monitoring tasks.(10,31) Compared with traditional wireless sensor nodes, underwater sensor nodes are rather expensive, and the overall costs rapidly rise for deep water scenarios.", "Therefore, it is necessary to develop deployment techniques and localization algorithms suitable for large scale UASNs.", "Underwater acoustic sensor network deployment techniques are typically classified into 3 main categories based on the mobility of nodes, namely, static deployment, self\u2010adjustment deployment, and movement\u2010assisted deployment, respectively.(10) The deployment techniques consider deployment\u2010related factors such as node types, deployment objectives, computation complexity, and energy consumption.", "Based on the existing literature, UASN deployment techniques can be divided into 3 main categories, namely, static, self\u2010adjustment, and movement\u2010assisted, respectively.(10) Tables 2, 3, and 4 present an overview of existing deployment techniques.", "Although considerable research efforts have been directed to UASNs in recent years, successful implementation of potential application scenarios and their benefits depend on understanding and exploring the recent progress in underwater acoustic communication and UASNs.", "After the initial deployment, bottom sensor nodes may organize in a cluster\u2010based architecture and forward gathered data to surface stations by multihop paths.(4,10) While deploying sensor nodes randomly can be viewed as the most practical way and in some scenarios in which there exists no prior knowledge of the deployment region or deterministic deployment is impossible, it is generally not preferred due to cost\u2010related issues.", "\u2022 Self\u2010adjustment deployment: It assumes that each sensor node has the ability of adjusting its position after initial deployment, and this way, the deployment technique can meet certain requirements such as improving network connectivity, reducing coverage overlaps, and increasing link quality.(10,14) For the goal of horizontal position adjustment, the sensor nodes are typically attached to floating buoys.", "However, most UASN applications are based on large scale UASNs.", "Different from most of the existing deployment techniques assuming 2D sensor network architectures, 3D networks like most UASNs require sophisticated design considerations and factors along with high computation complexity; therefore, extending 2D deployment techniques to 3D UASNs cannot address UASN deployment requirements, and it is required to design new deployment techniques that explore geometric properties of 3D UASNs.", "Especially, in 3D large scale UASNs, another fundamental issue is to address the problem of supporting full coverage, while ensuring full network connectivity.(10,109) Hence, efficient and distributed schemes to provide the maintenance of full sensing coverage and connectivity are essential.", "Different from 2D UASNs for which sensor nodes are usually deployed only at the bottom of a specific region or on the water surface, for 3D UASNs, sensor nodes float at different depths to observe the entire region.(5,10,11) Based on the existing literature, UASN deployment techniques can be divided into 3 main categories, namely, static, self\u2010adjustment, and movement\u2010assisted, respectively.", "Different from most of the existing deployment techniques assuming 2D sensor network architectures, 3D networks like most UASNs require sophisticated design considerations and factors along with high computation complexity; therefore, extending 2D deployment techniques to 3D UASNs cannot address UASN deployment requirements, and it is required to design new deployment techniques that explore geometric properties of 3D UASNs.(10,11) While deployment techniques can be evaluated based on many factors, including deployment objectives, node types, processing type, either centralized or distributed, computational complexity, and energy consumption, each technique has some advantages and disadvantages.", "Because of the challenging characteristics of underwater acoustic channel and complex three \u2010 dimensional (3D) space, several factors need to be taken into consideration during the deployment of UASNs.", "Moreover, considerable amount of research activities are needed to address research challenges and handle open research issues of UASNs.", "In this section, we focus on the open issues on underwater localization as well as common application scenarios and associated challenges in UASNs.", "As a result of these challenges and the unique features of underwater communications, existing technologies and solutions cannot be directly applied to UASNs.", "At present, the existing deployment techniques and localization algorithms are only suitable for small scale UASNs.", "The SBL approach involves a ship in the operation area and hence is not feasible for mobile and large \u2010 scale UASNs.", "But this replacement is very expensive, especially in large \u2010 scale UASNs.", "4 Therefore, it is necessary to study UASN deployment issues, deployment solutions, and their theoretical bounds for UASNs."]} +{"5212559|2469117": ["Localization is required for several purposes, including target detection, node tracking, routing protocols, and data tagging.(6,7) Unfortunately, underwater communication is seriously limited by the harsh conditions of the underwater channels, such as variable and long propagation delays and multipath interference, and negative effects of the underwater acoustic medium, such as Doppler distortion and very high attenuation.", "Based on node mobility as preferred in the literature,(2,3,6,7) underwater localization algorithms can be classified into 3 main categories, namely, stationary localization algorithms, mobile localization algorithms, and hybrid localization algorithms.(7) Tables 5, 6, and 7 present a comparison of the existing localization algorithms."]} +{"16319287|1230643": ["The miniaturisation of small devices capable of sensing and communicating with each other has made the possibility of deploying large-scale wireless sensor networks a reality (Akyildiz et al., 2002)."]} +{"53841923|3738168": []} +{"12475938|2497115": ["Compared to the existing radio positioning approaches, namely enhanced observed time difference (E-OTD) [5], [6], uplink-time difference of arrival (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] or WiFi fingerprinting [9] based solutions in which the accuracy is typically in the order of 3-5 meters at best, the positioning accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10].", "Compared to the existing radi o positioning approaches, namely enhanced observed time dif ference (E-OTD) [5], [6], uplink-time difference of arriva l (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] o r WiFi fingerprinting [9] based solutions in which the accurac y is typically in the order of 3-5 meters at best, the positioni ng accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10]."]} +{"207229534|6396569": ["For a more detailed general overview, we refer to [17]."]} +{"46642131|17325804": ["(AoA,ToA,TDoA, andRSS), coverage, and cost [12, 13]."]} +{"46642131|7278743": [", in the use of wireless headphones), and to facilitate data synchronization between personal devices [58]."]} +{"46642131|206583375": ["[14] omitted inertial navigation, ambient magnetic fingerprinting, the use of encoded patterns in artificial light (fluorescent or LED), ambient light analysis, the use of audible sound transmitted by the infrastructure (some with encoded patterns), RFID where the tags are fixed and the reader is mobile, ZigBee, vision analysis with portable cameras, floor tiles, and the indoor use of outdoor technologies (GPS, cellular, TV, and FM signals)."]} +{"34564324|5476476": ["A lot of surveys of IPS can be found [27]\u2013[30]."]} +{"34564324|17165859": []} +{"34564324|8650651": ["Due to the high transmission capacities, optical wireless networks play an important role in our modern information technology [12]."]} +{"34564324|206583375": ["According to a recent survey [5], there are various indoor positioning technologies proposed such as Radio-Frequency Identification (RFID) [6], [7], Ultra-Wideband (UWB) [8], Wi-Fi [9], [10], and fingerprint [11]."]} +{"343678|7971188": ["The self-organizing service platform router (SoSp-Router), which works as one unit of the overlay network [6] based on physical distance on top of the legacy physical network, is installed in a unit space, such as a room or corridor in a hospital building."]} +{"3249290|53116003": ["While we discuss the type of services that localization can provide by leveraging the IoT framework [87] in Section VII, below we present and"]} +{"3249290|4427557": ["Low Power Wide Area Networks (LPWANs) such as LoRA and Sigfox in its current shape cannot provide high localization accuracy and must be combined with other localization techniques and technologies for higher localization accuracy [156]."]} +{"3249290|6396569": ["Amundson and Koutsoukos [11] presents a survey on different localization methods for wireless sensors."]} +{"3249290|206583375": []} +{"69499936|3738168": ["communication [108], [109], and IPS [110]."]} +{"69499936|3930401": ["categories: free space optical (FSO) communications, visible light communications (VLC), light-fidelity (Li-Fi), and optical camera communications (OCC) [5].", "A comparative study of different OWC systems has been presented in [5] which also include possible architectures and applications of OCC.", "[5] 2018 Architectures and applications"]} +{"69499936|17165859": ["A comprehensive survey on VLC based IPS have been presented in [113] which classifies the different IPS based on the localization technique used and its accuracy."]} +{"16963506|6396569": ["Ultrasonic, infrared, and Radio-Frequency (RF) waves are some of the candidates for localization [1], [2], [3], [4], although the later is more popular due to its low cost and availability."]} +{"62976745|1230643": []} +{"55617686|122093367": []} +{"10198081|205286988": ["Each sensor sends data to its closest neighbor responsible for retransmitting the packets [ 3 ].", "Although there has been proposed variations of cluster-based approaches (for example, see [ 1 ]), we used the metric proposed in [8], in order to provide comparable results with the reference MDS-MAP algorithm."]} +{"406063|205286988": ["As the number of interesting types of Zigbee networks, such as Wireless Sensor Networks (WSNs)[12] and Conveyance Security Devices (CSDs)[13] increases, new localization services are also required."]} +{"10940820|206583375": ["Therefore, it is of great importance to figure out the position of the user that is most suitable for the range calculations [33].", "Moreover, as compared to ToA and RSSI, DoA technique requires higher complexity and power consumption due to the relatively higher power consumption of RF components, thus it is expected that .", "However, instead of measuring the ToA user computes the strength of the received signal [36].", "Most importantly, in ToA based methods the line of sight (LOS) signal is presumed to be available for the computation of signal propagation delay.", "Comparable to ToA and RSS calculation, the position of access points should be known in DoA.", "ToA based localization systems compute the signal propagation delay to find the distance between a transmitter and a receiver, that is greatly influenced by multipath and their associated delay profiles [32].", "21754 VOLUME 5, 2017\nB. TIME OF ARRIVAL (ToA) ESTIMATION Determining the distance is the main thing for various localization systems such as sonar [29], radar [30] and wireless local positioning systems (WLPSs) [28].", "Figure 1 shows the basic structure for localization system based on ToA [33].", "In this setup, the user computes the ToA for the signal from three or more access points (nodes with already known locations).", "In this chapter, a general review of major localization techniques i.e. time of arrival (ToA), time difference of arrival (TDoA), direction of arrival (DoA) and received signal strength indicator (RSSI) is provided.", "In time domain, Time delay estimation is done by estimating ToA based on channel impulse response [34],while in frequency domain, it is performed by finding the channel frequency response (CFR) [35].", "Similar to ToA, in RSS, the user locates itself by receiving the signal from multiple access points.", "C. RECEIVED SIGNAL STRENGTH (RSS) ESTIMATION Measurement that is ubiquitous in wireless systems is RSS. RSS based localization systems are less accurate than ToA based localization systems, but it can be implemented with little to no modification to existing systems.", "But, contrary to ToA and RSS in DoA just two access points having two DoA values are needed for a user to locate itself [37].", "The basis for ToA based technique is the capability of receiver to exactly calculate the time of arrival for LOS signal."]} +{"31799015|870434": ["On the other hand, optical modems have been shown to achieve data rates reaching to Mbit/s with ranges up to 100m, only in very clear water conditions [2].", "In underwater, radio signals attenuate rapidly, hence they can only travel to short distances while optical signals scatter and cannot travel far in adverse conditions, as well [2]."]} +{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]} +{"710411|34657644": ["The range-based techniques are considered more accurate and most of the algorithms for localization belong to this category [6, 9]."]} +{"7683161|1230643": ["For comprehensive discussions on centralized and distributed localization, the interested reader is referred to [1], [3], and [6]."]} +{"6654913|206583375": ["One or more techniques can be applied together to compensate for the limitations of a single positioning technique [9].", "The appropriate indoor positioning technology should be selected carefully in order to make the right trade-off between the performance and the complexity of IPSs [9, 14].", ", WiFi signal strengths) transmitted by APs (multiple Access Points) are collected at every position of an interesting area for a certain period of time and stored into the radio map [27, 13, 19, 9].", "provided different classifications of indoor positioning technologies in 2009, in which they classified them, based on their need for existence of networks, into two classes; network-based and non-networkbased technologies [9].", "Privacy is extremely important to individuals using IPSs, where a strong access control over how users personal information is collected and used is crucial [9].", "An indoor positioning system (IPS) is a system that continuously and in real-time determine the position of a person or an object in an indoor environment [9] which has various applications [21, 17, 2].", "Triangulation is divisible into the subcategories of lateration, and angulation [9, 11].", "Lateration, which is sometime called range measurement, computes the position of an object by measuring its distance from multiple reference points [9].", "This can be caused at different levels of the system: system installation and maintenance, infrastructure components, and positioning devices [19, 9].", "In other words, we locate an object by computing angles relative to multiple reference points [11, 9]."]} +{"59367790|206583375": []} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"5779256|17325804": []} +{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]} +{"5129381|33211520": []} +{"2392021|2497115": ["a set of closest RPs are selected, the method is known as K-Nearest Neighborhood (KNN) [14], [69], [75], [78]."]} +{"2392021|3330313": ["focus on outlier detection and improve the localization performance of conventional methods [66], [145], [146].", "Also, it is possible that the wireless network coverage degrades due to AP failures [66], [67]."]} +{"59134727|12060835": ["As reported in [8], ongoing research efforts on terrestrial communications have shown that energy harvesting plays a significant role in improving the performance."]} +{"24529922|17165859": ["As an image sensor-based positioning system usually need to use image processing techniques which sets a great demand on system performance, the simplicity, reliability and low cost of PD-based positioning system show wide application in indoor positioning field [3]."]} +{"18520915|12601073": ["A piece of radio spectrum with a certain bandwidth is assigned to one or more dedicated users by the spectrum regulators under the policy of fixed spectrum access (FSA), causing the problem of spectrum scarcity [1], [2]."]} +{"6727689|30189749": ["In line with this, many recent papers have addressed corresponding challenges, as discussed in different surveys (Jia et al. 2016; Rios-Torres and Malikopoulos 2017)."]} +{"6727689|6588866": ["The most widespread variants of the LOCAL model, as considered in the survey by Suomela (2013), reflect algorithms in classes Local_Strict and Local_Auxiliary.", "A comprehensive survey of possibility and impossibility results for distributed constant-time algorithms in the LOCAL model is given by Suomela (2013).", "If a constant upper bound for the number of rounds can be guaranteed, corresponding algorithms scale up to any network size (Suomela 2013).", "Substantialefforts have been devoted to the theoretical foundation of local algorithms (Suomela 2013).", "Instead, v may only extract the subgraph of an acyclic, connected covering graph of G T , the so-called unfolding of G T (see Suomela (2013) for details).", "In general, the number of rounds is restricted to formally limit information dissemination to the neighborhood (Suomela 2013).", "Linial (1992) introduces a model of locality often referred to as the LOCAL model (Peleg 2000; Suomela 2013; Fraigniaud et al. 2013; Kuhn et al. 2016; Korman et al. 2013).", "Schmid and Suomela (2013) adapt the LOCAL model for the specific characteristics of software-defined networks.", "A landmark in theoretical research on local algorithms is the work by Suomela (2013), which surveys possibility and impossibility proofs for the LOCAL model regarding fundamental graph-theoretical problems.", "A variant of this scheme for the LOCAL model is described and analyzed by Suomela (2013)."]} +{"6727689|945077": ["It is likely that these local characteristics also hold true for other network environments like mobile ad-hoc networks (Agarwal and Motwani 2009) and P2P overlays (Singh and Haahr 2007)."]} +{"6727689|1236072": ["Many routing algorithms have been presented for wireless networks (Boukerche and Darehshoorzadeh 2014; Uthra and Raja 2012; Al-Karaki and Kamal 2004)."]} +{"6727689|17934515": ["In line with this, many recent papers have addressed corresponding challenges, as discussed in different surveys (Jia et al. 2016; Rios-Torres and Malikopoulos 2017).", "PRS assumes and exploits that vehicles are organized in a platoon-based driving pattern, where vehicles form groups based on common interests (Jia et al. 2016)."]} +{"4684217|2469117": ["Due to the challenges of underwater acoustic communications such as low data rates and long propagation delays with variable sound speed [3], a variety of localization algorithms have been introduced and analyzed in the literature [4], [5]."]} +{"44068413|17325804": ["[19] 2008 Wireless Survey of positioning algorithms and theoretical limits for wireless networks."]} +{"44068413|164835": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "For instance, the use of registration update messages in the IS-95A standard was proposed in [7] for time-based localization, called reverse link."]} +{"44068413|13372227": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "As an example, several survey articles [6]\u2013[10] reviewed the challenges and performance of cellular positioning in April 1998.", "way system (IVHS) applications [5] or to support emergency services based on proprietary location solutions [6], such as Grayson Wireless with a joint TDoA and AoA solution or"]} +{"44068413|206583375": ["On the one hand, fingerprinting techniques are typically implemented in WLAN systems [15], [18], [20], [26], to take advantage of"]} +{"482252|33247252": ["The application and services provided by the IoT can be both residential and commercial ranging from e-health [24], e-marketing [25], intelligent car parking system [26], intelligent transportation system [27], [28], automation, and logistic services."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"61867103|1230643": []} +{"7138430|33211520": ["On the other hand, if the IPS is based on inertial sensors, the position of the mobile unit is estimated iteratively, based on one of the dead reckoning methods [12].", "Despite all the challenges\u2013unknown environments and hazardous working conditions\u2013an IPS is an essential tool for emergency responders [12], [13], [17], [20], [22], [25]\u2013[29].", "However, none of these commercial IPSs is suitable to solve the problem of emergency responders\u2019 location during their duty [12]\u2013[16], as all solutions require beforehand measurements, calibration, configuration and deployment.", "These are unreliable prerequisites in emergency scenarios due to the nature of the indoor environments, which are typically defined as unstructured or unknown [12], [13], [17]\u2013[22].", "led to the publication of several surveys focusing different research topics [1], [12], [22], [31]\u2013[48].", "which makes the simple task of getting out of a building a challenging task [12], [20], [22].", "firefighters, while fighting urban fires [12], [20], [22], [30].", "From the analysis performed by the various surveys on indoor localization, only two were found addressing the challenging research area of IPSs for emergency responders [12], [22].", "[12] review classifies the existing IPSs for emergency responders as signal-based or IMU-based systems.", "emergency responders the room-level accuracy must be near 100% [12], [22], [51], otherwise, it will lead to distrust on the IPS."]} +{"7138430|7365537": ["[36], comparing the IPSs on the basis of navigational assistance for topographical disorientation.", "When compared to the works presented in [1], [27], [31], [36], [38], and [43], a wider selection of localization techniques and methods are addressed and analyzed, focusing on their theoretical background and the pros and cons of their use.", "Another focus of survey papers on indoor localization is based on the classification of IPSs according to the technology employed [33], [36], [37], [39], [41], [43], [46]."]} +{"7138430|6396569": ["Amundson and Koutsoukos [34] focused their review on mobile WSNs."]} +{"7138430|206583375": ["Another focus of survey papers on indoor localization is based on the classification of IPSs according to the technology employed [33], [36], [37], [39], [41], [43], [46].", "However, since the localization is carried out based on landmarks, its use is not recommended for unstructured environments [33].", "[33] reviewed the wireless IPSs and emphasized the pros and cons of each technology analyzed.", ", hospital, gym, university, or museum), in a continuous way and in real time [33], [35], and where other systems, like GPS-based, do not work.", "Strength Indicator (RSSI) of each anchor node for a specified position in a grid [33].", "accurate and can filter out the multipath effects [33].", ", ultrasound sensors [22], [33], [35], [39], [41], [43]; infrared sensors [33], [35], [39], [43]; video cameras [33], [37], [39]; inertial or motion sensors [12], [22], [40], [42]; techniques based on radio frequency signals [12], [22], [31], [33], [35], [39], [43]; or a combination of these technologies [12], [22], [26], [39], [43]."]} +{"12225864|13372227": []} +{"110159148|14441987": ["Some applications such as direction-based routing algorithms only require relative positions of nodes[6]."]} +{"51870946|1230643": ["They are ad hoc networks via wireless communication and consist of a large number of smart nodes [1]."]} +{"41805887|1230643": ["\u2026agriculture can reduce costs and environmental impact by watering and fertilizing the speci\ufb01c area of \ufb01eld only in case of real need; WSNs deployed for environmental monitoring of water, air or soil quality will sense data in real time to \ufb01nd the source of pollution as soon as possible [2]."]} diff --git a/edge/graph_18295771.jsonl b/edge/graph_18295771.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..406ae069caeddac668928ad7dbd61a69c9be7c7c --- /dev/null +++ b/edge/graph_18295771.jsonl @@ -0,0 +1,2 @@ +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"18492998|10500613": ["To overcome the above issue, there have been attempts to derive schema mappings from information obtained using schema matching techniques [46, 16, 40, 15]."]} diff --git a/edge/graph_18296819.jsonl b/edge/graph_18296819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b759323ff446bbb2fbdd2ee588eb76e525167f7 --- /dev/null +++ b/edge/graph_18296819.jsonl @@ -0,0 +1 @@ +{"15468531|2187403": ["Differently from other approaches to context-aware system design [9], we believe that the context in which information is managed is orthogonal with respect to what we might call \u201cobject information\u201d, and that as such it should be treated.", "The notion of context, formerly emerged in various fields of research like psychology and philosophy [12], has been recently studied also by the computer science community (in particular in the Knowledge Representation area [11, 35]), in order to find suitable models that can be used to embed the contextual dependency in software systems [9]."]} diff --git a/edge/graph_18300540.jsonl b/edge/graph_18300540.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18303304.jsonl b/edge/graph_18303304.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..193a63557643a39acda360280958e3ba2a3992d0 --- /dev/null +++ b/edge/graph_18303304.jsonl @@ -0,0 +1,28 @@ +{"24518267|5724477": []} +{"24518267|1929234": ["All of these feature selection approaches are usually classified into three main groups: wrapper, embedded, and filter methods [24]."]} +{"24518267|7320605": ["also introduced in wireless sensor networks for the application of power control and energy saving [44], routing protocol design, topology control [45], data collection and so on [46]."]} +{"7551351|17747015": ["Activity recognition methods are classified into three main types of vision-based [1], radio-based [2], and sensor-based [3] methods."]} +{"16236833|7834819": ["It also directly uses the raw acceleration data rather than performing feature extraction and feature selection as in (Altun et al., 2010; Ravi et al., 2005; Yang and Hsu, 2010).", "In general, the activity recognition are two-fold as they are preceded by a preprocessing step of feature extraction from the raw acceleration data, the extracted features are then classi\ufb01ed (Altun et al., 2010; Ravi et al., 2005; Yang and Hsu, 2010).", "For example features, such as the mean, the standard deviation, the skewness, the kurtosis, etc. can be extracted from original data and used afterwards as classi\ufb01er inputs (Altun et al., 2010; Ravi et al., 2005; Yang and Hsu, 2010).", "comparisons to the well-known static and dynamic classification approaches such as the Naive Bayes classifier, K-NN, SVM, MLP (Altun et al., 2010; Yang and Hsu, 2010; Yang et al., 2008; Preece et al., 2009) which are static supervised classification techniques and the HMM (Lin and Kuli\u0107, 2011) which is a standard temporal segmentation approach.", "can be extracted from original data and used afterwards as classifier inputs (Altun et al., 2010; Ravi et al., 2005; Yang and Hsu, 2010).", "In general, the activity recognition are two-fold as they are preceded by a preprocessing step of feature extraction from the raw acceleration data, the extracted features are then classified (Altun et al., 2010; Ravi et al., 2005; Yang and Hsu, 2010).", "In the training step, the proposed algorithm and the one for the standard unsupervised HMM have a quasi-identical computing time and both are more fast than the MLP and the SVM.", "\u2026comparisons to the well-known static and dynamic classi\ufb01cation approaches such as the Naive Bayes classi\ufb01er, K-NN, SVM, MLP (Altun et al., 2010; Yang and Hsu, 2010; Yang et al., 2008; Preece et al., 2009) which are static supervised classi\ufb01cation techniques and the HMM (Lin and Kuli\u00b4c, 2011)\u2026", "More speci\ufb01cally, the tri-axial accelerometers are more privileged (Yang and Hsu, 2010) with respect to uniaxial accelerometers.", "Additional details on classification approaches for human activity recognition can be found in the recent reviews (Yang and Hsu, 2010; Altun et al., 2010; Preece et al., 2009; Kavanagh and Menz, 2008).", "Neural approaches have also been used to perform activity recognition (Yang et al., 2008), in particular the multilayer perceptron (MLP), proposed by (Rumelhart and McClelland., 1986) are widely used approaches for supervied classi\ufb01cation.", "To judge the performance of the proposed approach, we perform comparisons to the well-known static and dynamic classi\ufb01cation approaches such as the Naive Bayes classi\ufb01er, K-NN, SVM, MLP (Altun et al., 2010; Yang and Hsu, 2010; Yang et al., 2008; Preece et al., 2009) which are static supervised classi\ufb01cation techniques and the HMM (Lin and Kuli\u00b4c, 2011) which is a standard temporal segmentation approach.", "It can also be observed that the proposed unsupervised dynamic model provides more accurate segmentation results compared to the supervised static classi\ufb01ers (Naive Bayes, MLP and SVM).", "Additional details on classi\ufb01cation approaches for human activity recognition can be found in the recent reviews (Yang and Hsu, 2010; Altun et al., 2010; Preece et al., 2009; Kavanagh and Menz, 2008).", "More specifically, the tri-axial accelerometers are more privileged (Yang and Hsu, 2010) with respect to uniaxial accelerometers."]} +{"16236833|8365617": []} +{"23341942|10096622": ["For a recent survey of their use in WSNs, see [92]."]} +{"23341942|13372227": ["Historically, the \ufb01rst example of location service offered by cellular systems is the E-911 introduced for emergency calls in the United States [95]."]} +{"33309785|16013270": ["In addition, vision-based approaches often suffer from illumination variations, ambient occlusion and background change that greatly limits their actual use [9], [10]."]} +{"110919702|206583375": ["It provides a relation between the total path loss PL (dBm ) and distance d (m) as: PL \u00bc loss penetration factor, k is the number of oors between transmitter and receiver, is the pass loss exponent, and X (cid:2) \ufb00 (cid:1) The operating frequency of our RFID IPS is 2.4 GHz and k is 1 in our case\u2026"]} +{"17747015|5664472": [") to sense the movements of body parts, such as [4,5,11,27\u201332]; (2) camera sensor based methods [33], which take advantage of camera to record the video sequence and recognize the activities using computer vision algorithms."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"14352318|206583375": []} +{"24737473|11038925": ["Baraldi and Blonda [31] present a recent, comprehensive survey of several other fuzzy clustering algorithms."]} +{"13208543|3212818": ["There are methods based on the Time of Arrival (ToA), methods based on the Angle of Arrival (AoA) and methods based on the Received Signal Strength Indicator (RSSI) [1]\u2013[3]."]} +{"10381303|192934": ["For instance, a perceptron is similar to a linear discriminant function and the multilayer perceptron methods are equivalent to either non-linear discriminant analysis or a posteriori probability estimation [37].", "The performance of the positioning systems depends on acceptance error rather than the classification error or mean square error in previous three methods [37].", "Although neural network methods seem to be different from the statistical approach of the nearest neighbor methods, the neural network methods have their equivalent counterparts in statistical pattern recognition approach [37].", "The nearest neighbor methods which use distance measures as discriminant functions can be classified as a subset of statistical approaches in pattern recognition [37]."]} +{"6721504|8835588": ["The information on the physical activity is also valuable as a source of contextual knowledge [3]."]} +{"6721504|192934": ["The feature extraction approach revolves around the idea that data representations can be constructed in subspaces with reduced dimension, while at the same retaining, if not increasing, the discriminative capability of the new set of feature variables [37].", "A taxonomy of classifiers can be built according to different criteria [37].", "These methods are based on two main approaches: feature selection and feature extraction [37]."]} +{"25319150|1634674": ["INTRODUCTION The advancement of technology in recent years led to the development of inexpensive video sensors which can be used in consumer devices, with applications in elderly people health monitoring, security surveillance, sports action recognition, and face recognition systems for smart home [1]-[3]."]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"5854062|1634674": ["We discuss implementation, testing and evaluation in Section 6 and conclude the paper in Section 7."]} +{"355899|206583375": ["Several proposals can be found in the literature for indoor LT systems based on different radio technologies such as WiFi, Bluetooth, ZigBee or Ultra-wideband (UWB) with different levels of accuracy, range and complexity [9][10]."]} +{"18027188|14970359": ["The most commonly used approach in human activity recognition and classi\ufb01cation employs vision-based systems with single or multiple video cameras [31\u201334]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"34106895|17516538": ["Human action recognition has been a widely studied topic (for extensive reviews see [1,2]), but the solutions to the problem that have been submitted to date are very premature and still specific to the dataset at hand."]} +{"24202622|1400872": ["Some remedies have been provided by Hannan and Bishop (1997) and Pearlmutter (1995)\nfor accelerating the convergence and for achieving optimal solutions."]} +{"15334151|7788290": ["Although originally most of the research in activity recognition was done using vision sensors [Gavrila, 1999; Pentland, 1996], it has increasingly become dominated by various types of wearable sensors, like accelerometers and audio."]} diff --git a/edge/graph_18307785.jsonl b/edge/graph_18307785.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1841fba0a701f430fb6e8e3d55de50453e1253a1 --- /dev/null +++ b/edge/graph_18307785.jsonl @@ -0,0 +1 @@ +{"14713597|14441987": []} diff --git a/edge/graph_18315024.jsonl b/edge/graph_18315024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e30691277f2f2a76810f842fc47ad5fad1d1b9c --- /dev/null +++ b/edge/graph_18315024.jsonl @@ -0,0 +1,2 @@ +{"1228150|15231229": []} +{"14274144|9162620": []} diff --git a/edge/graph_18315187.jsonl b/edge/graph_18315187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3bfc257d259a30fdc55adff894be515d58fb7f3 --- /dev/null +++ b/edge/graph_18315187.jsonl @@ -0,0 +1 @@ +{"6438719|14441987": []} diff --git a/edge/graph_18315586.jsonl b/edge/graph_18315586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18319089.jsonl b/edge/graph_18319089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18325863.jsonl b/edge/graph_18325863.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3b922f45adc0e8ce581607dd20a1554415369ac --- /dev/null +++ b/edge/graph_18325863.jsonl @@ -0,0 +1 @@ +{"5653016|18325863": ["In contrast, 1+1-restored lightpaths [2] have dedicated capacity on both their primary and backup paths.", "In the centralized scenario, route computation takes place at the NMS, using information about the entire network.", "A mesh-restored lightpath [2, 5] in an optical network is allocated a pair of link-disjoint paths in the network, where one of the paths is the primary path, and the other is the A1", "Since the NMS has complete knowledge of the sharing database at each OXC, it can determine the backup path sharability of a channel on any link of the network for a given primary path.", "A centralized Network Management System (NMS) [2] contains the snapshot of the entire network.", "For an architectural overview of an optical cross-connect mesh network, see [2].", "This constraint avoids long backup paths that will violate the restoration latency guarantee [2, 5].", "Since backup channels on a mesh-restored lightpath can be shared with other mesh-restored lightpaths, they are \u201csoftreserved\u201d during the backup path signaling process [2, 5].", "Specifically, the NMS contains the topology database and the connection and sharing databases at each OXC in the network."]} diff --git a/edge/graph_18327019.jsonl b/edge/graph_18327019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c4eaa3d9c70e3ac113a8d28cb15905996953891 --- /dev/null +++ b/edge/graph_18327019.jsonl @@ -0,0 +1 @@ +{"2924955|15378506": ["Since educational institutions often have different solutions implemented by various departments, adherence to common standards facilitates interoperability (Young, 2001; Friesen, 2005)."]} diff --git a/edge/graph_18327676.jsonl b/edge/graph_18327676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9795b80b3acb390a75e4c4c31e4c5fb91411ff6 --- /dev/null +++ b/edge/graph_18327676.jsonl @@ -0,0 +1,2 @@ +{"9186472|44132017": []} +{"122523543|33286487": []} diff --git a/edge/graph_18328123.jsonl b/edge/graph_18328123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18334807.jsonl b/edge/graph_18334807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19085515de5b7ad809fcb2eb6679605311e04425 --- /dev/null +++ b/edge/graph_18334807.jsonl @@ -0,0 +1 @@ +{"17654445|18334807": ["\u2026of objects are the basis for defining types in OO type systems, class signatures are the formal basis for nominally-typed OO type systems, so as to confirm that objects are used consistently and properly within a program (Ch. 2 of [5], and [7], give more details on types and typing in OOP).", "See [7] and Ch. 2 in [5] for more details on shapes and a discussion of object interfaces).", "Class signatures formalize the informal notion of object interfaces (discussed in [7] and Ch. 2 of [5])."]} diff --git a/edge/graph_18337976.jsonl b/edge/graph_18337976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18340152.jsonl b/edge/graph_18340152.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..991ec5b99a351b3e48f0b4cdfd4d915fa4d764af --- /dev/null +++ b/edge/graph_18340152.jsonl @@ -0,0 +1 @@ +{"59894779|17464562": []} diff --git a/edge/graph_18341905.jsonl b/edge/graph_18341905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d9e2b23f193147bdb0683bc69da9f3da18e7e904 --- /dev/null +++ b/edge/graph_18341905.jsonl @@ -0,0 +1,11 @@ +{"7657986|12251210": []} +{"7657986|8450611": ["Complexity in Practice Although the theoretical complexity tells us it is infeasible to design a single algorithm that can perform well in all cases, fortunately, packet classification problems in real-life applications have some inherent characteristics that can be exploited to reduce the complexity [7] [8] [9]."]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"10726615|8364569": ["s [126] conducted an overview of IP flow-based intrusion detection that focused on flow-based IDS, concept of flows, classification of attacks, and defense technique.", "IDSes can be categorized based on how they identify intrusions: anomaly-based, misused-based (knowledge-based or signature-based), or combination of both anomaly and misuse-based [126]."]} +{"10726615|13172512": ["\u2026to this survey but not specific to NetFlow-like applications can be found in [102] for IP-Flow based intrusion detection, [160] for botnet detection, [98] for internet traffic classification using machine learning, and [123] for discussion of using machine learning for network intrusion detection."]} +{"6906872|33286487": ["Under the general Cohen distribution [8] that emphasised upon the description of M(t, \u03c9) , there were several efforts that try to eliminate auto and cross-terms from the energy distribution of each signal on the Time-Frequency (TF) plane.", "Given the promising outcomes of the Cohen-based Time-Frequency (TF) Distributions [8] on Internet traffic classification [12], our approach targeted at the estimation of these metrics.", "The generic Cohen distribution alongside its extended formulations [8] enable to represent energy as a joint function of time and frequency.", "Our hypothesis is that the energy computed for the first ten packets of a given unidirectional flow based on the ChoiWilliams Time Frequency distribution [8] constitutes a good discriminating feature within a covariance analysis over all the network features that we employ.", "Equation 1 provides an intuitive representation of the energy representation that Cohen in [8] tries to interpret with his general formulation that we do not present here."]} +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} +{"13815452|8364569": ["Using NetFlow records were also employed in the past from detecting various attacks including botnets [25]."]} +{"2534755|206584087": ["They attack to defend their country or their organizations [8]."]} +{"2534755|16570307": ["3) Router\u2019s Traffic Scheduling Router\u2019s traffic scheduling algorithm reduces the congestion or attack impact and manages the flow of traffic along with it but they are too expensive in terms of delays and state monitoring [68-70]."]} diff --git a/edge/graph_18347433.jsonl b/edge/graph_18347433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18347962.jsonl b/edge/graph_18347962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73006456783ecacf64ab24d88099535aa0b452ea --- /dev/null +++ b/edge/graph_18347962.jsonl @@ -0,0 +1,3 @@ +{"15090212|9020157": ["spaces is the subset of wavelet spaces possessing additional multiresolution property [226], [227]."]} +{"15090212|33286487": []} +{"19926193|15090212": []} diff --git a/edge/graph_18351608.jsonl b/edge/graph_18351608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4b1540817c1ed2b58d6835667238c3644f0b56f0 --- /dev/null +++ b/edge/graph_18351608.jsonl @@ -0,0 +1,16 @@ +{"7198251|191396": ["Clustering means the task of organizing a set of patterns into clusters such that patterns within a given cluster have a high degree of similarity, whereas patterns belonging to different clusters have a high degree of dissimilarity [1], [2], [3]."]} +{"7198251|12894036": ["Moreover, various studies have demonstrated that the kernel clustering methods outperforms the conventional clustering approaches when the data have a complex structure, because these algorithms may produce nonlinear separating hypersurfaces among clusters [5], [16], [17], [18], [19], [6], [20].", "Since Girolami\u2019s first development of kernel k-means algorithm [4], several clustering methods have been modified to incorporate kernels and a variety of kernel methods to clustering have been proposed [5]."]} +{"26079988|12894036": ["Recently, kernel-based fuzzy clustering has been developed and already gained some popularity [5][6][7][8][9]."]} +{"6003600|191396": ["In this paper, in order to overcome these problems, an improved EM algorithm and modified objective function of kernel fuzzy c-means (KFCM) [6,7] clustering algorithm for robust image segmentation is proposed."]} +{"22128087|12894036": ["Furthermore, the reader can refer to [3] for a survey on kernel (and spectral) methods for clustering and vector quantization."]} +{"2348624|1099309": ["[6], [ 33 ]. Some other techniques are aimed at the improvement of effectiveness of image retrieval through combining color and texture [11], [44], color and shape [18], and building other aggregates."]} +{"2348624|13365762": ["[ 6 ], [33]. Some other techniques are aimed at the improvement of effectiveness of image retrieval through combining color and texture [11], [44], color and shape [18], and building other aggregates."]} +{"2402163|15683881": []} +{"16362867|15683881": ["In the absence of experimentation or domain knowledge, m is commonly set to 2 [4]."]} +{"19615884|5646762": ["Among the various clustering techniques, the most widely used techniques include the hard c-means (k-means), fuzzy c-means (FCM), their variants, evolutionary algorithms, and artificial neural networks ([1], [2], [7]\u2013[23])."]} +{"19615884|7158350": []} +{"37885712|15683881": ["A larger m results in fuzzier clusters. Typically, m is set to 2 [ 18 ]."]} +{"37885712|191396": []} +{"6674407|192934": []} +{"10292320|11038925": []} +{"2141469|12894036": ["Filippone et al. [25] contributed a survey of kernel and spectral clustering methods."]} diff --git a/edge/graph_18352205.jsonl b/edge/graph_18352205.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18353243.jsonl b/edge/graph_18353243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df00a05224f9c6a0fe9c619a48c82761ee9323ac --- /dev/null +++ b/edge/graph_18353243.jsonl @@ -0,0 +1,3 @@ +{"5961758|192934": ["This problem, sometimes referred to as the curse of dimensionality [3], presents a classic dilemma in statistical pattern analysis and machine learning."]} +{"36958850|206051485": ["An excellent review paper on image registration can be found in [ 88 ].", "Sequential data blocks from the second ARCHER imaging pass (the change data) are sequentially coregistered to canvas ground coordinates using georegistration followed by a precision scene-based registration process based on local phasecorrelation subpixel shift measurement algorithm [ 88 ] and finite impulse response resampling filters [96]."]} +{"12240632|11112426": []} diff --git a/edge/graph_18357056.jsonl b/edge/graph_18357056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79d83ddf4496c73ef79aa5eee81c1b0627584d8d --- /dev/null +++ b/edge/graph_18357056.jsonl @@ -0,0 +1,2 @@ +{"195702013|6607209": ["The proposed scheme, which is based on Petri-Net Plans (PNPs) and Finite State Machines (FSM), can be adapted to various robot domains, optionally in conjunction with other coordination methods, such as marketbased methods [2] and auction-based coordination [5].", "Auction-based coordination [2, 5] borrows methods and techniques from economics (auctions, trading) and applies them to agent problems."]} +{"110361521|6607209": ["Dias et al. [14, 15 ] first use the concept of market based for multiple robots that cooperate for achieving a common goal."]} diff --git a/edge/graph_18363170.jsonl b/edge/graph_18363170.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18369999.jsonl b/edge/graph_18369999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8506ca75fe470a72e081fe591edb1f89b80992d8 --- /dev/null +++ b/edge/graph_18369999.jsonl @@ -0,0 +1,8 @@ +{"12235212|15744805": ["According to the previous work of Zhang [66], quantitative segmentation evaluation methods can be classified into two categories: analytical and empirical methods."]} +{"18536514|15744805": ["In Table 1, we show the results of different empirical evaluation methods [14] that have been applied to 100 images segmented manually, with F&H algorithm, SRM algorithm, and our method."]} +{"14415030|15744805": ["Supervised evaluation methods [5,6], also known as relative evaluation methods [7] or empirical discrepancy methods [4], evaluate segmentation algorithms by comparing the resulting segmented image against a manually-segmented reference image, which is often referred to as a gold standard [8] or ground-truth.", "Analytic methods [4,71] assess segmentation algorithms independently of their output, evaluating them based on certain properties of the segmentation algorithms, such as processing strategy (parallel, sequential, iterative, or mixed), processing complexity, resource efficiency, and segmentation resolution, which are usually not deemed effective for assessing the segmentation quality (e.", "Whereas supervised methods evaluate segmented images against a reference image, unsupervised evaluation methods [45], also known as stand-alone evaluation methods [38] or empirical goodness methods [4] do not require a reference image, but instead evaluate a segmented image based on how well it matches a broad set of characteristics of segmented images as desired by humans."]} +{"61771446|5401262": []} +{"61771446|2186746": []} +{"61771446|192934": []} +{"61771446|7788290": []} +{"61771446|53680608": ["Other surveys about earlier methods can be found in the works of Aggarwal and Nandhakumar (1988), Otte and Nagel (1994), and Stiller and Konrad (1999)."]} diff --git a/edge/graph_18372496.jsonl b/edge/graph_18372496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..828c1a2059444b28d117105cffc678e3644b0922 --- /dev/null +++ b/edge/graph_18372496.jsonl @@ -0,0 +1 @@ +{"3425433|14271395": ["This work also has to be seen within the context of other applications of the fs2cv tool, including work on computationally sound mechanized proofs for basic and public-key Kerberos [20], as well as other work on computational soundness for formal security verification of crypto-protocols, such as [2, 37, 1, 43, 25]."]} diff --git a/edge/graph_18374428.jsonl b/edge/graph_18374428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..274ac822f9dd32fb594397eea5e4fb1458fd8061 --- /dev/null +++ b/edge/graph_18374428.jsonl @@ -0,0 +1,7 @@ +{"39591852|9270553": ["A brain-computer interface (BCI) is an alternative communication and control channel that does not depend on the brain\u2019s normal output pathway of peripheral nerves and muscles [11] .", "Some scientists exploit evoked potentials, or the automatic responses of the brain to external stimuli [11]; evoked potentials are, in principle, easily picked up but require subjects to synchronize themselves to the external machinery.", "A BCI can also be used to control external devices (such as to open and close a hand orthosis) [6, 11]."]} +{"10168773|1452734": ["This is one of the biggest differences from artificial systems [23].", "Here, we briefly review the facets of development in the survey by Lungarella et al. [23] from viewpoints of external observation, internal structure, its infrastructure, and social structure, especially focusing on the underlying mechanisms in different forms."]} +{"12071012|1452734": ["In this paper, we tackle the problem by looking at it through the lens of developmental robotics [16]."]} +{"10747348|10290908": ["Next, online spike sorting [38] is performed to isolate single neurons in the vicinity of each electrode."]} +{"8144678|9270553": []} +{"8144678|10290908": ["The neuronal potentials were band-pass filtered (0.5\u20136 kHz) and spike sorting (Lewicki, 1998) is performed to isolate single neurons in the vicinity of each electrode.", "5\u20136 kHz) and spike sorting (Lewicki, 1998) is performed to isolate single neurons in the vicinity of each electrode."]} +{"13363604|1452734": []} diff --git a/edge/graph_1837720.jsonl b/edge/graph_1837720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18378073.jsonl b/edge/graph_18378073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18378735.jsonl b/edge/graph_18378735.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18385185.jsonl b/edge/graph_18385185.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_580211.jsonl b/edge/graph_18388986.jsonl similarity index 100% rename from graph_580211.jsonl rename to edge/graph_18388986.jsonl diff --git a/edge/graph_18392886.jsonl b/edge/graph_18392886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c43238e178c2fcb7e1b7285d6f3c28b7ce9fac09 --- /dev/null +++ b/edge/graph_18392886.jsonl @@ -0,0 +1 @@ +{"4269723|2535224": ["At the present, wireless and wired networks uphold diversity and heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional networks.", "\u2026heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional\u2026"]} diff --git a/graph_2656838.jsonl b/edge/graph_18393376.jsonl similarity index 100% rename from graph_2656838.jsonl rename to edge/graph_18393376.jsonl diff --git a/edge/graph_18395369.jsonl b/edge/graph_18395369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c24f65a17bd458019fa8a6797d87e8ac8a44bf99 --- /dev/null +++ b/edge/graph_18395369.jsonl @@ -0,0 +1 @@ +{"10165614|239537": ["The heuristics which followed this direction, such as [12], [13], [14], are reviewed in a recent survey [ 15 ]."]} diff --git a/edge/graph_18397881.jsonl b/edge/graph_18397881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18400226.jsonl b/edge/graph_18400226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..711dfa01e4dce6dfce2e3b66541b826fc72c91d9 --- /dev/null +++ b/edge/graph_18400226.jsonl @@ -0,0 +1,2 @@ +{"206683955|9072047": ["Therefore, the last decade witnessed a rapidly growing interest in T\u2013S fuzzy systems, and many important results have been reported in [2], [3], [7], [10], [13], [17], [21]\u2013[24], and references therein.", "Specifically, the stability analysis and stabilization are studied in [2], [3], [10], and [13]."]} +{"8024951|1708582": []} diff --git a/edge/graph_18402406.jsonl b/edge/graph_18402406.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50d9f6cf3796bc8ac68fb113d2a4d00b8fea68cd --- /dev/null +++ b/edge/graph_18402406.jsonl @@ -0,0 +1,13 @@ +{"1502555|15315731": []} +{"17837451|15315731": ["Multimodal medical image fusion [1] offers an important approach to solve this problem by deriving the complementary information from medical images with different modalities."]} +{"16027087|11112426": ["These models are commonly used for spectral unmixing, owing to their physical effectiveness and mathematical simplicity [27].", "The main advantage of HS image with respect to MS one is the more accurate spectral information they provide, which clearly benefits many applications such as unmixing [27], change detection [28], object recognition [29], scene interpretation [30] and classification [31].", "Using geometrical considerations well grounded in the HS imaging literature devoted to the linear unmixing problem [27], the high spatial resolution HS image to be estimated is assumed to live in a low dimensional subspace.", "[27] J."]} +{"16027087|16374808": ["However, the definition of an assessment method that fulfills these constraints is still an open issue [80], [81], and closely relates to the general discussion regarding image quality assessment [82] and image fusion [83], [84]."]} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"206692734|16374808": ["The group of methods defined by (5), varying with the choice of spectral weights in (2), is sometimes referred to as relative spectral contribution (RSC) [1], [6].", "The definition of a technique that fulfills the constraints defined in the protocol is still an open problem [6], [37] and relates closely to the general discussion regarding image quality assessment [38] and image fusion [39], [40].", "On the other side, they are not able to account for local dissimilarities between the PAN and MS images originated by the spectral mismatch between the PAN and MS channels of the instruments, which may produce significant spectral distortions [1], [6].", "In fact, the spatial information is mapped to the first component, to an extent proportional to the correlation among the MS channels [6]."]} +{"9439639|17516538": ["Introduction Video surveillance plays an important role in modern society and has been widely applied in many fields [1]."]} +{"15315731|12607466": ["The fuzzy logic is applied both as a feature transform operator or a decision operator for image fusion [47, 51, 48, 52, 53, 49, 54, 55, 50, 56, 41, 57, 58, 60, 88, 59, 87, 89, 90, 91, 43, 82, 92].", "There are several applications of fuzzy logic base image fusion such as brain diagnosis [47, 48, 49, 50], cancer treatment [51], image segmentation and integration [51, 52], maximization mutual information [53], deep brain stimulation [54], brain tumor segmentation [55], image retrieval [56, 57], spatial weighted entropy [56], feature fusion [56], multimodal image fusion [41, 58, 59], ovarian cancer diagnosis [60], sensor fusion [88], natural computing methods [87] and gene expression [89, 90].", "The ability to train the neural network to adopt to these changes enable several applications for medical image fusion such as solving the problems of feature generation [36], classification [36], data fusion [36, 19, 27], image fusion [37, 38, 27, 39, 40, 41, 42, 43], micro-calcification diagnosis [19], breast cancer detection [38, 44, 45], medical diagnosis [27, 28, 42], cancer diagnosis [46], natural computing methods [87] and classifier fusion [45].", "The improvements of feature processing and analysis can be improved to fit the fuzzy space better when combined with probabilistic approaches such as fuzzy-neural network [41, 43], fuzzy-genetic-neural network-rough set [87], fuzzy-probability [89] and neuro-fuzzy-wavelet [82].", "Some of examples of these are wavelet-neural network [27, 28, 40], neural-fuzzy [41, 43], fuzzy-genetic-neural network-rough set [87] and SVM-ANN-GMM [45]."]} +{"15315731|10863733": []} +{"9263669|15315731": ["U S In recent years, pixel-level image fusion has been used in a wide variety of applications, such as remote sensing [7, 116], medical diagnosis[10], surveillance[29], and photography[70] applications.", "imaging \ufb01eld, James and Dasarathy summarize the state-of-the-art image fusion methods in [10].", "Pixel-level image fusion, as mentioned above, is widely sensing[8], medical imaging[10], and computer vision [6]."]} +{"9263669|11112426": []} +{"422172|11112426": ["More recently, hyperspectral (HS) imaging acquiring a scene in several hundreds of contiguous spectral bands has opened a new range of relevant applications such as target detection [6] and spectral unmixing [7]."]} +{"422172|16374808": ["FUSION of multisensor images has been explored during recent years and is still a very active research area [2].", "Another motivation for studying the underdetermined problem is that it includes an archetypal fusion task referred to as pansharpening [2].", "Many solutions have been proposed in the literature to solve this problem, which is known as pansharpening [2]\u2013[5]."]} diff --git a/edge/graph_18411031.jsonl b/edge/graph_18411031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18413454.jsonl b/edge/graph_18413454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..12998c3d2c11c3881fbaaca1dbc4ed3d11443316 --- /dev/null +++ b/edge/graph_18413454.jsonl @@ -0,0 +1 @@ +{"14352403|2000518": []} diff --git a/edge/graph_18418184.jsonl b/edge/graph_18418184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d61f277aeac90c81aacc7791549d52345a2ed6c4 --- /dev/null +++ b/edge/graph_18418184.jsonl @@ -0,0 +1,3 @@ +{"11156835|192934": ["The system's complexity is low enough to allow operation on today's personal computers and other cost-effective computing platforms and the described algorithm is based on well-known feature extraction/pattern recognition concepts [13].", "The audio identification system presented here follows a general pattern recognition paradigm as described in [13]."]} +{"15180445|13365762": ["More recently, the MPEG standards group (ISO/IEC JTC1/SC29/WG11) has extended its traditional scope by initiating the MPEG-7 standardization process which aims to define a unified interface for description and characterization of multimedia content [17]."]} +{"3201604|16766019": []} diff --git a/edge/graph_18419722.jsonl b/edge/graph_18419722.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18421953.jsonl b/edge/graph_18421953.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18426329.jsonl b/edge/graph_18426329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9cc3c6a9a2a05ab3acc98ff37b971055868f6c84 --- /dev/null +++ b/edge/graph_18426329.jsonl @@ -0,0 +1,2 @@ +{"1935955|3102110": ["However, as mentioned in [4], mining path traversal patterns is still in its infancy.", "The recent progress and development of data mining and data warehousing has made available powerful data mining and data warehousing systems [6, 4]."]} +{"967595|3102110": ["Interested readers should consult references such as [33; 24]."]} diff --git a/graph_1842691.jsonl b/edge/graph_1842691.jsonl similarity index 100% rename from graph_1842691.jsonl rename to edge/graph_1842691.jsonl diff --git a/graph_1842882.jsonl b/edge/graph_1842882.jsonl similarity index 100% rename from graph_1842882.jsonl rename to edge/graph_1842882.jsonl diff --git a/edge/graph_18430126.jsonl b/edge/graph_18430126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18430668.jsonl b/edge/graph_18430668.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2992477.jsonl b/edge/graph_18432258.jsonl similarity index 100% rename from graph_2992477.jsonl rename to edge/graph_18432258.jsonl diff --git a/edge/graph_18435528.jsonl b/edge/graph_18435528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18436400.jsonl b/edge/graph_18436400.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18438336.jsonl b/edge/graph_18438336.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7eb220d52a26b0d72e5974c4b3deca7aa1bb9c3d --- /dev/null +++ b/edge/graph_18438336.jsonl @@ -0,0 +1,4 @@ +{"624110|13088291": ["Three different k-Nearest Neighbor (KNN) [8] classification methods are compared to evaluate the location estimation performance.", "In the location determination module, ZiLoc utilizes KNNbased classification method [8] to assign an estimated position to the unmarked fingerprint.", "KNN classification [8] is a method for classifying objects based on majority vote, with the object being assigned to the class most common amongst its k nearest neighbors."]} +{"6770567|206583375": ["Wireless-based indoor positioning system [6] by Liu et al."]} +{"43879184|206583375": ["Hence, investigations toward a new positioning technology that meets accurate ranging requirements are necessary and ongoing [1]."]} +{"12162546|206583375": ["At a minimum, these algorithms must permit for accurate step counting, although many systems also require accurate step segmentation."]} diff --git a/edge/graph_18440098.jsonl b/edge/graph_18440098.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81dee071278903400a2e9e4da24a5c6018fda702 --- /dev/null +++ b/edge/graph_18440098.jsonl @@ -0,0 +1,14 @@ +{"55375972|7185733": ["Finding and extracting information about human hands and face from image sequences is also interesting for a whole range of other applications [6, 7], hence there is a lot of research on this area."]} +{"35714192|7185733": ["For a review, see Pavolovic, Sharma, and Huang (1997) ."]} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"1961313|7185733": ["Table 1 summarizes the most relevant works (See also [26], [7] for a review of hand gesture recognition methods)."]} +{"1961313|53680608": ["Such methodsincludealgorithmswhichutilizeconstraintsbased onlocalspatialandtemporalderivations[19],[39],[17],[43], andtheblock-basedcorrelationalgorithms[2]."]} +{"9425548|7185733": ["The dynamic hand movement should be modeled by some more complex time warping schemes such as the Hidden Markov Models (HMMs) [1][3]."]} +{"62408571|7185733": ["Additionally, [ 5 ] contains an excellent review of the advantages, limitations, applications, and vision based approaches for hand gesture classification."]} +{"56066326|205131192": ["In terms of moments, the orientation of the principal axis near the x axis is given by the following equation [13]:"]} +{"22159059|7185733": []} +{"37152340|7185733": ["In order to take advantage of gestures in HCI, a mean by which the computer can understand the gesture must be provided [16]."]} +{"2591356|7185733": ["For gesture recognition, see Pavlovic et al. [45]."]} +{"2591356|7788290": []} +{"9113696|9045232": ["We regard the user's face position as given, since powerful face detection [13, 17] and face tracking methods are available [4]."]} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} diff --git a/edge/graph_184488295.jsonl b/edge/graph_184488295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f15cd83cee4362f44339c6cfbabb8d0ff3eac890 --- /dev/null +++ b/edge/graph_184488295.jsonl @@ -0,0 +1,18 @@ +{"4510343|9316331": ["Illustration of the MCTS algorithm from [3]."]} +{"15225305|9316331": ["Monte Carlo Tree Search (MCTS) is a family of game tree search algorithms that have advanced the state-of-theart in AI for a variety of challenging games, as surveyed in (Browne et al. 2012)."]} +{"38458733|9316331": ["The nature of MCTS means that knowledge of game strategy is not required, however such heuristic knowledge is often used to improve performance (Browne et al. 2012)", "A wide variety of MCTS variants and enhancements have been investigated (Browne et al. 2012).", "The nature of MCTS means that knowledge of game strategy is not required, however such heuristic knowledge is often used to improve performance (Browne et al. 2012) MCTS has been a focus for research since its invention in 2006 (Chaslot et al. 2006; Coulom 2007; Kocsis and Szepesv\u00b4ari 2006), and\u2026"]} +{"10931318|9316331": ["First, OOS builds its search tree incrementally, like Monte Carlo tree search (MCTS) [7, 3, 22]."]} +{"10931318|10725980": ["This o\ufb04ine approach has been remarkably successful in Computer Poker [2, 12, 32, 31, 21]."]} +{"1417861|9316331": []} +{"9316331|10725980": ["Coquelin and Munos [68] demonstrate that \ufb02at UCB retains the adaptivity of standard UCT while improving its regret bounds in certain worst cases where UCT is overly optimistic.", "Nijssen and Winands [155] also describe a multi-player version of their MCTS-Solver (4.5)."]} +{"14876981|9316331": ["Player enjoyment is particularly important in mobile games, where player acquisition is driven largely by user-submitted ratings and word-of-mouth: a few negative reviews can signi\ufb01cantly damage a mobile game\u2019s download \ufb01gures."]} +{"12936702|9316331": []} +{"12936702|10725980": []} +{"53246844|10725980": []} +{"10282318|9316331": []} +{"10282318|10725980": ["\u2026agents feature strongly in this, as do simulation-based agents such as MCTS. Poker has been extensively studied \u2014 see the review conducted by Rubin & Watson [13]; one of their notable \ufb01nds was that a simulation-based approach is inferior to the formula-based approach, despite expectations."]} +{"21779019|9316331": ["We propose the use of Monte Carlo Tree Search (MCTS), as it is becoming a de facto standard in game AI and is particularly suited to address the chance elements in Hearthstone [4], [5], [9], [10].", "Diagram adapted from [9]. where c is a constant, N ( w ) is the number of visits to node w and Q ( w ) is the number of victories.", "We compared four selection methods used in the literature [9]: \u2022 Max-child : returns the (action) child node v at the root with the highest number victories, i.e., where we write C ( v ) to denote the set of children of v ."]} +{"49870586|9316331": ["Our results show that ISMCTS is a challenging opponent to human players but our analysis also show that our current ISMCTS might be too inefficient; accordingly, we plan to work on the optimization of our implementation and investigate well-known MCTS enhancements (like AMAF and RAVE [6]) and the more recent one that constraints memory usage [48].", "PWL is similar to WL, but we want to exploit the fact that, for rewards between [0, 1], the optimal UCT constant is known [6].", "cision tree search algorithms that has been successfully applied to a wide variety of games [6] ranging from classic board games [7], [8], modern board games or Eurogames3 [9], [10], video games [11], [12], General Video Game Playing [13]\u2013[15], and card games [5], [16]\u2013[18].", "Our results show that ISMCTS is a challenging opponent to human players but our analysis also show that our current ISMCTS might be too inefficient, accordingly, we plan to work on the optimization of our implementation and investigate well-known MCTS enhancements (like AMAF and RAVE [6]) and the more recent one that constraints memory usage [48]."]} +{"49870586|10725980": ["Rubin and Watson [26] provide a recent overview of the field."]} +{"14674467|9316331": ["It has shown remarkable success in Go [2]\u2013[4] and is being applied successfully to a wide variety of game environments [5], including Hex [6], Havannah [7], and general game"]} +{"52001814|9316331": ["Monte-Carlo Tree Search (MCTS) [14] has become the state-of-the-art algorithm for game tree search."]} diff --git a/edge/graph_18451845.jsonl b/edge/graph_18451845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46982cf0bd3bc73bbf2ac3bb507a573b5cf5f49c --- /dev/null +++ b/edge/graph_18451845.jsonl @@ -0,0 +1,24 @@ +{"108449635|485843": []} +{"18290508|595093": ["Different categories of security attacks specific to the smart grid domain have been discussed and identified in previous survey papers [117,21,295,296,24,297]."]} +{"18290508|5747564": []} +{"18290508|14088590": []} +{"18290508|6959212": ["The IEEE 802.16 standard, commercialized under the name of WiMAX, was firstly released in 2001 to support long-distance (up to 7\u201310 km) broadband (up to 100 Mbps) wireless communications, especially in rural and suburban areas [147].", "In general, the trend is to prefer licensed wireless technologies, such as WiMAX [11] [83] and GSM/GPRS [45] [172], for the communications in the neighborhood area networks, because grid operators can establish their own private network infrastructure, which makes easier to guarantee the required communication reliability and QoS.", "In general, the trend is to prefer licensed wireless technologies, such as WiMAX [11] [83] and GSM/GPRS [45] [172], for the communications in the neighborhood area networks, because grid operators can establish their own private network infrastructure, which makes easier to guarantee the required\u2026", "As for 802.11, different versions of WiMAX technologies exist.", "IEEE 802.16-based networks (WiMAX).", "Furthermore, a base station is deployed to serve an area containing multiple NANs, which receives the data sent by NAN concentrators over dedicated WiMAX channels, and forwards this information to the regional control center over a wired network (e.g., using the Internet core backbone).", "WMNs have the potential to bring many advantages also to the smart grid communication system and many studies have advocated the use of WMNs in smart grids [11] [16].", "Finally, as observed in Section 5.2 most popular wireless technologies, including WiFi, ZigBee and WiMAX, are now including amendments to their standards to provide support for multi-hop communications (e.g, 802.11s and 802.16j)."]} +{"18290508|7971188": ["For instance, multipoint-to-point (MP2P) communications are important in monitoring applications, which require to periodically and simultaneously collect status information from a large number of sensors.", "\u2026i.e., distributed systems in which devices (peers) self-organize into a network and cooperate with each other by contributing part of their (storage, computing, bandwidth ) resources to offer useful services, such as data search, distributed storage, or computational intelligence [107] [108].", "Furthermore, middleware is increasingly used to create peer-to-peer (P2P) overlays, i.e., distributed systems in which devices (peers) self-organize into a network and cooperate with each other by contributing part of their (storage, computing, bandwidth ) resources to offer useful services, such as data search, distributed storage, or computational intelligence [107] [108].", "Distributed communication architectures have emerged in the past to support Internet services in a scalable manner, such as peer-to-peer networks (P2P) [107], which could also be applied in the smart grid context.", "Therefore, other studies have considered alternative approaches based on self-organizing P2P technologies.", "Thus, other studies argue that unstructured P2P networks, which do not maintain a rigid overlay network, are more suitable for smart grid applications in which data must be distributed to a large number of interested parties at the same time [241].", "Given the ability of P2P technologies to scale with increasing numbers of devices and services, several studies have proposed to use P2P-based middleware technologies to deal with the complexity of managing and controlling smart grids [109]."]} +{"18290508|1236072": ["It is also important to point out that in the last few years there has been a growing interest from the research community in designing optimized networking protocols for WSNs, which could potentially match the requirements of the smart grid (interested readers are referred to [186,187,205] for detailed surveys)."]} +{"18290508|10559330": ["Several QoS-based frameworks have been proposed for the Internet, such as Integrated Services (IntServ) [216], Differentiated Services (DiffServ) [217], and Multi-Protocol Label Switching (MPLS) [218], which could be applied"]} +{"18290508|121289": []} +{"18290508|18037424": ["Similarly, different measurements of scalability can be considered, such as the size of routing tables as the number of nodes increases, or the amount of communication resources used by each node [115] [16].", "A variety of technologies, network topologies and communication protocols are considered for each of these categories [14] [16].", "These networks are commonly named Field Area Networks (FANs), or Neighborhood Area Networks (NANs) [14] [16].", "WMNs have the potential to bring many advantages also to the smart grid communication system and many studies have advocated the use of WMNs in smart grids [11] [16].", "To recognize those similarities is important because they motivate the adoption of Internet design principles when designing scalable, reliable and secure networking solutions for the smart grid [14] [165] [16].", "\u2026the communication infrastructure in terms of channel bandwidth to ensure low transmission delays and reduce packet losses on transmission buffers [16] The key capabilities for smart grid communications can be summarized as follows: Scalability: A smart grid can involve millions of users and\u2026"]} +{"16477385|60455": []} +{"12103882|17774971": []} +{"12103882|192934": []} +{"3557660|2373140": []} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"16139052|7482876": ["Due to high mobility of vehicles, communication channels are susceptible to fast fading, whereby reliable links cannot be guaranteed [98]."]} +{"16139052|763939": ["In the literature, many research studies have been undertaken so as to provide a close-to-reality mobility model for VANETs [129,130]; however, those proposed models are suitable for only a small number of scenarios (e."]} +{"33247252|485843": ["2 (International Electrotechnical Commission Tele-control Application Service Element) communication standard for information exchange between control centers, utilities, and power pools [8].", "In fact, it has a considerable market share in utility world [7,8].", "A handful of surveys have attempted to discuss general smart grid communication requirements, standards, and protocols for household demand management [7-10].", "Available bandwidth can reduce in the case of possible loop problems [8]."]} +{"33247252|595093": ["There has been an increasing interest in smart grid security aspect [117-126]."]} +{"33247252|121289": ["In fact, it has a considerable market share in utility world [7,8].", "A handful of surveys have attempted to discuss general smart grid communication requirements, standards, and protocols for household demand management [7-10].", "Moreover, IP-based solutions offer huge cost savings in deployment and maintenance [7]."]} +{"206545197|6959212": ["\u2026characteristics (e.g., interoperability, ease-of-use and extensibility, and distributed and parallel data management techniques) [147], using IPv6 framework for industrial monitoring and home automation system [148], and using Internet-based virtual private networks as the core network [149,150]."]} +{"18245268|2457428": ["chical group key management methods [26], [27]."]} +{"14359975|8783262": ["battery chargers can produce deleterious harmonic effects on electric utility distribution systems [5], [6], although chargers with an active rectifier front end can mitigate this impact."]} diff --git a/edge/graph_18454590.jsonl b/edge/graph_18454590.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18455349.jsonl b/edge/graph_18455349.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1846371.jsonl b/edge/graph_1846371.jsonl similarity index 100% rename from graph_1846371.jsonl rename to edge/graph_1846371.jsonl diff --git a/edge/graph_184678.jsonl b/edge/graph_184678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18468713.jsonl b/edge/graph_18468713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d9e4cda88b17f9c424eeec0d244f14977cad0cc --- /dev/null +++ b/edge/graph_18468713.jsonl @@ -0,0 +1,2 @@ +{"16373408|387610": ["Several excellent review papers about JPEG 2000 Part 1 have recently appeared in the literature [3, 13 ,16,18,27,37], and a comprehensive book describing all of the technical aspects of the standard has been published [45]."]} +{"2218250|387610": []} diff --git a/edge/graph_18469268.jsonl b/edge/graph_18469268.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3fb0402e4eac3e6f888d0c81daaa7273ddd14b8 --- /dev/null +++ b/edge/graph_18469268.jsonl @@ -0,0 +1,2 @@ +{"12377645|627405": []} +{"12377645|10565822": []} diff --git a/edge/graph_18469839.jsonl b/edge/graph_18469839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cafa90c853758e8d679110f1faf95715f0e6f0f1 --- /dev/null +++ b/edge/graph_18469839.jsonl @@ -0,0 +1,6 @@ +{"13891324|14970359": []} +{"14315331|3540699": ["\u2026VIDEO ENCODING Implementations of current video compression standards, such as the ISO MPEG schemes or the ITU-T recommendations H.263 and H.264 [56], [57] require much more computation for the encoder than for the decoder; typically the encoder is 5\u201310 times more complex than the decoder."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} diff --git a/edge/graph_1847891.jsonl b/edge/graph_1847891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18482988.jsonl b/edge/graph_18482988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5469004a633c61f8cd99c8984e6df7f927e63e92 --- /dev/null +++ b/edge/graph_18482988.jsonl @@ -0,0 +1,2 @@ +{"10779366|1708582": ["We argue that the creation of intelligent web crawlers is best framed and solved by reinforcement learning, a branch of machine learning that concerns itself with optimal sequential decision making [9, 6]."]} +{"18608307|18482988": ["In accordance with the respective characteristics of the eleven semantic focused crawlers, we categorize them into three classes \u2013 ontology-based focused crawlers [19], metadata abstraction focused crawlers [20], and other semantic focused crawlers, which are defined in Table 1.", "Ontology-based focused crawlers The focused crawlers that utilize ontologies to link a crawled web document with the ontological concepts (topics), with the purpose of organizing and categorizing web documents, or filtering irrelevant webpages with regards to the topics [19]."]} diff --git a/edge/graph_18484924.jsonl b/edge/graph_18484924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69c4bbb1d0f4afb623553c6302ad99efbf920e33 --- /dev/null +++ b/edge/graph_18484924.jsonl @@ -0,0 +1 @@ +{"10296349|8310135": ["According to (Nadeau and Sekine, 2007), optimization of the feature set is the key component in enhancing the performance of a global NER sys-tem."]} diff --git a/edge/graph_18486824.jsonl b/edge/graph_18486824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01743e693ecdaf07303f8505e7cee7b56ccb3700 --- /dev/null +++ b/edge/graph_18486824.jsonl @@ -0,0 +1 @@ +{"62044921|17069874": []} diff --git a/edge/graph_18487363.jsonl b/edge/graph_18487363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f9ccd42a3f17ad8cc12d4703dba93b060bd9532 --- /dev/null +++ b/edge/graph_18487363.jsonl @@ -0,0 +1 @@ +{"10746537|18487363": []} diff --git a/edge/graph_18492041.jsonl b/edge/graph_18492041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71c58e3a7b9fdb36ee42d03f98bef7a17814ea8a --- /dev/null +++ b/edge/graph_18492041.jsonl @@ -0,0 +1 @@ +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} diff --git a/edge/graph_18492155.jsonl b/edge/graph_18492155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18497325.jsonl b/edge/graph_18497325.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1850236.jsonl b/edge/graph_1850236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18503114.jsonl b/edge/graph_18503114.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18503837.jsonl b/edge/graph_18503837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b9984f5e9ef65f78373114db61edcd40eec6ba2 --- /dev/null +++ b/edge/graph_18503837.jsonl @@ -0,0 +1,3 @@ +{"15100363|3102110": []} +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} diff --git a/edge/graph_18507919.jsonl b/edge/graph_18507919.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..276b8194e3a3ded2f0b95759466b9e58ab94413c --- /dev/null +++ b/edge/graph_18507919.jsonl @@ -0,0 +1,5 @@ +{"17169665|1230643": ["I. INTRODUCTION\nUNLIKE in other wireless networks, it is generally diffi-cult or impractical to charge or replace exhausted batteries in wireless sensor networks [1]."]} +{"1940380|1230643": []} +{"17135262|1230643": ["As an emerging technology, WSNs, as an exciting SPS, have a wide range of potential applications [1, 2], including environment monitoring, smart buildings, medical care, industry, and military applications."]} +{"58289500|1230643": []} +{"2426770|1230643": ["As an emerging technology, wireless sensor networks (WSNs) have a wide range of potential applications [1] [2] [3], including environment monitoring, smart buildings, medical care, industry and military applications."]} diff --git a/edge/graph_18513411.jsonl b/edge/graph_18513411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18520781.jsonl b/edge/graph_18520781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4ec6b8d263e5f6bde10cb82b36a001d64f20d56 --- /dev/null +++ b/edge/graph_18520781.jsonl @@ -0,0 +1 @@ +{"15577841|5358365": []} diff --git a/edge/graph_18526204.jsonl b/edge/graph_18526204.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1852829.jsonl b/edge/graph_1852829.jsonl similarity index 100% rename from graph_1852829.jsonl rename to edge/graph_1852829.jsonl diff --git a/edge/graph_18540015.jsonl b/edge/graph_18540015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18540390.jsonl b/edge/graph_18540390.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18543177.jsonl b/edge/graph_18543177.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18543241.jsonl b/edge/graph_18543241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dad19d1bb3d18fedf6df064cb810ae3da7cf2af6 --- /dev/null +++ b/edge/graph_18543241.jsonl @@ -0,0 +1,5 @@ +{"8569583|39159291": []} +{"985340|57992": []} +{"985340|17233734": ["In doing this I shall generally restrict my attention to work done since [137] appeared in 1991, as earlier hamiltonian and related surveys (see [28], [42], [31], [185], [242], [25], [194], [43], [9], [88] and [137] ) provide ample background on previous work."]} +{"985340|824249": []} +{"985340|30579357": ["In doing this I shall generally restrict my attention to work done since [137] appeared in 1991, as earlier hamiltonian and related surveys (see [28], [42], [31], [185], [242], [25], [194], [43], [9], [88] and [137] ) provide ample background on previous work."]} diff --git a/edge/graph_18543658.jsonl b/edge/graph_18543658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be34cb6483f7c7e3a536cf4ca70f28f5d6644659 --- /dev/null +++ b/edge/graph_18543658.jsonl @@ -0,0 +1,13 @@ +{"2377597|16620699": ["However, even when it is acknowledged that 2D currently appears to offer better recognition performance, this is often thought to be a temporary situation\u2014 \u2018\u2018Although 2D face recognition still seems to outperform the 3D face recognition methods, it is expected that this will change in the near future\u2019\u2019 [51].", "[51] give an alternate survey of some of the earlier work in 3D face recognition."]} +{"5171123|9045232": ["013 [6], Pantic and Rothkrantz [7] surveyed the automatic facial expression analysis, Daugman [3] pointed out several critical issues involved in an effective face recognition system, while the most recent and comprehensive survey is possibly from that of Zhao et al."]} +{"5171123|192934": []} +{"18128105|5171123": ["As holistic face recognition approaches, both FDA and PCA are very sensitive to pose variations [21], because in-depth rotations of 3D human faces almost always cause misalignment of image pixels which are the only classification clues for these holistic approaches.", "Although several survey papers [1, 3, 20, 21, 56, 89] and books [52, 78, 90] on face recognit io have been published which gave very good reviews on face recognition in general, there is no review specific on this challenging problem of face recognition across pose.", "In recent surveys of face recognition techniques [21, 89], po se variation was identified as one of the prominent unsolved problems in the research of face re ognition and it gains great interest in the computer vision and pattern recognition research co mmunity.", "Due to the observation that most of the general fac e re ognition approaches are sensitive to pose variations [21], a number of approaches have b een proposed to explicitly handle pose variations.", "For the recognition of faces from a single gallery per face , interested readers are redirected to a recent survey specifically on face recognition from a sing le allery image per person [21], though it"]} +{"18128105|16620699": ["We redirect the interested readers to the excellent reviews specifically on 3D face recognition [15,65]."]} +{"1688163|9045232": ["A lot of works on facial recognition and facial feature extraction have been reported in [9], [10], [11], [13], [14], [18], [15], [12]."]} +{"6198703|192934": ["However for feature selection using SFFS, the best performance is obtained with 32 face granules.", "3 Further, to evaluate the effectiveness of the proposed multiobjective genetic approach for feature selection and assimilation, the performance is compared with other feature selection methods, namely, definitive feature selection (referred to as \u201cEUCLBP+SIFT+PCA\u201d), SFS [19], and SFFS [19].", "3 Further, to evaluate the effectiveness of the proposed multiobjective genetic approach for feature selection and assimilation , the performance is compared with other feature selection methods, namely, definitive feature selection (referred to as \" EUCLBP+SIFT+PCA \" ), SFS [19], and SFFS [19].", "As shown in Table I, the proposed algorithm outperforms SFS by at least 6.66% and SFFS by at least 5.74% in rank-1 identification accuracy on both the databases.", "\u2022 While comparing with existing feature selection approaches , SFS and SFFS algorithms are used to select either EUCLBP or SIFT features for each face granule based on the identification accuracy (optimization function ).", "In SFS, the best performance is achieved with all 40 face granules.", "Sequential feature selection (SFS) [19] and sequential floating forward selection (SFFS) [19] are widely used feature selection methods that evaluate the growing feature set by sequentially adding (or removing) the features one-at-a-time.", "Unlike SFS and SFFS algorithms, the proposed multiobjective evolutionary granular algorithm allows for simultaneous optimization of feature selection and weights for each face granule."]} +{"6168092|16620699": ["Surveys on 3D face recognition approaches can be found in [8][9] and [50]."]} +{"6168092|6028805": ["from different persons are significantly different, while those temperature of the object and emissivity of the material[29].", "Those modalities include 3D face information [8] and face images in those spectra other than visible spectra, such as thermal infrared image [29] and near-infrared hyperspectral image [40].", "Various fusion schemes have been proposed [29] [15] [4] [60] and shown to lead to better performance than"]} +{"3110666|5171123": ["Index Terms\u2014 Face recognition, Local Binary Patterns (LBP), Canonical Correlation Analysis (CCA), asymmetric face recognition, face matching and fusion scheme"]} +{"3110666|16620699": ["A weighted Chi square distance is computed as matching score between 2D LBP facial representations; Canonical Correlation Analysis (CCA) is applied to learn the mapping between the LBP-based range face images (3D) and LBP facial texture images (2D)."]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} diff --git a/edge/graph_18546648.jsonl b/edge/graph_18546648.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d49d12a2a50d7e4895ae67042fc10cc2658b9cb4 --- /dev/null +++ b/edge/graph_18546648.jsonl @@ -0,0 +1,5 @@ +{"15401810|7788290": ["Many approaches have been proposed for tracking a human body, as can be seen in some reviews [10,11]."]} +{"17761622|17516538": ["There are two widely-used human shape models in the literature: ellipse [5] [12] and box (or rectangle) [20, 25]."]} +{"18636105|17516538": ["In realistic environments, motion detection has to deal with several problems [1], which have been discussed in detail by Toyama et al in [2]."]} +{"2104623|12127129": ["Surveys on this class of algorithms are found in [4], [5]."]} +{"16467616|12127129": []} diff --git a/edge/graph_18551819.jsonl b/edge/graph_18551819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a658ee2940122909fd461a5654579c09559a702a --- /dev/null +++ b/edge/graph_18551819.jsonl @@ -0,0 +1,2 @@ +{"11154258|2835258": ["The GPSR uses a technique called greedy packet forwarding [4], [13]."]} +{"5842782|10287248": ["QoS routing has been receiving increasingly intensive attention in the wireline network domain [10].", "source node or by a distributed computation [10]."]} diff --git a/edge/graph_18552965.jsonl b/edge/graph_18552965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e66215413e4f700f0d7395fc636109d3b2bdf0b --- /dev/null +++ b/edge/graph_18552965.jsonl @@ -0,0 +1 @@ +{"3050490|7185733": ["In [12], Pavlovic, Sharma, and Huang discuss different ways to model hand gestures and how such gestures are used in human-computer interaction, typically for command generation or pointing."]} diff --git a/edge/graph_18555534.jsonl b/edge/graph_18555534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18559797.jsonl b/edge/graph_18559797.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18561327.jsonl b/edge/graph_18561327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18561517.jsonl b/edge/graph_18561517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0f08bd89861e2cb7fe7aeb8bd8cca23ccafc50e --- /dev/null +++ b/edge/graph_18561517.jsonl @@ -0,0 +1,3 @@ +{"62663084|8909218": []} +{"62663084|289357": []} +{"7717310|10658846": ["Compared with the early two-tier data centers that supported no more than 5,000 hosts, the three-tier infrastructure can contain much more computing servers, e.g., a DC with the capacity of 100,000 hosts [24]."]} diff --git a/edge/graph_18563942.jsonl b/edge/graph_18563942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18565134.jsonl b/edge/graph_18565134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2356d46fa829d9014faa7b734dc0a040cd6fbe47 --- /dev/null +++ b/edge/graph_18565134.jsonl @@ -0,0 +1 @@ +{"37925315|12681089": []} diff --git a/edge/graph_18567112.jsonl b/edge/graph_18567112.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc21aa8f8d5bdbde9fa355cba4cd57569a0593f7 --- /dev/null +++ b/edge/graph_18567112.jsonl @@ -0,0 +1,5 @@ +{"5627271|14639620": ["\u2022 Sensors: on-platform sensors allow the device to interpret the physical context of a user [121]."]} +{"5627271|6670217": ["In this regard, our survey complements and extends other works such as [24].", "Attack vectors have multiplied ([23], [24]), and the availability of a myriad of networking paradigms has given rise to new epidemic behaviors (see, e."]} +{"5627271|1333339": ["particular by exploiting interactions in large user communities such as, for example, those provided by online social networks or mobile ad-hoc networks [157]."]} +{"5627271|121289": [", Wireless Sensor Networks [16] or Smart Grids [17]) to communication-centric systems where many information is acquired via communications interfaces.", "Current sensors have evolved from mechanical transducers featured with network connectivity (e.g., Wireless Sensor Networks [16] or Smart Grids [17]) to communication-centric systems where many information is acquired via communications interfaces."]} +{"5627271|206583375": [") [18] or by a global positioning system such as GPS."]} diff --git a/edge/graph_18567490.jsonl b/edge/graph_18567490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1ec6c0bf9a041c329710f20d4f4f626616c5f14 --- /dev/null +++ b/edge/graph_18567490.jsonl @@ -0,0 +1,10 @@ +{"25796479|18193930": []} +{"25796479|18347962": []} +{"62563069|20705668": ["According to the experiments and researches in neuroscience and psychology, 23 \u2013 25 there is much redundant information in the scene."]} +{"36487098|396631": ["55,56 Although their goal was not to provide a database for quality assessment algorithm development, the data here could be possibly used for such a purpose."]} +{"1648575|9431428": ["In particular, recent fMRI studies have shown that machine learning classifiers can be used to analyze fMRI data to decode stimuli, mental states, and behaviors (see [45]\u2013[47] for selective reviews)."]} +{"25928680|18193930": ["Crosstalk is the unexpected light leakage from one view image to the other view image [17]."]} +{"11811246|20705668": ["Visual attention has been shown to interact with numerous perceptual mechanisms [148] brought into play by 3D contents."]} +{"205394999|20705668": ["Recent studies have been shown that 3D visual attention is an important factor affecting 3D Quality of Experience (3DQoE) [25,26]."]} +{"12514658|18193930": ["Most stereoscopic 3D displays (except the stereoscope) suffer from crosstalk [127].", "Crosstalk can be classified into two categories according to how it is measured [127]: System crosstalk is defined as the leaking image from another view (content-independent crosstalk), whereas viewer crosstalk is defined as the ratio of the luminance of the unwanted ghost image vs."]} +{"12514658|396631": ["This alleviates the performance degradation due to illumination changes in MVC, assuming that the DC component in the MB is influenced by local illumination changes.", "A number of algorithms have been proposed to exploit view dependencies, e.g. hierarchical B-pictures in temporal and inter-view dimensions [60], illumination compensation [61], adaptive reference filtering to handle focus mismatch [62], view synthesis prediction using depth maps [63], etc.\nRecognizing the high compression performance and backward compatibility of MVC, the Blu-ray Disc Association (BDA) recently selected the stereo high profile of the MVC extension as the coding format for stereoscopic HD video.", "For efficient storage and transmission of 3D video, multiview video coding (MVC) is gaining more attention from both academia and industry.", "Most of the methods have focused on improving compression efficiency by addressing view mismatches in MVC.", "These test data have been widely used to evaluate a variety of MVC algorithms.", "The Joint Video Team (JVT) from the Moving Picture Experts Group (MPEG) of ISO/IEC and the Video Coding Experts Group (VCEG) of ITU-T recently defined requirements of test data and evaluation conditions for MVC [58] after including it as an extension of the H.264/MPEG-4 Advanced Video Coding (AVC) standard.", "View scalability means that a subset of the MVC bitstream can be accessed to decode a specific view from the multiview video data.", "Kim et. al proposed a new method that handles illumination and focus mismatches between different views in MVC [62].", "The multiview video data should be accessed and decoded from a small portion of the MVC bitstream at any random access point, which is referred to as inter-view random access.", "The auxiliary\nstream is compressed using the MVC extension, where the base stream video may be utilized for inter-view prediction, resulting in considerable bitrate savings.", "There are a few specific requirements for MVC [59]: view scalability, interview random access, and backward compatibility.", "In [106], a color correction method based on a least-squares regression was proposed as a pre-processing step for MVC.", "MVC provides a compact representation of 3D video with strong inter-view dependencies, enabling efficient compression of stereo and multiview video signals.", "Also, MVC should be backward-compatible with existing 2D H.264 decoders, e.g. the base view is standard format compatible, and the auxiliary views can be generated by MVC decoders, if needed."]} diff --git a/edge/graph_18572249.jsonl b/edge/graph_18572249.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c894a639b036667a6ea5d75a552871d752c4d0ce --- /dev/null +++ b/edge/graph_18572249.jsonl @@ -0,0 +1,2 @@ +{"203668516|816774": []} +{"203669332|816774": []} diff --git a/edge/graph_18572558.jsonl b/edge/graph_18572558.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18574754.jsonl b/edge/graph_18574754.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..567f65eedd430a7158bcd216f9e940bb1ebb1d80 --- /dev/null +++ b/edge/graph_18574754.jsonl @@ -0,0 +1,5 @@ +{"7068622|7800459": ["A recent survey [26] details the various works on exact repairs.", ", random linear network codes), or deterministic [26]\u2013[30]."]} +{"15247508|7800459": ["For a general, more complete overview of DDS and storage codes, we refer to [2], [3], and to the Storage Wiki [6]."]} +{"16521882|7800459": []} +{"54868993|18574754": ["The big picture was accordingly summarized at a very high level in a short survey [6]."]} +{"54868993|7800459": []} diff --git a/edge/graph_18575676.jsonl b/edge/graph_18575676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18576141.jsonl b/edge/graph_18576141.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1858278.jsonl b/edge/graph_1858278.jsonl similarity index 100% rename from graph_1858278.jsonl rename to edge/graph_1858278.jsonl diff --git a/edge/graph_18585254.jsonl b/edge/graph_18585254.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72f33b41bb2f004526bf76b6a60cd2ded3bd940c --- /dev/null +++ b/edge/graph_18585254.jsonl @@ -0,0 +1,14 @@ +{"6180068|1259855": ["Lifted models also known as templated models have attracted significant attention recently [10] in areas such as statistical relational learning."]} +{"6180068|47023662": ["Using such a generic template for all the datasets, we make sure that there is no additional expert knowledge involved 5."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"37720008|16156203": []} +{"6389629|1634674": ["Symbolic event recognition systems have received attention in a variety of application domains, such as health care monitoring, public transport management, telecommunication network monitoring and activity recognition [Luckham 2002; Etzion and Niblett 2010; Luckham 2011; Artikis et al. 2012; Turaga et al. 2008].", "\u2026event recognition systems have received attention in a variety of application domains, such as health care monitoring, public transport management, telecommunication network monitoring, and activity recognition [Luckham 2002, 2011; Etzion and Niblett 2010; Artikis et al. 2012; Turaga et al. 2008]."]} +{"18375490|5755403": []} +{"18375490|16525678": ["Valera 05 Intelligent distributed surveillance [187]"]} +{"18375490|17516538": ["Weiming 04 Motion and tracking for surveillance [59]"]} +{"5326927|191396": []} +{"13251604|38476": ["In the sequential supervised learning problem [23], our task is to construct a hypothesis (or classifier) h from a training set that contains a set of labeled sequences."]} +{"8728283|2795037": []} +{"8728283|8125630": []} +{"8332650|13726263": []} diff --git a/edge/graph_18586791.jsonl b/edge/graph_18586791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d448977535763bc8e12ccc8e7032b6b08a99452d --- /dev/null +++ b/edge/graph_18586791.jsonl @@ -0,0 +1,2 @@ +{"12523814|14171067": ["Other variants of the tree edit distance are discussed in a survey by Bille [7]."]} +{"39176282|14171067": []} diff --git a/edge/graph_18587623.jsonl b/edge/graph_18587623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1859317.jsonl b/edge/graph_1859317.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1859397.jsonl b/edge/graph_1859397.jsonl similarity index 100% rename from graph_1859397.jsonl rename to edge/graph_1859397.jsonl diff --git a/edge/graph_18594141.jsonl b/edge/graph_18594141.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18599847.jsonl b/edge/graph_18599847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..836ac916725be9fa5a60b4924edf0270fbf150b4 --- /dev/null +++ b/edge/graph_18599847.jsonl @@ -0,0 +1,8 @@ +{"947305|3330313": ["While detecting anomalies is a mature and active field of research [4], we explore an anomaly metric with potential clinical utility that naturally falls out of the classification deep belief net (DBN) training paradigm."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"15937570|17772052": ["An overview of previous methods and features can be seen in [14]."]} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"17772052|192934": ["For non-Gaussian distributions additional techniques may be used, including Sammon\u2019s maps [30], [31], multilayer perceptrons (MLPs) (Section IV-C), Kohonen self-organizing maps (Section VI-C), Kernel PCA, projection pursuit, and independent components analysis [32]."]} +{"14862572|18454590": ["A variety of different architectures and training algorithms have been proposed in the literature (see the comprehensive survey in [37])."]} +{"95382144|17772052": []} diff --git a/edge/graph_18600744.jsonl b/edge/graph_18600744.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f88463b133f452b88c9cb750b94c2e13bb94c404 --- /dev/null +++ b/edge/graph_18600744.jsonl @@ -0,0 +1,2 @@ +{"10925523|7020971": []} +{"15859274|7020971": []} diff --git a/edge/graph_18602335.jsonl b/edge/graph_18602335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18602374.jsonl b/edge/graph_18602374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1fa01582b53672ec141b68bf517746703003c0a --- /dev/null +++ b/edge/graph_18602374.jsonl @@ -0,0 +1,2 @@ +{"40619852|816774": []} +{"16459995|9104850": ["Hierarchical caching in proxy servers has been extensively analyzed [35, 37]."]} diff --git a/edge/graph_18609918.jsonl b/edge/graph_18609918.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bec371ffa96a897a6504264168ed9287c9d558d8 --- /dev/null +++ b/edge/graph_18609918.jsonl @@ -0,0 +1 @@ +{"30328465|9045232": []} diff --git a/edge/graph_18611665.jsonl b/edge/graph_18611665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_186206569.jsonl b/edge/graph_186206569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd3ad9681a80fa5db4d9d6c7bdeea267e9bc7190 --- /dev/null +++ b/edge/graph_186206569.jsonl @@ -0,0 +1,31 @@ +{"25552182|8365617": ["Change detection has been extensively studied in the context of time-series data, where the objective is to determine time intervals (segments) that exhibit homogeneous properties [Huang et al. 2013; Keogh et al. 2004; Liu et al. 2008; Mithal et al. 2012].", "Change detection has been extensively studied in the context of time-series data, where the objective is to determine time intervals (segments) that exhibit homogeneous properties (Huang et al. 2013; Keogh et al. 1993; Liu et al. 2008; Mithal et al. 2012)."]} +{"53945264|393948": ["Auto-encoders can directly parameterize features or representation functions and learn a direct encoding [3, 5, 30, 34, 56, 63]."]} +{"3634202|393948": ["\u2026gain in efficiency over traditional machine learning models, i.e. from the same amount of training data, deep neural networks can learn exponentially more complex output function than traditional linear or kernel methods (Bengio et al., 2005, 2013; LeCun et al., 2015; Mont\u00fafar et al., 2014)."]} +{"3634202|9431428": ["As a simple baseline of random classification, we applied a binomial method described in (Pereira et al., 2009)."]} +{"151460|13787722": []} +{"151460|41505326": []} +{"41386175|3241708": ["pants are familiar with Shanghai urban area. Each car is annotated by all of them, and the \u2022nal label of each car, considered as \u2018ground truth\u2019, is determined by majority voting (three participants) [47], leading to 290/310 ridesourcing/other cars. To verify the generality of our method, we do not include these 600 cars in co-training. For assessment, we use common classi\u2022cation evaluation metrics, A"]} +{"13791763|4654785": ["Over the past decades, neuroimaging techniques, such as magnetic resonance imaging (MRI), functional MRI (fMRI) and positron emission tomography (PET), have profoundly advanced neuroscience research and clinical application [3], [4].", "Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18].", "In recent years, the neuroimaging based computer-aided diagnosis (CAD) for AD has attracted considerable attention [4], [8]\u2013[10]."]} +{"13791763|4646590": ["Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18]."]} +{"13791763|11540239": ["Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18]."]} +{"13791763|5835640": ["The performance of machine learning algorithms in CAD generally depends on data representation (or feature), and therefore feature extraction becomes a critical step in the classification framework [10], [19].", "Since the neuroimaging dataset generally has small labeled samples [10], as an appropriate feature representation algorithm for the small dataset, the supervised DPN will potentially learn", "In recent years, the neuroimaging based computer-aided diagnosis (CAD) for AD has attracted considerable attention [4], [8]\u2013[10]."]} +{"13791763|393948": ["The performance of machine learning algorithms in CAD generally depends on data representation (or feature), and therefore feature extraction becomes a critical step in the classification framework [10], [19].", "tectures, DL develops a layered, hierarchical architecture to yield high-level and more effective data representation [19], [27], [28].", "On the other hand, the layer-wise stacking of feature extraction often yields better representations in DL [19],", "Each basic DPN is trained in a supervised, block-wise fashion, without the need for back propagation, which is different from other popular deep architectures [19]."]} +{"16762154|7761990": ["ICA, for example, is an unsupervised learning method which is used to discover hidden factors (independent components) from a set of observations such that the identified components are maximally statistically independent (not merely uncorrelated; Bell and Sejnowski, 1995; Hyva\u0308rinen and Oja, 2000).", "A number of frameworks have been proposed to use ICA for multimodal data fusion.", "Alternatively a\nfrequently used algorithm that enables the unmixing of spatiotemporally overlapping EEG signals before feature extraction is independent component analysis (ICA; James and Hesse, 2005; Onton et al., 2006).", "Taking joint ICA (Calhoun et al., 2006, 2009; Mijovic et al., 2012) as an example, the differing biosignal modalities are first processed separately, and ICA is subsequently applied to examine the relationships between data types (Fig.", "Hence, fMRI statistical maps and ERP data of all subjects are merged into a single matrix and subjected to a joint ICA."]} +{"16762154|9431428": ["Over the past years machine learning algorithms have successfully been applied to both EEG and fMRI data (Besserve et al., 2007; Pereira et al., 2009)."]} +{"19105162|393948": ["In this section, we describe a model utilizing sequence-to-sequence auto-encoder to reconstruct the moving behaviour sequence and generating a fixed-length deep representation of the trajectory (Bengio, Courville, & Vincent, 2013)."]} +{"9854676|5755403": []} +{"116674213|13709403": []} +{"27388519|393948": ["Note, however, that purely supervised training without pretraining has also proved successful when using a large quantity of labeled training datawith proper initialization and a choice of activation function (Bengio et al., 2013)."]} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"44153466|393948": ["Many tasks of interest are explained by factors that are shared with other tasks [6].", "An overview of representation learning is available in [6].", "The performance of machine learning models heavily depends on the choice of data representation [6]."]} +{"53766753|393948": ["It transforms different kinds of structured (e.g., a graph) or unstructured (e.g., a corpus) data into a vector representation that can still preserve the unique features in their original form (Bengio, Courville, and Vincent 2013)."]} +{"22555658|2814871": ["systems exist, namely: cameras using image processing, floor sensors, and wearable sensors [14]."]} +{"13667955|393948": ["Two straightforward representations exist for the cells, the one-hot representation [32] and the centroid coordinates of the cells (GPS coordinates).", "This is important, as differences in the loss function would encourage the model to learn different representations [32]."]} +{"205646|4668902": ["s on deep learning. Compared with other methods, neural network models can serve as an effective and general function approximation mechanism that is able to capture complicated data characteristics [Mittal 2016]. In speci\ufb01c, recent studies have shown the superiority of neural network models on network and sequential data. First, several pioneering studies try to embed vertices of a network into low-dimensio"]} +{"205646|393948": []} +{"26475325|393948": ["In this section, we describe a model that uses LSTM (Long Short Term Memory) to reconstruct the moving behavior sequence and generate a \ufb01xed-length deep representation of the trajectory[21]."]} +{"4902780|10777439": []} +{"24053670|393948": ["Recently, deep learning has attracted much attention in the fields of machine learning and data mining [6], and it has been proven that deep learning approach is superb at learning high-level and mid-level features from low-level raw data [7]."]} +{"4883741|1805048": ["Matrix factorization (MF) [18, 29] emerges from recommendation system and the basic idea of it is to factorize the users-items matrix into two latent matrices which represent the users and items characteristics."]} diff --git a/edge/graph_186206579.jsonl b/edge/graph_186206579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d51b7bba64de76a059169fc58a84b50f1ca142d --- /dev/null +++ b/edge/graph_186206579.jsonl @@ -0,0 +1,56 @@ +{"60243709|10817088": []} +{"10331036|2357830": ["Traceable RFID networks are susceptible to issues arising from vulnerabilities in RFID technology [34, 44] as well as associated information systems."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"32432531|15627472": []} +{"32432531|5724477": []} +{"32432531|5807554": ["wearable vision-based systems [37], as well as more recently introduced depth-based sensing."]} +{"14116122|8360759": ["Some representative frames that summarize the main human action classes are depicted in Figure 3.", "Real time classification and prediction of future actions was proposed by Morris and Trivedi (2011), where an activity vocabulary is learned through a three-step procedure.", "Finally, a thorough analysis of the ontologies for human behavior recognition from the viewpoint of data and knowledge representation was presented by Rodr\u00edguez et al. (2014)."]} +{"14116122|16013270": ["A complete survey, which covers important aspects of human activity recognition datasets, was introduced by Chaquet et al. (2013). An appropriate human activity dataset is required for the development of a human activity recognition system.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004). However, their method cannot deal with data that contain complex backgrounds, and due to the down-sampling of the original data the audio-visual synchronization may be lost. Also, their method used different sets of hidden states for audio and visual information. This property considers that the audio and visual features were a priori synchronized, while it increases the complexity of themodel.Metallinou et al. (2012) employed several hierarchical classification models from neural networks to HMMs and their combinations to recognize audio-visual emotional levels of valence and arousal rather than emotional labels, such as anger and kindness.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests.", "A complete survey, which covers important aspects of human activity recognition datasets, was introduced by Chaquet et al. (2013).", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004). However, their method cannot deal with data that contain complex backgrounds, and due to the down-sampling of the original data the audio-visual synchronization may be lost. Also, their method used different sets of hidden states for audio and visual information. This property considers that the audio and visual features were a priori synchronized, while it increases the complexity of themodel.Metallinou et al. (2012) employed several hierarchical classification models from neural networks to HMMs and their combinations to recognize audio-visual emotional levels of valence and arousal rather than emotional labels, such as anger and kindness. Vrigkas et al. (2014b) employed a fully connectedCRFmodel to identify human behaviors, such as friendly, aggressive, and neutral."]} +{"14116122|6387482": ["In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010). Early fusion, or fusion at the feature level, combines features of different modalities, usually by reducing the dimensionality in eachmodality and creating a new feature vector that represents an individual. Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013). The advantage of early fusion is that it yields good recognition results when the different modalities are highly correlated, since only one learning phase is required. On the other hand, the difficulty of combining the different modalities may lead to the domination of one modality over the others. A novel method for fusing verbal (i.e., textual information) andnon-verbal (i.e., visual signals) cues was proposed by Evangelopoulos et al. (2013). Each modality is separately analyzed and saliency scores are used for linear and non-linear fusing schemes.", "In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010).", "In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010). Early fusion, or fusion at the feature level, combines features of different modalities, usually by reducing the dimensionality in eachmodality and creating a new feature vector that represents an individual. Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013). The advantage of early fusion is that it yields good recognition results when the different modalities are highly correlated, since only one learning phase is required. On the other hand, the difficulty of combining the different modalities may lead to the domination of one modality over the others. A novel method for fusing verbal (i.e., textual information) andnon-verbal (i.e., visual signals) cues was proposed by Evangelopoulos et al. (2013). Each modality is separately analyzed and saliency scores are used for linear and non-linear fusing schemes. The second category of methods, which is known as late fusion or fusion at the decision level, combines several probabilistic models to learn the parameters of each modality separately. Then all scores are combined together in a supervised framework yielding a final decision score (Westerveld et al., 2003; Jiang et al., 2014). The individual strength of eachmodality may lead to better recognition results. However, this strategy is time-consuming and requires more complex supervised learning schemes, which may cause a potential loss of inter-modality correlation. A comparison of early versus late fusion methods for video analysis was reported by Snoek et al. (2005). Recently, a third approach for fusingmultimodal data has come to the foreground (Karpathy et al."]} +{"14116122|8042572": ["In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010)."]} +{"14116122|1634674": ["Xu et al. (2015) addressed these limitations and proposed a general probabilistic framework for joint actor-action understanding while they presented a new dataset for actor-action recognition.", "A fine separation between the meanings of \u201caction\u201d and \u201cactivity\u201d was proposed by Turaga et al. (2008), where the activity recognition methods were categorized according to their degree of activity complexity."]} +{"14116122|5401262": ["Some representative frames that summarize the main human action classes are depicted in Figure 3.", "Figure 4 depicts an example of a space-time approach based on dense trajectories and motion descriptors (Wang et al., 2013).", "Pantic et al. (2006) studied several state-of-the-art methods of human behavior recognition including affective and social cues and covered many open computational problems and how they can be efficiently incorporated into a human-computer interaction system."]} +{"14116122|7788290": ["A recent review on 3D pose estimation and activity recognition was proposed by Holte et al. (2012b). The authors categorized 3D pose estimation approaches aimed at presenting multiview human activity recognition methods.", "Gavrila (1999) separated the research in 2D (with and without explicit shape models) and 3D approaches.", "Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013).", "Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004).", "A recent review on 3D pose estimation and activity recognition was proposed by Holte et al. (2012b). The authors categorized 3D pose estimation approaches aimed at presenting multiview human activity recognition methods. The work of Shotton et al. (2011) modeled 3D human poses and performed human activity recognition from depth images by mapping the pose estimation problem into a simpler pixel-wise classification problem.", "Nicolaou et al. (2014) proposed a novel method based on probabilistic canonical correlation analysis (PCCA) (Klami and Kaski, 2008) and DTW for fusing multimodal emotional annotations and performing temporal aligning of sequences.", "Sargin et al. (2007) suggested a method for speaker identification integrating a hybrid scheme of early and late fusion of audio-visual features and used CCA (Hardoon et al., 2004) to synchronize the multimodal features.", "(2007) suggested a method for speaker identification integrating a hybrid scheme of early and late fusion of audio-visual features and used CCA (Hardoon et al., 2004) to synchronize the multimodal features. However, their method can cope with video sequences of frontal view only. Metallinou et al. (2008) proposed a probabilistic approach based on GMMs for recognizing human emotions in dyadic interactions."]} +{"1104100|1634674": []} +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"2157427|17776695": ["Many healthcare applications using wearable sensor for ambient assisted living are under development, including fall detection and prevention, indoor localization, rehabilitation, energy expenditure monitoring, and abnormal detection [1]."]} +{"3493322|10283038": ["Although an IoT approach needs a security analysis [25,26], our approach to the IoT does not rely on a wireless sensor network (WSN) [27], the data information is not sensitive to outside listeners [28] and, as previously stated, the focus of the paper is to validate the presented approach to\u2026"]} +{"3493322|1598350": ["The data that compose these kinds of systems can go from temperature [3], outdoor location [4], indoor location [5], storage stock, humidity or other industry related variables [6]."]} +{"3567100|11293874": []} +{"3567100|8928686": []} +{"8544424|15981390": []} +{"8544424|43033940": ["\u00c7"]} +{"8544424|17516538": ["In general, visionbased schemes collect much richer information, but they suffer from the line-of-sight problem [18], [36], [37], as lights can be easily blocked by objects."]} +{"3683085|7788290": []} +{"63380766|16720993": []} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"1153012|8928686": ["Index Terms\u2014Fall detection, activity recognition, channel state information (CSI), WiFi, phase difference\n\u00c7", "Falls not only bring a main threat to elders\u2019 health, they account for a large part of medical cost as well."]} +{"28817124|1634674": []} +{"28817124|25699143": []} +{"2213462|5724477": ["This sampling frequency is regularly used in the literature and satisfies the Nyquist theorem, since body movements contain frequency components mainly in the range of 0Hz to 15Hz ([11], [12])."]} +{"45289592|17325804": []} +{"45289592|20905429": []} +{"17747015|5664472": [") to sense the movements of body parts, such as [4,5,11,27\u201332]; (2) camera sensor based methods [33], which take advantage of camera to record the video sequence and recognize the activities using computer vision algorithms."]} +{"3968690|819377": ["3) Popular Category Detection Scheme: To detect the items in a popular category, we apply a Gaussian model based change point detection scheme from background detection in image processing [12]."]} +{"18525978|27637541": []} +{"7745335|7185733": ["[17] give a comprehensive review of visionbased gesture recognition techniques."]} +{"15908020|5664472": []} +{"15908020|12127129": ["Piccardi (2004) presented a review on seven different methods- Temporal median filter,Mixture of Gaussians, RunningGaussian average, Sequential KD approximation, Kernel density estimation (KDE), co-occurrence of image variations, and Eigenbackgrounds based on accuracy, speed, and memory\u2026"]} +{"15908020|17516538": []} +{"6014101|21738890": ["The ever-increasing smart devices surrounding our daily lives have offered a great opportunity for building a cost-ef\ufb01cient system that can recognize human-centric motions anytime anywhere [13]."]} +{"6014101|5724477": ["The vision-based approaches [21]\u2013[24] and wearable sensor-based approaches [9], [11], [25] are two dominating solutions, leading to a success transition from academic study to industrial work.", "With the rapid development of wireless communication recently, researchers soon realize that the smart phone with built-in sensors is another alternative [11]."]} +{"6014101|3348390": ["It is well-known that human presence interferences the wireless signals due to multipath and fading effects [12].", "Thebursting development of wireless communications and embedded platforms has greatly accelerated the approach of Internet of Things and envisioned a new era of ubiquitous computing [12]."]} +{"6014101|1634674": ["The former usually employs surveillance cameras to take footage, from which gradient-based features are extracted for motion recognition, while the latter explores virtual footprints caused by human beings from speci\ufb01c sensors for recognizing physical motions [10]."]} +{"6014101|14970359": ["To date, vision-based and sensor-based motion detection are the dominating methods [4]\u2013[9]."]} +{"3814964|5664472": []} +{"53235024|15782139": []} +{"24089983|11293874": ["Depending on particular fall detection algorithms running on smart gateways, one or several types of motion sensors (such as accelerometer and gyroscope) can be integrated in a sensor node [30]."]} +{"1525646|17516538": ["[8] present behavior understanding as a classification of motion patterns produced by the object tracking module."]} +{"52230439|3272873": ["Location based-systems in smart homes healthcare are one of the new areas on which Internet of Things (IOT) is focusing [6]."]} +{"52230439|17747015": ["Other Activity Recognition Sensors Camera based sensors, which are widely used for human activity recognition within a finite sensing coverage are those sensors which rely on the cameras recording and video sequences to recognise the human activity using computer vision algorithms [47].", "Environmental variable based sensors use the raw data from sensed objects to assume the nature of activity undertaken by the individuals [47]."]} +{"52230439|5664472": []} +{"24721898|7370231": ["2) Feature extraction: Root mean square, mean absolute value, waveform length, variance, log detector, skew, kurtosis, maxima, difference absolute standard deviation value, and median frequency were extracted as features in this preliminary study [12-14]."]} +{"15612217|1634674": []} diff --git a/edge/graph_186206717.jsonl b/edge/graph_186206717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..632f1a1b3edb2fa9a7a91cb80ccd4a4982905849 --- /dev/null +++ b/edge/graph_186206717.jsonl @@ -0,0 +1,48 @@ +{"52115749|393948": ["In [19], the advantages of machine"]} +{"54465321|17485266": ["For our application we used Adam method as the adaptive learning rate method [28]."]} +{"3345029|987239": []} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"3668011|10175374": ["This soft parameter sharing approach has been shown to be susceptible to over\ufb01tting in comparison to hard parameter sharing [23].", "[23] 4."]} +{"4055261|17292349": ["[27], McMinn et al."]} +{"4055261|14920988": []} +{"206741902|8445223": ["Interested readers can refer to [217] for a short survey of this recent practice and to [218] for a more general review of cloud approaches in robotics."]} +{"85517967|204904177": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|204509231": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|186206717": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|53800586": ["As suggested in [28], more research is required on how to generalize to \u201ccomplex, cluttered and unseen environments\u201d."]} +{"8018996|12127129": []} +{"12889437|1229096": ["Although preliminary successes have been achieved with AVs, there are still many intractable issues from both a technical and a societal perspective [2,6]."]} +{"7703219|16335158": ["In the CC, MCC and Sensor-cloud architecture, a physical datacentre unit is in charge of performing the data computation and storage (Hossain, 2013), (Dinh, Lee, 2011)."]} +{"7703219|16654832": ["However, the mobile devices suffer from computing resources limitations, battery restriction and processing time (Shiraz et al., 2012)."]} +{"16377896|15093118": ["Vision-based vehicle detection and tracking have been topics of great interest to researchers over the past decade [8] and a variety of PF-based tracking methods have been developed [9], [10], [11], [12], [13], [14], [15]."]} +{"115843016|6198785": []} +{"115843016|15093118": []} +{"52177403|56517517": ["Given this time of tremendously rapid evolution, there exist many recent survey papers on deep learning [13, 86, 89, 145, 166, 212, 280, 290, 305, 312, 317].", "These surveys reviewed deep learning techniques from different perspectives [13, 86, 89, 145, 212, 280, 312], or with applic tion to medic l image anal sis [166], natural language processing [290], speech recognition systems [305], and remote sensing [317]."]} +{"52177403|53109768": []} +{"52177403|21955893": []} +{"52177403|2088679": []} +{"52177403|207060556": ["A Survey on Face Detection in the Wild: Past, Present and Future [301] 2015 CVIU 2000 \u5e74\u4ee5\u964d\u306e \u201cin the wild\u201d(\u975e\u5236\u7d04\u74b0\u5883,\u5b9f\u74b0\u5883)\u9854\u691c\u51fa\u306e\u30b5\u30fc\u30d9\u30a4", "\u6b69\u884c\u8005\u691c\u51fa [66, 79, 59],\u9854\u691c \u51fa [294, 301],\u8eca\u4e21\u691c\u51fa [258],\u30c6\u30ad\u30b9\u30c8\u691c\u51fa [295] \u306a\u3069,\u7279 \u5b9a\u7269\u4f53\u691c\u51fa\u554f\u984c\u306b\u95a2\u3059\u308b\u512a\u308c\u305f\u8abf\u67fb\u304c\u591a\u6570\u884c\u308f\u308c\u3066\u304d\u305f."]} +{"52177403|5729190": []} +{"52177403|1223851": ["15 Salient Object Detection: A Survey [19] 2014 arXiv A survey for salient object detection"]} +{"52177403|393948": []} +{"52177403|206764452": []} +{"52177403|9045232": []} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"65150490|1229096": []} +{"65150490|15093118": []} +{"36510460|18315024": ["Both surveys [66], [67] focus on RRT and PRM for computational biology and physics-based simulation and modeling.", "In computational biology, molecules and proteins are modeled as articulated bodies and sampling based planners are used to simulate protein folding and protein-ligand interactions [66], [67]."]} +{"58004724|1229096": ["Methods for motion planning can be mainly categorized into four classes: graph search based, sampling based, interpolating curve based, and numerical optimization based methods (Gonz\u00e1lez et al., 2015; Paden et al., 2016).", "It consists of finding a point in the path at some look-ahead distance from the current path and turning the front wheel so that a circular arc connects the center of the rear axle with the point in the path (Paden et al., 2016), as shown in Figure 13.", "tions in the literature (Paden et al., 2016).", "Figure 1 shows a block diagram of the typical architecture of the automation system of self-driving cars, where the Perception and Decision Making systems (Paden et al., 2016) are shown as a collection of subsystems of different colors.", "is typically organized into two main parts: the perception system, and the decision-making system (Paden et al., 2016).", "For earlier works, readers are referred to Petrovskaya et al. (2012), Bernini et al.", "Methods for path planning can be mainly categorized into two classes: graph search based and interpolating curve based (Gonz\u00e1lez et al., 2015; Paden et al., 2016)."]} +{"58004724|206739910": []} +{"17036197|49862415": []} +{"17036197|10355303": []} +{"17036197|17516538": ["\u2022 The first set [19], [20], [21], [23], [24] discusses tracking as an individual part while this work specifically discusses various aspects of MOT.", "For example, object tracking is discussed as a step in the procedure of high-level tasks such as crowd modeling [19], [23], [24].", "[19] Object Motion and Behaviors 2004 Kim et al.", "As a mid-level task in computer vision, multiple object tracking grounds high-level tasks such as pose estimation [17], action recognition [18], and behavior analysis [19]."]} +{"11971675|36510460": ["The development of intelligent planning algorithms is one of the key issues when designing robotic architectures [20], [21].", "In [21] and [95] descriptions, applications and improvements of these algorithms are reviewed.", "The approach consists on randomly sampling the configuration space or state space, looking for connectivity inside it [21]."]} +{"11971675|1029120": []} +{"53569365|3757239": ["With the help of Edge nodes and network connections, processing overhead is largely decreased and bandwidth restrictions are surmounted for consolidated services [19]."]} +{"17509842|9928823": ["The \ufb01eld of deep learning and deformable parts models (Deng, 2014) and (Felzenszwalb et al., 2010b) has advanced from hand-designed feature detection methods to learn hierarchies of features in an unsupervised manner directly from data, vastly improving algorithm detection and classi\ufb01cation\u2026"]} +{"16139052|7482876": ["Due to high mobility of vehicles, communication channels are susceptible to fast fading, whereby reliable links cannot be guaranteed [98]."]} +{"16139052|763939": ["In the literature, many research studies have been undertaken so as to provide a close-to-reality mobility model for VANETs [129,130]; however, those proposed models are suitable for only a small number of scenarios (e."]} +{"23267374|6198785": ["Complementary to our survey, Zhu et al. (2017) provide an overview of environment perception for intelligent vehicles, focusing on lane detection, traffic sign/light recognition as well as vehicle tracking."]} +{"23267374|1877246": ["There is a variety of methods for dealing with this problem such as voxel hashing (Nie\u00dfner et al. (2013)) or a data adaptive discretization of the space in the form of a Delaunay triangulation (Labatut et al.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for urban reconstruction.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-\nmantics, facades and images, and finally blocks and cities."]} +{"23267374|206764452": []} diff --git a/edge/graph_186207561.jsonl b/edge/graph_186207561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb361387b1218425cd78c832c39fefa90df482a3 --- /dev/null +++ b/edge/graph_186207561.jsonl @@ -0,0 +1,10 @@ +{"2617513|62198990": []} +{"35498686|4361938": []} +{"35498686|62198990": []} +{"206609316|62198990": []} +{"206611506|4361938": ["According to Duchowski [4], eye-gaze tracking applications can be", "According to Duchowski [4], eye-gaze tracking applications can be categorized as diagnostic or interactive."]} +{"3923538|4361938": []} +{"24009262|62198990": ["Such systems, in order to reduce the influence of head movement, use a working variable that has a relative value that combines pupil center and glint position in the image [ 28 ]."]} +{"62671957|62198990": []} +{"38682924|4361938": ["The first and the obvious one was a second order polynomial function in form: xs = Axx(2) e + Bxy 2 e +Cxxe + Dxye + Ex, (2) ys = Ayx(2) e + Byy 2 e +Cyxe + Dyye + Ey.", "The first and the obvious one was a second order polynomial function in form:\nxs = Axx2e + Bxy 2 e +Cxxe + Dxye + Ex, (2)\nys = Ayx2e + Byy 2 e +Cyxe + Dyye + Ey."]} +{"37248870|10948183": ["Stephen Hawking), facial expressions [28] and even puffing and sniffing [26].", "[28] provide a comprehensive overview of interaction techniques that can be used to interact with computers."]} diff --git a/edge/graph_18623353.jsonl b/edge/graph_18623353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18631679.jsonl b/edge/graph_18631679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f58d328e5ecdbcc0bf0e6de56dcf13a0f46ac3bb --- /dev/null +++ b/edge/graph_18631679.jsonl @@ -0,0 +1,8 @@ +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"16527133|8909218": ["1: ShortestDistance = pQ[1] 2: for i = 2\u2192 \u2223Q\u2223 do 3: if pQ[i] < ShortestDistance then", "It operates on a licensed spectrum and connects to a service provider\u2019s broadband system to offer wireless access service [1]."]} +{"9278610|8909218": ["I. INTRODUCTION\nRecently, femtocell has been widely studied in 3G Universal Mobile Telecommunications System (UMTS) cellular networks with the initiatives to provide better indoor quality of service (QoS) and offload the capacity of macro cellular networks [1].", "In residential scenarios, FAPs are preferred to be deployed by end users under closed access mode [1], while an essential issue of closed-access femtocells is the interference to nearby public UEs."]} +{"18943449|8909218": ["However, various research results [1] suggest that the majority of mobile users suffer from inadequate indoor signal penetration which leads to poor coverage provided to consumers and they do not enjoy the full data capacity marketed by the operators."]} +{"36694643|8909218": ["Femtocells are low-power, low-cost, user-deployed cellular base stations (BSs) with a typical coverage range of tens of meters [1]."]} +{"6025184|8909218": ["As a solution to accommodate indoor traffic, femto\u00ad cell has been introduced [2]."]} +{"5547171|8909218": []} +{"12321890|8909218": ["The detailed description of the economic and technical feasibility of deploying femtocells can be found in [2], [3]."]} diff --git a/edge/graph_18638705.jsonl b/edge/graph_18638705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18640079.jsonl b/edge/graph_18640079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1864309.jsonl b/edge/graph_1864309.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18643546.jsonl b/edge/graph_18643546.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b85f04a9168eb151a50cc6977a9e7beaf0cb6067 --- /dev/null +++ b/edge/graph_18643546.jsonl @@ -0,0 +1 @@ +{"52888093|8530790": ["Now GAs have been well discussed and summarized by several authors, e.g., Holland[12], Koza[13], Fonseca and Fleming [14], Orosh[15], Gen and Cheng [16] and Liu[17].", ", Holland[12], Koza[13], Fonseca and Fleming [14], Orosh[15], Gen and Cheng [16] and Liu[17]."]} diff --git a/edge/graph_18643566.jsonl b/edge/graph_18643566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18643817.jsonl b/edge/graph_18643817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..668dbaaedfa9a1112eda3a084fa138009ad101e2 --- /dev/null +++ b/edge/graph_18643817.jsonl @@ -0,0 +1,5 @@ +{"15098213|10287248": ["The work done in \u201dQoS routing computation\u201d addresses two basic QoS routing tasks defined in [4] \u2013 \u201clink-constrained routing\u201d and \u201clink-optimization routing\u201d.", "Nahrstedt, \u201cDistributed Quality-of-Service Routing in High-Speed Networks Based on Selective Probing\u201d, IEEE Local Computer Networks (LCN), pages 80-89, October 1998 [4] S."]} +{"786700|10559330": ["IntServ [ 4 ] architecture allows sources to communicate their QoS requirements to routers and destinations on the data path by means of a signaling protocol such as RSVP [13] and dRSVP (for specifying a range of QoS requirements)[16]."]} +{"85562787|41998167": []} +{"85562787|17960632": []} +{"85562787|14441987": []} diff --git a/edge/graph_18645534.jsonl b/edge/graph_18645534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18647611.jsonl b/edge/graph_18647611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b4639f510a13380fe2a20e9ca114d76a62217b3 --- /dev/null +++ b/edge/graph_18647611.jsonl @@ -0,0 +1,8 @@ +{"15836035|387610": ["We borrow the notion of \u2018Region-Of-Interest (ROI)\u2019 from JPEG 2000 [Christopoulos et al. 2000], which is referred in our model as a spatial region or segment within an image that corresponds to an attention object.", "The ROI coding scheme and Spatial/SNR scalability in JPEG 2000 [Christopoulos et al. 2000] has provided a functionality of progressive encoding and display."]} +{"18442541|2532914": ["For content adaptation for mobile devices, learning and memorization are not the issues [17], [18] and efficiency and satisfaction are the major concerns [4], [23], [48]."]} +{"41417819|14889616": ["For example, the SVC (Scalable Video Codec) [18] extension of\nthe H.264/AVC standard is an adaptive solution that can be used to address both network and device related issues.", "For example, the SVC (Scalable Video Codec) [18] extension of the H."]} +{"41417819|3540699": ["264 is a complex codec with a multitude of settings that can impact the quality and the bitrate reduction [55]."]} +{"16951284|14889616": []} +{"53245634|14889616": []} +{"53245634|3540699": []} +{"14889616|3540699": ["For more detailed information about H.264/AVC, the reader is referred to the standard [6] or corresponding overview papers [23]\u2013[26] While the VCL creates a coded representation of the source content, the NAL formats these data and provides header information in a way that enables simple and\u2026"]} diff --git a/edge/graph_18650997.jsonl b/edge/graph_18650997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18654252.jsonl b/edge/graph_18654252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a302fa5020bbaf1750511fc646f63a5b396e142 --- /dev/null +++ b/edge/graph_18654252.jsonl @@ -0,0 +1,10 @@ +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"15014436|6430931": ["The performance comparison between V-AHD and some common used methods is shown in the following table, which includes CTBIPS[22] and RSVMs[23].", "To RSVMs method, the False Positive Rate is very low but the True Positive Rate is also very low.", "The performance comparison between V-AHD and some common used methods is shown in the following table, which includes CTBIPS([22]) and RSVMs([23]).", "Based on the above indicators, a numerical evaluation can apply the following measures to quantify the performance of an algorithm([23]):"]} +{"18397966|7567339": ["CPN routing [9, 11, 10, 6, 4, 5, 21] was designed to perform self-improvement by learning from the experience of special \u201csmart packets\u201d (SPs) that constantly probe the network.", "The CPN has been shown to be effective for a variety of uses [21], including traffic balancing [13], power-based routing in mobile ad hoc networks [8] and admission control (AC) [14]."]} +{"207172599|3330313": []} +{"22177268|3330313": ["This is defined in an intuitive fashion in Acuna and Rodriguez (2004 ) a s follows (for alternate definitions see Hawkins 1980, Barnett and Lewis 1978):", "In addition to the slowing effect this has on performance, it also spreads the convex hull, thus distorting the data distribution [\u201cCurse of Dimensionality\u201d ( Hodge and Austin 2004 )].", "In addition to the slowing effect this has on performance, it also spreads the convex hull, thus distorting the data distribution [\u201cCurse of Dimensionality\u201d (Hodge and Austin 2004)]."]} +{"22177268|2656838": ["Similar work was presented in Geerts et al. (2005), Calders et al. (2004) for a tight upper bound on number of candidates generated by frequent itemset mining methods and itemsets that can be derived based on smaller itemsets and their support.", "(2005), Calders et al. (2004) for a tight upper bound on number of candidates generated by frequent itemset mining methods and itemsets that can be derived based on smaller itemsets and their support."]} +{"2073551|1230643": ["Index Terms\u2014Wireless sensor networks, quality of service."]} +{"2073551|14441987": []} +{"53398669|3330313": ["In addition to poor execution performance, this also spreads the convex hull that includes all data points, thus distorting the data distribution [8]."]} diff --git a/edge/graph_18657007.jsonl b/edge/graph_18657007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e74e1b956328880bebc53eb80480ae066249566 --- /dev/null +++ b/edge/graph_18657007.jsonl @@ -0,0 +1,36 @@ +{"17697881|1230643": ["However, nodes in MANETs have several restrictions such as limited coverage area, limited lifetime, memory, and cost [1]."]} +{"12832323|945077": []} +{"12832323|191396": []} +{"20143340|1333339": ["There are three major methods for measuring trust metrics for distributed trust computations (Govindan and Mohapatra 2012): neighbor-sensing meth-ods (Probst and Kasera 2007; Pirzada and McDonald 2006; Zouridaki et al. 2005), recommendation-based meth-ods(Jiang and Baras 2006; Theodorakopoulos and\u2026", "There are several methods for trust management in mobile ad-hoc networks (Cho et al. 2011; England et al. 2012; Govindan and Mohapatra 2012)."]} +{"20143340|14745481": ["There are several methods for trust management in mobile ad-hoc networks (Cho et al. 2011; England et al. 2012; Govindan and Mohapatra 2012)."]} +{"20143340|10346685": ["\u2026(ABE) has been extensively researched as a cryptographic protocol (Sahai and Waters 2005b; Bethencourt et al. 2007; Hinek et al. 2008; Lewko et al. 2010; Chase 2007; Zhou and Huang 2011; Waters 2011; Goyal et al. 2006, 2008; Gentry and Silverberg 2002; Ostrovsky et al. 2007; Lewko and Waters 2011).", "\u2026schemes (Song et al. 2000; Waters et al. 2004) can search encrypted data without decryption operations, and private information retrieval (Ostrovsky and Skeith 2007; Kushilevitz and Ostrovsky 1997) allows a user to retrieve an item from a server in possession of a database without\u2026"]} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"14739363|5798514": ["This search for an unexplored area without a clear guideline represents one of the most important factors affecting negatively the efficiency and efficacy of the SAR process."]} +{"14739363|1453418": ["This search for an unexplored area without a clear guideline represents one of the most important factors affecting negatively the efficiency and efficacy of the SAR process."]} +{"12012646|2685137": []} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"63582538|19454977": []} +{"63582538|14552902": []} +{"37628161|1230643": []} +{"44487623|164835": []} +{"44487623|13372227": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"13123535|1230643": []} +{"207443163|1230643": ["However, nodes in MANETs have several restrictions such as limited coverage area, limited lifetime, memory, and cost (Akyildiz et al. 2002)."]} +{"6163368|2206212": ["Saving energy in WSNs occur through different methods such as reducing sent and processing data (via methods like compression), algorithm overhead reduction, topology control, defining task periods (in each period, a fraction of sensors are active), and at last routing with optimal energy consumption helping network lifetime increases by means of applying the most suitable routing algorithm according to the network application and mentioned requirements in that specific application [6]."]} +{"6163368|205286988": ["LEACH [12] is one of the most widely used algorithms in this category [11].", "GAF [10] is one of the most important algorithms noted in this category [11]."]} +{"8420169|763939": ["A survey is presented in chapter by Awwad, Yi, and Stojmenovic in [ ]. fsew other chapters in the same book survey ongoing research activities on experimental testbeds and simulation"]} +{"8420169|1940388": ["Indeed, while MANET represents an engineering approach to hide node mobility by constructing \u201cstable\u201d end-to-end paths as in opportunity to exploit ."]} +{"8420169|6275330": ["The need for real development produced orthogonal approach to MANET validation While initially simulation was largely used [27 it was quite soon replaced by large testbeds deployed at several universities, 3 which are open for access to the research community."]} +{"8420169|1230643": []} +{"6438719|14441987": []} +{"14276212|7971188": ["Other types of information dissemination methods such as geocasting [3], [4], [5], multicasting [6], [7], [8], peer-to-peer content distributing [9], [10], [11], and streaming [12], [13], [14] will not be discussed in this paper."]} +{"14276212|11894335": ["Other types of information dissemination methods such as geocasting [3], [4], [5], multicasting [6], [7], [8], peer-to-peer content distributing [9], [10], [11], and streaming [12], [13], [14] will not be discussed in this paper."]} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"27353195|2835258": []} +{"41516258|1762301": ["The routing protocols proposed so far can be classified into two categories: proactive routing protocol and reactive routing protocol [1]."]} +{"205703388|14088590": []} +{"205703388|14441987": []} diff --git a/edge/graph_18658819.jsonl b/edge/graph_18658819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d33f41cc6b86dab0af75c35350265ecd468031ba --- /dev/null +++ b/edge/graph_18658819.jsonl @@ -0,0 +1 @@ +{"20101519|62635091": ["7 Fuzzy Logic Fuzzy Logic was introduced by Zadeh to address uncertainty and imprecision which widely exist in the engineering problems [36]."]} diff --git a/edge/graph_18658949.jsonl b/edge/graph_18658949.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08667b98c3d438313c2eae165a84957383e52c2c --- /dev/null +++ b/edge/graph_18658949.jsonl @@ -0,0 +1,6 @@ +{"18773260|11003991": ["Magerlein and Martin (1978), Cayirli and Veral (2003), Mondschein and Weintraub (2003), Gupta and Denton (2008), Cardoen et al. (2010) and Begen and Queyranne (2011) provide comprehensive reviews."]} +{"37836836|11003991": ["There is large number of comprehensive literature reviews in OR/MS applied to surgical care services [20, 34, 57, 104, 107, 108, 161, 167, 190, 244].", "Since surgical care services are the hospital\u2019s largest revenue center [34, 54], the case mix is chosen with the objective to optimize net contribution, costs and profit [104].", "Capacity can be reserved by dedicating one or more operating rooms to emergency cases, or by reserving capacity in elective operating rooms [34, 212].", "Elective cases can be planned in advance, urgent cases require surgery urgently, but can incur a short waiting period, and emergency patients require surgery immediately [25, 34].", "Identification by medical urgency distinguishes elective, urgent and emergent cases [34, 83, 104, 107].", "The latter is preferred in some hospital environments [34, 146].", "Relatively few papers evaluate the effect of surgical care services on ancillary services [161, 20, 34].", "In contributions that model ancillary services, it is often the objective to level bed occupancy in wards or ICU, to decrease the number of cancellations [13, 34, 203, 233, 234], or to minimize delays for inpatients [257].", "Other objectives are to maximize contribution margin per hour [34, 60], maximize the number of patients operated, or minimize staff overtime [111].", "A cyclic block schedule is also termed a Master Surgical Schedule (MSS) [234], but definitions of an MSS vary among OR/MS researchers [34]."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"5141400|6308019": []} +{"33247229|11003991": ["Finally, Carter and Blake (2004) discussed four different problem instances in healthcare for which simulation can prove to be a good analysis tool: inpatient surgical scheduling; emergency room waiting time; emergency room scheduling; and medicine ordering. They discussed obstacles as well as lessons learned from the simulation modelling techniques used. Additional work on the scheduling of operating rooms can be found in Puente et al. (2009), Guinet and Chaabane (2003) and Dexter and Traub (1999).", "Finally, Carter and Blake (2004) discussed four different problem instances in healthcare for which simulation can prove to be a good analysis tool: inpatient surgical scheduling; emergency room waiting time; emergency room scheduling; and medicine ordering.", "Finally, Carter and Blake (2004) discussed four different problem instances in healthcare for which simulation can prove to be a good analysis tool: inpatient surgical scheduling; emergency room waiting time; emergency room scheduling; and medicine ordering. They discussed obstacles as well as lessons learned from the simulation modelling techniques used. Additional work on the scheduling of operating rooms can be found in Puente et al. (2009), Guinet and Chaabane (2003) and Dexter and Traub (1999). A review on operating room planning and scheduling is provided by Cardoen et al.", "A review on operating room planning and scheduling is provided by Cardoen et al. (2010)."]} diff --git a/edge/graph_18679391.jsonl b/edge/graph_18679391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..517e6a35de84611c9adc71bd810961236ae7335a --- /dev/null +++ b/edge/graph_18679391.jsonl @@ -0,0 +1 @@ +{"6116473|18679391": ["All rights reserved.\ndoi:10.1016/j.endm.2008.01.020"]} diff --git a/edge/graph_18685876.jsonl b/edge/graph_18685876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18687271.jsonl b/edge/graph_18687271.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18687702.jsonl b/edge/graph_18687702.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18690327.jsonl b/edge/graph_18690327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18691290.jsonl b/edge/graph_18691290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4445cf7b578f777b1d71c8bf7b1fe0d2711d459 --- /dev/null +++ b/edge/graph_18691290.jsonl @@ -0,0 +1,4 @@ +{"15372082|6972141": ["Some also focused on surveying different vision models for mobile robot navigation [10], while [30] presented different robotic mapping techniques."]} +{"14513508|7360895": []} +{"14513508|16614482": []} +{"1819274|6972141": ["[4] focused on surveying vision for mobile robot navigation, while [5] presented different robotic mapping techniques."]} diff --git a/edge/graph_18691993.jsonl b/edge/graph_18691993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54c35b3dc640f5dd0c5812341fa37cdee7a9886d --- /dev/null +++ b/edge/graph_18691993.jsonl @@ -0,0 +1,13 @@ +{"38660892|393948": ["Moreover, adding layers does not necessarily lead to better results [6]."]} +{"109408013|266462": []} +{"10196261|1386147": ["With no loss in generality we can assume , which implies a reduction of one node in the output layer of the neural network equal to , where is the number of classes."]} +{"10196261|13867280": ["PROBLEMS"]} +{"10196261|7158350": ["Recent vast research activities in neural classification have established that neural networks are a promising alternative to various conventional classification methods [ 75 ]."]} +{"10196261|192934": ["Many problems in business, science, industry, and medicine can be treated as classification problems [10], [37], [50]."]} +{"6003275|192934": ["L EARNING to classify or to predict numerical values from prelabelled patterns is one of the central research topics in machine learning and data mining [1]\u2013 [3]."]} +{"15436697|191396": ["The analysis of the available clustering algorithms, the clustering initialization, and the selection of the number of clusters is beyond the scope of this paper [51] but, for the cluster"]} +{"109198325|14808716": []} +{"18900680|11894197": []} +{"28834309|10739218": ["D\u2019Andrea), b.lazzerini@iet.u-\nniques (Kasabov, 1996; Mitra & Hayashi, 2000; Mitra & Kuncheva, 1995; Nauck & Kruse, 1997; Tsang, Wang, & Yeung, 2000; Uebele, Abe, & Lan, 1995), clustering methods (Abe & Thawonmas, 1997; Roubos, Setnes, & Abonyi, 2003), genetic algorithms (Angelov & Buswell, 2003;\u2026"]} +{"19302328|365692": []} +{"111236620|17381415": ["Due to the development of the power electronic technique, the variable speed WECS with a multiple-stage gearbox, a doubly fed induction generator (DFIG) and a partial-scale converter has been proposed to expand the system operation range of wind speed and increase the system efficiency [6,7]."]} diff --git a/edge/graph_18701981.jsonl b/edge/graph_18701981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18702317.jsonl b/edge/graph_18702317.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18702964.jsonl b/edge/graph_18702964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2db29d1f463d2b10bcef75f7ae28c8f5336bc56 --- /dev/null +++ b/edge/graph_18702964.jsonl @@ -0,0 +1,7 @@ +{"14292737|18440098": []} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"17114496|7185733": []} +{"17114496|192934": []} +{"59934837|16770050": ["Currently, there are many methods and algorithms for 3D hand gestures recognition (a good survey is provided in [1, 2]), but some of them seem to have only a purely theoretical nature and therefore cannot be integrated into specific HRI applications."]} +{"36734823|7185733": ["On the other hand, the 2D approach is restricted to the less complex problem of classifying well-defined static gestures [ 5-8 ]."]} diff --git a/edge/graph_18706321.jsonl b/edge/graph_18706321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b02bff7fa38b25f7f145401253dadf49a4156cd9 --- /dev/null +++ b/edge/graph_18706321.jsonl @@ -0,0 +1 @@ +{"3158838|13365762": []} diff --git a/edge/graph_18706364.jsonl b/edge/graph_18706364.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1870730.jsonl b/edge/graph_1870730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18707340.jsonl b/edge/graph_18707340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb43204ab112f0883c6affc6e2e5020cebda9eb4 --- /dev/null +++ b/edge/graph_18707340.jsonl @@ -0,0 +1,2 @@ +{"5790745|8777381": ["The vocal emotions explored may have been induced or acted or they may be have been elicited from more \u201creal\u201d, lifelike contexts [1], [2]."]} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} diff --git a/edge/graph_18709108.jsonl b/edge/graph_18709108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bb59f1b2a75245f4751ad0cbca61311d826b6a6 --- /dev/null +++ b/edge/graph_18709108.jsonl @@ -0,0 +1 @@ +{"15943114|7788290": ["Extensive work has bee n conducted for the case of human motion and in particular faci al expressions [12, 4, 13, 14]."]} diff --git a/edge/graph_18710220.jsonl b/edge/graph_18710220.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2a973b3e994172b04e2cfe209f32487c8afd030 --- /dev/null +++ b/edge/graph_18710220.jsonl @@ -0,0 +1,4 @@ +{"8384747|191396": ["solution for reducing the object cardinality is object clustering [11, 22], but that is outside the scope of this paper."]} +{"6841548|8424228": ["An extensive body of work on concurrency control in partitioned networks is relevant in our context ( Davidson et al., 1985 )."]} +{"60876639|3053192": []} +{"281644|10500613": ["Approaches for mapping and/or merging ontologies and/or database schemata may be distinguished mainly along the following three categories: discovery,[Rahm and Bernstein, 2001; Cohen, 1998; Noy and Musen, 2000], mapping repre-"]} diff --git a/edge/graph_18715867.jsonl b/edge/graph_18715867.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18717047.jsonl b/edge/graph_18717047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50165779e06735cda7102f4d71ed9954b980bdf8 --- /dev/null +++ b/edge/graph_18717047.jsonl @@ -0,0 +1 @@ +{"4820769|7193476": ["Whereas mashups have been positioned as composition done at the userinterface layer [3], the goal of this paper is to apply the notion composition to RESTful services independently of the user interface of the resulting application.", "An example of a complementary composition tool focused at the user interface layer [3] is Mixup [36]."]} diff --git a/edge/graph_18720745.jsonl b/edge/graph_18720745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18722099.jsonl b/edge/graph_18722099.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..403bf67907d78572593223ae50523ead17d3d207 --- /dev/null +++ b/edge/graph_18722099.jsonl @@ -0,0 +1,15 @@ +{"16242667|239537": []} +{"14733750|239537": ["One of the main difficulties of 3D is navigation caused by the discrepancy of using 2D screens and 2D input devices to interact with a 3D world, combined with missing motion and stereo cues [38], [103], [106].", "In particular, for a review on the state of the art in graph visualization in general, see [102]; for graph visualization in information visualization, see [103]; and for combined approaches, see [104]."]} +{"1189315|239537": ["GRAPHS or networks are an essential class of data models and their visualization is an active area of research [9], [19], [21].", "For an overview of graph drawing, see [9], [19], [21]."]} +{"9090753|239537": ["Such \u201cnode-and-link diagrams\u201d have been explored intensively throughout this century (see [3, 10, 14, 15])."]} +{"761640|239537": []} +{"205419270|6116234": ["There has been a corresponding increase in the development of visualization tools for systems biology dat"]} +{"62501085|239537": ["These fall into the following categories: ( 1 ) the visual presentation, (2) facilitating the substrate creation process, and (3) miscellaneous issues.", "Usually an attribute with 2\u20135 values that separates nodes into meaningful categories is appropriate ( 1 ) as was the case with the venue attribute with the legal cases data set and the metCat attribute (metabolic category) with the food web data set.", "Selecting a grouping attribute It is best to choose the attribute that is of most interest ( 1 ) and most suitable (2), (3) for grouping.", "For the legal cases data set, year and circuitNo are meaningful ( 1 ) as year helps make temporal inferences, while circuitNo subcategorizes cases in addition to refining the hierarchy of courts and enabling comparison between Circuit and District Court cases (4), (5) . A fairly balanced distribution of nodes across these attributes helps the visualization as in the legal cases data set (Figures 4\u201310) (2).", "( 1 ) Choose grouping and placement attributes based on key variables of nodes.", "Locating regions to decrease (and in certain situations increase) link length and link overlap will increase the visualization\u2019s effectiveness (5) . If users have specific questions, they can set the attributes of interest as parameters of the placement methods and align the regions of interest ( 1 ).", "The rest of the settings involve placement of nodes: ( 1 ) which region and (2) how they are placed within this selected region.", "Attributes of high interest should be given priority ( 1 ).", "The substrate creation process can be improved in terms of two criteria: ( 1 ) a good substrate at the end of the process, and (2) a faster process."]} +{"15122312|239537": []} +{"7666031|239537": []} +{"25372369|816774": ["Aim: The second syntactic experimental study considered the effects of eight different graph drawing algorithms: 2 FD-FR: This force directed algorithm by Fruchterman and Reingold (1991) is based on an original idea by Eades (1984).", "Aim: The second syntactic experimental study considered the effects of eight different graph drawing algorithms: 2 FD-FR: This force directed algorithm by Fruchterman and Reingold (1991) is based on an original idea by Eades (1984). It produces a drawing that attempts to display symmetric structures, with few edge crossings. FD-K: This is another force directed algorithm, by Kamada and Kawai (1989) based on Eades. The drawing produced by this algorithm is similar to that produced by FD-FR, with a more even distribution of nodes. POGB: This is an implementation of an algorithm for planar orthogonal grid drawing with bends minimisation, designed by Tamassia (1987). GRAPHED provides two implementations of this algorithm, with differences in the manner in which the coordinates of the nodes are assigned. Himsolt (1997) describes the differences in the two algorithms as being related to the starting conditions: the first algorithm (POGBa) generates the planar embedding from the drawing, while the second one (POGBb) uses a planarity test. He notes that the outcome is not deterministic. PG: This planar grid drawing algorithm is based on the one designed by Woods (1982). Unlike the product of the POGB algorithm, the PG drawing has many sloped edges.", "Aim: The second syntactic experimental study considered the effects of eight different graph drawing algorithms: 2 FD-FR: This force directed algorithm by Fruchterman and Reingold (1991) is based on an original idea by Eades (1984). It produces a drawing that attempts to display symmetric structures, with few edge crossings. FD-K: This is another force directed algorithm, by Kamada and Kawai (1989) based on Eades. The drawing produced by this algorithm is similar to that produced by FD-FR, with a more even distribution of nodes. POGB: This is an implementation of an algorithm for planar orthogonal grid drawing with bends minimisation, designed by Tamassia (1987). GRAPHED provides two implementations of this algorithm, with differences in the manner in which the coordinates of the nodes are assigned. Himsolt (1997) describes the differences in the two algorithms as being related to the starting conditions: the first algorithm (POGBa) generates the planar embedding from the drawing, while the second one (POGBb) uses a planarity test.", "PGS: The planar grid drawing with straight line edges is based on the algorithm by de Fraysseix et al. (1990), with improvements as suggested by Chrobak and Payne (1990).", "Aim: The second syntactic experimental study considered the effects of eight different graph drawing algorithms: 2 FD-FR: This force directed algorithm by Fruchterman and Reingold (1991) is based on an original idea by Eades (1984). It produces a drawing that attempts to display symmetric structures, with few edge crossings. FD-K: This is another force directed algorithm, by Kamada and Kawai (1989) based on Eades. The drawing produced by this algorithm is similar to that produced by FD-FR, with a more even distribution of nodes. POGB: This is an implementation of an algorithm for planar orthogonal grid drawing with bends minimisation, designed by Tamassia (1987). GRAPHED provides two implementations of this algorithm, with differences in the manner in which the coordinates of the nodes are assigned.", "Aim: The second syntactic experimental study considered the effects of eight different graph drawing algorithms: 2 FD-FR: This force directed algorithm by Fruchterman and Reingold (1991) is based on an original idea by Eades (1984). It produces a drawing that attempts to display symmetric structures, with few edge crossings.", "Aim: The second syntactic experimental study considered the effects of eight different graph drawing algorithms: 2 FD-FR: This force directed algorithm by Fruchterman and Reingold (1991) is based on an original idea by Eades (1984). It produces a drawing that attempts to display symmetric structures, with few edge crossings. FD-K: This is another force directed algorithm, by Kamada and Kawai (1989) based on Eades."]} +{"18883442|239537": ["The \ufb01sheye e\ufb00ect is a popular technique for visualizing large graphs(Herman, Melan\u00b8con & Marshall 2000)."]} +{"9982808|239537": ["The visual presentation of graphs has been studied intensively in the Graph Drawing [4] and Information Visualization [16] communities .", "Providing both detailed information as well as a global context in one image is one of the fundamental problems in Information Visualization .", "The visual presentation of graphs has been studied intensively in the Graph Drawing [4] and Information Visualization [16] communities."]} +{"13153014|239537": []} +{"1030487|239537": []} +{"16474498|239537": ["1 Graph Visualization Techniques Researchers have devised a variety of visualization techniques for networks [18]."]} diff --git a/edge/graph_1872858.jsonl b/edge/graph_1872858.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18730921.jsonl b/edge/graph_18730921.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18733947.jsonl b/edge/graph_18733947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc0e930dd151c604a78b0b2572da8e58f8af7e45 --- /dev/null +++ b/edge/graph_18733947.jsonl @@ -0,0 +1,2 @@ +{"19992556|6923178": ["As KnotSeeker is designed for detecting pseudoknots in primary RNA sequences, we report sensitivity and specificity only for pseudoknotted base pairs using the following notation as in Baldi et al. (2000): number of incorrectly predicted base pairs in the predicted pseudoknot."]} +{"10432471|6923178": ["Following Baldi et al. (2000), sensitivity is defined as \u00eaO a and specificity is defined as \u00eaZ !", "Following Baldi et al. (2000), sensitivity is defined as T P/EP , and specificity is defined as T P/(T P + FP)."]} diff --git a/edge/graph_18735034.jsonl b/edge/graph_18735034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f3902730fa3b3e235f498268f7ce4b25c8a133c --- /dev/null +++ b/edge/graph_18735034.jsonl @@ -0,0 +1,3 @@ +{"11313211|8909218": ["In addition, such schemes requiring frequency planning cannot be applied to the emerging femtocellular networks [13], as femtocells will be placed at the end user locations in an ad hoc manner making any prior frequency planning difficult."]} +{"109453770|14889616": ["For the Scalable Video Coding (SVC) extension (ITU-T 2007; Schwarz and Marpe 2007) of the advanced video coding (AVC) standard H."]} +{"109453770|41035405": []} diff --git a/edge/graph_18740719.jsonl b/edge/graph_18740719.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18743705.jsonl b/edge/graph_18743705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18744521.jsonl b/edge/graph_18744521.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08ed47d86e827a7709df1275b0b2c462b9913382 --- /dev/null +++ b/edge/graph_18744521.jsonl @@ -0,0 +1,5 @@ +{"12557149|8584223": ["The classifiers in the system generally should produce accurate results but show some differences in classification accuracy (Du et al., 2012).", "\u2026OBIA, machine learning algorithms, and ensemble analysis have been extensively applied in terrestrial remote sensing studies (Waske et al., 2009; Zhang, 2010; Blaschke, 2010; Du et al., 2012), but a combination of these techniques for habitat characterization in aquatic environments are limited.", "Data fusion, OBIA, machine learning algorithms, and ensemble analysis have been extensively applied in terrestrial remote sensing studies (Waske et al., 2009; Zhang, 2010; Blaschke, 2010; Du et al., 2012), but a combination of these techniques for habitat characterization in aquatic environments are limited."]} +{"11176851|9010313": ["[65] compared the method developed by us [64] with the methods proposed by Hedley et al."]} +{"128764341|9010313": []} +{"131133481|9010313": ["A range of sun-glint correction models was proposed, as reviewed by Kay et al. (2009). For shallow waters researchers commonly use the method developed by Hedley et al. (2005) for sun-glint correction. In this algorithm, regression analysis is performed between NIR and visible bands first using a sample set of pixels to derive a series of regression slopes. The sun-glint corrected pixel brightness value is then calculated using the equation R0 1\u20444 Ri bi (RNIR MINNIR), where R0 is the corrected brightness values; Ri and RNIR are the original pixel visible and NIR brightness values respectively; MINNIR is the ambient NIR level which is the minimum NIR brightness value in the selected samples; and bi is the regressed slope between visible band i and NIR band. There are two assumptions in this algorithm: the brightness in the NIR is composed only of sun glint and a spatially constant \u201cambient\u201d NIR component, and the amount of sun glint in the visible bands is linearly related to the brightness in the NIR band. For this study, we derived the RNIR using the average of the brightness values covering NIR and SWIR in the AVIRIS data, which should be more robust than that of using one selected NIR channel. Similarly, the average value was used in the regression analysis to produce the regression slopes bi. Kutser et al. (2009) developed a sun glint correction method to process hyperspectral imagery. There are two assumptions in their method: 1) there is no spectral feature in a remote sensing reflectance spectrum at 760 nm; and 2) the depth of the oxygen absorption feature at 760 nm is proportional to the amount of glint in this pixel. The depth of absorption feature is calculated by D 1\u20444 [R(739) \u00fe R(860)]/2 R(760), where D is the depth of oxygen absorption and R(739), R(760), and R(860) are reflectances at these particular wavelengths. D is then normalized by taking all negative D values equal to zero and dividing the results with themaximumD value. The new water reflectance Rw is then calculated by Rw 1\u20444 R G(l) Dnorm(x, y), where R is the unglinted image, G(l) is the glint spectrum and Dnorm(x, y) is the normalized D image. We tested the algorithms developed by Hedley et al. (2005) and Kutser et al. (2009) respectively.", "A range of sun-glint correction models was proposed, as reviewed by Kay et al. (2009).", "A range of sun-glint correction models was proposed, as reviewed by Kay et al. (2009). For shallow waters researchers commonly use the method developed by Hedley et al.", "A range of sun-glint correction models was proposed, as reviewed by Kay et al. (2009). For shallow waters researchers commonly use the method developed by Hedley et al. (2005) for sun-glint correction. In this algorithm, regression analysis is performed between NIR and visible bands first using a sample set of pixels to derive a series of regression slopes. The sun-glint corrected pixel brightness value is then calculated using the equation R0 1\u20444 Ri bi (RNIR MINNIR), where R0 is the corrected brightness values; Ri and RNIR are the original pixel visible and NIR brightness values respectively; MINNIR is the ambient NIR level which is the minimum NIR brightness value in the selected samples; and bi is the regressed slope between visible band i and NIR band. There are two assumptions in this algorithm: the brightness in the NIR is composed only of sun glint and a spatially constant \u201cambient\u201d NIR component, and the amount of sun glint in the visible bands is linearly related to the brightness in the NIR band. For this study, we derived the RNIR using the average of the brightness values covering NIR and SWIR in the AVIRIS data, which should be more robust than that of using one selected NIR channel. Similarly, the average value was used in the regression analysis to produce the regression slopes bi. Kutser et al. (2009) developed a sun glint correction method to process hyperspectral imagery.", "A range of sun-glint correction models was proposed, as reviewed by Kay et al. (2009). For shallow waters researchers commonly use the method developed by Hedley et al. (2005) for sun-glint correction. In this algorithm, regression analysis is performed between NIR and visible bands first using a sample set of pixels to derive a series of regression slopes. The sun-glint corrected pixel brightness value is then calculated using the equation R0 1\u20444 Ri bi (RNIR MINNIR), where R0 is the corrected brightness values; Ri and RNIR are the original pixel visible and NIR brightness values respectively; MINNIR is the ambient NIR level which is the minimum NIR brightness value in the selected samples; and bi is the regressed slope between visible band i and NIR band. There are two assumptions in this algorithm: the brightness in the NIR is composed only of sun glint and a spatially constant \u201cambient\u201d NIR component, and the amount of sun glint in the visible bands is linearly related to the brightness in the NIR band. For this study, we derived the RNIR using the average of the brightness values covering NIR and SWIR in the AVIRIS data, which should be more robust than that of using one selected NIR channel. Similarly, the average value was used in the regression analysis to produce the regression slopes bi. Kutser et al. (2009) developed a sun glint correction method to process hyperspectral imagery. There are two assumptions in their method: 1) there is no spectral feature in a remote sensing reflectance spectrum at 760 nm; and 2) the depth of the oxygen absorption feature at 760 nm is proportional to the amount of glint in this pixel. The depth of absorption feature is calculated by D 1\u20444 [R(739) \u00fe R(860)]/2 R(760), where D is the depth of oxygen absorption and R(739), R(760), and R(860) are reflectances at these particular wavelengths. D is then normalized by taking all negative D values equal to zero and dividing the results with themaximumD value. The new water reflectance Rw is then calculated by Rw 1\u20444 R G(l) Dnorm(x, y), where R is the unglinted image, G(l) is the glint spectrum and Dnorm(x, y) is the normalized D image. We tested the algorithms developed by Hedley et al. (2005) and Kutser et al.", "A range of sun-glint correction models was proposed, as reviewed by Kay et al. (2009). For shallow waters researchers commonly use the method developed by Hedley et al. (2005) for sun-glint correction."]} +{"2146147|9010313": []} diff --git a/edge/graph_18746083.jsonl b/edge/graph_18746083.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4ecbe59864ee8c867db5f2fe0dcdcb706e340eb --- /dev/null +++ b/edge/graph_18746083.jsonl @@ -0,0 +1,11 @@ +{"121954826|17438822": []} +{"14076895|8530790": ["Scha er's functions F1, F2, and F3, and Fonseca's f1 [6], renamed here as F4.", "Four of the test problems have been used by several researchers previously ([2, 11, 10, 6, 19]), and the fth is a new problem devised by us as a further hard challenge to nd diverse Pareto optima.", "1 Introduction Multiobjective optimisation using genetic algorithms has been investigated by many authors in recent years [2, 6, 7, 10, 11, 17, 19, 20]."]} +{"34922415|17438822": []} +{"15640559|8530790": ["Given the results of 20 or more trial runs for each algorithm, we compare the performance of two or more multiobjective optimisers using a method proposed originally by Fonseca and Fleming (1995a) which we have implemented with certain extensions.", "\u2026NDS on a variety of benchmark problems, while various other modern MOEAs exist which have been shown to perform well on particular applications (eg: Fonseca and Fleming, 1995; Parks and Miller, 1998), but have not yet been systematically compared against other modern MOEAs on a common set of test\u2026"]} +{"13168458|8530790": ["[6], Fonseca and Fleming [7], [8], Murata and Ishibuchi [9], and Tamakiet al."]} +{"205130347|17438822": []} +{"60610459|11810221": []} +{"15123521|17438822": []} +{"13997318|8530790": []} +{"7743767|17438822": ["A survey of multicriteria scheduling problems is provided by T\u2019kindt and Billaut (2001)."]} +{"17367491|8530790": []} diff --git a/edge/graph_18747476.jsonl b/edge/graph_18747476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c3eff155f79323e69ec0a1e360c5b4038720c07 --- /dev/null +++ b/edge/graph_18747476.jsonl @@ -0,0 +1 @@ +{"206510948|8994149": ["In order to respond to these requirements, many process modelling notations have been developed [1], [2], [4], [6], [7], [9], [14], [15], [16], [24]."]} diff --git a/edge/graph_18748870.jsonl b/edge/graph_18748870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3b4bb9c23bf7277f60b873cfe0c33ce4245d79b --- /dev/null +++ b/edge/graph_18748870.jsonl @@ -0,0 +1,2 @@ +{"62593626|33286487": []} +{"2879330|1123458": ["This is related to the so-called S -lemma (or S -procedure) in control (e.g., Boyd et al. [40], P\u00b4olik and Terlaky [119]): The S -lemma essentially gives the boundary between what we can solve exactly, and where solving the subproblem becomes di\ufb03cult."]} diff --git a/edge/graph_1874975.jsonl b/edge/graph_1874975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41a095f2016f809607d67e6e56aba42ba6988e10 --- /dev/null +++ b/edge/graph_1874975.jsonl @@ -0,0 +1 @@ +{"11149662|2835258": ["While several proposals for location services have recently been made in the literature [12], in this paper we make use of a very simple reactive location service (RLS) described in Section 3."]} diff --git a/edge/graph_18750069.jsonl b/edge/graph_18750069.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18750590.jsonl b/edge/graph_18750590.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f2bfdffffabaf13a1ee2f2beff9f3963ce86349 --- /dev/null +++ b/edge/graph_18750590.jsonl @@ -0,0 +1,38 @@ +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"33113908|16683210": ["Uniqueness of a solution satisfying \u03b1-standardness for two-player games and consistency also follows from Yanovskaya and Driessen (2002) who show uniqueness of a solution satisfying \u03b1-standardness for two-player games and a general reduced game consistency where, similar to the above mentioned generalization of Hart and Mas-Colell\u2019s reduced game, parameters also enter the reduced game.", "The CIS-value given by CISi(N, v) = v({i}) + v(N)\u2212 \u2211 j\u2208N v({j}) n for all i \u2208 N (see Driessen and Funaki (1991)) satisfies the axioms of Theorem 4."]} +{"7513062|16237860": ["We refer the readers to a recent survey on broadband pricing models presented in [16], that classi-"]} +{"18504435|816774": ["Instead, with the market-oriented allocation policy, supply and demand of cloud resources will spontaneously converge at an equilibrium state after a series of market adjustments caused by economic incentives for both sides [7]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"13485295|17474643": ["Figure 1 depicts the assumed cloud federation context involving m cloud infrastructure providers cooperating in a peer-to-peer inter-cloud fashion as in [13]."]} +{"13433189|47147736": ["In the ATM ABR context the primary concern has been to develop algorithms which adapt quickly to congestion while trying to be fair in a so-called sense [5], [13], [16]."]} +{"13809820|7774517": ["runs an outlier detection algorithm [28] to detect possibly altered data so that trustworthiness of the"]} +{"7320605|1756215": ["[6] had proposed a taxonomy which divides current existing typical game theory approaches for WSN security into four categories: preventing DoS attacks, intrusion detection, strengthening security, and coexistence with malicious sensor nodes.", "A relatively smaller portion of the contributions in this area has been summarized in [5,6].", "[6] summarized 30 publications of the existing game theoretical approaches that are designed to strengthen WSN security."]} +{"7108394|2018781": ["Analyse all papers that address scalability In the realm of software engineering, both [56] and [39] agree that electronic sources are sufficient in the domain of software engineering.", "1 Threats to Validity Like Gu and Lago[39], we use the suggestion in Perry[81] to explicitly state the threats to validity that accompany any empirical study: (a) construct validity (b) internal validity (c) external validity."]} +{"7108394|38476": ["The Sliding Window technique [30] is a sampling technique to allow the learning algorithm to view the same dataset from different sample perspectives."]} +{"17589061|1230643": ["As mentioned in [7] , the positioning facility is included in each smart node."]} +{"4269723|2535224": ["At the present, wireless and wired networks uphold diversity and heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional networks.", "\u2026heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional\u2026"]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"13368970|17474643": ["The corresponding author is Prof. Eui-Nam Huh."]} +{"7637161|2623404": ["INTRODUCTION Software defined networking (SDN) is an emerging technology which separates the forwarding functions from control functions and enables network-wide programmability [1], [2], [3]."]} +{"29627628|16514036": ["M-health applications will also benefit from the integration of more sophisticated body area network systems [24] that provide improved real-time sensing capability of health parameters."]} +{"29627628|13785718": ["Many of the recently proposed mobile cloud security frameworks tend to offload the security/privacy related tasks to the cloud [8]."]} +{"19500781|7774517": ["Once the sensing data are obtained through the social networking service, for each task, TSCM runs an outlier detection algorithm [13] in order to detect altered sensing data and the corresponding participant."]} +{"8317730|10559330": ["In fact, the Integrated Services (IntServ) architecture [5], one of the earliest architectures developed for providing QoS guarantees in networks, defines a reservation protocol, RSVP [6], to reserve a fixed amount of bandwidth for an application or flow.", "The heuristic will finally reject request r3, as the starting time slot [4, 5) does not have bandwidth to allocate even the minimum bandwidth b(3)m = 2 units."]} +{"5183920|7774517": ["Upon receiving each sensor reading, the cloud platform runs an outlier detection algorithm [14]."]} +{"14186058|14697846": []} +{"14186058|10559330": ["Fankhauser et al. [47] proposed a RSVP-based accounting and charging protocol which is applicable to IntServ architecture.", "3) DiffServ-based service pricing: As RSVP-based IntServ architecture has high complexity and less scalability, Differentiated Services (DiffServ[16]) architecture is then proposed by IETF.", "Then, the proposed IntServ architecture [15] guarantees applications\u2019 QoS by perflow resource reservation, and DiffServ [16] modifies the\nar X\niv :1\n10 4.", "The improved IntServ and the corresponding pricing models are also under research.", "In contrast, this section will describe an Integrated Service (IntServ [13]) mechanism, which achieves QoS guarantee based on resource reservation.", "Proactively setting QoS levels of flows for simple QoS control (priority-based QoS mechanism [13][14]) and designing network architecture to ensure QoS (such as IntServ [15] and DiffServ [16]) have also been studied extensively.", "Therefore, the realization of IntServ with QoS guarantee is not common, and only few applications exist.", "In contrast, this section will describe\n8 Integrated Service (IntServ [15]) mechanism, which achieves QoS guarantee from the perspective of resource reservation.", "And for the latter, we introduce the pricing mechanisms proposed mainly within the scope of pricing, which serve two service architectures named IntServ and DiffServ.", "With progressive development of various network service types, QoS guaranteed network architectures (such as IntServ and DiffServ) are gradually studied in recent years, followed by corresponding pricing models.", "For example, IntServ [13] guarantees QoS per-flow resource reservation, and DiffServ [14] modifies IntServ architecture by adding priorities based on aggregated flow.", "Indeed, combining IntServ\n10\n(in edge network) with DiffServ (in core network) to provide differentiated services can have low complexity and improve efficiency with a certain degree of QoS guarantee.", "Especially for IntServ pricing, as QoS is guaranteed based on resource reservations where the service mechanism itself is complex, the corresponding ricing process can be even difficult with higher complexity.", "Then, with the development of QoS-awared applications, various in-depth studies regarding network architecture based on resource reservation [13] and flow aggregation [14] were conducted.", "2) IntServ-based service pricing: In best-effort network and simple priority-based service network, QoS is not guaranteed.", "[7]\nIntServ architecture using priorities based on aggregated flow control.", "IntServ bases on end-to-end Resource Reservation Protocol (RSVP [17]) to reserve resources for each flow."]} +{"14186058|3994942": [", passively congestion control [7\u20139] and traffic engineering [10]."]} +{"18269245|17474643": ["present basic taxonomies for inter-cloud architecture [12]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"22751338|11735843": ["Furthermore, a complete SDN solution for W-PANs, named Software Defined Wireless Network (SDWN), is introduced and a prototype implementation is described.", "These advantages are attractive in any networking context and, thus, also in infrastructure-less wireless networks, such\n978-1-4673-8167-3/15/$31.00 \u00a92015 IEEE\nas wireless personal area networks (W-PANs).", "Then, we present a complete solution that can be defined to support the SDN in W-PANs.", "In the following we provide a list of some relevant requirements that must be considered in the definition of an SDN solution for W-PANs [3], [5].", "However, to the best of our knowledge little effort has been devoted so far to the understanding of the advantages and problems which will be encountered extending the SDN approach to infrastructure-less wireless networking scenarios such as wireless personal area networks (W-PAN) [9].", "In fact, a major objective of this paper is to analyze (i) what are the advantages of SDN in infrastructureless wireless networking environments such as wireless personal area networks (W-PANs), and (ii) what are the requirements that must be satisfied to apply SDN in W-PANs.", "Peer compatibility, i.e., compatibility with wired SDN solutions, is also important as it would enable the integration of the resulting new family of software-defined W-PANs in a heterogeneous SDN network.", "In Section II we describe the advantages of SDN in infrastructure-less wireless networks, while in Section III we discuss the requirements to be considered when applying the SDN paradigm to W-PANs.", "However, the support of IEEE 802.15.4 is not sufficient to guarantee that two W-PAN nodes can interact with each other.", "In W-PANs communications are characterized by low transmission rates, usually, and thus velocity is not a major requirement.", "This is required to enable new nodes to operate in existing W-PANs (backward compatibility).", "In W-PANs the separation between the network control and management functionality and the forwarding operations offers a further advantage as discussed below.", "In many W-PAN scenarios data circulating in the network is highly spatially and temporally correlated."]} +{"22751338|205286988": ["Instead, analysis of the literature in the field of wireless sensor (and actor) networks suggests that higher flexibility is required [2], [1]."]} +{"11490057|17109970": ["The use of game theory has proliferated recently with a wide range of applications in wireless networks [20], [21], such as resource allocation [22]\u2013[24], power control [25]\u2013[27], routing [25]\u2013[30], and spectrum trading [31]."]} +{"62099173|6607209": ["The reasons are two-fold: multi-agent systems are typical complex and distributed, and agents are combined together as an overarching framework for integrated tasks [19]."]} +{"37925315|12681089": []} +{"23250087|7774517": ["A non-positive (inaccurate) reading is detected by running an outlier detection algorithm [15] once all sensor readings are collected at the end of the auction."]} diff --git a/edge/graph_1876323.jsonl b/edge/graph_1876323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18764924.jsonl b/edge/graph_18764924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b526fc1ad3cdf57b3d498c94ac34bc9de2e9296d --- /dev/null +++ b/edge/graph_18764924.jsonl @@ -0,0 +1 @@ +{"206025478|2843620": []} diff --git a/edge/graph_18765180.jsonl b/edge/graph_18765180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18765930.jsonl b/edge/graph_18765930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18767363.jsonl b/edge/graph_18767363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d119ca5a29cd2174e1eb2f9c5ebdbf6d0f4fcaf4 --- /dev/null +++ b/edge/graph_18767363.jsonl @@ -0,0 +1 @@ +{"25091320|206051485": []} diff --git a/graph_1876898.jsonl b/edge/graph_1876898.jsonl similarity index 100% rename from graph_1876898.jsonl rename to edge/graph_1876898.jsonl diff --git a/graph_1877246.jsonl b/edge/graph_1877246.jsonl similarity index 100% rename from graph_1877246.jsonl rename to edge/graph_1877246.jsonl diff --git a/edge/graph_187735928.jsonl b/edge/graph_187735928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1877442.jsonl b/edge/graph_1877442.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18782652.jsonl b/edge/graph_18782652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18783272.jsonl b/edge/graph_18783272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16344b2604a570731b48ae4849b072044fb46099 --- /dev/null +++ b/edge/graph_18783272.jsonl @@ -0,0 +1,3 @@ +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} diff --git a/edge/graph_18786357.jsonl b/edge/graph_18786357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16a9d5e39a7675985e7a09f5201b47f0c662435e --- /dev/null +++ b/edge/graph_18786357.jsonl @@ -0,0 +1,4 @@ +{"10352718|99485": ["The all-different constraint can be implemented by multiple propagation algorithms of different strengths and costs [138]."]} +{"10352718|282697": ["For example, list scheduling [119] (the most popular heuristic algorithm for instruction scheduling) chooses one instruction to be scheduled at a time without ever reconsidering a choice.", "It serves as a complement to available surveys of register allocation [80,107,112,116,118], instruction scheduling [3,38,60,119,123], and integrated code generation [85], whose focus tends to be on heuristic approaches."]} +{"14466552|282697": ["LLVM solves register allocation and local instruction scheduling by priority-based coloring [6] and list scheduling [16].", "tional list scheduling [16] issues operations as early as possible under the implicit assumption that this yields compact schedules."]} +{"14982989|282697": ["F-38019 Grenoble benoit.dupont-de-dinechin@st.com\nThe resource-constrained modulo scheduling problem is motivated by the 1-periodic cyclic instruction scheduling problems that are solved by compilers when optimizing inner loops for instructionlevel parallel processors."]} diff --git a/edge/graph_18792909.jsonl b/edge/graph_18792909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be95059e6936a5946a60a14bbcf2a994b616c6a4 --- /dev/null +++ b/edge/graph_18792909.jsonl @@ -0,0 +1,2 @@ +{"10678200|191396": ["Surveys of clustering with coverage also of hierarchical clustering include Gordon (1981), March (1983), Jain and Dubes (1988), Gordon (1987), Mirkin (1996), Jain, Murty and Flynn (1999), and Xu and Wunsch (2005)."]} +{"207321944|12894036": ["[24])."]} diff --git a/edge/graph_18794279.jsonl b/edge/graph_18794279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f15865d6745101bb220db26e38aac3c35c983391 --- /dev/null +++ b/edge/graph_18794279.jsonl @@ -0,0 +1 @@ +{"1867804|206507518": []} diff --git a/edge/graph_18795064.jsonl b/edge/graph_18795064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69ff59b401e26a5ae0dd186d49280edc1af233f3 --- /dev/null +++ b/edge/graph_18795064.jsonl @@ -0,0 +1,4 @@ +{"7071177|6952653": []} +{"46249249|6952653": []} +{"5179978|70923": []} +{"709518|6952653": []} diff --git a/edge/graph_18799982.jsonl b/edge/graph_18799982.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18801114.jsonl b/edge/graph_18801114.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb1437745c6ea21d672b45d8ce7dd147359a763f --- /dev/null +++ b/edge/graph_18801114.jsonl @@ -0,0 +1,29 @@ +{"16952027|2509135": ["Recent work mainly focuses on further sophistication of these basic techniques with an aim to make sensing results more robust and accurate at the same time [16,18]."]} +{"16952027|10908575": ["Local spectrum sensing at CR [15],[16]."]} +{"16952027|12601073": ["Covariance based detection exploits the inherent correlation in received PU signal samples resulting from the time dispersive nature of wireless channel and oversampling of received signal [50]."]} +{"11846571|28210515": ["11a, which is based on hybrid channel access time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA) [5].", "The shared timeslot or CSMA/CAmode is supported in ISA100.", "11a readopts the CSMA/CA mechanism of the original IEEE 802.15.4 combined with the TDMA-MAC scheme for contention and deterministic transmission purposes, respectively [6].", "However, all of the previousworks have considered only the general form of IEEE 802.15.4, which is based on the CSMA/CA method, under single-channel operation."]} +{"11345305|1230643": ["Moreover, its self-configure, self-organizing characteristics make the wireless sensor networks robust and ideal for hazardous plant and high-assets protection applications [2]."]} +{"16721059|12452682": []} +{"27525950|10859599": []} +{"14897482|11720829": ["Recent multiple-input, multiple-output (MIMO) techniques [143], [144] like the upcoming IEEE 802."]} +{"14897482|1387401": ["In realistic environments the wireless channel suffers from phenomena like path loss and shadowing, multipath propagation and thermal noise [132]\u2013[134]."]} +{"14897482|1230643": ["Wireless sensor networks (WSN) [55], [56], [30], [57], [58], [59], [60] consist of a large number of small, energy- and resource-constrained sensor nodes."]} +{"3250170|12452682": []} +{"1593146|6809492": ["An excellent overview of the classical and recent developments in FPGA technology, focusing on industrial control system applications, has been published [27].", "The increasing performance and cost reduction of fieldprogrammable gate array (FPGA) technology [24]\u2013[27] have made it applicable for power supply applications [28], [29]."]} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"3178691|18956392": ["[10]."]} +{"3178691|6959212": ["In general, sensor nodes have limited battery energy supply [11].", "monitoring and diagnostic systems [1], [4], [9], [11], [19], [30].", "reliable communication capabilities of the deployed WSNs [11], [13].", "system reliability and efficiency by optimizing the management of electric power systems [11], [13].", "online energy consumption of the customers [20] and for asset protection through advanced remote monitoring [11], [23].", ", accidents in the electric power systems, it is important to receive the data at the controller node in a timely manner [11].", "become essential to maintain safety, reliability, efficiency, and uptime of the smart grid [11], [13], [19], [30].", "in a remote and online manner [11], [12], [18], [24], [27].", "These harsh environmental conditions and dynamic network topologies may cause a portion of sensor nodes to malfunction or render the information they gather obsolete [11]."]} +{"3178691|1230643": ["monitoring and diagnostic systems [1], [4], [9], [11], [19], [30]."]} +{"7357157|12452682": ["DYNAMIC SPECTRUM SHARING (DyS2) [1], [2] is a new technique to raise the utilization ratio of frequency spectrum on the system level and is also an important application of cognitive radio (CR) [3], [4]."]} +{"15344849|485843": ["smart grid applications are described in detail in [11] along with their diverse QoS requirements.", "However, the smart grid applications can have different quality-of-service (QoS) requirements and specifications in terms of reliability and communication delay [12], [11], [21].", "TABLE I SMART GRID APPLICATIONS AND THEIR QOS SPECIFICATIONS [11]"]} +{"12694865|2509135": ["The spectrum sharing techniques described in [3], [4]."]} +{"8974063|8443371": ["For a detailed comparison of different CR platforms see [88], where five different platforms are discussed and compared: the Universal Software Radio Peripheral (USRP) hardware [89] and GNU Radio software [90] platform; the Wireless Open Access Research Platform (WARP); the OpenAirInterface."]} +{"8974063|5621151": ["In the absence of signalling between PUs and SUs, spectrum holes may be identified by performing direct spectrum sensing, using geo-location databases, beaconing techniques, or by combining spectrum sensing with geo-location database information [7], [12].", "TVWS refers to large portions of RF spectrum, in the very high frequency (VHF) and ultra high frequency (UHF) bands, that will become vacant after the switch-over from analogue to digital TV [7].", "22 standard would be in sparsely populated rural areas [7]."]} +{"15258593|6959212": ["Notifications of any possible problems can then be sent to plant personnel or instructions can be relayed back to the senor nodes to activate on board actuators in a certain way if equipped."]} +{"39528528|12452682": ["Indeed, a lot of research is focusing on the design and evaluation of dynamic spectrum access (DSA) techniques [1],"]} +{"6820964|6959212": []} +{"8034286|8909218": []} +{"14933559|5621151": ["TP-CRAHN [9] is a protocol designed for use within ad hoc CRNs.", "V. RELATED WORK\nResearchers have only recently started to lay down the requirements for CRNs [6], [7] and novel platforms e.g. [8] are being developed for advanced research in software defined cognitive radios.", "TCPE [10] protocol is designed for heterogeneous networks involving CRNs and the wired Internet.", "Researchers have only recently started to lay down the requirements for CRNs [6], [7] and novel platforms e.", "Development of transport layer protocols for CRNs is largely an un-explored area with a few exceptions.", "Majority of the research efforts in CRNs have been directed towards the Physical (PHY) and Medium Access (MAC) layers of the protocol stack while the upper layers, especially the transport layer, have not received that much attention.", "Some typical results from the simulation of our proposed solutions are given in Section IV, Section V presents related work in the transport layer for CRNs and Section VI concludes the paper.", "Our simulation study presented in section IV, clearly\nshows the significant impact of CRN\u2019s fine sensing on the performance of TCP communication."]} diff --git a/edge/graph_18803401.jsonl b/edge/graph_18803401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9dc3a5ab5c96205853ffea6909e47e4705e49bcd --- /dev/null +++ b/edge/graph_18803401.jsonl @@ -0,0 +1,17 @@ +{"12755|7185733": ["The four specific timestamps, illustrated in Figure 2, correspond to the three phases of a gesture as described in previous research on hand gesture [25]."]} +{"10270124|1634674": ["The long history of automatically recognising gestures from visual or kinematic measurements is reviewed in [23] [32] [31] [2].", "The problems of detecting and recognizing gestures from human body movements captured using videos or 3D skeletal data have been extensively studied in the computer vision and machine learning communities [2, 31, 32, 23]."]} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"2557576|18440098": ["With respect to recognition of signs and sign languages, a number of approaches have been proposed in the literature (see [39] for a recent review)."]} diff --git a/edge/graph_18812309.jsonl b/edge/graph_18812309.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8decad39060d5923129eb94ec75e91ed2871367a --- /dev/null +++ b/edge/graph_18812309.jsonl @@ -0,0 +1 @@ +{"15919755|534755": []} diff --git a/edge/graph_18814424.jsonl b/edge/graph_18814424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c81b91aaefda908c3b821d6396f4da3327894d8 --- /dev/null +++ b/edge/graph_18814424.jsonl @@ -0,0 +1 @@ +{"7573254|1040974": [", [100], [101], [119], [135], [139], [153], [155], [198], [200]), this one discusses a wide range of current research issues in light of results obtained from a survey and evaluation project conducted by Mitre [26], [27], [112]."]} diff --git a/edge/graph_18815111.jsonl b/edge/graph_18815111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2e6c9a2dfbaf5accb9f34df1b2a4abd3df8f29c --- /dev/null +++ b/edge/graph_18815111.jsonl @@ -0,0 +1,2 @@ +{"6521999|14697846": ["However, P2P can be applied to many domains beyond data sharing, such as distributed computation, communication and collaboration between peer computers, and Internet service support [7].", "There exist three classes of P2P overlay networks with different degrees of centralization: purely decentralized, partially centralized, and hybrid decentralized [7]."]} +{"11302152|1236072": ["Finally, several user-oriented attributes, including fairness, latency, throughput and enhanced data querying schemes (i.e., time-driven [ 4 ] or query-driven) need to be taken into account even if they could be considered secondary with respect to our application purposes, as a WSN usually trades off performance for cost [5]."]} diff --git a/edge/graph_18821973.jsonl b/edge/graph_18821973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18825272.jsonl b/edge/graph_18825272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0d2473a3b34eedde5b6b964856f42ed29d98c7b --- /dev/null +++ b/edge/graph_18825272.jsonl @@ -0,0 +1,2 @@ +{"60240641|6952653": []} +{"8342038|1708582": []} diff --git a/edge/graph_188271027.jsonl b/edge/graph_188271027.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e21e57b676e8911607cd8d4be5f4116683db01b --- /dev/null +++ b/edge/graph_188271027.jsonl @@ -0,0 +1,6 @@ +{"11169209|393948": [", each concept is represented by many neurons; and, each neuron participates in the representation of many concepts [12, 1]), randomly selected channels may be quite powerful in theory."]} +{"15604580|1113420": ["Examples of those applications span from context-aware computing, collecting and analysing a variety of sensor signals on the device (Baldauf et al., 2007), to always-on computer vision applications (e.g. Google glasses), to speech-driven personal assistant services, such as \u201cHey, Siri.\u201d", "Examples of those applications span from context-aware computing, collecting and analysing a variety of sensor signals on the device (Baldauf et al., 2007), to always-on computer vision applications (e."]} +{"353038|17779575": ["According to our study, this duplication results in up to 25x more data volume for the input feature maps in the CONV layer, and thus diminishes the gains of FPGA acceleration considering that FPGA platforms have extremely limited bandwidth (about 10 to 20 GB/s [26]) compared to CPU/GPU platforms (up to 700GB/s [27])."]} +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"7333079|956843": ["Due to the finite number of samples, PF suffers from degeneracy and impoverishment problems when the highly likely particles replace the less likely ones [Li et al. 2014].", "PF with finite number of samples suffer from degeneracy and impoverishment problems when less likely particles are replaced by highly likely particles [24]."]} +{"13334431|3273340": ["Today numerous research and implementation efforts (Sze et al., 2017) are conducted in the area of computationally inexpensive and power-ef\ufb01cient CNN architectures and their implementation for embedded systems as well as data center deployments.", "Today numerous research and implementation efforts (Sze et al., 2017) are conducted in the area of computationally inexpensive and power-efficient CNN architectures and their implementation for embedded systems as well as data center deployments."]} diff --git a/edge/graph_188307034.jsonl b/edge/graph_188307034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b081c527ec6f5d4a7ce7905fa2608fb62031ffa1 --- /dev/null +++ b/edge/graph_188307034.jsonl @@ -0,0 +1,4 @@ +{"100256875|2135552": []} +{"61442349|562855": []} +{"61442349|1176034": []} +{"16815437|13872322": []} diff --git a/edge/graph_18836770.jsonl b/edge/graph_18836770.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2bf12a70b75389959dcf664f84a1cd8be02371e1 --- /dev/null +++ b/edge/graph_18836770.jsonl @@ -0,0 +1 @@ +{"61490384|18836770": []} diff --git a/edge/graph_188369765.jsonl b/edge/graph_188369765.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..945b5d2fd2885592acf55840f5dce9fc4d3307c4 --- /dev/null +++ b/edge/graph_188369765.jsonl @@ -0,0 +1,10 @@ +{"15546282|12068725": ["The authors in [2] define game content as all aspects of the game that affect gameplay other than non-player characters (NPCs).", "PCG can be treated as an optimization problem [2].", "This genre is an interesting application for PCG, because it has several physics constraints, which must be considered in the evaluation of the quality of the generated content.", "Despite their popularity, to the best of the authors\u2019 knowledge, this genre has not been deeply explored in the field of PCG.", "For example, PCG was used in the development of the Borderlands [4] game for the generation of a large set of different weapons.", "Although many methods are based on evolutionary algorithms, SBCPG includes all forms of heuristics and stochastic search/optimization algorithms [2].", "Such algorithms are classified as Search Based Procedural Content Generation (SBPCG) [2].", "Therefore, procedural content generation (PCG) can be used to reduce the content generation time.", "In this case, the algorithms usually learn a player\u2019s experience model, which is used to predict aspects such as challenge, frustration, fun, etc.\nPCG can be treated as an optimization problem [2].", "PCG is the automatic or semi-automatic generation of content by algorithms [3].", "Level generation is currently one of the most popular types of PCG [2].", "The memory consumption can be reduced when PCG is used online.", "PCG algorithms represent a content usually as parameters or seeds [2] and, besides reducing the time spent for content generation, they can also reduce memory consumption and support personalized contents in games [3]."]} +{"40846237|12068725": ["In the context of learning games, procedural content generation (PCG) can alleviate the manual creation of game content, specially when considering that personalized learning may require content that cannot be accounted for at design time [11, 31].", "A common approach in PCG for related problems is to use stochastic algorithms that generate puzzles and then evaluate and check wether the generated puzzles satisfy the desired constrains [14, 31].", "For example, most search-based and generate-and-test approaches require evaluation or heuristic functions [14, 30, 31]."]} +{"21979575|9316331": ["only appropriate for score-based games, and we assume that the games have perfect information (although this is not a requirement if one is willing to accept the challenges of simulating imperfect information games [13]).", "For algorithms that rely on a forward model such as Monte Carlo Tree Search (MCTS) [13], the algorithm may learn what will come in the future, even if that information is not truly available to the player at the time they need to make their decision."]} +{"6235585|12068725": ["Content generators are often designed as either directly constructive processes or generate-and-test systems [15].", "[15] identify as a major research challenge in search-based PCG (How can we avoid pathological failures? ), but provide multiple real-world examples as answers."]} +{"35197876|12068725": ["Lastly, human imagination is limited (Togelius et al. 2011), making it hard for experts to create a variety of interesting-looking puzzles that meet the target educational goals.", "Related Work There have been a lot of studies on generating game content for entertainment games (Khalifa and Fayek 2015; Togelius et al. 2011; Hendrikx et al. 2013).", "There have been a lot of studies on generating game content for entertainment games (Khalifa and Fayek 2015; Togelius et al. 2011; Hendrikx et al. 2013)."]} +{"2692844|12068725": []} +{"2028383|12068725": []} +{"7398422|12068725": ["Many projects aiming to reduce designer burden offer fully automatic generators for individual levels, often focusing on optimizing a fixed metric for the quality of the level [24]."]} +{"888663|12068725": ["Our work fits most closely in the \u201csimulation-based fitness function\u201d category of Togelius et al. (2011), but we use our simulation for determining solvability, and in our case the\nlevel generation itself requires this simulation information.", "A lot of work has been performed previously on procedural content generation (Togelius et al. 2011) and level generation for platform games, especially Super Mario Bros (Smith et al.", "Related Work A lot of work has been performed previously on procedural content generation (Togelius et al. 2011) and level generation for platform games, especially Super Mario Bros (Smith et al. 2009; 2011; Sorenson and Pasquier 2010a; Jennings-Teats, Smith, and Wardrip-Fruin 2010; Compton and\u2026"]} +{"9275298|12068725": ["Many of these have been detailed in a recent survey paper (Togelius et al. 2011)."]} diff --git a/edge/graph_18839463.jsonl b/edge/graph_18839463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18841702.jsonl b/edge/graph_18841702.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18843181.jsonl b/edge/graph_18843181.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f5e59a6f259c1e1c59a83bf294d1dc63fa5ae129 --- /dev/null +++ b/edge/graph_18843181.jsonl @@ -0,0 +1 @@ +{"16134671|26257441": ["Metamodeling has recently experienced an increasing use in applications that are computationally costly or require many runs, such as sensitivity analysis, fitness evaluations, optimization searches, and what-if studies (Simpson et al., 2001; Villa-Vialaneix et al., 2012)."]} diff --git a/edge/graph_18844334.jsonl b/edge/graph_18844334.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e6999d936c031978eb2e2cd8c1fe325083bee6f --- /dev/null +++ b/edge/graph_18844334.jsonl @@ -0,0 +1,2 @@ +{"15332996|9104850": []} +{"8099888|8914588": [", services, Grids, and SLA management [7, 4]."]} diff --git a/graph_1885014.jsonl b/edge/graph_1885014.jsonl similarity index 100% rename from graph_1885014.jsonl rename to edge/graph_1885014.jsonl diff --git a/edge/graph_18852598.jsonl b/edge/graph_18852598.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4cf09ece571b4624bf0ebfec44b4177d738caa08 --- /dev/null +++ b/edge/graph_18852598.jsonl @@ -0,0 +1,5 @@ +{"13505084|15735687": ["Business managers, researchers, and academicians in management are striving to have full-support of temporal aspects in current business process management suites [6]."]} +{"13505084|6159806": ["Few research attempts however have been made to carry the same overview of this research field (see, for instance [15,38]).", "The work presented in [15] discusses the urgent need for service composition and surveys the different existing composition strategies and points out essential research challenges."]} +{"25405306|15931066": []} +{"14559945|627405": []} +{"15735687|6159806": []} diff --git a/edge/graph_18855186.jsonl b/edge/graph_18855186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18856316.jsonl b/edge/graph_18856316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18861678.jsonl b/edge/graph_18861678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18862495.jsonl b/edge/graph_18862495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18864914.jsonl b/edge/graph_18864914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18873127.jsonl b/edge/graph_18873127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18874070.jsonl b/edge/graph_18874070.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d093449eb77a0010ea0aadcff0e3b25e3131db51 --- /dev/null +++ b/edge/graph_18874070.jsonl @@ -0,0 +1 @@ +{"16049261|50458504": ["The lack of publicly available database has been a limiting factor for the publications on financial fraud detection [14], particularly credit card transactions."]} diff --git a/edge/graph_18879624.jsonl b/edge/graph_18879624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1888038.jsonl b/edge/graph_1888038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18889901.jsonl b/edge/graph_18889901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03fc8d4da1b2f0b96fd939abcb67c0a12468416e --- /dev/null +++ b/edge/graph_18889901.jsonl @@ -0,0 +1,4 @@ +{"41765053|14970359": []} +{"1482463|8983048": ["Among all the existing surveys (Table 1), [11]\u2013[15] focus on rigid registration only."]} +{"1482463|7861381": ["We further discuss the problem of over-\ufb01tting and provides up-to-date references beyond those in existing surveys."]} +{"9765767|27637541": ["Constructing a motion tracking scheme, as a combination of joints from different Kinect-based skeleton structures, or building a new skeleton, following a weighting scheme, for known applications and activities [5] would provide an efficient framework for training expected joint positions and discarding those that are far from what would be expected."]} diff --git a/graph_18890.jsonl b/edge/graph_18890.jsonl similarity index 100% rename from graph_18890.jsonl rename to edge/graph_18890.jsonl diff --git a/edge/graph_18893856.jsonl b/edge/graph_18893856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18895475.jsonl b/edge/graph_18895475.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b6e05ff9abf31e66d0b8ba3f369368aa538f983 --- /dev/null +++ b/edge/graph_18895475.jsonl @@ -0,0 +1,5 @@ +{"10137283|9240891": ["\u2026the art, combined with examples of things to take into consideration both when modelling trust in general and building a solution for a certain phase in trust management, be it trust relationship initialization, updating trust based on experience or determining what trust should have an effect on."]} +{"167585873|17857669": []} +{"14028936|64292": ["References and reviews of this line of research can be found in Shen et al. (2006) ."]} +{"60472989|14808716": []} +{"54194454|14774186": ["Document classification process [13].", "in a statistical process a large amount of key words in order to create a relatively short vector [13]."]} diff --git a/edge/graph_18896106.jsonl b/edge/graph_18896106.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18909090.jsonl b/edge/graph_18909090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e59dd1fe0a41556f87ee6de6937e4b8237438bc --- /dev/null +++ b/edge/graph_18909090.jsonl @@ -0,0 +1 @@ +{"6571192|189201": []} diff --git a/edge/graph_1891338.jsonl b/edge/graph_1891338.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18914231.jsonl b/edge/graph_18914231.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_189201.jsonl b/edge/graph_189201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1892195.jsonl b/edge/graph_1892195.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18936504.jsonl b/edge/graph_18936504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18947741.jsonl b/edge/graph_18947741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ed90a577e89d0eefafa1072bde918eeaf08e3cd --- /dev/null +++ b/edge/graph_18947741.jsonl @@ -0,0 +1,2 @@ +{"3174463|9828770": ["We expect that models of this kind will attract much interest in the future, see works of Caldarelli et al. (2006); Ehrhardt et al. (2006); Gil and Zanette (2006); Kozma and Barrat (2007); Zanette (2007); Zimmermann et al. (2004), and the review of Gross and Blasius (2007)."]} +{"207372751|1805048": ["tering 2 framework [30]. 2 Collaborative \ufb01ltering is the process of \ufb01ltering for information or patterns using techniques involving collaboration among multiple agents, viewpoints, data sources, etc. [29] 5 Node similarity can be de\ufb01ned by using the essential attributes of nodes: two nodes are considered to be similar if they have many common features [31]. However, the attributes of nodes are general"]} diff --git a/edge/graph_18948342.jsonl b/edge/graph_18948342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..663c7cbeef60028c547b2ffadd3f557192222a62 --- /dev/null +++ b/edge/graph_18948342.jsonl @@ -0,0 +1,4 @@ +{"15030881|8777381": ["Listeners perceive multiple cues that are communicated, decode each aspect of the message, and make inferences or representations of what is being said."]} +{"7559717|7360895": ["In which case the robot\u2019s appearance would be highly disturbing, or even repulsive [8, 29]."]} +{"5733841|4361938": []} +{"13919769|8777381": ["Communicative channels such as facial expressions [21, 22], head motion [6, 37], pitch [13, 41] and short time spectral envelope [47] all present specific patterns under emotional states.", "Previous work has shown than prosodic features are also affected by emotional modulation [13, 41]."]} diff --git a/edge/graph_18953885.jsonl b/edge/graph_18953885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18956392.jsonl b/edge/graph_18956392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18248336a3803bcb6f84d88e592081b426769bba --- /dev/null +++ b/edge/graph_18956392.jsonl @@ -0,0 +1,2 @@ +{"2532274|905827": ["The second and third one list workshops, conference [6-222], and journal papers [223-365]."]} +{"26452422|905827": ["The diagnostic analysis has been reported by various researchers using the sequence components of current, radio-frequency (RF) component of neutral current, and shaft currents [4], [17],", "Different researchers have used various monitoring techniques for induction motors using different machine variables [11], [12], [17], [28], [64]\u2013[119]."]} diff --git a/graph_1895753.jsonl b/edge/graph_1895753.jsonl similarity index 100% rename from graph_1895753.jsonl rename to edge/graph_1895753.jsonl diff --git a/edge/graph_18958065.jsonl b/edge/graph_18958065.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adc6b2924eb06456a12477ea016b2db824c688eb --- /dev/null +++ b/edge/graph_18958065.jsonl @@ -0,0 +1,3 @@ +{"10553586|14022070": ["However, because it is impossible to detect all potential faults in a reasonable time, a selective test must be conducted on potential error-prone areas by applying certain test strategies such as random testing [2], regression testing [3], and pairwise testing [4].", "However, only a few empirical studies on pairwise testing exist [4, 5].", "Neverthe-less, there are only a few empirical studies on pairwise testing [4], and thus, this limits the use of pairwise testing in practice.", "[4] is developed to handle real-valued variable inputs in the testing of derived data."]} +{"18093498|14022070": ["Combinatorial techniques [1, 2] are a key concept in the test design approach supported by TOSCA.", "Different approaches for dealing with dependencies have been proposed [2]."]} +{"10121239|14022070": ["ISSTA \u201912, July 15-20, 2012, Minneapolis, MN, USA Copyright 12 ACM 978-1-4503-1454-1/12/07 ...$10.00."]} diff --git a/edge/graph_18960196.jsonl b/edge/graph_18960196.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1896164.jsonl b/edge/graph_1896164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18962630.jsonl b/edge/graph_18962630.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1896583.jsonl b/edge/graph_1896583.jsonl similarity index 100% rename from graph_1896583.jsonl rename to edge/graph_1896583.jsonl diff --git a/graph_1896632.jsonl b/edge/graph_1896632.jsonl similarity index 100% rename from graph_1896632.jsonl rename to edge/graph_1896632.jsonl diff --git a/edge/graph_18967271.jsonl b/edge/graph_18967271.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4fc399dd98b561cd6bbb38af7dff99bde2a89c18 --- /dev/null +++ b/edge/graph_18967271.jsonl @@ -0,0 +1 @@ +{"16565145|14068482": ["\u2026for Geospatial Open Source Software M\u00fcnster, Germany jirka@52north.org \n ABSTRACT In recent years, the standards of OGC s Sensor Web En\u00adablement (SWE) initiative have been applied \nin a multi\u00adtude of projects to encapsulate heterogeneous geosensors for web-based discovery, tasking \nand access."]} diff --git a/edge/graph_18969707.jsonl b/edge/graph_18969707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18970397.jsonl b/edge/graph_18970397.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..214a919e2efe5c62cd66114414aadb8abcaca481 --- /dev/null +++ b/edge/graph_18970397.jsonl @@ -0,0 +1,9 @@ +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"2523329|1230643": ["Sensor networks represent a significant improvement over traditional sensors (Akyildiz et al., 2002).", "This allows random deployment in inaccessible terrains or disaster relief operations (Akyildiz et al., 2002).", "\u2026following two ways, either far from the actual phenomenon to be monitored where large sensors using sophisticated techniques are utilized, or by utilizing several sensors with carefully engineered positions depending on the topological area of the phenomenon to be monitored (Akyildiz et al., 2002)."]} +{"43567638|1236072": []} +{"43567638|1230643": []} +{"43567638|14441987": ["Many authors have studied this problem [6,7]."]} +{"16138865|1230643": ["In another survey paper [147], the same authors outline the major applications for sensor networks, citing examples such as:"]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"42139751|1230643": []} +{"15289844|205286988": ["978-1-4244-1688-2/08/$25.00 c 2008 IEEE dissipation by a factor of 7 when compared to direct communication and by a factor between 4 and 8 when compared to the minimum transmission energy routing protocol [ 7 ]."]} diff --git a/edge/graph_18970591.jsonl b/edge/graph_18970591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18972947.jsonl b/edge/graph_18972947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e75d9f7fa16460b35ab9022cc3eee514690a83d --- /dev/null +++ b/edge/graph_18972947.jsonl @@ -0,0 +1,7 @@ +{"31866585|1230643": ["Harmonizing sensor nodes into sophisticated computation and communication infrastructure, called wireless sensor network (WSN), may have strong impact on a wide variety of sensitive applications [1-4] such as military, scientific, industrial, health and home networks."]} +{"2426770|1230643": ["As an emerging technology, wireless sensor networks (WSNs) have a wide range of potential applications [1] [2] [3], including environment monitoring, smart buildings, medical care, industry and military applications."]} +{"25576812|8618569": ["Surveys on WSN technologies for industrial automation are also available in [79], [80]."]} +{"6612503|1230643": ["As an emerging technology, wireless sensor networks (WSNs) have been designed to support a wide range of potential applications, including environment monitoring, event detection as well as information collection [1][2][14]."]} +{"44368756|1230643": ["Wireless sensor networks (WSNs) [1] are an emerging technology that has been a growing success in the scientific and industrial communities."]} +{"31717472|41998167": []} +{"31717472|1230643": ["Various aspects of MAC protocols for WSNs are discussed in several surveys [1-2, 6-12].", "Wireless Sensor Networks (WSNs) [1] consist of resource constrained devices, called sensor node, that communicate wirelessly in a multihop nature."]} diff --git a/edge/graph_18973234.jsonl b/edge/graph_18973234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18973396.jsonl b/edge/graph_18973396.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5dfa3f69c1ccb4d950ed63ff6dd0829de5b67045 --- /dev/null +++ b/edge/graph_18973396.jsonl @@ -0,0 +1,9 @@ +{"12884614|1805048": ["2) To reuse this crowd-sourced evaluation knowledge to recommend to the user that they may use a certain configuration in a certain context according to the collective evaluation of other users or similar users in similar contexts in a way similar to collaborative filtering [6, 18]."]} +{"29174384|205435103": []} +{"5266515|205435103": ["Motivation is a topic that has received considerable attention in the software engineering research field, given that it is reported to be a major factor in project success [6, 11]."]} +{"18683243|27650400": ["We still need to investigate and devise systematic approaches when designing feedback requests [20] and aid developers with proper tools."]} +{"15368430|27650400": []} +{"9376941|206778272": ["In the context of professional programmers, refactoring has received considerable attention [22], but the focus on refactoring for end-user programming languages is just beginning for web mashups in our previous work [1] and also for spreadsheets [23], [24]."]} +{"3241708|12715779": ["Because of the popularity of Web 2.0 technology, crowdsourcing websites attract much attentions at present [91], [90]."]} +{"207183913|17137472": ["0, to augment tools in their development environments [1]."]} +{"108206149|3241708": ["In [3] authors provide a survey on the literature of crowd sourcing, and try to categorize crowd sourcing systems in 4 different categories, according for what crowd sourcing is used for:"]} diff --git a/edge/graph_189762107.jsonl b/edge/graph_189762107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc2a93a0d42e4c882a34926fa524d52868f5c0a0 --- /dev/null +++ b/edge/graph_189762107.jsonl @@ -0,0 +1,2 @@ +{"26619090|18973396": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"26619090|3241708": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} diff --git a/edge/graph_189762507.jsonl b/edge/graph_189762507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbdd69b0381f0fdb9f503fcca11775fcfa96d299 --- /dev/null +++ b/edge/graph_189762507.jsonl @@ -0,0 +1,5 @@ +{"3451592|1114486": []} +{"166228251|7782275": ["Our proposed approach is inspired by concepts from metalearning [25], which is a field of research focusing on selfteaching ML algorithms, as well as from decision-directed adaptive filter theory, which considers the blind adaptation of adjustable filters based on some decision mechanism, see, e.", "The identification and correction of these errors can be used to retrain ViterbiNet online using meta-learning principles [25], allowing it to track channel variations.", "Our approach is based on meta-learning [25], namely, automatic learning and adaptation of DNNs, typically by acquiring training from related tasks."]} +{"51886568|4884302": ["It is worth noting that the most important property of DL is that it can automatically find compact low-dimensional representations/features of high dimensional data [5, 6], which can be demonstrated by the following two examples."]} +{"6546491|1114486": ["As polar codes are currently proposed for the 5G control channel [4], decoding algorithms for very short block lengths are of practical importance [5]."]} +{"6546491|95570": ["Besides algorithmic optimizations [7] of the existing algorithms, modifying the code structure [8] can be considered to overcome this issue.", "This leads to high decoding latency when compared to state-of-the-art low density parity check (LDPC) codes/decoders [7]."]} diff --git a/edge/graph_189762574.jsonl b/edge/graph_189762574.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6429103148d301769a97716e38bada29508a1a35 --- /dev/null +++ b/edge/graph_189762574.jsonl @@ -0,0 +1,50 @@ +{"9510200|393948": ["Patch-based training is the most commonly used approach to learn the convolutional layers\u2019 parameters by means of unsupervised criteria [50].", "Sparsity is among the properties of a good feature representation [48], [50]\u2013[53]."]} +{"14932835|12127129": []} +{"37165158|10355303": ["Visual target tracking remains as an active research topic in computer vision field as it has been widely applied in numerous applications such as security monitoring, human-computer interaction, video surveillance [23, 34, 50].", "For a comprehensive study of visual target tracking, we refer readers to the survey papers [23, 31, 34, 52], Here, we only review works related to our work, i."]} +{"13586000|10355303": ["Since our concern in this study is the analysis of decentralized strategies for tracking, we won\u2019t describe these approaches further and refer to other recent surveys [17, 5, 1].", "This model is commonly built using appearance (color, texture, gradient, spatio-temporal) or motion features [5]."]} +{"2519672|10355303": ["The signi\ufb01cant activity in the \ufb01eld over last two decades is re\ufb02ected in the abundance of review papers [1\u20139]."]} +{"2519672|17516538": []} +{"2519672|14970359": []} +{"2519672|7788290": []} +{"1762187|10355303": ["We in this section discuss the tracking methods that are most related to our work, and refer the readers to a thorough review on object tracking survey [33, 59] and benchmark evaluations [50, 58]."]} +{"30484317|7788290": [", videos captured by static cameras [1], [2]."]} +{"54602508|393948": ["Different from the traditional hand-crafted features [5], [6], [7], a multi-layer neural network architecture can ef\ufb01-ciently capture sophisticated hierarchies describing the raw H. Li is with the School of Computer and Information Engineering, Jiangxi Normal University, Jiangxi, China."]} +{"5274828|192934": ["Nevertheless, dimensionality reduction gives an effective way to avoid the curse of dimensionality [14]."]} +{"16402511|10355303": []} +{"16402511|393948": []} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"22947351|10355303": ["VISUAL object tracking is one of the fundamental problems in computer vision with numerous applications such as intelligent video surveillance, human computer interaction and autonomous driving [1], [2], [3], [4], to name a few.", "A comprehensive review on visual tracking can be found in [1], [2], [3], [4]."]} +{"3743416|1223851": ["Recent surveys on eye fixation prediction can be found in [33]\u2013[35], and salient object detection is surveyed in [36], [37]."]} +{"4568981|10355303": ["We refer readers to the excellent surveys on object tracking [28]\u2013[30]."]} +{"19882248|12724190": []} +{"49476505|10355303": ["We discuss the tracking methods that are most related to our work in this section, and refer the readers to a thorough review on object tracking survey [47] [24] and benchmark evaluations [38] [45]."]} +{"60442440|10355303": ["The significant activity in the field is also reflected in the abundance of review papers [23,43,22,29,44,65,40] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"60442440|17516538": ["The significant activity in the field is also reflected in the abundance of review papers [23,43,22,29,44,65,40] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"60442440|14970359": ["The significant activity in the field is also reflected in the abundance of review papers [23,44,22,29,45,65,41] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"60442440|7788290": []} +{"17704601|10355303": ["I. INTRODUCTION\nV ISUAL tracking is a fundamental problem in computervision with a wide range of applications."]} +{"17651798|191396": ["Based on these observations, we use hierarchical agglomerative clustering [17] on D."]} +{"29498806|10355303": []} +{"4340068|10355303": ["g has been an active research topic in computer vision. In this section, we discuss the most closely related tracking-by-detection approaches. Comprehensive reviews on object tracking can be found in [52,32,48]. 2.1 Tracking-by-Detection Tracking-by-detection methods treat object tracking in each frame as a detection problem within a local search window, and often by incrementally learning classi\ufb01ers to sep", "l 1 Introduction Object tracking is one of the fundamental problems in computer vision with numerous applications including surveillance, human-computer interaction, and autonomous vehicle navigation [52,32,48]. Given a generic target object speci\ufb01ed by a bounding box in the \ufb01rst frame, the goal of object tracking is to estimate the unknown target states, e.g., position and scale, in the subsequent frames. "]} +{"6795574|5972227": ["Recently, a survey is presented for a wired-sensor network, focusing on the capability of methods to give a simple estimation for the position of the object [23]."]} +{"6795574|18546648": ["For instance, in shadow detection [48] pixel level evaluation is advised [49]."]} +{"3710195|10355303": ["Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"3710195|17516538": ["Submitted by VOT Committee SAMF tracker is based on the idea of correlation filterbased trackers [15,27,26,5] with aim to improve the overall tracking capability.", "Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"3710195|14970359": ["Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"3710195|7788290": ["Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"206758376|10355303": []} +{"62054337|14970359": []} +{"62054337|7788290": ["Thorough reviews of human-specific trackers can be found in (Aggarwal & Cai, 1999; Gavrila, 1999; Moselund & Granum, 2001)."]} +{"28817124|1634674": []} +{"28817124|25699143": []} +{"9697357|195346070": ["Despite the vast literature on the topic [39], it still remains a challenging problem, especially in crowded environments where occlusions and false detections are common."]} +{"5648267|10355303": []} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"6564374|10355303": []} +{"394290|10355303": ["A large number of trackers have been proposed [30, 49], and the recent publication of benchmark datasets containing large numbers of sequences and standardized quantitative evaluation metrics is accelerating the pace of development in this field [24, 43, 48]."]} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} +{"13028371|10355303": ["We refer the readers to a comprehensive review on visual tracking in [33, 22, 26]."]} +{"17411046|10355303": ["arise from changes in illumination, motion blur, deformation and occlusion from surrounding objects [22]."]} diff --git a/edge/graph_18976841.jsonl b/edge/graph_18976841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18977370.jsonl b/edge/graph_18977370.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e78b4e17588bb1f04faac2047dc0e0749f609f4 --- /dev/null +++ b/edge/graph_18977370.jsonl @@ -0,0 +1 @@ +{"2542827|14441987": ["Initially a source floods a route request packet as shown in figure 7. A route reply is generated either by the destination or an intermediate node, which contains an unexpired route to a destination in its route cache [ 13 ]."]} diff --git a/edge/graph_189800561.jsonl b/edge/graph_189800561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c4799ca5390b0668b85081d3e6542956f120696 --- /dev/null +++ b/edge/graph_189800561.jsonl @@ -0,0 +1,24 @@ +{"28028672|448220": []} +{"2206177|16153186": []} +{"2206177|17205659": []} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"58539306|54557477": []} +{"58539306|51935081": []} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"8776796|25206420": ["The former still requires management of large amounts of memory 33 and is not suitable for hospital environment."]} +{"8252080|21738890": ["tating the continuous inference of social data from physical contexts [61]\u2013[65]."]} +{"8252080|26429034": ["As there are millions of users who are connected to cellular networks [88], the analysis of human interactions over these networks could also be a powerful tool for continuously", "A number of researchers have recently discussed the possibility of extracting social graph structures from data exchanged in communication networks and leveraging the knowledge inferred from the extracted social data for designing socially aware communication techniques [88]\u2013[93]."]} +{"8252080|17787193": ["environments is therefore expected to help identify the nodes in social graphs that can best be used in implicit vouching processes [90]."]} +{"8252080|1333339": ["tivity and composability [153], it has not yet been determined"]} +{"8252080|17446703": ["As adopted in [169] and based on the grading system provided in [177], [178], each reviewer was asked to provide an answer to each question in the checklist."]} +{"8252080|1669837": ["In general, previous surveys have paid significant attention to reviewing user authentication mechanisms that rely mainly on biometrics [157]\u2013[161], tokens [159], textbased passwords [145], [162], [163], graphical-based passwords [39], [145], [164]\u2013[166], or techniques that combine a"]} +{"8252080|627405": ["We utilized the guidelines presented in [175] to construct boolean search expressions to query the selected digital libraries (see Table VIII)."]} +{"8252080|9913343": ["In general, previous surveys have paid significant attention to reviewing user authentication mechanisms that rely mainly on biometrics [157]\u2013[161], tokens [159], textbased passwords [145], [162], [163], graphical-based passwords [39], [145], [164]\u2013[166], or techniques that combine a"]} +{"31102928|925507": []} +{"108397566|3628110": []} +{"108397566|3767252": []} +{"108397566|2142482": []} +{"108397566|9862516": []} +{"108397566|16209841": []} +{"108397566|15199849": []} +{"108397566|206459491": []} diff --git a/edge/graph_1898159.jsonl b/edge/graph_1898159.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_189816448.jsonl b/edge/graph_189816448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..773021e8846671c58477d5aa98287d80fc0291e9 --- /dev/null +++ b/edge/graph_189816448.jsonl @@ -0,0 +1,22 @@ +{"41973814|2295142": ["Extensive surveys of multipath routing methods in WSNs are provided in [8], [9] where the methods are categorized into six basic groups: Alternative path methods, reliability improvement methods, resource efficiency improvement methods, infrastructure-based methods, non-infrastructure based methods, and coding based methods."]} +{"20542115|485843": ["In most scenarios, electric meters are powered by the main line of the grid they monitor and, they can afford the additional resources required to route packets [11], [12]; therefore, electric smart meters are beyond the scope of this study."]} +{"20542115|5747564": ["AMI is a fundamental component of the smart grid, allowing two-way communication between electric, gas, and water meters and city utility companies [2]."]} +{"16885631|485843": ["\u2026McGill University Montreal, Canada tho.le-ngoc@mcgill.ca Quang-Dung Ho Department of Electrical \nand Computer Engineering McGill University Montreal, Canada quang.ho@mcgill.ca ABSTRACT The Smart Grid \n(SG) optimizes the existing power grid with a reliable and secure SG Communications Network."]} +{"39615469|1236072": ["Early studies in the area of sensor networks had mainly focused on more fundamental networking problems, e.g. medium access control [15], topology [16], routing [17], and energy efficiency [18], largely ignoring network performance assurances."]} +{"39615469|1230643": ["According to Akyildiz et al. [1] there are some important differences between ad-hoc and sensor networks.", "Over the last two decades, there has been an unprecedented research interest in the area of autonomous networked systems with emphasis on Wireless Sensor Networks (WSNs) [1]."]} +{"27388536|270804": ["In [4], [19], [91]\u2013[100], authors present surveys for transport layer protocols or congestion control based protocols."]} +{"27388536|1230643": ["A WSN comprises a large set of distributed nodes over a wide geographical (indoor or outdoor) area to monitor a physical or environmental event [1].", "Some typical applications of WSN includes telemedicine monitoring, intelligent transportation, home automation, factory monitoring, energy conservation, target tracking and environmental monitoring, etc [1], [12]\u2013[15]."]} +{"1792190|22380247": ["After development of RPL protocol, it has been extensively studied in the literature [14]."]} +{"37867550|13295407": []} +{"12778909|6275330": [", the nodes generate the packets for a duration randomly distributed in the range [2, 5] seconds, afterwards the nodes wait for a random duration of time distributed in the range [10, 15] seconds before generating packets again.", "For 3 and 4 sinks, the packet generation distributions change to [2, 5] packets/sec and [2, 6] packets/second respectively.", ", environment monitoring, surveillance, traffic monitoring, industrial process control, home automation, and assisted living, using sensors of many different types [1], [2]."]} +{"29456483|13454399": ["Considerable research efforts [10, 11] are carried out on non-RPL based reactive routing protocols especially for WSNs."]} +{"29456483|2295142": ["Considerable research efforts [10, 11] are carried out on non-RPL based reactive routing protocols especially for WSNs."]} +{"52258891|22380247": ["Contiki\u2019s sys-tem design is relatively inefficient but is widely used [17, 52] with implementations of more recent network protocols [24, 27, 29, 32], a COOJA simulator [73], and active maintenance [5].", "For example, it has been common that an implementation of a low-power Internet protocol standard (e.g., 6LoWPAN, RPL, and embedded TCP) supports only a subset of the whole standard due to resource constraints, making it not interoperable with reasonable performance [13, 52, 58]."]} +{"17036426|485843": ["L and lossy networks (LLNs) comprised of thousands of embedded networking devices can be used in a variety of applications including smart grid automated metering infrastructures (AMIs) [1]\u2013[4], smart city management, home and building automation, wireless sensor networks, and the newly proposed concept of Industry-4."]} +{"17036426|5747564": ["That is, industrial LLN solutions will adopt well-tested standard Internet protocols for scalability, compatibility, security, and development cost reasons [6], [8]."]} +{"6572927|270804": ["On the other hand, [23] covers a larger set of congestion control approaches, while providing differentiation based on congestion detection, congestion notification, and congestion mitigation mechanisms.", "2320071 gestion control as part of transport protocols [23], [24]."]} +{"15685653|2295142": ["Multipath routing has been widely used in the literature to improve the fault-tolerance (reliability), to balance the load (congestion avoidance), or for QoS improvement [4].", "In this paper, we use existing concepts like multipath communication [4], load balancing, and energy-aware path selection, to present a complete and pragmatic solution."]} +{"53638569|22380247": ["Some recent studies such as [18] and [77] propose removing this feature from the protocol but, while this may overcome", "[18] introduced a survey that presents the history of research efforts in RPL from 2012 to 2016."]} +{"53638569|2295142": ["Multi-path routing techniques are highly desirable in LLN environments as they have been proven to provide a wide spectrum of benefits such as improving fault-tolerance, enhancing reliability, minimizing congestion, increasing network capacity (bandwidth aggregation) and improving QoS [126] .", "plexity makes them unsuitable for the resource-constrained LLN devices [126].", "However, multi-path routing techniques do have their own disadvantages that should be considered carefully when designing routing primitives for LLNs [126], [127]."]} +{"53638569|1236072": ["3) Routing Discovery and Maintenance Key Challenges: In general, there are two routing discovery maintenance schemes in the context of LLNs; proactive and reactive [132], [133]."]} +{"53638569|1230643": ["Reporting Model: The data communication models in LLNs vary widely, but are roughly classified into three categories, query-based, event-based, and time-based [52], [53].", "characteristics [52], [53] and, consequently, different requirements in terms of power consumption, convergence time, traffic overhead, reliability, latency or other performance met-"]} diff --git a/edge/graph_18982109.jsonl b/edge/graph_18982109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_189824047.jsonl b/edge/graph_189824047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fa564c663a43fe96558f41885c054e52e1a878b --- /dev/null +++ b/edge/graph_189824047.jsonl @@ -0,0 +1,10 @@ +{"206896936|2457428": []} +{"21329606|14098709": []} +{"54490506|3630870": []} +{"54490506|3799929": []} +{"54490506|8132405": []} +{"54490506|6562040": []} +{"54490506|1940388": []} +{"7408566|1940388": ["Again, note that data (packet) privacy [23], [64], [65] is out of scope of our paper.", "[23] for a more complete list of active attacks."]} +{"7408566|1230643": ["A WSN can consist of different types of sensors and serve different kind of applications [7]."]} +{"49191417|191396": ["As an unsupervised learning method, clustering analysis [19] has important applications in many fields, which includes machine learning, data mining, and pattern recognition and so on."]} diff --git a/edge/graph_189824166.jsonl b/edge/graph_189824166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfb750604091e7b43731a1d0c2274795a21219a7 --- /dev/null +++ b/edge/graph_189824166.jsonl @@ -0,0 +1,16 @@ +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"52914425|6746689": ["corresponding skeletons by applying the skeletonizationmethod [40]."]} +{"2088679|393948": []} +{"206592484|456491": []} +{"13980455|393948": ["This strategy is different from the dominant paradigm in recent neural network literature of unsupervised tranfer learning (see [40] for a survey covering unsupervised pre-training and represetation learning more generally)."]} +{"3879949|41505326": ["Applying CNNs on videos is challenging because traditional CNNs are designed to represent two dimensional pure spatial signals but in videos a new temporal axis is added which is essentially different from the spatial variations in images [256, 264]."]} +{"3879949|16082889": []} +{"3879949|6627566": ["Building a hierarchy of classifiers is a common strategy for image classification with a large number of classes [93]."]} +{"6846978|8953108": ["Otsu\u2019s method is used to automatically perform clustering-based image thresh\u2010 olding [18]."]} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} diff --git a/edge/graph_189824288.jsonl b/edge/graph_189824288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03cac276c7048d345e52b79cbb9225461a57872e --- /dev/null +++ b/edge/graph_189824288.jsonl @@ -0,0 +1,26 @@ +{"15012626|1708582": []} +{"53680209|6664074": ["In [26], famous IoT OSs including Contiki [130], FreeRTOS [131], RIOT [87], TinyOS [132], and OpenWSN [133] are presented under the category of open-source and closed-source (which are not available commercially).", "Moreover, classification of operating systems (OSs) for IoT is presented in [26].", "Contiki [26], [130] is an open source and flexible OS developed at the Swedish Institute of Computer Science in Sweden."]} +{"53680209|39936276": ["and data in ICN-IoTs applications. Although ICN provides authentication and access control at content level but content requests are stored in ICN intermediate routers and can be tracked by attackers [153]. Thus to maintain privacy at the router level between user and producer, privacy algorithms are required. Also, it is still not standardized to decide whether intermediate routers will be present in "]} +{"53680209|20473693": ["Through this perspective innovative applications can be developed that involves definitely information representation, data analytics, ubiquitous sensing with the help of cloud computing to form a unified network [3]-[49].", "sor web, web of things and semantic sensor networks [49]."]} +{"53680209|3348390": ["Context awareness solutions for IoT are discussed in [27]."]} +{"61810603|36400013": ["The recent surveys on trust computation and evaluation can be found in [7] and [8]."]} +{"5619646|1462862": ["A comprehensive survey and overview on trust and reputation systems can be found in [16], [22], and [28]."]} +{"52960861|39936276": ["One of the embodiments of ICN is Named Data Networking [4], [5]."]} +{"116864008|39936276": ["Naming data provides inherent support for delay-tolerant networking (handles intermittent connectivity), fast local recovery from losses, and hop-byhop congestion control unlike the Internet [10], [11].", "It can be observed that each intermediate node between S and sink is adding some extra cost because of overhead to add a PIT entry and time to search the FIB for forwarding the Ipkt(s) upward.", "FIB maintains information about the next-hops and forwards Ipkt using longest prefix match.", "Most of the research, so far, on applying ICN, contentcentric network, or NDN for developing IoT environment or applications is limited to theoretical propositions, such as, analyzing the possibilities and challenges of developing ICN/NDN-based IoT [10], [11], [22]\u2013[25], proposing a new architecture [26], [27] or a communication overlay [28], discussing the issue of information freshness in IoT in relation to NDN caching [29], exploring NDN support for reliable and effective data retrieval from multiple producers in the IoT [30], and searching the items augmented with RFIDs using NDN [31].", "pendent from where they are retrieved and where they can be forwarded [11], [16].", "It further supports load balancing and fault tolerance and thus helps resource-constrained devices [10], [11].", "Moreover, in NDN, each FIB prefix maintains three statuses [prefix forwarding status: 1) Yellow (average performance); 2) Green (good performance); and 3) Red (no performance)] of each interface for data retrieval, based on the round trip time calculated from the PIT entries [11].", "using their application-assigned names [11], [16].", "The Internet secures the communication channel [8], [9] or session which does not deal with data integrity, reliability, data provenance, and trust management [10], [11] (which are key parameters for developing robust IoT applications).", "NDN is proposed as a potential alternative networking solution for the IoT [10], [11].", "In NDN, all Dpkts are signed by its producer and verified by the consumer [11], [16].", "Each NDN router maintains three data structures: 1) content store; 2) pending interest table (PIT); and 3) forwarding information base (FIB) [11], [16] for forwarding packets.", "Moreover, in IoT, as heterogeneous devices are being used, NDN naming can support access restrictions instead of having a separate policy language for individual devices [11], [16].", "FIB periodically checks and updates the status of each interface associated with a router through the interface probing [11]."]} +{"52119456|206491434": []} +{"52119456|6664074": []} +{"52119456|1230643": []} +{"52119456|20905429": []} +{"17262901|9104850": ["Some of the results of this study are also applicable to other caching architectures, such as distributed and hybrid caching architectures [5], [12]."]} +{"6645760|1252121": ["Inter-domain routing is strongly affected by business relationships between the involved parties and is an area of active research even in the context of the current Internet architecture [79]."]} +{"8075416|9732448": ["Authors in [34] provide a comprehensive survey on service d covery approaches and define the prime criteria that need to fulfilled for an autonomic service discovery."]} +{"6664074|16762549": ["The large variety of use cases [15]\u2013[19] led to the development of a large variety of hardware and communication technologies."]} +{"6664074|4631990": []} +{"3325780|6556803": ["We propose the Q -learning solution for our MDP model, as it is proposed to acquire an optimal solution [10].", "The scheduler acquires a reward R and the model changes to a new state \u00b4 S based on the transition probability P ( \u00b4 S | S , A ) [10].", "A Markov Decision Process (MDP) is an optimization approach for deciding under contingencies, granting an optimal policy [10]."]} +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"59616874|37691331": []} +{"13689849|3767252": ["attempts to steal credentials and (ii) Providers are protected against attempts to obtain service executions requested by unauthorized users, quite common in the mobile edge [10]."]} +{"15031510|39936276": ["Naming data provide inherent support for delay-tolerant networking (handles intermittent connectivity) unlike the Internet [6][7].", "NDN is a future Internet paradigm evolved from Information-Centric Networking (ICN) and allowed users to fetch and distribute contents directly using their application-assigned names [6][7]."]} +{"43510332|6556803": []} diff --git a/edge/graph_189824718.jsonl b/edge/graph_189824718.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08d54c18bfeec16ea7472bd084619a5d07674539 --- /dev/null +++ b/edge/graph_189824718.jsonl @@ -0,0 +1,7 @@ +{"15934681|206977741": ["In addition, data entry methods on touch screens are more prone to error, hence typing large amounts of source code on the mobile device\u2019s virtual keyboard is not an appealing option from a user experience point of view [7]."]} +{"46444083|205435103": ["These are commonly mentioned motivation factors in related research [1] and our research connects them with development tools and developer experience of those tools.", "Majority of studies on motivation in development context report that developers are distinct from other occupational groups with respect to motivation [1].", "Advanced technologies motivate developers in their work [1] and development tools are often intertwined with utilized technologies.", "\"The work itself\" is the most commonly cited motivator, but there is a lack of detail regarding what aspects of the work is motivating, how motivational processes occur, and what the outcomes of motivating developers are [1], [12].", "making good use of skills, and getting feedback are widely reported motivators of software developers [1], [35]."]} +{"9160735|205435103": ["The majority of studies on motivation in SE report that developers are distinct from other occupational groups with respect to motivation [3].", "While it may be overreaching to conclude that happy developers are better at their work [2], both happiness and motivation have been connected with raised productivity [3]."]} +{"14230454|239537": []} +{"16910201|11717357": ["In a model-based approach, the UI design is the process of creating and refining the user interface models at different levels of abstraction [41], with a focus on finding mappings between the various models [42]."]} +{"52879924|417250": ["One of the more commonly used paradigms in SPL is feature-or-iented software development (FOSD) [2].", "One of the more commonly used paradigms in SPL is feature-oriented software development (FOSD) [2].", "FOSD allows software to be assembled semi-automatically from features."]} +{"15103016|205435103": ["More specifically, several groups of factors have been observed to affect performance: i) task characteristics, such as problem solving [24], technical", "challenge [24], [25], [26], and the nature of the job itself [27], [28]; ii) characteristics related to self-development and outside visibility of work, such as opportunities for advancement and growth, working to benefit others [24], recognition, opportunities for achievement [25], [26], increased responsibility [29], and senior management support"]} diff --git a/edge/graph_189825148.jsonl b/edge/graph_189825148.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..835c404a44cb66d2f0a92003cb5c48ac683ca96c --- /dev/null +++ b/edge/graph_189825148.jsonl @@ -0,0 +1,27 @@ +{"6986747|5747564": ["In the literature, there are a few surveys and tutorials on smart grid architecture [5,6], smart grid communications [7\u201311], smart grid information management [12] and middleware architectures for the smart grid [13]."]} +{"6986747|121289": []} +{"6986747|18037424": []} +{"10402012|1420935": ["This behavior creates a competitive market for energy trading in microgrids that can be modeled and analyzed as noncooperative game [21].", "In microgrids, the retailers should supply energy to their geographical areas without reliance on the main grid [3], [21]."]} +{"10402012|485843": []} +{"10402012|12083425": ["There have been numerous studies related to smart-grid technology such as research on distributed generation (DG) [4]\u2013[6], energy storage system (ESS) [7]\u2013[9], electric vehicles (EVs) [10]\u2013[14], advanced energy electronics [15], [16], and modern communication technologies [17], [18]."]} +{"115956405|121289": []} +{"37517598|17381415": ["Before using the conventional P \u2212 f and Q \u2212 V droop schemes with resistive networks, the decoupling techniques such as performing linear transformation and inserting virtual impedance are presented to solve this problem [88]\u2013[90].", "P \u2212 V /Q \u2212 f droop control with resistive feeder impedance Decoupling techniques [88]\u2013[90] Improved P \u2212 V and Q \u2212 f droop control [46], [91], [92] Enhanced RDM [95]\u2013[97] \u2022 Improve transient response \u2022 Improve inherent contradiction between voltage and power sharing \u2022 Improve the stability of microgrid \u2022 Not suitable for complex MG \u2022 Not considering total cost of generation \u2022 Proportional active power sharing is not achieved"]} +{"6638061|485843": ["MG is regarded as an important paradigm for the next generation power grid, the smart grid (SG) [3]\u2013[5]."]} +{"17069240|17381415": []} +{"17069240|12083425": []} +{"41480717|31086789": ["It can also reduce the threat of blackouts by alleviating overload on the macrogrid [17]\u2013[19]."]} +{"26052437|17381415": ["ac buses can work on bidirectional power control mode, dc link voltage control mode, or ac link voltage control mode [56]\u2013[58]."]} +{"26052437|12083425": ["ac buses can work on bidirectional power control mode, dc link voltage control mode, or ac link voltage control mode [56]\u2013[58]."]} +{"41308918|206485901": ["In fact, MG as a small part of a power system, is a low voltage distribution network comprised of controllable/non-controllable loads and distributed energy resources (DERs) with clearly defined electrical and thermal boundaries; it acts as a single controllable entity with respect to the main grid [2]."]} +{"24463003|49343018": ["Bidirectional information and energy interaction in the MGs can be achieved by using the distinct features of MAS, such as autonomy, communication and coordination.", "7 (c), can be used to compensate the influence of the communication delays among the power devices in MGs or between the devices and upper level control, and reduce data loss [110-113].", "As for the non-cooperative feature in interactive operation among multiple MGs, non-cooperative dynamic game model is widely adopted.", "Although the research on MAS-based MG and MGC control\nstrategies have been discussed [208, 209], the interaction among sub-MGs, power allocation, voltage and frequency regulation in MGC still have a lot of problems that need to be resolved.", "Research on energy coordination and economic scheduling in\nMGC should not only consider their self-characteristics, but also the different interaction and influence among the multiple MGs.", "Microgrid clusters (MGC), which consist of multiple MGs, have received considerable attention recently [21-24].", "With the development of multi-agent theory, the cooperative problem in the distributed system can be solved, due to its autonomy among the multiple DG agents, the consensus control and bidirectional information and energy interaction between power grid and MGs [164, 165].", "The MG market agent (MMA) coordinates the neighboring MMAs to launch a negotiation process about purchasing energy from other MGs, which is dynamic and autonomous.", "Therefore, the objective function\nof the optimization is to minimize the energy cost as [205]: total PV MT gridC C C C= + + (23)\n, 1 1\n[ ( ) ( )] N N\nPV PV PV i j i\ni j C T P k C k = = = \u0394 \u22c5 \u22c5\u2211\u2211 (24)\n, 1 1\n[ ( )] N N\nMT MT MT i i j\ni j C C T P k = = = \u0394 \u22c5\u2211\u2211 (25)\n1\n[ ( ) ( )] N\ngrid grid grid j\nj C T P k C k = = \u0394 \u22c5 \u22c5\u2211 (26) subject to the following conditions:\n, , 1 1 1 1\n[ ( ) ( )] ( ) ( ) N N N N\nPV MT grid i j i j j j\ni j j j P k P k P k D k = = = = + + =\u2211\u2211 \u2211 \u2211 (27) max\n, , ,0 ( ) ( ) PV MT i j i j i jP k P k P\u2264 + \u2264 (28)\nwhere CPV, CMT and Cgrid are the cost of energy supply from photovoltaics, microsturbines and electricity grid respectively, N is the total number of MGs in the MGC system, and k is the index for different time interval.", "A basic structure of MGC, which contains three MGs, is shown in Fig.", "Delays can be compensated by the gain scheduling algorithm reasonably so as to realize the demands of the flexible access and interactive for the large-scale MGs and MGCs.", "The tertiary control can be applied for one or more MGs, and the operation status of MG can be optimized according to the economic dispatching rules [146].", "9 shows the hierarchical framework of MAS in MGC,\nwhich contains four layers, and the electrical equipments of the MGs are located in the physical layer.", "In addition, the MGCC is used in hierarchical control to unify and coordinate all kinds of DGs and loads, and achieve safe and reliable operation of the multiple MGs. Power generation systems based on different technologies and power levels are interrelated in a MG.", "Under the extreme circumstances, all the MGs will be involved to tackle the energy imbalance problem.", "The communication delay issue, which is inevitable no matter in the low- or high- bandwidth communication networks, is crucial to maintain the stability of MGs and MGCs with the fixed delays and random delays.", "In this paper, an elaborate analysis on the MAS-based distributed coordinated control and optimization is presented, which can be applied in the MGs and MGC, such as the modelling methods, consensus control, communication delays, switching topologies, energy coordination and economic dispatch issues.", "Finally, due to the complicated operation modes of the MAS-based MGs, various methods on energy coordination and economic dispatch strategies for the MGC are systematically reviewed.", "The requirement for connecting the multiple MGs, enhancing stability, improving energy management, optimization and promoting the ancillary services has received more and more attention [20]."]} +{"24463003|11238636": []} +{"24463003|9588126": ["In [127], the modeling methods, such as graph theory and stochastic matrices are introduced, and the consensus issue is discussed."]} +{"449810|5747564": []} +{"113008299|5747564": []} +{"33063270|10440280": ["response applications [10] as well as work on distributed solution of multi-period formulations for model predictive"]} +{"10166177|31245252": ["Energy management in the smart grid system consisting of MGs as a typical Internet of Things application has attracted growing attention, and a number of research efforts have been conducted [39], [40], [1], [2], [3], [4], [7], [8].", "INTRODUCTION The smart grid that is a typical Internet of Things (IoT) application [1], [2], [3], [4], [5], [6], [7], [8] and its goal is to make the process of electricity distribution reliable, economical, and sustainable [9], [10]."]} +{"49185674|18037424": ["integration of advanced metering infrastructure and control techniques [1]."]} +{"23225559|485843": ["T HE next-generation power grid is envisioned to be a smart grid architecture driven by a growing demand for higher energy ef\ufb01ciency, reduced greenhouse gas emissions, and improved power quality and reliability [1]\u2013[4]."]} +{"23225559|12083425": ["This evolution is enabled by innovations and continuing developments in distributed generation and energy storage [5]\u2013[7], advanced power electronics [8], [9], and modern communication technologies [10], [11]."]} +{"53013315|206485901": ["2840055 connecting them to the distribution network (DN), has become a focus of research [1]\u2013[3]."]} +{"114231850|35109549": ["Note that, one of the key challenges of designing DSM models includes the need for modeling customer behavior; because, in the smart grid, demands are expected to be an integral part of system [195]."]} diff --git a/edge/graph_18983033.jsonl b/edge/graph_18983033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88ca3e1ed5526243f2fb2e15993d15c51a5d5efd --- /dev/null +++ b/edge/graph_18983033.jsonl @@ -0,0 +1,2 @@ +{"21558065|1708582": ["This is a well-accepted trade-off in decision-making, for instance in the reinforcement learning literature where it is formulated as the \u201cexploration-exploitation tradeoff\u201d [30]."]} +{"14888933|12819628": ["The aim of the pilot experiment was to test whether it is possible to record a set of subjective reports with a relatively simple experimental procedure (compared to Denham et al., 2014) with high consistency within individuals.", "In order to study the validity of subjective reports in the auditory streaming paradigm, we developed a simplified version of our previous protocol for assessing individual switching patterns in the auditory streaming paradigm (Denham et al., 2014).", "This result thus demonstrates a further similarity between the perception of auditory and visual bistable stimuli (see Denham et al., 2013; Pressnitzer & Hup\u00e9, 2006; Schwartz et al., 2012).", "This procedure allows studying the consistency and inter-individual variability of perception in a multi-stable auditory streaming paradigm, as was demonstrated by Denham et al. (2014), without the need to employ a time-consuming multi-session experimental design.", "Transition matrices were constructed from the resulting records using the method described by Denham et al. (2012).", "Listeners were instructed to mark their perception continuously in terms of four possible categories (see FIG.1): a) integrated (ABA-; depressing one of the two response keys), b) segregated (A-A-/-B-- or -B--/A-A-, depending which stream was heard in the foreground; depressing the other response key), c) combined (AB--/--A-, -BA-/A---, see Denham et al., 2014 for details; simultaneously depressing both response keys), and d) none (none of the above patterns being perceived; releasing both response keys).", "Such subjective reports have advantages over \u2018objective\u2019 tests that measure performance in some task assumed to be facilitated when experiencing one of the alternative percepts (for discussion see Bendixen, 2014)."]} diff --git a/edge/graph_18983156.jsonl b/edge/graph_18983156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..330a00879a7ae163dafee8683356e299d6d1d21e --- /dev/null +++ b/edge/graph_18983156.jsonl @@ -0,0 +1 @@ +{"35342921|62709258": ["Riedl et al. (2011) derives a set of key themes from a literature review that distinguishes electronic services from non-electronic services."]} diff --git a/edge/graph_18983676.jsonl b/edge/graph_18983676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18984265.jsonl b/edge/graph_18984265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c69e4ad415e964bdea19b1daa06202d9da613be6 --- /dev/null +++ b/edge/graph_18984265.jsonl @@ -0,0 +1,2 @@ +{"7729391|2840997": ["Despite its seemingly specialized nature, satisfiability has proved to be extremely useful in a wide range of different disciplines such as hardware and software verification [10, 76, 105] and planning [71]."]} +{"7729391|15847982": ["[39] have developed a concept of hypergraph decompositions, which allows a slicewise generalization of acyclic constraint satisfaction instances."]} diff --git a/edge/graph_18984270.jsonl b/edge/graph_18984270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d35c309656df8dae6f86b3317778cdad014e31a --- /dev/null +++ b/edge/graph_18984270.jsonl @@ -0,0 +1,3 @@ +{"14119013|14441987": []} +{"6438719|14441987": []} +{"47176821|14441987": ["In proactive scheme [1], all nodes maintain their routing tables for all possible destinations irrespective of the need of routes."]} diff --git a/edge/graph_1898434.jsonl b/edge/graph_1898434.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_18985591.jsonl b/edge/graph_18985591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46300ca8ae5410cb9523886d92bf31d0755677c2 --- /dev/null +++ b/edge/graph_18985591.jsonl @@ -0,0 +1,6 @@ +{"15523400|17774971": ["This work is dedicated to a different family of medium voltage inverters, the so called cascaded multicell topology, which uses several cells in series connection to generate higher voltages [5], [6].", "The carrier signals of the different cells in each phase are shifted in order to reduce the distortion in the load voltage [5], [6]."]} +{"15151529|17774971": ["They classify into Diode Clamped Multilevel Inverters (DCMIs), Clamping Capacitor Multilevel Inverters (CCMIs), and Isolates H-bridge Multilevel Inverters (IHMIs) [6]-[9]."]} +{"31488309|17774971": []} +{"44222657|17774971": ["In recent years, multilevel voltage source inverters are being increasingly used for the high-power high-voltage applications due to their attractive performance as follows [1].", "in 1981 [2], flying capacitor inverter originated from conventional two-level inverter by adding capacitors to the series connected switches, cascaded H-bridge inverter, which is composed of a series of singlephase H-bridge power cells [1]."]} +{"16128041|17774971": ["Reliability is an important issue in this type of inverters because they could create great losses in production if they failed and shut down [1]."]} +{"6196691|17774971": ["INTRODUCTION Since the three-level neutral-point-clamped, or diodeclamped, converter was invented in 1980 [1], comprehensive research has been achieved on the three-level converter and its expansion to multilevel converters, along with their applications to industry and utility [2], [3]."]} diff --git a/edge/graph_18986679.jsonl b/edge/graph_18986679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6bb659ffb0787b83013f4d7daf1a8be75649dbe3 --- /dev/null +++ b/edge/graph_18986679.jsonl @@ -0,0 +1,2 @@ +{"2388872|3102110": []} +{"967595|3102110": ["Interested readers should consult references such as [33; 24]."]} diff --git a/edge/graph_18986821.jsonl b/edge/graph_18986821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_189897997.jsonl b/edge/graph_189897997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4eae9a47ea5541fe3396b48807deede907394220 --- /dev/null +++ b/edge/graph_189897997.jsonl @@ -0,0 +1,82 @@ +{"15928722|1110872": ["Asymmetric delays over forward and return paths have been a concern for TCP congestion control [5]."]} +{"18213317|3540699": ["264/AVC, of greater interest to us, is the introduction of a Network Adaptation Layer (NAL) that offers a layer of abstraction over the actual encoded data [12]"]} +{"14889616|3540699": ["For more detailed information about H.264/AVC, the reader is referred to the standard [6] or corresponding overview papers [23]\u2013[26] While the VCL creates a coded representation of the source content, the NAL formats these data and provides header information in a way that enables simple and\u2026"]} +{"206577123|1615097": ["For broadband delivery, Real-Time Transport Protocol (RTP) [3] and HTTP-based Adaptive Streaming (HAS) solutions are commonly used [1].", "A T PRESENT, there is a huge variety of technologies to deliver time-sensitive media content in networked environments [1].", "Two main approaches for media delivery can be distinguished: broadcast and broadband [1].", "forms of media streaming can be distinguished: managed and unmanaged [1], [2], [29], [30]."]} +{"4415243|7679009": []} +{"4415243|12819773": ["In [155], for example, the authors propose a taxonomy and survey of cloud orchestration techniques.", "Several works have somehow addressed the theme of orchestration in different scopes, including clouding computing [155], SDN [82], [88], and NFV [158], [100], [11]."]} +{"4415243|44621519": ["Similarly, several (academic and industrial) research and (commercial) development efforts in orchestration, SDN and NFV have been going in recent years, concretized in a number of collaborative endeavors such as OSM [5], OpenStack [6], ONAP [7], 5G-EX [8], CORD [9], etc.", "Similarly, several (academic and industrial) research and (commercial) development efforts in orchestration, SDN and NFV have been going in recent years, concretized in a number of collaborative endeavors such as Open Source MANO (OSM) [5], OpenStack [6], Open Network Automation Platform (ONAP) [7], 5G-Exchange (5G-EX) [8], Central Office Re-architected as a Datacenter (CORD) [9], etc."]} +{"4415243|18167210": [", networks, servers, storage, and services) with high flexibility, cost efficiency, and centralized management [90]."]} +{"4415243|6583734": ["stance, the NFV should meet performance requirements to support, in a standard server, the packet processing, including high I/O speed, fast transmission, and short delays [158].", "Templates and standards should be developed to guarantee automated and consistent translation [158].", "Several works have somehow addressed the theme of orchestration in different scopes, including clouding computing [155], SDN [82], [88], and NFV [158], [100], [11]."]} +{"4415243|8650651": []} +{"4415243|15449163": []} +{"3949242|9461213": ["1 Stacked auto-encoder (SAE) Auto-encoder (AE) are suitable for feature extraction and dimensionality reduction [195].", "DBNs are suitable for hierarchical features discovery [195].", "connectivity of the neurons, where each neuron in the input layer is connected to all of the hidden neurons and vice versa, but there is no connection between any two neurons in the same layer [195].", "Hybrid models, on the other hand, make use of both discriminative and generative models [102,195].", ", speech or text) or time-series problems [105, 195].", "tion, called a code or latent variable, whereas the second stage receives the generated code at the first stage and reconstruct the original input data [195].", "4 Restricted Boltzmann machine (RBM) An RBM represents a stochastic ANN that consists of two layers: input layer and hidden layer [195].", "The training procedure aims at minimizing the reconstruction error [195].", "DBNs extracts hierarchical representation of the training data, as well as reconstruct their input data [195]."]} +{"3949242|4884302": []} +{"3949242|2623404": ["Proc. of the 2018 Workshop on Network Meets AI & ML, Budapest, Hungary, August, 2018, pp. 8\u201314 [178] Wang, P., Lin, S.C., Luo, M.: \u2018A framework for QoS-aware traffic classification using semi-supervised machine learning in SDNs\u2019.", "Shan-Shan and Ya-Bin [161], on the other hand, introduced a model for detecting advanced persistent threat (APT) in SDNs based on HMM. APT is a multi-stage complex attack.", "In this paper, we discuss two deep generative models namely stacked auto-encoder (SAE) and DBN, due to the fact that they were already employed in SDNs [54\u201357].", "A typical OF-enabled switch has a pipeline of flow tables, which consist of flow entries, each of which has three parts: (1) matching rules, which are used for matching incoming packets (2) counters maintain statistics of matched flows and (3) actions or instructions, which can be configured proactively or reactively to be executed upon a match [6, 14].", "In addition to solving the problem of optimal VM placement in NFV paradigm, Mihai-Gabriel and Victor-Valeriu [106] proposed a method for mitigating DDoS attacks in SDNs by risk assessing based on NNs and biological danger theory.", "Al-Jawad et al. [165] proposed, LearnQoS, a RL-based framework that utilises Q-learning for policy-based network management to optimise QoS requirements in multimedia-based SDNs.", "Recent studies have shown a strong tendency of research community towards adoption of AI approaches in SDNs.", "This attack is a new attack vector for SDNs where it exploits the vulnerability of the SDN to launch a DoS attack on the controller.", "In this case, the switch may either drop the packet or forward it to the corresponding controller using OF protocol [6].", "Hu et al. [210] proposed a method for solving the problem of placing controllers in SDNs in order to maximise the reliability of control networks.", "Overall, AI approaches have been proved to be very useful tools in SDNs.", "Proc. of The 36th IEEE Military Communications Conf., Baltimore, USA, October 2017, pp. 1\u20136 [165] Al-Jawad, A., Shah, P., Gemikonakli, O., et al.: \u2018Learnqos: a learning approach for optimizing QoS over multimedia-based SDNs\u2019.", "OpenFlow has become the de-facto standard for southbound APIs used in SDNs [6] and therefore, in this study, we mainly focus on OF-based SDNs.", "Hybrid switches, on the other hand, reveal new possibilities by including both OF and nonOF ports [6].", "Francois and Gelenbe [174] proposed cognitive routing engine (CRE) for SDNs. CRE consists of three main modules.", "Yu and Ke [195] introduced, GA-SDN, a GA-based routing algorithm for enhancing the video delivery quality over SDNs.", "5.3.2 EAs in SDN: The EAs were employed for solving controller placement problem in distributed SDNs [192], routing [193] and moving target defence (MTD) [194].", "Lazaris and Prasanna [142] proposed, DeepFlow, an intelligent traffic measurement framework for SDNs that uses the available TCAM memory to install measurement rules for important flows, and employs LSTM-RNN to predict the size of rest of the flows when flow counters cannot be placed at a switch due to its limited resources, on the basis of historical data from previous measurement periods.", "Tutorials, 2017, 19, (3), pp. 1701\u20131725 [30] ONF.", "Available at http:// tools.ietf.org/html/draft-smith-opflex-00, accessed 16 October 2017 [23] Ferguson, A.D., Guha, A., Liang, C., et al.: \u2018Participatory networking: an API for application control of SDNs\u2019, ACM SIGCOMM Comput.", "HMM in SDN: Fan et al. [53] investigated security situation assessment in SDNs based on an advanced HMM called multiple observations HMM.", "Phan et al. [52] proposed, DSOM, a distributed SOM approach for tackling the performance bottleneck and overload problems for large-sized SDNs under flooding attacks.", "The experimental results showed that GA-SDN outperformed BellmanFord routing algorithm in terms of packet drop rate, throughput and average PSNR. Wang et al. [196] studied the problem of virtual network planning in SDNs based on GA approach.", "OpenFlow (OF) is considered the most commonly used southbound API in SDN, which is being continuously developed and standardized by open networking foundation (ONF) [6].", "OF has become the de-facto standard for southbound APIs used in SDNs [6] and therefore, in this study, we mainly focus on OF-based SDNs. OF-based forwarding devices have been developed to coexist together with conventional Ethernet devices [16].", "Nam et al. [160] used SOM for detecting DDoS attacks in SDNs.", "This idea caused a dramatical change in the way how networks are designed and managed [5, 6].", "Liu et al. [190] introduced a defence mechanism of random routing mutation in SDNs.", "In addition, the SDN architecture allows the involvement of third parties in the design and deployment of modern network applications [6].", "OF provides an abstraction layer that enables the SDN controller to securely communicate with OF-enabled forwarding elements [6].", "Experimental resulted based on ISOT botnet dataset showed that RF approach achieves the best results in terms of F1-score among k-NN, naive Bayes, bagged-trees and LR.\nAnand et al. [138] introduced a method detecting compromised controllers in SDNs.", "Bouet et al. [197] presented a cost-based method for optimal deployment of DPI engines in NFV-SDNs.", "Pillutla and Arjunan [234] introduced, FSOMDM, a fuzzy self-organising maps-based DDoS mitigation approach for cloud-based SDNs. FSOMDM enhances the NN approach by replacing the neurons of the traditional Kohonen NN model by updating fuzzy rules."]} +{"3949242|9928823": []} +{"3949242|13172512": ["An example of the unsupervised learning approach is clustering, which is used for detecting useful clusters in the input data based on similar properties defined by a proper distance metric such as Euclidian, Jaccard and cosine distance metrics [36, 38].", "This approach requires having a dataset that represents the system under consideration and can be used to estimate the performance of the selected method [38]."]} +{"3949242|7158350": ["Second, neural networks form a universal functional approximator, which can approximate any function [193].", "flexibility to represent and model complex relationships [193].", "First, they can adjust themselves to the data without explicitly specifying a functional or distribution for representing the underlying model [193]."]} +{"18739982|14889616": ["operation called transcoding [29], [36].", "264/SVC [29] video streams coded with medium-grained quality scalability (MGS).", "[29] claim that, compared to nonscalable streams, 10%\u201350% bit rate increases of scalable streams are acceptable."]} +{"18739982|17428811": ["Nonscalable Versus Scalable Streams: Streaming nonscalable videos over a bandwidth-limited channel may lead to undecodable frames [23], while scalable video streaming systems have the choice to at least stream the base layer and attain basic Fig."]} +{"1817751|512561": ["level and network lifetime [151]."]} +{"1817751|85585": ["increases the accuracy of various tracking in a variety of civilian and military applications [71].", "due to bottleneck link/node failure for non-disjoint paths which negatively impacts the performance of multipath routing [71].", "Reliability has emerged as a factor to classify multipath routing protocols, since a reliable monitoring of the environment is very important in a variety of multimedia applications [71]."]} +{"1817751|36432451": ["The design of the routing protocol is highly influenced by the data delivery model, especially when the design involves minimization of energy consumption and route stability [45].", "Multimedia applications encompass monitoring of reallife events which necessitates that efficient multipath routing mechanism should be developed for the transmission of information while meeting QoS requirements [45].", "tion, cooperative and distributed algorithms [14], [43]\u2013[45].", "Some routing protocols adhere to some requirements and resource-constraints nature of WMSNs to meet QoS in order to handle various types of multimedia and mixed traffic [45]."]} +{"1817751|6556803": ["This means that each sensor node shall be modified distinctively according to the application scenarios [6]."]} +{"1817751|13454399": ["The benefits of various multipath routing protocols for WSNs and their benefits were presented in [33] and [34].", "are two relevant aspects of an allocation strategy: granularity and scheduling [16], [34]."]} +{"1817751|29997805": ["dant traffic reduction based on similarity of multimedia data sources from nearby locations were studied in [7].", "A plethora of research on taxonomies for Mobile Ad-hoc NETwoks (MANETs) and WSNs have reported the baseline model of routing protocols [7], [69].", "[7] classified the WMSNs routing protocols", "constraints, multimedia source coding techniques, crosslayer coupling of functionality, and multimedia in-network processing [7].", "Designing multipath routing protocols for WMSNs requires additional research that extends the protocols proposed for WSNs [7]."]} +{"1817751|2295142": ["selection for each multipath routing protocol is independently determined and should be selected to meet the performance demands of WMSNs applications [1], [13].", "The third approach is more interesting than the others since it represents a trade-off between energy expenses and the likelihood of total multipath failure [13], [76].", "The demands of multipath routing strategy combined with various performance demands dictated by different applications have led to the proposal of a number of new routing protocols to efficiently utilize the limited available resources in addition to the features of multimedia data [13].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "[13] classified a multipath routing taxonomy for WSNs into three categories with emphasis on their advantages and disadvantages.", "vides fault tolerance by increasing the probability of a data packet sent by a source node, via alternatives of selected paths, arriving at the destination sink with minimum packet loss [13].", "However, our survey and the survey presented in [13] have several major differences.", "requirements along with their respective routing strategies [8], [13], [14], [16].", "In [13], multipath routing protocols were classified based on three main criteria: alternative path routing, reliable data transmission, and efficient resource"]} +{"1817751|41998167": ["diately to the changes in the sensed attribute, or a query is generated by the base station [52]."]} +{"1817751|3755658": ["ability [29], and cross-layer approaches [21]."]} +{"1817751|14132386": ["Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "cols for traffic load balancing and repartition [62], [96]\u2013[98].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62]."]} +{"1817751|3826739": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "In [28], position-based routing protocols were surveyed"]} +{"1817751|1236072": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "Early surveys focused on general architectural issues and open research problems in the field of WSNs [8], [19]\u2013[27].", "These characteristics are handled either by modifying existing protocols in WSNs or by proposing new methodologies such as multi-radio multi-channel systems, switching between multiple channels, multipath routing, or mixtures of these methods [8].", "Therefore, the prime role of a routing protocol is to establish a path between the sources and sink node while keeping track of the path availability and facilitating successful transmission of data along the selected paths [8].", "constrained routing protocols were studied in [30], where the taxonomy presented in [8] was expanded to consider energy efficiency.", "Routing strategy is defined in terms of the process of discovering and selecting paths in wireless networks from the target area that sends network traffic towards the sink node [8].", "requirements along with their respective routing strategies [8], [13], [14], [16].", "multiple performance metrics to meet the additional QoS requirements [8], [68].", "In [8], routing protocols for WSNs were discussed and classified into", "Several techniques have been proposed to understand how different routing approaches respond when handling various requests in different network environments [8], [57]\u2013[64]."]} +{"1817751|44944144": ["better than proactive routing protocols during inactivity [144]."]} +{"1817751|1230643": []} +{"1817751|14441987": ["the network with up-to-date routing information [142].", "The proactive approach responds to changes in the network topology or another metric such as bandwidth and interference by propagating updates throughout the network to maintain a consistent network [142]."]} +{"1817751|41907762": ["It should be noted that, they are difficult to measure and generally can generate high overhead in networks [60], since resource availability information are periodically exchanged among nodes [35].", "Actually, the discovery, selection and maintenance of paths depend on some node-specific and/or network-wide metrics such as QoS requirements, residual-energy budget along the selected path, and more [60].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "have been proposed to solve routing problems in traditional WSNs [60]\u2013[64].", "Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62]."]} +{"1817751|13458486": ["In addition, cross-layer design between MAC layer and routing allow packet-level service differentiation or priority-based scheduling, and more power efficient routing mechanisms [17].", "The multipath routing protocol taxonomy in [17] used path selection techniques and traffic distribution mechanisms to classify the surveyed protocols.", "Consequently, the objective is to assign more loads to under-utilized multiple paths and less load to over-committed paths so that uniform resource utilization of all available paths can be ensured to distribute network traffic [16], [17]."]} +{"1817751|1762301": ["Otherwise, reactive routing protocols may result in a large volume of messaging overhead [133].", "final destination route are discovered [133]."]} +{"1156228|3540699": ["Several MDC techniques [10], [11] have been proposed for the H.264/AVC video coding standard [ 12 ]."]} +{"1156228|1892195": ["2008933 has recently been redirected towards the multicast communication based streaming [1]."]} +{"10803927|5122855": ["For any video streaming application, avoiding rebuffer-ing and streaming the best possible video quality are the two main objectives of any rate adaptation algorithm [144]."]} +{"10803927|64404": ["One solution is to improve the compression efficiency as proposed in [23]."]} +{"10803927|16748080": []} +{"10803927|3540699": ["On the other hand, modern video compression techniques, such as H.264 [15], rely on compensation prediction algorithms, which in turn rely on the interdependence between successive frames.", "According to [22], a 720p video is encoded at an average of 2.5-3.5 Mbps, a 1080p at 5-6 Mbps and a 4K within a range of 18-20 Mbps\u2014all having 30fps and using H.264 [15]."]} +{"10803927|18647611": ["A detailed survey of the various approaches that use content adaptation to manage the energy consumption of the wireless mobile devices is presented in [105]."]} +{"51867955|2623404": ["To this end, Content Delivery Networks (CDNs) operators have adopted coordinated control planes [2] between routing and their streaming systems following the recent trend of Software Defined Networks (SDN) [3], which has deeply transformed the way network architectures are designed and controlled."]} +{"2261490|6581557": ["Traffic collection closer to the end user will provide input for a more accurate estimate of QoE, as discussed also in [85]."]} +{"18944164|3540699": ["264/AVC [22], corresponding to 6 different values of QP, namely 22, 28, 34, 38, 42 and 48."]} +{"17237878|7439310": []} +{"1236771|206576469": ["Each of these bu\ufb00ers introduces some extra-delay [7] but they guarantee reliable, in-order E2E communication on multi-paths."]} +{"3884958|3540699": ["264 format [28], which is pervasively employed in current industrial communities for video compression."]} +{"8777856|15971774": ["Instead of discussing multipathing at different protocol stack layers in terms of performance enhancements [4], [5]; this paper focuses on the use of multiple paths at the transport layer.", "[4] 2015 \u00d7 \u00d7 \u00d7 \u00d7 \u00d7 \u00d7 X \u00d7 \u00d7 This survey 2015 X X X X X X X X X"]} +{"8777856|2623404": []} +{"8777856|14077349": []} +{"18220375|16748080": []} +{"18220375|15170341": []} +{"15971774|11735843": ["SDNs allow networks to be programmable through the separation of the control plane and the data plane, as well as through the support of high-level control abstractions [147], [148]."]} +{"15971774|2295142": ["While there exist quite a few survey papers on multipathing protocols, these papers are typically confined to particular networking configurations (such as wireless sensor networks [40]\u2013[42], mobile ad hoc networks [43]\u2013[45], etc."]} +{"15479712|14132386": []} +{"15479712|1236072": []} +{"14077349|15971774": []} +{"31767324|6581557": []} +{"31767324|1615097": []} +{"31767324|3540699": []} +{"15898165|2535224": []} +{"741064|15971774": ["[154] investigated multipath transmission on the transport layer, despite their main focus on networklayer multipath routing.", "There are only a few surveys [7, 45, 67, 153, 154, 163, 183] that touch on the same topic as ours.", "Survey Year Application Transport IP Link Physical Cross-layer Network Environment [163] 2012 \u221a \u221a Scheduling, tunneling \u221a Wireless [67] 2013 \u221a \u221a Scheduling, tunneling \u221a General [7] 2013 \u221a Tunneling General [45] 2015 \u221a Routing \u221a Wired [183] 2015 \u221a \u221a Routing \u221a \u221a \u221a Wired [154] 2015 \u221a Routing \u221a General This survey 2015 \u221a \u221a Scheduling, tunneling \u221a \u221a General", "For example, [86, 108, 154, 174, 193] mainly focused on the control plane problem (i.", "We refer the readers to articles and recent surveys that cover such work [86, 108, 154, 174, 193]."]} +{"741064|14077349": []} +{"741064|2295142": ["For surveys on multipath transmission in sensor networks, we refer the readers to [156]."]} +{"44151181|41601035": ["A more comprehensive survey on energy-efficient vertical handover solutions can be found in [176]."]} +{"44151181|15971774": ["[14] provide a comprehensive survey with the main focus on multipath"]} +{"44151181|2261490": ["Barakovic and Skorin-Kapov [7] provide a survey on the QoE management for wireless networks with the main focus on three management aspects, such as: QoE modeling, monitoring and measurement, and adaptation and optimization."]} +{"6163761|525062": []} +{"6163761|1252121": []} +{"41784743|64404": []} +{"6276737|7971188": ["A comparison of DHT algorithms can be found in [33]."]} +{"6276737|14697846": ["A P2P system is a distributed system in which a transient population of peers self-organize into an overlay network on top of the substrate Internet to share computing power, storage, and communication bandwidth [2].", "Peer arrivals and departures, collectively called peer churn , differentiates P2P systems from other types of distributed systems [2]."]} +{"6276737|713082": ["A survey of IP multicast can be found in [10]."]} +{"36084790|1236072": []} +{"36084790|1762301": ["The majority of applications of swarm intelligencebased algorithms can be found in mobile ad hoc networks (MANET), wireless sensor networks (WSN) and wireless mesh networks (WMN) [23]."]} +{"2104866|7439310": ["We find that what makes video transport over the Internet and certain wireless networks successful is the existence of a relatively reliable path from the source to the receiver, such that packet losses and delays are within a predictable range, which can be effectively dealt with by applying appropriate error control and error concealment techniques [1]."]} +{"18615150|15516254": []} +{"15768872|396631": ["Layered video compression [9], [20], [26], [27] encodes a video sequence into multiple layers, which enables us to progressively refine the reconstructed video quality at the receiver."]} +{"15768872|14889616": ["11 with the aid of two SVC layers.", "Layered video compression [9], [20], [26], [27] encodes a video sequence into multiple layers, which enables us to progressively refine the reconstructed video quality at the receiver.", "Generally, these applications require fixed quality video representations [20].", "However, these traditional video representations fail to meet the requirements of the various transmission scenarios in the era of the Internet and of mobile networks [35], [36], which have to support heterogeneous devices, operating under unreliable network conditions, bandwidth fluctuations etc. Layered video coding, such as SVC, emerged to support operation in these new transmission scenarios.", "By carefully considering both the wireless channel conditions and the SVC characteristics, the authors of [41] judiciously allocated the resources between the source and channel encoders based either on the minimum-distortion or the minimum-power consumption criterion.", "Indeed, SVC is capable of generating several bitstreams that may be decoded at a similar quality and compression ratio to that of the existing H.264/AVC codec.", "In [68], [72], [80], [105], UEP schemes conceived for video transmission using hierarchical quadrature amplitude modulation (HQAM) were investigated, which considered the unequal importance of the different layers in SVC, as well as the unequal importance of both the intra-coded frames (I-frame) and of the predicted frames (P-frame).", "Specifically, DID, TID and QID represent Coarse Grain Scalability (CGS), Temporal Scalability (TS) and Medium Grain Scalability (MGS) [20], respectively.", "Additionally, only the MGS [20], [154] feature is enabled, when encoding the video sequences into three different-quality ELs, namely", "To eliminate this problem, layered video coding became the center of research efforts and a number of standards emerged, such as the scalable video coding (SVC) scheme standardized in H.264.", "1) Partition Mode of H.264: A number of layered video coding schemes [28] have been developed and some of them are adopted by recent video coding standards, for example the scalable video coding (SVC) [20] and data partitioned mode (DP) [9], [29], [30].", "2) Scalable Video Coding: The subject of scalable video coding [20], [32] has been an active research field for over two\n2Here the phrase x \u201cdepends on\u201d y implies that the layer x will be discarded by the video decoder, if layer y is lost.", "264/AVC was the Scalable Video Coding [20] (SVC) scheme completed in 2007, which is specified in", "264: A number of layered video coding schemes [28] have been developed and some of them are adopted by recent video coding standards, for example the scalable video coding (SVC) [20] and data partitioned mode (DP) [9], [29], [30].", "Similar dependency rules exist for the temporal scalability and MGS features.", "Two different bit rate ratios (BRR) of the BL and EL were tested, namely 1 : 3 and 3 : 1, where 1 : 3 corresponds to the typical spatial scalability of the SVC bitstream, while 3 : 1 corresponds to the temporal scalability of an H.264/AVC bitstream.", "The dependency of the layers in the SVC stream is exemplified in Fig.", "A major recent extension of H.264/AVC was the Scalable Video Coding [20] (SVC) scheme completed in 2007, which is specified in Annex G, allowing the construction of bitstreams that contain\nsub-bitstreams of the H.264/AVC standard.", "2) Scalable Video Coding: The subject of scalable video coding [20], [32] has been an active research field for over two"]} diff --git a/edge/graph_189898088.jsonl b/edge/graph_189898088.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..278cc71972815730d52938134a7520d49669ccf5 --- /dev/null +++ b/edge/graph_189898088.jsonl @@ -0,0 +1 @@ +{"169709236|58311097": ["In the bottom half of Figure 3, through the SSA(480,1-13) graph, we include further signals to the initially filtered smooth series to provide a better indication of the actual bitcoin transaction movements each second and the final graph, SSA(480,14-480) shows the noise that was extracted using SSA.", "Note how the SSA(480,1-4) decomposition and reconstruction enables the reader to clearly see the underlying trend patterns and periodic fluctuations in bitcoin transactions every second.", "Whilst blockchains are likely to result in more structured big data, the analysis would have to overcome significant issues pertaining to increased signal and noise ratios which are already a problem in pre-blockchain era big data (Hassani and Silva, 2015).", "We apply SSA to denoise the series and initially extract a smoothed signal (trend and periodic fluctuations) from the raw transaction data.", "Note that in Figure 5, SSA(L,r) refers to the Singular Spectrum Analysis (SSA) choices of window length L and number of eigenvalues r used to filter and reconstruct the Bitcoin transaction data.", "Since its emergence, big data has successfully disrupted several industries from banking (Hassani et al., 2018) to policing (Hassani et al., 2016) whilst having a significant impact on the future of data analytics, see for example, Hassani and Silva (2015)."]} diff --git a/edge/graph_189926595.jsonl b/edge/graph_189926595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b24c6078f036244e7a735ef7db71a279e789e996 --- /dev/null +++ b/edge/graph_189926595.jsonl @@ -0,0 +1 @@ +{"55004525|189926595": []} diff --git a/edge/graph_189928307.jsonl b/edge/graph_189928307.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e53101ad4da27ac1e067fc6091b794b5dd988521 --- /dev/null +++ b/edge/graph_189928307.jsonl @@ -0,0 +1,26 @@ +{"18012557|53692127": []} +{"12485056|393948": []} +{"18580709|6632010": ["The optimization problem of interest arises in machine learning applications but with appropriate modifications is relevant to other stochastic optimization settings including simulation optimization [2, 12]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"49418885|1932843": []} +{"49418885|393948": ["For this reason, the deep learning approach can be considered as a kind of representation learning algorithms [3].", "This key aspect of deep learning architectures is led to progress towards those algorithms that are the goal Artificial Intelligence (AI), understating the world around independent of expert knowledge and interference [3]."]} +{"49418885|1708582": ["Reinforcement Learning [17, 39] is a branch of machine learning in which an agent learns from interacting with an environment.", "Reinforcement Learning (RL) [17, 39] is a branch of machine learning in which an agent learns from interacting with an environment."]} +{"15538672|192934": []} +{"16756501|393948": ["Recently, deep neural networks (Hinton and Salakhutdinov 2006) and representation learning (Bengio, Courville, and Vincent 2013) have led to new ideas for solving the data sparsity problem, and many neural models for learning word representations have been proposed (Bengio et al. 2003; Mnih and\u2026"]} +{"5230337|7020971": ["Bertsekas (2011) surveys several incremental gradient methods for convex problems."]} +{"27681296|192934": []} +{"37925315|12681089": []} +{"3427632|14814753": []} +{"1708582|17464562": []} diff --git a/edge/graph_189928443.jsonl b/edge/graph_189928443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca67e85005652ed85a7c8565eab30485cf4d6de7 --- /dev/null +++ b/edge/graph_189928443.jsonl @@ -0,0 +1,56 @@ +{"3181725|1230643": ["We perform an extensive evaluation via simulation; our findings demonstrate that our solutions scale very well with respect to the number of sinks and significantly reduce energy consumption and delivery delay."]} +{"13966354|1230643": ["There are many unattended sensor nodes (SNs) in a WSN which have limited power supply [4], so the energy conservation becomes one of the major challenges of WSNs."]} +{"11235792|1230643": []} +{"53291905|1230643": []} +{"15771961|1230643": ["A large number of sensors can be distributed in mass by scattering them from airplanes, rockets, or missiles [1].", "A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [1,8]."]} +{"15248509|206901977": ["Consequently, there is a wide range of WSN applications such as [25]: health-care, environment, agriculture, public safety, military, transportation systems, and industry applications."]} +{"36373679|9494512": ["Therefore, in order to realize longer network lifetime, sensor nodes have to adjust their perception, processing, communication, and other activities in energy-saving way and fully use battery energy [2]."]} +{"15394903|1236072": []} +{"15394903|1230643": []} +{"32351712|5972227": ["Some works have studied tracking algorithms according to security aspect [7] and others according to energy efficiency [8], fault tolerance, mobility, accuracy, and so on."]} +{"32351712|34657644": ["This is due to error accumulations produced when estimating the position of the target as well as the noise added to TOA [23, 24] measurements."]} +{"52813145|63317370": []} +{"16324015|1230643": []} +{"21593194|1503157": []} +{"21593194|1230643": []} +{"23984530|1230643": ["W IRELESS sensor networks based on microelectromechanical systems and wireless communications are increasingly useful in crucial applications in environmental monitoring, factory automation, and security [1], [2]."]} +{"1139978|1230643": ["A large number of sensors can be distributed in mass by scattering them from airplanes, rockets, or missiles [1].", "A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [1], [4]."]} +{"6067983|1230643": ["Due to these sensors, sensor networks are widely used in a variety of application areas such as military, health, and security (Akyildiz et al., 2002, 2007).", "S.-H. Kang).\nperformance criteria (Akyildiz et al., 2002, 2004, 2007; Fodor and Vidacs, 2007; Ganesan et al., 2004; Lee et al., 2009; Luo et al., 2006; Park et al., 2009).", "Recent advancement in low-power digital integration and micro-electro-mechanical systems technologies has enabled the development of low-cost, low-power, and multifunctional sensor nodes that are small in size (Akyildiz et al., 2002, 2007)."]} +{"21396876|1503157": ["They have wide-ranging applications, some of which include military [1]\u2013[3], environment monitoring [4], [5], agriculture [6], [7], home automation [8], smart transportation [9], [10], and health [11]."]} +{"21396876|1230643": ["They have wide-ranging applications, some of which include military [1]\u2013[3], environment monitoring [4], [5], agriculture [6], [7], home automation [8], smart transportation [9], [10], and health [11]."]} +{"10367377|1503157": ["It is proven that the networks of wireless sensors are very appealing and promising for supporting agriculture practices [15]."]} +{"10367377|1230643": ["\u2026in micro-electromechanical systems and wireless communications, which involve substantial evolution in reducing the size and the cost of components, have led to the emergence of wireless sensor networks (WSN) that are increasingly useful in crucial applications in environmental monitoring [14]."]} +{"54529794|1236072": []} +{"44862794|2535224": []} +{"26355965|2835258": []} +{"110014091|205286988": ["Furthermore, as a direct result of multiple motes co-located within the vicinity of a phenomenon in a dense WSN may generate similar data samples, there is potential to exist a sizable redundancy in sensed data traffic under utilizing the limited network bandwidth [Akkaya and Younis, 2005].", "The authors in [Akkaya and Younis, 2005] showed that Etran(Erec) is negligible as compared with the energy utilized by communication.", "Some algorithms based on shortest path tree were proposed to create optimized multi-hop routing paths on the network to send sensor readings from sensor nodes to the sink [Akkaya and Younis, 2005].", "Intuitively this resembles with the cyclic nature of the sensor measurement\ndelivery process in real world applications for monitoring spatial phenomena [Akkaya and Younis, 2005]."]} +{"6554474|1230643": ["In a usual scenario, these networks are largely deployed in areas of interest for ne grained monitoring in dierent classes of applications [ 1 ]."]} +{"2168177|1236072": ["Unlike the fixed sink schemes [5\u20137] which are based on a fixed sink, RMDC employed a mobile sink to collect data.", "In general, the related data collection schemes can be mainly classfied into fixed sink schemes [5\u20137] and mobile sink schemes [8\u201311].", "The RMDC scheme is considered as approach to compare because RMDC outperforms related schemes [5\u201310].", "Hence, the RMDC has a better performance than the existing fixed sink schemes [5\u20137] in terms of network lifetime.", "This behavior will raise the problem of unbalanced energy since the sensors closer to the sink have heavier data-relaying workloads and thus exhaust their energies much faster than the more distant sensors [5\u20137]."]} +{"3490769|15880829": ["Sensors nodes are constrained in their processing capacity, storage and battery power, where as the sink is not resource-constrained [1]."]} +{"3490769|1230643": ["Therefore, the entire network fails even though farther away nodes still have 90% of their initial energy [2]."]} +{"54326210|1236072": ["To deal with the network dynamics caused by the node failure or node addition, existing on-demand routing protocols [23] may be used to find the closest valid subsink as the temporary destination for one node, when it can not reach its subsink successfully."]} +{"26153059|1236072": ["The first one is to move some workloads from the hotspots to light-hearted ones, which is the main method of many existing energyaware routing protocols [3, 4]."]} +{"16105264|1230643": ["Applications which rely on 24 7 (continuous) monitoring are required for environmental monitoring,\nprecision agriculture, health-care, security surveillance, and\nnational defense [1]."]} +{"3798371|17713112": ["In addition to the development of efficient software [13] and communication protocols, e."]} +{"3798371|16335158": ["in [22] provide a comprehensive survey of sen-"]} +{"10846084|14441987": ["There is a large literature on power-efficient topology control and routing; for example see [22, 19]."]} +{"18313875|1230643": []} +{"8625876|2835258": ["A basic assumption herein is that the quantity in (1) is computable by node k requiring, in particular, knowledge of the location of its neighbors [12]."]} +{"206895134|1230643": ["However, these limitations in size and energy make the wireless sensor networks (WSNs) different from other wireless and ad hoc networks [3]."]} +{"38932763|1230643": ["In recent years, a number of techniques have been proposed to prolong the lifetime of wireless sensor networks (WSN) by utilizing amobile sink (MS) in networks [1\u20137].", "Prolonging the network lifetime of WSN has been targeted through the mobility management of the mobile sink (MS) recently [1\u20137,24]."]} +{"1282309|1230643": ["INTRODUCTION, \nCONTRIBUTION AND RELATED WORK Wireless Sensor Networks are visioned as very large col\u00adlections of smart \nsensor nodes that form ad hoc distributed sensing and data propagation networks that collect quite detailed \ninformation about the ambient environment."]} +{"10653905|1230643": ["Apart from their great advantages, wireless sensor networks (WSNs) are subject to many limitations, among which the energy constraint becomes an increasing concern [1]."]} +{"7045012|9670348": []} +{"17033643|1230643": ["Recent advances in micro-electro-mechanical systems and wireless communications empower wireless sensor networks (WSN) to play a key role in a wide range of modern smart technology applications [1]."]} +{"64454331|1230643": []} +{"52081067|26335185": []} +{"52081067|1230643": []} +{"9453695|1230643": []} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"14116937|1230643": ["Wireless Sensor Networks (WSNs) comprise of large numbers of sensor nodes that are deployed in the terrain to sense physical phenomena of interests (PoIs) [1] and transmit the sensed data to one or more centralized sinks for real-time processing and decision-making [2].", "Data from the remaining activated nodes are suppressed for a suppression interval to reduce transmission costs 2 ."]} +{"44871094|1230643": ["WSNs can be widely used to perform military tracking and surveillance, natural disaster relief, hazardous environment exploration and health monitoring etc [1-2]."]} +{"116353331|205286988": []} +{"116353331|1236072": []} +{"116353331|1230643": []} +{"34209132|206901977": []} +{"34209132|7876249": []} diff --git a/edge/graph_189928508.jsonl b/edge/graph_189928508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38368f7910f155b3371f2964755569f7eb93468c --- /dev/null +++ b/edge/graph_189928508.jsonl @@ -0,0 +1 @@ +{"18241459|10559330": []} diff --git a/edge/graph_18992935.jsonl b/edge/graph_18992935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..529f10baec9f6ceacfc1424c28ffabf45f18c52b --- /dev/null +++ b/edge/graph_18992935.jsonl @@ -0,0 +1,7 @@ +{"14966842|14970359": []} +{"24416856|15744805": ["A survey on this topic has been provided (36)."]} +{"11068878|62198990": ["Other popular systems are gaze estimators based on measuring the electro-oculographic potential or corneal reflections [20, 32, 46, 52\u201354]."]} +{"1028698|62198990": ["3 Such systems determine gaze direction by comparing the pupil position in an image of a user's eye with the light pattern that occurs when incident light is reflected from the convex surface of the cornea [8]\u2013[10]."]} +{"15383652|7185733": []} +{"3050490|7185733": ["In [12], Pavlovic, Sharma, and Huang discuss different ways to model hand gestures and how such gestures are used in human-computer interaction, typically for command generation or pointing."]} +{"9230437|7185733": ["A major component of these systems is a gesture recognition engine that can operate without estimating any 3D features of hand motion [30].", "It should be mentioned that there are several reviews on hand modelling, pose estimation, and gesture recognition [49, 48, 47, 13, 30, 45], the latest of which cover studies up to 2000."]} diff --git a/edge/graph_189931013.jsonl b/edge/graph_189931013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20ae475797124b2d2c7dd19e2fbcd80324c9009f --- /dev/null +++ b/edge/graph_189931013.jsonl @@ -0,0 +1 @@ +{"9833140|1230643": ["All rights reserved."]} diff --git a/edge/graph_18996548.jsonl b/edge/graph_18996548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..272ce763225411641052d6f20d07ae59db6c7814 --- /dev/null +++ b/edge/graph_18996548.jsonl @@ -0,0 +1 @@ +{"3069473|33286487": []} diff --git a/edge/graph_19003515.jsonl b/edge/graph_19003515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46ebcee0d83c05ba9ba1e08890ad4780f8d90321 --- /dev/null +++ b/edge/graph_19003515.jsonl @@ -0,0 +1 @@ +{"206610088|60455": ["Web mining consists of Web Content Mining (WCM), Web Structure Mining (WSM), and Web Usage Mining (WUM) [6] [7] [9].", "WUM ascertains user profiles and the users' behavior recorded inside the web logfile.", "WCM and WUM have been studied by many researchers who have achieved valuable results."]} diff --git a/edge/graph_19003555.jsonl b/edge/graph_19003555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19004624.jsonl b/edge/graph_19004624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19005250.jsonl b/edge/graph_19005250.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1900885.jsonl b/edge/graph_1900885.jsonl similarity index 100% rename from graph_1900885.jsonl rename to edge/graph_1900885.jsonl diff --git a/edge/graph_19017100.jsonl b/edge/graph_19017100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1902238.jsonl b/edge/graph_1902238.jsonl similarity index 100% rename from graph_1902238.jsonl rename to edge/graph_1902238.jsonl diff --git a/edge/graph_19024555.jsonl b/edge/graph_19024555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1902483.jsonl b/edge/graph_1902483.jsonl similarity index 100% rename from graph_1902483.jsonl rename to edge/graph_1902483.jsonl diff --git a/edge/graph_19026460.jsonl b/edge/graph_19026460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f01c1491ab94365e9e579c861e7995961e158e6 --- /dev/null +++ b/edge/graph_19026460.jsonl @@ -0,0 +1 @@ +{"40437619|12860838": []} diff --git a/edge/graph_19032874.jsonl b/edge/graph_19032874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bd9e9d10e4d8e734fbbe97394ddf8fa18e2e2f1 --- /dev/null +++ b/edge/graph_19032874.jsonl @@ -0,0 +1,3 @@ +{"13360943|14545307": []} +{"190432|41035405": ["The relay channel was introduced by Van der Meulen [528]; the capacity region for the degraded relay channel was determined by Cover and El Gamal [127].", "We would also like to thank Normam Abramson, Ed van der Meulen, Jack Salz and Raymond Yeung for their suggested revisions."]} +{"2233231|14545307": []} diff --git a/edge/graph_19034128.jsonl b/edge/graph_19034128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfcaadfb24e678e6aff97dab59a2e39605d709f0 --- /dev/null +++ b/edge/graph_19034128.jsonl @@ -0,0 +1,4 @@ +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} diff --git a/edge/graph_19037593.jsonl b/edge/graph_19037593.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7f1b2a6629a2852bfb00cd790f77c600d38162c --- /dev/null +++ b/edge/graph_19037593.jsonl @@ -0,0 +1 @@ +{"38622873|33829339": []} diff --git a/edge/graph_19039533.jsonl b/edge/graph_19039533.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..583fbf2d81ab38e9348ccb22515611c9f2ccaaa3 --- /dev/null +++ b/edge/graph_19039533.jsonl @@ -0,0 +1,2 @@ +{"17461302|513106": ["Approximately 90 % of scientists are self-taught in developing software and one may lack basic practices such as task automation, code review, unit testing, version control and issue tracking [42, 43]."]} +{"2958085|8575576": ["Most biomedical images used for clinical treatment of patients\u2014magnetic resonance imaging (MRI) [116, 117], radiographic imaging [118, 119], positron emission tomography (PET) [120] and histopathology imaging [121]\u2014have been used as input data for deep learning algorithms."]} diff --git a/edge/graph_19043514.jsonl b/edge/graph_19043514.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_190530901.jsonl b/edge/graph_190530901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75e2dc977ac94c8a9df9363e56538eaf5f10bfdc --- /dev/null +++ b/edge/graph_190530901.jsonl @@ -0,0 +1,10 @@ +{"1921738|1634674": ["Body-worn sensors have been extensively used to recognise activities in mobile and daily life situations [16, 18]."]} +{"11246876|9045232": ["According to [47] , there are two major approaches for eye detection.", "Face localisation aims to determine the image position of a single face in an image [47] .", "Face localization based on skin colour [5,16,17,20,24,29,39,43,45,46,57] , Knowledge based method [47] , Facial feature based method [47] , Texture based face localization [47] , Face localization using template matching [47] , Appearance based method [47] , Face localization using Haar like features [13,14] ."]} +{"15098774|9270553": ["Various assistive technologies that support individual communication have been developed for disabled people based on a brain-computer interface [1]\u2013[4]."]} +{"20561234|16362395": ["However, the kNN algorithm is not efficient for big feature vectors [32], but it is efficient for small feature vectors [36]."]} +{"18200133|10948183": ["[12] reviewed EOG functions to help disabled people communicate with other people through a machine controlled by EOG."]} +{"4721305|3330313": []} +{"18599847|17772052": ["The traditional approach of analyzing e-nose data involves extracting information in the static and dynamic phases of the signals [44] for the use of static pattern analysis techniques (PCA, discriminant function analysis, cluster analysis and neural networks)."]} +{"18599847|38476": ["Analysis of 5 time-series data has been the subject of active research for decades (Keogh 6 and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu 7 (2006) as one of the top 10 challenging problems in data mining due to 8 its unique properties.", "Analysis of time-series data has been the subject of active research for decades (Keogh and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu (2006) as one of the top 10 challenging problems in data mining due to its unique properties."]} +{"12339510|62198990": ["This bipolar measurement method has been widely utilized in various applications since 1936, when it was first revealed that EOG components reflect the horizontal and vertical movements of eyes [5]."]} +{"9071986|17221751": ["obtaining good results recognizing spontaneous reactions is still difficult [8]."]} diff --git a/graph_1906163.jsonl b/edge/graph_1906163.jsonl similarity index 100% rename from graph_1906163.jsonl rename to edge/graph_1906163.jsonl diff --git a/edge/graph_1906759.jsonl b/edge/graph_1906759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19094542.jsonl b/edge/graph_19094542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19095117.jsonl b/edge/graph_19095117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6eb9532266a2df7655feca0c4d40fe9a0c430c90 --- /dev/null +++ b/edge/graph_19095117.jsonl @@ -0,0 +1,6 @@ +{"2176003|2277438": []} +{"109053897|10859746": []} +{"13972359|19095117": ["However, due to the increasing incompatibility of the Google Earth API with modern web browsers, Google decided to retire the Google Earth API [1,37], and it did not provide any clear alternatives for the established web-based 3D visual globe applications.", "In recent years, the importance of time-dynamic geospatial objects and their virtual globe-based applications has been rapidly increasing [1\u201315]."]} +{"32407786|11475865": ["The current trend of Digital Earth systems shows that their visualization aspects (and perhaps analysis and processing in the near future) can be improved via the inclusion of another type of data: 3D geometric data sets [62, 63] that model objects such as houses, office towers, bridges, cars, or trees."]} +{"32407786|1877246": []} +{"32407786|10813427": ["The modeling, rendering, compression, and multiresolution representation of such models are very well studied, and survey papers exist that discuss these subjects for terrains in detail [23, 24, 25, 26, 27]."]} diff --git a/edge/graph_19102570.jsonl b/edge/graph_19102570.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..456084276aca85b3399862011cfe699233c42803 --- /dev/null +++ b/edge/graph_19102570.jsonl @@ -0,0 +1,13 @@ +{"3696067|14478191": []} +{"4519185|19102570": ["For example, beyond their importance to digital evolution, the many examples of \u201cmisspecified fitness functions\u201d in this article connect to the broader field of artificial intelligence safety: Many researchers therein are concerned with the potential for perverse outcomes from optimizing reward functions that appear sensible on their surface [4, 11, 134, 37], characterized in that community as problems such as avoiding negative side effects [4, 69], reward hacking (also known as wire-heading) [4, 36], or more generally AI alignment [134]."]} +{"4519185|12092129": ["We also appreciate Tim Taylor, from whom we got the idea for crowd-sourcing the writing of this paper by an open call for material from the community in which those whose submissions were accepted would become co-authors of the paper; he successfully piloted that model for a paper we were a part of [150], and we adopted it here."]} +{"60714|1708582": ["Despite the bias-optimality properties of oops for certain ordered task sequences, however, oops-rl is not necessarily the best way of spending limited time in general reinforcement learning situations [18], such as the ones where the G\u00f6del machine is optimal in the sense of its utility function.", "In what follows, however, we will also consider the more general case where the problem solution requires interaction with a dynamic, initially unknown environment that produces a continual stream of inputs and feedback signals, such as in autonomous robot control tasks, where the goal may be to maximize expected cumulative future reward [18] (examples in Section 3.", "In this sense the G\u00f6del machine embodies a principled way of dealing with the exploration vs exploitation problem [18]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"10242377|8533795": []} +{"4730292|206739910": ["Therefore, we use the LISA dataset [18], a U.", "road signs [18] and has an accuracy of 91%, and the GTSRB*-CNN network that is trained on a modified GTSRB (German Traffic Sign Recognition Benchmark) dataset [27] and has an accuracy of 95% (Section III-A)."]} +{"3385567|4884302": []} +{"3385567|207743293": []} +{"3385567|8533795": []} +{"22007028|15219853": ["liable systems. 4. Previous Work To succeed in constructing an AI container it is important to merge techniques from a number of relevant fields such as: computer security [52], behavioral biometrics [61, 51], cryptography [22, 63], steganography [1], stylometry [3, 2], computer forensics [21, 9], utilization of artificial intelligence in security [30, 29], AI Safety [23, 28], including security work with"]} +{"22007028|5612073": ["To succeed in constructing an AI container it is important to merge techniques from a number of relevant fields such as: computer security [52], behavioral biometrics [61, 51], cryptography [22, 63], steganography [1], stylometry [3, 2], computer forensics [21, 9], utilization of artificial intelligence in security [30, 29], AI Safety [23, 28], including security work with current AIs [48] and theoretical work on Artificial General Intelligence (AGI) safety and security [49]."]} +{"22007028|12815020": ["There are many intrusion detection systems [26, 13] which might be adapted to AI containment."]} diff --git a/edge/graph_19111795.jsonl b/edge/graph_19111795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_191139890.jsonl b/edge/graph_191139890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..792f57d9604332aa22f270fc5f2d37cb7f785774 --- /dev/null +++ b/edge/graph_191139890.jsonl @@ -0,0 +1,2 @@ +{"108221782|469744": []} +{"108221782|17024419": []} diff --git a/edge/graph_191185311.jsonl b/edge/graph_191185311.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a3440a7c9d258f82810eda927321b47c3475092 --- /dev/null +++ b/edge/graph_191185311.jsonl @@ -0,0 +1,2 @@ +{"38731996|206268920": []} +{"116608951|6809492": []} diff --git a/edge/graph_19124401.jsonl b/edge/graph_19124401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..faf32f5cdfad07b157e211f4597b4d0af3e466d8 --- /dev/null +++ b/edge/graph_19124401.jsonl @@ -0,0 +1,4 @@ +{"18668989|11112426": ["Unmixing Data Mixed pixel decomposition based on the linear spectral mixture model is a popular method for estimating land cover fraction [15].", "Implementation Procedure The ISODATA algorithm was applied to cluster a Landsat image collected August 19, generating land cover component maps with class number (k) as [5,10,15,20,25,30].", "The unmixing-based method is one of these methods, which utilizes the Linear Spectral Mixture (LSM) model to extract endmembers reflectance at sub-pixel scale [15]."]} +{"15452498|11112426": ["Traditional spectral unmixing methods rely on the linear spectral mixture model to extract end members and abundances on a sub-pixel scale (Bioucas-Dias et al., 2012)."]} +{"37260208|61526720": []} +{"44935336|393948": ["sifiers like linear SVMand logistic regression can be attributed to single-layer classifiers, whereas decision tree or SVM with kernels are believed to have two layers [24].", "It is believed that deep architectures can potentially lead to progressively more abstract features at higher layers of feature, and more abstract features are generally invariant to most local changes of the input [24]."]} diff --git a/edge/graph_19127869.jsonl b/edge/graph_19127869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6781fba4db56966d8ef15dcae46e6e835f4f8c2 --- /dev/null +++ b/edge/graph_19127869.jsonl @@ -0,0 +1,2 @@ +{"16490626|11650495": []} +{"359552|11650495": []} diff --git a/graph_191396.jsonl b/edge/graph_191396.jsonl similarity index 100% rename from graph_191396.jsonl rename to edge/graph_191396.jsonl diff --git a/edge/graph_191534984.jsonl b/edge/graph_191534984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b24b9605799f6e372e6c3df1f582bc541bd97c4 --- /dev/null +++ b/edge/graph_191534984.jsonl @@ -0,0 +1,3 @@ +{"29325535|6746689": []} +{"95773369|8728131": ["Incandescent lamps, fluorescent lamps, lasers, and infrared lamps are the commonly used light sources (Kodagali, 2012)."]} +{"95773369|6252662": []} diff --git a/edge/graph_191542240.jsonl b/edge/graph_191542240.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1916781.jsonl b/edge/graph_1916781.jsonl similarity index 100% rename from graph_1916781.jsonl rename to edge/graph_1916781.jsonl diff --git a/graph_1916818.jsonl b/edge/graph_1916818.jsonl similarity index 100% rename from graph_1916818.jsonl rename to edge/graph_1916818.jsonl diff --git a/edge/graph_19181256.jsonl b/edge/graph_19181256.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1461d1d8f895bb6eae6d25d59bf39b8d421879bb --- /dev/null +++ b/edge/graph_19181256.jsonl @@ -0,0 +1,11 @@ +{"16520072|2623404": ["HISTORY OF NETWORK PROGRAMMABILITY\nOpenflow protocol was developed late 2008 by a group of researchers from different universities including Stanford University, University of Washington, MIT, Princeton University & other universities [1].", "Figure 1 explains the architecture difference between traditional network & a Software-Defined Network [4].", "NETCONF: [4] NETCONF is an IETF protocol proposed in 2006 to automate the configuration of network devices through a standard Application Programming Interface (API)."]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"18477953|763939": ["The objective of mobility models is to generate real motion patterns of the vehicles and it should include the following building blocks: [23] \uf0b7 Exact and real topology maps \uf0b7 Road obstacles/hindrances \uf0b7 Attraction/repulsion points \uf0b7 Characteristics of vehicles \uf0b7 Trip & path motion \uf0b7 Smooth\u2026"]} +{"11528463|2623404": []} +{"11528463|2387055": []} +{"11528463|206584087": []} +{"70342844|11013798": ["It is supported by many researches on network diagnosis [16] and counts on many free-licensed toolboxes [17][18][19]."]} +{"70342844|9436742": ["We consider that self-healing principles are mature enough and supported by many researches [14] that position them as the proper solution for enabling automation and intelligence on SDN architectures."]} +{"33118584|2623404": []} +{"33118584|10693567": []} +{"33118584|3189715": []} diff --git a/edge/graph_19195441.jsonl b/edge/graph_19195441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1919905.jsonl b/edge/graph_1919905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1920725.jsonl b/edge/graph_1920725.jsonl similarity index 100% rename from graph_1920725.jsonl rename to edge/graph_1920725.jsonl diff --git a/edge/graph_19209226.jsonl b/edge/graph_19209226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7802c0136a7e04cb20087c5e78c99d6e5c933bd7 --- /dev/null +++ b/edge/graph_19209226.jsonl @@ -0,0 +1,15 @@ +{"13699122|2323881": []} +{"125504806|17221751": []} +{"206592484|456491": []} +{"53304118|9928823": []} +{"53304118|393948": []} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"10978263|207060556": ["As the faces are detected by the face detector [26], a shape of one face is then modeled by a point distribution."]} +{"57670049|17221751": ["However, very few work has been carried out on micro-expression recognition [3].", "[3] provides a summary of methodologies used for facial expression recognition."]} +{"54435303|17221751": ["version the Multi-PIE database [13]; and the Genki-4K database [14], have been developed (see Table 1) [6], [15]."]} +{"9251856|17221751": []} +{"10908202|1118130": []} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"4871056|11074234": ["Detecting and recognising human faces and facial expressions has attracted increasing attention from psychologists, cognitive scientists and computer scientists due to its application to human computer interaction [117, 118], law enforcement and security [119] and computer animation."]} +{"4871056|6923178": ["More detailed information on these measures can be found in [151]."]} +{"4871056|17069874": ["An extended feature representation using Local Binary Patterns on Three\nOrthogonal Planes (LBP-TOP) combined with Gaussian Derivatives (GD) is created for micro-movement recognition\n2.", "80\n4.3 LBP-TOP with Gaussian Derivative Feature . . . . . . . . . . . . . 81\n4.3.1 Normalisation . . . . . . . . . . . . . . . . . . . . . . . . . .", "130 7.4 Micro-movement method comparison. . . . . . . . . . . . . . . . . . 132\n8.1 Research objectives and outcomes. . . . . . . . . . . . . . . . . . . 139\nxi\nList of Abbreviations\n2D 2-Dimensional\n3D 3-Dimensional\nAAM Active Appearance Model\nABT Adaptive Baseline Threshold\nASM Active Shape Model\nAU Action Unit\nAUC Area Under Curve\nCASME Chinese Academy of Science Micro-Expressions\ndf Degrees of Freedom\nDFT Discrete Fourier Transform\nDPM Deformable Part Models\nEMFACS Emotion FACS\nFACS Facial Action Coding System\nfps Frames per Second\nFP False Positive\nFPR False Positive Rate\nFN False Negative\nGD Gaussian Derivatives\nxii\nHOG Histogram of Oriented Gradients\n3D HOG 3D Histogram of Oriented Gradients\nHOOF Histogram of Oriented Optical Flow\nJACFEE Japanese and Caucasian Facial Expressions of Emotion\nLBP Local Binary Patterns\nLBP-TOP Local Binary Patterns on Three Orthogonal Planes\nLED Light Emitting Diode\nMDMO Main Directional Mean Optical-flow\nMETT Micro-Expression Training Tool\nMCC Matthew\u2019s Correlation Coefficient\nOOB out of bag\nPWA Piecewise Affine\nSAM Self-Assessment Manikins\nSAMM Spontaneous Activity of Micro-Movements\nSAT Summed Area Table\nSD Standard Deviation\nSMIC Spontaneous Micro-Expression Corpus\nSVM Support Vector Machines\nTIM Temporal Interpolation Model\nTP True Positive\nTPR True Positive Rate\nTN True Negative\nRF Random Forests\nROC Receiver Operating Characteristic\nxiii\nROI Regions of Interest\nUSF-HD University of South Florida-High Definition]\nVBM3D Video Block Matching and 3D filtering\nYorkDDT York Deception Detection Test\nxiv\nList of Publications\nThis thesis is based on material from the following publications:\n1.", "Most sources of noise is generally characterised as additive Gaussian [160], however Poisson noise can be found when video sequences are acquired under quantum-limited conditions.", "40 3.2 83 points detected using Face++. . . . . . . . . . . . . . . . . . . . 42 3.3 Piecewise affine warping. . . . . . . . . . . . . . . . . . . . . . . . . 46 3.4 Gaussian smoothing on an image. . . . . . . . . . . . . . . . . . . . 49 3.5 LBP image. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .", "The contributions towards this aim are: an extended feature descriptor to describe micro-facial movement namely Local Binary Patterns on Three Orthogonal Planes (LBP-TOP) combined with Gaussian Derivatives (GD); a dataset of spontaneously induced micro-facial movements, namely Spontaneous Activity of Micro-Movements (SAMM); an individualised baseline method for micromovement detection that forms an Adaptive Baseline Threshold (ABT); Facial Action Coding System (FACS)-based regions are proposed to focus on the local movement of relevant facial areas."]} diff --git a/graph_1923606.jsonl b/edge/graph_1923606.jsonl similarity index 100% rename from graph_1923606.jsonl rename to edge/graph_1923606.jsonl diff --git a/edge/graph_19236475.jsonl b/edge/graph_19236475.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63f0b0e9defa5e59d4c17d6071649cee34890147 --- /dev/null +++ b/edge/graph_19236475.jsonl @@ -0,0 +1,33 @@ +{"30623248|6414421": ["With a key generation protocol including quantization, information reconciliation, and privacy amplification, the users can establish a common cryptographic key through the noisy channel measurements [1].", "KEY GENERATION extracts common randomness of the unpredictable features residing in wireless channels between users [1]."]} +{"26689579|6414421": ["Key generation, an active research direction of PLS, automatically generates keys at each side of two legitimate users, Alice and Bob, from the randomness of their common wireless channel [8], [9]."]} +{"26689579|6779551": []} +{"26689579|4395259": ["Physical layer security (PLS), which exploits channel characteristics to provide information-theoretic security for wireless communications, has been extensively researched for the protection of future 5G networks [7]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"10449088|6414421": ["In the literature, this is usually referred to as spatial decorrelation [14]."]} +{"107354|6414421": ["Key generation exploiting unpredictable characteristics of wireless channels is information-theoretically secure [1], [2] and has been an active research direction in physical layer security (PLS) [3], [4]."]} +{"107354|4395259": ["Index Terms\u2014Physical layer security, key generation, wireless communications\nI. INTRODUCTION\nKey generation exploiting unpredictable characteristics of wireless channels is information-theoretically secure [1], [2] and has been an active research direction in physical layer security (PLS) [3], [4].", "Key generation exploiting unpredictable characteristics of wireless channels is information-theoretically secure [1], [2] and has been an active research direction in physical layer security (PLS) [3], [4].", "As one of the few implementable PLS techniques, key generation can be constructed in current wireless devices."]} +{"6414421|4395259": ["Pioneered by Wyner\u2019s wiretap channel model [11], keyless security does not require keys for encryption but employs code design and channel properties of legitimate users and eavesdroppers to achieve secrecy (see [8] and references therein).", "1, PLS schemes are composed of keyless security and secret key-based secrecy [8]."]} +{"21084327|6779551": ["Many techniques have been proposed in the literature to provide security services at different layers of the protocol stack [3]."]} +{"21084327|4395259": ["Rather than being reliant on computational complexity like upper layer encryption, these techniques provide information-theoretic security that cannot be broken by computing power [6]."]} +{"20739058|12681089": ["We investigated the secrecy capacity of the transmit-receive diversity system with the proposed randomized eigenvectorbased jamming signal precoding under the i.i.d. channel model [ 1 ]."]} +{"28307247|16888186": []} +{"28307247|4395259": ["The choice of action depends on where its instantaneous channel fading gain to the LFC falls between a set of publicly known thresholds f 1; 2; 3g, with (2)More rigorous definitions and examples can be found in [79]\u2013[81] and the extensive references within."]} +{"26090902|6779551": ["[159] gave a survey, which summarized the security requirements and security attacks of wireless networks, followed by security protocols and algorithms in existing wireless network standards."]} +{"26090902|3453202": ["This attack was investigated in [163] and [168], which wants to send jamming signals to minimize secrecy capacities.", "It is worth mentioning that [163] made a con-"]} +{"26090902|4395259": ["The survey in [158] divided PHY-security issues into two categories: i.", "Finally and most importantly, different from the survey in [158], we discuss the newest precoding techniques in signal processing areas, such as transmit precoding and cooperation schemes in MIMO and relay systems, which are emerging technologies in next generation wireless communications.", "Third, the organization on PHY-security in this paper is different with the survey in [158]."]} +{"26090902|18148591": ["The advancement in wireless technologies has improved communication service quality significantly, by exploring spatial diversities and multiplexing gains with the help of multiantennas technologies [152] or using cooperative strategies with the help of relays [153].", "To further enhance the transmission rates with the constraints of PHY-security, many investigators developed multi-antenna technologies [152], [190] to increase secrecy"]} +{"5762697|4395259": ["It is worth mention here that coherence time of a wireless channel is defined as the time during which the channel measurements remain predictable [12].", "Reciprocity of radio wave propagation states that the multipath properties of the radio channel, such as gains, phase shifts and delays are identical on both directions of a link at any point in time [12].", "In our method, we use a modified version of Mathur\u2019s quantizer [9, 12] in conjunction with well-known information reconciliation [14, 24] and modified privacy amplification techniques."]} +{"2019659|14545307": ["Quantization techniques are generally classified into two main categories which are the lossless and lossy [26],[13]."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"15321667|6414421": ["Key generation from the randomness of wireless fading channels is a promising alternative and has received extensive research attention [2], because this technique is informationtheoretically secure, lightweight and does not require any help from other users."]} +{"8223034|207262843": ["Second, as it runs at application level it can be the seed of a Software Defined Networking ( SDN ) [22] or Network Function Virtualization ( NFV ) [23] Application Programming Interface ( API ), which provides RSSI estimation and redundant statistic information to localization applications in 5G\u2026"]} +{"206819758|6779551": ["Communication security is conventionally handled by applying cryptographic schemes in upper layers (data link layer and above) [1], [2]."]} +{"206819758|4395259": ["PLE differs from physical layer security (PLS) schemes, which aim to achieve information-theoretic security by exploiting channel characteristics, but not by encryption (see [15] and [16] and the references therein)."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} diff --git a/edge/graph_192521836.jsonl b/edge/graph_192521836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2abac0ca20dfe5934c86731a2f527e775fe4ceb --- /dev/null +++ b/edge/graph_192521836.jsonl @@ -0,0 +1,24 @@ +{"44083468|3450996": ["To improve the performance of data forwarding in MSNs, a significant problem in the research of MSNs is to measure the centrality (importance) of nodes in the network [9]\u2013[11]."]} +{"53102302|3450996": ["The aforementioned scenario in fact is just like data offloading through opportunistic mobile networks [12]."]} +{"53102302|38911919": [", it tries to prolong the lifetime of a cluster to keep a stable topology [13]\u2013[15].", "Then it claims itself as the cluster head [13]."]} +{"8420169|763939": ["A survey is presented in chapter by Awwad, Yi, and Stojmenovic in [ ]. fsew other chapters in the same book survey ongoing research activities on experimental testbeds and simulation"]} +{"8420169|1940388": ["Indeed, while MANET represents an engineering approach to hide node mobility by constructing \u201cstable\u201d end-to-end paths as in opportunity to exploit ."]} +{"8420169|6275330": ["The need for real development produced orthogonal approach to MANET validation While initially simulation was largely used [27 it was quite soon replaced by large testbeds deployed at several universities, 3 which are open for access to the research community."]} +{"8420169|1230643": []} +{"53730401|3450996": []} +{"53730401|3557411": []} +{"135|14441987": ["One of the main research issues in MANET is network routing ([3])."]} +{"17689312|6950376": []} +{"17689312|2294541": []} +{"17689312|18194234": []} +{"17689312|1462862": []} +{"17689312|10137283": []} +{"17689312|9240891": []} +{"12638820|1113420": []} +{"206584117|763939": ["Although mobility models [70] [71] [72] [73] have been well researched, most of them are developed for mobile Ad-hoc networks and do not consider social relations among nodes, causing that they can not evaluate social-aware routing protocols."]} +{"15020555|1333339": ["In [17,18,23], the authors restricted their analysis to various trust models in the context of mobile ad hoc networks (MANETs)."]} +{"15020555|6950376": ["In [21,24], the authors discussed different applications of trust in a general wireless communication environment, whereas in [22], the authors presented an overview of trust applications in various other domains (not specific to WSN)."]} +{"15020555|14745481": ["Global information sharing is mostly applied in MANETs for the uniform distribution of trust [23,17].", "On the contrary, a malicious node has an intention to cause maximum harm to the system, even at the cost of node\u2019s own resources [48,17].", "In [17,18,23], the authors restricted their analysis to various trust models in the context of mobile ad hoc networks (MANETs)."]} +{"921208|15849973": ["For an overview of data replication techniques, see [27]."]} +{"29627628|16514036": ["M-health applications will also benefit from the integration of more sophisticated body area network systems [24] that provide improved real-time sensing capability of health parameters."]} +{"29627628|13785718": ["Many of the recently proposed mobile cloud security frameworks tend to offload the security/privacy related tasks to the cloud [8]."]} diff --git a/edge/graph_192525762.jsonl b/edge/graph_192525762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74ef3af40be65c5c4e82cc9a94bac693d17d2d47 --- /dev/null +++ b/edge/graph_192525762.jsonl @@ -0,0 +1,4 @@ +{"62288140|1236072": ["Due to the scarce physical resources of sensor nodes, WSN applications must be designed to be energy-efficient, so the operational lifetime can be maximised [12]."]} +{"62288140|1230643": ["The arrangement and management of a WSN depends on the application for which it is used [10, 46], such as military [53], environmental [74, 105, 15], health [75, 66], home [64] and some commercial applications [30, 29]."]} +{"25576812|8618569": ["Surveys on WSN technologies for industrial automation are also available in [79], [80]."]} +{"1017582|1230643": ["A wireless sensor network [1] is composed of numerous nodes distributed over an area to collect information."]} diff --git a/edge/graph_192556198.jsonl b/edge/graph_192556198.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_192575393.jsonl b/edge/graph_192575393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..721210ac656853e094a1b8c79ae197f30a474047 --- /dev/null +++ b/edge/graph_192575393.jsonl @@ -0,0 +1,6 @@ +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"114644583|5544758": []} +{"34837088|624120": []} +{"34837088|12974382": ["These tools are used together with remote sensing (Mucherino, et al., 2009) and are often combined, e.g. to use the image processing output as input to a machine learning model (Vibhute & Bodhe, 2012)."]} +{"206739717|206764452": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43]."]} +{"206739717|1029120": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43].", "easy task to separate pedestrians from background in an image or video sequences in the computer vision domain [38], and"]} diff --git a/edge/graph_192583380.jsonl b/edge/graph_192583380.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3d63681a95ac30ea0bada9c57bbd7b3bc6bb351 --- /dev/null +++ b/edge/graph_192583380.jsonl @@ -0,0 +1,22 @@ +{"42347181|16490750": ["In [23], a number of routing protocols are examined and compared with each other in terms of different quality metrics, including successful packet delivery ratio, the average end-to-end delay, and energy consumption."]} +{"42347181|1236072": ["Then, the data packets are sent based on the existing paths in the table [9].", "The founded path is stored in a route table for a specific time to prevent a repeat of this algorithm in this period [9].", "A large number of routing protocols have been proposed for finding a path from source node to sink in the terrestrial wireless sensor networks (TWSNs) [8, 9]."]} +{"42347181|1230643": ["A large number of routing protocols have been proposed for finding a path from source node to sink in the terrestrial wireless sensor networks (TWSNs) [8, 9]."]} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"28938947|870434": ["[1] note, the non-propulsion power (sensors, communication, electronics) is typically 30W, with propulsion power ranging from 15W to 110W.", "Fabricating a rugged pressure housing costs $3k, whereas a simple underwater connector costs $100 [1].", "Another problem is that standard acoustic transducers cannot simultaneously transmit and receive [1].", "The trend is also due to the fact that oceans, while covering the vast areas of Earth (70% of the Earth\u2019s surface with an average depth of 4km [1]), are still considered largely unexplored and insufficiently known."]} +{"16490480|1230643": []} +{"31355144|13475127": []} +{"7072463|6939676": ["All the algorithms studied in [32] are used in 2D static WSNs.", "Therefore, in [32], the localization algorithms are classified as known location based localization, proximity based localization, angle based localization, range and distance based localization."]} +{"7072463|6396569": ["In [20], localization algorithms are classified into target/source localization and node self-localization."]} +{"7072463|34657644": ["In [22], the classification of localization algorithms is first studied based on three categories: range-based/rangefree, anchor-based/anchor-free, distributed/centralized."]} +{"59317053|3738168": []} +{"69614027|8316096": []} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"800110|1230643": []} +{"11188425|870434": ["As a promising solution to aquatic environmental monitoring and exploration, Underwater Sensor Network (UWSN) has attracted significant attention recently from both academia and industry [1], [2], [3], [4], [5]."]} +{"73502790|206901977": ["As sensor nodes are usually battery-powered, available node energy is what determines the lifetime and ultimately usefulness of a WSN, and therefore optimizing energy consumption is a major area of WSN-related research (Anastasi et al., 2009; Rault et al., 2014)."]} +{"73502790|562065": ["\u2026and high precision sensing devices, which collect the relevant datawhichmust then bemanually downloaded and analysed, although some suchdevices can be combinedwith long-range communication networks,whichhas the benefit of allowing locations to be monitored remotely (Oliveira and Rodrigues, 2011).", "Additionally, sensor nodes are typically low-cost devices, so in the event of a device failure due to interference, the cost of replacing the device would be minimised (Oliveira and Rodrigues, 2011).", "A Wireless Sensor Network (WSN) (Karl and Willig, 2005; Corke et al., 2010; Oliveira and Rodrigues, 2011; Khan et al., 2012) is a collection of smart devices, otherwise known as sensor \u201cnodes\u201d, the numbers of which can range from a few to several hundred or even thousands, depending on the\u2026"]} +{"73502790|1940388": []} +{"20725571|870434": []} diff --git a/edge/graph_192609488.jsonl b/edge/graph_192609488.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_192623724.jsonl b/edge/graph_192623724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_192635047.jsonl b/edge/graph_192635047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b51aae1dbec44f3f436eb988465d62337603c8eb --- /dev/null +++ b/edge/graph_192635047.jsonl @@ -0,0 +1,7 @@ +{"67865681|51615396": ["(LTE) Release 14, 3GPP has added support to vehicleto-everything (V2X), enabling direct short range communications among vehicles and devices along the road infrastructure [6]."]} +{"4930284|7972041": []} +{"30427741|40725508": []} +{"24982929|40725508": ["For this reason, there is the need for a standardized system which can operate worldwide, providing an easy and efficient integration between multiple services and applications [1]."]} +{"115200229|51615396": []} +{"959185|763939": ["Ever since, vehicular mobility sim ulators have been growing their complexity and features, allowing t o accurately simulate the individual movement of vehicles ov er realistic road topologies [8].", "Fo r more details on the simulation environments mentioned in th e table, we refer the interested reader to [8], [10]."]} +{"19102864|17934515": []} diff --git a/edge/graph_192640294.jsonl b/edge/graph_192640294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_192642095.jsonl b/edge/graph_192642095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..943098f97103cb42c3570bcbfd972e60bfdc4673 --- /dev/null +++ b/edge/graph_192642095.jsonl @@ -0,0 +1,2 @@ +{"56220739|6592804": ["The constructs, a set of interrelated recommendations based on the system content, which can be seen as a structural framework, and processes that develop the procedural framework (Folan and Browne, 2005).", "\u2026en\ntif ic\nat io n of\nTr ad\neO\nffs\nSt ru\nct ur\nin g\nAc tiv\nity\nThe presented OSMS implementation and use is summarized in Table 5, which was developed by the authors.\nchoices in the context of OSMS, for the strategic performance measurement system design\n(Henry, 2006; Folan and Browne, 2005)."]} +{"1769173|627405": ["To minimise the threat of misunderstanding, as suggested by (Brereton et al., 2007), we piloted the selection criteria to reach an agreement among the reviewers on the criteria."]} diff --git a/edge/graph_192658173.jsonl b/edge/graph_192658173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19276325.jsonl b/edge/graph_19276325.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1928008.jsonl b/edge/graph_1928008.jsonl similarity index 100% rename from graph_1928008.jsonl rename to edge/graph_1928008.jsonl diff --git a/graph_1929234.jsonl b/edge/graph_1929234.jsonl similarity index 100% rename from graph_1929234.jsonl rename to edge/graph_1929234.jsonl diff --git a/edge/graph_192934.jsonl b/edge/graph_192934.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1932843.jsonl b/edge/graph_1932843.jsonl similarity index 100% rename from graph_1932843.jsonl rename to edge/graph_1932843.jsonl diff --git a/edge/graph_19334650.jsonl b/edge/graph_19334650.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19339576.jsonl b/edge/graph_19339576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19353761.jsonl b/edge/graph_19353761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9e30e454a9307c1c043ce577e6dc4df572ef183 --- /dev/null +++ b/edge/graph_19353761.jsonl @@ -0,0 +1,12 @@ +{"1498297|595093": ["While there is some theoretical work [2,3] on security aspects in smart energy systems and solutions for distinct problems in this area available [4,5], there is no comprehensive hands-on configuration guidance for developers of such energy devices."]} +{"21410496|6981610": ["The techniques used for verifying user identity [35] can vary from simple 4 digit pin, facial recognition, retinal scan verification, fingerprint verification to sophisticated biometric gait recognition, vein recognition and voice recognition."]} +{"21410496|2521001": ["Despite smart home security being critical there are some vulnerabilities in the existing systems [3], [4]."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"21993314|2521001": []} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"10473268|3734874": ["See the surveys [30, 31] and the references therein.", "[30] and Fan and Verbauwhede [31] for more extended discussions."]} +{"10473268|96441": []} diff --git a/graph_193574.jsonl b/edge/graph_193574.jsonl similarity index 100% rename from graph_193574.jsonl rename to edge/graph_193574.jsonl diff --git a/edge/graph_19358214.jsonl b/edge/graph_19358214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1939062.jsonl b/edge/graph_1939062.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1940388.jsonl b/edge/graph_1940388.jsonl similarity index 100% rename from graph_1940388.jsonl rename to edge/graph_1940388.jsonl diff --git a/edge/graph_19419973.jsonl b/edge/graph_19419973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8307251bd94f45ed5a0fc6e48c6e6905dfc40280 --- /dev/null +++ b/edge/graph_19419973.jsonl @@ -0,0 +1 @@ +{"10453270|206778272": ["Soft\u00adware refactoring \nhas been successful in restructuring the source code of a soft\u00adware system to improve the quality of \nthe software (e.g., reusability, complexity, modularity, etc.) [Bergstein 1991; Mens and Tourw\u00b4 e 2004; \nTokuda and Batory 2001].", ", reusability, complexity, modularity, etc) [Bergstein 1991; Mens and Tourw\u00e9 2004; Tokuda and Batory 2001]."]} diff --git a/edge/graph_1942523.jsonl b/edge/graph_1942523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_194321.jsonl b/edge/graph_194321.jsonl similarity index 100% rename from graph_194321.jsonl rename to edge/graph_194321.jsonl diff --git a/edge/graph_19437436.jsonl b/edge/graph_19437436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7063a02bdfcf02e73ab36570f63db56e553f9c6 --- /dev/null +++ b/edge/graph_19437436.jsonl @@ -0,0 +1,6 @@ +{"34459204|14322743": []} +{"7152224|14322743": ["There are three main uses of podcasting in higher education, as described by McGarr (2009).", "It has been suggested, specifically, that by turning students into \" knowledge creators \" (McGarr, 2009; cf. Rifkin, Longnecker, Leach, Davis & Orthia, 2010), creative podcasting helps develop a range of student competencies, including collaborative knowledge-building skills (Lee et al, 2008) and\u2026", "It was hoped that this task would foster knowledge building through critical discussion and reflective thinking in a teamwork context, as detailed in the creative podcasting literature cited above (eg, Cane & Cashmore, 2008; Frydenberg, 2008; Lazzari, 2009; Lee et al, 2008; McGarr, 2009).", "It has been suggested, specifically, that by turning students into \u201cknowledge creators\u201d (McGarr, 2009; cf. Rifkin, Longnecker, Leach, Davis & Orthia, 2010), creative podcasting helps develop a range of student competencies, including collaborative knowledge-building skills (Lee et al, 2008) and critical thinking skills (Frydenberg, 2008)."]} +{"62598451|18421953": ["A wide ranging review on the use of handheld devices in primary, secondary and tertiary education has been conducted and details the uses to which such technologies are put in a variety of educational contexts (Cheung and Hew 2009)."]} +{"7769665|14322743": []} +{"60752422|14322743": ["listening to the audio podcasts while performing other activities (McGarr, 2009).", "This is consistent with the current literature (Attewell, 2005; McGarr, 2009).", "The usefulness of m-learning is based on the premise that students can deal with the cognitive load of multitasking, i.e. listening to the audio podcasts while performing other activities (McGarr, 2009).", "Although the use of podcasts has been investigated extensively (Lightbody, McCullagh, Weeks & Hutchison, 2006; Duncan-Howell & Lee, 2007; Forbes, 2008; McGarr, 2009; Van Amelsvoort, 2009) their use by the NESB student cohort has not been reported previously."]} +{"8833585|14322743": ["Many scholars have shown that the use of podcasts and vodcasts have potential to alleviate the problem of lack of persistence of face-to-face (f2f) lectures (Edirisingha et al., 2010; Heilesen, 2010; Mcgarr, 2009; Ngambi, 2008a; Walls et al., 2010)."]} diff --git a/edge/graph_19438234.jsonl b/edge/graph_19438234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd8378601f829a337ca5d54dd017452470853bfb --- /dev/null +++ b/edge/graph_19438234.jsonl @@ -0,0 +1 @@ +{"24416856|15744805": ["A survey on this topic has been provided (36)."]} diff --git a/edge/graph_19439374.jsonl b/edge/graph_19439374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19454977.jsonl b/edge/graph_19454977.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01a11de00d3f413160e6c29c4abddd512e406e93 --- /dev/null +++ b/edge/graph_19454977.jsonl @@ -0,0 +1,6 @@ +{"8252720|1775475": ["A more thorough survey of QoS in the mobile computing environment is given in [79]."]} +{"8252720|14379823": []} +{"8252720|15471820": ["Solving interworking issues will be greatly facilitated by the pertinence of optical control protocols to IP (e.g., MPLS/GMPLS, RSVP/RSVP-TE) [ 92 ]."]} +{"8252720|11726599": []} +{"206583408|16629628": ["Unfortunately, this has been proved to be an NP-hard problem with significant computational cost for the scheduling decision [21].", "Some sub-optimal solutions to address this problem have been presented in [21]."]} +{"42716702|14379823": ["Different aspects of CAC design and performance analysis, particularly in the context of broadband integrated service digital network (B-ISDN) based on asynchronous transfer mode (ATM) technology, have been investigated in [2]."]} diff --git a/edge/graph_19456987.jsonl b/edge/graph_19456987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1949002.jsonl b/edge/graph_1949002.jsonl similarity index 100% rename from graph_1949002.jsonl rename to edge/graph_1949002.jsonl diff --git a/edge/graph_19490542.jsonl b/edge/graph_19490542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1949367.jsonl b/edge/graph_1949367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19498464.jsonl b/edge/graph_19498464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d56b53718ed13bb5c1df0089a6e1089d8c81f103 --- /dev/null +++ b/edge/graph_19498464.jsonl @@ -0,0 +1,4 @@ +{"1846400|7360895": [", they outwardly appear to be socially intelligent, even if the internal design does not have a basis in cognitive science) [8].", "This capability can be dynamic and may include a user model that helps the robot recognize human behavior and react appropriately [8]."]} +{"11023409|1517662": ["An elaborate survey of these approaches is provided in [13]."]} +{"13224350|15686373": ["Finally, from a broader perspective, the framework that is presented in this paper can contribute to the research in human\u2013 machine interaction and human factors (please refer to [36] for a review of these topics)."]} +{"34608804|1517662": []} diff --git a/edge/graph_19502816.jsonl b/edge/graph_19502816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f5151bca08729602b0125d56a712a6bd6de40ebe --- /dev/null +++ b/edge/graph_19502816.jsonl @@ -0,0 +1 @@ +{"13181307|508912": []} diff --git a/edge/graph_195069462.jsonl b/edge/graph_195069462.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2b27882727bdb77445b94c72f89e5176dae273f --- /dev/null +++ b/edge/graph_195069462.jsonl @@ -0,0 +1,68 @@ +{"51882317|1453418": ["In this paper, an energy-efficient routing protocol for OppNets (called ELPFR-MC) is proposed, which relies on the node\u2019s residual energy and location based delivery probability\nfor message forwarding.", "In Section II, some routing protocols for OppNets are described.", "INTRODUCTION OppNets [1] are considered as an enhancement of mobile ad hoc networks, where the transmission of a data packet from source to destination is achieved in a store-carry-and-forward fashion by exploiting the opportunistic connectivity.", "In [4], Yao et al. designed an energy-aware routing protocol for sparse OppNets (called ERASA), which is based on the asynchronous sleep approach.", "I. INTRODUCTION\nOppNets [1] are considered as an enhancement of mobile ad hoc networks, where the transmission of a data packet from source to destination is achieved in a store-carry-and-forward fashion by exploiting the opportunistic connectivity.", "In [7], Gao et al. proposed an energy-efficient routing protocol for OppNets\n978-1-5386-3180-5/18/$31.00 \u00a92018 IEEE\nin which the node\u2019s speed and residual energy are used as routing criteria to determine the best forwarder to carry a message to its destination.", "Many recent energy-aware routing protocols for OppNets have been proposed in the literature.", "In [5], Wennerstromy et al. proposed an energy-aware routing protocol for OppNets by investigating the heterogeneous link quality of connections.", "In [6], Khuram proposed an energy-efficient routing protocol for OppNets (called AEHBPR), in which the best forwarder of a message is selected based on a one-hop acknowledgment mechanism and the residual node\u2019s energy."]} +{"117451473|10559330": []} +{"108284779|22582078": []} +{"44224986|52059869": ["Virtualization helps to reduce network costs, while improving network performance and efficiency [341]."]} +{"44224986|7679009": []} +{"44224986|22582078": ["[101] have recently surveyed the range of opportunities and research challenges arising from the deployment of pure SDN networks in government, industry, as well as small and large-scale organizations.", "[101] do not conduct a detailed survey of hybrid SDN networks."]} +{"44224986|206578197": [", [96]\u2013[99], while virtual network embedding has been surveyed in [100]."]} +{"44224986|25911553": []} +{"44224986|6909107": []} +{"44224986|13372398": ["In a pure SDN network, the controller has complete topology knowledge, which can be readily exploited for energy efficient operation [248], [249]."]} +{"44224986|34643772": []} +{"44224986|18750590": []} +{"44224986|206578365": [", in mobile edge computing [78], [347]\u2013[350] and the Internet of Things [351]\u2013[353]."]} +{"44224986|6583734": ["Several surveys have covered the virtualization of SDN networks [93], [94] and SDN network functions [95]."]} +{"44224986|8650651": ["wireless networks [77]\u2013[83] optical networks [3], [84]\u2013[86], as well as the Internet of Things (IoT) [87], [88], cyberphysical systems [89], and smart cities [90], [91]."]} +{"44224986|11414835": ["In network virtualization, hardware and software network resources can be combined to form a single virtual network resource object or a single resource can be \u201csliced\u201d into multiple virtual resources [93], [94], [152]\u2013[158].", "Several surveys have covered the virtualization of SDN networks [93], [94] and SDN network functions [95].", "Flowvisor [338], Hyperflow [339], and the Optical Flowvisor [340] are prominent network virtualization approaches for pure SDN networks [93]."]} +{"44224986|154032": ["Green computing and networking has become a highly important research area in recent years [85], [330]\u2013[332]."]} +{"44224986|801245": []} +{"44224986|16768404": ["A semantic learning algorithm [240] is proposed to infer the legacy device configuration"]} +{"44224986|2535224": ["SDN has not only been used in wired network but also in wireless networks [97], [98], [342]\u2013[346]."]} +{"44224986|2623404": ["proposed for network management in pure SDN networks, see [50], [207]\u2013[209]."]} +{"44224986|10693567": []} +{"44224986|4269723": []} +{"44224986|10532321": []} +{"44224986|58783012": []} +{"44224986|11195746": ["This virtualization can be achieved by introducing virtual local area networks (VLANs) [119], [120] in the network."]} +{"86770689|3994942": ["Building and operating these networks is costly and their owners rely on a variety of traffic engineering techniques [1], [2] to optimise them."]} +{"23616553|10559330": []} +{"52169298|52059869": ["However, such NFV mechanisms would require hypervisor and control plane management [371]\u2013[375]."]} +{"52169298|206578486": []} +{"52169298|25746527": []} +{"52169298|7942157": ["[34] focuses on waveform designs, wireless protocol optimizations, microwave backhaul architectures, SDN architectures for backhaul and core networks, and content caching mechanism for 5G.", "In particular, we first give a brief overview of the main ULL research directions in the 5G wireless access segment and refer to the extensive 5G wireless access literature for more details [34], [35], [229], [258]\u2013[260]."]} +{"52169298|22221919": ["In particular, we first give a brief overview of the main ULL research directions in the 5G wireless access segment and refer to the extensive 5G wireless access literature for more details [34], [35], [229], [258]\u2013[260]."]} +{"52169298|206578224": ["puting, see [25]\u2013[28]."]} +{"52169298|1119376": ["(ADAS) 100\u2013250 \u03bcs few \u03bcs Power Train, Chassis Control < 10\u03bcs few \u03bcs Traffic Efficiency & Safety < 5 ms few \u03bcs Infotainment [57] Augmented Reality 7\u201320 ms few \u03bcs Prof."]} +{"52169298|6909107": ["puting, see [25]\u2013[28]."]} +{"52169298|37497601": [", time synchronization protocols have been surveyed in [18], [19], routing protocols have been surveyed in [20]\u2013[22], while congestion control protocols have", "Timing differences may arise because of clock errors, synchronization errors, as well as tracking and estimation errors [18].", "The gPTP synchronizes clocks between network devices by passing relevant time event messages [18]."]} +{"52169298|29464310": ["Split options defined by eCPRI the steps above the horizontal dashed line are processed at the BBU and the steps below the dashed line are processed at the RRH: Split E corresponds to the CPRI data, split ID corresponds to the eCPRI downlink data after scrambling, split IID corresponds to the eCPRI downlink data after pre-coding, and split IU corresponds to the eCPRI uplink data after RE-demap [243].", "However, due to time sensitive properties, TSN Ethernet is being considered as a potential candidate L2 protocol for 5G fronthaul applications as an alternative to the Common Public Radio Interface (CPRI) and eCPRI [243] protocols.", "a) Optical Transport Techniques: The Common Public Radio Interface (CPRI) [243], see Section VII-A1, imposes an overall fronthaul link delay limit of 5 ms, excluding the", "a) CPRI: The Common Public Radio Interface (CPRI) [243] is a digital interface for transporting information between Radio Equipment (RE) and Radio Equipment Control (REC)."]} +{"52169298|206576469": ["Thus, in brief, whereas the survey [17] broadly covered all latency sources up to 2014, we comprehensively cover the link and network layer latency reduction standards and studies up to July 2018.", "A survey on general techniques for reducing latencies in Internet Protocol (IP) packet networks has been presented in [17].", "The survey [17] gave a broad overview of the sources of latencies in IP networks and techniques for latency reduction that have appeared in publications up to August 2014."]} +{"52169298|11414835": []} +{"52169298|29060869": ["Also, the impact of wireless protocols on latency has been covered in a few surveys [29]\u2013[35], while smart grid communication has been covered in [36]."]} +{"52169298|2623404": [", based on a design similar to software defined networking (SDN) [81], [82], with message"]} +{"52169298|35906806": ["Additionally, autonomous automotive vehicles [6], augmented and virtual reality (AR/VR), as well as robotic applications, which are essential for Industrial IoT (IIoT), may require both high data rates as well as ULL [7]\u2013[10]."]} +{"56598070|52059869": ["To realize practically a network of service specific capabilities, NGMN defined the notion of network slicing, as a logical self-contained network, which enables customized services with respect to different business requirements on the top of a common infrastructure [1][2]."]} +{"3566615|31245252": []} +{"3566615|30575518": []} +{"3566615|34643772": []} +{"3566615|206576469": [", control signals for large automated production facilities, which have to be delivered with tight deterministic real-time quality of service (QoS) [109], [155]\u2013[157]."]} +{"3566615|8650651": []} +{"3566615|11414835": []} +{"3566615|2623404": []} +{"3566615|10693567": [", OpenFlow [166], to provide deterministic real-time QoS guarantees.", "SDN enables packet switches with a centralized control interface, e.g., OpenFlow [166], to provide deterministic real-time QoS guarantees."]} +{"3566615|485843": ["For instance, multimedia network applications require QoS from the network service, as do many network applications in industrial networks [1] and the smart grid [2] as well as networked control systems [3]."]} +{"3566615|13295407": []} +{"3566615|2295142": []} +{"3566615|14132386": []} +{"3566615|18643817": []} +{"3566615|14088590": []} +{"3566615|7857223": []} +{"3566615|10287248": ["surveys have covered the QoS routing algorithms that have been developed up to around the years 2002-2003 [98]\u2013[103]."]} +{"3566615|10559330": ["paradigms for the Internet, see [17]\u2013[22], led to a renewed interest in examining routing and spurred the development of"]} +{"3566615|4269723": ["the framework [133] has been based on Software-Defined Networking (SDN) [158]\u2013[165]."]} +{"3566615|38911919": []} +{"3566615|121289": ["The framework [133] is designed to provide strict delay QoS, which is typically required for industrial communication systems [143]\u2013[147], automotive networks [148], as well as some types of smart grid communication [149], [150] and Internet of Things communication [151]\u2013[154]."]} +{"3566615|3994942": ["and load balancing in the Internet [92], [93], content-based publish/subscribe systems [94], and green routing protocols with sleep scheduling [95]."]} +{"3566615|991041": []} +{"6034965|15255963": ["A survey providing an in-depth understanding of the fundamental results of PEC and FSMC along with their applications in wireless communication systems can be found in [100]."]} +{"6034965|1708582": ["The survey available in [202] summarizes the historical basis of the reinforcement learning and provides practical implementations."]} diff --git a/edge/graph_195218459.jsonl b/edge/graph_195218459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195225121.jsonl b/edge/graph_195225121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fed3c1ac47eb1889392c94608e68f001c4eb2942 --- /dev/null +++ b/edge/graph_195225121.jsonl @@ -0,0 +1 @@ +{"117381244|17758458": ["Therefore, accurate harmonic detection is highly significant in ensuring the stable and high-quality operation of a power grid [5,6]."]} diff --git a/edge/graph_195316733.jsonl b/edge/graph_195316733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf2fcd677028d4a2315e9dc9888767b03f85804e --- /dev/null +++ b/edge/graph_195316733.jsonl @@ -0,0 +1,6 @@ +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} +{"12845273|8372620": ["Barocas and Selbst survey a range of ways in which data-analysis algorithms can lead to discriminatory outcomes [3], and review articles by Romei and Ruggieri [25] and Zliobaite [30] survey data-analytic and algorithmic methods for measuring discrimination."]} +{"1389483|8372620": ["Various approaches have been proposed to make a \u201cfair\u201d binary classi\ufb01cation (Baro-cas and Selbst, 2014; Dwork et al., 2012; Feldman et al., 2015; Zliobaite, 2015)."]} +{"21670658|8372620": ["on measuring discrimination in data as well as on evaluating performance of discrimination-aware predictive models (Zliobaite, 2015; Pedreshi et al., 2008; Hajian and Domingo-Ferrer, 2013; Goh et al., 2016)."]} +{"1033682|174797842": []} +{"10048734|38476": ["Our approach allows us to efficiently incorporate domain and task specific constraints at decision time, resulting in significant improvements in the accuracy and the \u201chuman-like\u201d quality of the inferences."]} diff --git a/edge/graph_195345055.jsonl b/edge/graph_195345055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07f58c8c626953145c5240ffe33df193c6f95bd7 --- /dev/null +++ b/edge/graph_195345055.jsonl @@ -0,0 +1,22 @@ +{"207218531|2535224": []} +{"207218531|10693567": ["Innovative application software has been built to function on top of SDN controllers so that various application requirements are met [21], such as network virtualization [22], topology discovery [23], traffic monitoring [24], security enhancement [25], load balancing [26], and others."]} +{"207218531|2387055": ["At the same time, some solutions against SDN security threats have been proposed, which include controller replication schemes, authentication and authorization mechanisms, schemes to protect controllers against Denial of Service or Distributed Denial of Service (DoS/DDoS) attacks, traffic monitoring and analysis, flow-table overflow attack protection, and others [15]."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"20786481|2623404": ["forwarding in ICN is aligned with the decoupling of the data plane and control plane in SDN [18].", "Current Internet is information-driven, yet networking technology is still focused on the idea of location-based addressing and host-to-host communications [18].", "OpenFlow provides optional support for encrypted Transport Layer Security (TLS) communication and a certificate exchange between the switches and the controller(s) [18].", "ONF presents a high-level architecture for SDN that is vertically split into three main functional layers including infrastructure layer, control layer and application layer [9], [11], [18]\u2013[20], as shown in Fig."]} +{"20786481|10693567": ["DDoS defender can monitor the flows of OpenFlow switch and detect the DDoS attack via volume counting [31], [77].", "SDN as follows [10], [11], [31], [70], [71].", "architecture is that if a switch fails, the availability of the network can be maintained [31].", "4) Software-based traffic analysis: Software-based traffic analysis greatly enables innovation, as it is possible to improve the capabilities of a switch using any software-based technique [31]."]} +{"20786481|2387055": ["3) Programmability of the network by external applications: The programmability of SDN supports a process of harvesting intelligence from existing Intrusion Detection Systems (IDSs) [72] and Intrusion Prevention Systems (IPSs) [33].", "Security analysis has showed that the SDN framework suffers many security threats, including [33]:", "The authors of [33] point out that three issues of SDN include trust between all involved layers, SDN\u2019s control plane centralization and limited space in flow-tables.", "Based on the analysis, new or updated security policy can be propagated across the network in the form of flow rules [33]."]} +{"20786481|206584087": ["every packet passing through the router using Bloom Filter, which is a hash structure to reduce the memory requirement to store packet records [35].", "They generally consume less bandwidth and are stealthier in nature compared to volumetric attacks, since they are very similar to benign traffic [35].", "1) Network/transport-level DDoS flooding attacks: These attacks have been mostly launched using TCP, UDP, ICMP and DNS protocol packets and focus on disrupting legitimate user\u2019s connectivity by exhausting victim network\u2019s bandwidth [35].", "HTTP sessions and employs rate-limiting as the primary defense mechanism [35], [63]).", "Since attackers cooperate to perform successful attacks, defenders must also form alliances and collaborate with each other to defeat DDoS attacks [35].", "The authors of [35] focus on DDoS flooding attacks and defense mechanisms in wired network", "Multiple locations defensive is comprised of multiple defense nodes deployed at various locations such as source, destination or networks [35].", "fication to each packet) so that the victim can identify the path of attack traffic and distinguish it from legitimate traffic after the detection [35].", "Several taxonomies of DDoS attacks defense mechanisms have been presented in the literature [35], [37], [54].", "However, application-level DDoS flooding attacks usually have the same impact to the services since they target specific characteristics of applications, such as HTTP, DNS, or Session Initiation Protocol (SIP) [35]."]} +{"13860726|2535224": []} +{"13860726|2623404": []} +{"13860726|10693567": ["Furthermore, the OF SDN session is subject to different actions specified in the flow table (Lara et al., 2014; Banjar et al., 2014).", "In reality, OpenFlow represents a part of the entire SDN architecture (Lara et al., 2014).", "Such distinguishing features make SDNs flexible, vendor agnostic, programmable, and cost effective, and create an innovative network environment (Lara et al., 2014; Macedo et al., 2015).", "However, the current OF specification recommends the use of TLS, which provides encrypted secure channels (Lara et al., 2014).", "The data plane, which consists of switches and routers, is responsible only for forwarding traffic, whereas control logic and functionality are moved to an external entity known as the SDN controller (Nunes et al., 2014; Lara et al., 2014)."]} +{"13860726|2387055": ["APIs can be a potential target for attackers (Kreutz et al., 2015; Scott-Hayward et al., 2013).", "Although two survey papers (Scott-Hayward et al., 2013; Ali et al., 2014) were presented in the past, these works lack comprehensive thematic classifications and focus more on utilizing SDNs to secure different networks.", "The communication channel between each layer must be well protected (Scott-Hayward et al., 2013); security measures include secure coding, deployment of integrity checks, and digital signing of the code.", "The integrity and security of the SDN remain untested in the logical centralization of network intelligence (Jarraya et al., 2014; Scott-Hayward et al., 2013).", "The architecture of SDN poses new external and internal threats (Kreutz et al., 2015; Hakiri et al., 2014; Scott-Hayward et al., 2013).", "For example, an input buffer can be used to identify flow rules, and analyzing the packet processing time may determine the forwarding policy (Scott-Hayward et al., 2013).", "The south-bound interface can be targeted by communication flooding attacks, which specifically affect the control layer, the control data interface, and the data layer (Scott-Hayward et al., 2013; Benton et al., 2013)."]} +{"19007459|2387055": ["The work presented in this paper tackles the security challenge identified in [1] regarding an unauthorized application or controller access.", "A number of security issues have been identified with respect to the SDN platform in [1], [3] with specific issues relating to the security of the northbound interface.", "In [1], these challenges are identified and associated with each layer and interface of the framework."]} +{"26134989|2623404": []} +{"26134989|1956433": ["\u2026well established desirable features, such as \ufb02exibility, scalability, and simplicity [62], it is prone to several DoS and spoo\ufb01ng attacks, such as MAC \ufb02ooding, ARP poisoning, port stealing, and resource exhaustion attacks (for more information please refer to the Ethernet security survey in [33]).", "It monitors the MAC addresses on a switch port so as to limit the maximum number of MAC addresses that can be learned by the same port, and protect the Local Area Network against MAC spoo\ufb01ng and Forwarding Table over\ufb02ow attacks [33], [63].", "\u2026words, the security issues of stateful SDN data plane that we opened in this paper may be considered, to some extent, as a \u201csuperset\u201d of the security challenges that exist in already established networking contexts, such as Ethernet [33] or, more recently, Information-Centric Networking (ICN) [61]."]} +{"26134989|13172512": []} +{"15250830|2387055": ["In this paper, after having recalled the main security threats of SDN, we identified a key one that may have notably a strong impact regarding these regulation and trust aspects."]} +{"1326816|2387055": ["SDNs enable this intelligence to be written in software, as network applications, us\u00ading \nopen APIs that better facilitate agile development and perhaps faster network innovations.", "Several recent studies have investigated security issues in SDNs [19, \n33, 32].", "Several recent studies have investigated security issues in SDNs [19, 33, 32].", "[32] survey possible SDN security issues."]} +{"6469953|1956433": ["First, an OpenFlow ARP table poisoning [30] Host pro\ufb01le poisoning [11] Loop Free Forwarding BPDU spoo\ufb01ng, tampering and \ufb02ooding [19], [20] Routing advertisement spoo\ufb01ng [35] Link fabrication [11] Link Redundancy LACPDU spoo\ufb01ng [22] Link DoSing [36] Spoofed link-manipulation messages ( e.g., [22])\u2026", "Due to the lack of security protection ( e.g., no default robust authentication [19]), STP is subject to BPDU spoo\ufb01ng attacks [20], as well as BDPU tampering and BDPU \ufb02ooding ."]} +{"34639891|2623404": ["In recent years, the new paradigm of software-defined networking attracted a lot of research [21] as this concept may drastically change the network market."]} +{"17241969|2623404": ["SDN aims to simplify deployment efforts, reducing costs, and giving flexibility to management strategies [9].", "Therefore, it is common to refer to SDN controllers as the network operating system [9]."]} +{"36076946|2387055": []} diff --git a/edge/graph_195345058.jsonl b/edge/graph_195345058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bfd03c8dc71a1d13e918d899fd2302ea9766aad --- /dev/null +++ b/edge/graph_195345058.jsonl @@ -0,0 +1,7 @@ +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"53013637|4395259": ["Therefore, to support confidential data transmission, the message for each ground user should be kept secret from other users, as they may act as potential eavesdroppers [20], [21].", "Meanwhile, physical layer security (PLS) has emerged as an important issue for wireless network designs [20]\u2013[22]."]} +{"53730114|4395259": []} +{"24797392|21418": ["Recently, UAVs have also found increasingly more substantial applications in wireless communication [2], and are expected to play a significant role in the forthcoming fifth-generation (5G) wireless networks [3], [4]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} diff --git a/edge/graph_195345292.jsonl b/edge/graph_195345292.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d9760eaebbe8a18f6f5d3def91db72f08ccb874 --- /dev/null +++ b/edge/graph_195345292.jsonl @@ -0,0 +1,38 @@ +{"27921309|206583375": []} +{"37870353|8650651": ["To sum up, in the light of the information and communications technology convergence, the above mentioned network layer functions should be software defined to maximise its full potential [134], [135]."]} +{"6816078|206583375": []} +{"3619739|18167210": ["SDN has the capability of controlling and maintaining the flow centrally and intelligently through its controller.", "The central cloud server will be maintained by the SDN controller and OpenFlow controller.", "The server is used to store the information and broadcast the information through a centralized controller (e.g., Open Flow controller for software defined networking (SDN) [9]) according to the priority of the information received by OCC system.", ", Open Flow controller for software defined networking (SDN) [9]) according to the priority of the information received by OCC system."]} +{"17165859|6972141": ["When a camera is used as the receiver, VLC based positioning might look similar to the vision based positioning [15\u201318] which has been developed in robot vision or augmented reality applications, for quite long time."]} +{"17165859|206583375": []} +{"7457777|9176080": ["onditions, the initial expectation was that existing watermarking techniques could be used directly. Certainly the work in this \ufb01eld is extensive and has a long history with numerous surveys compiled [4] [35] [28] [5] [14] [27]. Surprisingly, existing methods are not directly applicable to our problem. In the \ufb01eld of watermarking, a \ufb01xed image or mark is embedded in an image often with the goal of id"]} +{"19145635|5476476": ["As the location of the mobile device is unpredictable; a reliable, dynamic, accurate, and situation-adaptive localization technique is required for LBS [1].", "This LBS approaches will not increase consumer activity without a reliable localization system.", "To move forward with consumerfacing commercial applications, location based services (LBS) for smartphones need to be improved."]} +{"19145635|9498511": []} +{"3738168|73678081": []} +{"3738168|4502294": ["However, FSO communication focuses more on long-range and high data rate outdoor terrestrial optical wireless communication (TOWC) applications such as wireless X-hauling [117]."]} +{"3738168|8316096": []} +{"3738168|8650651": []} +{"3738168|31355144": ["where the transmission between the surface station and optical sensor nodes is single hop [58].", "The architecture of static one-dimensional UOWNs also follows star topology, where the transmission between the surface station and optical sensor nodes is single hop [58]."]} +{"3738168|13475127": ["A detailed survey on marine life research using underwater sensor networks is presented in [298]."]} +{"3738168|902018": ["\u2022 Stationary two-Dimensional UOWNs: In the stationary two-dimensional architecture of UOWNs, a group of static optical sensor nodes is deployed in underwater environment [59]."]} +{"3738168|870434": ["- Fig. 4: Comparison of acouistic, RF, and optical waves under different performance metrics which are highlighted with green and red colors if they favor for high and low values, respectively. bulky [70]. The cost per acoustic node makes creating a large scale underwater acoustic network economically demanding, energy inef\ufb01cient which may necessitate battery replacement burden that can be quite a pro"]} +{"3738168|12060835": ["As surveyed in [390], ongoing research efforts on terrestrial communications have shown that energy harvesting plays a significant role in enhancing the performance."]} +{"53716317|3930401": ["OWC technologies such as VLC, LiFi, OCC, and FSOC; and RF technologies such as WiFi, 4G/5G small-small cell [6], [7], macrocell, microwave-link are considered for hybrid systems in this paper.", "The use of this band is strictly regulated [1].", "Optical camera communication [1], [5]: OCC uses LEDs and a camera as the transmitter and receiver, respectively.", "The most promising OWC technologies are visible light communication (VLC), light fidelity (LiFi), optical camera communication (OCC), and free space optical communication (FSOC) [1].", "Optical wireless communication (OWC) networks [1]-[5], the complementary of RF based networks is considering as a promising solution.", "FSO communication (FSOC) [13]: FSOC uses LD and PD as transmitter and receiver, respectively."]} +{"31799015|870434": ["On the other hand, optical modems have been shown to achieve data rates reaching to Mbit/s with ranges up to 100m, only in very clear water conditions [2].", "In underwater, radio signals attenuate rapidly, hence they can only travel to short distances while optical signals scatter and cannot travel far in adverse conditions, as well [2]."]} +{"16277818|9176080": ["\u2026simplest techniques for embedding hidden information in displays is spatial-domain steganography (or watermarking), where a spatial code (e.g., QR code [ISO 2006]) is embedded in the display image [Cheddad et al. 2010; Grundhofer et al. 2007; Yuan et al. 2013; Kamijo et al. 2008; Chan et al. 2010]."]} +{"53715253|3930401": ["However, several studies have investigated that some of the medical devices are very sensitive to electromagnetic radiation originated from RF based technologies [4], [5] which can affect the overall performance."]} +{"53715253|21386749": ["Wireless communication in present era has added a new dimension in the area of healthcare [1]."]} +{"8479688|206583375": ["As the rapid increase of data services and multimedia services, the demand of localization and navigation also increase significantly[1-4]."]} +{"34564324|5476476": ["A lot of surveys of IPS can be found [27]\u2013[30]."]} +{"34564324|17165859": []} +{"34564324|8650651": ["Due to the high transmission capacities, optical wireless networks play an important role in our modern information technology [12]."]} +{"34564324|206583375": ["According to a recent survey [5], there are various indoor positioning technologies proposed such as Radio-Frequency Identification (RFID) [6], [7], Ultra-Wideband (UWB) [8], Wi-Fi [9], [10], and fingerprint [11]."]} +{"206577724|870434": ["They are not economical for large scale UWSNs implementations [25]."]} +{"12678488|9176080": []} +{"3930401|10235514": []} +{"3930401|4502294": []} +{"3930401|12206204": ["prise ultra-dense heterogeneous networks for which mobile data volume per area will be 1000 times and the number of connected wireless devices will be 100 times higher compared to those in existing wireless networks [1].", "It will offer new services with ultra-high system capacity, massive device connectivity, ultra-low latency, ultra-high security, ultra-low energy consumption, and extremely high quality of experience [1]\u2013[6].", "Therefore, upcoming networks must have the capability to support high user data rates, low power consumption, and negligible endto-end delays [1]\u2013[6]."]} +{"3930401|16050825": ["There exist few literature reviews [14]\u2013[16], [18], [20], [44]\u2013[48] in different aspects of OWC."]} +{"3500026|17165859": ["(ToA, like in GPS) data of the light signals from various directions, on time difference of arrival (TDoA) data, on angle of arrival (AoA) data, or on received signal strength (RSS) data [39]."]} +{"5774890|9176080": ["The setting is also related to the classic watermarking literature, but only some of the work considers camera capture, usually involving ultra-low data rates of a few bits per second [3], [4].", "Video watermarking and steganography also make the embedding into images and videos imperceptible [3] [4].", "HiLight [2] modulates bits through slight pixel translucency changes, which reduces \ufb02icker to unnoticable levels but only Watermarking & Steganography [3, 4] HiLight [2] Our goal Fig.", "Watermarking & Steganography [3, 4] HiLight [2] Our goal InFrame++ [1]"]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"42886751|13372227": ["To use the triangulation technique, it is required to measure the angle or distance between a reference point and a mobile terminal, and there are several methods to measure for this purpose such as, angle of arrival (AOA), time of arrival (TOA), time difference of arrival (TDOA), and received signal strength intensity (RSSI) [11], [12]."]} diff --git a/edge/graph_195345393.jsonl b/edge/graph_195345393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195345457.jsonl b/edge/graph_195345457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d69673de3644a7346ef11f59fc7afd30d7c64b5 --- /dev/null +++ b/edge/graph_195345457.jsonl @@ -0,0 +1,2 @@ +{"119304814|3347463": ["Other researchers have used reinforcement learning methods to generate emotional text [8], [9]."]} +{"7356547|6337591": ["Previous works in this direction mainly focus on either rule-based or learning-based methods (Williams and Young, 2007; Schatzmann et al., 2006; Misu et al., 2012; Litman et al., 2000)."]} diff --git a/edge/graph_195345484.jsonl b/edge/graph_195345484.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195345856.jsonl b/edge/graph_195345856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e253f6e10ae00ebb0c86bc0f39b9bfef76ff759a --- /dev/null +++ b/edge/graph_195345856.jsonl @@ -0,0 +1,8 @@ +{"7333877|14140377": []} +{"14394633|35462776": []} +{"14394633|1113420": ["This allows to anticipate user\u2019s needs and to customize the user\u2019s experience [4]."]} +{"10998416|1113420": ["This allows one to anticipate the user\u2019s needs and to customize his/her navigation experience [3]."]} +{"10998416|206583375": []} +{"427520|1113420": ["\u2014 Context-aware computing [Schilit et al. 1994; Chen and Kotz 2000; Smailagic et al. 2001; Baldauf et al. 2006] refers to computing that adapts to the environment.", "Context-aware computing [Schilit et al. 1994; \nChen and Kotz 2000; Smailagic et al. 2001; Baldauf et al. 2006] refers to computing that adapts to the \nenvironment."]} +{"427520|44944144": ["On the \ncontrary, in ad hoc computing [Sesay et al. 2004] a network is estab\u00adlished temporarily and on demand \namong the mobile devices, without relying on .xed computers connected to a wired network.", "On the contrary, in ad hoc computing [Sesay et al. 2004] a network is established temporarily and on-demand among the mobile devices, without relying on fixed computers connected to a wired network."]} +{"427520|2451860": ["Due to these factors, early work in the .eld of mobile computing \nemphasized that classical computing techniques are insuf.cient and must be adapted to the new environment \n[Imielinski and Nath 1993; Imielinski 1996a; Pitoura and Samaras 1998; Jing et al. 1999; Barbar\u00b4 a 1999].", "This type of mobility is located within the mobile \ncomputing frame\u00adwork, which \u00b7\u00b7\u00b7 no longer requires users to maintain a .xed and universally known position \nin the network and enables unrestricted mobility of the users [Barbar\u00b4 a 1999, p. 108].", "\u2026whether in the \nreceive, transmit, or idle state [Anastasi et al. 2003], it is still important to minimize transmissions \ndue to the asymmetric communication bandwidth [Barbar\u00b4 a 1999]: there is more band\u00adwidth available from \nthe server to the mobile clients than from the clients to the server.", "\u2026\ngreat economical bene.ts, it also opens up new research issues for data management, due to the need for \nadapting existing tech\u00adniques to the mobile environment [Imielinski and Nath 1993; Alonso and Korth 1993; \nForman and Zahorjan 1994; Imielinski 1996a; Pitoura and Samaras 1998; Barbara\u00b41999].", "Looking beyond the details of the specific wireless technology, the generally accepted mobile environment infrastructure [Dunham and Helal 1995; Pitoura and Samaras 1998; Barbar\u00e1 1999; Pitoura and Samaras 2001] is composed of mobile hosts (MHs) and base stations (BSs).", "Looking \nbeyond the details of the speci.c wireless technology, the generally accepted mobile environment infrastructure \n[Dunham and Helal 1995; Pitoura and Samaras 1998, 2001; Barbar\u00b4 a 1999] is composed of mobile hosts (MHs) \nand base stations (BSs).", "] no longer requires users to maintain a fixed and universally known position in the network and enables unrestricted mobility of the users\u201d [Barbar\u00e1 1999].", "2003], it is still important to minimize transmissions due to the asymmetric communication bandwidth [Barbar\u00e1 1999]: There is more bandwidth available from the server to the mobile clients than from the clients to the server.", "Due to these factors, early works in the field of mobile computing emphasize that classical computing techniques are insufficient and must be adapted to the new environment [Imielinski and Nath 1993; Imielinski 1996a; Pitoura and Samaras 1998; Jing et al. 1999; Barbar\u00e1 1999]."]} diff --git a/edge/graph_195346046.jsonl b/edge/graph_195346046.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fcb275496027b4d6a6a85f8f05e999f4ad09b124 --- /dev/null +++ b/edge/graph_195346046.jsonl @@ -0,0 +1,5 @@ +{"10519541|7971188": []} +{"38112128|6486398": ["The connections between the two models are striking (see [78]) and it\u2019s hard to say whether HITS in\ufb02uenced PageRank, or vice versa, or whether both developed independently."]} +{"3144189|7971188": ["This choice is motivated mainly by the good properties that DHTs offer [36]."]} +{"8395950|7360895": ["This is achieved by either simply mimicking the actions of a real OSN user or by simulating such a user using artificial intelligence, just as in social robotics [24]."]} +{"2935177|1061957": []} diff --git a/edge/graph_195346070.jsonl b/edge/graph_195346070.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57c800ee272deff09fe8ba97dedbe607c895b230 --- /dev/null +++ b/edge/graph_195346070.jsonl @@ -0,0 +1,22 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"11307543|9932808": []} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"6471474|5755403": ["\u2026al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an object is then treated as\u2026"]} +{"6471474|16525678": ["While some existing reviews Valera and Velastin (2004) and Aghajan and Cavallaro (2009) tried to cover all the aspects of 0167-8655/$ -see front matter \u00d3 2012 Elsevier B.V.", "Many intelligent multi-camera video surveillance systems have been developed (Collins et al., 2001; Aghajan and Cavallaro, 2009; Valera and Velastin, 2004)."]} +{"6471474|12127129": ["Background subtraction (Piccardi, 2004) is widely used for detecting moving objects in video surveillance with static cameras."]} +{"6471474|17516538": ["\u2026and Grimson, 2000; Oliver et al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an\u2026"]} +{"14662457|8953108": ["Image thresholding methods were investigated by Sezgin and Sankur [3]."]} +{"14662457|9045232": ["Numerous techniques have been proposed to detect faces in images and video [41], [42]."]} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"4231589|5755403": ["Reviews and comparisons of different trajectory clustering methods can be found in [8, 20, 21]."]} +{"4231589|17516538": ["Reviews and comparisons of different trajectory clustering methods can be found in [8, 20, 21]."]} +{"14988444|2616070": ["This combination is made possible by the great progress LS segmentation and tracking approaches have made in recent years [12].", "To our knowledge, ours is the first approach that integrates segmentation-based LS-trackers [13, 12] with a tracking-by-detection framework for street-level mobile tracking.", "The LS tracking framework has originally been developed for following individual targets over time and has mostly been evaluated for tasks where a manual initialization is given [12, 13]."]} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} diff --git a/edge/graph_195355785.jsonl b/edge/graph_195355785.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c7b6bd75abd6544be014b54406ace3ff56891507 --- /dev/null +++ b/edge/graph_195355785.jsonl @@ -0,0 +1,13 @@ +{"12384541|1634674": ["In recent years, a large number of researchers have addressed this problem as evidenced by several extended survey papers on this topic [1, 4, 10, 18].", "Current approaches to modeling and recognizing actions of single actors can be classified into one of three major classes: nonparametric, volumetric, and parametric timeseries approaches [18]."]} +{"1040307|41505326": ["According to the survey of RGB-D datasets [63], we chose two public benchmark datasets, which contain both RGB+depth modalities and have relatively large training samples to evaluate the proposed method."]} +{"56895486|1482463": ["It has been extensively studied in the past two decades, see [5] and [64] for comprehensive surveys and different taxonomies of the state-of-the-art."]} +{"2654595|12724190": []} +{"10034253|987239": ["Extrinsic similarity of shapes has been widely addressed in computer vision, pattern recognition, and computational geometry literature (Tangelder and Veltkamp 2004; Bronstein et al. 2008c).", "For a comprehensive survey of these approaches, the reader is referred to (Tangelder and Veltkamp 2004)."]} +{"7863583|393948": []} +{"14561665|205131192": ["In this case, the moments produce minimal information redundancy [38].", "Examples of later methods include various Fourier [25, 26, 27, 28, 29] and moment-based [35, 36, 37, 38] procedures for shape analysis.", "Examples of global methods include the medial axis (also called symmetric axis) transform (MAT) proposed by Blum and described in [30, 31, 32, 17, 33, 34, 20, 22], moment based approaches [35, 36, 37, 38], and methods of shape decomposition into other primitive shapes [39, 40, 41, 42].", "Recent surveys of the field were written by Prokop and Reeves(38) and Weiss,(159) who take a more general approach.", "Recent surveys of the eld were written by Prokop and Reeves [38], and Weiss [159], who takes a more general approach."]} +{"14449726|1634674": ["The literature on complex activity modeling and recognition can be classified into three categories: graphical, syntactic, and logical approaches [12, 24].", "Activity recognition has been widely studied, but most of the literature has concentrated on relatively simple activities as evidenced in the KTH or Wiezmann datasets [24]."]} +{"655837|14545307": ["tion problems; this includes dictionary learning, principal component analysis (PCA), clustering or vector quantization [see Nasrabadi and King, 1988, Gersho and Gray, 1992], non-negative matrix factorization (NMF) [Paatero and Tapper, 1994, Lee and Seung, 1999], archetypal analysis [Cutler and\u2026", "Clustering techniques have been used for a long time on natural image patches for compression and communication purposes under the name of \u201cvector quantization\u201d [Nasrabadi and King, 1988, Gersho and Gray, 1992]."]} +{"987239|14208903": ["[26] primarily focuses on shape similarity methods that are suitable to compare CAD models in the context of product design and manufacturing applications."]} +{"987239|6681074": ["Survey papers to this literature have been provided by Besl and Jain [11], Loncaric [50] and Campbell and Flynn [16]."]} +{"987239|10592271": ["The main idea of view based similarity methods is that two 3D models are similar, if they look similar from all viewing angles, similar to one of the models of human object recognition [106]."]} +{"16606094|12724190": ["HUMAN action recognition has received increasing attention [1]\u2013[7] due to its wide range of applications such as video surveillance, human\u2013machine interaction, and robot control [8]."]} diff --git a/edge/graph_195357279.jsonl b/edge/graph_195357279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f8115da8d05279b8e864ae695accfcdfbe91c340 --- /dev/null +++ b/edge/graph_195357279.jsonl @@ -0,0 +1,14 @@ +{"17048461|1099309": []} +{"46979005|1442447": ["In Lysis the smart TV and the rendering devices, such as remote switches for air conditioning, lighting and vibration are represented as Virtual Objects (VOs) [12]."]} +{"17167341|17516538": ["The \ufb01rst component records the 3-axis accelerations of the board, the second one quanti\ufb01es the rotation of the board around its 3 axes and the last component allows a geocen-tric orientation by giving an estimation of the local magnetic \ufb01eld."]} +{"16752994|9318802": ["\u2026models for speech, audio, image, graphics, and video; interested readers can refer to \nthe recent surveys in such modeling and applica\u00adtions (e.g., [Campbell et al. 2009; Lin and Kuo 2011; \nM \u00a8 oller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010]).", "Since the emphasis of this article is on mulsemedia, we will not discuss in detail \nperception-based models for speech, audio, image, graphics, and video; interested readers can refer to \nthe recent surveys in such modeling and applica\u00adtions (e.g., [Campbell et al. 2009; Lin and Kuo 2011; \nM \u00a8 oller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010]).", ", [Campbell et al. 2009; Lin and Kuo 2011; M\u00f6ller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010])."]} +{"37429193|14749415": ["The purpose of serious games is twofold: (i) to entertain, and (ii) to have an educational impact [5]."]} +{"10477114|1020148": ["Implicit representation provides several advantages \n[Alatan et al. 2007]."]} +{"16212990|11266709": ["Immersion has been studied widely in the context of virtual environments and multimedia applications (a comprehensive overview with a focus on virtual environments can be found in [Schuemie et al. 2001])."]} +{"59616321|52296938": []} +{"11415824|17516538": ["Some specific algorithms are dedicated to the detection of specific features such as faces [40] or motion [41]."]} +{"11415824|13365762": ["This format respects the MPEG-7 standard, which yields standardized tools to structure and organize descriptions of multimedia content [48].", "The MPEG-7 standard focuses on the description of multimedia content and can contain a description of movement within a scene [48], opening many possibilities for the generation of haptic effects."]} +{"11415824|11266709": ["reports (see [69] for a survey on \u201cpresence\u201d)."]} +{"12511357|1520906": []} +{"12511357|1421946": []} +{"20191476|1099309": ["The sensorial metadata is represented using well known standards like MPEG-V [19] and MPEG-7 [71].", "It includes a Sending Buffer, a Packet Scheduler, an Encoder (such as an MPEG-7 encoder for instance) and a Packet Delivery component on the Server side and a counterpart Decoder (e.g. MPEG-7) and Content Presentation unit at the Client side.", "In terms of content, whilst the debate around mulsemedia storage is still ongoing, there seems to be agreement in the literature that, as regards (meta-) description, the two standards that should be employed are MPEG-V and/or MPEG-7.", "The sensorial metadata is represented using well-known standards like MPEG-V [19] and MPEG-7 [69].", "For this delivery, typically the mulsemedia packets are created using the mulsemedia data packet header and then they are encapsulated into an existing codec (e.g. MPEG-7).", "49, 50, 51, 66, 68] [37, 43, 69, 51, 55, 57] [36, 40, 41, 44, 45, 46, 47, 48, 49,"]} diff --git a/edge/graph_195357356.jsonl b/edge/graph_195357356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22b091b7820a5635e672f5abec82a1361fe88d36 --- /dev/null +++ b/edge/graph_195357356.jsonl @@ -0,0 +1,52 @@ +{"54172523|27806871": ["The EC techniques are broadly classified into three major domains, i.e., Intra/Spatial, Inter/Temporal and Hybrid [20].", ", Intra/Spatial, Inter/Temporal and Hybrid [20]."]} +{"54172523|64404": ["265/HEVC, formally known as SHVC [3], [4].", "The test videos are encoded using the standard settings of SHVC in an Unsliced mode.", "All these tasks are performed by our proposed SEC technique, whenever called by an SHVC decoder as shown in Fig.", "The significantly smaller computational times of the proposed SEC proves its suitability for real-time processing of SHVC video streams.", "SHVC encoder is executed on one virtual machine of typemedium.", "The computational time remains a major target in the SEC scheme, as the main motive is to support the real-time processing of SHVC video streams.", "In SHVC encoding, QP values always come in pairs.", "Test video sequences are chosen from an SHVC standard documentation [32].", "They represent a distance between a matching pixel or a block of matching pixels in the current and the reference video frames [3], [4].", "SHVC enables the Video Service Providers (VSPs) to encode videos in parts, based on spatial, temporal and signalto-noise-ratio encoding settings.", "In this paper, we propose a novel EC technique for SHVC-generated video streams, encoded on a cloud platform.", "We have proposed a scheme, in which HD and UHD videos are encoded using the SHVC standard and stored at cloud servers, formally known as media clouds.", "The block diagram of an SHVC decoder is shown in Fig.", "Due to its flexibility, SHVC is considered to be an ideal approach for VSPs to provide streaming services in real-time to mobile users who have limited processing capabilities and fluctuating bandwidths.", "Due to its popularity, Joint Video Team of Video Coding Experts Group (JVT-VCEG) has standardized a scalable extension of H.265/HEVC, formally known as SHVC [3], [4].", "In an SHVC, multiple streams are generated.", "To support the UHD video transmission using SHVC, a study was presented in [17], which considers the need for coding efficiency before transmission.", "QP pairs are chosen according to the SHVC standard documentation [32]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"114735598|37976266": []} +{"114735598|14849079": []} +{"7114876|5747564": ["Recent survey reported in [21] discussed new challenges and opportunities in smart grid wireless communications."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"29974861|44461432": ["In [80] the data mining techniques are divided in five categories: classification, clustering, association analysis, time series analysis and outlier 895", "the problem type, a large amount of techniques can be chosen in [81], [80].", "involves discovering of useful patterns from large amounts of data and applying algorithms for extracting useful and hidden information [80]."]} +{"29974861|3348390": ["Context-aware computing allows us to store context information linked to sensor data allowing an easy and meaningful interpretation [93]."]} +{"39998018|32360363": ["The approaches in which the data streams are addressed creating specific data flowsmay present strong limitations in exploiting the multidomain data relationships which are present in the city [44, 6,45]."]} +{"5276358|393948": ["The third class of algorithms and more related to our paper is unsupervised learning of visual representations from the pixels themselves using deep learning approaches [21, 26, 44, 39, 29, 47, 9, 33, 2, 49, 8]."]} +{"40980362|27806871": ["This mode offers better compression as compared to the low-delay mode and is mainly used for contents storage with almost 31% reduction in bit rate [33]."]} +{"40980362|64404": ["The details of CABAC and CALVC frameworks can be found in [27, 28]."]} +{"67084891|31245252": ["INTERNET of Things (IoT) incorporates a set of devices with sensing and actuating capabilities, and are able to connect with networking and Web technologies [1]\u2013[3]."]} +{"67084891|2829149": ["INTERNET of Things (IoT) incorporates a set of devices with sensing and actuating capabilities, and are able to connect with networking and Web technologies [1]\u2013[3]."]} +{"33808951|3348390": ["The \u201cthings\u201d can realize some communication functions by discovering their neighbors to cooperate with them [1,2]."]} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"56840820|1333339": ["Trust among the nodes in a MANET is achieved via a web of trust model [15]."]} +{"56840820|2835258": ["The position-based routing uses either face-based routing or greedy routing or a combination of these two routing algorithms [21]."]} +{"56840820|1762301": ["These routing protocols are standard routing protocols in MANETs [24, 25, 26]."]} +{"10668746|14889616": ["On the contrary, using the FGS scheme each enhancement layer is predicted from the base layer (Figure 6b).", "264/SVC standard provides three types of quality scalability: Coarse-Grained Scalability (CGS), Medium Grain Scalability (MGS) and Fine Grain scalability (FGS) [20].", "The H.264/SVC standard provides three types of quality scalability: Coarse-Grained Scalability (CGS), Medium Grain Scalability (MGS) and Fine Grain scalability (FGS) [20].", "In [20] more detailed information about scalable video coding and different scalability schemes can be found."]} +{"3712132|9207335": []} +{"9439649|27806871": ["The SEC, also known as Intra EC, is pixel-based approach and uses information from neighborhood blocks to estimate the missing ones [16].", "between video frames to find out the MVs of lost block of pixels [16]."]} +{"9439649|64404": ["match between a block in current and reference frame [9]."]} +{"21425105|24110634": ["Network control is a function of network management and configuration, scalability, energy, routing, mobility localization, interoperability and security [52]."]} +{"25044526|27806871": ["However, they do not provide a robust and defensive solution for network impairments [37]."]} +{"25044526|64404": ["265/HEVC, is used to generate encoded video bitstreams [41]."]} +{"5172416|270804": ["However, these traditional transport protocols cannot be directly implemented over wireless sensor network [6, 49] because WSN in general and WMSN in particular have their distinctive features, which make them different than typical Internet network, and they have very wide range of applications that need special requirements."]} +{"5172416|1236072": ["The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"5172416|1230643": ["WSNs are becoming more low-cost, low-power, multi-functional, and viable due to the advances in micro-electro-mechanical systems (MEMS), low power and highly integrated digital electronics, and proliferation of wireless communications [1].", "The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"159021960|37976266": ["Bibri and Krogstie (2017d) Reviewed the core enabling technologies of big data analytics and context-aware computing of smart sustainable cities."]} +{"159021960|1353379": ["The study focused on the challenges of combining IoT and big data and their e \ufb00 ect for achieving the goal of future smart cities.", "As shown, existing studies have discussed the utility of various ICTs for the development of smart city applications, such as IoT (Alam, Mehmood, Katib, Albogami, & Albeshri, 2017; Cicirelli et al., 2017), smartcards (Belanche-Gracia et al., 2015), sensors (Ang & Seng, 2016), big data analytics\u2026", "Bibri (2018b) Explored how IoT-enabled sensor-based big data applications can a \ufb00 ect the environmental sustainability, as well as related data processing platforms and computing models, of future smart sustainable cities.", "As shown, existing studies have discussed the utility of various ICTs for the development of smart city applications, such as IoT (Alam, Mehmood, Katib, Albogami, & Albeshri, 2017; Cicirelli et al., 2017), smartcards (Belanche-Gracia et al., 2015), sensors (Ang & Seng, 2016), big data analytics (Bibri & Krogstie, 2017c), security management systems (Li & Shahidehpour, 2017), geographic information systems (Aina, 2017), and virtual reality (Jamei et al., 2017).", "Using big data for smart cities inherently involves the ICT-rich nature of smart cities, such as the use of sensors throughout a city for data collection, IoT for real-time data transmission to a central server (Atzori, Iera, & Morabito, 2010), AI and cloud computing for data processing (Iyoob, Zarifoglu, & Dieker, 2013), blockchain for data security and organizational connection (Risius & Spohrer, 2017), geographic information visualization for analysis result delivery (Aina, 2017), and design of smart services for data collection and information delivery (Maglio & Lim, 2016).", "Rathore et al. (2016) Developed a four-tier architecture for smart city development and urban planning using IoT and data analytics.", "The bottom tier of the architecture is allocated for the IoT sources and data generation and collection.", "The key challenges of using IoT and big data analytics were identi \ufb01 ed, and some associated open issues were discussed.", "Cicirelli et al. (2017) Developed an IoT-based platform for a generic cyber \u2013 physical system to facilitate the design and implementation of smart city services and applications.", "Urbieta, Gonz\u00e1lez-Beltr\u00e1n, Ben Mokhtar, Anwar Hossain, and Capra (2017) Studied the modeling of IoT-based services for smart cities, which can allow mobile users to dynamically perform daily tasks.", "An analytical framework for IoT-enabled data-centric applications, which can improve the environmental sustainability of smart sustainable cities, was developed.", "D\u00edaz-D\u00edaz et al. (2017) Studied the business models of IoT and other technologies in smart cities by focusing on eight urban services provided in the city of Santander.", "This study established how IoT can contribute to reduced costs and energy consumption, how data can be managed, and how citizens can be incentivized in the services."]} +{"58991122|512561": []} +{"2901312|3042864": ["The emergence of mobile cloud computing (MCC) [10], [25], [34] facilitates reduction of task-execution time and real-time communication latency for such Smart Healthcare applications in the Smart City environment [12] [7] [37] [28] [1]."]} +{"3667158|27806871": ["265 encoded videos was conducted in [37]."]} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} +{"206936092|7188493": []} +{"206936092|16876833": []} +{"19934232|16278148": []} diff --git a/edge/graph_195357406.jsonl b/edge/graph_195357406.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..810ab5962b0c82c8abe76e51f6d3ea449f459b2e --- /dev/null +++ b/edge/graph_195357406.jsonl @@ -0,0 +1,53 @@ +{"3563410|15662958": ["As a future work, we will study privacy-aware WACA, where we will deploy privacy-preserving algorithms [21] protect user\u2019s sensitive sensor data."]} +{"3563410|6906699": ["Most conventional keystroke-based authentication schemes [16] have used dwelltime and flight-time as unique features of the users.", "Among all the biometrics, the most promising results are proposed using keystroke dynamics and mouse movements [48], [16]."]} +{"3563410|17950466": ["Among all the biometrics, the most promising results are proposed using keystroke dynamics and mouse movements [48], [16]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"17558010|15219853": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"18395575|15219853": ["Human behavioural is generated from motor-skills [19]."]} +{"1535117|15595198": []} +{"1535117|2521001": []} +{"1535117|5664472": []} +{"1535117|1634674": []} +{"114707971|9576764": []} +{"16888452|15219853": ["[9])."]} +{"40373772|3348390": ["The wide usages of emerging mobile Internet and Internet of Things (IoT) in industries have changed the way that information is acquired, stored, accessed, and delivered (He and Xu 2015; Xu, He, and Li 2014; Perera et al. 2014)."]} +{"14838210|5612073": ["Web browsing behavior has been studied for the purpose of understanding user behavior, habits, and interests [18]."]} +{"4452207|5724477": []} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"206743451|6670217": []} +{"27126670|15219853": ["Behaviometrics [27] is a recently emerging concept for identification and it promises to provide a cost effective alternative without compromising security."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"49538447|17950466": ["A lower FAR is preferred in cases where security is very important [36]."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"6055487|6906699": ["Among them, facial recognition systems [6], [13], [48], [49], which use facial features (as biometrics), and keyboard-/mouse-based authentication systems [1], [8], [16], [50], [51], [52], which rely on keystroke/mouse dynamics (as behaviometrics), are the most promising.", "AUTHENTICATION refers to the process of verifying a user based on certain credentials, before granting access to a secure system, resource, or area [1]."]} +{"6055487|17950466": ["A lower FAR is preferred in cases in which security is very important [31].", "A lower FRR is preferred for user convenience [31].", "Keyboard-based [31] + + + + + + - 0:5% to 17:6% Mouse-based [8] + + + + + + - 2:5% to 26:8% Facial recognition [43] + + + + + + - 2:4% to 20:0% CABA + + + + + + + + 1:9% 770 IEEE TRANSACTIONS ON COMPUTERS, VOL.", "Identification rate is a commonly used metric for this scenario [31].", "However, they have four drawbacks that limit their applicability: (i) their performance is easily impacted by environmental variables, such as changes in software environments, input devices, task, or interaction modes [8], [31], (ii) they can only be employed when system has a keyboard/mouse, (iii) the data often become unavailable, e."]} +{"6055487|20905429": [", heart rate, blood pressure, and body temperature, have drawn a lot of attention from researchers and begun to be adopted in practice [9], [10]."]} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"2829149|116294": ["Attacks on network availability: The denial of service (DoS) ([16], [17]) attack falls under this category."]} +{"2829149|15199849": []} +{"2829149|7889189": ["This prevention of accessibility of information to legitimate users by unknown third party intruders can take place on different layers of a network [8],[14],[15]:", "Some additional DoS attacks are as follows [7], [14], [15], [36] According to [26], the threats looming over WSN can further be classified as follows: i. External versus internal attacks ii."]} +{"2829149|1940388": ["According to [12], the attacks on WSN can be classified as: i."]} +{"49556214|17950466": ["A lower FAR is preferred in cases where security is very important [45]."]} +{"15992199|1734833": ["Among all the existing apps, the major functions by using these sensors are heath related, such as physical activities prediction, and anomaly detection and diagnosis [5]."]} diff --git a/edge/graph_195396165.jsonl b/edge/graph_195396165.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1cea4c15e2b3941f882bdaebe8995accb61ce71c --- /dev/null +++ b/edge/graph_195396165.jsonl @@ -0,0 +1,65 @@ +{"71142802|20905429": []} +{"5443987|1775475": ["help reduce the cost of health care while simultaneously improving outcomes[6].", "improvements in the performance of our system for health care [6]."]} +{"5443987|20905429": []} +{"27537498|31670805": []} +{"13419036|1734833": []} +{"13419036|20905429": ["4-capable nodes interfaced with electrocardiogram (ECG) and blood pressure sensors, as well as a basic cell phone device for data display and signal feature extraction [6]; (3) the Human++ project in the Netherlands which developed a body area network consisting of three sensor nodes and a base station [7]; (4) the CodeBlue project developed by researchers at Harvard University [8]; (5) research from the Media Laboratory of the Massachusetts Institute of Technology (MIT) which involved designing LiveNet [9]; (6) the development of the SmartVest, a wearable physiological monitoring system that consists of a vest and a variety of sensors integrated into the garment\u2019s fabric to collect several biosignals [10]; (7\u20139) and three European IST FP6 programs (the MERMOTH, MyHeart and HeartCycle projects), which are recent examples of WPM systems [11\u201314]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"3517979|21738890": ["research community to explore this domain [7]."]} +{"3517979|194321": ["The research community has introduced concepts like participatory sensing [9]."]} +{"3517979|3348390": ["Contextual information is the key to providing task specific information or services to the user [6]."]} +{"626104|20905429": ["BSNs [3] represent a specific class of WSNs in which one or multiple wireless, non-invasive wearable sensors are applied to the human body to monitor several physiological signals.", "ICT technologies and, in particular, domain-specific Wireless Sensor Networks [2] named Wireless Body Sensor Networks (BSNs) [3,4] have enormous possibilities for positively affecting the daily life of people."]} +{"303813|20905429": ["However, although several BSN-based research prototypes have been proposed to date [1], [2], almost none of them have reached the market at this time."]} +{"35986198|21386749": []} +{"37197536|37664642": ["perfect performance have already been developed, showing accuracy values of approximately 99% [13]."]} +{"37197536|62658284": ["Several recent studies proved that it is possible to identify an individual through morphological features extracted by imaging their ear [10], such as its shape, wrinkles, and ear points."]} +{"49557113|29859741": ["For example, some scenarios may connect directly to the WLAN via WiFi communication while in others it may connected using WPAN via Bluetooth [53].", "The scheme focuses on reducing energy consumption at both the sensors and the users\u2019 mobile phones by using ZigBee and Bluetooth communications.", "If ZigBee\ninterface is selected, then Bluetooth interface is switched off on the mobile phone side, which saves its energy.", "Because patients\u2019 data are sensitive, regulations do not allow them to be processed outside the healthcare organization [53].", "Meanwhile, the mobile phone runs Bluetooth scan regularly to detect sensors that need to communicate with it when there is no ZigBee communication.", "Regularly, the sensors, select the suitable communication interface (i.e., either ZigBee or Bluetooth)."]} +{"49557113|21386749": ["services remotely to reduce the risks of chronic diseases [11].", "Internet with sensing/actuating functions for gathering data [11], [23]."]} +{"49557113|3348390": ["The data captured by these sensors are not useful without understanding it, so context-aware computing is necessary to solve this challenge and to promote the IoT paradigm [18], [28]."]} +{"256317|6127042": ["able instructional strategies based on the learner\u2019s reactions, mental conditions, emotional states, and feedback (see [56] for a survey).", "tinuously adapt their teaching/training approaches to optimize learning efficiency [56]."]} +{"256317|3750204": ["refer to above-cited references or see [148] for a survey."]} +{"256317|206901977": [", on an hourly basis, battery replacement/rechargewould deterwide adoption of the device [66]."]} +{"256317|2814871": []} +{"256317|6906699": ["Authentication refers to the process of verifying a user\u2019s identity based on certain credentials [46]."]} +{"256317|16335158": ["designed for smartphones ormobile devices [170]."]} +{"256317|17950466": []} +{"256317|20905429": ["WMS-based systems have also been developed for continuous long-term healthmonitoring [1], [7]."]} +{"5956566|1599458": []} +{"5956566|10067743": ["In contrast with other approaches [76], the criterion to be a part of this BAN is that the device is worn by the user, and not its processing capability.", "In contrast with other approaches [76], the criterion to be a part of this B is that the device is worn by the user, and not its processing capability."]} +{"5956566|86629084": ["In addition, telemedicine, which was first mentioned several decades ago, is now a reality and has been highly developed and this evolution has also extended to other healthcare sectors [3]."]} +{"5956566|7854020": ["IEEE 802 has established a Task Group called IEEE 802.15.6 for the standardization of Wireless BAN [75,77,78].", "6 for the standardization of Wireless BAN [75,77,78].", "Wireless BAN operates in close vicinity to a human body and supports a variety of applications."]} +{"53088014|15895606": []} +{"53088014|5724477": []} +{"53088014|11632848": []} +{"53088014|9928823": []} +{"53088014|1634674": []} +{"13504353|2003896": []} +{"71143118|2088679": ["applying artificial intelligence techniques and neural networks [25]."]} +{"71143118|20905429": ["\u2026continuously measure, process, capture and protect the biometric data collected by sensors, including body position, weight and movements, sleep quality, blood pressure, blood oxygen saturation, body temperature, heart rhythm and rate, blood oxygen, fatigue levels, respiration rate, etc. [3, 33]."]} +{"42232853|206576720": ["5G is the support of the whole communication process of the emotion communication system [29], [30]."]} +{"46877968|6332923": []} +{"45154454|21386749": ["However, the integration of existing devices into IoT-based configuration will require backward compatibility and flexibility [33].", "The three different fundamental network types include; data centric, service centric and patient centric [33]."]} +{"46879326|20905429": []} +{"48359104|21386749": []} +{"34229296|16084499": ["In the literature, several studies cover the state of the art of current challenges facing these technologies when applied to u-healthcare systems [1, 7, 24, 25]."]} +{"11046801|20905429": []} +{"40608207|1734833": []} +{"40608207|2670121": []} +{"40608207|10206347": []} +{"40608207|20905429": []} +{"125567144|48359428": []} +{"125567144|38200299": []} +{"125567144|3761015": []} +{"125567144|3918777": []} +{"8988504|1598350": ["On the other hand, another field of technology received a lot of attention from industry and academia."]} +{"44153520|1520906": []} +{"44153520|10500613": []} +{"44153520|30443041": []} +{"13223117|20905429": ["They are equipped with medical sensors that are capable of measuring different parameters such as the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels [35]."]} +{"921084|20905429": ["pulse oximeter sensor [1], ECG signal, skin conductivity [2], piezoresistive strain gauge sensor [3], accelerometer sensor [4], etc."]} +{"35271156|12489337": ["For detailed description on other DfTr techniques, the interested reader can refer to the general survey papers [14], [15], [31]."]} +{"52837065|11293874": ["Although other techniques (such as Manhattan and city-block distances) have been suggested [42], we compute the Euclidean distance between the numerical features to estimate the distance between the training samples and the sample to be classi\ufb01ed."]} +{"25601456|21386749": ["A recent survey of wearable devices and their use is offered in [2], whereas rehabilitation systems are discussed in [3].", "health and the fitness needs of the users [2].", "Through IoT technology, a large number of physiological signals can be monitored including oxygen saturation, blood pressure, heart rate, respiration (RESP) rate, glucose level [2], [4] and user activities such as walking, standing, sleeping, etc.", "When point n > 1 is considered, LTC evaluates the segment with extremes (z[0], z[n]) and checks whether this segments falls within each of the previously obtained vertical intervals around z[1], z[2], ."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_195432938.jsonl b/edge/graph_195432938.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3794512f43e79bbbd0d12145525a19541037ac62 --- /dev/null +++ b/edge/graph_195432938.jsonl @@ -0,0 +1,16 @@ +{"2437892|2443013": ["However, LTE adopts OFDMA for downlink communication, where PRBs may locate in different subchannels that encounter frequency selective fading [22]."]} +{"22954720|25929315": ["In the literature, some approaches have been studied for controlling PRACH overload problem [4]\u2013[11], which will be explained in the next section."]} +{"13531804|7686677": ["MULTIHOP relay networks are regarded as a solution to increase coverage and capacity of cellular networks [1], [2], following the growing demand for mobile Internet and wireless multimedia applications, and the International Telecommunication Union Radiocommunication Sector/ International Mobile Telecommunications Advanced requirements for fourth-generation systems [3]."]} +{"17439719|7892994": ["Because of the central role of the scheduler in determining the overall system performance, there are many published studies on scheduling for LTE and OFDMA networks [2]\u2013[6]."]} +{"9034580|2854761": ["Different from many existing scheduling works [16], [17], we assume that, because of using the more and more advanced UE, any user can initiate multiple applications simultaneously.", "been studied extensively in the literature (see [16] and [17], and references therein)."]} +{"19994141|2871699": ["In [14], the authors review the standardization efforts and the application protocols."]} +{"19994141|3330461": ["D2D communications pose many challenges and research issues that are described in [86] and [137] along with the state-of-the-art approaches to address these challenges."]} +{"29875214|12884178": []} +{"8554440|60544116": ["The readers can refer to [4] and [5] for more LTE downlink schedulers.", "2It is noted that [5] provides a comprehensive survey of downlink scheduling algorithms in mobile WiMAX networks."]} +{"8554440|1906759": ["2 The classical downlink scheduling approaches can be divided into two categories: 1) capacity-based schemes [8]\u2013[10] and 2) fairness-based schemes [11]\u2013[13]."]} +{"10973067|16972183": ["In this paper, the average throughput Tk(t) is updated using an exponentially weighted low-pass filter with factor \u03b2 = 1/ tc = 1/25 [39], [40]."]} +{"10973067|7892994": ["However, lightweight algorithms able to schedule RBs for satisfying very sharp delay bounds still have to come (see a survey of related works [2], [3], and [23])."]} +{"32602976|11720829": []} +{"32602976|7892994": []} +{"9681048|19938676": ["Finally, Class 5 which serves monitoring and the delay are measured in hours [9]."]} +{"39851474|1588237": ["networks through Inter-Cell Interference Coordination (ICIC) approaches [5]."]} diff --git a/edge/graph_195437697.jsonl b/edge/graph_195437697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ae642b0d58d644315d1e58831b3fcd0e9546337 --- /dev/null +++ b/edge/graph_195437697.jsonl @@ -0,0 +1,65 @@ +{"18245268|2457428": ["chical group key management methods [26], [27]."]} +{"15749479|2357830": ["\u2026of a number of new versions of platforms and technologies including device and process identi\ufb01cation and tracking, sensing and actuation, communication, computational sensing, semantic knowledge processing, coordinated and distributed control, and behavioral, traf\ufb01c, and user modeling [3]."]} +{"53947688|25746527": ["In cyber-physical systems, recent effort on network-control co-design aims to jointly optimize the wireless network and control at design time [29]."]} +{"52300120|31245252": ["2845744 uses modern advanced communication technologies to increase the efficiency, reliability, security and resilience of transportation systems [11], [12], [30]."]} +{"52300120|4528002": ["With the vehicle compromised (denoted as the vehicle whose communication modules are compromised), the adversary could manipulate normal measured data or forge false data without detection by common mechanisms (e.g., cyclic redundancy check (CRC) [41]).", "Nonetheless, these route guidance schemes and other critical functional modules in ITS are vulnerable to cyber-attacks, and a number of research efforts have been devoted to this concern [18], [19], [32], [41], [44].", "Thus, vehicular networks can be considered as open networks, and can be compromised by cyber-attacks, aiming at open vehicular network interfaces [41]."]} +{"57754461|53236024": ["In this scenario, vehicles can act as communication hubs or intermediaries to share local resources, instead of sending redundant bulk of big data to cloud servers [17], [18]."]} +{"57754461|8523192": ["Being FoG nodes vehicles are capable to setup high scalable and distributed FoG environment [27], [29].", "Secondly, fault tolerance with QoS requirements is a challenging task in this environment [29] .", "Secondly, researchers have highlighted advantages of FoG computing [27]\u2013[29] towards strengthening the term and its use for future directions."]} +{"57754461|2335874": []} +{"57754461|1885014": ["It integrates traffic information from different regions using data aggregation techniques in a secure manner where RSU acts as router to exchange data [23].", "transportation accidents or dangers happened on the ahead roads [23], [46].", "Indeed, several detailed review of message dissemination schemes in VANET including [2], [3], [5], [6], [23]\u2013[26] have been given in literature."]} +{"127450025|8854215": []} +{"1098863|121289": ["We then review the multistep electricity price policy.", "Particularly, in the one-dimensional MEP model, the steps are scaled only by the quantity of electricity whereas in the two-dimensional MEP model, the steps are scaled by both the quantity of electricity and the time when the electricity is used.", "With the measurements reported from these devices, consumers can estimate their bills and manage their electricity consumption effectively whereas utility providers can estimate real-time electricity prices and optimize the power dispatch [19], [53]."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"115379216|26398795": ["[9]."]} +{"51893273|1598350": []} +{"44104746|4566470": ["I. INTRODUCTION Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason.", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|24855581": ["Deep learning has shown significant potential in approximating and reducing large, complex datasets into highly accurate predictive and transformational output, greatly facilitating human-centered smart systems [25], [98].", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|4884302": ["An alternative to the quality function, the advantage function represents relative state-action values, as opposed to absolute state-action values [19].", "The state-action value function, otherwise known as the quality function, is the source of Q-learning [19], [21].", "The model was tested both in simulated and in real environments, and experiments were conducted to evaluate appropriate model horizons and bootstrapping efficacy, sample efficiency of classification and regression for value versus collision probability predictions, and performance against various double Q-learning approaches.", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "This type of deep learning has been heavily applied to the field of robotics and computer vision [19].", "[169] J. Zhu, Y. Song, D. Jiang, and H. Song, \u2018\u2018A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things,\u2019\u2019 IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2759728.", "The two primary means of reinforcement can be divided between policy search and value function approximation, though hybrids of both have been introduced [19].", "As a seminal work on the application of Q-learning and Deep Q-Networks (DQN), Mnih et al. [93] implemented a DQN to play 49 different Atari 2600 videogames, observing four frames as environment data, extracting the game score as reward, with controller and button combinations encoded as actions.", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning.", "These typically output parameters for a probability distribution, either for continuous or discreet actions, resulting in a stochastic policy [19].", "[21] A. Bonarini, A. Lazaric, F. Montrone, and M. Restelli, \u2018\u2018Reinforcement distribution in fuzzy Q-learning,\u2019\u2019 Fuzzy Sets Syst., vol. 160, no. 10, pp. 1420\u20131443, 2009.", "For example, Zhu et al. [169] implemented stacked auto-encoders (SAEs) to realize Q-learning for transmission scheduling in cognitive IoT relays."]} +{"44104746|3645740": ["Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|31245252": [", network congestion and latency are only going to increase without a diverse array of complementary solutions [80], [82], [125], [127], [143], [147], [148], [161].", "With the unceasing growth of IoT and smart-world systems driven by the advance of CPS, in which all devices are network connected and able to communicate sensed data and monitor physical objects, larger and larger datasets are becoming available for the application of deep learning, poised to materially impact our daily lives [36], [81], [82], [89], [91], [143], [144], [161].", "Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151].", "[58], [80], [82], [94], [125], [127], [143], [145], [147], [148], [161], [165].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|2829149": ["Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151]."]} +{"44104746|3818445": ["Securing the data, operation, and mechanisms of deep learning are all the more relevant in considering edge computing, which can be a viable computing infrastructure to provision deep learning schemes [155], supporting a variety of smart-world systems (smart cities, smart manufacturing, smart grid, smart transportation, and many others).", ") are also forthcoming [13], [155], [157].", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"10853003|31245252": []} +{"53042110|595093": []} +{"3232761|763939": ["In the other types of the mobility models, microscopic approach, the movement of each individual vehicle and the vehicle behavior is important [11]."]} +{"42455857|1940388": ["The 2003 Eastern blackout was caused by the fact that programs for key areas were abnormal and failed to provide the system operators the correct state information [2]."]} +{"56718800|44104746": ["Machine learning has demonstrated great use in leveraging algorithms and mathematical models to gain the insight and intelligence of numerous systems, including image and video recognition, natural language and text analysis, robotics, autonomous vehicles, and others [134]\u2013[140].", "of I-IoT systems, both holistically and individually in control, networking and computing systems [135], [140]\u2013[143]."]} +{"56718800|4566470": ["Enabling big data sharing is important and the key techniques include the design trading platforms and algorithms [98], [99]."]} +{"56718800|9461213": ["industrial data [108]."]} +{"56718800|31245252": [", confidentiality, integrity, availability, identification and authentication, privacy and trust, among others) in the context of I-IoT [2].", "In the recent past, IoT has become a highly active research area, as it enables the interconnection of anything, anytime and anywhere [2], [6], [7].", "In smart manufacturing systems [1], along with other typical cyber-physical systems (CPS) like the smart grid [2], [3], modern information communication technologies (computation, control, communication, etc.", "I-IoT systems valuable targets for attackers [2], [14], [105], [121]\u2013[126].", "the merger of industrial cyber and physical systems that provide productive and efficient manufacturing and automation [2], [24]\u2013[27].", "connection of massively deployed and dispersed physical devices that can be used to monitor and control physical objects in CPS, such as a smart grid or smart transportation system, leading to a smart and connected world where vast numbers of everyday devices are interconnected [2], [28]."]} +{"56718800|15895606": []} +{"56718800|9495329": ["For instance,\nBizanis and Kuipers [73] surveyed techniques in radio access networks (RANs) and core networks (CNs).", "SDN can be further integrated with network virtualization (NV) to provide service to I-IoT [73], [74].", "For instance, Bizanis and Kuipers [73] surveyed techniques in radio access networks (RANs) and core networks (CNs)."]} +{"56718800|2332366": ["A typical SCADA system, as shown in Figure 6, consists of human machine interface (HMI), SCADA servers, remote terminal units (RTUs), sensors and actuators, and others [36]."]} +{"56718800|2623404": ["SDN, as a networking technique, can play a critical role in enabling the scalability and programmability of networks while coping with increasingly diverse and complex networking functions [67]."]} +{"56718800|49267479": []} +{"56718800|3818445": ["Examples include programming for edge computing, edge device naming in networks, and others [85], [88].", "Compared to cloud computing, edge computing can provide computing services with much better latency performance, as they are usually located close to end-devices [88], [92].", "Advancements in computing technologies enable the handling of complex and large-volume industrial data in a timely and efficient manner [85], [88]."]} +{"56718800|25929315": ["Along with the research and development of the 3rd Generation Partnership Project (3GPP) on LongTerm Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) [54], and the fifth generation wireless network (5G),\nM2M has been identified as a key technology for the future of communication.", "Term Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) [54], and the fifth generation wireless network (5G), M2M has been identified as a key technology for the future of communication.", "[54] A. Laya, L. Alonso, and J. Alonso-Zarate, \u2018\u2018Is the random access channel of LTE and LTE-A suitable for M2M communications?"]} +{"117154740|18740719": []} +{"15194417|595093": []} +{"26249349|31245252": ["Data-related security problems are investigated as well [13]\u2013 [17]."]} +{"53746146|15895606": ["1) Comparison With This Work: Some of the surveys discussed above present various interesting security perspectives, models and categorizations for IoT security [23], [25], [28], [39], [41], or for related areas like cyber-physical systems security [17].", "Although security attacks against cyber-physical systems [17] and IoT devices [13] have received considerable attention during the last years, the signi\ufb01cance of IoT-enabled attacks is not always fully assessed.", "Humayed et al. [17] describe a framework to model cyber-physical security.", "Several surveys in the literature exist that address many diverse aspects of security in the IoT ecosystem [2], [17], [23]\u2013[38]."]} +{"53746146|8854215": ["Several surveys [48]\u2013[51] present and categorize cyber-physical attacks on different assets of the smart grid and propose effective security countermeasures.", "As in the previous domain, we do not aim to analyze in depth the security risks of smart grids; too many surveys are available in the literature ( e.g., [48]\u2013[51]).", "The security of smart grids has been studied in various recent surveys, such as [48]\u2013[51].", "In [51] attacks on electricity market systems are also surveyed."]} +{"53746146|18451845": ["It is based on the concept that the batteries of electric vehicles can be utilized to assist the stabilization of the electricity network [101]\u2013[104]."]} +{"53746146|21386749": ["Examples of AMDs are Implantable Medical Devices (IMDs) ( e.g., heart de\ufb01brillators) and Wearable Medical Devices (WMDs) - ( e.g., insulin pumps) [192]."]} +{"53746146|2521001": ["Similar scales have been used in related works, such as the impact assessment of attacks on smart grids [50].", "For example, Komninos et al. [50] survey security challenges and countermeasures in smart grid and smart home and evaluate the security impact of related attacks.", "However, our scope will be much broader than industrial IoT (as in [26] and [33], smart vehicles (as in [29]), smart grid (as in [50]), or any other sector-speci\ufb01c analysis."]} +{"53746146|595093": ["Several surveys [48]\u2013[51] present and categorize cyber-physical attacks on different assets of the smart grid and propose effective security countermeasures.", "As in the previous domain, we do not aim to analyze in depth the security risks of smart grids; too many surveys are available in the literature ( e.g., [48]\u2013[51]).", "The security of smart grids has been studied in various recent surveys, such as [48]\u2013[51]."]} +{"12103882|17774971": []} +{"12103882|192934": []} +{"49185674|18037424": ["integration of advanced metering infrastructure and control techniques [1]."]} +{"21129978|206584087": ["[6] S.", "DDoS flooding attacks can be classified into two categories based on the targeted protocol level [6].", "Application-level DDoS flooding attacks focus on disrupting a legitimate user\u2019s services by exhausting the server resources, such as sockets, CPU, memory, disk/ database bandwidth, and I/O bandwidth [6]."]} +{"70176435|2332366": ["[45]; this work also lays out research directions and gaps in the present research."]} +{"3433247|8363289": []} +{"44129379|29060869": ["Advanced Metering Infrastructure (AMI) [9], that also goes by the name \u201csmart metering\u201d [10] is a critical component, that necessitates the realization of the vision of \u201cSmart Grid\u201d."]} +{"44129379|16323798": ["Load Monitoring (ILM) and Non-Intrusive Load Monitoring (NILM) [58].", "To address these issues, the researchers developed Appliance Load Monitoring (ALM) techniques [58], [59]."]} +{"44129379|595093": ["sensing devices, gateways and the control centers to exist in the path between the customers and the power providers for realizing the two-way communication [5], [6].", "In general, a smart grid communication system is composed of a horizontal integration of one or more regional control centers, where each center is responsible for supervising the operation of multiple power plants and substations [5]."]} +{"44129379|5747564": ["AMI also facilitates two-way communication [8], [28]"]} +{"44129379|2457428": ["For example, the works in [74], [75] show how key management helps to achieve secure group communication."]} +{"44129379|121289": ["Advanced Metering Infrastructure (AMI) [9], that also goes by the name \u201csmart metering\u201d [10] is a critical component, that necessitates the realization of the vision of \u201cSmart Grid\u201d."]} +{"3929072|62617427": ["Routing I V, I, N [9], [30], [31], [32] [15]"]} +{"85518718|2332366": ["Some older surveys dated back to 2015 and 2016 alsomention IIoT security requirements [102, 103], but they refrain from discussing such requirements in-depth."]} diff --git a/edge/graph_195438145.jsonl b/edge/graph_195438145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e095e4d51ef711f2ccb0c0d928d3528ba73955cb --- /dev/null +++ b/edge/graph_195438145.jsonl @@ -0,0 +1,4 @@ +{"4605400|17485266": ["gradient descent, momentum, and RMSProp methods [6], [7]."]} +{"52110745|15562587": ["The better performance of DNN over SVR observed in our numerical examples may be partly explained by the universal approximation property of DNN [15], which (roughly) says any function with reasonable regularity can be approximated with controlled errors by DNN with appropriate parameters."]} +{"52110745|17485266": ["Our implementation of SVR is based on the scikit-learn [21] package, and DNN regression on the TensorFlow [22] package.", "We test three variants: the plain SGD (GradientDescentOptimizer in TensorFlow), the momentum variant (MomentumOptimizer in TensorFlow), and the RMSProp variant (RMSPropOptimizer in TensorFlow) [23]."]} +{"52110745|9232391": ["1Other than the higher accuracy, DNN regression is more natural than SVR in handling the multi-output situation [13], in which the eye height and width can be predicted simultaneously through the same neural network without any additional change in the algorithm framework."]} diff --git a/edge/graph_195438579.jsonl b/edge/graph_195438579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19547951.jsonl b/edge/graph_19547951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195583977.jsonl b/edge/graph_195583977.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f18f3560643e040b5290b40073ea4e824a2a43a3 --- /dev/null +++ b/edge/graph_195583977.jsonl @@ -0,0 +1,11 @@ +{"13451663|7020971": []} +{"119426736|1676762": []} +{"1033682|174797842": []} +{"49310446|3766791": ["While use of vector-Jacobian products for solving the adjoint method has been explored in optimal control (Andersson, 2013), we explore a fully general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) and highlight its potential in deep learning and generative modeling.", "\u2026for solving the adjoint method has been explored in optimal control (Andersson, 2013; Andersson et al., In Press, 2018), we highlight the potential of a general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) for deep learning and generative modeling."]} +{"49310446|1400872": ["The use of the adjoint method for training continuous-time neural networks was previously proposed (LeCun et al., 1988; Pearlmutter, 1995), though was not demonstrated practically."]} +{"53729496|3536399": ["Despite the great success of DNN in image and speech recognition [1], the vulnerability of DNN to the adversarial attack threatens their applicability in many security-critical tasks, e.g., autonomous cars [2], robotics [13], and DNN-based malware detection systems [35, 12]."]} +{"54559221|15562587": ["Neural networks have recently been proven effective in approximating multivariate functions in various scenarios [36, 37, 38, 39, 40]."]} +{"18610799|1895753": ["inal results. Most often this corresponds to a time discretisation with standard schemes like Euler, or Runge-Kutta. Even when seeking more elaborated schemes such as event based integrations schemes [31, 146], which in principle allows one to handle continuous time, there is in fact a minimal time scale, due to numerical round-o\ufb00 error, below which the numerical scheme is not usable anymore. On more funda"]} +{"3509777|15562587": [" showed that the trajectories of input variables attain exponentially greater length and curvature with greater network depth. Work including Daniely (2017); Eldan & Shamir (2016); Pinkus (1999); Poggio et al. (2017); Telgarsky (2016) shows that there exist functions that require exponential width to be approximated by a shallow network. Barron (1994) provides bounds on the error in approximating general function", "essarily homogeneous) multivariate polynomial by a feedforward neural network, even with a single hidden layer, without increasing the number of neurons past a certain bound. (See also Corollary 1 in Poggio et al. (2017).) Theorem 3.4. Suppose that p(x) is a degree-dmultivariate polynomial and that the nonlinearity \u02d9 has nonzero Taylor coef\ufb01cients up to degree d. Let m k (p) be the minimum number of neurons in a dep", "in the following upper bound on muniform k (p), which we conjecture to be essentially tight. Our approach leverages the compositionality of polynomials, as discussed e.g. in Mhaskar et al. (2016) and Poggio et al. (2017), using a tree-like neural network architecture. Theorem 5.1. Let p(x) equal the product x 1x 2 x n, and suppose \u02d9has nonzero Taylor coef\ufb01- cients up to degree n. Then, we have: muniform k (p) = O n", ") constructions we have presented, it suf\ufb01ces to increase the number of layers by a factor of log 2 10 \u02c73, to log 2 n. The key property we use in our constructions is compositionality, as detailed in Poggio et al. (2017). It is worth noting that as a consequence our networks enjoy the property of locality mentioned in Cohen et al. (2016), which is also a feature of convolutional neural nets. That is, each neuron in a"]} +{"3804623|3766791": ["We note that the connection between the PMP and back-propagation has been pointed out qualitatively in LeCun (1988) and in the development of back-propagation (Bryson, 1975; Baydin et al., 2015), although to the best of our knowledge, this work is the first attempt to translate numerical algorithms for the PMP into training algorithms for deep learning that goes beyond gradient descent."]} +{"4173387|393948": []} diff --git a/edge/graph_195584098.jsonl b/edge/graph_195584098.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40ab562b3ad362bb9b902c774e29cef755d0718a --- /dev/null +++ b/edge/graph_195584098.jsonl @@ -0,0 +1,21 @@ +{"52129403|20527696": []} +{"12092512|1990579": ["In the case of civilian drones, functional safety [AlTawy and Youssef 2016] needs cyber-physical security."]} +{"12092512|206459491": ["Also, regular side-channel analysis, including timing and power analysis, may be used for the detection of the activation of hardware trojans [Tehranipoor and Koushanfar 2010] because such trojans usually alter the system\u2019s parametric characteristics such as its expected performance and power\u2026"]} +{"108084168|2523102": []} +{"68242765|6988770": ["[2] surveyed cloud robotics architectures and existing works [3\u20136] that attempt to integrate robot with the cloud through the Internet."]} +{"38720118|9576764": ["Our approach relates to behavioral biometrics that has been applied successfully to identify users by their behaviors while typing on keyboards [17], moving computer mice [18], or touching mobile-phone screens [19]."]} +{"38720118|6906699": ["Our approach relates to behavioral biometrics that has been applied successfully to identify users by their behaviors while typing on keyboards [17], moving computer mice [18], or touching mobile-phone screens [19]."]} +{"67424740|468992": []} +{"13751888|51858916": ["In [6], the authors provide a survey on the measurement campaigns launched for UAV channel modeling using low altitude platforms and discuss various channel characterization efforts."]} +{"13751888|2958701": ["learning solutions in support of SAR operations using UAVs [58].", "economically less expensive [58]; 2) Real-world problems with high number of states can turn the problem intractable with current techniques, severely limiting the development of real applications.", "classification which has been proven very effective [58].", "16: Illustration of How CNNs Work [58].", "Some of challenges are: 1) The design of computing devices with low-power consumption, particularly GPUs, is a challenge and active working field for embedded hardware developers [58]; 2) While a few UAVs can already travel without a UAV operators directing their routes, this technology is still emerging.", "on-board powerful processor devices with low power consumption is an active area for future researches [58].", "An efficient method for coping with these types of problems remains as an unsolved challenge [58].", "In [58], a review of deep learning methods and applications for UAVs were presented."]} +{"13751888|11701828": ["The researchers used UAVs for conducting environmental sampling and ocean surface temperature studies in the Arctic [69].", "The UAV also took a vertical sounding in the eye of the typhoon and measured the strongest winds during the whole flight mission [69]."]} +{"13751888|61132": ["\u2022 There is a need for a seamless mechanism to transfer the users during the handoff process between UAVs, when out of service UAVs are replaced by active ones [2].", "SDN also can help to address the complexity of network management [2].", "\u2022 We need more studies about the topology of UAV wireless networks where this topology remains fluid during: a) Changing the number of UAVs; b) Changing the number of channels; c) The relative placements of the UAVs altering [2].", "it is difficult to construct a simple implementation for proactive or reactive schemes [2].", "FANET communication bands to mitigate this problem [2].", "It only constitutes 10%-20% of the UAV energy capacity [2].", "to the power limitations of UAVs, a decision must be taken on whether UAVs should perform data and image analysis onboard in real-time, or data should be stored for later analysis to reduce the consumed power [2], [50].", "is distributed over all UAV nodes), or hybrid in which the processing control of the forwarded packets can be performed locally on each UAV node and control traffic also exists between the centralized SDN controller and all other SDN elements [2].", "In [2], the authors attempt to focus on research in the areas of routing, seamless handover and energy efficiency.", "Fluid topology and rapid changes of links among UAVs are the main characteristics of multi-UAV networks or FANET [2]."]} +{"13751888|76603": ["\u2022 Utilizing UAVs in public safety communications needs further research, where topology formation, cooperation between UAVs in a multi-UAV network, energy constraints, and mobility model are the challenges that are facing UAVs in public safety communications [9].", "The authors of [9] present an overview of legacy and emerging public safety communications technologies along with the"]} +{"13751888|15517134": ["The authors in [60] presented major categories of collision avoidance methods.", "Therefore, the development of UAV collision avoidance techniques has gained research interest [60], [300].", "These algorithms include: flight route determination, path planning, collision avoidance and swarm coordination [59], [60]."]} +{"13751888|3330461": ["the capacity in ground communications systems [269]."]} +{"13751888|4269723": ["in FANET with high reliability, reachability and fast mobility of UAV nodes [349] \u2022 More research is needed to develope specific security protocols for FANETs based on the SDN paradigm.", "in which the control plane is completely decoupled from data plane and the routing protocols can be executed onboard from SDN switching devices [349]."]} +{"112312165|43490812": ["of an attack once it is detected.(13) A DDoS attack exhausts the resources of the victim within a few seconds.", "A DDoS attack is a large-scale intrusion method performed by a host source that causes detrimental effects to legitimate users by withholding services.(13) This either causes the system to shut off completely or drains the system resources, such as computing power and bandwidth.", "There are various DDoS attack techniques, such as random scanning, local subnet scanning, hit-list scanning, permutation scanning, and topological scanning.(13) Figure 3 provides an insight to the steps involved in a DDoS attack.", "They are also called \u2018\u2018Early Warning Systems\u2019\u2019.(13) Preventive methods minimize the feasibility of the attack by taking remedial measures.", "They are also called \u2018\u2018Early Warning Systems\u2019\u2019.13 Preventive methods minimize the feasibility of the attack by taking remedial measures."]} +{"24856744|2142482": ["Cyber-security has been an active research area over the last two decades as evident from the numerous papers and review articles published in this area [4]\u2013[6]."]} +{"24856744|207209718": ["One such classification is to categorize the works into ones which address the problem of external intrusion detection using algorithmic methods [7]\u2013 [20] and works which use hardware-enhanced security methods to identify and mitigate internal security threats [21]\u2013 [24]."]} +{"68245425|3628110": ["The survey in [3] describes different kinds of security threats in blockchain-based systems and security-related enhancement solutions for them."]} +{"14462235|1230643": ["The advancements made in technologies for powering UAS such as solar-powered UAS with battery reserves may allow the UAS to carry long-term surveillance missions [3, 4]."]} diff --git a/graph_1956433.jsonl b/edge/graph_1956433.jsonl similarity index 100% rename from graph_1956433.jsonl rename to edge/graph_1956433.jsonl diff --git a/edge/graph_195657820.jsonl b/edge/graph_195657820.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59f44fba756d2faf12b81eff1509e079b52bd34f --- /dev/null +++ b/edge/graph_195657820.jsonl @@ -0,0 +1,6 @@ +{"16279935|1708582": []} +{"9935621|7844555": ["on specific areas, the reader may refer to [3], [4] for computer networks, [5], [6] for software, [7], [8] for industrial systems, [9] for smart buildings, [10] for buildings, [11] for machinery, [12] for swarm systems, [13], [14] for automatic control systems, [15], [16] for automotive systems and [17] for aerospace systems."]} +{"9935621|18078738": ["on specific areas, the reader may refer to [3], [4] for computer networks, [5], [6] for software, [7], [8] for industrial systems, [9] for smart buildings, [10] for buildings, [11] for machinery, [12] for swarm systems, [13], [14] for automatic control systems, [15], [16] for automotive systems and [17] for aerospace systems."]} +{"9935621|110896416": ["on specific areas, the reader may refer to [3], [4] for computer networks, [5], [6] for software, [7], [8] for industrial systems, [9] for smart buildings, [10] for buildings, [11] for machinery, [12] for swarm systems, [13], [14] for automatic control systems, [15], [16] for automotive systems and [17] for aerospace systems."]} +{"9935621|11013798": ["on specific areas, the reader may refer to [3], [4] for computer networks, [5], [6] for software, [7], [8] for industrial systems, [9] for smart buildings, [10] for buildings, [11] for machinery, [12] for swarm systems, [13], [14] for automatic control systems, [15], [16] for automotive systems and [17] for aerospace systems."]} +{"18291966|15700537": ["Traditional board-level structural test techniques (such as boundary scan test) are not sufficient to guarantee product quality since they do not mimic the functional mode adequately [7], [8]."]} diff --git a/edge/graph_195657970.jsonl b/edge/graph_195657970.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bfea65a841954ab1a177c160d376625105acd5a --- /dev/null +++ b/edge/graph_195657970.jsonl @@ -0,0 +1,64 @@ +{"52008101|3536399": ["There exist many methods to generate adversarial samples, including FGSM, JSMA, DeepFool, One Pixel Attack and so on [21]."]} +{"54447945|14022070": ["CT [24] has been successfully applied to test traditional software requiring many configurable parameters."]} +{"49895578|16426065": ["metamorphic testing [13][14][15][16])"]} +{"51922510|16426065": ["Not only the ML domain, metamorphic testing can be used on other domains [25] such as web services [26], computer graphics [27], embedded systems [28] and simulation [29]."]} +{"1033682|174797842": []} +{"37380264|8372620": ["eople due to the membership to certain demographic groups that are distinguished by the a\u2212ributes protected by law (henceforth, protected a\u2039ributes). A discriminatory action may be direct or indirect [81]. A direct discrimination is said to occur when a person is treated less favorably than another is, has been or would be treated in a comparable situation on account of a protected a\u2212ribute. An indire"]} +{"64904100|16426065": ["Metamorphic testing was first proposed by Chen [16] [17] for solving oracle problems in \u201dnon-testable\u201d programs.", "It aims at verifying the satisfiability of a Metamorphic Relation (MR) among the outputs of the corresponding MR related tests, rather than checking the correctness of the individual outputs [16] [17]."]} +{"64904100|393948": ["One of the promises of deep learning is replacing handcrafted features with efficient algorithms for unsupervised or semi-supervised feature learning and hierarchical feature extraction [4].", "Deep learning [4] [1] is a natural selection as an alternative to SVM."]} +{"55702297|8589228": ["The test needs to be relaxed with a confidence interval (r\u2212\u03b4, r+\u03b4), where neither hypothesis is rejected and the test continues to bound both types of errors [23].", "One difficulty of this approach is to find an appropriate number of tests to be performed such that the error bounds are valid [23].", "The algorithm is based on the idea of statistical model checking [23].", "The other approach is the sequential probability ratio test (SPRT [23]).", "SPRT is usually faster than FSST as the testing process ends as soon as a conclusion is made [23]."]} +{"174802478|17292349": ["Particularly, structural coverage criteria are used to guide the test case generation [2, 10, 14]."]} +{"17635879|16426065": ["Metamorphic testing is a potential technique to address the oracle problem though developing oracles with MRs [25].", "Metamorphic testing [3][25] as a novel software testing technique is a promising approach for solving oracle problems."]} +{"17635879|4602249": ["One of the greatest challenges that occurs due to the characteristics of scientific software is the oracle problem [16].", "Test generation is another important task in software testing, and it is even more difficult for scientific software due to the complex data types and large amount of input parameters [16].", "However, the application of metamorphic testing to large scale of scientific software is rare because the identification of MRs for adequately testing complex scientific software is infeasible [16].", "Scientific software includes a large computational component for supporting scientific investigation and decision making [16]."]} +{"67855626|7165993": ["In other words, validation of machine-learning models faces the oracle problem [15] in software testing."]} +{"52185625|1572419": ["The confounding-factor problem needs more attention in biomedical applications where usually all the side information such as gender and age can serve as confounding factors (Yue and Wang 2018)."]} +{"46984534|14971559": []} +{"46984534|14022070": ["Since for realistic specifications of operating conditions, checking the coverage of all scenarios is infeasible due to combinatorial explosion, our proposed scenario coverage metric is based on the concept of 2-projection and is tightly connected to the existing work of combinatorial testing, covering arrays and their quantitative extensions [3], [6], [7]."]} +{"6244440|4602249": ["[4] reviews testing for scientific software more generally, and cites a number of articles such as [5], who present an approach for testing ML algorithms."]} +{"18495930|16426065": []} +{"18495930|7165993": ["I. INTRODUCTION\nAlthough software testing has limitations, it presents a practical method for providing informal assurance on the quality and reliability of software."]} +{"52300214|16160793": ["esponsible for a failing test case [2 ], [28 63]. Spectral fault localization uses the frequency with which each code line executes on failing and passing tests cases to identify the suspicious lines [13], [28]. Accounting for redundancy in test suites can improve fault localization precision [21], [22]. MIMIC can also improve fault localization precision by synthesizing additional passing and failing", " an input or a set of changes, but rather produces other inputs (not necessarily smaller) that differ minimally but cause relevant behavioral changes. The same is true for spectral fault localization [13], [28], machinelearning-based defect prediction [39], traditional step-through debugging, time-travel debugging [10], and other debugging approaches do not attempt to produce new tests to help debug. ", "ion about test coverage (e.g., which lines execute more often during failing test cases as compared to passing ones) to identify the likelihood that a line of code contains a speci\ufb01c test-failing bug [13]. Delta debugging allows one to minimize a failing test input [66] and a set of test-breaking changes [65]. Even without a clear evidence of a defect, techniques attempt to \ufb01nd static code elements th"]} +{"52071803|16426065": ["Metamorphic testing is a classical software testing method that identifies software bugs [15, 36, 44]."]} +{"49862954|7165993": ["] and machine learning algorithms are considered to be in this class. Various methods have been devised to test \u2018non-testable programs\u2019. These include constructing an oracle from formal specification [2] (and recently formal verification has been attempted for machine learning [32]), developing a pseudo oracle (or multiple implementations of a program [34]), testing on benchmark data [16], assertion ", "cases where the oracle is easily obtainable [22], using implicit oracles (such as when a program crashes) and Metamorphic Testing [5]. While none of these methods have been found to solve all aspects [2], Metamorphic Testing has been found to be quite useful [21]. We refer the readers to a recent survey [2] for a discussion on these various methods. There has been work in the application of Metamorph"]} +{"4349264|195346070": []} +{"49892619|7844555": ["surveyed software fault localization [44]."]} +{"51989857|8155077": ["Our constraint suggestion functionality is built on a heuristics-based approach employing single-column profiling [1].", "Data cleaning has been an active research area for decades, see recent surveys [1, 10, 38] for an overview."]} +{"51872884|22163846": []} +{"60440672|3342225": ["For a more detailed discussion of these methods see [15,9]."]} +{"67870598|4271578": []} +{"67870598|16426065": []} +{"67870598|7165993": ["An oracle is a mechanism that testers use to determine whether the outcomes of test case executions are correct [2, 24]."]} +{"84182550|36536": [", search-based testing [18], guided random testing [19], symbolic constraint solving based testing [20])."]} +{"84182550|14022070": ["CT has been successfully applied to traditional configurable software systems [9]."]} +{"69783085|4271578": []} +{"69783085|18973396": ["It has been reported that CrowdOracles are a viable solution to mitigate the test oracle problem, but the task of getting useful results from the crowd can be challenging [12], [13].", "of user acceptance testing [11], alpha/beta testing, and crowdsourced testing [12], [13]."]} +{"69783085|16426065": ["This is the largest category of violations, and no SUTs passed this test.", "A growing body of research has examined the concept of MT [6], [26], [27], [28], [29], and proven it to be a very useful testing paradigm that effectively addresses the oracle problem.", "Unlike previous research on MT, where multiple MRs were identified together with a large number of test cases to test the SUTs [28], in this case study we tested the SUTs using only one MR and only one MT test case (a source test case and a follow-up test case) to identify software issues and corresponding user countermeasures.", "In this paper, although we have also shown the detection of issues in the SUTs (some of which revealed real-life, previously unknown bugs), the main focus of this work is not on the detection of bugs, but rather on what users can do when faced with imperfect or unfamiliar software.", "In the existing literature, the concepts of metamorphic relations and their patterns have been developed for software testing, verification, and validation purposes [9], [26], [28], [37], [38], [39]; in other words, the existing concepts were not developed to facilitate the objectives specified in our research questions RQ1, RQ2, and RQ3.", "or at least to have failed to meet user expectations [26], [28]."]} +{"69783085|7165993": ["[4], for instance, identified four broad categories of oracles: specified oracles (such as assertions and algebraic specifications); derived oracles (such as metamorphic relations in metamorphic testing, and invariants in invariant"]} +{"69783085|16125167": ["software maintenance: Software must be sufficiently understood before it can be properly modified [16].", "In the area of software reverse engineering, intensive research has been conducted into program understanding / comprehension [14], [15], [16], [17], which is a key activity in"]} +{"50767401|1229096": ["Prior research into AVs has focused predominantly on the design of automation technology [2]\u2013[7], its adoption [8], the impact of AVs on congestion [9], and the legal [10], [11] and regulatory barriers [12]\u2013[15] for AV implementation."]} +{"132770532|4271578": ["Investigations in properties of the learning phase almost exclusively employ metamorphic testing (see [22], [23] for surveys)."]} +{"132770532|16426065": ["Investigations in properties of the learning phase almost exclusively employ metamorphic testing (see [22], [23] for surveys)."]} +{"57190397|16426065": ["MT has been studied by a growing body of research [4], [8]\u2013[10], and has been adopted by industry and organizations, such as Adobe [11], [12], NASA [13], [14], Accenture (including both a research paper [15] and a patent titled \u201cVerifying Machine Learning through Metamorphic Testing\u201d [16, p."]} +{"57190397|7165993": ["software testing, which refers to situations where an oracle is unavailable, or is theoretically available, but practically too difficult or expensive to be applied [4], [5].", "MT has been studied by a growing body of research [4], [8]\u2013[10], and has been adopted by industry and organizations, such as Adobe [11], [12], NASA [13], [14], Accenture (including both a research paper [15] and a patent titled \u201cVerifying Machine Learning through Metamorphic Testing\u201d [16, p."]} +{"7219108|7020971": ["Convergence Conditions and Properties The convergence rates of SGD are also well analyzed [7,10,37]."]} +{"4055261|17292349": ["[27], McMinn et al."]} +{"4055261|14920988": []} +{"52232315|30314751": ["Since 2012, there has been considerable progress, and several breakthroughs, on Genetic Improvement\ntechniques [112].", "Since 2012, there has been considerable progress, and several breakthroughs, on Genetic Improvement techniques [112].", "We can generalise FiFiVerify to GI (Genetic Improvement): FiGiVerify would consist of finding performance issues, such as regressions through which a system has become insufficiently performant, and fixing these using genetic improvement.", "We hope that Automated Program Repair [84], Genetic Improvement [112], recent approaches to code synthesis and other related automated code improvement techniques that have recently witnessed an upsurge in scientific activity, may alleviate some of the pressure on human debugging effort.", "We hope that Automated Program Repair [84], Genetic Improvement [112], recent approaches to code synthesis and", "This challenge was formulated in 2012 as the GISMOE (Genetic Improvement of Software for Multiple Objectives) challenge [69].", "This challenge rests on what we believe to be one of the most exciting possibilities for research on testing and verification: its combination with automated program improvement, through techniques such as Genetic Improvement [69], [82], [112] Code Synthesis [56], [88], Code transplantation [13],", "This challenge rests on what we believe to be one of the most exciting possibilities for research on testing and verification: its combination with automated program improvement, through techniques such as Genetic Improvement [69], [82], [112] Code Synthesis [56], [88], Code transplantation [13], [113], [122], [126], Tuning [74], [131] and Automated Repair [12], [85], [106]."]} +{"52232315|8323376": ["Many systems, such as those typically deployed through app stores, for example [94], have ample mechanisms for users to report bugs, and most practicing developers are typically overwhelmed by such lists; their most pressing problem is not simply finding more bugs; their problem is more nuanced.", "ment models), while continuous integration and deployment has simultaneously become the norm rather than the exception, accelerated by web-based and app store-based software deployment paradigms [94]."]} +{"52232315|18973396": ["scaled up test effectiveness and efficiency over the painful past of human-designed and executed tests (notwithstanding recent developments in crowd-sourced testing [90]).", "Sapienz is based on Search Based Software Testing (SBST) [68], [70], [96], but it augments SBST with systematic testing and is also designed to support crowd based testing [90] exten-"]} +{"52232315|7165993": ["Of course, it could be that the tool would initially use an implicit oracle [14] (such as \u2018applications should not crash\u2019) and, only some time after deployment, seek additional assertions from authors, thereby deferring the friction from inertial friction to on-going", "In order to automate test design this means that the test tool needs oracle information [14].", "This is, essentially, the simplest form of test Oracle [14]; one in which there is a simple boolean outcome that determines whether the test has passed or failed.", "Such failures are deemed to \u2018fail\u2019 either with reference to an implicit oracle [14], by deviating from an agreed specification, or by distinguishing the behaviour of a correct and a known-faulty version of the", "A remaining challenge for further automation and replacement of tedious human effort in test case design centres on the Oracle problem [14]."]} +{"52232315|17292349": ["Fortunately, due to advances in automated test case design [5], [27], [68], the slow, error prone and tedious task of human test case design is gradually, finally, receding to be replaced"]} +{"32669455|16426065": []} +{"11636248|8372620": ["For RQ1 I have already obtained preliminary results [26, 27] (showing the potential of ROC), and have a very concrete action plan.", "Our recent analysis [26, 27] suggests that instead of searching for discrimination in decision data and trying to remove it, we need to consider what makes algorithms discriminatory."]} +{"21930731|10213552": ["Data and model parallelism require distributed systems and orchestration that exceed capabilities of many single-machine solutions [12, 16].", "In isolation, these components implement high-level functionality that is typical in machine-learning platforms, e.g., data sampling, feature generation, training, and evaluation [12, 14, 16].", "One factor in choosing (or dismissing) a machine learning platform is its coverage of existing algorithms [12]."]} +{"48359990|11608263": ["To make the learning simple, we adopt multi-label SVM [23], i."]} +{"135464997|14843594": ["\u2026by considering the recent work in hyperpa-rameter tuning for machine learning, which identifies the up to k cleaning components, we can create a parameter Quality Function Structure: Hyperparameter tuning algorithms Data Cleaning Method Structure: Similarly, black-box Parzen Estimator (TPE) [43] ."]} +{"49867189|7165993": ["[1] studied test oracles in software testing including probabilistic test oracle."]} +{"13058993|8589228": ["In order to overcome the state-space explosion problem of large systems [22], modern formal veri\ufb01cation tools often use statistical methods to solve the probabilistic veri\ufb01cation problem [23]."]} +{"57373901|3536399": ["[26] have investigated other adversarial attacks [27], [28], [29], [30], [31], [32].", "Akhtar and Mian [26] have investigated other adversarial attacks."]} +{"57373901|2088679": ["Deep learning [1] have been used in the fields including molecular genetic studies [2], brain science [3], drug discovery [4], medical diagnosis [5], mobile application [6], financial transaction [7], and so on."]} +{"6324652|7165993": ["While prior work has tackled the oracle problem [10, 26, 30] typically using inferred pre- and post-conditions or documentation, our oracle is more precise and easier to compute, but is only applicable to fairness testing."]} +{"49323753|36536": ["\u20261, the test generation technique to cover the speci\ufb01c CT coverage target could be general without assumption on speci\ufb01c DNN internal structures (e.g., activation function types), such as search based testing [26], guided random testing [29], and symbolic execution and constraint-based testing [4]."]} +{"49323753|14022070": ["CT has been successfully applied to testing di\ufb00erent con\ufb01gurable software systems [2, 23, 28], since most faults are caused by interactions involving only a few parameters [20].", "CT can detect faults that are otherwise undetectable e\ufb00ectively, and has been successfully applied to di\ufb00erent con\ufb01gurable software systems [2, 23, 28], as most faults are caused by interactions involving only a few parameters [20]."]} +{"12544243|14774186": ["The most popular machine learning approaches used in document classification are SVM, DT, KNN, NB, Neural Networks, and Latent Semantic Analysis [12]."]} +{"73724814|4271578": []} diff --git a/edge/graph_195658227.jsonl b/edge/graph_195658227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195697611.jsonl b/edge/graph_195697611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce50360e4f10e0412695620f03409db2f56e4f6d --- /dev/null +++ b/edge/graph_195697611.jsonl @@ -0,0 +1,3 @@ +{"36438543|9450094": ["Also, issues related to resonant problems [11]\u2013[13] and control [14]\u2013[18] and magnetic integration [19], [20] of filters have also been well reported in the literatures."]} +{"114537699|44077188": []} +{"34914751|17758458": ["The active power filter (APF) is widely used to solve these problems because of its superiority in filtering performance and small size [1], [2]."]} diff --git a/edge/graph_195697660.jsonl b/edge/graph_195697660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38ea1c3f123f5c41b922df0f9ff17c4447d693c1 --- /dev/null +++ b/edge/graph_195697660.jsonl @@ -0,0 +1,18 @@ +{"10510997|13427574": ["Safety is identi\ufb01ed as one of the critical issues that needs to be addressed for the successful acceptance of service robots in domestic environments (Tadele et al. 2014).", "Safety is identified as one of the critical issues that needs to be addressed for the successful acceptance of service robots in domestic environments (Tadele et al. 2014)."]} +{"44337427|9036392": []} +{"44337427|9045232": ["[10])."]} +{"53280446|7360895": ["real-time performance of the robot which follows human social conventions and norms are more likely to be accepted for a long duration by its users [15]."]} +{"6281465|1452734": ["Particularly promising to reach the goal of (social) intelligence in robots is the research direction of \u2018developmental robotics\u2019 (Lungarella et al. 2004)."]} +{"6281465|7360895": ["Socially situated robots are able to distinguish between other social agents and various objects in the environment (Fong et al. 2003)."]} +{"2817825|14970359": []} +{"8653718|7360895": ["[3] provides a taxonomy of attributes of socially"]} +{"10368589|7360895": ["\u2026\" ), adapt to social interactions, engage in \"autonomous\" (non deterministic, but coherent) action, learn new behaviors, communicate, use natural cues, respond to emotions in humans, and self-organize [6] [43] \u2013 then it seems to us plausible to posit increasingly rich reciprocal interactions."]} +{"7320285|7360895": ["For an overview of socially interactive robots (robots designed to interact with humans in a social way) see Fong et al. (2003) ."]} +{"18995728|7360895": ["In a partner view (peer [7] or companion [4]), robots provide companionship in a trusted relationship [10] and expected to initiate interaction and other services on its own."]} +{"42397332|18948342": []} +{"51995701|7360895": ["tions is given in [9] where Fong et al."]} +{"7748652|27527196": ["Again, a wealth of approaches exist for the problem of optical character recognition and handwriting recognition [204] [205], even for languages such as Arabic [206], the only robotic system that has demonstrated limited OCR capabilities is [177]."]} +{"7748652|15782139": ["Again, a wealth of approaches exist for the problem of optical character recognition and handwriting recognition [204] [205], even for languages such as Arabic [206], the only robotic system that has demonstrated limited OCR capabilities is [177]."]} +{"7360895|7185733": ["Two excellent overviews of vision-based gesture recognition are [124,166].", "[124] V."]} +{"7360895|7788290": ["A broad survey of human tracking is presented in [ 66 ].", "Passive sensors, such as CCD cameras, are cheap, require minimal infrastructure, and can be used for a wide range of perception tasks [2,36, 66 ,118]."]} +{"53287531|7748652": ["Examples of social robots that use speech to interact with people are Kismet [17], a story teller robot [18], robot guide [19] and reception robots [20]."]} diff --git a/edge/graph_195699951.jsonl b/edge/graph_195699951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9be46e4aa13ffc10c4ca3d13ca058c33793d1af3 --- /dev/null +++ b/edge/graph_195699951.jsonl @@ -0,0 +1,4 @@ +{"3305321|20404279": ["Aside from AnoGAN (Schlegl et al., 2017), however, the use of GANs for anomaly detection has been relatively unexplored, even though GANs are suited to model the high-dimensional complex distributions of real-world data (Creswell et al., 2017).", ", 2017), however, the use of GANs for anomaly detection has been relatively unexplored, even though GANs are suited to model the high-dimensional complex distributions of real-world data (Creswell et al., 2017)."]} +{"1033682|174797842": []} +{"17427022|18353243": ["Approaches for anomaly detection exist in various domains, ranging from video analysis [1] to remote sensing [2]."]} +{"207172599|3330313": []} diff --git a/edge/graph_195736509.jsonl b/edge/graph_195736509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5daae284dcd780056abf43b6450c7eae5f6d5b3c --- /dev/null +++ b/edge/graph_195736509.jsonl @@ -0,0 +1,3 @@ +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"51745801|13756844": ["[28] define the EVM semantics in the K framework [29] \u2013 a language independent verification framework based on reachability logics."]} +{"4565398|49527603": ["Blockchain can be de\ufb01ned as a continuously growing ledger of transactions, distributed and maintained over a peer-to-peer network [15]."]} diff --git a/edge/graph_195738615.jsonl b/edge/graph_195738615.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c017fc743bff7cb0575a7c82c8666a505fe46d5 --- /dev/null +++ b/edge/graph_195738615.jsonl @@ -0,0 +1,20 @@ +{"15178364|206764452": ["Recent reviews on human behavior understanding focused on specific aspects of the overall problem, such as monocular pedestrian detection [11], human detection for driver-assistance systems [12], and pedestrian detection benchmarks [13], [14].", "Algorithms based on appearance features are specialized detectors trained on large pedestrian databases [11], [12]."]} +{"15178364|1634674": ["[20], [128], [129], which represent the human body in terms", "Note that this definition differs from that of [20], which made no distinctions between activities and interactions.", "From these atomic elements, it is possible to compose actions, namely, temporal concatenations of gestures [20]."]} +{"15178364|5755403": ["Morris and Trivedi [15] surveyed features and model motion trajectories focusing on trajectory analysis."]} +{"15178364|5401262": ["The interest in behavior understanding has dramatically increased in recent years, motivated by societal needs that include security [1], natural interfaces [2], gaming [3], affective computing [4], and assisted living [5]."]} +{"3352534|17516538": ["To deal with this issue, we borrow the idea of background subtraction in computer vision [41] which is used for foreground segmentation."]} +{"1153012|8928686": ["Index Terms\u2014Fall detection, activity recognition, channel state information (CSI), WiFi, phase difference\n\u00c7", "Falls not only bring a main threat to elders\u2019 health, they account for a large part of medical cost as well."]} +{"6112539|17747015": ["Radio signals, notably Wi-Fi signals, have been recently exploited for sensing and recognizing human activities [12], [13]."]} +{"16251944|206583375": []} +{"57825759|2829149": []} +{"14116122|8360759": ["Some representative frames that summarize the main human action classes are depicted in Figure 3.", "Real time classification and prediction of future actions was proposed by Morris and Trivedi (2011), where an activity vocabulary is learned through a three-step procedure.", "Finally, a thorough analysis of the ontologies for human behavior recognition from the viewpoint of data and knowledge representation was presented by Rodr\u00edguez et al. (2014)."]} +{"14116122|16013270": ["A complete survey, which covers important aspects of human activity recognition datasets, was introduced by Chaquet et al. (2013). An appropriate human activity dataset is required for the development of a human activity recognition system.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004). However, their method cannot deal with data that contain complex backgrounds, and due to the down-sampling of the original data the audio-visual synchronization may be lost. Also, their method used different sets of hidden states for audio and visual information. This property considers that the audio and visual features were a priori synchronized, while it increases the complexity of themodel.Metallinou et al. (2012) employed several hierarchical classification models from neural networks to HMMs and their combinations to recognize audio-visual emotional levels of valence and arousal rather than emotional labels, such as anger and kindness.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests.", "A complete survey, which covers important aspects of human activity recognition datasets, was introduced by Chaquet et al. (2013).", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004). However, their method cannot deal with data that contain complex backgrounds, and due to the down-sampling of the original data the audio-visual synchronization may be lost. Also, their method used different sets of hidden states for audio and visual information. This property considers that the audio and visual features were a priori synchronized, while it increases the complexity of themodel.Metallinou et al. (2012) employed several hierarchical classification models from neural networks to HMMs and their combinations to recognize audio-visual emotional levels of valence and arousal rather than emotional labels, such as anger and kindness. Vrigkas et al. (2014b) employed a fully connectedCRFmodel to identify human behaviors, such as friendly, aggressive, and neutral."]} +{"14116122|6387482": ["In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010). Early fusion, or fusion at the feature level, combines features of different modalities, usually by reducing the dimensionality in eachmodality and creating a new feature vector that represents an individual. Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013). The advantage of early fusion is that it yields good recognition results when the different modalities are highly correlated, since only one learning phase is required. On the other hand, the difficulty of combining the different modalities may lead to the domination of one modality over the others. A novel method for fusing verbal (i.e., textual information) andnon-verbal (i.e., visual signals) cues was proposed by Evangelopoulos et al. (2013). Each modality is separately analyzed and saliency scores are used for linear and non-linear fusing schemes.", "In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010).", "In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010). Early fusion, or fusion at the feature level, combines features of different modalities, usually by reducing the dimensionality in eachmodality and creating a new feature vector that represents an individual. Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013). The advantage of early fusion is that it yields good recognition results when the different modalities are highly correlated, since only one learning phase is required. On the other hand, the difficulty of combining the different modalities may lead to the domination of one modality over the others. A novel method for fusing verbal (i.e., textual information) andnon-verbal (i.e., visual signals) cues was proposed by Evangelopoulos et al. (2013). Each modality is separately analyzed and saliency scores are used for linear and non-linear fusing schemes. The second category of methods, which is known as late fusion or fusion at the decision level, combines several probabilistic models to learn the parameters of each modality separately. Then all scores are combined together in a supervised framework yielding a final decision score (Westerveld et al., 2003; Jiang et al., 2014). The individual strength of eachmodality may lead to better recognition results. However, this strategy is time-consuming and requires more complex supervised learning schemes, which may cause a potential loss of inter-modality correlation. A comparison of early versus late fusion methods for video analysis was reported by Snoek et al. (2005). Recently, a third approach for fusingmultimodal data has come to the foreground (Karpathy et al."]} +{"14116122|8042572": ["In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010)."]} +{"14116122|1634674": ["Xu et al. (2015) addressed these limitations and proposed a general probabilistic framework for joint actor-action understanding while they presented a new dataset for actor-action recognition.", "A fine separation between the meanings of \u201caction\u201d and \u201cactivity\u201d was proposed by Turaga et al. (2008), where the activity recognition methods were categorized according to their degree of activity complexity."]} +{"14116122|5401262": ["Some representative frames that summarize the main human action classes are depicted in Figure 3.", "Figure 4 depicts an example of a space-time approach based on dense trajectories and motion descriptors (Wang et al., 2013).", "Pantic et al. (2006) studied several state-of-the-art methods of human behavior recognition including affective and social cues and covered many open computational problems and how they can be efficiently incorporated into a human-computer interaction system."]} +{"14116122|7788290": ["A recent review on 3D pose estimation and activity recognition was proposed by Holte et al. (2012b). The authors categorized 3D pose estimation approaches aimed at presenting multiview human activity recognition methods.", "Gavrila (1999) separated the research in 2D (with and without explicit shape models) and 3D approaches.", "Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013).", "Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004).", "A recent review on 3D pose estimation and activity recognition was proposed by Holte et al. (2012b). The authors categorized 3D pose estimation approaches aimed at presenting multiview human activity recognition methods. The work of Shotton et al. (2011) modeled 3D human poses and performed human activity recognition from depth images by mapping the pose estimation problem into a simpler pixel-wise classification problem.", "Nicolaou et al. (2014) proposed a novel method based on probabilistic canonical correlation analysis (PCCA) (Klami and Kaski, 2008) and DTW for fusing multimodal emotional annotations and performing temporal aligning of sequences.", "Sargin et al. (2007) suggested a method for speaker identification integrating a hybrid scheme of early and late fusion of audio-visual features and used CCA (Hardoon et al., 2004) to synchronize the multimodal features.", "(2007) suggested a method for speaker identification integrating a hybrid scheme of early and late fusion of audio-visual features and used CCA (Hardoon et al., 2004) to synchronize the multimodal features. However, their method can cope with video sequences of frontal view only. Metallinou et al. (2008) proposed a probabilistic approach based on GMMs for recognizing human emotions in dyadic interactions."]} +{"4570697|2357830": ["Systems that leverage biometric signatures [58] or user-owned RFID tag [59] are well-known technologies."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} diff --git a/edge/graph_195739852.jsonl b/edge/graph_195739852.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3482de56fb388bfab3efa011defc9173141b8469 --- /dev/null +++ b/edge/graph_195739852.jsonl @@ -0,0 +1,12 @@ +{"29149983|2088679": ["Deep learning techniques have recently emerged as promising decision supporting approaches to automatically analyze medical images for different clinical diagnosing purposes (1-10)."]} +{"20025294|5835640": ["The most common approach is to use regression analysis or machine learning tools to generate population average maps, which highlights features that are salient across the population [3, 32, 61, 16, 39, 45, 14]."]} +{"85502675|15888893": ["The idea of knowledge transfer is similar to that of transfer learning [1], [36], [37]."]} +{"73418087|4110304": ["209 The benefits of trust and transparency in AI systems will differ based on their performance, allowing for the identification of failures when AI is subhuman and, consequently, transforming superhuman AI into a learning resource."]} +{"51728356|2088679": []} +{"1749924|2875192": []} +{"2088679|393948": []} +{"50774462|2088679": ["Motivated by the success of deep transfer learning in computer-aided diagnosis systems [2], [12], [13], [15]\u2013[20], we address the challenge of lung nodules malignancy classi-", "To overcome this issue, an approach called Transfer Learning has been widely investigated for Computer-Aided Diagnosis methods [2], [12], [13], [15]\u2013[20]."]} +{"67862093|4363729": ["This includes the combination of data at the model\u2019s input level, the combination of features extracted from multiple data sources independently and of predictions made by different ML algorithms.(23) Recent examples relevant to precision oncology are cancer subtyping based on the unsupervised learning of patterns observed across point mutation, copy number, methylation, and RNA expression datasets;(24) the prediction of several clinical outcomes (e."]} +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"4876170|1708582": ["Its recent popularity stems from its ability to develop novel solution schemas, even outperforming humans in certain domains, because it learns to solve a task by itself (12)."]} +{"57757804|10947138": ["In recent years, segmentation has known great successes in various medical images analysis tasks including detection of atherosclerotic plaques [1], pelvic cavity assessment [2, 3], ear image data towards biomechanical researches [4], skin lesions detection [5], etc."]} diff --git a/edge/graph_195740144.jsonl b/edge/graph_195740144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4898a8cbfdc23fe137388ace4d77e3b719e6e953 --- /dev/null +++ b/edge/graph_195740144.jsonl @@ -0,0 +1,13 @@ +{"3361915|11894197": []} +{"13770353|11894197": ["All rights reserved.\nfeatures by rejecting inappropriate and redundant features (Lazar et al., 2012; Saeys et al., 2007).", "features by rejecting inappropriate and redundant features (Lazar et al., 2012; Saeys et al., 2007)."]} +{"10715511|2746910": []} +{"10715511|11894197": ["In [1], univariate nonparametric filter techniques are split in two groups: pure model-free methods and methods based on random permutation associated to parametric tests.", "Different strategies have been proposed over the last years for feature/gene selection: filter, wrapper, embedded [1], and more recently ensemble techniques [5].", "filter methods in an extended taxonomy inspired from [1].", "According to [1], univariate methods for FS can be either parametric or nonparametric.", "1) has many common points with the one presented in [1].", "[1] also stress on the practical advantages of these methods stating that \u201ceven when the subset of features is not optimal, they may be preferable due to their computational and statistical scalability."]} +{"126379774|11894197": []} +{"13279505|11894197": [", they only use top-ranked attributes to perform sample classification [8,23]."]} +{"44962334|63137": ["The results presented in this section were obtained in [25,52,67].", "This is done by studying these algorithms under a common algorithmic framework called model-based search (MBS) [67].", "Zlochin et al. [67] have proposed a unifying framework for so-called model-based search (MBS) algorithms.", "The SGA parameter value update that we describe in the following is a generalization of the one that was presented in [67] (which was itself a generalization of the one that was given in [52])."]} +{"43357067|13287576": []} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"33266860|11894197": []} +{"15020381|11894197": ["The methods for gene selection are divided into three categories: filter, wrapper, and embedded methods [1]."]} +{"3374195|15485264": []} +{"3374195|11894197": []} diff --git a/edge/graph_195750552.jsonl b/edge/graph_195750552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55ba330cf8ea74041ee09dad9018ecf701741cc6 --- /dev/null +++ b/edge/graph_195750552.jsonl @@ -0,0 +1,7 @@ +{"14591308|205286988": []} +{"15591122|1230643": []} +{"870583|1230643": [", metabolic networks [1], power networks [2], wireless sensor networks (WSNs) [3], protein networks [4], robot networks [5,6], many new problems, which are different from conventional problems due to the presence of topology constraints, are emerging and have posed appeals for efficient solutions."]} +{"51828472|205286988": []} +{"51828472|1230643": []} +{"51828472|9240891": []} +{"52159731|9588126": []} diff --git a/edge/graph_195765560.jsonl b/edge/graph_195765560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6314546d9830cfc3b66c18cd482faf73d3e26f5b --- /dev/null +++ b/edge/graph_195765560.jsonl @@ -0,0 +1 @@ +{"14300468|14485408": []} diff --git a/edge/graph_195766872.jsonl b/edge/graph_195766872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db8e45cfb674e667d499168b24d7a0be089a126d --- /dev/null +++ b/edge/graph_195766872.jsonl @@ -0,0 +1,3 @@ +{"21022169|10668009": ["Previous experiments [4] showed that, given a specific, fixed set of features, local or global optimization improves the prediction quality.", "YQX [4] uses Bayesian network theory to model the interaction between score and performance.", "Examples are the models of Arcos and de M\u00e1ntaras [1], who partially apply the GTTM, and our system [4, 38], which implements parts of the IR model to approximate the phrasal structure of the score.", "Music education can definitely benefit from systems for interactive control of music performance, for example, for building an inexpensive system for students to practice their conducting skills [3, 4] or for conductors to test different performance styles before meeting with the actual orchestra [5].", "Second, the loudness curves seem harder to predict than the tempo curves, a problem also observed in previous experiments with the model (see [4] and [37]).", "heavier than a baton have also been employed, for example, the Wiimote [4, 16, 17] and mobile phones [18]."]} +{"60238484|18418184": []} +{"23728768|17485266": []} diff --git a/edge/graph_195766950.jsonl b/edge/graph_195766950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..717bd3c6113f172f047ce7ce3d44fccfb7ed84a7 --- /dev/null +++ b/edge/graph_195766950.jsonl @@ -0,0 +1 @@ +{"11708893|10500613": ["There exist more advanced approaches for the alignment of schemata (Rahm and Bernstein 2001) as well as frameworks like Silk (Volz et al. 2009) that allow for more advanced mappings.", "There exist more advanced approaches for the alignment of schemata (Rahm and Bernstein 2001) as well as frameworks like Silk (Volz et al."]} diff --git a/edge/graph_195767459.jsonl b/edge/graph_195767459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b20c2dc70205ce9f300a62dc0a1231fc937ed1d0 --- /dev/null +++ b/edge/graph_195767459.jsonl @@ -0,0 +1,2 @@ +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} diff --git a/edge/graph_195767552.jsonl b/edge/graph_195767552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..620fc690988e47276aebcc3aaef2a20ef53c0ee1 --- /dev/null +++ b/edge/graph_195767552.jsonl @@ -0,0 +1,5 @@ +{"4606027|18374428": ["Robot \u201cbody schemas\u201d often have quite different characteristics (fixed, centralized, explicit, amodal) than what we expect from their biological counterpart, but there has been work on robot body models learning (self-calibration) as well as modeling the biological body representations and their development using robots (see [26], [27] for surveys)."]} +{"4726030|1452734": []} +{"13687804|18374428": []} +{"49186177|18374428": ["in subsequent research on the iCub that targets the development of multimodal body representations (see [33] for a survey of the notion of body schema in robotics, [34] for an account of the iCub learning a peripersonal space representation using the artificial skin, [35] for learning a proprioceptive representation)."]} +{"49186177|14561706": ["isolation and reaction) or in tactile human\u2013robot interaction (see [25] for a survey; [26] for a recent implementation on the iCub humanoid robot)."]} diff --git a/edge/graph_195771128.jsonl b/edge/graph_195771128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e63fdc765cebf956ec148f554235e6aeab85ac64 --- /dev/null +++ b/edge/graph_195771128.jsonl @@ -0,0 +1,6 @@ +{"123924938|27996699": []} +{"52134533|105791": []} +{"4114498|7260566": []} +{"4114498|34704358": ["Among diverse microfiber applications, optical sensing is very interesting due to its potential of realizing miniaturized fiber optic sensors with small footprint, high sensitivity, fast response, good flexibility, and low power consumption [5,6]."]} +{"4114498|8150108": ["Sometimes one not only wants a microfiber-guiding evanescent field, but also hopes to keep the inner microstructures of the original fiber (such as photonic crystals and Bragg gratings); then, chemical etching becomes a choice [67,68]."]} +{"1038508|16265465": []} diff --git a/edge/graph_195774499.jsonl b/edge/graph_195774499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..421c796f353b3c5087c719107d1f2f21d2ed82ad --- /dev/null +++ b/edge/graph_195774499.jsonl @@ -0,0 +1,17 @@ +{"9404043|4071247": ["[1]) in order to properly design future Visual Analytics applications."]} +{"8218013|16156203": ["For the scope of \nthis paper, we will follow the grouping of temporal data mining tasks as presented in Laxman and Sastry \n(2006): prediction, classi.cation, clustering, search & retrieval, and pattern discovery.", "Laxman and Sartry de.ne the term pattern as a local structure \nin the data (Laxman and Sastry 2006).", "Laxman and Sartry define the term pattern as a local structure in the data ( Laxman and Sastry 2006 ).", "For the scope of this paper, we will follow the grouping of temporal data mining tasks as presented in Laxman and Sastry (2006) : prediction, classification, clustering, search & retrieval, and pattern discovery."]} +{"8218013|10975328": ["A number of practical \nexamples of visualization and interac\u00adtion methods for time-and time-oriented data can be found in Aigner \net al. (2007b), M\u00a8 uller and Schumann (2003), and Silva and Catarci (2002).", "A number of practical examples of visualization and interaction methods for time- and time-oriented data can be found in Aigner et al. (2007b), M\u00a8 uller and Schumann (2003), and Silva and Catarci (2002) ."]} +{"745262|18986679": []} +{"745262|16557526": ["Similar to surveys on the topic [237], [238], [239], [240], we"]} +{"18886146|18503837": []} +{"3253074|5358365": ["Existing surveys were either conducted several years ago [47,143] or focus on a specific topic of visualization such as graph visualization [145], software visualization [24], or visualization of network security events [124]."]} +{"10673012|16557526": ["Relating to the Type 2 errors in particular, Brodlie et al. [7] point out uncertainties caused by the lower resolution of the visualisation in contrast to the resolution of the data.", "As stated by Brodlie et al. [7], these uncertainties have not been the focus of uncertainty visualisation research thus far."]} +{"14302093|17094092": ["We adopt the master-slave model with sort-first rendering because it has best scalability with increasing number of pixels."]} +{"14302093|2000518": ["One finding of such studies is the fact that physical navigation in front of a wallsized visualization is more efficient than traditional panning\nand zooming operations [18]."]} +{"2897847|4361938": ["In psychology, the analysis of recorded eye-gaze data can lead to a deeper understanding of human cognitive processes [16]."]} +{"12940251|239537": ["It captures the reasoning chain in form of a graph or a tree, which can be visualized using established graph-drawing techniques (for instance, see [13] for an overview and further references)."]} +{"7341582|4071247": ["[2]), rather than all possible interactions in visual analytics.", "In general, knowledge learned in visual analytics can be defined as \u201cjustified belief\u201d [2]."]} +{"61599854|18986679": []} +{"5552859|9629338": []} +{"7200501|18986679": ["The comprehensive survey by Oliveira and Levkowitz [12] of various visualisation techniques and what actually can be done with them beyond just navigating through the abstract representation of data, places a convincing case for the need for tighter coupling of data and information visualisation with the data mining strategies and analytical reasoning."]} +{"14722858|239537": []} diff --git a/edge/graph_195774962.jsonl b/edge/graph_195774962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de5b1d14de82dc86a4e87c87c07d7d3801b8ad4e --- /dev/null +++ b/edge/graph_195774962.jsonl @@ -0,0 +1,69 @@ +{"52197349|61132": []} +{"64792997|51858916": ["was provided in [41].", "agation channel measurements and modeling [37], [40], [41]."]} +{"64792997|35695099": []} +{"61155843|61132": []} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"8819688|9022135": ["In literature [2], motion detection schemes are categorized as: 1) background subtraction; 2) spatio-temporal filtering; and 3) optical flow."]} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"14245507|1762301": ["Ad hoc routing protocols fit into one of three categories: proactive, reactive or hybrid [AWD04]."]} +{"52928726|3274840": ["[27] classify these protocols into two main categories: topology and position-based."]} +{"52928726|763939": ["Evolution ofMANETs have considered vehicles (VANETs - Vehicular Ad-hoc Networks) [3], [4] and sensors (WSN - Wireless Sensor Networks) [5], [6].", "Evolution ofMANETs have considered vehicles (VANETs - Vehicular Ad-hoc Networks) [3], [4] and sensors (WSN Wireless Sensor Networks) [5], [6]."]} +{"52928726|1230643": ["Evolution ofMANETs have considered vehicles (VANETs - Vehicular Ad-hoc Networks) [3], [4] and sensors (WSN - Wireless Sensor Networks) [5], [6].", "Evolution ofMANETs have considered vehicles (VANETs - Vehicular Ad-hoc Networks) [3], [4] and sensors (WSN Wireless Sensor Networks) [5], [6]."]} +{"52928726|2835258": []} +{"21672824|61132": ["This communication overhead reduces network throughput, introduces additional delays and wastes the limited battery energy of UAVs [3].", "This small battery can sustain a flight time of about 30 min [3,4]."]} +{"21672824|38911919": ["It helps to make the network more scalable, reduce routing overhead and maximize the throughput [6].", "Regardless of the potential benefits of node clustering in FANETs, the cluster formation and maintenance demand explicit exchange of control messages [6,7]."]} +{"13755264|61132": ["While there are various studies on e2e routing for ad hoc and vehicular networks, UAV networks are still in a nascent stage with many open challenges [4].", "IEEE Communications Magazine \u2022 January 2018 21 [4] L."]} +{"22610817|61132": ["The comparison of peer-to-peer ad hoc networks MANET (Mobile Ad Hoc Network), VANET (Vehicular Ad Hoc Network) and FANET is given in Table 1 [15]."]} +{"33750332|14441987": ["Several survey articles published on MANET routing and clustering schemes from different perspectives indicate the continuing challenges in this topic area [2, 3 ]. Proactive routing protocols require dissemination of link information periodically so that a node can use standard algorithms such as Dijkstra\u2019s to compute routes, to all other nodes in the network or in a given zone [4].", "Dynamic Source Routing (DSR) [5], Ad Hoc On-demand Distance Vector (AODV) [4] Temporally Ordered Routing Algorithm [ 3 ] and Light-Weight Mobile Routing [13] are some the more popular reactive routing approaches."]} +{"33750332|1762301": ["Several survey articles published on MANET routing and clustering schemes from different perspectives indicate the continuing challenges in this topic area [ 2 , 3]. Proactive routing protocols require dissemination of link information periodically so that a node can use standard algorithms such as Dijkstra\u2019s to compute routes, to all other nodes in the network or in a given zone [4]."]} +{"4863692|5972227": ["Energy-efficiency in target tracking applications has been extensively studied in the WSN area; see [38] for an up-todate survey on the topic."]} +{"4863692|12817488": ["The communication-related approach aims at optimizing routing and aggregation techniques [42] as well as network self-organization [43]\u2013[45] to extend the network lifetime."]} +{"36347798|14441987": ["Nodes of these networks function as routers which discover and maintain routes to other nodes in the network [5]."]} +{"52137750|61132": []} +{"51961148|3757239": ["By moving the network functions and resources closer to the end users, i.e., the network edge, many bene\ufb01ts can be obtained, such as high data rates, low delay, improved energy ef\ufb01ciency, and \ufb02exible network deployment and management [1]."]} +{"51961148|61132": ["An extensive survey of UAV communication networks can be found in [8]."]} +{"14356571|6275330": []} +{"14356571|1230643": ["Ensuring energy efficient and reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems."]} +{"25758657|61132": []} +{"19748071|1762301": ["AODV has a flat structure and has the potential to support dynamic networks [1].", "Cluster ID (CID) Associated Cluster ID [1] (ACID) Associated Cluster ID [2] (ACID)", "The reader can refer to [1] for a survey."]} +{"18825253|1762301": ["2 Routing Protocols in Mobile Ad Hoc Networks [2]"]} +{"2192597|17594297": ["While the aforementioned work emphasizes the problem, which we have identified in existing secure routing proposals, it has two drawbacks in comparison to our approach: First, nothing proposed so far solves all the issues of IBC [46].", "To detect malicious nodes, IBC-HWMP proposes to monitor the behavior of the neighbors.", "In turn, to dynamically distribute and revoke symmetric keys, secure routes between the nodes are required [45], [46].", "Noteworthy in this context is the work published in [58], in which it is also proposed to integrate key management and secure routing in one framework, using IBC.", "However many issues in IBC are still unsolved [46], besides, IBC schemes are typically based on Elliptic Curves Cryptography (ECC), which is also used in ECDSA-RAOLSR [35], and the information leaked in 2013 by Edward Snowden revealed that standardized ECC-based algorithms were influenced to include backdoors [47].", "In IBC-HWMP [34] and IBC-RAOLSR [35], Identity Based Cryptography (IBC) is proposed to avoid the need for a PKI.", "However many issues in IBC are still unsolved [46],"]} +{"2192597|10310014": ["For instance, i n disaster scenarios, end-to-end security mechanisms are al ready used to ensure the privacy of the data of rescue fighters [33], while the privacy of their traffic flows (source, destination ) a d their location are not really a concern as these information are predefined in their public regulations."]} +{"53288740|61132": ["These UAVs can form their own aerial networks, while also communicating with terrestrial networks [1], [2]."]} +{"29790144|18657007": ["The first hours after the disaster occurs are the most important according to some studies [4] [5]."]} +{"29790144|29398427": ["MANETs made of UAVs are known as Aerial Ad Hoc Networks or Airborne Ad Hoc Networks (AANETs) [10]."]} +{"29177417|61132": []} +{"29177417|11206792": []} +{"29177417|763939": []} +{"53743305|61132": ["The third category considers using the UAVs as BSs to serve the mobile UEs, where UAVs are usually all connected to and controlled by control stations [19]."]} +{"2842831|11206792": ["The success of all these applications rely on a reliable and robust data packets delivering and need to be verified through many studies related to these communication protocols [2]."]} +{"206828353|7686677": ["from those in the existing literature on terrestrial communication systems [15], [16]."]} +{"1516250|14441987": ["Mobile Ad-hoc Networks (MANETs) are a popular telecommunication technology that can easily be applied to almost any environment having fast configuration and no need for any underlying infrastructure support [4]."]} +{"32797466|6218667": ["Recently, it was shown in [18] and [19] that using machine learning, it is possible to construct a more intelligent context-aware pattern formation system by predicting future situations as well as monitoring the current state."]} +{"32797466|61132": ["In this system, since UAVs are often powered by batteries [1], their life-time is limited."]} +{"4774994|1137487": []} +{"60468427|870434": ["Applications of DTNs include large-scale disaster recovery networks, sensor networks for ecological monitoring [36], ocean sensor networks [28, 24], vehicular networks [26, 6], and projects such as TIER [2], Digital Study Hall [15], and One Laptop Per Child [1] to benefit developing nations."]} +{"49560443|14799853": []} +{"21754666|61132": ["typically based on omni-directional communication [2], [13]\u2013 [15]."]} +{"54135772|61132": ["Compared to a single UAV system, a FANET is more robust and can cover a larger area of interest [3,4]."]} +{"33122326|61132": ["When a group of UAVs is used as a communication network, it usually receives the name of Flying Ad Hoc Networks (FANET) [6] or Aerial Ad Hoc Network (AANET) [2] or simply UAV networks [7]."]} +{"33122326|18657007": ["UAVs are envisioned to be used in tactical missions, of either rescue or military nature, that typically involve search for victims or other targets [1\u20134]."]} +{"53790373|61132": ["In flying a swarm of UAVs, tracking and controlling the formation of the 3D UAV network is critically important [3]\u2013[7] for not only formation control [8], collision avoidance [9], but also for topology-based communication scheduling and optimization [10]\u2013[13]."]} +{"52017618|61132": ["operations on the battery consumption, with a comprehensive survey available in [15].", "Solutions for terrestrial technology such as cross-layer energy-efficient communication, when mapped to UAVs, are unlikely to make a significant impact [15].", "of energy drained by the communication module can represent only a small fraction of the energy drained by the rotors [15],"]} +{"13494245|61132": []} +{"4275496|61132": ["[4], this paper studies the performance of the LTE network suitable for cluster communication, analyzes the distribution characteristics of urban base stations and the intensity distribution of mobile communication signals based on UAV cluster characteristics and mission requirements.", "Literature [4] surveys all outstanding issues related to multi-UAV communication networks, so as to spur further research in these areas.", "Researchers are gradually considering the use of 4G network control to achieve UAV communications [3-6], providing information transfer protection for UAVs in urban applications."]} +{"3516365|21418": []} +{"11021520|2835258": ["Some of the existing protocols that forward packets one hop at a time without attempting to construct the entire path are based on node location and movement [9] [10] [11] [12] [13]."]} +{"11021520|1762301": []} +{"51858916|61132": ["For instance, reference [58] identified key issues related to the formation of multi\u2013UAV network, but this survey focuses more on the communications and especially the control of UAV.", "Both [58] and [59] have very light touch on the channel modeling."]} +{"54886419|36400013": ["Most of the existing trust-based solutions for FANETs were initially proposed for MANETs [16, 17] and VANETs [18, 19], where only a few ones are specific to FANETs."]} +{"550361|11498812": ["Ironically, while mobility models have been routinely used in the evaluation of human-centric communications technologies, such as mobile ad-hoc and legacy cellular networks, the effects of mobility in mobile 5G systems that are targeting the mcMTC market are much less understood [3]."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"70058575|29398427": []} +{"12826359|2835258": ["The various geographic routing survey papers [9]\u2013[11] break down different geographic forwarding decisions into MFR (most forward with radius r), NFP (nearest with forward progress), and compass."]} +{"3086208|14552902": ["In opportunistic routing (OR) [16], a packet is sent in a broadcast mode to several eligible forwarders, and the best forwarder that received the packet will continue to forward it."]} +{"53281175|61132": ["Unmanned aerial vehicles (UAVs) are promising as a new application area for military and civil use due to the rapid deployment of network technologies such as low-cost Wi-Fi radio interfaces, sensors, global positioning system (GPS), and micro-embedded computers [1]."]} +{"52876722|61132": ["In this context, unmanned aerial vehicles (UAVs) have the potential to support autonomous actions in such environments by forming a flying ad hoc networks (FANETs) [2, 3]."]} +{"69820115|763939": ["Simulation-based models are characterized by the near realistic simulated behavior [12]."]} diff --git a/edge/graph_195775224.jsonl b/edge/graph_195775224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2cd4b26e865a1ad939aa9c0fc52c973343c3b274 --- /dev/null +++ b/edge/graph_195775224.jsonl @@ -0,0 +1,27 @@ +{"16371983|2387055": ["However, none of them focus closely enough to defence against DoS attack [3]."]} +{"18828008|448220": ["The transfer of data is also protected by provider-implemented SSL VPN connections (Kanday, 2012;Expert Group Report, 2010 ) B. Integrity\nIn addition to data confidentiality, the customer must also consider the integrity of their data."]} +{"967370|206584087": []} +{"14357813|6913007": ["ATM switches need hard state since a circuit is established once at the beginning of a session, while OpenFlow switches can maintain soft state since they only cache information from the controller , and all packets of a flow are treated in the same way.", "ATM [22] follows a similar pattern where a virtual circuit is established across a network before packets traverse the network.", "OpenFlow uses the link, network, and transport layers to define a flow, while ATM operates on a single layer, namely the link layer."]} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"31429428|2387055": ["Many SDN and OpenFlow security challenges have been proposed in the literature [8]."]} +{"31429428|206584087": ["There are many variants of DDoS attacks as well as defense mechanisms against them proposed for current networks [10]."]} +{"17696052|2387055": []} +{"5627271|14639620": ["\u2022 Sensors: on-platform sensors allow the device to interpret the physical context of a user [121]."]} +{"5627271|6670217": ["In this regard, our survey complements and extends other works such as [24].", "Attack vectors have multiplied ([23], [24]), and the availability of a myriad of networking paradigms has given rise to new epidemic behaviors (see, e."]} +{"5627271|1333339": ["particular by exploiting interactions in large user communities such as, for example, those provided by online social networks or mobile ad-hoc networks [157]."]} +{"5627271|121289": [", Wireless Sensor Networks [16] or Smart Grids [17]) to communication-centric systems where many information is acquired via communications interfaces.", "Current sensors have evolved from mechanical transducers featured with network connectivity (e.g., Wireless Sensor Networks [16] or Smart Grids [17]) to communication-centric systems where many information is acquired via communications interfaces."]} +{"5627271|206583375": [") [18] or by a global positioning system such as GPS."]} +{"26428978|6583734": []} +{"26428978|2623404": ["Since NFV deals with implementing the network services as software, SDN plays an important role in the orchestration of NFV [58, 65, 110].", "Recent advancements in the field of SDN and NFV allow ISPs to deploy many network services over the virtualized infrastructures [4, 24, 58, 65, 89].", "Advances in SDN have already addressed most of these aforementioned problems [27, 58]."]} +{"26428978|2387055": ["There have been recent studies towards the security in cloud and virtualized environments [113-115]."]} +{"26428978|39706822": ["As mentioned by John et al. [48], WSDL helps define web services from a technical perspective, including the aspects of a service, its interfaces, operations, endpoints, binding, and type definitions.", "[16], cloud service declarative definition language (CSDL) [21], SUN [22], and SMI [23] focus on the description of the services in the clouds.", "One of the most prominent ways for the service description in the Internet is Web Service Description Language (WSDL) [16, 48].", "NFF Network function forwarder\nNFV Network function virtualization\nNFVI Network function virtualization infrastructure\nNFVMANO\nNFV Management And Orchestration\nNMS Network management system\nNP Nondeterministic polynomial\nNS Network service\nNSH Network service header\nNVF Network virtual function\nOA&M Operations, administration and management\nOF OpenFlow\nOPEX Operational expenses\nPaaS Platform as a Service\nPM Physical machine\nQoS Quality of service\nSDL Service description language\nSDN Software defined networking\nSF Service function\nSFC Service function chaining\nSFCC Service function chaining controller\nSFCR Service function chaining router\nSFF Service function forwarder\nSFP Service function path\nSLA Service level agreement\nSMI Service measurement index\nSWA Software architecture\nUSDL Unified service description language\nVF Virtual function\nVIM Virtualized Infrastructure Manager\nVM Virtual machine\nVNF Virtual network function\nVNFC Virtual network function component\nVNFFG VNF Forwarding Graph\nVNFM VNF Manager\nWSDL Web service description language\nII.", "USDL has significant applicability to Internet service discovery, comparison, evaluation and management, enabling rigorous decision-making by service requestors [16].", "[16], there is a lack of a comprehensive specification model for cloud services covering multiple perspectives.", "WSDL is not sufficient for the specification of network services [48].", "[16] provide a detailed description and discussion for these languages.", "For example, current WSDLs may not support dynamic traffic steering among the various branches of the service functions, which may be formed due to SFC. Beek et al. and O'Sullivan have focused on the definition of non-functional properties of the electronic services with the purpose of improving the technology of automated service discovery, comparison, selection and substitution [18, 19]."]} +{"3882516|5551880": ["Despite the promising business model and hype surrounding cloud computing, security is the major concern for businesses shifting their applications to clouds [3], [4]."]} +{"1367922|206584087": ["The surveys [21,22] have included most of these work."]} +{"2567879|9104850": ["The World Wide Web (WWW) is one of the most popular applica\u00adtions currently \nrunning on the Internet and has driven the rapid growth of the Internet [Wang 1999]."]} +{"54442980|52059869": ["slices, and orchestration of various aspects [28], [29]."]} +{"54442980|206578224": ["slices, and orchestration of various aspects [28], [29]."]} +{"54442980|2387055": []} +{"206775931|2623404": []} +{"206775931|2387055": ["The attributes of centralized control and programmability associated of SDN platform also bring many network challenges, as discussed in [12] and [14]."]} diff --git a/edge/graph_195775870.jsonl b/edge/graph_195775870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6a43202cf29e41c060746c46e8f0b44854f307a --- /dev/null +++ b/edge/graph_195775870.jsonl @@ -0,0 +1,15 @@ +{"11866222|3330313": ["Anomaly detection techniques division can be done in multiple ways [3, 4]."]} +{"11866222|6430931": []} +{"7378246|36784649": ["As pointed out in [5], one-class classification is best suited for machinary fault monitoring, e.", "[5] provided a good review of different oneclass classification methods."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"207172599|3330313": []} +{"4645082|1634674": ["Significant approaches for activity recognition use video cameras [3], wearable sensors [4] and embedded sensors [5]."]} +{"42514164|7774517": ["On the contrary, special correlation implies that a correlation exists among the data gathered from geographically closely deployed sensors (Zhang et al. 2010)."]} +{"37976749|1174262": []} +{"14211745|18654252": []} +{"14211745|3330313": []} +{"4871624|7774517": ["However, the issue is extremely challenging, especially when the sensing devices are deployed in uncontrolled environments [29].", "Data quality is a major challenge in the deployment of largescale environmental sensing systems for several reasons [29].", ", the system can adapt to new data instances over time [29]."]} diff --git a/edge/graph_195785073.jsonl b/edge/graph_195785073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e44324e8bad2ee0581b40897333ba47a148945a --- /dev/null +++ b/edge/graph_195785073.jsonl @@ -0,0 +1,55 @@ +{"7708843|18599847": []} +{"3560176|16174597": ["While there is signi\ufb01cant literature regarding how information can be transmitted at layers that use bits or packages as the Protocol Data Units, interoperability among elements in a distributed or Cyber-Physical System applied to higher level layers (session, presentation or application layers,\u2026"]} +{"21697461|16762549": ["Smart Home/City Real-time crowd control [69] [70], realtime irregularity detection of senior citizens [71] [72] Number of smartphones and surveillance cameras."]} +{"21697461|6664074": []} +{"21697461|5385031": ["[27] surveyed a wide range of economic and pric-"]} +{"21697461|21386749": ["[24] provided the state-of-the-art network architecture, applications, and industrial trends in IoT-based healthcare services."]} +{"21697461|7329149": []} +{"8075416|9732448": ["Authors in [34] provide a comprehensive survey on service d covery approaches and define the prime criteria that need to fulfilled for an autonomic service discovery."]} +{"40683810|38288552": []} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"8445147|1236072": []} +{"9673753|8364569": ["More details on flow-based IDSs are presented in a review by [256]."]} +{"9673753|1113420": ["Ontologies have been utilized as a model to represent contextual knowledge by [28]."]} +{"9673753|26690303": ["[284] survey appropriate distancemeasures for intrusion detection research."]} +{"9658521|1113420": ["The iMuseum system realizes centralized context sharing via a double-repository approach.", "But it has shortages for its inefficient storing and querying as it is always represented in semi-structural data."]} +{"4608429|3348390": ["There is a necessity to interpret, analyze and understand sensor data to perform machine-to-machine communications in IoT [13]."]} +{"64821106|85585": []} +{"64821106|13365762": []} +{"64643926|5909964": []} +{"15304024|10416225": ["\u2026Caliusco, Stegmayer, Coronel, & Fabrizi, 2012; Todorov, Geibel, & K\u00fchnberger, 2010), probabilistic methods (Cal\u0131`, Lukasiewicz, Predoiu, & Stuckenschmidt, 2008; Spiliopoulos, Vouros, & Karkaletsis, 2010) or those that consider the user's involvement (Lin & Sandkuhl, 2008b) in the matching process.", "Other articles developed the subject of (iii) external sources for ontology matching (Fugazza & Vaccari, 2011; Lin & Sandkuhl, 2008a), these techniques take advantage of auxiliary or external resources in order to find matchings to terms based on linguistic relations between them such as synonymy\u2026"]} +{"15304024|913718": []} +{"8957353|6988770": ["L. M\u00f6senlechner is with the Technical University of Munich, 85748 Munich, Germany (e-mail: moesenle@cs.tum.edu)."]} +{"52812299|9495329": []} +{"52812299|4427557": []} +{"52812299|4502294": []} +{"52812299|2769147": []} +{"52812299|19938676": []} +{"52812299|2871699": []} +{"52812299|3348390": []} +{"52812299|25929315": []} +{"3361685|16174597": ["It is worth noting that information that is obtained by sensors or other sensing instruments is prone to be uncertain in the underwater environment [5] due to partial views, imperfect instruments, challenging communications, data loss, etc.", "In order to achieve this ambitious goal, the SWARMs project must tackle a set of challenges [5], e.g., de\ufb01ant maritime and underwater communication and data heterogeneity."]} +{"1208330|17756238": ["GPS stalking [81], disclosure of private information such as an illness [82], or generally the uneasy feeling of being watched [83].", "Examples where profiling is leads to a violation of privacy violation are price discrimination [87, 88], unsolicited advertisements [83], social engineering [89], or erroneous automatic decisions [48], e."]} +{"1208330|2906926": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"1208330|2357830": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"7895321|2034384": ["Similar to context, a number of ER extensions have also been proposed to explicitly support temporal aspects of data [13].", ", [11,12,13]), it is often di\u00c6cult to represent observations and their context in traditional conceptual-modeling languages."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"44130250|18599847": []} +{"44130250|9928823": []} +{"44130250|1634674": []} +{"11647448|3348390": ["Perera et al. [2] present a more comprehensive survey of context awareness in IoT, with detailed analysis and Fig.", "\u2026global Internet based information architecture, is the future of ubiquitous sensing and personalized service delivery as it promises a new world where all objects around us are connected to the Internet, having the capability to communicate with each other with minimal human interventions [1-2]."]} +{"53112728|8234786": []} +{"37993206|913718": []} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"49563937|2818055": []} +{"59342086|41901402": ["Some of the more interesting and complete state of the art reviews for such systems are provided by [43,44]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_195787942.jsonl b/edge/graph_195787942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17ec495d8d5edd507d2d134b4ecd65a21862dea6 --- /dev/null +++ b/edge/graph_195787942.jsonl @@ -0,0 +1,5 @@ +{"3559860|195787942": []} +{"109939482|1230643": ["In every automated industry like robotics, aeronautics and aerospace, biomedical devices and the manufacturing industry, sensors are being used to detect changes of the environment and transfer data to a monitoring unit [5]."]} +{"49186173|21386749": ["physician, which could reduce the life threat [29]."]} +{"14473832|14681793": ["Furthermore, it is worth mentioning the introduction of the Resistive RAM memories [12] which can be classified as memristors and can be considered suitable candidates for standalone memory applications due to the excellent scalability and programming time that can be obtained comparing to conventional Flash memories."]} +{"54764067|14681793": ["Indicatively, memristive systems enable new possibilities for computation and non-volatile memory storage as, for example, the construction of memristor-based digital logic circuits [13], applications regarding artificial synapses [14\u201316], resistive RAM (ReRAM) memories [17], and generic memristive structure (GMS) for 3D FPGA applications have been proposed [18]."]} diff --git a/edge/graph_195788798.jsonl b/edge/graph_195788798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9692b42660f308325efde3461aa5102cfa4fd600 --- /dev/null +++ b/edge/graph_195788798.jsonl @@ -0,0 +1 @@ +{"21026854|18144244": ["P C A Z im b a a n d X in g m in g [5 6 ] 8 2 U U", "[4 6 ] 1 2 8 2 U a U U U U U", "The first category is based on digital watermarking, which conceals a watermark into the image at the capturing end and extracts it at the authentication end to examine whether the image has been tampered with [6,7].", "T e x tu re & in te n si ty Z im b a a n d X in g m in g [3 6 ] 7 2 U 9 0 8, 1 8 0 8, a n d 2 7 0 8 U U"]} diff --git a/edge/graph_195790353.jsonl b/edge/graph_195790353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..492e1635bfc96e7786022b80921dea11f0f877f7 --- /dev/null +++ b/edge/graph_195790353.jsonl @@ -0,0 +1,11 @@ +{"16515889|2523102": []} +{"20957412|12904520": ["In recent years, power consumption of all computing systems ranging from embedded systems to data centers has greatly increased [276], [277]."]} +{"214061269|28774896": ["large inputs [39], and state space explosion remains a major obstacle in formal methods [202]."]} +{"214061269|17718674": ["These expressions are inspired by specification languages based on modal logics [6]."]} +{"12290036|17718674": ["Various temporal logics support reasoning about timing properties of systems [12, 3]."]} +{"117552890|8589228": ["Statistical model checking (SMC) [82] has been proposed as an alternative that avoids exhaustive exploration of the state space of the model during verification."]} +{"115216027|30102381": ["evaluate new concepts and vulnerabilities by experimental facilities, as those surveyed by Cintuglu et al. (2017). The theoretical research on security of power grids is expanding in several directions, such as considering the consequences of false data injection attacks on an AC state estimation, by analyzing the results of a DC-based optimization prob-", "pers (including the early preliminary version of this work) categorized by application domains (such as smart grids (He and Yan, 2016; Cintuglu et al., 2017), medical devices (Rushanan et al."]} +{"115216027|8854215": ["pers (including the early preliminary version of this work) categorized by application domains (such as smart grids (He and Yan, 2016; Cintuglu et al., 2017), medical devices (Rushanan et al."]} +{"115216027|1990579": [", 2017), medical devices (Rushanan et al., 2014; Camara et al., 2015; AlTawy and Youssef, 2016), industrial control systems (Stouffer et al."]} +{"115216027|207209718": [" to CPS include authentication, authorization/access control, accountability, cryptography, and boundary protection. Reactive security mechanisms for cyberphysical systems, a.k.a. intrusion detection [43], together with automatic response and recovery, can instead greatly bene\ufb01t from the particular characteristics of this type of systems, thanks to the possibility to use the models of the physical sys", "tudies cannot be considered as a systematic literature reviews but as informal literature surveys. The intrusion detection techniques for different CPS applications were surveyed by Mitchell and Chen [43]. For each presented intrusion detection system (IDS) design it was analyzed which, if any, distinguishing characteristics of cyber-physical intrusion detection were considered. The unique characteris"]} +{"115216027|627405": ["It is fundamental to clearly define the research questions of a systematic literature study [58]."]} diff --git a/edge/graph_195790802.jsonl b/edge/graph_195790802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32fd114c6d1847c693276fd87895dc7b8016050a --- /dev/null +++ b/edge/graph_195790802.jsonl @@ -0,0 +1,3 @@ +{"54842049|12264500": ["Other potential benefits of AVs include enhanced productive use of travel time, fewer emissions, better fuel efficiency, and reduced parking costs [12, 13].", "Safety benefits of fully AVs would not bemaximisedwithout a high penetration rate of AVs [12].", "Implementing AVs within the road network has the potential to significantly reduce the number of crashes caused by the drivers through the gradual removal of human control [12]."]} +{"29990847|12264500": []} +{"117338550|30189749": ["A rather comprehensive survey of lane change/merge for CAVs can be found in [113], [114]."]} diff --git a/edge/graph_195791418.jsonl b/edge/graph_195791418.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195791637.jsonl b/edge/graph_195791637.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eedeb62954fb24448a627df065539798eed3ddb3 --- /dev/null +++ b/edge/graph_195791637.jsonl @@ -0,0 +1,3 @@ +{"14786967|393948": ["As argued by Bengio et al. (2013), the use of deep networks can offer both computational and statistical ef\ufb01ciency for complex tasks."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"7228830|17652653": []} diff --git a/edge/graph_195791753.jsonl b/edge/graph_195791753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..acc98061b6d7640ef8099700557c1760445b6fc0 --- /dev/null +++ b/edge/graph_195791753.jsonl @@ -0,0 +1,5 @@ +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} diff --git a/edge/graph_195806559.jsonl b/edge/graph_195806559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195820437.jsonl b/edge/graph_195820437.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73b26475bee68177f99dad1b27e7eb905eba756c --- /dev/null +++ b/edge/graph_195820437.jsonl @@ -0,0 +1,100 @@ +{"24330089|13074005": ["I NFORMATION guided channel hopping (IGCH), also known as spatial modulation, has recently emerged and been proven to be a promising transmission scheme in multiple-input multiple-output (MIMO) systems [1], [2].", "As is shown in the difference between space shift keying and spatial modulation [2], the relaxation of the problem domain provides more degrees of freedom for the system design, where the transmission rate can be improved by allowing modulated symbols to convey extra information rather than pulse\u2026"]} +{"52002727|3930401": ["Compared to traditional radio frequency (RF) communications, VLC takes advantage of the wide unlicensed visible light spectrum to facilitate high-capacity communications with less inter-cell interference [3], [4], and thus has attracted considerable academic and industrial attentions [5]."]} +{"49722401|8323234": ["In the scenario of ULA, aT (\u03c6l ) can be modeled as [1]", "It is noted that the main obstacles for the success of mmWave systems are the high path loss and rain attenuation, because it is ten-fold increase in carrier frequency [1].", "M ILLIMETER-WAVE (mmWave) communication technique is regarded as an important technology for the upcoming 5G networks since its huge unlicensed bandwidth [1]."]} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"30890640|13074005": []} +{"21718392|13074005": ["Hard Detection Algorithm The conventional ML algorithm [6] obtains optimal performance and high computational complexity simultaneously since it jointly identifies the transmit antenna index and the transmitted symbol by exhaustively search all the possible combinations."]} +{"49728317|13074005": []} +{"49728317|4395259": ["Without relying on higher-layer encryption, inherent randomness of the legitimate link is exploited to make eavesdroppers unable to extract the confidential information from their wiretapping, thus achieving physical layer security [6], [7].", "The definition of secrecy rate over a wire-tap channel [6], [7] leads to the secrecy rate expression of the mapping-varied spatial modulation with finite-alphabet input, denoted by Rs, as Rs = max{0, RB \u2212RE}, (21)", ", if the legitimate link data rate is higher than the wiretapper link data rate [6], [7]."]} +{"7312779|13074005": ["This constitutes the main difference between our PSM/GPSM and the classic SM/GSM [12], [20], [21], although they may be considered as dual pair of each other.", "To elaborate a little further, SM conveys extra information by mapping additional bits to the transmit antenna indices in addition to the classic modulation schemes as detailed in [12], [13].", "As a result, the comparisons between PSM/GPSM and SM/GSM cannot be readily made under identical circumstances, because\n\u2022 the inevitable complexity of pre-processing imposed by PSM/GPSM is not imposed on SM/GSM. \u2022 the channel knowledge requirement of PSM/GPSM is more demanding than that of SM/GSM, since the former suffers further from potential feedback impairments in addition to the channel estimation errors encountered at the receiver, that are common for both schemes.", "Hence, in summary, the PSM/GPSM scheme proposed in this paper constitutes a complement, rather than a competitor of the classic SM/GSM.", "More importantly, they may be used in a hybrid manner in conjunction with SM/GSM."]} +{"19888241|16050825": ["short-range wireless transmission [33], [34]."]} +{"19888241|13074005": ["Generalised Space Shift Keying (GSSK): GSSK is a subset of spatial modulation [146], [147], where spatial domain is exploited to modulate information [148]."]} +{"14401918|13074005": ["However, this feature significantly challenges the acquisition of channel state information (CSI), which is necessary for coherent SM decoding [2]."]} +{"22627907|13074005": ["The log2(M) bits in the second subblock are mapped into a transmitted symbol which is selected from an M-ary signal constellation A [3]."]} +{"3477584|13074005": []} +{"16767727|11720829": []} +{"16767727|18148591": ["gain can be used to improve the signal-to-noise ratios at the receiver [20]\u2013[22]."]} +{"1190761|13074005": ["The latest research achievements and an outline of some relevant open research issues for SM are reviewed in [31]."]} +{"34127088|16050825": ["form is modulated onto the instantaneous power of the optical carrier [270]\u2013[274]."]} +{"34127088|13074005": ["For a comprehensive overview of these studies, interested readers are referred to previous survey papers on SM [61], [65]\u2013[67].", "This is another way of exploiting the SM principle [65] and of encoding the information not only in the impulse response of the channel, but in the interplay between antenna radiation pattern and nearby scatterers.", "For a comprehensive historical overview of the SM concept, interested readers are referred to [65]\u2013[68] and the references therein.", "In light of the above discussion on the concept of SM, MIMO systems employing SM provide attractive advantages over their traditional counterparts [65]\u2013[67], [83].", "Similar to the conventional SM principle [65], the receiver can retrieve the information by solving a hypothesis testing problem based on the four radiation patterns depicted in Fig.", "Our survey article also differs from the existing magazines/survey articles/books in the literature [6], [65]\u2013[69] by several aspects."]} +{"9290134|13074005": ["1 that two distinct observation regions may be found for [Nt , Nr ] = [16, 8].", "6 show the SER as a function of the SNR per bit, for the proposed non-linear GPSM scheme having [Nt , Nr ] = [8, 8] and [Nt , Nr ] = [16, 8], respectively combined with various values of Na = [4, 6, 8] and using 4QAM.", "2 that two distinct observation regions, namely the power limited region and the DoF limited region, may be found for [Nt , Nr ] = [16, 8].", "Quantitatively, for [Nt , Nr ] = [16, 8] and for both the infinite and finite alphabet scenarios, about half Fig.", "Finally, in contrast to [Nt , Nr ] = [16, 8], no power limited region exists observed for [Nt , Nr ] = [8, 8] in Fig.", "Finally, in contrast to [Nt , Nr ] = [16, 8], no power limited region is observed for [Nt , Nr ] = [8, 8] from Fig.", "SER as a function of the SNR per bit for the proposed non-linear GPSM scheme having [Nt , Nr ] = [16, 8] combined with various values of Na = [4, 6, 8] and using 4QAM, where the previously proposed linear GPSM scheme is also included for benchmarking.", "By contrast, when having [Nt , Nr ] = [16, 8] and for both the infinite and finite alphabet scenarios, fewer activated RAs tend to have a lower energy efficiency, since the circuitinduced power consumption dominates.", "To circumvent these problems, low complexity alternatives to conventional MIMO transmission schemes have been proposed, which include the Antenna Selection (AS) [13], [14] and the Spatial Modulation (SM) philosophies [15], [16]."]} +{"8582481|13074005": []} +{"617062|206576720": ["The extent of channel hardening can be viewed a measure of channel orthogonality, as discussed in [7]\u2013[12].", "MIMO (LS-MIMO) techniques has been proposed [6]\u2013[12], which employs tens to hundreds of transmit/receive antennas for dramatically improving the attainable link reliability,", "For these reasons, various LS-MIMO designs have been investigated in the context of energy-efficient SC or SC-like schemes [12], [63]\u2013[65]."]} +{"617062|13074005": ["extensions of SM disseminated in [17]\u2013[19], recently a vari104", "domain, frequency domain and spatial domain fading [17]\u2013 83"]} +{"18015761|13074005": ["To circumvent these problems, low complexity alternatives to conventional MIMO transmission schemes have also been proposed, such as the Antenna Selection (AS) [11], [12] and the Spatial Modulation (SM) [13], [14] philosophies."]} +{"4772875|13074005": []} +{"25324246|13074005": []} +{"3908076|13074005": ["consumption, lower hardware complexity, and higher energy efficiency [16]\u2013[19]."]} +{"3908076|7686677": ["Due to the high energy dissipation and cost of the RF chains [9], the application of such full-digital precoding schemes can be quite disadvantageous."]} +{"4167345|13074005": ["S PATIAL modulation (SM) [1] has been recognized as a novel energy-efficient and low-complexity scheme for multiple-input-multiple-output (MIMO) transmissions [2], [3]."]} +{"3495588|13074005": ["Based on each illegitimate AI vector ([1 1] or [2 2]), Q\u0302M = Q p Nt = 2 legitimate AI vectors are obtained as [1, 2] and [2, 1].", "Example: Assuming that Lcqk = [2, 3, 4, 1], the corresponding AI vector LGqk and AM Gqk are given as follows:", "For the case of Nt = 4, there are a total of two legitimate AMs Aqk of Nt/2 = 2 with the AI vector set Lcqk = ([1, 2]; [2, 1]).", "Example: Assuming that Lcqk = [2, 3, 4, 1], the corresponding Aqk is given as follows:", "LGqk = [3, 4, 5, 6, 7, 8, 1, 2] \u2194 Gqk = \u23a1 \u23a2\u23a3 O O O I I O O O O I O O O O I O \u23a4 \u23a5\u23a6 .", "Lcqk = [2, 3, 4, 1] \u2194 Acqk = \u23a1 \u23a2\u23a3 0 0 0 1 1 0 0 0 0 1 0 0 0 0 1 0 \u23a4 \u23a5\u23a6 ."]} +{"52935963|8323234": ["More recently, the paradigms of RSM and mmWave-MIMOwere combined in [14]\u2013[16] with"]} +{"14886559|6302811": [", the patterns of Ct = {[1,2], [1,3], [1,4], [2,3], [2,4], [3,4]}.", "Upon selecting for example C = {Ct(1),Ct(2),Ct(3),Ct(4)}, we have the following mapping between the SD symbol and the activation patterns k = 1 \u2192 C(1) = [1,2], k = 2 \u2192 C(2) = [1,3], k = 3 \u2192 C(5) = [1,4], and k = 4 \u2192 C(6) = [2,3].", "The history of this subject has evolved from the early thought experiment of 1867 known as \u201cMaxwell\u2019s Demon\u201d [1] to the landmark philosophy referred to as \u201cLandauer\u2019s principle\u201d [2] in the mid-20th century as well as to the development of reversible electronics [3] and to the information heat engine [4] of our modern era."]} +{"3671836|13074005": []} +{"21422686|13074005": []} +{"3985280|13074005": ["Traditionally, the first type of symbols are known as the spatial constellation diagram, whilst the latter symbols are called the signal constellation diagram, [26]."]} +{"19499677|13074005": ["GSSK is therefore a special form of spatial modulation (SM) [5], [21], [22].", "One of such techniques is the spatial multiplexing multiple-input-multiple-output (MIMO) system that is often used to realise improvements in both spectral efficiency and error performance [5]."]} +{"23514202|13074005": ["S INCE its original proposal by Chau and Yu [1], the spatial modulation (SM) multiple-input multiple-output (MIMO) concept [2]\u2013[5] has been extensively investigated in the field of microwave communications due to its ability to increase transmission rates as well as operate using a low-cost single radio frequency transmitter."]} +{"11661254|13074005": []} +{"39255632|13074005": ["If Nu = 1 and the ordered indices l1 = [2, 3, 1, 4, 5, 7, 8, 6], three TACs can be obtained as I1 = 2, I2 = 3, and I3 = 1 through selecting the first m = 3 indices of l1.", "If Nu = 2 and the ordered indices l1 = [2, 3, 1, 4, 5, 7, 8, 6], l2 = [1, 5, 6, 2, 8, 3, 4, 7], one first obtains the combination set l\u0302 = (2, 3, 1, 1, 5, 6) by selecting the"]} +{"13029690|8323234": ["In addition, we also assume that the transmitter knows \u03c6k and the receiver knows \u03b8k and \u03b2k [1], [2].", "On the other hand, as a radio frequency (RF) chain has high hardware cost and power consumption, various reduced RF chain architectures have been designed for implementing a precoding scheme in mmWave systems [2]."]} +{"5719427|13074005": ["However, as mentioned in [1], since the fading channel is the inherent modulation unit in SM, the development of a differential scheme for SM faces significant challenges.", "Spatial modulation (SM) [1]\u2013[6] is a recently developed multipleinput\u2013multiple-output (MIMO) technique, in which the information bits are partitioned into two parts, of which one modulates the symbol and the other activates one out of all transmit antennas."]} +{"7155439|13074005": ["In SM literature [4], the set of Nt antennas (nt = 1, 2, .", "S PATIAL MODULATION (SM) is a digital modulation concept for multiple-input\u2013multiple-output (MIMO) wireless systems that has recently been introduced to increase the data rate of single-antenna systems by keeping a lowcomplexity transceiver design and by requiring no bandwidth expansion [1]\u2013[4]."]} +{"7155439|7686677": ["transmitter have less stringent linearity requirements [46], then SM-PSK seems to be preferred to SM-QAM in all cases.", "As a matter of fact, in [46], it is mentioned that a non-negligible"]} +{"1414486|13074005": ["As established in previous reports on SM, the performance of SM technique is highly dependent on the dissimilarity of the channel gains of the transmit-receive paths [1], [2], [25].", "However, such improved system performance comes at the cost of increase in system complexity and cost [1]."]} +{"3249810|13074005": []} +{"23717956|13074005": ["Owing to their above-mentioned advantages, SM/SSK have received a considerable attention from the research community [9]\u2013[13], and references therein."]} +{"27521904|7686677": ["However, the precoding is conventionally carried out entirely in the digital domain, which demands a large number of dedicated radio frequency (RF) chains and therefore leads to prohibitive energy consumption [9]."]} +{"31601553|13074005": ["Relatively new, spatial modulation (SM) is an example of this effort as it encodes information in the index of the specific antenna activated for the transmission of the modulated symbols [3], [4]."]} +{"19167180|13074005": ["Recently, a new MIMO scheme has been proposed named Spatial Modulation (SM) [3], [4], [5]."]} +{"25063574|13074005": ["A comprehensive overview of SM, design guidelines, practical implementations and potential application fields of SM can be found in [4]\u2013[7]."]} +{"2943948|8323234": ["Unfortunately, the high complexity, cost and power consumption of multiple radio frequency (RF) chains in mmWave-MIMO hinder its practical realization [13]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"52843855|13074005": ["Spatial modulation (SM), which first applies the IM concept into the space domain, can be considered as a special case of multi-input-multi-output (MIMO) techniques [3]\u2013[6]."]} +{"18492352|13074005": ["Even though the performances of SSK and SM have been extensively studied for different scenarios [5]- [6], very limited attention has been paid to the secrecy behavior of these schemes."]} +{"3180691|13074005": ["Reproduced from [48] with permission.", "[48], [53].", "\u2026SM has recently established itself as a promising transmission concept, which belongs to the single-RF [36] large-scale [41] MIMO wireless systems family, while exploiting the multiple antennas in a novel fashion compared to state-of-the-art high-complexity and power-hungry classic MIMOs [48].", "We conclude this glimpse into the history of SM\u2013 MIMO by mentioning that the first (and only available) survey papers on the SM concept were published in December 2011 and in mid 2012 in [48] and [92], respectively.", "Briefly, this implies that the channel impulse responses of the transmit-to-receive links are sufficiently different from each other [48].", "In SM\u2013MIMO research, this third dimension is termed the \u2018\u2018spatial-constellation diagram\u2019\u2019 [48]."]} +{"3180691|7686677": ["This allows the BSs to turn off the related RF chains with filters and mixers, which saves additional power.", "New infrastructure elements, such as femto/pico BSs, fixed/mobile relays, cognitive radios, unlicensed millimeter-wave radios, and distributed antennas are being deployed, thus making future cellular systems more heterogeneous [293].", "So far, only the baseline point-to-point single-cell cellular network has been studied, where the effect of other-cell interference is neglected and the characteristics of different types of BSs are not taken into account.", "However, in practice, MIMO systems need a multiplicity of associated circuits, such as power amplifiers, RF chains, mixers, synthesizers, filters, etc., which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "For example, the typical RF coaxial cables used in current tower-mounted BSs are more than four centimeters in diameter [42].", "The rationale behind the multi-RF to single-RF paradigm shift in MIMO design originates from the consideration that large numbers of TAs (radiating elements) may be accommodated at the BSs (large-scale MIMO design) [41], [42], especially in the emerging millimeter-wave band [43]\u2013[46], bearing in mind that the complexity and power consumption/dissipation of MIMO communications are mainly determined by the number of simultaneously active TAs, i.e., by the number of active RF chains [40], [47].", "more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "BSs with a variable number of TAs .", "Under the so-called SOTA-2010 power consumption model [31], [32], the EE of various types of BSs (macro, micro, pico, and femto) is investigated by comparing SM to conventional MIMO communications.", "The main idea is to enable the BSs to use only a subset of the available TAs in order to reduce the power consumption.", "Raising dilemmas, such as using a few BSs in combination with large-scale MIMOs, using many small cells illuminated by low-power BSs having a few TA elements each, or whether to combine large-scale MIMOs and small-cell networks, have to be addressed.", "Limiting the number of active RF chains for the sake of reducing the power consumption of BSs has been actively discussed within 3GPP standardization bodies.", ", which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "This finding is important because it brings to our attention that constant-envelope modulation may be a suitable choice for SM\u2013MIMO communications since it may offer an improved power efficiency and a reduced complexity, while mitigating the linearity requirements of the power amplifiers [5], without any performance degradation compared to amplitude modulation schemes.", "The cellular network of the future will be: heterogeneous and characterized by a small-cell infrastructure relying on inexpensive and low-power BSs (femtocells) in order to achieve high data rates [3], [8]; green, by evolving from a throughput-optimized scenario toward throughput-and energy-optimized networks [5], [16], [18]; interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Large-scale MIMO is an emerging technology, where BSs with hundreds of antennas serve a few mobile terminals per channel use [41].", "While each BS connected to the electrical grid may cost approximately $3000 per year to operate, off-grid BSs operating in remote areas generally run on diesel power generators and may cost ten times more [5].", "Compared to baseline single-antenna transmissions, MIMO communications obtain higher data rates and improved error performance at the cost of: \u2022 increasing the signal processing complexity at the receiver, which is caused by the need for counteracting the interference imposed by simultaneously transmitting many data streams; \u2022 more stringent synchronization requirements among the TAs to exploit the benefits of spacetime-coded and multiuser MIMO transmissions; \u2022 multiple RF chains at the transmitter to be able to simultaneously transmit many data streams, which do not scale with Moore\u2019s law and make the transmitter bulky [36]; \u2022 independent power amplifiers for each RF chain, which dissipate the majority of the power consumed at the transmitter, since they are power inefficient due to the stringent linearity requirements of state-of-the-art phase/amplitude modulations [5].", "The reduced linearity requirements of constant-envelope modulation increase the efficiency of power amplifiers, which, in turn, reduce the total power consumption of the transmitters [5].", "\u2022 green, by evolving from a throughput-optimized scenario toward throughput- and energy-optimized networks [5], [16], [18]; \u2022 interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; \u2022 characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; \u2022 relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Consider a relaying-aided MIMO system for application in the downlink of cellular networks relying on fixed RSs, where both BSs and RSs are equipped with multiple antennas [259].", "Furthermore, the employment of low-power BSs has the beneficial effect of reducing the transmission distance between mobile terminals and access points, which results in performance improvements.", "In addition, unlike macro BSs that are usually heavily loaded most of time, the femto BSs are expected to be lightly loaded, which leads to further reduction of the power consumption since they will not be transmitting all the time, hence facilitating sleep-mode-based operation.", "More explicitly, recent studies have clearly shown that the EE gain of MIMO communications increases with the number of antennas, provided that only the transmit power of the BSs is taken into account and their circuit power dissipation is neglected.", "Currently, there are more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "On the other hand, the EE gain of MIMO communications remains modest and decreases with the number of active TAs, if realistic power consumption models are considered for the BSs [33]."]} +{"3180691|12060835": ["An option that is currently gaining momentum in green networking is RF energy harvesting, which can provide additional energy supply for wireless devices [297]."]} +{"3418999|13074005": []} +{"2947859|13074005": []} +{"3620679|13074005": ["A distinct characteristic of SM is that it allows additional information being conveyed through antenna selection, and thus the overall spectral ef\ufb01ciency can be improved [7], [12]."]} +{"24328909|13074005": ["Spatial modulation [15], [16], also known as informationguided channel-hopping (IGCH) [17]\u2013[19] and space shift keying (SSK) [20], [21], is recently proposed as a candidate approach to improve spectral efficiency in wireless systems with multiple antennas at the transmitter."]} +{"22807189|13074005": ["S PATIAL modulation (SM) is a new modulation technique employing multiple transmit antennas in conjunction with conventional amplitude-phase modulation (APM) schemes to transmit the information through multi-input multi-output (MIMO) wireless channels [1]\u2013[4]."]} +{"4858266|13074005": []} +{"14401782|13074005": ["We begin with a brief description of SM for the case of single user point-to-point communication [4].", "Specifically, we compare the achievable ergodic capacity of SM [4], STBC [7], and MISO with only transmit diversity [12], [6].", "In this paper, motivated by the potential of SM [4], we employ the power model from [5] in order to study the overall power performance of a BS employing SM.", "SM is a relatively new MIMO concept that enables high data rates while retaining the single RF chain configuration at the transmitter [4]."]} +{"17583504|11720829": ["Spatial Modulation (SM) [7], is one kind of MIMO technique having spectral efficiency higher than single-input-single-output (SISO) systems.", "Multiple-input-multiple-output (MIMO) [5], is an interesting candidate to boost spectral efficiency.", "Beside its high spectral efficiency advantage, MIMO technologies suffers from many drawbacks like inter-channel interference (ICI) [6], synchronization between the antennas and complexity.", "MIMO can achieve high spectral efficiency at cost of inter-carrier interference (ICI), synchronization between the antennas and complexity.", "Multiple-input-multiple-output (MIMO) is an effective and promising way to enhance spectral efficiency of wireless communication systems."]} +{"27785656|13074005": ["Well known advantages of SM include the avoidance of Inter-Antenna Synchronization (IAS) at the transmitter and Inter-Channel Interference (ICI) at the receiver [7].", "An example of such a scheme is Spatial Modulation (SM) [7]."]} +{"7777808|13074005": ["To circumvent this problem, spatial modulation (SM) technique has recently been applied to MIMO systems [4]-[7]."]} +{"151522|11720829": ["Substituting the channel coefficients generated from (8) into (7), we obtain, via simulation, the outage performance of the MMI in terms of percentages that is defined similar to [14] for the definition of outage capacity in percentage: q% outage MMI is defined as the information rate guaranteed for (100\u2212 q)% channel realizations."]} +{"15207748|18148591": ["[5] D. Gesbert, M. Shafi, D.-S. Shiu, P. Smith, and A. Naguib, \u201cFrom theory to practice: An overview of MIMO space-time coded wireless systems,\u201d IEEE J. Sel.", "[6] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo, \u201cSpatial modulation for generalized MIMO: Challenges, opportunities, implementation,\u201d Proc.", "One key technology that significantly increases the throughput of wireless channel is the multi-input multi-output (MIMO) [5].", "This setting achieves high data rate with lower complexity as compared to the conventional MIMO and avoids inter-channel interference (ICI) and antenna synchronisation.", "Spatial modulation (SM) is proposed as a low complexity variation to the MIMO scheme where the information bits are mapped to the constellation symbols and the transmit antenna index and only one antenna is needed for the transmission in each time slot [6].", "The proposed system, which is called code index modulation-spread spectrum (CIM-SS), can be integrated with the MIMO or SM systems to achieve higher throughput."]} +{"43062157|13074005": []} +{"23272788|15453366": ["M ILLIMETER-WAVE (mmWave) communication, which is largely motivated by the global spectrum shortage at the current 2G, 3G, and 4G frequencies, is an emerging technology that provides us with multi-GHz bandwidth and enables transmission rates of multi-Gbps [1]\u2013[3]."]} +{"23090021|1580493": ["16 WiMAX, and Long-Term Evolution (LTE) [1].", "Orthogonal frequency division multiplexing (OFDM) has become a ubiquitous digital communications technique as a bene\ufb01t of its numerous virtues, including its capability of providing high-rate data transmission by splitting the serial data into many low-rate parallel data streams [1]."]} +{"36255599|13074005": ["the number of active antenna elements is fixed and strictly less than Nt, thus leading to a simpler and less bulky transmitter design [2], [41].", "In SM literature, the ensemble of vectors a(\u00b7) is called spatial constellation diagram [2].", "compared with many state-of-the-art multiple-input\u2013multipleoutput (MIMO) schemes [2].", "In SM literature, the set M of M = card{M} complex symbols is called signal constellation diagram [2].", "2) making more stringent synchronization requirements among the transmit antennas [2], [11], [45]."]} +{"36255599|7686677": []} +{"15922693|1165497": ["OW offers almost limitless bandwidth to cope with the future demand of indoor wireless access to realtime bandwidth-intensive applications such as Voice over IP (VoIP), streaming video and music, and network attached storage (NAS) [1, 2]."]} +{"31197679|13074005": ["Besides, the conventional SM regime is adopted by the BS [1].", "INTRODUCTION As a novel extension of the conventional multiple-input multipleoutput (MIMO) techniques, spatial modulation (SM) has attracted substantial interest in both academic and industry [1]\u2013[3]."]} +{"86434571|8323234": ["Specifically, to meet these challenging technical requirements, new transmission schemes, such as millimeter-wave (mmWave) [2], [3], massive multiple-input multiple-output (massive MIMO) [4] and new waveform/modulation have been proposed."]} +{"2193047|13074005": ["For arbitrary Nt and M , the rate of SM is RSM = log2 (M) + log2 (Nt) bpcu [3].", "As a consequence, MIMO techniques can provide high data rates without any bandwidth-expansion and without increasing the transmit power [3].", "Again, in SMMIMO research, this third dimension is often termed as the \u201cspatial-constellation diagram\u201d [3].", "Fueled by these considerations, Spatial Modulation (SM) has recently established itself as a promising transmission concept, which belongs to the few-RF MIMO wireless system family, whilst exploiting the availability of multiple antennas in a novel fashion compared to state-of-the-art highcomplexity and power-hungry classic MIMO systems [3]."]} +{"4895726|13074005": []} +{"62602273|13074005": ["Spatial modulation (SM) is a unique single-stream transmission technique for Multiple-Input Multiple-Output (MIMO) wireless communication systems [2]\u2013[4]."]} +{"24517385|13074005": ["Then, ju n is estimated as \u0135u n = argmax j\u2208[Nt ] | \u02c6\u0304 x u n( j)| as [2], [13].", "Base on [20], the data part can transmit N log2(NtM) databits by jointly exploiting the spatial and Quadrature Amplitude Modulation (QAM) constellations of SM [2], [12], [13].", "iv): We construct a new MMSE detector by combining the modified MMSE for the quantized MIMO [29] with the stage-wised MMSE for the un-quantized SM-MIMO [12], [13].", "Next, by combining the modified MMSE for the quantized MIMO [29] with the stage-wised MMSE for the un-quantized SM-MIMO [2], [13], a new Minimum Mean Square Error (MMSE) detector is constructed for the quantized massive SMMIMO.", "ditional spatial constellation [12], [13]), the spectral efficiency can be increased without sacrificing the advantages of single-", "as Maximum Likelihood (ML) detector [4], [12], Minimum Mean Square Error (MMSE) detector [12], [13], and message passing detector [3].", "During the stage of CE, this pilot sequence is transmitted alternatively by the Nt TAs (from the 0th to (Nt \u2212 1)th TA) because the UE has only one RF chain [2], [13]."]} +{"5936282|13074005": []} +{"86742800|22221919": ["Due to these advantages, NOMA has been widely recognized as one of the key enabling technologies to meet the stringent requirements in fifth generation (5G) wireless networks [6], [7], and various aspects of NOMA have been extensively studied in the past few years."]} +{"6492951|13074005": ["To alleviate this impact, SM poses as a reduced RF-complexity scheme by exploiting the transmit antenna indices as an additional source of information [3], [8], [9].", "This reduces the number of RF chains when compared to conventional MIMO systems at the cost of decreasing the maximum achievable rates [3], [8], [9]."]} +{"930626|13074005": ["In SM, the transmitter activates one out of nT transmit antenna elements at every symbol time, and a signal modulated using conventional M -point constellations, such as Quadrature Amplitude Modulation (QAM) or PhaseShift Keying (PSK), is transmitted from the activated antenna [25]."]} +{"28360544|13074005": ["The classical SM schemes, such as space shift keying (SSK) [8], generalized SM (GSM) [9], [10], trellis coded SM (TC-SM) [11] and their variants are all devoted to"]} +{"49195349|13074005": ["The GSM with nt = 1 is usually referred to as spatial modulation (SM) in [1]\u2013[3]."]} +{"9749319|8323234": []} +{"24434425|22833814": ["In [34] and [35], this model was further improved by involving more time-varying parameters such as angles of arrival (AoAs) and angles of departure (AoDs)."]} +{"24434425|13074005": []} +{"24434425|860072": ["Consequently, there is a great demand for high data rate and reliable communication services [2], [3]."]} +{"872740|12029139": ["For high energy demands, this results in a system that is capable of providing a non-zero rate while conventional MIMO-SWIPT systems are shown to offer a rate that is close to zero.", "In particular, the setup NS = NR = 4 corresponds to the conventional MIMO-SWIPT case.", "It offers the possibility of delivering controllable and on-demand wireless information and energy concurrently, which enables one to design low-cost wireless systems for self-sustainable operation and without modifying the hardware at the transmitter [19].", "MIMO-SWIPT is a concept that jointly combinesWIT and WPT by sharing a common circuitry.", "This is the main benefit of RSM-SWIPT compared with conventional MIMO-SWIPT.", "As a result, MIMO systems are widely used for wireless information transfer (MIMO-WIT) [4]\u2013[6], wireless power transfer (MIMO-WPT) [7]\u2013[18], and simultaneous wireless information and power transfer (MIMO-SWIPT) [19]\u2013[27].", "Thus, it constitutes a more flexible option compared with conventional MIMO-SWIPT schemes where the number of information streams is equal to the number of receive antennas regardless of the energy harvesting requirements.", "Only if Q0 is small, the optimal setup corresponds to the conventional MIMO-SWIPT case."]} +{"872740|13074005": []} +{"872740|11720829": ["INTRODUCTION Multiple-input multiple-output (MIMO) wireless systems are capable of providing rate, diversity and array gains, by using transmission techniques such as spatial multiplexing (SMX), receive combining, and transmit beamforming [1]\u2013[3]."]} +{"42211484|13074005": ["In this case, up to log2 Nt bits extra information can be conveyed by antenna index [6], [7].", "Spatial modulation is a dominant transmission scheme for single RF chain MIMO [5]\u2013[7].", "Mutual information derived by sending signal symbol over the weak link is evidently worse than that of the strong link, which makes the performance of spatial modulation depend on favorable propagation conditions [6], [7]."]} +{"11601140|13074005": ["More details about SSK modulation can be found in [9], [10]."]} +{"12400461|13074005": ["It is believed that only practical experiences can yield definitive answers on the achievable performance of single-RF system in real-world devices [4].", "chain is used at the transmitter, have been proposed to reduce the complexity and cost of multiple-antenna systems [4]\u2013[7]."]} diff --git a/edge/graph_195820468.jsonl b/edge/graph_195820468.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4ea63b18c834335058c5589afb06cdd8dc3a598 --- /dev/null +++ b/edge/graph_195820468.jsonl @@ -0,0 +1 @@ +{"15533469|14077778": ["We restrict our attention to constrained environments and do not consider more sophisticated exponentiation algorithms (see [7] for a survey)."]} diff --git a/edge/graph_195820555.jsonl b/edge/graph_195820555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f19cda24296c08b0bfaf97e59056ddb16e5f27e2 --- /dev/null +++ b/edge/graph_195820555.jsonl @@ -0,0 +1,18 @@ +{"53209179|4899141": ["The analysis of comics and mangas images recently sparked the computer vision and document analysis communities interest [2]."]} +{"8429102|14140377": [", [Comrie, 1976; Comrie, 1985; Halliday, 1976; Nerbonne, 1986; Hornstein, 1990; Vlach, 1993]), natural language processing [Hinrichs, 1987; Webber, 1987; Passonneau, 1988; Mani and Pustejovsky, 2004], and artificial intelligence/database theory [Allen, 1991; \u00d6zsoyoglu and Snodgrass, 1995; Terenziani and Snodgrass, 2004]."]} +{"14809686|10397481": ["There is a traditional field of content-based analysis that uses internal information such as images, audio and text [15, 27]."]} +{"15237618|206602044": []} +{"14406905|207372751": ["In recent years, researchers have started to study the co-occurrence properties of words in the natural language space [6, 7]."]} +{"3307943|2748484": ["They include shot boundary detection for movie segmentation [1], [2], video summarization [3] and abstraction [4]."]} +{"23335884|10397481": []} +{"23335884|2748484": []} +{"8549129|2355696": []} +{"8549129|2748484": ["However, it seems that approaches based on audiovisual features face an unbreakable impediment."]} +{"9503936|2748484": ["Various video abstraction techniques [4] have been proposed to represent movie content in a compact manner."]} +{"14116122|8360759": ["Some representative frames that summarize the main human action classes are depicted in Figure 3.", "Real time classification and prediction of future actions was proposed by Morris and Trivedi (2011), where an activity vocabulary is learned through a three-step procedure.", "Finally, a thorough analysis of the ontologies for human behavior recognition from the viewpoint of data and knowledge representation was presented by Rodr\u00edguez et al. (2014)."]} +{"14116122|16013270": ["A complete survey, which covers important aspects of human activity recognition datasets, was introduced by Chaquet et al. (2013). An appropriate human activity dataset is required for the development of a human activity recognition system.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004). However, their method cannot deal with data that contain complex backgrounds, and due to the down-sampling of the original data the audio-visual synchronization may be lost. Also, their method used different sets of hidden states for audio and visual information. This property considers that the audio and visual features were a priori synchronized, while it increases the complexity of themodel.Metallinou et al. (2012) employed several hierarchical classification models from neural networks to HMMs and their combinations to recognize audio-visual emotional levels of valence and arousal rather than emotional labels, such as anger and kindness.", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests.", "A complete survey, which covers important aspects of human activity recognition datasets, was introduced by Chaquet et al. (2013).", "Similarly, Chen et al. (2015) proposed a real-time emotion recognition system that modeled 3D facial expressions using random forests. The proposed method was robust to subjects\u2019 poses and changes in the environment. Wu et al. (2010) proposed a human activity recognition system by taking advantage of the auditory information of the video sequences of the HOHA dataset (Laptev et al., 2008) and used late fusion techniques for combining audio and visual cues. The main disadvantage of this method is that it used different classifiers to separately learn the audio and visual context. Also, the audio information of the HOHA dataset contains dynamic backgrounds and the audio signal is highly diverse (i.e., audio shifts roughly from one event to another), which generates the need for developing audio feature selection techniques. Similar in spirit is the work of Wu et al. (2013), who used the generalized multiple kernel learning algorithm for estimating the most informative audio features. They applied fuzzy integral techniques to combine the outputs of two different SVM classifiers, increasing the computational burden of the method. Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004). However, their method cannot deal with data that contain complex backgrounds, and due to the down-sampling of the original data the audio-visual synchronization may be lost. Also, their method used different sets of hidden states for audio and visual information. This property considers that the audio and visual features were a priori synchronized, while it increases the complexity of themodel.Metallinou et al. (2012) employed several hierarchical classification models from neural networks to HMMs and their combinations to recognize audio-visual emotional levels of valence and arousal rather than emotional labels, such as anger and kindness. Vrigkas et al. (2014b) employed a fully connectedCRFmodel to identify human behaviors, such as friendly, aggressive, and neutral."]} +{"14116122|6387482": ["In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010). Early fusion, or fusion at the feature level, combines features of different modalities, usually by reducing the dimensionality in eachmodality and creating a new feature vector that represents an individual. Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013). The advantage of early fusion is that it yields good recognition results when the different modalities are highly correlated, since only one learning phase is required. On the other hand, the difficulty of combining the different modalities may lead to the domination of one modality over the others. A novel method for fusing verbal (i.e., textual information) andnon-verbal (i.e., visual signals) cues was proposed by Evangelopoulos et al. (2013). Each modality is separately analyzed and saliency scores are used for linear and non-linear fusing schemes.", "In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010).", "In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010). Early fusion, or fusion at the feature level, combines features of different modalities, usually by reducing the dimensionality in eachmodality and creating a new feature vector that represents an individual. Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013). The advantage of early fusion is that it yields good recognition results when the different modalities are highly correlated, since only one learning phase is required. On the other hand, the difficulty of combining the different modalities may lead to the domination of one modality over the others. A novel method for fusing verbal (i.e., textual information) andnon-verbal (i.e., visual signals) cues was proposed by Evangelopoulos et al. (2013). Each modality is separately analyzed and saliency scores are used for linear and non-linear fusing schemes. The second category of methods, which is known as late fusion or fusion at the decision level, combines several probabilistic models to learn the parameters of each modality separately. Then all scores are combined together in a supervised framework yielding a final decision score (Westerveld et al., 2003; Jiang et al., 2014). The individual strength of eachmodality may lead to better recognition results. However, this strategy is time-consuming and requires more complex supervised learning schemes, which may cause a potential loss of inter-modality correlation. A comparison of early versus late fusion methods for video analysis was reported by Snoek et al. (2005). Recently, a third approach for fusingmultimodal data has come to the foreground (Karpathy et al."]} +{"14116122|8042572": ["In the literature, there are two main fusion strategies that can be used to tackle this problem (Atrey et al., 2010; Shivappa et al., 2010)."]} +{"14116122|1634674": ["Xu et al. (2015) addressed these limitations and proposed a general probabilistic framework for joint actor-action understanding while they presented a new dataset for actor-action recognition.", "A fine separation between the meanings of \u201caction\u201d and \u201cactivity\u201d was proposed by Turaga et al. (2008), where the activity recognition methods were categorized according to their degree of activity complexity."]} +{"14116122|5401262": ["Some representative frames that summarize the main human action classes are depicted in Figure 3.", "Figure 4 depicts an example of a space-time approach based on dense trajectories and motion descriptors (Wang et al., 2013).", "Pantic et al. (2006) studied several state-of-the-art methods of human behavior recognition including affective and social cues and covered many open computational problems and how they can be efficiently incorporated into a human-computer interaction system."]} +{"14116122|7788290": ["A recent review on 3D pose estimation and activity recognition was proposed by Holte et al. (2012b). The authors categorized 3D pose estimation approaches aimed at presenting multiview human activity recognition methods.", "Gavrila (1999) separated the research in 2D (with and without explicit shape models) and 3D approaches.", "Canonical correlation analysis (CCA) (Hardoon et al., 2004) was widely studied in the literature as an effective way for fusing data at the feature level (Sun et al., 2005; Wang et al., 2011c; Rudovic et al., 2013).", "Song et al. (2012a) proposed a novel method for human behavior recognition based on multiview hidden conditional random fields (MV-HCRF) (Song et al., 2012b) and estimated the interaction of the different modalities by using kernel canonical correlation analysis (KCCA) (Hardoon et al., 2004).", "A recent review on 3D pose estimation and activity recognition was proposed by Holte et al. (2012b). The authors categorized 3D pose estimation approaches aimed at presenting multiview human activity recognition methods. The work of Shotton et al. (2011) modeled 3D human poses and performed human activity recognition from depth images by mapping the pose estimation problem into a simpler pixel-wise classification problem.", "Nicolaou et al. (2014) proposed a novel method based on probabilistic canonical correlation analysis (PCCA) (Klami and Kaski, 2008) and DTW for fusing multimodal emotional annotations and performing temporal aligning of sequences.", "Sargin et al. (2007) suggested a method for speaker identification integrating a hybrid scheme of early and late fusion of audio-visual features and used CCA (Hardoon et al., 2004) to synchronize the multimodal features.", "(2007) suggested a method for speaker identification integrating a hybrid scheme of early and late fusion of audio-visual features and used CCA (Hardoon et al., 2004) to synchronize the multimodal features. However, their method can cope with video sequences of frontal view only. Metallinou et al. (2008) proposed a probabilistic approach based on GMMs for recognizing human emotions in dyadic interactions."]} diff --git a/edge/graph_195831480.jsonl b/edge/graph_195831480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79d270f68fdceeef9c2a230b6f6bcaf102c58ee1 --- /dev/null +++ b/edge/graph_195831480.jsonl @@ -0,0 +1,19 @@ +{"2920396|8323234": []} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"4948834|8323234": ["Therefore, the large number of RF chains with prohibitively high power consumption is a bottleneck for mmWave MIMO with large antenna array in practice [1], [3].", "Firstly, due to the lack of array gains before the establishment of the transmission link, the SNR for channel estimation in PAHP is quite low [3].", "One challenging problem is that each antenna in MIMO systems usually requires one dedicated radio-frequency (RF) chain, including digital-to-analog converters (DACs), mixers, and so on [3].", "This means that analog beamforming cannot fully exploit the potential of mmWave MIMO in spectrum efficiency [3], [5].", ", 250 mW at mmWave frequencies compared with 30 mW at microwave frequencies) [3].", "Such design constraint will incur some performance loss [3].", "Precoding is used to adjust the weights of transmitted signals to maximize the achievable sum-rate [3].", "This is because that the wavelengths at mmWave frequencies are quite small compared to the obstacle size, leading to poor diffraction [3].", "On the other hand, the short wavelengths associated with mmWave frequencies enable a large antenna array to be packed in a small physical size, which means that MIMO with a large antenna array is possible at mmWave frequencies to effectively compensate the high path loss induced by high frequencies and considerably improve the spectrum efficiency [3].", "More importantly, analog beamforming can only support single-stream transmission, which cannot be used in multi-stream or multi-user scenarios [3]."]} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"20712275|15453366": ["propagation channels, antenna technology, transceiver integration, and digital signal processing [17].", "less otherwise specified, the parameters in (1) are dB [17], dB [33], dBm at a standard temperature 17 , GHz, dB (a reasonable assumption based on Table III for Si technologies), dB,"]} +{"207178666|17816684": ["More rigorous treatments on the PHY and MAC design can be found in [19, 54, 124].", "Vehicular communications in the DSRC context at lower frequencies have been extensively studied [19, 54, 57, 74, 86, 124], but there are few surveys on mmWave vehicular communications [58, 75, 143]."]} +{"207178666|7482876": ["Insights on the vehicular propagation channels at lower frequencies can be found in [74, 86].", "Vehicular communications in the DSRC context at lower frequencies have been extensively studied [19, 54, 57, 74, 86, 124], but there are few surveys on mmWave vehicular communications [58, 75, 143]."]} +{"207178666|15453366": ["The FCC has allocated a contiguous 7 GHz frequency band between 57-64 GHz since 2001 for short range communications in an unlicensed basis [1, 159]."]} +{"22940098|19938676": ["others [8], [10], [11]."]} +{"53208112|8323234": ["\u2026in the literature including channel modeling [2], design of air interface and optimal transceiver algorithms [3], [4], beam training and tracking [4], system prototyping [5], etc. Compared with sub-6 GHz wireless systems, communication over mmWave frequencies experiences substantially different\u2026", "\u2026whose training overhead is K 2 log K G t slots where K is the number of sectors and G t stands for the number of transmit antennas, the overhead needed for our proposed architecture is only L + 1 slots, where L represents the number of paths in the mmWave \ufb01nite dimensional channel model of [4].", "\u2026of research has been reported in the literature including channel modeling [2], design of air interface and optimal transceiver algorithms [3], [4], beam training and tracking [4], system prototyping [5], etc. Compared with sub-6 GHz wireless systems, communication over mmWave frequencies\u2026", "The adoption of beamforming in mmWave systems, for the purpose of compensating the severe path loss and improving the effective signal-to-interference ratio (SINR), necessitates the usage of large-scale phased antenna arrays or lens topologies [4].", "Besides that, IQ-imbalance may also impact different large-scale antenna array architectures in mmWave, i.e., full digital beam-forming and hybrid beamforming architectures [4].", "Recall that there are still multiple barriers in designing optimal transceiver algorithms for conventional architectures, where the hardware always has less \ufb02exibility and the baseband operation is inherently bonded by the \ufb01xed hardware architecture [4]."]} +{"2722298|15453366": []} +{"93000178|8999817": []} +{"21381783|15453366": ["The millimeter wave channel characteristics, to a large extent, dictate the choice of physical (PHY) layer and medium access control (MAC) layer schemes as well as the hardware implementation [11], [12]."]} +{"7942900|3054454": []} +{"44151828|10235514": ["As for the RF chains, the maximum numbers are 32 and 8 for the BSs and UEs, respectively [210], [223].", "include two core physical layer (PHY) technologies (mmWave and massive MIMO) in the 5G NR [223]."]} +{"44151828|19938676": ["following [17], [18], [21], [32]: \u2022 Need for simple, linear and real-time techniques and hardware for optimized processing of the vast amounts of generated baseband data, at associated internal power consumption.", "but also by eliminating expensive and bulky components (such as large coaxial cables) and high-power radio frequency (RF) amplifiers at the front-end [17], [21]."]} +{"678032|8323234": ["Rain attenuation in different frequency bands [35]. needs to increase with the bandwidth if the signal-to-noise ratio (SNR) should remain intact [14].", "[14] is a recent overview paper on signal processing for mmWave MIMO.", "However, since the analog circuit can only partly adjust the signals, it is hard to adjust the beam to the channel conditions and this leads to a considerable performance loss [14], particularly for mobile users.", "However, realizing a fully digital MIMO implementation at mmWave frequencies is a non-trivial task, using current circuit design technology [14].", "The analog circuits of the hybrid architecture can be implemented by different circuit networks, leading to different hardware constraints [14], [115], [116].", "Yet, reference [14] is focused in mmWave MIMO and other topics e.g., recent developments of channel measure/modeling, multiple access, standardization, \ufb01eld test are missing.", "Note that references [7], [12]\u2013[14], [16] gave excellent overviews of some aspects of mmWave mobile networks from different aspects.", "In addition, fully analog architecture can only support single-stream transmission, which cannot achieve the multiplexing gain to improve spectral ef\ufb01ciency [14]."]} +{"67770143|9978124": ["\u2026location has bene\ufb01ts for several applications, such as positioning of unmanned aerial vehicles (UAVs), ground robots, in factory automation, or for automated vehicles [93], as well as new disruptive applications in the contexts of virtual and augmented reality, gaming, social networking, etc. [94]."]} +{"537110|8836911": ["in the multi-radio multi-channel MAC are surveyed, and a classification of control separation techniques is provided in [16]."]} diff --git a/edge/graph_195831952.jsonl b/edge/graph_195831952.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195832430.jsonl b/edge/graph_195832430.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62156b015a290d12649ae11459fa60b7100a7eae --- /dev/null +++ b/edge/graph_195832430.jsonl @@ -0,0 +1,85 @@ +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"3608741|2521001": ["For example, if attackers can compromise smart home devices, they can spy on the inhabitants or even gain physical access to the home (see [169] for a sur-"]} +{"3608741|6670217": ["This is naturally the case for mobile phones that, when compromised, can lead to a complete violation of user privacy (see [64] and [170] for surveys"]} +{"3608741|15669036": ["expanded to cover data publication and data streams [230]."]} +{"3608741|206764452": ["The applications in this area cover both private and public transport: Intelligent vehicles are envisioned to introduce advanced driver assistance systems or even autonomous driving by the use of sophisticated sensors [16] and communication systems [17]."]} +{"2134031|4427557": ["More recently, standards specifically dedicated to IoT communications, such as LoRa [107], NB-IoT [108], eMTC or other Low Power Wide Area Network (LPWAN) standards [109], support positioning of the nodes to a certain extent."]} +{"2134031|3348390": ["Within all the context sensing information, the location information plays important roles [5]."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"6634488|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [93], [94], [95]."]} +{"21410496|6981610": ["The techniques used for verifying user identity [35] can vary from simple 4 digit pin, facial recognition, retinal scan verification, fingerprint verification to sophisticated biometric gait recognition, vein recognition and voice recognition."]} +{"21410496|2521001": ["Despite smart home security being critical there are some vulnerabilities in the existing systems [3], [4]."]} +{"56598694|3042864": ["CC provides processing and storage for data in the cloud rather than inside devices of subscribers [1].", "Moreover, there is need for strong consensus between the vendors and operators to keep a balance between what should be centralized and what should be at the Edge of the network [1].", "Fog servers are located at base stations, streets, parklands, restaurants, and shopping malls [1]."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"51982227|1520906": []} +{"51982227|6779551": ["The physical layer encryption exploits the features of the physical wireless channel for its security by communications, signal processing, and coding techniques [29].", "1) Physical Wireless InSecurity: The broadcast nature of wireless communications makes the physical channel extremely vulnerable to classic data transit attacks [29]."]} +{"30863156|15199849": ["A malicious node can also be used by the attacker to inject false data into the system or prevent delivery of true messages [46].", "process, send, or redirect packets [44], [46]."]} +{"30863156|2415608": [", the tag will not be able to transmit any further information after receiving this command [58].", "Note that although the anonymous ID emitted by an RFID tag has no intrinsic valuable information, it can still enable tracking as long as the ID is fixed over time [58].", "These protocols can be used in authenticating tags, but can be broken by a powerful adversary [58]."]} +{"30863156|2357830": []} +{"30863156|206459491": ["have been proposed in the last decade [24], [91], [92].", "PUFs enable unique device identification and authentication [103], [105], and offer Trojan detection mechanisms [24].", "Hardware Trojan is a malicious modification of an integrated circuit (IC), which enables the attacker to use the circuit or to exploit its functionality to obtain access to data or software running on the integrated circuits [24].", "Trojans are generally divided into two categories based on their triggering mechanisms [23], [24]: (i) externally-activated Trojans, which can be triggered by an antenna or a sensor that can interact with the outside world, and (ii) internally-activated Trojans that are activated after a certain condition is met inside the integrated circuit, e.", "Trojan detection: Side-channel signals, including timing [24], [82], [83], power [84]\u2013[86], and spatial temperature [84], [87] can be used for Trojan detection."]} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"52016546|2829149": ["The following describes the active attacks faced by the environment perception system [10]."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"17032900|17474643": []} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"4885356|206578224": ["A detailed survey of the enabling technologies is provided in [24]; we summarize the most", "An MEC platform can also be deployed as a gateway in indoor environments and provide services including augmented reality, building management and social network applications [24]."]} +{"4885356|6909107": ["and functionality [22]\u2013[24]."]} +{"4885356|206578365": []} +{"4885356|469744": ["and reliability constraints for immersive applications, such as virtual and augmented reality [41], [42]."]} +{"52164670|3767252": ["IoT offloading has to address the attacks launched from the PHY- or MAC- layer attacks, such as jamming, rogue edge devices, rogue IoT devices, eavesdropping, man-in-the-middle attacks, and smart attacks [29]."]} +{"3424805|31245252": []} +{"54461713|5039874": ["According to [6], there are several crucial components for evaluating system security."]} +{"51984911|18037424": ["communication, and remote control [5]\u2013[7]."]} +{"67866940|21705502": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|206578224": ["Also, to better cope with lowlatency IoT applications, the Edge computing paradigm is boosting the deployment of micro data centers at the edge of the network [40].", "In this vein, the Edge computing paradigm [40] is rapidly gaining momentum, promoting distributed small-scale cloud environments deployed at the edge of the network to execute applications near to the IoT devices."]} +{"67866940|24110634": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [102] [117] [118] [119]."]} +{"67866940|34643772": ["Different works have started to investigate and address some of these challenges [25], [26].", "In [23]\u2013[25], SDN-based security solutions are proposed to enhance network protection."]} +{"67866940|9495329": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|4427557": [", Narrowband IoT) [44]."]} +{"67866940|2332366": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|26368310": ["Several solutions are available to enable resilience and availability for cloud-based deployment [154]."]} +{"67866940|3767252": ["Indeed, accounting for the exponential increase of micro edge data centers, verification of their trustworthiness can be highly challenging [191]."]} +{"67866940|2829149": []} +{"67866940|12029139": ["Therefore, RFID tags present extremely low costs and can be battery-free by leveraging electromagnetic energy harvesting [33]."]} +{"67866940|485843": ["The most promising usage concerns smart home automation [55], Industrial Internet [36], intelligent transportation systems [56], smart energy [57], enhanced health-care services [58], and smart cities [59]."]} +{"67866940|595093": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|1940388": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|2357830": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17205659": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15].", "Furthermore, remarkable efforts have been carried out over the\npast years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17869045": ["In the following, we focus on the Authentication, Authorization, and Accounting (AAA) framework, which is dedicated for intelligent access control of resources and security policy enforcement [85]."]} +{"67866940|1230643": ["and represent a key enabler for IoT adoption [34]."]} +{"12511357|1520906": []} +{"12511357|1421946": []} +{"52963900|49527603": ["[10] surveyed a number of proposed schemes, and categorized them into two main methods: (i) storage optimization, and (ii) blockchain redesign.", "results [7], [8], [9], [10], which need resolution.", "To address the issues in maintaining anonymity in blockchains, several schemes were proposed [10], [64]."]} +{"52963900|44104746": ["With the advance of computing, data mining, and machine learning [27], big data has seen"]} +{"52963900|4566470": ["unprecedented big data, and are already being deployed with or without thoughtful consideration [5].", "The unceasing growth of the Internet of Things (IoT) [1], [2], Cloud and Edge Computing [3], [4], and Big Data [5] are rapidly necessitating novel solutions to manage distributed and", "that traditional data storage, maintenance, and analysis services cannot be applied to handle it [5]."]} +{"52963900|31245252": ["IoT and the related smart-world systems [2], [1],", "The unceasing growth of the Internet of Things (IoT) [1], [2], Cloud and Edge Computing [3], [4], and Big Data [5] are rapidly necessitating novel solutions to manage distributed and"]} +{"52963900|3818445": ["storage services [3], [4], [32].", "[21], [4], [22], which introduce massively deployed sensors, actuators, and smart electronic devices, are only increasing in volume and scope.", "The unceasing growth of the Internet of Things (IoT) [1], [2], Cloud and Edge Computing [3], [4], and Big Data [5] are rapidly necessitating novel solutions to manage distributed and"]} +{"52963900|925507": ["To this end, there have been some works toward addressing aspects of blockchain for IoT [23], [24], [25], [26].", "[25] conducted a systematic literature review of blockchain for IoT."]} diff --git a/edge/graph_195833216.jsonl b/edge/graph_195833216.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..729c575f45ecd8534d01ebe12a1ffe501bf5268f --- /dev/null +++ b/edge/graph_195833216.jsonl @@ -0,0 +1,8 @@ +{"61089489|33286487": []} +{"69791603|207023804": []} +{"16938453|1728336": []} +{"207023804|260343": ["the network or by action of infected neighbors [15], [16]."]} +{"60079702|14203403": []} +{"60079702|207591146": []} +{"60079702|33286487": []} +{"86599800|207023804": []} diff --git a/edge/graph_195833499.jsonl b/edge/graph_195833499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0e0a4b89b853015820a3ffe3d75f008de4c965e --- /dev/null +++ b/edge/graph_195833499.jsonl @@ -0,0 +1,77 @@ +{"17076881|1708582": ["Although we adopt MDP notation hereafter, this work can be immediately translated to the POMDP setting with state-free policies (Kaelbling et al., 1996, Sections 7.1 and 7.2) by replacing states with observations."]} +{"13097121|1932843": ["An overview of recent reinforcement learning methods in robotics can be found in a recent survey paper [2].", "Although significant progress has been made in this area in recent years [2], [3], learning robot motion skills remains a major challenge."]} +{"890737|1932843": ["\u2026it will be useful to also de\ufb01ne the value function V \u03c0 ( x t , u t ) and advantage function A \u03c0 ( x t , u t ) of a given policy \u03c0 : (Deisenroth et al., 2013; Kober & Peters, 2012), two are particularly relevant for this work: iterative LQG (iLQG) (Li & Todorov, 2004) and Dyna-Q (Sutton, 1990).", "Model-free reinforcement learning (RL) has been successfully applied to a range of challenging problems (Kober & Peters, 2012; Deisenroth et al., 2013), and has recently been extended to handle large neural network policies and value functions (Mnih et al., 2015; Lillicrap et al., 2016; Wang et\u2026"]} +{"12340769|1708582": ["For reviews of RL see Sutton and Barto (1998); Bertsekas and Tsitsiklis (1996); Kaelbling et al. (1996).", "In Reinforcement Learning (RL) an agent learns the behavior of the system through trial-and-error with an unknown dynamic environment (see Kaelbling et al., 1996)."]} +{"1778539|8983048": ["[30], but our problem is significantly more difficult, as we are attempting to align a partial scan of one model with the geometry of a different, neighboring model, rather than with an overlapping scan of the same model from a different viewpoint."]} +{"10373369|1708582": ["In reinforcement learning (RL) (Kaelbling et al. 1996; Sutton and Barto 1998; Szepesvri 2010), an agent learns a control policy by interaction with an initially unknown environment."]} +{"8021914|8815923": []} +{"3177253|8815923": []} +{"52905591|14970359": ["Concurrently, temporal segmentation was being developed by researchers in motion capture (Moeslund and Granum, 2001).", "Concurrently, temporalsegmentation was developing in the motion capture community (Moeslund and Granum 2001)."]} +{"207168200|1708582": ["Between the late 1980\u2019s and the mid-1990\u2019s, ideas from psychology (like Pavlovian and instrumental conditioning), optimal control and economics gave birth to the field of Reinforcement Learning (Sutton, 1988; Barto et al., 1989; Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996; Sutton & Barto, 1998), a sub-area of Artificial Intelligence.", "An Object-Oriented Representation for Ef.cient Reinforcement Learning Carlos Diuk CDIUK@CS.RUTGERS.EDU \nAndre Cohen ACOHEN@CS.RUTGERS.EDU Michael L. Littman MLITTMAN@CS.RUTGERS.EDU RL3 Laboratory, Department \nof Computer Science, Rutgers University, Piscataway, NJ USA Abstract Rich representations in reinforcement \nlearning have been studied for the purpose of enabling generalization and making learning feasible in \nlarge state spaces.", "Our representation has multiple connections with \nother for\u00admalisms proposed in the Relational Reinforcement Learn\u00ading literature (van Otterlo, 2005), \nbut emphasizes simplic\u00adity and tractability over expressive power."]} +{"14246533|8589228": ["\u2026and the time, space, and sample complexity of achieving this policy is polynomial in the size of the MDP, in the size of the automaton expressing the temporal logic specification and other quantities that measure the accuracy of, and the confidence in, the learned MDP with respect to the true one."]} +{"49130|11761017": ["survey works that benefit object recognition by purposive sensor placements [14], and Velez et al."]} +{"24273446|1932843": ["Having a good model of the interaction between a robot and the environment is critical in reinforcement learning, as it depends on expected reward based on the probability of predicted trajectories [1]."]} +{"14236715|8815923": ["Another line of research has focused on synthesizing grasps using statistical models [5] learned from a database of images [27] or point clouds [9], [15], [46] of objects annotated with grasps from human demonstrators [15], [27] or physical execution [15].", "As computing quality metrics can be time consuming, a common grasp planning method is to store a database of 3D objects labelled with grasps and their quality and to transfer the stored grasps to similar objects at runtime [5], [41]."]} +{"14236715|6988770": ["Potential advantages to using the Cloud include Big Data: access to updated libraries of images, maps, and object/product data; and Parallel Computation: access to grid computing for statistical analysis, machine learning, and planning [22]."]} +{"14212762|8815923": ["Haptic and force-torque sensors have been studied extensively for control of grasping and manipulation [3] to avoid slippage and prevent damaging objects."]} +{"43920938|3838794": ["A number of works have suggested that semantically distinct behavior can be induced by training on a set of diverse tasks, and have suggested pre-training the lower-level policy on such tasks [18, 10], or training the multi-level hierarchical policy in a multi-task setup [11, 36].", "To achieve the benefits of HRL, there are a number of questions that one must suitably answer: How should one train the lower-level policy to induce semantically distinct behavior? How should the high-level policy actions be defined? How should the multiple policies be trained without incurring an inordinate amount of experience collection? Previous work has attempted to answer these questions in a variety of ways and has provided encouraging successes [43, 10, 11, 18, 36]."]} +{"8815923|118142": ["[1], the authors divide the methodologies into analytic and empirical.", "[1] divide the data-driven methods that are based on whether they employ object features or observation of humans during grasping."]} +{"4385295|3403798": ["For instance, seeing the handle of a cup, our motor schema that is related to grasping such category of handles will be activated subconsciously even before we recognize the cup\u2019s name [13].", "The focus of [13] is to offer a structured and comprehensive affordance work report from these different fields without giving a critical analysis of existing affordance work in robotics or presenting the open issues and future directions in detail.", "\u2019s [13] survey reports on the most significant evidence of affordances from psychology and neuroscience, and reviews the related work on affordances in robotics."]} +{"4385295|1932843": ["Thus, there is no ambiguity about the action choices and environment uncertainty [108]."]} +{"4385295|7660436": ["A multirobot system is necessary in tasks such as rescue and exploration, where the robots could cooperate both passively and actively [150]."]} +{"4385295|1452734": ["Introducing biology-inspired principles is a good way to endow a robot with developmental capabilities [2].", "A truly autonomous infant robot is believed to be a key criterion in the construction of developmental robots [2]."]} +{"3735715|8815923": []} +{"9129880|3249779": []} +{"9129880|393948": ["The theoretical utility of disentangled representations for supervised and reinforcement learning has been described before (Bengio et al., 2013; Higgins et al., 2017; Ridgeway, 2016); however, to our knowledge, it has not been empirically validated to date.", "Disentangled representations are defined as interpretable, factorised latent representations where either a single latent or a group of latent units are sensitive to changes in single ground truth factors of variation used to generate the visual world, while being invariant to changes in other factors (Bengio et al., 2013).", "\u2026are defined as interpretable, factorised latent representations where either a single latent or a group of latent units are sensitive to changes in single ground truth factors of variation used to generate the visual world, while being invariant to changes in other factors (Bengio et al., 2013).", "This paper focuses on one of these outstanding issues: the ability of RL agents to deal with changes to the input distribution, a form of transfer learning known as domain adaptation (Bengio et al., 2013)."]} +{"57761100|8815923": ["Robotic grasping approaches can generally be divided into analytical and learning-based methods [18], [19].", "Learning-based methods use labeled grasping data to train classifiers to predict grasp success or regression to predict a desired grasp [12], [18].", "learning-based methods tend to generalize well to unknown objects with only partial object information [12], [18]."]} +{"57761100|118142": ["Robotic grasping approaches can generally be divided into analytical and learning-based methods [18], [19].", "Analytical approaches generate grasps based on geometric, kinematic, and/or dynamic object models [19]."]} +{"6206564|1932843": ["The choice of policy representation has often been a crucial component in the success of a RL procedure (Deisen-roth et al., 2013; Kober et al., 2013).", "Related Work The choice of policy representation has often been a crucial component in the success of a RL procedure (Deisenroth et al., 2013; Kober et al., 2013).", "Model-free methods have the advantage of handling arbitrary dynamical systems with minimal bias, but tend to be substantially less sampleefficient (Kober et al., 2013; Schulman et al., 2015).", "Model-free methods have the advantage of handling arbitrary dynamical systems with minimal bias, but tend to be substantially less sample-ef\ufb01cient (Kober et al., 2013; Schulman et al., 2015)."]} +{"230088|9107727": ["Several possible constraints can be considered, grouped in families such as parsimonious GMM [6], mixtures of factor analyzers (MFA) [30] or mixtures of probabilistic principal component analyzers [42]."]} +{"1670455|10087812": ["More recently, transfer learning methodologies have been developed for RL settings (Taylor and Stone 2009; Lazaric 2012).", "To address such situations, transfer learning (TL) methods reuse knowledge learned in a source task so that an agent can learn a difficult target task faster or converge to a better policy (Taylor and Stone 2009; Lazaric 2012)."]} +{"14635348|8815923": ["For example, a contact on the side of an object may allow for pushing and sliding the object, while a contact on the bottom can be used for lifting or supporting the object.", "These three features are well-suited for detecting arbitrary contacts between two objects."]} +{"10998008|3350723": ["Addressing the first challenge, torque-controlled robotic arms (e.g. [1]) and even full size humanoid robots such as the ARMAR-4 [2] or the DLR\u2019s TORO [3] have been developed.", "[1]) and even full size humanoid robots such as the ARMAR-4 [2] or the DLR\u2019s TORO [3] have been developed."]} +{"13854883|8815923": ["For grasping, it is necessary to infer finger positions on the object andmanage the force distribution onto multiple fingers while ensuring grip stability in the presence of uncertainty [1], [2], [3]."]} +{"6138957|8815923": ["known objects to models in the database [4, 5, 8, 23, 27].", "performance according to physical models such as the ability to resist external wrenches [45], and empirical (or data-driven) methods [4], which typically use human labels [2] or the ability to lift the object in physical trials [43]."]} +{"11905557|10087812": ["Transfer learning [10] [27] is a recent area of research that has been shown to speed up learning on a complex task by transferring knowledge from one or more easier source tasks."]} +{"17604856|1482463": ["A thorough review can be found in Tam et al. (2013)."]} +{"641438|1708582": []} +{"3906934|778117": ["A robot can monitor this process using a separate system that runs in parallel, which is a form of execution monitoring system (an execution monitor) [3]."]} +{"12883411|1932843": ["that generalize across differing situations [1], [2], [3], [4]."]} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} +{"6144047|1932843": ["Reinforcement learning [126] is also a common choice to learn a policy for action selection under these complex conditions.", "Finding the optimal sequence of actions can be achieved through approaches, such as value or policy iteration [126]."]} +{"59413825|9316331": ["Classical planning algorithms such as UCT [47\u201349] (a powerful form of Monte Carlo tree search [49, 50]) obtain 0 points on Montezuma\u2019s Revenge because the state space is too large to explore effectively, even with probabilistic methods [30, 51]."]} +{"29066714|11608263": ["Furthermore, since real world objects typically belong to more than one category, it may be desirable to employ a multilabel classification paradigm (see [60] for a review)."]} +{"29066714|3330313": ["In the machine learning literature, this problem is known as outlier detection (see [53] for a review)."]} +{"5240721|8815923": ["This makes the problem of grasping significantly more challenging (Bohg et al., 2014), as the algorithm must use more limited and potentially noisier information to detect a good grasp."]} +{"5240721|118142": ["[53], Bicchi and Kumar [2] and Shimoga [58]."]} +{"7586242|1932843": ["Indeed RL has been successfully applied to a range of robotic tasks [10], [11], [12], [13], however dimensionality and sample complexity have presented major challenges [14], [15]."]} +{"2471592|1452734": ["[1] and have recently enjoyed much attention in the developmental robotics literature [15]."]} +{"7082854|393948": ["regression problem [5] with a uni-modal input."]} +{"167217398|3886594": ["Here, one studies the interaction between a teacher and a learner where the teacher\u2019s objective is to \ufb01nd an optimal training sequence to steer the learner towards a desired goal [Goldman and Kearns, 1995; Liu et al. , 2017; Zhu et al. , 2018]."]} +{"2824860|1452734": ["Different robot learning methods such as imitation learning, interactive learning and developmental learning [37,51] can be grouped by how they approach the issue of gathering data.", "Different robot learning methods such as imitation learning, interactive learning and developmental learning (Lungarella et al. 2003; Pfeifer and Scheier 1997) can be grouped by how they approach the issue of gathering data."]} +{"49470584|8815923": ["This stands in contrast to the kinds of grasping behaviors observed in humans and animals, where the grasp is a dynamical process that tightly interleaves sensing and control at every stage [9, 10].", "Real-world robotic manipulation requires broad generalization, and indeed much of the research on robotic grasping has sought to achieve such generalization, either through the use of grasp metrics based on first principles [20] or learning [21, 10], with the latter class of methods achieving some of the best results in recent years [8, 7]."]} +{"110510|1708582": ["trial-and-error with an unknown dynamic environment, see (Kaelbling et al., 1996)."]} +{"3754035|1932843": []} +{"3978028|1932843": ["Policy search is a widely used technique to learn skills in robotics (Kober et al. 2013).", "Policy search is a widely used technique to learn skills in robotics (Kober et al., 2013)."]} +{"7124120|1708582": []} +{"6781584|7559976": ["There has recently been a signi\ufb01cant amount of work on domain adaptation, particularly for computer vision [16], [17]."]} +{"6781584|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment [2].", "However, the complexity of unstructured realworld scenes has a tendency to confound these assumptions, and learning-based methods have emerged as a powerful complement [2], [3], [4], [5], [6].", "neural networks into the grasp selection process [2], [5], [4], [7]."]} +{"8738077|1708582": []} +{"49187095|3403798": ["For a survey of works on affordances and their role in robotics (see [5]).", "A detailed analysis on the definition and formalization of affordances can be found in [5] and [14]."]} +{"16141088|1452734": ["Developmental robotics [5] treats affordances as a higher level concept, which a developing cognitive agent learns about by interacting with its environment [6]."]} +{"2981653|7983519": ["These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options [20].", "These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options (Krahmer and Deemter 2012).", "\u2026the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \" near \" or \" under \" which may not be directly computed from the robot's perceptual system (Krahmer and Deemter 2012).", "Hard-coded or template-based methods for generating requests do not take into account the ability of a person to understand the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \u201cnear\u201d or \u201cunder\u201d which may not be directly computed from the robot\u2019s perceptual system [20]."]} +{"15121560|1452734": ["TABLE I LEARNING PHASES OF THE DEVELOPMENTAL APPROACH We adopt a developmental approach [18], [19], where the robot acquires skills of increasing difficulty on top of previous ones."]} +{"7469546|8815923": ["A comprehensive literature review of this area can be found in [17,18]."]} +{"2273851|1708582": ["A common method that addresses the challenges of modelfree methods is to pre-specify a model or motion primitive for robot actions [11]."]} +{"12178097|8815923": ["Computing a suitable task frame is similar to the grasp synthesis problem [5]; i.e. the robot needs to select a hand pose for transitioning to the next phase."]} +{"3655950|36510460": ["However, they suffer from the problem of obtaining sub-optimal solutions which can only be probabilistically optimal at best [16]."]} +{"17515900|1932843": ["Manipulation skills can be learned in an efficient manner using imitation and reinforcement learning [1, 2]."]} +{"2015315|3330313": ["They have been used for detection of failure modes in induction motors [8], surveillance of mechanical systems [9], structural damage detection [10], [11], and tool condition monitoring in machining operations [12] among several other applications."]} +{"2015315|905827": ["They have been used for detection of failure modes in induction motors [8], surveillance of mechanical systems [9], structural damage detection [10], [11], and tool condition monitoring in machining operations [12] among several other applications."]} +{"2015315|6327434": ["Willsky [6] did an early survey of methodologies for detecting failure in dynamic systems."]} +{"5980504|1932843": ["Many robotic tasks have been successfully solved us-ing reinforcement learning, from ball-in-a-cup to inverted helicopter \ufb02ight [16]."]} +{"5980504|393948": ["Following others in the field of representation learning (Bengio et al. 2013), we use the word prior more broadly in an analogous fashion."]} +{"6682654|1932843": ["produce accurate dynamics predictions [2].", "Reinforcement learning techniques have been applied to a range of robotic control problems [2]."]} +{"3403798|8815923": ["[204] divide data-driven approaches into three groups: grasping known, familiar and unknown objects.", "Data-driven approaches [204], on the other hand, use self-generated or existing databases of grasp experiences in order to assess grasp affordances of target objects."]} +{"14517547|393948": ["\u20262004; Dalal and Triggs 2005), a multi-layer neural network architecture efficiently captures sophisticated hierarchies describing the raw data (Bengio, Courville, and Vincent 2013), which has shown superior performance on standard object recognition benchmarks (Krizhevsky, Sutskever, and\u2026"]} +{"14879705|4975452": ["Enabling non-experts to teach robots, often refered to as Learning by Demonstration, has received considerable attention as a way to acquire action knowledge [27]\u2013[29]."]} diff --git a/edge/graph_195833524.jsonl b/edge/graph_195833524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a73935c3ff70cb354ee6288bfdaef9da004d086 --- /dev/null +++ b/edge/graph_195833524.jsonl @@ -0,0 +1 @@ +{"53600613|16525678": []} diff --git a/edge/graph_195842633.jsonl b/edge/graph_195842633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195848186.jsonl b/edge/graph_195848186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195848293.jsonl b/edge/graph_195848293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..704df5000cc4be09d7315b5e08feb6f683a2e79a --- /dev/null +++ b/edge/graph_195848293.jsonl @@ -0,0 +1,7 @@ +{"1936089|14441987": ["We are inspired by previous work in sensor networks [6], ad-hoc networks [12, 13, 9, 18, 21, 5, 4, 24], and robotics [15]."]} +{"16086996|162478": []} +{"16086996|7567339": []} +{"5854301|562855": ["Cooperative strategies have been investigated in organizational paradigms of multi-agent systems [8] and autonomous search of large scale robotic systems [9], [10], and most studies on emergency evacuation concentrate on designing diverse models [11] to imitate coordinated or competitive behaviours during an evacuation process."]} +{"4990429|6607209": ["One of the most widely used and tested approximate solutions for robot coordination in exploration missions is the auction-based mechanism [3]."]} +{"7678951|14441987": ["For the review of the state of the art routing protocols, see surveys by E. Royer and C. Toh [9] and by S. Ramanathan and M. Steenstrup [10]."]} +{"15145933|6607209": ["Marketbased approaches [5] require robots to execute complex bidding schemes based on perceived costs and utilities, and the computation and communication requirements often scale poorly as the number of robots and tasks increases."]} diff --git a/edge/graph_195872131.jsonl b/edge/graph_195872131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..daf49847a153ea4ea0c84b1301dfb694f0617583 --- /dev/null +++ b/edge/graph_195872131.jsonl @@ -0,0 +1 @@ +{"94380674|2910221": []} diff --git a/edge/graph_195874255.jsonl b/edge/graph_195874255.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e757c30f415c34c1aa87e939e048c5ca40f6c8da --- /dev/null +++ b/edge/graph_195874255.jsonl @@ -0,0 +1,11 @@ +{"33816185|18069725": ["There are even some proposals that generate datasets from information retrieved from the Internet through interactive search (Thomee and Lew, 2012), but there are still technological limitations to relying on this information."]} +{"53249650|14415030": []} +{"53249650|15744805": ["\u2026Benchmark [Martin et al. 2001], and other image databases that have built sets of human-generated segmentations and then used them for evaluation of automatic algorithms [Correia and Pereira 2000; Everingham et al. 2002; Huang and Dom 1995; Unnikrishnan et al. 2005; Zhang 1996; Zhang et al. 2008]."]} +{"52815788|7559976": ["Recent UDA methods have focused on transferring deep neural network representations [13], [14]."]} +{"51930309|18889901": ["3D data representations, but not all of them [25], [26], [27], [28]."]} +{"51930309|987239": ["Initially, researchers made use of the already established developments in the feature extraction algorithms [68], [69] to extract features from 3D data.", "Although multiple handcrafted low-level descriptors were proposed in the literature [68], [69], they suffer from several significant limitations, as they cannot learn the discriminative features from 3D shapes."]} +{"62605205|11894197": []} +{"2303138|6681074": ["\u2026representation for free-from surfaces and researchers have used a number of representations, including B-Splines (Bhanu and Ho, 1987), surface curvatures, superquadrics (Solina and Bajcsy, 1990) and deformable models to recognize free-form objects in range images (Campbell and Flynn, 2001)."]} +{"17927716|6681074": ["The paper focuses on indexing models from a database, i.e., on pruning the database into a small set of candidates containing the correct model type with a high probability.", "Our approach achieves a sublinear complexity on the number of models, maintaining at the same time a high degree of performance for real 3D sensed data that is acquired in largely uncontrolled settings."]} +{"14118080|6681074": ["3D object representation and matching has been a fundamental part of computer vision research with applications in modeling, visualization, recognition, classification, and scene understanding [3][4][12]."]} +{"14106275|14545307": []} diff --git a/edge/graph_195874303.jsonl b/edge/graph_195874303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca99013eb617ae68ec9859d7d61d40e46ef399c4 --- /dev/null +++ b/edge/graph_195874303.jsonl @@ -0,0 +1 @@ +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} diff --git a/edge/graph_195874391.jsonl b/edge/graph_195874391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f02c1201508ab472b75d71ba157973a93a7c2054 --- /dev/null +++ b/edge/graph_195874391.jsonl @@ -0,0 +1,51 @@ +{"211679042|8323234": ["\u2026associated with (i) huge training overhead if all the LIS elements are passive (not connected to a baseband) or with (ii) pro-hibitive hardware complexity and power consumption if all the elements are connected to the baseband through a fully-digital or hybrid analog/digital architecture [7], [8]."]} +{"166228241|4395259": ["Note that it is reasonable to assume that hAE and hIE are known in the scenario when the eavesdropper is an active user in the system but untrusted by the legitimate receiver [10]."]} +{"102352135|8323234": ["We refer the reader to [31], [32] for alternative MIMO concepts tailored to frequency-division duplex (FDD) mode1 and to [33], [34] for overviews of MIMO communications with analog or hybrid analog-digital transceivers."]} +{"102352135|3054454": ["2], [17]; 2) Huge gains can be obtained by developing signal processing schemes for multicell operation [18]\u2013[20]; 3) The inter-cell interference, particularly the phenomenon of pilot contamination, becomes a critical limiting factor due the aforementioned simplifying assumptions."]} +{"146807722|3273340": ["A neural network consists of an input layer with input units, at least one layer of hidden nodes neurons, and an output layer with multiple output units [14]."]} +{"67770143|9978124": ["\u2026location has bene\ufb01ts for several applications, such as positioning of unmanned aerial vehicles (UAVs), ground robots, in factory automation, or for automated vehicles [93], as well as new disruptive applications in the contexts of virtual and augmented reality, gaming, social networking, etc. [94]."]} +{"52166820|21418": ["Therefore, research on finding both spectral and energy efficient techniques with low hardware cost is still imperative for realizing sustainable and green fifth-generation (5G) wireless networks and beyond [2].", "Such a system can be employed to facilitate wireless information and/or power transfer in various Internet-of-things (IoT) applications [2], [6]\u2013[10]."]} +{"22900479|8323234": ["\u2026features: a) the spatial sparsity of channels due to the high path-loss of NLOS paths, b) the low signal-to-noise-ratio (SNR) experienced before beamforming, and c) the much smaller number of RF chains than that of the antennas due to the hardware constraints in mmWave communications [11], [12].", "(24) in 11], where s is the sparse channel vector in the angular domain, the hybrid precoding and combining matrices as well as the angular domain transform matrix compose \u0398 .", "However, the operation of this CS-based hybrid precoding scheme is limited to narrow-band channels, while practical broadband mmWave channels exhibit frequency-selective fading, which leads to a frequency-dependent hybrid precoding across the bandwidth [11].", "To this end, hybrid analog-digital precoding relying on a much lower number of RF chains than that of the antennas has been proposed, where the phase-shifter network can be used for partial beamforming in the analog RF domain for the sake of an improved spatial multiplexing [11].", "In order to reduce the training overhead required for accurate channel estimation, CS-based estimation schemes have been proposed in [11], [12] by exploiting the sparsity of mmWave channels.", "As another promising candidate, mmWave communications is capable of facilitating high data rates with the aid of its wider bandwidth [1], [11], [12].", "(18) in 11]."]} +{"3013154|3054454": ["It is worth mentioning that previous published work used intra-cluster subpaths to successfully model the indoor multipath channel [86], [87], [89]."]} +{"52946522|21418": ["As such, innovative research on finding both spectrum and energy efficient techniques with low hardware cost is still imperative for realizing a sustainable wireless network evolution with scalable cost in the future [4]."]} +{"15888730|12029139": ["Given that RF EH is only practical when the BS-UE distance is sufficiently small [1], our model divides the BS coverage area into (i) the EH zone (near the BS), and (ii) the ID zone (outside the EH zone).", "RF INFORMATION and energy transfer, which treats wireless receivers as either conventional information decoding (ID) receivers or energy harvesting (EH) receivers, has emerged as an attractive paradigm for green communication in the next-generation wireless networks [1], [2].", "Meanwhile, it is realistic for the users located in the vicinity of the BS to conduct both ID and EH functions by a signal splitting (SS) based receiver [1], [4], [6]\u2013[9].", "3 confirms that the received power threshold of \u221220 dBm to \u221230 dBm required to activate practical EH receivers [1] is met by our algorithm, even with the most conservative choice of simulation parameters (i."]} +{"129944987|21418": ["The highly demanding data rate requirements of emerging and future wireless networks ( 5 -th Generation (5G) and beyond) have raised serious concerns on their energy consumption [2], [3].", "As a consequence, the bit-per-Joule Energy Ef\ufb01ciency (EE) has emerged as a key performance indicator to ensure green and sustainable wireless networks [2], [3], [8], and several energy ef\ufb01cient wireless solutions have been proposed."]} +{"129944987|10979806": ["A survey on the different approaches to implement energy efficient 5G wireless networks has recently appeared in [9]."]} +{"129944987|1541773": ["As a consequence, the bit-per-Joule Energy Ef\ufb01ciency (EE) has emerged as a key performance indicator to ensure green and sustainable wireless networks [2], [3], [8], and several energy ef\ufb01cient wireless solutions have been proposed."]} +{"14052007|13019489": ["4GHz Wi-Fi frequency band [1]\u2013[5]."]} +{"14052007|8323234": ["11ad networks can be used to change the direction of the TX and RX beams to reestablish the antenna alignment and restore the link [13]\u2013[15]."]} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"139103138|21418": ["To address the need for green and sustainable future cellular networks, researchers are looking into energy efficient techniques to improve the system performance [2], [3]."]} +{"139103138|10979806": ["To address the need for green and sustainable future cellular networks, researchers are looking into energy efficient techniques to improve the system performance [2], [3]."]} +{"49872142|10979806": ["The recent tutorial [8] and survey [9] provide a comprehensive review of green solutions, including renewable energy sources, energy-efficient hardware, and green radio resource allocation and transmission."]} +{"3516365|21418": []} +{"195345175|13074005": []} +{"141503814|21418": ["Therefore, research on finding innovative, spectral and energy efficient, and yet cost-effective solutions for future/beyond-5G wireless networks is still imperative [2]."]} +{"52988445|10979806": ["A survey on the different approaches to implement energy efficient 5G wireless networks has recently appeared in [9]."]} +{"52988445|1541773": ["As a consequence, the bit-per-Joule Energy Efficiency (EE) has emerged as a key performance indicator to ensure green and sustainable wireless networks [2], [3], [8], and several energy efficient wireless solutions have been proposed."]} +{"128358301|8323234": ["channels estimation approaches [24], [25], [34]), then we can rewrite hT,k as", "all the antenna elements to a baseband processing unit either through a fully-digital or hybrid analog/digital architectures [23], [24].", "Now, we note that in several important scenarios, such as mmWave and LOS-dominant sub-6 GHz, the channel experiences sparse scattering, which results is a small number of paths L [24], [29]."]} +{"34127088|16050825": ["form is modulated onto the instantaneous power of the optical carrier [270]\u2013[274]."]} +{"34127088|13074005": ["For a comprehensive overview of these studies, interested readers are referred to previous survey papers on SM [61], [65]\u2013[67].", "This is another way of exploiting the SM principle [65] and of encoding the information not only in the impulse response of the channel, but in the interplay between antenna radiation pattern and nearby scatterers.", "For a comprehensive historical overview of the SM concept, interested readers are referred to [65]\u2013[68] and the references therein.", "In light of the above discussion on the concept of SM, MIMO systems employing SM provide attractive advantages over their traditional counterparts [65]\u2013[67], [83].", "Similar to the conventional SM principle [65], the receiver can retrieve the information by solving a hypothesis testing problem based on the four radiation patterns depicted in Fig.", "Our survey article also differs from the existing magazines/survey articles/books in the literature [6], [65]\u2013[69] by several aspects."]} +{"28140640|875676": ["Several classes of multicarrier modulation systems can be defined [12], [13], based on several characteristics, including whether the modulation is based on the discrete Fourier transform or other transforms, and orthogonal or non-orthogonal schemes.", "For the different pulse shaping filters, the reader can refer to [13] that defines and gives the analytical expression and characteristics of the most popular prototype filters in the literature."]} diff --git a/edge/graph_195877915.jsonl b/edge/graph_195877915.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ff28e47888c6e37e5d5f69f573ce3954e30ccb4 --- /dev/null +++ b/edge/graph_195877915.jsonl @@ -0,0 +1,5 @@ +{"46896506|7165993": ["In software testing, more generally, this is an instance of the oracle problem which, though significant, is largely unsolved [8]."]} +{"10270937|30314751": ["Genetic Improvement (GI) [38] is a growing area within Search Based Software Engineering (SBSE) [23, 24] which uses computational search methods to improve existing software.", "GI has most commonly been used offline to improve various software properties [15, 38]."]} +{"10043111|3540699": ["264 describes the lossy compression of a video stream [25] and is also part of ISO/IEC MPEG-4."]} +{"52048307|30314751": []} +{"52048307|33583074": []} diff --git a/edge/graph_195881793.jsonl b/edge/graph_195881793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84fdc39f2f43723cbf1b4eeed59048eea2a99fb6 --- /dev/null +++ b/edge/graph_195881793.jsonl @@ -0,0 +1 @@ +{"14793409|33286487": []} diff --git a/edge/graph_195881905.jsonl b/edge/graph_195881905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00a1bf04cfb305c1c2461181372a267d721d6718 --- /dev/null +++ b/edge/graph_195881905.jsonl @@ -0,0 +1,19 @@ +{"4205617|3732796": ["Several surveys have been published on image forgery detection: Rocha et al. (2011), Farid (2009a), Mahdian and Saic (2010), Lanh et al. (2007a), Luo et al. (2007a), Mahdian and Saic (2008a), Ng et al. (2006), Sencar and Memon (2008), Zhang et al. (2008a), Bayram et al. (2008a) and Redi et al.\u2026", "Detection method of double JPEG compressed image was proposed based on histograms of DCT coefficients and SVM by Mahdian and Saic (2009a). The method exploits the fact that altering a JPEG image brings into the image specific artifacts like periodic zeros and double peaks. However, the method produces high false positive to natural images with \u201cnonperfect histograms\u201d. Huang et al. (2010) presented a method which can detect double JPEG compression with the same quantization matrix.", "Detection method of double JPEG compressed image was proposed based on histograms of DCT coefficients and SVM by Mahdian and Saic (2009a). The method exploits the fact that altering a JPEG image brings into the image specific artifacts like periodic zeros and double peaks.", "Detection method of double JPEG compressed image was proposed based on histograms of DCT coefficients and SVM by Mahdian and Saic (2009a). The method exploits the fact that altering a JPEG image brings into the image specific artifacts like periodic zeros and double peaks. However, the method produces high false positive to natural images with \u201cnonperfect histograms\u201d. Huang et al. (2010) presented a method which can detect double JPEG compression with the same quantization matrix. First a \u201cproper\u201d randomly perturbed ratio is obtained from the JPEG coefficients of the recompressed test image and then this universal \u201cproper\u201d ratio generate a dynamically changed threshold, which can be utilized to distinguish between the singly and doubly compressed images. If the QF is no less than 90, the final detection accuracy rates are constantly higher than 90% for UCID, NRCS, and OurLab image dataset. The method can also be extended to detect the triple JPEG compression, four times JPEG compression, and so on. Luo et al. (2010) evaluated a method for image tamper detection including identifying whether a bitmap image has previously been JPEG compressed, quantization steps estimation and detecting the quantization table of a JPEG image by analyzing the effects of quantization, rounding and truncation errors.", "Lanh et al. (2007b) estimated the parameters of lateral chromatic aberration by maximizing the mutual information between the corrected R and B channels with the G channel.", "Detection method of double JPEG compressed image was proposed based on histograms of DCT coefficients and SVM by Mahdian and Saic (2009a). The method exploits the fact that altering a JPEG image brings into the image specific artifacts like periodic zeros and double peaks. However, the method produces high false positive to natural images with \u201cnonperfect histograms\u201d. Huang et al. (2010) presented a method which can detect double JPEG compression with the same quantization matrix. First a \u201cproper\u201d randomly perturbed ratio is obtained from the JPEG coefficients of the recompressed test image and then this universal \u201cproper\u201d ratio generate a dynamically changed threshold, which can be utilized to distinguish between the singly and doubly compressed images. If the QF is no less than 90, the final detection accuracy rates are constantly higher than 90% for UCID, NRCS, and OurLab image dataset. The method can also be extended to detect the triple JPEG compression, four times JPEG compression, and so on. Luo et al. (2010) evaluated a method for image tamper detection including identifying whether a bitmap image has previously been JPEG compressed, quantization steps estimation and detecting the quantization table of a JPEG image by analyzing the effects of quantization, rounding and truncation errors. The method achieves accuracy of around 90% even the image size decreases to 8 8 and the quality factor is as high as 95 while identifying JPEG images, average accuracy is 81.97% for the images with size of 128 128 and with the quality factor 85 while estimating quantization steps, and the accuracy can achieve over 94.52% when the image size becomes larger than 64 64 while detecting quantization table. Wang et al. (2010) implemented an algorithmwhich can locate the tampered region in a lossless compressed tampered image when its unchanged region is output of JPEG decompressor."]} +{"32730475|195881905": []} +{"32730475|181631491": []} +{"49564756|192934": ["Another validation strategy commonly used is repeated random sub-sampling (RSS) [161, 162]."]} +{"11790493|6746689": ["S3a) that reduces the line width to one pixel (68) (Fig."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"4549119|4570087": []} +{"18800070|393948": ["Very recently, inspired by impressive results in the closely related \u0080elds of computer vision and pa\u008aern recognition [17], the multimedia forensics community began focusing on the use of deep learning [3, 19], especially convolutional neural networks (CNN) [27]."]} +{"54447831|7559976": []} +{"52157475|9415965": []} +{"13599403|4570087": ["Person re-ID lies inbetween image classi\ufb01cation [14] and instance retrieval [19] in terms of the relationship between training and testing classes (Table 1).", "For basic knowledge and state-of-the-art advances of the inverted index in instance retrieval, we refer readers to a recent survey [19]."]} +{"13599403|3693305": ["On the other hand, when it comes to retrieval, ef\ufb01cient indexing structures [22] and hashing techniques [23] can be bene\ufb01cial for re-ID in a large gallery.", "Hashing has been an extensively studied solution to approximate nearest neighbor search, which aims to reduce the cost of \ufb01nding exact nearest neighbors when the gallery is large or distance computation is costly [23]."]} +{"49551723|53734567": ["Humanaction recognition in realworld is essentially an open set problem, which requires the model to simultaneously recognize the known action classes and reject the unknown actions (Geng et al., 2020; Bao et al., 2021)."]} +{"49551723|14814753": ["Different from recent survey papers [22], [23], studies in action prediction are also described in this paper.", "Please refer to [22] for a list of performance of recent action recognition methods on various datasets.", "Dense sampling has shown to improve results over sparse interest points for image classification [7, 22]."]} +{"49551723|393948": ["Action features learned by deep learning techniques has been popularly investigated (Yang & Shah, 2012; Wang et al., 2014a; Taylor et al., 2010; Sun et al., 2014; Plotz et al., 2011; Le et al., 2011; Karpathy et al., 2014; Ji et al., 2013, 2010; Hasan & Roy-Chowdhury, 2014; Bengio et al., 2013; Simonyan&Zisserman, 2014) in recent years."]} +{"206592484|456491": []} +{"7901560|55111989": ["In [6], the authors review the different image forgery detection techniques in image forensic literature."]} +{"13992382|17516538": ["In last years, great effort has been put into the problem of people identification based on gait recognition [18]."]} diff --git a/edge/graph_195882093.jsonl b/edge/graph_195882093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7866338b937151100e78c04169f16c35fa2f903 --- /dev/null +++ b/edge/graph_195882093.jsonl @@ -0,0 +1,4 @@ +{"52915936|24766563": []} +{"52915936|15888893": []} +{"40100965|17485266": ["For context, the regular stochastic gradient descent (SGD) update of a model\u2019s parameters \u03b8 at time step t looks like the following (Ruder, 2016):"]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} diff --git a/edge/graph_195883846.jsonl b/edge/graph_195883846.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195885449.jsonl b/edge/graph_195885449.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_195937033.jsonl b/edge/graph_195937033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a2c812bb801b1baafb48118357fdb27d99141da --- /dev/null +++ b/edge/graph_195937033.jsonl @@ -0,0 +1 @@ +{"44044169|7147372": []} diff --git a/edge/graph_195967995.jsonl b/edge/graph_195967995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f432af6096ca5fc6a40cb3a333e7b0c042d801a9 --- /dev/null +++ b/edge/graph_195967995.jsonl @@ -0,0 +1 @@ +{"53603235|17779575": ["presented the classification of techniques for managing and leveraging the GPU cache [46]."]} diff --git a/edge/graph_195989496.jsonl b/edge/graph_195989496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..529a4a55e117156335eb0cad1d2c5ee4ccbc8db7 --- /dev/null +++ b/edge/graph_195989496.jsonl @@ -0,0 +1 @@ +{"140362042|36438802": ["The recent publication of the first pedagogical article on social network analysis to appear in a criminological journal (McGloin and Kirk, 2010) may be a harbinger of future developments."]} diff --git a/edge/graph_195999889.jsonl b/edge/graph_195999889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ce8ed18691ce70c7acb993de6aa46fcf0391d61 --- /dev/null +++ b/edge/graph_195999889.jsonl @@ -0,0 +1,8 @@ +{"9336489|7158350": ["decision tree) [6] and artificial neural networks [7].", "Studies have shown that neural networks are a promising alternative to standard classification methods [7]."]} +{"9740571|1295686": ["Our focus was on test case generation specific for BPEL processes, while the other three surveys focused on testing methodologies for web services [8], examined verification techniques and tools [9], and analyzed the requirements of web services compositions languages [10].", "Ideally, SPIN is a tool to verify software systems [9].", "Furthermore, the security aspect has to be taken into account in order to deal with web servers and other shared resources [9].", "[9] surveyed 21 different modeling methods used in website verification and testing, while another survey [10] presented an overview of"]} +{"17878350|46260034": ["I. INTRODUCTION This is a systematic literature review (SLR) to simplify the understanding of current developments in a field."]} +{"6880727|14920988": []} +{"6880727|8250043": []} +{"2025859|14920988": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|8250043": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|16125167": ["To conduct a systematic mapping, a classification scheme (also called systematic map or attribute framework [18]) needs to be derived by a careful analysis of the primary studies [47]."]} diff --git a/edge/graph_196017812.jsonl b/edge/graph_196017812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19604145.jsonl b/edge/graph_19604145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1aac1b442655c95ab99d739ed3fffd1df3123a69 --- /dev/null +++ b/edge/graph_19604145.jsonl @@ -0,0 +1,4 @@ +{"1922358|1230643": ["One of the surveys on WSNs points out that, in the near future, wireless sensor networks will be an integral part of our lives, more so than the present-day personal computer [1]."]} +{"15998505|1236072": []} +{"1851475|1230643": []} +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} diff --git a/edge/graph_196045874.jsonl b/edge/graph_196045874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_196049548.jsonl b/edge/graph_196049548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b952020e24b109e2ad2601808151afea5d7f7be5 --- /dev/null +++ b/edge/graph_196049548.jsonl @@ -0,0 +1,3 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"961984|9554464": ["Indeed, it is already being actively researched for the related problem of data aggregation within sensor network community [178,179], which further signifies the importance of considering security-related issues while developing modern decentralized fusion systems."]} +{"961984|4491892": ["Probabilistic [32,40,45] Represents sensory data using probability", "Particle filters are a recursive implementation of the SMC algorithm [45]."]} diff --git a/edge/graph_196061901.jsonl b/edge/graph_196061901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_196087560.jsonl b/edge/graph_196087560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b6b0160738008e0ee12a05b5830e6f4e8bba712 --- /dev/null +++ b/edge/graph_196087560.jsonl @@ -0,0 +1 @@ +{"10986155|9045232": ["A related and important problem is how to evaluate the performance of the proposed detection methods([1]).", "Most methods are based on neural network approaches, feature extraction, Markov chain, skin color and others are based on template matching([1]).", "Multi-layers perception: The MLP neural network([1]) has feedforword architecture within input layer, a hidden layer and an output layer."]} diff --git a/edge/graph_196111755.jsonl b/edge/graph_196111755.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e735df8f584627aec71e8bb073964d41d2e6090a --- /dev/null +++ b/edge/graph_196111755.jsonl @@ -0,0 +1,3 @@ +{"195963795|16213681": []} +{"65304329|16213681": ["\u2026to the evolution of the learning commons from an information commons centered on technologies to a collaborative learning space that contained various technologies, resources, and services provided by diverse academic units (Heitsch & Holley, 2011; Somerville & Harlan,\n2008; Turner et al., 2013)."]} +{"67168356|15333587": ["Cheung (2013, para 1) stated that altmetrics \u201clack the credibility as a performance measure,\u201d while Bornmann (2014) suggested they might complement, rather than replace, traditional metrics and the peer review process.", "Cheung (2013, para 1) stated that altmetrics \u201clack the credibility as a performance measure,\u201d while Bornmann (2014) suggested they might complement, rather than replace, traditional metrics and the peer review process. Demonstrating the potential that altmetrics is perceived to have in supporting claims for research impact, Wolff, Rod, and Schonfeld (2016) commented on the increasing numbers of UK academics who are \u201cadding non-academic audiences to those they seek to reach with their research\u201d (p. 100). The author associated this with the UK\u2019s introduction of social impact as a criterion for research assessment. As a relatively recent addition to the research metrics toolbox, much less is known about how libraries are using altmetrics. Corrall et al. (2013) did not include altmetrics in their study, but predicted \u201cthe emergence of new measures and tools for research evaluation, reflecting the migration of scholarship to the web and the influence of social media\u201d (p.", "Cheung (2013, para 1) stated that altmetrics \u201clack the credibility as a performance measure,\u201d while Bornmann (2014) suggested they might complement, rather than replace, traditional metrics and the peer review process. Demonstrating the potential that altmetrics is perceived to have in supporting claims for research impact, Wolff, Rod, and Schonfeld (2016) commented on the increasing numbers of UK academics who are \u201cadding non-academic audiences to those they seek to reach with their research\u201d (p."]} diff --git a/edge/graph_196119081.jsonl b/edge/graph_196119081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c5989e9ff71a490c5a3e815c354038801833200 --- /dev/null +++ b/edge/graph_196119081.jsonl @@ -0,0 +1,4 @@ +{"22174165|6972141": ["Given these shortcomings, researchers shifted their interest to vision-based navigation to improve the robot position estimation by tracing the visual features in the environment and using them as landmarks [4]."]} +{"44777763|8530790": []} +{"206896391|10500613": ["Even though much effort has recently been devoted to the creation of sophisticated strategies to relate pairs of schemas or ontologies (see [10] for a survey), it is still far from being clear how semantic systems integration can evolve or be characterized."]} +{"31740306|6988770": []} diff --git a/edge/graph_196125425.jsonl b/edge/graph_196125425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23776d48c2dfcb5d366f909f514ba2733dfba74f --- /dev/null +++ b/edge/graph_196125425.jsonl @@ -0,0 +1,2 @@ +{"55758461|26257441": []} +{"120769501|8530790": ["\u2026algorithms that are highly sensitive to the initial values and di\ufb03cult to use to obtain global optimization, scholars have proposed many global optimization algorithms based on population search (Deb, Mohan, & Mishra, 2005; Fonseca & Fleming, 1994; Pratab & Deb, 2000; Srinivas & Dep, 1994)."]} diff --git a/edge/graph_196129026.jsonl b/edge/graph_196129026.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..345a647e41a655445114ad57c5d8d7fe28b6f973 --- /dev/null +++ b/edge/graph_196129026.jsonl @@ -0,0 +1,2 @@ +{"3311533|13088291": ["Bhatia [5] compared the nearest neighbor techniques.", "(2) Training data in the KNN algorithm is extremely fast and effective if the training data size is large [5]."]} +{"3311533|14774186": ["Each approach implements text categorization techniques to achieve its goal [3].", "only on subjective knowledge and not on exogenous knowledge [3]."]} diff --git a/edge/graph_196150698.jsonl b/edge/graph_196150698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1945453cb4f5e3ed2c6ae520911e257ce36a494c --- /dev/null +++ b/edge/graph_196150698.jsonl @@ -0,0 +1,6 @@ +{"1033682|174797842": []} +{"13948350|206051485": []} +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"21011865|2323881": []} +{"21011865|393948": []} +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} diff --git a/edge/graph_196154678.jsonl b/edge/graph_196154678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85c9a92297124ecb56d024b7d9e4f3e6c7e4fae8 --- /dev/null +++ b/edge/graph_196154678.jsonl @@ -0,0 +1,30 @@ +{"14468987|1099309": ["For instance, the MPEG-7 Visual Part [15] supports color (e.g. dominant colors, color layout), texture, shape (e.g. region/contour-based), and motion (local or global) descriptors .", "Although the construction of the VDO is tightly coupled with the specification of the MPEG-7 Visual Part [18], several modifications were carried out in order to adapt to the XML Schema provided by MPEG-7 to an ontology and the data type representations available in RDF Schema.", "For instance, the MPEG-7 Visual Part [15] supports color (e."]} +{"14468987|13365762": ["Although new multimedia standards, such as MPEG-4 and MPEG-7 [1], provide important functionalities for the manipulation and transmission of objects and associated metadata, the extraction of semantic descriptions and annotation of the content with the corresponding metadata is out of the scope of these standards and is left to the content manager."]} +{"12645846|8310135": ["Semi-Supervised Learning (SSL) and Unsuper-vised Learning (UL) approaches attempt to solve this problem by either providing a small initial set of labeled data to train and seed the system, or by resolving the extraction problem as a clustering one (Nadeau and Sekine, 2007)."]} +{"19005789|2187403": []} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"61257218|10500613": ["A good survey of approaches to automatic schema matching is presented in (Rahm & Bernstein 2001)."]} +{"1029937|10137283": ["Ruohomaa and Kutvonen [35] provides a detailed survey and discussion of alternative approaches for trust management.", "Ruohomaa and Kutvonen [35] provides a detailed survey and iscussion of alternative approaches for trust management."]} +{"1029937|9240891": ["\u20262004) [78] Software engineering (Viega et al., 2001) [82] Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O'Hara et al., 2004)\u2026", "Modeling research ranges from simple access control polices (which specify who to trust to access data or resources) to anal- Table 1 A categorization of major areas of trust research Policy-based trust Network security credentials (Kohl and Neuman, 1993) [9] Trust negotiation (Yu et al., 2001) [10] (Yu and Winslett, 2003) [11] (Winslett et al., 2002) [13] (Li et al., 2003) [14] (Nejdl et al., 2004) [15] (Bonatti and Olmedilla, 2005) [16] (Gandon and Sadeh, 2004) [17] (Winsborough et al., 2000) [12] (Seigneur and Jensen, 2004) [18] Security policies and trust languages (Tonti et al., 2003) [19] (Uszok et al., 2003) [20] (Kagal et al., 2003) [21] (Nielsen and Krukow, 2003) [22] (Carbone et al., 2003) [23] (EHR Policy, 2001) [24] (XACML, 2005) [26] (SAML, 2005) [27] (WS-Trust, 2005) [28] (Becker and Sewell, 2004) [25] (Leithead et al., 2004) [29] Distributed trust management (Blaze et al., 1996) [31] (Blaze et al., 1999) [32] (Chu et al., 1997) [33] (Kagal et al., 2002) [34] Effect of credential type (Zheng et al., 2002) [36] Reputation-based trust Decentralization and referral trust (Abdul-Rahman and Hailes, 1997a) [37] (Abdul-Rahman and Hailes, 1997b) [38] (Yu and Singh, 2000) [39] (Yu and Singh, 2002) [40] (Yu and Singh, 2003) [41] (Sabater and Sierra, 2002) [42] (Beth et al., 1994) [43] (Xiao and Benbasat, 2003) [44] (O'Donovan and Smyth, 2005) [45] Trust metrics in a web of trust (Goldbeck and Hendler, 2004a) [51] (Goldbeck and Hendler, 2004b) [52] (Stewart, 1999) [53] (Stewart and Zhang, 2003) [54] (Richardson et al., 2003) [55] (Masa and Avesani, 2005) [56] (Guha et al., 2004) [57] (Advogato, 2000) [58] (Chirita et al., 2004) [59] (Ding et al., 2004) [60] Trust in P2P networks and grids (Kamvar et al., 2003) [47] (Cornelli et al., 2002) [48] (Aberer and Despotovic, 2001) [49] (Damiani et al., 2002) [50] (Olmedilla et al., 2005) [7] Application-specific reputation (Pirzada and McDonald, 2004) [61] (Dash et al., 2004) [62] (Josang and Ismail, 2002) [63] ) [65] (Acrement, 2002) [66] (Mui et al., 2002) [5] (Staab et al., 2004) [67] Computational and online trust models (Marsh, 1994) [68] (Ziegler and Lausen, 2005) [69] (Resnick et al., 2000) [70] (Friedman et al., 2000) [71] (Falcone and Castelfranchi, 2004) [72] (Jonker et al., 2004) [73] Game theory and agents (Buskens, 1998) [74] (Brainov and Sandholm, 1999) [75] (Ashri et al., 2005) [76] (Ramchurn et al., 2003) [77] (Huynh et al., 2004) [78] Software engineering (Viega et al., 2001) [82] Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O'Hara et al., 2004) [85] Trust using hyperlinks (Gyongy et al., 2004) [86] (Massa and Hayes, 2005) [87] (Brin and Page, 1998) [46] (Kleinberg, 1999) [88] Filtering information based on trust (Ciolek, 1996) [89] (Clarke et al., 2001) [90] (Downey et al., 2005) [91] Filtering the Semantic Web (Bizer et al., 2005) [92] (Ding et al., 2003) [93] (Ding et al., 2005) [94] (Ziegler, 2004) [95] Subjectivity analysis (Riloff et al., 2005) [97] (Stoyanov et al., 2005) [98] (Cardie et al., 2004) [99] Provenance information (McGuinness, 2005) [100] (Golbeck, 2006) [101] (Zhao et al., 2004) [102] (Wong et al., 2005) [103] (Kim et al., 2007) [104] Content trust (Gil and Ratnakar, 2002) [107,108] (Chklovski et al., 2003) [109] (Castelfranchi et al., 2003) [110] (Gil and Artz, 2006) [111] Site design and human factors (Sillence et al., 2004) [112] (Stephens, 2004) [113] (Corritore et al., 2001) [114] yses of competence, beliefs, risk, importance, utility, etc.", "The next definition, from Grandison and Sloman [6], introuces context and is unique in referring to the \u201ccompetence\u201d to ct (instead of actions, themselves):", "Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O\u2019Hara et al.", "Focusing on trust n Internet applications, which exchange or display informaion, Grandison and Sloman [6] give a provisional definition nd discussion of trust across a wide set of literature, and explore olutions and applications of trust management (which in their ork essentially means the implementation of security policies).", "Focusing on trust in Internet applications, which exchange or display information , Grandison and Sloman [6] give a provisional definition and discussion of trust across a wide set of literature, and explore solutions and applications of trust management (which in their work essentially means the implementation of security policies).", "\" The next definition, from Grandison and Sloman [6], introduces context and is unique in referring to the \" competence \" to act (instead of actions, themselves): \" [Trust is] the firm belief in the competence of an entity to act dependably, securely, and reliably within a specified context."]} +{"28333457|10500613": ["[Rahm & Bernstein 2001] E. Rahm and P. A. Bernstein."]} +{"15161815|14718434": ["UML, Extended Entity Relationship model) that is very much alike the ontology model, together with their frequent maintenance and timeliness of their data, especially in business environments [76], act as arguments in favour of using relational databases as knowledge sources for ontology development.", "Table 3 sums up the features of the most notable approaches, taking inspiration from other surveys that have been carried out for the same subject [42,60,63,76]."]} +{"15161815|2388738": ["Section 6 introduces criteria and descriptive features for the approaches mentioned in order to form a complete picture of the state of the art and finally, Section 7 closes the paper discussing future steps and requirements."]} +{"207155964|10500613": ["Hence, the task of finding mappings (semi-) automatically has been an active area of research in both database and ontology communities [22, 15].", "Heuristic-based approaches to ontology mapping are similar to heuristic-based approach to matching database schemas and XML structures ([22, 17]) and use lexical and structural components of definitions to find correspondences."]} +{"1295996|2082499": ["In the following, we review a set of representative traditional entity resolution approaches and collective entity resolution approaches; while we refer to tutorials [13] and surveys [6, 8, 36] for more throughout reviews.", "There is another direction of work that focused on methods to scale up entity resolution algorithms, such as using indexing [8] or blocking techniques [17, 18, 35] to facilitate pairwise similarity computation."]} +{"47216781|29395800": ["A comprehensive survey on different approaches to Semantic Search is given in [23], while in [44] a formal model of ontology-based Information Retrieval in general is presented."]} +{"14301767|8310135": ["AGDISTIS is related to the research area of Information Extraction [19] in general and to NED in particular."]} +{"7690873|12860838": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down."]} +{"7690873|10500613": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down."]} +{"7690873|913718": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down.", "There have been different formalizations of the matching operation and its result [11, 14, 19\u201321]."]} +{"13069297|386036": ["Note that the task of discovering links between knowledge bases is closely related with record linkage [30,10,5,17]."]} +{"5763490|12860838": ["In [18,19] the authors present a survey in the area of ontology matching."]} +{"5763490|10500613": ["A taxonomy that covers popular approaches in database schema matching was presented in [21]."]} +{"4979708|2187403": ["The \ufb01ltered client query is shown in Figure 5b."]} +{"16586719|386036": [", and surveys at [19,8]."]} +{"14694382|5401262": ["By our multimodal dialog interface we aim at providing natural interaction for human users in the Human Computing paradigm [3]."]} +{"15520964|13022232": []} +{"11668048|386036": ["RELATED WORK There is a large body of related work on record linkage [5] and duplicate detection [4] within the database community as well as on ontology matching [6] in the knowledge representation community."]} +{"8769734|14586568": ["a kind of controlled natural language [12]) and support for meta-nanopublications, e."]} +{"892804|10500613": []} +{"892804|386036": []} +{"15491909|8310135": ["named entity recognition (individual induction) [27]"]} diff --git a/edge/graph_196155019.jsonl b/edge/graph_196155019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..232e94b4d6414646ef29675860f9b2e9fa86f49c --- /dev/null +++ b/edge/graph_196155019.jsonl @@ -0,0 +1,5 @@ +{"19755799|13365762": []} +{"9275048|13365762": ["MPEG-7 standard descriptors [26], [27]."]} +{"207172308|12278223": ["There are works employing evolutionary approaches to perform FS [7,19,35,36,38] as well as others for improving the information retrieval (IR) [6,9,32].", "A review on the application of evolutionary computation to boost information retrieval is found in [6].", "Works on improving information retrieval mainly employ relevance feedback approaches [3,4,6,15,21,30,41] and similarity function learning (or ranking function learning) [9,32]."]} +{"14346717|60779308": []} +{"43101722|15315731": ["Moreover, when addressing the digital mammogram images, the emphasis has been to develop algorithms that attempt to improve the imaging quality [4-5]."]} diff --git a/edge/graph_196163733.jsonl b/edge/graph_196163733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d770f7a2d41a9dc33a889b39c4c8a9d240137809 --- /dev/null +++ b/edge/graph_196163733.jsonl @@ -0,0 +1,3 @@ +{"53222057|7559976": ["Another observation for why transfer learning should work for time series data is its recent success in computer vision tasks [7].", "Despite its recent success in computer vision [7], transfer learning has been rarely applied to deep learning models for time series data."]} +{"53222057|18599847": ["Outside the UCR archive [1], deep learning has reached state of the art performance on several datasets in different domains [22]."]} +{"6915923|17464562": ["These networks were unable to learn, but this capacity was introduced only a few years later, initially with the introduction of unsupervised learning [46] and subsequently with the first supervised training algorithms [75, 84, 85, 103]."]} diff --git a/edge/graph_196174150.jsonl b/edge/graph_196174150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2ba24257e488bd8c20e3a6ec5657154ee59f0b7 --- /dev/null +++ b/edge/graph_196174150.jsonl @@ -0,0 +1,11 @@ +{"109740216|15174016": []} +{"113532784|1142274": []} +{"108766933|64292": []} +{"108766933|12846121": []} +{"89604976|12846121": []} +{"111215739|15103060": []} +{"111215739|12846121": []} +{"35425852|2135552": []} +{"44287654|2135552": ["At the scheduling level, a number of models that use either discrete- or continuous-time representation of events have been proposed (Floudas and Lin, 2004)."]} +{"206922026|2135552": ["A number of scheduling review papers can be found summarizing the most promising approaches, for instance Floudas and Lin (2004), Mend\u00e9z et al. (2006), Li and Ierapetritou (2008) and Maravelias (2012). There are relatively few contributions focusing on the industrial aspects of scheduling. Emerging challenges are identified in Henning (2009). Framinan (2012) focuses on deployment and implementation of scheduling systems and recently, Harjunkoski et al. (2014) discusses some important practical aspects and lessons learnt from industry.", "A number of scheduling review papers can be found summarizing the most promising approaches, for instance Floudas and Lin (2004), Mend\u00e9z et al. (2006), Li and Ierapetritou (2008) and Maravelias (2012). There are relatively few contributions focusing on the industrial aspects of scheduling. Emerging challenges are identified in Henning (2009). Framinan (2012) focuses on deployment and implementation of scheduling systems and recently, Harjunkoski et al.", "A number of scheduling review papers can be found summarizing the most promising approaches, for instance Floudas and Lin (2004), Mend\u00e9z et al.", "A number of scheduling review papers can be found summarizing the most promising approaches, for instance Floudas and Lin (2004), Mend\u00e9z et al. (2006), Li and Ierapetritou (2008) and Maravelias (2012). There are relatively few contributions focusing on the industrial aspects of scheduling.", "A number of scheduling review papers can be found summarizing the most promising approaches, for instance Floudas and Lin (2004), Mend\u00e9z et al. (2006), Li and Ierapetritou (2008) and Maravelias (2012)."]} +{"2068649|12846121": ["In the literature on dynamic scheduling problems, predictivereactive scheduling strategies have been widely used in manufacturing systems, where schedules are revised in response to dynamic factors [16]."]} diff --git a/edge/graph_196174513.jsonl b/edge/graph_196174513.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..075abc5406911e6c872199f70122646157b8083e --- /dev/null +++ b/edge/graph_196174513.jsonl @@ -0,0 +1,4 @@ +{"5638157|3540699": ["The direction selection is predicted from the selections of the blocks (subblocks) in the causal neighborhood, and the residual is coded with variable-length coding, again, similar to motioncompensated video coding [28]."]} +{"16507285|64404": ["Even in the most recent range extensions for the modern compression standard HEVC/H.265 [14] the transform is deactivated in lossless applications and instead merely prediction is applied.", "JPEG XR [7], as well as single intra image coding in the popular video compression formats H.264/AVC [8], HEVC/H.265 [9], and Google VP9 [10], do also apply block processing where typically similar transforms like integer variants of the DCT or of the discrete sine transform (DST) are used."]} +{"16507285|3540699": ["JPEG XR [7], as well as single intra image coding in the popular video compression formats H.264/AVC [8], HEVC/H.265 [9], and Google VP9 [10], do also apply block processing where typically similar transforms like integer variants of the DCT or of the discrete sine transform (DST) are used."]} +{"139107823|64404": []} diff --git a/edge/graph_196174971.jsonl b/edge/graph_196174971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70d97ccba3da866e9cfb6341f9e8e946b9e7ca8e --- /dev/null +++ b/edge/graph_196174971.jsonl @@ -0,0 +1,60 @@ +{"59616857|29654897": ["In fact, gamification has a positive impact on crowdsourcing, both from qualitative and quantitative points of view, levering on intrinsic and extrinsic motivation to push the user in becoming an active member of the system community [19, 20].", "In particular, gamification is recognized as a mechanism that lets people feel motivated and engaged in contributing to the system [19]."]} +{"1262239|12675271": ["In a smart city scenario, resources should be distributed within the network ensuring that the micro-services that make up an application are allocated and instantiated close to the end device that is requesting the IoT application [8]."]} +{"1262239|24110634": ["Fog computing brings computing power, storage and memory capacity closer to wireless gateways, sensors and actuators since these devices are currently lacking in terms of such capacities [4]."]} +{"1262239|19938676": ["In fact, the upcoming 5G networks aim to tackle these new business opportunities by introducing very high carrier frequencies, an enormous number of antennas and new functionalities, such as Device-to-Device communication (D2D) and fog computing [2]."]} +{"54012966|7706992": ["Combining touch interactivity and easy-to-handle user interfaces, several platforms were defined and, in 1999, Maguire [8] reviewed the existing systems.", "Combining touch interactivity and easy-to-handle user interfaces, several platforms were de\ufb01ned and, in 1999, Maguire [8] reviewed the existing systems."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"149150986|14849079": ["To date, as evidenced by a number of studies, the two most popular typologies of experimental urbanism in the world are the smart city and the eco-city which count thousands of initiatives across different geographical spaces (Aina, 2017; Caprotti, 2014; Caprotti and Cowley, 2016b; Cugurullo, 2016a; De Jong et al., 2015; Joss et al., 2011; Rapoport, 2014; Trencher and Karvonen, 2017; Wu et al., 2017; Yin et al., 2015).", "\u2026smart city and the eco-city which count thousands of initiatives across different geographical spaces (Aina, 2017; Caprotti, 2014; Caprotti and Cowley, 2016b; Cugurullo, 2016a; De Jong et al., 2015; Joss et al., 2011; Rapoport, 2014; Trencher and Karvonen, 2017; Wu et al., 2017; Yin et al., 2015)."]} +{"46736766|3348390": []} +{"14849079|239537": ["It is an approach proposed to provide friendly presentation of data and services to smart city application users [80]."]} +{"28051344|6879093": ["The freedom for an end-user to install, manage and use personalized applications creates additional challenges in that investigators may no longer know if the data of interest are encrypted, stored locally or in the Cloud (Kechadi et al., 2015)."]} +{"10817088|2670121": ["Generative probabilistic graphical models such as hidden Markov models [72], [70], [73], [74] and dynamic Bayesian networks [64], [48] have been used to model activity sequences and to smooth recognition results of an ensemble classifier [75]."]} +{"6862491|21738890": ["Posture detections schemes by using the sensor equipped smart devices will be widely used in health monitoring services [90, 91]."]} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"117689368|21386749": []} +{"53696817|17737221": ["The non-flexible appliances are those that are associated with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "These appliances usually present burst loads (Khan et al., 2014; Ullah et al., 2013)."]} +{"53696817|16335158": ["The IoT Cloud (Alamri et al., 2013; Botta et al., 2016) will enable the long-time storage and complex analysis of this data."]} +{"110612855|17381415": ["For grid stability however, power electronics also play a role on the power generation side in distributed power generation systems [76]."]} +{"31850245|29060869": []} +{"31850245|485843": []} +{"31850245|5747564": []} +{"31850245|6959212": ["\u2022 Security: Wireless nature of WSN also makes the system vulnerable to various external denial of service (DoS) attacks [47,48], physical and cyber threats."]} +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} +{"49687718|14382980": []} +{"113625127|206485901": []} +{"159021960|37976266": ["Bibri and Krogstie (2017d) Reviewed the core enabling technologies of big data analytics and context-aware computing of smart sustainable cities."]} +{"159021960|1353379": ["The study focused on the challenges of combining IoT and big data and their e \ufb00 ect for achieving the goal of future smart cities.", "As shown, existing studies have discussed the utility of various ICTs for the development of smart city applications, such as IoT (Alam, Mehmood, Katib, Albogami, & Albeshri, 2017; Cicirelli et al., 2017), smartcards (Belanche-Gracia et al., 2015), sensors (Ang & Seng, 2016), big data analytics\u2026", "Bibri (2018b) Explored how IoT-enabled sensor-based big data applications can a \ufb00 ect the environmental sustainability, as well as related data processing platforms and computing models, of future smart sustainable cities.", "As shown, existing studies have discussed the utility of various ICTs for the development of smart city applications, such as IoT (Alam, Mehmood, Katib, Albogami, & Albeshri, 2017; Cicirelli et al., 2017), smartcards (Belanche-Gracia et al., 2015), sensors (Ang & Seng, 2016), big data analytics (Bibri & Krogstie, 2017c), security management systems (Li & Shahidehpour, 2017), geographic information systems (Aina, 2017), and virtual reality (Jamei et al., 2017).", "Using big data for smart cities inherently involves the ICT-rich nature of smart cities, such as the use of sensors throughout a city for data collection, IoT for real-time data transmission to a central server (Atzori, Iera, & Morabito, 2010), AI and cloud computing for data processing (Iyoob, Zarifoglu, & Dieker, 2013), blockchain for data security and organizational connection (Risius & Spohrer, 2017), geographic information visualization for analysis result delivery (Aina, 2017), and design of smart services for data collection and information delivery (Maglio & Lim, 2016).", "Rathore et al. (2016) Developed a four-tier architecture for smart city development and urban planning using IoT and data analytics.", "The bottom tier of the architecture is allocated for the IoT sources and data generation and collection.", "The key challenges of using IoT and big data analytics were identi \ufb01 ed, and some associated open issues were discussed.", "Cicirelli et al. (2017) Developed an IoT-based platform for a generic cyber \u2013 physical system to facilitate the design and implementation of smart city services and applications.", "Urbieta, Gonz\u00e1lez-Beltr\u00e1n, Ben Mokhtar, Anwar Hossain, and Capra (2017) Studied the modeling of IoT-based services for smart cities, which can allow mobile users to dynamically perform daily tasks.", "An analytical framework for IoT-enabled data-centric applications, which can improve the environmental sustainability of smart sustainable cities, was developed.", "D\u00edaz-D\u00edaz et al. (2017) Studied the business models of IoT and other technologies in smart cities by focusing on eight urban services provided in the city of Santander.", "This study established how IoT can contribute to reduced costs and energy consumption, how data can be managed, and how citizens can be incentivized in the services."]} +{"29037018|8022584": ["\u2026(MCMC), Sequential Monte Carlo (SMC), and Approximate Bayesian Computation (ABC) methods are well established and have revolutionized the practice of Bayesian statistics, however new grand opportunities have appeared with the emergence of massive, high-dimensional and complex data sets [116, 117]."]} +{"29037018|8835588": ["A classical paper [102] provides a good overview of context in the field of artificial intelligence."]} +{"54086780|26675425": ["The distributed architecture model uses multi-agent systems (MAS) [59] or service oriented architecture (SOA) paradigms [60] to design and develop health monitoring applications.", "MAS facilitates the design and establishment of a distributed intelligence to perform complex tasks."]} +{"54086780|3348390": ["In context-aware systems, this degree is usually called level which in turn has been defined in various ways [20].", "We direct the reader to [20] for further reading on context modelling techniques."]} +{"54086780|6332923": ["In HMS, security requirements are the same as those of traditional networks, such as availability, con\ufb01dential-ity, integrity, access control, and authentication [56] [218]."]} +{"54086780|16514036": ["These studies have mainly focused on smart home perspectives [3], health smart homes with limited information about design issues and challenges [4], wearable sensor-based systems for health monitoring [5], and health informatics and healthcare applications for the elderly from various perspectives [6][7][8].", "Although there are several protocols and algorithms that have been proposed in wireless sensor networks, there are no well-suited features or requirements for body area networks (BANs) [5]."]} +{"54086780|5401262": ["the collection and analysis of highly relevant contextual information) [12]."]} +{"15395523|1634674": ["More recently, Turaga et al. [9] and Aggarwal et al. [31] present surveys focusing on highlevel representation of complex activities and corresponding recognition techniques."]} +{"15395523|20905429": ["Over the past decade, sensor technologies, especially low-power, low-cost, high-capacity, and miniaturized sensors, wired and wireless communication networks [11]\u2013[13],"]} +{"15395523|7788290": ["HMMs have more recently been adopted as a model of choice in computer vision for modeling sequential (video) data (see [5] and [7] for surveys, and [94] and [102] for early examples).", "However, it is worth pointing out that while visual monitoring is intuitive and information-rich, vision-based activity recognition suffers from issues relating to privacy and ethics [4], [5], [8] as cameras are generally perceived as recording devices.", "Gavrila [5] and Poppe [6] present surveys mainly on tracking human movement via 2-D or 3-D models and the enabled action recognition techniques."]} +{"40299482|7706992": ["UXD Heuristics : Taking into account the generated system architecture, the initial UXD of the kiosk system was created based on the available guidelines (e.g., Maguire, 1999; M\u00fcller et al., 2010; Nielsen, 1994; Sandnes et al., 2010; Shneiderman, 1987).", "Maguire (1999) provided a review of general guidelines on user-interface design for self-service and public information kiosk systems.", "Due to their convenience, simplicity, and low cost, they are preferred both by organizations and the public (e.g., Maguire, 1999; Tung & Tan, 1998).", "The user-interface design guidelines for public information kiosk systems can be found, for instance, in studies by Maguire (1999), Sandnes, Jian, Huang, and Huang (2010) and M\u00fcller, Alt, Schmidt, and Michelis (2010)."]} +{"3630894|15589021": ["to 450 C [19] which is difficult to be integrated within textiles and consumes a significant amount of energy."]} +{"390409|535786": []} +{"390409|2398835": ["The phenomenon of big data has long been characterized by volume, velocity, and a variety of data types that have been created at everincreasing rates (Khan et al., 2014)."]} +{"108449635|485843": []} +{"19583971|5664472": ["A more in depth analysis of the activity recognition techniques can be found in the following reviews: Chen et al. [8], Rashidi and Mihailidis [6], Aggarwal and Xia [10], Incel et al. [11], Ke et al. [12], Aztiria et al. [13] and Guan et al. [14]."]} diff --git a/edge/graph_196178717.jsonl b/edge/graph_196178717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a18ea4321d8cafb1c29bbc7f6b80a3a150c80faf --- /dev/null +++ b/edge/graph_196178717.jsonl @@ -0,0 +1,4 @@ +{"15728506|15231229": ["well studied, and various approaches have been developed[21, 27]."]} +{"28305292|1497912": ["An extensive comparative study of metaheuristic optimization frameworks can be found in [234]."]} +{"15705074|1482463": ["A thorough review can be found in [15]."]} +{"4106288|15231229": ["Collision detection strategies based on hierarchies of bounding volumes belong to the most popular ones, for their proven efficiency [44]."]} diff --git a/edge/graph_196182061.jsonl b/edge/graph_196182061.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_196187504.jsonl b/edge/graph_196187504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a6283718e50c35a708bed0e10da4e886fd122b5 --- /dev/null +++ b/edge/graph_196187504.jsonl @@ -0,0 +1,6 @@ +{"608290|16631951": ["For example, in Fielt et al. (2014), they capture aspects of shared services objectives in a first-level node and then code the content with this node using a prior framework (i.e., deductively). This second round of coding can also be done inductively, where the coded content in the node is coded using inductive methods to see what the data captured on that theme actually unveils. At this stage, new nodes are created as sub-nodes, and they are merged or restructured together with the respective textual passages to gain more understanding of the possible meaning. This phase is comparable to the axial coding described in the inductive grounded theory approach above. Fielt et al. (2014) used a similar approach when they presented different forms of sharing (see Table 6 in Fielt et al.", "For example, in Fielt et al. (2014), they capture aspects of shared services objectives in a first-level node and then code the content with this node using a prior framework (i.e., deductively).", "For example, in Fielt et al. (2014), they capture aspects of shared services objectives in a first-level node and then code the content with this node using a prior framework (i.", "For example, as Fielt et al. (2014) describe in their literature review of shared services, understanding why an organization should consider shared services is critical for its success, and understanding why organizations consider and implement shared services is useful as a contextual basis for\u2026", "For example, when doing research on shared services (see Fielt et al., 2014), it is relevant not only to define what shared services are but also to locate them in other similar areas such as outsourcing and inter-organizational systems.", "Fielt et al. (2014) provide a good example of how one can track down prior definitions from the literature to form a synthesized and consolidated new definition supported by evidence (the literature itself).", "Fielt et al. (2014) used a similar approach when they presented different forms of sharing (see Table 6 in Fielt et al., 2014).", "They also provide a good example of how to visually illustrate the scope of their search strategy\u2019s sampling frame (see Figure 1 in Fielt et al., 2014).", "Examples of how to best set up NVivo and store papers to support an effective literature review can be found in the presented case study and Fielt et al. (2014), Beekhuyzen, Nielsen, and von Hellens (2010), and Bandara (2006, 2007).", "For example, as Fielt et al. (2014) describe in their literature review of shared services, understanding why an organization should consider shared services is critical for its success, and understanding why organizations consider and implement shared services is useful as a contextual basis for any investigation associated with shared services."]} +{"54806682|24817150": ["Several studies (Chen & Macredie, 2010; Ficarra et al., 2011; Haklay, 2010; Harbich & Hassenzahl, 2011; Lopatovska & Arapakis, 2010; Pan, 2010; Rogers et al., 2011; Shneiderman & Plaisant, 2010; Szameitat, Rummel, Szameitat, & Sterr, 2009) indicate that real interaction can track the website\u2026"]} +{"22730008|36355857": ["\u2026are not designed and conducted rigourously using methodologically sound practices and techniques, they can contain biases, errors, misinterpretations or other major flaws that can impair their rigour and limit their usefulness for research and practice (Kitsiou et al, 2013; Templier & Pare\u0301, 2015).", "\u2026August 2016\ndifferent types of review articles (e.g. Rowe, 2014; Pare\u0301 et al, 2015; Okoli, 2015a), quality considerations (e.g. Bandara et al, 2015; Templier & Pare\u0301, 2015) and methodological contributions, which range through groundedtheory approaches (e.g. Wolfswinkel et al, 2013), soft systems\u2026"]} +{"22730008|36158642": ["\u2026which range through groundedtheory approaches (e.g. Wolfswinkel et al, 2013), soft systems methods (e.g. Sylvester et al, 2013), stylized facts (e.g. Houy et al, 2015), critical discourse analysis (e.g. Wall et al, 2015), as well as detailed guidelines for specific steps associated with the\u2026"]} +{"22730008|11110068": ["Diversity of relevant literature review genres Literature review approaches and methods, both within and outside IS, are undergoing a period of rapid development (Gough et al, 2012; Tate et al, 2015).", "Hence, we concur with Tate et al (2015) that \u2018\u2018the days of the \u2018na\u0131\u0308ve\u2019 narrative synthesis review- with no explicit attention to purpose, world-view, quality, context, hegemonic assumptions, characteristics of inclusion and exclusion, characteristics of the source literature, and methods of\u2026"]} +{"55167343|34423577": ["Davies (2007) advocated for more research, particularly quantitative research with more\nrepresentative samples, but the research does not address the topic at a significant level.", "\u2026behaviour research (Saumure & Given, 2004; Williamson, Schauder, & Bow, 2000; Beverley, Bath, & Barber, 2007), information needs studies (Davies, 2007; Williamson, Schauder, & Bow, 2000; Creaser, Davies, & Wisdom, 2002), and a lack of first hand information from persons with\u2026", "His conclusions coincide with other researchers who note the lack of information behaviour research (Saumure & Given, 2004; Williamson, Schauder, & Bow, 2000; Beverley, Bath, & Barber, 2007), information needs studies (Davies, 2007; Williamson, Schauder, & Bow, 2000; Creaser, Davies, & Wisdom, 2002), and a lack of first hand information from persons with disabilities (Creaser, Davies, & Wisdom, 2002).", "The literature has been described as consisting mainly of descriptions of access challenges and the recommendation of solutions, with little empirical research (Davies, 2007).", "Davies (2007) concludes his research on the LIS literature on visual disabilities with the following, \u201cMore has to be discovered about people\u2019s preferences for service delivery and information content and their perceptions and experiences of what is offered\u201d (793).", "In looking at general views of the LIS literature on disability and accessibility, there is a\nperception that little actual research is present (Davies, 2007; Saumure & Given, 2004; Williamson, Schauder, & Bow, 2000) and that much of the literature focuses on describing difficulties and\u2026", "\u2026of the LIS literature on disability and accessibility, there is a\nperception that little actual research is present (Davies, 2007; Saumure & Given, 2004; Williamson, Schauder, & Bow, 2000) and that much of the literature focuses on describing difficulties and recommending solutions (Davies, 2007).", "The LIS literature on disability and accessibility has been characterized as being strongly focused on technology (Linley, 2000 Davies, 2007) with a dearth of articles on the attitudinal aspects of disabilities (Linley, 2000; Dequin, Schilling, & Huang, 1988).", "Davies (2007) provides a brief overview of international research into the library and information needs of persons with visual disabilities.", "In looking at general views of the LIS literature on disability and accessibility, there is a perception that little actual research is present (Davies, 2007; Saumure & Given, 2004; Williamson, Schauder, & Bow, 2000) and that much of the literature focuses on describing difficulties and recommending solutions (Davies, 2007)."]} diff --git a/edge/graph_196188646.jsonl b/edge/graph_196188646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8595b5cafb01450705c6d3689891d06eb0cdc04 --- /dev/null +++ b/edge/graph_196188646.jsonl @@ -0,0 +1,6 @@ +{"303813|20905429": ["However, although several BSN-based research prototypes have been proposed to date [1], [2], almost none of them have reached the market at this time."]} +{"8322101|17024419": ["Van Krevelen [12] provides a comprehensive overview of applications in the space, explicitly discussing personal assistance, collaboration, and navigation tasks \u2013 all of which our system supports."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"14025144|8365617": []} +{"5000915|7492478": []} +{"6241487|7981750": ["The development of SLAM has contributed to computer vision and robotics; it builds a map of an environment and localizes the images on the map [Taketomi et al. 2017]."]} diff --git a/edge/graph_196190733.jsonl b/edge/graph_196190733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d400f4f84618567bb50c40ddc80a3649c92d0ce8 --- /dev/null +++ b/edge/graph_196190733.jsonl @@ -0,0 +1,2 @@ +{"36809744|16050394": []} +{"27912482|14156424": []} diff --git a/edge/graph_196200155.jsonl b/edge/graph_196200155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c29eb6f7aa0826038a526918c94153acc02828d --- /dev/null +++ b/edge/graph_196200155.jsonl @@ -0,0 +1,11 @@ +{"57342190|14749415": []} +{"8328463|14826104": ["In particular we demonstrate an application of game-related, k-means clustering [as reported in other related research (Thurau and Bauckhage, 2010)] vs. other types reported such as Linear Discriminant Analysis (LDA) (Gow et al., 2012) or Mixture Model clustering (Te\u00f3\ufb01lo and Reis, 2013)."]} +{"61814381|17133230": []} +{"61814381|14749415": []} +{"3329018|15683881": [") and learning behavior in order to automate the construction of student models [89]."]} +{"52965836|3342225": ["[63] reviewed methods for explaining black-box models at a large scale including data mining as well as machine learning."]} +{"52965836|17779926": ["One effort to gain insight into highly complex models is the use of rule extraction [114]\u2013[116]."]} +{"53563853|14688441": []} +{"29242099|14749415": ["Some proposals to evaluate digital gamebased learning have been carried out [2] but their results, however, have not been entirely satisfactory because of the difficulties in their implementation or their low efficiencies [3]."]} +{"4846899|14749415": []} +{"4846899|16520440": []} diff --git a/edge/graph_196203616.jsonl b/edge/graph_196203616.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1328a646cb787d3b702056ee4c570cf28099213b --- /dev/null +++ b/edge/graph_196203616.jsonl @@ -0,0 +1,21 @@ +{"61645176|14441987": []} +{"8663783|14441987": []} +{"7416108|14441987": []} +{"8099444|14441987": ["In the articles of Royer [ 13 ] and of Misra [14] many other routing protocols are discussed."]} +{"29818538|7278743": []} +{"41549277|14597368": ["The work is motivated by the \ufb01ndings in [6], [7], [10] in different contexts that loop networks have multi-connectivity and are thus more reliable."]} +{"15719725|1230643": ["Since the sensor nodes are equipped with small, probably irreplaceable, batteries with limited power capacity, it is essential that the network to be energy efficient in order to maximize the life span of the network [2] [3]."]} +{"1079829|7278743": ["Bluetooth is rapidly growing technology and it has shifted to emerging areas like medical (Maglogiannis and Hadjiefthymiades, 2007), imaging (Gallo et al., 2010) and sensor networks (Bisdikian, 2001)."]} +{"28597203|7278743": ["Today the focus has shifted to emerging areas like sensor networks [4], where the low cost and low power nature of Bluetooth has become attractive."]} +{"6531753|7278743": ["It was also chosen to serve as the baseline of the IEEE 802.15.1 standard for wireless personal area networks (WPANs) [11], which can support both synchronous traffic such as voice, and asynchronous data communications."]} +{"10509343|1230643": ["1 in February 2001), Bluetooth has received a considerable amount of attention, being vigorously marketed by the SIG who promise a technology to \u2018\u2018seamlessly connect all your mobile devices\u2019\u2019.", "Consequently, the extent to which the Bluetooth networking capabilities can be advanced are receiving particular attention, and this is the focus of our survey on the state-of-the-art.", "The L2CAP delivers packets received at higher layers to the other end of the link."]} +{"10509343|14441987": []} +{"8565189|7278743": []} +{"195908896|9554464": []} +{"195908896|1230643": []} +{"14820499|7278743": []} +{"29869858|7278743": ["Bluetooth[1] is a new radio interface standard that provides means to interconnect mobile electronic devices into personal area ad-hoc network(PAN)."]} +{"6438719|14441987": []} +{"32226261|7278743": []} +{"41127482|14441987": ["The readers are referred to [18] for more about this tradeoff."]} +{"62298309|7278743": ["Bluetooth operates in the globally available 2.4 GHz Industrial-Scientific-Medical (ISM) band and serves as the baseline for the IEEE 802.15.1 Wireless Personal Area Network (WPAN) [3].", "1 Wireless Personal Area Network (WPAN) [3]."]} diff --git a/edge/graph_196203731.jsonl b/edge/graph_196203731.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e3a39e3df4a9dfe1f268406a3adde7b7c08d05d --- /dev/null +++ b/edge/graph_196203731.jsonl @@ -0,0 +1 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/graph_1962065.jsonl b/edge/graph_1962065.jsonl similarity index 100% rename from graph_1962065.jsonl rename to edge/graph_1962065.jsonl diff --git a/graph_1962133.jsonl b/edge/graph_1962133.jsonl similarity index 100% rename from graph_1962133.jsonl rename to edge/graph_1962133.jsonl diff --git a/edge/graph_19632381.jsonl b/edge/graph_19632381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19633743.jsonl b/edge/graph_19633743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19636511.jsonl b/edge/graph_19636511.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..980a3e99896517b43d30ef71e37a83cdf727ec55 --- /dev/null +++ b/edge/graph_19636511.jsonl @@ -0,0 +1,26 @@ +{"17679053|2833151": []} +{"17679053|8909218": ["The literature mentions the advantages of these technologies like lower energy consumption and low maintenance costs compared to those of a macroBS [33,34], as well as higher dedicated data rates and better QoS for small groups of users levels, which leads to better user perception [8,33].", "Operating a macroBS during 1 year can cost 60000 Euros/year, whereas a femtoBS only 200 Euro/year [33]."]} +{"18202275|25929315": ["Some of the most relevant contributions are summarized in Table I and a comprehensive survey can be found in [16]."]} +{"16776317|10837932": []} +{"16776317|17109970": ["\u2026that R m and P m can be defined as the sum of corresponding terms over multiple subcarriers assigned to MT m for orthogonal frequency division multiple access (OFDMA) networks [13], [32]\u2013[34], [42], [43] or the sum over multiple radio interfaces for MT m with multi-homing capability [20], [46] .", "In the simplest model, P m represents the MT transmission power P tm [34], [42], [43]."]} +{"24334533|8909218": ["In LTE-A, stations can be configured as evolved universal terrestrial radio access (E-UTRA) NodeBs (eNBs) in macrocells or picocells, home eNBs (HeNBs) in femtocells [5]\u2013[7], and relay nodes (RNs) in relay networks to provide comprehensive wireless access in both outdoor and indoor environments."]} +{"24334533|25929315": ["To support M2M communications in LTE/LTE-A, the following solutions have been proposed for controlling PRACH overload [46], [47]."]} +{"23803658|16219347": []} +{"23803658|5002530": ["A state-of-the-art survey concerning the security aspects in MWSN is given in [12]."]} +{"23803658|14132386": ["The most recent surveys on routing protocols available in the literature, such as the one from [9], present a classification of the protocols based on an approach similar to the one from"]} +{"23803658|1940388": ["A well-documented survey on security protocols in missioncritical WSN applications was written by the authors from [11]."]} +{"23803658|17769444": ["have different types of sensors attached to them, the SR can be different for each of them [59].", "In addition to the aforementioned node parameters, several surveys have been published concerning the hardware aspects on the different Wireless Multimedia Sensor Networks (WMSNs) sensor nodes [59], [64]\u2013[68]."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"16277341|8909218": ["On the contrary, femtocell base stations are typically deployed in an unplanned manner [1] , [2]."]} +{"6335755|25929315": ["The current cellular access mechanisms, considering all the associated overhead, cannot support this kind of operation [3]."]} +{"2871699|25929315": ["M2M applications might require very high priority with a detailed level of granularity due to the transmission of critical information, whereas priority for Human-based applications is mainly among applications for each user and not between different users [17].", "[17] mention that M2M and Human-based traf\ufb01c differ further in traf\ufb01c direction, since M2M traf\ufb01c direction will be mainly uplink, while Human-based traf\ufb01c is either balanced or mainly downlink.", "Finally, M2M will have higher number of devices and may be required to operate for years or decades without maintenance, but users can recharge/replace batteries [17].", "Small and infrequent data transmissions will be more common in M2M [17,21], and thus the knowledge developed for Human-based traf\ufb01c, which is mostly bursty (web browsing), bulky (\ufb01le transfer), or constant or variable bit rate streams (VoIP or video) can be dif\ufb01cult to apply directly to M2M.", "Other M2M communications\u2019 surveys focus mainly in home networks [16], 3GPP Long-Term Evolution (LTE) networks [17], service platforms [18], or data mining techniques [19].", "M2M applications will be duty-cycled and should have very short connection delay to guarantee fast access to the network when waken up, while Human-based applications tolerate longer connection delays but are very demanding once connections are established [17]."]} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"16203452|1236072": ["These modes include time-driven, event-driven, query-driven, or a hybrid combination of these methods [11]."]} +{"206986053|303976": ["For instance, authors in [14] addressed the M2M e-healthcare application, i.e., m-Health, by highlighting the benefits of using M2M technology for both patients and service providers due to reliable autonomous communication.", "Several review papers [14\u201322] discussed M2M communications in the context of wireless technologies by focusing on various M2M applications such as e-healthcare, smart metering, smart grids, IoT paradigm, and radio resource management.", "Furthermore, in [14], a first detailed analysis of wireless body area networks (WBANs) towards the patient side is provided, and various end-to-end (E2E) solutions for practical e-healthcare applications were discussed."]} +{"206986053|2535224": ["In [23], authors discussed applicability of software-defined networks and network virtualization to mobile and wireless networks."]} +{"206986053|8909218": ["In order to support increasing mobile traffic, several enhancements in existing LTE systems [10] such as femtocells [11] and relay nodes (RNs) [12] were introduced to fulfill the International Mobile Telecommunications-Advanced (IMTAdvanced) demands of maximum throughput of up to 1Gbps in downlink and 500Mbps in uplink [13]."]} +{"12991150|8909218": ["Recently, together with the rapid development of WiMAX and LTE networks, the research on femtocells is becoming very hot [45\u201347]."]} +{"42787881|25929315": []} +{"2545415|7686677": ["\u2026(ii) Devices in machine-type communications are batterylimited and in many cases it is technically and economically difficult to recharge/replace the batteries; (iii) Green aspects of future wireless communications are becoming part of the objectives in engineering and optimization [1], [13]."]} +{"10437134|8909218": []} diff --git a/edge/graph_19645724.jsonl b/edge/graph_19645724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..980f2478562a29664c5d562609db287a28b0bc00 --- /dev/null +++ b/edge/graph_19645724.jsonl @@ -0,0 +1,25 @@ +{"53229933|19645724": []} +{"3402414|19645724": ["A light field camera or plenoptic camera allows capturing of spatial and angular information of a scene from a single shot [2]\u2013[7]."]} +{"3486606|30747069": ["As HEVC provides the constraint that the reference frames of the next frame can only be chosen from the reference frames of the current frame and the current frame itself [27], the frames 77 and 80 should always be stored in the reference buffer because they will be used as the reference frames for the"]} +{"3486606|64404": ["Video Coding (HEVC) [7]."]} +{"3486606|3540699": ["264/Advanced Video Coding [6], and H."]} +{"24517024|19645724": ["information and 2-D angular information [6].", "According to the overview paper [6], the proposed method is categorized in the matching-based", "It can be viewed as a step of cost volume construction in the existing methods and the accumulated final disparity map can be viewed as the initial disparity map in the existing methods [6].", "Many image processing and computer vision researches on light field [6], such as saliency detection [7] and occlusion detection [8], have been presented."]} +{"11194960|64404": ["The Advanced Motion Vector Prediction (AMVP) scheme of HEVC [3] is enabled in this modified-Intra frame to efficiently encode these disparity vectors.", "Hence, when Inter coding a block of an Enhancement View, only the prediction block (PB) partition patterns existing in Inter prediction modes of HEVC [3] are enabled, which are then modified to integrate the direct disparity vector calculation."]} +{"11194960|396631": ["Coding (MVC) standard [2] employs a block-based disparity estimation technique to remove this existing inter-view redundancy."]} +{"975422|19645724": []} +{"12651678|469744": ["In the camera-based experiment, our method demonstrated that it improved the SPAAM calibration to subpixel level by precorrecting the distortion caused by the OST-HMD\u2019s optical elements.", "We assume that the cameras and the OST-HMD\u2019s virtual screen are already calibrated.", "This paper proposes a method to compensate the world light-ray distortion caused by OST-HMDs\u2019 optical elements.", "Yet, they neglected to model an important fact of the system: optical elements of OST-HMDs distort incoming world-light rays before they reach the eye (Fig.", "It corrects an optical distortion which conventional eye-HMD models have not considered \u2013 the distortion of the light rays passing through the optical elements of OST-HMDs.", "Mission-critical AR applications such as medical AR [26, 4] especially depend on accurate calibration quality.", "The calibration procedure is impractical for the daily use of OST-HMDs, since users have to recalibrate the system whenever they move the HMD \u2013 which happens frequently.", "Firstly, OST-HMDs have distortions in their virtual screen, whereas projection has been assumed to be planar in our current model.", "Optical See-Through Head-Mounted Displays (OST-HMDs) have lately gained much interest, as typi\ufb01ed by recent consumer-level products like Google Glass, EPSON BT-200, etc.", "Other OST-HMDs may have different characteristics.", "Spatial consistency, in particular, is one of the most fundamental requirements for AR applications with OST-HMDs [4, 14].", "Manual calibration methods, such as the Single Point Active Alignment Method (SPAAM) [4], estimate the 3D-2D projection by requesting users to align a series of 3D points in the physical world with 2D dots on the virtual screen."]} +{"21142311|19645724": ["During the last decades plenoptic cameras gained more and more interest [1]."]} +{"62761469|14409099": ["We refer the readers to the comprehensive survey on light field imaging [19, 36] for more details about the refocusing algorithm."]} +{"11693932|19645724": ["[49], [50]."]} +{"2700616|1482463": ["On the other hand, pure non-rigid registration technique, surveyed in [38], is an alternative solution to avoid using skeleton."]} +{"2700616|14970359": ["Early works on this topic are well surveyed in [16] and [15]."]} +{"22976323|18193930": ["The incomplete isolation of image channels convey to the left and right eye so that the content from one channel is partly presented in another channel [10]."]} +{"16022374|40596005": ["In fact, there is a geometry-image continuum which covers a wide range of IBR techniques, as is surveyed in [SKC03].", "Image-based rendering (IBR) has been an attractive research area in recent years [SKC03, ZC04a]."]} +{"14620600|40596005": ["Interested readers are referred to a recent survey paper in [17] for more details.", "In general, there are two approaches to reduce the data size of image-based representations [17].", "Providing random access to the compressed data for real-time rendering and efficient methods for exploring the redundancy are important problems in the compression of plenoptic videos [17].", "Interested readers may refer to a survey paper in [17] for more detail."]} +{"3315752|19645724": ["For a comprehensive overview of light field image processing techniques, please refer to [5]."]} +{"24666443|19645724": ["v Vertical spacing between the neighboring two macropixel rows [2,32] 5", "x0 ,o Incomplete pixels counting from the left boundary of the odd macropixel rows [2,32] 5", "x0 ,e Incomplete pixels counting from the left boundary of the even macropixel rows [2,32] 5", "2741108 can be applied to a variety of applications for improved quality of service [2]."]} +{"24666443|64404": ["Considering that the coding unit size used in the existing image/video coding standards is generally an integer multiple of 8 [19], [20], the proposed macropixel alignment reshapes and regularizes the lenslet image to guarantee that the centers of macropixels are aligned and each macropixel can be fully contained by a non-overlapped 16 \u00d7 16 block."]} +{"24666443|3540699": ["264 [19] and High Efficiency Video Coding (HEVC)", "Considering that the coding unit size used in the existing image/video coding standards is generally an integer multiple of 8 [19], [20], the proposed macropixel alignment reshapes and regularizes the lenslet image to guarantee that the centers of macropixels are aligned and each macropixel can be fully contained by a non-overlapped 16 \u00d7 16 block."]} +{"22025808|19645724": ["For a comprehensive overview of light field image processing techniques, including super-resolution, please refer to [3]."]} +{"12064983|750942": ["We consider well-known 3D extension of HEVC encoder [36]."]} +{"206725533|396631": []} diff --git a/edge/graph_19647074.jsonl b/edge/graph_19647074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_196470845.jsonl b/edge/graph_196470845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4958add0928ce697c224ce8b61c69dde36272f7d --- /dev/null +++ b/edge/graph_196470845.jsonl @@ -0,0 +1,62 @@ +{"182605852|8323234": ["Fortunately, the short wavelength of mmWave band enables the integration of a large antenna array in a small form factor, such that a significant beamforming gain can be acquired to compensate for the path loss [2]\u2013[4]."]} +{"69753741|8999817": ["costs at the expense of reduced spectral efficiency or increased transmit power to satisfy a certain quality-of-service (QoS) requirement when compared to the fully-digital precoding [10]\u2013[12].", "Two types of analog precoders are generally used in hybrid precoding systems, namely, continuous-valued analog precoders [7] and codebook-based analog precoders [10], [38]."]} +{"51926665|3054454": [") flat Rayleigh fading and uncorrelated low-rank fading models [35]."]} +{"14527507|3649200": []} +{"14527507|13738536": []} +{"3585389|22221919": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massiveMIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cellular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machine (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "In addition, se veral survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cell ular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machi ne (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "[59] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. s. Kwak, \u201cPower-domain non-orthogonal multiple access (NOMA) in 5G\nsystems: Potentials and challenges,\u201dIEEE Communications Surveys Tutorials, vol. 19, no. 2, pp. 721\u2013742, Secondquarter 2017."]} +{"3585389|10235514": ["Furthe rmore, the contribution in [51] provided a tutorial overview of 5G research activities, dep loyment challenges and standardization trials."]} +{"3585389|4572654": ["Several survey papers exist in the literature in the contextof dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as spectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underlay DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectrum assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfections [13], licensed spectrum sharing\ntechniques [45], and the coexistence of LTE and WiFi [46].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "techniques [45], and the coexistence of LTE and WiFi [46].", "Considering a typical WiFi setup with two nodesN1 andN2 trying to connect to the core network via an access point, theclassical hidden node problem occurs when the nodeN2 starts transmitting data to the access point without being able to hear transmissions from the nodeN1 to the access point, thus causing collision at the access point [73]."]} +{"3585389|4344513": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7], [59]\u2013[61], mmWave [7], [8], [62], Non-Orthogonal Multiple Access (NOMA) [63], [64], cellular and heterogeneous networks [65]\u2013[67], Internet of Things (IoT) [70]\u2013[73], Machine to Machine (M2M) communication [68]\u2013[70] and Device to Device (D2D) communication [74]."]} +{"3585389|13019489": ["sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|10979806": ["[58] carried out a detailed survey of the existing works in the areas of energy-efficient techniques for 5G networks, and subsequently analyzed various green trade-offs including spectrum efficiency versus energy efficiency, delay versus power, deployment efficiency versus energy efficiency, and bandwidth versus power for the effective design of energy-efficient 5G networks [57]."]} +{"3585389|7525856": ["and measurements [30]\u2013[32], interweave DSS [33], [34], [36], underlay DSS [37]\u2013[39], cooperative DSS [40], [41], Medium Access Control (MAC) protocols for DSS [42], spectrum deci-", "model [185], and (iii) Radio Environment Map (REM) which can be created either based on sensing information obtained from the sensor nodes or database information obtained from regulators/operators or both [34], [186]."]} +{"3585389|8606364": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"3585389|19938676": ["In the context of 5G wireless networks, authors in [50] provi ded a detailed survey on 5G cellular network architecture and described some of the eme rging 5G technologies including massive MIMO, ultra-dense networks, DSS and mmWave."]} +{"3585389|4122595": ["The detailed mapping of various spectrum awareness and exploitation techniques was provided in [13].", "The main enabling techniques for DSS in wireless networks can be broadly categorized into spectrum awareness and spectrum exploitation techniques [13].", "cal imperfections such as noise uncertainty, channel uncertainty, hardware imperfections, noise/channel correlation in the context of FD-CR communications [13].", "sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|8974063": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"1401468|8909218": []} +{"9712422|1123458": ["The relation (13) is valid, if and only if (14) Proof: The proof, based on the -lemma [29], [32], [37], can be found in [16]."]} +{"9712422|30443041": ["Worst-case analysis, that we adhere to in this paper, is also well-established in robust signal processing [9], [10], [14]\u2013[19]."]} +{"3550281|22221919": ["NOMA is one of the major candidates in the design of radio access techniques for 5G [122]."]} +{"3550281|3461906": ["interference management and some open research challenges have been discussed in [18]."]} +{"3550281|21418": ["million connections per square metre [4]."]} +{"3550281|4122595": ["[90]."]} +{"3550281|3055684": ["[14] have discussed a variety of topics including"]} +{"3550281|12029139": ["If the power of signal processing noise is denoted by \u03c3 2 sp, the maximum ID rate of receiver j decoded from the source [11] i can be written as", "in RF EH, but due to the inverse-square law, RF energy transfer is limited in terms of its coverage range [11].", "In [11], a survey is presented based on current research in radio frequency EH networks (RF-EHNs).", "has attracted significant attention in wireless communication networks [10], [11].", "These works [7], [11], [13] have provided valuable insights into foundational aspects of", "When the same receiver is changed to ID mode, ID rate can be calculated using the following equation [11], where W and \u03c3 2 represent the transmission bandwidth and noise power, respectively.", "Only a few survey and overview articles directly related to SWIPT and EH have been published [3], [7], [11], [13]\u2013[23].", "available spectrum while providing fair and efficient sharing of the available spectrum while protecting the primary user from collision [11]."]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"2465856|11720829": ["Among MIMO techniques, one of the most popular applications is to employ spatial multiplexing to improve the system capacity by sending parallel data streams over multiple antennas [1][2]."]} +{"2465856|18148591": ["Among MIMO techniques, one of the most popular applications is to employ spatial multiplexing to improve the system capacity by sending parallel data streams over multiple antennas [1]."]} +{"4952174|3504276": ["Similarly for wireless communications, the energy harvesting techniques and wireless power transfer enable the UEs to harvest energy from the EM waves in the communication links, and therefore have become particularly appealing [10]\u2013[13]."]} +{"4952174|12060835": ["I. INTRODUCTION\nW ITH the increasing traffic demand and number ofuser equipments (UEs) in the wireless environment, the power consumption of both the base stations (BSs) and UEs in the wireless communication systems has increased dramatically [1][2].", "2782775 tide and wind to prolong the battery life of UEs [4].", "However, most UEs only have limited power supplies (batteries) currently, which has become a bottleneck when the power consumption is high, and the development of battery techniques cannot satisfy the current energy requirement [3].", "Similarly for wireless communications, the energy harvesting techniques and wireless power transfer enable the UEs to harvest energy from the EM waves in the communication links, and therefore have become particularly appealing [10]-[13].", "This work was supported by the Royal Academy of Engineering, UK, the Engineering and Physical Sciences Research Council (EPSRC) project EP/M014150/1 and the China Scholarship Council (CSC).\nlife of UEs [4]."]} +{"22678385|875676": ["Some non-orthogonal FBMC schemes, such as generalized frequency division multiplexing (GFDM) and the faster-than-Nyquist approach, induce additional interference from neighboring subcarriers due to non-orthogonality [18], [19]."]} +{"22678385|8280144": ["16TC was introduced as a way to evaluate performance for specific communication strategies and different medium access control (MAC) protocols in ad hoc networks [85]."]} +{"22732924|8323234": ["Compared to existing microwave cellular systems, the operating frequency for mmWave communications is in GHz, which results in a much higher pathloss in the free-space [4][5].", "MmWave channels are expected to have limited scattering [2][5]."]} +{"4027043|7686677": ["In fact, it is known that turning off BSs for energy saving is quite problematic in conventional cellular systems [16]."]} +{"14052888|8909218": ["In the context of femtocell networks,hl denotes the channel vector between the base station and thelth concurrent user, and the shaping constraint (6) is designd to ensure that the power leakage to concurrent users in coexisting hierarchical networks is below certain threshold [12]\u2013[14]."]} +{"52285927|14527507": ["A more detailed review of SLP can be found in [14]."]} +{"52149966|8999817": ["The hybrid analog-digital beamforming [1\u20136] has become popular in recent years as a judicious approach of making massive MIMO system practical and economical for the up-coming 5G networks [7, 8]."]} +{"10365422|8999817": ["ation of massive MIMO. To achieve a compromise between the performance, hardware complexityand the consequentpower consumptionin practical massive MIMO systems, hybrid analog digital beamforming [4], [5] has attracted research interest as a means of reducing the number of RF chains. In addition to the hybrid structures, another potential approach, which is the focus of this paper, is to reduce the co"]} +{"7977582|4395259": ["Recently, physical-layer security (PLS) approaches have attracted a great deal of attention in the information-theoretic society since the accompanying techniques can afford an extra security layer on top of the traditional cryptographic approaches [18]\u2013[24]."]} +{"4122595|15116409": ["of the examples are [11]: (i) Random Filtering, (ii) Com-"]} +{"4122595|8974063": []} +{"4122595|2509135": []} +{"4122595|12601073": ["Several survey papers exist in the literature in the context of CR communications covering a wide range of areas such as spectrum occupancy measurement campaigns [8], Spectrum Sensing (SS) [9]\u2013[13], spectrum management [14], emerging applications [15], spectrum decision [16], spect rum assignment [17], spectrum access strategies [18], resourc e allocation [19], [20], machine-learning techniques [21] a nd"]} +{"126698973|14527507": ["Optimizationbased CI precoding has further been proposed in [13] based on symbol scaling and [14]-[16] based on phase rotation, and their extension to multi-level modulations such as QAM is discussed in [17], [18]."]} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"7286287|18148591": ["This is an expansion of the analysis presented in [15] for CDMA communications and therefore it is directly linked to it.", "This relation comes from the fact that channel taps in MIMO systems have an effect similar to the one from spreading signatures in CDMA [16].", "Although the analysis in [15] is done for multiple access interference (MAI) present in code division multiple access (CDMA) schemes, it can be modified and applied to the ICI that exists in MIMO systems as will be shown in this paper."]} +{"10251731|8323234": ["Compared to architecture A1, the maximum gain of each transceiver is reduced by a factor 1 /L r ."]} +{"20072043|8909218": []} +{"3021451|15453366": ["2520912 challenge of bandwidth shortage [1]\u2013[3]."]} +{"8034476|12029139": ["from the received signal by switching its working mode from the EH mode to ID mode [38]."]} +{"202729381|51681559": ["One potential waveform candidate is the bandwidth saving multicarrier signal waveform spectrally efficient frequency division multiplexing (SEFDM) [4], which has been successfully implemented in wireless 60 GHz mm-wave [5] and visible light communication (VLC) [6]."]} +{"208030643|8999817": []} +{"8956471|11720829": ["One popular application of MIMO techniques is to employ spatial multiplexing to improve the system capacity by sending parallel data streams across multiple transmit antennas [1], [2]."]} +{"8956471|18148591": ["One popular application of MIMO techniques is to employ spatial multiplexing to improve the system capacity by sending parallel data streams across multiple transmit antennas [1], [2]."]} +{"53282720|14527507": ["Due to the performance benefits over conventional schemes, the concept of CI has been extended to many wireless application scenarios, including cognitive radio [24]\u2013[26], relay [27], vector perturbation [28], radar and cellular coexistence [29], wireless information and power transfer [30], mutual coupling exploitation [31], nonlinear channel [32] and directional modulation [33]\u2013[35]."]} +{"145926770|14527507": ["Nevertheless, the above precoding schemes have ignored the fact that the information of the data symbols can also be exploited for further performance improvements, which is known as the interference exploitation precoding [10]-[14]."]} +{"5968885|18148591": ["M ultiple-input\u2013multiple-output (MIMO) wireless systems are those that have multiple antenna elements at both the transmitter and receiver [1]."]} +{"53106169|8999817": []} diff --git a/graph_1965419.jsonl b/edge/graph_1965419.jsonl similarity index 100% rename from graph_1965419.jsonl rename to edge/graph_1965419.jsonl diff --git a/edge/graph_19658659.jsonl b/edge/graph_19658659.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d2c7b057e0b37d5f9481e201d78d4052ca61588 --- /dev/null +++ b/edge/graph_19658659.jsonl @@ -0,0 +1,2 @@ +{"1354964|8813834": []} +{"108144027|18540390": ["The domain research provided numerous views of these stages of knowledge (Birkinshaw et al. 2002; Satyadas et al. 2001; Zack 1999b)."]} diff --git a/graph_1966736.jsonl b/edge/graph_1966736.jsonl similarity index 100% rename from graph_1966736.jsonl rename to edge/graph_1966736.jsonl diff --git a/edge/graph_19670581.jsonl b/edge/graph_19670581.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..05e3760b2cc57ca839e888f63d8e7d1148023664 --- /dev/null +++ b/edge/graph_19670581.jsonl @@ -0,0 +1,6 @@ +{"13844646|14122909": ["The different efforts in prostate segmentation from ultrasound images can be divided in three categories [6,7] Edgebased, texture-based and model-based detection methods.", "However, poor quality of ultrasound (US) images difficult the task of image segmentation due to speckle noise, shadowing, refraction artifacts and poor contrast between the prostate and surrounding tissues [6]."]} +{"60491978|33286487": []} +{"19996299|6681074": ["Several methods have been developed for representing shapes [8], [10]."]} +{"19996299|15744805": ["The error of model fitting and image segmentation could be measured with area-based or distance-based metrics [48]."]} +{"15538672|192934": []} +{"13801243|14122909": []} diff --git a/edge/graph_19676593.jsonl b/edge/graph_19676593.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93d1c3597c23e6bcf4d3a90ebd47dd4f36ce3ab1 --- /dev/null +++ b/edge/graph_19676593.jsonl @@ -0,0 +1,4 @@ +{"19761731|17381415": ["The most challenging issue with the inverter-based units is to synchronize the inverter with the grid and then to keep it in step with the grid even when disturbances or changes happen [1]\u2013[3]."]} +{"28840702|17381415": []} +{"25618663|17381415": ["It is also feasible to implement the controller in the stationary frame or the abc frame using a proportional-resonant (PR) controller [5]."]} +{"62600561|17381415": ["\u2026for energy storage systems and an increasing share of controllable loads The conventional scheme for such grid connected power converters is based on current controlled Voltage Source Converters (VSCs), which are synchronized to the measured grid voltage through a Phase Locked Loop (PLL) [16]."]} diff --git a/edge/graph_196809493.jsonl b/edge/graph_196809493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19694911.jsonl b/edge/graph_19694911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19705830.jsonl b/edge/graph_19705830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d778fbbbb65cb8b31ce1eeeab04eec2ca1f75e2f --- /dev/null +++ b/edge/graph_19705830.jsonl @@ -0,0 +1 @@ +{"35346514|15164501": []} diff --git a/edge/graph_19711892.jsonl b/edge/graph_19711892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c11ba81a4006e34ccf2156d4fd6336ebc22f2cd --- /dev/null +++ b/edge/graph_19711892.jsonl @@ -0,0 +1,11 @@ +{"24958714|5895133": []} +{"6047095|14889616": []} +{"6047095|3540699": ["264/AVC[14] video coding is employed for compression.", "264/AVC [14] can compress such information efficiently.", "In particular, motioncompensated difference between consecutive video frames (in our case, consecutive game images) are computed and encoded using transform coding[14]."]} +{"13885851|14697846": ["[12,42,44,55])."]} +{"6618892|64404": []} +{"6618892|3540699": []} +{"6439213|3540699": ["264 codec [10] and transmitted to the mobile clients via the Real-Time Streaming Protocol (RTSP)."]} +{"8856999|3540699": ["It is well known that the most widely used video coding standard H.264/AVC achieves significantly higher encoding efficiency than the previous standards by adopting a set of new features such as adaptive motion compensation with variable block sizes, RDO technique, and so on.", "On the other hand, our proposed technique follows the framework of regular H264/AVC encoder, and hence is much easier to implement and adopted by the cloud gaming providers.", "1) It works very differently from regular H264/AVC encoder, and hence cannot benefit from H264/AVC\u2019s features like motion estimation, mode selection, and variable block sizes.", "264/AVC [7], we propose four metrics to indicate the homogeneity for different regions within a 16 \u00d7 16 MB.", "The experimental results show that the proposed REA technique can achieve a significant and consistent encoding time reduction compared with regular H.264/AVC standard over a variety of test videos.", "We use the open source X264 encoder software [27] as the implementation of the H.264/AVC standard.", "However, instead of tuning the high-level parameters like in [16], our method takes a different approach, i.e., to use rendering information to optimize the motion estimation and mode selection process of H.264/Advanced Video Coding (AVC) [7] encoding.", "Inspired by the tree-structure block sizes defined in H.264/AVC [7], we propose four metrics to indicate the homogeneity for different regions within a 16 \u00d7 16 MB.", "The proposed REA technique uses rendering information to reduce the computational complexity of the encoding process of H.264/AVC technique by:\n1) directly calculating the motion vectors and eliminating the need for regular search-based motion estimation; 2) using rendering information to reduce the number of candidate encoding modes for ROD process.", "The high computational complexity of H.264/AVC standard is mainly because of the search-based motion estimation and the large number of candidate modes.", "However, although H.264/AVC has a much higher encoding efficiency compared with the other standards, it also induces significantly higher computational complexity, which poses a challenge for applications like cloud gaming requiring real-time encoding and high interactivity.", "For those MBs that belongs to I slice, it must be encoded using intra mode, and we just use the regular H.264/AVC encoding process to maintain high encoding quality for I slices.", "Then, we encode them using the typical parameter settings for H.264/AVC real-time encoding, as tabulated in Table I.", "In the H.264/AVC standard, temporal correlation in video sequence is exploited by block-based motion compensation, where the MBs of the current frame are predicted from the previously encoded frames.", "264/Advanced Video Coding (AVC) [7] encoding.", "Then, the MV for this pixel is the difference between these two locations (Sc and Sp) multiplied by four to account for the quarter-pixel resolution of H.264/AVC [7].", "The relation between QP and qi specified in the H.264/AVC [7] standard is\nQP\u2217i = round [ 6 \u00d7 log (q\u2217i ) + 4].", "One set of test videos are encoded with regular H.264/AVC encoder, and the other set are encoded with the proposed prioritized encoding technique.", "This high accuracy of mode selection is the main reason that our proposed algorithm has only a 0.388-dB PSNR degradation compared with the regular H.264/AVC encoder with full search RDO.", "As introduced in Section IV-A, H.264/AVC standard uses RDO technique to select the optimal mode from a set of candidate modes with block size ranging from 16 \u00d7 16 to 4 \u00d7 4.", "In cloud gaming, we have control over the rendering process (video content generation process), and we can use some rendering information to directly calculate the MVs with a set of calculations such as matrix multiplication, instead of using the compute intensive search-based approach specified in the H.264/AVC standard."]} +{"11087745|3540699": ["264/AVC video encoder [22]."]} +{"11926867|64404": [", the High Efficiency Video Coding [45]\u2013[47] in real conferencing systems [55], [56]."]} +{"14982111|3540699": ["264/AVC \u200e[22] include many features to achieve much better rate-distortion efficiency and subjective quality, but the high computational complexity is the penalty."]} diff --git a/edge/graph_1972930.jsonl b/edge/graph_1972930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19739314.jsonl b/edge/graph_19739314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_197423057.jsonl b/edge/graph_197423057.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73f204f37e62e281714b3e503a6645dc49fefa9a --- /dev/null +++ b/edge/graph_197423057.jsonl @@ -0,0 +1,37 @@ +{"20287007|7686677": []} +{"56895344|4502294": ["RRU is referred to here as \u201cRRH\u201d (as in a number of studies [26-28]) after it is separated from BBU."]} +{"56895344|29464310": []} +{"56895344|7892994": ["The LTE network uses single-carrier frequency-division multiple access (SCFDMA) uplink (UL), whilst orthogonal frequency-division multiple access (OFDM) is used in the downlink (DL) [35]."]} +{"67790163|10979806": ["The EE of virtualised network service can be evaluated by the EE of all related virtual network functions (VNF), which is defined as following equation [5, 6]: where U i is the useful output of VNF under service load level i .", "Chih-Lin et al. [5, 6] investigated several potential technologies like C-RAN, user centric radio cell, more efficient signalling and control plane design."]} +{"67790163|3504276": ["To alleviate the randomness of the RF energy source availability, it is feasible to deploy dedicated beacons in networks, which act as wireless energy sources [67]."]} +{"67790163|19938676": ["Furthermore, new 5G radio technologies such as M-MIMO and UDN have resulted in a fresh power consumption model of 5G small cell BS [75].", "For instance, dynamic cell operation, D2D, UDN, proactive cache and traffic offloading can be jointly optimised in context of wireless networks integrated with the smart grid system.", "Given the emerging 5G radio technologies like full duplex (FD), device-to-device (D2D) communication, massive multiple-input multiple-output(MIMO), mmWave backhaul and ultra-dense networks (UDN) [12], the radio interference environment of 5G will be much more complex.", "Given the emerging 5G radio technologies like full duplex (FD), device-to-device (D2D) communication, massive multipleinput multiple-output(MIMO), mmWave backhaul and ultra-dense networks (UDN) [12], the radio interference environment of 5G will be much more complex.", "Meanwhile, UDN is widely studied.", "5G networks will be enabled by many emerging radio technologies such as D2D, M-MIMO, multi-hop relay, UDN, and mmWave wireless backhaul.", "Inter-cell interference is especially critical to the EE of UDN due to high-frequency reuse factors.", "Therefore, CUPS and UDN based mechanisms might improve the EE of 5G further.", "Many techniques, such as intelligent power control, cooperative transmission, inference alignment should be considered for the EE of UDN."]} +{"67790163|14765802": ["Unfortunately, many previous works ignore the effect of traffic load factors, which cause that the actual gain is noticeably lower than claimed gain [18]."]} +{"15265867|9651858": ["cell interference, whilst the authors of [93] suggested partial spectrum reuse as an efficient technique to overcome the interference in the HetNet."]} +{"15265867|4502294": ["RRU has been called \u201cRRH\u201d as in a number of studies after it has been separated from BBU, such as in [29, 229, 230]."]} +{"15265867|10979806": ["\uf076 Network Densification: the dense deployment of many small cells is referred as \u201cNetwork densification\u201d [79] which is considered a promising technology to provide a high capacity to 5G networks [30] and deals with the explosively increasing number of devices [80] and the user traffic [81].", "These studies can be grouped into main four categories [80] listed as follows"]} +{"15265867|29464310": ["A number of parameters affect the data carried by AxC, [255]:"]} +{"15265867|15449163": ["\uf076 Other key features of 5G networks includes 100% coverage [52-55], 10 times lower power consumption than current systems [24, 56], up to 10 years battery life of devices [57-62], and 10x \u2013 100x number of connected devices [63-66].", "mobile data traffic [24] and this is considered to be a crucial driver towards a new generation of mobile wireless networks, which is 5G.", "3 5G Key Technologies: The revolutionary requirements of the envisaged 5G networks have inspired the researchers around the world to look for new methodologies, architectures, and technologies [24] as well as amalgamate different technologies to cope with the 5G requirements [67].", "1 is constructed based on scattered data and parameters in [24, 86, 89, 90]."]} +{"15265867|19938676": ["The authors of [25] and [26] presented some of the 5G requirements and the emerging technologies to ameliorate the 5G architecture."]} +{"15265867|2623404": ["4 illustrates the SDN architecture [96]."]} +{"15265867|6971827": ["These libraries are provided by the containers to delude the applications that they are running on their dedicated machines [180]."]} +{"15265867|7892994": ["LTE network uses single-carrier frequency-division multiple access (SC-FDMA) uplink (UL), whilst orthogonal frequency-division multiple access (OFDM) is used in downlink (DL) [247]."]} +{"61736931|17109970": ["In [120, 121, 32], the algorithms provided in [63, 148] are extended considering also transceiver design, whereas [118] and [119] consider competitive power control in MC systems and in presence of maximum communication delay constraints."]} +{"23252861|10979806": ["A recent survey on energy-efficient 5G networks is [15]."]} +{"19303577|3767252": ["The fog would facilitate the creation of a hierarchical infrastructure, where the analysis of local information is performed locally with the fog computing and networking devices, and the coordination and global analytics are performed at the cloud computing centers [12]."]} +{"19303577|31860478": ["[9] F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog Computing and its Role in the Internet of Things, Proceedings of the First Edition of the ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC 2012), Helsinki, Finland, 2012, pp. 13-16.", "Cloud and fog are inter-dependent because the coordination among devices in a Fog may rely on the Cloud [11].", "[2] T. H. Dihn, C. Lee, D. Niyato, and P. Wang, A Survey of Mobile Cloud\nComputing: Architecture, Applications, and Approaches, Wireless Communications and Mobile Computing, Wiley, Vol. 13, Issue 18, 2011, pp. 1587\u20131611.", "The cloud in 5G would appear in different forms: centralized cloud in 5G core, distributed cloud in 5G RAN (Cloud RAN and Fog RAN) and distributed peer-to-peer mobile cloud among the 5G smart end user devices.", "[3] S. Kitanov and T. Janevski, \u201cState of the Art: Mobile Cloud Computing,\u201d Proceedings of the Sixth IEEE International Conference on Computational Intelligence, Communication Systems and Networks 2014 (CICSYN 2014), Tetovo, Macedonia, 2014, pp. 153\u2013158.", "To solve these issues, a novel radio access network architecture FogRAN is proposed [11], [15].", "[19] H. Kavalionak and A. Montresor, \u201cP2P and Cloud: A Marriage of Convenience for Replica Management,\u201d Proceedings of the 6th IFIP TC 6 International Conference on Self-Organizing Systems, pp. 60\u201371, Delft, Netherlands, 2012.", "978-1-5090-3843-5/17/$31.00 \u00a92017 IEEE\nKeywords\u20145G; Cloud Computing; Fog Computing; Fog Networking; FogRAN; Mobile Cloud Computing\nI. INTRODUCTION The rapid deployment of broadband mobile and wireless networks and the increasing popularity of smart mobile devices, resulted more and more users to enjoy the benefits of broadband Internet services [1].", "The decision about the selection of the Local Cloud Resource Scheduler is done according to the connectivity to the local network, CPU performance battery life time, etc.", "In addition, 5G has much lower latency than 3G and 4G.\nV. CONCLUSION This paper evaluated the quality of Fog and Cloud Computing services in 5G mobile network in terms of energy efficiency.", "The distributed cloud in 5G RAN may appear in two forms: Cloud RAN (CRAN) and FogRAN.", "One of the devices is selected as Local Cloud Resource Scheduler, that performs management on the resource requests and allocates tasks to the devices in the local cloud or Fog Data Center if necessary."]} +{"31288750|8909218": ["As a result, femtocell base station (FBS) has gained wide attention in wireless industry [1], [2]."]} +{"20985481|26667032": []} +{"20985481|10979806": ["Data traffic volume in 5G networks is expected to increase Exabyte monthly [2, 5]."]} +{"17435952|7686677": []} +{"22577903|14765802": []} +{"22577903|16412228": []} +{"13719927|16412228": ["Although relatively new, several CSO schemes have been proposed to tackle the issues from different angles (see survey papers [7], [8] for details).", "This is sometimes referred to as offline or static CSO [7], [8].", "It is difficult for this vast amount of information to be exchanged by the network in a timely manner [7]."]} +{"13719927|7686677": ["This is because base stations (BSs) consume 50-80% of the total energy in a cellular network [3], [4]."]} +{"54224634|14765802": []} +{"52976142|10979806": []} +{"56598874|4502294": ["For this purpose, the 5G features that affecting backhaul should be identified and studied from a perspective of backhaul to illustrate the 5G backhaul research topic [13].", "[13] The research topics of 5G backhaul occur due to the huge challenges of 5G networks.", "The eNBs are directly connect to the service gateway (SGW) for user data transmission over the S1-u [13]."]} +{"56598874|10979806": ["[20]", "In order to cater the massive number of terminals, the networks should provide a large number of capacity to be 1000 times higher [20]."]} +{"38777028|19938676": ["Next generation architectures are expected to support various heterogeneous technologies and networks given in [113]."]} +{"38777028|3936425": []} +{"38777028|41035405": ["The Gaussian relay channel was introduced in [69] and [70]."]} +{"557626|2443013": ["Compared to 3G, LTE additionally provides international roaming and compatibility with other legacy networks [18], [19]."]} diff --git a/edge/graph_197430797.jsonl b/edge/graph_197430797.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc0ec882a2c942df8d54ea07d2241b2455d64022 --- /dev/null +++ b/edge/graph_197430797.jsonl @@ -0,0 +1,40 @@ +{"17020711|8921624": ["cuting it [33]."]} +{"1751457|2340740": ["Among these works, some [11, 16, 17, 20, 20] focus on detecting vulnerabilities combined with program analysis.", "For instance, Shar et al. [17] focus on SQL injection and cross-site scripting while Sahoo et al. [16] investigate malicious URL detection."]} +{"28122680|7972041": []} +{"29198319|4528002": ["Modern cars contain 30\u2013100 ECUs, which are embedded computers that communicate with each other, creating the in-vehicle network [10].", "The implementation of OBD systems has been mandatory in vehicles sold in the United States since 1996, in gasoline-powered vehicles in the European Union (EU) since 2001, and in diesel-powered vehicles in the EU since 2004 [10]."]} +{"14097538|15093118": ["In addition, given that cameras are less expensive than other sensors, vision-based vehicle detection for driver assistance has received considerable attention over the last decades [4]\u2013[7]."]} +{"65181069|7188493": []} +{"65181069|4528002": []} +{"65181069|62617427": []} +{"4479151|6414421": ["It is a challenging topic to establish secret keys without using energy intensive asymmetric key cryptography and pre-shared secrets, and the topic has been undertaken in two ways, namely, (a) extracting keys by taking advantage of the wireless channels\u2019 characteristics, such as the received signal strength (RSS) and channel impulse response (CIR) [6,7]; and (b) establishing keys using keyless cryptography [8]."]} +{"19178198|2481856": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"62792456|8909218": ["In contrast, femtocells typically have an order of magnitude larger cell radius [43].", "The results of the femtocell network are taken from [43], [45]\u2013[47]."]} +{"44061075|1896583": []} +{"3558507|16621677": ["on computer system [4], [5] and take advantage of the collaborative nature of the VANETs and design a system architecture of a distributed machine-learning based CIDS over a VANET."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"63175932|15093118": []} +{"115441594|9928823": []} +{"115441594|15093118": []} +{"115441594|1708582": []} +{"4480644|365692": ["Decision tree is a non-parametric supervised learning model popularly used for classification and regression [41]."]} +{"42106409|15252929": []} +{"42106409|206584087": ["This would lead to a serious security threat no matter how it takes place [21, 26].", "Message modification can also bring about false reaction of traffic emergencies [26]."]} +{"11010663|4528002": ["14 counter 8 start value=151 const 3 constant value=4 const 12 constant value=1717 mv 7 set of values=[51,113,90,37,20,22,53,115,35,32,18,93,40,78,59,88,38,78,86,84] sensor 14 wave length=30, DC=9000, amplitude=1047, phase=3."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"27060711|10693567": []} +{"69657049|13115032": []} +{"69657049|84832337": []} +{"69657049|12538766": []} +{"36051782|207244886": ["We use the widely used metrics false positive rate ( FPR ), false negative rate ( FNR ), true positive rate or recall ( TPR ), precision ( P ), and F 1 - measure ( F 1 ) to evaluate vulnerability detection systems [39]."]} +{"801564|7257659": ["These timescales have been proposed by prior researchers [2], [3], [4] in driver modeling."]} +{"49326208|17279511": []} +{"16999600|17205659": ["[11] overview routing protocols according to the network\u2019s structure and also discuss, to some extend, the broadcast authentication problem and provide a short reference to a few secure routing schemes [23,25,26].", "The main approach in the literature towards the routing threat model is focused in specifying the adversary\u2019s capabilities according to the resources he has in his possession and whether he is an insider or outsider threat [11,16,31]."]} +{"16999600|205286988": []} +{"16999600|1236072": ["In [9,10], the authors have performed a review of the design issues that affect the routing process in WSN and an extensive survey of WSN routing protocols; their classification is based on the network\u2019s structure and the protocols\u2019 operation."]} +{"16999600|1230643": ["[17,19] have provided a broad survey of WSN-related issues, focusing on an analysis of the protocols developed for each layer of the WSN\u2019s protocol stack."]} diff --git a/edge/graph_197430935.jsonl b/edge/graph_197430935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a97c18e298f719cc4efd533ce06d8d556c7c2f4 --- /dev/null +++ b/edge/graph_197430935.jsonl @@ -0,0 +1,10 @@ +{"206771654|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} +{"67856367|1708582": ["The interplay of environment, network and memory is a convoluted process where convergence is not guaranteed [116]."]} +{"44138526|2088679": ["Recently, convolutional neural network (CNN) has become one of the most powerful tools for analyzing 3D imaging data in biomedical research, especially for tasks like classification, object detection and segmentation [4]."]} +{"206592484|456491": []} +{"152282619|3342225": [" they are not necessarily targeted to provide explanations for the target 10 What CliniciansWant: ContextualizingExplainableML for Clinical EndUse user but focus on improving model understanding. See Guidotti et al. (2018) for an extensive survey of existing methods for explainable ML in general. In clinical ML, visualization systems have been evaluated for e\ufb03cacy of interaction between EHR systems and healthcare pract", "The ML community has largely resorted to developing novel techniques for model explanations (Guidotti et al., 2018) that are often insightful only to the algorithmic experts (Miller, 2018).", "st and adoption. Unfortunately, as it stands right now this is a rather ill-de\ufb01ned problem (Lipton, 2016). The ML community has largely resorted to developing novel techniques for model explanations (Guidotti et al., 2018) that are often insightful only to the algorithmic experts (Miller, 2018). Existing work su\ufb00ers from signi\ufb01cant criticism due to the lack of objective de\ufb01nitions of what would validate a model in term", "While a multitute of novel explanability methods have been proposed in the literature (Guidotti et al., 2018), they may not be directly applicable or have to be significantly tailored to clinical settings in the context of asks outlined in Section 3.1.", "See Guidotti et al. (2018) for an extensive survey of existing methods for explainable ML in general.", "e (Adebayo et al., 2018; Jain and Wallace, 2019) outside of clinical ML. 3.4. What is Missing in Explainable ML? While a multitute of novel explanability methods have been proposed in the literature (Guidotti et al., 2018), they may not be directly applicable or have to be signi\ufb01cantly tailored to clinical settings in the context of asks outlined in Section 3.1. In the following, we focus on identifying a collection of"]} +{"67954510|42056992": ["In the literature, most of medical CBR systems were aimed at helping clinicians to diagnose a given disorder, or a small number of close disorders [3], and these systems were limited to quantitative aspects [26,27].", "CBR has been applied to many domains, including medicine [3]."]} +{"53013032|192934": []} +{"19709734|12191695": ["The Markov Decision Process (MDP) provides a mathematical tool to model the dynamic system [3,4,17].", "It is de\ufb01ned as follows [4]: The goal of various RL methods is to learn an optimal policy \u03c0 \u2217 that maximizes the Q-value for all the state-action pairs [3].", "In this setting, the critic updating, with an aim of seeking for solutions to satisfy the Linear Bellman equation [4,3], is where w = f ( w ) is a \ufb01xed point problem; x i = x ( s i , a i ) is the value feature at time point i ; is the feature at the next time point; \u03b6 c is a tuning parameter."]} +{"19709734|1185580": ["It is in an actor-critic setting [4].", "The Markov Decision Process (MDP) provides a mathematical tool to model the dynamic system [3,4,17].", "It is de\ufb01ned as follows [4]: The goal of various RL methods is to learn an optimal policy \u03c0 \u2217 that maximizes the Q-value for all the state-action pairs [3].", "Such procedure is called the actor updating [4].", "In this setting, the critic updating, with an aim of seeking for solutions to satisfy the Linear Bellman equation [4,3], is where w = f ( w ) is a \ufb01xed point problem; x i = x ( s i , a i ) is the value feature at time point i ; is the feature at the next time point; \u03b6 c is a tuning parameter."]} diff --git a/edge/graph_197430976.jsonl b/edge/graph_197430976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_197447031.jsonl b/edge/graph_197447031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aac6eb87f324aeb23ce1f50d7ab0fcb4dc4d054f --- /dev/null +++ b/edge/graph_197447031.jsonl @@ -0,0 +1,10 @@ +{"37309305|13475127": ["Monitoring water quality using WSN has been a point of interest as discussed in [3][4]."]} +{"3284474|562065": []} +{"3284474|15300368": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"11429615|12817488": ["So care must be taken during data collection and transmission [22,23,24,25]."]} +{"11429615|1230643": ["Promising applications of WSN include wide area monitoring for personnel/ vehicles, secure area intrusion monitoring and denial, environmental monitoring, animal habitats, migration, forest fires, natural disasters, subsea monitoring, building monitoring, vehicle traffic monitoring and control, remote site power substation monitoring, patient monitoring, smart home and inventory management and many other real life applications [3,4] for sensor deployments."]} +{"17510314|1503157": ["the installation of nodes that can adequately represent the variability present in the environment [11].", "WSN are in intimate connection with the immediate physical environment allowing each sensor to provide detailed information on environment of material that is otherwise difficult to obtain by means of traditional wired instrumentation [11]."]} diff --git a/edge/graph_19751007.jsonl b/edge/graph_19751007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_1975139.jsonl b/edge/graph_1975139.jsonl similarity index 100% rename from graph_1975139.jsonl rename to edge/graph_1975139.jsonl diff --git a/edge/graph_19752458.jsonl b/edge/graph_19752458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_197544895.jsonl b/edge/graph_197544895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..078d4c4753dbda9dafe5dac2969343342cde8b77 --- /dev/null +++ b/edge/graph_197544895.jsonl @@ -0,0 +1,9 @@ +{"8009878|10500613": []} +{"17072597|8155077": []} +{"8155077|17981371": ["For more details on the computational complexity of various Fd and Ind discovery algorithms, we refer the interested reader to [94]."]} +{"8155077|191396": ["We refer the reader to surveys by Jain et al. [78] and Xu and Wunsch II [137] for more details on clustering algorithms for relational data."]} +{"8155077|3102110": ["Classi\ufb01cations of data mining tasks include an overview by Chen et al., who distinguish the kinds of databases (relational, OO, temporal, etc.), the kinds of knowledge to be mined (association rules, clustering, deviation analysis, etc.), and the kinds of techniques to be used [130]."]} +{"4570941|8155077": ["[29] pointed out"]} +{"4570941|386036": ["From this field, there are many models, both probabilistic and possibilistic, that can be used to quantify the uncertainty about the assertion that two pieces of data are describing the same real-world entity or fact [42], [43]."]} +{"5316537|8125630": []} +{"7041308|10500613": ["Schema matching research [Rahm and Bernstein 2001; Doan and Halevy 2005] develops techniques to automatically or semi-automatically match data schemas."]} diff --git a/edge/graph_197545095.jsonl b/edge/graph_197545095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a27d1e7c883af04c46a20b6559b7798195f60d3 --- /dev/null +++ b/edge/graph_197545095.jsonl @@ -0,0 +1 @@ +{"53215001|197545095": ["This can also explain the relative unsuccess of learning-based techniques in this field [52].", "A recent thorough review [52] found that our method outperforms deep-learning methods and therefore we excluded comparison to them."]} diff --git a/edge/graph_197545259.jsonl b/edge/graph_197545259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3cf348e101f84e12fc080fb493bfdf0862c44034 --- /dev/null +++ b/edge/graph_197545259.jsonl @@ -0,0 +1,11 @@ +{"36997628|7842253": []} +{"57755899|17474643": ["Assis and Bittencourt [2], Grozev and Buyya [4], Toosi et al. [1] provide an excellent survey on various cloud federation models and architectures.", "So multiple cloud providers have to come together and form a temporary coalition or a federation to serve such requests [1]\u2013[4].", "Assis and Bittencourt [2], Grozev and Buyya [4], Toosi et al.", "In this section, we introduce the existing taxonomy of InterCloud architectures and brokering mechanisms [4]; and show how the proposed Multi-Cloud marketplace structure extends that taxonomy."]} +{"159043412|3300488": []} +{"159043412|15209496": []} +{"36482639|8530790": ["nament selection make scaling information negligible (Fonseca and Fleming, 1994; Fonseca and Fleming, 1995d)."]} +{"28800568|21930333": ["For example, an edge cloud data center in MEC only serves the users in its coverage area [54]."]} +{"5791328|15209496": ["Several possible formulations can be proposed for modeling each objective function, totalizing at least 80 different objective function formulations identified in the specialized literature [20, 21]."]} +{"16360674|816774": []} +{"28448424|33492114": ["This section summarizes some of the previous efforts on surveying VM placement and migration which have been found in the literature, namely [62, 73, 74, 12, 75, 8, 76, 77, 78, 79].", "Usmani and Singh (2016) [76] X XX X X X X X X X X"]} +{"28448424|207228303": ["This section summarizes some of the previous efforts on surveying VM placement and migration which have been found in the literature, namely [62, 73, 74, 12, 75, 8, 76, 77, 78, 79].", "The survey in [74] states that most of the works only deals with two PM states, namely on and sleep, instead of taking advantage of the additional states off and hibernated.", "\u2026u lin g / V M m igration ord er\n(shu ffl e)\nAhmad et al. (2015) [62] X X X X X X X X X XX X Masdari et al. (2016) [73] X X XX X X X XX X XXX XX XX Mann (2015) [74] XX XX X X XX X X XXX XX XX Leelipushpam and Sharmila (2013) [12] X X X X X X X Acharya et al. (2013) [75] X X X X X X X X XX X\u2026", "Mann (2015) [74] XX XX X X XX X X XXX XX XX Leelipushpam and Sharmila (2013) [12] X X X X X X X"]} +{"34251444|207228303": ["VM reassignment has been studied for different types of data centres in the literature [30]."]} diff --git a/edge/graph_197621053.jsonl b/edge/graph_197621053.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_197645932.jsonl b/edge/graph_197645932.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97a3fd278308fff5e37e19f3d6ffa5558029b675 --- /dev/null +++ b/edge/graph_197645932.jsonl @@ -0,0 +1,26 @@ +{"57755069|207209718": ["These potential hazards make the task of ICS network security monitoring and intrusion detection particularly important [1]."]} +{"638368|5473785": ["Although some of these algorithms can give good results on some benchmark data sets, there are still several problems such as node ordering requirement, lack of efficiency and lack of publicly available learning tools (Neapolitan, 1990)."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"12390276|6430931": ["Given the variety of these problems, each researcher (and solution) is only able to address some of these issues [9]."]} +{"35431421|2992477": []} +{"35431421|5246835": []} +{"27689479|3767252": ["IoT offloading has to address the attacks launched from the PHY- or MAC- layer attacks, such as jamming, rogue edge devices, rogue IoT devices, eavesdropping, man-in-the-middle attacks, and smart attacks [29]."]} +{"8407788|6430931": ["In particular, Swarm Intelligence techniques [66], Markov Chain [67] based ones as well as other soft computing methods [68] seem to possess desirable characteristics in"]} +{"29818682|2142482": ["message [21] [20].", "Misuse Detection is very successful to detect known attacks but it\u2019s drawback is straining for new unknown attacks [21] ."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"3317262|4528002": ["More information can for example be found in [11], [12] or [13]."]} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"53297457|206584087": ["Two such groups are volumetric and protocol-based DDoS/DoS attacks[56].", "\u2022 Denial of Service [26][20][3][56]- are malicious activities that attempt to disrupt a service, thus making it unavailable to legitimate users."]} +{"53297457|13172512": ["\u2022 Network Flow Analysis and Deep Packet Inspection - can be categorized in two broad groups: (i) Deep Packet Inspection and (ii) Network Flow Analysis [20, 21, 4]."]} +{"9446238|12894036": ["The choice of representation can have a significant impact on learning algorithms [6]."]} diff --git a/edge/graph_197674923.jsonl b/edge/graph_197674923.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b172f4cff7411cd5594e0cfe8a8abe3caf5f747 --- /dev/null +++ b/edge/graph_197674923.jsonl @@ -0,0 +1,2 @@ +{"28426581|18567112": []} +{"28426581|6670217": ["For instance last year, Kaspersky Labs estimated that 2,961,727 malwares were published on the Google official application market [1], [2]."]} diff --git a/edge/graph_197676458.jsonl b/edge/graph_197676458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e5774b8ed420a91b35ecd381e0b68ac174df1c7 --- /dev/null +++ b/edge/graph_197676458.jsonl @@ -0,0 +1,6 @@ +{"1390263|6280485": []} +{"4950|175549": ["use of probabilistic search algorithms inspired by certain points in the Darwinian theory of evolution [11]."]} +{"2945279|41104189": []} +{"2945279|192934": ["Principal component analysis (PCA) is defined as a classical dimension reduction method for feature extraction and data representation technique widely used in the areas of pattern recognition, computer vision, and signal processing [28]."]} +{"73309365|6280485": []} +{"16982593|987239": ["For these purposes, several methods are proposed [28]."]} diff --git a/edge/graph_19770468.jsonl b/edge/graph_19770468.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e9546cf00ec70076d67b0588fe883c2a9b4a0c5 --- /dev/null +++ b/edge/graph_19770468.jsonl @@ -0,0 +1,7 @@ +{"12392038|386036": ["\u2022 Duplicate record detection in databases [25].", "The most basic syntactic metrics are character sequence distances, like the Edit Distance, the Jaro Distance and many others [25], typically applied in the duplicate record problem."]} +{"17039960|7842253": ["The initial schedule can be obtained by different methods, such as randomly selecting a resource for each task, and is further optimized based on the scheduling criteria [46 \u2013 47]."]} +{"17039960|9190423": ["A detailed survey of the current areas of LCA application is presented by Abdulhamid et al. [15]."]} +{"9190423|1965419": []} +{"9190423|14295689": []} +{"14691036|206583375": ["Activity Recognition [11] and Indoor Positioning System (IPS) [12] benefit from mobile phone\u2019s capabilities, such as GPS, Wi-Fi signal, accelerometer, microphone, and camera to obtain environment data."]} +{"13965484|17157304": ["Another widely accepted definition states that \u201cInternet spam is one or more unsolicited messages, sent or posted as part of a larger collection of messages, all having substantially identical content\u201d[13, 14, 15]."]} diff --git a/edge/graph_19788427.jsonl b/edge/graph_19788427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9eeff5553150d2df1d18eb5a4ec930b2810531fd --- /dev/null +++ b/edge/graph_19788427.jsonl @@ -0,0 +1,4 @@ +{"15772363|582949": []} +{"58820603|1457933": []} +{"58820603|14397836": []} +{"10043111|3540699": ["264 describes the lossy compression of a video stream [25] and is also part of ISO/IEC MPEG-4."]} diff --git a/edge/graph_19788835.jsonl b/edge/graph_19788835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19792818.jsonl b/edge/graph_19792818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_197935135.jsonl b/edge/graph_197935135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..102256ab4cadbfedca26b8d030c32fa23df8c8cb --- /dev/null +++ b/edge/graph_197935135.jsonl @@ -0,0 +1,2 @@ +{"4607784|2670373": ["Optical packet switching (OPS), optical burst switching (OBS), and optical flow switching (OFS) are proposed as the main representatives of OTDM [2]\u2013[4]."]} +{"5436641|1580493": ["A scalable modulation technology to sustain channel capacity growth without sacrificing spectral efficiency\nAll rights reserved.\nresented at the IEEE\n.\nis Optical Orthogonal Frequency Division Multiplexing (OOFDM) [6].", "By grouping a programmable number of orthogonal sub-carriers, OOFDM uses variable bandwidths to form the next high-speed optical signals.", "is Optical Orthogonal Frequency Division Multiplexing (OOFDM) [6]."]} diff --git a/edge/graph_197935335.jsonl b/edge/graph_197935335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e60b44fcf1d31b44a750636554fdc916e73535de --- /dev/null +++ b/edge/graph_197935335.jsonl @@ -0,0 +1,107 @@ +{"52295432|206578486": []} +{"52295432|6988770": ["Cloud Robotics refer to any robot or automation system that relies on either data or code from a network to support its operation [13].", "While Cloud Robotics often include some capacity for local/edge processing for low-latency, real-time responses [13], how to design a reliable cloud-edge hybrid, dynamic feedback controller is still an interesting open problem."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"66918371|3913780": []} +{"20634644|206578365": ["With limited computation, energy and memory resources, Internet of Things (IoT) devices such as sensors, cameras and wearable devices have a computation bottleneck to limit the support for advanced applications such as interactive online gaming and facial recognition applications [1], [2]."]} +{"20634644|3055684": ["r the computation intensive IoT applications [2]. Energy harvesting (EH) is another promising technique to prolong the battery lifetime and provide satisfactory quality of experiences for IoT devices [3]. Equipped with EH modules, an IoT device can capture the ambient renewable energy, such as the solar radiation, wind and human motion, and other resources, such as the ambient radio-frequency (RF) si"]} +{"20634644|12029139": ["Simulations are performed for IoT devices with wireless power transfer to capture the ambient RF signals from a dedicated RF energy transmitter to charge the IoT battery [21], [22]."]} +{"20634644|12060835": ["Energy harvesting (EH) is another promising technique that prolongs battery lifetime and provides a satisfactory quality of experiences for IoT devices [6]\u2013[9]."]} +{"52903553|17516538": ["It enables a broad spectrum of promising applications, including access control in areas of interest, human identity or behavior recognition, detection of anomalous behaviors, interactive surveillance using multiple cameras and crowd \ufb02ux statistics and congestion analysis and so on [26]."]} +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"3586416|20905429": ["Examples of potential applications include: learning sentiment, semantic location, or activities of mobile phone users; predicting health events like low blood sugar or heart attack risk from wearable devices; or detecting burglaries within smart homes [3, 37, 40]."]} +{"206592484|456491": []} +{"51929336|206578365": ["In particular, the WDs follow a binary task offloading policy [6], which is a commonly used offloading model for non-partitionable simple sensing tasks in IoT networks."]} +{"1033682|174797842": []} +{"81977141|20905429": ["In response, there is a trend towards moving computation, including the training of machine-learning models, from cloud/datacenters to edge devices (Anguita et al., 2013; Pantelopoulos & Bourbakis, 2010)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"54559476|57189241": ["[12] briefly surveyed adversarial attacks on graphs."]} +{"54559476|56517517": ["Concurrent to our work, Zhou et al. [13] and Wu et al. [14] surveyed this \ufb01eld from different viewpoints and categorizations."]} +{"54559476|207023804": []} +{"54559476|3951790": ["Another closely related topic is network embedding, trying to embed nodes into a low-dimensional vector space [11]\u2013[13]."]} +{"24604419|206578365": ["Being closer to customers than cloud, mobile edge computing can support the Internet of Things (IoT), cyber-physical systems, vehicular networks, smart grids and embedded AI with lower latency, location awareness and mobility support [1]."]} +{"24604419|3767252": ["Man-in-the-middle attacks: A man-in-the-middle attacker sends jamming and spoofing signals to fake an edge node [5] with the goal of hijacking the private communication of the victim edge nodes or mobile devices and even control them.", "Therefore, MEC systems are more vulnerable to security threats such as wireless jamming, distributed denial of service (DoS) attacks, spoofing attacks including rogue edge and rogue mobile devices, man-in-the-middle attacks, and smart attacks [5]."]} +{"34702660|6779551": ["Furthermore, different applications usually require different encryption methods [42]."]} +{"52912946|3680335": ["We chose ReLU over other activation functions, because it mitigates the vanishing gradient problem experienced by MLP during the training process [29]."]} +{"54457410|52169284": ["A remotely controlled drone or a robotic assembler in a smart factory should always be operational even when the network connection is temporarily unavailable [16]\u2013[18], by sensing and reacting rapidly to the local (and possibly hazardous) environments."]} +{"52015330|206578486": ["[8] \u2713 Paper Q oS Co st En er gy Ba nd w id th", "The authors in [8] present a comprehensive review of current literature in fog computing with a focus on architectures and algorithms in fog systems."]} +{"52015330|206578224": ["The survey in [14] introduces a survey on MEC and focuses on the fundamental key enabling technologies in MEC.", "MEC allows edge computing to be accessible to a wide range of mobile devices with reduced latency and more efficient mobile core networks [14]."]} +{"52015330|12675271": ["The recent survey in [11] focuses on connectivity and device configuration aspects of the fog computing and identifies major features that fog computing platforms need to build infrastructure for smart city applications."]} +{"52015330|206578365": ["Similarly, the survey in [15] provides a survey of the recent state of MEC research with a focus on joint radio and computation resource management."]} +{"52015330|8523192": ["Foundations Surveys [8, 9, 13, 43, 67, 71, 78\u201386, 97\u2013105]"]} +{"52015330|16654832": ["Mobile applications can be partitioned at runtime so that computationally intensive components of the application can be handled through adaptive offloading [34]."]} +{"49183164|6909107": ["Therefore, the computation offloading and computational resource allocation themes have attracted great interests as a key point in the MEC system [3]."]} +{"52078455|3645740": ["The paper [12] surveys algorithms and applications of ML in 4G self-organizing networks."]} +{"52078455|206578365": [" role of the MEC has also been discussed in the context of 5G networks, e.g., to perform coordination [26] and caching [27], and to offer low-latency content and control applications to the end users [5], [3], [28]. The MEC is indeed considered a key element in the deployment of future autonomous driving vehicles, for which very short control loops will be needed [29]. A few papers consider speci\ufb01c c", "ntroduce new challenges related to mobility management [4]. Second, with the Mobile Edge Cloud (MEC), the content will be brought closer to the \ufb01nal users, in order to decrease the end-to-end latency [5]. Third, a higher level of automation will be introduced in cellular networks, relying on ML techniques and Software De\ufb01ned Networking (SDN), in order to manage the increased complexity of 5G networks"]} +{"52078455|12187684": ["The surveys in [10], [11] present some recent results on how it is possible to apply regression techniques to mobile and cellular scenarios in order to optimize the network performance.", "Application of ML in cellular networks [10], [11], [12], [13], [14], [15], [16] Novel network-level architecture, integrated with 3GPP 5G specifications, and evaluation of its performance gains based on real network dataset."]} +{"52078455|2003896": ["importance of ML and Arti\ufb01cial Intelligence (AI) 4 throughout all facets of the industry. The paper [12] surveys algorithms and applications of ML in 4G self-organizing networks. The surveys in [13], [14], as well, present some recent results on how it is possible to apply regression techniques to mobile and cellular scenarios in order to optimize the network performance. The paper [15] gives an overv"]} +{"52078455|7851743": ["ely). Indeed, several approaches have been proposed in the literature to cluster, for example, remote radio heads and Base Band Units (BBUs) into BBU pools, according to different targets [54], [55], [56]. However, none of these focuses on the minimization of the control plane latency, but rather on data-plane issues, such as the minimization of interference or coordinated multipoint transmissions. Th"]} +{"53776110|11381530": ["it is an ideal choice to use DL approaches to detect network intrusions by learning traffic features [105]."]} +{"21728234|6909107": ["In contrast to cloud/fog computing [3], [4], mobile-edge computing (MEC) is envisioned as a promising paradigm, which provides computing capabilities within the radio access networks (RANs) in close proximity to mobile users (MUs) [5], [6]."]} +{"21728234|206578365": ["In contrast to cloud/fog computing [3], [4], mobile-edge computing (MEC) is envisioned as a promising paradigm, which provides computing capabilities within the radio access networks (RANs) in close proximity to mobile users (MUs) [5], [6]."]} +{"10814272|3767252": []} +{"86504718|6909107": ["is a critical issue in edge computing [5], [12].", "To reduce service delay, a popular way is to deploy multiple parallel computing virtual machines (VMs) to enhance the computation capacity of the Cloudlet server [5].", "Besides, although there is an extensive study on energy-delay optimization in edge computing, all of them focus on energy-delay tradeoff in user terminals and devices, but not the Cloudlet server [5].", "AI applications, such as health management, image classification, computer vision, and language processing, have been widely used in mobile UEs, wearable glasses, and IoT devices by exploiting edge computing techniques [5], [6]."]} +{"4722469|9104850": ["Web caching is an established technique of reducing userperceived latency experienced when retrieving information from across the World Wide Web [38].", "It has already been established that document retrieval systems over the Internet, i.e. the World Wide Web (WWW), can reap extensive benefits with caches at the edge [15]."]} +{"51921962|6909107": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [4], [5], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"51921962|206578365": ["However, it is challenging to perform distributed machine learning on resource-constrained MEC systems.", "In contrast to the above research, our work in this paper formally addresses the problem of dynamically determining the global aggregation frequency to optimize the learning with a given resource budget for federated learning in MEC systems.", "With the increasing amount of data being generated by new applications and with more applications becoming data-driven, one can foresee that machine learning tasks will become a dominant workload in distributed MEC systems in the future.", "Existing work on MEC focuses on generic applications, where solutions have been proposed for application of\ufb02oad-ing [10], [11], workload scheduling [12], [13], and service migration triggered by user mobility [14], [15].", "Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [4], [5], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability.", "In addition, the approach in [24] is designed empirically and does not consider a concrete theoretical objective, nor does it consider computation resource constraint which is important in MEC systems in addition to constrained communication resource."]} +{"49418885|1932843": []} +{"49418885|393948": ["For this reason, the deep learning approach can be considered as a kind of representation learning algorithms [3].", "This key aspect of deep learning architectures is led to progress towards those algorithms that are the goal Artificial Intelligence (AI), understating the world around independent of expert knowledge and interference [3]."]} +{"49418885|1708582": ["Reinforcement Learning [17, 39] is a branch of machine learning in which an agent learns from interacting with an environment.", "Reinforcement Learning (RL) [17, 39] is a branch of machine learning in which an agent learns from interacting with an environment."]} +{"16217657|14889616": ["Given the popularity of mobile streaming, demand for high bandwidth in wireless mobile network continues to grow."]} +{"57721149|6909107": ["Furthermore, even though edge computing nodes have more computing resources than local devices, computation bottlenecks can still occur when dealing with large numbers of concurrent computing tasks or very complex computing [14]."]} +{"57763575|51877788": ["Furthermore, these methods can explore the data and learn the abnormal behavior based on the IoT traf\ufb01c and devices [15]."]} +{"57763575|9461213": ["Thus, DL can be considered as the most promising approach to solve the huge data processing and analysis in IoT [8]."]} +{"57763575|31245252": ["Meanwhile, Internet of Things (IoT) [3] still faces many challenges, from the connectivity level due to the large number of heterogeneous devices and services with high mobility and the existence of many middlewares [4]."]} +{"5049901|3119314": ["Recently, Osanaiye et al. (2017) discussed the security and privacy issue of fog computing in a virtualized environment."]} +{"5049901|3757239": ["Recently, Wang et al. (2017) proposed a graph-partition-based functional cell distribution scheme between the sensor node and data aggregator.", "Wang et al. (2017) gave a detailed survey on mobile edge computing, with an emphasis on wireless communication and edge networking."]} +{"5049901|8523192": ["Mahmud and Buyya (2016) proposed a taxonomy of fog computing and gave a broad review on component types, general metrics, and design objectives."]} +{"5049901|10979806": []} +{"5049901|3767252": []} +{"5049901|193574": ["There have been prior surveys that summarize the architecture design and resource management of distributed systems (Orgerie et al. 2014) and mobile systems (Bellavista 2012)."]} +{"5049901|14697846": []} +{"52896323|4570697": []} +{"18453286|10299098": ["To our best knowledge, the conference version of this paper [23] was the first to study resource management for energy harvesting MEC servers (see related discussions in a recent comprehensive survey paper [12]).", "substantially less energy than the conventional cloud megascale data center [12].", "offload a user\u2019s workload from its device to the edge system or cloud (see [12] and references therein)."]} +{"18453286|206578365": []} +{"18453286|3055684": ["and/or solar radiation is embraced as a major or even sole power supply for edge systems in the field, thanks to the recent advancements of energy harvesting techniques [8], [9].", "energy, such as solar radiation and wind energy, has recently emerged as a viable and promising power source for various IT systems thanks to the recent advancement of energy harvesting techniques [8], [9]."]} +{"18453286|12060835": ["and/or solar radiation is embraced as a major or even sole power supply for edge systems in the field, thanks to the recent advancements of energy harvesting techniques [8], [9].", "energy, such as solar radiation and wind energy, has recently emerged as a viable and promising power source for various IT systems thanks to the recent advancement of energy harvesting techniques [8], [9]."]} +{"206779368|10355303": ["5In practical object tracking systems, this synchronization step is typically automated [19]."]} +{"52986158|3818445": []} +{"3413458|11608263": ["Multi-label linear classifier (a \u201cshallow\u201d learning)based offloading scheme [18] by removing all the hidden layers of our deep model.", "We formulate the fine-grained offloading problem as a multi-label classification [18] framework."]} +{"53231681|3450996": ["For instance, the surveys in [1]\u2013[3] discussed the potentials of deploying the technique of content caching in mobile networks."]} +{"54442051|4884302": ["By combining RL deep learning, deep reinforcement learning DRL) enables agents to optimize their control in environment by automatically learning knowledge directly from raw, high-dimensional observations [3]."]} +{"8369206|6909107": [", N} with moderate processing capability; thus, part of workloads will be collaboratively processed by the local fog servers to meet the stringent latency requirement, and the rest will be offloaded to the remote data center in the cloud layer [6] (see Fig.", "The online computational offloading task of fog computing in IoT [5], [6], [8] takes the form of BCO with long-term constraints (1).", "From the management perspective, online network control, which is robust to nonstationary dynamics and amenable to low-complexity implementations, remains a largely uncharted territory [6], [8]."]} +{"8369206|10299098": ["From the management perspective, online network control, which is robust to non-stationary dynamics and amenable to light-weight implementations, remains a largely uncharted territory [5], [7].", "Existing approaches for computation of\ufb02oading either focus on time-invariant static settings, or, rely on stochastic optimization approaches such as Lyapunov optimization to deal with time-varying cases; see [7] and references therein.", "The online computational of\ufb02oading task of fog computing in IoT [4], [5], [7] takes the form of BCO with long-term constraints (1)."]} +{"8369206|206578365": ["The online computational offloading task of fog computing in IoT [5], [6], [8] takes the form of BCO with long-term constraints (1).", "From the management perspective, online network control, which is robust to nonstationary dynamics and amenable to low-complexity implementations, remains a largely uncharted territory [6], [8].", "Existing approaches for computation offloading either focus on timeinvariant static settings, or, rely on stochastic optimization approaches such as Lyapunov optimization to deal with timevarying cases (see [8] and references therein)."]} +{"165163986|3273340": ["Interested readers are encouraged to refer to the recent monograph [114] for more comprehensive discussions about recent advancements on hardware acceleration for DNN processing."]} +{"165163986|206578365": ["Essentially, the physical proximity between the computing and information-generation sources promises several benefits compared to the traditional cloud-based computing paradigm, including low latency, energy efficiency, privacy protection, reduced bandwidth consumption, on-premises, and context awareness [6], [8]."]} +{"56738417|21386749": ["Healthcare IoT devices with EH have to resist eavesdroppers that analyze the sensing data via radio channels to reveal the user location and habits, such as the usage pattern privacy [1], [10], [11]."]} +{"56738417|3055684": ["EH is a promising technique to prolong the battery lifetime and provide satisfactory experience of IoT devices [2].", "the body motion to extend the battery life [2]."]} +{"38308345|17787193": []} +{"70032223|3913780": ["to the total times of requests from UEs, and it follows the Zipf distribution [33]."]} +{"70032223|393948": ["for feature learning or representation learning [27]."]} +{"206578486|206578224": ["Reference [45] provides a survey of MEC."]} +{"206578486|6909107": [" data centers, using technologies such as OpenStack and ONOS [34]. Let us also stress that a few surveys that discuss mobile edge computing at large have been published in the very recent past (e.g., [35]). A. Cyber Foraging Cyber foraging is among the first concepts for edge computing but has now been superseded by more recent concepts such a cloudlet, MEC, and fog. We discuss it here because of its "]} +{"206578486|26429034": ["Such a characterization can be achieved through the analysis of corresponding real-world traces, through machine learning techniques [151], [158]."]} +{"206578486|7329149": ["For instance, Industrial IoT solutions [159] usually require low-latency ingestion but immediate processing of data [160]."]} +{"4883014|6909107": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [3], [4], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"4883014|10299098": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [3], [4], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"56176862|4884302": ["In order to improve the model with adequate exploration of the state space, one major challenge in RL is the tradeoff between exploration and exploitation [42], which is even more dif\ufb01cult for learning in continuous action spaces."]} +{"56176862|6909107": []} +{"56176862|206578365": []} +{"57189509|206578365": ["This metric accommodates the effect of the variability of wireless channels on performance into the handover scheme which can be a major problem for latency driven tasks [18]."]} +{"62841650|3042864": ["This increases the bandwidth overburden and response time [11]\u2013[13], as raw data transferring", "normal crowd-intelligence ecosystem, trust problem may result in excess bandwidth and delayed response [11]\u2013[13]."]} +{"58004591|206578365": ["Since the path-loss exponent \u03b1 \u2208 [3, 4] in practice, the requirement of K > \u03b12 for the above result can be easily satisfied by having the number of edge devices K > 2."]} diff --git a/edge/graph_19800622.jsonl b/edge/graph_19800622.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d42697485062b1593146e3d2429396693f18e89 --- /dev/null +++ b/edge/graph_19800622.jsonl @@ -0,0 +1,8 @@ +{"15252370|14889616": []} +{"13056475|10559330": []} +{"876377|3540699": ["tive variable length coding/binary arithmetic coding) [16], it is"]} +{"16642007|14889616": ["264/AVC Scalable Video Coding (SVC) [2] is a video coding format that allows for a wide range of adaptation strategies in order to meet the constraints and capabilities of a particular usage environment [3]."]} +{"15610106|14889616": ["Consequently, using a combination of the aforementioned adaptation possibilities, it is possible to create video bit streams that offer a diverse set of spatial resolutions, frame rates, and perceptual quality levels for a given target bit rate, without requiring complicated transcoding operations [7], [8]."]} +{"15610106|15170341": ["In [19], a comparison can be found of different quality metrics, as well as a system that classifies quality metrics according to their objective or subjective nature."]} +{"15610106|1099309": []} +{"11673661|14889616": ["Scalable Video Coding Extension of H.264/AVC Standard (H.264/SVC)[ 1 ] supports flexible bitstream scaling by using multiple dimension scalable modes, such as temporal, spatial, and quality scalability, thus, providing a number of benefits to heterogeneous delivery applications.", "These scalabilities of H.264/SVC can be ascribed to a lot of employed advance techniques, such as inter-layer prediction, hierarchical B frames, coarse-grain scalability (CGS) or medium-grain scalability (MGS), and so on [ 1 ]."]} diff --git a/edge/graph_198008967.jsonl b/edge/graph_198008967.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19805085.jsonl b/edge/graph_19805085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198119754.jsonl b/edge/graph_198119754.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39a96782906d8d4d04b9ca46f4624e18e56161ad --- /dev/null +++ b/edge/graph_198119754.jsonl @@ -0,0 +1,14 @@ +{"19396874|4528002": []} +{"14970386|1940388": ["The data secrecy must be ensured while it is stored on devices, when it is transmitted and also when it reaches the destination [1].", "Several types of transducers can be connected to these devices, turning them suitable to be used on monitoring and physical phenomena control in large-scale environments [1].", "\u2022 Freshness: to prevent old messages from being replayed without being detected [1].", "The self-organization, fault-tolerance and selfoptimization are the main characteristics of these networks [1].", "\u2022 Non-repudiation: to ensure that a node cannot deny in the future the authorship of a message previously sent [1].", "Since wireless sensor node replacements is a common situation, it is also important to guarantee the following [1]:"]} +{"3317262|4528002": ["More information can for example be found in [11], [12] or [13]."]} +{"18434328|12815020": []} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} +{"36483560|4528002": ["Several different detectors are proposed in [10] and [11], however their proposals are not experimentally evaluated.", "Several works already proposed the application of anomaly detection algorithms to analyze CAN messages [5], [6], [7], [8], [9], [10], [11] looking for evidences of attacks and other illicit activities, but often with very limited evaluation over real in-vehicle network traffic."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"207249940|4528002": ["[2, 9, 10] CAN bus signals are indexed by a process ID (PID), specified in the packet header, and are generally associated with a fixed function (running lights, sensors, door locks, etc.) The specific PID-to-function mapping of signals is dependent on the make and model; e.g., signals with PID 3A1\u2026"]} +{"50774133|4735659": ["It can protect spectrum and communication resources, and provide application services for accessed devices [24]."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} diff --git a/edge/graph_198120381.jsonl b/edge/graph_198120381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..777ba5c72d22bc1de2ff4b40dc3ea6e6d607f880 --- /dev/null +++ b/edge/graph_198120381.jsonl @@ -0,0 +1,5 @@ +{"207240067|1805048": ["YouTube is the world\u2019s largest platform for creating, sharing and discovering video content."]} +{"44145233|393948": ["The success of machine learning algorithms generally depends on data representation, because different representations can entangle and hide more or less different properties of variation behind the data [2]."]} +{"204938713|16489039": ["This idea is embodied in the sponsored search model [19], where advertisers sponsor the top search results in order to redirect user\u2019s attention from original (or organic) search results to ads that are highly relevant to the entered query."]} +{"18946879|2795037": ["Query optimization has been well studied in relational databases for structured queries [10]."]} +{"54446463|10175374": ["Besides, hard parameter sharing greatly reduces the risk of overfitting [31]."]} diff --git a/edge/graph_198147132.jsonl b/edge/graph_198147132.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198147243.jsonl b/edge/graph_198147243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24413389e65e58f4e7f32dabb4720bbbb9afbe0d --- /dev/null +++ b/edge/graph_198147243.jsonl @@ -0,0 +1,8 @@ +{"57605204|192934": ["\u5178\u578b\u7684\u805a\u7c7b\u8fc7\u7a0b\u4e3b\u8981\u5305\u62ec\u6570\u636e(\u6216\u79f0\u4e4b\u4e3a\u6837\u672c\u6216\u6a21\u5f0f)\u51c6\u5907\u3001\u7279\u5f81\u9009\u62e9\u548c\u7279\u5f81\u63d0\u53d6\u3001\u63a5\u8fd1\u5ea6\u8ba1\u7b97\u3001\u805a\u7c7b(\u6216 \u5206\u7ec4)\u3001\u5bf9\u805a\u7c7b\u7ed3\u679c\u8fdb\u884c\u6709\u6548\u6027\u8bc4\u4f30\u7b49\u6b65\u9aa4([3,6,7])."]} +{"15662958|25206420": ["Although [Moore et al. 2014b] is one of the most recent surveys, it focuses on the hardware implementation solutions of FHE schemes.", "However, the conventional encryption schemes can not work on the encrypted data without decrypting it \ufb01rst.", "\u2026FHE and SWHE schemes mainly focused on three implementation platforms: Graphics Processing Unit (GPU), Application-Speci\ufb01c Integrated Circuit (ASIC), and Field-Programmable Gate Array (FPGA) (A useful survey of hardware implementations of homomorphic schemes can be found in [Moore et al. 2014b]).", "\u2026by FPGAs motivates many researchers to speed up the practicality of FHE schemes [Cousins et al. 2012; Wang and Huang 2013; Cao et al. 2013; Moore et al. 2013; Chen et al. 2015; Cao et al. 2014; Moore et al. 2014a; Cousins et al. 2014; Roy et al. 2015; P\u00f6ppelmann et al. 2015; \u00d6zt\u00fcrk et al. 2015]."]} +{"15662958|14067375": []} +{"1127895|2457428": ["It is impractical, however, to attach the exact expiration time to each attribute of each CL. Additionally, the timed mechanism fails to guarantee backward and forward secrecy [22]."]} +{"16851232|8253022": ["Issa M. Khalil et.al. introduces the various security techniques and data storage on cloud computing [8]."]} +{"10855350|20905429": ["Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer.", "A typical MCPS architecture consists of four different layers: i) data acquisition layer, ii) data pre-processing layer,\nO. Kocabas and T. Soyata are with the Department of Electrical and Computer Engineering, University of Rochester, Rochester, NY 14627."]} +{"206770714|2457428": ["They realize revocation by revoking attribute itself using timed rekeying mechanism, which is implemented by setting expiration time on each attribute."]} +{"3583771|206584087": ["detection and defense mechanisms [81] might be relevant for ICN DoS mitigation."]} diff --git a/edge/graph_198147317.jsonl b/edge/graph_198147317.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d844a2922603737617e310dd72a9fdec84e46d7 --- /dev/null +++ b/edge/graph_198147317.jsonl @@ -0,0 +1,50 @@ +{"28705282|3110415": ["[46] Y. Jia et al., \u201cCaffe: Convolutional architecture for fast feature embedding,\u201d in Proc.", "Experiments were implemented based on the deep learning framework Caffe [49], and executed on a PC with an Intel single Core i7 CPU, NVIDIA\nGTX-960 GPU (2 GB video memory), and 8 GB RAM.", "response normalization [49] and fused them to one single feature map cube, namely a hyper feature map.", "Experiments were implemented based on the deep learning framework Caffe [49], and executed on a PC with an Intel single Core i7 CPU, NVIDIA GTX-960 GPU (2 GB video memory), and 8 GB RAM."]} +{"53784218|393948": ["attracted more and more attentions [23]."]} +{"1033682|174797842": []} +{"38814373|3110415": ["A recent review on object detection in optical remote sensing images can be found in [26]."]} +{"4951598|3654323": ["Re-collecting massive labeled data to train a new model from scratch or re-collecting some unlabeled data to perform domain adaptation [166] or others are effective methods.", "Deep domain adaptation [166] has inherent advantages here and is worthy of attention.", "Transfer learning [113], [166] has recently been introduced for deep FR, which utilizes data in relevant source domains (training data) to execute FR in a target domain (testing data)."]} +{"4951598|18038464": ["l nowadays. This survey focuses only on recognition problem, and one can refer to Ranjan et al. [32] for a brief review of a full deep FR pipeline with detection and alignment, or refer to Jin et al. [33] for a survey of face alignment. Speci\ufb01cally, the major contributions of this survey are as follows: A systematic review on the evolution of the network architectures and loss functions for deep FR "]} +{"4951598|2323881": ["There have been several surveys on FR [268], [20], [3], [96], [175] and its subdomains, and they mostly summarized and compared a diverse set of techniques related to a specific FR scene, such as illumination-invariant FR [284], 3D FR [175], pose-invariant FR [262][50]."]} +{"4951598|18543658": ["12, such as cross-pose FR, video FR, cross-age FR, lowshot FR, set/template-based FR, 3D FR, makeup FR, FR for mobile devices, face anti-spoofing and heterogeneous FR [110] (including NIR-VIS FR, photo-sketch FR and low-resolution FR)."]} +{"4951598|359842": ["Over the past few years, there have been several surveys on FR [222], [18], [3], [78], [136] and its subdomains, including illumination-invariant FR [234], 3D FR [136], pose-invariant FR [216] and so on."]} +{"4951598|16620699": ["the evaluation protocols. Therefore, it is of great signi\ufb01cance to review the breakthrough and rapid development process in recent years. There have been several surveys on FR [268], [20], [3], [96], [175] and its subdomains, and they mostly summarized and compared a diverse set of techniques related to a speci\ufb01c FR scene, such as illumination-invariant FR [284], 3D FR [175], pose-invariant FR [262][50"]} +{"126652|18543658": ["Traditional NIR-VIS methods generally involve image synthesis, subspace learning and invariant feature extraction [12] [2].", "Much research effort has been made to improve the NIRVIS HFR performance [2] [11].", "U BIQUITOUS face sensors not only facilitate the wide application of face recognition but also generate various heterogeneous sets of facial images [1] [2]."]} +{"3290651|9928823": ["Previously, several generic deep learning reviews (Bengio, 2009; Schmidhuber, 2015; Deng, 2014; LeCun et al., 2015), reviews that deal with deep", "\u2026even more research focusing on image classification with DCNNs.\nPreviously, several generic deep learning reviews (Bengio, 2009; Schmidhuber, 2015; Deng, 2014; LeCun et al., 2015), reviews that deal with deep\nDownloaded from http://www.mitpressjournals.org/doi/pdf/10.1162/neco_a_00990 by guest on\u2026", "The most common algorithm used for this purpose is backpropagation (LeCun, 1989; LeCun et al., 1998; Bengio, 2009; Deng & Yu, 2014; Deng, 2014; Srinivas et al., 2016)."]} +{"3290651|393948": []} +{"115758427|4861446": ["A more comprehensive report on current sensors for AV applications can be found in [15] and [16]."]} +{"115758427|15093118": ["Such configuration uses matching algorithms to find correspondences in both images and calculate the depth of each point relative to the camera, demanding more processing power [18]."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"21707426|206764452": []} +{"21707426|1029120": ["In [23] and [24] , the authors have discussed two surveys focused on pedestrian detection and tracking systems related to the Pedestrian Protection Systems (PPSs).", "\u2026the identi\ufb01ed objects; \ufb01nally a tracker is necessary to follow the considered object (or class of objects) during the video \ufb02ow [3,8,12,13,18,19,21\u201323, To simplify and strengthen the step of ROIs identi\ufb01cation, and consequently the overall tracking system, some authors introduced active and\u2026"]} +{"21707426|12127129": ["The initial approach for detection and tracking of moving objects into a video \ufb02ow acquired by a static camera consisted in the Background Subtraction (BS); this technique allows the detection and distinction of moving objects inside a scene using an appropriate background model [48] ."]} +{"21707426|14970359": ["So they are used to increase awareness of security issue by performing analysis of actions, activities and behaviors both for crowds and individuals; for example, such systems are used for queue and shopping behavior analysis, detection of abnormal activities, and person identi\ufb01cation [18,19,51\u201353,", "Moreover, as will be discussed in the following section ( Section 4 ), motion information, which is generally extracted using a 3D vision sys-tem, could be obtained following a bi-dimensional approach [3,18,19,21,44,52,53,55,65,76,92,95,135,136] .", "\u2026of the identi\ufb01ed objects; \ufb01nally a tracker is necessary to follow the considered object (or class of objects) during the video \ufb02ow [3,8,12,13,18,19,21\u201323, To simplify and strengthen the step of ROIs identi\ufb01cation, and consequently the overall tracking system, some authors introduced active\u2026", "In [18] and [19] the authors focused the topic of the survey on a taxonomy of system functionalities considering the structure of the motion capture system and the different information to be processed."]} +{"21707426|14520202": ["Solichin et al. have focused the work on the steps needed in the process of pedestrian detection, including input devices, datasets and methods for detection and, \ufb01nally, on some open issues related to pedestrian detection [20] ."]} +{"53568855|9045232": []} +{"28007053|3110415": ["Cheng and Han [7] provided a review of the recent progress in object detection in remote sensing images and proposed two promising research directions, namely, deep learning-based feature representation and weakly supervised learning-based geospatial object detection."]} +{"3110415|16665885": ["\u20262004); land cover and land use mapping including vegetation, tree, water, residential, etc. (Baker et al., 2013; Benz et al., 2004; Blaschke, 2003; Blaschke et al., 2011; Blaschke et al., 2008; Contreras et al., 2015; D'Oleire-Oltmanns et al., 2014; De Pinho et al., 2012; Doleire-Oltmanns et al.,\u2026", "(Baker et al., 2013; Benz et al., 2004; Blaschke, 2003; Blaschke et al., 2011; Blaschke et al., 2008; Contreras et al., 2015; D'Oleire-Oltmanns et al., 2014; De Pinho et al., 2012; Doleire-Oltmanns et al., 2013; Dr\u0103gu\u0163 and Blaschke, 2006; Dr\u0103gu\u0163 and Eisank, 2012; Duro et al., 2012; Eisank et al., 2011; Goodin et al., 2015; Hay et al., 2003; Hofmann et al., 2011; Kim et al., 2011; Leon and Woodroffe, 2011; Li et al., 2014; Li and Shao, 2013; Lisita et al., 2013; Macfaden et al., 2012; Mallinis et al., 2008; Mishra and Crews, 2014; Moskal et al., 2011; Myint et al., 2011; Phinn et al., 2012; Tzotsos et al., 2011; Walker and Blaschke, 2008; Walker and Briggs, 2007; Weng, 2009, 2011; Xie et al., 2008; Yu et al., 2006; Zhou, 2013; Zhou et al., 2009; Zhou and Troy, 2008); landslide mapping (Feizizadeh et al.", "\u2026et al., 2011; Martha et al., 2012; Stumpf and Kerle, 2011), land cover and land use mapping (Baker et al., 2013; Benz et al., 2004; Blaschke, 2003; Blaschke et al., 2011; Blaschke et al., 2008; Contreras et al., 2015; D'Oleire-Oltmanns et al., 2014; De Pinho et al., 2012; Doleire-Oltmanns et al.,\u2026"]} +{"3110415|1626075": ["Different from several previously published surveys that focus on a specific object class such as building (Mayer, 1999; Shufelt, 1999) and road (Mayer et al., 2006; Mena, 2003), we concentrate on more generic object categories including, but are not limited to, road, building, tree, vehicle, ship,\u2026", "\u20262012; Benedek et al., 2012; Durieux et al., 2008; Hofmann et al., 2002; Karantzalos and Paragios, 2009; Lef\u00e8vre et al., 2007; Lhomme et al., 2009; Mayer, 1999; Ok, 2013; Ok et al., 2013; Peng and Liu, 2005; Peng et al., 2005; Senaras et al., 2013; Shufelt, 1999; Sirma\u00e7ek and \u00dcnsalan, 2009;\u2026"]} +{"12452972|17252389": ["boundaries from natural images, has remained as one of the main challenges in computer vision for several decades. It is usually considered as a low-level technique, and varieties of high-level tasks [8,27] have greatly bene\ufb01ted from the development of edge detection, such as object detection [18,57], object proposal [10,56,62\u201364] and image segmentation [1,3,9,58]. Typically, traditional methods \ufb01rst ex"]} +{"120409665|1223851": ["More details about traditional methods are concluded in [3, 4].", "However, detecting and segmenting salient objects should be fast since this process is often a preprocessing stage to more complex operations [3]."]} +{"58950475|13407903": ["First, improving data quality and dealing with missing data problem, such as Geo-Localization [55], [56], [57], [58], and image Tags refinement [59], [60], [61], [62], can be beneficial to the improvement of performance."]} +{"52177403|56517517": ["Given this time of tremendously rapid evolution, there exist many recent survey papers on deep learning [13, 86, 89, 145, 166, 212, 280, 290, 305, 312, 317].", "These surveys reviewed deep learning techniques from different perspectives [13, 86, 89, 145, 212, 280, 312], or with applic tion to medic l image anal sis [166], natural language processing [290], speech recognition systems [305], and remote sensing [317]."]} +{"52177403|53109768": []} +{"52177403|21955893": []} +{"52177403|2088679": []} +{"52177403|207060556": ["A Survey on Face Detection in the Wild: Past, Present and Future [301] 2015 CVIU 2000 \u5e74\u4ee5\u964d\u306e \u201cin the wild\u201d(\u975e\u5236\u7d04\u74b0\u5883,\u5b9f\u74b0\u5883)\u9854\u691c\u51fa\u306e\u30b5\u30fc\u30d9\u30a4", "\u6b69\u884c\u8005\u691c\u51fa [66, 79, 59],\u9854\u691c \u51fa [294, 301],\u8eca\u4e21\u691c\u51fa [258],\u30c6\u30ad\u30b9\u30c8\u691c\u51fa [295] \u306a\u3069,\u7279 \u5b9a\u7269\u4f53\u691c\u51fa\u554f\u984c\u306b\u95a2\u3059\u308b\u512a\u308c\u305f\u8abf\u67fb\u304c\u591a\u6570\u884c\u308f\u308c\u3066\u304d\u305f."]} +{"52177403|5729190": []} +{"52177403|1223851": ["15 Salient Object Detection: A Survey [19] 2014 arXiv A survey for salient object detection"]} +{"52177403|393948": []} +{"52177403|206764452": []} +{"52177403|9045232": []} +{"52020204|3110415": []} +{"10768153|17172098": []} +{"206753251|5729190": ["The reading of text in the wild has been studied over the last few decades; comprehensive surveys can be found in [24]\u2013[27]."]} +{"58028794|102486226": ["e times. This shifted the trend from custom layer design towards modular and uniform layer design. The concept of modularity in CNNs made it easy to tailor them for different tasks effortlessly [31], [100]. In this connection, a different idea of branching and block within a layer was introduced by the Google group [32]. It also should be Accepted in Artificial Intelligence Review (Springer Nature), DO", "The concept of modularity in CNNs made it easy to tailor them for different tasks effortlessly (Simonyan and Zisserman 2015; Amer and Maul 2019)."]} +{"58028794|58020292": ["ted using graphics Accepted in Artificial Intelligence Review (Springer Nature), DOI: 10.1007/s10462-020-09825-6 15 processing units (GPUs) to accelerate the training of deep NN and CNN architectures [90]\u2013[93]. In 2007, NVIDIA launched the CUDA programming platform, which allows exploitation of parallel processing capabilities of GPU with a greater degree [94], [95]. In essence, the use of GPUs for NN"]} +{"58028794|58981453": ["In this regard, Genetic algorithms can also be used to automatically optimize the hyper-parameters by performing searches both in a random fashion as well as by directing search by utilizing previous results (Young et al. 2015; Suganuma et al. 2017; Khan et al. 2019)."]} +{"58028794|3680335": []} +{"58028794|3273340": ["However, the training of deep and high capacity architectures is still a significant overhead on memory usage and computational resources (Lacey et al. 2016; Sze et al. 2017; Justus et al. 2019)."]} +{"58028794|393948": ["empirically showed that deep networks are computationally more efficient for complex tasks (Bengio et al. 2013; Nguyen et al. 2018).", "in 2013, empirically showed that data representation plays an important role in determining the performance of a classifier, as different representations may present different aspects of information (Bengio et al. 2013)."]} +{"4259559|3273340": ["Furthermore, there are many hardware accelerations and computational methods [38], [39]"]} +{"104292107|206739910": ["Both KITTI [9] and LISA [33] depict traffic scenes, collected with cameras mounted on moving vehicles.", "For LISA [33], we trained on the train set and tested on the val set.", "To train and evaluate universal/multi-domain object detection systems, we established a new universal object detection benchmark (UODB) of 11 datasets: Pascal VOC [6], WiderFace [58], KITTI [9], LISA [33], DOTA [53], COCO [27], Watercolor [17], Clipart [17], Comic [17], Kitchen [10] and DeepLesions [55]."]} diff --git a/edge/graph_198147553.jsonl b/edge/graph_198147553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff6207a90bb05c2c06a8c956f317949ed01aa814 --- /dev/null +++ b/edge/graph_198147553.jsonl @@ -0,0 +1,11 @@ +{"31092332|2703920": ["Identifying paraphrases plays an important role in question answering [1], text similarity measures [2], natural language inference [4] and plagiarism detection [3]."]} +{"22475926|1805048": ["[139] presented a comprehensive review on collaborative filtering techniques; Burke et al."]} +{"207240067|1805048": ["YouTube is the world\u2019s largest platform for creating, sharing and discovering video content."]} +{"4666925|8310135": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} diff --git a/edge/graph_1981516.jsonl b/edge/graph_1981516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19815778.jsonl b/edge/graph_19815778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..764896c1905c4ee0decf6d519bdcd7069f0001ef --- /dev/null +++ b/edge/graph_19815778.jsonl @@ -0,0 +1,61 @@ +{"16813414|2355696": ["Facial expression recognition is becoming increasingly important for commercial and scientific applications in a growing group of fields, including human-computer interaction [33], behavioral science research [17], and media analytics [1]."]} +{"18544245|14288295": []} +{"18544245|9045232": []} +{"4406253|14303607": ["Frame-level methods to detect AU occurrence and facial expressions (e.g. happiness, sadness, fear) analyze individual frames [15, 23].", "On the other hand, this large variability of behaviors is one of the reasons for which common emotion recognition classi\ufb01ers usually drop their performance when tested with subjects not belonging to the training set [23, 15]."]} +{"14577248|11608263": ["The prediction from an example x to its complete label vector, z, is the main task of multi-label learning [3]."]} +{"10325738|2355696": []} +{"10325738|9045232": []} +{"298871|8601873": ["In order to learn the bagclassifier, MIL methods assume that there exist an underlying relation between the bag label and its instances distribution [10]."]} +{"1919851|17221751": ["A full review of work in facial landmark detection, head pose, eye gaze, and action unit estimation is outside the scope of this paper, we refer the reader to recent reviews of the field [17, 18, 30, 46, 51, 61].", "Over the past few years, there has been an increased interest in machine understanding and recognition of affective and cognitive mental states and interpretation of social signals especially based on facial expression and more broadly facial behavior [18, 51, 39].", "portant building block in nonverbal behavior and emotion recognition systems [18, 51].", "Over the past years there has been a huge amount of progress in facial behavior understanding [18, 51, 39]."]} +{"1919851|16010181": ["A full review of work in facial landmark detection, head pose, eye gaze, and action unit estimation is outside the scope of this paper, we refer the reader to recent reviews of the field [17, 18, 30, 46, 51, 61]."]} +{"4391538|2355696": []} +{"4391538|14303607": ["Concerning the classi\ufb01cation step, SVM, Boosting, Random Forests and many other approaches have been proposed [19, 37].", "However, most state-of-the-art systems have been trained and tested in laboratory conditions, with datasets mainly composed of frontal face images and posed emotions [19, 32, 37].", "Automatic detection of non-verbal behavioral cues and speci\ufb01cally of facial expressions [19, 37] is of crucial importance in many areas, including ambient assisted living, human-computer interfaces, entertainment, education, and multimedia content analysis.", "Many approaches have proved to be e\ufb00ective for recognizing the seven basic facial expressions ( i.e. happiness, sadness, fear, anger, disgust, and surprise plus the neutral state) or for detecting AUs on which the facial emotions are based [19, 37]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"2473564|17221751": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12].", "For a more processing oriented review of the literature the reader is mainly referred to [10], [12]."]} +{"2473564|16010181": ["This work introduces them briefly, referring the reader to more specific surveys for each topic [176], [180], [181]."]} +{"2473564|1482463": ["For RGB images , Viola&Jones [60] still is one of the most used algorithms [10], [61], [177]."]} +{"2473564|2301292": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12]."]} +{"2473564|2355696": []} +{"2473564|14303607": ["FE recognition techniques are grouped into categorical and continuous depending on the target expressions [184]."]} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"4591291|19815778": ["For a general overview of the field of expression recognition we refer the reader to excellent recent surveys [5], [19]."]} +{"4591291|2473564": []} +{"15570523|14303607": ["In computer vision, automated AU detection has become an active area of research [2, 6, 19, 27, 28, 31, 39] with a wide range of applications,\nTask 1: Frame detection\nTask 2: Segment detection\nTask 3: Transition detection\n...\nonset offset\nCascade of Tasks (CoT)\nGround truth Frame detection\nGround\u2026"]} +{"18228076|5401262": ["Previous Work Extensive efforts have been devoted to recognize facial expressions [19, 31]."]} +{"40776|207060556": ["The interested reader may refer to [67] for recent advances in face detection \u201din-the-wild\u201d."]} +{"40776|17221751": ["\u2026to achieve state-of-the-art results in a series of important computer vision applications, such as face recognition/veri\ufb01cation and facial expression analysis, it is important to provide an enhanced representation of the face that contains the locations of several key facial landmarks [47, 52]."]} +{"991658|207060556": ["review, the interested reader may refer to themost recent face detection survey in Zafeiriou et al. (2015).", "(2010), Zafeiriou et al. (2015). Although face detection on well-lit frontal facial images can be performed reliably on an", "The interested reader may refer to the most recent survey by Zafeiriou et al (2015) for more information on in-the-wild face detection.", "For an extended review, the interested reader may refer to the most recent face detection survey in Zafeiriou et al (2015).", "C V\n] 2\n8 Fe\nb 20\nand Zhang (2010); Zafeiriou et al (2015).", "The fact that all recent face detection surveys (Hjelm\u030aas and Low (2001); Yang et al (2002); Zhang and Zhang (2010); Zafeiriou et al (2015)) provide different categorisations of the relative literature is indicative of the huge range of existing techniques.", "According to the most recent literature review Zafeiriou\net al (2015), existing methods can be separated in two major categories."]} +{"991658|16010181": ["E-mail: {g.chrysos, e.antonakos}@imperial.ac.uk\n{p.snape, s.zafeiriou}@imperial.ac.uk", "For a recent evaluation of facial landmark localisation methods the interested reader may refer to the survey by Wang et al (2014) and to the results of the 300W competition by Sagonas et al (2015)."]} +{"991658|10355303": ["We refer the interested reader to the wealth of tracking surveys (Li et al (2013b); Smeulders et al (2014); Salti et al (2012); Yang et al (2011)) and benchmarks (Wu et al (2013, 2015); Kristan et al (2013, 2014, 2015, 2016); Smeulders et al (2014)) for more information on model free tracking\u2026", "DPMs (Schneiderman and Kanade (2004); Felzenszwalb and Huttenlocher (2005); Felzenszwalb et al (2010); Zhu and Ramanan (2012); Yan et al (2013); Li et al (2013a); Yan et al (2014); Mathias et al (2014); Ghiasi and Fowlkes (2014); Barbu\net al (2014)) learn a patch expert for each part of an object\u2026"]} +{"991658|9045232": ["The fact that all recent face detection surveys (Hjelm\u030aas and Low (2001); Yang et al (2002); Zhang and Zhang (2010); Zafeiriou et al (2015)) provide different categorisations of the relative literature is indicative of the huge range of existing techniques."]} +{"32085926|38763856": ["To benefit from the multiple features and models, different fusion strategies have been proposed including: feature-level (early) fusion, decision-level (late) fusion and model-level fusion [24]."]} +{"15527440|207060556": []} +{"1969798|5401262": ["Detailed surveys of previous work can be found in [6][7][8][9][1][10]."]} +{"28667319|5401262": ["In the past several years, significant progress has been made in machine learning to automatically recognize facial expressions related to emotion [20,21]."]} +{"7997400|27637541": ["Interested readers are referred to [7] for a review."]} +{"7997400|14405917": [", CMU Mocap [1] and GFT [37]), evaluation of quality was carried out using the recurrence analysis [13], which was originally designed to analyze a coupled dynamical system based on signal consistency.", "Synchrony refers to the temporal structure of behaviors among interactive partners [13]."]} +{"53477256|17221751": ["expression recognition have focused on employing a variety of features, or even proposing new face representations [58, 109].", "The main challenge is that nuisance factors such as subject identity, head pose variation, illumination conditions, or even alignment errors have a larger impact on the appearance than expressive behaviour [109]."]} +{"53477256|5943294": ["A third option has very recently become one of the areas of application of facial expression recognition: implicit tagging [119, 118, 117]."]} +{"53477256|2355696": ["It is then part of a multi-modal problem that integrates heterogeneous cues into some higher-level understanding of the scene [140, 141]."]} +{"53477256|7360895": ["socials, has been a long-standing aim for researchers [31, 45]."]} +{"53477256|1118130": ["Social Signal Processing, which aims to interpret facial displays as social cues [141], and Behaviomedics, which aims to detect medical conditions based on abnormal expressive behaviour [131], can be framed as higher level behaviour interpretation approaches, which can make predictions based on one or more of the three definitions listed above.", "How humans perceive and interpret facial expressions, be it in terms of mental models of emotions and affective states [102], social signals [141], or indicators of health", "It is then part of a multi-modal problem that integrates heterogeneous cues into some higher-level understanding of the scene [140, 141]."]} +{"6320104|9045232": []} +{"2397089|5401262": ["pervasive computing, ambient intelligence, human computing) will need to develop human-centred user interfaces that respond readily to naturally occurring, multi-modal, human communication [24]."]} +{"15298586|207060556": ["We denote this initial estimate as x, which for face alignment is commonly a mean face aligned to the output of a face detector [60]."]} +{"6600989|14303607": ["Interested readers may refer to [11, 21, 32] for more complete surveys of AU detection methods."]} +{"641127|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"215721|14303607": ["Accurate object shape computation is key to many visual tasks; for instance, classification of facial expression [17, 30], facial identity [38], action analysis [4], and fine-grained categorization [34, 3, 18, 40] require accurate registration of a (deformable, part-based) model to the image."]} +{"215721|9045232": ["The shape of human bodies and human faces has attracted particular attention [43, 46, 33, 2]."]} +{"7151900|2355696": ["Unfortunately, people do not frequently display such strong expressions as anger or disgust in everyday life [24].", "It has seen so much activity that it already contributed to the creation of three new research directions: Affective Computing [17], Social Signal Processing [24], and Behaviomedics [22]."]} +{"201720|38476": ["However, it is well-known that this approach fails to exploit a lot of significant information [5]."]} +{"3329621|2355696": ["It involves computer vision, machine learning and behavioral sciences, and can be used for many applications such as security [20], human-computer-interaction [ 23 ], driver safety [24], and health-care [17]."]} +{"12359230|17221751": ["A very detailed and recent review can be found in [21]."]} +{"17221751|2301292": ["from naturalistic environments with spontaneous affective behaviour [118] as existing datasets [122], [138], [176] contain exaggeratedly posed affective behaviour.", "the recognition of expressions that might be hardly noticeable using only 2D appearance [118]."]} +{"17643814|17221751": ["We refer the reader to recent surveys and challenges [6], [22], [23], [25]."]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"2301292|1118130": ["prototypical expressions of emotions [5,4,6,7]."]} +{"8275347|2301292": ["Automatic facial expression recognition has attracted considerable attention in the past few years [6, 18, 20, 23] due to their potential application in the \ufb01eld of psychology, mental health, human-computer interaction, etc."]} +{"6336549|2355696": ["Like the perceptron, SVMs separate the two classes (i.e., action unit present or not present) by a (hyper)plane, but they are less prone to over\ufb01tting than the perceptron (Vapnik 1995)."]} +{"53612459|5401262": ["We do so becuase cues identifying attitudinal states like interest and boredom, to those underlying moods, and to those disclosing social signaling like empathy and antipathy are all visualy detectable from someone\u2019s facial expressions (Pantic et al., 2005, 2006).", "Since the problem of context-sensing is extremely difficult to solve (if possible at all) for a general case, pragmatic approaches (e.g., activity/application- and user-centered approach) should be taken when learning the grammar of human facial behavior (Pantic et al., 2005a, 2006).", "communicated by rapid facial signals include the following (Ekman & Friesen, 1969; Pantic et al., 2006): (a) affective / attitudinal states and moods,1 e.g., joy, fear, disbelief, interest, dislike, stress, (b) emblems, i.e., culture-specific communicators like wink, (c) manipulators, i.e.,\u2026", "communicated by rapid facial signals include the following (Ekman & Friesen, 1969; Pantic et al., 2006): (a) affective / attitudinal states and moods,1 e.", "\u2026questions like who is the user, where is he or she, and what is he or she doing, has witnessed recently a number of significant advances (Nock et al., 2004, Pantic et al. 2006), the complexity of this problem makes context-sensitive facial expression analysis a significant research challenge."]} +{"53612459|9045232": ["Numerous techniques have been developed for face detection in still images (Yang et al., 2002; Li & Jain, 2005)."]} +{"7877172|14303607": ["Accurate localization of detailed facial features provides an important building block for many applications including identification [3] and analysis of facial expressions [17]."]} diff --git a/edge/graph_198168979.jsonl b/edge/graph_198168979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f84544806edbb86af3da804e7c1ca390ad08467 --- /dev/null +++ b/edge/graph_198168979.jsonl @@ -0,0 +1,9 @@ +{"52187316|750942": ["MV-HEVC [4][5]."]} +{"57726283|750942": ["Somewhat related, multiview video plus depth (MVD) representation was considered for storing video and depth maps from multiple cameras in extensions of the international HEVC standard [36]."]} +{"18825365|387610": ["Height and color maps are compressed with the JPEG or the lossy JPEG 2000 standard [2], [30]."]} +{"617582|3540699": ["Regarding single view video coding, where prediction is limited to reference pictures in temporal dimension, the concept of hierarchical B pictures (see [11] for a detailed description) has proven to provide high compression efficiency."]} +{"1963574|12127129": ["Next, the background is subtracted from the image using a modified Gaussian average algorithm [ 38 ]."]} +{"1963574|7788290": ["Extensive work has been done to track human motion in images (see surveys [2, 11 ])."]} +{"235971|64404": ["Early compression standards such as MPEG-1 and MPEG-2 adopted motion prediction as the key component to improve coding efficiency for image sequences."]} +{"235971|3540699": ["Early compression standards such as MPEG-1 and MPEG-2 adopted motion prediction as the key component to improve coding efficiency for image sequences."]} +{"14805766|8983048": ["In Salvi et al. (2007) a deeper study comparing different solutions for ICP in terms of speed and accuracy is performed."]} diff --git a/edge/graph_198172093.jsonl b/edge/graph_198172093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3513c60d88145de02f833a7059c260469868974 --- /dev/null +++ b/edge/graph_198172093.jsonl @@ -0,0 +1,13 @@ +{"44053653|5724477": ["According to literature, the spectrum range of human is between 0 Hz and 20 Hz [9,39], so at least 40 Hz sampling is required to satisfy the Nyquist-Shannon theorem."]} +{"2112296|5724477": ["We selected three classi\ufb01ers, which are commonly used for practical activity recognition: Naive Bayes, k-nearest neighbor (KNN) and decision tree [35,36].", "They are suitable for running on mobile phones with reasonable recognition performance [35,36]."]} +{"41671353|3348390": ["Internet of Things (IoT) is a new paradigm that emerged in order to integrate and connect objects like sensors, electrical appliances and mobile devices to improve the quality of life [1]."]} +{"32456599|5724477": ["Among the solutions cited above, the recognition of users\u2019 physical activities has been widely explored in literature by several works [5-7] that use classification models generated by machine learning algorithms.", "In addition, the features can also be classified as user's body orientationdependent and orientation-independent features [5]."]} +{"1187100|7834819": ["Research studies on sensor-based monitoring of subjects for these various applications have resulted in a large amount of literature including survey study reports [10\u201315]."]} +{"1187100|11894197": ["An overview of existing feature selection methods in the period from the 1970s to 1997 is presented in [90], identifying the strengths and weaknesses of different methods, while the authors in [91] presented a taxonomy of feature selection techniques and their uses."]} +{"4347476|393948": []} +{"6421030|5664472": []} +{"6421030|7834819": ["Besides, since the waist is close to human body\u2019s mass center, waistplacement for motion sensors is commonly used in many studies [30]."]} +{"6421030|15273230": ["If the classification categories are not approximately equally represented, we call the dataset imbalanced [37], which is common across various disciplines, such as anomaly detection and medical diagnosis."]} +{"1044293|393948": ["An even more radically different solution to the problem of avoiding explicit latent variables was recently introduced in Bengio et al. (2013c) and Bengio and Thibodeau-Laufer (2013).", "They are hurt by the problem of mode mixing, discussed at greater length in Bengio et al. (2013b), and summarized here.", "The hypothesis proposed (Bengio et al., 2013b) to explain this observation is that unsupervised representation learning procedures (such as for the RBM and contractive or denoising auto-encoders) tend to discover a representation whose distribution has more entropy (the distribution of vectors in\u2026", "Instead, they are based on the construction of a direct parametrization of an encoding function which immediately maps an input x to its representation f(x), and they are motivated by geometrical considerations in the spirit of manifold learning algorithms (Bengio et al., 2013d).", "An interesting observation (Bengio et al., 2013b) which could turn out to be helpful is that after we train a deep model such as a DBN or a stack of regularized auto-encoders, we can observe that mixing between modes is much easier at higher levels of the hierarchy (e.g. in the top-level RBM or\u2026", "\u2026result was only valid for asymptotically small Gaussian corruption noise, squared reconstruction error, and continuous inputs, the result from Bengio et al. (2013c) is applicable for any type of input, any form of reconstruction loss (so long as it is a negative log-likelihood), any form of\u2026", "Although the result from Alain and Bengio (2013) suggests that when the amount of injected noise is small, a unimodal distribution is sufficient, it is convenient to accomodate large amounts of injected noise to make training more efficient, as discussed by Bengio et al. (2013c).", "As explained in Bengio et al. (2013d), the tug-of-war between minimization of reconstruction error and the regularizer means that the intermediate representation must mostly capture the variations necessary to distinguish training examples, i.e., the directions of variations on the manifold (a\u2026", "Furthermore many pieces of evidence in the results of experiments on deep learning suggest that training deep networks (including recurrent networks) involves a difficult optimization (Bengio, 2013b; Gulcehre and Bengio, 2013; Bengio et al., 2013a).", "See (Bengio, 2009; Bengio et al., 2013d) for reviews and Bengio (2013c) and the other chapters of the book by Montavon and Muller (2012) for practical guidelines.", "See section 3 of Bengio et al. (2013d) for a review of representation learning procedures based on directed or undirected graphical models.4 Section 2.5 describes sparse coding in more detail.", "A general strategy was outlined in Bengio et al. (2013d) to enhance the discovery of representations which disentangle the underlying and unknown factors of variation: it relies on exploiting priors about these factors.", "Another encouraging observation (already mentioned in the section on mixing) is that deeper representations were empirically found to be more amenable to quickly mixing between modes (Bengio et al., 2013b).", "See Bengio et al. (2013d) for a brief overview in the context of deep learning, along with connections to other unsupervised representation learning algorithms."]} +{"7551351|17747015": ["Activity recognition methods are classified into three main types of vision-based [1], radio-based [2], and sensor-based [3] methods."]} +{"33309785|16013270": ["In addition, vision-based approaches often suffer from illumination variations, ambient occlusion and background change that greatly limits their actual use [9], [10]."]} diff --git a/edge/graph_198179581.jsonl b/edge/graph_198179581.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb40cb2ebc8ae46ced2baa41d9af76d62e7cdb49 --- /dev/null +++ b/edge/graph_198179581.jsonl @@ -0,0 +1,7 @@ +{"7124120|1708582": []} +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} +{"5155799|1708582": ["We note an important difference between the well known heuristic exploration technique of optimism in the face of uncertainty [21, 22] and the overestimation bias."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"1708582|17464562": []} +{"1033682|174797842": []} +{"11227891|1708582": ["A closely related concept to maximum entropy policies is Boltzmann exploration, which uses the exponential of the standard Q-function as the probability of an action (Kaelbling et al., 1996)."]} diff --git a/edge/graph_198179680.jsonl b/edge/graph_198179680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6020760320239378870d895cedb983b7cac05b83 --- /dev/null +++ b/edge/graph_198179680.jsonl @@ -0,0 +1,2 @@ +{"3386503|3110415": []} +{"7736403|6972141": ["differentiate between traversable terrain and obstacle locations [2][3]."]} diff --git a/edge/graph_198179745.jsonl b/edge/graph_198179745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..183aaacbead028a7da9c50a52da773e53edf9db1 --- /dev/null +++ b/edge/graph_198179745.jsonl @@ -0,0 +1,46 @@ +{"27975825|10744611": ["The train periodically reports the location and velocity information in signaling systems, which could be used to calculate the train movement authority [35], [36].", ", train control signaling) is transmitted but also the passengers Internet access is provided [2], [35]."]} +{"11127479|8323234": ["Millimeter wave (mmWave) communication is the crucial candidate for the next generation mobile communication system to meet the requirements of bandwidth and data rates [1]\u2013 [3]."]} +{"3537977|8323234": ["beamspace MIMO and CAP-MIMO theory can be found in [53]."]} +{"7206819|8323234": ["A discussion on some other approaches to model mmWave MIMO channel can be found in [120].", "channels for system capacity analysis or precoder design [55], [103], [120]."]} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"10519103|13367219": ["Radio-system designers require a statistical spatial channel model (SSCM) to study different physical layer (PHY) phenomena and to develop hardware and algorithms for future mmWave devices and systems [4]."]} +{"139104376|198179745": ["A detailed overview on signal processing methods, including array signal processing techniques, for mmWave massive MIMO communications can be found in [12].", "In particular: 1) experimental studies [11], [12] have shown that electromagnetic waves in mmWave bands suffer from severe path loss and have difficulty in bypassing obstacles; 2) mmWave channels have been shown to exhibit sparsity in the angle and delay domains, which is not encountered in microwave frequencies [13], [14]."]} +{"139104376|8323234": ["A detailed overview on signal processing methods, including array signal processing techniques, for mmWave massive MIMO communications can be found in [12].", "In particular: 1) experimental studies [11], [12] have shown that electromagnetic waves in mmWave bands suffer from severe path loss and have difficulty in bypassing obstacles; 2) mmWave channels have been shown to exhibit sparsity in the angle and delay domains, which is not encountered in microwave frequencies [13], [14]."]} +{"67865065|26259297": []} +{"67865065|61132": []} +{"49879281|22833814": ["High-mobility communications have gained much interest over the past couple of decades and have been considered as one of the key parts in high-speed railway (HSR) [2]\u2013[5]."]} +{"49879281|11498812": ["H.LiniswiththeDepartment of Electrical and Information Systems, Osaka Prefecture University, Osaka, Japan (email: lin@eis.osakafu-u.ac.jp). frequency division multiplexing (OFDM) technique is applied in high-mobility wideband wireless communications [3], [7]."]} +{"23713679|8323234": []} +{"53776110|11381530": ["it is an ideal choice to use DL approaches to detect network intrusions by learning traffic features [105]."]} +{"3695516|26259297": ["In the past few years, tremendous efforts have been devoted into the investigation of massive MIMO such as capacity analysis [4], channel estimation [5]\u2013[8], and beamforming design [9]\u2013[12]."]} +{"2221695|3054454": []} +{"11603024|12681089": []} +{"51886568|4884302": ["It is worth noting that the most important property of DL is that it can automatically find compact low-dimensional representations/features of high dimensional data [5, 6], which can be demonstrated by the following two examples."]} +{"4375599|26259297": ["Motivated by [25] and [34], in this paper, we design a new frequency synchronization scheme for multiuser OFDM uplink with a massive uniform linear array (ULA) at BS by exploiting the angle information of users.", "We consider that the incident signals at BS from each user can be restricted within a certain angular spread, since the massive BS is usually elevated at a very high altitude with few surrounding scatterers [5]\u2013[7], [25], [34].", "2Note that the DOA of each user may vary slowly in practice [34], and the DOA estimation may not need frequent updates.", "Similar to [5]\u2013[7], [25], and [34], we consider that the incident rays of each user can be constrained within a certain angular spread \u03b8as; Namely, the incident angles of the kth user is limited in the DOA region (\u03b8k \u2212 \u03b8as, \u03b8k + \u03b8as) with uniform distribution, where \u03b8k represents the mean DOA of the kth user.", ", the sufficient spatial dimension, the steering vectors pointing to distinct DOAs would become nearly orthogonal to each other, which implies that we can simply employ the steering vector pointing to the DOA of the kth user as the beamforming vector to substantially suppress the interference from the other users in angle domain [25], [34].", "An interesting array signal processing aided massive MIMO transmission scheme was proposed in [25] and [34], where the angle information of the user is exploited to separate users and simplify the subsequent signal processing.", "Generally, this assumption has been supported in the following typical scenario [34]: BS equipped with a large number of antennas is always elevated at a very high altitude, say on the top of a high building, a dedicated tower, or an unmanned aerial vehicle platform, such that there are few surrounding scatterers."]} +{"53080411|3645740": ["Machine learning (ML) has been applied to a large variety of problems in telecommunications, which include network management, self-organization, self-healing and physical layer (PHY) optimizations [1], [2]."]} +{"53080411|8323234": ["This paper presents a methodology for channel data generation in 5G millimeter wave (mmWave) multiple-input multiple-output (MIMO) scenarios [15].", "We consider two different channel models in the next paragraphs, but others can be adopted such as wideband models (see, e. g., [15] and references therein)."]} +{"3476431|8323234": ["In this case, DOA and DOD could be different by a small value, which could nevertheless be compensated for via beaming sweeping method within a small region [46]."]} +{"21381783|15453366": ["The millimeter wave channel characteristics, to a large extent, dictate the choice of physical (PHY) layer and medium access control (MAC) layer schemes as well as the hardware implementation [11], [12]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"6852463|3054454": ["Hence, the channel impulse responses between different antennas in a BS and a user have similar path delays, and the channel vector between the BS and the user can be modeled as [16]"]} +{"4403493|26259297": ["Hence, a sophisticated channel tracking method for hybrid mmWave massive MIMO is still waiting for investigation [26]."]} +{"4403493|8323234": ["Nevertheless, the length of the pilot sequence for beam training is equal to BMax, which is much smaller than that required by the conventional beam cycling method [19].", "1) Initialization: In the beginning of the transmission, we use the conventional beam cycling method [19] that trains beams in all directions to derive the prior CSI hk(m) and DOA \u03b8 (0) k (m) of each user.", "However, all these methods transmit signals to the direction of a single selected beam, which brings the power leakage issue [19]\u2013[21].", "For system with limited number of RF chains, a beam training method was provided in [19], which spends significant resources to train the beam in all directions and suffers from large computation complexity."]} +{"13848655|16362395": ["SVM is a preferred multi-class classification algorithm [21] in machine learning, which is good at handling linearly inseparable dataset of samples and avoiding over-fitting."]} +{"678032|8323234": ["Rain attenuation in different frequency bands [35]. needs to increase with the bandwidth if the signal-to-noise ratio (SNR) should remain intact [14].", "[14] is a recent overview paper on signal processing for mmWave MIMO.", "However, since the analog circuit can only partly adjust the signals, it is hard to adjust the beam to the channel conditions and this leads to a considerable performance loss [14], particularly for mobile users.", "However, realizing a fully digital MIMO implementation at mmWave frequencies is a non-trivial task, using current circuit design technology [14].", "The analog circuits of the hybrid architecture can be implemented by different circuit networks, leading to different hardware constraints [14], [115], [116].", "Yet, reference [14] is focused in mmWave MIMO and other topics e.g., recent developments of channel measure/modeling, multiple access, standardization, \ufb01eld test are missing.", "Note that references [7], [12]\u2013[14], [16] gave excellent overviews of some aspects of mmWave mobile networks from different aspects.", "In addition, fully analog architecture can only support single-stream transmission, which cannot achieve the multiplexing gain to improve spectral ef\ufb01ciency [14]."]} +{"4374445|26259297": []} +{"4374445|8323234": ["A and in [22] and [37] (sometimes called beamspace method).", "This happens when the BS is installed on very tall building and there are a limited number of surrounding scatterings [32] or when mmWave scenario is exploited [22].", "2The OBS-HP coincides with the exiting beamspace method [22], [37].", "With limited RF chains, such channel estimation is normally obtained by sequentially sending the pilot and sweeping the beam on all directions, named as beam cycling [22].", "Remark 5: For conventional beam cycling based hybrid channel estimation [22], it needs to sweep the beam over all M antennas, which costs M/K times of training.", "A beam cycling method has been developed in [22], where channel estimation comparable to the full digital system is achieved by sweeping the beam directions over all spatial region."]} +{"9077801|8323234": ["First, beam domain channels at mmW/THz bands exhibit an approximately sparse nature [2], [47] and therefore, BDMA is well suited for such channels [17].", "Second, transmitters only need to know the statistical channel state information (CSI), which avoids the challenge in acquisition of the instantaneous CSI required for conventional massive MIMO transmission over mmW/THz channels [2] and is attractive for transmission in high mobility scenarios [33]."]} +{"27962181|26259297": ["Compared to the compressive sensing approaches which try to recover CSI from fewer sub-Nyquist sampling points [8], [9] or the angle-space methods which exploit the intrinsic angle parameters [10]\u2013[12], CCM based channel estimation would offer additional statistical knowledge about the channel variants and therefore achieve much better channel estimation accuracy."]} +{"27962181|8323234": ["1) Initial Angle Estimation: Owing to the narrow AS, namely, \u0394k is small (especially, \u0394k is zero in mmWave scenarios [7]), hk in (1) will exhibit sparsity or low-rank property in the angle domain and thus it could be approximately represented by discretizing the integral of (1) as", ", channel correlation or channel covariance matrix (CCM), and are built on the facts that the finite scattering propagation environments [7] as well as the high correlation between compact antenna elements make highdimensional CCMs sparse or low-rank.", "To proceed, we adopt the following assumptions from many theoretical works [7], [15], [16], [19], [32] and measurement tests [33]\u2013[37]:"]} +{"4883076|14776754": []} +{"20835454|10937383": ["full-dimension MIMO (FD-MIMO), systems are introduced to fit a large number of antenna elements on the base station in reality [23]."]} +{"57762540|11498812": ["This doubly selective channel fading imposes a signi\ufb01cant challenge for high-speed wireless communication [1], [2]."]} +{"17263094|10937383": ["In fact, the LTE standardization body that is investigating high-order MIMO systems with up to 64 antennas (Release 13), has declared this problem as a major challenge for future LTE networks [24]1.", "1For example, with 64-antenna base stations, the need to learn the downlink channels consumes 48% of the traffic generated by the base station, simply to send per-antenna reference signals [24].", "Yet, only point-to-point MIMO multiplexing can be performed efficiently in current networks [24]."]} +{"3013154|3054454": ["It is worth mentioning that previous published work used intra-cluster subpaths to successfully model the indoor multipath channel [86], [87], [89]."]} +{"12078118|8909218": ["In current wireless networks operating below 5 GHz, two main approaches are being pursued for addressing this challenge: small cells to increase spatial re-use of spectrum [1], [2], and multiantenna multiple-input multiple-output (MIMO) technology for managing interference and increasing spectral efficiency [3], [4]."]} +{"85459691|22833814": ["l of future wireless communications (the emerging 5G or beyond 5G) is to support reliable communications in high-mobility scenarios, such as on high-speed railways with a speed of up to 500 km/h [1], [2] or on vehicles with a speed of up to 300 km/h [3], [4]. Currently, the dominant modulation technique for 4G and the emerging 5G is orthogonal frequency division multiplexing (OFDM). For the high-mobi"]} +{"85459691|8323234": ["The time-variant channel associated with the (p+1)-th antenna (p = 0, 1, \u00b7 \u00b7 \u00b7 , Nt\u22121) can be expressed as [18]", "When a typical uniform linear array (ULA) of antennas is considered, the spatial angle associated with \u03b8si is defined as \u03c8si = d \u03bb sin \u03b8si [18], where d is the antenna spacing and \u03bb is the wavelength of the carrier frequency."]} +{"4875875|8999817": ["Different kinds of hybrid architectures have been proposed in literature so far [6]\u2013[9]."]} diff --git a/edge/graph_198179889.jsonl b/edge/graph_198179889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11e2056355e42c041e5bccdb5de12ec20f49ae71 --- /dev/null +++ b/edge/graph_198179889.jsonl @@ -0,0 +1 @@ +{"20714|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} diff --git a/edge/graph_198188588.jsonl b/edge/graph_198188588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bb74865fba204b5ee85d979f76800110e02d92c --- /dev/null +++ b/edge/graph_198188588.jsonl @@ -0,0 +1 @@ +{"65416464|84832337": ["At the end, this attack results in denial of service (DoS) when used against all on-demand ad hoc network routing protocols [4].", "This tunnel is used to disrupt the data packets\u2019 routing, gain unauthorized access, and/or create denial of service attack [1, 2, 4].", "Mokhtar and Azab have classified security attacks based on the network layer it target, physical layer, link layer, network layer, transport layer, application layer [4].", "These data are then used by an attacker to track the vehicles, predict their future behavior, and affect their transmission performance [4]."]} diff --git a/edge/graph_198192705.jsonl b/edge/graph_198192705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7603f337af40be55454b19922f666f23f180065a --- /dev/null +++ b/edge/graph_198192705.jsonl @@ -0,0 +1,17 @@ +{"23410368|28771682": ["moving platform and collects a vertical slice of the data cube at one time [10].", "A snapshot imager collects an entire data cube at one time without scanning [10].", "There are three challenges in lightweight whiskbroom hyperspectral imagers: 1) shorter exposure time is needed for high spatial resolution because a whiskbroom sensor collects only a single column of the data cube at one time [10]; 2) a high-speed attitude and position sensor is needed for geographical registration, especially when the attitude of the platform is unstable; and 3) in general, whiskbroom sensors are large and heavy due to the complicated mechanical equipment for scanning."]} +{"113997594|18685876": []} +{"103967167|427994": ["These sensors including proximal and remote sensing techniques, which differ in their radiometric, temporal, spectral, and spatial resolution and as a result, in their monitoring ability.([63]) The spatial resolution may be millimeters (drone-based cameras), 0.", "The HyspIRI mission will be launched during the next decade and will comprise of two instruments: a VIS-NIR-SWIR imaging spectrometer and an eight-band TIR multispectral imager, plus an intelligent payload module (IPM) for on-board large data sets processing and quick downlink of selected data.([63,158]) The HyspIRI Figure 2."]} +{"103967167|9223553": ["According to Zhang and Zhou,[163] to obtain quantitative soil moisture under vegetation cover using satellite data, two-source ALEXI models can be utilized to separate the soil and vegetation information and describe the energy exchange among the soil, vegetation, and atmosphere.", "According to Zhang and Zhou,([163]) to obtain quantitative soil moisture under vegetation cover using satellite data, two-source ALEXI models can be utilized to separate the soil and vegetation information and describe the energy exchange among the soil, vegetation, and atmosphere.", "acquisition condition, environmental situation, and the interpretation of different surface variables from satellite data at the temporal and spatial data scales.([163])"]} +{"10105390|427994": [", 2006a), or general forest health decline (Lausch et al., 2016), we yet lack a systematic, comprehensive, and global assessment of the methods best suited for the remote sensing of varying forest insect agents.", "\u2026(Hall et al., 2016), focussing on specific insect types (Rullan-Silva et al., 2013; Wulder et al., 2006a), or general forest health decline (Lausch et al., 2016), we yet lack a systematic, comprehensive, and global assessment of the methods best suited for the remote sensing of varying\u2026"]} +{"3222473|18744521": []} +{"117764485|28771682": ["If all bands are simultaneously captured, i.e. within the same exposure and thus, the full image cube is recorded without a scanning process, the cameras are referred to as snapshot cameras (Hagen, 2012)."]} +{"51768512|8665024": ["Furthermore, the interested reader is referred to [15] for a comprehensive list of spectral imaging sensors that extend the examples in this manuscript."]} +{"51768512|28771682": ["Snapshot systems record all of the bands at the same time [43,76,77], which has the advantage that no spatial co-registration needs to be carried out [43]."]} +{"51768512|8985853": ["If the number of bands is large, for example 20 or 100, the separate orientation of each band can result in a significant computational challenge, and therefore, solutions based on image registration are more feasible [109]."]} +{"24992843|11112426": ["Another group of abundance estimation approaches based on blind-source separation, which does not require endmember signatures to be known a priori, has been developed [134].", "ENDMEMBER EXTRACTION The identification of endmembers is a challenging problem, for which many different strategies have been proposed [134].", "Unmixing thus amounts to finding the fractional coverage (abundance) of each endmember in each pixel of the scene, which can be approached as a geometrical problem [134].", ", algorithms without the pure pixel assumption) [134]."]} +{"3480922|15589021": [", temperature, umidity), and longer lifetime [6,7,10].", ", temperature, humidity), and longer lifetime [6,7,10].", ", metal-oxide semiconductors, polymers, carbon nanotubes) [5,10]."]} +{"7251768|11112426": []} +{"53480684|206051485": []} +{"4360551|2910221": []} +{"52966942|13897660": []} +{"8665024|11112426": ["According to Bioucas-Dias [54] spectral unmixing (see, for example, [74,75]) purpose is to restore the ability of ascertain materials, i."]} diff --git a/edge/graph_198193575.jsonl b/edge/graph_198193575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93e6d2ac22b89b49e27ad470e8d1da1dcef4fdc3 --- /dev/null +++ b/edge/graph_198193575.jsonl @@ -0,0 +1,7 @@ +{"110671040|1230643": []} +{"27944361|206901977": ["the lifespan of WSNs [84]."]} +{"27944361|10271586": ["In WSNs time synchronization has been considered an important research area over the past decade [70]."]} +{"40263099|8569943": ["Nowadays, among a variety of technologies, the molecularelectronic transfer (MET) technology is, likely, the only one to offer a reasonably priced commercial product of the required performance [4]."]} +{"57390684|206901977": ["More detailed discussion can be found in Reference [17]."]} +{"57390684|12029139": ["However, the energy harvesting rate is on the order of micro-watts with low efficiency [15] and is insufficient for high-power high-fidelity monitoring of sudden events."]} +{"53475838|7505270": ["The so-called bioMEMS gave evidence of their potential for the medical field especially, in the last five years [21]."]} diff --git a/edge/graph_198229387.jsonl b/edge/graph_198229387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ca80c1cfed80c61bdcd151834d63e34f4c58a94 --- /dev/null +++ b/edge/graph_198229387.jsonl @@ -0,0 +1,9 @@ +{"16586719|386036": [", and surveys at [19,8]."]} +{"16320392|2082499": ["Another related problem is record linkage [34], [35], [36], [37], [38], [39], [40], [41] (also called duplicate detection, entity matching, and reference reconciliation) in the database community."]} +{"16320392|8310135": []} +{"16320392|386036": []} +{"9229283|10500613": []} +{"1757354|3330313": []} +{"12126405|12860838": ["Several ontologies mapping/integration/merging techniques, tools and platforms allows for the connection of different datasets on the schema level [6]."]} +{"15886037|10500613": []} +{"15886037|386036": ["Thus, in order to determine suitable classification criteria for data linking techniques, we considered both the techniques themselves and existing classification schemas proposed in the literature on database record linkage (Elmagarmid et al., 2007; Winkler, 2006; K\u00f6pcke & Rahm, 2010) and schema matching (Rahm & Bernstein, 2001; Euzenat & Shvaiko, 2007).", ", 2003), (Elmagarmid et al., 2007), (Winkler, 2006)) and we refer the reader to these papers for the detailed description of different similarity functions.", "In the record linkage research there is a distinction between field matching and record matching techniques, which focus on two different stages of the linkage process (Elmagarmid et al., 2007).", "In this case we talk about anaphora resolution or named entity disambiguation (Elmagarmid et al., 2007)."]} diff --git a/edge/graph_198229637.jsonl b/edge/graph_198229637.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8312d6bdb761a9fc5af5888f0f7e3b6738b17fb6 --- /dev/null +++ b/edge/graph_198229637.jsonl @@ -0,0 +1,22 @@ +{"14188880|10770351": ["The theory of controlled queueing systems have been developed for optimal control of admission, service, routing and scheduling of jobs in queues, and networks of queues [35, 65, 73, 74, 76].", "Recent results on that topic (including even more general models) have been presented by Glasserman and Yao [24], and \u2014 addressing controlled queueing systems \u2014 by Rykov, Stidham and Weber [66, 73, 74]."]} +{"16422413|10770351": ["(For surveys of Markovian decision process models for control of networks of queues, see Stidham [15] and Stidham and Weber [17].", "[20] R. Weber and S. Stidham.", "(For surveys of Markovian decision processmodels for control of networks of queues, see Stidham [15] and Stidham and Weber [17].)", "Among themost general and successful applications of this approach are Weber and Stidham [20], Veatchand Wein [19], and Glasserman and Yao [6, 7].", "Lecture Notes in Economics and Mathematical Systems.26\n[17] S. Stidham and R. Weber."]} +{"29753465|1708582": []} +{"10479049|10770351": ["Here we shall only review those results closely related to our problem, and refer the reader to a comprehensive survey by Stidham and Weber (1993) for a summary of the research in this area."]} +{"20629329|10770351": ["Stidham and Weber [40] provide a nice survey of how to use Markov decision process to analyze a queueing control problem when the transition rate is bounded."]} +{"52092124|10658846": []} +{"40715261|10770351": ["It was introduced in Hajek [6] for the study of assignment rules to a queue, its relation to monotonicity results for tandem queues was recognized in [ 15 ] (on top of p. 295)."]} +{"6556803|14132386": ["Moreover, routing protocols are responsible for discovering the optimized routes in multi-hop transmissions [48]."]} +{"6556803|28670512": ["can be transformed to an MDP with belief state [34], [35]."]} +{"6556803|9494512": ["In many locations, solar energy is considered the most practical source for WSN recharging [88]."]} +{"6556803|12060835": [", thermal and radiant energy, for a sensor node\u2019s battery [85]."]} +{"18603598|9123526": ["Ontologies for user requirements and virtual units of infrastructure resources are defined and represented by the Web Service Modelling Language (WSML) [60]."]} +{"52902221|10770351": ["For multiple-server queueing networks, such as cyclic queues or tandem queues, the monotone structure of optimal service rates is also studied [13], [14]."]} +{"123502699|10770351": []} +{"57825684|10658846": []} +{"207682218|10770351": ["The theory of controllable queueing systems has many applications involving the control of admission, servicing, routing and scheduling of jobs in queues and networks of queues [6,15,19, 20 ].", "Extensive results on monotonicity properties of optimal policies for queueing systems together with a vast bibliography on this theme can be found in [19, 20 ]."]} +{"42716702|14379823": ["Different aspects of CAC design and performance analysis, particularly in the context of broadband integrated service digital network (B-ISDN) based on asynchronous transfer mode (ATM) technology, have been investigated in [2]."]} +{"8133722|141053": ["[2] survey MAC protocols in wireless ad hoc networks."]} +{"11209790|10770351": []} +{"31898047|10770351": ["For a comprehensive knowledge, audience can refer to the books and survey papers (Kitaev and Rykov, 1995; Sennott, 1999; Stidham and Weber, 1993).", "For example, the monotonicity of optimal policies has been studied for simple tandem queues and cyclic queues (Stidham and Weber, 1993)."]} +{"32969525|10770351": ["Deep results regarding the monotonicity properties of optimal policies of admission to queueing systems, together with a vast bibliography on this theme, can be found in [12, 13 ]; for another approach see also [1,2]."]} +{"18758584|10770351": ["(For surveys, see Stidham 1985, Stidham and Weber 1993."]} diff --git a/edge/graph_19825066.jsonl b/edge/graph_19825066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73f3e5c67bf733c294dc583d46de3671ed9afa4f --- /dev/null +++ b/edge/graph_19825066.jsonl @@ -0,0 +1,31 @@ +{"20613883|5646762": ["These techniques have proved to obtain more accurate solutions than classical techniques using less memory [7].", "The encoding is a simple centroid-based representation [7]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"2804275|60455": ["As mentioned earlier, Table I describes various kinds of document representation (used for IR) and the tasks performed (for generalization) [2] in WCM.", "Table I [2] shows the different techniques used by various authors for document representation in IR of web content mining (to be explained in detail in Section III) for semistructured documents."]} +{"2804275|954543": ["A recent review [51] is a testimony in this regard."]} +{"6892981|7158350": ["CLASSIFICATION is one of the core and challenging tasks [1], [2] in data mining [3], [4], pattern recognition [5], web mining [6], bioinformatics [7], and financial forecasting [8], [9]."]} +{"6892981|60455": ["CLASSIFICATION is one of the core and challenging tasks [1], [2] in data mining [3], [4], pattern recognition [5], web mining [6], bioinformatics [7], and financial forecasting [8], [9]."]} +{"5646762|191396": ["data objects and disclosed clusters [132].", "Several dissimilarity measures can be employed for clustering tasks [72], [132].", "It is important to stress that comprehensive surveys on clustering have been previously published, such as the outstanding papers by Jain et al. [73], Jiang et al. [74], and Xu and Wunsch II [132], just to mention a few.", "[74], and Xu and Wunsch [132], just to mention a few."]} +{"13215551|1437067": []} +{"15077595|63137": ["In order to better capture the multi-modality \nof the objective function than the traditional model-based methods which use only a single model, we \npropose a framework of using a population of models with an adaptive mechanism to propagate the population \nover iterations."]} +{"9706229|13215551": ["One of the few exceptions is the Grammar Based Ant Programming (GBAP) algorithm [15, 16], which does not follow the sequential covering.", "The strategy of creating one-rule-at-time, where the creation of each rule is an independent search problem, can lead to the problem of rule interaction\u2014the creation of a rule a\ufb00ects the rules that can be created in subsequent iterations."]} +{"15417911|365692": ["More details of evolutionary algorithms for decision tree induction can be found in [2].", "While the research in decision tree induction with ACO algorithms remains almost unexplored, evolutionary algorithms (non-ACO) have been applied for decision tree induction [2]."]} +{"15417911|14808716": ["Several heuristics for choosing attributes have been used in the literature [23, 24, 33]."]} +{"15417911|13215551": ["Most ACO algorithms for classification in data mining have focused on extracting classification rules [22, 18].", "Most of the research using ACO algorithms for the classification task in the context of data mining have been focused on discovering classification rules, as implemented in the Ant-Miner algorithm [28] and its many variations, which have been recently reviewed in [22, 18]."]} +{"1303625|10542845": []} +{"10619779|1386147": ["In EMO, a set of the best trade-off solutions is evolved along the Pareto front in a single optimisation run by keeping the objectives separate/independent in the evolution [12].", "Other mechanisms to promote diversity in EMO include varying the size and/or structure of the learnt models [28][12], or partitioning of the training set [30][31]."]} +{"7847316|18782652": ["Rule pruning is a commonplace technique in data mining [3].", "tually, there are several classification-rule discovery algorithms that were explicitly designed to improve rule set simplicity, even at the expense of reducing the predictive accuracy [1], [3], [4]."]} +{"16295078|10096622": ["Swarm intelligence is an effective way to handle these data, and to obtain \u201cuseful\u201d information [23]."]} +{"16295078|4474193": ["The dynamic problems, sometimes termed as non-stationary environments, or uncertain environments [19], dynamically change over time.", "In all these cases, additional measures must be taken so that swarm intelligence algorithms are still able to solve satisfactorily dynamic problems [19]."]} +{"16295078|13215551": ["Generally, there are two kinds of approaches that apply swarm intelligence as data mining techniques [27]."]} +{"6342690|1940388": ["A review of security threats to WSNs and a survey of defense mechanisms is presented in [26]."]} +{"6342690|12817488": ["A survey of data aggregation algorithms used in WSNs is presented in [22]."]} +{"6342690|1230643": ["This scenario is used in most monitoring applications in agriculture [7], [8], microclimate [4], [5], [9] and habitat surveillance [10]\u2013[12], military operations [13], and disaster relief [14]."]} +{"6342690|1708582": ["RL [41], [42] is a sub-area of machine learning concerned with how an agent should take actions in an environment so as to maximize some notion of a long-term reward."]} +{"6342690|6555395": ["A survey of NN learning methods, their properties and applications is presented in [32]."]} +{"41882643|191396": []} +{"10096622|12817488": ["PSO algorithms for WSN localization are summarized in Table I."]} +{"16767807|4474193": []} +{"16767807|15273230": []} +{"15702391|13215551": []} +{"11593153|1386147": ["Evolutionary multi-objective optimisation (EMO) offers a useful solution to the problem of optimising multip le conflicting objectives [8][9][10].", "Evolutio nary multi-objective optimisation (EMO) is a useful techniq ue to capture this trade-off in the learning process [8][9][10 .", "ing approaches to classification can outperform canonical single-predictor classifiers [8][13][26][27].", "However, as the front of non dominated solutions has as much information as any single individual, utilising thecombinedclassification ability of these solutions in a competitive voting or ensemble-based scenar io can be beneficial [8][33][29].", "Some research provides recommendations on how to choose ensemble sizesa priori and suggests that smaller ensembles can be more accurate than large ensembles [8][27][38].", "In an ensemble of classifiers, one simple classification strategy uses a majority voteapproach: each ensemble member votes on what class label to assign to a given data instance, and the class label with the most number of votes determines the class of that particular inst ance [8].", "In [8], the structure of the NN models (e.", "Some EMO approaches use other mechanisms for diversity [8][32][33]."]} diff --git a/edge/graph_198315528.jsonl b/edge/graph_198315528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3eb40c14b455bcec77dc1addf33ae3e93357b604 --- /dev/null +++ b/edge/graph_198315528.jsonl @@ -0,0 +1,8 @@ +{"110713111|2357830": []} +{"44598183|2357830": []} +{"2694995|2357830": []} +{"38182059|2357830": []} +{"1631693|2357830": ["Juels [2] noted that serial level identification alone without secure verification of the identities can be a powerful anti-counterfeiting tool.", "[2]), and we think that it merits a recognition.", "The research community addresses these threats primarily by trying to make tag cloning hard by using cryptographic tag authentication protocols [2].", "On the one hand, RFID brings improvements to security vis-a-vis older Auto-ID technologies by providing increased visibility and the possibility to use cryptography [2]."]} +{"14447158|2357830": []} +{"114938742|3493224": []} +{"14915078|2357830": ["The potential of unique numbering of objects without tag authentication is discussed by Juels in [19]."]} diff --git a/edge/graph_198319329.jsonl b/edge/graph_198319329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c10b41803fd999136f35435bc03010c3e14b01c5 --- /dev/null +++ b/edge/graph_198319329.jsonl @@ -0,0 +1,24 @@ +{"2162002|3767252": []} +{"174799395|22163846": ["1) Compression: Compression techniques are roughly categorized into three groups: Parameter sharing and pruning methods, low-rank approximation methods, and knowledge transfer methods [18], [19]."]} +{"47002746|12127129": ["The first is action detection, which can detect excessive movements of the driver and passenger [25], [26]."]} +{"47002746|3540699": ["264 [33] format with a baseline profile."]} +{"12049975|2445817": ["Different tasks consume different kinds of resources, e.g., image processing consumes CPU resources (FLOPS) and data transmission consumes bandwidth resources (Mbps)."]} +{"6299685|3330461": ["Our proposed protocol is specific to the memory replication traffic, and not to any uplink traffic type, and its validity is conditioned by the evolution of D2D communication technologies [11], [26], [27].", "\u2026neighbor device j performs the following:\n2.1) solicits memory replicas periodically from neighbor devices until it receives at least d = O(log(n/k)/ updated replicas ( \u2208 (0, 1)) from N \u2282 Neigh(j) neighbor devices; 2.2) aggregates all the received replicas into one compressed replica yj =\u2026"]} +{"6299685|7644489": ["Our proposed protocol is specific to the memory replication traffic , and not to any uplink traffic type, and its validity is conditioned by the evolution of Device-t oDevice Communication technologies [11], [26], [27]."]} +{"52968456|8921624": ["Various software verification techniques have been proposed and used for quite some time [55], [56], [57], [58], [59]."]} +{"19100478|1687471": ["FPGA can be dynamically reconfigured, so it is suitable for various algorithms, including but not limited to machine learning [21], [22]."]} +{"17675973|10837932": []} +{"206779368|10355303": ["5In practical object tracking systems, this synchronization step is typically automated [19]."]} +{"4722469|9104850": ["Web caching is an established technique of reducing userperceived latency experienced when retrieving information from across the World Wide Web [38].", "It has already been established that document retrieval systems over the Internet, i.e. the World Wide Web (WWW), can reap extensive benefits with caches at the edge [15]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"54463662|3540699": ["Existing video encoding techniques such as H.264 [63], on the other hand, may be highly ineffective when being applied to such VR frames, due to their ignorance of the speci\ufb01c VR frame context and the subsequent \ufb01xed encoding strategies.", "Balancing between delta size and image quality size of a delta image is much smaller than the full VR frame, each delta image, after being processed by existing lossy compression techniques such as H.264 [63], could be ef\ufb01ciently decompressed by the mobile HMD before the next delta image arrives."]} +{"54463662|469744": ["Augmented Reality (AR) [14] seamlessly overlays the virtual objects onto the physical world, so as to enhance users\u2019 perception to the natural environment and offer enriched interactive user experience."]} +{"58006703|40910013": []} diff --git a/edge/graph_198320371.jsonl b/edge/graph_198320371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aadbc13bcd5d8c098f3d959b5edd3a8603efe4eb --- /dev/null +++ b/edge/graph_198320371.jsonl @@ -0,0 +1,6 @@ +{"30639956|10542845": ["The EC based stochastic search and optimization algorithms are Evolutionary Programming (EP), Evolutionary Strategies (ES), Genetic Algorithms (GA), Differential Evolution (DE), Estimation of Distribution Algorithm (EDA) and Swarm Intelligence (SI) algorithms [19], [20]."]} +{"207190974|15782139": []} +{"1033682|174797842": []} +{"623013|15782139": []} +{"33928976|5246835": []} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} diff --git a/edge/graph_198329134.jsonl b/edge/graph_198329134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da73dfbe5b232edc3ca7a7441035d53abe25fb83 --- /dev/null +++ b/edge/graph_198329134.jsonl @@ -0,0 +1,3 @@ +{"58393581|9554464": ["\u2022 Data aggregation and data fusion[ 3 , 4]. Aggregation and compression of data allows to reduce communication cost \u2022 Recovery effect."]} +{"10178899|1230643": ["\u2026for example, random deployment in inaccessible terrains and cooperative effort, offer unprecedented opportunities for a broad spectrum of civilian and military applications, such as industrial automation, military tactical surveillance, national security, and emergency health care [1], [2], [3]."]} +{"21406385|33286487": ["As a classical time-frequency representation, Wigner-Ville Distribution (WVD) [11]-[13] has been widely and successfully applied in fault diagnosis field such as induction machine diagnosis [14], [15], short circuit detection [16] and so on."]} diff --git a/edge/graph_198329881.jsonl b/edge/graph_198329881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198340905.jsonl b/edge/graph_198340905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3661e27289f1f2e0372b1fd452671617f6081f8 --- /dev/null +++ b/edge/graph_198340905.jsonl @@ -0,0 +1,5 @@ +{"30850639|16954591": ["There are number of ontology design methodologies (Iqbal et al. 2013), however none of these are appropriate for the design of an application ontology."]} +{"12748227|627405": ["\u2026of journal, workshop and conference proceedings published between 2005 and September 2013 in English; \u2022 Selection of multiple digital libraries with relevance to information research identi\ufb01ed by Brereton et al. (2007) and further supplemented with GIScience relevant digital libraries.", "The initial step consists of selecting eligible literature sources based on following criteria: \u2022 Consideration of journal, workshop and conference proceedings published between 2005 and September 2013 in English; \u2022 Selection of multiple digital libraries with relevance to information research identified by Brereton et al. (2007) and further supplemented with GIScience relevant digital libraries."]} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/edge/graph_198353600.jsonl b/edge/graph_198353600.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c636b22c1013229daace5d6bea1c4057c9dd7c1 --- /dev/null +++ b/edge/graph_198353600.jsonl @@ -0,0 +1 @@ +{"16909184|5254998": []} diff --git a/edge/graph_198358960.jsonl b/edge/graph_198358960.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..320f37dcf2a9959f57fae197d8f59d4a89903ae7 --- /dev/null +++ b/edge/graph_198358960.jsonl @@ -0,0 +1,11 @@ +{"2332366|18740719": ["Research challenges faced by SCADA systems in risk assessment are outlined in [37] and [38]."]} +{"2332366|86629084": []} +{"7333077|595093": ["Thus, smart grid has attracted great attention not only from government but also from the industry and academia for its high fidelity powerflow control, self-healing, energy reliability, and energy security [5,6]."]} +{"7333077|121289": ["Because group communications are indispensable in SCADA as mentioned before, group key is one of the most important key management paradigms that should be well-designed [15]."]} +{"11901088|18977370": ["Among system anomaly detection method for security monitoring of network systems, rule based, and profile based techniques and statistical models, and cognition models are available [12]."]} +{"28892501|6952653": ["There are many definitions of the meaning of agent I found in the literature but the widely accepted definition of an agent is that which stated by Wooldridge and Jennings (1995) who defined agent as:\n\u201c\u2026 a hardware or (more usually) software-based computer system that enjoys the following\u2026"]} +{"12579298|36784649": ["ONE-CLASS CLASSIFICATION In binary and multiclass classification problems, the decision boundary of the classifier is supported by the presence of samples from each class, and the associated algorithms are designed to classify any sample into one of the several predefined classes [26].", "In industrial systems, the majority of the available data designates the normal functional mode, and it is very difficult to acquire data related to malfunctioning or critical states [26]."]} +{"8949390|2332366": ["However, to leverage efficiency and gain a competitive advantage, the systems are increasingly becoming connected to the Internet and cloud technologies [2]."]} +{"8949390|8914588": ["This complexity implies that developing and maintaining such systems are reaching the limits of human cognition [6][15].", "A detailed survey of autonomic computing models and applications is provided in [15]."]} +{"21908671|18740719": ["Botnets are also a serious alternative to hack ICS [6].", "SCADA systems are widely used in waste water treatment plants, petrochemical pipelines, electrical transmission lines and public transportation systems including railways[6-9]."]} +{"19633231|18977370": ["Jyothsna and Rama Prasad [8]."]} diff --git a/edge/graph_198359267.jsonl b/edge/graph_198359267.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d64e9b2375dc6e29e90e86a7e4ecd1ceda5a2689 --- /dev/null +++ b/edge/graph_198359267.jsonl @@ -0,0 +1,3 @@ +{"4544334|2398835": ["Detailed investigations on these tools are discussed in [47], [48]."]} +{"4544334|15529291": ["Hence, the appropriate linkage of articles with the right author\u2019s pro\ufb01le requires to solve the problem of author name ambiguity [9].", "The feature of veracity is added because data veracity is certainly important in scholarly data for issues such as author disam-biguation and deduplication [9]."]} +{"3336423|12574246": ["Finally, since OSNs are constantly growing, historic data are increasingly difficult and expensive to be collected (Batrinca and Treleaven 2015); the methods that contribute to the study of social networks\u2019 \u201carcheology\u201d can be of extreme importance."]} diff --git a/edge/graph_198360399.jsonl b/edge/graph_198360399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9236623f5f3c5d195bf693fd323d5d76d320891b --- /dev/null +++ b/edge/graph_198360399.jsonl @@ -0,0 +1,2 @@ +{"17992714|192934": []} +{"16176349|7158350": ["\u2026assumptions Permission \nto make digital or hard copies of all or part of this work for per\u00adsonal or classroom use is granted \nwithout fee provided that copies are not made or distributed for pro.t or commercial advantage and that \ncopies bear this notice and the full citation on the .rst page."]} diff --git a/edge/graph_198360918.jsonl b/edge/graph_198360918.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198366122.jsonl b/edge/graph_198366122.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2fd581ce43058b6214cffbd3e67b45dbe07f0780 --- /dev/null +++ b/edge/graph_198366122.jsonl @@ -0,0 +1,9 @@ +{"10335959|205007974": ["Moreover, PAMs can be connected to joints without any heavy and high frictional mechanism, making the overall system relatively light, wearable and yet powerful [6]."]} +{"6971984|205007974": []} +{"12642773|205007974": []} +{"27767583|6686730": []} +{"155088064|3314561": []} +{"2610359|6409498": ["For example, many soft tissues are modeled by Zener or Maxwell models [2], so jamming displays could provide a useful tool in medical simulation to present various types of tissue interactions.", "With sufficient modeling of the underlying jamming phenomenon, the mechanical parameters of the display can be tuned to better match existing rheological models of biological tissues [2] to further increase realism and broaden the display capabilities.", "In biological tissue modeling, the term stress relaxation describes a decrease in stress toward a steady-state value for a material in constant strain; when building a rheological model of springs and dashpots for such a system, stress relaxation requires a dashpot in series with a spring, known as the Maxwell viscoelastic model [2]."]} +{"115838445|29776467": []} +{"53715976|6409498": []} +{"53715976|469744": []} diff --git a/edge/graph_1983971.jsonl b/edge/graph_1983971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198452299.jsonl b/edge/graph_198452299.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..486536689cbec31d3d9699682f78da52239e4c24 --- /dev/null +++ b/edge/graph_198452299.jsonl @@ -0,0 +1,68 @@ +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"3550281|22221919": ["NOMA is one of the major candidates in the design of radio access techniques for 5G [122]."]} +{"3550281|3461906": ["interference management and some open research challenges have been discussed in [18]."]} +{"3550281|21418": ["million connections per square metre [4]."]} +{"3550281|4122595": ["[90]."]} +{"3550281|3055684": ["[14] have discussed a variety of topics including"]} +{"3550281|12029139": ["If the power of signal processing noise is denoted by \u03c3 2 sp, the maximum ID rate of receiver j decoded from the source [11] i can be written as", "in RF EH, but due to the inverse-square law, RF energy transfer is limited in terms of its coverage range [11].", "In [11], a survey is presented based on current research in radio frequency EH networks (RF-EHNs).", "has attracted significant attention in wireless communication networks [10], [11].", "These works [7], [11], [13] have provided valuable insights into foundational aspects of", "When the same receiver is changed to ID mode, ID rate can be calculated using the following equation [11], where W and \u03c3 2 represent the transmission bandwidth and noise power, respectively.", "Only a few survey and overview articles directly related to SWIPT and EH have been published [3], [7], [11], [13]\u2013[23].", "available spectrum while providing fair and efficient sharing of the available spectrum while protecting the primary user from collision [11]."]} +{"6820964|6959212": []} +{"6502061|7329149": []} +{"6502061|1598350": []} +{"6502061|206901977": ["Regarding greenWSN, the following techniques should be adopted [7], [9], [29], [30]: 1) Make sensor nodes only work when necessary, while spending the rest of their lifetime in a sleep mode to save energy consumption; 2) Energy depletion (e."]} +{"6502061|16335158": ["OVERVIEW OF SENSOR-CLOUD Defined by IntelliSys,1 sensor-cloud is \u2018\u2018an infrastructure that allows truly pervasive computation using sensors as an interface between physical and cyber worlds, the datacompute clusters as the cyber backbone and the internet as the communication medium\u2019\u2019 [13], [14].", "Attracting increasing interest from both academic and industrial communities, sensor-cloud [13], [14], [53] is actually a new paradigm, motivated by complementing 1) the ubiquitous data sensing and data gathering capabilities of WSNs as well as 2) the powerful data storage and data processing abilities of CC.", "With sensor-cloud integration, there are many favorable advantages [13], [14], benefiting the users and the WSN as well as the cloud.", "With that, towards green IoT, we review the latest developments in sensor-cloud [13], [14] which is a novel paradigm in green IoT, and further envision the future sensor-cloud.", "com/system-overview powerful cloud computing technologies to provide excellent data scalability, rapid visualization, and user programmable analysis\u2019\u2019 [13], [14]."]} +{"6502061|14650419": []} +{"6502061|2357830": ["\u2022 RFID (radio-frequency identification) [16]: a small electronic device that consists of a small chip and an antenna, automatically identifying and tracking tags attached to objects."]} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"5738192|1230643": ["Many applications of wireless sensor networks (WSNs) [1], such as structural health monitoring for the Golden Gate Bridge [2], agricultural rain-fed farming decisions [3], and forest fire detection [4], desire a long-lived WSN."]} +{"4562284|31245252": []} +{"4562284|17205659": []} +{"8639012|3055684": ["Another recent survey in [10] provides an overview of self-sustaining wireless communications with different energy harvesting techniques, from the perspective of", "Unlike [10], this survey focuses on the wireless charging strategies in communication networks with wireless energy"]} +{"8639012|12029139": ["Survey Scope Main Contribution [9] Wireless network with RF energy harvesting Review of i) fundamentals and circuit design for RF energy harvesting, ii) resource allocation schemes and communication protocols for various types of RF-powered wireless network, and iii) practical challenges and future directions.", "5) Near-field SWIPT System: As afore-introduced, SWIPT (see [9] and references therein) has been broadly investigated in RF-based wireless communication systems.", "A more detailed review on the conversi on efficiency of RF energy harvester implementations can be found in [9], [14].", "The reader can r efer to [9] for more detailed information about recent advances in radiative charging system.", "This survey differs from [9] in the following aspects: this survey i) covers various major wireless charging techniques, namely, inductive coupl ing, magnetic resonance coupling and RF/microwave radiation, from fundamental principles to their applications, ii) rev iews the existing international standards, commercialization and implementations, and iii) emphasizes on the transmitter-s ide (i.", "Our prev ious work in [9] presented a review of research issues in RFpowered wireless networks with the focus on the receiver-si de (i."]} +{"8639012|12681089": ["The far-field RF propagation models are well known in literatures [230], [231]."]} +{"8639012|12060835": ["In [12], the authors gave an overview of the sensor nodes powered by", "Existing literatures [12]\u2013[14] also presented relevant reviews"]} +{"18336791|21386749": ["[8] analyzes IoT security and privacy issues from the health care perspective and proposes an intelligent collaborative security model to minimize security risk."]} +{"2583020|10837932": ["As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|17960632": ["In fact, for hard real time applications the problem is not only the added delay but also the nondeterministic way in which that delay occurs (for more information on Real-Time MACs for WSNs the reader is referred to [9]).", "medium access is ruled out because of its nondeterministic delays, and reservation-based MACs will be preferred [9].", "As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|1940388": ["Security issues in WSNs are discussed in [58]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"117689368|21386749": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"54446993|21386749": ["This will improve our quality of life in different domains [5] as shown in Figure 1 including Energy [6], Safety, Security, Industry [7], Environment, Entertainment, and Healthcare [8]."]} +{"54446993|206901977": ["According to a recent report published by US Energy Information Administration (EIA) in 2017 [24], 64.7 million smart meters have been installed in electric utilities in 2015.", "This will improve our quality of life in different domains [5] as shown in Figure 1 including Energy [6], Safety, Security, Industry [7], Environment, Entertainment, and Healthcare [8]."]} +{"54446993|17756238": []} +{"37394652|1236072": ["Depending on the network structure adopted, the routing protocols for WSNs can be classified into flat network routing, hierarchical network routing, and location-based routing [2].", "This may result in early network partition [2]."]} +{"37394652|1230643": ["An N-to-1 multipath discovery protocol is proposed in Reference [17].", "Other applications of WSNs can be found in Reference [1].", "In Reference [19], the multipath routing is formulated as a linear programming problem with an objective to maximize the time until the first sensor node runs out of energy.", "We further assume that each sensor node carries an omni antenna and the energy consumptions for idle time, transmission and reception are 35, 660 and 395 mW; respectively (the same parameters as in Reference [5]).", "Various link cost functions have been proposed in the literature (e.g. Reference [26]).", "In this paper, we use the data aggregation algorithm proposed in Reference [25].", "Various data aggregation algorithms have proposed in the literature (e.g. References [22\u201325]).", "Finally, the multipath-based routing protocols, such as the schemes proposed in References [9\u201311], tend to enhance the reliability through the use of multiple paths.", "Directed transmission proposed in Reference [18] is one of the probabilistic routing techniques, which are derived from the flooding.", "In Reference [11], a multipath routing approach is proposed for the directed diffusion [5] to improve the resilience to node failures.", "In Reference [20], the multipath routing is formulated as a constrained optimization problem by using deterministic network calculus.", "The energy-aware routing is proposed in Reference [9]."]} +{"206894870|1230643": ["Coverage algorithms are classified based on applications they are targeted for such as security, environmental monitoring, and target tracking [19]; or, based on the nature of the algorithm such as centralized, localized and distributed [20]; or, based on the domain they are targeted for such as static and mobile networks [21] or, two-dimensional or three-dimensional networks [22]."]} +{"954107|29060869": []} +{"954107|193574": []} +{"8295786|19938676": ["However, 3.9G long term evolution (LTE) includes capabilities that exceed those of 3G mobile communications [9,10].", "\u2026without encryption due to used analogue modulation, (ii) limited sub-scribers due to used FDMA technique, (iii) power radiation of base station being unsafe and lack of a handoff process, (iv) limited to voice service, and (v) incompatible systems that lack a uni\ufb01ed international standard [8\u201310].", "The EDGE has been added to enhanced the packet-switched services and enabled new high speed data applications such as multimedia applications [9,10].", "However, GSM suffers from a low data rate, which prompted for an improvement in the cellular system by general packet radio services (GPRS) technology [8\u201310]."]} +{"8295786|14765802": ["Data traffic will increase to 82 GB per subscriber per year [1] due to the unprecedented demand for data high bandwidth video streaming, which will represent more than half of global mobile data traffic [2]."]} +{"8295786|2443013": ["Although the joint implementation of these mechanisms may provide very high data rates that are theoretically more than 1 Gbps for stationary users, further increases are limited due to the smaller number of available frequencies [11,16]."]} +{"8295786|24491750": ["The BS accounts for 57 % of the total energy consumption in cellular networks, and the power ampli\ufb01er (PA) has the highest energy consumption of the BS [46]."]} +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"9701786|205286988": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} +{"9701786|1236072": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"28468284|1902483": []} +{"1129832|28210515": ["Previous empirical studies in WSNs focused on complex, non-ideal behavior of low-power wireless links [2], [3], concurrent data transmissions [4], and the coexistence between WSNs and WiFi [5], [6], microwave ovens [7] and the smart grid [8]."]} +{"133607859|11105012": ["Database is generated and processed for the various applications [1].", "1: RFID Communication Model [1]", "Low cost tags using an efficient RFID authentication protocol [1] is one way function using an authentication protocol."]} +{"28022379|7686677": []} +{"14999784|1230643": []} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} diff --git a/edge/graph_198484817.jsonl b/edge/graph_198484817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4e5fa986478aafba64b5abdb8febea83c99c89b --- /dev/null +++ b/edge/graph_198484817.jsonl @@ -0,0 +1,6 @@ +{"4370300|11632848": []} +{"4787489|11632848": []} +{"207190974|15782139": []} +{"15019122|17652653": []} +{"639821|6832132": ["Other works have studied the cost of features in the setting of active learning during either training [33] or during testing [9, 20, 29, 62]."]} +{"5165407|6923178": ["positives and negatives) among all the users: TP\u00feTN TP\u00feTN\u00feFP\u00feFN; F-Measure, the harmonic mean of Precision and Recall: 2 Precision Recall Precision\u00feRecall; Matthews Correlation Coefficient(MCC) [43], the esti-", "Among the various metrics commonly adopted to evaluate machine learning classifiers, we picked the best classifier as the one achieving the highest Matthews Correlation Coefficient (MCC)(2) [43]."]} diff --git a/edge/graph_1987550.jsonl b/edge/graph_1987550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198897945.jsonl b/edge/graph_198897945.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfd4824fceaeb267820fad708c78fd043d9fb39e --- /dev/null +++ b/edge/graph_198897945.jsonl @@ -0,0 +1,7 @@ +{"207591052|7844555": ["systematically applied andyet su\ufb00er fromuncertainty problemsthat machinelearningis particularlywell suited to address, promising new advances. Debugging. Debugging isa commontask forsoftware engineers[191]. Debuggingislike trying to\ufb01ndaneedleinthehaystack;adeveloperhastorecognizerelevantinformationfromthedeluge of available information. A multitude of tools exist in this area whose main goal is to visu"]} +{"49584534|207591052": ["(1) Source code is structured: In contrast to natural language text which is weakly structured, programming languages are formal languages and source code written in them are unambiguous and structured [3]."]} +{"52298127|2088679": ["There is a huge gap of deep learning methods in this domain, with only a few notable papers concentrating on deep survival analysis [97]."]} +{"52298127|9928823": ["Among various machine-learning algorithms, \u201cdeep learning,\u201d also known as representation learning [29], is widely used in these applications."]} +{"46902434|393948": ["These new approaches use representation learning [16] \u2014 a significant departure from traditional approaches \u2014 to automatically extract useful information from the disproportionate amount of unlabeled software data."]} +{"1914494|393948": ["In our model, an AST node is first represented as a distributed, real-valued vector so that the (anonymous) features of the symbols are captured.", "To capture explicit structures in data, it may be important and beneficial to integrate human priors to the networks (Bengio, Courville, and Vincent 2013).", "A generic criterion for representation learning is \u201csmoothness\u201d\u2014similar symbols have similar feature vectors (Bengio, Courville, and Vincent 2013)."]} +{"174799700|207591052": ["Recently deep learning based approaches have attracted much attention to learn distributed representation of source code [57]."]} diff --git a/edge/graph_198898096.jsonl b/edge/graph_198898096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a67a93f97a29fb0fc669616e29f5166b993bb2d --- /dev/null +++ b/edge/graph_198898096.jsonl @@ -0,0 +1,32 @@ +{"6480652|207330385": ["Transfer learning has been widely applied to activity recognition [8], incremental learning [9], and online learning [10], [11]."]} +{"18125890|17516538": ["There is a long tradition of research on interpreting activities in the vision community (see, for example, the extensive surveys in [18,20])."]} +{"745350|393948": []} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"3654323|10092092": []} +{"3654323|2899523": [" sharply decreases in higher layers. Therefore, recent work has addressed this problem by deep DA, which combines deep learning and DA. There have been other surveys on TL and DA over the pastfewyears[67, 80,14,68, 109, 13]. Panetal. [67]categorizedTL underthreesubsettings,includinginductiveTL, transductiveTL,andunsupervisedTL,buttheyonlystudied homogeneous feature spaces. Shao et al. [80] categorized TL techniques into", "forth. In this section, we present different application examples using various visual deep DA methods. Because the information of commonly used datasets for evaluating the performance is provided in [109] in detail, we do not introduceit in this paper. 6.1. Image Classi\ufb01cation Because image classi\ufb01cation is a basic task of computervisionapplications,mostof the algorithmsmentioned above were originally", "e transfer. The surveywritten byPatel [68] onlyfocusedon DA, a subtopicof TL. [14] discussed 38 methods for heterogeneous TL that operate under various settings, requirements, and domains. Zhangetal. [109] werethe\ufb01rst to summarizeseveraltransferring criteria in detail from the concept level. These \ufb01ve surveys mentioned above only cover the methodologies on shallow TL or DA. The work presented by Csurka"]} +{"3654323|7559976": ["In one-step DA, the deep approaches can be summarized into three cases, which refers to [23] .", "[23] briefly analyzed the state-of-the-art shallow DA methods and categorized the deep DA methods into three subsettings based on training loss: classification loss, discrepancy loss and adver-", "hose from the survey papers by [18,23] to maintain consistency cross surveys."]} +{"767957|2670121": ["[6] grouped existing transfer learning studies with respect to the modalities used: video sequences [34], wearable [11, 37] and ambient sensors [16]."]} +{"767957|1118130": ["We have chosen speech as the focus of our study since it is a vital unit of behaviour to analyse social behaviour between people at the conversation level [32]."]} +{"13917994|7559976": ["For a comprehensive overview on domain adaptation, please refer to Csurka\u2019s survey paper [11]."]} +{"13917994|3761015": ["In this section, we shall first define the domain adaptation problem [40, 49], and then formulate the proposed correspondence-and-mapping method for the unsupervised domain adaptation problem."]} +{"16409793|17574321": ["Similar to that of N, the matrix \u03a3 in (4) is constructed by having its diagonal blocks made up by the covariance matrices of the UBM.", "\u2026GMM supervector m i of an utterance [1] is modeled as m i = m 0 + Tw (1) Here, assuming C mixture components and an F dimensional feature space, m 0 is the CF \u00d7 1 speaker-independent supervector obtained by concatenating the mean vectors from the Universal Background Model (UBM) [20].", "The features used for training the 512-Gaussian UBMs were 57-dimensional MFCCs (including the first and second derivatives).", "The total variability model assumes that a speaker-and channel-dependent GMM supervector m i of an utterance [1] is modeled as m i = m 0 + Tw (1) Here, assuming C mixture components and an F dimensional feature space, m 0 is the CF \u00d7 1 speaker-independent supervector obtained by concatenating the mean vectors from the Universal Background Model (UBM) [20]."]} +{"190432|41035405": ["The relay channel was introduced by Van der Meulen [528]; the capacity region for the degraded relay channel was determined by Cover and El Gamal [127].", "We would also like to thank Normam Abramson, Ed van der Meulen, Jack Salz and Raymond Yeung for their suggested revisions."]} +{"1041684|1932843": ["While exploiting knowledge from simulation models has been considered before, no principled way to trade off between the relative costs and accuracies of simulations and experiments exists [2].", "A typical approach is twostage learning, where algorithms are trained for a certain amount of time in simulation in order to warm-start the learning on the real robot [2]."]} +{"6781584|7559976": ["There has recently been a signi\ufb01cant amount of work on domain adaptation, particularly for computer vision [16], [17]."]} +{"6781584|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment [2].", "However, the complexity of unstructured realworld scenes has a tendency to confound these assumptions, and learning-based methods have emerged as a powerful complement [2], [3], [4], [5], [6].", "neural networks into the grasp selection process [2], [5], [4], [7]."]} +{"73728965|198898096": []} +{"73728965|58007100": ["In transfer learning and domain adaptation, a model learns from a source domain and aims to generalize to a differently distributed target domain [16,10]."]} +{"15545776|3330313": ["Outlier Detection: The outlier detection task addressed here is to identify irregular samples in a validation data set based on a model data set that only contains regular samples (Sch\u0308olkopf et al., 2001; Tax and Duin, 2004; Hodge and Austin, 2004; Hido et al., 2008).", "\u2026= b\n\u2211 \u2113=1 \u03b1\u2113\u03d5\u2113(x), (1)\nwhere\u03b1 = (\u03b11,\u03b12, . . . ,\u03b1b)\u22a4 are parameters to be learned from data samples,\u22a4 denotes the transpose of a matrix or a vector, and{\u03d5\u2113(x)}b\u2113=1 are basis functions such that\n\u03d5\u2113(x)\u2265 0 for all x\u2208D and for\u2113 = 1,2, . . . ,b.\nNote thatb and{\u03d5\u2113(x)}b\u2113=1 could be dependent\u2026"]} +{"3419504|393948": ["Recently, a new method of representing data has gained popularity: learning a high-dimensional representation from the collected data [Bengio et al., 2013]."]} +{"4903005|10175374": ["An in-depth explanation of why this works can be found in Ruder [2017]. Rather than training multiple tasks simultaneously, representation learning approaches where an", "While not interesting prediction tasks by themselves, these could be leveraged via multi-task learning, for example, by using these as auxiliary tasks or \u201chints\u201d [Ruder, 2017]."]} +{"4903005|2088679": ["The network can then be used in two strategies (Litjens et al., 2017): for feature extraction, or as a starting point for further training (fine-tuning) of the target task.", "A frequent problem when applying machine learning methods to medical images, is the lack of labeled data (Litjens et al., 2017; Weese and Lorenz, 2016; de Bruijne, 2016), even when larger sets of unlabeled data may be more widely available.", "In this paper we have used the following categories, inspired by Litjens et al. (2017): brain, retina, chest, breast, heart, abdomen, histology/microscopy and other applica-"]} +{"4903005|8601873": ["[2016] cell segmentation in microscopy graph-based, active Multiple Gass et al. [2012] segmentation in two applications graph-based Ciurte et al.", "other assumptions have been proposed [Foulds and Frank, 2010]."]} +{"1283257|1634674": ["Interested readers may refer to [45] for a recent survey."]} +{"312886|14171067": []} +{"18635500|393948": []} +{"11555904|393948": ["source error and feature representations that overcome the domain difference [3], [14], [15]. While much research has been devoted to the question of how to supervised minimize the source error [16], [17], relatively little is known about objectives that ensure domaininvariant feature representations. In this contribution we focus on the latter question. In particular, we deal with the task of unsuper"]} +{"24936482|192934": ["This behavior is what is often referred to as the curse of dimensionality [5, 32, 51, 61]."]} +{"8811996|18454590": ["Besides the Gaussian mixture model\u2013hidden Markov model (GMM\u2013HMM) architecture that dominates the acoustic modeling in speech recognition for many years, arti\ufb01cial neural networks have been historically used as an alternative model but with limited success [3] ."]} +{"15699494|4716814": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"15699494|1932843": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"3303012|3342225": []} diff --git a/edge/graph_198906012.jsonl b/edge/graph_198906012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2aec8070841f2c11c928afc5953b73cb01cf76ba --- /dev/null +++ b/edge/graph_198906012.jsonl @@ -0,0 +1,19 @@ +{"3761700|10290908": ["This process is termed spike sorting , and many algorithms have been suggested to do it e\ufb03ciently (see Lewicki (1998) or Rey et al. (2015) for a review).", "An additional study of Franke et al. (2015a) con\ufb01rms that clustering-based methods perform poorly for overlapping spikes, as shown by Lewicki (1998) and Quiroga et al. (2004)."]} +{"4832139|9270553": []} +{"6456220|9270553": ["There is an increasing interest in finding new communication channels between human and environment instead of using nerves and muscles (termed as brain\u2013computer interface, BCI) (Wolpaw et al., 2000; Vaughan et al., 2003)."]} +{"1138191|9270553": ["Brain-computer interface (BCI) has been proved to be a potential method to link the brain and the outward environment directly [6]."]} +{"11248506|9270553": []} +{"13642191|2916525": ["Continuous speech processes, like the production of single vowels or consonants, happen as fast as 50 ms, which makes them impossible to be measured with metabolic-based imaging techniques.", "See the excellent reviews (Price, 2012; Talavage et al., 2014) for more on this topic."]} +{"17571592|16362395": ["In their review of the literature on BCI classifiers, Lotte et al. 16 concluded that SVMs are particularly efficient, attributing the efficiency to their regularization property and immunity to the curse of dimensionality.", "While many early BCI studies satisfied this requirement, 24,38 later studies were often based on offline analyses of pre-recorded data 1 ; for example, the Lotte et al. 16 review of studies evaluating BCI signal-classification algorithms found most used offline analyses."]} +{"17571592|9270553": []} +{"17571592|192934": []} +{"29313707|2916525": ["fMRI is the de-facto standard in neuroimaging and has been instrumental in a variety of studies investigating speech and language, for reference, see [40] for a review."]} +{"14117914|10290908": []} +{"8978458|9270553": []} +{"196668900|29313707": []} +{"64579034|5914149": []} +{"64579034|16061274": []} +{"4697298|16362395": []} +{"4076997|9270553": []} +{"1356059|14866098": ["These include, but are not limited to, neural networks, discriminant analysis, Bayesian methods, Gaussian models, perceptrons, hidden Markov models, support vector machines, linear regression, and Kalman filters (for a review, see [144])."]} +{"1356059|10290908": ["When spike waveforms are recorded clearly enough to identify common stereotypical features, the spike events are called single unit activity (SUA), referring to the fact that the common features suggest a single neuronal source [47].", "Neural spikes are typically detected from the measured data using some form of thresholding, and may also be sorted based on the spike waveform [47]."]} diff --git a/edge/graph_198908265.jsonl b/edge/graph_198908265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198912172.jsonl b/edge/graph_198912172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4058b2b05cc662ca63e8b74455db8b25f38feafb --- /dev/null +++ b/edge/graph_198912172.jsonl @@ -0,0 +1,3 @@ +{"19079207|198912172": []} +{"10320756|8360759": ["A common contemporary approach to represent knowledge of a specific domain (in this case the older adult\u2019s nutrition care process domain) is in the form of ontologies (Rodr\u00edguez et al., 2014)."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/edge/graph_198928702.jsonl b/edge/graph_198928702.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66a519297b56a298d59b6ebbf1f4a5a189c3ae87 --- /dev/null +++ b/edge/graph_198928702.jsonl @@ -0,0 +1,7 @@ +{"52884404|14033856": ["To enhance transparency, several tools have been suggested [54, 63]; among these privacy dashboard is a well established instrument [102, 17, 22, 115].", "Transparency enhancing technologies and privacy dashboards For enhancing transparency, a wide selection of tools are listed in the surveys of Hedbom [54] and Janic et al."]} +{"14674468|5238287": []} +{"8556160|17756238": ["(1) Regarding context variables, we consider a prede\ufb01ned set of relation types, namely, and Squicciarini et al. [2011] and Toch et al. [2012] employ the same three types as an approximation to a user\u2019s relationships on a social network."]} +{"86556266|5882203": ["The study of interdependent privacy risks from an economic perspective follows the long line of research on interdependent security games surveyed in [32]."]} +{"1083483|7216886": ["[141] (privacy-preserving data publishing), Bertino et al."]} +{"1908824|5882203": []} +{"206745816|5882203": []} diff --git a/edge/graph_198930191.jsonl b/edge/graph_198930191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a2d4437e30c9e31110848fbecde85d3cf660694 --- /dev/null +++ b/edge/graph_198930191.jsonl @@ -0,0 +1,29 @@ +{"4711328|8323234": ["Therefore, employing low-resolution ADCs has been proposed as a natural solution, and extensive research has been conducted in such systems for mm-wave communications [2], [3]."]} +{"4364397|8323234": ["2818063 a higher data rates [1]\u2013[3], which have been recommended as an important part of the 5G mobile network."]} +{"1601089|8323234": ["Moreover, if the beamwidth is small, the fast acquisition and alignment of the optimal beam in millimeter wave channels is challenging [7]."]} +{"22830293|8323234": ["The advantages of remarkably wide bandwidth have encouraged wireless researchers to perform comprehensive studies to resolve practical challenges in the realization of mmWave communications [5], [6]."]} +{"52182890|8323234": ["Here, W\u0303 A is the actual analog combiner that factors in the constraints imposed by the phase shifters or splitters [2].", "(a) Equal Bit Allocation [1,1,1,1,1,1,1,1] (b) Equal Bit Allocation [2,2,2,2,2,2,2,2] (c) Exhaustive Search (ES) Solution (d) Upper Bound (No Quantization) (e) Proposed CRLB based BA", "One could use the technique proposed in [2], [14] for the same.", "Analysis of low resolution and in particular 1-bit ADCs for massive MIMO architectures has received a great deal of attention [2], [3], [7], [6].", "It is being considered both at sub-6Ghz frequencies and at mmWave frequencies [1], [2].", "As such, precoders and combiners both in analog and digital domains, are adapted based on the changing channel conditions [2], [3]."]} +{"6062313|1230643": [", the former is focused on data transmission and reception while the latter is aimed to estimate the behavior of local environments [2]\u2013 [4]."]} +{"6237870|8323234": ["INTRODUCTION M ILLIMETER wave (mmWave) communications utilize the spectrum range of 30 GHz to 300 GHz, where a large bandwidth is available, to achieve ultra high data rates [2]."]} +{"16321768|26071662": []} +{"4385815|26259297": ["In parallel, the massive multipleinput multiple-output (MIMO) technique is able to significantly boost the spectral efficiency and effectively suppress interference, hence has also received great interests recently [3]\u2013[6]."]} +{"2221695|3054454": []} +{"51921303|8323234": ["To this end, we adopt a virtual channel representation [42] for analytic tractability which captures the sparse property of mmWave channels [17], [43]."]} +{"51921303|3054454": ["The channel h\u03b3,k of user k is assumed to be the sum of the contributions of scatterers that contribute Lk propagation paths to the channel h\u03b3,k [24]."]} +{"13457620|8323234": ["The millimeter wave (mmWave) system utilizes a spectrum from 30 to 300 GHz, where a larger bandwidth is available, to pursue ultra-high data rates [1]."]} +{"2674022|8323234": ["Since mmWave channels are expected to have limited scattering [20], the ith user channel hi \u2208 C is assumed to be a sum of the contributions of p scatterings.", "Under the ULA assumption with uniformly spaced spatial angles \u03b8i = i/N , A becomes the Fourier transform matrix [20]; a(\u03b8i) = 1 N [ 1, e\u2212j2\u03c0\u03b8i , \u00b7 \u00b7 \u00b7 , , e\u2212j2\u03c0\u03b8i(N\u22121) ]T with \u03b8i = arcsin(i d ) where \u03bb is the signal wavelength and d is the distance between antenna elements.", "We adopt radio frequency (RF) preprocessing to exploit sparsity of mmWave channels [20] by projecting received signals onto the beamspace."]} +{"57755496|8323234": ["This trend is evident in millimeter-wave (mmWave) systems, which exploit large chunks of bandwidth at carrier frequencies of 30 GHz and above [1]."]} +{"44151828|10235514": ["As for the RF chains, the maximum numbers are 32 and 8 for the BSs and UEs, respectively [210], [223].", "include two core physical layer (PHY) technologies (mmWave and massive MIMO) in the 5G NR [223]."]} +{"44151828|19938676": ["following [17], [18], [21], [32]: \u2022 Need for simple, linear and real-time techniques and hardware for optimized processing of the vast amounts of generated baseband data, at associated internal power consumption.", "but also by eliminating expensive and bulky components (such as large coaxial cables) and high-power radio frequency (RF) amplifiers at the front-end [17], [21]."]} +{"4417895|8323234": ["With ) and the following de\ufb01nition the MIMO channel matrix H , in baseband is given by At mmWave carrier frequencies, H in (6) is marginally sparse matrix in the spatial DFT basis [2].", "Channel estimation at mmWave, however, is challenging as the best beams have to be estimated using low SNR measurements [2].", "Such systems are likely to employ large antenna arrays and use highly directional beamforming to provide suf\ufb01cient received signal power [2].", "We assume that timing synchronization is already performed and that the channel is sparse per the virtual channel model [2].", "Unlike the lower frequency systems, MIMO channels at mmWave are marginally sparse in the spatial angle domain due to clustering in the propagation environment [2]."]} +{"3862317|8323234": ["In this work, we assume that the receiver is equipped with one-bit ADCs, i.e., q = 1.", "These methods, however, cannot be used in one-bit receivers as energy detection with undithered one-bit ADCs is not feasible unless additional circuit components are used.", "For q-bit ADCs, the closed form expressions for the conditional mean and variance in (R7) and (R8) can be found in [35, Appendix A].", "Recently sparsity-aware, non-coherent beamforming algorithms that are robust to phase errors were proposed for narrowband phased array systems with full resolution analog-to-digital converters (ADCs).", "We also give an efficient implementation of a generalized bilinear message passing algorithm for the joint estimation in mmWave systems with one-bit ADCs.", "After downconversion at the RX, the output at each antenna is sampled using a pair of q bit ADCs, one each for the in-phase and the quadrature phase components.", "We use Qq (.) to represent the q bit quantization function corresponding to the ADCs.", "\u2022 We evaluate the performance of our joint estimation algorithm assuming a digital receiver\narchitecture with one-bit ADCs and compare it with the hypothetical full resolution case.", "Compared to the lower frequency channels, mmWave channels comprise of fewer clusters [4].", "Furthermore, cost and power consumption are major issues at the larger bandwidths that accompany mmWave, primarily due to high resolution ADCs [4].", "The resolution of the Nrx ADCs at the RX, however, is assumed to be limited.", "As the only information provided by undithered one-bit ADCs is phase quantized to 4 levels, discarding it due to phase errors leaves no information.", "In particular, we focus on the digital receiver architecture with one-bit ADCs, to highlight the differences with the existing noncoherent algorithms.", "For example, the one-bit ADC architecture [4] allows access to the output of every antenna at the expense of heavy quantization."]} +{"26337815|8323234": ["If a extended virtual model [1] is used, the channel matrix can be well approximated by H \u2248 \u00c3RHv\u00c3T , (4)", "Analog-only, hybrid or low-resolution MIMO architectures have been proposed to overcome this limitation and operate at mmWave frequencies [1]."]} +{"13747333|8323234": ["Also, in mmWave massive MIMO receivers, low-resolution combining is a popular technique to deal with large power demands by the Analog to Digital Converters (ADC) [3], [4], [5].", "For the precoder design, we employ the technique used in [4], [6].", "We assume that the hybrid precoder design is independent of combiners and ensure that the optimal hybrid precoders match the right singular matrix of the MIMO channel [4], [6].", "(19) Phase shifters or splitters impose constraints on the design of the analog combiner W A [4].", "Hybrid precoding and combining is a common architecture used with Millimeter wave (mmWave) Massive Multiple-Input Multiple-Output (MIMO) transceivers [2], [3], [4]."]} +{"60440656|8323234": ["The ADCs operating at such large bandwidths consume large amount of power [1], [2], [5].", "Phase shifters or splitters impose constraints on the design of the analog combiner W A [2].", "It is being considered both at sub-6Ghz and millimeter wave (mmWave) frequencies [1], [2].", "As such, precoders and combiners both in analog and digital domains, are adapted to the changing channel conditions [2], [3].", "(a) Equal Bit Allocation [1,1,1,1,1,1,1,1] (b) Equal Bit Allocation [2,2,2,2,2,2,2,2] (c) Exhaustive Search BA (d) Lower Bound (No Quantization) (e) CRLB-based BA (f) MMQSE-based BA Same Power Spend"]} +{"24517385|13074005": ["Then, ju n is estimated as \u0135u n = argmax j\u2208[Nt ] | \u02c6\u0304 x u n( j)| as [2], [13].", "Base on [20], the data part can transmit N log2(NtM) databits by jointly exploiting the spatial and Quadrature Amplitude Modulation (QAM) constellations of SM [2], [12], [13].", "iv): We construct a new MMSE detector by combining the modified MMSE for the quantized MIMO [29] with the stage-wised MMSE for the un-quantized SM-MIMO [12], [13].", "Next, by combining the modified MMSE for the quantized MIMO [29] with the stage-wised MMSE for the un-quantized SM-MIMO [2], [13], a new Minimum Mean Square Error (MMSE) detector is constructed for the quantized massive SMMIMO.", "ditional spatial constellation [12], [13]), the spectral efficiency can be increased without sacrificing the advantages of single-", "as Maximum Likelihood (ML) detector [4], [12], Minimum Mean Square Error (MMSE) detector [12], [13], and message passing detector [3].", "During the stage of CE, this pilot sequence is transmitted alternatively by the Nt TAs (from the 0th to (Nt \u2212 1)th TA) because the UE has only one RF chain [2], [13]."]} +{"4940482|8323234": ["However, this imposes hardware and particularly power constraints with increasing number of users or independent spatial streams (RF chains) [3].", "The combination of analog and digital precoding and combining will increase the performance of the communication system for a given channel realization [1], [3].", "The power consumed by the ADCs is exponential in the number of bits (resolution) and directly proportional to the bandwidth of the signal [3], [6] and [7].", "Typically, a Uniform Linear Array (ULA) offers combining via analog beamformers and digital combiners [1], [3], [4].", "A Hybrid precoding/combining is a common architecture used with mmWave massive MIMO transceivers [1], [3], [4].", "Examples include [i] uplink MU-Massive MIMO systems at sub-6 Ghz frequencies, [ii] mmWave based SU-MIMO with N spatial streams or MU-MIMO with N users within the framework of hybrid precoder/combiner by appropriately taking care of the constraints on the analog precoders and combiners [3].", "Prior works analyze the performance of the receivers with 1-bit ADCs to constraint power [1], [2], [3]."]} +{"52183850|8323234": ["THE millimeter-wave (mmWave) band offers high data rates in both wireless local area networks [2] and fifthgeneration (5G) mobile cellular systems [3]."]} +{"12216892|8323234": ["\u2026+ n\u0303 (1)\nwhere pu is the average transmit power of users, H represents the Nr\u00d7Nu channel matrix between the BS and users, s indicates the Nu\u00d71 vector of symbols transmitted by Nu users and n\u0303 \u2208 CNr is the additive white Gaussian noise which follows complex Gaussian distribution n\u0303 \u223c CN (0, INr )."]} +{"4422733|8323234": ["Hence, large antenna arrays and highly directional transmission should be combined to compensate for severe penetration loss [1].", "Before proceeding, we first adopt the commonly used millimeter-wave channel model which characterizes the geometrical structure and limited scattering nature of millimeterwave channels [1].", "It is well known from the corresponding literature that hv has a sparse nature [1]."]} +{"8633715|8323234": []} +{"5968885|18148591": ["M ultiple-input\u2013multiple-output (MIMO) wireless systems are those that have multiple antenna elements at both the transmitter and receiver [1]."]} diff --git a/edge/graph_198930372.jsonl b/edge/graph_198930372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1593bd5db35bb5c5491c5a19fb36a10f08cb32df --- /dev/null +++ b/edge/graph_198930372.jsonl @@ -0,0 +1,25 @@ +{"52301208|30189749": ["The new methodologies for CIM can be categorized into two classes of Centralized and Distributed methods [12]."]} +{"54460568|30189749": ["For a survey, the reader is referred to [1].", "With the average speed of 30mph, the stream rates (vehicles/lane/10 sec) for three conditions (light, heavy, and jam) are [1,10], [10,15], and [15,25], respectively, considering their densities [60,120], [120,180], [180,300] (vehicles/lane/mile).", "1 billion gallons of fuel in 2014 [1]."]} +{"54462394|30189749": ["To simplify the control process, only the longitudinal movement of the vehicles is considered in the takeover zone[13]."]} +{"18902162|1029120": []} +{"18902162|2113024": [", [113]\u2013[115]."]} +{"59619815|3782888": ["A succinct overview of state-of-the-art vehicular communication technologies can be found in [16]."]} +{"59619815|33063270": []} +{"59619815|10329355": ["Thus, static traffic light switching patterns gave way to dynamic traffic signaling, which includes wide application of communication, computation, and sensing technologies, to control the traffic flow [14]."]} +{"59619815|17934515": ["For example, the cars can be clustered using any platooning algorithm [24] and then the intersection management algorithm can deal with the platoon head, instead of dealing with each individual platoon."]} +{"56719001|30189749": ["As the methods from [1]\u2013[4] largely considers the control, sensing and communication systems as separate entities that provide services to each other without much mutual knowledge, there are limited options to reduce the channel load.", "Automated intersection management methods promise to provide safe and efficient intersection crossing, and have been the subject of recent research [1]\u2013[4]."]} +{"56719001|5660618": ["In general, wireless links in networked control systems are affected by (i) limited bandwidth; (ii) delays; (iii) packet dropouts [5]."]} +{"19012488|5660618": ["A recent review of the vast literature on multi -agent systems can be found in [9], [15], [17], [18]."]} +{"19012488|1517662": ["The reader can refer to [12] for an elaborate survey of conflict resolution approaches."]} +{"2184150|6607209": ["The agents that regulate the infrastructure can be built to act as a team, i.e., they may share a global objective function that represents the system designer\u2019s preferences over all possible solutions, as it occurs in multi-robot domains (Dias, Zlot, Kalra, & Stentz, 2006)."]} +{"116372756|9588126": ["For this, researchers might benefit from the distributed control techniques that appear in other fields like computer science and automatic control (Cao et al., 2013)."]} +{"108644553|778117": []} +{"49322393|30189749": ["In this case, we minimize transient engine operation, thus we can have direct benefits in fuel consumption and emissions since internal combustion engines are optimized over steady state operating points (constant torque and speed); see Rios-Torres and Malikopoulos (2017b) and Malikopoulos (2013). In this problem, ti , v 0 i are known upon arrival of CAV i at the CZ and ti is also specified.", "A detailed discussion of research efforts in this area can be found in Rios-Torres and Malikopoulos (2017a).", "In this case, we minimize transient engine operation, thus we can have direct benefits in fuel consumption and emissions since internal combustion engines are optimized over steady state operating points (constant torque and speed); see Rios-Torres and Malikopoulos (2017b) and Malikopoulos (2013)."]} +{"30189749|16049411": ["There is a solid body of research now available for optimizing vehicle system efficiency both for conventional [12] and hybrid powertrain systems [13]."]} +{"18679323|14858505": ["proposed an inserted idle-time (IIT) scheduling approach [11] to enable the design of controller in presence of multiple uncontrolled vehicles [12]."]} +{"117309353|9588126": []} +{"2076204|8363289": []} +{"12135020|8363289": ["In the future, approaches surveyed in [16] can be adapted to achieve this goal."]} +{"44153103|1229096": []} +{"30458162|30189749": ["A detailed discussion of the research in this area reported in the literature to date can be found in [11]."]} +{"61810862|30189749": ["W ITH the significant advance and development of connected vehicle techniques, dynamic vehicular access management at intersections has shown great potentials for the performance improvement of intersection control [1][2]."]} diff --git a/edge/graph_198930499.jsonl b/edge/graph_198930499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7cec7a78e780baa2d2f0bb70fa1e9e52fe4614f4 --- /dev/null +++ b/edge/graph_198930499.jsonl @@ -0,0 +1,3 @@ +{"4853249|10150488": ["As a result of the popularity of the Apache Hadoop framework, many scheduling algorithms have been proposed to optimize different aspects of job execution."]} +{"148572606|3818445": ["Edge computing and fog computing are computing paradigms that have been introduced to reduce the amount of data that is required to be transferred to the data center in the cloud [4]."]} +{"14074696|1708582": ["The process is then iterated."]} diff --git a/edge/graph_198930899.jsonl b/edge/graph_198930899.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da40875fb34521d40b6be8fa70a4961a56780106 --- /dev/null +++ b/edge/graph_198930899.jsonl @@ -0,0 +1,9 @@ +{"1840653|2835258": ["In large scale ad hoc networks, node localization can assist in routing [1], [2], [3]."]} +{"1234760|8323234": ["The sparsity of the ch annel in the angular domain can be exploited for an effective estimation of the AoA and AoD vi a CS techniques [34], [35], [73]."]} +{"1234760|17388653": ["Since the span of impulse noise is short in time and thus can be considered as a sparse vector, we can use the CS technique to mitigate this noise [51], [52]."]} +{"1234760|2509135": ["1) Spectrum Sensing: As a means to improve the overall spectrum efficiency, cognitive radio (CR) has received much attention recently [53]."]} +{"37925315|12681089": []} +{"1026675|17713112": ["Due to the complexity and low performance devices of these networks, very few real deployments can be found that are working maintenance-free (Strazdins et al., 2013).", "Most of the following references are analyzed in Strazdins et al. (2013), a recent survey based on real world deployments."]} +{"164605437|17905276": ["Readers are referred to [7], [8] for more details.", "information of sensor nodes should be available at the data center (basestation) [7], [8]."]} +{"18813645|14242212": ["Such problems are studied extensively [Fazel, 2002, Rennie and Srebro, 2005, Cand`es and Recht, 2009] and has many applications in recommendation systems [Koren, 2009], see survey by Davenport and Romberg [2016]."]} +{"14282091|17905276": []} diff --git a/edge/graph_198931202.jsonl b/edge/graph_198931202.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d89aa4268b3afd2c5802820be137e98c71d2d6d8 --- /dev/null +++ b/edge/graph_198931202.jsonl @@ -0,0 +1,43 @@ +{"5321598|1734833": []} +{"5321598|10817088": []} +{"205572964|3519414": ["The next generation of automatic speech recognition 32 and information extraction models will likely develop clinical voice assistants to accurately transcribe patient visits.", "As such, applyication of deep-learning methods to EHR data is a rapidly expanding area 32,33 ."]} +{"205572964|2088679": ["Medical imaging, for instance, can greatly benefit from recent advances in image classification and object detection 2,8 ."]} +{"205572964|23566570": ["RL can be useful in healthcare whenever learning requires physician demonstration, for instance in learning to suture wounds for robotic-assisted surgery 7 .", "Modern genomic technologies collect a wide variety of measurements, from an individual\u2019s DNA sequence to the quantity of"]} +{"1443666|10500613": []} +{"3956601|11293874": ["These systems have applications in prosthetic and orthotic design, rehabilitation after an amputation, reconstruction [92] or injury, assistance for patients with neurodegenerative disease [74, 93], identifying movement disorders [94] and detecting/preventing falls [95]."]} +{"3956601|1734833": ["Biosensors [80\u201385] are also being used for various health applications including health monitoring.", "Mining data streams is an evolving concept in computer science and data mining although is common in finance for risk modeling, financial engineering and stock trading [85, 106\u2013109]."]} +{"3956601|30383344": ["\u2026devices have a companion mobile application that uses Bluetooth, Zigbee, infrared waves, ultra band wireless communication or a (universal serial bus) USB-based sync service to update health-monitoring data from the wearable monitor to a connected computer or data aggregation database [74, 75]."]} +{"206485523|10150488": ["Please refer to [276] and [277] for more details on this topic."]} +{"206485523|16403716": ["Multimedia indexing and retrieval concerns the description, storage, and organization of multimedia information to help people find multimedia resources conveniently and quickly [218]."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"36726428|10500613": ["[6\u20139])."]} +{"1673682|8281388": []} +{"4363729|11632848": ["More elegant combination methods are discussed in [59]."]} +{"78849626|20905429": []} +{"1311312|17887877": ["A comprehensive comparison of these translational bioinformatics platforms including G-DOC has been summarized in these papers [64 \u2013 66]."]} +{"3732848|1520906": ["The volumes of data are vast, the generation speed of data is fast and the data/information space is global [9].", "Indeed, IoT is one of the major driving forces for big data analytics [9]."]} +{"3732848|44461432": ["Also with the rapid development of IoT, there are lots of challenges when IoT and big data come; the quantity of data is big but the quality is low and the data are various from different data sources inherently possessing a great many different types and representation forms, and the data is heterogeneous, as-structured, semi structured, and even entirely unstructured [71]."]} +{"13682690|393948": ["The training mechanism of traditional neural networks is that all the internal parameters need to be iteratively finetuned by using a gradient descent technique (Hinton and Salakhutdinov 2006; Bengio et al. 2013)."]} +{"29963227|2398835": []} +{"29963227|13726263": []} +{"2125207|9431428": []} +{"2125207|7761990": ["\u2026(which captures brain function presumably reflecting both genetic and environmental influences) with genetic information, is potentially a useful way to help classify schizophrenia (Hariri and Weinberger, 2003; Pearlson and Folley, 2008; Calhoun et al., 2009; Liu et al., 2009; Potkin et al., 2009)."]} +{"53304118|9928823": []} +{"53304118|393948": []} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"6350935|192934": []} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"2034081|1507400": ["29 This section classifies big data technologies/tools into four categories: (1) data storage and retrieval, (2) error identification, (3) data analysis, and (4) platform integration deployment."]} +{"527532|206742377": ["Information extraction is necessary to structuralize the raw data so that they can be easily digested by analysis algorithms [2, 3]."]} +{"3284064|14186660": []} +{"3284064|15279105": ["One specific area of focus has been the use of text mining for the interpretation of molecular biology and genomic data, including genes, proteins, cells, tissues and whole organisms, with a range of applications to gene expression data [37], genome-wide association studies [38, 39], pharmacogenomics [40], interpretation of genetic variants such as singular nucleotide polymorphisms (SNPs) [41, 42], and systems biology network modeling [43]."]} +{"1017028|1507400": ["Hadoop is a widely used open source implementation of distributed computing and is being increasingly adopted in bioinformatics [9].", "As reviewed in the literature [9], there have been several map-reduce based software applications developed in recent years to aid in the assembly, mapping, aligning and variant analysis of the generated sequence reads [17], [18], [19]."]} +{"2780717|3126100": []} +{"2780717|14258620": []} +{"2780717|3750204": ["Singh and Reddy [20] considered vertical and horizontal scaling platforms.", "Surveys on platforms for Big Data analytics have also been presented [20], [21].", "Many approaches have been suggested and surveys have been published on specific categories of solutions; examples include surveys on platforms for Big Data analytics [20], [21] and review of data mining with Big Data [23].", "The certainty and accuracy of this type of data is not objective because it relies only upon human judgment [20]."]} +{"2780717|393948": ["Representation learning is also often referred to as feature learning [100]."]} +{"14874327|8281388": ["Many other works based on Hadoop are present in literature [33\u201336]; for example, some specific libraries were developed as Hadoop-BAM, a library for distributed processing of genetic data from next generation sequencer machines [37], and Seal, a suite of distributed applications for aligning short DNA reads, manipulating short read alignments, and analyse the achieved results [38], was also developed relying on this framework."]} +{"14874327|1507400": ["Many other works based on Hadoop are present in literature [33\u201336]; for example, some specific libraries were developed as Hadoop-BAM, a library for distributed processing of genetic data from next generation sequencer machines [37], and Seal, a suite of distributed applications for aligning short DNA reads, manipulating short read alignments, and analyse the achieved results [38], was also developed relying on this framework."]} +{"11208120|1507400": []} +{"908193|18090012": ["De-identification normally allows researchers to circumvent costly consent regimes 94 , but the lack of identifiers makes certain types of population-wide research impossible, as other information cannot be linked to data subjects."]} +{"908193|2809360": ["22 and the September 2011 special issue of the Journal of the American Medical Informatics Association (JAMIA) 32 .", "It is highly heterogeneous, does not always conform to normal grammar and is rich in author-and domain-specific idiosyncrasies, acronyms and abbreviations, as well as spelling and typing errors 22 ."]} diff --git a/edge/graph_198932045.jsonl b/edge/graph_198932045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d3e74de2014308a247824da95df444efb9e9b28 --- /dev/null +++ b/edge/graph_198932045.jsonl @@ -0,0 +1 @@ +{"21857734|6577460": ["Reference [37] is a review of the modeling, planning and control of free-flying space robots."]} diff --git a/edge/graph_198933686.jsonl b/edge/graph_198933686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6260e83aa3471965c604f1c920deeb452d68a965 --- /dev/null +++ b/edge/graph_198933686.jsonl @@ -0,0 +1,6 @@ +{"1762187|10355303": ["We in this section discuss the tracking methods that are most related to our work, and refer the readers to a thorough review on object tracking survey [33, 59] and benchmark evaluations [50, 58]."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"41765053|14970359": []} +{"14309545|14970359": ["For example, human pose estimation is extremely well studied [36,37], but only transfers partially to insects because of the tight working space, leading to frequent limb occlusions, and because of the many redundant degrees of freedom"]} +{"104291868|14970359": []} diff --git a/edge/graph_198964560.jsonl b/edge/graph_198964560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..959150b534d2290334aef2e38e1d9eb429a4dd83 --- /dev/null +++ b/edge/graph_198964560.jsonl @@ -0,0 +1,6 @@ +{"28133120|16768404": ["This choice derives from the different analyses in the literature showing the duality of these algorithms: Naive Bayes is characterized by a rapid classification and the need for a training set of lower size than required by SVM, which, however, shows results that are more accurate when there are many training documents [26]."]} +{"154457739|7839197": []} +{"44304782|18212759": []} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} diff --git a/edge/graph_198967727.jsonl b/edge/graph_198967727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ba14828861c2c8a9a2ad6437c1a1aaee25deb68 --- /dev/null +++ b/edge/graph_198967727.jsonl @@ -0,0 +1,48 @@ +{"16430074|206459491": ["Microcontrollers are extensively used in embedded systems, and they are equipped with \u2018\u2018fuse bits\u2019\u2019 to prevent unauthorized users from reading or modifying selected sections of its memory.", "The left column shows\nthe goals of the attack, and the right column shows the location of the attacker within the IC supply chain.", "Similarly, critical control and communication functions assume that the hardware platforms that they are implemented on are resilient to attacks.", "Different assumptions are typically made concerning the hardware-based vulnerabilities, threats that exploit them, models for the considered threats, and defenses."]} +{"17121405|6332923": ["In the literature, a few survey papers are written about physical layer security [3]\u2013[5]."]} +{"10614697|3348390": ["Furthermore, by integrating the sensing, communication, and computation capabilities [8], [9], IoT can offer diverse intelligent services [10] to form smart home [11], smart grid [12]\u2013[14], smart community [15], and smart city [16], [17], as shown in Fig."]} +{"10614697|20905429": ["One of the most value-added functionalities of IoT is to sense the environments including the living environment [28] and human body [29]\u2013[31], enabling users to interact with the physical world [32]."]} +{"5731070|16209841": []} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"9213245|207209718": [", malware detection and intrusion detection methods and tools [63], [64]."]} +{"9213245|206459491": ["Some hardware Trojans are continuously functioning (on) but, typically, they are triggered with specific input values to the overall circuit, or when certain conditions are met within the circuit, including external parameters that are input to the overall circuit [22]."]} +{"206446574|1230643": []} +{"3924613|6664074": ["Prior work [28], [29] has surveyed the space of OSs for lowend IoT devices.", "As resource limitations on low-end IoT devices are expected to last [37], [39], a variety of more compact OSs were recently designed [29]."]} +{"15846078|3815882": []} +{"2906773|8364569": ["Many infrastructure security solutions are based on network traffic analysis [3, 101]."]} +{"2906773|8450611": ["Taylor's survey in 2004 [105] summarized the major packet classification techniques.", "A \u2019cut\u2019 in multidimensional space is isomorphic to a branch in a decision tree [105].", "The reported research work in this area has been well summarized and categorized into four basic types by Taylor [105].", "Taylor\u2019s survey in 2004 [105] summarized the major packet classification techniques.", "Our analysis follows the same categorization and is complementary to Taylor's work.", "While Taylor's survey focuses on the description of techniques, we focus on the analysis of hardware-based application of these techniques."]} +{"2906773|9240891": ["Securing the network infrastructure has become a high priority due to its underlying effects for data protection, ecommerce and even national security [44]."]} +{"2906773|15331799": ["of software and the high performance of hardware [41]."]} +{"8116113|15199849": []} +{"18761676|3348390": ["Context awareness may provide a great support to process and store the Big Data, and to make their interpretation easier [330]."]} +{"18761676|16209841": ["To ensure security of data, services and entire IoT system, a series of properties, such as confidentiality, integrity, authentication, authorization, non-repudiation, availability, and privacy, must be guaranteed [228,229]."]} +{"18761676|270804": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"18761676|205286988": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"10226823|17205659": ["Many studies have been conducted on security issues regarding mobile ad-hoc networks [1, 5] and wireless sensor networks [29]."]} +{"3340607|9495329": ["In [11], a survey of SDN solutions for IoT is presented, in mobile and cellular context with emphasis on 5G networks."]} +{"10044607|2294541": ["The main target of malicious attackers are aggregation algorithms of trust and reputation systems [4].", "Since readings keep streaming into aggregator nodes in WSNs, and since attacks can be very dynamic (such as orchestrated attacks [4]), in order to obtain trustworthiness of nodes as well as to identify compromised nodes we", "Sensors are deemed compromised only relative to a particular batch; this allows our framework to handle on-off type of attacks (called orchestrated attacks in [4])."]} +{"207023775|15895606": []} +{"207023775|6779551": ["less communication [104] that cross-layer and hybrid secu-"]} +{"207023775|2357830": [", RFID/NFC privacy [81] or privacy of general embedded sensors [82]."]} +{"18729612|206459491": []} +{"1862633|14650419": []} +{"1862633|2357830": ["Objects in an IoT must be able to communicate and exchange data with each other autonomously (Juels 2006; Mitrokotsa et al. 2013).", "For example, Juels proposed the method of \u201cblock tag\u2019 to prevent the unauthorized tracing (Juels 2006)."]} +{"31313400|206459491": ["The globalization of the design \ufb02ow for integrated circuits (ICs) leads to security vulnerabilities such as reverse engineering [1], IC counterfeiting, Intellectual Property (IP) piracy, unauthorized overproduction by the contract foundry [2], [3], and malicious circuit modi\ufb01cation [4]."]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"3698150|17474643": ["when services depend on multiple providers in order to improve application performance and resilience or vendor lock-in [80]."]} +{"3698150|16335158": []} +{"3698150|17336376": ["One possible direction to address such issues involves the introduction of predictive storage and caching [66]."]} +{"3698150|1230643": ["Recent technological advances have made efficient, low-cost, and lowpowerminiaturized devices available for use in large-scale, remote sensing applications [89]."]} +{"62093910|16209841": ["placing security within the application payload, has been discussed as an option [5], [31] the related work in the literature leverages its benefits to provide fine grained access control with an assertionbased authorization framework [32]."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"2829149|116294": ["Attacks on network availability: The denial of service (DoS) ([16], [17]) attack falls under this category."]} +{"2829149|15199849": []} +{"2829149|7889189": ["This prevention of accessibility of information to legitimate users by unknown third party intruders can take place on different layers of a network [8],[14],[15]:", "Some additional DoS attacks are as follows [7], [14], [15], [36] According to [26], the threats looming over WSN can further be classified as follows: i. External versus internal attacks ii."]} +{"2829149|1940388": ["According to [12], the attacks on WSN can be classified as: i."]} +{"1184134|206459491": ["An attacker with access to IP or an IC can steal and claim ownership of it and/or can overbuild and sell them illegally [3, 19]."]} diff --git a/edge/graph_198985965.jsonl b/edge/graph_198985965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_198986097.jsonl b/edge/graph_198986097.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..286316ef75675496910416ac79a9aa9c3a79810a --- /dev/null +++ b/edge/graph_198986097.jsonl @@ -0,0 +1,26 @@ +{"49384742|3529917": []} +{"77375236|17036197": ["Despite substantial progress in recent years, multi-object tracking remains very challenging when dealing with large appearance variation, high motion complexity, interactions and occlusions among multiple objects [1]."]} +{"6115595|195346070": ["One reason is the dif\ufb01culty in standardizing the evaluation protocol, a controversial topic this day [11]; another reason may be high annotation cost."]} +{"6115595|10355303": ["Several approaches have been proposed to improve tracking performance [1], with various 14 applications from surveillance systems [2] to autonomous driving [3], and even sports analytics [4]."]} +{"6115595|17516538": ["Several approaches have been proposed to improve tracking performance [1], with various applications from surveillance systems [2] to autonomous driving [3], and even sports analytics [4]."]} +{"3440507|195346070": ["A thorough review can be found in [18]."]} +{"206592484|456491": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"123983040|10355303": ["Not only the tracking algorithms are reviewed [10], but also the appearance models in visual tracking are reviewed [11]."]} +{"22204997|10355303": ["The fast moving target could be detected as two separate objects and the slow moving target could easily missed when the choice is not appropriate [22]."]} +{"783186|12127129": ["Since its introduction, the model has gained vastly in popularity among the computer vision community [4], [7], [11], [42]\u2013[44], and it is still raising a lot of interest as authors continue to revisit the method and propose enhanced algorithms [45]\u2013[50].", "According to [7], a background subtraction technique must adapt to gradual or fast illumination changes (changing time of"]} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"30312999|195346070": ["pounded above (i.e. open set and open world) but with the addition of unknown labels and with data coming from the output of a detector (i.e. no manual cropped data) is Multiple Object Tracking (MOT) [25,26]. Recent Multiple Object Tracking algorithms typically adopt appearance and motion cues into an af\ufb01nity model to estimate and link detections to form tracklets which are afterwards combined into \ufb01nal "]} +{"9697357|195346070": ["Despite the vast literature on the topic [39], it still remains a challenging problem, especially in crowded environments where occlusions and false detections are common."]} +{"51870633|2340253": ["Our approach reformulates multi-object tracking as a multi-agent reinforcement learning problem [5], such that learning the optimal policy for an agent is equivalent to optimizing the desired tracking metric."]} +{"46931548|17036197": ["R OBUST tracking of multiple objects [1] is a challenging problem in computer vision and acts as an important component of many real-world applications.", "For end-to-end training the DCCRF, except for random \ufb02ipping of whole video frames, the time intervals between the two input video frames are randomly sampled from the interval of [1 , 3] to generate more frame pairs with larger possible displacements between them."]} +{"46931548|195346070": []} +{"13980455|393948": ["This strategy is different from the dominant paradigm in recent neural network literature of unsupervised tranfer learning (see [40] for a survey covering unsupervised pre-training and represetation learning more generally)."]} +{"17036197|49862415": []} +{"17036197|10355303": []} +{"17036197|17516538": ["\u2022 The first set [19], [20], [21], [23], [24] discusses tracking as an individual part while this work specifically discusses various aspects of MOT.", "For example, object tracking is discussed as a step in the procedure of high-level tasks such as crowd modeling [19], [23], [24].", "[19] Object Motion and Behaviors 2004 Kim et al.", "As a mid-level task in computer vision, multiple object tracking grounds high-level tasks such as pose estimation [17], action recognition [18], and behavior analysis [19]."]} +{"13028371|10355303": ["We refer the readers to a comprehensive review on visual tracking in [33, 22, 26]."]} +{"3416331|4884302": ["Furthermore, if the agent\u2019s policy is parameterized by a deep neural network, as is the case in deep reinforcement learning [3], the output of the policy network (if searching directly in the space of valid solutions) is a permutation matrix; more formally, an extreme point of the Birkhoff polytope [78]."]} +{"3416331|10355303": ["The survey on appearance matching in camera-based multi-target tracking [75] discusses machine learning methods for improving data association, but it does not cover the recent advances in deep learning that have become ubiquitous in the computer vision tracking community.", "Learning pairwise costs from data is heavily used in the multi-target tracking computer vision community, partially due to the ease at which features can be extracted from images [75].", "Appearance information has been used extensively in the computer vision community to improve the performance of data association; see [75] for an in-depth survey."]} +{"49564406|195346070": []} +{"49564406|2355696": ["This task is challenging, since the activities are analyzed from both the spontaneous individual actions and the complex social dynamics involving groups and crowds [1]."]} diff --git a/edge/graph_198986427.jsonl b/edge/graph_198986427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bedc88982ab48c2a275cf03cd0785e25b7918d25 --- /dev/null +++ b/edge/graph_198986427.jsonl @@ -0,0 +1,7 @@ +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} +{"52880337|1708582": ["formulations, and answers) to be exchanged. Therefore, the communication overhead is small. Previous works used specialized agents to improve exploration in RL (Dayan & Hinton, 1993; Singh, 1992; Kaelbling et al., 1996). For instance, Stanton & Clune (2016) and Conti et al. (2017) use a population of agents to achieve a high diversity of strategies that leads to better generalization performance and faster conve", "Previous works used specialized agents to improve exploration in RL (Dayan & Hinton, 1993; Singh, 1992; Kaelbling et al., 1996)."]} +{"13836125|393948": ["The complexity of representing interactions could also be reduced through techniques such as factorization machines [18] and neural networks [3] that produce low-dimension embeddings out of high-order features."]} +{"6428552|16489039": ["The point of sponsored search is to give a mechanism by which advertisers can get users to visit their Web sites.(18) An advertiser is a person or organization interested in generating user traffic to a particular Web site for some specific purpose."]} +{"21731567|1708582": ["We solve this problem from the perspective of reinforcement learning [13].", "Policy iteration or value iteration is usually used to compute it analytically in standard reinforcement learning se\u008aings [13]."]} +{"21731567|1805048": []} +{"3584193|15062298": ["Note that both UCB1 and Exp3 are very well-known [9] and the latter is perhaps the most popular bandit feedback implementation of the famous Hedge (or Multi-plicative Weights Update ) algorithm for no-regret learning in the fully informed feedback setting.", "The later is often referred to as \u201cA/B testing\u201d and is widely used in practice [9, 12].", "The algorithm is among the state of the art solutions for recommender systems [9] and is an example of contextual bandit approaches, which are widely applied to such settings [3, 8, 25, 26].", "For a more detailed exposition of all these different algorithms, [9] provides a concise survey."]} diff --git a/edge/graph_199000304.jsonl b/edge/graph_199000304.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..096da6c96a4c50775bbaaed091289e788b3d1ac2 --- /dev/null +++ b/edge/graph_199000304.jsonl @@ -0,0 +1,22 @@ +{"67320106|3348390": ["It is well-known that human presence interferes the wireless signals due to multi-path and fading effects [24], [25], [26], [27]."]} +{"1153012|8928686": ["Index Terms\u2014Fall detection, activity recognition, channel state information (CSI), WiFi, phase difference\n\u00c7", "Falls not only bring a main threat to elders\u2019 health, they account for a large part of medical cost as well."]} +{"15799692|1113420": ["This idea is inspired by widely used context-aware approaches in automatic speech recognition [47]."]} +{"49271594|3249290": ["to ToA in that it requires devices to have synchronized clocks, but it uses the signal propagation time to multiple receivers to find the absolute signal propagation time [20].", "AoA systems use an array of antennae to determine the angle, from which the signal propagated [8], [19], [20].", "Through the use of synchronized clocks, the signal propagation time between the transmitter and receiver can be determined [19], [20]."]} +{"49271594|5476476": ["Designing an indoor localization system has many uses in a variety of areas [11], [12]."]} +{"2276239|5664472": ["Commonly, good segmented silhouettes are required for spatio-temporal interest points features and also these methods are very sensitive to viewpoint and occlusion [53]."]} +{"2276239|192934": ["Regarding to recognition, some well-known classi\ufb01ers such as arti\ufb01cial neural networks (ANNs) [15\u201317], support vector machines (SVMs) [18,19], Gaussian mixture models (GMMs) [20,21], and hidden Markov models (HMMs) [22\u201324] have been utilized for the purpose of recognition."]} +{"4063197|8928686": ["For a comprehensive survey on wearable/non-wearable technologies we refer the interested readers to the following publications [10\u201312]."]} +{"8254430|15782139": ["As pointed out in [7], standard segmentation methods from natural language processing [16] can be used to further improve the word segmentation accuracy."]} +{"59619024|17206258": ["A number of probabilistic routing/ broadcasting schemes are deeply studied in [15]."]} +{"50782183|7988320": ["1 [14]."]} +{"1840484|18167210": ["[11], present the review report about the emerging technologies and their connection with 5G, while energy and battery charge optimization in medical healthcare was not focused."]} +{"1840484|791261": []} +{"114458509|14970359": ["While techniques based on visible light [8] and cameras [9] have been proposed, Wi-Fi based solutions possess unique advantages stemming from non-line-of-sight signal coverage and a pervasive existing deployment of Wi-Fi access points."]} +{"41355145|1634674": ["Activity recognition remains a hot research topic in decades, and its major objective is to explore footprints from historical information for recognizing physical activities [9] [10]."]} +{"41355145|14970359": ["Activity recognition remains a hot research topic in decades, and its major objective is to explore footprints from historical information for recognizing physical activities [9] [10].", "Besides accelerometer sensors, vision information also captures human motions and thus can be explored for recognition [9]."]} +{"6870922|1634674": ["a sequence of images [22]."]} +{"49667086|20083128": ["A particularly appealing commodity-based approach uses existing WiFi chipsets to extract so-called Channel State Information (CSI) [19, 30, 51, 55]."]} +{"53730920|35462776": ["Localization is a key primitive enabled by the BLE tags and is crucial for BLE adoption in several applications ranging from asset tracking [9, 10, 33, 34] to contextual advertisements [3, 16, 24, 29]."]} +{"5886631|8928686": ["Due to the limitations of the above-mentioned fall detection solutions, very few fall detection systems have been widely deployed in real home settings so far [8].", "Yu [5] and Natthapon et al. [8] reviewed the principles and approaches used in existing fall detection systems."]} +{"7339557|5724477": ["A huge amount of literature has been presented in this important search field by using various technologies such as vision-based [3], acoustic-based [4], accelerometer [5], wearable sensors [6], environment installed sensors [7,8], and smartphones [9]."]} +{"7339557|192934": ["The PCA [31] is a useful statistical method leveraged in various forms of statistical analysis such as biomedical signal processing [32], computer graphics and pattern recognition [33]."]} diff --git a/edge/graph_199002796.jsonl b/edge/graph_199002796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd7ac7277187f5fa184c2341e2f360831a0dfb70 --- /dev/null +++ b/edge/graph_199002796.jsonl @@ -0,0 +1,11 @@ +{"26419955|1876323": ["Moreover, the sliding-mode control system can be invariant to uncertainties in many cases [ 13 ].", "Assume that \ufffd \u03bep \u00b7 Ep \ufffd\u2264 \u03c1p and \ufffd \u03bec \u00b7 Ec \ufffd\u2264 \u03c1c, where \u03c1p > 0 and \u03c1c > 0. Referring to [ 13 ] and [16], the following assumption can further be made: \u23a7"]} +{"158051221|17670369": []} +{"124834103|43331360": []} +{"70201008|18078738": []} +{"43372377|1876323": ["Atypical switching controller [ 2 ]is us, (t) = -isgn(s) - Ks", "Thecontroller shownin(7)hasbeenproventobe asymptotically stable [ 2 ].", "A variable-structure control (VSC)systemwithsliding modesorsimply sliding modecontrol (SMC)isaspecial kind of control methodology whereitexhibits invariance (insensitivity, robustness) property against a class ofplant parametric changes andexternal disturbances during sliding modes[1, 2 ].", "whereXD andA{7arethefuzzy setsofXd andA{D, and areshowninFig. 2 .Considering allcases inthe2DRB,we canformanewfuzzy RBhaving only 7linguistic fuzzy rules inaIDspace, asshowninTable II. Itisobvious that, withthis reduction, bothcomputation timeandcontroller design complexity arereduced considerably.", "Since boths ands'arezeroinsliding mode, wecanequate (4)tozero(excluding disturbances) andcalculate thecontrol input, whichisso-called theequivalent control law[ 2 ]as", "-1/6 0 1/6 1/3 1/2 2/3 5/6 1 76 A2DAlD (b)Fuzzy output MFs. Fig. 2 Fuzzy input andoutput MFs."]} +{"32043270|9072047": []} +{"13030126|1876323": ["Recently, it has been widely applied to control of nonlinear systems [7-9]."]} +{"124658406|1876323": ["Finally, chattering problem is eliminated thanks to the reaching law approach [9, 24\u201327]."]} +{"21255844|1876323": ["In the past decade, some modern controls such as nonlinear control, adaptive control, variable structure control and optimal control were used [3\u20135]."]} +{"4570156|1876323": [", robust variable structure control [15], stochastic fuzzy control [16], [17], neural-networkbased adaptive control [18], fuzzy adaptive control [19]\u2013[22]) to deal with these circumstances."]} +{"109206441|1876323": []} diff --git a/edge/graph_199004350.jsonl b/edge/graph_199004350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29e1f787dd0816607efe3481c310aa17543ab825 --- /dev/null +++ b/edge/graph_199004350.jsonl @@ -0,0 +1,104 @@ +{"49567155|2623404": ["In SDN, as the controller has to achieve centralized network control for flows on routers and switches [7], it is an"]} +{"23956785|6909107": ["To address these issues, fog computing [20] and mobile edge computing (MEC) [21] have been studied to deploy computing resources closer to end users, which can significantly improve energy efficiency and quality of service (QoS) for applications that require intensive computations and low latency [21].", "can significantly improve energy efficiency and quality of service (QoS) for applications that require intensive computations and low latency [21].", "In the system, the agent has to decide which SBSs are assigned to the user, whether or not the computation task should be performed by the MEC server or the mobile device, and which SBS is scheduled to deliver the data from the MBS as a relay.", "Proposed scheme without (w.o.) MEC offloading.", "\u2219 Case 3: The file version doesn\u2019t match with that of the cache\u2019s file, then two options are provided: first, the file can be transcoded at MBS\u2019s MEC server or at the user\u2019s mobile device.", "The system state depends on the channel states \ud835\udc5f\ud835\udc60\ud835\udc58\ud835\udc5a(\ud835\udc61) of the available SBSs \ud835\udc5a \u2208 {1, 2, . . . ,\ud835\udc40}, the computation capability states \ud835\udc52MBS\ud835\udc50 of the MEC server and \ud835\udc53\ud835\udc59, \ud835\udc59 \u2208 {1, 2, . . . , \ud835\udc5d\ud835\udc62\ud835\udc58} of mobile device, the available cache sates \ud835\udc50\ud835\udc57 for user \ud835\udc62\ud835\udc60 and the label \ud835\udc66\ud835\udc39\ud835\udc57 that indicates whether or not the file version is matched for time slot \ud835\udc61 \u2208 {0, 1, . . . , \ud835\udc47 \u2212 1}.", "Otherwise, transcoding can be executed at the MBS\u2019s MEC server.", "To address these issues, fog computing [20] and mobile edge computing (MEC) [21] have been studied to deploy computing resources closer to end users, which"]} +{"9644440|9223482": []} +{"9644440|7851743": []} +{"9644440|393948": []} +{"9644440|13172512": []} +{"31204448|2623404": ["[7] also present a survey on programmable networks with emphasis on SDNs."]} +{"54203272|4884302": ["According to [8], Deep Reinforcement Learning ( DRL) combines deep learning and reinforcement learning experience interacting with the environment to achieve successful strategies that lead to the greatest long-term rewards."]} +{"54203272|16748080": ["AI-based traffic control [13] provides a learning-based and intelligent schedule method."]} +{"57365519|13172512": []} +{"57365519|3494096": ["Due to its promising accuracy, SDN in WSN is geared towards addressing the challenges of TC [8]."]} +{"14898909|1708582": []} +{"67279885|70271467": ["RNN is good at prediction of character in the text and also can learn dependencies and actual evidence which is stored for a long time [23].", "Deep Learning algorithm in a supervised way : Convolutional neural network (CNN) [23] is normally trained in a supervised way.", "These methods have been applied to visual object recognition, object detection, detecting network intrusion and many other domains [23].", "The CNN architecture used to structure 2D images [24] and a most important acknowledgement of CNN is face recognition [23]."]} +{"67279885|11381530": ["IDSs collect data from different systems and network sources and analyse the data for possible threats [10].", "It is resource hungry, demanding computational processing units and memory [10].", "The domain of Machine learning (ML) is dedicated to developing systems that can automatically learn from the data [12] and identify hidden patterns without being explicitly programmed to do so [10].", "IDSs detect anomalous and malicious activities from inside and outside intruders [10].", "Deep learning is capable of automatically finding a correlation in the data, so it is a prospective method for the next generation of intrusion detection techniques [10].", "ML algorithms is categorized by the learning style they employ and by the functional similarity of how they work [10]."]} +{"67279885|2623404": ["It can integrate security devices within the network topology [35], which can lead to increase in accuracy, detecting security incidents and simplify management."]} +{"67279885|25929315": []} +{"52961632|2623404": ["Currently these messages have been used for logistic activities such as flow installation and abstracting the low-level commands used by southbound interfaces to program the data plane [23]."]} +{"38813664|2623404": ["SDN [1] [2] is an emerging architecture which is ideal for the high-bandwidth, dynamic nature of today\u2019s applications as it is not only dynamic but also easily manageable, cost-effective and adaptable."]} +{"53720651|2623404": ["SDN considers the existence of a controller software that centralizes the network routing logic, decoupling the data plane (forwarding packages) from the control plane (routing) [2]."]} +{"1865972|11608263": ["We use multi-label classification [10] to predict controller locations."]} +{"44183395|2623404": ["In this context, learning techniques can be used to provide automatic control of the network via the SDN controller thanks to the knowledge obtained via the NA platform.", "When combined, SDN and NA provide a central entity that offers a rich view and a full control over the network where to apply ML.", "[1], this trend is gaining momentum thanks to two enabling technologies: Software-Defined Networking (SDN) and Network Analytics (NA).", "A VNF can be implemented in a traditional non-SDN network, but it is when SDN and NFV are working together\nwhen a great benefit can be obtained.", "Indeed, the rise of SDN [2] transforms the network from an inherently distributed system to a (logically) centralized one that can be fully controlled through the SDN controller.", "Open vSwitch (OVS) is an open-source implementation of a virtual SDN multilayer switch, which is used nowadays in multiple hypervisors.", "A third VM is used as as SDN controller and to receive the traffic.", "A different research area, but closely related to SoftwareDefined Networking (SDN) is the Network Function Virtualization (NFV) [6].", "The first configuration is the common behavior of an SDN switch.", "The centralized point of observation in SDN can be used to optimize the placement of the VNF, and the programmability inherent in SDN is a perfect complement to configure the different VNFs."]} +{"10383694|13172512": ["SeLeCT automatically groups flows into pure (or homogeneous) clusters using alternating simple clustering and filtering phases to remove outliers.", "For each trace, we generate two separate datasets - the set of flows originated by clients (i.e., hosts actively opening the TCP connection) and the set of flows originated by servers (i.e., hosts that replied to the connection request)."]} +{"12156979|14341962": ["In response, the community proposed automated methods (including machine learning) to study, diagnose, protect, and generally improve the analysis of networks [2], [3].", "Some advices about ML for general topics can be extrapolated to the security domain very easily, including networking security, attacks and malware in general [2]."]} +{"12156979|12187684": ["In response, the community proposed automated methods (including machine learning) to study, diagnose, protect, and generally improve the analysis of networks [2], [3]."]} +{"263548|13172512": ["Over the last few years deep packet inspection (DPI) has become popular [1], and", "In this work, we choose behavioral features that are well known to carry useful information about the application and protocol used at the application layer [1], [2].", "To provide network visibility, in the last years several classification techniques have been proposed (see [1], [2] and references therein)."]} +{"53016921|10064368": ["6) The max pooling in the second layer has a size of [2,2] and step size 2.", "In each step, the max pooling processes a [2, 2] input as follows:", "INTRODUCTION A smart home has a network that supports various types of smart devices, including home automation, health care and entertainment [1], [2].", "Smart devices can be generally divided into three types: home automation, healthcare and entertainment [2]."]} +{"53016921|393948": ["Recently, researchers have tried to apply deep learning [34], [35] to traffic classification [36], [37]."]} +{"53016921|13172512": ["Traffic classification has been widely studied in the network management domain with three major approaches, port based [25]\u2013[27], statistical approach [28], [29] and payload based [21], [22], [30], [31].", "Besides some customized statistical methods, many researcheswere carried out usingMachine Learning (ML) algorithms [29], [32], [33]."]} +{"11742818|7567339": []} +{"67866172|6583734": ["The integration of SDN and NFV technologies is referred to as the SDN/NFV architecture [29], as shown in Figure 2."]} +{"67866172|2623404": ["INTRODUCTION In recent years, Software Defined Networking (SDN) [1] and Network Functions Virtualization (NFV) [2] have emerged as cloud computing technologies."]} +{"59555284|2623404": ["An experiment is carried out in Reference [23] using some classification algorithm like J48, SVM, and Na\u00efve Bayes showing a high percentage of accuracy but dataset contains only 6 features for testing.", "For handling intrusion and DDoS attack in SDN, ML-based techniques is presented in Reference [22].", "Authors in Reference [9] present a simple survey on programmable networks with prominence on SDNs, which presents a discussion on the advancement of programmable networks with the highlights of SDN architecture.", "According to Reference [16] KDD99 contains nearly drawbacks as the whole dataset is huge enough that upturns the cost of computation of the Intrusion Detection.", "According to Reference [18], feature selection is the technique of eliminating features from the dataset that are not relevant to the task that is to be accomplished.", "Another approach of Deep learning based intrusion detection in SDN is presented in Reference [6] where their proposed DNN Model capable of achieving 75.75% accuracy.", "Authors in Reference [19] shows some approaches for performance analysis of NSL-KDD dataset using Artificial Neural Network.", "An innovative framework called Atlas presented by authors in Reference [13], which is capable of leverages application awareness and efficient for L2/3/4-based policy enforcement in SDN.", "Authors in Reference [15] discussed regarding various machine learning algorithms that have been widely used for a number of classification and prediction problems."]} +{"57763544|2623404": []} +{"11371996|2387055": ["(5) Security : SDN security consists of protecting the information from theft or damage to the hardware and the software as well as from disruption of the services [24,25].", "The SDN vulnerabilities [24,25,120 \u2013 126] can be repartitioned into \ufb01 ve major axes (Figure 9): 1) Application layer : These are software-related vulnerabilities that might be exploited through code injection."]} +{"11371996|45478730": ["Another issue that may emerge is purely related to hardware availability [62]."]} +{"6975130|6832132": ["In recent years, cost-sensitive has become one of the most popular machine learning algorithms [21]."]} +{"52963368|8450611": ["Current packet classifications can be categorized broadly into two major approaches: architectural and algorithmic [2][3][4]."]} +{"44069726|34643772": ["In SDNs, the controller, which has a crucial role in determining the functionality of each network component, may be exposed to DDoS attacks [3]."]} +{"52121125|2623404": ["This study accounting for the empirical traffic patterns employing real data taken form [4,9].", ", [4,9], the main aim of this section is to review those works that have attempted to reduce the communication overheads between the controller and switch.", "However, limitations associated with coupling of data and control planes on each NFDs are multifaceted: firstly, lacking network agility required to adopt new technologies since adding a new service/function requires adding a new NFD(s) or at least modifying their configurations [2,9].", "A typical enterprise computer network comprises of a considerable number of Networking Function Devices (NFDs) that forms the infrastructure upon which end-users devices are connected; according to some studies [1,4,9], NFDs can reach up to 60% of a network\u2019s components."]} +{"3448138|6583734": ["We can also find that the MA of [50] is 0.", "In SD-NFV, the underlying SDN infrastructure is abstracted to realize virtualized network paths that provide connectivity to support the inter-connection between Virtual Network Functions (VNF) and with the end-points.", "In our DLCPP, the simulation results confirm that it is sufficiently accurate to set r \u2032s value to 1.", "Thus, considering the overhead of SDN incurred by DLCPP, [50] is selected as the default configuration of the hidden layer in this paper.", "Function Virtualization (SD-NFV) [50] to perform this function when DLCPP is deployed on the real network.", "As shown as Figure 14, we can employ Software-Defined Network\nVOLUME 6, 2018 5087\nFunction Virtualization (SD-NFV) [50] to perform this function when DLCPP is deployed on the real network.", "We also find that the AR model gradually becomes closer to NN when slot times rise, and the AR model exceeds NN when slot time increases to 80(k = 16).\nc: EFFECT OF NODE NUMBER AT INPUT LAYER (SPATIAL DIMENSION n) For DLCPP, it is easy to understand that a larger n (input layer\u2019s node number) can collect more information; thus, DLCPP\u2019s prediction is better. n is a spatial dimension of input for DLCPP.", "We select some nodes within it to build the DLCPP,\nVOLUME 6, 2018 5081\nand the DLCPP\u2019s prediction output is sent to the controller.", "However, as shown in Section IV, benefiting from the greater prediction accuracy of DLCPP, CPC obtains a satisfactory performance gain even with this simple method.", "For DLCPP, there are two types of overhead: communication and computation.", "NN is also inferior to DLCPP, which could possibly be because the structure of NN is so simple that NN cannot capture rich features among network nodes; more importantly, NN cannot handle and utilize spatial information among nodes."]} +{"46955039|3645740": ["Afterwards, Section III-B explains the QoS and QoE metrics, that must be considered for media services, and Section III-C covers the Key Performance Indicators (KPIs) which come into play.", "Machine Learning is a good technology candidate to support the vision of the Self-Organised Network (SON) [14].", "However, the main limitation in the related work is that QoS and QoE provision are not specifically targeted toward novel use cases of NFV and SDN.", "In the context of self-configuration, self-optimization and self-healing, some works deal with growth in traffic and provide better QoS and QoE [14].", "To this end, the system processes signals from multiple network nodes and end-to-end QoS and QoE metrics.", "Section II reviews the related work in terms of network solutions for QoS and QoE-sensitive media delivery.", "The overall Network Resource Allocator diagram is depicted in Figure 2 where the QoS and QoE metrics from network nodes, media servers and players are probed in realtime and stored in the metrics database to be processed by the machine learning components.", "In terms of QoS and QoE provisioning in the core and the edge of the network, an automated topology management tool can address flexible QoS schemes, congestion control mechanisms, load balancing and management features.", "\u2022 Service probing: a client-side data collection system involves capturing and sharing QoS and QoE metrics and benchmarks."]} +{"46955039|9495329": ["Today, this vision is not yet realized [36]."]} +{"46955039|207262843": []} +{"30979706|15035771": ["Techniques include path-based protection and controller replication strategies to support resilience [18]."]} +{"30979706|13172512": ["Numerous works have been surveyed [5] covering various learning approaches such as supervised learning, unsupervised learning or clustering, and hybrid.", "Machine learning has been extensively used in the area of network anomaly detection, primarily in a classifier role distinguishing legitimate traffic from malicious, for conventional networks [5], [6]."]} +{"9217382|11414835": ["Other existing work on SDN network hypervisors has also only provided offline benchmarks proofing their implementation [6], [7], [1].", "The most used concept to virtualize SDN networks that are based on OpenFlow (OF) is to apply SDN network hypervisors [1]."]} +{"67868712|2283018": ["sionally emerging anomalies, and unavailability of labeled data makes this task more challenging [18]\u2013[20]."]} +{"46926618|3750204": ["Big Data software platforms, such as ElasticSearch, Spark or Hadoop [24], must be used to index and classify high volume of collected data in order to simplify further processing.", "Big Data software platforms, such as ElasticSearch, Spark or Hadoop [24], must be used to index"]} +{"67867204|4884302": ["DRL [128]\u2013[130]."]} +{"67867204|3645740": ["Reference [12] has surveyed the machine learning algorithms and their solutions to achieve the selfconfiguration, self-optimization and self-healing functions.", "[12] have surveyed the machine learning algorithms and their solutions in self orga-"]} +{"67867204|6909107": ["Reference [132] studies the computation offloading issue in MEC.", "In recent years, a few Edge Computing architectures have been presented, such as Cloudlet [234], Edge Computing [235], Fog Computing [236], Mobile Cloud Computing (MCC) [237], Mist Computing [238] and MobileEdge Computing (MEC) [239].", "The computation offloading problem is formulated as a non-cooperative game-theoretic problem, where the players are MEC servers, the two actions of each player are active and inactive, and the utility of each player is to minimize its energy consumption."]} +{"67867204|24110634": ["Recently, there is an increasing trend of integrating WSN with SDN to foster efficiency and sustainability in WSN [275].", "In [193], a statistical machine learning approach is proposed to increase the robustness of SDN-based Wireless Sensor Network (WSN) by predicting interference patterns over time.", "the Software Defined WSN (SDWSN) model [275], [276] is proposed."]} +{"67867204|34643772": []} +{"67867204|11381530": ["The main difference between [6] and [14] is that deep learning-based IDS has also been described detailedly in [14]."]} +{"67867204|9495329": ["case, the software defined IoT architecture [255] is proposed to satisfy the requirements of IoT."]} +{"67867204|6583734": ["[56], [57], Internet of Things (IoT) [58], edge computing [59], Wide Area Networks (WAN) [60], cloud computing [61], Network Function Virtualization (NFV) [62], [63].", "Integrated with SDN, the software defined NFV architecture is able to jointly optimize network functions and resources [62], [231].", "Network Function Virtualization (NFV) [230] is a promising technology to enable a more flexible and open network architecture, by virtualizing network functions and decoupling network functions from the underlying specialized hardware.", "The goal of the software defined NFV architecture is to automate network configuration, provision and management.", "NFV and SDN are two closely related technologies to make the network easy to control and manage.", "The difference between them is that SDN is applied to control network resources, while NFV focuses on the softwarization of network functions by using virtualization technologies.", "Due to the inherent advantages (e.g., logically centralized control, global view of the network, software-based traffic analysis, and dynamic updating of forwarding rules), SDN has been deployed in many networks, such as transport networks [54], optical networks [55], wireless networks [56], [57], Internet of Things (IoT) [58], edge computing [59], Wide Area Networks (WAN) [60], cloud computing [61], Network Function Virtualization (NFV) [62], [63].", "Reference [233] focuses on the Service Function Chaining (SFC) in NFV. RL is used to create service chains dynamically based on the resource usage condition to enable efficient service providing.", "NFV makes network reconfiguration quick and adaptive.", "ML can promote the dynamic service provision and the network resource utilization optimization in software defined NFV systems.", "Reference [134] studies the network function assignment issue in SDN/NFV system.", "The SDN/NFV system is considered as a network function market, where servers and users are the sellers and buyers of network functions respectively.", "In [232], Markov Decision Process (MDP) and Bayesian learning method are applied to optimize the dynamic resource allocation for NFV components."]} +{"67867204|8650651": ["To solve the problem, Software Defined Optical Network (SDON) [55], [242] has been proposed to enable the networking applications to use underlying optical network infrastructure dynamically and efficiently, by leveraging the ability of logically centralized control in SDN.", "traffic analysis, and dynamic updating of forwarding rules), SDN has been deployed in many networks, such as transport networks [54], optical networks [55], wireless networks"]} +{"67867204|11414835": ["For a more insightful discussion on SDN, please refer to [64]\u2013[71]."]} +{"67867204|2623404": ["For a more insightful discussion on SDN, please refer to [64]\u2013[71]."]} +{"67867204|7320605": []} +{"67867204|162478": ["For a more insightful discussion on random NN, please refer to [90]\u2013[92].", "The random NN has been used in classification and pattern recognition [90]."]} +{"67867204|13172512": ["Nguyen and Armitage [7] focus on IP traffic classification by using machine learning."]} +{"67867204|1708582": ["1) Reinforcement Learning (RL): Another quite popular learning technique is RL [125], [126]."]} +{"67867204|4269723": []} +{"50767457|2623404": ["Software-Defined Networking (SDN) [1] [2] [3] [4], an"]} +{"33541125|2387055": ["In [10], Scott et al."]} +{"3461846|19938676": ["availability of cloud platforms, and consequent extreme data rate and reliability requirements [1], [4]; traditional procedures are not only prohibitive from a cost viewpoint, but also from"]} +{"49658911|2489034": []} +{"49658911|2623404": ["resources and network functionality to be virtualized and orchestrated in order to provide new services to users [4]."]} +{"3340607|9495329": ["In [11], a survey of SDN solutions for IoT is presented, in mobile and cellular context with emphasis on 5G networks."]} +{"50775772|52059869": ["By abstracting all physical base stations (BSs) in a geographical area as a logical big BS, the software-defined networking (SDN) concept provides infrastructure flexibility as well as service-oriented customization [10], [11], and hence simplifies the management of a dense RAN [12]\u2013[14]."]} +{"50775772|206578365": []} +{"50775772|4269723": ["By abstracting all physical base stations (BSs) in a geographical area as a logical big BS, the software-defined networking (SDN) concept provides infrastructure flexibility as well as service-oriented customization [10], [11], and hence simplifies the management of a dense RAN [12]\u2013[14]."]} +{"24434774|4884302": []} +{"24434774|3994942": ["A wide range of solutions exist, , , 2017. generally based on analytical optimization or on local-search heuristic methods [8]."]} +{"6043451|13172512": ["In order to evaluate the validity of SVM learning algorithm for traffic classification, we apply SVM to classify the traffic of 3 testing datasets that consist of 130,527 flows, 55,531 flows, and 55,165 flows that belong to 3 different time periods respectively."]} +{"67865837|4269723": []} +{"52895727|53958589": []} +{"21201238|13172512": ["In [35], authors have summarized a list of flow features that have been used for traffic classification.", "TV Engine uses new features that extracts high-order frequency and temporal information from the packet sizes and arrival timestamps, improving the flow-type detection accuracies from 75-89% (using the state-of-the-art [35], [47], [11]) to 85-98%.", "Though we showed higher applications detection accuracy for as many (or more) applications as compared to previous work [26], [39], [35], [10], [17], we will continue this research and cover wider range of applications and devices/OS platforms.", "Machine Learning (ML)-based approaches [26], [48], [39], [35], [10], [17], [54], [38], [37], have much lower computational cost than DPI-based solutions [48], and can correctly identify encrypted traffic in many scenarios."]} +{"207244918|1932843": ["RL has been used for a variety of learning tasks, ranging from robotics [25, 24] to industrial manufacturing [26] and computer game playing [34]."]} +{"207244918|1708582": ["RL has been used for a variety of learning tasks, ranging from robotics [25, 24] to industrial manufacturing [26] and computer game playing [34]."]} +{"53018231|20384442": []} +{"53018231|206456479": ["Network slicing [157] and NFV [97] are two emerging concepts for resource allocation in the 5G ecosystem to provide cost-effective services with better performance."]} +{"53018231|18750590": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|5385031": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|12325031": ["Also, there are surveys discussing the applications of machine learning for networking such as [9], [10], [11], [12], and [13]."]} +{"1431100|12187684": ["This realization has attracted numerous efforts that leveraged ML for performance and traffic load prediction, and QoE-QoS correlation for proactive and adaptive network performance management [10]."]} +{"23668684|9928823": ["By combining the generative and discriminative deep architectures, a hybrid model may be constructed, particularly to carry out discrimination tasks, which are aided by the optimized outputs obtained from the generative architecture [20].", "Other deep learning architectures also exist in [20]."]} +{"23668684|7851743": ["Also, in future wireless networks, self-organization has been identi\ufb01ed as a critical issue by a number of researchers [250]."]} +{"23668684|393948": ["This idea of knowledge sharing was demonstrated in [27].", "The state-of-the-art deep learning algorithms, on the other hand, still hinge upon multi-layer architectures according to the work conducted by Bengio et al. [27]."]} +{"23668684|13172512": ["to the networking community [163]\u2013[171]."]} +{"20913098|13172512": ["Three categories of methods exist for traffic classification: port-based, payload-based and machine learning-based [5]."]} +{"59234443|2387055": ["Despite valuable advantages, like other networking architectures, SDN is unavoidably susceptible to security threats and attacks [2, 5, 8, 17, 18].", "Link discovery attacks are described in [6, 8, 17] along with other network topology poisoning.", "Much research has studied SDN security threats at various architectural layers: data layer, controller layer, and application(s) layer [2, 5, 8, 17, 18]."]} +{"7452085|2623404": ["Software Defined Networking (SDN) [4] [5] is a recent networking architecture that decouples user and control plane."]} +{"54442980|52059869": ["slices, and orchestration of various aspects [28], [29]."]} +{"54442980|206578224": ["slices, and orchestration of various aspects [28], [29]."]} +{"54442980|2387055": []} +{"56595866|3767252": ["architecture [4]."]} +{"56595866|2623404": ["of SDN is a major concern often pointed out in literature, especially for high-speed networks [35], [32]."]} +{"56595866|10693567": ["However, work presented in [36] solves this issue by complex calculations being assigned to multiple processors."]} +{"56595866|3390598": ["comes an increased risk and potential for exploitation when inserting sensing and intelligence into every device [7]."]} +{"49341077|2535224": ["Due to the limited resources in WMNs, an in-band SD-WMN structure, where the control and data traffic is transmitted in the same channel, has been realized in [2] and [14].", "The SD-WMN architecture is shown in Figure 1 [14]."]} +{"21061149|2623404": ["The SDN definition is very well described in [4]."]} +{"59619582|12395887": []} diff --git a/edge/graph_199004580.jsonl b/edge/graph_199004580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1a2cdb0505ee1e8a1deb6f6b9740acfe7e3f475 --- /dev/null +++ b/edge/graph_199004580.jsonl @@ -0,0 +1,2 @@ +{"23565748|10565822": ["A typical introductory programming course often focuses on covering features and rules of a programming language (Muller et al. 2007; Robins et al. 2003)."]} +{"12752102|7515516": []} diff --git a/edge/graph_199004840.jsonl b/edge/graph_199004840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d09fd93fb03d1cff386caae2d6f9a0f63a990fc5 --- /dev/null +++ b/edge/graph_199004840.jsonl @@ -0,0 +1 @@ +{"7692361|15916359": []} diff --git a/edge/graph_199006479.jsonl b/edge/graph_199006479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc56608610c916ee745d271a2b6b5d7e000d3f26 --- /dev/null +++ b/edge/graph_199006479.jsonl @@ -0,0 +1,2 @@ +{"36766877|11136930": []} +{"11483090|10929935": []} diff --git a/edge/graph_199007300.jsonl b/edge/graph_199007300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aca32ad803eee7e09f2a588ec41debd445726b37 --- /dev/null +++ b/edge/graph_199007300.jsonl @@ -0,0 +1,5 @@ +{"23365371|8310135": ["NER has been extensively studied both in the general NLP [45] and the biomedical NLP domains [46]."]} +{"17772075|393948": ["Deep learning architectures seem to be well suited for toxicity prediction because they (1) automatically construct complex features (Bengio et al., 2013) and (2) allow for multi-task learning (Caruana, 1997; Deng et al.", ", 2013) and (2) allow for multi-task learning (Caruana, 1997; Deng et al., 2013; Bengio et al., 2013).", "Deep learning architectures seem to be well suited for toxicity prediction because they (1) automatically construct complex features (Bengio et al., 2013) and (2) allow for multi-task learning (Caruana, 1997; Deng et al., 2013; Ben-gio et al., 2013).", "One of the hallmarks of Deep Learning are several layers of hierarchical representations of increasing abstractions (Bengio et al., 2013)."]} +{"2965434|14205872": ["[77]."]} +{"9644487|18812309": ["We used ClusterONE because of its ability to identify overlapping cohesive sub networks in weighted networks and was shown previously to detect meaningful local structures in various biological networks [31,32]."]} +{"206686308|6078908": []} diff --git a/edge/graph_199007374.jsonl b/edge/graph_199007374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6862fd692795247ae226cd61ee0f27b0feb18338 --- /dev/null +++ b/edge/graph_199007374.jsonl @@ -0,0 +1,2 @@ +{"11825224|17069874": ["However, for video application, a review of image sequence denoising methods can be found in [1]."]} +{"2221107|17069874": []} diff --git a/edge/graph_199007799.jsonl b/edge/graph_199007799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c7e87e55356de005ef30c042e1d7167547a7988 --- /dev/null +++ b/edge/graph_199007799.jsonl @@ -0,0 +1,2 @@ +{"15914227|10500613": ["Considerable prior work went into the integration of relational systems using schema matching techniques [18], [19] and integration using view and mediators [20]."]} +{"7260810|10500613": ["Rahm and Bernstein present an extensive survey of past approaches to this problem [20]."]} diff --git a/edge/graph_199008220.jsonl b/edge/graph_199008220.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199010092.jsonl b/edge/graph_199010092.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee59c59fd87202db6d576ec948371342196a95de --- /dev/null +++ b/edge/graph_199010092.jsonl @@ -0,0 +1,9 @@ +{"132877451|17054454": ["Although multispectral data might offer more powerful algorithm development for characterizing vegetation conditions (Xie et al. 2008) the higher spatial resolution possible from panchromatic imagery allows for both digital and manual interpretation approaches (Falkowski et al.", "Although multispectral data might offer more powerful algorithm development for characterizing vegetation conditions (Xie et al. 2008) the higher spatial resolution possible from panchromatic imagery allows for both digital and manual interpretation approaches (Falkowski et al. 2009)."]} +{"116391091|206051485": []} +{"3800759|17054454": []} +{"90251508|427994": ["Furthermore, Lausch et al. (2016, 2017) have presented comprehensive reviews of remote sensing methods used to assess forest health that cover various types of damage, including insect damage, drought, invasive species, air pollution, and land-use changes."]} +{"11497038|206051485": ["The main automated photogrammetric image matching methods can be divided into area- or feature-based methods [40].", ", shadows or areas that are not visible on the image), and improves geometric accuracy [7,40]."]} +{"427994|6104298": ["In addition to multi-sensor RS approaches with various RS sensors [401], multi-temporal RS have frequently been employed for LULC monitoring (for an extensive discussion see [22,46].", "Sentinel-2A /B two-satellite configuration/ESA (2015 and 2016, 5 days), Sentinel-3A/B two-satellite configuration/ESA (2016 and 2017, 4 days) [22].", "There are a wide range of RS applications to measure FH indicators [22], while at the same time the number and availability of high quality RS data is constantly growing [23\u201327]."]} +{"427994|16789883": []} +{"427994|17561208": []} +{"132768976|6104298": ["Both Hall et al. 2016 [17\u2022\u2022] and Pause et al. (2016) [31\u2022] provide tables that list current and future satellite optical sensors which highlight the increasing spectral, spatial and temporal resolution of these new missions."]} diff --git a/edge/graph_199011001.jsonl b/edge/graph_199011001.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50531b7741f2a7b51ea1ac2160997d2432cf5ea1 --- /dev/null +++ b/edge/graph_199011001.jsonl @@ -0,0 +1,46 @@ +{"77391732|19938676": ["Aiming at this target, several appealing technologies have been recently developed and widely used in current wireless networks, such as massive multiple-input multiple-output (MIMO), device-to-device (D2D) communications, and full-duplex (FD) transmissions [1]."]} +{"77391732|3330461": []} +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"45561163|2535224": []} +{"15343672|2387055": []} +{"12237313|11013798": ["Fault ? error ? failure chain A fault is a flaw in the system that can cause an error [9] [10]."]} +{"12237313|1230643": ["The third contributor is energy-constrained networks, exemplified by wireless sensor networks [39], in which nodes that have drained their battery can no longer contribute to network connectivity [40,41]."]} +{"12237313|1991786": []} +{"20603166|6909107": ["This helps operators to increase the service quality through the effective mobility management in addition to the benefits of utilizing cloud-like resources at the edge [101]."]} +{"20603166|9436049": ["Although there are studies focus on this area [231], [232], server placement in the Metropolitan area need to be studied in detail and analyzed"]} +{"20603166|3767252": ["Because of the major differences with respect to the implementation and deployment of the mentioned proposals, the security mechanisms and underlying protocols will also vary [77].", "Therefore, MEC developments should intrinsically enable security and privacy for protecting the applications and user data at the edge server and provide an authentication system for the vehicles [25], [77], [99].", "On the other hand, any casual user such as a public place owner can deploy a Cloudlet or Fog server within a private environment [77]."]} +{"20603166|8650651": ["In the case of SDON, standardization of this interface may improve the operations to a greater level since an optical network may cover a large area consisting multiple domains [221].", "The role of the northbound interface in SDONs is still raw for the time being and research in this area is more challenging since there are multitude of interfaces that should be managed in physical and transport layers [221]."]} +{"20603166|11414835": ["virtualization are feasible for abstraction and isolation, it is observed that there is a lack of complete performance evaluation [219]."]} +{"20603166|2535224": ["ization in wireless and mobile networks is more challenging and complicated [224]."]} +{"20603166|2623404": ["Moreover, there are surveys on SDN [26]\u2013[30], Software Defined Wireless Networks (SDWN) [31], [32] and Network Functions Virtualization (NFV) [33], [34] which are the complementary technologies for improving the operations of edge servers."]} +{"20603166|10693567": ["[138], OpenFlow was firstly used for a campus network which is an inspiration to support campus-based scenarios for Edge Computing."]} +{"20603166|3042864": ["There are recent surveys on cloud computing [18], [19] and MCC [8], [20]\u2013[22].", "In [20], the mobile cloud is defined in two different ways: \u2022 Infrastructure based \u2022 Ad-hoc mobile cloud According to this classification, the infrastructure based model specifies the hardware infrastructure of cloud datacenters serving to mobile users."]} +{"20603166|10532321": ["to the data plane [135]."]} +{"22895451|801245": ["Khan[6] describes benefits of the virtualization of WSN."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"56175084|10342730": ["Resource partitions, commonly referred to as slices , can be tailored and orchestrated according to different QoS requirements of different service types (e.g., real-time audio, image/video processing with various levels of delay tolerance, etc.) [23]."]} +{"56175084|3055684": ["It has recently attracted signi\ufb01cant interest due to its potential to provide a sustainable energy source for electronic devices with zero carbon emission [14]\u2013[18]."]} +{"56175084|12029139": []} +{"37451636|3007529": ["To name a few application scenarios include intelligent transportation systems (ITS) [11], volunteer information networks [12], Internet of Things (IoT) [13]\u2013[15], smart grids [16], [17] and much more."]} +{"37451636|3348390": []} +{"37451636|9104850": []} +{"3332295|206578365": ["Using the harvested energy, the two devices accomplish their computation tasks in a partial of\ufb02oading fashion [2], where the task-input bits are bit-wise independent and can be arbitrarily divided to facilitate parallel trade-offs between local computing at the mobile devices and computation\u2026"]} +{"52124201|206578365": ["5G network [13], [15]."]} +{"52124201|17787193": ["The focus of [17] is on offloading traffic with the assistance of infrastructure devices.", "Different from [17], we review these existing related works in this area from a multi-dimensional view, e.", "[17] provided a survey on traffic offloading solutions, in which mobile devices with multiple wireless interfaces are efficiently used.", "More specifically, [17] takes delay as the single matric to classify these related works of traffic offloading based on opportunistic networking into two categories, delayed offloading and non-delayed offloading.", "There are several surveys on offloading [17]\u2013[20], but they are very different from ours.", "By contrast, we focus on offloading cellular traffic through opportunistic network, consisting of mobile devices, as well as on computation offloading, which was not considered in [17]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"11140333|27466065": ["The Offloading Granularity: In our previous work [20] we analyzed different categories of approaches that allow computation offloading."]} +{"3119314|3767252": ["Threat model distribution for fog computing component (adapted from [64]).", "[64] presented a threat model by reviewing the scope and nature of potential attacks.", "manipulation and rogue infrastructure have been identified as possible security threats [64].", "Table 2 summarizes the threat model distribution in fog computing component as identified in [64].", "A common characteristics associated with fog computing is its deployment at the \u2018\u2018edge of the network\u2019\u2019 [64], [94], which implies that fog computing has features that make it a nontrivial extension of cloud computing."]} +{"26368310|17474643": ["Collaboration along tenant\u2019s applications hosted by the same cloud provider or different cloud providers can enable resource sharing and data/content protection and recovery against severe failures scenarios [227].", "1) Resilient cloud brokering: Cloud application brokering is an approach to automatically provide and manage resources for an application, including its allocation and load balancing [227]."]} +{"26368310|17557655": ["The data/content coding for recovery entails division and distribution of data/content in coded blocks enhanced with \u201cerasure segments\u201d that allow the reconstruction of the entire content from only part of the blocks [228]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} diff --git a/edge/graph_199012095.jsonl b/edge/graph_199012095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199012443.jsonl b/edge/graph_199012443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9834c6457c88d6b39cd2faf63fbc32f6718126d8 --- /dev/null +++ b/edge/graph_199012443.jsonl @@ -0,0 +1,184 @@ +{"68087836|51858916": []} +{"52343892|206578365": ["Several pioneer works have been proposed and realize quite good results in their assuming settings based on convex optimization, game theory and so on [3] [4] .", ", a typical 5G node is expected to have 2000 or more configurable parameters, a recent new trend is to optimize wireless communication by Artificial Intelligence (AI) techniques [4] [5], include but not limited to the application of AI for Physical Layer (PHY), Data Link Layer, and traffic control [6]."]} +{"52168212|21557844": ["As recently pointed out in [12], there are several generic channel model approaches available."]} +{"49291462|8999817": ["onverters in the fully digital array tends to make the design infeasible due to high energy consumption and huge hardware cost [4]. One of the most economical solutions is analog beamforming [4], [7]\u2013[11], in which the signals of all antennas are beamformed in the analog domain by using phase shifters, and a single A/D (or D/A) is used for digital processing. This analog beamforming solution has been "]} +{"49291462|11498812": ["r of beams need to be tracked, which come from many different terminals and re\ufb02ectors with high mobility. Typical scenarios include vehicle-to-vehicle/infrastructure (V2V/V2I) [16], highspeed railway [17], and unmanned aerial vehicle (UAV) [18], etc. This challenge has also been recognized in the industry as one important research task for 5G mmWave and massive MIMO systems, e.g., [19]\u2013[23]. A. Relate"]} +{"49291462|8323234": ["s and the carrier frequency increases, the large number of A/D (or D/A) converters in the fully digital array tends to make the design infeasible due to high energy consumption and huge hardware cost [4]. One of the most economical solutions is analog beamforming [4], [7]\u2013[11], in which the signals of all antennas are beamformed in the analog domain by using phase shifters, and a single A/D (or D/A) ", "HIRP project. July 23, 2018 DRAFT 2 I. INTRODUCTION The explosively growing data traf\ufb01c in future wireless systems can be leveraged by using higher frequency bands, e.g., millimeter-wave (mmWave) [2]\u2013[4]. In the mmWave band, the scattering effect is very weak [5], [6], therefore we only need to estimate the multipath channel along several distinctive directions, i.e., the line-of-sight path and a few"]} +{"70119263|21557844": ["According to mmWave terrestrial channel model study and field trials [8]-[10], mmWave channels are characterized by high propagation loss, strong shadowing effects and blockage (a) (b)"]} +{"53726738|21557844": ["The use of the mmWave spectrum, however, is challenging because it is sensitive to blockage and requires the LoS propagation between the transmitter and the receiver [79]."]} +{"53726738|61132": ["Furthermore, in military applications, such as reconnaissance, surveillance, attack, and patrol, the usage of the single-UAV networks is almost thirty years old [6].", "\u2026node may trigger the recon\ufb01guration of the whole UAV network [46]. b) Decentralized self-organization: Under the decentralized self-organization model, each entity makes self-decisions and takes actions according to nearby/local information, i.e., the direct interaction with neighbor UAV nodes [6].", "Depending on applications, the speed of a UAV may be in the range of 0-460 km/h [6], [13].", "For more information on transmission mechanisms of UAV networks, please refer to [6], [13] and references therein.", "Multi-UAV networks present a star/mesh topology structure [6].", "The procedure of the self-organization network model is as follows [6]: when a UAV node fails or new UAV node joins, its neighbor(s) monitors the incoming and outgoing links.", "Moreover, the network self-organization generates computational overhead and requires high bandwidth [6].", "On the other hand, owing to frequent changes of the network con\ufb01guration, UAV networks should be self-healing/self-organized to be more fault tolerant [6].", "To improve the reliability of the end-to-end data transmission in highly dynamic networks, delay/disruption-tolerant network (DTN) routing protocols may be required [6]."]} +{"53726738|19938676": ["Moreover, UAV communication networks have been regarded as promising proposals for the 5G system where the gigabits per second (Gb/s) data transfer rate is considered as one of the key performance indicators [51]."]} +{"53726738|26398795": ["\u2026three groups: deterministic, stochastic, and enhanced routing protocols. a) Deterministic routing protocol: In the deterministic routing protocol, a node carrying packets may select a next hop node according to deterministic/known information (e.g., contact, queue, and traf\ufb01c demand) [66], [67].", "The disadvantages of the broadcast-based routing protocol are [66]: \u2022 Contention: It may create contention for buffer space and transmission time (or the channel resource)."]} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"53754251|14543932": ["[11] reviewed various research in the"]} +{"53754251|61132": ["[12] surveyed some important issues about high mobility, dynamic topology, intermittent links, energy constraints, and changing", "A detailed survey on the types of handover and existing handover schemes in UAV networks had been given in [12]."]} +{"53754251|2623404": ["Leveraging the concepts of software and virtualization, SDN [157] and Network Function Virtualization (NFV) [158] are redefining the network architecture to support"]} +{"53754251|38911919": ["Oubbati et al. [96] proposed a connectivity-based traffic density aware routing algorithm for VANETs using UAVs.", "\u2022 UAV-enhanced VANET: VANET aims at enhancing safety and efficiency in future ITS.", "Specifically, in SAGIN, various heterogeneous communication systems such as satellite networks, FANETs, VANETs, and mobile communications are coexisting in a dynamic integration.", "For the past decades, several new kinds of ad hoc network architectures have been proposed and applied, including terrestrial networks such as VANET [140], wireless mesh network (WMN) [141], WSN [142] and aerial networks like flying ad hoc network (FANET) [143].", "What\u2019s more, the topology of FANET is more dynamic than that of MANET and typical VANET, the available routing protocols applied in\nMANET, such as optimized link-state routing (OLSR), may partly fail in tracking network topology changes.", "A detailed survey on the offloading approaches at different part of the terrestrial cellular network (access, gateway, and core) has been presented in [76], and many research works have put their attention into traffic loading about heterogeneous cellular network (HCN) [77], [78], ultra-dense network (UDN) [79], and vehicular ad hoc networks (VANETs) [80], etc.", "As an emerging technology, UAV communication has exhibited valuable features such as flexible deployment, broadband wireless access, and dynamic networking, which can enhance the performance and applications of VANET [147].", "By definition, FANET is a\nformation of MANET, and can also be classified as a subgroup of VANET.", "Currently, the potential candidates for VANET wireless communication mainly include IEEE 802.11p based dedicated short range communication (DSRC) [145] and LTE based LTE-V [146].", "architectures have been proposed and applied, including terrestrial networks such as VANET [140], wireless mesh network (WMN) [141], WSN [142] and aerial networks like flying ad hoc network (FANET) [143].", "UAV-enhanced VANET can not only improve infrastructure coverage and vehicle-to-vehicle connectivity, but also provide better safety and security on the road, and bring more comfort to the driver [148]."]} +{"51961148|3757239": ["By moving the network functions and resources closer to the end users, i.e., the network edge, many bene\ufb01ts can be obtained, such as high data rates, low delay, improved energy ef\ufb01ciency, and \ufb02exible network deployment and management [1]."]} +{"51961148|61132": ["An extensive survey of UAV communication networks can be found in [8]."]} +{"8042775|3270620": ["types of non-orthogonal multiple access (NOMA) schemes are proposed, while [4]\u2013[6] make good overviews on NOMA."]} +{"4775145|3330461": ["Device-to-cloud [4] and device-to-device [5] communication can be made by exploiting a wide range of communication channels: 3G, 4G, WiFi, Bluetooth, and even in some cases,"]} +{"4775145|14433834": ["Mobile Augmented reality (MAR) is the research area that deals with integrating the physical environment with virtual objects for mobile devices [1], [2], [3]."]} +{"4775145|469744": ["The physical and virtual objects are therefore synchronously coexisting in an intermediate plane, at the intersection between virtual reality and telepresence [9]."]} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"51928115|17690746": ["The theoretical problem we consider falls under \u201csparse phase retrieval\u201d [23, 24]."]} +{"4311986|61132": []} +{"4311986|18657007": []} +{"4311986|17206258": []} +{"53016658|206578224": ["Indeed, MEC is deemed as a key enabling technology of 5G.", "In addition, the advances in MEC would maintain the expected quality of service (QoS) throughout the drone mobility.", "MEC is based on reforming the cloud hierarchy and performing the computation processes nearby end-users.", "The MEC principle can be considered for UAV applications by pushing the control and the management logics to the edge servers nearest to the base stations drones are connected to.", "This can be achieved thanks to the use of Multi-Access Edge Computing (MEC) [10].", "While moving the orchestration and control logics to the vicinity of UAVs, leveraging MEC, would allow reducing the response time, the issue of degrading the network spectrum remains the same."]} +{"13751888|51858916": ["In [6], the authors provide a survey on the measurement campaigns launched for UAV channel modeling using low altitude platforms and discuss various channel characterization efforts."]} +{"13751888|2958701": ["learning solutions in support of SAR operations using UAVs [58].", "economically less expensive [58]; 2) Real-world problems with high number of states can turn the problem intractable with current techniques, severely limiting the development of real applications.", "classification which has been proven very effective [58].", "16: Illustration of How CNNs Work [58].", "Some of challenges are: 1) The design of computing devices with low-power consumption, particularly GPUs, is a challenge and active working field for embedded hardware developers [58]; 2) While a few UAVs can already travel without a UAV operators directing their routes, this technology is still emerging.", "on-board powerful processor devices with low power consumption is an active area for future researches [58].", "An efficient method for coping with these types of problems remains as an unsolved challenge [58].", "In [58], a review of deep learning methods and applications for UAVs were presented."]} +{"13751888|11701828": ["The researchers used UAVs for conducting environmental sampling and ocean surface temperature studies in the Arctic [69].", "The UAV also took a vertical sounding in the eye of the typhoon and measured the strongest winds during the whole flight mission [69]."]} +{"13751888|61132": ["\u2022 There is a need for a seamless mechanism to transfer the users during the handoff process between UAVs, when out of service UAVs are replaced by active ones [2].", "SDN also can help to address the complexity of network management [2].", "\u2022 We need more studies about the topology of UAV wireless networks where this topology remains fluid during: a) Changing the number of UAVs; b) Changing the number of channels; c) The relative placements of the UAVs altering [2].", "it is difficult to construct a simple implementation for proactive or reactive schemes [2].", "FANET communication bands to mitigate this problem [2].", "It only constitutes 10%-20% of the UAV energy capacity [2].", "to the power limitations of UAVs, a decision must be taken on whether UAVs should perform data and image analysis onboard in real-time, or data should be stored for later analysis to reduce the consumed power [2], [50].", "is distributed over all UAV nodes), or hybrid in which the processing control of the forwarded packets can be performed locally on each UAV node and control traffic also exists between the centralized SDN controller and all other SDN elements [2].", "In [2], the authors attempt to focus on research in the areas of routing, seamless handover and energy efficiency.", "Fluid topology and rapid changes of links among UAVs are the main characteristics of multi-UAV networks or FANET [2]."]} +{"13751888|76603": ["\u2022 Utilizing UAVs in public safety communications needs further research, where topology formation, cooperation between UAVs in a multi-UAV network, energy constraints, and mobility model are the challenges that are facing UAVs in public safety communications [9].", "The authors of [9] present an overview of legacy and emerging public safety communications technologies along with the"]} +{"13751888|15517134": ["The authors in [60] presented major categories of collision avoidance methods.", "Therefore, the development of UAV collision avoidance techniques has gained research interest [60], [300].", "These algorithms include: flight route determination, path planning, collision avoidance and swarm coordination [59], [60]."]} +{"13751888|3330461": ["the capacity in ground communications systems [269]."]} +{"13751888|4269723": ["in FANET with high reliability, reachability and fast mobility of UAV nodes [349] \u2022 More research is needed to develope specific security protocols for FANETs based on the SDN paradigm.", "in which the control plane is completely decoupled from data plane and the routing protocols can be executed onboard from SDN switching devices [349]."]} +{"10996889|8323234": ["Combatting the severe loss necessitates the use of large scale antenna arrays and beamforming at transceivers to accommodate directional transmission in mmWave systems [6]\u2013[8]."]} +{"24797392|21418": ["Recently, UAVs have also found increasingly more substantial applications in wireless communication [2], and are expected to play a significant role in the forthcoming fifth-generation (5G) wireless networks [3], [4]."]} +{"7206819|8323234": ["A discussion on some other approaches to model mmWave MIMO channel can be found in [120].", "channels for system capacity analysis or precoder design [55], [103], [120]."]} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"62841428|19788427": ["Furthermore, there is a possibility that 6G will be more than wireless, and need to handle coexistence of traditional mobile communications and interconnects inside PCs [5], as many-core PCs may use digital surface-wave communications for interconnects which might occupy the same band as 6G."]} +{"53424603|10235514": ["In recent years, the impending capacity crunch has forced the many stakeholders to explore higher frequency bands where more spectrum is available and harness them for mobile communication [1]."]} +{"54442541|52059869": ["To improve the situation, many organizations are resorting to network softwarization [3], [4] for the next-wave network evolution through the technologies of Network Function Virtualization (NFV) and Software Defined Networking (SDN)."]} +{"54442541|16496984": []} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"23696523|14527507": []} +{"33975632|2535224": []} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"4945219|3054454": ["where ayU(\u03c6) \u2208 C y U \u00d71 is the array response for elements along the y-axis, which is given by [48]"]} +{"3414483|10937383": ["Physical layer technologies introduced to this end include high order modulation transmission, carrier aggregation, cell densification via heterogeneous network, and multiple-input multipleoutput (MIMO) transmission.", "Technologies under consideration include full-dimension and massive MIMO [5], millimeter-wave communication [6], and spectrally-localized waveforms [7]."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"14537160|13178381": ["In [3], the authors discussed two main metrics, i."]} +{"12644300|61132": ["The backbone mesh network, whose nodes are the backbone node drones (BND), is a flying ad-hoc network (FANET), an ad-hoc network that is a particular class of Mobile Ad-hoc NETworks (MANET), also classifiable as a subset of Vehicular Ad-hoc NETworks (VANET) [34].", "(MANET), also classi\ufb01able as a subset of Vehicular Ad-hoc NETworks (VANET) [34]."]} +{"12644300|2623404": ["SDNs and NFV, on the other hand, are two paradigms for network softwarization, the \ufb01rst aimed at decoupling the control plane from the data plane [26,27], and the second enabling the network infrastructure to be virtualized as building block classes and functions managed by a centralized\u2026"]} +{"52124766|21557844": ["Recently, Rappaport et al. [34] present a comprehensive survey of mmWave radio propagation models to date."]} +{"54446692|10235514": ["For these reasons, vehicular communications constitute an important use-case of the fifth generation of mobile communications networks and many applications requiring high data-rate and low-latency transmission are planned [1].", "Therefore, standardization efforts for antenna structures as well as signal processing techniques and waveform-related parameters require further work [1].", "However, despite the recent research interest in mmWave vehicular networks, only a few authors have focused on the underlying propagation channel [1].", "Such systems are motivated by the need to enhance safety through collision avoidance, provide driver-assistance through cruise-control and parking assistance, and alleviate traffic congestion [1]."]} +{"57379363|61132": []} +{"13738536|29464310": ["This might occur due to CSIT inaccuracy, highly correlated multiuser channels (IUI), and irreducible ICI."]} +{"13738536|8323234": ["hardware characteristics [193], [197], [253].", "digital and analog precoders [188], [193], [197], [256], [258]."]} +{"13738536|6407074": ["For instance, EE has been jointly optimized with peak rates, WSR, or load balance in heterogeneous networks, see [291], [292], [293], [294] and references therein."]} +{"13738536|206576720": ["known as massive MIMO or large-scale MIMO [12], [13], few hundreds of antennas are employed at the BS to send simultaneously different data streams to tens of users.", "of wireless networks, where new and evolving technologies such as mmWave and massive MIMO have already been considered [13], [197], [332], [333].", "domains can provide significant gains in throughput and EE [13], [49], [315], [316].", "These schemes rely on instantaneous or statistical CSI, and can be classified as [13]: hierarchical and coupled precoders.", "Spatial clustering based on k, \u2200k, has been recently proposed to identify users with similar channel statistics in massive MIMO settings, see [13], [129], [138]."]} +{"13738536|8462498": ["Other methods for channel estimation are described in [215] and references therein.", "standard will define the conditions and methods for user grouping/association [215]."]} +{"21381783|15453366": ["The millimeter wave channel characteristics, to a large extent, dictate the choice of physical (PHY) layer and medium access control (MAC) layer schemes as well as the hardware implementation [11], [12]."]} +{"46936408|17109970": ["Energy-efficient communication becomes an emerging technology, since most of wireless sensors and actuators in CPIoTS are battery powered and thus are fundamentally constrained by the energy due to the limited battery capacity and charging facilities [12]."]} +{"52048640|21557844": ["In [11], an overview is provided for current channel models being developed for terrestrial 5G networks using mmWave frequencies."]} +{"26853250|53018231": ["SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions Section II: Artificial Neural Networ", "se works are limited in a number of ways. First,a majority of the existing worksfocuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks. Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radi"]} +{"26853250|9461213": ["e Learning Tools Key Applications FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in ", "ss application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing sur"]} +{"26853250|3645740": ["FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions ", "3], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing surveys and tutorials, such as [3], [51]\u2013[53"]} +{"26853250|206578365": ["In addition to caching, the wireless network\u2019s edge devices can be used for performing effective, low-latency computations, using the emerging paradigm of mobile edge computing [189]."]} +{"26853250|17485266": ["The mini batch gradient descent is an algorithm that strikes a balance between stochastic gradient descent and batch gradient descent [78].", "To solve these challenges, several algorithms have been proposed, such as momentum SGD, RMSProp [78], nesterov accelerated gradient [80], Adagrad [81], and AdaDelta [82].", "To overcome these drawbacks of SGD, the mini batch gradient descent [78] can be used."]} +{"26853250|5385031": ["More recently, ANNs have started to attract significant attention in the context of wireless communications and networking [2], [4], [5], [31] and [32], since the development of smart devices and mobile applications has significantly increased the level at which human users interact with the wireless communication system.", "Finally, the introductory literature on machine learning for wireless networks such as in [2], [4], [32], and", "Third, a large number of the existing surveys, such as [2], [4], and [52]\u2013[57], are highly qualitative and do not provide an in-depth technical and quantitative description on the variety of existing machine learning tools that are suitable for wireless communications.", "Meanwhile, a number of surveys on machine learning and neural network applications in wireless networking have emerged, such as in [2], [4], [32], and [51]\u2013[64]."]} +{"26853250|7774517": []} +{"26853250|1708582": ["RL algorithms are used for robotics, gaming, and navigation [67]."]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"54439311|10235514": ["Over the past years, the work on fifth-generation (5G) networks has achieved impressive results [1], [2]."]} +{"3382645|61132": ["In [16], Gupta et al . discussed the key issues of routing and protocol in UAV-aided communications."]} +{"4938665|8999817": ["A promising alternative is analog beamforming [6]\u2013[11], in which the signals of all antennas are beamformed in the analog domain by using phase shifters, and a single A/D (or D/A) is used for digital processing."]} +{"4938665|8323234": ["A promising alternative is analog beamforming [2]\u2013[4], in which the signals of all antennas are beamformed in the analog domain by using phase shifters, and a single A/D (or D/A) is used for digital processing.", "The explosively growing data traffic in future wireless systems can be leveraged by using large antenna arrays and millimeter-wave (mmWave) frequency band [1], [2].", "However, as the array size grows and the carrier frequency increases, the large number of A/D (or D/A) converters in the fully digital array make the design infeasible due to high energy consumption and huge hardware cost [2]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"52816888|3645740": ["Here, it is necessary to distinguish between two different time metrics, namely training time and response time as per [26].", "Moreover, authors in [25] and [26] focus on the potentials of machine learning in enabling the self-organization of cellular networks with the perspectives of self-configuration, self-healing and self-optimization."]} +{"52816888|206578365": ["For example, computing and caching resources can be deployed at the network edge to fulfill the demands for low latency and reduce energy consumption [7], [8]."]} +{"52816888|17485266": []} +{"52816888|12325031": ["In addition, only a specific network scenario is covered in [20]\u2013[24], while literatures [28], [31]\u2013[33]", "Specifically, authors in [23] classify those applications into decision-making tasks and classification tasks, while authors in [24] mainly concentrate on model-free strategic learning.", "The applications of machine learning in cognitive radio (CR) environments are investigated in [23] and [24]."]} +{"52816888|7851743": ["CAPEX and OPEX, and to simplify the coordination, optimization and configuration procedures of the network, self-organizing networks have been widely studied [162]."]} +{"52816888|1185580": ["In addition, since value function and policy are updated separately, policy knowledge transfer is easier to achieve [141]."]} +{"52816888|3557411": []} +{"67791843|51858916": []} +{"53046224|206578365": ["Especially, SIoV also significantly benefits from MEC applications by deploying high-performance computation and geo-distributed servers at roadside RSUs [14]\u2013[16].", "To alleviate the workloads at roadside RSUs and reduce the costs of deployed RSUs, unmanned aerial vehicles (UAV) assisted MEC as flying RSUs has been proposed to improve computation performance owing to their low cost and flexible deployment [16]\u2013[20].", "To resolve this issue, mobile edge computing (MEC) has been recognized as a cost-effective method to enhance the computation capability in proximity to mobile devices [16]."]} +{"52169284|61132": ["For example, the surveys in [8], [9] focussed on forming ad hoc networks between many UAVs in the sky."]} +{"4738885|17485266": []} +{"4738885|14258620": ["\u2022 To solve this problem, we propose a deep learning [17] algorithm that combines liquid state machine (LSM) [18] spiking neural networks with echo state networks (ESNs) [19] to determine the transmission and caching strategies by predicting the VR users\u2019 reliability."]} +{"57721129|61132": ["In [10], possible aerial network architectures were inspected, whereas [52] reports the characteristics and requirements for UAV-networks for several promising civil applications.", "Numerous research activities in this topic are well summarized in the surveys [6], [10], [36], [37], [52], [53] where the requirements for quality-of-service, data, connectivity, adaptability, security etc.", "[10] has given an overview of the the implementation of existing wireless technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies."]} +{"57721129|10310014": ["Introduction Unmanned Aerial Vehicle (UAV)-enabled solutions, systems, and networks are considered for various applications ranging from military and security operations to entertainment and telecommunications [1]\u2013 [11].", "The potential broadband wireless technologies for public safety scenarios include 4G Long Term Evolution (LTE), Wi-Fi, satellite communications and dedicated public safety systems [11]."]} +{"57761118|35260120": ["An even more drastic approach will rely on the exploitation of ambient backscattering, which enables tiny devices to operate with no battery, by redirecting ambient radio frequency (RF) signals (for example using on/off encoding) without requiring active RF transmission [14]."]} +{"207651604|1230643": ["Wireless Sensor Network (WSN) has been widely applied in numerous fields, such as satellite communication, object detection, human health monitoring, and environmental protection [1]."]} +{"115673107|17966235": []} +{"21557844|2535224": ["\u2026will also require novel network architectures that support the convergence of different wireless technologies (e.g., WiFi, LTE, mmWave, and low-power IoT) that will interact in a \ufb02exible and seamless manner using Software De\ufb01ned Networking and Network Virtualization principles [55], [56]."]} +{"21557844|8909218": ["An effective way to increase area spectral ef\ufb01ciency is to shrink cell size [40], [45], [46] where the reduced number of users per cell, caused by cell shrinking, provides more spectrum to each user.", "\u2026to the operator\u2019s core network will face challenges, such as managing RF interference and keeping timing and synchronization, and various interference avoidance and adaptive power control strategies have been suggested [45] concurrent with the move to high-speed base-band communications to RRHs."]} +{"21557844|3054454": ["It is not obvious that the stationarity region size or small-scale statistics derived from 3GPP TR 36.873 [96] and other sub-6 GHz channel models, or those used by 3GPP or International Telecommunications Union (ITU) above 6 GHz are valid for mmWave channels [80], [97]\u2013[100]."]} +{"56482358|53035780": ["In crosslayering, different network parameters from different layers are coordinated by the cross-layer controller to achieve the optimal end-to-end performance [45]."]} +{"56482358|51858916": ["Besides, they have unique features compared with the extensively studied terrestrial communication channels [24], [59], [60]."]} +{"56482358|206578486": ["verges data, data processing and application programs in the devices located on the edge of the network [223]."]} +{"56482358|30102381": ["On the other hand, most existing surveys on CPS put particular emphasis on the design and implementation of industrial systems, concerning energy [35], [36], [49], transportation [39] and production [50]."]} +{"56482358|15895606": ["For many society-critical domains, such as transportation, energy, healthcare and manufacturing, CPS enables them to be much smarter [40], [47].", "There have been many surveys thoroughly investigating the security issues (including the security requirements and solutions) for CPS which can be applied to UAV systems, such as [40]\u2013[42], as well as specially for the UAV systems, such as [316], [317], for UAV networks of different hierarchies.", "Others focus on reviewing the security challenges and approaches in various CPS applications [37], [38], [40]\u2013[42]."]} +{"56482358|206578365": ["It tremendously reduces data flow, bandwidth utilization and latency by processing the larger chunks of data at the edge, rather than redirecting them to the cloud [225]."]} +{"56482358|8854215": ["Others focus on reviewing the security challenges and approaches in various CPS applications [37], [38], [40]\u2013[42]."]} +{"56482358|1990579": ["Others focus on reviewing the security challenges and approaches in various CPS applications [37], [38], [40]\u2013[42]."]} +{"56482358|61132": ["ing on dissecting the important issues and giving some design instructions on UAV networks, including [8], [21], [23], [48].", ", [8], [21], demonstrate the communication challenges caused by the high mobility and energy constraints of", "comes from the same source, or alternatively, from different sources [21].", "On the other hand, this may result in link blockage, higher latency and large-bandwidth downlink requirement [21]."]} +{"56482358|18701981": ["From the physical issue perspective, mobility models are presented for single UAV in [33] and for collective UAVs in [34].", "Reference [34] surveys the collective movement of mobile robots, including the classification and characterization"]} +{"49566581|8323234": ["H (n) u,d \u2208 CNR\u00d7NT,u can be written as [5]", "Using the extended virtual channel model [5], the channel matrix in (3) can be approximated as", "Implementing MU MIMO in mmWave requires a mixture of analog and digital beamforming, which is called hybrid precoding and combining [5].", "This introduces new challenges in the areas of channel estimation, beam training, beam adaptation, and MU MIMO processing [5] that are not present in conventional MIMO systems.", "Additionally, it will be a part of future 5G cellular networks [5]."]} +{"48364286|206578365": ["Thus, MEC has the potential to provide low-latency services, to save energy for mobile users, and to achieve high security [2].", "These services normally require a massive number of size-constrained and low-power mobile devices to perform computation-intensive and latency-sensitive tasks [2].", "Recently, MEC has received an ever-increasing level of attention from industry and academia since it can significantly improve the computation capability of mobile devices in a cost-effective and energy-saving manner [2].", "Mobile edge computing (MEC) and wireless power transfer (WPT) have been deemed two promising technologies to tackle the above mentioned challenges [2]\u2013[4]."]} +{"48364286|22833814": ["Furthermore, UAV-assisted architectures can provide flexible deployment and low operational costs, and are particularly helpful in the situations that the conventional communication systems are destroyed by natural disasters [26]\u2013[32].", "Similar to [27]\u2013[32], it is assumed that the wireless channel between the UAV and each user is dominated by LOS."]} +{"48364286|12029139": ["On the other hand, WPT can provide low-power mobile devices with sustainable and cost-effective energy supply by using radio-frequency (RF) signals [3]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"52069312|8323234": ["After determining the set of selected beams, the transmitter and the receiver selectively turn on all selected beams together by beam selectors [40, 43].", "In particular, the clustered channel representation is usually adopted as a practical model for mmWave channels [27, 39, 40].", "2) Virtual Channel Representation (VCR): The virtual (beamspace) representation is a natural choice for modelling mmWave MIMO channels due to the highly directional nature of propagation [40]."]} +{"59343359|61132": ["Considering the communication links in the air are almost impossible to be multipath, we assume the links are LOS [2], [6].", "Besides, due to the mobility and high altitude of UAVs, it is possible to form line-of-sight (LOS) paths among UAVs to leverage the beamforming technologies in mmWave communications.", "Considering the communication links in the air are almost impossible to be multipath, we assume the links are LOS [2], Fig."]} +{"3973390|12029139": ["RF energy harvesting is a promising technology to prolong network lifetime, and recently the RF energy harvesting networks are explored in several works [15]\u2013[24]."]} +{"3973390|3330461": ["In addition, since we consider the scenario that multiple D2D pairs are allowed to use the same spectrum, their mutual interference should be carefully addressed to improve the system performance [25]\u2013[29]."]} +{"3656163|8999817": ["To overcome the hardware limitation on the number of radio frequency (RF) chains with large array size and high carrier frequency, analog beamforming with phased antenna arrays was proposed [3], [6]\u2013[9]."]} +{"3656163|8323234": ["INTRODUCTION Millimeter-wave (mmWave) communication is promising to support the vastly growing data traffic for future wireless systems [1]\u2013[3].", "To overcome the hardware limitation on the number of radio frequency (RF) chains with large array size and high carrier frequency, analog beamforming with phased antenna arrays was proposed [3], [6]\u2013[9]."]} +{"25758657|61132": []} +{"25266076|3423198": []} +{"76660922|53035780": ["In [31], the UAV-enabled IoT services are overviewed with a particular focus on data collection, delivery, and processing, while in [32] the challenges in designing and implementing multi-UAV networks for a wide range of cyber-physical applications are reviewed."]} +{"76660922|52169284": ["In particular, several magazine [12,13,20]\u2013[23] and survey [11,24]\u2013 [34] papers on wireless communications and networks with UAVs have appeared.", "The recent works [33] and [34] provide contemporary surveys of UAV applications in cellular networks, focusing on academic literatures and industry activities, respectively."]} +{"76660922|51858916": ["Signi\ufb01cant efforts have been devoted to the channel measurements and modelling for UAV communications, where some recent surveys on them can be found in e.g., [24]\u2013 [26].", "Among them, the survey papers [24]\u2013 [26] focus on air-ground channel models and experimental measurement results of UAV communications."]} +{"76660922|21418": ["However, the ef\ufb01ciency of WPT is still fundamentally limited by the distances between energy transmitters (ETs) and energy receivers (ERs) [78,79]."]} +{"76660922|61132": ["The survey papers [11], [27] and [28] mainly address ad hoc networks for UAV communications by focusing on UAV-UAV communications."]} +{"76660922|7686677": ["Thus, the energy-ef\ufb01cient design of UAV communication is more involved than that for the conventional terrestrial systems considering the communication energy only [18], [19]."]} +{"49272228|3461906": []} +{"4007794|14159066": ["11 WLANs in [13], which provides a detailed review on the optimal physical carrier sensing, adaptive physical carrier sensing in 802."]} +{"2774032|3918777": ["Learning in nonstationary environments, also known as concept drift learning or learning in dynamics in the literature, has attracted lots of efforts for the past decades, particularly in the context of classification in the communities of machine learning and computational intelligence [1-5]."]} +{"2774032|5556391": [" in dynamics in the literature, has attracted lots of efforts for the past decades, particularly in the context of classification in the communities of machine learning and computational intelligence [1, 2, 3, 4, 5]. It also has close relations with many other research areas, such as transfer learning [6], Kalman filter [7], multitask learning [8], stream and time series mining [9], and so on. Basically, con cep"]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"678032|8323234": ["Rain attenuation in different frequency bands [35]. needs to increase with the bandwidth if the signal-to-noise ratio (SNR) should remain intact [14].", "[14] is a recent overview paper on signal processing for mmWave MIMO.", "However, since the analog circuit can only partly adjust the signals, it is hard to adjust the beam to the channel conditions and this leads to a considerable performance loss [14], particularly for mobile users.", "However, realizing a fully digital MIMO implementation at mmWave frequencies is a non-trivial task, using current circuit design technology [14].", "The analog circuits of the hybrid architecture can be implemented by different circuit networks, leading to different hardware constraints [14], [115], [116].", "Yet, reference [14] is focused in mmWave MIMO and other topics e.g., recent developments of channel measure/modeling, multiple access, standardization, \ufb01eld test are missing.", "Note that references [7], [12]\u2013[14], [16] gave excellent overviews of some aspects of mmWave mobile networks from different aspects.", "In addition, fully analog architecture can only support single-stream transmission, which cannot achieve the multiplexing gain to improve spectral ef\ufb01ciency [14]."]} +{"51858916|61132": ["For instance, reference [58] identified key issues related to the formation of multi\u2013UAV network, but this survey focuses more on the communications and especially the control of UAV.", "Both [58] and [59] have very light touch on the channel modeling."]} +{"44075909|21557844": ["Each of the PL models of Figure 19 were independently used in the projects presented in Table III, which has been detailed in [189]."]} +{"44075909|10235514": ["Furthermore, as shown in Figure 1, combining the three techniques would enormously increase the capacity [16], given that the technology at the new frequency band is available and can be practically implemented."]} +{"44075909|8323234": ["However, most of these disadvantages associated with the increased carrier frequency can be mitigated by sophisticated processing techniques, such as high-gain directional antenna arrays associated with narrow beams, such as beamforming (BF) techniques [7], [44]\u2013[46], in addition to diverse other classic Multiple-Input Multiple-Output (MIMO) solutions [47]\u2013[49].", "Hybrid techniques empower digitally processing multiple data streams before being transmitted by the antenna arrays employed [49], [92]."]} +{"44075909|12681089": ["At mmWave frequencies, several studies involved the ray tracing model for predicting the propagation behaviour of the channel in diverse scenarios, as in [102], [141], [150], [159], [163]\u2013[165].", "further divided into two groups: deterministic and stochastic physical models [150].", "Channel classification according to [150] showing that the stochastic channel models is considered in this review, as characterized by the \u201cModeling Method\u201d roundabout of Figure 2.", "Channel models are generally classified into two categories, which are shown in Figure 15, known as physical models and analytical models [150].", "Generally, the probability density functions (PDFs) of channel parameters are used for characterizing both the large-scale and small-scale fading components [150], [167]\u2013[169]."]} +{"44075909|13367219": ["Numerous channel models exist in the literature, such as the WINNER II [187], WINNER+ [188], 3GPP [170] and COST [207], [210] models."]} +{"44075909|15453366": []} diff --git a/edge/graph_199013800.jsonl b/edge/graph_199013800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dfabaace5ee41de1dbe95cfcbbfca08b9354b20b --- /dev/null +++ b/edge/graph_199013800.jsonl @@ -0,0 +1,49 @@ +{"40876843|2356917": []} +{"40876843|31567906": []} +{"205710572|8530790": ["The problems presented in [26] and a problem from [23, 3] are studied in this section."]} +{"34259612|175549": []} +{"53956788|10096622": []} +{"52915917|10096622": ["The final aim of designing an algorithm is low complexity, low computation time, few control parameters, good accuracy [8]."]} +{"12980|12957829": ["A comprehensive review and taxonomy of the plethora of PSO and DE hybrids can be found in [212]."]} +{"9681924|1230643": []} +{"52160772|10096622": []} +{"45800594|17939564": []} +{"42208082|12957829": []} +{"42208082|10542845": []} +{"14529434|14088590": ["The QoS routing protocol can also work in a stand-alone multihop mobile network for real-time applications [3, 4]."]} +{"14529434|1762301": ["This is necessary for more improvement of various routing protocols for MANETs, and each proposed protocol claims that the strategy proposed provides an improvement over a number of different strategies considered in the literature [7]."]} +{"14529434|991041": ["Reference [12] presents anABMRS inMANETs, whichmakes use of a set of static and mobile agents for QoS routing [13]."]} +{"21696179|85585": ["\u2026e.g. WINs, whose architecture utilizes radio links for communication [3], \u00b5AMPS [4] is equipped with a transceiver that uses Bluetooth and also has frequency generator, some are designed to conserve as much power as possible, e.g. [5] uses a one-channel RF transceiver thereby consuming less power."]} +{"21696179|1236072": ["The heterogeneity could be due the capabilities of the sensors or in terms of more abstract metrics such as energy, computation ability, speed and so on and so forth e.g. [6] suggests clustering for networks with energy heterogeneity."]} +{"21696179|1230643": ["This variety has made it possible for WSNs to be applied in a wide range of fields and thus, pronounce the importance of Sensor networks.", "Especially the later consumes the most energy in WSNs. WSNs that are not only limited to gathering and processing scalar data but handle, i.e. collect, process, and transport multimedia (MM) data as well are referred to as WMSNs [8].", "A multi-hop communication system [1, 16] is used as this consumes rather less energy in densely randomly deployed networks as compared to the single hop communication system.", "Successfully enabling WSNs [9-10] to efficiently handle MM data as well, however, is no easy task: with it comes challenges and tough decisions to be made since there are a lot of trade-offs to consider.", "Despite their unquestionable importance, popularity or wide range of applications in the world today, WSNs are faced with quite a number of issues.", "The application areas of WSNs today include: Environmental applications: such as volcano monitoring, early flood detection, earthquake prediction to mention but a few.", "A large number of such untethered sensor nodes hence fosters the so-called WSNs [1].", "In the long run, ideal WMSNs are supposed to be able to sense, retrieve, store, process, transmit and communicate, if need be, scalar data (i.e. temperature, humidity, etc.) as normal WSNs plus still images, audio and video data (MM data).", "In order to transmit a q-bit message over a distance d, the energy dissipated is calculated according to the following equation: ( , * * T ec E q d E q q d x = + In order to receive the same message, the radio expends: For more information about details, [21] provides an analysis for WSNs and [22] provides a study about image quality and energy consumption in WMSNs.", "Other uses include structural health monitoring e.g. in chemical industries where they help measure concentrations of chemicals, ensure minimum or maximum temperature thresholds are not exceeded etc. Home applications: especially in smart homes nowadays, WSNs monitor, room conditions such as temperature, lighting and so on.", "However, in WSNs today, sensors can be scarcely or densely, depending on the type of application, deployed right next to or directly into the phenomenon.", "will not be presented here for brevity as they are already covered in literature [1].", "Heterogeneous WSNs are networks that are comprised of varying sensor nodes.", "Like WSNs, WMSNs have a great deal of requirements \u2013 some similar to those in WSNs others more complex.", "In fact, just as [1] envisioned, WSNs are already an integral part of our lives today."]} +{"69436291|5646762": []} +{"39062234|1230643": []} +{"18059551|8953108": ["To compare two binary images, Misclassification Error (ME) [Sezgin and Sankur 2004; Yasnoff et al. 1977] can be a reasonable and straightforward measure to use.", "Numerous thresholding techniques have already been proposed [Sezgin and Sankur 2004; Cheng et al. 2001; Tizhoosh 2005a; Rahnamayan et al. 2006h].", "In order to investigate the performance of the new approach, 16 hard-to-threshold images were selected; all images are frequently used in the image processing literature [Tizhoosh 2005a; Sezgin and Sankur 2004]."]} +{"21393227|8113021": ["Some examples of successful DE applications can be found in [1] and [2]."]} +{"1024748|12206204": ["By installing the sufficient BSes in a possible position based on the user\u2019s behavior, we can enhance the power efficiency of the network [6]."]} +{"10667240|8530790": ["The ability to handle complex MOPs that are characterized with discontinuities, multimodality, disjoint feasible spaces and noisy function evaluations, reinforces the potential effectiveness of multi-objective EAs (MOEAs) [7] [8]."]} +{"42068254|12957829": []} +{"11468901|10096622": []} +{"31310192|1708582": ["Reinforcement learning [1, 6, 10] is one example of building on reward and punishment concepts central to human and animal learning.", "[6] L."]} +{"113078749|1387401": ["The previous studies have shown that wireless channels exhibit transient errors at much higher rates than those observed on wires or \ufb01ber cables [11]."]} +{"67869676|3423198": []} +{"67869676|206901977": []} +{"3212153|9494512": ["If energy is available, measurements can be collected with high temporal resolution, but making the most effective use of available energy requires energy usage rates to be managed [3], [4].", "This leads to a need for local energy management at each node, making the network able to take these differences into account [4]."]} +{"55608191|10096622": []} +{"55608191|34657644": ["There are also surveys related to localization in wireless sensor network described in [32, 33]."]} +{"49323816|3423198": []} +{"125364740|17939564": []} +{"16577416|4474193": []} +{"45736482|15485264": ["For more details, one can refer to the BA\u2019s literature review conducted in Chawla and Duhan (2015) and Yang and He (2013).", "Then, it was used to solve several academic and real-life continuous problems (Gandomi et al., 2012; Tsai et al., 2012; Yang, 2011, 2012; Yang and Gandomi, 2012; Yang and He, 2013)."]} +{"12957829|13867280": []} +{"53334227|48365154": ["Nowadays, large-scale distributed intrusion detection and intrusion detection data fusion technology are the main development directions for IDS [19]."]} +{"53334227|4809836": ["As an emerging infrastructure for the application of Internet of Things, WSNs are widely used, for example, environmental monitoring, defense, urban management, medical applications, and other aspects [1, 2]."]} +{"53334227|16897832": ["Evolutionary computing (EC) methods have already been used for feature selection and classification in virtue of its overall optimization capabilities [38, 39], for instance, Particle Swarm Optimization (PSO) [40\u201343], Genetic Algorithm [44\u201346], ant colony optimization [47, 48], and some of the algorithms mentioned in [49], whereas the solution space of the feature selection problem increases exponentially with the rise of the dimension of the dataset."]} +{"53334227|6430931": []} +{"20720341|14552902": []} +{"52164801|1940388": ["However, these techniques provide security at the expense of increased energy consumption and bandwidth [4], while in the sensor nodes the resources such as energy supply, processing power, memory size and communication bandwidth are severely limited."]} +{"52164801|17205659": []} +{"206682327|4474193": []} +{"206682327|8113021": ["Elaborations on some of the applications cited above are available in [71] and [78]."]} +{"627724|13292799": ["Bio-mimic optimization algorithms have been successfully applied to design clustering-based routing protocols [15\u201325]."]} +{"69679739|1230643": []} diff --git a/edge/graph_199015037.jsonl b/edge/graph_199015037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bbb96358f9e90304af2147af568108d2ea9ebfc --- /dev/null +++ b/edge/graph_199015037.jsonl @@ -0,0 +1,2 @@ +{"6664074|16762549": ["The large variety of use cases [15]\u2013[19] led to the development of a large variety of hardware and communication technologies."]} +{"6664074|4631990": []} diff --git a/edge/graph_199016979.jsonl b/edge/graph_199016979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14588eff4a58108aaddc69dc9417c7f3f7d13ef6 --- /dev/null +++ b/edge/graph_199016979.jsonl @@ -0,0 +1,25 @@ +{"9782003|1230643": ["W IRELESS underground sensor networks (WUSNs) enable a wide variety of novel applications [1], [2], including soil condition monitoring, earthquake and landslide prediction, underground infrastructure monitoring, sports-field turf management, landscape management, border patrol and security, and etc."]} +{"3493673|2469117": []} +{"61155849|15300368": ["Another precision agriculture testbed has been developed for eal-time sensing in the field [79] ."]} +{"34071835|18148591": ["Now, we compute the channel capacity of the proposed NFMI MIMO with N transmit and N receive antennas [14]", "Therefore, a conventional RF MIMO system can linearly increase the channel capacity, which is upper bound of the data throughput, as much as the number of multiple channels whose number is equal to min (N , M ), where N and M are the number of transmit and receive antennas, respectively, [14]."]} +{"69420193|870434": []} +{"29280374|1230643": ["The emerging wireless sensor networks provide a more efficient and economical way to collect information in complex environments [26]."]} +{"9980301|870434": ["In either case, acoustic propagation implies design principles that may be quite different from those used in radio networks (for a cellular underwater network, this issue is discussed in [23]), while the harshness of the environment dictates systems that are neither small nor easily deployable, and certainly not inexpensive or disposable [24]."]} +{"17017854|1230643": [", [4], [5]."]} +{"599546|1230643": [", efficiency) and energy consumption [1].", "On the other hand, for very energy-constrained scenarios involving wireless sensing devices - many of them, unattended ones and deployed in harsh environments Wireless Sensor Networks (WSNs) may be a proper solution [1]."]} +{"2506601|1230643": ["Typical applications for such networks include soil condition monitoring, earthquake prediction, border patrol, etc. [1], [2]."]} +{"29524170|13475127": []} +{"29524170|2469117": []} +{"9158767|8316096": ["Authors in [1], [2], and [18] provide an overview of existing networking protocols for underwater networks."]} +{"110363740|870434": []} +{"51867452|870434": []} +{"8698675|31355144": ["O e of the most com ly used IoUT application types is environmental monitoring [12], including water quality monito ing [15], chemical and biological pollution mon oring [28], thermal pollution monitoring, pressure monitoring, and temperature monitoring [29].", "Readers interested in these types of applications are referred to [12] for a more detailed description.", "\u2022 In [12], the authors introduce numerous underwater monitoring applications.", "One of the most commonly used IoUT application types is environmental monitoring [12], including water quality monitoring [15], chemical and biological pollution monitoring [28], thermal pollution monitoring, pressure monitoring, and temperature monitoring [29]."]} +{"58674248|1230643": ["An important issue in sensor networks is the battery lifetime [1].", "On the other hand, a collaborative effort of multiple sensors organized in sensor networks can be exploited in order to reduce the energy consumption or increase the reliability of measurements [1].", "This technique has some beneficial properties, as discussed in [1] and [3]."]} +{"3573412|8316096": ["Some survey papers have concluded routing techniques [7,14,15].", "In [15], the authors conclude these characteristics of the challenges:", "Different from the taxonomy of [15], the authors in [14] discuss these routing techniques based on localization, routing, and reliability.", "Routing techniques are the guarantee for the reliable and efficient communication between the anchor nodes and the unknown sensor nodes [15].", "The authors present various protocols and compare them in detail, while in [15], the authors describe the routing protocols in two aspects, namely, the cross-layer design routing and the non-cross-layer design routing."]} +{"3573412|31355144": ["In [2], the authors have pointed out that the algae collection on the camera lens and salt accumulation may lead to the lower effectiveness of sensors.", "In [2], three types of communications (3D) are described as follows: (1) inter-cluster node communication at different depths; (2) sensor-anchor node communication; and (3) anchor-buoyant node communication.", "In the constrained communication, the currently tethered technology can be used but with additional cost [2].", "Those sensor nodes are spatially distributed in underwater and carry out some sensing work aiming at obtaining water-related properties [2]."]} +{"3573412|2469117": ["[13] Stationary localization algorithms, Mobile localization algorithms, Hybrid localization algorithms Medium 2012 Medium Detailed", "Then, in [13], the authors classify the localization algorithms according to the mobility of the sensor nodes."]} +{"29472809|870434": []} +{"20990528|902018": ["Underwater sensor deployment is a very crucial process as it decides the achievable sensing and communication coverage [46], [47]."]} +{"20990528|870434": ["In UWSN there is an unavoidable delay due to the propagation speed of the signals [89]."]} +{"13432763|3504276": ["source currents/voltages, in [18] it is shown that their induced magnetic fields at one or more receivers can be constructively combined, thus achieving a magnetic beamforming gain in a manner analogous to multi-antenna beamforming in farfield wireless communication or WPT [19]\u2013[21]."]} +{"13432763|12029139": []} diff --git a/edge/graph_199018063.jsonl b/edge/graph_199018063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a8bec2b2b2a8f6a056389de22f034802e48a539 --- /dev/null +++ b/edge/graph_199018063.jsonl @@ -0,0 +1,12 @@ +{"53795904|13689658": ["It is also possible to apply landmark detection methods [13, 12, 57] for better performance of keypoint detection from human body, face and both hands."]} +{"13402024|18440098": []} +{"64886876|18284918": ["[39] Khan and Ibraheem 2012 Various recognition system technique comparison on all stages"]} +{"64886876|16770050": []} +{"64886876|14970359": []} +{"64886876|7788290": ["[72] Gavrila 1998 Analyzed human movement based on 2-D approaches with, and without explicit models as well as 3-D approaches"]} +{"9183991|18454590": ["[34] gave a full review), combining ANN with HMM at different levels, have been successfully applied to speech recognition."]} +{"9183991|7185733": ["[3,4] gave a full review."]} +{"865252|18440098": []} +{"11760536|18440098": ["[52] Ong, S.", "A good overview of ASLR is given in [52]."]} +{"25013330|18440098": ["From the linguistic point of view, the subwords represent the sequential structure of signs, whereas the basic components reflect the simultaneous structure of signs [1].", "from the offset of the previous sign to the onset of the next sign [1], [4].", ", building blocks [4]): hand shape (also referred as hand configuration), orientation, location (also referred as place of articulation), and movement [1], [2].", "recognition [1], [17]) is defined as the smallest contrastive unit which has specific meaning and distinguishes one sign from another [15].", "Many previous researches [1], [9] reported that the application of context and grammar would make recogni-", "Hidden Markov model (HMM) is a powerful tool for modeling sequential data [1], [3]\u2013[6], [15]\u2013[17].", "To improve the user-independent SLR performance, a large set of training samples from multiple users and a statistical model is necessary [1], [3], [16], [20].", "Many efforts have been made to interpret hand gestures, particularly sign languages, in the linguistic research [1].", "SLR plays an important role in developing gesture-based human\u2013computer interaction systems [1]\u2013[5].", "approaches [3], [8] and the computer vision (camera)-based approaches [1], [2], [4], [17]."]} +{"5407052|18440098": []} diff --git a/edge/graph_199018656.jsonl b/edge/graph_199018656.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59a7b17d779839c8b07685e895f982c8cc4a0895 --- /dev/null +++ b/edge/graph_199018656.jsonl @@ -0,0 +1 @@ +{"15545349|53680608": ["For a survey of algorithms for 3D-motion and structure computation the reader is referred to [14] for the discrete case and [2] for the discrete as well as the continuous case."]} diff --git a/edge/graph_199019698.jsonl b/edge/graph_199019698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19902894.jsonl b/edge/graph_19902894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45dd76c6d7d3609ebad350a3f28f48f92246c7f1 --- /dev/null +++ b/edge/graph_19902894.jsonl @@ -0,0 +1,3 @@ +{"5746979|1582463": []} +{"6279653|1666690": []} +{"62743663|1582463": []} diff --git a/graph_1990579.jsonl b/edge/graph_1990579.jsonl similarity index 100% rename from graph_1990579.jsonl rename to edge/graph_1990579.jsonl diff --git a/edge/graph_199064201.jsonl b/edge/graph_199064201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72be7b668c8ea955a7a2a4f9f2e8dcdd47590fae --- /dev/null +++ b/edge/graph_199064201.jsonl @@ -0,0 +1,19 @@ +{"51981486|2323881": ["117 On the other hand, facial natural variations, such as differ118 ent expressions [14], scales [15], poses [16], occlusions [17], 119"]} +{"47002746|12127129": ["The first is action detection, which can detect excessive movements of the driver and passenger [25], [26]."]} +{"47002746|3540699": ["264 [33] format with a baseline profile."]} +{"54463368|5039874": ["3 sensitive analytics services and better support for user privacy and data security [30].", "A vector-space model is a mathematical mapping of the word space, defined as\nwhere is the length of the document , and is the Glove\nword embedding vectorization of word and document .", "Text vector-space models using 100 dimensions as described in Glove [30] can be used for deep learning models, such as CNN and RNN."]} +{"54463368|3042864": []} +{"4883014|6909107": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [3], [4], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"4883014|10299098": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [3], [4], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"31635004|16403716": ["A large body of works in multimedia and information retrieval research propose various content-based video indexing and retrieval techniques to facilitate queries on videos (e.g., [40,48,68,69])."]} +{"31635004|50041": [", [27]), spatio-temporal informationbased video retrieval (e."]} +{"44175270|26690303": ["Existing intrusion detection and prevention models generally use statistical approaches [15] such as Hidden Markov Model (HMM) [15], Bayes theory [16], cluster analysis [17], signal processing [18] and distance measuring [19] to detect anomalous activities."]} +{"206779368|10355303": ["5In practical object tracking systems, this synchronization step is typically automated [19]."]} +{"174802736|20905429": ["A few examples of such systems include simple health monitoring through wearable sensors [67, 71, 72], large-scale monitoring of big cities [9, 53, 63], and so on."]} +{"44130250|18599847": []} +{"44130250|9928823": []} +{"44130250|1634674": []} +{"6340825|359842": ["provide a comprehensive survey of the evolution of facial recognition technology [37], including breakthrough systems such as Eigenfaces [51] and Fisherfaces [27]."]} +{"51870875|17516538": ["It enables a broad spectrum of promising applications, including access control in areas of interest, human identity or behavior recognition, crowd flux statistics and congestion analysis, detection of anomalous behaviors, and interactive surveillance using multiple cameras [10]."]} +{"195658105|21386749": ["The cloud computing paradigm has provided users the \u201cpay-as-you-go\u201d computation service which is an efficient alternative to owning and managing private data centers both for individuals and industries [1]."]} +{"195658105|1223851": ["Object detection and surveillance have become pervasive in modern digital society [5] with ubiquitous deployment of IoT enabled devices such as cameras everywhere."]} diff --git a/edge/graph_199064408.jsonl b/edge/graph_199064408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1660cb637fc1542741c8c1fe33f0e313ca0147e --- /dev/null +++ b/edge/graph_199064408.jsonl @@ -0,0 +1,36 @@ +{"51982231|2088679": ["CNNs are now the state-of-the-art approach for computer vision problems and show high promise in the field of medical image analysis (Litjens et al., 2017; Tajbakhsh et al., 2016) because they are easy to set up, require little applied field knowledge (specially when compared with handcrafted feature approaches) and allow to migrate base features from generic natural image applications (Deng et al.", "trend on the field of medical image analysis, where deep learning approaches are complementing or even replacing the standard manual feature engineering approaches since they allow to achieve high performances while significantly reducing the need for field-knowledge (Litjens et al., 2017)."]} +{"67856146|3644401": ["When multiple atlases are available, they are each aligned to a target volume, and the warped atlas labels are fused [36, 41, 68, 78]."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"167211334|2088679": ["It builds on prior reviews of the intersection of deep learning and the life sciences 42,45\u201347 by incorporating a discussion of our labs\u2019 joint experiences in applying these methods to cellular imaging data, and is meant to make these methods less opaque to new adopters."]} +{"167211334|8995552": ["For segmentation tasks, both pixel-level (for example, the Dice and Jaccard indices 180 ) and instance-level metrics (precision 181 , recall 181 , and mean average precision 182 ) can be used to measure performance."]} +{"52305483|20404279": []} +{"52305483|2088679": ["It is estimated that there were over 400 papers published in 2016 and 2017 in major medical imaging related conference venues and journals (Litjens et al., 2017)."]} +{"10652042|2616070": ["affinity like fully connected CRF, boundary neural fields (BNF) [1] first predicts object boundaries with FCN feature maps and then encodes the boundary information in the pair-wise potential to enhance the semantic segmentation quality.", "Optical Coherence Tomography (OCT) is a fast and non-invasive way of obtaining three-dimensional images of the retina, and is increasingly used to monitor the onset and progression of AMD [1].", "This is possibly due to large slice thickness in the CT scans, as noticed also in [1], where the authors", "Deep learning, where all transformation levels are determined from training data, instead of being designed by experts, has been highly successful in a large number of computer vision [4] and medical image analysis tasks [1,3], substantially outperforming all classical image analysis techniques, and given the spatial coherence that is characteristic of images are typically implemented as Convolutional Neural Networks (CNN) [4].", "These methods train models to classify image patches based on mitosis annotations resulting from the agreement of several expert pathologists [1,2,9].", "Recently machine learning techniques based on manifold learning [1,18] and dictionary learning [2,16] were suggested for MRI reconstruction.", "Roughly 20% of the injuries remain unnoticed in X-ray images and 67% of these missed injuries end in tragic consequences [1,2].", "Recently, such a segmentation approach has also been applied in medical imaging for the segmentation of prostate cancer in MRI [9] and organs in chest X-rays [1].", "This study was performed with the TUPAC16 dataset [1] that includes 73 breast cancer cases annotated for mitotic figures.", "Some previous work [1] adopted 3D CRF as postprocessing to improve the segmentation results."]} +{"60440654|4570087": ["areas, for example, image classification [18], [36]; object detection [37]\u2013[39]; image segmentation [20], [40], [41]; and person reidentification [42], [43]."]} +{"2088679|393948": []} +{"206093726|2088679": ["A recent article from Litjens et al (2017) provides an excellent review of the current trends in the application of deep learning techniques to medical image analysis."]} +{"15019293|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"4884844|2088679": ["An extensive list of applications can be found in [9, 29]."]} +{"52002323|24641318": ["\u2026and Ermon, 2017), domain knowledge (Pan and Yang, 2010) or side information (Vapnik and Vashist, 2009), human/world\nknowledge (Lake et al., 2017; Song and Roth, 2017) (e.g., human-level concepts (Lake et al., 2015), common sense (Davis and Marcus, 2015), and intuitive physics (Smith and Vul,\u2026", "This knowledge may contain prior of learning tasks (Stewart and Ermon, 2017), domain knowledge (Pan and Yang, 2010) or side information (Vapnik and Vashist, 2009), human/world knowledge (Lake et al., 2017; Song and Roth, 2017) (e."]} +{"52002323|7559976": ["Readers can refer to (Csurka, 2017; Venkateswara et al., 2017) for more technical details.", "Figure 10: Illustration of the model adaptation approach (image is reproduced from (Csurka, 2017))."]} +{"52002323|7782275": ["\u2013 Meta knowledge: Some high-level knowledge beyond data, and can be helpful to compensate each concept learning with not sufficient samples (Lemke et al., 2015; Lake et al., 2017)."]} +{"10768153|17172098": []} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"58673251|2088679": ["The relevance of AL in medical imaging applications has steadily grown on pair with the progressive success in the field of deep learning models [1], which are greatly demanding in terms of annotated data."]} +{"52983066|4795312": ["Recent developments in this image-to-image reconstruction are summarized in [103]."]} +{"52983066|2088679": ["In this introduction, we are not able to highlight all developments, because this would go well beyond the scope of this document, and there are other sources that are more suited for this purpose [31,37,12].", "[12], as they did the incredible effort to review more than 300 papers in their article."]} +{"52983066|393948": ["In the literature, many arguments are found why a deep structure has benefits for feature representation, including the argument that by recombination of the weights along the different paths through the network, features may be re-used exponentially [31].", "In this introduction, we are not able to highlight all developments, because this would go well beyond the scope of this document, and there are other sources that are more suited for this purpose [31,37,12]."]} +{"75137541|51929263": ["In general, OSDA supposes C S \u2282 C T and PDA supposes The earlier related reviews on TL and DA can be referred to as [4], [8]\u2013[17], which are summarized in Table I."]} +{"75137541|3654323": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"75137541|7559976": []} +{"75137541|15888893": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"75137541|2670121": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"715578|8575576": []} +{"205572964|3519414": ["The next generation of automatic speech recognition 32 and information extraction models will likely develop clinical voice assistants to accurately transcribe patient visits.", "As such, applyication of deep-learning methods to EHR data is a rapidly expanding area 32,33 ."]} +{"205572964|2088679": ["Medical imaging, for instance, can greatly benefit from recent advances in image classification and object detection 2,8 ."]} +{"205572964|23566570": ["RL can be useful in healthcare whenever learning requires physician demonstration, for instance in learning to suture wounds for robotic-assisted surgery 7 .", "Modern genomic technologies collect a wide variety of measurements, from an individual\u2019s DNA sequence to the quantity of"]} +{"44093271|2088679": []} +{"206491372|2088679": ["Unsupervisedmachine learningmethods are also being researched, but the majority of the algorithms from 2015-2017 in the published literature have employed supervised learning methods, namely Convolutional Neural Networks (CNN) [4].", "Currently, CNNs are the most researched machine learning algorithms in medical image analysis [4].", "[4] provides a thorough list of papers published in the field, Shen et al."]} +{"206491372|3644401": []} +{"206491372|393948": ["The rationale behind this, is as Bengio states, for a given observation, only a small fraction of the possible factors are relevant, meaning that much of the features extracted from the data could be represented by being set to zero [34]."]} diff --git a/edge/graph_199091030.jsonl b/edge/graph_199091030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df1943c8d7b1234e9329e027877e79a7e2fa6099 --- /dev/null +++ b/edge/graph_199091030.jsonl @@ -0,0 +1,33 @@ +{"15854715|7360895": ["Fong et al. (2003) enumerate several behaviors of such a social (synthetic) character, as follows: 1) Communicate with high-level dialogue (address semantics and speakers intentions adequately)."]} +{"52196571|9975315": ["humans to many robots (many means more than three) [36].", "Large HRI contains large numbers of humans and robots, that is many humans to many robots, and many always more than three [36]."]} +{"52196571|1932843": ["obtained from environment is used to calculate the reward function [30]."]} +{"52196571|1708582": ["The \u03b5-greedy [37] and Boltzmann function [38] are popular explore/exploit policies for generating robots\u2019 behaviors."]} +{"3400350|16540884": ["Multimodal interfaces have been demonstrated to offer better flexibility and reliability than other human/machine interaction means [20]."]} +{"3400350|16155383": []} +{"14228824|7360895": ["In humans-robots interaction, the communication ways for emotional expression mainly include speech, facial expression, and body language, especially, speech is the highly effective method for communicating emotion [27] and the sound of speech influences the communication atmosphere significantly [16], in other words, the sound determines the existence and state of an atmosphere to a great extent."]} +{"14228824|1708582": [", -greedy [25] and Boltzmann function [26]."]} +{"4613351|7748652": ["Facial expression is one of the important aspects of nonverbal communication that can be used for autonomous HRI systems [3]."]} +{"4613351|5401262": []} +{"12764850|14561706": ["Robots for HRI within the current tactile HRI literature can have different shapes [8]."]} +{"32718107|7360895": ["Elaborating on this, [12] describe socially interactive robots as those that are able to (1) express or perceive emotions, (2) use high-level dialogue for communication, (3) have the ability to learn and recognize other agents,", "Nonetheless, robot teammates will require the appropriate social intelligence to understand both explicit and implicit communication whether or not they are implemented through closed-loop communication; and further, more communication options will become increasing available to robots as the technologies advance ultimately leading to narratively structured communications analogous to human dialogue [12]."]} +{"3879753|1452734": ["Based on views from developmental robotics [4,29], empathic behaviors are expected to be learned through social interactions with humans."]} +{"44263090|11955283": []} +{"28503408|32001173": ["The agent needs a decision mechanism that would decide when to use a plan from the library (possibly with adaptation) or generate a new plan from scratch, similar to the techniques surveyed by Meneguzzi and DeSilva [34]."]} +{"39798370|14405917": []} +{"39798370|7360895": []} +{"39798370|1118130": []} +{"8962642|13867280": ["See also [38], [53], and [68] for reviews of memetic algorithms)."]} +{"8962642|4474193": ["There are several methods for handling this uncertainty in evolutionary optimization [33]."]} +{"53513537|7748652": ["We aim to advance beyond the methodology of recent surveys [53,69] by providing a more in-depth analysis of the works under survey, as well as an additional discussion on technological maturity."]} +{"42892637|14688441": []} +{"53982162|11675147": ["several surveys on the usage of these techniques in several fields, such as social media [1], the Web [4], [7], and intrusion detection [19]."]} +{"53982162|14688441": ["These works stem from research in the field of personality computing [25], wherein systems are produced with the goal of estimating the user\u2019s personality traits from multiple sources of information, a small minority of which including robots."]} +{"12380673|3403798": ["a review of affordance-based approaches, see [47])."]} +{"12380673|8407263": ["THE so-called symbol grounding problem (SGP) [1]\u2013[3] refers to the way in which a cognitive agent forms an internal and unified representation of an external word referent from the continuous flow of low-level sensorimotor data generated by its interaction with the environment."]} +{"12380673|7360895": ["The methods used to conceive socially interactive robots derive predominantly from two approaches [17]."]} +{"3450434|6857179": ["Moreover, many studies focus on continous emotions [21,42] (assigning an intensity level of recognition) and the recognition of action units [47]."]} +{"38674369|1452734": ["[2] On the contrary, developmental robotics tries to imitate the emergence of cognition in natural and artificial systems.[3] Developmental robotics aims at the cognitive development of the agent making it able to adapt to the environment and to autonomously develop"]} +{"63264731|7360895": []} +{"63264731|14561706": []} +{"49414010|14826104": ["Scaffolding is support or feedback that is given in a timely manner to help a learner achieve a goal that they may not have without that support [10,27]."]} +{"18449990|7360895": ["One subarea is termed Social robotics and involves robots that engage in some form of social interaction with humans, through speech, gestures, or other means of communication [11]."]} diff --git a/edge/graph_1991294.jsonl b/edge/graph_1991294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_1991786.jsonl b/edge/graph_1991786.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19919054.jsonl b/edge/graph_19919054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a1ca2bb706c6b8e0b446bac6ee9330730ed78af --- /dev/null +++ b/edge/graph_19919054.jsonl @@ -0,0 +1,3 @@ +{"10556382|710141": []} +{"8447136|12894036": ["Unfortunately, despite the fact that clustering methods have been studied since the 1950 s [1, 8], applying such methods directly on data represented on Riemannian manifolds is not trivial."]} +{"152753073|60455": []} diff --git a/edge/graph_199219567.jsonl b/edge/graph_199219567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19926117.jsonl b/edge/graph_19926117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70c32c11790c384dc40ae87ac04eef0655ee3229 --- /dev/null +++ b/edge/graph_19926117.jsonl @@ -0,0 +1,5 @@ +{"29617882|15164501": ["We refer to an extensive literature review on culture in IS research in which Leidner and Keyworth (2006) differentiate the following relations between the concepts culture and IT: the impact of culture on IT, the impact of IT on culture, and IT culture.", "Therefore, we analyzed all papers mentioning or elaborating on culture with regard to the following two dimensions derived from extant research on culture and particularly from culture research in the IS discipline (Leidner and Keyworth, 2006).", "In their research on culture in IS, Leidner and Keyworth (2006) recognize the differences between a national, organizational, and subgroup level of culture and suggest a holistic understanding of culture based on its manifestation.", "As we had assumed based on existing research on culture in IS, there are papers that reference a BPM culture."]} +{"7279207|9504064": []} +{"7279207|882740": []} +{"28803536|13069188": []} +{"206386204|6592804": ["To address this issue, an interdisciplinary review of organizational performance measurement frameworks is espoused in both academic literature and business press (Waggoner et al., 1999; Kuwaiti and Kay, 2000; Kutucuoglu et al., 2002; Folan and Browne, 2005; Lin and Chen, 2007)."]} diff --git a/edge/graph_19935105.jsonl b/edge/graph_19935105.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199379878.jsonl b/edge/graph_199379878.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19938676.jsonl b/edge/graph_19938676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5556f1f0c76512d7c2ac06498861a907f55b8120 --- /dev/null +++ b/edge/graph_19938676.jsonl @@ -0,0 +1,18 @@ +{"1539241|8909218": []} +{"5257124|8909218": ["This mode needs to avoid starving the paying home UEs [8].", "The HetNet is a new technology that can cost-efficiently improve system coverage and capacity [8]."]} +{"5257124|12060835": []} +{"2783099|3936425": ["A key centerpiece in making the radio spectrum efficient is LTE heterogeneous networks (LTE HetNets) or small cell networks [21]."]} +{"15164721|8909218": ["This has motivated the recent surge of research on massive and dense deployment of base-station antennas both in the form of \u201cMassive MIMO\u201d solutions with hundreds of antennas at each cell site [1]\u2013[3] and multi-tier networks that include dense small-cell deployments [4], [5]."]} +{"10289379|2623404": ["And the OpenFlow is a representative protocol of SDN currently [27] .", "Its type coincides with OpenFlow that is why SDN controller suitable to place to cloud platform.", "Any OpenFlow switches handle the own area and report to the controller.", "Open Networking Foundation (ONF) proposed a new communications protocol called OpenFlow [26] that any forwarding switches adds the flow table for traffic forwarding.", "In short, the concept of OpenFlow controller is a centralization me approach."]} +{"2750205|7644489": ["rference from D2D to cellular transmissions can be better handled, since the BSs that are more powerful than UEs suffer from D2D interference. Therefore, sharing uplink spectrum is preferable overall [5]. The objective of this paper is to improve the network throughput by allowing D2D communication to share the cellular uplink resources. At the same time, we restrict the access of D2D links to the up", "algorithm implies that the complexity of the proposed scheme O(NDlog 2 ( max=)+N2 DK) is much lower than the complexity of the centralized scheme O(NND x N 2 D ), where K2[4;8] and log 2 ( max=) 2[5;10], while Nx2 generally and thus NND x 210 in our setup. In Fig. 5, we compare the rates of D2D and cellular links using different algorithms. The SPPP and bisection algorithms provide larger D2D and/"]} +{"9567207|7851743": ["A comprehensive survey of the existing literature, projects, and standards in SON for conventional cellular networks was presented in [8], where the weakness and existing solutions for some SON cases were discussed.", "The other self-configuration schemes [8], such as the configuration of network layer parameters, neighbor cell list, and radio access parameters, should also be designed specifically, and unfortunately they are still widely open in the literature."]} +{"206454765|8909218": []} +{"2722298|15453366": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"13411709|10693567": ["The H-CRAN based 5G systems have capabilities to provide anytime, anywhere gigabit data rate service to the desired user equipments (UEs), where an \u201cedgeless\u201d experience to UEs is provided under the help of heterogeneous MBSs and ultra dense RRHs. Based on cloud computing technologies, the\u2026", "In addition, Node C has a powerful computing capabilities to execute the large-scale cooperative signal processing in the physical layer and large-scale cooperative networking in the upper layers."]} +{"3042864|14088590": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|2282515": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|10859599": ["In the second case, the applications execute in a real cloud, for instance, Amazon EC2 [34], Google App Engine [31], and Microsoft Live Mesh [84]."]} diff --git a/edge/graph_199388769.jsonl b/edge/graph_199388769.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea60c6e2b4cfc8e000b238fdb2d1099466c7f9dc --- /dev/null +++ b/edge/graph_199388769.jsonl @@ -0,0 +1 @@ +{"52934600|15501047": []} diff --git a/edge/graph_199401695.jsonl b/edge/graph_199401695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32176eacd6d52640986b7c121fbe445b4d8cd7b2 --- /dev/null +++ b/edge/graph_199401695.jsonl @@ -0,0 +1 @@ +{"6785036|469744": []} diff --git a/edge/graph_199405568.jsonl b/edge/graph_199405568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..655a88cf5def2a43005e6fb0bc5eda2d4a2dc4cb --- /dev/null +++ b/edge/graph_199405568.jsonl @@ -0,0 +1,17 @@ +{"1033682|174797842": []} +{"14216084|14843594": ["differentiable model, which is preferable to the Gaussian kernel popular elsewhere, because it makes less restrictive 1Comprehensive tutorials are presented by Brochu et al. [17] and Shahriari et al. [18]. 2 smoothness assumptions, which can be helpful in the optimization setting [5]: k 5=2 (x;x 0) = 1 + p 5d (x;x0) + 5=3d2 (x;x0) e p 5d (x;x0): (1) Here, and are free parameters\u2014hyperparam"]} +{"40430109|14843594": [", (Snoek et al., 2012; Shahriari et al., 2016)) in which we use an acquisition function, such as expected improvement or upper confidence bound, to rank the candidate models; this takes into account uncertainty in the prediction of a model\u2019s performance, which encourages us to try models for which our predictor may be unreliable."]} +{"53109768|53280687": ["For example, Landmark regularization is proposed by [160] to improve the consistency between the performance rankings of the supernet model and that of the standalone architectures."]} +{"49868221|14843594": ["To e\ufb03ciently optimize in the joint space of architectures and hyperparameters, we use BOHB (Falkner et al., 2018), a recent combination of Bayesian optimization (Shahriari et al., 2016) and Hyperband (Li et al., 2017).", "Speci\ufb01cally, our contributions are as follows: \u2022 We show how to use a recent combination (Falkner et al., 2018) of Bayesian optimization (Shahriari et al., 2016) and Hyperband (Li et al., 2017) to perform e\ufb03cient joint neural architecture and hyperparameter search."]} +{"53211000|51929263": ["nagement, we only summarize the high-level ideas based on surveys [172], [173]. There are studies of transfer learning techniques in the context of NLP [176], Computer Vision [177], and deep learning [184] as well. An early survey of transfer learning [172] identi\ufb01es three main research issues in transfer learning: what to transfer, how to transfer, and when to transfer. That is, we need to decide what"]} +{"53211000|10092092": ["More recent surveys [173], [178] classify most of the traditional transfer learning techniques as homogeneous transfer learning where the feature spaces of the source and target tasks are the same.", "Improve Model Robust Against Noise [167], [168], [169], [170], [171] Transfer Learning [172], [173], [174], [175], [176], [177], [178] 1340 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL."]} +{"53211000|1546662": []} +{"67856022|14843594": ["We do not include Gaussian process based Bayesian optimization meth-ods (Shahriari et al., 2016), such as, e.g., Spearmint (Snoek et al., 2012), since this tends to have problems in high-dimensional discrete optimization tasks (Eggensperger et al., 2013)."]} +{"49571505|14843594": [", 2011) of Bayesian optimization (Brochu et al., 2010; Shahriari et al., 2016)) to propose a practical HPO method that fulfills all of these desiderata.", "\u2026therefore to combine the strengths of several methods (in particular, Hyperband (Li et al., 2017) and a robust & effective variant (Bergstra et al., 2011) of Bayesian optimization (Brochu et al., 2010; Shahriari et al., 2016)) to propose a practical HPO method that fulfills all of these desiderata.", "Gaussian processes are the most commonly-used probabilistic model in Bayesian optimization (Shahriari et al., 2016), since they obtain smooth and well-calibrated uncertainty estimates."]} +{"51627474|4570087": []} +{"135464997|14843594": ["\u2026by considering the recent work in hyperpa-rameter tuning for machine learning, which identifies the up to k cleaning components, we can create a parameter Quality Function Structure: Hyperparameter tuning algorithms Data Cleaning Method Structure: Similarly, black-box Parzen Estimator (TPE) [43] ."]} +{"54598079|14843594": ["Popular derivative-free optimization methods such as Bayesian optimization (Shahriari et al. 2015), evolutionary optimization (Hansen, M\u00fcller, and Koumoutsakos 2003), classification-based optimization (Yu, Qian, and Hu 2016; Hu, Qian, and Yu 2017), etc.", "Some derivative-free optimization methods (Liu et al. 2006; Bergstra and Bengio 2012; Shahriari et al. 2015; Hansen, M\u00fcller, and Koumoutsakos 2003; Hutter, Hoos, and Leyton-Brown 2011; Munos 2011; Bergstra et al. 2011; Yu, Qian, and Hu 2016) have been applied to solve this problem successfully.", "Popular derivative-free optimization methods such as Bayesian optimization (Shahriari et al. 2015), evolutionary optimization (Hansen, M \u00a8 uller, and Koumoutsakos 2003), classi\ufb01cation-based optimization (Yu, Qian, and Hu 2016; Hu, Qian, and Yu 2017), etc. are model-based.", "Some derivative-free optimization methods (Liu et al. 2006; Bergstra and Bengio 2012; Shahriari et al. 2015; Hansen, M\u00a8uller, and Koumoutsakos 2003; Hutter, Hoos, and Leyton-Brown 2011; Munos 2011; Bergstra et al. 2011; Yu, Qian, and Hu 2016) have been applied to solve this problem successfully."]} +{"1740355|1708582": []} +{"1740355|14843594": ["Bayesian optimization has also been used (Shahriari et al., 2016) for automatic selection of network architectures (Bergstra et al., 2013; Domhan et al., 2015) and hyperparameters (Snoek et al., 2012; Swersky et al., 2013)."]} +{"206596260|393948": ["We interpret the network as a trainable feature extractor, \u03c6 : X \u2192 R, followed by a single classification layer with as many sigmoid output nodes as classes observed so far [3].", "The recent success of (deep) neural networks can in large parts be attributed to their ability to learn not only classifiers but also suitable data representations [3, 21, 25, 36], at least in the standard batch setting."]} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} diff --git a/edge/graph_199438750.jsonl b/edge/graph_199438750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fcb6bf5b6ecaf991324a96eee76aca82a63544b5 --- /dev/null +++ b/edge/graph_199438750.jsonl @@ -0,0 +1,2 @@ +{"23790478|31086789": ["Nowadays, the standards EN61000-3-2, IEEE1547, IEC61850, as well as the U.S. National Electrical Code 690, and the future international standard IEC61727 are being considered [6]\u2013[8]."]} +{"23790478|12083425": []} diff --git a/edge/graph_199440381.jsonl b/edge/graph_199440381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..967c9869c9c060f1c2ab96e4487f765324ca9292 --- /dev/null +++ b/edge/graph_199440381.jsonl @@ -0,0 +1,110 @@ +{"35986198|21386749": []} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"52303493|36536": ["Symbolic execution refers to the execution of a program with symbolic value as an argument [16]."]} +{"8227817|4122595": ["Therefore, similar to [16], the conventional approaches are briefly reviewed in this survey in order to prepare for introducing the recent research to tackle the original issues.", "As far as recent surveys are concerned, in [16], the authors provided a comprehensive review of the existing CR approaches considering practical imperfections including noise uncertainty, channel/interference uncertainty, CR transceiver imperfections, noise/channel correlation, signal uncertainty, .", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|15116409": ["The problem of wideband (WB) spectrum sensing [6] consists of observing a wideband and identifying the portions of such band which are occupied by a signal and those which are free.", "The first approach to realize wideband sensing assumes that it is feasible to sample the desired spectrum by the ordinary Nyquist rate [6].", "On the contrary, wideband spectrum sensing [6][35] is based", "Compressive sensing [6] becomes a promising candidate to realize this sub-Nyquist approach.", "In other words, spectrum sensing is the task of obtaining awareness about the spectrum usage [6][14].", "However, it should be emphasized that all results presented by previous research work including [6][181], consider relatively small band (order of 300MHz) which is somehow in the order of a medium-sized band when compared to the practical wideband in the order of GHz.", "On the other hand, an overview for the wideband sensing approaches and challenges have been presented in [6].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|8974063": ["The DSMF proposed in [19] is adopted due to its clear functionality, well-defined interfaces among various blocks, and relevance to our discussion.", "Due to dynamically changing topologies and varying propagation characteristics, spectrum selection techniques [19] can be closely coupled with routing protocols.", "Dynamic Spectrum Management Framework for interweave network model [19], [23].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|2509135": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|12601073": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"3225335|25911553": []} +{"3225335|3799929": []} +{"3225335|34643772": []} +{"3225335|7525856": []} +{"3225335|8606364": ["CRN radio resource allocation has been discussed in [59]\u2013[61], and green energy-powered CRNs have been presented in [60] and [62]."]} +{"3225335|512561": ["CRNs, especially cognitive radio sensor networks (CRSNs) [246], can greatly benefit from energy harvesting approaches [247]."]} +{"3225335|1541773": ["Energy conservation is an important research domain in wireless communications [60], [62], [250]."]} +{"3225335|8650651": []} +{"3225335|4122595": ["2) Hardware Imperfections: Hardware imperfections in CRNs [107], such as non-linear distortions, phase noise, non-ideal frequency responses of circuits, power amplifier"]} +{"3225335|11414835": ["Network virtualization allows multiple virtual networks to operate over a given single physical network [267]\u2013[270]."]} +{"3225335|1686572": ["Surveys on MAC protocols for CRNs are provided in [50] and [51], while the security, privacy, and threats of CRNs have been surveyed in [52]\u2013[58].", "However, various CRNs related threats, such as primary user emulation (PUE) attacks [56] and others, as discussed in [58], have not been analyzed for FD-CRNs."]} +{"3225335|8974063": []} +{"3225335|8909218": ["2718618 This exceptional growth has motivated the development of next generation wireless technologies, such as femtocells [2], [3],"]} +{"171096642|51935081": ["Since forming blockchain requires a mining task, that is, proof-of-work (PoW), which demands both heavy computation resources and energy, it is hard to widely facilitate blockchain in a wireless network [5]."]} +{"52899540|5022650": []} +{"52899540|206578486": []} +{"52899540|3119314": []} +{"64567054|2509135": []} +{"45326077|15449163": []} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"16279144|2509135": ["Recent surveys on CRs can be found in [41], [54], [55].", "In distributed cooperative spectrum sensing [55], [172], on the other hand, secondary users within a CRN exchange their local sensing results among themselves without requiring a backbone or centralized infrastructure."]} +{"16279144|12452682": []} +{"16279144|2340253": []} +{"37536328|16378550": []} +{"37536328|19938676": []} +{"37536328|8974063": []} +{"37536328|11979239": []} +{"2666574|1520906": ["To integrate the sensory data collected from heterogeneous sources is challenging [14,38].", "The most recent advances made in IoT began when RFID tags were put into use more frequently, lower cost sensors became more available, web technology developed, and communication protocols changed [14,15]."]} +{"2666574|44461432": ["[11] introduced a systematic method for reviewing data mining knowledge and techniques in most common applications."]} +{"2666574|3330313": []} +{"2666574|38476": ["In these cases, data points consist of sequences of \u00f0 x ; y \u00de pairs rather than being drawn in an i.i.d. manner from a joint distribution p \u00f0 x ; y \u00de ; and such the sequences exhibit signi \ufb01 cant sequential correlations [55,127].", "It is worth noting that there is another closely-related task, called sequence classi \ufb01 cation , in which the goal is to predict the desired single categorical output y given an input sequence x [127]."]} +{"2666574|17374870": []} +{"16255034|15116409": ["In [47], wide-band spectrum sensing algorithms have been reviewed."]} +{"16255034|17062686": ["For example, Surveys in CR networking, spectrum management, architectures, routing, standardization activities, economic aspects and recent advances are found in [4,27\u201335]."]} +{"16255034|2509135": ["Much effort has been devoted to overcome these implementation challenges, which may offset the potential bene\ufb01ts of CSS [27]."]} +{"16255034|12601073": ["However, energy detection achieves the worst detection accuracy compared to the other available techniques [44,46,70]."]} +{"7694717|7686677": ["2% is produced by wireless networks [1], [2]."]} +{"20048229|5338241": []} +{"49183808|25929315": ["In [4] and [5], in-depth surveys"]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"14436761|12601073": ["In this context, exploring new sensing techniques that can provide better sensing efficiency in the presence of noise correlation is an important research challenge [33]."]} +{"51929773|3348390": ["This paradigm is a huge step in the evolution of Internet applications [6]."]} +{"51929773|15116409": ["A significant literature also exists on spectrum sensing, specifically on sensing algorithms [3, 23]."]} +{"51929773|2509135": ["Cognitive radio [1, 2] is a promising solution to face this issue in the next-generation wireless networks, by exploiting transmission opportunities in multiple dimensions [3].", "The state of the art can be found in some interesting surveys, such as [1, 2]."]} +{"23556999|44461432": ["Na\u00efve, selective na\u00efve, semi-na\u00efve Bayes, and Bayes multi-nets are the proposed categories for classi\ufb01cation [48]."]} +{"23556999|3750204": ["Big data analytics processes consume considerable time to provide feedback and guidelines to users, whereas only a few tools [29] can process huge data sets within reasonable amount of processing time."]} +{"23556999|121289": ["The smart grid is a new generation of power grid in which managing and distributing electricity between suppliers and consumers is upgraded using two-way communication technologies and computing capabilities to improve reliability, safety, ef\ufb01ciency with real-time control, and monitoring [73], [74]."]} +{"17816081|12601073": []} +{"49274798|925507": ["In addition, blockchain technology provides faster product innovations and integration with the IoT [30-32]."]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"15828198|512561": ["To take benefits of underutilized spectrum, Cognitive radio (CR) technology paradigm is becoming popular and has been used in different application areas such as cognitive radio based smart grid [4]\u2013[6], and cognitive radio sensor networks [7], [8]."]} +{"15828198|3348390": ["The IoT has different technologies, such as semantic, cloud services, sensor hardware/firmware, data modeling, storing, reasoning, processing, and communication technologies in cooperative mode to build its vision [9].", "time, Anyplace, with Anything and Anyone, ideally using Any path/network and Any service [9]\u201d."]} +{"44182431|3474164": ["managing the state information of massive number of IoT devices is also an issue that needs to be considered [62, 63]."]} +{"44182431|2871699": ["M2M communicaiton has been extensively reviewed in [54, 55, 56, 57, 58].", "The ETSI standard and applications has been discussed in [54] and [55], in which mobile devices are used as mobile gateways for resource constrained IoT devices."]} +{"44182431|3494096": ["The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time [1, 20, 21].", ", have been used in IoT applications, in which billion of devices will be connected by wireless communication technologies [20].", "The 3G and 4G are widely used for IoT but not fully optimized for IoT applications [20].", "Existing communication technologies are diverse and it is challenge for the fifth generation (5G) mobile network to meet the requirements of applicaitons in IoT [20].", "To ensure that M2M applications, the three generation partnership project (3GPP) proposed Enhanced Machine-Type Communication (eMTC), Extended Coverage-Global System for Mobile Communications for the IoT (EC GSM-IoT) and Narrowband-IoT (NB-IoT) as cellular-based LPWA technologies for the IoT [20].", "by inferences, such as WiFi signals, buildings, microwaves, etc [20]."]} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} +{"3632860|55729907": []} +{"3632860|6332923": []} +{"3632860|20905429": []} +{"3639079|3628110": ["Despite providing robust approaches for securing IoT, the blockchain systems are also vulnerable [136]."]} +{"3639079|3767252": []} +{"3639079|2142482": ["Similarly, the authors in [12, 13, 14] target a comparative evaluation of intrusion detection systems."]} +{"3639079|16209841": ["The security analyses presented in [9, 10, 11] discuss and compare different key management systems and cyrptographic algorithms."]} +{"3639079|2181694": ["The energy constrained devices in IoT are vulnerable to \u201dsleep deprivation\u201d attacks by causing the sensor nodes to stay awake [36].", "5 Sleep deprivation attack Energy consumption Link layer Low-level Multi-layer based intrusion detection system [36]", "A framework for mitigating sleep deprivation attacks in wireless sensor networks is described in [36]."]} +{"3639079|9646739": []} +{"3639079|925507": ["The authors in [126] have categorized 18 use cases of blockchain, out of which four cases are for IoT."]} +{"1898852|16209841": ["For instance, [11] provides a sound review of network security and identity management, but does not consider privacy, trust, and resilience; [53] emphasizes privacy and trust, but hardly tackles network security, identity management, and resilience."]} +{"67867266|8606364": []} +{"67867266|2509135": ["In addition, spectrum sensing is not required for underlay model if the PU\u2019s data are transmitted all the time in a constant mode [17]."]} +{"67867266|12601073": [", from the environments around the CR) [37]."]} +{"67264312|1599458": ["Finally, we cite the survey \u201c Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services \u201d [15], which presented the current IoT technologies, approaches, and models to \ufb01 nd out new data-related challenges."]} +{"67264312|16153186": ["In [152], the authors survey access control models in WSNs.", "Hence, other network entities, with limited authorizations, become unable to know the actual users \u2019 ID [152].", "11, we classify research activities in access control systems in a two-dimensional diagram as described in [152]."]} +{"67264312|3348390": ["In \u201c Context Aware Computing for The Internet of Things: A Survey \u201d [10], the authors proposed a context awareness for the IoT framework and gave a deep provided an in-depth analysis of the context life cycle (techniques, methods, models, functionalities, systems, applications, and middleware\u2026", "In recent years, many surveys were published to emphasize the advancement of research activities in the IoT framework [1,6 \u2013 10]."]} +{"67264312|14745481": ["In [91], Cho et al. surveyed trust management systems for Mobile Ad Hoc Networks.", "Cho et al. [91] detailed the concept of trust in many disciplines such as sociology, economics, philosophy, psychology, organizational management, autonomic computing, and communications and networking."]} +{"67264312|2906926": []} +{"67264312|9554464": ["Regarding aggregation of data collected by sensors, an important work can be found in [88], where Sang et al. proposed a method for securing data aggregation to extend the network lifetime, guaranteeing reliable data collection from sensors, and addressing a solution for node failure and healing."]} +{"21800736|12601073": ["If we further assume that the signal samples are also Gaussian [6] i.", "A review on spectrum sensing techniques for CROWN, with a special focus on sensing methods that need little or no information about the primary signals and the propagation channels, is presented in [6].", "However, when the PU signal presence is unknown yet, it is unrealistic to rely on signal covariance matrix for its detection [6] and hence PU signal is usually modeled as an IID Gaussian random process and ED is widely applied for its detection."]} +{"799455|12029139": ["Generally, in the context of IoT, wireless sensor networks (WSNs) and radio-frequency identification (RFID) tags, wireless energy sources can be classified into two categories [6]: 1) Dedicated source : Dedicated RF sources are deployed to provide a predictable energy supply to the device.", "Relay techniques utilized by 5G can benefit wireless/RF energy harvesting [6]."]} +{"799455|12060835": ["Thus, energy harvesting is a promising approach for the emerging IoT [4]."]} +{"14694682|206584087": ["For further readings on the defense mechanisms available against DDoS attacks, the reader is referred to [38]."]} +{"3271653|8974063": []} +{"55027296|8974063": ["CRNs can be classified based on their architecture [8], [11] as infrastructure-based or ad hoc networks.", "Spectrum decision consists of three functions, which are spectrum characterization, spectrum selection and CR re-configurability [19], [11]."]} +{"55027296|5338241": ["Three methods [2], [4], [13] can be used for primary transmitter detection.", "A CR device has two main characteristics which are cognitive capability and re-configurability [2], [4].", "The device can dynamically adjust its operational parameters, such as transmission frequency and power, to opportunistically utilize the empty frequency bands without disturbing PUs [2], [4]."]} +{"970599|8974063": []} +{"13711923|30399972": ["R EGULATORY bodies worldwide are facing that the rapid growth of wireless communication industry is overwhelming current static spectrum supply, and thus encourages an urgent need for improved spectrum assignment strategy to mitigate the gap between the available spectrum and the demand [1], [2]."]} +{"13711923|15116409": ["scheme [45] (termed traditional CS-based scheme) and the proposed scheme."]} +{"3474164|24110634": []} +{"3474164|13991708": ["Recently Fraga-Lamas et al. [70] reviewed the possibility of applying IoT to warfare to increase ef\ufb01ciency."]} +{"3474164|17683338": ["Dynamic memory management on the other hand is \ufb02exible as it provides for allocation and de-allocation of memory at run-time [132].", "Other available operating systems include MultimodAl system for NeTworks of In situ wireless Sensors (MANTIS), Nano-RK and LiteOS [132] however there is little or no implementation of these operating systems in SDN-based management of WSNs but rather for ordinary WSNs. Table 4 compares the\u2026", "Contiki supports dynamic memory management and memory block functions but does not provide a management mechanism for memory protection between function executions [132]."]} +{"3474164|1230643": ["Multi-hop techniques based on short range radio communication such Meshlogic and ZigBee [46] have been proposed [108] for dense WSNs enabling consumption of less energy compared to direct communication.", "A network with high security features should be developed to meet these requirements however, the challenge here is the limited resource in bandwidth and energy inherent to WSNs [46,47]."]} +{"3474164|10532321": ["OpenFlow [20,21,58] is standard commonly used as a southbound interface [27] and most vendors are producing more OpenFlow capable network infrastructure.", "These rules are then used to enforce policies on the network hardware using OpenFlow [20,21,58,63]."]} +{"3474164|9494512": ["Other energy management schemes such as energy provisioning using batteries and energy harvesting have been been presented in the past years [43]."]} +{"46877968|6332923": []} diff --git a/edge/graph_199442172.jsonl b/edge/graph_199442172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b9b24830cad4912bfb547333b790733c32b4ece --- /dev/null +++ b/edge/graph_199442172.jsonl @@ -0,0 +1,14 @@ +{"2024103|3054454": ["For example, in microphone arrays [36] or antenna arrays [37], we can divide the samples from each microphone / antenna into time intervals in order to obtain the ensemble of sampled signals B."]} +{"9024880|12127129": ["Data captured by single pixel camera can also be used for background subtraction for automatic detection and tracking of objects [57], [58]."]} +{"57753588|31973880": ["Hence, the CS can be used to sense a wider spectrum with reduced sampling requirements, resulting in more power efficient systems [4], [18], [72], [73].", "In fact, there are some survey papers in the literature that address greedy algorithms for sparse signal recovery [11]\u2013[15], measurement matrices used in compressive sensing [16], [17], and compressive sensing applications [18]\u2013[24]."]} +{"57753588|3443381": []} +{"57753588|7525856": ["Hence, the CS can be used to sense a wider spectrum with reduced sampling requirements, resulting in more power efficient systems [4], [18], [72], [73].", "In several applications, especially those involving ultrawideband communications and digital image, the Nyquist rate can be very high, resulting in too many samples, which makes it difficult to store or transmit them [4]\u2013[6]."]} +{"57753588|206485791": ["In fact, there are some survey papers in the literature that address greedy algorithms for sparse signal recovery [11]\u2013[15], measurement matrices used in compressive sensing [16], [17], and compressive sensing applications [18]\u2013[24]."]} +{"57753588|15116409": []} +{"57753588|1230643": ["Due to critically resource constraints as limited power supply, communication bandwidth, memory, and processing performance, CS can be used to reduce the number of bits to be transmitted or to represent the sensed data in WSNs [61]\u2013[64].", "Wireless sensor networks (WSNs) require high communication costs and energy consumption."]} +{"8882025|15947359": ["resource-constrained embedded devices based on the theory of Compressed Sensing (CS)."]} +{"8882025|3540699": ["It is shown that the rate of Compressed Sensed Video (CSV) can be predictably controlled by varying only the compressed sensing sampling rate."]} +{"18883840|393948": ["Much work has been devoted to un-supervised feature dictionary learning over the past years (see Bengio et al., 2013)."]} +{"3450781|7525856": []} +{"3450781|8323234": []} +{"14714898|11112426": ["Unmixing is a process to decompose an observed spectrum into pure constituent signatures, which are usually called endmembers, associated with their fractional abundances [49]\u2013[50]."]} diff --git a/edge/graph_199452685.jsonl b/edge/graph_199452685.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d9c4af1b07d7a0b644fe43792a58a0bc8da3b61e --- /dev/null +++ b/edge/graph_199452685.jsonl @@ -0,0 +1,2 @@ +{"24897627|17474643": ["A big challenge in Cloud Computing and IoT integration is related to the wide heterogeneity of devices, operating systems, platforms, and services available and possibly used for new or improved applications [62]."]} +{"27557896|206584087": ["Following is the list of numerous measures that can be used to evaluate performance of the DDoS attack detection methods [2, 46].", "Defense mechanisms are classified based on two things [46], first, based on location where defense mechanism is placed or deployed, i.", "The location or the place of defensive system should be closer to the source of the attack so as to minimize the effects of the network downtime [46]."]} diff --git a/edge/graph_199452827.jsonl b/edge/graph_199452827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c7e3e89a44608ed2f08520a8395d733bac1ca67 --- /dev/null +++ b/edge/graph_199452827.jsonl @@ -0,0 +1,3 @@ +{"17046469|17474643": ["Opportunity 1 - Standards, Benchmarks and Marketplace\nEdge computing can be realised in practice and be made accessible publicly if responsibilities, relationships and risks of all parties involved are identified."]} +{"50778394|3042864": ["ing strategies, mobility and device energy [21]."]} +{"155100678|3348390": ["Thus, a complex system under continuous change, application interference, environmental uncertainty needs to be dynamically controlled w.r.t. computational assignments of each layer to minimize response time and offer performance guarantees [6]."]} diff --git a/edge/graph_199455825.jsonl b/edge/graph_199455825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90d30df2daabd877bf27cf234d2872c0cc46a903 --- /dev/null +++ b/edge/graph_199455825.jsonl @@ -0,0 +1,12 @@ +{"1819149|17133230": []} +{"1819149|15105704": []} +{"59604987|17567998": []} +{"16865629|206778272": []} +{"7709362|16378248": ["Most authors working on fully automated identification rely on information retrieval methods for text comparison [4,31] or they count on model transformations, interrelating source and target elements of transformations [15,33].", "Identification [1] [4] [14] [15] [18] [28]"]} +{"44277110|239537": ["To pursueOB2, graph topology visualizationwas used as the basis for a guidance tool as suitably structured graphs can enable rapid uptake of abstract information [25]."]} +{"40550|239537": ["If we want to gain more insight in the hierarchical organization of each of the examples mentioned above, we can visualize the hierarchical structure using one of the many tree visualization methods that have been proposed in the past [2] [7] [15] [18] [24] [27].", "In this layout, nodes are placed on concentric circles according to their depth in the tree [2] [7] [15].", "One of the most well-known tree visualizations is the rooted tree depicted in figure 1 [2] [15] [24].", "Issues with regard to computational complexity and layout stability have also been associated with force-directed methods [15]."]} +{"116776061|6392800": []} +{"31220905|239537": ["Both approaches can be combined into so-called fish-eye representations [7].", "Yet, graph visualizations bear the risk of being large and thus, hard to understand [7]."]} +{"205435512|16378248": []} +{"16612182|239537": ["Despite all of these advantages, graphs with standard layout are often not as intuitive to ordinary users as matrices or simple references, as they can become huge and thus hard to understand [9]."]} +{"15219509|2481856": ["In general, traceability maintenance in this context requires incremental transformation approaches, for which the case when both source and target models evolve separately is challenging [12, 23]."]} diff --git a/edge/graph_199466699.jsonl b/edge/graph_199466699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199472728.jsonl b/edge/graph_199472728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e409d08835d3e4bf3c6d31a08ed2519ee337df10 --- /dev/null +++ b/edge/graph_199472728.jsonl @@ -0,0 +1,71 @@ +{"16181415|8296351": ["(2)Such constraints are introduced by child parent relationships and additional CTC that are expressed as propositional logic formulas and are obtained as described in [4]."]} +{"16181415|14022070": ["INTRODUCTION In Software Product Line \nEngineering (SPLE) families of systems are designed, rather than developing the individual products separately \n[3, 6, 21]."]} +{"9543966|14971559": []} +{"32502388|14022070": ["In this article, we describe how two techniques which are used broadly in industry and academia [54] and are described in Part 4 of ISO/IEC/IEEE 29119, namely the Classification Tree Method and Combinatorial Testing, can be applied in testing SLAs."]} +{"6321474|14022070": ["Covering Array Generation (CAG) is an important problem of CIT [4], whose task is to generate a covering array as small-sized as possible.", "Constrained CAG (as a generalization of the unconstrained version) is an NP-hard problem [4] and remains very difficult.", "Combinatorial interaction testing (CIT) has proven to be a very effective technique for discovering interaction faults of highly-configurable software.", "Covering arrays (CAs), by which any combination of the values of any t parameters is covered at least once, is the most widely used representation of test suites\nKaile Su and Dan Hao are the corresponding authors of this paper.\nfor CIT.", "Many classic works on CIT can be found in the survey by Nie and Leung [4].", "Many theoretical and practical aspects of CIT are covered by Kuhn et al. [27].", "Combinatorial interaction testing (CIT) has been extensively studied for the last 20 years and is one of the most important research domains of software engineering.", "The first one is based on the mathematical function, and it is generally an extension of the mathematical methods for constructing orthogonal arrays [4], [26]."]} +{"14512016|8296351": ["These constraints as well as those implied by the hierarchical relations between features are usually expressed and checked using propositional logic, for further details refer to [12].", "Following [12], we can express the validity of any product in an FM as a boolean formula."]} +{"14512016|14022070": ["Salient among the SPL testing approaches are those based on Combinatorial Interaction Testing (CIT), whose premise is to select a group of products where faults due to feature interactions are more likely to occur [5]."]} +{"15381759|8296351": ["However, it can be bene\ufb01cial to test features individually, as this detects features that are conditionally dead or core [6].", "As a result of feature dependencies and constraints, a feature can be a conditionally dead or core if it is under certain circumstances (i.e., features that must be selected or deselected given the feature model and already \ufb01xed features of the current con\ufb01guration) [6]."]} +{"11063942|14022070": ["For example, the test space of pair-wise testing [1], [2], which is a well-known testing technique, is modeled by a set of parameters, their values, and constraints on the value combinations.", "Pair-wise testing [1], [2] is a well-known software testing technique, which requires that every pair of parameter values be tested at least one."]} +{"15571638|14022070": ["Good surveys of ongoing research in CIT can be found in [15], [24], while an introduction to CIT and its efficacy in practice can be found in [20], [26]."]} +{"14893537|8296351": ["These functionalities are often organized in a feature model (FM) [2], [3] which represents all the possible (software) products of the SPL by expressing relationships and constraints between features."]} +{"14893537|14022070": ["Indeed, we focus on scalable product con\ufb01gura-tion generation, an open research issue [11], [12], [13].", "State of the art tools for solving CIT with constraints have great dif\ufb01culties to scale to large FMs and to deal with high t values [11], [12], [13].", "As surveyed by Nie and Leung [13], efforts have been made to prioritize test suites.", "Although t -wise generation techniques from FMs have been greatly improved over the last years, they still face scalability issues in the presence of constraints [11], [12], [13]."]} +{"6402550|14022070": ["Many of the current research directions into this technique examine specialised problems such as the addition Table 1: Overview of literature on fault detection, prioritisation and constraints: extracted from [21].", "Combinatorial interaction testing is increasingly important because of the increasing use of configurations as a basis for the deployment of systems [21].", "[21] CIT research is categorised by a taxonomy to show the areas of study.", "However, it is widely believed that only the lowest strength (pairwise interactions) can be covered in reasonable time; higher strengths, such as those up to 5- and 6-way feature interactions, have been considered infeasibly expensive, even though they may lead to improved fault revelation [17,21]."]} +{"3901082|16280101": []} +{"3901082|14022070": []} +{"14774376|14022070": ["This is because, according to the principles of CIT, covering interactions between components and reconfigurations allows us to thoroughly exercise the system under a variety of\n2015 41st Euromicro Conference on Software Engineering and Advanced Applications\n978-1-4673-7585-6/15 $31.00 \u00a9 2015 IEEE DOI 10.1109/SEAA.2015.72\n250\nconditions.", "In this paper, we present an approach, based on FM and CIT, to evaluate the reconfigurations impact over a self-adaptive system QoS.", "Therefore, the key idea behind our work is to apply the principles of FM and CIT in the domain of self-adaptive systems, in order to adequately cover the space of reconfigurations that at runtime define adaptive behavior.", "In this paper, we present an approach, based on Combinatorial Interaction Testing (CIT), that generates a sequence of configurations aimed at evaluating the extent to which reconfigurations affect the system QoS.", "This is because FM and CIT are based on the concept of test coverage, which ensures a thoughtful exploration of the system behavior.", "This result encourages the use of CIT as a strategy to evaluate the performance of self-adaptive systems.", "In the domain of software product lines, Feature Modeling (FM) [8] and Combinatorial Interaction Testing (CIT) [9] have successfully addressed the problem of sampling the configuration space and hence generate effective test configurations in large systems [10]."]} +{"16683773|14022070": ["An overview and classification of approaches can be found in [7] and [8], while [9] provide a recent survey of CIT and its evolution."]} +{"8658813|14022070": ["8", "CitLab, a laboratory for combinatorial interaction testing\nPaolo Vavassori Ph.D. course in Mechatronics, Information Technology,\nNew Technologies and Mathematical Methods XXVIII Cycle\nAdvisor: Prof. Angelo Gargantini\nUniversit\u00e0 degli Studi di Bergamo, Italy\nDepartment of Management, Information\u2026", "CitLab, a laboratory for combinatorial interaction testing\nPaolo Vavassori Ph.D. course in Mechatronics, Information Technology,\nNew Technologies and Mathematical Methods XXVIII Cycle\nAdvisor: Prof. Angelo Gargantini\nUniversit\u00e0 degli Studi di Bergamo, Italy\nDepartment of Management, Information and\nProduction Engineering\nFebruary, 2016\nI dedicated my thesis to Professor Angelo Michele Gargantini, my Advisor who believed I could do a Ph.D..", "22"]} +{"18988201|14022070": ["In a recent survey [23] Nie and Leung count more than 12 research groups that actively work on CIT area and many other groups and tools are missing in the count."]} +{"16280101|17292349": ["RQ6: Which tools support mixed covering arrays?"]} +{"16280101|14022070": ["\u2022 Variable strength Interaction or mixed strength interaction: This is an extension to the t-wise criterion that requires t-wise interaction among a subset of parameters and q-wise interaction among the remaining parameters [44].", "RQ6: Which tools support mixed covering arrays?"]} +{"7177425|14022070": ["Combinatorial Interaction Testing (CIT) is known as an effective testing technique that can be used to tackle this combination explosion problem [1], [2], [3], [4], [5]."]} +{"30098592|14022070": ["[16] reveals that only around 5 % of the publications on CTD explore the crucial modeling process.", "[16] survey 93 academic papers on combinatorial testing, and categorize them into 8 different research areas, but do not mention model evolution.", "The topic of model maintenance is not even mentioned in [16]."]} +{"14900273|8296351": ["Figure 1: A Feature Diagram of a Mobile Phone Product Line [2].", "For instance, the following product P associated to the con.guration C is \nvalid: Figure 1: A Feature Diagram of a Mobile Phone Product Line [2].", "Figure 1 depicts an example of FD of a mobile phone product line of 10 features and the dependencies between the features [2].", "Selected according to a fitness proportionate selection method 30: Ichild1, Ichild2 \u2190 crossover(Iparent1, Iparent2) 31: p1, p2 \u2190 random real number from [1, 2] 32: if p1 \u2264 Pmutation then 33: mutate(Ichild1) 34: end if 35: if p2 \u2264 Pmutation then 36: mutate(Ichild2) 37: end if 38: Evaluate F(Ichild1) = \u2211k j=1 wjFj(Ichild1) 39: Evaluate F(Ichild2) = \u2211k j=1 wjFj(Ichild2) 40: newPop\u2190 newPop \u222a {Ichild1)} \u222a {Ichild2)} 41: end while 42: while card(newPop) > n do 43: newPop\u2190 newPop \\ {{I} | I \u2208 newPop \u2227max F(I)} 44: end while 45: pop\u2190 newPop 46: end while 47: x\u2190 I | I \u2208 pop \u2227min F(I) 48: return x"]} +{"16576535|3053192": ["For instance, two decades of bespoke Combinatorial Interaction Testing (CIT) \nalgorithm development, our exemplar problem, has left software engineers with a bewildering choice of \nCIT techniques, each specialized for a particular task.", "Learning Combinatorial Interaction Test Generation Strategies using Hyperheuristic Search Yue Jia \nMyra B. Cohen Mark Harman, Justyna Petke University College London, University of Nebraska-Lincoln University \nCollege London, London, WC1E 6BT, UK Lincoln, NE 68588-0115, USA London, WC1E 6BT, UK Email: yue.jia@ucl.ac.uk \nEmail: myra@cse.unl.edu Email: {mark.harman, j.petke}@ucl.ac.uk Abstract The surge of search based software \nengineering research has been hampered by the need to develop customized search algorithms for different \nclasses of the same problem.", "To achieve our goal we se\u00adlect a mature and well studied search problem \nas our exemplar, Combinatorial Interaction Testing (CIT)."]} +{"16576535|14022070": ["I. INTRODUCTION Over the past decade, research in Search Based Software Engineering has been \ngrowing at a rapid pace [1]."]} +{"16431863|14022070": ["In the entire CT process, deriving the Combinatorial Test design model (CTDM) is a very fundamental and an important prerequisite [16].", "[16] covering all aspects of CT, from test modeling to the applications of CT.", "The extensive survey done on CT [16] reveals that modeling the SUT for CT is still an open research issue."]} +{"11246340|16280101": ["More recently, Khalsa and Labiche reported the abundance of tools and algorithms available for CIT [5].", "Last years\u2019 survey of CIT tools [5] reveals that many tools simply do not implement any constraint handling method."]} +{"11246340|14022070": ["A comprehensive survey on Combinatorial Interaction Testing has been conducted by Nie and Leung in 2011 [4]."]} +{"5591450|14022070": []} +{"16181665|14022070": ["Pair-wise testing [1], [2] is a well-known testing approach, which provides a small set of test cases that cover every pair of parameter values."]} +{"12481079|14022070": ["Index Terms\u2014Combinatorial testing; Pairwise testing; Prioritized Testing; Priority weight; Weight coverage; KL divergence."]} +{"44847214|14022070": []} +{"27039126|14022070": ["[26] considers 93 academic papers on combinatorial testing but does not mention model evolution.", "[26] reveals that only around 5% of the publications on CTD explore the crucial modeling process, and the topic of model maintenance is not even mentioned in [26]."]} +{"15791165|14022070": ["Nie and Leung 2011 [16] is a recent survey of combinatorial testing.", "Nie and Leung 2011 [16] classified handling constraints for covering array generation is an open problem for\ncovering array generation in general.", "Nie and Leung 2011 [16] classified handling constraints for covering array generation is an open problem for"]} +{"62303805|8530790": []} +{"8400656|14022070": ["\u2026criteria, such as branch coverage, e.g., [1], [2], [3], while others adopt a specification-based systematic way for classifying the input domains into equivalence classes and sampling representatives from them to be used in testing (e.g., partition testing [4] and combinatorial testing [5]).", "Finally, Section V describes the related works and Section VI concludes this paper."]} +{"92941|14022070": ["However, little consideration has been given to the process of correctly identifying the restrictions to be given as input to the CTD algorithm [21]."]} +{"17601627|14022070": ["This is done by iteratively solving the satisfiability problem."]} +{"15281237|14022070": ["CT can be brought effectively into play only when the following four key issues on how to identify 1) parameter, 2) values, 3) interactions between parameters, and 4) constraints between parameters and their values are settled[6]."]} +{"44029854|14022070": ["Good surveys of ongoing research in CIT can be found in [9, 19], while an introduction to CIT and its efficacy in practice can be found in [15, 21]."]} +{"8094814|14022070": ["In practice, this sampling is commonly performed with techniques collectively referred to as combinatorial interaction testing (or CIT) [15, 10]."]} +{"1981007|14022070": []} +{"5036665|16280101": ["Moreover, as the survey of CIT tools in [64] show, not many CIT tools implement constraint-handling methods."]} +{"5036665|14022070": ["Among those approaches, evidences revealed that the use of meta-heuristic algorithms could achieve an optimum or near-optimum combinatorial set, covering every possible interaction of input parameters (or functions) [7, 8].", "Greedy search methods are known to be faster than meta-heuristic search and are applicable to arbitrary test structures but may or may not produce smallest-size CAs [8, 26]."]} +{"205345952|14022070": ["For a survey of constructions for CAs see [5,6], and for their applications to testing see [20]."]} +{"14151043|8296351": ["These constraints as well as those implied by the hierarchical relations between features are usually expressed and checked using propositional logic, for further details refer to [3]."]} +{"41829780|14022070": ["Efforts to determine or bound CAN(t, k, v) have been extensive; see [7, 9, 20, 26] for example."]} +{"49889623|14022070": ["I NTRODUCTION Covering arrays (CAs) have been extensively used for testing [1]."]} +{"4527189|14022070": ["Although we provide a brief introduction to CCT in the next section, we refer the reader to the literature [17] for a broader perspective."]} +{"8933889|14022070": ["Conceptually, all the t-tuples included in the seed are considered to be already covered and a new set of con\ufb01gurations are generated only to cover the rest of the valid t-tuples."]} +{"14067727|14022070": ["The typical situation is that certain combinations of parameter values are invalid [8]."]} +{"17836427|8296351": ["Figure 1: A simple feature model of a mobile phone product line [1], representing the features and their dependencies."]} +{"60764152|14022070": ["Evidence showed that this reduction can be very effective in term of defect detection since there is no need to test all possible combinations [7].", "Generating an optimized list of combinations for a specific input is a painstakingly difficult task because it is an NP-hard computational optimization problem [7].", "From the literature, there are different tools and strategies for generating the combinatorial set of different inputs [7].", "Based on the experimental studies, the use of these algorithms and theories with the random generation proves the generation of optimal combination sizes [7,8]."]} +{"17156798|14022070": ["Good surveys on the ongoing research in CIT can be found in [21], [14], while an introduction on CIT and its efficacy in practice can be found in [17]."]} +{"17031114|8296351": []} +{"29226044|14022070": ["Combinatorial Test Design (CTD) is an effective methodology for test design of complex software systems, in which a system is modelled using a combinatorial model [6, 16].", "A combinatorial model, consists of a set of parameters, their respective possible values and a set of logical restrictions on the value combinations [6, 16].", "However, according to [6], only 5% of publications on CTD address the process of constructing combinatorial models.", "The need for human-centric approaches in supporting the process of combinatorial test design is increasingly acknowledged [6, 13].", "There is a large body of works on different aspects of CTD (see [6] for a comprehensive survey), and numerous tools have been developed (e."]} +{"55813338|14022070": ["In addition, as test suite generation process in an NP-hard problem [25, 26], no single strategy can claim dominance over the others."]} +{"8442113|14022070": ["[28]) covers interactions of parameters in the system under test.", "[28]) refer to a subclass of the covering test problems."]} +{"9156386|14022070": ["[30]) refer to a subclass of the covering test problems, where T is the set of all value tuples of size t."]} +{"15270973|14022070": ["Experience suggest that building this CT model is a formative and strenuous task as it needs to be manually built with considerable amount of domain knowledge and testing experience [10] [13]."]} +{"21907362|16280101": []} +{"21907362|14022070": ["The rationale behind this selection is that several studies cover these papers (see [2], [7], [138]).", "Nie and Lueng [2] conducted one of the \ufb01rst comprehensive reviews covering combinatorial testing and its applications.", "Nie and Lueng [2] conducted one of the first comprehensive reviews covering combinatorial testing and its applications."]} +{"23150326|16280101": ["More information about these variants and heuristics dedicated to them can be found in a number of surveys, including [12, 13, 15, 18, 19].", "A technical review of tools and algorithms proposed to solve CIT is proposed in [13]. authors analysed 75 algorithms and tools devoted to CIT: 32 (44"]} +{"23150326|14022070": ["More information about these variants and heuristics dedicated to them can be found in a number of surveys, including [12, 13, 15, 18, 19]."]} +{"6423976|14022070": ["Refer to Nie and Leung\u2019s survey [ 11 ] or the website maintained by Czerwonka [3] to find more details."]} +{"581740|14022070": []} +{"49895315|14022070": ["Keywords-constrained locating array, SMT solver, interaction faults, constraint handling\nI. INTRODUCTION\nThe test suite used for Combinatorial Interaction Testing (CIT) [1], [2] can often be represented as a mathematical object called Covering Array (CA).", "From the results, we can see that the sizes of CLAs found by our proposed technique is smaller than those of 3-way CCAs, generated by CIT-BACH, by 33.25% in average and by up to 65.00% for benchmark No.7.", "The importance of constraint handling is widely recognized in the field of CIT.", "1) Answer for RQ1: Table IX shows the comparison of the sizes of 3-way CCAs (generated by CIT-BACH) and the sizes of CLAs generated by our algorithm within an hour.", "The benchmark No.1 is provided in Cohen et al. [19], the benchmarks No.2 - 4 are provided in Johansen et al. [20], No.5 - 6 are provided in CIT-LAB [21], and the others, No.7 - 12, can be found in Segall et al. [22].", "The test suite used for Combinatorial Interaction Testing (CIT) [1], [2] can often be represented as a mathematical object called Covering Array (CA).", "As our proposed algorithm works in collaboration with a CCA generation tool, we use CIT-BACH [24] for it.", "\u2022 The \u201cinitial size\u201d column shows the sizes of 3-way CCAs generated by CIT-BACH; i. e., the initial size of CLA that our algorithm starts with.", "For experiments, we prepare the benchmarks provided in Cohen et al. [19], Johansen et al. [20], CIT-LAB [21], and Segall et al. [22], which collects 26 SUTs for real industrial systems, for our benchmark set.", "A Constrained Covering Array (CCA) can be considered another extended variant of CA [1].", "Here we focus on CLAs that are the extension of (1, 2)-LAs, denoted as (1, 2)-CLAs, since pair-\nwise testing, i.e., the CIT of strength t = 2 is probably the most well-practiced CIT strategy and the case where at most d = 1 faulty interaction may exist is of more practical interest than other cases."]} +{"14455736|16280101": ["Index Terms\u2014Combinatorial interaction testing, prioritisation, empirical studies, software testing\n\u00c7"]} +{"14455736|14022070": ["Index Terms\u2014Combinatorial interaction testing, prioritisation, empirical studies, software testing\n\u00c7", "In this section we present literature on combinatorial testing as well as notation used throughout the paper.", "From the literature, there is a widely-held belief that SA is slower, but produces more effective tests suites than Greedy and that SA cannot scale to higher strength coverage.", "Furthermore, in order to test all combinations one would need 4 3 4 \u00bc 48 test cases, pairwise coverage reduces this number to 16."]} +{"39674180|14022070": []} diff --git a/edge/graph_199488266.jsonl b/edge/graph_199488266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf489bf6a72b0f9adbf901e13028fbe854798bc3 --- /dev/null +++ b/edge/graph_199488266.jsonl @@ -0,0 +1,43 @@ +{"4890608|12029139": ["Among the identi\ufb01ed renewable energy sources, a RF energy source is controllable [14], while other energy sources are uncontrollable [13].", "The categories are the co-located RF receiver architecture, which includes power splitting and time-switching RF architectures, the separated RF receiver architecture, and the integrated RF receiver architecture [14].", "RF energy sources are of two basic types, namely ambient RF energy sources (ARFES) and dedicated RF energy sources (DRFES) [14]."]} +{"6820964|6959212": []} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"3889274|12060835": []} +{"59619843|20612430": ["Solutions are often sought through a heuristic method when other methods such as classical optimization methods could not solve an energy minimization problem, or when the solutions obtained have high complexities and failed to deliver an expected result within a reasonable period of time [195].", "An evolutionary algorithm is a type of algorithm that simulates the evolution of individual structures by selecting, recombining and reproducing mutations, and thus produces better solutions [195].", "However, solutions provided through classical optimization methods often result in high complexities in terms of computational time and resources [195].", "LP methods have a number of advantages, they can provide optimal solutions to optimization problems and they can also act as bounds for the algorithms obtained using other methods [195]."]} +{"59619843|3504276": ["This situation is due to the doubly near-far problem [153].", "RF energy transfer can simply be described as the transmission of RF energy through RF wave radiations from an RF transmitter [105], [153], [154]."]} +{"59619843|1902483": ["Also, it is important to mention that the two coils must maintain the same orientation for this technique to be operational [165], [166]."]} +{"59619843|12029139": ["Consequently, concurrent energy transfer to several WQN in the network is possible [135].", "energy sources, the sources are deployed and committed to the supply of RF energy to the WQN at a pre-defined rate and frequency [135].", "lable, and offer suitable QoS performance for WSN applications [135].", "RF energy sources can be categorized into two groups [135], namely ambient RF energy sources, and dedicated RF energy sources.", "of 3 kHz to 300 GHz [123], [135] in the electromagnetic spectrum, RF energy can be harvested or transferred in", "Examples of such techniques include radio frequency energy transfer, energy transfer through laser beam, and coupling-based energy transfer [123], [135], [152].", "examples of commercialized RF energy harvesters are the Powercaster receiver [136] and the Cota receiver [135].", "sources, it has a number of advantageous characteristics [135], such as stable and predictable energy harvesting over a fixed", "They can be classified into four basic categories [135], namely the time switching structure, the power splitting structure, the separated receiver structure, and the", "include the Powercaster transmitter, isotropic RF transmitter, and the Cota transmitter [101], [135], [155]."]} +{"59619843|33867211": ["28% [132], as the generators commonly employed in the exploitation of wind energy suffers from low conversion efficiency [124], and the unpredictable nature of flow sources [109].", "it is characterized by low energy efficiency of about 8% due to the low conversion efficiency of the generators used to exploit energy from the flow of water [124]."]} +{"59619843|13292799": ["the context of energy and memory [196]."]} +{"59619843|41998167": ["nication capabilities, limited energy, processing capabilities, to limited memory for data storage [20], [21]."]} +{"59619843|10096622": ["rithms [203], genetic algorithm (GA) [204], artificial bee"]} +{"59619843|15300368": ["Examples of where heuristics solutions have been developed are in maximizing WSN lifetime with respect to energy [194], [198]."]} +{"59619843|1230643": ["4 GHz bands of the free industrial, scientific and medical (ISM) frequency allocation [76], [83].", "WSNs are valuable tools used in WQM application to collect, process, and disseminate WQ data to WQ centers [76], [101], [102].", "The sensor module usually consists of two sub-units, namely an analogto-digital converter (ADC) and the sensor [76].", "3, namely a sensor module, a microprocessor module, an RF transceiver module, and a power source [76]\u2013[79].", "In summary, the power source is responsible for making the required energy available to the various modules in the WQN architecture and this makes it an important component to the survival of a WSN application [76]."]} +{"14980052|1230643": ["Although sensor networks still struggle with technical problems, such as energy-consumption, unreliability of network access and standard or software mismatches [20-22], they have already been used for long-term monitoring under harsh outdoor conditions.", "[22].", "Thus, diagnostic and debugging as well as communication protocols are analyzed in relation to the application and power-consumption [1, 21, 22]."]} +{"46047485|1520906": []} +{"15721938|6275330": ["I. INTRODUCTION\nWireless sensor networks (WSNs) are increasingly being used in a wide field of applications in various domains, from health-care to network control and monitoring [1] [2]."]} +{"53634324|1230643": ["There have been a numerous research on the constructions of WSN technology for the detection of water contaminants whilst providing low cost, higher detection sensitivity, sufficient data sets, improved data acquisition and low power consumptions [41]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"14126308|562065": ["During periods of inactivity, the sensors can gradually scale back their energy consumption [27]."]} +{"7132356|25929315": ["Although di \ufb00 erent subtleties have been suggested to share optimally the RACH channel [4], the most e \ufb03 cient way relies on providing MTDs and UEs (User Equipment) with separate access channels."]} +{"114996794|1687471": []} +{"114996794|1230643": []} +{"3419623|4427557": ["In [11], the LPWA standards and proprietary LPWA technologies, as well as the challenges and", ", LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "For LPWA networks, most\nof the existing solutions, e.g., LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "The Table also lists the applications (provided in [11] and [89]) that can be supported by each technology."]} +{"3419623|19636511": ["The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14].", "Weightless-N, Weightless-P, and Amber Wireless as mentioned in [14]."]} +{"3419623|25929315": ["M2M communication RA is limited, and the large number of simultaneous network access attempts may result in high collision rate [13].", "The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14]."]} +{"56721119|1230643": ["Several authors have classi\ufb01ed WSN applications according to their application domain (Akyildiz et al., 2002; Xu, 2002)."]} +{"21404231|4427557": ["15 km in open area with strong penetrability [8], [9]."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"16986437|18594141": []} +{"16986437|1230643": ["The IEEE 802.11ac is an improved version of the IEEE 802.11n, and it provides high throughput wireless local area networks (WLANs) in the 5 GHz band with more spatial streams and higher modulation with MIMO yielding data rates up to 433.33 Mbps [12]."]} +{"3284474|562065": []} +{"3284474|15300368": []} +{"16588075|6959212": ["Installation flexibility and easy configuration enable better usability and maintenance than traditional communication technologies [1].", "Traditionally, applications in industrial environments are based on wired communication solutions [1]."]} +{"17203548|580211": ["2003], and residential water management [Carboni et al. 2016].", "\u2026for marine environment monitoring (MEM) and sensing [Albaladejo et al. 2010; Xu et al. 2014], water-level sensing [Loizou and Koutroulis 2016], water pipeline monitoring [BenSaleh et al. 2013], fish farming monitoring [Carroll et al. 2003], and residential water management [Carboni et al. 2016]."]} +{"17203548|13475127": ["There have been a few literature reviews on the use of WSNs for marine environment monitoring (MEM) and sensing [Albaladejo et al. 2010; Xu et al. 2014], water-level sensing [Loizou and Koutroulis 2016], water pipeline monitoring [BenSaleh et al.", "There have been a few literature reviews on the use of WSNs for marine environment monitoring (MEM) and sensing [Albaladejo et al. 2010; Xu et al. 2014], water-level sensing [Loizou and Koutroulis 2016], water pipeline monitoring [BenSaleh et al. 2013], fish farming monitoring [Carroll et al.\u2026", "However, only a few references present details about the energy management schemes [Xu et al. 2014], and as described earlier for WQM systems, most of the existing works have used duty cycling, wake-up radios, and data fusion approaches to reduce the energy drain."]} +{"17203548|6396569": []} +{"17203548|1940388": ["A security breach and compromised node(s) may exhaust the batteries of the sensor nodes, rendering the network inoperable [Wang et al. 2006; Chen et al. 2009].", "Malicious code can also be injected into the database, which can result in data loss or data inconsistency [Wang et al. 2006; Chen et al. 2009]."]} +{"17203548|17205659": ["A security breach and compromised node(s) may exhaust the batteries of the sensor nodes, rendering the network inoperable [Wang et al. 2006; Chen et al. 2009].", "Malicious code can also be injected into the database, which can result in data loss or data inconsistency [Wang et al. 2006; Chen et al. 2009]."]} +{"9712276|12060835": []} +{"92996254|12029139": []} +{"62630862|13475127": []} +{"17891937|14132386": ["Traditional SPIN is a data-centric [11] routing protocol for WSN."]} diff --git a/edge/graph_199488815.jsonl b/edge/graph_199488815.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c021e1ca80fb4400fdee07b712aa969f1ea2af7 --- /dev/null +++ b/edge/graph_199488815.jsonl @@ -0,0 +1,8 @@ +{"110934018|12083425": []} +{"2741720|12083425": ["Many countries have their own grid codes which monitor the behavior of the wind turbines connected to the grid [3]."]} +{"109570983|12083425": []} +{"49367584|17381415": []} +{"63940026|17758458": []} +{"30438961|8363289": ["MPC has also gained popularity in industry since 90s and there is a steadily increasing attention from control practitioners and theoreticians [9], [10]."]} +{"67786378|12083425": ["Recent advancements in wind turbine technology and power electronic systems are also more instrumental for the brisk option of grid integration of wind energy conversion system [2]."]} +{"114409077|17381415": []} diff --git a/edge/graph_199489346.jsonl b/edge/graph_199489346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d6841ed9f3d7f99de5cc5be3e905099e8333b61 --- /dev/null +++ b/edge/graph_199489346.jsonl @@ -0,0 +1,22 @@ +{"184482781|60779308": ["The three geometric shape features [23] are Solidity, Eccentricity, and Convexity (For more details of these descriptors we refer the reader to the original work).", ") are a convenient way to describe shapes and are simple to compute [23]."]} +{"20959831|1716644": []} +{"20959831|31980349": []} +{"20959831|60779308": []} +{"13990|8953108": ["Traditionally, one simple way to accomplish thresholding is by defining a range of brightness value in the original image, then selects the pixels within the range as belonging to the foreground and rejects all of other pixels to the background."]} +{"206918956|8601873": []} +{"3139559|15744805": ["Four segmentation error measures\u2014misclassification error (ME) [28], relative foreground-area error (RAE) [29], region nonuniformity (NU) [ 30 ] and relative distance error (RDE) [10]\u2014were calculated for 100 ThinPrep images of free-lying cells."]} +{"3139559|8953108": ["Four segmentation error measures\u2014misclassification error (ME) [28], relative foreground-area error (RAE) [ 29 ], region nonuniformity (NU) [30] and relative distance error (RDE) [10]\u2014were calculated for 100 ThinPrep images of free-lying cells."]} +{"15050946|2616070": ["A more general model uses Gaussian intensity dis tributions for each region, where the first term of ECV can be replaced by l(I(x), \u03b8i) = \u2013 with \u03b8i = (\u03bci, \u03c3i) being mean and standard deviation of the assumed Gaussian density over intensities in respective regions [13].", "See [12, 13] for a more detailed algorithmic treatment."]} +{"3846972|393948": ["First, there are two basic categories of feature extraction techniques: The one is \u201chand-crafted features\u201d, and the other is \u201cfeature learning\u201d [17] .", "In this paper, we adopt a deep learning approach because of its superior expressive power over BoVW and SC [17,21] ."]} +{"16698023|192934": ["In general, as the number of feature dimensions increases, the number of training images required to construct a well generalised classifier exponentially increases as well [20]."]} +{"13914773|18369999": ["One bottleneck lies in the ongoing scarcity of extensive, openaccess datasets of annotated nematodes; these are pivotal in using segmentation methods that rely on statistical learning [6], [60], [61]."]} +{"13914773|12127129": []} +{"9552314|206051485": ["N Registration [30] is the process to map multiple or many images geometrical-\nly, via a linear or nonlinear transform, so that image objects or features can be compared directly in a \u2018\u2018standard\u2019\u2019 space.", "Registration is particularly widely used in three types of microscopic image processing tasks: stitching of image tiles [31] (e.g., electron and light microscopic tiles), registration of multiple samples of the same biological entity [19,32] (e.g., different images of the same neuron-population), fusion of\nmulti-different views [33] of one object (e.g., tomography used in electron microscopy or selective plane illumination microscopy).", "N Registration [30] is the process to map multiple or many images geometrically, via a linear or nonlinear transform, so that image objects or features can be compared directly in a \u2018\u2018standard\u2019\u2019 space."]} +{"206491372|2088679": ["Unsupervisedmachine learningmethods are also being researched, but the majority of the algorithms from 2015-2017 in the published literature have employed supervised learning methods, namely Convolutional Neural Networks (CNN) [4].", "Currently, CNNs are the most researched machine learning algorithms in medical image analysis [4].", "[4] provides a thorough list of papers published in the field, Shen et al."]} +{"206491372|3644401": []} +{"206491372|393948": ["The rationale behind this, is as Bengio states, for a given observation, only a small fraction of the possible factors are relevant, meaning that much of the features extracted from the data could be represented by being set to zero [34]."]} +{"23080469|8953108": ["(2004) categorized thresholding techniques into six which are histogram-based, clusteringbased, entropy-based, attribute similarity, spatial and locally adaptive[9]."]} +{"140138479|43650377": []} +{"140138479|2473564": []} +{"140138479|41505326": []} +{"44167039|2088679": ["Their U-Net architecture has been adopted and successfully used in a wide range of biomedical applications with both 2D [1, 2, 3, 4] and 3D images [5, 6]."]} diff --git a/edge/graph_199489469.jsonl b/edge/graph_199489469.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b1dd1420206eecf6debaa075c4c1d112d3ead5b --- /dev/null +++ b/edge/graph_199489469.jsonl @@ -0,0 +1,49 @@ +{"54456283|61132": ["VOLUME 6, 2018\nAd Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), respectively.", "In other words, routing demands of FANETs go beyond the needs of MANETs and VANETs [4].", "[21] O. Oubbati, A. Lakas, F. Zhou, M. G\u00fcne\u015f, N. Lagraa, and M. Yagoubi, \u2018\u2018Intelligent UAV-assisted routing protocol for urban VANETs,\u2019\u2019 Comput.", "RELATED WORK Flying Ad Hoc Networks (FANETs) are considered as a subclass from Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), therefore, common ideas and strategies could be shared for data delivery [12].", "However, for the right functionality of data delivery, the techniques that are specifically designed for MANETs and VANETs have to be adapted to specific characteristics and challenges in FANETs, e.g., highmobility, sparse deployment, drastically changing network topology, intermittently connected communication links, and intentional jamming and disruption.", "However, due to the high mobility, sparse deployment, drastically changing network topology, intermittently connected communication links, and intentional jamming and disruption, those mechanisms that were specifically designed for MANETs or VANETs cannot be directly applied in FANETs."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"32714413|9588126": []} +{"54436487|61132": ["Since multiple UAV systems can collaboratively complete missions more efficiently and economically as compared to single UAV system [1], the UAV ad-hoc network emerged as the time requires."]} +{"54462110|61132": ["Gupta et al. [16] evaluates the suitability of numerous types of protocols for UAV networks."]} +{"67281043|61132": ["As for the distances between nodes, in FANET, they are usually greater than in VANET or MANET [3]."]} +{"54442963|61132": ["All these applications call for a precise and fast data delivery [3]."]} +{"54442963|1762301": ["Second is to adapt an existing routing algorithm designed for MANETs to meet FANET requirements [9]."]} +{"19748071|1762301": ["AODV has a flat structure and has the potential to support dynamic networks [1].", "Cluster ID (CID) Associated Cluster ID [1] (ACID) Associated Cluster ID [2] (ACID)", "The reader can refer to [1] for a survey."]} +{"205289742|61132": ["A comprehensive analysis of the applicability of these routing protocols to UAV networks can be found in [45].", "The readers are referred to the recent surveys [61, 12, 6, 45] for detailed open issues on networking protocols (i.e., routing and MAC), required wireless technology, spectrum allocation, antennae, communication security for safe operation, and application-dependent communication for UAV networks."]} +{"205289742|1236072": ["There are \ufb02at [36, 37, 38], hierarchical [39, 40], and location-based protocols [41, 42, 43, 44], where nodes operate in a uniform manner, the network is divided into clusters, or the position of the nodes are incorporated into the routing process, respectively."]} +{"205289742|2835258": ["There are \ufb02at [36, 37, 38], hierarchical [39, 40], and location-based protocols [41, 42, 43, 44], where nodes operate in a uniform manner, the network is divided into clusters, or the position of the nodes are incorporated into the routing process, respectively."]} +{"22582566|61132": []} +{"18825253|1762301": ["2 Routing Protocols in Mobile Ad Hoc Networks [2]"]} +{"2192597|17594297": ["While the aforementioned work emphasizes the problem, which we have identified in existing secure routing proposals, it has two drawbacks in comparison to our approach: First, nothing proposed so far solves all the issues of IBC [46].", "To detect malicious nodes, IBC-HWMP proposes to monitor the behavior of the neighbors.", "In turn, to dynamically distribute and revoke symmetric keys, secure routes between the nodes are required [45], [46].", "Noteworthy in this context is the work published in [58], in which it is also proposed to integrate key management and secure routing in one framework, using IBC.", "However many issues in IBC are still unsolved [46], besides, IBC schemes are typically based on Elliptic Curves Cryptography (ECC), which is also used in ECDSA-RAOLSR [35], and the information leaked in 2013 by Edward Snowden revealed that standardized ECC-based algorithms were influenced to include backdoors [47].", "In IBC-HWMP [34] and IBC-RAOLSR [35], Identity Based Cryptography (IBC) is proposed to avoid the need for a PKI.", "However many issues in IBC are still unsolved [46],"]} +{"2192597|10310014": ["For instance, i n disaster scenarios, end-to-end security mechanisms are al ready used to ensure the privacy of the data of rescue fighters [33], while the privacy of their traffic flows (source, destination ) a d their location are not really a concern as these information are predefined in their public regulations."]} +{"52900358|61132": []} +{"52900358|18657007": []} +{"52900358|1177069": []} +{"741471|14441987": ["Approaches to cope with the transmission of data in mobile, wireless networks include traditional techniques such as try, timeout, sleep, retry, etc., and wireless routing algorithms."]} +{"1966145|61132": ["[8] reviewed some of the research efforts aiming at turning multi-UAV systems into robust context-specific networks.", "For example, UAVs are projected to provide an infrastructure for, among other things, delivering goods that will be so pervasive to a point that virtually, every smart device can be the target of UAV-supplied value-added services [8]."]} +{"29177417|61132": []} +{"29177417|11206792": []} +{"29177417|763939": []} +{"164391731|81985472": ["Moreover, [28], [29] use visual aids to solve the flocking control problem without GPS or GPS failure, which can reduce the communication load caused by explicit communication."]} +{"164391731|61132": ["To be specific, the communication and coordination among a group of UAVS may be affected or disturbed by many factors, like rain, wind, and electromagnetic environments [1].", "INTRODUCTION Compared with single-Unmanned Aerial Vehicle (UAV) system, which usually has limited energy supply, restricted computation capacity, and poor survivability, a multiple UAV system is expected to realize much wider coverage, better monitoring and understanding of interested area, smarter decision-making, and thus to better support diverse applications [1]."]} +{"10217781|61132": ["In the current literature Ad hoc wireless mesh architecture is believed to be the most suitable for drone communications [6], [8].", "Authors [6] provides a survey of important issues in Unmaned Aerial Vehicles (UAVs) communication networks, emphasizing the challenges of designing routing protocols."]} +{"25235935|61132": ["Given their low cost, flexible maneuvering capability, and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including aerial mapping, disaster rescue, agricultural irrigation, and military surveillance and attack [1]."]} +{"85499076|61132": ["The main advantages of FANETs are survivability, reliability and scalability [11]\u2013[13]."]} +{"19238030|61132": ["[33], analyzing networking issues in FANET scenarios."]} +{"52020887|61132": ["Therefore, to organize the connection between UAVs, it is necessary to provide a longer range of communication, and it will affect the nature of the radio channel and the choice of equipment [6]."]} +{"18657007|17206258": ["In contrast to deterministic schemes, in probabilistic protocols, nodes retransmit the broadcast packets with a precalculated forwarding probability [60, 61]."]} +{"18657007|1230643": ["WSNs are centralized networks where nodes are normally grouped in clusters [53].", "Other static ad hoc networks such as WSNs [53] or Wireless Mesh Networks (WMNs) [54] are also evolutions of classical MANETs applicable to disaster scenarios."]} +{"11021520|2835258": ["Some of the existing protocols that forward packets one hop at a time without attempting to construct the entire path are based on node location and movement [9] [10] [11] [12] [13]."]} +{"11021520|1762301": []} +{"18306476|2835258": ["along the next edge clockwise (counter-clockwise) from the edge it arrived from [10]."]} +{"7056671|10562205": ["These nodes are often have energy constrained that is, battery power and devices are free to join or leave the network [1-2].", "Routing can be either flat structured or hierarchical structure [1-2]."]} +{"53292508|61132": ["As stated in [22], most urban applications that use UAVs like small Quad-Copters do not fly at high altitudes [28]."]} +{"3086208|14552902": ["In opportunistic routing (OR) [16], a packet is sent in a broadcast mode to several eligible forwarders, and the best forwarder that received the packet will continue to forward it."]} +{"51895302|61132": ["dynamic network topologies owing to the freely flying drones [10].", "In some applications, completing intricate tasks is not feasible with a single UAV owing to the drones\u2019 limited flight time, payload, and communication range [10]."]} +{"53281175|61132": ["Unmanned aerial vehicles (UAVs) are promising as a new application area for military and civil use due to the rapid deployment of network technologies such as low-cost Wi-Fi radio interfaces, sensors, global positioning system (GPS), and micro-embedded computers [1]."]} +{"198327192|61132": ["the limited battery lifetime of the UAV [14]."]} +{"198327192|18657007": ["In the last decade, mobile ad hoc networks (MANETs) and cognitive ad hoc networks have been used to provide multihop emergency communication [4]."]} +{"198327192|57379363": ["(Corresponding author: Sangman Moh.)", "Arafat and Moh [27] surveyed and qualitatively compared cluster-based routing in UAV networks."]} +{"198327192|38911919": ["The clustering approach increases the network scalability, decreases RO, maximizes throughput, and increases battery lifetime [15]."]} +{"53279924|61132": []} diff --git a/edge/graph_199490286.jsonl b/edge/graph_199490286.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd0c0b97b1dd2d716f9d1bab517691ae39663e32 --- /dev/null +++ b/edge/graph_199490286.jsonl @@ -0,0 +1,38 @@ +{"16843748|870434": ["the carrier frequency f , bandwidth, spreading loss factor \u03b1 \u2208 [1, 2], temperature, salinity, water depth, noise spectral density, acceptable probability of false detection pfa, Rician or Rayleigh fading parameters and irreducible packet loss pmin."]} +{"3498240|18090044": ["[11] The whole process of target tracking High 2016 Detailed (The whole process of tracking, the metrics for analyzing algorithms, the requirement of tracking based on WSNs)", "In [11], the authors are focused on introducing the related knowledge of target tracking for sensor networks, rather than analyzing and comparing different target tracking algorithms.", "We also compare our papers with other survey papers [11,18] in Table 2, which provides a relatively complete overview of target tracking."]} +{"3498240|31355144": ["Similarly, in [60], KF is applied in a distributed architecture to estimate the position of a single target moving through UWSNs and improve energy efficiency.", "Compared with TASA, the collaborative nature of UWSNs brings several advantages such as self-organization, rapid development and inherent intelligent processing capability [60].", "KF [60] Medium Medium Medium 2-D targets"]} +{"3498240|5972227": ["[12] The management of energy for target tracking Medium 2012 Brief", "Some other review articles are only centered on one aspect of the tracking algorithms based on WSNs such as energy-efficiency [12], prediction algorithms [13], target recovery techniques [14], and security [15]."]} +{"3498240|870434": ["Moreover, the speed is variable with respect to the water temperature, sanity and depth [17]."]} +{"3498240|1230643": ["UWSNs have superiority over TASA in low-cost, self-organization, fault tolerance and rapid deployment [28].", "organization, fault tolerance and rapid deployment [28]."]} +{"8698675|31355144": ["O e of the most com ly used IoUT application types is environmental monitoring [12], including water quality monito ing [15], chemical and biological pollution mon oring [28], thermal pollution monitoring, pressure monitoring, and temperature monitoring [29].", "Readers interested in these types of applications are referred to [12] for a more detailed description.", "\u2022 In [12], the authors introduce numerous underwater monitoring applications.", "One of the most commonly used IoUT application types is environmental monitoring [12], including water quality monitoring [15], chemical and biological pollution monitoring [28], thermal pollution monitoring, pressure monitoring, and temperature monitoring [29]."]} +{"25223333|902018": ["Node topology has a great effect on the performance of any acoustic UWSNs [32, 33]."]} +{"25223333|870434": ["In terms of underwater surveillance, Underwater Wireless Sensor Networks (UWSNs) are considered as a tangible, low cost solution [1, 2]."]} +{"46963367|6583734": ["Network function virtualization (NFV) [64]\u2013[66] can be employed based on SDN.", "Toy, \u2018\u2018Software-defined network virtualization: An architectural framework for integrating SDN and NFV for service provisioning in future networks,\u2019\u2019 IEEE Netw., vol. 30, no. 5, pp. 10\u201316, Sep./Oct. 2016.", "ABBREVIATION\nUASNs Underwater acoustic sensor networks WSNs Wireless sensor networks SDN Software-defined networking SDR Software definition radio MAC Media access control AUVs Autonomous underwater vehicles OvS Open vSwitch HN Header node API Application programming interface NFV Network function virtualization MIMO Multiple-Input Multiple-Output LA Learning Automata CDS The connected dominating set d-CDS The degree constrained connected domination set ASF Action-Set Formation RM Response message APV Activity probability vector ACT Active message MC Monte Carlo BFS Breadth-first search SLP Sleep Message AS Autonomous systems STP Spanning Tree Protocol EPD Equal Probability Distribution BER Bit error rate GUI Graphical user interface TUNE Traditional UASNs with Node_Elect_cluster TULA Traditional UASNs with Learning_Automata_cluster SUNE SDN_based UASNs of Node_Elect_cluster SULA&LB SDN_based UASNs using\nLearning_Automata_cluster and Load Balancing\nVOLUME 6, 2018 25711\nREFERENCES [1] J. Heidemann,M. Stojanovic, andM.", "NFV enables the achievement of reasonable substantiality by using numerous physical entities or creating physically sustainable logical entities [67]\u2013[69]."]} +{"46963367|31355144": ["UASNs have gained significant attention for use in underwater applications [2] such as marine data acquisition, environmental monitoring, subaquatic resource surveying, earthquake and tsunami monitoring, auxiliary navigation, submarine robots, etc."]} +{"46963367|4269723": ["At the northbound interface [61]\u2013[63], an API is used to implement the interaction between the controller and application layers."]} +{"31220827|206456479": ["RAN Virtualization is currently under investigation and is one of the major obstacles to creating NFV/SDN architectures for 5G networks [128].", "Besides, SDN must provide support to Radio Access Network (RAN) virtualization infrastructures [128]."]} +{"31220827|3767252": [", intrusion detection and prevention systems) such as Distributed Denial of Service (DDoS) [82].", ") are deployed at the edges of a mobile operator\u2019s network to assist the core data center in supporting computing and communication (see Figure 10) [82]."]} +{"31220827|6583734": ["Service Function Chaining (SFC) provides an ordered list for service processing of tra c ows [9].", "Furthermore, both Li and Chen (2015) [9] and L\u00f3pez et al.", "Furthermore, both Li and Chen (2015) [9] and L\u00f3pez et al. (2015) [10] propose studies to integrate both technologies."]} +{"31220827|19938676": ["In this context, 5G networks aim at addressing the following demands [43]: improved data rate, decreased latency, and increased capacity for consistent QoS/QoE."]} +{"53745558|3474164": ["A survey highlighting the improvement in the management aspect of WSNs by applying the SDN concept, is presented in [82]."]} +{"53745558|6909107": []} +{"53745558|24110634": [", switches and routers), and therefore these devices are equipped with only simple data forwarding functionalities [81].", "Comprehensive reviews in this context are carried out in [81] and [83], which summarize current work in this area and discuss design challenges, requirements and open issues.", "Encouraged by the success of SDN on both wired networks and wireless networks [79], [164], [170], SDN is envisioned as a promising technology to solve inherent problems with both terrestrial and underwater WSNs [5], [80], [81], [166], [171]."]} +{"53745558|30575518": ["The network layer is responsible for discovering and maintaining routes between a source and a destination node [1], [16], [21], [30]."]} +{"53745558|206578365": [", fog computing and edge computing [201]\u2013[203]) into UWSNs pour new vitality for further development."]} +{"53745558|8316096": ["In [23], more recently developed routing approaches are overviewed, including machine learning-based routing protocols.", "Several papers reviewed underwater routing techniques [16], [21], [23]."]} +{"53745558|31355144": ["The application layer performs various application-specific tasks by utilizing sensed data as well as the underlying physical infrastructure [27].", "1) UWSN Applications: UWSNs can be applied to a broad range of applications, which can roughly be classified in terms of environment monitoring, exploration, disaster prevention, assisted navigation and maritime military applications [1], [27], [43].", "In [27], a survey that focuses on the applications of UWSNs is carried out, in which the applications are classified into five groups in terms of monitoring activities, disaster management, military, navigation and sports."]} +{"53745558|801245": ["Hence, it provides users flexibility to implement multiple underwater applications efficiently by sharing the same underlying physical communication infrastructure [78].", "The concept of virtualization is applied to both terrestrial and underwater sensor networks [5], [11], [77], [78], [186].", "A few papers reviewed the gradual development of virtualization concept in terrestrial wireless sensor networks (WSNs) [77], [78].", "entire physical computing resources into softwarized network functions, which can be adaptively reconfigured and allocated quickly with high flexibility to meet diverse requirements [78].", "A more detailed overview is presented in [78], in which virtualization approaches are categorized into node-level, network-level and hybrid solutions."]} +{"53745558|2623404": ["Encouraged by the success of SDN on both wired networks and wireless networks [79], [164], [170], SDN is envisioned as a promising technology to solve inherent problems with both terrestrial and underwater WSNs [5], [80], [81], [166], [171]."]} +{"53745558|902018": ["Deployment algorithms are comprehensively surveyed in [20], in which these algorithms are categorized into three groups based on node mobility, such as static deployment, self-adjusted deployment and movement-assisted deployment."]} +{"53745558|3348390": ["in any place [187], [188]."]} +{"53745558|16335158": ["sor networks with cloud computing tightly in order to fulfill more complex service-oriented application requirements [84], [85], [199], [200].", "the concept of which manages connected sensors, data storage, processing and sharing [85].", "Two research papers surveyed terrestrial sensor-cloud in [84] and [85].", "Furthermore, in [85], sensor-cloud is overviewed in detail including its definition, architecture and applications."]} +{"53745558|870434": ["solutions [1]\u2013[4], [22], [43], [67], [72], [73]."]} +{"53745558|1708582": ["For example, in [146], reinforcement learning technique is integrated to the policy engine [148]."]} +{"126391148|8316096": []} +{"126391148|16174597": ["Even if using software middleware (e.g. MOOS-IvP or ROS [28, 29]) is becoming common in the robotics community to ease the software module integration, much has to be done in payload interface and hardware standardisation.", "Intelligent Robots and Systems (IROS), October 2016, pp. 1328\u20131333 [105] Moreno-Salinas, D., Pascoal, A., Aranda, J.: \u2018Optimal sensor placement for multiple underwater target localization with acoustic range measurements\u2019.", "MOOS-IvP or ROS [28, 29]) is becoming common in the robotics community to ease the software module integration, much has to be done in payload interface and hardware standardisation."]} +{"126391148|18357056": ["We talk of area search (or exploration) when the targets are fixed, and we talk of patrolling [35, 36] in the case of mobile targets."]} +{"126391148|17133134": ["While there are some examples of deployed underwater surveillance networks composed of fixed sensors and manned vehicles [4, 21], robotic surveillance networks are still an open field of research [20] and several challenges peculiar to the underwater scenario must be addressed.", "The robotic research is now beyond this original idea, and the AOSN concept is included into an integrated system which includes aerial and aerospace units, with a reach-back capability towards the command and control (C2) centre able to monitor in real time the evolution of the system and to provide commands and updates to the network itself [20].", "Even when data-driven approaches are used, the typical assumption for a robotic network is still that continuous information exchange between the robots and between the robots and the human operator can be available [20, 93]."]} +{"126391148|1995121": []} +{"53014556|30575518": [", topology control [10]\u2013[12], the void problem [13]\u2013[15], etc."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} diff --git a/edge/graph_199509120.jsonl b/edge/graph_199509120.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46ec12b5990a74b915f00f3332244585e4020c35 --- /dev/null +++ b/edge/graph_199509120.jsonl @@ -0,0 +1,30 @@ +{"17369195|18717047": ["It is can be flexible for resource representation [20], and for ubiquitous service application with wireless communication [21]."]} +{"70217609|5650180": []} +{"70217609|2294541": ["Also, there are multiple attack models that can affect the accuracy of the reputation and trust models such as bad mouthing attacks, on-off attacks, and conflicting behavior attacks.(19,20) In a bad mouthing attack, the attacker gives dishonest feedback to decrease the trust/reputation of a good participant and the opposite for a malicious one."]} +{"20903702|10817088": ["Mobile applications that are associated with wearables learn from the users the reasons regarding their intensions of using the device and help them plan in achieving their fitness goals [20]."]} +{"55729907|8690743": ["For instance, in the case of an emergency, authorization to interpret patient\u2019s data could be given on demand to a different physician who is not necessarily listed as having permission [23].", "Consequently, it is imperative that the information not be accessible and altered by a potential adversary by applying authentication protocols [23]."]} +{"55729907|42497499": []} +{"55729907|16084499": ["The operations utilize a counter called, CTR, mode of decryption and encryption [37]."]} +{"55729907|7988320": ["It can be done through Denial of Service (DoS) attack that is meant not only to disrupt, subvert and destroy the network, but also to diminish the network\u2019s capability of providing the necessary emergency services [31,33].", "Jamming (radio frequency interference) can be used by an adversary on a few nodes to block the entire network [31].", "DoS or DDoS attacks are often cited as being at the root of security vulnerabilities in a routing protocol [31,70]."]} +{"65024423|21386749": []} +{"18413026|7278743": ["Results The Silmee prototype set (patch-type wearable sensor) was attached to a chest of a male body and ECG and pulse wave were measured by the set and send to a smart phone using Bluetooth wireless connection.", "In this implementation, an acceleration sensor is included in the module together with Bluetooth LSI and ARM processor LSI.", "Another big merit of the dual mode Bluetooth is that numbers of smart-phones supporting In the Silmee system, vital signals collected by sensors are firstly pre-processed and compressed (if necessary) and the transmitted by Bluetooth.", "Since Silmee can be applied to both real time and non-real time applications, and the required bit rate to transmit above selected sensors covers around 10kbps-100kbps, we decided to use dual-mode Bluetooth for the short range wireless communication.", "6 [3]-[4], Bluetooth [5]-[6], Near Field Communications (NFC) [7]-[8] etc.", "Android) Other Sinsors Silmee API Healthcare APP Silmee Middle-ware* (MW) (Smart Phone) En/Decryption System Control Short Distant Wireless Internet Bluetooth(Standard /Low Energy) Silmee MW API Cloud Server Silmee FWK (Cloud) Silmee MW* (Cloud) Silmee API Silmee MW API Healthcare Saas Internet Healthcare Data Base Fig.5 Silmee software structure Battery Battery Protection Silmee Engine Pulse Silmee Set Solution B l o od Pr essur e Derivatives Reference Set", "Owing to cutting-edge implementation technology, P-SoC, ECG, pulse, body surface temperature and motion sensors are integrated with high performance ARM CPU and dual mode Bluetooth chips in a small and light weight body.", ") Silmee Framework (FWK) (Sensor Node) ECG Sensor Pulse Sensor Acceleration Sensor Temperature Sensor Sensor Driver Bluetooth Driver Dual Mode Bluetooth (Standard /Low Energy)"]} +{"58462644|15662958": ["[10] presented a survey of various HE-based schemes."]} +{"58462644|14067375": []} +{"69230801|49527603": []} +{"69230801|13475127": ["covering all things in the world, and provide all kinds of information services for supply chain enterprises over the Internet [2], [3]."]} +{"6332923|1940388": ["So far, numerous of routing protocols have been proposed for sensor networks, but none of them have been designed with strong security as a goal [59,86].", "In [86,87] the authors argue that mobility supported secure localization protocols still need to be explored."]} +{"6332923|17205659": ["In forward secrecy, a medical sensor cannot read future messages transmitted after it leaves the network, while in backward secrecy a sensor joining the network cannot read any previously transmitted messages [93].", "In [56,93] the authors did not consider public key authentication."]} +{"115842325|50776107": ["Hydrogen (PH) and body temperature etc [6]."]} +{"115842325|55729907": ["authentic information must be delivered to the required destination [22].", "There is a good scope to incorporate security mechanisms such as encryption (for confidentiality), intrusion detection (for availability) and public key cryptography (for authentication) in existing hybrid MAC protocols [22], [79].", "being generated and transmitted by the sensors [22], [23], [77]."]} +{"115842325|478289": ["priorities and efficient scheduling algorithms [25]."]} +{"115842325|325004": []} +{"115842325|303976": ["Early detection of such diseases is important to speed up the diagnosis that can significantly reduce the risk of mortality and health related costs [4]."]} +{"115842325|42497499": ["3 [21].", "6 Superframe Structures [21]."]} +{"115842325|3892600": ["transmission mechanisms, implementing re-transmission algorithms and adaptive scheduling schemes [24]."]} +{"4447935|17474643": []} +{"4447935|2177212": []} +{"4447935|10500613": []} +{"15096698|7988320": []} +{"15096698|20905429": []} +{"65218371|2623404": []} +{"65218371|18388986": []} diff --git a/edge/graph_199509250.jsonl b/edge/graph_199509250.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b374e707499dffa01bc1ed268583692aeb4bb4a --- /dev/null +++ b/edge/graph_199509250.jsonl @@ -0,0 +1,13 @@ +{"16463622|17574321": ["In our experiments, we find that the Mel-Frequency Cepstral Coefficients (MFCCs) [11, 12] of keystroke sounds capture acoustic signatures of different keys within the same theoretical key group."]} +{"15178364|206764452": ["Recent reviews on human behavior understanding focused on specific aspects of the overall problem, such as monocular pedestrian detection [11], human detection for driver-assistance systems [12], and pedestrian detection benchmarks [13], [14].", "Algorithms based on appearance features are specialized detectors trained on large pedestrian databases [11], [12]."]} +{"15178364|1634674": ["[20], [128], [129], which represent the human body in terms", "Note that this definition differs from that of [20], which made no distinctions between activities and interactions.", "From these atomic elements, it is possible to compose actions, namely, temporal concatenations of gestures [20]."]} +{"15178364|5755403": ["Morris and Trivedi [15] surveyed features and model motion trajectories focusing on trajectory analysis."]} +{"15178364|5401262": ["The interest in behavior understanding has dramatically increased in recent years, motivated by societal needs that include security [1], natural interfaces [2], gaming [3], affective computing [4], and assisted living [5]."]} +{"207079297|16770050": []} +{"207079297|14970359": []} +{"207079297|7185733": []} +{"57825759|2829149": []} +{"8360759|27637541": []} +{"8360759|1113420": ["Key-value models [Baldauf et al. 2007] are one of the approaches that serve to describe service capabilities in service discovery matching.", "\u2026Behavior Recognition 43:19 Other examinations evaluate different ontologies focusing on licensing (open or free to use), maturity (showing evidence of use), structure (modularity, design), granularity of management tools, expressiveness, and so forth [Feliu and Cabr\u00b4e 2002; Baldauf et al. 2007].", "Finally, ontology-based models describe concepts and relationships in a high and formal expressiveness level [Baldauf et al. 2007].", "Interoperability solutions based on the ontology expressive models ful\ufb01lling requirements for modeling context information [Baldauf et al. 2007].", "Different physical sensors are available for diverse types of contexts, for example, light, visual context, audio, motion, acceleration, location, touch, temperature, or physical attributes such as biosensors [Baldauf et al. 2007] or nonvisual tracking systems in general [Zhou and Hu 2008]."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"28507727|14814753": []} diff --git a/edge/graph_199509407.jsonl b/edge/graph_199509407.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..634db0726c26293340fd364e969725183c59fab0 --- /dev/null +++ b/edge/graph_199509407.jsonl @@ -0,0 +1,12 @@ +{"929594|11795007": []} +{"929594|60779308": []} +{"929594|14808716": []} +{"21799373|206051485": ["Furthermore, registration accuracy may also depend on factors such as resampling schemes, iteration number, multiresolution parameters and the free parameters of the algorithms (Derek et al 2001, Zitov\u00e1 and Flusser 2003, Modersitzki 2004, Zhong et al 2010)."]} +{"21604950|2080630": ["The field of Surgical Process Modeling (SPM) is concerned with the definition of appropriate workflow models [110, 166]."]} +{"21604950|2875192": [") [106, 157], but some publications also deal with endoscopic images."]} +{"21604950|11960624": [", on the ordinary monitor, through a head mounted display (HMD), which can either be an optical or a video see-through HMD, or as projection directly on the patient body [209]."]} +{"206267137|2088679": []} +{"22089551|8574504": []} +{"22089551|2088679": []} +{"8164341|6863252": ["We also opted not to include descriptor-based medical image registration techniques, since there are already several surveys covering this topic (e.g., Sotiras et al. 2013; Zitov\u00e1 and Flusser 2003 or Oliveira and Tavares 2014)."]} +{"8164341|206051485": ["We also opted not to include descriptor-based medical image registration techniques, since there are already several surveys covering this topic (e.g., Sotiras et al. 2013; Zitov\u00e1 and Flusser 2003 or Oliveira and Tavares 2014)."]} diff --git a/edge/graph_1995121.jsonl b/edge/graph_1995121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba256ee9115f8b71174ead4c2e0aa6a074b187b6 --- /dev/null +++ b/edge/graph_1995121.jsonl @@ -0,0 +1 @@ +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} diff --git a/edge/graph_199516715.jsonl b/edge/graph_199516715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3e4848cd8a147ba52e9fbef760ae18eecfb6e1e --- /dev/null +++ b/edge/graph_199516715.jsonl @@ -0,0 +1,3 @@ +{"3178691|18956392": ["[10]."]} +{"3178691|6959212": ["In general, sensor nodes have limited battery energy supply [11].", "monitoring and diagnostic systems [1], [4], [9], [11], [19], [30].", "reliable communication capabilities of the deployed WSNs [11], [13].", "system reliability and efficiency by optimizing the management of electric power systems [11], [13].", "online energy consumption of the customers [20] and for asset protection through advanced remote monitoring [11], [23].", ", accidents in the electric power systems, it is important to receive the data at the controller node in a timely manner [11].", "become essential to maintain safety, reliability, efficiency, and uptime of the smart grid [11], [13], [19], [30].", "in a remote and online manner [11], [12], [18], [24], [27].", "These harsh environmental conditions and dynamic network topologies may cause a portion of sensor nodes to malfunction or render the information they gather obsolete [11]."]} +{"3178691|1230643": ["monitoring and diagnostic systems [1], [4], [9], [11], [19], [30]."]} diff --git a/edge/graph_199525405.jsonl b/edge/graph_199525405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199526412.jsonl b/edge/graph_199526412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91122383a8c7762b72d167c7dd2f215c18c7a1ff --- /dev/null +++ b/edge/graph_199526412.jsonl @@ -0,0 +1,9 @@ +{"53305869|3786171": []} +{"53305869|3932531": ["The Merkle tree [30,31] is built from the bottom up."]} +{"57378792|36250251": ["However, mobile crowdsourcing systems still face many challenges with regards to security, privacy and trust [23], [38].", "[23] identifies mobile crowdsourcing applications based on the properties of a crowdsourcing task and human assistance including 1) mobile crowd computing, 2) mobile crowdsensing, and 3) human-assisted crowdsourcing.", "A recent survey [23], [137], [138] thoroughly discussed the core issues of SC, including task assignment, incentive mechanism, privacy protection, the absence of real-world datasets, scalability and quality of reported data.", "Moreover, several challenging security and privacy concerns are raised in mobile crowdsourcing networks [2], [23], [37], [89]."]} +{"57378792|3450996": ["There are some research studies to explore techniques to enhance throughput for mobile devices suffering from low cellular data rates [81]\u2013[83]."]} +{"57378792|8308538": ["The study in [24] classified mobile crowdsensing applications into three categories namely group, community, and urban sensing.", "The participants come from a strongly bonded group or community, with established social ties and trust among members [24]."]} +{"57378792|8523192": ["It also works on crowdsourced IoT data for milliseconds response-time applications and delivers the selected data to the cloud for historical analysis and longerterm storage for future use [42], [43]."]} +{"57378792|16830291": ["[70] study crowdsourcing platforms with a focus on solving micro-tasks and complex tasks."]} +{"57378792|57048228": ["crowded in the protest, potholes on the road) [3], [85], [125]."]} +{"57378792|28756420": ["puting involves awareness of the device and its environment [3], [38], [89], [124].", "The quality of the results highly depends on the task design [39], [89], so that the key aspects of tasks such as, types of tasks, the process of executing tasks, the correspondence of instructions and constraints must be determined before assigning tasks to the crowd.", "Moreover, several challenging security and privacy concerns are raised in mobile crowdsourcing networks [2], [23], [37], [89]."]} diff --git a/edge/graph_199530816.jsonl b/edge/graph_199530816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..572ca0719dce965048361bd6ce8657dd3f606366 --- /dev/null +++ b/edge/graph_199530816.jsonl @@ -0,0 +1,5 @@ +{"12191978|11385769": ["6) Evaluation of the Ontology Hazman & Rafea defines two types of ontology evaluation [3].", "There are studies in the literature [2][3][4][5][6][7][8] which discuss the methods and techniques for ontology learning.", "It is believed that the automation of ontology development will reduce costs, improve reliability and scope of ontologies, and widen applications [3].", "automatic or semi-automatic/automatic ontology building methods and tools both by learning it from different information sources [3]."]} +{"63093934|59270886": []} +{"17720879|10500613": ["Ontology mapping [19, 22, 29, 32, 34] is a formal expression or process that defines the semantic relationships between entities from different ontologies."]} +{"17720879|913718": ["Ontology mapping [19, 22, 29, 32, 34] is a formal expression or process that defines the semantic relationships between entities from different ontologies."]} +{"3719695|10500613": []} diff --git a/edge/graph_199537842.jsonl b/edge/graph_199537842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..927e9bebaf86f65bd9b227998838957cf49210f4 --- /dev/null +++ b/edge/graph_199537842.jsonl @@ -0,0 +1,2 @@ +{"3767412|43982203": []} +{"3767412|15033413": []} diff --git a/edge/graph_199541600.jsonl b/edge/graph_199541600.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0865e3bbf06bd75b78067875ca476fe1d7fa4170 --- /dev/null +++ b/edge/graph_199541600.jsonl @@ -0,0 +1,6 @@ +{"59413995|1932843": ["These type of problems are suitable to be solved by means of a reinforcement learning framework [25]."]} +{"85498223|81985472": []} +{"85498223|7981750": []} +{"52195700|61132": ["UNMANNED Aerial Vehicles (UAVs) are increasingly used in several scenarios, including goods delivery, environmental monitoring, public protection, and disaster relief [1]."]} +{"52195700|206901977": ["11 in terms of power efficiency [4] and over 3G/4G mobile networks, which may provide sporadic coverage in rural areas [5]."]} +{"7569875|6607209": ["As pointed out by Dias, Zlot, Kalra, and Stentz (2006), \u201cby de-coupling the decomposition and allocation problems, these approaches do not consider the complete solution space and may \ufb01nd highly inef\ufb01cient solutions.\u201d"]} diff --git a/edge/graph_199543559.jsonl b/edge/graph_199543559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8c2a6fd0ece3df280000e7d151ae3ba5c325190 --- /dev/null +++ b/edge/graph_199543559.jsonl @@ -0,0 +1,51 @@ +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} +{"38489459|5014732": ["ts, researchers resort to deep reinforcement learning (DRL) [5, 17, 6] due to the complexity of the environment and action space. For the analysis of complexity of StarCraft combat games, we refer to [29, 30]. One of the key components in using DRL is to learn a communication protocol among agents. Representative solutions include the differentiable inter-agent learning (DIAL) [19] and the CommNet [20], b"]} +{"580203|13171013": [", [13, 15], rather than on designing new learning algorithms.", ", direct reciprocity [4, 5, 6, 7], indirect reciprocity [8], norm enforcement [9, 10], simple reinforcement learning variants [3], multiagent reinforcement learning [11, 12, 13, 14, 15], spatial structure [16], emotions [17], and social network effects [18, 19]."]} +{"35869294|30189749": ["Low-level vehicle dynamics, however, are of crucial importance, as exhibited by [24] and because many traf\ufb01c phenomena, which affect energy consumption, safety, and travel time are exhibited at the level of low-level dynamics [5], [25], [26], [27]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"17136625|1708582": ["Other possibilities of de\ufb01ning the return exist [58].", "A reinforcement learning (RL) agent learns by interacting with its dynamic environment [58, 106, 120]."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} +{"5155799|1708582": ["We note an important difference between the well known heuristic exploration technique of optimism in the face of uncertainty [21, 22] and the overestimation bias."]} +{"4533648|9588126": ["Reinforcement learning (RL) holds considerable promise to help address a variety of cooperative multi-agent problems, such as coordination of robot swarms (Hu\u0308ttenrauch et al., 2017) and autonomous cars (Cao et al., 2012)."]} +{"56895453|5014732": ["\u2026make the task harder by (i) removing macro-actions making exploration harder (ii) limiting vision making environment partially observable(iii) unlike previous works (Wender & Watson, 2012; Ontan\u00f3n et al., 2013; Usunier et al., As is evident from (f) , they stop communicating once they reach prey."]} +{"159041004|202540003": []} +{"1552061|9316331": ["By expanding the more valuable branches of the tree and carrying out a random simulation at the leaf nodes, UCT is known to perform well in many different settings (Browne et al., 2012)."]} +{"102348669|7020971": []} +{"60440549|5014732": ["\u2026in several communities: work ranging from evolutionary algorithms to tabular RL applied has shown that the game is an excellent testbed for both modelling and planning (Ontan\u00f3n et al., 2013), however, most have focused on single-agent settings with multiple controllers and classical algorithms.", "Learning to play StarCraft games also has been investigated in several communities: work ranging from evolutionary algorithms to tabular RL applied has shown that the game is an excellent testbed for both modelling and planning (Ontan\u00f3n et al., 2013), however, most have focused on single-agent settings with multiple controllers, and classical algorithms."]} +{"1583209|816774": ["However, centralized or hierarchical resource allocation methods may suffer from the lack of scalability and fault-tolerance ability as well as having a single point of failure [15]."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"52948378|4884302": []} +{"52948378|10087812": ["Figure 5\u200b: Three Types of TL Improvements (Lazaric, 2013)", "Lastly, based on common practice in TL (Lazaric, 2013), the knowledge transfer improvement is measured by the difference between the Areas under the Reward Curve, which is denoted as R with the following definition:", "The goal of Transfer Learning (TL) is to shorten the learning time to achieve high performance (Lazaric, 2013).", "5 Transfer Learning Mechanism and Measurement The goal of Transfer Learning (TL) is to shorten the learning time to achieve high performance (Lazaric, 2013)."]} +{"29163984|9588126": ["Similarly, communication can be crucially important in multi-agent reinforcement learning (MARL) for cooperation, especially for the scenarios where a large number of agents work in a collaborative way, such as autonomous vehicles planning [1], smart grid control [20], and multi-robot control [14]."]} +{"52185833|9316331": ["For the community, this would provide the ability to test algorithms in domains with as much depth and diversity as today\u2019s video games."]} +{"91185635|5014732": []} +{"3454285|3212631": ["Our work thus ties in to a rich history of opponent modelling (Brown, 1951; Albrecht & Stone, 2017); within this context, we show how meta-learning could be used to furnish an agent with the ability to build \ufb02exible and sample-ef\ufb01cient models of others on the \ufb02y."]} +{"53046282|9588126": [" subsystems interacting with each other. The control problem of a multi-agent system has drawn much attention in the past years, due to the practical and potential applications in autonomous vehicles [1, 2], robotics [3, 4], logistics [5], powergrid[6], andresourcemanagement[7]. Since the agents in multi-agentsystem lack full knowledgeon dynamic environment and other agents\u2019 strategies, learning decisio"]} +{"3334421|4884302": ["The RL framework is reward-driven, meaning that a sequence of actions from the policy is evaluated solely by the reward signal from environment [1]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} +{"53103927|9588126": ["oof-of-concept matrix game and a multi-agent version of StarCraft II Micromanagement. Introduction Cooperative multi-agent systems are ubiquitous, for example, in the coordination of autonomous cars (Cao et al., 2013). However, how to learn control policies for such systems remains a major open question. One approach is to learn centralised policies that select joint actions conditioned on the global state or join", "Cooperative multi-agent systems are ubiquitous, for example, in the coordination of autonomous cars (Cao et al., 2013)."]} +{"3579986|1932843": ["With the advancement of deep learning (Goodfellow et al., 2016), reinforcement learning has been shown to achieve striking performances in MDP problems such as board games (Silver et al., 2016, 2017), autonomous driving (Shalev-Shwartz et al., 2016), and robotics (Kober and Peters, 2012)."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"5136932|1932843": ["First, as noted in [19], usually in robotics, we may only be able to \ufb01nd some approximate notion of a Markovian behaving state.", "Traditionally, machine learning approaches for planning strategies are studied under the framework of Reinforcement Learning (RL) \u2014 see [6, 17, 31, 35] for a general overview and [19] for a comprehensive review of reinforcement learning in robotics."]} +{"5136932|1708582": []} +{"5136932|28670512": []} +{"2294751|14478191": ["Learning with respect to multiple reward functions is also a topic of multi-objective learning (Roijers et al., 2013)."]} +{"19141434|9588126": []} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"9072400|13171013": ["For a more elaborate introduction to replicator dynamics, and their relationship with RL, we refer to [7].", "[7] Daan Bloembergen, Karl Tuyls, Daniel Hennes, and Michael Kaisers."]} +{"3465067|2340253": ["Over the last decade, many approaches are concerned with the extension of RL to MAS [4], e."]} diff --git a/edge/graph_199543817.jsonl b/edge/graph_199543817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8473092a9da2cf89d6d052160aa7ec151cd86828 --- /dev/null +++ b/edge/graph_199543817.jsonl @@ -0,0 +1,2 @@ +{"23865056|1708582": ["A more comprehensive introduction can be found in [33]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_199543981.jsonl b/edge/graph_199543981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0a66a78116e880950535a8b3a30f3fbe8dddd3d --- /dev/null +++ b/edge/graph_199543981.jsonl @@ -0,0 +1,3 @@ +{"5167202|16049649": ["The Lasso method performs relative poorly, due to its bias issue (Fan and Lv, 2010).", "Generally speaking, the optimal properties of those penalized likelihood methods require certain specifications of the optimal tuning parameters (Fan and Lv, 2010).", "To meet the challenges in analyzing high-dimensional data, penalized likelihood methods have been extensively studied; see Hastie et al. (2009) and Fan and Lv (2010) for overviews among a large amount of recent literature.", "Though demonstrated effective in analyzing high-dimensional data, the performance of penalized likelihood methods depends on the choice of the tuning parameters, which controls the trade-off between the bias and variance in resulting estimators (Hastie et al., 2009; Fan and Lv, 2010)."]} +{"20541431|16049649": []} +{"37925315|12681089": []} diff --git a/edge/graph_199551418.jsonl b/edge/graph_199551418.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57420b02c852374a034d702a9816c07d88187438 --- /dev/null +++ b/edge/graph_199551418.jsonl @@ -0,0 +1,3 @@ +{"67795559|4968608": ["The most widely applied fuzzy extensions of MCDM methods are fuzzy AHP (analytic hierarchy process), with the origins dated to 1983 [23] and various numerous extensions of fuzzy TOPSIS (technique for order preference by similarity to ideal solution) [2, 24]."]} +{"67795559|14060561": []} +{"207551944|14038195": ["Several studies (Behzadian, Kazemzadeh, Albadvi, & Aghdasi, 2010; Ho, 2008; Vaidya & Kumar, 2006) have demonstrated the vitality of the field and reported several methods proposed in the literature."]} diff --git a/edge/graph_199551841.jsonl b/edge/graph_199551841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04518a70cf8a24d20ad12809be40bea31f2623a6 --- /dev/null +++ b/edge/graph_199551841.jsonl @@ -0,0 +1,37 @@ +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"13688847|49527603": ["In [20], a brief summary of the emerging blockchain-based applications ranging from finance to IoTs is provided."]} +{"13688847|9461213": ["With more and more demands for big-data processing in various fields [226], [227], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secured Multi-Party Computation (MPC)."]} +{"13688847|27262729": [", Sybil attacks [47] and double-spending attacks [21]), node mistakes (e.", "Further, a systematic survey is provided in [21] with respect to the security issues in Bitcoin networks including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", ", fork, in the local views of the blockchain state [3], [21] (see Figure 4)."]} +{"13688847|2457428": ["Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]."]} +{"13688847|3434731": ["In [6], [15], two brief surveys on consensus protocols in blockchain networks are provided.", "backbone of the emerging open-access, distributed Virtual Machines (VMs) [5] for decentralized, token-driven resource management in communication networks and distributed autonomous systems [6], [7]."]} +{"65184537|207244886": []} +{"150006074|207244886": ["Most metrics proposed in the literature are static in nature because they are often de\ufb01ned without considering dynamics over time [4], [5], [32].", "A metric M is a mathematical function that maps the target system (or a particular property or attribute of the target system) at time t to a value in a range (e.g., false-positive rate) [4].", "In the cybersecurity domain, agility often refers to reasoned changes to a system or environment in response to functional or security needs, but has not been paid due attention until very recently [15], [1], [2], [3], [4], [5].", "There have been other proposals for dynamic security metrics [4], including (i) metrics for measuring the strength of preventive defense (e.g., reaction time between the observation of an adversarial entity at time t and the blacklisting of the adversarial entity at time t (cid:48) [43]); (ii)\u2026", "Cyber agility and its quanti\ufb01cation have recently been recognized as critical cybersecurity issues that are little understood [1], [2], [3], [4], [5]."]} +{"81980629|3628110": ["[61] surveyed the security risks of popular blockchain systems, reviewed the attack cases suffered by blockchain, and analyzed the vulnerabilities exploited in these cases."]} +{"81980629|27262729": ["itcoin systematically, including risks and attacks in Bitcoin like digital currency systems. They also described and evaluated mitigation strategies to eliminate some of the risks. Mauro Conti et al. [32] reviewed security and privacy of Bitcoin, including existing loopholes, which lead to various security risks during the implementation of the Bitcoin system. Li et al. [61]surveyed the security risks"]} +{"567397|3148588": ["We also re-proved handshake log integrity and properties such as partial inverses between parsing and marshalling messages directly in F \u22c6 , without relying on Coq.", "For example, with Hoare Type Theory, Nanevski et al. (2008) extend Coq with support for interactive proofs of imperative programs.", "Unlike Coq, F \u22c6 does not generate induction principles for datatypes.", "This language would provide the nearly arbitrary expressive power of a logic like Coq\u2019s, but with a richer, effectful dynamic semantics.", "While this illustrates the power of F \u22c6 \u2019s termination check, we found that the detour via accessibility predicates is very rarely needed (as opposed to Coq, for instance).", "Thus, while Coq (The Coq development team) and Agda (Norell 2007) are functional programming languages, one does not typically use them for general-purpose programming\u2014that they are implemented in OCaml and Haskell is a case in point.", "This approach is attractive in that one retains all the tools for speci\ufb01cation and interactive proving from Coq.", "While the new proof is considerably shorter (4466 lines of F \u22c6 , compared to 8577 lines of Coq), it takes over half an hour to verify.", "The style of mechanization is rather different than what is typical in tools like Coq.", "Outside dependent type theory, veri\ufb01cation-oriented languages like Dafny (Leino 2010) and WhyML (Filli\u02c6atre and Paske-vich 2013) provide good support for effects and semi-automated proving via SMT solvers, but have logics that are much less powerful than Coq or Agda, and only limited support (if at all) for higher-order programming.", "Proving that parallel substitutions terminate is tricky\u2014e.g., Adams (2006); Benton et al. (2012); Sch\u00a8afer et al. (2015) all give examples of ad hoc workarounds to Coq\u2019s termination checker.", "This is enabled by our heavy reliance on SMT solving and termination arguments based on lexical orderings\u2014lacking these features, such a style of proof seems unthinkable in Coq and maybe even Agda.", "Non-syntactic termination checks Most dependent type theories rely crucially on normalization for consistency, many researchers have been investigating improving on Coq\u2019s syntactic termination check via more semantic approaches.", "Our starting point is miTLS (Bhargavan et al. 2013), a reference implementation of TLS (from SSL 3.0 to TLS 1.2) with detailed proofs of functional correctness, authentication, and con\ufb01dentiality. miTLS is veri\ufb01ed using a patchwork of SMT-based proofs in F7 (Bhargavan et al. 2010), Coq proofs where F7 is inadequate, code reviews, and manual arguments.", "Adding effects to a type-theory based proof assistant Nanevski et al. (2008) develop Hoare type theory (HTT) as a way of extending Coq with effects.", "In addition, we have ported the proof of injectivity of handshake message formatting from Coq to F \u22c6 .", "We aim for a language that spans the capabilities of interactive proof assistants like Coq and Agda, general-purpose programming languages like OCaml and Haskell, and SMT-backed semi-automated program veri\ufb01cation tools like Dafny and WhyML.", "On the downside, one also inherits Coq\u2019s limitations, e.g., the syntactic termination check and lack of SMT-based automation.", "One cohort of researchers mainly use interactive tools like Coq and Is-abelle/HOL; another uses SMT-based tools like Dafny and F7.", "The strategy there is to provide an axiomatic extension of Coq with a single catch-all monad in which to encapsulate imperative code\u2014the discussion about a single monad in \u00a7 2.1 applies to HTT as well.", "Our style of termination proofs is in contrast with the type theories underlying systems like Coq, which rely instead on a syntactic \u201cguarded by destructors\u201d criterion.", "Using a technique similar to the one in Coq (Letouzey 2008), F \u22c6 implements code extraction to OCaml and F#.", "While it is premature to claim that F \u22c6 is simultaneously a replacement for, say, Coq, OCaml and Dafny, our initial experience is encouraging\u2014we know of no other language that supports semi-automated proving and general-purpose programming to the same extent as F \u22c6 ."]} +{"12434235|260343": [", [5], [9], [27], [33], [34]); (ii) Interacting Particle Systems [22], which study the collective behaviors and phenomena that can be exhibited by interacting components; (iii) Microfoundation in Economics [13], which aims to connect macroeconomic theories to the underlying microeconomic behaviors of agents.", "This assumption is widely made in the literature (see [27], [42] and the references therein).", ", [27], [42] and the extensive references therein), and calls for future investigations on how to obtain these parameters in realworld environments.", "Research in epidemics has a rich history and literature, for which we refer to a recent survey [27]."]} +{"56895323|49527603": ["In [19], a brief summary of the emerging blockchain-based applications ranging from"]} +{"56895323|9461213": ["fields [221], [222], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secure Multi-Party Computation (MPC)."]} +{"56895323|27262729": ["A systematic survey is conducted in [20] with respect to the security in the Bitcoin network including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", "vacy [20] and quantitative analysis of smart contract performance [217].", ", Sybil attacks [41] and doublespending attacks [20]), node mistakes (e."]} +{"56895323|2457428": ["the security is a main concern. Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]. In [182], the authors present a framework for providing secure key management in VCSs, where the security managers are considered as blockchain miners which capture the vehicle departure information"]} +{"56895323|3434731": ["trusted virtual computers [6] for decentralized, transactiondriven resource management in communication networks and distributed autonomous systems [5], [7].", "In [7] and [16], two brief surveys on consensus protocols in blockchain networks are provided."]} +{"54457529|3628110": ["Li et al. [20] summarized some cases of attacks against blockchain 1.0 and 2.0."]} +{"53070371|260343": ["Although this assumption has been widely adopted (see, for example, [30], [38], [54] and the references therein), in the long-term this assumption needs to be weakened or eliminated.", "Theorem 2 ( [7], [17], [20], [30], [38]).", "This approach has been investigated in, for example, [4], [7], [17], [20], [30], [32], [34], [36].", "Corollary 2 (Corollary of Theorem 3 corresponding to the special \u2211 -model (2); equivalent to Theorem 2 in reference [30]).", "Second, the present work focuses on a characterization study, assuming cyber attack-defense structure G and model parameters \u03b1v , \u03b2v , and \u03b3vu are given (following [30], [38], [54] and the references therein).", "The state-of-the-art regarding these models is summarized in [18], [19], [30] and will be further reviewed in Section III."]} +{"46886677|30255496": ["While previous surveys either reviewed BGP security solutions and ignored anomaly detection mechanisms [26, 18] or covered a limited quantity of detection and mitigation tech-", "[26] reviewed the standardization efforts made by the IETF Secure Inter-Domain Routing Working Group (SIDR WG) to secure BGP, but focused on two major security extensions only.", "This group of works was typically overlooked by previous surveys [22, 24, 25, 26]."]} +{"46886677|1252121": ["Early surveys [18, 19, 20, 21] provided a review of BGP security solutions focusing only on some of the issues."]} +{"46886677|5991584": ["This group of works was typically overlooked by previous surveys [22, 24, 25, 26].", "ago [22, 24, 25], we look through modern state-of-the-art methods aiming to not only identify and mitigate routing anomalies, but also locate the root cause.", "Previous surveys [22, 24, 25] extensively reviewed early research works suggesting improvements for BGP and other distance-vector routing protocols.", "also covered by [22, 24, 25], we use them as a baseline to show the reader how each group of BGP security solutions has evolved in recent decades.", "17Interested readers are referred to [22, 24, 25, 28] for more details.", "Most of the works are based on a misinterpretation of the semantics of the MRAI timer [25], incorrectly assuming that this timer effects all update messages to a given router."]} +{"51745801|13756844": ["[28] define the EVM semantics in the K framework [29] \u2013 a language independent verification framework based on reachability logics."]} +{"102350779|53046901": []} +{"102350779|49574823": []} +{"102350779|3628110": []} +{"102350779|27262729": ["[57] surveyed security and privacy of Bitcoin.", "other hand, the weak trust model exposes public Blockchains to a wide variety of attacks, allowing adversaries to easily compromise the system [57].", "(4) Building on top of the prior work [45], [57], [61], for each attack class, we also explore the possible defense strategies that have been proposed to harden the security of Blockchains."]} +{"4895861|207244886": ["As discussed in the Introduction, quantifying security is one of the most fundamental open problems [15, 18, 20].", "The existence of the void is true despite that quantifying security is one of the well-recognized open problems [15, 18, 20].", "This can be justified by the fact that based on recent surveys [16, 18, 20], there are neither metrics nor models for explicitly measuring the security effectiveness of firewalls and DMZs by treating a network as a whole.", "We consider two types of vulnerabilities [18]: software vulnerabilities and human vulnerabilities."]} +{"53065757|207244886": ["Pendleton et al. (2017) proposed a system-level security metric framework based on the interactions between attackers and defenders in order to represent dynamic system security metrics.", "This article differs from the preceding survey papers (Avizienis et al. 2004; Pendleton et al. 2017; Ramos et al. 2017) in that the proposed STRAM framework aims to define a system-level metric that can capture the quality of system performance and security in terms of both static and dynamic\u2026"]} +{"53065757|14745481": ["The definitions of trust have been discussed by various domains of disciplines in which each discipline defines trust differently (Cho et al. 2011, 2016b).", "As addressed in Section 3.3, trust has been defined differently by various domains, each with a different emphasis on concepts (Cho et al. 2011, 2016b)."]} +{"46936025|13756844": []} +{"4945321|13756844": ["We now provide some required background for our work, including a high-level overview of smart contracts, the EVM smart contract language, and the K Framework.", "To address these issues in a principled manner, we make use of the K Framework [19], [20].", "The K Framework is a rewriting based framework for defining executable semantic specifications of programming languages, type systems and formal analysis tools.", "In this paper, we presented a formalization of the EVM using the K Framework.", "Here we present KEVM, an executable formal specification of the EVM\u2019s bytecode stack-based language built with the K Framework, designed to serve as a solid foundation for further formal analyses."]} +{"102352657|201303574": ["It is worth noting that transaction throughput and scalability in network size are often recognized as two integral parts in scalability evaluation of a blockchain system [3], [18], [140]."]} +{"102352657|56895323": ["[21] provides a comprehensive survey of blockchain consensus protocols and an in-depth review of incentive mechanism designs.", "Transaction: A blockchain transaction can be regarded as a public static data record showing the token value redistribution between sender and receiver [21]."]} +{"102352657|13688847": ["Transaction A blockchain transaction can be regarded as a public static data record showing the token value redistribution between senders and receivers [21].", "[21] provides a comprehensive survey of"]} +{"102352657|31333609": ["Since posterior corruption is only possible because the private/public keys are fixed for blockchain participants, key-evolving cryptography (KEC) [114] can be applied so that the past signatures cannot be forged by the future private keys.", "Ouroboros Praos [101] currently adopts KEC for this purpose."]} +{"140540|13756844": ["One potential alternative is the K-Framework [22].", "When the code is not empty,\n2 The Coq users\u2019 mailing list has 1,404 subscribers while the K-Framework\u2019s has 127 at the time of writing.\nthe code controls the account; such an account is called a contract.", "The K-Framework is a tool specifically engineered for defining programming languages."]} diff --git a/edge/graph_199572070.jsonl b/edge/graph_199572070.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..983f7e7173d8e56f7d88c9dc14ef7670fadb5002 --- /dev/null +++ b/edge/graph_199572070.jsonl @@ -0,0 +1 @@ +{"2924705|9913343": []} diff --git a/edge/graph_199577839.jsonl b/edge/graph_199577839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32fb1b81d633371c8092bffda5134bcda7362253 --- /dev/null +++ b/edge/graph_199577839.jsonl @@ -0,0 +1,5 @@ +{"29194288|3766791": ["For a discussion of the distinctions between the two approaches and an overview of automatic differentiation in the context of machine learning, we refer the reader to Baydin et al. (2015)."]} +{"40554178|1123458": ["For a historical perspective on the S-procedure, we refer the reader to [46, 78]."]} +{"5665350|1123458": ["in (4) is quadratic. If a quadratic polynomial is nonnegative on a region dened by another quadratic, this fact is always certied by a constant degree multiplier|this is the celebrated S-lemma; see [37]. Similarly, if we solve the problem for the transmitter located at (1;1:5), the optimal value of (5) which matches the optimal value of (3) is 11.446. So our task is indeed not achievable with one tr"]} +{"52922049|1708582": ["There are numerous algorithms that allow an agent to select an optimal behavior policy through systematic trial and error and a survey of these techniques can be found in the following papers [7,71].", "Throughout the learning process, the agent is trained to select actions that maximize the long-term sum of reinforcement signals [71].", "In fact, reinforcement learning has demonstrated great utility in contexts such as game playing, robotics applications, industrial automation, autonomous vehicles, complex financial models, and structured prediction [7, 15, 71].", "Thus, the same choice of action by an agent may result in different reward values at different time instants [71].", "However, this assumption is often coupled with the presumption that the probabilities of making state transitions or observing certain reinforcement signals do not change over time [71].", "Reinforcement Learning (RL) is a widely adopted frameworks in Artificial Intelligence for producing intelligent behavior in autonomous agents [71]."]} +{"4953323|15891636": [",[18, 37]), a proper subset of symmetric cone optimization problems.", "For a large fraction of instances, Sfull equals Sdata, implying generating a *-subalgebra from the problem data [37] does not provide reductions for these instances.", "Such approaches were pioneered by Schrijver [123]; see also the survey [37].", "As discussed in [37], an SDP can be restricted to the *-algebra generated by its data matrices.", "This shows generating an algebra from the SDP data matrices yields a projection that satisfies the Constraint Set Invariance Conditions; see [37] for more information on this approach.", "Exploiting zeros and symmetry in nonnegative polynomial interpolation are special cases of two general methods: facial reduction [46, 20, 102] and symmetry reduction [59, 134, 37]."]} diff --git a/edge/graph_199581634.jsonl b/edge/graph_199581634.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5606b6b44ba399958520c907a06223c17a7cde2e --- /dev/null +++ b/edge/graph_199581634.jsonl @@ -0,0 +1,23 @@ +{"1605434|9928823": []} +{"18112361|7185733": ["In [52] and [49], each gesture was considered to consist of three phases: pre-stroke, nucleus, and post-stroke."]} +{"10985974|1634674": []} +{"31449684|1634674": ["Most of the previously proposed schemes in activity recognition collect data from either triaxial accelerometers, video sequences [4], or environmental variables."]} +{"36242248|1634674": ["2 Vision-based approaches to activity recognition are also common (Mitra and Acharya 2007; Turaga et al. 2008)."]} +{"36242248|4474193": ["It belongs to the broader class of optimization methods in uncertain environments (Jin and Branke 2005) or in dynamic environments (Gonza\u00b4lez et al. 2010)."]} +{"52293815|27637541": ["While we can utilize camera tracking [11], which is affected by occlusion or generally challenging lighting conditions, we can embed any other type of sensor at any suitable position (e."]} +{"115582485|4719202": []} +{"53011858|207330385": ["Inspired by [21], we categorize deep learning approaches for HAR into three classes: generative deep architecture, discriminative deep architecture, and hybrid deep architecture."]} +{"53011858|5401262": ["With the diversity and popularity of wearables and on-body sensing devices, unobtrusive and automatic human activity recognition (HAR) has drawn extensive attention, and plays an important role in various areas, such as humancomputer interaction (HCI) [1], human behavior analysis [2], mobile and ubiquitous computing [3], [4]."]} +{"37893013|4719202": ["Today this process has a major impact on the customer service and consequently on the competitiveness (de Koster et al., 2006)."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"3950510|9959529": []} +{"8728793|14970359": ["Earlier activity recognition systems mostly used vision as the sensing modality [1,2] and that track of research is still going on today [3]."]} +{"15396764|14405917": ["Recent technological achievements include social robots that deal with autistic children [119], computers that make sense of human personality in various contexts [137], artificial agents that sustain emotionally rich conversations with their users [123], intelligent frameworks for multimodal affective interaction [63, 105], approaches that detect phenomena as subtle as mimicry [43], and the list could continue."]} +{"15396764|393948": ["The most promising research direction for these challenges seems to be deep learning, where the integration among levels of diverse granularity of knowledge is the core skill [14]."]} +{"15396764|2355696": ["While of\ufb02ine learning is prevalent in current systems exploiting SSP techniques, future work should explore the potential of online learning in order to enable continuous social adaptation processes.", "the subject of major efforts in computing science [128, 130].", "Nowadays, domains like affective computing [100], social signal processing (SSP) [138], social robotics [23], intelligent virtual agents [32], human communication sy-namics [87], sentic computing [27, 103] are well established and have a well-delimited and well-recognized scope in the computing community.", "cial Signal Processing (SSP) [128], Social Robotics [23], Intelligent Virtual Agents [26], Human Communication Dynamics [80], etc.", "Affective computing, SSP and behavioural signal processing (BSP) address the \ufb01rst prerequisite, building machines that can understand the emotional, social and cognitive state of an individual.", "Overall, the large number of settings and data acquisition approaches reflects the wide variety of design and research goals that data collections are functional to [128]."]} +{"15396764|1118130": ["Looking at the recent literature, current goals in multimodal embodied interaction are focused on implementing sets of social communication skills in the agent, including detection of humour, empathy, compassion and affect [140].", "Modelling, analysis and synthesis of human behaviour are the subject of major efforts in computing science [138, 140]."]} +{"15396764|14688441": ["Recent technological achievements include social robots that deal with autistic children [119], computers that make sense of human personality in various contexts [137], artificial agents that sustain emotionally rich conversations with their users [123], intelligent frameworks for multimodal affective interaction [63, 105], approaches that detect phenomena as subtle as mimicry [43], and the list could continue."]} +{"18488847|14970359": ["A performance comparison of the classification techniques is provided in terms of their correct differentiation rates, confusion matrices, and computational cost, as well as their preprocessing, training, and storage requirements."]} +{"4335461|3348390": ["Human activity recognition and monitoring using wearable sensors has attracted lots of attention from researchers in di\ufb00erent emerging \ufb01elds such as pervasive and mobile computing [11], context-aware computing [14], and ambient assisted living [15]."]} +{"4335461|3330313": ["Hence, we rely on outlier detection algorithms [10] to predict whether the user is actually changing her current activity or not."]} +{"9255563|4719202": []} diff --git a/edge/graph_199582733.jsonl b/edge/graph_199582733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a93653fb6c26c2e6a971620358aac4854ff571d --- /dev/null +++ b/edge/graph_199582733.jsonl @@ -0,0 +1,37 @@ +{"126133740|13564808": ["These ISs are based on neural network distributed autoassociative memory (NAM) [89, 8, 113, 114].", "Some ISs of this type [115\u2013117] for real-valued vectors are considered in [89].", "References to other transformations into binary sparse vectors are given in [6, 89]."]} +{"126133740|3693305": ["Methods for improving the precision of PQ are considered in [72, 74] and references in them.", "Surveys of methods for the formation of such binary representations without learning are presented in [6, 72], and methods with learning are presented in [73, 74]."]} +{"126133740|1596835": ["In [5, 6, 72], methods for the formation of vector representations without the use of learning are considered that make it possible to fast estimate distances/similarities of initial objects and, in [73\u201375], learning-based methods are presented.", "Surveys of methods for the formation of such binary representations without learning are presented in [6, 72], and methods with learning are presented in [73, 74]."]} +{"126133740|5671282": ["Methods for improving the precision of PQ are considered in [72, 74] and references in them.", "In [5, 6, 72], methods for the formation of vector representations without the use of learning are considered that make it possible to fast estimate distances/similarities of initial objects and, in [73\u201375], learning-based methods are presented.", "Surveys of methods for the formation of such binary representations without learning are presented in [6, 72], and methods with learning are presented in [73, 74]."]} +{"126133740|191396": ["To obtain centers, clustering is used (for example, see K-means [35\u201337] and Sec."]} +{"146081517|56594500": []} +{"63169369|416565": []} +{"9436861|17779575": ["For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|165863": ["; Mittal and Vetter 2015].", "CPU versus GPU debate [Gregg and Hazelwood 2011; Lee et al. 2010; Mittal and Vetter 2015; Vuduc et al. 2010] toward a CPU and GPU paradigm where the best features of both can be intelligently combined to achieve even further computational gains."]} +{"9436861|13037420": ["However , mobile systems also impose very stringent cost and power budgets [Mittal 2014c].", "For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|12904520": []} +{"40256041|17574321": ["For further details, readers may refer to Kinnunen and Li [2010]."]} +{"40256041|15219853": ["A large amount of biometric information has been used in various applications and areas, including \ufb01ngerprint, hand, iris, retina, face, voice, veins, and signature [Yampolskiy and Govindaraju 2008; Delac and Grgic 2004; Bowyer et al. 2013; Bharadwaj et al. 2014]."]} +{"40256041|33239168": ["The one between the ASIP and FPGA design spaces is particularly interesting, as it highlights hybrid computing platforms, such as recon\ufb01gurable processors [Chattopadhyay 2013]."]} +{"12203146|5313655": ["The entire procedure builds upon the scheme proposed in [20] designed for biometric template protection [22]."]} +{"20724674|18609918": ["statistical models and holististic descriptors in combination with subspace projection were evaluated for both biometric characteristics [14], [15]."]} +{"1687471|6305682": ["The term Wireless Sensor Networks (WSNs) is currently applied to refer to a set of applications that collect and distribute sensorial data around the sensors [11,12].", ") [11]."]} +{"1687471|6809492": ["Although FPGA research reached a level of maturity in the 1990s, however until the last decade this technology was not implemented in a wide range of applications [13].", "The use of FPGA in industrial control systems is of great interest due to the increasing level of controllers\u2019 requirements [13].", "Currently, the variety of the designed FPGA-based controllers is large [13]."]} +{"54435241|5313655": ["[17] and [18] for comprehensive surveys), with the aim of developing protection schemes especially dedicated for biometric data."]} +{"126283000|13564808": ["The detection of these states can be used to analyze data (for example, for binary factor analysis [123]) and as a model of generalization of information in the brain including the appearance of hierarchies of categorization [100].", "Varieties of associative memory [100] (or content-addressable memory) can be considered as ISs for some types of similarity search.", "In the NAMs of the considered type, a function occurs that is different from functions of associative memory and which can be considered as a generalization function [100].", "A more detailed review is submitted in [100].", "\u2026analytical and experimental investigations from [113, 114] imply that, in contrast to the Hopfield network whose information characteristics (see [100]) monotonically increase with D , in the Willshaw network, for not too large D , their values are larger than in the case when D (cid:21)\u2026"]} +{"126283000|3693305": ["\u2026of bits and more are used, for example, to represent words [12], face images [13], market basket data [14], etc. Binary vectors reflecting similarities of objects are formed from vector or other representations without learning (for example, see reviews in [15\u201317]) and with learning [18, 19]."]} +{"126283000|1596835": ["\u2026of bits and more are used, for example, to represent words [12], face images [13], market basket data [14], etc. Binary vectors reflecting similarities of objects are formed from vector or other representations without learning (for example, see reviews in [15\u201317]) and with learning [18, 19]."]} +{"126283000|5671282": ["\u2026of bits and more are used, for example, to represent words [12], face images [13], market basket data [14], etc. Binary vectors reflecting similarities of objects are formed from vector or other representations without learning (for example, see reviews in [15\u201317]) and with learning [18, 19]."]} +{"19077846|5313655": []} +{"10034085|393948": ["The success of unsupervised feature learning architectures has been well established over the past couple of years, especially with the advent of representation learning techniques such as Deep Learning [2]."]} +{"52919290|12487207": ["Texture synthesis is the process of generating new texture images which are perceptually equivalent to a given texture sample (Efros and Leung 1999; Gatys et al. 2015; Portilla and Simoncelli 2000; Raad et al. 2017; Wei and Levoy 2000; Zhu et al. 1998).", "Researchers (Raad et al. 2017; Akl et al. 2018) presented a review of exemplar based texture synthesis approaches."]} +{"52919290|4570087": ["\u2026applications of texture analysis include medical image analysis [48, 158, 177], quality inspection [250], content based image retrieval [148, 216, 266], analysis of satellite or aerial imagery [96, 83], face analysis [4, 49, 215, 265], biometrics [137, 185], object recognition [210, 173, 263],\u2026"]} +{"52919290|393948": ["A full review of these networks is beyond the scope of this paper, and we refer readers to the original papers [84, 87, 103, 214, 220] and to excellent surveys [15, 31, 75, 112, 133] for additional details."]} +{"52919290|192934": ["As a classical pattern recognition problem, texture classi\ufb01cation primarily consists of two critical subproblems: texture representation and classi\ufb01cation [90].", "The global feature is used as the basis for classi\ufb01cation, for which many approaches are possible [90, 242]: Nearest Neighbor Classi\ufb01er (NNC), Support Vector Machines (SVM), neural networks, and random forests.", "Many classi\ufb01cation approaches are possible [90, 242], although Nearest Neighbor Classi\ufb01er (NNC) and Support Vector Machine (SVM) are the most widely-used classi\ufb01ers for the BoW representation."]} +{"8223549|5313655": ["Biometric template protection schemes [37] are commonly categorized as biometric cryptosystems and cancelable biometrics.", "Resistance to false matches and comparison speed, which is achieved by various existing approaches [40], are vital for any large-scale biometric deployments."]} +{"2739084|5313655": []} +{"111313841|359842": []} +{"3201604|16766019": []} +{"1118849|5313655": []} +{"1118849|17574321": []} +{"5630527|62198990": ["The eye can rotate in the eye socket; this includes torsional movement induced by the superior/inferior rectus and superior/inferior oblique muscles [28] (see figure 5), with a range of motion that is \u201cgenerally limited to angles of less than 10\u00b0\u201d [29]."]} +{"10074804|13088291": []} diff --git a/edge/graph_199587960.jsonl b/edge/graph_199587960.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199590576.jsonl b/edge/graph_199590576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199591123.jsonl b/edge/graph_199591123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_199654957.jsonl b/edge/graph_199654957.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a48ab020a7f48f8e2ab3c334b5391934494dc17 --- /dev/null +++ b/edge/graph_199654957.jsonl @@ -0,0 +1,3 @@ +{"51833614|199654957": []} +{"3261530|9270553": ["channel capacity compared to noninvasive electroencephalogram (EEG) recordings or subdural recordings [7], [8]."]} +{"206740290|10290908": []} diff --git a/edge/graph_199661323.jsonl b/edge/graph_199661323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21f0c2631b4210e5aa934cf01d5decea00111109 --- /dev/null +++ b/edge/graph_199661323.jsonl @@ -0,0 +1,3 @@ +{"23943173|14225710": ["\u2026information from sources like the World Atlas of Language Structures (WALS) (Dryer and Haspelmath, 2013), has proven useful in many NLP tasks (O\u2019Horan et al., 2016), such as multilingual dependency parsing (Ammar et al., 2016), generative parsing in low-resource settings (Naseem et al.,\u2026", "World Atlas of Language Structures (WALS) (Dryer and Haspelmath, 2013), has proven useful in many NLP tasks (O\u2019Horan et al., 2016), such as multilingual dependency parsing (Ammar et al."]} +{"201720|38476": ["However, it is well-known that this approach fails to exploit a lot of significant information [5]."]} +{"9530012|14225710": []} diff --git a/edge/graph_199663294.jsonl b/edge/graph_199663294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_19986865.jsonl b/edge/graph_19986865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..023f3f80dffb7571448d9a653f12c5b66c31bc72 --- /dev/null +++ b/edge/graph_19986865.jsonl @@ -0,0 +1,3 @@ +{"8186395|17300331": ["More recently, other algorithmic approaches based on quantum walks (Kempe 2003; Ambainis 2003) or quantum Markov chains (Szegedy 2004; Magniez et al. 2007; S\u00e1ntha 2008) have emerged."]} +{"1492185|19986865": []} +{"1492185|14617477": []} diff --git a/edge/graph_199904306.jsonl b/edge/graph_199904306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2000518.jsonl b/edge/graph_2000518.jsonl similarity index 100% rename from graph_2000518.jsonl rename to edge/graph_2000518.jsonl diff --git a/edge/graph_200067796.jsonl b/edge/graph_200067796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2000872.jsonl b/edge/graph_2000872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20013373.jsonl b/edge/graph_20013373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0c3e0815c3b771bc1d11e7d5c34f106a4507a93 --- /dev/null +++ b/edge/graph_20013373.jsonl @@ -0,0 +1 @@ +{"38241180|207372751": []} diff --git a/edge/graph_20017289.jsonl b/edge/graph_20017289.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2003896.jsonl b/edge/graph_2003896.jsonl similarity index 100% rename from graph_2003896.jsonl rename to edge/graph_2003896.jsonl diff --git a/edge/graph_20056367.jsonl b/edge/graph_20056367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20077029.jsonl b/edge/graph_20077029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9cdb3915ca56450c93775a28b8e484d97953b72 --- /dev/null +++ b/edge/graph_20077029.jsonl @@ -0,0 +1 @@ +{"21474604|11195746": ["Sofia\u2019s survey [26] includes a broader range of such proposals."]} diff --git a/edge/graph_20083128.jsonl b/edge/graph_20083128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b812525d85d8c597546106d7074cc88d1428e2cb --- /dev/null +++ b/edge/graph_20083128.jsonl @@ -0,0 +1,5 @@ +{"23720855|29398427": ["In response to demands imposed by newly developed applications, dynamic mobile platforms are employed as receivers [4], [18], [19].", "Different wireless networks can benefit from location information, such as cellular networks [3] and wireless sensor networks [4]."]} +{"23720855|6396569": ["In response to demands imposed by newly developed applications, dynamic mobile platforms are employed as receivers [4], [18], [19]."]} +{"23720855|17325804": ["In [1, 2] and the references therein, the different position estimation methods and techniques can be found.", "The goal of position estimation in mapping techniques (fingerprinting) is to identify a relationship, relaying on a set of training data, for the purpose of estimating the position of a desired node [2]."]} +{"23720855|2497115": []} +{"23720855|206583375": ["In the training phase, the RSS measurements (fingerprints) from all the available APs at some locations are collected and a database is formed.", "In this system, 32 IR and Bluetooth APs are typically associated with one Bluetooth server, which is responsible for various functionality and managing APs [35].", "Also, as was mentioned, WLAN-based positioning systems can reuse the already installedWLAN infrastructures in indoor environments [90], which reduces the cost [35].", "However, because of complex indoor environments, the accuracy of indoor location estimations based on the signal strength of WLAN signals is of several meters [35], and is affected by various elements in indoor environments.", "To this end, special considerations of the deployment of APs have been discussed and optimization methods were suggested [63], [102].", "32 IR and Bluetooth APs are typically associated with one Bluetooth server, which is responsible for various functionality and managing APs [35].", "In the positioning phase, the RF device compares the received RSS powers from the available APS and compares them with the RSS of the corresponding APs collected at the database.", ", and generate proportional outputs [35], [67].", "For a more detailed overview of hop-count techniques the readers are referred to [35].", "The system consists of software and hardware parts for local positioning of Bluetooth tags or any device equipped with Bluetooth technology [35].", "and varying indoor environments, Bluetooth positioning systems suffer from similar drawbacks as of other RF positioning techniques [35], [89].", "Others suggested the use of compressive sensing theory to reduce fingerprint collection in conjugation with RSS from WLAN APs for indoor localization [103]\u2013[105] relaying on the sparse nature of location finding through sparse signal recovery for more accurate indoor positioning."]} diff --git a/graph_2008940.jsonl b/edge/graph_2008940.jsonl similarity index 100% rename from graph_2008940.jsonl rename to edge/graph_2008940.jsonl diff --git a/edge/graph_20096584.jsonl b/edge/graph_20096584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201041404.jsonl b/edge/graph_201041404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f84368fae734efbed571b4f5de975d8c84389133 --- /dev/null +++ b/edge/graph_201041404.jsonl @@ -0,0 +1,4 @@ +{"2544222|13475127": []} +{"4354870|7834819": ["What can consumer wearables do?Heart rate can be measured with an oximeter built into a ring [3], muscle activity with an electromyographic sensor embedded into clothing [4], stress with an electodermal sensor incorporated into a wristband [5], and physical activity or sleep patterns via an accelerometer in a watch [6,7]."]} +{"51678443|2488484": []} +{"51678443|14186660": []} diff --git a/edge/graph_201041768.jsonl b/edge/graph_201041768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bf5936e06c00f057d483cf91d24fa28a9465540 --- /dev/null +++ b/edge/graph_201041768.jsonl @@ -0,0 +1,6 @@ +{"8845734|954543": ["This provides a powerful base-learner, with advantages such as nonlinear mapping and noise tolerance, increasingly used in Data Mining due to its good behavior in terms of predictive knowledge [22]."]} +{"23722566|4962939": []} +{"7206775|4962939": ["\u2026knowledge to be represented from a guideline and do not allow for managing uncertainty well \u2013 either in the interpretation and encoding of ambiguous statements within a guideline, or in making a recommendation for action to the end user with some sense of certainty of the recommendation [161-164]."]} +{"7206775|11009327": ["no surprise that many clinicians view CDS as arising at an inopportune time in their workflow [219, 220], and many CDS alerts are simply ignored or overridden [221-224]."]} +{"4812753|15090622": ["Primarily, there are two ways how to search for similar images: querying the images is based on the keyword TBIR (Text-Base Image Retrieval) [45, 62] and based on the content CBIR (Content-Base Image retrieval) [13, 74]."]} +{"4812753|9307657": ["The papers [9, 10] presented VQ for image processing."]} diff --git a/edge/graph_201058419.jsonl b/edge/graph_201058419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc028bfee4e3eccafdf34e226b06caf9562f138e --- /dev/null +++ b/edge/graph_201058419.jsonl @@ -0,0 +1,11 @@ +{"868076|15679891": ["The issues most often criticised by peers [3] are: the lack of novelty in the research questions addressed, the potential limitation of the geographic scope, and the limited representativeness of the sample.", "most common criticisms found in peer evaluation of survey studies [3], to guidelines for conducting surveys in software engineering (e."]} +{"14940719|17446703": []} +{"14940719|62667623": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114].", "5.1.1 The search string was generated by combining synonyms for system engineers (defined by Cruz et al. [113]) and synonyms for systematic review (defined by Biolchini et al. [37]) with a logical AND operator.", "5.4.1 The research sting was generated by combining synonyms for software engineers (defined by Cruz et al [113] and Beecham et al. [110]) and the BSE concept with the logical AND operator."]} +{"14940719|205435103": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114].", "5.4.1 The research sting was generated by combining synonyms for software engineers (defined by Cruz et al [113] and Beecham et al. [110]) and the BSE concept with the logical AND operator.", "For example, Beecham et al. [110] stated that software engineers are likely to be motivated according to individual concepts, i.e. their characteristics (e.g. their need for variety) and their internal controls (e.g. their personality).", "In these studies three human factors literature reviews were found, all of which related to motivation [110] [112] [111]."]} +{"14940719|627405": ["In order to verify the reliability of the extraction process a pilot extraction was conducted, where three researchers classified 12 randomly selected publications [41]."]} +{"14940719|15164501": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114]."]} +{"14606825|62667623": []} +{"14606825|205435103": ["(2005), Dyba and Dings\u00f8yr (2008), Beecham et al. (2008), and da Silva et al. (2012). For this reason, our automatic search procedure produced a very low precision rate.", "Precisions lower than 2% have been reported in several well-known systematic reviews in software engineering Sj\u00f8berg et al. (2005), Dyba and Dings\u00f8yr (2008), Beecham et al. (2008), and da Silva et al. (2012).", "(2005), Dyba and Dings\u00f8yr (2008), Beecham et al. (2008), and da Silva et al."]} +{"1924926|11392986": ["[20], for example, conducted a survey about which techniques support the elicitation phase."]} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"14873362|205435103": ["In SE research, elements of the substantive domain are, for instance, open source software [77] and developer motivation [78]."]} diff --git a/edge/graph_201058573.jsonl b/edge/graph_201058573.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c30f054ea14620ecee4e8a46db0e5ef4ccb29a1 --- /dev/null +++ b/edge/graph_201058573.jsonl @@ -0,0 +1,14 @@ +{"12244447|17157304": ["The most investigated types of spam are the web spam [7, 8] and email spam [5, 9]."]} +{"15784627|542269": []} +{"151420259|542269": ["If, on the one hand, there is a growing number of studies that consider the predictive power of sentiment analysis based on data from Twitter, on the other, there are also some skeptics in the literature (Gayo-Avello, 2012)."]} +{"10246231|3330313": ["To detect change points, we tried different algorithms [2] against a rule-based heuristics."]} +{"13123579|15847221": []} +{"12320930|431089": ["In the simple case of binary classification, an SVM works by embedding data in a highdimensional space and attempting to find the hyperplane that best separates the two classes [25]."]} +{"13356032|542269": []} +{"7291091|542269": []} +{"22884416|542269": ["\u00a0 \u00a0 \u00a0 Complementing \u00a0this \u00a0specific \u00a0rebuttal, \u00a0Gayo-\u2010Avello \u00a0(2011, \u00a02012) \u00a0identified \u00a0more \u00a0general \u00a0problems \u00a0in \u00a0 the \u00a0 use \u00a0 of \u00a0 Twitter \u00a0 to \u00a0 predict \u00a0 election \u00a0 outcomes."]} +{"32543977|542269": ["Other researchers [39, 30, 50, 47] have also highlighted issues with using Twitter to predict elections, such as the need of methodological justification in terms of accuracy, the need to produce a true forecast (i."]} +{"3680944|16768404": ["INTRODUCTION Sentiment analysis (SA) is a computational method to determine people opinion towards an object [1]."]} +{"12552516|393948": ["As described in Section 2, Topic Models represents the most used technique for extracting knowledge from political texts."]} +{"15705831|207372751": []} +{"16004059|12161567": []} diff --git a/edge/graph_201058676.jsonl b/edge/graph_201058676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201065415.jsonl b/edge/graph_201065415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a05ba5dd2ecdf1194bf5806d7c24b04ed63e1c50 --- /dev/null +++ b/edge/graph_201065415.jsonl @@ -0,0 +1,2 @@ +{"55831511|17381415": ["This strategy is similar to the control structure used for single phase active rectifiers with regulated DC link voltage [17, 18]."]} +{"25714417|12098072": ["Thus, permanent magnet machines and induction motors are still widely used in these application areas [6]\u2013[9]."]} diff --git a/edge/graph_201065935.jsonl b/edge/graph_201065935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bb39cc4cf36fee182b8250fdeb7e6b57dbf2c4c --- /dev/null +++ b/edge/graph_201065935.jsonl @@ -0,0 +1,85 @@ +{"49183966|393948": ["nt learning tasks. Many unsupervised representation learning techniques have been introduced to address this issue, such as spectral-based methods, neural network-based methods, and manifold learning [5, 33]. However, most of these methods focus on preserving the data regularity information (e.g., data reconstruction/proximity information) for learning tasks like clustering and data compression. They may", ".2 Unsupervised Representation Learning for Outlier Detection Numerous unsupervised representation learning methods have been proposed to learn low-dimensional representations of highdimensional data [5, 33]. They include: spectral-based methods, like principal component analysis (PCA) and its variants [7, 14]; neural network-based methods, like autoencoder and its variants [13, 21]; manifold learning, l", "ed Sp using different representation dimensions. REPEN performs very stably when M is set between 10 and 100. Neural network-based methods can represent up to O(2M) concepts when using M neural nodes [5]. Therefore, REPEN can theoretically learn complex representations (i.e., up to O(210)concepts) when M = 10 is used, making it sufficient for most data sets. The expressiveness of REPEN\u2019s representati"]} +{"61810265|3330313": ["Extensive explanation and discussion about outlier analysis and detection are provided in diverse surveys [8, 9, 10, 11, 3]."]} +{"14278698|7704963": ["A survey of different uncertain data algorithms and applications may be found in [4]."]} +{"57377007|3314665": []} +{"57377007|17174635": ["Now, outlier detection is considered as a critical task in many practical applications, such as network intrusion detection [4]\u2013[8], fraud detection [9]\u2013[11], industrial damage detection [12]\u2013[15] and health care monitoring [16]\u2013[18]."]} +{"57377007|18654252": []} +{"18654252|7774517": ["In [17], a detailed overview of the existing outlier detection techniques for the WSN is given.", "\u2022 We have found general surveys on outlier detection such as [13, 14, 15, 16, 17, 18] and surveys on network anomaly detection such as [19, 20, 21]."]} +{"18654252|3330313": ["Outlier detection approaches found in literature [13, 14, 15, 16] have varying scopes and abilities.", "\u2022 We have found general surveys on outlier detection such as [13, 14, 15, 16, 17, 18] and surveys on network anomaly detection such as [19, 20, 21]."]} +{"11730666|1097238": ["Achieving better-than-random accuracy in supervised learning is not hard, and several studies have shown that ensembles tend to yield better results when there is a significant diversity among the models [Brown et al. 2005; Kuncheva and Whitaker 2003]."]} +{"6724536|3330313": []} +{"22177268|3330313": ["This is defined in an intuitive fashion in Acuna and Rodriguez (2004 ) a s follows (for alternate definitions see Hawkins 1980, Barnett and Lewis 1978):", "In addition to the slowing effect this has on performance, it also spreads the convex hull, thus distorting the data distribution [\u201cCurse of Dimensionality\u201d ( Hodge and Austin 2004 )].", "In addition to the slowing effect this has on performance, it also spreads the convex hull, thus distorting the data distribution [\u201cCurse of Dimensionality\u201d (Hodge and Austin 2004)]."]} +{"22177268|2656838": ["Similar work was presented in Geerts et al. (2005), Calders et al. (2004) for a tight upper bound on number of candidates generated by frequent itemset mining methods and itemsets that can be derived based on smaller itemsets and their support.", "(2005), Calders et al. (2004) for a tight upper bound on number of candidates generated by frequent itemset mining methods and itemsets that can be derived based on smaller itemsets and their support."]} +{"2745905|3330313": ["It is important to identify and remove of these outliers [6-7]."]} +{"15909008|3330313": ["Over time many techniques have been developped to detect outliers, leading to a number of surveys and review articles [Hodge and Austin, 2004, Chandola et al., 2008]."]} +{"34341009|7704963": []} +{"34341009|7774517": []} +{"43938706|3330313": ["Anomaly Detection This \ufb01eld has been amply studied and good overviews can be found in [Chandola et al., 2009, Hodge and Austin, 2004].", "Anomaly detection (a.k.a. outlier detection) [Aggarwal, 2015, Chandola et al., 2009, Hodge and Austin, 2004] aims to discover rare instances that do not conform to the patterns of majority."]} +{"27353076|7774517": ["Indeed, outlier data in WSN represents measurements deviated from normal pattern [6], whereby outlier detector aims at discovering their abnormal behaviour [7]."]} +{"32995149|7774517": []} +{"11251978|7774517": []} +{"59528442|51909308": ["\u2026behavior may change over time, for instance, the nature of anomaly had changed so signi\ufb01cantly and that it remained unnoticed at Maroochy water treatment plant, for a long time which resulted in leakage of 150 million liters of untreated sewerage to local waterways (Ramotsoela et al. [2018])."]} +{"59528442|49669060": ["A survey of traditional anomaly detection techniques and its challenges to detect anomalies in social networks is a well studied topic in literature (Liu and Chawla [2017], Savage et al. [2014], Anand et al. [2017], Yu et al. [2016], Cao et al. [2018b], Yu et al. [2016])."]} +{"59528442|52043210": []} +{"59528442|4097106": ["Several works have studied the state-of-the-art deep models for video anomaly detection and have classi\ufb01ed them based on the type of model and criteria of detection (Kiran et al. [2018], Chong and Tay [2015]).", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017].", "\u2026contributions as follows: \u2022 Most of the existing surveys on DAD techniques either focus on a particular application domain or speci\ufb01c research area of interest (Kiran et al. [2018], Mohammadi et al. [2017], Litjens et al. [2017], Kwon et al. [2017], Adewumi and Akinyelu [2017], Ball et al. [2017]).", "The state-of-the-art deep learning based methods for video anomaly detection along with various categories have been presented in Kiran et al. [2018].", "A review of deep learning based semi-supervised techniques for anomaly detection is presented by Kiran et al. [2018] and Min et al. [2018]."]} +{"59528442|9461213": ["al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.al Ball et al. [2017]. The state-of-the-art deep learning based methods for video anomaly detection along with various categories has been presented in Kiran et al. [2018]. Although there are a number of reviews in applying DAD techniques, there is shortage of comparative analysis of deep learning architecture adopted for outlier detection.", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017].", "domain is presented by Mohammadi et al. [2018]. In this section we present some of the DAD techniques used in this domain in Table 14.", "al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.al Ball et al. [2017]. The state-of-the-art deep learning based methods for video anomaly detection along with various categories has been presented in Kiran et al.", "[2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.", "al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.", "[2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017]. 1 2 3 4 5 6 7"]} +{"59528442|2088679": ["\u2026contributions as follows: \u2022 Most of the existing surveys on DAD techniques either focus on a particular application domain or speci\ufb01c research area of interest (Kiran et al. [2018], Mohammadi et al. [2017], Litjens et al. [2017], Kwon et al. [2017], Adewumi and Akinyelu [2017], Ball et al. [2017]).", "An extensive review of using DAD techniques in the medical domain is presented by Litjens et al. [2017].", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017]."]} +{"59528442|18188725": ["Several studies have been conducted to understand the theoretical and practical applications of deep learning in medical and bio-informatics (Min et al. [2017], Cao et al. [2018a], Zhao et al. [2016], Khan and Yairi [2018])."]} +{"59528442|8965636": ["Many traditional machine learning algorithms have been applied successfully in fraud detection (Sorournejad et al. [2016])."]} +{"59528442|17195518": ["7 Brown et al. [2018], Zhang et al."]} +{"59528442|1828831": ["Several works have studied the state-of-the-art deep models for video anomaly detection and have classi\ufb01ed them based on the type of model and criteria of detection (Kiran et al. [2018], Chong and Tay [2015])."]} +{"59528442|18599847": []} +{"13082042|18654252": []} +{"13082042|3330313": []} +{"2887636|191396": []} +{"2887636|3330313": []} +{"4505261|3273340": []} +{"4505261|19034128": ["supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "There are three main types of learning, i.e. supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "One of the representative learning methodologies is Machine Learning, that is related to changes in the systems that perform tasks associated with artificial intelligence such as recognition, diagnosis, prediction, etc. [23]."]} +{"20703436|3330313": ["Communication overhead in global approaches is prohibitive, so BG models are mainly useful as a baseline for comparing different algorithms, but see [8, 9] for good introductions to outlier detection with BG models."]} +{"49316773|1097238": []} +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} +{"57366655|7252621": ["Several surveys on outlier detection algorithms for traffic flow data have been published [10], [11], [15]."]} +{"12073071|1097238": []} +{"3562477|3330313": []} +{"3562477|50458504": []} +{"207172599|3330313": []} +{"6927305|3330313": ["Outlier detection [1] is an important task that has applications in many domains."]} +{"52988666|393948": ["The effectiveness of a machine learning algorithm relies heavily on selected data representations or features [16], wherein abundant and effective representations tend to produce good prediction results."]} +{"5912655|3330313": ["Hodge & Jim Austin [2], proposed a survey of contemporary techniques for outlier detection.", "In 2004, Victoria J. Hodge & Jim Austin [2], proposed a survey of contemporary techniques for outlier detection.", "[2] Victoria J. Hodge and Jim Austin."]} +{"3822029|207209718": ["other real-life applications of our proposed approach, such as intrusion detection [31], false data injection detection in smart grid [32], among others."]} +{"59618880|7252621": ["Feng and Zhu [12] proposed a general framework of trajectory data mining, including preprocessing, data management, query processing, trajectory datamining tasks, and privacy protection.", "[12] Z. Feng and Y. Zhu, \u2018\u2018A survey on trajectory data mining: Techniques and applications,\u2019\u2019 IEEE Access, vol. 4, pp. 2056\u20132067, 2016.", "[50] J. Zhu, W. Jiang, A. Liu, G. Liu, and L. Zhao, \u2018\u2018Effective and efficient trajectory outlier detection based on time-dependent popular route,\u2019\u2019World Wide Web, vol. 20, no. 1, pp. 111\u2013134, 2017."]} +{"19036098|10397481": ["\u2026community analyzing video sequences is interested in a lot of different questions like, e.g., key-frame extraction and storyboard display (Money and Agius 2008; Kim and Kim 2010), shot or scene change detection (Hong et al. 2003; Lee et al. 2004), or detection of continuity errors\u2026", ", key-frame extraction and storyboard display (Money and Agius 2008; Kim and Kim 2010), shot or scene change detection (Hong et al."]} +{"19036098|3330313": ["Although several survey papers have been published over the last decade (e.g. Hodge and Austin 2004; Agyemang et al. 2006; Hadi et al. 2009; Chandola et al. 2009, 2012; Su and Tsai 2011; Zimek et al. 2012), covering a broad selection of algorithmic approaches to outlier detection and quite\u2026"]} +{"7359997|3330313": []} +{"14414383|4621813": []} +{"14414383|3330313": []} +{"14414383|10500613": []} +{"2982044|393948": ["In recent years, the \ufb01eld of representation learning [6] has become increasingly popular."]} +{"7875570|3330313": ["Since outlier detection is useful in various applications it has been a active research topic in statistics, machine learning, and data mining communities for decades [24]."]} +{"56597949|17195518": ["On the other hand, graph-based models emphasis on the structure of the whole or parts of the dataset, yet pay little attention to local information around each node, thus leading to a high false positive rate [26]."]} +{"56597949|14414383": ["Lately, graph-based approaches receive more and more attention as they excel at capturing the long-term associations implicit in the data [22]."]} +{"5025443|50458504": ["Financial fraud detection concerns about the detection of fraud in insurance, credit card, telecommunications and other \ufb01nancial crime activities such as money laundering [26], [36], [32], [34]."]} +{"4097106|1828831": []} +{"4097106|4915696": ["A detailed review of abnormal human behavior and crowd motion analysis is provided in [17] and [18]."]} +{"4097106|393948": ["\u2022 Unsupervised representation learning is a well-established domain and the readers are directed towards a complete review of the topic in [25], as well as the deep learning book [26]."]} +{"13179613|1097238": ["In general, while the motivation for ensemble methods for outlier detection is borrowed from the rich tradition in the literature on supervised ensemble learning [11,12,21,41], the theoretical foundation for ensemble learning in the unsupervised setting is far less mature.", "Feature bagging is a common procedure to induce diversity of ensemble members in ensemble classification [11] or ensemble clustering [8, 14,40]."]} +{"5865347|50458504": ["Finally, due to the wide-range of application domains, fraud detection has attracted many surveys (Edge and Falcone Sampaio 2009; Flegel et al. 2010; Phua et al. 2010).", "For a general survey on various fraud detection techniques, we refer the reader to [Bolton and Hand, 2002] and [Phua et al., 2010].", "Finally, due to the wide-range of application domains, fraud detection has attracted many surveys [Edge and Sampaio, 2009, Flegel et al., 2010, Phua et al., 2010]."]} +{"205488025|3330313": ["Being applied in many different fields such as intrusion detection for cyber-security [2,3], fraud detection for credit cards, insurance and tax [4], early detection of disease outbreaks in the medical field [5], fault detection in sensor networks for monitoring health, traffic, machine status, weather, pollution, surveillance [6], and so on [7,8], it has generated enormous interests and many techniques have been developed for this purpose in recent years, namely distribution-based approaches, depth-based approaches, 81"]} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"977199|3330313": []} +{"18355067|16087532": ["In the money laundering domain, Sharma and Panigrahi [13] show that the technical data mining and logistic models, neural networks, Bayesian networks, and decision trees have been", "In the money laundering domain, Sharma and Panigrahi [13] show that the technical data mining and logistic models, neural networks, Bayesian networks, and decision trees have been extensively applied to provide solutions to the problems of fraud detection and classification."]} +{"385307|3102110": []} +{"17455861|7774517": ["This approach increases the accuracy and robustness of outlier detection technique (Zhang et al. 2010).", "The main differences between event detection and outlier detection are summarized in Table 1 (Zhang et al. 2010).", "This is the concept of multi-level outlier detection (Zhang et al. 2010)."]} +{"17455861|3330313": ["It processes the data as a static distribution, and flags the most remote points as potential outliers, without the need of a pre-defined normality/abnormality model (Hodge and Austin 2004).", "A certain measure criteria, for example distance based approaches, is used to measure the outlier (Hodge and Austin 2004).", "This work is different from other survey papers (Chandola et al. 2009; Hodge and Austin 2004; Rajasegarar et al. 2008a), in that, it summarizes the analysis criteria of outlier detection techniques into a single discussion, specifically in the context of harsh environments.", "In contrast, non-robust classifier methods produce representations which are skewed (Hodge and Austin 2004).", "Based on the type of data available from sensors, the techniques are classified as Hodge and Austin (2004):", "This boundary may be hard, where a point lies wholly within or wholly outside the boundary, or soft, where the boundary is graduated depending on the underlying detection algorithm (Hodge and Austin 2004).", "The normal points could be classified into a single class or subdivided into distinct classes according to the requirements of system to provide a simple normal/abnormal classification (Hodge and Austin 2004).", "This approach models only normality or abnormality (Hodge and Austin 2004; Rousseeuw and Leroy 1996)."]} +{"17455861|1230643": ["\u2026health monitoring, battlefield observation, industrial safety and control, etc. (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d; George 2010).", "Extensive work has been dedicated for various applications of WSNs (Zhang et al. 2007a; Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; George 2010).", "Some of the formal and earlier methods of outlier detection such as Grubbs test and tietjen moore test (Akyildiz et al. 2002) require the specification of fixed number of \u2018outliers to be detected\u2019, whereas Ramaswamy et al.", "Some of the formal and earlier methods of outlier detection such as Grubbs test and tietjen moore test (Akyildiz et al. 2002) require the specification of fixed number of \u2018outliers to be detected\u2019, whereas Ramaswamy et al. (2000) requires the specification of an upper bound on the suspected number\u2026", "1.1 Harsh environments\nVarious applications of WSNs have been studied extensively in literature (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d).", "Various applications of WSNs have been studied extensively in literature (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d)."]} +{"17455861|50458504": ["The sensor nodes are equipped with a magnitude of capabilities like sensing, processing and wireless communication.", "1.1 Harsh environments\nVarious applications of WSNs have been studied extensively in literature (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d).", "\u2026health monitoring, battlefield observation, industrial safety and control, etc. (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d; George 2010)."]} +{"8065347|1097238": []} +{"62351362|3330313": []} +{"53288981|4097106": ["Although not yet applied to the HPC \ufb01eld, Deep Learning based approaches for anomaly detection have been studied in other areas [7, 15, 14], especially in recent years."]} +{"1478612|27569632": ["\u2026arises from their usage in detecting exceptional behavior of data that can be valuable than normal behavior in many application, in addition to their capability to run as a preprocessing phase for removing outliers before other data mining algorithms (e.g. clustering, classification, etc.) [2].", "978-1-4673-9971-5/15/$31.00 \u00a92015 IEEE 175\nStatistical-based methods are efficient since they achieve good performance; in terms of computational cost as soon as the model is constructed [3]."]} +{"57755215|4097106": []} +{"721859|40008157": []} +{"721859|14356173": []} +{"721859|18432258": []} diff --git a/edge/graph_201065972.jsonl b/edge/graph_201065972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86ee91788a9bea2526b33595ac4e3dc153895b48 --- /dev/null +++ b/edge/graph_201065972.jsonl @@ -0,0 +1,7 @@ +{"1791872|579475": ["GRID4EU & SGAM [7] Testing innovative concepts and technologies in real-size environments, to", "These projects have demonstrated crucial challenges, such as safety, security, and interoperability and have become a reality especially manufacturing systems [7].", "Thus recent works show that the most significant contributions of CPPS are the following [1], [6], [7], [16]\u2013[18]:", "ENIAC JU E2SG [7] Developing methods for detecting and controlling energy flows in the grid with", "IMC-AESOP [7], [8] Proposing a Service-Oriented Architecture (SOA) for very large-scale distributed", "IDAPS [7] Perceiving as a microgrid is intelligent, having a built-in multi-agent functionality in", "In particular, it is important to consider that even in highly developed countries there are asymmetries on the degree of digitalization of manufacturing, and even within the same organization, there are areas which have been highlighted on automation from others [7].", "Pabadis Promise [7] Distributing manufacturing execution systems and bringing flexibility features to", "[7], [10], [17]), architectures, methodologies, and standards are mutually exclusive characteristics."]} +{"86649805|35426346": ["The Semantic Web is a form of ontology, based on the idea that decentralised and heterogeneous agents can use the web to share, integrate and process data (Leit\u00e3o, 2009)."]} +{"1871572|35426346": [": failures, resources) [33, 41] Ensure modularity & encapsulation full [31, 52] Support contex awareness full [6, 33, 44, 52] Ensure flexibility full [31, 33, 44, 52] Increase systems integration full [4, 31, 44] Support fault-tolerance full [32, 33, 54] Enable high-level protocols and langs full [52] Ensure reconfigurability full [4, 31, 52]", "partial [6] Increase dependability partial [4, 31] Increase interoperability partial [4, 31] Optimize energy consumption partial [44] Enable repetability partial [31, 44] Facilitate development partial [33, 51, 52] (various systems\u2019 complexity) Reducing communication partial [6, 51] (Agent Migration) Facilitate understanding partial [32] system model Enable self-healing partial [41] Handling variability partial [6] and resources scarcity Enabling self-adaption partial [52] Simplify software partial [6] development/extension Ensure robustness partial [41] Facilitate components partial [6] evolution and reuse Face unpredictable scenarios partial [52] Support security partial [54] (cyber and physical layers) Maximization of partial [4] resources utilization Reduce redundancy partial [32] Proactiveness and full [44, 51, 52] intelligent behaviors [31, 33, 41] Ensure Scalability full [4, 31] Reactivity full [41, 44, 51] Social-able full [41, 44] Increase autonomy full [4, 44, 51] (e.", "[31], for example, developed a manufacturing control system"]} +{"69203729|35426346": []} +{"69203729|32584958": []} +{"52986823|3348390": []} +{"52986823|16081379": [", smart home [4], smart car, smart factory [5], [6], and smart city, their"]} diff --git a/edge/graph_201067274.jsonl b/edge/graph_201067274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b13017c8fbf1ea8941f5c30664f1630ee39da458 --- /dev/null +++ b/edge/graph_201067274.jsonl @@ -0,0 +1,5 @@ +{"637882|239537": []} +{"15826469|8417324": ["BI frameworks are used to compare BI applications, projects and/or vendors."]} +{"12278382|1349348": ["Even though data visualization can be applied to a wide range of contexts, the creation of a context-aware dashboard tends to be a complicated task (Li et al., 2015)."]} +{"12278382|1113420": ["As, the context definition itself is considered to be a challenge mainly because of its differences from one case to another (Baldauf et al., 2007)."]} +{"49668433|39635018": []} diff --git a/edge/graph_201067392.jsonl b/edge/graph_201067392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea37df08a79646187c849fd488511a1dd0947402 --- /dev/null +++ b/edge/graph_201067392.jsonl @@ -0,0 +1,28 @@ +{"5569656|3994942": []} +{"11543422|1598350": ["The future industrial perspective of IoT is presented in [8].", "These instructions are defined by southbound interfaces such as OpenFlow [7], ForCES [8] and are\ninstalled in the forwarding devices by the SDN controllers implementing the southbound protocols.", "These instructions are defined by southbound interfaces such as OpenFlow [7], ForCES [8] and are installed in the forwarding devices by the SDN controllers implementing the southbound protocols.", "Some examples are OpenFlow [7], Forwarding and Control Elements (ForCES) [8] , Protocol-oblivious forwarding (POF) [9].", "[17] A. Doria, Salim, J. H., Haas, R., Khosravi, H., Wang, W., Dong, L., and Halpern, J. \u2015Forwarding and control element separation (ForCES) protocol specification,\u2016 2010."]} +{"11543422|2623404": ["NOX handle routing task based on the information gathered from MCS.", "An SDN centralised controller suffer from processing pressure as only a limited amount of flow can be processed by a single controller such as\non NOX, around 30k flow request per second are processed.", "The OpenFlow protocol is used for setting up the flow tables, HTTP/XML for the communication between MCS and NOX and IEEE 802.21.", "Many controllers are in the market from its inception such as ONOS, Open daylight, Floodlight, NOX [3], POX, Trema etc.", "Few NOS are also available in market such as NOX, ONIX [62], Maestro [63], OpenDaylight [14] etc.", "Many SDN controllers are available in the market such as NOX[3], OpenDaylight[5], Ryu[6].", "Many controllers are in the market from its inception such as ONOS, Open daylight, Floodlight, NOX [3], POX, Trema etc. SDN controller define rule for the incoming flows from the data plane.", "[12] N. Gude, ., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., & Shenker, S., \u2015NOX: Towards an Operating System for Networks,\u2016 SIGCOMM Comput Commun Rev, vol. 38, no. 3, pp. 105\u2013 110, Jul. 2008.", "Monitoring and Control Server (MCS) and NOX act as a controller interface and communication is done on a secure channel and handles all the flow rules.", "in [3], discuss the past, present and future of programmable network based on SDN."]} +{"11543422|10693567": ["In SDN, the control plane is decoupled from forwarding plane and communication between two planes is done through using Southbound and Northbound APIs.", "Network innovation in the context of SDN using OpenFlow is dealt in [5].", "The interaction between controller and radio element is done through APIs.", "So far NI APIs is not well studied.", "The Network Operating System (NOS) facilitate application developers to coordinate through these NI APIs.", "These SDN layers communicate with each other via open APIs called Northbound Interface (NI) API and Southbound Interface (SI) API [5].", "Many SDN controllers are available in the market such as NOX[3], OpenDaylight[5], Ryu[6].", "The customer needs are abstracted over application layer which is communicated to the controller via Northbound APIs e.g., RESTfull API.", "In this context, an extendable architecture open MTC is proposed and its implementation is prototyped which uses oneM2M and ETSIM2M protocol that run on Gvent API.", "The controller communicates with the devices in the data plane via Southbound APIs, most common and recognised is OpenFlow (OF).", "Generally, RESTFull APIs are used as an interface between applications and control plane.", "Typically, an NI APIs abstracts the low-level instruction sets and implementation of forwarding devices."]} +{"1296058|8450611": ["Although software based packet classification has been extensively studied (see survey paper [ 24 ]), these techniques cannot match the wire speed performance of TCAMbased packet classification systems."]} +{"45571305|2623404": []} +{"16349549|2623404": ["Compared to recent surveys [5, 6], this paper tackles most of the SDN challenges with their causes and existing solutions in a comprehensive and detailed manner."]} +{"10821318|2623404": []} +{"10821318|10532321": ["As a result, its aggregation efficiency is barely satisfactory [15]."]} +{"16860435|7971188": []} +{"7040435|10693567": ["0), and the fields continues to grow as more fields are added in [1].", "In OpenFlow-based SDN, forwarding policies are translated into flow tables to act out[1], [13]."]} +{"30654518|18392886": []} +{"30654518|15035771": ["Furthermore, trade-offs concerning some concepts such as perormance, resiliency, availability, reliability and flexibility have to e taken into account by network designers and managers while esigning a network architecture [29] ."]} +{"3158382|2623404": []} +{"15444463|2623404": []} +{"15444463|10693567": ["Several surveys of SDN already exist [1\u20133]; this contribution differs from them through an analysis of architectural design choices for OpenFlow-based SDN networks."]} +{"15444463|3189715": ["Programmable networks (PN) [18,19] also provide a means for programmability in the network by executing programs on packets similar to AN."]} +{"86679422|4710623": []} +{"10532321|2623404": ["\u2026opens a plethora of research questions such as how to design network programming languages, obtain robust systems with centralized management, control traf\ufb01c at the packet level, perform network virtualization, or even co-exist with traditional network protocols [2], [3], [4], [5], [6], [7], [8].", "1, is the most popular implementation of the southbound interface of SDN [5], [6], [7], [11], [12]."]} +{"52930427|4710623": ["SDN is designed to provide flexible management and rapid innovation through dynamically customizing the behaviors of a network [1]."]} +{"85459147|4710623": ["In WANs, the propagation latency is the critical part of the total latency [25][26], and some works aim to minimize the propagation latency among controllers and switches [50][51]."]} +{"8391351|1906759": ["As shown in the figure above, all the data flow requests within a domain are distributed to different controllers by the load balancing equipment, and the load balancer can do the requests distribution by a variety of algorithms like round-robin scheduling [19], or hash scheduling algorithm [20] by the IP address."]} +{"4710623|34643772": ["three layers; [17-19] survey SDN network update, testbeds,"]} +{"4710623|4269723": ["For example, [15] and [16] introduce a comprehensive literature survey on SDN, including the motivation, architecture and an overview of three layers; [17-19] survey SDN network update, testbeds, and security architecture, respectively."]} +{"24199169|2623404": []} +{"24199169|10693567": ["The underlying paragraph will enlighten about SDN technology, which is advancing towards standardization and deployment as NGN: In 2011, Deutsche Telekom, Google, Facebook, Verizon, Microsoft, and Yahoo established an ONF to endorse deployment of SDN and OpenFlow-based networks [65].", "The main purpose of the OpenFlow is to standardize the communication between the switches and the software-based controller in SDN architecture [65].", "Table 5 Brief description of selective OpenFlow controller [54, 65]"]} +{"24199169|3189715": ["period, programmable functions were introduced and that enabled the network operators to have greater innovations [14, 15]."]} +{"16524479|2623404": ["Software Defined Networks: Within the idea of a programmable network proposed as an approach to facilitate network evolution, SDN is a novel paradigm, which decouples the forwarding hardware from control decisions [7] [8]."]} diff --git a/edge/graph_201067464.jsonl b/edge/graph_201067464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c00e38435dbfd1a1823e9e9deca14fd08954c20 --- /dev/null +++ b/edge/graph_201067464.jsonl @@ -0,0 +1,43 @@ +{"290756|10500613": ["In addition, techniques known from the field of schema and ontology matching [13,24] can be applied to detect correspondences between process model elements."]} +{"5749902|9913343": ["Graphical passwords can be further divided into recognition-based graphical passwords and recall-based graphical passwords [Suo et al. 2005].", "Graphical passwords can be further divided into recognition-based \ngraphical passwords and recall-based graphical passwords [Suo et al. 2005]."]} +{"9385544|16362395": []} +{"9385544|8365617": []} +{"8746080|6670217": []} +{"60571927|206778272": ["refactorings are used to maintain the source code of information systems [153, 154]."]} +{"60571927|7185733": []} +{"204984450|12860838": []} +{"204984450|10500613": []} +{"76734|10500613": ["schema matching [4] can be exploited as activities might be regarded as elements of a process model schema."]} +{"7553711|11608263": ["Multilabel classification is an extension of binary classification that is currently an area of active research in supervised machine learning [18]."]} +{"8658999|3330313": ["There has been extensive research done on anomaly detection techniques (Chandola et al. 2009; Hodge and Austin 2004; Lazarevic et al. 2003), but most of these techniques assign an anomaly score to individual data instances with respect to the the normal data instances, without accounting for the sequence aspect of the data.", "There has been extensive research done on anomaly detection techniques (Chandola et al. 2009; Hodge and Austin 2004; Lazarevic et al. 2003), but most of these techniques assign an anomaly score to individual data instances with respect to the the normal data instances, without accounting for the\u2026"]} +{"9853432|1343571": ["A synthesis of decidability and undecidability results for equivalence-based security properties, and an overview of existing veri\ufb01cation tools that may be used to verify equivalence-based security properties can be found in [36]."]} +{"9447728|14662449": ["\u2026all of the page\nsequences visited by the users during their browsing through a web site is known as the web sessionization problem (WSP) (Berendt, Mobasher, Spiliopoulou, & Wiltshire, 2001; Chitraa & Selvdoos, 2010; Huynh & Miller, 2009; Poz\u030cenel, Mahnic, & Kukar, 2010; Vel\u00e1squez & Palade, 2008).", "\u2026a flourishing source of data for different research fields related to social networks, such as sociology (Lin, Jheng, & Yu, 2012; Nohuddin et al., 2012), marketing (Fong, Zhou, Hui, Tang, & Hong, 2012; Wang, Ting, & Wu, 2013) and computer science (Devi, Devi, Rani, & Rao, 2012; Yin & Guo, 2013)."]} +{"9447728|60455": ["The generated browsing sequences represent an input source for discovering the behavior patterns of users who visit a web site (Cooley, Mobasher, & Srivastava, 1999; Kosala & Blockeel, 2000; Tao, Hong, Lin, & Chiu, 2009).", "The generated browsing sequences represent an input source for discovering the behavior patterns of users who visit a web site (Cooley et al., 1999; Kosala & Blockeel, 2000; Tao et al., 2009).", "All rights reserved."]} +{"16073505|1805048": ["Recently, the Collaborative Filtering (CF) [27] based approaches have gained great popularity due to their free from human efforts, Spring\t\r \t\r \t\r \t\r Summer\t\r \t\r Autumn\t\r \t\r \t\r \t\r Winter\t\r \t\r \t\r \t\r \t\r \t\r Spring\t\r \t\r \t\r \t\r Summer\t\r \t\r Autumn\t\r \t\r Winter 1\t\r \t\r \t\r 2\t\r \t\r 3\t\r \t\r \t\r 4\t\r \t\r \t\r 5\t\r \t\r \t\r 6\t\r \t\r 7\t\r \t\r \t\r 8\t\r \t\r \t\r 9\t\r \t\r 10\t\r 11\t\r 12\t\r 1\t\r \t\r \t\r 2\t\r \t\r 3\t\r \t\r \t\r 4\t\r \t\r \t\r 5\t\r \t\r \t\r 6\t\r \t\r 7\t\r \t\r \t\r 8\t\r \t\r \t\r 9\t\r \t\r 10\t\r 1112 N ut ri9 ou s A n9 -\u00ad\u2010U V", "One of the most extensively investigated approaches for personalized recommendation is to model user preferences according to his/her historical choices, as well as those of the others\u2019, leading to the success of Collaborative Filtering (CF) techniques [27]."]} +{"207172599|3330313": []} +{"5452269|11608263": ["We adopt precision and recall as in [36] and [4], with exact matching of real sessions for constructing precision and recall measures [7]."]} +{"5452269|60455": ["Techniques such as statistical analysis, association rules, clustering, classi\ufb01cation, sequential pattern and dependency modeling are used to discover patterns of web user behavior [23, 26, 35]."]} +{"5452269|954543": ["Sessionization is part of the Knowledge Discovery in Databases (KDD) process [29] for web mining [30]."]} +{"29158052|1223851": ["This capacity has been long studied in the computer vision community in the name of \u2018salient object detection\u2019, since it can ease the procedure of scene understanding [2]."]} +{"60874451|11607029": []} +{"30049473|17772052": ["Gaussian Radial Basic Function is chosen as the kernel function for its universality and high efficiency [20]."]} +{"14937168|3709199": ["Such performance measures can be defined on an aggregate level, namely for teams, departments, or a company [Nudurupati et al. 2011], or for individual employees [Neely et al. 2005; Thompson and Goodale 2006; Dulebohn and Johnson 2013].", "In the following sections, we first describe definitions of the basic concepts that are used in the framework specifications."]} +{"18956528|7530272": ["The statistics shows that the 20days and 30-days overlapping rate of user1 is higher than the rate between 10-days and 20-days, which means that initializing L in [10, 20] is not appropriate.", "Secondly, we compare SPIA with four typical sequence classification methods mentioned in [10] as \u2022KNN-A distance based method."]} +{"62641151|15219853": ["As a \u201cbehavioral\u201d biometrics [10], keystroke dynamics exhibits instabilities due to transient factors such as fatigue, emotions, stress, and drowsiness."]} +{"62641151|17950466": ["Various artificial neural networks (ANNs) have been applied to the keystroke classification problem, including perceptron, backpropagation neural network, and Art-2 neural network [23, 29, 30].", "These approaches can be broadly classified into four categories: statisticalmethod based on distance metrics, neural networks, statistical machine-learning methods, and many other algorithms [23]."]} +{"15900245|60455": ["\u2022 finding the most popular web pages and how the trend changes over time [9, 19],"]} +{"207238953|7530272": ["Other popular settings are sequence classification [31, 49] and sequence labeling [26]."]} +{"34183301|6513230": []} +{"6967469|10500613": ["Moreover, techniques from the area of schema and ontology matching can be exploited [27, 56]."]} +{"8205807|825893": ["Hidden semi-Markov Model (HsMM) [5-6] is a Hidden Markov Model (HMM) [5] with variable state duration."]} +{"12282567|12269716": ["This is the reason that they are being used in multiple explicit-state model checkers, such as C ADP [Garavel et al. 2012], the M CRL2 toolset [Groote and Mousavi 2014; Cranen et al. 2013], and TVT [Virtanen et al. 2004].", "The new algorithm has been implemented as part of the mCRL2 toolset [Cranen et al. 2013].", "2012], the MCRL2 toolset [Groote and Mousavi 2014; Cranen et al. 2013], and TVT [Virtanen et al."]} +{"42400264|60455": []} +{"16877190|10500613": ["The concepts used for describing process model alignment are inspired by the according notions in the field of schema and ontology matching [10, 11].", "The latter are inspired by a large body of work on solving the matching problem for data schemas and ontologies, see [10, 11]."]} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"2126312|14808716": []} +{"901477|10500613": ["Overviews of the various techniques are provided in [36], [44], [45]."]} +{"60603235|10500613": []} +{"15681798|60455": ["Web Usage Mining involves determining the frequency of the page access by the clients and then finding the common traversal paths of the users.", "BACKGROUND STUDY Data mining efforts associated with the Web, called Web mining, can be broadly categorized into three areas of interest based on which part of the Web to mine; Web Content mining, Web Structure mining, and Web Usage Mining (Kosala and Blockeel, 2000)."]} +{"11961835|393948": ["RBM is a generalization of the classic RBM \u2013 originally designed for binary data, and now a building block for many deep learning architectures [3,12]."]} +{"17052619|17756238": ["It is notable that people appear to have become increasingly concerned about their privacy being compromised in personalized systems [Westin 2003; Toch et al. 2012].", "In addition, there is evidence that people willingly provide more personal information for personalization if they feel that they are in control [Kobsa 2007; Toch et al. 2012]."]} diff --git a/edge/graph_201067505.jsonl b/edge/graph_201067505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201067633.jsonl b/edge/graph_201067633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ed8c5476be35d2d8286bcebeb86bc2ccfd7359d --- /dev/null +++ b/edge/graph_201067633.jsonl @@ -0,0 +1,43 @@ +{"25822604|7482876": ["For this channel, 50 references appear in the review of [44], and more than 20 additional references appear in [45], for a total of at least 77 references on this channel."]} +{"13751888|51858916": ["In [6], the authors provide a survey on the measurement campaigns launched for UAV channel modeling using low altitude platforms and discuss various channel characterization efforts."]} +{"13751888|2958701": ["learning solutions in support of SAR operations using UAVs [58].", "economically less expensive [58]; 2) Real-world problems with high number of states can turn the problem intractable with current techniques, severely limiting the development of real applications.", "classification which has been proven very effective [58].", "16: Illustration of How CNNs Work [58].", "Some of challenges are: 1) The design of computing devices with low-power consumption, particularly GPUs, is a challenge and active working field for embedded hardware developers [58]; 2) While a few UAVs can already travel without a UAV operators directing their routes, this technology is still emerging.", "on-board powerful processor devices with low power consumption is an active area for future researches [58].", "An efficient method for coping with these types of problems remains as an unsolved challenge [58].", "In [58], a review of deep learning methods and applications for UAVs were presented."]} +{"13751888|11701828": ["The researchers used UAVs for conducting environmental sampling and ocean surface temperature studies in the Arctic [69].", "The UAV also took a vertical sounding in the eye of the typhoon and measured the strongest winds during the whole flight mission [69]."]} +{"13751888|61132": ["\u2022 There is a need for a seamless mechanism to transfer the users during the handoff process between UAVs, when out of service UAVs are replaced by active ones [2].", "SDN also can help to address the complexity of network management [2].", "\u2022 We need more studies about the topology of UAV wireless networks where this topology remains fluid during: a) Changing the number of UAVs; b) Changing the number of channels; c) The relative placements of the UAVs altering [2].", "it is difficult to construct a simple implementation for proactive or reactive schemes [2].", "FANET communication bands to mitigate this problem [2].", "It only constitutes 10%-20% of the UAV energy capacity [2].", "to the power limitations of UAVs, a decision must be taken on whether UAVs should perform data and image analysis onboard in real-time, or data should be stored for later analysis to reduce the consumed power [2], [50].", "is distributed over all UAV nodes), or hybrid in which the processing control of the forwarded packets can be performed locally on each UAV node and control traffic also exists between the centralized SDN controller and all other SDN elements [2].", "In [2], the authors attempt to focus on research in the areas of routing, seamless handover and energy efficiency.", "Fluid topology and rapid changes of links among UAVs are the main characteristics of multi-UAV networks or FANET [2]."]} +{"13751888|76603": ["\u2022 Utilizing UAVs in public safety communications needs further research, where topology formation, cooperation between UAVs in a multi-UAV network, energy constraints, and mobility model are the challenges that are facing UAVs in public safety communications [9].", "The authors of [9] present an overview of legacy and emerging public safety communications technologies along with the"]} +{"13751888|15517134": ["The authors in [60] presented major categories of collision avoidance methods.", "Therefore, the development of UAV collision avoidance techniques has gained research interest [60], [300].", "These algorithms include: flight route determination, path planning, collision avoidance and swarm coordination [59], [60]."]} +{"13751888|3330461": ["the capacity in ground communications systems [269]."]} +{"13751888|4269723": ["in FANET with high reliability, reachability and fast mobility of UAV nodes [349] \u2022 More research is needed to develope specific security protocols for FANETs based on the SDN paradigm.", "in which the control plane is completely decoupled from data plane and the routing protocols can be executed onboard from SDN switching devices [349]."]} +{"1601089|8323234": ["Moreover, if the beamwidth is small, the fast acquisition and alignment of the optimal beam in millimeter wave channels is challenging [7]."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"145866225|51858916": ["[32] provided an extensive survey of the measurement methods of UAV channel modeling and discussed various channel characterization for UAV communications.", "The insightful surveys [26]\u2013[32], [34] have covered a wide range of fundamental issues, such as channel modeling [32], radio frequency (RF) aspects [27], communication protocols [26], [28], simulators and testbeds [31], application issues [26], [30], as well as societal concerns [29]."]} +{"145866225|3423198": ["More detailed comparison between different multiobjective optimization algorithms could refer to [212], [213] and in the references therein."]} +{"145866225|35695099": ["However, robust spectrum sensing is required in aeronautical communications, since packet collisions in spectrum usage may lead to catastrophic consequences during landing/takeoff [234].", "Furthermore, unmanned aerial systems also aggravate the spectrum scarcity in the aeronautical domain [234]."]} +{"145866225|61132": []} +{"145866225|9395674": ["Dorri and Kamel [12] have also characterized a range of energy-efficient neighbor discovery protocols [13] in order to emphasize the need for connectivity maintenance and context awareness.", "Apart from routing, surveys on important aspects such as security and neighbor discovery have also been produced by the MANET research community, which shows that the routing information and encryption defeating approaches [12] are the most effective MANET security solutions."]} +{"145866225|13348951": ["The transmitter and receiver of the AANETs have to be robust against both interference and latency, hence requiring sophisticated coding and modulation schemes [4], [72].", "The joint European-American research activities were launched in 2004 for further developing the future communication infrastructure [4], led by the NextGen in the United States and by the SESAR in Europe.", "[4] appealed for multinational cooperation of establishing international standards.", "[4] gave an overview of aeronautical communication infrastructure development activities spanning from 2004 to 2009 and focused their attention on the L-DACS in terms of its PHY characteristics and MAC characteristics."]} +{"46933660|61132": ["For an instance, the battery capacity of a small-type UAV with a payload of 300 g is only around 5200 mAh, which is equivalent to eight alkaline batteries [10]."]} +{"155192275|12681089": ["A geometry-based stochastic channel model (GBSCM) incorporates a geometrical relation for individual MPCs represented by single point allowing for a realistic simulation of MPCs in non-stationary scenarios [9], [10]."]} +{"64792997|51858916": ["was provided in [41].", "agation channel measurements and modeling [37], [40], [41]."]} +{"64792997|35695099": []} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"53767775|16120075": ["Therefore, it has been simplified in many forms in the field of robotics and sensor networks [6]\u2013[8].", "As for the second category, maximizing target coverage has been proven to be NP-complete for most of its variant formulations [6], [16].", "However, the problem of optimal camera location to maximize coverage has been shown to be NP-complete in many variations for both area and target coverage in both isotropic [5] and anisotropic sensors [6]."]} +{"12373458|13367219": ["As with terrestrial cellular channels, classification of the various types of AG channels presents ambiguities and overlaps [21].", "One desirable attribute of these models is that they can be employable in computer simulations, and for this, we could use the several model types [21], including stored CIRs"]} +{"57189391|21557844": ["Since mmWave communication is established between the RRUs and their host BBU, the pathloss Lp a t h lo s s [r(ur )] of the RRU-to-BBU link is given by [37], [38] Lpathloss [ r(ur ) ] [dB]=3."]} +{"57189391|4502294": ["Laying optical \ufb01ber to connect the RRUs to their host BBU is impossible in city centres of some countries [25]."]} +{"23313210|18148591": ["Use of antenna arrays with multiple-input-multiple-output (MIMO) signal processing techniques has been known to give tremendous improvements in the performance of point-to-point communication links [3]."]} +{"18752649|13074005": [".. (16) Considering an Additive Gaussian Noise, the unbiased estimator of the channel impulse vector h n r ,n t according to the maximum likelihood criterion (ML) is exactly the one given by the unbiased least-square (LS) solution given by: \u02dcY n r ( I n t [1]) \u02dcY n r ( I n t [2]) .", "In this context, we propose spatial modulation (SM) [2] [3] [4].", "In [2] [3] [4], Orthogonal Frequency Division Multiplexing (OFDM) is considered.", "\u2026\u00d7 N p vector and the N p \u00d7 L corresponding Fourier transform matrix at I n t frequency index positions in the n t transmit antenna : w 1 I n t [1] . . . w w 0 I n t [2] w 1 I n t [2] . . . w I n t [2] ... ... ... ... Finally, we can obtain this matrix form: \u02dcY n r ( I n t [1]) \u02dcY n r ( I n t [2]) .", "After pilot insertion we obtain: (3) where, x p n t is a vector of N p CAZAC pilot symbols to be inserted into data sequence X d n t ( k ) at the index frequency position I n t = ( I n t [1] , I n t [2] , . . . , I n t [ N p ]) ."]} +{"51858916|61132": ["For instance, reference [58] identified key issues related to the formation of multi\u2013UAV network, but this survey focuses more on the communications and especially the control of UAV.", "Both [58] and [59] have very light touch on the channel modeling."]} +{"59231311|49272228": ["Indeed, encrypted UAV control [23] as well as use of novel inflight charging methods [24] offer encouraging developments to mitigate against such fundamental obstacles to implementation."]} +{"69783074|61132": ["These drones are usually equipped with diverse payloads for receiving, processing and transiting signals, which can be viewed as the aerial mobile base station constituting UAV communication networks [1], [2]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"3783069|61132": []} +{"67865158|51858916": ["[1] UAV assisted communications can be categorized into air-to-ground (A2G) and air-to-air (A2A) connections.", "Typical loads on UAV during channel measurement are the processor to control flight dynamics, the inertial unit to measure dynamics such as pitch, yaw and roll angles, the GPS, the GPS-disciplined rubidium oscillator, the wireless equipment to collect channel data, and the antennas to radiate or receive signals [1]."]} +{"3065927|5660618": ["In order to analyze the stable condition of the multi-UAV system\u2019s control, we consider the control process of this system as a network control system [7], named UAV cloud control system (CCS) in this paper."]} diff --git a/edge/graph_201068436.jsonl b/edge/graph_201068436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24716f60b08db24d0e0edc9f8d21d88a8b136983 --- /dev/null +++ b/edge/graph_201068436.jsonl @@ -0,0 +1,29 @@ +{"13471908|17516538": ["The common basic steps to achieve this task in a computer vision-based system are motion detection, interesting objects tracking and behavior analysis [12,19,28,43]."]} +{"64970283|5664472": []} +{"57662814|13709403": []} +{"57662814|7464059": []} +{"57662814|14814753": []} +{"57662814|1303485": []} +{"57662814|4915696": []} +{"57662814|9022135": []} +{"57662814|2670121": []} +{"57662814|61238909": []} +{"57662814|27637541": []} +{"57662814|1634674": []} +{"57662814|3330313": []} +{"206767722|8601873": ["[89], [90], [91], but adapted to our weakly supervised scenario using a formulation (given by Equation (5)) similar to multiple instance learning [92], [93], [94]."]} +{"49536569|5664472": ["IN RECENT years, the task of human action recognition from video has been tackled with computer vision and machine learning techniques, see surveys [1]\u2013[3]."]} +{"49536569|1634674": []} +{"49642131|1353379": []} +{"49642131|64404": []} +{"49642131|14889616": []} +{"16372098|1118130": ["\u2026focused on the recognition of human a\ufb00ect (emotion) to improve user experience in various applications, for instance, stress detection [15], social signal processing involves the analysis of the communicative or informative patterns in the communication interaction, group interaction, etc. [29]."]} +{"41496104|4915696": []} +{"41496104|5664472": []} +{"41496104|5401262": []} +{"41496104|16525678": []} +{"41496104|8729078": []} +{"53744161|15778270": ["Scope related (over scoping and ill-defined scope) [42], [45], [46], [56] 4 22%"]} +{"4997074|12358655": []} +{"4997074|6387482": []} +{"8060940|4915696": ["These integral field lines and their properties gained significant attention in the field of video analytics: Similar frameworks have been used successfully in the field of video-based crowd analysis [13], [14] and crowd motion segmentation [15], [16]."]} diff --git a/edge/graph_201069012.jsonl b/edge/graph_201069012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41e6be9922d3a4e14b1321500109eeadd6313ad7 --- /dev/null +++ b/edge/graph_201069012.jsonl @@ -0,0 +1 @@ +{"52961806|2340740": []} diff --git a/edge/graph_201070042.jsonl b/edge/graph_201070042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..882c64fe3b7169a0ed1b7a8160a93d8f668dcc28 --- /dev/null +++ b/edge/graph_201070042.jsonl @@ -0,0 +1,2 @@ +{"16864990|16362395": ["The same boosted ensemble ranking approach can be adopted in problems with the neural activity data (Lewickiy, 1998; Lotte et al., 2007)."]} +{"16864990|10290908": []} diff --git a/edge/graph_201070074.jsonl b/edge/graph_201070074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd8f14a95e9df8905cecd2efb650424bc08e88ff --- /dev/null +++ b/edge/graph_201070074.jsonl @@ -0,0 +1,17 @@ +{"4932044|1722293": []} +{"15396468|17516538": ["Further, work in [27] surveys Kinect and other camera-based motion tracking and points to potential lighting"]} +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"13504353|2003896": []} +{"2215820|7788290": ["Traditionally, researchers used vision sensors for activity recognition[2][3]."]} +{"2984106|7834819": ["Many devices [34] have been used and tested in several studies to predict the MET physiological variable using values from uni- and triaxial accelerometers."]} +{"10830260|18303304": [") can be found in the literature, for example in [24,25]."]} +{"10830260|2814871": ["[97] underlines this, reporting a shift of interest towards body-worn sensor-based systems for gait analysis."]} +{"10830260|16514036": []} +{"51615616|1722293": ["Considering that the BCG has 3-axis components [27] and that its morphology"]} +{"127680308|46924129": []} +{"47006205|10175374": ["Zhang and Yang present a comprehensive overview of multi-task methods [48], and Ruder give an overview of implementations of multi-task learning with deep neural networks [35]."]} +{"189926753|1262156": ["The ArmTroi design can provide a lightweight way to obtain such desired inputs with a substantially extended service coverage and decreased system cost, compared with cameras or depth sensors adopted in existing solutions [26]."]} +{"18112361|7185733": ["In [52] and [49], each gesture was considered to consist of three phases: pre-stroke, nucleus, and post-stroke."]} +{"125974424|46924129": []} +{"4655047|2670121": ["In contrast, informed learning approaches such as Co-Training [46] and Co-EM [47] assumes that labeled training data is available in the target domain and try to use multi-view learning techniques by using a small amount of labeled data in each view to train two classifiers [48]."]} diff --git a/edge/graph_201070569.jsonl b/edge/graph_201070569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ead1d7ee64576abeed59a51974f3e515c90c2d9e --- /dev/null +++ b/edge/graph_201070569.jsonl @@ -0,0 +1,80 @@ +{"33621679|3757239": ["As a result, vehicular edge networks is emerged with the development of VEC [2]."]} +{"33621679|36400013": ["Reputation query should be processed promptly to facilitate regular interactions [3]."]} +{"52831791|206578365": ["The power consumption of the MEC server can be calculated by [16] , = , + , \u2212 , \u2211 ( ) , (9)"]} +{"171096642|51935081": ["Since forming blockchain requires a mining task, that is, proof-of-work (PoW), which demands both heavy computation resources and energy, it is hard to widely facilitate blockchain in a wireless network [5]."]} +{"52146340|31860478": ["Fog nodes perform a large amount of communication at or near the end-user instead of through the backbone network [25]."]} +{"49566175|6909107": ["MEC, a key technology toward 5G, provides cloud computing capabilities and task offloading service at the edge of mobile networks [12]."]} +{"11507175|14159066": []} +{"58227760|7800459": []} +{"52289007|19938676": ["The development of mobile communication technologies brings new opportunities for the low-latency and high-speed scenario of vehicular networks [2]."]} +{"53098769|4811079": []} +{"53098769|8523192": ["The fog nodes are allowed to have different con\ufb01gurations and capabilities [12]."]} +{"53098769|1520906": []} +{"53098769|3348390": ["At the \ufb01nal stage speci\ufb01c reasoning technique is employed that analyzes the infused information to get high-level context information [38]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"52912946|3680335": ["We chose ReLU over other activation functions, because it mitigates the vanishing gradient problem experienced by MLP during the training process [29]."]} +{"61811659|8523192": ["More recently, fog computing [3] (or mobile edge computing (MEC) [4]) has been put forwarded as an effective complement to MCC and has been deemed as an important paradigm and scenario in 5G [5].", "Fog nodes can communicate directly with each other, and all the fog nodes are connected to the powerful cloud server through high-speed wired links [3], [4].", "Utilizing the computation resources of the fog nodes, such as WiFi access points (APs), base stations (BSs), or remote radio heads (RRHs), fog nodes can offer computation services at the edge of the network [3], [4]."]} +{"21723803|3119314": []} +{"53046224|206578365": ["Especially, SIoV also significantly benefits from MEC applications by deploying high-performance computation and geo-distributed servers at roadside RSUs [14]\u2013[16].", "To alleviate the workloads at roadside RSUs and reduce the costs of deployed RSUs, unmanned aerial vehicles (UAV) assisted MEC as flying RSUs has been proposed to improve computation performance owing to their low cost and flexible deployment [16]\u2013[20].", "To resolve this issue, mobile edge computing (MEC) has been recognized as a cost-effective method to enhance the computation capability in proximity to mobile devices [16]."]} +{"53015239|763939": ["According to the existing scheme, we select Manhattan grid model as vehicle mobility model in the proposed network architecture [5], [20]."]} +{"4780719|1116024": ["and since then it has been a highly active area of research [7], [20]."]} +{"4780719|206576469": ["It represents a trusted, resource-rich computer or cluster of computers that is well-connected to the Internet and available for use by nearby mobile devices [68]."]} +{"4780719|38911919": ["Over a decade ago, the conceptual idea of Vehicular Ad Hoc Networks (VANETs) was introduced, where vehicles equipped with wireless communication devices can form networks [7].", "and since then it has been a highly active area of research [7], [20]."]} +{"61155824|206578365": ["The literature also presents some reference architectures on fog computing [5, 10, 11, 12]."]} +{"3465792|38911919": ["Regarding coordination, the usual focus of clustering algorithms is on completely distributed algorithms [3, 6, 10, 13].", "Cooper et al. [6] outline the basic scheme of a cluster creation algorithm as follows: \u2022 Gather control data: To calculate the clusters, control information has to be exchanged.", "The general clustering steps given in [6] can be nicely mapped onto our concept of virtual edge servers (shown in Figure 2): (1) Gather control data: Control data required is information about the cars\u2019 geographical position as well as their ID.", "Unfortunately, such dynamic clustering solutions failed in general due to the very dynamic nature of Vehicular Ad Hoc Networks (VANETs) [3, 6]."]} +{"69511851|3757239": ["2876298 by computation-intensive applications, thus resulting in bottlenecks and making it challenging for the vehicles to ensure the required level of quality of service (QoS) [1], [2].", "Mobile edge computing (MEC) can alleviate the need of heavy computation from the vehicles, yet enable such applications by providing computation capabilities at the edge of the radio access network and in close proximity to mobile users [1]\u2013[4]."]} +{"69511851|6909107": []} +{"69511851|206578365": ["2876298 by computation-intensive applications, thus resulting in bottlenecks and making it challenging for the vehicles to ensure the required level of quality of service (QoS) [1], [2]."]} +{"49272880|3628110": ["The main blockchain characteristics are depicted in Figure 1 [6], [7]."]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"26953367|17934515": ["The platoon-based mobility model [13] is applied that several adjacent vehicles with the same destination form a group and led by the first vehicle (i."]} +{"46931283|3767252": []} +{"54060198|206578365": ["for 5G networks, provides computing and storage platforms at the edge of the mobile network [3], [4]."]} +{"49274056|3782888": []} +{"52150387|8523192": []} +{"52150387|2335874": ["Most of the existing congestion avoidance schemes to deal with message storm are proposed in context of VANET [7] [6] [2].", ", beaconing messages [6]."]} +{"29627628|16514036": ["M-health applications will also benefit from the integration of more sophisticated body area network systems [24] that provide improved real-time sensing capability of health parameters."]} +{"29627628|13785718": ["Many of the recently proposed mobile cloud security frameworks tend to offload the security/privacy related tasks to the cloud [8]."]} +{"68079360|2623404": ["SoftwareDefined Networking (SDN) provides a flexible and simple way to manage a network by integrating control capacities to a logically centralized controller [7], [8]."]} +{"51687564|6909107": ["The primary advantage of MEC is the proximity of the edge nodes to the mobile devices, which brings a limited amount of memory, compute and communication resources close to the mobile devices thereby enabling low latency turn around time of the results [9], [4], [11]."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"25088296|31860478": ["There are several dimensions in fog architecture in term of the current standard practice [35]."]} +{"49557871|2623404": ["Another key feature integrating 5G architecture is the SoftwareDefined-Networking (SDN) paradigm which aims at decoupling the control plane from the data plane and hence offering network programmability and scalability with minimal cost and network congestion [5]."]} +{"49557871|10693567": ["OpenFlow [10] is the most popular protocol promoted by the Open Networking Foundation (ONF)."]} +{"53711326|763939": ["Since the recorded data does not consider any constant period, the vehicular mobility in each period is obtained from the Manhattan grid mobility model [10]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"8704720|2736673": ["GPSR [20,21,24]) seems more proper for being adopted in VANETs [2,20,21].", "AODV [20,21,23]) increases significantly when the variation of network topology increases."]} +{"8704720|18037424": ["Cloudcomputing iswidelyrecognizedasnextgenerationcomputingparadigm[27\u201331]."]} +{"52812402|13688847": ["tion to defend against the collusion attacks in BIoV [6].", "Block Verification Collusion: Malicious miners may internally collude with other miners to generate false results in the block verification stage, even to launch doublespending attack, which is also challenging [6], [13].", "To decrease resource cost of consensus schemes, a few studies have replaced the computation-intensive consensus schemes by \u201cvirtual mining\u201d [6].", "The larger \u03b8q implies a higher reputation verifier for secure block verification among miners [6], [17].", "computation-intensive PoW or unfair stake-based PoS [6].", "There exists an exorbitant cost to establish blockchain-enabled vehicular networks by using computationintensive consensus schemes for resource-limited vehicles [6]."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"54442051|4884302": ["By combining RL deep learning, deep reinforcement learning DRL) enables agents to optimize their control in environment by automatically learning knowledge directly from raw, high-dimensional observations [3]."]} +{"9931536|2623404": ["The Software-Defined Network (SDN) technology [77] is one important enabler for the evolution of current networks towards the intelligent 5G HetNets [78]."]} +{"9931536|7851743": ["From the aspect of reducing the operational and capital expenditure (O/CAPEX) of MNOs, AI-based techniques can substantially diminish human involvement in operational tasks, and optimize network capacity, coverage, and Quality of Service (QoS) in HetNets, according to the advanced features discussed in Self-Organizing Networks (SONs) along following directions [3], [4], [6]: 1) self-configuration, where newly deployed high variety of cells are automatically configured and updated before entering operation tasks, 2) self-healing, where cells and networks can automatically detect and recover from failure and even execute compensation mechanisms whenever failures occur, and 3) self-optimization, where cellular systems can measure the network conditions and optimize the settings to improve the performance in terms of coverage, bandwidth, interference avoidance, and QoS, while the corresponding issues of system scalability and energy conservation are also considered.", "They have relatively lower complexity enabled by recursive feedback-based learning and local interactions, and hence faster speed of finding sub-optimal solutions compared to conventional techniques [3], [4]."]} +{"9931536|9072047": ["A fuzzy system is a control system based on fuzzy logic, which mathematically analyzes analog input values in terms of logical variables that take on continuous values between 0 and 1 [59]."]} +{"9931536|7158350": ["Artificial neural networks (ANNs) are one type of statistical learning models inspired from the biological neural networks of human brains [57]."]} +{"9931536|1708582": ["Among many ML techniques, the reinforcement learning (RL) is one particular learning algorithm inspired by behaviorist psychology, concerned with how software agents ought to take actions in an environment so as to maximize some notion of cumulative rewards [27]."]} +{"9931536|13215551": []} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"35513393|2445817": []} +{"16139052|7482876": ["Due to high mobility of vehicles, communication channels are susceptible to fast fading, whereby reliable links cannot be guaranteed [98]."]} +{"16139052|763939": ["In the literature, many research studies have been undertaken so as to provide a close-to-reality mobility model for VANETs [129,130]; however, those proposed models are suitable for only a small number of scenarios (e."]} +{"49865694|206578365": ["On the other hand, the density of SeVs is much higher than static edge clouds, and thus the computing resources of VEC are more redundant than MEC.", "Compared with mobile edge computing (MEC) [12], in which computing resources are deployed at static base stations, VEC has two major differences.", "The computation task that requires to be offloaded at time period t is modeled by three parameters (xt, yt, wt) according to [12]: xt is the input data size (in bits) to be transmitted from TaV to SeV, yt is the output data size (in bits) which is the size of the computation result transmitted back from SeV to TaV, and wt is the computation intensity (in CPU cycles per bit) representing how many CPU cycles are required to process one bit input data.", "Typical use cases include safety-related cooperative collision avoidance and collective environment perception for autonomous driving [9], [10], vehicular crowdsensing for road monitoring and parking navigation [11], and entertainments such as virtual reality, augmented reality and cloud gaming for passengers [12]."]} +{"69703124|206578224": ["The emerging multiaccess edge computing (MEC) enables RSUs to offer such caching services [4]."]} +{"30349664|15888893": []} +{"195832739|3645740": ["Artificial intelligence (AI) is a promising technique to address such challenges and can assist in complex resource allocation [11]."]} +{"13936415|9104850": []} diff --git a/edge/graph_201095080.jsonl b/edge/graph_201095080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7062ebbe49ffc3b04146ea46b8b66ae53271347 --- /dev/null +++ b/edge/graph_201095080.jsonl @@ -0,0 +1,17 @@ +{"49188103|10137425": []} +{"5039874|3757239": ["work infrastructure [28]."]} +{"5039874|206578365": ["Therefore, the traditional cloud computing cannot efficiently support the IoE-based application services [10], and the edge computing arises at the historic moment [11], [12] to adapt to the era of IoE."]} +{"5039874|3767252": []} +{"5039874|3042864": ["Previous work such as micro data center, [19], [20], mobile cloud computing [13], [14], fog computing [15], [16], cloudlet [21], and cloud-sea computing [22] have been introduced to reduce the storage and computation load in cloud computing.", "At present, some related paradigms, such as mobile cloud computing [13], [14], fog computing [15]\u2013[18], which is the predecessor or counterparts of edge computing, can provide the efficient solutions for massive data processing, and meanwhile improve the user experience."]} +{"52015330|206578486": ["[8] \u2713 Paper Q oS Co st En er gy Ba nd w id th", "The authors in [8] present a comprehensive review of current literature in fog computing with a focus on architectures and algorithms in fog systems."]} +{"52015330|206578224": ["The survey in [14] introduces a survey on MEC and focuses on the fundamental key enabling technologies in MEC.", "MEC allows edge computing to be accessible to a wide range of mobile devices with reduced latency and more efficient mobile core networks [14]."]} +{"52015330|12675271": ["The recent survey in [11] focuses on connectivity and device configuration aspects of the fog computing and identifies major features that fog computing platforms need to build infrastructure for smart city applications."]} +{"52015330|206578365": ["Similarly, the survey in [15] provides a survey of the recent state of MEC research with a focus on joint radio and computation resource management."]} +{"52015330|8523192": ["Foundations Surveys [8, 9, 13, 43, 67, 71, 78\u201386, 97\u2013105]"]} +{"52015330|16654832": ["Mobile applications can be partitioned at runtime so that computationally intensive components of the application can be handled through adaptive offloading [34]."]} +{"2949800|2623404": ["The concept of SDN [15], [12] has emerged as a popular tool for the management of network services through abstraction of low-level functionality on a large cluster of network devices."]} +{"155100897|52895823": ["\u2022 Decentralized Management: The available computing resources must be distributed towards the edge of the network closer to end devices and users [29]."]} +{"155100897|206578486": ["In fact, setting up a proper Fog-based architecture to support millions of devices and their high demand heterogeneous applications without dismissing the importance of network latency, bandwidth usage and geographic coverage is still a challenge to be addressed in Fog Computing [8]."]} +{"155100897|12675271": []} +{"155100897|24110634": ["Services can be provisioned in a highly congested location, or even further from sensors, which would result in a higher communication latency since current sensors and gateways are lacking in terms of processing power, storage capacity and memory [26]."]} +{"13342374|17474643": []} diff --git a/edge/graph_201095671.jsonl b/edge/graph_201095671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ce2ad14e19a8047d85af2c2218d36e8a3168310 --- /dev/null +++ b/edge/graph_201095671.jsonl @@ -0,0 +1 @@ +{"19582919|469744": []} diff --git a/edge/graph_201099208.jsonl b/edge/graph_201099208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac78c3301a28cc7cb8cd082038fab56e92762080 --- /dev/null +++ b/edge/graph_201099208.jsonl @@ -0,0 +1,15 @@ +{"974688|180217": ["In [4], authors present a comparison of various RFID authentication protocols that make use of hash chain method."]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"24968255|1236072": []} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"15066257|763939": ["We first discuss the widely used simulations and then the important but hard-toconduct real-world experiments."]} +{"27353195|2835258": []} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"13302604|180217": ["Syamsuddin et al. [11] presented a comparison of various RFID authentication protocols based on the use of the hash chain method."]} +{"2416492|2835258": ["Another class of routing protocols uses position-based information for routing decisions [4]."]} +{"2416492|14441987": ["MANET routing protocols, which do not use nodal position data, can be classified as table- or source-driven [3]."]} +{"36400013|10137283": ["Trust can be defined as a subjective belief of a peer about other peers belonging to the same society or geographical zone [9]."]} +{"86588961|3630870": []} +{"20500104|763939": ["Harri, Filali and Bonnet [ 21 ] provide a taxonomy and a detailed summary of existing mobility and network simulator projects."]} +{"10305213|763939": []} diff --git a/edge/graph_201100131.jsonl b/edge/graph_201100131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20110015.jsonl b/edge/graph_20110015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201103592.jsonl b/edge/graph_201103592.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dada23540ceced2f163f4c31679df8a4bbde34fa --- /dev/null +++ b/edge/graph_201103592.jsonl @@ -0,0 +1,3 @@ +{"15327293|6327434": ["The practical and theoretical interest in this eld are re ected in a large number of surveys, for instance [2], [3], [4], [6], [10], [11], [14]."]} +{"37444393|6327434": []} +{"37444393|2796899": []} diff --git a/edge/graph_201103910.jsonl b/edge/graph_201103910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a9be57779e27283d7c88ce66a6da9ed3d6f1b95 --- /dev/null +++ b/edge/graph_201103910.jsonl @@ -0,0 +1,19 @@ +{"1670455|10087812": ["More recently, transfer learning methodologies have been developed for RL settings (Taylor and Stone 2009; Lazaric 2012).", "To address such situations, transfer learning (TL) methods reuse knowledge learned in a source task so that an agent can learn a difficult target task faster or converge to a better policy (Taylor and Stone 2009; Lazaric 2012)."]} +{"93000083|1932843": []} +{"84186023|14478191": ["Typically MORL approaches either train a single policy by finding the right balance of rewards, or learn a set of policies that approximate the Pareto optimal frontier [26, 38]."]} +{"4940775|3342225": ["Understanding black-box DNNs is an attempt to explain trained layers that perform well but lack interpretability [2, 12].", "Interpretability is de\ufb01ned as the ability to explain or provide meaning in human-understandable [1, 2]."]} +{"4940775|4110304": ["Interpretability is a hot topic in the deep learning field [16], and research has focused on two main approaches: finding ways to understand a black-box DNNs and learning disentangled representation."]} +{"5980504|1932843": ["Many robotic tasks have been successfully solved us-ing reinforcement learning, from ball-in-a-cup to inverted helicopter \ufb02ight [16]."]} +{"5980504|393948": ["Following others in the field of representation learning (Bengio et al. 2013), we use the word prior more broadly in an analogous fashion."]} +{"59291974|3638188": ["State representation learning (SRL) (Lesort et al., 2018) aims at learning those states as a compact representation from raw observations and without explicit supervision.", "We can define it more precisely as a particular kind of representation learning where the learned features are in low dimension, evolve through time, and are influenced by the actions of an agent (Lesort et al., 2018).", "We refer to (Lesort et al., 2018) for a complete review of SRL for control.", "We can de\ufb01ne it more precisely as a particular kind of representation learning where the learned features are in low dimension, evolve through time, and are in\ufb02uenced by the actions of an agent (Lesort et al., 2018)."]} +{"6060380|1708582": ["A standard RL algorithm [114, 33, 109] was fed with curiosity reward signals proportional to the expected long-term predictor changes, and thus tried to maximize information gain [16, 31, 38, 51, 14] within the given limitations.", "Traditional RL algorithms [33], however, do not provide any theoretical guarantee of optimality for such situations.", "The initial software S of such a G\u00a8odel machine contains an initial problem solver, e.g., some typically sub-optimal method [33]."]} +{"6060380|1400872": ["More complex p such as adaptive recurrent neural networks (RNN) [115, 120, 55, 62, 47, 26, 93, 77, 78] will use a nonlinear mapping and possibly the entire history h ( \u2264 t ) as a basis for the predictions.", "Early work [57, 58, 61] described a predictor based on a recurrent neural network [115, 120, 55, 62, 47, 78] (in principle a rather powerful computational device, even by today\u2019s machine learning standards), predicting sensory inputs including reward signals from the entire history of previous\u2026"]} +{"7449640|1708582": ["[16] for a discussion of the different mathematical formalisms of RL problems."]} +{"15083630|9316331": ["Also, Monte-Carlo tree search [44] methods have recently seen a lot of development, and have proven useful to focus exploration on those branches of the tree that contribute to the agent\u2019s desired utility function.", "Recent advances in Monte-Carlo-based tree-search [44] have demonstrated the power of approaches that only sample a subset of the available action sequences."]} +{"15083630|1708582": []} +{"15176564|1932843": ["Similar hand-coded feature extraction pipelines underpin most successful applications of RL to robotics (we refer the interested reader to [21] for a recent review)."]} +{"15176564|1708582": ["Formally this minimizes the squared Bellman error [2, 19, 51], of function ~ Qh with parameters h, for all training samples fz; a; rgnt1\u204441:"]} +{"477376|1708582": ["At any given time, such an agent uses a reinforcement learning (RL) method (Kaelbling et al., 1996) to maximize not only expected future external reward for achieving certain goals, but also intrinsic reward for improving an internal model of the environmental responses to its actions, learning to better predict or compress1", ", 1995) used traditional RL methods (Kaelbling et al., 1996) with theoretically unlimited look-ahead.", "Example: general decision-making tasks in dynamic environments In the more general context of general problem solving/sequential decision making/reinforcement learning/reward optimization (Newell and Simon, 1963; Kaelbling et al., 1996; Sutton and Barto, 1998) in unknown environments, there may be a set I \u2282B of possible task identification patterns and a set J \u2282B of programs that test properties of bitstrings."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} diff --git a/edge/graph_201114230.jsonl b/edge/graph_201114230.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4470bae792fc719c4aed9bec39362c5ee1ab800c --- /dev/null +++ b/edge/graph_201114230.jsonl @@ -0,0 +1,7 @@ +{"49187213|2088679": []} +{"2678735|393948": ["A recent overview of feature learning with deep models is given in [35] and [36]."]} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"247457|393948": []} +{"3891625|2088679": ["However, even after assessing recent review papers [14-15], we found no papers discussing the applications of CNNs to histopathological images of lung cancer.", "Most recently, deep learning (DL) algorithms, especially convolutional neural networks (CNN), have been successfully applied to digital pathology image analysis [14-15]."]} +{"4705764|41104189": []} diff --git a/edge/graph_201116887.jsonl b/edge/graph_201116887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47aceab920840bb4bd83629090a0de617de32b30 --- /dev/null +++ b/edge/graph_201116887.jsonl @@ -0,0 +1,2 @@ +{"29169267|201116887": []} +{"51707755|16742625": []} diff --git a/edge/graph_201124775.jsonl b/edge/graph_201124775.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f6d7626ba34faeabef0b2c704d4114099fbe558 --- /dev/null +++ b/edge/graph_201124775.jsonl @@ -0,0 +1,22 @@ +{"3344169|12260867": ["Online clustering algorithms are surveyed among other places in [165, 131, 7, 207].", "Several surveys for online machine learning in general [91, 29, 206, 83, 92] and sub\ufb01elds [228, 220, 57, 165, 193, 131, 243, 7, 207, 99] have appeared recently."]} +{"3344169|13726263": ["ement 3: Online learning from big data has to be implemented in a distributed stream processing architecture. Several surveys for online machine learning in general [91, 29, 206, 83, 92] and sub\ufb01elds [228, 220, 57, 165, 193, 131, 243, 7, 207, 99] have appeared recently. Our survey is different, \ufb01rst of all, in that we focus on three aspects: the data stream computational model, the adaptive methods for handling concept drift, and the distribu", "subsets of items that occur together in transactions with at least a prescribed frequency. Several variants of the task are described in [8]. Online frequent itemset mining algorithms are surveyed in [57]. Algorithms based on counts of all past data in the stream [48, 101, 155, 234, 152] are also called landmark window based approaches. In some of these algorithms, time adaptivity is achieved by placi"]} +{"52302425|16196181": []} +{"13965326|16196181": []} +{"13965326|16362395": []} +{"13965326|1895753": []} +{"13965326|18960196": []} +{"1161030|11632848": []} +{"1161030|1097238": ["Works addressing ensembles for batchlearning environments are also abundant [Kuncheva 2004b; Brown et al. 2005; Polikar 2006; Sewell 2008; Rokach 2009, 2010; Zhou 2012; Wo\u017aniak et al. 2014]; however, conclusions in these works are made assuming that learning is performed on static datasets.", "As a consequence, many taxonomies and classifications [Brown et al. 2005; Kuncheva 2004b; Rokach 2009] have been proposed to organize research around ensemble learning in a batch-learning context.", "As a consequence, many taxonomies and classi\ufb01cations [Brown et al. 2005; Kuncheva 2004b; Rokach 2009] have been proposed to organize research around ensemble learning in a batch learning context.", "Works addressing ensembles for batch learning environments are also abundant [Kuncheva 2004b; Brown et al. 2005; Polikar 2006; Sewell 2008; Rokach 2009; 2010; Zhou 2012; Wo\u00b4zniak et al. 2014], however conclusions in these works are made assuming that learning is performed on static datasets."]} +{"1161030|206540691": []} +{"1161030|192934": ["In [Jain et al. 2000], authors organize ensemble methods, for batch learning, into three different architectures: parallel, cascading and hierarchical.", "Our taxonomy for ensemble architecture differs from that presented in [Jain et al. 2000], as we split parallel into two different architectures, combine cascading and hierarchical into one and include a new architecture."]} +{"30444761|13093354": ["Most of these are surveys describing available methods and some domains of applications [13, 14]."]} +{"3575838|16196181": ["Future trends Continuous efforts are also being made in the direction of Evolving intelligent systems (EIS) in order to address the challenges in data stream mining (Angelov et al. 2010; Sayed Mouchaweh and Lughofer 2012; Schliebs and Kasabov 2013)."]} +{"70248899|16196181": []} +{"902407|5556391": ["[Tsymbal, 2004, Hoens et al., 2012, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Brzezin\u0301ski, 2010].", "To this end there has been much work on identifying types of concept drift [Widmer and Kubat, 1996, Gama and Rodrigues, 2009, Zliobaite, 2010, Hoens et al., 2012, Moreno-Torres et al., 2012, Gama et al., 2014].", "The concept of abrupt drift [Tsymbal, 2004, Hoens et al., 2012, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Brzezin\u0301ski, 2010, Brzezinski and Stefanowski, 2014a] illustrates this implicit assumption.", "As the name implies, Cyclical Drift is a form of recurring drift that occurs when two or more concepts recur in a specific order [Tsymbal, 2004, Hoens et al., 2012].", "\u2026of terms and descriptions relating to the manner in which a transition between two concepts unfolds [Brzezinski and Stefanowski, 2014a, Tsymbal, 2004, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Hoens et al., 2012, Brzezin\u0301ski, 2010].", "Abrupt drift, or sudden drift occurs when a stream with concept a suddenly changes to concept a+1 [Tsymbal, 2004, Hoens et al., 2012, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Brzezin\u0301ski, 2010, Brzezinski and Stefanowski, 2014a].", "\u2026drift [Minku et al., 2010] occurs when there are two alternating concepts such that one initially predominates and over time the other comes to predominate [Tsymbal, 2004, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Hoens et al., 2012].", "Class drift, often called real concept drift or prior probability shift, occurs when the posterior class probabilities P (Y | X) change over time [Tsymbal, 2004, Hoens et al., 2012, Moreno-Torres et al., 2012, Gama et al., 2014].", "Covariate drift, or virtual concept drift as it is commonly called in the literature, occurs when the distribution of non-class attributes, P (X), changes over time [Tsymbal, 2004, Cieslak and Chawla, 2009, Hoens et al., 2012, MorenoTorres et al., 2012, Gama et al., 2014].", "There are a number of ways in which concepts can recur in a stream [Minku et al., 2010, Bose et al., 2011, Dongre and Malik, 2014, Brzezin\u0301ski, 2010, Zliobaite, 2010, Hoens et al., 2012, Gomes et al., 2011]."]} +{"207149329|16196181": []} +{"207149329|206540691": []} +{"207149329|3918777": []} +{"49567933|10098507": ["Meanwhile, a growing number of dynamic simulators has been developed to assist robotic research (Ivaldi et al., 2014), such as Gazebo (Koenig and Howard, 2004), ODE (Wikipedia, 2017c), and V-Rep (Rohmer et al."]} +{"49567933|1895753": ["Although adequate tools exist to simulate either spiking neural networks (Brette et al., 2007; Bekolay et al., 2014), or robots and their environments (Staranowicz and Mariottini, 2011; Harris and Conrad, 2011), tools that o\ufb00er researchers joint interaction, including a realistic brain model,\u2026"]} +{"18143079|18960196": ["carried out in the brain [3-8], and also to understand brain function and dysfunction (neurodegenerative diseases)."]} +{"4632089|5556391": ["It has been well studied in offline learning [22], and has attracted growing attention in data stream learning in recent years [7].", "virtual concept drift [7], which does not change the decision (class) boundaries.", "[7] gave the first overview on the combined issue, but only some chunkbased learning techniques were introduced."]} diff --git a/edge/graph_201124793.jsonl b/edge/graph_201124793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201125161.jsonl b/edge/graph_201125161.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..498c1f8786437d0e5cc9ac5104081aa62cf098df --- /dev/null +++ b/edge/graph_201125161.jsonl @@ -0,0 +1,27 @@ +{"206592484|456491": []} +{"1033682|174797842": []} +{"16784027|16525678": ["A review of general surveillance systems is provided in [79] and [139], with a particular focus on distributed surveillance systems."]} +{"20813768|12724190": []} +{"12688539|5943294": ["\u2026signals, spontaneous visual behavior is more convenient and unobtrusive to measure, although it is susceptible to environmental noise, such as lighting conditions, occlusion, etc. Recently, Soleymani and Pantic [5] have reviewed human-centered implicit tagging on images, videos, and search results.", "Unlike their survey, which lists all work together [5], we categorize current research into three groups based on adopted modalities: physiological signals, spontaneous visual behavior, and both.", "Previous reviews of this topic include the recent work by Soleymani and Pantic [5]."]} +{"12688539|6857179": ["Since emotions are complex and subjective, a small number of discrete categories may not re\ufb02ect the subtlety and complexity of the affective states [37]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"753606|14866098": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"753606|16362395": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"247457|393948": []} +{"11143989|206764452": []} +{"207079297|16770050": []} +{"207079297|14970359": []} +{"207079297|7185733": []} +{"7183410|393948": ["Deep learning architectures extract high-level features progressively via several layers of feature representations [37]."]} +{"13851160|17279511": ["However, due to the limited energy resources and computational capabilities of WSN nodes, access control techniques used for traditional wired and/or wireless network security do not apply [61]."]} +{"13851160|6275330": ["[23] provide a survey of WSN applications including a section on military applications where the areas of interest are not limited to information collection only, but also include enemy tracking, battlefield surveillance and target classification via networks consisting of sensor nodes equipped with seismic and acoustic sensing capabilities.", "WSNs compensate for their small size (and accordingly limited power) by being deployed in large numbers (typically hundreds or thousands [23]) over a relatively small area (up to a few city blocks)."]} diff --git a/edge/graph_201125179.jsonl b/edge/graph_201125179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54185c180c565529f3a8e9906716b836dd02e3d8 --- /dev/null +++ b/edge/graph_201125179.jsonl @@ -0,0 +1,6 @@ +{"12226157|2373140": ["A comprehensive survey on DVRPs is available in [44]."]} +{"12226157|4474193": ["Dynamic optimization problems (DOPs) are challenging since the aim of an algorithm is not only to find the optimum of the problem quickly, but to efficiently track the moving optimum when changes occur [29].", "Therefore, the overall offline performance [29] is defined as follows:", "In contrast, once ACO algorithms are enhanced properly, they are able to adapt to dynamic changes since they are inspired from nature, which is a continuously changing process [2, 3, 29]."]} +{"60906206|63137": ["There is a strong similarity between ACO and EDAs [ZLO 04].", "EDA and ACO are model-based approaches which use probabilistic models to generate combinations [ZLO 04]."]} +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"604918|4474193": ["Therefore, the overall offline performance [27] is defined as follows:", "Such methods are suitable to speed up the reoptimization process when the changes are small to medium [6], [27]."]} +{"25108891|28457848": ["to solve various problems [28]\u2013[35], most of them focus on single optimization, rather than multimodal optimization."]} diff --git a/edge/graph_201125989.jsonl b/edge/graph_201125989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d12a6cd693983abf0095940ad3f5e532bcd551d5 --- /dev/null +++ b/edge/graph_201125989.jsonl @@ -0,0 +1,8 @@ +{"5708169|15022665": ["Gandomani et al. (2013) conducted a systematic literature review on the relationship between agile methods and open source software development.", "\u2026issues (Hasnain, 2010) in agile methods and ways to resolve them (Silva da Silva, Martin, Maurer, & Silveira, 2011); agile methods in GSD (Hossain, Babar, & Paik, 2009; Jalali & Wohlin, 2011; Rizvi, 2013), and in open source software development (Gandomani, Zulzalil, Ghani, & Sultan, 2013)."]} +{"5708169|6520684": ["Barlow et al. (2011) examined the effect of the usage of agile development practices in large organisations."]} +{"5708169|11139156": ["Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007. The review revealed that agile RE practices had only been discussed in the literature from the overall perspective of agile methods and not in the context of any particular methods such as Scrum, test-driven development, etc. Hasnain\u2019s findings suggest that more empirical results are required on agile methods, in particular XP (Extreme Programming) (Beck, 1999) and Scrum (Schwaber & Beedle, 2001), in order to discuss the details from the practitioner\u2019s point of view. Silva da Silva et al. (2011) conducted a systematic literature review on the topic of the integration of agile methods and usercentred design approaches. The review focused on usability issues in agile methods with respect to design. The findings show that usability issues in agile methods can be addressed by incorporating a user centred design specialist (UCDS) role in agile teams. The authors also defined practices to resolve usability issues in agile methods such as Little Design Up Front, Big Design Up Front, low fidelity prototypes, user testing, interaction models, and close collaboration. Barlow et al. (2011) examined the effect of the usage of agile development practices in large organisations.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007. The review revealed that agile RE practices had only been discussed in the literature from the overall perspective of agile methods and not in the context of any particular methods such as Scrum, test-driven development, etc. Hasnain\u2019s findings suggest that more empirical results are required on agile methods, in particular XP (Extreme Programming) (Beck, 1999) and Scrum (Schwaber & Beedle, 2001), in order to discuss the details from the practitioner\u2019s point of view. Silva da Silva et al. (2011) conducted a systematic literature review on the topic of the integration of agile methods and usercentred design approaches.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007. The review revealed that agile RE practices had only been discussed in the literature from the overall perspective of agile methods and not in the context of any particular methods such as Scrum, test-driven development, etc. Hasnain\u2019s findings suggest that more empirical results are required on agile methods, in particular XP (Extreme Programming) (Beck, 1999) and Scrum (Schwaber & Beedle, 2001), in order to discuss the details from the practitioner\u2019s point of view. Silva da Silva et al. (2011) conducted a systematic literature review on the topic of the integration of agile methods and usercentred design approaches. The review focused on usability issues in agile methods with respect to design. The findings show that usability issues in agile methods can be addressed by incorporating a user centred design specialist (UCDS) role in agile teams. The authors also defined practices to resolve usability issues in agile methods such as Little Design Up Front, Big Design Up Front, low fidelity prototypes, user testing, interaction models, and close collaboration. Barlow et al. (2011) examined the effect of the usage of agile development practices in large organisations. The literature review contributed towards the formulation of a framework that provides guidelines to large organisations adopting agile methods. The findings of this review assist the practitioners to adopt software development methods in their organisations. Jalali and Wohlin (2011) conducted a systematic literature review on studies comprising the combination of agile methods with global software engineering from 1999 to 2009."]} +{"16543136|27533715": ["The ICC is a commonly-used statistic for assessing IRR for ordinal data [21] such as ours."]} +{"4769721|14792235": ["Regarding this, we identify two major causes:"]} +{"4769721|2623404": []} +{"4769721|1222880": ["Regarding this, we identify two major causes:"]} +{"4769721|13210924": ["Regarding this, we identify two major causes:", "In this section, we present our SIT approach for testing self-adaptive apps suffering uncertainty."]} diff --git a/edge/graph_201126867.jsonl b/edge/graph_201126867.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a492e47273544495093bb43cf6b1205fc25b4f85 --- /dev/null +++ b/edge/graph_201126867.jsonl @@ -0,0 +1 @@ +{"52290128|192934": []} diff --git a/edge/graph_201127793.jsonl b/edge/graph_201127793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2500292df1bff139ba6f38fcd047065bc6331345 --- /dev/null +++ b/edge/graph_201127793.jsonl @@ -0,0 +1,18 @@ +{"53432806|18078738": ["model [32], [33] and consists of a residual generator based on unscented Kalman filter (UKF), a residual evaluator based on generalized likelihood ratio (GLR), and a decision maker based on Bayesian network (BN)."]} +{"1249882|207231270": []} +{"27272365|5660618": ["In this control systems work, network delays affect system stability and considerable work focussed on determining system stability bounds as a function of injected delay [5], sometimes using results from switched-systems theory as in [6].", "Most work in CPS control systems, such as the networked control systems work surveyed in [5], focuses on the plant model of Fig."]} +{"37351338|1680300": ["Regarding the latter, it is possible to cite signal power, carrier frequency, phase offset, and timing information [7].", "AMC algorithms can be divide into two general groups: likelihood-based (LB) and feature-based (FB) methods [7].", "Although the LB approach provides optimal performance, it is difficult to obtain an exact analytical solution for the decision function, when the number of unknown parameters increases [7].", "The SVM technique has been widely used in several knowledge fields, in order to solve classification problems [17], [7]."]} +{"7844555|10606961": ["Algorithmic debugging (also called declarative debugging), \ufb01rst discussed in Shapiro\u2019s dissertation [325] with more details in [328], [402], decomposes a complex computation into a series of sub-computations to help locate program bugs."]} +{"14263248|8921624": ["[11] introduced BMC to capitalize on the capacity of modern SAT/SMT solvers; see [10,21] for a survey on BMC."]} +{"9140332|8589228": []} +{"17261699|6923178": ["[2])"]} +{"9285784|5660618": [", p is set to zero (see [13] for a comparison between the two strategies)."]} +{"35447861|6779551": ["Some prevention strategies for jamming include frequency hopping, direct-sequence spread spectrum technique, channel surfing, and protocol hopping [14]."]} +{"15642684|641916": ["The problem of \u201cevent detection\u201d in numerical simulation is well-known (see a survey in [Mos99]) and can be resolved using variable step adaptive methods for numerical integration."]} +{"15642684|17718674": ["More on various dialects of real-time logic can be found in [ AH92 ,Hen98]."]} +{"3154557|2840997": ["Due to many recent advances in SAT solvers [22], [23], verification techniques based on SAT have become very popular (see a recent survey [24] for useful pointers)."]} +{"62632852|2840997": [", [2]), or an autom ated theorem prover based on the Nelson-Oppen framework [3], all make use of various heuristics that have a crucial impact on their performance."]} +{"52955117|1568096": []} +{"117661555|26494868": []} +{"15704619|17718674": ["Systems with clocks [6, 2, 3 , 9, 8, 15], where ~i = 1, are special cases of the hybrid systems we consider."]} +{"15704619|8397295": []} diff --git a/edge/graph_201129527.jsonl b/edge/graph_201129527.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d0c72538f2c437c3e0c5e6878f5a59b4f523582 --- /dev/null +++ b/edge/graph_201129527.jsonl @@ -0,0 +1,9 @@ +{"5692579|18050848": ["Examples of a few physical biometric authentication schemes are like face based authentication [5], fingerprint based authentication [5, 13], iris based authentication [10], audio based authentication [4, 15], gait based authentication [9]."]} +{"14470927|5313655": ["To address these limitations, researchers have been investigating various ways to leverage personal biometric features such as fingerprints, facial features, typing dynamics, and gait to authenticate users [3]."]} +{"14470927|9913343": ["While graphical passwords are easy to use and remember, they are vulnerable to shoulder surfing and observation attacks [1], [2].", "Among various approaches, textual password based schemes are currently the most widely used techniques for authenticating users."]} +{"14838210|5612073": ["Web browsing behavior has been studied for the purpose of understanding user behavior, habits, and interests [18]."]} +{"125844568|34263386": ["It is cheaper than hardware-based ones and is easy to update for future adaption [3], [9], [10]."]} +{"11180901|7191751": ["Many applications involve processing potentially sensitive data on the smartphone, examples include social networking [1], health monitoring [2] and banking [3]."]} +{"9782125|15219853": [", [32]."]} +{"22843207|17574321": ["We used GMM (Gaussian Mixtures Model) as a classifier as it has been shown to perform better than DTW (Dynamic Time Warping) or supervised learning methods such as SVM for speech recognition classification tasks [33, 51]."]} +{"7634715|9913343": ["However, while generally easy and quick to use, graphical passwords can be insecure as they are vulnerable to shoulder-surfing attacks and have small search spaces [19].", "Graphical passwords [19], such as Android\u2019s 9-dot password, is one alternative form of authentication that has been gaining popularity."]} diff --git a/edge/graph_201131126.jsonl b/edge/graph_201131126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28f3d60071ecf0347c5078f4b2b4e7dbaf9a0201 --- /dev/null +++ b/edge/graph_201131126.jsonl @@ -0,0 +1,27 @@ +{"16491249|29145577": ["In particular, a comprehensive survey on classification methods for encrypted traffic is presented in [7]."]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"49333709|3645740": ["Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different."]} +{"49333709|13172512": ["For instance, Nguyen and Armitage [339], though impactful, is now dated and only addresses traffic classification in networking.", "Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different."]} +{"49333709|17464562": ["Depending on the nature of the action set, the learning automata is classified as Finite Action-set Learning Automata (FALA) or Continuous Action-set Learning Automata (CALA) [330]."]} +{"14042725|10693567": ["Being one particular technology for Software-Defined Networking (SDN), it separates the control plane and data plane of networking devices [22]."]} +{"14042725|13456854": ["Since IPFIX is still in its early days and NetFlow deployment is far more mature [3], most literature on flow data artifacts is about NetFlow (especially v9).", "For example, a recent survey among both commercial and research network operators has shown that 70% of the participants have devices that support flow export [3]."]} +{"14042725|8364569": ["The central observation points at which flow export devices are usually deployed make flow export especially useful for the detection of the following attacks and malwares [84]: DDoS attacks, network scans, worm spreading, and botnet communication.", "survey on flow-based intrusion detection provided in [84]."]} +{"18434328|12815020": []} +{"45081771|6430931": []} +{"15961513|8364569": ["Each of them was already used for intrusion detection individually and proved efficient [6], [7], [8], [9], [10].", "Flow records are valuable data to detect intrusions [8] or to highlight botnet communications [9] for instance."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"3523999|13172512": ["In general, Decision Tree and Support Vector Machine perform better than other approaches [18].", "Machine learning approaches have been applied on classifying applications, security awareness and anomaly detection [15, 18]."]} +{"206485523|10150488": ["Please refer to [276] and [277] for more details on this topic."]} +{"206485523|16403716": ["Multimedia indexing and retrieval concerns the description, storage, and organization of multimedia information to help people find multimedia resources conveniently and quickly [218]."]} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"35996556|13172512": ["We refer the interested reader to [10] for a detailed survey on the different ML techniques applied to automatic traffic classification.", "An exception to this is the usage of Random Forests (RF) [10], which actually represent an ensemble learning approach, by combining the output of multiple decision trees through plain majority voting.", "In particular, we select the following five standard, fully-supervised models [10]: (i) SVM with linear kernel, (ii) decision trees (CART); K -NN with direct majority voting, using K = 10 , (iv) multi layer perceptron neural network, and (v) naive Bayes."]} +{"3147582|63927538": ["The 4 A's serve to highlight these measures [20].", "1 Architecture layers of big data analytics [20]"]} +{"61154330|8364569": []} +{"61154330|13172512": []} +{"16494521|191396": ["Despite a vast number of surveys for clustering algorithms available in the literature [1], [2], [7], and [38] for various domains (such as machine learning, data mining, information retrieval, pattern recognition, bio-informatics and semantic ontology), it is difficult for users to decide a priori\u2026"]} diff --git a/edge/graph_201133180.jsonl b/edge/graph_201133180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3830b54d973cfd2f6353015007e9e3bae1c6128e --- /dev/null +++ b/edge/graph_201133180.jsonl @@ -0,0 +1,4 @@ +{"12572872|11266709": ["Nevertheless, head tracking is important as it is seen as a component of immersion [Bowman and McMahan 2007; Narayan et al. 2005] and as enhancing presence [Hendrix and Bar\ufb01eld 1995; Schuemie et al. 2001].", "Because despite a great amount of research there is still much unknown about presence [e.g., Cummings et al. 2012; Schuemie et al. 2001]."]} +{"17953479|12572872": []} +{"17953479|17670369": []} +{"55118573|4361938": ["Neuroscience, psychology, industrial engineering and human factors, marketing/advertising and computer science are some of the largest application fields (Duchowski, 2002).", "According to Duchowski (2002) eye tracking applications can have either a diagnostic or an interactive role."]} diff --git a/edge/graph_201136046.jsonl b/edge/graph_201136046.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac4e44bc1211376a92df375981cc38f6aaa996f3 --- /dev/null +++ b/edge/graph_201136046.jsonl @@ -0,0 +1 @@ +{"16050453|35897447": ["\u2026(Ward and Peppard, 2002), internal contractual arrangements (Feeny and Willcocks, 1998), IT balanced scorecards (Teubner, 2007), importance-performance portfolios (Ward and Peppard, 2002), information engineering (Lederer and Sethi, 1988), and post-implementation reviews (Piccoli and Ives, 2005).", "The analysis determines (1) which benefits have not been achieved (Piccoli and Ives, 2005) and (2) specifies how missed benefits can still be achieved through additional investments.", "This shift enabled the consideration of firms\u2019 individual circumstances and resulted in a range of studies showing positive relationship between firm performance and IS (Melville et al., 2004; Piccoli and Ives, 2005)."]} diff --git a/edge/graph_201136378.jsonl b/edge/graph_201136378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20d176966faf2237828ba1c4e142e63aea0488e7 --- /dev/null +++ b/edge/graph_201136378.jsonl @@ -0,0 +1,5 @@ +{"18305761|10091442": ["features or quality attributes [30], since they may crosscut several components of the PLA."]} +{"18305761|8296351": []} +{"44153760|2018668": []} +{"2039932|8296351": ["The product line P can be represented as a FM_T [4][9], consisting of a set of features: 4 _5 = {6 , 6 , .", "Feature model plays a key role for variability management in the context of product line [9].", "Feature modeling is a hierarchical modeling approach for capturing commonalities and variabilities in product line [9][10]."]} +{"22514432|417250": ["implemented by four main processes [20]\u2013[22]."]} diff --git a/edge/graph_201139709.jsonl b/edge/graph_201139709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a10bab7c62130581b28c1b1a3284bff34f3e1930 --- /dev/null +++ b/edge/graph_201139709.jsonl @@ -0,0 +1,3 @@ +{"1033682|174797842": []} +{"53215001|197545095": ["This can also explain the relative unsuccess of learning-based techniques in this field [52].", "A recent thorough review [52] found that our method outperforms deep-learning methods and therefore we excluded comparison to them."]} +{"4394720|36698883": []} diff --git a/edge/graph_201144085.jsonl b/edge/graph_201144085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201145624.jsonl b/edge/graph_201145624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f600b40ecde5854fb47846d87508d520482270e --- /dev/null +++ b/edge/graph_201145624.jsonl @@ -0,0 +1,8 @@ +{"192464714|57898931": []} +{"132333179|70042561": ["Utilizing representative, objective, diverse and accurate data allows us to better understand users and design meaningful experiences for them (Giannakos et al., 2018).", "The evidence for understanding and supporting users \u2019 learning experience is still very limited, considering the wide range of multimodal data produced when the learner interacts with a system (Giannakos et al., 2018).", "For example, a recent literature review (Mangaroska and Giannakos, 2018) explains how only a few studies go beyond click-streams/keystrokes to inform learning design features, while another literature review on prediction in online courses found that only features related with user\u2026", "Interaction between learners and technologies is complex and o \ufb00 ers an opportunity for collecting rich and multimodal data (Giannakos et al., 2018).", "Today, we do not make full use of potential analytics, since we only utilize part of the available user-data (e.g., click-streams, surveys, preferences) in learning technology (based on a recent literature review in learning analytics for learning design (Mangaroska and Giannakos, 2018)).", "Fixations, Num Saccades, \ufb01 xation to saccade ratio limited, considering the wide range of multimodal data produced when a learner interacts with a system (Giannakos et al., 2018).", "In recent years, action-based analytics have been found to be very promising in portraying the user experience during learning (Mangaroska and Giannakos, 2018; Blikstein and Worsley, 2016; Pardo et al., 2017; Rana and Dwivedi, 2016)."]} +{"132333179|26071662": ["The seamless integration and combination of different apparatuses, as well as the harmonization and sense-making of multimodal data-streams to support the learning experience, is an extremely challenging process (Lahat et al., 2015)."]} +{"85529608|7530272": ["Server logs can be used to provide information about sequences of interactions with the web-page, and since sequences can be clustered in terms of their similarity (Xing et al., 2010), it follows that server logs can be used to cluster sequences of student actions."]} +{"13506660|23219032": ["Khalil and Ebner (2016b) classi\ufb01ed four categories of students based on their activity of attending quizzes, watching videos and engagement in discussion forums.", "It is a tool that provides researchers and administrators with \ufb01ltered tracked data (Khalil and Ebner 2016b).", "This publication is an extended version of Khalil, Kastl and Ebner work (see Khalil et al. 2016).", "A recent survey study by Khalil and Ebner (2016a) found that the ultimate number of citations in the conference proceedings between 2013 and 2015 belongs to this article.", "Various investigations have been performed to identify the reasons behind the low completion rates (Khalil and Ebner 2014; Lackner et al. 2015; Khalil and Ebner 2016b)."]} +{"52098068|162600": []} +{"52098068|63927538": []} +{"52816298|70042561": ["To do so, contemporary user experience (UX) and learning designs are informed by various user-generated data coming from different sources [2, 3]."]} diff --git a/graph_2011473.jsonl b/edge/graph_2011473.jsonl similarity index 100% rename from graph_2011473.jsonl rename to edge/graph_2011473.jsonl diff --git a/edge/graph_201235761.jsonl b/edge/graph_201235761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fa766a05cba990f7f854eae273f66f2dbf6f3a0 --- /dev/null +++ b/edge/graph_201235761.jsonl @@ -0,0 +1,9 @@ +{"51799178|622308": ["In addition to track inspection data-sets, delay incidents, flooding, CCTV, cost, timetables and users social media data are generated daily (Durazo-Cardenas et al., 2016; Rahman et al., 2015)."]} +{"51799178|15248553": ["\u2026fusion and visual analytics processes examined in our research included a range of estimation and statistical algorithms e.g. fuzzy logic (Dote and Ovaska, 2001) and Kalman filters (Boehringer, 2003), for collecting data, making health and location inferences and to report the information,\u2026"]} +{"10074245|21841235": []} +{"10566597|7158350": ["Neural networks have been revealed as useful tools for many applications, such as extracting data from images (e.g., [18]) and classifications (e.g., [ 19 ])."]} +{"52838965|39341849": []} +{"52838965|14117722": []} +{"25200878|7158350": []} +{"21073279|39341849": []} +{"21073279|14117722": ["In sonic methods, also known as impact-echo tests, hammer blows create impulses, and the time of travel of these sonic pulses is measured with pickups placed on the wall [14][15][16], as can be seen in Figure 3."]} diff --git a/edge/graph_201254269.jsonl b/edge/graph_201254269.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fbb16f03cb5f8ef9880888eefc2eb522f8b88b4 --- /dev/null +++ b/edge/graph_201254269.jsonl @@ -0,0 +1,13 @@ +{"353038|17779575": ["According to our study, this duplication results in up to 25x more data volume for the input feature maps in the CONV layer, and thus diminishes the gains of FPGA acceleration considering that FPGA platforms have extremely limited bandwidth (about 10 to 20 GB/s [26]) compared to CPU/GPU platforms (up to 700GB/s [27])."]} +{"52925676|4668902": ["CNNs contain signi\ufb01cant redundancy and are used for error-tolerant applications [79]."]} +{"52925676|9436861": []} +{"52925676|17779575": []} +{"52925676|165863": ["Conventionally, CNNs have been executed on CPUs and GPUs; however, their low throughput and/or energy ef\ufb01ciency presents a bottleneck in their use.", "To avoid these, such operations can be implemented on CPUs, and thus, only the computationally intensive operations may be implemented on FPGA.", "Generally, FPGAs provide higher energy ef\ufb01ciency than both GPUs and CPUs and higher performance than CPUs [2].", "Given the ease of programming CPUs, this also allows designing more versatile CNN accelerators.", "Generally, FPGAs provide higher energy efficiency than both GPUs and CPUs and higher performance than CPUs [2].", "Relative merits of FPGAs vis-a-vis CPUs/GPUs/ASICs While the software frameworks for developing CNN models for GPUs/CPUs are already mature, those for FPGAs are still in early stages."]} +{"51614444|3908141": ["With the evaluation of the performance model\u2019s accuracy with respect to the real measured performance presented in [13] and [14], the rest of this section focuses on the comparison with (1) highly optimised designs targeting an embedded GPU and (2) state-of-the-art ConvNet designs on FPGAs.", "With FPGAs\u2019 size and resource speci\ufb01cations advancing at a fast pace and with ConvNets becoming more complex, the possible mappings of a ConvNet on an FPGA lie on a large multidimensional design space that cannot be explored manually.", "Efforts have concentrated on hand-tuned mappings of speci\ufb01c ConvNet models and computation engine optimisations on FPGAs [20][21][22][23] and ASICs [24][25][26][27] and memory subsystem optimisations on FPGAs [28][29] and ASICs [30][31][32].", "Their proposed methodology focuses on high-throughput applications that run on server-based FPGAs.", "Nevertheless, several issues increase the complexity of ConvNet system development on FPGAs [12].", "FPGAs offer the bene\ufb01ts of customisability and recon\ufb01gurability by means of a set of heterogeneous resources, including look-up tables (LUTs), \ufb02ip-\ufb02ops (FFs), block RAMs (BRAMs) and digital signal processing blocks (DSPs), with programmable connections between them.", "Because of their versatility, big industrial companies, such as Microsoft and Amazon, have redesigned their data centre facilities in order to host FPGAs on their servers and target a variety of workloads with specialised hardware [11].", "In practice, the exploitation of the inherent parallelism of the ConvNet can be limited by the target FPGA\u2019s computational resources, namely the amount of LUTs and DSPs.", "Furthermore, power measurements for the GPU and FPGAs are obtained via a power monitor on the corresponding board.", "In this context, recon\ufb01gurable hardware in the form of Field-Programmable Gate Arrays (FPGAs) constitutes a promising alternative.", "Nevertheless, several issues increase the complexity of Con-vNet system development on FPGAs [12].", "Quantitative evaluation demonstrates that fpgaConvNet matches and in several cases outperforms the performance density of existing state-of-the-art FPGA designs, delivers higher performance-per-Watt than highly optimised embedded GPU designs, and therefore provides the infrastructure for bridging the gap between deep learning experts and FPGAs.", "Finally, [12] provides a detailed survey of ConvNet-to-FPGA toolflows.", "Our proposed alternative to this problem exploits the recon-\ufb01gurability capabilities of FPGAs and introduces the partitioning of the ConvNet along its depth.", "C ONCLUSION This paper presents fpgaConvNet, a framework for the automated mapping of ConvNets on FPGAs.", "To this end, there is a need for tools that abstract the low-level resource details of a particular FPGA and automate the mapping of ConvNets on FPGAs in a principled manner.", "The proposed end-to-end framework aims to bridge the gap between ConvNet models described in existing deep learning software and their optimised deployment on FPGAs.", "To this end, we also target this set of models and address the optimised mapping of their irregular data\ufb02ow on FPGAs."]} +{"57373837|10694510": ["The field of DL emerged in 2006 after a long pause in the area of neural networks (NNs) research [4]."]} +{"57373837|3273340": ["Similar approaches to the DianNao family of techniques are presented in [115] with similar limitations."]} +{"206592484|456491": []} +{"53208763|3680335": ["The learning process is the process of estimating the models parameters such that the model can perform the specified task [4]."]} +{"53208763|9928823": ["Deep learning, a sub-field of machine learning (ML), is more recently being referred to as representation learning in some literature [3]."]} +{"58006703|40910013": []} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} diff --git a/edge/graph_201269007.jsonl b/edge/graph_201269007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7669b61cfb3abe905f8d60ffb95ebdd7c074a6f7 --- /dev/null +++ b/edge/graph_201269007.jsonl @@ -0,0 +1,3 @@ +{"14862572|18454590": ["A variety of different architectures and training algorithms have been proposed in the literature (see the comprehensive survey in [37])."]} +{"28440201|10355303": ["\u2026tracker that can handle various challenging factors: occlusion, illumination change, scale variation, cluttering background, etc. (Yilmaz et al., 2006; Yang et al., 2011; Li et al., 2013; Wu \u2021 Corresponding author * Project supported by the National Natural Science Foundation of China (Nos.", "Visual object tracking has been extensively studied over the past decade (Yilmaz et al., 2006; Yang et al., 2011; Li et al., 2013; Wu et al., 2013; Smeulders et al., 2014)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_201276803.jsonl b/edge/graph_201276803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..644e64410e019a525ffcfa2250ca6418a0afe9fa --- /dev/null +++ b/edge/graph_201276803.jsonl @@ -0,0 +1,10 @@ +{"18086389|16323798": ["In the subsequent years, more data sets have been published, such as BLUED[5], Smart*[6], AMPds[7], UKDALE[8], ECO[9], and GREEND[10].", "The NIALM technique was developed in the 1980s, when George W. Hart and his colleagues proposed disaggregating energy consumption data into its constituents by examining the appliance-specific power consumption characteristics [3]."]} +{"11548616|905827": []} +{"14401519|485843": ["In this context, Information and Communication Technology (ICT) can play a crucial role [4], [5]."]} +{"14401519|16323798": ["On the other hand, information regarding the measured values of reactive power is useful to characterize the nature (resistive, inductive or capacitive) of the appliances.", "In an NILM system, individual appliance power consumption is derived from disaggregating single-point measurements provided, for instance, by a sensor or a smart meter."]} +{"14401519|5747564": ["As stated in [41], a typical Smart Metering Architecture is essentially composed of the following.", "Interesting surveys on communication technologies, solutions, and standardization activities in the context of smart grid and smart metering have been proposed in [7], [9], and [41]."]} +{"5035653|16323798": ["Such probabilistic approaches are usually based on a Hidden Markov Model (HMM) and its variants (see [7], [23], [27]\u2013[29] and references therein).", "For a more detailed review of NILM, see review papers [21], [23].", "power and the sum of the disaggregated loads, deviating from traditional NILM approaches (see [9], [23] and references therein).", "Transient methods require sampling rates in the order of kHz or MHz [23], unlike steady-state methods, which are more sensitive to power level fluctuations and at low sampling rates, require longer monitoring time to capture all operation cycles [24]."]} +{"16337201|16323798": ["Index Terms\u2014Semi-intrusive appliance load monitoring, energy disaggregation, optimization, measurement\n\u00c7"]} +{"5650534|16323798": ["ods are frequently reported: 1) steady state; and 2) transient analysis [13], [14].", "The load detection focuses on the recognition of load cycles and patterns in the aggregated load signature using a wide variety of methods [13] including machine learning [17], expert"]} +{"115511281|16323798": []} +{"206486643|16323798": ["As is common practice [19], [20], the method works on sliding time windows, whose duration can be adjusted.", "As is common practice in NALM [19], [20], [23], each appliance load is estimated using the average appliance power consumption during the identified event time interval, although, some more sophisticated approaches are possible [21]."]} diff --git a/graph_2012787.jsonl b/edge/graph_2012787.jsonl similarity index 100% rename from graph_2012787.jsonl rename to edge/graph_2012787.jsonl diff --git a/edge/graph_201303574.jsonl b/edge/graph_201303574.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f6384bf3c7240d25b503103dc7c2e72c7e9347e --- /dev/null +++ b/edge/graph_201303574.jsonl @@ -0,0 +1,8 @@ +{"11114124|31333609": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"45071453|8424228": []} +{"13688847|49527603": ["In [20], a brief summary of the emerging blockchain-based applications ranging from finance to IoTs is provided."]} +{"13688847|9461213": ["With more and more demands for big-data processing in various fields [226], [227], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secured Multi-Party Computation (MPC)."]} +{"13688847|27262729": [", Sybil attacks [47] and double-spending attacks [21]), node mistakes (e.", "Further, a systematic survey is provided in [21] with respect to the security issues in Bitcoin networks including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", ", fork, in the local views of the blockchain state [3], [21] (see Figure 4)."]} +{"13688847|2457428": ["Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]."]} +{"13688847|3434731": ["In [6], [15], two brief surveys on consensus protocols in blockchain networks are provided.", "backbone of the emerging open-access, distributed Virtual Machines (VMs) [5] for decentralized, token-driven resource management in communication networks and distributed autonomous systems [6], [7]."]} diff --git a/edge/graph_20131485.jsonl b/edge/graph_20131485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ca491f6d24bca17a23013ba2768bab7ae3f9dca --- /dev/null +++ b/edge/graph_20131485.jsonl @@ -0,0 +1,6 @@ +{"9242151|6952653": []} +{"14818826|206583375": ["This set-up provides an unobtrusive localisation and monitoring service that complies with privacy issues [30, 31]."]} +{"15487414|10817088": ["In the future, small devices will monitor the health status in a continuous manner, diagnose any possible health conditions, have conversation with people to persuade them to change the lifestyle for maintaining better health, and communicates with the doctor, if needed [6]."]} +{"15487414|42648222": []} +{"15777002|6952653": ["This paper presents a new MAS specially designed to manage data from WSNs, which was tested in a residential home for the elderly."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} diff --git a/edge/graph_20143699.jsonl b/edge/graph_20143699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42a5009ed9b683205d394a2f601d3179b14e9530 --- /dev/null +++ b/edge/graph_20143699.jsonl @@ -0,0 +1,15 @@ +{"20767602|206764452": []} +{"17626559|206764452": ["Human tracking can be regarded as a specific category of video object tracking, which has been extensively developed and discussed [1], [2]."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"22824183|14970359": ["Additionally, many works have been done by motion model based human recognition and estimating human body postures [21\u201325]."]} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"6795574|5972227": ["Recently, a survey is presented for a wired-sensor network, focusing on the capability of methods to give a simple estimation for the position of the object [23]."]} +{"6795574|18546648": ["For instance, in shadow detection [48] pixel level evaluation is advised [49]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"9022135|1634674": ["The successful interpretations of higher-level human motions greatly rely on the precision of human detection [45][47]."]} +{"9022135|17516538": ["The camera could be fixed, pure translational or mobile in nature [63]."]} +{"6471474|5755403": ["\u2026al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an object is then treated as\u2026"]} +{"6471474|16525678": ["While some existing reviews Valera and Velastin (2004) and Aghajan and Cavallaro (2009) tried to cover all the aspects of 0167-8655/$ -see front matter \u00d3 2012 Elsevier B.V.", "Many intelligent multi-camera video surveillance systems have been developed (Collins et al., 2001; Aghajan and Cavallaro, 2009; Valera and Velastin, 2004)."]} +{"6471474|12127129": ["Background subtraction (Piccardi, 2004) is widely used for detecting moving objects in video surveillance with static cameras."]} +{"6471474|17516538": ["\u2026and Grimson, 2000; Oliver et al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an\u2026"]} diff --git a/graph_2014729.jsonl b/edge/graph_2014729.jsonl similarity index 100% rename from graph_2014729.jsonl rename to edge/graph_2014729.jsonl diff --git a/edge/graph_20160406.jsonl b/edge/graph_20160406.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc40bc25663b1dfe05e269994baed0572d8baeff --- /dev/null +++ b/edge/graph_20160406.jsonl @@ -0,0 +1,5 @@ +{"31103672|3821062": []} +{"945097|7216558": []} +{"13011717|14718434": [", an individual identified uniquely by the primary key) is mapped to a fuzzy OWL individual \u03c6(t) \u2208 FIID0; (2) Each fuzzy relation symbol FR is mapped into a fuzzy class description \u03c6(FR) \u2208 FCID0 (see Definition 3 in detail); (3) Each non-foreign key attribute Ai (\u03bcFR \u2208 Ai) is mapped into a fuzzy datatype property \u03c6(Ai) \u2208 FDPID0; Each foreign key attribute Ai is mapped into a pair of inverse fuzzy object properties \u03c6(Ai) \u2208 FOPID0 and invof \u03c6(Ai) \u2208 FOPID0 (see Definition 3 in detail); (4) Each assertion t: FR: n is mapped into a fuzzy individual axiom Individual (\u03c6(t) type(\u03c6(FR)) [ \u2032 n]), where \u2032 \u2208 {\u2265, \u2264}; (5) Each assertion t : [."]} +{"13011717|16806429": ["19, 21, and 23."]} +{"17274115|1099309": ["In this\nwork we utilize ten types of relations, whose semantics are defined in the MPEG-7 standard [9] and are presented in the following Table 1:\nA last point to consider when designing such a knowledge model is the fact that real-life data often differ from research data."]} diff --git a/edge/graph_201620310.jsonl b/edge/graph_201620310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f19154bc45c6e6c12fc077f80152b8971f80e52e --- /dev/null +++ b/edge/graph_201620310.jsonl @@ -0,0 +1,11 @@ +{"73503740|207330385": ["[35] summarized existing literature in the context of three aspects: sensor modality, deep models, and application."]} +{"73503740|14814753": []} +{"73503740|41505326": []} +{"73503740|393948": ["Feature representation and selection is a classic problem in computer vision and machine learning [8]."]} +{"67866899|9928823": ["Recurrent Neural Networks (RNNs) are considered as a class of deep networks for the use in unsupervised learning in the cases where the depth of the input data sequence can be as large as the length since RNNs allow parameter sharing through the different layers of the network [58], [59].", "RNNs are developed by the use of the same set of weights in a recursive manner over a tree like structure, and the tree is traversed in topological order [58], [59]."]} +{"67866899|2122433": ["past five decades right from the introduction of artificial intelligence [4], [5].", "Therefore, it is only natural that one of the early applications of deep learning was speech, and up to this day a huge number of research papers have been published in the use of deep learning for speech related applications specifically speech recognition [4], [5], [6], [7]."]} +{"58981648|7981750": []} +{"57825759|2829149": []} +{"1585495|27527196": []} +{"1585495|15782139": ["Handwriting Recognition: The techniques for automatic handwriting recognition (HWR) can be classi\ufb01ed as online and of\ufb02ine case [12].", "Of\ufb02ine recognition usually processes images of handwriting only, whereas online recognition can further utilize rich sensor data such as stylus positions and temporal information during the writing process [12, 13]."]} +{"27598269|2532914": ["Recently, human-computer interaction (HCI) has become increasingly more influential in both research and daily life [1]."]} diff --git a/edge/graph_201621459.jsonl b/edge/graph_201621459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5df932dff9ff8d9fe9410add3de5d197f7f01be1 --- /dev/null +++ b/edge/graph_201621459.jsonl @@ -0,0 +1,10 @@ +{"3110415|16665885": ["\u20262004); land cover and land use mapping including vegetation, tree, water, residential, etc. (Baker et al., 2013; Benz et al., 2004; Blaschke, 2003; Blaschke et al., 2011; Blaschke et al., 2008; Contreras et al., 2015; D'Oleire-Oltmanns et al., 2014; De Pinho et al., 2012; Doleire-Oltmanns et al.,\u2026", "(Baker et al., 2013; Benz et al., 2004; Blaschke, 2003; Blaschke et al., 2011; Blaschke et al., 2008; Contreras et al., 2015; D'Oleire-Oltmanns et al., 2014; De Pinho et al., 2012; Doleire-Oltmanns et al., 2013; Dr\u0103gu\u0163 and Blaschke, 2006; Dr\u0103gu\u0163 and Eisank, 2012; Duro et al., 2012; Eisank et al., 2011; Goodin et al., 2015; Hay et al., 2003; Hofmann et al., 2011; Kim et al., 2011; Leon and Woodroffe, 2011; Li et al., 2014; Li and Shao, 2013; Lisita et al., 2013; Macfaden et al., 2012; Mallinis et al., 2008; Mishra and Crews, 2014; Moskal et al., 2011; Myint et al., 2011; Phinn et al., 2012; Tzotsos et al., 2011; Walker and Blaschke, 2008; Walker and Briggs, 2007; Weng, 2009, 2011; Xie et al., 2008; Yu et al., 2006; Zhou, 2013; Zhou et al., 2009; Zhou and Troy, 2008); landslide mapping (Feizizadeh et al.", "\u2026et al., 2011; Martha et al., 2012; Stumpf and Kerle, 2011), land cover and land use mapping (Baker et al., 2013; Benz et al., 2004; Blaschke, 2003; Blaschke et al., 2011; Blaschke et al., 2008; Contreras et al., 2015; D'Oleire-Oltmanns et al., 2014; De Pinho et al., 2012; Doleire-Oltmanns et al.,\u2026"]} +{"3110415|1626075": ["Different from several previously published surveys that focus on a specific object class such as building (Mayer, 1999; Shufelt, 1999) and road (Mayer et al., 2006; Mena, 2003), we concentrate on more generic object categories including, but are not limited to, road, building, tree, vehicle, ship,\u2026", "\u20262012; Benedek et al., 2012; Durieux et al., 2008; Hofmann et al., 2002; Karantzalos and Paragios, 2009; Lef\u00e8vre et al., 2007; Lhomme et al., 2009; Mayer, 1999; Ok, 2013; Ok et al., 2013; Peng and Liu, 2005; Peng et al., 2005; Senaras et al., 2013; Shufelt, 1999; Sirma\u00e7ek and \u00dcnsalan, 2009;\u2026"]} +{"898504|39341849": ["The reasons are two-fold: first, the optical NDE imaging with frequencies as low as in infrared range has been recently reviewed by another group [3]; second, the paper is intended to summarize and discuss the image modalities from the fields and waves perspective."]} +{"13321749|11894197": ["\u2026value j, pk|j probability that a random example from the dataset belongs to class k, its feature A having value j. Symbol pk denotes the probability that a random example from the dataset belongs to class k.\nGini index is known for estimating the feature quality well for the discrete features."]} +{"18382123|2746910": ["In other words, feature selection reduces the number of features and provides a better learning accuracy by selecting the important features from the original data set without mapping original data sets to a lower space [7,8]."]} +{"7193690|8516210": ["In a recent and complete review of defect detection in textures, Xie [10] classified texture analysis techniques in the following categories: statistical techniques [11\u201313], structural techniques [14,15], filter-based techniques [16\u201318] and model-based techniques [19\u201321], while in his review, Kumar [22] sets three categories of defect detection in fabric: the statistical approach, the spectral approach and the model-based approach."]} +{"7193690|8953108": ["Sezgin\u2019s findings show that the best thresholding results were achieved with the three first groups of methods.", "Wavelet transform has resulted in two groups of techniques for detecting defects: (1) direct thresholding methods [25,44\u201347], whose operation is based on the background attenuation provided by the WT in the successive decomposition levels (such attenuation allows enhancing defects, which can be segmented by utilizing direct thresholding [48]); and (2) methods based on extracting texture features by means of WT [41,42].", "Sezgin categorizes the thresholding methods into six groups according to the information they use.", "From the set of metrics proposed by Sezgin [48] and Zhang [65,66], the misclassification error (ME) has been selected.", "To answer the above questions, the following thresholding methods were selected, attending to the three first groups proposed by Sezgin:\n\u2022 Histogram shape-based methods: thresholding methods based on gray level average (Ave) and the thresholding method based on computing the minima of the maxima of the histogram (MiMa) [60].", "Sezgin\u2019s survey [48] reviews a large number of thresholding methods for defect detection."]} +{"53243022|3273340": ["Among them, well-developed CNNs, such as AlexNet, VGG-16, and ResNet architectures, emerged as standard approaches to visual tasks [35].", "The short cut module learns the residual mapping by a formula of H(x) = F(x) + x [35]."]} +{"139354586|3579946": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} diff --git a/edge/graph_201621552.jsonl b/edge/graph_201621552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf243aa6e400b298acdc1ec9c5dfde8de1946390 --- /dev/null +++ b/edge/graph_201621552.jsonl @@ -0,0 +1,8 @@ +{"46896736|17381415": ["PR a1 = kr1 \u2217 Ts \u2212 2kp1; a2 = kp1 \u2212 kr1 \u2217 Ts ; b1 = 2 \u2217 cos(\u03c9s Ts ); x[0] = ig err ; y[0] = b1 \u2217 y[1] \u2212 y[2] + kp1 \u2217 x[0] +a1 \u2217 x[1] + a2 \u2217 x[2]; x[2] = x[1]; x[1] = x[0]; y[2] = y[1]; y[1] = y[0]; 214", "PI x[0] = ig err ; y[0] = y[0] + kp \u2217 (x[0] \u2212 x[1]) +ki \u2217 Ts \u2217 x[0]; x[1] = x[0]; 28", "extract maximum available power from the energy source but also is expected to transfer high quality current to the utility grid to comply with grid interconnection standards [1]."]} +{"2135285|12083425": []} +{"110796654|12083425": []} +{"7995128|12083425": []} +{"58768254|12083425": []} +{"245778|12083425": ["There are two main topology groups used in the case of grid-connected PV systems, namely, with and without galvanic isolation [2]."]} +{"97292352|12083425": []} +{"37928046|12083425": []} diff --git a/edge/graph_201645142.jsonl b/edge/graph_201645142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08e09446bba843672321ed23096cd65f1a37fe40 --- /dev/null +++ b/edge/graph_201645142.jsonl @@ -0,0 +1,18 @@ +{"4945321|13756844": ["We now provide some required background for our work, including a high-level overview of smart contracts, the EVM smart contract language, and the K Framework.", "To address these issues in a principled manner, we make use of the K Framework [19], [20].", "The K Framework is a rewriting based framework for defining executable semantic specifications of programming languages, type systems and formal analysis tools.", "In this paper, we presented a formalization of the EVM using the K Framework.", "Here we present KEVM, an executable formal specification of the EVM\u2019s bytecode stack-based language built with the K Framework, designed to serve as a solid foundation for further formal analyses."]} +{"51745801|13756844": ["[28] define the EVM semantics in the K framework [29] \u2013 a language independent verification framework based on reachability logics."]} +{"5843853|6513045": []} +{"67856589|36536": ["In addition, conventional symbolic execution approaches also suffer from limitations such as path explosion, where the number of feasible paths in a program grows exponentially, program-dependent efficiency, and memory, environment, and constraint solving problems [16]."]} +{"189762498|189762107": ["According to the recent survey work [6], over 50% of network traf\ufb01c in Ethereum and EOS 1 platforms are from blockchain game players."]} +{"174802386|49527603": ["Blockchain technology and cryptocurrencies have experienced a steady increase of attention from academia and the industry alike [1]."]} +{"52183530|8589228": ["In this study, results were analyzed using a SMC (Statistical Model Checking) [23] tool, which allowed the authors to reveal scenarios where the smart contract behaviors could be compromised by malicious users."]} +{"52964132|3628110": ["There are various studies about Ethereum\u2019s security [16, 24, 32, 33, 43] and performance [15, 17]."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"8776796|25206420": ["The former still requires management of large amounts of memory 33 and is not suitable for hospital environment."]} +{"4565398|49527603": ["Blockchain can be de\ufb01ned as a continuously growing ledger of transactions, distributed and maintained over a peer-to-peer network [15]."]} +{"139108728|59314746": ["application [56], [57], or particular application such as healthcare [58], [59] or IoT [60]."]} +{"139108728|49527603": ["There are several generic reviews of blockchain technology such as [53], [54] or review papers that target a specific aspect such as security [55] or decentralized"]} +{"139108728|51935081": ["[125] M. Samaniego and R. Deters, \u2018\u2018Blockchain as a service for IoT,\u2019\u2019 in Proc.", "Panarello et al. represent a survey to analyze the research related to blockchain and IoT context [60].", "In Table 11, the list of related studies in the context of blokchain and IoT with the focus on smart contract is presented.", "We categorized them in seven main groups include healthcare, IoT, identity management, record keeping, supply chain, BPM, and voting.", "Samaniego and Deters [125], [126] introduce blockchain as a service for IoT systems.", "Access control management, sharing resources, and record keeping are the primary focus of the decentralized applications specifically in the fields of the healthcare, and IoT, so despite the verity of the applications their focus is narrow down to these three aspects.", "[60] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito, \u2018\u2018Blockchain and IoT integration: A systematic survey,\u2019\u2019 Sensors, vol. 18, no. 8, p. 2575, 2018.", "IoT decentralized application.", "Chen et al. [14] present a supply chain quality insurance framework, which includes four layers, IoT devices, distributed ledger, smart contract, and business layer.", "Summary of the selected papers.\napplication [56], [57], or particular application such as healthcare [58], [59] or IoT [60].", "Living Internet Things Cybersecurity IoT, 2018, pp. 1\u20136.", "[126] M. Samaniego and R. Deters, \u2018\u2018Hosting virtual IoT resources on edgehosts with blockchain,\u2019\u2019 in Proc.", "Huh et al. [30] implemented a system based on Ethereum blockchain to configure and synchronize IoT devices by the\nVOLUME 7, 2019 50771\nTABLE 11.", "The required data for monitoring the quality of products, assets, and transactions generates by IoT devices.", "In their system, the written smart contracts control the configuration of IoT devices such as tracking the value of the meter or defining saving policy values.", "They discuss that blockchain and smart contracts can be applied for the configuration of IoT devices, recording data captures from sensors, and micro-payments.", "The privacy and security of the data produced by IoT devices are the major challenges in this field.", "They used IoT devices for measuring the temperature of every parcel containing pharmaceutical products and recorded them on blockchain to make sure about data immutability.", "Healthcare decentralized application.\ndecentralized approach provided by blockchain and manage public key infrastructure (PKI) associated with IoT devices.", "application [56], [57], or particular application such as healthcare [58], [59] or IoT [60].", "Mainly the represented studies focused on using blockchain and smart contracts to control the access to the data generated by IoT devices as well as addressing the privacy concern [26]\u2013[29].", "[27] A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, \u2018\u2018Towards a novel privacy-preserving access control model based on blockchain technology in IoT,\u2019\u2019 in Proc.", "[30] S. Huh, S. Cho, and S. Kim, \u2018\u2018Managing IoT devices using blockchain platform,\u2019\u2019 in Proc.", "represent a survey to analyze the research related to blockchain and IoT context [60].", "[32] F. Lombardi, L. Aniello, S. de Angelis, A. Margheri, and V. Sassone, \u2018\u2018A blockchain-based infrastructure for reliable and cost-effective IoTaided smart grids,\u2019\u2019 in Proc.", "A. INTERNET OF THINGS The significant increase in IoT devices in last years leads to exposing insecure big data."]} +{"139108728|49867601": ["A. CLASSIFICATION OF SECURITY PROBLEMS Luu et al. introduce classes of security problems in Ethereum smart contracts and they propose methods to refine the operational semantic of Ethereum to increase the security of smart contract [84].", "M\u00fchle et al. present four essential components of selfsovereign identity (SSI) [37].", "present four essential components of selfsovereign identity (SSI) [37].", "PLATFORMS OVERVIEW AND KEY CONCEPTS A. PUBLIC AND PERMISSIONED BLOCKCHAIN Public blockchain initially introduced by Bitcoin, which its nodes are untrusted."]} +{"139108728|13688847": ["Because of the initial user filtering, permissioned blockchain can use lighter consensus mechanism (semi-centralized consensus methods [64]) so, they process transactions faster.", "[64] reviews blockchain consensus algorithms with the focus on both distributed consensus system design and incentive mechanism design for permission-less blockchains."]} +{"46936025|13756844": []} +{"52965749|36536": []} diff --git a/edge/graph_201645209.jsonl b/edge/graph_201645209.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84943e5eea1620ac2602d95418e4dee27246ee6d --- /dev/null +++ b/edge/graph_201645209.jsonl @@ -0,0 +1,113 @@ +{"12762691|1932843": ["RL has been a popular control method in robotics when dynamics are unknown or uncertain [16]."]} +{"12762691|4106288": ["While model-based deformation planning is relatively well-explored [16], highly accurate perception is often required for execution, e."]} +{"54178920|1932843": ["These \ufb01elds include among others robotics (Deisenroth et al., 2011; Kober et al., 2013), operations research (Powell, 2012), economics (Kamien and Schwartz, 2012), and neuro-science (Sutton and Barto, 2018, Ch. 15).", "\u20262010; Bus\u00b8oniu et al., 2010; Wier-ing and van Otterlo, 2012); control theory (Lewis and Vrabie, 2009; Lewis and Liu, 2012); operations-research \ufb02avored optimal control (Bertsekas and Tsitsiklis, 1996; Bertsekas, 2012, 2017; Powell, 2012); robotics (Deisenroth et al., 2011; Kober et al., 2013) etc."]} +{"54178920|12191695": []} +{"54178920|1185580": ["Below we review some major ideas in policy gradients, see Deisenroth et al. (2011); Grondman et al. (2012) for dedicated reviews of the area.", "Some surveys focus on specific subareas, like policy gradient techniques (Deisenroth et al., 2011; Grondman et al., 2012), function approximation (Geist and Pietquin, 2013), Bayesian formulations of RL (Ghavamzadeh et al."]} +{"54178920|15929566": ["Many books and survey papers have therefore been published on the topic, from equally varied perspectives: AI, where the classical textbook is that of Sutton and Barto (1998) with the second edition (Sutton and Barto, 2018), but also (Kaelbling et al., 1996; Gosavi, 2009; Szepesv\u00e1ri, 2010; Bu\u015foniu et al., 2010; Wiering and van Otterlo, 2012); control theory (Lewis and Vrabie, 2009; Lewis and Liu, 2012); operations-research flavored optimal control (Bertsekas and Tsitsiklis, 1996; Bertsekas, 2012, 2017; Powell, 2012); robotics (Deisenroth et al.", "\u2026perspectives are usually not taken, and instead overviews focus separately either on AI methods (Kaelbling et al., 1996; Sutton and Barto, 1998; Gosavi, 2009; Szepesv\u00b4ari, 2010; Bus\u00b8oniu et al., 2010; Wiering and van Otterlo, 2012; Sut-ton and Barto, 2018) or on ADP approaches (Lewis and\u2026", "\u2026where the classical text-book is that of Sutton and Barto (1998) with the second edition (Sutton and Barto, 2018), but also (Kaelbling et al., 1996; Gosavi, 2009; Szepesv\u00b4ari, 2010; Bus\u00b8oniu et al., 2010; Wier-ing and van Otterlo, 2012); control theory (Lewis and Vrabie, 2009; Lewis and Liu,\u2026"]} +{"54178920|1708582": []} +{"54178920|1995121": ["Accordingly, MPC is model-based, not adaptive, with high online complexity, but with a mature stability, feasibility and robustness theory as well as inherent constraint handling.", "Postoyan et al. (2017) also highlight novel connections between MPC (Grimm et al., 2005; Gr\u00a8une and Pannek, 2016; Borrelli et al., 2017) and RL.", "It appears that the synergy of MPC and RL is a promising research avenue for handling (2)-(3) with stability guarantees.", "With the exception of some works on the relation between RL and model-predictive control (MPC) (Bertsekas, 2005; Ernst et al., 2009; Beuchat et al., 2016; G\u00f6rges, 2017), such mixed perspectives are usually not taken, and instead overviews focus separately either on AI methods (Kaelbling", "For further comparisons among MPC and RL, refer to (Bertsekas, 2005; Ernst et al., 2009; Beuchat et al., 2016; G\u00f6rges, 2017) and references therein.", "Conversely, the objectives of control researchers revolve around stability, so that even when optimal control is used, the major \u2013 and often, the only \u2013 role of the rewards (equivalently, negative costs) is to represent stability requirements, such as in standard approaches to Model Predictive Control (MPC).", "For further comparisons among MPC and RL, refer to (Bertsekas, 2005; Ernst et al., 2009; Beuchat et al., 2016; G\u00a8orges, 2017) and references therein.", "A speci\ufb01c area of AI research with deep connections to RL and receding-horizon MPC is online or sample-based planning, which at each step uses a model to simulate and evaluate several candidate sequences of actions, or closed-loop action selection rules in the stochastic case (Kocsis and Szepesv\u00b4ari, 2006; Weinstein and Littman, 2012; Bus\u00b8oniu et al., 2012; Munos, 2014).", "With the exception of some works on the relation between RL and model-predictive control (MPC) (Bertsekas, 2005; Ernst et al., 2009; Beuchat et al., 2016; G\u00a8orges, 2017), such mixed perspectives are usually not taken, and instead overviews focus separately either on AI methods (Kaelbling et al.,\u2026", "There exist of course exceptions \u2013 for instance, economic MPC methods (Diehl et al., 2011) rein-troduce \u201ctrue\u201d optimization objectives in MPC.", "With the exception of some works on the relation between RL and model-predictive control (MPC) (Bertsekas, 2005; Ernst et al., 2009; Beuchat et al., 2016; G\u00a8orges, 2017), such mixed perspectives are usually not taken, and instead overviews focus separately either on AI methods (Kaelbling et al., 1996; Sutton and Barto, 1998; Gosavi, 2009; Szepesv\u00b4ari, 2010; Bus\u00b8oniu et al., 2010; Wiering and van Otterlo, 2012; Sut-ton and Barto, 2018) or on ADP approaches (Lewis and Vra-bie, 2009; Lewis and Liu, 2012)."]} +{"3335754|5523008": ["In previous works, a task manager, composed of a database and a query manager [6, 41], is used by the DM to generate observations in retrieval tasks.", "Task-oriented dialogue systems are typically designed for retrievaltasks in which users provide queries and the chat-bot provides appropriate responses based on an external knowledge base [6, 8, 41], or identifying correct answers by looking into vast amounts of documents [15, 19].", "Such dialogue systems are typically designed to be a pipeline containing a set of components including a language understanding unit that parses the intention and semantics from the input from humans, a dialogue manager that manages dialogue state tracking and policy learning, and a language generation unit that generates response [6, 35, 36].", "Previous works typically involve using metrics such as perplexity and averaged reward per response to measure the quality of the natural language generation (NLG) phase of the dialogue system [6, 35, 41]."]} +{"3335754|6337591": ["Such dialogue systems are typically designed to be a pipeline containing a set of components including a language understanding unit that parses the intention and semantics from the input from humans, a dialogue manager that manages dialogue state tracking and policy learning, and a language generation unit that generates response [6, 35, 36].", "Previous works typically involve using metrics such as perplexity and averaged reward per response to measure the quality of the natural language generation (NLG) phase of the dialogue system [6, 35, 41].", "In previous works, the user simulators are evaluated based on accuracy of generated user query to unseen bot responses [23, 35].", "User simulators serve a pivotal role of simulating the user response in the RL training environment [23, 35]."]} +{"205572964|3519414": ["The next generation of automatic speech recognition 32 and information extraction models will likely develop clinical voice assistants to accurately transcribe patient visits.", "As such, applyication of deep-learning methods to EHR data is a rapidly expanding area 32,33 ."]} +{"205572964|2088679": ["Medical imaging, for instance, can greatly benefit from recent advances in image classification and object detection 2,8 ."]} +{"205572964|23566570": ["RL can be useful in healthcare whenever learning requires physician demonstration, for instance in learning to suture wounds for robotic-assisted surgery 7 .", "Modern genomic technologies collect a wide variety of measurements, from an individual\u2019s DNA sequence to the quantity of"]} +{"7233001|1708582": ["These bound the difference in accumulated rewards of a learning algorithm and the optimal policy over T steps [11].", "Using the OFU principle, we can guarantee with high probability that the optimal rewards of the true MDP are upper bounded by the optimal rewards of the optimistic MDP [11]."]} +{"195348794|4884302": []} +{"195348794|3273340": ["\u2026the applications for DL have grown exponentially, mainly thanks to more powerful computing platforms such as Graphics Processing Units (GPUs) [53] or specific hardware accelerators such as the Google TPU [22], mature software packages and architectures, new algorithmic techniques, and strong\u2026"]} +{"3550299|1185580": ["(b) From the perspective of optimization, the actor-critic algorithm has great properties of quick convergence with low variance [10].", "It aims to learn an optimal policy \u03c0\u2217 that maximizes the average rewards over all the states and actions [10]."]} +{"21557823|1708582": []} +{"21557823|17464562": ["This is similar to a linear reward-inaction update for learning automata (Narendra and Thathachar, 1974, 1989), using the sign of the temporal-difference error as a measure of \u2018success\u2019."]} +{"10478126|1708582": ["Reinforcement learning (RL) is an intelligent control method that provides a structured, mathematically robust mechanism for goal-directed decision making in which long-term gain is maximized (Sutton and Barto, 1998; Kaelbling et al., 1996)."]} +{"3965928|1708582": ["For the most general scenario, coverage of the state space, and convergence to the optimal policy cannot be guaranteed when using the proposed algorithms, which promote safety of exploration more than its ef\ufb01ciency (e.g., does not follow the \u201coptimism in the face of uncertainty\u201d [34] criteria)."]} +{"1033682|174797842": []} +{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]} +{"201890416|1708582": ["The result is a policy that can resolve complex tasks without specific instructions on how the tasks are to be achieved (Kaelbling et al., 1996)."]} +{"8739644|14478191": ["(2010, 2012) and by many others (Roijers et al., 2013), we focus on the setting where the definition of an MDP is augmented by assuming a D-dimensional reward vector Rpst, atq is observed at each time step.", "\u201d Multi-Objective Markov Decision Processes (MOMDPs) accommodate this by allowing vector-valued rewards (Roijers et al., 2013) and proposing an application-dependent solution concept."]} +{"386824|1708582": ["Additional information about RL can be found in several references (e.g., [2] [5] [32] [72])."]} +{"34388150|14478191": ["However, it covers the much broader topic of multiobjective sequential decision-making [18].", "One class comprises single-policy MORL approaches and the other, multiple-policy MORL approaches [12], [18]."]} +{"34388150|1708582": ["REINFORCEMENT learning (RL) was originally studied from the perspective of animal learning behaviors [1], and it has become a major class of machine learning methods [2] to solve sequential decision making problems under uncertainties [3], [4]."]} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"44061772|2088679": ["Many recent examples [1, 2, 3] have demonstrated that machine learning can deliver above-human performance in classification-based diagnostics."]} +{"4641273|3908281": []} +{"4641273|2088679": ["Deep learning has been used to classify lesions and nodules; localize organs, regions, landmarks and lesions; segment organs, organ substructures and lesions; retrieve images based on content; generate and enhance images; and combine images with clinical reports [40,41]."]} +{"4641273|3953553": []} +{"4641273|13370607": []} +{"196200552|1452734": []} +{"49653087|6863252": ["LANDMARK localization plays a vital role in medical image analysis, facilitating the automatic process for registration, classification, and segmentation [1], [2]."]} +{"49653087|1185580": ["tion as the critic to reduce the variance [11].", "The actor-critic RL performs direct policy approximation while utilizing an additional value function approximator to reduce the variance, thus taking advantage of both the policy and value-based methods [11]."]} +{"51982559|1708582": ["This leads to several problems such as large variance and bias, as exploration cannot be done where it matters most [23]."]} +{"207179119|1932843": ["Approximate value function methods [Bertsekas and Tsitsiklis, 1996] have proved successful for solving certain large scale problems [Powell, 2011], and policy search has been successfully applied to many robotics tasks [Kober et al., 2013]."]} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"3684444|393948": ["better disentangle explanatory attributes of the observed data [15].", "systems have replaced the traditional feature handcrafting step with hierarchical, multi-layer models for automatic feature learning [15], [47].", "ral network (CNN) as an image feature extractor [48] and universal non-linear function approximator [15]."]} +{"10373780|13475195": ["The preferences can be among a set of objects, in which case we speak of object ranking (Kamishima et al. 2011), or among a set of labels that are attached to a set of objects, in which case we speak of label ranking (Vembu and G\u00e4rtner 2011).", "Correspondingly, they solve an object ranking problem, with objects given by parametrized policies, making use of standard learning-to-rank methods (Kamishima et al. 2011)."]} +{"3427554|456491": ["0. Hence, the model does not account for correlation between output dimensions. Modeling such correlations typically requires knowledge of how dimensions interact in the approximated dynamical system [2, 19]. We choose not to constrain the HiP-MDP with such a priori knowledge since the aim is to provide basis functions that can ascertain these relationships through observed transitions. To overcome these"]} +{"8215097|1708582": []} +{"18170243|1708582": ["can be easily derived ( Kaelbling, Littman, & Moore 1996 ).", "It is especially useful in situations in which the agent\u2019s environment is stochastic, and for poorlymodeled problem domains in which the optimal decisionmaking policy is not obvious ( Kaelbling, Littman, & Moore 1996; Sutton & Barto 1998)."]} +{"64685463|15929566": []} +{"64685463|6972141": ["Many decisions made by a robot are based on visual information (images) captured by robot\u2019s visual systems (cameras) [1, 2, 36, 42] with the use of extracted visual features describing environment for a current task."]} +{"64685463|1708582": []} +{"10817088|2670121": ["Generative probabilistic graphical models such as hidden Markov models [72], [70], [73], [74] and dynamic Bayesian networks [64], [48] have been used to model activity sequences and to smooth recognition results of an ensemble classifier [75]."]} +{"19709734|12191695": ["The Markov Decision Process (MDP) provides a mathematical tool to model the dynamic system [3,4,17].", "It is de\ufb01ned as follows [4]: The goal of various RL methods is to learn an optimal policy \u03c0 \u2217 that maximizes the Q-value for all the state-action pairs [3].", "In this setting, the critic updating, with an aim of seeking for solutions to satisfy the Linear Bellman equation [4,3], is where w = f ( w ) is a \ufb01xed point problem; x i = x ( s i , a i ) is the value feature at time point i ; is the feature at the next time point; \u03b6 c is a tuning parameter."]} +{"19709734|1185580": ["It is in an actor-critic setting [4].", "The Markov Decision Process (MDP) provides a mathematical tool to model the dynamic system [3,4,17].", "It is de\ufb01ned as follows [4]: The goal of various RL methods is to learn an optimal policy \u03c0 \u2217 that maximizes the Q-value for all the state-action pairs [3].", "Such procedure is called the actor updating [4].", "In this setting, the critic updating, with an aim of seeking for solutions to satisfy the Linear Bellman equation [4,3], is where w = f ( w ) is a \ufb01xed point problem; x i = x ( s i , a i ) is the value feature at time point i ; is the feature at the next time point; \u03b6 c is a tuning parameter."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"9823884|15929566": ["With respect to applications in solving dynamic optimization problems, Gosavi surveys Q-learning, temporal differences, semi-Markov decision problems, stochastic games, policy gradients, and hierarchical RL with detailed underlying mathematics [38]."]} +{"9823884|1708582": ["discussed RL from the perspective of the trade-off between exploitation and exploration, RL\u2019s foundation via Markov decision theory, the learning mechanism using delayed reinforcement, construction of empirical learning models, use of generalization and hierarchy, and reported some exemplifying RL systems implementations [36]."]} +{"3763833|1708582": ["This leads to several problems such as large variance and bias, as exploration cannot be done where it matters most [23]."]} +{"18121764|8604408": ["Bayesian networks [38], [39] are a particular case of network"]} +{"57825757|24855581": ["The ability of RL to solve sequential decision-making problems makes it suitable for automating complicated tasks [26]."]} +{"57825757|23566570": ["Machine learning in general or reinforcement learning (RL) [22, 23] in particular has been involved in a number of studies for automation of surgical tasks [24, 25]."]} +{"52122434|1708582": ["Several conventional algorithm such as the temporal difference learning method, dynamic programming, and Monte-Carlo method [13] have been proposed for the actual realization of RL."]} +{"11327600|8760041": ["Additionally, sparsi\ufb01cation techniques have been combined with regression techniques (Sigaud, Sala\u00fcn, & Padois, 2011) in order to limit the computational complexity."]} +{"36317952|1708582": ["Standard Reinforcement Leaming model [7].", "The agent is able to learn this over time by systematic trial and error [7].", "This is done by extracting suitable rewards and punishments for the appropriate and inappropriate actions done by the main controller, for updating its rules [7]."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"18416486|15315731": []} +{"3138852|1932843": ["These quantities can be taken to be finite, but continuous state and action spaces are often valuable for capturing interactions in important reinforcement-learning applications such as robotic control 57 ."]} +{"3138852|1708582": []} +{"703818|1932843": ["Attribution requirements are provided at http://jmlr.org/papers/v18/16-634.html.\nits applications which used to focus on games and robotics (Mnih et al., 2015; Kober et al., 2013) now extend to diverse problems in the industrial and medical domain (Wang and Usher, 2005; Zhao et al., 2011).", "The definition of a parametric policy also requires domain knowledge, although good parametric policy representations are known for many domains, such as robotics (Kober et al., 2013).", "its applications which used to focus on games and robotics (Mnih et al., 2015; Kober et al., 2013) now extend to diverse problems in the industrial and medical domain (Wang and Usher, 2005; Zhao et al."]} +{"703818|13475195": ["In the former case, a common performance task is to rank a new set of objects (object ranking ; Kamishima et al. 2010), whereas in the latter case, the performance task is to rank the set of labels for a new object (label ranking ; Vembu and G\u00e4rtner 2010).", "Using such a weighting is a common strategy in preference learning where different evaluation criteria, like the Kendall or the Spearmen distance (Kamishima et al., 2010), are available for different domains."]} +{"2956354|8953108": ["\u2026evaluate our results, we have used a similarity measure, \u03b7 , based on the misclassi\ufb01cation rate as a general criterion in image segmentation [14], [15]: where B O and F O denote the background and foreground of the perfect image (manually segmented), B T and F T denote the background and\u2026"]} +{"14678361|1708582": ["Several papers have shown how the policy information in human demonstrations can be used for inverse optimal control [14, 15], to seed an agent\u2019s exploration [16, 17], and in some cases be used entirely in place of exploration [18, 19]."]} +{"20486824|342438": ["There has been extensive work on possible control algorithms [2\u20134], combined with significant advances in CGMs and short acting continuous subcutaneous", "[3] D."]} +{"2034081|1507400": ["29 This section classifies big data technologies/tools into four categories: (1) data storage and retrieval, (2) error identification, (3) data analysis, and (4) platform integration deployment."]} +{"5938812|1708582": ["For example, in (Kaelbling et al. 1996), (Strehl and Littman 2004), and (Strehl and Littman 2005), measures of confidence are used to guide exploration."]} +{"36030479|1708582": []} +{"9316331|10725980": ["Coquelin and Munos [68] demonstrate that \ufb02at UCB retains the adaptivity of standard UCT while improving its regret bounds in certain worst cases where UCT is overly optimistic.", "Nijssen and Winands [155] also describe a multi-player version of their MCTS-Solver (4.5)."]} +{"909109|1708582": ["Reinforcement learning\u2014one of the primary tools used in developing dynamic treatment regimes\u2014 is a sub-area of machine learning, where the learning behavior is through trial-and-error interactions with a dynamic environment (Kaelbling et al., 1996).", "As an alternative method which requires less memory and less computation, temporal-difference learning can also be used to obtain optimal policies (Kaelbling et al., 1996; Sutton, 1988)."]} +{"52002323|24641318": ["\u2026and Ermon, 2017), domain knowledge (Pan and Yang, 2010) or side information (Vapnik and Vashist, 2009), human/world\nknowledge (Lake et al., 2017; Song and Roth, 2017) (e.g., human-level concepts (Lake et al., 2015), common sense (Davis and Marcus, 2015), and intuitive physics (Smith and Vul,\u2026", "This knowledge may contain prior of learning tasks (Stewart and Ermon, 2017), domain knowledge (Pan and Yang, 2010) or side information (Vapnik and Vashist, 2009), human/world knowledge (Lake et al., 2017; Song and Roth, 2017) (e."]} +{"52002323|7559976": ["Readers can refer to (Csurka, 2017; Venkateswara et al., 2017) for more technical details.", "Figure 10: Illustration of the model adaptation approach (image is reproduced from (Csurka, 2017))."]} +{"52002323|7782275": ["\u2013 Meta knowledge: Some high-level knowledge beyond data, and can be helpful to compensate each concept learning with not sufficient samples (Lemke et al., 2015; Lake et al., 2017)."]} +{"18791160|1932843": ["In this paper, we propose a data-driven strategy to accurately control the TSM manipulator with Programming by Demonstration (PbD) [20] and reinforcement learning [24].", "MODEL ONLINE REFINEMENT WITH REINFORCEMENT LEARNING\nIn this section, an E-M based reinforcement learning algorithm called PoWER (Policy Learning by Weighting Exploration with the Returns) [24-27] is used to refine the IK model of the TSM manipulator to improve its tracking accuracy.", "In this section, an E-M based reinforcement learning algorithm called PoWER (Policy Learning by Weighting Exploration with the Returns) [24-27] is used to refine the IK model of the TSM manipulator to improve its tracking accuracy."]} +{"21106824|586521": ["It is lazy as they store entire the training examples [16]."]} +{"16333863|1185580": ["Actor\u2013critic algorithms have a long history in sequential decision making (Barto et al., 1983; Grondman et al., 2012) primarily in the on-policy, online, setting."]} +{"25962761|1708582": []} +{"88521018|1932843": []} +{"53097341|1708582": ["This feedback delay is akin to the problem of delayed rewards and credit assignment in the Reinforcement Learning (RL) literature, wherein the rewards associated with a state-action pair can occur terribly delayed [7]."]} +{"1301081|1708582": [" teaching RL agents. We make two simplifying assumptions. First, we consider environments where the state is fully observed; that is, the learning agent interacts with a Markov Decision Process (MDP) [37, 22, 40]. Second, we note that conducting experiments with an actual human in the loop creates a huge amount of work for a human, and can slow down training to an unacceptable degree. For this reason, we focu"]} +{"4019779|393948": ["The goal is to obtain compact representations of nonstationary and multivariate time series, a task frequently referred to as representation learning [172]."]} +{"4019779|7530272": ["Time-series search has a broad range of applications from finance to medical informatics, however, robust algorithms for finding predictive patterns in long sequences of nonstationary multivariate time series are sparse [156]."]} +{"25466345|1708582": ["is fundamental to the RL controller training process [9]."]} +{"24710563|1708582": ["[18]."]} +{"12103952|1708582": ["However, excellent reviews of the field can be found in [10] [5] [7]."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"43649611|11003991": ["When it comes to public hospitals, the different surgeries taking place in an operating room can be classified into: emergency, urgent and elective [32]."]} +{"43649611|1708582": ["Basically, two strategies are commonly used to solve reinforcement learning problems [154]."]} +{"53111609|52822969": []} +{"53111609|10694510": []} +{"53111609|4110304": []} +{"53111609|3212631": []} +{"53111609|10175374": []} +{"53111609|15333444": []} +{"53111609|8454235": []} +{"53111609|15562587": []} +{"53111609|3761015": []} +{"53111609|5014732": []} +{"53111609|1932843": []} +{"53111609|1185580": []} +{"53111609|393948": []} +{"53111609|9316331": ["One strategy for on-line planning is to use look-ahead tree search (Knuth & Moore, 1975; Browne et al., 2012)."]} +{"53111609|562855": []} +{"53111609|50458504": []} +{"17662384|1932843": []} +{"17662384|1185580": ["Moreover, their computational cost is lower, as they intrinsically estimate low variance gradients and parameterise policy to allow continuous time optimisation [38]."]} +{"7326710|14122909": ["Many methods have been introduced in literature to facilitate more accurate automatic or semi-automatic segmentation of the prostate boundaries in ultrasound images [3-11]."]} diff --git a/edge/graph_201646072.jsonl b/edge/graph_201646072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..028bcf8509114e0a71d4389e16e3ccb365df5e28 --- /dev/null +++ b/edge/graph_201646072.jsonl @@ -0,0 +1,5 @@ +{"25552182|8365617": ["Change detection has been extensively studied in the context of time-series data, where the objective is to determine time intervals (segments) that exhibit homogeneous properties [Huang et al. 2013; Keogh et al. 2004; Liu et al. 2008; Mithal et al. 2012].", "Change detection has been extensively studied in the context of time-series data, where the objective is to determine time intervals (segments) that exhibit homogeneous properties (Huang et al. 2013; Keogh et al. 1993; Liu et al. 2008; Mithal et al. 2012)."]} +{"9501154|13088291": ["We predict the entire traffic of the city first and then allocate the entire traffic to each cluster based on the check-out proportion across clusters, which is predicted by KNN prediction [3]."]} +{"115023585|15929566": ["As a powerful tool for solving complex sequential decision-making problems in control theory (Gosavi, 2009), reinforcement learning is able to make quick responses to the dynamic changes of the network environment and has already been successfully used to solve the similar problem such as traffic\u2026"]} +{"115023585|1708582": []} +{"9465743|1805048": []} diff --git a/edge/graph_201646191.jsonl b/edge/graph_201646191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..641242741449b76af177ef2aa6e458756e8bdc9c --- /dev/null +++ b/edge/graph_201646191.jsonl @@ -0,0 +1,3 @@ +{"23919379|4875951": ["Since then, the [4].", "\u2026following: \u201cStyle\u201d refers mostly to the space-invariant intra-patch statistics, i.e. , to the texture at several spatial scales, and to the distribution of colors a.k.a. the color palette; \u201cContent\u201d encompasses the broad structure of the scene, that is, its semantic and geometric lay-out [3, 4]."]} +{"12211154|393948": ["Note that this general objective is named manifold learning and more generally representation learning [7], that is the learning of a representation capturing the topology of a set of examples."]} +{"12211154|1708582": ["There are many approaches and algorithms for reinforcement learning (for a more detailed presentation, please refer, for example, to [89])."]} diff --git a/edge/graph_201646207.jsonl b/edge/graph_201646207.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20e18c76992aacb116efbdbcc9ca4c51a4fb27a9 --- /dev/null +++ b/edge/graph_201646207.jsonl @@ -0,0 +1,15 @@ +{"23761664|8446711": []} +{"14068010|6028805": []} +{"8633710|6857179": ["Various studies have been performed on stress, including public speaking [3], cognitive task [4], and emotion induction [5,6]."]} +{"53092492|20905429": []} +{"140240469|2355696": ["Perhaps the most widely used measurement modality is computer vision (CV), followed by electromyography (EMG) and other sensors for measuring autonomic body responses [6, 23, 47].", "Several surveys have summarized the methods available for automatic emotion recognition [6, 23, 47]."]} +{"18768263|8953108": ["thresholds the values of the original image pixels using Otsu\u2019s method [39] depending on the pixels intensities in order to reduce the intra class variance between the white and black pixels."]} +{"10912540|6028805": ["Though study has been done in the area of thermal face recognition [8], few have attempted to explore facial expression recognition using this modality."]} +{"2831683|9431428": ["So far, they have been applied successfully in diverse research areas ranging from neuroscience to chemistry [44\u201347]."]} +{"8107077|49273945": []} +{"8107077|17221751": []} +{"7565574|6028805": ["Because of the success of Infra-Red images in other facial analysis problems [1,2,20], its applicability to FER is now gaining interest as we will explain next.", "[20] provide a comprehensive and recent review of various facial analysis techniques."]} +{"23079116|1691097": []} +{"23079116|10817088": []} +{"23079116|42648222": ["However, current solutions based on smartphones suffer from scalability, security and privacy issues, apart from providing only a snapshot of physiological conditions instead of a continuous and longitudinal view of the users\u2019 health status [169].", "Currently, approaches are being developed in order to avoid this information to be used for evil or non-ethical purposes [169,190,191]."]} +{"23079116|15219853": []} diff --git a/edge/graph_201646218.jsonl b/edge/graph_201646218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c34ffa7f8e375aba0d7c97cffdf38e8889a7616 --- /dev/null +++ b/edge/graph_201646218.jsonl @@ -0,0 +1,6 @@ +{"49274596|12068725": ["Super Mario Bros (SMB) is a classic 2D platform game [4], which has become one of the most popular test beds for PCG research [5], [11], [36].", "Motivated by the learning-based PCG (LBPCG) framework [14] where a quality evaluation function may be learned from games/levels annotated by game developers, we recently proposed an approach [21] for generating short game segments of high quality, named constructive primitives (CPs), for SMB based on a modi\ufb01ed version of In\ufb01nite Mario Bros [5].", "For quality assurance, there are generally two methodologies in developing such a mechanism in PCG [1], [14]: deductive", "Recently, generating personalized game content has become an active research area in PCG [3].", "For quality assurance, there are generally two methodologies in developing such a mechanism in PCG [1], [14]: deductive vs. inductive .", "In the presence of a huge content space, however, it would be extremely dif\ufb01cult, if not impossible, to understand the entire content space, which might lead to less accurate (even con\ufb02icted) rules/constraints used in PCG.", "Constructive PCG has been widely applied in adaptive SMB level generation [6]\u2013[9], [11], where human experts design a set of constructive rules that can be converted into high-level game parameters corresponding to concrete game levels.", "SMB has a number of game elements suitable for deploying PCG techniques for content adaptation, e.g., enemies, coins, tubes and cannons.", "PROCEDURAL content generation (PCG) aims to generate game content automatically via algorithms [1], [2].", "However, this leads to a 300-dimensional content space of massive redundancy, e.g., the uniform background. x , y and type of the 1st - 5th enemy 79 number of coins 80 - 85 x , y and width of the 1st and 2nd coins Instead of the 2D grid representation, we employ a list of design elements , atomic units in PCG, as our content representation, including initial platform, gaps without/with rock decoration, hill, cannon, tubes without/with \ufb02ower enemy, boxes without/with coins/powerup,enemies, coins, mushroom and \ufb01re \ufb02ower , as illustrated in Fig.", "It is anticipated that the content space of short game segments would facilitate a constructive PCG approach in tackling content quality assurance and real-time content adaptation effectively.", "Inspired by the LBPCG framework [14], we would learn a quality evaluation function from annotated game segments to detect unplayable/unacceptable segments.", "P ROCEDURAL content generation (PCG) aims to generate game content automatically via algorithms [1], [2].", "On the other hand, a learning-based PCG (LBPCG) framework [14] was proposed where an inductive methodology is advocated for quality assurance via learning from annotated data."]} +{"3068042|12068725": ["EDPCG primarily focuses on bottom-up, search-based [6] approaches for generating content, which are driven by computational heuristics of player experience.", "employing PCG algorithms since the 80s, academic research on PCG methods (such as the search-based PCG paradigm [6]) has bloomed only in the last five years.", "global optimization techniques such as evolutionary algorithms and particle swarm optimization [6]."]} +{"3068042|3387861": ["Such signals are obtained through electrocardiography (ECG) [13], galvanic skin response (GSR) [11], respiration [13], electroencephalography (EEG) [15], and electromyography (EMG).", "For instance, existing techniques for physiological recording require physical contact between body parts (e.g., head, fingertips) and sensors, making physiological signals such as EEG and skin conductance impractical and intrusive.", "through electrocardiography (ECG) [13], galvanic skin response (GSR) [11], respiration [13], electroencephalography (EEG) [15], and electromyography (EMG).", "On a positive note, recent advances in sensor technology have resulted in low-cost unobtrusive biofeedback devices appropriate for gaming applications (such as the Emotiv2 EEG system and Empatica\u2019s Embrace bracelet3)."]} +{"14819920|12068725": [", [11, 15, 16]) that ensure a game content is playable for the players."]} +{"16187247|12068725": ["It is well known that the risk of catastrophic failure and a lack of quality are among common concerns for existing PCG techniques [3] given the fact that a content generator may generate unplayable content or content that is not appropriate for anyone's tastes.", "While there are various content representations [3], our current work is confined to a class of representations characterized by a game parameter vector of parameters denoted by", "While existing techniques [3] may be used to carry out the IP model as discussed later on, we would develop more efficient techniques to enable the IP model to generate content online.", "Although substantial progress has been made in PCG, existing PCG techniques still encounter a number of challenging problems such as content representation, content space management, content quality evaluation, content generation efficiency and so on, which have been thoroughly summarized in [3].", "While our method working in the generate-and-test style is designed for computational efficiency, more sophisticated search-based techniques [3] might make use of four component models to generate quality contents."]} +{"9950600|12068725": ["\u2026sps74@drexel.edu, mguzdial3@gatech.edu, christoffer@holmgard.org, amy.hoover@gmail.com, aisaksen@appabove.com, nealen@nyu.edu, julian@togelius.com\nThis survey explores Procedural Content Generation via Machine Learning (PCGML), defined as the generation of game content using machine learning\u2026"]} diff --git a/edge/graph_201646231.jsonl b/edge/graph_201646231.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..557e18e0ef0a283ceea0ea4ed7c4206d86cd1a4b --- /dev/null +++ b/edge/graph_201646231.jsonl @@ -0,0 +1,37 @@ +{"108380989|3656886": ["An overview and comparison of these emerging LPWAN technologies have been presented in [4]\u2013[7]."]} +{"108380989|4427557": ["An overview and comparison of these emerging LPWAN technologies have been presented in [4]\u2013[7]."]} +{"108380989|3494096": ["Comprehensive surveys on the emerging IoT technologies and their challenges have been reported in [2] and [3]."]} +{"27087640|4427557": ["In this context, various LPWAN technologies such as SigFox, Weightless, LoRa and Ingenu have been proposed [1]."]} +{"207906873|201646231": ["We focus on LoRa in this article and refer the readers to [15]\u2013[17] for detailed comparisons of existing LP-WAN technologies."]} +{"207906873|53711791": ["There are some pioneer researches on LoRa and LoRaWAN [21]."]} +{"39496928|5002530": ["[4]), which offer a viable alternative to the use of public key cryptography [5]."]} +{"39496928|15199849": []} +{"39496928|1230643": ["Considering the limitation of nodes\u2019 capabilities, unreliability of wireless channel and hostile deployment, it is necessary to secure the data within the nodes and while data is transmitted between the communicating nodes in order to achieve the authenticity and confidentiality of the data [3]."]} +{"18063091|270804": []} +{"18063091|1230643": ["The development of WSNs is largely driven by the numerous military, industrial, and scientific applications [1]."]} +{"53598666|13475127": ["IRELESS sensor networks have been the subject of a significant amount of research in recent years, and have been finding application in many diverse areas [1], [2]."]} +{"679116|20905429": ["Finally, flexible patch sensors can be used to monitor temperature, sweat, ECG and other vital signs in real time [25, 49]."]} +{"37752396|31756370": ["the spectrum utilization was presented in [111], which compared different methods to solve the coexistence problem, such as cross-technology sensing, interference avoidance, MIMO"]} +{"37752396|1598350": ["The purpose of IoT is to create a network, where \u201cpeople and things can be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service\u201d [23]."]} +{"37752396|25929315": ["Several schemes have been discussed in [30], [43] and [96] to avoid congestion in sending a random preamble over PRACH, such as defining new PRACH resource for MTCDs,", "The reason is that cellular networks were primarily designed to support mobile devices with a large amount of data to transmit; whereas most M2M communications are duty-cycling and delay-tolerant with small data packets between stationary terminals [43].", "tions are different from H2H communications [43], as shown in Fig."]} +{"51971154|4427557": ["However, the LPWAN follows also the trend known from the IoT and entails several security issues such as lack of adequate support of over-the-air updates, no encryption for application payload (potential eavesdropping), and generally low complexity of security [17, 26].", "and represent a novel communication paradigm [26]."]} +{"51971154|17708892": ["Due to their very specifics and features, the security solution for LPWAN systems in general, and for SigFox in particular, should be [3, 16, 25, 30, 38]:"]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"12180799|4427557": ["Ultra-narrowband technologies such as Sigfox (Lab\u00e8ge, France) and Weightless-N [1] (Cambridge, UK), as well as spread-spectrum technologies such as LoRa [2] (San Ramon, CA, USA), allow for communicating up to few kilometers, and to build up low-power wide area networks (LPWANs) that do not require the construction and maintenance of complex multi-hop topologies [3,4]."]} +{"18740420|4427557": []} +{"18740420|17708892": ["Some of the most pronounced LPWA candidates are SigFox, LoRa, Weightless, and Ingenu [1].", "In fact, most of these studies are either review articles [1], [3], [4], or measurement reports [5], [6].", "2647247 Despite this success, LoRa has not yet attracted similar levels of attention from the academic and research community with only very few peer-reviewed studies published to date [1], [3]\u2013[7].", "b) Coverage probabilities \u2118[X ] for X = {H1, Q1, H1Q1} using the same colouring and markers as in a) for different mean values of end-devices N\u0304 \u2208 [1, 2000]."]} +{"3419623|4427557": ["In [11], the LPWA standards and proprietary LPWA technologies, as well as the challenges and", ", LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "For LPWA networks, most\nof the existing solutions, e.g., LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "The Table also lists the applications (provided in [11] and [89]) that can be supported by each technology."]} +{"3419623|19636511": ["The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14].", "Weightless-N, Weightless-P, and Amber Wireless as mentioned in [14]."]} +{"3419623|25929315": ["M2M communication RA is limited, and the large number of simultaneous network access attempts may result in high collision rate [13].", "The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14]."]} +{"24679983|4427557": ["This feature of IoT enables the potential of massive connectivity and low-power wide-area (LPWA) networks have been proposed as a promising solution for such types of IoT applications [1\u20133]."]} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} +{"13739502|4427557": ["LoRaWAN\u2019s asynchronous communication scheme enables much longer battery lifetime by reducing the overhead caused by synchronization [5].", "With these technologies, even resource-constrained small sensors or actuators can send messages up to tens of kilometers and survive for several years even without a power source [5]."]} +{"12502682|3055684": ["A general overview of recent advances in wireless communications with EH is presented in [6], while [7] discusses the challenges of designing an intelligent EH communication system and presents a general Chiara Pielli (piellich@dei.unipd.it) and Michele Zorzi (zorzi@dei.unipd.it) are with the Dept.\u2026"]} +{"16344|4427557": ["These types of requirements are hard to ful\ufb01ll using traditional Machine to Machine technologies such as cellular or WPAN [2].", "2768498 technologies such as cellular or WPAN [2]."]} +{"11225693|8462498": ["Indeed, stateof-the-art techniques such as uplink MU-MIMO [6, 26, 40] can", "We observe that while MU-MIMO\u2019s gain over standard LoRaWAN is capped at 9.994 \u21e5 (3.04 \u21e5 ) vs. LoRaWAN(+Oracle), Choir, with even a single antenna is at 11.07 \u21e5 (3.37 \u21e5 ).", "Our experiments using MU-MIMO deploy with up to 3 base-station antennas synchronized by a Jacksonlab Fury clock.", "Further, the presence of multiple antennas can be used to further improve Choir\u2019s gain to 13.8489 \u21e5 (4.217 \u21e5 ), demonstrating that its gains are complementary to MU-MIMO.", "5), we additionally compare our system with the state-of-the-art uplink MU-MIMO [40].", "We compare our system with a baseline that employs uplink MU-MIMO [38] as well as di \ufffd erent modes of the standard LoRaWAN PHY and MAC [28].", "Indeed, state-of-the-art techniques such as uplink MU-MIMO [6, 26, 40] can at best separate as many sensor nodes as there are base station antennas (atmost 3-4 today due to limits on the size and cost [16, 27, 39]).", "We evaluate the performance of Choir relative to MU-MIMO for a base station with 3-antennas.", "Much of this work relies on using multiple antennas on wireless nodes be it MU-MIMO on the downlink [6], uplink [40] or fully distributed MIMO [33]."]} +{"11225693|1230643": ["We measure three metrics: (1) network throughput of all nodes; (2) latency measured between a beacon packet from the base station and the response packet from a client; (3) total number of transmissions and re-transmissions required to send one packet worth of data \u2013 a useful metric to measure energy efficiency, as that packet transmission is a major drain on battery for sensors [3]."]} +{"1527872|4427557": ["Given the inadequacies of legacy communication solutions (expensive hardware and communication costs and short battery life), a new breed of connectivity solutions have emerged popularly referred to as Low Power Wide Area (LPWA) networking technologies [6]."]} +{"52073397|4427557": []} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} diff --git a/edge/graph_201649907.jsonl b/edge/graph_201649907.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2016509.jsonl b/edge/graph_2016509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201660108.jsonl b/edge/graph_201660108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4d9d26571d88170a0589c8d03d6848ee4ef8f8e --- /dev/null +++ b/edge/graph_201660108.jsonl @@ -0,0 +1 @@ +{"21447615|207372751": []} diff --git a/edge/graph_201660427.jsonl b/edge/graph_201660427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66e80897809b961f1e92ac608a6849197f43c6a8 --- /dev/null +++ b/edge/graph_201660427.jsonl @@ -0,0 +1,38 @@ +{"159041897|62841734": ["Selfsupervised learning is a subset of unsupervised learning methods in which CNNs are explicitly trained with automatically generated labels [6].", "In many domains, the shortage in annotated datasets has been addressed by unsupervised and self-supervised methods [6], which have been shown to hold potential for training networks that can serve as useful feature extractors."]} +{"511308|8575576": ["A variety of classi\ufb01cation and segmentation algorithms have been developed in the past [1], [2], [3], [4], [5], [6], [7], [8], focusing primarily on the design of local pathological patterns, such as morphological [2], geometric [1], and texture [9] features based on various clinical\u2026"]} +{"67856146|3644401": ["When multiple atlases are available, they are each aligned to a target volume, and the warped atlas labels are fused [36, 41, 68, 78]."]} +{"67856738|4903005": ["The lack of the labeled data motivates the study of methods that can be trained with limited supervision, such as semisupervised learning [4]\u2013[6], weakly supervised learning [7]\u2013[9], and unsupervised domain adaptation [10]\u2013[12]."]} +{"89620774|2088679": ["arg min q\u2208[0,1]n tr [ Iq(\u03b80)\u22121 ] s.", "random: randomly querying k samples without replacement from the unlabeled pool U ; entropy [6]: uncertainty sampling method with uncertainty measured by means of Shannon entropy function computed over the network\u2019s class posterior probabilities; suppose the posterior of a sample xi is denoted by pi \u2208 [0, 1]c where pi j = P(y = j | xi , \u03b8\u0302), then its uncertainty is measured by HS(pi |\u03b8\u0302) := \u2212\u2211cj=1 pi j log pi j .", "Supervised deep learning models, including convolutional neural networks (CNNs) have gained tremendous success in performing segmentation tasks in the last few years [1]\u2013[4]."]} +{"169033851|2088679": ["In [49], many other sections of medical image analysis like classification, detection, and registration is also covered which makes it medical image analysis review not a specific medical image segmentation survey.", "There are a few recent survey articles on medical image segmentation, such as [49] and [67]."]} +{"206750461|2088679": ["As explained in a recent NN survey paper [28], the majority of the classification and regression models utilise a pixel-", "[28]) have been studied in medical imaging."]} +{"206750461|10267045": ["Incorporating prior knowledge into image segmentation algorithms has proven useful in order to obtain more accurate and plausible results as summarised in the recent survey [32]."]} +{"56475938|28790398": ["from either MRI or CT takes up to 8 hours by a well-trained operator [15]), effectively adapting the model trained on one modality to the other holds clinical benefits."]} +{"52305483|20404279": []} +{"52305483|2088679": ["It is estimated that there were over 400 papers published in 2016 and 2017 in major medical imaging related conference venues and journals (Litjens et al., 2017)."]} +{"34468396|2616070": []} +{"3213653|2088679": ["Recently, deep learning with convolutional neural networks (CNNs) has achieved the state-of-the-art performance in many image analysis applications [10]."]} +{"206870456|8575576": []} +{"84187246|3644401": ["Quantitative analysis of medical data often requires precise delineation of organs, abnormalities, and structures of interest which can be delivered by computer assisted approaches as demonstrated by recent literature [1], [2], [3], [4], [5], [6], [7]."]} +{"84187246|4583883": ["Quantitative analysis of medical data often requires precise delineation of organs, abnormalities, and structures of interest which can be delivered by computer assisted approaches as demonstrated by recent literature [1], [2], [3], [4], [5], [6], [7]."]} +{"84187246|1902238": ["Quantitative analysis of medical data often requires precise delineation of organs, abnormalities, and structures of interest which can be delivered by computer assisted approaches as demonstrated by recent literature [1], [2], [3], [4], [5], [6], [7]."]} +{"84187246|14122909": ["Quantitative analysis of medical data often requires precise delineation of organs, abnormalities, and structures of interest which can be delivered by computer assisted approaches as demonstrated by recent literature [1], [2], [3], [4], [5], [6], [7]."]} +{"3947701|393948": ["variations in imaging, noise, etc), so that they can generalise to unseen examples [5]."]} +{"49397136|10267045": ["prior knowledge about the structure of target object in the objective function to regularize plausible solutions with anatomically meaningful constraints have been widely leveraged to obtain more reliable delineations [10,17]."]} +{"49397136|2616070": ["prior knowledge about the structure of target object in the objective function to regularize plausible solutions with anatomically meaningful constraints have been widely leveraged to obtain more reliable delineations [10,17]."]} +{"56177943|2088679": ["Recent years have witnessed a substantial growth in the number of deep learning methods for medical image segmentation (Litjens et al., 2017; Shen et al., 2017; Dolz et al., 2018; Ker et al., 2018)."]} +{"3573942|3680335": ["Convolutional Neural Network (DCNN) models have been proposed such as AlexNet [1], VGG [5], GoogleNet [6], Residual Net [7], DenseNet [8], and CapsuleNet [9][65]."]} +{"3573942|2088679": ["According to a recent survey, DL approaches are applied to almost all modalities of medical imagining [20, 21].", "Furthermore, the highest number of papers have been published on segmentation tasks in different modalities of medical imaging [20, 21].", "However, semantic segmentation approaches that utilize DL have become very popular in recent years in the field of medical image segmentation, lesion detection, and localization [20]."]} +{"4903005|10175374": ["An in-depth explanation of why this works can be found in Ruder [2017]. Rather than training multiple tasks simultaneously, representation learning approaches where an", "While not interesting prediction tasks by themselves, these could be leveraged via multi-task learning, for example, by using these as auxiliary tasks or \u201chints\u201d [Ruder, 2017]."]} +{"4903005|2088679": ["The network can then be used in two strategies (Litjens et al., 2017): for feature extraction, or as a starting point for further training (fine-tuning) of the target task.", "A frequent problem when applying machine learning methods to medical images, is the lack of labeled data (Litjens et al., 2017; Weese and Lorenz, 2016; de Bruijne, 2016), even when larger sets of unlabeled data may be more widely available.", "In this paper we have used the following categories, inspired by Litjens et al. (2017): brain, retina, chest, breast, heart, abdomen, histology/microscopy and other applica-"]} +{"4903005|8601873": ["[2016] cell segmentation in microscopy graph-based, active Multiple Gass et al. [2012] segmentation in two applications graph-based Ciurte et al.", "other assumptions have been proposed [Foulds and Frank, 2010]."]} +{"53100670|2088679": ["Recently, deep convolutional neural networks (CNNs) have led to substantial improvements for numerous computer vision tasks like object detection [1], image classi\ufb01cation [2], [3] and semantic segmentation [4], [5], often achieving human-level performance."]} +{"23490488|10137425": []} +{"563962|2088679": ["DEEP learning with convolutional neural networks (CNNs) has achieved state-of-the-art performance for automated medical image segmentation [1]."]} +{"199064408|52305483": []} +{"199064408|1315930": ["Many surveys(Litjens et al., 2017; Ker et al., 2018; Anwar et al., 2018; Razzak et al., 2018; Esteva et al., 2019; Maier et al., 2019; Moen et al., 2019) review the progress of deep learning techniques applied in biomedical image analysis from four directions: (1) deep models; (2) analysis tasks,\u2026"]} +{"199064408|6736412": ["Many surveys(Litjens et al., 2017; Ker et al., 2018; Anwar et al., 2018; Razzak et al., 2018; Esteva et al., 2019; Maier et al., 2019; Moen et al., 2019) review the progress of deep learning techniques applied in biomedical image analysis from four directions: (1) deep models; (2) analysis tasks,\u2026"]} +{"199064408|2088679": ["Many surveys(Litjens et al., 2017; Ker et al., 2018; Anwar et al., 2018; Razzak et al., 2018; Esteva et al., 2019; Maier et al., 2019; Moen et al., 2019) review the progress of deep learning techniques applied in biomedical image analysis from four directions: (1) deep models; (2) analysis tasks,\u2026"]} +{"70183702|4903005": ["The methods in the \ufb01rst category aim to utilize unannotated data by leveraging weakly/semi-supervised learning methods (Lin et al. 2016; Yang et al. 2018a; Cheplygina, de Bruijne, and Pluim 2018)."]} +{"52988736|2088679": ["proposed a deep encoder-decoder network [18] using a patch-based learning fashion."]} +{"15019293|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"29157054|3644401": ["aging massive unlabeled data to boost segmentation performance. 2. Related Work Fully-supervised multi-organ segmentation. Early studies of abdominal organ segmentation focused on atlas-based methods [22,11,43]. The frameworks are usually problematic because 1) they are not able to capture the large inter-subject variations of abdominal regions and 2) computational time is tightly dependent on the number of"]} diff --git a/edge/graph_201666120.jsonl b/edge/graph_201666120.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c65977719cde1b92868716dbd6bdf858d9148a7 --- /dev/null +++ b/edge/graph_201666120.jsonl @@ -0,0 +1,4 @@ +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"199441929|201666120": ["Bayesian Neural Network [14]: Different from generative representation learning methods such as VAE, which model a variational approximator to the model posterior on the hidden units, a Bayesian Neural Network builds variational models on the weights of the network, which can also be used for exploration in Reinforcement Learning [14], [15]."]} +{"19077536|1708582": ["A large number of prior methods (Sutton, 1990; Kaelbling et al., 1996) have proposed to use such a policy distribution as an exploration strategy, but in the context of a reinforcement learning algorithm where the Q-function is learned via the standard (\u201chard\u201d) max operator, corresponding to a temperature (see Section 2.", "A large number of prior methods (Sutton, 1990; Kaelbling et al., 1996) have proposed to use such a policy distribution as an exploration strategy, but in the context of a reinforcement learning algorithm where the Q-function is learned via the standard (\u201chard\u201d) max operator, corresponding to a\u2026"]} +{"11227891|1708582": ["A closely related concept to maximum entropy policies is Boltzmann exploration, which uses the exponential of the standard Q-function as the probability of an action (Kaelbling et al., 1996)."]} diff --git a/edge/graph_201666566.jsonl b/edge/graph_201666566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6958873b582e4c871e11103702d6699ee60ccf9f --- /dev/null +++ b/edge/graph_201666566.jsonl @@ -0,0 +1,13 @@ +{"1084755|8372620": [", and to their tests of statistical significance (see surveys [20,25]).", "Earlier studies have primarily relied upon simple statistical analysis involving association or correlation measures [5, 15, 22, 23, 25] However, such analyses can produce misleading conclusions because they largely ignore the effect of confounding variables \u2013 variables that cam be used to determine both the outcome and the group."]} +{"67788184|53985441": ["Recent studies [37, 38, 44, 45, 66] have expanded the"]} +{"1389483|8372620": ["Various approaches have been proposed to make a \u201cfair\u201d binary classi\ufb01cation (Baro-cas and Selbst, 2014; Dwork et al., 2012; Feldman et al., 2015; Zliobaite, 2015)."]} +{"4012627|7839197": ["Thus, AI, in this regard, represents the mechanism that powers the decision-making process of a computing agent\u2014whether that agent is embodied in hardware and paired with a robot body or is embodied in software such as a chatbot executed on a computing platform (Nwana 1996)."]} +{"92979801|12161567": [", knowledge graph) setting, where embeddings are learned for both entities/nodes and relations and where the primary goal is to predict (unobserved) relations between entities [17], a general setting that encompasses both link prediction and basic recommender systems [4]."]} +{"59336130|5575638": ["Many other data sets have been proposed for di\ufb00erent facial analysis tasks, such as age and gender classi\ufb01cation [24, 27, 31, 54\u201356], facial expression analysis [55], memorability [57], attributes [35] and aging [58]."]} +{"59336130|14674468": ["As prior work has pointed out, skin color alone is not a strong predictor of race, and other features such as facial proportions are important [6,63\u201365]."]} +{"12845273|8372620": ["Barocas and Selbst survey a range of ways in which data-analysis algorithms can lead to discriminatory outcomes [3], and review articles by Romei and Ruggieri [25] and Zliobaite [30] survey data-analytic and algorithmic methods for measuring discrimination."]} +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} +{"96428734|44414506": ["Resampling for class imbalance:Resampling approaches have largely focused on addressing class imbalances [26, 34], as opposed to biases within individual classes.", "Several pre-processing and inprocessingmethods rely on new, artificially generated debiased data [11] or resampling [26].", "Resampling for class imbalance: Resampling approaches have largely focused on addressing class imbalances (More 2016; Zhou and Liu 2006), as opposed to biases within individual classes.", "Several pre-processing and in-processing methods rely on new, arti\ufb01cially generated debiased data (Calmon et al. 2017) or resampling (More 2016)."]} +{"96428734|207060556": ["Even the seemingly simple task of facial recognition (Zafeiriou, Zhang, and Zhang 2015) has been shown to be subject to extreme amounts of algorithmic bias among select demographics (Buolamwini and Gebru 2018).", "Even the seemingly simple task of facial recognition [4, 23, 32] has been shown to be subject to extreme amounts of algorithmic bias among select demographics."]} +{"91168921|3342225": ["For commercial systems, the audit itself is characterized as a \"black box audit\", where the direct or indirect influence of input features on classifier accuracy or outcomes is inferred through the evaluation of a curated benchmark [30, 33]."]} +{"4414223|8372620": ["Zliobaite provides a comprehensive survey on metrics for measuring disparate impact 6 , which we will summarize here."]} diff --git a/edge/graph_201667017.jsonl b/edge/graph_201667017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a1624a505fa4481c676be54dc5d7d6640d2991d --- /dev/null +++ b/edge/graph_201667017.jsonl @@ -0,0 +1,3 @@ +{"189897795|201667017": ["ng logarithmic factors. This may sound like a negative result, as other methods that seem to have similar assumptions can achieve learning rates that are exponential in the number of labeled samples [Mey and Loog, 2019, Chapter 6]. But constant improvement can still have signi\ufb01cant effects, if this constant can be arbitrarily large. For that consider again the example of the two concentric circles. If we set the re"]} +{"37925315|12681089": []} +{"4743454|49842767": ["We refer to (Luxburg, 2010; Luxburg, Bousquet, & Belkin, 2004; Rakhlin & Caponnetto, 2006; Thiagarajan, Rama-murthy, & Spanias, 2011) and a number of references therein for the algorithmic details as well as various notions of clustering instability, and to (Shamir & Tishby, 2007) for the relation\u2026", "We refer to results of [Luxburg, 2010], [Luxburg et al.", "\uf8fb It is straightforward to show that \u2206 n de\ufb01nes a true metric, sometimes referred to as the minimal matching distance (Luxburg, 2010), on the space of clusterings (see Th. 6 in the Appendix). where \u03c0 : { 1 , . . . , G \u2192 { 1 , . . .", "It is straightforward to show that \u2206n defines a true metric, sometimes referred to as the minimal matching distance [Luxburg, 2010], on the space of clusterings."]} diff --git a/edge/graph_201670188.jsonl b/edge/graph_201670188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d38375c8ef318c23fe554e948fa17c13de09d5fb --- /dev/null +++ b/edge/graph_201670188.jsonl @@ -0,0 +1,6 @@ +{"206804718|18986679": ["[25], and de Oliveira and Levkowitz [66]."]} +{"240943|2186746": []} +{"5552859|9629338": []} +{"18325055|9629338": []} +{"11131630|16557526": ["[8] reviewed the state of the art in uncertainty visualization."]} +{"10301628|18986679": ["Multivariate data analysis and visualization is an active research area and it has numerous applications in diverse fields [12, 41]."]} diff --git a/edge/graph_20169154.jsonl b/edge/graph_20169154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94058bdae025430d942cd5ea51bd242b71e31c58 --- /dev/null +++ b/edge/graph_20169154.jsonl @@ -0,0 +1,8 @@ +{"39826532|24847": ["Recent work in this area provides a comprehensive classification and description of design patterns for self-organising mechanisms together with a detailed description of their interrelations [74]."]} +{"39826532|9436742": []} +{"19063400|423305": []} +{"15411200|17779575": []} +{"15411200|13037420": []} +{"15411200|14583671": []} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} diff --git a/edge/graph_201698369.jsonl b/edge/graph_201698369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7b01656c24d33f28da403b8f0ff71c3833775fd --- /dev/null +++ b/edge/graph_201698369.jsonl @@ -0,0 +1,6 @@ +{"20697727|627405": ["This means that an explicit procedure in selecting the systems and papers was applied (see [7] for details): to be included, a paper must have presented an AA system providing summative, numerical feedback from programming assignments or described results from using such system."]} +{"207579478|7844555": []} +{"207579478|3646491": ["On the other hand, frequent subgraph mining aims at finding explainable and160\ninteresting patterns in graphs (Jiang et al., 2013)."]} +{"16410544|14826104": ["Please see (Desmarais and Baker 2012) in this issue for an excellent overview of research in this area."]} +{"35494104|10565822": ["Novice programmers have common problems in expressing their program solutions as computer programs, i.e., in applying programming concepts to program construction (Robins, Rountree & Rountree, 2003)."]} +{"12588908|10565822": ["These findings are consistent with previous studies [Robins et al. 2003; Soloway and Spohrer 1989] that emphasise the importance of program design and applying the right programming constructs."]} diff --git a/edge/graph_201705169.jsonl b/edge/graph_201705169.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91f6510a69f5ff0bef9a59f278f29ba44a0aac69 --- /dev/null +++ b/edge/graph_201705169.jsonl @@ -0,0 +1,17 @@ +{"3146707|4719202": []} +{"35434729|4719202": ["One storage assignment method is to create a set of rules to assign products to storage locations (Koster et al., 2007).", "In previous studies, assignment policies were mainly divided into three categories: rule-of-thumb policy, class-based policy, and family grouping policy (Koster et al., 2007).", "Among warehousing activities, order picking is the most time-consuming and labourintensive (Koster et al., 2007), and it generally accounts for 55% of warehouse operating expenses (Tompkins et al., 1996)."]} +{"14116727|4719202": ["Refer to recent survey papers ( de Koster et al, 2007 , Gu et al, 2007 ) for more examples.", "Product allocation has been studied by many researchers (see De Koster et al. (2007) and Gu et al. (2007)).", "Refer to recent survey papers (De Koster et al., 2007; Gu et al., 2007) for more examples."]} +{"207733745|1289787": ["Readers may also refer to Rowenhorst et al. (2000) for a recent survey on the overall warehouse design and operation problems."]} +{"110508602|4719202": ["The S-shaped routeing policy in which the picker only travels in one direction through the entire aisle can help reduce congestion (see de Koster, Le-Duc, and Roodbergen 2007).", "\u2022 The operating policies, i.e. (ii) routeing policy, (iii) storage policy and (iv) pattern of product arrangement in the warehouse (see de Koster, Le-Duc, and Roodbergen 2007).", "\u2026Chew and Tang 1999; Petersen and Schmenner 1999; Caron, Marchet, and Perego 2000; Roodbergen and de Koster 2001; Petersen, Aase and Heiser 2004; Le-Duc and de Koster 2005; Roodbergen and Vis 2006; de Koster, Le-Duc, and Roodbergen 2007; Le-Duc and de Koster 2007; Roodbergen, Sharp, and Vis 2008).", "1.1 Research gaps for problem addressed in this paper\nAs described previously, most researchers in warehousing use simulation to determine the interaction of routeing policies and storage decisions on warehouse layout and pick travel distances (see de Koster, Le-Duc, and Roodbergen 2007).", "In warehouse literature, there is no firm rule to define the position of the class partitions, the percentage of turnover assigned to each class and how class-based storage effects warehouse layout in general for S-shaped routeing (see de Koster, Le-Duc, and Roodbergen 2007)."]} +{"109772185|4719202": []} +{"55492563|6628538": ["This result is in accordance with the findings in the literature (Yu, De Koster, and Guo 2015) and in practical operations (Petersen, Aase, and Heiser 2004; De Koster, Le-Duc, and Roodbergen 2007; Roodbergen and Vis 2009).", "\u2026and Schwarz 1977; Eynan and Rosenblatt 1994; Kouvelis and Papanicolaou 1995; Thonemann and Brandeau 1998; De Koster et al. 2007; Gu, Goetschalckx, and McGinnis 2007; Roodbergen and Vis 2009), and some well-known operations management textbooks (e.g. Adams et al. 1996; Tompkins et al. 2010)."]} +{"55492563|4719202": ["All storage locations in the warehouse are assumed to have the same unit-load size and each unit-load location stores only one item (De Koster, Le-Duc, and Roodbergen 2007).", "Among these operations, retrieving items from their storage locations typically accounts for a high proportion of operational costs (Frazelle and Frazelle 2002; Tompkins et al. 2010), taking up to half of the total warehouse operating expense (De Koster et al. 2007).", "This result is in accordance with the findings in the literature (Yu, De Koster, and Guo 2015) and in practical operations (Petersen, Aase, and Heiser 2004; De Koster, Le-Duc, and Roodbergen 2007; Roodbergen and Vis 2009).", "\u2026and Graves 1976; Graves, Hausman, and Schwarz 1977; Eynan and Rosenblatt 1994; Kouvelis and Papanicolaou 1995; Thonemann and Brandeau 1998; De Koster et al. 2007; Gu, Goetschalckx, and McGinnis 2007; Roodbergen and Vis 2009), and some well-known operations management textbooks (e.g. Adams et\u2026"]} +{"6628538|4719202": ["General overviews of warehouse design and control include Cormier and Gunn (1992), Van den Berg (1999), Rouwenhorst et al. (2000), De Koster et al. (2007) and Gu et al. (2007).", "For a detailed review of this type of research, refer to De Koster et al. (2007)."]} +{"6628538|1289787": []} +{"55223664|4719202": ["\u2026practice and is widely discussed in many operations management textbooks (Adams et al., 1996; Heragu, 2006; Tompkins et al., 2003), and scientific papers (De Koster et al., 2007; Graves et al., 1977; Gu et al., 2007; Hausman et al., 1976; Rosenblatt and Eynan, 1989; Thonemann and Brandeau, 1998)."]} +{"83459029|6628538": []} +{"83459029|4719202": []} +{"83459029|1289787": []} +{"6169283|2357830": ["RFID is an automatic identi\ufb01cation technology for objects or people, using radio frequency transmission (Juels 2006; Vrba et al. 2008; Zhou and Shi 2009)."]} +{"6169283|4719202": ["Since order picking is one of the most labor-intensive operations in a warehouse and any weakness in performance can adversely affect the entire supply chain (De Koster et al. 2007), there is a need to improve order picking ef\ufb01ciency for survival in today\u2019s dynamic market.", "Order picking is one of the warehouse operations which have the highest priority for improving the warehouse ef\ufb01ciency (De Koster et al. 2007; Chen et al. 2014).", "In addition, according to De Koster et al. (2007), academic order picking literature focuses more on high-level picking and AS/RSs."]} +{"110759218|6628538": ["Roodbergen and Vis (2009) review different methods that have been used to obtain the optimal zone boundaries in a class-based storage policy.", "In a warehouse, four main design decisions influence the response time of a unit load automated storage system (Roodbergen and Vis 2009):\n\u2022 storage system dimensions, \u2022 storage assignment policy, \u2022 retrieval policy and \u2022 location of input/output (I/O) point."]} diff --git a/edge/graph_201709945.jsonl b/edge/graph_201709945.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25748be89b46595e3097152cef3a52bc979dc89d --- /dev/null +++ b/edge/graph_201709945.jsonl @@ -0,0 +1,20 @@ +{"51720953|4427557": []} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"1432893|3348390": ["Indeed, it is emphasized that to the extent that everyday objects become information security risks, the IoT could distribute those risks far more widely than the Internet has to date.", "Analysys Mason forecast that the fastest-growing M2M sectors will be utilities and smart grids, healthcare, and security [4]"]} +{"8222030|4427557": ["Recently, a new breed of communication technologies named low-power wide-area (LPWA) networks has recently been proposed to specifically address the needs of long-range and low-power IoT applications [2]."]} +{"3323195|2527194": []} +{"3323195|17708892": []} +{"3323195|17683338": []} +{"14515923|8618569": ["The tactic of channel hopping is also upheld by Bluetooth and WirelessHART [9], which respectively provide advanced functionality known as adaptive frequency hopping (AFH) [5] and Blacklisting [10]."]} +{"38476600|4427557": ["In the midst of this IoT revolution, recently, low power wide area networking (LPWAN) technologies[22] have become very popular, as they are an excellent fit to the IoT data traffic that are generated and consumed by many smart city applications."]} +{"37454016|1236072": ["To allow multihop data forwarding in such low-power and lossy networks, many routing protocols have been proposed [1], [2]."]} +{"37454016|12060835": ["To allow long lifetimes of WSN applications, many nodes are supplied by energy harvesters [13]."]} +{"11505956|4427557": ["Sigfox is a cellular system approach that allows end-devices connecting to base stations equipped with software-defined cognitive radios using the BPSK (Binary Phase Shift Keying) modulation [15]."]} +{"11505956|1230643": ["Index Terms\u2014 Internet of Things; IoT; LoRa; LoRaWAN; Sigfox; Long range; Low power\nI. INTRODUCTION\nThe growth of the Internet of Things (IoT) has increased the scale of the issues inherent to the energy restricted nodes in wireless sensor networks (WSNs).", "Recent proposals, like Aziz et al. [3] present topology control techniques to extend the battery life time and energy efficiency in WSNs [4].", "[3] present topology control techniques to extend the battery life time and energy efficiency in WSNs [4]."]} +{"29108654|21386749": ["Moreover, the interaction between the real world and its digital counterpart using secure and real-time technologies may lead to the solution of many issues related to smart cities, pollution monitoring, transportation, remote health care and more [1]-[3]."]} +{"51973597|4427557": ["tances greater than 15 km in sub-GHz bands [30]."]} +{"51973597|6556803": ["It is usually accepted that this otherwise infinite lifespan of motes may come to an end with certain small probability [6], [10].", "framework stands out for its particularly well-suited form, optimal results and mathematical robustness [10]."]} +{"2527194|18801114": ["spectrum scanning for dynamic frequency allocations or utilize continuous frequency hopping to solve the interference problem [37] [38] [39] [40] [41]."]} +{"2527194|2535224": ["For example, in [22] it is shown that, by using TSCH, a deterministic guarantee can be provided on the bandwidth in a smart grid environment."]} +{"2527194|28210515": []} +{"67705277|4427557": ["On the other hand, LPWAN networks promise and enable very long-range devices to spread and move over wide coverage areas (Raza, Kulkarni, and Sooriyabandara 2017).", "In Raza, Kulkarni, and Sooriyabandara (2017) survey different LPWAN standards and technologies where they concluded that LPWAN technologies adopt similar approaches and have the same limitations and challenges.", "The LPWAN devices are expected to be approximately 25% of overall IoT things (Raza, Kulkarni, and Sooriyabandara 2017).", "In general, SigFox MAC protocol uses the ALOHA protocol as a wireless channel access mechanism (Raza, Kulkarni, and Sooriyabandara 2017)."]} diff --git a/edge/graph_201710040.jsonl b/edge/graph_201710040.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdbc7e7060443041723d8acb19006b0626df2810 --- /dev/null +++ b/edge/graph_201710040.jsonl @@ -0,0 +1,17 @@ +{"14343656|987239": ["Features Global shape descriptors, such as statistics of shapes [21] and distance functions [15], have been used for 3D shape retrieval [25]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"2088679|393948": []} +{"3943864|987239": ["We refer the readers to [34, 13] for a comprehensive survey of 3D shape retrieval."]} +{"53161946|206602044": ["While classical approaches [2, 3, 4] resorted to careful feature design coupled with a predefined metric,"]} +{"4664195|10355303": ["While extensive efforts have been devoted and a large number of trackers have been developed over the past two decades [1]\u2013[19], generic visual object tracking still remains a challenging problem in computer vision due to large appearance variations in visual objects such as varying deformations, illuminations, out-of-plane rotations, occlusions, and cluttered backgrounds (see more detailed discussions in [20] and [21])."]} +{"4939466|987239": ["Most of the existing works fall into the \ufb01rst group, which is provided with a query 3D model and returns similar models [1]\u2013[7].", "Most of the existing works about 3D shape retrieval is the example-based framework [1], [3], [5]\u2013[7], [18]\u2013[32], which could be roughly classi\ufb01ed into three categories, projection based methods, diffusion based methods and deep learning based methods."]} +{"31888400|17221751": ["For a comprehensive survey, we refer readers to [34]."]} +{"13599403|4570087": ["Person re-ID lies inbetween image classi\ufb01cation [14] and instance retrieval [19] in terms of the relationship between training and testing classes (Table 1).", "For basic knowledge and state-of-the-art advances of the inverted index in instance retrieval, we refer readers to a recent survey [19]."]} +{"13599403|3693305": ["On the other hand, when it comes to retrieval, ef\ufb01cient indexing structures [22] and hashing techniques [23] can be bene\ufb01cial for re-ID in a large gallery.", "Hashing has been an extensively studied solution to approximate nearest neighbor search, which aims to reduce the cost of \ufb01nding exact nearest neighbors when the gallery is large or distance computation is costly [23]."]} +{"168956|14171067": ["Edit distance has attracted most of the interest in the context of metric learning for structured data because (i) it is defined for a variety of objects: sequences (Levenshtein, 1966), trees (Bille, 2005) and graphs (Gao et al."]} diff --git a/edge/graph_201711392.jsonl b/edge/graph_201711392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201758142.jsonl b/edge/graph_201758142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a0053b9a834959741bd7ec2475fa3ed3708b225 --- /dev/null +++ b/edge/graph_201758142.jsonl @@ -0,0 +1 @@ +{"53011090|31783303": []} diff --git a/edge/graph_20178897.jsonl b/edge/graph_20178897.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201809871.jsonl b/edge/graph_201809871.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..381fdb3a9523d9e46acb99c7a33f0a8f3ac05e89 --- /dev/null +++ b/edge/graph_201809871.jsonl @@ -0,0 +1,38 @@ +{"10893614|8310135": []} +{"52012682|14753570": []} +{"52012682|2809360": ["We have chosen the biomedical domain for our evaluation benchmarks owing to its ontological maturity and to the fact that its language use variability is exceptionally high [40]."]} +{"16320392|2082499": ["Another related problem is record linkage [34], [35], [36], [37], [38], [39], [40], [41] (also called duplicate detection, entity matching, and reference reconciliation) in the database community."]} +{"16320392|8310135": []} +{"16320392|386036": []} +{"5512173|11777996": []} +{"15329947|431089": ["A comprehensive overview of such methods is provided in [28]."]} +{"9637604|11385769": ["On the other hand, there are many non-Arabic OL systems [5]."]} +{"7442988|1142636": ["Reeve and Han [13] presented a short survey about the classification and evaluation of six semantic annotation platforms.", "They analysed some existing annotation tools from both the functionality perspective ([14], [15], [17], [18] and [19]) and from the efficiency perspective ([13] and", "We can find that the surveys [13], [14], [15], [19] and [20] were mainly focusing on documents, as well as the surveys [17] and [18] paid major attention to images or videos.", "a more recent and detailed analysis is still required; (2) among these surveys, only three of them ([13], [17] and [19]) have taken into account and generally discussed the semantic", "Reeve and Han [13] presented a short survey about the", "Hanbury [17] summarized five types of image annotation methods and then used it to analyse ten annotated image datasets."]} +{"7442988|51338": ["We can find that the surveys [13], [14], [15], [19] and [20] were mainly focusing on documents, as well as the surveys [17] and [18] paid major attention to images or videos.", "They analysed some existing annotation tools from both the functionality perspective ([14], [15], [17], [18] and [19]) and from the efficiency perspective ([13] and"]} +{"7442988|29395800": ["We can find that the surveys [13], [14], [15], [19] and [20] were mainly focusing on documents, as well as the surveys [17] and [18] paid major attention to images or videos.", "They analysed some existing annotation tools from both the functionality perspective ([14], [15], [17], [18] and [19]) and from the efficiency perspective ([13] and"]} +{"26305404|8310135": []} +{"35883485|1546662": []} +{"35883485|17323154": []} +{"35883485|60455": []} +{"49587276|18484924": ["They also achieved 78.72 on Arabic, 72.19 on Czech and 91.30 on Turkish.", "There have also been surveys focused on NER systems for speci\ufb01c domains and languages, including biomedical NER, (Leaman and Gonzalez, 2008), Chinese clinical NER (Lei et al., 2013), Arabic NER (Shaalan, 2014; Etaiwi et al., 2017), and NER for Indian languages (Patil et al., 2016).", "NER shared tasks have also been organized for a variety of other languages, including Indian languages (Rajeev Sangal and Singh, 2008), Arabic (Shaalan, 2014), German (Benikova et al., 2014), and slavic languages (Piskorski et al., 2017).", "(2016) implemented word level feed forward NN, bi-directional LSTM (bi-LSTM) and window bi-LSTM for NER of English, German and Arabic."]} +{"49587276|1271753": ["Eltyeb and Salim (2014) presented an survey of various NER systems developed for such NER datasets with a focus on chemical NER."]} +{"49587276|42939535": ["There have also been surveys focused on NER systems for speci\ufb01c domains and languages, including biomedical NER, (Leaman and Gonzalez, 2008), Chinese clinical NER (Lei et al., 2013), Arabic NER (Shaalan, 2014; Etaiwi et al., 2017), and NER for Indian languages (Patil et al., 2016)."]} +{"49587276|8310135": ["These systems were followed by NER systems based on feature-engineering and machine learning (Nadeau and Sekine, 2007).", "The \ufb01rst comprehensive NER survey was Nadeau and Sekine (2007), which covered a variety of supervised, semi-supervised and unsupervised NER systems, highlighted common features used by NER systems during that time, and explained NER evaluation metrics that are still in use today."]} +{"53081555|386036": ["A comprehensive survey on this topic is available in [14]."]} +{"6350504|1142636": []} +{"17109573|8835588": ["OntoLearn [6] extracts domain terminology from Web documents by using a linguistic processor and a syntactic parser."]} +{"43637778|2809360": []} +{"43637778|431089": ["In the broader biomedical domain, relation extraction has received considerable attention, such as for the purpose of extracting protein\u2013protein interactions from the biomedical literature [50,51]."]} +{"206609394|1271753": []} +{"28727006|16575201": ["Termhood refers to the degree that a linguistic unit is related to or represents domain-speci\ufb01c concepts (Kageura & Umino, 1996)."]} +{"49414804|8310135": ["For a systematic review of NER techniques, we recommend [22]."]} +{"6420241|8310135": ["See for example [40, 2, 28, 9, 11], and the review article by Nadeau and Sekine [32]."]} +{"6420241|386036": ["For a comprehensive survey on string similarity metrics for duplicate names, we refer the reader to [14]."]} +{"10203879|8310135": ["information extraction problems have been considered such as named entity recognition [17, 10], named entity classification [12, 21] and relation extraction [3, 25]."]} +{"3851465|11385769": []} +{"15504033|1142636": ["The method type can be organized based on the classification presented in [7]:"]} +{"31023083|885218": []} +{"29722419|8310135": []} +{"448805|8310135": ["Named Entity Recognition (NER) deals with the identi\ufb01cation of entity mentions in a text and their classi\ufb01cation into coarse-grained semantic types (person, location, etc.) (Finkel et al., 2005; Nadeau & Sekine, 2007; Ratinov & Roth, 2009)."]} +{"20998026|885218": []} +{"4527007|8310135": []} diff --git a/edge/graph_201809995.jsonl b/edge/graph_201809995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf089314848a53b9d2b990c54540395f373a0801 --- /dev/null +++ b/edge/graph_201809995.jsonl @@ -0,0 +1,22 @@ +{"17203712|5724477": ["Previous studies used features from both time and frequency domain representations of signals for activity recognition [30]."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"2215820|7788290": ["Traditionally, researchers used vision sensors for activity recognition[2][3]."]} +{"16527268|5313655": []} +{"16527268|359842": []} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"122523543|33286487": []} +{"3712973|11154506": ["In 1878, Edward Muybridge and Leland Stanford were the \ufb01rst ones to study the gait mechanism (Whittle 2014).", "To generalize the gait pattern over a larger set of population researches (Mahyuddin et al. 2012; Whittle 2014) collected data.", "Vision-based approach are used to recognize gait, segment position and gait phase detection as presented by Moeslund and Granum (2001), Whittle (2014), Aggarwal and Cai (1999), Poppe (2007), Moeslund et al. (2006), Little and Boyd (1998), Prakash et al. (2015a,c).", "Spatiotemporal, kinematic and kinetic parameters were considered in study in United States (Kadaba et al. 1990; Moisio et al. 2003; Whittle 2014).", "Whittle (2014) suggests that gait comparison makes more sense than walking comparison."]} +{"3712973|2814871": []} +{"3712973|5664472": ["Computational techniques and gait parameters can be used to control events in the enter-tainment industry through human-computer interfaces (Liu et al. 2007; Ke et al. 2013).", "4 Control based applications Computational techniques and gait parameters can be used to control events in the entertainment industry through human-computer interfaces (Liu et al. 2007; Ke et al. 2013)."]} +{"3712973|11042075": []} +{"3712973|1634674": ["Recently various computational techniques have been proposed to analyze actions, activities and behavior of crowd and individuals (Turaga et al. 2008; Kr\u00fcger et al. 2007; Hu et al. 2004)."]} +{"3712973|17516538": ["Recently various computational techniques have been proposed to analyze actions, activities and behavior of crowd and individuals (Turaga et al. 2008; Kr\u00fcger et al. 2007; Hu et al. 2004).", "From the video captured, through video camera either based on the model, appearance or hybrid approach can be used to analyze the features of the subjects (Lu et al. 2014; Hu et al. 2004)."]} +{"3712973|14970359": ["Vision-based approach are used to recognize gait, segment position and gait phase detection as presented by Moeslund and Granum (2001), Whittle (2014), Aggarwal and Cai (1999), Poppe (2007), Moeslund et al. (2006), Little and Boyd (1998), Prakash et al. (2015a,c)."]} +{"18112361|7185733": ["In [52] and [49], each gesture was considered to consist of three phases: pre-stroke, nucleus, and post-stroke."]} +{"788439|2814871": []} +{"14844513|11042075": ["It should be pointed out that the machine vision-based approach [4, 5] has the advantage that it does not inherently impose requirements on the subject and in fact can be employed without the subject\u2019s consent or even knowledge."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"38218765|5238287": []} diff --git a/edge/graph_201812490.jsonl b/edge/graph_201812490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afb3bcb954668e4a1d01b9c8cd275d4e4339034f --- /dev/null +++ b/edge/graph_201812490.jsonl @@ -0,0 +1,73 @@ +{"35977534|17381415": ["The PLL scheme implemented is based on the positive-sequence d-q frame transformation [28]."]} +{"51984239|38410996": ["In order to ensure system stability, many damping methods have been developed, such as passive damping and active damping [8], [14], [21], [35]\u2013[37]."]} +{"51984239|17381415": ["Grid-connected voltagesource converters (VSCs), as common ac/dc or dc/ac energy conversion units, have been widely used in modern power systems for easy integration of renewable sources and energy storages [1]\u2013[5]."]} +{"23839576|17381415": [", grid impedance [2], background harmonics [1]\u2013[3], and grid voltage sags or swells, which often occur in weak grids [4]."]} +{"25769371|17381415": ["Generally, the phase angle of v\u2032 g is obtained through a phase-locked loop (PLL), and the current amplitude reference is generated by the outer voltage loop [1].", "As an interface between the DPGSs and power grid, a grid-connected inverter plays an important role in injecting high-quality power into the grid [1]."]} +{"29435661|17381415": ["With the increasing penetration of DERs, inverters are developed as the plug and play devices and are usually paralleled together to scale up the generation capacity [1]."]} +{"33984258|17381415": ["quality ac power and inject it into the grid reliably [1]."]} +{"1101979|17381415": ["Most grid-connected VSCs use current control in a rotating (dq) reference frame [8], which is synchronized to the fundamental component of the grid voltages by means of a phase-locked loop (PLL) [9]."]} +{"42930563|17381415": ["8(b)] is set by the dc link voltage controller to inject all the available active power [32].", "PV applications usually include the current-controlled inverters synchronized to the grid through PLL [32], [33]."]} +{"52305359|4643404": ["2832027 types, circuit topologies, control strategies, and modulation techniques [1], [2]."]} +{"33780133|17381415": ["Grid-connected voltage source inverters (VSI) have been widely used in applications like uninterruptible power supply (UPS) and distributed power generation (DG) [1], [2]."]} +{"6587590|17381415": ["quality power into the grid [1]."]} +{"10185682|12083425": ["If the switching frequency is high, the filter resonant frequency may be chosen low enough such that any significant sideband harmonics are above the resonant frequency yet high enough that it will not present a challenge to the current-control-loop stability [13]\u2013[16]."]} +{"10185682|17774971": ["This paper discusses the grid-filter design for a mediumvoltage multilevel voltage-source inverter (VSI) [18], [19] in a"]} +{"38410996|17381415": ["Grid-tied inverters are key components in connecting renewable energy sources with the existing power grids [1]\u2013[4]."]} +{"33573721|17381415": []} +{"33573721|12083425": []} +{"39709356|17774971": ["the number of the switches increased by multilevel inverters [11]\u2013[14], the filter current ripple frequency can be increased by the phase-shifted PWM strategy [15]\u2013[19]."]} +{"19359983|17381415": ["There is a trend that the LCL filters will be employed for all the grid-connected inverters in the future [10]."]} +{"115241690|9450094": ["However, these methods change filter attenuation and increase losses [17,30,33].", "According to [5], the passive damping strategies can be sorted into three groups:\n Series passive damping (SPD) [14,17,22,28,30,54,56]; Parallel passive damping (PPD) [34,90]; Complex passive damping schemes (CPD) [5,17,22,58,91\u201393].", "This problem is reported in many works in the literature and many damping methods are proposed to solve it [5,14,30,32].", "Passive damping consists in inserting passive elements in the filter, in order to reduce the resonant peak of the system [30].", "\uf0b7 Series passive damping (SPD) [14,17,22,28,30,54,56]; \uf0b7 Parallel passive damping (PPD) [34,90]; \uf0b7 Complex passive damping schemes (CPD) [5,17,22,58,91\u201393].", "This technique provides a simple and cost effective solution [30].", "Transfer functions for some complex passive damping strategies can be found in [30]."]} +{"115241690|17381415": ["In this situation, it is possible to control the active and reactive power injected into the grid [1,28].", "Grid-connected solar photovoltaic systems are among these sources and play an important role in distributed generation [1].", "In grid-connected applications with LCL filters, the current is generally controlled in synchronism with the PCC voltage [1,4,15]."]} +{"28655906|17381415": ["The pulsewidth modulation (PWM) inverter is the most commonly used topology for interfacing this green power source to the utility grid [ 1 ], [2]."]} +{"20056911|12083425": []} +{"53083309|17381415": ["When regulated in the synchronous dq0-frame, simple proportional-integral (PI) controllers allow accurate AC current tracking with zero steady state errors, because sinusoidal signals have already been mapped into their magnitudes through the well-established abc to dq0 transformation [3]."]} +{"53083309|12083425": []} +{"6583534|17381415": ["In the first case, the stability is guaranteed via the control of more system state variables that are measured or estimated [16]\u2013[21]."]} +{"8926342|17381415": ["the grid reliably [1]."]} +{"26127029|17381415": ["high-quality power into the grid [1]\u2013[3]."]} +{"14844385|17381415": []} +{"110089949|17381415": []} +{"52126947|17381415": ["INTRODUCTION he growing penetration of the power electronicsinterfaced renewable energy sources lead to the emergence of power-electronic-based power systems into electrical grids, such as wind farms [1], photovoltaic power plants [2], and micro-grids [3]."]} +{"10064066|17381415": ["A S an interface between distributed power generation systems and the power grid, a grid-connected inverter is important in power conversion and guaranteeing to inject high-quality power into the grid [1]."]} +{"52014677|17381415": ["As the interface between the DPGS and the grid, the grid-connected inverter plays an important role in injecting high-quality current into the grid [1]."]} +{"53629871|17381415": ["The proposed GPC strategy was compared against a PDB controller, which is the preferred choice in the natural reference frame [26]."]} +{"53629871|12083425": ["IN GRID-CONNECTED renewable energy sources, the grid-side voltage source inverter (VSI) injects distorted current into the grid, so its harmonic content must be controlled in order to meet power quality standards [1]."]} +{"11230872|17381415": ["Phase-locked loops (PLLs) [9], [10] are needed for VSCs to synchronize with the grid."]} +{"15395776|17381415": ["(PWM) rectifiers are often used in regenerative energy systems and in adjustable-speed drives when regenerative braking is required [ 1 ]\u2010[5].", "Beyond L filters, LCL filters are used for grid connections [ 1 ]."]} +{"15395776|12083425": []} +{"25051407|17381415": ["ergy, such as wind energy, microhydroenergy, and solar energy, which are rapidly increasing their share in distributed generation (DG) [1]."]} +{"32470495|17381415": ["In general, \u03b8 is obtained by a phase-locked loop, and I \u2217 is determined by an outer voltage loop [14], [15]."]} +{"32470495|12083425": ["NOWADAYS, distributed power generation systems (DPGSs) based on wind energy, solar energy, and so on, gain much attention for their environmental friendly features [1]."]} +{"117527891|17381415": []} +{"35591810|17381415": ["INTRODUCTION A grid-connected inverter is equipped with an LCL filter after its output[1]-[3]."]} +{"31074775|17381415": ["Grid-connected converters are increasingly used in power conversion applications, such as distributed power generation systems [1]\u2013[3], uninterruptible power supplies [4], [5] and active power filters [6]\u2013[8]."]} +{"6859782|17381415": []} +{"6859782|12083425": []} +{"52014431|38410996": ["TO OFFER a high degree of modularity, scalability, adaptability, maintainability, and autonomic behaviors, large number of distributed power generation (DPG) units have been expected to deliver energy to the distributed network via multiple parallel-connected dc\u2013ac converters [1]\u2013[3]."]} +{"52014431|17381415": ["TO OFFER a high degree of modularity, scalability, adaptability, maintainability, and autonomic behaviors, large number of distributed power generation (DPG) units have been expected to deliver energy to the distributed network via multiple parallel-connected dc\u2013ac converters [1]\u2013[3]."]} +{"116418633|17381415": ["Power quality has therefore emerged as a popular research area in the field of distributed power generation systems based on renewable energy, such as wind and solar energy [1], [2].", "In this paper, the maximum harmonic compensation order is the 25th and hence, k \u03b5 [1, 2, 3, 4]."]} +{"41816752|17381415": ["W ITH increasing concerns related to conventional energy costs, greenhouse gas emissions, and the security of centralized power generations, the power industry is experiencing structural changes as more distributed generation (DG) units are integrated into low-voltage (LV) power distribution systems [1], [2]."]} +{"41816752|12083425": ["W ITH increasing concerns related to conventional energy costs, greenhouse gas emissions, and the security of centralized power generations, the power industry is experiencing structural changes as more distributed generation (DG) units are integrated into low-voltage (LV) power distribution systems [1], [2]."]} +{"32243122|17381415": ["A large numbers of voltage source converters (VSC) are installed as interface between grid and DG systems, which use full controlled switching devices such as IGBT/MOSFET, providing more control freedom degree [1]."]} +{"115684757|38410996": ["Many damping methods have been reported to address this issue [3].", "It has been mentioned in [3] that the Nyquist stability criterion gives out two requirements for the grid side current controlled LCL grid-tied inverter system to be stable."]} +{"2032262|17381415": []} +{"145945857|17381415": ["inverters (VSIs) have beenwidely applied for integratingDPGSs into power grids [1]."]} +{"53080050|17381415": []} +{"15344629|17381415": ["For the reduction of line current ripple, LCL filters are often used as grid filters [ 2 ]."]} +{"116416101|17381415": ["Introduction Grid-connected voltage source power converters (VSC) are largely used as an interface with the grid for renewable power systems [1, 2, 3, 4]."]} +{"116416101|12083425": ["Introduction Grid-connected voltage source power converters (VSC) are largely used as an interface with the grid for renewable power systems [1, 2, 3, 4]."]} +{"117420831|17381415": []} +{"12962558|17381415": ["AC/DC or dc/ac grid-connected voltage-source converters have been extensively employed in distributed generation (DG) and energy storage systems to flexibly control the energy flow among various power sources and electric loads [1]."]} +{"117402272|17381415": ["AN LCL-TYPE grid-connected inverter is an important power conversion interface in modern power distribution systems [1]."]} +{"10888387|12083425": []} +{"6283900|17381415": []} +{"1727610|17381415": ["GRID-CONNECTED converters have increasingly been used for power conversion in distributed power generators [1]\u2013[4], uninterruptible power supplies [5], [6] and active power filters [7]\u2013[9]."]} +{"23854769|17381415": ["In such grid-connected mode, the inverter is typically controlled as a current source [1] to inject certain amount of current into the grid.", "Grid synchronization methods [1] also have strong effects on the inverter output impedance, which have not been given much attention so far and will be studied in a future work."]} +{"52300700|17381415": ["W ITH the development of distributed power generation systems based on renewable sources, three-phase gridconnected inverters are widely used to connect the systems to the public grid [1]."]} +{"53605154|17381415": ["role in the distributed power generation systems [3]\u2013[5]."]} +{"19790184|17381415": [", photovoltaic and wind generation, energy storage systems, and uninterrupted power supplies [1], [2]."]} +{"19175145|17381415": ["In grid-connected modes, the VSIs behave as a voltage controlled current source [1].", "es (normally \u03bb \u2264 1 [5]; in this paper, \u03bb is assumed to a random value to derive the damping ranges of time delay) represents the processing delay including delay time for ADC, computation, and duty-ratio update [4], [5]; kPWM = Vdc / 2 is the gain of PWM; Gc(z) is the compensator, and conventionally a PI or PR controller is used [1]."]} +{"21654723|17381415": ["a popular and cost-effective application [1]."]} +{"43394165|17381415": ["Because of the rapidly increasing number of distributed power generation systems (DPGS) based on renewable energy connected to grid, stricter standards of power quality are issued [2]."]} +{"9018266|17381415": []} diff --git a/edge/graph_201812672.jsonl b/edge/graph_201812672.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af0541b953b8b1904ce200fd45d92813e3357642 --- /dev/null +++ b/edge/graph_201812672.jsonl @@ -0,0 +1,35 @@ +{"52155261|8999817": ["Hence hybrid beamforming techniques are introduced into the mmWave massive MIMO systems [4]."]} +{"53229703|22221919": ["2We adopt the max-min fairness because it is a typical and extensively used fairness rule in NOMA [11], [25].", "For power-domain NOMA, the signals are superimposed with different transmission powers at the transmitter, and successive interference cancellation (SIC) is required at the receivers to remove the multi-user interference [6]\u2013[11].", ", low-density spreading (LDS), sparse code multiple access (SCMA), multiuser shared access (MUSA), pattern division multiple access (PDMA), and so on [9], [11], [13]."]} +{"41685384|7350786": []} +{"22900479|8323234": ["\u2026features: a) the spatial sparsity of channels due to the high path-loss of NLOS paths, b) the low signal-to-noise-ratio (SNR) experienced before beamforming, and c) the much smaller number of RF chains than that of the antennas due to the hardware constraints in mmWave communications [11], [12].", "(24) in 11], where s is the sparse channel vector in the angular domain, the hybrid precoding and combining matrices as well as the angular domain transform matrix compose \u0398 .", "However, the operation of this CS-based hybrid precoding scheme is limited to narrow-band channels, while practical broadband mmWave channels exhibit frequency-selective fading, which leads to a frequency-dependent hybrid precoding across the bandwidth [11].", "To this end, hybrid analog-digital precoding relying on a much lower number of RF chains than that of the antennas has been proposed, where the phase-shifter network can be used for partial beamforming in the analog RF domain for the sake of an improved spatial multiplexing [11].", "In order to reduce the training overhead required for accurate channel estimation, CS-based estimation schemes have been proposed in [11], [12] by exploiting the sparsity of mmWave channels.", "As another promising candidate, mmWave communications is capable of facilitating high data rates with the aid of its wider bandwidth [1], [11], [12].", "(18) in 11]."]} +{"8639012|3055684": ["Another recent survey in [10] provides an overview of self-sustaining wireless communications with different energy harvesting techniques, from the perspective of", "Unlike [10], this survey focuses on the wireless charging strategies in communication networks with wireless energy"]} +{"8639012|12029139": ["Survey Scope Main Contribution [9] Wireless network with RF energy harvesting Review of i) fundamentals and circuit design for RF energy harvesting, ii) resource allocation schemes and communication protocols for various types of RF-powered wireless network, and iii) practical challenges and future directions.", "5) Near-field SWIPT System: As afore-introduced, SWIPT (see [9] and references therein) has been broadly investigated in RF-based wireless communication systems.", "A more detailed review on the conversi on efficiency of RF energy harvester implementations can be found in [9], [14].", "The reader can r efer to [9] for more detailed information about recent advances in radiative charging system.", "This survey differs from [9] in the following aspects: this survey i) covers various major wireless charging techniques, namely, inductive coupl ing, magnetic resonance coupling and RF/microwave radiation, from fundamental principles to their applications, ii) rev iews the existing international standards, commercialization and implementations, and iii) emphasizes on the transmitter-s ide (i.", "Our prev ious work in [9] presented a review of research issues in RFpowered wireless networks with the focus on the receiver-si de (i."]} +{"8639012|12681089": ["The far-field RF propagation models are well known in literatures [230], [231]."]} +{"8639012|12060835": ["In [12], the authors gave an overview of the sensor nodes powered by", "Existing literatures [12]\u2013[14] also presented relevant reviews"]} +{"23713679|8323234": []} +{"2098713|206583375": ["There has been considerable literature on indoor localization 802 [18]."]} +{"76664774|201812672": ["other for several reasons [4], [5], [14]: 1) The practical coupling effects that cause spatial interference (such as the unavoidable side lobes) can be mitigated to guarantee the isolation and"]} +{"76664774|14247248": ["1 Compared to the rich scattering channel model often used for microwave frequencies [2], [46], mmWave channels are better characterized by a limited number of scattering clusters [5].", "The highly directional propagation and high dimensionality of mmWave MIMO channels make beam-domain representation a natural choice [2]."]} +{"76664774|8323234": ["ment, divides the signal processing in MIMO systems into low-dimensional digital precoders/combiners, and high-dimentional analog precoders/combiners that are implemented with low-cost phase shifters [21]. This hybrid transceiver topology is further categorized into the fully-connected and partially-connected structures in terms of how RF chains are mapped to antennas. In a fully-connected structure, "]} +{"146811778|2000518": ["Combinations of multiple 3D displays are most established to extend a single view and gain a larger \ufb01eld of view (e.g., tiled displays and CAVE setups (see [27])."]} +{"49557456|8323234": []} +{"13742577|8999817": ["Most of the prior research has focused on developing beamforming strategies [8]\u2013[10], evaluating the performance [11]\u2013[13], or studying the practical feasibility of mmWave communication at fixed or lowmobility wireless systems [14]\u2013[16]."]} +{"13742577|8323234": ["We normally resort to stochastic models in generating these parameters [1], [40], [48].", "For simplicity, we assume that every BS has only one RF chain and is applying analog-only beamforming using networks of phase shifters [1].", "INTRODUCTION Millimeter wave (mmWave) communication attracted considerable interest in the last few years, thanks to the high data rates enabled by its large available bandwidth [1]\u2013[3]."]} +{"132165323|10235514": ["To meet that dramatic traffic growth, nextgeneration mobile networks are also expected to achieve a 1000-fold capacity increase and 10\u2013100 times higher typical user data rate with massive device connectivity, compared to the current generation wireless network deployments [3], [4]."]} +{"70119263|21557844": ["According to mmWave terrestrial channel model study and field trials [8]-[10], mmWave channels are characterized by high propagation loss, strong shadowing effects and blockage (a) (b)"]} +{"678032|8323234": ["Rain attenuation in different frequency bands [35]. needs to increase with the bandwidth if the signal-to-noise ratio (SNR) should remain intact [14].", "[14] is a recent overview paper on signal processing for mmWave MIMO.", "However, since the analog circuit can only partly adjust the signals, it is hard to adjust the beam to the channel conditions and this leads to a considerable performance loss [14], particularly for mobile users.", "However, realizing a fully digital MIMO implementation at mmWave frequencies is a non-trivial task, using current circuit design technology [14].", "The analog circuits of the hybrid architecture can be implemented by different circuit networks, leading to different hardware constraints [14], [115], [116].", "Yet, reference [14] is focused in mmWave MIMO and other topics e.g., recent developments of channel measure/modeling, multiple access, standardization, \ufb01eld test are missing.", "Note that references [7], [12]\u2013[14], [16] gave excellent overviews of some aspects of mmWave mobile networks from different aspects.", "In addition, fully analog architecture can only support single-stream transmission, which cannot achieve the multiplexing gain to improve spectral ef\ufb01ciency [14]."]} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"53246040|21557844": ["On the aspect of UE cellular design, employing mmWave as 5G high bands brings up seveal major technical challenges including, high propagation loss [8], serious human blockage and human shadowing issues [9], high penetration loss, and weaker diffraction capability due to the stronger particle nature when frequency increases."]} +{"49867671|8999817": ["Propagation and hardware implementation aspects are different at mmWaves; for example, hybrid analog-digital beamforming approaches are typically considered [6]."]} +{"195740426|21557844": ["For all mmWave frequencies where the urban cell sizes are on the order of 200 m, rain or snow attenuation can clearly be overcome with additional antenna gain (obtainable by switching in more antenna array elements) [2], [4], [6].", "These frequency bands could easily be used for high speed 6G mobile wireless networks with up to km size coverage range, and perhaps even up to 10 km or beyond in \ufb01xed applications [4], [25], [105]\u2013[107].", "This feature makes THz signals exceedingly dif\ufb01cult to intercept or eavesdrop [4], [10], [25], [29].", "\u2026model had slightly better PLE and standard deviation stability for the indoor environments than the single-frequency CI and Floating Intercept (FI) models (although a sensitivity analysis such as provided in [133] has not yet been performed for indoor sub-THz channels) [4], [132], [134]\u2013[136].", "\u2026free space loss, making these particular bands well suited for very short range and secure communications such as \u201cwhisper radio\u201d applications, where massive bandwidth channels will attenuate very rapidly out to a few tens of meters, meters, or fractions of a meter [2], [4], [6], [25], [104].", "Theoret-ically, the path loss in free space decreases quadratically as frequency increases , so long as the physical size of the antenna (effective aperture) is kept constant over frequency at both link ends [4], [6], [28], [118].", "\u2026autonomous driving, Internet of Things (IoT), and wireless backhaul (as a replacement for labor-intensive installation of optical \ufb01ber) [3], [4], as well as newer applications that have not been conceived yet, will need even greater data rates and less latency than what 5G networks will\u2026"]} +{"3021451|15453366": ["2520912 challenge of bandwidth shortage [1]\u2013[3]."]} +{"21557844|2535224": ["\u2026will also require novel network architectures that support the convergence of different wireless technologies (e.g., WiFi, LTE, mmWave, and low-power IoT) that will interact in a \ufb02exible and seamless manner using Software De\ufb01ned Networking and Network Virtualization principles [55], [56]."]} +{"21557844|8909218": ["An effective way to increase area spectral ef\ufb01ciency is to shrink cell size [40], [45], [46] where the reduced number of users per cell, caused by cell shrinking, provides more spectrum to each user.", "\u2026to the operator\u2019s core network will face challenges, such as managing RF interference and keeping timing and synchronization, and various interference avoidance and adaptive power control strategies have been suggested [45] concurrent with the move to high-speed base-band communications to RRHs."]} +{"21557844|3054454": ["It is not obvious that the stationarity region size or small-scale statistics derived from 3GPP TR 36.873 [96] and other sub-6 GHz channel models, or those used by 3GPP or International Telecommunications Union (ITU) above 6 GHz are valid for mmWave channels [80], [97]\u2013[100]."]} +{"13753997|2088679": []} +{"33168008|11720829": ["In many current wireless communications systems operating at microwave frequencies, data capacity has been improved by increasing the spectral efficiency by means of advanced modulation schemes and signal processing technologies [5], [6]."]} +{"195345103|25929315": ["However, such grant-based solutions generally suffer from high access latency and require complicated collision resolution schemes in massive access scenarios [8]."]} +{"14288281|15453366": ["11ad, have been proposed to enable multi-gigabit transmission rate to be achieved in short-distance applications [1]."]} +{"30055310|18056109": ["TCI images of cancer or other pathologic diagnosis have been reported as a THz medical application [15], [47], [48], [50], [64]."]} +{"133608391|4572654": ["The growth of mobile traffic in the next decade is over a thousand times [2]."]} diff --git a/edge/graph_201814205.jsonl b/edge/graph_201814205.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b7a8208b44adb747a5da584cef82dd3514cce2c --- /dev/null +++ b/edge/graph_201814205.jsonl @@ -0,0 +1,8 @@ +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"15271419|1230643": ["data to BS, often called sink. Usually nodes in WSNs are power constrained due to limited battery resource. It is also not possible to recharge or replace the battery of already deployed sensor nodes [1, 2, 3]. Routing protocols play important role in achieving energy e\ufb03ciency in WSNs. Clustering is used to minimize energy consumption. In this technique members of the cluster elect a CH [4, 5]. All nodes b"]} +{"8684061|1230643": []} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} diff --git a/edge/graph_201814244.jsonl b/edge/graph_201814244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ec2f132ce1aafffe82bdae4eea723eb0d902f6c --- /dev/null +++ b/edge/graph_201814244.jsonl @@ -0,0 +1,2 @@ +{"1169808|5768126": ["research, and interesting results have been reported, see [92], [186], [187], and the references therein."]} +{"122378233|5768126": []} diff --git a/edge/graph_201814338.jsonl b/edge/graph_201814338.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f1d056d32637f805de0ad363bc079c2980cd1f9 --- /dev/null +++ b/edge/graph_201814338.jsonl @@ -0,0 +1,96 @@ +{"10662687|7644489": ["As one of key technology of 5G technologies, device-to-device (D2D) communication enables wireless transmission between users over the direct link which brings a lot of advantages to the networks [2]."]} +{"644671|17109970": ["In [14], a number of noncooperative power control games for resource allocation in code-division multiple-access networks with emphasis on EE were presented, where the users can choose their uplink receivers, transmission rates, and carrier-allocation strategies, in addition to choosing their transmit powers."]} +{"8578666|3330461": ["In general, D2D communications can be classified into two types [4]: in-band D2D, where D2D links utilize cellular spectrum and out-of-band D2D, where D2D links exploit unlicensed spectrum (e.", "To date, majority of the literature is dedicated to in-band underlay D2D systems [4] due to the fact that it has advantages such as improved spectral-efficiency/energyefficiency, and reduced end-to-end delay."]} +{"8578666|7644489": ["One of the main challenges in D2D cellular network is how to allocate resource (time, frequency and space) for D2D users [8], [9].", "Both dynamic resource allocation (based on current D2D transmission demand) and static (certain resources are periodically reserved for D2D communication) resource allocation are discussed in [8]."]} +{"3585389|22221919": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massiveMIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cellular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machine (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "In addition, se veral survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cell ular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machi ne (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "[59] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. s. Kwak, \u201cPower-domain non-orthogonal multiple access (NOMA) in 5G\nsystems: Potentials and challenges,\u201dIEEE Communications Surveys Tutorials, vol. 19, no. 2, pp. 721\u2013742, Secondquarter 2017."]} +{"3585389|10235514": ["Furthe rmore, the contribution in [51] provided a tutorial overview of 5G research activities, dep loyment challenges and standardization trials."]} +{"3585389|4572654": ["Several survey papers exist in the literature in the contextof dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as spectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underlay DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectrum assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfections [13], licensed spectrum sharing\ntechniques [45], and the coexistence of LTE and WiFi [46].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "techniques [45], and the coexistence of LTE and WiFi [46].", "Considering a typical WiFi setup with two nodesN1 andN2 trying to connect to the core network via an access point, theclassical hidden node problem occurs when the nodeN2 starts transmitting data to the access point without being able to hear transmissions from the nodeN1 to the access point, thus causing collision at the access point [73]."]} +{"3585389|4344513": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7], [59]\u2013[61], mmWave [7], [8], [62], Non-Orthogonal Multiple Access (NOMA) [63], [64], cellular and heterogeneous networks [65]\u2013[67], Internet of Things (IoT) [70]\u2013[73], Machine to Machine (M2M) communication [68]\u2013[70] and Device to Device (D2D) communication [74]."]} +{"3585389|13019489": ["sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|10979806": ["[58] carried out a detailed survey of the existing works in the areas of energy-efficient techniques for 5G networks, and subsequently analyzed various green trade-offs including spectrum efficiency versus energy efficiency, delay versus power, deployment efficiency versus energy efficiency, and bandwidth versus power for the effective design of energy-efficient 5G networks [57]."]} +{"3585389|7525856": ["and measurements [30]\u2013[32], interweave DSS [33], [34], [36], underlay DSS [37]\u2013[39], cooperative DSS [40], [41], Medium Access Control (MAC) protocols for DSS [42], spectrum deci-", "model [185], and (iii) Radio Environment Map (REM) which can be created either based on sensing information obtained from the sensor nodes or database information obtained from regulators/operators or both [34], [186]."]} +{"3585389|8606364": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"3585389|19938676": ["In the context of 5G wireless networks, authors in [50] provi ded a detailed survey on 5G cellular network architecture and described some of the eme rging 5G technologies including massive MIMO, ultra-dense networks, DSS and mmWave."]} +{"3585389|4122595": ["The detailed mapping of various spectrum awareness and exploitation techniques was provided in [13].", "The main enabling techniques for DSS in wireless networks can be broadly categorized into spectrum awareness and spectrum exploitation techniques [13].", "cal imperfections such as noise uncertainty, channel uncertainty, hardware imperfections, noise/channel correlation in the context of FD-CR communications [13].", "sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|8974063": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"61807868|19938676": []} +{"61807868|3330461": []} +{"52908388|3055684": []} +{"20986009|12029139": ["Cooperative relaying techniques can improve network coverage and are fully compatible with the SWIPT protocol.", "Since wireless signal can transport information as well as energy, simultaneously wireless information and power transfer (SWIPT) [5] strategies enable relays to perform energy harvesting and information gathering from the same signal radiated by the source.", "SWIPT in an orthogonal frequency division multiplexing (OFDM) relaying system is considered in [11], where a source transmits energy and information simultaneously to a relay and a relay retransmits the information to the destination with a power splitting based relaying protocol.", "The devices conduct energy harvesting via the SWIPT strategy which dually utilizes RF signal for information reception.", "Since the receiver cannot share the same portion of signal energy for both harvesting energy and extracting information, a more practical SWIPT protocol named on-off power splitting protocol for a point-to-point link is proposed in [9], which splits the received signal for energy harvesting and information processing with an adjustable power level.", "The idea of SWIPT is first proposed by Varshney in [8], and the tradeoff between energy harvesting and information transmission over one single noisy channel is characterized.", "[5] proposed a social-aware cooperative device-to-device (D2D) protocol that promotes the use of friendly users as relay and they also proved that exploiting social awareness can reduce the energy consumption of cooperative communication.", "SWIPT for large\nscale networks with multiple source-destination pairs is more complex and practical as the interference among devices needs to be considered.", "However, the aforementioned literatures only consider SWIPT for a single source-destination pair."]} +{"20986009|12060835": ["As for energy supply, energy harvesting through wireless radio frequency (RF) is promising in generating small amount of convenient electrical power for wireless devices [3], [4].", "In this paper, two representative performance metrics including outage probability and network throughput are characterized [3], which are defined as follows."]} +{"26412615|3330461": ["A survey on D2D communications in cellular wireless networks is presented in [11], [12]."]} +{"204937503|3330461": []} +{"53012231|61132": ["The increasing popularity of UAVs has motivated researchers to explore the opportunities and define the challenges for integrating UAVs into existing wireless networks (see [1] for a survey and [2] for a tutorial)."]} +{"11646727|3330461": ["In particular, this technology will facilitate direct communication between user equipments (UEs) without unnecessary routing through the network infrastructure [2]."]} +{"53245354|22221919": ["The dominant feature of NOMA is that it superimposes multiple users in a single resource (time/frequency/code) at the transmitter and applies successive interference cancelation (SIC) at the receiver [2], [3].", "Interested readers are referred to [2], [3], and [37] for more pedagogical discourse of NOMA as well as comprehensive surveys of the prior art."]} +{"53245354|7644489": ["could further boost the overall spectral efficiency of the cellular network due to its ability of offloading traffic from cellular networks [8], [9]."]} +{"62808548|8280144": []} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"14113671|3330461": ["To address the above-mentioned issue, three categories of interference-management techniques, namely mode selection, resource allocation and power control, have been proposed [4]:", "without relying on the intervention of base station (BS)) and offloading efficiently the local tele-traffics from the BS [4], has attracted wide attentions in both academia and industry."]} +{"21053653|3330461": ["dealing with out-band D2D communication both managed by the network and autonomously controlled are surveyed in [11].", "In [11], the authors give an overview of papers addressing inband D2D in terms of spectral efficiency, energy efficiency, cellular coverage and other performance targets.", "To be more precise, with respect to [11], [12] our survey:"]} +{"21053653|7644489": ["An overview of standardization activities in 3GPP focusing specifically on ProSe enabled communication is also described in [134]."]} +{"292102|22221919": ["Such new requirements impose unprecedented challenges that cannot be fulfilled via the conventional orthogonal multiple-access (OMA) with centralized base station controlled communications [4], [5]."]} +{"292102|3330461": ["Instead, the 3GPP considers more aggressive spectral utilization schemes such as device-to-device (D2D) communication [6], [7] and nonorthogonal multiple access (NOMA) [8], [9] to support such massive number of connections."]} +{"292102|8280144": ["Although the locations of two users are specified in this paper, it has been proved in [50] that the analysis holds for random d1, d2 and D."]} +{"22678385|875676": ["Some non-orthogonal FBMC schemes, such as generalized frequency division multiplexing (GFDM) and the faster-than-Nyquist approach, induce additional interference from neighboring subcarriers due to non-orthogonality [18], [19]."]} +{"22678385|8280144": ["16TC was introduced as a way to evaluate performance for specific communication strategies and different medium access control (MAC) protocols in ad hoc networks [85]."]} +{"30954764|3330461": ["Up till now, only a few 3 , 5 , 8 , 13 \u2013 16 surveys have been presented for general D2D communication, but there is no survey on mode selection, interference management, and resource allocation.", "Asadi et al 5 presented a more general survey on D2D communication where the survey is performed under the major topics of inband (overlay and underlay) and outband (autonomous and controlled) D2D communications.", "\u2026presented a taxonomy based more general review about D2D communication as in the work of Asadi et al. 5 It is clear from the works of Asadi et al 5 and Mach et al 15 that D2D is most beneficial in spectral and power efficiencies in inband underlay mode, and a lot of research is still needed to\u2026", "The survey in the work of Asadi et al 5 is mainly focused on the general advantages, limitations, and issues related to inband and outband D2D communications.", "Our survey is different from the work of Asadi et al 5 in the sense that it is not general but it is focused survey that provides a comprehensive and detailed overview of the mode selection, interference management, power con-trol, and spectrum allocation aspects of the underlay inband D2D\u2026", "Very few works related to some of the topics surveyed in our paper are also slightly touched in the work of Asadi et al 5 from a general perspective.", "As concluded in the work of Asadi et al, 5 underlay inband D2D communication is more beneficial as it reuses the same resource of cellular system.", "\u2026in D2D networks, while Mach et al 15 also presented a taxonomy based more general review about D2D communication as in the work of Asadi et al. 5 It is clear from the works of Asadi et al 5 and Mach et al 15 that D2D is most beneficial in spectral and power efficiencies in inband underlay\u2026", "However, due to the general nature of the work of Asadi et al, 5 the description provided therein regarding the above mentioned topics is not enough, and a comprehensive survey dedicated to these topics is needed.", "5."]} +{"24700515|12029139": [") [3], RF energy harvesting technology has an abundant of energy supplied by ambient signal sources regarding of the system\u2019s location or time of day [4, 5]."]} +{"1999116|8280144": []} +{"13717080|3330461": ["INTRODUCTION DEVICE-TO-DEVICE (D2D) communication, described as direct communication between devices in proximity, is envisaged to be an important part of 5G [1], [2]."]} +{"29148801|3270620": ["Non-orthogonal multiple access (NOMA) is considered as a promising multiple access candidate for future fifth generation (5G) wireless systems due to its potential of improving spectrum efficiency [5,6]."]} +{"52196595|3330461": ["Meanwhile, D2D communication is another effective approach to improve coverage and capacity for the regions where no infrastructure can be used [20]\u2013[22]."]} +{"53280572|22221919": ["NON-ORTHOGONAL multiple access (NOMA) has been recognized as a key enabling technique for 5G networks [1]\u2013[5]."]} +{"20553342|12029139": ["Thus, RF energy harvesting depends on three main factors: the transmit power of the energy source, the distance between the RF energy source and the harvesting node, and the wavelength of the RF signals [29].", "For example, in the 900 MHz frequency band, the maximum allowable transmission power is 4 W, which gets attenuated to 10 uW at a moderate distance of 20 m [29].", "The received signal strength of an RF transmission decays at a rate that is inversely proportional to the distance between the transmitter and receiver, specifically at 20 dB per decade of the distance [29].", "1 W for mobile communication devices and WiFi systems [29]."]} +{"20553342|25929315": ["Second, MTC traffic is characterized by short transmissions, usually composed of few bytes which may require a number of radio resources below the minimum allocated to a cellular device, leading to packet scheduling problems and thereby affecting network capacity [5]."]} +{"206824394|8280144": ["In the scenario studied here, however, such a method does not result in closed-form equations and, for this reason, we use the Weber\u2019s approach [5], which leads to simple lower bounds.", "The aggregate multi-hop information efficiency (AMIE) was proposed in [10] as an extension for multi-hop scenarios of the metrics transmission capacity [4], [5], [13] and information efficiency [14].", "In addition, Weber et al presented in [5] a detailed comparison between the statistical metric transmission capacity and the transport capacity.", "[5], defined as the aggregate throughput of the network per unit area and unit bandwidth.", "Proof: The derivation of the lower bounds (16)-(18) follows the procedure detailed in [5]5.", "[5], [12]), that evaluates active links and, consequently, the interference field by simply applying the ALOHA access probability into the appropriate point process parameters, we propose a medium access control (MAC) protocol that considers the connectivity of the network."]} +{"10437714|8280144": ["Furthermore, in [92], the authors showed\n9Alpha-stable distributions generalize Gaussian distributions and have heavier tails [10, Sec."]} +{"52290948|4884302": ["The aim of Q-learning is to obtain a policy (a set of actions) that maximizes the observed rewards over the interaction time [15]."]} +{"3070805|141053": ["Moreover, let PA and PD denote the initial transmission power for node A and D and we assume that PA = PD and the same transmission rate r[2] is adopted for both senders.", "Let r[1], r[2] and r[3] denote the available transmission rates with SINR thresholds SINRth[1], SINRth[2] and SINRth[3] respectively.", "Here, the increase in interference at node C from the increase in transmission power of node A, does not make the SINR value at node C fall below SINRth[2].", "Thus, recently the development of efficient MAC protocols for multihop ad-hoc networks has been the focus of extensive research [2], [3], [4].", "With transmission power control, node A can increase its transmission power PA up to the an appropriate value, P \u2032 A, where it sustains a higher data rate r[3] with SINR threshold SINRth[3], while not disturbing the other concurrent transmission from D to C with data rate r[2].", "With transmission power control, node A can increase its transmission power PA up to the an appropriate value, P \u2032A, where it sustains a higher data rate r[3] with SINR threshold SINRth[3], while not disturbing the other concurrent transmission from D to C with data rate r[2]."]} +{"3070805|11979239": ["It is to be noted that there have been several attempts to design MAC protocols and appropriate methods to solve the above problems; we refer the reader to [105], [3], [106], [107], [108], [109], [110], [111], [112], [103], [113] for such proposals."]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"12554310|12029139": ["WPC appears in the literature in three basic architectures that refer to different application scenarios; a rigorous s rvey of WPC is given in [1], [2]."]} +{"638024|7644489": []} +{"7531627|8280144": ["We consider a propagation channel model with pathloss and Rayleigh fading, since it is both a well-accepted channel model and one of the few cases in which S-TC can be computed in closed form [32]."]} +{"9274553|7644489": ["All these benefits make it an attractive component of both the current 4G and the future 5G networks [1], [2]."]} +{"16378550|19938676": ["A detailed overview of the evolution of generations of wireless communication has been given in [9]."]} +{"16378550|3330461": ["In [47], the literature available on D2D communication is presented as Inband D2D and Outband D2D.", "Existing surveys [44], [47] on device-to-device (D2D) communication provide an extensive literature on the various issues in D2D communication.", "Device to device (D2D) communication may use the licensed spectrum (in band) or the unlicensed spectrum (out band) for direct link formation [47]."]} +{"27689464|3330461": ["The authors in [10] have surveyed the papers related to energy ef\ufb01ciency, radio resource management, cellular coverage and other performance targets in in-band D2D communications."]} +{"53755823|9651858": []} +{"53755823|16378550": []} +{"53755823|3330461": ["7) Impact in Complex Heterogeneous Networks: In the presence of macro cell, micro cells, home cells and fixed relays, the impact of the wide deployment of D2D communications also needs further considerations [24]."]} +{"53755823|7644489": ["more difficult to manage in small coverage scenarios than with respect to their respective large coverage areas of the BS [65].", "However finding the impact of these techniques on WAN also need considerations [65].", "\u2022 UEs radio interface is by-default designed to send data in Uplink [65].", "Thus further studies are required to investigate optimal solutions for splitting the control functionality between the network and the UE [65]."]} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"2042553|14441987": [", downlink/uplink transmission, channel state feedback [10], packet acknowledgement [11], or route initiation and update requests [12]."]} +{"2042553|8280144": []} +{"3225335|25911553": []} +{"3225335|3799929": []} +{"3225335|34643772": []} +{"3225335|7525856": []} +{"3225335|8606364": ["CRN radio resource allocation has been discussed in [59]\u2013[61], and green energy-powered CRNs have been presented in [60] and [62]."]} +{"3225335|512561": ["CRNs, especially cognitive radio sensor networks (CRSNs) [246], can greatly benefit from energy harvesting approaches [247]."]} +{"3225335|1541773": ["Energy conservation is an important research domain in wireless communications [60], [62], [250]."]} +{"3225335|8650651": []} +{"3225335|4122595": ["2) Hardware Imperfections: Hardware imperfections in CRNs [107], such as non-linear distortions, phase noise, non-ideal frequency responses of circuits, power amplifier"]} +{"3225335|11414835": ["Network virtualization allows multiple virtual networks to operate over a given single physical network [267]\u2013[270]."]} +{"3225335|1686572": ["Surveys on MAC protocols for CRNs are provided in [50] and [51], while the security, privacy, and threats of CRNs have been surveyed in [52]\u2013[58].", "However, various CRNs related threats, such as primary user emulation (PUE) attacks [56] and others, as discussed in [58], have not been analyzed for FD-CRNs."]} +{"3225335|8974063": []} +{"3225335|8909218": ["2718618 This exceptional growth has motivated the development of next generation wireless technologies, such as femtocells [2], [3],"]} +{"51971769|3055684": ["However, due to the intermittence and randomness of available energy, conventional energy harvesting techniques bring new dilemmas to the energy harvesting communication systems [6]."]} +{"51971769|12060835": ["Therefore, it is necessary to improve the energy efficiency and longevity of devices in IoT.", "The large scale of devices being connected to the Internet, where the data is generated by the things without any human intervention, has brought in the notion of Internet of Things (IoT).", "IoT has a wide application in several fields, including electrical, medical, transportation, military, environmental protection, home automation, and so on.", "Thus, if not addressed, the shortage of spectrum resources might become the bottleneck of the IoT\u2019s development in the recent future.", "Recently, wireless energy harvesting technology which harvests energy from ambient radio frequency (RF) signals has received increasing attention due to its convenience in providing energy self-sufficiency to low power communication systems such as IoT [7].", "There are two fundamental problems for implementing massive IoT deployment.", "Thus, energy harvesting is conceived as an efficient solution for the emerging IoT [2].", "Hence, combining the wireless energy harvesting and cognitive radio technologies can effectively solve the two fundamental problems for implementing large-scale IoT deployment, and the research on this direction becomes the hot-spot region in academia and industry.", "IoT will be a part of the Future Internet, coving almost all different kinds of domains, industry, and sectors, and it will generate enormous wireless access data including machine to machine communication as well as machine to human communication.", "The other main barrier for implementing massive IoT deployment is the spectrum crunch."]} +{"69556633|3330461": []} +{"10436488|7644489": []} +{"17175171|8909218": []} +{"17175171|8280144": []} +{"7703290|7686677": ["First, designing green cellular networks has recently received great attention among network operators; regulatory bodies, such as the Third-Generation Partnership Project and the International Telecommunication Union; and green communications research projects such as EARTH and GreenTouch [5]\u2013[9]."]} +{"2200604|3330461": ["Device-to-device communications are a strong contender for 5G networks [2] that allow direct communication between user equipments (UEs) without unnecessary routing of traffic through the network infrastructure, resulting in shorter transmission distances and improved data rates than traditional cellular networks [3]."]} +{"8247057|19938676": ["Thus, enabling D2D communications has also been a cornerstone for 5G research [6], and integrating millimeter wave with D2D networking is an exciting prospect [5]."]} +{"20638504|7644489": ["The simulation parameters are set as: [ Rd,00,1,Rd,00,2, \u00b7 \u00b7 \u00b7 ,Rd,00,5 ] = Rd,ref \u00d7 [1,2,3,2,1], [ \u03bbc,1, \u03bbc,2, \u00b7 \u00b7 \u00b7 , \u03bbc,5 ] = \u03bbc,ref \u00d7 [10, 1, 10, 10, 10], Pc,i = 300mW, Pd = 80mW.", "In D2D communication, the communication between spatially closely located devices can be established directly [2], which can enhance the network throughput, reduce the transmission latency, improve the spectrum efficiency (SE) and the energy efficiency (EE) [3].", "The simulation parameters are set as: [ Rd,00,1,Rd,00,2, \u00b7 \u00b7 \u00b7 ,Rd,00,5 ] = Rd,ref \u00d7 [1,2,3,2,1],[\n\u03bbc,1, \u03bbc,2, \u00b7 \u00b7 \u00b7 , \u03bbc,5 ] = \u03bbc,ref \u00d7 [10, 1, 10, 10, 10], Pc,i = 300mW, Pd = 80mW.", "4 is that as the reference distance of D2D users Rd,ref increases, a decrease in the EE can be observed."]} +{"12550881|3330461": []} +{"12550881|7644489": []} +{"33472735|8280144": ["We consider a propagation channel model with pathloss and Rayleigh fading, which accounts for some channel variations and is one of the few cases in which S-TC can be computed in closed form [27]."]} +{"8248877|17966235": ["For example, at 60 GHz, the channel can be approximated as AWGN (Additive White Gaussian Noise) [15]."]} +{"8248877|7644489": ["In our coverage analysis of D2D relay-assisted mmWave cellular networks, we consider D2D as an underlay to the uplink cellular network [16], i."]} +{"8248877|8280144": ["It has been proved that such upper bound is tight for ad hoc networks [17].", "We partition these interferers into two subsets: dominant and non-dominant interferers [17]."]} +{"10265944|14889616": []} +{"3659996|4572654": ["Apart from extensive researches on sub-6 GHz, such as 2.4 GHz [1] and TV white space [2,3], millimeter wave (mmWave) has recently received signi\ufb01cant attention due to a huge range of free spectrum [4\u20136]."]} diff --git a/edge/graph_201832763.jsonl b/edge/graph_201832763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76dda07c419f0376be30512347b719c401123f0e --- /dev/null +++ b/edge/graph_201832763.jsonl @@ -0,0 +1,2 @@ +{"115685528|12083425": []} +{"25712716|17381415": []} diff --git a/edge/graph_201833270.jsonl b/edge/graph_201833270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59162d930777760db6a2381275b1cf967cec2d5e --- /dev/null +++ b/edge/graph_201833270.jsonl @@ -0,0 +1,8 @@ +{"3426462|1047013": ["Feature Selection (FS) is one of the most important intelligence techniques and an indispensable component in learning systems [10]."]} +{"3426462|2623404": ["As an example, the SELFNET framework [6] takes advantage of Self-Organized Network (SON) [7] and AI to autonomically manage the infrastructure based on Software-Defined Networking (SDN) [8] and Network Function Virtualization (NFV) [9]."]} +{"18318663|11720829": ["Such adaptive techniques require channel prediction for the channel changes in time [1], [2]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"1075627|18148591": []} +{"9036148|3453202": ["An overview of physical layer security is also considered in [11] for cooperative relay systems, in [12] for massive multiple-input-multipleoutput (MIMO) systems, and in [13] for cognitive radio networks."]} +{"9036148|13178381": ["The authors, in [14], present an earlier survey on physical layer security under the imperfect channel state information (CSI) assumption, with a particular focus on relay channels, cognitive system, and large-scale decentralized networks."]} +{"9036148|4395259": ["The work in [8] provides a comprehensive survey describing the evolution of information theoretic security from point-to-point communication systems to multiple antenna and multiuser networks."]} diff --git a/edge/graph_201833712.jsonl b/edge/graph_201833712.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0a473965be06774d2f57c5485ab20e6fb1ff37f --- /dev/null +++ b/edge/graph_201833712.jsonl @@ -0,0 +1,28 @@ +{"12623890|393948": ["Index Terms\u2014 Transfer Learning, Cross-Corpus, SharedHidden-Layer Autoencoder, Emotion Recognition"]} +{"3302908|8777381": ["research community that certain acoustic and prosodic features play an important role in recognizing the affective state [47]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"12535948|393948": [", learning some transformations of the data that make it easier to extract useful information when building classifiers or other predictors, has been considered from many perspectives within the realm of machine learning [25], [34]\u2013[36].", "The idea behind transfer learning is to exploit commonalities between different learning tasks in order to share statistical strength, and transfer knowledge across tasks [34], [45].", "In doing so, the learner must capture the structure of the input distribution in order to optimally reduce the effect of the corruption process, with the reconstruction essentially being a nearby but higher density point than the corrupted input [34].", ", in terms of classification accuracy, quality of the samples generated by a probabilistic model or in terms of the invariant properties of the learned features [26], [34]."]} +{"15022503|17574321": []} +{"14150226|393948": ["Recently, deep learning techniques have been applied in this field to obtain high-level representation for speech and emotion recognition [4, 6, 7, 8]."]} +{"9969117|393948": ["Recently, it has been shown that unsupervised feature leaning is very helpful for ASR [43] and image understanding [2], [10]."]} +{"42232853|206576720": ["5G is the support of the whole communication process of the emotion communication system [29], [30]."]} +{"7620529|8777381": []} +{"17343016|8777381": ["In the future, the emotional speech research will primarily be benefited by the on-going availability of large-scale emotional speech data collections, and will focus on the improvement of theoretical models for speech production (Flanagan, 1972) or models related to the vocal communication of emotion (Scherer, 2003).", "Several reviews on emotional speech analysis have already appeared (Van Bezooijen, 1984; Scherer et al., 1991; Cowie et al., 2001; Pantic and Rothkrantz, 2003; Scherer, 2003; Douglas-Cowie et al., 2003).", "Several reviews on emotional speech analysis have already appeared (Van Bezooijen, 1984; Scherer et al., 1991; Cowie et al., 2001, 2003;\nScherer, 2003; Douglas-Cowie et al., 2003).", "Furthermore, there is a need for adopting protocols such as those in (Douglas-Cowie et al., 2003; Scherer, 2003; Schro\u0308der, 2005) that address issues related to data collection.", "\u2026speech research will primarily be benefited by the on-going availability of large-scale emotional speech data collections, and will focus on the improvement of theoretical models for speech production (Flanagan, 1972) or models related to the vocal communication of emotion (Scherer, 2003).", "Finally, the paper is focused on describing the feature extraction methods and the emotion classification techniques, topics that have not been treated in (Scherer, 2003; Pantic and Rothkrantz, 2003).", "\u2026Douglas-Cowie, 1996; Pantic and Rothkrantz, 2003; Gonzalez, 1999; Heuft et al., 1996; Iida et al., 2000; Iriondo et al., 2000; Montero et al., 1999; Mozziconacci and Hermes, 2000; Murray and Arnott, 1996; Pollerman and Archinard, 2002; Scherer, 2003; Ververidis and Kotropoulos, 2004; Yuan, 2002).", "The survey is limited to those acoustic features for which at least two references are found in the literature (Van Bezooijen, 1984; Cowie and Douglas-Cowie, 1996; Pantic and Rothkrantz, 2003; Gonzalez, 1999; Heuft et al., 1996; Iida et al., 2000; Iriondo et al., 2000; Montero et al., 1999; Mozziconacci and Hermes, 2000; Murray and Arnott, 1996; Pollerman and Archinard, 2002; Scherer, 2003; Ververidis and Kotropoulos, 2004b; Yuan, 2002)."]} +{"18649771|393948": ["A very promising characteristic of deep neural networks is that they can learn high-level invariant features from raw data [19][20], which is potentially helpful for emotion recognition."]} +{"11881741|393948": ["Compared with the traditional machine learning method, the deep learning can extract the high-level features [18], [19], and it has been shown to exceed human performance in visual tasks [20], [21]."]} +{"67866899|9928823": ["Recurrent Neural Networks (RNNs) are considered as a class of deep networks for the use in unsupervised learning in the cases where the depth of the input data sequence can be as large as the length since RNNs allow parameter sharing through the different layers of the network [58], [59].", "RNNs are developed by the use of the same set of weights in a recursive manner over a tree like structure, and the tree is traversed in topological order [58], [59]."]} +{"67866899|2122433": ["past five decades right from the introduction of artificial intelligence [4], [5].", "Therefore, it is only natural that one of the early applications of deep learning was speech, and up to this day a huge number of research papers have been published in the use of deep learning for speech related applications specifically speech recognition [4], [5], [6], [7]."]} +{"53304118|9928823": []} +{"53304118|393948": []} +{"206651806|14405917": ["It conforms with many desirable criteria suggested by emotion researchers [13] and thus may serve as a valuable common resource for future studies on automated analysis of socio-emotional behaviors, as well as for those related to emotion contagion and interpersonal synchrony [14]."]} +{"206651806|2355696": []} +{"206742471|8777381": ["It is well accepted amongst the research community that certain acoustic and prosodic features play an important role in recognising the affective state [28]."]} +{"28874114|8777381": ["The importance of prosodic contour trends in the context of different emo-\ntions is discussed in Murray et al. (1996), Scherer (2003)."]} +{"27201559|6857179": ["Within the realm of emotion research, the most prevailing emotion modelling concepts are derived from categorical, dimensional, and appraisal-based approaches [2]."]} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} diff --git a/edge/graph_201833833.jsonl b/edge/graph_201833833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..abb61c9737c087f385b828b5026b355b8681b7bf --- /dev/null +++ b/edge/graph_201833833.jsonl @@ -0,0 +1,39 @@ +{"88491427|49527603": ["A private blockchain can provide a relatively better degree of privacy; however, it is generally considered an unsecure environment as it is only controlled by a single entity [72].", "Examples of surveys on general blockchain concepts, opportunities, and applications are [72]\u2013[75]."]} +{"88491427|51935081": []} +{"88491427|3932531": ["applications [104]\u2013[107], intrusion detection [91], and Internet of Things (IoT) [95]\u2013[100]."]} +{"88491427|3628110": []} +{"88491427|27262729": []} +{"88491427|925507": []} +{"86766940|86808618": []} +{"86766940|3628110": []} +{"86766940|55729907": []} +{"3611018|925507": []} +{"56895323|49527603": ["In [19], a brief summary of the emerging blockchain-based applications ranging from"]} +{"56895323|9461213": ["fields [221], [222], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secure Multi-Party Computation (MPC)."]} +{"56895323|27262729": ["A systematic survey is conducted in [20] with respect to the security in the Bitcoin network including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", "vacy [20] and quantitative analysis of smart contract performance [217].", ", Sybil attacks [41] and doublespending attacks [20]), node mistakes (e."]} +{"56895323|2457428": ["the security is a main concern. Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]. In [182], the authors present a framework for providing secure key management in VCSs, where the security managers are considered as blockchain miners which capture the vehicle departure information"]} +{"56895323|3434731": ["trusted virtual computers [6] for decentralized, transactiondriven resource management in communication networks and distributed autonomous systems [5], [7].", "In [7] and [16], two brief surveys on consensus protocols in blockchain networks are provided."]} +{"53951647|3628110": []} +{"53951647|1313790": []} +{"158942|27262729": ["Although transactions are secured by the mechanisms we mentioned so far, malicious users have found multiple ways to scam wallets and users (See an excellent survey on all scams in [14]).", "Some other aspects that we do not cover in this manuscript are privacy [14], and usage of digital currencies in Blockchain [47]."]} +{"59554580|53046901": []} +{"59554580|49527603": ["Existing literature reveals that researchers studied blockchain and AI in isolation, and their applications in various vertical domains and businesses [14]\u2013[27]."]} +{"59554580|52903603": ["of studies discussed the integration of AI and blockchain, and the implications of such integration on the way we live, work, interact, and transact [9], [28]."]} +{"59554580|51935081": ["Many shortcomings of AI and blockchain can be addressed effectively by combining both technological ecosystems [19], [41].", "Such platform can also be used to host a trusted trail of all records taken by AI algorithms before, during, and after the learning and decision making process [19]."]} +{"59554580|49574823": []} +{"59554580|3628110": ["and predictive analysis, the blockchain systems are vulnerable to cyber-attacks as that of 51% attack [26]."]} +{"59554580|10137425": []} +{"59554580|43447335": []} +{"59554580|4503761": ["Finding a set of best solutions from all possible solutions is one of the main features of AI-enabled applications and systems [51]."]} +{"59554580|468992": ["[45] outline the nature of swarm robots to purview the objective and to record the key information about the discovery such as the location of the discovered object, time, date, etc.", "ing networks and to solve scheduling issues [45], [47]."]} +{"59554580|3434731": []} +{"109934536|54557477": ["The emergence of blockchain technology in the form of digital currencies has in\ufb02uenced many other \ufb01elds such as e-healthcare, e-\ufb01nance, real estate, e-voting, supply chains, Smart homes, Smart cities, Smart Industries, the Internet of Things, and so forth [3\u20136].", "The core protocol of the Bitcoin currency is consensus, which requires all the peers in network to agree upon every single entry of a block in the distributed ledger [1,3]."]} +{"21707051|102352657": []} +{"59314746|49527603": []} +{"59314746|3932531": ["Other reviews focus on security issues of the blockchain (Khan and Salah, 2017; Li et al., 2017a; Meng et al., 2018) and on its potential to enable trust and decentralisation in service systems (Seebacher et al."]} +{"59314746|3628110": []} +{"59314746|27262729": []} +{"53601028|3628110": ["There are current concerns with the use of blockchain crowdsourcing-related malicious agents in all areas of blockchain processing and activities (see [31])."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"45071453|8424228": []} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} diff --git a/edge/graph_201837481.jsonl b/edge/graph_201837481.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..96d4d1cce590afa33cfdf6b024487d84370f694f --- /dev/null +++ b/edge/graph_201837481.jsonl @@ -0,0 +1,42 @@ +{"1921738|1634674": ["Body-worn sensors have been extensively used to recognise activities in mobile and daily life situations [16, 18]."]} +{"3079688|15315731": ["In medial image analysis, the fusion of different imaging modalities (MRI, ltrasound, CT, PET, SPECT) can produce improved results [26] ."]} +{"3079688|6387482": []} +{"10050878|5724477": []} +{"15136729|8928686": ["A multitude of previous work [2, 3] have been dedicated to the task of fall detection, investigating various aspects depending on the devices and the data types.", "In addition to fall detection, researcher also took a proactive approach to fall risk factor analysis and fall prevention mechanism [2]."]} +{"26067677|627405": ["The problems they identified (Brereton et al. 2007) do not match the ones we detected because their analysis pursued a different goal.", "Although (Brereton et al. 2007) do not set out to analyse the limitations of bibliographic databases, they discuss, as a spin-off of their SR, a number of lessons learned, some of which imply database limitations.", "Other authors (Brereton et al. 2007; Bailey et al. 2007; Dyb\u00e5 et al. 2007b) have identified some of the limitations of bibliographic databases as regards the identification of SE studies."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"61167697|33286487": []} +{"15334151|7788290": ["Although originally most of the research in activity recognition was done using vision sensors [Gavrila, 1999; Pentland, 1996], it has increasingly become dominated by various types of wearable sensors, like accelerometers and audio."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"8042572|1113420": ["Context aware intelligent spaces[56][57] are good example of systems that can exploit complementary information across modalities by extracting information from different sensors based on the context."]} +{"8042572|7360895": ["Human-robot interaction [50][36] and avatar"]} +{"38763513|26071662": ["For more extensive treatments on multimodal data fusion, we refer the reader to [15] and [58]."]} +{"38763513|8034133": []} +{"38763513|6387482": []} +{"11293874|1634674": ["The dataset is usually split and one part is used for training and the rest for testing [20].", "It uses a pre-established model and the current state of the system to update these weights every time a new observation is detected [20]."]} +{"2112296|5724477": ["We selected three classi\ufb01ers, which are commonly used for practical activity recognition: Naive Bayes, k-nearest neighbor (KNN) and decision tree [35,36].", "They are suitable for running on mobile phones with reasonable recognition performance [35,36]."]} +{"56916904|1634674": ["Afterwards, features that capture the activity characteristics are extracted from the signals within each segment[8].", "The framework comprises components for data acquisition and pre-processing, data segmentation, feature extraction and selection[1, 8], training and classification, decision fusion[9], and performance evaluation."]} +{"4782494|2670121": ["A number of researches have explored transfer learning for activity recognition [16]."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"140294573|10206347": ["Studies on data-level fusion are mainly concerned with the design and implementation of noise elimination, feature extraction, data classification and data compression [82]."]} +{"140294573|6387482": ["This multisensor fusion technique, which is used in some analysis tasks, refers to the combination of the features extracted from data of different modalities or the decisions generated from these characteristics by classification algorithms [78]."]} +{"140294573|7158350": ["Examples of commonly used inference methods are the k-NN (k-Nearest-Neighbor) [68], Support Vector Machines (SVM) [69], Hidden Markov Models (HMM) [70], Decision Tree Classifiers (CART) [71], Logistic Regression (LR) [72], Random Forest Classifier (RFC) [73], the Naive Bayesian approach (NB) [74], and Artificial Neural Network (ANN) [75], such as Convolutional Neuronal Networks (CNNs), and Long Short-Term Memory networks (LSTMs)."]} +{"19640500|622308": ["Jaime Esteban [1] mentioned about the various architectures of data fusion."]} +{"40608207|1734833": []} +{"40608207|2670121": []} +{"40608207|10206347": []} +{"40608207|20905429": []} +{"18375490|5755403": []} +{"18375490|16525678": ["Valera 05 Intelligent distributed surveillance [187]"]} +{"18375490|17516538": ["Weiming 04 Motion and tracking for surveillance [59]"]} +{"207192846|192934": ["Although this string-matching-based strategy shows competitive performance in both vision-based and wearable sensorbased activity recognition tasks [5] [6] [7] [8], the main drawback is its high sensitivity to noise and its poor performance in the presence of high intra-class variation [9]."]} +{"18525978|27637541": []} +{"10985974|1634674": []} +{"49614784|7834819": []} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"18112361|7185733": ["In [52] and [49], each gesture was considered to consist of three phases: pre-stroke, nucleus, and post-stroke."]} +{"18291951|9030703": []} +{"10206347|7988320": ["Reference [35] placed emphasis on network communication, discussing the issues of physical layer, MAC layer, network layer and routing protocols in detail.", "Finally, the trade-off between energy efficiency and the complexity of fast routing algorithms also needs to be figured out [35].", "IEEE 802.15.6 has defined many BSN band standards, so developing many upper layer protocols which support a variety of physical layer channel is an inevitable trend [35]."]} +{"10206347|6332923": ["Therefore, QoS and the real-time prosperity of data transmission must be considered [17,18]."]} +{"10206347|1230643": ["Since the memory module and data sending module consume lots of energy [26], data compression can lower power consumption effectively on BSN sensors, by reducing information stored in memory and transmitted by the transceiver.", "As communication consumes more power than local computation, wireless data transmission uses a large amount of power [26].", "In the aspect of data fusion, research mainly includes the design and implementation of denoising [23], feature extraction [24], data classification [25], data compression [26], and other key technologies."]} diff --git a/edge/graph_201846833.jsonl b/edge/graph_201846833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4028b205258eab7eceaa3e935b63ba330bd4c6af --- /dev/null +++ b/edge/graph_201846833.jsonl @@ -0,0 +1,13 @@ +{"159041060|16762549": ["These models can suggest rules based on those detected behaviors from all connected devices [288]."]} +{"159041060|17759638": []} +{"159041060|10213552": []} +{"159041060|44461432": ["One of the important purposes for time series representation is to reduce the dimension, and it divides into three categories: model-based representation, non-data-adaptive representation, and data-adaptive representation [150], [151]."]} +{"159041060|1598350": []} +{"159041060|8053403": []} +{"159041060|10542290": ["Typically, each of these components might have been produced by different vendors, each of which may have created under different design constraints and considerations [306].", "There are different reasons for these challenges differences in technological approaches, regulations, development culture, and the expectations of the market [306]."]} +{"159041060|3348390": ["[20] discussed IoT applications from the perspective of context-awareness and self-learning; (b) Tsai et al."]} +{"159041060|11894197": ["different ways: by extracting of the features that represent the significant data characteristics (this technique is called feature extraction), or by only selecting the most relevant features from the original dataset, this method is called feature selection [189], [190]."]} +{"33028099|11038925": []} +{"116622036|10682348": []} +{"116622036|15273230": []} +{"111417857|121289": []} diff --git a/edge/graph_201847486.jsonl b/edge/graph_201847486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..884aef4bfeadaf10dfd1d5e633cac6b6a229149e --- /dev/null +++ b/edge/graph_201847486.jsonl @@ -0,0 +1,23 @@ +{"23450645|2477727": ["In reference [1], the authors outlined the characteristic of Home-eNodeB (HeNB), the official 3GPP terminology for FAP."]} +{"4776651|1588237": ["\u2026for UE e is inversely proportional to the SINR, which can be de\ufb01ned as where P s is the power of the signal, P i is the average interference caused as a result of collisions between resource blocks that are utilized by multiple cells simultaneously [27], [28] and P n denotes the background noise."]} +{"206895780|8909218": ["The ever-increasing demand for higher data rates and improved indoor coverage has motivated the standardization and implementation of short-range, low-cost, consumer-deployed cellular access points, referred to as femtocells [1].", "However, this is not the case of the integrated LTE macrocell\u2013femtocell network where femtocells are expected to radiate comparably lower downlink RS power for interference mitigation on the macrocell layer [1].", "Mobility Management (MM) is considered as one of the most challenging issues in the integrated LTE macrocell - femtocell network, both due to the high femtocell density within a macrocell, and the fact that femtocells are installed and managed by the end user [1]."]} +{"115369612|17905276": ["Hence, wireless systems are usually adopted to monitor the railway service conditions [5], [6]."]} +{"115369612|1230643": ["processing, state evaluating & forecasting, and decisionmaking [10]."]} +{"49879281|22833814": ["High-mobility communications have gained much interest over the past couple of decades and have been considered as one of the key parts in high-speed railway (HSR) [2]\u2013[5]."]} +{"49879281|11498812": ["H.LiniswiththeDepartment of Electrical and Information Systems, Osaka Prefecture University, Osaka, Japan (email: lin@eis.osakafu-u.ac.jp). frequency division multiplexing (OFDM) technique is applied in high-mobility wideband wireless communications [3], [7]."]} +{"59601881|22833814": []} +{"28776081|11498812": ["Briefly speaking, high mobility communications will introduce more challenges on the physical layer design, the link/MAC layer design, the network layer design as well as the application layer design to guarantee the QoS provisioning and other application requirements [8]."]} +{"21381783|15453366": ["The millimeter wave channel characteristics, to a large extent, dictate the choice of physical (PHY) layer and medium access control (MAC) layer schemes as well as the hardware implementation [11], [12]."]} +{"4772244|15449163": []} +{"54448387|1541773": ["The information and communication technology (ICT) has approximately contributed 10% in global power consumption in year 2013 [2], while cellular networks constitute major part in ICT involvement."]} +{"3854734|3649200": ["On the other hand, cell clustering has been studied in the literature as a means to improve spectral efficiency, energy efficiency and load balancing [14] but mobility issues are hardly addressed."]} +{"1050012|18687271": ["The authors in [3] present different distributed mobility management protocols at the transport layer for future dense HetNets."]} +{"3982893|11498812": ["As already stated, in order to maintain a decent QoS, consecutive cell skipping is avoided.", "However, even though the benefits for stationary users in ultra-dense networks are unambiguous, the support of mobile users requires special management in order to maintain a decent QoS along their trajectory.", "Note that, consecutive handover skipping is avoided in order to maintain the QoS of the user at a decent level.", "This is due to the delay in connection switching, which subsequently affects the user\u2019s QoS [7].", "It has been shown that, a significant increase to the users\u2019 quality of service (QoS) can be achieved by the deployment of denser networks.", "Thus, the handover process can be skipped without affecting significantly the user\u2019s QoS.", "Specifically, the proposed intelligent handover skipping technique ensures that when a handover is skipped, the user remains associated with either its closest or second closest BS, thus maintaining a descent QoS.", "For more information, see http://creativecommons.org/licenses/by/3.0/ 11921\nmost of their resources for the handover executions instead for data traffic, which substantially degrades their QoS [8].", "most of their resources for the handover executions instead for data traffic, which substantially degrades their QoS [8]."]} +{"84187248|10663005": ["In [17] and [18], the HST channel models for tunnel scenarios were studied."]} +{"84187248|22833814": ["The clusters in a specific HST scenario can exist over a certain time period [2].", "All the above models [2], [9]\u2013[19] focused on HST channels without considering massive MIMO and mmWave technologies.", "Then, the Long-Term Evolution Railway (LTE-R) system has been recommended to replace the GSM-R to provide wideband HST communication services [2]."]} +{"4664278|8999817": ["The papers [77], [78] survey the main architectures for practical implementations of hybrid beamforming."]} +{"14859310|8909218": ["In femtocell and macrocell overlaid networks, there are three femtocell access methods currently [2]."]} +{"86435217|22833814": ["well as supporting passenger high-data-rate connectivity [5]\u2013 [7]."]} +{"12475938|2497115": ["Compared to the existing radio positioning approaches, namely enhanced observed time difference (E-OTD) [5], [6], uplink-time difference of arrival (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] or WiFi fingerprinting [9] based solutions in which the accuracy is typically in the order of 3-5 meters at best, the positioning accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10].", "Compared to the existing radi o positioning approaches, namely enhanced observed time dif ference (E-OTD) [5], [6], uplink-time difference of arriva l (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] o r WiFi fingerprinting [9] based solutions in which the accurac y is typically in the order of 3-5 meters at best, the positioni ng accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10]."]} +{"59540323|8280144": ["The maximum average number of successfully transmitted data per unit area is called the transmission capacity [36]."]} +{"46723496|8909218": ["Femtocell is a small, low power, and cost effective home base station that is installed by the consumer to connect to the network through broadband connections such as digital subscriber line or cable modem [2]."]} diff --git a/edge/graph_201847801.jsonl b/edge/graph_201847801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8aa7b906bd3d3ee23b8dd584be7b6f5eedc61d8e --- /dev/null +++ b/edge/graph_201847801.jsonl @@ -0,0 +1,11 @@ +{"9395635|17381415": ["Due to its advantages in operations under unbalanced conditions, PR controllers have gained some popularity for providing current regulation in grid-connected systems [18], [25], [26].", "Among the existing control strategies for power electronics, voltage feed forward (VFF) is a popular scheme that belongs to the current control loop family of controllers [18]."]} +{"116239396|12083425": []} +{"34962880|17381415": ["VOLTAGE-SOURCE converters (VSCs) are increasingly used in electric power grids for efficient energy consumption and renewable energy generation [1]."]} +{"21039546|17381415": ["The PLL-based VSC (used for comparison here) applies the typical vector control and uses conventional SRF-PLL for grid synchronization [14], [23].", "reactive power output (abbreviated to DCVQ-type VSC in this paper) [23]."]} +{"21039546|12083425": ["MODERN power grid is characterized by high penetration of renewable energy sources such as wind turbine generators and photovoltaics, which are generally connected to the grid via voltage source converters (VSCs) [1], [2]."]} +{"19641160|17381415": ["Note that the PLL bandwidth needs to be selected also in consideration of other performances of the wind turbine inverter control [16].", "The rectifier at each turbine is controlled using standard torque and speed control methods [16] to extract the maximum power from the turbine.", "and the PLL is implemented using a PI regulator in the dq reference frame [16]."]} +{"52126947|17381415": ["INTRODUCTION he growing penetration of the power electronicsinterfaced renewable energy sources lead to the emergence of power-electronic-based power systems into electrical grids, such as wind farms [1], photovoltaic power plants [2], and micro-grids [3]."]} +{"5037318|17381415": ["However, a practical system with a high share of renewables usually has the following features: i) There are a huge number of converter-based renewable generators with different types of configurations and controls [16], such as geographically distributed WFs and photovoltaic plants (PVs) [8]."]} +{"1101979|17381415": ["Most grid-connected VSCs use current control in a rotating (dq) reference frame [8], which is synchronized to the fundamental component of the grid voltages by means of a phase-locked loop (PLL) [9]."]} +{"23854769|17381415": ["In such grid-connected mode, the inverter is typically controlled as a current source [1] to inject certain amount of current into the grid.", "Grid synchronization methods [1] also have strong effects on the inverter output impedance, which have not been given much attention so far and will be studied in a future work."]} +{"36257789|17381415": ["The PLL is implemented in the dq reference frame [16] and the compensator transfer function is Hpw s \uf028 \uf029 0.", "Decoupled dq averaged current control [16] is used."]} diff --git a/graph_2018668.jsonl b/edge/graph_2018668.jsonl similarity index 100% rename from graph_2018668.jsonl rename to edge/graph_2018668.jsonl diff --git a/edge/graph_201870666.jsonl b/edge/graph_201870666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14211af6419e63782b6829777c97addfd1aafa2a --- /dev/null +++ b/edge/graph_201870666.jsonl @@ -0,0 +1,36 @@ +{"52964767|2082499": []} +{"52964767|15705163": []} +{"4016999|7774517": []} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"13990559|15705163": ["In [15],[12] the authors point out, that to improve data quality, there are two strategies (1) data-driven and (2) process-driven.", "According to [15][12][16], a data quality dimension offers a way to measure and manage data quality.", "In [12], Sidi et al."]} +{"18255832|15705163": ["In healthcare domain the increase of electronic medical data, advocated the use of sophisticated health systems to support health Big Data transfer, processing, storage, replication, analysis and retrieval."]} +{"5651019|7774517": []} +{"11173881|207231270": ["Paper [6] reviews the related work and derives general principles and a classi\ufb01cation of approaches within this domain."]} +{"30963055|12574246": ["Machine learning approaches can be categorized to supervised and unsupervised approaches [31].", "Supervised methods utilize training data (input/output about the phenomenon) for classification or regression type of algorithms [31]."]} +{"49645129|1353379": []} +{"49645129|13991708": []} +{"49645129|2398835": []} +{"52193856|11453858": ["In [35], [39]\u2013[49], the authors emphasized many data quality issues and their effects in Big data lifecycle stages; as preprocessing, processing, and storage.", "In this category, two important aspects of Big Data were targeted in [31],[35],[39]\u2013[41],[44],[46]\u2013[59] that are its characteristics (V\u2019s) and management.", "Data quality has been fully investigated in the following work [25], [31], [39], [41]\u2013[46], [48]\u2013[59], [61] which confirm its"]} +{"52193856|15705163": ["In [19], [34], The authors addressed a compilation of poor data causes classified by DQD, granularity level, and data source type while highlighting the causality mapping between these.", "1) Definition: it is recognized that DQ has many definitions that are related to the context, domain, area or the fields in which it is used [19], [20].", "2) Data Quality Dimensions(DQD\u2019s): according to [19], [22], [23], a DQD offers a way to measure and manage data quality.", "In [19], data quality is defined as the appropriateness for use or meeting user needs."]} +{"1972898|1230643": ["Firstly, the local measured data from these monitoring stations need to be transmitted to a control center, and the communication infrastructure connecting these parties may suffer from random failures [2]."]} +{"1972898|1805048": ["So this method has been applied to solve problems in various engineering research fields, such as social network [5] and power system [6]."]} +{"1972898|289357": []} +{"26533371|15705163": ["There are two main strategies to improve data quality according to [1], [2]; data-driven and process-driven."]} +{"3914763|10011823": ["Although some researches have studied data management in the area of data assessment and data cleaning [14], the relationship between data quality indicators is still a challenging issue."]} +{"22029828|3330313": []} +{"22029828|1230643": []} +{"16199748|7774517": ["Outlier detection has attracted much attention in the field of WSNs , and in recent years many outlier detection techniques specifically developed for WSNs have emerged ( Zhang et al ."]} +{"16199748|6275330": ["A recent development in data acquisition concerns the use of wireless sensors, consisting of nodes that measure environmental variables such as temperature, humidity, sound, pressure, light, vibration or motion (Arampatzis et al. 2005)."]} +{"6104234|2294541": ["An important issue here is that data representing such observations is often inconsistent because of noise, hardware faults, or false data injection by malicious nodes [1]."]} +{"6104234|7774517": []} +{"12252982|7774517": []} +{"12252982|6275330": ["\u2026form 3 October 2012 Accepted 7 November 2012 Available online xxxx\nKeywords: Outlier detection Ellipsoidal support vector machine Spatial correlation Temporal correlation Wireless sensor networks\n1570-8705/$ - see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.adhoc.2012.11.001\n\u21d1\u2026"]} +{"66909471|1489715": ["Research work from different aspects for WSN sensor data prediction has been published in [4\u20138], which demonstrated the feasibility of different methods for providing precise prediction of unknown or upcoming sensor data."]} +{"5860048|1940388": ["In addition, malicious attacks such as denial of service, sinkhole, black hole, selective forwarding, and wormhole attacks [3,14\u201320] may also contribute to generating such inaccurate and low quality data."]} +{"5860048|7774517": ["efficiency in utilizing the limited network resources [9].", "Besides, additional energy is required for processing large-scale and multivariate data [1,3,9,29].", "Besides, the large amount of data produced due to network size expansion is also a challenge for real time detection [9].", "A cluster is said to be anomalous if it is either smaller than or distant from other clusters in the dataset [9,27,68,69].", "According to [9], the spatial and temporal correlation between sensing data attributes help to specify the source of anomaly.", "It was reported by [9] that the purpose of using a WSN is not only to collect data from the field of deployment, but more importantly the analysis of this data at timely manner that allows for making some important decisions.", "Many statistical techniques have been used for anomaly detection in WSNs and categorized in [9,18] into parametric and non-parametric techniques.", "The classifications in [9,27,28] are technique-based, although they have slight differences in the classification.", "Although similar to the classification of [9], our classification is more comprehensive and cover the most recent published models."]} +{"5860048|17205659": ["Many statistical techniques have been used for anomaly detection in WSNs and categorized in [9,18] into parametric and non-parametric techniques.", "Therefore, a modification of these techniques or a design of new suitable techniques especially for WSNs is required [18,23,24]."]} +{"5860048|6275330": ["and control; and military applications such as enemy target monitoring and tracking [1\u20133]."]} +{"5860048|1236072": ["On the network layer, routing protocols are classified according to network structure into flat-based, hierarchical-based, and location-based [35]."]} +{"5860048|3330313": ["Another definition in [21] as \u201can observation that appears to be inconsistent with the reminder of a dataset\u201d.", "An anomaly is defined in [21] as an observation that seems to be inconsistent with the rest of a dataset.", "and first used for one dimensional data sets [21]."]} +{"5860048|1230643": ["Besides, additional energy is required for processing large-scale and multivariate data [1,3,9,29].", "Wireless sensor networks (WSNs) are networks of tiny, low cost, low energy, and multifunctional sensors which are densely deployed to monitor a phenomenon, track an object, or control a process [1].", "Besides, physical interruptions such as destruction or movements of sensor devices caused by humans or animals may affect the data collection process and lead to anomalous measurements [1].", "The fast advancement in communication technologies has introduced cheap, low-power and multifunctional devices which leverage the idea of the sensor [1].", "Three more additional units may be incorporated in the sensor structure depends on the application which are the energy generator that supplies the sensor with additional energy sources, the mobilizer which is sometimes used for supporting the mobility of sensor nodes, and the position finding system that determines the current position of mobile sensor nodes [1].", "Two unique features that differentiate WSNs from other networks were mentioned in [1]: first, the position of sensor nodes is not determined or engineered beforehand and this allows the random deployment at inaccessible environments and disaster relief operations; this feature poses a challenge for designing a selforganizing algorithms and protocols; second, the distributed data processing; instead of sending raw data to fusion node (base station or cluster head), the nodes can use their processing capabilities to locally carry out some simple required computations and send only the summary that is beneficial for decision making.", "However, the cost of data transmission is several orders of magnitude higher than the cost of data processing [1]."]} diff --git a/edge/graph_201871067.jsonl b/edge/graph_201871067.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa9c4a6edd34f532fc26ee12330eeeac3a580503 --- /dev/null +++ b/edge/graph_201871067.jsonl @@ -0,0 +1,28 @@ +{"207250452|3189715": ["Various approaches like Provider Provisioned Virtual Private Network (PPVPN) [7], Active and Programmable Networks [8], Overlay"]} +{"52125542|3189715": ["Borrowing some concepts from active networking [41]\u2013[43], a user can send an interest to the network with a function expression or a program that includes code and data."]} +{"4774976|10658846": ["Dynamic power management (DPM), de\ufb01ned as the selective shut-off or slow-down of system components that are idle or underutilized, has proven to be an effective technique for reducing power dissipation at system level [9].", "The design of such DPM policies has been an active research area, while a variety of adaptive power management techniques including machine learning have been applied [9\u201311]."]} +{"12282780|1708582": ["Reinforcement learning is one of ML techniques [7][8].", "The reinforcement learning [7][8] is classified as a ML technique, and has been applied to various types of network control [6][9][10]."]} +{"22097379|7644489": ["In this paper, we propose to leverage both computing resources in the cloud as well as from mobile peers exploiting device-to-device (D2D) communications to fundamentally enhance the energy efficiency of the MCC system [12]."]} +{"13694725|16654832": ["Resource-intensive workloads are intelligently offloaded to benefit from cloud resources (Shiraz et al., 2013a, Shiraz and Gani, 2012).", "The rich mobile application features demand adequate system resources due to computationally expensive operations involved in application execution (Shiraz et al., 2013a).", "\u2026practice exploits live or non-live patterns to move a complete virtual server across physical machines to successfully attain load balancing (Shiraz et al., 2013b, Yao et al., 2014), power efficiency (Dong et al., 2013; Mishra et al., 2012; Shrivastava et al., 2011), fault tolerance\u2026"]} +{"3042864|14088590": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|2282515": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|10859599": ["In the second case, the applications execute in a real cloud, for instance, Amazon EC2 [34], Google App Engine [31], and Microsoft Live Mesh [84]."]} +{"9217382|11414835": ["Other existing work on SDN network hypervisors has also only provided offline benchmarks proofing their implementation [6], [7], [1].", "The most used concept to virtualize SDN networks that are based on OpenFlow (OF) is to apply SDN network hypervisors [1]."]} +{"15723340|207228303": ["In [8], the authors surveyed the VM allocation problem and models and algorithmic approaches."]} +{"15723340|14382980": []} +{"15723340|1222880": ["In [12], the authors summarised different method and theory used in cloud resource allocation and monitoring."]} +{"21965856|33492114": ["In the context of modern cloud platforms, the application placement process consists of placing the application\u2019s components in a set of VMs (Virtual Machines) and deploying these to the physical infrastructure [8], [9], [10], [11]."]} +{"7032175|16515612": ["The problem of workload characterization and prediction has been widely studied in the past [2], [3], [4], [5], [6]."]} +{"52121507|25911553": []} +{"52121507|18750590": ["and there have been efforts to move toward SDI driven by economic and pricing theories for cloud resource provisioning, cloud management, and cloud networking [56], [57] in"]} +{"52121507|21930333": []} +{"52121507|33492114": [", resource level, chassis level, rack level, and DC level), it is important to keep in mind the open question: How to use and best propagate the information throughout the system? 2) Scheduling and Placement: Scheduling of workloads in a DC has received some attention in the literature in recent years, with surveys looking at energy aspects [134], load balancing techniques [135], and VM allocation in the DC [136]."]} +{"52121507|8650651": ["A thorough survey regarding existing SDON architectures and technologies is presented in [130]."]} +{"52121507|207228303": [", resource level, chassis level, rack level, and DC level), it is important to keep in mind the open question: How to use and best propagate the information throughout the system? 2) Scheduling and Placement: Scheduling of workloads in a DC has received some attention in the literature in recent years, with surveys looking at energy aspects [134], load balancing techniques [135], and VM allocation in the DC [136]."]} +{"52121507|11414835": ["SDI can be realized by different building blocks including Software-Defined Computing (SDC) and virtualization, Software-Defined Networking (SDN) and virtual network function (VNF), and Software-Defined Storage (SDS) (see Table II).", "Although this communication benefits from dynamic network resource provisioning capability, the dynamicity of this communication is limited by capabilities of network\ncontrol approaches (e.g., SDN [17]) with respect to how rapidly it can reconfigure the network.", "APPENDIX LIST OF ACRONYMS\nAMB Ambient Memory Buffer API application programming interface BSS Business Support Systems CAPEX capital expenditures CCIX Cache Coherent Interconnect for Accelerators CPU Central Processing Unit DAS Direct-attached Storage DC data center DCB DC Bridging DCs data centers DDR Double Data Rate\nDIABLO Datacenter-In-A-Box at Low Cost DIMM Dual Inline Memory Module DMA Direct Memory Access DMI Direct Media Interface DMTF Distributed Management Task Force DRAM Dynamic Random-Access Memory ENI Elastic Network Interface FB-DIMM Fully Buffered DIMM FC Fiber Channel FPGA Field Programmable Gate Array GPGPU General-purpose GPU GPU Graphics Processing Unit HA High Availability HDI Hardware-Defined Infrastructures HDS Hyperscale Data System HPC high-performance computing HRDMA Hardware based RDMA HW hardware IaaS Infrastructure as a Service IoT Internet of Things IP Internet Protocol IPMI Intelligent Platform Management Interface iSCSI Internet SCSI IT information technology iWARP Internet Wide Area RDMA Protocol KSM kernel same page merge MaaS Metal as a Service MR-IOV Multi-Root I/O Virtualization NAS Network Attached Storage NIC Network Interface Card NTB Non-Transparent Bridged NUMA Non-uniform memory access NVM Non-Volatile Memory NVMe NVM Express OCDIMM Optically Connected DIMM OCP Open Compute Project OpenCAPI Open Coherent Accelerator Processor Interface OPEX operational expenditures OS operating system OSS Operations Support Systems PaaS Platform as a Service PCIe Peripheral Component Interconnect Express PODM Pod Manager PSME Pooled System Management Engine QPI Quick Path Interconnect RAM Random-Access Memory RDD Resilient Distributed Datasets RDMA Remote Direct Memory Access RMM Rack Management Module RoCE RDMA over Converged Ethernet RSA Rack Scale Architecture RSD Rack Scale Design SaaS Software as a Service SAN Storage Area Network SATA SerialAT Attachment SCM storage class memories SCSI Small Computer System Interface SDCloud Software-Defined Cloud\nSDC Software-Defined Computing SDDC Software-Defined DC SDE Software-Defined Environment SDHI Software-Defined \u201cHardware\u201d Infrastructures SDI Software-Defined Infrastructures SDN Software-Defined Networking SDON software-defined optical network SDS Software-Defined Storage SoC System on Chip SPMF Scalable Platforms Management Forum SR-IOV Single-Root I/O Virtualization SSD Solid-State Drive TCO Total Cost of Ownership TCP Transmission Control Protocol TIP Telecom Infra Project TLB translation lookaside buffer ToR Top of Rack UPI Ultra Path Interconnect VM Virtual Machine VNF virtual network function XaaS \u201cX\u201d as a Service.", "This aspect of DC networking and how to improve the SDN has been well studied [121]\u2013[128].", "However, there are technology surveys available that look, individually, into technologies that relate to SDHI, such as virtualization technologies [16] or SDN [17].", "Virtualization technologies besides SDN and SDS have been a way to realize SDI (see Section II), not in its pure sense (i.e., at the HW level) but at a software level that allows emulation, to a certain\nextent, of SDI.", "Consequently, separation of control and data plane for a DC\u2019s interconnection fabric could be highly beneficial, thus SDN-based optical networking is a potential solution for managing such a network fabric.", "SDON leverages the flexibility of SDN control to support network applications via an underlying optical network infrastructure.", "ent contexts in the literature: network virtualization [17], [139] and server virtualization [16] (see Fig.", ", SDN [17]) with respect to how rapidly it can reconfigure the network.", "Combining optical overlay and SDN results in a software-defined optical network (SDON).", "This controller could be based on distributed control software, a logically centralized controller as network OS (i.e., in-line with SDN philosophy [125]), or a combination of both approaches (see [126])."]} +{"52121507|9872316": ["ent contexts in the literature: network virtualization [17], [139] and server virtualization [16] (see Fig.", "However, there are technology surveys available that look, individually, into technologies that relate to SDHI, such as virtualization technologies [16] or SDN [17]."]} +{"52961157|9436049": ["As intelligent cache and content placement is key to effective CDN operation, the topic has been the focus of much research and an overview can be obtained through the surveys presented in [2], [4], [5].", ", streaming audio/video and software distributions [2]."]} +{"52961157|3297262": ["As intelligent cache and content placement is key to effective CDN operation, the topic has been the focus of much research and an overview can be obtained through the surveys presented in [2], [4], [5]."]} +{"16483834|16515612": []} +{"10731993|15209496": ["When it comes to extracting carrier grade performance from NFV, especially in multi-cloud environments, much is still to be done [3], [4]."]} +{"21657281|3757239": ["Recently, mobile-edge computing (MEC), which can provide cloud computing capabilities in close proximity to the mobile users, has been proposed as a key technique toward 5G [9], [10]."]} diff --git a/edge/graph_201873101.jsonl b/edge/graph_201873101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eeb4ab46fb29dfc58ea6cb6072f499179c64d14c --- /dev/null +++ b/edge/graph_201873101.jsonl @@ -0,0 +1,27 @@ +{"59024321|16404386": ["Hence, those discovered genes play an important role in the analysis of gene expression data since they are able to differentiate samples from different populations (Natarajan and Ravi, 2014; Shraddha and Anuradha, 2014; Tyagi and Mishra, 2013; Lazar et al., 2012; Wang et al., 2005; Inza et al., 2004).", "\u2026those discovered genes play an important role in the analysis of gene expression data since they are able to differentiate samples from different populations (Natarajan and Ravi, 2014; Shraddha and Anuradha, 2014; Tyagi and Mishra, 2013; Lazar et al., 2012; Wang et al., 2005; Inza et al., 2004)."]} +{"1498573|365692": ["In other branches of machine learning, using EC to design algorithms has been shown to be very effective as an alternative to hand-crafting them, for instance, for inducing decision-trees 35 ."]} +{"58952404|14659766": []} +{"52011597|908131": ["Many researches are launched in this area to deal with this kind of data [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13]."]} +{"59389543|11894197": []} +{"54134680|191396": ["For more detailed information about this kind of clustering algorithms, you can refer to [2,13,140,141].", "The complete definition for clustering, however, isn\u2019t come to an agreement, and a classic one is described as follows [1]: (1) Instances, in the same cluster, must be similar as much as possible; (2) Instances, in the different clusters, must be different as much as possible; (3) Measurement for similarity and dissimilarity must be clear and have the practical meaning; The standard process of clustering can be divided into the following several steps [2]: (1) Feature extraction and selection: extract and select themost representative features from the original data set; (2) Clustering algorithm design: design the clustering algorithm according to the characteristics of the problem; (3) Result evaluation: evaluate the clustering result and judge the validity of algorithm; (4) Result explanation: give a practical explanation for the clustering result; In the rest of this paper, the common similarity and distance measurements will be introduced in Sect.", "And similarity is preferred when dealing with qualitative data features [2]."]} +{"54134680|11038925": []} +{"54134680|12894036": ["For more detailed information about this kind of clustering algorithms, you can refer to [82\u201384]."]} +{"459764|191396": ["A comprehensive review of the state-of-the-art clustering methods can be found in (Xu and Wunsch, 2005) and (Rokach and Maimon, 2005)."]} +{"459764|954543": ["The process of knowledge discovery from databases necessitates fast and automatic clustering of very large datasets with several attributes of different types (Mitra et al., 2002)."]} +{"206522771|191396": []} +{"206522771|710141": []} +{"206522771|11038925": []} +{"52155272|12454277": []} +{"3318548|54134680": ["However, reported by [9] and [16], BIRCH can only detect convex shape clusters and the time complexity of CURE and Chameleon are relatively high O(n2 log n) without sampling and O(n2) respectively).", "However, their time complexities are reported to be higher than K-means and they also fail to find non-convex shape clusters [16]."]} +{"3318548|191396": ["However, reported by [9] and [16], BIRCH can only detect convex shape clusters and the time complexity of CURE and Chameleon are relatively high O(n2 log n) without sampling and O(n2) respectively).", "Scalability becomes more and more important, and mainly manifests in two aspects: enormous data volume and high dimensionality [9].", "However, scaling these methods to higher dimensional spaces is difficult [9]."]} +{"22972069|191396": []} +{"158088684|191396": []} +{"56945970|17953874": ["The benefit of FCM is the formation of new clusters from the data points that have close membership values to existing classes [16]."]} +{"53743726|54134680": []} +{"53743726|365692": []} +{"18990050|191396": []} +{"385307|3102110": []} +{"52928059|15068419": ["External indexes evaluate the cluster using previous information about the data and internal indexes carry out the qualitative evaluation of clusters focusing the intrinsic information of the data itself [14]."]} +{"52928059|191396": ["The standart grouping process can be split in to the following steps [12]:"]} +{"25707035|54134680": ["Some recent surveys on the subject include [12,40,72,73]."]} +{"25707035|191396": ["Some recent surveys on the subject include [12,40,72,73]."]} diff --git a/edge/graph_201873536.jsonl b/edge/graph_201873536.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62debef6aec87bd49f135c9c7c9b2146b10d2d6d --- /dev/null +++ b/edge/graph_201873536.jsonl @@ -0,0 +1,2 @@ +{"2756692|16362395": ["7 S18 [27] Lotte F et al 2007 A review of classification algorithms for EEG-based brain\u2013computer interfaces J.", "7 S18 [27] Lotte F et al 2007 A review of classification algorithms for EEG-based brain\u2013computer interfaces J. Neural Eng. 4 R1 [28] Blankertz B, Lemm S, Treder M, Haufe S and M\u00fcller K-R 2011 Single-trial analysis and classification of ERP components\u2014a tutorial NeuroImage 56 814\u201325 [29] Ramoser H, Muller-Gerking J and Pfurtscheller G 2000 Optimal spatial filtering of single trial EEG during imagined hand movement IEEE Trans.", "The simple linear classifier is a very popular algorithm for event related potential (ERP) analysis in brain\u2013computer interface (BCI) applications [27, 28] that have been applied for classification of motor imagination [29]."]} +{"14221686|33286487": ["STFT and various TFDs are used for the t-f analysis [42], [43]."]} diff --git a/edge/graph_201875779.jsonl b/edge/graph_201875779.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2018781.jsonl b/edge/graph_2018781.jsonl similarity index 100% rename from graph_2018781.jsonl rename to edge/graph_2018781.jsonl diff --git a/edge/graph_201878217.jsonl b/edge/graph_201878217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91a470e6f1ca2b9004ad60ac2c37385085790827 --- /dev/null +++ b/edge/graph_201878217.jsonl @@ -0,0 +1,16 @@ +{"196004956|3994942": ["[22], [23], [24]."]} +{"34643772|2387055": ["Although there are related survey papers [6], [7], [16], [26]\u2013[29] which provide information about the SDN, more up to date activities of rapidly advancing research areas on SDN security and energy efficiency is to be brought to the research community."]} +{"34643772|10837932": ["directly help reduce energy consumption in the SDN-based networks [88], however SDN offers configurations that can help to reduce energy consumption [87], [89].", "For green networking, there have been different approaches considered [87]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"2897778|2387055": ["Network security is one of the areas [25]."]} +{"691225|55524073": ["Honeypot technology [2] has matured to the point where it provides a powerful mechanism for diverting and distracting adversaries."]} +{"781992|3994942": ["routes on a time scale ranging from tens of minutes to hours and days [15], though more commonly in days and weeks [38, 39, 16].", ", hours and days [15, 16]) whereas online traffic engineering techniques cannot offer strong stability guarantees [17], particularly when multiple ISPs need to coordinate their responses to counter an attack, and hence cannot be deployed in the Internet backbone.", "Even though it is not frequently used by ISPs due to its potential instability problem, online traffic engineering occurs on a smaller time scale, namely from minutes to hours [16, 17].", "2) Traffic engineering: Most commonly, ISPs use offline traffic engineering techniques, whereby network parameters are periodically re-optimized based on the estimated traffic matrix among the ingress/egress points of their networks [16]."]} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"14681173|206584087": ["While there have been plenty of detection and mitigation mechanisms for DDoS [4], they become obsolete due to the recent shift of the attacked targets, from directly attacking a specific target to indirect attack (e.g., [5] [6])."]} +{"64315517|206584087": ["For example, a DDoS attack blocking function is known to be best deployed as close to the source as possible [16]."]} +{"54217951|52059869": []} +{"54217951|206578224": ["haul/fronthaul networks is the distribution of functionalities provided by a centralized cloud RAN to the geo-distributed edge devices [13]."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} diff --git a/edge/graph_201885522.jsonl b/edge/graph_201885522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca808374df84c54dfb8f3b94c1f39f5f33514e66 --- /dev/null +++ b/edge/graph_201885522.jsonl @@ -0,0 +1 @@ +{"3335492|627405": ["This is because not all papers have sufficient information in title, keywords, and abstracts to conduct a proper and finegrained classification (Brereton et al. 2007), and if the purpose of the study is to capture an entire domain, developing a precise classification is close to impossible, as many publications address multiple topics, which makes a unique classification hard or even impossible.", "Automated data search, however, needs careful preparation and potentially extra test runs, as every data source has a slightly different format of the query strings, or constraints regarding the queries\u2019 length and complexity (see also the discussion in Ali and Petersen 2014, Badampudi et al. 2015; Brereton et al. 2007; Kitchenham et al. 2015)."]} diff --git a/edge/graph_201888857.jsonl b/edge/graph_201888857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201889151.jsonl b/edge/graph_201889151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ae450b033c91e83b34edce4de253bf19458a672 --- /dev/null +++ b/edge/graph_201889151.jsonl @@ -0,0 +1,5 @@ +{"28404801|5333379": ["In time series prediction, Multi Layer Perceptrons models are widely used because of their simple architecture and the use of the back-propagation learning algorithm [5, 6]."]} +{"16653149|954543": ["Data mining is a particular step in this process, involving the application of specific algorithms for extracting patterns (models) from data [10] ."]} +{"109280652|7158350": ["Artificial Neural Networks have been known to be successfully applied to a variety of real world classification tasks especially in industry, business and science [1, 2]."]} +{"43511162|5333379": []} +{"9610869|5333379": ["The problem associated with these models is that the pre-specification of the models restricts their usefulness since there could be lot of input patterns that can be considered (Huang et al., 2004)."]} diff --git a/edge/graph_201892072.jsonl b/edge/graph_201892072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50f257ddb73a2e992c031e9f468af283b1969496 --- /dev/null +++ b/edge/graph_201892072.jsonl @@ -0,0 +1,6 @@ +{"247457|393948": []} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"206779368|10355303": ["5In practical object tracking systems, this synchronization step is typically automated [19]."]} +{"24758428|7774517": []} +{"24758428|205286988": []} diff --git a/edge/graph_201892152.jsonl b/edge/graph_201892152.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..beca16f07b96badcf4527959605335a8259bc690 --- /dev/null +++ b/edge/graph_201892152.jsonl @@ -0,0 +1,28 @@ +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"62909723|9921114": []} +{"9141490|4474193": ["In the following we explain the working principles of these strategies, but for a detailed analysis and complete references, see (Jin and Branke 2005).", "The intuition behind implicit averaging is the following (Jin and Branke 2005, p. 305): because promising areas of the search space are sampled repeatedly by the EC algorithm, and there are usually many similar solutions in the population, when the population is large, the influence of noise in\u2026", "The reader interested in EC applied to optimization with noisy fitness or with time varying information may find references in the surveys by Jin and Branke (2005)."]} +{"9141490|12419623": ["A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; O \u00b4 lafsson and Kim 2002).", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002).", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002). The latest one by \u00d3lafsson and Kim (2002) emphasizes discrete problems and practical approaches, including some references to metaheuristics. Until a few years ago, the literature on Simulation Optimization was especially focussed on theoretical results of convergence of mathematically elegant algorithms. Interestingly, as noted by Fu (2002), the many new commercial software packages for simulation do not take advantage of the theoretical results of the literature.", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002). The latest one by \u00d3lafsson and Kim (2002) emphasizes discrete problems and practical approaches, including some references to metaheuristics."]} +{"108943506|10542290": []} +{"108943506|17737221": []} +{"108943506|20178897": []} +{"108943506|8363289": []} +{"37416249|1708582": ["[ 27] This method is described further as p \u00f0 s ; a \u00de \u00bc Simulink\u2019 in real time and stochastic environment.", "[ 27] To solve this new problem, the 1 -soft on-policy method is used which updates action on the basis of the experience gained from executing policy."]} +{"112790720|10440280": []} +{"112790720|5747564": []} +{"109077100|5747564": []} +{"20433009|5646762": ["[3], Xu and Wunsch [91], Freitas [92], Paterlini and Minerva [93], Jafar and Sivakumar [94].", "[3] have focused on the initialization procedures, crossover, mutation, fitness evaluation and reselection"]} +{"20433009|191396": ["References\n[1] R. Xu, D.C. Wunsch, Clustering, Oxford, Wiley, 2009.", "areas include character recognition [10,335], traveling salesman problem [91], blind channel equalizer design [21], human action", "He and Hui [215], DE \u2013 Das et al. [2], PSO \u2013 Sun et al. [225], Du et al. [229], Thangavel et al. [236], AIS \u2013 Lie et al. [260], Review \u2013 Jiang et al. [30], Lukashin et al. [31], Xu and Wunsch [91], Hruschka et al. [3,119,120], Jain et al. [34], MODE \u2013 Suresh et al. [343]\nIntrusion detection GA \u2013 Liu et al. [116], ACO \u2013 Ramos and Abraham [211], Tsang and Kwong [212], PSO \u2013 Lima et al. [246]\nComputational finance Review \u2013 MacGregor et al. [24], Brabazon et al. [25], Amendola et al. [26], Nanda et al. [27]\nLarge datasets analysis GA \u2013 Franti et al. [124], Lucasius et al. [121], ACO \u2013 Chen et al. [213] Evolutionary algorithm NOCEA \u2013 Sarafis et al. [29]\nGeological data analysis PSO \u2013 Cho [355], Review \u2013 Jain et al. [10,34], Zaliapin et al. [28], Nanda et al. [364]\nIris [150 4], Cl-3 R.A. Fisher GA \u2013 [100,114,91,128,134], DE \u2013 [16,155,153], ACO \u2013 [184,198,193,202,207], BFO \u2013 [267], PSO \u2013 [223,226,233,224,222,227], CSO \u2013 [271], ABC \u2013 [247,250,248], Firefly \u2013 [278], Frog \u2013 [180], NSGA II \u2013 [345], MOAIS \u2013 [334], MOCK \u2013 [22], MODE \u2013 [343]\nWine [178 13], Cl-3 Forina et al. GA \u2013 [128], ACO \u2013 [201,189,193,202,207], PSO \u2013 [223,224,233,226,227,231], DE \u2013 [16,155], BFO \u2013 [267], AIS \u2013 [235], ABC \u2013 [247,250,248], Firefly \u2013 [278], GSA \u2013 [288], Frog \u2013 [180], NSGA II \u2013 [345], MODE \u2013 [343], MOSA \u2013 [340,341], VIENNA \u2013 [327]\nThe recently developed new nature inspired metaheuristics like Krill herd algorithm [356], Dendritic cell algorithm [87,88], River formation dynamics [357], Granular agent evolutionary algorithm [358], Bat algorithm [359\u2013361], Glowworm Swarm Optimization [366], Black hole algorithm [368], Cellular automata algorithm [369] can also be employed to solve the partitional clustering problems.", "[289] R. Xu, J. Xu, D.C. Wunsch, A comparison study of validity indices on swarmintelligence-based clustering, IEEE Trans.", "[232] R. Xu, J. Xu, D.C. Wunsch, Clustering with differential evolution particle swarm optimization, in: IEEE Congress on Evolutionary Computation, CEC 2010, pp. 1\u20138.", "[3], Xu and Wunsch [91], Freitas [92], Paterlini and Minerva [93], Jafar and Sivakumar [94].", "Few interesting review articles on cluster analysis with overwhelming citation by researchers have been published by Jain et al. [34], Hruschka et al. [3], Xu and Wunsch [91], Freitas [92], Paterlini and Minerva [93], Jafar and Sivakumar [94].", "[91] R. Xu, D. Wunsch, Survey of clustering algorithms, IEEE Trans."]} +{"20433009|11038925": []} +{"20433009|5563132": ["[3], Xu and Wunsch [91], Freitas [92], Paterlini and Minerva [93], Jafar and Sivakumar [94].", "Jafar and Sivakumar [94] highlighted the developments in ant algorithm for cluster analysis.", "[94] O.A. Mohamed Jafar, R. Sivakumar, Ant-based clustering algorithms: a brief survey, Int.", "Few interesting review articles on cluster analysis with overwhelming citation by researchers have been published by Jain et al. [34], Hruschka et al. [3], Xu and Wunsch [91], Freitas [92], Paterlini and Minerva [93], Jafar and Sivakumar [94]."]} +{"20433009|1437067": ["[92] A.A. Freitas, A survey of evolutionary algorithms for data mining and knowledge discovery, in: Advances in Evolutionary Computing, SpringerVerlag, New York, USA, 2003.", "[3], Xu and Wunsch [91], Freitas [92], Paterlini and Minerva [93], Jafar and Sivakumar [94].", "Few interesting review articles on cluster analysis with overwhelming citation by researchers have been published by Jain et al. [34], Hruschka et al. [3], Xu and Wunsch [91], Freitas [92], Paterlini and Minerva [93], Jafar and Sivakumar [94].", "[3] E.R. Hruschka, R.J.G.B. Campello, A.A. Freitas, A.C.P.L.F. De Carvalho, A survey\nof evolutionary algorithms for clustering, IEEE Trans."]} +{"20433009|192934": []} +{"6035800|7120308": ["Since solving a planning problem is a computationally expensive task [15], we perform a set of tests to ensure that our proposed solution remains practically useful for larger environments.", "The next formal definitions follow the state-based HTN planning approach of [15]."]} +{"110268297|1230643": []} +{"43262137|28392119": ["The authors in [57] presented architecture of home gateway (HGW), the management system was crucial for realizing a better ecological home network."]} +{"37630867|206485901": []} +{"16569245|9141490": ["Wright [17] define different categories such as: continue and discrete, constrained and unconstrained, global and local, stochastic [18] and deterministic, multimodal and multiobjective and heuristic and metaheuristic optimization [19]."]} +{"154832766|20178897": ["Although \u201cEnergy Management\u201d is widely used term and applied differently in various operating scearios, this paper concerns the one related with energy saving in esidential sector and applied in the process of monitoring, conrolling and conserving energy in buildings [1,2]."]} +{"17840635|2135552": ["The performance of a schedule is measured with one or more criteria, for example, the overall profit, the operating costs, and the makespan.", "An extensive discussion of discrete-time versus continuoustime models for process scheduling can also be found in Floudas and Lin (2004).", "Readers interested in this class of scheduling problems are directed to a recent review by Floudas and Lin (2004).", "\u2026complicated by a number of other considerations, including intermediate storage, changeovers, batch and continuous operation modes, demand patterns, resource restrictions, and a variety of objectives (for more details of these characteristics, see Pinto and Grossmann, 1998; Floudas and Lin, 2004)."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} diff --git a/edge/graph_201900417.jsonl b/edge/graph_201900417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd9bf7dbdc5e02557cbd1f9e340507a46a8b073c --- /dev/null +++ b/edge/graph_201900417.jsonl @@ -0,0 +1,37 @@ +{"1033682|174797842": []} +{"29473256|23774449": ["Some related review articles have been presented [19, 23, 37]; however, these papers have not investigated specifically different action recognition approaches in temporal dimension modelling.", "Furthermore, they were particularly investigated in the area of time-series data [19] and human action recognition [23].", "[23] introduced recent human action recognition datasets and reviewed important works that applied deep learning methods to these datasets."]} +{"29473256|18599847": ["Some related review articles have been presented [19, 23, 37]; however, these papers have not investigated specifically different action recognition approaches in temporal dimension modelling.", "Furthermore, they were particularly investigated in the area of time-series data [19] and human action recognition [23].", "They obtain impressive results in learning powerful models with high capabilities of representation [19]."]} +{"29473256|9928823": ["\u2026\u2022 learning unrelated factors to the discriminating task \u2022 BMs, while having very simple learning algorithm, are very slow to compute in learning [31] \u2022 fine-tuning phase of a stochastic gradient descent learning algorithm, which makes it difficult to parallelise across-machines and deploys at\u2026", "Its hierarchical architecture makes it possible to create high-level concepts from related low-level ones where many models of this group are based on unsupervised learning [12, 31, 32]."]} +{"29473256|393948": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"8034133|1634674": []} +{"5256870|1634674": ["Human activity recognition is an important yet difficult problem that has attracted the attention of many researchers in the field of computer vision (see [17] for a recent review)."]} +{"9854676|5755403": []} +{"4383614|206602044": ["Indeed, current methodologies for speaker diarization [36], sound source separation [37] or localization [38] address scenarios with few persons."]} +{"4383614|2355696": []} +{"2654595|12724190": []} +{"5540604|2355696": []} +{"38140703|1634674": []} +{"2668908|1634674": ["A number of surveys have been published in activity recognition over the past decade [2, 27, 35]."]} +{"9820303|2355696": ["As per cognitive and social signaling studies, a person is considered as interacting with another person when they are close enough and at least one of them is looking at the other (Farenzena et al., 2009b; Vinciarelli et al., 2008)."]} +{"13663664|8034133": []} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"2355696|1029120": ["Also automatic posture recognition has been addressed in few works, mostly aiming at surveillance [57] and activity recognition [206] (See [54][116][153] for extensive overviews of the past work in the field)."]} +{"2355696|5401262": ["Although the importance of social signals in everyday life situations is evident, and in spite of recent advances in machine analysis and synthesis of relevant behavioural cues like gaze exchange, blinks, smiles, head nods, crossed arms, laughter, and similar [137][138], the research efforts in machine analysis and synthesis of human social signals like attention, empathy, politeness, flirting, (dis)agreement, etc.", ", general-purpose W4 technology does not exist yet [138][137]), answering the why and how questions in a W4-context-sensitive manner when analysing human behaviour is virtually unexplored area of research."]} +{"2355696|8777381": ["The prosody conveys a wide spectrum of socially relevant cues: emotions like anger or fear are often accompanied by energy bursts in voice (shouts) [168], the pitch influences the perception of dominance and extroversion (in general it is a personality marker [167]), the speaking fluency (typically corresponding to high rythm and lack of hesitations) increases the perception of competence and results into higher persuasiveness [167]."]} +{"2355696|14970359": ["train stations or streets) [62][115]."]} +{"2355696|9045232": ["sis [199] (see [81][215] for extensive surveys on face detection techniques)."]} +{"2355696|7788290": []} +{"1644785|1634674": ["There are several existing surveys within the area of high-level human activity recognition [22, 15, 4, 1]."]} +{"15928602|4351505": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|41505326": ["It is worth mentioning, there are more than 40 datasets speci\ufb01cally for 3D human action recognition [47].", "For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|12724190": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|1262156": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"6726756|14116122": ["Among these ones, action and activity recognition displays a crucial role in human-robot interaction, autonomous driving vehicles and video-surveillance [2]."]} +{"67856333|13787722": ["The RGB video based action recognition methods [24, 34, 27, 35] mainly focus on modeling spatial and temporal representations from RGB frames and temporal optical flow."]} diff --git a/edge/graph_201900955.jsonl b/edge/graph_201900955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201901131.jsonl b/edge/graph_201901131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..824c4a294cbe1bb44c39fc1bf4f05de0fafb6832 --- /dev/null +++ b/edge/graph_201901131.jsonl @@ -0,0 +1,3 @@ +{"13906938|15273230": ["In contrast, AUC is less sensitive to imbalanced datasets (Chawla 2005); and therefore, it is a more appropriate evaluation measure to evaluate the performance for the sentiment prediction task, since the majority of uploaded images in social networks typically belong to the positive sentiment\u2026"]} +{"53235394|13407903": ["different tasks, such as image retrieval [16], [18], [27], social images understanding [1], image annotation [28] and visual sentiment analysis [7], [8], [12], [29]."]} +{"26314965|9928823": []} diff --git a/edge/graph_201904611.jsonl b/edge/graph_201904611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c22d3714a11673b8693ebe590039622409b0024 --- /dev/null +++ b/edge/graph_201904611.jsonl @@ -0,0 +1,125 @@ +{"12092512|1990579": ["In the case of civilian drones, functional safety [AlTawy and Youssef 2016] needs cyber-physical security."]} +{"12092512|206459491": ["Also, regular side-channel analysis, including timing and power analysis, may be used for the detection of the activation of hardware trojans [Tehranipoor and Koushanfar 2010] because such trojans usually alter the system\u2019s parametric characteristics such as its expected performance and power\u2026"]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"6161031|17514014": []} +{"6161031|20905429": ["\u2026the niche recreational fitness arena catered to by current devices, researchers have also considered applications of such technologies in clinical applications in remote health monitoring systems for long term recording, management and clinical access to patient\u2019s physiological information [4]\u2013[8].", "Most proposed frameworks for remote health monitoring leverage a three tier architecture: a Wireless Body Area Network (WBAN) consisting of wearable sensors as the data acquisition unit, communication and networking and the service layer [4], [7]\u2013[10]."]} +{"10246191|1230643": ["Keywords\u2014unmanned aerial vehicle; UAV; cluster head; mobility pattern; coverage problem; utilization; quality of service\nI. INTRODUCTION WSNs can be used in various application areas."]} +{"56182140|2355696": []} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"9413021|17623152": []} +{"9413021|2357830": []} +{"9413021|1236072": []} +{"9413021|1230643": ["Multihopping is a common technique to save energy and overcome the scalability issue [123]\u2013[125]."]} +{"52069092|18657007": []} +{"52069092|17206258": []} +{"6502061|7329149": []} +{"6502061|1598350": []} +{"6502061|206901977": ["Regarding greenWSN, the following techniques should be adopted [7], [9], [29], [30]: 1) Make sensor nodes only work when necessary, while spending the rest of their lifetime in a sleep mode to save energy consumption; 2) Energy depletion (e."]} +{"6502061|16335158": ["OVERVIEW OF SENSOR-CLOUD Defined by IntelliSys,1 sensor-cloud is \u2018\u2018an infrastructure that allows truly pervasive computation using sensors as an interface between physical and cyber worlds, the datacompute clusters as the cyber backbone and the internet as the communication medium\u2019\u2019 [13], [14].", "Attracting increasing interest from both academic and industrial communities, sensor-cloud [13], [14], [53] is actually a new paradigm, motivated by complementing 1) the ubiquitous data sensing and data gathering capabilities of WSNs as well as 2) the powerful data storage and data processing abilities of CC.", "With sensor-cloud integration, there are many favorable advantages [13], [14], benefiting the users and the WSN as well as the cloud.", "With that, towards green IoT, we review the latest developments in sensor-cloud [13], [14] which is a novel paradigm in green IoT, and further envision the future sensor-cloud.", "com/system-overview powerful cloud computing technologies to provide excellent data scalability, rapid visualization, and user programmable analysis\u2019\u2019 [13], [14]."]} +{"6502061|14650419": []} +{"6502061|2357830": ["\u2022 RFID (radio-frequency identification) [16]: a small electronic device that consists of a small chip and an antenna, automatically identifying and tracking tags attached to objects."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"18999193|1940388": ["Indeed, the security\nthreats are a major deterrent in many applications IP-enabled WSNs are envisaged to support [2]."]} +{"18999193|1230643": ["Index Terms\u2014IoT-enabled Wireless Sensor Networks, wormholes, visual-assisted wormhole detection\nI. INTRODUCTION\nWithout doubt, IP-enabled Wireless Sensor Networks (WSNs) emerge as a promising framework, which brings into play many interesting features of IoT [1]."]} +{"114735598|37976266": []} +{"114735598|14849079": []} +{"114703564|205286988": []} +{"113867430|205286988": []} +{"113867430|1236072": []} +{"39444322|205286988": []} +{"13745207|17262196": ["However, Abbas et al. [94] summarized studies that assessed the various IoT devices such as collision/congestion avoidance schemes, sleep and wake mechanisms to manage a device, the intelligent of select heterogeneous radio interfaces, and so on."]} +{"13745207|21386749": ["Smart healthcare: refers to the implementation of different biometric actuators and sensors in patients for capturing, monitoring and tracking the body of a human [132, 133]."]} +{"13745207|206901977": ["Regarding green WSN technology, the following techniques could be adopted [5, 22, 63"]} +{"54776272|6607209": ["Instead, as argued by Dias et al. (2006), to perform a given task the robots should be chosen based on their own estimation of resource usage. In other words, the robots make their own estimation of the cost and based on this figure a central decision making entity decides which robot will perform the job. The measurements in Trigui et al. (2012) show that in terms of mission time, this strategy performs somewhere in between the centralized and the distributed strategy.", "Instead, as argued by Dias et al. (2006), to perform a given task the robots should be chosen based on their own estimation of resource usage."]} +{"332918|1230643": ["Sensor nodes of the first generation had only very simple sensing capabilities, providing scalar sensors for parameters such as temperature, humidity, movement, lightning conditions, pressure, and noise level (Akyildiz et al., 2002).", "In such situations, airborne cameras and sensors are valuable sources of information helping us to build an \u2018\u2018overview\u2019\u2019 of the environment and to assess the current situation."]} +{"56173909|11701828": ["An extensive literature review [11] only identified a small number of air pollution studies that utilized UAVs to measure air pollutants, with a focus on particulate matters, carbon dioxide, methane, and ozone.", "An extensive li eratur revi w [11] only identified a small number of a r polluti n studies that utilized UAVs to measure air pollutants, with a fo us on particul te matter , n dioxide, methane, and ozone.", "Mobile real-time low-cost commercial micro-sensors equipped with new technologies of consumer UAVs offer numerous advantages for capturing the spatial and temporal variability of air pollutants and provide the ability to measure important air pollutants with high sensitivities and temporal resolutions [11]."]} +{"16889013|1503157": ["Direct sensing can make agricultural systems safer, more ef\ufb01cient, more accurate, and more productive [22], [23]."]} +{"37424351|595093": ["Through literature review [46][47] [48], we classify main threats that should be kept under consideration while constructing and deploying a smart grid as follows:", "11 attacks on privacy, side-channel attacks, fraudulent software updates Smart grids Smart energy, threats to network availability, Public key infrastructure (PKI) [18] [28] power, utility DoS, breaches in data integrity, or managed PKI, [46] [47] critical infrastructure message replay, message delay, AES for sensor networks, smart Appliances false data attacks, protected routing protocols, and smart homes attacks on privacy, 802.", "\u2022 Proposed solutions for smart grids According to literature [48] [47] the possible solutions for threats to devices in a smart grid include ensuring the integrity of meter data and maintaining meter securely."]} +{"37424351|5313655": ["Both are acquired by applying proper sensors and distinctive features are taken in use to get a biometric template in authentication process [50].", "16e, 3GPPLTE - M Smartphones Smart communication, Malicious smart applications, Antivirus, [33] [52] Smart mobility, bot-nets, spy-wares, firewalls, Entertainment, threats from Bluetooth, secure APIs, Location privacy and GPS, authentication and access control filters, threats through WiFi, ETSI M2M, threats in social networking, privacy issues 3GPPLTE - M Biometrics Health, atrol and security, [50] education, institutions, coorporate sector, N."]} +{"10667334|1230643": []} +{"28051344|6879093": ["The freedom for an end-user to install, manage and use personalized applications creates additional challenges in that investigators may no longer know if the data of interest are encrypted, stored locally or in the Cloud (Kechadi et al., 2015)."]} +{"159010615|12675271": []} +{"159010615|1230643": []} +{"159010615|13348951": []} +{"20555493|9830350": []} +{"18176255|2521001": ["[23]."]} +{"40100916|206764452": []} +{"40100916|1634674": []} +{"40100916|1029120": ["tems [38]\u2013[40], transit applications [31], while others are more general."]} +{"40100916|5401262": [", tracking [35], human\u2013computer interactions [36], rehabilitation [37], pedestrian protection sys-"]} +{"40100916|16525678": []} +{"40100916|3330313": ["For example, [47] and [48] present statistical approaches to novelty detection, while [49] and [50] did a comparative"]} +{"40100916|17516538": []} +{"40100916|14970359": []} +{"40100916|7185733": []} +{"40100916|7788290": []} +{"1795182|16382890": ["Indeed, the majority of the positioning methods are vulnerable to attacks in which an adversary falsi\ufb01es the position measurement [10].", "Researchers proposed many methods [10], which offer different levels of security (provable or only statistical), and defend against different kinds of adversary (external or internal)."]} +{"3608741|2521001": ["For example, if attackers can compromise smart home devices, they can spy on the inhabitants or even gain physical access to the home (see [169] for a sur-"]} +{"3608741|6670217": ["This is naturally the case for mobile phones that, when compromised, can lead to a complete violation of user privacy (see [64] and [170] for surveys"]} +{"3608741|15669036": ["expanded to cover data publication and data streams [230]."]} +{"3608741|206764452": ["The applications in this area cover both private and public transport: Intelligent vehicles are envisioned to introduce advanced driver assistance systems or even autonomous driving by the use of sophisticated sensors [16] and communication systems [17]."]} +{"30469685|15545863": ["Hence, a new paradigm is emerging to meet the QoS requirements of vehicular Future Internet Applications, generally referred to as Fog Computing (shortly, Fog) [6], [7].", "However, the distinguishing features of the Fog paradigm are the following four ones [6], [7]: (i) Edge location and location awareness: being deployed in proximity of the VCs, Fog nodes may efficiently exploit the awareness of the connection states for the support of delay and delay-jitter sensitive applications, such as VTube-like interactive applications [3]; (ii) Geographical deployment: Fog nodes support services which demand for widely distributed geographical deployments, as, for example, vehicular video streaming services; (iii) Predominance of wireless access and support for the mobility: Fog nodes may exploit Infrastructure-to-Vehicular (I2V) single-hop IEEE 802."]} +{"3437701|4730": []} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"38777028|19938676": ["Next generation architectures are expected to support various heterogeneous technologies and networks given in [113]."]} +{"38777028|3936425": []} +{"38777028|41035405": ["The Gaussian relay channel was introduced in [69] and [70]."]} +{"86394210|13745207": ["[37] (2018) Green IoT for healthy environment and in smart cities \u221a \u221a \u221a \u221a \u25e6 Reviewed the enabling technologies to reduce pollution, energy consumption, and resource usage.", "Greening information and communication technologies enabled the green IoT [37] by reducing energy consumption, pollution, and hazardous emissions in smart cities."]} +{"86394210|196119081": []} +{"86394210|13991708": ["The relationship between public safety and the Internet of Things (IoT) was discussed in [1], while a taxonomy of the IoT-based smart city was provided in [2]."]} +{"58457606|2906926": []} +{"29301335|1230643": ["Motes in sensor network are static devices that operate over the battery and provide highly sensitive applications in data acquisitions [5, 6]."]} +{"2815051|437368": []} +{"10636199|2469117": []} +{"59619024|17206258": ["A number of probabilistic routing/ broadcasting schemes are deeply studied in [15]."]} +{"207190974|15782139": []} +{"7321946|15589021": ["Gas sensors are classified according to their operational principles with the most common being thermal, mass, electrochemical, potentiometric, amperometric, conductometric, and optical sensors [9,10]."]} +{"17593057|385243": ["\u2022 Fault injection attacks [16], [22], [37], [38], [45], [60]."]} +{"954107|29060869": []} +{"954107|193574": []} +{"52126539|18657007": []} +{"2471950|10310014": ["Up until recently, PSC has been handled through narrowband communication technologies such as the land mobile radio (LMR), which can deliver reliable voice communications, but do not support broadband data [1], and are also often limited in terms of coverage and interoperability [2]."]} +{"2958701|4716814": ["An evidence of the suitability of deep learning for many kinds of autonomous robotic applications is the increasing trend in deep learning robot related scientific publications over the past decades, which is expected to continue growing [8]."]} +{"2958701|1932843": ["These types of problems are suitable to be solved by means of a reinforcement learning framework [28]."]} +{"2958701|393948": ["These deep models show great performance not only in Computer Vision tasks but also in other tasks such as speech recognition, signal processing, and natural language processing [5]."]} +{"421957|205286988": ["Some candidate protocols can be directed diffusion, SPIN, or TEEN, among others [28]."]} +{"37949742|26793080": ["in [1], [2], [3], [4], 5], [6], [7], [8], [9], [10)."]} +{"11810527|12029139": ["In the context of our system, the wireless energy sources fall into two categories of dedicated sources and Ambient sources [27].", "A more attractive energy harvesting approach is wireless (RF) energy harvesting which provides key advantages in virtue of being controllable, lower cost and smaller form factor implementation [15], [27].", "Extensive studies exist in the literature investigating on techniques to improve the performance of WEH unit [27], [29]."]} +{"196191596|17708892": ["There are several possibilities for these type of transmissions, yet the recent development of the Low Power Wide Area Network (LPWAN) protocols present new opportunities with the benefits of a reduced energy consumption and moderate data rate [29,30]."]} +{"196191596|13475127": ["Long-range (LoRa) transmissions require either a previously established infrastructure, such as a ground base station, or satellite connectivity [1].", "which, in many cases, are lost to strong currents or vandalism [1]."]} +{"12655649|1230643": ["Wireless sensor networks (WSN) play an important role in many industrial [1], health [2] and body monitoring systems [3,4], seismic vibration sensing [5], ad-hoc systems [6] and spectrum sensing [7] applications.", ", if the value of one objective function is in the range [0, 1] and the value of second objective is in the range [0, x] (where 1 < x \u2264 \u221e), then the second objective produces bias in the weighted fitness function.", "In this work, we normalize all the objective values within the range [0, 1]."]} +{"12756405|25929315": []} +{"19518939|31245252": ["Internet of things (IoT) [1], [2] is an integral part in today\u2019s development of smart city."]} +{"19518939|2623404": ["To overcome these shortcomings, software defined wireless networking (SDWN) [15] was proposed based on the paradigm of software defined networking (SDN) [17].", "[15] S. Costanzo, L. Galluccio, G. Morabito, and S. Palazzo, \u2018\u2018Software defined wireless networks: Unbridling SDNs,\u2019\u2019 in Proc.", "(EWSDN), Oct. 2012, pp. 1\u20136."]} +{"133337901|3645740": ["Prospective researchers in the area may \ufb01nd the comprehensive survey of ML techniques for cellular communication network a pertinent starting point [107]."]} +{"133337901|4716814": ["Many studies have been done to develop intelligent mobile robots communication systems such as [43,104]."]} +{"53717994|61132": ["There are three main types of routing protocols, namely, proactive, reactive, and geographic [70].", "One of the main challenges in the design of co-operative applications involving Multiple UAVs (Multi-UAVs) is the formulation of a network that can provide connectivity among the different types of employed vehicles, protecting at the same time the vehicles and the fleet mission from failures [70].", "To this end, there are three main energy-aware routing protocols: multipath-based protocols, node-based protocols, and cluster-based protocols [70]."]} +{"53717994|206901977": ["In terms of networking, saving energy in UAVs can be achieved [76] by (a) data reduction, (b) network coding, and (c) energy-ef\ufb01cient routing."]} +{"52090549|25929315": ["In the former, resource blocks are split among IoT devices and UEs either over time [8] or frequency [9], [10] as means to avoid interference and congestion."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"4949537|61132": []} +{"8566011|205286988": []} +{"9147429|10310014": []} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"3311440|1230643": ["Proliferating real-world implementations of wireless sensor networks (WSNs) and an abundant number of studies for decades have proven that WSNs are one key enabling technology for monitoring environments, not only in military, but also in industry and civil areas [1]."]} diff --git a/edge/graph_201905485.jsonl b/edge/graph_201905485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa44be0caecbfd6ced2d1faee2c7e9cfd39f7e78 --- /dev/null +++ b/edge/graph_201905485.jsonl @@ -0,0 +1,8 @@ +{"15132533|62204132": ["Their solution heuristic was a two-stage process of firstly fixing the replenishment periods and then secondly determining what adjustments should be made to the planned orders as demand was realised."]} +{"56129856|14228694": []} +{"56129856|54009499": ["A review of these models can be found in Drexl and Kimms (1997). Since some dynamic lot sizing problems may be difficult to solve, several authors have developed meta-heuristics to find good solutions to these problems. Jans and Degraeve (2007) gave an overview of meta-heuristics for dynamic lot sizing and showed that especially simulated annealing, tabu search and genetic algorithms have frequently been used to solve this type of lot sizing problem.", "A review of these models can be found in Drexl and Kimms (1997). Since some dynamic lot sizing problems may be difficult to solve, several authors have developed meta-heuristics to find good solutions to these problems. Jans and Degraeve (2007) gave an overview of meta-heuristics for dynamic lot sizing and showed that especially simulated annealing, tabu search and genetic algorithms have frequently been used to solve this type of lot sizing problem. Neural networks and threshold accepting, in contrast, have only been used very infrequently in this domain. A related review is the one of Goren et al. (2010), who made a survey on the use of genetic algorithms in lot sizing models.", "A problem similar to the JRP, the batching and scheduling problem (BSP), was reviewed by Drexl and Kimms (1997). The BSP considers a scenario where multiple items are produced on the same facility, and where demand for the same items may be grouped in batches.", "A review of these models can be found in Drexl and Kimms (1997). Since some dynamic lot sizing problems may be difficult to solve, several authors have developed meta-heuristics to find good solutions to these problems."]} +{"154654364|13932708": []} +{"154654364|14228694": []} +{"154654364|54009499": []} +{"35281202|54009499": ["In the Proportional Lot Sizing and Scheduling Problem (PLSP), the remaining capacity in a given period is used to produce a second item (Drexl and Kimms [27]).", "Other classifications were proposed by Salomon [89], Drexl and Kimms [27], and Staggemeier and Clark [96].", "These problems consider short time periods or micro-periods (Drexl and Kimms [27]) and, in contrast to the big time bucket problems, they also consider the sequence of the production lots.", "For a survey of these extensions (see Drexl and Kimms [27])."]} +{"10882395|54009499": ["This is in fact the shortcoming of the CSLP.", "CSLP [9] is a step towards a more realistic situation compared to DLSP.", "In CSLP the all-or-nothing assumption, that seems to be strict and makes eecient implementation of mathematical programming approaches possible, does not exist any more, but still only one item may be produced per period.", "These are: the economic lot scheduling problem (ELSP), the discrete lot sizing and scheduling problem (DLSP), the continuous setup lot sizing problem (CSLP), the proportional lot sizing and scheduling problem (PLSP), and the general lot sizing and scheduling problem (GLSP)."]} diff --git a/edge/graph_201905764.jsonl b/edge/graph_201905764.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_201906147.jsonl b/edge/graph_201906147.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202003788.jsonl b/edge/graph_202003788.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9dc3b514ce620c6a5ec1179b415916139cb2efc9 --- /dev/null +++ b/edge/graph_202003788.jsonl @@ -0,0 +1,6 @@ +{"196645177|207372751": ["Most existing techniques available for network analysis have been developed for homogeneous networks [17\u201319] and are not directly extensible to heterogenous networks."]} +{"23534034|6078908": ["generally perform better than filtering or embedded techniques especially for gene expression data, but they are computationally expensive (Hira and Gillies, 2015), and can potentially lead to overfitting (Saeys et al.", "\u2026account the learning algorithm that is to be optimized, wrapper methods generally perform better than filtering or embedded techniques especially for gene expression data, but they are computationally expensive (Hira and Gillies, 2015), and can potentially lead to overfitting (Saeys et al., 2007)."]} +{"23534034|11769756": ["It has been shown to outperform many other learning algorithms on various biological problems, including prediction of proteolytic cleavage (duVerle and Mamitsuka, 2012), DNA-binding residues in proteins (Wang and Brown, 2006; Si et al., 2015), and linear B-cell epitopes (Wang and Pai, 2014).", "ing prediction of proteolytic cleavage (duVerle and Mamitsuka, 2012), DNA-binding residues in proteins (Wang and Brown, 2006; Si et al."]} +{"23534034|11894197": []} +{"3778304|202003788": []} +{"196633790|202003788": []} diff --git a/edge/graph_202094040.jsonl b/edge/graph_202094040.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6176bacc99a0fa21faac7a06e87098c5b554d760 --- /dev/null +++ b/edge/graph_202094040.jsonl @@ -0,0 +1,12 @@ +{"63283745|14315321": []} +{"30402381|2332366": ["In addition the security, safety, and trust aspects [18,21,74], not only at the ICPS level but also large-scale systems, are seen as challenging, especially due to the nature of interactions among ICPSs that are no longer a priori known and centrally managed.", "Enterprise Resource Planning (ERP) and business objectives in real time [1,16]\u2013[18]."]} +{"30402381|579475": ["Therefore, CPSs are also ubiquitous embedded cyberphysical applications that are surfacing (emerging) and are now bridging the physical and virtual worlds and share all kinds of collaborative networks [1], [10], [11].", "8 IEEE IndustrIal ElEctronIcs magazInE \u25a0 march 2017 asynchronous manner from time to time [1], [11], [12].", "Considering the key trends identified [9], [11], [22], [52]\u2013[63], including information-driven interaction, distributed business processes, cloud computing and visualization, cooperation, multicore systems and graphics processing unit computing, and SOA-ready devices, the key question that arises is how to take advantage of their benefits to provide the multifaceted ICPSs envisioned that fully cover the industrial requirements.", "Several key challenges in multiple domains have been identified for CPSs [9], [11], [22], [52]\u2013[63]."]} +{"30402381|13922338": ["march 2017 \u25a0 IEEE IndustrIal ElEctronIcs magazInE 13 hardware heterogeneity, new developments in operating systems and programming languages tailored to CPSs may arise, which, however, also may be tackled by significantly extending existing approaches [79]."]} +{"30402381|7350786": ["Based on expert analysis [47] as well as input from advisory and consulting companies [48]\u2013[50] and international industry consortia [28], new smart ICPSs and related technologies [6], [51] and infrastructures are currently driving research, innovation, competition, and disruptive business opportunities in a broad set of sectors such as agriculture, energy and smart grid, transportation, collaborative and networked organizations, smart city, building design, industrial automation, health care, and manufacturing.", "10 IEEE IndustrIal ElEctronIcs magazInE \u25a0 march 2017 larger scope of CPSs [1], [6], IoT [51], and Internet of Services, can play a pivotal role toward enabling enterprises to achieve their goals.", "Similar to the societal changes, the manufacturing domain is also undergoing a significant transition [5], [6]."]} +{"49486298|7350786": []} +{"115532627|4626310": ["In a similar way, the work in [28] also discussed services for IoT devices, but with focus on IoT protocols such as CoAP (Constrained Application Protocol) and MQTT (Message Queue Telemetry Transport)."]} +{"115532627|31245252": ["The development of different areas of electronics, computing, data acquisition, and communication has created a fertile environment for the rise of the Internet of Things (IoT) [1]."]} +{"114553862|1598350": ["The interconnected things are not a new definition [12], but the development explosion phenomenon has been driven by the recent The Industry 4.0 defines the fourth industrial revolution, defining the automation and data exchange in manufacturing technologies and services including cyber translated\u2026"]} +{"37496516|6959212": []} +{"37496516|1230643": []} +{"110093056|1503157": []} diff --git a/edge/graph_202100794.jsonl b/edge/graph_202100794.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202125696.jsonl b/edge/graph_202125696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2021789.jsonl b/edge/graph_2021789.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202228067.jsonl b/edge/graph_202228067.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..876c85aae295b9373cd93f260a33a2dea661a821 --- /dev/null +++ b/edge/graph_202228067.jsonl @@ -0,0 +1 @@ +{"101464776|8569776": []} diff --git a/edge/graph_202230704.jsonl b/edge/graph_202230704.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38ebedebd2977d32b431f6b9c0a4f19beaf8c9a5 --- /dev/null +++ b/edge/graph_202230704.jsonl @@ -0,0 +1 @@ +{"88518170|14269689": [" has changed since. Armstrong (2001) called for further research, while Moskaitis and Hansen (2006) asked \u201cDeterministic forecasting and veri\ufb01cation: A busted system?\u201d Similarly, the recent review by Fildes et al. (2008, p. 1158) states that \u201cDe\ufb01ning the basic requirements of a good error measure is still a controversial issue.\u201d 1.2 Simulation study To focus issues and ideas, we consider a simulation study, in which"]} diff --git a/edge/graph_202237164.jsonl b/edge/graph_202237164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43663570e2088aeff53def00f8f0a972762f32cc --- /dev/null +++ b/edge/graph_202237164.jsonl @@ -0,0 +1,55 @@ +{"3508403|13171013": ["This has been empirically proved to be efficient at increasing the likelihood of discovering the optimal joint policy in stochastic environments and avoiding agents gravitating towards a sub-optimal joint policy [Bloembergen et al., 2015; Palmer et al., 2018; Panait et al., 2006; Wei and Luke, 2016]."]} +{"1871572|35426346": [": failures, resources) [33, 41] Ensure modularity & encapsulation full [31, 52] Support contex awareness full [6, 33, 44, 52] Ensure flexibility full [31, 33, 44, 52] Increase systems integration full [4, 31, 44] Support fault-tolerance full [32, 33, 54] Enable high-level protocols and langs full [52] Ensure reconfigurability full [4, 31, 52]", "partial [6] Increase dependability partial [4, 31] Increase interoperability partial [4, 31] Optimize energy consumption partial [44] Enable repetability partial [31, 44] Facilitate development partial [33, 51, 52] (various systems\u2019 complexity) Reducing communication partial [6, 51] (Agent Migration) Facilitate understanding partial [32] system model Enable self-healing partial [41] Handling variability partial [6] and resources scarcity Enabling self-adaption partial [52] Simplify software partial [6] development/extension Ensure robustness partial [41] Facilitate components partial [6] evolution and reuse Face unpredictable scenarios partial [52] Support security partial [54] (cyber and physical layers) Maximization of partial [4] resources utilization Reduce redundancy partial [32] Proactiveness and full [44, 51, 52] intelligent behaviors [31, 33, 41] Ensure Scalability full [4, 31] Reactivity full [41, 44, 51] Social-able full [41, 44] Increase autonomy full [4, 44, 51] (e.", "[31], for example, developed a manufacturing control system"]} +{"1281524|14478191": ["Roijers et al. have conducted a signi\ufb01cant amount of multiagent, multi-objective research (Roijers et al. 2013a,b, 2014).", "It also leads to a subset of Pareto optimal solutions, but not necessarily a good representation of the Pareto front (Roijers et al. 2013a)."]} +{"1281524|1708582": ["For the purpose of learning, however, we use the distance to the goal state after each timestep, as this provides a smoother gradient for learning (Kaelbling et al. 1996).", "\u2026reward of taking action a while in state s , where Q ( s , a ) is the Q value for the state\u2013action pair ( s , a ) , \u03b3 is the discount factor, and Q max a (cid:9) ( s (cid:9) , a (cid:9) ) returns the maximum Q value over all actions available to the next state\u2013action pair (Kaelbling et al. 1996)."]} +{"15373186|14478191": ["These preferences can be expressed in terms of a scalarisation function, also known as a utility function, f , which collapses the multi-objective value of a policy, V , to a scalar value according to the preferences of the user [10].", "Following [10], we assume that when the end user selects a policy for execution scalarisation always takes places, either explicitly (by applying the scalarisation function) or implicitly, embedded in the thought-process of the end user.", "The utility-based approach [10] highlights that agents aim to maximise the utility of the user, as expressed by the scalarisation function.", "A Multi-Objective Markov Decision Process (MOMDP) [10] is a tuple < S,A, T,R, \u03bc, \u03b3 > where \u2022 S is a finite set of states, \u2022 A is a finite set of actions, \u2022 T : S \u00d7 A\u00d7 S \u2192 [0, 1] is a transition function specifying, for each state, action, and next state, the probability of that next state occuring, \u2022 R : S \u00d7 A \u00d7 S \u2192 R, n \u2208 N, is a reward function, specifying, for each state, action, and next state, the expected immediate reward vector of length n (one element for each objective), \u2022 \u03bc : S \u2192 [0, 1] is a probability distribution over initial states, \u2022 \u03b3 \u2208 [0, 1) is a discount factor specifying the relative importance of immediate rewards.", "For MOMDPs where the scalarisation function is known to be monotonically increasing (but not necessarily linear) and only deterministic policies are allowed, the Pareto front (PF) is the optimal solution set [10]:"]} +{"64382236|14478191": ["If the relative importance of these objectives is not known when the problem needs to be solved, multi-objective methods are needed to compute the set of all possibly optimal solutions [8]."]} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"8858354|14478191": []} +{"4452600|2294541": ["In general, a TAW working at (and under the supervision of) a client of a TEA and this client do not enter a contract."]} +{"4452600|6159806": []} +{"7212266|14478191": ["Multi-objective reinforcement learning [18, 25] has recently seen a renewed interest.", "Such problems can be modelled as multi-objective Markov decision processes (MOMDPs), and solved with multi-objective reinforcement learning (MORL) [18].", "The corresponding coverage set is called the convex coverage set (CCS) [18].", "An MOMDP, is an MDP in which the reward function R(st, at) = rt \u2208 R describes a vector of n rewards, one for each objective [18]."]} +{"12498979|14478191": ["In this section, we formally define a MO-CoG and briefly describe existing methods for it and closely related problems."]} +{"14478191|1932843": ["\u2026problems, commonly modeled as Markov decision processes (MDPs) (Bellman, 1957a), occur in a range of real-world tasks such as robot control (Kober & Peters, 2012), game playing (Szita, 2012), clinical management of patients (Peek, 1999), military planning (Aberdeen, Thi\u00b4ebaux, & Zhang,\u2026"]} +{"28793151|14478191": ["Rewards for each objective are first normalised [15] before linear scalarisation [16] is applied with an even weighting."]} +{"124195290|14478191": ["In this dissertation, we advocate the utility-based approach (Roijers et al., 2013a) for determining which policies the solution set should contain.", "This chapter uses our earlier taxonomy of multi-objective decision problems (Roijers et al., 2013a).", "This happens for example in the case of multi-objective Markov decision processes (MOMDPs2), where a non-linear scalarization would lead to the loss of the additivity property on which single-objective solution methods rely (Roijers et al., 2013a).", "The motivating scenarios and the utility-based approach were introduced in (Roijers et al., 2013a), and further discussed in (Roijers et al., 2015d; Zintgraf et al., 2015; Whiteson and Roijers, 2015).", "The algorithms we contribute in Chapter 4 have been published earlier in (Roijers et al., 2013b,c, 2014b, 2015a,b).", "Such a conversion involves two steps (Roijers et al., 2013a)."]} +{"124195290|1932843": [", 2013), games (Szita, 2012) and robotics (Kober and Peters, 2012)."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"3212631|3113396": ["Baarslag et al. (2016) provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e.g. cost, size, and colour of a car) in an exchange.", "\u2026research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot\u2026", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "[21] for a detailed description of many domain-specific methods).", "Learning the utility function, or preferences, of other agents is also a major line of research in automated negotiation agents (see Baarslag et al. (2016) for a detailed description of many domain-speci\ufb01c methods).", "[21] provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e."]} +{"3212631|7681233": ["This question has been addressed extensively by researchers in behavioural game theory and experimental psychology (Camerer et al., 2015; Goodie et al., 2012; Wright and Leyton-Brown, 2010; Yoshida et al., 2008; Camerer et al., 2004; Hedden and Zhang, 2002)."]} +{"3212631|9316331": []} +{"3212631|10725980": ["\u2026other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman\u2026", "For example, Southey et al. (2005) maintain Gaussian beliefs over the continuous parameters of a speci\ufb01ed player function for Poker (cf. Table 1 in their paper).", "Implicit modelling based on expert algorithms has been shown to be e \ufb00 ective in variants of Poker (Bard et al., 2013; Hoehn et al., 2005).", "However, as can be seen in Table 2, relatively little work exists on the problem of learning models of agent behaviours (i.e. policy reconstruction) under partial observability conditions, with most e \ufb00 orts focusing on extensive form games with incomplete information (e.g. Poker).", "The idea of monitoring conditional action frequencies of the modelled agents has also been used in the context of extensive form games with imperfect information, such as Poker (Mealing and Shapiro, 2017; Ganzfried and Sandholm, 2011; Southey et al., 2005; Billings et al., 2004).", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "Rubin and Watson [232] survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "The domain of Poker added the problem of partial observability of environment states, since no player can see the private cards of other players.", "Rubin and Watson (2011) survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot interaction (Lasota et al., 2014), commercial video games (Bakkes et al., 2012), trust and reputation (Ramchurn et al., 2004), and multiagent learning (Stone and Veloso, 2000)."]} +{"3212631|14441987": ["Many important applications are characterised by such openness, such as ad-hoc wireless networks [231] and web-based systems for collaborative computing [198].", "Many important applications are characterised by such openness, such as ad-hoc wireless networks (Royer and Toh, 1999) and web-based systems for collaborative computing (Miorandi et al., 2014)."]} +{"3212631|13171013": ["In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning (Hernandez-Leal et al., 2017; Bloembergen et al., 2015; Tuyls and Weiss, 2012; Busoniu et al., 2008; Panait and Luke, 2005; Alonso et al., 2001; Stone and Veloso, 2000; Sen and Weiss, 1999).", "In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning [138,41,269, 55,213,15,257,241]."]} +{"11893896|3113396": ["The lack of work around incomplete user preferences is in part because of a prevalent focus of negotiation literature on uncertainty about the opponent [8]."]} +{"1821001|14478191": ["In other cases, w is never made explicit but instead a human is involved in the decision making and selects one solution from the CS, perhaps on the basis of constraints or preferences that were too difficult to formalize in the objectives themselves (Roijers et al., 2013a).", "To be precise, in the case of stochastic strategies a CCS of deterministic strategies is always sufficient (Vamplew, Dazeley, Barker, & Kelarev, 2009); in the case of deterministic strategies, linearity of the scalarization function makes the CCS sufficient (Roijers et al., 2013a).", "Such a conversion involves two steps (Roijers et al., 2013a)."]} +{"4533648|9588126": ["Reinforcement learning (RL) holds considerable promise to help address a variety of cooperative multi-agent problems, such as coordination of robot swarms (Hu\u0308ttenrauch et al., 2017) and autonomous cars (Cao et al., 2012)."]} +{"52345417|14478191": ["An optimal solution for an MOMDP under linear f is a convex coverage set (CCS), i.e., a set of policies containing at least one optimal policy for any linear scalarization (Roijers et al. 2013).", ", a set of undominated policies containing at least one optimal policy for any linear scalarization (Roijers et al., 2013)."]} +{"52284598|14478191": ["Roijers et al. (2014) provide a thorough overview."]} +{"52981002|4884302": []} +{"52981002|3212631": []} +{"52981002|9316331": []} +{"52981002|1708582": []} +{"52981002|13171013": []} +{"3404226|14478191": [", Pareto front, that contains for any allowed policy \u03c0 \u2032 \u2208 \u03a0 with value v\u2032 a policy that has a greater or equal value in all objectives [39].", "Much multi-objective decision making takes place in the context of the decision support scenario [39] (fig 1), which applies to multiobjective decision-theoretic planning and learning [39], but also to multi-objective (heuristic) optimisation with, e.", "We argue, in accordance with the utilitybased approach to multi-objective decision making [39, 54], that the selection phase is an integral part of solving a multi-objective decision problem, and that doing this suboptimally can be detrimental to user utility.", "[39], we assume that the user has as an intrinsic utility function"]} +{"114360030|31086789": ["On the other hand, in centralized system, installation of any new module also needs extra programming in central controller and perhaps exchanging whole system for its implementation [12,116]."]} +{"114360030|16614482": ["Five main attributes outlined for the capabilities of MAS, dealing with largeness and complexity, extendibility and flexibility, intelligence and autonomy, modularity, and handling distributed data in the MG [38,39].", "JADE is the most widely used platform, for the development of MAS, carried out in the studies and majority of articles reviewed and surveyed.", "JADE support conceptual design and deployment stages for MAS, providing freedom to computer programmers to extract designed agent.", "In MGs, secondary voltage and frequency control scheme, established on distributed supportive control of MAS, is executed via communication system for improvement in system reliability.", "An agent development environment is required for constructing MAS, which supports some phases of MAS conceptual proposal development procedure.", "Moreover, for implementing MAS, there are some mainly using tools such as JADE, JANUS, ZEUS, VOLTTRON, Netlogo, or Skeleton agent which offers functionalities to enable programming via using MAS [41].", "By the use of MAS, the protection coordination can be planned and control actions can be performed properly, isolate the fault area and protect the MG system in real time under varying conditions [33].", "Some papers also addressed reliability of MG by distributed power control for distributed energy resources (DER), based on network, MAS, with communication delay technologies having effective skills for distributed demand management [29,30].", "Several applications of MAS, especially in MG have various functionalities in power system.", "While the last stage launching the generated MAS, run-time management of the agents, messaging processing with the DER and processing of the data.", "An inclusive description, new analysis, and design methodology for creating MAS is beyond the approach of this article, but for the development of MAS, [40] described a four phases generic platform development process including; Analysis, design, development and deployment.", "General organization of this paper includes: In Section 2, an overview of MAS, its capabilities along with application requirements are discussed in details."]} +{"30440139|14478191": ["Such a conversion involves two steps [Roijers et al., 2013a]. e first step is to specify a scalarization function that expresses the utility of the user for different trade-offs between the objectives.", "In particular, the survey we wrote together with Peter Vamplew and Richard Dazeley [Roijers et al., 2013a] forms the basis of how we organize concepts in multi-objective decision making.", "\u2026the literature, MO-CoGs have many different names:multi-objective weighted constraint satisfaction problems (MO-WCSPs) [Roll\u00f3n, 2008], multi-objective constraint optimization problems (MO-COPs) [Marinescu, 2011], and multi-objective collaborative graphical games (MO-CoGG) [Roijers et al., 2013c]."]} +{"5553687|14478191": ["It would be interesting to adapt our methods to these problem classes to create Bayesian methods for learning in these problems, as well as for MOMDPs [13].", "However, many real-world decision problems are further complicated by the presence of multiple (possibly con\ufb02icting) objectives [13].", "Furthermore, we aim extend our methods to multi-objective reinforcement learning in MOMDPs and MOSGs [12,13,17,19]."]} +{"57189444|202540003": []} +{"57189444|24855581": ["Deep RL is a broad term that indicates the combination between deep learning and RL to deal with high-dimensional environments [34]\u2013[36]."]} +{"57189444|4884302": ["Deep RL is a broad term that indicates the combination between deep learning and RL to deal with high-dimensional environments [34]\u2013[36]."]} +{"57189444|13171013": ["social dilemma (MGSD) that has been applied to various phenomena in social science and biology [22], [52], [94].", "[22] analyzed the evolutionary dynamics, Hernandez-Leal et al."]} +{"281632|14478191": ["This is non-trivial, as at any given time these objectives could require conflicting action, and the entity must learn a way to behave that accounts for this [6]."]} +{"12280636|14478191": ["MOEAs are general-purpose multi-objective optimization methods, and have been applied to a large variety of optimization problems [1], from reinforcement learning [15] to design space exploration [12]."]} +{"3103708|10725980": ["Examples include games such as poker [24] and security settings [8]."]} +{"2661363|1708582": []} +{"13357627|14478191": ["The most commonly used techniques in MORL are scalarizations of the multi-objective problem [12], [14], [15], either before the fact by reducing the dimensionality of the problem to a single scalar objective, or after the fact, by applying them to Q\u0302-vectors.", "Multi-objective reinforcement learning [12] (MORL) is an extension to standard reinforcement learning, where the environment is a multi-objective MDP, or MOMDP, and the feedback signal returns a vector rather than a single scalar value, i."]} +{"19141434|9588126": []} +{"28808621|115456": ["[21] and Robertson & Watson [25] for an overview.", "We recommend the surveys by Ontanon et al. [22] and Robertson & Watson [26] for an overview."]} +{"28808621|5014732": ["[21] and Robertson & Watson [25] for an overview."]} +{"1425113|14478191": []} +{"86490878|3113396": []} +{"3513065|14478191": ["erge to optimal policies (Sutton & Barto, 1998). However, for multi-objective problems, many such optimal policies may exist, depending on the trade-offs between satisfying particular objectives (Roijers et al., 2013). Autonomous agents, such as our example cleaning robot, are not really independent - they usually have a purpose de\ufb01ned by another agent: human. This aspect is often neglected in the literature, but ", "o objectives ordered by those priorities. In contrast to single-policy methods, multi-policy MORL methods are used for \ufb01nd a set of policies. Their aim is to approximate the Pareto front of policies (Roijers et al., 2013). In multi-policy methods, the preference of objectives does not need to be set a priori as a Pareto optimal policy for any preference may be obtained at runtime (Moffaert & Nowe, 2014).\u00b4 A natura"]} +{"11705472|14478191": ["Contrary to previous work on related (vector-valued) cooperative games [20], we take a utility-based approach [16]: we assume that each agent, i, has a private utility function, f , that takes the multi-criteria value of a coalition, and produces a scalar utility."]} diff --git a/edge/graph_20225408.jsonl b/edge/graph_20225408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36eaa52af5de2cf7b9da02edfeccd16170e9081f --- /dev/null +++ b/edge/graph_20225408.jsonl @@ -0,0 +1,16 @@ +{"32441812|15116409": ["The concept of cognitive radio technology was suggested to deal with the problem of spectrum scarcity by utilizing wireless spectrum in an opportunistic manner [1], [3-4]."]} +{"32441812|12601073": ["In other words, most of these papers either only consider the probability of detection, , versus signal to noise ratio (SNR), such as those in [6-7], or only consider the probability of detection, , versus the probability of false alarm, , such as those in [8-9], or both of them such as those in [1011]."]} +{"206934796|8974063": ["Studies have shown that the radio spectrum is not utilized constantly by the users this resource has been allocated to; 25 spectrum usage is estimated to be between 5% and 85% on a block of licensed radiofrequency (RF) bands at 26 different geographical locations and at different times [1-4]."]} +{"206934796|12601073": ["Cyclostationary Detection 65 takes advantage of the fact that statistical parameters of practical communication signals vary periodically [19].", "Several spectrum sensing techniques have been 59 proposed over the last decade [2-20]."]} +{"15487264|31973880": []} +{"15487264|8974063": ["The decision making process includes spectrum classification, collection, and CR reconfiguration that allow the CR to select the optimum spectrum band for signal transmission [11, 12]."]} +{"15487264|2509135": []} +{"5549402|2835258": ["It is worth noting that the latter algorithm lends itself to distributed implementation if the SINR measurement at each receiver is fed back to all transmitters via efficient information dissemination algorithms [ 31 ].", "3) Each node knows the geographical location of all other nodes via location discovery schemes [29]\u2013[ 31 ]."]} +{"30162425|31973880": []} +{"30162425|8974063": ["Spectrum decision, ability of a cognitive radio to select the best channel [8], is one of the areas wherein we want to apply this kind of model.", "probability ( ) P h and the likelihood ( | ) P d h [8]."]} +{"13068662|8909218": ["Remark 3 (Femtocells): We can apply the approach for non-circular regions to model the aggregate interference generated by femtocell base stations (FBSs) in the macrocell networks [62]."]} +{"17332695|15116409": ["However, radio spectrum is a finite resource [1].", "Thus, it is assumed that the PU transmitter sends a pilot stream simultaneously with the data and the SU receiver has a perfect knowledge of the pilot stream to verify its transmission at the frequency band [1]."]} +{"34357084|12601073": []} +{"14171678|6507312": []} +{"14171678|10908575": []} +{"10054981|12452682": []} diff --git a/edge/graph_202276113.jsonl b/edge/graph_202276113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..acd3677d3788936d54e154958a9008e92f7f255b --- /dev/null +++ b/edge/graph_202276113.jsonl @@ -0,0 +1,2 @@ +{"1738610|206583375": []} +{"46919127|58403225": []} diff --git a/edge/graph_202354824.jsonl b/edge/graph_202354824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202407276.jsonl b/edge/graph_202407276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c7f778b79aee56524766971fce946493803716fb --- /dev/null +++ b/edge/graph_202407276.jsonl @@ -0,0 +1,14 @@ +{"5918474|14814753": []} +{"150260288|2473564": ["Before deep learning based approaches dominate face recognition and FER tasks, many works have been conducted based on the hand-crafted features [3].", "First, the differences between some facial expressions might be subtle and thus dif\ufb01cult to classify them accurately in some cases [3]."]} +{"36122381|11042075": ["Many methods have been proposed for gait recognition aiming at biometric recognition [11]."]} +{"45508032|2814871": []} +{"51714807|18303304": []} +{"25245968|2080630": []} +{"25245968|1078272": []} +{"142435264|9036392": [", cross-modal integration) [48,49]."]} +{"6234668|14433834": []} +{"6234668|14866098": []} +{"6234668|16362395": ["Key strokes Keyboard [86]\u2013[91] EEG [92] EEG sensors [93]\u2013[96] Text Human writing material [97]\u2013[100]"]} +{"6234668|5401262": []} +{"17221751|2301292": ["from naturalistic environments with spontaneous affective behaviour [118] as existing datasets [122], [138], [176] contain exaggeratedly posed affective behaviour.", "the recognition of expressions that might be hardly noticeable using only 2D appearance [118]."]} +{"464515|6857179": ["We therefore describe here a developmental robot system with the goal of: 1) advancing computational models of emotion in both developmental psychology and autonomous robotics; and 2) using infant development as a clue to develop a robot with a powerful emotion system."]} diff --git a/graph_202482.jsonl b/edge/graph_202482.jsonl similarity index 100% rename from graph_202482.jsonl rename to edge/graph_202482.jsonl diff --git a/edge/graph_202489927.jsonl b/edge/graph_202489927.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202510354.jsonl b/edge/graph_202510354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202539277.jsonl b/edge/graph_202539277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b2366680279b612543479fb70ba920441bd7df3 --- /dev/null +++ b/edge/graph_202539277.jsonl @@ -0,0 +1 @@ +{"11227891|1708582": ["A closely related concept to maximum entropy policies is Boltzmann exploration, which uses the exponential of the standard Q-function as the probability of an action (Kaelbling et al., 1996)."]} diff --git a/edge/graph_202540003.jsonl b/edge/graph_202540003.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a348e237ef4fd57f51c7335bc6cd1b27402bda55 --- /dev/null +++ b/edge/graph_202540003.jsonl @@ -0,0 +1,115 @@ +{"186206900|3212631": ["Modelling other agents in multi-agent systems has been widely studied and offers many research opportunities (Albrecht and Stone, 2018).", "Multi-agent RL is a widely studied topic with surveys ranging from modelling other agents (Albrecht and Stone, 2018) to transfer learning (Da Silva and Costa, 2019) and non-stationarity (Hernandez-Leal et al. , 2017)."]} +{"59413825|9316331": ["Classical planning algorithms such as UCT [47\u201349] (a powerful form of Monte Carlo tree search [49, 50]) obtain 0 points on Montezuma\u2019s Revenge because the state space is too large to explore effectively, even with probabilistic methods [30, 51]."]} +{"8771967|9316331": ["Considering this, the original UCT variant complies with RL theory, whereas the standard UCT variant (Browne et al., 2012) does not (Section 2.4); however, since UCT is often used on tasks with terminal rewards only (e.g., like many classic games), the issue is mitigated.", ", the sum of all rewards in a simulation), updating all visited states with the same value (Browne et al., 2012).", "Monte Carlo tree search (MCTS, Coulom, 2006; Browne et al., 2012) was introduced as a search and planning framework for finding optimal decisions by sampling a given model.", "In general, Monte Carlo tree search (MCTS) algorithms employ strong (heuristic) search methods to identify the best available action in a given situation (Browne et al., 2012).", "On the other hand, the standard UCT (Browne et al., 2012) also equals to the same RL algorithm, but when the latter is modified to perform na\u0131\u0308ve offline updates (i.e., to backup only the final sum of rewards in an episode, ignoring the information of when were individual rewards received), to not\u2026", ", policies that incorporate a-priori knowledge), which greatly increase the performance of the algorithm (Browne et al., 2012).", "On the other hand, the standard UCT (Browne et al., 2012) also equals to the same RL algorithm, but when the latter is modified to perform na\u0131\u0308ve offline updates (i.", ", 2012) the representation policy keeps a fixed size and shape of the feature-approximated state space, whereas in the standard UCT algorithm (Browne et al., 2012), it increments the lookup table (tree or graph) by one entry in each MCTS iteration and discards it after each batch of iterations.", "The most basic and popular one is discarding the tree (partially or completely) after each search (Browne et al., 2012).", "Considering this, the original UCT variant complies with RL theory, whereas the standard UCT variant (Browne et al., 2012) does not (Section 2.", "The second approach is typical for search methods, especially for MCTS methods (Browne et al., 2012).", "\u2026and builds a tree instead of a graph; disregards discounting of rewards; and does not distinguish between terminal and nonterminal rewards \u2013 it backs up only the final outcome (i.e., the sum of all rewards in a simulation), updating all visited states with the same value (Browne et al., 2012).", "Although basic UCT variants use a uniform-random default policy, strong MCTS algorithms are most often equipped with informed playout policies (i.e., policies that incorporate a-priori knowledge), which greatly increase the performance of the algorithm (Browne et al., 2012).", "Following a showcase of strong results, the algorithm achieved widespread adoption across diverse domains (Browne et al., 2012)."]} +{"196200552|1452734": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"3544558|1708582": ["Note that overestimation due to function approximation is not a good measure of uncertainty, thus, using an over-estimating critic is not an effective way to implement optimism in the face of uncertainty (Kaelbling et al., 1996), and can lead to suboptimal policies (Thrun & Schwartz, 1993)."]} +{"49293891|10725980": ["In competitive domains such as Poker and Go, such tasks are often integrated with domain-speci\ufb01c heuristics to model opponents and learn superior policies (Rubin & Watson, 2011; Mnih et al., 2015)."]} +{"5155799|1708582": ["We note an important difference between the well known heuristic exploration technique of optimism in the face of uncertainty [21, 22] and the overestimation bias."]} +{"19706|1708582": ["For more information on reinforcement learning techniques, [230, 14, 118] are good starting points."]} +{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]} +{"2943343|1708582": []} +{"146120627|202540003": []} +{"4533648|9588126": ["Reinforcement learning (RL) holds considerable promise to help address a variety of cooperative multi-agent problems, such as coordination of robot swarms (Hu\u0308ttenrauch et al., 2017) and autonomous cars (Cao et al., 2012)."]} +{"3508403|13171013": ["This has been empirically proved to be efficient at increasing the likelihood of discovering the optimal joint policy in stochastic environments and avoiding agents gravitating towards a sub-optimal joint policy [Bloembergen et al., 2015; Palmer et al., 2018; Panait et al., 2006; Wei and Luke, 2016]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"60440549|5014732": ["\u2026in several communities: work ranging from evolutionary algorithms to tabular RL applied has shown that the game is an excellent testbed for both modelling and planning (Ontan\u00f3n et al., 2013), however, most have focused on single-agent settings with multiple controllers and classical algorithms.", "Learning to play StarCraft games also has been investigated in several communities: work ranging from evolutionary algorithms to tabular RL applied has shown that the game is an excellent testbed for both modelling and planning (Ontan\u00f3n et al., 2013), however, most have focused on single-agent settings with multiple controllers, and classical algorithms."]} +{"198179763|202540003": []} +{"198179763|3212631": ["An important ability for agents to have is to reason about the behaviors of other agents by constructing models that make predictions about the modeled agents (Albrecht and Stone 2018)."]} +{"198179763|393948": ["The idea of additional auxiliary predictions is to help with the representational learning problem (Bengio, Courville, and Vincent 2013) and had also been useful to improve the robustness and stability of the learning process (Jaderberg et al. 2017)."]} +{"6230754|1708582": ["In reinforcement learning (RL) [1], [2], an agent seeks an optimal control policy for a sequential decision problem."]} +{"10757799|1708582": []} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"52185833|9316331": ["For the community, this would provide the ability to test algorithms in domains with as much depth and diversity as today\u2019s video games."]} +{"3231252|5014732": ["must lose. These include Backgammon (Tesauro, 1995), Go (Silver et al., 2016), \ufb01rst person shooter games (Kempka et al., 2016; Wu & Tian, 2016), poker (Heinrich & Silver, 2016) and StarCraft (Ontan\u00f3n et al., 2013; Foerster et al., 2017; Usunier et al., 2016). 3This class of games are games where both players win or lose together. It includes team-based coordination games (Lowe et al., 2017), sports like socce"]} +{"1403530|1708582": []} +{"17136625|1708582": ["Other possibilities of de\ufb01ning the return exist [58].", "A reinforcement learning (RL) agent learns by interacting with its dynamic environment [58, 106, 120]."]} +{"52163536|11890281": ["The motivation does not stem from the reinforcement learning theory, where most methods assume that the Markov decision process is ergodic and that the initial state distribution does not factor into the optimal policy (Aslanides et al., 2017)."]} +{"52163536|1932843": ["This can be the case for physical systems such as robots, where exploratory actions cause wear or damage and risks need to be minimized (Kober et al., 2013; Garc\u0131a and Ferna\u0301ndez, 2015; Tamar et al., 2016; Koryakovskiy et al., 2017).", "This can be the case for physical systems such as robots, where exploratory actions cause wear or damage and risks need to be minimized (Kober et al., 2013; Garc\u0131a and Fern\u00e1ndez, 2015; Tamar et al., 2016; Koryakovskiy et al., 2017)."]} +{"2695515|1708582": ["The R-MAX algorithm (Brafman and Tennenholtz, 2003) is a simpler strategy that uses the idea of optimism in the face of uncertainty (Kaelbling et al., 1996), and obtains the same near-optimal, polynomial time guarantees as E(3)."]} +{"871178|1708582": ["We refer to [8] for a survey of RL techniques."]} +{"3454285|3212631": ["Our work thus ties in to a rich history of opponent modelling (Brown, 1951; Albrecht & Stone, 2017); within this context, we show how meta-learning could be used to furnish an agent with the ability to build \ufb02exible and sample-ef\ufb01cient models of others on the \ufb02y."]} +{"67855298|13171013": ["Many of the principles remain the same regardless of whether evolution or learning dominate (Bloembergen et al., 2015; B\u00f6rgers and Sarin, 1997; Such et al., 2017)."]} +{"580203|13171013": [", [13, 15], rather than on designing new learning algorithms.", ", direct reciprocity [4, 5, 6, 7], indirect reciprocity [8], norm enforcement [9, 10], simple reinforcement learning variants [3], multiagent reinforcement learning [11, 12, 13, 14, 15], spatial structure [16], emotions [17], and social network effects [18, 19]."]} +{"159041004|202540003": []} +{"23436632|202540003": []} +{"23436632|3113396": ["stationary game with incomplete information, where the agents initially do not know their opponents preferences and where strategies can change over time (for a survey on learning in negotiation, see Baarslag et al., 2016). As a result, they need to derive information from the exchange of oers with each other. Although rarely framed in the context of non-stationary learning, many automated negotiation strategies have ", "As with human negotiations, automated negotiation between agents is a non-stationary game with incomplete information, where the agents initially do not know their opponents preferences and where strategies can change over time (for a survey on learning in negotiation, see Baarslag et al., 2016)."]} +{"23436632|6759870": ["Recent examples include the setting of e-commerce (He et al., 2003; Kowalczyk et al., 2003), virtual agents (DeVault et al., 2015; Gratch et al., 2015) and games such as diplomacy (Fabregues et al., 2010) and coloured trails (Gal et al., 2005; Lin and Kraus, 2010).", "Recent examples include the setting of e-commerce (He et al., 2003; Kowalczyk et al., 2003), virtual agents (DeVault et al."]} +{"23436632|13171013": ["Finally, a recent survey analysed methods from evolutionary game theory and its relation with multiagent learning (Bloembergen et al., 2015).", "\u2026(Panait and Luke, 2005; Shoham et al., 2007; Busoniu et al., 2010), others have divided them by the type of learning (Tuyls and Weiss, 2012; Bloembergen et al., 2015) and another group have proposed properties that MAS algorithms should have (Bowling and Veloso, 2002; Powers et al., 2007;\u2026", "This has inspired a stream of follow-up work that links stochastic multi-agent reinforcement learning algorithms to varieties of deterministic dynamical systems, as summarized in a related survey (Bloembergen et al., 2015).", "There are also some previous categories for the type of learning used: multiplied, divided and interactive (Tuyls and Weiss, 2012); and independent, joint-action and gradient ascent (Bloembergen et al., 2015).", ", 2010), others have divided them by the type of learning (Tuyls and Weiss, 2012; Bloembergen et al., 2015) and another group have proposed properties that MAS algorithms should have (Bowling and Veloso, 2002; Powers et al."]} +{"53046335|3212631": ["There are also methods that attempt to model the opponents [36, 30, 4]."]} +{"53046335|13171013": ["These analyses are common in multiagent learning as they allow visual depiction of the policy changes and how different factors affect the (convergence) behavior [83, 92, 13, 91, 11, 94, 1, 99, 98, 8, 89]."]} +{"4715758|3212631": ["Modeling and exploiting other agents\u2019 behaviors in a multi-agent system (MAS) have received much attention in the past decade [4, 12, 16, 23, 24]."]} +{"4715758|13171013": ["The literature contains numerous studies of MAS modeling [7, 10, 27] and investigations of non-stationarity issues [16]."]} +{"6742598|1708582": []} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"5528008|1708582": []} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} +{"3212631|3113396": ["Baarslag et al. (2016) provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e.g. cost, size, and colour of a car) in an exchange.", "\u2026research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot\u2026", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "[21] for a detailed description of many domain-specific methods).", "Learning the utility function, or preferences, of other agents is also a major line of research in automated negotiation agents (see Baarslag et al. (2016) for a detailed description of many domain-speci\ufb01c methods).", "[21] provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e."]} +{"3212631|7681233": ["This question has been addressed extensively by researchers in behavioural game theory and experimental psychology (Camerer et al., 2015; Goodie et al., 2012; Wright and Leyton-Brown, 2010; Yoshida et al., 2008; Camerer et al., 2004; Hedden and Zhang, 2002)."]} +{"3212631|9316331": []} +{"3212631|10725980": ["\u2026other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman\u2026", "For example, Southey et al. (2005) maintain Gaussian beliefs over the continuous parameters of a speci\ufb01ed player function for Poker (cf. Table 1 in their paper).", "Implicit modelling based on expert algorithms has been shown to be e \ufb00 ective in variants of Poker (Bard et al., 2013; Hoehn et al., 2005).", "However, as can be seen in Table 2, relatively little work exists on the problem of learning models of agent behaviours (i.e. policy reconstruction) under partial observability conditions, with most e \ufb00 orts focusing on extensive form games with incomplete information (e.g. Poker).", "The idea of monitoring conditional action frequencies of the modelled agents has also been used in the context of extensive form games with imperfect information, such as Poker (Mealing and Shapiro, 2017; Ganzfried and Sandholm, 2011; Southey et al., 2005; Billings et al., 2004).", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "Rubin and Watson [232] survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "The domain of Poker added the problem of partial observability of environment states, since no player can see the private cards of other players.", "Rubin and Watson (2011) survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot interaction (Lasota et al., 2014), commercial video games (Bakkes et al., 2012), trust and reputation (Ramchurn et al., 2004), and multiagent learning (Stone and Veloso, 2000)."]} +{"3212631|14441987": ["Many important applications are characterised by such openness, such as ad-hoc wireless networks [231] and web-based systems for collaborative computing [198].", "Many important applications are characterised by such openness, such as ad-hoc wireless networks (Royer and Toh, 1999) and web-based systems for collaborative computing (Miorandi et al., 2014)."]} +{"3212631|13171013": ["In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning (Hernandez-Leal et al., 2017; Bloembergen et al., 2015; Tuyls and Weiss, 2012; Busoniu et al., 2008; Panait and Luke, 2005; Alonso et al., 2001; Stone and Veloso, 2000; Sen and Weiss, 1999).", "In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning [138,41,269, 55,213,15,257,241]."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"214797895|8530790": []} +{"12936702|9316331": []} +{"12936702|10725980": []} +{"13990323|1708582": ["Another design consideration in reinforcement learning algorithms is the trade-off between exploration and exploitation (Kaelbling et al. 1996)."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"52281909|202540003": []} +{"47082037|5014732": ["This is the case in Minecraft (Project Malmo; Johnson et al., 2016), Starcraft (Ontan\u0303o\u0301n et al., 2013), and robotic RL platforms (Sutton et al., 2011).", ", 2016), Starcraft (Onta\u00f1\u00f3n et al., 2013), and robotic RL platforms (Sutton et al."]} +{"173990609|13171013": ["\u2026MARL have been primarily identi\ufb01ed between the Replicator Dynamics (RD), a standard model in EGT, and simple policy iteration algorithms such as Cross Learning and Learning Automata [4, 5, 65], value-iteration algorithms such as Q-learning in stateless cases [27, 63], and no-regret learning [29]."]} +{"275406|9316331": ["MCTS methods have become very popular in games, a type of multiagent setting, but no action factorization has been exploited so far (Browne et al., 2012).", "MCTS methods have become very popular in games, a type of multiagent setting, but no action factorization has been exploited so far (Browne et al. 2012)."]} +{"168169789|3212631": ["Hence, it is critical for an agent to quickly predict or recognize the behaviors of other agents, and make a best response accordingly [Powers and Shoham, 2005; Ferna\u0301ndez et al., 2010; Albrecht and Stone, 2018; Hernandez-Leal et al., 2017a; Yang et al., 2019].", "Hence, it is critical for an agent to quickly predict or recognize the behaviors of other agents, and make a best response accordingly [Powers and Shoham, 2005; Fern\u00e1ndez et al., 2010; Albrecht and Stone, 2018; Hernandez-Leal et al., 2017a; Yang et al., 2019].", "ToM is a kind of recursive reasoning technique [Hernandez-Leal et al., 2017a; Albrecht and Stone, 2018] describing a cognitive mechanism of explicitly attributing unobservable mental contents such as beliefs, desires, and intentions to other players."]} +{"76665732|10725980": ["The challenge domain for imperfect information has been computer Poker, which has driven much of the progress in computational approaches to equilibrium-\ufb01nding [Rubin and Watson, 2011]."]} +{"9316331|10725980": ["Coquelin and Munos [68] demonstrate that \ufb02at UCB retains the adaptivity of standard UCT while improving its regret bounds in certain worst cases where UCT is overly optimistic.", "Nijssen and Winands [155] also describe a multi-player version of their MCTS-Solver (4.5)."]} +{"10310199|5473785": []} +{"51609030|1708582": ["However, this is rare: it is much more likely that the agent will be handed an incomplete or inaccurate model, in which case we end up in a reinforcement learning (RL) setting [Kaelbling et al. , 1996] in which the agent needs to adapt or even needs to learn from scratch."]} +{"57189444|202540003": []} +{"57189444|24855581": ["Deep RL is a broad term that indicates the combination between deep learning and RL to deal with high-dimensional environments [34]\u2013[36]."]} +{"57189444|4884302": ["Deep RL is a broad term that indicates the combination between deep learning and RL to deal with high-dimensional environments [34]\u2013[36]."]} +{"57189444|13171013": ["social dilemma (MGSD) that has been applied to various phenomena in social science and biology [22], [52], [94].", "[22] analyzed the evolutionary dynamics, Hernandez-Leal et al."]} +{"2085919|1708582": ["A possible solution to overcome the curse of dimensionality of the state space consists of having a direct (modelfree) reinforcement learning ( RL) algorithm learn a policy during a (possibly simulated) interaction with the process [4, 17, 30].", "Direct (model-free) learning of a policy during a (possibly simulated) interaction with the process is becoming a classical technique for planning in very large state-space s [4, 17, 30]."]} +{"1596043|16897832": ["This mixture of learning and evolutionary-like algorithms has also been explored successfully in other domains (Zhang et al., 2011) such as neural architecture search (Real et al., 2017; Liu et al., 2017), feature selection (Xue et al., 2016), and parameter learning (Fernando et al., 2016)."]} +{"15313471|1932843": ["An overview of recent advances in deep RL is presented in (Li, 2017) and (Kaelbling et al., 1996; Kober & Peters, 2012) provide a comprehensive history of RL research."]} +{"15313471|1708582": ["An overview of recent advances in deep RL is presented in (Li, 2017) and (Kaelbling et al., 1996; Kober & Peters, 2012) provide a comprehensive history of RL research."]} +{"12193979|1708582": ["For such cases the central design issue is how to initialize/update those payoff utility functions of the individual processes so as to induce behavior of the entire collective having good values of the world utility."]} +{"2661363|1708582": []} +{"86868609|13171013": []} +{"9421360|2340253": ["Multi-agent reinforcement learning has a rich literature [8, 30]."]} +{"9421360|13171013": ["Learning to cooperate between several interacting agents has been well studied [39, 30, 6]."]} +{"3263887|1708582": ["A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al. [2015]. We also assume that the reader has a basic background in game theory and gametheoretic notations like Nash equilibrium and Pareto efficiency.", "The Dec-POMDP model is an generalization of the (single-agent) MDP [Bellman, 1957] and POMDP [A\u030astro\u0308m, 1965] models which were developed in OR, and later became popular in AI as a framework for planning for agents [Kaelbling et al., 1996, 1998].", "For more details we refer the reader to the texts by Russell and Norvig [2009], Puterman [1994], Sutton and Barto [1998], Kaelbling et al. [1998] and Spaan [2012].", "A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al.", "A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al. [2015]. We also assume that the reader has a basic background in game theory and gametheoretic notations like Nash equilibrium and Pareto efficiency. Even though these concepts are not central to our exposition, we do place the Dec-POMDP model in the more general context they offer. For an explanation of these concepts, the reader could refer to any introduction on game theory, such as those by Binmore [1992], Osborne and Rubinstein [1994] and Leyton-Brown and Shoham [2008]. This book heavily builds upon earlier texts by the authors.", "A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al. [2015]. We also assume that the reader has a basic background in game theory and gametheoretic notations like Nash equilibrium and Pareto efficiency. Even though these concepts are not central to our exposition, we do place the Dec-POMDP model in the more general context they offer. For an explanation of these concepts, the reader could refer to any introduction on game theory, such as those by Binmore [1992], Osborne and Rubinstein [1994] and Leyton-Brown and Shoham [2008]."]} +{"15973607|9316331": ["We refer the reader to the surveys presented in [22] and [5] for more details."]} +{"15973607|18357056": ["We refer the reader to the surveys presented in [22] and [5] for more details."]} +{"5928833|1708582": ["have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996).", "\u2026is a self-contained and yet relatively short summary that can help newcomers to the field to develop a good sense of the state of the art, as well as existing researchers to broaden their overview of the field, an article, similar to that of Kaelbling et al. (1996), but with an updated contents.", "In 1996, Kaelbling et al. have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996)."]} +{"190000138|175549": ["Evolutionary Reinforcement Learning (ERL) is a hybrid algorithm that combines Evolutionary Algorithms (EAs) [Floreano et al., 2008, L\u00fcders et al., 2017, Fogel, 2006, Spears et al., 1993], with policy gradient methods [Khadka and Tumer, 2018]."]} +{"9072400|13171013": ["For a more elaborate introduction to replicator dynamics, and their relationship with RL, we refer to [7].", "[7] Daan Bloembergen, Karl Tuyls, Daniel Hennes, and Michael Kaisers."]} +{"3577937|1708582": ["However, Wei and Luke [35] note that the choice of temperature moderation factor for the Boltzmann selection method is a non-trivial task, as Boltzmann selection is known to struggle to distinguish between Q-Values that are close together [13, 35]."]} +{"3577937|13171013": ["Multiagent reinforcement learning (MA-RL) is known for being challenging even in environments with only two implicit learning agents, lacking the convergence guarantees present in most single-agent learning algorithms [3, 18]."]} +{"8532635|1708582": ["This \u201coptimism in the face of uncertainty\u201d (Kaelbling et al., 1996) technique is widely used in many RL algorithms.", "One of the difficulties with Boltzmann Selection is that when Q-values are close (and importantly, when they are all small), Boltzmann Selection does not distinguish among them well (Kaelbling et al., 1996).", "LMRL2 begins using a modified version of Boltzmann Selection (Kaelbling et al., 1996), but when the temperature drops below some minimum value, it suddenly jumps to a fully greedy strategy (that is, = 0)."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"19141434|9588126": []} +{"53970646|3212631": ["Opponent model is critical in identifying the other agent\u2019s type by estimating its policy [1]."]} +{"1708582|17464562": []} +{"33870153|13171013": ["Interactions among several agents are usually modelled as a normal-form or stochastic game, and a wide variety of learning algorithms targets this setting [7, 9, 13]."]} +{"52305458|9316331": []} diff --git a/edge/graph_202540199.jsonl b/edge/graph_202540199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9827d090eda16aa84ff3cb743c894d90cbb70c68 --- /dev/null +++ b/edge/graph_202540199.jsonl @@ -0,0 +1,2 @@ +{"40387076|53531807": ["We note that the rationale of our approach is essentially the same as in probabilistic numerics literature (see e.g. Hennig et al. (2015)) or in sequential Bayesian experimental design (see Ryan et al. (2016) for a recent survey).", "Shahriari et al. (2015). We use the same trade-off parameter for LCB as Gutmann and Corander (2016), but unlike them, we consider the deterministic LCB rule."]} +{"40387076|14843594": ["We compare the proposed expected integrated variance acquisition rule (expintvar) to commonly used BO strategies: expected improvement (EI) and lower con\ufb01dence bound (LCB) criterion, see e.g. Shahriari et al. (2015)."]} diff --git a/edge/graph_202540759.jsonl b/edge/graph_202540759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4dcd77b1fe9fcd40e2e655a8c9a683669fe79dd2 --- /dev/null +++ b/edge/graph_202540759.jsonl @@ -0,0 +1,54 @@ +{"52952193|10175374": ["Selecting these weights can be difficult and expensive [60]."]} +{"202719583|202540759": ["[25], we categorize the class imbalance problem for the deep object detectors into two: foreground-background and foreground-foreground class imbalance."]} +{"53164212|10213552": ["If real-time solutions are of importance, one may wish to consider Apache Storm or Apache Flink instead, since they offer true stream processing while Spark\u2019s use of microbatch streaming may have a small lag associated with it in receiving results [48].", "No distributed machine-learning libraries have the same amount of options as some of the non-distributed tools such as Weka [49] because not every algorithm lends itself well to parallelization [48].", "The choice of tools will largely depend on the applications they are being used for as well as user preferences [48]."]} +{"206592484|456491": []} +{"1033682|174797842": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"9176532|13088291": ["Though extremely simple, the NN classifier has been applied on a number of machine learning tasks, including hand-written digit recognition, text categorization, object recognition, etc (Bhatia et al., 2010; Boiman et al., 2008; Shah et al., 2011)."]} +{"52183570|52069652": ["This article shares the same motivations as [470] and [35], but covers the topic more comprehensively and extensively as these two surveys which only cover the backbones and flagship articles associated with modern object detection."]} +{"52183570|49862415": ["We share the same motivations as [Zhao et al., 2018c], which was released on Arxiv while we were finishing this survey, but we believe we have covered the topic more comprehensively.", "One of the best performing methods on SVT is [Zhao et al., 2018a] with a F-measure of 83%.", "This article shares the same motivations as [470] and [35], but covers the topic more comprehensively and extensively as these two surveys which only cover the backbones and flagship articles associated with modern object detection."]} +{"52183570|13689658": []} +{"52183570|3110415": ["Several surveys related to object detection have been written in the past, addressing specific tasks such as pedestrian detection [84], moving objects in surveillance systems [161], object detection in remote sensing images [53], face detection [126, 453], facial landmark detection [420], to cite only some illustrative examples.", "\u2026[Enzweiler and Gavrila, 2008], moving objects in surveillance systems [Joshi and Thakore, 2012], object detection in remote sensing images [Cheng and Han, 2016], face detection [Hjelma\u030as and Low, 2001, Zhang and Zhang, 2010], facial landmark detection [Wu and Ji, 2018], to cite only some\u2026"]} +{"52183570|206739910": ["This section reviews the 4 main datasets and benchmarks for evaluating traffic sign detectors [Houben et al., 2013, Mogelmose et al., 2012, Timofte et al., 2014, Zhu et al., 2016], as well as the Bosch Small Traffic Lights [Behrendt and Novak, 2017].", "LISA Traffic Sign Dataset [Mogelmose et al., 2012] was among the first datasets for traffic sign detection."]} +{"2229234|4570087": ["[55] provides a comprehensive overview of the popular methods in this field."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"165163618|3330313": ["Due to resource constraints and the nature of the specific applications, it can often be difficult to train a classifier on a training data set with balanced numbers of samples within each class, especially in scenarios such as anomaly detection (Hodge and Austin, 2004) and rare event discovery (Hospedales", "\u2026to train a classi\ufb01er on a training data set with balanced numbers of samples within each class, especially in scenarios such as anomaly detection [Hodge and Austin, 2004] and rare event discovery [Hospedales et al., 2013]. in some instances, the difference between sample sizes within classes\u2026"]} +{"2088679|393948": []} +{"85498610|17123336": ["We evaluate the performance of a classifier in terms of two indices which are not biased toward any particular class [40], namely Average Class Specific Accuracy (ACSA) [21, 44] and Geometric Mean (GM) [26, 4].", "Over the years, the machine learning community has devised many methods for tackling class imbalance [24, 4]."]} +{"207060556|17071125": []} +{"207060556|9045232": ["The last comprehensive survey of face detection algorithms in [15] grouped the various methods into four categories: knowledge-based methods, feature invariant approaches, template matching methods, and appearance-based methods.", "Again,wewill onlyfocusonworksnotcoveredin[15].", "During the middle of 1990's until the beginning of 2000's, the field witnessed an explosion [15] [16].", "Otherschemesforface/objectdetection(since[15])."]} +{"207475120|16780476": ["skewed data was proposed by Branco [5] and concentrates", "A more global review on learning from skewed data was proposed by Branco [5] and concentrates\non a more general issue of imbalanced predictive modeling."]} +{"207475120|11632848": ["Merging data-level solutions with classifier ensembles [64], resulting in robust and efficient learners [34] is highly popular."]} +{"207475120|5556391": ["Dynamical nature of data that arrive either in batches or online poses new challengeswhen imbalanced distributions are to be expected [26]."]} +{"16661024|15093118": ["A survey of vehicle detection from that time can be found in [20].", "hand-crafted features and part and occlusion modeling [20]."]} +{"49556427|3403798": []} +{"52177403|56517517": ["Given this time of tremendously rapid evolution, there exist many recent survey papers on deep learning [13, 86, 89, 145, 166, 212, 280, 290, 305, 312, 317].", "These surveys reviewed deep learning techniques from different perspectives [13, 86, 89, 145, 212, 280, 312], or with applic tion to medic l image anal sis [166], natural language processing [290], speech recognition systems [305], and remote sensing [317]."]} +{"52177403|53109768": []} +{"52177403|21955893": []} +{"52177403|2088679": []} +{"52177403|207060556": ["A Survey on Face Detection in the Wild: Past, Present and Future [301] 2015 CVIU 2000 \u5e74\u4ee5\u964d\u306e \u201cin the wild\u201d(\u975e\u5236\u7d04\u74b0\u5883,\u5b9f\u74b0\u5883)\u9854\u691c\u51fa\u306e\u30b5\u30fc\u30d9\u30a4", "\u6b69\u884c\u8005\u691c\u51fa [66, 79, 59],\u9854\u691c \u51fa [294, 301],\u8eca\u4e21\u691c\u51fa [258],\u30c6\u30ad\u30b9\u30c8\u691c\u51fa [295] \u306a\u3069,\u7279 \u5b9a\u7269\u4f53\u691c\u51fa\u554f\u984c\u306b\u95a2\u3059\u308b\u512a\u308c\u305f\u8abf\u67fb\u304c\u591a\u6570\u884c\u308f\u308c\u3066\u304d\u305f."]} +{"52177403|5729190": []} +{"52177403|1223851": ["15 Salient Object Detection: A Survey [19] 2014 arXiv A survey for salient object detection"]} +{"52177403|393948": []} +{"52177403|206764452": []} +{"52177403|9045232": []} +{"25040300|15273230": ["However, it has some significant and long acknowledged limitations, particularly in the context of imbalanced datasets [19].", "Methods of dealing with imbalance are well studied for classical machine learning models [19, 17, 20, 18]."]} +{"102354936|53164212": []} +{"102354936|49908818": []} +{"155099815|53768542": []} +{"155099815|8574504": ["A comprehensive reviews about object segmentation can be found at [Garcia-Garcia et al., 2017], and here we focus on the representative 2D datasets and methods.", "Detailed reviews refer to the survey [Garcia-Garcia et al., 2017]."]} +{"155099815|8815923": ["Bohg et al. [Bohg et al., 2014] reviewed data-driven grasp methods and divided the approaches into three groups based on whether the grasp configuration is computed for known, familiar or unknown objects.", "According to [Bohg et al., 2014], empirical methods can be divided depending on whether the target objects are know, familiar or novel objects.", "Among all the tasks mentioned above, there have been some works [Sahbani et al., 2012; Bohg et al., 2014; Caldera et al., 2018] concentrating on one or a few tasks, while there is still a lack of comprehensive introduction on robotic grasping.", "Empirical methods aiming at known objects Empirical methods or data-driven approaches [Bohg et al., 2014; Caldera et al., 2018] learn from previously known successful results produced with existing knowledge of grasping objects or simulations of robotic systems.", "[Bohg et al., 2014] reviewed data-driven grasp methods and divided the approaches into three groups based on whether the grasp configuration is computed for known, familiar or unknown objects."]} +{"155099815|118142": ["As stated in [Sahbani et al., 2012], a grasping strategy should ensure stability, task compatibility and adaptability to novel objects, and the grasp quality can be measured with the location of contact points on the object and the hand configuration [Roa and Sua\u0301rez, 2015].", "Sahbani et al. [Sahbani et al., 2012] presented an overview of 3D object grasping algorithms, where analytical approaches are introduced in detail.", "Analytical methods consider kinematics and dynamics formulation in determining grasps [Sahbani et al., 2012].", "Among all the tasks mentioned above, there have been some works [Sahbani et al., 2012; Bohg et al., 2014; Caldera et al., 2018] concentrating on one or a few tasks, while there is still a lack of comprehensive introduction on robotic grasping.", "[Sahbani et al., 2012] presented an overview of 3D object grasping algorithms, where analytical approaches are introduced in detail.", "Traditionally, a vision-based robotic grasping system is composed of a series of components, including target object localization, object pose estimation, grasp detection and grasp planning [Sahbani et al., 2012].", "As stated in [Sahbani et al., 2012], a grasping strategy should ensure stability, task compatibility and adaptability to novel objects, and the grasp quality can be measured with the location of contact points on the object and the hand configuration [Roa and Su\u00e1rez, 2015]."]} +{"526766|5729190": []} +{"3640742|393948": ["These classical imbalanced learning models rely typically on hand-crafted features, without deep learning\u2019s capacity for exploiting a very large pool of imagery data from diverse sources to learn more expressive representations [41, 39, 27, 3]."]} +{"152282225|49862415": ["SPPNet [17], Fast RCNN [18], Faster RCNN [19], YOLO [20], [21], [22], SSD [23], FPN [24], Retina-Net [25], CornerNet [26], CenterNet [27], and"]} +{"152282225|3110415": ["We refer readers to the following surveys for more details on this topic [90, 382].", "NWPUVHR10 [90] 2016 The most frequently used remote sensing detection dataset in recent years."]} +{"152282225|207060556": ["We refer readers to the following surveys for more details [323, 324]."]} +{"152282225|5729190": ["The disadvantage is the inference will be computationally expensive when considering a large number of character classes and candidate windows [339].", "We refer readers to the following survey for more details [338, 339]."]} +{"152282225|206739910": ["LISA [80] 2012 One of the first traffic sign detection dataset.", "We refer readers to the following survey [80] for more details on this topic."]} +{"152282225|206764452": []} +{"152282225|9045232": ["We refer readers to the following surveys for more details [323, 324]."]} +{"5729190|16082889": []} +{"56487475|7811809": []} +{"195191325|47022048": []} diff --git a/edge/graph_202540857.jsonl b/edge/graph_202540857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d6677579f2b4d70aebbedd008e126cd34779d00 --- /dev/null +++ b/edge/graph_202540857.jsonl @@ -0,0 +1,4 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"18050299|11746788": []} +{"12288917|11746788": []} +{"15458100|393948": ["We plan to use CLEVR to study models with explicit short-term memory, facilitating comparisons between values [13, 18, 39, 42]; explore approaches that encourage learning disentangled representations [5]; and investigate methods that compile custom network architectures for different patterns of reasoning [2, 3]."]} diff --git a/edge/graph_202541049.jsonl b/edge/graph_202541049.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5683171c366f8fe265fa5d68c5d8759b80dd535c --- /dev/null +++ b/edge/graph_202541049.jsonl @@ -0,0 +1,2 @@ +{"7307815|7291977": ["Data transformation methods have been traditionally used in projects that use the data warehouse approach and OLAP for the semantic exploitation of data [37], and with both XML datasets and relational databases."]} +{"51944320|16954591": []} diff --git a/edge/graph_202541511.jsonl b/edge/graph_202541511.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a269e6e4409c1f3a98f6bd7cb19de30c104e3c68 --- /dev/null +++ b/edge/graph_202541511.jsonl @@ -0,0 +1,11 @@ +{"3454285|3212631": ["Our work thus ties in to a rich history of opponent modelling (Brown, 1951; Albrecht & Stone, 2017); within this context, we show how meta-learning could be used to furnish an agent with the ability to build \ufb02exible and sample-ef\ufb01cient models of others on the \ufb02y."]} +{"16982367|7400701": ["To achieve this continuous development, robots must create their own internal representations [1]."]} +{"12655470|1452734": []} +{"196200552|1452734": []} +{"4606027|18374428": ["Robot \u201cbody schemas\u201d often have quite different characteristics (fixed, centralized, explicit, amodal) than what we expect from their biological counterpart, but there has been work on robot body models learning (self-calibration) as well as modeling the biological body representations and their development using robots (see [26], [27] for surveys)."]} +{"3800579|29776467": []} +{"3800579|65041751": []} +{"3800579|2473564": []} +{"3800579|14814753": []} +{"3800579|7665100": []} +{"30820957|35167928": []} diff --git a/edge/graph_202541524.jsonl b/edge/graph_202541524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..862ab3f598a9746d8043f15ee571f860889871a3 --- /dev/null +++ b/edge/graph_202541524.jsonl @@ -0,0 +1,14 @@ +{"57362238|9659809": ["While some problems such as link sign prediction [18], [21] and centrality [22] have been heavily explored, other directions such as network modeling [23], node relevance [24], and network embedding [19] are still in early development [25]."]} +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"1033682|174797842": []} +{"207238980|393948": []} +{"207238980|11608263": ["In a typical node classification task, we are interested in predicting the most probable labels of nodes in a network [33]."]} +{"2452205|207372751": [", 2014] and link prediction [L\u00fc and Zhou, 2011].", "In recent years, researchers have extensively studied on many important machine learning applications in networks, such as vertex classification [Sen et al., 2008], tag recommendation [Tu et al., 2014], anomaly detection [Bhuyan et al., 2014] and link prediction [L\u00fc and Zhou, 2011]."]} +{"6576802|6116234": ["Comprehensive surveys of these tools comparing features and availability have been published recently 14 \u2013 16 , and we recommend them for an in-depth discussion of the network-based tools."]} +{"52934164|64404": ["11, an image can be segmented into homogeneous regions with the HEVC coding tool [33]."]} +{"6857482|207372751": ["Existing studies on network representation learning (NRL) [1, 2] have shown that NRL can effectively capture network structure to\nfacilitate subsequent analytic tasks, such as node classification [3], anomaly detection [4], and link prediction [5]."]} +{"207166126|2685137": []} +{"207166126|1837720": ["\u2026these are: temporal db-models [Tansel et al. 1993; Chomicki 1994], spatial \ndb-models [Paredaens and Kuijpers 1998; Samet and Aref 1995], geographical information systems (GIS) \n[Shekhar et al. 1997; Aufaure-Portier and Tr\u00b4 epied 1976], and multidimensional db-models [Vassiliadis \nand Sellis 1999]."]} +{"207238964|393948": ["Representation learning has long been an important problem of machine learning and many works aim at learning representations for samples [3, 35]."]} +{"3215337|12161567": ["\u2026work, which we do not review in detail here\u2014including latent space models of social networks [32], embedding methods for statistical relational learning [42], manifold learning algorithms [37], and geometric deep learning [7]\u2014all of which involve representation learning with graph-structured data.", "We refer the reader to [32], [42], [37], and [7] for comprehensive overviews of these areas.", "Indeed, the literature on knowledge-graph completion\u2014where the goal is predict missing relations in knowledge graphs\u2014contains many related techniques for decoding a large number of edge types ( i.e. , relations) [42].", "A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12] and (ii) extend pairwise decoders with type-speci\ufb01c parameters [42, 52].", "More generally, link prediction is closely related to statistical relational learning [24], where a common task is to predict missing relations between entities in a knowledge graph [42].", "Adapted from [60]. edge types, the standard inner-product edge decoder ( i.e. , z i z j \u2248 A i,j ) can be replaced with a bilinear form [12, 42, 52]: where \u03c4 indexes a particular edge type and A \u03c4 is a learned parameter speci\ufb01c to edges of type \u03c4 ."]} +{"3215337|18986679": []} diff --git a/edge/graph_202542723.jsonl b/edge/graph_202542723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79fa42a407d28f97f0cd7b9b9291cdea44822fe8 --- /dev/null +++ b/edge/graph_202542723.jsonl @@ -0,0 +1 @@ +{"5177983|6486398": []} diff --git a/edge/graph_202558409.jsonl b/edge/graph_202558409.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbaca17d050103bcf1ec6c55ea8dbf5c5bb14941 --- /dev/null +++ b/edge/graph_202558409.jsonl @@ -0,0 +1,29 @@ +{"50698|393948": ["The idea of learning feature representations in this way goes back at least to autoencoders [6]."]} +{"9187587|17485266": ["We refer the reader to Ruder (2016)."]} +{"1033682|174797842": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"52967320|64404": ["Qualitative comparisons of ARCNN [18], Tolow [21], HEVC-LF [1] and ours are shown in Fig.", "Dataset Setting ARCNN [18] DnCNN [17] HEVC-LF [1] Ours Vimeo qp=32 34.", "The results of HEVC-LF are generated by enabling loop ilter and SAO [1] in HEVC codec (x265).", "For example, HEVC utilizes loop ilter [1] (HEVC-LF) to reduce the blocking artifacts.", "As we can see, our proposed approach outperforms the state-of-the-art methods by more than 0.6db in term of PSNR.\nQualitative comparisons of ARCNN [18], Tolow [21], HEVC-LF [1] and ours are shown in Fig."]} +{"14928948|16082889": []} +{"14928948|15782139": ["The recognition of handwritten characters has been a concern of the scientific community [ 50 ]."]} +{"125551381|15888893": []} +{"52298127|2088679": ["There is a huge gap of deep learning methods in this domain, with only a few notable papers concentrating on deep survival analysis [97]."]} +{"52298127|9928823": ["Among various machine-learning algorithms, \u201cdeep learning,\u201d also known as representation learning [29], is widely used in these applications."]} +{"44104746|4566470": ["I. INTRODUCTION Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason.", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|24855581": ["Deep learning has shown significant potential in approximating and reducing large, complex datasets into highly accurate predictive and transformational output, greatly facilitating human-centered smart systems [25], [98].", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|4884302": ["An alternative to the quality function, the advantage function represents relative state-action values, as opposed to absolute state-action values [19].", "The state-action value function, otherwise known as the quality function, is the source of Q-learning [19], [21].", "The model was tested both in simulated and in real environments, and experiments were conducted to evaluate appropriate model horizons and bootstrapping efficacy, sample efficiency of classification and regression for value versus collision probability predictions, and performance against various double Q-learning approaches.", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "This type of deep learning has been heavily applied to the field of robotics and computer vision [19].", "[169] J. Zhu, Y. Song, D. Jiang, and H. Song, \u2018\u2018A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things,\u2019\u2019 IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2759728.", "The two primary means of reinforcement can be divided between policy search and value function approximation, though hybrids of both have been introduced [19].", "As a seminal work on the application of Q-learning and Deep Q-Networks (DQN), Mnih et al. [93] implemented a DQN to play 49 different Atari 2600 videogames, observing four frames as environment data, extracting the game score as reward, with controller and button combinations encoded as actions.", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning.", "These typically output parameters for a probability distribution, either for continuous or discreet actions, resulting in a stochastic policy [19].", "[21] A. Bonarini, A. Lazaric, F. Montrone, and M. Restelli, \u2018\u2018Reinforcement distribution in fuzzy Q-learning,\u2019\u2019 Fuzzy Sets Syst., vol. 160, no. 10, pp. 1420\u20131443, 2009.", "For example, Zhu et al. [169] implemented stacked auto-encoders (SAEs) to realize Q-learning for transmission scheduling in cognitive IoT relays."]} +{"44104746|3645740": ["Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|31245252": [", network congestion and latency are only going to increase without a diverse array of complementary solutions [80], [82], [125], [127], [143], [147], [148], [161].", "With the unceasing growth of IoT and smart-world systems driven by the advance of CPS, in which all devices are network connected and able to communicate sensed data and monitor physical objects, larger and larger datasets are becoming available for the application of deep learning, poised to materially impact our daily lives [36], [81], [82], [89], [91], [143], [144], [161].", "Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151].", "[58], [80], [82], [94], [125], [127], [143], [145], [147], [148], [161], [165].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|2829149": ["Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151]."]} +{"44104746|3818445": ["Securing the data, operation, and mechanisms of deep learning are all the more relevant in considering edge computing, which can be a viable computing infrastructure to provision deep learning schemes [155], supporting a variety of smart-world systems (smart cities, smart manufacturing, smart grid, smart transportation, and many others).", ") are also forthcoming [13], [155], [157].", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"14008012|4903005": []} +{"14008012|4097106": []} +{"14008012|2088679": []} +{"206592484|456491": []} +{"44122877|393948": []} +{"56176312|393948": []} +{"3519414|2809360": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"3519414|11009327": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"4546146|1223851": ["As mentioned by the previous studies [7], [43], and [44], in the branch of bottom-up SOD, approaches are to detect saliency under free viewing, which is automatically determined by the physical characteristics of the scene, while approaches in the other branch are to detect the task-driven saliency determined by the current goals of the observer."]} +{"1044293|393948": ["An even more radically different solution to the problem of avoiding explicit latent variables was recently introduced in Bengio et al. (2013c) and Bengio and Thibodeau-Laufer (2013).", "They are hurt by the problem of mode mixing, discussed at greater length in Bengio et al. (2013b), and summarized here.", "The hypothesis proposed (Bengio et al., 2013b) to explain this observation is that unsupervised representation learning procedures (such as for the RBM and contractive or denoising auto-encoders) tend to discover a representation whose distribution has more entropy (the distribution of vectors in\u2026", "Instead, they are based on the construction of a direct parametrization of an encoding function which immediately maps an input x to its representation f(x), and they are motivated by geometrical considerations in the spirit of manifold learning algorithms (Bengio et al., 2013d).", "An interesting observation (Bengio et al., 2013b) which could turn out to be helpful is that after we train a deep model such as a DBN or a stack of regularized auto-encoders, we can observe that mixing between modes is much easier at higher levels of the hierarchy (e.g. in the top-level RBM or\u2026", "\u2026result was only valid for asymptotically small Gaussian corruption noise, squared reconstruction error, and continuous inputs, the result from Bengio et al. (2013c) is applicable for any type of input, any form of reconstruction loss (so long as it is a negative log-likelihood), any form of\u2026", "Although the result from Alain and Bengio (2013) suggests that when the amount of injected noise is small, a unimodal distribution is sufficient, it is convenient to accomodate large amounts of injected noise to make training more efficient, as discussed by Bengio et al. (2013c).", "As explained in Bengio et al. (2013d), the tug-of-war between minimization of reconstruction error and the regularizer means that the intermediate representation must mostly capture the variations necessary to distinguish training examples, i.e., the directions of variations on the manifold (a\u2026", "Furthermore many pieces of evidence in the results of experiments on deep learning suggest that training deep networks (including recurrent networks) involves a difficult optimization (Bengio, 2013b; Gulcehre and Bengio, 2013; Bengio et al., 2013a).", "See (Bengio, 2009; Bengio et al., 2013d) for reviews and Bengio (2013c) and the other chapters of the book by Montavon and Muller (2012) for practical guidelines.", "See section 3 of Bengio et al. (2013d) for a review of representation learning procedures based on directed or undirected graphical models.4 Section 2.5 describes sparse coding in more detail.", "A general strategy was outlined in Bengio et al. (2013d) to enhance the discovery of representations which disentangle the underlying and unknown factors of variation: it relies on exploiting priors about these factors.", "Another encouraging observation (already mentioned in the section on mixing) is that deeper representations were empirically found to be more amenable to quickly mixing between modes (Bengio et al., 2013b).", "See Bengio et al. (2013d) for a brief overview in the context of deep learning, along with connections to other unsupervised representation learning algorithms."]} diff --git a/edge/graph_202558589.jsonl b/edge/graph_202558589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76e38d3f31fc1622017fcfecab89881b09f87556 --- /dev/null +++ b/edge/graph_202558589.jsonl @@ -0,0 +1 @@ +{"11700834|12886544": []} diff --git a/edge/graph_202558895.jsonl b/edge/graph_202558895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21d767545a0e40da01c94a4b095592666f8a9f0b --- /dev/null +++ b/edge/graph_202558895.jsonl @@ -0,0 +1,9 @@ +{"201035892|206741902": ["Odometry estimation and SLAM are classical topics in robotics with a large body of scientific work covered by several overview articles [6], [7], [28]."]} +{"12888763|393948": ["It has been shown that convnet representations trained on classification problems generalize well to other tasks [18, 17, 2, 6].", "Such \u2018transfer learning\u2019 has been demonstrated elsewhere for training classifiers [18, 17, 2], but here we demonstrate transfer learning from classification to the qualitatively different task of pose regression."]} +{"126795914|7981750": []} +{"7183629|393948": ["Since it is known that training deep architectures in a global way is an open problem [25], we use the standard greedylayerwise method to find good local minima for the filter coefficients of each layer and then we perform a global training to fine-tune them."]} +{"44100533|6660049": []} +{"118684904|57825745": ["More details are given in [229], [230]."]} +{"7981750|469744": ["vSLAM algorithms have widely proposed in the field of computer vision, robotics and AR [6].", "In KITTI dataset webpage([6]), evaluation results are listed."]} +{"60440469|49743080": []} +{"3714620|7360895": ["These technologies have wide industrial applications, including autonomous driving platforms [6], interactive collaborative robotics [11], and localization and navigation systems [12], etc."]} diff --git a/edge/graph_202558944.jsonl b/edge/graph_202558944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92a286f24dca8a5b96743dd14e3571ef9c3df0d5 --- /dev/null +++ b/edge/graph_202558944.jsonl @@ -0,0 +1,32 @@ +{"67876998|53080750": ["Machine learning techniques are widely investigated in the context of optical communication systems, as discussed in [14]\u2013[16]."]} +{"67876998|53958589": []} +{"67876998|230371": ["Several digital signal processing (DSP) techniques have been proposed to compensate for the nonlinear distortions in the optical link, as reviewed in [1]\u2013[3].", "3, we plot the Q factor, calculated as in [3], versus the PW size R for 16-QAM at 800 km transmission"]} +{"88497482|4943134": []} +{"8225522|1708582": []} +{"67872467|53080750": ["Maximum used transponders versus load [75]."]} +{"67872467|53958589": ["We refer the readers to two recent survey papers [72], [73] for comprehensive reviews on these topics."]} +{"67872467|4943134": ["We refer the readers to two recent survey papers [72], [73] for comprehensive reviews on these topics."]} +{"67872467|8650651": ["Besides physical layer-related developments, optical network architectures and operations are also undergoing major paradigm shifts under the software-defined networking (SDN) framework and are increasingly becoming complex, transparent and dynamic in nature [5]."]} +{"67872467|393948": ["In the near future, ML is expected to power numerous aspects of modern society such as web searches, computer translation, content filtering on social media networks, healthcare, finance, and laws [2].", "A major technical challenge in DL is that the conventional BP algorithm and gradient-based learning methods used for training shallow networks are inherently not effective for training networks with multiple layers due to the vanishing gradient problem [2]."]} +{"49575922|19938676": ["The converged use of different wireless networks by dynamically accessing LTE, WLAN and Visible Light Communications (VLC) [2], [3] could be an effective solution for improving indoor wireless communication quality."]} +{"49575922|8909218": ["Meanwhile, a general observation in [1] has shown that approximately 80 percent of data communication occurs indoors."]} +{"49575922|1708582": ["Equation (7) can be rewritten in the form of Bellman equation [22]."]} +{"41064946|192934": ["Furthermore, neural network training is usually carried out using a randomly selected training subset [7], [8] that enhances the robustness of the networks rather than using the prede\ufb01ned approach."]} +{"28222603|1708582": ["Three methods namely, DP, Gittins indices and learning automata exist in the literature to solve the MABP optimally [14].", "The bandit problem described above is equivalent to an MDP with a single state, multiple actions and an action resulting in self transition [14]."]} +{"164060|2509135": []} +{"67770717|4943134": ["been used for various optical parameter monitoring, resource (re)allocation, and network reconfiguration [8]\u2013[10]."]} +{"4943134|1708582": ["Finally, in reinforcement learning [43] an agent learns an optimal (or nearly optimal) policy from a series of reinforcements (rewards) or punishments received from its interaction with the environment."]} +{"4943134|4269723": ["The software defined networking (SDN) paradigm [125], which decouples control and data planes, and enables programmability on the former plane, has aroused the interest of both industry and research communities by allowing networks managers to manage, configure, automate and optimize network resources via software."]} +{"126566436|1680300": []} +{"69839828|4943134": ["Meanwhile, ML-based approaches have shown the capacity to deliver exceptional performance in scenarios where the underlying physics and mathematics of the problem are too difficult to be described explicitly, and the numerical procedures involved require computational time/resources [24]."]} +{"85502921|8909218": ["Traditional radio frequency (RF) systems are currently facing spectrum crisis, which is the bottleneck of enhancing the network capacity [1]."]} +{"3461846|19938676": ["availability of cloud platforms, and consequent extreme data rate and reliability requirements [1], [4]; traditional procedures are not only prohibitive from a cost viewpoint, but also from"]} +{"46806070|393948": []} +{"3817262|1680300": []} +{"8766378|1708582": ["\u2026introduction to Qlearning , and the scalability of the existing deflection routing protocols based on reinforcement learning are presented An agent that learns how to interact with a dynamic environment through trial-and-error may use reinforcement learning techniques for decision-making [22] ."]} +{"53958589|4943134": ["Note that another recently published survey [33] proposes a very similar categorization of existing applications of artificial intelligence in optical networks."]} +{"53958589|1580493": ["At data plane, the Elastic Optical Network (EON) concept [12]\u2013[15] has emerged as a novel optical network architecture able to respond to the increased need of elasticity in allocating optical network resources."]} +{"53958589|13172512": ["Some applications of ML in different networking areas have already matched these expectations in areas such as intrusion detection [2], traffic classification [3], cognitive radios [4]."]} +{"18233639|1680300": []} +{"67876678|53958589": []} +{"67876678|4943134": []} diff --git a/edge/graph_202560214.jsonl b/edge/graph_202560214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebf0ae56a493ed30452ce1766bf4b567701b95d2 --- /dev/null +++ b/edge/graph_202560214.jsonl @@ -0,0 +1,6 @@ +{"206592484|456491": []} +{"7885416|18263962": ["T. Wiegand is with the Fraunhofer Heinrich Hertz Institute (Fraunhofer HHI), 10587 Berlin, Germany and with the Image Communication Laboratory, Berlin Institute of Technology, 10587 Berlin, Germany (e-mail: twiegand@ieee.org).\nfor evaluation is expensive, slow and cumbersome."]} +{"13088241|393948": ["One way to overcome the absence of ground truth targets is to utilize unsupervised learning, such as restricted Boltzmann machines and autoencoders [23]."]} +{"10512190|393948": [", by training a restricted Boltzmann machine or an autoencoder [4] with convolutional layers.", "By contrast, deep-learning models employ multiple levels of linear and nonlinear transformations to generate highly general data representations, thereby greatly decreasing dependence on the selection of features, which are often reduced simply to raw pixel values [2], [4].", "A more complicated model, such as a multilayer perception or recurrent NN [4], could also be used for aggregation [Figure 4(d)]."]} +{"50780108|1020148": [", the left and right views, captured by two cameras, simulating human binocular vision [7]."]} +{"11654786|393948": ["First, making the network deeper will raise the learning capacity significantly [1]."]} diff --git a/edge/graph_202561166.jsonl b/edge/graph_202561166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aaca8efc434695ab95616adad2765714571cad52 --- /dev/null +++ b/edge/graph_202561166.jsonl @@ -0,0 +1,52 @@ +{"53768941|3427126": ["[6] proposed a new multi-speed fault diagnostic approach by using self-adaptive wavelet transform components generated from bearing vibration signals to identify four health states of rolling bearings."]} +{"21717310|18078738": []} +{"9928823|393948": ["(2013) extended the recursive neural network to its tensor, in a similar way that the DNN was extended to its tensor version (Yu et al., 2013), and"]} +{"71139888|2088679": []} +{"42870514|15888893": []} +{"42870514|393948": []} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"3706921|393948": ["In the autoencoder (AE) framework, an AE is a discriminative graphical model that tries to reconstruct the input signals [30]."]} +{"114470829|9928823": []} +{"44448186|9141490": ["Such algorithms mostly bene\ufb01t from stochastic operators [4] that make them distinct from deterministic approaches."]} +{"116706338|393948": []} +{"155107857|44104746": []} +{"155107857|22163846": ["In recent years, research on lightweight deep CNNs has made some achievements [34]."]} +{"155107857|393948": ["In addition, traditional artificial intelligence methods are shallow leaning models, with which it is difficult to effectively learn the nonlinear relationships of complex systems [4]\u2013[6]."]} +{"207168547|33286487": []} +{"18188725|393948": ["It is shown that the representation de\ufb01nes the upper-bound performances of machine learning algorithms [19]."]} +{"2380770|393948": ["This would make intelligent fault diagnosis methods less dependent on the prior knowledge or human labor, so that novel applications could be done faster, and more importantly, to make mechanical fault diagnosis toward real artificial intelligence [20]."]} +{"3463434|18078738": ["Four main steps are necessary for these methods: signal processing, features extraction, features reduction, and patterns recognition [10], [11]."]} +{"3463434|192934": ["ods for dimension reduction in statistics research [50], [51]."]} +{"17977694|18841702": ["Gorjian et al. (2009b) presented a review of the existing literature on commonly used degradation models in reliability analysis.", "Gorjian et al. (2009a) presented a state-of-the-art review of the existing literature on covariate-based models in reliability modeling .", "(2006), Heng et al. (2009), Pecht (2008), Gorjian et al."]} +{"18121764|8604408": ["Bayesian networks [38], [39] are a particular case of network"]} +{"56481834|18078738": []} +{"145857381|54440351": []} +{"115191008|7358409": ["Synchrosqueezing transform (SST) is related to the time-frequency reassignment family and can effectively improve the readability of the TFR of nonstationary signals [154].", "Although standard time-frequency reassignment methods (STFRM) provide a direct and powerful TFR of nonstationary signals, signal reconstruction techniques using STFRM remain lacking [154]."]} +{"54461672|18188725": ["Deep learning can be used to extract useful knowledge, make appropriate decisions from big data, and help achieve intelligent machine health monitoring [9]."]} +{"125976702|393948": ["Various deep learning algorithms, such as autoencoders, stacked autoencoders [103], DBM and DBN [16], have been applied successfully also in fault diagnosis."]} +{"56594323|18188725": ["[19] investigated the application of DL to machine health monitor."]} +{"56594323|15888893": []} +{"56594323|18078738": ["In general, the fault diagnosis methods can be classified into model-based, signal-based, knowledgebased and hybrid/active approaches [14]."]} +{"56594323|393948": ["In traditional machine learning methods, the handcrafted features should be predesigned, and it has been shown that these handcrafted features define the upper-bound performances of machine learning methods [7]."]} +{"125608550|393948": []} +{"125305425|393948": []} +{"3981563|44461432": ["\u2026of big data by including Veracity and Value, making it \u20185V.\u2019 Correspondingly, it becomes focal for today\u2019s research to determine how to produce tremendous practical value quickly and accurately from massive data, which comes from multiple and heterogeneous sources at a rapid rate [7]\u2013[10]."]} +{"3981563|18078738": ["The process of fault diagnosis can be divided into three stages, namely, data acquisition, feature extraction and fault decision [17], from the perspective of the work\ufb02ow of diagnosis.", "Some also divides it into model-based, signal-based, knowledge-based, hybrid and active diagnosis methods [17], [18], with special attention on real-time diagnosis and fault tolerance."]} +{"49480557|393948": []} +{"115368663|9928823": []} +{"115368663|393948": []} +{"59159106|18078738": ["The model-based systems include both qualitative methods on the basis of symbolic intelligence (i.e. fault trees, diagraphs) and quantitative methods on the basis of machine learning intelligence (unsupervised and supervised learning systems) [1].", "The model-based techniques, a mathematical model that approximates the real system under certain assumptions is first developed and used for diagnosing faults by monitoring the consistency between the measured and the model-predicted outputs of the system in [1]."]} +{"3269862|18188725": []} +{"3269862|393948": []} +{"34170710|393948": ["Deep learning has the ability to yield useful and important features from data that can ultimately be useful for improving predictive power [20]."]} +{"3385026|393948": []} +{"3482454|15888893": []} +{"3482454|393948": []} +{"18599847|17772052": ["The traditional approach of analyzing e-nose data involves extracting information in the static and dynamic phases of the signals [44] for the use of static pattern analysis techniques (PCA, discriminant function analysis, cluster analysis and neural networks)."]} +{"18599847|38476": ["Analysis of 5 time-series data has been the subject of active research for decades (Keogh 6 and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu 7 (2006) as one of the top 10 challenging problems in data mining due to 8 its unique properties.", "Analysis of time-series data has been the subject of active research for decades (Keogh and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu (2006) as one of the top 10 challenging problems in data mining due to its unique properties."]} +{"213944638|51929263": ["In addition, this dataset also enables the alidation of deep transfer learning and domain adaptation lgorithms [32], [33] to predict a more realistic bearing fault from accelerated life testing with classifiers trained on artificially induced scratches or drills.", "Designed to tackle this practical and widely existing issue in numerous applications, transfer learning has aroused extensive attention in the machine learning community, and various transfer learning frameworks are proposed based on classical ML algorithms [32], [33], [157], [158]."]} +{"213944638|905827": []} +{"8302854|9928823": []} +{"8302854|393948": ["This paper demonstrates how to achieve a meaningful representation from data that discovers the hidden structure of high-dimensional data based on autoencoders [15]."]} +{"16391929|393948": []} diff --git a/edge/graph_202561248.jsonl b/edge/graph_202561248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dbba64b125d9786e7a524f8787e04a16e903b9e5 --- /dev/null +++ b/edge/graph_202561248.jsonl @@ -0,0 +1,5 @@ +{"36798361|18717047": []} +{"5707880|206578224": ["Almost existing solutions focus on minimize the energy consumption and computing latency or maximize the system stability and availability of the edge nodes within a consideration of single edge computing power [14].", "The system design should be considered as a vital purpose [8][14]."]} +{"2172141|10299098": ["In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless access points (APs) and base stations (BSs) [3], [4].", "By applying dynamic voltage and frequency scaling techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where (3)Note that to avoid the issue of dividing by zero, we define \u03b2( li ti ) = 0 when either li = 0 or ti = 0 holds.", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} +{"2172141|206578365": ["To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless APs and base stations (BSs) [3], [4].", "In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "By applying dynamic voltage and frequency scaling (DVFS) techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where fi,n \u2208 (0, f max i ], n \u2208 {1, .", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} +{"52928434|206578365": ["Similarly, edge servers sell their computing resource with ask prices set between [3, 10].", "The bids from buyers are set between [0, 14], and the asks from sellers are between [3, 10]."]} diff --git a/edge/graph_202563648.jsonl b/edge/graph_202563648.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202565500.jsonl b/edge/graph_202565500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202565865.jsonl b/edge/graph_202565865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9c62e45f7c774d90b8f6dec9ca30e32baa4402d --- /dev/null +++ b/edge/graph_202565865.jsonl @@ -0,0 +1,42 @@ +{"18318236|6518885": ["\u2026in advanced nuclear, biological and chemical (NBC) defenses and sophisticated damage detec\u00ad tion systems for surveillance etc. Finally, in industrial domain, nanomaterials can be used for self-cleaning anti-microbial tex\u00ad tiles, manufacturing processes and quality control procedures [1][4]."]} +{"10280720|13268141": ["A NAND \ufb02ash memory stores bits in memory cells made of \ufb02oating-gate MOSFET (FGMOS) [32].", "Among diverse mechanisms to transfer external electric charge to and from the FG, two predominate: (i) hot-electron injection (HEI); and (ii) Fowler-Nordheim (F-N) tunneling [32]."]} +{"71150642|12060835": [", solar energy, wind power, or underwater turbulence [18], [19], cannot be utilized in nanonetworks."]} +{"198169225|19788427": ["The rapid advancement of the integrated circuit (IC) technology processes greatly improves transistor density and enables the development of chip multi-processors (CMPs) [1]."]} +{"17765186|1940388": ["Wonderful survey papers have been published on this topic [18, 19, 20] covering all aspects from authentication techniques to confidentiality and integrity solutions and also"]} +{"319357|4668902": ["The metamaterial community can leverage existing knowledge in these areas, which have been applied across the computing stack: building approximate circuits, bounding the error probability throughout execution, debugging approximate devices, or combining the approach with energy harvesting, to name a few examples [21]\u2013[24]."]} +{"56173958|3453202": ["However, for eavesdroppers who are actively jamming the channels, these advantages can also serve to their favors, which are the downside of massive MIMO system that needs to be tackled [25]."]} +{"17133380|12060835": [", solar energy, wind power, or underwater turbulences [16], cannot be utilized in nanonetworks mainly due to technology limitations."]} +{"43358025|14376565": [", to replace a failed component) more time-consuming and costly [4]\u2013[6]."]} +{"58004699|209901261": ["Many works [18], [30]\u2013[37] either neglect the influence of the chip package, which introduce losses and dispersion, or directly neglect dispersion whatsoever."]} +{"18460234|19788427": []} +{"4059073|1230643": ["WSNs [11], nodes in such networks typically decrease their transmission range to reduce contention and resort to multiple hops to reach the intended destinations.", "As a result, a large amount of research has been devoted to the development of protocols that are energy-ef\ufb01cient or even energy-constrained in extreme cases such as WSNs.", "In fact, latency constraints discourage the use of techniques with low duty cycles as proposed in numerous MAC protocols for WSNs [11].", "Although high-density wireless networks are not new, e.g. WSNs [11], nodes in such networks typically decrease their transmission range to reduce contention and resort to multiple hops to reach the intended destinations.", "Architectural Requirements [7], [10], [11]", "Finally, the on-chip networking scenario shares with mission-critical WSNs the need for latency and reliability guarantees, although with much more restrictive deadlines and power budget [10].", "Physical Constraints [1], [5], [6], [9], [11]"]} +{"7298608|12060835": ["Categories and Subject Descriptors C.2.1 [Computer-Communication Networks]: Network Architecture and Design\u2014Wireless Communication\nKeywords Wireless Nanosensor Networks, Energy Harvesting, Terahertz Band Communication, Graphene, Nanowires"]} +{"51877280|1680300": ["Modulation classi\ufb01cation has been extensively studied in the literature on traditional wireless networks operating on microwave frequencies (see the survey article [13] and references therein).", "For modulation classi\ufb01cation in traditional wireless networks, the solutions reported in the literature so far could be broadly classi\ufb01ed as either feature-based (e.g., cyclic cumu-lants, moments, amplitude, phase etc.), or, decision-theoretic (based on likelihood functions) [13],[14]."]} +{"52156763|53760697": ["As a result, emerging interconnect technologies are being explored as well [5], [6]."]} +{"206563151|6588866": ["One major limitation of the algorithms discussed in (69) is that they assume synchronous com-", "An overview of such algorithms is presented in (69, 70) in the context of wire-"]} +{"206563151|1236072": []} +{"206563151|14561706": [", a factory), where a robot can easily plan and execute tasks due to high certainty about the environment, to more human environments: the presence of humans or other actors, dynamic variations in the world, limited sensing, large variation of objects types and positions, and compliance and safety constraints require a much higher level of sensing and autonomous behavior [6, 68]."]} +{"3632470|3392135": ["1-10 THz) inside the human body [2], [3]."]} +{"52902440|5022650": ["The IoT has a critical effect on numerous aspects of everyone\u201fs life such as healthcare, agriculture, industry, smart cities, smart appliances, etc [5]."]} +{"52902440|12150819": ["However, the interconnection of nanomachines with current communication techniques need to develop new network architectures [13, 14]."]} +{"52902440|2769147": []} +{"52902440|6518885": ["Cancer-causing tumours and other harmful agents can be also detected by nanosensors [25, 26]."]} +{"36736531|1230643": ["Range-based localization algorithms include angle of arrival (AoA) [12], time of arrival (ToA) [13], time difference on arrival (TDoA) [10], and received signal strength indicator (RSSI) [14].", "RELATED WORK A multitude of localization algorithms have been proposed for WSNs to date [10]."]} +{"2703985|1230643": ["Despite being similar to micro- and macroscale sensors [2], it should be taken into account that (i) the solutions in the nanoscale are limited not just in terms of existing manufacturing"]} +{"3979581|1230643": ["\u201camorphous computing\u201d [1], and ultimately laid the foundation for the field of sensor networks [2]."]} +{"15588759|1236072": ["A signi\ufb01cant amount of research on routing and forwarding techniques for traditional WSNs started more than a decade ago [3]."]} +{"41251223|16023210": ["This problem leads to premature network disconnection because most of the sink\u2019s neighbors\u2019 energy is fully depleted and the sink is isolated from the rest of the network [22]."]} +{"41251223|9830350": ["In a flat topology, eachnode plays the same role and has the same functionality as other sensor nodes in the network [19, 20].", "Therefore, forwarding data by several relaying nodes (multihop) will consume less energy than direct transmission [19, 20]."]} +{"41251223|205286988": ["In a flat topology, eachnode plays the same role and has the same functionality as other sensor nodes in the network [19, 20].", "Therefore, forwarding data by several relaying nodes (multihop) will consume less energy than direct transmission [19, 20]."]} +{"41251223|1230643": ["WSNs have been used for environment monitoring, healthcare, structure health monitoring, military, and many other applications [1].", "It emphasizes low-power consumption and low cost as opposed to data throughput or channel efficiency [1]."]} +{"41251223|12060835": ["Energy harvesting refers to harnessing energy from the surrounding environment or other energy sources and converts it to electrical energy [10]."]} +{"131780416|202565865": ["2019 [44] Nano Communication Network A summary of current status of Nano communication network is presented with applications and different layers of protocol stack."]} +{"131780416|53250185": ["capacity [276] and autonomous network management is also a good direction [275], [278]."]} +{"131780416|3392135": ["can result in very high data rate, short transmission time with low collision probability [18].", "For Nano Communication Networks, the survey articles are discussed in [10]\u2013[12], [15], [18], with physical layer aspects, propagation models, security, in-", "Some architectures for nanonetworks to handle complex task by combining it with current technologies like SDN, IoTs, virtual network and fog computing are presented in [18].", "technologies like software-defined networks, IoTs and virtual networks to solve the complex problems at those technologies and higher layers [18].", "These include the nano-communication networks [10]\u2013[12], Internet of nano-things (IoNT) [13], [14], molecular communication network [15], [16], nano-sensor network [17], in-body nanonetworks [16], [18], [19], broadband communication [20], vehicular networks [21], wireless indoor/outdoor communications which include the office/datacenter or small cells deployment [22], [23] and Terahertz"]} +{"131780416|10709221": ["and biological attack prevention and system-on-chip wireless networks [3], [104], [131].", "electromagnetic radiation like nanonetworks and molecular networks in which transmission occur using the flow of molecules [104], [131]."]} +{"131780416|2448188": ["This can improve the user experience and can also reduce the cost of deployment within Data Centres.", "Using the high capacity wireless Terahertz links can also help in re-designing the Data Centres geometry [119].", "A comparison of wireless and optical technologies is presented in [2] for wireless indoor environments.", "At the macro scale, another promising application is wireless Data Centres [2], [117].", "The indoor environments like Data Centres require \ufb01xed links between the racks with very limited mobility.", "optical (FSO) which operates at Infrared (IR) frequencies also has several issues that limit the practicality of these systems for personal wireless communications [2], [3].", "Theapplications which require Tbps links include wireless backhaul [114] and Data Centres [115].", "It is mentioned in [2], wireless communication has overall better chances for penetration through obstacles in comparison with FSOs.", "In an attempt to increase the user experience and high-speed network, the cloud applications have introduced the competition between the Data Centres."]} +{"131780416|15453366": ["Bandwidth 7GHz @60GHz [45] 69 GHz at 300GHz channel models [74] Yes Partially Data rate Maximum of 100Gbps [7], [8] 100 Gbps [46], [75] to few Tbps (theoretical) Standards 5G NR, IEEE 802."]} +{"23188041|17774107": ["The probability density function, f ( \ufffd , \ufffd ) , is given by [4]: where \ufffd is non-centrality parameter and equal to 2 \ufffd [1] where \ufffd is signal-to-noise ratio (SNR), \ufffd is normalized random variable of the received pulse, I n ( z ) is n th order modi \ufffd ed Bessel Function of the \ufffd rst kind."]} +{"207022752|11732290": ["At the submillimeter scale, other significant milestone studies in untethered microrobotics include a study on bacteria-inspired swimming propulsion [54], bacteriapropelled beads [23], [55], steerable electrostatic crawling microrobots [30], catalytic self-propelled microtubular swimmers [24], laser-powered microwalkers [31], magnetic resonance imaging (MRI) device-driven magnetic beads [29], and magnetically driven millimeter-scale nickel robots [56].", "Through off-board actuation approach, many groups used remote magnetic actuation to stop, propel, or navigate capsule millirobots in the GI tract [77].", "For the localization of millirobots inside the GI tract, as the first approach, medical imaging devices such as fluoroscopy, which uses low-dose X-rays to image the capsule region at 1\u20132 frames per second [77] ultrasonic imaging [77]\u2013[80], positron emission tomography (PET) [77], [81] and magnetic resonance imaging (MRI) [77].", "[195] B. Huang, M. W. M. Law, and P. L. Khong, \u2018\u2018Whole-body PET/CT scanning: Estimation of radiation dose and cancer risk 1,\u2019\u2019 Radiology, vol. 251, pp. 166\u2013174, 2009.", "Using MRI to localize the medical microrobot has the same considerations as those above for actuating the microrobot.", "However, the fringing fields at the end of an MRI device or solenoid can lead to large spatial magnetic gradients.", "[179] H. F. Wehrl et al., \u2018\u2018Preclinical and translational PET/MR imaging,\u2019\u2019 J. Nucl.", "[95] P. Pouponneau, J. C. Leroux, G. Soulez, L. Gaboury, and S. Martel, \u2018\u2018Co-encapsulation of magnetic nanoparticles and doxorubicin into biodegradable microcarriers for deep tissue targeting by vascular MRI navigation,\u2019\u2019 Biomaterials, vol. 32, pp. 3481\u20133486, May 2011.", "[71] S. Martel et al., \u2018\u2018MRI-based medical nanorobotic platform for the control of magnetic nanoparticles and flagellated bacteria for target interventions in human capillaries,\u2019\u2019 Int.", "[137] S. Martel, M. Mohammadi, O. Felfoul, Z. Lu, and P. Pouponneau, \u2018\u2018Flagellated magnetotactic bacteria as controlled MRI-trackable propulsion and steering systems for medical nanorobots operating in the human microvasculature,\u2019\u2019 Int.", "[180] M. S. Judenhofer et al., \u2018\u2018Simultaneous PET-MRI: A new approach for functional and morphological imaging,\u2019\u2019 Nat.", "[178] F. Chen et al., \u2018\u2018In vivo tumor vasculature targeted PET/NIRF imaging with TRC105(Fab)-conjugated, dual-labeled mesoporous silica nanoparticles,\u2019\u2019 Mol.", "Many successful localization methods are available for millirobots [77], [78], [81]\u2013[85], while localization of micron scale medical robots is a great challenge due to their much smaller size [94].", "Medical imaging systems such as MRI [71], [137], fluoroscopy [177], PET [178], NIR [179], and ultrasound [178] are possible candidates for microrobot localization.", "Spatial gradients are reported for the patient accessible volume of MRI machines to reach several Tesla per meter, but are typically found outside the central bore and the procedures to measure the maximum possible spatial gradient are not well defined [194].", "Moreover, by placing a small magnet inside the millirobot, hall-effect sensor arrays outside the patient have been used to localize the device [77], [82].", "an alternative approach, a radio transmitter has been placed on the commercial passive capsule endoscopes, and by placing multiple receiver antennas around the patient, an average position error of approximately 38 mm has been realized [77].", "Limitations on PET are already set for staff preparing the tracer nucleotide as well as during patient care.", "[191] I. C. Atkinson, L. Renteria, H. Burd, N. H. Pliskin, and K. R. Thulborn, \u2018\u2018Safety of human MRI at static fields above the FDA 8 T guideline: Sodium imaging at 9.4 T does not affect vital signs or cognitive ability,\u2019\u2019 J. Magnet."]} +{"53018188|3249290": []} +{"53018188|206583375": ["Accurate indoor localization has recently gained great interest for a variety of future location-based services, such as internet of things (IoTs) and robotics [4]."]} diff --git a/edge/graph_202565992.jsonl b/edge/graph_202565992.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84b16948ed3e87605ba7171c5048f61d8a7ce459 --- /dev/null +++ b/edge/graph_202565992.jsonl @@ -0,0 +1,10 @@ +{"51613041|8356163": ["Particularly, further research is needed to integrate the cues used by human listeners that are not present in traditional ASR methods [3], e."]} +{"1662180|9835525": ["tected by comparing colour histograms across consecutive frames [24]."]} +{"641747|4361938": ["The interested reader is referred to [22], [23], [127] for eye movement studies and [24] for a breadth-first survey of eye tracking applications."]} +{"26071662|43059": ["Relaxing the sum-ofrank-1-terms constraint in PARAFAC leads to more flexible tensor decompositions such as Tucker [6], [7], block term decomposition (BTD) [135], three-way decomposition into directional components (DEDICOM) [136], and others [137]."]} +{"26071662|16528630": ["astrophysics [59], biomedics [60], telecommunications [61], audio-vision [23], chemometrics [62], and more.", "In audio-visual applications, features often correspond to speech spectral coefficients and visual cues such as lip contours or speaker\u2019s presence in the scene [23].", "A sequential approach makes sense when one modality has better quality in terms of the information that it conveys than the others in a certain respect, as in certain audio-visual scenarios [10], [23] (Example II-A."]} +{"26071662|8042572": [", [21], [27], [58] (biomedical imaging) and [10], [11] (HMI).", "Examples include multi-sensor [9], HMI [10] and remote sensing [42] applications.", "A domain that is heavily inspired by natural multimodality is HMI.", "An additional complicating factor that makes multimodal HMI stand out is due to the fact that the human user often plays an active part in the choice of modalities (from the available set) and in the way that they are used in practice.", "The challenge of automatic calibration of audio-visual sensors (and others) in the context of HMI (Example II-A.2) is discussed in [10, Section V.", "Second , sometimes a modality can report only on part of the system w.r.t. the other modalities, as is the case with EEG vs. MEG [12], nuclear magnetic resonance (NMR) vs. liquid chromatography\u2014mass spectrometry (LC-MS) [99], occlusions or partial spatial coverage in remote sensing (Example II-C.1), audio-video (Example II-A.1), meteorological monitoring (Example II-C.2), and HMI (Example II-A.2).", ", gesture detection and user tracking), interpretation of human language commands, and other multisensory functions [10], [11].", "For further discussion on features and choosing the right level of data fusion, see, e.g., [21], [27], [58] (biomedical imaging) and [10], [11] (HMI).", "A sequential approach makes sense when one modality has better quality in terms of the information that it conveys than the others in a certain respect, as in certain audio-visual scenarios [10], [23] (Example II-A.", "Examples include: speech processing , including speech recognition, speech activity detection, speech enhancement, speaker extraction and separation; scene analysis , for example tracking a speaker within a group, biometrics and monitoring, for safety and security applications [24]; human-machine interaction (HMI) [10]; calibration [25] [10, Section V.", "In HMI, an important task is to design modalities that will make HMI as natural, ef\ufb01cient and intuitive as possible [11].", "The principal point that makes HMI stand out among other multimodal applications that we mention is that, in HMI, the modalities are often interactive (as their name implies).", "applications [24]; human-machine interaction (HMI) [10]; calibration [25] [10, Section V."]} +{"140227298|3519414": ["Owing to the rapid growth of available EHR, deep learning methods for text mining become more appealing recently because of its competitive performance versus traditional methods and its ability to relieve the feature sparsity and engineering issue [7]."]} +{"49311093|9045705": []} +{"46037985|8723075": []} +{"23672393|15361180": ["In order to provide an answer to the above challenge, research towards reliable solutions for cross-modal applications [37, 38], e.g. cross-modal retrieval [32], which operate across modality boundaries, has gained significant momentum recently.", "For a fair comparison, we exactly follow the dataset partition and feature extraction strategies from [22, 32]."]} diff --git a/edge/graph_202577486.jsonl b/edge/graph_202577486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e073f4b2d5854f9a27830f947531a6f05b443a47 --- /dev/null +++ b/edge/graph_202577486.jsonl @@ -0,0 +1,8 @@ +{"52965836|3342225": ["[63] reviewed methods for explaining black-box models at a large scale including data mining as well as machine learning."]} +{"52965836|17779926": ["One effort to gain insight into highly complex models is the use of rule extraction [114]\u2013[116]."]} +{"8819508|16481413": []} +{"5063596|7306130": []} +{"5063596|17779926": ["Other works explored how to design for implicit interaction with sensing-based systems [14, 75, 86, 175], and help people predict what will happen through feedforward [12, 176].", "Furthermore, while rule extraction is an old research area, and quite separated from the recent developments in iML and FAT, there have been new papers within the past few years, such as methods for rule extraction from deep neural networks [187, 75]."]} +{"169034726|52965836": ["For this type of surveys, please refer to [1, 35, 86]."]} +{"169034726|3342225": ["As its name indicates, data-driven XAI is about understanding of a decision of a \u201cblack-box\u201d machine learning mechanism given the data used as an input [35].", "Thus, the majority of the recent studies and surveys focus on providing an overview on interpretability and explainability of data-driven algorithms [5, 24, 35, 72, 86].", "For this type of surveys, please refer to [1, 35, 86]."]} +{"169034726|4110304": ["Nevertheless, recent studies on the explanation methods mainly focused on the data-driven algorithms aiming to interpret the results of \u201cblack-box\u201d machine learning mechanisms such as deep neural networks (DNN) [108].", "This research line, pushed by the intriguing results of DNNs (e.g., a DNN mistakenly labeling a tomato as a dog [97]), aims to interpret, or provide a meaning for an obscure machine learning model whose inner-workings are otherwise unknown or non-understandable by the human observer."]} diff --git a/edge/graph_202577540.jsonl b/edge/graph_202577540.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a6451c07980c9e6dbf75fd813572bf7e3d1ca6c --- /dev/null +++ b/edge/graph_202577540.jsonl @@ -0,0 +1,29 @@ +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"51914939|9959529": []} +{"24853684|5664472": ["One major drawback of DBNs is the inevitable need of a very long training time [74].", "filters are not very capable of handling occlusion, therefore, require good foreground segmentation [74]."]} +{"24853684|16013270": ["Thus, it is important to survey the commonly used datasets and their key features to understand the capabilities and limitations of each tested approach [1, 21, 95]."]} +{"24853684|17516538": ["Activity recognition [56] is another closely related active field of research."]} +{"52298127|2088679": ["There is a huge gap of deep learning methods in this domain, with only a few notable papers concentrating on deep survival analysis [97]."]} +{"52298127|9928823": ["Among various machine-learning algorithms, \u201cdeep learning,\u201d also known as representation learning [29], is widely used in these applications."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"14779543|1634674": ["Here we overview a few related work but refer the reader to [1,2] for a more complete survey."]} +{"49551723|53734567": ["Humanaction recognition in realworld is essentially an open set problem, which requires the model to simultaneously recognize the known action classes and reject the unknown actions (Geng et al., 2020; Bao et al., 2021)."]} +{"49551723|14814753": ["Different from recent survey papers [22], [23], studies in action prediction are also described in this paper.", "Please refer to [22] for a list of performance of recent action recognition methods on various datasets.", "Dense sampling has shown to improve results over sparse interest points for image classification [7, 22]."]} +{"49551723|393948": ["Action features learned by deep learning techniques has been popularly investigated (Yang & Shah, 2012; Wang et al., 2014a; Taylor et al., 2010; Sun et al., 2014; Plotz et al., 2011; Le et al., 2011; Karpathy et al., 2014; Ji et al., 2013, 2010; Hasan & Roy-Chowdhury, 2014; Bengio et al., 2013; Simonyan&Zisserman, 2014) in recent years."]} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"9621856|16013270": ["The number of stages was determined by cross validation using n = [3, 5, 10, 15] fixed stages.", "Additionally, the number of Gaussians was evaluated with m = [1, 2, 3, 5, 10] Gaussians.", "One good measure of the productivity of the field is the sheer number and variety of datasets that have been produced by researchers in the last few years: A recent survey [3] lists no less than twenty\u2217Part of this work was done at the lab for Computer Vision for Human-Computer Interaction at the Karlsruhe Institute of Technology (http://cvhci."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"18533219|1634674": ["It focuses on identifying a person's action or behavior from a single image."]} +{"18533219|7788290": ["A survey on still image based human action recognition\nGuodong Guo n, Alice Lai Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, United States\na r t i c l e i n f o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become an active research topic in computer vision and pattern recognition.", "\u2026o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become\u2026"]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"26376251|1634674": []} +{"26376251|14970359": []} +{"26376251|7788290": []} +{"5388357|1634674": []} +{"5388357|7788290": []} diff --git a/edge/graph_202578017.jsonl b/edge/graph_202578017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f294f80b21bbebd0fd4993edfadc575602e607b3 --- /dev/null +++ b/edge/graph_202578017.jsonl @@ -0,0 +1,15 @@ +{"49292395|8968641": ["Much progress has been done in recent years about visual tracking (Li et al., 2013; Deori and Thounaojam, 2014; Moujahid et al., 2015), but it stills a stimulating problem to construct a robust process covering the most of challenging factors such as occlusion, motion blur, in-plane and out-of-plane rotations, illumination variation, scale variation, non-rigid object deformation, camera motion and background clutters, to name a few."]} +{"49292395|10355303": []} +{"1033682|174797842": []} +{"127024185|13405422": []} +{"23165369|7439310": []} +{"195682480|14545307": ["Nowadays, most digital content, especially digital images and videos, are converted into the compressed forms for transmission [1]\u2013[4]."]} +{"24365745|10198276": []} +{"8818785|10198276": ["address the harmful impacts introduced by maliciously altered images, image forensics [1], [2] have attracted considerable"]} +{"52963681|17485266": ["In our experiments, the RMSProp optimizer [16] was used to optimize the network given its good performance in some non-convex problems."]} +{"198953159|49668283": ["\u2026(Ahmed Bouridane), azeddine.beghdadi@univ-paris13.fr (Azeddine Beghdadi) specific application of video content analysis which aims to recognize activities from a series of observations on actions of subjects and the surrounded environment and it is important for many other applications [2]."]} +{"198953159|14116122": ["This process of creating useful information about the content of videos can be achieved through video content analysis [1] which has a wide range of applications including the retrieval of particular information, providing automatic alerts and data summarization."]} +{"51974320|10198276": []} +{"198489115|2088679": ["Moreover, as any disease or cancer diagnosis must be made by human, the presence of clear images alleviate the burdens in final identification, especially in large-scale microscope images [Litjens et al. 2017]."]} +{"4772554|5729190": ["Different from scene text detection [2], the text hidden technics do not extract the whole text lines."]} +{"8348376|17473474": ["kind of methods is known as exemplar-based synthesis and widely used in the field of image editing [15], [16], [17], [18], [19]."]} diff --git a/edge/graph_202583523.jsonl b/edge/graph_202583523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3e725e209b6512e90f82128ac3c8870063baaa0 --- /dev/null +++ b/edge/graph_202583523.jsonl @@ -0,0 +1,22 @@ +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"19088692|10355303": ["We briefly review data association and behavioral modeling techniques and refer the interested reader to [86, 55] for more details."]} +{"19088692|17516538": ["Many approaches to inferring various forms of global patterns have been proposed over the years [72, 42, 58, 69, 95, 35, 87, 21, 47, 54]."]} +{"11307543|9932808": []} +{"64853900|1229096": ["Two recent reviews (29, 30) provide a clear overview of the state of the art in motion planning for autonomous cars."]} +{"64853900|2373140": []} +{"52965705|10355303": ["Various relevant approaches have been proposed over the past several decades [1, 2]."]} +{"13441612|7257659": ["This is where predictive decision support ADASs can help [4]\u2013[6]."]} +{"13441612|1029120": ["There has been a wealth of good work done on pedestrian detection [2]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"53104823|17036197": ["TRACKING multiple objects in videos [1] requires detection of objects in individual frames and associating those across multiple frames.", "For a general review of this research direction, we refer to [1], where Luo et al.", "Each column of the figure shows a pair of frames that are n time stamps apart, where n is randomly sampled from [1, 30].", "A summary of the existing multiple object tracking datasets can be found in [1]."]} +{"53104823|195346070": []} +{"21657320|15093118": ["A comprehensive survey of maneuver-based models can be found in [1], [6]."]} +{"118644362|49312150": ["Inverse optimal control (IOC) and inverse reinforcement learning (IRL), have seen a variety of methods including maximum margin-based optimization, maximum entropy-based optimization, Bayesian inference, regression, and classi\ufb01cation [3]."]} +{"1762187|10355303": ["We in this section discuss the tracking methods that are most related to our work, and refer the readers to a thorough review on object tracking survey [33, 59] and benchmark evaluations [50, 58]."]} +{"5648267|10355303": []} +{"3654536|15093118": ["For a recent survey on detection and tracking for intelligent vehicles, we refer the reader to [25]."]} +{"1185580|15929566": []} +{"1185580|1708582": []} +{"9228629|7257659": ["Maneuver-based trajectory prediction: Classification of vehicle motion into semantically interpretable maneuver classes has been extensively addressed in both advanced driver assistance systems as well as naturalistic drive studies [13], [14], [16], [19]\u2013[27].", "Many works address these shortcomings of motion models and probabilistic models by defining a set of semantically interpretable maneuvers [19]\u2013[27]."]} +{"76665153|195346070": ["Despite the vast literature on multiobject tracking [42, 38], it still remains a challenging problem, especially in crowded environments where occlusions and false detections are common."]} diff --git a/edge/graph_202630484.jsonl b/edge/graph_202630484.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8f8ac532ddb36f56b6df1e865ba8a587ed42c40 --- /dev/null +++ b/edge/graph_202630484.jsonl @@ -0,0 +1,11 @@ +{"52206083|206578365": []} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} +{"2282184|8523192": ["To summary, Edge computing [11]\u2013[13] is totally edgelocalized, however, fog computing extends the computing and communication resources towards edge of the network."]} +{"2282184|2756896": ["Location privacy, as discussed in [28], is one of the most important models for privacy, since the place of equipment can be linked to the owners."]} +{"2282184|3348390": ["As resources of EU\u2019s devices are shared among other geographically close devices to support context-aware services [63], [64], location, massive amount data and other information of EU need to be protected in very secure manner."]} +{"2282184|12815020": ["SCADA [65], cloud [66], smart grid [67] etc."]} +{"11157468|10299098": []} +{"29531940|22084305": []} +{"29531940|15707": []} +{"29531940|6430931": []} diff --git a/edge/graph_202660583.jsonl b/edge/graph_202660583.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bde8745865f187be561e3f59d631fa50a922dbcf --- /dev/null +++ b/edge/graph_202660583.jsonl @@ -0,0 +1,137 @@ +{"52304067|22221919": ["One of the key technologies to increase the per-cell spectral efficiency is non-orthogonal multiple access (NOMA) which has attracted a considerable attention of researchers [1]."]} +{"155106477|22221919": ["Comparing with the conventional orthogonal multiple access (OMA) techniques, NOMA allows multiple users to multiplex on non-orthogonal resources, such as frequency channels or spreading codes [9]."]} +{"155106477|191396": ["In Algorithm 1, for K SCs, a worstcase complexity can be calculated as O( \u2211K i=1 FkFcIt ), where It denotes the iterations, Fk is the number of SUs to be clustered in the kth SUs, tand Fc denotes the proposed clusters number of each SC [19].", "Then, we introduce the sub-optimal SUs clustering scheme which is inspired by kmeans clustering [19]."]} +{"53726738|21557844": ["The use of the mmWave spectrum, however, is challenging because it is sensitive to blockage and requires the LoS propagation between the transmitter and the receiver [79]."]} +{"53726738|61132": ["Furthermore, in military applications, such as reconnaissance, surveillance, attack, and patrol, the usage of the single-UAV networks is almost thirty years old [6].", "\u2026node may trigger the recon\ufb01guration of the whole UAV network [46]. b) Decentralized self-organization: Under the decentralized self-organization model, each entity makes self-decisions and takes actions according to nearby/local information, i.e., the direct interaction with neighbor UAV nodes [6].", "Depending on applications, the speed of a UAV may be in the range of 0-460 km/h [6], [13].", "For more information on transmission mechanisms of UAV networks, please refer to [6], [13] and references therein.", "Multi-UAV networks present a star/mesh topology structure [6].", "The procedure of the self-organization network model is as follows [6]: when a UAV node fails or new UAV node joins, its neighbor(s) monitors the incoming and outgoing links.", "Moreover, the network self-organization generates computational overhead and requires high bandwidth [6].", "On the other hand, owing to frequent changes of the network con\ufb01guration, UAV networks should be self-healing/self-organized to be more fault tolerant [6].", "To improve the reliability of the end-to-end data transmission in highly dynamic networks, delay/disruption-tolerant network (DTN) routing protocols may be required [6]."]} +{"53726738|19938676": ["Moreover, UAV communication networks have been regarded as promising proposals for the 5G system where the gigabits per second (Gb/s) data transfer rate is considered as one of the key performance indicators [51]."]} +{"53726738|26398795": ["\u2026three groups: deterministic, stochastic, and enhanced routing protocols. a) Deterministic routing protocol: In the deterministic routing protocol, a node carrying packets may select a next hop node according to deterministic/known information (e.g., contact, queue, and traf\ufb01c demand) [66], [67].", "The disadvantages of the broadcast-based routing protocol are [66]: \u2022 Contention: It may create contention for buffer space and transmission time (or the channel resource)."]} +{"150262479|76659781": ["In [20], a system\u2019s perspective overview is given by the authors, with two main focuses: uplink strategies and challenges in the co-existence with RF technologies."]} +{"150262479|52008841": ["In [18], authors explore the state-of-the-art on multi-user VLC systems, exploring new concepts in literature such as NOMA-VLC, also explored in this survey.", "In [18], a review of the literature is performed, and authors aggregate information about VLC modulation schemes"]} +{"150262479|3738168": ["The use of visible light communication in underwater scenarios has been explored in [114], [115]."]} +{"150262479|52125636": ["communication in underwater scenarios has been explored in [113], [114]."]} +{"150262479|22221919": ["full use of time and frequency domains resources during the transmission [85], as shown in Figures 12a and 12b."]} +{"150262479|3270620": ["In [88], authors present the fundamentals of NOMA techniques, design and research challenges.", "Surveys with focus on promises and challenges of NOMA techniques applied to new wireless technologies (5G) are explored in [88]\u2013[90], which have been presented in 2016, 2017 and 2018, respectively."]} +{"150262479|17165859": ["Positioning and localization systems are carefully analyzed in [111], [112]."]} +{"9464019|3270620": ["Therefore, NOMA is considered as a key technology for the \ufb01fth generation mobile communication networks [3]\u2013[5]."]} +{"9464019|7686677": ["Therefore, the rapidly increasing energy consumption, causing increasing amount of CO 2 emission levels, has become an important issue for the next green cellular network, driven by the overwhelming increase of the traf\ufb01c data and mobile devices [11]\u2013[14]."]} +{"201873207|22221919": ["To this end, non-orthogonal multiple access (NOMA) is emerging as a competitive candidate to improve the spectrum efficiency, in which the transmitter broadcasts the superposed signal of several users through a single resource block, and users\u2019 messages can be identified by different power levels with successive interference cancellation (SIC) performed at receivers [2]."]} +{"3424351|22221919": ["A good survey on NOMA for 5G networks can be found in [10]."]} +{"3289536|22221919": ["While in multi-carrier NOMA, overloading is realized at reduced complexity since the number of users at each subcarrier is limited [16]."]} +{"68051776|22221919": ["Hence, compared to the conventional OMA, NOMA not only can provide more efficient utilization for scarce resources [2]\u2013[4] but also can improve user fairness [5], [6]."]} +{"85496818|51988843": ["However, NOMA has many research challenges that need careful investigations such as optimal/sub-optimal resource allocations, dynamic user clustering algorithms, low complexity SIC based receivers and multiuser detection (MUD) methods, and in-depth capacity analysis when combined with MIMO systems [2], [26]\u2013[30]."]} +{"85496818|9651858": ["On the other hand, system complexity represents a key issue to minimize the consumed power towards safe and green communications [11], [12], [47].", "For instance, the hardware complexity, in terms of utilized RFCs, is responsible for 50-80% of the total power consumption at the BS [12], while the essential computational efforts consume about 20% of the rest power [47]."]} +{"85496818|10937383": ["Therefore, NOMA has been considered in 3GPP LTE-A Pro for the downlink under multiuser superposition transmission (MUST) scheme [1].", "At present, Releases 13 and 14 of LTE-A Pro standards support up to 16 and 32 antennas at the BS, respectively with an increased number of up to 8 co-scheduled UEs.", "[37] L. Liu, C. Yuen, Y. L. Guan, and Y. Li, \u2018\u2018Capacity-achieving iterative LMMSE detection for MIMO-NOMA systems,\u2019\u2019 in Proc.", "[42] Z. Ding and H. V. Poor, \u2018\u2018Design of massive-MIMO-NOMA with limited feedback,\u2019\u2019 IEEE Signal Process.", "In addition, Release 15 of the 5G NR expands the BS with 64 to hundreds of antennas [4], [5].", "[13] X. Gao, O. Edfors, F. Tufvesson, and E. G. Larsson, \u2018\u2018Multi-switch for antenna selection in massive MIMO,\u2019\u2019 in Proc.", "In 2012,\nhe joined Southern Technical University, Iraq, as a Faculty Member, where he is currently an Assistant Professor with the Department of ET, BTI.", "Signal Process., vol. 66, no. 5, pp. 1346\u20131360, Mar. 2018.", "The early versions of these technologies have been already adopted in Releases 13 and 14 of Third Generation Partnership Project (3GPP) Long Term Evolution Advanced Pro (LTE-A Pro) [5], [6].", "[36] D. Tweed and T. Le-Ngoc, \u2018\u2018Dynamic resource allocation for uplinkMIMO NOMAVWNwith imperfect SIC,\u2019\u2019 in Proc."]} +{"148574438|22221919": ["It is assumed that the CHs can communicate with all CMs to obtain its perfect CSI in this paper, which is motivated by the concept of cooperative NOMA4 [3], [33]."]} +{"57762487|22221919": ["Unlike conventional orthogonal multiple access (OMA), the power-domain NOMA ensures multiple users to be served by the same time-frequency resources via power-domain multiplexing, thus offering a significant improvement in spectral efficiency and connectivity performance [4], [5].", "From a practical viewpoint, the relay-assisted cooperative NOMA is easy to implement, since there can be a large number of idle users in realistic wireless networks, which can be temporarily used as dedicated relays to help other users [4]."]} +{"51875763|22221919": []} +{"4708695|22221919": ["For example, by leveraging NOMA to underlay CR networks, multiple SUs can be connected simultaneously, fundamentally differing from the OMA scenario in which only one SU can transmit when a resource block becomes available, thus potentially reducing transmission delay of secondary access [7].", "[7] Z.", "1, usually a control message containing information of power allocation should be sent by the BS at the initial stage [7].", "0 [7]."]} +{"56594630|22221919": ["NOMA exploits power domain to serve multiple users at the same time, frequency and spreading codes [1], [2]."]} +{"54465258|206576720": []} +{"3775231|22221919": []} +{"53229703|22221919": ["2We adopt the max-min fairness because it is a typical and extensively used fairness rule in NOMA [11], [25].", "For power-domain NOMA, the signals are superimposed with different transmission powers at the transmitter, and successive interference cancellation (SIC) is required at the receivers to remove the multi-user interference [6]\u2013[11].", ", low-density spreading (LDS), sparse code multiple access (SCMA), multiuser shared access (MUSA), pattern division multiple access (PDMA), and so on [9], [11], [13]."]} +{"85500300|22221919": []} +{"85500300|6909107": ["interactive gaming [29]."]} +{"85500300|3270620": ["There exist a number of interesting survey papers in this topic [30]\u2013[33]."]} +{"85500300|8323234": ["\u2026wave (mmWave) bands (30 GHz to 300 GHz spectrum) has been subject to intensive research during the past decade, and it has been proven theoretically and experimentally to provide gigabit-per-second data rates due to huge available bandwidths (e.g. up to 2 GHz bandwidth in 60 GHz) [21], [22].", "The feasibility of supporting gigabits-per-second data rates by wireless communications at mmWave bands (30 GHz to 300 GHz) has been veri\ufb01ed both theoretically and experimentally [21], [22], [55], [56].", "The large path-losses encountered at these mmWave frequencies can be compensated by leveraging the unprecedentedly high array gains that can be obtained by densely packing a massive number of antennas in a very-small area thanks to much smaller wavelengths of mmWaves [21], [22], [55], [56]."]} +{"85500300|3055684": ["\u2026to eavesdroppers and can bene\ufb01t from PHY security as we elaborate this in Section VI. 5) Energy harvesting: Energy harvesting communications offer the promise of providing an energy self-suf\ufb01cient and self-sustaining means of communications; a step toward realizing green communications [30]."]} +{"85500300|4395259": ["These approaches aim at degrading the quality of signal reception at eavesdroppers compared to the main channel and thereby preventing them from decoding the con\ufb01dential information from the intercepted signals [26]\u2013 [29]."]} +{"199570055|22221919": ["This advantage has elevated NOMA to a prime solution for the massive connectivity requirements of the next generation of wireless networks [9]."]} +{"58515925|11720829": ["The combination of MIMO and NOMA (called MIMO-NOMA) introduces advantages of both technologies and can further improve spectrum reuse efficiency [6], transmission throughputs [7], [8] and power efficiency [9]."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"3548474|875676": ["There are two types of typical pulses: the pulse based on the isotropic orthogonal transform algorithm (IOTA) [20] and the pulse adopted in the PHYDYAS project [21]."]} +{"4890246|21705502": ["It improves the spectral efficiency of the system, meeting the needs of the ever-growing demand for mobile Internet and the Internet-of-Things (IoT) [10]\u2013[12]."]} +{"4890246|7942157": ["Release-14 for the system design of the new radio (NR) [2], and as a low latency multiple access solution for future systems [35]."]} +{"4890246|22221919": ["Since SCMA can be regarded as a type of multi-carrier NOMA [14], the behavior of different multidimensional constellations from PAPR perspective can be studied along with PAPR reduction techniques, e.", "Power-domain NOMA (also referred as single-carrier NOMA [14]) can support multiple users within the same RE by allocating different power levels to them based on their channel conditions [15]\u2013[17].", "Code-domain NOMA, also referred to as multi-carrier NOMA in [14], can serve multiple users within the same RE."]} +{"4890246|10235514": []} +{"102343670|22221919": []} +{"102343670|26259297": ["When the channel needs to be updated, the BS only needs to re-estimate the remaining channel gain components [37]\u2013[39]."]} +{"102343670|21418": []} +{"181604928|22221919": ["In particular, power-domain NOMA systems have been proposed as a way to increase the achievable rate [1]."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"198169521|22221919": ["Power domain non-orthogonal multiple access (NOMA) is also a promising key multiple access technology in 5G systems to improve the spectral efficiency significantly, meet the increasing demand in mobile traffic, and reduce the latency compared with traditional orthogonal multiple access (OMA) [7]."]} +{"5918010|4395259": ["Recently, physical layer security, which achieves secure transmissions by exploiting the dynamics in the physical layer, has drawn considerable attention [6], [7]."]} +{"61809651|22221919": ["However, the high power consumption for conducting successive interference cancellation (SIC) is the main bottleneck for the sake of employing NOMA technique to the low-power IoT.", "Recently, simultaneous wireless information and power transfer (SWIPT) was proposed to provide stable energy supply for low-power IoT devices.", "The rapid development of the internet of things (IoT) leads to the explosive increase of diverse wireless devices and the rapid growth of high-rate mobile services [1]\u2013[3].", "Thus, it is recognized as a promising technique to achieve massive connectivity and low latency requirements in the IoT era.", "In addition, non-orthogonal multiple access (NOMA) has been envisioned as another emerging technique to improve SE and achieve massive connectivity in IoT [7], [8].", "With the explosive growth of IoT devices, how to extend their lifetime in an ef\ufb01cient manner has been recognized as a popular research topic [23], [24].", "However, the spectrum scarcity has become a major bottleneck for the employment of the IoT.", "Therefore, the integration of CR and NOMA has great potential to satisfy the IoT requirements, namely massive connectivity and high throughput.", "By exploiting power-domain multiplexing of NOMA, the users have to consume nonnegligible energy for powering their successive interference cancellation (SIC) decoders [9], which will largely prevents the application of the NOMA in energy-constraint IoT.", "In NOMA, since the superposition signal received by the user carries substantial energy, the IoT device may harvest a portion of this energy for powering its decoder."]} +{"61809651|3504276": []} +{"61809651|3055684": ["In general, either time switcher or power splitter is adopted by the receiver to simultaneously collect both energy and information from the received radio-frequency (RF) signal [11], [25], [26]."]} +{"61809651|12029139": ["In general, either time switcher or power splitter is adopted by the receiver to simultaneously collect both energy and information from the received radio-frequency (RF) signal [11], [25], [26].", "The classic linear model [11], cannot accurately characterize the property of practical energy harvester."]} +{"3927845|22221919": ["Towards these goals and among all components in the radio link design, NoMA has attracted great attention across both academia and industry [2-15].", "As one example, the integration of NoMA with (massive) MIMO has been raised in literatures [15]."]} +{"56728085|49316045": ["NOMA has been reviewed as a potential access scheme for uplink and grant free transmission [19, 20]."]} +{"56728085|51988843": []} +{"56728085|22221919": []} +{"56728085|3270620": ["Detailed surveys on PD-NOMA, its state-of-the-art, research trends, implementation issues, architecture and challenges can be found in [4, 13\u201315, 17, 28].", "Detailed surveys on PD-NOMA could be found in multiple review articles [4, 13, 15, 17, 21, 22, 28]."]} +{"56728085|15449163": []} +{"56728085|12206204": []} +{"56728085|12029139": []} +{"150134626|22221919": ["Therefore, the coverage and average throughput can be increased significantly with a moderate increase in the system complexity [4, 5].", "Following this concept, a variation of NOMA called cognitive radio inspired NOMA has been proposed in [5]."]} +{"3900203|22221919": []} +{"52196595|3330461": ["Meanwhile, D2D communication is another effective approach to improve coverage and capacity for the regions where no infrastructure can be used [20]\u2013[22]."]} +{"59842990|51858916": ["Most of the air-to-ground channel measurements and models focus on the large-scale statistics such as mean path-loss and shadowing [20].", "When UAV \ufb02ies above the vegetation, it is likely that the communication path to the ground devices is either line of sight (LOS) or non line of sight (NLOS) due to obstacles, where the path loss exponent and variation in shadowing increases as the altitude of UAV increases [20]."]} +{"59842990|35260120": ["\u2026a long-range backscatter communication link the following are needed: 1) A backscatter transmitter (tag), 2) a backscatter receiver (reader, data collector), and 3) one (or multiple) carrier emitter (RF energy source); it should be noted that the emitter may be collocated with the receiver [3]."]} +{"59842990|22221919": ["Recently, power-domain non-orthogonal multiple access (NOMA) is envisaged as an essential enabling technology for 5G wireless networks especially for uncoordinated transmissions [10]."]} +{"3812885|21418": ["Considering the high power consumption of mixed signal components in mm-Wave systems, the hybrid analog and digital beamforming was proposed as one possible energy efficient solution for mm-Wave communications [10], [11]."]} +{"164778509|22221919": ["Apart from invoking the D2D technique to improve the system spectral efficiency, non-orthogonal multiple access (NOMA) is also a promising technology to improve the spectral efficiency, on the standpoint of providing power dimension formultiple access [8], [9]."]} +{"44087309|3461906": ["[38] focus on investigating the interference impact in EH systems,"]} +{"44087309|8606364": []} +{"44087309|3504276": ["enabled communication networks, for its appealing feature of increasing both wireless power and information transfer efficiency [18], [19].", "while [19] introduces a full performance survey of WPCNs."]} +{"44087309|12029139": ["communication systems [37], [40], we focus on wireless multiantenna EH system and its applications in physical layer", "has appeared after [37], that we want to cover in order to demonstrate the recent progress in this field."]} +{"44087309|12060835": ["been considered, like solar, piezoelectric, wind, hydroelectric, and wireless radio frequency (RF) signals EH [7]."]} +{"52290948|4884302": ["The aim of Q-learning is to obtain a policy (a set of actions) that maximizes the observed rewards over the interaction time [15]."]} +{"182730814|22221919": ["It is worth mentioning that the key idea of the NOMA system is to allocate more power to the user with poorer channel conditions [5], thus, p 1 > p 2 always holds in our system.", "To meet these requirements, numerous transmission and multiple access techniques have been proposed and investigated, such as massive multiple-input multiple-output (MIMO) [1], millimeter-wave (mmWave) [2], non-orthogonal multiple access (NOMA) [3]\u2013[5], and sparse code multiple access (SCMA) [6]."]} +{"44004844|22221919": ["NOMA is mainly categorized as power-domain multiplexing and code-domain multiplexing [4]."]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"192585568|22221919": ["NON-ORTHOGONAL multiple access (NOMA) can provide superior spectral efficiency in the future wireless networks, which is regarded as a potential enabler for the 5G networks [1]."]} +{"3620679|13074005": ["A distinct characteristic of SM is that it allows additional information being conveyed through antenna selection, and thus the overall spectral ef\ufb01ciency can be improved [7], [12]."]} +{"198985993|51988843": ["To address this problem, non-orthogonal multiple access (NOMA) was proposed to combine with mmWave communications [9], [10], [16], [17].", "In general, the optimal decoding order for NOMA is the increasing order of the users\u2019 channel gains [17], [40]."]} +{"198985993|22221919": ["To address this problem, non-orthogonal multiple access (NOMA) was proposed to combine with mmWave communications [9], [10], [16], [17].", "The number of served users in the same time-frequencycode-space RB can be improved manyfold [16]\u2013[21]."]} +{"52311221|8323234": ["For general comparison, the fully-connected architecture can achieve higher spectrum efficiency, while the sub-connected architecture is expected to achieve higher energy efficiency [5].", "In this way, the use of a very large number of antennas in mmWave massive MIMO systems leads to an equally large number of RF chains, which will result in unaffordable hardware cost and energy consumption [5].", "Usually, two typical HP architectures are adopted [5]: 1) Fully-connected architecture, where each RF chain is connected to all antennas; 2) Sub-connected architecture, where each RF chain is connected to only a subset of antennas."]} +{"67864903|22221919": ["\u2026power domain nonorthogonal multiple access (NOMA) has been regarded as a promising key technology in 5G systems [21], which can signi\ufb01cantly improve the spectral ef\ufb01ciency (SE), support more user connections, and reduce the latency compared with traditional orthogonal multiple access (OMA) [22]."]} +{"4110032|22221919": ["NON-ORTHOGONAL multiple access (NOMA) is a key technology of the fifth generation (5G) mobile networks [1], in which the transmitters superimpose the signals and send them to the corresponding receivers."]} +{"195740426|21557844": ["For all mmWave frequencies where the urban cell sizes are on the order of 200 m, rain or snow attenuation can clearly be overcome with additional antenna gain (obtainable by switching in more antenna array elements) [2], [4], [6].", "These frequency bands could easily be used for high speed 6G mobile wireless networks with up to km size coverage range, and perhaps even up to 10 km or beyond in \ufb01xed applications [4], [25], [105]\u2013[107].", "This feature makes THz signals exceedingly dif\ufb01cult to intercept or eavesdrop [4], [10], [25], [29].", "\u2026model had slightly better PLE and standard deviation stability for the indoor environments than the single-frequency CI and Floating Intercept (FI) models (although a sensitivity analysis such as provided in [133] has not yet been performed for indoor sub-THz channels) [4], [132], [134]\u2013[136].", "\u2026free space loss, making these particular bands well suited for very short range and secure communications such as \u201cwhisper radio\u201d applications, where massive bandwidth channels will attenuate very rapidly out to a few tens of meters, meters, or fractions of a meter [2], [4], [6], [25], [104].", "Theoret-ically, the path loss in free space decreases quadratically as frequency increases , so long as the physical size of the antenna (effective aperture) is kept constant over frequency at both link ends [4], [6], [28], [118].", "\u2026autonomous driving, Internet of Things (IoT), and wireless backhaul (as a replacement for labor-intensive installation of optical \ufb01ber) [3], [4], as well as newer applications that have not been conceived yet, will need even greater data rates and less latency than what 5G networks will\u2026"]} +{"53233169|22221919": ["The basic idea of NOMA is to serve multiple users in an orthogonal frequency/time resource block, which can be mainly divided into two categories, namely code-domain NOMA and powerdomain NOMA [2], [3], [5], [6].", "There are several typical schemes of code-domain NOMA being investigated, including multiple access solutions relying on low-density spreading (LDS), sparse code multiple access (SCMA), multiuser shared access (MUSA), pattern division multiple access (PDMA), etc [2], [3], [6].", "For code-domain NOMA, the users are allocated sparse sequences or non-orthogonal low cross-correlation sequences [2], [3], [6]."]} +{"52304495|51988843": ["In addition, the design principles and key features of several MC-NOMA techniques are concisely discussed in [6], from the perspective of the code-domain superposition."]} +{"52304495|22221919": ["It is believed in [3] that PD-NOMA combined with OFDMA is an extraordinary case of MC-NOMA.", "[3] introduce the concepts, challenges, latest applications and future research trends of several promising NOMA techniques.", "Appropriate resource allocation, including user pairing and power allocation, could improve the throughput and fairness of all users in the PD-NOMA wireless system with limited resources [3], [41].", "Meanwhile, PD-NOMA has been regarded as the most promising SC-NOMA scheme [3], in which uncorrelated user data are mapped into different REs and signals of different users are distinguished by their different levels of power allocation.", "In [3], the concept of MC-NOMA is clearly explained, and a brief introduction of various MC-NOMA techniques is given.", "However, there exist a lot of unique characteristics and challenges in efficiently combining MC-NOMA with the mature OFDMA that has the highest probability to be incorporated into 5G [3]."]} +{"86769598|51858916": []} +{"86769598|22221919": ["the spectrum efficiency but also allow more users or devices to access the network [3]\u2013[7].", "Different from the conventional orthogonal multiple access (OMA), NOMA is built upon the idea that multiple users can simultaneously share one resource block, such as a subcarrier or a spreading code [3]."]} +{"181562676|22221919": ["NON-ORTHOGONAL multiple-access (NOMA) is a promising multiple-access technique for the fifth generation (5G) and beyond wireless networks [1], [2].", "The multi-users\u2019 data bits are estimated using an appropriate detection method such as the successive-interference cancellation (SIC) and the message passing algorithm (MPA) [1]."]} +{"88495969|7851743": ["technique is not feasible due to which, there is a need for tuning and self-organization by the FBSs [13], [15]."]} +{"46893352|4502294": ["With the emergence of C-RAN, the conventional backhaul has evolved to a more complex network that can be divided into fronthaul, midhaul, and backhaul [9]."]} +{"51988843|22221919": ["NOMA schemes are briefly introduced in [11] and [12]."]} +{"51988843|3270620": []} +{"67865224|22221919": ["The long term evolution (LTE) standard uses a variant of power-domain NOMA method called the multi-user superposition transmission (MUST) [1], [2] and for 5G both the code-domain and the power-domain NOMA methods are being evaluated.", "This assumption is in line with the power-domain NOMA model, wherein successive interference cancellation (SIC) techniques are used to detect the signals from different users [1].", "One of the key technologies which has interested all the communities of 5G is the non-orthogonal multiple access (NOMA) [1], [2]."]} +{"173188187|21705502": []} +{"173188187|22221919": ["In contrast to orthogonal multiple access (OMA) that serves users in different orthogonal resource blocks, NOMA is capable of serving multiple users with different quality of service (QoS) requirements using the same time-frequency resource by either power-domain or code-domain multiplexing, therefore offering a number of advantages, including improved spectrum efficiency, reduced end-toend latency, and massive connectivity [1].", "Code-Domain NOMA: Typical examples of code-domain NOMA are pattern division multiple access (PDMA) and sparse code multiple access (SCMA), which are based on the idea that one user\u2019s information is spread over multiple subcarriers [1, 4].", "For instance, for a case where six pairs of users are densely located, the typical factor graph matrix for SCMA is given in [1], and the typical PDMA pattern matrix is given in [4].", "Power-Domain NOMA: Power-domain NOMA superposes multiple users in the power domain and exploits the channel gain difference between multiplexed users [1].", "IEEE Wireless Communications \u2022 August 2019 149 ACCEPTED FROM OPEN CALL ing (CS)-based NOMA, and so on [1, 3]."]} +{"53280713|22221919": ["This power domain feature provides rich opportunities for NOMA to support massive connectivity and meet the users\u2019 diverse quality of service (QoS) requirements [2]."]} +{"67770143|9978124": ["\u2026location has bene\ufb01ts for several applications, such as positioning of unmanned aerial vehicles (UAVs), ground robots, in factory automation, or for automated vehicles [93], as well as new disruptive applications in the contexts of virtual and augmented reality, gaming, social networking, etc. [94]."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"52192001|24785273": []} +{"52192001|22221919": ["Interested readers may refer to [23]\u2013[27] for the detailed literature survey."]} +{"53429416|22221919": []} +{"56594431|22221919": ["NON-ORTHOGONAL multiple access (NOMA) is considered to be a great potential technology for providing superior spectral efficiency in 5G wireless systems [1], [2]."]} +{"2424255|22221919": []} +{"174819908|88489458": ["V2X communications typically include vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) and vehicle-to-pedestrian (V2P) transmissions to enable real-time traffic information exchange among vehicles, pedestrians and infrastructure [4]\u2013[6]."]} +{"174819908|4709516": ["It is well known that the vehicular networks are dynamic due to the real-time change of road traffic, thereby inevitably bringing about the problem of unstable network topology [14]\u2013[16]."]} +{"174819908|38911919": ["However, a clustering method has been proposed that makes the network topology hierarchical and scalable by establishing a connectivity graph between vehicular networks nodes [17], and supports data dissemination"]} +{"70093533|206578365": ["One main challenge in edge caching is to strike a good trade-off between a massive data base and finite storage capacity [1].", "The main idea of mobile edge computing (MEC) was proposed for the first time in 2014 as an alternative to mobile cloud computing (MCC) by bringing storage, computation, and network control resources to edge nodes of a network [1]."]} +{"4952202|3270620": []} +{"52008841|52125636": ["Some review articles focused on specific aspects of VLC such as VLC channel modeling methods [28], noise optical sources and noise mitigation mechanisms [29], VLC-based positioning techniques for indoor and outdoor applications [30], and the pertinent issues associated with the outdoor usage of VLC in vehicular communication [31]."]} +{"52008841|3930401": ["In [27], authors explored the differences among optical wireless communications (OWC) technologies such as infrared communications, VLC, lightfidelity (LiFi), free space optical (FSO) communications, etc."]} +{"52008841|22221919": ["More details on NOMA in traditional RF networks are provided in [143], [144]."]} +{"52008841|10235514": []} +{"52008841|10979806": ["The EE can be improved by efficient resources optimization, power allocation, energy transfer and harvesting, and hardware solutions [87]."]} +{"52008841|12206204": ["95 exabyte-per-month in 2021 [1]), there is an urgent need to develop a fifth-generation (5G) of networks with a higher system-level spectral efficiency that will offer higher data rates, massive device connectivity, higher energy efficiency (EE), lower traffic fees, a more robust security, and ultralow latency [2]\u2013[4]."]} +{"52008841|12029139": ["Extensive work has been done to design, evaluate, and optimize simultaneous wireless information and power transfer in RF networks [160], [161]."]} +{"52008841|4395259": ["For the PLS in RF networks, readers can refer to [177] and [178]."]} +{"37925315|12681089": []} +{"59993342|2509135": []} +{"59993342|7482876": []} +{"59993342|13367219": []} +{"59993342|1708582": []} +{"20896245|8999817": ["optimal performance, which involves unaffordable complexity in practical application [21]."]} +{"20896245|8323234": []} +{"20896245|11720829": ["For the SU-MIMO, the precoder design is based on eigen-beamforming [22] and equal power allocation."]} +{"61810889|22221919": ["Non-orthogonal multiple access (NOMA) is suggested for LTE enhancements and 5G systems for higher spectral efficiency [6]."]} diff --git a/edge/graph_202660686.jsonl b/edge/graph_202660686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf7f01663a3c544404a4893b9c329134e19325ba --- /dev/null +++ b/edge/graph_202660686.jsonl @@ -0,0 +1,31 @@ +{"17840279|14745481": ["As trust is a multidisciplinary concept, the term has been used in different disciplines to model different types of relationships: trust between individuals in social or e-commerce settings, trust between a person and an intelligent agent in autonomous systems and trust between network entities in communication networks [41]."]} +{"17840279|4474193": ["Jin and Branke [105] categorize four causes of uncertainties in evolutionary computation as follows:\n1) Noise in fitness functions: The noise may come from measurement errors or randomness.", "Jin and Branke [105] categorize four causes of uncertainties in evolutionary computation as follows: 1) Noise in fitness functions: The noise may come from measurement errors or randomness."]} +{"119409443|16908400": []} +{"15138525|18044357": []} +{"38199539|2623404": [", protocols, topology) [8], [9]."]} +{"67791883|6583734": []} +{"20880112|2623404": ["In particular, it centralizes the network control and provides dynamic, flexible and automated reconfiguration of the networks [61, 62, 63]."]} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"59273635|52002758": ["A recently published survey by Lei et al.([6]) reviews MTD research work from the perspectives of the theory and design of MTD, the key techniques in MTD, and the application of MTD.", "Finally, Software-Defined Networking (SDN) has become an important and integral part of MTDs, but it is only briefly mentioned in the survey paper published by Cai et al.[5]\nA recently published survey by Lei et al.[6] reviews MTD research work from the perspectives of the theory and design of MTD, the key techniques in MTD, and the application of MTD.", "In comparison to the survey papers published by Cai et al.[5] and by Lei et al.[6], this work is more focused on architectural aspects and classifications of MTD strategies.", "and by Lei et al.([6]), this work is more focused on architectural aspects and classifications of MTD strategies."]} +{"7570989|8914588": []} +{"7570989|627405": []} +{"7570989|9436742": []} +{"8748272|30548952": ["RELATED WORK This work relates to the following three main areas of research: Security in Cloud Computing: The authors in [5] provide a detailed list of security flows that can occur in the cloud from the perspective of a software developer and the work in [6] lists seven major ways cloud services can be at risk from the perspective of a business executive, giving recommendations for how companies can prepare to leverage cloud services.", "Our solution addresses a few of the security concerns listed in the above papers, mostly focusing on the Network Security flaw from [5] and the Malicious Insiders flaw from [6]."]} +{"489825|17992570": ["Of course, a trade off exists between replay frequency and overhead introduced."]} +{"53095088|207244886": []} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"2864410|206584087": ["As a result, conventional defenses only partially mitigate advanced DDoS attacks, leaving room for improvement through novel methods [22]."]} +{"15885226|2387055": ["These limitations can cause performance bottlenecks and denial-of-service conditions even with benign tra\ufb03c; further, adversaries can induce switch thrashing to create network outages [16]."]} +{"4887458|4528002": ["The most common communication busses utilized are the Controller Area Network (CAN) Bus, the Local Interconnect Network (LIN) Bus, the FlexyRay Bus, and the Media Oriented System Transport (MOST) Bus [30]."]} +{"14681173|206584087": ["While there have been plenty of detection and mitigation mechanisms for DDoS [4], they become obsolete due to the recent shift of the attacked targets, from directly attacking a specific target to indirect attack (e.g., [5] [6])."]} +{"2016265|18567112": ["\u2026Qian\nDepartment of Computer Science and Engineering University of California, Riverside\nRiverside, CA, 92521 Email: {zhiyong,neamtiu,zhiyunq}@cs.ucr.edu\nDon Torrieri US Army Research Laboratory\nAdelphi, MD 20783\nAbstract\u2014Moving-target defense is an effective strategy for deflecting cyber attacks.", "On smartphone platforms such as Android and iOS, applications (\u201capps\u201d) are subject to frequent pause/resume (or stop/restart) operations."]} +{"145052378|52002758": ["[10] 3 7 7 7 7 3 7 3", "The values of AC are categorical {EASY, MEDIUM, HIGH}, while CIA values are in the range [0, 10]."]} +{"145052378|22582078": ["SDN deals with packet headers, from layers 2-4 of OSI model and other protocols such as MPLS [139].", "SDN as MPLS [140]."]} +{"145052378|13172512": []} +{"21310330|207244886": ["Despite their importance, the security metrics we used in our experiments are only limited to Risk, AC, RoA, and ASP together with path-based metrics while there are other security metrics which can be used based on the cloud security level requirements, such as those discussed in [118]."]} +{"21310330|2387055": ["Sharma et al. [136] proposed an MTD technique using an IP shuffling approach which used IP multiplexing (or demultiplexing) for an SDN environment.", "In [68], the authors proposed an optimal network reconfiguration technique using shuffle assignment problem for SDN environments.", "The evaluation was based on the overhead against the performance of using the MTD through SDN.", "Kampanakis et al. in [82] investigated the advantage and disadvantages of using MTD technique through SDN and the methods for implementing it.", "The SDN shuffle: Creating a Moving-Target\nDefense using host-based Software-Defined Networking.", "The application of MTD techniques to mitigate DDoS attacks on the cloud using Software-defined networking (SDN) has been studied in many research [75,141].", "In Proc. of the 1st Workshop on Hot Topics in Software Defined Networks (HotSDN 2012) (New York, NY, USA, 2012), ACM, pp. 127\u2013132.", "In [101], the authors proposed a host IP mutation technique to defend against potential attacks in large networks using SDN controller.", "In Future\nNetworks and Services (SDN4FNS), 2013 IEEE SDN For (2013), IEEE, pp. 1\u20137.", "They also proposed an SDN-based proactive DDoS Framework (ProDefence) for detection and mitigation of DDoS attacks in a large-scale network.", "Note: the\nasterisked times are TC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119\n6.4 The results of three security metrics: Risk, AC, and RoA on the cloud resulting\nfrom deploying MTD techniques on EP1 and EP2 . . . . . . . . . . . . . . . 121\nList of Acronyms\nAC Attack Cost\nACL Access Control List\nAG Attack Graph\nALE Annual Loss Expectancy\nAP Attack Path\nARO Annualized Rate of Occurrence\nASP Attack Success Probability\nAT Attack Tree\nAV Asset Value\nBS Benefits of Security\nBVS Betweenness VM Selection\nCS Cost of Security\nCVE Common Vulnerability and Exposures\nCVS Closeness VM Selection\nCVSS Common Vulnerability and Scoring System\nDDoS Distributed Denial of Service\nDMZ Demilitarized Zone\nEF Exposure Factor\nENB Expected Net Benefit\nES Exhaustive Search\nFDD Firewall Derision Diagram\nGSM Graphical Security Model\nxix\nxx List of Acronyms\nHARM Hierarchical Attack Representation Model\nIC Informative Call\nIDS Intrusion Detection System\nIM Important Measure\nMAPL Mean of Attack Path Length\nML Machine Learning\nMoPL Model of Attack Path Length\nMTD Moving Target Defense\nNCM Network Centrality Measure\nOC Operational call\nO-DAP Optimal Diversity Assignment Problem\nOS Operating System\nPHC Personal Health Cloud\nPHI Personal Health Information\nPN Protected Network\nRoA Return on Attack\nRoSI Return on Security Investment\nRVS Random VM Selection\nRZ Resource Zone\nSAP Shortest Attack Path Length\nSDN Software Defined Networking\nSDPL Standard Deviation of Attack Path Length\nSLE Single Loss Expectancy\nVM Virtual Machine\nVM-LM Virtual Machine Live Migration\nVMM Virtual Machine Monitoring\nChapter 1\nPreface\nCloud computing is an on-demand network paradigm that facilitates access to a large pool of computing resources [105].", "[4] Achleitner, S., Porta, T. L., McDaniel, P., Sugrim, S., Krishnamurthy, S. V., and\nChadha, R. Deceiving network reconnaissance using SDN-based virtual topologies.", "Moreover, Bawany et al. [22] conducted a substantial survey to study and classify the proposed SDN-based DDoS attack detection and mitigation techniques.", "Moreover, we survey the current MTD studies extensively in terms of application domain which includes Cloud computing, Internet of Things (IoT), Software Defined Networking (SDN), Enterprise Networks.", "MTD can be used to secure various application domains such as Internet of Things (IoT), software defined networks (SDNs), and so forth.", "Infrastructure Layer Operating System (OS) Virtualization [13,66,71] Virtualization [13,66] SDN [75,133] SDN, VM migration [13,55,66,120] Virtual IP [75,76]"]} +{"21310330|1188683": ["The concept of MTD technique goes back to the 1970\u2019s, when those concepts introduced under different names in the literature such as reconfigurable computing [20, 40], fault tolerance [18, 34] which introduced the n-version programming (NVP) concept, or bio-inspired cybersecurity [86, 94]), and so forth."]} +{"3501199|18194234": []} +{"8084098|2387055": ["These are concerns about scaling \ufb01ne-grain \ufb02ows in OpenFlow networks [3,9] and these scaling features car be used by adversaries to create network denial-of-service conditions [12]."]} +{"53015322|2387055": ["Operating System (OS) Virtualization [1, 15, 18] Virtualization [1, 15] SDN [21, 36] SDN, VM migration [1, 10, 15, 32] Virtual IP [21, 22] enhance the overall security of a system by reconfiguring the system to change the attack surface of the system, but it may have no effect on the system\u2019s availability, as well as possibilities to deteriorate the availability of the system.", "[30] HTTP [23, 38] Platform Layer Application/ Web service Design [7, 18] Database [7, 37] Web Server Replica Web Service Infrastructure Layer Operating System (OS) Virtualization [1, 15, 18] Virtualization [1, 15] SDN [21, 36] SDN, VM migration [1, 10, 15, 32] Virtual IP [21, 22]"]} diff --git a/edge/graph_202660742.jsonl b/edge/graph_202660742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2467c47b290e0a1afa5bfc25c49b8d813b5f86b --- /dev/null +++ b/edge/graph_202660742.jsonl @@ -0,0 +1,19 @@ +{"38352604|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} +{"3586416|20905429": ["Examples of potential applications include: learning sentiment, semantic location, or activities of mobile phone users; predicting health events like low blood sugar or heart attack risk from wearable devices; or detecting burglaries within smart homes [3, 37, 40]."]} +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"16380713|7020971": []} +{"59337327|15662958": ["s little possibility of leakage at the raw data level. Recent works adopted homomorphic encryption for centralizing and training data on cloud [75, 76]. In practice, Additively Homomorphic Encryption [2] are widely used and polynomial approximations need to be made to evaluate non-linear functions in machine learn algorithms, resulting in the trade-offs between accuracy and privacy [4,35]. 2.2.1 Indi"]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"54463802|15662958": []} diff --git a/edge/graph_202660800.jsonl b/edge/graph_202660800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60962e9a7549519836e673a7383f976b073138ea --- /dev/null +++ b/edge/graph_202660800.jsonl @@ -0,0 +1,11 @@ +{"67856057|54559476": ["local window, convolution based methods iteratively aggregate representation of neighbor nodes to learn a node embedding [3], [4], [7], [11], [25], [26], [27], [28], [29], [30]."]} +{"67856057|3951790": ["It should be noted that most of the graphs are sparse in real world applications [51]."]} +{"4956100|17652653": ["Paraphrase generation (Androutsopoulos and Malakasiotis, 2010; Madnani and Dorr, 2010) has been tackled using many different methods, including those based on hand-crafted rules (McKeown, 1983), synonym substitution (Bolshakov and Gelbukh, 2004), machine translation (Quirk et al."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"54439061|3536399": []} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"1033682|174797842": []} +{"11217889|5538934": ["There has been a great deal of recent work on the security of ML systems; we provide only a sampling here, and refer the reader to Barreno et al. (2010), Biggio et al. (2014a), Papernot et al. (2016b), and Gardiner & Nagaraja (2016) for some recent surveys."]} +{"4730292|206739910": ["Therefore, we use the LISA dataset [18], a U.", "road signs [18] and has an accuracy of 91%, and the GTSRB*-CNN network that is trained on a modified GTSRB (German Traffic Sign Recognition Benchmark) dataset [27] and has an accuracy of 95% (Section III-A)."]} +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} +{"52182515|22163846": ["There exist clear parallels between our methods and techniques in model compression [12, 7] \u2013 therefore, we believe that drawing upon additional techniques from model compression can further improve the ease-of-verification of networks.", "Most of these methods use satisfiability modulo theory (SMT) solvers (Katz et al., 2017; Ehlers, 2017; Carlini et al., 2017) or LP and Mixed-Integer Linear Programming (MILP) solvers (Tjeng et al., 2017; Lomuscio and Maganti, 2017; Cheng et al., 2017a).", "There exist clear parallels between our methods and techniques in model compression (Han et al., 2016; Cheng et al., 2017b) \u2013 therefore, we believe that drawing upon additional techniques from model compression can further improve the ease-ofverification of networks.", "Exact verification of networks has been the subject of many recent works (Katz et al., 2017; Ehlers, 2017; Carlini et al., 2017; Tjeng et al., 2017; Lomuscio and Maganti, 2017; Cheng et al., 2017a)."]} diff --git a/edge/graph_202660933.jsonl b/edge/graph_202660933.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f01ee5cdfc9f1f10f7c9c0aa0dde79681518733 --- /dev/null +++ b/edge/graph_202660933.jsonl @@ -0,0 +1,7 @@ +{"823678|7788290": ["Tracking people, which raises many challenges due to the presence of large 3D, nonrigid motion, was extensively analyzed in [36], [1], [ 30 ], [73]."]} +{"12549541|819377": ["\u2022 Bouwmans et al., 2008 [5] survey only GMMmethods and use the Wallflower dataset.", ", 2008 [5] survey only GMMmethods and use the Wallflower dataset."]} +{"33732301|14986695": ["To decompose the image I into {Is}S s=1, the MCA algorithms [23]\u2013[27] iteratively minimize the energy function defined as"]} +{"13100859|14986695": ["In this paper, we propose a single-frame-based rain removal framework via formulating rain removal as an image decomposition problem based on morphological component analysis (MCA) [5]-[6].", "Sparse coding is the technique of finding a sparse representation for a signal with a small number of nonzero or significant coefficients corresponding to the atoms in a dictionary [5]-[7]."]} +{"11946697|14986695": ["However, they replaced a rainy pixel with a temporal average of background pixels, yielding blurring artifacts."]} +{"15197266|14986695": []} +{"459502|14986695": []} diff --git a/edge/graph_202660956.jsonl b/edge/graph_202660956.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202676010.jsonl b/edge/graph_202676010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40223545cf1aa4fd9303edd015d8f44468691622 --- /dev/null +++ b/edge/graph_202676010.jsonl @@ -0,0 +1,28 @@ +{"53229376|206578224": ["Towards overcoming the aforementioned obstacles and, in order to serve the increased requirements of the future 5G services, a Multi-access Edge Computing (MEC)-enabled architecture that enables cloud computing capabilities at the edge of the access network is widely accepted by the literature [1]."]} +{"53229376|25911553": ["However, the recent NFV advances have permitted the virtualization of the EPC, by transforming the rigid core architecture into a set of network VNFs that can be flexibly placed at different parts of the network [11]."]} +{"21557419|3119314": ["[8] together with security and privacy issues and available services and resources."]} +{"51876790|6909107": ["Indeed, the issues raised in such contexts closely resemble those in a Fog environment with mobile IoT devices [8]."]} +{"51872279|6909107": ["Though various issues have been well investigated in the MEC system, the mobility management issue still needs further investigation to ensure low signaling and migration cost [4]."]} +{"51872279|10299098": ["Therefore, mobile edge computing (MEC) is introduced recently to bring computational resources and storage closer to end users in order to reduce these delays [2], [3]."]} +{"59231760|52059869": ["rantee service continuity when users travel across different edges, an ef\ufb01cient mobility management scheme should be employed in the network edge. An emerging technique, software-de\ufb01ned network (SDN) [8] is proposed to provide seamless and transparent mobility support to users. In the SDN based fog computing architecture [9], the routing logic and intelligent management logic are deployed on the SDN "]} +{"59231760|6909107": []} +{"15898165|2535224": []} +{"28800568|21930333": ["For example, an edge cloud data center in MEC only serves the users in its coverage area [54]."]} +{"51762318|26368310": ["The service replication concept has been studied for VM placement to ensure high availability [8], and to reduce the duration of service migration in [9]."]} +{"56595847|52059869": ["There is a consensus among academia and industrials that the 5G system will leverage emerging technology, such as Network Function Virtualization (NFV) and Software Defined Networking (SDN), for achieving its objectives [2]."]} +{"56595847|206578224": ["In order to overcome this limitation, the concept of Multi-access Edge Computing (MEC) has been introduced [3]."]} +{"56595847|19711892": ["such as high-resolution video streaming, cloud gaming and augmented reality applications [3]."]} +{"496783|6909107": ["An alternative approach is path selection [1], where a more suitable path is found for delivery of computed data from a data center to a mobile terminal.", ", fog nodes), it provides low-latency and ubiquitously available computation services [1, 2]."]} +{"496783|10299098": ["During a handover, important procedures such as disconnection from the old fog conducted additional latency caused by handover is minimized."]} +{"19196380|26368310": ["34 This feature requires the ability to perform continuous failure detection, clone the state of a VM, and recover by switching to an existing replica."]} +{"19196380|8909218": ["For instance, assuming a femtocell radius ranging from 20 to 50 meters [56] and the linear crossing of the user over the maximum cell extension, the initialization time in case of DV size of 50 MBs implies a user mobility below 26 and 67 km/h respectively, to guarantee the effective deployment of the replica."]} +{"13809057|16654832": ["Shiraz et al. (2013) reviewed the existing distributed application processing frameworks for mobile devices to offload computationally intensive applications to remote servers.", "Many surveys have been done on mobile cloud computing (Shiraz et al. 2013; Abolfazli et al. 2014; Sanaei et al. 2014; Li et al. 2015; Shuja et al. 2016)."]} +{"51877772|1442447": ["as graphs/chains of software components referred to as virtual objects (VOs) [7] hereinafter."]} +{"27060711|10693567": []} +{"53014158|6909107": []} +{"53014158|206578365": ["We simulated systems with \u03c9m = 6, \u2200m and vk is a uniformly distributed integer variable on [1, 50], representing the priority of fk according to the importance of its realtime performance from low to high.", "Due to the proximity of computing resources to the end-users, MEC is a promising technology to cope with increasing bandwidth demands, and to satisfy the stringent delay and availability requirements of emerging real-time applications [1]."]} +{"44089236|6909107": []} +{"3119314|3767252": ["Threat model distribution for fog computing component (adapted from [64]).", "[64] presented a threat model by reviewing the scope and nature of potential attacks.", "manipulation and rogue infrastructure have been identified as possible security threats [64].", "Table 2 summarizes the threat model distribution in fog computing component as identified in [64].", "A common characteristics associated with fog computing is its deployment at the \u2018\u2018edge of the network\u2019\u2019 [64], [94], which implies that fog computing has features that make it a nontrivial extension of cloud computing."]} +{"49193072|3119314": ["While this requirement is gaining momentum in the research literature [5], there is still need to define and analyse efficient virtual resource placement and migration algorithms that will ensure maximum performance in the sense of optimal"]} +{"53079629|6909107": ["Equipped with easy-to-access micro computation access points (i.e. fog nodes), fog computing provides low-latency and ubiquitously available computation services [8, 14, 15].", "An alternative approach is path selection [4, 14], where a more suitable path is found for delivery of computed data from a data center to a mobile terminal."]} +{"53079629|206578365": ["fog nodes), fog computing provides low-latency and ubiquitously available computation services [8, 14, 15]."]} diff --git a/edge/graph_202676170.jsonl b/edge/graph_202676170.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e87185c7b8e7a06954ad26ea12660dd3367f01bd --- /dev/null +++ b/edge/graph_202676170.jsonl @@ -0,0 +1,13 @@ +{"3408618|6670217": ["\u2026wireless networks (Butun et al. 2014), smart grids (Liu et al. 2012; Yan et al. 2012), Internet of Things (IoT) (Weber 2010), mobile computing (La Polla et al. 2013), collaborative intrusion detection (Zhou et al. 2010a; Vasilomanolakis et al. 2015a), and, more generally, in any type of\u2026"]} +{"3408618|12017064": []} +{"3408618|17756238": ["\u2026(Miller et al. 2012), RFID chips (Weis et al. 2004), health applications (de los Angeles Cosio Leon et al. 2009), cloud computing (Zhou et al. 2010b), personalization systems (Toch et al. 2012), the Internet of Things (Ziegeldorf et al. 2014), and pervasive systems (Bettini and Riboni 2015)."]} +{"3408618|595093": []} +{"3408618|12815020": ["\u2026and solutions in diverse areas such as distributed systems (Uzunov et al. 2012; Uzunov and Fernandez 2014), cloud computing (Fernandes et al. 2014; Modi et al. 2013a, 2013b), wireless networks (Butun et al. 2014), smart grids (Liu et al. 2012; Yan et al. 2012), Internet of Things (IoT) (Weber\u2026"]} +{"3408618|206459491": ["The common goal of these attacks is twofold: modifying the hardware to access sensitive information and creating a backdoor (Tehranipoor and Koushanfar 2010) (e.g., install an invisible program in the hardware circuit) that can be used to regain access to the compromised machine."]} +{"33909610|816774": []} +{"11605910|10996225": ["Various techniques, such as autostart extensibility points, function parameter analysis, function call monitoring, information flow tracking, and instruction traces can be applied to perform dynamic analysis [Egele et al. 2012; Gandotra et al. 2014].", "Various techniques, such as autostart extensibility points, function parameter analysis, function call monitoring, information \ufb02ow tracking, and instruction traces can be applied to perform dynamic analysis [Egele et al. 2012; Gandotra et al. 2014].", "Memory dumper tools (e.g., OllyDump [2006] and LordPE [2013]) are used to obtain protected codes located in the main memory and dump them to a \ufb01le [Gandotra et al. 2014].", ", OllyDump [2006] and LordPE [2013]) are used to obtain protected codes located in the main memory and dump them to a file [Gandotra et al. 2014].", "In recent years, a few research efforts have been conducted on surveys of data-miningbased malware detection methods [Idika and Mathur 2007; Siddiqui et al. 2008; Shabtai et al. 2009; Egele et al. 2012; Mathur and Hiranwal 2013; Bazrafshan et al. 2013; Damshenas et al. 2013; Gandotra et al. 2014].", "In recent years, a few research efforts have been conducted on surveys of data-mining-based malware detection methods [Idika and Mathur 2007; Siddiqui et al. 2008; Shabtai et al. 2009; Egele et al. 2012; Mathur and Hiranwal 2013; Bazrafshan et al. 2013; Damshenas et al. 2013; Gandotra et al. 2014]."]} +{"11605910|11894197": []} +{"11605910|15986963": ["Associative Classi\ufb01er (AC): Associative Classi\ufb01er (AC) utilizes the association mining techniques to construct classi\ufb01ers [Thabtah 2007].", "Furthermore, AC classi\ufb01ers can be incrementally updated or tuned [Thabtah 2007]."]} +{"11605910|191396": ["Partitioning and Hierarchical clustering are two common types of clustering methods with different characteristics [Xu and Wunsch 2005].", "Hardy et al. [2016] DL Architecture using SAEs Based on the extracted Windows API calls, the developed deep learning framework outperformed ANN, SVM, NB, and DT in malware detection. from each other [Xu and Wunsch 2005]."]} +{"11605910|54746333": []} +{"11605910|192934": ["Feature selection is an important step in many classi\ufb01cation or prediction problems [Langley 1994; Jain et al. 2000; Kwak and Choi 2002; Murphy 2012]."]} diff --git a/edge/graph_202676291.jsonl b/edge/graph_202676291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fb2801e5890ed320b9b2a1aa0013041bee1f92c --- /dev/null +++ b/edge/graph_202676291.jsonl @@ -0,0 +1,73 @@ +{"15329590|10397481": ["It is a well researched area and there have been a variety of automated and hybrid approaches [22]."]} +{"4860310|10397481": []} +{"13941545|10397481": ["The grasp of video information towards content selection could be more natural and reliable when high-level representation is available [18,44,68].", "Recently, video summarization has drawn increasing research attention in the multimedia community, with a number of algorithms having been proposed in the literature [44,50,61]."]} +{"15693805|10397481": []} +{"15693805|16525678": []} +{"17179979|10397481": ["In the literature [10] [8], there are a lot of papers proposing efficient approaches to video summarization."]} +{"59852016|2748484": []} +{"11384576|6387482": []} +{"11384576|10397481": []} +{"11384576|2748484": ["Computational models of single- and multimodal saliency [10]\u2013[13] have been applied to emerging multimedia applications such as automatic video abstraction, summarization, indexing, and browsing [14], [15].", "An extensive survey on methods and taxonomies from the vast literature on video abstraction and summarization can be found in [18] and detailed field overviews in [15], [16]."]} +{"2692575|16403716": ["Summarization schemes based on low-level features fail to agree with human perception owing to the semantic gap between low-level features and the high-level perception capability of humans with respect to video content [16]."]} +{"2692575|10397481": ["To address this problem, video summarization schemes have been proposed that generate a concise version of a full-length video sequence by identifying the most important and pertinent content [2-5]."]} +{"8844381|10397481": []} +{"8844381|2748484": ["\u20262010 ACM 1551-6857/2010/08-ART17 $10.00 DOI 10.1145/1823746.1823751 into a range of applications, such as interactive browsing and searching systems, thereby offering the user an indispensable means of managing and effectively accessing digital video content [Lew et al. 2006; Li et al. 2006]."]} +{"7993657|10397481": ["Money and Agius [10] categorise video summaries based on three dimensions: content type (feature based, object", "[9]A.Moneyand H.Agius.", "Money and Agius [10] provide a taxonomy of video summaries and their generation techniques based on an extensive literature survey.", "While unobtrusive methods are generally preferred, they tend to be noisy and limited in the level of details [10].", "[10] A. Money and H. Agius.", "AFFECTIVE VIDEO SUMMARISATION Money and Agius [10] provide a taxonomy of video sum\u00admariesandtheirgenerationtechniquesbased \nonan extensive literature survey.", "For example, \nin Money and Agius [9], subjects were wrapped by a sensor belt around theirchest,awatch-typedevicewasput \naround awrist, and other signals were captured from several .nger tips, and .", "Money andAgius[10] categorise video summariesbased on three \ndimensions: content type (feature based, object Permission to make digital or hard copies of all or part \nof this work for personal or classroom use is granted without fee provided that copies are not made or \ndistributed for pro.t or commercial advantage and that copies bear this notice and the full citation \non the .rst page."]} +{"10397481|2748484": []} +{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]} +{"29313411|10397481": ["Unlike conventional video summarization, summarization of rush videos in TRECVID has some significant differences due to retakes in the unedited raw video sources [ 17 ], [18].", "Recent literature surveys on relevant techniques have been extensively reported in a number of sources [2], [ 17 ], [20], [36].", "These semantics provide more accurate description of objects and events at higher level, in which representative techniques include object detection, tracking and event classification [6], [8], [13], [ 17 ], [45].", "To rank segmented clips for summarization, detection of some high-level features is employed which include event detection, video object extraction, object tracking, face detection, and audio analysis [6], [14], [ 17 ], [18].", "Typically, video summarization is extracted by only using the information extracted from the video, called \u201cinternal summarization\u201d [ 17 ]."]} +{"29313411|2748484": []} +{"23602361|10397481": ["Video Summarization has been studied from multiple perspectives (see reviews [34, 61])."]} +{"641747|4361938": ["The interested reader is referred to [22], [23], [127] for eye movement studies and [24] for a breadth-first survey of eye tracking applications."]} +{"5837127|10975328": ["ral visualization (for a survey, see Silva [26])."]} +{"7022061|10397481": ["Video summarization can be categorized into static and dynamic summaries [41], [43]."]} +{"15703527|10397481": ["Interested readers can check [18, 19] for a more comprehensive summary."]} +{"16512988|3540699": []} +{"206751990|10397481": []} +{"5631604|499315": []} +{"5631604|5807554": ["These cues are mostly absent in egocentric video [10], [31], [32] and, therefore, are not available for its analysis.", "Two recent surveys [31], [32] study, respectively, the methods used to summarize sets of egocentric pictures, and the state-of-", "in the analysis in [31], [32], and [38].", "[32] review the first-person view (FPV) video summariza-"]} +{"5631604|16403716": ["Whereas TPV segmentation approaches typically try to identify the shot boundaries comparing consecutive frames, or even using the frames\u2019 time-stamp [33], [34], this methodology cannot be directly applied over FPV, since egocentric videos consist of a single shot with extremely smooth transitions between consecutive events.", "Even though the existing literature regarding non-FPV summarization is already documented [33], [34], the specific characteristics of egocentric"]} +{"5631604|10397481": ["Whereas TPV segmentation approaches typically try to identify the shot boundaries comparing consecutive frames, or even using the frames\u2019 time-stamp [33], [34], this methodology cannot be directly applied over FPV, since egocentric videos consist of a single shot with extremely smooth transitions between consecutive events.", "Even though the existing literature regarding non-FPV summarization is already documented [33], [34], the specific characteristics of egocentric"]} +{"12688539|5943294": ["\u2026signals, spontaneous visual behavior is more convenient and unobtrusive to measure, although it is susceptible to environmental noise, such as lighting conditions, occlusion, etc. Recently, Soleymani and Pantic [5] have reviewed human-centered implicit tagging on images, videos, and search results.", "Unlike their survey, which lists all work together [5], we categorize current research into three groups based on adopted modalities: physiological signals, spontaneous visual behavior, and both.", "Previous reviews of this topic include the recent work by Soleymani and Pantic [5]."]} +{"12688539|6857179": ["Since emotions are complex and subjective, a small number of discrete categories may not re\ufb02ect the subtlety and complexity of the affective states [37]."]} +{"7082026|11239740": ["Ananger and Little [4] presented a survey in video indexing, including some techniques for temporal video segmentation mainly in uncompressed domain."]} +{"52201593|13365762": ["Multimedia standards such as MPEG-4 and MPEG-7 provide important functionality for manipulation and transmission of objects and the associated metadata, but the extraction of the semantic descriptions and the multimedia content is out of the standard scope (Chang, 2001)."]} +{"10989752|2748484": ["They exploit specific properties of a video clip in a specific domain to generate a summary [16]\u2013[19], [33].", "Comprehensive reviews of previous approaches could be found in [1], [3], [4], and [19]."]} +{"35925816|10397481": ["Interested readers can check [6] and [7] for a more comprehensive summary."]} +{"19990074|10397481": ["Video summarization has been studied from multiple perspectives [34, 53]."]} +{"1576828|2748484": []} +{"15692326|10397481": ["The \nmain features of our technique are that it is fully au\u00adtomatic and leverages meta\u00addata sensor information \nwhich is acquired in conjunction with videos."]} +{"26665778|10397481": []} +{"19061148|10397481": ["Most visual features focus on color, texture, shape and motion [ 1 , 2]. Ma et al. [3] proposed a comprehensive scoring scheme called PRID (Pleasurable, Representative, Informative and Distinctive), which is computed from visual features, for content filtering in video summarization.", "Despite that there are so many visual feature-based video summarization methods, it is observed that textual [6, 7, 8] and audio [9] cues are also of great value to facilitate the summarization task [ 1 ].", "Therefore, video summarization technique, which aims at providing people a condensed substitution of the original video content with salient parts preserved, has a wide range of applications [ 1 ,2]."]} +{"11964728|10397481": ["Money and Agius [6] provide an extensive literature survey on video summarization.", "Money and Agius [12] developed a video summarization technique by analyzing user\u2019s physiological response, including electro-dermal response (EDR), respiration amplitude (RA), respiration rate (RR), blood volume pulse (BVP), and heart rate (HR)."]} +{"6918222|11239740": ["Hence, a reasonable interval for setting is [ 1 , 2].", "Reviews more concerned with indexing of video have been presented in [ 1 ], [3], and [17].", "This size can be considered as an upper bound for the support size to be estimated between and . We thus introduce the normalized ratio . Let us denote this ratio at time . is supposed to take its values in [0, 1 ]. The point now is to define an appropriate criterion to validate significative jumps of the variable among meaningless small variations."]} +{"20780812|10397481": []} +{"29215948|10397481": ["A comprehensive survey on the recent video summarization techniques can be found in [6]."]} +{"29215948|2748484": ["Various attempts were made over the past decade to automate the summarization of full length movies [21-30].", "Sub-stories from movies are detected using short-term and long-term audiovisual tempo analysis [23]."]} +{"14938932|10397481": []} +{"12936466|499315": ["Differently from the third-person approaches, egocentric vision summarization, only recently addressed by research community, requires new techniques to deal with continuous changes of observers focus and with lack of hard cuts between scenes [21], [22]."]} +{"1804165|585863": ["concentrated on comparing the computational complexity of various approaches [23].", "With the emergence of numerous SBD approaches, several excellent surveys have been presented [8], [9] [15], [21]\u2013[23]."]} +{"1804165|9835525": ["The related surveys with discussions on thresholding scheme can be found in [8], [9].", "In [8], [9], [15], [21], the performances of various approaches were evaluated.", "In [8], Lienhart identified several core techniques underlying the various SBD schemes and reviewed their roles in detecting CUTs, fades and dissolves.", "The relatively comprehensive surveys can refer to [8] and [9].", "The relatively satisfactory results have been reported in [8].", "With the emergence of numerous SBD approaches, several excellent surveys have been presented [8], [9] [15], [21]\u2013[23].", "The effectiveness of monochrome frame detection has been reported in [8], [36], and [40]."]} +{"1804165|8365617": ["Similar problems exist in the related fields, such as temporal data segmentation [63], signal segmentation [64], and image segmentation [65]."]} +{"33956349|10397481": ["This technique is helpful in the management of personal media archives as well as in the web-based business [14].", "This leads to the research challenge of adaptive video summarization or personalized summarization, which develops a summary to meet individual preference [14].", "Moreover, due to the variant composition methods, presentation patterns can hardly be shared, even if these movies are of the same film genre [14]."]} +{"33956349|2748484": ["Despite the complexity in content modeling, scenebased methods try to obtain an index of a movie by dividing it into visual scenes [12]."]} +{"17814131|10397481": ["A video of a real-time event can be summarized based on the information collected from web users worldwide who generate time-synchronized comments as the event is happening [8][9][10][11][12]."]} +{"39077227|2748484": ["In order to observe its influence on humans, we use informativeness and interrelation [14]\u2013[16] to evaluate the results.", "[16] turn to take advantage of audiovisual clues and shot-change patterns to extract dialog events."]} +{"9115655|10397481": ["The ground set has 2N subsets."]} +{"16403716|50041": ["The task of video classification [106], [245] is to find rules or"]} +{"16403716|2748484": ["as a supplement to previous surveys [39], [181] on video summarization.", "Video summarization [39], [156], [157], [181] removes the redundant data in videos and makes an abstract representation"]} +{"23335884|10397481": []} +{"23335884|2748484": []} +{"18813280|10397481": []} +{"1514006|10397481": ["With the goal of providing an efficient way to overview the large collection of videos, video summarization has attracted intensive attention over the past decade [27] [34].", "Video summarization has been tackled from various perspectives [27] [34]."]} +{"50782258|499315": ["First-Person Video Summarization Summarizing first-person videos has attracted the computer vision community in recent years [2,4,18]."]} +{"50782258|5807554": ["First-Person Video Summarization Summarizing first-person videos has attracted the computer vision community in recent years [2,4,18]."]} +{"50782258|16403716": ["ghlight the rst-person ones, while ours is able to produce satisfactory summarization results. 2. Related works Video summarization has attracted the computer vision community over the past few years [4, 14, 26]. Most existing approaches follow a basic work ow consisting of (1) visual feature extraction and (2) keyframe selection or scene segmentation which is subject to several pre-dened criteria. Forexampl"]} +{"50782258|10397481": ["ghlight the rst-person ones, while ours is able to produce satisfactory summarization results. 2. Related works Video summarization has attracted the computer vision community over the past few years [4, 14, 26]. Most existing approaches follow a basic work ow consisting of (1) visual feature extraction and (2) keyframe selection or scene segmentation which is subject to several pre-dened criteria. Forexampl"]} +{"2748484|192934": ["For this example, the meanshift algorithm [41] was applied to each feature curve to segment the movie into multiple story elements, whose boundaries are marked by vertical lines."]} +{"9748636|2748484": ["Video summaries provide the user with a short version of the video that ideally contains all important information for understanding the content, serving as a preview, an overview or a query object [6]."]} +{"12496931|10397481": []} +{"45822624|10397481": []} +{"45822624|2748484": ["Comprehensive surveys of past video summarization results can be found in (Li et al., 2006; Truong and Venkatesh, 2007; Money and Agius, 2008)."]} +{"9921540|9045232": ["Several face detection algorithms have been proposed in the literature,[14]."]} +{"30278480|10397481": ["Automatic video summarization has been extensively studied in the past two decades [6]."]} diff --git a/edge/graph_202676382.jsonl b/edge/graph_202676382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14f42148fb786b5100625f2beb8983d6f49ee68b --- /dev/null +++ b/edge/graph_202676382.jsonl @@ -0,0 +1 @@ +{"3586362|1607655": ["Safety cases can be provided in only text or also with structured graphical representations in order to more clearly show how evidence supports the main arguments about the truth of a system's safety claims [47].", "They can have an important impact, and the number of publications dealing with safety assurance and certification for different standards and domains is very small [47].", "Nonetheless, publications on SECIA and traceability related to Manual V&V Results are scarce [47], and some pairs (5\u20139) have been considerably less studied than others (1\u20134).", "The organization and respondents' roles also cover the whole value chain of safetycritical systems engineering, and we consider that USA and Europe are world leaders in safety-critical systems engineering and assurance (see e.g., [23], [32], [37], [47], [50], [55]).", "The number of publications that report insights into how practitioners deal with these activities is low [36], [47], and there is a lack of publications that study how industry addresses SECIA.", "Prior publications [36], [47] have paid little attention to the use of basic tools (e.g., Excel and Word) for impact analysis purposes, and some tools usually mentioned in the literature (e.g., JRipples) do not seem to have been adopted for safety-critical systems."]} diff --git a/edge/graph_202676686.jsonl b/edge/graph_202676686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a283bbfdc44048f1333630bb7d83c72fa007c8c7 --- /dev/null +++ b/edge/graph_202676686.jsonl @@ -0,0 +1,209 @@ +{"13514267|15545863": ["By distributing computing resources closer to users and things, the Fog computing model can be a better choice for building distributed applications [30] [11], especially for latency sensitive applications such as Smart Transportation applications [26] [8]."]} +{"159021960|37976266": ["Bibri and Krogstie (2017d) Reviewed the core enabling technologies of big data analytics and context-aware computing of smart sustainable cities."]} +{"159021960|1353379": ["The study focused on the challenges of combining IoT and big data and their e \ufb00 ect for achieving the goal of future smart cities.", "As shown, existing studies have discussed the utility of various ICTs for the development of smart city applications, such as IoT (Alam, Mehmood, Katib, Albogami, & Albeshri, 2017; Cicirelli et al., 2017), smartcards (Belanche-Gracia et al., 2015), sensors (Ang & Seng, 2016), big data analytics\u2026", "Bibri (2018b) Explored how IoT-enabled sensor-based big data applications can a \ufb00 ect the environmental sustainability, as well as related data processing platforms and computing models, of future smart sustainable cities.", "As shown, existing studies have discussed the utility of various ICTs for the development of smart city applications, such as IoT (Alam, Mehmood, Katib, Albogami, & Albeshri, 2017; Cicirelli et al., 2017), smartcards (Belanche-Gracia et al., 2015), sensors (Ang & Seng, 2016), big data analytics (Bibri & Krogstie, 2017c), security management systems (Li & Shahidehpour, 2017), geographic information systems (Aina, 2017), and virtual reality (Jamei et al., 2017).", "Using big data for smart cities inherently involves the ICT-rich nature of smart cities, such as the use of sensors throughout a city for data collection, IoT for real-time data transmission to a central server (Atzori, Iera, & Morabito, 2010), AI and cloud computing for data processing (Iyoob, Zarifoglu, & Dieker, 2013), blockchain for data security and organizational connection (Risius & Spohrer, 2017), geographic information visualization for analysis result delivery (Aina, 2017), and design of smart services for data collection and information delivery (Maglio & Lim, 2016).", "Rathore et al. (2016) Developed a four-tier architecture for smart city development and urban planning using IoT and data analytics.", "The bottom tier of the architecture is allocated for the IoT sources and data generation and collection.", "The key challenges of using IoT and big data analytics were identi \ufb01 ed, and some associated open issues were discussed.", "Cicirelli et al. (2017) Developed an IoT-based platform for a generic cyber \u2013 physical system to facilitate the design and implementation of smart city services and applications.", "Urbieta, Gonz\u00e1lez-Beltr\u00e1n, Ben Mokhtar, Anwar Hossain, and Capra (2017) Studied the modeling of IoT-based services for smart cities, which can allow mobile users to dynamically perform daily tasks.", "An analytical framework for IoT-enabled data-centric applications, which can improve the environmental sustainability of smart sustainable cities, was developed.", "D\u00edaz-D\u00edaz et al. (2017) Studied the business models of IoT and other technologies in smart cities by focusing on eight urban services provided in the city of Santander.", "This study established how IoT can contribute to reduced costs and energy consumption, how data can be managed, and how citizens can be incentivized in the services."]} +{"4885356|206578224": ["A detailed survey of the enabling technologies is provided in [24]; we summarize the most", "An MEC platform can also be deployed as a gateway in indoor environments and provide services including augmented reality, building management and social network applications [24]."]} +{"4885356|6909107": ["and functionality [22]\u2013[24]."]} +{"4885356|206578365": []} +{"4885356|469744": ["and reliability constraints for immersive applications, such as virtual and augmented reality [41], [42]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"52197660|6909107": ["I. INTRODUCTION\nMOBILE edge computing (MEC) [1] has emerged asa promising technology to address the problems in cloud computing, including data throughput, capacity, and security.", "This section presents the numerical evaluation of the optimal pricing scheme for energy efficient MEC offloading in OFDMA environment, to analyze policies in terms of the MUs\u2019 behavior under the Stackelberg competition when the leasing cost of an edge cloud resource varies.", "In this section, a system model for the resource allocation mechanism of a MECO system with OFDMA is described in detail, as illustrated in Fig.", "In this regard, there have been several studies on how to design an energy efficient multiuser MECO system, see e.g., [1].", "The first and the second derivative of R(wF ) is not difficult,\nAlgorithm 1 Energy Efficient Optimal Pricing Algorithm for MEC System with OFDMA\nInput : System Parameters: (M, H, L, Ck , Pk, F, \u03b1k) 01: D\u0303 = SortDesc (D) \u222a {0} = {d\u0303k | d\u0303j d\u0303j\u22121,\u2200j \u2208 I2N} 02: V = {vk = [d\u0303k, d\u0303k\u22121) | \u2200k \u2208 I2N} 03: For vi,\u2200i \u2208 I2N : 04: If\nN k=1 F \u2217 k (d\u0303i\u22121) \u2265 F :\n05: break 06: ElseIf\nN k=1 F \u2217 k (d\u0303i) \u2265 F & N k=1 F \u2217 k (d\u0303i\u22121) F\n07: d\u0303i = wF : B\u0304TCk\nln2 ln\nB\u0304Ckh 2 k(Pk\u2212\u03b1kwF ) N0ln2 \u2212 F = 0\n08: EndIf 09: While 10: wF,prev = wF,cur 11: dwF = N k=1 Ak(wF,prev) 12: wF,cur = wF,prev \u2212 \u03b3dwF 13: EndWhile 14: EndFor 15: w\u2217F = argmaxwF N k=1 wF F \u2217 k (wF ) Output : Optimal price of the edge cloud w\u2217F , result of offload decision making for each MUs F \u2217k\nbut not presented due to page limits.", "In [6], an online joint radio and computational resource management algorithm for multi-user MECO systems was proposed, with the objective of minimizing the long-term average weighted sum power consumption of the mobile devices and the MEC server, subject to a task buffer stability constraint.", "In this letter, we considered a single-cloud-multi-user MECO system with OFDMA and proposed an optimal pricing scheme to consider each MUs\u2019 needs for resources.", "For the performance comparison, we took the average of two performance metrics over 500 randomly generated MECO systems as we increased the number of MUs.", "MEC allows much of the work to be handled at the edge, physically located closer to the terminal than to the cloud data center.", "In particular, the mobile edge computation offloading (MECO) system has been introduced to reduce the energy consumption of mobile devices by sending intensive computational workloads to neighboring MEC servers.", "MOBILE edge computing (MEC) [1] has emerged as a promising technology to address the problems in cloud computing, including data throughput, capacity, and security."]} +{"38730704|3330461": ["Multicast D2D transmissions have already been standardized by 3GPP, whereas unicast transmissions so far have only received attention from the scientific community [13], [14]."]} +{"46898558|31355144": []} +{"49566175|6909107": ["MEC, a key technology toward 5G, provides cloud computing capabilities and task offloading service at the edge of mobile networks [12]."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"5039874|3757239": ["work infrastructure [28]."]} +{"5039874|206578365": ["Therefore, the traditional cloud computing cannot efficiently support the IoE-based application services [10], and the edge computing arises at the historic moment [11], [12] to adapt to the era of IoE."]} +{"5039874|3767252": []} +{"5039874|3042864": ["Previous work such as micro data center, [19], [20], mobile cloud computing [13], [14], fog computing [15], [16], cloudlet [21], and cloud-sea computing [22] have been introduced to reduce the storage and computation load in cloud computing.", "At present, some related paradigms, such as mobile cloud computing [13], [14], fog computing [15]\u2013[18], which is the predecessor or counterparts of edge computing, can provide the efficient solutions for massive data processing, and meanwhile improve the user experience."]} +{"52121043|10299098": ["cache-enabled cloud-radio access networks (C-RANs) and fog-radio access networks (F-RANs) [37], [38]."]} +{"52121043|19938676": [", the fifth generation (5G) networks [2],"]} +{"52121043|3330461": ["Compared with traditional D2D communication networks [112], [113], more D2D links can be activated if the content can be properly cached at user equipment [49], [50], [114], [115]."]} +{"52121043|9104850": ["Caching techniques have been comprehensively studied for Web caching [16], [17], content distribution networking (CDN) [18] and information centric networking (ICN) [19]\u2013[23] in wired networks.", "In the early 1990s, network congestion was precipitated by excessive delivery of Web pages and images, and significantly reduced by Web caching techniques that temporally store the popular files at clients\u2019 computers or proxy servers [16], [24]."]} +{"4875581|627405": ["Second, if we cannot decide based on the title, we evaluate abstract and conclusion (as proposed by Brereton [6])."]} +{"12323572|7644489": ["It is an exciting and innovative feature of the next generation cellular networks allowing traf\ufb01c through any network infrastructure, which provides interconnections between the critical public safety network, the ubiquitous commercial network, and the users [Lin et al. 2014]."]} +{"52115960|4577512": []} +{"52115960|2769147": ["This paper presents an update on our previous work [1] presented at the Internet Technologies and Applications Conference in 2015 (Wrexham, UK) by extending the survey duration to reflect the current technological advances since 2015."]} +{"6669015|10299098": ["Although cloud computing enables convenient access to a centralized pool of con gurable and powerful computing resources, it often cannot meet the stringent requirements of latency-sensitive applications due to the often unpredictable network latency and expensive bandwidth [14, 25].", "The computation energy consumption for each task processed at SBS i is proportional to the square of the CPU speed (fi ) 2, presented as e i = \u03ba(fi ) 2, where \u03ba is a constant depending on the CPU architecture [14]."]} +{"6669015|206578365": []} +{"68215796|18750590": ["For these reasons, dynamic sharing of infrastructure resources is a more attractive alternative where virtual operators or tenants can negotiate resource allocation based on the needs following traffic and channel fluctuations [5], [10].", "can then share resources with other operators and decrease costs [5]."]} +{"68215796|10342730": ["In order to assign resources to slices efficiently, the channel conditions, traffic characteristics and variations, and service heterogeneity must be considered [11]."]} +{"52911444|21713386": []} +{"53885090|29859741": ["Several solutions have been provided by researchers to standardize and store health data [13]."]} +{"53885090|6909107": [", fog, edge, and cloudlets) [8][9][3], no study has examined all of the previously mentioned edge computing paradigms in terms of IoT."]} +{"3473859|6909107": ["Therefore, it is possible to run the highly demanding applications at the user equipments while meeting strict delay requirements [2]."]} +{"3473859|206578365": ["INTRODUCTION In recent years, mobile edge computing (MEC) has been considered as a promising technology to support the next generation Internet, such as Tactile Internet, Internet of Things (IoT), and Internet of Me, by migrating the mobile computing, network control and storage to the network edges [1]."]} +{"49186407|206578224": ["recently, first surveys have been published to present comprehensive panoramas of the use cases, architectures and challenges [12]\u2013[14]."]} +{"49186407|6909107": []} +{"49186407|206578365": ["recently, first surveys have been published to present comprehensive panoramas of the use cases, architectures and challenges [12]\u2013[14]."]} +{"49186407|26429034": []} +{"7617670|10299098": ["Moreover, through mobile edge computation offloading (MECO), the energy consumption of mobile devices can be also reduced by offloading intensive computation workload to the proximate MEC server for execution [5]."]} +{"7617670|206578365": ["Moreover, through mobile edge computation offloading (MECO), the energy consumption of mobile devices can be also reduced by offloading intensive computation workload to the proximate MEC server for execution [5]."]} +{"48352801|2134031": ["[26] investigate robustness, security, and privacy issues in location-based services for IoT."]} +{"48352801|2332366": ["[24] present the security challenges of cloud-assisted IoT-based supervisory control and data acquisition systems and also provide the existing best practices and recommendations for improving andmaintaining the system security."]} +{"25999079|9978124": ["To this extent a six Degree of Freedom (6DoF) pose consisting of the camera position and orientation in a reference coordinate system is estimated [11]."]} +{"25999079|469744": ["A couple of those AR Remote Live Support applications have already been implemented, but most of them do not make use of a proper tracking method, so the annotations made by the remote expert are not registered correctly in 3D according to Azumas initial definition of AR [7]."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"56719449|17485266": ["Among them, based on the performance comparison of the various optimizers in [34], we choose ADAM [35], which provides better performance than the others."]} +{"4136520|10299098": []} +{"207581163|264691": ["According to the description of Section 3, we can predict the content popularity, and the instantaneous popularity follows the Zipf distribution [31]."]} +{"52124951|25374274": []} +{"52124951|8523192": []} +{"52124951|17694107": []} +{"52124951|3767252": []} +{"52184272|52248423": ["Standardization: the interoperability between the different IoT solutions call for well-defined IoT .", "IoT Standardization [44-48] The standardization efforts in the IoT domain are reviewed.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|29859741": ["Additionally, other innovative applications (e.g. healthcare, smart cars, etc.) will benefit from the fog computing emergence [126, 127]."]} +{"52184272|3757239": ["More recently, MEC solutions have been proposed in the 5G domain [135-137]."]} +{"52184272|6909107": ["Additionally, computation offloading is one of the main MEC challenges having processing and memory limitations [140-143]."]} +{"52184272|206578365": []} +{"52184272|8523192": ["Other issues are also encountered in the fog domain such as security and privacy, provisioning and resource management, offloading, charging and accounting, and QoS guarantees in terms of capacity, storage, bandwidth, connectivity, and reliability [130-133]."]} +{"52184272|9495329": ["SDN application in IoT [49-54] The SDN application at different IoT levels are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|1442447": ["SDN application in IoT [49-54] The SDN application at different IoT levels are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|31860478": ["In [122], the authors shed light on the relation between fog and cloud.", "\"Why Fog and Why Now?\u2016 delay, cognition, agility, and efficiency are defined to be the main reasons for the fog invocation [122]."]} +{"52184272|14315321": ["IoT frameworks [32-37] The different proposed IoT frameworks are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|2769147": ["Accordingly, it is important to show the distinction between these concepts in the aim to solve their specific problems and to allow their realization in the near future [78]."]} +{"49189466|206578365": ["One of the greatest advantages of cloud computing is the ability to deliver elastic computing power and storage, because of the vast resources of the clouds, which can satisfy the needs of resource-constrained end-user devices [9]."]} +{"44099697|3975105": ["The work done in [37] concludes that the wireless sensor and actuator networks based on Edge computing are experiencing fast development and opportunities in the post-Cloud era, and are used in more and more applications."]} +{"21073761|485843": ["\u2022 Geo-distribution: Power generators, energy transformers and distribution networks form the infrastructure of the smart grid [31]."]} +{"21073761|121289": ["Using such two-way communication, Advanced Metering Infrastructure (AMI) ensures delivery of a reliable, secure and cost-effective service throughout the system [14]."]} +{"4712196|14046529": []} +{"49364253|8909218": ["Moreover, microwave backhauls may pessimistically weaken the throughput gain fetched by the network densification [11]."]} +{"44583059|21930333": ["As one of the most popular and ef\ufb01cient energy saving schemes [17,18], BS sleeping has been proposed and widely studied to realize substantial energy saving in cellular networks [19\u201322]."]} +{"44583059|3767252": ["Recently, Mobile Edge Computing (MEC) [4,5] has been introduced as an emerging paradigm enabling a capillary distribution of cloud storage capabilities to the edge of the cellular radio access network (RAN)."]} +{"44086083|206578224": ["To address the challenge of timely offloading computation-intensive task, the mobile edge computing was proposed [15], [16]."]} +{"44086083|206578365": ["We adopt a widely used task model (see [16], [18], [44]) to describe task Qi, i."]} +{"52902867|3757239": ["There are many different derivations of edge computing, including MEC, fog computing and cloudlet [11]."]} +{"4872238|206456479": ["In [5], the interested reader may find a nice overview of the latest research proposals."]} +{"3448138|6583734": ["We can also find that the MA of [50] is 0.", "In SD-NFV, the underlying SDN infrastructure is abstracted to realize virtualized network paths that provide connectivity to support the inter-connection between Virtual Network Functions (VNF) and with the end-points.", "In our DLCPP, the simulation results confirm that it is sufficiently accurate to set r \u2032s value to 1.", "Thus, considering the overhead of SDN incurred by DLCPP, [50] is selected as the default configuration of the hidden layer in this paper.", "Function Virtualization (SD-NFV) [50] to perform this function when DLCPP is deployed on the real network.", "As shown as Figure 14, we can employ Software-Defined Network\nVOLUME 6, 2018 5087\nFunction Virtualization (SD-NFV) [50] to perform this function when DLCPP is deployed on the real network.", "We also find that the AR model gradually becomes closer to NN when slot times rise, and the AR model exceeds NN when slot time increases to 80(k = 16).\nc: EFFECT OF NODE NUMBER AT INPUT LAYER (SPATIAL DIMENSION n) For DLCPP, it is easy to understand that a larger n (input layer\u2019s node number) can collect more information; thus, DLCPP\u2019s prediction is better. n is a spatial dimension of input for DLCPP.", "We select some nodes within it to build the DLCPP,\nVOLUME 6, 2018 5081\nand the DLCPP\u2019s prediction output is sent to the controller.", "However, as shown in Section IV, benefiting from the greater prediction accuracy of DLCPP, CPC obtains a satisfactory performance gain even with this simple method.", "For DLCPP, there are two types of overhead: communication and computation.", "NN is also inferior to DLCPP, which could possibly be because the structure of NN is so simple that NN cannot capture rich features among network nodes; more importantly, NN cannot handle and utilize spatial information among nodes."]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"10814272|3767252": []} +{"4017847|10299098": ["Its main feature is to harvest the vast amount of the idle computation power and storage space distributed at the network edges to perform computationintensive and latency-critical tasks at mobile devices [2]."]} +{"4017847|206578365": []} +{"21657281|3757239": ["Recently, mobile-edge computing (MEC), which can provide cloud computing capabilities in close proximity to the mobile users, has been proposed as a key technique toward 5G [9], [10]."]} +{"57379928|3348390": []} +{"117689368|21386749": []} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"12241599|6909107": ["ployment of computation to meet user demands while balancing the associated costs has been identified as one of the open issues for edge computing [16]."]} +{"84186969|52059869": ["Several schemes are compared in the simulations: DF (Dedicated Frequency) in which the bandwidth is hard partitioned into subbands and each slice can only use the resources within its allocated subband, NVS [7], EDF_Basic, EDF_ReplenishX (X is the replenishing limit of the uRLLC slice.", "For CN slicing, throughput can be controlled in a relatively precise way given fixed and comparatively larger link bandwidth using Software Defined Networking (SDN) and Network Functions Virtualization (NFV) [6], [7], however supporting uRLLC is still challenging."]} +{"13958303|17024419": []} +{"26974550|19938676": []} +{"39245183|1932843": []} +{"39245183|8914588": []} +{"39245183|1708582": []} +{"4719062|14046529": ["The significance of a taxonomy for auto-scaling techniques used by cloud-based applications has been discussed in many research works [3, 4, 5]."]} +{"56894343|3042864": ["Mobile cloud computing allows mobile devicespartially or completely transmit local computing tasks to the cloud server for implementation, resolving the resource shortage problem of the mobile device, and saving energy consumption by executing task locally [2]."]} +{"196065645|31245252": []} +{"196065645|6909107": []} +{"196065645|206578365": []} +{"196065645|9495329": []} +{"18453286|10299098": ["To our best knowledge, the conference version of this paper [23] was the first to study resource management for energy harvesting MEC servers (see related discussions in a recent comprehensive survey paper [12]).", "substantially less energy than the conventional cloud megascale data center [12].", "offload a user\u2019s workload from its device to the edge system or cloud (see [12] and references therein)."]} +{"18453286|206578365": []} +{"18453286|3055684": ["and/or solar radiation is embraced as a major or even sole power supply for edge systems in the field, thanks to the recent advancements of energy harvesting techniques [8], [9].", "energy, such as solar radiation and wind energy, has recently emerged as a viable and promising power source for various IT systems thanks to the recent advancement of energy harvesting techniques [8], [9]."]} +{"18453286|12060835": ["and/or solar radiation is embraced as a major or even sole power supply for edge systems in the field, thanks to the recent advancements of energy harvesting techniques [8], [9].", "energy, such as solar radiation and wind energy, has recently emerged as a viable and promising power source for various IT systems thanks to the recent advancement of energy harvesting techniques [8], [9]."]} +{"4271602|206578365": [", binary and partial computation offloading [12].", "On the other hand, a recent technology innovation named mobile edge computing (MEC) is proposed as a cost-effective method to enhance the computing capability of wireless devices [11], [12]."]} +{"4271602|3504276": ["Recently, radio frequency (RF) based wireless power transfer (WPT) has emerged as an effective solution to the finite battery capacity problem [2]\u2013[4]."]} +{"4271602|12029139": []} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"44134457|206578486": []} +{"53226541|3042864": [", smartphones, tablet-PCs and wearable devices) to satisfy the rapidly growing demand of computationintensive applications through remote cloud data centers [1]."]} +{"67867352|49574823": ["Any claim process can be catered by incorporating medical facilities, government agencies, smart contracts, and IoT data with the assistance of AI and would allow automatic payouts to different beneficiaries [12].", "The advantage of Blockchain is that it has the potential to eliminate faults and errors as well as detect fraudulent activity associated with falsified IoT data [4], [5], [10]\u2013[12], [19]\u2013[21].", "Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]."]} +{"67867352|4880047": ["Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]."]} +{"67867352|3434731": ["For example, recent medical equipment, such as CT Scan machine, has embedded IoT devices that enable data processing locally and upload the results to Blockchain and off-chain nodes running at the nearby edge [3], [7], [9], [22], [24], [28], [31].", "Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]."]} +{"3400490|206578365": ["These task parameters can be acquired by the program profilers [3].", "To overcome this issue, mobile edge computing (MEC) was recently proposed, which distributes the computation capacity to the network edge [2], [3].", "By offloading mobile applications from devices to the edge servers, the device energy consumption and task execution latency can be greatly decreased compared to conventional mobile cloud computing systems, where the computational resources are deployed at remote data centers [3]."]} +{"4105704|10299098": ["task offloading models [17]: binary offloading [18], [19] and partial offloading [20]\u2013[22]."]} +{"3957662|206578486": []} +{"3957662|6909107": []} +{"3957662|206578365": ["ications Standards Institute (ETSI) standardization group working on Multiaccess Edge Computing3. Current standardization efforts coming from the ETSI group have been reviewed in detail by Mao et al. [34] and Mach et al. [33]. Mao et al. [34] also present edge standardization efforts within the 5G standard. Therefore, current research on edge computing is using several different architectures and ther", "surveyed articles, i.e. for satisfying functionality in an application. There are numerous articles in the literature providing an overview of edge applications, including [6], [7], [10], [23], [27], [34], [41], [89]. Such applications range over augmented reality, connected vehicles, disaster recovery, and a lot of others. When looking at the different applications used in the surveyed articles prese", "esource management for of\ufb02oading at the edge focus on an end device perspective [30], [31], on the resource allocation part of resource management [32], [33] or on a single-user/multiuser perspective [34]. We aim to complement those surveys by providing a more comprehensive perspective. That is, (a) we consider allocation as one among \ufb01ve resource management objective, (b) we consider edge resources i"]} +{"3957662|10299098": ["o the best of our knowledge, existing surveys about resource management for of\ufb02oading at the edge focus on an end device perspective [30], [31], on the resource allocation part of resource management [32], [33] or on a single-user/multiuser perspective [34]. We aim to complement those surveys by providing a more comprehensive perspective. That is, (a) we consider allocation as one among \ufb01ve resource m"]} +{"3957662|8523192": ["The existing surveys about resources either consider it at a high level [28] or consider only resource/service provisioning metrics [29]."]} +{"3957662|3767252": []} +{"3957662|17787193": []} +{"24596784|64404": ["In each case, the selected spherical content is first mapped onto a 2D plane [22] and then encoded using traditional video compression [23]."]} +{"53278315|206578365": ["caching parts of computation results that are likely to be reused by others can further boost the computation performance of the entire system [11].", "Many emerging mobile applications involve intensive computation based on data analytics, thus caching parts of computation results that are likely to be reused by others can further boost the computation performance of the entire MEC system [11]."]} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"44159318|3119314": []} +{"206717171|1598350": []} +{"3497211|28209458": ["Moreover, the conventional protocols suffer from the security issues such as identity protection, impersonation, and denial of service (DoS) attack [17]."]} +{"3497211|21386749": []} +{"46935064|46973566": []} +{"46935064|4625011": ["IAR can work together with IIoT to show the information collected from sensors scattered throughout the shipyard [48].", "Both software and hardware are key in IAR applications [48]."]} +{"46935064|31216129": ["0 is aimed at changing the way modern factories operate thanks to the application of some of the latest technologies associated with the Industrial Internet of Things (IIoT) [1], Big Data [2] or robotics [3]."]} +{"46935064|3579945": ["0 is aimed at changing the way modern factories operate thanks to the application of some of the latest technologies associated with the Industrial Internet of Things (IIoT) [1], Big Data [2] or robotics [3]."]} +{"46935064|13991708": []} +{"46935064|469744": ["One of such technologies is Augmented Reality (AR), which, although it is based on different pioneering works performed in the 1960s [10,11], it was not until the late 1990s that it was actually pushed by academia [12] and by the industry (in this latter case, thanks to the support of the German government [13,14])."]} +{"52059869|206578224": ["[8] focus on how Multi-access Edge Computing", "intelligence and control as advocated by [8] and [93]."]} +{"52059869|206456479": []} +{"52059869|25911553": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|10342730": ["To the best knowledge of the authors, there are no detailed surveys on the topic of network slicing in the literature, except those presented in [6], [7], [9].", "Likewise, in [7], the authors describe how wireless network resources can be adequately allocated to network slices without the resources of one slice negatively impacting the quality of others and with a focus on the Radio Access Net-"]} +{"52059869|6583734": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|11414835": []} +{"52059869|12017064": ["Security concerns in virtual or cloud platforms are well determined [167], [168]."]} +{"52059869|4269723": ["SDN provides key characteristics such as flexibility, service-oriented adaptation, scalability, and robustness [72], which are essential for"]} +{"52006347|49574823": ["\u2026systems are also distributed, since they process some information locally but also cooperate with other systems to perform certain actions (e.g., this is the case of some peer-to-peer or blockchain-based systems [31]), so a distributed system can also be decentralized in some applications."]} +{"52006347|46973566": ["Among these technologies, some of the latest make use of Wireless Sensor Networks (WSNs), which have been applied successfully to \ufb01elds like train monitoring [9], telemetry [10,11], Industry 4.0 [12\u201315] or public safety [16,17]."]} +{"52006347|4625011": ["Such a \ufb01eld has progressed remarkably in the last decade, introducing new technologies like Augmented Reality (AR) [1,2], and evolving from systems composed by passive objects that react according to the user\u2019s input, to systems based on autonomous sources of information that interact with the\u2026"]} +{"52006347|3579945": ["Among these technologies, some of the latest make use of Wireless Sensor Networks (WSNs), which have been applied successfully to \ufb01elds like train monitoring [9], telemetry [10,11], Industry 4.0 [12\u201315] or public safety [16,17]."]} +{"52006347|13991708": ["Among these technologies, some of the latest make use of Wireless Sensor Networks (WSNs), which have been applied successfully to \ufb01elds like train monitoring [9], telemetry [10,11], Industry 4.0 [12\u201315] or public safety [16,17]."]} +{"86399908|18125683": []} +{"86399908|18269383": []} +{"51880606|763939": ["We select Manhattan grid model as vehicle mobility model in the proposed network architecture [9], [11]."]} +{"3818445|31245252": ["For example, in [2], a resource allocation scheme and satisfaction function were proposed to handle the IoT storage issue.", "There are a number of schemes related to storage balancing in [2] and [80]\u2013[82].", "Smart systems necessarily interweave network communication technologies with sensors and actuators to realize system awareness and subsequent remote control, and can be seen as an extension of IoT technologies [2], [3].", "Notice that sensing data from IoT systems is stored at edge nodes, which can be more vulnerable than cloud servers [2], [49]."]} +{"3818445|6909107": []} +{"3818445|206578365": []} +{"3818445|595093": ["electricity grid [6], [7], smart city [8]\u2013[10], etc."]} +{"3818445|7800459": ["There are several available measurement schemes [82]\u2013[84] proposed to handle this issue."]} +{"206578486|206578224": ["Reference [45] provides a survey of MEC."]} +{"206578486|6909107": [" data centers, using technologies such as OpenStack and ONOS [34]. Let us also stress that a few surveys that discuss mobile edge computing at large have been published in the very recent past (e.g., [35]). A. Cyber Foraging Cyber foraging is among the first concepts for edge computing but has now been superseded by more recent concepts such a cloudlet, MEC, and fog. We discuss it here because of its "]} +{"206578486|26429034": ["Such a characterization can be achieved through the analysis of corresponding real-world traces, through machine learning techniques [151], [158]."]} +{"206578486|7329149": ["For instance, Industrial IoT solutions [159] usually require low-latency ingestion but immediate processing of data [160]."]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"25293028|3042864": ["1The program profiler monitors the program parameters, for instance, execution time, acquired memory, thread CPU time, number of instructions, and method calls [2].", "demand of resource-intensive applications [2]."]} +{"115674943|1520906": []} +{"115674943|44461432": []} +{"115674943|21386749": []} +{"115674943|7329149": []} +{"115674943|3348390": []} +{"27779660|76603": ["From the communications perspective, to tackle the challenges of mobile coverage optimization, the research [9] has shown that mobility of aerial nodes can increase the throughput, wireless coverage, and other network performance [10]."]} +{"13600738|12675271": ["[54] analyzed the benefits of fog computing for ICT based sustainable cities and identifies that process of knowledge discovery in data management is required for an attention of researchers."]} +{"13600738|154032": ["Therefore, CDCs need to provide cloud services with a minimum carbon footprint and minimum heat release in the form of greenhouse gas emissions [71, 136]."]} +{"13600738|17675973": ["However, these applications are facing high delay and response times because computing systems need to transfer data to the cloud and then from the cloud to an application, which affects the sustainability of cloud computing [2, 24, 137].", "Many mechanisms have been proposed to improve the energy efficiency of disk drives [2].", "To ensure the availability and reliability of services, the components of CDCs\u2014such as network devices, storage devices, and servers\u2014should be run 24/7 [2].", "In sustainable cloud computing, the CDCs are powered by renewable energy resources by replacing the conventional fossil fuel-based grid electricity or brown energy to effectively reduce carbon emissions [2]."]} +{"13600738|34219341": ["There are basically two types of architectures: centralized and decentralized [46, 55, 58, 137].", "Cloud providers such as Google, Amazon, IBM, Facebook, and Microsoft are using more green energy resources instead of grid electricity [31, 58].", "There are five main types of QoS parameters for sustainable computing as identified from the literature [20, 33, 39, 58, 59, 77], such as execution cost, time, energy consumption, security, and throughput."]} +{"13600738|193574": ["Location-aware ideal climatic conditions are needed for an efficient implementation of free cooling and renewable energy production techniques [47, 57, 91]."]} +{"64145649|12029139": []} +{"158714473|27410217": ["In this topic, cloud frameworks and middleware technologies are set as a platform for communication with the cloud layer and among devices with different interfaces, operating systems, and architectures [26,27]."]} +{"158714473|31245252": []} +{"158714473|2680573": ["KNN is one of the most common methods in machine learning systems [50]."]} +{"52153021|9651858": ["The necessity for implementing green communication has been recognized by the research groups and the industrial assemblies worldwide [5], [6]."]} +{"52153021|10979806": ["In [2], four approaches are described which can be useful in improving EE, these are, Resource Allocation (RA), deployment and planning, hardware solutions and Energy Harvesting (EH).", ", but for the last decade EE has appeared as a new prominent figure of merit, as concerns about economy, operational costs and environmental effects has emerged [2]\u2013[4]."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"55804948|2373140": ["Despite intensive research on EV routing [10, 11], the travel time of ambulances depends heavily on the"]} +{"55804948|7128700": []} diff --git a/edge/graph_202676786.jsonl b/edge/graph_202676786.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e283e8b986fc84591348244b027e5d87de506b6 --- /dev/null +++ b/edge/graph_202676786.jsonl @@ -0,0 +1 @@ +{"9571649|17887301": []} diff --git a/edge/graph_202686379.jsonl b/edge/graph_202686379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..330ad24c5710b91b2e46271685633e804669cef9 --- /dev/null +++ b/edge/graph_202686379.jsonl @@ -0,0 +1,7 @@ +{"15532331|5664472": ["Some of these studies are focused on using body-worn sensors [2], [3] or smartphones [4] while most literature can be found in the computer vision field [5], [6]."]} +{"45634698|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"1284057|763939": ["However, according to [79], the authors classified vehicular mobility model into a) Synthetic", "4 shows the taxonomy of vehicular mobility models proposed in [79].", "Interested readers may refer [79] for a more detailed survey of vehicular mobility models."]} +{"207233105|763939": ["The special case of vehicular mobility is addressed by the survey in H\u00a8arri et al. [2009], which summarizes models used in vehicular ad-hoc network (VANET) simulators.", "The validation reference may be real observations (e.g., an additional data set not used for model building) or another already validated mobility model [H\u00a8arri et al. 2009]."]} +{"49664604|4915696": ["While various computer vision-based approaches are proposed [17], these approaches may compromise personal privacy.", "Computer vision-based approaches [11][17][21][12] perform classification based on the features learned from images or videos to detect people."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} diff --git a/edge/graph_202687519.jsonl b/edge/graph_202687519.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e64b71e10dc29527f4fe44448e14be1639e4df42 --- /dev/null +++ b/edge/graph_202687519.jsonl @@ -0,0 +1,7 @@ +{"14076895|8530790": ["Scha er's functions F1, F2, and F3, and Fonseca's f1 [6], renamed here as F4.", "Four of the test problems have been used by several researchers previously ([2, 11, 10, 6, 19]), and the fth is a new problem devised by us as a further hard challenge to nd diverse Pareto optima.", "1 Introduction Multiobjective optimisation using genetic algorithms has been investigated by many authors in recent years [2, 6, 7, 10, 11, 17, 19, 20]."]} +{"35740862|19632381": []} +{"199058211|7423713": []} +{"34563682|16186842": ["Fa ha d an d N ad ee m [3] 20 08 S ur ve y \u2014"]} +{"7107147|8296351": ["Feature models can be extended with additional information by means of feature attributes, these are called attributed or extended feature models [6].", "A feature model defines all the possible configurations of a system or family of related systems [6, 40].", "Feature models can be automatically analysed to extract all its possible configurations or to determine whether a given configuration is valid (it fulfils all the constraints of the model), among other analysis operations [6]."]} +{"14683957|8296351": ["Software Product Line Engineering (SPLE) refers to a systematic framework including a collection of methodologies, tools and techniques with the aim of designing and developing a family of similar products in a cost-effective manner [1][2]."]} +{"17367491|8530790": []} diff --git a/edge/graph_202688981.jsonl b/edge/graph_202688981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b34eb99ccc83d4df5c69699dae002785f0d12e4 --- /dev/null +++ b/edge/graph_202688981.jsonl @@ -0,0 +1,9 @@ +{"4625968|2357830": []} +{"110011033|1230643": []} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"3182419|2906926": []} +{"3182419|2357830": []} +{"135450022|3055684": ["To overcome the limitations of batteries, techniques include harvesting ambient energy to either recharge the battery or even to directly power specific electrical loads using solar, kinetic, radio frequency, or thermal energy harvesting [7,8]."]} +{"135450022|12029139": ["The RFEH system uses magnetic resonance coupling wireless power transfer (WPT), in which the antennas have the same resonant coupling based on the resonance circuits and near-field magnetic coupling concepts [9,10], for wireless energy transfer."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} diff --git a/edge/graph_202698404.jsonl b/edge/graph_202698404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba9624bf363be2557fdd8bfce4a99bee8c65fb41 --- /dev/null +++ b/edge/graph_202698404.jsonl @@ -0,0 +1 @@ +{"2229234|4570087": ["[55] provides a comprehensive overview of the popular methods in this field."]} diff --git a/edge/graph_202698479.jsonl b/edge/graph_202698479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202699216.jsonl b/edge/graph_202699216.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b00b99dea7b52f28dd0c667d76b3f81b55b71b1 --- /dev/null +++ b/edge/graph_202699216.jsonl @@ -0,0 +1 @@ +{"123022412|5660618": ["Data dropout is an important issue in the industrial control system, especially in networked control systems (NCSs) [22, 23 ] . Compared with the traditional point-to-"]} diff --git a/edge/graph_202699300.jsonl b/edge/graph_202699300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202699302.jsonl b/edge/graph_202699302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bf836a139fe9707b1ecc56a084fa2df128eb08d --- /dev/null +++ b/edge/graph_202699302.jsonl @@ -0,0 +1,127 @@ +{"53885090|29859741": ["Several solutions have been provided by researchers to standardize and store health data [13]."]} +{"53885090|6909107": [", fog, edge, and cloudlets) [8][9][3], no study has examined all of the previously mentioned edge computing paradigms in terms of IoT."]} +{"4866120|10235514": ["ited set of terminals, which are active according to patterns typically speci\ufb01ed by outside events, such as alarms. While there has been a signi\ufb01cant research on how to design each individual service [3]\u2013[5], mechanisms to support more than one service within a 5G wireless systems have only recently started to be addressed, see [6], [7]. In order to understand the scope of the problem, we describe be"]} +{"49557456|8323234": []} +{"21482398|4395259": ["order to ensure the ability of the intended user to perform successful data decoding, while preventing eavesdroppers from doing so [2], [4].", "The secrecy outage probability can be further defined as [2]", "To cope with this, key-less physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches [2], [3]."]} +{"86496553|21685661": []} +{"86496553|16654832": ["According to [44], due to constrained resources, individual vehicles are not able to meet huge computation demands."]} +{"86496553|1113420": []} +{"21705502|52059869": []} +{"21705502|206578224": ["In addition to MEC integration technologies like SDN, NFV, and network slicing discussed in [4], we consider ICN in", "Furthermore, in our previous survey [4], we discuss the role of MEC in 5G network edge cloud architecture and orchestration.", "As summarized in [4], the three key benefits of the collaboration between IoT and MEC are: 1) lowering the amount of traffic passing through the infrastructure; 2) reducing the latency for applications and services; and 3) scaling network services diversely."]} +{"21705502|3757239": ["1) Requirements: Computation offloading is the most prominent and widely discussed feature of MEC that empowers resource-constrained IoT devices with augmented computational capabilities [29], [33]."]} +{"21705502|31245252": ["Few other papers are focused on the combined aspects of IoT research and their potential application scenarios [7], [18]\u2013[20]."]} +{"21705502|6909107": ["2) Related Work: Several mobility management policies have been proposed for the MEC architecture [29], [133]\u2013[135].", "In addition to the literature mentioned in [29], Table X summarizes the reviewed state-of-the-art mobility management in MEC enabled IoT.", "in [29], the existing work that addresses MEC computation offloading decisions have been nicely summarized based on full and partial offloading types.", "Moreover, [29] provides an overview of the latest research works that address", "in scenarios where the UEs mobility is confined within a given space such as an office room [29], [136], [137].", "Mach and Becvar [29] presented a user-oriented use case of MEC from the perspective of computational offloading and", "1) Requirements: Computation offloading is the most prominent and widely discussed feature of MEC that empowers resource-constrained IoT devices with augmented computational capabilities [29], [33].", "capabilities, or cloud capabilities, and availability [29]."]} +{"21705502|206578365": ["out in [32], the task models for partial offloading can be represented by task-call graphs with sequential, parallel, and general dependencies.", ", task model for binary offloading) [32].", "The inherent challenges with wireless communication channels like multi-path fading, interference, and spectrum shortage should always be taken into account for the design of MEC systems to seamlessly integrate computation offloading and radio resource management [32]."]} +{"21705502|4427557": ["vacy [12], trust [13], Social Internet of Things (SIoT) [14], communication [15], context awareness [16], and future directions [6], [17].", "[15], interoperability among various IoT LPWAN technologies encountered in IoT is still an open research question to address."]} +{"21705502|3767252": ["Typical security threats in these areas are Denial of Service (DoS) attacks, Man-in-the-Middle (MitM) attacks and malicious node problems [34], [143].", "More detailed descriptions of these threats are presented in [34].", "understand the particularities of every edge paradigm, as they have subtle differences that will affect the implementation and deployment of the security mechanisms [34].", "Although trust is an equally important property similar to security and privacy in IoT and MEC, it is hardly addressed lately in research works [34].", "As discussed in [34], the \u201canything, anytime\u201d principle should be the underlying building blocks and application scenarios for MEC-enabled IoT systems [152].", "2) Related Work: Security and privacy challenges in MEC like edge computing paradigms are surveyed in [34] and [154]."]} +{"21705502|21386749": ["Although IoT technologies are widely adopted in the health sector [47], their performance goals will not be achievable without edge"]} +{"21705502|7329149": ["the agricultural sector will require some major evolution where IoT will be integrated in various production, management, and analytical processes [77], [78]."]} +{"21705502|1598350": ["efits such as improving connectivity, efficiency, scalability, time savings, as well as cost savings for manufacturing processes with the maximum use of smart machines [92], [94]."]} +{"21705502|18687271": ["[142] Analyzed distributed mobility management for future IoT sensor networks."]} +{"21705502|3348390": ["vacy [12], trust [13], Social Internet of Things (SIoT) [14], communication [15], context awareness [16], and future directions [6], [17]."]} +{"53229376|206578224": ["Towards overcoming the aforementioned obstacles and, in order to serve the increased requirements of the future 5G services, a Multi-access Edge Computing (MEC)-enabled architecture that enables cloud computing capabilities at the edge of the access network is widely accepted by the literature [1]."]} +{"53229376|25911553": ["However, the recent NFV advances have permitted the virtualization of the EPC, by transforming the rigid core architecture into a set of network VNFs that can be flexibly placed at different parts of the network [11]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"21767689|3348390": []} +{"21767689|485843": ["vehicle-to-grid electricity storage and charging for plug-in electric vehicles [234], its communication network must provide"]} +{"21767689|544688": ["For more details on WiMAX, we would like the readers to refer to [85]."]} +{"21767689|10859599": ["[167] reviewed related works on the survivability in mobile ad hoc networks, and presented a survey with focus on survivable initiatives, such as route discovery, data forwarding, and key management and access control."]} +{"86399908|18125683": []} +{"86399908|18269383": []} +{"29005198|19938676": ["In a nutshell, 5G wireless access will consist of an evolution of LTE complemented with new radio technologies and architecture designs [10]."]} +{"29005198|2623404": ["The recent trends of network function virtualization (NFV) (providing abstraction [31]) and software defined networking (SDN) (providing flexibility [32]) are critical in shaping such an envisioned architecture."]} +{"52583749|12187684": ["processing user data, especially since prediction will play a major role in optimizing the QoS offered by the network [231].", "This will offer the possibility to high mobility scenarios to become reality [231]."]} +{"52583749|206576469": ["main sources of network delay as well as the solutions that can be currently implemented is [36]."]} +{"52583749|10559330": ["The IntServ architecture [66] relies on the storage of information in all routers of the network in terms of flows that will pass through them."]} +{"58675359|18750590": ["Owing to the superiorities of high computing capacity, competitive system scalability and low service cost, cloud computing has become a high-efficiency alternative in various fields of smart cities, such as social networks, commerce, transportation, education and health care services [1]."]} +{"58675359|206578365": ["For example, computation-intensive data can be offloaded to the edge servers to reduce latency, and largesize data can be handled by D2D communications to improve energy efficiency [14]."]} +{"57392896|5605271": ["data belonging to different stakeholders [6], [7]."]} +{"53784820|25911553": ["challenges is the dependability level of NFV in comparison to current networking technology [4]\u2013[7]."]} +{"3973390|12029139": ["RF energy harvesting is a promising technology to prolong network lifetime, and recently the RF energy harvesting networks are explored in several works [15]\u2013[24]."]} +{"3973390|3330461": ["In addition, since we consider the scenario that multiple D2D pairs are allowed to use the same spectrum, their mutual interference should be carefully addressed to improve the system performance [25]\u2013[29]."]} +{"4527235|33063270": []} +{"4527235|206578365": []} +{"19303577|3767252": ["The fog would facilitate the creation of a hierarchical infrastructure, where the analysis of local information is performed locally with the fog computing and networking devices, and the coordination and global analytics are performed at the cloud computing centers [12]."]} +{"19303577|31860478": ["[9] F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog Computing and its Role in the Internet of Things, Proceedings of the First Edition of the ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC 2012), Helsinki, Finland, 2012, pp. 13-16.", "Cloud and fog are inter-dependent because the coordination among devices in a Fog may rely on the Cloud [11].", "[2] T. H. Dihn, C. Lee, D. Niyato, and P. Wang, A Survey of Mobile Cloud\nComputing: Architecture, Applications, and Approaches, Wireless Communications and Mobile Computing, Wiley, Vol. 13, Issue 18, 2011, pp. 1587\u20131611.", "The cloud in 5G would appear in different forms: centralized cloud in 5G core, distributed cloud in 5G RAN (Cloud RAN and Fog RAN) and distributed peer-to-peer mobile cloud among the 5G smart end user devices.", "[3] S. Kitanov and T. Janevski, \u201cState of the Art: Mobile Cloud Computing,\u201d Proceedings of the Sixth IEEE International Conference on Computational Intelligence, Communication Systems and Networks 2014 (CICSYN 2014), Tetovo, Macedonia, 2014, pp. 153\u2013158.", "To solve these issues, a novel radio access network architecture FogRAN is proposed [11], [15].", "[19] H. Kavalionak and A. Montresor, \u201cP2P and Cloud: A Marriage of Convenience for Replica Management,\u201d Proceedings of the 6th IFIP TC 6 International Conference on Self-Organizing Systems, pp. 60\u201371, Delft, Netherlands, 2012.", "978-1-5090-3843-5/17/$31.00 \u00a92017 IEEE\nKeywords\u20145G; Cloud Computing; Fog Computing; Fog Networking; FogRAN; Mobile Cloud Computing\nI. INTRODUCTION The rapid deployment of broadband mobile and wireless networks and the increasing popularity of smart mobile devices, resulted more and more users to enjoy the benefits of broadband Internet services [1].", "The decision about the selection of the Local Cloud Resource Scheduler is done according to the connectivity to the local network, CPU performance battery life time, etc.", "In addition, 5G has much lower latency than 3G and 4G.\nV. CONCLUSION This paper evaluated the quality of Fog and Cloud Computing services in 5G mobile network in terms of energy efficiency.", "The distributed cloud in 5G RAN may appear in two forms: Cloud RAN (CRAN) and FogRAN.", "One of the devices is selected as Local Cloud Resource Scheduler, that performs management on the resource requests and allocates tasks to the devices in the local cloud or Fog Data Center if necessary."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"5016565|6909107": ["Suitable solution impeding the performance of service qualities of the MTs is to offload the complicated applications as the tasks to a cloud server [3]."]} +{"5016565|206578365": ["INTRODUCTION As the popularity of smart phones, laptops and tablets is increasing dramatically, more novel sophisticated applications are emerging, such as face recognition, interactive gaming and augmented reality [1]."]} +{"20384442|4735659": [", [96]\u2013[98] and [99]."]} +{"20384442|37564067": ["This is an important property because any resource allocation scheme without holding this property may be vulnerable to market manipulation and reduce the revenue for the seller due to the low valuations [24].", "One common method for proving the existence and uniqueness of the Nash equilibrium is to check if the strategies of the players are non-empty, compact, and convex, and if their utility functions are concave or quasiconcave [24].", "with low computational complexity [24].", "A number of auctions and their descriptions can be found in [24] and [30]."]} +{"20384442|18750590": [" e.g., picocells/femtocells, and user devices, the edge/fog computing pushes the frontier of cloud resources and services away from the remote data 32 centers to the periphery or edges of the network [26]. As a result, the edge/fog computing (i) signi\ufb01cantly reduces the data traf\ufb01c, cost, and latency, (ii) alleviates the major bottleneck and the risk of a potential point of failure, and (iii) provides", "ve to misreport their true demands which can lead to higher utility. 4) Forward, reverse auction, and double auction: Considering the sides of sellers and buyers, auctions can be classi\ufb01ed as follows [26]: Forward and reverse auctions: In the forward auction, multiple buyers compete for commodities by submitting their bids, i.e., bidding prices, to one seller. On the contrary, in the reserve auction", "imal strategies is challenging. C. Auction Auction is an ef\ufb01cient way of allocating resources to buyers which value the resources the most. A number of auctions and their descriptions can be found in [26] and [19]. The following brie\ufb02y presents the major auctions used in this survey. Note that an auction typically consists of three entities: buyers, i.e., bidders, sellers, and an auctioneer. The aucti", "between the utility associated with its resource allocation and the cost that the user pays the MNO for using the resources. To solve the NUM problem, price update schemes can be used as presented in [26]. Brie\ufb02y, by applying the dual decomposition and gradient methods, the MNO iteratively updates resource prices. Also, the users iteratively select their amounts of resources to maximize their own net ", "ned Networking (SDN) NFV and SDN allow 5G to ef\ufb01ciently accommodate a wide range of services over a common network infrastructure. While the SDN decouples the network control and forwarding functions [26], the NFV decomposes network functions from the physical network equipments. Such software-based solutions can provide the programmability, \ufb02exibility, and modularity that are required to create multi"]} +{"20384442|19938676": ["For example, the survey of emerging technologies of 5G was given in [7], the survey of resource management toward 5G was presented in [8], and the survey of user association in 5G was given in [9]."]} +{"20384442|8833120": ["The repeated game allows players to repeat a so-called stage game over multiple periods to achieve their objectives [64]."]} +{"20384442|17062686": []} +{"86722298|49574823": ["Some variants [18], such as Delegated PoS (DPoS), Transactions as PoS (TaPoS), PoS-Velocity (PoSV), Delegated Byzantine Fault Tolerance (DBFT) and Bitcoin-NG, select some ones to generate and validate blocks to improve the scalability, throughput and latency."]} +{"86722298|27262729": ["2) Security and Privacy: Despite the original security and privacy issues of blockchain [96], outsourcing services at the edges in the integrated system of blockchain and edge computing presents new security and privacy challenges."]} +{"86722298|206578365": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "With these short propagation distances, edge computing has the potential of realizing tactile-level latency for many latency critical applications that may require tactile speed with latency approaching 1ms [29]."]} +{"86722298|9495329": ["The virtual resources of network virtualization share many common elements in notions and interchangeably terms with SDN [53]."]} +{"86722298|3818445": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "Nonetheless, its security and privacy are signi\ufb01cant challenges, due to the interplay of heterogeneous edge nodes and the migration of services across edge nodes [5].", "Nonetheless, its security is a signi\ufb01cant challenge [5], [30], [31].", "These promised gains make it a key technology for realizing various visions for next-generation Internet, such as IoT [5] and Tactile Internet (with millisecond-scale reaction time) [28]."]} +{"86722298|3434731": ["Therefore, the integration of blockchain and edge computing into one system becomes a natural trend [6]\u2013[8].", "The sidechain scheme permits developers to connect new sidechains to the mainchain (e.g., Ethereum) with to-and-from transferring of the ledger assets [6]."]} +{"196065645|31245252": []} +{"196065645|6909107": []} +{"196065645|206578365": []} +{"196065645|9495329": []} +{"32426205|3126100": ["R I P Deep learning [57], machine learning [58], and arti\ufb01cial intelligence [59] are key technologies that provide value added applications using IoT and big data."]} +{"21672824|61132": ["This communication overhead reduces network throughput, introduces additional delays and wastes the limited battery energy of UAVs [3].", "This small battery can sustain a flight time of about 30 min [3,4]."]} +{"21672824|38911919": ["It helps to make the network more scalable, reduce routing overhead and maximize the throughput [6].", "Regardless of the potential benefits of node clustering in FANETs, the cluster formation and maintenance demand explicit exchange of control messages [6,7]."]} +{"36798361|18717047": []} +{"77391732|19938676": ["Aiming at this target, several appealing technologies have been recently developed and widely used in current wireless networks, such as massive multiple-input multiple-output (MIMO), device-to-device (D2D) communications, and full-duplex (FD) transmissions [1]."]} +{"77391732|3330461": []} +{"3376207|3543288": []} +{"3376207|206578224": ["Functionally, switches that are used in the tactile system can be viewed as a packet forwarding devices with single or multiple flow tables [34]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"44164878|3757239": []} +{"44164878|6909107": []} +{"3434731|1598350": []} +{"195218608|209444175": [", user clustering, signal decoding, and CSI acquisition) is the main barrier against the NOMA practicality [92]."]} +{"195218608|209202834": ["A survey of blockchain in the context of cloud of things can be found in [47] and applications of blockchain for 5G and beyond networks were reviewed in [54]."]} +{"195218608|202888951": []} +{"195218608|202676686": ["One of the most important use cases of IoT is smart city and its important subset smart home/building [183]."]} +{"195218608|203566947": ["The survey in [9], [11] reviewed several edge computing concepts and focused on computation of\ufb02oad-ing.", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23]."]} +{"195218608|150373910": []} +{"195218608|149724363": ["n of\ufb02oading and resource allocation, mobility management, security, privacy, and trust management, have been well indicated and manifested in some recent MEC-IoT surveys, such as, [33], [186], [188], [191]\u2013 [193]to which the interested readers are recommended to refer. In the following, we discuss key open problems in MECenabled IoT systems which are different to the mentioned challenging technical asp", "189] A new architecture is proposed to store and process scalable sensor data. \u2713 \u2713 \u2713 [190] A concise tutorial of three edge computing technologies including MEC, cloudlets, and fog computing. \u2713 \u2713 \u2713 \u2713 [191] The hardware architectures of typical IoT devices and sums up many of the low power techniques which make them appealing for a large scale of applications \u2713 \u2713 \u2713 [192] A comprehensive survey on the em"]} +{"195218608|109939628": ["Monitoring the marine environment with IoT including cloud, fog, and edge computing mechanisms was also discussed in [265]."]} +{"195218608|85500300": ["ibly combined with many existing wireless technologies and emerging ones including MIMO, massive MIMO, mmWave communications, cognitive and cooperative communications, visible light communications, physical layer security, energy harvesting, wireless caching, and so on [61].", "Massive MIMO-NOMA is another scenario to support massive connectivity and high spectral efficiency [61]."]} +{"195218608|53018231": ["Moreover, some surveys and tutorials on ML, DL, (deep) RL, as well as their applications in communications and networking [230]\u2013[232] have come out, and readers can refer to these literature for more details."]} +{"195218608|52015330": ["us reducing the execution latency and network congestion [11], [12]. Since fog nodes are generally deployed in distributed locations, they are widespread and geographically available in large numbers [13]. Due to its characteristics, fog computing plays an important role in many use cases and applications [14], e.g., smart cities, connected vehicle, smart grid, wireless sensor and actuator networks, s"]} +{"195218608|21705502": ["Several works in [21]\u2013[23] revealed the role of MEC for IoT applications and realization.", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23]."]} +{"195218608|21713386": ["migration execution cost, incentive payment to the target MEC server, and transmission cost due to radio resource usage. Several challenges arise in computation migration due to the following reasons [331]. First, when should the computation task be migrated from the source server? Next, which is the target server to execute the task when a computation is needed? This problem becomes very challenging s", "hat new computation migration can be fastly deployed without any internal modi\ufb01cation. For more details of service migration in edge computing, interested readers may refer to the recent survey paper [331]. D. Learned Lessons and Potential Works Due to the great bene\ufb01ts offered by MEC and HetNet as well as their complementary properties, it is convinced that the combination of MEC and dense HetNet is u"]} +{"195218608|5022650": ["utations from and data collected by end users can be processed and analyzed by fog nodes (i.e., nodes in fog computing) at the network edge, thus reducing the execution latency and network congestion [11], [12]. Since fog nodes are generally deployed in distributed locations, they are widespread and geographically available in large numbers [13]. Due to its characteristics, fog computing plays an impo"]} +{"195218608|53958589": []} +{"195218608|3457064": ["These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "Mathematical frameworks for optimization of MEC systems were reported in [15], [16].", "In particular, the authors in [15] conducted a survey on the computation offloading decisions when multiple challenges, e."]} +{"195218608|4884302": ["d execute an ML model to extract necessary information before sending the output to the central cloud for further training.Moreover, some surveys and tutorials on ML [248], DL [249], (deep) RL [250], [251], as well as their applications in communications and networking [252], [253] have come out, and readers can refer to the aforementioned literature for more details. Due to the rapid evolution of wire"]} +{"195218608|206578486": ["Since VM provisioning is used in cloudlets, cloudlets can operate in the standalone mode without the intervention of the cloud [11], [12]."]} +{"195218608|7942157": ["readers to read the surveys in [39], [40] for more detail."]} +{"195218608|22221919": ["There are many bene\ufb01ts of MEC and NOMA, including supporting massive users, reducing the transmission latency and the energy consumption of end users and providing high performance for more complex network scenarios, i.e. mmWave massive MIMO.", "Promoted by a variety of opportunities and advantages offered by MEC and NOMA, both academic and industrial communities have conducted extensive researches to design the 5G network with MEC and NOMA [65]\u2013[67].", "The combination of MEC and NOMA can provide low-latency transmission.", "To cope with demands for lower latency, MEC and NOMA are two promising solutions.", "The combination of MEC and NOMA can reinforce the services and applications that are supported by the 5G network.", "The combination of MEC and NOMA can signi\ufb01cantly improve the user satisfaction and network performance through the provision of golden opportunities."]} +{"195218608|206578224": ["In [12], the authors described four fundamental enabling technologies for MEC including virtual machines and containers, network functions virtualization (NFV), software-de\ufb01ned networking (SDN), and network slicing.", "There are many bene\ufb01ts of employing MEC into IoT systems, including but not limited to, lowering the amount of traf\ufb01c passing through the infrastructure and reducing the latency for applications and services [12].", "For more information on these issues, we refer the interested readers to [12], [48], [53] and references therein."]} +{"195218608|24386836": ["These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "The authors in [16] reviewed research works that applied theoretical games in addressing problems and", "Mathematical frameworks for optimization of MEC systems were reported in [15], [16]."]} +{"195218608|3757239": ["Recent studies in [13], [14] focused on reviewing the integration of communication, caching, and computation.", "The survey paper [13] showed that there are five main algorithms: content replacement policies such as the least frequently used (LFU) and least recently used (LRU), user preference based policies, learning based policies, non-cooperative caching, and cooperative caching."]} +{"195218608|31245252": ["In particular, the IoT basic architecture consists of three layers: Perception, Network, and Application [142], [143]."]} +{"195218608|6909107": ["Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23].", "These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "devices, which can be made open to authorised developers and content providers to deploy versatile and uninterrupted services on IoT applications [9].", "The survey in [9], [11] reviewed several edge computing concepts and focused on computation offloading.", "the offloading concept [9], [286], [287], the authors in [288], [289] proposed differentMEC architecture to further improve the network performance compared with the standard MEC.", "The cloudlet and fog computing are similar in that cloudlets and fog nodes are not integrated into the mobile network architecture, thus fog nodes and cloudlets are commonly deployed and owned by private enterprises and it is not easy to provide mobile users with the quality of service (QoS) and quality of experience (QoE) guarantees [9], [10]."]} +{"195218608|206578365": ["The authors in [1] reviewed joint communication and computation resource management in MEC systems.", "These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23].", "Compared with previous generations, 5G will support not only communication, but also computation, control, and content delivery (4C) functions [1]."]} +{"195218608|3270620": ["d accurate CSI is only used for power allocation in power-domain NOMA, thus the requirement of channel feedback in NOMA is relaxed [91]. The comparison between OMA and NOMA is summarized in Table III [92]. Although NOMA is able to support a large number of users simultaneously and surpasses OMA in several aspects, various challenging problems associated with NOMA must be addressed before this technolo"]} +{"195218608|3767252": ["In edge computing paradigms, there are numerous security and privacy threats, for example, wireless jamming, denial of service, man-in-the-middle, spoofing attacks, privacy leakage, virtual machine manipulation, and injection of information [24], [255].", "The following reasons explain why security and privacy are the greatest challenges [24]."]} +{"195218608|19938676": ["eneration (3G) in 1998, fourth generation (4G) in 2008, to hopefully \ufb01fth generation 5G in 2020. Fundamental services and applications supported in these network generations are summarized as follows [1]. Back to early 1980s, 1G was introduced as the \ufb01rst commercial cellular network, where voice services are supported with the peak data rate of 2.4 kbps and no security mechanisms. The second generati", "owing a zero-mean normal distribution when t = 1 . The DNN rst outputs a relaxed computation ofoading action x^t, represented by a parameterized function x^t = f t (h t), where x^t = fx^t;i jx^t;i 2 [0;1];i = 1 ; ;Ng (7) and ^xt;i denotes the i-th entry of x^t. xt* Fig. 15: Architecture of the DRL based online of\ufb02oading algorithm [385]. drawbacks of existing methods, which are high computation overhea"]} +{"195218608|7329149": ["nized Agriculture with IoT: IoT emerging the use of low-cost hardware (sensors/microcontrollers) and 5G communication technologies has opened new era for cultivating soil, namely \u201csmart agricultural\u201d [256], [257]. MEC-enabled IoT can offer advanced abilities for smart agricultural, e.g., predictive analytic, weather forecasting for crops or smart logistics and warehousing [258]. Recently, there are som"]} +{"195218608|18687271": ["For example, two localized mobility management schemes for dense HetNets were proposed in [214], a cache-enabled mobility management framework in mmWave-microwave HetNets was studied in [215], various energy-efficient cell discovery techniques were discussed in [217], a comprehensive review of mobility management was provided in [218], and the adoption of distributed mobility management was presented in [219]."]} +{"195218608|3055684": ["g, solar, wind), individual MEC servers may be overloaded at any moment due to the limited harvested power and computing capacity [111]."]} +{"195218608|12029139": ["The basic concept of EH is to capture various available energy from different sources to power the energy-constrained devices for prolonging their lifetime [98].", "For deeper understanding of the benefits and opportunities offered by EH and WPT techniques as well as their challenges and potential application scenarios, the interested readers are recommended to refer to EH and WPT surveys, such as [98], [103], [104]."]} +{"195218608|33867211": [" resource, the corresponding techniques can be employed to convert that energy into the electrical power [110]\u2013[112]. In particular, solar cells can be used to harvest sunlight power for solar energy [116]. The piezoelectric, electrostatic, and electromagnetic conversion techniques are utilized to convert the energy from some movement or mechanical deformation into electrical energy for the mechanical "]} +{"195218608|13172512": ["Recently, some surveys and tutorials on machine learning [339], deep learning [340], (deep) reinforcement learning [341]\u2013[343], as well as their applications in communications and networking [344]\u2013[346] have come out, and readers can refer to the aforementioned"]} +{"195218608|8909218": ["HetNets have been developed because of its following benefits: 1) better coverage and capacity, 2) improved macrocell reliability, cost benefits, and 3) reduced cost and subscriber turnover [41], [201]."]} +{"195218608|3818445": ["Several works in [21]\u2013[23] revealed the role of MEC for IoT applications and realization.", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23]."]} +{"195218608|3494096": ["Inversely, 5G is considered a basic platform to facilitate emerging IoT applications [140]."]} +{"195218608|12060835": ["At the network-level, MEC can allow deploying a centralized EH strategy to tune the functionality of all devices for better EH and performance [108]."]} diff --git a/edge/graph_202710497.jsonl b/edge/graph_202710497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81c3cb119bc3bb95c575314dfc1debce8126d673 --- /dev/null +++ b/edge/graph_202710497.jsonl @@ -0,0 +1,20 @@ +{"137732904|5791119": []} +{"128330301|5660947": ["It has been improved by using distinctive coatings and protections for the optical fiber such as nylon, acrylate, polyimide coatings.(165)"]} +{"128330301|7505270": ["A micro-electro-mechanical sensor has been extensively studied owing to its small size(15) and low production cost.(16) However, those sensors have a short life-time in harsh environments due to the failure resulting from creep and plastic deformation, corrosion, and electrical disturbance."]} +{"128330301|5791119": [", temperature, pressure, displacement, and stress) change, the length or refractive index of the cavity becomes deflected.(59) The deflected cavity induces a phase shift in interference signals."]} +{"128330301|27996699": ["The frequency shift that occurs by Brillouin scattering depends on thermal or mechanical deformation due to the stress-optical effect.(71) Brillouin scattering based sensors are categorized as the Stimulated Brillouin Optical Time-Domain Analysis (BOTDA) and the Spontaneous Brillouin Optical Time-Domain Reflectometry (BOTDR)."]} +{"103557635|15501047": []} +{"49582414|15501047": []} +{"15501047|17905276": ["\u2026and have great potentials to be developed into permanent embedded sensors for ageing infrastructure and life extension: e.g., railway track [202], power plant [203], aircraft [204], oil & gas structures [205] and pipelines [206], where reliable and accurate defect assessment and continuous\u2026"]} +{"40091378|189201": []} +{"3504690|15589021": []} +{"3504690|41104565": ["The propagation characteristics of different modes of the acoustic waves are well known and their applications have been realized in many disciplines [14,39].", "All these surface waves are distinct from the bulk acoustic waves (BAWs) which propagate across the body of a material [38,39]."]} +{"3504690|189201": ["Alternatively, sensors based on other surface waves such as SH-SAW and Love waves have been successfully employed in fluidic media [21,24].", "For example, Rayleigh waves are excited in Y-Z LiNbO3 (where Y-Z stands for Y-cut, Z-propagating) and 128\u25e6 Y-X LiNbO3 substrates whereas SH-SAW are shown to excite and propagate in 64\u25e6 Y-X LiNbO3 and 36\u25e6 Y-X LiTaO3 [24,30,46]."]} +{"117733800|6242153": ["It is well known that fiber-optic sensors are immune to electromagnetic interference [13], and are widely used to monitor spatially resolved temperature [5], strain [6], pressure [7] and vibrations [8] for structural-health monitoring of buildings, mines and oilrigs."]} +{"117733800|27996699": ["It is well known that fiber-optic sensors are immune to electromagnetic interference [13], and are widely used to monitor spatially resolved temperature [5], strain [6], pressure [7] and vibrations [8] for structural-health monitoring of buildings, mines and oilrigs."]} +{"195771128|4114498": []} +{"138176195|5791119": []} +{"71150272|7505270": []} +{"71150272|15589021": ["Gas sensing technology by optical methods has been widely investigated and has achieved long lifetime, relative short response, and high sensitivity, selectivity and stability [26], [27]."]} +{"52167668|18996548": ["These waves allow technicians to detect internal and superficial defects, such as cracks that occur parallel to the surface, as well as corrosion and defects within the body of the pipeline [15]."]} +{"105477244|5660947": []} diff --git a/edge/graph_202711637.jsonl b/edge/graph_202711637.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16179eec24eeeb569c360db0324bdd4bdd90198f --- /dev/null +++ b/edge/graph_202711637.jsonl @@ -0,0 +1,3 @@ +{"205272668|21465731": []} +{"205272668|6686730": []} +{"205272668|16783458": []} diff --git a/edge/graph_202711884.jsonl b/edge/graph_202711884.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2cb97b4836c58b118f6cf02b9fcfca761a4d7d9c --- /dev/null +++ b/edge/graph_202711884.jsonl @@ -0,0 +1,9 @@ +{"16643289|8914588": ["This architecture is based on ROS (Robot Operating System) diagnostics 1 and is inspired by the MAPE-K cycle [3].", "The internal structure of RoSHA is built on the concept of MAPE-K [3] as the underlying decision cycle."]} +{"13178931|18691290": ["Elkady and Sobh [1] evaluates several RSFs in terms of criteria such as fault detection and recovery capabilities.", "There are several RSFs available such as Orocos [4], MIRA [5], ROS [6], among many others that have been surveyed in [1], [2].", "For this reason, several software architectures were created to enable modular software design, where the modules can interact with each other exchanging messages [1], [2].", "The RSF survey papers [1], [2], [8] raise criticism about fault tolerance in robotics: despite the obvious need for fault tolerance, only a few RSFs implement any fault tolerance mechanism."]} +{"18691290|1819274": ["\u2026for robotic applications and to provide abstractions that makes robotic applications both portable and reusable on di \ufb00 erent hardware platforms\u201d [3] MRDS Provides a robotic software platform supporting a wide variety of hardware devices and a set of useful tools that facilities the programming\u2026", "\u2026software development process for mobile robots and enable interaction between robots and enterprise systems using the distributed object paradigm\u201d [3] OpenRTMaist Provides e \ufb03 cient development for robotic systems by proposing a modular software structure platform and \u201csimpli\ufb01es the process of\u2026", "\u2026by simply combining selected modules\u201d [3] ASEBA \u201cAllows distributed control and e \ufb03 cient resources utilization of robots with multiprocessors\u201d [3] MARIE \u201cCreates \ufb02exible distributed components that allows developers to share, reuse, and integrate new or existing software programs for rapid\u2026", "\u2026from simulation to real robots with as little e \ufb00 ort as possible Orca \u201cEnables software reuse in robotics using component-based development\u201d [3] Miro \u201cImproves the software development process for mobile robots and enable interaction between robots and enterprise systems using the\u2026", "\u2026systems by proposing a modular software structure platform and \u201csimpli\ufb01es the process of building robots by simply combining selected modules\u201d [3] ASEBA \u201cAllows distributed control and e \ufb03 cient resources utilization of robots with multiprocessors\u201d [3] MARIE \u201cCreates \ufb02exible distributed\u2026", "\u2026components that allows developers to share, reuse, and integrate new or existing software programs for rapid robotic application development\u201d [3] and integrates other middleware in a single robot RSCA \u201cProvides real-time support for robotic applications and to provide abstractions that makes\u2026", "Mohamed et al. [3] provide a short overview of several research projects in middleware for robotics and their main objective."]} +{"14513508|7360895": []} +{"14513508|16614482": []} +{"110546565|3330313": ["4 is usually taken as 2 or 3 because if the data are normally distributed, they are expected to be within two (three, respectively) standard deviations from the mean [138]."]} +{"37118356|562855": ["Horling and Lesser [73] give a thorough overview of the different paradigms investigated in the literature:"]} +{"37118356|7839197": [", [115]), as means to simulate the behaviour of ecosystems (e."]} +{"109358014|6327434": ["Fault diagnosis algorithms were reviewed in Willsky (1976) and Frank (1990)."]} diff --git a/edge/graph_202716839.jsonl b/edge/graph_202716839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..468d4e034739efc2ff4062b6611382bd78b87715 --- /dev/null +++ b/edge/graph_202716839.jsonl @@ -0,0 +1,18 @@ +{"3404334|925507": ["Even in the emerging field of the Internet of Things (IoT), blockchain technology can be used in different scenarios and forms [15], [17], [24]\u2013[28]."]} +{"56597218|49574823": ["Reference [49] is a bibliometric study reporting the number of blockchain papers in the surveyed set in four categories: Internet of Things (IoT), Smart Con-tracts, E-governance, and Others, with brief explanation on each category.", "There are much more related work that center on specific domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on finance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60].", "An example of this model is urban decision-making leveraging big-data collected from IoT sensor networks.", "[121] built a system using IoT sensors to collect those transport condition parameters and log the readings to a blockchain for public veri\ufb01ability.", "An additional 3 use cases also used proof-of-work even though the name of the speci\ufb01c blockchain is not mentioned, including for electricity meter reading security [173], an energy trading market involving industrial IoT and the grid [186], and peer-to-peer electricity trading between electric vehicles [206].", "Such systems can trace the origins of drugs by logging time series drug transaction data generated by IoT sensors to a blockchain to prevent counterfeits [118].", "There are much more related work that center on speci\ufb01c domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on \ufb01nance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60].", "Reference [186] proposes a system that targets at various typical industrial IoT scenarios, such as micro grids, energy harvesting networks, and vehicle-to-grids."]} +{"56597218|56002532": ["There are much more related work that center on speci\ufb01c domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on \ufb01nance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60]."]} +{"31102928|925507": []} +{"28028672|448220": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"51881582|21386749": ["With the development of the Internet of things (IoT) technology [2] [3], numerous personal healthcare data are generated by the IoT devices every day [4]."]} +{"51881582|17474643": ["However, the CSPs have been struggling a lot to provide data sharing service [7]."]} +{"58015336|49527603": []} +{"58015336|3628110": []} +{"58015336|925507": []} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"88491427|49527603": ["A private blockchain can provide a relatively better degree of privacy; however, it is generally considered an unsecure environment as it is only controlled by a single entity [72].", "Examples of surveys on general blockchain concepts, opportunities, and applications are [72]\u2013[75]."]} +{"88491427|51935081": []} +{"88491427|3932531": ["applications [104]\u2013[107], intrusion detection [91], and Internet of Things (IoT) [95]\u2013[100]."]} +{"88491427|3628110": []} +{"88491427|27262729": []} +{"88491427|925507": []} diff --git a/edge/graph_202724920.jsonl b/edge/graph_202724920.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a144757d3cf270f6b0ba14bffb0601359917e19a --- /dev/null +++ b/edge/graph_202724920.jsonl @@ -0,0 +1,2 @@ +{"40437619|12860838": []} +{"15143785|15916359": []} diff --git a/edge/graph_202728664.jsonl b/edge/graph_202728664.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fc7d41270fd206a22a0260523d8c9548767aeca --- /dev/null +++ b/edge/graph_202728664.jsonl @@ -0,0 +1,12 @@ +{"5608232|1230643": ["Clustering is a well known technique for energy conservation of sensor nodes [1\u20134]."]} +{"10186223|1230643": ["Wireless sensor networks (WSNs) are known for their potential uses in environmental monitoring, industrial, agricultural, health care and military applications [1]."]} +{"9201373|1230643": ["two-tiered constrained relay node placement problems, where the relay nodes can be placed only at some prespecified candidate locations."]} +{"2834981|1230643": ["INTRODUCTION AND RELATED WORK A wireless sensor network (WSN) consists of many lowcost and low-power sensor nodes (SNs)[1]."]} +{"15319861|1230643": ["Recent advances in the development of Wireless Sensor Networks (WSNs) [1] reveal a new paradigm for monitoring infrastructure health [2], [3] and environmental conditions [4] owing to the availability of low powered millimetre-scale CPUs, highly integrated wireless transceiver circuits and various\u2026"]} +{"20361433|37052879": ["Taking the factory automation as an example, the data sensed by SNs is typically time-sensitive, such as alarm notification and information for feedback control, and thus the importance of receiving the data at the sink in a timely manner is noticeable (Liang et al., 2011; Zheng et al., 2015)."]} +{"29617759|1230643": []} +{"40705921|206901977": ["However, sensor nodes are powered by batteries with limited energy, which are laborious or awfully costly to replace or recharge [1, 2]."]} +{"8107393|1230643": ["\u2026(WSNs) have been one of the most important research areas since last decade due to its tremendous application potentials in civilian and defense related applications such as battle\ufb01eld surveillance, environmental monitoring, biomedical observation, industrial automation and other \ufb01elds [2]-[3]."]} +{"196368|1230643": ["A WIRELESS sensor network (WSN) consists of many low-cost and low-power sensor nodes (SNs) [1]."]} +{"14687445|1230643": ["A wireless sensor network (WSN) consists of a large number of low-cost, low-power sensor nodes, which can perform sensing, simple computation, and communication over short distances [1], [6]."]} +{"15236393|12060835": ["For example, it is possible to have some SNs endowed with energy harvesting capacity that allows them to forward traf fic for others [15] [16]."]} diff --git a/edge/graph_202728715.jsonl b/edge/graph_202728715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c0bc40f48121debc402fa5fd61f7ba2ec43d97c --- /dev/null +++ b/edge/graph_202728715.jsonl @@ -0,0 +1,16 @@ +{"3721696|18078738": ["Gao et al. [5,6] systematically reviewed the fault diagnosis with model-based, signal-based, knowledge-based, and hybrid/active approaches."]} +{"961984|9554464": ["Indeed, it is already being actively researched for the related problem of data aggregation within sensor network community [178,179], which further signifies the importance of considering security-related issues while developing modern decentralized fusion systems."]} +{"961984|4491892": ["Probabilistic [32,40,45] Represents sensory data using probability", "Particle filters are a recursive implementation of the SMC algorithm [45]."]} +{"190006787|54134680": []} +{"125567144|48359428": []} +{"125567144|38200299": []} +{"125567144|3761015": []} +{"125567144|3918777": []} +{"3297772|207584909": []} +{"3297772|11810221": ["Herroelen and Leus (2005) divided schedule robustness into two groups: solution robustness and quality robustness."]} +{"39687571|3348390": ["It allows devices communication with each other with minimum human intervention (Perera et al., 2014)."]} +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} diff --git a/edge/graph_202729434.jsonl b/edge/graph_202729434.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5053c062a5f5ea1ab7323fe2574399e3178e39dc --- /dev/null +++ b/edge/graph_202729434.jsonl @@ -0,0 +1,34 @@ +{"108313233|9045705": []} +{"2792778|9045705": []} +{"9839629|9045705": []} +{"90025564|4576140": ["Some of the current simulation toolboxes 42 enable the modeling of all these aspects of fMRI data, but as the later analyses might heavily depend on the speci\ufb01c choice of parameters, more work is needed to understand how the di\ufb00erent sources of noise in\ufb02uence each other."]} +{"207737771|18303304": []} +{"207737771|9045705": ["exist, based on near-infrared spectroscopy (NIRS) (35)."]} +{"148042299|5755816": []} +{"148042299|9045705": ["\u2026Murray, 2012), magnetoencephalography (MEG) (Hall, Robson, Morris, & Brookes, 2014), positron emission tomography (PET) (Magistretti & Allaman, 2015), and functional near-infrared (NIR) spectroscopy (fNIRS) (Scholkmann et al., 2014) represent the most widely used functional neuroimaging modalities.", "Quaresima and Ferrari 7\nThe methods of analysis of the fNIRS/DOT/DOI signals have been recently reviewed (Scholkmann et al., 2014).", "The most commonly used CW-based fNIRS instrumentation measures changes of O2Hb and HHb (with respect to an initial value arbitrarily set equal to zero) calculated using a modification of the Lambert-Beer\u2019s law (Scholkmann et al., 2014).", "Different commercially available fNIRS instruments with the related key features, advantages and disadvantages, and parameters measurable by using different techniques have been recently reviewed in detail (Scholkmann et al., 2014).", "This brief review article does not comprehensively cover all the advancements and pitfalls in all the aspects of fNIRS methods because they have been reported in detail in two recent technical review articles (Scholkmann et al., 2014; Torricelli et al., 2014).", "It has been proven that the functional activation of the human cerebral cortex can be successfully explored also by fNIRS, optical topography, NIR imaging, diffuse optical imaging (DOI), or diffuse optical tomography (DOT) (Ferrari & Quaresima, 2012; Scholkmann et al., 2014)."]} +{"12559982|9045705": []} +{"73418912|9045705": []} +{"3418077|5755816": []} +{"49312875|2644350": ["A parameter, namely the differential path-length factor (DPF), has been used in previous studies to cover the extra distance traveled by NIR light (Kamran et al., 2016).", "The DPF is included to cover the actual distance traveled by light in the signal acquisition process (Maikala, 2010; Kamran et al., 2016).", "It is assumed that the NIR light emitted by the source and detected by a near-by detector follows a banana-shaped path (Kamran et al., 2016).", "fNIRS is an emerging neuro-imaging methodology that can be used in medical as well as BCI applications (Kamran et al., 2016).", "The absorption coefficient is the sum of the products of the extinction coefficients and the concentrations of the different chromophores present in the medium under experimentation (Scholkmann and Wolf, 2013; Kamran et al., 2016)."]} +{"49312875|5755816": []} +{"52264711|9045705": []} +{"136635|9045705": ["However, undesirable artifacts such as head motion and scalphemodynamics often contaminate fNIRS signals, and obscure taskrelated cerebral-hemodynamics (for review, Scholkmann et al., 2014)."]} +{"7396155|7761990": []} +{"3613692|207203830": ["With the rise of neuroimaging in research and practice and the development of the machine learning paradigm, there has been an exponential trend in computer-aided methodologies (Frisoni et al., 2010; Martinez-Murcia et al., 2016; Rathore et al., 2017)."]} +{"52008476|9045705": []} +{"4333200|15993259": []} +{"41587460|9045705": ["6,7 All over the world, fNIRS systems have been used in more and more situations, 8 such as in neuroimaging research 9,10 and medical purposes, 11 \u2013 14 especially for measuring the brain activity of infants and children 15 \u2013 20 and for creating wearable equipment, 21,22 because they have a high\u2026", "The activation channel of the fNIRS signal was chosen from BAs 9, 10, 44, 45, and 46 for VFT, BA 46 for WM, and BAs 1, 2, 3, 4, and 40 for TAP.", "10 The validity of these methods, however, was confirmed by making certain assumptions, namely (expected) waveforms, 35,36 contrast-to-noise ratio, 37 and correlation with laser-Doppler signals."]} +{"4812307|6116761": ["Even though PPI is more informative than a basic functional connectivity correlational model, it cannot provide any causality or directionality for the neural dependencies (Friston, 2011).", "Connectivity studies have enriched neuroimaging research with a more comprehensive understanding of how the brain works and develops, playing a fundamental role in revealing neuronal mechanisms behind cognitive processes and psychological domains (Friston, 2011; He and Evans, 2010; Rubinov and Sporns, 2010).", "The vast majority of fNIRS connectivity studies examine \u2018functional connectivity\u2019, defined as the temporal correlations between spatially remote neurophysiological events (Friston, 2011).", "DCM is the most accurate technique to estimate effective connectivity, because it can not only evaluate the couplings between brain regions but also how these are influenced by changes in experimental context (Friston, 2011)."]} +{"52986715|9045705": []} +{"205630417|9045705": []} +{"52154376|29313707": ["Due to the slow nature of the hemodynamic response [25], decoding small units of language, such as nouns, is more diffi\u00ad cult compared to full sentences or different speech modes [8].", "Initial attempts to use the hemodynamic response to decode different speech tasks focused on the averaged hemo\u00ad dynamic response over many repetitions of a speech task [8].", "However, a successful imagined speech BCI should be able to decode speech in a single trial [8].", "The variation across participants in the location of the channels which provided the maximum discriminative infor\u00ad mation for classification has been frequently reported in pre\u00ad vious imagined speech studies [8, 19], and more generally, in most active BCI tasks [2].", "A review of reported BCIs based on imag\u00ad ined speech and their performances are provided in [8, 9].", "An intuitive mental task for BCIs which has attracted atten\u00ad tion during the last decade is imagined speech\u2014also known as covert speech [8].", "Moreover, Schultz et al emphasized the importance of real\u00adtime feedback in BCIs based on speech [8]."]} +{"52154376|5755816": ["An fNIRS device can be portable, and the duration of each trial can be as short as 10-15 seconds [23].", "This duration was determined based on previous similar fNIRS studies and the suggested minimum measurement time for a hemodynamic response in literature [23]."]} +{"52154376|2916525": ["Initial studies on the hemodynamic response related to speech generation and comprehension deployed positron emission tomography (PET) and functional magnetic reso\u00ad nance imaging (fMRI) to study activated brain areas [19].", "All these areas are belong to the speech network of the brain [49] and have been previously identified in other imagined speech studies as yielding discriminative information [19].", "This finding is in line with several previous studies on the classification of imagined speech, where greater discriminative information was found in the temporal and temporoparietal regions close to Wernicke\u2019s area, compared to Broca\u2019s area, especially when the imagined speech task did not involve the production of complicated phrases [17, 19].", "The variation across participants in the location of the channels which provided the maximum discriminative infor\u00ad mation for classification has been frequently reported in pre\u00ad vious imagined speech studies [8, 19], and more generally, in most active BCI tasks [2]."]} +{"52154376|16362395": ["Regularization can be necessary in classification models to preserve generalizability, especially when the number of samples are of the same order of magnitude as the number of features [54]."]} +{"114994724|13268141": ["( ) 2ln2 FWHM w z (7) On the other hand, FWHM of a diffraction limited focused spot is given by Equation-8."]} +{"40567445|9045705": []} +{"215211097|9045705": ["\u2026or near-infrared (NIR) imaging have been summarized in recent reviews (Hoshi, 2011; Cutini et al., 2012; Ferrari and Quaresima, 2012; Scholkmann et al., 2014). fNIRS is a non-invasive vascular-based neuroimaging technology that measures concentration changes of oxygenated-hemoglobin\u2026"]} +{"14988289|2916525": ["\u2026near-infrared spectroscopy (fNIRS) and functional magnetic resonance imaging (fMRI), rely on visualizing hemodynamic changes related to neuronal activation. fNIRS (Ferrari and Quaresima, 2012) and fMRI (Price, 2012) are of special interest as they do not require the injection of a tracer substance.", "fNIRS (Ferrari and Quaresima, 2012) and fMRI (Price, 2012) are of special interest as they do not require the injection of a tracer substance."]} +{"207094800|2644350": []} +{"207094800|9045705": []} +{"3619366|9045705": ["Continuous wave functional near-infrared spectroscopy (CWfNIRS) is a noninvasive imaging technique capable of measuring and mapping local changes in cerebral oxygenation caused by brain metabolic and hemodynamic activity.(1) In CW-fNIRS, a set of optic fibers, called optodes, is placed on the surface of the scalp, emitting (sources) and collecting (detectors) NIR light (16 dual sources and 32 detectors with our Brainsight CW system)."]} diff --git a/edge/graph_202729441.jsonl b/edge/graph_202729441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb6d47272e4b8956049f10f5ca72ef516177d713 --- /dev/null +++ b/edge/graph_202729441.jsonl @@ -0,0 +1,70 @@ +{"122364764|51929263": ["Different domain adaptations as well as transfer learning techniques have been developed in other fields to address domain-shifting problems, such as handwriting-digit recognition [16] and object recognition [17], [18]."]} +{"67867317|393948": ["It tries to minimize the reconstruction error to make the output similar to input [43]."]} +{"4933375|3761015": ["Several comprehensive surveys were made to review the present development of transfer learning [29]-[30]."]} +{"4933375|18078738": ["1(a)) [5]-[8]."]} +{"4933375|54440351": []} +{"125543251|905827": []} +{"53141267|33286487": []} +{"86717787|3654323": ["Furthermore, deep DA (DDA) methods employ DNNs to learn domain-invariant representations by embedding DA in the pipeline of deep feature learning [16], and thus is more promising."]} +{"86717787|393948": ["As a kernel method, MMD may suffer several disadvantages, such as low ability of global generalization [20], high sensitivity to kernel selection [21], and scalability to large-scale applications [22]."]} +{"91188266|3761015": []} +{"58023549|7559976": ["This challenge of pattern learning validity is known as the domain shift problem [15].", "Domain Adaptation (DA) is a particular case of transfer learning that leverages labeled data in the source domain, to learn a classi\ufb01er for unlabeled data in the target domain [15]."]} +{"70323466|18078738": []} +{"85499942|393948": ["be extracted for ANN and SVM methods [8], and the upperbound performances of ANN and SVM methods are defined by these handcrafted features [9]."]} +{"57756616|18188725": ["Meanwhile, as an important subfield of it, deep learning is promising, and widely investigated and applied in fields including vibration signal-based fault diagnosis of rotating machine [4]."]} +{"3808900|18188725": ["Compared with the traditional artificial intelligent techniques, DL holds the potential of feature representation and has been applied in the machine health monitoring field [24]."]} +{"3808900|18078738": ["2774777 methods [3]."]} +{"3808900|393948": ["visual cortex contains some cells that are only sensitive to the local receptive field [35]."]} +{"54456560|3761015": ["Universally, the training dataset is called source domain and the dataset for model application is called target domain [20].", "distributions [20] of the sharing features are same for source and target domains due to no labels participate in feature extraction.", "Mainly, the forms of information transfer are categorized into four general transfer categories [20] and two widely used categories are: (1) instance transfer and (2) subspace transfer."]} +{"54456560|15888893": ["Plenty of application cases in natural language processing, object recognition, image classification [21]\u2013[26] show that the domain adaptation is truly beneficial and promising."]} +{"57759722|3761015": []} +{"119391599|33286487": []} +{"13695858|7559976": []} +{"1606677|18078738": ["These fault diagnosis methods can be divided into model driven methods [1], [2] and data driven methods."]} +{"58943127|7559976": ["Similarly let P ( Y tr | X tr ) and Q ( Y te | X te ) be the conditional distributions of X tr = { x tr i } and X te = { x te i } from the training domain and test domain, respectively [20,25,26]."]} +{"117621288|3590989": []} +{"7597406|18078738": []} +{"7597406|393948": ["type of layers should be stacked and how to stack them, several approaches have been proposed in the prior work [19]."]} +{"132506060|3761015": []} +{"132506060|15888893": []} +{"132506060|18078738": ["In the following, (1) to (5) belong to the TrAdaBoost framework with different base learners.", "In (5), SVD is used to extract feature vector from reconstructed matrix based on the view of a phase space concept.", "Each of the faulty motors has a specific fault: (1) voltage imbalance (VI), (2) rotor imbalance (RI), (3) faulty bearing (FB), (4) broken rotor bars (BB), and (5) bowed rotor (BR)."]} +{"67872061|3761015": ["ioner to categorise a real problem and to look up for a possible solution accordingly. In addition, none of the previous survey papers covers all of the seventeen problems. For instance, Weiss et al. [245] focuses on nine (of the seventeen) problems on homogeneous and heterogeneous domain adaptation and transfer learning with heterogeneous label spaces; Venkateswara et al. [229] mainly reviewed the lit", "he formal definition and task-oriented categorization of transfer learning [170], and to the recent tutorial and survey on deep learning based domain adaptation [37, 228]. Most of these survey papers [12, 35, 154, 157, 160, 173, 195, 214, 228, 245] are method-driven and provide up to the time a review of the evolution of the technologies. Many of them are on particular topics, for instance, domain adaptation [12, 37, 157, 173, 214, 228], datase"]} +{"67872061|15888893": []} +{"67872061|2670121": ["type) solutions for this problem [35, 23, 11], Blitzer et al", "Most of these survey papers [12, 35, 154, 157, 160, 173, 195, 214, 228, 245] are method-driven and provide up to the time a review of the evolution of the technologies.", "Many of them are on particular topics, for instance, domain adaptation [12, 37, 157, 173, 214, 228], dataset shift [160], activity recognition [35], and speech and language processing [237]."]} +{"21717310|18078738": []} +{"122552966|18078738": ["In general, three fault diagnosis methods are now taken into consideration by scholars: fault diagnosis methods based on a physical model [1,2], fault diagnosis methods based on knowledge [3\u20136] and data-driven methods [7\u201310]."]} +{"106407006|3761015": []} +{"67182842|18078738": []} +{"115529630|3761015": []} +{"115529630|15888893": []} +{"115529630|18078738": []} +{"3397190|10137425": ["We also expect to see more research on multimodal learning [190] as, in the real world, language is often grounded on (or correlated with) other signals."]} +{"7559976|393948": ["As shown also in [13, 266], this suggests that deep neural networks learn more abstract and robust representations, encode category level information and remove, to a certain measure, the domain bias [65, 216, 51, 188]."]} +{"71152276|7559976": ["The challenge of transferring the learned knowledge from the labeled training data to the unlabeled testing data is known as the domain shift problem [4]."]} +{"110988692|9928823": []} +{"110988692|393948": []} +{"268486|15888893": []} +{"125976702|393948": ["Various deep learning algorithms, such as autoencoders, stacked autoencoders [103], DBM and DBN [16], have been applied successfully also in fault diagnosis."]} +{"56594323|18188725": ["[19] investigated the application of DL to machine health monitor."]} +{"56594323|15888893": []} +{"56594323|18078738": ["In general, the fault diagnosis methods can be classified into model-based, signal-based, knowledgebased and hybrid/active approaches [14]."]} +{"56594323|393948": ["In traditional machine learning methods, the handcrafted features should be predesigned, and it has been shown that these handcrafted features define the upper-bound performances of machine learning methods [7]."]} +{"125608550|393948": []} +{"126753487|15888893": []} +{"533239|14814753": ["However, harnessing the attained knowledge into a new application with limited labeled data (or even without having labels) is far beyond clear [33, 37, 19, 8, 51]."]} +{"3385026|393948": []} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"59159135|14843594": ["This distribution is then used to construct a surrogate utility function called acquisition function, which is cheap to evaluate and finally optimised to recommend the next function evaluation point while keeping a trade-off between exploitation and exploration [9,22]."]} +{"3654323|10092092": []} +{"3654323|2899523": [" sharply decreases in higher layers. Therefore, recent work has addressed this problem by deep DA, which combines deep learning and DA. There have been other surveys on TL and DA over the pastfewyears[67, 80,14,68, 109, 13]. Panetal. [67]categorizedTL underthreesubsettings,includinginductiveTL, transductiveTL,andunsupervisedTL,buttheyonlystudied homogeneous feature spaces. Shao et al. [80] categorized TL techniques into", "forth. In this section, we present different application examples using various visual deep DA methods. Because the information of commonly used datasets for evaluating the performance is provided in [109] in detail, we do not introduceit in this paper. 6.1. Image Classi\ufb01cation Because image classi\ufb01cation is a basic task of computervisionapplications,mostof the algorithmsmentioned above were originally", "e transfer. The surveywritten byPatel [68] onlyfocusedon DA, a subtopicof TL. [14] discussed 38 methods for heterogeneous TL that operate under various settings, requirements, and domains. Zhangetal. [109] werethe\ufb01rst to summarizeseveraltransferring criteria in detail from the concept level. These \ufb01ve surveys mentioned above only cover the methodologies on shallow TL or DA. The work presented by Csurka"]} +{"3654323|7559976": ["In one-step DA, the deep approaches can be summarized into three cases, which refers to [23] .", "[23] briefly analyzed the state-of-the-art shallow DA methods and categorized the deep DA methods into three subsettings based on training loss: classification loss, discrepancy loss and adver-", "hose from the survey papers by [18,23] to maintain consistency cross surveys."]} +{"75137541|51929263": ["In general, OSDA supposes C S \u2282 C T and PDA supposes The earlier related reviews on TL and DA can be referred to as [4], [8]\u2013[17], which are summarized in Table I."]} +{"75137541|3654323": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"75137541|7559976": []} +{"75137541|15888893": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"75137541|2670121": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"213944638|51929263": ["In addition, this dataset also enables the alidation of deep transfer learning and domain adaptation lgorithms [32], [33] to predict a more realistic bearing fault from accelerated life testing with classifiers trained on artificially induced scratches or drills.", "Designed to tackle this practical and widely existing issue in numerous applications, transfer learning has aroused extensive attention in the machine learning community, and various transfer learning frameworks are proposed based on classical ML algorithms [32], [33], [157], [158]."]} +{"213944638|905827": []} +{"5522822|15888893": ["Many examples in knowledge engineering areas have been found where domain adaptation can be truly beneficial and promising, including image classification, natural language processing, object recognition, and feature learning [2], [3]."]} +{"5522822|18078738": []} +{"126544299|3761015": []} diff --git a/edge/graph_202729878.jsonl b/edge/graph_202729878.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16d65395d6df7e0b86c49fcc4bf4e00f50b8c071 --- /dev/null +++ b/edge/graph_202729878.jsonl @@ -0,0 +1,59 @@ +{"102155|3330461": ["DEVICE-TO-DEVICE (D2D) communications boosts the throughput of cellular networks by offloading traffic [2], [3], and thus is a promising way to achieve the goal of 5th generation (5G) mobile networks.", "Traditional D2D communication, which does not cache content locally, can only offload peer-to-peer (P2P) traffic from cellular networks if source and destination are in proximity at the time they wish to communicate, such as gaming [2], sharing files via local multicast [4], finding friends via proximity based social services [5] and offloading cellular sessions to unlicensed band [6].", "According to whether the D2D and cellular links reuse the same frequency band or not, the D2D communications can operate in the following two modes [2]."]} +{"102155|7644489": ["DEVICE-TO-DEVICE (D2D) communications boosts the throughput of cellular networks by offloading traffic [2], [3], and thus is a promising way to achieve the goal of 5th generation (5G) mobile networks."]} +{"3864772|3330461": ["D2D communications is a scenario in which two mobile nodes communicate directly without traversing the base station (BS) or the core network [1]."]} +{"52121043|10299098": ["cache-enabled cloud-radio access networks (C-RANs) and fog-radio access networks (F-RANs) [37], [38]."]} +{"52121043|19938676": [", the fifth generation (5G) networks [2],"]} +{"52121043|3330461": ["Compared with traditional D2D communication networks [112], [113], more D2D links can be activated if the content can be properly cached at user equipment [49], [50], [114], [115]."]} +{"52121043|9104850": ["Caching techniques have been comprehensively studied for Web caching [16], [17], content distribution networking (CDN) [18] and information centric networking (ICN) [19]\u2013[23] in wired networks.", "In the early 1990s, network congestion was precipitated by excessive delivery of Web pages and images, and significantly reduced by Web caching techniques that temporally store the popular files at clients\u2019 computers or proxy servers [16], [24]."]} +{"15917201|14889616": []} +{"44095895|14889616": ["When considering caching SVC videos over wireless D2D networks, the caching placement problem becomes more challenging.", "When\nallocating cache and transmission resources for SVC videos over wireless D2D networks, a series of interesting problems arise: 1) which videos should be cached, 2) which layers of each video should be cached, and 3) how to transmit based on the cache placement for all possible requests, so as to satisfy QoE requirements of users.", "This can be addressed by using scalable video coding (SVC) [11], where videos are encoded into a base layer and one or more enhancement layers.", "Such a joint cache placement and transmission schedule optimization problem for SVC videos in wireless D2D networks is referred to as the Joint Video Caching and Transmission (JVCT) optimization problem.", "The caching placement strategy and the transmission schedule need to be appropriately designed to satisfy the different QoE requirements of users for SVC videos.", "In this paper, we study a joint caching and transmission problem for SVC videos in wireless D2D networks, where the objective is to minimize the average download time while satisfying the QoE requirements for all users.", "Algorithm 2 Transmission Scheduling Algorithm 1: for \u2200i, j, l do 2: Initialize xijl as the output of Algorithm 1; 3: end for 4: Obtain y\u0302jlki by solving the relaxed linear programming\nproblem with standard methods; 5: for \u2200i, k, j, l do 6: \u03b2jlik \u2190 pkjl( ejlr0k \u2212 ejl rik\n); 7: bi \u2190 Bi; 8: end for 9: for l\u2190 1 to L do\n10: for \u2200i, k, j do 11: Sort all variables y\u0302jlik in decreasing order of \u03b2 jl ik; 12: end for 13: for each y\u0302jlik in sorted order do 14: if bi \u2265 rik then 15: if yj(l\u22121)ik = 1 or l = 1 then 16: yjlik \u2190 1; 17: bi \u2190 bi \u2212 rik; 18: end if 19: end if 20: end for 21: end for\nWe compare our proposed scheme with the following schemes 1) optimal dual-solution based caching algorithm for D2D caching [16], where the content request can be fulfilled by other users via D2D links, and 2) cooperative layered video caching [13], which also considers caching for SVC video in content delivery networks.", "The main contributions of this paper are summarized as follows: \u2022 We investigate joint caching and transmission scheduling\nproblem for SVC videos in a wireless D2D network, and formulate the problem using integer linear programming.", "Note that different users may request the same video, but the required quality may be different, which is a characteristics of SVC video.", "In this paper, we investigated the joint caching and transmission strategy for reducing the average download time of SVC videos over wireless D2D networks."]} +{"28588833|3330461": ["Device-to-device (D2D) communication, as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage, can enormously reduce the cost and burden on the base station (BS) [4]\u2013[6]."]} +{"28588833|7644489": []} +{"7494555|3330461": ["Our experiments reveal that outband D2D communications are suitable for a large variety of delay-sensitive cellular applications, and that DORE enables notable gains even with a few active D2D relay nodes."]} +{"16999865|14889616": ["As the data transmission rate of wireless networks is rapidly growing [9] and many efficient video compression standards [10] [11] [12] [13] have been proposed, technologies in wireless video streaming service have been studied in the past."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"13494014|3042864": []} +{"13494014|14889616": ["264/SVC standards was developed by International Telecommunication Union (ITU) in 2007 [35]."]} +{"7869810|8909218": []} +{"19046776|7686677": ["The energy cost and carbon footprint coming along with the growth of traffic have led to an emerging research area called \u201cgreen cellular networks\u201d, which aims at addressing energy efficiency amongst the network operators and regulatory bodies [1]\u2013[3]."]} +{"1342996|3330461": ["Our result provides the feasibility of implementing the D2D cluster assisted approach in practical scenario to achieve considerable amount of energy saving at BS in a video stream sharing scenario.", "In our model, an approach of forming inband underlaying D2D clusters with constraint on their overall energy consumption is introduced in order to save energy for the BS. Specifically, a relaxation factor is used to form value function for each cooperative cluster, which consists of one cluster head for video stream transmission and other cluster nodes for reception.", "Many assisted methods, such as femtocell [1] and D2D [2], have been considered to help improve the performance of cellular network on total throughput.", "This paper studied the novel concept of D2D cluster assisted cellular network in the specific video stream sharing problem, the cooperation of clusters results in large amount of energy saving at the Base Station, whose simulation result was given in Fig.", "Moreover, D2D resource allocation from the view of game theory has also been investigated [7], where game theory was proved to be able to provide insights for overall performance and fairness consideration of the network.", "However, as for the D2D cluster, few research has been done due to comparably lack of application scenarios as well as its complexity [7].", "The successful transmit probability Pr is set as 0.95, the bandwidth Bw for both the cellular transmission and D2D communication is set as 300kHz, noise power density is \u2212174dBm/Hz, and the measurement for video quality PSNR ranges from 33dB to 37dB., the number of portable devices ranges from 20 to 300.", "Regarding the D2D technique, different modes of constructing the heterogeneous network using D2D communication have been studied, including the underlay inband D2D as well as overlay inband and outband D2D communications [6].", "Particularly, we will show the performance of D2D cluster communication in the video stream sharing scenario of different sparseness (density) for portable devices.", "In this paper, we propose a solution for the video transmission and sharing scenario based on D2D cluster assisted cellular communication networks.", "There are some related works considering the video transmission in wireless network, including the authors in [4] use femtocell\u2019s\nlarge storage capacity as cache to meet the increasing demand for video content in wireless devices, while the authors in [8] increased the throughput of video files in cellular networks via D2D transmission for redundant user requests."]} +{"1342996|8909218": ["Many assisted methods, such as femtocell [1] and D2D [2], have been considered to help improve the performance of cellular network on total throughput."]} +{"16731587|8909218": ["Femto base stations [2] are currently receiving a lot of attention for this purpose."]} +{"3302382|64404": ["Although SHVC yields a higher coding complexity than H.264/advanced video coding (AVC), it exploits the bene\ufb01ts of high ef\ufb01ciency video coding (HEVC) and signi\ufb01cantly reduces the encoding bit rate to cope with the diverse wireless channel conditions (i.e., error and bandwidth) and the different resolution of mobile devices, respectively.", "We apply the rate-distortion (RD) given in [39] and [40] to scalable extensions of high ef\ufb01ciency video coding (SHVC) [41]\u2013[43].", "We apply the rate-distortion (RD) given in [39] and [40] to scalable extensions of high efficiency video coding (SHVC) [41]\u2013[43]."]} +{"25294242|3330461": ["As such, it has been investigated in the last few years [13-16].", "However, it has not been considered in cellular networks until the emergence of D2D communications [13-16]."]} +{"6422481|3913780": ["Content popularity is assumed perfectly known in these works [8\u201311], which however is unknown in practice and needs to be predicted [12], either directly [7] or indirectly via various machine learning algorithms.", "Many prediction methods have been proposed, such as using cumulative views statistics based on the popularity correlation over time [7] and learning with a multi-armed bandit algorithm in [13].", "It can reflect the collective behavior of users in a community [7]."]} +{"18252217|3330461": ["As such, it has been investigated in the last few years [7-10].", "P2P communication in wireless networks has been studied in the context of wireless ad hoc networks [6], but it has not been considered in cellular networks until the recent emergence of D2D communications [7-10]."]} +{"18252217|12130888": ["A wide varied research has been conducted in the last decade on the design of new P2P streaming protocols over wired networks [5]."]} +{"638024|7644489": []} +{"117143236|16378550": []} +{"117143236|3330461": []} +{"3043488|3330461": ["Acomprehensive survey onD2D communication can be found in [1].", "As of today there are not only several proposals for cellular relaying, cellular offloading, and content distribution leveraging D2D [1], but also entire system architectures based on D2D to complement cellular-based services in a scalable way, with new types of applications to be supported in future networks, e."]} +{"7188431|7644489": ["Meanwhile, preliminary D2D techniques have been standardized by 3GPP to allow decentralized file sharing and public safety applications [5]."]} +{"21563297|15449163": ["According to a recent study [31], security and"]} +{"21563297|207231270": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197]."]} +{"21563297|76603": ["4) Legal and Regulation Concerns: The ethical and legal requirements are non-negligible factors in D2D security and privacy research, due to the connection with national security and public safety [209], [210]."]} +{"21563297|3330461": ["According to [5], [10], [19], and [20], M2M communication can be defined as:", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D", "Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "without the interaction of access points or base stations [5].", "Other communication paradigms similar to D2D include the Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "and technology-independent, whereas D2D is technologydependent and focuses on proximity services, which assumes opportunistic connectivity [5].", "According to [5] and [10], the standalone D2D can be defined as:", "Typical D2D applications and services include cellular data offloading, relaying, gaming, content distribution, and group communication [5], [10], [17]."]} +{"21563297|7644489": ["D2D switches from infrastructure path to direct path for offloading cellular traffic [9], [21]\u2013[23].", "4) Solution Compatibility and Deployability: Cellular operators are the main driving force for D2D communication [21], [190], which have identified a set of use cases and"]} +{"21563297|6670217": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In the following, we highlight key characteristics of mobile security and privacy [135]."]} +{"21563297|12970117": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D"]} +{"21563297|14745481": ["2016 in order to reflect the latest advancements on top of the security research in mobile ad hoc networks [24], [174], [175].", "Aside from physical layer considerations in conventional MANET security [24], [174], [175], physical layer security in D2D communication also deserves our attention."]} +{"21563297|18411031": ["to perform operations on encrypted cipertext without knowing the original data [120].", "The tokens can only be generated with a secret key [120]."]} +{"206753047|5385031": ["Therefore, according to the basic principles of microeconomics [41], the users for video ax in next time slot can be estimated by"]} +{"5806910|7644489": ["An overview on 3GPP D2D ProSe was given in [96], from the design aspects of ProSe management, synchronization, device discovery and direct communication."]} +{"5806910|8909218": ["\u2026geometry can be a helpful mathematical tool for modeling the spatial distributions of macro eNBs, pico eNBs, femto eNBs, and mobile UEs [108], [109], and analyzing the transmission rate [110], [111], outage probability [112], etc. D2D With Network Coding: As a revolutionary technique, network\u2026"]} +{"52118784|6779551": ["efforts have been exploring novel techniques that can minimize interference in order to enable secure and reliable D2D communication [191]."]} +{"52118784|12206204": ["However, owing to lack of standardization, the wide spread implementation of IoT and subsequently D2D integration with IoT is still a far cry [293], [294]."]} +{"52118784|3330461": ["In [18] the existing literature on D2D is categorized under inband and outband D2D communication."]} +{"52118784|7644489": ["[51] proposed the resource selection scheme namely sensing based selection"]} +{"64428928|3330461": []} +{"12031163|14889616": ["264/AVC with medium granular scalability (MGS) [27].", "The D2D videos are encoded with the scalable video coding (SVC) extension of H.264/AVC with medium granular scalability (MGS) [27].", "The 4\u00d7 4 DCT coefficients for the MGS layer [27] of each macroblock are split with MGS vector [1, 1, 2, 2, 2, 8]."]} +{"18660291|14889616": ["264/SVC codec [40], [41] while considering the temporal scalability of the video sequence."]} +{"10265944|14889616": []} +{"14135379|3330461": ["The direct peer-to-peer communication such as device-to-device (D2D) communication [5] has recently received great attention as an emerging design for future wireless communication systems with better video quality and improved user experience."]} +{"14135379|3540699": ["264/AVC codec [17], which promises much higher compression than previous standards such as MPEG-4 and would not increase the complexity of design so much."]} +{"42222097|3330461": ["In recent years there has been a great deal of research on using D2D communication in cellular networks, as it provides a good means for improving performance [5-8], and different authors started to use this method combined with caching.", "In recent years, we have seen various efforts combining current standards with D2D communications [5-8] in order to improve performance."]} +{"42222097|8909218": ["Another approach has been to decrease the size of the cells in order to provide higher spectral efficiency [12]."]} +{"9108789|3330461": ["[8], where content delivery service has attracted considerable attention recently, since it accounts for the majority of the explosive increasing traffic load.", "We consider overlay inband D2D [8], and assume that a fixed bandwidth of W is assigned to the D2D links."]} +{"9108789|7644489": ["(iii) The synchronization among cooperative DTs is more easier to be implemented than that in Ad-hoc networks, because it can be realized with the assist of the BS [5]."]} +{"14889616|3540699": ["For more detailed information about H.264/AVC, the reader is referred to the standard [6] or corresponding overview papers [23]\u2013[26] While the VCL creates a coded representation of the source content, the NAL formats these data and provides header information in a way that enables simple and\u2026"]} +{"665956|14889616": ["At the base station, the video data is first compressed using a SVC source coder.", "Scalable video coding (SVC) [6], an extension of the H.", "Scalable video coding (SVC) [6], an extension of the H.264/MPEG-4 advanced video codec (AVC) compression standard, provides different dimensions of scalability for a video source, which allows progressive improvement of playback quality depending on device capabilities.", "SVC enables the encoding of a high quality video stream that contains multiple prioritized layers, each served with decreasing importance of video reconstruction.", "By adjusting the HM video layer partition and the code rate of each layer, SVC video layers are encoded by fountain codes and mapped to three H-QAM layers and each layer of a video block consists of 200 fountain source packets.", "Since bit-error-rate (BER) performance of HM [10] and the application of HM to SVC encoded TV broadcast have been well studied in the literature [3], [7], the results in this section focus on showing the advantages of combining fountain codes with HM and comparing of different UE cooperation strategies.", "For example, the first PL usually contains the base layer of a SVC block, while the other PLs correspond to multiple enhancement layers."]} diff --git a/edge/graph_202730313.jsonl b/edge/graph_202730313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..466a15d27b66f3e97e68ffba6e2cb940132cb722 --- /dev/null +++ b/edge/graph_202730313.jsonl @@ -0,0 +1 @@ +{"110871313|34621298": []} diff --git a/edge/graph_202734170.jsonl b/edge/graph_202734170.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4725a19cdea46c18e0ade5bde099505e4b15b6e --- /dev/null +++ b/edge/graph_202734170.jsonl @@ -0,0 +1,26 @@ +{"5822655|207014621": ["AT 12 represents all the different facets of health records and disease management tools [86-89], which collect detailed health information, allowing them to offer functionality tailored to users\u2019 needs and individual peculiarities or to provide other apps with the information required for tailoring offered functionality."]} +{"56597218|49574823": ["Reference [49] is a bibliometric study reporting the number of blockchain papers in the surveyed set in four categories: Internet of Things (IoT), Smart Con-tracts, E-governance, and Others, with brief explanation on each category.", "There are much more related work that center on specific domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on finance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60].", "An example of this model is urban decision-making leveraging big-data collected from IoT sensor networks.", "[121] built a system using IoT sensors to collect those transport condition parameters and log the readings to a blockchain for public veri\ufb01ability.", "An additional 3 use cases also used proof-of-work even though the name of the speci\ufb01c blockchain is not mentioned, including for electricity meter reading security [173], an energy trading market involving industrial IoT and the grid [186], and peer-to-peer electricity trading between electric vehicles [206].", "Such systems can trace the origins of drugs by logging time series drug transaction data generated by IoT sensors to a blockchain to prevent counterfeits [118].", "There are much more related work that center on speci\ufb01c domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on \ufb01nance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60].", "Reference [186] proposes a system that targets at various typical industrial IoT scenarios, such as micro grids, energy harvesting networks, and vehicle-to-grids."]} +{"56597218|56002532": ["There are much more related work that center on speci\ufb01c domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on \ufb01nance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60]."]} +{"7873163|393948": ["First, it is able to learn representative and scalable features from other disease types [45]."]} +{"15357341|5724477": ["Comprehensive reviews which focus solely on smartphone-based solutions for fall detection [35] and \u201conline\u201d activity recognition [36] (in which all computation is performed on the smartphone) have been discussed previously."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"3770443|18567112": ["Android\u2019s inconsistent history with system security in the past could make it more likely that an attacker might use unpatched issues to gain privileges on the system and install any certificates wanted or to do further harm [42,43]."]} +{"14442501|1113420": []} +{"65130152|18388986": ["[5] JDL model [Fig."]} +{"9757651|20905429": ["Keywords: Smartphone, Body Sensor Networks, Health, Wellbeing."]} +{"6841982|468992": []} +{"6841982|23041951": ["and data origin authentication. In contrast to other \ufb01elds in which security-related research is being actively conducted, swarm robotic systems suffer a lack of practical solutions to these problems [18]. The security topic has been overlooked by state-of-the-art research mainly due to the complex and heterogeneous characteristics of robotic swarm systems \u2014 robot autonomy, decentralized control, a la", "rom academic institutions to the industry [3]. Previous works have emphasized the lack of general methods to tackle topics such as safety analysis, testing mechanisms [49], [40] or security protocols [18] for swarm robotic systems, which hinder the progress to more broader commercial applications. One of the main axioms in the swarm robotics \ufb01eld has been the absence of global knowledge or explicit co"]} +{"10050878|5724477": []} +{"6634488|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [93], [94], [95]."]} +{"2740197|393948": ["Conventional techniques are composed of a single, often linear, transformation of the input space and are limited in their ability to process natural data in their raw form [21].", "AEs are mostly used for representation learning [21] and are often regularized by adding noise to the original data (i.", "Alternatively, representation learning methods allow to automatically discover the representations needed for prediction from the raw data [21, 22]."]} +{"2740197|15669036": ["work called \u2018differential privacy\u2019 [109, 110] to ensure the indistin-"]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"184473794|52903603": ["There are however approaches that try to use blockchain within the robotics context and on a more high-level, by defining standards to it [9], [10], [11], [12], even though these are incipient works [13], we will see this technology surfacing in new fields as it has potential to store data, incorporate decentralized application among others."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"67855836|52903603": ["Incipient work that integrates this technology with AI has been proposed [18, 15]."]} +{"67855836|7665100": ["Applications using collaborative robots have also been under increasing development, mainly for work collaboration [19, 4], to monitor workspaces [5], to avoid collisions by using vision to do reactive planning [7], or external sensors that use distance from robots to humans to stop the robot [32]."]} +{"49301982|6670217": []} diff --git a/edge/graph_20273534.jsonl b/edge/graph_20273534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1c23c83d05e05894a12271585d737e0a423fd4b --- /dev/null +++ b/edge/graph_20273534.jsonl @@ -0,0 +1,3 @@ +{"22821361|207694246": []} +{"22821361|562065": []} +{"22821361|1230643": []} diff --git a/edge/graph_202745748.jsonl b/edge/graph_202745748.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202746577.jsonl b/edge/graph_202746577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..583a23543b863ad3306cd89a6409cefc28f55146 --- /dev/null +++ b/edge/graph_202746577.jsonl @@ -0,0 +1,14 @@ +{"35602792|6857179": []} +{"156039654|21386749": []} +{"1605434|9928823": []} +{"67872987|23374959": ["This can be done using a variety of specialized or generalized methods [10]."]} +{"621581|192934": ["For classification, various machine learning methods (supervised classification in our case) can be used [33]."]} +{"2610287|2532914": ["Rather than exhaustively reviewing this literature (see Kjeldskov & Graham, 2003; Mehl & Conner, 2011), I outline four existing types of studies that give a context for future developments in smartphone research."]} +{"1800351|10565363": []} +{"39888164|14688441": ["Conversely, social psychology studies have examined personality mainly via non-verbal social behavioral cues (see [6] for a review), but few works have modeled personality traits based on emotional behavior.", "A comprehensive survey of personality computing approaches is presented in [6]."]} +{"10985974|1634674": []} +{"53399785|18599847": ["Convolutional neural networks (CNN) are a widely used deep learning al-gorithm which performs especially well for images input data, although they are now increasingly applied in time series data including human physiological data and \ufb01nancial data [42, 21]."]} +{"18901549|16362395": ["Although EEG techniques are slowly brought to practice; e.g., Brain Computer Interfacing (BCI) [29] [30], these techniques are still very obtrusive.", ", Brain Computer Interfacing (BCI) [29,30], these techniques are still very obtrusive.", "In Van den Broek et al. (2009), these are denoted for affective signal processing (ASP); however, most of them also hold for brain imaging, BCI, and traditional methods.", "Of interest for affective MMI are also the developments in brain-computer interfacing (BCI) [29,30]."]} +{"3351246|192934": ["In general, a pattern classification system is operated in two modes [5]: training (learning) and classification (testing)."]} +{"18345464|192934": ["Finally, features were classified using various machine learning methods [73]."]} +{"53279634|49544416": ["Physical and physiological responses to emotions have been investigated to facilitate various applications of emotion recognition [3]."]} diff --git a/edge/graph_202747275.jsonl b/edge/graph_202747275.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f253bee088bf4713fb183b1f828bd27d8e5070c5 --- /dev/null +++ b/edge/graph_202747275.jsonl @@ -0,0 +1,13 @@ +{"102336499|10282549": ["In addressing the need to sense and manage physical interactions, there are several themes that have been tackled so far: sensing accidental contacts and reacting suitably [10], 2019 2nd IEEE International Conference on Soft Robotics (RoboSoft) COEX, Seoul, Korea, April 14-18, 2019"]} +{"102336499|1482463": ["To estimate the pose, we used the well known Iterative Closest Point (ICP) algorithm [27]."]} +{"3618224|2087828": ["This deformation results in a change of material resistance that can be measured to identify touch and estimate the applied force [14,15]."]} +{"38553603|8815923": ["For an overview of learning for robot grasping, we refer the reader to [12]."]} +{"2083896|18374428": ["[14] The strongly linked kinematic calibration is heavily biased towards manipulator arms observed by a camera [15] \u2013 a solution that is not viable for optically in-discriminable skin.", "Although accurate explicit models would be optimal for standard control approaches,[15] coarse implicit models seem a good alternative to represent the own body [18] and to enable sensory guided motor control."]} +{"198169209|24222234": ["For a thorough review of tactile perception, refer to [111,112]."]} +{"27630281|18440098": ["(2002) achieved high-speed image tracking using hand gestures, Ong and Ranganath (2005) surveyed recent automatic sign language analysis and Shotton et al .", "Several studies on nonverbal instructions have been presented, particularly for gestures (Kurata et al ., 2002; Ong and Ranganath, 2005; Shotton et al ., 2011)."]} +{"3639913|24222234": ["With attempts dated back to the 1980\u2019s [6], tactile sensing has been acting a supporting role for vision in most previous works due to the low resolution of tactile sensors [7]\u2013[9]."]} +{"199541211|24222234": ["Development of robust and effective tactile sensors is a major challenge that could lead to advances in terms of the safety, responsivity, and dexterity of robots [3], [4]."]} +{"85505902|24222234": ["main reasons: visual occlusion when contact is imminent [2], [3] and the deformability [4]\u2013[6] of food."]} +{"129945708|24222234": []} +{"57755821|24222234": ["[4]."]} +{"57755821|5688620": ["[2] identified sensing as one of the significant challenges for advancing the field of soft robotics."]} diff --git a/edge/graph_202747509.jsonl b/edge/graph_202747509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d635ffa9548d23a55a2bd6791b5d136ebc495d44 --- /dev/null +++ b/edge/graph_202747509.jsonl @@ -0,0 +1,15 @@ +{"52896135|4805253": ["Nevertheless, because of the sensor instability and atmospheric interference, HSIs often suffer from multiple types of noise [5], such as Gaussian noise, stripe noise, impulse noise, dead lines, and mixed noise, as illustrated in Fig."]} +{"206592484|456491": []} +{"49573933|206051485": []} +{"1033682|174797842": []} +{"58952437|4795312": []} +{"53224865|206051485": ["To this end, multimodal image registration is a common requirement for remote sensing images applications, which aligns two or many images for the same scene, where the images were acquired at different times, from different views, or by different sensors [1]."]} +{"53317229|393948": []} +{"53317229|11608263": []} +{"46849537|15315731": []} +{"49544022|11112426": ["However, this approach could be highly affected by the spectral simplex geometry of the input image [72]."]} +{"26319187|393948": ["The success of machine learning algorithms generally depends on the right way of how image features are represented [10]."]} +{"9510200|393948": ["Patch-based training is the most commonly used approach to learn the convolutional layers\u2019 parameters by means of unsupervised criteria [50].", "Sparsity is among the properties of a good feature representation [48], [50]\u2013[53]."]} +{"44131640|11112426": ["Hyperspectral images (HSIs), which simultaneously acquire both spatial and spectral information, have already been applied in many remote sensing applications, such as classification [1], target detection [2], unmixing [3], etc."]} +{"24992843|11112426": ["Another group of abundance estimation approaches based on blind-source separation, which does not require endmember signatures to be known a priori, has been developed [134].", "ENDMEMBER EXTRACTION The identification of endmembers is a challenging problem, for which many different strategies have been proposed [134].", "Unmixing thus amounts to finding the fractional coverage (abundance) of each endmember in each pixel of the scene, which can be approached as a geometrical problem [134].", ", algorithms without the pure pixel assumption) [134]."]} +{"24921529|11112426": ["It is possible to add the abundances sum-to-one constraint, V 1C = 1MN , but this constraint is usually dropped due to possible scale model mismatches [41]."]} diff --git a/edge/graph_202750140.jsonl b/edge/graph_202750140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c32fc621a6e339963d6714df02f4f5211e781fa --- /dev/null +++ b/edge/graph_202750140.jsonl @@ -0,0 +1,33 @@ +{"42120997|17966235": ["referred to a recent survey in [12] for more information on"]} +{"9916170|8589228": ["Probabilistic model checking is an automatic procedure for establishing whether a desired property holds in a probabilistic system (see Legay and Delahaye_s survey [32])."]} +{"2703985|1230643": ["Despite being similar to micro- and macroscale sensors [2], it should be taken into account that (i) the solutions in the nanoscale are limited not just in terms of existing manufacturing"]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"45410942|14397159": ["universal definition of AAL has been adopted [18].", "AAL technologies have been identified as \u201cinformation and communication technology-based products, services, and systems to provide older and vulnerable people with a secure environment, improve their quality of life, and reduce the costs of health and social care\u201d [18]."]} +{"202640207|38200299": []} +{"550361|11498812": ["Ironically, while mobility models have been routinely used in the evaluation of human-centric communications technologies, such as mobile ad-hoc and legacy cellular networks, the effects of mobility in mobile 5G systems that are targeting the mcMTC market are much less understood [3]."]} +{"4354870|7834819": ["What can consumer wearables do?Heart rate can be measured with an oximeter built into a ring [3], muscle activity with an electromyographic sensor embedded into clothing [4], stress with an electodermal sensor incorporated into a wristband [5], and physical activity or sleep patterns via an accelerometer in a watch [6,7]."]} +{"8003224|5724477": ["In some studies, classifiers are combined in different ways, thereby creating multi-layer or hierarchical classification ( Shoaib et al., 2015 ), whereas other ones proposed relational graph of visual words for activity analysis for smart home security ( Zhang et al., 2015b )."]} +{"8003224|5807554": ["Despite this kind of wearable computing has long history ( Betancourt et al., 2015; Mann, 1997 ), it has become of more interest in the last years with the advancement of both hardware and software technologies ."]} +{"8003224|16013270": ["Additional researches focus on the evidence that activities are normally related to the concept of interaction between a person with one or more people or between one or more people with objects of the surrounding environment ( Chaquet et al., 2013 )."]} +{"102346629|31245252": []} +{"256317|6127042": ["able instructional strategies based on the learner\u2019s reactions, mental conditions, emotional states, and feedback (see [56] for a survey).", "tinuously adapt their teaching/training approaches to optimize learning efficiency [56]."]} +{"256317|3750204": ["refer to above-cited references or see [148] for a survey."]} +{"256317|206901977": [", on an hourly basis, battery replacement/rechargewould deterwide adoption of the device [66]."]} +{"256317|2814871": []} +{"256317|6906699": ["Authentication refers to the process of verifying a user\u2019s identity based on certain credentials [46]."]} +{"256317|16335158": ["designed for smartphones ormobile devices [170]."]} +{"256317|17950466": []} +{"256317|20905429": ["WMS-based systems have also been developed for continuous long-term healthmonitoring [1], [7]."]} +{"198932433|3096077": ["The most important aspect in WBAN is to avoid tissue damage as the heat that is generated by the node\u2019s circuitry and antenna could cause damage to the human tissue [25].", "issue of tissue damage when the heat received rate is larger than the thermoregulatory mechanism rate [25]."]} +{"28935470|42497499": ["Figure 7 shows the non-beacon mode with superframe boundaries [5], [22].", "In addition, the messages are not supplied with data authentication and integrity, or reply defence, privacy protection, and confidentiality [22].", "In MAC, CSMA/CA or slotted aloha could be used during RAP, EAP, and CAP [21], [22].", "Figure 8 shows the non-beacon mode without superframe boundaries [5], [21], [22].", "Allocation Interval and Access Methods in Non-Beacon Mode Without Superframe Boundaries [22]", ", integrity, reply defence, confidentiality, privacy protection, and message authentication) [22], [25].", "Layout of Access Phase in a Non-Beacon Mode with Superframe Boundaries [22]"]} +{"28935470|7854020": ["Figure 2 shows the complete summary of frequency bands used in WBANs [5].", "Figure 8 shows the non-beacon mode without superframe boundaries [5], [21], [22].", "Figure 7 shows the non-beacon mode with superframe boundaries [5], [22]."]} +{"33680800|7854020": []} +{"12123442|2623404": ["SDN is a new networking paradigm in which the control and data planes of the network are decoupled [9]."]} +{"12123442|3994942": []} +{"7854020|7988320": []} +{"59604452|270804": ["control and low packet loss ratio are some of the other major concerns in WSN [13].", "WSN comprises sensor nodes deployed in a network field to monitor various physical and environmental parameters.", "Reliable end-to-end data transmission with proper congestion control and low packet loss ratio are some of the other major concerns in WSN [13].", "This gives the reason for exploring IoT for various research areas owing to its challenges and opportunities WSN acts as a medium that bridges the virtual digital world to the real world.", "Since energy and lifetime are two major constraints in designing any routing protocol for WSN, much research has been done to achieve the goal.", "The proposed model can also be tested on different realistic scenarios for a WSN based IoT system.", "Some of these issues are addressed by adopting various technological changes in primitive protocols and schemes used for WSN. QoS requirements in IoT based WSN faces significant challenges like extreme resource content, redundancy in data, dynamic size of the network, less reliable medium, heterogeneous network, and multiple BS or sink nodes [6].", "The key security issues in WSN includes data authenticity and confidentiality, data integrity and freshness in data [7].", "WSN provides a platform for the collection and communication of data to monitor and control the physical world for the betterment of the society [25].", "CBDAS and GHND are grid-based WSNs that consider few parameters for CH selection and perform better than LEACH protocol.", "Reduction of power consumption has always been a crux issue in designing WSNs. Recent research outcome has come up with different ideas to reduce energy and extend network longevity for proper utilization of resources.", "Different from the ad-hoc network, WSN meant for IoT application faces numerous challenges in terms of a number of sensor nodes, hardware, mode of communication, battery power and computational cost to name a few.", "For a fair comparison with recent methods proposed for IoT based WSN like IGHND [24], GHND [34], CBDAS [35], we consider the packet size to be 2000.", "An energy-efficient trust derivation method was discussed in [17] for WSN-based IoT networks."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} diff --git a/edge/graph_202750144.jsonl b/edge/graph_202750144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63bd1600afe955da63d1df0db9edbf501eb86917 --- /dev/null +++ b/edge/graph_202750144.jsonl @@ -0,0 +1 @@ +{"15402514|5671282": ["[35] provide a more comprehensive survey on LSH."]} diff --git a/edge/graph_202750179.jsonl b/edge/graph_202750179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c6f2ac62722bcbe6144eda750a45ef424769096 --- /dev/null +++ b/edge/graph_202750179.jsonl @@ -0,0 +1,22 @@ +{"195891657|7844555": []} +{"150373675|393948": ["For this example, we will tokenize based on standard English conventions (e.g. white-space, punctuation) and punctuation relevant to code (e.g. snake and camel case).", "Suppose we want to produce a vector that can successfully represent the code snippet below. for (entry : map.entrySet()) { System.out.println(entry); } One possible approach is to treat this source code as text, and tokenize this input into a collection of individual words."]} +{"49862954|7165993": ["] and machine learning algorithms are considered to be in this class. Various methods have been devised to test \u2018non-testable programs\u2019. These include constructing an oracle from formal specification [2] (and recently formal verification has been attempted for machine learning [32]), developing a pseudo oracle (or multiple implementations of a program [34]), testing on benchmark data [16], assertion ", "cases where the oracle is easily obtainable [22], using implicit oracles (such as when a program crashes) and Metamorphic Testing [5]. While none of these methods have been found to solve all aspects [2], Metamorphic Testing has been found to be quite useful [21]. We refer the readers to a recent survey [2] for a discussion on these various methods. There has been work in the application of Metamorph"]} +{"3879949|41505326": ["Applying CNNs on videos is challenging because traditional CNNs are designed to represent two dimensional pure spatial signals but in videos a new temporal axis is added which is essentially different from the spatial variations in images [256, 264]."]} +{"3879949|16082889": []} +{"3879949|6627566": ["Building a hierarchy of classifiers is a common strategy for image classification with a large number of classes [93]."]} +{"195298572|207591052": ["Deep learning has been emerged as a effective alternative for code modelling (see [28] for an extensive review)."]} +{"195298572|206778480": []} +{"367166|393948": [", |z|) is an example of a \u201chyperparameter\u201d [26], and adjusting this hyperparameter will regulate the model\u2019s capacity such that models with larger hidden layers yield more capacity [50], [51]."]} +{"198359124|206778480": []} +{"198359124|393948": []} +{"46902434|393948": ["These new approaches use representation learning [16] \u2014 a significant departure from traditional approaches \u2014 to automatically extract useful information from the disproportionate amount of unlabeled software data."]} +{"3292103|206778480": []} +{"4657352|27533715": ["88 which indicates substantial to almost perfect agreement [17]."]} +{"69706594|206778480": ["Complexity metrics have been extensively used for defect prediction (e.g., [41]) and vulnerability prediction (e.g., [9], [10], [11]).", "Code metrics were commonly used as features for building defect prediction models (e.g., [41])."]} +{"49584534|207591052": ["(1) Source code is structured: In contrast to natural language text which is weakly structured, programming languages are formal languages and source code written in them are unambiguous and structured [3]."]} +{"17547160|207372751": ["Link prediction in complex networks has attracted enormous attention from physics, biochemical, and computer science communities [7, 18, 19, 9, 3, 8]."]} +{"84182792|7844555": ["More work on fault localization can refer to a recent survey [4] by Wong et al."]} +{"4055261|17292349": ["[27], McMinn et al."]} +{"4055261|14920988": []} +{"198179580|17485266": ["We use Adam, a state-ofthe-art algorithm for training RNN [35]."]} +{"174800859|11714872": ["A recent survey gives a comprehensive overview of JavaScript analyses [65]."]} diff --git a/edge/graph_202759807.jsonl b/edge/graph_202759807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..122a5cd1e864fa77a12aa87d24c0a55e15c1174e --- /dev/null +++ b/edge/graph_202759807.jsonl @@ -0,0 +1,4 @@ +{"29225890|9180844": ["The International Health Terminology Standards Development Organisation maintains SNOMED CT (9)."]} +{"16864990|16362395": ["The same boosted ensemble ranking approach can be adopted in problems with the neural activity data (Lewickiy, 1998; Lotte et al., 2007)."]} +{"16864990|10290908": []} +{"33275639|5473785": ["To build the classifiers we used WEKA\u2019s (Waikato Environment for Knowledge Acquisition, version 3.6 [29]) and compare them to an expert-built Bayesian network (BN) [30] influenza model."]} diff --git a/edge/graph_202763564.jsonl b/edge/graph_202763564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202765669.jsonl b/edge/graph_202765669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63889a5f57c5666fd1842ab2a6f2eea35e7bc3c8 --- /dev/null +++ b/edge/graph_202765669.jsonl @@ -0,0 +1,14 @@ +{"32548782|17202214": ["Related to thiswork, extensivework on securitymodeling has been done [67] which primarily focuses on role based access control [68,69]."]} +{"30615530|17205659": ["Wang et al. [29] conducted a thorough survey of different security and privacy issues of wireless sensor networks, which are relevant to IoT scenarios."]} +{"205288494|1230643": ["Heterogeneous WSN consists of multiple, simple, low-cost sensor nodes that have limited computational and communicational capabilities and of at least one sink node, also called gateway node (GWN) [28]."]} +{"30180580|14849079": []} +{"30180580|3348390": []} +{"30180580|10150488": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"64540876|5747564": []} +{"52989042|14849079": []} +{"52882934|3628110": []} +{"52882934|7971188": []} +{"36533107|1230643": []} +{"6322882|205286988": []} +{"6322882|1230643": []} diff --git a/edge/graph_202768538.jsonl b/edge/graph_202768538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fdbf0c25b628a360b2679335310c34964ffaf7e --- /dev/null +++ b/edge/graph_202768538.jsonl @@ -0,0 +1,22 @@ +{"13556230|45073059": ["Uusitalo et al. (2015) reviews methods such as the use of multiple models, model emulation, and sensitivity analysis, to estimate the uncertainty of such deterministic models.", "P1, P2, P4 M4 Barnaud et al., 2013; Delgado-Galv (cid:1) an et al., 2014; Uusitalo et al., 2015 6a Evaluation of outputs (or impact evaluation P4-5 Butler et al., 2014; Carmona et al., 2013; Delgado-Galv (cid:1) an et al., 2014; Fraternali et al., 2012; Fritz et al., 2012; Graveline et al., 2014;\u2026"]} +{"8453709|519014": ["To facilitate the discovery of Web Services, the OWL-S service ontology has been used to assign the semantics to Web Services (Cabral et al., 2004; Martin et al., 2004)."]} +{"38732360|6159806": ["\u2026and industrial consortia have already proposed multiple solutions for web services composition and execution both in domain-independent contexts (Dustdar and Schreiner, 2005; Agarwal et al., 2004; Milanovic and Malek, 2004; Ko and Neches, 2003) and in the geospatial domain in particular\u2026"]} +{"77394521|14435082": ["Especially for GKBs generated from volunteered geographic information (VGI), this problem is more prominent [123]."]} +{"77394521|10416225": ["Element-based techniques consider entities in isolation, leveraging information about entity itself to perform alignment [32]."]} +{"77394521|386036": [", entity resolution [13,14], duplicate detection [15], record linkage [16], etc."]} +{"77394521|913718": ["Specific implementation techniques are consistent across different basic ideas and can be divided into three types: Element-based, structure-based, and hybrid techniques [31]."]} +{"8053067|7842253": ["Zhan et al. (2015) proposed several research directions for cloud resource scheduling, including real-time, adaptive dynamic, large-scale, multi-objective, and distributed and parallel scheduling.", "\u2026for resources in different aspects of adaptive dynamic, large-scale, multi-objective and distributed and parallel capabilities for optimized activation and cost saving, especially for disruptive stream data and applications (Tang et al. 2015; Zhang, Chen, and Yang 2015; Zhan et al. 2015); and ."]} +{"8053067|2398835": ["Finally, ensuring data consistency and integrity is challenging with Big Data especially when the data change frequently and are shared with multiple collaborators (Khan et al. 2014).", "These privacy issues expose a gap between the convention policies/regulations and Big Data and call for new policies to address comprehensively privacy concerns (Khan et al. 2014; Eisenstein 2015).", "However, analyzing Big Data challenges the complexity and scalability of the underlying algorithms (Khan et al. 2014)."]} +{"53242110|779672": ["In the geospatial community, most studies have been concentrated on the manual or semi-automatic composition of OWSs (see References [20\u201328]).", "2018, 7, 404 4 of 20\nagents\u2019 actions and avoid conflicts, a plan consisting of actions of all participating agents is generated, so that execution of that plan leads to the satisfaction of the global goal of the system along with the personal goal of every agent (for a detailed review of multi-agent AI planning techniques see Reference [41]).", "While the OGC implementation specifications (see References [43\u201347]) address the syntactic aspects of OWSs, the semantic annotation can be used to provide the semantic description.", "\u2022 \ud835\udc36\ud835\udc41\ud835\udc39(\ud835\udc5e) is a function that converts a SPARQL ask query, \ud835\udc5e, to a conjunctive normal form (CNF) (see References [52,53]), where the query is represented as a conjunction of triple patterns.", "That\u2019s mainly because, as the number of available OWSs increases, the search space of the AI planning grows exponentially (see References [14\u201316]).", "agents\u2019 actions and avoid conflicts, a plan consisting of actions of all participating agents is generated, so that execution of that plan leads to the satisfaction of the global goal of the system along with the personal goal of every agent (for a detailed review of multi-agent AI planning techniques see Reference [41]).", "Although the AI planning techniques have proved to be the most promising solution for automatic composition of web services (see Reference [13] for a detailed comparison of web service composition techniques) and hence the automatic composition of OWSs, they still encounter serious problems in terms of dealing with real-world scenarios.", "\u2022 CNF(q) is a function that converts a SPARQL ask query, q, to a conjunctive normal form (CNF) (see References [52,53]), where the query is represented as a conjunction of triple patterns."]} +{"13151033|14074802": ["Those are often created automatically [70]."]} +{"13151033|12161567": ["The numbers follow the latest DBpedia 2014 release6, the YAGO3 release [47], the Freebase website7, the NELL statistics heatmap8, the recent version of Cyc9, an announcement about the Google Knowledge Graph by Google10, the Wikidata class and property browser11 and a recent article on Wikidata [81], as well as the comparison of knowledge graphs in [16] and [55]."]} +{"13151033|3646491": ["In particular, for many of the methods applied in the works discussed above \u2013 such as outlier detection or association rule mining \u2013 graph-based variants have been proposed in the literature [2,43]."]} +{"13151033|11608263": [", Arnold Schwarzenegger being both an Actor and a Politician), and single-label classification, which only assigns one class to an instance [100]."]} +{"402066|40144859": []} +{"26963105|11814056": ["2010, Granell et al ."]} +{"31807284|519014": []} +{"9390495|11814056": ["Examples of OGC Web Service standards include Web Feature Service (WFS), Web Map Service (WMS), Web Coverage Service (WCS), Sensor Observation Service (SOS), Catalogue Services for Web (CSW), and Web Processing Service (WPS).", "In the past decades, significant efforts have been devoted towards the technological development of IEM systems (Granell et al., 2013a).", "\u2026129 Luoyu Road, Wuhan, 430079, China\na r t i c l e i n f o\nArticle history: Received 22 August 2014 Received in revised form 23 February 2015 Accepted 20 March 2015 Available online\nKeywords: Geoprocessing workflow Geospatial services Integrated modelling Event OpenMI GIS\n* Corresponding author.", "Some proposals have been available to extend WPS to wrap models (Nativi et al., 2013; Bastin et al., 2013; Castronova et al., 2013a).", "\u2026than software coupling (e.g., data sets should be treated as components on the same level as models) (Voinov and Shugart, 2013), the software module coupling tools such as workflow tools do show promise for right solutions (Voinov and Shugart, 2013; Laniak et al., 2013b; Granell et al., 2013a).", "However, some proposals have been\navailable to address these challenges, such as adding formalized models as the payload in a WPS 2.0 extension (Nativi et al., 2013), profiling of the WPS for models (Bastin et al., 2013), and maintaining state on the WPS server (Castronova et al., 2013a).", "Considering the promise of the MaaS approaches (Nativi et al., 2013; Bastin et al., 2013; Castronova et al., 2013a), the workflow tool allowsmodels as services to be chained, oncemodels are accessible through WPS.", "From the perspective of component-based software engineering (Sommerville, 2004), models (a given functionality, executables, or algorithmic code) could be treated as software components working together using workflows (Bastin et al., 2013; Granell et al., 2013b).", "In this way, different models could be implemented as services, often accessible through Web Service interfaces, and coupled through service-oriented workflows (Granell et al., 2010; Bastin et al., 2013; Nativi et al., 2013).", "Component-based modelling has been widely used in existing IEM tools (Granell et al., 2013a).", "There are also some open source scientific workflow tools, such as Kepler\n(Lud\u20acascher et al., 2006), Taverna (Oinn et al., 2004), and Vistrails (Callahan et al., 2006), which have been used for IEM (Bastin et al., 2013; Granell et al., 2013a; van Zyl et al., 2012)."]} +{"9229967|913718": ["These dimensions refer to the input (format and interpretation), the matching process (the computation model and the interpretation of different inputs), and the output (the con-\ufb01dence measure and the relationships between terms) (Shvaiko and Euzenat 2005).", "Figure 1 illustrates the matching process, where O and O are the ontologies, A is an optional input alignment to enhance, P is a set of parameters (weights, thresholds, etc.), and E is a set of external resources (thesaurus, etc.) (Shvaiko and Euzenat 2005)."]} +{"12763996|11814056": ["However, the lack of user control and interactivity during execution appears to limit the application in using model-services (Granell et al., 2013; Zhang et al., 2015b)."]} +{"49603961|11089739": []} +{"5924671|11814056": ["Correspondingly, review articles on online geoprocessing and related developments focus on technological components and tools and overviews of application domains (Bernard et al. 2013; Granell, Schade, and Ostl\u00e4nder."]} diff --git a/edge/graph_202769352.jsonl b/edge/graph_202769352.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a907870a63eb585c79da6800a5a57a9d44710712 --- /dev/null +++ b/edge/graph_202769352.jsonl @@ -0,0 +1,10 @@ +{"17516613|7365537": ["A review of literature [2], [3], [4], shows various technology options for the design of an ILS which may be ultrasonic(US), infrared (IR), radio-frequency (RF) based systems which may be radio-frequency identification (RFID), received signal strength (RSS) of RF signals, Bluetooth, wireless local area network (WLAN), ultra-wideband (UWB), camera based vision analysis etc."]} +{"17516613|206583375": []} +{"58544383|33247252": []} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"482252|33247252": ["The application and services provided by the IoT can be both residential and commercial ranging from e-health [24], e-marketing [25], intelligent car parking system [26], intelligent transportation system [27], [28], automation, and logistic services."]} +{"3249290|53116003": ["While we discuss the type of services that localization can provide by leveraging the IoT framework [87] in Section VII, below we present and"]} +{"3249290|4427557": ["Low Power Wide Area Networks (LPWANs) such as LoRA and Sigfox in its current shape cannot provide high localization accuracy and must be combined with other localization techniques and technologies for higher localization accuracy [156]."]} +{"3249290|6396569": ["Amundson and Koutsoukos [11] presents a survey on different localization methods for wireless sensors."]} +{"3249290|206583375": []} diff --git a/edge/graph_202774116.jsonl b/edge/graph_202774116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e14a74ed8c4e73966169758b0140c7d75690ad6 --- /dev/null +++ b/edge/graph_202774116.jsonl @@ -0,0 +1,2 @@ +{"4845332|2916525": []} +{"6373762|2916525": ["superior and middle temporal, and temporo-parietal regions [5]."]} diff --git a/edge/graph_202779522.jsonl b/edge/graph_202779522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202786319.jsonl b/edge/graph_202786319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..378c2fa22e9ade06a752363c2296c1bab6958ffd --- /dev/null +++ b/edge/graph_202786319.jsonl @@ -0,0 +1 @@ +{"6844906|16768404": ["When the techniques based on supervised machine learning are used, a set of labeled training samples [18, 20, 27] . is needed [28\u201332] .", "Sentiment analysis and opinion mining are interrelated research areas, which are computational studies of opinions, sentiments, emotions, and attitude expressed in texts about an entity [18\u201321] .", "In some existing studies, it is regarded that the expressions of sentiment analysis and opinion mining can be replaced by each other [18\u201321] .", "However, some scholars think there are slight difference between sentiment analysis and opinion mining [18, 26] .", "The detailed surveys of the existing studies can be found in literatures [18\u201321] .", "In the last few years, more than dozens of sentiment analysis techniques have been proposed [18\u201321] .", "It is regarded that opinion mining mainly focuses on extracting and analyzing people\u2019s opinion about an entity, while sentiment analysis mainly focuses on identifying the sentiment expressed in a text than analyzes it [18, 26] .", "1 [18, 20, 27] ."]} diff --git a/edge/graph_20286372.jsonl b/edge/graph_20286372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b191a0e0fbb7a09e6c14e12c3a2461a97494ac39 --- /dev/null +++ b/edge/graph_20286372.jsonl @@ -0,0 +1,12 @@ +{"117947931|12122055": ["A recent literature on the mathematics of social systems provides useful hints toward this approach, see among others [2, 8, 19, 20]."]} +{"1680279|6972141": ["), as well as the pedestrian\u2019s own current position within it (or localization, a fundamental problem in robotics [7])."]} +{"12068597|1708582": ["where the \u03b3 \u2208 [0, 1[ parameter is the discount factor and the expectation is taken over the probabilistic state transition P [28]."]} +{"4915696|5755403": ["Although many algorithms have been developed to track, recognize and understand the behaviors of various objects in video [9], they were mainly designed for common scenes with a low density of population [5], [6], [10]."]} +{"4915696|17516538": ["Motion patterns learning is important in automated visual surveillance [5], [6], [21].", "To fuse information from multi-sensors is always an effective way to reduce the confusion and to improve the accuracy [6].", "Video analysis and scene understanding usually involve object detection, tracking and behavior recognition [5], [6].", "In this work, we use the Horn/Schunk - Lucas/Kanade method proposed by Bruhn et al. [6] which we found to be a good compromise between precision and speed.", "Although many algorithms have been developed to track, recognize and understand the behaviors of various objects in video [9], they were mainly designed for common scenes with a low density of population [5], [6], [10]."]} +{"15010946|1708582": ["Reinforcement learning techniques have been used successfully to find policies for local motion behaviors without knowledge of the environment (Kaelbling et al., 1996)."]} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"17044933|7624176": []} +{"35094382|763939": []} +{"35094382|870434": ["Underwater communication presents several challenges [8,18]: almost all underwater communication uses acoustic waves, since radio waves suffer severe attenuation in salty water; the medium access is an open problem in underwater networks; nodes are expensive and the monitoring areas are 6 V."]} +{"35094382|1230643": ["Those networks employ low power sensor nodes due to size, price and battery constraints, and as such the network lifetime is usually short [27]."]} +{"39206144|7788290": ["Furthermore, taking pictures or video surveillance of unknown people is always a privacy issue and has to be discussed carefully in certain scenarios [6]."]} diff --git a/edge/graph_202888951.jsonl b/edge/graph_202888951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f9c9ef89fafccce1b6a77425251953413fdfa3a --- /dev/null +++ b/edge/graph_202888951.jsonl @@ -0,0 +1,93 @@ +{"52343892|206578365": ["Several pioneer works have been proposed and realize quite good results in their assuming settings based on convex optimization, game theory and so on [3] [4] .", ", a typical 5G node is expected to have 2000 or more configurable parameters, a recent new trend is to optimize wireless communication by Artificial Intelligence (AI) techniques [4] [5], include but not limited to the application of AI for Physical Layer (PHY), Data Link Layer, and traffic control [6]."]} +{"155100360|206578365": ["The recently proposed Mobile Edge Computing (MEC) platform [6] enables resource-constrained devices to offload latency-critical and computation-intensive tasks to the edge server."]} +{"14757739|13172512": [", [27, 54, 49, 23, 25]) and machine learning algorithms pervade several contexts of information technology.", "For example, classification and regression models are employed to analyze current and historical trends to make predictions in financial markets [24, 33, 8], to study biological problems [54], to support medical diagnosis [30, 42, 57], to classify network traffic or detect anomalies [22, 28, 39, 12, 49].", "SVM for network traffic classification As shown by the extensive literature on this topic [28, 27, 49, 15], network traffic classification is commonly realized by means of Machine Learning algorithms, like K-Means, HMM, decision trees, and SVM."]} +{"197935335|202888951": ["To the best of our knowledge, existing articles that are most related to our work include [18]\u2013[21].", "Besides, discussions about DL inference and training are the main contribution of [19]\u2013[21]."]} +{"197935335|56517517": ["as Multi-Agent Deep Reinforcement Learning [288]\u2013[290], Graph Neural Networks (GNNs) [291], [292], can also be exploited to facilitate this process."]} +{"197935335|54559476": []} +{"197935335|52015330": ["More detailed information can be found in [8], [22], [23].", "Certainly, edge computing and cloud computing are not mutually exclusive [7], [8]."]} +{"197935335|206578486": ["More detailed information can be found in [8], [22], [23]."]} +{"197935335|22163846": ["general neural network structures, existing optimization methods can be divided into four categories [128]: 1) parameter pruning and sharing [129], [130], including also weights quantization [131]\u2013[133]; 2) low-rank factorization [124]; 3) transferred/compact convolution filters [107], [134], [135]; 4) knowledge distillation [136]."]} +{"197935335|206578224": ["With network slicing, customized and optimized resources can be provided for Edge DL services, which can help reduce latency caused by access networks and support dense access to these services [77]."]} +{"197935335|3757239": ["with respect to comprehensive resource optimization [16] is challenging, particularly under the premise of considering key enablers of the future network, including Software-Defined", ", edge caching [16], computation offloading [17]."]} +{"197935335|6909107": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"3586416|20905429": ["Examples of potential applications include: learning sentiment, semantic location, or activities of mobile phone users; predicting health events like low blood sugar or heart attack risk from wearable devices; or detecting burglaries within smart homes [3, 37, 40]."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"1033682|174797842": []} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"51939470|3645740": []} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"283826|8909218": ["One solution to enhance indoor coverage are the so-called FAPs (Femtocell Access Point) or home base stations [2]."]} +{"18129749|6444031": ["The ability to prevent multiple identities from a single machine, is key in preventing a Sybil attack, this combined with the expensive cost of entrance [20] to our network, makes it unviable for all but the most powerful adversary to conduct a Sybil attack on the network."]} +{"11438116|7971188": ["To make Gaia more scalable with more data centers, we use the concept of overlay networks [48]."]} +{"59337327|15662958": ["s little possibility of leakage at the raw data level. Recent works adopted homomorphic encryption for centralizing and training data on cloud [75, 76]. In practice, Additively Homomorphic Encryption [2] are widely used and polynomial approximations need to be made to evaluate non-linear functions in machine learn algorithms, resulting in the trade-offs between accuracy and privacy [4,35]. 2.2.1 Indi"]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"51921962|6909107": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [4], [5], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"51921962|206578365": ["However, it is challenging to perform distributed machine learning on resource-constrained MEC systems.", "In contrast to the above research, our work in this paper formally addresses the problem of dynamically determining the global aggregation frequency to optimize the learning with a given resource budget for federated learning in MEC systems.", "With the increasing amount of data being generated by new applications and with more applications becoming data-driven, one can foresee that machine learning tasks will become a dominant workload in distributed MEC systems in the future.", "Existing work on MEC focuses on generic applications, where solutions have been proposed for application of\ufb02oad-ing [10], [11], workload scheduling [12], [13], and service migration triggered by user mobility [14], [15].", "Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [4], [5], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability.", "In addition, the approach in [24] is designed empirically and does not consider a concrete theoretical objective, nor does it consider computation resource constraint which is important in MEC systems in addition to constrained communication resource."]} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"201126242|1083483": ["r privacy in machine learning, there are many other privacy de\ufb01nitions, such as k-anonymity [36], d-presence [81] and distance correlation [117], that may be applicable to different learning problems [118]. 10 !"#$"# %"$&'"! (a) Federated learning without additional privacy protection mechanisms. !"#$"# %"$&'"! (b) Global privacy, where a truste"]} +{"201126242|20905429": ["te nature of the data and the limited connectivity of each device. Federated learning methods can help to train models that ef\ufb01ciently adapt to changes in these systems while maintaining user privacy [84, 98]. 1.1 Problem Formulation The canonical federated learning problem involves learning a single, global statistical model from data stored on tens to potentially millions of remote devices. We aim to le"]} +{"20156489|1230643": ["In these unattended environments, these sensors cannot be easily replaced or recharged, and energy consumption is the most critical problem that must be considered [2], [3]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"49182926|10064368": ["Thus, home energy management system (HEMS) in smart home has become the emerging trend research topic in most countries [2]."]} +{"49577186|5385031": []} +{"165163986|3273340": ["Interested readers are encouraged to refer to the recent monograph [114] for more comprehensive discussions about recent advancements on hardware acceleration for DNN processing."]} +{"165163986|206578365": ["Essentially, the physical proximity between the computing and information-generation sources promises several benefits compared to the traditional cloud-based computing paradigm, including low latency, energy efficiency, privacy protection, reduced bandwidth consumption, on-premises, and context awareness [6], [8]."]} +{"3269862|18188725": []} +{"3269862|393948": []} +{"49333709|3645740": ["Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different."]} +{"49333709|13172512": ["For instance, Nguyen and Armitage [339], though impactful, is now dated and only addresses traffic classification in networking.", "Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different."]} +{"49333709|17464562": ["Depending on the nature of the action set, the learning automata is classified as Finite Action-set Learning Automata (FALA) or Continuous Action-set Learning Automata (CALA) [330]."]} +{"199675397|4570697": ["However, degrees of users\u2019 preference on services belong to theirs privacy information [15,34] , which may include users\u2019 locations [1] , environments and personalized demands that users do not want to reveal [2,18] ."]} +{"38352604|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} +{"14106275|14545307": []} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"206742471|8777381": ["It is well accepted amongst the research community that certain acoustic and prosodic features play an important role in recognising the affective state [28]."]} +{"51934871|53958589": []} +{"51934871|13172512": [", Voice over IP [56]."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"37925315|12681089": []} diff --git a/edge/graph_202889165.jsonl b/edge/graph_202889165.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..089e370409130260724e80399c3188e33ea4c55d --- /dev/null +++ b/edge/graph_202889165.jsonl @@ -0,0 +1,2 @@ +{"2327492|15294930": ["Several variants have been proposed to study the integer partitions [10], the structure of the phase space [11,12,5], and how perturbations of local rules interact with this structure [13,14]."]} +{"26447468|7023859": ["We refer the reader to [ 15, 9, 1, 8, 7, 2 ] for an up-to-date overview and recent results on classical CA."]} diff --git a/edge/graph_20293504.jsonl b/edge/graph_20293504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_202989823.jsonl b/edge/graph_202989823.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f930334dbb817035253c706b7fb3f5387243a299 --- /dev/null +++ b/edge/graph_202989823.jsonl @@ -0,0 +1 @@ +{"3182275|54009499": []} diff --git a/edge/graph_20299270.jsonl b/edge/graph_20299270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..161f25f68f64b9bfdce33a0b64eeee3607cb0053 --- /dev/null +++ b/edge/graph_20299270.jsonl @@ -0,0 +1,3 @@ +{"62535974|14441987": ["As already discussed in Section 2, the traditional routing algorithms (e.g., DSDV, CGSR, GSR, FSR, HSR, WRP, etc. in [4, 5] and AODV, DSR, TORA, ABR, SSR, etc. in [4, 6]) lack power-aware routing.", "These algorithms can be classi\ufb01ed into two groups: table-driven routing (such as DSDV, CGSR, GSR, FSR, HSR, WRP, etc.) [4, 5], and source-initiated on-demand routing (such as AODV, DSR, TORA, ABR, SSR, etc.) [4, 6]."]} +{"62535974|1762301": ["Also, AODV has been found to be more scalable and the packet delivery ratio is better in case of AODV when compared to DSR [45]."]} +{"43480841|534755": []} diff --git a/edge/graph_203036050.jsonl b/edge/graph_203036050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..460084f070ff9ccdf25835af9fb27cf689bb2320 --- /dev/null +++ b/edge/graph_203036050.jsonl @@ -0,0 +1,2 @@ +{"66324164|15683871": []} +{"13779386|206051485": ["Image registration is a fundamental step in many image processing and analysis tasks, such as in remote sensing, in medicine, in computer vision, and more recently in Cultural Heritage applications (multispectral analysis of pigments) [14, 15, 16, 18]."]} diff --git a/edge/graph_203041564.jsonl b/edge/graph_203041564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c3b857cc740834cfacb2fc538048a9f4788bfd2 --- /dev/null +++ b/edge/graph_203041564.jsonl @@ -0,0 +1,14 @@ +{"13111821|30747069": ["For more information on the high-level syntax and temporal scalability of HEVC, the reader is referred to [14]."]} +{"115197191|396631": ["264/AVC) [9]."]} +{"115197191|750942": ["To ensure a fair comparison, the proposed prediction structure in [12] is also implemented using MV-HEVC.", "To this end, in this paper we propose an efficient twodimensional inter-view prediction structure using the multiview extension of HEVC (MV-HEVC) [14] for coding light field video sequences.", "CONCLUSION In this paper, we have introduced an efficient threedimensional prediction structure in MV-HEVC for coding light field video sequences captured by light field cameras.", "Our proposed scheme is applied to MV-HEVC version 16.2 software [15]."]} +{"17605400|3540699": []} +{"210863398|203041564": ["In previously published work, we have stressed the importance of choosing the appropriate scanning topology and the correct view indexing in the spatial domain [3].", "9a for a light field with 4\u00d74 views, similar to our previous work [2, 3]."]} +{"210863398|64404": ["The high efficiency video coding (HEVC) extension, namely multiview HEVC (MV-HEVC) is the latest MVC standard and it treats each sub-aperture view as a different HEVC video sequence [22, 23, 25]."]} +{"210863398|750942": ["The high efficiency video coding (HEVC) extension, namely multiview HEVC (MV-HEVC) is the latest MVC standard and it treats each sub-aperture view as a different HEVC video sequence [22, 23, 25].", "A similar format, namely multi-view plus depth (MVD), is using the 3D-HEVC extension for coding light field video by treating only a given view (typically the center view) or a set of views as video sequences, and the other sub-aperture views as depth (disparity) maps [25]."]} +{"5566469|396631": ["On the other hand, the inter-view prediction adopted in multi-view video coding (MVC) [32] standard can achieve an improved compression capability for multi-view video sequences."]} +{"5566469|750942": ["Moreover, the latest multiview extension of the high-efficiency video coding (HEVC) standard also adopts the same design principle as MVC [35]."]} +{"64404|14889616": ["A luma CTB covers a rectangular picture area of L\u00d7L samples of the luma component and the corresponding chroma CTBs cover each L/2\u00d7L/2 samples of each of the two chroma components."]} +{"64404|3540699": ["It is, rather, a plurality of smaller improvements that add up to the significant gain."]} +{"660425|30747069": ["A more detailed comparison of the NAL unit header designs in AVC and HEVC as well as the motivation of the NAL unit header design in HEVC and its extensions can be found in [11].", "\u20262) essential information of operation points needed for session negotiation, including e.g., profile and level; and 3) other operation-point-specific information that does not belong to one specific SPS, e.g., hypothetical reference decoder (HRD) parameters for layers or sub-layers [11]."]} +{"660425|64404": ["S INCE the recent completion of the first edition of the High Efficiency Video Coding (HEVC) standard [1], [2], now approved as ITU-T H.", "A more detailed description of the key technical features can be found in [2]."]} +{"660425|396631": []} diff --git a/edge/graph_203073953.jsonl b/edge/graph_203073953.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72b803eb9a11461485e6415d4447ccb1269381fa --- /dev/null +++ b/edge/graph_203073953.jsonl @@ -0,0 +1,128 @@ +{"96431652|61132": ["Therefore, the UAV relays assisted communication could provide solutions for the IoT network and have several advantages, such as its convenient deployment and lower cost, high-altitude assisted transmission and so on [4], [5]."]} +{"96431652|12029139": ["However, the UAV is a battery-powered terminal, which has limited battery life and its power consumption has a significant influence on the communication process [3], [8], so the transmission protocols should be designed to maximize the system throughput and minimize the transmitting power, therefore, the UAV relay assisted communication protocols in IoT system enhanced with energy harvesting are proposed and analyzed in this paper detailedly."]} +{"46973566|49574823": ["In addition, technologies like blockchain [26] or Directed Acyclic Graph (DAG) [27] will provide access to all the information in"]} +{"46973566|4625011": ["Some of them have been studied for a long time [21], [22], but they are still not mature for a massive industrial deployment, like Augmented Reality (AR), [23], [24]."]} +{"46973566|31216129": []} +{"46973566|3579945": ["Obviously, with such a dependence on networks, cybersecurity will be essential, specially when protecting critical infrastructures [28], [29]."]} +{"46973566|13991708": ["Therefore, it implies the massive deployment of industrial sensors, actuators and machines with remote sensing/actuation capabilities [34]\u2013[36]."]} +{"46973566|1262156": ["Human-centered smart systems [2]\u2013[6], together with"]} +{"46973566|206583375": ["Infrared systems work in a similar way, but by measuring the time required by a line-ofsight non-visible light transmission [120]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"15699494|4716814": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"15699494|1932843": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"145052169|3557411": [", the energy efficiency of wireless networks [33]."]} +{"39444322|205286988": []} +{"201877465|51858916": ["Compared to the conventional cellular network infrastructure such as ground base stations (GBSs), UAVs are highly mobile, much cheaper and faster to deploy, and able to establish favorable line-of-sight (LoS) communication channels due to their high-altitude deployment for more reliable transmissions [5], [6].", "This can be easily verified using the expression of LoS probability included in some relevant channel modeling literature such as [6]."]} +{"201877465|61132": ["Compared to the conventional cellular network infrastructure such as ground base stations (GBSs), UAVs are highly mobile, much cheaper and faster to deploy, and able to establish favorable line-of-sight (LoS) communication channels due to their high-altitude deployment for more reliable transmissions [5], [6].", "Unlike fixed terrestrial communication infrastructure such as GBSs, the performance of UAV systems is fundamentally limited by the on-board energy [5]."]} +{"86700496|49527603": ["[27], [28] presented a key features overview for blockchains, covering both public and"]} +{"86700496|13688847": ["[31] presented the design methodologies for consensus incentive mechanisms in blockchain."]} +{"86700496|3628110": ["A list of the different block propagation mechanisms used in existing blockchains can be found in [32].", "[32] surveyed attacks against blockchain networks, while security issues and challenges are briefly presented in [33]."]} +{"86700496|27262729": ["strategies [226]; starting from withholding (relay-delay [227]), ending with net-split and gold-finger attacks [7].", "[7] survey security and privacy issues of the Bitcoin blockchain, while Khalilov and Levi [13] focus on surveying techniques enhancing anonymity and privacy in blockchains based on PoW consensus with an emphasize on Bitcoin.", "ing and Sybil attacks, without addressing other important aspects [7], [8] such as: (i) complete anonymity \u2013 Bitcoin provides its users with only pseudonymity; (ii) blocks have"]} +{"46933660|61132": ["For an instance, the battery capacity of a small-type UAV with a payload of 300 g is only around 5200 mAh, which is equivalent to eight alkaline batteries [10]."]} +{"49544876|49574823": ["The information of such elements can be managed locally or from higher layers (through a gateway, a cloud computing system, and even through a blockchain [20])."]} +{"49544876|46973566": ["Thus, intelligent sensors, besides being able to process the collected information, have to perform additional computing tasks, exchange data through wired or wireless networks, add connectivity with actuators, or include some kind of display [21]."]} +{"49544876|4625011": []} +{"49544876|3579945": ["Examples of IoT applications can be found for smart cities [3], smart homes [4,5], e-health [6], intelligent transportation [7\u20139], critical infrastructures [10], precision agriculture [11], smart factories [12\u201314], or for Industry 4.0 [15\u201318]."]} +{"49544876|13991708": ["Examples of IoT applications can be found for smart cities [3], smart homes [4,5], e-health [6], intelligent transportation [7\u20139], critical infrastructures [10], precision agriculture [11], smart factories [12\u201314], or for Industry 4."]} +{"199012443|56482358": ["[67] carried out a systematic review of UAV networks, with an emphasis on the impact of CPS components on the system performance of UAV networks.", "networks [25], [67], [68], UAV cellular networks [11], [66], UAV-enabled wireless networks [8], FANETs [24], and multi-tier drone networks [12], several other surveys have also been published on different topics with regard to UAV-related networks and communications, such as channel modeling [77], civil applications [1], [78], UAV-assisted"]} +{"199012443|52169284": ["[11] conducted a comprehensive survey on some major networking issues about UAV cellular communications, such as standardization efforts for aerial UE, deployment of aerial BSs, drone communication prototypes,", "application layer to secure wireless transmissions [11].", "networks [25], [67], [68], UAV cellular networks [11], [66], UAV-enabled wireless networks [8], FANETs [24], and multi-tier drone networks [12], several other surveys have also been published on different topics with regard to UAV-related networks and communications, such as channel modeling [77], civil applications [1], [78], UAV-assisted", "Although UAV-assisted wireless networks and mmWave communications have been studied extensively in previous works, existing surveys and tutorials either cover UAV-assisted wireless networks and UAV communications for 5G and beyond [8], [11], [12], [24], [25], [66]\u2013[68], or concentrate on mmWave communications for 5G and vehic-"]} +{"199012443|49272228": ["vehicular networks [30], wireless charging techniques [79], IoT services [6], game-theoretic optimization approach [80], CR-based UAV [39], etc."]} +{"199012443|51858916": ["networks [25], [67], [68], UAV cellular networks [11], [66], UAV-enabled wireless networks [8], FANETs [24], and multi-tier drone networks [12], several other surveys have also been published on different topics with regard to UAV-related networks and communications, such as channel modeling [77], civil applications [1], [78], UAV-assisted"]} +{"199012443|21557844": ["[71] were both targeted at mmWave propagation characteristics and channel modeling.", "mmWave communications for 5G and B5G were also reported in recent literature [50], [70], [71].", "larger bandwidth translates to extremely high data rates, easily achieving the peak data rates of 10Gbit/s or more with full duplex capability, which is much greater than the limit rate of 1Gbit/s by using lower microwave frequencies [71]."]} +{"199012443|22221919": ["According to the constraint that the transmit power allocation of mmWave-NOMA TX to ground users was based on channel quality between ground user and flying BS, each ground user should send its feedback information about channel quality back to mmWave-NOMA TX.", "Under the downlink mmWave-NOMA transmission scenario where one UAV-based flying BS equipped with an M element of ULA array serving multiple ground users with single antenna, Rupasinghe et al. [122], [143]\u2013[145] used the simplified channel vector to model the LOS propagation channel between UAV and ground users.", "With this integration of two promising techniques, three kinds of typical applications can be summarized as follows:\na: AERIAL ACCESS VIA A2G/G2A MmWave LINKS As previously introduced, UAVs can be used to provide aerial access from the sky to ground UEs in a certain area of interest.", "In many instances, typical applications for aerial access using A2G and G2A mmWave links include downlink NOMA transmission to serve ground UEs simultaneously [122], flying\ncache-enabled remote radio heads (RRHs) by deploying cache storage units at UAVs [37], flying BSs with multiple transmit antennas to provide wireless access to ground legitimate receivers [123], etc.\nb: AERIAL RELAY AND INTERCONNECTION VIA A2A MmWave LINKS UAVs can further serve as aerial relays to provide wireless connectivity towards ground UEs without direct transmission links.", "radio [41], network densification [42], non-orthogonal multiple access (NOMA) [43], advanced channel coding and modulation [44], cooperative relaying [45], etc.", "Technically, the integration of collective intelligence into the drone swarm will ultimately bring lots of benefits for 5G cellular mobile systems, e.g., higher downlink spectral efficiency and better quality of experience (QoE) for ground UEs.", "The effect of the UAV-mounted mmWave APs on the throughput of ground UEs and the coverage probability in the case of a non-uniform load was investigated.", "To increase the spectral efficiency and serve more ground users simultaneously, Rupasinghe et al. [122], [143], [144] proposed a downlink NOMA transmission mechanism at UAV-based flyingBS operating inmmWave frequency bands.", "A. ANTENNA TECHNIQUE As an important component of UAV-assisted wireless networks with 5G mmWave communications, the antenna acts as wireless interface to transmit and receive mmWave signals for UAVs and ground UEs.", "C. MULTIPLE ACCESS MECHANISM The UAVs acting as flying BSs can provide aerial access to ground UEs during temporary events, e.g., hotspot areas and large public venues, where a large number of UEs straining the available wireless resources.", "Moreover, channel vector or channel matrix are required to be properly formulated to characterize the propagation behavior of mmWave channels between UAVs and ground UEs.", "In the following subsection, we will summarize the related research on NOMA [122], [143]\u2013[145] and SDMA [10], [158] for UAV-assisted wireless networks with mmWave communications.", "The aerial deployment has been regarded as a promising way to provide ubiquitous access from the sky towards ground user equipments (UEs) in specified areas during temporary events (e.g., hotspot areas and large public venues) [8], [12], [13], [15]\u2013[18].", "More precisely, the transmit power allocation towards each ground user via the NOMA\n117484 VOLUME 7, 2019\ntransmission should be conducted in a way inversely proportional to its channel quality.", "access solution for 5G to improve spectral efficiency and support many thousands of UEs [43], [155]\u2013[157].", "According to the potential position relations between UAVs and ground UEs, the distribution range of beamforming angles can be actually predicted as a priori knowledge.", "In addition, narrow mmWave beams and possible mobility of ground UEs make it very difficult to properly steer and align the highly directional beams for mmWave antenna arrays at the side of UAVs or ground UEs [10], [32].", "The authors noted that mmWave-NOMA with distance feedback can exhibit better outage sum rates compared to conventional orthogonal multiple access (OMA).", "On the one hand, they can be deployed as flying BSs to enable aerial access to ground UEs in target areas.", "It will further help to protect the sensitive and legitimate messages for ground UEs from passively eavesdropping and actively jamming,\nespecially for A2G mmWave links under the scenario of aerial BSs enabled cellular systems.", "The important lessons learned from the review of related research on NOMA and SDMA are summarized as follows: \u2022 The proposed NOMA and SDMA mechanisms all fall into the category of mmWave downlink transmission, wherein UAV-based flying BS serves as the TX side of\nVOLUME 7, 2019 117485\nmultiple access.", "As such, achieving dynamic beam alignment between UAVs and ground UEs with lower overhead and computational complexity will be incredibly complicated and challenging.", "To be precise, depending on the transmission direction between UAVs and ground UEs, bidirectional mmWave links consist of the A2G links (i.e., downlink) and the ground-to-air (G2A) links (i.e., uplink).", "Consequently, much more spectrally efficient multiple access techniques are required for enablingmultiple UEs to share the same availablewireless resources, to support massive connectivity while maintaining the requirements of different quality of service (QoS).", "Nevertheless, due to the decrease of beamwidth of mmWave signals and the mobility of UEs, it will become more and more difficult to effectively align the beams between TX and RX sides [111], [119].", "Several enabling techniques have been proposed to achieve enhanced network capacity and higher spectral efficiency for future cellular systems, e.g., massive multiple-input and multiple-output (MIMO) [40], cognitive radio [41], network densification [42], non-orthogonal multiple access (NOMA) [43], advanced channel coding and modulation [44], cooperative relaying [45], etc. Neverthe-\n2Here the IEEE 802.11 standards refer to the set of WLAN protocols that specifies the set of media access control (MAC) and physical layer (PHY) specifications.", "We have provided a review on existing works about two kinds of multiple access techniques for mmWave downlink transmission, i.e., NOMA and SDMA, for UAV-assisted wireless networks with 5G mmWave communications.", "On the other hand, UAVs can be utilized as mobile relays to provide wireless connectivity for partitioned ground UEs without any direct line-of-sight (LOS) transmission links because of the blocking of physical obstacles like mountains or buildings [9], [19].", "Recently, NOMA has been regarded as an effective multiple access solution for 5G to improve spectral efficiency and support many thousands of UEs [43], [155]\u2013[157].", "Three feedback schemes to measure the channel quality used in downlink NOMA transmission mechanisms have been summarized in Table 8.", "In the typical scenario, multiple rotary-wing drones act as flying BSs, aerial radio access points, and aerial relays via A2G mmWave beams to expand wireless coverage footprint and provide multi-Gigabit transmission towards physical objects including ground UEs in 5G systems, and ground vehicles\nin vehicular networks via vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications.", "On the other hand, UAVs can serve as aerial relays for partitioned ground UEs, and can even create multi-tier architecture for FANETs or connected drones.", "By maximizing the achievable mmWave-NOMA sum rates under the constraint of the given hovering altitude of UAV, a beam scanning strategy was introduced to identify the best physically radiated region of mmWave beam due to the partial coverage of user region by downlink beam.", "Due to the effect of channel quality on transmit power allocation, feedback information about channel quality should be sent back to flying BS in mmWave NOMA transmission."]} +{"199012443|10235514": []} +{"199012443|18750590": []} +{"199012443|13738536": ["The problem of resource management has been broadly involved in several network scenarios [36], [164]\u2013[168], but not well explored in UAV-assisted wireless networks with mmWave communications."]} +{"199012443|61132": ["[25] briefly discussed the challenges to effectively design stable and reliable contextspecific UAV networks according to their inherent features.", "networks [25], [67], [68], UAV cellular networks [11], [66], UAV-enabled wireless networks [8], FANETs [24], and multi-tier drone networks [12], several other surveys have also been published on different topics with regard to UAV-related networks and communications, such as channel modeling [77], civil applications [1], [78], UAV-assisted", "Although UAV-assisted wireless networks and mmWave communications have been studied extensively in previous works, existing surveys and tutorials either cover UAV-assisted wireless networks and UAV communications for 5G and beyond [8], [11], [12], [24], [25], [66]\u2013[68], or concentrate on mmWave communications for 5G and vehic-"]} +{"199012443|6779551": [", passive interception of sensitive information and disruption of legitimate transmission via active jamming [172]."]} +{"199012443|57379363": ["Besides, position-based routing protocols and cluster-based routing protocols for UAV networks were extensively surveyed and compared by Oubbati et al. [75] and Arafat and Moh [76], respectively.", "[75] and Arafat and Moh [76], respectively.", "tolerance capability, longer network lifetime, improved multitasking ability, and so forth [74]\u2013[76], [194]."]} +{"61809190|56178838": ["Previous papers have already demonstrated that, in general, ECC is faster [52]\u2013[55] and more energy efficient [56]\u2013 [62] than RSA."]} +{"61809190|49574823": ["Further details on the specifics of the different types of blockchain can be found in [24].", "Specifically, a comprehensive overview on blockchain that emphasizes its application to IoT is provided in [24]."]} +{"61809190|46973566": ["\u2026The inclusion of blockchain in software-based manufacturing can increase productivity and quality control, reducing the costs for tracking in inspections (e.g., it simplifies version management), warranty, inventory management [153], [154], ownership issues, maintenance or recycling tasks."]} +{"61809190|4625011": []} +{"61809190|27262729": ["Although, to protect privacy, public keys are independent from the identity of a user, it is possible to determine certain identities by analyzing the performed transactions [68], [69], although such an analysis can be made more difficult by using multichains [70] or mixing protocols [71]\u2013[73]."]} +{"61809190|3579945": ["\u2026techniques, the improvements in connectivity and computational power, the emergence of new machine learning approaches, the development of new computing paradigms (e.g., cloud, fog, mist and edge computing), novel human-machine interfaces [2]\u2013[4], IIoT enhancements [5] or the use of robotics and 3-"]} +{"61809190|25206420": ["\u2026be fast and secure in terms of collision avoidance [78], [79] Finally, it is also worth noting that privacy has been recently considered as essential in different recent initiatives [86]\u2013[88], which have suggested the use of techniques like ring signatures [89] or homomorphic encryption [90]\u2013[93]."]} +{"57755194|53730401": ["The enabling Internet-of-Things technology has encouraged many innovative sensing platforms and applications [1], [2]."]} +{"57755194|16319937": ["Planning routes for UAVs and the carrier can be abstracted as a Vehicle Routing Problem (VRP) [25]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"30284563|12060835": []} +{"13751888|51858916": ["In [6], the authors provide a survey on the measurement campaigns launched for UAV channel modeling using low altitude platforms and discuss various channel characterization efforts."]} +{"13751888|2958701": ["learning solutions in support of SAR operations using UAVs [58].", "economically less expensive [58]; 2) Real-world problems with high number of states can turn the problem intractable with current techniques, severely limiting the development of real applications.", "classification which has been proven very effective [58].", "16: Illustration of How CNNs Work [58].", "Some of challenges are: 1) The design of computing devices with low-power consumption, particularly GPUs, is a challenge and active working field for embedded hardware developers [58]; 2) While a few UAVs can already travel without a UAV operators directing their routes, this technology is still emerging.", "on-board powerful processor devices with low power consumption is an active area for future researches [58].", "An efficient method for coping with these types of problems remains as an unsolved challenge [58].", "In [58], a review of deep learning methods and applications for UAVs were presented."]} +{"13751888|11701828": ["The researchers used UAVs for conducting environmental sampling and ocean surface temperature studies in the Arctic [69].", "The UAV also took a vertical sounding in the eye of the typhoon and measured the strongest winds during the whole flight mission [69]."]} +{"13751888|61132": ["\u2022 There is a need for a seamless mechanism to transfer the users during the handoff process between UAVs, when out of service UAVs are replaced by active ones [2].", "SDN also can help to address the complexity of network management [2].", "\u2022 We need more studies about the topology of UAV wireless networks where this topology remains fluid during: a) Changing the number of UAVs; b) Changing the number of channels; c) The relative placements of the UAVs altering [2].", "it is difficult to construct a simple implementation for proactive or reactive schemes [2].", "FANET communication bands to mitigate this problem [2].", "It only constitutes 10%-20% of the UAV energy capacity [2].", "to the power limitations of UAVs, a decision must be taken on whether UAVs should perform data and image analysis onboard in real-time, or data should be stored for later analysis to reduce the consumed power [2], [50].", "is distributed over all UAV nodes), or hybrid in which the processing control of the forwarded packets can be performed locally on each UAV node and control traffic also exists between the centralized SDN controller and all other SDN elements [2].", "In [2], the authors attempt to focus on research in the areas of routing, seamless handover and energy efficiency.", "Fluid topology and rapid changes of links among UAVs are the main characteristics of multi-UAV networks or FANET [2]."]} +{"13751888|76603": ["\u2022 Utilizing UAVs in public safety communications needs further research, where topology formation, cooperation between UAVs in a multi-UAV network, energy constraints, and mobility model are the challenges that are facing UAVs in public safety communications [9].", "The authors of [9] present an overview of legacy and emerging public safety communications technologies along with the"]} +{"13751888|15517134": ["The authors in [60] presented major categories of collision avoidance methods.", "Therefore, the development of UAV collision avoidance techniques has gained research interest [60], [300].", "These algorithms include: flight route determination, path planning, collision avoidance and swarm coordination [59], [60]."]} +{"13751888|3330461": ["the capacity in ground communications systems [269]."]} +{"13751888|4269723": ["in FANET with high reliability, reachability and fast mobility of UAV nodes [349] \u2022 More research is needed to develope specific security protocols for FANETs based on the SDN paradigm.", "in which the control plane is completely decoupled from data plane and the routing protocols can be executed onboard from SDN switching devices [349]."]} +{"69504578|61132": ["UNMANNED aerial vehicles (UAVs) have attracted increasing interest in the past decade for various applications, such as disaster rescue, photography, cargo delivery, and inspection (see [1]\u2013[3] and references therein)."]} +{"69504578|206583375": []} +{"174820262|196119081": ["[16] propose a new efficient cross-layer relay node selection model for Wireless CommunityMeshNetworks."]} +{"3503216|3579945": ["Note that, although this improvement in the energy efficiency is especially useful for battery-operated gateways, the increase on the level of security may also benefit other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which can be the target of cyberwarfare attacks [20]."]} +{"3503216|13991708": ["\u2026gateways, the increase on the level of security may also bene\ufb01t other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which\u2026", "As explained in [16], the fog layer must provide horizontal integration between different layer protocols."]} +{"167210863|61809190": ["Blockchain and other Distributed Ledger Technologies (DLTs) are also predicted to be essential for many industries [18,19], since they allow for storing the collected data (or a proof of such data) so that they can be exchanged in a secure way among entities that do not trust each other.", "Finally, it must be noted that the use of current DLTs, and speci\ufb01cally blockchain, involve certain weaknesses related to the immature status of the technology, like the lack of scalability, high energy consumption, low performance, interoperability risks or privacy issues [18\u201322]."]} +{"167210863|49574823": ["Although blockchain can be considered to be still under development in many aspects [20,21], some of its applications for fields where trust is a required (e.g., finance) have been already deployed [22]."]} +{"167210863|46973566": ["The next step in the tag evolution are the so-called smart labels [30], which are noticeably more complex than RFID tags and allow for providing industry 4.0 functionality like event detection [31], operator interactivity, a display for visual feedback, one or more communication technologies,\u2026"]} +{"167210863|4625011": ["\u2026of traditional factories towards smart factories through the use of some of the latest advances in paradigms and technological enablers like big data [1], augmented reality [2\u20135], robotics [6], cyber\u2013physical systems [7], fog computing [8,9] or the Industrial Internet-of-Things (IIoT) [10]."]} +{"167210863|31216129": ["\u2026of traditional factories towards smart factories through the use of some of the latest advances in paradigms and technological enablers like big data [1], augmented reality [2\u20135], robotics [6], cyber\u2013physical systems [7], fog computing [8,9] or the Industrial Internet-of-Things (IIoT) [10]."]} +{"167210863|3579945": ["There are diverse BLE profiles and specific devices called beacons that can be useful in certain inventory and traceability applications, as well as in indoor locations [35,36] and IoT applications [37,38], since they transmit a periodic signal to be located and identified."]} +{"65126673|17485266": []} +{"65126673|3110415": []} +{"65126673|10213552": []} +{"65126673|9667820": []} +{"65126673|18599847": []} +{"65126673|9928823": []} +{"65126673|8584223": []} +{"65126673|17561208": []} +{"65126673|1626075": []} +{"61808069|57379363": ["Several other studies [22]\u2013[31] focused their attention on UAV route/path planning for various objectives, such as target tracking, obstacle avoidance, landmark-based navigation, cluster-based routing to reduce dependencies on human operators and task assignment."]} +{"207023775|15895606": []} +{"207023775|6779551": ["less communication [104] that cross-layer and hybrid secu-"]} +{"207023775|2357830": [", RFID/NFC privacy [81] or privacy of general embedded sensors [82]."]} +{"2958701|4716814": ["An evidence of the suitability of deep learning for many kinds of autonomous robotic applications is the increasing trend in deep learning robot related scientific publications over the past decades, which is expected to continue growing [8]."]} +{"2958701|1932843": ["These types of problems are suitable to be solved by means of a reinforcement learning framework [28]."]} +{"2958701|393948": ["These deep models show great performance not only in Computer Vision tasks but also in other tasks such as speech recognition, signal processing, and natural language processing [5]."]} +{"198985260|61809190": ["Moreover, transparency is provided to the authorized third-parties that access the stored information, which allows them to monitor and analyze it in order to determine whether it has been tampered [57]."]} +{"198985260|49574823": ["Speci\ufb01cally, a blockchain can be used to preserve user anonymity and transaction privacy, so that patient data can remain private to non-authorized parties [56]."]} +{"198985260|46973566": ["Finally, it is worth noting that, with the rise of IoT [45,46], crowdsourcing is gaining momentum in a wide range of sectors and tasks [47\u201351]."]} +{"198985260|29859741": ["A good compilation of fog computing based healthcare applications can be found in [24], which describes potential applications for monitoring Chronic Obstructive Pulmonary Disease (COPD) patients [25], tools for in-home Parkinson disease treatments [26] or hospital platforms that make use of\u2026"]} +{"198985260|13765327": ["For example, physical exercise clearly alters glucose concentration levels on Type-1 DM patients: glucose regulation problems may arise during or after exercising and even when performing certain daily activities [19]."]} +{"198985260|57764303": ["Finally, it is worth noting that, with the rise of IoT [45,46], crowdsourcing is gaining momentum in a wide range of sectors and tasks [47\u201351]."]} +{"198985260|57378792": ["In addition, there are incentive mechanisms that enable community participation [48].", "accomplish problem solving, data processing, surveillance/monitoring, and surveying [52], but there are not many mobile crowdsourcing applications [11,53] and even less decentralized while focused on healthcare [48]."]} +{"2054748|6972141": ["and outdoor categories, as DeSouza and Kak [28] did, this survey distinguishes between map-based and mapless navigation, since some navigation systems proposed for indoor could also be properly adapted to work in outdoor environments and vice versa.", "Therefore, it is a selection of the most outstanding contributions surveyed in the work by De Souza and Kak, although some references not considered there have also been included.", "De Souza and Kak in [28] structure robot visual navigation in two main subjects: indoor navigation and outdoor navigation.", "(In order to make compatible this section of the survey with the one by De Souza and Kak, the rest of this section is structured in the same way as De Souza and Kak's survey, maintaining thus the same category labels.)", "a map can be in turn subdivided in metric map-using systems, metric map-building systems and topological map-based systems [28].", "in [28]; second, Section 3 reviews new approaches presented after the submission of [28]; finally, Section 4 concludes the paper.", "The progress made in vision-based navigation and localization for mobile robots up to the late 1990s was widely surveyed by DeSouza and Kak in [28]."]} +{"54172318|2958701": ["At the same time, with Deep Learning (DL) demonstrating state-of-the-art performance in various Machine Vision tasks, recent research has focused on enhancing the autonomy of UAVs by employing DL algorithms [4], such as Convolutional Neural Networks (CNNs) [5]."]} +{"64660942|30399972": ["It is worth noting that there is another line of related research that employs ground moving vehicles to wirelessly charge and/or collect information from ground sensors, e.g., [32]\u2013[35]."]} +{"64660942|3504276": ["\u2026(SWIPT) and wireless powered communication network (WPCN), which unify the WPT and wireless information transfer (WIT) in a joint design framework over the same (downlink for both WPT and WIT) and opposite (downlink for WPT and uplink for WIT) transmission directions, respectively [6], [7]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"20999239|1932843": ["Recently, paradigms such as reinforcement learning [12], learning-by-demonstration [2] and transfer learning [25] are proving a natural means to train various robotics systems."]} +{"51982364|4680026": []} +{"51982364|1940388": ["lot of previous works in a computer network research (such as [25], [26])."]} +{"5325247|15093118": ["It is also recommend to read other comprehensive reviews [12] and [13] for driver safety systems.", "This paper is different from [13] due to addition of survey on sensors (active and passive), their comparison and literature for motorcycle detection techniques.", "The latter [13], is an up-to-date and thorough survey of vision-based vehicle detection, tracking and behavior analysis.", ", hardware and software solution for CAS while [13] addresses the driver behavior analysis and techniques for vehicle detection with minor details"]} +{"51614104|49574823": [", industrial augmented reality [12\u201314], blockchain [15], smart devices [16]), has enabled performing and automating certain actions."]} +{"51614104|46973566": [", industrial augmented reality [12\u201314], blockchain [15], smart devices [16]), has enabled performing and automating certain actions."]} +{"51614104|4625011": []} +{"51614104|3579945": []} +{"51614104|13991708": ["IoT systems allow for carrying out enhanced decision-making in fields such as defense [17,18] and high-security applications [19], telemetry [20], transportation [21\u201324] or"]} +{"116250411|7660436": []} +{"52206410|4875951": ["As demonstrated in [47], style transfer can be considered as a distribution alignment process from the content image to the style image [34]."]} +{"6816078|206583375": []} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"67856722|61809190": ["Other articles focused on the application of blockchain to speci\ufb01c Industry 4.0 technologies like big data [19], to speci\ufb01c industries [20], [21], [22] or important characteristics like energy ef\ufb01ciency [23]."]} +{"67856722|49574823": ["There exist different types of blockchains depending on how users interact with them and how data are managed/accessed [18].", "Similarly, the architecture and the possible optimizations to be performed for creating and deploying blockchain-based IoT applications are detailed in [18]."]} +{"67856722|4625011": ["Both AR and VR evolved remarkably in the last decade, where they proved to increase productivity [98] and to be helpful in industrial design processes [99], [100], when manufacturing certain goods [101], [102], [103], [104] or for maintaining specific industrial components [105], [106]."]} +{"67856722|31216129": ["Cobots are able to collaborate with humans in certain tasks [114], while robots can automate other tasks in an autonomous way [115]."]} +{"67856722|27262729": ["Therefore, although blockchain technology can increase Industry 4.0 application security, its use entails certain security issues that should be identi\ufb01ed and addressed [152]."]} +{"67856722|3579945": ["This is essential in the case of critical infrastructures [34], [35] and defense [36], whose data, due to legal and privacy concerns (e.g., certain defense data are considered strategic and therefore classi\ufb01ed), have to be stored through trusted service providers, specially in countries where data\u2026"]} +{"67856722|13991708": ["This is essential in the case of critical infrastructures [34], [35] and defense [36], whose data, due to legal and privacy concerns (e.g., certain defense data are considered strategic and therefore classi\ufb01ed), have to be stored through trusted service providers, specially in countries where data\u2026"]} +{"8061430|4491892": ["This leads to a crucial property: SIS with resampling can produce reasonable statistics only for systems that \u201cexponentially forget\u2019\u2019 their past [8] (i."]} +{"17407951|13991708": []} diff --git a/edge/graph_20310191.jsonl b/edge/graph_20310191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca8332de2b9ec5815063ab818a5d79c80f603191 --- /dev/null +++ b/edge/graph_20310191.jsonl @@ -0,0 +1,4 @@ +{"1463633|2485641": ["PALIA is based on the grammatical inference pattern recognition framework [32]."]} +{"13415120|18747476": []} +{"31929508|24248164": ["\u2026definition to the healthcare industry uncovers many similarities with clinical pathways: both are multidisciplinary, specify a standardised plan to achieve a certain goal and contain restrictions (e.g. relative time-based constraints such as activity precedence constraints) (Gooch & Roudsari 2011)."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/edge/graph_203120967.jsonl b/edge/graph_203120967.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203138234.jsonl b/edge/graph_203138234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92dfb4bde651676a99487426e21d5cb151ab8351 --- /dev/null +++ b/edge/graph_203138234.jsonl @@ -0,0 +1,12 @@ +{"6725682|5171123": ["According to our study, this makes most of the state-of-the-art face recognition approaches work awkwardly, because nearly all of them are developed on datasets that are acquired in wellcontrolled environments [16, 18]."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"37514405|9045232": []} +{"31650064|393948": []} +{"31650064|11042075": []} +{"46799288|359842": ["It detects faces speedily and quite reliably [17]."]} +{"2399845|6746689": ["The binary images obtained by the binarization process are usually submitted to a thinning stage [16] which allows for the ridge line thickness to be reduced to one pixel."]} +{"18839913|2323881": []} +{"34093101|27814013": ["There is no generic framework that can accommodate all the protection templates and when designing a multi-biometric biometric system the need for template protection should be considered, because it will impact the choice of type of fusion and the type of protection template used [269]."]} +{"34093101|5313655": ["Related to this Rathgeb and Uhl [221] identi\ufb01ed a potential problem, i.e. the inability to decide which biometric characteristics should be used for which type of application.", "There is extensive literature on cancelable uni-biometric schemes and cryptosystems thoroughly surveyed by Rathgeb and Uhl [221].", "Related to this Rathgeb and Uhl [221] identified a potential problem, i."]} +{"58887359|5171123": []} diff --git a/edge/graph_203150979.jsonl b/edge/graph_203150979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11a0a19a0cc47c05a7d6a03d844c68517d85cd42 --- /dev/null +++ b/edge/graph_203150979.jsonl @@ -0,0 +1,4 @@ +{"5143877|387610": ["The coefficients of the 5/3 wavelet filter are given in Table I [6].", "For the lossless part, the 5/3 wavelet filter is used [6].", "As mentioned, in JPEG2000 standard, the 5/3 wavelet filter is used as the default filter for reversible image encoding [6].", "Assuming an image in the JPEG2000 format, all the IWT coefficients can be derived from the image file through tier 2 decoding followed by tier1 decoding [6]."]} +{"10939284|387610": ["(5) Here, (\u03c1,\u03c9), (\u03c1, i, j) and (\u03c1, i, j) evaluate resolution, brightness, and texture sensitivities, respectively, defined by\n(\u03c1,\u03c9) = {\u221a\n2, if \u03c9 = H H 1, otherwise\n}\n\u00b7\n\u23a7 \u23aa\u23aa\u23a8\n\u23aa\u23aa\u23a9 1.00, if \u03c1 = 0 0.32, if \u03c1 = 1 0.16, if \u03c1 = 2 0.10, if \u03c1 = 3 \u23ab \u23aa\u23aa\u23ac \u23aa\u23aa\u23ad (6)\nand\n(\u03c1, i, j) = 1+ { 1\u2212 (\u03c1, i, j) , if (\u03c1, i,\u2026"]} +{"718509|387610": ["With IWT theory [23], it is easy to prove that when the IWT coefficients are changed in one block using the manner characterized by the mask shown in Formula (3), the pixel grayscale values in adjacent blocks will not be affected.", "As previously mentioned, in the JPEG2000 standard the 5/3 wavelet filter is used as the default filter for reversible image encoding [22,23].", "Origin of overflow/underflow For images in the JPEG2000 format, the proposed method in the previous section is good enough, For example, an image in the JPEG2000 format with all the IWT coefficients derived from the image file through tier 2 decoding followed by tier 1 decoding [23] could be used for embedding by placing the hidden data into the IWT coefficients as described above."]} +{"3159867|387610": []} diff --git a/edge/graph_203155464.jsonl b/edge/graph_203155464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1580837d8590b0fb4c5a9b71b70a2ae0cd2590b --- /dev/null +++ b/edge/graph_203155464.jsonl @@ -0,0 +1,32 @@ +{"35778410|5188711": []} +{"20928345|5747564": []} +{"153520|17381415": []} +{"153520|2769379": ["Besides information flow in layers, different agents in one layer may also be able to communicate with each other [57]."]} +{"53038310|33063270": ["peration in the full P2P market [97]. The DC-OPF is incorporated in the full P2P design to internalize grid constraints. The recent breakthroughs concerning distributed optimization on grid operation [71,82] can also inspire other works on the redesign of grid operation under P2P markets. We also give incentive to future research in appraising the impact on grid operation practices and its potential adap", "In this way, privacy of all members of the community is guaranteed. The equations (2c), (2d) and (2e) are linking constraints. The literature recommends the use of distributed optimization techniques [81,82]. The problem is also iteratively solved as in the previous design. For instance, references [61,83] employed ADMM to solve a community-based problem. 3.3. Hybrid P2P market This design is the combina"]} +{"10402012|1420935": ["This behavior creates a competitive market for energy trading in microgrids that can be modeled and analyzed as noncooperative game [21].", "In microgrids, the retailers should supply energy to their geographical areas without reliance on the main grid [3], [21]."]} +{"10402012|485843": []} +{"10402012|12083425": ["There have been numerous studies related to smart-grid technology such as research on distributed generation (DG) [4]\u2013[6], energy storage system (ESS) [7]\u2013[9], electric vehicles (EVs) [10]\u2013[14], advanced energy electronics [15], [16], and modern communication technologies [17], [18]."]} +{"14990261|29060869": ["Furthermore, Operating cost of the cognitive network is optimized under real-time pricing where macrocell and femtocell base stations adjust their power consumption based on electricity prices [11]."]} +{"14990261|7076261": ["This hierarchal approach provides a scalable solution that ensures the provision of secure communication within the smart grid [27]."]} +{"14990261|595093": ["In smart grid, the integrity of data exchanged over its networks can be subject to many attacks such as data falsification [28], data injection [29], message replay, and message delay [30]."]} +{"40093187|5747564": ["Although the security and privacy issues in SG have received significant attentions in recent years [15]\u2013[20], the issue of roaming EV charging and billing while preserving EV users\u2019 identity and location privacy has not been properly addressed."]} +{"59314746|49527603": []} +{"59314746|3932531": ["Other reviews focus on security issues of the blockchain (Khan and Salah, 2017; Li et al., 2017a; Meng et al., 2018) and on its potential to enable trust and decentralisation in service systems (Seebacher et al."]} +{"59314746|3628110": []} +{"59314746|27262729": []} +{"54919268|1420935": ["However, non-renewable energy sources are being depleted and becoming more expensive from time to time which indicates that the energy from these sources will not be able to support the increasing demand caused by a growing population [1].", "Several published papers discussed various aspects of P2P DET [1,30\u201333].", "RES cause less pollution and are also more economical than their counter parts as they reduce transmission cost [1].", "The authors in [1] provided a high level overview while not covering most recent research problems.", "Furthermore, energy trading also brings various bene\ufb01ts to utility companies such as increasing the overall ef\ufb01ciency of the grid and reducing operation cost [1]."]} +{"169077028|49343018": ["Communication architectures can be broadly divided into centralized, where all prosumers communicate with a central coor-dinator, distributed, with prosumer-to-prosumer communication, and unidirectional, with prosumers receiving broadcasts from a coordinator 23 ."]} +{"13226901|12537501": []} +{"13226901|31086789": []} +{"7871043|5747564": []} +{"7871043|121289": []} +{"113008299|5747564": []} +{"116422191|49527603": ["hybrids that stand between public and private blockchains [44].", "detailed comparison of different algorithms can also be found in [15,44,46,47,56]."]} +{"3773187|5747564": ["Additionally, recent progress in alternative communication technologies and information exchange algorithms [19] [20] [21] (Peer-To-Peer, Gossip, Consensus etc."]} +{"67769525|49527603": ["It is practical and works in asynchronous environments [20,125].", "Tendermint is also a consensual mechanism based on the Byzantine general problem mentioned above [20,128].", "The application fields of the blockchain technology include finance, Internet of Things [19], public social services, reputation system, security and privacy, and so on [20]."]} +{"61395937|41035405": []} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"67871438|49343018": ["Lower level primary and secondary control layers operating at faster time-scales will still be necessary to maintain power quality and stability [30]."]} +{"9573907|5605271": []} +{"25228951|206485901": ["EMS for micro-grids have gathered attention, under the assumption that all participants share the profits and costs of the system [5]."]} +{"13591839|12083425": ["During the last decade, power electronic converters have undergone a fast evolution due to the development of fast semiconductor switches and also the introduction of real-time controllers that can implement advanced and complex control algorithms efficiently [15]."]} diff --git a/edge/graph_203165058.jsonl b/edge/graph_203165058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5960e76cec53d9d761a33c742674f036dec5872 --- /dev/null +++ b/edge/graph_203165058.jsonl @@ -0,0 +1,13 @@ +{"974688|180217": ["In [4], authors present a comparison of various RFID authentication protocols that make use of hash chain method."]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"24968255|1236072": []} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"72332225|38911919": []} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"13302604|180217": ["Syamsuddin et al. [11] presented a comparison of various RFID authentication protocols based on the use of the hash chain method."]} +{"36400013|10137283": ["Trust can be defined as a subjective belief of a peer about other peers belonging to the same society or geographical zone [9]."]} +{"86588961|3630870": []} +{"49326208|17279511": []} +{"20500104|763939": ["Harri, Filali and Bonnet [ 21 ] provide a taxonomy and a detailed summary of existing mobility and network simulator projects."]} +{"10305213|763939": []} diff --git a/edge/graph_203169399.jsonl b/edge/graph_203169399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4df6916daf813ceef19016db207c6ccf4d688532 --- /dev/null +++ b/edge/graph_203169399.jsonl @@ -0,0 +1,52 @@ +{"8813362|13372227": ["In the United States, the Federal Communications Commission (FCC) has mandated cellular system operators to estimate the position of an emergency caller with error of less than 100 meters in the Enhanced 911 (E-911) service [1]."]} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"3512964|33211520": ["This is especially important during the emergency responders\u2019 missions, since the availability of radio signals is very low and there is a high demand for a high localization accuracy [2,4,6,8,24,55]."]} +{"3512964|206583375": ["Traditionally, the accuracy is represented by the mean distance error and the precision is defined as the success probability of position estimates with respect to the accuracy [53,54]."]} +{"156013048|2301325": []} +{"156013048|7644489": []} +{"22347729|3330461": ["Thus, it is not surprising that contact probing is rather energy-consuming, which is substantiated by experimental results [15], [16].", "In addition, the devices communicate under outband D2D mode to avoid interference with a cellular network [16], [17]."]} +{"22347729|7644489": ["and alleviated congestion [10], [12].", "[10], [13].", "by first responders [10]."]} +{"22347729|17325804": ["Compared with the location-based discovery [14], the devices do not frequently communicate with BSs and avoid inefficient use of radio resources."]} +{"21053653|3330461": ["dealing with out-band D2D communication both managed by the network and autonomously controlled are surveyed in [11].", "In [11], the authors give an overview of papers addressing inband D2D in terms of spectral efficiency, energy efficiency, cellular coverage and other performance targets.", "To be more precise, with respect to [11], [12] our survey:"]} +{"21053653|7644489": ["An overview of standardization activities in 3GPP focusing specifically on ProSe enabled communication is also described in [134]."]} +{"4974746|19938676": ["D2D communication has been proposed as an important technology to provide services including real-time data sharing [17] and it can be a part of 5G cellular network architecture for local offloading [18]."]} +{"4974746|2937482": ["The synchronization can be achieved in several ways [28]."]} +{"6964003|1230643": []} +{"21722250|7644489": ["In this work, we assume that D2D UE (D-UE) utilizes uplink resources because of several reasons as discussed in [15]."]} +{"58672507|6972141": ["And the application area of mobile robot ranges from indoor to space, underground pipeline, underwater and other work environments owing to its autonomy, independence and compactness [1], [2]."]} +{"145055037|7644489": ["In [7]-[9], these mechanisms consider the target selection based on distance and energy consumption."]} +{"86523357|16378550": ["A key part of the D2D communication is the device discovery of DUs, which is also known as peer discovery or proximity discovery [22]."]} +{"86523357|3330461": ["General surveys on D2D communication and discovery can be seen in [6], [25] and [23], where an exposure for overall D2D communication and its technical details is also included."]} +{"86523357|7644489": ["3GPP has presented the LTE centered proximity services in issuance 12 and 13 to accomplish D2D communication.", "A practical implementation D2D communication challenges in heterogeneous networks are mainly device discovery, inter cell interference, effective medium access control, and resource allocations [4].", "At the same time, 3rd Generation Partnership Project (3GPP) has been also working on D2D communication as a Proximity Services (Pro-Se) [4, 5].", "Though, it can be comprehensive to several cases including a large number of devices to connect in ProSe to one another with the benefit of utilizing the LTE resources.", "3GPP currently has decided that D2D communication in LTE focuses on public safety networks [4].", "Pro-Se has been discussed by many researchers and its feasibility has been made by long term evolution (LTE) [4, 6].", "A comparison is made between different short ranges communication technologies of Bluetooth, Zig-Bee, NFC, Wi-Fi Direct, and in-band D2D (LTE direct) in Table 1.", "The primary focus of LTE was data offloading."]} +{"86523357|17325804": ["However, this method is specific for narrow band channels, and the accuracy cannot be definite for proximity based D2D communication [31]."]} +{"198168961|3330461": ["Examples of such use-cases include multimedia exchange between proximity users, broadcasting advertisements, and relaying information to the unconnected regions etc. [3]\u2013[5]."]} +{"198168961|7644489": ["\u2026on the presence of a network entity (base-station, etc) to assist in basic operations such as resource allocation [8], power-control [9], [10], and device synchronization [11], [12] etc. Mode-1 discovery mechanisms offer guaranteed time-to-discovery but at the same time are not fully autonomous."]} +{"198383986|16378550": []} +{"198383986|3330461": []} +{"49868855|3330461": ["number of small cells [2], [3] across different radio access technologies, to enable high data rate and short range data transmission with diverse power and coverage competencies [4], privacy and security issues [5] and mobility factors [6]."]} +{"49868855|7644489": ["5G proximity services [7], [8] open the gateway for users and their wireless mobile devices in physical proximity.", "In [7], the study reveals that the individual ICT i,j can be modeled by an exponential distribution with heterogeneous coefficient."]} +{"7681681|3330461": ["Massive multiple-input multiple-output, which could increase the system throughput is proposed to utilize a very high number of antennas [8]."]} +{"30303204|3330461": []} +{"53878375|15694215": []} +{"12225864|13372227": []} +{"75135659|3330461": ["We make the hypothesis here that the D2D users amount represents 30% of the global predicted users amount within the cell [35]."]} +{"1387328|17325804": ["For the D2D discovery, we can use wireless localization methods [13] such as angle-of-arrival (AOA), time-of-arrival (TOA), timedifference-of-arrival (TDOA), and global positioning system (GPS) to track the location of each UE."]} +{"3985861|26793080": ["After all, we would like to figure out under energy constraints, how we can schedule active slots of two nodes such that they intersect regardless of rotations (i.e., time displacement).", "Basically deterministic approaches are able to give a predictable discovery latency, while the discovery using probabilistic approaches can only be estimated with probabilities.", "Section II-B presents two fundamental criteria for performance evaluation of NDPs."]} +{"3985861|1236072": ["Such neighbors have the potential to benefit a number of network services, such as routing [44], connectivity [45], and localization [46], [47]."]} +{"32910307|7644489": []} +{"52118784|6779551": ["efforts have been exploring novel techniques that can minimize interference in order to enable secure and reliable D2D communication [191]."]} +{"52118784|12206204": ["However, owing to lack of standardization, the wide spread implementation of IoT and subsequently D2D integration with IoT is still a far cry [293], [294]."]} +{"52118784|3330461": ["In [18] the existing literature on D2D is categorized under inband and outband D2D communication."]} +{"52118784|7644489": ["[51] proposed the resource selection scheme namely sensing based selection"]} +{"4888265|2301325": []} +{"42394375|7644489": ["received a great deal of attention recently because a good quality of D2D service can be provided to users only when it is done correctly [1], [6].", "By contrast, in proximity-beacon-based discovery schemes, D2D users find their nearby peers using predefined proximity beacons1 [1], [3], [9]\u2013[11].", "While the D2D service is similar to conventional ad hoc networks, it is more practical and efficient because the whole process of communication can be managed by BSs [1].", "[1] \u201cCisco visual networking index: Global mobile data traffic forecast update,\u201d Cisco Syst.", ", time) for beacon transmission is allocated periodically, such that each user transmits beacons periodically [1], [3].", "By adopting the D2D service, excessive load imposed on BSs can be reduced, and new location-based services can be provided, all of which holds attraction for service providers and operators of MCSs [5].", "Base stations (BSs) of mobile communications systems (MCSs) in the current topology will very soon experience difficulties in processing the resulting huge volume of data traffic.", "Recently, MCSs have begun to adopt device-to-device (D2D) services in which direct communications between users are enabled to address the problems described earlier [1]\u2013[3]."]} +{"2913911|3330461": []} +{"2913911|7644489": []} +{"12475938|2497115": ["Compared to the existing radio positioning approaches, namely enhanced observed time difference (E-OTD) [5], [6], uplink-time difference of arrival (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] or WiFi fingerprinting [9] based solutions in which the accuracy is typically in the order of 3-5 meters at best, the positioning accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10].", "Compared to the existing radi o positioning approaches, namely enhanced observed time dif ference (E-OTD) [5], [6], uplink-time difference of arriva l (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] o r WiFi fingerprinting [9] based solutions in which the accurac y is typically in the order of 3-5 meters at best, the positioni ng accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10]."]} +{"25596362|7644489": ["Two functions are instrumental for direct proximity-based traffic exchange: D2D discovery and D2D communication [1].", "Although D2D communication has been primarily motivated by applications such as social networking and public safety communications [1], it can also be used to offload the cellular access network, or even to establish bidirectional links for carrying out local measurement/control data [2]."]} +{"25596362|121289": ["Although D2D communication has been primarily motivated by applications such as social networking and public safety communications [1], it can also be used to offload the cellular access network, or even to establish bidirectional links for carrying out local measurement/control data [2]."]} +{"42624890|3330461": []} +{"42624890|7644489": ["As a matter of fact, it is considered well adapted for safety public domain by using applications of Proximity Service ProSe [1]."]} +{"15731458|7686677": ["Furthermore, energy efficiency in cellular networks is a growing concern [10] and D2D communication can reduce power consumption in base stations and cellular users [11]."]} +{"17325804|164835": ["Although the form of the density function is unknown in the non-parametric case, there can still be some generic information about some of its parameters [42], such as its variance and symmetry properties, which can be used to design non-parametric estimation rules, such as the least median of squares technique in [43], the residual weighting algorithm in [44], and the variance weighted least squares technique in [45]."]} +{"34833611|7644489": ["However, an asynchronous system is well known for its low efficiency in both bandwidth and power usages as well as poor QoS, in contrast to the synchronized system employed in today\u2019s cellular systems [9]."]} diff --git a/edge/graph_203174169.jsonl b/edge/graph_203174169.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c450280691ed5f418f48a0ca282961179ebe282e --- /dev/null +++ b/edge/graph_203174169.jsonl @@ -0,0 +1,18 @@ +{"5837127|10975328": ["ral visualization (for a survey, see Silva [26])."]} +{"52883078|207743293": []} +{"6793120|1143625": ["Other approaches focus instead on high-level aggregate characteristics of the messages shared, such as the overall number and frequency of those messages [21]."]} +{"14544742|13093354": []} +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} +{"86526042|207743293": ["\u2026media, aiming to study algorithmic approaches to facilitating collection and research around newsworthy content with social media as a source (Zubiaga, 2018; Khare, Torres, & Heravi, 2015; Heravi, Morrison, Khare, & Marchand-Maillet, 2014), (2) social media news analytics, where the\u2026"]} +{"22418235|1143625": []} +{"22418235|6387482": []} +{"9574394|1143625": []} +{"9164793|207743293": ["Prior work in the area has found the task dif\ufb01cult, compounded by the variety present in language use between different stories (Lukasik et al., 2015; Zubiaga et al., 2017)."]} +{"14813549|17652653": ["A much more detailed discussion on the use of paraphrases and ways to extract them is given in (Madnani and Dorr, 2010)."]} +{"2798864|1143625": []} +{"13823942|207743293": []} +{"207743293|1143625": []} +{"3399434|207743293": ["Resolving the veracity of social rumours requires the development of a rumour classi\ufb01cation system and we described in [14], a candidate architecture for such a system consisting of the following four components: (1) detection, where emerging rumours are identi\ufb01ed, (2) tracking, where those rumours\u2026"]} +{"165071511|12574246": []} +{"16151360|12161567": ["\u2026work focuses on determining the validity of factual assertions from simple, well-formed statements; the related problems of information extraction [22], claim identi\ufb01cation [23], answering compound assertions [24], and others [25] are generally built in-support-of or on-top-of this central task."]} diff --git a/edge/graph_203218379.jsonl b/edge/graph_203218379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..820252b4039092f6633ed98a17ffba13bad956bb --- /dev/null +++ b/edge/graph_203218379.jsonl @@ -0,0 +1,51 @@ +{"19809171|393948": ["The use of deep learning algorithms is a further avenue of interest, since it was apparent that a change in feature representation via PCA caused a significant shift in results, where deep network archi\u2010 tectures are known to internally facilitate such representational mappings [27]."]} +{"11927605|13991708": ["2736446 Through the adaptation of IoT technology, it is expected that the number of connected IoT devices will reach 50 billion by 2020 [1].", "scenarios like evacuation of people from a building [1]."]} +{"4123502|17776695": ["[81] published a survey on signal analysis and processing techniques employed with different types of"]} +{"4123502|86629084": ["Moreover, nowadays, healthcare or ambient assisted living solutions cannot be proposed and designed without considering mobile health support [40]."]} +{"4123502|21386749": ["These applications can be suited in industry domains, such as transportation [3], healthcare [4],", "Accordingly, it is hard to locate a complete security convention that can treat both wired and wireless channel qualities similarly [4].", "The data input from patients can be collected through sensors and processed by applications developed for a user terminal, such as computers, smart phones, smart watches or, even, a specific embedded device [4]."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"38763513|26071662": ["For more extensive treatments on multimodal data fusion, we refer the reader to [15] and [58]."]} +{"38763513|8034133": []} +{"38763513|6387482": []} +{"44773358|14205872": []} +{"13791763|4654785": ["Over the past decades, neuroimaging techniques, such as magnetic resonance imaging (MRI), functional MRI (fMRI) and positron emission tomography (PET), have profoundly advanced neuroscience research and clinical application [3], [4].", "Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18].", "In recent years, the neuroimaging based computer-aided diagnosis (CAD) for AD has attracted considerable attention [4], [8]\u2013[10]."]} +{"13791763|4646590": ["Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18]."]} +{"13791763|11540239": ["Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18]."]} +{"13791763|5835640": ["The performance of machine learning algorithms in CAD generally depends on data representation (or feature), and therefore feature extraction becomes a critical step in the classification framework [10], [19].", "Since the neuroimaging dataset generally has small labeled samples [10], as an appropriate feature representation algorithm for the small dataset, the supervised DPN will potentially learn", "In recent years, the neuroimaging based computer-aided diagnosis (CAD) for AD has attracted considerable attention [4], [8]\u2013[10]."]} +{"13791763|393948": ["The performance of machine learning algorithms in CAD generally depends on data representation (or feature), and therefore feature extraction becomes a critical step in the classification framework [10], [19].", "tectures, DL develops a layered, hierarchical architecture to yield high-level and more effective data representation [19], [27], [28].", "On the other hand, the layer-wise stacking of feature extraction often yields better representations in DL [19],", "Each basic DPN is trained in a supervised, block-wise fashion, without the need for back propagation, which is different from other popular deep architectures [19]."]} +{"18766094|4654785": []} +{"122344|2875192": ["[16] give a more detailed review of the techniques applied in the context of medical content-based image retrieval and classification."]} +{"122344|6387482": ["feature vector) [29].", "[29]."]} +{"78092549|2088679": ["[8] used paired CNNs to detect coronary calcium in CT angiography images.", ", multi-dimensional features, including signals, images, and videos [7,8,10,11]."]} +{"7775345|393948": ["Recently, deep neural networks are increasingly used for the probabilistic modeling of images and text (see [18] for a review)."]} +{"51867969|2488484": []} +{"21766127|6387482": []} +{"3681659|21386749": []} +{"19135805|13151033": [", completion or de-duplication) of the input KG [123], from different viewpoints and application context."]} +{"19135805|12161567": ["For more details about these combined models, refer to [36] and references therein.", "Minimizing the pairwise ranking loss has an additional advantage: it does not assume that negative examples are necessarily false, just that they are more invalid than those positive ones [36].", "[36] have made a survey of statistical relational learning methods on KGs, including embedding techniques, path ranking algorithms [37], [38], [39], and Markov logic networks [40], [41], [42].", "For more details about tensor representation of KGs and tensor factorization models, refer to [13], [36] and references therein."]} +{"3670950|7530272": [", ECG) [32, 31], due to the infrequency and incompleteness of our data.", "However, our problem is also different from the traditional time-190\nseries classification problem, which is often on high frequency series (e.g., ECG) [32, 31], due to the infrequency and incompleteness of our data.", "Hertz, so the problem is often on how to extract more compact data representation to save computational cost [32].", "To begin with, we take a feature-based approach [32] that converts sequences into a point-based representation, i.", "\u2022 Infrequency: As GME is offered on a yearly basis, the record sequences\nare infrequent, compared with time-series medical data, such as ECG and body movements collected from wearable sensor devices [12, 31]."]} +{"3670950|20905429": [", ECG) [32, 31], due to the infrequency and incompleteness of our data.", "However, our problem is also different from the traditional time-190\nseries classification problem, which is often on high frequency series (e.g., ECG) [32, 31], due to the infrequency and incompleteness of our data.", "\u2022 Infrequency: As GME is offered on a yearly basis, the record sequences are infrequent, compared with time-series medical data, such as ECG and body movements collected from wearable sensor devices [12, 31].", "\u2022 Infrequency: As GME is offered on a yearly basis, the record sequences\nare infrequent, compared with time-series medical data, such as ECG and body movements collected from wearable sensor devices [12, 31].", "Personal health analysis Health analysis at a personal level provides insights into individual\u2019s health conditions [39, 40] and lays the foundation of effective health monitoring [31, 12]."]} +{"59231422|4566470": ["These indicators help physicians monitor patients and consequently unnecessary visits to the doctor can be avoided and at the same time, patients have the impression that they aremore independent and yet becomemore aware concerning their healthcare status [15], [36].", "Indeed, many data sources such as sensors generate data that are constantly updated and need to be followed in real time [12], [15], [34], [36]."]} +{"59231422|168755958": ["Furthermore, the analysis of patient demographic data, such as age and gender, and clinical data, such as disease and drugs history, the insurer is able to elaborate an appropriate health plan for each patient [30].", "This sharing helps them to benefit from a broad range of experiences and expertise [40, 30]."]} +{"59231422|2398835": ["VOLUME XX, 2017 9 HCatalog: is a table and storage management system for Hadoop that enables users with different data processing tools to read and write data on the grid more easily [17, 27].", "Oozie is a scalable, reliable and extensible system [27].", "It ensures the high availability of data [17, 27].", "Avro: is an open source framework designed by Apache Hadoop that offers two services for developers: Data serialization and Data exchange [17, 27].", "scalable and can be executed in a distributed mode [27, 17].", "Also, they can enhance their productivity and operational efficiency through resource optimization [27]."]} +{"46531193|3330313": []} +{"1139736|1722293": []} +{"1139736|20905429": []} +{"1590723|2875192": []} +{"1687246|386036": ["This problem has been extensively studied in both database and natural language processing areas [7,9]."]} +{"58004229|1734833": []} +{"18410910|7876249": ["We have conducted a series of simulations on real medical data recordings to show the effectiveness of our algorithms and approaches.", "I. INTRODUCTION\nNOWADAYS, maintaining the quality of life and increasingthe life expectancy are highly important."]} +{"49676286|3750204": ["Thosemethods belong to one of the two following classes: data-based techniques and task-based techniques; see [7]."]} +{"22850879|393948": ["Other methods known asDeep Learning deal with representation learning by automatically learning an hierarchy of increasingly complex features directly from data [24]."]} +{"115197381|17485266": ["Each model is trained using the popular Stochastic Gradient Descent with Momentum algorithm [39] to update the"]} +{"3634130|16514036": ["For example, although studies are focused on the interconnection between body area networks (BANs) [16]"]} +{"7183410|393948": ["Deep learning architectures extract high-level features progressively via several layers of feature representations [37]."]} +{"24680730|7839197": []} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"42138146|11009327": []} diff --git a/edge/graph_203220528.jsonl b/edge/graph_203220528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81a320a6a890edda73969c976ef6ad342e550efc --- /dev/null +++ b/edge/graph_203220528.jsonl @@ -0,0 +1 @@ +{"30131214|7696381": []} diff --git a/edge/graph_203286698.jsonl b/edge/graph_203286698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69348c400249c4ac9a9715bd64cf3eff7e6f4c10 --- /dev/null +++ b/edge/graph_203286698.jsonl @@ -0,0 +1,13 @@ +{"19026859|6387482": ["Furthermore, the production of predictions will need to be made with varying deadlines according to the nature and impact of different incidents."]} +{"19026859|10310014": ["The wireless communications tools that are provided to first responders are designed to reliably deliver voice-only communications using narrowband technologies like Terrestrial Trunked Radio [9]."]} +{"4937355|10274533": ["\u2026to the above, techniques from the machine learning domain such as data mining or social mining can be used to re\ufb01ne policy plans based on feedback gathered from public participation or from the experience of actually implementing a particular policy (cf. Hanzl, 2007; Maragoudakis et al., 2011).", "For instance, the municipality might use information from the Internet such as page views, comments, likes/dislikes, etc. (Charalabidis et al., 2012, p. 157) to analyse the public opinion and to gain feedback on the policy plan (cf. Maragoudakis et al., 2011)."]} +{"30244192|14427591": ["Considering a political perspective, Gonzalez-Zapata and Heeks (2015) understand that citizens are the main beneficiaries of OGD having open and free access to public and governmental data.", "Finally, considering the knowledge citizens needs to have the ability to use this technology (Irani et al. 2007a, b) and access to data might be limited, (Janssen et al. 2009) OGD programs can further contribute to the digital divide.", "In addition, OGD platforms can be used as a tool to search for relevant data, detect relationships, and analyzing millions of lines of data in real-time.", "Some of the areas where open government data is creating value include (OKF 2012): a) Transparency and democratic control (Peled 2011; Zuiderwijk et al. 2014); b) Participation (Peixoto 2008; Cunha et al. 2014; Matheus et al. 2010); c) Self-empowerment, improved or new private products and services\u2026", "In addition, the OGD platforms can help governments learn from the experiences of other agencies and city governments in their attempts to improve the way in which governments can deliver better services (Irani et al. 2007a, b).", "Citizens \u2019 demand for information and the role of government responsiveness are drivers of open data and represent the demand and supply side of OGD initiatives (Agrawal et al. 2014).", "B OGD advocates argue that it enables greater government efficiency through an information infrastructure that allows for better data re-use within the public sectors and inter-agency coordination ^ (Jetzek et al. 2013, p.2).", "The driver and benefits of OGD in this perspective is economic value generation through improved or new private products and services and innovation (OKF 2012; Gonzalez-Zapata and Heeks 2015).", "The relationship between stakeholders in e-government initiatives and their interaction through OGD can be analyzed in the same way.", "The driver and benefits of OGD on this perspective are better governance by increasing transparency, accountability, participation and empowerment (Gonzalez-Zapata and Heeks 2015).", "As more information is provided through OGD platforms, citizens will find information about government activities more easily and complain and communicate their opinion, representing an increase in their interest in actively participate in the government process.", "Considering the economical perspective, the OGD is a mechanism that generates economic value being the private sector companies and entrepreneurs the main actors (Gonzalez-Zapata and Heeks 2015).", "However, due to the early stage of Open Government Data (OGD) initiatives, their impact and ramifications are still debated in professional and academic circles (Jetzek et al. 2013).", "Local, national and international public and private organizations are publishing their data in open data infrastructures, resulting in OGD (Zuiderwijk et al. 2014).", "Due to this uncertainty, some agencies avoid publishing open data to prevent unintended consequences of OGD.", "Because of the complexity involved with the publication and use of open data, is not easy to predict who, how and when users use open data (Zuiderwijk et al. 2014).", "This paper used the perspective that OGD influences how cities agencies are delivering information and services and increasing the feedback for the stakeholders, including citizens, government agencies, employees to explain the conceptual model."]} +{"3405708|206578224": ["There are other surveys which discuss the architecture of EC in [11]\u2013[13]; however, they address only the standardization and challenges in EC and no survey specifically addresses the performance of EC with other services like cloud or centralized data centers."]} +{"3405708|3757239": ["An overview of mobile edge networks and its computing and communication capabilities is given in [10]."]} +{"3405708|6909107": []} +{"3405708|2623404": ["A survey on software-defined networking in collaboration with EC and its application isdiscussed in [9]."]} +{"49419089|3126100": []} +{"49419089|627405": []} +{"49419089|7158350": []} +{"49419089|41233660": []} +{"5166289|5822166": ["Ho, Xu, and Dey (2010) analyzed multicriteria decision making (MCDM) approaches for SS based on journal articles from 2000 to 2008."]} diff --git a/edge/graph_203351800.jsonl b/edge/graph_203351800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d4e9c0b6ec05985eee3217de5e61431ef4b9abf --- /dev/null +++ b/edge/graph_203351800.jsonl @@ -0,0 +1,14 @@ +{"12574939|24248164": ["To increase the quality of care services in an unfavorable economic scenario and under the financial pressure by governments, health-care organizations have to introduce clearly defined CPs for patients, and these pathways must be improved continuously [20,14,21,2,3]."]} +{"12574939|11608263": ["In addition, we take clinical outcomes as multi labels, and employ three widely-used multi-label classification algorithms [47], i."]} +{"28362450|11003991": ["\u2026include Burdett and Kozan (2015), Braubach et al (2014), Cappanera et al (2014), Fugener et al (2014), Gartner and Kolisch (2014), Meskens et al (2013), Vijayakumar et al (2013), Carnes et al (2011), Chow et al (2011), Cardoen et al (2010), Cardoen and Demeulemeester (2009), Fei et al (2009)."]} +{"67687638|62127157": []} +{"207148856|11003991": []} +{"56343826|207584909": []} +{"126181086|11003991": ["Or the focus is on a single clinic/OR session, and/or a homogeneous patient group (Cardoen et al. 2010, Cayirli and Veral 2003)."]} +{"37836836|11003991": ["There is large number of comprehensive literature reviews in OR/MS applied to surgical care services [20, 34, 57, 104, 107, 108, 161, 167, 190, 244].", "Since surgical care services are the hospital\u2019s largest revenue center [34, 54], the case mix is chosen with the objective to optimize net contribution, costs and profit [104].", "Capacity can be reserved by dedicating one or more operating rooms to emergency cases, or by reserving capacity in elective operating rooms [34, 212].", "Elective cases can be planned in advance, urgent cases require surgery urgently, but can incur a short waiting period, and emergency patients require surgery immediately [25, 34].", "Identification by medical urgency distinguishes elective, urgent and emergent cases [34, 83, 104, 107].", "The latter is preferred in some hospital environments [34, 146].", "Relatively few papers evaluate the effect of surgical care services on ancillary services [161, 20, 34].", "In contributions that model ancillary services, it is often the objective to level bed occupancy in wards or ICU, to decrease the number of cancellations [13, 34, 203, 233, 234], or to minimize delays for inpatients [257].", "Other objectives are to maximize contribution margin per hour [34, 60], maximize the number of patients operated, or minimize staff overtime [111].", "A cyclic block schedule is also termed a Master Surgical Schedule (MSS) [234], but definitions of an MSS vary among OR/MS researchers [34]."]} +{"19848898|11608263": []} +{"31109681|9338465": []} +{"44117088|20310191": ["Ghasemi and Amyot [13] conducted a systematised literature survey which provides an overview of the status of PM in healthcare, and provided initial results from the search process of the systematic review.", "[13] M. Ghasemi and D. Amyot, \u2018\u2018Process mining in healthcare: A systematised literature review,\u2019\u2019 Int.", "Several literature reviews have revealed the state of PM applications in the healthcare domain in general [11]\u2013[13] or from specific perspectives, such as clinical pathways [14] and oncology processes [15]."]} +{"38606940|17438822": []} +{"8993105|207584909": ["[1], where an overview of applications of DES in manufacturing and business is given."]} +{"1167490|11003991": ["[7], many studies have also considered only single-objective case mix models, not allowing to adequately represent such a complex problem as the planning and scheduling in the real world is.", "[7] stimulate for studying the stochastic aspect of activity durations and their impact on the operating room flow, they also question the increased computational complexity that would be necessary to achieve it.", "[7], Guerrerio and Guido [8] and Spyropoulos [9].", "As already stated, the Operations Research and Management Science Literature is abundant and many papers have been published in the last two decades which attempt to solve this nice combinatorial optimization problem [7, 8]."]} diff --git a/edge/graph_2034384.jsonl b/edge/graph_2034384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203440951.jsonl b/edge/graph_203440951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11ffe843608a3e02d3c04221844e289ed8bf39a6 --- /dev/null +++ b/edge/graph_203440951.jsonl @@ -0,0 +1,54 @@ +{"73503740|207330385": ["[35] summarized existing literature in the context of three aspects: sensor modality, deep models, and application."]} +{"73503740|14814753": []} +{"73503740|41505326": []} +{"73503740|393948": ["Feature representation and selection is a classic problem in computer vision and machine learning [8]."]} +{"1923815|7788290": ["A detailed review of approaches in literature for modeling and recognition of human activities is discussed in [2, 11]."]} +{"49271122|23566570": ["kill metrics [23]. In fact, de\ufb01ning the best metrics to capture adequate information and be generalized enough to apply across different types of surgery or groups of surgeons remains an open problem [16, 17, 24, 25]. In contrast to descriptive analysis, predictive modelingbased methods aim to predict surgical skills from motion data. This method can be further categorized into 1) descriptive, and 2) generative m", "ods have been developed, methods to autonomously coach the trainee are lacking. Towards this aim, there is a great need to develop techniques for quicker and more effective surgical skill acquisition [11, 16]. In this paper, we are particularly interested in online skill assessment methods that could pave the way for autonomous surgical coaching. 1.1 Previous Approaches in Objective Skill Assessment Diffe"]} +{"49271122|18599847": ["Our deep learning model for surgical skill assessment is motivated from studies in multiple domains [34, 41, 42]."]} +{"70349961|206870493": []} +{"3626995|12724190": ["Currently, there are a large number of publically available data sets related to general human movements [13] that are extensively used for tasks like action recognition, gesture recognition, pose estimation, or fall detection."]} +{"5722354|14970359": ["The analysis of complex movements is an important problem for many technical applications in computer vision, computer graphics, sports and medicine (see reviews in [6] and [10])."]} +{"5722354|7788290": ["The analysis of complex movements is an important problem for many technical applications in computer vision, computer graphics, sports and medicine (see reviews in [6] and [10])."]} +{"22598792|23566570": ["7,33 Thus, the development of quantitative classification techniques that can automatically and accurately evaluate surgical skills needs to be investigated."]} +{"9854676|5755403": []} +{"13604957|27637541": ["Kinect) that are affordable and versatile, allowing to capture in real-time colour and depth information [3, 13].", "In order to support the rehabilitation of stroke patients at home, human tracking and gesture therapy systems are being investigated for monitoring and assistance purposes [25, 16, 6, 12, 3, 13]."]} +{"14779543|1634674": ["Here we overview a few related work but refer the reader to [1,2] for a more complete survey."]} +{"46817082|8034133": []} +{"46817082|7788290": []} +{"46958916|23566570": ["The main contribution of our work is to show that deep learning can be used to understand the latent and complex structures of what constitutes a surgical skill, especially that there is still much to be learned on what is exactly a surgical skill [9].", "Hence, an alternative for checklists and outcome-based methods is to extract, from these motion data, global movement features such as the surgical task\u2019s time completion, speed, curvature, motion smoothness and other holistic features [3,19,9].", "These training methods, although broadly used, lack of an objective surgical skill evaluation technique [9]."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"18533219|1634674": ["It focuses on identifying a person's action or behavior from a single image."]} +{"18533219|7788290": ["A survey on still image based human action recognition\nGuodong Guo n, Alice Lai Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, United States\na r t i c l e i n f o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become an active research topic in computer vision and pattern recognition.", "\u2026o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become\u2026"]} +{"51927857|13787722": []} +{"51927857|41505326": ["Readers are referred to [53]\u2013 [55] for a comprehensive survey."]} +{"3993248|12724190": []} +{"3993248|5664472": ["Instead of covering all ideas exhaustively, we direct interested readers to some recent surveys [7], [37], [38], 75"]} +{"3993248|16013270": []} +{"17278013|5664472": ["This is due to its huge potential in a wide spectrum of areas, such as human-machine interaction, psychology [3], surveillance security, healthcare and social assistance, video games, and so on.", "This is based on a combination of transported square-root vector fields (TSRVFs) of trajectories and the standard Euclidean norm, that allows computational efficiency."]} +{"17278013|16013270": ["Rather than covering all ideas exhaustively, we direct interested readers to some recent surveys [5], [6], [7], [9] that together overview this research area.", "Earlier studies in such behavior analysis used videos produced by conventional cameras [5], [6], [7], [8], [9], [10]."]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"29165964|14814753": ["3D CNNs [10] have been shown to successfully extract spatio-temporal features, which can be used for action classification.", "In recent years, great progress have been achieved in solving action detection problem using deep learning methods [1].", "Kalogeiton et al. [4] use 2D CNNs to extract frame-level features and create action proposals through the use of anchor cuboids.", "Action Detection The most successful action classification methods involve the use of CNNs [1].", "Earlier deep learning works used CNNs to detect human actions in each frame and then stitch these detections to create spatio-temporal tubes [8, 9]."]} +{"12724190|1262156": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|18803401": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|15178364": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|5664472": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|27637541": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], as well as their applications [49], [50]."]} +{"12724190|393948": ["Since the performance of machine learning and reasoning methods heavily relies on the design of data representation [23], human representations are intensively investigated to address human-centered research problems (e."]} +{"12724190|16280711": ["As an integral component of reasoning systems, approaches to construct human representations have been widely used in a variety of real-world applications, including video analysis [1], surveillance [2], robotics [3], humanmachine interaction [4], augmented and virtual reality [5], assistive living [6], smart homes [7], education [8], and many others [9], [10], [11]."]} +{"12724190|14970359": ["Several earlier surveys were also published to review methods to recognize human poses, motions, gestures, and activities [35], [36], [37], [38], [39], [40], [41], [43], [47], [48], as well as their applications [42], [46], as summarized by the complete list in Table 1.", "[47] Vision-based human motion capture and analysis 2001 Moeslund and Granum [48] Computer vision-based human motion capture"]} +{"71150614|20913215": ["Deep learning methods also allow for reconstruction of 4D shapes through the aid of temporal redundancy and multiview perspectives [10, 17], and identification of human actions in a multitude of contexts [23]."]} +{"37413801|14116122": ["\u2026and detection constitute two widely studied problems, mainly due to their numerous applications in domains like gaming [1] , computer vision [2] , animation [3] , surveillance [4] , man-machine interaction [5] , robotics [6] , etc. Till recently, the majority of the relevant research works,\u2026"]} +{"14537727|1634674": ["[3] and most recently by Aggarwal and Ryoo [4] for a comprehensive analysis)."]} +{"14537727|14970359": ["Over the last few decades , a large number of methods have been proposed for human motion analysis (see the surveys by Moeslund et al. [1] [2] and Turaga et al. [3] and most recently by Aggarwal and Ryoo [4] for a comprehensive analysis)."]} +{"26376251|1634674": []} +{"26376251|14970359": []} +{"26376251|7788290": []} +{"14602383|8034133": ["tems: mAP increases from 1.7% to 7.4% on MEXaction2 and increases from 15.0% to 19.0% on THUMOS 2014. 1. Introduction Impressive progress has been reported in recent literature for action recognition [42,28,2,3,39,40,24,18,31, 44,13,37]. Besides detecting action in manually trimmed short video, researchers start to develop techniques for detecting actions in untrimmed long videos in the wild. This trend motivates another challenging", " problem and adopt a temporal sliding window approach, where each window is considered as an action candidate subject to classi\ufb01cation [25]. Surveys about action classi\ufb01cation methods can be found in [42,28,2,3]. Recently, two directions lead the state-of-the-art: (1) Wang et al. [39] proposed extracting HOG, HOF, MBH features along dense trajectories, and later on they took camera motion into consideration "]} +{"8546374|27637541": ["In order to support and maintain the rehabilitation of stroke survivors, continuous home based therapy systems are being investigated [Langhorne et al., 2005, Zhou and Hu, 2008, Sucar et al., 2010, Hon-dori et al., 2013, Mousavi Hondori and Khademi, 2014, Chaaraoui et al., 2012, O\ufb02i et al., 2016]."]} +{"5388357|1634674": []} +{"5388357|7788290": []} diff --git a/edge/graph_203566371.jsonl b/edge/graph_203566371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2f22cef4e0ed30c0d960d47c488f852ed924ed3 --- /dev/null +++ b/edge/graph_203566371.jsonl @@ -0,0 +1,2 @@ +{"126684833|15209596": []} +{"46822154|55211828": ["Much more information on the actuator selection, power electronics topologies and circuit component fabrication options can be referred in [48, 90]."]} diff --git a/edge/graph_203566947.jsonl b/edge/graph_203566947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b707c6d16d0eb57a3f302795346cd219696150b --- /dev/null +++ b/edge/graph_203566947.jsonl @@ -0,0 +1,24 @@ +{"196024083|17675973": ["The explosion of cloud computing, big data analytics, ecommerce, and Internet traffic make the growing of power demand faster in data centers [1, 2]."]} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"196179566|6909107": ["1) The computational complexities of optimization-based solutions are nondeterministic polynomial-time (NP) hard [7].", ", [1], [7], and [8]), takes into account the dynamics of processing resources, mobility of UAVs, and varying sizes of users\u2019 computing tasks."]} +{"204985297|12675271": []} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"5016565|6909107": ["Suitable solution impeding the performance of service qualities of the MTs is to offload the complicated applications as the tasks to a cloud server [3]."]} +{"5016565|206578365": ["INTRODUCTION As the popularity of smart phones, laptops and tablets is increasing dramatically, more novel sophisticated applications are emerging, such as face recognition, interactive gaming and augmented reality [1]."]} +{"11939273|3767252": []} +{"4923474|3042864": ["Recent work shows that cloud-computing technology [3]\u2013[7] provides a promising opportunity to save the energy of mobile devices [8]\u2013[10]."]} +{"4271602|206578365": [", binary and partial computation offloading [12].", "On the other hand, a recent technology innovation named mobile edge computing (MEC) is proposed as a cost-effective method to enhance the computing capability of wireless devices [11], [12]."]} +{"4271602|3504276": ["Recently, radio frequency (RF) based wireless power transfer (WPT) has emerged as an effective solution to the finite battery capacity problem [2]\u2013[4]."]} +{"4271602|12029139": []} +{"13809057|16654832": ["Shiraz et al. (2013) reviewed the existing distributed application processing frameworks for mobile devices to offload computationally intensive applications to remote servers.", "Many surveys have been done on mobile cloud computing (Shiraz et al. 2013; Abolfazli et al. 2014; Sanaei et al. 2014; Li et al. 2015; Shuja et al. 2016)."]} +{"10041295|13785718": ["The interested reader can refer to the survey paper [29]."]} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"10506820|960896": ["This becomes complex in a multi-cloud environment [111,112] and in distributed cloud environments (given that nodes closer to the user could also be made accessible through a marketplace)."]} +{"10506820|17474643": ["However, alternate models of using cloud infrastructure instead of using data centers from a single provider have been proposed in recent years [2]."]} +{"10506820|2623404": []} +{"69819191|6909107": ["reality, online gaming or remote desktop, may profit from computation offloading to the cloud or MEC [23].", "influencing the decision of either full or partial offloading, is the ability of offloading [23]."]} diff --git a/edge/graph_203580724.jsonl b/edge/graph_203580724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c34575c3de8ede0cc28de8fc4fa8df5e93c095b --- /dev/null +++ b/edge/graph_203580724.jsonl @@ -0,0 +1,11 @@ +{"58031589|8815923": ["This analytic method requires a perception system to register sensor data to known objects and does not generalize well to a large variety of novel objects in practice ( 5 , 6 ).", "This stands in contrast to past research ( 5 , 6 ) that has criticized quasi-static metrics for making strong assumptions and considering only a necessary, not sufficient, condition for dynamic grasp stability."]} +{"10197975|987239": ["While research on example-based retrieval \u2013 where users provide a full model as the query \u2013 has recently found a lot of interest in the community [Tangelder and Veltkamp 2008], its practical application is difficult, since a good example is often not at hand."]} +{"206592484|456491": []} +{"9117881|987239": []} +{"16387148|4351505": []} +{"16387148|9928823": ["Deep Belief Networks (DBNs) are probabilistic generative models consisting of multiple layers of stochastic hidden variables [Deng 2014].", "In Deng [2014], several DL techniques were presented and a categorization of them into three classes, namely, discriminative, generative, and hybrid, was provided.", "These methods can be divided into two general categories based on how they are used [Deng 2014]: (1) discriminative and (2) generative.", "Recently, a few review papers have also become available [Deng 2014; LeCun et al. 2015; Guo et al. 2016b; Schmidhuber 2015]."]} +{"16387148|13946824": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"16387148|987239": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"15872657|987239": []} +{"206767722|8601873": ["[89], [90], [91], but adapted to our weakly supervised scenario using a formulation (given by Equation (5)) similar to multiple instance learning [92], [93], [94]."]} +{"52955695|8574504": []} diff --git a/edge/graph_203583971.jsonl b/edge/graph_203583971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7f635d4a23a50aa7e1f2e95d5665dd66a77cd23 --- /dev/null +++ b/edge/graph_203583971.jsonl @@ -0,0 +1,3 @@ +{"11280976|18599847": []} +{"15628400|2187403": ["The most influential papers describe contextual computing as a must for interactive applications and mobile computing [21], but some discuss data oriented perspective [22] as well."]} +{"124180452|192934": ["\u03c3 P f , & B f 5 (2)) to represent the signal was first suggested by Drahos and Cerm\u00e1k (1989) and the method has been implemented by many researchers such as Shaban and Tavoularis (2014) and Xie et al (2004). 2.", "\u03c3 P f , & B f 5 (2)) to represent the signal was first suggested by Drahos and Cerm\u00e1k (1989) and the method has been implemented by many researchers such as Shaban and Tavoularis (2014) and Xie et al (2004).", "G\u00fcler and \u00dcbeyli (2006) computed the statistical features (mean, maximum, minimum and standard deviation) to represent the time-frequency features extracted from the Doppler signals using the wavelet transform. The output of the neural network is the indicator of the flow regimes or classes of the classification which is represented with a continuous or binary discrete number. Each of the input variables to the neural network is assigned to the class to which it belongs. Usually, these classes are represented with numerical values. The two most common representations of the classes are: continuous (0.3, 0.5, 0.7, etc.) or discrete (0 and 1 or 0.1 and 0.9). Xie et al (2004) have implemented the continuous number to represent the output of the neural network to indicate flow regimes."]} diff --git a/edge/graph_203591849.jsonl b/edge/graph_203591849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71bc472c46e8c98a152c35247d483e95bad75dc2 --- /dev/null +++ b/edge/graph_203591849.jsonl @@ -0,0 +1,17 @@ +{"19890649|14843594": ["First, we must decide which AF to use, as a variety are used practice [17]."]} +{"23449|11894197": []} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"2506789|7158350": []} +{"30396137|1708582": ["For example, Q-learning [32], [33] can be utilized to find an opti-"]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"4622080|9436861": ["As the GPU has the tendency to flood the network [52], care must be taken while designing the dynamic bandwidth allocation algorithm to prevent the GPU from starving the CPU of network resources."]} +{"6038777|1596835": ["Learning Hash Functions for ANN Indexes: There has been a lot of research on learning hash functions [49, 59, 67, 68]."]} +{"6038777|5671282": ["Learning Hash Functions for ANN Indexes: There has been a lot of research on learning hash functions [49, 59, 67, 68].", "For example, [40, 66, 68] explore the use of neural networks as a hash function, whereas [69] even tries to preserve the order of the multi-dimensional input space."]} +{"1962105|58454153": ["Our OpenCL version of LULESH [41], a shock hydrodynamics benchmark, contains 20 significant kernels.", "In these cases, Model+FL uses less power than the other methods for all of the benchmark/input combinations except LULESH Large, where CPU+FL uses 110% of oracle power vs 120% for Model+FL, and LU Small, where Model ties with Model+FL at 113%.", "LULESH, CoMD, and SMC were originally developed by the U.S. Department of Energy and subsequently ported to OpenCL/OpenMP by AMD and the Department of Energy.", "Model+FL experiences a similar effect, but the magnitude is limited to a factor of 2.3 times oracle performance at an average of 20% over the power constraint for LULESH Small."]} +{"999684|2169403": []} +{"999684|8212328": []} +{"17712611|10658846": ["When a device is idle, it can be switched into inactive states to avoid wasting power [ Benini et al. 2000].", "Several power management policies have been proposed in the past decades [Benini et al. 2000]; they can be classi\ufb01ed into four categories, namely timeout, predictive, stochastic, and learning based ."]} +{"189818775|2340253": ["To this end, we propose IntelliNoC, a reinforcement learning (RL) [15, 16] design framework for NoCs, which explores the dynamic interactions among NoC components and system-level metrics, and evolves optimal per-router control policies."]} +{"7278629|1932843": ["It has been successfully applied to a broad range of applications, such as autonomous navigation [48], robots [4, 26], games [3], network routing [7], scheduling [34], optimization [13], and resource allocation [37, 51]."]} diff --git a/edge/graph_203593150.jsonl b/edge/graph_203593150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40030c92ba6b92d409ff694161dcdc9b99205652 --- /dev/null +++ b/edge/graph_203593150.jsonl @@ -0,0 +1,6 @@ +{"11363830|14022133": ["Despite the great amount of work done in ontology-based data integration, an important problem that most of the systems tend to ignore is that ontologies are living artifacts and subject to change [2]."]} +{"14751178|10500613": ["Manually specifying data/schema matches is a tedious, time-consuming, errorprone, and therefore expensive process [25].", "Schema integration is also known under various terms in the literature as schema alignment; although, the predominant term is schema matching [25].", "representation, machine learning and information retrieval [25]."]} +{"14751178|913718": ["Figure 2- Basic architectures in ontology integration approaches (reproduced form [34]) It should be noted that several researches address the ontology matching problem from different perspectives: artificial intelligence, information system and databases [28].", "To quote Shvaiko and Euzenat [28], \u201contologies and schemas are similar in the sense that (i) they both provide a vocabulary of terms that describes a domain of interest and (ii) they both constrain the meaning of terms used in the vocabulary.\u201d", "To quote Shvaiko and Euzenat [28], \u201contologies and schemas are similar in the sense that (i) they both provide a vocabulary of terms that describes a domain of interest and (ii) they both constrain the meaning of terms used in the vocabulary."]} +{"42030385|10500613": ["\u2026here are mapping discovery and schema integration , and techniques have been developed to support these ( Bahga & Madisetti, 2015; Do & Rahm, 2002; Doan et al., 2004 ; Lenzerini, 2002; Liu & Zhang, 2014; Madhavan & Halevy, 2003; Pedersen, Pedersen, & Riis, 2013; Rahm & Bernstein, 2001 ).", "Many of the early as well as current mapping solutions employ hand-crafted rules or heuristics to match schemas ( Madhavan, Bernstein, & Rahm, 2001; Rahm & Bernstein, 2001 )."]} +{"7928608|10500613": ["The distinction between the hybrid and composite matching algorithms of [24] is useful from an architectural perspective.", "In particular, for individual matchers, [25] introduces the following criteria which allow for detailing further (with respect to [24]), the element and structure level of matching: syntactic techniques (these interpret their input as a function of their sole structures following some clearly stated algorithms, e.", "A good survey and a classification of matching approaches up to 2001 is provided in [24], while an extension of its schema-based part and a user-centric classification of matching systems is provided in [25]."]} +{"7928608|913718": ["In particular, for individual matchers, [25] introduces the following criteria which allow for detailing further (with respect to [24]), the element and structure level of matching: syntactic techniques (these interpret their input as a function of their sole structures following some clearly stated algorithms, e.", "[25] extends this work by taking into account how the systems can be distinguished in the matter of considering the mappings and the matching task, thus representing the end-user perspective.", "A good survey and a classification of matching approaches up to 2001 is provided in [24], while an extension of its schema-based part and a user-centric classification of matching systems is provided in [25]."]} diff --git a/edge/graph_203593212.jsonl b/edge/graph_203593212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e7dd5675745ab8658a6ad212ee53c64f408bd38 --- /dev/null +++ b/edge/graph_203593212.jsonl @@ -0,0 +1,27 @@ +{"52904002|29064401": []} +{"52904002|17934515": []} +{"28623185|3330461": ["The main solution is to design a variety of RRM schemes [4]."]} +{"56594712|17934515": ["This control architecture suffers from larger inter-vehicle spacing errors as the platoon size grows [2].", "A vehicle platoon is a group of vehicles that share a common moving pattern, in which each platoon member vehicle (PM) follows platoon leader vehicle (PL) and maintains a targeted inter-vehicle spacing to the preceding PM [2], as shown in Fig."]} +{"9464019|3270620": ["Therefore, NOMA is considered as a key technology for the \ufb01fth generation mobile communication networks [3]\u2013[5]."]} +{"9464019|7686677": ["Therefore, the rapidly increasing energy consumption, causing increasing amount of CO 2 emission levels, has become an important issue for the next green cellular network, driven by the overwhelming increase of the traf\ufb01c data and mobile devices [11]\u2013[14]."]} +{"3498426|207262843": ["The SDN achieves high efficiency through decoupling the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that physically forward traffic to the selected destination (the data plane) [11]."]} +{"4571127|8323234": ["precoding/combining, channel estimation, beam training, and codebook designs [90]."]} +{"4571127|7972041": ["For example, vehicular channels exhibit rapid temporal variation and also suffer from inherent nonstationarity of channel statistics due to their unique physical environment dynamics [30], [31]."]} +{"23166919|14889616": ["layers by JSVM [15] here for the simulation.", "As compared with nonscalable coding encoder, SVC encoder slightly increases the source rate however, it effectively promotes the codec flexibility based on the UE\u2019s requirement [15]."]} +{"206827011|3330461": ["Based on our observations, setting Ek\u2032 in interval [4, 8] works well for most traffic load scenarios, e.", "For more details on this line of research, readers are referred to the surveys in [6]\u2013[8] and the references therein."]} +{"30427741|40725508": []} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"19516622|3330461": ["The D2D communications have been the subject of much recent research endeavor [10], [11]."]} +{"18328619|3330461": []} +{"6189770|38911919": ["lar communications, such as [13], [18], [19], and [20], focusing on the network layer issues in MDVNETs."]} +{"6189770|17934515": ["ategy can not only reduce the energy consumption and exhaust emission by minimizing air drag due to the streamlining of AVs, but also increase the driving safety by cooperative driving among vehicles [84]. Note that, platoon20 based structure can be also considered in MDVNETs [11], where manually driving vehicles may spontaneously form a platoon, that is, one vehicle follows another one for easy drivi"]} +{"12544448|3330461": ["As a promising fifth-generation technology, D2D communications allow physically approximal devices to directly communicate with each other over licensed cellular band, bypassing the base station (BS) [5]."]} +{"14426404|3330461": ["censed cellular spectrum (or other spectrum bands) without traversing base stations (BSs) or the cellular backhaul networks [10]\u2013[12]."]} +{"3273379|10342730": []} +{"14397096|3330461": ["When joint V2V and V2I is under consideration, the problem of spectrum access and sharing emerges."]} +{"14397096|7644489": ["When joint V2V and V2I is under consideration, the problem of spectrum access and sharing emerges."]} +{"49184822|4787452": ["However, these protocols must be aware of the communication status of neighboring vehicles, which is hard to achieve due to lack of centralized control node [12]."]} +{"3721582|7644489": ["Note that geographically separating mutually interfering D2D users in conventional cellular setups may not be easily achieved since regular D2D users tend to be scattered randomly in the cell (hence proper proximity discovery process is necessary for a cellular D2D system [30])."]} +{"824924|512561": []} +{"824924|875676": ["[14] A.", "According to the Balian-Low Theorem [14], there is no way to utilize a well localized prototype filter in both time and frequency, along with maintaining orthogonality and transmitting at the Nyquist rate."]} diff --git a/edge/graph_203599959.jsonl b/edge/graph_203599959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..283d693678ffe4a55c3dd3b17f8cb1dc2c2494ad --- /dev/null +++ b/edge/graph_203599959.jsonl @@ -0,0 +1,3 @@ +{"52045828|27533715": ["The Kappa statistic ( ) measures the agreement between an observed accuracy and an expected (values ranging from \u22121 to 1), but differs from a simple percent agreement calculation as it considers the agreement occurring by chance [55]."]} +{"132696657|11112426": []} +{"132696657|9010313": []} diff --git a/edge/graph_203605896.jsonl b/edge/graph_203605896.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f187ba217cff5dfb8306ec1a92c3085a4d9e8ce7 --- /dev/null +++ b/edge/graph_203605896.jsonl @@ -0,0 +1,3 @@ +{"6783563|205131192": ["IMAGE MOMENTS have been widely used in computer vision for a very long time, especially for pattern-recognition applications [11], [15], [17]."]} +{"5993633|6972141": ["Our system can be classified in a third group as Map-less navigation [2], because the robot can autonomously navigate without prepared landmarks or complex map-building systems."]} +{"11318631|6972141": [", [21] [13]) in which computer vision is used in the design of motion controllers."]} diff --git a/edge/graph_203606131.jsonl b/edge/graph_203606131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..536b1e098f929e4c6ec6d409b4d9f270f7588b1a --- /dev/null +++ b/edge/graph_203606131.jsonl @@ -0,0 +1 @@ +{"15012860|18960196": []} diff --git a/edge/graph_203606187.jsonl b/edge/graph_203606187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c19d2398f0e404188e490dc00ca2c079f35e656d --- /dev/null +++ b/edge/graph_203606187.jsonl @@ -0,0 +1,12 @@ +{"22592624|8575576": ["During this procedure, relevant regions of whole-slide tissue scans are assessed [6]."]} +{"15288873|8783262": ["WITH ever-increasing concerns over environmental protection and energy conservation, research and development on various electric vehicle (EV) technologies are being actively conducted [1], [2]."]} +{"52168058|9835525": ["color histograms across consecutive frames [31]."]} +{"1295762|2135510": ["High accuracy of SOC estimation not only assures reliable operation but also provides information about remaining useful energy [30], [31]."]} +{"3708885|2323881": ["Extracting high-quality face representations has always been a core task in face recognition [27]."]} +{"182672188|51923615": []} +{"4900015|15326253": []} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"108177845|121289": []} +{"85501407|67821972": []} +{"49728854|12083425": ["ESS can be applied for energy arbitrage [29], peak shaving [30], load flowing [31], spinning reserve [32], voltage support [33], black start [33], [34], frequency regulation [24], power quality [35], [36], power reliability [37], renewable FIGURE 2."]} +{"113129786|5847318": ["The ESS operation can be modeled in many different ways: a first important category is represented by electrochemical models using the equations governing the physicochemical phenomena occurring in a battery [3], [4]."]} diff --git a/edge/graph_203610143.jsonl b/edge/graph_203610143.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8aea8855738371eca47c539707f62f03c46720b --- /dev/null +++ b/edge/graph_203610143.jsonl @@ -0,0 +1 @@ +{"44157913|7559976": ["Domain adaptation surveys have been done in the perspective of computer vision (Csurka, 2017) and machine learning (Pan and Yang, 2010; Weiss et al."]} diff --git a/edge/graph_203626752.jsonl b/edge/graph_203626752.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..95f9da6eb85f8ab4bcae20807b9fbc76190374c9 --- /dev/null +++ b/edge/graph_203626752.jsonl @@ -0,0 +1,5 @@ +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} +{"1033682|174797842": []} +{"34040907|393948": ["The prospect of marrying the two approaches (VAEs and GANs) comes with multiple benefits: auto-encoder based methods can be used to reconstruct data and thus can be used for inpainting [28] [43]; having an inference network allows our model to be used for representation learning [2], where we can learn disentangled representations by choosing an appropriate latent prior."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} diff --git a/edge/graph_203626920.jsonl b/edge/graph_203626920.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203627025.jsonl b/edge/graph_203627025.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbdfd2b589c2aa4dbb0cd96fd4f10382bb3bc5cc --- /dev/null +++ b/edge/graph_203627025.jsonl @@ -0,0 +1,13 @@ +{"57090148|9830350": []} +{"57090148|1236072": []} +{"3452198|206901977": ["Cuckoo search is an optimization algorithm inspired by the obligate brood parasitism found in birds [14]."]} +{"40762|870434": ["\u2026high performance for USNs, the low probability of successful recovery of received packets in the destination node significantly affects the overall Packet Error Rate (PER) and the number of multiple paths required, which in turn becomes a critical factor for reliability and energy consumption."]} +{"31850245|29060869": []} +{"31850245|485843": []} +{"31850245|5747564": []} +{"31850245|6959212": ["\u2022 Security: Wireless nature of WSN also makes the system vulnerable to various external denial of service (DoS) attacks [47,48], physical and cyber threats."]} +{"3482113|7774517": ["In addition, many areas of engineering show that the sensor measurements in a WSN can be very far from the expected measurements and they are known as outliers [16]."]} +{"8327706|16866891": []} +{"37989435|2469117": []} +{"18700962|1582463": ["Mahmood [12] presents a survey of techniques in hardware for detecting control flow errors."]} +{"32621400|31355144": ["Environmental Monitoring One of the most commonly used IoUT application types is environmental monitoring [8], including water quality monitoring, chemical and biological pollution monitoring, thermal pollution monitoring, pressure and temperature monitoring, and fishes tracking.", "In the last decade, researchers have presented numerous potential IoUT applications [8][9][10]][11][12]."]} diff --git a/edge/graph_203639157.jsonl b/edge/graph_203639157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0feeb7e1e482077e049255d5f3d7d04a77578549 --- /dev/null +++ b/edge/graph_203639157.jsonl @@ -0,0 +1,55 @@ +{"73484326|31355144": []} +{"28282424|2469117": ["Each sensor node knows its own location by means of distributed localization system [13]."]} +{"49190511|18115528": ["The underwater medium is associated with a number of challenges [3]."]} +{"25033620|870434": ["Recently, much research on underwater wireless sensor networks (UWSNs) has been performed to support practical applications such as underwater tactical surveillance, undersea exploration, underwater disaster prevention, seismic monitoring, etc [1][2][ 3 ]."]} +{"104293217|8316096": ["The condition of a link may change soon after its computation by a source node and prior to the initiation of data transfer [9]."]} +{"897167|2469117": ["The issue of anchor node\u2019s placement should not be neglected [30].", "Other drawback of SLMP is its high computational complexity [30].", "There is little research on UWSNs\u2019 localization problem for duty-cycle environment [30]."]} +{"29524170|13475127": []} +{"29524170|2469117": []} +{"3543138|31355144": ["Sensor nodes are spatially distributed in UWSNs with some sensing work to obtain water-related properties such as mass, temperature and pressure data [2]."]} +{"3543138|2469117": ["Recently, numerous localization algorithms have been put forward, and some researchers have done some surveys of localization algorithms [13,14]."]} +{"52151446|26335185": ["ACO is a well-known intelligent algorithm where collective behavior comes from the behavior of ants [25]."]} +{"52151446|29398427": ["INTRODUCTION Recently, with the task of accelerating ocean exploration, underwater wireless sensor networks (UWSNs) have been greatly attributed to a variety of applications such as marine resource detection, environmental monitoring, and military defense, to name a few [1].", "They can be placed in pre-configured locations, or they can learn their locations from a location server, where the reference nodes consist of the locations of the unknown nodes and the initial anchor nodes [1]."]} +{"1420402|870434": ["In this section, we briefly overview the localization techniques proposed in UWA-SNs."]} +{"1420402|164835": ["It is a modified version of the indoor S-V channel model [27]."]} +{"149446142|31355144": ["For instance, unlike terrestrial sensor networks where radio waves are used as a medium of communication, UWSNs use acoustic waves predominantly [11,12]."]} +{"69370637|30575518": ["However, the characteristics of underwater environments make it more difficult for such schemes to cope with void regions [27]."]} +{"69370637|205286988": ["On the other hand, geographic routing protocols can be a possible solution for UWSNs [7]."]} +{"69370637|1236072": ["Basically, the concept of Grid-based routing algorithms is to achieve hierarchical grouping of sensor nodes by clustering the sensor nodes based on the construction of 2D/3D logical grid structure in the geographical region of deployment, similar to the definition in [18]."]} +{"9158767|8316096": ["Authors in [1], [2], and [18] provide an overview of existing networking protocols for underwater networks."]} +{"68116150|31245252": ["for all applications anytime and anywhere [1]\u2013[3]."]} +{"68116150|8316096": ["In the literature, there are some OR protocols for UASNs [22]\u2013[24]."]} +{"8698675|31355144": ["O e of the most com ly used IoUT application types is environmental monitoring [12], including water quality monito ing [15], chemical and biological pollution mon oring [28], thermal pollution monitoring, pressure monitoring, and temperature monitoring [29].", "Readers interested in these types of applications are referred to [12] for a more detailed description.", "\u2022 In [12], the authors introduce numerous underwater monitoring applications.", "One of the most commonly used IoUT application types is environmental monitoring [12], including water quality monitoring [15], chemical and biological pollution monitoring [28], thermal pollution monitoring, pressure monitoring, and temperature monitoring [29]."]} +{"54098387|42347181": ["Greedy routing protocols are studied extensively to improve the packet delivery rate with minimum cost [8]."]} +{"3529732|16755687": []} +{"3529732|15233797": []} +{"3529732|13310760": ["Figure 2:A simplified schematic for directed diffusion[5]", "to switch data between thousands of nodes[5].", "Figure 1 compares the data acquired for a given amount of energy[5].", "Figure 4 illustrates the procedure for creating a minimum cost gradient[5].", "All together it is expected that an ideal WSN must be networked, scalable, fault tolerant, consumes less power, smart and software programmable, bandwidth efficient, has faster data acquisition, reliable and accurate over long period of time, costs little and doesn't require maintenance[5].", "SPIN 2 distributes 10% more data per unit energy than SPIN 1 and 60% more than flooding[5].", "Each node consists of a sensing or actuating unit, a processing unit(CPU, micro controller or DSP kit), memory(to store data or program),an RF transceiver(usually with an omnidirectional antenna) and power(battery or solar)[5].", "The data delivery rate decreases linearly with increase in the number of dead nodes[5].", "Figure 4:Procedure for creating minimum cost gradient[5]", "Here a query finds the path to an event using random walks and only a single path is taken from the source to the destination as shown in figure 3[5]."]} +{"3529732|14132386": []} +{"3529732|1230643": ["Sequential Assignment Routing(SAR)[37]."]} +{"3529732|2835258": ["Based on which all nodes host the location service,four different combinations are possible;some for some,some for all,all for some,all for all[43].", "In greedy algorithm the nodes send the packet to it\u2019s one hop neighbour nearer to the destination than itself without maintaining a complete route between the source and the destination[43][44]."]} +{"54460278|8316096": ["span from the deployment to the instant when the network is considered nonfunctional [8]."]} +{"54460278|31355144": ["Since there are few sink nodes in UASNs deployed in the ocean, it is easy to transmit the packets to the water surface but difficult to reach the sink nodes.", "As underwater sensor nodes are powered by batteries which are difficult to replace, the limited energy of nodes restrict the lifetime of UASNs.", "I. INTRODUCTION In the past few years, Underwater Acoustic Sensor Networks (UASNs) have attracted significant interest as a new way to explore and exploit oceans.", "Assuming the number of nodes in the forwarding relay is j, then the total energy of one hop for one packet to transmit to the neighbors is defined as:\nEi = Et + j \u00b7 Er (15)\nIn UASNs, a lot of energy is wasted due to the collisions and retransmission.", "However, compared to the terrestrial wireless sensor network (TWSNs), it is more difficult to achieve efficient communication in UASNs [3].", "The proposed scheme is designed by taking the environmental, computational and energy-limited constraints in UASNs into consideration.", "Thus, the energy distribution is an important indicator reflecting the performance of UASNs.", "Many protocols have been proposed to solve the unique characteristics of underwater acoustic environment such as long propagation delay, high energy consumption and low packet delivery ratio for UASNs.", "Moreover, the radio frequency signals used in TWSNs is not feasible in UASNs because of their rapid attenuation in underwater [4].", "However, UASNs have more serious resource and energy restrictions than that in TWSNs.", "Motivated by the mentioned points above, in this paper, we proposed a DST-based opportunistic routing (EBOR) protocol for UASNs.", "Many applications including marine information collection, resources exploration, geological disasters prevention and military monitoring in various fields motivate further research on UASNs [1], [2].", "In UASNs, sensor nodes under the water surface use acoustic communication to transmit information."]} +{"19262113|30575518": ["Topology control can increase bandwidth and deal with the communication void region problem that diminishes the performance of geographic routing (Coutinho et al. 2017a; Ghoreyshi et al. 2017).", "This topology control methodology has been used to determine suitable UWSN topology reducing void nodes (Ghoreyshi et al. 2017), improve data collection (Forero et al. 2014), or enable much richer underwater applications relying on multimedia content (Fan et al. 2016)."]} +{"51868931|8316096": ["To this end, various routing protocols have been suggested for UWSNs [25].", "However, the usage of acoustic signals in UWSNs has major challenges including limited bandwidth, longer propagation delay, and higher bit error rate [24, 25]."]} +{"51868931|16755687": ["Another paper has been presented by [14] that provides an in-depth discussion of geographical routing protocols."]} +{"51868931|42347181": ["the node may not be able to find the next neighbor towards the sink [13, 34].", "Many survey papers published in UWSNs by [6, 8, 10-13] presented a general review and categorizations for routing protocols.", "The location-based category requires expensive full location information while the beacon-based subcategory is expected to obtain expensive network information by sending beacon messages [13].", "This part contributes to a better delivery ratio than single path under a specific scenario [13, 21] and also consumes more energy as multipath generation results in duplicate packets."]} +{"51868931|16490750": ["Many survey papers published in UWSNs by [6, 8, 10-13] presented a general review and categorizations for routing protocols."]} +{"51868931|2835258": ["Source nodes could have knowledge about their neighbor nodes and can select the next forwarding nodes according to different factors in the protocols such as the nearest neighbor nodes to the destination or sink [31, 32]."]} +{"73477042|870434": ["Moreover, energy-ef\ufb01cient algorithms are required because of the limited energy source of the nodes, and it is tough to replace or re-energize the battery [9]."]} +{"43537553|31355144": ["Whereas [15, 16] and [17, 18] tackle the MAC and application layers, respectively."]} +{"9648418|30575518": ["This phenomenon is called the communication void or local maximum [8], [9]."]} +{"9648418|42347181": ["In this category, a node is called a void node, if it cannot find any other neighbouring node with the shorter geographical distance to the destination [2].", "Underwater sensor nodes are deployed in different depths of the region of interest to collect aquatic information and forward them to any one of the sinks on the surface [1], [2].", "Instead, only the information of one-hop or two hops is maintained in each node which eliminates the need for updating the long route path via the high overhead routing tables and routing messages [2].", "Underwater routing protocols are aimed to improve the packet delivery with minimum cost in UWSNs in which greedy routing protocols are the most prominent approaches [2]."]} +{"59554121|8316096": ["Although traditional routing protocols can improve network performance well, they are still limited by their capacities to deal with multiple constraints and high calculation complexity [20]."]} +{"6044445|870434": ["\u2026the Chinese National High Technology Research and Development Plan (863 program) under Grant No. 2006AA09Z113.\nlocalization, localization schemes often need to deploy anchor nodes underwater and the precision of anchor deployment significantly affects the location accuracy of nodes\u2026", "We first describe the network model, then we propose LDB scheme and at the end of this section we present the LDB algorithm."]} +{"85498403|870434": ["For securing the data reliability, cooperative communication provides one of the effective solutions [9]."]} +{"3391981|8316096": []} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"5889500|141053": ["There has been intensive research on MAC protocols for terrestrial wireless sensor [ 5] and ad hoc networks [ 6]."]} +{"206675|870434": ["To simplify our discussion, we assume the received range of underwater sensors is a disc in 2D, which means that the shape of range is a sphere in 3D."]} +{"54448119|30575518": ["Trapped node is defined as a node which can reach one or more nodes above; however, forwarding packets to these nodes eventually leads the packets to a void node [1].", "This phenomenon is called the communication void or local maximum [1, 8].", "Different factors such as permanent or temporary obstacles, sparse topology, shadow zones, and unreliable nodes or links are considered as the most common reasons for this phenomenon happening [1].", "The trapped nodes are those that involving them in packet forwarding leads a packet to become stuck in a void node [1, 5, 20].", "This however leads to energy dissipation, and interference in the MAC layer [1].", "Hence, an efficient stateless routing protocol should proactively discover the trapped nodes in a preprocessing phase and avoid them during the packet forwarding [1]."]} +{"54448119|16755687": ["Instead, only the information of one hop or two hops is maintained in each node which eliminates the need for updating the long route path via the high overhead routing tables and routing messages [7]."]} +{"42507803|1230643": ["\u2026in underwater acoustic wireless sensor network (UWSN) has attracted much attention in recent years due to its wide applications in such fields as data collection, pollution monitoring, offshore exploration, disaster prevention, target tracking, assisted navigation, and military surveillance [1\u20133]."]} +{"1357012|870434": ["Less effort has been devoted to address the hungry energy aspects of underwater sensor networks [7], despite OR conserves energy as reduces packet re-transmissions."]} +{"49349362|8316096": ["In this realm, the list of data delivery solutions is hefty, including the works of [9, 20, 26, 31] and those surveyed by [19]."]} +{"49349362|31355144": ["Freeing communications from costly and range-limited cabling, underwater wireless technology and networking has the potential to propel scientific and industrial underwater applications into a new era of purpose and innovation [11]."]} diff --git a/edge/graph_203647259.jsonl b/edge/graph_203647259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ce816158050787a45c007ecb6c355e43edee587 --- /dev/null +++ b/edge/graph_203647259.jsonl @@ -0,0 +1,31 @@ +{"14356571|6275330": []} +{"14356571|1230643": ["Ensuring energy efficient and reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems."]} +{"5972227|12817488": ["Since routing and aggregation techniques are common to all WSN-based applications and they are well surveyed in the literature [15], we omit this subclass and we look to the other one which is directly related to target tracking applications."]} +{"5972227|1230643": ["Therefore, network lifetime is considered as an important issue for many applications such as: target tracking [1]."]} +{"9199492|18643817": ["\u2026protocols, and techniques have been done in the last few years to deliver multimedia content over large-scale networks, such as single-hop wired LANs (e.g., [3], [4]), multi-hop wired LANs (e.g., [5]), ATM (e.g., [6], [7]), mobile adhoc networks(e.g., [8], [9]) and the Internet (e.g., [10]\u2013 [14])."]} +{"9199492|14088590": []} +{"9199492|12817488": []} +{"9199492|1236072": ["For example, some applications might require a diverse mixture of sensors for monitoring temperature, pressure, and humidity of the surrounding environment, detecting motion via acoustic signatures, and capturing images or video tracking of moving objects [24]."]} +{"9199492|1230643": ["Although plethora of works on surveying architecture, applications and communication protocols for wireless sensor networks are performed beforehand [1], [15]\u2013[20], this survey is distinguished from the previous efforts in that it pioneers to investigate those routing techniques which address application-specific QoS as well as energy efficiency for WMSNs.", "[15], [34], [35], [36], [39], [40], [41], [42] Hard Real-time Bounded"]} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"41998167|15947359": ["technology, have enabled the use of video sensors and this resulted in a new class of WSNs, called visual or multimedia sensor networks [5,6], that can be used for various potential applications, such as telepresence and surveillance.", "Besides these, the availability of low-cost hardware and rapid development of tiny cameras and microphones have enabled a new class of WSNs: multimedia or visual wireless sensor networks [5,6] and this new class has contributed to new potential WSN applications, such as surveillance.", "It is certain that, these networks also have tighter QoS requirements, such as low data delay and maximum reliability, compared to traditional WSNs [6]."]} +{"41998167|270804": ["The reader can refer to [24\u201329] for QoS support at the network layer, and to [30\u201333] at the transport layer and to [34] for different layers."]} +{"41998167|10559330": ["In this context, reservationbased approaches, such as Integrated Services or IntServ [8], are widely used in providing QoS guarantees.", "IntServ model maintains service on a per-flow basis and can be considered as a reservation-based approach.", "1 shows the concepts of IntServ and DiffServ models discussed in this section.", "However, IntServ model has a number of disadvantages which makes it inappropriate for WSNs. Firstly, it is hard to provide guaranteed service quality due to time varying channel capacity on the wireless medium.", "Third, IntServ model requires a reliable in-band or out-of-band QoS signaling within the sensor network for resource reservation which is very hard to assure in WSNs.\nDiffServ model maintains service on a per-packet basis and can be considered as a reservation-less approach.", "There are two service differentiation models proposed for conventional computer networks, Integrated services (IntServ) [8] and differentiated services (DiffServ) [16]."]} +{"19919815|41998167": []} +{"33688264|16939966": ["In [7,8], various issues concerning channel modeling, coexistence, energy consumption, MAC layer issues, and design features are analyzed and summarized."]} +{"33688264|10997547": ["More recently, MAC protocols for cognitive radio body area networks have been developed [9]."]} +{"33688264|303976": ["In [6], different design approaches for the PHY and MAC layers, for efficient and reliable mobile healthcare services in WBANs, are discussed."]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"5172416|270804": ["However, these traditional transport protocols cannot be directly implemented over wireless sensor network [6, 49] because WSN in general and WMSN in particular have their distinctive features, which make them different than typical Internet network, and they have very wide range of applications that need special requirements."]} +{"5172416|1236072": ["The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"5172416|1230643": ["WSNs are becoming more low-cost, low-power, multi-functional, and viable due to the advances in micro-electro-mechanical systems (MEMS), low power and highly integrated digital electronics, and proliferation of wireless communications [1].", "The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"5440113|10817088": ["Passive Infrared (PIR) Motion Sensors offer a cheap and popular solution, but they have some disadvantages: they can only detect objects if they are moving suf\ufb01ciently quickly and are located within the frustum of the PIR system [5]."]} +{"5440113|14397159": ["Besides, Cardinaux et al. [6] state that many PIR sensors are required to track people in a complete room."]} +{"5404353|16120075": ["For many applications, sensors are expected to be randomly deployed, since it is easier and less expensive for large wireless sensor networks [8].", "Viewing angle, lens quality and zoom capabilities, as well as the type of the camera used in source nodes (fixed or PTZ [8]), are major factors that influence the resulting FoV and the way visual data are retrieved from the environment.", "As deployed video-based sensors may have a unique view of a target or scene, even overlapping sensors may produce different visual information [8] (for example, viewing the front and back sides of a person).", "Most cameras installed at source nodes are not ominidirectional, resulting in a directional sensing capability usually referred as the cameras\u2019 Field of View (FoV) [8].", "The work presented in [29] exploits the overlapped area created by the field of view of source image sensors, when there are inter-sensor correlations [8]."]} +{"5404353|15947359": ["In such contexts, when multimedia data is collected exclusively by video-based sensors, the resulting networks are referred to as Visual Sensor Networks [7].", "Several papers can be found in the literature surveying general aspects of wireless sensor networks [1-3] and wireless multimedia sensor networks [5-7 , 10 ] ."]} +{"5404353|1230643": []} +{"5404353|387610": ["Energy saving is achieved through image compression using JPEG2000 codec [27,28], according to the acceptable quality of the transmitted images."]} diff --git a/edge/graph_203650652.jsonl b/edge/graph_203650652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0010339e87d3984865181a1c768b1d3069efde12 --- /dev/null +++ b/edge/graph_203650652.jsonl @@ -0,0 +1,24 @@ +{"13712294|8909218": ["Many candidate technologies have been proposed for 5G, among which massive MIMO and heterogeneous cellular networks (Hetnets) [3], [4], [27] are two different potential approaches."]} +{"26289353|8606364": ["While the entire radio spectrum from 6 kHz to 300 GHz has been allocated [1], the traditional spectrum policies has been shown to be highly inefficient that some radio bands are overcrowdedwhile others are underutilized [2]\u2013[4]."]} +{"26289353|15116409": []} +{"11219057|12601073": ["In the Bayesian method, the unknown parameter can be treated as a random variable with known distribution [7].", "In classical detection theory, there are two main approaches to tackle this problem: the Bayesian and the GLRT methods [2], [7].", "[7] and the references therein) have been proposed in the literature for detecting primary spectral holes.", "Therefore, the CR fusion center can sense the presence or absence of each stream of primary by an independent binary hypothesis test [2], [7]."]} +{"11607852|61132": ["Currently, deploying UAV-assisted wireless networks faces multiple challenges such as maintaining efficient communication, reducing delays and, designing robust routing protocols [18]."]} +{"11607852|6583734": ["This type of cooperative connection is expected to be performed thanks to the emergence of network function visualization (NFV) and software-de\ufb01ned networks (SDN) concepts [54]."]} +{"53528652|11720829": ["The spectrum ef \ufb01 ciency can be enhanced further by using spatial diversity techniques [9, 10] and user cooperation diversity [11 \u2013 16]."]} +{"3480987|2509135": []} +{"22530592|6779551": ["With regard to jamming, legitimate transmission should not be attacked by the jamming signal from active jammers outside the network [6].", "On the other hand, due to the broadcast and superposition characteristics of wireless channels, the security of information transfer in wireless networks is still a critical and challenging issue [6].", "[6] Y."]} +{"5026992|4395259": ["Researchers predict that physical layer security is a promising way to overcome security threats, since the physical layer security approach establishes a secure communicationwithout the need to computational resources from the upper layers as in conventional security solutions [2], [3]."]} +{"3421702|26259297": ["Hence, { E ij } can be tracked from the uplink training with low overhead [36]."]} +{"2526549|2509135": ["Interference temperature should be dynamic in the CR network [5]; thus, the rate threshold Rth should be varying, as well based on SNR.", "For the latter case, SUs are permitted to coexist with PUs in the same band if the interference temperature limit of PUs can be satisfied [5]."]} +{"2075465|2509135": ["The readers may refer to other publications in recent reviews [217], [218] and recent special issues, e."]} +{"2075465|12601073": []} +{"6532498|8909218": ["EMTOCELLS are small base stations designed mainly for indoor use, to provide high data rates for next generation wireless cellular networks [1].", "\u2026j ko ) H H j ko ) S i k ={j \u2208 {1, . . . , M} : tr((H j ko ) H H j ko ) \u2265 \u03c4 tr((H S 1 k ko ) H H S 1 k ko ), |S k | \u2264 n}, \u2200i = 1 (2) where \u03c4 \u2208 [0] [1] is a constant that we use to compare the interference caused by each SU compared to the highest SU interferer at that PR. Specifically, it is the\u2026"]} +{"24856074|2509135": ["If signal of a primary user is known to a cognitive network, matched filter detection can be used by performing coherence detection of received signal to maximize SNR [38] [39]."]} +{"3482957|3913780": ["In [27], the authors survey on the existing methods for predicting the popularity of different types of web content."]} +{"3784799|8909218": ["There are two categories of interference occurring in HetNets: cross-tier interference and cotier interference [2], [3]."]} +{"4339410|2509135": []} +{"27894359|8909218": ["Therefore, assuming a femtocell heavily limited by inter-tier interference, since the FAP can provide high SNR within the short range of the femtocell footprint [3], the DoF corresponds to the prelog factor of the femto users once the interference has been canceled, for instance through a transmission scheme such as the proposed cogBIA scheme.", "In this context, several wireless communication systems have proposed the use of small cells that have low power transmission and that are randomly and sparsely deployed within the coverage area of a macro BS [3], [4]."]} +{"15919908|7800459": ["The topic of exact repair of MDS codes has received attention in the recent literature [3]\u2013[8], [11]."]} +{"3796900|3330461": ["Uplink spectrum is typically considered to be preferable in this context as the position of the interfered receiver is fixed in this case [10], [11]."]} +{"3796900|7644489": ["Uplink spectrum is typically considered to be preferable in this context as the position of the interfered receiver is fixed in this case [10], [11]."]} +{"21991318|2509135": ["However, in the above IA-based CR schemes, PU\u2019s performance can be further improved.", "Although some schemes have been proposed to solve the issue, it is still a challenging trade-off to improve the throughput of secondary users (SUs) while guaranteeing the quality of service (QoS) of PUs [2].", "The iterative IA algorithm alternates between the forward and reverse directions until convergence, and the SUs\u2019 precoding matrices and PU\u2019s decoding matrix can be obtained.", "In [6], Rezaei and Tadaion proposed a fast algorithm to perform IA in a CR network, where the cooperation between PUs, the water-filling algorithm and the interference cancellation were leveraged.", "Then the PU\u2019s precoding matrix is designed to maximize its throughput accordingly.", "(15)\nTo maximize PU\u2019s rate, the problem can be formulated as\nmax V[0]\n, R[0], s.t.", "In CR networks, the underlay spectrum sharing is a key technique, where the most important challenge is to control and manage the interference at primary users (PUs).", "Thus the SUs\u2019 precoding matrices and PU\u2019s decoding matrix can be obtained through iterations between forward and reverse directions.", "The PU\u2019s rate can be expressed as\nR[0] = log2 \u2223\u2223\u2223\u2223Id + P d\u03c3 2 U[0]\u2020H[00]V[0]V[0]\u2020H[00]\u2020U[0] \u2223\u2223\u2223\u2223 .", "Then the PU\u2019s precoding matrix is designed to optimize its throughput accordingly."]} diff --git a/edge/graph_203655025.jsonl b/edge/graph_203655025.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3c94c4fdb45faa7ed48e58404f6d91b4410231e --- /dev/null +++ b/edge/graph_203655025.jsonl @@ -0,0 +1,13 @@ +{"22017601|535695": ["corresponding control strategies can change accordingly [8]."]} +{"17114993|17670369": ["We refer the reader to [11] for a more comprehensive survey of previous studies, and to [12\u201314] for recent insight on current knowledge and expected future directions in haptic assembly."]} +{"17114993|15231229": []} +{"39078431|14561706": ["In [15], for the first time, an anthropomorphic robotic hand called Shadow Hand with artificial skin on the fingertips, shown in Figure 1(b), discriminated 20 different in-hand objects with different shapes via the surface texture properties.", "[14] Moreover, having flexible, stretchable tactile sensors over whole body of humanoids are particularly important in applications such as disabled and aged care, nursing and caring for patients with mild mental impairment, where a significant amount of communication is non-verbal interaction.[15] Furthermore, touch information is beneficial for a natural handling of a robots motion by users."]} +{"33101879|8008208": []} +{"46895120|14843594": ["\u2022 State-of-the-art learning algorithms such as Covariance Matrix Adaptation [32], Bayesian optimization [34] and particle swarm optimization [33] are compared experimentally within the proposed framework.", "The reduction of complexity is followed by the application of machine learning methods such as CMA-ES [32], Particle Swarm Optimization [33] and Bayesian optimization [34] to solve the problem not directly on motor control level but in the meta parameter space."]} +{"8574504|9869210": ["Various semantic segmentation surveys already exist such as the works by Zhu et al. [12] and Thoma [13], which do a great work summarizing and classifying existing meth-ods, discussing datasets and metrics, and providing design choices for future research directions."]} +{"17670369|15231229": ["Physics-based solvers generally sacrifice computation accuracy to keep the update rate of the visual simulation realistic (Jim\u00e9nez et al. 2001).", "A comprehensive review of collision detection algorithms can be found in Lin and Gottaschalk (1998) and Jime\u00b4nez et al. 2001) and a taxonomy of collision detection approaches can be found in Borro et al. (2005)."]} +{"15437150|4019175": []} +{"18797972|15231229": []} +{"23505923|15231229": ["\u2026adopted in a wide range of applications such asrobotics[Zheng et al.2011; Dietrich et al. 2012; Zheng and Yamane 2013], real-time haptic rendering [Jimnez et al. 2001; Laycock and Day 2007], rigid-body dynamics [Redon et al. 2002; Tasora and Anitescu 2011], medical surgery [Liu et al. 2003],\u2026"]} +{"29350668|393948": []} +{"36499769|207150075": ["The strategy is independent of external devices such as F/T sensors or Remote-center-compliance devices [21]."]} diff --git a/edge/graph_203655418.jsonl b/edge/graph_203655418.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45ba24c57cdf4efd87adfd2396225dcabb404895 --- /dev/null +++ b/edge/graph_203655418.jsonl @@ -0,0 +1,13 @@ +{"67865689|2756896": ["The published data contains unique information like location, trajectory, or even some media data with images of users [10][11] [12].", "These methods leverage published data of users, including location, trajectory, text data, or even media data [12] [17]."]} +{"3906402|15273230": ["However, Accuracy scores of UMA and BIG-ALIGN-PM in Figure 4(d) are both very high (around 100%) with negligible gaps, which may be due to the class imbalance issues [5]."]} +{"13017422|8364569": ["This can be done utilizing the newly proposed NSIS extension [6]."]} +{"62608828|12860838": []} +{"2450583|386036": ["Record linkage (RL)(or alternatively Entity Resolution) [9, 5] refers to the task of \ufb01nding records that refer to the same entity in two or more databases."]} +{"149451314|4271578": []} +{"18776866|386036": ["The main findings can be summarized into two categories: (a) It is pointed out that rare attribute values in highdimensional sparse data sets can help de-anonymization [20, 10].", "In this paper, we have similar hypothesis on structure features for user linking (see Section 5)."]} +{"44881850|386036": []} +{"17487902|386036": ["User linkage is also in one way or another related to problems from other research communities including co-reference resolution in natural language processing [4], inter-media data retrieval [26], entity matching [28], record linkage in database [8, 11, 24], and name disambiguation in information retrieval [20, 14], which can be generalized as entity resolution across different records.", "Compared with the record linkage problem long studied in database community [8, 11, 24], our technical breakthrough comes from taking advantage of two important features unique to social data: (I) user behavior trajectory along temporal dimension: both empirical and social behavior studies (e."]} +{"7332516|386036": [", record linkage/entity resolution) are described in the survey [4]."]} +{"9782354|386036": ["[11] surveyed different types of string similarity measures on strings when they are applied to duplicate record detection."]} +{"1500898|386036": ["For a comprehensive overview on the topic see Elmagarmid, Ipeirotis, and Verykios 2007."]} +{"9413347|386036": ["The idea behind unsupervised approaches is that similar comparison vectors correspond to the same class (Elmagarmid et al. (2007)).", "Entity Resolution (ER) is an important issue, which has been addressed by many researchers in the past (Getoor & Diehl (2005); Brizan & Tansel (2006); Elmagarmid et al. (2007); Benjelloun et al.", "This method is well-known in ER (Elmagarmid et al. (2007)).", "There are three main approaches (Elmagarmid et al. (2007); Veldman (2009)):", "There are three main approaches (Elmagarmid et al. (2007); Veldman (2009)): Learning-based.", "Soundex is a well-known method in ER (Elmagarmid et al. (2007)).", "Entity Resolution (ER) is an important issue, which has been addressed by many researchers in the past (Getoor & Diehl (2005); Brizan & Tansel (2006); Elmagarmid et al. (2007); Benjelloun et al. (2009)).", "Soundex is a well-known method in ER (Elmagarmid et al. (2007)). For example, Soundex(\u201cSmith\u201d) = S530, Soundex(\u201cSmythe\u201d) = S530. A major drawback to Soundex is that it keeps the first letter, thus any error or variation at the beginning of a name will result in a different Soundex code. Soundex codes of the two users\u2019 full names were compared to see how similar the full names sound when they are spoken. If the two Soundex codes are equal, then the similarity score is 1 and 0 otherwise. For example, Soundex(\u201cSmith\u201d) = Soundex(\u201cSmythe\u201d) = S530, therefore the similarity name score is 1. \u2022 Difference Name Similarity - The Difference function performs a Soundex on two strings and returns an integer that represents how similar the Soundex codes are for those strings. The integer returned is the number of characters in the Soundex values that are the same as one another. The return value ranges from 0 to 4, with 0 indicating weak or no similarity and 4 indicating strong similarity or the same values. For example, Soundex(\u201colga\u201d) = O420 and Soundex(\u201colgit\u201d) = O423; notice that there are 3 of the same characters in the SOUNDEX values, therefore the Difference(\u201colga\u201d, \u201colgit\u201d) = 3. To normalize the returned integer value to be in the range of 0 to 1, we divided the returned integer by 4. For example, Difference(\u201colga\u201d, \u201colgit\u201d) = 3, therefore the similarity name is 34 . \u2022 LCS Name Similarity - The Longest Common Sub-string (LCS), (Friedman & Sideli (1992)) repeatedly finds and removes the longest common sub-string in the two compared strings up to a minimum length."]} diff --git a/edge/graph_203655617.jsonl b/edge/graph_203655617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f0e82568f6b071fd76330c8a0e6b642180d5a9b --- /dev/null +++ b/edge/graph_203655617.jsonl @@ -0,0 +1,3 @@ +{"85499124|4395259": ["In recent years, the computer power of eavesdropper is becoming more and more powerful [7], so this problem has been mostly solved."]} +{"9308128|4395259": ["In addition to upper layer approaches, the security problem has also been addressed from an information-theoretic perspective [8]."]} +{"51921245|4395259": ["cryptographic schemes, which rely on the limited computational power of the eavesdropper, have become increasingly uncertain, since the computational ability of potential eavesdroppers is becoming more powerful [12]."]} diff --git a/edge/graph_203655671.jsonl b/edge/graph_203655671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203661122.jsonl b/edge/graph_203661122.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e80cb42f7353e5559e443feb9b25a536717529c --- /dev/null +++ b/edge/graph_203661122.jsonl @@ -0,0 +1,13 @@ +{"35754564|1230643": []} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"17415027|1113420": ["The importance of context-awareness has been recognized beyond its original scope of pervasive and ubiquitous computing [8]."]} +{"14288780|1230643": ["Almost any sensor network application requires some form of self\u00adcon.guration, where sensor \nnodes take on speci.c functions or roles in the network without manual intervention."]} +{"113026968|14441987": ["Initially, protocol design focused on efficiently finding shortest path routes in the presence of node mobility [25]."]} +{"113026968|713082": ["The establishment of optimal multicast trees is a problem that has been studied extensively in the networking community [48]."]} +{"30537550|1230643": []} +{"41086256|1230643": ["Because energy consumption of a sensor node is mainly used for transmission of packets [31], the cost measured by Packet can evaluate the energy consumption of sensor nodes."]} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"15001599|1230643": ["IRELESS sensor networks (WSNs) [1] have been universally applied in a variety of fields such as environment monitoring, structural protection, military surveillance, target tracking, information collection, and so on."]} +{"36521847|205286988": ["WSN routing protocol is an important part of the network to achieve energy efficiency, of which the design is closely related to the specific application [3]."]} +{"36521847|1230643": ["Since wireless sensor network (WSN) has high degrees of self-organization, reliability, mobility, survivability and other characteristics, WSN technology has been widely used in military, environment, family and commercial applications along with the development of micro-electromechanical systems, sensor technology and communication technology [1,2]."]} +{"37443441|205286988": []} diff --git a/edge/graph_2036805.jsonl b/edge/graph_2036805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203687674.jsonl b/edge/graph_203687674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..daa42659cb7d8ad670479c09ee2f35e33b375720 --- /dev/null +++ b/edge/graph_203687674.jsonl @@ -0,0 +1,6 @@ +{"2992954|13385255": ["It is based on the open-EDI reference model (International Organization for Standardization (ISO) 2004) and work of (Dorn et al. 2007)."]} +{"6988662|8994149": ["The belief of the software engineering community is that as a result of improved development processes [Dow93], [Arm93] and [Jar94]. there shall be both, improved productivity of the software systems industry and improved systems quality, The focus has been to increase the level of formality of\u2026"]} +{"28593706|627405": []} +{"12198584|7839197": ["While we assume the classical AI definition of software agent, that is, a software having properties such as autonomy, social ability, reactivity, proactivity, as given, for instance in [24], in Tropos we define a role as an abstract characterization of the behavior of a social actor within some specialized context or domain of endeavor, and a position BRESCIANI ET AL."]} +{"18631853|7696556": []} +{"17889342|7216558": ["As a first step, the goal model, the process model and the mapping model are transformed into a knowledge base in Description Logics.", "However, there are some initial approaches that address such issues in Description Logics [39].", "In the remainder of this section, we consider how such a comparison is realized by concept comparison (i.e., subsumption checking) in Description Logics.", "There are two special concepts in Description Logics, namely the universal concept (top concept) \u22a4 and the bottom concept \u22a5.", "In our work, we propose an automated solution that relies on Description Logics and automated reasoners for validating mappings that describe the realization of goals by activities in business process models.", "Next, based on these correspondences, we propose a formal modeling (Section 5) and validation (Section 6) approach in Description Logics.", "Sound and complete Description Logics based reasoning is used to ensure realization equivalence between user intentions and their corresponding (mapped) activities; that is, that there are no contradictions between relations of intentions compared to their mapped activities.", "To this end, a subset of Description Logics constructs (ALC expressiveness) is used in our framework.", "Afterwards, the second step leverages reasoning services, which rely on the well defined Tarskistyle semantics [28] of Description Logics, to recognize (possible) inconsistencies between goal models and process models.", "We build the models directly in the Description Logics representation as follows:\n1.", "We use Description Logics (DL) [33] to model workflow patterns, intentional relations and mappings.", "The meaning in Description Logics is that an instance of goal G\u2032 must have a role / property requires to another goal instance."]} diff --git a/edge/graph_203698614.jsonl b/edge/graph_203698614.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbcc2cdb2c4dce2789143708b96a4331bf0c1b0d --- /dev/null +++ b/edge/graph_203698614.jsonl @@ -0,0 +1,33 @@ +{"2937298|2875192": []} +{"2937298|8575576": []} +{"10885700|2875192": ["Another open challenge for automatic categorization of medical images is the inter-class versus intra-class variability problem [6, 7, 11].", "Such systems have immense applications in todays modern health-care domain: not only these systems can be used to reduce the workload of the medical personals, but also can be used as a cost-effective alternative in places where there is a lack of medical experts [2, 7, 10, 11, 12]."]} +{"3130134|2875192": ["In [14] a more recent review emphasizing the multi-dimensional (2D and 3D) and multimodality nature of the medical retrieval scenario is provided."]} +{"16464456|2875192": ["Some other CBIRbased CAD methods are investigated in [17] and [55]."]} +{"22163644|2875192": ["The traditional solution for multimodal feature embedding is to concatenate the feature vectors from different modalities together [1], and then apply learning algorithms directly on the concatenated vector.", "To facilitate the AD treatment, neuroimaging retrieval is an effective way [1, 2]."]} +{"29723448|2875192": ["Some modules of CBMIR architecture are also present in most of CAD definitions [27, 17]."]} +{"12572599|393948": ["In this method, some spatial information is still missed."]} +{"23074708|2875192": ["Thus, it is more scalable and reliable than the expensive and subjective manual labeling [27].", "More recently, other systems, use a local features based on keypoints such as SIFT, SURF etc [27]."]} +{"23074708|6387482": ["There are three main ways for multimodal fusion: early fusion (feature level fusion), late fusion (decision level fusion) and hybrid fusion (a combination of the previous two) [2]."]} +{"17233601|6280485": []} +{"33033358|2875192": []} +{"33033358|6280485": []} +{"16261055|2875192": ["Content-based medical image retrieval (CBMIR), which retrieves a subset of images that are visually similar to the query from a large image database, is the focus of intensive research (Mu\u0308ller et al., 2004; Cai et al., 2008; Akgu\u0308l et al., 2011; Kumar et al., 2013).", "\u2026of research groups are working in this area (Mu\u0308ller et al., 2004; Zhang et al., 2010; Akgu\u0308l et al., 2011; Cai et al., 2012; Hanbury et al., 2012; Kumar et al., 2013; Jiang et al., 2015a), and there is a trend to use a bag-of-visual-words (BoVW) for medical image representation (Castellani et\u2026"]} +{"23485771|2875192": ["When the features are represented as a vector, distance metrics can be used to measure the similarity of image features [12].", "Nodule characterization also could be enhanced by increasing the number of dimensions in the feature extraction process [12], for instance applying a volumetric margin sharpness analysis."]} +{"9180089|2875192": ["[5] provides a more recent review, emphasizing"]} +{"122344|2875192": ["[16] give a more detailed review of the techniques applied in the context of medical content-based image retrieval and classification."]} +{"122344|6387482": ["feature vector) [29].", "[29]."]} +{"18086437|2875192": []} +{"28778169|2875192": ["A direct consequence of this is the rise in medical imaging informatics research, including content-based image retrieval [1, 2], modality-classification and case-based retrieval [3], classification [4, 5], and annotation [5\u20137]."]} +{"15473704|2875192": ["According to Kumar et al. (2013), the similarity of image features can be measured in a number of ways.", "The ideal case would be a retrieval system that achieves 100 % precision and 100 % recall (Kumar et al. 2013).", "Essentially, CBIR measures the similarity of two images based on the similarity of the properties of their visual components, which can include the color, texture, shape, and spatial arrangement of regions of interest (ROIs) (Kumar et al. 2013).", "The sensory gap is further compounded when 2D images of physical 3D objects are considered; some information is lost as the choice of viewpoint means an object may occlude part of itself (Kumar et al. 2013).", "Finally, statistical classifiers can be trained to categorize the query image into known classes (Kumar et al. 2013).", "Retrieval is performed on the basis of image features not image interpretations (Kumar et al. 2013)."]} +{"15473704|16403716": ["Other systems have been also presented like for examples: MARS, NeTra, PicHunter, Blobworld, VisualSEEK and SIMPLIcity (Wang et al. 2012; Hu et al. 2011)."]} +{"16234956|393948": ["The novel approach is inspired by ideas from image feature representation learning and deep learning [10] and yields a deep learning architecture that combines an autoencoder learning layer, a convolutional layer, and a softmax classifier for cancer detection and visual analysis interpretation.", "These methods have recently become popular since they have shown outstanding performance in different computer vision and pattern recognition tasks [2,8,10].", "Deep learning (DL) architectures are formed by the composition of multiple linear and non-linear transformations of the data, with the goal of yielding more abstract \u2013 and ultimately more useful \u2013 representations [10].", "Unsupervised feature learning via autoencoders: Training images are divided into small patches (8\u00d78 pixels), which are used to train an autoencoder NN [10] with k hidden neurons.", "The autoencoder looks for an output as similar as possible to the input [10]."]} +{"27391290|8575576": ["[1] These digitized slides afford the possibility of applying image analysis techniques to DP for applications in detection, segmentation, and classification."]} +{"367711|2875192": ["In addition to the classifier-based CAD systems providing diagnosis results or grading scores, content-based image retrieval (CBIR) has also been extensively investigated for decision support in many clinical applications, including digital pathology [12]\u2013[16]."]} +{"367711|8575576": []} +{"2507429|53115327": []} +{"15518368|2875192": []} +{"5862539|2875192": ["In recent years, researchers became increasingly interested in applying Content-Based Image Retrieval (CBIR) [19] techniques to medical images [20] [21] [22] [23] [24]."]} +{"33442497|1596835": []} +{"9912|2875192": []} +{"9912|8575576": []} +{"16635890|15744805": ["A variety of different CT scanners was used for acquisition, including machines with 4, 16, and 64 detector rows of different manufacturers."]} diff --git a/edge/graph_203702572.jsonl b/edge/graph_203702572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203705410.jsonl b/edge/graph_203705410.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e32b36f0883b9926dc13c9624c899c70b5270a2c --- /dev/null +++ b/edge/graph_203705410.jsonl @@ -0,0 +1,7 @@ +{"113952875|1902238": []} +{"19733568|207203830": []} +{"62303195|206743327": []} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"1673682|8281388": []} +{"196085636|11894197": ["In 2007, Saeys and co-workers published an introduction to FS in bioinformatics [3].", "sequencers and mass spectrometers); and ii) the features, attributes and variables collected alongside each sample [3]."]} +{"17606518|1902238": ["Before 2011, the paper [7] reviewed the related LV segmentation algorithms detailedly."]} diff --git a/edge/graph_203706840.jsonl b/edge/graph_203706840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb5233689489b408214f1b37b08018c39617a3f4 --- /dev/null +++ b/edge/graph_203706840.jsonl @@ -0,0 +1,10 @@ +{"11842279|5188711": ["Different implementations of KF in industrial applications were reviewed in [38]."]} +{"18718316|9568259": []} +{"36440393|206583375": ["This angle is formed using the direction lines of the signals transmitted from the access points to the device location [1].", "These obstacles weaken the received GPS signal and result in inaccurate predication of device location [1].", "In the online phase, the current readings are matched with the values stored in the radio map database to determine the current position [1].", "There are two categories of triangulation techniques: lateration and angulation [1].", "The Wi-Fi indoor positioning is either based on triangulation or fingerprinting techniques [1].", "In lateration, the most famous technique is known as time of arrival (ToA) which uses the velocity of the transmitted signal and its travel time to estimate the mobile device location [1]."]} +{"1852599|164835": ["\u2026On-Board Equipment (OBE) installed in the vehicle and Roadside Equipment (RSE) installed at a traffic light [6], through cellular communications between the cellphone of the driver and the network base station [7], [8], or through a wireless sensor network operating in an unlicensed band [9], [10]."]} +{"1000620|164835": ["In a typical ITS application, every vehicle \ufb01tted with an OBU communicates Arrival (TDOA), and Angle Of Arrival (AOA) methods [11]."]} +{"1889662|18691290": []} +{"33584214|206583375": ["Also the system is influenced by many interference sources such as weather and light [3]."]} +{"10805930|15093118": ["There have been lots of solutions proposed in the ITS fields, including the enhanced satellite signal processing [3], road map assistance [4], and the multisensor integrated solutions with inertial sensors [5], vision sensors [6], radars [7], laser range finder [8] and the in-vehicle sensors [9], etc."]} +{"52193508|30518875": ["Besides, continuity is an important criteria for railway signaling and train control in order to guarantee the safety of the operations [22] [23]."]} +{"7344108|164835": ["4) According to the neighbors\u2019 uncertainty evaluation, the LUV chooses as reference nodes three neighbors with much better accuracy3 than the LUV.", "Furthermore, because the measurement errors accumulate over the total period of time, such a method is recommended for use over short periods of time.", "(7)\nThe a priori estimate error covariance is then\nPik+1/k = E [ eik+1/k e i k+1/k T ]\n(8)\nand the a posteriori error estimate is\nPik+1/k+1 = E [ eik+1/k+1 e i k+1/k+1 T ] ."]} diff --git a/edge/graph_203708733.jsonl b/edge/graph_203708733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d8b55b662f4468bb952a4a7b194fadfbbb576e7 --- /dev/null +++ b/edge/graph_203708733.jsonl @@ -0,0 +1,7 @@ +{"5256174|15064932": []} +{"59134727|12060835": ["As reported in [8], ongoing research efforts on terrestrial communications have shown that energy harvesting plays a significant role in improving the performance."]} +{"85500539|3930401": ["Various types of communications such as machine-to-machine, device-todevice, chip-to-chip, vehicle-to-vehicle, vehicle-toinfrastructure, infrastructure-to-vehicle, point-to-point, and point-to-multipoint can be accomplished using different OWC systems [7], [15].", "The RF band lies between 3 kHz and 300 GHz of the electromagnetic spectrum [7].", "The wireless connectivity based on the optical spectrum is termed as optical wireless communication (OWC) [6], [7].", "distances ranging from a few nm to more than 10,000 km is possible using OWC systems [7]."]} +{"85500539|10235514": ["The main features of the 5G communication services will include ultra-high system capacity, ultra-low latency, ultrahigh security, massive device connectivity, ultra-low energy consumption, and extremely high quality of experience (QoE) [1]\u2013[4].", "OWC technologies consume very low power that is also one of the key requirements of 5G [1]."]} +{"85500539|4502294": []} +{"20395813|15064932": ["Different signaling mechanisms for a more dynamic circuit provisioning in the core area have already been specified in different proposals including generalized multiprotocol label switching (GMPLS) [11], automatic switched transport network (ASTN) [12], Optical Internetworking Forum (OIF) [13], optical channel (OCh) and optical data unit (ODU) switching [14], [15] as well as TCP switching [16].", "area have already been specified in different proposals including generalized multiprotocol label switching (GMPLS) [11], automatic switched transport network (ASTN) [12], Optical Internetworking Forum (OIF) [13], optical channel (OCh) and optical data unit (ODU) switching [14], [15] as well as TCP switching [16]."]} +{"20395813|2670373": ["Recently, a number of different single- and multistage switch architectures supporting synchronous and asynchronous switching of variable- or fixedlength optical packets and bursts and contention resolution in electronic or optical domain have been proposed [43]\u2013[46]."]} diff --git a/graph_2037250.jsonl b/edge/graph_2037250.jsonl similarity index 100% rename from graph_2037250.jsonl rename to edge/graph_2037250.jsonl diff --git a/edge/graph_203734696.jsonl b/edge/graph_203734696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a364b4ee97d2c1972c5502609a021528d3eab6d8 --- /dev/null +++ b/edge/graph_203734696.jsonl @@ -0,0 +1,13 @@ +{"157543729|469744": []} +{"19547032|43120813": ["All three testbeds provide APIs for experimenters to programmatically discover, reserve and setup resources, either using scripts or more advanced experiment orchestration tools [3].", "\u2026is a challenging process, and usually involves many different tools: the testbed itself, usually composed of numerous services, but also experiment orchestration solutions [3] ranging from shell scripts to complex frameworks, load or failure injectors, emulation solutions, measurement tools, etc."]} +{"37874408|1207973": []} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} +{"5429882|44461432": ["Recently, the emerging technologies (e.g., Internet of Things (IoT) [1\u20133], wireless sensor networks [4, 5], big data [6], cloud computing [7\u20139], embedded system [10], and mobile Internet [11]) are being introduced into the manufacturing environment, which ushers in a fourth industrial revolution."]} +{"5429882|37052879": ["The IWN is superior to wired network in a manufacturing environment; but the existing IWNstandards such asWIA-PA [29] andWirelessHART [30] cannot provide enough bandwidth for heavy communication and high-volume data transfer."]} +{"15749479|2357830": ["\u2026of a number of new versions of platforms and technologies including device and process identi\ufb01cation and tracking, sensing and actuation, communication, computational sensing, semantic knowledge processing, coordinated and distributed control, and behavioral, traf\ufb01c, and user modeling [3]."]} +{"15164580|10390713": []} +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"12103882|17774971": []} +{"12103882|192934": []} diff --git a/edge/graph_203737273.jsonl b/edge/graph_203737273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2037989.jsonl b/edge/graph_2037989.jsonl similarity index 100% rename from graph_2037989.jsonl rename to edge/graph_2037989.jsonl diff --git a/edge/graph_20381614.jsonl b/edge/graph_20381614.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c94b540921acce1e17c25624b582f5b0ad616e6 --- /dev/null +++ b/edge/graph_20381614.jsonl @@ -0,0 +1 @@ +{"14136265|15619069": []} diff --git a/edge/graph_203837078.jsonl b/edge/graph_203837078.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3bcef0a1a105bdb2fc3b8a5539321cb2fb14e9c --- /dev/null +++ b/edge/graph_203837078.jsonl @@ -0,0 +1,32 @@ +{"49907150|2088679": ["With the introduction of machine learning and especially convolutional neural networks (CNNs) the performance of automatic segmentation approaches improved greatly [7]."]} +{"563962|2088679": ["DEEP learning with convolutional neural networks (CNNs) has achieved state-of-the-art performance for automated medical image segmentation [1]."]} +{"169033851|2088679": ["In [49], many other sections of medical image analysis like classification, detection, and registration is also covered which makes it medical image analysis review not a specific medical image segmentation survey.", "There are a few recent survey articles on medical image segmentation, such as [49] and [67]."]} +{"141509934|2088679": []} +{"67856146|3644401": ["When multiple atlases are available, they are each aligned to a target volume, and the warped atlas labels are fused [36, 41, 68, 78]."]} +{"49389393|17485266": ["In addition, many improvements on the gradient descent algorithm have been proposed and widely used, such as SGD with momentum, RMSprop, and Adam [21 \u2013 23], though the details of these algorithms are beyond the scope of this article."]} +{"2088679|393948": []} +{"3213653|2088679": ["Recently, deep learning with convolutional neural networks (CNNs) has achieved the state-of-the-art performance in many image analysis applications [10]."]} +{"141501214|37099732": []} +{"141501214|2088679": []} +{"4903005|10175374": ["An in-depth explanation of why this works can be found in Ruder [2017]. Rather than training multiple tasks simultaneously, representation learning approaches where an", "While not interesting prediction tasks by themselves, these could be leveraged via multi-task learning, for example, by using these as auxiliary tasks or \u201chints\u201d [Ruder, 2017]."]} +{"4903005|2088679": ["The network can then be used in two strategies (Litjens et al., 2017): for feature extraction, or as a starting point for further training (fine-tuning) of the target task.", "A frequent problem when applying machine learning methods to medical images, is the lack of labeled data (Litjens et al., 2017; Weese and Lorenz, 2016; de Bruijne, 2016), even when larger sets of unlabeled data may be more widely available.", "In this paper we have used the following categories, inspired by Litjens et al. (2017): brain, retina, chest, breast, heart, abdomen, histology/microscopy and other applica-"]} +{"4903005|8601873": ["[2016] cell segmentation in microscopy graph-based, active Multiple Gass et al. [2012] segmentation in two applications graph-based Ciurte et al.", "other assumptions have been proposed [Foulds and Frank, 2010]."]} +{"4108581|8507227": ["A survey of studies on ML in computer-aided diagnosis has been reported [8], and a collection of studies on ML in computer-aided diagnosis and medical image analysis can be found in books [6, 20]."]} +{"53753063|54461890": []} +{"53753063|3558190": ["For example the comprehensive review [102]27, covering both medicine and biology and spanning from imaging applications in healthcare to protein-protein interaction and uncertainty quantification; key concepts of deep learning for clinical radiologists [103, 104, 105, 106, 107, 108, 109, 110, 111, 112], including radiomics and imaging genomics (radiogenomics) [113], and toolkits and libraries for deep learning [114]; deep learning in neuroimaging and neuroradiology [115]; brain segmentation [116]; stroke imaging [117, 118]; neuropsychiatric disorders [119]; breast cancer [120, 121]; chest imaging [122]; imaging in oncology [123, 124, 125]; medical ultrasound [126, 127]; and more technical surveys of deep learning in medical image analysis [42, 128, 129, 130]."]} +{"53753063|37099732": []} +{"53753063|6509733": ["A wide range of methodological approaches have been developed and tested for various organs and applications40 [229, 230, 231, 232, 233, 234, 235, 236, 237, 238], including \u201cprevious generation\u201d artificial neural networks [239]."]} +{"53753063|20404279": [" have seen impressive results for photo-realistic image synthesis using deep learning techniques, especially generative adversarial networks (GANs, introduced by Goodfellow et al. in 2014 [80]), e.g. [205, 206, 207]. These can also be used for biological image synthesis [208, 209] and text-to-image synthesis [210, 211, 212].36 Recently, a group of researchers from NVIDIA, MGH & BWH Center for Clinical Data S"]} +{"53753063|4795312": ["(30)See [154, 155, 156, 157, 158] for recent perspectives and developments connecting deep learning-based reconstruction methods to the more general research field of inverse problems."]} +{"53753063|207205594": [" image segmentation and tissue classication [250, 251, 252, 253]. An impressive range of segmentation methods and approaches have been reported (especially for brain segmentation) and reviewed, e.g. [254, 255, 256, 257, 258, 259, 260, 261, 262]. MR image segmentation using deep learning approaches, typically CNNs, are now penetrating the whole eld of applications. For example acute ischemic lesion segmentation in DWI [263]; brain tumor segm"]} +{"53753063|3519414": ["seizures [17] and cardiac arrests [18], to computer-aided detection [19] and diagnosis [20] supporting clinical decision making and survival analysis [21], to drug discovery [22] and as an aid in therapy selection and pharmacogenomics [23], to increased operational efficiency [24], stratified care delivery [25], and analysis of electronic health records [26,27]."]} +{"53753063|2088679": ["9 For a broad overview of deep learning applied to medical imaging, see [41]."]} +{"53753063|14395478": []} +{"53753063|4820875": []} +{"53753063|2875192": []} +{"53753063|6863252": ["on correction, real-time MR physics is also an important part of the picture [224, 225]. A wide range of methodological approaches have been developed and tested for various organs and applications40 [229, 230, 231, 232, 233, 234, 235, 236, 237, 238], including \\previous generation" articial neural networks [239]. Recently, deep learning methods have been applied to image registration in order to improve accuracy and speed (e.g. Section 3.4"]} +{"39860496|8604408": ["exploited in recent work on Bayesian Deep Learning (BDL) in particular [49] aiming to integrate deep learning and Bayesian"]} +{"39860496|8372620": []} +{"2928345|8575576": []} +{"52305483|20404279": []} +{"52305483|2088679": ["It is estimated that there were over 400 papers published in 2016 and 2017 in major medical imaging related conference venues and journals (Litjens et al., 2017)."]} diff --git a/edge/graph_203838110.jsonl b/edge/graph_203838110.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b85544a2580263ee664d0a6bd9812deb61c4695 --- /dev/null +++ b/edge/graph_203838110.jsonl @@ -0,0 +1,10 @@ +{"11917170|191396": ["Besides, we propose a new similarity measure between partitions proving that it is a kernel function.", "\u2026Havana University, Cuba\na r t i c l e i n f o\nArticle history: Received 4 May 2009 Received in revised form 1 March 2010 Accepted 3 March 2010\nKeywords: Cluster ensemble Kernel function Similarity measure Clustering validity index Consensus partition\n03/$ - see front matter & 2010 Elsevier Ltd."]} +{"18584548|191396": ["A good clusterer should group a set of data objects into multiple clusters so that objects within a cluster have high similarity, but are very dissimilar to objects in other clusters."]} +{"43951901|192934": []} +{"8930939|192934": ["Wide usage of clustering algorithms proves their usefulness in exploratory data analysis [40].", "These sets are selected by the algorithm to ensure minimal within-cluster scatter and maximal between-cluster scatter [40].", "Both because it provides significant benefit to the study of data structures, and because advances remain to be made in the field of clustering study, clustering is an ideal candidate for research [40]."]} +{"12897038|17084176": ["For instance, considering the best-performing runs of M-EMCD , the number of iterations varied from few units (less than ten on London, VC-Graders and AUCS) to few tens (23 on EU-Air, 38 on FF\u2013TW\u2013YT, 70 on DBLP, 75 on Higgs-Twitter).", "EU-Air transport network (Kim and Lee 2015) ( EU-Air , for short) represents European air-123 port connections considering different airlines.", "EU-Air transport network [16] (EU-Air, for short) represents European airport connections considering different airlines.", "One general remark relevant for the comparison between M-EMCD and the baseline is that the highest NMI values do not necessarily correspond to the \u03b8 value by which the best-modularity consensus was obtained (indicated with a colored vertical line in each of the plots): in fact, while on AUCS and London the maximum NMI (about 0.8 and 0.75, respectively) is reached for their respective best-modularity \u03b8 , on Higgs-Twitter and FF\u2013TW\u2013YT (along with the remaining datasets, not shown), the best-performing \u03b8 does not match the \u03b8 corresponding to the best NMI for the particular dataset.", "AUCS (Kim and Lee 2015) describes relationships among university employees: work together, lunch together, off-line friendship, friendship on Facebook, and coau-thorship.", "Higgs-Twitter (Kim and Lee 2015) represents friendship, reply, mention, and retweet relations among Twitter users.", "Furthermore, coupling redundancy results from Table 4 and results shown in this \ufb01gure, it should be noted that the highest values of redundancy of M-EMCD , observed in AUCS (0.91) and VC-Graders (0.95), correspond to situations in which the distribution of layer-characteristic communities is more uniform.", "As shown in Table 4, M-EMCD gains 0.32 (up to 1.03 on FF\u2013TW\u2013YT) w.r.t. CC-EMCD and 0.28 (up to 0.81 on AUCS) w.r.t. C-EMCD \u2014recall that silhouette may range from \u2212 1 to 1.", "DBLP (Kim and Lee 2015) represents co-authorships over different time slices, which correspond to the publication years in the period 1971\u20132014.", "Note also that, with the exception of Higgs-Twitter and DBLP, CC-EMCD tends to prevail against C-EMCD in terms of modularity.", "For instance, on Higgs-Twitter (results not shown), there is one layer predominant on the others; Conversely, on DBLP (results not shown), all layers participated almost equally in the edge distribution of the consensus communities.", "Higgs-Twitter [16] represents friendship, reply, mention, and retweet relations among Twitter users.", "AUCS [16] describes relationships among university employees: work together, lunch together, off-line friendship, friendship on Facebook, and coauthorship.", "A great deal of attention has recently been devoted to the problem of community detection in a multilayer network [23,16].", "We selected this dataset to appreciate at best the effect of ensemble perturbations in the performance of M-EMCD \u2014this choice is justi\ufb01ed since it has much more layers than the other datasets but DBLP, however unlike the latter, there is no excessive proliferation in the number of consensus communities (cf. Table 3).", "A great deal of attention has recently been devoted to the problem of community detection in a multilayer network (Mucha et al. 2010; Kim and Lee 2015)."]} +{"62366876|3102110": ["has been widely used as a measure of local two-way association [3,7,13,49,63]."]} +{"4922576|191396": ["\u00c7"]} +{"12692418|191396": ["Clustering is an effective method to discover natural structures of data objects in data mining [5] and pattern recognition [6]."]} +{"45693808|191396": []} +{"3431440|5646762": ["[45] performed a survey on ensemble clustering using evolutionary algorithms.", "Works which belong to the second category explore different properties of cluster ensemble approaches theoretically [42]\u2013[45]."]} diff --git a/edge/graph_20384442.jsonl b/edge/graph_20384442.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b054d63636c276dae1beaff01e34b89477b9bd2 --- /dev/null +++ b/edge/graph_20384442.jsonl @@ -0,0 +1,62 @@ +{"1408457|8909218": ["Heterogeneous networks (HetNets) are considered as a key technology for 5G [1]."]} +{"9465821|8909218": []} +{"37564067|18750590": ["As presented in [26], the payoff of the leader in the Stackelberg solution is guaranteed to be no less than that in the Nash solution.", "Note that there may exist several different pricing models depending on how to set the price as presented in [25] and [26].", "As discussed in [26], to efficiently solve the modified NUM problem, the pricing-based iterative solutions can be adopted."]} +{"37564067|5385031": ["cost while protecting the users\u2019 privacy [25].", "Definitions of common terminologies in auctions such as bidder, seller, auctioneer, ask, and bid can be found in [25].", "Note that there may exist several different pricing models depending on how to set the price as presented in [25] and [26]."]} +{"37564067|206584087": ["A survey of techniques against DDoS attacks in Mobile Ad-hoc Network (MANETs) is presented in [6].", "For the DDoS attack [6], an external attacker controls a large number of compromised users inside the network to transmit radio jamming signals with high power to a target system, and makes the system unavailable to respond to any service requests from the legitimate users.", ", bots, inside the network to encumber the legitimate accesses to the resources at a receiver [6]."]} +{"37564067|17623572": ["A black hole problem is actually a misbehavior routing problem [90] in which one malicious node uses the same routing protocol as the regular nodes, but it drops the routed packets and does not forward the packets to its neighbors."]} +{"37564067|4395259": ["anti-jamming techniques [9], and physical layer security [10]."]} +{"37564067|17205659": ["For example, surveys of security issues in Wireless Sensor Networks (WSNs) are given in [7] and [8]."]} +{"4879931|2535224": ["In order to realize heterogeneous virtualized resource allocation, we introduce SDN controller (SDN is one of the most promising technologies to realize virtual networks and SDN controller operates and manages virtual resource efficiently in response with a global view of network [11]) as the resource allocation control center, which can significantly reduce the signalling delay by decoupling the network to control and data plane."]} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"2130768|8909218": ["First, infrastructure-based mobile data offloading [10] refers to deploying small cell base stations and Wi-Fi hotspots for mobile users [11\u201313]."]} +{"23990039|8909218": ["As in [1], femtocells benefit not only home subscribers but also an operator.", "Femtocells communicate with the cellular network through a local broadband connection such as digital subscriber line, cable, Ethernet, Worldwide Interoperability for Microwave Access (WiMAX), or fiber [1]."]} +{"21954684|25929315": []} +{"7915606|7644489": ["We transform the nonconvex optimization problem into a convex one by applying constraint relaxation and nonlinear fractional programming."]} +{"7995555|512561": ["Channel bonding in wireless sensor networks is also considered [19] which can be applied to combine multiple contiguous non-overlapping wireless channels to form a single channel of higher bandwidth for operational efficiency."]} +{"7995555|1686572": ["A number of protocols have been proposed in [39], [222], and [223] however, those protocols suffer from limitations which make them unsuitable for practical deployment, e."]} +{"7995555|8974063": ["[41] surveyed research in this area"]} +{"7995555|2509135": ["Spectrum sensing techniques with their advantages and disadvantages, different CR MAC protocols, spectrum handoff, mobility, routing issues, and different CR platforms and standards are reviewed in [37]."]} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"21391909|29060869": ["The authors in [153], distinguish their work from previous surveys", "In [153], a comprehensive survey on the smart grid-driven approaches in energy-efficient communications and data cen-", "like in smart grid in order to ensure energy efficiency and reliability [153]."]} +{"21391909|12029139": ["[12] present an extensive literature review on RF energy harvesting networks", "These include much greater spectrum allocations at untapped mmWave frequency spectrum bands [13], [22], highly directional massive beamforming antennae at both the mobile devices and BSs [18], [22], longer battery life sustained by energy harvesting techniques [12], full-duplexing communications (FDCs) [21], lower outage probability, much", "energy is predictable and relatively stable over time due to fixed distance [12].", "Authors in [12] have also discussed an RF-powered CR network whereby the RF energy harvesting capability allows secondary users to harvest and store energy from nearby trans-", "The authors in [12], also add that multi-hop RF-EHNs via cooperative relaying techniques can help to overcome fading and attenuation by using intermediate relay nodes, resulting in improved network performance in terms of efficiency and reliability.", "There are several advantages of the RF energy-harvesting techniques for the 5G RAN systems that has been identified in literature [12].", "energy within the 5G RAN systems [12], [13].", "The authors in [12], assert that one of the key concerns for RF information and energy transfer is the decay in energy transfer efficiency with the increase of transmission distance due to propagation path loss.", ", through innovative energy harvesting), will be a crucial component of the design [2], [12].", "Typically, the macrocells are served by high power base stations (MeNBs) with transmit powers close to 43 dBm and antennae gains close to 12 \u2212 15 dBi [12]."]} +{"21391909|2443013": ["(CCs) dispersed within and across different bands (intra/interband) thereby boosting the user throughput in LTE-Advanced (LTE-A) as well as the future 5G RAN systems [75].", "heavy computational burden and a huge amount of the CSI feedback [75]."]} +{"21391909|8974063": ["[108] and Tsiropoulos et al."]} +{"21391909|5338241": []} +{"21391909|7686677": ["generation wireless networks is a growing concern for operators not only for profitability maintenance but also for the overall adverse environmental effects reduction [124], [142].", "2) Dynamic Power Saving (DPS) Techniques: Several researchers have presented research trends, exposed some research issues and challenges and suggested some techniques for the green cellular networks [124], [143]."]} +{"3180691|13074005": ["Reproduced from [48] with permission.", "[48], [53].", "\u2026SM has recently established itself as a promising transmission concept, which belongs to the single-RF [36] large-scale [41] MIMO wireless systems family, while exploiting the multiple antennas in a novel fashion compared to state-of-the-art high-complexity and power-hungry classic MIMOs [48].", "We conclude this glimpse into the history of SM\u2013 MIMO by mentioning that the first (and only available) survey papers on the SM concept were published in December 2011 and in mid 2012 in [48] and [92], respectively.", "Briefly, this implies that the channel impulse responses of the transmit-to-receive links are sufficiently different from each other [48].", "In SM\u2013MIMO research, this third dimension is termed the \u2018\u2018spatial-constellation diagram\u2019\u2019 [48]."]} +{"3180691|7686677": ["This allows the BSs to turn off the related RF chains with filters and mixers, which saves additional power.", "New infrastructure elements, such as femto/pico BSs, fixed/mobile relays, cognitive radios, unlicensed millimeter-wave radios, and distributed antennas are being deployed, thus making future cellular systems more heterogeneous [293].", "So far, only the baseline point-to-point single-cell cellular network has been studied, where the effect of other-cell interference is neglected and the characteristics of different types of BSs are not taken into account.", "However, in practice, MIMO systems need a multiplicity of associated circuits, such as power amplifiers, RF chains, mixers, synthesizers, filters, etc., which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "For example, the typical RF coaxial cables used in current tower-mounted BSs are more than four centimeters in diameter [42].", "The rationale behind the multi-RF to single-RF paradigm shift in MIMO design originates from the consideration that large numbers of TAs (radiating elements) may be accommodated at the BSs (large-scale MIMO design) [41], [42], especially in the emerging millimeter-wave band [43]\u2013[46], bearing in mind that the complexity and power consumption/dissipation of MIMO communications are mainly determined by the number of simultaneously active TAs, i.e., by the number of active RF chains [40], [47].", "more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "BSs with a variable number of TAs .", "Under the so-called SOTA-2010 power consumption model [31], [32], the EE of various types of BSs (macro, micro, pico, and femto) is investigated by comparing SM to conventional MIMO communications.", "The main idea is to enable the BSs to use only a subset of the available TAs in order to reduce the power consumption.", "Raising dilemmas, such as using a few BSs in combination with large-scale MIMOs, using many small cells illuminated by low-power BSs having a few TA elements each, or whether to combine large-scale MIMOs and small-cell networks, have to be addressed.", "Limiting the number of active RF chains for the sake of reducing the power consumption of BSs has been actively discussed within 3GPP standardization bodies.", ", which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "This finding is important because it brings to our attention that constant-envelope modulation may be a suitable choice for SM\u2013MIMO communications since it may offer an improved power efficiency and a reduced complexity, while mitigating the linearity requirements of the power amplifiers [5], without any performance degradation compared to amplitude modulation schemes.", "The cellular network of the future will be: heterogeneous and characterized by a small-cell infrastructure relying on inexpensive and low-power BSs (femtocells) in order to achieve high data rates [3], [8]; green, by evolving from a throughput-optimized scenario toward throughput-and energy-optimized networks [5], [16], [18]; interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Large-scale MIMO is an emerging technology, where BSs with hundreds of antennas serve a few mobile terminals per channel use [41].", "While each BS connected to the electrical grid may cost approximately $3000 per year to operate, off-grid BSs operating in remote areas generally run on diesel power generators and may cost ten times more [5].", "Compared to baseline single-antenna transmissions, MIMO communications obtain higher data rates and improved error performance at the cost of: \u2022 increasing the signal processing complexity at the receiver, which is caused by the need for counteracting the interference imposed by simultaneously transmitting many data streams; \u2022 more stringent synchronization requirements among the TAs to exploit the benefits of spacetime-coded and multiuser MIMO transmissions; \u2022 multiple RF chains at the transmitter to be able to simultaneously transmit many data streams, which do not scale with Moore\u2019s law and make the transmitter bulky [36]; \u2022 independent power amplifiers for each RF chain, which dissipate the majority of the power consumed at the transmitter, since they are power inefficient due to the stringent linearity requirements of state-of-the-art phase/amplitude modulations [5].", "The reduced linearity requirements of constant-envelope modulation increase the efficiency of power amplifiers, which, in turn, reduce the total power consumption of the transmitters [5].", "\u2022 green, by evolving from a throughput-optimized scenario toward throughput- and energy-optimized networks [5], [16], [18]; \u2022 interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; \u2022 characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; \u2022 relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Consider a relaying-aided MIMO system for application in the downlink of cellular networks relying on fixed RSs, where both BSs and RSs are equipped with multiple antennas [259].", "Furthermore, the employment of low-power BSs has the beneficial effect of reducing the transmission distance between mobile terminals and access points, which results in performance improvements.", "In addition, unlike macro BSs that are usually heavily loaded most of time, the femto BSs are expected to be lightly loaded, which leads to further reduction of the power consumption since they will not be transmitting all the time, hence facilitating sleep-mode-based operation.", "More explicitly, recent studies have clearly shown that the EE gain of MIMO communications increases with the number of antennas, provided that only the transmit power of the BSs is taken into account and their circuit power dissipation is neglected.", "Currently, there are more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "On the other hand, the EE gain of MIMO communications remains modest and decreases with the number of active TAs, if realistic power consumption models are considered for the BSs [33]."]} +{"3180691|12060835": ["An option that is currently gaining momentum in green networking is RF energy harvesting, which can provide additional energy supply for wireless devices [297]."]} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"37513083|16654832": []} +{"14565499|8909218": ["As a result, an extensive deployment of femtocells is expected in the near future."]} +{"15164721|8909218": ["This has motivated the recent surge of research on massive and dense deployment of base-station antennas both in the form of \u201cMassive MIMO\u201d solutions with hundreds of antennas at each cell site [1]\u2013[3] and multi-tier networks that include dense small-cell deployments [4], [5]."]} +{"12719685|8909218": []} +{"1678110|7686677": ["Asa result, energy saving, or energy efficiency (EE), becomes a rising concern for the design of wireless networks [12], [13]."]} +{"207172280|12452682": ["[6] provides a game theoretical overview of dynamic spectrum sharing from three aspects: analysis of network users\u2019 behaviors, efficient dynamic distributed design and optimality analysis."]} +{"15581204|19938676": ["Researchers have proposed 5G technologies which include multi-carrier filter banks, millimeter wave technology, massive multiple input and multiple output (MIMO), super density heterogeneous network and device-to-device (D2D) technology, to fulfil the\nrequirements of future communications [8\u201310]."]} +{"7881846|10559330": []} +{"7314182|1420935": ["and the policy makers, as energy sharing can contribute to improving the efficiency of power grid operations, while also reducing power generation cost and CO2 emission [21]."]} +{"30198677|19938676": []} +{"30763534|13019489": ["State-of-the-art and challenges associated with the deployment scenarios and implementation of LSA can be found in [8] and [9]."]} +{"195901049|25929315": ["The main characteristic of the M2M traffic is that there will be an enormous number of devices infrequently transmitting short messages [1].", "The base station announces a price p 2 [0, 1] before each RAO.", "Each user is denoted by a valuation parameter \u2713 2 [0, 1] which is distributed according to the probability distribution function f(\u2713) which defines the price sensitivity of the user.", "Preamble transmissions can only occur during the periodic random access opportunities (RAO) announced by the base station [1]."]} +{"4735659|9651858": ["Reference [28] outlined the spectrum sharing mechanism for the next generation cellular networks to overcome the"]} +{"4735659|13019489": ["Reference [25] studied the concept of dynamic spectrum sharing, and investigated various existing spectrum sharing scenarios with different network topologies, features, challenges, and probable use cases."]} +{"4735659|19938676": ["With the rapid development of broadband wireless access and mobile terminal technology, people are eager to obtain information and services from the Internet at anytime, anywhere and even in the process of moving, and the mobile Internet has been developed rapidly in such a background [2]."]} +{"4735659|12029139": ["Electromagnetic waves energy harvested by CR focused by many scholars, and there have been a number of representative studies [106], [129], [130], including hardware design and efficient energy sensing algorithms, etc."]} +{"4735659|3348390": ["As it can be seen, by the year 2020, when 33 billion devices like machine to machine (M2M), smart objects, smart grid, smart home, smartphones, PCs, tablets and wearable devices will be in use [10], [11]."]} +{"4735659|15116409": ["In order to satisfy the needs of cognitive users to detect spectrum opportunities reliably in a wide frequency range in the future, [20] summarized various wideband spectrum sensing algorithms and discusses the advantages and disadvantages of each algorithm and their challenging problems.", "In spite of the extensive literature on CR, there are few papers to discuss the available spectrum exploration issues toward 5G, while several studies separate overview the spectrum sensing [20] and spectrum access [26] in CR networks.", "Based on the compressed sensing theory, compressive spectrum sensing algorithm was presented in [20], [76], and [77], which can extract and detect the wideband signal directly to achieve efficient wideband"]} +{"4735659|8974063": ["Reference [23] presented an up-to-date survey of spectrum decision in CRNs based on spectrum characterization, spectrum selection, and CR reconfiguration."]} +{"4735659|2509135": ["In order to improve the utilization of licensed spectrum as much as possible, various multiplexing technologies such as Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Multiple-Input Multiple-Output (MIMO) techniques are used to support more users on the limited spectrum resources [32], but they cannot fundamentally solve the problem of spectrum resources scarcity caused by fixed allocation policy."]} +{"4735659|31662905": ["energy crisis, and the spectrum sharing between satellite telecommunication networks and terrestrial has been surveyed in [29], which focuses on the investigation of the feasibility of spectrum sharing between geostationary orbit and non-geostationary orbit satellite systems."]} +{"4735659|15453366": ["Many countries, including the United States and Europe, have divided 60GHz band into 5GHz \u223c 7GHz unlicensed continuous spectrum resources for general use [38]."]} +{"14404696|8909218": []} +{"8833120|2871699": ["communication are often small, infrequent, diverse and mainly in the uplink [180]."]} +{"8833120|12029139": ["2) Wireless powered communication networks: The remarkable advancement of wireless energy harvesting and transfer technologies has created many new research directions recently [163], [164]."]} +{"8833120|1932843": ["5) Learning Algorithms: Reinforcement learning algorithms have been used commonly to address many problems in computer science such as robotics or optimization control [176]."]} +{"8833120|15694215": [", QoS, multicasting, security, as presented in [46] and [47] which are not well examined using repeated games.", "However, lack of infrastructure poses many issues such as interference, decentralization, limited-range, and insecurity [46], [47].", "Thus, there are many advantages and applications of wireless ad hoc networks in practice as discussed in [46], [47]."]} +{"8833120|44944144": [", QoS, multicasting, security, as presented in [46] and [47] which are not well examined using repeated games.", "However, lack of infrastructure poses many issues such as interference, decentralization, limited-range, and insecurity [46], [47].", "Thus, there are many advantages and applications of wireless ad hoc networks in practice as discussed in [46], [47]."]} diff --git a/edge/graph_20387049.jsonl b/edge/graph_20387049.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203902356.jsonl b/edge/graph_203902356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60dede48d2439774af3fc705f06a82664eaaac54 --- /dev/null +++ b/edge/graph_203902356.jsonl @@ -0,0 +1,4 @@ +{"15161815|14718434": ["UML, Extended Entity Relationship model) that is very much alike the ontology model, together with their frequent maintenance and timeliness of their data, especially in business environments [76], act as arguments in favour of using relational databases as knowledge sources for ontology development.", "Table 3 sums up the features of the most notable approaches, taking inspiration from other surveys that have been carried out for the same subject [42,60,63,76]."]} +{"15161815|2388738": ["Section 6 introduces criteria and descriptive features for the approaches mentioned in order to form a complete picture of the state of the art and finally, Section 7 closes the paper discussing future steps and requirements."]} +{"3411534|6848297": [", [46], a schema in xml Schema is essentially a specialized dtd [53], an extension of dtds by allowing several productions to be associated with the same element type A and \u201cspecializing\u201d the choice of its productions based on the context in which A appears."]} +{"15914227|10500613": ["Considerable prior work went into the integration of relational systems using schema matching techniques [18], [19] and integration using view and mediators [20]."]} diff --git a/edge/graph_203902385.jsonl b/edge/graph_203902385.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203902713.jsonl b/edge/graph_203902713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9984737beffcc6d7af679ea9571ae67589eaf1bc --- /dev/null +++ b/edge/graph_203902713.jsonl @@ -0,0 +1,12 @@ +{"205710572|8530790": ["The problems presented in [26] and a problem from [23, 3] are studied in this section."]} +{"10076149|15428874": ["All rights reserved."]} +{"36773744|9571087": []} +{"17580897|53241792": ["Summarizing, a large number of the GPU processing elements allows to obtain high speedups, provided that the computations are largely independent and enough data is transferred in time [19]."]} +{"38077106|33829339": []} +{"38077106|53241792": []} +{"1117934|18746083": ["More recently, Minella et al. (2008) provided a review of the literature for multi-objective flowshop scheduling, together with a complete computational evaluation and comparison of a number of algorithms on some bi-objective variants of the problem.", "These objectives are among the most widely investigated in the literature (Nagar et al., 1995; T\u2019Kindt and Billaut, 2002; Landa Silva et al., 2004; Minella et al., 2008)."]} +{"34401007|9141490": ["Bianchi et al. (2009) have written an interesting survey of the appropriate metaheuristics to solve a wide class of combinatorial optimization problems under uncertainty."]} +{"2481818|4474193": []} +{"29648256|1386147": ["MOEA has been widely used in many fields, such as path planning of unmanned air vehicles [5], data mining [6], machine learning [7], software engineering [8], etc."]} +{"42302619|53241792": ["Part two (Schulz et al. 2013) gives a broad overview of the existing literature on parallel computing in discrete optimization aimed at modern PCs."]} +{"206682769|1137487": ["In this paper, we adopt the Boolean disk model because of its concise definition and wide applicability [19], [43], which is illustrated in Fig."]} diff --git a/edge/graph_203905848.jsonl b/edge/graph_203905848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06bdaaad3cd4e362f37cb3f74fe8e8319d8f70bf --- /dev/null +++ b/edge/graph_203905848.jsonl @@ -0,0 +1,9 @@ +{"77374335|3834736": ["For WLAN-based vehicular communications, a number of adaptive transmission approaches have been implemented and proposed to overcome the limitations and improve the performance [9]."]} +{"148571841|8323234": ["Scaling the number of antennas up is a key characteristic of current and future wireless systems [1]\u2013[5].", "This is normally associated with large training and feedback overhead that can limit the scalability of massive MIMO systems [1], [6]."]} +{"182095972|8323234": ["Channels in mm-wave bands show sparsity in angular and delay domains, hence a line of work exploits methods based on compressed sensing to recover the sparse MIMO CSI from on a relatively small number of observations [11]."]} +{"54442710|10235514": ["\u2026diversify, the customer\u2019s demand for quality, not only quantity, of data traf-fi generation (5G) cellular heterogeneous networks HetNets) [1, 2] and ultra dense networks (UDNs) , 4], is expected to be a critical issue due to the signifi cant stress infl icted on wireless communication\u2026"]} +{"4375599|26259297": ["Motivated by [25] and [34], in this paper, we design a new frequency synchronization scheme for multiuser OFDM uplink with a massive uniform linear array (ULA) at BS by exploiting the angle information of users.", "We consider that the incident signals at BS from each user can be restricted within a certain angular spread, since the massive BS is usually elevated at a very high altitude with few surrounding scatterers [5]\u2013[7], [25], [34].", "2Note that the DOA of each user may vary slowly in practice [34], and the DOA estimation may not need frequent updates.", "Similar to [5]\u2013[7], [25], and [34], we consider that the incident rays of each user can be constrained within a certain angular spread \u03b8as; Namely, the incident angles of the kth user is limited in the DOA region (\u03b8k \u2212 \u03b8as, \u03b8k + \u03b8as) with uniform distribution, where \u03b8k represents the mean DOA of the kth user.", ", the sufficient spatial dimension, the steering vectors pointing to distinct DOAs would become nearly orthogonal to each other, which implies that we can simply employ the steering vector pointing to the DOA of the kth user as the beamforming vector to substantially suppress the interference from the other users in angle domain [25], [34].", "An interesting array signal processing aided massive MIMO transmission scheme was proposed in [25] and [34], where the angle information of the user is exploited to separate users and simplify the subsequent signal processing.", "Generally, this assumption has been supported in the following typical scenario [34]: BS equipped with a large number of antennas is always elevated at a very high altitude, say on the top of a high building, a dedicated tower, or an unmanned aerial vehicle platform, such that there are few surrounding scatterers."]} +{"198145693|14247248": []} +{"174820077|17966235": ["In mmWave communications, typically a hybrid architecture is employed, where both analog and digital signal processing aided SI-cancellation is carried out for reducing both the cost and hardware complexity [19]."]} +{"70349940|8323234": ["It is well known that the measurement matrix plays an essential role in sparse recovery [4], [7]."]} +{"119188749|8323234": ["architecture, usually called hybrid architecture, is widely used at both the transmitter and the receiver to connect a large number of antennas with much fewer RF chains [7], [8].", "For time-varying channels, the frequency-domain channel at the kth subcarrier in (4) becomes [7]"]} diff --git a/edge/graph_203922962.jsonl b/edge/graph_203922962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_203925307.jsonl b/edge/graph_203925307.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..09b0d31d79d56241d0feffb27a681a32a2dc6a01 --- /dev/null +++ b/edge/graph_203925307.jsonl @@ -0,0 +1,16 @@ +{"10911355|469744": ["Once the operational device is speci\ufb01ed, the contents of DMS 1 (HTTP) are attainable through DMC 1, and can be transferred (RTP) from DMS 1 to DMR 2, and displayed."]} +{"4713869|3348390": ["Context awareness (CA) is considered to be one of the crucial technologies that will empower the IoT [10].", "A typical IoT architecture is shown in Figure 1 [10]."]} +{"305366|17024419": []} +{"52983679|469744": ["In 1994, reality and virtuality were already considered as located at opposite ends of a continuum [1], and real and virtual objects in a real environment are to be combined, registered, and interacted in real-time [2]."]} +{"53241764|17024419": ["One can say that Augmented Reality at this point is mainly focused on research to generate a better understanding of real things [13] instead of enabling the programming of the behavior and interface of the physical world objects."]} +{"14965066|469744": []} +{"14965066|17024419": []} +{"189926747|4625011": []} +{"3598463|3348390": ["The user experiment was carried out to assess the usability of the framework."]} +{"33193695|469744": ["Azuma defined the three main properties of the augmented reality [3]: (1) combining real with virtual; (2) interactive in real-time; and (3) registered in the three-"]} +{"115929|469744": ["environment (Azuma 1997) and can be used as a way to", "2.1 Mobile augmented reality\nAugmented Reality (AR) involves the seamless overlay of virtual imagery on the real world (Azuma 1997).", "\u2026Center, Tampere, Finland e-mail: toni.jarvenpaa@nokia.com\nS. Kaski Aalto University and University of Helsinki, Helsinki Institute for Information Technology HIIT, Helsinki, Finland e-mail: samuel.kaski@tkk.fi\nenvironment (Azuma 1997) and can be used as a way to view contextual information.", "Augmented Reality (AR) involves the seamless overlay of virtual imagery on the real world (Azuma 1997)."]} +{"6106828|469744": ["\u2026reality (AR) systems have been developed to faithfully realize the basic concept that their main purpose is to supplement the real world with the addition of virtual objects (or information) to enhance a user\u2019s perception of and interaction with the real world (Azuma,1997; Azuma & Baillot, 2001)."]} +{"201839117|52895823": ["& Some papers [19 \u2013 22] did not provide the future directions of resource management approaches in fog computing.", "Besides, Hong et al. [19] have investigated the technical challenges for managing the resource-limited in fog and edge computing in terms of the infrastructure, architectures, and algorithms.", "Since there are multiple distributed entities including the cloud servers, the IoT users, and the fog nodes in the fog network, the resource allocation problem becomes challenging [19]."]} +{"201839117|206578486": ["& Many papers [12, 18 \u2013 21] did not study the entire topics of the resource management scope in fog computing.", "One of the considerable studies of fog computing has been done by Mouradian, Naboulsi, Yangui, Glitho, Morrow and Polakos [12].", "Since fog nodes are often capacity-constrained equipment in terms of processing and storage capabilities [11], it is difficult for such devices to match the computational capabilities of dedicated servers, left alone the cloud [12, 13].", "These fog nodes are intelligent intermediate devices from different networking components [12]."]} +{"201839117|38200299": ["[21] have surveyed stream processing techniques for extracting resource elasticity features of edge computing in stream processing.", "& Some papers [20, 21] did not present any reasonable categorization of resource management approaches in fog computing."]} +{"201839117|18602374": []} diff --git a/edge/graph_203951961.jsonl b/edge/graph_203951961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c748b9293d1f2c11d68440e3f50d4d99d864777c --- /dev/null +++ b/edge/graph_203951961.jsonl @@ -0,0 +1,2 @@ +{"19396874|4528002": []} +{"207249940|4528002": ["[2, 9, 10] CAN bus signals are indexed by a process ID (PID), specified in the packet header, and are generally associated with a fixed function (running lights, sensors, door locks, etc.) The specific PID-to-function mapping of signals is dependent on the make and model; e.g., signals with PID 3A1\u2026"]} diff --git a/edge/graph_204009099.jsonl b/edge/graph_204009099.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bce421602f9aaac766cfdddd3bcd7e038c10786 --- /dev/null +++ b/edge/graph_204009099.jsonl @@ -0,0 +1,21 @@ +{"9128073|15744805": ["These are results are plotted as the receiver operating characteristic (ROC) curves (Egan, 1975) that are used for evaluation and comparison (Zhang, 1996)."]} +{"49559150|15093118": ["A detailed summary of using traffic cameras for detecting and tracking of vehicles is given in [19]."]} +{"10785759|60779308": ["where OConvexhull is the perimeter of the convex hull and O is the perimeter of the original contour [20].", "3) Rectangularity measures how much a shape fills its minimum bounding rectangle [20]:", "2g) which is the smallest rectangle that contains every point in the shape [20]."]} +{"31039006|984799": ["For example, cognition robotics with human visual attention have been studying in order to perceive the world and act up on it in a human-like fashion [18], [19]."]} +{"31039006|15049844": ["For example, cognition robotics with human visual attention have been studying in order to perceive the world and act up on it in a human-like fashion [18], [19]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"111420932|1097238": []} +{"3587507|15093118": ["Many modern vehicle classification algorithms rely on machine learning to classify vehicles [16]."]} +{"5057638|15093118": ["In the literature, there have been a number of studies on vehicle detection [2]\u2013[6] and classification [7]\u2013[11] over the past decade."]} +{"169606512|10329355": []} +{"17569926|15093118": []} +{"17569926|18546648": ["detection and removal [78]\u2013[80]."]} +{"17569926|819377": ["Gaussian [89]."]} +{"17569926|5755403": ["As an example, the project ADVISOR [4] was successfully carried out in the early 2000s with the goal to develop a monitoring system for public transportation, in order to detect abnormal behaviors of users [5], [6].", "Reliable vehicle tracking is crucial, as it will allow posterior trajectory analysis and behavior recognition [5]."]} +{"17569926|17516538": ["ing significant changes between successive frames [16].", "In the literature, several papers have reported good performance for such tasks [16], [17]."]} +{"17569926|6644671": ["However, deploying a network required to take into account critical points such as: mobility, power consumption, and compulsory spatial and temporal calibration [49]."]} +{"54471298|191396": ["Furthermore, several traditional machine learning algorithms are investigated in order to cluster the dataset [15]."]} +{"52191538|15093118": ["Several comprehensive reviews of the SoA video processing techniques for vehicle detection, classification, recognition and tracking appear in [1,2,3]."]} +{"44160492|7085121": ["WSNs have demonstrated exceptional features, such as flexibility, scalability, reliability, and power efficiency [11]."]} +{"52876655|10329355": []} +{"52876655|8446711": ["Possible applications of infrared cameras have been discussed in [9]."]} diff --git a/edge/graph_20403360.jsonl b/edge/graph_20403360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eca3a4b202739f90c6c21cdf2e0de38ad1deb03e --- /dev/null +++ b/edge/graph_20403360.jsonl @@ -0,0 +1,11 @@ +{"110972273|7482876": []} +{"16628522|18148591": ["With a multiplexing gain rg and average Signal to Noise Rate snr, the Bit Error Rate ber can be approximated as [27]"]} +{"16419613|1110872": []} +{"14360438|18148591": ["The wireless portions of the train\u2013ground communication system, which consist of APs along the railway and SAs on the train, are based on the IEEE 802.11 series standard."]} +{"13031813|5660618": ["The system of (28) falls under the class of asynchronous dynamical systems (ADSs) [24]."]} +{"30795954|25686668": []} +{"17494194|15255963": ["The resulting cost function can be formulated as [13]\nJ = (x\u2212 x\u0303)TQ(x\u2212 x\u0303) + uTRu+ \u03b2G (2)\nwhere G is the information gap, and \u03b2 is a scalar."]} +{"17331024|15255963": ["useful to obtain more accurate estimates of system performance measures [18], we choose the Lloyd\u2013Max technique [17] instead of the equiprobable method to partition the amplitude of the SNR in this paper."]} +{"22397972|18148591": ["If the wireless link from the train SA to the wayside AP has an average SNR \u03b3, with a multiplexing gain r, the link data rate C(r) and Bit Error Probability (BER) BER(r) can be approximated as [9] C(r) = kcr \u2217 log2(\u03b3), and BER(r) = kp \u2217 \u03b3\u2212d(r)."]} +{"8784938|5660618": ["Unlike the existing works that only consider a single train, we model the CBTC system with a group of trains as a networked control system (NCS) with random transmission delays [8]\u2013[10], and analyze their impact on the performances of CBTC system."]} +{"20208929|10744611": [", DAVS-Driver Assist Video System) [2].", "Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org.\nto develop numerous intelligent and safe train control applications additionally to the TCS one (e.g., DAVS-Driver Assist Video System) [2]."]} diff --git a/edge/graph_20404279.jsonl b/edge/graph_20404279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76d354d70578bfbf6f73bae83c869f7480fca4d6 --- /dev/null +++ b/edge/graph_20404279.jsonl @@ -0,0 +1,4 @@ +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"5911448|5807554": ["Egocentric video analysis [2], i."]} +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"1033682|174797842": []} diff --git a/edge/graph_204073821.jsonl b/edge/graph_204073821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..577c6c3ab1482d6018dce627cda0d55770011008 --- /dev/null +++ b/edge/graph_204073821.jsonl @@ -0,0 +1,30 @@ +{"17306942|16362395": ["The on-line detection of ERPs relies on the fact that these signals are phase-locked to a trigger event [5], [10].", "On the other hand, BCIs that rely on external cues such as those using event-related potentials (ERPs) [5], have a better generalization among sessions but do not generalize between different tasks.", "Single-trial classification was carried out using a support vector machine (SVM) with a radial basis function (RBF) kernel, as this classifier presents high accuracies when classifying ERPs [15] and error potentials in particular [12].", "Nonetheless, it is possible to estimate the latency variations between different ERPs and use it to reduce the calibration time of a new task."]} +{"11427924|16362395": ["By other side, SVM offers better generalization properties, and it is insensitive to overtraining and to the curse-of-dimensionality; however, it provides a lower speed execution (71)."]} +{"11427924|5503545": []} +{"85542215|9470480": ["Comparison to Previous Work Although the combination of EEG, EOG, and EMG modes in an mHMI is promising, there are very few BCI systems that have implemented this approach (Hong and Khan, 2017)."]} +{"85542215|5503545": ["EOG signals have good stability and larger potentials than EEG. EOG can be applied to BCI at quite low cost and provides good accuracy, so this is another potentially useful method for controlling robotic prostheses.", "Overall, this comparison demonstrates clearly that our novel mHMI shows little similarity with other recent hybrid BCI systems with the capacity to control external devices for rehabilitation from a combination of three or more signals.", "The aim of mMHI combining two or more user modes such as eye movements, hand gestures, and motor imagery in a coordinated approach is to increase the number of instructions and enhance classification accuracy, reduce errors, and overcome the specific disadvantages of each individual mode of BCI (Amiri et al., 2013; Zhang et al., 2016).", "BCI have the potential to provide an assistive technology that converts brain activity into commands communicating with a user\u2019s intent to control robot-assisted system that promote the neural plasticity required for recovery of function after stroke (Wolpaw et al., 2002).", "There have also been some proposals for simple switches and motion sensors in hybrid EEG\u2013EOG based BCI (Lalitharatne et al., 2013).", "Each of these traditional singlemode BCI systems based on EEG, EOG, or EMG has its own disadvantages hindering further development.", "Although the combination of EEG, EOG, and EMG modes in an mHMI is promising, there are very few BCI systems that have implemented this approach (Hong and Khan, 2017).", "However, it is often difficult for BCI systems to provide\nthe variety of control commands necessary for multi-task real-time control of soft robot\nnaturally.", "Fortunately, clinical trials of BCI rehabilitation therapy can detect the MI of patients to facilitate motor functional recovery (Ang and Guan, 2017).", "The method combining hybrid BCI and robot-assisted therapy is more effective to recover from stroke help activate brain plasticity than single traditional rehabilitation therapy (Dipietro et al., 2005; Ang et al., 2015).", "13:7. doi: 10.3389/fnbot.2019.00007\nAn EEG/EMG/EOG-Based Multimodal Human-Machine Interface to Real-Time Control of a Soft Robot Hand Jinhua Zhang 1, Baozeng Wang 1, Cheng Zhang 1, Yanqing Xiao 2* and Michael Yu Wang 1,3\n1 Key Laboratory of Education Ministry for Modern Design and Rotor-Bearing System, School of Mechanical Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China, 2 School of Biological Science and Medical Engineering, Beihang University, Beijing, China, 3Departments of Mechanical and Aerospace Engineering and Electronic and Computer Engineering, HKUST Robotics Institute, Hong Kong University of Science and Technology, Kowloon, Hong Kong\nBrain-computer interface (BCI) technology shows potential for application to motor\nrehabilitation therapies that use neural plasticity to restore motor function and improve\nquality of life of stroke survivors.", "Furthermore, the process of rehabilitation training is inadequate in that it does not deal with Brain\u2013computer interfaces (BCI).", "In order to make use of the respective advantages of the different types of BCI, it is possible to combine different modes in an approach called multimodal HMI (mHMI) (Allison et al., 2010).", "The online result of hybrid HMI based on EMG and EOG is 43.3 bits/min (Buchwald and Jukiewicz, 2017), and the ITR of new hybrid EEG-EMG-BCI system is 18.43 bits/min in the process of writing some English letters with a robot arm (Gao et al., 2017)."]} +{"2081966|9270553": ["As a result people can communicate with the environment, although they do not use their peripheral nervous system and muscles (Wolpaw et al., 2000)."]} +{"21260224|43331360": []} +{"21260224|14866098": []} +{"16078444|7760671": ["if only a small dose of radiation is absorbed the effect exerted on the organism may be positive, proportional to the absorbed dose if that was sufficiently small, while for longer periods of exposition and higher absorbed doses the effect becomes strongly negative and strongly nonlinear, leading to the death of the organism; this phenomenon is called radiation hormesis [1,6].", "Unlike fractal dimension in phase space [1]Df is calculated directly in time domain; running fractal dimension, Df (t), may be calculated using a moving window as short as 70\u2013 100 data points.", "So, when development of personal computers enabled numerical registration of EEG-signals and their spectral analysis using linear methods like FFT developed at the same time, Medical Doctors accepted those methods quite easily and even the new 'slow' and 'quick' brainwaves bands were introduced.", "It is extremely important that fractal methods easily detect nonstationarities in the analyzed signals, nonstationarities that are not easily detectable by linear methods like FFT [1].", "Moreover, generation of surrogate data often applies linear transformations like FFT and reverse FFT that may show serious shortcomings.", "Even a model consisting of only 3 simple quasilinear ODE with 3 parameters (so called Lorenz equations, [1]) of which 2 are constant while 1 slightly changes may lead to quite unexpected behaviour.", "Basic definitions and explanation of fundamental concepts may be found in many papers and books [1,2].", "It is not necessary to made surrogate data test before applying Higuchi's fractal dimension method\nFFT applied to two similar \u2013 stationary (upper left, a.) and nonstationary (lower left, b.) signals gives dramatically different results (righ , c. and d.)ig re 2 FFT applied to two similar \u2013 stationary (upper left, a.) and nonstationary (lower left, b.) signals gives dramatically different results (right, c. and d.), while application of Higuchi's algorithm gives quite similar values of average fractal dimension, Df, of both signals.", "WT and MP has better accuracy than FFT but much bigger ambiguity in signal decomposition.", "One may apply methods of nonlinear analysis, for example Higuchi's fractal dimension method, Df [1,10], to any signal.", "It is much more appropriate to use nonlinear methods for analysis of signals generated by such a complex nonlinear system, despite the fact that for short time intervals linear methods like FFT may work o.k. Nonlinear methods may be applied to linear signals \u2013 one might try to approximate straight line using parabolic function only to find that coefficient of the quadratic term was practically equal zero.", "We have demonstrated an example of astonishing similarity between economic crisis and epileptic seizure in the brain if appropriate nonlinear methods (like Higuchi's fractal dimension) are applied to the analysis of a 'signal' generated by an 'economic organism' \u2013 time series of Dow Jones index during the period of 'big crash' \u2013 and EEG-signal during epileptic seizure [1,3].", "E.g. FFT applied to similar stationary and nonstationary signals gives dramatically different results, while application of Higuchi's algorithm gives quite similar values of average fractal dimension, Df, of both signals (Figure 2).", "Linear methods like FFT (Fast Fourier Transform), WT (wavelet transform), or MP (Matching Pursuit) work properly only for stationary signals but assumptions of stationarity required for the correct use of these algorithms are often ignored.", "It does not matter that EEG-sig-\nnals are resultant of activity of many brain cells \u2013 the existence of a particular frequency in the FFT does not necessarily mean that there is an oscillator in the brain at that frequency."]} +{"13993160|16362395": ["The previous features were used to train a support vector machine (SVM) classifier with a radial basis function (RBF) kernel [51]."]} +{"56597583|9270553": []} +{"20559717|15380857": ["have been demonstrated in laboratories to provide relatively high bitrates, some with communication rates exceeding 70 bits per minute [ 2 ]."]} +{"52157383|5503545": []} +{"64592945|16362395": []} +{"3158911|33286487": ["The window w[n] for SWVD and ZAMD distributions was chosen to be a Hamming window of length bN/4c samples.", "All these QTFDs can be considered as filtered versions of Wigner-Ville distribution (WVD) [9].", "Also, WVD is the less appropriate TFD."]} +{"10655423|9270553": ["The commonly used \u201cWolpaw\u201d bit rate (Wolpaw et al., 2000), originally derived from (Shannon and Weaver, 1949),", "The commonly used \u201cWolpaw\u201d bit rate (Wolpaw et al., 2000), originally derived from (Shannon and Weaver, 1949),\nbW = log2(M) + p \u00b7 log2(p) + (1 \u2212 p) \u00b7 log2 1 \u2212 p M \u2212 1 (1)\nallows for a comparison between BCIs of the same type (M = number of classes, p = accuracy)."]} +{"23051387|9270553": ["The most common is the ITR [34], which represents the maximum capacity of the channel in bits per minute (bpm)."]} +{"24896500|9270553": []} +{"14099694|9270553": ["A theoretical formula from information theory was derived in [5] to compute the (mean) number of bits transferred per trial in a BCI", "A series of evaluation criteria has been proposed including the classification accuracy (or, equivalently, the error rate), Cohen\u2019s Kappa coefficient [4], and indexes based on mutual information, such as the widely-used information transfer rate (ITR) [5].", "Information transfer rate (ITR\u2014sometimes simply called bit rate) is a performance measure widely used in the literature [5], [8]."]} +{"11534729|3387861": []} +{"9374170|9270553": ["Advances in neuroscience and robotics have made possible diverse robot control applications using a brain machine interface to assist patients with devastating motor paralysis conditions [1]."]} +{"2716737|16362395": ["This classifier has been used on the past for classifying error-related potentials [6], [11]."]} +{"3285861|1932843": ["(a) Simulated robot scenario: In the observation task (training phase), four pictures were presented to the subjects: (1) the initial position of the robot, (2) the instruction for the robot, (5) the fixation cross, and (6) the action of the simulated robot."]} +{"3285861|1708582": ["(a) Simulated robot scenario: In the observation task (training phase), four pictures were presented to the subjects: (1) the initial position of the robot, (2) the instruction for the robot, (5) the fixation cross, and (6) the action of the simulated robot."]} +{"11796980|14866098": []} +{"11796980|16362395": ["Interested readers can refer, among others, to introductory papers by Bashashati et al. (2007); Lotte et al. (2007) and Blankertz et al. (2011)."]} +{"11796980|9270553": ["Typically, authors have reported changes using diverse metrics including accuracy, information transfer rate (Wolpaw et al., 2000), ef\ufb01ciency (Quitadamo et al., 2012) or utility value (Seno et al., 2010)."]} +{"51865239|14866098": []} +{"51865239|16362395": []} +{"9006316|9270553": ["Advances in robotics and neuroscience have made possible diverse robot control applications using a brain\u2013machine interface to assist patients with devastating motor paralysis conditions.[1] Applications that have proved to be very useful include: controlling a robotic wheelchair,[2] a mobile robot [3] or humanoid robots."]} diff --git a/edge/graph_204079717.jsonl b/edge/graph_204079717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86cd76bc9cd9fb332aba0c9729e0f689d7ec699e --- /dev/null +++ b/edge/graph_204079717.jsonl @@ -0,0 +1,13 @@ +{"17387775|14261802": ["These aforementioned factors have led to a growing interest in personalization techniques [19], [44], [48]."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"12239853|15683881": ["2015] data mining [Adomavicius and Tuzhilin 2001; Frias-Martinez et al. 2006] and machine learning techniques [Webb et al.", "Some of the most notable surveys in the EP and related area include: Godoy and Amandi [2005b], Frias-Martinez et al. [2006], Gauch et al. [2007], Martins et al. [2008], Schiaffino and Amandi [2009], and Mezghani et al. [2012]. Comparing these surveys, our work has significant differences with respect to new information, new comparison dimensions, and the way that common articles are being discussed. Godoy and Amandi [2005b] provide a survey of user profiling approaches in the area of intelligent information agents. Their work has a different perspective than our study, in which the authors focus on personal information agents. Frias-Martinez et al. [2006] review different data mining techniques used to user modeling for adaptive hypermedia systems between 1999 and 2004. They discuss only the approaches developed for user modeling, and for each approach, present its theoretical foundation, its advantages and disadvantages, and its usability in the area of user modeling. The authors aim to provide guidelines that show which machine learning or data mining approaches should be used according to the target application. Gauch et al. [2007] survey some of the well-known approaches used for acquiring, constructing, and representing user profiles.", "Some of the most notable surveys in the EP and related area include: Godoy and Amandi [2005b], Frias-Martinez et al. [2006], Gauch et al.", "2006] and machine learning techniques [Webb et al. 2001; Frias-Martinez et al. 2006] at the other side of spectrum.", "Some of the most notable surveys in the EP and related area include: Godoy and Amandi [2005b], Frias-Martinez et al. [2006], Gauch et al. [2007], Martins et al. [2008], Schiaffino and Amandi [2009], and Mezghani et al. [2012]. Comparing these surveys, our work has significant differences with respect to new information, new comparison dimensions, and the way that common articles are being discussed.", "Some of the most notable surveys in the EP and related area include: Godoy and Amandi [2005b], Frias-Martinez et al. [2006], Gauch et al. [2007], Martins et al. [2008], Schiaffino and Amandi [2009], and Mezghani et al. [2012]. Comparing these surveys, our work has significant differences with respect to new information, new comparison dimensions, and the way that common articles are being discussed. Godoy and Amandi [2005b] provide a survey of user profiling approaches in the area of intelligent information agents. Their work has a different perspective than our study, in which the authors focus on personal information agents. Frias-Martinez et al. [2006] review different data mining techniques used to user modeling for adaptive hypermedia systems between 1999 and 2004.", "Some of the most notable surveys in the EP and related area include: Godoy and Amandi [2005b], Frias-Martinez et al. [2006], Gauch et al. [2007], Martins et al. [2008], Schiaffino and Amandi [2009], and Mezghani et al. [2012]. Comparing these surveys, our work has significant differences with respect to new information, new comparison dimensions, and the way that common articles are being discussed. Godoy and Amandi [2005b] provide a survey of user profiling approaches in the area of intelligent information agents.", "Some of the most notable surveys in the EP and related area include: Godoy and Amandi [2005b], Frias-Martinez et al. [2006], Gauch et al. [2007], Martins et al.", "Some of the most notable surveys in the EP and related area include: Godoy and Amandi [2005b], Frias-Martinez et al. [2006], Gauch et al. [2007], Martins et al. [2008], Schiaffino and Amandi [2009], and Mezghani et al."]} +{"12239853|8310135": ["An entity may be any real or \ufb01ctional person, geographical location, company, organization, product, physical object, numeric expressions including time, date, money, percent, etc. [Nadeau and Sekine 2007].", "For more details about named entity and named entity recognition refer to Nadeau and Sekine [2007]."]} +{"14181461|1708582": []} +{"32242397|4859605": []} +{"32242397|1805048": ["Clustering methods and CF\nCF is one of the methods widely used in recommender systems sing two different techniques, memory-based and model-based Breese, Heckerman, & Kadie, 1998; Su & Khoshgoftaar, 2009 )."]} +{"9881462|7839197": []} +{"30405933|6387482": []} +{"18148088|954543": ["The attribute selection is also important to accelerate learning process and to improve learning quality [9] ."]} +{"8122695|1805048": []} diff --git a/edge/graph_204083715.jsonl b/edge/graph_204083715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e36644b146b3c6f393fe1158851fd31d74332469 --- /dev/null +++ b/edge/graph_204083715.jsonl @@ -0,0 +1,16 @@ +{"14967681|11068865": ["Vinola and Vimaladevi gave a detailed survey on human emotion recognition and listed many other multimodal datasets and methods [Vinola and Vimaladevi, 2015]."]} +{"18923981|26179088": ["Two main approaches have been used in sensor selection algorithms for EEG signal processing [14]."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"6869362|16362395": []} +{"39888164|14688441": ["Conversely, social psychology studies have examined personality mainly via non-verbal social behavioral cues (see [6] for a review), but few works have modeled personality traits based on emotional behavior.", "A comprehensive survey of personality computing approaches is presented in [6]."]} +{"13690009|6387482": []} +{"8743034|5943294": ["At the same time, it is an intrusive process, subjects could be unreliable at reporting their emotions or they could hide their real emotions [50]."]} +{"54521973|49544416": ["Various classifiers are used to classify emotion including such as K-nearest neighbor (KNN), random forest (RF), convolutional neural networks (CNN), and long-short term memory (LSTM) [18].", "A physiological signal is difficult to interpret, because it is measured from fine current that is sensitive to interference from the external environment in the forms of crosstalk, measuring instruments, and movement artifacts [18].", "Various classi\ufb01ers are used to classify emotion including such as K-nearest neighbor (KNN), random forest (RF), convolutional neural networks (CNN), and long-short term memory (LSTM) [18]."]} +{"54521973|4853233": ["To overcome these problems, a lot of techniques are used, such as information theory, resampling methods, cross-validation, etc. [24]."]} +{"54521973|3330313": ["Therefore, the experimental environment utilized is important, and signal processing and pre-processing are required to remove noise from the signals [19,20]."]} +{"52987645|7102404": ["Despite of the interest and advances of affective computing [18] in game [10], only a few databases are publicly available in the affective gaming community.", "Physiological-based affective game is an active research topic [10], [21]."]} +{"12688539|5943294": ["\u2026signals, spontaneous visual behavior is more convenient and unobtrusive to measure, although it is susceptible to environmental noise, such as lighting conditions, occlusion, etc. Recently, Soleymani and Pantic [5] have reviewed human-centered implicit tagging on images, videos, and search results.", "Unlike their survey, which lists all work together [5], we categorize current research into three groups based on adopted modalities: physiological signals, spontaneous visual behavior, and both.", "Previous reviews of this topic include the recent work by Soleymani and Pantic [5]."]} +{"12688539|6857179": ["Since emotions are complex and subjective, a small number of discrete categories may not re\ufb02ect the subtlety and complexity of the affective states [37]."]} +{"53766725|6682153": ["EEG-based affect recognition is reviewed e.g. by Kim et al. [70]."]} diff --git a/edge/graph_204165363.jsonl b/edge/graph_204165363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51741cb61997260286da438903bc2555cf612e2b --- /dev/null +++ b/edge/graph_204165363.jsonl @@ -0,0 +1,15 @@ +{"14278379|1029120": []} +{"16573689|206764452": ["It actively collects environment information around automobiles, and brings potentially risky conditions to the driver\u2019s attention as soon as possible [1] [2]."]} +{"198144979|206739910": ["OVERVIEW OF TRAFFIC SIGN DETECTION In [1] and [9], the traffic sign detection (TSD) methods are classified into two categories including shape based methods and color based methods.", "[1] presents a comprehensive survey for", "2 (b) is a camera based structure with tracking described in [1]; this structure can consecutively confirm the tracking results in consecutive frames to boost classification performance.", "Generally, traffic sign recognition (TSR) systems consist of two phases of detection and classification; for some TSR systems, a tracking phase is designed between detection and classification for dealing with video sequences [1]."]} +{"18380871|206764452": []} +{"3588463|206739910": []} +{"32462929|206739910": ["To evaluate the relative methods for traffic sign detection, there are several public traffic sign datasets available, such as GTSDB [5] and LISA traffic sign dataset (LISATSD) [1].", "To evaluate the relative methods for traffic sign detection, there are several public traffic sign\ndatasets available, such as GTSDB [5] and LISA traffic sign dataset (LISATSD) [1].", "Traffic Sign Recognition Systems (TSRs) are important for highway maintenance, driver-assistance systems, and self-driving cars [1]."]} +{"114862052|15093118": ["For more information on conventional hand-crafted feature/cue based approaches, interested readers may refer to the following survey papers: [68,69] for lane line marking detection, [70] for road surface detection, [71,72] for vehicle detection and [73] for pedestrian detection."]} +{"18876167|206739910": ["Basically, the previous works separately handle these colors in a specific color space [3, 7, 11].", "[7] gave a detailed review of the algorithms before 2012."]} +{"37580401|206764452": []} +{"5699083|8446711": ["Thermal cameras and applications: a survey [82].", "That range matches the emissions of object between 190K and 1000K [82]."]} +{"5699083|206764452": ["For an overview of recent work on pedestrian classification on these datasets, we refer to [91], [64] and [56].", "Pedestrian recognition in images is geared toward a variety of applications, which include safety focused road infrastructures [201], driver assistance systems [91] and autonomous robotic vehicles [173].", "Survey on Pedestrian Detection for Advanced Driver Assistance Systems [91].", "[86], [1], [5], [67], [216]), we refer readers to [83], [54] and [91].", "Advanced Driver Assistance Systems (ADASs) are active safety measures onboard vehicles with a human driver.", "The same range is denoted as Thermal Infrared (TIR) in [91] and as Long Wave Infrared (LWIR) in [189].", "Advanced Driver Assistance Systems . . . . . . . . . . . . . . . . . . . . ."]} +{"5699083|1029120": ["[86], [1], [5], [67], [216]), we refer readers to [83], [54] and [91].", "Pedestrian protection systems: Issues, survey, and challenges [83].", "Much of the research presented recently rely on computer vision [83].", "For reference, in [83] an extensive review of pedestrian protection systems is presented."]} +{"5699083|192934": ["evaluate Haar [168], PCA and LRF [105] in combination with neural networks and Support Vector Machine (SVM) classifiers."]} +{"54090706|206739910": []} +{"5325247|15093118": ["It is also recommend to read other comprehensive reviews [12] and [13] for driver safety systems.", "This paper is different from [13] due to addition of survey on sensors (active and passive), their comparison and literature for motorcycle detection techniques.", "The latter [13], is an up-to-date and thorough survey of vision-based vehicle detection, tracking and behavior analysis.", ", hardware and software solution for CAS while [13] addresses the driver behavior analysis and techniques for vehicle detection with minor details"]} diff --git a/edge/graph_20416796.jsonl b/edge/graph_20416796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e81f5b6015b28cda7fcdb3fd6087893b67e351ea --- /dev/null +++ b/edge/graph_20416796.jsonl @@ -0,0 +1,19 @@ +{"16546651|18044357": ["The main limitation of design diversity lies in the high complexity of creating different versions, which may not justify the benefit [23]."]} +{"110896183|1230643": []} +{"110896183|12060835": []} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"11486728|8909218": ["5) Facilitating communication overhead: The proposed framework should be efficient in terms of communication overhead and processing latency."]} diff --git a/edge/graph_204197962.jsonl b/edge/graph_204197962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3733ec886df88986640334186902678f6df4402a --- /dev/null +++ b/edge/graph_204197962.jsonl @@ -0,0 +1,9 @@ +{"3738885|8574504": ["The survey on semantic segmentation [13] presented a comparative study between different segmentation architectures including ENet [12]."]} +{"62586059|44286242": []} +{"62586059|8953108": []} +{"9474237|7361943": ["Measures intended to reduce the risk and severity of pedestrian impact are also becoming important in vehicle design, with computer vision algorithms increasingly being used in advanced driver assistance systems.(1) In recent years, much research has been devoted to the subject of automated pedestrian detection, with numerous algorithms such as those in Refs."]} +{"29625623|206764452": ["Ger\u00f3nimo [1] and Gavrila [2] discussed various state of the art pedestrian detection algorithms, evaluated them for their performance in terms of accuracy and execution time."]} +{"50698|393948": ["The idea of learning feature representations in this way goes back at least to autoencoders [6]."]} +{"206594196|469744": ["Successful image segmentation techniques could facilitate a large group of applications such as image editing [17], augmented reality [3] and self-driving vehicles [22]."]} +{"1198561|15093118": ["Vehicle detection and tracking is often done in the context of front camera detection [19] for applications like auto emergency braking or in traf\ufb01c surveillance applications [20]."]} +{"1198561|206739910": ["earlier, it is also important to be able to detect other road markings, such as arrows and disabled parking markings [28], and road signs [29], which allows the autonomously parking vehicle to follow the rules defined in the parking area."]} diff --git a/edge/graph_204207447.jsonl b/edge/graph_204207447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bdaf109237332910d10885b12aabbef938b2ae8c --- /dev/null +++ b/edge/graph_204207447.jsonl @@ -0,0 +1,37 @@ +{"49228479|9045232": ["Some methods using the PCA to compute a linear projection that preserves the maximum variance of input data so as to reduce the data dimension for several research areas such as edge detection, face pattern, and face localization (Yang et al. 2002)."]} +{"52847135|2473564": ["Facial expression recognition (FER) is one of the most important tasks in computer vision which plays a crucial role in numerous applications in psychology, medicine, security, digital entertainment, and driver monitoring, to name a few [41, 5, 14, 6, 3]."]} +{"52847135|2323881": ["Most methods are conducted on classical hand-crafted visual features, such as local binary pattern (LBP) [64], histograms of oriented gradients (HOG) [11], and scaled-invariant feature transform (SIFT) [46], which have the limited representation power and may not handle the challenge of nonlinear facial texture warping caused by pose variation well [2, 8]."]} +{"25720339|18440098": ["American Sign Language (ASL) was also focused in various hand gesture researches [49]\u2013[52]."]} +{"121199517|2301292": ["A number of 2D facial expression databases have become available (e.g., [1] [2] [7] [8] [16]), as well as some with 3D imaging data (e.g., [9] [14] [15] [24] [25] [45])."]} +{"1033682|174797842": []} +{"24776130|393948": ["To derive efficient representations of data, researchers have adopted two main strategies: (1) carefully crafted and tailored feature extractors designed for a particular task [1] and (2) algorithms that learn representations automatically from the data itself [2]."]} +{"35602792|6857179": []} +{"34374894|2473564": ["By recognizing facial expression or emotion, there are a variety of multimedia applications [8] such as human computer interaction, advertisement [25], pain recognition [35], and e-learning systems [4] that could help people to realize the response or feeling from other people.", "Aiming at recognize facial expression, previous works have extracted different appearance features or geometry features directly from facial image [8]."]} +{"18228076|5401262": ["Previous Work Extensive efforts have been devoted to recognize facial expressions [19, 31]."]} +{"53967424|7559976": ["Domain adaptation (DA) has beenwidely utilized in crossdatabase scenarios where the training data in source domains used to learn a model has different distribution from the target data (Patel et al. 2015; Csurka 2017).", "Domainadaptation(DA)hasbeenwidelyutilizedincross-database scenarios where the training data in source domains used to learn a model has different distribution from the target data (Patel et al. 2015; Csurka 2017)."]} +{"53967424|17221751": []} +{"53967424|11608263": []} +{"3642586|19815778": ["\uf0b7 A survey of FEA methods using FACS [Martinez et al. 2017]."]} +{"3642586|2473564": ["\uf0b7 Surveys of recent 2D/3D FEA methods [Bettadapura 2012], [Sandbach et al. 2012], [Owusu, et al. 2015], [Sariyanidi, et al. 2015], [Corneanu, et al. 2016]."]} +{"3642586|207060556": ["\uf0b7 A survey of face detection methods in a wild environment [Zafeiriou et al. 2015]."]} +{"3642586|17221751": ["\uf0b7 Surveys of recent 2D/3D FEA methods [Bettadapura 2012], [Sandbach et al. 2012], [Owusu, et al. 2015], [Sariyanidi, et al. 2015], [Corneanu, et al. 2016]."]} +{"3642586|2301292": ["Although FEA using 3D data has been researched intensively (see [Sandbach, et al. 2012] for a recent survey on existing studies), the approaches that are specifically designed to overcome facial occlusion are still limited and largely focus on handling self-occlusion caused by head pose variations.", "\uf0b7 Surveys of recent 2D/3D FEA methods [Bettadapura 2012], [Sandbach et al. 2012], [Owusu, et al. 2015], [Sariyanidi, et al. 2015], [Corneanu, et al. 2016]."]} +{"3642586|6857179": ["Halliday (2008) asked 56 female participants to identity happiness, sadness, and fear from static photographs of genuine and posed facial expressions from a single displayer, with four regions occluded: the forehead and eyebrows, the nose and cheeks, the eyes, and the mouth."]} +{"32699485|18050848": ["A few reviews focus on only data sets [13, 18\u201324], and some reviews our focuses on feature extraction methods.", "This could be especially important in situations where speech is the primary mode of interaction with the machine [13].", "Research about automated recognition of emotions in facial expressions is very rich [1, 13\u201316]."]} +{"17612122|14303607": ["Perception of faces, and facial expressions in particular, by humans is known to involve a combination of shape and shading analyses [19, 13]."]} +{"46969120|2301292": ["3D-based methods typically exploit 3D features or map the 3D data onto a representation [18]."]} +{"42190821|6028805": []} +{"5544437|2473564": ["For further reading on the methods used in FER, we refer the reader to [11, 39, 55, 58]"]} +{"5544437|2355696": ["These included emotionally and socially aware systems [14, 16, 51], improved gaming experience [7], driver drowsiness detection [52], and detecting pain in patients [38] as well as distress [28]."]} +{"10381255|17221751": ["A complete review of all the methods is out of the scope and we refer the reader to a recent survey [33]."]} +{"36180543|192934": ["Automated systems for facial expression recognition usually take the form of a sequential configuration of processing blocks which adheres to a classical pattern recognition model [ 5 ]."]} +{"3434428|2301292": []} +{"3329621|2355696": ["It involves computer vision, machine learning and behavioral sciences, and can be used for many applications such as security [20], human-computer-interaction [ 23 ], driver safety [24], and health-care [17]."]} +{"2803986|6857179": ["Recently, there has been more interest in the automatic recognition of dimensional affect [22], [23], [46]."]} +{"192596|2301292": []} +{"24675185|14303607": ["Surprisingly, although Plato, Aristotle, Descartes, and Hobbes (1, 4, 5), among others, mentioned other types of facial expressions, subsequent research has mainly focused on the study of the six facial expressions of emotion listed above (6\u20139).", "IEEE Trans Pattern Anal Mach Intell 27(5):812\u2013816."]} +{"6036551|17221751": ["For a comprehensive survey of the works in expression recognition please refer to [8], [28], [29]."]} +{"2301292|1118130": ["prototypical expressions of emotions [5,4,6,7]."]} +{"16573415|469744": []} +{"62136523|393948": ["In recent years, deep learning, as a newly emerged machine learning theory, has received extensive attentions in machine learning [23], signal processing [24], and arti\ufb01cial intelligence [25]."]} +{"20854023|17221751": ["Detailed survey of different approaches in each of these steps can be found in [44]."]} diff --git a/edge/graph_204246935.jsonl b/edge/graph_204246935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..83d27758d0f75486f2106c9485e34d9a9e4cbbe1 --- /dev/null +++ b/edge/graph_204246935.jsonl @@ -0,0 +1,9 @@ +{"19627005|18303304": ["To improve the usability and comfort of wearable solutions there is a need for this type of sensor to be integrated into clothing [22]."]} +{"21436217|393948": ["[4] provide an overview of representation learning that is used to learn good features from the raw input space that are powerfully discriminative for downstream tasks."]} +{"25474275|15273230": []} +{"2703783|20905429": ["Over the past two decades, a type of sensor placement system [7], [8], actigraphy, has become a way to assess acceptable and an accessible tool in sleep research and sleep medicine."]} +{"53097078|6237367": ["However, it is not being utilized actively to monitor the efficacy of patient therapy or sleep quality which in-turn could pave way for an intervention as done in other health-care areas [5]."]} +{"24997271|192934": ["Backward elimination algorithm began with all features and iteratively removed one by one [19], [20], which was regarded to be more successful for finding the optimal feature subset [21]."]} +{"5188097|191396": []} +{"3821594|18599847": [". [27] and Bulling et al. [28] for more comprehensive reviews of sensor-based human activity recognition literature. Also, Langkvist et al. provided a review of deep learning for time-series modeling [29]. Early adopters of deep learning for wearable sensor data, focus on adapting the raw input signal to the desired deep learning architecture [30]. Inspired from speech recognition, Alsheikh et al. [30"]} +{"8233911|21386749": ["The recent IoT research directions in the medical field can be divided in four main categories: network architectures and platforms, interoperability, new services and applications, and security [7]."]} diff --git a/edge/graph_204253777.jsonl b/edge/graph_204253777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f12ba5db1efd10b1cc2a157e1daa93de9725c05 --- /dev/null +++ b/edge/graph_204253777.jsonl @@ -0,0 +1 @@ +{"23854769|17381415": ["In such grid-connected mode, the inverter is typically controlled as a current source [1] to inject certain amount of current into the grid.", "Grid synchronization methods [1] also have strong effects on the inverter output impedance, which have not been given much attention so far and will be studied in a future work."]} diff --git a/edge/graph_204401799.jsonl b/edge/graph_204401799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3ed98beca6ccb5ae49669e4267da8acb3434699 --- /dev/null +++ b/edge/graph_204401799.jsonl @@ -0,0 +1,9 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"21275504|11777996": ["The ranking based on tf-idf has been shown to work well in practice (Hasan and Ng, 2014, 2010), despite its simplicity.", "In the unsupervised line of research, keyphrase extraction is formulated as a ranking problem with graph-based ranking techniques being considered state-of-the-art (Hasan and Ng, 2014).", "Many supervised and unsupervised approaches to keyphrase extraction have been proposed in the literature (Hasan and Ng, 2014).", "We also summarize the results in terms of Precision, Recall, and F1-score in a table to contrast PositionRank with previous models since these metrics are widely used in previous works (Hulth, 2003; Wan and Xiao, 2008; Mihalcea and Tarau, 2004; Hasan and Ng, 2014).", "Many of the above approaches, both supervised and unsupervised, are compared and analyzed in the ACL survey on keyphrase extraction by Hasan and Ng (2014).", "Due to their importance, many approaches to keyphrase extraction have been proposed in the literature along two lines of research: supervised and unsupervised (Hasan and Ng, 2014, 2010).", "We selected these base-lines based on the ACL survey on keyphrase extraction by Hasan and Ng (2014)."]} +{"38112128|6486398": ["The connections between the two models are striking (see [78]) and it\u2019s hard to say whether HITS in\ufb02uenced PageRank, or vice versa, or whether both developed independently."]} +{"202577863|14258620": ["Al-Jarrah et al. (2015) review the research literature focusing in the computational and energy\n2http://hdl.handle.net/11234/1-3043\nefficiency of the data-driven methods."]} +{"90262188|11777996": ["More information about similar keyphrase data collections or other available resources can be found in Hasan and Ng (2014) and in online repositories."]} +{"52059063|11777996": ["Keyphrase extraction concerns the task of selecting a set of phrases from a document that can indicate the main ideas expressed in the input (Turney, 2000; Hasan and Ng, 2014)."]} +{"51604131|11777996": []} +{"10046354|11777996": ["Recent years have witnessed increased interest in keyphrase extraction (Gollapalli et al., 2015), and several benchmark datasets have become available in various domains and languages (Hasan and Ng, 2014).", "However, this framework requires users to learn UIMA before they can get started, and does not provide supervised approaches that are known to perform better (Hasan and Ng, 2014)."]} +{"152282295|11777996": ["Hasan and Ng (2014) focus on the errors that are made by state-of-the-art keyphrase extractors: (a) evaluation errors (when a returned keyphrase is semantically equivalent to a gold one but it is evaluated as erroneous), (b) redundancy errors (when a method returns correct but semantically\u2026", "Keyphrase extraction is concerned with automatically extracting a set of representative phrases from a document that concisely summarize its content (Hasan & Ng, 2014).", "Our article reviews 37 additional methods compared to Hasan and Ng (2014).", "The basic steps of an unsupervised keyphrase extraction system are the following (Hasan & Ng, 2010, 2014): 1.", "Keyphrase extraction is concernedwith automatically extracting a set of representative phrases fromadocument that concisely summarize its content (Hasan and Ng, 2014)."]} diff --git a/graph_204485.jsonl b/edge/graph_204485.jsonl similarity index 100% rename from graph_204485.jsonl rename to edge/graph_204485.jsonl diff --git a/edge/graph_204509136.jsonl b/edge/graph_204509136.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76a3a2473d4fb8112aef72f5e242d1a6583f2857 --- /dev/null +++ b/edge/graph_204509136.jsonl @@ -0,0 +1,2 @@ +{"33703331|513106": []} +{"53030991|4602249": ["A significant amount of research has been conducted on testing software [11], and also for testing ML performance."]} diff --git a/edge/graph_204509231.jsonl b/edge/graph_204509231.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b078424e67ab2e530e34a392fb1e6da80f7e3232 --- /dev/null +++ b/edge/graph_204509231.jsonl @@ -0,0 +1,37 @@ +{"35869294|30189749": ["Low-level vehicle dynamics, however, are of crucial importance, as exhibited by [24] and because many traf\ufb01c phenomena, which affect energy consumption, safety, and travel time are exhibited at the level of low-level dynamics [5], [25], [26], [27]."]} +{"3839179|12264500": ["Automated driving promises to significantly reduce the number of road fatalities, increase traffic efficiency, reduce environmental pollution, give mobility to handicapped members of our society and empower new services such as mobility on demand [1]."]} +{"3839179|1229096": ["Usually, MP for automated vehicles is structured hierarchically [3],", "approaches in vehicle automation domain [3]\u2013[5]."]} +{"3672301|1229096": ["Autonomous driving is the subject of intensive research [25]."]} +{"3672301|1932843": ["In robotics, movement primitives have been used as building blocks for advanced motor skills [17], [26]."]} +{"57375772|14843594": ["There are several popular types methods for tuning the hyperparameters of neural networks: grid search, random search [3], simulated annealing [9], bandit-optimization [11] [22], and black-box Bayesian Optimization methods [6] [18] [21], as well as manual tuning."]} +{"5136932|1932843": ["First, as noted in [19], usually in robotics, we may only be able to \ufb01nd some approximate notion of a Markovian behaving state.", "Traditionally, machine learning approaches for planning strategies are studied under the framework of Reinforcement Learning (RL) \u2014 see [6, 17, 31, 35] for a general overview and [19] for a comprehensive review of reinforcement learning in robotics."]} +{"5136932|1708582": []} +{"5136932|28670512": []} +{"3704867|2340253": ["In contrast with such multi-agent control approaches, the field of multi-agent reinforcement learning offers a more general way to solve multi-agent problems [19], [20]."]} +{"67856430|1229096": ["\u2026a pretty popular pipeline is to \ufb01rst do scenario-based high-level decision, then predict the future trajectory of surrounding objects, and then treat the predicted trajectories as obstacles and apply motion planning techniques to plan a trajectory for the ego vehicle [22], [18], [19], [10]."]} +{"128350527|1229096": ["Current autonomous driving decision making systems are focusing on the non-learning model-based approaches, which often requires to manually design a driving policy [12], [21]."]} +{"85517967|204904177": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|204509231": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|186206717": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|53800586": ["As suggested in [28], more research is required on how to generalize to \u201ccomplex, cluttered and unseen environments\u201d."]} +{"129027|12264500": []} +{"57573831|1229096": ["While some (Bojarski et al., 2016) achieve all tasks in one unique module, others do follow the logic of one task - one module (Paden et al., 2016).", "Vehicle control : Vehicle control classically has been achieved with predictive control approaches such as Model Predictive Control (MPC) (Paden et al., 2016)."]} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"1033682|174797842": []} +{"49669425|1229096": ["Autonomous driving has recently attracted extensive research interests [3].", "Autonomous urban driving is a long-studied and still under-explored task [1,2] particularly in the crowded urban environments [3]."]} +{"186206717|118684904": ["A recent survey outlines progress in pose estimation and SLAM, visual-inertial odometry and 3D reconstruction, as well as other applications [143]."]} +{"186206717|58004724": ["[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "For more detailed studies of this topic [22], [27], [244] can be referred."]} +{"186206717|58598634": []} +{"186206717|53569365": ["naming, caching, reliability and multi-access computing [77]."]} +{"186206717|49862415": []} +{"186206717|4861446": ["to [106] for a broader localization overview.", "Localization is the task of finding ego-position relative to a reference frame in an environment [106], and it is fundamental to any mobile robot."]} +{"186206717|3775239": ["algorithms for intelligent vehicles is given in [216]."]} +{"186206717|206741902": ["Like in aircraft, ADSs need to be designed with high redundancies that will minimize the chance of a catastrophic failure.", "[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "One of the key \ufb01ndings of this study is that even though human drivers are still better at reasoning in general, the perception capability of ADSs with sensor-fusion can exceed humans, especially in degraded conditions such as insuf\ufb01cient illumination.", "Annual social bene\ufb01ts of ADSs are projected to reach nearly $800 billion by 2050 through congestion mitigation, road casualty reduction, decreased energy consumption and increased productivity caused by the reallocation of driving time [3].", "ADSs are complicated robotic systems that operate in inde-terministic environments.", "Increasing the mobility of elderly with ADSs can have a huge impact on the quality of life and productivity of a large portion of the population.", "It is especially crucial for ADSs [25]; the vehicle must use the correct lane and position", "Ego-only is the most common approach amongst the state-of-the-art ADSs [20], [43], [47]\u2013 [52], [52]\u2013[54].", "State-of-the-art ADSs employ a wide selection of onboard sensors.", "Most of the ADSs divide the massive task of automated driving into subcategories and employ an array of sensors and algorithms on various modules.", "1) Problems that can be solved : preventing traf\ufb01c accidents, mitigating traf\ufb01c congestions, reducing emissions 2) Arising opportunities : reallocation of driving time, trans-porting the mobility impaired 3) New trends : consuming Mobility as a Service (MaaS), logistics revolution Widespread deployment of ADSs can reduce the societal loss caused by erroneous human behavior such as distraction, driving under in\ufb02uence and speeding [3].", "During DARPA Urban Challenge [7], held in 2007, many different research groups around the globe tried their ADSs in a test environment that was modeled after a typical urban scene.", "On the other hand, extremely cautious ADSs are also making a negative impression [39].", "Widespread usage of ADSs is not imminent, yet, it is still possible to foresee the potential impact and bene\ufb01ts of it to a certain degree.", "We refer the readers to [25] for a detailed SLAM survey in the intelligent vehicle domain.", "Furthermore, an increase in public interest and market potential precipitated the emergence of ADSs with varying degrees of automation.", "A detailed comparison of sensor setups of 10 different full-size ADSs is given in Table IV.", "Large scale deployment of ADSs can accelerate this trend.", "Automated driving systems (ADSs) are being developed with the promise of preventing accidents, reducing emissions, transporting the mobility-impaired and reducing driving related stress [2].", "Fatalities [17], [18] caused by immature ADSs undermine trust.", "As such, single stage detectors are often the detection algorithms of choice for ADSs.", "ADSs are designed either as standalone, ego-only systems [20], [43] or connected multi-agent systems [44]\u2013[46].", "The present paper attempts to provide a structured and comprehensive overview of the hardware-software architectures of state-of-the-art ADSs.", "It is especially crucial for ADSs [25]; the vehicle must use the correct lane and position Fig.", "Furthermore, system failures lead to accidents: in the Hyundai competition one of the ADSs crashed because of rain [15], Google\u2019s ADS hit a bus while lane changing because it failed to estimate the speed of a bus [16], and Tesla\u2019s Autopilot failed to recognize a white truck and collided with it, killing Fig."]} +{"186206717|1229096": ["[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "There are overview papers on the subject, which covered several core functions [20], [21], and which concentrated on the motion planning aspect [22], [23].", "For more detailed studies of this topic [22], [27], [244] can be referred."]} +{"186206717|17036197": ["Object tracking is also often referred to as multiple object tracking (MOT) [180] and detection and tracking of multiple objects (DATMO) [181].", "tracking (MOT) [180] and detection and tracking of multiple objects (DATMO) [181]."]} +{"186206717|36510460": ["A detailed overview of Sampling Based Planning (SBP) methods can be found in [262]."]} +{"64853900|1229096": ["Two recent reviews (29, 30) provide a clear overview of the state of the art in motion planning for autonomous cars."]} +{"64853900|2373140": []} +{"54457648|1229096": ["Finally, there exists a large volume of work on vehicle motion planning outside the machine learning context and Paden et al. (2016) present a notable survey."]} diff --git a/edge/graph_204509299.jsonl b/edge/graph_204509299.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..451505240e6ab50dc490273ff06bacb5a735652d --- /dev/null +++ b/edge/graph_204509299.jsonl @@ -0,0 +1,8 @@ +{"67871739|206778272": ["Among them, [17] provides a good survey and [15] considers motivations for refactoring."]} +{"18838775|206778272": ["The performance of these detection tools, e.g., precision and recall, is critical for the success of software refactoring activities.", "Another reason why engineers should customize these thresholds is that they have different working schedules and different requirements on software quality."]} +{"16787525|14229975": ["Therefore, we have proposed, in a previous work, a quality model (25010+S) an extension of the ISO/IEC 25010 standard by considering aspects of sustainability on its characteristics and sub-characteristics."]} +{"17713828|57079027": ["30,31 Our work, as discussed here, is a first step toward emphasizing the environmental dimension generally neglected in other studies.", "28,31 Potential conflicts among stakeholder interests means software developers must understand the relationships among goals of the four dimensions."]} +{"17713828|14229975": ["Surveys of published studies 25,29 show over 50% of those on sustainability in software engineering were published between 2010 and 2012, indicating the emergence of the topic in the software-development community."]} +{"10924616|5254998": []} +{"69627799|56208985": ["[100]; this is the same methodology already successfully adopted in previous meta-analyses conducted in the context of software engineering research [105, 106, 107]."]} +{"69627799|206778480": ["Also, in this case, a likely reason behind its popularity is due to the good performance that this classifier ensures [87]."]} diff --git a/edge/graph_204509378.jsonl b/edge/graph_204509378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c5505fca90f0b22e9a94474ed2e40d02a9500a3 --- /dev/null +++ b/edge/graph_204509378.jsonl @@ -0,0 +1,75 @@ +{"52074343|206584087": []} +{"14757739|13172512": [", [27, 54, 49, 23, 25]) and machine learning algorithms pervade several contexts of information technology.", "For example, classification and regression models are employed to analyze current and historical trends to make predictions in financial markets [24, 33, 8], to study biological problems [54], to support medical diagnosis [30, 42, 57], to classify network traffic or detect anomalies [22, 28, 39, 12, 49].", "SVM for network traffic classification As shown by the extensive literature on this topic [28, 27, 49, 15], network traffic classification is commonly realized by means of Machine Learning algorithms, like K-Means, HMM, decision trees, and SVM."]} +{"35426171|5538934": ["Due to their increased use in security-critical settings such as malware detection, there has been an explosion of work on the security of machine learning systems; see Barreno et al. (2010), Biggio et al. (2014a), Papernot et al. (2016b), and Gardiner and Nagaraja (2016) for some recent surveys."]} +{"9510921|10355303": ["in the form of histograms or templates [25]."]} +{"1353379|9667820": []} +{"1353379|44461432": []} +{"1353379|9928823": []} +{"1353379|18388986": []} +{"1353379|3127198": []} +{"1033682|174797842": []} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"10015144|8909218": ["We refer the reader to [15] for a survey of work in the area."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"40430109|14843594": [", (Snoek et al., 2012; Shahriari et al., 2016)) in which we use an acquisition function, such as expected improvement or upper confidence bound, to rank the candidate models; this takes into account uncertainty in the prediction of a model\u2019s performance, which encourages us to try models for which our predictor may be unreliable."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"51866188|15273230": ["Under this circumstance, common techniques to tackle imbalance data can be used [4], [15]."]} +{"12819773|207228303": []} +{"12819773|7842253": ["In this manner, the overall goal of cloud resource orchestration is to ensure successful hosting and delivery of applications by meeting the QoS objectives of consumers.", "Topics include configuration management [Delaet et al. 2010], monitoring [Bauman et al. 2015], security and assurance [Ardagna et al. 2015; Huang and et al. 2015; Roy et al. 2015], energy efficiency [Mastelic et al. 2014], adaptability [Singh and Chana 2015; Zhan et al. 2015a], Quality of Service (QoS) and Service Level Agreements (SLAs) [Hani et al. 2015], as well as software architectures for cloud-based systems [Chauhan et al. 2016] and interoperability concerns [Toosi et al. 2014; Lewis et al. 2013].", "2014], adaptability [Singh and Chana 2015; Zhan et al. 2015a], Quality of Service (QoS) and Service Level Agreements (SLAs) [Hani et al.", "In essence, this model consists of the following phases: (1) Selection, consumers select required resources; (2) Configuration, resource description attributes are specified as well as relationships; (3) Deployment, cloud resources are instantiated; (4) Monitoring, resources are monitored to ensure they conform with QoS and SLAs; and (5) Control, resources are dynamically (re-)configured to alleviate violations or whenever there are changes in requirements.", "For instance, endowing resources with self-management capabilities has the potential to enhance high availability of cloud resources, for example, through dynamic (re-)configuration, to maintain the expected quality of service in the presence of faults, variable environmental conditions, and changes in user requirements [Singh and Chana 2015; Zhan et al. 2015a; Cheng and Garlan 2012; Yuan et al. 2014].", "\u2026of cloud resources, for example, through dynamic (re-)configuration, to maintain the expected quality of service in the presence of faults, variable environmental conditions, and changes in user requirements [Singh and Chana 2015; Zhan et al. 2015a; Cheng and Garlan 2012; Yuan et al. 2014].", "Other efforts include automatic re-configuration of resources to meet evolving application resource requirements and QoS [Zhan et al. 2015a; Singh and Chana 2015; Toosi et al. 2014; Ye et al. 2016].", "Chana et al. [Singh and Chana 2016] devised an autonomic (self-* properties) resource management taxonomy that covers aspects related to runtime QoS management of cloud-hosted applications, including (i) monitoring, (ii) fault tolerance, (iii) workload consolidation, and (iv) scheduling objective function and QoS metrics.", "Although the taxonomies presented in Singh and Chana [2016], Toosi et al. [2014], and Zhan et al. [2015b] are very detailed from the perspective of application QoS management (which evidently draws a parallel with Runtime Environment dimension and Orchestration Strategies sub-dimension in Figure 2), they failed to cover other important dimensions and sub-dimensions related to holistic cloud resource orchestration process, such as User Layer, Knowledge Reuse, Resource Access Method, Resource Representation Notation, Language Paradigm, and so on.", "Similarly, Zhang et al. [Zhan et al. 2015b] presented a taxonomy to help in understanding and analyzing the application of Evolutionary Computing (EC) techniques for formulating application scheduling heuristics (i.e., Orchestration Strategies).", "\u2026[Ardagna et al. 2015; Huang and et al. 2015; Roy et al. 2015], energy efficiency [Mastelic et al. 2014], adaptability [Singh and Chana 2015; Zhan et al. 2015a], Quality of Service (QoS) and Service Level Agreements (SLAs) [Hani et al. 2015], as well as software architectures for\u2026", "Similarly to Singh and Chana [2016], the taxonomy presented in Toosi et al. [2014] is limited to QoS and SLA management aspects (autonomic scheduling, portability, monitoring, security, cross-cloud communication)."]} +{"12819773|17474643": []} +{"12819773|13210924": ["In another strand of cloud computing research, authors have developed a taxonomy [Fatema et al. 2014; Alhamazani et al. 2015] for cloud monitoring (a type of runtime orchestration operation)."]} +{"3469587|595093": ["For example, communication networks which are vulnerable to cyber attacks in smart gird might lead to unreliable operations and extra expenditure [22], [23]."]} +{"3562477|3330313": []} +{"3562477|50458504": []} +{"88520060|12454277": [" of further studies based on random forestscouldinfactbecitedfromtheeldsofgenomics,metabolomics, proteomics or transcriptomics. Some of them are reviewed in [Geurts et al., 2009 ; Touw et al., 2013 ; Boulesteix et al., 2012 ]. In light of our study and discussion of variable importances, recommendations for biomarker identication depend on the exact objective of the application. If the goal is to identify all relevant v", "Some of them are reviewed in [Geurts et al., 2009; Touw et al., 2013; Boulesteix et al., 2012]."]} +{"88520060|393948": []} +{"88520060|11608263": ["A famous example of such multi-objective task is multi-label classification (see [Tsoumakas and Katakis, 2007]), in which a sample x can be assigned to multiple binary labels Yk (for k = 1, .", "A famous example of such multi-objective task is multi-label classification (see [Tsoumakas and Katakis, 2007]), in which a sample x can be assigned to multiple binary labels Yk (for k = 1, . . . ,q)."]} +{"49183164|6909107": ["Therefore, the computation offloading and computational resource allocation themes have attracted great interests as a key point in the MEC system [3]."]} +{"207319017|8627028": ["In a recent survey of annotation projects for natural language processing tasks (Tomanek and Olsson, 2009), only 20% of the respondents said they had ever decided to use active learning, which is evidence of the community\u2019s skepticism about its usefulness in practice1."]} +{"7642674|7020971": []} +{"19143541|12815020": ["Fortunately, Intrusion Detection Systems (IDS) can also be applied in fog environment [11].", "However, Intrusion Detection Systems (IDS) can be used for fog environment [11]."]} +{"24352132|14843594": ["The earliest meta-modeling approaches were based on genetic algorithms [9, 11, 13] or Bayesian optimization [2, 10]."]} +{"60676283|1230643": []} +{"18002489|595093": []} +{"21712427|1185580": ["Moreover, the TD-Error (Temporal Difference-Error), defined by: \u03b4 \u201c Rrk ` 1s ` \u03b3V \u03c0\u03c8 perrk ` 1sq \u0301 V \u03c0\u03c8 perrksq, (19) is an unbiased estimate of the advantage function, and therefore can be used to compute the policy gradient [13]:", "The EM scheme proposed in this work is an actor-critic algorithm, a class of RL techniques wellknown for being capable to search for optimal policies using low variance gradient estimates [13].", "Using the policy gradient theorem as formulated in (14) may lead to high variance and slow convergence [13].", "However, these methods suffer from high variance, and therefore slow learning [13]."]} +{"25676259|28628245": ["Moreover, unlike the relevant fields of mobile ad hoc network (MANET) [15] and wireless sensor network (WSN) [16] where there is a pluralism of proposed ML-driven IDS solutions, the potential of A-IDS in infrastructure-based wireless networks such as enterprise 802.", "Moreover, unlike the relevant fields of mobile ad hoc network (MANET) [15] and wireless sensor network (WSN) [16] where there is a pluralism of proposed ML-driven IDS solutions, the potential of A-IDS in infrastructure-based wireless networks such as enterprise 802.11 networks or even long-term evolution (LTE) networks seems largely unexplored."]} +{"207244918|1932843": ["RL has been used for a variety of learning tasks, ranging from robotics [25, 24] to industrial manufacturing [26] and computer game playing [34]."]} +{"207244918|1708582": ["RL has been used for a variety of learning tasks, ranging from robotics [25, 24] to industrial manufacturing [26] and computer game playing [34]."]} +{"829398|11381530": ["This using a process, that can be easily and and These parameters are tuned as part of the VAE training process In the variational approach, we try to maximize the probability of obtaining the desired data as output, by maximizing a quantity known as the Evidence Lower Bound (ELBO) [22].", "Finally, [22] presents a survey of works related to neural networks architectures applied to NIDS, including generative models; but no work on feature recovery is mentioned.", "In the variational approach, we try to maximize the probability of obtaining the desired data as output, by maximizing a quantity known as the Evidence Lower Bound (ELBO) [22]. and are considered constant later on."]} +{"17772052|192934": ["For non-Gaussian distributions additional techniques may be used, including Sammon\u2019s maps [30], [31], multilayer perceptrons (MLPs) (Section IV-C), Kohonen self-organizing maps (Section VI-C), Kernel PCA, projection pursuit, and independent components analysis [32]."]} +{"20714|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"9781542|3127198": ["Again, limitation in the number of bands as well as the number of sensor data plagues the optimal use of most of these techniques [17].", "\u201cThe capability of DST to assign probability, uncertainty or ignorance to propositions is a powerful tool for dealing with a large range of problems that otherwise would seem intractable\u201d [17].", "Reasoning system [17] and empirical determination of parameters in DST make the concept universally applicable without being dependent on the satellite image [12]."]} +{"51921368|3536399": ["A comprehensive survey on the threat of adversarial attacks on deep learning models is given in [37]."]} +{"51921368|15562587": ["For example, [46] examines which architecture is better for learning different functions."]} +{"3523597|2829149": ["\u2026from sensors and devices connected to the hub, one of the chief criticisms of modern IoT systems is that the existing commercial frameworks lack basic tools and services for analyzing what they do with that information\u2013i.e., application * contributed equally to this work. privacy [5], [6], [7]."]} +{"3427632|14814753": []} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"57362815|393948": ["A varying number of layers can provide a different level of abstraction to improve the learning ability and task performance [1]."]} diff --git a/edge/graph_204509584.jsonl b/edge/graph_204509584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d62dc066543d65e9e600b6f4d147f0b442d2ac54 --- /dev/null +++ b/edge/graph_204509584.jsonl @@ -0,0 +1,4 @@ +{"109700818|2445985": []} +{"1691231|2774711": ["In this regard, although some systematic literature reviews had been conducted to analyze notions like model quality [3] or the consistency between models [4], we did not know of the existence of studies devoted to the analysis of the utilization of formal methods and formal analysis techniques to ensure model correctness."]} +{"15256364|627405": ["In order to provide a balanced and objective summary of research evidence, a systematic literature review (SLR) process is considered as an appropriate method to carry out such a review in software engineering [2]."]} +{"10087056|17202214": ["Our work covers all the limitations of [62] and provides much more extensive SLR on the topic.", "However, [62] presents several drawbacks and differences from our paper.", "[62] could be closer to 30 our work, but has several limitations in terms of scope and methodology."]} diff --git a/edge/graph_204509653.jsonl b/edge/graph_204509653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c062a06d61b667e6dc8e81fe3a7f19aa42c3543f --- /dev/null +++ b/edge/graph_204509653.jsonl @@ -0,0 +1,2 @@ +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"44117088|20310191": ["Ghasemi and Amyot [13] conducted a systematised literature survey which provides an overview of the status of PM in healthcare, and provided initial results from the search process of the systematic review.", "[13] M. Ghasemi and D. Amyot, \u2018\u2018Process mining in healthcare: A systematised literature review,\u2019\u2019 Int.", "Several literature reviews have revealed the state of PM applications in the healthcare domain in general [11]\u2013[13] or from specific perspectives, such as clinical pathways [14] and oncology processes [15]."]} diff --git a/edge/graph_204539091.jsonl b/edge/graph_204539091.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5b3e0f14867994e550f6bad4bcf819949295bfd --- /dev/null +++ b/edge/graph_204539091.jsonl @@ -0,0 +1,3 @@ +{"23423822|9123526": ["To facilitate the routine tasks in SOA, combined research efforts have contributed standardized service description languages [2,18,13,3,23], automated service discovery tools [11,22,12,10,6] and service composition approaches [27].", "The two most well-known Semantic Web Service description approaches are Semantic Markup for Web Services (OWL-S) (Martin et al. 2005) and Web Service Modeling Ontology (WSMO) (De Bruijn et al. 2006).", "\u2026research efforts have contributed standardized service description languages (Christensen et al. 2001; Martin et al. 2005; Kopecky et al. 2007; De Bruijn et al. 2006; Sheth et al. 2005), automated service discovery tools (Klusch et al. 2006; Pedrinaci et al. 2010; Klusch and Kapahnke 2010;\u2026", "The two most well-known Semantic Web Service description approaches are Semantic Markup for Web Services (OWL-S) [18] and Web Service Modeling Ontology (WSMO) [3]."]} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/edge/graph_204542639.jsonl b/edge/graph_204542639.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204575891.jsonl b/edge/graph_204575891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..edd413c4922087c0c5d07d74a8a3e6407aeb33a3 --- /dev/null +++ b/edge/graph_204575891.jsonl @@ -0,0 +1,34 @@ +{"5900666|22221919": ["The problem is that, for a large number of devices, cochannel interference seriously degrades the performance of MMSE-SIC in terms of SIC complexity and error propagation [8], [3], [1].", "Non-orthogonal multiple access (NOMA)(1) is being discussed in the context of fifth-generation (5G) networks as one of the key technological enablers for 5G new radio (5G-NR) and the internet of things (IoT) [1], [2], [3]."]} +{"30916428|162478": []} +{"34821874|6111895": ["Some examples of the latter includes underwater communication using acoustic signals [1], and a new technique called molecular communication, which relies on chemical signals to interconnect tiny devices with sub-millimeter dimensions in environments such as inside the human body [2, 3, 4, 5].", "To evaluate the performance of deep learning detectors, we focus on molecular communication where chemical signals are used to transfer messages [2, 3, 4, 5]."]} +{"2806334|9862516": ["This way, the multipath channel can be realized as a matched filter and focuses the wave in the time domain [32].", "This strategy was studied for both indoor and outdoor environments and both experimental and mathematical analysis shows that the TR scheme requires much less transmission power compared with the direct transmission with the rake receiver [32]."]} +{"68037872|8323234": ["We only consider the azimuth here, but the extension to elevation and azimuth is possible [3].", "There are two main hybrid analog-digital beamforming schemes: one is the fully connected structure, which connects all antennas to each RF chain, while the other is the partially connected scheme, which divides the antennas into subarrays and only connects one subarray to its own RF chain [3], [6].", "Nonetheless, realizing mmWave mMIMO in practice still faces challenges [3]: (1) to fully reap the gain provided by MIMO, each antenna requires a dedicated radio-frequency (RF) chain, which is difficult to realize for mmWave due to space", "The total power consumption includes two parts: the flexible transmit power \u2211L l=1(Pl,1 + Pl,2), and the fixed circuit power consumption PC [3].", "Compared with digital beamforming, these two architectures can significantly reduce the number of RF chains by performing the signal processing in analog or a mixture of analog-digital domains [3]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"70311173|9862516": ["Alternatively, techniques such as time reversal [58] can be used to mitigate multi-path fading."]} +{"1058297|41035405": []} +{"190432|41035405": ["The relay channel was introduced by Van der Meulen [528]; the capacity region for the degraded relay channel was determined by Cover and El Gamal [127].", "We would also like to thank Normam Abramson, Ed van der Meulen, Jack Salz and Raymond Yeung for their suggested revisions."]} +{"9119426|41035405": ["Feedback is typically unavailable and redundant coding is used to enable correct reception of messages in the presence of interference [2].", "The time-discrete noiseless AC is defined [2] by the following relation between its output Z and its inputs X i ,i = 1 , 2 ,."]} +{"1142029|30430657": ["0 system, to provide higher data capacity, more robust performance, better spectrum efficiency, and to enable new services [1]."]} +{"54462920|512386": ["In practice, we often encounter a problem of detecting a sequence of sparse signals which is usually correlated across time [18], [19]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"64861384|206578224": []} +{"52290948|4884302": ["The aim of Q-learning is to obtain a policy (a set of actions) that maximizes the observed rewards over the interaction time [15]."]} +{"18202275|25929315": ["Some of the most relevant contributions are summarized in Table I and a comprehensive survey can be found in [16]."]} +{"53521280|22221919": []} +{"53521280|10235514": []} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"61808169|22221919": ["The power-domain NOMA (PDNOMA) is a well-known and promising SC-NOMA technique [7], in which multiple users are multiplexed with different transmit power levels in the same frequency RE and successive interference cancelation (SIC) is employed at the receiver ends"]} +{"61808169|3270620": ["The nonorthogonal multiple access (NOMA) technique, which allows multiple users to share the same time-frequency resource element (RE), has been recognized as the potential multiple access technique to achieve higher SE in future fifth generation (5G) and beyond wireless networks [3]."]} +{"61808169|12029139": ["Motivated by the progress in the research on wireless power transfer (WPT) [13] and the fact that the radio frequency (RF) signal is the carrier of both information and energy, an advanced technology namely simultaneous wireless information and power transfer (SWIPT) has been identified to meet the demanding requirements in future wireless networks in [14].", "viewed as a potential energy-efficient solution for 5G and beyond wireless networks [13] and a great deal of research has been carried out on the application of SWIPT technology in different systems, including OFDMA systems [16], multipleinput single-output (MISO) systems [17], [18], multiple-input multiple-output (MIMO) systems [19], heterogenous cellular", "Motivated by the progress in the research on wireless power transfer (WPT) [13] and the fact that the radio frequency (RF) signal is the carrier of both information and energy, an advanced technology namely simultaneous wireless information and power"]} +{"86819086|49316045": ["iterative-based detection methods [10], which dissatisfy the low latency requirement of tactile IoT, we apply a linear constraint to derive linear spreading signatures for grant-free NOMA, where all modulation symbols of a user have the same spreading signature.", "To solve this challenge, grant-free nonorthogonal multiple access (NOMA), which exploits the joint benefit of grantless access mechanism and nonorthogonal signal superposition, has been considered to simultaneously realize low latency and high-efficient massive access in tactile IoT [10]\u2013[12]."]} +{"69388964|22221919": ["Another variation in power domain NOMA is the introduction of cognitive radio (CR) concept [13, 14]."]} +{"11608218|17423404": ["Following [11, 29, 30], the channel between each MTC device and the BS is modeled by path loss, shadowing and small scale fading.", "A comparison between NOMA and OMA has been provided in [10, 11].", "In uplink NOMA multiple devices simultaneously perform transmission in a shared radio resource; therefore, their transmissions are overlapping [9, 11, 25]."]} +{"11608218|9862516": ["There are several approaches to mitigate the multi-path effect, such as time reversal (TR) strategy [31, 32], which has been recently studied for M2M communications as an effective strategy to focus signal waves in both time and space domains; thus improving system throughput and energy ef\ufb01ciency.", "These two assumptions can be well satis\ufb01ed for \ufb01xed-location MTC applications [31]."]} +{"69877765|22221919": ["Recently, based on the successive interference cancelation (SIC) [3] and the far near effect, it has been proved that the multicarrier power domain nonorthogonal multiple access (NOMA) can provide more connectivity opportunities and provide higher spectrum efficiency (SE) of the networks than the conventional orthogonal frequency division multiple access (OFDMA) in downlink transmissions [4].", "Previously, CRNOMA was only proposed to guarantee the quality of service (QoS) of all the users in power allocation schemes [4], [5],"]} +{"53280713|22221919": ["This power domain feature provides rich opportunities for NOMA to support massive connectivity and meet the users\u2019 diverse quality of service (QoS) requirements [2]."]} +{"52192001|24785273": []} +{"52192001|22221919": ["Interested readers may refer to [23]\u2013[27] for the detailed literature survey."]} +{"29854968|512386": ["Furthermore, as mentioned before, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7].", "In this letter, we consider the more practical scenario that the active user sets can be changed in several continuous time slots, and propose a low-complexity dynamic compressive sensing (DCS)-based MUD [7] for NOMA to jointly realize user activity and data detection.", "In practical scenarios, although users can randomly access or leave the system, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7].", "Specifically, although users can randomly access or leave the system, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7]."]} +{"3499915|7366975": ["for which not even the capacity is known [31]."]} diff --git a/edge/graph_204630495.jsonl b/edge/graph_204630495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204659641.jsonl b/edge/graph_204659641.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22018515f268b2cee1fc3f7871c368decf5a7c18 --- /dev/null +++ b/edge/graph_204659641.jsonl @@ -0,0 +1,6 @@ +{"2147973|16534280": ["Information Retrieval researchers recognise that techniques to answer questions from document-sets have wide applications, beyond education; see for example the overview of question-answering in restricted domains (Molla and Vicedo, 2007)."]} +{"8379583|393948": ["\u2026achieved in recent years using machine learning \u2217 The \ufb01rst two authors contributed equally. methods, more speci\ufb01cally with neural architectures [1]; however, it is worth noting that many of the most successful approaches, in particular convolutional and recurrent neural networks, were known for\u2026"]} +{"18380963|6337591": ["Early work on modeling dialogues is either rule-based (Weizenbaum, 1966) or learning-based (Litman et al., 2000; Schatzmann et al., 2006; Williams and Young, 2007)."]} +{"7356547|6337591": ["Previous works in this direction mainly focus on either rule-based or learning-based methods (Williams and Young, 2007; Schatzmann et al., 2006; Misu et al., 2012; Litman et al., 2000)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"1708582|17464562": []} diff --git a/edge/graph_204701538.jsonl b/edge/graph_204701538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b7e6cdb1aec217b9e97440a900c46e2611bb4cf --- /dev/null +++ b/edge/graph_204701538.jsonl @@ -0,0 +1,6 @@ +{"53243990|22084305": []} +{"44344755|10996225": []} +{"50784306|204701538": []} +{"18567112|6670217": ["art considering the popular mobile OS platforms [31], [32]."]} +{"24899633|18567112": ["Concerning Android malware detection, several different approaches have been proposed in the recent past, due to the rising trend of malware spreading: two recent surveys in [27,74] summarize the main techniques for securing the Android platform."]} +{"37907877|9959859": ["This ransomware can be serious security threat to cloud computing [11] as it becomes the basic infrastructure of information system."]} diff --git a/edge/graph_204734381.jsonl b/edge/graph_204734381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf3162df916fba2a9421db513c7fad3256e86522 --- /dev/null +++ b/edge/graph_204734381.jsonl @@ -0,0 +1,26 @@ +{"2999391|7366975": []} +{"5822743|7366975": ["01010 was sent, the receiver would obtain 10011 if the third, sixth, and eighth bits were deleted, but would obtain 10?01?1? if the bits were erased. The capacity of this channel remains unknown. See [10, 12] for recent overviews. In this work, we consider the zero-error capacity for the related setting where up to pnbits can be deleted. For brevity, we refer to the this variation as the adversarial delet"]} +{"8309272|7366975": ["The problem of communicating over the binary deletion channel, in which each transmitted bit is deleted independently with a fixed probability p, has been a subject of much study (see the excellent survey by Mitzenmacher [14] for more background and references).", "with a fixed probability p, has been a subject of much study (see the excellent survey by Mitzenmacher [23] for more background and references)."]} +{"2121364|7366975": ["To quote from Mitzenmacher\u2019s survey [28]: \u201c[C]hannels with synchronization errors, including both insertions and deletions as well as more general timing errors, are simply not adequately understood by current theory."]} +{"56178828|7366975": ["Deterministic document exchange solutions are furthermore related to error correcting codes for insertions and deletions, another topic that has been studied quite intensely recently [12], [13], [14], [15], [16], [17], [18], [19] (see also these surveys [20], [21])."]} +{"9389130|7366975": ["The main idea of the paper is to use auxiliary sequences which indicate the positions (in the output sequence) where runs were deleted and inserted."]} +{"34604686|7366975": ["Until now, only little is known about the insertion/deletion channels (either the capacity or coding) [2]\u2013[7].", "For a general survey on channels with synchronization errors, the reader is referred to [7]."]} +{"202734250|7366975": ["[28] and Mitzenmacher [29] for a more extensive background, and focus here on works related to the main thrust of this paper, namely the maximal tolerable fraction of worst-cast deletions or insertions for uniqueand list-decodable code families with non-vanishing rate."]} +{"29150624|7366975": ["For a more comprehensive overview, the survey by Mitzenmacher [20] elucidates critical problems, useful techniques and further applications.", "The survey by Mitzenmacher [18] elucidates critical problems, useful techniques and further applications in a more comprehensive way."]} +{"199543260|204734381": []} +{"13922727|7366975": ["Supported in part by NSF grants CCF-1422045 and CCF-0963975."]} +{"123010239|7366975": []} +{"7784458|7366975": ["We refer to the 2002 survey by Sloan [26] on single-deletion codes, the 2009 survey by Mitzenmacher [22] on codes for random deletions and the most general 2010 survey by Mercier et al. [21] for the extensive work done around codes for synchronization errors and only mention the results most closely related to Theorem 1.1 here: Insdel codes were \ufb01rst considered by Levenshtein [18] and since then many bounds and constructions for such codes have been given.", "We refer to the 2002 survey by Sloan [30] on single-deletion codes, the 2009 survey by Mitzenmacher [26] on codes for random deletions and the most general 2010 survey by Mercier et al.", "\u201d or as Mitzenmacher puts in his survey [26]: \u201cChannels with synchronization errors, including both in-", "Our thesis here today is that the synchronization problem is not a mere engineering detail, but a fundamental communication problem as basic as detection itself!\u201d however as noted in a comprehensive survey [21] in 2010: \u201cUnfortunately, although it has early and often been conjectured that error-correcting codes capable of correcting timing errors could improve the overall performance of communication systems, they are quite challenging to design, which partly explains why a large collection of synchronization techniques not based on coding were developed and implemented over the years.\u201d or as Mitzenmacher puts in his survey [22]: \u201cChannels with synchronization errors, including both insertions and deletions as well as more general timing errors, are simply not adequately understood by current theory."]} +{"108312038|7366975": ["It is also closely related to the algorithmic trace reconstruction problem that, in turn, is of significance to real-world applications ranging from sensor networks to computational biology [35].", "Much of the major known results on the subject as well as the significance to theoretical computer science are discussed in Mitzenmacher\u2019s excellent survey [35]."]} +{"14043919|7366975": ["It should be noted that lower bounding the capacity of the geometric duplication channel using an equivalent memoryless block channel was pioneered by Mitzenmacher [27], although he incorrectly concluded that the capacity converged to zero as the probability of duplication error approached one.", "The approach was extended further by Drinea and Mitzenmacher [21] using an even stronger definition of typical sequence and a more powerful decoding technique that succeeds when the received sequence is a typical output of only one codeword .", "It should be noted that deriving capacity lower bounds for the geometric duplication channel using the Jimbo\u2013Kunisawa algorithm was initially done by Mitzenmacher [27] .", "Our lower bound for improves upon the lower bound for from Drinea and Mitzenmacher [21] (also shown in Fig.", "An overview of capacity results for deletion channels was recently written by Mitzenmacher [15].", "Mitzenmacher and Drinea [22] derived a correspondence between the deletion channel and a Poisson-repeat channel that replaces each input bit by a random number of bits obeying a Poisson distribution.", "Mitzenmacher [27] also studied channels with duplication (or repetition) errors.", "Using memoryless block channels and Theorem 17 to derive capacity upper bounds for channels with weak synchronization errors was previously done by Diggavi et al. [24], Mitzenmacher [27] and others.", "Drinea and Mitzenmacher [20] derived improved lower bounds for the deletion channel by extending the framework of Diggavi and Grossglauser."]} +{"1839340|7366975": []} +{"195571591|7366975": []} +{"170113|7366975": ["We compare with the best known numerical lower bounds [2] and upper bounds [11], [13]."]} +{"31340576|7366975": ["Estimating the capacity of channels corrupted by synchronization errors is a very challenging problem, and a recent survey on the subject was written by Mitzenmacher [109].", "The work is mainly of theoretical interest due to the fact that the computational complexity of the decoding algorithm is in nO(1/\n2) log q. Inspired by Mitzenmacher\u2019s approach, Metzner [48] proposed to encode k information packets of size r 2n\u2212 k into a codeword of n packets using an (n, k) linear code with minimum distance d.", "Mitzenmacher [47] developed capacity-approaching lowdensity parity-check codes for deletion channels with q-ary alphabets.", "Liu and Mitzenmacher [71] also used single-deletion-correcting codes in a concatenated fashion so they can correct one deletion error per block."]} +{"541234|7366975": ["(Indeed, the standard deletion channel with k = 1 is quite challenging; see [1], [2] for related surveys.)"]} +{"14860524|7366975": ["Capacity of binary deletion channels has received signi\ufb01cant attention in the existing literature, see [10] and references therein."]} +{"11590242|7366975": [", channels in which characters of the transmitted codeword may be deleted, [3]\u2013[7], [9]."]} +{"11389897|7366975": ["Several capacity bounds have been developed over the last few years, following alternative approaches, and are surveyed in [1].", "Computing or providing systematic approximations to its capacity is one of the outstanding problems in information theory [1]."]} +{"12165865|7366975": ["The resulting lower bounds are consistently better than those in [3], [5], [6], [14] exactly because the bounds in [3], [5], [6], [14] are based on coding/decoding techniques resulting from only first-order Markov inputs.", "Because of limited space, we refer the reader to extremely good surveys of known methods in Mitzenmacher [3] and Iyengar, et al. [4]."]} +{"860932|7366975": []} +{"53044894|7366975": ["This kind of insertion errors is also referred as repetition errors [6] or sticky insertions in a sticky channel [6], [17], [18]."]} diff --git a/edge/graph_204734613.jsonl b/edge/graph_204734613.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3dd63081fab5791f4ac3aca3dc571bd29c4201df --- /dev/null +++ b/edge/graph_204734613.jsonl @@ -0,0 +1,15 @@ +{"4043411|8953108": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"3320537|393948": ["Neural networks learn features directly from the underlying data in a hierarchical fashion, in contrast to the statistical techniques such as SVM, which rely on hand crafted features [27]."]} +{"207115534|38129422": ["Brain tumor is a growth of abnormal cells inside the brain [3]."]} +{"207115534|8953108": ["One of the most common features used for brain tumor segmentation is the image intensity since there is an assumption that different textures have different gray levels [37]."]} +{"247457|393948": []} +{"52009562|2088679": []} +{"33355575|16988556": ["For MR image enhancement, median \ufb01lter and its variants, Gaussian\ufb01lters,low-pass\ufb01lter,gradient-basedmethods,Pre-witt edge-\ufb01nding \ufb01lters, etc. are mostly in practice [6]."]} diff --git a/edge/graph_20473693.jsonl b/edge/graph_20473693.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f559f2c538dd55c0c4ee15690f334dd39ab65637 --- /dev/null +++ b/edge/graph_20473693.jsonl @@ -0,0 +1,17 @@ +{"8742419|3348390": ["A recent publication conducted a depth survey on contextaware systems oriented to the IoT, where a large number of solutions are analyzed by considering different topics [3].", "related work in this context, which is not included in the survey presented in [3], is CoCA [10].", "In such a context, \u201csemantic-oriented\u201d IoT visions are available in the literature to provide modeling solutions for things description, reasoning over data generated by the IoT, semantic execution environments, and architectures that accommodate IoT requirements [3], [4].", "This fact has been recently identified in [3]."]} +{"13918777|16335158": []} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"15312937|9240891": ["Grandison and J\u00f8sang [30], [31] believe that both providers and consumersmust trust each other before decisions to consume or provide services in the electronic market.", "So, it is a significant question for the MAMs and IAMs, how to choose a trustworthy app when users confused with a huge number of apps appear in the marketplaces? Grandison and J\u00f8sang [30], [31] believe that both providers and consumersmust trust each other before decisions to consume or provide services in the electronic market."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"62139872|1230643": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_204739441.jsonl b/edge/graph_204739441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..970451028af15a768bf4231b8674a44d0f354906 --- /dev/null +++ b/edge/graph_204739441.jsonl @@ -0,0 +1,2 @@ +{"11264349|189201": []} +{"3630283|11407374": []} diff --git a/edge/graph_204743865.jsonl b/edge/graph_204743865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4df73848a51c3604034eb7b2f6342e6a52646832 --- /dev/null +++ b/edge/graph_204743865.jsonl @@ -0,0 +1,47 @@ +{"56177943|2088679": ["Recent years have witnessed a substantial growth in the number of deep learning methods for medical image segmentation (Litjens et al., 2017; Shen et al., 2017; Dolz et al., 2018; Ker et al., 2018)."]} +{"67892269|2088679": ["According to a recent survey (2), the number of papers grew rapidly in 2015 and 2016."]} +{"195888087|2088679": ["\u2026segmentation techniques based on deep convolutional neural networks (CNNs) have been developed for various medical imaging modalities, such as MRI, CT and X-ray, showing promising results and overcoming the limitations of conventional segmentation Figure 1: Our proposed loss function methods [17]."]} +{"67856738|4903005": ["The lack of the labeled data motivates the study of methods that can be trained with limited supervision, such as semisupervised learning [4]\u2013[6], weakly supervised learning [7]\u2013[9], and unsupervised domain adaptation [10]\u2013[12]."]} +{"21699394|2088679": []} +{"49397136|10267045": ["prior knowledge about the structure of target object in the objective function to regularize plausible solutions with anatomically meaningful constraints have been widely leveraged to obtain more reliable delineations [10,17]."]} +{"49397136|2616070": ["prior knowledge about the structure of target object in the objective function to regularize plausible solutions with anatomically meaningful constraints have been widely leveraged to obtain more reliable delineations [10,17]."]} +{"6688863|8574504": ["A detailed survey of deep neural network based architectures for semantic segmentation can be found in [6]."]} +{"201058567|2088679": []} +{"52091450|2088679": ["\u2026state-of-the-art method for many tasks including classi\ufb01-cation , localisation and segmentation (Bai et al., 2017; Kamnitsas et al., 2017, 2018; Lee et al., 2015; Litjens et al., 2017; Long et al., 2015; Ronneberger et al., 2015; Roth et al., 2017, 2018; Xie and Tu, 2015; Zaharchuk et al., 2018).", "CNNs are now the state-of-the-art method for many tasks including classification , localisation and segmentation (Bai et al., 2017; Kamnitsas et al., 2017, 2018; Lee et al., 2015; Litjens et al., 2017; Long et al., 2015; Ronneberger et al., 2015; Roth et al., 2017, 2018; Xie and Tu, 2015; Zaharchuk et al., 2018).", "An extensive list of applications can be found in (Litjens et al., 2017; Zaharchuk et al., 2018)."]} +{"1033682|174797842": []} +{"37149|6280485": ["In 2015/16 year over 22.5 million X-ray images were requested in UK\u2019s public medical sector, constituting over 55% of the total number of medical images and dominating all other imaging modalities such as computed tomography (CT) scan (4.5M) and MRI (3.1M) [8]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"102352559|3558190": []} +{"102352559|22163846": ["th unreliable connections, and compressed models would improve the overall process. Multiple techniques, like parameter pruning, low-rank factorization, knowledge distillation and weight quantization [8], have been proposed to compress the size of F-CNNs without compromising their performance. Specically, weight quantization to binary [9] and ternary values [10], [11], [12] has been among the most p"]} +{"169033851|2088679": ["In [49], many other sections of medical image analysis like classification, detection, and registration is also covered which makes it medical image analysis review not a specific medical image segmentation survey.", "There are a few recent survey articles on medical image segmentation, such as [49] and [67]."]} +{"44093271|2088679": []} +{"184487925|52305483": ["Following by the seminal work by Goodfellow et.al. in [7] a great deal of research has been done on adversarial learning [8,10,14,15]."]} +{"53432181|3654323": ["We can divide the literature on DDA as follows: (i) methods based on building domain-invariant feature spaces through auto-encoders (Ghifary et al., 2016), adversarial training (Ganin et al., 2016), GANs (Hoffman et al., 2017; Sankaranarayanan et al., 2018), or disentanglement strategies (Liu et\u2026", "Deep Domain Adaptation (DDA), which is a \ufb01 eld unrelated in essence to medical imaging, has been widely studied in the recent years (Wang & Deng, 2018)."]} +{"53432181|2088679": ["Deep learning methods for medical imaging has become a popular research focus in recent years (Litjens et al., 2017).", "A recent survey by Litjens et al. (2017) analyzed more than 300 medical imaging studies, and found that deep neural networks have become pervasive throughout the \ufb01 eld of medical imaging, with a signi \ufb01 cant increase in the number of publications between 2015 and 2016."]} +{"13687155|2088679": []} +{"13687155|10267045": ["initialized and optimized to minimize a target energy functional with data and regularization terms [20]\u2013[24]."]} +{"13687155|6863252": []} +{"202774956|37099732": ["[5] gave an overview in deep CNN for brain MRI analysis."]} +{"202774956|2088679": ["n method depends on the specic problem. There are also some other reviews on medical image analysis using deep learning. However, they don\u2019t focus on the fusion strategy. For example, Litjens et al. [44] reviewed the major deep learning concepts in medical image analysis. Bernal et al. [5] gave an overview in deep CNN for brain MRI analysis. In this paper, we focus on fusion methods of multi-modal me"]} +{"59235181|2088679": []} +{"52815664|9869210": []} +{"23538989|4583883": []} +{"128358660|2088679": ["CNN-based methods are relative new-comers to the field of medical image segmentation, but they have already proved to be highly versatile and effective [3], [25]."]} +{"8574504|9869210": ["Various semantic segmentation surveys already exist such as the works by Zhu et al. [12] and Thoma [13], which do a great work summarizing and classifying existing meth-ods, discussing datasets and metrics, and providing design choices for future research directions."]} +{"206594196|469744": ["Successful image segmentation techniques could facilitate a large group of applications such as image editing [17], augmented reality [3] and self-driving vehicles [22]."]} +{"201660427|204743865": [", Tajbakhsh et al. (2019a) and Ross et al.", "The surveys by Hesamian et al. (2019); Taghanaki et al. (2019) reviewed deep learning techniques suggested for medical image segmentation but with a particular focus on architectural advancements and training schemes."]} +{"201660427|199064408": []} +{"201660427|52305483": []} +{"201660427|4903005": ["(2018); Cheplygina et al. (2019) that broadly cover deep learning for general medical image analysis, from Hesamian et al.", "Cheplygina et al. (2019) reviewed semi-supervised, multi-instance learning, and transfer learning in medical image analysis, covering both", "(2018); Cheplygina et al. (2019) that broadly cover deep learning for general medical image analysis, from Hesamian et al. (2019) that focuses on architectural advancements for medical image segmentation, and from Zhang et al. (2019b) that investigates only the small sample size problem in medical image segmentation, and from the", "(2018); Cheplygina et al. (2019) that broadly cover deep learning for general medical image analysis, from Hesamian et al. (2019) that focuses on architectural advancements for medical image segmentation, and from Zhang et al."]} +{"201660427|11311635": ["Multi-task learning Zhang and Yang (2017) refers to the paradigm in which multiple tasks are derived from a single learned representation."]} +{"201660427|2088679": []} +{"67855790|21656238": ["Semantic segmentation algorithms are becoming increasingly general purpose and translatable to unseen tasks [2]."]} +{"92997069|3680335": ["1,10 However, in most cases, models are explored and evaluated using classification tasks on very large-scale datasets such as ImageNet, 1 where the outputs of the classification tasks are labels or probability values."]} +{"92997069|2088679": ["21 In addition, DL-based approaches are known as universal learning approaches, where a single model can be utilized efficiently in different modalities of medical imaging such as MRI, CT, and x-ray.", "21,22 Furthermore, a large number of papers have been published on segmentation tasks in different modalities of medical imaging.", "21,22 A DCNN-based brain tumor segmentation and detection method were proposed in Ref."]} +{"8559923|14122909": ["Secondly, typical factors in ultrasound, including signal dropout, speckle noise, acoustic shadow and low contrast against surrounding tissues, cause the ambiguity, poor visibility and long-span occlusion in prostate boundaries (Noble and Boukerroui 2006)."]} +{"21656238|31980349": []} +{"102353168|2088679": ["there have been considerable advancements in semantic image segmentation using convolutional neural networks (CNNs), which have been applied to interpretation tasks on both natural and medical images [13]. The improvements are mostly attributed to exploring new neural architectures (with varying depths, widths, and connectivity or topology), designing new types of components or layers, adopting new lo"]} +{"102353168|14076440": ["\ufb01cations included applying conventional image normalization techniques prior to feeding the image to a segmentation network, e.g., Haematoxylin and Eosin pre-processing [7], edge-preserving smoothing [17], and whitening transformation [11]. Other works generated variants of the input image to augment the training data by applying radiometric and spatial image transformations, e.g., rotation, color shi"]} +{"4816178|2088679": ["\u2026protocols/parameters/contrasts, especially in the MRI domain; \u2022 Data availability is also limited due to privacy/ethics concerns or regulations [24]; In this work, we propose a new simple pipeline with an end-to-end learning approach for fully automated spinal cord gray matter segmentation\u2026", "On a recent survey [24] that reviewed over 300 papers using Deep Learning techniques for medical image analysis, the authors found that Deep Learning techniques have spread throughout the entire \ufb01eld of medical image analysis, with a rapid increase in the number of published studies between the\u2026"]} +{"106407125|21656238": ["Guo et al. [18] provided a review of semantic segmentation approaches, i.e., region-based, FCN-based and weakly supervised approaches."]} +{"106407125|9869210": ["Martin Thoma [16] presented a taxonomy of segmentation algorithms and overview of completely automatic, passive, semantic segmentation algorithms."]} diff --git a/edge/graph_204744017.jsonl b/edge/graph_204744017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..579856ce4d66e96f487bf4c30d4ea8be56287a6a --- /dev/null +++ b/edge/graph_204744017.jsonl @@ -0,0 +1,32 @@ +{"713459|8363289": []} +{"890737|1932843": ["\u2026it will be useful to also de\ufb01ne the value function V \u03c0 ( x t , u t ) and advantage function A \u03c0 ( x t , u t ) of a given policy \u03c0 : (Deisenroth et al., 2013; Kober & Peters, 2012), two are particularly relevant for this work: iterative LQG (iLQG) (Li & Todorov, 2004) and Dyna-Q (Sutton, 1990).", "Model-free reinforcement learning (RL) has been successfully applied to a range of challenging problems (Kober & Peters, 2012; Deisenroth et al., 2013), and has recently been extended to handle large neural network policies and value functions (Mnih et al., 2015; Lillicrap et al., 2016; Wang et\u2026"]} +{"12680251|13709071": ["PALLOC: DRAM Bank-Aware Memory Allocator for Performance Isolation on Multicore Platforms.", "(2) How susceptible is the CNN inferencing task to contention in shared hardware resources (e.g., cache and DRAM) when multiple tasks/models are consolidated?", "These increases in inference times in the co-scheduled scenarios are expected because co-scheduled tasks on a multicore platform interfere with each other due to contention in the shared hardware resources, such as the shared cache and DRAM [9], [33].", "Specifically, shared cache space and DRAM bandwidth are the two most well-known sources of contention in multicore systems."]} +{"8760041|18374428": ["[44], we focus on mechanical models that are either forward or inverse models, without addressing all the other points listed above."]} +{"206741902|8445223": ["Interested readers can refer to [217] for a short survey of this recent practice and to [218] for a more general review of cloud approaches in robotics."]} +{"23700611|1229096": ["Consequently, designing a control policy by following the traditional model-plan-then-act approach [1], [4] becomes challenging, as it is dif\ufb01cult to adequately characterize the robot\u2019s interaction with the environment a priori ."]} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"64853900|1229096": ["Two recent reviews (29, 30) provide a clear overview of the state of the art in motion planning for autonomous cars."]} +{"64853900|2373140": []} +{"67247574|1708582": []} +{"112446|1932843": []} +{"85517967|204904177": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|204509231": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|186206717": ["Since the release, nuScenes has received strong interest from the AV community [90, 70, 50, 91, 9, 5, 68, 28, 49, 86, 89]."]} +{"85517967|53800586": ["As suggested in [28], more research is required on how to generalize to \u201ccomplex, cluttered and unseen environments\u201d."]} +{"12888763|393948": ["It has been shown that convnet representations trained on classification problems generalize well to other tasks [18, 17, 2, 6].", "Such \u2018transfer learning\u2019 has been demonstrated elsewhere for training classifiers [18, 17, 2], but here we demonstrate transfer learning from classification to the qualitatively different task of pose regression."]} +{"6414987|23566570": ["Recent research shows an increasing interest in use of machi ne learning algorithms for modeling surgical skills, workflow , and environment and integration of this knowledge into control and automation of surgical robots [13]."]} +{"18785146|8363289": []} +{"10242377|8533795": []} +{"114862052|15093118": ["For more information on conventional hand-crafted feature/cue based approaches, interested readers may refer to the following survey papers: [68,69] for lane line marking detection, [70] for road surface detection, [71,72] for vehicle detection and [73] for pedestrian detection."]} +{"6198785|15093118": ["The optical flow was also proposed to analyze road scenes [9], [118].", "The framework of vehicle tracking and behavior analysis [9].", "sure dynamics and motion characteristics and to predict and estimate the upcoming position of vehicles [9].", "Key developments on vehicle detection were summarized in [9] and [101].", "Haar features are sensitive to vertical, horizontal, and symmetric structures [9].", "Compared with Radar and LiDAR, the raw measurement of vision sensor is the light intensity [9].", "The vehicle detection methods can be categorized into appearance-based and motionbased [9]."]} +{"6198785|206739910": ["As the detection step is coupled with the feature extraction step, the choice of detection method depends on the features from the previous stage [63].", "Results for detection with these data sets and tracking are presented in [63] and [64]."]} +{"3681715|12127129": ["Estimating an ephemerality mask is closely related to background subtraction approaches [2], [3], which build statistics over background appearance based on training data from a static camera to identify discrepancies in live images."]} +{"1815857|8760041": ["Learned models are commonly modeled as GPs, Locally Weighted Projection Regression, or Support Vector Regression (Sigaud et al., 2011)."]} +{"206852927|18599847": ["are challenging for machine learning [8], but well-studied by the sensor fusion community [9], [10].", "For this, the algorithm uses advanced sensor fusion techniques regarding latency and variance in time domain which are hard to compensate by learning based approaches [8]."]} +{"5539001|1932843": ["An overview of recent reinforcement learning methods in robotics can be found in a recent survey paper [15]."]} +{"23267374|6198785": ["Complementary to our survey, Zhu et al. (2017) provide an overview of environment perception for intelligent vehicles, focusing on lane detection, traffic sign/light recognition as well as vehicle tracking."]} +{"23267374|1877246": ["There is a variety of methods for dealing with this problem such as voxel hashing (Nie\u00dfner et al. (2013)) or a data adaptive discretization of the space in the form of a Delaunay triangulation (Labatut et al.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for urban reconstruction.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-\nmantics, facades and images, and finally blocks and cities."]} +{"23267374|206764452": []} diff --git a/edge/graph_204773029.jsonl b/edge/graph_204773029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63d0619dc80bc451c23365ec2c91d378334bc3a0 --- /dev/null +++ b/edge/graph_204773029.jsonl @@ -0,0 +1,13 @@ +{"206739717|206764452": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43]."]} +{"206739717|1029120": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43].", "easy task to separate pedestrians from background in an image or video sequences in the computer vision domain [38], and"]} +{"67111397|8363289": ["To facilitate the derivation, the discretetime state vector form of the offset model can be obtained by discretizing the models as addressed in equations (24) and (25) as"]} +{"51921181|9072047": ["By considering that T-S fuzzy modeling technique has been proved to be a powerful technique in dealing with the nonlinear challenges [22]\u2013[39], here T-S fuzzy modeling technique is applied to describe the nonlinearities in vehicle lateral dynamics.", "More recently, robust T-S fuzzy control techniques have shown the ability to deal with complex nonlinear systems as well as uncertainties and disturbances [22]\u2013[37], [39], [40].", "Based on \u201csector nonlinearity\u201d method [22], [23], [29], then the nonlinear functions S f (\u03b1 f ) and Sr (\u03b1r ) can be handled as: S f (\u03b1 f ) = M1 1 (\u03c11(t))S\u0304 f + M2 1 (\u03c11(t))S\u0303 f Sr (\u03b1r ) = M1 2 (\u03c12(t))S\u0304r + M2 2 (\u03c12(t))S\u0303r , (6) where \u03c11(t) = S f (\u03b1 f ) and \u03c12(t) = Sr (\u03b1r ) are the premise variables, and M1 1 (\u03c11(t)), M 2 1 (\u03c11(t)), M 1 2 (\u03c12(t)) and M2 2 (\u03c12(t)) are membership functions shown in Fig."]} +{"4802984|30189749": ["Due to space limitations, we refer the interested reader to the recent survey [200], that has summarized these e \ufb00 orts."]} +{"4802984|1229096": ["As a consequence, estimation, prediction, and learning techniques play a major role in this \ufb01eld [59].", "In the literature, path planning generally indicates the problem of planning future motion in the con\ufb01guration space of the vehicle, while trajectory planning indicates the search of a time-parametrized solution [59, 164].", "Optimal path and trajectory planning are both PSPACE-hard in their general formulations [59].", "These blocks also depend on the driving context, and their boundaries are quite blurred [59].", "Trajectory planning can be solved using variational methods in the time domain, or converting it to a path planning problem with a time dimension [59].", "Comprehensive reviews can be found in [164, 59]; here we only give a brief overview of the problems and the related computational techniques."]} +{"4802984|16049411": ["This problem has been extensively studied in the literature: we refer the interested reader to [75, 76, 77] for extensive literature reviews and to [78, 79] for systematic comparisons between existing approaches."]} +{"4802984|8363289": []} +{"3765694|5188711": ["The Kalman \ufb01lter (KF) was an optimal recursive estimator of the state of an uncertain dynamic system proposed by Rudolf Emil Kalman [25] and has played a key role in many industrial applications including the estimation of vehicle states."]} +{"3001881|9072047": []} +{"121789731|5755403": []} +{"109938265|2958701": []} +{"115267537|13210924": []} diff --git a/edge/graph_204773753.jsonl b/edge/graph_204773753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67f4ca3fa2780a70c09fa376c0af2f67fa536426 --- /dev/null +++ b/edge/graph_204773753.jsonl @@ -0,0 +1,2 @@ +{"56147871|204773753": []} +{"155575564|10817088": []} diff --git a/edge/graph_204781336.jsonl b/edge/graph_204781336.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94c54789f62d6c9515022971011c69aff87a01ac --- /dev/null +++ b/edge/graph_204781336.jsonl @@ -0,0 +1,6 @@ +{"338536|1204089": ["\u2026vector machine was chosen for this two-class classification, due to its effectiveness already shown in diverse areas of studies (Chu & Wang, 2005; Filho et al., 2015), and the radial basis function kernel was adopted for its flexibility, stability and general popularity (Celebi et al., 2007).", "The support vector machine was chosen for this two-class classification, due to its effectiveness already shown in diverse areas of studies (Chu & Wang, 2005; Filho et al., 2015), and the radial basis function kernel was adopted for its flexibility, stability and general popularity (Celebi et al."]} +{"338536|14047190": ["Many mature algorithms have been proposed for the classification step, such as support vector machines (SVMs) and artificial neural networks (ANNs) (Kulkarni et al., 1998; Hastie et al., 2009); however, their performances rely on the features from the second step."]} +{"28012712|8983048": ["In the literature, several reviews on image registration methods can be found: overall image registration in Brown (1992), Salvi et al. (2007), Wyawahare et al. (2009), Zitova\u00b4 and Flusser (2003), medical image registration in general (Elsen et al. 1993; Maintz and Viergever 1998; Bronzino 2000;\u2026"]} +{"28012712|206051485": ["In the literature, several reviews on image registration methods can be found: overall image registration in (Brown, 1992; Salvi et al., 2007; Wyawahare et al., 2009; Zitov\u00e1 and Flusser, 2003), medical image registration in general (Bronzino, 2000; Elsen et al."]} +{"28012712|7861381": ["TPS is an interpolation function that minimises the bending energy (Holden 2008).", "(2004)andareviewinHolden(2008)."]} +{"29533350|16145478": []} diff --git a/edge/graph_204788690.jsonl b/edge/graph_204788690.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204788801.jsonl b/edge/graph_204788801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8eb706acf23ce379e31dc8c7e687cd80d537063 --- /dev/null +++ b/edge/graph_204788801.jsonl @@ -0,0 +1,2 @@ +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} diff --git a/edge/graph_204800616.jsonl b/edge/graph_204800616.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b8cd95a97fdfb503098d147b260d4038ad7c42d --- /dev/null +++ b/edge/graph_204800616.jsonl @@ -0,0 +1,40 @@ +{"49418885|1932843": []} +{"49418885|393948": ["For this reason, the deep learning approach can be considered as a kind of representation learning algorithms [3].", "This key aspect of deep learning architectures is led to progress towards those algorithms that are the goal Artificial Intelligence (AI), understating the world around independent of expert knowledge and interference [3]."]} +{"49418885|1708582": ["Reinforcement Learning [17, 39] is a branch of machine learning in which an agent learns from interacting with an environment.", "Reinforcement Learning (RL) [17, 39] is a branch of machine learning in which an agent learns from interacting with an environment."]} +{"22926573|14843594": ["Here again we encounter a huge variety of strategies, including Thompson sampling, information gain, probability of improvement, expected improvement, upper confidence bounds (Shahriari et al., 2016).", "Bayesian optimization is one of the most popular black-box optimization methods (Brochu et al., 2009; Snoek et al., 2012; Shahriari et al., 2016).", "The model can be a Beta-Bernoulli bandit, a random forest, a Bayesian neural network, or a Gaussian process (GP) (Shahriari et al., 2016).", "In other words, we can only observe the function f through unbiased noisy point-wise observations y.\nBayesian optimization is one of the most popular black-box optimization methods (Brochu et al., 2009; Snoek et al., 2012; Shahriari et al., 2016)."]} +{"204897723|15929566": ["There have been several breakthroughs related to reinforcement learning performance in recent years [4]."]} +{"1391742|115456": ["As the scope of this paper is not to give a review of RTS AI research, we refer the reader to these surveys about existing research on RTS and StarCraft AI [16, 17].", "Real-time strategy (RTS) games have historically been a domain of interest of the planning and decision making research communities [5, 2, 6, 16, 17]."]} +{"1391742|5014732": ["As the scope of this paper is not to give a review of RTS AI research, we refer the reader to these surveys about existing research on RTS and StarCraft AI [16, 17].", "Real-time strategy (RTS) games have historically been a domain of interest of the planning and decision making research communities [5, 2, 6, 16, 17].", "We propose a bridge between StarCraft: Brood War, an RTS game with an active AI research community and annual AI competitions [16, 6, 1], and Lua, with examples in Torch [9] (a machine learning library)."]} +{"37941741|4884302": ["[2]."]} +{"37941741|9316331": ["Deep learning is also far from the only AI method that has applications in games, other prominent methods include Monte Carlo Tree Search [12] and evolutionary computation [85], [66]."]} +{"196200552|1452734": []} +{"3212631|3113396": ["Baarslag et al. (2016) provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e.g. cost, size, and colour of a car) in an exchange.", "\u2026research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot\u2026", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "[21] for a detailed description of many domain-specific methods).", "Learning the utility function, or preferences, of other agents is also a major line of research in automated negotiation agents (see Baarslag et al. (2016) for a detailed description of many domain-speci\ufb01c methods).", "[21] provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e."]} +{"3212631|7681233": ["This question has been addressed extensively by researchers in behavioural game theory and experimental psychology (Camerer et al., 2015; Goodie et al., 2012; Wright and Leyton-Brown, 2010; Yoshida et al., 2008; Camerer et al., 2004; Hedden and Zhang, 2002)."]} +{"3212631|9316331": []} +{"3212631|10725980": ["\u2026other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman\u2026", "For example, Southey et al. (2005) maintain Gaussian beliefs over the continuous parameters of a speci\ufb01ed player function for Poker (cf. Table 1 in their paper).", "Implicit modelling based on expert algorithms has been shown to be e \ufb00 ective in variants of Poker (Bard et al., 2013; Hoehn et al., 2005).", "However, as can be seen in Table 2, relatively little work exists on the problem of learning models of agent behaviours (i.e. policy reconstruction) under partial observability conditions, with most e \ufb00 orts focusing on extensive form games with incomplete information (e.g. Poker).", "The idea of monitoring conditional action frequencies of the modelled agents has also been used in the context of extensive form games with imperfect information, such as Poker (Mealing and Shapiro, 2017; Ganzfried and Sandholm, 2011; Southey et al., 2005; Billings et al., 2004).", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "Rubin and Watson [232] survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "The domain of Poker added the problem of partial observability of environment states, since no player can see the private cards of other players.", "Rubin and Watson (2011) survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot interaction (Lasota et al., 2014), commercial video games (Bakkes et al., 2012), trust and reputation (Ramchurn et al., 2004), and multiagent learning (Stone and Veloso, 2000)."]} +{"3212631|14441987": ["Many important applications are characterised by such openness, such as ad-hoc wireless networks [231] and web-based systems for collaborative computing [198].", "Many important applications are characterised by such openness, such as ad-hoc wireless networks (Royer and Toh, 1999) and web-based systems for collaborative computing (Miorandi et al., 2014)."]} +{"3212631|13171013": ["In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning (Hernandez-Leal et al., 2017; Bloembergen et al., 2015; Tuyls and Weiss, 2012; Busoniu et al., 2008; Panait and Luke, 2005; Alonso et al., 2001; Stone and Veloso, 2000; Sen and Weiss, 1999).", "In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning [138,41,269, 55,213,15,257,241]."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"12058049|1230643": ["T HE past decade has seen a large body of work aimed at collecting information using sensor networks, with a firm belief that this information will bring dramatic benefits (see [1]\u2013[3] for comprehensive surveys).", "For example, [1] envisioned the use of sensor networks for warehouse management but did not go beyond inventory monitoring."]} +{"1160900|9316331": [", Monte-Carlo Tree Search (MCTS) [7, 30, 25]) and Self-Play, in which at one time step, a single environment might emit multiple states processed by multiple models, or one-to-many.", "We can also incorporate forwardplanning methods (e.g., Monte-Carlo Tree Search (MCTS) [7, 30, 25]) and Self-Play, in which at one time step, a single environment might emit multiple states processed by multiple models, or one-to-many.", "Rooted at the current game state, MCTS builds a game tree that is biased towards paths with high win rate.", "Also, MCTS runs much slower (2-3sec per move) than the trained RL AI (\u2264 1msec per move).", "Monte-Carlo Tree Search (MCTS) can be used for planning when complete information about the game is known.", "As shown in Tbl. 7, MCTS achieves a comparable win rate to models trained with RL. Note that the win rates of the two methods are not directly comparable, since RL methods have no knowledge of game dynamics, and its state knowledge is reduced by\nthe limits introduced by the fog-of-war."]} +{"2318849|70923": ["A very useful survey which classi\ufb01es and reviews these and other methodologies has also appeared [16]."]} +{"6652458|1708582": ["\u2026applications to large-scale problems, such as board games (Tesauro, 1994), dispatch problems (Crites & Barto, 1996; Zhang & Dietterich , 1996; Singh & Bertsekas, 1997), and robot navigation (Mataric, 1994) have been reported (see, e.g., Kaelbling, Littman, & Moore, 1996, and Sutton &\u2026"]} +{"18576331|8363289": []} +{"1033682|174797842": []} +{"28808621|115456": ["[21] and Robertson & Watson [25] for an overview.", "We recommend the surveys by Ontanon et al. [22] and Robertson & Watson [26] for an overview."]} +{"28808621|5014732": ["[21] and Robertson & Watson [25] for an overview."]} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} +{"9173144|70923": ["There already exist some proposals for agent-oriented software development like [3,27,28,31,41,46,48]."]} +{"13975932|6952653": []} +{"1708582|17464562": []} diff --git a/edge/graph_204800758.jsonl b/edge/graph_204800758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d20096f1984079c0753afaed815c2038d2901099 --- /dev/null +++ b/edge/graph_204800758.jsonl @@ -0,0 +1,13 @@ +{"3349870|15782139": ["\u2026in the same style as a\n10At 600dpi, a glyph is typically around 50 pixels wide, so a walk can travel around 5 to 10 characters depending on ligatures, suggesting that classification utilizes entire words, a result consistent with the handwriting recognition literature [Plamondon and Srihari 2000].", "10At 600dpi, a glyph is typically around 50 pixels wide, so a walk can travel around 5\u221210 characters depending on ligatures, suggesting that classification utilizes entire words, a result consistent with the handwriting recognition literature [Plamondon and Srihari 2000].", "The whole field of handwriting recognition [Plamondon and Srihari 2000] works toward this goal."]} +{"52097748|10198276": ["Driven by these phenomena, in the last decade, a large number of methods have been proposed for forgery detection and localization or camera identification [1], [2], [3]."]} +{"26962923|3493224": ["in [5] present a complete survey with the representative work in the currency security features."]} +{"4468868|2762290": ["Apart from required preprocessing operations, the initial step of most OCR systems is \u201cdissection\u201d \u2013 a decomposition of image content into smaller meaningful segments (e. g., text paragraphs, tables, lines, or words)."]} +{"21092870|3493224": ["Even though technology has greatly advanced in the last decade or so, overcoming the creation of counterfeit currency \u201cremains a distant future\u201d [2].", "The algorithm is able to find weak edges by marking points as edges if their amplitude is higher than their neighbors [2].", "In order to control and minimize the flow of counterfeit currency in economies, software dealing with currency notes recognition is used [2].", "The third category consists of genuine features that result from the manufacturing process and the interaction of raw materials, which can only be detected by forensic examiners [2].", "Such factors are abused by counterfeiters by intentionally damaging the forged notes and covering up suspicious areas of the notes [2].", "The strength of societies with regards to trading with other societies depends highly on the value held by their currency [2].", "The amount of circulation of counterfeit money can threaten the reliability of state currency at any time, which in return has an impact on the stability and value of currency [2]."]} +{"8661252|10198276": ["In recent years, a number of surveys of the field have attempted to organize the state-of-the-art and the major challenges [46] [6] [49]."]} +{"17543559|18144244": ["Although digital watermarking can be used as a tool to provide authenticity to image, like [1,2], it is a fact that most of images that are captured today do not contain digital watermarks."]} +{"32096248|10198276": ["In order to restore faith in digital photography, in the last decade, a considerable number of works have addressed the problem of determining origin and authenticity of digital images [34, 35]."]} +{"7901560|55111989": ["In [6], the authors review the different image forgery detection techniques in image forensic literature."]} +{"34898996|3493224": ["presented a recent survey of currency security and forensics, [7]."]} +{"3281207|3493224": ["\u2026check of the input banknote by judging the genuineness of each feature based on the input denomination and input information (input side, direction, de\ufb02ection, inclination, etc.), combining such input data with IR, UV, and MG sensor data related to individual anti-counterfeiting features.", ". input.", "\u2026banknote by judging the genuineness of each feature based on the input denomination and input information (input side, direction, deflection, inclination, etc.), combining such input data with IR, UV, and MG sensor data related to individual anti-counterfeiting features Figure 14 illustrates an\u2026"]} +{"3324687|33238478": []} +{"24752322|10198276": ["In fact, the increasing need of authentication techniques for digital images without a priori information (like the presence of a watermark) has brought researchers to develop a number of forensic approaches designed to work passively and facing different forensic issues, like forgery detection, source identification, and computer generated versus natural content discrimination [1]\u2013[3]."]} diff --git a/edge/graph_204800987.jsonl b/edge/graph_204800987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32601e33451206dafbf7646ecd02c25b060cb661 --- /dev/null +++ b/edge/graph_204800987.jsonl @@ -0,0 +1,12 @@ +{"1479507|3951790": ["Recently, [24], [25] extend to cover work leveraging other side information, such as vertex attributes and/or vertex labels, to harness representation learning."]} +{"1479507|207372751": ["theway for awide range of network analytic tasks to be easily and efficiently tackled in the new vector space, such as node classification [10], [11], link prediction [12], [13], clustering [2], recommendation [14], [15], similarity search [16], and visualization [17].", "Readers can refer to the survey papers [12], [73] for the recent progress in this field."]} +{"1479507|239537": ["[80] surveys a range of methods used to visualize graphs from an information visualization perspective."]} +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} +{"196150698|20404279": ["Creswell et al.[30] provided an overview of GANs.", "Creswell et al. [31] provides an overview of GANs."]} +{"196150698|17473474": []} +{"70342378|1770055": ["Image captioning is an important task in visual data analytics, which aims to analyze the visual content of the input image and generate a caption that verbalizes the most salient contents of the image [1].", "[1] described most previous image captioning techniques."]} +{"53282572|20404279": ["Although there are a few review papers [8-10] on the extended models of GANs in the literature, some remarkable extensions of GANs published in the recent years are not included in !"]} diff --git a/edge/graph_204809825.jsonl b/edge/graph_204809825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1401c401b25fe1f71689c85a69c9de335dd22ac7 --- /dev/null +++ b/edge/graph_204809825.jsonl @@ -0,0 +1,5 @@ +{"155511477|5822166": []} +{"155511477|14038195": ["Each sub-problem is a single objective decision making problem that can be solved quite easily (Vaidya and Kumar, 2006; Ho, 2008; Ho et al., 2012; Subramanian and Ramanathan, 2012; Rajesha and Malligab, 2013)."]} +{"78088394|13780557": ["BDA also brings potential advantages for SM such as knowledge generation, KPI optimization, predication and feedback to product and process design (Nagorny et al. 2017)."]} +{"78088394|7329149": ["The development of information technologies, such as IoT (Perera et al., 2015), SOT (Demirkan et al."]} +{"78088394|17403085": []} diff --git a/edge/graph_204818293.jsonl b/edge/graph_204818293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..05272ed2ddf35c290a3e38c49c67476b1323ee33 --- /dev/null +++ b/edge/graph_204818293.jsonl @@ -0,0 +1,2 @@ +{"42734749|205007974": []} +{"3736983|14843594": ["Using thismodel, the algorithm balances exploitation with uncertainty reduction to guide exploration (37)."]} diff --git a/edge/graph_204818411.jsonl b/edge/graph_204818411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89ccc66f76f7723a9dc18a321180c08bd52a1f67 --- /dev/null +++ b/edge/graph_204818411.jsonl @@ -0,0 +1,38 @@ +{"33621679|3757239": ["As a result, vehicular edge networks is emerged with the development of VEC [2]."]} +{"33621679|36400013": ["Reputation query should be processed promptly to facilitate regular interactions [3]."]} +{"49680233|36250251": []} +{"52197736|36400013": ["Second, in order to prevent the distribution of forged messages, we design a reputation evaluation algorithm using the reputation score to represent the trustworthiness of messages [11]."]} +{"52197736|17934515": ["INTRODUCTION It is estimated that the number of registered vehicles will reach 2 billion within the next 10 to 20 years [1]."]} +{"28468662|14745481": []} +{"26960786|14290834": ["It is often regarded as the first concept of ABE [1, 18]."]} +{"5039874|3757239": ["work infrastructure [28]."]} +{"5039874|206578365": ["Therefore, the traditional cloud computing cannot efficiently support the IoE-based application services [10], and the edge computing arises at the historic moment [11], [12] to adapt to the era of IoE."]} +{"5039874|3767252": []} +{"5039874|3042864": ["Previous work such as micro data center, [19], [20], mobile cloud computing [13], [14], fog computing [15], [16], cloudlet [21], and cloud-sea computing [22] have been introduced to reduce the storage and computation load in cloud computing.", "At present, some related paradigms, such as mobile cloud computing [13], [14], fog computing [15]\u2013[18], which is the predecessor or counterparts of edge computing, can provide the efficient solutions for massive data processing, and meanwhile improve the user experience."]} +{"59345759|13916820": []} +{"1514400|2581766": []} +{"1514400|508178": ["Thus, many potential consumers are not sure whether they can trust the cloud providers in offering dependable services [41]."]} +{"1514400|5551880": []} +{"8052219|10346685": ["Secure token query techniques such as PIR [14, 29] and oblivious RAM [20, 31] can provide perfect security (even administrator cannot learn anything in theory), but their computational cost is impractically high."]} +{"17371228|10346685": ["Traditionally addressed within the line of work of Private Information Retrieval (PIR) [3], [4] (known to suffer from high computational complexity), access con\ufb01dentiality has been recently addressed by several researchers aiming at more practical solutions, limiting computational overhead and\u2026", "Current proposals are based on Private Information Retrieval (PIR) techniques or on dynamically allocated data structures, which change the physical location where data are stored at each access (e.g., [3], [4], [5], [6], [7], [13], [14], [15], [16], [17], [18]).", "PIR solutions are computationally expensive and do not protect content con\ufb01dentiality (e.g., [3], [4])."]} +{"2764511|2457428": [", group encryption [36], will incur significant overheads in processing and forwarding the contents."]} +{"85555002|51613885": []} +{"14791587|9240891": ["In the literature, trust is identified in different forms relating to: whether access is being provided to the trustor\u2019s resources, the trustee is providing a service, trust concerns authentication, or trust is being delegated [26]."]} +{"7834198|10346685": ["[6, 22, 25]) with the server to retrieve the documents."]} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"11168400|12017064": ["Subsequently, the significance of problems related to trust management, an integral part of cloud security, has grown rapidly [7]."]} +{"195732137|508178": ["We refer to [4], [5], [52] for more detailed survey on trust mechanisms for cloud", "To increase user\u2019s trust on Cloud Providers (CP), the reputation of the CPs can be used [4], [5] as it helps users to choose an appropriate CP."]} +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"201138291|6950376": []} +{"201138291|2294541": []} +{"201138291|18194234": []} +{"201138291|9240891": []} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"12921176|2294541": ["[25], and Pinyol and Sabater-Mir [26]."]} diff --git a/edge/graph_204819396.jsonl b/edge/graph_204819396.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22d09ad8d7c9e15880f086374618a5a467e90c17 --- /dev/null +++ b/edge/graph_204819396.jsonl @@ -0,0 +1,9 @@ +{"6495576|1805048": []} +{"614946|1805048": ["Since then, they have been used with considerable success for products such as books and movies, but have found surprisingly little application in recommending news articles, due to the unique challenges of the area."]} +{"15850185|239537": ["Studies on graph visualization are surveyed in [3, 10].", "Graph drawing techniques [3, 10] can help one better visualize graphs, but visualizing large graphs quickly becomes overwhelming."]} +{"14669869|1113420": []} +{"16880140|3913780": []} +{"12186076|1805048": ["As one can understand, a trusted server can collect all users' data and therefore perform classic recommender system algorithms such as Collaborative Filtering [33], which require multiple users' data.", "We consider one of the most widely used algorithms in recommender systems, Collaborative Filtering [32], which relies on the classic technique, matrix factorization ."]} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"206550568|191396": []} +{"11071309|1805048": ["Recent advances in cloud computing enable on-demand service delivery and promote the rapid growth of service markets, where more and more Web services are expected to become available."]} diff --git a/edge/graph_204823766.jsonl b/edge/graph_204823766.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f379d6e234703a1b2b2f00d446d4c4ca2cb469ae --- /dev/null +++ b/edge/graph_204823766.jsonl @@ -0,0 +1,8 @@ +{"17952524|627405": ["In regards to these, there are several methods of evaluating a review protocol which could be used, such as author's review, peer review, review by supervisor, review by external experts or test of protocol execution.", "The research question will define which primary studies include or exclude from review, it will define data that should be extracted from the reviewed literature."]} +{"7011282|17446703": ["Similar to the Salleh\u2019s study [15], we chose SCOPUS because of its reputation and the greater numbers of abstracts and citations indexed."]} +{"7011282|11139156": ["Grouping findings: we grouped similar factors together based on their semantics as defined in the primary studies."]} +{"14940719|17446703": []} +{"14940719|62667623": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114].", "5.1.1 The search string was generated by combining synonyms for system engineers (defined by Cruz et al. [113]) and synonyms for systematic review (defined by Biolchini et al. [37]) with a logical AND operator.", "5.4.1 The research sting was generated by combining synonyms for software engineers (defined by Cruz et al [113] and Beecham et al. [110]) and the BSE concept with the logical AND operator."]} +{"14940719|205435103": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114].", "5.4.1 The research sting was generated by combining synonyms for software engineers (defined by Cruz et al [113] and Beecham et al. [110]) and the BSE concept with the logical AND operator.", "For example, Beecham et al. [110] stated that software engineers are likely to be motivated according to individual concepts, i.e. their characteristics (e.g. their need for variety) and their internal controls (e.g. their personality).", "In these studies three human factors literature reviews were found, all of which related to motivation [110] [112] [111]."]} +{"14940719|627405": ["In order to verify the reliability of the extraction process a pilot extraction was conducted, where three researchers classified 12 randomly selected publications [41]."]} +{"14940719|15164501": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114]."]} diff --git a/edge/graph_204823910.jsonl b/edge/graph_204823910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bf65d432bd631102df660a321be70ff69121f32 --- /dev/null +++ b/edge/graph_204823910.jsonl @@ -0,0 +1,12 @@ +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"67750246|9766972": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"3697383|1421946": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"9543814|6742930": []} +{"6080903|2762484": ["An example of this can be found in Smartphones, micro-controllers like Arduino [3,6,7] or any other object capable of managing information [18].", "According to [3,18], Smart Objects can be classified in three dimensions, each of one corresponds to a type of intelligence."]} diff --git a/edge/graph_204823964.jsonl b/edge/graph_204823964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aac95fe79ff3eefa9414c10aa164df1c64df9030 --- /dev/null +++ b/edge/graph_204823964.jsonl @@ -0,0 +1,23 @@ +{"15287463|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"22947351|10355303": ["VISUAL object tracking is one of the fundamental problems in computer vision with numerous applications such as intelligent video surveillance, human computer interaction and autonomous driving [1], [2], [3], [4], to name a few.", "A comprehensive review on visual tracking can be found in [1], [2], [3], [4]."]} +{"1118174|10355303": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"1118174|17516538": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"1118174|14970359": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"1118174|7788290": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"823678|7788290": ["Tracking people, which raises many challenges due to the presence of large 3D, nonrigid motion, was extensively analyzed in [36], [1], [ 30 ], [73]."]} +{"6795574|5972227": ["Recently, a survey is presented for a wired-sensor network, focusing on the capability of methods to give a simple estimation for the position of the object [23]."]} +{"6795574|18546648": ["For instance, in shadow detection [48] pixel level evaluation is advised [49]."]} +{"206758376|10355303": []} +{"3710195|10355303": ["Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"3710195|17516538": ["Submitted by VOT Committee SAMF tracker is based on the idea of correlation filterbased trackers [15,27,26,5] with aim to improve the overall tracking capability.", "Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"3710195|14970359": ["Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"3710195|7788290": ["Visual tracking is diverse research area that has attracted significant attention over the last fifteen years [20, 48, 18, 27, 49, 79, 43]."]} +{"14284153|10355303": ["The significant activity in the field is also reflected in the abundance of review papers [23,43,22,29,44,65,40] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"14284153|17516538": ["The significant activity in the field is also reflected in the abundance of review papers [23,43,22,29,44,65,40] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"14284153|14970359": ["The significant activity in the field is also reflected in the abundance of review papers [23,44,22,29,45,65,41] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"14284153|7788290": []} +{"691081|192934": []} +{"4455970|10355303": ["Note that the maximum sequence length is 30, thus t \u2208 [1, 30].", "Object tracking is a common task in computer vision, with a long history spanning decades [50,30,44]."]} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"16695472|10355303": []} +{"49476505|10355303": ["We discuss the tracking methods that are most related to our work in this section, and refer the readers to a thorough review on object tracking survey [47] [24] and benchmark evaluations [38] [45]."]} diff --git a/edge/graph_204833544.jsonl b/edge/graph_204833544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5bb3056db982df43fd594e47e9b747c764709994 --- /dev/null +++ b/edge/graph_204833544.jsonl @@ -0,0 +1,7 @@ +{"36952980|7185733": []} +{"4441169|7185733": []} +{"51929156|7370231": []} +{"51929156|2087828": ["The creep affects the inter-particle separation, as well as the electrical resistance of FSR (see quantum tunneling operation mode [42])\u2014this produces a drift of the sensor output."]} +{"116826713|18284918": ["virtual reality, advanced user interface, entertainment, remote control of mechatronic devices, healthcare, and rehabilitation [3], [4]."]} +{"39616677|9270553": []} +{"115614178|18388986": ["According to [10], there are various classification schemes for data fusion, for instance, based on: i) the input/output data types and their nature, ii) the abstraction level of the used data, and iii) data fusion levels established by the Joint Directors of Laboratories.", "the data [10]: i) measurements - the input of the data fusion is the raw data (e."]} diff --git a/edge/graph_204837242.jsonl b/edge/graph_204837242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f09cd4507434cf04f079aa35aa1e3ed537ca934c --- /dev/null +++ b/edge/graph_204837242.jsonl @@ -0,0 +1,16 @@ +{"195699557|2165257": ["retrieval tasks has provided approaches that could prove valuable for the PD scenario [15, 26]."]} +{"14990549|15164501": []} +{"14990549|35897447": []} +{"14544742|13093354": []} +{"390931|2165257": ["trieval, the user formulates the query using a combination of search terms, query language operators, and mathematical features [9].", "Document synthesis describes the composition of a new document from retrieved fragments, which is mainly relevant for educational purposes, but not for MathPD [9].", "Mathematical information retrieval mainly addresses three tasks: i) mathematical document retrieval, ii) formula retrieval, and iii) document synthesis [9].", "development frameworks were still available [9]."]} +{"280679|55823329": ["al methods is done in [35]. In [20], a statistical model is used to evaluate the similarity between two documents regardless of the order in which the terms appear in suspected and original documents [36]. 9. Grammar Semantics Hybrid Plagiarism Detection Methods: These methods are effective method in plagiarism detection for their use of natural language processing. They are capable of detecting copy/"]} +{"280679|56146580": []} +{"27863815|2703920": ["Approaches to determine semantic relatedness fall into two categories: knowledge-based and corpus-based [20]."]} +{"8883924|17652653": ["Lots of approaches have been proposed to address the paraphrasing task on conventional texts ( surveyed in (Madnani and Dorr, 2010)).", "Generally, a paraphrase is an alternative surface form in the same language expressing the same semantic content as the original form and it can appear at different levels, e.g., lexical, phrasal, sentential (Madnani and Dorr, 2010).", ", lexical, phrasal, sentential (Madnani and Dorr, 2010)."]} +{"22268387|17652653": []} +{"44061063|2703920": ["Using measures such as the Jaccard and cosine coefficients [10] resulted in a simple but effective approach for determining the similarity between the suspicious and the source texts [11, 22].", "Likewise, measuring the similarity of texts by means of an edit-distance [13, 19, 6] or the Longest Common Subsequence (LCS) [10] resulted in effective approaches."]} +{"9208227|11894197": []} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"1033018|55823329": []} +{"14384930|55823329": ["Plagiarism generally refers to the illegitimate use of someone else\u2019s information, text, ideas, etc. without proper reference to the original source of these data [3]."]} +{"15155581|56146580": []} diff --git a/edge/graph_204837333.jsonl b/edge/graph_204837333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63267bbd648c1aaafc5a0e7dd7564a0f4512672a --- /dev/null +++ b/edge/graph_204837333.jsonl @@ -0,0 +1,21 @@ +{"9979271|1188683": ["Most FPGAs provide low level fine-grained parallelism with a high degree of flexibility but pay a power penalty and could only be configured at power up [2]."]} +{"11426966|1188683": ["Among these overlays, CGRA overlays are particularly suitable for compute intensive loop acceleration as demonstrated by numerous prior works [38], [39]."]} +{"53350148|20905429": ["A similar conclusion is drawn in [4] and [5], which propose an embedded platform for biosignal processing in personal health monitors, an increasingly relevant domain with ultralow power constraints [8]."]} +{"4382018|282697": ["First, like VLIW architectures [Rau and \nFisher 1993], the placement of instructions onto ALUs is encoded into the instruction stream."]} +{"12577281|1188683": []} +{"17979368|3540699": []} +{"18520899|11977718": ["This is presumable also why Hartenstein decided that the interconnect is an important feature of CGRAs in his classification already more than a decade ago [9], a classification also adopted by a more recent survey [13]."]} +{"35746438|3540699": ["264/AVC (advanced video coding) [2] is emerging as an important video coding standard that promises higher coding efficiency and improved network adaption."]} +{"21124560|8073217": []} +{"49298042|11977718": []} +{"49298042|8073217": ["Aside from these, a considerable number of architectures and mapping techniques for CGRAs have been developed [1, 4, 7, 20, 21] in academia."]} +{"18481880|1188683": ["This allows the CGRA to act as \u201cvirtual hardware\u201d [25]."]} +{"5047103|4668902": ["Exhaustive surveys on approximate computing have been conducted in [8],[17] and [18]."]} +{"5047103|33239168": ["CGRAs: Comprehensive surveys on reconfigurable architectures, in terms of the reconfiguration method, granularity (fine/coarse), and application domains can be found in [25][26]."]} +{"17000973|1188683": ["Consequently, they use very fine-grain reconfigurable elements such as lookup tables (LUTs) [6, 17]."]} +{"34721160|1188683": ["Fine-grained architectures, like FPGAs, use basic logic blocks with a data width of 2- to 4-bits, whereas the coarse-grained architectures consist of functional units working on data words of 8- or 16-bits or even more [4,6].", "Another form of partial reconfiguration is referred to as Multicontext reconfiguration [6], in which the memory containing the configuration bits is arranged in the form of multiple planes or multiple memory banks.", "Unlike singlecontext devices [7] which require reconfiguration of the complete chip at a time, the commonly used partially reconfigurable devices allows the reconfiguration of selective portions of the chip [6], as shown in Fig."]} +{"1883569|1188683": ["Compton and Hauck [2002] present a survey on systems and software tools for reconfigurable computing, and Todman et al."]} +{"1883569|206011846": []} +{"2840399|1188683": ["functions: As devices are migrated to more advanced technologies, the number of transistors that can be devoted to the reconfigurable logic fabric increases.", "At the same time, the power consumption targets, the acceptable packaging and manufacturing costs, and the time-to-market requirements of these computation units are all decreasing rapidly, especially in the embedded hand-held devices market."]} +{"3416640|11977718": ["Space limitations preclude a detailed review of prior architectures and the interested reader is referred to excellent survey articles [7], [8], [9], [10], [11]."]} +{"3416640|8073217": ["CGRAs have been studied in academia for over a decade, and a variety of different architectures have been proposed [1]."]} diff --git a/edge/graph_204838011.jsonl b/edge/graph_204838011.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2f9cdabfb01964b0b5745df2adb8b0e3da7dc1f --- /dev/null +++ b/edge/graph_204838011.jsonl @@ -0,0 +1,2 @@ +{"37925315|12681089": []} +{"16607217|164835": ["Recently, there has been renewed interest in this research, mainly driven by the emergency 911 location ability imposed to wireless services [3], [4] as well as sensor network applications [5]."]} diff --git a/edge/graph_204838055.jsonl b/edge/graph_204838055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..159413f63061a28c8f4dfefadbfca9c523bce625 --- /dev/null +++ b/edge/graph_204838055.jsonl @@ -0,0 +1,45 @@ +{"52933595|31245252": ["The authors of article [23] raise awareness on the economic and social implications of the value of information and cost of privacy in the Internet of Things, while in paper [24] we see a survey on IoT that comprises architecture, technologies, security and privacy."]} +{"4523865|12122055": ["dynamics [13], of evolutionary games in structured populations [14\u201317], of crime [18], and of epidemic processes and vaccination [19,20], are all recent examples of this exciting development.", "In this, we can connect to existing interdisciplinary applications of statistical physics, for example to better understand the economy [288\u2013294], to mitigate crime [18], to promote vaccination [20], to predict and prevent epidemics [19], and to save lives [295], but we also need help from outside of physics if we wish to come up with useful models that will help guide our efforts toward a sustainable and better future."]} +{"4523865|10430339": ["In addition to continuous phase transitions, discontinuous phase transitions are also common in models of human cooperation, occurring for example as a consequence of indirect territorial competition [110], or the spontaneous emergence of cyclic dominance [60,192].", "Similar effects were already reported in several three-strategy models, including the simpler spatial rock\u2013paper\u2013scissors game, and the main features were justified by mean-field approximations and pair-approximations (see [192] for a review).", "As was frequently the case before [39,111,120,250] (see [192] for a review), here too the spontaneous emergence of cyclic dominance brings with it fascinating dynamical processes that are driven by pattern formation, by means of which the phase may terminate.", "Namely, as space becomes sparse, the D+ C + L phase becomes more vulnerable against external invasions because the amplitude of local oscillations within the phase becomes larger and larger the smaller the patches, which is a well-known phenomenon in the realm of cyclic dominance [192] (although the amplitude can increase also due to other reasons, as reviewed in Section 5.", "It can be observed that defectors invade cooperators, cooperators invade rewarding cooperators, and rewarding cooperators in turn invade defectors, thus forming a closed loop of dominance that give rise to cyclical interactions and a spatiotemporal dynamics akin to the rock\u2013paper\u2013scissors game [192]."]} +{"4523865|634975": ["We then present an overview of mathematical models, where we focus on the public goods game as the null model for human cooperation [109], with extensions toward incorporating punishment [110\u2013112], rewarding [60\u201362], correlated positive and negative reciprocity [50], as well as tolerant players [82].", "The public goods game is simple and intuitive, as already described in Section 2, and it is in fact a generalization of the pairwise prisoner\u2019s dilemma game to group interactions [109].", "In general, lattices can be regarded as an even field for all competing strategies, and especially for games that are governed by group interactions, such as the public goods game [109], using the square lattice suffices to reveal all feasible evolutionary outcomes."]} +{"1845983|16209841": []} +{"15528648|3348390": [", [4] and [44]), it is established that one of the most appropriate formats to manage context is ontology."]} +{"67264312|1599458": ["Finally, we cite the survey \u201c Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services \u201d [15], which presented the current IoT technologies, approaches, and models to \ufb01 nd out new data-related challenges."]} +{"67264312|16153186": ["In [152], the authors survey access control models in WSNs.", "Hence, other network entities, with limited authorizations, become unable to know the actual users \u2019 ID [152].", "11, we classify research activities in access control systems in a two-dimensional diagram as described in [152]."]} +{"67264312|3348390": ["In \u201c Context Aware Computing for The Internet of Things: A Survey \u201d [10], the authors proposed a context awareness for the IoT framework and gave a deep provided an in-depth analysis of the context life cycle (techniques, methods, models, functionalities, systems, applications, and middleware\u2026", "In recent years, many surveys were published to emphasize the advancement of research activities in the IoT framework [1,6 \u2013 10]."]} +{"67264312|14745481": ["In [91], Cho et al. surveyed trust management systems for Mobile Ad Hoc Networks.", "Cho et al. [91] detailed the concept of trust in many disciplines such as sociology, economics, philosophy, psychology, organizational management, autonomic computing, and communications and networking."]} +{"67264312|2906926": []} +{"67264312|9554464": ["Regarding aggregation of data collected by sensors, an important work can be found in [88], where Sang et al. proposed a method for securing data aggregation to extend the network lifetime, guaranteeing reliable data collection from sensors, and addressing a solution for node failure and healing."]} +{"4562284|31245252": []} +{"4562284|17205659": []} +{"49348420|1442447": ["Also, virtual objects such as social networks are an integral part of IoT[6]."]} +{"4704392|18825272": ["The stakeholders could be supported in their reasoning by simulations of what may emerge in the adapted Iota [46]."]} +{"51870530|3348390": ["Solutions using context-aware security can provide a much better user experience aswell as increased security [87]; often both can be achieved at the same time."]} +{"51607811|7681233": ["The individuals then form a network of trust based on techniques from the reputation modelling literature [Yu et al. , 2010; Yu et al. , 2013] to achieve collective self-governance through dynamic interactions."]} +{"150328013|27533715": []} +{"30820957|35167928": []} +{"20880112|2623404": ["In particular, it centralizes the network control and provides dynamic, flexible and automated reconfiguration of the networks [61, 62, 63]."]} +{"129946046|4110304": ["They are fed input and produce output, but the exact functional process for generating this output is hard to interpret even to the very scientists who generate the algorithms themselves 44 , though some progress in interpretability is being made 45,46 ."]} +{"129946046|17253721": []} +{"35978671|1113420": ["The IoT infrastructure supports object-connected technologies for \u201cHuman-to-Objects\u201d and \u201cObjects-to-Objects\u201d communications [2] [4]."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"61331722|1113420": []} +{"117583111|37976266": []} +{"117583111|1520906": []} +{"117583111|17675973": []} +{"64643926|5909964": []} +{"14469231|84832337": ["[22], and Mokhtar and Azab [49]."]} +{"54446993|21386749": ["This will improve our quality of life in different domains [5] as shown in Figure 1 including Energy [6], Safety, Security, Industry [7], Environment, Entertainment, and Healthcare [8]."]} +{"54446993|206901977": ["According to a recent report published by US Energy Information Administration (EIA) in 2017 [24], 64.7 million smart meters have been installed in electric utilities in 2015.", "This will improve our quality of life in different domains [5] as shown in Figure 1 including Energy [6], Safety, Security, Industry [7], Environment, Entertainment, and Healthcare [8]."]} +{"54446993|17756238": []} +{"15895606|31245252": ["[95] comprehensively surveyed security and privacy, among other issues, in the Internet of Things (IoT)."]} +{"15895606|2521001": ["Not only should consumers\u2019 data be encrypted, but anonymization techniques are also desired to prevent inference and other attacks from deducing patterns from the encrypted data to reveal private information [79], [114]."]} +{"15895606|207209718": ["For example, Intrusion Detection Systems (IDS) should be time-critical so that long delays are intolerable [112].", "They also provide a comprehensive survey on IDS solutions in CPS applications [112].", "For further analysis of the current ICS-speci\ufb01c IDS solutions, we refer you to [5], [7], [19], [81], [82], [112], [171]."]} +{"15895606|4528002": ["However, it is more costly and less likely to widespread in the near future [149].", "Steer-, Drive, Brake-, Shift-, and Throttle-by-wire are all examples of this trend [149]."]} +{"15895606|595093": []} +{"29974861|44461432": ["In [80] the data mining techniques are divided in five categories: classification, clustering, association analysis, time series analysis and outlier 895", "the problem type, a large amount of techniques can be chosen in [81], [80].", "involves discovering of useful patterns from large amounts of data and applying algorithms for extracting useful and hidden information [80]."]} +{"29974861|3348390": ["Context-aware computing allows us to store context information linked to sensor data allowing an easy and meaningful interpretation [93]."]} diff --git a/edge/graph_204851803.jsonl b/edge/graph_204851803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9c734ad9f83f507b51ad46f26dcbf3d38725d73 --- /dev/null +++ b/edge/graph_204851803.jsonl @@ -0,0 +1,3 @@ +{"197862747|1229096": ["Autonomy benefits from the help of artificial intelligence and machine learning algorithms that cope with the uncertainties of the real world [27]."]} +{"197862747|1708582": []} +{"63078501|9340653": []} diff --git a/edge/graph_204852234.jsonl b/edge/graph_204852234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e47047de5a924c61efb2c1fdcf93820e42d635d --- /dev/null +++ b/edge/graph_204852234.jsonl @@ -0,0 +1,2 @@ +{"128173056|13985031": ["In the literature, the most widely used surrogate models are: Polynomial Regression [40, 41], Radial Basis Function [40, 42], Kriging [40, 43, 44], Support Vector Regression [45, 46], Artificial Neural Networks [47, 48] and others."]} +{"119012849|6681074": ["Actually, the construction of parameterized TDFs have been studied intensively in the field of computer graphics [25-27]."]} diff --git a/edge/graph_204861452.jsonl b/edge/graph_204861452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204887398.jsonl b/edge/graph_204887398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6dffd87b265112e4a2ef1164c200146199a6b9ca --- /dev/null +++ b/edge/graph_204887398.jsonl @@ -0,0 +1,6 @@ +{"14211318|1188683": ["Using best practices for configuration loading and initialization [17], the second and third steps can be accomplished quickly (10s of ms)."]} +{"91185796|206743327": ["While Arrow is not the only framework following the trend of in-memory computation for big data frameworks (an overview can be found in [13]), it is a framework that is especially focused on providing e\ufb03cient interoperability between di\ufb00erent tools/languages."]} +{"6526411|206743327": []} +{"6526411|12161567": ["Deep learning [34, 25] has been applied to knowledge-base related problems."]} +{"6526411|16156203": ["Spatial and temporal data are common data types in database systems [13, 8], and are commonly used for trend analysis, progression modeling and predictive analytics [19]."]} +{"7285766|15343401": ["1 A technique known as wave pipelining [ 6 ] can be used to send several"]} diff --git a/edge/graph_204895230.jsonl b/edge/graph_204895230.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89854044fee90f386ee07f1cbbeb8ccb8fc01cca --- /dev/null +++ b/edge/graph_204895230.jsonl @@ -0,0 +1 @@ +{"17270744|8125630": ["A Personalization Framework for OLAP Queries Ladjel Bellatreche Arnaud Giacometti Dominique Laurent \nLISI / ENSMA Patrick Marcel Universit \u00b4e de Cergy T \u00b4eleport 2, 1, av. C. Ader Pontoise, LICP \u00b4Hassina \nMouloudi 86960 Futuroscope, FRANCE Universit \u00b4e Franc\u00b8ois-Rabelais 95302 Cergy-Pontoise, de Tours, LI \nFRANCE bellatreche@ensma.fr 3, pl. Jean Jaur `es dominique.laurent@dept\u00ad 41000 Blois, FRANCE info.u-cergy.fr \n giaco@univ-tours.fr ABSTRACT OLAP users heavily rely on visualization of query answers for their interactive \nanalysis of massive amounts of data.", "A Personalization Framework for OLAP Queries Ladjel Bellatreche Arnaud Giacometti Dominique Laurent \nLISI / ENSMA Patrick Marcel Universit \u00b4e de Cergy T \u00b4eleport 2, 1, av. C. Ader Pontoise, LICP \u00b4Hassina \nMouloudi 86960 Futuroscope, FRANCE Universit \u00b4e Franc\u00b8ois-Rabelais 95302 Cergy-Pontoise, de\u2026"]} diff --git a/edge/graph_204895376.jsonl b/edge/graph_204895376.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3a5ef11bd11880da9523bac19b41ed85e75763f --- /dev/null +++ b/edge/graph_204895376.jsonl @@ -0,0 +1,2 @@ +{"16011294|5473785": []} +{"190432|41035405": ["The relay channel was introduced by Van der Meulen [528]; the capacity region for the degraded relay channel was determined by Cover and El Gamal [127].", "We would also like to thank Normam Abramson, Ed van der Meulen, Jack Salz and Raymond Yeung for their suggested revisions."]} diff --git a/edge/graph_204896058.jsonl b/edge/graph_204896058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204897004.jsonl b/edge/graph_204897004.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d3518c14b21e78d9a71ba289a04921cccc05f0c --- /dev/null +++ b/edge/graph_204897004.jsonl @@ -0,0 +1,9 @@ +{"146735547|55331303": []} +{"8620877|469744": ["Furthermore, the users can learn in a quick and happy mode by playing in the virtual environments. r 2005 Elsevier Ltd."]} +{"29137862|11074234": ["Rehabilitation and health care centers are interested to have have computational systems based on virtual reality games, which focuses to improve the motor training and motor learning through both, fine and gross movement exercises [5]."]} +{"207163085|469744": []} +{"18317038|7839197": ["Much of the work of the Oz Project revolves around the development of a broad agent architecture called Tok , its reactive component ( Hap ), and its emotion component ( Em ) (Bates, 1994), for non-linguistic, believable agents (Bates et al., 1992; Loyall and Bates, 1993).", "\u2026agent research per se , which is reviewed extensively elsewhere in a number of survey articles, for example (Wooldridge and Jennings, 1995), Nwana (Nwana, 1996; Jennings et al., 1998), and concentrate on those particular efforts that have been concerned with agents in a virtual environment and\u2026", "In this section, we will avoid agent research per se , which is reviewed extensively elsewhere in a number of survey articles, for example (Wooldridge and Jennings, 1995), Nwana (Nwana, 1996; Jennings et al., 1998), and concentrate on those particular efforts that have been concerned with agents in a virtual environment and their embodiment in that environment."]} +{"63761375|206986719": []} +{"63135386|11266709": ["The benefit of immersion is that it ensures a sense of presence or the feeling that one is really in the depicted world (Schuemie et al., 2001)."]} +{"54599346|19711892": ["The last step of the process is to send the rendered 3D output of the simulator software [64] with both asymmetric frustums to the phone with virtual reality glasses attached."]} +{"10720502|6558660": []} diff --git a/edge/graph_204899993.jsonl b/edge/graph_204899993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204904177.jsonl b/edge/graph_204904177.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1778cb03108a2710d16d0ff8f5362ec85d3506c1 --- /dev/null +++ b/edge/graph_204904177.jsonl @@ -0,0 +1,17 @@ +{"41823768|53680608": ["Interested readers are referred to previous surveys by Aggarwal and Nandhakumar [1], Barron et al. [2], Otte and Nagel [16], Mitiche and Bouthemy [14], and Stiller and Konrad [23]."]} +{"67788034|115758427": ["[10] survey the 3D object detection problem in autonomous driving."]} +{"67788034|73497737": ["Finally, as there can always be new driving scenarios that are different from the training data, it is an interesting research topic to leverage lifelong learning [186] to update the multi-modal perception network with continual data collection."]} +{"67788034|22163846": ["At the \u201chow to fuse\u201d level, finding fusion operations that are suitable for network acceleration, such as pruning and quantization [199]\u2013[202], is an interesting future work."]} +{"67788034|8574504": ["segmentation, we refer the interested reader to the review papers [11], [12]."]} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"4816620|984799": ["With a few exceptions [34], [35], almost all joint attention scenarios are implemented with stationary robots or robotic heads according to a recent comprehensive survey [36]."]} +{"5325247|15093118": ["It is also recommend to read other comprehensive reviews [12] and [13] for driver safety systems.", "This paper is different from [13] due to addition of survey on sensors (active and passive), their comparison and literature for motorcycle detection techniques.", "The latter [13], is an up-to-date and thorough survey of vision-based vehicle detection, tracking and behavior analysis.", ", hardware and software solution for CAS while [13] addresses the driver behavior analysis and techniques for vehicle detection with minor details"]} +{"152282225|49862415": ["SPPNet [17], Fast RCNN [18], Faster RCNN [19], YOLO [20], [21], [22], SSD [23], FPN [24], Retina-Net [25], CornerNet [26], CenterNet [27], and"]} +{"152282225|3110415": ["We refer readers to the following surveys for more details on this topic [90, 382].", "NWPUVHR10 [90] 2016 The most frequently used remote sensing detection dataset in recent years."]} +{"152282225|207060556": ["We refer readers to the following surveys for more details [323, 324]."]} +{"152282225|5729190": ["The disadvantage is the inference will be computationally expensive when considering a large number of character classes and candidate windows [339].", "We refer readers to the following survey for more details [338, 339]."]} +{"152282225|206739910": ["LISA [80] 2012 One of the first traffic sign detection dataset.", "We refer readers to the following survey [80] for more details on this topic."]} +{"152282225|206764452": []} +{"152282225|9045232": ["We refer readers to the following surveys for more details [323, 324]."]} +{"74510|7257659": ["Understanding, modeling, and evaluation of situational awareness tasks, in particular the understanding of the behavior and intent of agents surrounding a vehicle, is an essential component in the development of such systems [3, 4, 5, 6]."]} +{"74510|1029120": []} diff --git a/edge/graph_204904717.jsonl b/edge/graph_204904717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b20c2dc70205ce9f300a62dc0a1231fc937ed1d0 --- /dev/null +++ b/edge/graph_204904717.jsonl @@ -0,0 +1,2 @@ +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} diff --git a/edge/graph_204905165.jsonl b/edge/graph_204905165.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9874c09bf47024188be73a5795409404b2059591 --- /dev/null +++ b/edge/graph_204905165.jsonl @@ -0,0 +1,6 @@ +{"57513433|16768404": ["Medhat et al. [73] provided a categorization of articles according to the used techniques, which can help the researchers who are familiar with certain techniques to use them in the sentiment analysis and choose the appropriate technique for a certain application."]} +{"57513433|17896770": []} +{"57513433|11591301": ["[138] presented a survey on the role of negation in sentiment analysis, in which various computational approaches modeling negation are introduced."]} +{"29840822|27533715": ["Cohen's \u03ba coefficient was calculated to measure the level of agreement between the two coders for each set of tweets (Hallgren, 2012)."]} +{"35312933|13151033": ["In [16], Paulheim provides a comprehensive survey of approaches and evaluation methods on knowledge graph refinement."]} +{"15266848|11608263": ["22\u201326 The relation between inter-annotator agreement and automated system performance is not clear."]} diff --git a/edge/graph_204908358.jsonl b/edge/graph_204908358.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c35afab91d2787a06d34dc86f0afa274617909a5 --- /dev/null +++ b/edge/graph_204908358.jsonl @@ -0,0 +1,7 @@ +{"57641548|2528314": ["18 the sampling rate and the segment length [3]."]} +{"57641548|16362395": ["Each assigning the input to a class, with the final class being the majority voted class [28].", "This method of combination called Boosting [28]."]} +{"4076997|9270553": []} +{"13405817|119797769": ["design matrix, is a vector of fixed-effects parameters, is the random-effects design matrix, is the vector of random-effects parameters, and is a vector of residual error [25]."]} +{"93003596|3800586": ["[3] approach is related to prostheses that do not need surgery and the main disadvantage of this work is that it does not discuss sensory feedback (that requires surgery)."]} +{"115662678|7370231": []} +{"181462753|7370231": []} diff --git a/edge/graph_204915985.jsonl b/edge/graph_204915985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..098fb02e0577471582a553b65bd16fc623e173ff --- /dev/null +++ b/edge/graph_204915985.jsonl @@ -0,0 +1,12 @@ +{"18673621|9828770": []} +{"26832635|9828770": ["\u2217Author for correspondence\n1250168-1\nMore recently, the attention has focused on the study of adaptive complex networks [Gross & Blasius, 2008; Perc & Szolnoki, 2010; Herrera et al., 2011]."]} +{"1920175|9828770": ["This question comes close to the goal of adaptive network studies [162] that model the feedback from network structure (and how it affects dynamics on the network) to the success of the agents forming the network (and how they seek to change their position in it)."]} +{"18387405|22203221": []} +{"199577358|824375": []} +{"88516270|40315379": ["ods, R-MAT Model, Principal Components 1 Introduction A network consists of nodes, which represent individual entities, and relationships between nodes, represented as edges (Bader and Madduri, 2008, Woodall et al., 2017). Investigators in recent years have demonstrated that many phenomena can be represented as networks (Woodall et al., 2017). These phenomena can span a multitude of elds such as the power grid (Albert", "et al., 2011, 2012, Procter et al., 2010, Raulf-Heimsoth et al., 1998). Networks are therefore capable of visually and mathematically representing applications in a myriad of elds (Mall et al., 2013, Woodall et al., 2017). For this reason, methods that can be applied to networks to identify abnormalities in these various applications are of signicant importance. This is termed the anomaly detection problem where the ", " of abnormal proteins in a gene transcription process (Cer et al., 2012, 2011, Procter et al., 2010). Anomaly detection tools allow practitioners to detect unusual behavior in a wide variety of elds (Woodall et al., 2017, Akoglu et al., 2010, Dahan et al., 2017). Typically, anomaly detection techniques focus on dening what conditions constitute a normal network and discriminating between anomalous nodes and non-anom", "case studies are used in our paper to evaluate the methods. With simulations, anomalies can be introduced in a controlled manner and the ability to detect particular types of anomalies can be tested (Woodall et al., 2017, Savage et al., 2014, Azarnoush et al., 2016). The rest of our paper is organized as follows. In section 2, we describe the mathematical formulations used in dening the spectral properties of the ne", "works can be static, where we have a single snapshot of the system, or dynamic, where we have network snapshots at several points in time. Anomalies can have dierent meanings in these two scenarios (Woodall et al., 2017, Savage et al., 2014, Ranshous et al., 2015). In dynamic networks, an anomaly typically corresponds to a group of nodes behaving in a manner that is signicantly dierent from past behavior. The gene"]} +{"88516270|14414383": ["sive discussion on outlier based detection techniques can be found in [10, 14]. Some examples of scanning methods are the Priebes scanning method in [29] and the use of spatio-temporal information in [30]. The general approach to anomaly detection in dynamic networks is to extract some features of the graph such as centrality measures, degree distribution, and so on, and monitor these features over ti", "13]. In practice, anomaly detection can either have a temporal component to it, which is called dynamic network monitoring, or lack a temporal component and these are called static network monitoring [37, 32, 30]. Therefore, anomaly detection in the context of dynamic networks involves monitoring the evolution of interactions in a network for the purpose of signaling if a particular network has changed signi"]} +{"21711538|40315379": []} +{"21711538|14414383": []} +{"16414574|22203221": []} +{"14306926|9828770": []} +{"3318292|9828770": []} diff --git a/edge/graph_204934851.jsonl b/edge/graph_204934851.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51b61b7b6045af471f3055c2d517d5a01312c636 --- /dev/null +++ b/edge/graph_204934851.jsonl @@ -0,0 +1,6 @@ +{"14172605|14697846": ["Logoot-Undo: Distributed Collaborative Editing System on P2P Networks\nSte\u0301phane Weiss, Pascal Urso, and Pascal Molli\nAbstract\u2014Peer-to-peer systems provide scalable content distribution for cheap and resist to censorship attempts."]} +{"9935548|6611633": ["RDOs can be viewed as simple Agents [49] or as a light-weight formofprocess migration[14,46,51,56]."]} +{"1343281|8424228": []} +{"13954453|8424228": ["Stronger consistency models do not have this property [Attiya et al. 2015; Davidson et al. 1985]."]} +{"7238275|18300540": ["Nevertheless, since 1976, databases have introduced support for a finite set of invariants [14, 26, 29, 32, 37] in the form of primary key, foreign key, uniqueness, and row-level \u201ccheck\u201d constraints [42]."]} +{"7238275|8424228": []} diff --git a/edge/graph_204937426.jsonl b/edge/graph_204937426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204937670.jsonl b/edge/graph_204937670.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a41884aaad4f7c6178288688844109b1ed403003 --- /dev/null +++ b/edge/graph_204937670.jsonl @@ -0,0 +1 @@ +{"41349228|11720829": []} diff --git a/edge/graph_204938224.jsonl b/edge/graph_204938224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204938417.jsonl b/edge/graph_204938417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..524820b13275ad07b1dd949a46faabcbf80888e5 --- /dev/null +++ b/edge/graph_204938417.jsonl @@ -0,0 +1,3 @@ +{"8746324|10500613": []} +{"13468951|10500613": ["In database design, finding correspondences between database schemata is referred to as schema matching [24]."]} +{"14958298|6159806": []} diff --git a/edge/graph_204938687.jsonl b/edge/graph_204938687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204939092.jsonl b/edge/graph_204939092.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4e8b3d510b54081dd3b6910865d941f28005f25 --- /dev/null +++ b/edge/graph_204939092.jsonl @@ -0,0 +1,2 @@ +{"106684345|12083425": []} +{"106684345|17774971": []} diff --git a/edge/graph_204939260.jsonl b/edge/graph_204939260.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63cd6fa10c58e37900cbbfc86d9728e269d5b39a --- /dev/null +++ b/edge/graph_204939260.jsonl @@ -0,0 +1,17 @@ +{"14450758|17071125": []} +{"71455702|3732796": ["\ue062e technology, de\ufffdned multimedia forensics [13\u201315], relies on the observation that each phase of the image history, from the acquisition process, to its storing in a compressed format, to any post processing operation leaves a distinctive trace on the data, as a sort of digital \ufffdngerprint."]} +{"152282664|16527268": ["The explosive growth in the use of smartphones and wearable devices, such as smartwatches and activity trackers, presents an unprecedented opportunity for biometric researchers [3, 24]."]} +{"4557260|5313655": ["There is a rich literature on the subject, for instance [62, 116], and at least one major iris recognition company has been using a revocable biometric scheme for a number of years."]} +{"52919290|12487207": ["Texture synthesis is the process of generating new texture images which are perceptually equivalent to a given texture sample (Efros and Leung 1999; Gatys et al. 2015; Portilla and Simoncelli 2000; Raad et al. 2017; Wei and Levoy 2000; Zhu et al. 1998).", "Researchers (Raad et al. 2017; Akl et al. 2018) presented a review of exemplar based texture synthesis approaches."]} +{"52919290|4570087": ["\u2026applications of texture analysis include medical image analysis [48, 158, 177], quality inspection [250], content based image retrieval [148, 216, 266], analysis of satellite or aerial imagery [96, 83], face analysis [4, 49, 215, 265], biometrics [137, 185], object recognition [210, 173, 263],\u2026"]} +{"52919290|393948": ["A full review of these networks is beyond the scope of this paper, and we refer readers to the original papers [84, 87, 103, 214, 220] and to excellent surveys [15, 31, 75, 112, 133] for additional details."]} +{"52919290|192934": ["As a classical pattern recognition problem, texture classi\ufb01cation primarily consists of two critical subproblems: texture representation and classi\ufb01cation [90].", "The global feature is used as the basis for classi\ufb01cation, for which many approaches are possible [90, 242]: Nearest Neighbor Classi\ufb01er (NNC), Support Vector Machines (SVM), neural networks, and random forests.", "Many classi\ufb01cation approaches are possible [90, 242], although Nearest Neighbor Classi\ufb01er (NNC) and Support Vector Machine (SVM) are the most widely-used classi\ufb01ers for the BoW representation."]} +{"67873215|5313655": ["biometric template protection [117], [118] or conventional cryptographic techniques [119], [120]."]} +{"20590250|15219853": ["Similarly in surveys dedicated to person identification based on specific modalities such as face recognition (Zhao et al, 2003), 3D face recognition (Bowyer et al, 2006), speaker identification (Bimbot et al, 2004), fingerprint recognition (Yager and Anim, 2004) and behavioural biometrics (Yampolskiy and Govindaraju, 2008) the topic of aging is not considered in detail.", "Body Movement Biometrics Body movement biometric templates fall under the general category of behavioural biometrics (Yampolskiy and Govindaraju, 2008)."]} +{"416565|34263386": []} +{"416565|18050848": []} +{"52011068|207115339": []} +{"52011068|18609918": []} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"15240764|416565": ["The third type of static approach includes hybrid schemes that combine more than one attribute [Galbally et al. 2014b; Wen et al. 2015], the use of client identity information [Chingovska and Anjos 2015], the characterization of the defocus property of the captured face image [Kim et al. 2015b;\u2026", "\u2026insight into both the vulnerability of data capture subsystems and presentation attack detection methods in face recognition systems [Hadid 2014; Galbally et al. 2014a], publicly available databases [Tan et al. 2010; Anjos and Marcel 2011; Chingovska et al. 2012; Zhang et al. 2012], dedicated\u2026"]} diff --git a/edge/graph_204941513.jsonl b/edge/graph_204941513.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28c1d12978dbe460732c063ca1cb0d6ce6526811 --- /dev/null +++ b/edge/graph_204941513.jsonl @@ -0,0 +1,12 @@ +{"2107900|12083425": ["In this paper, a fuel cell (FC) system is used as a main energy source due to its clean, quiet, and efficient specifications [7], [8]."]} +{"116056826|6809492": []} +{"34029472|206485901": []} +{"40691149|17381415": ["working on a \u03b1\u03b2 stationary reference frame [33].", "where kP is the proportional gain, kR is the resonant gain at the grid frequency, kih is the resonant gain at the h-harmonic to be controlled, and \u03c9o is the detected fundamental frequency [33]."]} +{"117592344|31086789": ["related to RERs integration and need of storage devices for reliable operation of power system have been discussed in [152]."]} +{"117592344|12083425": []} +{"117592344|18037424": ["Smart grid technology is considered the best solution for the various problems of the power grids [13,14]."]} +{"12288205|5188711": ["Despite the fact that the EKF is a linear algorithm, it has proven its effectiveness in estimation problems [44]."]} +{"109077100|5747564": []} +{"113625127|206485901": []} +{"26584907|206485901": ["This system is studied from the operational control perspective, as operational control is one of the main challenges in the implementation of microgrids [10]."]} +{"115352697|206485901": []} diff --git a/edge/graph_204942995.jsonl b/edge/graph_204942995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8948dc94a6139d897c7a5f789ed728c42ab1cbdc --- /dev/null +++ b/edge/graph_204942995.jsonl @@ -0,0 +1,12 @@ +{"111646743|1113420": []} +{"207208835|13392386": ["These context sensors can capture the rich [Sohn et al. 2005], and context-aware recommendation [Bader et al. 2011; Liu et al. 2013; jae Kim et al. 2010; Karatzoglou et al. 2010; Woerndl et al. 2007]."]} +{"206710454|1805048": ["Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.", "Su and Khoshgoftaar [212] presents a survey of CF techniques.", "The rest of this section deal is dealt with the concepts and research in the two lines considered previously: Filtering of social information and content filtering.", "The pure CBF has several shortcomings [16,176,212]:", "Breese et al. [43] evaluated the predictive accuracy of different algorithms for CF; later, the classical paper [94] describes the base for evaluating the Collaborative Filtering RS.", "Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.g. videos, songs, films, etc. in a CF based website) in such a way that when enough information is stored on the system, we can make recommendations to each user based on information provided by those users we consider to have the most in common with them.", "Collaborative Filtering (CF) methods play an important role in the recommendation, although they are often used along with other filterning techniques like content-based, knowledge-based or social ones."]} +{"7451127|18782652": ["\u2026task is so hard -see e.g. Schaffer \n(1993) -most rule induction algorithms performing classification have quite elaborated procedures to \n(try to) avoid overfitting/underfitting -see e.g. Breslow & Aha (1997), Jansen & Schmill (1997), \nOates & Jensen (1998), Jensen & Cohen (2000)."]} +{"15569715|1113420": []} +{"4368514|191396": ["The most similar technique is agglomerative clustering algorithm [46] that use a proximity matrix which is generated by computing the distance between clusters."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"14615837|3102110": []} +{"14223012|191396": []} +{"8556306|6832132": ["Some studies have investigated cost-sensitive decision trees, attempting to minimize the average misclassification cost rather than the prediction error rate [29, 41, 47, 48]."]} +{"8556306|365692": ["Other studies include work on a binary decision tree [5, 14, 33]."]} diff --git a/edge/graph_204949647.jsonl b/edge/graph_204949647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1620ad1f97a593b5329c3bc2f8ac477c7735e4f9 --- /dev/null +++ b/edge/graph_204949647.jsonl @@ -0,0 +1,13 @@ +{"9432483|14970359": []} +{"9432483|7788290": ["Advances in this domain are driven by a wide range of promising applications in various fields, such as medical diagnostics [1], surveillance [2], smart rooms [5], [6], and video indexing and retrieval [7]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"56172294|18803401": []} +{"2104871|6280485": ["Although encouraging results are obtained from using comuted tomography (CT) and positron emission tomography (PET) to iagnose respiratory diseases, particularly lung cancer [1,2], chest adiography still remains the most commonly used procedure makng up more than one-third of all examinations in a typical radiology epartment [3] for several reasons."]} +{"2104871|41104189": ["C om p ar is on of en er gy te rm s be tw ee n LS SP in [4 1, 42 ].", "Although encouraging results are obtained from using comuted tomography (CT) and positron emission tomography (PET) to iagnose respiratory diseases, particularly lung cancer [1,2], chest adiography still remains the most commonly used procedure makng up more than one-third of all examinations in a typical radiology epartment [3] for several reasons.", "LS SP [4 1] LS SP [4 2]"]} +{"53428474|1210137": ["There has been much good research in the fields of human pose estimation [1, 2, 6, 14, 20, 26, 40], pedestrian detection [25, 41, 42], portrait segmentation [35, 36, 37], and face recognition [18, 23, 24, 27, 39, 43, 44], much of which has already produced practical value in real life."]} +{"4323461|13787722": ["[172] for a detailed overview of recent advances in RGB-D-based motion recognition using DL."]} +{"4323461|2473564": ["Several surveys exist on 3D methods, but they are more focused on individual tasks, such as 3D face recognition [121, 152], 3D emotion and expression recognition [42, 139], 3D action recognition [95], and 3D retrieval [156]."]} +{"4323461|12724190": []} +{"4323461|2301292": ["Several surveys exist on 3D methods, but they are more focused on individual tasks, such as 3D face recognition [121, 152], 3D emotion and expression recognition [42, 139], 3D action recognition [95], and 3D retrieval [156]."]} +{"4323461|2355696": []} +{"4323461|987239": ["Several surveys exist on 3D methods, but they are more focused on individual tasks, such as 3D face recognition [121, 152], 3D emotion and expression recognition [42, 139], 3D action recognition [95], and 3D retrieval [156]."]} diff --git a/edge/graph_204950617.jsonl b/edge/graph_204950617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..064203f16085e9bee00001b819dc885ae36a03c2 --- /dev/null +++ b/edge/graph_204950617.jsonl @@ -0,0 +1,9 @@ +{"131724|3646491": ["Frequent subgraph mining extract frequent subgraphs that have frequency above a specified threshold in a given dataset [46]."]} +{"198749|6375360": []} +{"14951272|18812309": ["The small networks are: Elegans (neuronal network of Caenorhabditis elegans ) [31], PPI (a protein interaction network) [32], Jazz (jazz musicians network) [33], and School (face to face contact patterns in a primary school) [34]."]} +{"1920175|9828770": ["This question comes close to the goal of adaptive network studies [162] that model the feedback from network structure (and how it affects dynamics on the network) to the success of the agents forming the network (and how they seek to change their position in it)."]} +{"3585885|2248617": ["Aligning PPI networks of different species continues to be important [48, 14, 13, 12, 22].", "Since most of the recent work has dealt with GNA [22], we also focus on GNA, but our work can be generalized to LNA as well."]} +{"3635955|3646491": ["Our datasets are relatively small compared to those (with millions of nodes and edges) used in the literature of graph databases [19], [29], but we note that (i) biological networks are typically small, and (ii) identifying network motifs from our data is highly challenging due to the large number of", "Furthermore, there exist numerous techniques for frequent subgraph mining (see [29] for a survey) and significant subgraph mining [36], [37], [38], but those two problems are considerably different from network motif discovery."]} +{"3646491|60455": []} +{"3646491|3102110": ["The primary goal of data mining is to extract statistically significant and useful knowledge from data (Chen et al., 1996; Han & Kamber, 2006).", "The primary goal of data mining is to extract statistically signi\ufb01cant and useful knowledge from data (Chen et al. 1996; Han & Kamer 2006)."]} +{"198359267|551238": ["Other similar surveys mainly focus on studying motifs in biological networks [20]\u2013[22]."]} diff --git a/edge/graph_204955699.jsonl b/edge/graph_204955699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0171cd3f4f63f705a6c83739b0979b5fb2ca3229 --- /dev/null +++ b/edge/graph_204955699.jsonl @@ -0,0 +1,11 @@ +{"196831880|10694510": ["A fundamental part of this study is to incorporate a scalable real-time sentiment analysis model in the stream analytics pipeline for scoring the opinions and emotions of people towards entities such as individuals, products, services, organizations, issues, events, and topics [9, 10]."]} +{"14099949|10213552": ["Spark\u2019s performance has also been studied in the context of machine learning, particularly with Spark\u2019s machine learning library (MLlib) [41]."]} +{"14099949|16768404": ["Machine learning can be divided into supervised or un-supervised learning approaches [20].", "classified into lexicon-based and machine learning approaches [20]."]} +{"5054652|7971188": ["For more information on existing DHT-based routing protocols, see Abid et al. (2015) and Lua et al. (2005)."]} +{"2058741|16052126": ["First, our survey examines all main components that must be present in an ecosystem to support Big Data Analytics, unlike other surveys [Doulkeridis and N\u00d8rv\u02daag 2014; Liu et al. 2014; Bhatt and Kankanhalli 2011; da Silva et al. 2005; Serban et al. 2013; Mittelstadt et al. 2012] that only focus on\u2026", "Analytics is the application of computer science, data storage, data mining and machine learning, statistical analysis, arti\ufb01cial intelligence and pattern recognition, visualization, operations research, and Business Intelligence (BI) on real-world data to better understand data-oriented problems\u2026"]} +{"2058741|5281246": ["\u2026examines all main components that must be present in an ecosystem to support Big Data Analytics, unlike other surveys [Doulkeridis and N\u00d8rv\u02daag 2014; Liu et al. 2014; Bhatt and Kankanhalli 2011; da Silva et al. 2005; Serban et al. 2013; Mittelstadt et al. 2012] that only focus on single components.", "Meta-Learning Systems (MLSs) differ from ESs in that rules are learned automatically from prior runs [Serban et al. 2013].", "Novice analysts are typically overwhelmed with the large number of analytics techniques making them unable to con\ufb01dently select the right technique and often have to resort to time-consuming trial and error [Serban et al. 2013].", "However, with OR, some rules can be inferred, so that experts do not need to explicitly de\ufb01ne every possible rule [Serban et al. 2013].", "However, it is cumbersome to generate rules to cover all possible cases and all available operators [Serban et al. 2013].", "But even they are now \ufb01nding it hard to keep up with the ever-increasing number of operations and they usually tend to use the methods that have proven to be successful in the past [Serban et al. 2013].", "Most existing analytics solutions only offer static assistance [Serban et al. 2013; Charest 2007]."]} +{"3253074|5358365": ["Existing surveys were either conducted several years ago [47,143] or focus on a specific topic of visualization such as graph visualization [145], software visualization [24], or visualization of network security events [124]."]} +{"7105794|206743327": ["For small states, storing state in memory can accelerate processing [118].", "Some works [92, 118] store state in memory due to the small state size."]} +{"7105794|16052126": ["Big data systems process massive amounts of data efficiently often with fast response times and are typically characterized by the 4V\u2019s [1, 2], i.", "Among themwere the BDP approaches surveyed by Doulkeridis and N\u00f8rv\u00e5g [1]."]} +{"190008661|38200299": []} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} diff --git a/edge/graph_204960606.jsonl b/edge/graph_204960606.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204961427.jsonl b/edge/graph_204961427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7abef0fd343e54630efad4badfe4b43fb210613e --- /dev/null +++ b/edge/graph_204961427.jsonl @@ -0,0 +1,11 @@ +{"799455|12029139": ["Generally, in the context of IoT, wireless sensor networks (WSNs) and radio-frequency identification (RFID) tags, wireless energy sources can be classified into two categories [6]: 1) Dedicated source : Dedicated RF sources are deployed to provide a predictable energy supply to the device.", "Relay techniques utilized by 5G can benefit wireless/RF energy harvesting [6]."]} +{"799455|12060835": ["Thus, energy harvesting is a promising approach for the emerging IoT [4]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} diff --git a/edge/graph_204963740.jsonl b/edge/graph_204963740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_204963781.jsonl b/edge/graph_204963781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aed90943dba415d5757175df3789c775c9f00352 --- /dev/null +++ b/edge/graph_204963781.jsonl @@ -0,0 +1 @@ +{"6496568|39994618": ["[11] publish in 2015 a very good survey on the quality prediction of product review."]} diff --git a/edge/graph_204974626.jsonl b/edge/graph_204974626.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bf36da4bb3d73d28a750c65361317aaaeef4ec9 --- /dev/null +++ b/edge/graph_204974626.jsonl @@ -0,0 +1,45 @@ +{"109770683|1517662": []} +{"332918|1230643": ["Sensor nodes of the first generation had only very simple sensing capabilities, providing scalar sensors for parameters such as temperature, humidity, movement, lightning conditions, pressure, and noise level (Akyildiz et al., 2002).", "In such situations, airborne cameras and sensors are valuable sources of information helping us to build an \u2018\u2018overview\u2019\u2019 of the environment and to assess the current situation."]} +{"57760656|206578486": []} +{"57760656|8523192": ["This technology allows overcoming the limitations of centralized cloud computation by enabling data acquisition, processing, and storage at fog devices [6, 7]."]} +{"57760656|61132": []} +{"8200443|1503157": ["Wireless Sensor Networks: Past work has used multihop networks [5, 19, 23, 26, 39, 45, 57, 60] to gather data from sensors in the farm."]} +{"33706001|61132": ["[1] study the significant questions that arise in UAV communication networks about the features of the UAV networks, the routing, the handover schemes and the energy efficiency in UAV networks."]} +{"29247659|1503157": []} +{"17808440|2623404": ["More recently, network research has been associated with SDN that decouples the control plane and data plane from each other [15]."]} +{"39444322|205286988": []} +{"10495920|61132": []} +{"133803614|9223553": []} +{"133803614|11791723": []} +{"133803614|1230643": []} +{"29301335|1230643": ["Motes in sensor network are static devices that operate over the battery and provide highly sensitive applications in data acquisitions [5, 6]."]} +{"8243396|5646762": ["These algorithms are randomized algorithms that can give quasi-optimal solutions and that can be adapted to multiple different problems, such as patter recognition [7], control"]} +{"8243396|1517662": ["In [19, 20] a detailed survey on CDR techniques and planning algorithms is presented, respectively."]} +{"49190401|21418": ["Therefore, how to prolong the flying time of energy-constraint UAV while guaranteeing the required quality-of-service (QoS) of SNs is of great meaning, it is also the requirement for sustainable green 5G Networks [6]."]} +{"21683864|18167210": [", monitoring of farms, and irrigation processes are the main domains of IoT for cultivation [142].", "Tracking of Tracking of animals, monitoring of farms, and irrigation processes are the main domains of IoT for cultivation [142]."]} +{"21683864|4427557": ["Consequently, the cost [179] and the complexity of the agriculture WSN will be reduced and the lifetime will be increased."]} +{"21683864|206901977": ["BLE outperforms ZigBee in terms of power consumption, but this wireless protocol is limited in agricultural applications because of its short communication distance of 10 m, as reported in [48].", "Communication range [48,66] 100 m 10\u201350 m 10 m 100 m 1\u201310 km 5 km 10 km"]} +{"21683864|12060835": ["Numerous techniques have been developed to allow sensor nodes to harvest different types of energy, such as solar, wireless power transfer (WPT), mechanical vibration, kinetic, and wind energy, from different environments [110] (Figure 2)."]} +{"4819182|1503157": ["Hence, it is necessary to use radio extenders, to use other wireless protocols or to increase the power of transmission, thereby increasing the energy consumption (Ruiz-Garcia et al., 2009)."]} +{"53240416|61132": []} +{"19238030|61132": ["[33], analyzing networking issues in FANET scenarios."]} +{"1235162|1137487": ["The coverage problem was one of the important issues of WSN that recently got high attention [11][12][13]."]} +{"58673183|61132": ["To compensate the energy limitation, the mission planners have to choose the right compromise on whether UAVs should transmit collected information in real-time, or data should be stored for later analysis [11]."]} +{"18089827|2623404": ["More recently, network research has been associated with SDNs that decouple the control plane and data plane from each other [15]."]} +{"52163928|562065": ["Wireless sensor networks can be used for a wide variety of applications such as environmental monitoring [3]\u2013[6], disaster management [7]\u2013[10], health care [11]\u2013[13], and military [14]\u2013[16]."]} +{"52163928|6275330": []} +{"52163928|1236072": ["The sensing data of a sensor node is transmitted to a base station (BS) via multi-hop communication [39]."]} +{"52163928|1230643": ["The initial deployment of sensor nodes can be either random or deterministic [17].", "A wireless sensor network contains a group of wireless sensor nodes (SNs) [17].", "The main components of a sensor node consist of four units including the sensor device unit, the processor unit, the transmission unit, and the power unit [17]."]} +{"3516365|21418": []} +{"174801912|3348390": ["Besides, as per forecasts, the number of internet-connected devices will reach 50 billion in the next few years [2], [3].", "SO per type Percentage of SOs per Config type [1-140] %"]} +{"196191596|17708892": ["There are several possibilities for these type of transmissions, yet the recent development of the Low Power Wide Area Network (LPWAN) protocols present new opportunities with the benefits of a reduced energy consumption and moderate data rate [29,30]."]} +{"196191596|13475127": ["Long-range (LoRa) transmissions require either a previously established infrastructure, such as a ground base station, or satellite connectivity [1].", "which, in many cases, are lost to strong currents or vandalism [1]."]} +{"70142292|61132": ["AS AN emerging technology, unmanned aerial vehicles (UAVs) or drones have attracted much attention for critical important applications in border surveillance, environmental monitoring, disaster surveillance, and aerial photography [1]."]} +{"54553968|9830350": ["Clustering is a suitable routing technology for large-scale monitoring systems, with a number of advantages such as scalability, data convergence, lower load, low power consumption, robustness [31]."]} +{"53717994|61132": ["There are three main types of routing protocols, namely, proactive, reactive, and geographic [70].", "One of the main challenges in the design of co-operative applications involving Multiple UAVs (Multi-UAVs) is the formulation of a network that can provide connectivity among the different types of employed vehicles, protecting at the same time the vehicles and the fleet mission from failures [70].", "To this end, there are three main energy-aware routing protocols: multipath-based protocols, node-based protocols, and cluster-based protocols [70]."]} +{"53717994|206901977": ["In terms of networking, saving energy in UAVs can be achieved [76] by (a) data reduction, (b) network coding, and (c) energy-ef\ufb01cient routing."]} +{"8566011|205286988": []} +{"21737152|3055684": ["[23] propose theoretical models for energy harvesting in wireless communication networks."]} +{"21737152|12029139": []} +{"3311440|1230643": ["Proliferating real-world implementations of wireless sensor networks (WSNs) and an abundant number of studies for decades have proven that WSNs are one key enabling technology for monitoring environments, not only in military, but also in industry and civil areas [1]."]} +{"30284563|12060835": []} diff --git a/edge/graph_204992480.jsonl b/edge/graph_204992480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_205007974.jsonl b/edge/graph_205007974.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be6634eb4739b1adb952eafafa5fde42d3c1ad69 --- /dev/null +++ b/edge/graph_205007974.jsonl @@ -0,0 +1,3 @@ +{"30148118|1876323": ["\u2026a sliding mode control law that can be used to control the proxy (initially modeled as a point mass) is given by1\na Fsgn (1) with d p d p (2) and F the actuator force magnitude limit (see, for instance, Slotine and Li (1991) or Hung et al. (1993) for an introduction to sliding mode control).", "and F the actuator force magnitude limit (see, for instance, Slotine and Li (1991) or Hung et al. (1993) for an introduction to sliding mode control)."]} +{"25705913|1452734": []} +{"1761803|205007974": ["While a survey and discussion of the state of the art is out of the scope of this paper (the reader is referred to e.g. Vanderborght et al. (2013)), we limit ourselves here to a few notes on the trend."]} diff --git a/edge/graph_20506007.jsonl b/edge/graph_20506007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b519d01284609df25741406798d54a4d6a2d12f --- /dev/null +++ b/edge/graph_20506007.jsonl @@ -0,0 +1,3 @@ +{"7506472|6327434": ["Failure identification for actuators as well as sensors may require a more specific test, such as multiple-model hypothesis testing [ 26 ]-[29]."]} +{"199091519|6327434": []} +{"60766682|6327434": []} diff --git a/edge/graph_205131192.jsonl b/edge/graph_205131192.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20516386.jsonl b/edge/graph_20516386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20517248.jsonl b/edge/graph_20517248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20527696.jsonl b/edge/graph_20527696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f956d216998e30a26346850f0503b9e551b9faa --- /dev/null +++ b/edge/graph_20527696.jsonl @@ -0,0 +1,11 @@ +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"251249|870434": []} +{"902018|870434": ["In summary, node deployment algorithms designed for UASNs need to address the adverse physical channel conditions and water mobility while staying energy-efficient [5]."]} +{"29398427|2469117": ["Localization is one of the fundamental tasks in designing 3D wireless networks and generally requires several anchor nodes and distance or angle measurements between these anchors and the unknown nodes [49]."]} +{"29398427|2835258": ["There exist several infrastructure control techniques such as topology control designs [1\u20133], localized geometrical structures [4\u20137], dynamic cluster techniques, position-based routing [8\u201310], and power management protocols [11, 12].", "Re ac tiv el oc al iz at io n al go rit hm [3 9] Bu oy s N ot sa tis fie d H ig h Sm al l Lo w Ac tiv e"]} +{"33122326|61132": ["When a group of UAVs is used as a communication network, it usually receives the name of Flying Ad Hoc Networks (FANET) [6] or Aerial Ad Hoc Network (AANET) [2] or simply UAV networks [7]."]} +{"33122326|18657007": ["UAVs are envisioned to be used in tactical missions, of either rescue or military nature, that typically involve search for victims or other targets [1\u20134]."]} +{"15565890|870434": ["A recent survey [2] on underwater networks highlights the importance of sparse and mobile networks due to the immense volume of the underwater domain."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"10278666|2835258": ["Nonetheless geographical routing, as surveyed in [12], could also be e\ufb03cient in speci\ufb01c contexts."]} diff --git a/edge/graph_205281713.jsonl b/edge/graph_205281713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20528549.jsonl b/edge/graph_20528549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5b6fe3ea22e2ac963514ee59dbe8fd8489ca92b --- /dev/null +++ b/edge/graph_20528549.jsonl @@ -0,0 +1 @@ +{"62684917|16717715": []} diff --git a/edge/graph_205286236.jsonl b/edge/graph_205286236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c353d3eac953617f063c5b26bc34e15409235dcb --- /dev/null +++ b/edge/graph_205286236.jsonl @@ -0,0 +1,70 @@ +{"9252709|4474193": ["A lot of work has been done for DSOPs including diversity control schemes [18], memory based schemes [4], [17], adaptive schemes [2], multi-population schemes [4], and time detection approaches [5].", "When dynamic multi-objective optimization problems are concerned, only a few studies are available in the literature [2], [5], [6], [7].", "Many real world optimization problems exist in uncertain environments [2]."]} +{"207633921|4474193": ["Evolutionary algorithms which have been widely studied for static optimization problems attracted an increasing attention over the past years on dynamic optimization problems (DOPs) (Branke, 2002; Jin & Branke, 2005; Morrison, 2004; Weicker, 2003)."]} +{"6852082|4474193": ["The dynamic nature of problems imposes great challenges to the current available optimization techniques [17]."]} +{"12226157|2373140": ["A comprehensive survey on DVRPs is available in [44]."]} +{"12226157|4474193": ["Dynamic optimization problems (DOPs) are challenging since the aim of an algorithm is not only to find the optimum of the problem quickly, but to efficiently track the moving optimum when changes occur [29].", "Therefore, the overall offline performance [29] is defined as follows:", "In contrast, once ACO algorithms are enhanced properly, they are able to adapt to dynamic changes since they are inspired from nature, which is a continuously changing process [2, 3, 29]."]} +{"12006713|4474193": []} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"16023406|4474193": ["To address this challenge, several approaches have been developed into EAs to improve their performance in dynamic environments, see [5,12,19,20] for examples.", "The height and width of each peak were randomly generated with a uniform distribution in [30, 70] and [1, 12] respectively."]} +{"24077644|18151539": ["There has been previous promising work on both train scheduling and train rescheduling using EC techniques (Fang et al. 2015)."]} +{"26028738|44944144": ["The mobile ad hoc network (MANET) [1] is a multi-hop and wireless network set up by wireless mobile nodes that have any fixed network infrastructure.", "The existing routing protocols in MANETs can be classified into three categories: reactive, proactive, and hybrid [1]."]} +{"10581647|4474193": ["Many evolutionary algorithms have been developed to address DOPs [2], [3], [4], [5], [6].", "In this work, we focus on dynamic optimization problems (DOPs), where the specifications (often known as objectives or fitness functions in evolutionary optimization) of the optimization change over time, causing the global optima to shift as well [1], [2]."]} +{"14857290|4474193": ["needs to take into account changes during the optimization process as time goes 36 by [1, 12, 13].", "\u2022 Slow : Continuously focusing on diversity may slows down, or even distract 706 the optimisation process [12].", "\u2022 Difficulty in identifying the correct mutation size (in case of Hyper-mutation 610 and VLS) or the number of sub-swarms (in case of Hierarchy PSO): too small 611 steps will resemble local search while too large steps will result in random 612 search [12].", "the broader area of uncertainty and dynamic environments, was briefly surveyed 59 and classified in 2005 in [12]."]} +{"4472782|4474193": ["By far, most research on dynamic optimization has focused on tracking moving optima (TMO) [2], [4], [5], [6], [7], [8], where, whenever a change occurs, the new global optimal solution is targeted.", "Such optimization problems are termed as dynamic optimization problems (DOPs) [1], [2].", "More comprehensive surveys on dynamic optimization and robust optimization can be found in [1], [2], [16].", "For an overview of using fitness approximation in EAs, the reader is referred to [2], [45].", "A transformation matrix for the i-th peak Ai(t+ 1) is obtained by: Ai(t + 1) = Rr[1],r[2](\u03b8i(t + 1)) \u00b7 Rr[3],r[4](\u03b8i(t + 1)) \u00b7 \u00b7 \u00b7Rr[l\u22121],r[l](\u03b8i(t+ 1)) Step 5."]} +{"205708218|4474193": ["Due to the dynamism of real-world optimization problems, ynamic optimization problems (DOPs) have received extensive nterest in recent years [1,2]."]} +{"1759991|4474193": [", [11, 23]; the focus of this chapter is to present similar advances within the context of particle swarm optimization."]} +{"11621747|4474193": []} +{"7344333|4474193": ["Some of the main topics that should be addressed are the following ones [4]: 1."]} +{"11411809|4474193": ["Peaks shape Cone Basic function No Change severity, s 1, 2, 3, 5 Number of dimensions, D 5 Correlation Coefficient, \u03bb 0 Peaks location range [0\u2013100] Peak height [30.", "The first benchmark used in this paper is the Moving Peaks Benchmark (MPB) [4,50], which is the most commonly used benchmark for evaluating algorithms in dynamic environments [51]."]} +{"1883062|4474193": ["so as to match the attention paid to the fields of dynamic single-objective optimization problems [6] and static MOPs."]} +{"14563117|4474193": ["In Jin and Branke (2005), Branke states: For most real-world problems, however, it is hoped that changes are rather smooth and, thus, a lot can be gained by transferring knowledge from the past (Jin and Branke 2005, p. 310) The majority of studies assumes that there is a signi\ufb01cant correlation\u2026", "\u2026real-world problems, however, it is hoped that changes are rather smooth and, thus, a lot can be gained by transferring knowledge from the past (Jin and Branke 2005, p. 310) The majority of studies assumes that there is a signi\ufb01cant correlation between the position of the global optimum before\u2026"]} +{"60865180|10287248": []} +{"6970737|14441987": ["Mobile Ad Hoc Networks (MANETs) [38] are networks in which all nodes are mobile and communicate with each other via wireless connections."]} +{"6970737|1762301": ["In recent years a large number of MANET routing algorithm have been proposed (see [1] for an overview)."]} +{"16317271|4474193": []} +{"10195275|4474193": ["The overall of\ufb02ine performance [10] of an ACO on a DTSP is de\ufb01ned as follows: where \ud835\udc45 is the number of runs, \ud835\udc38 is the number of iterations, and \ud835\udc43 \u2217 \ud835\udc56\ud835\udc57 de\ufb01nes the tour cost of the best ant of iteration \ud835\udc56 of run \ud835\udc57 .", "The difference between stationary and dynamic optimization problems is that the aim of the former problems is to locate the static global optimum ef\ufb01ciently whereas the aim of the latter problems is to track the moving global optimum ef\ufb01ciently [10].", "In case the changing environments have similarities, the re-optimization time may be improved by transferring knowledge from previous environments [1], [10], [12]."]} +{"14278332|4474193": ["where P \u2217 ij defines the tour cost of the best ant since the last dynamic change of iteration i of run j [7].", "However, in many real-world problems we have to deal with dynamic environments, where the optimum is moving, and the objective is not only to locate the optimum but to track it also [7]."]} +{"16276133|63137": ["For an exhaustive analysis of the similarities between ant algorithms and PBIL please refer to [ 24 ]."]} +{"7311042|4474193": ["In contrast, once enhanced properly, ACO algorithms are able to adapt to dynamic changes since they are inspired from nature, which is a continuously changing process [1, 16].", "Dynamic optimization problems (DOPs) are challenging since the aim of an algorithm is not only to find the optimum of the problem quickly, but to efficiently track the moving optimum when changes occur [16]."]} +{"14482595|4474193": ["In view of the importance of optimization in dynamic environments, numerous researchers and scientists attempt nowadays to design algorithms for solving these problems [8]."]} +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"7814935|13867280": ["MAs combine EAs with local search (LS) methods and hence are also referred to as genetic local search (Krasnogor and Smith 2005; Smith 2007)."]} +{"7814935|4474193": ["Over the past decade, a number of approaches (Branke et al. 2000; Branke 1999; Cobb 1990; Uyar and Harmanci 2005; Wang and Wang 2006; Wang et al. 2007, 2009a; Yang 2003, 2008; Yang and Yao 2005, 2008) have been developed into EAs for DOPs and readers are referred to ( Jin and Branke 2005; Yang et al. 2007) for a comprehensive overview.", "\u2026(Branke et al. 2000; Branke 1999; Cobb 1990; Uyar and Harmanci 2005; Wang and Wang 2006; Wang et al. 2007, 2009a; Yang 2003, 2008; Yang and Yao 2005, 2008) have been developed into EAs for DOPs and readers are referred to (Jin and Branke 2005; Yang et al. 2007) for a comprehensive overview."]} +{"6453301|4474193": ["Recently, there have been many attempts to solve these problems using evolutionary algorithms [1], differential evolution [5], [6], memetic algorithms [2], multi-agent algorithms [3], particle swarm optimization [4], and ant-colony optimization [7], [6]."]} +{"14058517|13867280": ["The use of multiple LS operators within a MA framework has been found advantageous to address the issue of problem-dependency of LS operators [49,52,55], e."]} +{"14058517|4474193": ["Theoretically, ACO algorithms are able to adapt to dynamic changes since they are inspired from nature, which is a continuous changing process [27].", "Such a problem becomes more challenging since the aim of an algorithm is not just to find the optimum of the problem, but to track the changing optima when changes occur [27].", "Optimization problems with such characteristics are known as DOPs [27]."]} +{"6547119|14441987": ["Mobile Ad Hoc Networks (MANETs) is becoming an active area of research [13]."]} +{"2630642|1708582": []} +{"22137664|4474193": []} +{"817748|4474193": []} +{"15566815|4474193": []} +{"16345288|175549": ["In the second variety, the children replace their parents, increasing the the number of non-parents allowed to survive [71].", "In the intervening years a variety of evolutionary computation models have emerged, collectively called Evolutionary Algorithms or EA [71].", "specific to the problem domain, and are most often applied to optimization problems [71].", "Evolutionary algorithms are usually classified into three primary areas: evolutionary programming, evolutionary strategies, and genetic algorithms [71]."]} +{"12450423|8530790": []} +{"958874|4474193": ["developed into traditional EAs to address DOPs [24], [47],"]} +{"205429043|4474193": []} +{"12985608|4474193": ["A review of recently proposed techniques aimed at solving dynamic optimization problems can be found in Jin and Branke (2005) ."]} +{"9204966|4474193": ["Rastrigin function (Sch\u00f6nemann 2004, 2007) (Tinos and Yang 1823) Dyn. royal road function (Fernandes et al. 2007, 2008) (Fernandes et al. 2008; Yang 2007) (Yang and Yao 2005) (Tin\u00f3s and Yang 2007a, b; Wang et al. 2009a, b; Yang 2003, 2007; Dyn. vehicle routing problem (DVRP) (Hanshar and Ombuki-Berman 2007; Montemanni et al. 2003) (Hanshar and Ombuki- Berman 2007; Pankratz 2005) Griewank function (Wineberg and Oppacher 2000) Moving parabola (Abbass et al. 2004; Mori and Kita 2000a, b) Moving peaks benchmark (MPB) (Lung and Dumitrescu 2007, 2009; Pelta et al. 2009a, b) (Mendes and Mohais 2005) (Ayvaz et al. 2006; Branke and Schmeck 2003; Eriksson and Olsson 2004; Jin and Branke 2005; Li and Yang 2008a, b; Lung and Dumitrescu 2007, 2009; Zou et al. 2004) (Bui et al. 2005a, b; Jin and Branke 2005; Kramer and Gallagher 2003; Mori and Kita 2000a, b; Ronnewinkel and Martinetz 2001; Ursem 2000) Rosenbrock function Shaky ladder hyperplane-defined functions (Rand and Riolo 2005, 2006) Time-linkage numerical problems (Bosman 2005, 2007) (Bosman 2005, 2007) Trap function based synthetic problems (Abbass et al. 2004; Laredo et al. 2008) XOR-based synthetic dynamic problems (Rohlfshagen et al. 2009a, b) (Yang 2003, 2005, 2006a, b) Other (Fernandes et al. 2007; Guntsch et al. 2001) (Ghosh and M\u00fchlenbein 2004) (Weicker and Weicker 1999) (Branke 1999; Tenne and Armfield 2007; Woldesenbet and Yen 2009; Yan et al. 2004) (Mori and Kita 2000a, b; Mori et al. 2000a, b Pose problem (Michalewicz et al. 2007) Rober problem Robust design Salting route optimization (Hu et al. 2007) (Handa et al. 2007) (Hu et al. 2007) Structural optimization (Handa et al. 2007) (Shi and Eberhart 2001; Venayagamoorthy 2004) Moving parabola (Eberhart and Shi 2001; Hu and Eberhart 2002) Moving peaks benchmark (MPB) (Trojanowski and Wierzchon 2009) (Branke and Schmeck 2003; Branke et al. 2000; Lung and Dumitrescu 2007, 2009) (Ayvaz et al. 2006) (Blackwell 2007; Blackwell and Branke 2004, 2006; Blackwell 2003, 2005; Du and Li 2008; Janson and Middendorf 2004; Li and Yang 2008a, b; Li et al. 2006; Lung and Dumitrescu 2007, 2009; Mendes and Mohais 2005; Meyer et al. 2006; Novoa et al. 2009; Parrott and Li 2004) (Meyer et al. 2006; Moser and Hendtlass 2007) Optimization in dynamic environments 1443 \u2022 Further explore multi-objective dynamic optimi- zation.", "\u2026(Tin\u00f3s and Yang 2007a, b; Wang et al. 2009a, b; Yang 2003, 2005, 2006a, b, 2007; Yang and Yao 2008) Dyn. knapsack problem (Branke et al. 2006a, b; Jin and Branke 2005; Karaman et al. 2005; Yang and Yao 2005) (Jin and Branke 2005; Mori and Kita 2000a, b; Sim\u00f5es and Costa 2003; Wang et al. 2009a,\u2026", "Synthetic dynamic problems DF1 generator (cones) (Eriksson and Olsson 2002; Esquivel and Coello Coello 2004, 2006; Morrison 2004; Peng and Reynolds 2004; Saleem and Reynolds 2000) Dynamic Ackley function (Sch\u00f6nemann 2004, 2007) Dynamic bit-matching (Jin and Branke 2005; Mori and Kita 2000a, b; Stanhope and Daida 1999) Dynamic deceptive functions (Tin\u00f3s and Yang 2007b; Wang et al. 2009a, b; Yang 2003, 2006b, 2007; Yang and Tin\u00f3s 2007a, b; Yang and Yao 2005, 2008) Dynamic knapsack problem (Branke et al. 2006a, b; Jin and Branke 2005; Karaman et al. 2005; Rohlfshagen and Yao 2009a, b; Sim\u00f5es and Costa 2003; Wang et al. 2009b; Yang 2008; Yang and Tin\u00f3s 2007a, b; Yang and Yao 2005) Dynamic Onemax function (Droste 2003; Fernandes et al. 2008; Wang et al. 2009a; Yang 2003, 2005, 2007, 2008; Yang and Tin\u00f3s 2007a, b; Yang and Yao 2008) Dynamic plateau functions (Wang et al. 2009a; Yang 2006b, 2008) Dynamic problem generator (Jin and Sendhoff 2004; Li and Yang 2008a; Morrison and De Jong 1999; Morrison 2004; Rand and Riolo 2005, 2006; Rohlfshagen and Yao 2009a, b; Tinos and Yang 2007c; Trojanowski and Wierzchon 2009; Ursem et al. 2002; Yang and Yao 2005) Dynamic Rastrigin function (Du and Li 2008; Olivetti de Fran\u00e7a et al. 2005; Sch\u00f6nemann 2004, 2007; Shi and Eberhart 2001; Tinos and Yang 1823; Venayagamoorthy 2004) Dynamic Rosenbrock function (Hu and Eberhart 2002; Olivetti de Fran\u00e7a et al. 2005; Shi and Eberhart 2001; Venayagamoorthy 2004) Dynamic royal road function (Fernandes et al. 2007, 2008; Tin\u00f3s and Yang 2007b; Wang et al. 2009a, b; Yang 2003, 2007; Yang and Tin\u00f3s 2007a, b; Yang and Yao 2005) Dynamic scheduling (Aydin and O \u00a8 ztemel 2000; Hart and Ross 1999; Mattfeld and Bierwirth 2004) Dynamic sphere (Arnold and Beyer 2002, 2006; Boumaza 2005; Olivetti de Fran\u00e7a et al. 2005; Sch\u00f6nemann 2004, 2007) Dynamic vehicle routing problem (DVRP) (Hanshar and Ombuki-Berman 2007; Montemanni et al. 2003; Pankratz 2005) Dynamic Griewank function (Olivetti de Fran\u00e7a et al. 2005; Shi and Eberhart 2001; Venayagamoorthy 2004; Wineberg and Oppacher 2000) Moving parabola (Abbass et al. 2004; Eberhart and Shi 2001; Hu and Eberhart 2002) Moving peaks benchmark (MPB) (Ayvaz et al. 2006; Blackwell and Branke 2004, 2006; Blackwell 2003, 2005, 2007; Branke and Schmeck 2003; Branke et al. 2000; Bui et al. 2005a, b; Du and Li 2008; Eriksson and Olsson 2004; Janson and Middendorf 2004; Jin and Branke 2005; Kramer and Gallagher 2003; Li and Yang 2008b; Li et al. 2006; Lung and Dumitrescu 2009; Mendes and Mohais 2005; Meyer et al. 2006; Moser and Hendtlass 2007; Novoa et al. 2009; Parrott and Li 2004; Pelta et al. 2009a, b; Ronnewinkel and Martinetz 2001; Trojanowski and Wierzchon 2009; Ursem 2000; Zou et al. 2004) Shaky ladder hyperplane-defined functions (SL-HDF) (Rand and Riolo 2005, 2006) Time-linkage numerical problems (Bosman 2007, 2005) Trap function based synthetic problems (Abbass et al. 2004; Laredo et al. 2008) XOR-based synthetic dynamic problems (Rohlfshagen et al. 2009a, b; Yang 2003, 2005, 2006a, b) Other synthetic dynamic problems (Branke 1999; Carlisle and Dozier 2000; Dam et al. 2007; Fernandes et al. 2007; Ghosh and M\u00fchlenbein 2004; Guntsch et al. 2001; Mori and Kita 2000a, b; Mori et al. 2000a, b; Weicker and Weicker 1999; Woldesenbet and Yen 2009; Yan et al. 2004; Yen et al. 2001) Real world applications Aerospace design (Mack et al. 2007) Car distribution system (Michalewicz et al. 2007) Evolutionary robotics (Tin\u00f3s and Yang 2007a) Financial optimization problems (Tezuka et al. 2007) Mobile ad hoc networks (Yang et al. 2010) Modeling of ship trajectory (Smierzchalski and Michalewicz 2000) Path planning (Elshamli et al. 2004; Michalewicz et al. 2007) Pollution control (Michalewicz et al. 2007) Pose problem (Rossi et al. 2008) Rober problem (Tumer and Agogino 2007) Robust design (Fan et al. 2007; Goh and Tan 2007; Handa et al. 2007; Hu et al. 2007; Ling et al. 2007; Rocco and Salazar 2007) Salting route optimization (Handa et al. 2007) Structural optimization (Neri and M\u00e4kinen 2007) Varied-line-spacing holographic grating (VLSHG) (Ling et al. 2007) Wireless sensor networks (Quint\u00e3o et al. 2007) MPB is replaced by ''cones'' [as in the DF1 generator from Morrison and De Jong (1999) and Morrison (2004)] or more complex functions like Sphere, Griewank, Rastrigin, etc. that are typical test problems in continuous optimization .", "\u20262003; Eriksson and Olsson 2004; Jin and Branke 2005; Li and Yang 2008a, b; Lung and Dumitrescu 2007, 2009; Zou et al. 2004) (Bui et al. 2005a, b; Jin and Branke 2005; Kramer and Gallagher 2003; Mori and Kita 2000a, b; Ronnewinkel and Martinetz 2001; Ursem 2000) Rosenbrock function Shaky ladder\u2026", "In the experimental studies conducted for FMSO, the authors observed a greater robustness of this algorithm than that of several instances of MPB. Novoa et al. (2009) also used a multi-swarm PSO algorithm but adding an operator for controlling particle failures (CPF) and tested it on the moving peaks benchmark obtaining very good results.", "2004) Evolutionary programming EP (Li and Yang 2008a; Tinos and Yang 1823) Genetic algorithms GA (Abbass et al. 2004; Bui et al. 2005a, b; Dam et al. 2007; Deb and Nain 2007; Fan et al. 2007; Jin and Branke 2005; Kramer and Gallagher 2003; Laredo et al. 2008; Ling et al. 2007; Mack et al. 2007; Mattfeld and Bierwirth 2004; Mori and Kita 2000a, b; Mori et al. 2000a, b; Pankratz 2005; Rand and Riolo 2005; Rand and Riolo 2006; Rocco and Salazar 2007; Ronnewinkel and Martinetz 2001; Sim\u00f5es and Costa 2003; Stanhope and Daida 1999; Tezuka et al. 2007; Tin\u00f3s and Yang 2007a, b, c; Ursem 2000; Wang et al. 2009a, b; Weicker 2002; Wineberg and Oppacher 2000; Yang 2006a, b, 2006a, b, 2007, 2008; Yang and Tin\u00f3s 2007a, b; Yang and Yao 2008) Memetic algorithms MA (Handa et al.", "2006a, b; Woldesenbet and Yen 2009) Off-line performance (Branke and Schmeck 2003; Eriksson and Olsson 2004; Jin and Branke 2005; Li and Yang 2008a; Novoa et al. 2009; Yang 2005, 2006a, 2007, 2008; Yang and Tin\u00f3s 2007a, b; Yang et al. 2010; Zou et al. 2004) Off-line performance evolution (Branke 1999; Branke et al.", "2008; Weicker and Weicker 1999) Evolutionary algorithms EA (Barrico and Antunes 2007; Bosman 2007, 2005; Branke 1999; Branke and Schmeck 2003; Branke et al. 2006a, b; Droste 2003; Eriksson and Olsson 2002, 2004; Goh and Tan 2007; Handa et al. 2007; Jin and Branke 2005; Jin and Sendhoff 2004; Karaman et al. 2005; Li and Yang 2008a, b; Lim et al. 2007; Morrison 2004; Neri and M\u00e4kinen 2007; Quint\u00e3o et al. 2007; Richter 2005; Richter and Yang 2009; Rocco and Salazar 2007; Rohlfshagen et al. 2009a, b; Rossi et al. 2008; Smierzchalski and Michalewicz 2000; Tenne and Armfield 2007; Tumer and Agogino 2007; Ursem et al. 2002; Woldesenbet and Yen 2009; Yan et al. 2004; Yang and Yao 2005, 2008; Zou et al. 2004) Evolutionary programming EP (Li and Yang 2008a; Tinos and Yang 1823) Genetic algorithms GA (Abbass et al.", "2004; Eberhart and Shi 2001; Hu and Eberhart 2002) Moving peaks benchmark (MPB) (Ayvaz et al. 2006; Blackwell and Branke 2004, 2006; Blackwell 2003, 2005, 2007; Branke and Schmeck 2003; Branke et al. 2000; Bui et al. 2005a, b; Du and Li 2008; Eriksson and Olsson 2004; Janson and Middendorf 2004; Jin and Branke 2005; Kramer and Gallagher 2003; Li and Yang 2008b; Li et al. 2006; Lung and Dumitrescu 2009; Mendes and Mohais 2005; Meyer et al. 2006; Moser and Hendtlass 2007; Novoa et al. 2009; Parrott and Li 2004; Pelta et al. 2009a, b; Ronnewinkel and Martinetz 2001; Trojanowski and Wierzchon 2009; Ursem 2000; Zou et al. 2004) Shaky ladder hyperplane-defined functions (SL-HDF) (Rand and Riolo 2005, 2006)", "\u2026evolution (Boumaza 2005; Branke et al. 2006a, b; Woldesenbet and Yen 2009) Off-line performance (Branke and Schmeck 2003; Eriksson and Olsson 2004; Jin and Branke 2005; Li and Yang 2008a; Novoa et al. 2009; Yang 2005, 2006a, 2007, 2008; Yang and Tin\u00f3s 2007a, b; Yang et al. 2010; Zou et al.\u2026", "\u2026Branke 1999; Branke and Schmeck 2003; Branke et al. 2006a, b; Droste 2003; Eriksson and Olsson 2002, 2004; Goh and Tan 2007; Handa et al. 2007; Jin and Branke 2005; Jin and Sendhoff 2004; Karaman et al. 2005; Li and Yang 2008a, b; Lim et al. 2007; Morrison 2004; Neri and M\u00e4kinen 2007; Quint\u00e3o\u2026", "\u2026b; Yang 2003, 2005, 2006a, b, 2007; Yang and Yao 2008) Dyn. knapsack problem (Branke et al. 2006a, b; Jin and Branke 2005; Karaman et al. 2005; Yang and Yao 2005) (Jin and Branke 2005; Mori and Kita 2000a, b; Sim\u00f5es and Costa 2003; Wang et al. 2009a, b; Yang 2008; Yang and Tin\u00f3s 2007a, b) Dyn.", "\u2026Wang et al. 2009a, b; Yang 2003, 2006b, 2007; Yang and Tin\u00f3s 2007a, b; Yang and Yao 2005, 2008) Dynamic knapsack problem (Branke et al. 2006a, b; Jin and Branke 2005; Karaman et al. 2005; Rohlfshagen and Yao 2009a, b; Sim\u00f5es and Costa 2003; Wang et al. 2009b; Yang 2008; Yang and Tin\u00f3s 2007a, b;\u2026", "From the search results, it can be observed that one of the most widely used synthetic problems nowadays is still the Moving Peaks Benchmark (MPB) (Branke 1999).", "\u2026and Dumitrescu 2007, 2009; Pelta et al. 2009a, b) (Mendes and Mohais 2005) (Ayvaz et al. 2006; Branke and Schmeck 2003; Eriksson and Olsson 2004; Jin and Branke 2005; Li and Yang 2008a, b; Lung and Dumitrescu 2007, 2009; Zou et al. 2004) (Bui et al. 2005a, b; Jin and Branke 2005; Kramer and\u2026", "\u20262004, 2006; Morrison 2004; Peng and Reynolds 2004; Saleem and Reynolds 2000) Dynamic Ackley function (Sch\u00f6nemann 2004, 2007) Dynamic bit-matching (Jin and Branke 2005; Mori and Kita 2000a, b; Stanhope and Daida 1999) Dynamic deceptive functions (Tin\u00f3s and Yang 2007b; Wang et al. 2009a, b; Yang\u2026", "For example, it was covered in the books by Branke (2001), Weicker (2003), Morrison (2004), Yang et al. (2007a, b) and in the survey by Jin and Branke (2005).", "\u20262005, 2007; Branke and Schmeck 2003; Branke et al. 2000; Bui et al. 2005a, b; Du and Li 2008; Eriksson and Olsson 2004; Janson and Middendorf 2004; Jin and Branke 2005; Kramer and Gallagher 2003; Li and Yang 2008b; Li et al. 2006; Lung and Dumitrescu 2009; Mendes and Mohais 2005; Meyer et al.\u2026"]} +{"16178954|4474193": ["However, this strategy may be inefficient, especially in cases where the changing environments are similar [12]."]} +{"33579996|1762301": []} +{"15985791|4474193": ["Such dynamically changing problems, where problem related data, constraints or domain change due to unpredictable events and upcoming problem space is not revealed until these events are triggered, are referred as dynamic optimization problems (DOPs) in the related literature [1-5].", "Number of dimensions, D 5 Correlation coefficient, \u03bb 0 Peaks location range [0-100] Peak height [30-70] Peak width [1-12]"]} +{"6205963|4474193": ["For an overview, the reader is referred to [12]\u2013[14], [25], and [32]."]} +{"9709565|4474193": ["These problems often arise from real-world problems solving, particularly in optimal control problems or problems requiring on-line optimization [1], [2].", "above benchmarks, c(x, t) = 41+ \u22115 i=2(x 2 i\u221210 cos(2\u03c0xit)), which is a time-varing multi-variable function and we set t \u2208 [1, 4] and we divide it into four equal time steps, namely, t1 = 1, t2 = 2, t3 = 3 and t4 = 4."]} +{"1505361|14441987": ["In recent years there has been an increasing interest in Mobile Ad Hoc Networks (MANETs) [13]."]} +{"8373203|4474193": ["\u2026and Subject Descriptors G.1 [Numerical Analysis]: Optimization; F.2.1 [Analysis of Algorithms and Problem Complexity]: Numerical Algorithms and Problems\nGeneral Terms Algorithms, Performance, Experimentation\nKeywords Evolutionary Computation, Swarm Intelligence, Optimization in Dynamic Environments", "For example, traffic conditions in a city change dynamically and continuously."]} +{"125701181|4474193": ["The first benchmark used in this paper is the MPB (Branke, 1999a, 1999b), which is the most commonly used benchmark for evaluating algorithms in dynamic environments (Yaochu and Branke, 2005)."]} +{"15287890|13867280": ["This is also indicated in recent works on MAs where MAs are shown to achieve high-quality solutions more efficiently than their conventional counterparts on a lot of practical industry and engineering applications [15, 24, 25, 28]."]} +{"15287890|4474193": ["Recently, dynamic optimization problems (DOPs) have gained more and more concern from the evolutionary computation community [2, 6, 10, 34, 35, 39, 40] since many real-world optimization problems"]} +{"12381218|4474193": []} +{"7369722|4474193": ["The field of dynamic optimization is related to the applications of nature-inspired algorithms [5].", "A common method used to compare algorithms for DOPs is the best offline performance [5], which is defined as:", "There is a growing interest in the evolutionary computation (EC) community to apply nature-inspired algorithms to address combinatorial DOPs due to their inspiration from nature, which is a continuous adaptation process [5].", "Traditionally, the target in DOPs is to track the moving optimum over time [5]."]} +{"2878052|2373140": ["Over the years, many variations of the dynamic VRP (DVRP) have been studied, including the VRP with stochastic demands, the dynamic VRPTW, and many others (see [42] for a comprehensive review)."]} +{"2878052|4474193": ["The VRP becomes more challenging if it is subject to a dynamic environment, since the moving optimum needs to be tracked [26].", "However, such solution requires an extensive computation time to re-optimize while in real-world applications the time available is limited [26]."]} +{"8092606|4474193": ["In case the changing environments have similarities, the re-optimization time may be improved by transferring knowledge from previous environments [1], [12], [15], [23].", "ACO algorithms can adapt to dynamic changes since they are inspired from nature, which is a continuous changing environment [3], [12].", "The difference between stationary and dynamic optimization problems (DOPs) is that the aim for the former type of problems is to locate the static global optimum efficiently whereas the aim for the latter type of problems is to track the moving global optimum efficiently [12], [23], [30]."]} +{"41146762|4474193": []} +{"12203397|4474193": ["The algorithms were executed for G = 1000 iterations and the overall o\ufb04ine performance is calculated as follows: where P \u2217 ij de\ufb01nes the tour cost of the best ant since the last dynamic change of iteration i of run j [10].", "Theoretically, ACO algorithms can adapt to dynamic changes since they are inspired from nature, which is a continuous adaptation process [10]."]} +{"2754582|4474193": ["A comprehensive survey on metaheuristics, especially evolutionary algorithms (EAs), for general DOPs can be found in Jin & Branke (2005), Cruz et al. (2011) and Nguyen et al. (2012)."]} +{"2754582|12846121": ["\u2026route planning for car navigation in Japan (Kanoh, 2007; Kanoh & Hara, 2008) DTSP (Li et al., 2006) Evolvable hardware problem (Tawdross et al., 2006) Various dynamic scheduling problems (Ouelhadj & Petrovic, 2009) Adaptive contamination source identification problem (Liu, 2008) Introducing/"]} +{"34934497|4474193": ["where P \u2217 ij defines the tour cost of the best ant since the last dynamic change of iteration i of run j [7].", "It is believed that ACO algorithms can adapt to dynamic changes since they are inspired from nature, which is a continuous adaptation process [7]."]} +{"16621024|4474193": ["Similarly to other nature-inspired algorithms [8, 16], ACO algorithms can adapt to dynamic changes since they are also inspired from nature, which is a continuous adaptation process.", "where P \u2217 ij defines the fitness of the best-so-far ant since the last dynamic change of iteration i of run j [8]."]} +{"21949310|4474193": []} +{"19705976|4474193": ["There are four major categories of uncertainties that have been dealt using population based evolutionary approaches: noise in the fitness function, perturbations in the design variables, approximation in the fitness function, and dynamism in optimal solutions [1]."]} +{"2461294|4474193": []} diff --git a/edge/graph_20528689.jsonl b/edge/graph_20528689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_205286988.jsonl b/edge/graph_205286988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dedefdad8021aaa99e61a8fd8e42a81974e868c --- /dev/null +++ b/edge/graph_205286988.jsonl @@ -0,0 +1,4 @@ +{"2292839|1230643": ["This paper focuses on reducing the sensitivity of the operation and monitoring of sensor networks to the ambiguity of the propagation model of the radio signal."]} +{"13416245|15300368": []} +{"11444935|14441987": ["Since research on ad hoc routing began with packet radio networks, numerous protocols have been proposed [7]."]} +{"670285|1230643": ["Recent advances in micro-electro-mechanical systems (MEMS) and low power and highly integrated digital electronics have led to the development of micro sensors [1,9,17,21,22,24,27].", "Each sensor node i will calculate its r-value ri by using d as follows: From [1],", "using the approaches presented in [1,3].", "Then d will be calculated as follows:\nd = Trequired\u2211 \u2200i\u2208Path ( pi + \u2211qi j=1 p j ) \u2217 \u03bbRT (4) Each sensor node i will calculate its r-value ri by using d as follows:\nFrom [1],\nd = 1 ri\u00b5 \u2212 \u03bbRT \u2217 ( pi + \u2211qi j=1 p j ) ri = 1\nd \u2217 \u00b5 + \u03bbRT \u00b5 \u2217\n( pi +\nqi\u2211 j=1 p j\n) (5)\nThen the problem will be to maximize the total throughput on each particular path:\nMax ( \u2211 \u2200i\u2208Path (1 \u2212 ri ) ) where 0 \u2264 ri < 1."]} diff --git a/edge/graph_20531036.jsonl b/edge/graph_20531036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_205430214.jsonl b/edge/graph_205430214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29216a1dd9df3f883192cbb60e0dea4b9b2436e5 --- /dev/null +++ b/edge/graph_205430214.jsonl @@ -0,0 +1,19 @@ +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"38243416|8530790": ["Thanks to the contributions of several researchers over the last two decades (Schaffer, 1984; Horn et al., 1994; Srinivas and Deb, 1994; Fonseca and Fleming, 1995; Knowles and Corne, 1999; Zitzler and Thiele, 1999; Jensen, 2003), just to name a few, EMO techniques have arisen as important tools for optimization with multiple criteria.", "In this work, the local search with quadratic approximations is coupled with the Multiobjective Genetic Algorithm (MOGA; Fonseca and Fleming, 1995)."]} +{"206552182|8530790": ["Several researchers have contributed in this area over last decades [1], [2], [3], [4], [5]."]} +{"205452370|8530790": ["There are three well-known approaches used as fitness-assignment strategies in multi-objective GAs [6].", "The population sizes of GAs are chosen as 1000.", "7\u20139 show the performance of these GAs in terms of the minimum number of hierarchical-order violations, the minimum number of set violations, and the maximum total weights of the best chromosomes, respectively.", "After the termination of GAs, the best chromosomes\u2019 contents are used as the solutions.", "VEGAs poor performance becomes clearer as the graph size increases in hierarchical-order violations.", "The population sizes of GAs are selected as 1000, and the number of generations of GAs is chosen as ten times the graph size.", "GAs are also very successful in multi-objective optimization problems.", "The number of generation of GAs is 10 times the graph size."]} +{"6525688|4474193": ["A comprehensive survey on evolutionary optimization in uncertain environments can be found in [19]."]} +{"13997318|8530790": []} +{"15286452|8530790": []} +{"206681818|8530790": []} +{"44962334|63137": ["The results presented in this section were obtained in [25,52,67].", "This is done by studying these algorithms under a common algorithmic framework called model-based search (MBS) [67].", "Zlochin et al. [67] have proposed a unifying framework for so-called model-based search (MBS) algorithms.", "The SGA parameter value update that we describe in the following is a generalization of the one that was presented in [67] (which was itself a generalization of the one that was given in [52])."]} +{"12564763|4474193": ["significance and implications [20], [33], [34], [39], [40], [43],"]} +{"1910236|8530790": ["Nevertheless, from a practical point of view it is \ndesirable with most applications to include Permission to make digital or hard copies of all or part \nof this work for personal or classroom use is granted without fee provided that copies are not made or \ndistributed for pro.t or commercial\u2026"]} +{"2755445|4474193": ["1In the present context, the definition of \u2018uncertainty\u2019 refers to the approximation errors in the fitness function due to the use of surrogate models based on the definitions given in [45]."]} +{"11897480|17383371": []} +{"11897480|4474193": []} +{"11897480|8530790": []} +{"206682327|4474193": []} +{"206682327|8113021": ["Elaborations on some of the applications cited above are available in [71] and [78]."]} +{"37925315|12681089": []} +{"44761686|1708582": []} diff --git a/edge/graph_205435103.jsonl b/edge/graph_205435103.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_205488310.jsonl b/edge/graph_205488310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a94f5618831e89015dbedac861208a7b5f01c9d8 --- /dev/null +++ b/edge/graph_205488310.jsonl @@ -0,0 +1,4 @@ +{"2034802|16489039": ["The formula for queries of term pairs ( Q 0 ) accounts for this term pairing.", "Given the nature of these research questions, a search log is an appropriate data collection approach, and search log analysis is an appropriate methodological technique for this investigation (Jansen, 2006).", "To determine economic value of the real time search traf\ufb01c, we leveraged Google AdWords (http://adwords.google.com/), which is Google\u2019s sponsored search platform (Fain & Pedersen, 2006; Jansen & Mullen, 2008).", "There has been no online search business model more successful than keyword advertising, \ufb01nancing Web search as we currently know it (e.g., Battelle, 2005; Jansen & Mullen, 2008)."]} +{"7259012|1805048": ["Following the classification of traditional CF-based RSs [2,3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches.", "CF approaches can be further grouped into model-based CF and neighborhood-based CF [2,3].", "Following the classification of traditional CF-based RSs [2] [3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches."]} +{"16228361|13365762": ["D MPEG-7 Color layout [1], and 80-", "D MPEG-7 Edge Histogram [1]."]} +{"9575750|1805048": []} diff --git a/edge/graph_205694962.jsonl b/edge/graph_205694962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4c0548425e0d54560c21bc1b0ea8294f80a3630 --- /dev/null +++ b/edge/graph_205694962.jsonl @@ -0,0 +1,18 @@ +{"1701262|11632848": ["Next, previous works on noise filters are briefly reviewed in Section 2.2, paying special attention to those filters on which our proposal is based."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"4499722|2875192": ["Image content analysis and classification methodologies are now more and more used for medical information mining and retrieval [23] [18] with the aim of Computer-Aided Diagnosis (CAD)."]} +{"15911890|18487363": ["Two of the most used technologies on the field are hidden Markov modeling (HMM) and dynamic programming search techniques for large-scale networks [10]."]} +{"30824724|192934": ["In clustering, the aim is to construct decision boundaries based on unlabeled training data.[49] Clustering is the process of finding natural grouping clusters in multidimensional feature space.", "[49] Image segmentation may be considered a clustering[51-53] process in which the pixels are classified into the attribute regions based on the texture feature vector calculated around the pixel local neighborhood.", "At times supervised image segmentation and classification methods become very expensive, difficult and even impossible to correctly select and label the training data with its true category.[49] Training is the main requirement of many ANN based algorithms where the classifiers need to be trained before it can be applied to segmentation and classification problem."]} +{"205701315|191396": []} +{"6054025|3241708": ["In addition, since collecting reliable labels is a time consuming and costly task, there is an increasing interest in using cheap, easy-to-get labels from nonexpert using frameworks like e.g. the Amazon Mechanical Turk 1 [49]\u2013[52]."]} +{"6054025|191396": ["First, a clustering of the instances [258] is performed using an unsupervised algorithm."]} +{"6054025|3330313": ["Similar to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38], several methods in label noise cleansing are based on ad hoc measures.", "Dealing with label noise is closely related to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38]."]} +{"28012712|8983048": ["In the literature, several reviews on image registration methods can be found: overall image registration in Brown (1992), Salvi et al. (2007), Wyawahare et al. (2009), Zitova\u00b4 and Flusser (2003), medical image registration in general (Elsen et al. 1993; Maintz and Viergever 1998; Bronzino 2000;\u2026"]} +{"28012712|206051485": ["In the literature, several reviews on image registration methods can be found: overall image registration in (Brown, 1992; Salvi et al., 2007; Wyawahare et al., 2009; Zitov\u00e1 and Flusser, 2003), medical image registration in general (Bronzino, 2000; Elsen et al."]} +{"28012712|7861381": ["TPS is an interpolation function that minimises the bending energy (Holden 2008).", "(2004)andareviewinHolden(2008)."]} +{"23079116|1691097": []} +{"23079116|10817088": []} +{"23079116|42648222": ["However, current solutions based on smartphones suffer from scalability, security and privacy issues, apart from providing only a snapshot of physiological conditions instead of a continuous and longitudinal view of the users\u2019 health status [169].", "Currently, approaches are being developed in order to avoid this information to be used for evil or non-ethical purposes [169,190,191]."]} +{"23079116|15219853": []} diff --git a/edge/graph_205699047.jsonl b/edge/graph_205699047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46e47667d6e7630b687b9df9fb98e2ccb218c438 --- /dev/null +++ b/edge/graph_205699047.jsonl @@ -0,0 +1 @@ +{"122137356|8363289": []} diff --git a/edge/graph_20600175.jsonl b/edge/graph_20600175.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5cc07dc63d6636fdfa9dcf79bf80b4c30ef9ec0 --- /dev/null +++ b/edge/graph_20600175.jsonl @@ -0,0 +1,3 @@ +{"14750891|18526204": ["The documents having similarity are determined using Information Visualization [12].", "Information Extraction that makes incorrect predictions on data is discarded [12].", "Some of the useful techniques used in text mining are as follows: Information Extraction, Information Visualization, Topic Tracking, Summarization, Categorization, and Clustering.", "For example, if user sets an alert for Web Mining it can provide us with topics related to mineral mining which are not useful for the users [12]."]} +{"14750891|60455": []} +{"10999823|60455": []} diff --git a/edge/graph_206011846.jsonl b/edge/graph_206011846.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..050d71cc16bbc6d1f01cd65c21ceb88a13f7ce9d --- /dev/null +++ b/edge/graph_206011846.jsonl @@ -0,0 +1 @@ +{"13866343|8058317": ["A more detailed treatment of all of these tasks can be found elsewhere [Venkateswaran94]."]} diff --git a/edge/graph_206051485.jsonl b/edge/graph_206051485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b00bc97c73f19f4b00688b791cf71c49e03d6e8 --- /dev/null +++ b/edge/graph_206051485.jsonl @@ -0,0 +1,3 @@ +{"1224379|53680608": ["Optical flow methods A special kind of method is optical flow, which is used to find small deformations in temporal sequences of images (see Horn and Schunck, 1981; Aggarwal and Nandhakumar, 1988; Barron et al., 1994).", "A special kind of method is optical \ufb02ow, which is used to \ufb01nd small deformations in temporal sequences of images (see Horn and Schunck, 1981; Aggarwal and Nandhakumar, 1988; Barron et al ., 1994)."]} +{"1278836|192934": ["In pattern recognition, image registration techniques to check image similarity based on a rational quantitative measure and to locate a template at the place of its optimum value is one of the oldest and fundamental image processing [1]."]} +{"29139203|25699143": []} diff --git a/edge/graph_206098069.jsonl b/edge/graph_206098069.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72fb3668d3d50f0b7f285c7f26240b98f8c04146 --- /dev/null +++ b/edge/graph_206098069.jsonl @@ -0,0 +1,52 @@ +{"26212855|14866098": ["[10] A.", "In recent years, there has been an increasing interest in performing an accurate classification of mental tasks in noninvasive endogenous BMIs [10\u201312]."]} +{"26212855|16362395": ["In recent years, there has been an increasing interest in performing an accurate classification of mental tasks in noninvasive endogenous BMIs [10\u201312].", "[12] F."]} +{"38416329|16362395": ["\u2026models such as linear discriminant analysis (LDA) and support vector machine (SVM) classifiers are most commonly used in BCI for classification, and heuristic optimization and search algorithms for maximizing single-trial classification performance (Lotte et al. 2007; Mason et al. 2007).", "Discriminative models such as linear discriminant analysis (LDA) and support vector machine (SVM) classifiers are most commonly used in BCI for classification, and heuristic optimization and search algorithms for maximizing single-trial classification performance (Lotte et al. 2007; Mason et al. 2007)."]} +{"62554343|16362395": ["In [2-4], the authors review a variety of classification algorithms, such as independent component analysis, support vector machines, and so on."]} +{"46331748|16362395": ["Brain-computer interfacing (BCI) applications based on the classification of EEG signals pose the high-dimensional pattern classification problem [1], due to (1) the presence of noise or outliers (as EEG signals have a low signal-to-noise ratio); (2) the need to represent time information in the features (as brain signal patterns are related to changes in time); (3) the non-stationarity of EEG signals, which may change quickly over time or within experiments."]} +{"6661632|192934": ["SVM is a good choice for classification in a high-dimensional space and is known for not being sensitive to the risk of over training [42]."]} +{"2792625|14866098": []} +{"11427924|16362395": ["By other side, SVM offers better generalization properties, and it is insensitive to overtraining and to the curse-of-dimensionality; however, it provides a lower speed execution (71)."]} +{"11427924|5503545": []} +{"3449071|14866098": []} +{"3449071|16362395": ["A complete and recent survey on machine learning techniques for BCIs can be found in [20]."]} +{"10171199|8113021": []} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"11278899|12188993": ["Therefore, software complexity also became an issue since conventional Von Neumann machines are not suitable for symbolic processing, nondeterministic computations, dynamic execution, parallel, distributed processing, and management of extensive knowledge bases [118]."]} +{"17442232|11894197": []} +{"17442232|16362395": []} +{"16362395|9270553": ["Indeed, BCI systems enable a subject to send commands to an electronic device only by means of brain activity [ 2 ]."]} +{"16362395|192934": []} +{"2491120|11459632": []} +{"2491120|5755816": ["Anyway the interested reader can refer to the many reviews devoted to BCI (e.g. [ 50] for a complete review of processing algorithms for fNIRS-BCIs or [51] for a review of ECoG-based BCIs) to have a deeper understanding of the other techniques."]} +{"2491120|16362395": ["For these reasons, many studies in the literature have been devoted to find classification algorithms with the acc uracy as high as possible (see [14] for a review of classification techniques in EEG-based BCIs and [15] for details about EMG classification).", "This is a very important peculiarity of SVMs, which makes them insensitive to the so-called \u2018 curse of dimensionality \u2019 , a major concern when designing EMG and EEG-based systems [14].", "The fact that the decision rule of SVM is a simple linear function in the kernel space makes SVM stable and characterized by low variance (variance reflects the sensitivity of the classifier to the training set used [14])."]} +{"32640699|9270553": []} +{"14637251|11894197": []} +{"15630455|8530790": ["A more thorough comparative analysis is the topic of future work, where we intend to make use of the multiobjective assessment techniques put forward by Fonseca and Fleming [ 3 ]."]} +{"17108434|14866098": []} +{"17108434|9270553": []} +{"15112390|9270553": ["A discussion of bit rate in BCI can be found in [6], [12], [14], [17].", "Current BCIs have maximum information transfer rates of 10-29 bits/min [6], [14]."]} +{"34414268|16362395": []} +{"34414268|9270553": []} +{"38379019|9270553": []} +{"39382270|16362395": []} +{"7914231|16362395": ["BCIs that use sensory-motor rhythm (SMR) form one of the examples of spontaneous mental strategy, based on the eventrelated desynchronization/synchronization which are produced by imagining hand, foot, or tongue movements with corresponding EEG electrodes positioned primarily over the motor cortex\u2026"]} +{"1073425|14866098": ["As a consequence, an effort to improve the spatial filtering methods [11], the feature extraction techniques [12, 13], and the classification algorithms [14\u201316] has been undertaken by the scientific community."]} +{"1073425|16362395": ["Technologically, most of the BCI mechanisms are based on electroencephalogram (EEG) techniques, where the sensors detecting the electric potentials originated by the neurons are placed on the scalp of the user [2]."]} +{"10478850|14866098": ["Generation of human neural activities related to performance or imagination of movement (motor imagery) is responsible of sensorimotor cortex [2, 16]."]} +{"10478850|16362395": ["These methods include several hybrid computing techniques such as autoregression [70], Fourier transform [54], higher-order statistics, common spatial pattern [70], wavelet transform [66], classification based on artificial neural networks (ANNs) [1], K-nearest neighbor [1], support vector machine (SVM) [30], extreme learning machine [52] and fuzzy set theory [58] to enhance the classification performance.", "The EEG signals are different from one user to another user in their frequency variations and task observations [54]."]} +{"60385584|3330313": []} +{"60385584|1097238": []} +{"60385584|15273230": []} +{"60385584|192934": ["Jain, Duin and Mao (2000) include a section on classi\ufb01er combination.", "Jain, Duin and Mao (2000) list eighteen classi\ufb01er combination schemes; Witten and Frank (2000) detail four methods of combining multiple models: bagging, boosting, stacking and error-correcting output codes whilst Alpaydin (2004) covers seven methods of combining multiple learners: voting,\u2026"]} +{"205709204|37213650": []} +{"69010178|14866098": ["Totally, the related works about imagery signals are less than those related to movement signals and [4].", "from electrodes site inside (invasive) or outside (non-invasive) the brain [3,4]."]} +{"69010178|16362395": ["In addition, coefficients AR or Multivariate Auto-Regressive (MVAR) model are used as features [5].", "An SVM classifier finds hyper-planes that split the classes.", "Combination of useful frequency and time information improves the performance of classifiers [5,6].", "In last studies, different types of classifiers such as Support Vector Machine (SVM) [5,8], Linear Vector Quantization (LVQ) [5,7], Linear Discriminant Analysis (LDA) [5,8], different kinds of neural network [5,9], etc.", "Results of the best classifier are compared with of results of SVM classifier (SVM classifier with Gaussian Radial Basis (RBF) kernel function is considered to classification data) results show that it is better than SVM (with average accuracy rate of 58.5% without any optimization algorithm).", "In addition, results of the best classifier (PSO-based optimal WNN), are compared with Support Vector Machine (the mean accuracy of SVM is 60%).", "In some other studies, Radial Basis function (RBF) kernelized SVM classifier is introduced as a powerful tool that has the highest performance accuracy among LDA, K-Nearest Neighbor (KNN), Quadratic Discriminant Analysis (QDA) and SVM [5,7].", "SVMs are part of the supervised learning method and are used for classification and regression.", "In last studies, different types of classifiers such as Support Vector Machine (SVM) [5,8], Linear Vector Quantization (LVQ) [5,7], Linear Discriminant Analysis (LDA) [5,8], different kinds of neural network [5,9], etc. are investigated [5,7,9,10].", "Comparison of the several feature extractions and classification approaches: e.g. PSO-based optimal WNN, AISbased optimal WNN, GA-based optimal ANN and Support vector machines (SVM).", "The average accuracy rate of PSO-based optimal WNN is better than others and also it is more acceptable than SVM (with average accuracy of \u223c60%)."]} +{"19998029|9270553": ["It is disadvantageous that the information transfer rate (whi ch is the commonly used BCI measurement for success [2], [19], [24], [25]) is decreased, but in reality the signal is much more usable for the subjects \u2014which is the most important goal."]} +{"7917980|16362395": ["As stated in [8] kNN has failed in several BCI experiments due to its sensitivity to the curse of dimensionality.", "SVM has a low speed of execution but has good generalisation properties [8].", "The classifier combination strategies such as boosting, bagging, and stacking has been used in BCI applications [8].", "When dealing with the nonlinear EEG data, linearity is the main limitation of LDA, which can cause poor outcomes [8].", "A number of widely used classifiers are Linear discriminant analysis (LDA), K-nearest-neighbor (kNN) algorithms, Support vector machine (SVM), Decision trees, Naive Bayes (NB) classifier and Neural networks (NN)[8].", "However, it performs efficiently with low-dimensional feature sets [8].", "Note that LDA and SVM are most useful techniques which separate data representing different classes by using hyperplanes [8]."]} +{"17403619|9270553": ["Brain-computer interface (BCI) is a new technology based on electroencephalographic (EEG) signals [1] that provides a new way for the patients with motor dysfunction to communicate with the outside world."]} +{"14843878|14866098": ["Skin responses such as sweating may alter the impedance of electrodes and cause artifacts in the EEG signals [7]."]} +{"14409937|16362395": []} +{"10568590|9270553": ["First, the EEG Available online 26 March 2008\nKeywords: Brain\u2013computer interface Neural networks Particle swarm optimization Migration Principle component analysis (PCA)\n12/$ - see front matter & 2008 Elsevier B.V."]} +{"7476147|14866098": []} +{"206682327|4474193": []} +{"206682327|8113021": ["Elaborations on some of the applications cited above are available in [71] and [78]."]} diff --git a/edge/graph_206098228.jsonl b/edge/graph_206098228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00c1ad1bd15fdfb5e144e156823cf006eda04519 --- /dev/null +++ b/edge/graph_206098228.jsonl @@ -0,0 +1,2 @@ +{"24763891|16362395": ["I N RECENT years, various methods for single-trial electroencephalography (EEG) analysis have been developed [1]\u2013[3]."]} +{"207116888|9270553": []} diff --git a/edge/graph_20611849.jsonl b/edge/graph_20611849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a6782f0e9727c8432e4b083a5809952533ea04d --- /dev/null +++ b/edge/graph_20611849.jsonl @@ -0,0 +1 @@ +{"25883705|9045232": []} diff --git a/edge/graph_20612430.jsonl b/edge/graph_20612430.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0d876bbce6ef47f20de905b90dfb487d61ba82a --- /dev/null +++ b/edge/graph_20612430.jsonl @@ -0,0 +1,10 @@ +{"2075465|2509135": ["The readers may refer to other publications in recent reviews [217], [218] and recent special issues, e."]} +{"2075465|12601073": []} +{"205458182|10542845": ["A detailed overview of different EDA approach es in both discrete and continuo us domains can be found in [159] and a recent survey was published in [130]."]} +{"205458182|9141490": ["EAs have been widely applied with a good measure of success to combinatori al optimization problems [33,26], constrained optimization problems [55], Data Mining and Knowledge Discovery [97], etc."]} +{"205458182|14724015": ["Other forms of mutation include single-node mutations and various forms of code-editing to remove unnecessar y code from trees have been proposed in the literature [209,206]."]} +{"205458182|1437067": ["EAs have been widely applied with a good measure of success to combinatori al optimization problems [33,26], constrained optimization problems [55], Data Mining and Knowledge Discovery [97], etc.", "EAs have been widely applied with a good measure of success to combinatorial optimization problems [33, 26], constrained optimization problems [55], Data Mining and Knowledge Discovery [97], etc. MultiObjective Evolutionary Algorithms (MOEAs) are one of the current trends in developing EAs."]} +{"34131234|2509135": ["INTRODUCTION Cognitive radio is a promising technology that enables next generation communication networks to utilize the spectrum more efficiently in an opportunistic fashion without interfering with the primary users (PUs) [1]."]} +{"3991902|8909218": ["Due to its short transmit-receive distance property, femtocell technique can also reduce energy consumption, prolong handset battery life, and increase network coverage [15], [16]."]} +{"2509135|12452682": []} +{"31630702|2509135": ["To serve this purpose, cognitive radio has been proposed due to its ability to agilely sense, enter, and leave radio spectrum without causing harmful interference to primary users [2]\u2013[4]."]} diff --git a/edge/graph_20617693.jsonl b/edge/graph_20617693.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c56e6c4eca96f21cc8070c1db542c66baae9d447 --- /dev/null +++ b/edge/graph_20617693.jsonl @@ -0,0 +1,2 @@ +{"37194368|18909090": ["Electrochemical biosensors can be a suitable alternative for the urgent need for rapid, high capacity, highly selective, and sensitive screening methods for the detection of antibiotic residues in food (Table 3) (Christ and Bendas, 2011)."]} +{"730686|2390193": ["Recent interest in nanotechnology has provided a wealth of diverse nanoscaffolds that could be used to support biomolecules/analyte immobilization due to their potential features (Figure 2) [21,22]."]} diff --git a/edge/graph_206191911.jsonl b/edge/graph_206191911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2948d16340b18250e132a2d0d1086626f73b054 --- /dev/null +++ b/edge/graph_206191911.jsonl @@ -0,0 +1,18 @@ +{"8445147|1236072": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"3721562|1230643": []} +{"8703679|14068482": ["The Sensor Web envisions uniform access to sensor resources comparable to the retrieval of information resources in the World Wide Web today [1]."]} +{"8507340|2906926": ["Aside from scalability issues, privacy continues to be a challenge for data collection [40, 58\u201362, 69, 71, 78, 81, 82, 111]."]} +{"8507340|2357830": ["Aside from scalability issues, privacy continues to be a challenge for data collection [40, 58\u201362, 69, 71, 78, 81, 82, 111]."]} +{"11413328|3348390": ["Another review on semantics for the Internet of Things [7] has also recognised resource (e.g., a sensor or an actuator) search and discovery functionality as one of the most important functionalities that are required in IoT.", "A survey on context aware computing for the Internet of Things [6] has recognised sensor search and selection as a critical task in automated sensor con\ufb01guration and context discovery processes.", "A survey on context aware computing for the Internet of Things [6] has recognised sensor search and selection as a critical task in automated sensor configuration and context discovery processes.", "Dyser is a search engine proposed by Ostermaier et al. [15] for real-time Internet of Things, which uses statistical models to make predictions about the state of its registered objects (sensors).", "This protocol has been proposed to be used in the Web of Things (WoT) domain with the objective of dealing with a massive number of web services (e.g. sensors wrapped in web services).", "Specifically, sensor search and selection techniques using context information [6] have not been explored substantially."]} +{"11413328|1775475": ["After evaluating a number of research efforts conducted in the quality of service domain relating to web services [31], mobile computing [32], mobile data collection [33], and sensor ontologies [5], we extracted the following context properties to be stored and maintained in connection with each sensor."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"18655328|14068482": ["Thus, the Sensor Web is to sensor resources what the WWW is to general information sources\u2014an infrastructure allowing users to easily share their sensor resources in a well-defined way [15]."]} diff --git a/edge/graph_206258608.jsonl b/edge/graph_206258608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206259698.jsonl b/edge/graph_206259698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206268920.jsonl b/edge/graph_206268920.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206275366.jsonl b/edge/graph_206275366.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97d13e648674e24dc03e8f4b6dfb47357208af92 --- /dev/null +++ b/edge/graph_206275366.jsonl @@ -0,0 +1,4 @@ +{"8042803|8125630": ["Data warehousing is an approach where data is collected and stored in a central database, referred to as a data warehouse [11]."]} +{"21331167|2795037": []} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"12347519|7923075": ["Keywords: SPARQL federation, Web of Data, RDF", "[21] presents a survey of SPARQL endpoint federation systems, explaining the details of the query federation process and with a comparison of the query evaluation strategies used in these systems."]} diff --git a/edge/graph_206335879.jsonl b/edge/graph_206335879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f5c205bb93655945bc50bfc41a8b0bbaee604b5 --- /dev/null +++ b/edge/graph_206335879.jsonl @@ -0,0 +1 @@ +{"41596035|431089": []} diff --git a/edge/graph_206403759.jsonl b/edge/graph_206403759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a10ef940e8bfc6c133fe1c86f7e6cee1c68407d3 --- /dev/null +++ b/edge/graph_206403759.jsonl @@ -0,0 +1,3 @@ +{"63716|3330313": ["Anomaly Detection refers to detecting patterns in a given data set that do not conform to an established normal behavior [14]."]} +{"13829181|18986679": ["In order to improve the readability of modeling results, we adopted pixel-oriented techniques ( Oliveira & Levkowitz, 2003 ) to provide visualization with color and brightness."]} +{"12228076|15164501": ["In fact, there are observed differences in terms of information systems implementation (Leidner & Kayworth 2006) and management decision-making styles in Asian countries (Park & Luo 2001)."]} diff --git a/edge/graph_206430359.jsonl b/edge/graph_206430359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f606a1656587751b6e93599bd064dd66392976ae --- /dev/null +++ b/edge/graph_206430359.jsonl @@ -0,0 +1 @@ +{"19347846|12068725": ["A thorough survey on search-based procedural content generation for games is provided by Togelius et al. (2011).", "This issue broadly pertains to the problem of content generation, which has been highlighted as a critical bottle-neck in game production by many game designers and AI researchers (Togelius et al. 2011; Zook et al. 2012)."]} diff --git a/edge/graph_206450319.jsonl b/edge/graph_206450319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206456479.jsonl b/edge/graph_206456479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5c613f8bbd05c4f7d0d9c9e6953e41bcc16a1ef --- /dev/null +++ b/edge/graph_206456479.jsonl @@ -0,0 +1 @@ +{"7267859|2535224": ["IEEE Communications Magazine \u2022 November 2015110 0163-6804/15/$25.00 \u00a9 2015 IEEE\nQianru Zhou, ChengXiang Wang, and Stephen McLaughlin are with Heriot-Watt University.", "As mentioned above, the core concept of SDWN is to split the data and control planes.", "Many\nIEEE Communications Magazine \u2022 November 2015 113\nresearchers of network semantic ontologies have put the development of wireless ontology on their agenda.", "Two typical ontologies are introduced below.", "Wireless ontology will be the new function of the future version of RSpec."]} diff --git a/edge/graph_206459491.jsonl b/edge/graph_206459491.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206485791.jsonl b/edge/graph_206485791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fbca74d6d939859611d357bde10fdce575c98af --- /dev/null +++ b/edge/graph_206485791.jsonl @@ -0,0 +1,9 @@ +{"4869789|11112426": ["tinct endmembers are not interfered with each other [6], [7]."]} +{"6795574|5972227": ["Recently, a survey is presented for a wired-sensor network, focusing on the capability of methods to give a simple estimation for the position of the object [23]."]} +{"6795574|18546648": ["For instance, in shadow detection [48] pixel level evaluation is advised [49]."]} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"4350029|17346817": ["Although most of the dictionary learning based methods have achieved competitive performance compared to the stateof-the-art, the sparse model is computationally expensive [44].", "Learning-based approaches have been introduced, which is the progress made in the past several years in denoising [44]."]} +{"4350029|17069874": ["The major drawback of nonlocal spatial filters is that they still tend to bring artifacts such as over-smoothing [30]."]} +{"9448914|9307657": []} +{"37925315|12681089": []} +{"206770143|5171123": ["To address the problem of STSPP, many specially designed FR methods have been developed [22].", "The number of training samples per person will greatly affect the performance of FR [22]."]} diff --git a/edge/graph_206485901.jsonl b/edge/graph_206485901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f9ae6577a3ed6c5c9e6aa479523b883eaa8b7eb --- /dev/null +++ b/edge/graph_206485901.jsonl @@ -0,0 +1,36 @@ +{"9723934|17381415": ["Note that similar current control performance can also be obtained in stationary frame by transforming the d-q reference current into stationary frame and using P+Resonant current controller [14-16]."]} +{"9723934|12083425": []} +{"6344946|17381415": ["The adopted load model is in line with the IEEE 1547 test load used in DG applications [17]."]} +{"26400632|17381415": ["The distributed power systems have advantages, such as the capacity relief of transmission and distribution, better operational and economical generation efficiency, improved reliability, eco-friendliness, and higher power quality [1], [2]."]} +{"110512448|12083425": []} +{"21445535|17381415": ["Unlike conventional power generation power resources; which are almost exclusively based on 50/60 Hz synchronous machines, the majority of DG units are interfaced via power electronic inverter systems [12]\u2013[16]."]} +{"29795068|17381415": []} +{"25130290|12083425": []} +{"109669589|17381415": []} +{"40660939|17381415": []} +{"40660939|12083425": ["The majority of DER units are interfaced to the microgrid [23] using voltage-sourced converter (VSC) units."]} +{"2107900|12083425": ["In this paper, a fuel cell (FC) system is used as a main energy source due to its clean, quiet, and efficient specifications [7], [8]."]} +{"35674415|17381415": [") and behaves as passive electric generators [1]."]} +{"8357030|12083425": ["DERs can also provide stand-alone generation during the system outages [1]."]} +{"25270349|1876323": []} +{"23325882|17381415": ["Voltage and Current Controllers Due to the difficulties of using PI controllers to track non-dc variables, proportional-resonant (PR) controllers are usually preferred to control the voltage and current in the stationary reference frame [47]."]} +{"23325882|17758458": ["Compensation of voltage unbalance is usually done using series active power filter through injection of negative sequence voltage in series with the power distribution line [13]-[15]."]} +{"43423481|17381415": []} +{"19877568|17381415": []} +{"19877568|12083425": ["In this way, the three-level pole attempts to address some limitations of the standard two-level [ 16 ] by offering an additional flexibility of a level in the output voltage, which is used to assist in the output waveform structure, so that not only the harmonic performance of the inverter is improved, but also the efficiency and reliability of the system."]} +{"19877568|17774971": ["tively doubles the power rating of the VSI for a given semiconductor device [15]."]} +{"12344291|17381415": ["Thus the axis current corresponds to the active power whereas the axis current refers to the reactive power [ 3 ].", "Many of these generation sources directly produce either dc or variable frequency/voltage ac outputs and, thus, power-electronics technologies have become the key element of many distributed generation systems [2], [ 3 ]."]} +{"18161892|12083425": ["These RES-based DG systems are normally interfaced to the grid through power electronics and energy storage systems [1]."]} +{"40691149|17381415": ["working on a \u03b1\u03b2 stationary reference frame [33].", "where kP is the proportional gain, kR is the resonant gain at the grid frequency, kih is the resonant gain at the h-harmonic to be controlled, and \u03c9o is the detected fundamental frequency [33]."]} +{"503375|12083425": []} +{"111372279|12083425": ["An excellent overview of various topologies used for renewable energy applications can be found in [15]."]} +{"24231153|17381415": []} +{"24231153|12083425": []} +{"18436837|17381415": ["converter-based DER units need phase-locked loop (PLL) with negative sequence filtering [16], [23] or some other stable and reliable synchronization method with FRT capability (see [35] and [36])."]} +{"2847165|60646544": []} +{"40247714|17381415": ["Photovoltaic (PV) inverters are typically DPG, operating in current-controlled mode with dc to ac energy conversion, where ac current is controlled in magnitude and phase [ 3 ], [4].", "At the ac-port connection, the DPGs have to monitor and qualify the available ac source (utility grid or genset) by synchronizing its phase and frequency prior to the transfer event [ 3 ], [15]."]} +{"14695212|12083425": ["As the interfaces between the DG units and the microgrid are often based on power-electronic converters [27], microgrid"]} +{"17768606|17381415": []} +{"18767124|17381415": ["Moreover, if the active and reactive power demand by the loads is met locally, the distribution losses may reduce considerably, resulting in higher hosting capacity of the micro-grid [3-7]."]} +{"18767124|12083425": ["Moreover, if the active and reactive power demand by the loads is met locally, the distribution losses may reduce considerably, resulting in higher hosting capacity of the micro-grid [3-7]."]} +{"2057899|17381415": ["As a DG unit is normally connected to a distribution system with power electronics-based interface, the control of power electronics converter is the key for the robust integration of DG units [1], [2]."]} diff --git a/edge/graph_206487032.jsonl b/edge/graph_206487032.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206488441.jsonl b/edge/graph_206488441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46564748496d836e39622c10cb76c965c93fdea5 --- /dev/null +++ b/edge/graph_206488441.jsonl @@ -0,0 +1,13 @@ +{"27641501|13074005": ["To improve the transmission rates of the SSK scheme, the spatial modulation (SM) scheme is proposed [2].", "Therefore, new MIMO techniques are proposed using switching method with antenna combinations to solve the problem [2]."]} +{"20464903|875676": ["Even at these early stages work has started to appear aiming to define or possibly start the debate about defining 5G possible structure and services [1][2][3][4][5].", "In 5G standard explorations [1][2][3][4][5], non-orthogonal concepts are commonly mentioned as potential candidates for the air interface."]} +{"7829464|219028": ["Moreover, turbo detection is applied to improve the performance further [10] [11]."]} +{"466961|219028": ["Typically, when a carefully designed rate-1 precoder without spectrum broadening is introduced in the turbo-like coding scheme, the waveform channel capacity can be approached, usually with acceptable detection complexity [11]."]} +{"6275216|219028": ["(8)\nWhen considering a system with a FTN parameter \u03c4 = TsT and a RRC filter with roll-off \u03b2 = BT \u2212 1, (8) becomes\n\u03b3 = Es N0\n1\n\u03c4(1 + \u03b2) ."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"19571979|219028": ["Tuchler et al [1]-[3] presented a turbo equalizer based on minimizing the mean square error criterion.", "One asymptote reflects perfect knowledge a-priori while the other assumes no a-priori knowledge at all: Using a hybrid of the asymptotes in (12), Tuchler demonstrated performance that matches that of (11) in mid to high SNR regions [1]-[3]."]} +{"14188265|11720829": ["In addition, stimulated by relevant research results in Multiple-Input Multiple-Output (MIMO) systems area [5], [6], and [7], we introduce and evaluate a combined MMSE ML scheme."]} +{"43857969|14776754": ["It has long been recognized that the orthogonality of the transmitted signals is one of the necessary conditions for reliable information transmission or complete reconstruction [1]."]} diff --git a/edge/graph_206491434.jsonl b/edge/graph_206491434.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9907e4b7a272d94b9d76b8702dfcb33046a872d0 --- /dev/null +++ b/edge/graph_206491434.jsonl @@ -0,0 +1,35 @@ +{"57127025|1236072": []} +{"6664074|16762549": ["The large variety of use cases [15]\u2013[19] led to the development of a large variety of hardware and communication technologies."]} +{"6664074|4631990": []} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"40489823|270804": []} +{"64567054|2509135": []} +{"24341056|840009": []} +{"24341056|17713112": ["Usage of different OSs (adapted from [20]).", "\u2022 Telos [8], [20], [157], [162] is the hardware platform that is designed for power conservation.", "The Contiki OS is discussed elsewhere [8], [10], [11], [20], [92], [143]\u2013[145] as an open source OS for tiny sensing motes.", "LiteOS [8], [20], [146], [147] is the Unix-based OS for sensing motes.", "This earlier form of task scheduler was first in, first out (FIFO) [8], [10], [11], [17], [20], [44], [45].", "TinyOS AND OTHER OSs AND THEIR FIELD IMPLEMENTATIONS (ADAPTED FROM [20])", "8 [20] shows an analysis of usage of OSs in WSNs."]} +{"24341056|17683338": ["\u2022 MICAz [8], [125], [157], [162] hardware platforms enable TinyOS to support the IEEE 802.", "\u2022 Telos [8], [20], [157], [162] is the hardware platform that is designed for power conservation."]} +{"24341056|6809492": []} +{"24341056|205286988": ["TinyOS provides support for these routing protocols to save the maximum amount of energy [79]."]} +{"24341056|1230643": ["models, network topologies, various algorithms and operating systems (OSs) for tiny sensing nodes [6]."]} +{"113250699|1230643": ["TinyOS [1] an open-source embedded operating system designed directly for wireless embedded sensor networks [2]."]} +{"9944174|17683338": []} +{"1022282|1230643": []} +{"3544322|17683338": ["A comparative overview of operating systems for WSN is given in [4]."]} +{"191577|1230643": ["An Operating System Abstraction Layer for Portable Applications in Wireless Sensor Networks Ramon Serna \nOliver Ivan Shcherbakov Gerhard Fohler Chair of Real-Time Systems Chair of Real-Time Systems Chair of \nReal-Time Systems TU Kaiserslautern TU Kaiserslautern TU Kaiserslautern Germany Germany Germany serna_oliver@eit.uni-kl.de \nshcherbakov@eit.uni-kl.de fohler@eit.uni-kl.de ABSTRACT Portability of software modules is a major concern \nin appli\u00adcation development for Wireless Sensor Networks (WSN), stressed by the typical lack of resources \nin embedded sys\u00adtems.", "An Operating System Abstraction Layer for Portable Applications in Wireless Sensor Networks Ramon Serna \nOliver Ivan Shcherbakov Gerhard Fohler Chair of Real-Time Systems Chair of Real-Time Systems Chair of \nReal-Time Systems TU Kaiserslautern TU Kaiserslautern TU Kaiserslautern Germany Germany\u2026"]} +{"14802009|17683338": []} +{"2043193|1230643": [", humidity or motion [14]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"14374000|10162051": ["Much work has been done on the verification of operating systems; see [14] for an overview on the topic."]} +{"5909595|1940388": []} +{"5909595|12817488": []} +{"5909595|1236072": [", one-to-one, one-to-all, all-toone) [60], [61]."]} +{"5909595|1230643": ["Recently, it has seen an explosive growth in both academia and industry [1], [2]."]} +{"30653560|2835258": ["In [13], authors have provided a qualitative comparison of the location services and position based forwarding strategies which includes LAR as well.", "We used the energy model for mica2 mote, provided by powerTOSSIM [13]."]} +{"24177967|7320605": ["However, according to our best knowledge, none of the proposed algorithms in congestion control literature for WSNs and 6LoWPAN networks: 1) uses game theory for traffic control (rate adaptation) [10], [11] to solve the congestion problem [the work in [12] and [13] (the content of these two papers overlaps) use game theory for parent selection (routing)] and 2) supports and is aware of both node priorities and application priorities."]} diff --git a/edge/graph_206491647.jsonl b/edge/graph_206491647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce04839be0091a9228232dac11b3f2a3cc47f606 --- /dev/null +++ b/edge/graph_206491647.jsonl @@ -0,0 +1,15 @@ +{"6340275|192934": []} +{"18134251|393948": ["The success behind deep learning is that it can learn useful information for data visualization and classi\ufb01cation [6, 3].", "More speci\ufb01cally, it learns the composition of multiple non-linear transformations (such as stacked restricted Boltzmann machines), with the purpose to yield more abstract and ultimately more useful representations [3].", "A Deep Belief Network (DBN) is composed of stacked RBMs [9] learned layer by layer greedily, where the top layer is an RBM and the lower layers can be interpreted as a directed sigmoid belief network [3], shown in Fig.", "Recent advances in deep learning [10, 26, 3] have attracted great attention in dimension reduction [9, 27] and classi\ufb01cation problems [10, 15, 23]."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"6779105|393948": ["To parametrize f\u03b8, deep neural networks (DNNs) are a natural choice due to their theoretical function approximation properties (Hornik, 1991) and their demonstrated feature learning capabilities (Bengio et al., 2013).", "To parametrize f \u03b8 , deep neural networks (DNNs) are a natu-ral choice due to their theoretical function approximation properties (Hornik, 1991) and their demonstrated feature learning capabilities (Bengio et al., 2013)."]} +{"14958831|393948": ["Related work Stacked auto-encoders [22, 23, 24, 17, 25, 26] have been studied in the past years for unsupervised deep feature extraction and nonlinear dimension reduction."]} +{"9976849|63912002": ["This problem should not be confused with image segmentation [12], which is also sometimes called image clustering."]} +{"2853246|1596835": ["\u2026to remain unchanged under data augmentation (Red arrows), while maximizing the information-theoretic dependency between data and their representations (Blue arrow).\nwhile hash learning is popular for an approximate nearest neighbor search for large scale information retrieval (Wang et al., 2016).", "It is related to the orthogonality constraint that is widely used in the literature to remove redundancy among hash bits (Wang et al., 2016)."]} +{"44469075|393948": ["In contrast, less attention [44], [45], [46] has been paid to the applications with unsupervised learning scheme.", "This shows that it is hard to achieve a desirable performance by simply introducing deep learning into subspace clustering since unsupervised deep learning is an open challenging issue [44]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} diff --git a/graph_2065066.jsonl b/edge/graph_2065066.jsonl similarity index 100% rename from graph_2065066.jsonl rename to edge/graph_2065066.jsonl diff --git a/edge/graph_206507518.jsonl b/edge/graph_206507518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206540691.jsonl b/edge/graph_206540691.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14dc40509bf8fea1b08ffe415f09279d781ba25e --- /dev/null +++ b/edge/graph_206540691.jsonl @@ -0,0 +1,5 @@ +{"842561|13726263": ["Approaches for frequent itemset mining [10,11,21] and classification [1,15] have been proposed."]} +{"36273331|13726263": []} +{"7527280|11894197": ["Feature selection is an important topic in data mining and machine learning and has been studied for many years in literature [10, 19, 26, 31]."]} +{"17506426|11894197": ["Feature selection can be divided into four categories; Wrapper, Filter, Hybrid and Embedded methods [1], [2], [3]."]} +{"29115488|192934": []} diff --git a/graph_2065587.jsonl b/edge/graph_2065587.jsonl similarity index 100% rename from graph_2065587.jsonl rename to edge/graph_2065587.jsonl diff --git a/edge/graph_206576469.jsonl b/edge/graph_206576469.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fedd7d8aa9783ea01e20b89c02b9f85576bc83ff --- /dev/null +++ b/edge/graph_206576469.jsonl @@ -0,0 +1,13 @@ +{"2910999|9104850": []} +{"2067202|1708582": ["Our routing scheme is based on reinforcement learning [20]."]} +{"15726198|10559330": ["Discussion to add qualityof-service capability to the Internet resulted in proposals such as RSVP [55], IntServ [10] and DiffServ [35], which again focussed on bandwidth provisioning."]} +{"6379021|14697846": []} +{"53873796|5895133": ["In other words, current scavenging protocols can successfully realize a lower-than-best-effort priority only if the bottleneck buffer operates according a DropTail discipline."]} +{"163275|10559330": []} +{"352514|10559330": []} +{"207181702|14697846": ["Finally, while peer-to-peer technologies [8] provide a highly-distributed option for serving static web content, the lack of management and control features in current implementations make them unsuitable as stand-alone solutions for enterprise-quality delivery."]} +{"11838668|2670373": ["However, technology for buffering and processing in optical domain is yet to mature for this scheme to be commercialized [9, 10]."]} +{"15304598|8496692": []} +{"62528177|15040462": []} +{"18950636|5895133": ["Picking the right value is a trade-off, the result of which should be evaluated in comparison with the related work in [5].", "org/wg/ledbat 2Due to space limitations, we refer the reader to [5] for a more detailed exposition of how LEDBAT works.", "There have been quite a few papers devoted to studying the performance of LEDBAT (see [5] and references therein)."]} +{"31626988|9104850": []} diff --git a/edge/graph_206576720.jsonl b/edge/graph_206576720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9aedae8f259f9dec8b93eae003012844b443723 --- /dev/null +++ b/edge/graph_206576720.jsonl @@ -0,0 +1,11 @@ +{"17021375|7851743": [", backhaul capabilities, large system or sparse system structures, energy efficiencies), which constitute the wir eless environment and network situations, see [60]\u2013[70] for examples driving thi s trend."]} +{"7607567|7686677": ["to ensure eco-sustainability and to keep low operative costs [70]."]} +{"7607567|12884178": ["Therefore, with this kind of relaying, the RRM module has to cope with the presence of both multi-hop connections and MBSFN frame structure (an overview on RRM schemes for OFDMA-based wireless networks with relay nodes can be found in [84]); this has impact on the end-to-end packet delays."]} +{"2221695|3054454": []} +{"110408258|3054454": ["In between is the \u201csingle-directional\u201d channel, as described up until now [9, 4 , 5,6]."]} +{"1182433|15453366": ["However, up to now, some of the 60 GHz worldwide regulations limit the emitted power at power amplifier output to 10 dBm and equivalent isotropic radiated power (EIRP) to 40 dBm [7]."]} +{"16582384|3054454": []} +{"2505166|15453366": ["IEEE Communications Magazine \u2022 September 201470 0163-6804/14/$25.00 \u00a9 2014 IEEE\nThe authors are with the University of Texas at Austin."]} +{"32869047|3054454": []} +{"64919208|3054454": ["Significant work had been performed for Single-Input Multiple-Output (SIMO) systems [2], [3].", "[2], [3] present comprehensive surveys of these efforts."]} +{"16712297|8909218": ["Unlike cellular systems with fixed relays [12], [13], DAS does not incur an over-the-air penalty for transmissions to and from the RRU."]} diff --git a/edge/graph_206578197.jsonl b/edge/graph_206578197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a44f91ae0c9838d5e90e1d7ae919d8ddf961cfa4 --- /dev/null +++ b/edge/graph_206578197.jsonl @@ -0,0 +1,28 @@ +{"9833658|8909218": []} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"24822119|8909218": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"24822119|18148591": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5].", "To meet the anticipated capacity demand in the existing model of fixed resources including static-licensed spectrum, mobile network operators, in the context of 4G Long Term Evolution (LTE) [3], are exploring many techniques such as higher data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"14081529|2854761": ["Scheduler design in wireless networks, especially inWiMAX networks [47], is a hot topic and very relevant to .", "1We point the interested reader to a detailed survey [47] on WiMAX network resource management."]} +{"2443013|3936425": ["Meanwhile, LTE-A supports cross-carrier scheduling which means PDCCH transmitted from a particular CC may contain the scheduling information on other CCs as well as its own CC [23]."]} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"14906755|485843": ["For instance, since the service requirements for wireless smart grid communications are different from regular traffic [30], the scheduling and management of the network is best handled by the utility provider instead of the infrastructure provider."]} +{"15289072|17336376": ["Readers are referred to [81] for a detailed survey on virtualization of wireless sensor networks."]} +{"10342730|2535224": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "In contrast to previous surveys on wireless virtualization [2]\u2013[4], our interest focuses on the problems derived from wireless slicing and on the existing techniques that deal with these speci\ufb01c problems."]} +{"10342730|11735843": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "For instance, approaches for network programmability [11] such as Software-De\ufb01ned Radio (SDR) [56]\u2013[58] or programmable MAC protocols [59]\u2013[61] may be used to circumvent this challenge."]} diff --git a/edge/graph_206578224.jsonl b/edge/graph_206578224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d58729294dcaf8e8272dd1b4ec167456ed5a6d57 --- /dev/null +++ b/edge/graph_206578224.jsonl @@ -0,0 +1,53 @@ +{"6299685|3330461": ["Our proposed protocol is specific to the memory replication traffic, and not to any uplink traffic type, and its validity is conditioned by the evolution of D2D communication technologies [11], [26], [27].", "\u2026neighbor device j performs the following:\n2.1) solicits memory replicas periodically from neighbor devices until it receives at least d = O(log(n/k)/ updated replicas ( \u2208 (0, 1)) from N \u2282 Neigh(j) neighbor devices; 2.2) aggregates all the received replicas into one compressed replica yj =\u2026"]} +{"6299685|7644489": ["Our proposed protocol is specific to the memory replication traffic , and not to any uplink traffic type, and its validity is conditioned by the evolution of Device-t oDevice Communication technologies [11], [26], [27]."]} +{"9496996|12815020": []} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"6758116|6583734": ["However, we emphasize that the virtualization and deployment of network functions do not necessarily rely on SDN technologies, and viceversa [4], [35]."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"16580150|7686677": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|14388097": ["While most studies analyze multimedia streaming in the regular client-server architecture, a survey on the research on quality of service for peer-to-peer media distribution was presented in [113]."]} +{"16580150|10837932": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|17428811": ["[38] included SVC for an MPEG-4 FGS streaming system [65], in which a mobile client can control its decoding capability according to the energy management policy."]} +{"17239793|3540699": []} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"8650651|207262843": ["SDN and virtualization strategies for LTE wireless cellular networks have been surveyed in [50]."]} +{"8650651|6583734": []} +{"8650651|11414835": ["SDN hypervisor can create multiple isolated virtual SDN networks [80], [81]."]} +{"8650651|801245": ["Bitar [39] has surveyed use cases for SDN controlled broad-band access, such as on-demand bandwidth boost, dynamic service re-provisioning, as well as value-added services and service protection."]} +{"8650651|2535224": ["we note that for the field of wireless and mobile networks, SDN based networking mechanisms have been surveyed in [41]\u2013[47] while network virtualization has been surveyed in [48] for general wireless networks and in [49] for wireless sensor networks."]} +{"8650651|15035771": []} +{"8650651|17248887": ["(b) SDN controller utilizes the path computation ability of the PCE [246], [269], [270] and controls network through OpenFlow protocol.", "using an SBI protocol, such as OpenFlow [246], [269], [270]; see illustration b) in Fig.", "devices [33], [34], [242], [244], [246]."]} +{"8650651|2623404": []} +{"8650651|10693567": [", with OpenFlow (OF) switches [7] or network elements (devices) controlled with the NETCONF protocol [8].", "The OpenFlow protocol [2], [7], [56] has been the first protocol for the SouthBound Interface (SBI, also referred to as Data-Controller Plane Interface (D-CPI)) between the con-", ", the OpenFlow protocol [7] for the SBI.", "OpenFlow switching element (data plane) and an OpenFlow controller (control plane) is carried out through the OpenFlow protocol [7], [56].", "The general principles of SDN have been extensively covered in several surveys, see for instance, [2], [6], [7], [10]\u2013[27]."]} +{"8650651|1580493": ["For a \ufb02exi-grid network based on OFDM [31], Zhao et al. [310] have compared a greedy heuristic that maps requests in decreasing order of the required resources with an arbitrary \ufb01rst-\ufb01t benchmark.", "1) [31], [87]\u2013[89] allows the center frequency to be any multiple of 6.", "In a related study on SDN controlled switching in a PON, Yeh et al. [178] have designed an ONU with an optical switch that selects OFDM subchannels in a TWDM-PON.", "For a flexi-grid network based on OFDM [31], Zhao et al.", "The proposed communication is based on carrierless amplitude and phase modulation [215] enhanced with optical Orthogonal frequency Division Multiplexing (OFDM) [150].", "The OFDMA transmissions and receptions are processed in a DSP module that is controlled by a central SDN control module.", "The different OFDM channels are manipulated through DSP \ufb01ltering.", "The FlexPON employs OFDM for adaptive transmissions.", "The survey brie\ufb02y notes how OFDM-based elastic networking can facilitate network virtualization and surveys a few studies on OFDM-based network virtualization in core networks.", "Similar OFDMA based slicing strategies for supporting cloud computing have been examined by Jinno et al. [286].", "Simulation experiments indicate a 40% increase in network bandwidth utilization as a result of the global coordination compared to operating the bandwidth allocation only within the individual PONs [261], [262]. b) Access and Wireless: Bojic et al. [263] expand on the concept of SDN controlled OFDMA enabled VPONs [257] to provide mobile backhaul service.", "Each small-cell site contains an OFDMA-PON ONU that provides the backhaul service through the access network over a VPON.", "[31] have presented a thorough survey on flexible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core (backbone) networks.", "An SDN controller is utilized to assign bandwidth to each small-cell site through OFDMA subcarrier assignment in a VPON to the constituent ONU.", "c) Flexi-grid: The principle of flexi-grid (elastic) optical networking [31], [87]\u2013[92], [226] has been explored in several SDN infrastructure studies.", "Bandwidth allocation is performed at the granularity of OFDMA subcarriers that compose the optical spectrum.", "1) General Multidomain Networks: a) Optical Multitechnologies Across Multiple Domains: Optical nodes are becoming increasingly recon\ufb01gurable (e.g., through variable BVTs and OFDM transceivers, see Section III), adding \ufb02exibility to the switching elements.", "Illustration of DSP recon\ufb01gurable ONU and OLT designs [151]: Each ONU passes the electrical Optical OFDM signal [150] through a Shaping Filter (SF) that is SDN-con\ufb01gured by the DSP controller, followed by a Digital-to-Analog Converter (DAC) and Intensity Modulator (IM) to generate the optical signal.", "Zhang et al. [31] have presented a thorough survey on \ufb02exible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core Fig.", "The virtualization studies on access networks [282]\u2013[284], [286]\u2013[295] have primarily focused on exploiting and manipulating the speci\ufb01c properties of the optical physical layer (e.g., different OFDMA subcarriers) and MAC layer (e.g., polling based MAC protocol) of the optical access networks for virtualization."]} +{"8650651|16972183": ["wireless networks provide Internet access to a wide range of mobile devices [113]\u2013[115]."]} +{"8650651|7686677": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention.", "QoS levels in an energy-efficient manner [465]\u2013[467] is an important future research direction."]} +{"8650651|10837932": ["e) Energy-efficient embedding: Motivated by the growing importance of green networking and information technology [348], a few studies have begun to consider the energy efficiency of the embedded virtual optical networks."]} +{"8650651|8909218": ["For instance, the cell structure of wireless cellular networks [458] has advanced to femtocell networks [459] as well as heterogeneous and multitier cellular structures [460], [461]."]} +{"8650651|10532321": []} +{"8650651|25929315": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention."]} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"16084016|17787193": [", LIPA, SIPTO, IFOM, MAPCON, or S1-flex [2\u20134]), which may eventually be integrated in Third Generation Partnership Project (3GPP) specifications (Releases 10\u201312).", "In this way, the complexity and patchwork introduced by IFOM, MAPCON, S1-flex, or, more recently, NB-IFOM [2\u20135, 6] would be removed by design."]} +{"16084016|10693567": ["In the particular case of LIPA, we need to ensure that TFT rules are applied before routing rules [14] to ensure that traffic not meant to be offloaded (i.", "For instance, OpenFlow, one popular element of current SDN architectures, allows forwarding rules at nodes based on IP header fields [14]."]} +{"2742360|14889616": ["range of devices, the Scalable Video Coding (SVC) mechanism [2] is introduced."]} +{"4269723|2535224": ["At the present, wireless and wired networks uphold diversity and heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional networks.", "\u2026heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional\u2026"]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"7703219|16335158": ["In the CC, MCC and Sensor-cloud architecture, a physical datacentre unit is in charge of performing the data computation and storage (Hossain, 2013), (Dinh, Lee, 2011)."]} +{"7703219|16654832": ["However, the mobile devices suffer from computing resources limitations, battery restriction and processing time (Shiraz et al., 2012)."]} +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} +{"23872521|3913780": []} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"27060711|10693567": []} +{"11926867|64404": [", the High Efficiency Video Coding [45]\u2013[47] in real conferencing systems [55], [56]."]} +{"11140333|27466065": ["The Offloading Granularity: In our previous work [20] we analyzed different categories of approaches that allow computation offloading."]} diff --git a/edge/graph_206578365.jsonl b/edge/graph_206578365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e9d69e1f1596df90fc299cdd6ddb37ac8f3daca --- /dev/null +++ b/edge/graph_206578365.jsonl @@ -0,0 +1,77 @@ +{"52125542|3189715": ["Borrowing some concepts from active networking [41]\u2013[43], a user can send an interest to the network with a function expression or a program that includes code and data."]} +{"38730704|3330461": ["Multicast D2D transmissions have already been standardized by 3GPP, whereas unicast transmissions so far have only received attention from the scientific community [13], [14]."]} +{"31479|469744": ["Augmented reality applications show step-by-step instructions as 3D drawings on the actual equipment [55] as illustrated in Figure 3.", "1a, an application is capable of rendering visualization datasets on a real patient to identify organs, and have precise information on where to perform an incision during a surgery [55]."]} +{"2205317|16654832": ["As expected, SMDs are taken as the dominant future computing devices for supporting computationintensive applications, such as interactive gaming, image/video processing, e-commerce, and online social network services [1], [2]."]} +{"10040669|12029139": ["2 mW RFID, low power device RF Signal [12] unpredictable"]} +{"10040669|8909218": ["r experience. Besides this, the low-cost and low-power SCBSs can be easily installed without costly cell site acquisition, and their self-organization manner further helps save operating expenditures [1, 2]. However, as the SCBSs are densely and irregularly located, some of them may be inaccessible to the power grid. Moreover, the network power consumption of the SCNs will be high despite the small powe"]} +{"10040669|12060835": ["The previous discussions on the three basic tradeoffs in EH-SCNs provide us with the\nfollowing deployment guidelines:\n\u2022 Satisfactory coverage can be guaranteed in EH-SCNs with a reasonable network density."]} +{"706371|18148591": ["Inter-cell interference is treated as noise at the receiver side and is handled by resorting to improved point-to-point communications between the base station (BS) and the mobile station (MS), using efficient coding and/or single-link multiple-antenna techniques [2]."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"16953948|359842": ["However, face recognition is completely non-intrusive and does not carry any such health dangers [5]."]} +{"30832236|3540699": ["264 encoder [22]."]} +{"10632020|8909218": ["Cellular networks traditionally are modelled using hexagonal grids but such models lack tractability and fail to account for ad hoc BS deployment that is a trend of network evolution [2].", "Last, the ongoing deployment of small-cell networks [2] and the advancements in low-power electronics will substantially reduce the required transmission power of mobiles."]} +{"17656994|206578365": ["In each time slot t, computation tasks originating from UE m is generated according to a Poisson process which is a common assumption on the computation task arrival in edge systems [1].", "In order to overcome these dif\ufb01culties, cooperation among SBSs can be exploited to signi\ufb01cantly enhance MEC performance and improve the ef\ufb01ciency of system resource utilization via computation workload peer of\ufb02oading.", "Nevertheless, edge servers, such as MEC-enabled SBSs [13], [14], cannot offer the same computation and storage capacities as traditional computing servers.", "As a remedy to these limitations, mobile edge computing (MEC) [1]\u2013[3] has recently emerged as a new computing paradigm to enable in-situ data processing at the network edge, in close proximity to mobile devices and connected things.", "Game theoretic modeling was also applied in the MEC computation of\ufb02oading context in [30] [31].", "The main contributions of this paper are summarized as follows: \u2022 We develop a novel framework for performing stochastic computation peer of\ufb02oading among a network of MEC-enabled SBSs in an online fashion without requiring future system information by leveraging the Lyapunov optimization technique [5].", "In this paper, we study computation peer of\ufb02oading in MEC-enabled small cell networks aiming to address the aforementioned challenges.", "Considered as a key enabler of MEC, small-cell base stations (SBSs), such as femtocells and picocells, endowed with cloud-like computing and storage capabilities can serve end users\u2019 computation requests as a substitute of the cloud [3].", "Although there have been quite a few works on geographical load balancing in data centers, performing workload peer of\ufb02oading for MEC-enabled small cell networks faces unique challenges as follows."]} +{"17656994|10299098": ["As a remedy to these limitations, mobile edge computing (MEC) [1]\u2013[3] has recently emerged as a new computing paradigm to enable in-situ data processing at the network edge, in close proximity to mobile devices and connected things.", "In this paper, we investigated peer offloading schemes in MEC-enabled small cell networks where heterogeneous task arrival pattern in both spatial and temporal domains is considered.", "In this paper, we study computation peer offloading in MEC-enabled small cell networks.", "Although there have been quite a few works on geographical load balancing in data centers, performing peer offloading in MEC-enabled small cell networks faces unique challenges.", "Considered as a key enabler of MEC, small-cell base stations (SBSs), such as femtocells and picocells, endowed with cloud-like computing and storage capabilities can serve end users\u2019 computation requests as a substitute of the cloud [3].", "Although cloud computing enables convenient access to a centralized pool of configurable and powerful computing resources, it often cannot meet the stringent requirements of latency-sensitive applications due to the often unpredictable network latency and expensive bandwidth [1]\u2013[3].", "To overcome these difficulties, cooperation among SBSs can be exploited to enhance MEC performance and improve the efficiency of system resource utilization via computation peer offloading.", "Nevertheless, edge servers, such as MEC-enabled SBSs [21], cannot offer the same computation and storage capacities as traditional computing servers.", "The main contributions of this paper are summarized as follows:\n1) We develop a novel framework called OPEN (which stands for Online PEer OffloadiNg) for performing stochastic computation peer offloading among a network of MECenabled SBSs in an online fashion by leveraging the Lyapunov optimization [5].", "Game theoretic modeling was also applied in the MEC computation offloading context in [14] and [15]."]} +{"17656994|3767252": ["Considered as a key enabler of MEC, small-cell base stations (SBSs), such as femtocells and picocells, endowed with cloud-like computing and storage capabilities can serve end users\u2019 computation requests as a substitute of the cloud [3].", "As a remedy to these limitations, mobile edge computing (MEC) [1]\u2013[3] has recently emerged as a new computing paradigm to enable in-situ data processing at the network edge, in close proximity to mobile devices and connected things."]} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} +{"7617670|10299098": ["Moreover, through mobile edge computation offloading (MECO), the energy consumption of mobile devices can be also reduced by offloading intensive computation workload to the proximate MEC server for execution [5]."]} +{"7617670|206578365": ["Moreover, through mobile edge computation offloading (MECO), the energy consumption of mobile devices can be also reduced by offloading intensive computation workload to the proximate MEC server for execution [5]."]} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"11157468|10299098": []} +{"8857235|16972183": []} +{"8857235|8909218": ["Email: rganti@ee.iitm.ac.in. and are distinguished by their end-user installation in arbitrary locations, very short range, and possibility of having a closed-subscriber group [10]\u2013[12]."]} +{"3055684|12060835": []} +{"2457101|7800459": ["2b, distance Matrix D is a 4 4 symmetric matrix with each component Dij indicating the expected distance between node i and node j."]} +{"801417|8909218": ["At the same time, an exponential growth in femto deployments is expected [1], [2] due, in part, to the fact that spatial proximity between the handset and the serving femto access point (FAP) enables successful communication with high rates and reduced power."]} +{"7467283|7800459": ["Conversely, network coding applications such as distributed storage repair [39], caching [40], etc."]} +{"1999116|8280144": []} +{"1079645|8909218": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"3042864|14088590": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|2282515": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|10859599": ["In the second case, the applications execute in a real cloud, for instance, Amazon EC2 [34], Google App Engine [31], and Microsoft Live Mesh [84]."]} +{"5244780|3767252": ["A comparison between MEC, fog computing and cloudlet is in [13]."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"3798371|17713112": ["In addition to the development of efficient software [13] and communication protocols, e."]} +{"3798371|16335158": ["in [22] provide a comprehensive survey of sen-"]} +{"9010762|9104850": ["In the past decades, there has been an extensive literature for web caching schemes (see [13]"]} +{"18105252|3055684": ["In particular, energy harvesting (EH) technology has recently emerged as a promising approach to power wireless networks with renewable energy sources [2, 3]."]} +{"18105252|7686677": ["Wireless communications is evolving towards a green paradigm with significantly improved energy efficiency and environmental friendliness [1]."]} +{"18105252|12060835": []} +{"13958303|17024419": []} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"28038835|3042864": []} +{"34234905|6909107": []} +{"34234905|10299098": ["Since then, MEC has attracted a lot of attention from academic areas [8], [9]."]} +{"9537819|10658846": []} +{"10909342|3055684": ["less Communications and Networking Conference (WCNC), New Orleans, LA, Mar. 2015. radio signal, wind energy, etc [3], and thus it is becoming an indispensable solution for green communication systems [4]. By introducing EH techniques to the next-generation communication systems, it is estimated that a 20% CO2 emission reduction can be achieved [5]. Due to the intermittent nature of the EH processes, "]} +{"10909342|12060835": []} +{"9121328|1775475": ["In [5], Chalmers et al. explain how context-awareness and missioncritical requirements would be critical issues with respect to managing Quality-of-Service (QoS) in future mobile computing environments."]} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"15784770|2387055": []} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"25293028|3042864": ["1The program profiler monitors the program parameters, for instance, execution time, acquired memory, thread CPU time, number of instructions, and method calls [2].", "demand of resource-intensive applications [2]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"10045985|6909107": ["By deploying MEC servers therein, wireless devices can offload part or all of their computation-heavy and latency-sensitive tasks to APs and/or BSs for remote execution [1]\u2013[3]."]} +{"10045985|10299098": ["We consider partial offloading, and assume that the computation task can be arbitrarily partitioned into various parts to be computed in parallel [2], [3].", "Accordingly, the user\u2019s energy consumption for local computing is [3]", "Depending on whether the computation tasks are partitionable, the computation offloading can be generally categorized into two classes, namely binary and partial offloading [3]."]} +{"10045985|206578365": ["Accordingly, the user\u2019s energy consumption for local computing is [2]", "Depending on whether the computation tasks are partitionable or not, the computation offloading can be generally categorized into two classes, namely binary and partial offloading, respectively [2]."]} +{"7914805|206578224": ["This vision has been driving extensive research in both the academia and industry under various names such as edge computing and fog computing [1]\u2013[4].", "1) Multi-Access Edge Computation Offloading: Multiaccess edge computing (MEC) initiated by ETSI, which is also called mobile edge computing, refers to providing mobiles with cloud-computing capabilities and IT service from radio access networks including base stations (BSs), access points (APs) and WiFi, relying on multiple-access technologies [1]."]} +{"7914805|206578365": ["for partial offloading (and partial local computing) [2].", "two disciplines: wireless communications and mobile computing [2]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} diff --git a/edge/graph_206578486.jsonl b/edge/graph_206578486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4202a612fbd3968fefef1690e2a4dd3319ee719 --- /dev/null +++ b/edge/graph_206578486.jsonl @@ -0,0 +1,46 @@ +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"9496996|12815020": []} +{"6666380|3348390": ["Context awareness is also a crucial aspect of the IoT, characterizing entities and related events [5]."]} +{"9122404|2623404": ["Interested readers are referred to [12], [13] and the refere nc s therein."]} +{"9122404|7971188": ["From a networking perspective, CMuHC will inevitably require the formation of a peer-to-peer overlay in order to orchestrate the participation of multiple users in additio n the facilitation of a number of other necessary functions perta ining to the tasks of overlay maintenance and operation [9]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"45561163|2535224": []} +{"37451636|3007529": ["To name a few application scenarios include intelligent transportation systems (ITS) [11], volunteer information networks [12], Internet of Things (IoT) [13]\u2013[15], smart grids [16], [17] and much more."]} +{"37451636|3348390": []} +{"37451636|9104850": []} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"18865229|2623404": []} +{"30782116|15545863": ["big data and real time analytics [11]."]} +{"207155964|10500613": ["Hence, the task of finding mappings (semi-) automatically has been an active area of research in both database and ontology communities [22, 15].", "Heuristic-based approaches to ontology mapping are similar to heuristic-based approach to matching database schemas and XML structures ([22, 17]) and use lexical and structural components of definitions to find correspondences."]} +{"3917198|17474643": ["According to [158], the term Multi-Cloud denotes the usage of multiple and independent Clouds by a client or a service.", "As the authors of [158] have correctly noted, mOSAIC can be mapped to the second category, of services.", "According [158], the brokering mechanisms are: SLA-based, i."]} +{"14093686|15545863": ["While Fog nodes provide localization, therefore enabling low latency and context awareness, the Cloud provides global centralization.", "Do, Nguyen H. Tran, Chuan Pham, Md. Golam Rabiul Alam, Jae Hyeok Son and Choong Seon Hong\nDepartment of Computer Enginneering, Kyung Hee University, 446-701, Korea Email: {dtcuong, nguyenth, pchuan, robi, sonjaehyeok, cshong}@khu.ac.kr\nAbstract\u2014Large-scale Internet applications, such as content\u2026", "Fog computing is one potential approach to dealing with the demands of the ever-increasing number of Internet-connected devices sometimes referred to as the Internet of Things."]} +{"22895451|801245": ["Khan[6] describes benefits of the virtualization of WSN."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"7378605|31860478": []} +{"17311215|62924": ["There are several automated negotiation mechanisms for grid or cloud resource negotiation (see [18] for a survey)."]} +{"18070225|15545863": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"18070225|913718": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"29005198|19938676": ["In a nutshell, 5G wireless access will consist of an evolution of LTE complemented with new radio technologies and architecture designs [10]."]} +{"29005198|2623404": ["The recent trends of network function virtualization (NFV) (providing abstraction [31]) and software defined networking (SDN) (providing flexibility [32]) are critical in shaping such an envisioned architecture."]} +{"7329149|3348390": ["The term was \ufb01rst coined in 1998 and later de\ufb01ned as \u201cThe Internet of Things allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/ network and Any service\u201d [1]."]} +{"7329149|485843": ["Smart grid is one of the domains in which academia, industry, and governments are interested and invested significantly [72], [73]."]} +{"7329149|20905429": ["In addition to the industry IoT solutions, academic solutions in the wearable computing area are discussed in [26], [27]."]} +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"16157619|18717047": ["The second architectural principle is the use of the REpresentational State Transfer (REST) paradigm [8] for the interactions between the PaaS and the Fog, as it is commonly used for PaaS-IaaS interactions nowadays."]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} diff --git a/edge/graph_206583375.jsonl b/edge/graph_206583375.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f5a50d16a998f8144c80159c6a15868a911e9b13 --- /dev/null +++ b/edge/graph_206583375.jsonl @@ -0,0 +1,4 @@ +{"8568387|14441987": []} +{"1927258|164835": ["Owing to the harsh multipath environment in indoor areas, techniques that use triangulation or direction are not very attractive and often can yield highly erroneous results [2-4]."]} +{"111163614|164835": []} +{"6743804|164835": []} diff --git a/edge/graph_206583943.jsonl b/edge/graph_206583943.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206584087.jsonl b/edge/graph_206584087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c46fe86d69885c4da90b77159c46ce0541003cf --- /dev/null +++ b/edge/graph_206584087.jsonl @@ -0,0 +1,2 @@ +{"16397990|14808716": []} +{"2567879|9104850": ["The World Wide Web (WWW) is one of the most popular applica\u00adtions currently \nrunning on the Internet and has driven the rapid growth of the Internet [Wang 1999]."]} diff --git a/edge/graph_206602044.jsonl b/edge/graph_206602044.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206603045.jsonl b/edge/graph_206603045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d12963dfc6a7776ba8af994fc283ebb6c93d94b --- /dev/null +++ b/edge/graph_206603045.jsonl @@ -0,0 +1,15 @@ +{"11787500|8356163": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"14786967|393948": ["As argued by Bengio et al. (2013), the use of deep networks can offer both computational and statistical ef\ufb01ciency for complex tasks."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"10396294|393948": ["In principle, the DNN is capable of learning high-level representation from raw data [17], [3] and recent advances in speech recognition [29], [7] also demonstrate that a DNN directly trained on the filter-bank features achieves better performance than trained on mel-frequency cepstral coefficient (MFCC) features."]} +{"1033682|174797842": []} +{"142580|17574321": []} +{"14635907|16082889": ["Despite more than 30 years of handwriting recognition research [2], [3], [ 4 ], [5], developing a reliable, general-purpose system for unconstrained text line recognition remains an open problem."]} +{"14635907|15782139": []} diff --git a/edge/graph_206618393.jsonl b/edge/graph_206618393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04a7370b0dea0082bd5ad780ffc5098efe992385 --- /dev/null +++ b/edge/graph_206618393.jsonl @@ -0,0 +1,3 @@ +{"60507790|42362458": []} +{"60507790|15378506": []} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} diff --git a/edge/graph_206620697.jsonl b/edge/graph_206620697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20662285.jsonl b/edge/graph_20662285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206670318.jsonl b/edge/graph_206670318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a6fe2b0db455d4950b2a1e2bed384d2f6d43c00e --- /dev/null +++ b/edge/graph_206670318.jsonl @@ -0,0 +1,26 @@ +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} +{"25057252|9588126": ["IN recent decades, the consensus problems of multiagent systems (for instance, formation control [1], flocking [2], [3], rendezvous [4] and sensor networks [5], [6], and so on) have received considerable attention, such as [7]\u2013[9]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"124189182|1708582": []} +{"1603334|1708582": ["These RL algorithms are investigated at first for a finite Markov decision process (MDP) (Kaelbling & Moore, 1996; Sutton & Barto, 1998), and later, for continuous-time (CT) and discrete-time\n\u22c6 This paper was not presented at any IFAC.", "These correspond to theQ-learning for a finite MDP framework where exploration noise should be suitably injected to improve the performance of the agent.", "Among the RL methods,Q-learning, first proposed by Watkins (1989) in a finite MDP framework, has been recognized as one of the most promising and widely used RL methods in various fields of engineering (Powell, 2007; Sutton & Barto, 1998; Wang, Zhang, & Liu, 2009).", "This exploration corresponds to the probing noise in DTQ-learning (Al-Tamimi et al., 2007; Bradtke & Ydstie, 1994; Lewis & Vamvoudakis, 2010) as well as the exploration in a finite MDP (Powell, 2007; Si et al., 2004; Sutton & Barto, 1998).", "Inspired byQ-learning for a finite MDP,Q-learning schemes for uncertain DT dynamic systems, also known as action-dependent heuristic dynamic programming (ADHDP), are investigated by many researchers (Al-Tamimi,\nPreprint submitted to Automatica 13 March 2012\nAbu-Kalaf, & Lewis, 2007; Balakrishnanet al., 2008; Bertsekas & Tsitsiklis, 1996; Bradtke & Ydstie, 1994; Landelius, 1997; Lewis & Vrabie, 2009; Lewis & Vamvoudakis, 2010; Prokhorov & Wunsch, 1997; Si et al., 2004; Wang, Zhang, & Liu , 2009; Webos, 1992).", "For Qlearning in a finite MDP, the convergence to the optimal policy and its corresponding action value function was given by Watkins & Dayan(1992) with a sufficient number of explorations.", "At each decision step,Q-learning for a finite MDP either randomly explores the state-action space to update the action value for the unexplored state-action pair, or exploit the action values to modify and improve the current policy."]} +{"1603334|1995121": []} +{"10306234|1708582": ["As a result, a variety of RL algorithms in MDP environments have been proposed, including Sarsa, Q -learning, and actor\u2013critic methods, with successful applications [2]\u2013[6] (see [6] for survey)."]} +{"3528921|6400766": ["[41] provided good surveys on approximate value iteration and approximate policy iteration methods with value function approximation."]} +{"3126100|18503837": []} +{"3126100|393948": ["Representation learning aims to achieve that a reasonably sized learned representation can capture a huge number of possible input configurations, which can greatly facilitate improvements in both computational efficiency and statistical efficiency [25].", "Fortunately, representation learning [25, 26], a promising solution to learn the meaningful and useful representations of the data that make it easier to extract useful information when building classifiers or other predictors, has been presented and achieved impressive performance on many dimensionality reduction tasks [27]."]} +{"18527694|8363289": ["Recent research on model predictive control and optimal control of hybrid systems is also connected to this work [17, 18, 6, 5]."]} +{"3649953|13526777": ["In contrast with conventional numerical methods, the efficiency of the recurrent neural network does not decrease when the size of the optimization problem increases [21]\u2013[23], [26]."]} +{"58148857|12191695": ["\u76ee\u524d\u5df2\u7ecf\u51fa\u7248\u4e86\u6570\u672c ADP \u65b9\u6cd5 \u7684\u4e13\u8457 [11 \u2212 17] \u53ca\u591a\u7bc7\u7efc\u8ff0\u6027\u8bba\u6587 [18 \u2212 23] ."]} +{"58148857|1995121": []} +{"59117463|12191695": ["Function approximation methods [19 \u2212 21] can provide a compact representation for value function by storing only the parameters of the approx-imator, and thus hold great promise for high-dimensional RL problems."]} +{"59117463|393948": []} +{"59117463|6400766": []} +{"59117463|10087812": ["For example, there have been some research on combining transfer learning with RL [114] , aiming to solve di\ufb00erent tasks with transferred knowledge."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"26565690|206670318": []} diff --git a/edge/graph_206704676.jsonl b/edge/graph_206704676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f63077d656c4ba0b1521c2aa4c4bf8fe72015ff --- /dev/null +++ b/edge/graph_206704676.jsonl @@ -0,0 +1 @@ +{"29736000|17120461": []} diff --git a/edge/graph_206725396.jsonl b/edge/graph_206725396.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206727594.jsonl b/edge/graph_206727594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206739910.jsonl b/edge/graph_206739910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0f152535246b57505d96681aebd108cad7ed838 --- /dev/null +++ b/edge/graph_206739910.jsonl @@ -0,0 +1,4 @@ +{"9375362|15782139": []} +{"16573689|206764452": ["It actively collects environment information around automobiles, and brings potentially risky conditions to the driver\u2019s attention as soon as possible [1] [2]."]} +{"17139834|12127129": ["There are many other techniques (Wallflower [32], Pfinder [35], and more [23]) based on texture, color spaces, and pixel-, region-, or frame-based approaches."]} +{"10572365|2113024": ["Surveys of pedestrian detection research are presented in [27], [36]."]} diff --git a/edge/graph_206741902.jsonl b/edge/graph_206741902.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7154df0795b72bd8f9dc365b0096d01fdb31a54 --- /dev/null +++ b/edge/graph_206741902.jsonl @@ -0,0 +1,14 @@ +{"6988770|8815923": ["For grasping [37], grasp stability of finger contacts can be learned from previous grasps on an object [45]."]} +{"4450982|4491892": ["This has been shown to permit consistent recursive estimation with a fixed number of particles provided a system exhibits \u201cexponential forgetting\u201d of its past estimate errors [6]."]} +{"11616283|7257659": ["The lane-level information is used in a variety of situations, from generating smooth trajectories for path planning [1], to predicting the behavior of other vehicles [3], [4], and for planning and reasoning about proper behavior in intersections [5]."]} +{"12104564|7788290": ["Many examples of people tracking have used cameras as their primary sensor [19, 26], however laser rangefinders have also been used [52]."]} +{"3909853|201710040": ["In the absence of large datasets, state-of-the-art algorithms uch as one-shot learning [168], zero-shot learning [169], deep etric learning [170] should also be explored to developed accuate models."]} +{"12888763|393948": ["It has been shown that convnet representations trained on classification problems generalize well to other tasks [18, 17, 2, 6].", "Such \u2018transfer learning\u2019 has been demonstrated elsewhere for training classifiers [18, 17, 2], but here we demonstrate transfer learning from classification to the qualitatively different task of pose regression."]} +{"9614092|1517662": ["Some systems contain discontinuities (for example, the process model might be jump-linear [14], in which the parameters can change abruptly, or the sensor might return highly quantized sensor measurements [15]), others have singularities (for example, perspective projection equations [16]), and in others the states themselves are inherently discrete (e.g., a rule-based system for predicting the evasive behavior of a piloted aircraft [ 17 ])."]} +{"14064353|206739910": ["Described in the section before there are many factors influencing the localization system within urban areas."]} +{"11991173|11026696": ["D reconstruction can be categorized into two, i.e., calibrated and uncalibrated reconstruction, and reviews can be found in Lu et al. [61] and Fusiello [62]."]} +{"11991173|6972141": [", focused mainly on map-based localization with a limited coverage of map-building pertaining to publications up to late 1990s [33]."]} +{"126966246|6681074": ["Although research in visual landmark recognition has been ongoing for over 30 years, all existing techniques seem to suffer from at least one of the following problems (2, 3): (1) The sensor must have previously observed the scene from similar vantage points for it to be recognized; (2) excessive computations are needed to match image data to a terrain model, thus limiting real-time operation; (3) accurate localization information cannot be obtained from recognized landmarks; and (4) background clutter causes recognition and localization errors."]} +{"8445223|6988770": []} +{"8061430|4491892": ["This leads to a crucial property: SIS with resampling can produce reasonable statistics only for systems that \u201cexponentially forget\u2019\u2019 their past [8] (i."]} +{"29365355|6972141": ["The critical distinction between these demonstrations and the DGC and DUC was that the demonstrations prior to the Challenges did not use GPS because they did not need to: each robot\u2019s goal was simply to stay on the highway (DeSouza & Kak, 2002)."]} diff --git a/edge/graph_206742377.jsonl b/edge/graph_206742377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c272f35976bf0aca3ff6b707e5bd0f7fd36e5778 --- /dev/null +++ b/edge/graph_206742377.jsonl @@ -0,0 +1,2 @@ +{"3339536|10500613": ["However, existing schema matching works mostly focus on simple 1:1 matching [18, 9, 15] between two schemas.", "Although 1:1 matching has got great attention [18, 9, 15, 10], m:n matching has not been extensively studied, mainly due to the much more complex search space of exploring all possible combinations of attributes (as Section 7 will discuss)."]} +{"2664978|10500613": ["[25] gives a taxonomy of approaches to schema matching.", "Although schema integration is a well-studied problem [6, 7, 14, 16, 18, 19, 25, 29], the integration of query interfaces on the Web has just received more attentions recently [10, 11].", "Mapping Reusing: Reusing past identified mappings to help identify new mappings is an effective way of improving matching accuracy [25].", "Note that the bridging effect is similar to the idea of reusing existing mappings [25].", "The bridging effect is similar to the idea of reusing past identified mappings [25]."]} diff --git a/edge/graph_206743327.jsonl b/edge/graph_206743327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5089529a09be5c56cdc7586eca12a48befbd20d --- /dev/null +++ b/edge/graph_206743327.jsonl @@ -0,0 +1,10 @@ +{"2998466|13034818": ["[5] give a nice, up-to-date summary of non-volatile memory technologies, but they focus on storage-hierarchy applications.", "There are obviously many uses of NVM in the storage system [5]."]} +{"14663597|8125630": ["To carry all older versions of a tuple in the same table has signi\ufb01cant application advantages especially in planning applications, where retrieving older versions of data is common [7]."]} +{"109963128|13034818": ["Since that time, both FRAM and MRAM have proved to be less scalable than had been hoped[31], although the original MRAM concept has since been mostly replaced by the more promising Spin-Transfer Torque (STT-RAM)[248] and Racetrack memory[249] concepts.", "These candidates range from technologies that have reached the marketplace after successful integration in real CMOS fabs (ferroelectric and magnetic RAM), to novel ideas that are barely past the proof-of-principle stage (racetrack memory and organic RAM), to technologies that are somewhere in-between (PCM, resistance RAM, and solidelectrolyte memory)[31].", "In addition, integrated large-array demonstrators with impressive retention, endurance, performance and yield characteristics[31] have been built.", "Fortunately, new NVM candidate technologies have been under consideration as possible Flash \u201creplacements\u201d for more than a decade[31]."]} +{"15069759|13034818": ["As a result, there are widespread interests in the research community and in the industry to consider incorporating NVM technologies to substitute or complement DRAM as the main memory in future computer systems [5, 9, 36, 15, 26, 7, 31, 8, 33, 29, 20].", "There are wide-spread discussions on incorporating NVM technologies to substitute or complement DRAM as the main memory in future computer systems [5, 9, 36, 15, 26, 7, 31, 8, 33, 29, 20]."]} +{"11566546|11575230": ["Researchers have studied the FTL algorithms [3] and proposed various improvements on their performance based on block-level associativity [15], onchip caching [1], page-level lazy updates [18], or wear-leveling [11]."]} +{"202139|816774": ["Although PAX employs in-\npage vertical partitioning, it incurs minimal record reconstruction costs, because it does not need to perform a join to construct a result tuple."]} +{"544694|13034818": ["Recently, Nonvolatile Random Access Memories (NVRAM), such as phase change memory and spin-transfer torque RAM, have emerged as viable storage alternatives [5].", "Examples include phase change memory (PCM), where a chalcogenide glass is heated to produce varying electrical conductivities, and spin-transfer torque memory (STT-RAM), a magnetic memory that stores state in electron spin [5]."]} +{"11301005|14140377": []} +{"7238275|18300540": ["Nevertheless, since 1976, databases have introduced support for a finite set of invariants [14, 26, 29, 32, 37] in the form of primary key, foreign key, uniqueness, and row-level \u201ccheck\u201d constraints [42]."]} +{"7238275|8424228": []} diff --git a/edge/graph_206762242.jsonl b/edge/graph_206762242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6e49e3a1c44320ed5dc597a8256893388ad7368 --- /dev/null +++ b/edge/graph_206762242.jsonl @@ -0,0 +1,26 @@ +{"2191494|1230643": ["In the framework of wireless communications and technologies, the development of low\u2010power and low\u2010cost devices, such as Wireless Sensor Networks (WSN) [2], integrating on\u2010board processing and radio interface has favored the development of efficient cooperative signal processing algorithm for tracking purposes.", "\u00a0 \u00a0\nMathematical\u00a0Formulation\u00a0 \u00a0\nLet\u00a0 us\u00a0 consider\u00a0 a\u00a0WSN\u00a0 infrastructure\u00a0 composed\u00a0 by\u00a0 K \u00a0 nodes\u00a0 arranged\u00a0 in\u00a0 a\u00a0 realistic\u00a0 environment.", "\u00a0Consequently,\u00a0unlike\u00a0 state\u2010of\u2010the\u2010art\u00a0 approaches,\u00a0 the\u00a0 infrastructure\u00a0needed\u00a0by\u00a0 the\u00a0 tracking\u00a0procedure\u00a0 is\u00a0 limited\u00a0 to\u00a0 the\u00a0nodes\u00a0of\u00a0 the\u00a0WSN,\u00a0without\u00a0the\u00a0need\u00a0of\u00a0additional\u00a0sensors.", "\u00a0 In\u00a0 the\u00a0 framework\u00a0 of\u00a0 wireless\u00a0 communications\u00a0 and\u00a0 technologies,\u00a0 the\u00a0 development\u00a0 of\u00a0 low\u2010power\u00a0 and\u00a0 low\u2010cost\u00a0 devices,\u00a0 such\u00a0 as\u00a0 Wireless\u00a0Sensor\u00a0Networks\u00a0(WSN)\u00a0[2],\u00a0 integrating\u00a0on\u2010board\u00a0processing\u00a0and\u00a0radio\u00a0 interface\u00a0has\u00a0favored\u00a0the\u00a0development\u00a0of\u00a0efficient\u00a0cooperative\u00a0signal\u00a0processing\u00a0 algorithm\u00a0 for\u00a0 tracking\u00a0 purposes.", "\u00a0\n1,\u00a0a\u00a0 set\u00a0of\u00a0 \u00a0WSN\u00a0nodes,\u00a0 represented\u00a0by\u00a0 the\u00a0black\u00a0 rectangles,\u00a0have\u00a0been\u00a0 deployed\u00a0on\u00a0desktops,\u00a0depicted\u00a0by\u00a0the\u00a0white\u00a0rectangles,\u00a0inside\u00a0a\u00a0realistic\u00a0indoor\u00a0 environment\u00a0of\u00a0 size\u00a0 8=K\n\u03bb55=IX \u00a0 and\u00a0 \u03bb45=IY ,\u00a0 \u03bb \u00a0being\u00a0 the\u00a0wavelength\u00a0 at\u00a0 the\u00a0 frequency\u00a0 .", "\u00a0 In\u00a0 this\u00a0 work,\u00a0 the\u00a0 localization\u00a0 problem\u00a0 is\u00a0 addressed\u00a0 by\u00a0 considering\u00a0 only\u00a0 the\u00a0 information\u00a0provided\u00a0by\u00a0 the\u00a0quality\u00a0 indexes\u00a0of\u00a0 the\u00a0wireless\u00a0 links\u00a0between\u00a0 the\u00a0 nodes\u00a0of\u00a0 the\u00a0WSN\u00a0 as\u00a0 in\u00a0 [4]."]} +{"31449684|1634674": ["Most of the previously proposed schemes in activity recognition collect data from either triaxial accelerometers, video sequences [4], or environmental variables."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"2104873|6681074": ["There is a very large body of literature on the topic of shape-based object recognition \u2014 the reader is referred to surveys such as [1, 8]."]} +{"371451|14288295": ["The HMMs can be trained by using forward-backward algorithms (see [17] for details)."]} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"35158864|16525678": ["Due to localization errors, which cause the robot to stop at a as corresponding to the same object), and (2) if the observed slightly different point than the planned goal, at each goal area corresponds to a scene variation.", "\u2026has been devoted to issues, such as autonomous navigation in both indoor environments and outdoor rough terrains (Seraji and Howard, 2002), visual recognition (Hu et al., 2004; Valera and Velastin, 2005), sensor fusion/modulation (Huq et al., 2006) and sensor scheduling (Gage and Murphy, 2004).", "The development of fully automated surveillance systems based on mobile multifunctional robots is an active research area (Hu et al., 2004; Milella et al., 2008; Tseng et al., 2007; Valera and Velastin, 2005).", "The results are promising, (reafter called g-pints)by proving the method to be effective in detecting either new or previously placedRFID tags; removed objects in the surveyed scene, also in presence of (2) monitor target zones detecting unexpected changes of the relatively small viewpoint changes."]} +{"35158864|17516538": ["\u2026has been devoted to issues, such as autonomous navigation in both indoor environments and outdoor rough terrains (Seraji and Howard, 2002), visual recognition (Hu et al., 2004; Valera and Velastin, 2005), sensor fusion/modulation (Huq et al., 2006) and sensor scheduling (Gage and Murphy, 2004).", "The fuzzy system must determine (1) applied to ten sequential readings, while, during inspection, if the compared clusters lie in the same area of the scene (in only three readings are considered because of time constraints.", "Applications of the proposed system include surveillance system has two goals: of wide areas, such as airports and museums, and monitoring of (1) automatically build a map of an unknown indoor safety equipment.", "The development of fully automated surveillance systems based on mobile multifunctional robots is an active research area (Hu et al., 2004; Milella et al., 2008; Tseng et al., 2007; Valera and Velastin, 2005)."]} +{"7811409|14970359": ["Many approaches have been proposed for video-based human movement analysis [1]\u2013[6], [9], [10]."]} +{"5854062|1634674": ["We discuss implementation, testing and evaluation in Section 6 and conclude the paper in Section 7."]} +{"14894961|7923463": []} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"42000734|7788290": []} +{"18112361|7185733": ["In [52] and [49], each gesture was considered to consist of three phases: pre-stroke, nucleus, and post-stroke."]} +{"11359025|1634674": ["We review related work on Hidden semi-Markov Models (HSMMs), Conditional Random Fields (CRFs), and discriminative temporal segments in the context of video, and refer the reader to a recent survey in the area by Turaga et al. [24] for a comprehensive review."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"15534101|17516538": ["In general, the first step for automatic video surveillance is adaptive background subtraction to extract foreground regions from the incoming frames [ 1 ].", "One of the most important technologies for intelligent video surveillance is to track objects over time in natural busy scenes and to keep a consistent identity for each target object through the sequence [ 1 ]\u2013[5].", "For a surveillance camera capturing a scene with wide coverage, the resolutions of target objects are usually low in the images [ 1 ].", "group at t \u2212 1, whose value ranges within [0, 1 ]. The higher the visibility value is, the more part of the object is visible.", "However, when multiple tracked objects merge into groups with various complexities of occlusion, tracking each individual object through crowds becomes a challenging task [ 1 ]."]} +{"15371736|1230643": []} +{"28307476|17516538": ["The design of an advanced automatic video surveillance system requires the application of many important functions including, but not limited to, motion detection [13]\u2013[25], classification [26], tracking [27], [28], behavior [29], activity analysis, and identification [30], [31].", "The three major classes of methods for motion detection are background subtraction, temporal differencing, and optical flow [13]."]} +{"16467616|12127129": []} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"356547|3348390": ["An entity is defined as \u201ca person, place or objects that is considered relevant to the interaction between a user and an application, including the user and applications themselves\u201d [79]."]} diff --git a/edge/graph_206764452.jsonl b/edge/graph_206764452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c182892e77f04062f9c98555abb8d1ab1a7ac171 --- /dev/null +++ b/edge/graph_206764452.jsonl @@ -0,0 +1,17 @@ +{"17435119|7788290": ["2 Previous Work Most work on pedestrian detection [8] has taken a learning-based approach, bypassing a pose recovery step altogether and describing human appearance in terms of simple low-level features from a region of interest One line of work has dealt speci\ufb01cally with scenes involving people\u2026"]} +{"16405794|7788290": ["Overviews on this topic can be found at Lombardi 14 and at Gavrila.", "Overviews on this topic can be found at Lombardi(14) and at Gavrila.(7)"]} +{"341776|15782139": ["In the first experiment we apply mcl to the offline, text-independent handwriting identification problem (recognizing the author by his/her handwriting) [29]."]} +{"8729004|7788290": ["We will only mention a few of the more recent works on human detection here \u2013 see Gavrilla\u2019s survey [ 7 ] for older references."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"37581938|7788290": []} +{"14278379|1029120": []} +{"10769792|192934": ["Classification performance, in general, is known to scale with the training sample size [10].", "Instead of manually crafting a set of features, multilayer perceptrons provide an adaptive approach for feature extraction by means of their hidden layer, so that the features are tuned to the data during training [10].", "The probably best known (linear) feature extraction method is principal component analysis (PCA) [10].", "We focused our selection on pattern classifiers that directly construct the decision boundary, rather than density estimation approaches [10] (e.g., Bayes Decision Theory or Parzen Classifier), given that the latter seem less suited for modeling the nontarget class, which is, in a sense, not a real\u2026"]} +{"10769792|7788290": ["T HE ability to detect people in images is key to a number of important applications ranging from surveillance, robotics, and intelligent vehicles to advanced user interfaces [1]."]} +{"15313311|192934": ["neural networks, support vector machines, [13, 21].", "machines can be converted to an estimate of posterior probabilities [13, 16, 19].", "We use anisotropic multivariate Gaussian kernels K, with bandwidths optimized via maximum likelihood on the training set [13], for both the shape and shape-normalized texture space, respectively."]} +{"1029120|2113024": ["The survey paper [32] covers not only the recent research on pedestrian detection but also describes the research on collision prediction using pedestrian"]} +{"1029120|206051485": ["A survey of registration methods is presented in [107]."]} +{"17768515|7788290": ["A comprehensive literature review for models to represent a priori information about human appearance is given by Gavrila [ 2 ]."]} +{"15250024|7788290": ["Gavrila [ 7 ] provides a good survey of the field."]} +{"7016449|7788290": []} +{"55372932|17516538": []} +{"55372932|7788290": []} diff --git a/edge/graph_206776411.jsonl b/edge/graph_206776411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2faef2d1b9c2c49815039b82372317bd9cd4c7b3 --- /dev/null +++ b/edge/graph_206776411.jsonl @@ -0,0 +1 @@ +{"13649271|386036": [", [18], [19], [20], [21], [22]) and ontologies for semantic web (e."]} diff --git a/edge/graph_206778272.jsonl b/edge/graph_206778272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c63f679531ad160bd7734849c62d1ed7c8e69e0 --- /dev/null +++ b/edge/graph_206778272.jsonl @@ -0,0 +1 @@ +{"19432623|206778272": ["Maintenance of software is reported as a serious cost factor [24].", "Refactoring is assumed to positively a\ufb00ect non-functional aspects, presumably extensibility, modularity, reusability, complexity, maintainability, and e\ufb03ciency as stated in [24]."]} diff --git a/edge/graph_206778480.jsonl b/edge/graph_206778480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206870493.jsonl b/edge/graph_206870493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..523ff30dede7d55e477eb01d8df60dad74ab59d3 --- /dev/null +++ b/edge/graph_206870493.jsonl @@ -0,0 +1,13 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"4988443|206051485": []} +{"8824281|15744805": ["Finally, discrepancy may be computed on general characteristics related to the segmented objects or structures, such as position and number of incorrectly segmented objects or values of segmented object features [33]."]} +{"43616114|2616070": []} +{"1174054|14122909": ["[90], non-rigid image-to-image registration has been reviewed by Crum et al."]} +{"1174054|1720774": ["Although a static distortion can be compensated by means of calibration procedures [57], dynamic changes in surgical environment are difficult to compensate."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"3856382|2877147": ["1 Image Preprocessing Since the endoscope images suffer from interlacing artifacts particularly in areas with motion like the instrument regions, the captured images are first deinterlaced with a skip field and interpolation approach [18]."]} +{"27652949|2080630": ["To reduce such human errors, the medical technology community seeks to augment the capabilities of the surgeon with context-aware computer-assisted surgical systems [2], [3]."]} +{"16227658|7788290": ["work in human tracking made use of local features such as edges [15], [ 10 ] to optimize over body pose, building upon several systems for tracking rigid or low-DOF articulated 3D objects which rely upon visual contours [9], [29], [22], [28].", "The 3D pose recovery is then either formulated as an inverse kinematics problem or a constrained optimization problem, the latter formulation typically being more robust over time [ 10 ].", "Examples range from tracking rigid objects in motion [15] to tracking robot arms or hands [30], [6] to tracking one or more humans in images [ 10 ]."]} +{"74434|2616070": ["More sophisticated models for intensity, color, or texture of objects and background could be employed [34]."]} +{"4978757|2616070": ["We describe the segmenting contours using level sets of signed distance functions [7, 4] as they avoid the problem of an explicitly parametrized curve while elegantly applying implicit correspondences between the region-based data contours and the model projection contours."]} diff --git a/edge/graph_206885392.jsonl b/edge/graph_206885392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e1759b135ad1ef2a3d7bf47cf06894db0bf7667 --- /dev/null +++ b/edge/graph_206885392.jsonl @@ -0,0 +1,15 @@ +{"10613736|206051485": ["Motion estimation algorithms are classifiable as feature-based algorithms and regionbased algorithms [13]."]} +{"3137480|206051485": ["Larger and more complex geometric distortions can be suppressed (usually just up to a small between-image shift) by a proper registration method (there have been hundreds of them investigated, see Zitov\u00e1 and Flusser, 2003 for a survey)."]} +{"8190307|206051485": []} +{"7527594|206051485": ["\u2026and Taur 2005; Zhu and Ma 2000; Dang, et al. 1995; Jing and Chau 2004; and Wang, et al. 2001), image sequence interpolation (Gonzalez and Woods 1992), image registration (Fitzgibbon 2001; Kundur and Hatzinakos 1996, 1996b; and Zitov\u00e1 and Flusser 2003) and standards conversion (Wang, et al. 2001)."]} +{"117176504|206051485": ["Although the collection of algorithms on image registration is massive [28, 210], they can be classified into two main approaches: feature-based methods and areabased methods."]} +{"117176504|8920058": ["Though computationally less expensive, other surface interpolation methods, such as the inverse distance weighting method and the radial basis function method [9], are all very sensitive to noise."]} +{"1578764|206051485": []} +{"3237050|3540699": ["For halfpel accuracy the classical block matcher needs an interpolated image, consequently we have chosen a 6 tap FIR interpolation filter [7] approaching an ideal interpolation filter."]} +{"9384861|206051485": ["An extensive survey of image registration techniques is provided in [8]."]} +{"8291341|5171123": ["Although the probabilistic eigenface, linear discriminative analysis based subspace algorithms and support vector machine based methods claimed to be superior to eigenface, all of these approaches either reduce to the basic eigenface approach or simply fail to work in \u201cone sample per class\u201d situation [14]."]} +{"6711411|206051485": ["Zitov\u00e1 and Flusser [16] presentan overview of image registration methods."]} +{"122810066|206051485": []} +{"23323845|206051485": []} +{"1855952|9045232": ["Numerous methods involving the synthesis or reconstruction of high-resolution images from either a sequence of low-resolution images or a single-frame, low-resolution image have been reported [2]."]} +{"3461000|206051485": ["There are a variety of image registration techniques described in the literature [71]."]} diff --git a/edge/graph_206901977.jsonl b/edge/graph_206901977.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58465376803d067531607b4322b57cbc9d1ac17a --- /dev/null +++ b/edge/graph_206901977.jsonl @@ -0,0 +1,56 @@ +{"2343121|870434": []} +{"8411530|1503157": ["ZigBee protocol stack that defines three objects according its functions: network coordinator, routers, and semi-functional nodes [13]."]} +{"8411530|2937482": ["Time synchronization is an important performance in WSNs, because it is a key factor in the process called data fusion [14]."]} +{"8411530|1230643": ["A WSN (wireless sensor network) is an ad-hoc network system composed of a great number of tiny low cost and low power consumption sensing nodes which are capable of sensing, calculating and communicating data [2]."]} +{"6224540|205286988": []} +{"6224540|1230643": ["In WSN, sensors gather information about the physical world and the base station or the sink node makes decision and performs appropriate actions upon the environment [1]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"11217133|1230643": ["1 For a survey on sensor network applications see [1].", "A survey of sensor networks can be found in [1]."]} +{"16609901|1230643": ["Wireless sensor networks (WSNs) consist of hundreds to thousands of battery-powered tiny sensors that are endowed with a multitude of sensing modalities including environmental monitoring and security surveillance purposes [1]."]} +{"18664196|1230643": ["After deployment, sensors are lowered to various depths selected by our scheme such that the maximum coverage of the three dimensional sensor space is maintained."]} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"36126091|1230643": []} +{"36126091|12060835": []} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"7320605|1756215": ["[6] had proposed a taxonomy which divides current existing typical game theory approaches for WSN security into four categories: preventing DoS attacks, intrusion detection, strengthening security, and coexistence with malicious sensor nodes.", "A relatively smaller portion of the contributions in this area has been summarized in [5,6].", "[6] summarized 30 publications of the existing game theoretical approaches that are designed to strengthen WSN security."]} +{"8158506|1230643": ["Recently, wireless sensor networks (WSNs) have received enormous interests from both industry and academia [1]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"2583020|10837932": ["As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|17960632": ["In fact, for hard real time applications the problem is not only the added delay but also the nondeterministic way in which that delay occurs (for more information on Real-Time MACs for WSNs the reader is referred to [9]).", "medium access is ruled out because of its nondeterministic delays, and reservation-based MACs will be preferred [9].", "As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|1940388": ["Security issues in WSNs are discussed in [58]."]} +{"35871405|6275330": []} +{"35871405|205286988": []} +{"35871405|1236072": []} +{"35871405|3540699": []} +{"35871405|1230643": []} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"16384897|1230643": ["The battery-operated wireless nodes in a WSN mostly require energy minimizing mechanisms, in order to ensure a longlasting operation without the need for replacement/ recharging the battery [4]."]} +{"9701786|205286988": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} +{"9701786|1236072": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} +{"10148907|205286988": ["Roughly speaking, sensor networks can be classified into four categories [32, 33]: continuous, event-driven, query-driven, and hybrid."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"37394652|1236072": ["Depending on the network structure adopted, the routing protocols for WSNs can be classified into flat network routing, hierarchical network routing, and location-based routing [2].", "This may result in early network partition [2]."]} +{"37394652|1230643": ["An N-to-1 multipath discovery protocol is proposed in Reference [17].", "Other applications of WSNs can be found in Reference [1].", "In Reference [19], the multipath routing is formulated as a linear programming problem with an objective to maximize the time until the first sensor node runs out of energy.", "We further assume that each sensor node carries an omni antenna and the energy consumptions for idle time, transmission and reception are 35, 660 and 395 mW; respectively (the same parameters as in Reference [5]).", "Various link cost functions have been proposed in the literature (e.g. Reference [26]).", "In this paper, we use the data aggregation algorithm proposed in Reference [25].", "Various data aggregation algorithms have proposed in the literature (e.g. References [22\u201325]).", "Finally, the multipath-based routing protocols, such as the schemes proposed in References [9\u201311], tend to enhance the reliability through the use of multiple paths.", "Directed transmission proposed in Reference [18] is one of the probabilistic routing techniques, which are derived from the flooding.", "In Reference [11], a multipath routing approach is proposed for the directed diffusion [5] to improve the resilience to node failures.", "In Reference [20], the multipath routing is formulated as a constrained optimization problem by using deterministic network calculus.", "The energy-aware routing is proposed in Reference [9]."]} +{"9199492|18643817": ["\u2026protocols, and techniques have been done in the last few years to deliver multimedia content over large-scale networks, such as single-hop wired LANs (e.g., [3], [4]), multi-hop wired LANs (e.g., [5]), ATM (e.g., [6], [7]), mobile adhoc networks(e.g., [8], [9]) and the Internet (e.g., [10]\u2013 [14])."]} +{"9199492|14088590": []} +{"9199492|12817488": []} +{"9199492|1236072": ["For example, some applications might require a diverse mixture of sensors for monitoring temperature, pressure, and humidity of the surrounding environment, detecting motion via acoustic signatures, and capturing images or video tracking of moving objects [24]."]} +{"9199492|1230643": ["Although plethora of works on surveying architecture, applications and communication protocols for wireless sensor networks are performed beforehand [1], [15]\u2013[20], this survey is distinguished from the previous efforts in that it pioneers to investigate those routing techniques which address application-specific QoS as well as energy efficiency for WMSNs.", "[15], [34], [35], [36], [39], [40], [41], [42] Hard Real-time Bounded"]} +{"206894870|1230643": ["Coverage algorithms are classified based on applications they are targeted for such as security, environmental monitoring, and target tracking [19]; or, based on the nature of the algorithm such as centralized, localized and distributed [20]; or, based on the domain they are targeted for such as static and mobile networks [21] or, two-dimensional or three-dimensional networks [22]."]} +{"6342690|1940388": ["A review of security threats to WSNs and a survey of defense mechanisms is presented in [26]."]} +{"6342690|12817488": ["A survey of data aggregation algorithms used in WSNs is presented in [22]."]} +{"6342690|1230643": ["This scenario is used in most monitoring applications in agriculture [7], [8], microclimate [4], [5], [9] and habitat surveillance [10]\u2013[12], military operations [13], and disaster relief [14]."]} +{"6342690|1708582": ["RL [41], [42] is a sub-area of machine learning concerned with how an agent should take actions in an environment so as to maximize some notion of a long-term reward."]} +{"6342690|6555395": ["A survey of NN learning methods, their properties and applications is presented in [32]."]} +{"14999784|1230643": []} +{"6228422|14441987": ["Zhao Jindong, Liang Zhenjun, Zhao Yaopei T 978-1-4244-3608-8/09/$25.00 \u00a9 2009 IEEE. working in such network that the nodes are moving [9]."]} +{"62314423|205286988": []} +{"3260847|3894519": ["Thus, Authors in [1], [ 2 and [3] proposed energy efficient routing protocols."]} +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"10183|205286988": ["Previous research on the routing protocol [ 1 ] in WNS usually assume that sensors are located in fixed position, neglecting the high dynamics of the network."]} +{"11425447|41998167": ["On the other side, contention-free approach, like TDMA, is more appropriate for multimedia applications with reliable channel conditions and heavier traffic load.", "The existing sensory MAC protocols are mostly based on variants of the carrier sense multiple access with collision avoidance (CSMA/CA) [7] and time division Multiple Access (TDMA) [6].", "Our proposed scheduling mechanism is based on adaptive QoS-aware TDMA approach used at two levels in the network: within clusters and among cluster heads.", "Design of an efficient QoS-aware MAC protocol [5, 6] is another important step for correct delivery of real-time multimedia data and for end-to-end QoS provisioning over WMSNs.", "Our proposed scheduling protocol is based on TDMA approach with flexible time slot assignment that adaptively assigns slots to various traffics from active nodes.", "Our proposed cross-layer protocol achieves higher throughput, as shown in Figure 6, than the other protocols by efficiently utilizing the wireless spectrum and distributing the load via adopting adaptive TDMA-based scheduling and selecting multiple paths of better link quality and minimum delay, respectively.", "Therefore, we prefer to adopt TDMA protocol to access the channel as it has a natural advantage of collision-free medium access, and it is more appropriate for transmitting multimedia applications with QoS at reliable channel conditions and heavier traffic load."]} +{"11425447|5404353": ["Several cross-layer and communication protocols were developed to address the aforementioned issues for WMSNs and surveyed in [8]."]} diff --git a/edge/graph_206931272.jsonl b/edge/graph_206931272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77ec49ee5e3188b93a37898412ede791a7d3737d --- /dev/null +++ b/edge/graph_206931272.jsonl @@ -0,0 +1,3 @@ +{"6671170|7624176": ["In occlusion culling [2], geometry that is hidden behind objects closer to the camera point, is discarded before being subject to depth sorting algorithms."]} +{"882104|5801277": ["A wide variety of options exist for rendering volumes (Engel et al. 2006; Cerezo et al. 2005), although these are generally very computationally expensive and it is common to emulate a volumetric effect using simpler methods."]} +{"882104|469744": ["However, there is still a lot of research to be done in AR [8,9,107] to measure accurately its effects on humans."]} diff --git a/edge/graph_206932295.jsonl b/edge/graph_206932295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..081f163e811dd829c0f494bf06a8b173ff77d051 --- /dev/null +++ b/edge/graph_206932295.jsonl @@ -0,0 +1,16 @@ +{"12884111|1097238": [", they could have the same level of competence in their respective representation space for the classification of the unknown sample [3,16]."]} +{"12884111|15782139": ["The main objective of a signature verification system is to exploit the singular and personal character of writing [15,28]."]} +{"14440737|15782139": []} +{"2029108|1099309": ["MPEG-7 is composed of seven parts, of which \u201cVisual\u201d (Sikora 2001) addresses the description of visual elements, such as video or still images.", "Visual inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4 .2.1 Wood inspection . . . . . . . . . . . . . . . . . . . . . . . ."]} +{"2029108|13365762": ["The ISO/IEC MPEG-7 standard (Martinez 2001) is an attempt to create a standardized description for digital audiovisual content."]} +{"62553792|15782139": ["The state of the art from 1993 to 2000 is discussed in a paper by Plamondon and Shihari (2000).", "Plamondon and Shihari (2000) note that automated signature verification systems occupy a very specific niche among other automated identification systems: \u201cOne the one hand, they differ from systems based on the possession of something (key, card etc.", "Plamondon and Shihari (2000) note that automated signature verification systems occupy a very specific niche among other automated identification systems: \u201cOne the one hand, they differ from systems based on the possession of something (key, card etc.) or the knowledge of something (passwords,\u2026"]} +{"15782139|2762290": []} +{"15782139|6746689": []} +{"21776128|15782139": ["The state-of-the-art of signature verification through different years is summarized in [4], [6], [7]."]} +{"8947804|15782139": ["Thus, the FAR evaluation is difficult and generally imprecise [259], [377].", "Thus, automatic signature verification is particularly useful in all applications in which the authentication of both transaction and user is required [259], [326].", "The aim of these efforts is to facilitate the integration of signature verification technologies into other standard equipment to form complete solutions for a wide range of commercial applications such as banking, insurance, health care, ID security, document management, e-commerce, and retail point-of-sale (POS) [78], [259], [320].", "remains an interesting research area that encompasses not only those features produced by people with normal abilities but also those generated by people who suffer from disabilities and diseases that may lead to handwriting constraints [259].", "Moreover, verification by signature analysis requires no invasive measurements and people are familiar with the use of signatures in their daily life [259]."]} +{"8241984|15782139": ["Such application is commonly performed in either on-line or off-line frameworks [1], [2].", "Thereby, first point coordinates, writing speed, pen down and pen top as well as some other characteristics are used [2]."]} +{"30025431|15782139": []} +{"8972864|15782139": []} +{"1044293|393948": ["An even more radically different solution to the problem of avoiding explicit latent variables was recently introduced in Bengio et al. (2013c) and Bengio and Thibodeau-Laufer (2013).", "They are hurt by the problem of mode mixing, discussed at greater length in Bengio et al. (2013b), and summarized here.", "The hypothesis proposed (Bengio et al., 2013b) to explain this observation is that unsupervised representation learning procedures (such as for the RBM and contractive or denoising auto-encoders) tend to discover a representation whose distribution has more entropy (the distribution of vectors in\u2026", "Instead, they are based on the construction of a direct parametrization of an encoding function which immediately maps an input x to its representation f(x), and they are motivated by geometrical considerations in the spirit of manifold learning algorithms (Bengio et al., 2013d).", "An interesting observation (Bengio et al., 2013b) which could turn out to be helpful is that after we train a deep model such as a DBN or a stack of regularized auto-encoders, we can observe that mixing between modes is much easier at higher levels of the hierarchy (e.g. in the top-level RBM or\u2026", "\u2026result was only valid for asymptotically small Gaussian corruption noise, squared reconstruction error, and continuous inputs, the result from Bengio et al. (2013c) is applicable for any type of input, any form of reconstruction loss (so long as it is a negative log-likelihood), any form of\u2026", "Although the result from Alain and Bengio (2013) suggests that when the amount of injected noise is small, a unimodal distribution is sufficient, it is convenient to accomodate large amounts of injected noise to make training more efficient, as discussed by Bengio et al. (2013c).", "As explained in Bengio et al. (2013d), the tug-of-war between minimization of reconstruction error and the regularizer means that the intermediate representation must mostly capture the variations necessary to distinguish training examples, i.e., the directions of variations on the manifold (a\u2026", "Furthermore many pieces of evidence in the results of experiments on deep learning suggest that training deep networks (including recurrent networks) involves a difficult optimization (Bengio, 2013b; Gulcehre and Bengio, 2013; Bengio et al., 2013a).", "See (Bengio, 2009; Bengio et al., 2013d) for reviews and Bengio (2013c) and the other chapters of the book by Montavon and Muller (2012) for practical guidelines.", "See section 3 of Bengio et al. (2013d) for a review of representation learning procedures based on directed or undirected graphical models.4 Section 2.5 describes sparse coding in more detail.", "A general strategy was outlined in Bengio et al. (2013d) to enhance the discovery of representations which disentangle the underlying and unknown factors of variation: it relies on exploiting priors about these factors.", "Another encouraging observation (already mentioned in the section on mixing) is that deeper representations were empirically found to be more amenable to quickly mixing between modes (Bengio et al., 2013b).", "See Bengio et al. (2013d) for a brief overview in the context of deep learning, along with connections to other unsupervised representation learning algorithms."]} +{"36607911|15782139": []} +{"177167|15782139": []} diff --git a/edge/graph_206936612.jsonl b/edge/graph_206936612.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01e43a9f5e1cee9c16e16e18ecccac4e5a87085d --- /dev/null +++ b/edge/graph_206936612.jsonl @@ -0,0 +1,19 @@ +{"110458116|10542290": []} +{"110458116|17737221": []} +{"110458116|7278743": ["Bluetooth [29,30] is another common wireless communications system used to exchange data over short distances."]} +{"110458116|121289": ["Such an integrated distribution system offers greater reliability and robustness as the backup is always available [52,43].", "Therefore like similar internetworking systems AMI is vulnerable to security threats [43] and there is need for end-toend encryption to provide confidentiality of metering data [44].", "However all DERs to be integrated into the smart grid would have an electronic power processor and switching power interface for controlling the exchange of power and currents with the grid [43]."]} +{"64408327|18037424": []} +{"1253801|2854761": []} +{"1253801|6959212": ["Optimization, Mobility Support, Harsh Monitoring Environments and Security are some areas in this technology which still need some attention [17].", "This issue severely reduces the application of PLC based communication in areas involving switches, sectionalizers and reclosers [17]."]} +{"16728412|485843": []} +{"207881413|595093": ["(A more detailed discussion on Smart Grid domains can be found in [14] [15] [16].)"]} +{"207881413|6959212": ["Compared with legacy power systems, the Smart Grid is envisioned to fully integrate high-speed and two-way communication technologies [4] [5] [6] [7] [8] into millions of power equipments to establish a dynamic and interactive infrastructure with new energy management capabilities, such as advanced\u2026"]} +{"207881413|2457428": ["As key management for conventional computer networks has been well categorized and summarized in several survey papers [117,118], in the following, we focus on the new requirements of key management for the Smart Grid, and present an overview of existing key management schemes for power systems."]} +{"3500624|2906773": []} +{"3500624|18037424": []} +{"18401175|18037424": []} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"23905408|595093": []} +{"13878913|6959212": ["These capabilities enable the application of the renewable energy like wind and solar power, and will achieve the rapidly increasing energy needs around the world such as the application of power efficient devices like plug-in electric vehicles [5], [6]."]} +{"13878913|6430931": ["The instance of the unsupervised learning of the ANN is self-organizing maps (SOM) are single-layer feed forward networks, their outputs can be compressed into a low dimensional grid and they are the most widely used NN for anomaly detection tasks [55].", "AIS are computational algorithms that emulate the mechanisms of human immune systems [55]."]} diff --git a/edge/graph_20697552.jsonl b/edge/graph_20697552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73d5ecec7389b77ba525594e83a6dd53cf0f8799 --- /dev/null +++ b/edge/graph_20697552.jsonl @@ -0,0 +1 @@ +{"20133180|20697552": ["Testing tools utilise code instrumentation to measure statement coverage [31] of the designated test cases, while in runtime monitoring, instrumentation is used to inject monitoring code [10, 13, 15, 25, 29] to detect system executions violating some specification.", "In runtime monitoring [10, 12, 13, 15, 25], AOP techniques are used extensively to allow a designated runtime analyser to observe system operations and interactions, in order to check this behaviour against a correctness property."]} diff --git a/edge/graph_206977741.jsonl b/edge/graph_206977741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bf6dfe70ec32c14e8a36cc9f373c1daa98f9c66 --- /dev/null +++ b/edge/graph_206977741.jsonl @@ -0,0 +1 @@ +{"12490624|7706992": ["Maguire [32] suggest that for information and service terminals in a public setting, the placement is a critical aspect for whether they will be used or not."]} diff --git a/edge/graph_206982591.jsonl b/edge/graph_206982591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..192206324b6e327d0f3fae58900663f8cde18c05 --- /dev/null +++ b/edge/graph_206982591.jsonl @@ -0,0 +1 @@ +{"16028707|1400872": ["Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al.", "Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al., 2002), and statistical learning algorithms (e.g. locally weighted regression ) for dynamical systems\u2026"]} diff --git a/edge/graph_206983066.jsonl b/edge/graph_206983066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_206986475.jsonl b/edge/graph_206986475.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62aa19cdaffba6b3a24cfad03bef312246937c8a --- /dev/null +++ b/edge/graph_206986475.jsonl @@ -0,0 +1,24 @@ +{"1085632|1236072": ["\u2026Sensor Networks (WSNs); Healthcare; Body Sensor Networks (BSNs); m-Health; Biofeedback; Smart Biosensor\nHr\u010dak ID: 180529\nURI https://hrcak.srce.hr/180529\nPosjeta: 2.565 *\nKontakt\nPretra\u017eivanje \u010dlanaka\ntra\u017ei\nNapredno pretra\u017eivanje\nUpute za pretra\u017eivanje\nMoj profil\nprijava\nRegistracija novih\u2026"]} +{"1085632|1230643": ["Also, commercial applications are also beginning to surface [2].", "Wireless sensor networks (WSNs) are finding applications in many areas, such as medical monitoring, emergency response, security, industrial automation, environment and agriculture, seismic detection, infrastructure protection and optimization, automotive and aeronautic applications, building automation, and military applications [1-3].", "Since sensors rely on internal battery to operate, lifetime is a critical parameter for an wireless sensor network [2]."]} +{"9488808|3348390": ["The sensor data is then used to provide context to the current situation of whatever the sensor is associated with."]} +{"115406306|12347712": []} +{"40374576|205286988": []} +{"12991150|8909218": ["Recently, together with the rapid development of WiMAX and LTE networks, the research on femtocells is becoming very hot [45\u201347]."]} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"26204|12817488": []} +{"54318013|1230643": ["Wireless sensor networks (WSNs) open a widerange of applications, including military surveillance, disaster prediction, and environment monitor [1][2][3][ 4 ]."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"11507304|1230643": []} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"17767204|9240891": ["Therefore, TrE is too simple to ensure the security and efficiency of MSNs."]} +{"43324678|10817088": []} +{"8536143|205286988": []} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} +{"77367|13785718": []} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} +{"9453695|1230643": []} +{"18865945|1236072": ["Good surveys on routing protocols developed specifically for WSN exist and may be found on [11, 12]."]} +{"18865945|1230643": ["In this paper we surfaced the state-of-the-art on the efforts to bring IP over WSN. Motivation is clearly focused on their connection to the Internet in the most transparent possible way, allowing realistic ubiquitous computing applications."]} +{"3258354|9240891": ["Most importantly, we observe that since all these works ([7]\u2013[15]) do not consider the unique operational and security requirements of MSNs, they might not be suitable for MSNs."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} diff --git a/edge/graph_206986719.jsonl b/edge/graph_206986719.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71743e21462c0286d2ca9a687ee073c8c1c74eba --- /dev/null +++ b/edge/graph_206986719.jsonl @@ -0,0 +1,10 @@ +{"39418309|469744": []} +{"11558801|469744": ["Augmented reality [1] is particularly well suited as a user interface (UI) for location-aware applications."]} +{"2925287|469744": ["Many different types of sensors have been used to achieve this including : GPS, gyroscopes, cameras, hybrid vision, accelerometers and many more which have been summarized in [1, 2]."]} +{"314669|469744": ["In contrast to the proliferation of computing devices in such an environment, augmented reality(AR) [4] typically focuses on the use of personal displays (such as see-through head-worn displays) to enhance a user\u2019s senses by overlaying a directly perceptible virtual layer on the physical world."]} +{"791733|469744": ["In 1997, the first author published a survey [ 3 ] (based on a 1995 SIGGRAPH course lecture) that defined the field, described many problems, and summarized the developments up to that point."]} +{"206986536|469744": ["One of the main challenges for projection-based AR systems as well as for head-mounted optical see-through displays is the generation of correct occlusion effects between virtual and real objects [1]."]} +{"3089227|16709997": ["Template matching approaches for special hand features like the finger tips restrict the hand in its flexibility of defor-\nmation since the finger tips should always be visible in the camera images [28, 10]."]} +{"3089227|7185733": ["The parameters which are estimated by the calibration procedure are the focal lengths of both cameras, the translation and rotation from one to the other camera and the\nstructure depth with regard to one camera coordinate frame."]} +{"9295821|469744": ["On the other hand, see-through displays often used for mixed reality are classified into two types: video seethrough and optical see-through [6]."]} +{"6231515|469744": []} diff --git a/edge/graph_206988459.jsonl b/edge/graph_206988459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..314227ef8fa51325b062fb0a3ed89a8834c15203 --- /dev/null +++ b/edge/graph_206988459.jsonl @@ -0,0 +1,3 @@ +{"3941985|9240891": ["An important class of trust is \u201cidentity trust,\u201d which describes the belief that an identity is who they claim to be [18]."]} +{"16123465|1805048": []} +{"53236183|17652653": ["4, to pass sentence-level text reuse detectors, one could further use paraphrasing techniques [17, 8].", "To pass those sentencelevel duplication detectors, one could further use automatic rewriting/paraphrasing techniques [17, 8], e."]} diff --git a/edge/graph_206990002.jsonl b/edge/graph_206990002.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d7dd91cdf1241683ca548b91101a6d10aabd13c --- /dev/null +++ b/edge/graph_206990002.jsonl @@ -0,0 +1 @@ +{"12767870|192934": ["This seems underconstrained, especially when rules of thumb suggest that one needs ten times more examples than features (Jain et al., 2000)."]} diff --git a/edge/graph_206990190.jsonl b/edge/graph_206990190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce3f2e673ecff9e09b7371fc7c53e955e5fe7e5a --- /dev/null +++ b/edge/graph_206990190.jsonl @@ -0,0 +1,2 @@ +{"206990150|206990190": []} +{"14929739|7399829": ["the methods for generating possibility distributions), we can refer to [25\u201328]."]} diff --git a/edge/graph_207014621.jsonl b/edge/graph_207014621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207017399.jsonl b/edge/graph_207017399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bcb0782304b6a52f59685fb5611f5c3c43827bcc --- /dev/null +++ b/edge/graph_207017399.jsonl @@ -0,0 +1,8 @@ +{"7283214|393948": []} +{"58407263|192934": []} +{"8125331|192934": ["per class for an appropriate estimate of class decision boundaries and error estimates [74]."]} +{"1205666|7185733": ["Parameters describing laryngal processes on voice quality were also taken into account in someone\u2019s work [42]."]} +{"1205666|7788290": ["Some efforts have been done to adopt mixed modeling methods and describe the features of static hand gesture with multiple features (such as local profile features and overall image matrix features) [ 16 ]."]} +{"14793409|33286487": []} +{"18599847|17772052": ["The traditional approach of analyzing e-nose data involves extracting information in the static and dynamic phases of the signals [44] for the use of static pattern analysis techniques (PCA, discriminant function analysis, cluster analysis and neural networks)."]} +{"18599847|38476": ["Analysis of 5 time-series data has been the subject of active research for decades (Keogh 6 and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu 7 (2006) as one of the top 10 challenging problems in data mining due to 8 its unique properties.", "Analysis of time-series data has been the subject of active research for decades (Keogh and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu (2006) as one of the top 10 challenging problems in data mining due to its unique properties."]} diff --git a/edge/graph_207023804.jsonl b/edge/graph_207023804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0076548737a515da6b4a2c2b3c297a93642b4a3 --- /dev/null +++ b/edge/graph_207023804.jsonl @@ -0,0 +1,13 @@ +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"2899698|64404": []} +{"9539186|3540699": ["Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org.", "Given a PWS image, we discuss the encoding and decoding procedures as follows."]} +{"11352995|12894036": ["The kernel is computed so that kernel k-means and SC share the same objective function (Filippone et al., 2008).", "The kernel is computed so that kernel k -means and SC share the same objec-tive function (Filippone et al., 2008)."]} +{"11062262|393948": ["It has been pointed out in [7] that signal representation with the classical factor analysis model provides a probabilistic interpretation of the highly successful representation learned by the PCA, which was originally presented in [48], [50].", "In this paper, we build on our previous work in [6] and propose to define the relationships between signals and graphs by revisiting the representation learning theory [7] studied in the traditional signal processing setting."]} +{"5874340|7774517": []} +{"13847951|3540699": []} +{"5009168|6116761": []} +{"5035653|16323798": ["Such probabilistic approaches are usually based on a Hidden Markov Model (HMM) and its variants (see [7], [23], [27]\u2013[29] and references therein).", "For a more detailed review of NILM, see review papers [21], [23].", "power and the sum of the disaggregated loads, deviating from traditional NILM approaches (see [9], [23] and references therein).", "Transient methods require sampling rates in the order of kHz or MHz [23], unlike steady-state methods, which are more sensitive to power level fluctuations and at low sampling rates, require longer monitoring time to capture all operation cycles [24]."]} +{"3474053|18976841": ["Odense, Denmark J\u00f8rgen Bang-Jensen London, UK Gregory Gutin August 2000", "the surveys [61, 66] by Bang-Jensen and Gutin, [126] by Bondy, [368] by Gutin and [728, 729] by Volkmann.", "Some sufficient conditions for the existence of a hamiltonian cycle in a bipartite tournament are described in the survey paper [368] by Gutin.", "Adrian Bondy, Thomas Bo\u0308hme, Samvel Darbinyan, Reinhard Diestel, Odile Favaron, Herbert Fleischner, Andra\u0301s Frank, Vladimir Gurvich, Fre\u0301de\u0301ric\nPreface xiii\nHavet, Bill Jackson, Hao Li, Martin Loebl, Wolfgang Mader, Crispin NashWilliams, Jarik Nes\u030cetr\u030cil, Gert Sabidussi, Paul Seymour, Alexander Schrijver, Ste\u0301phan Thomasse\u0301, Carsten Thomassen, Bjarne Toft and Ke-Min Zhang.", "The reader can find more information on the topic in the survey papers [65, 66] by Bang-Jensen and Gutin [368] by Gutin and [728] by Volkmann, the theses [345, 362, 692, 745], by Guo, Gutin, Tewes and Yeo respectively and the papers cited there.", "Budapest\nWe dedicate this book to our parents, especially to our fathers, B\u00f8rge Bang-Jensen and the late Mikhail Gutin, who, through their very broad\nknowledge, stimulated our interest in science enormously."]} +{"25535101|2742199": []} +{"6105024|64404": ["Based on our observations on residual block signals obtained using HEVC encoder (HM-14), residual signal samples that are close to boundaries of the blocks\nhave larger values mainly because of occlusions leading to partial mismatches between reference and predicted blocks.", "[1] G. J. Sullivan, J.-R. Ohm, W.-J. Han, and T. Wiegand, \u201cOverview of the High Efficiency Video Coding (HEVC) Standard,\u201d IEEE Trans.", "In video coding standards including HEVC [1], inter-prediction is a very important building block that significantly improves coding efficiency by exploiting high temporal redundancy between video blocks.", "In our simulations, we generate residual block signals for five test sequences, Foreman, Mobile, City, Harbour and Soccer, using HEVC (HM-14) encoder where transform units are fixed to either 4 \u00d7 4 or 8 \u00d7 8."]} +{"28399056|207023804": []} diff --git a/edge/graph_20705668.jsonl b/edge/graph_20705668.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207060556.jsonl b/edge/graph_207060556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..def9daf3a1f4300b9526776d1c12d4c741f6f991 --- /dev/null +++ b/edge/graph_207060556.jsonl @@ -0,0 +1,25 @@ +{"9148979|9045232": []} +{"14879931|9045232": ["For a more detailed history of face detection see [30]."]} +{"2557058|9045232": ["Yang et al. [17] proposed two methods which seek to represent the manifold of human faces as a set of subclasses.", "Numerous approaches for face detection have been proposed in the last decade, many of them described and compared in two interesting recent surveys by Yang et al. [1] and Hjelmas et al. [2]."]} +{"8017493|9045232": ["A comprehensive review of other face detection approaches and techniques can be found in [15]."]} +{"11080820|9045232": ["Before introducing the developments and problems in face detection we first give the concept of face detection which is quoted from reference [1]: Given an arbitrary image or an image sequence, the goal of face detection is to determine whether or not there are any faces in the image, and if\u2026"]} +{"14133530|9307657": []} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"14582127|9045232": ["Most face detection approaches that use a two-class classifier are appearance-based [18]: face and nonface samples are represented as small square patches (typically 20\u00d7 20), then a classifier is trained from the samples."]} +{"206769463|7788290": []} +{"314494|9045232": ["In this paper, a novel sparse feature set is introduced into the Adaboost learning framework for multi-view face detection (MVFD), and a learning algorithm based on heuristic search is developed to select sparse features in granular space."]} +{"2875084|9045232": ["In recent years, many face detection methods have been published [6]."]} +{"641127|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"1308888|9045232": []} +{"16206024|9045232": ["Detecting faces in images is a fundamental task for realizing surveillance systems or intelligent vision-based human computer interaction [1]."]} +{"11488804|9045232": ["Many successful methods have been developed [1], however, there is still a gap between the capabilities of humans and those of state-of-the-art face detectors."]} +{"10055323|9045232": ["[5, 6]."]} +{"1886465|9045232": []} +{"8033147|9045232": ["For recent surveys, see [5], [27]."]} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"688047|9045232": ["The resulting system is very slow."]} +{"18846851|9045232": []} +{"14414380|9045232": ["In recent years, significant progress has been made on this topic [32][34]."]} +{"60770598|9045232": ["Many factors, as concluded in [15], contribute to dif\ufb01culties in face detection.", "According to [15], face detection methods are generally classi\ufb01ed as knowledge based, feature invariant based, template matching and statistical appearance based methods [12, 7, 11]."]} +{"6030449|9045232": ["The classical cues for people detection by means of computer vision are the human face [1, 2], the head [3, 4], the entire body including legs [5] as well as the human skin [6]."]} diff --git a/edge/graph_207079655.jsonl b/edge/graph_207079655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b61f78f5add3d169ad506e013cc8b14511056514 --- /dev/null +++ b/edge/graph_207079655.jsonl @@ -0,0 +1,7 @@ +{"17513239|11632848": ["The binary classifiers are then combined through pairwise coupling, max\u2013min rule or weighted voting (Wozniaka et al. 2014).", "The widely used performancemetrics, statistical significance test, and visualization techniques are introduced.", "For example, Verikas et al. (2010) surveyed the hybrid and ensemble techniques able to improve the prediction accuracy of corporate bankruptcy, Wozniaka et al. (2014) discussed the approaches to construct multiple classifier systems, Jayanthi et al. (2011) reported the application of SVM and hybrid\u2026", "\u2026Hybrid and ensemble techniques Verikas et al. (2010)\n2011 Support vector machines Jayanthi et al. (2011)\n2012 Neural computing Brabazon et al. (2012)\n2012 Machine learning methods Lin et al. (2012)\n2013 Ensemble techniques Wozniaka et al. (2014)\n2014 Semi-parametric methods Lam and Trinkle (2014)"]} +{"10412657|9060471": ["Previous methods mostly take voting mechanism through predicting the truth (Yin et al., 2008; Snow et al., 2008; Dong et al., 2009; Galland et al., 2010; Dong et al., 2012; Wang et al., 2012; Zhao et al., 2012; Li et al., 2014a; Li et al., 2016; Pasternack and Dan, 2010)."]} +{"35490084|15888893": ["Lu et al. (2015) presented a survey paper on Transfer learning."]} +{"35490084|17157304": ["Shravan Kumar , Vadlamani Ravi PII: S0950-7051(16)30387-2 DOI: 10.", "Similarly, Blanzieri and Bryl (2008) conducted a survey on email filtering techniques."]} +{"35490084|60455": ["Kosala and Blockeel (2000) presented a survey paper on web mining."]} +{"18895786|60455": []} +{"15715924|11894197": ["[28]; Ravisankar et al."]} diff --git a/edge/graph_207115339.jsonl b/edge/graph_207115339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5da34d402822ddf7464b80ce64aaef3edf485eb --- /dev/null +++ b/edge/graph_207115339.jsonl @@ -0,0 +1,5 @@ +{"7211883|18609918": ["In an extensive survey of ear recognition algorithms, their performance and the databases the reported performance were obtained with can be found in [9]."]} +{"18421665|18609918": ["It includes an outer rim (Helix) and ridges (Antihelix) parallel to the helix, the concha (hollow part of the ear), the lobe and the tragus (small prominence of cartilage) [4-6]."]} +{"39460163|18609918": []} +{"28102344|18609918": []} +{"30328465|9045232": []} diff --git a/edge/graph_207131950.jsonl b/edge/graph_207131950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7b11122b6aedc698a15767965c6c321e58969d7 --- /dev/null +++ b/edge/graph_207131950.jsonl @@ -0,0 +1,31 @@ +{"3495359|18976841": ["Cycles in multipartite tournaments were earlier overviewed in [2, 8, 10]."]} +{"27935846|18976841": ["Lemma 2.10 (Yeo [9], Gutin and Yeo [3]).", "For more information on multipartite tournaments we refer the reader to Gutin [2], Volkmann [6], and Yeo [8]."]} +{"2526715|18976841": []} +{"2790618|18976841": ["For more information on multipartite tournaments, see [2, 3, 4, 6, 11, 13]."]} +{"1562989|18976841": []} +{"34883529|207131950": []} +{"34883529|18976841": []} +{"59248953|207131950": []} +{"59248953|18976841": []} +{"59248953|824249": []} +{"121058677|18976841": []} +{"3474053|18976841": ["Odense, Denmark J\u00f8rgen Bang-Jensen London, UK Gregory Gutin August 2000", "the surveys [61, 66] by Bang-Jensen and Gutin, [126] by Bondy, [368] by Gutin and [728, 729] by Volkmann.", "Some sufficient conditions for the existence of a hamiltonian cycle in a bipartite tournament are described in the survey paper [368] by Gutin.", "Adrian Bondy, Thomas Bo\u0308hme, Samvel Darbinyan, Reinhard Diestel, Odile Favaron, Herbert Fleischner, Andra\u0301s Frank, Vladimir Gurvich, Fre\u0301de\u0301ric\nPreface xiii\nHavet, Bill Jackson, Hao Li, Martin Loebl, Wolfgang Mader, Crispin NashWilliams, Jarik Nes\u030cetr\u030cil, Gert Sabidussi, Paul Seymour, Alexander Schrijver, Ste\u0301phan Thomasse\u0301, Carsten Thomassen, Bjarne Toft and Ke-Min Zhang.", "The reader can find more information on the topic in the survey papers [65, 66] by Bang-Jensen and Gutin [368] by Gutin and [728] by Volkmann, the theses [345, 362, 692, 745], by Guo, Gutin, Tewes and Yeo respectively and the papers cited there.", "Budapest\nWe dedicate this book to our parents, especially to our fathers, B\u00f8rge Bang-Jensen and the late Mikhail Gutin, who, through their very broad\nknowledge, stimulated our interest in science enormously."]} +{"11758978|18976841": []} +{"3465247|18976841": ["Using (4) and (5), and observing that either |B0| + 2 \u2212 m\u2032+1 2 + 1 \u2264 1 or |B1| \u2212 m \u2032\u22121 2 + 1 \u2264 1, we obtain the following (Cj = WjT , as above): |V (Cj)| \u2265 |V (T )| \u2212 2 + (|B0|+ 2\u2212 m\u2032+1 2 + 1) + (|B1| \u2212 m \u2032\u22121 2 + 1)\u2212 1 \u2265 |V (T )|+ |B0|+ |B1| \u2212m\u2032 + 1 \u2265 l \u2212m\u2032 + 1 \u2265 l \u2212 l 2 + 1 \u2265 l+2 2 .", "By (3) and (4), this implies the following: |V (C0)|+ |V (C1)| = 2|V (T )|+ |V (W0)|+ |V (W1)| \u2212 4 \u2265 2|V (T )|+ (|B0|+ 2\u2212 m\u2032+1 2 + 1) + (|B1| \u2212 m \u2032\u22121 2 + 1)\u2212 4 = |V (T )|+ (|V (T )|+ |B0|+ |B1|)\u2212m\u2032 \u2265 |V (T )|+ l \u2212m\u2032 \u2265 l + 1."]} +{"3464387|18976841": ["Cycles in multipartite tournaments were earlier overviewed in[2,5,9]."]} +{"207130299|18976841": ["For more informations about multipartite tournaments, we recommend to read [1,5,10]."]} +{"122221794|18976841": []} +{"17597033|18976841": ["The existence of such an algorithm was conjectured in [15] (see also [14])."]} +{"3482575|18976841": []} +{"1425990|207131950": []} +{"1425990|18976841": []} +{"35002179|18976841": []} +{"16436344|18976841": []} +{"24334318|18976841": ["More information on the algorithmic aspects of multipartite tournaments can be found in the survey paper of Gutin [54] and in Yeo [110].", "Readers interested in more information on paths in multipartite tournaments should consult Gutin [54], Guo [37], Yeo [106], and the more recent articles by Guo [38], Gutin, Tewes, Yeo, [56], Gutin and Yeo [57], Volkmann [99], Yao, Guo, Zhang [104], and Yeo [111].", "For further results on long cycles or Hamiltonian cycles in bipartite tournaments we refer the reader to Amar and Manoussakis [2], Bang-Jensen and Manoussakis [19], Beineke and Little [22], Gutin [48,54], HV aggkvist and Manoussakis [59], Li, Wang, Zhang, Song [67], Manoussakis [68], Wang [102,103], Zhang [113], and Zhang, Song, Wang [118].", "In 1995, Gutin [54] summarized the results obtained so far."]} +{"17563576|18976841": ["10 in [9], |V1| = |V2| = \u00b7 \u00b7 \u00b7 = |Vn| = k.", "For a survey on this topic, we refer the reader to [9\u201310]."]} +{"207074262|18976841": ["For more information on multipartite tournaments we refer the reader to Bang-Jensen and Gutin [1], Gutin [2], and Volkmann [5]."]} +{"36278951|18976841": []} +{"3488625|18976841": []} +{"25713350|18976841": ["As easy consequences, we obtain known results of Bondy (1976), Ayel (1981), and Gutin (1984).", "[]\nAyel ' s result also follows from a theorem on lower bound o f the length of a longest cycle in a strongly n-partite tournament by Gutin (cf. Theorem 4.11 and Corollary 4.12\nin [9]).", "Recently, Guo and Volkmann [5] proved the following generalization of the aformentioned results of Bondy [1] and Gutin [8].", "Furthermore, if D is a strong n-partite (n/> 5) tournament with IV/I f> 2 for all i = 1,2 . . . . . n, then Bondy [1] showed in 1976 that there exists an m-cycle with m > n, and Gutin [7] even proved in 1984 that D has an (n + l ) - or (n+2)-cycle.", "For additional informations on multipartite tournaments, the reader is referred to the survey article of Gutin [9].", "[]\nCorollary 3.5 (Gutin [7]).", "In 1991, Goddard and Oellermann [4] have shown that every vertex of a strongly connected n-partite (n i> 3) tournament is in a cycle that contains vertices from exactly q partite sets for all 3 ~< q ~< n. Gutin [8] proved in 1993 that if D is a strong n-partite (n/> 3) tournament, and if v is the only vertex in one of the partite sets, then D has an m-cycle containing v for every 3 ~ m ~ n."]} +{"14351696|18976841": []} +{"12000380|18976841": []} diff --git a/edge/graph_207149377.jsonl b/edge/graph_207149377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac6e692243dea80760948a1166045853f6a7de72 --- /dev/null +++ b/edge/graph_207149377.jsonl @@ -0,0 +1,17 @@ +{"205709668|13093354": ["Similar problems have been considered as Incremental Learning [2], Transfer Learn-\ning [3], and Online Data Mining [4] in the past.", "Similar problems have been considered as Incremental Learning [2], Transfer Learning [3], and Online Data Mining [4] in the past."]} +{"206596260|393948": ["We interpret the network as a trainable feature extractor, \u03c6 : X \u2192 R, followed by a single classification layer with as many sigmoid output nodes as classes observed so far [3].", "The recent success of (deep) neural networks can in large parts be attributed to their ability to learn not only classifiers but also suitable data representations [3, 21, 25, 36], at least in the standard batch setting."]} +{"514983|393948": ["\u2026experiences \u2013 in contrast to the relatively dense similarity-based coding scheme thought to operate in the parametric neocortical system (Box 4)[17,38\u201345] \u2013 may be adaptive for some purposes but comes with a cost: it disregards shared structure between experiences, thereby limiting both\u2026"]} +{"49393697|73497737": ["During the past few years we have witnessed a renewed and growing attention to Continuous Learning (CL) [3][24].", "Permuted MNIST [12][20] Rotated MNIST [20] MNIST Split [31] [24] CIFAR-10/100 Split [31] iCIFAR-100 [20] [27] ILSVRC2012 [27] CUB-200 [24] CORe50 [17] In [20], the authors decided to further split the iCIFAR-100 benchmark in 20 different \u201ctasks\u201d containing 5 different classes each."]} +{"3125754|13971270": ["pseudopattern rehearsal (Robins, 1995; French, 1997; Robins, 2004) propose to preserve neural networks\u2019 learnt mappings by arbitrarily sampling random inputs and their corresponding outputs from the neural networks and using them along with new task samples while training.", "Pseudopattern Rehearsal (PPR): A non-generative approach to experience replay (Robins, 2004)."]} +{"34295603|8760041": []} +{"34295603|7774517": []} +{"34295603|3330313": []} +{"34295603|1452734": ["\u2026learning researchers call \u201cautonomous mental development\u201d (Weng et al. 2001), \u201cepigenetic robotics\u201d (Prince et al. 2001), or \u201cdevelopmental robotics\u201d (Lungarella et al. 2003), approaches aiming to develop analogs of the developmental processes that prepare animals over long time periods for a\u2026", "2001), or \u201cdevelopmental robotics\u201d (Lungarella et al. 2003), approaches aiming to develop analogs of the developmental processes that prepare animals over long time periods for a wide range of later challenges."]} +{"34295603|1708582": []} +{"51373|14545307": []} +{"6534170|212644660": ["See Portelas et al. (2020) for a review of other recent curriculum learning methods applied to reinforcement learning scenarios."]} +{"707099|1452734": []} +{"8366865|73497737": ["An important open challenge for machine learning in general is the creation of neural systems that can continuously integrate new knowledge and skills without forgetting what they previously learned (Parisi et al., 2018), thus solving the stability-plasticity dilemma."]} +{"8366865|393948": ["Finding appropriate abstractions and representations, just as it was fundamental in the advances in deep learning to represent input spaces and hierarchical features (Bengio et al., 2013; Oquab et al., 2014), can also extend to representations of internal models, learning mechanisms, and genetic encodings, affecting the algorithms\u2019 capabilities of evolving learning abilities.", "Choosing the right level of abstraction and the right representation (Bengio et al., 2013) are themes at the heart of many problems in AI."]} +{"19060379|8760041": ["To perform true incremental learning in the aforementioned sense, most approaches perform a local partitioning of the input space and train a separate classification/regression model for each partition [5, 6, 7, 8, 9]."]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} diff --git a/edge/graph_207150075.jsonl b/edge/graph_207150075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207164119.jsonl b/edge/graph_207164119.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207179384.jsonl b/edge/graph_207179384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207203830.jsonl b/edge/graph_207203830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e77901f16f5e4955bfc01eb6d589dea7c25a33a4 --- /dev/null +++ b/edge/graph_207203830.jsonl @@ -0,0 +1,13 @@ +{"1538199|9431428": ["A good introduction to machine learning methods applied to neuro-imaging problems can be found in the review articles by Pereira et al. (2009), Lemm et al. (2011) and Ashburner and Kl\u00f6ppel (2011)."]} +{"9092372|9431428": ["Following common practice ( Pereira et al., 2009 ; Pereira et al., 2011 ), the accuracy estimate obtained through a CV could be treated as if it came from a single classi\ufb01er.", "However, for small number of trials, as it is often the case in the neuroimaging and electrophysiology literature, this approach is not reliable ( Pereira et al., 2009 ) and matches the binomial test for higher number of trials ( Howell, 2012 ).", "These results are not in line with current common practice ( Pereira et al., 2009 ; Pereira and Botvinick, 2011 ) which treats the accuracy obtained through cross-validation as if it came from an independent dataset, and then test it in exactly the same way.", "A frequently used method is based on the binomial distribution ( M \u00a8uller-Putz et al., 2008 ; Pereira et al., 2009 ; Billinger et al., 2013 ).", "Machine learning approaches are now increasingly used to study brain function ( Etzel et al., 2009 ; Pereira et al., 2009 ; Lemm et al., 2011 ) and have been proposed as a diagnostic and prognostic tool for patients (e.g., in the \ufb01eld of severe brain injury see ( Phillips et al., 2011 ; Galanaud et\u2026", "Alternatively, permutation test based methods ( Good, 2005 ) have been employed ( Mukherjee et al., 2003 ; Etzel et al., 2009 ; Pereira et al., 2009 ; Schrouff et al., 2013b )."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"7328589|9431428": ["Several studies have suggested that correctly reducing the number of features can not only speed up computation but also improve the performance of the classifier (De Martino et al., 2008; Pereira et al., 2009).", "Further, a leave-one out cross-validationwas used to evaluate the generalization of our method for new individuals, which reduced the artifact of over-training (Pereira et al., 2009)."]} +{"4626384|11894197": ["Feature selection is a dimensionality reduction strategy that involves identifying a small but informative subset of the original features for classification; it can help avoid model overfitting, improve model performance, and produce models that are easier to interpret and potentially more time- and cost-efficient to develop and use [53]."]} +{"34611602|9431428": ["Although there are some machine learning methods that are less sensitive to data, a limited number of data samples can cause model overfitting, resulting in poor generalization of the method to independent data sets (Pereira et al., 2009)."]} +{"3954193|393948": ["To do this, we adapt the so-called deep learning architectures that have been shown to yield state-of-the-art performance in several computer vision and machine learning applications [17,18,20,21].", "This new disease marker (which we refer to as randomized denoising autoencoder marker, rDAm) is a machine learning module based on certain extensions of recent ideas in \u201cdeep learning\u201d that yield state-of-the-art results in computer vision, natural language processing, and machine learning [17,18]."]} +{"29040407|6863252": ["\u2026obtain a morphometric representation of each brain image by spatially normalizing it onto a common space (i.e., a prede\ufb01ned atlas) via nonlinear registration, and thus, the corresponding regions in different brain images can be compared [Sotiras et al., 2013; Tang et al., 2009; Yap et al., 2009].", ", a predefined atlas) via nonlinear registration, and thus, the corresponding regions in different brain images can be compared [Sotiras et al., 2013; Tang et al., 2009; Yap et al., 2009]."]} +{"29040407|9431428": ["Here, we choose a linear model because it has good generalization capability across different training data as shown in extensive studies [Burges, 1998; Pereira et al., 2009; Zhang and Shen, 2012]."]} +{"11227964|9431428": ["A \ufb01 nalnote:whilethepaperintroducesthemainideasofalgorithms, we donot attempt afulltreatmentoftheavailableliterature."]} +{"20545440|6863252": ["More recently, thanks to the substantial development of deformable image registration techniques in the last decade [Sotiras et al., 2013; Shen et al., 1999; Tang et al., 2009; Xue et al., 2006; Yap et al., 2009], automatic spatial normalization has become the fundamental step in morphometric pattern analysis, which allows quantitative comparison of different subjects/populations within a common space.", "More recently, thanks to the substantial development of deformable image registration techniques in the last decade [Sotiras et al., 2013; Shen et al., 1999; Tang et al., 2009; Xue et al., 2006; Yap et al., 2009], automatic spatial normalization has become the fundamental step in morphometric\u2026"]} +{"13760957|6479846": ["Several such studies, the so-called neutral comparisons, are cited by Boulesteix et al. 11 One limitation of these studies is that the comparisons are mainly based on real datasets, and a problem with comparing classi\ufb01cation performance estimated on real datasets is the sampling error or noise in the estimated performance measures.", "Several such studies, the so-called neutral comparisons, are cited by Boulesteix et al.(11) One limitation of these studies is that the comparisons are mainly based on real datasets, and a problem with comparing classification performance estimated on real datasets is the sampling error or noise in the estimated performance measures.", "A review by Boulesteix et al. 11 indicated a tendency in some comparative studies to demonstrate the superiority of a particular method using datasets favouring the chosen method.", "A review by Boulesteix et al.(11) indicated a tendency in some comparative studies to demonstrate the superiority of a particular method using datasets favouring the chosen method."]} +{"10882827|7761990": []} diff --git a/edge/graph_207204177.jsonl b/edge/graph_207204177.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207205594.jsonl b/edge/graph_207205594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..106905a82a93e4c71f49c51a72de5bd7c049fd35 --- /dev/null +++ b/edge/graph_207205594.jsonl @@ -0,0 +1,2 @@ +{"192148|3644401": ["A popular learning-based technique for brain MRI is multi-atlas segmentation 28\u201331 , where multiple manually-segmented example images, called atlases, are registered to a target image, and deformed atlas segmentations are combined using label fusion (such as Majority Vote (MV) 28,31 , STAPLE 32 or Shape-based averaging (SBA) 33 ; for review see Iglesias and Sabuncu) 34 .", "\u2026atlases, the performance difference between the methods is a function of the accuracy of the registration algorithm used and/or the label fusion strategy (comparison of different registration approaches and label fusion schemes can be found in Klein et al. 54 , and Iglesias and Sabuncu 34 ).", "\u202628\u201331 , where multiple manually-segmented example images, called atlases, are registered to a target image, and deformed atlas segmentations are combined using label fusion (such as Majority Vote (MV) 28,31 , STAPLE 32 or Shape-based averaging (SBA) 33 ; for review see Iglesias and Sabuncu) 34 .", "As the learning-based approaches are trained using the same set of selected atlases, the performance difference between the methods is a function of the accuracy of the registration algorithm used and/or the label fusion strategy (comparison of different registration approaches and label fusion schemes can be found in Klein et al. 54 , and Iglesias and Sabuncu 34 ).", "The advantage of multi-atlas segmentation methods is that the effect of registration error is minimised by label fusion, which combines the results from all registered atlases into a consensus solution, and this produces very accurate segmentations 34 ."]} +{"25310609|530484": []} diff --git a/edge/graph_207208264.jsonl b/edge/graph_207208264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff15292715be9adaa6d90991b4c57e954548f6e5 --- /dev/null +++ b/edge/graph_207208264.jsonl @@ -0,0 +1,11 @@ +{"27025637|38476": ["However, most studies 2 , 13 , 14 , 16\u201318 that we are aware of as employing this principle rely on heuristics and have no rigorous guarantees of performance.", "12 , 13 The basic intuition behind the batch-incremental approach 3 is to update the batch prediction model using the most recent training window as long as no concept drift in the underlying process has been detected."]} +{"27025637|8365617": []} +{"53605988|3330313": ["Hodge and Austin [14] point out that there is no universally accepted definition of outlier, and that alternative terminologies pervade in the recent literature, e.g., novelty detection, anomaly detection, noise detection, deviation detection or exception mining.", "Finding outliers in batch 1-dimensional static data has a longstanding history within statistical literature [14].", "Hodge and Austin [14] point out that there is no universally accepted definition of outlier, and that alternative terminologies pervade in the recent literature, e."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"29209474|2253457": []} +{"10110725|11050081": ["In recent years most of this type of work has been conducted under the umbrella of stream mining (Gama 2010, 2012)."]} +{"19277476|13726263": ["All data mining problems comprise an interesting challenge in a streaming environment [6\u20138] mainly because of the one-pass requirement and strict memory limitations.", "For kmeans with k = 2 we observe that vectors 0 to 5 (representing period [0\u2013300]), 12\u201317 ([600\u2013900]) and 24\u201329 ([1,200\u20131,500]) are assigned to the same cluster (Cluster 0)."]} +{"16592739|4474193": ["So, we propose a new categorization for concept drift, seeking inspiration from the dynamic optimisation problems area [27]\u2013[29]."]} +{"16592739|1097238": ["Although there are some theoretical results, they are highly restricted and make strong assumptions unlikely to be hold in practice [39]."]} +{"8255138|16156203": ["Temporal data mining [96] incorporates time dimension into data mining process."]} +{"8255138|1176034": ["Spatio - temporal data mining deals with database models to accommodate temporal aspects [121, 130]."]} diff --git a/edge/graph_207209718.jsonl b/edge/graph_207209718.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be387cd1bcd400263b95595c88d5ed438d4247a8 --- /dev/null +++ b/edge/graph_207209718.jsonl @@ -0,0 +1,9 @@ +{"24759091|6430931": ["AIS are computational algorithms that emulate mechanisms of human immune systems [ 19 ]."]} +{"11972743|14745481": ["At the SN level, each SN is responsible to report its peer-to-peer trust evaluation results towards other SNs in the same cluster to its CH which applies statistical analysis and", "The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"11972743|1940388": ["The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"2192658|1113420": ["Context awareness, differently from traditional computing, allows to actively exploring physical location, available computing infrastructures and facilitates the delivery of services through these infrastructures to fulfill and enhance their ability to perform designated tasks [10], [ 11 ]."]} +{"16297519|17205659": ["While recent studies have shown that public key cryptography such as RSA and Elliptic Curve Cryptography (ECC) is feasible in WSNs, it is still expensive for the most applications in WSNs and WISNs [34].", ": IDS architectures are divided into three basic categories with regard to the detection technique: misuse detection, anomaly detection [34], and specification-based IDS, introduced by Brutch and Ko [4]."]} +{"1473135|1940388": ["The exposure to natural environments and the inherent unreliability of wireless transmission make a WSN vulnerable to many attacks [1].", "Node i can monitor node j\u2019s dishonesty evidences including abnormal trust recommendations, false self-reporting [1, 5], and trust fluctuation [8] over the", "The honesty trust component is measured through evidences of dishonesty such as false selfreporting [1, 5], trust fluctuation [8] and abnormal trust recommendations (i."]} +{"17645498|10859599": ["[10] surveys survivability in mobile ad hoc networks designs.", "We exercise \u03bb over [1/day, 1/10 min], m over [3, 11] and TIDS over [10, 1280] s."]} +{"13878913|6959212": ["These capabilities enable the application of the renewable energy like wind and solar power, and will achieve the rapidly increasing energy needs around the world such as the application of power efficient devices like plug-in electric vehicles [5], [6]."]} +{"13878913|6430931": ["The instance of the unsupervised learning of the ANN is self-organizing maps (SOM) are single-layer feed forward networks, their outputs can be compressed into a low dimensional grid and they are the most widely used NN for anomaly detection tasks [55].", "AIS are computational algorithms that emulate the mechanisms of human immune systems [55]."]} diff --git a/edge/graph_207216469.jsonl b/edge/graph_207216469.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cab993e4231c08b3194c5ed63bc8565d3d429fa3 --- /dev/null +++ b/edge/graph_207216469.jsonl @@ -0,0 +1,4 @@ +{"24397200|11139156": []} +{"17889756|627405": ["identified several issues of electronic search derived from their experience in conducting SLRs (Brereton et al., 2007).", "Brereton et al. (2007) identified several issues of electronic search derived from their experience in conducting SLRs."]} +{"14585844|11139156": ["Confirming the findings of the previous works [22][12], the existing research in the area is exploratory in nature and mostly reports the cases in which some challenges were faced and some strategies were applied."]} +{"15036265|627405": []} diff --git a/edge/graph_207228303.jsonl b/edge/graph_207228303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bc9e224ac451d59a455a063e4df48d4fe3a4335 --- /dev/null +++ b/edge/graph_207228303.jsonl @@ -0,0 +1 @@ +{"17842226|207228303": ["However, as shown in a recent survey, the existing literature includes a multitude of different problem formulations, making the existing approaches hardly comparable [13].", "We introduced some important special cases and subproblems in [13] and categorized the existing literature on the basis of these problem variants."]} diff --git a/edge/graph_207231270.jsonl b/edge/graph_207231270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..526035608bdbafdc08c2dfa37a988310a99ce9db --- /dev/null +++ b/edge/graph_207231270.jsonl @@ -0,0 +1,38 @@ +{"16218187|7774517": ["Wireless sensor networks (WSN) have been used for a variety of applications [1].", "based techniques, which learn a classification model in the training phase and then classify the data instance to one of the training classes are categorized into Support Vector Machine (SVM) based and Bayesian Network based approaches [1].", "An efficient outlier detection technique, thus, should incorporate attribute correlations in addition to the spatio-temporal correlations [1].", "Since in WSNs, a majority of energy is consumed in radio communication rather than in computation [1].", "A comparison of various types of outlier detection techniques for WSNs has been carried out in [1]."]} +{"16199748|7774517": ["Outlier detection has attracted much attention in the field of WSNs , and in recent years many outlier detection techniques specifically developed for WSNs have emerged ( Zhang et al ."]} +{"16199748|6275330": ["A recent development in data acquisition concerns the use of wireless sensors, consisting of nodes that measure environmental variables such as temperature, humidity, sound, pressure, light, vibration or motion (Arampatzis et al. 2005)."]} +{"208007463|1230643": ["Wireless sensor networks are envisioned to be economic solu tions to many important applications, such as real-time tra ffic monitoring, military surveillance, and homeland security [1] ."]} +{"9163899|4474193": []} +{"9163899|1230643": []} +{"17014146|7774517": ["The deployment of Wireless Sensor Networks (WSNs) for patient monitoring will reduce the healthcare costs (overcapacity, waiting and sojourn time, number of nurses, etc.), and help people with cardiac and pulmonary insufficiencies, Diabetes, Alzheimer or Asthma.", "Abnormal values may be resulted from many reasons in WSNs [8], such as hardware faults, corrupted sensors, energy depletion, calibration, electromagnetic interference, disrupted connectivity, compromised sensors, data injection, patient with sweating, detached sensor, heart attacks or health degradation, etc.", "In this paper, we propose a lightweight anomaly detection approach for medical WSNs.", "Abnormal values may be resulted from many reasons in WSNs [8], such as hardware faults, corrupted sensors, energy depletion, calibration, electromagnetic interference, disrupted connectivity, compromised sensors, data injection, patient with sweating, detached sensor, heart attacks or health\u2026", "However, collected data by WSNs have low quality and poor reliability.", "Authors in [9] propose a failure detection approach for WSNs, which exploits metric correlations to detect abnormal sensors and to uncover failed nodes.", "Several medical applications for WSNs have been proposed for health monitoring.", "A survey of medical applications using WSNs is available in [1], [20]."]} +{"206256786|2294541": ["The diverse attacks (Hoffman et al., 2009; Lopez et al., 2009; Karlof and Wagner, 2003; Xiao and Yu, 2006; Xiao et al., 2007a) that target sensor networks will be concluded as the Table 1.", "Furthermore, Hoffman et al. (2009) surveyed the defense mechanisms employed by existing reputation systems and suggests five defense strategies against attackers for reputation systems in common networks.", "A few existing surveys on trust and security issues can be found (Fern\u00e1ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|1940388": ["The security mechanisms for sensor networks have been raised by many researchers (Chen et al., 2009b; Lopez et al., 2009; Law and Havinga, 2005; Kyriazanos et al., 2008).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|9240891": ["This problem is subsequently discussed in various literature, providing diverse trust classification (Grandison and Sloman, 2000) and evaluation models in various domains, such as E-commerce, P2P, ad hoc networks etc."]} +{"1756215|1940388": []} +{"1756215|17205659": []} +{"11972743|14745481": ["At the SN level, each SN is responsible to report its peer-to-peer trust evaluation results towards other SNs in the same cluster to its CH which applies statistical analysis and", "The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"11972743|1940388": ["The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"1063585|2294541": []} +{"10178899|1230643": ["\u2026for example, random deployment in inaccessible terrains and cooperative effort, offer unprecedented opportunities for a broad spectrum of civilian and military applications, such as industrial automation, military tactical surveillance, national security, and emergency health care [1], [2], [3]."]} +{"207172599|3330313": []} +{"65809|3330313": []} +{"13896033|7774517": ["[27] and proposed a distributed and online outlier detection to identify every new measurement collected at each node as normal or anomalous in real-time [28].", "Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to specific requirements, dynamic nature, and limitations of the wireless sensor networks [28]."]} +{"206256778|3330313": ["Moreover, an anomaly in a dataset is defined as an observation that appears to be inconsistent with the remainder of the dataset (Hodge and Justin, 2004)."]} +{"14139550|15300368": ["WSNs have many common features with wireless ad hoc networks, and in several cases they are considered as a special case of them [1]."]} +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"389775|1230643": ["Wireless sensor networks are formed using large numbers of cheap, tiny and compact sensors which have inbuilt wireless radios for communication [1]."]} +{"5860048|1940388": ["In addition, malicious attacks such as denial of service, sinkhole, black hole, selective forwarding, and wormhole attacks [3,14\u201320] may also contribute to generating such inaccurate and low quality data."]} +{"5860048|7774517": ["efficiency in utilizing the limited network resources [9].", "Besides, additional energy is required for processing large-scale and multivariate data [1,3,9,29].", "Besides, the large amount of data produced due to network size expansion is also a challenge for real time detection [9].", "A cluster is said to be anomalous if it is either smaller than or distant from other clusters in the dataset [9,27,68,69].", "According to [9], the spatial and temporal correlation between sensing data attributes help to specify the source of anomaly.", "It was reported by [9] that the purpose of using a WSN is not only to collect data from the field of deployment, but more importantly the analysis of this data at timely manner that allows for making some important decisions.", "Many statistical techniques have been used for anomaly detection in WSNs and categorized in [9,18] into parametric and non-parametric techniques.", "The classifications in [9,27,28] are technique-based, although they have slight differences in the classification.", "Although similar to the classification of [9], our classification is more comprehensive and cover the most recent published models."]} +{"5860048|17205659": ["Many statistical techniques have been used for anomaly detection in WSNs and categorized in [9,18] into parametric and non-parametric techniques.", "Therefore, a modification of these techniques or a design of new suitable techniques especially for WSNs is required [18,23,24]."]} +{"5860048|6275330": ["and control; and military applications such as enemy target monitoring and tracking [1\u20133]."]} +{"5860048|1236072": ["On the network layer, routing protocols are classified according to network structure into flat-based, hierarchical-based, and location-based [35]."]} +{"5860048|3330313": ["Another definition in [21] as \u201can observation that appears to be inconsistent with the reminder of a dataset\u201d.", "An anomaly is defined in [21] as an observation that seems to be inconsistent with the rest of a dataset.", "and first used for one dimensional data sets [21]."]} +{"5860048|1230643": ["Besides, additional energy is required for processing large-scale and multivariate data [1,3,9,29].", "Wireless sensor networks (WSNs) are networks of tiny, low cost, low energy, and multifunctional sensors which are densely deployed to monitor a phenomenon, track an object, or control a process [1].", "Besides, physical interruptions such as destruction or movements of sensor devices caused by humans or animals may affect the data collection process and lead to anomalous measurements [1].", "The fast advancement in communication technologies has introduced cheap, low-power and multifunctional devices which leverage the idea of the sensor [1].", "Three more additional units may be incorporated in the sensor structure depends on the application which are the energy generator that supplies the sensor with additional energy sources, the mobilizer which is sometimes used for supporting the mobility of sensor nodes, and the position finding system that determines the current position of mobile sensor nodes [1].", "Two unique features that differentiate WSNs from other networks were mentioned in [1]: first, the position of sensor nodes is not determined or engineered beforehand and this allows the random deployment at inaccessible environments and disaster relief operations; this feature poses a challenge for designing a selforganizing algorithms and protocols; second, the distributed data processing; instead of sending raw data to fusion node (base station or cluster head), the nodes can use their processing capabilities to locally carry out some simple required computations and send only the summary that is beneficial for decision making.", "However, the cost of data transmission is several orders of magnitude higher than the cost of data processing [1]."]} +{"10044607|2294541": ["The main target of malicious attackers are aggregation algorithms of trust and reputation systems [4].", "Since readings keep streaming into aggregator nodes in WSNs, and since attacks can be very dynamic (such as orchestrated attacks [4]), in order to obtain trustworthiness of nodes as well as to identify compromised nodes we", "Sensors are deemed compromised only relative to a particular batch; this allows our framework to handle on-off type of attacks (called orchestrated attacks in [4])."]} +{"44979670|6950376": ["Various efforts have also been made to combine communication and data trusts [18]."]} +{"44979670|17205659": ["There are a number of attacks that an attacker can launch against wireless sensor networks once a certain number of sensor nodes have been compromised [10]."]} +{"18605290|1230643": ["Literature in the area of WSN includes wide range of applications ranging from smart home to battle-field applications, protocols, programming languages and the middleware architectures [1] [6].", "They are developed to be used in a wide variety of applications ranging from smart home systems to battlefield applications [1]."]} +{"14251445|1940388": ["A number of methods have been developed to make wireless sensor networks secure and reliable [15]."]} +{"29532810|1230643": ["While modern research on sensor networks started on the late seventies [6], this paradigm acquired an identity of its own at the beginning of the twenty-first century [21]."]} diff --git a/edge/graph_207232451.jsonl b/edge/graph_207232451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f84774352d7d4a76649d4218c64b9b968854f28b --- /dev/null +++ b/edge/graph_207232451.jsonl @@ -0,0 +1,3 @@ +{"8395950|7360895": ["This is achieved by either simply mimicking the actions of a real OSN user or by simulating such a user using artificial intelligence, just as in social robotics [24]."]} +{"7090674|6923178": ["\u2022 TP \u2013 the number of true positives; \u2022 FP \u2013 the number of false positives; \u2022 SE \u2013 the sensitivity measure value; \u2022 SP \u2013 the specificity measure value; \u2022 ACC \u2013 the accuracy measure value [16]."]} +{"314423|3241708": ["not just because it results in a goal that, unlike its alternative, is attainable, but because (1) the guarantees it provides are in practice what nodes that engage in crowd-sourcing [47]"]} diff --git a/edge/graph_207238462.jsonl b/edge/graph_207238462.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..abe089ef3b751619869566007882378265afbf2f --- /dev/null +++ b/edge/graph_207238462.jsonl @@ -0,0 +1,17 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"7815680|6746689": ["\u2026an adaptive thresholding algorithm [20] to compute the binary image from the input gray scale fingerprint image; (2) use a thinning algorithm [21] [22] to compute the fingerprint skeleton from the binary image; (3) use Rutovitz Crossing Number to extract minutiae from the skeleton of fingerprint\u2026"]} +{"3139076|34263386": ["In the challenge/response liveness detection technique, an electro-tactile pattern is observed as response to electric pulses transmitted into the \ufb01ngertip during authentication [Sousedik and Busch 2014; Yau et al. 2008; Memon et al. 2012]."]} +{"3139076|15898213": ["For spoofs, most of the energy in the Fourier domain is present in the center of the image which corresponds to low frequency data in the image domain [Coli et al. 2007a].", "However, the quality of the reproduced \ufb01nger-print image may be affected by the con\ufb02uence of different factors such as the initial pressure of the \ufb01nger on the cast and the contact of the stamp on the sensor acquisition surface, which may alter the \ufb01ngerprint shape [Coli et al. 2007b].", "To make matters worse, an improper integration of the additional hardware can result in a vulnerable scenario where a spoof artifact is placed on the \ufb01ngerprint sensor and a live \ufb01nger is placed on the added hardware [Al-Ajlan 2013; Singh and Singh 2013; Coli et al. 2007b].", "Spoof detection methods based on texture coarseness work well on high resolution (1000 dpi) \ufb01ngerprint images; but common commercial sensors present a resolution of about 500 dpi [Coli et al. 2007b]."]} +{"10632466|10500613": []} +{"4781481|5313655": ["In the literature, most of the biometric template protection methods are based on two different classes of techniques: cancelable biometrics, and biometric cryptosystems [25, 45]."]} +{"32460389|9045232": ["A more comprehensive analysis on face identification and/or recognition algorithms is presented in [49] [50][51][52][74-76].", "Face identification methods largely depend on the scenario being examined such as in controlled environments, from colour images or images in motion, and can be separated into four distinct categories [49]: knowledge-based, feature invariant, template matching and appearance-based holistic approaches."]} +{"32460389|192934": ["A more comprehensive analysis on face identification and/or recognition algorithms is presented in [49] [50][51][52][74-76]."]} +{"359842|16620699": ["Comprehensive recent surveys of literature on 3D face recognition can be found in [251] and [252]."]} +{"359842|6028805": ["A comprehensive review of recent advances in face recognition from infra-red imagery may be found in [268]."]} +{"359842|9045232": ["\u2026one or more of the following: low quality images (though image quality may be enhanced by exploiting super-resolution techniques [220-223]); cluttered backgrounds (which complicate face detection [224]); the presence of more than one face in the picture; and a large amount of data to process [71]."]} +{"359842|192934": ["A couple of classifiers described in [211] are then applied to identify the individual in the frame and, finally, a super-classifier based on a voting scheme [212] performs the final classification for the entire video sequence (Figs."]} +{"4058625|2795037": ["Note that since we are interested in minimizing the query evaluation cost, a query optimizer can be used to select the fragment that allows the execution of more selective queries by the server, thus decreasing the workload of the application and maximizing the e\u2010ciency of the execution [ Chaudhuri 1998 ].", "\u2026since we are interested in minimizing the \nquery evaluation cost, a query optimizer can be used to select the fragment that allows the execution \nof more selective queries by the server, thus decreasing the workload of the application and maximizing \nthe ef.ciency of the execution [Chaudhuri 1998]."]} +{"6168092|16620699": ["Surveys on 3D face recognition approaches can be found in [8][9] and [50]."]} +{"6168092|6028805": ["from different persons are significantly different, while those temperature of the object and emissivity of the material[29].", "Those modalities include 3D face information [8] and face images in those spectra other than visible spectra, such as thermal infrared image [29] and near-infrared hyperspectral image [40].", "Various fusion schemes have been proposed [29] [15] [4] [60] and shown to lead to better performance than"]} diff --git a/edge/graph_207240116.jsonl b/edge/graph_207240116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207244886.jsonl b/edge/graph_207244886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc846ef96c862cdf882ce4ff6765b408dafda387 --- /dev/null +++ b/edge/graph_207244886.jsonl @@ -0,0 +1,4 @@ +{"207172599|3330313": []} +{"207190974|15782139": []} +{"8729672|18044357": ["The main limitation of design diversity lies in the high complexity of creating different versions, which may not justify the benefit [52]."]} +{"1083483|7216886": ["[141] (privacy-preserving data publishing), Bertino et al."]} diff --git a/edge/graph_207250096.jsonl b/edge/graph_207250096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0af6991694132f9f24e54d9e36c8428eb978de57 --- /dev/null +++ b/edge/graph_207250096.jsonl @@ -0,0 +1,2 @@ +{"207240116|165863": ["We reference interested readers to a related work by Mittal and Vetter [2014], which presents a survey on GPU energy ef\ufb01ciency."]} +{"165863|12904520": ["Due to these trends, in recent years, the energy cost of high-performance computing clusters has been estimated to contribute more than the hardware acquisition cost of IT equipment itself [Bianchini and Rajamony 2004; Mittal 2012]."]} diff --git a/edge/graph_207262843.jsonl b/edge/graph_207262843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa12948af9707ecd33ea4961fc78b071df8f3608 --- /dev/null +++ b/edge/graph_207262843.jsonl @@ -0,0 +1,14 @@ +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"38912441|11735843": []} +{"9770534|39706822": ["The cloud computing community has been working on the topic too [16]."]} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"1862633|14650419": []} +{"1862633|2357830": ["Objects in an IoT must be able to communicate and exchange data with each other autonomously (Juels 2006; Mitrokotsa et al. 2013).", "For example, Juels proposed the method of \u201cblock tag\u2019 to prevent the unauthorized tracing (Juels 2006)."]} +{"206584313|41998167": ["A lot of MAC protocols for WSNs have been proposed in the literature, and numerous surveys on WSN MAC protocols can be found in [53], [52], and [51].", "Despite the long history of MAC/Routing protocols, Problems remain and others keep emerging with regard to the rapid growth of M2M applications [52], [53], [51], [54], [55], [56]."]} +{"206584313|1230643": ["services, as they are focused on energy efficiency, wireless networking, and protocols [14]."]} diff --git a/edge/graph_207330385.jsonl b/edge/graph_207330385.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6832d3e75c586f6f3920b40a9f6b0ee0c53c11f2 --- /dev/null +++ b/edge/graph_207330385.jsonl @@ -0,0 +1,24 @@ +{"27505386|16514036": []} +{"9629798|1734833": ["The task of extracting useful information from the raw sensor data has been performed using various machine learning and data mining techniques [6]."]} +{"1631622|393948": ["Feature learning (or representation learning) is becoming an important field in machine learning community in recent years [9]."]} +{"1631622|7530272": ["Other than sequence distance based methods, feature-based classification methods [8] follow the traditional classification framework."]} +{"1605434|9928823": []} +{"10985974|1634674": []} +{"9928823|393948": ["(2013) extended the recursive neural network to its tensor, in a similar way that the DNN was extended to its tensor version (Yu et al., 2013), and"]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"10050878|5724477": []} +{"5549138|18599847": [". [27] and Bulling et al. [28] for more comprehensive reviews of sensor-based human activity recognition literature. Also, Langkvist et al. provided a review of deep learning for time-series modeling [29]. Early adopters of deep learning for wearable sensor data, focus on adapting the raw input signal to the desired deep learning architecture [30]. Inspired from speech recognition, Alsheikh et al. [30"]} +{"20910450|17747015": []} +{"53898929|11047851": ["B IOMEDICAL signal analysis, and in particular electrocardiogram (ECG) analysis, has many useful applications, including activity recognition, biometric identification and more importantly, patient screening and diagnosis [1]."]} +{"53898929|18599847": ["Various methods, such as the deep belief networks, conditional and gated restricted Boltzmann machines, auto encoders, recurrent neural networks, HMMs, and also CNN have been utilized and developed in the literature to address various time-series data classification problems [27], [28]."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"207241157|2670121": ["Transfer learning approaches in HAR can be categorised along four dimensions: sensor modalities, differences between source and target environments, available types of data labelling, and representation of the knowledge [5]."]} +{"20443520|14970359": ["Visionbased activity recognition deals with video sequence, and it has been widely studied in computer vision area [8]."]} +{"1044293|393948": ["An even more radically different solution to the problem of avoiding explicit latent variables was recently introduced in Bengio et al. (2013c) and Bengio and Thibodeau-Laufer (2013).", "They are hurt by the problem of mode mixing, discussed at greater length in Bengio et al. (2013b), and summarized here.", "The hypothesis proposed (Bengio et al., 2013b) to explain this observation is that unsupervised representation learning procedures (such as for the RBM and contractive or denoising auto-encoders) tend to discover a representation whose distribution has more entropy (the distribution of vectors in\u2026", "Instead, they are based on the construction of a direct parametrization of an encoding function which immediately maps an input x to its representation f(x), and they are motivated by geometrical considerations in the spirit of manifold learning algorithms (Bengio et al., 2013d).", "An interesting observation (Bengio et al., 2013b) which could turn out to be helpful is that after we train a deep model such as a DBN or a stack of regularized auto-encoders, we can observe that mixing between modes is much easier at higher levels of the hierarchy (e.g. in the top-level RBM or\u2026", "\u2026result was only valid for asymptotically small Gaussian corruption noise, squared reconstruction error, and continuous inputs, the result from Bengio et al. (2013c) is applicable for any type of input, any form of reconstruction loss (so long as it is a negative log-likelihood), any form of\u2026", "Although the result from Alain and Bengio (2013) suggests that when the amount of injected noise is small, a unimodal distribution is sufficient, it is convenient to accomodate large amounts of injected noise to make training more efficient, as discussed by Bengio et al. (2013c).", "As explained in Bengio et al. (2013d), the tug-of-war between minimization of reconstruction error and the regularizer means that the intermediate representation must mostly capture the variations necessary to distinguish training examples, i.e., the directions of variations on the manifold (a\u2026", "Furthermore many pieces of evidence in the results of experiments on deep learning suggest that training deep networks (including recurrent networks) involves a difficult optimization (Bengio, 2013b; Gulcehre and Bengio, 2013; Bengio et al., 2013a).", "See (Bengio, 2009; Bengio et al., 2013d) for reviews and Bengio (2013c) and the other chapters of the book by Montavon and Muller (2012) for practical guidelines.", "See section 3 of Bengio et al. (2013d) for a review of representation learning procedures based on directed or undirected graphical models.4 Section 2.5 describes sparse coding in more detail.", "A general strategy was outlined in Bengio et al. (2013d) to enhance the discovery of representations which disentangle the underlying and unknown factors of variation: it relies on exploiting priors about these factors.", "Another encouraging observation (already mentioned in the section on mixing) is that deeper representations were empirically found to be more amenable to quickly mixing between modes (Bengio et al., 2013b).", "See Bengio et al. (2013d) for a brief overview in the context of deep learning, along with connections to other unsupervised representation learning algorithms."]} +{"7551351|17747015": ["Activity recognition methods are classified into three main types of vision-based [1], radio-based [2], and sensor-based [3] methods."]} diff --git a/edge/graph_207372751.jsonl b/edge/graph_207372751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ef1881e296724a5d4efcd703e13b04e8ef5d9b8 --- /dev/null +++ b/edge/graph_207372751.jsonl @@ -0,0 +1,8 @@ +{"7501530|6486398": ["Notice that in order to evaluate Z(t), we use a trick similar to the one used in PageRank [12]: a dummy absorbing state linked to all the states of the Markov chain is created with a very small probability of jumping to this state."]} +{"8018915|9828770": []} +{"4922285|207372751": []} +{"120115856|207372751": []} +{"11672931|423305": ["These problems are also well understood for feed-forward networks (Werbos,McAvoy, & Su, 1992; Buntine & Weigend, 1994), and graphical models with plates onlyadd some additional complexity.", "Various notations are used for this (Werbos et al.,1992; Buntine & Weigend, 1994)."]} +{"122907607|7064380": []} +{"4807216|7064380": []} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} diff --git a/edge/graph_207395851.jsonl b/edge/graph_207395851.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ace8a68f7a8a52fc3ce6774775bd1c92f65d0459 --- /dev/null +++ b/edge/graph_207395851.jsonl @@ -0,0 +1 @@ +{"26507658|353822": []} diff --git a/edge/graph_207410062.jsonl b/edge/graph_207410062.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c7d7d7e6222a2034607a406bf9978260bc12bfc --- /dev/null +++ b/edge/graph_207410062.jsonl @@ -0,0 +1 @@ +{"16138367|10559330": ["Here, the focus is on service classes characterized by guarantee parameters (abandoning the per-packet view or the per-flow view as defined within the Integrated Services Architecture [2])."]} diff --git a/edge/graph_207420609.jsonl b/edge/graph_207420609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207424188.jsonl b/edge/graph_207424188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207424517.jsonl b/edge/graph_207424517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207457951.jsonl b/edge/graph_207457951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207462643.jsonl b/edge/graph_207462643.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3cd85ca980865e61eb0345f9264b43366fe0934d --- /dev/null +++ b/edge/graph_207462643.jsonl @@ -0,0 +1,8 @@ +{"14887456|12860838": []} +{"4884206|9732448": ["A more recent effort [108] emphasizes the degree of distribution of the service registry and the use of semantic information in the service matchmaking process.", "First, the centralized approach does not scale well with respect to the increasing number of clients that pose service discovery queries [51, 108]."]} +{"4884206|8250043": ["Specifically, it is not clear how to automate the testing of service compositions [26]."]} +{"4884206|2445817": ["Nevertheless, even multicasting is a costly approach that does not scale well [135].", "Further works focus on service discovery protocols for mobile ad hoc environments, which are part of the Future Internet [95, 135].", "curity, privacy, and trust are not completely covered [135].", "As discussed in [135], purely distributed service discovery protocols are more suitable for environments consisting of a small number of devices that are characterized by high physical mobility.", "The aforementioned issues become even more important, in the cases where service discovery is supposed to be handled in mobile computing environments that consist solely of mobile nodes [95, 135]."]} +{"4884206|1300682": ["An interesting classification of privacy attacks along with an approach for dealing with such problems is discussed in [32], while in [47] the authors give a list of requirements that should be provided by service discovery protocols toward achieving security."]} +{"2299346|14697846": ["Current techniques for indexing P2P systems use structured overlays in the form of\n0733-8716$20.00 c\u00a9 2007 IEEE\ndistributed hash tables (DHTs), e.g. [9] or see [10] for a survey."]} +{"6398919|9123526": ["For example, referring to Figure 2, if the agent knowledge base is \u03b4 0 , then the agent can invoke the operation \u03c3 a , which causes the e\ufb00ects described by f ( \u03c3 a , \u03b4 0 )."]} +{"1756800|14697846": ["Different solutions to this problem have been proposed in the P2P research literature; an accessible survey is provided in [1]."]} diff --git a/graph_2075263.jsonl b/edge/graph_2075263.jsonl similarity index 100% rename from graph_2075263.jsonl rename to edge/graph_2075263.jsonl diff --git a/edge/graph_207531812.jsonl b/edge/graph_207531812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e9d72cd09eb3ed383f974c8a0acd363bce90f1c --- /dev/null +++ b/edge/graph_207531812.jsonl @@ -0,0 +1,12 @@ +{"17944561|4859605": []} +{"9534394|3202525": ["\u2026last ten years, and are now a classical tool proposed by many online services in diverse domains such as e-commerce [1], tourism [2], e-learning [3], etc. Collaborative Filtering (CF) is a recommendation technique, which relies on users\u2019 preferences: generally the ratings they assign to items\u2026"]} +{"13950344|1805048": ["One advantage of the CF approach is that it does not require extra information on the users or the items; thus, it is capable of recommending an item without understanding the item itself [5].", "r\u0302ui = pTuqi (or r\u0302ui = pTuBTai in the case of RC)1 \u2014with proper truncation if r\u0302ui fell outside [0, 5] (for \u2018Recipes\u2019) or [1, 5] (for \u2018Movies\u2019)\u2014and evaluated by the mean absolute error (MAE) metric:"]} +{"12535136|8835588": ["Br\u00e9zillon [8], [18], [19] and Brun [20] collected a set of definitions of context, mainly on the Web.", "This epistemological problem [18], [19] will be not discussed in this paper."]} +{"12419210|4411601": []} +{"7259012|1805048": ["Following the classification of traditional CF-based RSs [2,3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches.", "CF approaches can be further grouped into model-based CF and neighborhood-based CF [2,3].", "Following the classification of traditional CF-based RSs [2] [3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches."]} +{"700267|8125630": []} +{"1914653|8125630": ["3.2 Aggregation \nCapabilities One of the key characteristics of multidimensional databases is the ability to store measurements \n(such as sales numbers) in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "Moreover, this method \ncombines some of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "When con\u00adsidering multiple dimensions, we will \nfollow the multidimensional data model used for data warehousing and OLAP applications in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "\u2026his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "However, there are certain idiosyncrasies \npertaining to our model that make it different from the classical OLAP models used in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "This multidimensional approach is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions.", "Then, as shown in Figure 2, we \ncan compute an overall rating of how John Doe likes action movies as a genre by aggregating his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "\u2026is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions."]} +{"2501407|1805048": ["is collaborative filtering, which predicts a user\u2019s interest in an item through mining the patterns of the existing rating information of other similar users and/or items[2]."]} +{"14248898|14148655": ["For an in-depth discussion of different variants of critiquing-based recommendation we refer the reader to [7, 9, 26, 39, 44, 50]."]} +{"14248898|5935762": ["Recommendation systems [6, 32] provide suggestions for items that are of potential interest for a user."]} +{"7863583|393948": []} diff --git a/edge/graph_207547101.jsonl b/edge/graph_207547101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207584909.jsonl b/edge/graph_207584909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f03680338c9f710d739ac132aca76d440eebf203 --- /dev/null +++ b/edge/graph_207584909.jsonl @@ -0,0 +1 @@ +{"22127624|12419623": ["See Andradottir (1998) for an overview of how gradient estimates are used when optimizing a stochastic system via simulation. The basic Robbins\u2013Monro algorithm described in Section 6.3.6 can exhibit poor performance in practice, and there are ongoing efforts to improve both the rate of convergence and the stability of the algorithm. Moreover, the basic algorithm has been extended to handle feasibility constraints and multiple decision parameters. \u00d3lafsson and Shi (1999) describe an alternative optimization approach that exploits regenerative structure. Closely related to these optimization procedures are methods for \u201cranking and selection\u201d as surveyed in Goldsman and Nelson (1998). Heidelberger and Iglehart (1979) and Iglehart (1977), in particular, describe the application of the regenerative method to comparing the steady-state performance of two or more systems. Heidelberger (1979) and Iglehart and Lewis (1979) discuss schemes for reducing the variance of the standard point estimator for the regenerative method, and Glynn (1982a) gives methods for improving the coverage of the standard confidence interval. Some other variance-reduction techniques related to regenerative simulation are given in Calvin and Nakayama (2000) and Henderson and Glynn (1999b).", "See Andradottir (1998) for an overview of how gradient estimates are used when optimizing a stochastic system via simulation. The basic Robbins\u2013Monro algorithm described in Section 6.3.6 can exhibit poor performance in practice, and there are ongoing efforts to improve both the rate of convergence and the stability of the algorithm. Moreover, the basic algorithm has been extended to handle feasibility constraints and multiple decision parameters. \u00d3lafsson and Shi (1999) describe an alternative optimization approach that exploits regenerative structure. Closely related to these optimization procedures are methods for \u201cranking and selection\u201d as surveyed in Goldsman and Nelson (1998). Heidelberger and Iglehart (1979) and Iglehart (1977), in particular, describe the application of the regenerative method to comparing the steady-state performance of two or more systems.", "See Andradottir (1998) for an overview of how gradient estimates are used when optimizing a stochastic system via simulation. The basic Robbins\u2013Monro algorithm described in Section 6.3.6 can exhibit poor performance in practice, and there are ongoing efforts to improve both the rate of convergence and the stability of the algorithm. Moreover, the basic algorithm has been extended to handle feasibility constraints and multiple decision parameters. \u00d3lafsson and Shi (1999) describe an alternative optimization approach that exploits regenerative structure. Closely related to these optimization procedures are methods for \u201cranking and selection\u201d as surveyed in Goldsman and Nelson (1998). Heidelberger and Iglehart (1979) and Iglehart (1977), in particular, describe the application of the regenerative method to comparing the steady-state performance of two or more systems. Heidelberger (1979) and Iglehart and Lewis (1979) discuss schemes for reducing the variance of the standard point estimator for the regenerative method, and Glynn (1982a) gives methods for improving the coverage of the standard confidence interval.", "See Andradottir (1998) for an overview of how gradient estimates are used when optimizing a stochastic system via simulation. The basic Robbins\u2013Monro algorithm described in Section 6.3.6 can exhibit poor performance in practice, and there are ongoing efforts to improve both the rate of convergence and the stability of the algorithm. Moreover, the basic algorithm has been extended to handle feasibility constraints and multiple decision parameters. \u00d3lafsson and Shi (1999) describe an alternative optimization approach that exploits regenerative structure. Closely related to these optimization procedures are methods for \u201cranking and selection\u201d as surveyed in Goldsman and Nelson (1998). Heidelberger and Iglehart (1979) and Iglehart (1977), in particular, describe the application of the regenerative method to comparing the steady-state performance of two or more systems. Heidelberger (1979) and Iglehart and Lewis (1979) discuss schemes for reducing the variance of the standard point estimator for the regenerative method, and Glynn (1982a) gives methods for improving the coverage of the standard confidence interval. Some other variance-reduction techniques related to regenerative simulation are given in Calvin and Nakayama (2000) and Henderson and Glynn (1999b). Asmussen (1987b) considers the behavior of the regenerative method when simulating queues in heavy traffic.", "See Andradottir (1998) for an overview of how gradient estimates are used when optimizing a stochastic system via simulation. The basic Robbins\u2013Monro algorithm described in Section 6.3.6 can exhibit poor performance in practice, and there are ongoing efforts to improve both the rate of convergence and the stability of the algorithm. Moreover, the basic algorithm has been extended to handle feasibility constraints and multiple decision parameters. \u00d3lafsson and Shi (1999) describe an alternative optimization approach that exploits regenerative structure.", "See Andradottir (1998) for an overview of how gradient estimates are used when optimizing a stochastic system via simulation."]} diff --git a/edge/graph_207591052.jsonl b/edge/graph_207591052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b2d3ea6128db287a0314243422419d5b64bb102 --- /dev/null +++ b/edge/graph_207591052.jsonl @@ -0,0 +1,11 @@ +{"14745914|16534280": []} +{"5767228|393948": ["7 We followed the practice used in representation learning [Bengio et al. 2013], where both feature generation and learning are done with the same dataset.", "Automating the feature-design process has been one of the holy grails in the machine learning community, and a large body of research has been done under the name of representation learning or feature learning [Bengio et al. 2013]."]} +{"1914494|393948": ["In our model, an AST node is first represented as a distributed, real-valued vector so that the (anonymous) features of the symbols are captured.", "To capture explicit structures in data, it may be important and beneficial to integrate human priors to the networks (Bengio, Courville, and Vincent 2013).", "A generic criterion for representation learning is \u201csmoothness\u201d\u2014similar symbols have similar feature vectors (Bengio, Courville, and Vincent 2013)."]} +{"2923536|10540477": ["atures of the language. This dierence should be evident from the sample code idioms in Figure 8. Within the data mining literature, there has been a series of work on frequent tree mining algorithms [24, 48, 53, 54], which focuses on nding subtrees that occur often in a database of trees. However, as described in section 2, these have the diculty that frequent trees are not always interesting trees, a diculty ", " all fragments that occur more than a user-specied parameter Mtimes in the training set. This task is called frequent tree mining, and has been the subject of some work in the data mining literature [24, 48, 53, 54]. Unfortunately, our preliminary investigations [30] found that these approaches do not yield good idioms. Instead, the fragments that are returned tend to be small and generic, omitting many details "]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"207172599|3330313": []} +{"3495200|207591052": ["Our work builds upon the recent \ufb01eld of using machine learning for source code artifacts (Allamanis et al., 2017).", "The advent of large repositories of source code as well as scalable machine learning methods naturally leads to the idea of \u201cbig code\u201d, i.e. , largely unsupervised methods that support software engineers by generalizing from existing source code (Allamanis et al., 2017)."]} +{"7844555|10606961": ["Algorithmic debugging (also called declarative debugging), \ufb01rst discussed in Shapiro\u2019s dissertation [325] with more details in [328], [402], decomposes a complex computation into a series of sub-computations to help locate program bugs."]} +{"18919568|393948": ["In recent years, representations learned by Deep Neural Networks (DNNs) have outperformed other methods in many tasks including image classi\ufb01cation [1].", "The goal of representation learning is to reduce the amount of human input and expert knowledge needed to preprocess data before feeding it into machine learning algorithms [1]."]} +{"367166|393948": [", |z|) is an example of a \u201chyperparameter\u201d [26], and adjusting this hyperparameter will regulate the model\u2019s capacity such that models with larger hidden layers yield more capacity [50], [51]."]} +{"2468625|9340653": ["Inductive Programming approaches [12] aimed at inducing programs from incomplete speci\ufb01cations of the code to be implemented."]} diff --git a/edge/graph_207591146.jsonl b/edge/graph_207591146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68000784e39b3212d25bf20bea1578e9f217afa2 --- /dev/null +++ b/edge/graph_207591146.jsonl @@ -0,0 +1,23 @@ +{"52254282|33286487": []} +{"36765946|33286487": []} +{"18422096|33286487": []} +{"206795603|33286487": []} +{"6336685|33286487": []} +{"1010637|33286487": ["Higher order distributions do not satisfy common marginal properties [1], [2], but rather their generalized forms.", "Note also that quantum mechanics is an inherently probabilistic theory in contrast with signal analysis, which is a deterministic theory [1].", "The Wigner distribution, which is defined in quantum mechanics [3] and introduced in signal analysis by Ville [5], is the only one from the Cohen class of distributions [1], [2] (with signal independent kernel) that may produce the complete distribution concentration along the instantaneous frequency when it is a linear function of time [6], [7].", "In the time domain, the operators are given by and , [1].", "CONCENTRATION of a time-frequency distribution is one of its very important and intensively studied properties [1], [6], [7], [9], [11], [20].", "This is a natural analogy that was used in the extension of quantum mechanics concepts and definitions to the signal analysis (see [1], [16]\u2013[18])."]} +{"26386011|33286487": []} +{"14866715|33286487": []} +{"17426825|33286487": []} +{"14913182|33286487": []} +{"10435229|33286487": ["Most of the mentioned above time-frequency distributions are members of Cohen\u2019s quadratic class [ 2 ], which includes as a particular case the Wigner-Ville distribution (WVD)."]} +{"122273098|33286487": []} +{"122478787|33286487": []} +{"31537927|33286487": []} +{"13032351|33286487": ["Hence, the resulting ES will be the magnitude squared of Rihaczek\u2019s distribution and will satisfy the frequency marginal [ 3 ] up to a scale factor since", "[ 3 ] , \u201cA generalized sampling theory without bandlimiting con-", "Finally, if , which is the Fourier transform of , the GTF will be equal to Rihaczek\u2019s distribution or complex energy spectrum [ 3 ].", "Detka et al. [5] have shown that the spectrogram [16] and Cohen\u2019s class of bilinear distributions [ 3 ], [4] are related to the evolutionary spectrum (ES) and the generalized transfer function.", "This criterion has been used before [18], [20] to obtain positive TFR\u2019s that satisfy the marginals [ 3 ].", "Furthermore, the resulting evolutionary spectrum is positive and satisfies the time marginal [ 3 ], i.e.,"]} +{"16947764|1363053": ["Note that this modal representation of the sources is a particular case of signal sparsity often used to separate the sources in the underdetermined case [23]."]} +{"18737192|33286487": []} +{"22161384|33286487": []} +{"27109345|33286487": []} +{"17945195|33286487": []} +{"119968525|33286487": []} +{"1760917|33286487": ["1 Marginal distribution preservation Conditions on both continuous [1,2] and discrete [24] kernels for preserving time and/or frequency marginals in a TFR have been developed.", "A large number of bilinear TFRs have been proposed, each di ering only in the choice of a kernel function [1]."]} +{"44736985|33286487": ["Note that several distributions Cx(7, v; II) satisfy the two conditions of the proposition, such as the generalized WVD\u2019s (6), and other distributions whose @(U, 7) are complex exponentials depending on v 171 (e.g., Page\u2019s distribution [ 6 ]) or IvI r.", "Our approach follows the same lines as the derivation of the general class of time-frequency energy representations, referred to as the Cohen\u2019s class [5], [ 6 ].", "In addition to the class of generalized Wigner distributions (6), we can mention the Choi-Williams\u2019 distribution [ 6 ], which has recently received special attention and which is associated to the choice +,(U, r) = where U is a positive parameter.", "The formalism of the Cohen\u2019s class (5) has been widely used for some time [ 6 ], [12], [3]."]} diff --git a/edge/graph_207592981.jsonl b/edge/graph_207592981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207595944.jsonl b/edge/graph_207595944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db39d922b8c1e2cb98d6ba76625b863a22f932c7 --- /dev/null +++ b/edge/graph_207595944.jsonl @@ -0,0 +1,2 @@ +{"10640161|14140377": ["While there has been some work on dataset versioning, e.g., [2, 18, 14, 20, 19, 16, 17], this work has been focused on managing and querying a linear chain of versions, such as would arise when a single user is modifying their own data.", "Temporal databases [18, 14, 20, 19, 16] and Oracle\u2019s \u201cFlashback\u201d feature, provide, in effect, the ability to traverse and query a linear chain of versions, but lack support for branching versions or derived data products."]} +{"18054605|6742930": ["\u2026intelligence: In handling OCGS, ubiquitous intelligence such as human qualitative intelligence , machine quantitative intelligence, social intelligence , domain intelligence, and network intelligence are all involved and play different but essential roles [74], [75] in the problem solving."]} diff --git a/edge/graph_207596793.jsonl b/edge/graph_207596793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..713e55daacddd2f10333a369a724dabaea04ecc6 --- /dev/null +++ b/edge/graph_207596793.jsonl @@ -0,0 +1,50 @@ +{"463224|1176034": []} +{"463224|6555395": []} +{"109277270|763939": ["Regarding the simulation of vehicles, we need to consider appropriate mobility models (Haerri et al., 2009).", "sider appropriate mobility models (Haerri et al., 2009)."]} +{"37722263|1113420": []} +{"7408566|1940388": ["Again, note that data (packet) privacy [23], [64], [65] is out of scope of our paper.", "[23] for a more complete list of active attacks."]} +{"7408566|1230643": ["A WSN can consist of different types of sensors and serve different kind of applications [7]."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"207208835|13392386": ["These context sensors can capture the rich [Sohn et al. 2005], and context-aware recommendation [Bader et al. 2011; Liu et al. 2013; jae Kim et al. 2010; Karatzoglou et al. 2010; Woerndl et al. 2007]."]} +{"6128117|1113420": ["A large amount of research and practical applications exist on mobile computing, recommender systems, context-awareness (e.g. [1] or [2]) or location based services [3], as well as any combination of the above areas."]} +{"206710454|1805048": ["Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.", "Su and Khoshgoftaar [212] presents a survey of CF techniques.", "The rest of this section deal is dealt with the concepts and research in the two lines considered previously: Filtering of social information and content filtering.", "The pure CBF has several shortcomings [16,176,212]:", "Breese et al. [43] evaluated the predictive accuracy of different algorithms for CF; later, the classical paper [94] describes the base for evaluating the Collaborative Filtering RS.", "Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.g. videos, songs, films, etc. in a CF based website) in such a way that when enough information is stored on the system, we can make recommendations to each user based on information provided by those users we consider to have the most in common with them.", "Collaborative Filtering (CF) methods play an important role in the recommendation, although they are often used along with other filterning techniques like content-based, knowledge-based or social ones."]} +{"8618733|10739218": ["In neural network [55] approach, if-then fuzzy rules enable the emulation of the decisions or reasoning of a human expert, whereas fuzzy number and compositional rules of inference have been employed for fuzzy decision making in medical diagnosis and healthcare [56][57]."]} +{"9744680|1113420": []} +{"14135612|1230643": ["A reasonable choice for such a solution is the use of small-to medium-scale wireless sensor networks (WSNs).", "WSNs represent a modern wireless technology whereby nodes communicate with each other over a wireless connection and push collected data to a processing element (sink).", "Additionally, recognizing that tourists often labour to interact with a remote tourist portal while on travel due to lack of networking infrastructures or even avoid mobile data communications due to high roaming charges, we have implemented a cost-effective wireless sensor network (WSN) [2] prototype (incorporated within MTRS) which may be deployed around tourist sites for providing mobile users effortless and inexpensive uploading of tourist information and ratings about POIs though their mobile devices.", "4 presents the infrastructure and update mechanism for tourist information portal (based on WSN installations).", "A basic principle of WSNs is that they do not require a stable network infrastructure to operate.", "(WSN) [2] prototype (incorporated within MTRS) which may be deployed around tourist sites for providing mobile users effortless and inexpensive uploading of tourist information and ratings about POIs though their mobile devices.", "The typical function of WSNs involves periodic multihop forwarding of recorded sensory data from distributed nodes to the centralized sink.", "Namely, WSNs enable self-configuration and selforganization of an infrastructureless ad hoc network topology.", "WSN installations also enable accurate users' localization (hence, location-aware recommendations) without posing any hardware requirements (e.g. GPS modules) on end user devices.", "We also proposed the use of cost-effective WSN installations around tourist sites for allowing mobile users to upload tourist information and ratings about POIs via their mobile devices."]} +{"14135612|1805048": []} +{"53234823|2355696": ["Existing work in affect recognition focuses primarily on the recognition of emotions [13, 14], and does so largely by leveraging the visual [15-17] and acoustic [18, 19] signals found in the speech, actions, and faces of people."]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"427520|1113420": ["\u2014 Context-aware computing [Schilit et al. 1994; Chen and Kotz 2000; Smailagic et al. 2001; Baldauf et al. 2006] refers to computing that adapts to the environment.", "Context-aware computing [Schilit et al. 1994; \nChen and Kotz 2000; Smailagic et al. 2001; Baldauf et al. 2006] refers to computing that adapts to the \nenvironment."]} +{"427520|44944144": ["On the \ncontrary, in ad hoc computing [Sesay et al. 2004] a network is estab\u00adlished temporarily and on demand \namong the mobile devices, without relying on .xed computers connected to a wired network.", "On the contrary, in ad hoc computing [Sesay et al. 2004] a network is established temporarily and on-demand among the mobile devices, without relying on fixed computers connected to a wired network."]} +{"427520|2451860": ["Due to these factors, early work in the .eld of mobile computing \nemphasized that classical computing techniques are insuf.cient and must be adapted to the new environment \n[Imielinski and Nath 1993; Imielinski 1996a; Pitoura and Samaras 1998; Jing et al. 1999; Barbar\u00b4 a 1999].", "This type of mobility is located within the mobile \ncomputing frame\u00adwork, which \u00b7\u00b7\u00b7 no longer requires users to maintain a .xed and universally known position \nin the network and enables unrestricted mobility of the users [Barbar\u00b4 a 1999, p. 108].", "\u2026whether in the \nreceive, transmit, or idle state [Anastasi et al. 2003], it is still important to minimize transmissions \ndue to the asymmetric communication bandwidth [Barbar\u00b4 a 1999]: there is more band\u00adwidth available from \nthe server to the mobile clients than from the clients to the server.", "\u2026\ngreat economical bene.ts, it also opens up new research issues for data management, due to the need for \nadapting existing tech\u00adniques to the mobile environment [Imielinski and Nath 1993; Alonso and Korth 1993; \nForman and Zahorjan 1994; Imielinski 1996a; Pitoura and Samaras 1998; Barbara\u00b41999].", "Looking beyond the details of the specific wireless technology, the generally accepted mobile environment infrastructure [Dunham and Helal 1995; Pitoura and Samaras 1998; Barbar\u00e1 1999; Pitoura and Samaras 2001] is composed of mobile hosts (MHs) and base stations (BSs).", "Looking \nbeyond the details of the speci.c wireless technology, the generally accepted mobile environment infrastructure \n[Dunham and Helal 1995; Pitoura and Samaras 1998, 2001; Barbar\u00b4 a 1999] is composed of mobile hosts (MHs) \nand base stations (BSs).", "] no longer requires users to maintain a fixed and universally known position in the network and enables unrestricted mobility of the users\u201d [Barbar\u00e1 1999].", "2003], it is still important to minimize transmissions due to the asymmetric communication bandwidth [Barbar\u00e1 1999]: There is more bandwidth available from the server to the mobile clients than from the clients to the server.", "Due to these factors, early works in the field of mobile computing emphasize that classical computing techniques are insufficient and must be adapted to the new environment [Imielinski and Nath 1993; Imielinski 1996a; Pitoura and Samaras 1998; Jing et al. 1999; Barbar\u00e1 1999]."]} +{"1434572|7085121": []} +{"7923103|1230643": ["Additionally, recognizing that tourists often labour to interact with a remote tourist portal while on travel due to lack of networking infrastructures or even avoid mobile data communications due to high roaming charges, we have implemented a cost-effective Wireless Sensor Network (WSN) [2] prototype which may be deployed around tourist sites for providing mobile users effortless and inexpensive uploading of tourist information and ratings about POIs though their mobile devices.", "Namely, WSNs enable self-configuration and self-organization of an infrastructureless ad-hoc network topology.", "Sensor nodes are computational nodes of small dimensions and of very low cost shipped with embedded sensors to record measurable parameters such as temperature, humidity, acceleration, etc. WSNs represent a modern wireless technology whereby nodes communicate with each other over a wireless connection and push collected data to a processing element (sink).", "This paper presents a content recommendation system, a commenting system and the prototype of the WSN installation.", "implemented a cost-effective Wireless Sensor Network (WSN) [1] prototype which may be deployed around tourist sites for providing mobile users effortless and inexpensive uploading of tourist information and ratings about POIs", "A basic principle of WSNs is that they do not require a stable network infrastructure to operate.", "A reasonable choice for such a solution is the use of small to medium-scaleWireless Sensor Networks (WSNs).", "The typical function of WSNs involves periodic multihop recorded sensory data forwarding from distributed nodes to the centralized sink."]} +{"12640977|2835258": ["In contrast to our proactive approach introduced here, a reactive query-response scheme using unicast routing [7] is proposed for interlinking parking meters in [4]."]} +{"2638758|469744": ["In this way, learners can take the initiative to explore learning, actively constructing new knowledge [12]."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"4093889|2835258": ["A number of location-aware protocols have been proposed for \u201cad hoc\u201d routing and networking [3]."]} +{"14126766|1113420": ["Baldauf, Dustdar, and Rosenberg (2007) suggested the abstract layer architecture for context-aware systems and introduced various existent middleware and serverbased approaches to ease the development of context-aware applications , where each layer is explained based on various research."]} +{"17377932|7085121": ["Keywords: Wireless Sensor Networks, Intelligent Transportations Systems, Traffic safety & efficiency, Vehicular applications.", "They consist of medium to large networks of inexpensive wireless sensor nodes capable of sensing, processing and distributing information acquired from the environment through the collaborative effort of nodes [2].", "Finally, there is the option of not using a gateway and directly communicating vehicles and static nodes with WSN technology.", "In addition, if road infrastructures for VANET are deployed, their associated Roadside Units (RSU) can also take control of more complex computations as well as interconnecting WSN and VANET, which helps in the dissemination of the data gathered by the WSN."]} +{"17138589|1113420": ["Triveni uses context synthesizers which can provide a measure of confidence for RDF relations, which gives the probability that the high-level context fact is true [2, 17].", "A survey of the literature [2] shows that context extraction and user context generation from mobile sensors or other sources, has been well studied."]} +{"31121981|10813427": ["Therefore, out-of-core solutions are widely used, which store the complete dataset in a remote server, from where the required parts of the terrain are progressively streamed to the client over a network, see [50] for further details."]} +{"14415774|1113420": ["A list of currently more practical monitoring sensors is presented in [ 19 ]."]} +{"27310036|5374007": []} +{"753606|14866098": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"753606|16362395": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"3329660|6746689": ["Second, we obtain the skeleton of the road networks by performing a thinning operation based on the algorithm proposed in [9], as depicted in Figure 3(c)."]} +{"15952046|192934": ["For further information on clustering and clustering algorithms, see [12], [13], [14], [15], [16]."]} +{"4307188|1113420": ["However, in ubiquitous computing scenario, users can access and exchange information at anytime, anyplace, and in any way, and context-awareness is the fundamental objective of ubiquitous computing [3]."]} +{"13428174|10500613": ["The problem of schema matching has been widely studied in database community [28 ]."]} +{"1914653|8125630": ["3.2 Aggregation \nCapabilities One of the key characteristics of multidimensional databases is the ability to store measurements \n(such as sales numbers) in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "Moreover, this method \ncombines some of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "When con\u00adsidering multiple dimensions, we will \nfollow the multidimensional data model used for data warehousing and OLAP applications in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "\u2026his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "However, there are certain idiosyncrasies \npertaining to our model that make it different from the classical OLAP models used in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "This multidimensional approach is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions.", "Then, as shown in Figure 2, we \ncan compute an overall rating of how John Doe likes action movies as a genre by aggregating his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "\u2026is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions."]} +{"17817837|3202525": ["According to Verbert et al. [2], physical conditions context has been researched extensively in home automation research, however its\u2019 use in TEL is limited.", "The user context of an appropriate recommender system framework for TEL, according to [2] and [79] comprise of basic personal information of the learner, knowledge/performance of the learner, learner interests, learning goals, learning and cognitive styles of the learner and learner\u2019s background.", "According to [2], recommender systems for Technology Enhanced Learning (TEL) try to address these challenges - i.e. they attempt to filter content for different learning settings which involve different contexts [2].", "[18] has been used comprehensively within various application domains, including researchers in Technology Enhanced Learning (TEL) [2], [19], [20].", "different learning settings which involve different contexts [2].", "Different models of location have been proposed and implemented to capture geographic and human-readable information about objects, which include devices, persons and relationships between objects [1], [2].", "According to [2], learning models have been researched extensively in educational adaptive hypermedia and the educational modeling research areas.", "An example is location contexts such as classroom, home and outdoor, that are often referenced by a learning application [2], [35], [36], [37].", "[2], physical conditions context has been researched extensively in home automation research, however its\u2019 use in TEL is limited.", "The definition by Dey et al. [18] has been used comprehensively within various application domains, including researchers in Technology Enhanced Learning (TEL) [2], [19], [20].", "Verbert et al. [2] presented a context framework that identifies relevant context dimensions for TEL applications and elaborated an analysis of existing TEL recommender systems along these dimensions.", "According to [2], recommender systems for Technology Enhanced Learning (TEL) try to address these challenges - i.", "which a recommender is deployed, such as the location, current activity and available time of the user [2].", "Time context indicates an instance or period during which contextual information is needed, known or relevant to the user of the recommender system [2], [18].", "[2], a precise definition and model of context can facilitate the identification of what does and what doesn\u2019t constitute context and can enable reuse and exchange of contextual data across applications.", "In TEL recommender systems such as the ones in Schirru et al. [45] and Stern et al. [46], the activity context of a learner is inferred with tools and resources such as classification algorithms based on a task model created by an expert."]} +{"17817837|1805048": ["employing combined approaches just like combination of other traditional recommender systems [8], [9], [11], [12], [16].", "surveys of the state-of-the-art [6], [11]."]} +{"24781977|3202525": []} +{"518308|10283694": ["protocols [15]\u2013[19], encouraging participation in vehicular networks [20], security [21], [22], and vehicular Delay-/"]} +{"518308|3330461": []} +{"518308|763939": ["Several related surveys and tutorials on vehicular networks have been published previously, related to requirements and architectures [8], inter-vehicle communications [9], [10] and information dissemination [11], mobility models [12], information management for safety applications [13], applications [14], routing"]} +{"518308|1230643": ["In-network data aggregation (or, simply, data aggregation) has been the focus of significant research in the field of Wireless Sensor Networks (WSNs) [278], which are energy-constrained; for example, see [279]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"33598507|12817488": ["Recently, data aggregation has thus been exploited by many of these communication protocols designed for vehicular networks [4,8,22,28,31].", "In this context, data aggregation is usually considered as a way to reduce energy consumption [31,33], which is not a concern in our context."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_207651801.jsonl b/edge/graph_207651801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2dd9064f62dae144bbb03fc01f18abbd30eedee8 --- /dev/null +++ b/edge/graph_207651801.jsonl @@ -0,0 +1,9 @@ +{"17253380|1174262": []} +{"8976734|7278743": ["The presence of Bluetooth and Wi-Fi networks in offices, buildings and campuses (Bisdikian, 2001) (The Bluetooth Special Interest Group, 2001) (Harwood, 2009) (Bray & Sturman, 2001) have been increased because of their wide availability on a huge number of personal portable electronic devices.", "2 networks in offices, buildings and campuses (Bisdikian, 2001) (The Bluetooth Special Interest Group, 2001) (Harwood, 2009) (Bray & Sturman, 2001) have been increased because of their wide availability on a huge number of personal portable electronic devices.", "The connection is then created and the devices begin the process of exchanging data (Bray & Sturman, 2001) (Hussain & Wee-Seng, 2007) (Hallberg et al., 2003) (Bisdikian, 2001)."]} +{"106619196|15247126": ["The stealthiness of those communications can be ensured by using covert communication channels [17].", "There are a number of proposals for covert channel that would be suitable for such communications, for instance by piggybacking on the DNS, ICMP or HTTP protocols [17], or even P2P file sharing systems."]} +{"8509913|2357830": ["Similar approaches have been, however, proposed for RFID (WSRE) [19] and Bluetooth [37] and the upcoming Bluetooth update Wibree [10].", "Similar approaches have been, however, \nproposed for RFID (WSRE) [19] and Bluetooth [37] and the upcoming Bluetooth update Wibree [10]."]} +{"1510958|7788290": ["A good survey for visual-based surveillance can be found in [ 2 ]."]} +{"13752328|10505742": ["However all addressed a relevant scope of crowd models from the perspective of operational support (Challenger et al., 2009b), sensors (see, for example, Baratchi et al., 2013), or models in the social sciences (Wijermans, 2011).", ", 2009b]), sensors (see, for example, [Baratchi et al., 2013]), or models in the social sciences ([Wijermans, 2011]).", "Apart from a study on ways to monitor wildlife (Baratchi et al., 2013), which also refers to the applicability in the case of monitoring human mobility, there is, to the best of our knowledge, no systematic study on how to gather information on crowd movements.", "Apart from a study on ways to monitor wildlife [Baratchi et al., 2013], which also refers to the applicability in the case of monitoring human mobility, there is, to the best of our knowledge, no systematic study on how to gather information on crowd movements."]} +{"13752328|16525678": ["Others consider state-of-the-art techniques, such as the development of intelligent distributed surveillance systems and image processing technologies (Valera and Velastin, 2005), recognition and wearable sensors (Atallah and Yang, 2009) or advocate a particular type of crowd modeling (Hughes, 2003).", "\u2026consider state-of-the-art techniques, such as the development of intelligent distributed surveillance systems and image processing technologies (Valera and Velastin, 2005), recognition and wearable sensors (Atallah and Yang, 2009) or advocate a particular type of crowd modeling (Hughes, 2003).", "For instance, the review presented in Valera and Velastin (2005) describes the state of development of intelligent distributed surveillance systems, including a review of current image processing techniques that are used in different modules as part of the surveillance systems."]} +{"39206144|7788290": ["Furthermore, taking pictures or video surveillance of unknown people is always a privacy issue and has to be discussed carefully in certain scenarios [6]."]} +{"18220128|8365617": ["A more intuitive and automatic approach we selected is based on a sliding-window and bottom up (SWAB) approximation [11]."]} diff --git a/edge/graph_207658313.jsonl b/edge/graph_207658313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..892ea1768270b60bf4410b982b3caf8fbc04f632 --- /dev/null +++ b/edge/graph_207658313.jsonl @@ -0,0 +1,33 @@ +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"16767807|4474193": []} +{"16767807|15273230": []} +{"7535194|14808716": ["In this work we use the Gain Ratio Criterion [29], one of the most used criteria for selecting the splitting attribute for expanding a node [30]."]} +{"20744064|2992477": ["Data mining is widely known as Knowledge Discovery in Database (KDD) [7]."]} +{"9006167|3348390": ["For example, an activity recognition application [3] [5] uses embedded accelerometers of mobile devices to collect proper acceleration data about daily human activities.", "Context awareness [3] [5] has high impact on understanding MBD by describing the circumstances in which the data was collected to provide personalized mobile experience to end users (e.g., targeted advertising, healthcare, and social services )."]} +{"6649329|192934": ["N the field of pattern recognition, the statistical approach is a popular and intensively studied field [1], [ 2 ], [3], [4]."]} +{"52838249|12681089": ["which is cluster based, is a popular model [1]."]} +{"5498804|192934": []} +{"49188052|12681089": ["The geometry-based stochastic model (GBSM) [1] which is cluster-based is popularly used in the 5G.", "In the GBSM, a cluster indicates a group of multipath components (MPCs) with similar parameters."]} +{"2524297|194321": []} +{"2524297|3042864": []} +{"2524297|3348390": []} +{"3982621|8047599": ["In fact, the two desired matrices need to meet the requirement that the dot product between pu and qi is close to the known value ru,i in the rating matrix [39]."]} +{"3982621|17641462": ["In recent years, an increasing number of individuals prefer to watch movies or TV plays using mobile applications [50]."]} +{"3982621|1805048": [", the Bayesian network, random walk, deep learning, etc [20], [51], [52].", "Themetrics of recommender systems are divided into three categories [20], i."]} +{"4422720|1805048": ["Generally speaking, the commonly used CF methods can be categorized into two types: the memory-based method and the model-based method [47].", "Generally speaking, the model-based CF method performs better than the memory-based method because it addresses the sparsity better, improves the prediction performance, and gives an intuitive rationale for recommendations [47]."]} +{"7527280|11894197": ["Feature selection is an important topic in data mining and machine learning and has been studied for many years in literature [10, 19, 26, 31]."]} +{"8026607|2992477": ["Data mining is widely known as KDD (Knowledge Discovery in Databases)([9]).", "Data mining is widely known as KDD (Knowledge Discovery in Databases)[9]."]} +{"2680106|38476": ["Dist(li , lj ) represents the geospatial distance between two locations li and lj and is calculated by using Vincenty\u2019s formulae [37] with the latitude and longitude coordinates (xi, yi) and (xj , yj ) of the two locations, respectively."]} +{"14862572|18454590": ["A variety of different architectures and training algorithms have been proposed in the literature (see the comprehensive survey in [37])."]} +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} +{"19434521|1805048": []} +{"2901312|3042864": ["The emergence of mobile cloud computing (MCC) [10], [25], [34] facilitates reduction of task-execution time and real-time communication latency for such Smart Healthcare applications in the Smart City environment [12] [7] [37] [28] [1]."]} +{"54561216|16362395": []} diff --git a/graph_2076637.jsonl b/edge/graph_2076637.jsonl similarity index 100% rename from graph_2076637.jsonl rename to edge/graph_2076637.jsonl diff --git a/edge/graph_207694246.jsonl b/edge/graph_207694246.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33522eb79b6a5a4cd19c5a78a980d0b539dbdb94 --- /dev/null +++ b/edge/graph_207694246.jsonl @@ -0,0 +1,14 @@ +{"14328338|1230643": ["Sensors are resource-constrained tiny devices, with small memory storage capacities (10 KB of RAM and 48 KB of ROM), low computation capacities (16-bit and 8 MHZ CPU), and extremely limited energy supply (3.6 V) [MOT], which is in general neither rechargeable nor replaceable [ ASS02 ]."]} +{"62558500|1236072": []} +{"5968490|1230643": ["Attack-Resistant Location Estimation in Sensor Networks Donggang Liu and Peng Ning Wenliang Kevin Du \nNorth Carolina State University Syracuse University {dliu, pning}@ncsu.edu wedu@ecs.syr.edu Abstract \nMany sensor network applications require sensors locations to function correctly."]} +{"5700265|1230643": ["A WSN can be deployed in harsh environments to fulfill both military and civil applications [1]."]} +{"9036805|1230643": ["Due to their operating nature, sensor networks are often unattended, hence prone to different kinds of novel attacks [1]."]} +{"289350|1230643": ["WSNs can be deployed in harsh environments to fulfil both military and civil applications [1].", "However, tamper-proof hardware is expensive and energy demanding [2], [1]."]} +{"6396569|1236072": ["Traditional WSN routing protocols [21], which describe how to pass messages through the network so they will most likely reach their destination, typically rely on routing tables or recent route histories."]} +{"6396569|1762301": ["Fortunately, there is an active area of research dedicated to routing in mobile ad hoc networks (MANETs), and MWSNs can borrow from this work [22]."]} +{"6836305|1230643": [", military, environmental, and health applications [1]."]} +{"16733772|1940388": ["They are often deployed in hostile environments in both military and civil applications [ 1 ]."]} +{"13887365|1230643": ["Wireless sensor networks are envisioned to be economic solu tions to many important applications, such as real-time tra ffic monitoring, military surveillance, and homeland security [1] ."]} +{"61737171|1230643": []} +{"2709461|1230643": ["\u2026Peng Ning \nCliff Wang An Liu, Yuzheng Zhou Computer Science Dept. Army Research Of.ce Computer Science Dept. NC \nState University RTP, NC 27709 NC State University Raleigh, NC 27695 Raleigh, NC 27695 cliff.wang@us.army.mil \n{ksun3,pning}@ncsu.edu ABSTRACT Accurate and synchronized time is\u2026"]} +{"10109580|1230643": ["Ihre unabh\u00a8angige Energiequelle und drahtlose Daten\u00a8ubertragung erm\u00a8oglicht jedoch den ausdr\u00a8ucklich gew\u00a8unschten Einsatz in schwer erreichbaren Zielgebieten, oder in mobilen Szenarien [1]."]} diff --git a/edge/graph_207704857.jsonl b/edge/graph_207704857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207708416.jsonl b/edge/graph_207708416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c90921a0c431d368d09201a6bb9bafb2e9bf4f03 --- /dev/null +++ b/edge/graph_207708416.jsonl @@ -0,0 +1,5 @@ +{"6033936|11139156": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"6033936|205435103": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"207035184|4411601": ["just a fraction of the articles, or focus on selected aspects, such as recommender-system evaluation [190]."]} +{"207035184|7919236": ["For instance, users might become dissatisfied with accurate recommendations when they have no trust in the recommender system\u2019s operator [342], their privacy is not ensured [300], they need to wait too long for recommendations [300], or they find the user interfaces unappealing [343]."]} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} diff --git a/edge/graph_207718858.jsonl b/edge/graph_207718858.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff99c017be6816f5fd38343a06b4d0c6af238ae2 --- /dev/null +++ b/edge/graph_207718858.jsonl @@ -0,0 +1,7 @@ +{"11769466|870434": ["Examples of these proposals are interplanetary networking [2, 4], data MULEs [5, 6], underwater networks [7], and wildlife tracking sensor networks like ZebraNet [8]."]} +{"8841451|2835258": ["The former algorithm is a DTN variation of existing location-based greedy algorithms [11, 12] where the packet is forwarded to the neighbour that is closest to the destination (if closer than the position of the current carrier).", "A number of existing geographic routing protocols are available [13, 12]."]} +{"2034516|11452661": ["We propose a taxonomy to map the DTN congestion control design space and use it to classify existing DTN congestion control mechanisms.\nc\u00a9 2014 Published by Elsevier Ltd.\nKeywords: delay and disruption tolerant networks, interplanetary networks, congestion control, intermittent connectivity"]} +{"10407884|763939": ["An extensive survey on mobility models is provided in [36]."]} +{"10407884|870434": ["For example, underwater networks make use of the DTN paradigm to enable applications for oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications [17]."]} +{"11343778|14441987": ["These characteristics make the classical ad hoc routing protocols [4]\u2013[6] not being applicable for DTNs, since these protocols rely on establishment of a complete end-to-end"]} +{"2616246|870434": ["\u2026Delay Tolerant Networks (DTNs) [1] are a class of networks designed to address several challenging connectivity issues such as sparse connectivity, long or variable delay, intermittent connectivity, asymmetric data rate, high latency, high error rates and even no end-to-end connectivity."]} diff --git a/edge/graph_207730550.jsonl b/edge/graph_207730550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c28b4a49ceb1794a7e87aff568eee729820eef9 --- /dev/null +++ b/edge/graph_207730550.jsonl @@ -0,0 +1,12 @@ +{"7176957|6116761": []} +{"13899117|6116761": ["In a nutshell, although a complete understanding of brain structural architecture is certainly not sufficient to understand brain function (Friston, 2011), it is still a valuable tool to understand its degrees of freedom."]} +{"41850743|6116761": []} +{"3965288|207372751": []} +{"1522722|9431428": []} +{"32725326|6116761": ["Each local brain region has its own functions and is connected with other brain regions both structurally and functionally, which facilitates information transfer among distant brain regions (Dosenbach et al., 2007; Friston, 2011)."]} +{"122907607|7064380": []} +{"69348735|207730550": []} +{"69348735|393948": []} +{"69348735|206051485": ["Image registration is the process of matching and superimposing two or more images at different times, different sensors (such as imaging equipment) or different conditions (such as illumination, position, and angle)[72]."]} +{"205508650|6116761": []} +{"16421194|6116761": ["This stands in sharp contrast to \u201cfunctional connections\u201d that describe statistical dependencies derived from observations of neural time series (Friston, 2011)."]} diff --git a/edge/graph_207743293.jsonl b/edge/graph_207743293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19728276caea623ecfcf360e47a629fb32229699 --- /dev/null +++ b/edge/graph_207743293.jsonl @@ -0,0 +1,9 @@ +{"5837127|10975328": ["ral visualization (for a survey, see Silva [26])."]} +{"9164793|207743293": ["Prior work in the area has found the task dif\ufb01cult, compounded by the variety present in language use between different stories (Lukasik et al., 2015; Zubiaga et al., 2017)."]} +{"16995697|207372751": ["Researchers have tried to group users into the same group based on link predictions [10] and content characteristics [11]."]} +{"938460|456491": ["First, we employ a multiple output GP based on the Intrinsic Coregionalization Model (ICM) ( \u00b4Alvarez et al., 2012).", "First, we employ a multiple output GP based on the Intrinsic Coregionalization Model (ICM) (\u00c1lvarez et al., 2012)."]} +{"4182154|1143625": ["Popular social media, such as Twitter or Facebook, become even more important in emergency situations, such as shootings or social upheavals, where information is often posted and shared first [7], before even news media [9]."]} +{"260065|9060471": ["State of the Art and its Limitations: Prior work on credibility analysis (see [9] for a survey) has focused on factual claims (e."]} +{"6153235|877056": ["On the other hand, the streaming environment restricts the complexity of patterns, as data stream has the one pass constraint, which makes it difficult to do the iterative calculation and limits the computing and storage capabilities [10]."]} +{"481343|456491": []} +{"120516327|207372751": []} diff --git a/edge/graph_20774777.jsonl b/edge/graph_20774777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fad0d505b1c74b4164f94dd6cb39b04f5155cd83 --- /dev/null +++ b/edge/graph_20774777.jsonl @@ -0,0 +1,2 @@ +{"195649387|16403716": []} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} diff --git a/edge/graph_207748179.jsonl b/edge/graph_207748179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bfbf9d97c32c22615f8f1723d1431a22c8dfabd --- /dev/null +++ b/edge/graph_207748179.jsonl @@ -0,0 +1 @@ +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} diff --git a/edge/graph_20774863.jsonl b/edge/graph_20774863.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a1d145f41a1880d6f1e69770cd555f5b92d1d84 --- /dev/null +++ b/edge/graph_20774863.jsonl @@ -0,0 +1,9 @@ +{"122847687|9010313": []} +{"128764341|9010313": []} +{"17595980|11112426": ["A geometry-based N_FINDR algorithm [27] is used for endmember selection."]} +{"26771400|17054454": ["when large datasets are dealt with (Filippi and Jensen 2006; Xie et al. 2008).", "This is useful especially when there is a need to integrate the environmental variables (e.g. slope, soil type, and rainfall) in the mapping process (Xu et al. 2005; Xie et al. 2008).", "slope, soil type, and rainfall) in the mapping process (Xu et al. 2005; Xie et al. 2008).", "Spectral discrimination between vegetation types in complex environments is a challenging task, because commonly different vegetation types may possess the same spectral signature in remotely sensed images (Sha et al. 2008; Xie et al. 2008).", "One disadvantage of ANN, however, is that ANN can be computationally demanding to train the network when large datasets are dealt with (Filippi and Jensen 2006; Xie et al. 2008).", "\u2026the accuracy of wetland vegetation classification\nSpectral discrimination between vegetation types in complex environments is a challenging task, because commonly different vegetation types may possess the\nsame spectral signature in remotely sensed images (Sha et al. 2008; Xie et al. 2008)."]} +{"126929930|622308": []} +{"140648701|12135664": []} +{"16648235|16374808": ["To merge panchromatic (with a higher spatial resolution) and multispectral (with a lower spatial resolution) images from the same or separate sensors, pansharpening algorithms have been extensively studied in the past two decades [3] [4]."]} +{"15471174|11112426": ["Linear spectral mixture models are commonly used for spectral unmixing owing to their physical effectiveness and mathematical simplicity [33]."]} +{"10913825|11112426": ["6, are the linear model, the bilinear model, and the Hapke model [3], [40].", "JUNE 2013 IEEE GEOSCIENCE AND REMOTE SENSING MAGAZINE 7 and spectral resolution instruments (see [3] and references therein).", ", principal component analysis (PCA) [3], is commonly applied.", ", [55] [3] and references therein): The posterior distribution of the parameters of interest is computed from the linear observation model (1) within a hierarchical Bayesian model, where conjugate prior distributions are chosen for some unknown parameters to account for physical constraints.", "In [146], a modification to the RX algorithm called SubSpace RX (SSRX) was outlined that is based on the PCA of the background covariance matrix.", "Visualization of hyperspectral AVIRIS image, from (a) to (d) using PCA and the methods of [20]\u2013[22], respectively.", "Advanced morphological techniques such as morphological profiles (MPs) [93] have been successfully used for feature\nextraction prior to classification of hyperspectral data by extracting the first few principal components of the data using the PCA [3], and then building so-called extended morphological profiles (EMPs) on the first few components to extract relevant features for classification [94].", "Nevertheless, because the spectral vectors are non-negative, is it always possible to build rescaled versions thereof, belonging to an affine set [41], and thus satisfying the ASC (see [3] for details).", "Traditionally, methods based on PCA are applied that decorrelate bands.", "The segmented PCA [78] reduces the computational load significantly for feature extraction, compared with the conventional PCA.", "We focus mainly on supervised and semi-supervised classification, although techniques for unsupervised classification and/or clustering have also been used in the literature [3].", "In order to address these issues, feature mining [3], subspace-based approaches [58] and semi-supervised learning techniques [1] have been developed.", "A widely used approach has been the generation of features in a new space, like those obtained from the PCA [3] or the minimum noise fraction (MNF) [77].", "This ill-conditioning is typically addressed by a regularization procedure such as PCA-based regularization or adding a scaled identity matrix to the background covariance matrix [147].", "However, it has been demonstrated that the original spectral features contain high redundancy [3].", "Since the spectral correlation is high, the data are likely to reside on a very low-dimensional submanifold of the spectral space, and projection of the data on a subspace of dimension d nb% , using, e.g., principal component analysis (PCA) [3], is commonly applied.", "For variations of these ideas recently introduced, see [3].", "We have, however, discarded those orthogonal directions corresponding to 10 SNR 1 to avoid instability of the endmember identification (see [3] for more details).", "5, four different color visualizations of an AVIRIS hyperspectral image of 224 spectral bands are shown, obtained by PCA and the methods of [20]\u2013[22] respectively."]} diff --git a/edge/graph_207757010.jsonl b/edge/graph_207757010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2619cc79ea6ef231ded48c5f09c8b53bb781cee --- /dev/null +++ b/edge/graph_207757010.jsonl @@ -0,0 +1,2 @@ +{"52954028|8983048": []} +{"206594947|12724190": []} diff --git a/edge/graph_2077573.jsonl b/edge/graph_2077573.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207757558.jsonl b/edge/graph_207757558.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207757741.jsonl b/edge/graph_207757741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..164051c5d10bca3df0282cea8e001556f3042c8c --- /dev/null +++ b/edge/graph_207757741.jsonl @@ -0,0 +1,2 @@ +{"56172294|18803401": []} +{"33741214|60779308": ["Hu-moments [27][28][29] are seven moments invariant to rotation."]} diff --git a/edge/graph_207757789.jsonl b/edge/graph_207757789.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d3e14c214525235fe260140f79ea8ab9933e4ae2 --- /dev/null +++ b/edge/graph_207757789.jsonl @@ -0,0 +1,3 @@ +{"5952553|386036": ["In order to improve the efficiency of record linkage, blocking is generally in use according to [34]."]} +{"2528525|3241708": []} +{"46889096|11853471": []} diff --git a/edge/graph_207758761.jsonl b/edge/graph_207758761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207780460.jsonl b/edge/graph_207780460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00d3238ec10ca8c5a99729f5f6230d9ddbfb6771 --- /dev/null +++ b/edge/graph_207780460.jsonl @@ -0,0 +1,3 @@ +{"875392|9907884": ["\u2026has a good tradeoff between the amount of shown information and comprehensibility: a simple list of key-words only uses one degree of freedom and does not show keyword relationships, whereas higher than two-dimensional visualizations could make interaction with the visualization more dif\ufb01cult [3]."]} +{"6349784|9907884": ["The map uses a polar coordinate system and radial layout, thus focusing more on relations between keywords than their exact relevance weights, yielding a good tradeoff between the amount of shown information and comprehensibility: a simple list of keywords only uses one degree of freedom and does not show keyword relationships, whereas higher than two-dimensional visualizations could make interaction with the visualization more difficult [16]."]} +{"53045106|9907884": ["A simple list of keywords would only use one degree of freedom and would not show keyword relationships, whereas higher than two-dimensional visualizations could make interaction with the visualization more difficult [37]."]} diff --git a/graph_2077840.jsonl b/edge/graph_2077840.jsonl similarity index 100% rename from graph_2077840.jsonl rename to edge/graph_2077840.jsonl diff --git a/edge/graph_207795835.jsonl b/edge/graph_207795835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68c16720508cd09d128718d3b59a9d136a8f760d --- /dev/null +++ b/edge/graph_207795835.jsonl @@ -0,0 +1,3 @@ +{"44416731|18977370": ["Examples include chemometrics, where the target spectrum of a pure compound might be adulterated by a wide range of unknown contaminants [1]; video surveillance, where normal patterns of motion are captured using spatiotemporal gradients or optical flow models, and diverse anomalous behavior patterns stand out due to unusual temporal transitions [2,3]; and network intrusion detection, where baseline network behavior may be impacted by a constantly evolving (and thus difficult to characterize) series of threats [4]."]} +{"44416731|17574321": []} +{"44416731|192934": []} diff --git a/edge/graph_20780585.jsonl b/edge/graph_20780585.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207816731.jsonl b/edge/graph_207816731.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a569cbc7d524d58c5051aa4b3a3e92c551c18a6 --- /dev/null +++ b/edge/graph_207816731.jsonl @@ -0,0 +1,4 @@ +{"21291895|5835346": []} +{"21291895|38476": ["54 In this approach, during the training phase, a cross-validation process is carried out in order to obtain the predicted labels, which are joined with the original input features vector, taking into account a neighborhood around the examples."]} +{"2761249|1722293": ["Recent years have seen an active research field of unobtrusive cardiovascular monitoring especially using new generation of ballistocardiogram (BCG) sensors [1]."]} +{"199518502|1722293": ["Ballistocardiography provides a measure of the impact of ventricular ejection on the displacement of the entire body [18], which is inherently not portable.", "Its resurgence was motivated by advances in micro-electro-mechanical system (MEMS) based motion tracking technology that integrated the accelerometer and gyroscope into a miniaturized inertial measurement unit (IMU) [18].", "These cardiac-induced vibrations produce accelerations of the sternum that can be detected as a seismocardiography (SCG) [18] signal."]} diff --git a/edge/graph_207820683.jsonl b/edge/graph_207820683.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2668f3712035a3c08a1aa49ee6a6677885d2685 --- /dev/null +++ b/edge/graph_207820683.jsonl @@ -0,0 +1,2 @@ +{"11706409|18986679": []} +{"11706409|239537": ["For a review on the state of the art in graph visualization see Herman et al. (2000)."]} diff --git a/edge/graph_207821853.jsonl b/edge/graph_207821853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fa903ffbe87fea911f395398641134889fe861e --- /dev/null +++ b/edge/graph_207821853.jsonl @@ -0,0 +1 @@ +{"3404334|925507": ["Even in the emerging field of the Internet of Things (IoT), blockchain technology can be used in different scenarios and forms [15], [17], [24]\u2013[28]."]} diff --git a/edge/graph_207824945.jsonl b/edge/graph_207824945.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207826837.jsonl b/edge/graph_207826837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef5795b12b9dbb761a4c6e41d1b5352323f0f160 --- /dev/null +++ b/edge/graph_207826837.jsonl @@ -0,0 +1,27 @@ +{"148572699|17962754": []} +{"196112202|9240891": []} +{"56802372|51613885": []} +{"56802372|31245252": []} +{"56802372|17962754": ["Zhang et al. [59] state that trust computing for access control in an IoT network, Trust-Based Access Control (TBAC), is still relatively new but has been implemented successfully in commercial applications."]} +{"56802372|2829149": ["Due to the changing trends in security threats, [2] has suggested current security challenges according to the layer and the possible countermeasures.", "The survey papers [2\u20136] evaluate the possible threats to IoT systems according to the layers and the available countermeasures."]} +{"67264312|1599458": ["Finally, we cite the survey \u201c Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services \u201d [15], which presented the current IoT technologies, approaches, and models to \ufb01 nd out new data-related challenges."]} +{"67264312|16153186": ["In [152], the authors survey access control models in WSNs.", "Hence, other network entities, with limited authorizations, become unable to know the actual users \u2019 ID [152].", "11, we classify research activities in access control systems in a two-dimensional diagram as described in [152]."]} +{"67264312|3348390": ["In \u201c Context Aware Computing for The Internet of Things: A Survey \u201d [10], the authors proposed a context awareness for the IoT framework and gave a deep provided an in-depth analysis of the context life cycle (techniques, methods, models, functionalities, systems, applications, and middleware\u2026", "In recent years, many surveys were published to emphasize the advancement of research activities in the IoT framework [1,6 \u2013 10]."]} +{"67264312|14745481": ["In [91], Cho et al. surveyed trust management systems for Mobile Ad Hoc Networks.", "Cho et al. [91] detailed the concept of trust in many disciplines such as sociology, economics, philosophy, psychology, organizational management, autonomic computing, and communications and networking."]} +{"67264312|2906926": []} +{"67264312|9554464": ["Regarding aggregation of data collected by sensors, an important work can be found in [88], where Sang et al. proposed a method for securing data aggregation to extend the network lifetime, guaranteeing reliable data collection from sensors, and addressing a solution for node failure and healing."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"52184272|52248423": ["Standardization: the interoperability between the different IoT solutions call for well-defined IoT .", "IoT Standardization [44-48] The standardization efforts in the IoT domain are reviewed.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|29859741": ["Additionally, other innovative applications (e.g. healthcare, smart cars, etc.) will benefit from the fog computing emergence [126, 127]."]} +{"52184272|3757239": ["More recently, MEC solutions have been proposed in the 5G domain [135-137]."]} +{"52184272|6909107": ["Additionally, computation offloading is one of the main MEC challenges having processing and memory limitations [140-143]."]} +{"52184272|206578365": []} +{"52184272|8523192": ["Other issues are also encountered in the fog domain such as security and privacy, provisioning and resource management, offloading, charging and accounting, and QoS guarantees in terms of capacity, storage, bandwidth, connectivity, and reliability [130-133]."]} +{"52184272|9495329": ["SDN application in IoT [49-54] The SDN application at different IoT levels are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|1442447": ["SDN application in IoT [49-54] The SDN application at different IoT levels are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|31860478": ["In [122], the authors shed light on the relation between fog and cloud.", "\"Why Fog and Why Now?\u2016 delay, cognition, agility, and efficiency are defined to be the main reasons for the fog invocation [122]."]} +{"52184272|14315321": ["IoT frameworks [32-37] The different proposed IoT frameworks are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|2769147": ["Accordingly, it is important to show the distinction between these concepts in the aim to solve their specific problems and to allow their realization in the near future [78]."]} +{"63283745|14315321": []} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} diff --git a/edge/graph_207829110.jsonl b/edge/graph_207829110.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..301d461f928d2ac8ab761f256bdb2f8a5b829eca --- /dev/null +++ b/edge/graph_207829110.jsonl @@ -0,0 +1 @@ +{"3688254|3993284": ["However, they may be exposed to excessive current, thermal fatigue, these external forces may result in OCF and SCF [23].", "The OCF of the SEPIC is simulated by disconnecting the component from the main circuit, while the SCF is simulated by connecting the terminals of the components.", "Two types of hard faults are generally observed: short circuit fault (SCF) and open circuit fault (OCF).", "During the operation time, when electrolytic capacitors are submitted to current spikes and voltage surges, fault modes like dielectric breakdown and leads crack are very likely to occur, which eventually leads to OCF and SCF.", "A hybrid method based on two subsystems was proposed in [14] to diagnose both the OCF and SCF for non-isolated DC-DC converters."]} diff --git a/edge/graph_207848003.jsonl b/edge/graph_207848003.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..071018003f79f2dd6ffdacb54fd594df72e9506b --- /dev/null +++ b/edge/graph_207848003.jsonl @@ -0,0 +1,36 @@ +{"201132623|23893450": ["the real-time nature of a PMU communication implies that its unavailability through a cyberattack, such as a denial of service (DoS) or a distributed DoS attack, could lead to denied access to PMU measurement data for the transmission and generation system [21].", "PMUs and PDCs can be vulnerable to data fabrication from fictitious devices through data spoofing and man-in-the-middle (MiTM) attacks [21]."]} +{"195883618|56895323": ["Some PoS protocols where the leader is selected based on the header of the previous block are also vulnerable to grinding attacks [4].", ", bribe attacks, to perform double-spending attacks [4].", "Beyond cryptocurrencies, blockchain applications have also been emerging in various areas, such as finance, healthcare, military, and Internet-of-Things (IoT) networks [4].", "While 51% attacks might not be a serious problem for large blockchain networks, the newly established networks with small and limited total computational power are especially vulnerable [4]."]} +{"61811192|4111957": ["Security threats to machine learning techniques specifically can be found in [187]."]} +{"61811192|579475": ["An IoT integrated SG is a cyber-physical system [28], which makes it prone to cyberattacks."]} +{"61811192|5747564": ["Threat to the security of this complex network is always very critical and sensitive as both the demand side and the supply side of power system are affected [188], [189]."]} +{"61811192|23893450": ["Threat to the security of this complex network is always very critical and sensitive as both the demand side and the supply side of power system are affected [188], [189]."]} +{"88495141|3757239": ["The interconnection-based setting makes energy service offerings varied, which involves a large number of distinct edge infrastructure or devices [1]\u2013[3]."]} +{"114762673|29060869": []} +{"114762673|17737221": []} +{"114762673|485843": []} +{"114762673|5747564": []} +{"114762673|121289": []} +{"202231530|51935081": []} +{"202231530|485843": []} +{"202231530|595093": ["For example, some applications need low latency, some necessitate high privacy protection, and so on, [38], [39]."]} +{"198330873|207209718": []} +{"102350779|53046901": []} +{"102350779|49574823": []} +{"102350779|3628110": []} +{"102350779|27262729": ["[57] surveyed security and privacy of Bitcoin.", "other hand, the weak trust model exposes public Blockchains to a wide variety of attacks, allowing adversaries to easily compromise the system [57].", "(4) Building on top of the prior work [45], [57], [61], for each attack class, we also explore the possible defense strategies that have been proposed to harden the security of Blockchains."]} +{"202893159|5605271": []} +{"202893159|121289": ["Parameter of Comparison SG Communication [3] EI Communication [21] Characteristics Information transmission Energy and information transmission Service objects Multi-source heterogeneous data Multiple distributed renewable energy and multi-source heterogeneous data Routing equipment Smart meters ER", "This has led to the emergence of the smart grid (SG) [2,3].", "Multiport Converter (MPC) and Power Line Communication In order to achieve the high degree of reuse and integration for SST-based ER, H. Guo [52] presented multiport converter-(MPC) and PLC-based ER.", "The information will be collected from smart meters, which are placed in residential homes, commercial buildings, and industries, through a communication media via, for example, WiFi, Zigbee, and SCADA systems [3].", "ENERGY ROUTER as Communication In PLC-based ER, the power line communication technique is used for information management and power transmission. bi-directional converter Controller Because of the employment of the PLC scheme, PLC-based ER is compact in size, and saves additional communication network investment.", "ENERGY ROUTER Communication 3 Furthermore, the PLC technique has a major drawback of no backups for communication."]} +{"117592344|31086789": ["related to RERs integration and need of storage devices for reliable operation of power system have been discussed in [152]."]} +{"117592344|12083425": []} +{"117592344|18037424": ["Smart grid technology is considered the best solution for the various problems of the power grids [13,14]."]} +{"116422191|49527603": ["hybrids that stand between public and private blockchains [44].", "detailed comparison of different algorithms can also be found in [15,44,46,47,56]."]} +{"67769525|49527603": ["It is practical and works in asynchronous environments [20,125].", "Tendermint is also a consensual mechanism based on the Byzantine general problem mentioned above [20,128].", "The application fields of the blockchain technology include finance, Internet of Things [19], public social services, reputation system, security and privacy, and so on [20]."]} +{"86850570|49527603": ["In order to ensure that all management hubs are trusted, some consensus algorithms must be applied to the architecture, such as Proof of Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT), etc. [19]."]} +{"86850570|2521001": ["requirements: confidentiality, integrity, and availability (CIA), which can be referred to as the CIA requirement [26]."]} +{"53235956|49574823": []} +{"195493228|31086789": ["To manage these transactions between consumers and prosumers participating within the smart grid in a centralized manner would likely to be very costly andwould require complex communication infrastructure [5]."]} +{"195493228|1420935": ["With the increase of microgrid and distributed generation, energy trading becomes a very hot topic for various researchers and industry leaders [46]."]} +{"150142208|925507": ["Blockchain technology has been researched and discussed for applications in coordinating energy trade [22\u201327], but the physical constraints of energy system operation are not considered generally, and instead, just the trading energy as idealized \ufb01nancial assets."]} +{"195427942|10440280": ["Flexible Resources Optimization Techniques Microgrid Operational Mode DR ESS Islanded Grid-Connected [6] 3 3 3 3 3 [7] 3 3 3 3 3 [8] 3 3 3 [9] 3 3 3 [10] 3 3 3 3 [11] 3 3 3 [12] 3 3 3 [13] 3 3 3 3"]} +{"10184200|14171067": ["In computational science, the matrix dimension n can grow up to Billions [57], [36], [7], [28], and thus a petaflops machine may take several months to solve the matrix product, which may serve as an PoX for cryptocurrencies.", "The choice behind matrixbased problems is two-fold: (1) matrices have interesting composability properties that help in tuning difficulty, collaborative verification, and pool-mining (see later); and (2) matrix-based problems span a wide range of useful real world problems, being a principle abstraction for most scientific computation problems, among them: DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15],", ") as in DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15], [2], collaborative-filtering recommendation, data mining [28], computational geometry [19],"]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} diff --git a/edge/graph_207848033.jsonl b/edge/graph_207848033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24fa27a93054c871b1a28cc78a498e66d086383a --- /dev/null +++ b/edge/graph_207848033.jsonl @@ -0,0 +1,45 @@ +{"2560441|10996225": ["Contemporary machine learning algorithms provide the potential to improve scalability and offer high \ufb02exibility regarding the features employed during the classi\ufb01cation of malware into families ( Dash et al., 2016; Gandotra, Bansal, & Sofat, 2014 )."]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"4111957|14258620": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"10242377|8533795": []} +{"53304118|9928823": []} +{"53304118|393948": []} +{"43984407|16096875": ["ddresses, telephone numbers, and other privacy information [7]. This paper focuses on the most frequent types of webbased code-injection attacks in 2015 [5], namely, Cross-Site Scripting (XSS) attack [8], SQLI attack, Directory Traversal (DT) [5], and Remote File Inclusion (RFI) [5], respectively accounting for 49.09%, 28.32%, 9.82% and 8.92% of the entire web attacks. Attack vectors of these attacks"]} +{"51929141|3536399": []} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"19772255|12252805": ["Regarding the literature [5] attacks detection considered as classification problem because the target is to clarify whether the packet either normal or attack packet."]} +{"3670018|2340740": ["For a comprehensive review on Malicious URL Detection using Machine Learning, see [33].", "Various types of feature have been considered, including lexical features, hostbased features, content features, and even context and popularity features [33].", "To address these limitations, there have been several attempts to solve this problem through the use of machine learning [33]."]} diff --git a/edge/graph_207852684.jsonl b/edge/graph_207852684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fcd6a9c3e5973fe12ffc0ae5a772286bba225a7 --- /dev/null +++ b/edge/graph_207852684.jsonl @@ -0,0 +1,16 @@ +{"52155776|206578365": ["Particularly, the network virtualization architecture recently standardized by 3GPP is able to support edge learning on top of edge computing [3]."]} +{"4883014|6909107": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [3], [4], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"4883014|10299098": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [3], [4], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"83458658|206578365": ["eless operators to develop technologies for deploying machine learning on the (network) edge giving rise to a new platform for supporting intelligent applications, called edge learning (see e.g., [1]\u2013[3]). This trend aims at leveraging enormous real-time data generated by billions of edge devices to train AI models. In return, downloading the learnt intelligence onto the devices will enable them to r", ". Zhang is with the Dept. of Electronic and Computer Engineering at the Hong Kong University of Science and Technology, Hong Kong. Email: eejzhang@ust.hk. for implementing edge computing and learning [3].From the research perspective, edge learning crosses two disciplines, wireless communication and machine learning, and thus brings many new research challenges. Tackling such challenges by cross-disc"]} +{"165163986|3273340": ["Interested readers are encouraged to refer to the recent monograph [114] for more comprehensive discussions about recent advancements on hardware acceleration for DNN processing."]} +{"165163986|206578365": ["Essentially, the physical proximity between the computing and information-generation sources promises several benefits compared to the traditional cloud-based computing paradigm, including low latency, energy efficiency, privacy protection, reduced bandwidth consumption, on-premises, and context awareness [6], [8]."]} +{"3499915|7366975": ["for which not even the capacity is known [31]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} diff --git a/edge/graph_207853073.jsonl b/edge/graph_207853073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35034f7b2d7102ae3d98f23e99dbdedc001860b9 --- /dev/null +++ b/edge/graph_207853073.jsonl @@ -0,0 +1,6 @@ +{"4897677|7665100": ["The idea behind close direct interaction is to eliminate weaknesses of one partner by compensating for them with the strength of the other partner [19], for example, high adaptability of humans with the power of robots [20, 21]."]} +{"16618285|118142": ["All rights reserved."]} +{"3963636|6327434": ["Willsky [33] provides an early review of methods to detect and diagnose changes in the evolution of a system from its expected behavior, where the expected behavior can be specified as following a particular parametrized dynamic model (Barai and Pandey [5], Salawu [28], De Luca and Mattone [10]) or data-driven model (Tax et al.", "Willsky (1976) provides an early review of methods to detect and diagnose changes in the evolution of a system from its expected behavior, where the expected behavior can be specified as following a particular parametrized dynamic model (Barai and Pandey, 1995; De Luca and Mattone, 2005; Salawu,\u2026"]} +{"205009104|4019175": ["Inspired by the works in [20,21] and then following the guidelines in [22\u201324], we proposed awhole control strategy with biomimetic object impedance for dual-arm system."]} +{"207168200|1708582": ["Between the late 1980\u2019s and the mid-1990\u2019s, ideas from psychology (like Pavlovian and instrumental conditioning), optimal control and economics gave birth to the field of Reinforcement Learning (Sutton, 1988; Barto et al., 1989; Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996; Sutton & Barto, 1998), a sub-area of Artificial Intelligence.", "An Object-Oriented Representation for Ef.cient Reinforcement Learning Carlos Diuk CDIUK@CS.RUTGERS.EDU \nAndre Cohen ACOHEN@CS.RUTGERS.EDU Michael L. Littman MLITTMAN@CS.RUTGERS.EDU RL3 Laboratory, Department \nof Computer Science, Rutgers University, Piscataway, NJ USA Abstract Rich representations in reinforcement \nlearning have been studied for the purpose of enabling generalization and making learning feasible in \nlarge state spaces.", "Our representation has multiple connections with \nother for\u00admalisms proposed in the Relational Reinforcement Learn\u00ading literature (van Otterlo, 2005), \nbut emphasizes simplic\u00adity and tractability over expressive power."]} +{"52879883|14561706": []} diff --git a/edge/graph_207863315.jsonl b/edge/graph_207863315.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43cb4ffe47e0b74f31670b9ba35073be225c056e --- /dev/null +++ b/edge/graph_207863315.jsonl @@ -0,0 +1,34 @@ +{"41751187|14433834": ["Mobile Augmented Reality (MAR) is the research area that deals with the class of problems of supplement the reality of mobile users with virtual objects [20, 23, 26]."]} +{"202159084|7306130": []} +{"18375611|14433834": ["Mobile Augmented reality (MAR) is the research area that deals with the class of problems of supplement the reality of mobile users with virtual objects [9, 13, 17]."]} +{"23288279|9270553": []} +{"1119376|4668902": ["[283], Mittal [284], and Han and Orshansky [285] describe the reasons behind approximate computing and explore the current approximation techniques in hardware and software."]} +{"1119376|469744": ["[9], who examined the impact of an augmented reality system"]} +{"1119376|17024419": []} +{"202159263|93899": ["Towards new HCI paradigms: Augmented and virtual reality (AR/VR) and wearable technologies, alongside with human body augmentation and prosthesis challenged the most classical input/output models of human-computer interaction [11, 28]."]} +{"202159263|2895124": ["Brain-Computer Interfaces (BCIs) as one of many ways to meet this challenge not only are enabling paralysed people to interact with the world [8] but also are deployed in gaming and entertainment [1]."]} +{"202159263|14866098": ["Brain-Computer Interfaces (BCIs) as one of many ways to meet this challenge not only are enabling paralysed people to interact with the world [8] but also are deployed in gaming and entertainment [1]."]} +{"91187177|1262156": ["Accurate and continuous monitoring of their rotational movement is critical for physical rehabilitation [6, 85], motion training/coaching [22, 54, 68], sports analytics [48], human-robot or human-computer interactions [20, 47]."]} +{"150118688|700123": [", photovoltaic cells [3] or piezoelectric materials [4]), antennas [5], advanced textiles for self-heating and cooling [6], and even fashion applications [7]."]} +{"150118688|2528314": []} +{"4032323|29313707": []} +{"49866625|16362395": ["[67].", "ever, in pursuit of increasing degrees of freedom, the majority of developers used multiclass classifiers to map complex MI tasks11 into several output control commands for the aircraft [65], [67].", "classifiers, neural networks, nearest neighbor classifiers, and any combination of these classifiers [67]."]} +{"49866625|5503545": []} +{"155475291|1119376": ["Most AR glasses allow seeing both the real and virtual scenes at once during the inspection because their display is semitransparent and semire\ufb02exive (optical see-through devices [4]).", "Chatzopoulos et al. [4] provided a survey of mobile AR regarding the applications, its main components, and the challenges faced currently."]} +{"155475291|9270553": ["Historically, most BCI research studies focused on helping people with motor disabilities by providing an alternative communication channel [10], [11]."]} +{"155475291|469744": ["A UGMENTED reality (AR) is a technology for overlapping the computer-generated perceptual information with actual world, in order to enhance human perception of the surrounding environment [1]\u2013[3]."]} +{"93899|30785863": ["Interestingly, we discover that the research efforts of vision-based approaches for text input systems are commonly regarded as sign languages [38], which is deliberately designed for people with special needs.", "A systematic literature review showing the development of mid-air hand gestures refers to [38].", "wrist band) or embedded sensors in smart glasses can capture the user\u2019s gestures such as drawing a stroke, circle, square, or triangle [38]."]} +{"93899|17024419": ["This combination of virtual 2D and 3D contents can be regarded as hybrid user interface [103].", "Designing an unobtrusive interaction technique for smart glasses can encourage people to use smart glasses in public area [103].", "As augmented reality owns the prominent features of the integration of virtual contents with the physical environment, hand gesture shows its intuitiveness and convenience in the environment [103]."]} +{"5014437|9270553": ["To evaluate the performance of the new proposed BCI system, this study investigated the information transfer rate [3], which is defined as"]} +{"850415|93899": ["We can see examples in commercial devices such as Oculus Rift controller(6) or on-body wearable devices [77] (see Figure 1(c)."]} +{"850415|1119376": []} +{"850415|469744": []} +{"32773677|12127373": []} +{"26164254|14866098": ["An important attribute of spatial filtering [2] is to reduce the number of channels on the scalp and at the same time retain all the information needed for the classification.", "Noise is a key factor [2] in EEG signals."]} +{"85542215|9470480": ["Comparison to Previous Work Although the combination of EEG, EOG, and EMG modes in an mHMI is promising, there are very few BCI systems that have implemented this approach (Hong and Khan, 2017)."]} +{"85542215|5503545": ["EOG signals have good stability and larger potentials than EEG. EOG can be applied to BCI at quite low cost and provides good accuracy, so this is another potentially useful method for controlling robotic prostheses.", "Overall, this comparison demonstrates clearly that our novel mHMI shows little similarity with other recent hybrid BCI systems with the capacity to control external devices for rehabilitation from a combination of three or more signals.", "The aim of mMHI combining two or more user modes such as eye movements, hand gestures, and motor imagery in a coordinated approach is to increase the number of instructions and enhance classification accuracy, reduce errors, and overcome the specific disadvantages of each individual mode of BCI (Amiri et al., 2013; Zhang et al., 2016).", "BCI have the potential to provide an assistive technology that converts brain activity into commands communicating with a user\u2019s intent to control robot-assisted system that promote the neural plasticity required for recovery of function after stroke (Wolpaw et al., 2002).", "There have also been some proposals for simple switches and motion sensors in hybrid EEG\u2013EOG based BCI (Lalitharatne et al., 2013).", "Each of these traditional singlemode BCI systems based on EEG, EOG, or EMG has its own disadvantages hindering further development.", "Although the combination of EEG, EOG, and EMG modes in an mHMI is promising, there are very few BCI systems that have implemented this approach (Hong and Khan, 2017).", "However, it is often difficult for BCI systems to provide\nthe variety of control commands necessary for multi-task real-time control of soft robot\nnaturally.", "Fortunately, clinical trials of BCI rehabilitation therapy can detect the MI of patients to facilitate motor functional recovery (Ang and Guan, 2017).", "The method combining hybrid BCI and robot-assisted therapy is more effective to recover from stroke help activate brain plasticity than single traditional rehabilitation therapy (Dipietro et al., 2005; Ang et al., 2015).", "13:7. doi: 10.3389/fnbot.2019.00007\nAn EEG/EMG/EOG-Based Multimodal Human-Machine Interface to Real-Time Control of a Soft Robot Hand Jinhua Zhang 1, Baozeng Wang 1, Cheng Zhang 1, Yanqing Xiao 2* and Michael Yu Wang 1,3\n1 Key Laboratory of Education Ministry for Modern Design and Rotor-Bearing System, School of Mechanical Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China, 2 School of Biological Science and Medical Engineering, Beihang University, Beijing, China, 3Departments of Mechanical and Aerospace Engineering and Electronic and Computer Engineering, HKUST Robotics Institute, Hong Kong University of Science and Technology, Kowloon, Hong Kong\nBrain-computer interface (BCI) technology shows potential for application to motor\nrehabilitation therapies that use neural plasticity to restore motor function and improve\nquality of life of stroke survivors.", "Furthermore, the process of rehabilitation training is inadequate in that it does not deal with Brain\u2013computer interfaces (BCI).", "In order to make use of the respective advantages of the different types of BCI, it is possible to combine different modes in an approach called multimodal HMI (mHMI) (Allison et al., 2010).", "The online result of hybrid HMI based on EMG and EOG is 43.3 bits/min (Buchwald and Jukiewicz, 2017), and the ITR of new hybrid EEG-EMG-BCI system is 18.43 bits/min in the process of writing some English letters with a robot arm (Gao et al., 2017)."]} +{"52270511|4853233": ["Recent developed techniques such as deep neural networks [8] could represent a promising solu-tion to develop more robust decoding algorithms [7].", "We wish to emphasize that those feature extraction methods have been advocated by BCI researchers in [7].", "Aside from that, it would be important to include channel selection techniques [57] as well as other classification methods to the toolbox, such as Riemannian geometry-based classification [58] and restricted Boltzmann machines [59], which have been advocated by BCI researchers [7].", "Despite the successful multidimensional EEG-based BCI control achieved using simple classifiers [3, 6], reliable decoding of complex movements from brain signals is still challenging and requires advanced algorithms [7]."]} +{"54791528|16362395": ["The samples are drawn with replacement [50].", "Every node shows the most informative feature among other features, and this can be calculated by using information gain (entropy)[50].", "The most common features are Power Spectral Density (PSD) values, Auto Regressive (AR) parameters, and time domain features such as Zero crossing (ZC), Mean absolute value (MAV), Slope sign change (SSC) and Waveform Length (WL) [50].", "KNearest Neighbor will produce non-linear decision boundaries because of its ability to approximate any functions [50].", "Also, the regularization parameter C enables outliers accommodation and allows errors on the training set [50, 43].", "Supervised algorithm vary from simple algorithms like linear classifier and Naive Bayes classifier to more complex classifiers such as support vector machine or neural networks [50]."]} +{"15133376|12127373": ["Research has been conducted using physiological signals to detect drowsiness, such as electrocardiogram (ECG), electromyogram (EMG), electroencephalogram (EEG) and electrooculogram (EOG) [5]."]} +{"29313707|2916525": ["fMRI is the de-facto standard in neuroimaging and has been instrumental in a variety of studies investigating speech and language, for reference, see [40] for a review."]} +{"4508288|9270553": ["The commonly used ITR was introduced by Wolpaw in [9], originally presented much earlier, as discussed in [10]."]} diff --git a/edge/graph_207863656.jsonl b/edge/graph_207863656.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91ebed7c19b678632b784af79d8140587ae30e40 --- /dev/null +++ b/edge/graph_207863656.jsonl @@ -0,0 +1,7 @@ +{"21501677|485843": ["Table 2 lists the communication reliability requirements for various smart grid applications [23]."]} +{"13944155|17713112": ["In addition, a recent survey indicates that about 25% of current WSN deployments [17] only use one-hop wireless communication."]} +{"2399244|121289": ["I. INTRODUCTION\nThe need for energy conservation and environmental compliance has driven governments and utility industry over the world to transform their existing electrical grid into smart electrical grid or shortly \u201dsmart grid\u201d [1]."]} +{"8093921|44461432": ["These research works ([13\u201320]) focus on existing application examples of different data science approaches to specific wireless networks.", "Furthermore, related work such as [13\u201316] provide a comprehensive overview of generic data mining techniques and/or research studies that successfully applied those techniques to wireless sensor networks (WSN) and Internet of Things (IoT) networks."]} +{"8093921|1489715": ["These research works ([13\u201320]) focus on existing application examples of different data science approaches to specific wireless networks.", "Furthermore, related work such as [13\u201316] provide a comprehensive overview of generic data mining techniques and/or research studies that successfully applied those techniques to wireless sensor networks (WSN) and Internet of Things (IoT) networks."]} +{"8093921|7774517": []} +{"8093921|191396": ["For a more exhaustive list of clustering algorithms and their explanation we refer the reader to [111]."]} diff --git a/edge/graph_207863751.jsonl b/edge/graph_207863751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb73ae8bbd058fbf513ca48a941c3e8988ee5f89 --- /dev/null +++ b/edge/graph_207863751.jsonl @@ -0,0 +1 @@ +{"9234833|16534280": ["In QA systems for document collections (Voorhees, 2001; Pasca, 2003; Harabagiu & Moldovan, 2003; Molla\u0301 & Vicedo, 2007), a question may be phrased differently than in a document that contains the answer, and taking such variations into account can improve system performance significantly\u2026"]} diff --git a/edge/graph_207870780.jsonl b/edge/graph_207870780.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de78c36c3dff7721a8ccc852a82161adbf5df351 --- /dev/null +++ b/edge/graph_207870780.jsonl @@ -0,0 +1 @@ +{"207780486|207870780": []} diff --git a/edge/graph_207870984.jsonl b/edge/graph_207870984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dde4695c4ad71f2033b8588eec7b740dd361954f --- /dev/null +++ b/edge/graph_207870984.jsonl @@ -0,0 +1,4 @@ +{"12845103|122255": ["More info on network clustering can be found in several review articles (Chakraborty et al., 2016; Coscia et al., 2011; Fortunato, 2010; Malliaros and Vazirgiannis, 2013; Newman, 2012; Parthasarathy et al., 2011; Porter et al., 2009; Schaeffer, 2007; Xie et al., 2013)."]} +{"10187964|8854215": []} +{"198145564|10390713": ["As the size of electrical networks increases, the electrical networks are becoming one of complex artificial networks and have some universal topological features with other complex networks [11], such as communication network."]} +{"59222003|10390713": []} diff --git a/edge/graph_207880507.jsonl b/edge/graph_207880507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd1b15b4b27b431823b7c0b6cf56ce17aef82d3b --- /dev/null +++ b/edge/graph_207880507.jsonl @@ -0,0 +1,23 @@ +{"22850879|393948": ["Other methods known asDeep Learning deal with representation learning by automatically learning an hierarchy of increasingly complex features directly from data [24]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"206491372|2088679": ["Unsupervisedmachine learningmethods are also being researched, but the majority of the algorithms from 2015-2017 in the published literature have employed supervised learning methods, namely Convolutional Neural Networks (CNN) [4].", "Currently, CNNs are the most researched machine learning algorithms in medical image analysis [4].", "[4] provides a thorough list of papers published in the field, Shen et al."]} +{"206491372|3644401": []} +{"206491372|393948": ["The rationale behind this, is as Bengio states, for a given observation, only a small fraction of the possible factors are relevant, meaning that much of the features extracted from the data could be represented by being set to zero [34]."]} +{"8559923|14122909": ["Secondly, typical factors in ultrasound, including signal dropout, speckle noise, acoustic shadow and low contrast against surrounding tissues, cause the ambiguity, poor visibility and long-span occlusion in prostate boundaries (Noble and Boukerroui 2006)."]} +{"2088679|393948": []} +{"3306376|2088679": ["Deep neural networks have been extensively used in medical image analysis and have outperformed the conventional methods for specific tasks such as segmentation, classification and detection [1]."]} +{"18162999|14415030": ["The latter one is known as atlas-based segmentation where the a prior knowledge can be incorporated in both atlas construction (atlas size, orientation or shape) and atlas fitting procedure (energy function and optimization procedure)."]} +{"18162999|14122909": ["Index Terms\u2014Atlas-based image segmentation, medical image registration, atlas construction, statistical model, unbiased atlas selection, transformation, mappings, similarity measure, optimization algorithm, survey."]} +{"18162999|206051485": ["Further, we will discuss image registration."]} +{"247457|393948": []} +{"4742497|2088679": ["Recently, deep learning has emerged as a powerful technique for medical image analysis (Litjens et al., 2017; Shen et al., 2017; Ibragimov and Xing, 2017; Bibault et al., 2016; Esteva et al., 2017; Long et al., 2017)."]} +{"4742497|15059205": []} +{"2629186|9045232": ["Automatic detectors exist for several broad classes of objects, such as faces [22] or signs [20]."]} +{"52299947|2088679": ["processing areas such as segmentation of brain MRI images, optic disc segmentation, glaucoma screening, there are not a few studies on superpixel approach in digital histopathological images [6]\u2013[9]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_207888303.jsonl b/edge/graph_207888303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adc79c30a47e29b4f3010c842eea2ae3d5815c32 --- /dev/null +++ b/edge/graph_207888303.jsonl @@ -0,0 +1,24 @@ +{"59232007|2814871": []} +{"58670292|14814753": ["Human action has been actively researched in the computer vision field for decades and there have been several survey papers on this topic [10].", "Human action recognition has been actively researched in the field of computer vision for decades [10]."]} +{"52069887|2814871": ["A drawback of this type of system is that it can only be operated in special laboratories due to the complex setup and the need for calibrations before use [7]."]} +{"52825532|46924129": []} +{"12711115|7834819": ["Risk of falling [81], freezing of gait [84]\u2013[89], physical activity [33], and sleep disorders [90] are among the most relevant issues to tackle using"]} +{"3712973|11154506": ["In 1878, Edward Muybridge and Leland Stanford were the \ufb01rst ones to study the gait mechanism (Whittle 2014).", "To generalize the gait pattern over a larger set of population researches (Mahyuddin et al. 2012; Whittle 2014) collected data.", "Vision-based approach are used to recognize gait, segment position and gait phase detection as presented by Moeslund and Granum (2001), Whittle (2014), Aggarwal and Cai (1999), Poppe (2007), Moeslund et al. (2006), Little and Boyd (1998), Prakash et al. (2015a,c).", "Spatiotemporal, kinematic and kinetic parameters were considered in study in United States (Kadaba et al. 1990; Moisio et al. 2003; Whittle 2014).", "Whittle (2014) suggests that gait comparison makes more sense than walking comparison."]} +{"3712973|2814871": []} +{"3712973|5664472": ["Computational techniques and gait parameters can be used to control events in the enter-tainment industry through human-computer interfaces (Liu et al. 2007; Ke et al. 2013).", "4 Control based applications Computational techniques and gait parameters can be used to control events in the entertainment industry through human-computer interfaces (Liu et al. 2007; Ke et al. 2013)."]} +{"3712973|11042075": []} +{"3712973|1634674": ["Recently various computational techniques have been proposed to analyze actions, activities and behavior of crowd and individuals (Turaga et al. 2008; Kr\u00fcger et al. 2007; Hu et al. 2004)."]} +{"3712973|17516538": ["Recently various computational techniques have been proposed to analyze actions, activities and behavior of crowd and individuals (Turaga et al. 2008; Kr\u00fcger et al. 2007; Hu et al. 2004).", "From the video captured, through video camera either based on the model, appearance or hybrid approach can be used to analyze the features of the subjects (Lu et al. 2014; Hu et al. 2004)."]} +{"3712973|14970359": ["Vision-based approach are used to recognize gait, segment position and gait phase detection as presented by Moeslund and Granum (2001), Whittle (2014), Aggarwal and Cai (1999), Poppe (2007), Moeslund et al. (2006), Little and Boyd (1998), Prakash et al. (2015a,c)."]} +{"52902629|535786": ["[44] have discussed data mining or machine-learning techniques for extracting important information from the personalized devices such as mobile phone and wearable devices."]} +{"52902629|1734833": []} +{"20961510|6923178": []} +{"2611854|2814871": []} +{"15669657|2814871": ["The application discussed here is devoted to the use of MS Kinect as an alternative to treadmill walking in evaluating walking parameters and recognizing gait disorders [19, 20]."]} +{"15669657|11074234": ["Background Systems that enable human\u2013machine interactions [1, 2] and spatial modelling have a wide range of applications in modern engineering, robotics, and biomedical devices [3, 4]."]} +{"23973169|11042075": []} +{"19431417|2814871": []} +{"29506637|56979789": []} +{"53281347|2814871": []} +{"44142357|13881738": []} +{"206916496|7834819": ["In order to unobtrusively assess bradykinesia, a tri-axial accelerometer has been located at patient\u2019s waist since this position had been previously considered as one of the most comfortable ones [18] and, in addition to this, it ensures to cover most of the movements obtained during gait due to its closeness to the centre of mass of the human body."]} diff --git a/edge/graph_207888790.jsonl b/edge/graph_207888790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64a69751b32b5c0c8870ab33dd4bc24ff9f64c29 --- /dev/null +++ b/edge/graph_207888790.jsonl @@ -0,0 +1,85 @@ +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} +{"65256705|3932531": []} +{"65256705|11853471": []} +{"65256705|2134031": []} +{"4140014|4962939": ["In this paper, to address the above issues in CDSS, we propose a H ybrid P rivacy-Preserving C linical Decision Support S ystem in fog and cloud computing environment, called HPCS, and regard the challenge issues to be \ufb01ve-fold, namely: \u2022 Balance Real-time and High-accurate Classi\ufb01cation.", "Moreover, Rahu-lamathavan et al. [22] proposed a privacy-preserving CDSS using a Gaussian kernel-based support vector machine (SVM).", "Clinical Decision Support System (CDSS), with various data mining meth-ods being applied to assist physicians in diagnosing, has received great attention due to the prosperity of the new techniques, such as, Internet of Things (IoT) [1] [2], cloud computing [3] [4], and fog computing [5] [6], etc. \u201cThings\u201d, in the IoT sense, can refer to a wide variety of devices to collect the Personal Health Information (PHI).", "[23] gave a privacy-preserving CDSS scheme on Na\u00a8\u0131ve Bayesian classi\ufb01er to predict patient\u2019s disease.", "Recently, Neural Networks (NNs) [10], one of the high decision rate data mining tools, have been widely used to predict various diseases in CDSS [11,12].", "Due to its higher e\ufb03ciency, many privacy-preserving outsourced CDSS are designed.", "Although a number of privacy-preserving outsourced CDSSs are proposed, most of them can only support securely linear operations instead of some complex non-linear operations, such as Sigmoid and Softmax function which are usually contained in the neural networks.", "Recently, Neural Networks (NNs) [10], one of the high decision rate data mining tools, have been widely used to predict various diseases in CDSS [11] [12].", "Rahulamathavan et al. [22] constructed a privacy-preserving CDSS using Gaussian Kernel-Based Classi\ufb01-cation (GKC).", "Recently, Liu et al. [23] proposed a new privacy-preserving patient-centric CDSS on Na\u00a8\u0131ve Bayesian classi\ufb01er to diagnose the risk of patients disease in a privacy-preserving way."]} +{"25374274|8523192": ["Like Cloud systems, a Fog system is composed of Infrastructure, Platform, and Software-as-a-Service (IaaS, PaaS, and SaaS, respectively), along with the addition of Data services [12, 13]."]} +{"25374274|3374322": ["As many Fog systems are also deployed on smart-phones and tablets such as in BCI applications, they can become a source of malware infection [125]."]} +{"25374274|84832337": []} +{"35986198|21386749": []} +{"52123482|6909107": []} +{"52123482|7329149": []} +{"2134031|4427557": ["More recently, standards specifically dedicated to IoT communications, such as LoRa [107], NB-IoT [108], eMTC or other Low Power Wide Area Network (LPWAN) standards [109], support positioning of the nodes to a certain extent."]} +{"2134031|3348390": ["Within all the context sensing information, the location information plays important roles [5]."]} +{"9496996|12815020": []} +{"52195563|6583734": ["It is possible with the help of network function virtualization (NFV) [13] in the fog network, where\na fog node now has sufficient resource capacity to virtualize any network function, such as a firewall, an anti-virus, and an anti-phishing function.", "(BS) or an access point (AP) can support security services for mobile devices? It is possible with the help of network function virtualization (NFV) [13] in the fog network, where a fog node now has sufficient resource capacity to virtualize any network function, such as a firewall, an anti-virus, and an anti-phishing function."]} +{"38308345|17787193": []} +{"2282184|8523192": ["To summary, Edge computing [11]\u2013[13] is totally edgelocalized, however, fog computing extends the computing and communication resources towards edge of the network."]} +{"2282184|2756896": ["Location privacy, as discussed in [28], is one of the most important models for privacy, since the place of equipment can be linked to the owners."]} +{"2282184|3348390": ["As resources of EU\u2019s devices are shared among other geographically close devices to support context-aware services [63], [64], location, massive amount data and other information of EU need to be protected in very secure manner."]} +{"2282184|12815020": ["SCADA [65], cloud [66], smart grid [67] etc."]} +{"26801650|18388986": ["Following many studies on data fusion [39], [40], [41], we introduce an approach on how to mix QoS data and edge server data in this section."]} +{"49564949|206578486": ["Several reviews [7]\u2013[13] have been done on Fog computing.", "Mouradian et al. [13] reviewed Fog architecture and algorithms based on six different evaluation criteria, namely heterogeneity, QoS management, scalability, mobility, federation, and interoperability."]} +{"49564949|12675271": ["[11] reviewed the Fog computing domain from the platform perspectives of developers and end users towards building a sustainable sensing infrastructure for smart city applications."]} +{"49564949|8523192": []} +{"49564949|3767252": ["[141] addressed security and privacy for all edge-level computing."]} +{"86431350|8523192": ["In this case, the main requirements involve (1) real-time support to guarantee a high level of availability in case of faults or intermittent connectivity problems, (2) scalability to cope with large volumes of data transfer at variable rates without compromising performance, (3) infrastructure security to protect data both at rest in the cloud and in transit, (4) high availability (eg, reliability and resilience to reduce interruption), (5) least charges of transitioning and maintaining the cloud service, (6) dynamic provisioning to adapt to varying workloads and to cope with BAKER ET AL.", "Using sip helps in implementing three-level encryption: (1) adding more elements (ie, bytes) to the request via inserting the IP of the server (addBytes, line 8), (2) shifting the elements (shiftRows, line 9) by the size of sip;, and (3) mixing the elements of the massage via (mixColumns, line 10)."]} +{"86431350|2332366": ["Hence, we consider a specific scenario of adding and removing VMs and storage on a specific server on the cloud, and then, we monitor and compare the response time of adding and removing these resources under three scenarios: the proposed SeFoP approach, the MLAC approach,51 and the \u201cno security\u201d approach.", "Then, we ran another experiment to evaluate performance of SeFoP against MLAC when adding an extreme number of VMs (1000 VMs) all at the same time.", "The results from the experiments demonstrate a superior performance of the secure fog-based platform, which is around 2.8 seconds when adding five virtual machines (VMs), 3.2 seconds when adding 10 VMs, and 112 seconds when adding 1000 VMs, compared to the multilevel user access control platform.", "The total time needed to add 1000 VMs through SeFoP is around 112 seconds.", "In fact, as may be seen in Figure 5, when adding or removing cloud resources (VMs and storage in our case), the overall system performance improves with SeFoP compared to MLAC, and\nthis performance is remarkably comparable to that of a plain-text solution approach (ie, with no security features).", "Our results, as shown in Figure 7, illustrate that compared to MLAC, the performance gain brought by SeFoP is around 2.8 seconds when adding five VMs and 3.2 seconds when adding 10 VMs, and it is less than 7 seconds in other instances.", "For this purpose, we, first, ran multiple simulations that involve an increasing number of VMs (5-50) and measured the overall performance with and without SeFoP."]} +{"49557547|29859741": ["[79] review and discuss the usage of fog computing in healthcare."]} +{"49557547|1353379": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|3757239": ["A detailed discussion on the mobile edge can be found in [48]."]} +{"49557547|4427557": ["Other standards proposed by various researchers can be found in [62], [65], and [66].", "These features make LPWAN a suitable candidate for a large number of healthcare applications that do not require significant data rate and low latency [65]."]} +{"49557547|86629084": []} +{"49557547|21386749": ["A survey on the use of IoT for healthcare can be found in [70]."]} +{"49557547|62658395": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|393948": ["A thorough discussion of deep learning is covered in [50]\u2013[52]."]} +{"49557547|13172512": ["DEEP LEARNING NETWORK TRAFFIC CLASSIFICATION (DLNTC) COMPONENT Traffic classification is fundamental for any network, especially mobile cloud networks for determining anomalies, for traffic prioritization over a limited bandwidth, to ensure Quality of Service (QoS) [128], [129]."]} +{"51808386|4943134": [", base stations) using its inbuilt capabilities of learning, analysis and decision making [3,15].", "Machine learning has also been successfully used in optical transmission systems and networks, as presented in a survey [15]."]} +{"115294136|25374274": []} +{"11145499|13172512": ["The main difference is that in Random Forest, only a subset of features are selected at random out of the total for split at each node, reducing correlation between trees.", "We compare the performance achieved by each single, first-level model to that achieved by the four proposed Super Learners (logistic regression, MVuniform, MVaccuracy and CART-based), the two bagging models (Bagging Tree and Random Forest), the AdaBoost tree learning model, and finally, the GML learning model.", "In the case of bagging, we consider two different flavors of the same algorithm: a Bagging Tree model, and a Random Forest [18].", "In particular, we select the following five standard, fully-supervised models [18]: (i) SVM with linear kernel - linear kernel is used to improve speed w.", "While bagging and boosting generally use the same type of model in all the different training steps (e.g., Random Forest), stacking aims at exploring the input data space through base models of different type.", "There are a couple of extensive surveys and papers on network measurement problems such as network anomaly detection [13], [14] including machine learning-based approaches [12], machine learning for network traffic classification [18] and network security [15], machine learning models for QoE modeling [20] and prediction [21], as well as machine learning for Internet path performance analysis [24], [25].", "The well known Random Forest model is an example of bagging ensemble learning."]} +{"12969851|4909423": ["Monitoring: The performance of learning models and produced knowledge patterns is monitored continuously through business intelligence (BI) dashboards and reporting tools (Larson & Chang, 2016)."]} +{"12969851|365692": []} +{"129943863|51613885": ["Apart from above-mentioned advantages, there are a few challenges associated with using blockchain in IoT domain [155,156]."]} +{"129943863|3628110": ["The blockchain is also prone to security hazards; the most common attacks are 51% and majority attacks [157,158]."]} +{"129943863|5385031": ["IoT systems can be deployed to remotely collect medical data (such as heart rate, physiological data, and blood pressure), and transmit these data to healthcare big data centers for storage and diagnosis [8,23]."]} +{"129943863|2332366": [", system stability, flexibility, fault tolerance and cost effectiveness, which may increase the interactivity and complexity [4]."]} +{"129943863|3767252": ["Furthermore, in some of fog-enabled systems, the core infrastructure is implemented by same party who manages these centers [16,67,68].", "The underlying core infrastructure, such as mobile core infrastructure or centralized services makes it easy to manage and register various services [16].", "The fog-based systems are heterogeneous in nature, which allows high speed wireless connections and technologies to work together [16,102].", "In this work, we classified fog architecture into three distinct layers, which is inline with the architecture proposed in [16], as shown in Figure 3:"]} +{"129943863|7681233": ["Different trust management schemes are adopted in [90,91] to analyze different trust management models."]} +{"129943863|925507": ["[156] discussed that pseudonyms still may be pursued.", "Apart from above-mentioned advantages, there are a few challenges associated with using blockchain in IoT domain [155,156].", "A literature review on applications of blockchain is presented in [156], mentioning the usability of blockchain in IoT domains."]} +{"86464517|49564949": ["Moreover, to the best of our knowledge, there is no standard 107 architecture for fog computing [19]."]} +{"86464517|25374274": []} +{"86464517|3543288": ["These devices can potentially cooperate and collaborate to provide diverse services like, for example, smart cities, smart communities, emergency response, smart metering, home automation, intelligent transportation system, and the Internet of connected vehicles [1,2] Interconnected IoT nodes generate a massive amount of data that are needed to be private and confidential."]} +{"86464517|8523192": ["However, in the cloud-based IoT applications, there remain unresolved issues such as the requirement of high capacity client access link, variable latency, lack of mobility support, and security and location-awareness [6,7].", "This approach reduces service latency, improves the Quality of Service (QoS), and provides a superior experience to end-users [7,9]."]} +{"86464517|3390598": ["Each thing possesses uniquely identifiable characteristics that are embedded in its computer system to interoperate with existing Internet infrastructure [19]."]} +{"49658911|2489034": []} +{"49658911|2623404": ["resources and network functionality to be virtualized and orchestrated in order to provide new services to users [4]."]} +{"53562432|21386749": ["monitoring, healthcare solutions using smartphones among others [8]."]} +{"37985560|2871699": []} +{"37985560|365692": ["The chosen methods have been: Multiple Linear Regression (MLR) [33], Regression Tree (RT) [34], Bagged Decision Tree (BDT) [35] and Artificial Neural Network (ANN) [36]."]} +{"30642788|51877788": ["[18] Arxiv 2018 282 ML applications in the internet of things \u2248 \u2248 \u221a \u221a"]} +{"30642788|3645740": ["[14] IEEE COMST 2017 269 ML in SONs \u2248 \u00d7 \u00d7 \u221a"]} +{"30642788|11381530": ["[17] ArXiv 2017 154 ML for Network Intrusion Detection \u2248 \u221a \u00d7 \u00d7"]} +{"30642788|8604408": ["with PGM and latent variable models forms a probabilistic frameworkwhere deep learning is used as a substrate formaking improved learning architecture for recommender systems, topic modeling, and control systems [105]."]} +{"30642788|9040432": ["With unsupervised ML, the pipe dream is that every algorithm for adjusting network parameters (be it, TCP congestion window or rerouting network traffic during peak time) will optimize itself in a self-organizing fashion according to the environment and application, user, and network Quality of Service (QoS) requirements and constraints [6]."]} +{"30642788|2142482": ["Unsupervised learning based applications of anomaly detection schemes for wireless personal area networks, wireless sensor networks, cyber-physical systems, and WLANs are surveyed in [212]."]} +{"30642788|2623404": ["SDN is applicable in a wide variety of areas ranging from enterprise networks, data centers, infrastructure based wireless access networks, optical networks to home and small businesses, each providing many future research opportunities [285].", "1) Software De\ufb01ned Networks: SDN is a disruptive new networking architecture that simpli\ufb01es network operating and managing tasks and provides infrastructural support for novel innovations by making the network programmable [285]."]} +{"30642788|9928823": ["a class of machine learning, where hierarchical architectures are used for unsupervised feature learning and these learned features are then used for classification and other related tasks [23]."]} +{"30642788|399542": ["References [232] and [233] suggested different measurable factors to determine the overall approximation of QoS such as error rates, bit rate, throughput, transmission delay, availability, jitters, etc."]} +{"30642788|2261490": ["\u2026CNN, being widely employed for computer vision applications, can be employed in computer networks for optimization of Quality of Experience (QoE) and Quality of Service (QoS) of multimedia content delivery over networks, which is an open research problem for next generation computer networks [48]."]} +{"30642788|7851743": ["most used unsupervised learning schemes utilized for parameter optimization and feature learning in SON [290].", "Application of ML techniques in SON has become a very important research area as it involves learning from the surroundings for intelligent decision-making and reliable communication [2].", "Application of different ML-based SON for heterogeneous networks is considered in [297], this paper also describes the unsupervised ANN, hidden Markov models and reinforcement learning techniques employed for better learning from the surroundings and adapting accordingly.", "Turkka et al. [281] used PCA for dimensionality reduction of drive test samples to detect cell outages autonomously in SON.", "Next generation network architectures such as Software de\ufb01ned Networks (SDN), Self Organizing Networks (SON), and Internet of Things (IoT) are expected to be the basis of future intelligent, adaptive, and dynamic networks [284].", "Dimensionality reduction techniques and tools have been utilized in all kinds of networks and we present some recent examples related to self-organizing networks (SONs) and software de\ufb01ned radios (SDRs).", "This subsection covers the recent applications of unsupervised ML techniques in SDNs, SONs, and IoTs.", "2) Self Organizing Networks: Self organizing networks (SON) is another new and popular research regime in networking, SON are inspired from the biological system which works in self organization and achieve the task by learning from the surrounding environment.", "As the connected network devices are growing exponentially, and the communication cell size has reduced to femtocells, the property of self-organization is becoming increasingly desirable [290].", "Moysen et al. [32] ANN Authors expressed ANN as a recommended system to learn the hierarchy of the output, which is later used in SON.", "PCA and clustering are the two mostly used unsupervised learning schemes utilized for parameter optimization and feature learning in SON where as reinforcement learning, fuzzy reinforcement learning, Q learning, double Q learning and deep reinforcement learning are the major schemes used for interacting with the environment [294].", "Feasibility of SON application in \ufb01fth generation (5G) of wireless communication is studied in [296] and the study shows that without (supervised as well as unsupervised) ML support, SON is not possible.", "Liao et al. [278] proposed a semi supervised learning scheme for anomaly detection in SON based on dimensionality reduction and fuzzy classi\ufb01cation technique.", "Zoha et al. [251] used multi-dimensional scaling (MDS), a dimensionality reduction scheme, as part of the preprocessing step for cell outage detection in SON.", "Game theory is another unsupervised learning approach used for designing self optimization and greedy self con\ufb01guration design of SON systems [298].", "Authors in [299] proposed an unsupervised ANN for link quality estimation of SON which outperformed simple moving average and exponentially weighted moving averages.", "Another data driven approach by Zoha et al. [280] also uses MDS for getting low dimensional embedding of target key point indicator vector as a preprocessing step to automatically detect cell outage in SON."]} +{"30642788|13172512": []} +{"30642788|191396": ["Clustering can be divided into three main types [68], namely hierarchical clustering, Bayesian clustering, and partitional clustering."]} +{"30642788|15707": ["Authors in [207] surveyed anomaly detection research from 2009 to 2014 and find out the unique algorithmic similarity for anomaly detection in Internet traffic: most of the algorithms studied have following sim-"]} +{"30642788|26690303": ["Network intrusion anomaly detection system (NIDS) based on K-means clustering are surveyed in [211]; this survey is unique as it provides distance and similarity measure of the intrusion detection and this perspective has not"]} +{"30642788|12815020": ["Another application of unsupervised intrusion detection system for clouds is surveyed in [210], where fuzzy logic based intrusion detection system using supervised and unsupervised"]} +{"52899540|5022650": []} +{"52899540|206578486": []} +{"52899540|3119314": []} +{"1431100|12187684": ["This realization has attracted numerous efforts that leveraged ML for performance and traffic load prediction, and QoE-QoS correlation for proactive and adaptive network performance management [10]."]} +{"59616279|206578486": []} +{"59616279|1598350": []} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} diff --git a/edge/graph_207889534.jsonl b/edge/graph_207889534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..142639c110b40b641056e3e2c7db28a695f8c4b6 --- /dev/null +++ b/edge/graph_207889534.jsonl @@ -0,0 +1 @@ +{"13320292|206051485": ["The existent approaches to image registration could be classified in two categories: feature based, and image based methods, Zitova & Flusser (2003)."]} diff --git a/edge/graph_207892039.jsonl b/edge/graph_207892039.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43fcf7f20a0753c2e1c9ef1ed46d6d01b7452ec8 --- /dev/null +++ b/edge/graph_207892039.jsonl @@ -0,0 +1,31 @@ +{"1153012|8928686": ["Index Terms\u2014Fall detection, activity recognition, channel state information (CSI), WiFi, phase difference\n\u00c7", "Falls not only bring a main threat to elders\u2019 health, they account for a large part of medical cost as well."]} +{"71152023|3249290": ["Localization schemes despite of being devicebased or device-free mostly adopt following localization methods: proximity based, triangulation based, fingerprinting based and dead reckoning techniques [74], [78], [79]."]} +{"71152023|27410217": ["DPSLAM also uses dynamic particles according to the size of spatial area covered by particle cloud (cloud of things [121]), to minimize the computation load indeed."]} +{"71152023|5476476": ["nologies which results in a limited range of this method [26], [67].", "distance between the target and beacons [26].", "Is often used for determining an objects location settled near a known location [26], [78].", "Hence, the estimated position will be within the intersection point of three circles around anchor nodes [26].", "accelerometer and gyroscope that has led to the emergence of Social Internet of Things(SIoT) [26]."]} +{"71152023|10089999": ["tion have been collected, a fingerprint database will be constructed [114]."]} +{"4063197|8928686": ["For a comprehensive survey on wearable/non-wearable technologies we refer the interested readers to the following publications [10\u201312]."]} +{"15799692|1113420": ["This idea is inspired by widely used context-aware approaches in automatic speech recognition [47]."]} +{"116879716|4570697": ["WiFi Signals, besides communication applications, are increasingly being used for sensing purposes due to their sensitivity to changes in the environment [9]."]} +{"16251944|206583375": []} +{"8254430|15782139": ["As pointed out in [7], standard segmentation methods from natural language processing [16] can be used to further improve the word segmentation accuracy."]} +{"116385590|3894151": []} +{"116385590|7834819": []} +{"116385590|20905429": []} +{"3418087|9862516": ["TR technique is a promising paradigm for future internet-of-things applications [8]."]} +{"6112539|17747015": ["Radio signals, notably Wi-Fi signals, have been recently exploited for sensing and recognizing human activities [12], [13]."]} +{"195738615|57825759": ["These systems exploit the variation of the received signal, time of flight (ToF), and Doppler effect to recognize human behaviors [14], [21], [22]."]} +{"195738615|4570697": ["[33] Y. Li, W. Wang, and Y. Jiang, \u2018\u2018Through wall human detection under small samples based on deep learning algorithm,\u2019\u2019 IEEE Access, vol. 6, pp. 65837\u201365844, 2018.", "References [75], [76], [78]\u2013[80] focus on behavior recognition frameworks, analyze signal processing methods, and present various applications.", "Among these surveys, Jiang [78] and Khalili [79] et al.", "Among these surveys, Jiang [78] and Khalili [79] et al. only introduce a few through-wall behavior recognition cases or applications.", "[78] H. Jiang, C. Cai, X. Ma, Y. Yang, and J. Liu, \u2018\u2018Smart home based on WiFi sensing: A survey,\u2019\u2019 IEEE Access, vol. 6, pp. 13317\u201313325, 2018.", "[43] W. Xi, J. Zhao, X.-Y. Li, K. Zhao, S. Tang, X. Liu, and Z. Jiang, \u2018\u2018Electronic frog eye: Counting crowd using WiFi,\u2019\u2019 in Proc."]} +{"195738615|14814753": ["[24] present an extensive review of human action recognition based on the video."]} +{"195738615|14116122": ["These promising sensing techniques enable us to achieve widespread human action sensing and activity monitoring, which increasingly expand sensing areas and implement several attractive applications [1]."]} +{"195738615|15178364": ["[25] first categorize human activities into the following groups including gestures, actions, behaviors, and interactions, and then provide their definition."]} +{"3968690|819377": ["3) Popular Category Detection Scheme: To detect the items in a popular category, we apply a Gaussian model based change point detection scheme from background detection in image processing [12]."]} +{"4876354|12675271": ["The survey [7] proposes a list of design and operation planes of an IoT platforms, and a classification of existing works according to that system."]} +{"4876354|1520906": []} +{"4570697|2357830": ["Systems that leverage biometric signatures [58] or user-owned RFID tag [59] are well-known technologies."]} +{"20531937|14650419": []} +{"57375769|4570697": ["In this paper, we extend and build on recent works such as [9-11] to provide a more comprehensive survey on"]} +{"57375769|16013270": ["Classical device-free systems cover for instance video [133, 134], infrared [135, 136], pressure [137], and ultrasound sensors [138, 139]."]} +{"57375769|17516538": []} +{"86486914|14116122": ["[22] provided a detailed review of recent and state-of-the-art research advances in the field of human activity classification."]} +{"53840886|7185733": ["As a nonverbal body language, gestures undoubtedly can play a very significant role when interacting with these devices, such as human robot interaction, human computer interaction, virtual reality, and sign language recognition [10, 11]."]} +{"5886631|8928686": ["Due to the limitations of the above-mentioned fall detection solutions, very few fall detection systems have been widely deployed in real home settings so far [8].", "Yu [5] and Natthapon et al. [8] reviewed the principles and approaches used in existing fall detection systems."]} diff --git a/edge/graph_207893492.jsonl b/edge/graph_207893492.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70043e9ae6e02e1a7910e1bd82b7b88b864c4f29 --- /dev/null +++ b/edge/graph_207893492.jsonl @@ -0,0 +1,14 @@ +{"53098726|207893492": []} +{"54464901|17221751": ["Another issue related to existing approaches is that the models learned for the recognition of affective states are subject independent even if it is well known that different persons can have pretty different spontaneous affective behaviors [18]."]} +{"54464901|14155142": ["Some useful contributions that also give an overview of the most important technologies for the education of people with autism can be found in [2] and [3]."]} +{"2472943|15219853": ["On the other hand, the main advantage of behavioural characteristics is their natural, usually unobtrusive method of data collection 14 ."]} +{"206919947|14155142": []} +{"54525699|207893492": []} +{"54525699|44147498": ["[48] reviewed wristband wearable devices for physiological monitoring, activity monitoring, and environmental monitoring."]} +{"4461304|27533715": ["Inter-rater reliability between the computer and human raters for timing of orienting to name was quantified with the consistency, average, two-way intra-class coefficient (ICC), with ICC above 0.75 considered excellent agreement (Hallgren, 2012)."]} +{"3079891|2355696": []} +{"6281465|1452734": ["Particularly promising to reach the goal of (social) intelligence in robots is the research direction of \u2018developmental robotics\u2019 (Lungarella et al. 2004)."]} +{"6281465|7360895": ["Socially situated robots are able to distinguish between other social agents and various objects in the environment (Fong et al. 2003)."]} +{"23470213|2355696": []} +{"14083601|7360895": []} +{"54556799|14405917": []} diff --git a/graph_2078950.jsonl b/edge/graph_2078950.jsonl similarity index 100% rename from graph_2078950.jsonl rename to edge/graph_2078950.jsonl diff --git a/edge/graph_207895483.jsonl b/edge/graph_207895483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27fff96ad0d87bfd749e50568ae5bf3aefbf8607 --- /dev/null +++ b/edge/graph_207895483.jsonl @@ -0,0 +1,10 @@ +{"201883700|9461213": ["Artificial intelligence (AI) is an advanced tool to tackle the challenge of big data when addressing the radio and computational resource allocation problems in 5G-enabled communication networks [14]."]} +{"204837023|21955893": ["The purpose of leveraging RL for the agent is to maximize the total reward by taking a series of actions when it interacts with the environment [39]."]} +{"145050396|26368310": []} +{"14290280|15064932": ["Dynamic restoration in GMPLS-based WSONs is a well-investigated topic that has been widely covered by theoretical, simulation, and experimental studies [15\u201317]."]} +{"56597621|15971774": ["Nevertheless, many of the benefits of the \u2018\u2018diversities\u2019\u2019 that are brought by MPP, such as load balancing, efficiency, higher throughput, context-aware services, anonymization for privacy [36]."]} +{"201129667|206578365": ["Some promising green MEC schemes are summarized in [2], such as energy-proportional MEC according to computation loads, geographical load balancing for MEC by considering network spatial diversities, and renewable MEC frameworks.", "An illustration of a MEC-enabled application [2]."]} +{"49565910|8914588": []} +{"53958589|4943134": ["Note that another recently published survey [33] proposes a very similar categorization of existing applications of artificial intelligence in optical networks."]} +{"53958589|1580493": ["At data plane, the Elastic Optical Network (EON) concept [12]\u2013[15] has emerged as a novel optical network architecture able to respond to the increased need of elasticity in allocating optical network resources."]} +{"53958589|13172512": ["Some applications of ML in different networking areas have already matched these expectations in areas such as intrusion detection [2], traffic classification [3], cognitive radios [4]."]} diff --git a/edge/graph_207896794.jsonl b/edge/graph_207896794.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207898689.jsonl b/edge/graph_207898689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11b59dbcf0368fa816c602b8eb86337d5a405adf --- /dev/null +++ b/edge/graph_207898689.jsonl @@ -0,0 +1,2 @@ +{"17891889|987239": ["We furthermore show how to derive and compute the step size of the GA-LMS."]} +{"124673729|11608263": ["So far, many OVR methods have been veri\ufb01ed to work well using various binary classi\ufb01ers, e.g., SVM [9,15,19,38], C4.5 [11,38], na\u00a8\u0131ve Bayes [38] and KNN [11,38].", "5 [11,38], n\u00e4\u0131ve Bayes [38] and KNN [11,38]."]} diff --git a/edge/graph_207901822.jsonl b/edge/graph_207901822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f63fb0cb521c7bb325da57364cb945eecc9739a6 --- /dev/null +++ b/edge/graph_207901822.jsonl @@ -0,0 +1,35 @@ +{"46179677|16629628": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"11961832|9862516": ["well as other characteristics of cellular, wireless local area network, and RFID technologies are much different from each other [20]."]} +{"58584294|52169887": ["Orion only stores the latest version of entity attributes and it needs to work together with other applications in order to maintain historical data."]} +{"164841995|21683864": []} +{"164841995|4427557": []} +{"191137964|1230643": []} +{"53440761|2134031": ["information and IoT enabled location-based service which are used for precision farming are exposed to attacks, such as device capture attack [109], [110], [112].", "have been discussed extensively in [106], [109], and [110]."]} +{"53440761|4427557": ["The LPWA makes use of low power and can cover wide area [24], [25]."]} +{"53440761|21386749": ["THE INTERNET of Things (IoT) has found its application in several areas, such as connected industry, smartcity [1], [2], smart-home [3] smart-energy, connected car [4], smart-agriculture [5], connected building and campus [6], health care [7], logistics [8], among other domains."]} +{"53440761|1598350": ["According to [116], interoperability can be achieved using three methods which are: 1) partnerships among product and service developers; 2) open and close standards, and 3) adap-"]} +{"45102219|485843": []} +{"45102219|5747564": ["Finally, if the SM is intended to be integrated into a network comprising a wide range of devices, it is necessary that they expose standard interfaces and data models [16,63]."]} +{"45102219|121289": []} +{"52845705|52883988": []} +{"54564511|21683864": []} +{"21683864|18167210": [", monitoring of farms, and irrigation processes are the main domains of IoT for cultivation [142].", "Tracking of Tracking of animals, monitoring of farms, and irrigation processes are the main domains of IoT for cultivation [142]."]} +{"21683864|4427557": ["Consequently, the cost [179] and the complexity of the agriculture WSN will be reduced and the lifetime will be increased."]} +{"21683864|206901977": ["BLE outperforms ZigBee in terms of power consumption, but this wireless protocol is limited in agricultural applications because of its short communication distance of 10 m, as reported in [48].", "Communication range [48,66] 100 m 10\u201350 m 10 m 100 m 1\u201310 km 5 km 10 km"]} +{"21683864|12060835": ["Numerous techniques have been developed to allow sensor nodes to harvest different types of energy, such as solar, wireless power transfer (WPT), mechanical vibration, kinetic, and wind energy, from different environments [110] (Figure 2)."]} +{"31381421|16335158": ["Sensor-cloud computing: sensor-cloud computing refers to the on-field WSN applications empowered with cloud computing (Ojha et al., 2014; Alamri et al., 2013; Zhu et al., 2014)."]} +{"31381421|1503157": ["Among all these technologies, the agriculture domain is mostly explored concerning the application of WSNs in improving the traditional methods of farming (ur Rehman et al., 2014; Zhao et al., 2013; Wang et al., 2006; Akyildiz et al., 2002a,b; Akyildiz and Kasimoglu, 2004; Yick et al., 2008; Ruiz-Garcia et al., 2009)."]} +{"31381421|1230643": []} +{"34837088|624120": []} +{"34837088|12974382": ["These tools are used together with remote sensing (Mucherino, et al., 2009) and are often combined, e.g. to use the image processing output as input to a machine learning model (Vibhute & Bodhe, 2012)."]} +{"24252308|1230643": []} +{"68241012|3348390": []} +{"41691880|21386749": ["\u2026IoT healthcare system aims at providing a remote monitoring of a patient health status in real time, the prevention of critical patient conditions, life quality improvement of the elderly through the smart environment, medical and drugs database administration, wellbeing services, etc. [44, 45]."]} +{"71715536|44461432": ["The IoT paradigm creates new opportunities for specialized small devices (sensors and actuators) while it also introduces new challenges for the storage and retrieval of large amounts of data and its meaningful visualization [6]."]} +{"20448743|13475127": []} +{"115367596|1230643": []} +{"1503157|2762484": ["In the next years, the lowering cost of WST will provide the opportunity to track and trace not only large and expensive products, but small and cheap ones, creating a new generation of intelligence products [92]."]} +{"1503157|6275330": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "strain-gage, and various piezo and capacitive transducers for proximity, position, velocity, acceleration and vibration measurements [20]; and according to several research works, connecting wires to these devices can be more problematic than doing it by means of wireless designs [21,22]."]} +{"1503157|1230643": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "A WSN is a system comprised of radio frequency (RF) transceivers, sensors, microcontrollers and power sources [10].", "A general WSN protocol consists of the application layer, transport layer, network layer, data link layer, physical layer, power management plane, mobility management plane and the task management plane [10].", "Normally, these sensor nodes consist of three components: sensing, processing and communicating [10].", "Sensor networks are used for a variety of applications, including wireless data acquisition, machine monitoring and maintenance, smart buildings and highways, environmental monitoring, site security, automated on-site tracking of expensive materials, safety management, and in many other areas [10].", "02 dB/km for a rain rate of 150 mm/hr [10]."]} diff --git a/edge/graph_207901906.jsonl b/edge/graph_207901906.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eaf9ace4ad1a0d95deb692ad8ebd6c10720d98db --- /dev/null +++ b/edge/graph_207901906.jsonl @@ -0,0 +1,12 @@ +{"206592484|456491": []} +{"5837127|10975328": ["ral visualization (for a survey, see Silva [26])."]} +{"14544742|13093354": []} +{"4835065|3524264": ["Location prediction for tweets can be described as estimating the geographical origin where a tweet is posted from [4, 6, 10]."]} +{"57375726|10290908": ["The proposed framework uses a temporal filter to identify the spikes within the word-pair signal to binarize the word-pair time series vector [20]."]} +{"45061869|36438802": []} +{"70243918|33250337": []} +{"70243918|1143625": []} +{"16600518|17323154": ["Nevertheless, the algorithm has been applied in textual web documents with great success [9, 44]."]} +{"61650822|15930299": ["The Dark Web is conformed by Virtual Communities of Interests (VCoI) [9, 16] are communities which members are reunited by their shared interests in a topic, like fan clubs of artists."]} +{"12748227|627405": ["\u2026of journal, workshop and conference proceedings published between 2005 and September 2013 in English; \u2022 Selection of multiple digital libraries with relevance to information research identi\ufb01ed by Brereton et al. (2007) and further supplemented with GIScience relevant digital libraries.", "The initial step consists of selecting eligible literature sources based on following criteria: \u2022 Consideration of journal, workshop and conference proceedings published between 2005 and September 2013 in English; \u2022 Selection of multiple digital libraries with relevance to information research identified by Brereton et al. (2007) and further supplemented with GIScience relevant digital libraries."]} +{"53039835|227061": ["3282831 use geolocated messages to monitor the earth for all types of disasters [2, 6]."]} diff --git a/edge/graph_207930098.jsonl b/edge/graph_207930098.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_207930214.jsonl b/edge/graph_207930214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1eac83ce357b459cf00af6958995a50bed635586 --- /dev/null +++ b/edge/graph_207930214.jsonl @@ -0,0 +1,4 @@ +{"24100971|6337591": ["Usually, they are represented by hybrid models that combine reinforcement learning with supervised learning (Henderson et al., 2008; Schatzmann et al., 2006)."]} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} +{"17473440|9588126": ["Such problems arise naturally in a variety of settings, such as multi-robot systems and sensor networks (Matari, 1997; Fox et al., 2000; Gerkey & Matari, 2004; Olfati-Saber et al., 2007; Cao et al., 2013)."]} +{"4737664|393948": ["However, we \ufb01nd that the agents struggle to produce structured messages when presented with entangled input data (Bengio et al., 2013) due to the dif\ufb01culty of uncovering the true factors of variation, corroborating the hypothesis of Smith et al. (2003) that structured (compositional) language is\u2026"]} diff --git a/edge/graph_207930285.jsonl b/edge/graph_207930285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7417183efb8bbd26a4f9d4e61cd9b97eae0cf063 --- /dev/null +++ b/edge/graph_207930285.jsonl @@ -0,0 +1,30 @@ +{"8821594|6857179": ["can be find in [8], [9], [10]."]} +{"18093536|17252389": ["We adopt the salient region detection technique to extract the figure from an image [7, 8]."]} +{"1033682|174797842": []} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} +{"37597096|15315731": []} +{"13906938|15273230": ["In contrast, AUC is less sensitive to imbalanced datasets (Chawla 2005); and therefore, it is a more appropriate evaluation measure to evaluate the performance for the sentiment prediction task, since the majority of uploaded images in social networks typically belong to the positive sentiment\u2026"]} +{"171095492|5943294": ["This is called the implicit approach [13]."]} +{"12688539|5943294": ["\u2026signals, spontaneous visual behavior is more convenient and unobtrusive to measure, although it is susceptible to environmental noise, such as lighting conditions, occlusion, etc. Recently, Soleymani and Pantic [5] have reviewed human-centered implicit tagging on images, videos, and search results.", "Unlike their survey, which lists all work together [5], we categorize current research into three groups based on adopted modalities: physiological signals, spontaneous visual behavior, and both.", "Previous reviews of this topic include the recent work by Soleymani and Pantic [5]."]} +{"12688539|6857179": ["Since emotions are complex and subjective, a small number of discrete categories may not re\ufb02ect the subtlety and complexity of the affective states [37]."]} +{"206455058|6387482": ["Furthermore, it is shown that the product rule is more suitable compared with other methods [35]."]} +{"29116801|15315731": ["Therefore, jointly combining them may promisingly improve the performance [10, 26, 27].", "With the wide-spread use of multimedia acquisition techniques and social media platforms, we might have multi-modal data to represent the same target [10], either from different sources [31] or with multiple features [40]."]} +{"29116801|14688441": ["Therefore, jointly combining them may promisingly improve the performance [10, 26, 27]."]} +{"26431628|393948": []} +{"52945380|10694510": ["Most of the latest works in sentiment and emotion analysis are based on deep learning architectures, with LSTM-based networks being the prevalent method for detecting sentiment [23], but with a number of successful attempts based on other types of RNNs, CNNs and, recently, the Transformer model (e."]} +{"206652056|5943294": ["Soleymani et al. [5] presented a method for implicit categorization of movie scenes in which affective response measurements were combined with stimulus video analysis.", "Implicit tagging has been applied to different problems from emotional tagging and preference detection to topic relevance assessment [5].", "For a detailed review on emotional analysis in videos, we refer the reader to [21], [4], [5].", "The different methods can be divided into two classes: implicit tagging, using passively observed information from the media and/or responses to it (methods 1 and 3), or explicit tagging (asking users to subjectively evaluate the affective content) [5] (method 2)."]} +{"149509872|15514398": []} +{"19491070|17221751": [", [24,25], conducting sentiment analysis by computer vision is a relatively recent area of research.", "through convolutional neural networks [22,23]; additional features include facial expression [24,25];"]} +{"20780812|10397481": []} +{"184488029|15361180": ["This simple and intuitive setup, which we refer to as injective instance embedding, is currently the most popular approach in the literature [53]."]} +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} +{"148665634|15315731": ["As different modal data and different features usually represent different aspects of the target, jointly combining them may promisingly improve the performance [62], [63].", "Meanwhile, in many realworld applications, we might have multi-modal data [62], [63] from different sources [55], [64], [65], [66], [67]."]} +{"148665634|6387482": ["As different modal data and different features usually represent different aspects of the target, jointly combining them may promisingly improve the performance [62], [63].", "Meanwhile, in many realworld applications, we might have multi-modal data [62], [63] from different sources [55], [64], [65], [66], [67]."]} +{"39888164|14688441": ["Conversely, social psychology studies have examined personality mainly via non-verbal social behavioral cues (see [6] for a review), but few works have modeled personality traits based on emotional behavior.", "A comprehensive survey of personality computing approaches is presented in [6]."]} +{"207199524|60779308": ["In contemporary computer vision literature [7, 20], there are a number of statistical representations of shape through characteristics like the straightness, sinuosity, linearity, circularity, elongation, orientation, symmetry, and the mass of a curve."]} +{"7937020|2301292": []} +{"51608000|6387482": ["We might have multi-modal data to describe a target [Atrey et al., 2010], either from different sources [D\u2019mello and Kory, 2015] or with multiple features (also called multi-view learning) [Gao et al.", "Jointly combining them together to explore the complementation may promisingly improve the performance [Atrey et al., 2010; D\u2019mello and Kory, 2015]."]} diff --git a/edge/graph_207935665.jsonl b/edge/graph_207935665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..09dad1dbcde50d877c1211259d6adb171699f95d --- /dev/null +++ b/edge/graph_207935665.jsonl @@ -0,0 +1,2 @@ +{"351032|9553820": []} +{"125598633|3489184": []} diff --git a/edge/graph_207944599.jsonl b/edge/graph_207944599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54d7f9cf8548de80a65110a7966146042abe54f9 --- /dev/null +++ b/edge/graph_207944599.jsonl @@ -0,0 +1,50 @@ +{"208125047|195832430": []} +{"208125047|49272228": []} +{"201236726|44129379": []} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"4884672|5605271": ["The EI system consists of some regional control centers, which include data acquisition control, power system operations, power market operations, data management operations and metering systems [9], [91], [154]."]} +{"4884672|8440916": ["[68] proposed to enhance EI communication using device-to-device (D2D) communications that establish direct transmission links between end-devices in cellular networks.", "[68] Propose a novel cellular technology called D2D communications in LTE standard."]} +{"4884672|512561": ["The idea of using CR in different application scenarios has been appeared for many years, such as WSN [152], D2D communications [153], and smart grid [156]."]} +{"4884672|29060869": ["[31] explored an energy-efficient communication architecture for smart grid, which includes Home Area Networks (HAN), Neighborhood Area Networks (NAN) and Wide Area Networks (WAN), based on wireless, wired and optical technologies."]} +{"4884672|2521001": ["[24] [25] [26] [146] [147] [27] [28] [29] [148] [159]", "There are several articles [24], [25], [26], [146], [147], [148] that survey the recent work about smart grid, but the achievements in EI communication are seldom summarized."]} +{"4884672|5747564": ["[24] [25] [26] [146] [147] [27] [28] [29] [148] [159]", "There are several articles [24], [25], [26], [146], [147], [148] that survey the recent work about smart grid, but the achievements in EI communication are seldom summarized.", "Many issues should be carefully considered, including security management, security policy and security technology [26]."]} +{"4884672|121289": ["[24] [25] [26] [146] [147] [27] [28] [29] [148] [159]", "There are several articles [24], [25], [26], [146], [147], [148] that survey the recent work about smart grid, but the achievements in EI communication are seldom summarized.", "Categories Internet communication [27] WSN communication [149] SG communication [24] EI communication [29]"]} +{"56895323|49527603": ["In [19], a brief summary of the emerging blockchain-based applications ranging from"]} +{"56895323|9461213": ["fields [221], [222], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secure Multi-Party Computation (MPC)."]} +{"56895323|27262729": ["A systematic survey is conducted in [20] with respect to the security in the Bitcoin network including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", "vacy [20] and quantitative analysis of smart contract performance [217].", ", Sybil attacks [41] and doublespending attacks [20]), node mistakes (e."]} +{"56895323|2457428": ["the security is a main concern. Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]. In [182], the authors present a framework for providing secure key management in VCSs, where the security managers are considered as blockchain miners which capture the vehicle departure information"]} +{"56895323|3434731": ["trusted virtual computers [6] for decentralized, transactiondriven resource management in communication networks and distributed autonomous systems [5], [7].", "In [7] and [16], two brief surveys on consensus protocols in blockchain networks are provided."]} +{"46927618|121289": ["Hence, a scalable and pervasive communication infrastructure is crucial in both data analytics and management of SG systems [5]."]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"25488796|30102381": ["According to [25] the interdisciplinary structure of smart grid requires heterogeneous test beds, each having specialized capability.", "[25] in their paper provide a detail overview of available test beds that are used for research related to smart grid architecture."]} +{"25488796|15545863": ["The local data processing power enables the gateway to be more suitable for real time data analysis [17]."]} +{"116422191|49527603": ["hybrids that stand between public and private blockchains [44].", "detailed comparison of different algorithms can also be found in [15,44,46,47,56]."]} +{"108449635|485843": []} +{"114077566|29060869": []} +{"114077566|35109549": []} +{"114077566|121289": []} +{"54919268|1420935": ["However, non-renewable energy sources are being depleted and becoming more expensive from time to time which indicates that the energy from these sources will not be able to support the increasing demand caused by a growing population [1].", "Several published papers discussed various aspects of P2P DET [1,30\u201333].", "RES cause less pollution and are also more economical than their counter parts as they reduce transmission cost [1].", "The authors in [1] provided a high level overview while not covering most recent research problems.", "Furthermore, energy trading also brings various bene\ufb01ts to utility companies such as increasing the overall ef\ufb01ciency of the grid and reducing operation cost [1]."]} +{"195832430|49574823": ["M2M connections cover a broad range of applications like smart cities, The associate editor coordinating the review of this manuscript and approving it for publication was Alberto Cano. smart environment, smart grids, smart retail, smart farming, etc. [3]."]} +{"195832430|29859741": []} +{"195832430|2134031": ["Authors of [11] have discussed the security issues specific to location-based services in IoT.", ", [11] security issues specific to location-based services in IoT"]} +{"195832430|31245252": ["Jie Lin et al. in [9] have discussed the relationship between IoT and fog computing."]} +{"195832430|2829149": ["Yuchen et al. [10] have summarized various security issues in IoT applications."]} +{"195832430|4663919": ["This may lead to the hijacking of the IoT network [40]."]} +{"195832430|3818445": ["In [8] the authors have compared edge computing with traditional cloud systems to secure IoT systems."]} +{"159436939|485843": ["Such knowledge can be provided by phasor measurement units, smart meters, and other sensor networks, all working together to prevent faults when possible or to allow timely reaction if needed (Fang et al., 2012; Gungor et al., 2013; Gao et al., 2012)."]} +{"159436939|595093": ["Sources of data on SGs include AMI, where smart meters collect data on consumers\u2019 consumption; the Distribution Network Automation System, which gathers data to allow concurrent control of the whole network; minor proprietary systems connected to the power grid comprising storage units, scattered energy surpluses, and electric appliances; and Asset Management, that provides data exchange between the remote center and other components connected to the system (Zhou et al., 2016; Diamantoulakis et al., 2015; Hern andez et al., 2013).", "SGs came to operation allying those substructures with the communication infrastructure and the advances of electronic parts for handling power control.", "This is why the main accomplishment of SGs is the use of AMI to measure, communicate, and analyze users consumption data.", "In order to shed light on the upcoming features and possible issues of smart meters in SGs, this work proposes a detailed review and evolution of smart energy meters and the main contributions are the following:\nReviews the current developments and deployments of smart energy meters; Analyzes the main capabilities and applications of smart energy meters; Discusses the prospects and requirements for interoperation of various energy networks and identify open issues for further research in the topic.", "Reaction to network faults is also a new ability granted to SGs by smart sensors.", "Moreover, such advances granted SGs additional functions (Palensky and Dietrich, 2011; Bharothu et al., 2014): home devices control and monitoring; bidirectional communication; management of demand and load; two-way metering and billing; discovery of system defects; data storage and management; power extortion detection; smart cities evolution; security improvement; and emission control (Bhaskara and Chowdhury, 2012; Kilbourne and Bender, 2010).", "SGs operation depend on the energy management system (EMS), along with its subsystems for monitoring.", "Alongwith IENs come Smart Grids (SGs), which propose to handle power supply and usage or consumption more efficiently by integrating communication and control capabilities to a system previously meant to only generate and distribute power.", "As previously stated, two-way communication is the main improvement of SMs over regularmeters, making SGs possible.", "Smart measurement in SGs is performed by the smart meters (SMs) and, in order to provide real-time energy consumption rates to users and providers, these devices must gather data on the instantaneous voltage, phase, and frequency for each customer's installations.", "PLCs are already used on SGs to create HANs with data rates of 20 kbps (Gungor et al., 2011).", "Some of these studies focus on attacks at the physical layer level, which is the most visible vulnerability of SGs (Wang and Lu, 2013; Yan et al., 2012; Bou-Harb et al., 2013; Bou-Harb et al., 2013, 2013; Liu et al., 2012; Finster and Baumgart, 2014).", "Roughly, SGs can be classified in three tiers: Home Area Networks (HANs), Neighborhood Area Networks (NANs), and Wide Area Networks (WANs), as depicted in Fig.", "Malicious access is a possibility, therefore simulated scenarios, research, and cyber warfare practices are part of the effort to make SGs safer.", "Therefore, several wired and wireless technologies are described below in order to attempt to reach a conclusion on the best technology available for SGs.", "Even though, theoretically, any known topology could be applied to SGs, the most common is the two-tiered stard groups of meters send data to a local concentrator which forwards them to servers via backhaul for storage and processing, as well as for billing purposes."]} +{"159436939|18037424": ["Even though plenty flexibility is added to smart meters by the use of modules, common add-ons are added for extra storage, alarms, and additional communication interfaces (Gungor et al., 2011; Gao et al., 2012).", "Such knowledge can be provided by phasor measurement units, smart meters, and other sensor networks, all working together to prevent faults when possible or to allow timely reaction if needed (Fang et al., 2012; Gungor et al., 2013; Gao et al., 2012)."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"54437855|18037424": ["These prominent advantages mean they have become the new trend for power grid construction, also bringing significant social benefits [1]\u2013[3]."]} +{"6294669|17905276": ["The interfacing layer is formed by a collection of the concentrator, Bluetooth, WiFi and relay node [43].", "Explicitly, each sensor node generally has a radio transceiver, a small microcontroller and an energy source [42,43].", "Bluetooth, wireless fidelity (WiFi) and relay [43].", "To this end, the sensing nodes must efficiently send data over long distances from the DER source to the base station [42,43]."]} +{"49411044|49574823": ["Detailed examples of these classes are illustrated in [24].", "Although the above-mentioned surveys [7], [24], [31], [32] have laid a solid foundation for blockchain technologies, our survey differs in several aspects.", "There are related survey papers [7], [24], [29]\u2013[32] that covered different aspects of the blockchain technology.", "Recently, the surveys [24] presented the overview of blockchain-based IoT (BIoT) applications."]} +{"49411044|3932531": ["[63] discussed the applicability of blockchain technology in an IDSs."]} +{"49411044|3628110": ["In Monero [74], users can include some chaff coins, called", "Although blockchains are one of the promising technologies for securing IoT application, but they suffer from the following vulnerabilities [74], [75]."]} +{"49411044|2014729": ["In the IoT era, 5G will enable a fully mobile and connected society for billions of connected objects [53]."]} +{"49411044|27262729": ["Although the above-mentioned surveys [7], [24], [31], [32] have laid a solid foundation for blockchain technologies, our survey differs in several aspects.", "There are related survey papers [7], [24], [29]\u2013[32] that covered different aspects of the blockchain technology.", "The security and privacy aspects are presented in [31] and [32] for bitcoin,"]} diff --git a/edge/graph_207971879.jsonl b/edge/graph_207971879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b16702279d4097e02773e2311a919371484596ed --- /dev/null +++ b/edge/graph_207971879.jsonl @@ -0,0 +1,4 @@ +{"115452002|16502294": []} +{"3413210|1223851": ["The SOD models lead to new ideas for river detection in SAR images.", "Therefore, the SOD models generally consist of two steps.", "In this paper, we propose a new bottom-up SOD method to detect rivers in high-resolution SAR images (an overview of the proposed method is shown in Fig.", "For more accurate region detection, the pluralities of Saliency Object Detection models (SOD) [53] have been proposed since 2007.", "However, currently SOD models are mainly used to process optical images, which are quite different from SAR images.", "Hence, the application of SOD models in the SAR images faces intractable problems."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"24876044|6972141": ["Here using the visual data, the construction of the map and calculation of a precise trajectory inside the map can be done by using visual slam [4] [10].", "Vision based mapping is an active research topic in the recent years [10] [25] [17] and its already proven in aerial robotics [9]."]} diff --git a/edge/graph_207972942.jsonl b/edge/graph_207972942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..efdd099721bbc1257111da48910d6957b8ecf618 --- /dev/null +++ b/edge/graph_207972942.jsonl @@ -0,0 +1,19 @@ +{"53288118|13916820": ["Thus, with a risk of data abuse or leakage, outsourcing sensitive data such as business data, financial information, or medical records and delegating data processing to the cloud services raise security and privacy threats [1][2]."]} +{"86710777|1708582": ["Reinforcement learning (RL) [5], which is learning behavior through trial-and-error interactions with a dynamic environment, has been used as the primary tool in developing DTRs [1]."]} +{"67061113|49527603": ["The model can be enforced in practice with the help of blockchain technology [16,28] for example, tailored to smart contracts for data manipulation operations, e."]} +{"2259820|13916820": []} +{"4140014|4962939": ["In this paper, to address the above issues in CDSS, we propose a H ybrid P rivacy-Preserving C linical Decision Support S ystem in fog and cloud computing environment, called HPCS, and regard the challenge issues to be \ufb01ve-fold, namely: \u2022 Balance Real-time and High-accurate Classi\ufb01cation.", "Moreover, Rahu-lamathavan et al. [22] proposed a privacy-preserving CDSS using a Gaussian kernel-based support vector machine (SVM).", "Clinical Decision Support System (CDSS), with various data mining meth-ods being applied to assist physicians in diagnosing, has received great attention due to the prosperity of the new techniques, such as, Internet of Things (IoT) [1] [2], cloud computing [3] [4], and fog computing [5] [6], etc. \u201cThings\u201d, in the IoT sense, can refer to a wide variety of devices to collect the Personal Health Information (PHI).", "[23] gave a privacy-preserving CDSS scheme on Na\u00a8\u0131ve Bayesian classi\ufb01er to predict patient\u2019s disease.", "Recently, Neural Networks (NNs) [10], one of the high decision rate data mining tools, have been widely used to predict various diseases in CDSS [11,12].", "Due to its higher e\ufb03ciency, many privacy-preserving outsourced CDSS are designed.", "Although a number of privacy-preserving outsourced CDSSs are proposed, most of them can only support securely linear operations instead of some complex non-linear operations, such as Sigmoid and Softmax function which are usually contained in the neural networks.", "Recently, Neural Networks (NNs) [10], one of the high decision rate data mining tools, have been widely used to predict various diseases in CDSS [11] [12].", "Rahulamathavan et al. [22] constructed a privacy-preserving CDSS using Gaussian Kernel-Based Classi\ufb01-cation (GKC).", "Recently, Liu et al. [23] proposed a new privacy-preserving patient-centric CDSS on Na\u00a8\u0131ve Bayesian classi\ufb01er to diagnose the risk of patients disease in a privacy-preserving way."]} +{"30547822|14382980": []} +{"206690811|5313655": ["For protecting biometric features from being leaked and preventing impersonation, many schemes have been proposed [16,18]."]} +{"207211891|13916820": ["The challenge arises due to several well-documented security risks faced by existing cloud service providers [14,22,40,41,48,52]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"6413228|10346685": ["Although this technique does not rely on any third party, the LBS provider can restrict the user in a small sub space of the total domain, leading to weak privacy."]} +{"59189079|10346685": ["Then, using the private information retrieval (PIR) [49], [50] or oblivious RAM (ORAM) methods [51], [52], the user securely gets back the corresponding encrypted files from CP without leaking the access pattern.", "Then, using the private information retrieval (PIR) [49], [50] or oblivious RAM (ORAM) methods [51], [52], the user securely gets"]} +{"9155213|10346685": ["Work in PIR [33] allows a user to request a tuple from the database without the server learning what tuple was requested.", "Masking such access patterns from the server would incur significant overhead [33], require virtually an overwrite of the underlying DBMS, add considerable client-side processing, and preclude server-side optimizations."]} +{"9181081|17904357": ["They also analyze HE tools for use in statistical machine learning [3]."]} +{"15455415|6275330": ["For example, sensor nodes can be attached to medications, the chance of getting and prescribing the wrong medication to patients can be minimized [1]."]} +{"12018322|2177212": []} +{"14968539|1805048": ["A lot of recommendation services, including mobile ads and movie recommendations, have been used in our daily life, and a collaborative filtering (CF) is one of commonly used algorithms for such services [2, 36]."]} +{"36984312|2177212": ["The privacy of divided private key is guaranteed by Shamir secret sharing scheme [28], [29] which is-"]} +{"8161954|10464581": ["Wavelets have been widely used in image processing since the publication of the JPEG 2000 standard, including in the CBIR \ufb01eld (Xiong and Huang, 2002; Do and Vetterli, 2002)."]} +{"4035713|15662958": ["The hcrypt library however does not take advantage of modern noise reduction or SIMD batching techniques [17], which are factors both relevant to additional improvements in sorting performance."]} diff --git a/edge/graph_207974742.jsonl b/edge/graph_207974742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20786a274746335043eef8a00639f3b6637dc749 --- /dev/null +++ b/edge/graph_207974742.jsonl @@ -0,0 +1,10 @@ +{"19024319|3330461": []} +{"19516622|3330461": ["The D2D communications have been the subject of much recent research endeavor [10], [11]."]} +{"18328619|3330461": []} +{"21053653|3330461": ["dealing with out-band D2D communication both managed by the network and autonomously controlled are surveyed in [11].", "In [11], the authors give an overview of papers addressing inband D2D in terms of spectral efficiency, energy efficiency, cellular coverage and other performance targets.", "To be more precise, with respect to [11], [12] our survey:"]} +{"21053653|7644489": ["An overview of standardization activities in 3GPP focusing specifically on ProSe enabled communication is also described in [134]."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"49575736|3330461": ["As a promising fifth generation (5G) technology, D2D communication allows physically similar devices to communicate directly with each other through a licensed cellular band, bypassing the eNodeB [6]."]} +{"49184822|4787452": ["However, these protocols must be aware of the communication status of neighboring vehicles, which is hard to achieve due to lack of centralized control node [12]."]} +{"750143|3330461": []} +{"28623185|3330461": ["The main solution is to design a variety of RRM schemes [4]."]} diff --git a/graph_2079802.jsonl b/edge/graph_2079802.jsonl similarity index 100% rename from graph_2079802.jsonl rename to edge/graph_2079802.jsonl diff --git a/edge/graph_207984702.jsonl b/edge/graph_207984702.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208011077.jsonl b/edge/graph_208011077.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..013baff5b2d02360b6a8711c7d7c459f763008b0 --- /dev/null +++ b/edge/graph_208011077.jsonl @@ -0,0 +1 @@ +{"37666327|14597368": ["For instance, if S = 1 3a4c2, then s5 = a, S5 = 3 + 2a, S[3, 8] = 11a4c1, and S[1, 4] = 13a1."]} diff --git a/edge/graph_208017129.jsonl b/edge/graph_208017129.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19ca5139bfc243cf308b03df72f4b1fad87ba4d1 --- /dev/null +++ b/edge/graph_208017129.jsonl @@ -0,0 +1,2 @@ +{"59234060|7329149": ["Proposed IoT platforms, architectures, frameworks are surveyed in [2], [7], [8], [9]."]} +{"59234060|1598350": ["Proposed IoT platforms, architectures, frameworks are surveyed in [2], [7], [8], [9]."]} diff --git a/edge/graph_208034368.jsonl b/edge/graph_208034368.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208034920.jsonl b/edge/graph_208034920.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3e775d5d1be8432a8b58c571eb1beeb2d089db6 --- /dev/null +++ b/edge/graph_208034920.jsonl @@ -0,0 +1,15 @@ +{"58952497|15222577": []} +{"10392576|16768404": []} +{"6626683|15222577": ["Another reason is that Arabic is one of the fastest-growing languages on the web [108].", "This is where the research area of SA plays a major role in capturing and analysing the subjective content from text produced by the general public on social media [108]."]} +{"116320200|16768404": []} +{"63516039|1143625": ["Understanding public sentiment and concerns expressed on these different platforms is a crucial issue for both policy makers, business leaders, and the public (Vargas et al., 2016; Imran et al., 2015; Verma et al., 2011)."]} +{"18274692|15222577": ["Similar to this approach, [18], a semi-supervised learning method is used, but it required the user to provide labeled examples.", "Key words: Sentiment Analysis; Opinion mining; Feature-based; Aspect-based; lexicon."]} +{"6567650|5835640": ["The better is the selection of the relevant features, the better the model will perform (Erguzel et al., 2015; Guyon and Elisseeff, 2003; Mwangi et al., 2014; Sun et al., 2010; Tohka et al., 2016)."]} +{"15751548|54934748": ["On the other hand, Khan, Baharudin, Baharum, Khan, Ullah [20] reported that the problem of domain dependency and a pre-knowledge base remains unsolved."]} +{"146119482|46332962": ["Deep learning approach has achieved high performance and been applied to several fields, such as computer vision, transfer learning, semantic parsing and NLP tasks [1].", "Sentiment analysis (SA) plays an essential role for natural language processing (NLP) and gives an understanding of the information available on websites and social media [1]."]} +{"4382357|15222577": ["According to Liu [1], Abdulla et al. [2], Assiri et al. [8], Korayem et al. [13] and Moraes et al. [14], SA research can be classified into four categories: (1) class (subjective or objective), (2) polarity (positive, negative or neutral), (3) level of classification (word, phrase, sentence or\u2026"]} +{"16258461|15222577": ["So, Korayem [20] survey a different techniques and methods for building subjectivity and sentiment analysis systems for Arabic."]} +{"6480791|15222577": ["Little research in this area has been done for Arabic and its dialects [2, 9].", "Arabic was ranked the 4th language in terms of the number of users on the Internet [1, 2]."]} +{"5245646|16768404": []} +{"205709105|16768404": ["Related Work There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014). In their survey paper, Medhat et al. (2014) provided a categorization of sentiment classification techniques. They first divided approaches into two categories: machine learning-based approaches and lexiconbased approaches. Later, machine learning-based techniques were divided into two groups: supervised and unsupervised techniques. On the other hand, as explained by Zhou et al. (2014), there is a third category known as semi-supervised learning. Since preparation of a large-scale labeled dataset for supervised learning is time-consuming and expensive, unsupervised learning (Turney, 2002) or semi-supervised learning approaches may be applied (Sindhwani and Melville, 2008). In Table 1, we explain the main strenghts and weaknesses of these existing approaches. We represent ensemble methods in hybrid approaches category in this table. Therefore, our study is related with this hybrid approach category, but we have additional mechanisms such as threshold step, and parameter optimization. In addition to these categories, there is a lexical-based methods used in some studies. Some researchers utilized from emoticons for sentiment classification and it is shown in another category in Table 1. There are many studies on sentiment classification in literature but the number of studies which use ensemble of classifiers for English reviews are limited. According to our literature survey, no study using ensemble of classifiers for Turkish reviews has been published yet. In Table 2, we show the summary of sentiment classification papers which investigated the use of ensemble of classifiers concept. In Table 3, we explain the papers focused on Turkish language. We applied threshold approach which is discussed in the next section to select commonly used features, but feature reduction techniques such as principle component analysis did not improve the performance significantly. Researchers suggested new feature reduction techniques in literature. Nie et al. (2012) developed a least squares discriminant analysis and showed that orthogonal one is useful for real world applications. Nie et al. (2010a) developed a manifold embedding framework to provide a unified view for unsupervised, supervised, and semi-supervised feature reduction approaches. Nie et al. (2010b) proposed a feature selection method based on joing l2,1 \u2013norms minimization and demonstrated its performance on six datasets. Nie et al. (2008) proposed a new algorithm to find the optimal feature subset and showed that the algorithm is effective.", "Related Work There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014). In their survey paper, Medhat et al. (2014) provided a categorization of sentiment classification techniques. They first divided approaches into two categories: machine learning-based approaches and lexiconbased approaches. Later, machine learning-based techniques were divided into two groups: supervised and unsupervised techniques. On the other hand, as explained by Zhou et al. (2014), there is a third category known as semi-supervised learning. Since preparation of a large-scale labeled dataset for supervised learning is time-consuming and expensive, unsupervised learning (Turney, 2002) or semi-supervised learning approaches may be applied (Sindhwani and Melville, 2008). In Table 1, we explain the main strenghts and weaknesses of these existing approaches. We represent ensemble methods in hybrid approaches category in this table. Therefore, our study is related with this hybrid approach category, but we have additional mechanisms such as threshold step, and parameter optimization. In addition to these categories, there is a lexical-based methods used in some studies. Some researchers utilized from emoticons for sentiment classification and it is shown in another category in Table 1. There are many studies on sentiment classification in literature but the number of studies which use ensemble of classifiers for English reviews are limited. According to our literature survey, no study using ensemble of classifiers for Turkish reviews has been published yet. In Table 2, we show the summary of sentiment classification papers which investigated the use of ensemble of classifiers concept. In Table 3, we explain the papers focused on Turkish language. We applied threshold approach which is discussed in the next section to select commonly used features, but feature reduction techniques such as principle component analysis did not improve the performance significantly. Researchers suggested new feature reduction techniques in literature. Nie et al. (2012) developed a least squares discriminant analysis and showed that orthogonal one is useful for real world applications.", "There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014).", "In their survey paper, Medhat et al. (2014) provided a categorization of sentiment classification techniques.", "Related Work There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014). In their survey paper, Medhat et al. (2014) provided a categorization of sentiment classification techniques.", "Related Work There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014).", "Related Work There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014). In their survey paper, Medhat et al. (2014) provided a categorization of sentiment classification techniques. They first divided approaches into two categories: machine learning-based approaches and lexiconbased approaches. Later, machine learning-based techniques were divided into two groups: supervised and unsupervised techniques. On the other hand, as explained by Zhou et al. (2014), there is a third category known as semi-supervised learning.", "Related Work There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014). In their survey paper, Medhat et al. (2014) provided a categorization of sentiment classification techniques. They first divided approaches into two categories: machine learning-based approaches and lexiconbased approaches. Later, machine learning-based techniques were divided into two groups: supervised and unsupervised techniques. On the other hand, as explained by Zhou et al. (2014), there is a third category known as semi-supervised learning. Since preparation of a large-scale labeled dataset for supervised learning is time-consuming and expensive, unsupervised learning (Turney, 2002) or semi-supervised learning approaches may be applied (Sindhwani and Melville, 2008). In Table 1, we explain the main strenghts and weaknesses of these existing approaches. We represent ensemble methods in hybrid approaches category in this table. Therefore, our study is related with this hybrid approach category, but we have additional mechanisms such as threshold step, and parameter optimization. In addition to these categories, there is a lexical-based methods used in some studies. Some researchers utilized from emoticons for sentiment classification and it is shown in another category in Table 1. There are many studies on sentiment classification in literature but the number of studies which use ensemble of classifiers for English reviews are limited. According to our literature survey, no study using ensemble of classifiers for Turkish reviews has been published yet. In Table 2, we show the summary of sentiment classification papers which investigated the use of ensemble of classifiers concept. In Table 3, we explain the papers focused on Turkish language. We applied threshold approach which is discussed in the next section to select commonly used features, but feature reduction techniques such as principle component analysis did not improve the performance significantly. Researchers suggested new feature reduction techniques in literature. Nie et al. (2012) developed a least squares discriminant analysis and showed that orthogonal one is useful for real world applications. Nie et al. (2010a) developed a manifold embedding framework to provide a unified view for unsupervised, supervised, and semi-supervised feature reduction approaches. Nie et al. (2010b) proposed a feature selection method based on joing l2,1 \u2013norms minimization and demonstrated its performance on six datasets.", "Related Work There are recently published survey papers on sentiment classification (Balazs and Velasquez, 2016; Ravi and Ravi, 2015; Medhat et al., 2014). In their survey paper, Medhat et al. (2014) provided a categorization of sentiment classification techniques. They first divided approaches into two categories: machine learning-based approaches and lexiconbased approaches. Later, machine learning-based techniques were divided into two groups: supervised and unsupervised techniques. On the other hand, as explained by Zhou et al. (2014), there is a third category known as semi-supervised learning. Since preparation of a large-scale labeled dataset for supervised learning is time-consuming and expensive, unsupervised learning (Turney, 2002) or semi-supervised learning approaches may be applied (Sindhwani and Melville, 2008). In Table 1, we explain the main strenghts and weaknesses of these existing approaches. We represent ensemble methods in hybrid approaches category in this table. Therefore, our study is related with this hybrid approach category, but we have additional mechanisms such as threshold step, and parameter optimization. In addition to these categories, there is a lexical-based methods used in some studies. Some researchers utilized from emoticons for sentiment classification and it is shown in another category in Table 1. There are many studies on sentiment classification in literature but the number of studies which use ensemble of classifiers for English reviews are limited. According to our literature survey, no study using ensemble of classifiers for Turkish reviews has been published yet. In Table 2, we show the summary of sentiment classification papers which investigated the use of ensemble of classifiers concept. In Table 3, we explain the papers focused on Turkish language. We applied threshold approach which is discussed in the next section to select commonly used features, but feature reduction techniques such as principle component analysis did not improve the performance significantly. Researchers suggested new feature reduction techniques in literature. Nie et al. (2012) developed a least squares discriminant analysis and showed that orthogonal one is useful for real world applications. Nie et al. (2010a) developed a manifold embedding framework to provide a unified view for unsupervised, supervised, and semi-supervised feature reduction approaches."]} +{"17123958|15222577": ["[15] study exhibits different methods used to"]} diff --git a/edge/graph_208036214.jsonl b/edge/graph_208036214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bde412482514926267fddfe81bbe85b66b4ad7f --- /dev/null +++ b/edge/graph_208036214.jsonl @@ -0,0 +1,2 @@ +{"29719329|4643404": []} +{"33352660|17758458": ["quality of the distribution networks [4, 5]."]} diff --git a/edge/graph_208036348.jsonl b/edge/graph_208036348.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24d8b4d5ab5590d42d08ceec2f1e92f9375c8b9b --- /dev/null +++ b/edge/graph_208036348.jsonl @@ -0,0 +1,126 @@ +{"8738539|512561": ["In the proposed protocol, the R and S hopping sequence information of sender node and receiver node are contained in CTS and RTS in the transmission [11, 12]."]} +{"37017997|205286988": []} +{"37017997|1230643": []} +{"8533769|6275330": []} +{"8533769|1230643": []} +{"28765323|9830350": ["In [30], the advantages and objectives of clustering for WSNs were outlined, and a comprehensive taxonomy of TABLE I"]} +{"28765323|1230643": ["W IRELESS sensor networks (WSNs) consist of a large number of low-cost, low-power and intelligent sensor nodes and one or more sinks or base stations (BSs) [1], [2]."]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"7072463|6939676": ["All the algorithms studied in [32] are used in 2D static WSNs.", "Therefore, in [32], the localization algorithms are classified as known location based localization, proximity based localization, angle based localization, range and distance based localization."]} +{"7072463|6396569": ["In [20], localization algorithms are classified into target/source localization and node self-localization."]} +{"7072463|34657644": ["In [22], the classification of localization algorithms is first studied based on three categories: range-based/rangefree, anchor-based/anchor-free, distributed/centralized."]} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"3629353|17905276": []} +{"3629353|485843": []} +{"7337025|1230643": ["Introduction Wireless sensor networks (WSNs) are used for target tracking, environmental monitoring, surveillance, and data collection for factors such as humidity, temperature, light, and pressure or the weight, velocity, and movement direction of an object in the area of the interest [1]."]} +{"5157442|206901977": ["In [25], the authors have categorized various WSNs applications and reviewed different energy conservation schemes specifically, their impact on the overall performance of the specific application."]} +{"5157442|1766884": ["A review is presented in [29] which elaborates application of metaheuristic algorithms to solve multi-objective optimization problems relating to data clustering in wireless sensor networks."]} +{"5157442|39636809": ["Biologically inspired computing for the optimization of WSNs have been reviewed in [30]."]} +{"5157442|10096622": ["Particle swarm optimization (PSO) techniques have been reviewed in [24] for the optimal deployment, node localization, clustering and data aggregation in wireless sensor networks (WSNs).", "Optimal deployment of WSN guarantees sufficient quality of service, increased network life time and minimum cost [24]."]} +{"24268675|1236072": []} +{"39908475|13292799": []} +{"11031679|16897832": ["Unfortunately, there exist just a few studies concerning multi-objective feature selection in the literature [43], i.", "Classification has been used in various real-world applications such as medical healthcare, image analysis, marketing and statistical problems [43, 26].", "This brings the problems of high complexity and poor learning performance in real-world applications [43]."]} +{"207429729|2295142": ["The evidence of this technique implementation can be seen in the work of Radi et al. (2012)."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"438494|3791647": ["Each sensor node has limited computational capacity, battery supply, and communication capability [1]."]} +{"438494|10096622": ["Kulkarni and Venayagamoorthy [28] introduce PSO and discuss its suitability for WSN applications."]} +{"4883145|33211520": []} +{"4883145|205286988": []} +{"4883145|34657644": []} +{"67858390|18469839": []} +{"67858390|1236072": ["In Reference [15], the authors discuss the data gathering problem in order to maximize the volume of collected information in networks with self-charging sensors."]} +{"3649350|16335158": ["Recently, integration of MCC with WSNs has been proposed in several research works [7], [8], [9], [10], [11], [12], [13], [14], [15]."]} +{"3649350|1230643": [", temperature, sound, pressure) [4], [5], [6]."]} +{"1412480|206901977": []} +{"1412480|5875539": []} +{"1412480|9830350": []} +{"1412480|12817488": []} +{"53711175|1236072": ["Index Terms\u2014Mobile sinks, distributed routing, data dissemination, energy efficiency, mobility, wireless sensor networks\n\u00c7"]} +{"63990525|61248451": ["In the literature, a number of studies have been reported for the problem [see the review paper of Baybars (1986), Ghosh and Gagnon (1989), Erel and Sarin (1998), Scholl (1999), and Becker and Scholl (2006)]."]} +{"13754100|12256243": ["A survey of the location-based routing protocols that support the sink mobility is presented in [12]."]} +{"13754100|10206347": []} +{"13754100|9830350": ["The cluster properties and the sensor capabilities are the two main issues in the clustering attributes [21, 22]."]} +{"17240776|17205659": []} +{"52813145|63317370": []} +{"26216054|10096622": []} +{"26216054|1230643": []} +{"58952523|19502816": []} +{"41685384|7350786": []} +{"34938755|1236072": ["The \ufb02at based routing protocol assign the same functionality to all nodes [48].", "Therefore the sensor nodes should be able to survive with a small \ufb01nite source of energy [48, 49].", "They try to save energy through negotiation and elimination of redundant data [48].", "Mobility in tandem with energy ef\ufb01ciency in a wireless sensor network endows with signi\ufb01cant challenges for routing [25, 48, 58, 95]."]} +{"34938755|2835258": ["The main disadvantage is that the cost of position update and queries becomes very high if the quorum sets are large [81]."]} +{"52937324|13292799": ["The ACO routing protocol has a higher probability of being trapped in the optimal layout according to Equations (4) and (5) [39]."]} +{"20555602|58988543": ["As another research, Sharma, Patel [30] have studied and analyzed various schemes for deployment of mobile sensor nodes on various matrices."]} +{"20555602|4698297": ["\u2026and also secure routing [12, 13], bandwidth allocation [14], Quality of Service (QoS) provisioning [15], data processing and compressing techniques [16, 17], cross-layer design [18], and choosing the proper deployment strategy [19, 20] are important challenges in WSN. Deployment is an important\u2026"]} +{"43238756|1230643": ["[1], [2]."]} +{"19262113|30575518": ["Topology control can increase bandwidth and deal with the communication void region problem that diminishes the performance of geographic routing (Coutinho et al. 2017a; Ghoreyshi et al. 2017).", "This topology control methodology has been used to determine suitable UWSN topology reducing void nodes (Ghoreyshi et al. 2017), improve data collection (Forero et al. 2014), or enable much richer underwater applications relying on multimedia content (Fan et al. 2016)."]} +{"41819730|7842253": []} +{"41819730|17675973": []} +{"25108891|28457848": ["to solve various problems [28]\u2013[35], most of them focus on single optimization, rather than multimodal optimization."]} +{"46387676|12817488": []} +{"36932357|206901977": []} +{"26513736|18151539": ["Further modeling approaches are discussed in the survey papers of Cacchiani et al. (2014), Corman and Meng (2015), Fang et al. (2015) and the recent book of Hansen and Pachl (2014).", "Recent literature reviews show a rich stream of research focused on the rtRTMP (Cacchiani et al., 2014; Corman and Meng, 2015; Fang et al., 2015).", "On an operational level, the problems deal with the recovery of the plans on the available infrastructure when disturbances and/or disruptions make them infeasible (Cacchiani et al., 2014; Corman and Meng, 2015; Fang et al., 2015)."]} +{"52811422|6275330": []} +{"52811422|1230643": []} +{"3681659|21386749": []} +{"44314211|16023210": ["This feature is quite helpful in constructing the virtual infrastructure as well as routing of the query and response packets [22], [23]; however it incurs some additional energy cost."]} +{"26127505|10817088": []} +{"18832388|1230643": ["\u2026which is generally associated with a small storage unit, accomplishes procedures that make sensor node to cooperate withother nodes to carry out the assigned sensing tasks [3], the communication subsystem has a transceiver that is used for transmitting and receiving data within the network."]} +{"15510730|206901977": ["Introduction Recently, wireless sensor networks (WSNs) have gained enormous attention for their wide range of applications [1]."]} +{"174807290|58664326": []} +{"205429043|4474193": []} +{"3798371|17713112": ["In addition to the development of efficient software [13] and communication protocols, e."]} +{"3798371|16335158": ["in [22] provide a comprehensive survey of sen-"]} +{"1053950|17464562": ["For more information the reader may refer to [46,47]."]} +{"41631437|205286988": ["The most important part of the sensor node is its power supply, which caters to the energy requirements of sensors, processors and transceiver, however, its limited battery life can lead to premature exhaust of the network due to excessive usage (Akkaya and Younis 2005)."]} +{"41631437|1236072": ["A sensor with limited storage and computation capabilities receive the sensed data through analogue to digital Converter (ADC) and process it further for transmission to a main location, known as Base Station (BS), where the data can be analysed for decision making in variety of applications (Al-Karaki and Kamal 2004).", "\u2026storage and computation capabilities receive the sensed data through analogue to digital Converter (ADC) and process it further for transmission to a main location, known as Base Station (BS), where the data can be analysed for decision making in variety of applications (Al-Karaki and Kamal 2004)."]} +{"10881894|763939": ["Random Walk Model and Random Directions Model [26], [27].", ", temporal dependency, spatial dependency and geographic restrictions, etc [27]."]} +{"10881894|6275330": ["THE past few decades have witnessed a rapid development of wireless sensor networks (WSNs) [1], based on which a vast range of applications have been developed, ranging from military applications [2], [3], environmental monitoring [4], medical health care [5], to smart-home applications [6]."]} +{"10881894|1236072": ["equipped with various sensor units, are capable of sensing the physical world and providing data to the sink through singlehop or multi-hope routing [7]."]} +{"44323841|2295142": []} +{"205286236|8008208": []} +{"205286236|16866891": ["Their differences, apart from their behaviour inspiration, lie in the way the search space is explored and exploited by the \u201cagents\u201d [89]."]} +{"205286236|4474193": ["The field of dynamic optimization is closely related with EAs, known as evolutionary dynamic optimization (EDO) [12].", "However, it does not mean that a high level of diversity will lead to better performance [12, 55].", "EDO has received extensive attention with several surveys [13, 12, 14, 15] and books [16, 17, 18, 19, 20], whereas SI dynamic optimization (SIDO) has not received much attention, with exception of some very brief reviews of PSO in [14] and ACO in [15] included as subsections in the EDO surveys.", "Hence, DOPs are more challenging to address than stationary optimization problems since repeated optimization of the changing optimum is required [12].", "The \ufb01eld of dynamic optimization is closely related with EAs, known as evolutionary dynamic optimization (EDO) [12]."]} +{"62727658|16023210": ["The classes of routing scheme to enhance the network lifetime in WSNs have been discussed in [9, 10]."]} +{"62727658|1230643": ["Energy is also a limited resource due to the dimensions restrictions [1]."]} +{"13292799|39636809": ["The more recent survey [7] narrowed down its focus to an ant colony optimization (ACO)-based approach to solve several issues in WSNs."]} +{"13292799|10096622": ["In [9], some issues of WSNs have been addressed using only PSO."]} +{"13292799|1230643": ["Wireless Sensor Networks (WSNs) are critically resource-constrained by their limited power supply, memory, processing performance and communication bandwidth [1]."]} +{"9171235|763939": ["Themobility models described in [54] and [170] can be exploited in order to study how these models affect both the convergence of the algorithms as well as the lifetime of WSNs. Amplifying or decoding and remodulating the signals before forwarding them is capable of achieving energy savings, as\u2026"]} +{"9171235|1230643": ["Therefore, the NL is constrained by the battery of the individual sensors in the WSN considered [1], [2].", "We note that the sensed information is processed relying on a speci\ufb01c hardware component, which is distinct from the transceiver component of the particular sensor device [1], [2]."]} +{"9171235|12060835": []} +{"604918|4474193": ["Therefore, the overall offline performance [27] is defined as follows:", "Such methods are suitable to speed up the reoptimization process when the changes are small to medium [6], [27]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"13706239|41998167": ["The early research on WSN is mainly directed towards the monitoring applications, but with immense proliferation in micro-electro-mechanical systems (MEMS), there has been a widespread utilization of WSNs in different environments and for different purposes like Healthcare, Military Surveillance, Smart Grid, and Industrial Automation [3]."]} +{"13706239|10096622": []} +{"37544408|16198650": ["This algo-rithm is one of the best approaches of the Swarm Intelligence method with considerable advantages like high-convergence speed, \ufb02exibility, error tolerance and high accuracy (Neshat et al. 2012)."]} +{"3953264|5972227": ["However, these methods deal with traditional sensor tracking problems in WSNs, whose characteristics are far different from those of location-based applications for industrial uses with wireless infrastructure [23]."]} +{"36412692|10096622": ["Owing to its conceptual simplicity and high efficiency, PSO has been successful in solving a variety of problems in many areas such as power systems [3], [4], industrial electronics [5], wireless sensor networks [6], and feature selection [7].", "If particle i\u2019s pbest is Pi = [6, 5] and the gbest is G = [2, 2], then the constructed exemplar could be Ei = [3, 3]."]} +{"42278384|11894197": []} +{"51975557|37497601": ["The light difference between CPUs, but nonignorable, might bring the clock [14]."]} +{"21317736|10096622": ["During the search process, the velocity and position of each swarm can be updated according to Equations 8 and 9 [40]."]} +{"21317736|34657644": ["Although the TDoA method has high ranging accuracy, it needs additional hardware and consumes more energy [6]."]} +{"8703234|1762301": ["In past few years, several MANET routing protocols had been developed [37]."]} +{"22919091|5972227": ["Whenever a sensor node reaches the destination coordinate position, the node waits for a Tpause time prior to the arrival of next destination coordinate position [36]."]} +{"22919091|9830350": []} +{"53279822|18801114": ["Recently, some work regarding classifying interference via spectrum sensing [92] on IIoT devices has been presented but most of the existing work fails since a very long sampling win-"]} +{"53279822|206901977": ["Many energy-efficient schemes for wireless sensor network (WSN) have been proposed in recent years [60], but those approaches are not immediately applicable to IIoT."]} +{"53279822|28210515": []} +{"10386319|11894197": []} +{"44871094|1230643": ["WSNs can be widely used to perform military tracking and surveillance, natural disaster relief, hazardous environment exploration and health monitoring etc [1-2]."]} +{"16895003|9830350": []} +{"42586153|12817488": ["WSN based solutions have been designed and applied not only in the monitoring and control applications, but also in diverse areas, including building automation, disaster and waste management, and moving targets [2, 3]."]} +{"17381438|1236072": ["Sensor locations play an important role in assessing coverage and connectivity and in location-based WSN routing protocols [4]."]} +{"17381438|1230643": ["They may be deployed in inaccessible or harsh mission fields for applications, such as disaster-relief [2]."]} +{"34209132|206901977": []} +{"34209132|7876249": []} +{"8226285|17769444": ["A wireless sensor node is made up of 4 practical modules: processing unit, sensing unit, transceiver, and power unit [2]."]} +{"8226285|1236072": ["As sensor nodes do not have much power, recurrent and lengthy range transmissions have to be at a minimum to prolong network life [3]."]} +{"34225697|12817488": []} +{"34225697|1230643": ["tures respectively [9], [10]."]} diff --git a/edge/graph_208037744.jsonl b/edge/graph_208037744.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..477f3b876527e4acd97b4b83e0c184a49943834a --- /dev/null +++ b/edge/graph_208037744.jsonl @@ -0,0 +1,55 @@ +{"189824317|155368979": ["Thus, the associated RUL predictions tend to achieve the ideal maintenance policy through predictions of the available time until failure after a fault is detected within the component [2].", "Today, sensor data is the most common data type format for data-driven PHM applications [2]."]} +{"127662794|18078738": ["For feature extraction, effective technologies based on time, frequency, and time-frequency analysis of vibration signals have been proposed [4 \u2013 7]."]} +{"3981563|44461432": ["\u2026of big data by including Veracity and Value, making it \u20185V.\u2019 Correspondingly, it becomes focal for today\u2019s research to determine how to produce tremendous practical value quickly and accurately from massive data, which comes from multiple and heterogeneous sources at a rapid rate [7]\u2013[10]."]} +{"3981563|18078738": ["The process of fault diagnosis can be divided into three stages, namely, data acquisition, feature extraction and fault decision [17], from the perspective of the work\ufb02ow of diagnosis.", "Some also divides it into model-based, signal-based, knowledge-based, hybrid and active diagnosis methods [17], [18], with special attention on real-time diagnosis and fault tolerance."]} +{"18188725|393948": ["It is shown that the representation de\ufb01nes the upper-bound performances of machine learning algorithms [19]."]} +{"117153610|18078738": ["Fault diagnosis methods are categorized into data-based, model-based, knowledge-based, and hybrid methods [3].", "They were used to solve the control problem in heating, ventilating, air conditioning, motor, and engine systems [3,4].", "Generally, obtaining an explicit model to accurately describe the dynamic behavior of a complex system is dif\ufb01cult, and model-based algorithms [3,5\u20137] have considerable limitations."]} +{"29441483|393948": ["Deep learning is capable of extracting useful and important features from data to improve the power of prediction [19]."]} +{"23847306|18078738": ["survey paper [1], model-based and signal-based diagnosis approaches were reviewed."]} +{"3808900|18188725": ["Compared with the traditional artificial intelligent techniques, DL holds the potential of feature representation and has been applied in the machine health monitoring field [24]."]} +{"3808900|18078738": ["2774777 methods [3]."]} +{"3808900|393948": ["visual cortex contains some cells that are only sensitive to the local receptive field [35]."]} +{"155107857|44104746": []} +{"155107857|22163846": ["In recent years, research on lightweight deep CNNs has made some achievements [34]."]} +{"155107857|393948": ["In addition, traditional artificial intelligence methods are shallow leaning models, with which it is difficult to effectively learn the nonlinear relationships of complex systems [4]\u2013[6]."]} +{"112135310|3330313": ["Anomaly detection (also called \u201cnovelty detection\u201d or \u201coutlier detection\u201d) has been a mature and active field within diverse research areas [15]."]} +{"10470542|393948": ["The introduction of deep learning has significantly reduced the dependence on manual feature selection and expertise in intelligent diagnosis [32], [33].", "Compared with a shallow neural network, a DNN has better expression ability [32]."]} +{"7597406|18078738": []} +{"7597406|393948": ["type of layers should be stacked and how to stack them, several approaches have been proposed in the prior work [19]."]} +{"31594113|393948": ["relationships [17]\u2013[19]."]} +{"22324243|16502294": ["depending on the frame sizes of the images taken [1].", "In the rail inspection process, the camera images constitute the input data of the system using CVS.", "Today, this inspection is commonly carried out using computer vision systems (CVS) [1].", "Today, this inspection process is commonly carried out using CVS.", "A typical rail inspection performed using CVS can be summarized as acquiring an image from the rail track, performing pre-treatment on the image frames, obtaining lower dimensional features on these frames, labeling the data and finally, producing a diagnosis by applying machine learning classifying methods.", "Generally, it is the biggest disadvantage of which is used CVS or image processing based in rail inspection applications.", "Another important point in rail inspection applications using CVS is that the system operates at high speeds.", "This situation may decrease the general accuracy rate of the CVS system [3].", "A rail inspection process using CVS is expected to be costeffective, suitable for real-time operation, fast and highly accurate [2]."]} +{"122552966|18078738": ["In general, three fault diagnosis methods are now taken into consideration by scholars: fault diagnosis methods based on a physical model [1,2], fault diagnosis methods based on knowledge [3\u20136] and data-driven methods [7\u201310]."]} +{"115447390|3761015": []} +{"116816281|18599847": []} +{"21169013|18078738": ["In model-based methods, fault diagnosis algorithms are developed to monitor the consistency between the measured outputs of the practical systems and the model-predicted outputs [2]."]} +{"111388523|18599847": []} +{"3721696|18078738": ["Gao et al. [5,6] systematically reviewed the fault diagnosis with model-based, signal-based, knowledge-based, and hybrid/active approaches."]} +{"40884206|393948": ["The main algorithms of deep learning [6] include the Deep Belief Network (DBN) based on the Restricted Boltzmann Machine (RBM), Deep Neural Network (DNN) using the stacked auto-encoder and the Convolutional Neural Network (CNN)."]} +{"115751686|18078738": []} +{"115751686|393948": []} +{"56594323|18188725": ["[19] investigated the application of DL to machine health monitor."]} +{"56594323|15888893": []} +{"56594323|18078738": ["In general, the fault diagnosis methods can be classified into model-based, signal-based, knowledgebased and hybrid/active approaches [14]."]} +{"56594323|393948": ["In traditional machine learning methods, the handcrafted features should be predesigned, and it has been shown that these handcrafted features define the upper-bound performances of machine learning methods [7]."]} +{"174820545|18078738": ["However, due to the complex operating conditions, the VSR system is prone to accidental failure which may lead to abnormal operations and system directly shut down [3], [4].", "To realize the OC fault diagnostic in the VSR system, various methods have been proposed, which can be generally categorized into model-based [4] and knowledge-based [3]."]} +{"54453142|393948": ["rithms [12]."]} +{"125608550|393948": []} +{"49480557|393948": []} +{"128228859|393948": []} +{"126753487|15888893": []} +{"3623821|3590989": []} +{"125567144|48359428": []} +{"125567144|38200299": []} +{"125567144|3761015": []} +{"125567144|3918777": []} +{"8292451|18188725": ["In the past few years, many DL models including stacked autoencoder (SAE) and deep belief network (DBN) have been developed in the field of machine health monitoring [16]."]} +{"8292451|393948": ["are applied, it is shown that the representation determines the upper-bound performances of machine learning algorithms [13]."]} +{"116249328|18188725": []} +{"2342435|18078738": ["Primary fault detection techniques can be categorized into the classes of modelbased, signal-based, knowledge-based (data-driven), and active ones [3], [4].", "As discussed in [4], a reasonable fault detection algorithm should be sensitive to faults, as well as robust against measurement noises or disturbances."]} +{"61808995|155368979": ["Thus, the degradation of critical maritime components included in these systems poses a serious threat to safe and profitable maritime operations [1]."]} +{"61808995|393948": ["An AE is an FNN trained to reconstruct its input through a \u2018\u2018bottleneck\u2019\u2019 representation of latent variables (hidden units) z [23].", "The AE objective function is as follows [23]:"]} +{"34170710|393948": ["Deep learning has the ability to yield useful and important features from data that can ultimately be useful for improving predictive power [20]."]} +{"67874243|18078738": ["Signal-based fault diagnosis methods extract significant features from a measured signal and detect faults by using prior knowledge on non-faulty motors [3], [9].", "Model-based methods use mathematical models that describe motor behaviour by using the physical relationship between the stimuli applied to the motor and its responses [3], [8].", "The proposed methods can be divided in five main categories: model-based, signal-based, knowledge-based, hybrid, and active fault diagnosis methods [3], [4]."]} +{"49864704|17485266": ["This computation reduces the variance of the gradient updates, which can lead to more stable convergence [34]."]} +{"52163874|18078738": []} +{"117522430|18078738": []} diff --git a/edge/graph_208040480.jsonl b/edge/graph_208040480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37f88a8fef11e46d4e91a8b705706e2acf29e300 --- /dev/null +++ b/edge/graph_208040480.jsonl @@ -0,0 +1,4 @@ +{"725716|1097238": []} +{"53212123|13215551": []} +{"2581822|14370469": []} +{"2979679|11894197": ["\u2026evolutionary computing algorithms such as the genetic algorithm (GA) and the evolution strategy methods have attracted much attention for stochastic search of epistatic interactions (Li et al., 2001; Ooi and Tan, 2003; Moore et al., 2004; Shah and Kusiak, 2004; Jirapech-Umpai and Aitken, 2005)."]} diff --git a/edge/graph_2080455.jsonl b/edge/graph_2080455.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208059599.jsonl b/edge/graph_208059599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3159f699745605eeec940f24d871fb53cdaea107 --- /dev/null +++ b/edge/graph_208059599.jsonl @@ -0,0 +1 @@ +{"10601532|8446711": ["IRT has many advantages over other technologies [6]."]} diff --git a/edge/graph_208060900.jsonl b/edge/graph_208060900.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2080630.jsonl b/edge/graph_2080630.jsonl similarity index 100% rename from graph_2080630.jsonl rename to edge/graph_2080630.jsonl diff --git a/edge/graph_208075857.jsonl b/edge/graph_208075857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adddb2537093a209670bca2d152655941d127349 --- /dev/null +++ b/edge/graph_208075857.jsonl @@ -0,0 +1,2 @@ +{"16257412|17381415": []} +{"18451845|33247252": [", hence the tolerable latencies are commonly in the scale of seconds or even milliseconds [81].", "Note that the communications between aggregators and the smart grid are in the order of typically 15 minutes [81], hence the communication latency in case of when price information is exchanged, is less critical."]} diff --git a/edge/graph_208075988.jsonl b/edge/graph_208075988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b21cc5c4fe15f7cdb8ea1ea376212bae48d8602 --- /dev/null +++ b/edge/graph_208075988.jsonl @@ -0,0 +1,4 @@ +{"8743937|17574321": ["To do so, an automatic system compares the speech material provided by the current speaker to a reference of the target user learned during a previous enrolment phase [1].", "Many studies have shown that the more mismatched enrolment and test samples are, the more dif\ufb01cult the classi\ufb01cation is [1]."]} +{"15538672|192934": []} +{"199472890|206602044": ["The input observation x can be a raw speech waveform itself or an encoded vector using various feature extraction algorithms for speaker verification such as Mel-frequency cepstral coefficients (MFCCs) [25], i-vector [26\u201329], or speaker embedding vectors [5,7,8,15]."]} +{"3810858|17574321": ["[2] on the use of MFCCs and other features such as super vectors for speaker recognition."]} diff --git a/edge/graph_208095816.jsonl b/edge/graph_208095816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86bdba3df689f944feb9d39be7a885fddd8823fd --- /dev/null +++ b/edge/graph_208095816.jsonl @@ -0,0 +1,2 @@ +{"10266183|41035405": []} +{"44107554|208095816": []} diff --git a/edge/graph_208127944.jsonl b/edge/graph_208127944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15e883741711161f0c16990512ab45cebaa8ffd6 --- /dev/null +++ b/edge/graph_208127944.jsonl @@ -0,0 +1,7 @@ +{"125410214|12161567": ["Furthermore, if A B then the PVD model is equivalent to the RESCAL model (Nickel et al., 2016)."]} +{"125410214|43059": ["raction matrices. Another useful constrained tensor decomposition model, which can be represented graphically as a nested Tucker-(K, N)model, is the PARATUCK-(K, N) model (see, e.g., the review paper [97] and references therein). The PARATUCK(K, N), like the PARALIND/CONFAC-(K, N) models, performs a decomposition in which the core tensor is de\ufb01ned through the interaction matrices, however, the PARATUC", "dopted in widely diverse disciplines, including signal and image processing, machine learning, Psychometrics, Chemometrics, Biometric, Quantum Physics/Information, Quantum Chemistry and Brain Science [51,53,97,112,153,160,239,253]. This is largely due to their advantages for data that exhibit not only large volume but also very high variety (see Figure 1), as is the case in bio- and neuro-informatics and in computational neuro", "eferred to as the NTD-2 (Nonnegative Tucker-2 decomposition). 17PARALIND is an abbreviation of PARAllel with LINear Dependencies, while CONFAC refers to CONstrained FACtor model; for more details see [69,97] and references therein. 62 Table 5: Different forms of CP and Tucker representations of a third-order tensor X PRI J K. CP Decomposition Tucker Decomposition Scalar representation x ijk = \u00b0R r=1 lr a"]} +{"49270898|5835640": ["Univariate and multivariate feature selection are two of the most important methods [21]."]} +{"18530632|7788290": ["Among these algorithms, the most prominent representative is support vector machine (SVM) [1], which is particularly attractive in pattern recognition, computer vision and image processing communities [2]\u2013[7] due to a number of theoretical and computational merits.", "Color images [2], [10], gray-level video sequences [11]\u2013[13], gait silhouette sequences [14], [15] and hyperspectral cube [16] are commonly represented as third-order tensors."]} +{"11878898|7761990": ["We need rather to apply an ensemble of strategies by mploying several suitably 2This form of factorizations are typical with EEG /MEG related data for multi-subjects, multi-tasks, while the factorization for the transposed of Y is typical for fMRI data [16, 17, 18].", "This problem is related to various models of grou p ICA, with suitable pre-processing, dimensionality reduction and post-p rocessing procedures [16, 17, 18]."]} +{"12850632|7761990": ["Group ICA (Calhoun et al. 2001; Calhoun, Liu, and Adali 2009) currently cannot be applied to, say, hundreds of fMRI images."]} +{"13438152|43059": ["\u2026based on the CANDECOMP / PARAFAC (CPD) [1], [2] and the Tucker decomposition [3], [4], while their variants, such as the PARALIND, PARATUCK [5], [6] or the Block term decomposition [7], the tensor de\ufb02ation or tensor rank splitting [8], [9] were developed with a speci\ufb01c task in mind; for a\u2026"]} diff --git a/edge/graph_208133923.jsonl b/edge/graph_208133923.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fad2aeec347a1c426255b52d9ad3de927f38ef5 --- /dev/null +++ b/edge/graph_208133923.jsonl @@ -0,0 +1,3 @@ +{"56027666|206403759": []} +{"34601890|15164501": ["Linking structures / Degree of integration / Flexibility\nLing (2001) Bajwa et al. (2005); Bruque-Camara et al. (2004); Frambach and Schillewaert (2002); Tornatzky and Fleischer (1990)\n2.2.5.", "It also plays a role in managerial processes that may influence adoption (Leidner & Kayworth, 2006).", "Linking structures / Degree of integration / Flexibility Ling (2001) Bajwa et al."]} +{"168655524|8417324": ["Generally, development and implementation of business intelligence has high risks and hazards for organizations (Farrokhi and Pokoradi 2012)."]} diff --git a/edge/graph_208138142.jsonl b/edge/graph_208138142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fa7aca5e71aef76f6b6c20ab7a860cbe760c21f --- /dev/null +++ b/edge/graph_208138142.jsonl @@ -0,0 +1,17 @@ +{"44063479|3342225": ["Recently, the research of methods for explaining black box decision systems has caught much attention [17].", "First, we assume that an explanation is interesting for a user if it clarifies why a specific decision pertaining that user has been made, i.e., we aim for local explanations, not general, global , descriptions of how the overall system works [17].", "In the cases in which the training set is available, classification rules are also widely used to avoid building black boxes by directly designing a transparent classifier [17] which is locally or globally interpretable on its own [23, 25, 39].", "Other approaches, more related to the one we propose, address the problem of explaining the local behavior of a black box [17]."]} +{"57573831|1229096": ["While some (Bojarski et al., 2016) achieve all tasks in one unique module, others do follow the logic of one task - one module (Paden et al., 2016).", "Vehicle control : Vehicle control classically has been achieved with predictive control approaches such as Model Predictive Control (MPC) (Paden et al., 2016)."]} +{"51872504|52947736": ["The use of deep learning for image captioning has been surveyed very recently [230], [231], and tasks that generate text given textual inputs are discussed in Sections IV-E\u2013IV-G."]} +{"197430935|59600034": ["d in the research papers and survey we cite [1], [2], [15]\u2013[30]. We extend the so-called integrated interpretability [16] by including considerations for subject-content-dependent models. Compared to [17], we also overview the mathematical formulation of common or popular methods, revealing the great variety of approaches to interpretability. Our categorization draws a starker borderline between the d"]} +{"59600034|3342225": ["A recent survey on methods for explaining black-box models [76] outlined a taxonomy to provide classi\ufb01cations of the main problems with opaque algorithms."]} +{"59600034|4110304": ["A review of explanatory methods focused on understanding unit representations used by visual CNNs can be found in [52], which examines methods for visualization of CNN representations in intermediate network layers, diagnosis of these representations, disentanglement representation units, the\u2026"]} +{"59600034|17779926": ["Some of these sampling approaches only work on binary input [34] or use genetic algorithms to produce new training examples [35]."]} +{"62790820|1123458": ["This problem is well studied, and is related to the trust region problem (Boyd and Vandenberghe, 2004; P\u00f3lik and Terlaky, 2007; Park and Boyd, 2017)."]} +{"199405458|197430935": []} +{"199405458|59600034": []} +{"199405458|3342225": ["There exist diverse methods for explaining ML models [4]: Local methods explain the decision for one specific input, while global methods refer to the whole model."]} +{"199405458|11101499": []} +{"119319715|1123458": []} +{"37925315|12681089": []} +{"132199224|206603045": ["Besides conventional enhancement techniques [129], deep neural networks have been widely adopted to either directly reconstruct clean speech [132], [133] or estimate masks [134]\u2013[136] from"]} +{"159041727|3342225": ["General surveys on explainabil-ity, fairness, and robustness have been described by [10],[5], and [1] respectively."]} +{"159041727|3536399": [", 2018b],[Binns, 2017], and [Akhtar and Mian, 2018] respectively."]} diff --git a/edge/graph_208138453.jsonl b/edge/graph_208138453.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ef269cc561800c184ef8a04cc4d2ca0e01700ec --- /dev/null +++ b/edge/graph_208138453.jsonl @@ -0,0 +1,4 @@ +{"3876725|10355303": ["It plays an important role in a large number of video analysis tasks [14, 37, 65, 68, 95, 117, 121] such as traffic monitoring, visual tracking, surveillance, and video summarization."]} +{"641747|4361938": ["The interested reader is referred to [22], [23], [127] for eye movement studies and [24] for a breadth-first survey of eye tracking applications."]} +{"14914367|191396": ["achieve because of noise and outliers in real-world data, various approaches have been attempted [32, 25]."]} +{"10705249|2616070": []} diff --git a/edge/graph_208139056.jsonl b/edge/graph_208139056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab0bfd8a0ae282d7fadbdbc51303ec3a66175a05 --- /dev/null +++ b/edge/graph_208139056.jsonl @@ -0,0 +1,12 @@ +{"14615511|64404": ["Each video (texture plus depth), is independently encoded at 6 quality levels using the novel High Efficiency Video Coding (HEVC) [10] HM 11.", "With the introduction of the novel state-of-the-art High Efficiency Video Coding (HEVC) [10] the Joint Collaborative Team on 3D Video Coding Extension Development (JCT-3V) has recently developed extensions of HEVC: Multiview-HEVC (MV-HEVC) and 3D-HEVC [11].", "With the introduction of the novel state-of-the-art High Ef\ufb01ciency Video Coding (HEVC) [10] the Joint Collaborative Team on 3D Video Coding Extension Development (JCT-3V) has recently developed extensions of HEVC: Multiview-HEVC (MV-HEVC) and 3D-HEVC [11].", "Each video (texture plus depth), is independently encoded at 6 quality levels using the novel High Ef\ufb01ciency Video Coding (HEVC) [10] HM 11.0 reference software (main pro\ufb01le) with QP = { 26,30,34,38,42,46 } .", "This paper proposes a solution to the problem thanks to the following contributions: \u2022 de\ufb01nition of a novel Synthesized Image Quality Eval-uator (SIQE) to assess the quality of depth based rendered images in absence of corresponding reference images; \u2022 exploitation of the cyclopean eye theory and divisive normalization transform to infer the quality of a picture rendered from a stereo pair (video plus depth); \u2022 statistical analysis of the quality prediction accuracy obtained on a set of video plus depth sequences compressed with HEVC: the SIQE performance is compared versus other state-of-the-art full reference image and video quality metrics showing competitive results.", "3D-HEVC exploits additional coding tools and achieves the best compression ratio for MVD data [11] and it also guarantees promising quality virtual views with View Synthesis Optimization (VSO) coding tool."]} +{"202560214|368853": []} +{"1033682|174797842": []} +{"30187406|15261053": ["An Exhaustive Search (ES)-like algorithm [28] is selected and a search window of size W pixels in horizontal direction only is used."]} +{"41082528|1805048": []} +{"10512190|393948": [", by training a restricted Boltzmann machine or an autoencoder [4] with convolutional layers.", "By contrast, deep-learning models employ multiple levels of linear and nonlinear transformations to generate highly general data representations, thereby greatly decreasing dependence on the selection of features, which are often reduced simply to raw pixel values [2], [4].", "A more complicated model, such as a multilayer perception or recurrent NN [4], could also be used for aggregation [Figure 4(d)]."]} +{"3300932|396631": ["264/MPEG-4 AVC [4], [5], has been explored to compress the 3D video sequences."]} +{"660425|30747069": ["A more detailed comparison of the NAL unit header designs in AVC and HEVC as well as the motivation of the NAL unit header design in HEVC and its extensions can be found in [11].", "\u20262) essential information of operation points needed for session negotiation, including e.g., profile and level; and 3) other operation-point-specific information that does not belong to one specific SPS, e.g., hypothetical reference decoder (HRD) parameters for layers or sub-layers [11]."]} +{"660425|64404": ["S INCE the recent completion of the first edition of the High Efficiency Video Coding (HEVC) standard [1], [2], now approved as ITU-T H.", "A more detailed description of the key technical features can be found in [2]."]} +{"660425|396631": []} +{"51611284|64404": ["backed Coding (LC) [31], White Noise (WN), HEVC Compression (HC) [32], SCC Compression (SC) [33], Transmission loss under HEVC compression (TH) [24], and"]} +{"70104174|469744": ["[12] and light field multi-view videos [13], etc."]} diff --git a/edge/graph_208139353.jsonl b/edge/graph_208139353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc454d91f304f9a98cca15be27f74b581485f473 --- /dev/null +++ b/edge/graph_208139353.jsonl @@ -0,0 +1,8 @@ +{"8117323|7530272": ["Since traces consist of sequences of events, one family of techniques applicable for deviance mining is sequence classification [Xing et al. 2010].", "A direction for future work is thus to develop and apply techniques for extracting (discriminative) patterns from complex symbolic sequences \u2013 a non-trivial and open problem as noted in [Xing et al. 2010].", "Since traces consist of sequences of events, one family of techniques applicable for deviance mining is sequence classi\ufb01cation [Xing et al. 2010]."]} +{"8117323|7158350": []} +{"44473609|8125630": ["The interactive comparison of process cohorts is supported by the use of data warehousing techniques [41], in the form of a relational online analytical processing (ROLAP) datacube, to store individual performance indicator values and attributes that describe their context in a database."]} +{"33661245|7158350": []} +{"13682164|393948": ["While traditional machine-learning methods heavily depend on the choice of features on which they are applied, neural networks are capable of translating the data into a compact intermediate representation to aid a hand-crafted feature engineering process [1]."]} +{"52010717|7158350": []} +{"8394298|5184436": ["OLAP techniques organize the data under multiple combinations of dimensions and typically numerical measures, and accessing the data through different OLAP operations such as slicing, dicing, rolling up and drilling down.", "The application of OLAP on non-numerical data is increasingly being explored.", "However, there are two significant differences between OLAP and Process Cubes: Summarizability and Representation.", "Some authors have studied summarizability issues in OLAP [15, 16] and attempt to solve it by introducing rules and constraints to the data model.", "The event cube approach described in [2] presents an exploratory view on the applications of OLAP operations using events.", "The second refers to classical OLAP relying on the aggregation of facts for reducing a set of values into a single value that can be represented in many ways.", "One cannot simply merge or split Process Cube cells as summarizable OLAP cells because events are ordered, and any slight change in that ordering may change the whole representation of the cell where that event is being contained.", "Lots of research have been conducted to deal with OLAP technical issues such as the materialization process.", "While applying typical OLAP operations such as slice, dice, roll up and drill down (defined in Sec 2.5) we only change the way we are visualizing the cube and its content.", "Keywords: Process Cube, Process Mining, OLAP, Comparative Process Mining", "The idea is related to the well-known OLAP multidimensional paradigm [7].", "However, typical OLAP cubes allow the user to \u201cnavigate\u201d through the cube using roll up and drill down operations, changing the granularity in a guided way through the hierarchy of the dimension.", "The first refers to the classic OLAP cubes assumption on the summarizability of facts.", "Next we consider the classical OLAP operations in the context of our process cubes."]} +{"8394298|8125630": ["The idea is related to the well-known OLAP multidimensional paradigm [7]."]} diff --git a/edge/graph_208140140.jsonl b/edge/graph_208140140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f58ccd1c11d3c92c2ab60e970baa88d3a0e9b15a --- /dev/null +++ b/edge/graph_208140140.jsonl @@ -0,0 +1,61 @@ +{"3539457|64404": []} +{"3539457|8006086": []} +{"6121252|21386749": ["In [5] Islam et al., have presented various aspects of the IoT-based health care technologies and stated that IoT can help any age group and address any disease in an innovative manner."]} +{"4123502|17776695": ["[81] published a survey on signal analysis and processing techniques employed with different types of"]} +{"4123502|86629084": ["Moreover, nowadays, healthcare or ambient assisted living solutions cannot be proposed and designed without considering mobile health support [40]."]} +{"4123502|21386749": ["These applications can be suited in industry domains, such as transportation [3], healthcare [4],", "Accordingly, it is hard to locate a complete security convention that can treat both wired and wireless channel qualities similarly [4].", "The data input from patients can be collected through sensors and processed by applications developed for a user terminal, such as computers, smart phones, smart watches or, even, a specific embedded device [4]."]} +{"86785001|18303304": []} +{"86785001|7834819": []} +{"86785001|16514036": []} +{"86785001|20905429": []} +{"52899540|5022650": []} +{"52899540|206578486": []} +{"52899540|3119314": []} +{"56170194|29859741": ["For many healthcare applications, having a simple sensor-to-cloud architecture is not viable, especially due to the fact that most hospitals would not prefer patient data to be stored outside [3]."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"53046484|16387640": []} +{"8597790|21386749": ["[7] proposed an intelligent collaborative security model to reduce security risk; discussed how different innovate technologies such as big data, ambient intelligence, and wearables are leveraged in a healthcare context; addressed various IoT and eHealth and regulations around the world."]} +{"4809836|21717841": ["In addition, most free wireless networks in public place, which have not been certified, are untrusted networks [31]."]} +{"49195342|1734833": ["[11] reviewed the current methods and algorithms used to analyze data from wearable sensors in healthcare services."]} +{"49195342|14356173": ["In 2013, Tomar and Agarwal [12] also explored the utility of various data mining techniques, such as classification, clustering, association, regression in the health domain."]} +{"139203583|6076208": []} +{"173995217|49574823": ["Recently, Blockchain technology has engrossed the attention of organization associates across a broad spectrum of industries such as healthcare, real estates, government sectors and finance [13, 26]."]} +{"32169740|21386749": ["1, the survey on the medical applications of IoT is classified into two categories such as services and applications[5]."]} +{"18336791|21386749": ["[8] analyzes IoT security and privacy issues from the health care perspective and proposes an intelligent collaborative security model to minimize security risk."]} +{"164704763|30037917": []} +{"164704763|206578365": []} +{"113770558|86629084": []} +{"113770558|21386749": []} +{"113770558|10817088": []} +{"113770558|3348390": []} +{"25753765|31245252": ["Extensible messaging and presence protocol is based on XML protocols; this protocol is mainly famous for key features such as open source and the public security mechanism and is completely free [106].", "This protocol is interoperable and can be implemented in different platforms to connect objects to the internet [106, 107].", "MQTT is able to easily connect the \u201cthings\u201d to the web and supports unreliable networks with low bandwidth [106].", "1 3 prominent features such as low cost and low power consumption is suitable for IoT implementation [106].", "Although security challenges are among the most important issues in healthcare [106, 171, 197], it can be concluded that concentration on this topic is still low and only 10% of the papers reviewed discussed it.", "It is recommended for networks with low bandwidth [106]."]} +{"25753765|21386749": ["[132], patient monitoring systems based on IoT can be categorized into two aspects, i.", "1 Security In remote healthcare delivery in IoT environments, considering security vulnerability not only for medical data sharing, patient privacy, and confidentiality but also for IoT setting is essential [132, 178]."]} +{"25753765|7505270": ["Sensing technologies are essential tools for acquisition of physiological parameters from the patient [40, 98].", "Furthermore, results obtained from such sensors can be exploited for suitable decision-making about patients\u2019 situations [98, 100, 101]."]} +{"17369195|18717047": ["It is can be flexible for resource representation [20], and for ubiquitous service application with wireless communication [21]."]} +{"53432000|7350786": ["2015 [7]."]} +{"52910393|29859741": []} +{"49540643|21386749": ["The IoT revolution is restructuring contemporary healthcare with promising technological economic and social prospects [2].", "Therefore, a scheme proposed in [2] to ensure that obfuscation is applied to an appropriate API with relevant degree of resistance to reverse engineering."]} +{"52149786|52094967": []} +{"52149786|49563104": []} +{"52149786|4809836": []} +{"52149786|17962754": []} +{"52149786|21386749": []} +{"88475507|3348390": []} +{"88475507|20905429": []} +{"67015229|3330461": ["This approach is best suited to reduce the traffic load at the network infrastructure [44]."]} +{"67015229|7644489": ["A brief overview of 3GPP D2D proximity services (ProSe) can be found in [21].", "Resource Optimization [12], [13], [48], [58], [60], [62], [71\u201380] Interference Management [13], [53], [72], [75], [81\u201384], Route Discovery [21], [66], [68\u201370], [85] Wireless Security [86\u201394] With increasing load on the BS and limited spectrum available in wireless (cellular) network, the user\u2026"]} +{"59537882|21386749": []} +{"24752096|21386749": ["The use of Internet of Things (IoT) concepts and health sensing technologies make diagnosis easier and convenient for the doctors as well as the patients [1]."]} +{"67750747|8308538": []} +{"67750747|1442447": []} +{"67750747|8183369": []} +{"67750747|7120308": []} +{"164959791|3273576": []} +{"164959791|21386749": []} +{"115535417|3304959": ["The stack utilizes standards and protocols offered by the Internet Engineering Task Force (IETF) [33], Institute of Electrical and Electronics Engineers (IEEE), International Telecommunication Union (ITU) [34] and other standard organizations.", "It seems a long way until big data analytics be widely deployed in the healthcare industry due to additional costs associated with complex analytical functions in addition to the privacy and confidentiality of their records and the lack of willingness to share healthcare data [33]."]} +{"11588005|31670805": ["Ensuring reliability, performance, and efficiency are some of the other challenges associated with the IP-based systems [8]."]} +{"52301582|1734833": ["Banaee et al. (2013) have explained the latest methods and algorithms to analyse data collected from wearable sensors in health monitoring environment."]} +{"12665180|21386749": []} +{"198332350|21386749": []} +{"51930849|21386749": ["The demand for IoT-enabled healthcare devices is increasing day by day [27]."]} +{"52286176|55729907": ["The collector forwards to base station or sink for storing at medical server of hospital as illustrated in figure 1 [7]."]} diff --git a/edge/graph_208140661.jsonl b/edge/graph_208140661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e84a9afc0b0dd08d17ebda931777d5651a9351b3 --- /dev/null +++ b/edge/graph_208140661.jsonl @@ -0,0 +1,5 @@ +{"52280282|8965636": ["They are ef\ufb01cient for detecting those fraud cases that belong to the existing patterns [40].", "Various supervised learning methods like neural networks, decision trees, logistic regression, and support vector machine are often used to obtain the fraud patterns [8], [10], [12], [27], [31], [40]."]} +{"52280282|50458504": []} +{"16429427|5246835": ["Most of the work on preventing and detecting credit card fraud has been carried out with neural networks [36]."]} +{"16429427|50458504": []} +{"16429427|15273230": ["As the online banking transaction data is extremely imbalanced, sampling is necessary before applying any data mining models [16]."]} diff --git a/edge/graph_208140872.jsonl b/edge/graph_208140872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01dacd08e04262bc7b3c8208603eb7a42a9c13a7 --- /dev/null +++ b/edge/graph_208140872.jsonl @@ -0,0 +1,6 @@ +{"2567804|14205872": []} +{"2567804|1142636": ["\u2026process (i.e., the automatic addition of semantic annotations to digital resources), in the context of the\nesult of the assessment of the annotation activity.\nsemantic web, and in the annotation of text resources (e.g., text documents and HTML pages) (Oliveira & Rocha, 2013; Reeve & Han, 2005)."]} +{"2567804|51338": []} +{"20596957|1142636": ["Several efforts have been made towards building scalable, automatic semantic annotation platforms [34]."]} +{"12515893|1142636": ["A great number of approaches on semantic annotation have been proposed in the literature [ 6 , 7]. Most of them are focused on annotating web resources such as HTML pages [8, 9, 10, 11, 12, 13, 14]."]} +{"12515893|29395800": ["Regarding the semantic search, in the recent years, numerous systems and approaches have been proposed in the literature [20]."]} diff --git a/edge/graph_208155009.jsonl b/edge/graph_208155009.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af4141cdd04cc56c63c8cab39c4c2f5b83b5f514 --- /dev/null +++ b/edge/graph_208155009.jsonl @@ -0,0 +1,54 @@ +{"52166200|3348390": ["Recent works point that a hybrid and integrated reasoning approach would be beneficial for heterogeneous IoT environments [2].", "Context sharing is a feature that allows the systems to share context information to heterogeneous entities \u201cunderstand\u201d different context information across application domains [2].", "Ontologies, web services, and lexical databases are examples of technology has been successfully used in the IoT to hide devices patterns [2] [15], which leads us to believe that those technology can be used in the IoT context-aware security area as well.", "The context-aware computing helps in interpret and understand these data in a proper way, producing context information [2]."]} +{"53233083|3348390": ["sensor communication technologies as seen in [4].", "Numerous research efforts such as [3], [1], [4] and [5] have concluded that reusing the existing web architecture to integrate new devices is the most viable solution in terms of scalability, costs and complexity."]} +{"49353292|13780557": ["Conventional manufacturing systems are producing high amounts of dynamic Big Data which require analysis possibilities in the complete data spectrum between huge data buckets and real-time data streams (see [17] for a comprehensive review)."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"67866214|3767252": ["According to [3], edge devices are more than data sources in an edge architecture.", "For instance, attacks exploring backdoor security flaws have been seen in sensitive application environments like home care [3].", "2), we present the security mechanisms that should be used toward the definition of a security architecture for edge devices (more details are presented later) [1, 3, 5]: \u2022 Secure boot: It is the basis for root of trust (RoT) systems.", "Also, edge devices are often deployed in resource-constrained environments without strict monitoring and protection, thereby facing all kinds of security threats [3, 4].", "Edge computing takes place on IoT end devices, which means that less data is sent to the cloud [3].", "However, security is emerging as one of the most significant challenges for edge computing [3].", "Table 1 presents the most relevant attacks against them [3]."]} +{"12511357|1520906": []} +{"12511357|1421946": []} +{"46823051|9495329": ["Bizanis and Kuipers [91] surveyed SDN and NV solutions for the IoT devices."]} +{"46823051|1599458": ["5) Survey of data mining [27], [31], [32].", "According to the Gartner Research report, the number of IoT devices will reach 25 billion in a few years [27], [43].", "An alphabetically sorted short list follows below [3], [27], [44], [45].", "Some of the context-aware studies in IoT are summarized in [27]."]} +{"46823051|1520906": []} +{"46823051|10213552": ["Available: http://thinkaurelius.github.io/titan/ and H 2 O (parallel processing engine that contains math and machine learning libraries) [37], [38], [209].", "\u2026engine) [207], All-Pairs (used for biometrics, bio-informatics data mining) [37], Pregel (processes large sized graphs) [208], Spark (works faster than Hadoop because of memory caching) [38], Storm (processes streaming data in real-time) [38], Flink (batch and stream processing) [38], 20 [Online].", "Dynamo (Amazon) [192], Voldemort (LinkedIn) [193], Azure [37], [38].", "OrientDB, 20 Neo4J, 21 and Titan 22 represent some examples of graph-based databases [38].", "7) Survey of big data analytics [37], [38].", "These include: Mahout [210], Spark MLlib 26 [211], H 2 O [38], SAMOA (Scalable Advanced Massive Online Analysis) [212], Flink-ML [38], Weka [213], Oryx, 27 and Vowpal Wabbit [38]."]} +{"46823051|1349348": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "There are also different approaches for context modeling, such as multidisciplinary, domain focused, user-centric, and chemistry inspired [26]."]} +{"46823051|7329149": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|1598350": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|5310274": []} +{"46823051|3348390": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "There are three main steps of context reasoning: 1) context preprocessing; 2) sensor fusion; and 3) context inference [21], [107].", "Context reasoning can be classi\ufb01ed as different categories [21]: fuzzy logic, ontology-based, probabilistic logic, rules, supervised learning, and unsupervised learning.", "These \ufb01ve factors are explained in [21].", "[21].", "Perara et al. [21] mentioned that there were different context life cycles.", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "3) Survey of context awareness [21], [23]\u2013[29].", "According to [21], there are seven main characteristics: 1) architecture; 2) complex system; 3) everything as a service; 4) intelligence; 5) size considerations; 6) space considerations; and 7) time considerations.", "Perera et al. [21] de\ufb01ned the features of context awareness related with IoT, according to [10], [94], and [97]."]} +{"46823051|9429730": ["4) Survey of machine learning on speci\ufb01c topics (human activity recognition, mobile phones sensing, body sensor networks, and WSN) [24], [30], [31]."]} +{"31028066|3348390": []} +{"63867652|3348390": []} +{"26236123|29060869": ["In smart grids, energy can be traded in utility markets [13]."]} +{"30639813|16335158": ["As a remedy, concepts like sensor-cloud integration [3] or sensor virtualization [2] were introduced."]} +{"1442447|3348390": ["\u2026quick deployment of new network elements and architectures [51]; (cid:129) co-existence of heterogeneous network architectures over a common infrastructure [52]; (cid:129) all the time reachability [53]; (cid:129) self-management of network objects, achieved through context awareness [54]."]} +{"86558333|27410217": []} +{"86558333|1599458": []} +{"86558333|21738890": []} +{"86558333|1349348": []} +{"86558333|1598350": []} +{"86558333|3348390": []} +{"86558333|14639620": []} +{"86558333|9429730": []} +{"86558333|1077083": []} +{"86558333|2187403": []} +{"86558333|1113420": []} +{"8488702|1113420": ["With the wide-spread exploitation of mobile devices such as laptops, PDAs, and cell phones, context-aware (or sensitive) application research is becoming markedly popular these days [1, 2]."]} +{"21738890|3348390": ["[22] highlights context-awareness from an IoT perspective, and presents the background of IoT paradigm, context-aware essentials and their relations to sensor networks."]} +{"21738890|3202525": ["[23], [24] survey context-awareness for recommender systems to build such intelligent systems that can better predict and anticipate the needs of users, and act more efficiently in response to their behaviors."]} +{"21738890|1077083": []} +{"21738890|8909218": []} +{"21738890|2187403": []} +{"21738890|1113420": ["[18] presents a detailed explanation of context, context types along", "In this regard, many context modeling schemes have been proposed [18], [21], [27]\u2013[29]."]} +{"21738890|20905429": []} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"15627326|3348390": ["An optional objective could be the generation of secondary context [15].", "The context can be distributed in two ways [15].", "An IoT directory must support search in order to discover heterogeneous devices [15].", "[15] propose a life-cycle and explain how acquisition, modelling, reasoning, and distribution of context should occur.", "The most popular context modelling techniques are surveyed in [15] and [16]."]} +{"9881970|1113420": ["Commodity devices and embedded sensors can also collect myriad information about us and our instantaneous situations, enabling the long vision of context-awareness [1]."]} +{"52927331|3348390": ["Since early 1990\u2019s, a large body of research has been conducted on context/context-awareness in pervasive computing to enable intelligent adaptation of applications allowing them to perform their tasks in an efficient, proactive and autonomous manner [2], according to the context of its users or other involved entities."]} +{"52927331|14639620": ["A notable number of context management approaches has been proposed by research community [3-6].", "The major functionalities of such context management middleware platforms can be subdivided into six main classes [6], namely: (i) Raw Data Acquisition, (ii) Context Storage, (iii) Context Lookup and Discovery, (iv) Context Distribution, (v) Privacy, Security and Access Control, and (vi) Context Processing and Reasoning."]} +{"52927331|1077083": ["A notable number of context management approaches has been proposed by research community [3-6]."]} +{"52927331|1113420": ["A notable number of context management approaches has been proposed by research community [3-6]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"52831336|1349348": ["[12] presented a general context lifecycle (which defines the time period from its obtainment to destruction) that is demarcated by six major events, including context acquisition, context modeling, context reasoning, context distribution, context repository, and context visualization."]} +{"52831336|3348390": ["Context-aware computing has played a major role over the last decade in ubiquitous computing domain and is expected to play a significant role for IoT paradigm as well [9].", "[9] have presented a large majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade by considering 50 different projects.", "Recent works [8], [9], [11] have discussed context-aware computing"]} +{"52831336|1113420": ["Recently a few researchers [35], [36] have considered context-aware services for IoT and it is expected to play a significant role in IoT as well."]} diff --git a/edge/graph_208155036.jsonl b/edge/graph_208155036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f6434f85f15878bc6620ece91ed26c41fd79691 --- /dev/null +++ b/edge/graph_208155036.jsonl @@ -0,0 +1,13 @@ +{"1784782|16335158": []} +{"26428978|6583734": []} +{"26428978|2623404": ["Since NFV deals with implementing the network services as software, SDN plays an important role in the orchestration of NFV [58, 65, 110].", "Recent advancements in the field of SDN and NFV allow ISPs to deploy many network services over the virtualized infrastructures [4, 24, 58, 65, 89].", "Advances in SDN have already addressed most of these aforementioned problems [27, 58]."]} +{"26428978|2387055": ["There have been recent studies towards the security in cloud and virtualized environments [113-115]."]} +{"26428978|39706822": ["As mentioned by John et al. [48], WSDL helps define web services from a technical perspective, including the aspects of a service, its interfaces, operations, endpoints, binding, and type definitions.", "[16], cloud service declarative definition language (CSDL) [21], SUN [22], and SMI [23] focus on the description of the services in the clouds.", "One of the most prominent ways for the service description in the Internet is Web Service Description Language (WSDL) [16, 48].", "NFF Network function forwarder\nNFV Network function virtualization\nNFVI Network function virtualization infrastructure\nNFVMANO\nNFV Management And Orchestration\nNMS Network management system\nNP Nondeterministic polynomial\nNS Network service\nNSH Network service header\nNVF Network virtual function\nOA&M Operations, administration and management\nOF OpenFlow\nOPEX Operational expenses\nPaaS Platform as a Service\nPM Physical machine\nQoS Quality of service\nSDL Service description language\nSDN Software defined networking\nSF Service function\nSFC Service function chaining\nSFCC Service function chaining controller\nSFCR Service function chaining router\nSFF Service function forwarder\nSFP Service function path\nSLA Service level agreement\nSMI Service measurement index\nSWA Software architecture\nUSDL Unified service description language\nVF Virtual function\nVIM Virtualized Infrastructure Manager\nVM Virtual machine\nVNF Virtual network function\nVNFC Virtual network function component\nVNFFG VNF Forwarding Graph\nVNFM VNF Manager\nWSDL Web service description language\nII.", "USDL has significant applicability to Internet service discovery, comparison, evaluation and management, enabling rigorous decision-making by service requestors [16].", "[16], there is a lack of a comprehensive specification model for cloud services covering multiple perspectives.", "WSDL is not sufficient for the specification of network services [48].", "[16] provide a detailed description and discussion for these languages.", "For example, current WSDLs may not support dynamic traffic steering among the various branches of the service functions, which may be formed due to SFC. Beek et al. and O'Sullivan have focused on the definition of non-functional properties of the electronic services with the purpose of improving the technology of automated service discovery, comparison, selection and substitution [18, 19]."]} +{"8384374|15959145": []} +{"8384374|12815020": []} +{"155537727|31245252": []} +{"155537727|206584087": []} +{"26964511|12815020": ["A significant amount of work has been performed in the literature for IDS using machine learning techniques.", "In [15], the authors utilized artificial neural networks to build IDS models for anomaly detection using the same dataset.", "Recently, advances in machine learning techniques have proven their efficiency in many applications, including intrusion detection systems (IDS).", "Both algorithms have been widely adopted in machine learning, especially for the development of the IDS [7].", "A significant amount of research has been already made towards the development of IDS models in recent years.", "Several such examples are summarized in surveys such as [7] [8].", "For more details of machine learning techniques in IDS, readers may refer to the surveys presented in [7], [8], and [20]."]} +{"14363559|36784649": []} +{"2332366|18740719": ["Research challenges faced by SCADA systems in risk assessment are outlined in [37] and [38]."]} +{"2332366|86629084": []} diff --git a/edge/graph_208157490.jsonl b/edge/graph_208157490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45cf9073ec7d2c34f74d508658936cc8f17e0fc1 --- /dev/null +++ b/edge/graph_208157490.jsonl @@ -0,0 +1,8 @@ +{"38895231|18440098": ["Where hand movements have been considered explicitly, the emphasis has been on communicative gestures such as those used in sign languages [57, 61] or on the use of hand motion to control computers and musical instruments [83]."]} +{"38895231|7360895": ["While there is extensive work on producing expressivity in humanoid robots [12, 17, 32], fewer works consider generalizing human-like affective expressions to other non-anthropomorphic structures and mechanisms [6, 71, 84]."]} +{"8354046|7665100": ["The seamless integration of the complementary skills of humans (dexterity, task knowledge, flexibility) and robots (speed, strength, precision, repeatability) will have a huge impact on applications ranging from industrial manufacturing to assistance and medical robots [6]."]} +{"8909542|6857179": ["Recent works in HCI/HRI have investigated the use of a dimensional representation and further exploration of the utility of dimensional representations in HCI/HRI is advised [4], [7]."]} +{"8909542|2355696": []} +{"8909542|1118130": ["This is closely related to social signal processing in HCI/HRI [192], [193]."]} +{"3420056|18105696": []} +{"3702045|7360895": ["Future studies are needed that verify the designed emotion expressions in other cultures and user populations with other sociocultural norms that may influence emotional expression [17].", "Benefits of expressing artificial emotions by a robot are to establish social bonds, facilitate empathic inferences about the current internal state in familiar human terms and guiding subsequent behavior [11,17,18]."]} diff --git a/edge/graph_208158234.jsonl b/edge/graph_208158234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cffe69265127b039fb7643da26f665e68860612e --- /dev/null +++ b/edge/graph_208158234.jsonl @@ -0,0 +1,2 @@ +{"12926496|14808716": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_208190657.jsonl b/edge/graph_208190657.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd55ca56cfcf8293ccd216e5637062a99a26ae5c --- /dev/null +++ b/edge/graph_208190657.jsonl @@ -0,0 +1,23 @@ +{"46598143|194321": []} +{"26619090|18973396": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"26619090|3241708": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"86668588|5039874": ["Although [14] and [18] analyzed the security problems and surveyed recent advance"]} +{"86668588|3119314": ["It is suited for various scenarios, such as smart gird [7], smart traffic lights [8], augmented reality applications [9], video streaming [10], and so on."]} +{"86668588|3767252": ["Service Manipulation Attack [4]: A device might participate in the provision of services and manipulate the outcome of the service.", "Service Manipulation Attack [4]: A device might participate in the provision of services and manipulate the outcome of the", "The advantage of cloud computing is that cloud servers have abundant computing and storage resources to allow a very large quantity of users to access the services provided by cloud [4].", "Some researchers surveyed the security and privacy challenges in fog computing [4], [12], [13], but they did not discuss the exiting security solutions about fog computing.", "Therefore, they are highly susceptible to physical attacks [52], including nature disaster, energy supply shortage, device damage, etc. Injection of Information Attack [4]: An adversary can con-trol and reprogram a device to distribute fake information.", "Injection of Information Attack [4]: An adversary can con-", "Though there exist several surveys on security and privacy issues in edge computing [4], [7], [9], [12]\u2013[20], it still lacks a comprehensive survey on security and privacy of data analytics"]} +{"86668588|14745481": ["The PTM method usually makes a binary decision based on whether a requeste allows access request [34]."]} +{"86668588|67867022": ["Forgery Attack: Forgery is a common attack in wireless communications.", "Man-in-the-Middle Attack: Edge nodes like gateways may be compromised and private communications could be inter-cepted by a fake node once an attacker exerts control over normal edge nodes [7].", "Service Manipulation Attack [4]: A device might participate in the provision of services and manipulate the outcome of the service.", "Tampering Attack [56]: A tempering adversary can maliciously delay, drop, or even alter transmitting data to undermine edge computing and degrade the efficiency of edge nodes.", "Physical Attack: In the edge computing, most IoT devices are deployed in unattended or outdoor environments, such as tunnels, subways, factories, etc.", "Tampering Attack [55]: A tempering adversary can maliciously delay, drop or even alter transmitting data to undermine edge computing and degrade the ef\ufb01ciency of edge nodes.", "Eavesdropping Attack: Due to the broadcast nature in wireless communications, the edge computing is vulnerable to eavesdropping attacks.", "Sybil Attack: A Sybil attacker claims a large number of client identities or impersonate some legal nodes to control or compromise the whole edge computing framework.", "Insider Attack: The data theft attack raised by an internal adversary is one of serious attacks in cloud computing and edge computing.", "Distributed Denial of Service (DDoS) Attack: DDoS attack is a severe attack in edge computing.", "Therefore, they are highly susceptible to physical attacks [52], including nature disaster, energy supply shortage, device damage, etc. Injection of Information Attack [4]: An adversary can con-trol and reprogram a device to distribute fake information.", "Sinkhole Attack [54]: A rogues router performs routing and attracts surrounding nodes using unfaithful routing information.", "Jamming Channel Attack: An attacker purposely sends a huge number of forged messages to exhaust communication channels or computing resources, which makes legal users unable to communication with each other."]} +{"9514634|9060471": ["The field of truth discovery has recently attracted enormous attention from the data mining and crowdsourcing communities [102, 175]."]} +{"9514634|3330313": ["Outlier detection can be broadly classified as either model-based or consensus-based techniques [73]."]} +{"125476571|36250251": []} +{"125476571|1353379": ["[16] focused on the data fusion in smart ubiquitous environments but ignored the security and privacy issues in IoT.", "The literatures [15-18] have provided deep discussion and introduction to these methods.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT environments Ignore privacy and security in IoT data fusion [17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life Do not touch the privacy issues and the difference and relationships among different applications in IoT [20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation Do not touch the privacy issues and the difference and relationships among different applications in IoT Our work Specify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods"]} +{"125476571|3119314": ["Different from cloud computing, edge computing [123-126] as a decentralized paradigm is proposed to support real-time services, location awareness and mobility, which is appropriate for various real-time application scenarios, such as smart gird and smart traffic [127], etc."]} +{"125476571|3767252": []} +{"125476571|5664472": ["However, visual data affect the privacy of inhabitants, which calls for privacy preserving approaches in videos and images [54, 63-65]."]} +{"125476571|16051476": ["The literatures [15-18] have provided deep discussion and introduction to these methods.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT\nenvironments Ignore privacy and security in IoT data fusion\n[17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life\nDo not touch the privacy issues and the difference and relationships among different applications in IoT\n[20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation\nDo not touch the privacy issues and the difference and relationships among different applications in IoT\nOur work\nSpecify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods\nTable 1 compares existing related surveys with our work.", "Objectives and Topics Limitation [15] Focus on data fusion algorithms and theories Not highly related to IoT data fusion [16] Focus on data fusion methods in specific IoT environments Ignore privacy and security in IoT data fusion [17] Classification of data fusion methods: stage-based methods, feature-level-based methods, semantic-based methods Do not touch concrete IoT application scenarios [18] Classification of data fusion methods according to challenging problems of input data Do not discuss concrete IoT applications [19] Focus on sensing and fusion methods for identification of activities in daily life Do not touch the privacy issues and the difference and relationships among different applications in IoT [20] Analyze existing work according to an evaluation framework with ten features Do not cover any security and privacy issues [21] Focus on the challenges and issues in intelligent transportation Do not touch the privacy issues and the difference and relationships among different applications in IoT Our work Specify data fusion requirements; analyze existing work in different IoT application domains; point out the differences and characteristics of three popular IoT application domains; emphasize security and privacy issues in data fusion of IoT and provide some possible solutions Do not touch too much on detailed design of fusion methods", "[15] provided a review on data fusion techniques, but they did not give a discussion on the data fusion specifically designed for IoT big data."]} +{"15242264|1940388": ["We present two instantiations that attain privacy guarantees with provable security, at very low additional computational cost and almost no extra communication overhead."]} +{"57818431|11853471": ["[6], the obfuscation method [7], and differential privacy [8,9]."]} +{"15767557|9060471": ["In fact, many sophisticated state-of-the-art data aggregation mechanisms, such as those proposed in [34\u201338], also adopt the weighted aggregation method to calculate the aggregation results.", "\u2022 Then, the workers and the platform start the auctioning stage, where the platform acts as the auctioneer purchasing the labels provided by the workers."]} +{"15044156|20905429": ["For a more complete survey of assistive healthcare systems, the reader is referred to [27]."]} +{"14971653|2457428": ["The notations in Table I are used throughout the rest of this\npaper."]} +{"86666348|36250251": []} +{"86666348|3628110": ["When a single miner holds more than half of existing coins in Ethereum, the miner can conduct 51% attacks [55]."]} diff --git a/edge/graph_208202112.jsonl b/edge/graph_208202112.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5518ed293d9c2e00f91339ad2f5cfe359a3d123 --- /dev/null +++ b/edge/graph_208202112.jsonl @@ -0,0 +1 @@ +{"1408197|6864410": [", [9,13,15,28,35,39,42,45])."]} diff --git a/edge/graph_208202123.jsonl b/edge/graph_208202123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf5b340ae78080493823b06dab7f76208aba1591 --- /dev/null +++ b/edge/graph_208202123.jsonl @@ -0,0 +1,18 @@ +{"17317931|1929234": ["Four, feature selection is a broad field in continuous evolution, since selection of the most relevant and non-redundant features is not solved for complex problems such as in iris classification [14], [28]\u2013[30]."]} +{"22957962|6863252": ["[25] provide an overview of the state-of-the-art in image registration."]} +{"21774815|393948": ["In this context, we introduce the use of deep learning techniques [20]."]} +{"31650064|393948": []} +{"31650064|11042075": []} +{"35794502|5171123": []} +{"46961645|44286242": ["However, surveys on periocular recognition [39], [40] suggest that few studies have exploited deep learning techniques for boosting periocular matching accuracy.", "Continuous research efforts have been devoted into investigating periocular recognition algorithms under different environments [39], [40]."]} +{"22321960|5171123": ["In the field of biometric recognition, SOM networks have been demonstrated useful for the recognition of faces from a single image [9]."]} +{"205398782|44286242": ["Periocular biometric refers to area around eyes such as eyelids, eye-folds and even eyebrow [93, 16, 7].", "Periocular biometrics have also been surveyed and discussed in [7, 93, 89, 8].", "For instance, periocular region can be used to authenticate an individual when the acquired iris image exhibit blinking or other occlusions as intra-class variations [93, 7, 18, 16, 101, 91].", "Various studies have established the potential of periocular region as a biometric trait [93, 16, 7]."]} +{"53566651|3423943": ["There have been more recent advances in data-dependent hashing algorithms [44]-[46] and effectiveness of such algorithms to improve cross-spectral iris recognition is also part of further extension of this work."]} +{"206592484|456491": []} +{"5689997|11426077": ["Iris recognition systems consist mainly in four different steps [7]: image acquisition, image preprocessing, feature extraction and iris recognition solved using pattern classification solutions."]} +{"23440739|8436894": []} +{"44171827|44286242": ["A detail survey of periocular biometrics research is presented in [39]."]} +{"148571665|9869210": [", only the iris, sclera or eye region) [36, 34, 41, 6, 26]."]} +{"5024194|393948": ["Deep learning methods, especially convolutional neural networks (CNNs), have recently led to breakthroughs in many computer vision tasks such as object detection and recognition, and image segmentation and captioning [22]\u2013[24].", "Deep learning has completely transformed the performance of many computer vision tasks [23], [24]."]} +{"19260336|44286242": []} +{"5848869|44286242": [", [1]) and were justified by the lower number of degradation fac-", "Refer to the surveys on periocular biometrics due to AlonsoFernandez and Bigun [1] and Nigam et al. [13], for additional information about the periocular biometrics research.", "Refer to the surveys on periocular biometrics due to AlonsoFernandez and Bigun [1] and Nigam et al."]} diff --git a/edge/graph_208206567.jsonl b/edge/graph_208206567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..505d5bdc8eb78f5538579a44b7427f9d9b5fb1ce --- /dev/null +++ b/edge/graph_208206567.jsonl @@ -0,0 +1,59 @@ +{"14847280|14315321": ["The IoT platforms usually provide a set of guiding principles, common protocols, and standards which enable implementation of IoT Application easily [3]."]} +{"11815757|14081693": ["\u2022 Flexibility: As soon as MbD systems configurations become outdated, managers may create new scripts to reconfigure MbD systems on the fly [11]."]} +{"29247910|21386749": ["One of the key drivers for this hype towards the IoT is its believed applicability to a plethora of different application domains [5], like e-health [6], [7], smart-environment [8], smart-home [9] or Industry 4."]} +{"29247910|7774517": ["In this respect, the two techniques that provides the most meaningful information are outlier analysis [36] and data cleaning [37].", "From the myriad of different approaches already available in the literature [36], we decided for a practical, yet simple approach that will be defined in Section V."]} +{"29247910|10011823": ["The second one, data cleaning, is part of the data\u2019s life cycle [40] and goes a step further, taking action and removing the anomalous data from the stream."]} +{"45772000|3029414": []} +{"13223117|20905429": ["They are equipped with medical sensors that are capable of measuring different parameters such as the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels [35]."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"46823051|9495329": ["Bizanis and Kuipers [91] surveyed SDN and NV solutions for the IoT devices."]} +{"46823051|1599458": ["5) Survey of data mining [27], [31], [32].", "According to the Gartner Research report, the number of IoT devices will reach 25 billion in a few years [27], [43].", "An alphabetically sorted short list follows below [3], [27], [44], [45].", "Some of the context-aware studies in IoT are summarized in [27]."]} +{"46823051|1520906": []} +{"46823051|10213552": ["Available: http://thinkaurelius.github.io/titan/ and H 2 O (parallel processing engine that contains math and machine learning libraries) [37], [38], [209].", "\u2026engine) [207], All-Pairs (used for biometrics, bio-informatics data mining) [37], Pregel (processes large sized graphs) [208], Spark (works faster than Hadoop because of memory caching) [38], Storm (processes streaming data in real-time) [38], Flink (batch and stream processing) [38], 20 [Online].", "Dynamo (Amazon) [192], Voldemort (LinkedIn) [193], Azure [37], [38].", "OrientDB, 20 Neo4J, 21 and Titan 22 represent some examples of graph-based databases [38].", "7) Survey of big data analytics [37], [38].", "These include: Mahout [210], Spark MLlib 26 [211], H 2 O [38], SAMOA (Scalable Advanced Massive Online Analysis) [212], Flink-ML [38], Weka [213], Oryx, 27 and Vowpal Wabbit [38]."]} +{"46823051|1349348": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "There are also different approaches for context modeling, such as multidisciplinary, domain focused, user-centric, and chemistry inspired [26]."]} +{"46823051|7329149": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|1598350": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|5310274": []} +{"46823051|3348390": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "There are three main steps of context reasoning: 1) context preprocessing; 2) sensor fusion; and 3) context inference [21], [107].", "Context reasoning can be classi\ufb01ed as different categories [21]: fuzzy logic, ontology-based, probabilistic logic, rules, supervised learning, and unsupervised learning.", "These \ufb01ve factors are explained in [21].", "[21].", "Perara et al. [21] mentioned that there were different context life cycles.", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "3) Survey of context awareness [21], [23]\u2013[29].", "According to [21], there are seven main characteristics: 1) architecture; 2) complex system; 3) everything as a service; 4) intelligence; 5) size considerations; 6) space considerations; and 7) time considerations.", "Perera et al. [21] de\ufb01ned the features of context awareness related with IoT, according to [10], [94], and [97]."]} +{"46823051|9429730": ["4) Survey of machine learning on speci\ufb01c topics (human activity recognition, mobile phones sensing, body sensor networks, and WSN) [24], [30], [31]."]} +{"1442447|3348390": ["\u2026quick deployment of new network elements and architectures [51]; (cid:129) co-existence of heterogeneous network architectures over a common infrastructure [52]; (cid:129) all the time reachability [53]; (cid:129) self-management of network objects, achieved through context awareness [54]."]} +{"4865015|27410217": ["The middleware is one of the enabling technologies for IoT [3], [10].", "In fact, middleware is one of its enabling technologies [3], [10]."]} +{"4865015|16387640": ["Therefore, binary encodings such as Apache Thrift and Google\u2019s Protocol buffers are better suited for most IoT devices [25]."]} +{"4865015|3348390": ["More information regarding other context modeling techniques, as well as context in general can be found in [80].", "A system is context-aware if it is capable of providing relevant information or services according to the task demanded by the user [80].", "Regarding user interaction, systems are classified into three levels of contextawareness [80]: 1) personalization; 2) passive; and 3) active."]} +{"2275555|14849079": ["[Yin et al. 2015] conducted a survey on Smart Cities.", "The differences between these two concepts are discussed by Cocchia [Cocchia 2014] and by Yin et al. [Yin et al. 2015].", "Yin et al. [Yin et al. 2015] conducted a survey on Smart Cities."]} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"67868738|3029414": ["Several initiatives have emerged worldwide to reshape the Internet under the future Internet (FI) banner [3], [4]."]} +{"198147114|9352595": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"19054504|3029414": ["Also, it looks for the convergence of computing and communications, merging technologies like cloud and mobile computing, Internet of things (IoT), service frameworks, software-defined networking (SDN), network function virtualization (NFV) and distributed systems (Alberti, 2012; Alberti, 2013)."]} +{"4327571|3348390": ["There exist some open issues for better middleware support to facilitate the development of IoT applications [1][2][5]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"67866940|21705502": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|206578224": ["Also, to better cope with lowlatency IoT applications, the Edge computing paradigm is boosting the deployment of micro data centers at the edge of the network [40].", "In this vein, the Edge computing paradigm [40] is rapidly gaining momentum, promoting distributed small-scale cloud environments deployed at the edge of the network to execute applications near to the IoT devices."]} +{"67866940|24110634": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [102] [117] [118] [119]."]} +{"67866940|34643772": ["Different works have started to investigate and address some of these challenges [25], [26].", "In [23]\u2013[25], SDN-based security solutions are proposed to enhance network protection."]} +{"67866940|9495329": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|4427557": [", Narrowband IoT) [44]."]} +{"67866940|2332366": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|26368310": ["Several solutions are available to enable resilience and availability for cloud-based deployment [154]."]} +{"67866940|3767252": ["Indeed, accounting for the exponential increase of micro edge data centers, verification of their trustworthiness can be highly challenging [191]."]} +{"67866940|2829149": []} +{"67866940|12029139": ["Therefore, RFID tags present extremely low costs and can be battery-free by leveraging electromagnetic energy harvesting [33]."]} +{"67866940|485843": ["The most promising usage concerns smart home automation [55], Industrial Internet [36], intelligent transportation systems [56], smart energy [57], enhanced health-care services [58], and smart cities [59]."]} +{"67866940|595093": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|1940388": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|2357830": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17205659": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15].", "Furthermore, remarkable efforts have been carried out over the\npast years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17869045": ["In the following, we focus on the Authentication, Authorization, and Accounting (AAA) framework, which is dedicated for intelligent access control of resources and security policy enforcement [85]."]} +{"67866940|1230643": ["and represent a key enabler for IoT adoption [34]."]} +{"3401285|19636511": ["The topology of an LPWAN is usually star, where wireless sensor nodes transmit measured data to gateways that route data via standard IP connections to a server [2].", "There are some ongoing research projects on integrating LPWAN with cellular network in both industry and academia [2] [12]."]} +{"14315321|1598350": ["As surveyed by Perera et al. in [4], there are many existing IoT products and applications available."]} +{"27410217|3348390": ["hitecture, there are many software components with same or different functionalities that work on mobile and sensor networks in order to communicate and process data which collected from the sensors? [22]. This architecture is composed of streams and nodes. Nodes operate the data through streams with other nodes and it makes them suitable for mobile devices. E. Centralized In this architecture all the", "ellde\ufb01ned framework or architecture. Each architecture has unique attributes therefore, they can be categorized based on different parameters as oppose to make an explicit and \ufb01xed categorization. In [22], C. Perera et al, proposed a general TABLE I: Comparison of different possible architecture designs in middlewares Architecture Bene\ufb01ts Challenges Component-based Reusability, Abstraction support and", "from the other. Determining device\u2019s role is challenging because sometimes we encounter devices that can be considered as both. CaSP used this model to separate processing ad sensing from each other? [22]. This architecture can be classi\ufb01ed into two models based on the functionality of clients. Thin client model: The server is in charge of processing applications and managing data. Here clients just p"]} +{"12511357|1520906": []} +{"12511357|1421946": []} diff --git a/edge/graph_208206606.jsonl b/edge/graph_208206606.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0180e5db82c93587363decce61daca026b60717 --- /dev/null +++ b/edge/graph_208206606.jsonl @@ -0,0 +1,5 @@ +{"8671555|18078738": ["Sensor fault diagnosis and fault-tolerant control methods can be basically categorized as signal-based methods and model-based methods [5], [6]."]} +{"23847306|18078738": ["survey paper [1], model-based and signal-based diagnosis approaches were reviewed."]} +{"3595258|18078738": ["Sensor fault diagnosis currently adopts hardware and analytical redundancy methods [41]."]} +{"3595258|1687471": ["In terms of intelligent sensor algorithm design, an intelligent sensor can integrate all types of intelligent algorithms in a micro-processor unit and accomplish its special functions [62,63]."]} +{"125422400|17905276": ["Condition monitoring is commonly adopted to facilitate the maintenance of catenary [6]."]} diff --git a/edge/graph_208206905.jsonl b/edge/graph_208206905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..018b46f5d576d433ea91d6c4b0df989b7c8fc729 --- /dev/null +++ b/edge/graph_208206905.jsonl @@ -0,0 +1,4 @@ +{"14248476|6486398": [", sparse matrix-vector multiplication [13].", "In addition, each basis vector computation can be easily implemented with parallel computation because its computation is simply the sparse matrix-vector multiplication [13].", "However, it should be noted that non-iterative approaches would practically be prohibitive, particularly when applied to large-scale datasets [2][13].", "To force irreducibility on the Web graph, PageRank employs necessarily the vector p with the damping factor 0 < d < 1 [13]."]} +{"17796619|17516538": ["They may fail to capture temporal saliency faithfully, since instant object motions are sensitive to noise and detected mainly around the boundaries of moving objects [40], [41]."]} +{"5177983|6486398": []} +{"37925315|12681089": []} diff --git a/edge/graph_208207457.jsonl b/edge/graph_208207457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e82326aba8c448adef7329afe36724308581dbd9 --- /dev/null +++ b/edge/graph_208207457.jsonl @@ -0,0 +1,10 @@ +{"18468934|393948": ["The main reason for this disadvantage is that a multi-layer ANN with more than one hidden layer cannot be trained using conventional training\napproaches because of the vanishing gradient problem [7].", "PREDICTION METHODOLOGY"]} +{"113534415|9107727": []} +{"42202395|9928823": []} +{"42202395|393948": []} +{"42202395|9020157": []} +{"109346491|627405": ["The purpose of a systematic review of literature is three-fold (Brereton et al., 2007); (1) To present a fair evaluation of a research topic by means of a rigorous and systematic method; (2) To help in identifying any gaps in the current research in order to suggest further improvements; and (3) To summarize and provide background for new research activities."]} +{"112258055|12358655": []} +{"3269862|18188725": []} +{"3269862|393948": []} +{"24962987|393948": ["A number of prominent deep networks, such as stacked auto-encoder [29], deep belief networks [30], and DBM [31], have shown competitive performance in complex function approximation problems."]} diff --git a/edge/graph_208208447.jsonl b/edge/graph_208208447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208209161.jsonl b/edge/graph_208209161.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c6dd59dfaaff17a3b4c16c4ff9d44c9b5fd529f --- /dev/null +++ b/edge/graph_208209161.jsonl @@ -0,0 +1,348 @@ +{"68121396|206578365": []} +{"1377107|22221919": ["The received signal y \u2208 C by the BS is then expressed as [13]", "Recently, non-orthogonal multiple access (NOMA) has been recognized as one of the key techniques in the fifth-generation (5G) cellular networks [11]\u2013[13]."]} +{"1377107|6909107": ["In order to minimize the energy consumption for local computing, user k applies the dynamic voltage and frequency scaling (DVFS) technique [3] by adjusting the CPU frequency fk,n for each CPU cycle n \u2208 {1, .", "After collecting these bits from the K users, in the second slot with duration \u2206, the MEC server at the BS remotely executes the offloaded tasks on behalf of these users by developing multiple virtual machines (VMs) each for one user [3].", "Consequently, the energy consumption for local computing at user k \u2208 K is given by [3]"]} +{"1377107|206578365": ["In MEC systems, MEC servers are dedicatedly deployed at the network edge (such as cellular base stations (BSs)) to provide cloudlike computing, such that these IoT devices can offload their computation-intensive tasks to the BSs for remote execution [2]\u2013[4]."]} +{"57380247|19938676": []} +{"57380247|5747564": []} +{"57380247|8909218": []} +{"85518398|206578224": []} +{"58670489|3757239": ["In [43], different caching policies for edge caching and content delivery are discussed from various"]} +{"58670489|6909107": ["It aims to smooth and seamless integration of cloud capabilities into the mobile network [21].", "Besides the above studies, Mach and Becvar [21] performed a comprehensive survey of offloading schemes for MEC."]} +{"58670489|206578365": []} +{"58670489|8523192": []} +{"58670489|37966695": ["On the other hand, logically distributed SDN architecture has multiple controllers which have different responsibilities and views of the network [106]."]} +{"58670489|3767252": ["The interested readers may refer to [11]\u2013[15] for more detailed infer.", "Studies [11]\u2013[15] in the literature focus on these paradigms by comparing, examining, and discussing in different perspectives, includ-"]} +{"58670489|2623404": ["bility, and scalability to the network in some scenarios, such as decision-making, forwarding packets, and managing network configurations [90]."]} +{"53753204|12206204": ["machine-to-machine communications, device-to-device (D2D) networks, and internet of things (IoT) among others [3], [4]."]} +{"53753204|3330461": ["onomy is discussed in detail in [17]."]} +{"53753204|7644489": []} +{"69632723|8650651": ["The advantages of the HAL are especially reflected in the Software-Defined Optical Network (SDON) [6].", "widely used in different scenarios such as Google\u2019s backbone network [3], Microsoft\u2019s public cloud [4], NTT\u2019s edge gateway [5], and optical (IP/WDM) network [6].", "[6] briefly describe several representative hybrid SDN solutions in their SDN survey."]} +{"69632723|17248887": []} +{"69632723|4269723": ["Software defined networks (SDN) is an emerging network architecture which separates the control plane and the data plane [2]."]} +{"69632723|58783012": ["debug and operate SDN networks, and companies need to hire experienced SDN network engineers [20]."]} +{"201905371|3494096": []} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"67865446|206578365": ["It aims at providing cloud-computing capabilities at the edge of mobile network [2]."]} +{"17656994|206578365": ["In each time slot t, computation tasks originating from UE m is generated according to a Poisson process which is a common assumption on the computation task arrival in edge systems [1].", "In order to overcome these dif\ufb01culties, cooperation among SBSs can be exploited to signi\ufb01cantly enhance MEC performance and improve the ef\ufb01ciency of system resource utilization via computation workload peer of\ufb02oading.", "Nevertheless, edge servers, such as MEC-enabled SBSs [13], [14], cannot offer the same computation and storage capacities as traditional computing servers.", "As a remedy to these limitations, mobile edge computing (MEC) [1]\u2013[3] has recently emerged as a new computing paradigm to enable in-situ data processing at the network edge, in close proximity to mobile devices and connected things.", "Game theoretic modeling was also applied in the MEC computation of\ufb02oading context in [30] [31].", "The main contributions of this paper are summarized as follows: \u2022 We develop a novel framework for performing stochastic computation peer of\ufb02oading among a network of MEC-enabled SBSs in an online fashion without requiring future system information by leveraging the Lyapunov optimization technique [5].", "In this paper, we study computation peer of\ufb02oading in MEC-enabled small cell networks aiming to address the aforementioned challenges.", "Considered as a key enabler of MEC, small-cell base stations (SBSs), such as femtocells and picocells, endowed with cloud-like computing and storage capabilities can serve end users\u2019 computation requests as a substitute of the cloud [3].", "Although there have been quite a few works on geographical load balancing in data centers, performing workload peer of\ufb02oading for MEC-enabled small cell networks faces unique challenges as follows."]} +{"17656994|10299098": ["As a remedy to these limitations, mobile edge computing (MEC) [1]\u2013[3] has recently emerged as a new computing paradigm to enable in-situ data processing at the network edge, in close proximity to mobile devices and connected things.", "In this paper, we investigated peer offloading schemes in MEC-enabled small cell networks where heterogeneous task arrival pattern in both spatial and temporal domains is considered.", "In this paper, we study computation peer offloading in MEC-enabled small cell networks.", "Although there have been quite a few works on geographical load balancing in data centers, performing peer offloading in MEC-enabled small cell networks faces unique challenges.", "Considered as a key enabler of MEC, small-cell base stations (SBSs), such as femtocells and picocells, endowed with cloud-like computing and storage capabilities can serve end users\u2019 computation requests as a substitute of the cloud [3].", "Although cloud computing enables convenient access to a centralized pool of configurable and powerful computing resources, it often cannot meet the stringent requirements of latency-sensitive applications due to the often unpredictable network latency and expensive bandwidth [1]\u2013[3].", "To overcome these difficulties, cooperation among SBSs can be exploited to enhance MEC performance and improve the efficiency of system resource utilization via computation peer offloading.", "Nevertheless, edge servers, such as MEC-enabled SBSs [21], cannot offer the same computation and storage capacities as traditional computing servers.", "The main contributions of this paper are summarized as follows:\n1) We develop a novel framework called OPEN (which stands for Online PEer OffloadiNg) for performing stochastic computation peer offloading among a network of MECenabled SBSs in an online fashion by leveraging the Lyapunov optimization [5].", "Game theoretic modeling was also applied in the MEC computation offloading context in [14] and [15]."]} +{"17656994|3767252": ["Considered as a key enabler of MEC, small-cell base stations (SBSs), such as femtocells and picocells, endowed with cloud-like computing and storage capabilities can serve end users\u2019 computation requests as a substitute of the cloud [3].", "As a remedy to these limitations, mobile edge computing (MEC) [1]\u2013[3] has recently emerged as a new computing paradigm to enable in-situ data processing at the network edge, in close proximity to mobile devices and connected things."]} +{"52931590|9104850": ["proxy servers and/or intermediate nodes of the network [27]."]} +{"3358525|3330461": []} +{"3358525|7644489": ["3GPP speci\ufb01ed the basic functionalities for D2D communications in release 12, where the main motivation was to develop a global standard for public safety communications [37]."]} +{"5075034|3767252": []} +{"159042571|206578486": ["Similarly, some of the studies also identified IoT, ICN [1], [10], MEC [191], [192], [193] fog computing [192], [194] andCloudRadioAccessNetwork (C-RAN) [195], [196] as a use case for NFV and discussed it in the perspective of future NFV research direction."]} +{"159042571|206456479": ["The concept of 5G network slicing is an example of such isolation where multi-tenancy can be supported by slicing underlying physical infrastructure [75], [76].", "5G network slicing concept is introduced to support multitenancy, multi-vendor, and multi-domain in virtualized networking environments [75], [76]."]} +{"159042571|25911553": ["toward providing solutions to today\u2019s and future networks [197], [198]."]} +{"159042571|206578365": ["Furthermore, this term \u2018\u2018Netsoft\u2019\u2019 was first introduced at the academic conference Network softwarization in 2015, to include broader interests regarding NFV, SDN, network virtualization, Multi-access Edge Computing (MEC) formerly known asmobile edge computing, Cloud computing, and IoT technologies [190].", "LIST OF ABBREVIATIONS/ACRONYMS 3GPP 3rd Generation Partnership Project 5G Fifth-Generation APIs Application Programmable Interfaces ARIB Association of Radio Industries and Businesses ATIS Alliance for Telecommunications Industry Solutions ATM Asynchronous Transfer Mode BB-Forum Broadband Forum BRAS Broadband Remote Access Server BSS Business Support System CAPEX Capital Expenditure CCSA China Communications Standards Association CGN Carrier-Grade Network CLI Command Line Interface COTS Commercial-Off-The-Shelf CPE Customer Premises Equipment C-RAN Cloud Radio Access Network CSPs Communication Service Providers DevOps Development and Operation DPDKs Data Plane Development Kits E2E End-to-End EMS Element Management System EPC Evolved Packet Core ETSI European Telecommunications Standardization Institute FPGAs Field-Programmable Gate Arrays GSMA Global System for Mobile Communications HSS Home Subscriber Server ICN Information-Centric Networking ICTs Information Communication Technologies IEEE Institute of Electrical and Electronics Engineering IETF Internet Engineering Task Force IETF-SFC-WG IETF Service Function Chaining Working Group IMS IP Multimedia Subsystem IoT Internet of Things IRTF Internet Research Task Force ISG Industry Specification Group ISP Internet Service Provider ISPs Internet Service providers KPIs Key Performance Indicators KVM Kernel Based Virtual Machine LAN Local Area Network LTE Long-term Evolution LXC Linux Containers MAC Medium Access Control MAC Medium Access Control\n60458 VOLUME 7, 2019\nMEC Multi-access Edge Computing MEF Metro Ethernet Forum MME Mobility Management Entity NFs Network Functions NFV Network Functions Virtualization NFVI Network Functions Virtualization Infrastructure NFVI-PoP NFVI Point of Presence NFV-ISG NFV Industry Specification Group NFV-MANO NFV Management and Orchestration NFVO NFV Orchestrator NFVRG NFV Research Group NGDCN Next-Generation Data Center Networking NGNs Next Generation Networks NP Non-deterministic Polynomial Time N-PoP Network Point of Presence NS Network Service NV Network Virtualization NVE Network Virtualization Edge OCI Open Container Initiative OPENSIG Open Signaling OPEX Operational Expenses OS Operating System OSI Open System Interconnection OSS Operation Support System PCRF Policy and Charging Rules Function P-GW Packet Data Network Gateway PNFs Physical Network Functions PoC Proof of Concept PSTN Public Switched Telephone Network REST Representational State Transfer RHEV Red Hat Enterprise Virtualization SDN Software-Defined Networking SDO Standard Development Organization SFC Service Function Chaining S-GW Serving Gateway SLAs Service Level Agreements TIA Telecommunications Industry Association TM-Forum Tele Management Forum TSG-SA Technical Specification Group Service System Aspects TSPs Telecommunication Service Providers TTA Telecommunications Technology Association TTC Telecommunication Technology Committee vCDN Content Delivery Network vCPE Virtual Customer Premises Equipment vEPC Virtual Evolved Packet Core VLANs Virtual Local Area Networks VM Virtual Machine VMM Virtual Machine Manager VN Virtual Network VNFs Virtual Network Functions VPNs Virtual Private Networks VXLAN Virtual eXtensible Local Area Network\nREFERENCES [1] R. Mijumbi et al., \u2018\u2018Network function virtualization: State-of-the-art\nand research challenges,\u2019\u2019 IEEE Commun.", "Similarly, some of the studies also identified IoT, ICN [1], [10], MEC [191], [192], [193] fog computing [192], [194] andCloudRadioAccessNetwork (C-RAN) [195], [196] as a use case for NFV and discussed it in the perspective of future NFV research direction.", "[190] B. Blanco et al., \u2018\u2018Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN,\u2019\u2019 Comput."]} +{"159042571|6583734": ["technologies together in a network architecture is more desirable [8].", "For instance, [1], [7], [8], [10], [49] have attempted to survey NFV and discusses state of the art, NFV relationship with Cloud computing and SDN, research challenges and opportunities for NFV innovations etc.", "Further, NFV has been introduced to fulfill telecommunications operators needs in two main aspects: 1) First, by extending virtualization concept towards networking [8] i."]} +{"159042571|15449163": ["These includes, Network Functions Virtualization (NFV) [1], Software-Defined Networking (SDN) [2], Cloud computing [3], Internet of Things (IoT) [4], InformationCentric Networking (ICN) [5] and the Fifth-Generation (5G) [6] of telecommunications networks, all reputed to transform ICTs infrastructure to fulfill the needs of future"]} +{"159042571|10837932": []} +{"159042571|69839438": ["The second category covers efforts that have been focusing on NFV resource allocation [34] and orchestration [35], and aspects which focuses on Virtual Network Functions (VNFs) placement [36]\u2013[38] scheduling [39], [40], and migration algorithms [41], [42]."]} +{"174804629|52059869": ["This issue can be addressed with network slicing [77], in which a subset of the underlying physical network (i.e., a network slice) is dedicated such that a set of requirements (e.g., latency, throughput, and reliability) are guaranteed [78]."]} +{"174804629|29464310": ["1(a), the baseband unit (BBU) and the remote radio head (RRH) are connected by a fronthaul interface (e.g., a common public radio interface (CPRI) [15])."]} +{"174804629|3200945": ["The cooperative transmission can be achieved with network coding (NC) 2 [50], [51], or with coordinated multipoint (CoMP) transmission and reception 3 [54]."]} +{"174804629|7800459": ["2 NC can also improve the performance of distributed storage considered in our scenario, in terms of maintenance bandwidth [52], [53]."]} +{"174804629|469744": ["This describes, for instance, why the head motion with old AR/VR technologies cannot be reflected in live streaming on the HMD on time, which causes motion sickness and, subsequently, discomforts such as headaches, eye strain, and nausea [5]."]} +{"132301646|6909107": ["Due to its promising potential, a lot of research attention is focused on enabling low-latency and energy-efficient mobile computation offloading in the area of MEC [8], [9]."]} +{"132301646|10299098": ["Due to its promising potential, a lot of research attention is focused on enabling low-latency and energy-efficient mobile computation offloading in the area of MEC [8], [9]."]} +{"3428636|3757239": ["Mobile devices are equipped with cheap and large storage capacity, motivated by this, edge caching is proposed as a promising technology, which can relief the congestion problem of backhaul links [3]."]} +{"198930511|4415243": ["The term \u2018\u2018SDCC\u2019\u2019 is itself complicated [21]."]} +{"198930511|4710623": []} +{"198930511|7193801": ["VMWare [51] defines SDS as a fundamental component of the SDDC."]} +{"198930511|31220827": []} +{"198930511|49869020": ["The SDN concept suggests separating network control functions from its data plane for ease of administration and allows remote access to the data center (DC) switches for network traffic management [2]\u2013[5]."]} +{"52128436|16378550": []} +{"52128436|3330461": ["To ensure fairness, the social-connections between users should be utilized to improve the QoS and the overall energy efficiency of D2D communications [10], [45], [136].", "In [10], classification of D2D communications with respect to inband and outband D2D communications is presented."]} +{"52128436|7644489": ["D2D communication is defined as direct communication between cellular user equipments (UEs) without passing through cellular infrastructures, conceived for long term evolution-advanced (LTE-A) under the 3GPP [4]."]} +{"52128436|14745481": ["These properties include personalize or subjective, asymmetric/symmetric, transitive/non-transitive, explicit/implicit, direct/indirect or recommended/hybrid, dynamic, contextdependent, and generic/specific-situation [60], [61]."]} +{"52128436|18411031": ["It performs an operation on encrypted data without knowing the original data [206]."]} +{"198341004|206578224": [", mobile devices, wearable devices and sensors) are expected to be connected to the Internet, indispensable for a wide variety of IoT applications, ranging from intelligent video surveillance and Internet of Vehicles (IoV) to augmented reality [1]\u2013[5].", "The rationale is that, typically edge servers are interconnected by high-speed local area network and computing resource sharing can be much more demanding [1], [6].", "To process such a tremendous amount of data streams which typically requires vast computing resources and very low latency, the concept of edge computing (EC) [1] has been recently proposed."]} +{"13494014|3042864": []} +{"13494014|14889616": ["264/SVC standards was developed by International Telecommunication Union (ITU) in 2007 [35]."]} +{"127307268|21705502": ["Meanwhile, with the development of Internet of Things (IoT) [16, 17], fog computing has been proposed and has attracted a lot of attention of academia and industry [18, 19]."]} +{"127307268|3746886": ["Thanks to the development of cloud computing technology [2\u2013 4], offloading computation tasks to cloud computing server for processing first gets the attention from the academia and industry [5\u20137]."]} +{"127307268|206578224": []} +{"127307268|6909107": ["Accordingly, computation offloading to MEC has become the emerging technology, which can not only save the energy consumption and extend the battery life-time of MT, but also reduce the delay of computation offloading [12]."]} +{"127307268|3330461": ["D2D is being considered as a key enabling technology in 5G cellular networks due to the inherent need for high data rate, delay constrained, and QoS specific communication [30, 31]."]} +{"127307268|3494096": ["Meanwhile, with the development of Internet of Things (IoT) [16, 17], fog computing has been proposed and has attracted a lot of attention of academia and industry [18, 19]."]} +{"44104746|4566470": ["I. INTRODUCTION Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason.", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|24855581": ["Deep learning has shown significant potential in approximating and reducing large, complex datasets into highly accurate predictive and transformational output, greatly facilitating human-centered smart systems [25], [98].", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|4884302": ["An alternative to the quality function, the advantage function represents relative state-action values, as opposed to absolute state-action values [19].", "The state-action value function, otherwise known as the quality function, is the source of Q-learning [19], [21].", "The model was tested both in simulated and in real environments, and experiments were conducted to evaluate appropriate model horizons and bootstrapping efficacy, sample efficiency of classification and regression for value versus collision probability predictions, and performance against various double Q-learning approaches.", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "This type of deep learning has been heavily applied to the field of robotics and computer vision [19].", "[169] J. Zhu, Y. Song, D. Jiang, and H. Song, \u2018\u2018A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things,\u2019\u2019 IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2759728.", "The two primary means of reinforcement can be divided between policy search and value function approximation, though hybrids of both have been introduced [19].", "As a seminal work on the application of Q-learning and Deep Q-Networks (DQN), Mnih et al. [93] implemented a DQN to play 49 different Atari 2600 videogames, observing four frames as environment data, extracting the game score as reward, with controller and button combinations encoded as actions.", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning.", "These typically output parameters for a probability distribution, either for continuous or discreet actions, resulting in a stochastic policy [19].", "[21] A. Bonarini, A. Lazaric, F. Montrone, and M. Restelli, \u2018\u2018Reinforcement distribution in fuzzy Q-learning,\u2019\u2019 Fuzzy Sets Syst., vol. 160, no. 10, pp. 1420\u20131443, 2009.", "For example, Zhu et al. [169] implemented stacked auto-encoders (SAEs) to realize Q-learning for transmission scheduling in cognitive IoT relays."]} +{"44104746|3645740": ["Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|31245252": [", network congestion and latency are only going to increase without a diverse array of complementary solutions [80], [82], [125], [127], [143], [147], [148], [161].", "With the unceasing growth of IoT and smart-world systems driven by the advance of CPS, in which all devices are network connected and able to communicate sensed data and monitor physical objects, larger and larger datasets are becoming available for the application of deep learning, poised to materially impact our daily lives [36], [81], [82], [89], [91], [143], [144], [161].", "Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151].", "[58], [80], [82], [94], [125], [127], [143], [145], [147], [148], [161], [165].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|2829149": ["Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151]."]} +{"44104746|3818445": ["Securing the data, operation, and mechanisms of deep learning are all the more relevant in considering edge computing, which can be a viable computing infrastructure to provision deep learning schemes [155], supporting a variety of smart-world systems (smart cities, smart manufacturing, smart grid, smart transportation, and many others).", ") are also forthcoming [13], [155], [157].", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"102155|3330461": ["DEVICE-TO-DEVICE (D2D) communications boosts the throughput of cellular networks by offloading traffic [2], [3], and thus is a promising way to achieve the goal of 5th generation (5G) mobile networks.", "Traditional D2D communication, which does not cache content locally, can only offload peer-to-peer (P2P) traffic from cellular networks if source and destination are in proximity at the time they wish to communicate, such as gaming [2], sharing files via local multicast [4], finding friends via proximity based social services [5] and offloading cellular sessions to unlicensed band [6].", "According to whether the D2D and cellular links reuse the same frequency band or not, the D2D communications can operate in the following two modes [2]."]} +{"102155|7644489": ["DEVICE-TO-DEVICE (D2D) communications boosts the throughput of cellular networks by offloading traffic [2], [3], and thus is a promising way to achieve the goal of 5th generation (5G) mobile networks."]} +{"85559213|51922885": ["The idea of \u201ccompute and forward\u201d is realized by new technologies, such as Software Defined Networking (SDN) [11], Network Function Virtualization (NFV) [12]\u2013[19], and Service Function Chaining (SFC) [20]\u2013[34] standardized by the IETF/IRTF.", "In addition, SDN can direct the data flows towards the network coding VNFs and orchestrate them in an SFC [147], [148].", "However, NFV and SDN provide new flexibilities for deploying innovative functions within a network [16]."]} +{"85559213|52059869": ["The idea of \u201ccompute and forward\u201d is realized by new technologies, such as Software Defined Networking (SDN) [11], Network Function Virtualization (NFV) [12]\u2013[19], and Service Function Chaining (SFC) [20]\u2013[34] standardized by the IETF/IRTF."]} +{"85559213|4415243": []} +{"85559213|206578224": []} +{"85559213|69839438": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"2846408|3330461": []} +{"3552149|18392886": ["to adapt it to large-scale networks with different ASes such as the Internet [79].", "This classification has been recently adopted by [79].", "Moreover, Espresso achieves higher availability (reliability) when compared to existing router-centric Internet protocols.", "Digital Object Identifier 10.1109/COMST.2017.2782482\nthe recent emergence of the Internet of Things (IoT) has allowed for the creation of new advanced services with more stringent communication requirements in order to support its innovative use cases.", "Another different class of solutions has been recently introduced by DISCO which promoted a logically distributed control plane based on existing ASs within the Internet.", "The main advantage of the DISCO solution is the possibility to adapt it to large-scale networks with different ASes such as the Internet [79].", "However, that main feature of logically-centralized control which has been leveraged by most SDN solutions to improve\nnetwork management at the intra-domain level, cannot be fully exploited for controlling heterogeneous networks involving multiple Autonomous Systems (ASes) under different administrative authorities (e.g., the Internet).", "Considered as a large-scale SDN deployment for the public Internet, Espresso, which has been in production for more than two years, routes over 22% of Google\u2019s total\ntraffic to the Internet.", "I. INTRODUCTION\nTHE UNPRECEDENTED growth in demands and datatraffic, the emergence of network virtualization along with the ever-expanding use of mobile equipment in the modern network environment have highlighted major problems that are basically inherent to the Internet\u2019s conventional architecture.", "Finally, another important feature of Espresso is that it provides full interoperability with the rest of the Internet and the traditional heterogeneous peers.", "2) SDX-Based Controllers: Different from DISCO which proposes per-domain SDN controllers with inter-domain functions for allowing autonomous end-to-end flow management across SDN domains, recent trends have considered deploying SDN at Internet eXchange Points (IXPs) thus, giving rise to the concept of Software-Defined eXchanges (SDXes).", "In the same spirit, INRIA\u2019s D-SDN [92] enables a logical distribution of the SDN control plane based on a hierarchy of Main Controllers and Secondary Controllers, matching the organizational and administrative structure of current and future Internet."]} +{"3552149|11414835": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-", "In the case of an underlying physical SDN network, this could be implemented using an SDN network hypervisor that creates multiple logically-isolated virtual network slices (called vSDNs), each is managed by its own vSDN controller [14]."]} +{"3552149|2623404": ["In particular, surveys published in IEEE CST over the last few years elaborated on various topics within the SDN scope such as the concept, benefits and historical roots [9, 10], the architecture elements and", "the design challenges [9, 10, 11, 12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management challenge in SDN [16] and the application of SDN in wireless networks [17]."]} +{"3552149|4269723": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-"]} +{"189824793|49564949": ["Fog computing allocates a large amount of processing, storage, communication, control, configuration, measurement, and management functions at the edge of mobile network [172].", "However, if readers are interested to explore about various aspects of fog computing and its comparisons with cloud computing, then we refer them to [169]\u2013[172]."]} +{"189824793|206578486": ["The term of \u2018\u2018Fog Computing\u2019\u2019 was initiated by Cisco [171], which means \u2018\u2018fog is a cloud close to ground\u2019\u2019 and it is used to extend the cloud computing to the edge of the network.", "Therefore, a new computing model for storing, processing, managing, analyzing, and acting on network data was proposed, which is called Fog Computing [170].", "[283] S. K. Datta, S. Kanti, C. Bonnet, and J. Haerri, \u2018\u2018Fog Computing architecture to enable consumer centric Internet of Things services,\u2019\u2019 in Proc."]} +{"189824793|21557844": ["Reference [209] surveys most of the mmWave radio propagation models."]} +{"189824793|42420797": ["These survey papers explore C-RAN from various perspectives such as security [87], architecture [69], [75] and NFV/SDN [103].", "In [87], the authors present a detailed", "So far, a small number of studies has been carried out to explore possible solutions to security threat in C-RAN [75], [87]\u2013[90].", "Transmission Control Protocol (TCP) flooding attacks in the transport layer, andmalware and File Transfer Protocol (FTP) attacks in the application layer [87]."]} +{"189824793|206456479": ["Moreover, a comprehensive survey on architecture and further research directions of network slicing is also available in [318]."]} +{"189824793|10235514": ["In [12], an overview is provided on 5G research, standardization trials, and deployment challenges."]} +{"189824793|25911553": []} +{"189824793|6909107": ["Besides, an exclusive overview on computation offloading is provided in [265].", "This challenge can be overcome by developing new advanced techniques enabling fast VM migration [265]."]} +{"189824793|18167210": ["In [17], the ongoing researching works on key enabling technologies for 5G are comprehensively reviewed."]} +{"189824793|4344513": ["However, they are still constrained by major technical challenges, including implementation complexity, Radio Frequency (RF) interference, environmental obstacles, and antenna correlation [4]."]} +{"189824793|9495329": ["However, limitations to the deployment of both NFV and SDNwidely exist in security, management, orchestration, isolation, resources allocation, dynamicity, flexibility, and scalability [8], [9]."]} +{"189824793|6583734": ["Reference [298] investigates the deployment of NFV in software-defined NFV architecture."]} +{"189824793|15449163": ["The authors of [16] investigate advantages, applications,"]} +{"189824793|19938676": ["considered as 5G key enabling technologies [7], [11], [47].", "The authors of [11] have provided an overview of 5G network archi-"]} +{"189824793|12206204": ["to trillions of IP-based \u2018\u2018things\u2019\u2019 by 2020 [239], [240]."]} +{"189824793|2623404": ["references such as [303], [304], [306], [310], where above mentioned aspects of SDN are thoroughly discussed.", "Despite above discussed technical papers, there are several survey papers available, which study SDN from different aspects such as [303]\u2013[310].", "Paper [310] discusses literature related to"]} +{"189824793|3330461": ["Reference [227] provides a review of existing literature on D2D communication from spectrum perspective."]} +{"189824793|8909218": ["operations, administration, management, access, interference management, local IP access (LIPA) and architecture that can be found in [116]\u2013[119]."]} +{"189824793|3494096": ["nication technologies in [242], access management techniques in [243], radio resource management in [244], economic considerations for facilitating the deployment of MTC in [245], and surveys on mMTC in perspectives of service requirements and technical challenges are available in [246], [247]."]} +{"5021660|3757239": []} +{"5021660|6909107": ["Additionally, many researchers have studied different aspects of MEC [11]\u2013[13], and many the current study is for proposing architectures and/or derivation and analyzing the computation offloading from mobile nodes to MEC servers."]} +{"15900842|206051485": ["For further details we refer to Zitov\u00e1 and Flusser (2003) where a survey on image registration can be found, and to Besl and McKay (1992) for information on the ICP algorithm.", "For further details we refer to Zitova and Flusser (2003) where a survey on image registration can be found, and to Besl and McKay (1992) for information on the ICP algorithm."]} +{"86523357|16378550": ["A key part of the D2D communication is the device discovery of DUs, which is also known as peer discovery or proximity discovery [22]."]} +{"86523357|3330461": ["General surveys on D2D communication and discovery can be seen in [6], [25] and [23], where an exposure for overall D2D communication and its technical details is also included."]} +{"86523357|7644489": ["3GPP has presented the LTE centered proximity services in issuance 12 and 13 to accomplish D2D communication.", "A practical implementation D2D communication challenges in heterogeneous networks are mainly device discovery, inter cell interference, effective medium access control, and resource allocations [4].", "At the same time, 3rd Generation Partnership Project (3GPP) has been also working on D2D communication as a Proximity Services (Pro-Se) [4, 5].", "Though, it can be comprehensive to several cases including a large number of devices to connect in ProSe to one another with the benefit of utilizing the LTE resources.", "3GPP currently has decided that D2D communication in LTE focuses on public safety networks [4].", "Pro-Se has been discussed by many researchers and its feasibility has been made by long term evolution (LTE) [4, 6].", "A comparison is made between different short ranges communication technologies of Bluetooth, Zig-Bee, NFC, Wi-Fi Direct, and in-band D2D (LTE direct) in Table 1.", "The primary focus of LTE was data offloading."]} +{"86523357|17325804": ["However, this method is specific for narrow band channels, and the accuracy cannot be definite for proximity based D2D communication [31]."]} +{"52121043|10299098": ["cache-enabled cloud-radio access networks (C-RANs) and fog-radio access networks (F-RANs) [37], [38]."]} +{"52121043|19938676": [", the fifth generation (5G) networks [2],"]} +{"52121043|3330461": ["Compared with traditional D2D communication networks [112], [113], more D2D links can be activated if the content can be properly cached at user equipment [49], [50], [114], [115]."]} +{"52121043|9104850": ["Caching techniques have been comprehensively studied for Web caching [16], [17], content distribution networking (CDN) [18] and information centric networking (ICN) [19]\u2013[23] in wired networks.", "In the early 1990s, network congestion was precipitated by excessive delivery of Web pages and images, and significantly reduced by Web caching techniques that temporally store the popular files at clients\u2019 computers or proxy servers [16], [24]."]} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"30654518|18392886": []} +{"30654518|15035771": ["Furthermore, trade-offs concerning some concepts such as perormance, resiliency, availability, reliability and flexibility have to e taken into account by network designers and managers while esigning a network architecture [29] ."]} +{"7869810|8909218": []} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"52813717|12029139": ["Usually the macro base stations serve the macro cells and have high transmit powers ranging from 43 dBm to 46 dBm and antenna gains close to 10 to 15 dBi [8]."]} +{"52813717|7644489": ["These scenarios are defined by 3GPP standardization group in their release 12 for proximity-based services [5].", "proximity-based services in its release 12 [5]."]} +{"201814338|58948922": []} +{"201814338|22221919": ["115046 VOLUME 7, 2019\n[34] R. Elouafadi and M. Benjillali, \u2018\u2018Cooperative NOMA-based D2D communications: A survey in the 5G/IoT context,\u2019\u2019 in Proc.", "[203] X. Yue, Y. Liu, S. Kang, A. Nallanathan, and Z. Ding, \u2018\u2018Spatially random relay selection for full/half-duplex cooperative NOMA networks,\u2019\u2019 IEEE Trans.", "[204] Y. Sun, Z. Ding, and X. Dai, \u2018\u2018On the performance of downlink NOMA in multi-cell mmwave networks,\u2019\u2019 IEEE Commun.", "[199] T. Hou, Y. Liu, Z. Song, X. Sun, and Y. Chen, \u2018\u2018Multiple antenna aided NOMA in UAV networks: A stochastic geometry approach,\u2019\u2019 IEEE Trans.", "NOMA involves the cooperative transmission and as such opens up room for the consideration of the interference correlation among receivers in the network.", "[208] M. Salehi, H. Tabassum, and E. Hossain, \u2018\u2018Meta distribution of SIR in large-scale uplink and downlink NOMA networks,\u2019\u2019 IEEE Trans.", "[197] K. S. Ali, M. Haenggi, H. El Sawy, A. Chaaban, and M.-S. Alouini, \u2018\u2018Downlink non-orthogonal multiple access (NOMA) in Poisson networks,\u2019\u2019 IEEE Trans.", "NOMA has been studied using SG in diverse scenarios and network configurations such as Poisson networks [197], [198], UAVs [199], [200], caching [201], cognitive radio networks [202], half/full duplex [203], multi-cell mmwave [204], and for D2D communication using tools from SG [196], [205], [206].", "[206] A. Anwar, B.-C. Seet, and X. Li, \u2018\u2018Quality of service based NOMA group D2D communications,\u2019\u2019 Future Internet, vol. 9, no. 4, p. 73, 2017.", "Interference correlation can be studied with respect to the coexistence of D2D and other enabling technologies for 5G communication networks such as non-orthogonal multiple access (NOMA) [195].", "[205] A. Anwar, B.-C. Seet, S. F. Hasan, X. J. Li, P. H. J. Chong, and M. Y. Chung, \u2018\u2018An analytical framework for multi-tier NOMA networks with underlay D2D communications,\u2019\u2019 IEEE Access, vol. 6, pp. 59221\u201359241, 2018.", "[196] Z. Shi, S. Ma, H. E. Sawy, G. Yang, and M.-S. Alouini, \u2018\u2018Cooperative HARQ-assisted NOMA scheme in large-scale D2D networks,\u2019\u2019 IEEE Trans.", "[198] K. S. Ali, H. El Sawy, and M.-S. Alouini, \u2018\u2018Meta distribution of downlink non-orthogonal multiple access (NOMA) in Poisson networks,\u2019\u2019 IEEE Wireless Commun.", "V-K) has been studied in NOMA [198], [208], it is yet to be studied for relay assisted D2D communication to the best of our knowledge."]} +{"201814338|16378550": ["Furthermore, proper interference management and resource utilization can be achieved [22]."]} +{"201814338|8440916": []} +{"201814338|3330461": ["Asides this, [6], [19], [55] highlighted a number of benefits which include improved spectral efficiency due to the exploitation of spatial diversity.", "2In out-band D2D communication, the interference from D2D to eNodeB-UE is absent [54] as the frequency spectrum used by D2D does not overlap with the cellular spectrum [19].", "Thus the underlay D2D is more popular [19] and as such, it is the focus of this paper.", "However, these may require very complex resource allocation techniques [19]."]} +{"201814338|8280144": ["such as interference cancellation (IC) [60]\u2013[62]; scheduling and power control [63], [64]; cognitive radio network (CRN) [65]\u2013[67]; frequency spread spectrum [68]\u2013[70]; as well as multiple antennas [59], [71]\u2013[73]."]} +{"206578562|988725": ["[39] conducted an indepth study on network timing channels (remote timing side channels) as well as in-system timing channels (focusing on hardware-based timing channels such as cache attacks) on commodity PCs."]} +{"206578562|18567112": ["[33] continued this line of research for the period from 2010 until 2013, and from 2010 until 2014, respectively."]} +{"206578562|6670217": ["[31] surveyed threats and vulnerabilities (i."]} +{"206578562|15247126": ["[38] surveyed covert channels via computer network protocols, and Biswas et al."]} +{"52169298|52059869": ["However, such NFV mechanisms would require hypervisor and control plane management [371]\u2013[375]."]} +{"52169298|206578486": []} +{"52169298|25746527": []} +{"52169298|7942157": ["[34] focuses on waveform designs, wireless protocol optimizations, microwave backhaul architectures, SDN architectures for backhaul and core networks, and content caching mechanism for 5G.", "In particular, we first give a brief overview of the main ULL research directions in the 5G wireless access segment and refer to the extensive 5G wireless access literature for more details [34], [35], [229], [258]\u2013[260]."]} +{"52169298|22221919": ["In particular, we first give a brief overview of the main ULL research directions in the 5G wireless access segment and refer to the extensive 5G wireless access literature for more details [34], [35], [229], [258]\u2013[260]."]} +{"52169298|206578224": ["puting, see [25]\u2013[28]."]} +{"52169298|1119376": ["(ADAS) 100\u2013250 \u03bcs few \u03bcs Power Train, Chassis Control < 10\u03bcs few \u03bcs Traffic Efficiency & Safety < 5 ms few \u03bcs Infotainment [57] Augmented Reality 7\u201320 ms few \u03bcs Prof."]} +{"52169298|6909107": ["puting, see [25]\u2013[28]."]} +{"52169298|37497601": [", time synchronization protocols have been surveyed in [18], [19], routing protocols have been surveyed in [20]\u2013[22], while congestion control protocols have", "Timing differences may arise because of clock errors, synchronization errors, as well as tracking and estimation errors [18].", "The gPTP synchronizes clocks between network devices by passing relevant time event messages [18]."]} +{"52169298|29464310": ["Split options defined by eCPRI the steps above the horizontal dashed line are processed at the BBU and the steps below the dashed line are processed at the RRH: Split E corresponds to the CPRI data, split ID corresponds to the eCPRI downlink data after scrambling, split IID corresponds to the eCPRI downlink data after pre-coding, and split IU corresponds to the eCPRI uplink data after RE-demap [243].", "However, due to time sensitive properties, TSN Ethernet is being considered as a potential candidate L2 protocol for 5G fronthaul applications as an alternative to the Common Public Radio Interface (CPRI) and eCPRI [243] protocols.", "a) Optical Transport Techniques: The Common Public Radio Interface (CPRI) [243], see Section VII-A1, imposes an overall fronthaul link delay limit of 5 ms, excluding the", "a) CPRI: The Common Public Radio Interface (CPRI) [243] is a digital interface for transporting information between Radio Equipment (RE) and Radio Equipment Control (REC)."]} +{"52169298|206576469": ["Thus, in brief, whereas the survey [17] broadly covered all latency sources up to 2014, we comprehensively cover the link and network layer latency reduction standards and studies up to July 2018.", "A survey on general techniques for reducing latencies in Internet Protocol (IP) packet networks has been presented in [17].", "The survey [17] gave a broad overview of the sources of latencies in IP networks and techniques for latency reduction that have appeared in publications up to August 2014."]} +{"52169298|11414835": []} +{"52169298|29060869": ["Also, the impact of wireless protocols on latency has been covered in a few surveys [29]\u2013[35], while smart grid communication has been covered in [36]."]} +{"52169298|2623404": [", based on a design similar to software defined networking (SDN) [81], [82], with message"]} +{"52169298|35906806": ["Additionally, autonomous automotive vehicles [6], augmented and virtual reality (AR/VR), as well as robotic applications, which are essential for Industrial IoT (IIoT), may require both high data rates as well as ULL [7]\u2013[10]."]} +{"3908904|3757239": ["In recent years, mobile edge computing provides users with short delay and high performance computing services by deploying computing nodes or servers at the edge of the network, to meet users\u2019 requirements for delay-sensitive tasks [3], [4]."]} +{"54437754|3757239": ["The massive data transmissions between base stations and UEs have caused network congestion and seriously affected the QoS.", "In the cellular D2D communication scenario, the base station or mobile UE can cache the contents in advance and provide content services to nearby users, which can not only reduce the load on the core network, but also improve the QoS [8].", "However, since the factors considered are too singular, the ability to improve the QoS of D2D communication is limited."]} +{"199011162|206578486": ["However, due to the limited computiontal power in the Fog server, sometimes the quality of service (QoS) of each application cannot be guaranteed, in which situation efficient allocation of Fog computing resource should be considered [11]."]} +{"199011162|7644489": ["The direct discovery strategy is considered in this paper [36]."]} +{"59601283|3757239": ["Various caching schemes have been proposed to improve the content delivery performance [4]\u2013[7].", "Conventional caching policies were proposed in [4], [5], where each BS stored the most popular file without cooperative with other BSs, leading to content redundancy and waste of storage resources."]} +{"25493727|206578365": ["The wireless network operator provides MEC service so that UEs can offload their data and tasks to the edge servers, which are often co-located with the BSs.", "In both MCC and MEC, mobile users access computing services on the cloud or edge servers co-located with BSs through high-speed and ubiquitous wireless connection.", "We assume that a compromised server does not infect (or with a negligible probability infects) a normal requester because detection is much more effective on the requester side due to the significantly smaller data size of the returned computation result [2].", "more recently, mobile edge computing (MEC) [2] moves", "To further reduce latency and enable precise location/context awareness, mobile edge computing (MEC) [2], [3] has recently emerged as a new paradigm in which computation and storage capabilities are moved from the central cloud to the network edge devices such as base stations (BSs)."]} +{"25493727|3330461": ["llular infrastructure such as the BSs [17], [18]. This new communication paradigm can signi\ufb01cantly improve the system throughput [19], energy ef\ufb01ciency [20], fairness [21] and overall QoS performance [22]. In practice, D2D communication has been implemented in industry products such as Qualcomm FlashLinQ [23] and standardized by 3GPP [24]. Enabled by D2D communication, D2D of\ufb02oading can further allevi"]} +{"25493727|7644489": ["In practice, D2D communication has been implemented in industry products such as Qualcomm FlashLinQ [21] and standardized by 3GPP [22]."]} +{"56598886|6909107": ["Hence, task execution performance can be improved significantly [2]."]} +{"56598886|206578365": ["The rapid proliferation of new applications such as interactive gaming, virtual reality and augment reality poses great challenges to the computation capability of mobile devices [1]."]} +{"21245716|3330461": ["Furthermore, device-to-device communications are promising to replenish cellular communications in terms of user throughput increase and network coverage extension [13]."]} +{"1271267|763939": ["Similarly, monitoring user positions for roaming or handover purposes is another open problem encountered in mobile environments that, to date, multiple mobility models have been proposed to address [4].", "Despite these efforts, a complete characterization of user mobility is missing in the current literature, with only a few legacy publications addressing mobility management in the context of conventional cellular technology [4] and effects of mobility on the connectivity of wireless systems [5]."]} +{"10437714|8280144": ["Furthermore, in [92], the authors showed\n9Alpha-stable distributions generalize Gaussian distributions and have heavier tails [10, Sec."]} +{"77391732|19938676": ["Aiming at this target, several appealing technologies have been recently developed and widely used in current wireless networks, such as massive multiple-input multiple-output (MIMO), device-to-device (D2D) communications, and full-duplex (FD) transmissions [1]."]} +{"77391732|3330461": []} +{"21705502|52059869": []} +{"21705502|206578224": ["In addition to MEC integration technologies like SDN, NFV, and network slicing discussed in [4], we consider ICN in", "Furthermore, in our previous survey [4], we discuss the role of MEC in 5G network edge cloud architecture and orchestration.", "As summarized in [4], the three key benefits of the collaboration between IoT and MEC are: 1) lowering the amount of traffic passing through the infrastructure; 2) reducing the latency for applications and services; and 3) scaling network services diversely."]} +{"21705502|3757239": ["1) Requirements: Computation offloading is the most prominent and widely discussed feature of MEC that empowers resource-constrained IoT devices with augmented computational capabilities [29], [33]."]} +{"21705502|31245252": ["Few other papers are focused on the combined aspects of IoT research and their potential application scenarios [7], [18]\u2013[20]."]} +{"21705502|6909107": ["2) Related Work: Several mobility management policies have been proposed for the MEC architecture [29], [133]\u2013[135].", "In addition to the literature mentioned in [29], Table X summarizes the reviewed state-of-the-art mobility management in MEC enabled IoT.", "in [29], the existing work that addresses MEC computation offloading decisions have been nicely summarized based on full and partial offloading types.", "Moreover, [29] provides an overview of the latest research works that address", "in scenarios where the UEs mobility is confined within a given space such as an office room [29], [136], [137].", "Mach and Becvar [29] presented a user-oriented use case of MEC from the perspective of computational offloading and", "1) Requirements: Computation offloading is the most prominent and widely discussed feature of MEC that empowers resource-constrained IoT devices with augmented computational capabilities [29], [33].", "capabilities, or cloud capabilities, and availability [29]."]} +{"21705502|206578365": ["out in [32], the task models for partial offloading can be represented by task-call graphs with sequential, parallel, and general dependencies.", ", task model for binary offloading) [32].", "The inherent challenges with wireless communication channels like multi-path fading, interference, and spectrum shortage should always be taken into account for the design of MEC systems to seamlessly integrate computation offloading and radio resource management [32]."]} +{"21705502|4427557": ["vacy [12], trust [13], Social Internet of Things (SIoT) [14], communication [15], context awareness [16], and future directions [6], [17].", "[15], interoperability among various IoT LPWAN technologies encountered in IoT is still an open research question to address."]} +{"21705502|3767252": ["Typical security threats in these areas are Denial of Service (DoS) attacks, Man-in-the-Middle (MitM) attacks and malicious node problems [34], [143].", "More detailed descriptions of these threats are presented in [34].", "understand the particularities of every edge paradigm, as they have subtle differences that will affect the implementation and deployment of the security mechanisms [34].", "Although trust is an equally important property similar to security and privacy in IoT and MEC, it is hardly addressed lately in research works [34].", "As discussed in [34], the \u201canything, anytime\u201d principle should be the underlying building blocks and application scenarios for MEC-enabled IoT systems [152].", "2) Related Work: Security and privacy challenges in MEC like edge computing paradigms are surveyed in [34] and [154]."]} +{"21705502|21386749": ["Although IoT technologies are widely adopted in the health sector [47], their performance goals will not be achievable without edge"]} +{"21705502|7329149": ["the agricultural sector will require some major evolution where IoT will be integrated in various production, management, and analytical processes [77], [78]."]} +{"21705502|1598350": ["efits such as improving connectivity, efficiency, scalability, time savings, as well as cost savings for manufacturing processes with the maximum use of smart machines [92], [94]."]} +{"21705502|18687271": ["[142] Analyzed distributed mobility management for future IoT sensor networks."]} +{"21705502|3348390": ["vacy [12], trust [13], Social Internet of Things (SIoT) [14], communication [15], context awareness [16], and future directions [6], [17]."]} +{"3549233|7439310": ["The client will try to conceal the missing encoding information by applying error concealment techniques [10].", "is further justified by error concealment techniques that can decode partial frames [10]."]} +{"58948922|3330461": ["\u2026resulted in the last few years in innovative network architectures and applications that rede\ufb01ne the current state-of-the-art with respect to wireless connectivity, next generation cellular communications (e.g., 5G), Internet of Things (IoT), and also vehicle-to-vehicle (V2V) communications [2].", "As mentioned in the introduction, D2D communications were initially introduced to bene\ufb01t from [2]: \u2022 the proximity of devices for assuring higher bitrates, lower delays and reduced power consumption; \u2022 the reuse of resources by simultaneously allowing both D2D direct-link communications and\u2026", "In particular, the contribution of the social features has been applied to the two main challenges in the selection of a relay among the peer devices, namely the mobility of the devices and the selection of trustworthy peers [2]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"3557411|8523192": []} +{"3557411|1541773": ["In the literature, energy efficiency issues of wireless networks have been studied for a long time, and a number of surveys have been published [14]\u2013[24] (as compared with this work in Table I)."]} +{"3557411|12325031": ["1) Cognitive Radio Networks (CRNs): In order to exploit the underexploited spectrum resource (e.g., TV white bands), the cognitive radio (CR) technique allows unlicensed users (i.e., secondary users or SUs) to dynamically access the licensed spectrum when licensed users (i.e., primary users or PUs) are temporally absent.", "In the literature, data analytics have been successfully applied in WSNs [25] and CRNs [199] dealing with issues such as data aggregation, routing, localization, clustering, security, dynamic channel allocation, transmission control and cross-layer resource allocation.", "Basically, technologies such as CRNs, D2D communications and OFDMA networks are primarily designed to improve the SE for higher capacity, and hence providing effective ways for delivering large-volume big data.", "We focus our major attention on studies in recent 5-6 years and cover many emerging technologies such as cognitive radio networks (CRNs), future cellular networks integrated with D2D communications, mobile social networks, crowdsensing networks, cloud networks, and SDNs.", "4) General MR-MC Networks: One mathematical generalization of CRNs, OFDMA networks and WiMAX systems is multi-radio multi-channel (MR-MC) wireless networks, where each node has multiple radios that can operate on multiple channels [134]\u2013[136]."]} +{"3557411|14765802": ["The essence of many energy-efficient technologies is to exploit the network spatio-temporal diversities in order to mitigate interference [14], [15]."]} +{"3557411|3055684": ["For both offline and online algorithms, interested readers are referred to the survey in [13].", "vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"3557411|2535224": ["2: A conceptual architecture of SDWN [31].", "An overview of SDWN is illustrated in Fig.", "Although SDN was firstly defined for Internet systems, many efforts have been devoted toward softwaredefined wireless networks (SDWN) including OpenRadio and OpenRoad systems and SDWN based on various wireless technologies such as LTE cellular networks, WLANs, WPANs and WSNs [28], [29]."]} +{"3557411|16412228": ["The essence of many energy-efficient technologies is to exploit the network spatio-temporal diversities in order to mitigate interference [14], [15].", "In the literature, energy efficiency issues of wireless networks have been studied for a long time, and a number of surveys have been published [14]\u2013[24] (as compared with this work in Table I)."]} +{"3557411|12029139": ["vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"3557411|3330461": ["enhance the network energy efficiency by switching between cellular and D2D modes [125]."]} +{"3557411|4269723": ["proposed in which the network data plane and control plane are decoupled to allow flexible and programmable control such that new protocols and applications can be implemented more easily [27]."]} +{"3557411|12060835": ["vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"22923383|19938676": ["namely Device\u2013to\u2013Device (D2D) communication, emerges as a promising solution for cellular network offloading [2]."]} +{"197496346|53730401": ["Alternatively, the vehicle-to-vehicle (V2V) communication [20], [21] is"]} +{"197496346|35098173": ["Given our reviews [22], [29], geographic routing protocols [25] fit well for vehicular-DTNs scenario."]} +{"197496346|2758659": ["Alternatively, the vehicle-to-vehicle (V2V) communication [20], [21] is"]} +{"53792522|206578365": []} +{"52019456|3757239": ["Later, in September 2016, MEC ISG dropped \u201cMobile\u201d from MEC and renamed it \u201cMulti-Access Edge Computing\u201d so as to support more access modes including WiFi and wired access [4]."]} +{"21563297|15449163": ["According to a recent study [31], security and"]} +{"21563297|207231270": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197]."]} +{"21563297|76603": ["4) Legal and Regulation Concerns: The ethical and legal requirements are non-negligible factors in D2D security and privacy research, due to the connection with national security and public safety [209], [210]."]} +{"21563297|3330461": ["According to [5], [10], [19], and [20], M2M communication can be defined as:", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D", "Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "without the interaction of access points or base stations [5].", "Other communication paradigms similar to D2D include the Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "and technology-independent, whereas D2D is technologydependent and focuses on proximity services, which assumes opportunistic connectivity [5].", "According to [5] and [10], the standalone D2D can be defined as:", "Typical D2D applications and services include cellular data offloading, relaying, gaming, content distribution, and group communication [5], [10], [17]."]} +{"21563297|7644489": ["D2D switches from infrastructure path to direct path for offloading cellular traffic [9], [21]\u2013[23].", "4) Solution Compatibility and Deployability: Cellular operators are the main driving force for D2D communication [21], [190], which have identified a set of use cases and"]} +{"21563297|6670217": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In the following, we highlight key characteristics of mobile security and privacy [135]."]} +{"21563297|12970117": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D"]} +{"21563297|14745481": ["2016 in order to reflect the latest advancements on top of the security research in mobile ad hoc networks [24], [174], [175].", "Aside from physical layer considerations in conventional MANET security [24], [174], [175], physical layer security in D2D communication also deserves our attention."]} +{"21563297|18411031": ["to perform operations on encrypted cipertext without knowing the original data [120].", "The tokens can only be generated with a secret key [120]."]} +{"43996741|3913780": ["The prediction is based on the cumulative growth method [16] and under the assumption that only the requests for already", "using the traditional frequency-count popularity prediction method in [16].", "Numerous methods have been proposed [16]."]} +{"67867406|21705502": ["Such separation facilitates the network programmability using an SDN computation logic that is centralized and fed by various input data, such as network-originated noti\ufb01cations [5]\u2013[7]."]} +{"67867406|206578224": []} +{"67867406|16496984": ["[40] presented a survey about resource allocation algorithms for SFC."]} +{"67867406|6583734": ["Chain Header (SCH) [57], IPv6 extension header for SFC (SFCEH) [58], Segmented Routing Header (SRH) [49], or by defining a new IP option field.", "The size of the added packet header depends mainly on the optional metadata added, yet the SRH can have more size compared to the other headers if it encodes multiple IPv6 addresses.", "If a VNF is not SRH aware, an SFC proxy is implemented to encode and decode the SR header.", "4) Segment Routing Header: SRH [62] is employed by Abdelsalam et al. [63] as an SFC protocol.", "The authors proposed to encode the SFP in SRH.", "Furthermore, two SFC headers can be implemented and used for different reasons, as in [63] where the SRH is used for sharing the forwarding path along with the NSH for sharing the context information.", "The connector plays the role of an inner-host SRH forwarder and proxy.", "In modern networks, SDN and NFV support the deployment of SFC [48], [49].", "Several propositions are based on network headers such as NSH [42], Service Chain Header (SCH) [57], IPv6 extension header for SFC (SFCEH) [58], Segmented Routing Header (SRH) [49], or by de\ufb01ning a new IP option \ufb01eld.", "Traf\ufb01c steering: At the ingress edge router, a SRH aware CL classi\ufb01es traf\ufb01c \ufb02ows and inserts SR headers.", "SRH is composed of a list of IPV6 addresses which is relative to the intermediate VNFs corresponding to the accurate service chain for the \ufb02ow."]} +{"201067392|4710623": ["[60] provided a survey on the recent solutions for maintaining a consistent global network state view among multi-controllers."]} +{"201067392|37966695": ["This design gives a simpler approach to managing controllers where controllers have different responsibilities and can make decisions based on their level and view on the network [70]."]} +{"201067392|10532321": ["[79] provided a survey on the proposed solutions toward data plane memory management and reducing signaling traffic to improve SDN scalability."]} +{"4271602|206578365": [", binary and partial computation offloading [12].", "On the other hand, a recent technology innovation named mobile edge computing (MEC) is proposed as a cost-effective method to enhance the computing capability of wireless devices [11], [12]."]} +{"4271602|3504276": ["Recently, radio frequency (RF) based wireless power transfer (WPT) has emerged as an effective solution to the finite battery capacity problem [2]\u2013[4]."]} +{"4271602|12029139": []} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"16988055|8650651": ["The flexible transport network can, for instance, be implemented through a Software Defined Elastic Optical Network (SD-EON) [41], [42].\nb) Sm-GW virtualization: The SM-GW can support a variety of virtualization strategies, e.g., to provide independent virtual networks for different operators.", "The flexible transport network can, for instance, be implemented through a Software Defined Elastic Optical Network (SD-EON) [41], [42]."]} +{"16988055|11414835": ["Sm-GWs could then be abstracted by a hypervisor [43]\u2013[46] that intercepts the SBI, as illustrated in Fig."]} +{"53428422|21418": []} +{"67856669|5022650": []} +{"67856669|22221919": ["Other orthogonal multiple access schemes, e.g., OFDMA [13, 22], and more sophisticated NOMA schemes, e.g., sparse code multiple access (SCMA) [31], can be employed to further enhance the system performance."]} +{"67856669|6909107": ["It is also worth noting that the major difference between this paper and the earlier conference version [1] is that instead of fixing the processing capacities, we consider controllable computation frequencies by exploiting dynamic voltage and frequency scaling (DVFS) [25] to achieve improved overall latency.", "The corresponding computation energy consumed by the local user is given by [25] E 0 = \u03ba0 L"]} +{"67856669|206578365": ["\u2026cloud-computing capabilities within the radio access network (RAN) such that the users can of\ufb02oad computation tasks to edge servers in their proximity for remote execution and then collect the results from them with enhanced energy ef\ufb01ciency and reduced latency (see [3] and the references therein)."]} +{"53231681|3450996": ["For instance, the surveys in [1]\u2013[3] discussed the potentials of deploying the technique of content caching in mobile networks."]} +{"57759346|3757239": ["Typically, tasks are of\ufb02oaded to remote servers [1]\u2013 [3] or to computing resources near to users, e.g., base stations (BSs) [4], [5]."]} +{"57759346|10299098": ["Typically, tasks are of\ufb02oaded to remote servers [1]\u2013 [3] or to computing resources near to users, e.g., base stations (BSs) [4], [5]."]} +{"57759346|206578365": []} +{"44224986|52059869": ["Virtualization helps to reduce network costs, while improving network performance and efficiency [341]."]} +{"44224986|7679009": []} +{"44224986|22582078": ["[101] have recently surveyed the range of opportunities and research challenges arising from the deployment of pure SDN networks in government, industry, as well as small and large-scale organizations.", "[101] do not conduct a detailed survey of hybrid SDN networks."]} +{"44224986|206578197": [", [96]\u2013[99], while virtual network embedding has been surveyed in [100]."]} +{"44224986|25911553": []} +{"44224986|6909107": []} +{"44224986|13372398": ["In a pure SDN network, the controller has complete topology knowledge, which can be readily exploited for energy efficient operation [248], [249]."]} +{"44224986|34643772": []} +{"44224986|18750590": []} +{"44224986|206578365": [", in mobile edge computing [78], [347]\u2013[350] and the Internet of Things [351]\u2013[353]."]} +{"44224986|6583734": ["Several surveys have covered the virtualization of SDN networks [93], [94] and SDN network functions [95]."]} +{"44224986|8650651": ["wireless networks [77]\u2013[83] optical networks [3], [84]\u2013[86], as well as the Internet of Things (IoT) [87], [88], cyberphysical systems [89], and smart cities [90], [91]."]} +{"44224986|11414835": ["In network virtualization, hardware and software network resources can be combined to form a single virtual network resource object or a single resource can be \u201csliced\u201d into multiple virtual resources [93], [94], [152]\u2013[158].", "Several surveys have covered the virtualization of SDN networks [93], [94] and SDN network functions [95].", "Flowvisor [338], Hyperflow [339], and the Optical Flowvisor [340] are prominent network virtualization approaches for pure SDN networks [93]."]} +{"44224986|154032": ["Green computing and networking has become a highly important research area in recent years [85], [330]\u2013[332]."]} +{"44224986|801245": []} +{"44224986|16768404": ["A semantic learning algorithm [240] is proposed to infer the legacy device configuration"]} +{"44224986|2535224": ["SDN has not only been used in wired network but also in wireless networks [97], [98], [342]\u2013[346]."]} +{"44224986|2623404": ["proposed for network management in pure SDN networks, see [50], [207]\u2013[209]."]} +{"44224986|10693567": []} +{"44224986|4269723": []} +{"44224986|10532321": []} +{"44224986|58783012": []} +{"44224986|11195746": ["This virtualization can be achieved by introducing virtual local area networks (VLANs) [119], [120] in the network."]} +{"64428928|3330461": []} +{"2172141|10299098": ["In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless access points (APs) and base stations (BSs) [3], [4].", "By applying dynamic voltage and frequency scaling techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where (3)Note that to avoid the issue of dividing by zero, we define \u03b2( li ti ) = 0 when either li = 0 or ti = 0 holds.", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} +{"2172141|206578365": ["To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless APs and base stations (BSs) [3], [4].", "In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "By applying dynamic voltage and frequency scaling (DVFS) techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where fi,n \u2208 (0, f max i ], n \u2208 {1, .", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} +{"22582078|9495329": ["However, an interesting argument of the works covered in [213] is that IoT urban deployments should allow for the same set of sensor nodes to support multiple applications from multiple developers across the same shared physical infrastructure via software only.", "Moreover, substantial research on interconnecting Wireless Sensor Networks (WSNs) into wider IoT frameworks by leveraging SDN and virtualization has already been completed [213], [218].", "We mention this work to provide another aspect of emerging technologies with regard to SDN-IoT infrastructure, and refer the reader to [213], [221], for a more complete overview.", "As a result, anywhere from 20 billion to 50 billion devices are projected to connect to the Internet by 2020 [213], and many network operators are also trying to adapt their networks for what is now being dubbed the Internet of Things (IoT).", "However, work to optimize \ufb02ow scheduling for the backbone network is still not fully developed [213].", "\u2026of application requirements as they relate to QoS and geographical sensor location, inner sensor node con\ufb01gurations, sharing of sensors amongst competing applications, transmitting optimized and QoS-aware data \ufb02ows towards end-servers, and ef\ufb01cient distribution of data for cloud processing [213].", "Additionally, fully centralized SDN controller architectures do not adequately address the different access networks expected to comprise the urban-scale IoT mobile multi-networks, such as LTE, WiFi, or ZigBee [213].", "For instance, the concept of Information-Centric Network (ICN) is combined with virtualization in [213] and [226] to provide network slicing and node caching within a wireless network.", "While we provide a brief description below, we refer the reader to [213] and [221] for further details.", "For instance, a natural application to address the heterogeneous QoS requirements of IoT is to include network slicing [213]."]} +{"22582078|6583734": ["A greater variety of network functions considered for NFV can be found in [2] and [114]."]} +{"22582078|2623404": ["Network operators are also challenged to address new routing protocols aimed at improving efficiency of content delivery and content availability for their clients [2], [58].", "One such architecture is Information-Centric Networking (ICN) or Content-Centric Networking (CCN) where packets are routed based on desired content instead of traditional, location-based, addressing [58]."]} +{"9121328|1775475": ["In [5], Chalmers et al. explain how context-awareness and missioncritical requirements would be critical issues with respect to managing Quality-of-Service (QoS) in future mobile computing environments."]} +{"42348870|11414835": []} +{"42348870|2623404": ["[20], [21] provide a general overview of SDN, while other papers are focused on more specific topics like security [22]\u2013 [24], programmability [25], network virtualisation [26], the controller plane [27], or its application to other network types such as optical networks [28] or mobile networks [29]."]} +{"42348870|10693567": ["tions [30]\u2013[32], some of which deal briefly with TE [33], [34]."]} +{"42348870|525062": ["As explained in [54], packet-level multipath routing can entail TCP seg-"]} +{"42348870|16332018": ["For further information regarding network virtualisation with OpenFlow (see [26], [89], [90])."]} +{"59337480|16654832": ["QoS and Fault tolerance: As described in Shiraz [88] mobile devices present specific characteristics with regards to resource availability (connectivity instability, battery limitation, communication bandwidth, or location variations).", "Shiraz [88] underlines that fact that \u201cprivacy measures are required to ensure execution of mobile applications in isolated and trustworthy environments while security procedures are necessary to protect against threads, mainly at network level.\u201d", "Shiraz [88] highlights the importance of Fault tolerance mechanism considering the nature of mobile devices and its volatility.", "Very frequently, application partitioning mechanisms include mechanisms to optimize mobile device at the levels of processor augmentation, energy savings, execution cost, and bandwidth utilization [28, 29, 70, 88]."]} +{"201068441|3330461": ["Device-to-device communication (D2D) [3] is considered one of the major technology to enhance the boosting demand [4] of users."]} +{"4661452|19938676": []} +{"67867721|13372398": []} +{"67867721|4269723": ["operational expenses through ease of configuration [4].", "nology is radically transforming the network architecture of data centers, network overlays, and carrier networks to overcome most of the aforementioned limitations of the traditional network architectures [2]\u2013[4]."]} +{"5052420|6909107": []} +{"10045985|6909107": ["By deploying MEC servers therein, wireless devices can offload part or all of their computation-heavy and latency-sensitive tasks to APs and/or BSs for remote execution [1]\u2013[3]."]} +{"10045985|10299098": ["We consider partial offloading, and assume that the computation task can be arbitrarily partitioned into various parts to be computed in parallel [2], [3].", "Accordingly, the user\u2019s energy consumption for local computing is [3]", "Depending on whether the computation tasks are partitionable, the computation offloading can be generally categorized into two classes, namely binary and partial offloading [3]."]} +{"10045985|206578365": ["Accordingly, the user\u2019s energy consumption for local computing is [2]", "Depending on whether the computation tasks are partitionable or not, the computation offloading can be generally categorized into two classes, namely binary and partial offloading, respectively [2]."]} +{"7942157|1049844": []} +{"7942157|206578224": ["The new core network includes some new entities such as SDN, MEC, and NFV as well as new backhaul techniques [11], [12], [176].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [11], [12], caching [13], [14], backhaul [15], resource management [16] and data centric network [17], [18] are available."]} +{"7942157|25911553": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available."]} +{"7942157|3757239": ["system performance and high latency which can not meet the 5G vision [179].", "BS level caching [179]."]} +{"7942157|4502294": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "5G back-haul requires higher capacity, lower latency, synchronization, security, and resiliency [13]."]} +{"7942157|206576469": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"7942157|3555631": ["Split of control plane (C-plane) and data plane (D-plane) in the architecture and the carrier frequency could be performed in order to have separate provision of capacity and coverage [21]."]} +{"7942157|8650651": []} +{"7942157|76603": ["In mission critical communication (MCC), both the latency and reliability issues need to be addressed [6]."]} +{"7942157|19938676": ["Fifth generation (5G) cellular network is the wireless access solution to ful\ufb01ll the wireless broadband communication speci\ufb01cations of 2020 and beyond [3], [4].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "With an ambition of signi\ufb01cant enhancements over 4G cellular networks, we need drastic changes in the architecture for meeting 5G visions such as 1000 times capacity enhancement, 100 billions connections and close to zero latency [3], [4]."]} +{"7942157|875676": ["The overall comparison among IDMA, SCMA and GFDM is presented in Table V. Filter bank multi carrier (FBMC) has been a strong candidate waveform for 5G [3], [85]."]} +{"7942157|35906806": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"7914805|206578224": ["This vision has been driving extensive research in both the academia and industry under various names such as edge computing and fog computing [1]\u2013[4].", "1) Multi-Access Edge Computation Offloading: Multiaccess edge computing (MEC) initiated by ETSI, which is also called mobile edge computing, refers to providing mobiles with cloud-computing capabilities and IT service from radio access networks including base stations (BSs), access points (APs) and WiFi, relying on multiple-access technologies [1]."]} +{"7914805|206578365": ["for partial offloading (and partial local computing) [2].", "two disciplines: wireless communications and mobile computing [2]."]} +{"3439542|5022650": []} +{"3439542|206578365": ["The corresponding computation energy consumed by the local user is given by [2]"]} +{"56176857|4269723": ["Once the flow request is processed, the controllers update the flow tables of all affected switches using a TABLE_MOD OpenFlow message [1].", "SOFTWARE-DEFINED network (SDN) decouples dedicated hardware from network services [1]."]} +{"102346151|6909107": ["Mobile edge computing (MEC) is a paradigm that servers are deployed at the edge of mobile networks that are close to UEs [5]."]} +{"102346151|3330461": ["The available literature on D2D communication in cellular networks can be roughly classified into two categories [3].", "Device-to-Device communication underlying cellular network is a new paradigm to increase spectral efficiency and reduce communication delay [3]."]} +{"67866940|21705502": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|206578224": ["Also, to better cope with lowlatency IoT applications, the Edge computing paradigm is boosting the deployment of micro data centers at the edge of the network [40].", "In this vein, the Edge computing paradigm [40] is rapidly gaining momentum, promoting distributed small-scale cloud environments deployed at the edge of the network to execute applications near to the IoT devices."]} +{"67866940|24110634": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [102] [117] [118] [119]."]} +{"67866940|34643772": ["Different works have started to investigate and address some of these challenges [25], [26].", "In [23]\u2013[25], SDN-based security solutions are proposed to enhance network protection."]} +{"67866940|9495329": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|4427557": [", Narrowband IoT) [44]."]} +{"67866940|2332366": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|26368310": ["Several solutions are available to enable resilience and availability for cloud-based deployment [154]."]} +{"67866940|3767252": ["Indeed, accounting for the exponential increase of micro edge data centers, verification of their trustworthiness can be highly challenging [191]."]} +{"67866940|2829149": []} +{"67866940|12029139": ["Therefore, RFID tags present extremely low costs and can be battery-free by leveraging electromagnetic energy harvesting [33]."]} +{"67866940|485843": ["The most promising usage concerns smart home automation [55], Industrial Internet [36], intelligent transportation systems [56], smart energy [57], enhanced health-care services [58], and smart cities [59]."]} +{"67866940|595093": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|1940388": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|2357830": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17205659": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15].", "Furthermore, remarkable efforts have been carried out over the\npast years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17869045": ["In the following, we focus on the Authentication, Authorization, and Accounting (AAA) framework, which is dedicated for intelligent access control of resources and security policy enforcement [85]."]} +{"67866940|1230643": ["and represent a key enabler for IoT adoption [34]."]} diff --git a/edge/graph_208210895.jsonl b/edge/graph_208210895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4030c5cd6cf741775e7b803fb4deb04b7af522ed --- /dev/null +++ b/edge/graph_208210895.jsonl @@ -0,0 +1,64 @@ +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"18238681|41505326": []} +{"18238681|18889901": ["We are more comprehensive than earlier efforts, describing 101 datasets compared with the 14 in [9], 19 in [42]1 and the 44 action datasets in [115]."]} +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"206592484|456491": []} +{"16387148|4351505": []} +{"16387148|9928823": ["Deep Belief Networks (DBNs) are probabilistic generative models consisting of multiple layers of stochastic hidden variables [Deng 2014].", "In Deng [2014], several DL techniques were presented and a categorization of them into three classes, namely, discriminative, generative, and hybrid, was provided.", "These methods can be divided into two general categories based on how they are used [Deng 2014]: (1) discriminative and (2) generative.", "Recently, a few review papers have also become available [Deng 2014; LeCun et al. 2015; Guo et al. 2016b; Schmidhuber 2015]."]} +{"16387148|13946824": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"16387148|987239": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"6156663|987239": [", [30]), and the feature is used to compare and retrieve 3D models.", "With these trends in mind, effective and efficient methods to compare, recognize, or retrieve 3D shape have become an important area of study [5, 9, 11, 12, 13, 15, 16, 20, 23, 27, 30, 33, 34]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"5661364|987239": ["\u2026high quality range images, since these have suf\ufb01ciently different characteristics from mesh-based 3D surface representations and analysis approaches [10], e.g. the regular grid neighbourhood topology of range samples sim-pli\ufb01es processing, unlike irregularly polygonised surface tessellations."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"24853684|5664472": ["One major drawback of DBNs is the inevitable need of a very long training time [74].", "filters are not very capable of handling occlusion, therefore, require good foreground segmentation [74]."]} +{"24853684|16013270": ["Thus, it is important to survey the commonly used datasets and their key features to understand the capabilities and limitations of each tested approach [1, 21, 95]."]} +{"24853684|17516538": ["Activity recognition [56] is another closely related active field of research."]} +{"7156990|987239": []} +{"9117881|987239": []} +{"2654595|12724190": []} +{"6533213|16013270": ["Two very recent examples include [3, 12] and [19]."]} +{"4570087|3693305": ["We refer readers to [67] for a survey of ANN approaches.", "For learning to hash, a recent survey [67] categorizes it into quantization and pairwise similarity preserving."]} +{"3804531|5293125": ["STIP detection algorithms play an important role in any STIP-based approach [13]."]} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"3400843|12127129": ["Instead of initializing the foreground object, background initialization sets a background model similarly found in background subtraction techniques [7, 126]."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"8063966|8983048": ["Two reviews on 3D modeling and range image registration by [30] and [31] are also worth mentioning.", "Moreover, computing the intersection of a sphere with the surface is not easy, especially when the surface is represented as a point cloud or a mesh [30]."]} +{"8063966|6681074": []} +{"1414576|205131192": ["The simplest approach of this type is to evaluate distances between feature vectors [Duda et al. 2001] \nin a multidimensional space where the axes encode global geometric properties, such as circularity, eccentricity, \nor algebraic moments [Prokop and Reeves 1992; Taubin and Cooper 1992].", "The differences are more signi.cant for more stringent classi.cation criteria \n(i.e., First-Tier) and for higher-order moments, which are known to be sensitive to noise [Prokop and \nReeves 1992].", "The simplest approach of this type is to evaluate distances between feature vectors [26] in a multidimensional space where the axes encode global geometric properties, such as circularity, eccentricity, or algebraic moments [52, 64].", ", First-Tier) and for higher-order moments, which are known to be sensitive to noise [52]."]} +{"5980457|16013270": ["Reviews of current datasets for human action detection [6, 2] indicate a lack of aerial video sequences captured from a mobile platform."]} +{"14506370|987239": ["The primary challenge to a content-based 3D model retrieval system [1] is to extract proper features for discriminating the diverse shapes of 3D models for efficiently indexing similar ones."]} +{"7964594|987239": []} +{"15928602|4351505": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|41505326": ["It is worth mentioning, there are more than 40 datasets speci\ufb01cally for 3D human action recognition [47].", "For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|12724190": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|1262156": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"2303138|6681074": ["\u2026representation for free-from surfaces and researchers have used a number of representations, including B-Splines (Bhanu and Ho, 1987), surface curvatures, superquadrics (Solina and Bajcsy, 1990) and deformable models to recognize free-form objects in range images (Campbell and Flynn, 2001)."]} +{"8574504|9869210": ["Various semantic segmentation surveys already exist such as the works by Zhu et al. [12] and Thoma [13], which do a great work summarizing and classifying existing meth-ods, discussing datasets and metrics, and providing design choices for future research directions."]} +{"5293125|16770050": []} +{"3485252|6387482": ["Simple fusion strategies like the early or the late fusion usually have limited performance improvement since the intrinsic relations among multiple feature representations are often overlooked [46]."]} +{"47017590|4570087": ["For example, the well-known image retrieval task, in which a query image is used to find a picture within a collection, has been an active field of research in the computer vision community for a long time [24] and only lately, with the introduction of deep learning"]} +{"195767273|6387482": ["The multimodal data fusion has gained long-time attention to exploit the complementary nature of the data of different sources [26], [27].", "Early shallow learning methods mainly consider feature-level (early) fusion and decision-level (late) fusion which respectively fusing low-level features and prediction-level features [26]."]} +{"14118080|6681074": ["3D object representation and matching has been a fundamental part of computer vision research with applications in modeling, visualization, recognition, classification, and scene understanding [3][4][12]."]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"2299289|7788290": ["the monograph by Shah and Jain [52] and the survey paper by Gavrila [14] for overviews of early works.", "In the area of motionbased recognition, a large number of different schemes have been developed based on various combinations of visual tasks and image descriptors; see e.g. the monograph by Shah and Jain [52] and the survey paper by Gavrila [14] for overviews of early works."]} +{"987239|14208903": ["[26] primarily focuses on shape similarity methods that are suitable to compare CAD models in the context of product design and manufacturing applications."]} +{"987239|6681074": ["Survey papers to this literature have been provided by Besl and Jain [11], Loncaric [50] and Campbell and Flynn [16]."]} +{"987239|10592271": ["The main idea of view based similarity methods is that two 3D models are similar, if they look similar from all viewing angles, similar to one of the models of human object recognition [106]."]} +{"21656238|31980349": []} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"474078|1400872": []} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"52047507|13787722": ["\u2026Introduced new dataset: Converse\nHassner (2013) RGB 18 Most of RGB web/online based datasets\nZhang et al. (2016) RGB-D 44 RGB-D action dataset only\nWang et al. (2017) RGB-D 13 RGB-D based actions benchmarks, deep driving methods\nOurs RGB, RGB-D 48 RGB and RGB-D human action/activity recognitions\u2026", "Wang et al. (2017), discussed specific novel techniques on RGB-D-basedmotion recognition."]} +{"52047507|14814753": ["Herath et al. (2017) provided a comprehensive review on human activity solutions in videos from handcrafted to deep recognition."]} +{"52047507|41505326": ["\u2026RGB, RGB-D 51 Containing pose, action/activity datasets Introduced new dataset: Converse\nHassner (2013) RGB 18 Most of RGB web/online based datasets\nZhang et al. (2016) RGB-D 44 RGB-D action dataset only\nWang et al. (2017) RGB-D 13 RGB-D based actions benchmarks, deep driving methods\nOurs RGB,\u2026", "Zhang et al. (2016), present an excellent survey on RGB-D video dataset with state-of-the-art results.", "Microsoft Kinect, there has been a drastic increase in the 3D dataset, and multi-modal videos dataset (Li et al. 2010; Aggarwal and Xia 2013; Lun and Zhao 2015; Zhang et al. 2016).", "After the advancement of low-cost depth sensor, e.g. Microsoft Kinect, there has been a drastic increase in the 3D dataset, and multi-modal videos dataset (Li et al. 2010; Aggarwal and Xia 2013; Lun and Zhao 2015; Zhang et al. 2016)."]} +{"52047507|12724190": ["Han et al. (2017), discussed an overview of the existing space\u2013time representation of people on\nRGB-D datasets with modalities, representation encoding, and feature engineering."]} +{"52047507|1262156": ["Microsoft Kinect, there has been a drastic increase in the 3D dataset, and multi-modal videos dataset (Li et al. 2010; Aggarwal and Xia 2013; Lun and Zhao 2015; Zhang et al. 2016).", "After the advancement of low-cost depth sensor, e.g. Microsoft Kinect, there has been a drastic increase in the 3D dataset, and multi-modal videos dataset (Li et al. 2010; Aggarwal and Xia 2013; Lun and Zhao 2015; Zhang et al. 2016)."]} +{"52047507|15178364": ["Borges et al. (2013), discussed the advantages and shortcomings of various methods for human action understanding."]} +{"52047507|16013270": ["Chaquet et al. (2013), focused on twenty-eight publically availableRGBdatasets of human action and activity.", "Before 2010, a large number of RGB video dataset was available (Chaquet et al. 2013).", "The application of proposed dataset\nTable 3 A brief comparison of related datasets surveys\nReference work Datasets Number of datasets Key ingredient\nChaquet et al. (2013) RGB 28 RGB action, human interaction, surveillance dataset\nEdwards et al. (2016) RGB, RGB-D 51 Containing pose, action/activity\u2026"]} +{"20303249|8983048": []} diff --git a/edge/graph_208211688.jsonl b/edge/graph_208211688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b466fa1fec97bd9af4e30e34e142b9e7a7ae34fc --- /dev/null +++ b/edge/graph_208211688.jsonl @@ -0,0 +1,4 @@ +{"41191949|206485901": ["A comprehensive study of microgrids application in providing grid support is provided in [15]."]} +{"25539009|206485901": ["Many researchers have investigated different aspects of microgrids, including their penetration into electric power system, integration issues of distributed energy resources (DERs), role of power electronics, stability and reliability of microgrids [1]\u2013[10].", "Furthermore, communication networks, control and automation systems play a pivotal role in microgrid operation [1]."]} +{"25539009|5660618": ["While there has been tremendous amount of attention devoted to analytical investigation of the impacts of communication delays on modern power systems in the automatic control research community, derived methods are overly complicated and unap-proachable in practical scenarios [64]."]} +{"262497|10390713": ["2462152 grid is amenable to complex network analysis [3]."]} diff --git a/edge/graph_208212068.jsonl b/edge/graph_208212068.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec99b96f4b09fb1ed0f88985aa261a7141e67ca2 --- /dev/null +++ b/edge/graph_208212068.jsonl @@ -0,0 +1,34 @@ +{"115353702|206485901": []} +{"115353702|31086789": []} +{"110356720|595093": []} +{"110356720|5747564": []} +{"110356720|121289": []} +{"21713294|121289": ["The communication infrastructure can be considered as a multilayer structure including home area network (HAN), neighborhood area network (NAN), and wide area network (WAN), data centers, and automated integration of substation systems [7], [8]."]} +{"53043873|14159066": ["11 [25]."]} +{"115243117|23893450": []} +{"269169|121289": []} +{"19674003|6959212": ["Other advantages are the low latency, efficient operation, as well as the independence from third parties, providing direct and full control to utility stakeholders [9].", "TABLE I COMMUNICATION TECHNOLOGIES FOR SDG [9], [15]", "Other drawbacks arising from the nature of the power network are the time-varying network topology, high noise levels and electromagnetic interference (EMI), resulting in high bit-error rates and security issues [9].", "In Table I, the most significant advantages and drawbacks of each technology are summarized [9], [15]."]} +{"117592344|31086789": ["related to RERs integration and need of storage devices for reliable operation of power system have been discussed in [152]."]} +{"117592344|12083425": []} +{"117592344|18037424": ["Smart grid technology is considered the best solution for the various problems of the power grids [13,14]."]} +{"114795861|15459551": []} +{"114795861|17737221": []} +{"26052437|17381415": ["ac buses can work on bidirectional power control mode, dc link voltage control mode, or ac link voltage control mode [56]\u2013[58]."]} +{"26052437|12083425": ["ac buses can work on bidirectional power control mode, dc link voltage control mode, or ac link voltage control mode [56]\u2013[58]."]} +{"54725960|2135510": ["In this sense, the uncertainties in power system operation significantly increase under the growing penetration of new components such as distributed generations [6, 7, 8] and plug-in electric vehicles [9, 10], which inevitably leads to more serious consequences resulted from the loss of stability [11]."]} +{"39275476|17381415": ["This adds to the cost and complexity of implementation [4].", "For the 3-\u03c6 VSI-based distributed generation system, the commonly investigated and implemented GS methods [4], [8], [28] can be broadly classified as given in Table I.", "To facilitate power exchange across the PCC, it is essential to switch over the microgrid MPCs to current control mode after closing STS, instantaneously.", "As the MS are usually small (and with low or zero inertia) [1], [4] any rapid changes in operating conditions can lead to instability.", "In a typical microgrid scenario, multiloop control comprising a fast inner current loop and a slow outer voltage loop is adopted for microgrid power converters (MPC) [4]."]} +{"12319818|191396": ["For more precise generation scheduling, several hours ahead VSTLF is preferred, and this paper proposes a methodology using a pattern recognition algorithm by k-means clustering [10], [11]."]} +{"18290508|595093": ["Different categories of security attacks specific to the smart grid domain have been discussed and identified in previous survey papers [117,21,295,296,24,297]."]} +{"18290508|5747564": []} +{"18290508|14088590": []} +{"18290508|6959212": ["The IEEE 802.16 standard, commercialized under the name of WiMAX, was firstly released in 2001 to support long-distance (up to 7\u201310 km) broadband (up to 100 Mbps) wireless communications, especially in rural and suburban areas [147].", "In general, the trend is to prefer licensed wireless technologies, such as WiMAX [11] [83] and GSM/GPRS [45] [172], for the communications in the neighborhood area networks, because grid operators can establish their own private network infrastructure, which makes easier to guarantee the required communication reliability and QoS.", "In general, the trend is to prefer licensed wireless technologies, such as WiMAX [11] [83] and GSM/GPRS [45] [172], for the communications in the neighborhood area networks, because grid operators can establish their own private network infrastructure, which makes easier to guarantee the required\u2026", "As for 802.11, different versions of WiMAX technologies exist.", "IEEE 802.16-based networks (WiMAX).", "Furthermore, a base station is deployed to serve an area containing multiple NANs, which receives the data sent by NAN concentrators over dedicated WiMAX channels, and forwards this information to the regional control center over a wired network (e.g., using the Internet core backbone).", "WMNs have the potential to bring many advantages also to the smart grid communication system and many studies have advocated the use of WMNs in smart grids [11] [16].", "Finally, as observed in Section 5.2 most popular wireless technologies, including WiFi, ZigBee and WiMAX, are now including amendments to their standards to provide support for multi-hop communications (e.g, 802.11s and 802.16j)."]} +{"18290508|7971188": ["For instance, multipoint-to-point (MP2P) communications are important in monitoring applications, which require to periodically and simultaneously collect status information from a large number of sensors.", "\u2026i.e., distributed systems in which devices (peers) self-organize into a network and cooperate with each other by contributing part of their (storage, computing, bandwidth ) resources to offer useful services, such as data search, distributed storage, or computational intelligence [107] [108].", "Furthermore, middleware is increasingly used to create peer-to-peer (P2P) overlays, i.e., distributed systems in which devices (peers) self-organize into a network and cooperate with each other by contributing part of their (storage, computing, bandwidth ) resources to offer useful services, such as data search, distributed storage, or computational intelligence [107] [108].", "Distributed communication architectures have emerged in the past to support Internet services in a scalable manner, such as peer-to-peer networks (P2P) [107], which could also be applied in the smart grid context.", "Therefore, other studies have considered alternative approaches based on self-organizing P2P technologies.", "Thus, other studies argue that unstructured P2P networks, which do not maintain a rigid overlay network, are more suitable for smart grid applications in which data must be distributed to a large number of interested parties at the same time [241].", "Given the ability of P2P technologies to scale with increasing numbers of devices and services, several studies have proposed to use P2P-based middleware technologies to deal with the complexity of managing and controlling smart grids [109]."]} +{"18290508|1236072": ["It is also important to point out that in the last few years there has been a growing interest from the research community in designing optimized networking protocols for WSNs, which could potentially match the requirements of the smart grid (interested readers are referred to [186,187,205] for detailed surveys)."]} +{"18290508|10559330": ["Several QoS-based frameworks have been proposed for the Internet, such as Integrated Services (IntServ) [216], Differentiated Services (DiffServ) [217], and Multi-Protocol Label Switching (MPLS) [218], which could be applied"]} +{"18290508|121289": []} +{"18290508|18037424": ["Similarly, different measurements of scalability can be considered, such as the size of routing tables as the number of nodes increases, or the amount of communication resources used by each node [115] [16].", "A variety of technologies, network topologies and communication protocols are considered for each of these categories [14] [16].", "These networks are commonly named Field Area Networks (FANs), or Neighborhood Area Networks (NANs) [14] [16].", "WMNs have the potential to bring many advantages also to the smart grid communication system and many studies have advocated the use of WMNs in smart grids [11] [16].", "To recognize those similarities is important because they motivate the adoption of Internet design principles when designing scalable, reliable and secure networking solutions for the smart grid [14] [165] [16].", "\u2026the communication infrastructure in terms of channel bandwidth to ensure low transmission delays and reduce packet losses on transmission buffers [16] The key capabilities for smart grid communications can be summarized as follows: Scalability: A smart grid can involve millions of users and\u2026"]} +{"113847337|12537501": []} +{"113847337|29060869": []} +{"8074941|12083425": ["A substantial literature is available for different topologies, control, operational aspects, power electronics of the wind, and solar PV systems [2]\u2013[5]."]} +{"117220636|31245252": []} +{"117220636|3390598": []} diff --git a/edge/graph_20821438.jsonl b/edge/graph_20821438.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d5797a68923fd944331d172a4bb57f2644db6df --- /dev/null +++ b/edge/graph_20821438.jsonl @@ -0,0 +1,2 @@ +{"2519867|1230643": ["On the other hand, protocol designers are seeking energy efficient communication architectures, which involve all levels from the physical layer to the application layer [4].", "According to the categories in [4], our work can be classified into the energy management branch of application layer protocols."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} diff --git a/edge/graph_20821679.jsonl b/edge/graph_20821679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60d521ceb6e4bd5bfa048a334fc52b8ab749a98c --- /dev/null +++ b/edge/graph_20821679.jsonl @@ -0,0 +1,5 @@ +{"38896285|3348390": []} +{"38896285|2762484": []} +{"38896285|20905429": []} +{"56422471|13640443": ["As a result of channel integration, firms can provide more personalized information and differentiated services as well as a greater range of products (Agatz et al., 2008; Barnes et al., 2004)."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} diff --git a/edge/graph_208225153.jsonl b/edge/graph_208225153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2082499.jsonl b/edge/graph_2082499.jsonl similarity index 100% rename from graph_2082499.jsonl rename to edge/graph_2082499.jsonl diff --git a/edge/graph_208252386.jsonl b/edge/graph_208252386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6fb7c62d76cecb50dbf71078aa3759f14108852 --- /dev/null +++ b/edge/graph_208252386.jsonl @@ -0,0 +1,3 @@ +{"114953743|12206204": []} +{"114953743|8909218": []} +{"64016472|7644489": []} diff --git a/edge/graph_208267695.jsonl b/edge/graph_208267695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2621feaff9906f1a71f4aeb59f00cbf78c2b154 --- /dev/null +++ b/edge/graph_208267695.jsonl @@ -0,0 +1 @@ +{"2354698|9486870": ["There are some existing surveys [26][50] done in this area, but our work is different from them as it is more comprehensive and has focus on the approach used for spam detection."]} diff --git a/edge/graph_208267895.jsonl b/edge/graph_208267895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ade0405d3fa0d8cbde519dbd4fb68c29735da4e --- /dev/null +++ b/edge/graph_208267895.jsonl @@ -0,0 +1,2 @@ +{"44105340|27262729": []} +{"67911592|49343018": []} diff --git a/edge/graph_208268208.jsonl b/edge/graph_208268208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd74459808ecbd4a09c386f778a356f9dd9e944d --- /dev/null +++ b/edge/graph_208268208.jsonl @@ -0,0 +1,2 @@ +{"7620478|206051485": ["2.1.2 Cell motion correction Motion correction methods can be roughly divided into two groups: feature and shape based (or area based) (Zitova and Flusser, 2003).", "2 Cell motion correction Motion correction methods can be roughly divided into two groups: feature and shape based (or area based) (Zitova and Flusser, 2003)."]} +{"32652772|2616070": ["The region energy Eregion is based on the Bayesian region-competition framework (Zhu and Yuille, 1996; Cremers et al., 2007): Eregion =\u2212 \u2211"]} diff --git a/edge/graph_208278842.jsonl b/edge/graph_208278842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208280356.jsonl b/edge/graph_208280356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d0d9ba45da34206b0e9a79258a1ba5a6f7ae781 --- /dev/null +++ b/edge/graph_208280356.jsonl @@ -0,0 +1,3 @@ +{"52165892|17776695": ["in particular on sleep monitoring devices or the challenges faced in acquiring signals during sleep [12], [18], [19]."]} +{"52165892|1722293": ["Ballistocardiography has several open research areas such as lack of standardization with respect to 1) the measured signal, by proposing a unified nomenclature for peaks and valleys and 2) a unified or a standard site of measurement [182]."]} +{"52165892|8446711": []} diff --git a/edge/graph_208280372.jsonl b/edge/graph_208280372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24cea9bc1c23de2f98c0c90d0d592d3c280f8900 --- /dev/null +++ b/edge/graph_208280372.jsonl @@ -0,0 +1,12 @@ +{"53819223|62497408": []} +{"53819223|8371086": ["Furthermore, future optical interconnection technology can attach new NVM resources to the high-speed interconnection network, thus achieving the pooling of distributed storage resources (Mishra et al., 2013)."]} +{"19195817|207228303": ["works in this area [30] and represents a good approximation for long-running software components.", "As shown in our recent survey [30], most previous research", "As shown in our recent survey [30], most previous research efforts fall into one of two categories: VM placement and VM selection."]} +{"44139009|207228303": ["The proposed optimization algorithm is compared with other existing optimization techniques such as Particle Swarm Optimization (PSO) [29], Genetic Algorithm (GA) [19], Simulated Annealing (SA) algorithm [19], Ant Colony Optimization algorithm (ACO) [19]."]} +{"28029619|3102110": ["Computing the data having higher-level weights can obtain approximate solutions [26]."]} +{"54460012|13295171": ["It is possible to implement redundancy in either hardware or software [10], but in either case the improved reliability of the system comes at the cost of using additional resources."]} +{"2252729|8914588": []} +{"14040999|10536678": []} +{"15424530|5547019": ["Operating systems such as Linux already expose some locality information to user-space applications [16], and HPC runtimes in particular."]} +{"16261067|2254944": ["\u2026resource allocation [Davis and Burns 2011], cover strategies based on only one basic principle [Yeo and Buyya 2006], focus on a speci\ufb01c domain [Hussain et al. 2013; Hameed et al. 2014] or optimization criteria [Henkel et al. 2013], and not explicitly and extensively covering hard and soft\u2026"]} +{"16261067|912956": []} +{"46966353|18750590": ["Finally, [23] provided a survey on applications of economic and pricing models for resource management in cloud networking."]} diff --git a/edge/graph_208280632.jsonl b/edge/graph_208280632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2794dc2d91b531b538c57823403e794dee343259 --- /dev/null +++ b/edge/graph_208280632.jsonl @@ -0,0 +1,10 @@ +{"117655477|26257441": []} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"21767813|17934515": ["Digital twin computation modules process these data and notify the physical systems about the findings, sometimes send control commands to make necessary changes in the physical world or reconfigure system parameters if required [6] [7]."]} +{"67770007|2532914": []} +{"5120196|16403716": []} +{"114709603|2762484": []} +{"36856510|10500613": ["Based on Rahm and Bernstein\u2019s work [38], Euzenat and Valtchev [39] have separated ontology alignment techniques into \ufb01ve distinct categories: Applications of ontology alignment include agent communication, web service integration, ontology-driven data integration, and schema matching, among others\u2026"]} +{"466277|2762484": []} +{"8600183|7350786": ["are researched [32]."]} +{"54028157|710141": ["M \u2286 R minimizing the information loss [27, 43] and therefore view the id as the minimal number of vectors linearly spanning the subspaceM.", "We note that the taxonomy we are using to group the reviewed methods is different from the one, commonly used by several authors in the past (as an example, see [43]), that viewed methods as global, when id estimation is performed by considering a dataset as a whole, or local, when all the data neighborhoods are analyzed separately and an estimate is computed by combining all the local results."]} diff --git a/edge/graph_208280651.jsonl b/edge/graph_208280651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..374ba8a92c38273d876a576a41fe3d11c8c41820 --- /dev/null +++ b/edge/graph_208280651.jsonl @@ -0,0 +1,7 @@ +{"1889662|18691290": []} +{"109132295|8783262": []} +{"55954401|12264500": []} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} +{"4560073|2135510": ["\u27a2 Driving Distances \u27a2 Tariffs \u27a2 Demand Response Techniques [133-137]."]} +{"4560073|33247252": ["In this regard, different public policies have been implemented to support electrification in the transportation sector in the US [10]\u2013[12].", "\u2022 J1772: EV conductive connector/charging method \u2022 J2894: Issues of power quality \u2022 J2836/2847/2931: Communication purposes [10] \u2022 J1773: Inductive coupled charging \u2022 J2293: For energy transfer systems to find the requirements for EVs and EVSE"]} +{"3755527|2135510": ["On the other hand, there seems to be a considerable interest in highly-relevant EV topics such as the impact of EVs on the electric power system [18], [19], EV charging scheduling [20]\u2013[23], and the forecast of EV sales [24]\u2013[26]."]} diff --git a/edge/graph_208280962.jsonl b/edge/graph_208280962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2badd1ae57d5773fe07210f9733f32a4e473e830 --- /dev/null +++ b/edge/graph_208280962.jsonl @@ -0,0 +1,6 @@ +{"21712422|88513503": ["To this end, we first build a model for f\u0302(x, y, z;h) using the locations of all drone-UEs except one [34]."]} +{"49866625|16362395": ["[67].", "ever, in pursuit of increasing degrees of freedom, the majority of developers used multiclass classifiers to map complex MI tasks11 into several output control commands for the aircraft [65], [67].", "classifiers, neural networks, nearest neighbor classifiers, and any combination of these classifiers [67]."]} +{"49866625|5503545": []} +{"5815085|7185733": ["Since gestures represent a direct expression of mental concepts, it is the most used interaction in literature [24]."]} +{"4832139|9270553": []} +{"7737926|4361938": ["Applications of gaze trackers can be found in fields ranging from psychology to marketing to computing science; many interesting examples are given in the survey provided by Duchowski [7]."]} diff --git a/edge/graph_208291226.jsonl b/edge/graph_208291226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..889ca623a335546502353ad6496fe35451122a39 --- /dev/null +++ b/edge/graph_208291226.jsonl @@ -0,0 +1,4 @@ +{"58004353|162600": []} +{"58004353|12377645": ["[405] conducted a systematic literature review on the use of robots as tools in introductory programming."]} +{"58004353|10565822": ["[554] provided a comprehensive overview of novice"]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} diff --git a/edge/graph_208302508.jsonl b/edge/graph_208302508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f391e22d7ea81644cc380393f61bac4f1371d6b --- /dev/null +++ b/edge/graph_208302508.jsonl @@ -0,0 +1,6 @@ +{"44117848|2521001": ["The security of smart grid [1, 13] has drawn a big attention to researchers from both academia and industry due to massive challenges posed by cyber-security threats [3, 12]."]} +{"54454620|3434731": ["The PBFT assumed that the faulty nodes only comprise less than thirty percent of the total nodes of the network [37]."]} +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"44239235|5385031": ["2739340 interactions via sensor devices, mobile personal computing, and advanced communication technologies to provide transparent, smart, ubiquitous, green, and safe services for humans [1]\u2013[3]."]} +{"44239235|2473564": ["Other models concentrated on the feature learning of multimodal data can be found in [21] and [22]."]} diff --git a/edge/graph_208309878.jsonl b/edge/graph_208309878.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aff78bd5ffc453748cf091fe1d7cba29249ca984 --- /dev/null +++ b/edge/graph_208309878.jsonl @@ -0,0 +1,12 @@ +{"57189435|3273340": ["During inference, CPUs and Neural Network accelerators are extensively used while GPUs are used for training Neural Network architectures [37].", "This property of Neural Networks makes them embarrassingly parallel [37]."]} +{"5171267|14077778": ["3 use the square-andmultiply exponentiation algorithm [28]."]} +{"5007685|3908141": ["An overview of existing toolflows for mapping CNNs on FPGAs is given in [17]."]} +{"5007685|22163846": ["Several approaches have been successfully deployed to compress networks, including [60]:"]} +{"4046474|3273340": ["For more details on CNNs, we refer the reader to [37]."]} +{"14942598|14077778": []} +{"44141604|1932843": [" could use to thwart such attacks. I. INTRODUCTION Machine learning, and more recently deep learning, has become hard to ignore for research in distinct areas, such as image recognition [1], robotics [2], natural language processing [3], and also security [4], [5] mainly due to its unquestionable practicality and effectiveness. Ever increasing computational capabilities of the computers of today and "]} +{"206779368|10355303": ["5In practical object tracking systems, this synchronization step is typically automated [19]."]} +{"52901601|385243": ["Similarly, these attacks can be used against veri\ufb01cation circuits, such as PIN veri\ufb01cation on a smartcard, where a comparison function can be skipped and grant access to a malicious user [17]."]} +{"3920864|3273340": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"2741260|14077778": []} diff --git a/edge/graph_208309956.jsonl b/edge/graph_208309956.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7d6a4b27f1406c1e8f4a2f5a001951514592bb3 --- /dev/null +++ b/edge/graph_208309956.jsonl @@ -0,0 +1,12 @@ +{"102353524|59600034": []} +{"102353524|6486398": ["Using the Python NetworkX2 implementation [29,42], Personalized PageRank runs in \u223c 30 seconds for each class.", "A natural fit for our task is the Personalized PageRank algorithm [29, 42], which scores each vertex\u2019s importance in a graph, based on both the graph structure and the weights associated with the graph\u2019s vertices and edges."]} +{"15019293|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} +{"29162614|206739910": ["traffic sign dataset containing 47 different road signs [21]."]} +{"44107179|3536399": ["We direct the interested reader to this survey for a detailed description [18] of the different attack strategies and defenses."]} +{"11283906|18782652": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"59600034|3342225": ["A recent survey on methods for explaining black-box models [76] outlined a taxonomy to provide classi\ufb01cations of the main problems with opaque algorithms."]} +{"59600034|4110304": ["A review of explanatory methods focused on understanding unit representations used by visual CNNs can be found in [52], which examines methods for visualization of CNN representations in intermediate network layers, diagnosis of these representations, disentanglement representation units, the\u2026"]} +{"59600034|17779926": ["Some of these sampling approaches only work on binary input [34] or use genetic algorithms to produce new training examples [35]."]} +{"7228830|17652653": []} diff --git a/edge/graph_208318010.jsonl b/edge/graph_208318010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0579da5adb9d8a7d555a5afd2989c9fc8007c4d5 --- /dev/null +++ b/edge/graph_208318010.jsonl @@ -0,0 +1,10 @@ +{"49389393|17485266": ["In addition, many improvements on the gradient descent algorithm have been proposed and widely used, such as SGD with momentum, RMSprop, and Adam [21 \u2013 23], though the details of these algorithms are beyond the scope of this article."]} +{"20316301|7834819": ["Concerning user acceptance, IMUs are usually well admitted in regards to privacy issues, in contrast to cameras at home [10]."]} +{"11449331|2814871": ["Additionally, these sensors can be used in any environment rather than the controlled environments [14]."]} +{"14050171|15744805": []} +{"53035934|18977370": ["These advantages made novelty detection techniques very successful in many applications ranging from fraud detection [17,18], medical diagnosis [19\u201321], fault detection [22,23], to anomaly and outlier detection in sensor networks [24,25], video surveillance [26,27] and text mining [28,29]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"12488359|7834819": []} +{"52916771|13881738": []} +{"1050107|7834819": ["The acceptance of such on-body electronics by elderly subjects is still an issue for human-computer interaction in healthcare: The weight, bulkiness, and location of on-body sensors [9], in particular for people with motor deficits."]} +{"5501898|7834819": ["However, the acceptance of such on-body electronics on legs and lower back by elderly subjects is still an issue for human\u2013computer interaction in healthcare due to the weight, bulkiness, and location of on-body sensors [10], in particular for people with motor deficits.", "According to R values, the top features are more equally distributed in the histogram, yet they are mapping to the ones as in case of MI, with the observation that the power on different intervals such as [6, 7]Hz, [10, 11]Hz, [12, 13]Hz or [13, 14]Hz, and thus the power on [13, 16] Hz can be added to the list of top informative features."]} diff --git a/edge/graph_208321163.jsonl b/edge/graph_208321163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c238d805564b4b0e2525473246b48d9a02632ae --- /dev/null +++ b/edge/graph_208321163.jsonl @@ -0,0 +1,3 @@ +{"53236587|1542716": []} +{"24518859|13187484": []} +{"206542436|1614929": []} diff --git a/edge/graph_208321777.jsonl b/edge/graph_208321777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4119104ac40b2dbfd4a88d9fc62be9e9f4e02cd --- /dev/null +++ b/edge/graph_208321777.jsonl @@ -0,0 +1,8 @@ +{"17631507|7854020": ["For intra-WSN communication the standard that most closely conforms to this project requisites is the IEEE 802.15.6 Body Area Network (BAN), which as of March 2014 is still under being drafted [19]."]} +{"4354870|7834819": ["What can consumer wearables do?Heart rate can be measured with an oximeter built into a ring [3], muscle activity with an electromyographic sensor embedded into clothing [4], stress with an electodermal sensor incorporated into a wristband [5], and physical activity or sleep patterns via an accelerometer in a watch [6,7]."]} +{"18303304|41505326": ["For vision-based HAR, systems require a two-dimensional (2D) video recorder or a low-cost integrated depth sensor (such as the sensors and cameras in a Kinect\u2122) [15]."]} +{"18303304|17747015": ["However, these technologies also suffer from a similar drawback as the vision-based technologies: radio-based HAR does not work in areas where a base station is unavailable [55]."]} +{"18303304|7834819": ["Indeed, waist-placement of wearable sensors can better represent most human motions because they are then close to the center of mass of the human body [73].", "\u2026in combination. or foot Indeed, waist-placement of wearable sensors can better represent most human motions Other researchers have also investigated the optimal placement of accelerometers for human activity recognition. because they are then close to the center of mass of the human body [73]."]} +{"18303304|206583375": ["Traditionally, indoor positioning systems (IPS) can been considered as systems that function continuously and in real-time to provide the locations of humans or objects in indoor areas [12].", "Moreover, medical care in hospitals also demands IPSs for tracking patients and expensive equipment, preventing theft, and precise positioning for robotic assistants during surgeries [12,20].", "In recent years, indoor positioning technologies have \ufb02ourished [9], including both hardware platforms and localization algorithms [12,20].", "\u2026decades, numerous indoor positioning approaches, such as Bluetooth, WiFi/WLAN, radio frequency identi\ufb01cation (RFID), ultra-wideband (UWB), have been developed; however, these vary greatly in terms of their resolution, coverage, precision, technology, scalability, robustness and security [10\u201312].", "Cost : the cost of IPS\u2014this metric mainly includes infrastructure costs (e.g., reuse existing infrastructure or install new devices), installing and maintenance cost (e.g., smartphone, smartwatch, can be reused to decrease infrastructure cost), energy consumption, space occupied, etc. [12,30]."]} +{"11216826|7834819": ["Inertial sensors in physical activity-monitoring systems have been used to detect falls, and several review papers summarize advances in this area [13,22-26]."]} +{"5609860|20905429": ["Recent research has shown that, by carefully managing system resources dynamically, wearable wireless units can collect data for several days without recharging their batteries [8], [ 9 ]."]} diff --git a/edge/graph_208357295.jsonl b/edge/graph_208357295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd618d9bb1160dd2b43be020960a71f5ff1fe333 --- /dev/null +++ b/edge/graph_208357295.jsonl @@ -0,0 +1,91 @@ +{"150241397|3126100": []} +{"58675319|61132": ["Among the issues in UAV communication networks discussed in [4], one important issue in UAV network is handoff."]} +{"58675319|1708582": ["In reinforcement learning, there are three basic elements: the environment to be explored, the agent to make a decision and the actions to be taken by agents [17]."]} +{"59538091|3767252": []} +{"59538091|6583734": []} +{"58676003|21386749": ["AS SMART services like metering, city or building lights management, environment monitoring, and vehicle traffic control, become pervasive in urban areas, the Internet of Things (IoT) technology emerges with the expectation to implement the inter-networking of a huge number of devices [1]."]} +{"64792997|51858916": ["was provided in [41].", "agation channel measurements and modeling [37], [40], [41]."]} +{"64792997|35695099": []} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"195767238|53018231": ["First, a majority of the existing works focuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks."]} +{"195767238|9461213": ["The smartphone-centric networks of yesteryears are gradually morphing into an Internet of Things (IoT) system [1]\u2013[3] that integrates a heterogeneous mix of wireless-enabled devices ranging from smartphones, to drones, connected vehicles, wearables, sensors, and virtual reality devices.", "of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks.", "2) Neural Networks for the Internet of Things: ANNs can be used to address some of the key challenges within the context of the IoT.", "In addition, the emergence of the Internet of Things further motivates the use of ANNs to improve the way in which wireless data is processed, collected, and used for various sensing and autonomy purposes.", "F. Internet of Things\n1) The Internet of Things: In the foreseeable future, it is envisioned that trillions of machine-type devices such as wearables, sensors, connected vehicles, or mundane objects will be connected to the Internet, forming a massive IoT ecosystem [160].", "Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software defined networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks.", "In particular, we have investigated many emerging applications including unmanned aerial vehicles, wireless virtual reality, mobile edge caching and computing, Internet of Things, and multi-RAT wireless networks."]} +{"195767238|3645740": ["of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks."]} +{"195767238|206578365": ["can be used for performing effective and low-latency computations using the emerging paradigm of mobile edge computing [140]."]} +{"195767238|17485266": []} +{"195767238|5385031": ["The smartphone-centric networks of yesteryears are gradually morphing into an Internet of Things (IoT) system [1]\u2013[3] that integrates a heterogeneous mix of wireless-enabled devices ranging from smartphones, to drones, connected vehicles, wearables, sensors, and virtual reality devices."]} +{"195767238|7774517": []} +{"195767238|1708582": ["ta from implementation. The goal of RL is to learn an environment and \ufb01nd the best strategies for a given agent, in different environments. RL algorithms are used for robotics, gaming, and navigation [67]. To perform these learning tasks, several frameworks have been developed. Among those frameworks, arti\ufb01cial neural networks (ANNs) [60] constitute one of the most important pillars of machine learnin"]} +{"53243784|76603": []} +{"53243784|3504276": []} +{"53243784|17464562": []} +{"203923287|49862415": ["A detailed overview of object detection systems using Deep Learning including comparisons in terms of accuracy and e \ufb03 ciency can be found in [59,60]."]} +{"53035780|51877788": ["Moreover the introduction of Internet of Things (IoT) will enhance the applications of UAV systems [46]; on the other hand, the integration into IoT systems can enlarge the vulnerability surfaces of UAVs systems, because the IoT systems have several attack surfaces [225]."]} +{"53035780|51858916": ["In [45], a recent survey studies only the channel modeling of UAV communications."]} +{"53035780|2958701": [", turn left, turn right, rotate left, and rotate right) [247]\u2013[249].", "For the flight control of UAVs, the inputs of the learning can be images, light imaging detection and ranging sensor data, or both [247]."]} +{"53035780|61132": ["In this way, facilitating the detection of complex events such as border intrusions [8], pipeline failures, public security, and vegetation analysis [9].", "An elaborate discussion of issues related to UAV communication have been presented in previous work [8], [14].", "such as quality of service and data requirements, we refer the reader to [8], [14] and the references therein.", "Moreover, the implementation of routing protocol cannot be straightforward in such networks [8], [14].", "Similar to [8], [14] focuses on the networking side of UAV by comparing UAV networks, mobile ad-hoc networks, and vehicular ad hoc networks.", "Topics such as routing protocols and handovers are thoroughly investigated in [8].", "Another main design challenge is to provide the users\u2019 sessions seamlessly and to consider delay tolerance, energy limitations, communication range, and controlling and coordination requirements [8], [14]."]} +{"53035780|15517134": ["ize an operational collision avoidance scheme, the following design challenges should be considered [136].", "The functionality of collision avoidance in UAVs systems is to guarantee that no collisions occur with other UAVs and/or the targets [136]."]} +{"53035780|15675156": ["Both methodologies delivered average results, but the PID was operated for a quadrotor with simplified dynamics, whereas the LQR was operated for a complete quadrotor model [236].", "The main drawback of this approach is related to robustness deficiencies [236], [238].", "2) Linear Quadratic Regulator (LQR): LQR is a control algorithm that works in a dynamic system to decrease a suitable cost function [236].", "A previous research [237] compared the performance of LQR and PID for a quadrotor UAV (as presented in [237] and [236], respectively).", "1) Sliding Mode Control (SMC): SMC, which is based on Lyapunov stability principles, is a nonlinear control method that forces a system to slide along a recommended path by using a discontinuous control signal [236]."]} +{"53035780|16120075": ["Within the paradigm of WSNs, [39] presents a study on the coverage problem when the sensors are equipped with cameras for video surveillance applications but up to 2010 only.", "Since the general coverage problem with most of its variants are proven to be NP-Hard [39] , [57], all work in this area is based on developing heuristic algorithms that require low complexity, especially if target tracking is part of the objective.", "Similarly, [39, 40] provide a review of the coverage problem in WSNs but up to 2008 only.", "Target coverage maximization is generally NP-complete for most variations, e.g., [39] and [57]."]} +{"53035780|6959212": ["system [39]\u2013[41]."]} +{"53035780|1517662": ["Collision estimation techniques include distance-based, actas-seen [125], probabilistic estimation [126] and worst case estimation [127].", "For further details on collision avoidance techniques, we refer the readers to [127], [133]\u2013[138] and the references therein."]} +{"21712422|88513503": ["To this end, we first build a model for f\u0302(x, y, z;h) using the locations of all drone-UEs except one [34]."]} +{"32797466|6218667": ["Recently, it was shown in [18] and [19] that using machine learning, it is possible to construct a more intelligent context-aware pattern formation system by predicting future situations as well as monitoring the current state."]} +{"32797466|61132": ["In this system, since UAVs are often powered by batteries [1], their life-time is limited."]} +{"85499144|3330461": ["Therefore, to address this challenge, deviceto-device (D2D) connections can be established to accommodate more users with wireless service, which allow direct transmission between two nearby users [21]\u2013[24]."]} +{"13722834|9576764": ["Keystroke dynamics [21], mouse dynamics [22], and touch dynamics [23] are examples for well-studied behaviors."]} +{"13722834|6906699": ["Keystroke dynamics [21], mouse dynamics [22], and touch dynamics [23] are examples for well-studied behaviors."]} +{"13722834|7257659": ["specific driver behaviors such as fatigue, drowsiness, and distraction [24]\u2013[26]."]} +{"13722834|15219853": ["In a comprehensive study, Yampolski and Govindaraju identified 28 behaviors used in behaviometrics research [20]."]} +{"52169284|61132": ["For example, the surveys in [8], [9] focussed on forming ad hoc networks between many UAVs in the sky."]} +{"52112396|76603": ["Targeting at long user equipments\u2019 (UEs) energy autonomy and user/system adaptivity to the continuously changing conditions, novel PSN designs have been proposed in the literature [1]."]} +{"52112396|1708582": ["The probabilities are updated according to the stochastic learning automata model [13]: for a user m currently associated with ch c the probability of continuing transmitting to the same ch is calculated as:", ", Algorithm 1, where each UE m forms a Qvalue for each of their available action am [13]."]} +{"192466605|4709516": ["Similarly to Mobile Ad-hoc NETworks (MANETs) and Vehicular Ad-hoc NETworks (VANETs) [5], [7], the Medium Access Control (MAC) is critical for FANETs because it determines when the UAVs can transmit data packets on shared wireless channel."]} +{"132208253|1708582": ["The performance of the proposed DQN-based UAV positioning scheme is compared with Q-learning based\nscheme.", "Traditional Q-learning [9] algorithms are not able to keep track of different UAV swarming patterns and channel conditions.", "Similar to Q-learning, DQN updates Q-function for each state-action pair, which is the expected discounted long-term reward for state s and action a at time slot n.", "We also observed that the optimal throughput achieved by the DQN model linearly increases with the number of epochs, which is not the case with the Q-learning model.", "10, our DQN algorithm significantly outperforms the Q-learning algorithm and is able to achieve the maximum normalized throughput close to 0.65.", "An important advantage of DQN over Q-learning (or other traditional reinforcement-learning-based algorithms) is that it can be trained for many different network conditions, including ESS.", "There are mainly two components in our DQN model: (1) convolutional neural network (CNN) [5], and (2) Q-learning based decision model.", "9, the DQN-based optimization algorithm significantly outperforms the Q-learning algorithm since it can achieve a normalized throughput that approaches 1.", "However, the DQN model based on individual parameter (PDR or SINR) outperformed the simple Q-learning model.", "Index Terms\u2014UAV swarming, deep Q-learning network (DQN), deep learning, relay placement, multi-hop queueing model, manned-and-unmanned (MUM) network.", "Since the optimization algorithm alone may not achieve the optimal relay positioning, the third novelty of our research is to integrate an optimization model with deep Q-learning network (DQN)-based algorithm for determining the relay UAV position.", "For this ESS case, the performance of our DQN-based optimization algorithm is compared with the Q-learning scheme.", "4, the system uses CNN to enhance the learning rate of Q-learning module as the UAV swarm formation and network communication capacity change over time.", "1) State, s: Q-learning is used to derive the best long-term policy to determine the optimal UAV positioning pattern under different conditions, such as low channel quality and external interference signals.", "For the same hop (hop-1) the Q-learning algorithm does not achieve such a high throughput."]} +{"2958701|4716814": ["An evidence of the suitability of deep learning for many kinds of autonomous robotic applications is the increasing trend in deep learning robot related scientific publications over the past decades, which is expected to continue growing [8]."]} +{"2958701|1932843": ["These types of problems are suitable to be solved by means of a reinforcement learning framework [28]."]} +{"2958701|393948": ["These deep models show great performance not only in Computer Vision tasks but also in other tasks such as speech recognition, signal processing, and natural language processing [5]."]} +{"53018231|20384442": []} +{"53018231|206456479": ["Network slicing [157] and NFV [97] are two emerging concepts for resource allocation in the 5G ecosystem to provide cost-effective services with better performance."]} +{"53018231|18750590": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|5385031": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|12325031": ["Also, there are surveys discussing the applications of machine learning for networking such as [9], [10], [11], [12], and [13]."]} +{"53753114|7329149": []} +{"133337901|3645740": ["Prospective researchers in the area may \ufb01nd the comprehensive survey of ML techniques for cellular communication network a pertinent starting point [107]."]} +{"133337901|4716814": ["Many studies have been done to develop intelligent mobile robots communication systems such as [43,104]."]} +{"51858916|61132": ["For instance, reference [58] identified key issues related to the formation of multi\u2013UAV network, but this survey focuses more on the communications and especially the control of UAV.", "Both [58] and [59] have very light touch on the channel modeling."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"51895302|61132": ["dynamic network topologies owing to the freely flying drones [10].", "In some applications, completing intricate tasks is not feasible with a single UAV owing to the drones\u2019 limited flight time, payload, and communication range [10]."]} +{"51924560|61132": ["On the other hand, this increases the dif\ufb01culty in routing strategy design since the network researchers need to consider the service requirements and the performance of paths in terms of packet loss rate, end-to-end delay, and throughput [11]."]} +{"52114222|2958701": ["auxiliary functions for the actual path planning, see [14] for a review."]} +{"52114222|61132": ["[8] and [9] provide summaries of the general challenges and opportunities."]} +{"116864775|6556803": ["Therefore, the framework is an MDP.", "An MDP consists of five basic components [19]: 1) a finite set of states, 2) a finite set of actions, 3) a transition probability function, 4) the immediate reward function, and\nAlgorithm 1 Double Q-learning based algorithm for trajectory optimization\n1: Input: User positions and user requests 2: Init: UAV position, QA, QB , sj 3: repeat 4: if rand (\u00b7) \u03b5 then 5: [exploration step] 6: randomly choose one action 7: receive immediate reward for the agent UAV 8: Update table QA or QB as given in (14) (15) 9: else\n10: [exploitation step] 11: Choose (e.g. in turn, randomly) either update table QA or\ntable QB\n12: if update table QA then 13: Choose action aj = argmaxaj Q B (sj , aj) from QB 14: receive immediate reward for the agent UAV 15: Update table QA as given in (14) 16: else if update table QB then 17: Choose action aj = argmaxaj Q A (sj , aj) from QA 18: receive immediate reward for the agent UAV 19: Update table QB as give in (15) 20: end if 21: end if 22: sj \u2190 s\u2032j 23: until end\n5) the set of decision epoch, which can be finite or infinite.", "We first prove that the proposed framework is an Markov Decision Process (MDP) [19].", "The work in [18, Theorem 1] proved that, for an MDP corresponding to a double Q-learning algorithm, both Qtables converge to the same optimal value under the following conditions: 1) the MDP is finite, i.e. |S \u00d7 A| < \u221e; 2) the discount factor \u03b3 \u2208 [0, 1); 3) the Q values are stored in a lookup table; 4) both QA and QB receive an infinite number\nof updates; 5) the learning rate \u03b1L \u2208 [0, 1]; 6) the reward function is finite.", "Thus, the convergence of the proposed Q-learning algorithm can be viewed as the convergence of an MDP, which is given by the following corollary.", "The following theorem proves that the proposed framework is an MDP, which can be given by:\nTheorem 1.", "In consequence, the MDP is finite.", "In summary, the proposed double Q-learning framework satisfied all the conditions of an MDP.", "Next, we prove that the components of the proposed double Q-learning framework satisfied the conditions of an MDP.", "An MDP consists of five basic components [19]: 1) a", "The proposed double Q-learning framework is an MDP.\nProof.", "From Theorem 1, we can see that the proposed double Qlearning framework is an MDP with five basic components."]} +{"4711752|1680300": ["Existing AMC algorithms can be divided into two main categories [3], namely, likelihood-based (LB) methods and feature-based (FB) methods."]} +{"198168870|26259297": ["Most existing hybrid precoding architectures had the phase shifter network in the analog precoding part, and the RF chains were connected to large-scale antenna arrays through phase shifters [3]."]} diff --git a/edge/graph_208358897.jsonl b/edge/graph_208358897.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208498076.jsonl b/edge/graph_208498076.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c2e558474f108e51d24a200a7a7bb3781944933 --- /dev/null +++ b/edge/graph_208498076.jsonl @@ -0,0 +1,5 @@ +{"22830958|34704358": []} +{"182128583|34704358": ["(MF) with strong evanescent field and high-intensity surface field is capable of enhancing the light-matter interactions [6],"]} +{"103753552|15589021": []} +{"25758347|7260566": ["been utilized to produce GO and rGO (reduced graphene oxide) that has been emerged as a potential candidate in many sensing applications [8].", "In particular graphene has been used for this purpose due to its unique structure along with exciting optical and electronic properties [8].", "oxide have been proposed to produce graphene sheets [8]\u2013[12]."]} +{"77387319|34704358": []} diff --git a/edge/graph_208512830.jsonl b/edge/graph_208512830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bb12c77563c1096769283e7d3f64c02f7696f5d --- /dev/null +++ b/edge/graph_208512830.jsonl @@ -0,0 +1,3 @@ +{"67705174|16768404": ["[4] 2) Machine learning: It is an automatic classification process."]} +{"67705174|8090242": ["Hindi is resource scarce language [16]."]} +{"67705174|14126122": ["Next step is to extract features from the text [3]."]} diff --git a/edge/graph_208513473.jsonl b/edge/graph_208513473.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4cf71958fbb51a6dd05e27c58741a13f6c481003 --- /dev/null +++ b/edge/graph_208513473.jsonl @@ -0,0 +1,23 @@ +{"21327267|10869869": ["al [13] present a survey of adversarial attacks on machine learning models including evasion, poisoning, and extraction."]} +{"6397074|49842767": ["It is worth noting that results from the literature of clustering stability [29] can not be directly exploited to this end, since the noise induced by adversarial manipulations is not generally stochastic but specifically targeted against the clustering algorithm."]} +{"14757739|13172512": [", [27, 54, 49, 23, 25]) and machine learning algorithms pervade several contexts of information technology.", "For example, classification and regression models are employed to analyze current and historical trends to make predictions in financial markets [24, 33, 8], to study biological problems [54], to support medical diagnosis [30, 42, 57], to classify network traffic or detect anomalies [22, 28, 39, 12, 49].", "SVM for network traffic classification As shown by the extensive literature on this topic [28, 27, 49, 15], network traffic classification is commonly realized by means of Machine Learning algorithms, like K-Means, HMM, decision trees, and SVM."]} +{"4055261|17292349": ["[27], McMinn et al."]} +{"4055261|14920988": []} +{"4909695|8533795": []} +{"4909695|5238287": ["This has various applications in different domains, such as human\u2013computer interaction, surveillance, and targeted advertising systems [24]."]} +{"3545912|3536399": ["See [1] for a recent review of literature in this direction."]} +{"52071803|16426065": ["Metamorphic testing is a classical software testing method that identifies software bugs [15, 36, 44]."]} +{"52298127|2088679": ["There is a huge gap of deep learning methods in this domain, with only a few notable papers concentrating on deep survival analysis [97]."]} +{"52298127|9928823": ["Among various machine-learning algorithms, \u201cdeep learning,\u201d also known as representation learning [29], is widely used in these applications."]} +{"10242377|8533795": []} +{"49671507|8533795": ["\u2019s data alone. Differentially private approaches to machine learning work in a similar way: models lacking data relating to a particular individual function extremely similarly to those containing it [45]. This provides intrinsic protection against a great deal of model inversion attacks. Theoretically, such learning algorithms are just as powerful as non-differentially private ones [46]. Since algori"]} +{"49671507|17675973": ["5% of global power consumption [34], as well as time and labour costs."]} +{"51889364|47017937": ["In the case of U-Net [138], which is a CNN model used for image segmentation in the biomedical field, there are several variants [139, 140, 141] proposed."]} +{"51889364|3519414": ["Advances of deep learning (DL) algorithms have transformed the solution of data-driven problems in various applications in real life, including the use of large amounts of patient data for health prediction services [1]; autonomous security audits from system logs [2]; and unmanned car driving powered by visual object detections [3].", "\u2026of datadriven problems in various applications in real life, including the use of large amounts of patient data for health prediction services [Shickel et al. 2017]; autonomous security audits from system logs [Buczak and Guven 2016]; and unmanned car driving powered by visual object\u2026"]} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"195347024|393948": []} +{"3362349|393948": ["This can be attributed to the DNN\u2019s ability to learn higher level abstractions of raw features (termed representation-learning [3]), which substitutes manual feature engineering or the usage of high level features."]} +{"199501905|2088679": ["With the massive popularity of the machine learning (ML) [9] based softwares, especially in the safety critical areas, including autonomous driving [4, 29], medical analysis [22], etc."]} +{"3617652|17904357": ["[4, 5] presented ways to train both simple models (e.", "Most of the related works focus on the privacy of training phase (see [4, 5, 31])."]} +{"4111957|14258620": []} +{"25042971|5538934": []} diff --git a/edge/graph_208515169.jsonl b/edge/graph_208515169.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9931a207309567b0231167a23ed095cc982a7f1c --- /dev/null +++ b/edge/graph_208515169.jsonl @@ -0,0 +1,2 @@ +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"27329728|16362395": ["The SVM uses regularization parameter, C, which enables accommodation to outliers and allows errors on the training set [9]."]} diff --git a/edge/graph_208522784.jsonl b/edge/graph_208522784.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2af5e08add58b9cddea5f5ddf6fdc837b32127d0 --- /dev/null +++ b/edge/graph_208522784.jsonl @@ -0,0 +1,4 @@ +{"117930143|15847982": []} +{"886230|15847982": ["In subsequent years several further structural parameters have been considered, such as\n\u2013 the treewidth of dual graphs, twd, \u2013 the treewidth of incidence graphs, tw\u2217,\nand various width parameters on constraint hypergraphs, including\n\u2013 the (generalized) hypertree width, (g)hw, (Gottlob, Leone, and Scarcello [14]), \u2013 the spread-cut width, scw, (Cohen, Jeavons, and Gyssens [6]), and \u2013 the fractional hypertree width, fhw, (Grohe and Marx [17]).", "\u2013 the (generalized) hypertree width, (g)hw, (Gottlob, Leone, and Scarcello [14]), \u2013 the spread-cut width, scw, (Cohen, Jeavons, and Gyssens [6]), and \u2013 the fractional hypertree width, fhw, (Grohe and Marx [17]).", "Gottlob, Scarcello, and Sideri [16] have determined the parameterized complexity of constraint satisfaction with bounded treewidth of primal graphs: CSP(tw,dom) is fixed-parameter tractable, and CSP(tw) is W[1]-hard."]} +{"8040679|13367514": []} +{"6905561|2840997": ["Satisfiability provides a powerful and general formalism for solving various important problems including hardware and software verification and planning [8, 64, 100, 56]."]} diff --git a/edge/graph_208522955.jsonl b/edge/graph_208522955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..285cca9ae7c0431f4fdde441a72b78afbb5b9e35 --- /dev/null +++ b/edge/graph_208522955.jsonl @@ -0,0 +1,10 @@ +{"14239769|10494098": ["There are already some review papers (e.g., Bonizzoni et al. [4], Gusfield [ 5 ], Halldorsson et al. [6], Stephens and Donnelly [7], Adkins [8])."]} +{"4646937|289357": ["Construction 1 also implies subexponential lower bounds for our problems based on the widely believed complexity-theoretic hypothesis known as the \u201cExponential-Time Hypothesis\u201d 1 (ETH, see [18, 24])."]} +{"32518807|10644788": []} +{"40368686|289357": []} +{"14643099|1507400": ["Due to the computational challenges, parallel computing has been increasingly important in the biological research area, especially in highperformance sequencing (Taylor 2010)."]} +{"927508|10494098": ["The PPH problem is now well known (for example discussed in several surveys on haplotyping methods [Bonizzoni et al., 2003; Halld\u00f3rsson et al., 2003a, 2003b; Gusfield, 2004]).", "is now well-known (for example discussed in several surveys on haplotyping methods (Bonizzoni et al., 2003; Halld\u00f3rsson et al., 2003a,b; Gusfield, 2004))."]} +{"3445072|10494098": []} +{"36482739|6375360": ["We use Gray codes [14] to visit all the haplotype matrices"]} +{"1028450|1453547": []} +{"1028450|41878962": ["e-width at most q, and a q-expression dening it can be computed in linear-time. The algorithmic properties of several subclasses of (q;q 3)-graphs have been considered in the literature. We refer to [8] for a survey. Furthermore, there exists a canonical decomposition of (q;q 3)-graphs, sometimes called the primeval decomposition, that can be computed in lineartime [10]. Primeval decomposition can b", "two ends u;vin the independent set, and its two middle vertices are, respectively, in N G(u) nN G(v) and N G(v) nN G(u). Furthermore, when Gis a (q;q 3)-graph, it follows from the characterization of [5, 7, 8, 6, 64] either it has a quotient graph of bounded order O(q) or it is part of a well-structured subclass where the vertices of all neighbourhoods in the independent set follow a rather nice pattern (namely, ", " by q(G), as the minimum q7 such that Gis a (q;q 3)-graph. The structure of the quotient graph of a (q;q 3)-graph, qbeing a constant, has been extensively studied and characterized in the literature [5, 7, 8, 6, 64]. We take advantage of these existing characterizations in order to generalize our algorithms with modular decomposition to O(q(G)O(1) n+ m)-time algorithms 5 (Theorems 18 and 20). Let us give some in", "hm for computing a maximum matching in a given (q;q 3)-graph. However, a characterization of the quotient graph is not enough to do that. Indeed, we need to go deeper in the p-connectedness theory of [8] in order to better characterize the nontrivial modules in the graphs (Theorem 23). Furthermore our algorithm for (q;q 3)-graph not only makes use of the algorithm with modular decomposition. On our w", "ity of several classical graph problems under a wide range of parameters such as clique-width and its upper-bounds modular-width [32], splitwidth [78], neighbourhood diversity [68] and P 4-sparseness [8]. The results are summarized in Table 1. Roughly, it turns out that some hardness assumptions for general graphs do not hold anymore for graph classes of bounded clique-width. This is the case in part"]} diff --git a/edge/graph_208527176.jsonl b/edge/graph_208527176.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d888078d09353b89404ee8a78bb512ad83508bef --- /dev/null +++ b/edge/graph_208527176.jsonl @@ -0,0 +1,68 @@ +{"59159245|393948": []} +{"4455970|10355303": ["Note that the maximum sequence length is 30, thus t \u2208 [1, 30].", "Object tracking is a common task in computer vision, with a long history spanning decades [50,30,44]."]} +{"198347261|10355303": ["Visual tracking [36, 25, 24] is a fundamental computer vision problem and has many realistic applications including video surveillance, behavior analysis, to name a few."]} +{"2519672|10355303": ["The signi\ufb01cant activity in the \ufb01eld over last two decades is re\ufb02ected in the abundance of review papers [1\u20139]."]} +{"2519672|17516538": []} +{"2519672|14970359": []} +{"2519672|7788290": []} +{"1762187|10355303": ["We in this section discuss the tracking methods that are most related to our work, and refer the readers to a thorough review on object tracking survey [33, 59] and benchmark evaluations [50, 58]."]} +{"4603031|195346070": []} +{"15287463|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"16402511|10355303": []} +{"16402511|393948": []} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"206592484|456491": []} +{"22947351|10355303": ["VISUAL object tracking is one of the fundamental problems in computer vision with numerous applications such as intelligent video surveillance, human computer interaction and autonomous driving [1], [2], [3], [4], to name a few.", "A comprehensive review on visual tracking can be found in [1], [2], [3], [4]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"70327477|10355303": ["Li et al. [25] analyse only the description, with a comprehensive summary of global and local features and a review on generative, discriminative and hybrid learning approaches.", "Tracking is in its generality unsolved, only partial solutions to Equation 7 under rather speci\ufb01c constraints are available in literature [8], [10], [21], [22], [23], [24], [25], [26]."]} +{"52061573|10355303": ["The reader is referred to more thorough reviews on object tracking survey [30, 34, 53] and benchmark evaluations [41, 52].", "Online visual tracking of an arbitrary temporally changing object, specified at the first frame, is an extensively studied problem in computer vision [30, 41, 53]."]} +{"41502497|10355303": ["[100] gave a detailed summary of target appearance models."]} +{"54602508|393948": ["Different from the traditional hand-crafted features [5], [6], [7], a multi-layer neural network architecture can ef\ufb01-ciently capture sophisticated hierarchies describing the raw H. Li is with the School of Computer and Information Engineering, Jiangxi Normal University, Jiangxi, China."]} +{"1118174|10355303": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"1118174|17516538": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"1118174|14970359": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"1118174|7788290": ["Index Terms\u2014Performance analysis, single-target tracking, model-free tracking, tracker evaluation methodology, tracker evaluation datasets, tracker evaluation system\nF"]} +{"4568981|10355303": ["We refer readers to the excellent surveys on object tracking [28]\u2013[30]."]} +{"206870493|60779308": []} +{"198162846|53800586": ["[16] Junyao Guo, Unmesh Kurup, and Mohak Shah.", "Many existing datasets for object tracking focus on pedestrian tracking from image/video sequences [16, 48, 43, 2]."]} +{"49476505|10355303": ["We discuss the tracking methods that are most related to our work in this section, and refer the readers to a thorough review on object tracking survey [47] [24] and benchmark evaluations [38] [45]."]} +{"17704601|10355303": ["I. INTRODUCTION\nV ISUAL tracking is a fundamental problem in computervision with a wide range of applications."]} +{"67793052|10355303": []} +{"29498806|10355303": []} +{"57573771|10355303": ["Tracking at real-time speeds plays a vital role in numerous vision applications, such as surveillance, robotics, and human-computer interaction [10, 21, 30, 43]."]} +{"4340068|10355303": ["g has been an active research topic in computer vision. In this section, we discuss the most closely related tracking-by-detection approaches. Comprehensive reviews on object tracking can be found in [52,32,48]. 2.1 Tracking-by-Detection Tracking-by-detection methods treat object tracking in each frame as a detection problem within a local search window, and often by incrementally learning classi\ufb01ers to sep", "l 1 Introduction Object tracking is one of the fundamental problems in computer vision with numerous applications including surveillance, human-computer interaction, and autonomous vehicle navigation [52,32,48]. Given a generic target object speci\ufb01ed by a bounding box in the \ufb01rst frame, the goal of object tracking is to estimate the unknown target states, e.g., position and scale, in the subsequent frames. "]} +{"6795574|5972227": ["Recently, a survey is presented for a wired-sensor network, focusing on the capability of methods to give a simple estimation for the position of the object [23]."]} +{"6795574|18546648": ["For instance, in shadow detection [48] pixel level evaluation is advised [49]."]} +{"14284153|10355303": ["The significant activity in the field is also reflected in the abundance of review papers [23,43,22,29,44,65,40] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"14284153|17516538": ["The significant activity in the field is also reflected in the abundance of review papers [23,43,22,29,44,65,40] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"14284153|14970359": ["The significant activity in the field is also reflected in the abundance of review papers [23,44,22,29,45,65,41] summarizing the advances published in conferences and journals over the last fifteen years."]} +{"14284153|7788290": []} +{"3498240|18090044": ["[11] The whole process of target tracking High 2016 Detailed (The whole process of tracking, the metrics for analyzing algorithms, the requirement of tracking based on WSNs)", "In [11], the authors are focused on introducing the related knowledge of target tracking for sensor networks, rather than analyzing and comparing different target tracking algorithms.", "We also compare our papers with other survey papers [11,18] in Table 2, which provides a relatively complete overview of target tracking."]} +{"3498240|31355144": ["Similarly, in [60], KF is applied in a distributed architecture to estimate the position of a single target moving through UWSNs and improve energy efficiency.", "Compared with TASA, the collaborative nature of UWSNs brings several advantages such as self-organization, rapid development and inherent intelligent processing capability [60].", "KF [60] Medium Medium Medium 2-D targets"]} +{"3498240|5972227": ["[12] The management of energy for target tracking Medium 2012 Brief", "Some other review articles are only centered on one aspect of the tracking algorithms based on WSNs such as energy-efficiency [12], prediction algorithms [13], target recovery techniques [14], and security [15]."]} +{"3498240|870434": ["Moreover, the speed is variable with respect to the water temperature, sanity and depth [17]."]} +{"3498240|1230643": ["UWSNs have superiority over TASA in low-cost, self-organization, fault tolerance and rapid deployment [28].", "organization, fault tolerance and rapid deployment [28]."]} +{"7271501|18357056": ["In a more recent survey Portugal et al. identi\ufb01es several approaches (Portugal and Rocha, 2011).", "It has been observed experimentally (Almeida et al, 2004; Portugal and Rocha, 2011) and proved formally (Elmaliach et al, 2009; Pasqualetti et al, 2010) that the optimal solution against idleness is to solve a TSP over the whole area, in order to \ufb01nd an Hamiltonian cycle, and distribute the robots\u2026", "whose interest has risen over the last decade (Portugal and Rocha, 2011).", "It has been observed experimentally (Almeida et al, 2004; Portugal and Rocha, 2011) and proved formally (Elmaliach et al, 2009; Pasqualetti et al, 2010) that the optimal solution against idleness is to solve a TSP over the whole area, in order to find an Hamiltonian cycle, and distribute the robots regularly along this path.", "The variety of target related robotics problems and proposed approaches has motivated a vast amount of contributions, and several surveys focused on specific problems are available (Urrutia, 2000; Alspach, 2006; Chung et al, 2011; Miao, 2010; Portugal and Rocha, 2011; Nahin, 2012; Stone, 2007).", "We do not aim at being exhaustive (several surveys on the problems addressed are available (Urrutia, 2000; Chung et al, 2011; Miao, 2010; Portugal and Rocha, 2011; Stone, 2007)), but rather try to emphasize the main work and also some interesting uncommon approaches.", "It is a rather recent area of research, whose interest has risen over the last decade (Portugal and Rocha, 2011).", "One may refer to Portugal\u2019s survey for more references (Portugal and Rocha, 2011).", "\u2026) The variety of target related robotics problems and proposed approaches has motivated a vast amount of contributions, and several surveys focused on speci\ufb01c problems are available (Urrutia, 2000; Alspach, 2006; Chung et al, 2011; Miao, 2010; Portugal and Rocha, 2011; Nahin, 2012; Stone, 2007).", "based strategy (right) \u2013 excerpt from (Portugal and Rocha, 2011)."]} +{"43942930|8446711": [". Integrating visible and thermal (called RGB-T in this paper) spectrum data has been proven to be effective in boosting tracking performance, and also allows tracking target objects in day and night [1]. Visible and thermal information complement each other and contribute to visual tracking in different aspects. On one hand, thermal infrared camera can capture infrared radiation (0.75-13m) emitted "]} +{"57375100|10355303": ["signed to be robust to numerous appearance variations of the target object, where common challenges arise from changes in illumination, motion blur, deformation and occlusion from surrounding objects [24]. To solve the aforementioned challenges, two approaches are mainly utilized to cover the appearance variations of the target object. One approach is to update the appear1 arXiv:1702.06291v2 [cs.CV] 1"]} +{"52350875|10355303": ["In this section, we mainly focus on the tracking benchmarks that are relevant to our work, and refer the readers to surveys [32, 47, 54, 30] for tracking algorithms.", "Visual tracking, aiming to locate an arbitrary target in a video with an initial bounding box in the first frame, has been one of the most important problems in computer vision with many applications such as video surveillance, robotics, human-computer interaction and so forth [32, 47, 54]."]} +{"54475412|10175374": ["We conducted two further experiments to disentangle the effect of multi-task learning [8, 53] to the one of using the MBR box (from a binary mask) as representation for the target object instead of a traditional axis-aligned bounding box."]} +{"54471994|4884302": ["(DRL) [47] has gained considerable attention and been suc-"]} +{"54471994|10355303": []} +{"57189581|11786999": []} +{"5648267|10355303": []} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"196212273|207060556": []} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} +{"13028371|10355303": ["We refer the readers to a comprehensive review on visual tracking in [33, 22, 26]."]} +{"102487133|17036197": ["The state-of-the-art deep tracking methods [1, 46, 15, 55, 27, 60, 58, 54, 4, 19, 33, 34] typically use pretrained CNN models for feature extraction."]} +{"4728161|10355303": ["Template matching [17] or other techniques for shape description [23] and action classification [19] can then be applied straightforwardly for more detailed analyses tuned to the specific animal and question of interest."]} +{"196205949|11786999": ["The feature embedding can be trained by the contrastive loss and is simultaneously used to metric the similarity between the object and the sample through Siamese network [29] with the Y-shaped network architecture [26]."]} +{"18230212|43033940": ["In our future work we will also address the quality and reliability of manual ground-truth annotations by various people [7]."]} +{"61153433|10355303": ["Li et al. [102] and Yang et al. [169] discussed object appearance representations and performed surveys for online generative and discriminative learning.", "Li et al. [102] gave a detailed sum-mary of target appearance models."]} +{"16695472|10355303": []} +{"20143699|9022135": ["While for the discriminative trackers, all the human locations in each video frame are first obtained through a human detection algorithm [17], and then the tracker jointly establishes these human objects\u2019 correspondences across frames through a target association technique."]} +{"6139664|10355303": []} diff --git a/edge/graph_208527450.jsonl b/edge/graph_208527450.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76d85c9800342643b1369c1b6a324495fce109f6 --- /dev/null +++ b/edge/graph_208527450.jsonl @@ -0,0 +1,34 @@ +{"38660356|1503157": []} +{"54465033|3119314": []} +{"199016021|54446993": ["However, these data contain sensitive personal information and can reveal the identity of the associated stakeholders if a proper privacy preserving mechanism is not in place [2]."]} +{"199016021|3818445": ["On the other hand, a hierarchical edge computing architecture can resolve the issues associated with centralized architectures by pushing data pipeline functions towards the edge of the IoT networks depending on the resource availability and application requirements [4, 5]."]} +{"21073761|485843": ["\u2022 Geo-distribution: Power generators, energy transformers and distribution networks form the infrastructure of the smart grid [31]."]} +{"21073761|121289": ["Using such two-way communication, Advanced Metering Infrastructure (AMI) ensures delivery of a reliable, secure and cost-effective service throughout the system [14]."]} +{"53279822|18801114": ["Recently, some work regarding classifying interference via spectrum sensing [92] on IIoT devices has been presented but most of the existing work fails since a very long sampling win-"]} +{"53279822|206901977": ["Many energy-efficient schemes for wireless sensor network (WSN) have been proposed in recent years [60], but those approaches are not immediately applicable to IIoT."]} +{"53279822|28210515": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"52015330|206578486": ["[8] \u2713 Paper Q oS Co st En er gy Ba nd w id th", "The authors in [8] present a comprehensive review of current literature in fog computing with a focus on architectures and algorithms in fog systems."]} +{"52015330|206578224": ["The survey in [14] introduces a survey on MEC and focuses on the fundamental key enabling technologies in MEC.", "MEC allows edge computing to be accessible to a wide range of mobile devices with reduced latency and more efficient mobile core networks [14]."]} +{"52015330|12675271": ["The recent survey in [11] focuses on connectivity and device configuration aspects of the fog computing and identifies major features that fog computing platforms need to build infrastructure for smart city applications."]} +{"52015330|206578365": ["Similarly, the survey in [15] provides a survey of the recent state of MEC research with a focus on joint radio and computation resource management."]} +{"52015330|8523192": ["Foundations Surveys [8, 9, 13, 43, 67, 71, 78\u201386, 97\u2013105]"]} +{"52015330|16654832": ["Mobile applications can be partitioned at runtime so that computationally intensive components of the application can be handled through adaptive offloading [34]."]} +{"53441574|31245252": ["The Internet of Things (IoT) provides a bridge between sensors, controllers, and actuators to enable the ultrareliable low latency communication services for control applications in industrial automation [1]\u2013[9]."]} +{"27999524|6583734": ["software virtualization technology [22], [23]."]} +{"27999524|44461432": []} +{"27999524|10693567": ["Therefore, the technology standardization for IIoT is a very complex task, the main problems of which include [28]: a) coordination between the various standardization organizations is not sufficient, and there are different versions of standards, which are incompatible with each other; b) the progress of standardization is insufficient to keep up with market changes and the requirements of industry; and c) no unified standardization can be accepted widely, especially accepted and practiced by small and medium-sized enterprises."]} +{"3579945|30518875": ["Satellites are used for both locating trains (aided by Global Navigation Satellite Systems (GNSS) systems [21], like GPS, the European GALILEO, the Russian GLONASS or the Chinese BEIDOU) and communicating with the wayside equipment."]} +{"3579945|13991708": ["\u2026advances in electronics, networking, and robotics, it is feasible to develop advanced sensor systems for different sectors and applications: energy ef\ufb01ciency [32], Industry 4.0 [33,34], home automation [35], public safety and defense [36,37], precision agriculture [38] or transportation [39].", "Furthermore, Wireless Sensor Networks (WSNs) have evolved into an integral part of the protection of mission-critical infrastructures [36]."]} +{"3579945|6878121": ["IEEE 802.11p [15] may be an option if high data rates are not required."]} +{"3579945|22833814": ["Furthermore, in the case of high-speed scenarios, Wang et al. [9] present a survey on channel measurements and models."]} +{"3579945|10744611": ["Two major families of technologies may be considered [19,20]: \u2022 Satellite solutions."]} +{"3579945|17905276": ["WSN-based condition monitoring for the rail industry is the object of the survey presented in [87]."]} +{"3579945|860072": []} +{"57756894|29859741": ["\u2026modern vision, healthcare edge computing is emerging as a way for entities to embrace near real-time results by processing data as close as possible to the source, de\ufb01nitely stating that cloud computing is not an ef\ufb01cient way to process data when data are produced at the edge of the network [5].", "The main contribution of this paper is the design of a new communication and computing architecture for mobile healthcare monitoring based on the edge paradigm [5] rather than on the classical cloud paradigm to achieve the following."]} +{"58011555|3757239": ["Content Caching/Storage: The explosive growth of user data, especially multimedia data, has brought considerable stress on mobile networks [13]."]} +{"58011555|6909107": ["Instead of local execution, there are the following two computation off loading modes [12]."]} +{"58011555|206578365": ["As such, mobile edge computing (MEC) has been proposed to transfer the computation and storage capacity from cloud computing to local servers, and is able to greatly improve the QoS to users, such as reducing user-perceived latency and energy consumption of user devices [7]."]} diff --git a/edge/graph_208527478.jsonl b/edge/graph_208527478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e19e1ff9cab4f298c0ad8eaa14001d9f4556b32 --- /dev/null +++ b/edge/graph_208527478.jsonl @@ -0,0 +1,59 @@ +{"10552590|206932295": []} +{"10552590|15782139": []} +{"196188418|44286242": []} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"37131735|206932295": []} +{"37131735|393948": []} +{"7868471|393948": ["Index Terms\u2014Image set classification, deep learning, auto-encoders, video based face recognition, object recognition\n\u00c7"]} +{"8789486|15782139": ["On-line, or dynamic, signature verification systems have been reported with high success rates [15]."]} +{"433116|5575638": ["Examples of recent challenges that had a profound im\u00ad pact on the field of computer vision are the ImageNet Large Scale Visual Recognition Challenges (ILSVRC) [11, 42], which focus on image classification and object localization problems, the Visual Object Tracking (VOT) [ , 2i , ] challenges that aim at evaluating various solutions to ob\u00ad ject tracking in videos, and the ChaLeam Looking at Peo\u00ad ple [16, 17, 51] series of challenges, where human-centric vision problems are at the center of attention."]} +{"433116|207115339": ["Head rotation: Images from the AWE dataset contain annotations with respect to pitch, roll and yaw angles that can be used to explore the impact of head rotation on ear recognition performance.", "The core part of the data comes from the Annotated Web Ears (AWE) [15] dataset and features 3, 300 ear images of 330 subjects.", "Because the 10 gallery images 3. http://awe.fri.uni-lj.si/uerc that are available in the AWE dataset for each subject are divided among left and right ears, comparisons in this experiment may include comparisons of ears from the opposite sides of the head.", "A detailed description of the AWE dataset is available from [15].", "Same-side vs. opposite-side matching: As already indicated above, the images of all subject in the AWE dataset are split between right and left ears (i.e., images are not side-normalized).", "The UERC dataset represents, to the best of our knowledge, the first attempt to gather data for ear-recognition research from the web, and as shown in [15] is significantly more challenging than competing ear datasets where performance is mostly saturated.", "For this part of the evaluation, we use only 1 , 800 probe images originating from the AWE dataset and compute our results on a similarity matrix of size 1 , 800 \u00d7 1 , 800 in an all-vs-all experimental setup.", "The core part of the data comes from the Annotated Web Ears (AWE) [15] dataset and features 3 , 300 ear images of 330 subjects.", "The probe set consists of all 1 , 800 AWE images.", "The training part contained images from the auxiliary AWE dataset and around half of the original AWE data, whereas the testing part comprised the other half of the AWE data and all newly collected images.", "The available annotations (see [15] for details) are grouped into three categories, i.", "The second part of the UERC data, i.e., 804 images of 16 subjects, comes from the auxiliary AWE dataset 1 , while the majority of images, i.e., 9 , 500 images of 3 , 540 subjects, was gathered exclusively for the UERC."]} +{"4646924|11042075": []} +{"206592484|456491": []} +{"1031357|206932295": ["Our system hence has to cope with a very low inter-class variability [2].", "[2] provided a comprehensive literature review about the domain of offline signature verification."]} +{"53150145|208527478": []} +{"1033682|174797842": []} +{"16143971|206932295": ["In skilled forgeries, the forger has access for both the user\u2019s name and signature, and often practices imitating the user\u2019s signature [1]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"4951598|3654323": ["Re-collecting massive labeled data to train a new model from scratch or re-collecting some unlabeled data to perform domain adaptation [166] or others are effective methods.", "Deep domain adaptation [166] has inherent advantages here and is worthy of attention.", "Transfer learning [113], [166] has recently been introduced for deep FR, which utilizes data in relevant source domains (training data) to execute FR in a target domain (testing data)."]} +{"4951598|18038464": ["l nowadays. This survey focuses only on recognition problem, and one can refer to Ranjan et al. [32] for a brief review of a full deep FR pipeline with detection and alignment, or refer to Jin et al. [33] for a survey of face alignment. Speci\ufb01cally, the major contributions of this survey are as follows: A systematic review on the evolution of the network architectures and loss functions for deep FR "]} +{"4951598|2323881": ["There have been several surveys on FR [268], [20], [3], [96], [175] and its subdomains, and they mostly summarized and compared a diverse set of techniques related to a specific FR scene, such as illumination-invariant FR [284], 3D FR [175], pose-invariant FR [262][50]."]} +{"4951598|18543658": ["12, such as cross-pose FR, video FR, cross-age FR, lowshot FR, set/template-based FR, 3D FR, makeup FR, FR for mobile devices, face anti-spoofing and heterogeneous FR [110] (including NIR-VIS FR, photo-sketch FR and low-resolution FR)."]} +{"4951598|359842": ["Over the past few years, there have been several surveys on FR [222], [18], [3], [78], [136] and its subdomains, including illumination-invariant FR [234], 3D FR [136], pose-invariant FR [216] and so on."]} +{"4951598|16620699": ["the evaluation protocols. Therefore, it is of great signi\ufb01cance to review the breakthrough and rapid development process in recent years. There have been several surveys on FR [268], [20], [3], [96], [175] and its subdomains, and they mostly summarized and compared a diverse set of techniques related to a speci\ufb01c FR scene, such as illumination-invariant FR [284], 3D FR [175], pose-invariant FR [262][50"]} +{"207115339|18609918": ["Many techniques also require exact locations of specific ear points that may be difficult to detect in poor quality images or when an ear is occluded [16], [82].", ", [20], [22], [23], but how this effect influences the recognition performance of automatic techniques is still unclear; the main problem here is the lack of suitable datasets that would be needed for a detailed analysis of the effects of template aging; iii) Inheritance: as pointed out by [16], the work of Iannarelly [19] suggested that some characteristics of the outer ear can be inherited; whether these characteristics could be identified by automatic techniques and exploited to determine if two persons are related or whether they could present a source of error for automatic recognition systems is still an open question.", "Here, we focus only on 2D approaches and refer the reader to other reviews, such as [16], for a detailed coverage of the field of 3D ear recognition.", "The literature suggests that the size of the ear changes through time [19], [15], [16], [20].", "Pose variations are generally considered to be one of the biggest issues plaguing the technology [15], [16].", "As pointed out by [15], [16], there are several factors pertaining to ear recognition that are not yet well understood and offer room for further exploration.", "Prior surveys related to ear recognition, such as [11], [12], [13], [14], [15], [16], provide well written and well structured reviews of the field.", "While there has been some research effort in this direction (see, for example, [15], [16] for recent surveys related to detection), ear detection is still an unsolved problem and no widely adopted solution has been proposed yet in the literature."]} +{"13874338|7788290": ["There have been some allied studies such as biomechanics [21], physical medicine studies for therapy [38], psychological studies [37], and approaches aiming to model and track a human through an image sequence, though usually not for recognition [17], [25], [2], [15].", "There has been a rich amount of work on human modeling and tracking [17], [25].", "VISUAL analysis of human motion [17], [25] attempts to detect, track, and identify people, and, more generally, to understand human behaviors from image sequences involving humans."]} +{"17983531|15782139": ["The present research work is related to a number of different areas within signature biometrics such as on-line and off-line monomodal signature verification [4,5] or synthetic handwritten signature generation [10,12,13].", "All these research efforts have been compiled in a number of comprehensive surveys that give a clear overview of the state of the art evolution from the first pioneering works in the 80 s to date [1\u20136]."]} +{"11630314|207115339": ["As suggested by recent surveys on ear recognition [19], [20], [31], hybrid techniques together with local descriptor-based methods represent the current state-of-the-art in this area.", "The main reason for the lack of work in the \ufb01eld of CNN-based ear recognition is in our opinion the absence of large-scale datasets and the dif\ufb01culty of effective training of deep model with small amounts of data as also suggested in [19].", "Ear recognition: According to Emer\u0161i\u02c7c et al. [19] existing techniques for ear recognition can conveniently be grouped into i) geometric, ii) holistic, iii) local, and iv) hybrid techniques.", "The state-of-the-art techniques included in our experiments are local techniques implemented in the AWE toolbox [19], which exploit the following descriptors: LBP [25], POEM [27], HOG [38], BSIF [39], LPQ [40], RILPQ [26], and DSIFT [41].", "Examples of techniques from this group were presented in [19], [20].", "Here, we select the techniques to be included in our experiments based on recent publications evaluating the performance of various ear recognition techniques, i.e. [19], [20].", "Examples of local techniques include [19], [25], [26], [27].", "For a comprehensive overview of the two areas, the reader is referred to in-depth surveys on these topics [10], [19].", "For our experiments we compose a dataset of unconstrained ear images by merging the recently introduced AWED and CVLED datasets [19].", "The last groups of techniques, so-called hybrid techniques, combine elements from other categories or use multiple representations to increase the ear recognition performance [19]."]} +{"11630314|18609918": ["vemodel-learning strategies. Here, we select the techniques to be included in our experiments based on recent publications evaluating the performance of various ear recognition techniques, i.e. [19], [20]. The state-of-the-art techniques included in our experiments are local techniques implemented in the AWE toolbox [19], which exploit the following descriptors: LBP [25], POEM [27], HOG [38], BSIF [39"]} +{"3855976|207115339": ["The last one is AWE dataset [1], which is also included in the UERC dataset.", "However, the amount of samples in the datasets available for ear recognition are rather limited [1], [2], [7], [8], [9], [10].", "For this experiment six different ear datasets have been used, namely the Multi-PIE ear dataset, AWE [1], AMI [10], WPUT [9], IITD [8], and CP [7] datasets.", "A comprehensive analysis of the existing studies in the area of ear recognition has been presented in [1].", "Because of this, in-the-wild datasets have been collected in order to imitate real-world challenges confronted in ear recognition better [1].", "Among the biometric traits, ear is a unique part of the human body in terms of different features such as shape, appearance, posture, and there is usually not much change in the ear structure except that the ear length is prolonged over time [1].", "In the \ufb01eld of ear recognition, most of the used datasets have been collected under controlled conditions, and therefore, very high recognition performance has been achieved on them [1].", "There are many other ear datasets, which have been collected under controlled conditions, such as Carreira-Perpinan (CP) [7], Indian Institute of Technology Delhi (IITD) [8], AMI [10], West Pommera-nian University of Technology (WPUT) [9], and AWE [1] datasets as listed in Table 1.", "In [1], an in-the-wild ear recognition dataset AWE and an ear recognition toolbox for MATLAB are introduced.", "Ear recognition approaches are mainly categorized into four groups, holistic, local, geometric, and hybrid processing [1]."]} +{"53876183|18609918": ["Recently, ear print has received considerable research interests in biometric community due to its several prominent advantages [5]."]} +{"8116995|5171123": ["Meanwhile, one challenging scenario in face recognition is the single training sample per subject problem [64][72][73]."]} +{"146806636|207115339": ["To validate our approach, we run our algorithm on the dataset of AMI [11] and UREC [29] [30].", "According to the previous review of ear recognition [29], current approaches for ear recognition can be mainly categorized into the following four class i) geometric, ii) holistic, iii) local, and iv) hybrid techniques."]} +{"22987563|17574321": ["In TD-SV, the transcript of both enrollment and verification utterances is phonetially constrained, while in TI-SV, there are no lexicon constraints on the transcript of the enrollment or verification utterances, exposing a larger variability of phonemes and utterance durations [3, 4]."]} +{"21700159|207115339": ["The experiments are performed on two publicly available unconstrained ear datasets: AWE and CVLE [35].", "The authors evaluated their approach on an unconstrained ear dataset where they combined the AWE and CVLE datasets [35] in addition to 500 ear images of 50 subjects collected from the web, in order to have more data available to work with.", "We use the given training/testing split provided in the AWE toolbox [35].", "We perform an exhaustive search on the layers and report results with the layer that gives the highest accuracy using the AWE and CVLE datasets [35]."]} +{"202781918|3654323": ["The first type is fine tuning [16] that only trains the last couple of layers of a neural network while keeping other parameters fixed when facing a new situation."]} +{"202781918|2670121": ["Transfer learning takes the knowledge learned in one domain into another domain to implement domain adaptation [8]."]} +{"7685498|206932295": ["To this end, researchers have used insights from graphology, computer vision, signal processing, among other areas [3]."]} +{"7685498|15782139": ["One of the reasons for its extensive use is that the process to collect handwritten signatures is non-invasive, and people are familiar with their use in daily life [2]."]} +{"51871912|206932295": ["This indicates that it is one of the most effective classifiers for this problem [1].", "As shown in Table II, when compared to Hafemann et al. work [3], the results of the best proposed approach are worse in FRR metric, but are better in FARskilled metric, in a global scenario.", "The following metrics are used: (i) False Rejection Rate (FRR), which represents the percentage of genuine signatures that are rejected by the system, (ii) False Acceptance Rate (FAR), represents the percentage of forgeries that are accepted (it can be computed for each random, simple and skilled forgeries), (iii) Average Error Rate (AER), is the average error considering FRR, FARrandom, FARsimple, FARskilled.", "As the highest value for the number of references is 12, reference subsets containing [1, 2, 3, 4, 5, 10, 12] randomly selected signatures were tested as references for the authentication.", "So, online models can obtain additional information from the users during writing to perform the verification, such as the position or slope of the pen, or the writing pressure [1].", "Genuine signatures are those that really belong to the indicated user; in turn, forgeries are those created by other people [1].", "The point of intersection between FRR and FARskilled curves is used as a global threshold.", "To this end, reference subsets containing [1, 5, 10, 15, 20, 25, 30] randomly selected signatures are used as references for the authentication.", "(iv) Equal Error Rate (EER), is the error obtained when FRR = FAR [1].", "Most HSV systems presented in literature follow the WD approach [1]."]} +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} +{"11042075|12127129": ["The most widely used method is background subtraction, which attempts to separate objects from the difference between the modeled background and the current frame [5]."]} +{"4881455|17574321": ["Moreover, there is no constraint on the lexicon words thus the training utterances and testing segments may have completely different contents [2].", "\u2026energies (Fbank), mel-frequency cepstral coef\ufb01cients (MFCC), perceptual linear prediction (PLP), shifted delta coef\ufb01-cients (SDC) features [2, 5], and automatically learned phoneme discriminant features from deep neural networks (DNN), such as bottleneck features [6, 7, 8], phoneme\u2026"]} +{"34146274|393948": ["In particular, deep networks have a great capacity for representation learning [4], which directly addresses our desideratum of learning the appropriate lower-level features and steps required for this problem."]} +{"34146274|14173838": ["al [2] provides a thorough review and explanation of minutiae extraction."]} +{"51713108|17574321": ["Breakthroughs in speaker recognition due to use of Artificial Neural Networks dates back to more than a decade ago when they were used to jointly model and discriminate different speakers [4].", "The practice of text-independent speaker recognition has a longstanding history that falls outside the scope of this work and we advise the interested reader to consult literature review in this field [4] for more information about traditional practices."]} +{"12486716|13277694": [" function [17] to enhance image contrast. Histogram stretching methods [21] and its variants like Brightness preserving Bi-histogram Equalization (BBHE) and Quantized Bi-histogram Equalization (QBHE) [19] gained prominence to improve on the artifacts of histogram equalization. Also, Contrast-limiting Adaptive Histogram Equalization (CLAHE) [29] belongs to this class of methods and serves to limit to t", "Histogram stretching methods (Krutsch & Tenorlo, 2011) and its variants like Brightness preserving Bi-histogram Equalization (BBHE) and Quantized Bi-histogram Equalization (QBHE) (Kaur et al., 2011) gained prominence to improve on the artifacts of histogram equalization."]} +{"8947804|15782139": ["Thus, the FAR evaluation is difficult and generally imprecise [259], [377].", "Thus, automatic signature verification is particularly useful in all applications in which the authentication of both transaction and user is required [259], [326].", "The aim of these efforts is to facilitate the integration of signature verification technologies into other standard equipment to form complete solutions for a wide range of commercial applications such as banking, insurance, health care, ID security, document management, e-commerce, and retail point-of-sale (POS) [78], [259], [320].", "remains an interesting research area that encompasses not only those features produced by people with normal abilities but also those generated by people who suffer from disabilities and diseases that may lead to handwriting constraints [259].", "Moreover, verification by signature analysis requires no invasive measurements and people are familiar with the use of signatures in their daily life [259]."]} diff --git a/edge/graph_208531937.jsonl b/edge/graph_208531937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8c8a70ccd7046a9946025cdce03cfa34d344e5f --- /dev/null +++ b/edge/graph_208531937.jsonl @@ -0,0 +1,26 @@ +{"15671427|9270553": ["The aim of Brain-Computer Interface system is to establish a new communication system that translates human intentions, reflected by brain signals, into a control signal for an output device such as a computer.", "To this end, different processes must be done on brain signals and these signals must be classified by suitable methods."]} +{"207598473|62646398": []} +{"207598473|1382531": ["\u2026they can deliver artificial sensory information to the brain using electrical stimulation of sensory areas (Boi et al. 2015; Dadarlat et al. 2015; Fagg et al. 2009; Lebedev and Nicolelis 2006; Lebedev et al. 2011; London et al. 2008; Nicolelis and Lebedev 2009; Rothschild 2010; Vato et al. 2014)."]} +{"207598473|14866098": ["These algorithms are not principally different from those covered in previous reviews (Bashashati et al. 2007; Li 2014; Schwartz et al. 2001)."]} +{"45696263|192934": ["Moreover, adding too many electrodes could invoke the curse of dimensionality\u2014given a fixed amount of input samples, increasing the dimension of the input space will eventually decrease the quality of classification [43]."]} +{"4832139|9270553": []} +{"43703548|16362395": []} +{"26074404|16362395": []} +{"58014179|4853233": ["The performance of DLmethods on EEG is of great interest as it is still not clear whether DL can outperform traditional EEG processing pipelines [105].", "Given the high dimensionality of EEG signals [105], one would assume that a considerable amount of data is required.", "State-of-the-art techniques, such as Riemannian geometry-based classifiers and adaptive classifiers [105], can handle these problems with varying levels of success."]} +{"4347367|9270553": []} +{"16362395|9270553": ["Indeed, BCI systems enable a subject to send commands to an electronic device only by means of brain activity [ 2 ]."]} +{"16362395|192934": []} +{"15780488|9270553": ["A BCI can improve the quality of life for such patients by enabling them to communicate with the outside world by using their brain activities [2]."]} +{"16231099|9270553": ["The types of brain signals that have been used as input to a BCI can be classified as magnetic [4, 5], metabolic [6] and electrical [1].", "control command to an external device) and a translation stage that transforms the input into the output [1].", "Public and scientific interest in this technology is based on the potential for these devices to assist individuals with severe mobility impairments such as advanced stages of amyotrophic lateral sclerosis (ALS), brain stem stroke, spinal cord injury and severe cerebral palsy [1, 2]."]} +{"3849381|14866098": ["For example, the [16, 4] \u00d7 [2, 16] model configuration, while performing the best on P300, was slightly worse in SMR and among the worst models for MRCP.", "When we ranked the 12 EEGNet models in descending order per dataset (so the 1st model performed the best and 12th model performed the worst) and averaged over the 4 datasets, we found that the [2, 32]\u00d7[8, 4] model configuration seemed to perform the best overall (Table 3), although it is difficult to determine statistical significance, given only four data points per model configuration.", "While these stages are largely the same across BCI paradigms, each paradigm relies on manually specified methods for signal processing [4], feature extraction [5] and classification [6], a process which often requires significant subject-matter expertise and/or a priori knowledge about the expected EEG signal.", "We see that the [2, 32] \u00d7 [8, 4] model ranks the best among all kernel configurations.", "The EEGNet model with the [2, 32] \u00d7 [8, 4] configuration will be used for the remainder of the manuscript."]} +{"3849381|16362395": ["methods [9], a process which often requires significant subject-"]} +{"8978458|9270553": []} +{"2047066|14866098": []} +{"2047066|16362395": []} +{"206099046|205007974": []} +{"5622318|15380857": ["SSVEPs can be elicited by repetitive visual stimuli at frequencies in the 1 to 100 Hz range [23]."]} +{"5622318|16362395": []} +{"196349764|393948": ["Still, machine learning performance generally depends upon well-designed features, which may be even more important in relatively small data sets such as ours [16]."]} +{"3887908|16362395": ["For example, the Lotte et al. [36] review of studies evaluating BCI signal-classi\ufb01cation algorithms found that most used of\ufb02ine analyses.", "Perhaps the most common type of BCI study evaluates alternative feature translation algorithms [36], often using archival data from healthy subjects (e.g., ref."]} +{"12624297|14866098": ["Other efforts have formulated the decoding problem as that of feature translation rather than classi\ufb01cation.", "The linear and non-linear classi\ufb01cation algorithms used in these efforts are reviewed in (Muller et al., 2003; Bashashati et al., 2007; Lotte et al., 2007)."]} +{"12624297|16362395": ["The linear and non-linear classi\ufb01cation algorithms used in these efforts are reviewed in (Muller et al., 2003; Bashashati et al., 2007; Lotte et al., 2007)."]} diff --git a/edge/graph_208541377.jsonl b/edge/graph_208541377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20858014.jsonl b/edge/graph_20858014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a90dbb14a891592ef8982c232453cb58bc3e9b8 --- /dev/null +++ b/edge/graph_20858014.jsonl @@ -0,0 +1,3 @@ +{"9730041|207372751": []} +{"46501688|2294541": []} +{"40227327|207372751": []} diff --git a/edge/graph_208617802.jsonl b/edge/graph_208617802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f17790a4933ce2906ac261fd62ac6d755e462f6a --- /dev/null +++ b/edge/graph_208617802.jsonl @@ -0,0 +1,7 @@ +{"4111957|14258620": []} +{"53716271|3536399": ["In addition to image classification, attacks to other DNN-powered tasks have also been actively investigated, such as visual question answering [43, 1], image captioning [10], semantic segmentation [31, 1] and etc [12, 8, 39]."]} +{"4549456|3536399": ["In the past \ufb01ve years, the areas of adversarial attacks (Szegedy et al., 2013) on deep learning models, as well as defenses against such attacks, have received signi\ufb01cant attention in the deep learning research community (Yuan et al., 2017; Akhtar & Mian, 2018)."]} +{"155798187|3536399": []} +{"155798187|2088679": []} +{"2233231|14545307": []} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} diff --git a/edge/graph_208623299.jsonl b/edge/graph_208623299.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208626350.jsonl b/edge/graph_208626350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2dab99154a4056d0c586711cf8cb970a610aca05 --- /dev/null +++ b/edge/graph_208626350.jsonl @@ -0,0 +1,5 @@ +{"7533778|4019175": ["A recent survey listing many of the current platforms with two or more arms can be found in [16]."]} +{"3923538|4361938": []} +{"44128368|11833085": []} +{"3882446|9928823": ["The integrated use of the CNN and Softmax systems is in line with the conventional approaches in the deep learning community [40, 42, 63]."]} +{"2935124|2008940": ["The significance of effective shape begs the question as to whether human locomotion might employ a phase variable [42], [48].", "This development may require a new phase variable that is measurable from the prosthesis during swing (see initial work in [48])."]} diff --git a/edge/graph_208626829.jsonl b/edge/graph_208626829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58ab4b5ff5fe2c92f24ba887a953ccf49473924c --- /dev/null +++ b/edge/graph_208626829.jsonl @@ -0,0 +1,53 @@ +{"1556653|10206347": ["This paper proposes a new rate control scheme for mitigating congestion in WBANs based on an energy-efficient and emergency-aware MAC (Medium Access Control) protocol and the IEEE 802.15.6 Standard.", "Some wearable WBANs applications are: the evaluation of soldier fatigue and battle readiness, sleep staging, asthma and wearable health monitoring."]} +{"1556653|16214623": ["Congestion and packet loss in a WBAN have a direct impact in the Quality of Service (QoS) and the energy efficiency of the network."]} +{"1556653|7988320": ["The traditional transport layer solutions such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are too complex for WBAN applications resulting in latency and excessive energy wastage."]} +{"21404231|4427557": ["15 km in open area with strong penetrability [8], [9]."]} +{"23084426|21386749": ["In [1], a comprehensive survey of healthcare IoT has been presented.", "In addition to the above, IoT has several advantages of providing remote monitoring is several applications including healthcare [1]."]} +{"169663059|4427557": ["10+ years of battery lifetime [3]) and inexpensive, with the cost of a radio chipset being less than 2e and an operating cost of 1e per device per year [4].", "220 MHz is divided into 400 orthogonal 100 Hz channels (among them 40 channels are reserved and not used) [4]."]} +{"148568763|29859741": ["However, the impact of failure is less and easier to handle for fogging in comparison with the cloud [15].", "Instead, the analysis of the recordings is done locally, and only the necessary metrics are transmitted [15]."]} +{"148568763|9280644": []} +{"148568763|8523192": ["Hence, an extended version of cloud computing, called fog computing [14] or fogging, is used now, in which computations can be done in any node, called fog node or nodes at the edge of personal area network (PAN)."]} +{"17931918|55729907": []} +{"17931918|86629084": []} +{"17931918|8690743": []} +{"17931918|7988320": ["Major applications under the umbrella of WBAN are [15]:Treatment of cardiovascular abnormalities, cancer detection, asthma monitoring, developing telemedicine systems, artificial retina, fitness monitoring in sports and battle field etc."]} +{"17931918|6332923": ["Few Important but Unique features who characterize WBAN can be defined as [4]:", "As per the survey done on healthcare some applications/projects using WBANs are listed as[4],[12],[13]:"]} +{"17931918|7854020": ["Other trust based schemes and anomaly detection systems [2] are also being developed to make E-healthcare observatory systems more reliable."]} +{"56171167|16214623": []} +{"56171167|9830350": ["The advantages and objectives of clustering for WSN are analyzed by Liu [21] along with a comparative study of these protocols."]} +{"17410801|7988320": ["Additionally, TARA only considers temperature as a metric, has low network lifetime, high end-to-end delay, low reliability, high packet loss ratio and does not consider power efficiency and link probability.", "However, BANs applications have different architectures, technological requirements, constraints and goals.", "In Section IX, we provide a comparison of routing in BANs with WSN and MANET routing.", "On the other hand, energy efficient routing protocols in MANETs consider finding routes to minimize energy consumption in cases with small energy resources.", "Additionally, TARA experiences larger number of hops and higher packet loss compared to LTR and ALTR as it reroutes data from heated regions.", "Routing protocols in WSNs [3] and MANETs [4] have been excessively studied in the past few years.", "Hence, even though the general characteristics of BANs are somehow similar to MANETs and WSNs, the unique differences amongst them with BANs requires novel solutions in their routing protocols.", "As shown in Fig.1, the devices of BANs are scattered all over the body in a centralized network\n\u00a9 2013 ACADEMY PUBLISHER\narchitecture where the precise location of a device is application specific [14].", "However, the stringent requirements of BANs imposes certain constraints on the design of their routing protocol which leads to novel challenges in routing which have not been met through routing protocol in WSNs and MANETs."]} +{"17410801|7854020": ["BANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real-time patient monitoring [7]."]} +{"17410801|1762301": ["memory access, data processing, measurement and also the required energy to receive or transmit data over a wireless link [4].", "Routing protocols in WSNs [3] and MANETs [4] have been excessively studied in the past few years."]} +{"31341016|2871699": []} +{"31341016|3330461": []} +{"16019641|7854020": ["For instance, the IEEE 802.15.6 [13] standard defines 7 priority levels to categorize the criticality of sensor data."]} +{"27882288|325004": ["A survey brie\ufb02y introduces the architecture and features of WBANs and several future research directions are presented in [23]."]} +{"27882288|12029139": ["Wireless communication with energy harvesting (EH) has drawn signi\ufb01cant interests recently [2], [3]."]} +{"51963805|9280644": []} +{"51963805|16939966": ["coexistence and interference mitigation schemes are surveyed and discussed in [9]."]} +{"44085007|4427557": ["The trade-off is with regards to the volume of data that can be relayed back to base [63]\u2013[65]."]} +{"44085007|21386749": ["These, as well as cross-application with supporting technologies [15]\u2013[17] helps to generate a range of novel medical applications [18] including imaging [19]\u2013[21] and object detection [22] that address growing societal needs for early cancer detection and"]} +{"6368071|21386749": []} +{"6368071|7876249": ["\u2026routing protocols DMQoS (Razzaque et al. 2011), M-ATTEMPT (Javaid et al. 2013a), TMQoS (Monowar et al. 2014), RE-ATTEMPT (Ahmad et al. 2014), RAR (Bangash et al. 2014b), mentioned in the network layer section of this article, exploit the cross-layering between the PHY and network layers to\u2026", "\u20262009) .83-.95 120-215 DMQoS (Razzaque et al. 2011) .91-.98 110-140 QPRD (Khan et al. 2012) .95 20-30 ETPA (Movassaghi et al. 2012) .71-.81 NA PSR (Liang et al. 2012) .8 -.82 NA TMQoS (Monowar et al. 2014) .92-.98 100-125 RAR (Bangash et al. 2014b) .95-.99 NA DCR (Bangash et al. 2015) .75-.", "A limited number of the existing routing protocols (Javaid et al. 2013a; Monowar et al. 2014; Routing Protocol PDR E2E delay (ms) RL-QRP (Liang et al. 2008) .95 175 LOCALMOR (Djenouri and Balasingham 2009) .83-.95 120-215 DMQoS (Razzaque et al. 2011) .91-.98 110-140 QPRD (Khan et al. 2012) .95 20-30 ETPA (Movassaghi et al. 2012) .71-.81 NA PSR (Liang et al. 2012) .8 -.82 NA TMQoS (Monowar et al. 2014) .92-.98 100-125 RAR (Bangash et al. 2014b) .95-.99 NA DCR (Bangash et al. 2015) .75-.", ") (Bangash et al. 2014b) exploits data differentiation to offer reliability for critical data in BANs.", "On the contrary, QoS-aware routing is one of the many concerns of Bangash et al. (2014a).", "On the contrary, QoS-specific articles (Ameen et al. 2008; O\u2019Donoghue et al. 2008; Thapa and Shin 2012; Masud 2013; Bangash et al. 2014a) provide partial reviews of the area.", "The survey does not include recent routing protocols, including many QoS-aware routing protocols (Bangash et al. 2014b; Ahmad et al. 2014; Ababneh et al. 2015; Bangash et al. 2015).", "A number of existing routing protocols DMQoS (Razzaque et al. 2011), M-ATTEMPT (Javaid et al. 2013a), TMQoS (Monowar et al. 2014), RE-ATTEMPT (Ahmad et al. 2014), RAR (Bangash et al. 2014b), mentioned in the network layer section of this article, exploit the cross-layering between the PHY and network layers to improve energy efficiency, reliability, safety, and so on.", "Bangash et al. (2014a) survey these routing protocols."]} +{"6368071|10817088": ["Also, many surveys (Movassaghi et al. 2014; Dangi and Panda 2014; Hanson et al. 2009b; Cavallari et al. 2014; Acampora et al. 2013; Seyedi et al. 2013; Javadi and Razzaque 2013; Filipe et al. 2015) have reviewed different aspects (i.e., opportunities and challenges, communications, security and\u2026", "Acampora et al. (2013) have explored the application of ambient intelligence (AmI) in healthcare from various perspectives (e.g., physical or mental disabilities, chronic disease, or rehabilitation)."]} +{"6368071|1734833": ["Data analysis tools, including data mining, are used to reveal non-obvious patterns among the data and to determine data quality issues, such as outliers (McGrath and Scanaill 2013; Han et al. 2011; Yoo et al. 2012; Banaee et al. 2013; jin Kim and Prabhakaran 2013)."]} +{"6368071|42648222": []} +{"6368071|16214623": []} +{"6368071|16084499": ["Researchers in academia and industries are working in parallel on miniaturization and accuracy of wearable sensors and sensor motes (Hadjidj et al. 2012; Patel et al. 2012b; Crosby et al. 2012; Buckley et al. 2012; Herzog 2013; Honeywell 2014; Peiris 2013).", "In addition to SoCs and SoTs, different sensor motes are used in various BAN-based research works (Penders et al. 2008; Johnson et al. 2009; Pantelopoulos and Bourbakis 2010; Nabar et al. 2010; Crosby et al. 2012)."]} +{"6368071|7988320": ["These services can be categorized into four different groups (Pansiot et al. 2010; Cao et al. 2009; Ullah et al. 2012; Hadjidj et al. 2012; Islam et al. 2015; Jon Mark et al. 2013): (i) acute care, (ii) post-acute care or rehabilitation, (iii) chronic care, and (iv) prevention and wellness.", "Many BAN-specific MAC protocols have been published (Ullah et al. 2010b; Latr\u00e9 et al. 2011; Ullah et al. 2012; Javaid et al. 2013b)."]} +{"6368071|41998167": ["Moreover, many researchers have considered WSNs\u2019 MAC protocols for BANs because of their commonality (e.g., a WBAN is a special kind of WSN) (Yigitel et al. 2011a)."]} +{"6368071|16514036": ["However, challenges, including QoS, standardization, and social issues faced by BANs need to be resolved (Patel and Wang 2010; Chen et al. 2011) for wider applications of BANs.", "Generally, medical and healthcare applications are mission critical, and they need to be reliable in terms of Quality of Service (QoS) (Ameen et al. 2008; Hanson et al. 2009a; Chen et al. 2011; Zhou et al. 2011).", "Other characteristics of BANs are mainly influenced by the human body (e.g., dynamic pathloss) and BANs\u2019 applications (e.g., heterogeneity in traffic, criticality) (Chen et al. 2011; Munir et al. 2007)."]} +{"6368071|270804": ["Most existing transport protocols discussed in the literature are WSNs centric (Wang et al. 2006b; Rathnayaka and Potdar 2013; Hughes et al. 2012; Filipe et al. 2015).", "These protocols for WSNs/BANs offer congestion control (i.e., detection, avoidance) (Wan et al. 2011; Monowar et al. 2008; Wang et al. 2006a; Misra et al. 2009; Hu et al. 2009; Yaghmaee et al. 2013; Rezaee et al. 2014), reliability (yih Wan et al. 2005; Park et al. 2008), or both (Shaikh et al.\u2026", "A number of WSNs-specific protocols (Wan et al. 2011; Wang et al. 2006a; Monowar et al. 2008; Park et al. 2008; Shaikh et al. 2010; Gungor et al. 2008; Tezcan and Wang 2007; Iyer et al. 2005) are useful in BANs/WBANs.", "The Priority Congestion Control Protocol (PCCP) (Wang et al. 2006a) and Prioritized Heterogeneous Traffic-oriented Congestion Control Protocol (PHTCCP) (Monowar et al. 2008) are cross-layered congestion control protocols, which offer higher throughput for higher priority traffic.", "These mechanisms have the potential to offer higher through-put and lower delay for high-priority traffic compared to Wang et al. (2006a) and Misra et al. (2009), but, similarly to Wang et al. (2006a), low-priority traffic may suffer delay and cause lower over-all throughput.", "This is a serious concern in medical and healthcare applications of BANs (Wang et al. 2006b; Hughes et al. 2012).", "A number of transport protocols (summarized in the Table 8) including PCCP (Wang et al. 2006a), PHTCCP (Monowar et al. 2008) and RT 2 (Gungor et al. 2008) relied on cross-layering design approaches to minimize collisions and improve reliability in WBANs/WSNs."]} +{"6368071|205286988": ["BAN/WBAN-specific characteristics and stringent QoS requirements of BAN/WBAN applications make most existing WSN-specific routing protocols inadequate for BAN/WBAN (Akkaya and Younis 2005).", "Most existing protocols support energy efficiency but do not satisfy other MAC requirements for BAN/WBAN applications.", "A network layer in a BAN/WBAN is responsible for addressing, routing, and forwarding of data packets."]} +{"6368071|1230643": []} +{"6368071|20905429": ["Despite favorable characteristics (e.g., low power, safety), MICS, especially used in implanted or in-body sensors suffers due to commercially unavailable MICS solutions and in-body use only (Pantelopoulos and Bourbakis 2010; Fang et al. 2011).", "\u2026these issues and the recent advances in textile-based electronics, use of systems on textiles (SoTs) are gaining a great deal of interest among researchers in the field of wearable technology (Yoo 2013; Peiris 2013; Pantelopoulos and Bourbakis 2010; Patel et al. 2012a; McGrath and Scanaill 2013).", "In addition to SoCs and SoTs, different sensor motes are used in various BAN-based research works (Penders et al. 2008; Johnson et al. 2009; Pantelopoulos and Bourbakis 2010; Nabar et al. 2010; Crosby et al. 2012)."]} +{"44182431|3474164": ["managing the state information of massive number of IoT devices is also an issue that needs to be considered [62, 63]."]} +{"44182431|2871699": ["M2M communicaiton has been extensively reviewed in [54, 55, 56, 57, 58].", "The ETSI standard and applications has been discussed in [54] and [55], in which mobile devices are used as mobile gateways for resource constrained IoT devices."]} +{"44182431|3494096": ["The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time [1, 20, 21].", ", have been used in IoT applications, in which billion of devices will be connected by wireless communication technologies [20].", "The 3G and 4G are widely used for IoT but not fully optimized for IoT applications [20].", "Existing communication technologies are diverse and it is challenge for the fifth generation (5G) mobile network to meet the requirements of applicaitons in IoT [20].", "To ensure that M2M applications, the three generation partnership project (3GPP) proposed Enhanced Machine-Type Communication (eMTC), Extended Coverage-Global System for Mobile Communications for the IoT (EC GSM-IoT) and Narrowband-IoT (NB-IoT) as cellular-based LPWA technologies for the IoT [20].", "by inferences, such as WiFi signals, buildings, microwaves, etc [20]."]} +{"39772970|16514036": ["aster recovery, and battlefield surveillance [1, 2]."]} +{"16372481|7988320": ["Similar WBAN settings can be found in [3], [10]."]} +{"35046154|3474164": ["Network management and security still require more attention [7]\u2013[10]."]} +{"35046154|24110634": ["However, WSN is associated with many inherited challenges due to the sensor nodes constraints such as energy capacity, computational capability, and communication bandwidth [5], [6]."]} +{"35046154|4427557": ["LPWANs are specifically targeting situations where extended coverage is most needed, with low cost of deployment, involving devices that are delay tolerant, do not need a high data rates and require low power consumption network [14]."]} +{"35998814|21386749": ["comprehensive survey of healthcare in IoT has been discussed in [1]."]} +{"51752596|13785718": ["The proposed methodology solves, through a novel adaptive temporal compressed sensing technique, an important problem of the monitoring devices in the paradigms of the MCC and RHM: battery consumption due to excessive wireless transmissions.", "Offloading data from nodes to Cloud servers remains into the Mobile Cloud Computing (MCC) [14] and Remote Health Monitoring (RHM) paradigms, leading to high energy and economic savings [15].", "(MCC) [14] and Remote Health Monitoring (RHM) para-"]} diff --git a/edge/graph_208632802.jsonl b/edge/graph_208632802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a8cf06ba89bc286a9d5b8ff9b12c03ac826a1ff --- /dev/null +++ b/edge/graph_208632802.jsonl @@ -0,0 +1,9 @@ +{"2061843|207244886": ["suggested the Security Metric Ontology [34].", "As part of their study on using security metrics for security modeling, Pendelton et al. suggested the Security Metric Ontology [33].", "(2016) - Security Metrics Ontology [34] * *"]} +{"63170672|14599895": ["[13] classified security metrics into four categories, namely: metrics for measuring the system vulnerabilities, metrics for measuring the defences, metrics for measuring the threats, and metrics for measuring the situations.", "Other classifications provided by industries such as the NIST [2], the CIS [1] and the Workshop on Information Security System Scoring and Ranking are exclusively geared towards cyber defence administrations and operations [13]."]} +{"8729672|18044357": ["The main limitation of design diversity lies in the high complexity of creating different versions, which may not justify the benefit [52]."]} +{"51877031|206584087": ["Malicious activities can be manifested as Denial of Service (DoS) attacks [156,208,214], False Data Injection (FDI) attacks (e."]} +{"51877031|13985031": []} +{"51877031|26257441": ["This is why simulation has long been advocated as a way to explore and understand system behavior for knowledge retrieval [171,175], and has been used for safety assessment since the 1970s\u201380s."]} +{"52148081|18740719": []} +{"3768839|21930333": ["In literature [11] and [12], through vulnerability analysis, the safety and reinforcement of network system is proposed according to the idea of repair set."]} +{"7823093|8212328": ["Bayesian Networks (BN) have been widely applied in complex systems modelling, risk assessment and diagnostics [22]."]} diff --git a/edge/graph_208633264.jsonl b/edge/graph_208633264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3e795dcd4c0480e7fe659ec4765c9b50847ea38 --- /dev/null +++ b/edge/graph_208633264.jsonl @@ -0,0 +1,41 @@ +{"66999247|6707996": []} +{"49658886|3693305": ["A comprehensive study for learning to hash can be found in some survey papers [15], [16], [17]."]} +{"49658886|1596835": ["A comprehensive study for learning to hash can be found in some survey papers [15] [16] [17]."]} +{"49658886|5671282": ["A comprehensive study for learning to hash can be found in some survey papers [15], [16], [17]."]} +{"2326538|6923178": []} +{"23089648|17157304": []} +{"121570873|12454277": ["In Bioinformatics and Computational Biology , Boulesteix, Janitza, Kruppa, and K\u00f6nig (2012) amalga-mated 10 years of RF development."]} +{"121570873|1097238": ["This explains why many ensemble methods seek to promote diversity among the models they combine (Adeva, Beresi, & Calvo, 2005; Brown, Wyatt, Harris, & Yao, 2005)."]} +{"6908326|192934": ["Although using different k values are likely to produce different classification results, 1-NN is usually used as a benchmark for the other classifiers since it can provide reasonable classification performances in many pattern classification problems (Jain et al. 2000)."]} +{"15924696|17157304": ["The classification algorithms such as Neural Network (NN), Support Vector Machine (SVM), and NaIve Bayesian (NB), k-NN classification are currently used in various datasets and demonstrated a good classification result as experimented by Youn et al [9][10].", "In addition, learning-based filter analyzes a collection of labeled training data[9]."]} +{"4319217|14774186": []} +{"176602|17157304": []} +{"62924003|17157304": []} +{"3272800|11894197": ["Therefore, a well known approach for mitigating this problem is to use feature selection [7, 22, 24, 10, 23] in order to determine the most powerful subset of features that results in best classification accuracy."]} +{"126017814|17157304": []} +{"126017814|11894197": ["The need for defining a cut-off value (also called threshold) or establishing the number of variables to select, allows generating a large number of features (even all features) [35]."]} +{"8406713|206742377": ["Naive Bayesian [2] [3] is an efficient classification algorithm that is one of the machine learning techniques applied to spam classification problem as well as other information extraction systems [4]."]} +{"16570604|17157304": []} +{"400356|2294541": []} +{"2666574|1520906": ["To integrate the sensory data collected from heterogeneous sources is challenging [14,38].", "The most recent advances made in IoT began when RFID tags were put into use more frequently, lower cost sensors became more available, web technology developed, and communication protocols changed [14,15]."]} +{"2666574|44461432": ["[11] introduced a systematic method for reviewing data mining knowledge and techniques in most common applications."]} +{"2666574|3330313": []} +{"2666574|38476": ["In these cases, data points consist of sequences of \u00f0 x ; y \u00de pairs rather than being drawn in an i.i.d. manner from a joint distribution p \u00f0 x ; y \u00de ; and such the sequences exhibit signi \ufb01 cant sequential correlations [55,127].", "It is worth noting that there is another closely-related task, called sequence classi \ufb01 cation , in which the goal is to predict the desired single categorical output y given an input sequence x [127]."]} +{"2666574|17374870": []} +{"53304118|9928823": []} +{"53304118|393948": []} +{"8727552|11608263": ["A survey by [31] categorizes multilabel classification methods into two groups: problem transformation approaches and adaptation approaches."]} +{"17924942|17157304": ["\u2026consists in identifying and blocking them (Carreras et al., 2001), (Drucker et al., 1999), (Seewald, 2007), on the recipient machine through filters, which generally are based on machine learning techniques or content features (Blanzieri and Bryl, 2008), (Tretyakov, 2004a), (Tretyakov, 2004b).", ", 1999), (Seewald, 2007), on the recipient machine through filters, which generally are based on machine learning techniques or content features (Blanzieri and Bryl, 2008), (Tretyakov, 2004a), (Tretyakov, 2004b)."]} +{"30709140|17157304": []} +{"24541913|17157304": ["Email content can affect how spam filters handle the email [10]."]} +{"14178481|11894197": ["Finally, an embedded approach selects features using the information obtained from training a classi\ufb01er and is thereby embedded (learning and feature selection tasks cannot be separated) in and speci\ufb01c to a model [Saeys et al. 2007]."]} +{"86675164|14774186": []} +{"12698985|17157304": []} +{"15748075|17157304": ["Many studies agree that spam emails have attributable patterns [3][4]."]} +{"16759|17157304": ["Simple Mail Transfer Protocol (SMTP) and machine \nlearning-based approaches are popular implementa\u00adtions of .ltering schemes [Blanzieri and Bryl 2008].", "While the specific review and discussion of machine learning-based approaches and their accompanying algorithms is not the scope of this work, these approaches continue to garner a lot of attention in the context of spam filtering [Guzella and Caminhas 2009; Blanzieri and Bryl 2008; Hidalgo 2005].", "Simple Mail Transfer Protocol (SMTP) and machine learning-based approaches are popular implementations of filtering schemes [Blanzieri and Bryl 2008].", "Although there have been earlier attempts to review spam-.ltering methods [Guzella and Caminhas 2009; \nBlanzieri and Bryl 2008], the scope is mainly related to machine\u00adlearning approaches, which are usually \ndeployed on small-scale computing environ\u00adments targeting low volumes of spam messages.", "While the popularity of Blacklisting and Whitelisting continues [Blanzieri and Bryl 2008; Goodman et al. 2007; Janecek et al. 2008; Jung and Sit 2004; Khanal et al. 2007] challenges still exist, including the increased possibility of blocking legitimate email exchange, or false positives, which is considered to be very costly.", "Although there have been earlier attempts to review spam-filtering methods [Guzella and Caminhas 2009; Blanzieri and Bryl 2008], the scope is mainly related to machinelearning approaches, which are usually deployed on small-scale computing environments targeting low volumes of spam messages.", "While the \nspeci.c review and discussion of machine learning-based approaches and their accompanying algorithms \nis not the scope of this work, these approaches continue to garner a lot of attention in the context \nof spam .ltering [Guzella and Caminhas 2009; Blanzieri and Bryl 2008; Hidalgo 2005].", "While the popularity of Blacklisting and Whitelisting continues [Blanzieri \nand Bryl 2008; Goodman et al. 2007; Janecek et al. 2008; Jung and Sit 2004; Khanal et al. 2007] challenges \nstill exist, including the increased possibility of blocking legiti\u00admate email exchange, or false positives, \nwhich\u2026"]} +{"27169199|17157304": ["K-nearest neighbour (k-NN) has been implemented in the spam filtering problem [6].", "A predefined similarity equation function could choose k nearest training samples and then the messages is labelled to the same classification among such samples [6]."]} +{"20439896|17157304": ["Message tokenization is the process of discretizing an e-mail message using carefully selected delimiters (Blanzieri and Bryl 2008)."]} +{"60877329|17157304": ["Carmona-Cejudo et al.\u2019s (2011) paper is related to real time email classification and introduced GNUsmail open source for email folder classification.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets. Botnets are groups responsible for spreading spam emails. Methods are evaluated to detect such sources of spam campaigns that share some common features. Spammers however try to change spam emails through some intended mistakes or obfuscations especially in popular filtered keywords. Certain finger prints are defined where all emails that have those finger prints are then clustered together. Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering. The paper discussed several aspects related to spam filtering such as the proposals to change or modify email transmission protocols to include techniques to eliminate or reduce spams. Some methods focused only on content while others combined header or subject with content. Some other email characters such as size, attachments, to, from, etc. were also considered in some cases. Feature extraction methods were also used for both email content, attached and embedded images. Webb et al.\u2019s (2006) paper talked about web spam and how to use email spam detection techniques to detect spam web pages.", "Those papers are: Zhuang et al., 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; Pe\u0301rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets. Botnets are groups responsible for spreading spam emails. Methods are evaluated to detect such sources of spam campaigns that share some common features. Spammers however try to change spam emails through some intended mistakes or obfuscations especially in popular filtered keywords. Certain finger prints are defined where all emails that have those finger prints are then clustered together. Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets. Botnets are groups responsible for spreading spam emails. Methods are evaluated to detect such sources of spam campaigns that share some common features. Spammers however try to change spam emails through some intended mistakes or obfuscations especially in popular filtered keywords. Certain finger prints are defined where all emails that have those finger prints are then clustered together. Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering. The paper discussed several aspects related to spam filtering such as the proposals to change or modify email transmission protocols to include techniques to eliminate or reduce spams. Some methods focused only on content while others combined header or subject with content. Some other email characters such as size, attachments, to, from, etc. were also considered in some cases. Feature extraction methods were also used for both email content, attached and embedded images. Webb et al.\u2019s (2006) paper talked about web spam and how to use email spam detection techniques to detect spam web pages. Similar to the approaches to detect spam in emails, web pages are scanned for specific features that may classify them as spam pages such as using irrelevant popular words, keywords stuffing, etc. Mishne et al.\u2019s (2005) paper represents another example of web or link spam research paper.", "Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering."]} +{"2483888|7923463": ["[31] SVM Gaussian Drug Design [32] SVM Gaussian Gene Classification [33] SVM Polynomial Classification [34] SVM Gradient Descent Classification [35] GSVM Polynomial Classification [36] SVM Gaussian Classification [37] WVSVM Polynomial Classification [38] WC-SVM Polynomial Classification [39] SVM Polynomial Image Classification [40] SVFNN Polynomial Pattern Classification [41] LSSVM Polynomial Medical Diagnosis [42] SVM Polynomial Image Classification [77] SVM Gaussian Nuclear Component Classification [43] OVA SVM Polynomial Fingerprint Classification [44] SVM Linear, Polynomial, Gaussian Classification [78] FSVM Linear, Polynomial, Gaussian Product Classification [45] TSVM Linear Pattern Classification [46] SVM Linear and Polynomial Text Classification [47] SVM Linear, Polynomial, RBF, Sigmoid Fault Classification [48] SVM Gaussian TCP Traffic Classification [49] HGA-SVM Linear, Polynomial, Gaussian(RBF) Patent Classification [50] SS-SVM Polynomial Pattern Classification [51] FSVM Polynomial Bankruptcy Prediction [52] SVM Linear Wear degree Classification [53] SVM Polynomial Rule Extraction [54] LS-SVM Gaussian ECG Beat classification [79] SVM Gaussian Power System Classification [57] SVM Polynomial Optimization [58] CDMTSVM Quadratic Classification [59] SVR-GA/CGA/FA RBF Forecasting [60] SVM GRPF Classification [61] SVM-NN Polynomial Text Classification [80] F(2)SVM Sinusoid Voice Classification", ", [44] have proposed different formulations of the optimization problem along with support vector machines (SVMs) for classification task."]} +{"2483888|7158350": ["ANN is a popular technique for the application in most of the data mining fields including classification [1-3], forecasting [4-12], functional approximation [13-15], rule extraction [16-19], pattern recognition and medical applications [20-22]."]} +{"115196194|12395887": ["Recently, a comprehensive literature survey on machine learning based ID with KDDCup 99 dataset was conducted [18].", "After the challenge, most of the published results of KDDCup 99 have used several feature engineering meth-ods for dimensionality reduction [18].", "While few studies employed custom-built datasets, majority used the same dataset for newly available machine learning classi\ufb01ers [18]."]} diff --git a/edge/graph_208633976.jsonl b/edge/graph_208633976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d9cba5339dac0e24d8efa1593ecbca9cf832c53 --- /dev/null +++ b/edge/graph_208633976.jsonl @@ -0,0 +1,2 @@ +{"198320111|1177069": []} +{"59591384|1177069": ["Grid-based methods can be applied over approximate areas to generate coverage paths [21].", "The most recent survey regarding CPP presents several approaches and techniques to perform mostly missions with land vehicles [21].", "The \ufb01nal coverage path is composed of the simple motions performed inside the cells and the inter-cell connections [21]."]} diff --git a/edge/graph_208636924.jsonl b/edge/graph_208636924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da58c5b72f53b4f239fc494e781684912b9734e1 --- /dev/null +++ b/edge/graph_208636924.jsonl @@ -0,0 +1,125 @@ +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} +{"49726825|44621519": ["An in depth analysis of multi-domain orchestration frameworks is in our previous work [5]."]} +{"195738583|25911553": ["The 5G network architecture has been developed based on the conceptual architectures of the Software Defined Networking (SDN) and Network Function Virtualization (NFV) [4] [5]."]} +{"70172294|206456479": []} +{"69839438|52059869": ["Network slicing, believed to be the key ingredient of 5G and beyond networks, consists of allowing a multitude of logical networks to be created on top of a common physical infrastructure, and to share its resources, by turning traditional structures into customizable elements that can run on the architecture of choice [174]."]} +{"69839438|206578224": []} +{"69839438|33492114": ["This selection process can be carried out either offline (static) or online (dynamic) [135]\u2013[137]."]} +{"69839438|207228303": ["This selection process can be carried out either offline (static) or online (dynamic) [135]\u2013[137]."]} +{"69839438|15209496": []} +{"69839438|2623404": ["working of these network functions, whether they are launched on different VMs in the same DC or across multiple DCs, to obtain a mobile, flexible, and dynamic network that is rapidly deployable in the cloud [53]\u2013[55], [70], [84], [101]."]} +{"10344967|4427557": []} +{"58673452|206456479": [", enhanced mobile broadband (eMBB) sub-network slices or massive machinetype communication (mMTC) sub-network slices), each in turn comprises a set of network functions and infrastructure resources, which contains a shared physical asset of computation, storage, transport, and radio access resources, to fulfill the requirements stipulated by a specific service or use case [14]."]} +{"58673452|10342730": ["may in turn sacrifice the performance of users and thus degrade the performance of corresponding network slice [11].", "Apart from the benefits that network slicing bring into the 5G mobile network, some key issues in implementing network slicing have been pointed out [8], [11], [17]."]} +{"3468102|206456479": ["In [3], the authors examined the different architecture for network slicing in 5G and in addition, the challenges of implementing network slicing.", "Diverse requirements of the different 5G use cases [3] and the limited available resources.", "Though 5G networks are still at the point of conceptualization, there are however two uni\ufb01ed notions in\ufb02uencing the research in 5G: the evolutionary and the service - oriented view [3]."]} +{"3468102|10342730": ["A survey of the works done on resource allocation in various sliced network as well as the challenges and the enabling technologies was presented in [7].", "Besides, network slicing offers decrease in capital expenditure (CAPEX) and operation expenditure (OPEX)and consequently increasing network revenue with the idea of implementing multi-operator RAN known as RAN-as-a-Service (RANaaS) [7]."]} +{"52289726|2261490": []} +{"23627391|399542": ["These QoS\u2013QoE models were mainly built for voice and video services, which means that they are lacking universal applicability for other services [6].", "Research has shown that raw QoS measurements and the associated KPIs are not necessarily a reliable predictor of QoE [6, 13], which is why modern QoE models focusing on perceptual characteristics of the monitored systems can help at providing a user perspective, based on measurements from the network."]} +{"23627391|2261490": ["In the recent years, a shift from traditional technology-centric QoS models to more holistic user-centric QoE models could be observed [8], although QoS\u2013QoE mapping models", "Since probes may just forward captured information, with the quality calculation happening at a central location, we identify two distinct points [8]: 1) the monitoring point, at which information is collected, and 2) the quality estimation point, at which the information is used to calculate a quality indicator."]} +{"3501584|42420797": ["service delivery models and thus require new security aspects [26], [27]."]} +{"3501584|15449163": ["Some of his previous professional positions include serving as a Senior Member of scientific staff and a Technical Advisor at Nortel Networks, a Senior Systems Engineer and a Technical Advisor at several start-up companies,\nan Assistant Professor at the University of Puerto Rico at Mayag\u00fcez, and a Senior Researcher at the National Institute of Standards and Technology.", "I. INTRODUCTION 5th generation wireless systems, or 5G, are the next generation mobile wireless telecommunications beyond the current 4G/InternationalMobile Telecommunications (IMT)Advanced Systems [1].", "INTRODUCTION 5th generation wireless systems, or 5G, are the next generation mobile wireless telecommunications beyond the current 4G/InternationalMobile Telecommunications (IMT)Advanced Systems [1]."]} +{"3501584|6779551": ["One of the potential security requirements is to minimize the security-related signaling overhead to ensure the efficiency [20], [73]."]} +{"3501584|595093": ["In use cases such as smart meters in smart grid [50], data integrity service needs to be provided against manipulation."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"21318805|31193955": ["Although mechanisms to ensure isolation are well established in multi-tenant data centers or wired network domains [10], isolation is currently one of the main open research challenges in wireless network virtualization [11].", "[10] V."]} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"1993958|206456479": ["These and other future work issues are discussed further in [20]."]} +{"35240178|2261490": []} +{"53229376|206578224": ["Towards overcoming the aforementioned obstacles and, in order to serve the increased requirements of the future 5G services, a Multi-access Edge Computing (MEC)-enabled architecture that enables cloud computing capabilities at the edge of the access network is widely accepted by the literature [1]."]} +{"53229376|25911553": ["However, the recent NFV advances have permitted the virtualization of the EPC, by transforming the rigid core architecture into a set of network VNFs that can be flexibly placed at different parts of the network [11]."]} +{"31781530|10693567": ["Being widely supported by various device manufacturers, service providers, and operators, OpenFlow (defined by the Open Networking Foundation, ONF) is broadly considered as the dominating solution for implementing the southbound interface; more details on OpenFlow are given by [4]."]} +{"23979583|2261490": ["The QoE is measured with the Mean Opinion Score (MOS) and ranges in the interval [1, 5] where 1 means minimum quality and 5 maximum quality."]} +{"207041109|29464310": ["2 Gbit/s for an 8x8 MIMO 100 MHz LTE-Advanced system [11].", "CPRI [11]) or new fronthaul and backhaul traffic over the same medium, and (2) an SDN/NFV-based control infrastructure (i.", "25 Gbit/s shared by up to 128 subscribers), it is clearly insufficient for the transport of fronthaul traffic due to its high data rates requirements, and the delay and jitter imposed by the upstream Dynamic Bandwidth Allocation (DBA) algorithms employed in TDM-PONs [11].", "While standards like GPON (ITU-T G.984, Gigabit-capable PON) may be sufficient for residential users (bandwidth is 2.5/1.25 Gbit/s shared by up to 128 subscribers), it is clearly insufficient for the transport of fronthaul traffic due to its high data rates requirements, and the delay and jitter imposed by the upstream Dynamic Bandwidth Allocation (DBA) algorithms employed in TDM-PONs [11]."]} +{"11217325|18687271": []} +{"11217325|2623404": []} +{"22011446|2261490": ["Moreover, the service quality is most of the time degraded by the poor network conditions and occurrence of congestion in the access network of the Internet Service Providers (ISPs) [2]."]} +{"37705367|6583734": ["To this end, SDN and NFV are considered as key technologies that introduce flexibility in the network and resource management [2]."]} +{"670146|1442447": ["), sensor networks and their interplay with Fog-/Cloud-hosted virtual objects (VOs) [5]; VOs can be understood as the virtual counterpart of physical devices, as well as complementary functionalities such as computing/storage."]} +{"670146|2623404": ["For instance, the Software-Defined Networking (SDN) paradigm [7] seeks to overcome the infrastructure ossification problem by decoupling network intelligence from the forwarding plane; this renders forwarding devices simple and programmable via an open interface like OpenFlow (OF) [8]."]} +{"4872238|206456479": ["In [5], the interested reader may find a nice overview of the latest research proposals."]} +{"52123342|2282515": ["Though QoS support mechanisms have been under investigation and development for decades [2], the expected state of affairs in 5G networks will introduce unique challenges."]} +{"52123342|4269723": ["To this end, the EU research project Virtuwind [4] has designed and implemented a complete solution building on the principles of Software Defined Networking (SDN) [5]."]} +{"4102587|206456479": ["Moreover, a comprehensive survey on architecture and further research directions of network slicing is also available in [6].", "In this section, we are going to identify main research problems and future directions in the \ufb01eld of network slicing that are needed to be investigated for its full implementation over all parts of 5G system [1] [5] [6]."]} +{"4102587|10342730": ["There are two different concepts and scenarios of using of network slicing in communication networks [10], slicing for the purpose of QoS and Slicing for the purpose of infrastructure sharing.", "However, a detailed discussion on objectives and motivation of network slicing implementation can be found in [10]."]} +{"14081529|2854761": ["Scheduler design in wireless networks, especially inWiMAX networks [47], is a hot topic and very relevant to .", "1We point the interested reader to a detailed survey [47] on WiMAX network resource management."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"49653264|2623404": ["The concept is strongly coupled with SDN/NFV technologies [13], [14]."]} +{"27532782|40202226": ["as YouTube, the number of stalling events have a higher impact on the user perceived quality than video quality [12]."]} +{"174783442|52059869": ["15, March 2018 [3] I.", "This can only be addressed via an efficient means of resource orchestration and programmable management [3]."]} +{"174783442|44621519": ["A federated slicing solution is presented in [9] introducing the notion of multi-domain orchestrator, which handles slice requests for resources beyond its domain."]} +{"52118462|206578197": ["In [16], virtualization of wireless links and nodes is reviewed, whereas [17] particularly focuses on the resource allocation and isolation problems and provides a review of existing works on resource slicing in WNV.", "In [16], virtualization is de\ufb01ned as a resource mapping which is comprised of the following principles: 1) abstracting physical resources as virtual resources, 2) splitting and combining virtual resources into slices, 3) isolating each of the slices, 4) allocating them simultaneously among\u2026"]} +{"52118462|25911553": ["Despite several existing surveys on WNV [14]\u2013[19], we aim at reviewing the virtualization models with a new perspective in terms of network slicing and pricing based on auction mechanisms.", "An SDN and NFV-based architecture for mobile packet core network is presented in [14] that focuses on functional implementation and deployment strategy of the next generation EPC network."]} +{"52118462|10342730": ["In [16], virtualization of wireless links and nodes is reviewed, whereas [17] particularly focuses on the resource allocation and isolation problems and provides a review of existing works on resource slicing in WNV."]} +{"52118462|6583734": ["The software-de\ufb01ned NFV architecture in [19] studies the \ufb02exibility of service deployment by virtualizing various network functions of hardware appliances into software applications.", "Despite several existing surveys on WNV [14]\u2013[19], we aim at reviewing the virtualization models with a new perspective in terms of network slicing and pricing based on auction mechanisms."]} +{"52118462|11414835": ["The implementation of network sharing and multi-tenancy in WNV, through SDN hypervisor or the virtual machine monitor, is studied in [18]."]} +{"25911553|9495329": ["Bizanis and Kuipers [8] presented a survey about SDN and virtualization for Internet of Things (IoT), which covers proposals adopting these two concepts into MCN and WSNs."]} +{"25911553|37966695": ["There are a large number of solutions proposed to solve this problem in wired SDN research [39], [63], [158] such as horizontally distributed SDN controllers where multiple controllers are organized in a flat control plane (e.", "or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|207262843": ["[12] are the related surveys, which only focus on the MCN architecture, which is typically composed of Radio Access Networks (RANs), mobile backhaul networks, and the MPC network.", "Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the field of mobile and wireless networks [12]."]} +{"25911553|6583734": ["In turn, SDN serves NFV by providing programmable network connectivity between VNFs to achieve optimized traf\ufb01c engineering and steering [49]."]} +{"25911553|11414835": ["Regarding SDN, the network slicing concept has been discussed in several proposals in the context of network hypervisors [148], such as FlowVisor [149], OpenVirteX [150].", "The network slicing can also be done by using the concept of a network hypervisor [148] such as FlowVisor [149] or OpenVirteX [150] in full-SDN MPC architectures."]} +{"25911553|2535224": ["[5] mainly surveyed current efforts applying SDN and virtualization into MCN and", "[5] 2015 WLAN, MCN SDN Year, network type, network position 4"]} +{"25911553|15035771": ["It could be overcome by using multiple controllers or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|2623404": ["Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the \ufb01eld of mobile and wireless networks [12].", "Interested readers can \ufb01nd more about SDN and its applications in [37]\u2013[41]."]} +{"25911553|11735843": ["As shown in this figure, most of the related surveys [4]\u2013[9]"]} +{"44621519|2623404": []} +{"43669303|2261490": []} +{"50773884|12187684": ["observed subsets [26].", "sense [25-26]."]} +{"195798799|20384442": ["Depending on the number of users and their QoS requirement, each MVNO This assumption is widely used for utility or valuation functions in communication networks [17], [40], [41]."]} +{"195798799|37564067": ["This assumption is widely used for utility or valuation functions in communication networks [17], [40], [41]."]} +{"59413850|7329149": ["The Internet of Things (IoT) paradigm offers prodigious opportunities to the industries [1]."]} +{"2254201|207262843": ["The authors of [17] and [18] discuss a core network architecture that is fully comprised of virtual network functions and deployed on a cloud infrastructure."]} +{"42356197|3348390": ["In the survey of [7], the application is mainly divided into three categories: industry, environment and society."]} +{"28826634|2623404": [", hybrid clouds, content delivery networks) with the establishment of data delivery paths while addressing different application service requirements [1], [2]."]} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"207670015|64404": ["The last few years have seen the introduction of a new generation of video encoding standards including VP9 [10] and H.265 [7].", "The starting point for this work will be a scalable video solution based on the very recent scalable extension [8] to the new H.265 standard [7] which offers substantial bandwidth savings [19] over the scalable extension to H.264.", "The self-optimisation use case will also support the transition from current video encoding standards to the new H.265 standard [7] and its scalable extension [8].", "NEA encryption has two main drawbacks: firstly encryption and decryption of the entire H.265 [7] video streams would be both time and energy intensive and secondly, and perhaps more importantly for SELFNET, prevent trusted middleboxes such as MANEs from preforming in-network adaptation of the video\u2026"]} +{"207670015|3540699": ["The H.265 standard, also known as High Efficiency Video Coding (HEVC), is widely seen as the replacement for the popular H.264 [11] standard, which is widely used in consumer electronics products and multimedia services today.", "In IPTV and RTP/RSTP, traditional MPEG encryption [23] algorithms have been applied to H.264 [11] encoded video content."]} +{"52454156|3555631": ["Furthermore, it should be considered that some UEs could exploit U/C-plane splitting or DUDe mechanisms [93], [94] to improve their reliability and/or QoS."]} +{"52454156|2623404": ["For more details on SDN, please refer to [16], [21], [22], [23]."]} +{"52454156|10693567": ["From a network point of view, Software Defined Networking (SDN) is considered as the main realization of the softwarization concept [18]."]} +{"52454156|4269723": ["For more details on SDN, please refer to [16], [21], [22], [23].", "SDN introduces the possibility of decoupling network control from forwarding functions by thus allowing flexibility and reconfigurability of the physical network [21]."]} +{"52454156|25929315": ["[12], [13], the next-to-come generation of mobile networks has to face with applications with heterogeneous characteristics and Quality of Service (QoS) requirements."]} +{"4885142|206456479": ["The authors in [81] review the state of art in 5G network slicing."]} +{"4885142|31193955": ["A review of known communication protocols providing isolation on different security level can be found in [44]."]} +{"4885142|10342730": ["According to [25], there are the following strategies for resource isolation in 3GPP LTE and WiMAX: \u2022 Physical resource block (PRB) scheduling; \u2022 Slice scheduling; \u2022 Traffic shaping.", "The following solutions can constitute an example of isolation techniques usage in wireless domain [25]:", ") and its own properties based on business requirements for each service, which will be provided over this network [19, 24, 25]."]} +{"24679080|206578224": []} +{"24679080|10342730": ["candidates and key enablers to actualize this standard [3]\u2013 [5].", "same over an agreed duration of time [5].", "In [5], the key enablers of network slicing are introduced and discussed in details."]} +{"1540619|3757239": ["[13] focuses on the convergence of computing, caching and communication by introducing the key technologies that are enabling the concept of mobile edge networks."]} +{"1540619|6909107": ["Mach and Becvar [14] published a thorough survey on architecture and computation offloading including reference scenarios to point out how existing concepts which might be employed to integrate MEC functionalities into existing mobile networks."]} +{"188947|11414835": ["SDN network virtualization hypervisors can be implemented and operated in either a centralized ( k = 1) or distributed ( k > 1) manner [6].", "In general, a hypervisor instance provides the following virtualization functions: abstraction (virtualization), translation, and isolation [6].", "2) SDN Network Hypervisors: SDN network hypervi-sors [6] sit between vSDN controllers and the underlying physical SDN network, as illustrated in Fig.", "SDN network virtualization hypervi-sors [6], which we refer to as hypervisors for brevity, operate as an intermediate layer between SDN network infrastructures and vSDN controllers."]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"15458556|15449163": []} +{"4661452|19938676": []} +{"21533588|2261490": ["this shift of research paradigm towards QoE is leading to a big change in network monitoring, modeling and management techniques from Key Performance Indicators (KPIs) to Key Quality Indicators (KQIs) [3], [4]."]} +{"21533588|40202226": ["A survey on parametric QoE estimation models for popular services is provided in [18]."]} +{"36227357|2623404": []} +{"10342730|2535224": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "In contrast to previous surveys on wireless virtualization [2]\u2013[4], our interest focuses on the problems derived from wireless slicing and on the existing techniques that deal with these speci\ufb01c problems."]} +{"10342730|11735843": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "For instance, approaches for network programmability [11] such as Software-De\ufb01ned Radio (SDR) [56]\u2013[58] or programmable MAC protocols [59]\u2013[61] may be used to circumvent this challenge."]} +{"14041731|2261490": ["Specifically, as suggested in [8], four basic questions should be answered: (1) what to control? (2) where to control? (3) when to control? and (4) how to control? In Section 4, we provide a reference architecture for collaboration between OTTs and ISP where we try to address these questions as well as to further questions which arise from the considered collaboration such as: (5) what information is shared between OTT and ISP? (6) when and how frequently this information is shared? (7) how this information is shared? Moreover, we consider a further question which goes beyond the joint collaborative management, i.", "3 PROBLEM DEFINITION The objective of QoE management is the optimization of end-user QoE, while making efficient (current and future) use of network resources and maintaining a satisfied customer base (provider perspective) [8]."]} +{"14041731|40202226": ["A survey on parametric QoE estimation models for popular services is provided in [39]: such models are typically a function of both network KPIs and application KQIs."]} diff --git a/edge/graph_208636938.jsonl b/edge/graph_208636938.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf6f24dfc2bcfb912c3cf0c3353c7f8988d20feb --- /dev/null +++ b/edge/graph_208636938.jsonl @@ -0,0 +1,26 @@ +{"3815546|9576764": ["For instance, according to the survey result reported in [15], the iris and voice biometric traits were ranked highest in terms of perceived security protection, but lowest in terms of usability mainly due to high requirement of user cooperation."]} +{"36040753|2294541": []} +{"3858499|36784649": ["Various studies have advised that even if impostor samples were available, the authentication systems preferably be built by using only genuine samples [9, 13]."]} +{"17071303|6906699": ["Keywords Touch Dynamics, Mobile Authentication, Keystroke Dynamics, Benchmark Dataset, Behavioral Biometrics."]} +{"5065625|9576764": ["A 2016 follow-up on mobile touch biometrics [58] called for data collection tools.", "provide surveys on typing biometrics in general [57] and for mobile touch devices [58]."]} +{"5065625|6906699": ["A 2013 survey [57] found that 73 % of typing biometrics research collected data in one (lab) session.", "We cannot discuss all reviewed work here, but as an overview, we give starting points for further reading: Teh et al. provide surveys on typing biometrics in general [57] and for mobile touch devices [58].", "This is a standard evaluation method for typing biometrics [57].", "We also evaluate a transition variation of this model, which models behaviour per key-to-key transition, as commonly used in keystroke biometrics [57].", "The importance of \ufb01nding novel biometric features for mobile touch typing was highlighted by related work [18, 57]."]} +{"12656644|15273230": ["A well accepted measure for unbalanced dataset is AUC (area under the ROC curve) (Chawla, 2005)."]} +{"8918672|6670217": ["and the recent surveys regarding mobile security [125], malware propagation modeling [166] and evolution [204], [242]."]} +{"8918672|15219853": []} +{"15696161|192934": []} +{"6334061|9576764": ["Studies [17-19] have shown that smartphones have very different usage patterns from conventional computer systems."]} +{"17693303|15219853": ["The continuous authentication techniques proposed on mobile devices typically collect and use biometric information to profile a genuine user."]} +{"112046|5246835": ["C. Whitrow (B) \u00b7 D. J. Hand \u00b7 P. Juszczak \u00b7 D. Weston Institute for Mathematical Sciences, Imperial College, London, UK e-mail: c.whitrow@imperial.ac.uk\nD. J. Hand \u00b7 N. M. Adams Department of Mathematics, Imperial College, London, UK", "For a recent survey of the general area of fraud detection, see Kou et al. (2004)."]} +{"17412073|5246835": ["Lastly, the data sets are also constantly evolving making the profiles of normal and fraudulent behaviors always changing (Bolton & Hand, 2002; Kou et al., 2004; Phua et al., 2005; Sahin & Duman, 2010)."]} +{"2370490|9913343": ["Graphical passwords [25] are increasingly proposed as a usable knowledge-based authentication mechanism."]} +{"3947699|50458504": []} +{"3394940|9576764": ["It is a common metric for biometric authentication methods to measure overall performance of the model [19].", "A survey paper on touch dynamics authentication in the context of touchscreen mobile devices was published by Teh et al. in 2016 [19].", "Teh et al. (2016) reported that there was an increasing number of papers in this field with 4 times more publications in 2014 than in 2012 [19]."]} +{"4317337|50458504": ["First we test algorithms that have previously been used to solve the credit card fraud detection problem [14], namely, logistic regression (LR), C4."]} +{"49296574|36355857": []} +{"16049800|5246835": ["A review of the fraud detection systems can be found in [2-5].", "Lastly, the data sets are also constantly evolving making the profiles of normal and fraudulent behaviors always changing [2-4]."]} +{"16049800|50458504": ["A review of the fraud detection systems can be found in [2-5].", "Lastly, the data sets are also constantly evolving making the profiles of normal and fraudulent behaviors always changing [2-4]."]} +{"21714137|9576764": []} +{"32392875|6906699": ["[2,3] suggest that this fingerprinting is fairly unique from person to person thus can be used as a base for user identification.", "Touchstroke features used in this paper, adapted from [2].", "In [2] authors show that these time-based features are the most widely used features in keystroke dynamics."]} +{"17558010|15219853": []} +{"45985725|7834819": []} +{"2633916|5246835": ["A summary of these is given in [28], which reviews analytic techniques for general fraud detection, including credit card fraud."]} diff --git a/edge/graph_208650101.jsonl b/edge/graph_208650101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a351de9d8fa3e45490a1c9e899dc9b0a76f8361 --- /dev/null +++ b/edge/graph_208650101.jsonl @@ -0,0 +1,3 @@ +{"39140932|18149616": ["Here military technologists are working on projects including distributed virtual reality, behavior modeling, image-based modeling and rendering (IBMR) tools, simulation of dynamic ocean waves, and collision detection (Pan et al. 2000)."]} +{"51906722|2277438": []} +{"206931272|45803955": []} diff --git a/edge/graph_208769218.jsonl b/edge/graph_208769218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_208779359.jsonl b/edge/graph_208779359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3cf9e20fb240fe722f2c211c3377bd2b99322b5 --- /dev/null +++ b/edge/graph_208779359.jsonl @@ -0,0 +1,14 @@ +{"181892868|4931330": []} +{"40543861|9736817": []} +{"96998997|17772052": []} +{"95592989|192934": []} +{"2016155|14933256": []} +{"2016155|189201": []} +{"17499887|192934": []} +{"5380100|9736817": []} +{"97336406|9736817": []} +{"114472287|9736817": []} +{"97043090|9736817": []} +{"99137272|9736817": []} +{"95922144|9736817": []} +{"98549624|192934": []} diff --git a/graph_2087828.jsonl b/edge/graph_2087828.jsonl similarity index 100% rename from graph_2087828.jsonl rename to edge/graph_2087828.jsonl diff --git a/edge/graph_208815646.jsonl b/edge/graph_208815646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3db2e5a1a5cd6183bb7490d7f7406b9971bedd43 --- /dev/null +++ b/edge/graph_208815646.jsonl @@ -0,0 +1,22 @@ +{"196716|15300368": ["Wireless sensor networks (WSNs) [1,2] comprise a number of light-weight low-power sensor nodes."]} +{"80623560|53106966": ["The interaction between the sensing layer and analytes results in changes in the physical and chemical properties of the sensing material at elevated temperatures [4], leading to a device conductivity change."]} +{"80623560|15589021": ["In addition, they benefit from low-cost MEMS fabrication technique and simple and portable structures as well as low energy consumption [22]."]} +{"41189734|17772052": []} +{"3460671|189201": []} +{"3504690|15589021": []} +{"3504690|41104565": ["The propagation characteristics of different modes of the acoustic waves are well known and their applications have been realized in many disciplines [14,39].", "All these surface waves are distinct from the bulk acoustic waves (BAWs) which propagate across the body of a material [38,39]."]} +{"3504690|189201": ["Alternatively, sensors based on other surface waves such as SH-SAW and Love waves have been successfully employed in fluidic media [21,24].", "For example, Rayleigh waves are excited in Y-Z LiNbO3 (where Y-Z stands for Y-cut, Z-propagating) and 128\u25e6 Y-X LiNbO3 substrates whereas SH-SAW are shown to excite and propagate in 64\u25e6 Y-X LiNbO3 and 36\u25e6 Y-X LiTaO3 [24,30,46]."]} +{"29807554|9770908": []} +{"125605333|3330313": []} +{"125605333|17772052": []} +{"125605333|192934": []} +{"106203551|189201": []} +{"204739441|208815646": []} +{"195787942|109939482": ["For example, researchers have been making nanomaterials like silicon carbide on a large scale to form the electrodes for biomedical sensing [98]."]} +{"195787942|16977533": ["Among the wide sector of biomedical sensing applications that the silicon sensors have been employed for, some of them are applied to physiological body movements [18], human bio-signals like heartbeats [19], blood flow [20], pulse rate [21], drug delivery [22], protein [23] and tumour detection [24], DNA sensing [25], and stem cell research [26]."]} +{"195787942|7505270": []} +{"91683218|9736817": []} +{"97147581|10212336": []} +{"10292278|1614929": []} +{"76661725|3428776": []} +{"76661725|41104565": []} diff --git a/edge/graph_208816089.jsonl b/edge/graph_208816089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1b98a1680f13311e494f73194ac0e663626f831 --- /dev/null +++ b/edge/graph_208816089.jsonl @@ -0,0 +1,10 @@ +{"28198026|11381530": []} +{"28198026|26690303": []} +{"3169399|3913780": ["The phenomena of popularity, surveyed by [23], has some connections with virality and even relevance.", "The phenomena of popularity, surveyed by Tatar et al (2014), has some connections with virality and even relevance."]} +{"3169399|393948": ["The presented approach could go further if semi-supervised representation learning [1] were applied to the classification process."]} +{"13185567|11894197": []} +{"10137209|4602249": ["This finding was also reported by Kanewala and Bieman [87] as part of a systematic literature review of testing scientific software.", "A key challenge found by Kanewala and Bieman [87] is the availability of a test oracle : a means of computing an expected result for comparison with the output from the software under development."]} +{"649955|6670217": ["\u2026site key with security questions and images, registered mobile device authentication, and anti-virus apps can be adopted to enhance the security of mobile banking applications (Cognizant, 2013; Constantin, 2014; Lee et al., 2013; Chandramohan & Tan, 2012; La Polla et al., 2013; White, 2013).", "Many of mobile malware are variants of existing malware that affect computers and traditional online banking (Webroot, 2014; Shih et al., 2008)."]} +{"18093742|6923178": ["Matthew\u2019s Correlation Coefficient (MCC) is equivalent to Pearson\u2019s correlation coefficient for binary data [Baldi et al. 2000].", "Matthew s Correlation \nCoef.cient (MCC) is equivalent to Pearson s correlation coef.cient for binary data [Baldi et al. 2000]."]} +{"54461335|18567112": []} +{"174789486|10996225": ["Considering that several anti-viruses normally perform statistical analysis using features extracted from the binary file, such as: n-grams, entropy, opcodes, signatures, size, imports section, or in specific kinds of malware like Android malware, permissions and intent actions, among others [7], we want to know how accurately we can predict the outcome of an anti-virus given a piece of software."]} diff --git a/edge/graph_20885268.jsonl b/edge/graph_20885268.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d6b8e11c311610a991a1a2278f9801812aaa84c --- /dev/null +++ b/edge/graph_20885268.jsonl @@ -0,0 +1 @@ +{"8560289|20516386": ["Rather, we believe that the tool should be integrated in the design process, similarly to automated tools that have been proposed in the context of website design (see Katsanos, Tselios, & Avouris, 2010b, for a review), and should be used for generating \u201cadvice\u201d to administrators."]} diff --git a/edge/graph_208857467.jsonl b/edge/graph_208857467.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21447379f041a1dac3407dd0f9bad000b4628fc6 --- /dev/null +++ b/edge/graph_208857467.jsonl @@ -0,0 +1,9 @@ +{"207319017|8627028": ["In a recent survey of annotation projects for natural language processing tasks (Tomanek and Olsson, 2009), only 20% of the respondents said they had ever decided to use active learning, which is evidence of the community\u2019s skepticism about its usefulness in practice1."]} +{"7979241|3519414": ["Given rapid developments in this field, we point readers to a recent, comprehensive review [88]."]} +{"7979241|393948": ["Our central insight is that rather than explicitly harmonizing EHR data, mapping it into a highly curated set of structured predictors variables and then feeding those variables into a statistical model, we can instead learn to simultaneously harmonize inputs and predict medical events through direct feature learning [6]."]} +{"564263|2809360": ["Each discovered named entity belongs to one of the dictionary semantic types and has attributes for (1) the text span associated with the named entity (\u2018span\u2019 attribute), (2) the terminology/ontology code the named entity maps to (\u2018concept\u2019 attribute), (3) whether the named entity is negated (\u2018negation\u2019 attribute), and (4) the status associated with the named entity with a value of current, history of, family history of, possible (\u2018status\u2019 attribute).", "There are several major sources of errors: (1) sentences starting with titles, especially \u2018Dr \u2019 and \u2018Mr \u2019; (2) sentences", "One set was additionally split into three subsets: (1) for developing the guidelines (150 sentences), (2) for training (400 sentences), and (3) for measuring IAA (200 sentences).", "We did not separately evaluate the off-the-shelf normalizer, which is used to improve the recall defined in equation (2) of the NER annotator.", "Global evaluation and applications We have conducted global evaluations of cTAKES for two largescale phenotype-extraction studies: (1) ascertaining cardiovascular risk factors for a case-control study of peripheral arterial disease using the EMR within the eMERGE(66) and (2) treatment classification for a pharmacogenomics breast cancer treatment study within the PGRN.", "recall 1\u20444 TruePositives TruePositives \u00fe FalseNegatives (2)"]} +{"205155328|15326253": []} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"270583|17324444": ["A key problem is avoiding or controlling confounding, using methods that model statistical and information theoretic relationships within a set of variables such as structural equations and graphical models (30), methods that place candidate associations in a context to judge the plausibility of causation such as the Hill Criteria (31), methods that correct effect size estimations such as the use of propensity scores (32), designs that reduce confounding such as self-controlled case series (33), and others (34)."]} +{"270583|9180844": ["The diagnosis code\n7334 | www.pnas.org/cgi/doi/10.1073/pnas.1510502113 Hripcsak et al.\nwas defined in Systematized Nomenclature of Medicine (38) and in the Medical Dictionary for Regulatory Activities (41) and was mapped to other terminologies including the International Classification of Diseases, Ninth Revision, Clinical Modification (42).", "aDepartment of Biomedical Informatics, Columbia University Medical Center, New York, NY 10032; bMedical Informatics Services, NewYork-Presbyterian Hospital, New York, NY 10032; cObservational Health Data Sciences and Informatics, New York, NY 10032; dEpidemiology Analytics, Janssen Research and Development, Titusville, NJ 08560; eCenter for Biomedical Informatics, Regenstrief Institute, Indianapolis, IN 46205; fCenter for Biomedical Informatics Research, Stanford University, CA 94305; gDepartment of Biomedical Informatics, Ajou University School of Medicine, Suwon, South Korea, 443-380; hLister Hill National Center for Biomedical Communications (National Library of Medicine), National Institutes of Health, Bethesda, MD 20894; iDepartment of Biomathematics, University of California, Los Angeles, CA 90095; jDepartment of Biostatistics, University of California, Los Angeles, CA 90095; kDepartment of Human Genetics, University of California, Los Angeles, CA 90095; lReal World Evidence Solutions, IMS Health, Burlington, MA 01809; mDepartment of Medicine, University of Colorado School of Medicine, Aurora, CO 80045; nDepartment of Biomedical Informatics, Vanderbilt University Medical Center, Nashville, TN 37212; oGeriatric Research, Education and Clinical Center, VA Tennessee Valley Healthcare System, Nashville, TN 37212; pDepartment of Preventive Medicine, University of Southern California, Los Angeles, CA 90089; qDepartment of Pediatrics, University of Southern California, Los Angeles, CA 90089; rDivision of Health Sciences, University of South Australia, Adelaide, SA, Australia 5001; and sDepartment of Statistics, Columbia University, New York, NY 10027\nEdited by Richard M. Shiffrin, Indiana University, Bloomington, IN, and approved April 5, 2016 (received for review June 14, 2015)\nObservational research promises to complement experimental research by providing large, diverse populations that would be infeasible for an experiment.", "5A shows that diabetes monotherapy ranges from 10% in General Electric Centricity (GE) to 80% in Ajou University School of Medicine (AUSOM).", "Data elements were translated to standard terminologies such as Systematized Nomenclature of Medicine (diseases, procedures) (38), RxNorm (medications) (39), and Logical Observation Identifiers Names and Codes (laboratory tests) (40).", "This work was funded in part by Grants R01 LM006910 and R01 LM011369 from the National Library of Medicine, Grant R01 GM101430 from the National Institute of General Medical Sciences, Grant NSF IIS 1251151 from the National Science Foundation, and by the Smart Family Foundation.", "was defined in Systematized Nomenclature of Medicine (38) and in the", "Data source descriptions\nAbbreviation Name Description Population, millions\nAUSOM Ajou University School of Medicine\nElectronic health record data from a Korean tertiary teaching hospital with 1,096 patient beds and 23 operating rooms that adopted a computerized provider order entry system in 1994 and a comprehensive electronic health record system in March 2010\n2\nCCAE MarketScan Commercial Claims and Encounters\nAn administrative health claims database for active employees, early retirees, COBRA continues, and their dependents ensured by employer\u2010sponsored plans (individuals in plans or product lines with fee\u2010for\u2010service plans and fully capitated or partially capitated plans)\n119\nCPRD UK Clinical Practice Research Datalink\nAnonymized longitudinal electronic health records from primary care practices in the United Kingdom.", "\u2020Terms are defined in the Systematized Nomenclature of Medicine (SNOMED) (37)."]} diff --git a/edge/graph_208857777.jsonl b/edge/graph_208857777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..431d84227f91c241a154c68706b8992e60d170b0 --- /dev/null +++ b/edge/graph_208857777.jsonl @@ -0,0 +1,10 @@ +{"84845282|17485266": ["Through microlensing they have been used to study the structure of quasars (Morgan et al. 2008; Poindexter et al. 2008; Blackburne et al. 2011)."]} +{"53566550|4389172": ["When the target variable is discrete the ML task is referred to as classification (e.g, Richards et al. 2011; Bloom et al. 2012; Brink et al. 2013; Djorgovski et al. 2014; Mahabal et al. 2017; Castro et al. 2018), and when the target variable is continuous the task is referred to as regression\u2026"]} +{"67440317|17594958": ["omy is not only about managing a large number of observations, but also to deal with \ufb01les of large size. The research on 2D image analysis techniques, such as segmentation (Russ, 2006) and denoising (Motwani et al., 2004), has been largely addressed using the standard pixel-based representation. The use of these techniques is widely spread in astronomy (Starck and Murtagh, 2002), including specialized packages that di", "The research on 2D image analysis techniques, such as segmentation (Russ, 2006) and denoising (Motwani et al., 2004), has been largely addressed using the standard pixel-based representation."]} +{"2005016|4389172": ["Large data rates and the need for a consistent response imply the need for the automation of these processes, and the problem is rapidly becoming much worse."]} +{"119338700|7158350": ["\u2026e.g. Cover & Hart 1967; Altman 1992), support vector machine (SVM; e.g. Vapnik & Lerner 1963; Cortes & Vapnik 1995; Burges 1998; Cristianini & Shawe-Taylor 2000; Scholkopf & Smola 2001), and artificial neural network (e.g. McCulloch & Pitss 1943; Rosenblatt 1958; Jeffrey & Rosner 1986; Zhang 2000)."]} +{"119295555|2398835": ["Data mining in the big data framework often encounters difficulty in both extracting the relevant information from the data and in coming up with meaningful interpretations in a highly reliable fashion (Fan et al. 2014; Wu et al. 2014; Khan et al. 2014)."]} +{"118957728|4389172": ["The Catalina Realtime Transient Survey (CRTS) operated an automated classifier (Djorgovski et al. 2014) for a period in 2015; however, current optical transients are all reported as\n5 https://plasticcblog.wordpress.com/\nhuman classified."]} +{"119277652|17727615": []} +{"53408371|393948": ["It is\npossible that one could use an algorithm that identifies the optimal set of features to use (see unsupervised feature learning in Bengio et al. (2013), also stacked denoising autoencoders by Vincent et al. (2010) ), but that is beyond the scope of the current paper."]} +{"206771654|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} diff --git a/edge/graph_208858384.jsonl b/edge/graph_208858384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74a5e7d2410fd1296271e63060c52d6d40d73dd4 --- /dev/null +++ b/edge/graph_208858384.jsonl @@ -0,0 +1,9 @@ +{"3276555|13018804": ["Computer algebra systems and other related tools may be helpful for uncovering such errors."]} +{"14374571|8914588": ["Important adaptation concerns, such as security and scalability, are hardly considered."]} +{"14374571|627405": ["\u2026the managed system \n(also called sys\u00adtem layer [42], managed resources [53], core function [71], base\u00adlevel subsystem [91]) \nthat deals with the domain functionality, and the managing system (or architecture layer [42], autonomic \nman\u00adager [53], adaptation engine [71], re.ective subsystem\u2026"]} +{"14374571|1975139": []} +{"6391732|15686373": []} +{"701347|9316331": []} +{"16662862|8921624": []} +{"3157126|10162051": ["Klein [40] provides a comprehensive overview."]} +{"52123858|3148588": ["A key feature of Coq is a capability of extraction of the veri\ufb01ed program (in OCaml, Haskell or Scheme) from the constructive proof of its formal speci\ufb01cation [20]."]} diff --git a/graph_2088679.jsonl b/edge/graph_2088679.jsonl similarity index 100% rename from graph_2088679.jsonl rename to edge/graph_2088679.jsonl diff --git a/edge/graph_208879723.jsonl b/edge/graph_208879723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2aad4c6cfc5ea114ad3c2c3bf0c1d963daa5355d --- /dev/null +++ b/edge/graph_208879723.jsonl @@ -0,0 +1 @@ +{"14506729|1230643": []} diff --git a/edge/graph_208880874.jsonl b/edge/graph_208880874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65f756112ffbd42903d4505b02b9c942a8ddb6fd --- /dev/null +++ b/edge/graph_208880874.jsonl @@ -0,0 +1,34 @@ +{"49724635|15895606": ["The security issues of insulin pump in the context of cybersecurity systems were shown in [17]."]} +{"49724635|21386749": ["The authors of [4] presented all healthcare IoT trends, solutions, platforms, services and applications."]} +{"15288594|8364569": []} +{"191525926|3390598": []} +{"56802372|51613885": []} +{"56802372|31245252": []} +{"56802372|17962754": ["Zhang et al. [59] state that trust computing for access control in an IoT network, Trust-Based Access Control (TBAC), is still relatively new but has been implemented successfully in commercial applications."]} +{"56802372|2829149": ["Due to the changing trends in security threats, [2] has suggested current security challenges according to the layer and the possible countermeasures.", "The survey papers [2\u20136] evaluate the possible threats to IoT systems according to the layers and the available countermeasures."]} +{"164959791|3273576": []} +{"164959791|21386749": []} +{"25676549|1990579": []} +{"4549993|20527696": ["Moreover, Raspberry Pi 2 uses a wireless sensor network (WSN) [5][6]."]} +{"53752307|15164501": ["To address cultural issue, a large body of previous works e.g., (Cockcroft & Rekker, 2015; Krasnova et al., 2012; Leidner & Kayworth, 2006; Lowry, Cao, & Everard, 2011; Ng, 2013) generally applied Hofstede (2001) cultural dimensions framework in which the culture can be divided into five dimensions\u2026"]} +{"21582491|13536847": ["Lutz & Stiller (2013) presented an analysis of electronic payment approach as well as Identity Federation mechanism that focuses to provide a solution to bridge these two aspects."]} +{"182532963|31245252": []} +{"182532963|6664074": []} +{"182532963|3583771": []} +{"182532963|39936276": []} +{"182532963|21386749": []} +{"182532963|2521001": []} +{"182532963|121289": []} +{"8727665|6275330": ["Popular WSN platforms available for industrial and academic use [1,7].", "A major classification of WSN applications lies in tracking and environmental monitoring scenarios [7].", "4 further provides support for distributed addressing and use of tree topologies [1,7]."]} +{"8727665|1230643": ["Routing protocol needs to be simple by reducing computational complexity and power efficiency in order to help increase the network lifetime [1].", "Technological advancement in semiconductor design, material sciences and networking are driving the ubiquitous deployment of large scale wireless sensor and actuator networks [1].", "We mainly classify query-and-response based data dissemination into three categories: (1) directed diffusion; (2) distributed indexing and (3) multi-resolution methods [1,2].", "Popular WSN platforms available for industrial and academic use [1,7].", "Hence, a strict categorization for WSN deployment strategy is the structured and non-structured WSN [1].", "Significant research contributions have also made WSN communication more reliable for real time scenarios paving way for a well-established mix of software and hardware solutions in future applications [1].", "4 further provides support for distributed addressing and use of tree topologies [1,7]."]} +{"206260134|16214623": []} +{"206260134|7854020": ["However, like other network-based solutions, the TMIS systems and their various components such as WBANs (Zhang et al., 2016; Movassaghi et al., 2014; Otto et al., 2006; Dokovsky and Halteren, 2004; Rahim et al., 2012; Hughes et al., 2012; Fatehy and Kohno, 2013; Hur et al., 2013; Khan et al., 2014; Boulis et al., 2012; Ullah et al., 2012; Gao et al., 2014; Martelli et al., 2011; Kwak et al., 2010; Toorani, 2015; IEEE Standard, 2012; Somasundaram and Sivakumar, 2011; Tachtatzis et al., 2010; Ali and Khan, 2010) are vulnerable to several security attacks that can be conducted by internal or external attackers (Sampangi et al., 2012; Vallejos et al., 2012).", "However, like other network-based solutions, the TMIS systems and their various components such as WBANs (Zhang et al., 2016; Movassaghi et al., 2014; Otto et al., 2006; Dokovsky and Halteren, 2004; Rahim et al., 2012; Hughes et al., 2012; Fatehy and Kohno, 2013; Hur et al., 2013; Khan et al., 2014; Boulis et al., 2012; Ullah et al., 2012; Gao et al., 2014; Martelli et al., 2011; Kwak et al., 2010; Toorani, 2015; IEEE Standard, 2012; Somasundaram and Sivakumar, 2011; Tachtatzis et al., 2010; Ali and Khan, 2010) are vulnerable to several security attacks that can be conducted by internal or external attackers (Sampangi et al.", "\u20262012; Fatehy and Kohno, 2013; Hur et al., 2013; Khan et al., 2014; Boulis et al., 2012; Ullah et al., 2012; Gao et al., 2014; Martelli et al., 2011; Kwak et al., 2010; Toorani, 2015; IEEE Standard, 2012; Somasundaram and Sivakumar, 2011; Tachtatzis et al., 2010; Ali and Khan, 2010) are vulnerable\u2026"]} +{"206260134|15199849": ["\u2022 Reflection attacks: When a challenge-response authentication system is used as the same protocol in both directions by each side to authenticate the other side, a reflection attack will happen (Sharma and Bansal, 2011; Xing et al., 2010; Padmavathi and Shanmugapriya, 2009)."]} +{"206260134|1331167": ["Authentication phases in the scheme (Xu et al., 2014).\nwithout the need to exchange a secret key singly.", "In Xu et al. (2014) present an authentication scheme based on the ECC algorithm for TMIS system which contains the registration, login, authentication phase and password update steps.", "\u2026\u2713 \u2013 \u2013 \u2013 (Mishra et al., 2014b) \u2013 \u2713 \u2013 \u2013 (Awasthi and Srivastava, 2013) (Mishra et al., 2014a) \u2713 \u2713 \u2713 \u2013 (Jiang et al., 2014) (Moon et al., 2016) \u2713 \u2713 \u2013 \u2013 (Lu et al., 20152015b) (Pu et al., 2012) \u2713 \u2713 \u2713 \u2713 \u2013 (Srivastava et al., 2015) \u2013 \u2713 \u2013 \u2013 \u2013 (Tan, 2014) \u2713 \u2013 \u2013 \u2013 (Awasthi and Srivastava, 2013) (Wei et\u2026", "In (Islam and Khan, 2014), Islam and Khan propose a passwordbased authentication and key agreement scheme for TMIS which uses ECC to improve the Xu et al.\u2019s scheme (Xu et al., 2014).", "\u2026\u2013 \u2713 \u2013 \u2013 \u2013 (Das and Bruhadeshwar, 2013) \u2013 \u2713 \u2713 \u2013 (Lee and Liu, 2013) (Debiao et al., 2012) \u2013 \u2013 \u2013 \u2013 (Wu et al., 2012) (Giri et al., 2015) \u2013 \u2013 \u2713 \u2013 \u2013 (Guo and Chang, 2013) \u2713 \u2713 \u2713 \u2013 \u2013 (Hao et al., 2013) \u2013 \u2013 \u2013 \u2013 (Guo and Chang, 2013) (Islam and Khan, 2014) \u2013 \u2713 \u2713 \u2013 (Xu et al., 2014) (Jiang et al.,\u2026"]} +{"58015373|70330130": []} +{"58015373|5035162": []} +{"58015373|3456635": ["Detailed information can refer to our previous work (He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018).", "Refer to (He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018) for more detailed information about security-related data.", "In order to comprehensively introduce the security-related data, we worked out four review papers (He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018) that introduce the security-related data in four main types of networks, including the Internet, LTE, MANET and WSN.", "We propose the design requirements of security-related data collector in terms of both functionality and security based on our previous literature surveys about security-related data collection in main types of networks (Lin et al., 2018; He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018; Zhou et al., 2018; Li et al., 2018), i."]} +{"58015373|8364569": ["Security-related data are mainly involved in the work about attack and intrusion detection (Buczak and Guven, 2016; Bhuyan et al., 2014; Nguyen and Armitage, 2008; Garcia-Teodoro et al., 2009; Sperotto et al., 2010)."]} +{"58015373|13172512": []} +{"58015373|67867022": ["Detailed information can refer to our previous work (He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018).", "Refer to (He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018) for more detailed information about security-related data.", "In order to comprehensively introduce the security-related data, we worked out four review papers (He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018) that introduce the security-related data in four main types of networks, including the Internet, LTE, MANET and WSN.", "We propose the design requirements of security-related data collector in terms of both functionality and security based on our previous literature surveys about security-related data collection in main types of networks (Lin et al., 2018; He et al., 2018; Liu et al., 2018; Xie et al., accepted; Jing et al., 2018; Zhou et al., 2018; Li et al., 2018), i."]} +{"36303634|5660618": ["The proposed problem formulation also addresses the power control issue for wireless sensors which are usually expected to work for a long time without replacements of the onboard batteries (e.g., due to widespread sensors and a possibly dangerous environment [1]).", "With the integration of sensing, control, communication, and computation, a wide application spectrum of CPSs are found, such as smart grid, intelligent transportation, and environmental monitoring [1]."]} diff --git a/edge/graph_208883807.jsonl b/edge/graph_208883807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3781794379d29a7c97a5cd21a45f50d36a54bb12 --- /dev/null +++ b/edge/graph_208883807.jsonl @@ -0,0 +1,7 @@ +{"16025102|14148655": ["when they are involved in a conversational interaction with the system [6,18]."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"7847519|1805048": ["\u2026memory-based collaborative filtering (CF) approaches (Adomavicius and Tuzhilin 2005; Herlocker et al. 2004; Sarwar et al. 2001; Schafer et al. 2007; Su and Khoshgoftaar 2009): the user-based method uses ratings to associate a user with a group of like-minded users and then recommends to the target\u2026", "There are two common memory-based collaborative filtering (CF) approaches (Adomavicius and Tuzhilin 2005; Herlocker et al. 2004; Sarwar et al. 2001; Schafer et al. 2007; Su and Khoshgoftaar 2009): the user-based method uses ratings to associate a user with a group of like-minded users and then recommends to the target user a set of items that are enjoyed by her/his neighbors; and the item-based method aims to find items that are similar to those that a user has viewed/purchased before.", "Collaborative filtering techniques perform well when there is sufficient rating information (Su and Khoshgoftaar 2009)."]} +{"5971879|1805048": ["On the other hand, there is also a fair amount of work in the area of collaborative filtering for recommender systems [14, 30, 27] using various approaches including PMF [25] and its Bayesian variant [26].", "There are several memory based and model based approaches to collaborative filtering for recommender systems [27, 14, 25]."]} +{"20194824|1450024": ["In the natural language processing (NLP) area the task that identifies them is called \u201cterm extraction\u201d [3, 6, 4]."]} +{"3702229|1805048": ["CF is another well-known approach, which works well when there is sufficient rating information, and which explores relevant information to satisfy consumer needs [25].", "CF techniques perform well when there is sufficient rating information [25]."]} +{"1914653|8125630": ["3.2 Aggregation \nCapabilities One of the key characteristics of multidimensional databases is the ability to store measurements \n(such as sales numbers) in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "Moreover, this method \ncombines some of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "When con\u00adsidering multiple dimensions, we will \nfollow the multidimensional data model used for data warehousing and OLAP applications in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "\u2026his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "However, there are certain idiosyncrasies \npertaining to our model that make it different from the classical OLAP models used in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "This multidimensional approach is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions.", "Then, as shown in Figure 2, we \ncan compute an overall rating of how John Doe likes action movies as a genre by aggregating his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "\u2026is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions."]} diff --git a/edge/graph_208884146.jsonl b/edge/graph_208884146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d66133f0ecef33358fa6348cfa498c16407c9166 --- /dev/null +++ b/edge/graph_208884146.jsonl @@ -0,0 +1,4 @@ +{"205634488|13867280": ["Inspired by the abstraction of the natural evolution and selection of biological systems, GA (Kuo & Lin, 2013), DE (Das & Suganthan, 2011), Cultural Algorithm (Jin, 2001), Mimetic Algorithm (Smith, 2007), etc. were proposed."]} +{"11960289|1230643": ["Most applications of wireless sensor networks, ranging from military applications to civilian applications, require that the network can detect intrusions in the interested region [45]."]} +{"10094697|9316331": ["However, AlphaGo combines intuition (Go sense) with explicit knowledge (rules and chessboard) by the nonlinear mapping of deep learning and the jumping of Monte Carlo tree searching (Browne et al., 2012)."]} +{"69491051|3273340": []} diff --git a/edge/graph_208958197.jsonl b/edge/graph_208958197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1900a0c42a4af0f8a232e0efe4b36784e901a3ed --- /dev/null +++ b/edge/graph_208958197.jsonl @@ -0,0 +1,44 @@ +{"58952184|16335158": []} +{"9605953|1230643": ["\u2026monitors, senses and gathers various kinds of environment or supervised objects information through the cooperation of micro sensors, and then processes the information take advantage of the embedded system, finally, it sends the sensed information to the terminal user as the multi-hop relay mode."]} +{"164622012|54439535": ["A particularly important aspect of such a demonstrator is video surveillance and human behavior analysis in a scene [7,20,32]."]} +{"158623414|52076848": []} +{"158623414|64643926": []} +{"69233915|6664074": []} +{"69233915|9495329": []} +{"69233915|3348390": []} +{"5728560|9040432": []} +{"5728560|5860048": []} +{"67264312|1599458": ["Finally, we cite the survey \u201c Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services \u201d [15], which presented the current IoT technologies, approaches, and models to \ufb01 nd out new data-related challenges."]} +{"67264312|16153186": ["In [152], the authors survey access control models in WSNs.", "Hence, other network entities, with limited authorizations, become unable to know the actual users \u2019 ID [152].", "11, we classify research activities in access control systems in a two-dimensional diagram as described in [152]."]} +{"67264312|3348390": ["In \u201c Context Aware Computing for The Internet of Things: A Survey \u201d [10], the authors proposed a context awareness for the IoT framework and gave a deep provided an in-depth analysis of the context life cycle (techniques, methods, models, functionalities, systems, applications, and middleware\u2026", "In recent years, many surveys were published to emphasize the advancement of research activities in the IoT framework [1,6 \u2013 10]."]} +{"67264312|14745481": ["In [91], Cho et al. surveyed trust management systems for Mobile Ad Hoc Networks.", "Cho et al. [91] detailed the concept of trust in many disciplines such as sociology, economics, philosophy, psychology, organizational management, autonomic computing, and communications and networking."]} +{"67264312|2906926": []} +{"67264312|9554464": ["Regarding aggregation of data collected by sensors, an important work can be found in [88], where Sang et al. proposed a method for securing data aggregation to extend the network lifetime, guaranteeing reliable data collection from sensors, and addressing a solution for node failure and healing."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"19172129|10329355": []} +{"32550635|15545863": []} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"115674943|1520906": []} +{"115674943|44461432": []} +{"115674943|21386749": []} +{"115674943|7329149": []} +{"115674943|3348390": []} +{"53243273|5385031": ["\u2026for IoT applications is developed for particular segments of the IoT architecture and focuses either on rather speci\ufb01c service con\ufb01gurations or on generic representation of functionalities, which does not support true end-to-end business models (e.g. Luong et al ., 2016; Mathur et al ., 2015).", "The commonly used economic and pricing strategies in developing IoT systems can be categorized into three groups, based on how to set the price: economic concepts-based pricing, game-theoretic and auction-based pricing, and optimization-based pricing (Luong et al ., 2016).", "The game-theoretic and auction-based pricing are based on formal study of decision-making where several players, such as buyers of sensing data, sellers, or service providers, must make choices that potentially affect the interests of other players (Luong et al ., 2016)."]} +{"53243273|627405": ["The data collection and analysis process of this article follows the principles for systematic literature review (e.g. Brereton et al. , 2007) applied to the IoT space."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"11000825|1230643": ["[14] points out that power consumption of wireless sensor network devices could be divided into three domains: sensing, communication, and data processing."]} +{"3305940|303976": ["For an indepth survey on WBANs, we refer the reader to [27] and [28]; whereas [29] presents a survey on WBANs with special interest in eHealth."]} +{"3305940|7988320": ["For an indepth survey on WBANs, we refer the reader to [27] and [28]; whereas [29] presents a survey on WBANs with special interest in eHealth."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"2871699|25929315": ["M2M applications might require very high priority with a detailed level of granularity due to the transmission of critical information, whereas priority for Human-based applications is mainly among applications for each user and not between different users [17].", "[17] mention that M2M and Human-based traf\ufb01c differ further in traf\ufb01c direction, since M2M traf\ufb01c direction will be mainly uplink, while Human-based traf\ufb01c is either balanced or mainly downlink.", "Finally, M2M will have higher number of devices and may be required to operate for years or decades without maintenance, but users can recharge/replace batteries [17].", "Small and infrequent data transmissions will be more common in M2M [17,21], and thus the knowledge developed for Human-based traf\ufb01c, which is mostly bursty (web browsing), bulky (\ufb01le transfer), or constant or variable bit rate streams (VoIP or video) can be dif\ufb01cult to apply directly to M2M.", "Other M2M communications\u2019 surveys focus mainly in home networks [16], 3GPP Long-Term Evolution (LTE) networks [17], service platforms [18], or data mining techniques [19].", "M2M applications will be duty-cycled and should have very short connection delay to guarantee fast access to the network when waken up, while Human-based applications tolerate longer connection delays but are very demanding once connections are established [17]."]} +{"12137338|14650419": []} diff --git a/edge/graph_208979790.jsonl b/edge/graph_208979790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d3e6587e92314d45e5ec6c15e038ec9bd1c383fb --- /dev/null +++ b/edge/graph_208979790.jsonl @@ -0,0 +1,13 @@ +{"139359866|2087828": []} +{"139359866|205699047": []} +{"3565206|5688620": []} +{"1138827|2087828": ["Among all these mentioned operation types, a textile based piezoresistive [19], [20], the tactile sensor has its advantages in terms of high sensitivity, fast response, high repeatability, easy integration, good stability and low power consumption."]} +{"8319457|2087828": []} +{"206493102|208979790": []} +{"91186094|208979790": []} +{"139771509|205699047": []} +{"139209300|2087828": []} +{"139165048|10921965": ["Graphene is a two-dimensional (2D) sheet composed of sp(2)bonded single-layer carbon atoms with the honeycomb lattice structure and unique structural features [39, 55, 56]."]} +{"54484396|2087828": []} +{"5040497|7306130": ["When a human finger gets close to one of these intersections, capacitance between the two electrodes is reduced as the electric field between them is disturbed by the finger, which can be detected as a touch down event [57, 13].", "A detailed comparison is available in [13]."]} +{"11790959|42279552": ["Moreover, CNTs have excellent elastic properties with tensile strength of up to 40% [59], enabling the CNTs to move and stretch with the elongation of Ecoflex."]} diff --git a/edge/graph_20905429.jsonl b/edge/graph_20905429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c33d5202e2895757bfd8c8d2b1dc558d2a102d5 --- /dev/null +++ b/edge/graph_20905429.jsonl @@ -0,0 +1,2 @@ +{"1447047|10290908": ["A second TelosB mote interfaced with a gateway module, which in this experiment is a laptop (Thinkpad X21, IBM, Armonk, NY, USA) running a modified version of Emstar [19] to emulate a Stargate Gateway (Crossbow Technology, Inc.), wirelessly re-\nceives and forwards sensor readings over the network (Ethernet).", "The type of mote used in this paper is the TelosB mote produced by Crossbow Technology, Inc. (San Jose, CA, USA) and Moteiv (El Cerrito, CA, USA).", "\u2026mote interfaced with a gateway module, which in this experiment is a laptop (Thinkpad X21, IBM, Armonk, NY, USA) running a modified version of Emstar [19] to emulate a Stargate Gateway (Crossbow Technology, Inc.), wirelessly re-\nceives and forwards sensor readings over the network (Ethernet)."]} +{"3080437|18440098": ["The reader is referred to [89], [90] for a detailed description of methods for data clas-", "ferred to [89] and [90] for a detailed comparison."]} diff --git a/edge/graph_209057605.jsonl b/edge/graph_209057605.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d962ac6e367197037462d2dd7f3ae1358720bd52 --- /dev/null +++ b/edge/graph_209057605.jsonl @@ -0,0 +1,2 @@ +{"69227319|1216662": []} +{"56285585|35697345": ["Similarly, reviews have been undertaken relating to hybrid manufacturing processes [4], [5]; however, these do not go into detail about specific configurations, themes and challenges in HASPs."]} diff --git a/edge/graph_209059197.jsonl b/edge/graph_209059197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209075838.jsonl b/edge/graph_209075838.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ea8266fe3b9424d8407013510cad9032cf379cd --- /dev/null +++ b/edge/graph_209075838.jsonl @@ -0,0 +1 @@ +{"4719202|1289787": []} diff --git a/edge/graph_2090796.jsonl b/edge/graph_2090796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209092329.jsonl b/edge/graph_209092329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..807367a810385b434e3156ad2e7eb121e97ea206 --- /dev/null +++ b/edge/graph_209092329.jsonl @@ -0,0 +1,3 @@ +{"108456349|6327434": []} +{"111306724|33286487": []} +{"197512484|18454590": []} diff --git a/edge/graph_209094447.jsonl b/edge/graph_209094447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..734de7f6fa50ce57ff9fed1187d96db47bd2fe30 --- /dev/null +++ b/edge/graph_209094447.jsonl @@ -0,0 +1,6 @@ +{"206767722|8601873": ["[89], [90], [91], but adapted to our weakly supervised scenario using a formulation (given by Equation (5)) similar to multiple instance learning [92], [93], [94]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"52014912|468992": ["swarms [2], we emphasize swarms of aerial robots flying in a 3-D world."]} +{"52014912|1708582": ["\u2026approaches are pervasive in both the machine learning and con-trol \ufb01elds for dealing with complexity and high dimensionality (e.g., hierarchical task networks [11], hierarchical tree or lattice networks employed in sequential game theory [12], and singular perturbation theory [13], [14])."]} +{"116992795|206051485": []} diff --git a/edge/graph_209095507.jsonl b/edge/graph_209095507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..643fe068346e46fedab3e7b1656d8b6f3ef707a5 --- /dev/null +++ b/edge/graph_209095507.jsonl @@ -0,0 +1 @@ +{"128100081|2937482": ["Therefore, we must adopt a crystal synchronization approach [40]."]} diff --git a/edge/graph_209098969.jsonl b/edge/graph_209098969.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b978419ca4124dd16a362c390697fdf2347658db --- /dev/null +++ b/edge/graph_209098969.jsonl @@ -0,0 +1,19 @@ +{"20960541|9072047": []} +{"205431608|9072047": ["\u2026and Sugeno (1985), provide an effective way of representing nonlinear systems with the aid of fuzzy sets, fuzzy rules and a set of local linear models which are smoothly connected by fuzzy\nCONTACT Damiano Rotondo damiano.rotondo@yahoo.it; damiano.rotondo@upc.edu\nmembership functions (Feng, 2006)."]} +{"12186694|8363289": ["THE MODEL predictive control (MPC) scheme [12] has been widely adopted in industry as an effective method to deal with multivariable constrained control problems."]} +{"122645834|9072047": []} +{"4073444|9072047": ["INTRODUCTION L INEAR matrix inequality (LMI) techniques, introduced by [1] in the fuzzy community, have become the tool of choice [2], [3] in order to design controllers for Takagi\u2013 Sugeno (T\u2013S) models [4].", "There are many other situations (see [1]\u2013[3], [14], and [15] and the references therein for details) giving rise to different Qij , contemplating H2 , H\u221e, etc."]} +{"122689064|4796356": []} +{"67867574|17436003": []} +{"145970326|12083425": []} +{"586623|8363289": ["Mayne, Rawlings, Rao, and Scokaert 2000 ; Qin and Badgwell 2003 ).", "Thus, the system (1) is asymptotically stabilised by the control law (16) (Mayne et al. 2000; Rawlings and Mayne 2009).", "Furthermore, x \u00bc 0 is asymptotically stable due to the continuity of the optimal value functional J 0 k in x at 0 (see also Mayne et al. (2000) and Rawlings and Mayne (2009))."]} +{"46887708|18078738": []} +{"2333805|1123458": ["Historical surveys of the S-procedure can be found in [49] and [50]."]} +{"26929793|9072047": ["In order to overcome the drawback of the quadratic Lyapunov function, various kinds of Lyapunov functions have been designed (see [13] and the references therein)."]} +{"46024811|8363289": []} +{"115451371|17436003": []} +{"59523948|9072047": ["Some overviews are available in Feng (2006); Sala (2009); Lendek et al. (2010)."]} +{"43923265|8363289": []} +{"6239325|4796356": []} +{"53654390|18078738": ["Equations (19)-(20) guarantee that, at each instant of time, the true state of the LPV system described by (1)-(2) will lie inside the region defined by the lower and upper estimates.", "if \u23aa\u23a8\u23aa\u23a9 \u03b5(1) \u2265 0 AND ?\u0304?(1) \u2265 0 \u03b5(2) < 0 OR ?\u0304?(2) < 0 \u03b5(3) \u2265 0 AND ?\u0304?(3) \u2265 0 then \u201cfault in elevator\u201d", "if \u23aa\u23a8\u23aa\u23a9 \u03b5(1) \u2265 0 AND ?\u0304?(1) \u2265 0 \u03b5(2) \u2265 0 AND ?\u0304?(2) \u2265 0 \u03b5(3) \u2265 0 AND ?\u0304?(3) \u2265 0 then \u201cno faults/no icing\u201d", "This is necessarily true since, from (2), it follows that:", "On the other hand, from (2), it follows that xR = R(\u03b8)(y \u2212 v), which, taking into account that \u2212|R(\u03b8)|V \u2264 v \u2264 |R(\u03b8)|V, leads to xR \u2208 [ x\u223cR, x\u0303R ] ,", "Let us consider the dynamics of the interval estimation errors e = R (\u03b8) (x \u2212 x) = xR \u2212 xR and e = R (\u03b8) (x \u2212 x) = xR \u2212 xR, which taking into account (1)-(2) and (13)-(18) become", "if \u23aa\u23a8\u23aa\u23a9 \u03b5(1) < 0 OR ?\u0304?(1) < 0 \u03b5(2) \u2265 0 AND ?\u0304?(2) \u2265 0 \u03b5(3) \u2265 0 AND ?\u0304?(3) \u2265 0 then \u201cfault in thrust\u201d", "49 Assuming that the UAV is equipped with measurement devices such as pitot tubes, GPS, and inertial sensors49 and estimators,50 all state variables are supposed to be available, and hence, the output equation reads as (2)."]} +{"205422420|18078738": []} diff --git a/edge/graph_209103872.jsonl b/edge/graph_209103872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20913215.jsonl b/edge/graph_20913215.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2288ac522e57c409295a39b450a7ffe71d533e50 --- /dev/null +++ b/edge/graph_20913215.jsonl @@ -0,0 +1,52 @@ +{"678506|14970359": []} +{"678506|7788290": ["The many approaches that have been developed for the analysis of human motion can be classified into two categories: model-based [4] and appearance-based [20]. See [1, 8 ,15] for reviews."]} +{"20767602|206764452": []} +{"13251604|38476": ["In the sequential supervised learning problem [23], our task is to construct a hypothesis (or classifier) h from a training set that contains a set of labeled sequences."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"31245217|10355303": ["First, the prediction of the states of the human targets is improved by considering the dynamics of the targets and the interactions between them via an interaction model [5].", "Most multiple human tracking approaches fall into one of three categories: achieving a more accurate dynamic model for prediction such as using an interaction model when predicting the position and velocity of a target [4], [5]; generating more stable recursive mathematical models such as unscented Kalman filters and MCMC particle filters [6]; and searching for more accurate measurement models [7], [8], for example, the trackinglearning-detection (TLD) [9] approach."]} +{"9073685|7185733": ["[3] surveyed problems and issues in visual hands gestures."]} +{"62451656|7788290": ["A survey of literature in human motion analysis can be found in [8]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"9194043|7788290": ["A survey of work in human motion analysis can be found in [48]."]} +{"10177103|8446711": []} +{"10177103|819377": ["On the other hand, some classic segmentation algorithms continue being widely applied, as the ones derived from Gaussian mixture models (Grimson & Stauffer, 1999; Zivkovic, 2004; Baf et al., 2008a), fuzzy models (Zhang & Xu, 2006; Baf et al., 2008b) or a combination of both (Baf et al., 2008c). Furthermore, other approximations can be interesting, such as the multi-layer background subtraction based on color and texture suggested by Odobez & Yao (2007). In any case, background subtraction techniques have successfully evolved and are robust enough to be applied in the proposed system.", "Gaussian mixture model by Zivkovic (2004), fuzzy model by Zhang & Xu (2006), fuzzy mixture of Gaussian by Baf et al. (2008c) and multi-layer background subtraction based on color and texture by Odobez & Yao (2007).", "Gaussian mixture model by Zivkovic (2004), fuzzy model by Zhang & Xu (2006), fuzzy mixture of Gaussian by Baf et al. (2008c) and multi-layer background subtraction based on color and texture by Odobez & Yao (2007). BGS library (Sobral, 2013) is used to implement the algorithms previously enumerated. This library contains open versions of the different background subtraction methods which are employed in this paper. Their parameters are adjusted by ROC computation on a training subset with the aim of maximizing detection rate and keeping a low false alarm rate. Table 1 presents a quantitative evaluation of every method, which includes their processing capacity in fps and the background subtraction metrics described in Izadi & Saeedi (2008): DR (Detection Rate), Spec (Specificity) and FAR (False Alarm Rate).", "Gaussian mixture model by Zivkovic (2004), fuzzy model by Zhang & Xu (2006), fuzzy mixture of Gaussian by Baf et al. (2008c) and multi-layer background subtraction based on color and texture by Odobez & Yao (2007). BGS library (Sobral, 2013) is used to implement the algorithms previously enumerated."]} +{"10177103|17516538": [", 2008), semantic-based video retrieval (Hu et al., 2004) or multi-camera behavioral analysis (Micheloni et al.", "As deduced from the theoretical explanations given in previous sections, the successful performance of our method for people tracking is due to the usage of an association based on Kalman filtering and a LSAP optimization combined with an occlusion management that uses visual appearance based on features such as GCH, LBP and HOG. Other recent state-of-the art approaches such as Zhang et al. (2015) are only based on trajectories without using any kind of visual appearance information and, in consequence, they obtain worse results for tracking, as corroborated in Table 4."]} +{"8426914|206764452": ["R ECENTLY, an emerging application of video analysis for Intelligent Transportation Systems (ITS) is the use of the mobile vision, since autonomous machines such as vehicles, robots, and drones, are newly developed for different applications [1]\u2013[3].", "In general, human detection follows two basic steps [3]: foreground segmentation and object classification."]} +{"774537|1902238": []} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"823678|7788290": ["Tracking people, which raises many challenges due to the presence of large 3D, nonrigid motion, was extensively analyzed in [36], [1], [ 30 ], [73]."]} +{"1909263|17516538": ["Human action recognition has been a widely studied topic (for extensive reviews see [12,8])."]} +{"10331786|1634674": ["Human action recognition has become and will continue to be a a highly active research area of research due to its wide applications in video surveillance, human-computer interface, sports video analysis, and content based video retrieval [7,8,5,9,10,11,12,13]."]} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"2958085|8575576": ["Most biomedical images used for clinical treatment of patients\u2014magnetic resonance imaging (MRI) [116, 117], radiographic imaging [118, 119], positron emission tomography (PET) [120] and histopathology imaging [121]\u2014have been used as input data for deep learning algorithms."]} +{"12299303|14970359": ["A short summary of di\ufb00erent approaches with evaluation and error metrics employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [8] and [19]."]} +{"12299303|7788290": ["A short summary of different approaches with evaluation and error metrics employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [ 8 ] and [19]."]} +{"691081|192934": []} +{"17082499|14970359": []} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"20066392|17516538": ["Human activity recognition has received much attention from the computer vision community [4,5] since it leads to several important applications such as video surveillance"]} +{"20066392|7788290": []} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"16626410|1634674": ["Action Recognition in video is one of the most promising applications of computer vision."]} +{"12903970|1634674": ["A 2008 literature review [20] provides a"]} +{"12903970|38476": []} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"15324087|1634674": ["Human action recognition ( Aggarwal and Ryoo, 2011; Turaga et al., 2008 ) has become an important area in computer vision research , whose aim is to automatically classify the action ongoing in a temporally segmented video."]} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} diff --git a/edge/graph_209149172.jsonl b/edge/graph_209149172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01e4c0237429ebe433f60ac746e0bf46ddb0c061 --- /dev/null +++ b/edge/graph_209149172.jsonl @@ -0,0 +1,9 @@ +{"4418654|2088679": []} +{"195811894|53164212": []} +{"195811894|52305483": []} +{"195811894|2088679": []} +{"195811894|3761015": []} +{"2088679|393948": []} +{"202783084|2088679": ["Deep learning (DL) established the state of the art in many areas of computer vision and pattern recognition, including medical image analysis [1]\u2014it discovers the underlying data representation."]} +{"53106004|15273230": []} +{"1033682|174797842": []} diff --git a/edge/graph_209165818.jsonl b/edge/graph_209165818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8573521ffabf0c530b9cdc0eaab68726eb1211a3 --- /dev/null +++ b/edge/graph_209165818.jsonl @@ -0,0 +1,8 @@ +{"33226595|205007974": ["2621062 elasticity have been proposed [12] of which most are comprised", "These approaches can be used to dynamically adapt to human-safety or energy efficiency requirements in variable stiffness actuators [12]\u2013[14]."]} +{"53016579|205007974": ["W ITH the increasing demand for wearable and rehabilitation robotics, variable impedance actuators (VIAs) have received accumulating attention because they can improve the dynamic performance, enhance the safety between the user and the robot, as well as increase the energy storage ability [1]\u2013[9]."]} +{"9571519|205007974": ["CVTs have mainly been used to control the stiffness of springs in series with the motor [16, 17]."]} +{"46998766|205007974": ["Motivated by these promising examples, various concepts for actuators with xed or variable elasticity have been proposed in recent years [28].", "The actuator presented in this work can therefore also be considered as one of the rst Variable Sti ness Actuators (VSAs) [28]."]} +{"64612757|205007974": ["A further advancement in the development of compliant actuators are VSAs (Variable Stiffness Actuators) and VDAs (Variable Damping Actuators) (for an overview see Vanderborght et al. 2013)."]} +{"46765316|205007974": ["Hence, the second actuator of VIA is not designed to be employed as a power generator.", "In the future, we will compare this actuator with other VIAs regarding performance, efficiency and robustness against perturbations.", "Therefore, VIAs can reduce the required power, but not the torque [8,17].", "VIAs are usually constructed by adding another EM (e.g., a direct drive servo motor) to the actuator design to control spring stiffness (e.g., via changing the lever arm or preloading of the spring) [16].", "We need an actuator which can overcome these disadvantages of VIAs.", "Although VIAs are rapidly developing with a wide range of different actuators, there is no \u201cwinning\u201d design, but rather application-dependent optimal solutions [15].", "The desired and controlled mass positions at both frequencies depict high precision of control with EPA although, it has relatively low impedance compared to EM and even other VIAs.", "However, the controller and the mechanical design are necessarily much more complex [15,16] than EM and SEA.", "Keywords: hybrid actuator; variable impedance actuator (VIA); pneumatic artificial muscle (PAM); electric motors; legged locomotion", "As shown in this paper, using PAM instead of springs in a SEA configuration allows us to adjust the compliance as in VIAs.", "Hence, PAMs can be considered as the adjustable stiffness (like a preloaded spring [15]) beside EM to develop a new variable impedance actuator.", "Furthermore, in such designs, the second actuator of VIA usually has low power and low bandwidth in order to permit spring stiffness adjustment.", "To overcome this limitation of SEAs, stiffness adjustment was introduced in variable impedance actuators (VIA) [15].", "Based on the simulation results in Section 3.2, for a repetitive motion in a certain time, the PAM in EPA is able to supply optimal compliance for producing desired periodic movements with low energy and simple design (in comparison to other VIAs [22])."]} +{"18383229|10739218": ["They are classified into two catagories: structure identification and parameter identification.(13) The structure identification includes partitioning its input space, selecting antecedent and consequent variables, 132 HU AND GU"]} +{"18383229|1708582": ["Both GA-based and RL-based learning are two equivalent learning schemes that need a scalar response from the real world by interacting with it to show their performance.(23,32) Such a response can be a scalar value that is easier to collect than the desired input and output data pairs in robot applications."]} diff --git a/edge/graph_209202519.jsonl b/edge/graph_209202519.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0188049b10b7b70bf24089e832cddbe86e6dc4b --- /dev/null +++ b/edge/graph_209202519.jsonl @@ -0,0 +1,11 @@ +{"21725595|1229096": ["Recently, robustness in deep learning has been actively studied (Fawzi et al., 2017) as deep neural networks are being applied to diverse tasks involving real-world applications such as autonomous driving (Paden et al., 2016) Laine & Aila (2017)."]} +{"17187125|3330313": ["Similarly to outlier detection [48, 49] and anomaly detection [50], one can e.g. simply use methods based on ad hoc measures of anomaly and remove instances that are above a given threshold [51]."]} +{"35426171|5538934": ["Due to their increased use in security-critical settings such as malware detection, there has been an explosion of work on the security of machine learning systems; see Barreno et al. (2010), Biggio et al. (2014a), Papernot et al. (2016b), and Gardiner and Nagaraja (2016) for some recent surveys."]} +{"12457267|12027976": ["The same effect has been documented for exchange rates, see, e.g., Guillaume et al. (1997) and Muthuswamy et al. (2001)."]} +{"60440658|2088679": ["For example, vision applications in medical image analysis [2] require annotations from clinical experts, which incur high costs and often suffer from high inter-reader variability [3, 4, 5, 6]."]} +{"8606632|13407903": ["As a secondary metric, we compare AIR\u2019s performance with the baselines in terms of Mean Average Precision (mAP ) (Li et al., 2015) which does not depend on the top rankings, but on the full rankings for each image."]} +{"6054025|3241708": ["In addition, since collecting reliable labels is a time consuming and costly task, there is an increasing interest in using cheap, easy-to-get labels from nonexpert using frameworks like e.g. the Amazon Mechanical Turk 1 [49]\u2013[52]."]} +{"6054025|191396": ["First, a clustering of the instances [258] is performed using an unsupervised algorithm."]} +{"6054025|3330313": ["Similar to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38], several methods in label noise cleansing are based on ad hoc measures.", "Dealing with label noise is closely related to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38]."]} +{"67856781|11608263": ["Learning with partial labels on large-scale datasets presents novel challenges because existing methods [52, 58, 56, 59] are not scalable and cannot be used to fine-tune a ConvNet.", "A second solution is Binary Relevance (BR) [52], which treats each label as an independent binary classification."]} +{"423350|1676762": []} diff --git a/edge/graph_209202582.jsonl b/edge/graph_209202582.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1159d662ebd9f9f8b0c9b844c36499dd42691e46 --- /dev/null +++ b/edge/graph_209202582.jsonl @@ -0,0 +1,20 @@ +{"51716703|1734833": ["Alarm is a subtask mainly used in anomalies detection, raising an alarm as soon as an anomaly is detected [11]; (2.", "For example, sleep issues such as apnea, can be analyzed through saved data from the patient: a home sleep monitoring allows to monitor sleep in a familiar environment resulting in reliable data acquisition [11,84].", "1) Prediction\u2014consists in the identification of events that have not occurred yet, providing medical information to help in the prevention of further chronic problems, and sometimes, can support a diagnosis decision [11]; (2.", "unobtrusiveness; privacy and ethical issues as already covered; legislation within and between states or countries; interoperability; end-user training to use WHDs; and social inclusion preventing users isolation, which can lead to a decrease of interaction with caregivers and physicians [11,15].", "Alarm is a subtask mainly used in anomalies detection, raising an alarm as soon as an anomaly is detected [11];", "Nowadays technology and wearable scenarios let us to classify WHDs according to three aspects (Figure 1): scenario of use (home/remote or clinical environment); the type of monitoring (offline or online); and the type of user (healthy or patient) [11].", "3) Diagnosis Support\u2014is one of the most important tasks of clinical monitoring, resulting in a clinical decision according to retrieved knowledge of vital signs, health records and anomaly detection data [11]."]} +{"51716703|30383344": ["Another example is the use of these devices in the health status monitoring of firefighters and combatants in field using mobile technologies, such as GPRS [81,84].", "This system can also be helpful to label the timing of important events using external devices [5,10,81,84].", "Monitoring that enables to visualize live data [81,82].", "For example, if an elderly person is subjected to an excessive cold or hot weather that can cause lung infection, dehydration or other diseases, an appropriate action might be taken to prevent a dangerous situation [15,81].", "The vital signs can also be recorded in Medical Information Systems to be later analyzed by a medical professionals [81,88].", "electronic; (C) Data Analysis, an offline method to see the recorded data; (D) and Real Time Monitoring that enables to visualize live data [81,82].", "Mobile telecommunications technologies can also be used to transmit real-time data using GPRS, a standard mobile data service in the global mobile communication.", "With LOBIN it was possible to monitor patient health status in real-time easily using a graphical user interface, which allowed the monitoring of several patients at the same time in the same screen, independently of the patient location [81]."]} +{"51716703|20905429": ["This system can also be helpful to label the timing of important events using external devices [5,10,81,84].", "If each node from the connecting network has a sensor or medical device with a sensing unit, containing more than just the sensor, we should refer it as a BSN rather than a BAN [10,12].", "The interconnection of these sensors creates a network of sensors (BAN), which are sent to a processing unit like a portable unit.", "With new advances in new materials, electronics and telecommunication information technology, together with the entry of big multinational companies, such as Google, but also of small startups, WHDs are expected to overcome their challenges and enter in the consumer market with a higher impact in the following years [10,15,55].", "These advantages culminate in an optimization of the resources usage [10].", "On the other hand, some other publications are strongly focused on the WHDs architecture and technical aspects of it, such as in [10].", "In the image, the terminology BAN is used because it is related only with the sensors placed around the human body.", "The term Body Area Network (BAN) can be sometimes confused with two other terminologies: Body Sensor Network (BSN) and Wireless Sensor Network (WSN).", "With WHDs it is possible to perform clinical monitoring outside a medical environment, alerting the patient in case of any physiological problem or just to monitor himself and be updated of his vital signs during daily activities [10]."]} +{"12318240|7988320": []} +{"115684784|49574823": ["Blockchain can be considered to be still under development in many aspects [52,114], but some of its applications for \ufb01elds where trust is a necessity to interact with third-parties have been already studied [115\u2013119].", "Due to the expected impact of blockchain and smart contracts on future IoT devices [52,54], Figure 3 shows a speci\ufb01c blockchain module associated to the storage subsystem.", "Although it is not essential for the basic functioning of a smart clothing system, it enables different useful features like redundancy, data security and trustworthiness [52].", "\u2022 A communications gateway that exchanges information with the smart garments in order to send it through the Internet or an internal LAN to remote services provided, for instance, by cloud servers or a blockchain [52]."]} +{"115684784|44147498": ["Similarly, Radio-Frequency IDentification (RFID) and Near Field Communication (NFC) tags attached to objects can be read from a certain distance through a reader embedded into a smart garment [73]."]} +{"115684784|46973566": []} +{"115684784|49472839": ["The sensor subsystem may be composed by several types of sensors that can monitor diverse phenomena or events from the surrounding environment [35,51,59,60]."]} +{"115684784|4625011": ["\u2026IoT and wearables, when coupled with advances in 5G communication networks for device-to-device communications [16], virtual/augmented reality [17,18], cyber-physical systems [19], Arti\ufb01cial Intelligence (AI) [20] and smart textiles [21], can bring human-to-human and human-to-machine\u2026"]} +{"115684784|3579945": ["The Internet of Things (IoT) is already unlocking the bene\ufb01ts of the data economy in numerous industries like healthcare [5], agriculture [6], manufacturing [7], home automation [8\u201310], transportation [11], energy [12,13], emergency management or defense and public safety [14,15]."]} +{"115684784|18303304": ["The sensor subsystem may be composed by several types of sensors that can monitor diverse phenomena or events from the surrounding environment [35,51,59,60]."]} +{"115684784|13991708": ["The Internet of Things (IoT) is already unlocking the bene\ufb01ts of the data economy in numerous industries like healthcare [5], agriculture [6], manufacturing [7], home automation [8\u201310], transportation [11], energy [12,13], emergency management or defense and public safety [14,15]."]} +{"115684784|30383344": ["It is also important to note that most architectures divide the previously mentioned components into three layers [55]: \u2022 Body Area Network (BAN)."]} +{"115684784|469744": ["\u2026was actually not developed until the early 1990s: \ufb01rst empirically by Caudell and Mizell [30], from Boeing, who presented a head-up see-through display used to augment the visual \ufb01eld of an operator with information related to the task she/he was carrying out, and then theoretically by Azuma [31]."]} +{"115684784|3494096": []} +{"115684784|206583375": ["There are other technologies that enable positioning a smart garment, like traditional cameras, infrared systems [101], ultrasounds [102], UWB [103] or inertial navigation systems [104]."]} +{"205468889|19938676": []} +{"35162366|3649936": ["In parallel to the methods studied to improve performance, an important topic related to wireless communications at large is the radio frequency (RF) exposure of humans [3].", "The power density generated by the BS can be written as [3, (4)] where E ( \u03b8, \u03c6, t ) is the electric \ufb01eld, Z 0 = 120 \u03c0 the free space impedance, P TX the maximum BS transmit power, and r the distance from the BS."]} +{"36573773|3649936": ["It has been suggested in [9] that the gains of base station (BS) coordination could be utilized to minimize EM emission in multicell systems."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} diff --git a/edge/graph_209202777.jsonl b/edge/graph_209202777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5b0fb7634b2cf1ec042e69d5a839d16e3d35ffb --- /dev/null +++ b/edge/graph_209202777.jsonl @@ -0,0 +1,2 @@ +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"85546462|4795312": ["N U An important practical advantage of neural networks over iterative methods is that the trained models can produce an output extremely fast as they only involve a single step of matrix multiplications to produce the feed forward output (McCann et al., 2017).", "Recently, deep neural networks have emerged as an alternative to iterative methods for solving inverse problems (Fan et al., 2017; Jin et al., 2017; McCann et al., 2017; Shen et al., 2017), and have shown impressive results in applications such as denoising (Burger et al., 2012), deconvolution (Xu\u2026", "The use of neural networks for the solution of inverse problems is motivated by the fact that neural networks are capable of approximating any continuous function under the assumption that the network has enough free parameters (Hornik, 1991; McCann et al., 2017; Shen et al., 2017)."]} diff --git a/edge/graph_209202834.jsonl b/edge/graph_209202834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb9306becbd88d3c1659134c0b2b18658fe400ed --- /dev/null +++ b/edge/graph_209202834.jsonl @@ -0,0 +1,389 @@ +{"88500649|49527603": ["The core contribution of the blockchain is the maintenance of a distributed, authenticated, and synchronized ledger of transactions for all participants [13]."]} +{"88500649|925507": ["With the development and popularity of cryptocurrency, blockchain has received substantial attention, and schemes adopting the blockchain concept have been proposed in many research fields [26]."]} +{"206456796|27262729": ["This consensus mechanism guarantees the security and dependability of blockchain systems [4], [5].", "The core point to guarantee transaction integrity and validity in blockchain is a computational process defined as mining [4], [5]."]} +{"201833833|88491427": ["The blockchain itself has taken on a life of its own and permeated a broad range of applications across many industries, including finance, healthcare, government, manufacturing, and distribution [7]."]} +{"201833833|59314746": ["The blockchain is poised to innovate and transform a wide range of applications, including goods transfer (supply chain), digital media transfer (sale of art), remote services delivery (travel and tourism), platforms for example, moving computing to data sources and distributed credentialing [8]."]} +{"201833833|49527603": ["Scalability is a huge concern for blockchain based platforms [9].", "Although the block intervals depends on various parameter settings, a Bitcoin block is generated in every 10 minutes while an Ethereum block is generated about every 17 seconds [9]."]} +{"201833833|56895323": ["block to the existing chain by providing the sufficient proof of its effort [48]."]} +{"201833833|13688847": ["puzzle with adjusted difficulty to obtain the opportunity of appending the new block to the current chain [49]."]} +{"31187650|3330461": ["Device-to-Device (D2D) communications refer to a type of technology that enables devices to communicate directly with each other without the involvement of fixed networking infrastructures such as Access Points (APs), Base Stations (BSs), Bluetooth and WiFi-Direct [1]."]} +{"171096642|51935081": ["Since forming blockchain requires a mining task, that is, proof-of-work (PoW), which demands both heavy computation resources and energy, it is hard to widely facilitate blockchain in a wireless network [5]."]} +{"57189925|206578224": ["Also these technologies will allow for orchestration and aggregation and enable the integration of generic services into individualised services [15]."]} +{"49351321|17336376": ["Other related works include a software-defined cellular network architecture [18], Wi-Fi networks virtualization [20], wireless sensor network virtualization [21], WiMAX network virtualization [22], LTE network virtualization [19], wireless personal area network virtualization [23], cloud computing based cognitive radio networks [3], and wireless virtualization in HetNet [11]."]} +{"49351321|7800459": [", virtual memory [6], virtual storage access network [7], wired networks [8]) and recently in cloud 2018 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium"]} +{"201873499|53046901": []} +{"201873499|36250251": ["For a more discussion on possible attacks in crowd-sourcing platforms, please refer to [12], [13]."]} +{"69666908|3628110": ["enhanced, attackers still have various ways in order to hack blockchain [32]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"201069612|49527603": ["Because of the decentralised and distributed nature of Blockchain, the records of the ledger can be maintained across different systems, devices, and locations inside the network [10]."]} +{"204816444|34643772": [", network packet forwarding process) from the control plane (routing process), but also makes network functions controllable using software that offers efficient network formation, management, and segmentation on the fly [8]."]} +{"204816444|2509135": ["Thus, there have been recent research efforts on cognitive radio networks where unlicensed wireless users access someone else\u2019s licensed RF bands dynamically without creating any harmful interference to licensed users [3]."]} +{"196181319|6909107": []} +{"3585389|22221919": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massiveMIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cellular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machine (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "In addition, se veral survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cell ular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machi ne (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "[59] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. s. Kwak, \u201cPower-domain non-orthogonal multiple access (NOMA) in 5G\nsystems: Potentials and challenges,\u201dIEEE Communications Surveys Tutorials, vol. 19, no. 2, pp. 721\u2013742, Secondquarter 2017."]} +{"3585389|10235514": ["Furthe rmore, the contribution in [51] provided a tutorial overview of 5G research activities, dep loyment challenges and standardization trials."]} +{"3585389|4572654": ["Several survey papers exist in the literature in the contextof dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as spectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underlay DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectrum assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfections [13], licensed spectrum sharing\ntechniques [45], and the coexistence of LTE and WiFi [46].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "techniques [45], and the coexistence of LTE and WiFi [46].", "Considering a typical WiFi setup with two nodesN1 andN2 trying to connect to the core network via an access point, theclassical hidden node problem occurs when the nodeN2 starts transmitting data to the access point without being able to hear transmissions from the nodeN1 to the access point, thus causing collision at the access point [73]."]} +{"3585389|4344513": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7], [59]\u2013[61], mmWave [7], [8], [62], Non-Orthogonal Multiple Access (NOMA) [63], [64], cellular and heterogeneous networks [65]\u2013[67], Internet of Things (IoT) [70]\u2013[73], Machine to Machine (M2M) communication [68]\u2013[70] and Device to Device (D2D) communication [74]."]} +{"3585389|13019489": ["sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|10979806": ["[58] carried out a detailed survey of the existing works in the areas of energy-efficient techniques for 5G networks, and subsequently analyzed various green trade-offs including spectrum efficiency versus energy efficiency, delay versus power, deployment efficiency versus energy efficiency, and bandwidth versus power for the effective design of energy-efficient 5G networks [57]."]} +{"3585389|7525856": ["and measurements [30]\u2013[32], interweave DSS [33], [34], [36], underlay DSS [37]\u2013[39], cooperative DSS [40], [41], Medium Access Control (MAC) protocols for DSS [42], spectrum deci-", "model [185], and (iii) Radio Environment Map (REM) which can be created either based on sensing information obtained from the sensor nodes or database information obtained from regulators/operators or both [34], [186]."]} +{"3585389|8606364": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"3585389|19938676": ["In the context of 5G wireless networks, authors in [50] provi ded a detailed survey on 5G cellular network architecture and described some of the eme rging 5G technologies including massive MIMO, ultra-dense networks, DSS and mmWave."]} +{"3585389|4122595": ["The detailed mapping of various spectrum awareness and exploitation techniques was provided in [13].", "The main enabling techniques for DSS in wireless networks can be broadly categorized into spectrum awareness and spectrum exploitation techniques [13].", "cal imperfections such as noise uncertainty, channel uncertainty, hardware imperfections, noise/channel correlation in the context of FD-CR communications [13].", "sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|8974063": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"5039874|3757239": ["work infrastructure [28]."]} +{"5039874|206578365": ["Therefore, the traditional cloud computing cannot efficiently support the IoE-based application services [10], and the edge computing arises at the historic moment [11], [12] to adapt to the era of IoE."]} +{"5039874|3767252": []} +{"5039874|3042864": ["Previous work such as micro data center, [19], [20], mobile cloud computing [13], [14], fog computing [15], [16], cloudlet [21], and cloud-sea computing [22] have been introduced to reduce the storage and computation load in cloud computing.", "At present, some related paradigms, such as mobile cloud computing [13], [14], fog computing [15]\u2013[18], which is the predecessor or counterparts of edge computing, can provide the efficient solutions for massive data processing, and meanwhile improve the user experience."]} +{"53753204|12206204": ["machine-to-machine communications, device-to-device (D2D) networks, and internet of things (IoT) among others [3], [4]."]} +{"53753204|3330461": ["onomy is discussed in detail in [17]."]} +{"53753204|7644489": []} +{"6953986|8909218": ["These small cell deployments are mainly in the form of home small cells, known as femtocells [10], [11], [27], but many operators have also already started to deploy outdoor small cell solutions to complement their macrocell coverage [28]."]} +{"86850570|49527603": ["In order to ensure that all management hubs are trusted, some consensus algorithms must be applied to the architecture, such as Proof of Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT), etc. [19]."]} +{"86850570|2521001": ["requirements: confidentiality, integrity, and availability (CIA), which can be referred to as the CIA requirement [26]."]} +{"202688847|49574823": ["where transactions are posted and verified by non-trusting network members via a cryptographically verifiable manner [29], [30]."]} +{"199509363|192635047": ["Table 3 shows a comparison of the characteristics and performance enhancement of 4G and 5G [34]."]} +{"199509363|67794058": ["By using mmWaves with small cells may reduce the high path loss problem [31], and will be beneficial for several applications including smart healthcare."]} +{"199509363|50776107": ["Besides, SIGFOX is ultra-tight band radio technology having a full star-based framework which offers a highly versatile worldwide network for smart healthcare applications with very low power utilization [37]."]} +{"199509363|21386749": ["[19] In this review, the author focused on IoT-based healthcare technologies and present architecture for healthcare network and platforms which support access to the IoT backbone and enable medical data reception and data transmission."]} +{"88498755|925507": ["[16] systematically summarized the implementation of blockchain in IoT."]} +{"201833826|21386749": ["[2], [27])."]} +{"201833826|925507": ["Conoscenti, Vetro\u0300, and De Martin [13], for instance, have classified approaches that are relevant to IoT scenarios into four categories: data storage management, trade of goods and data, identity management, and rating systems.", "and De Martin [13], for instance, have classified approaches that are relevant to IoT scenarios into four categories: data storage management, trade of goods and data, identity management, and rating systems."]} +{"33804042|2623404": ["ONF describes the SDN architecture in three functional parts which are infrastructure layer, control layer and application layer [30], [32], [33]:"]} +{"33804042|2387055": ["Several SDN security threats have been reported in [87] apart from DDoS others includes unauthorized access, data leakage, data modi\ufb01cation, and malicious applications."]} +{"202689559|3767252": ["In MEC, the server takes a position in the base station order to reduce the latency and provide better services [12]."]} +{"202689559|61132": ["[1]."]} +{"165136896|50776107": ["will impose very diverse requirements on the network [108]\u2013[110]."]} +{"165136896|4880047": ["Similarly, conventional access control mechanisms use firewalls on network boundaries to examine incoming or outgoing packets to prevent attacks and unauthorized access [342], [343]."]} +{"165136896|6197039": ["The security vulnerabilities in massive MIMO: passive eavesdropping and active eavesdropping, are described in [20].", "A survey on physical layer security techniques for 5G wireless networks is presented in [20].", "For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks.", "Therefore, there are many surveys and magazine articles [20], [131], [133]\u2013[135] that cover various aspects of physical layer security."]} +{"165136896|22380247": ["Similarly, proper security keying models for IoT are still lacking [333] and routing protocols have vulnerabilities [334]\u2013[336]."]} +{"165136896|2014729": ["For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks.", "set up fake base stations and act as real network base stations [16].", "A survey on security of 4G and 5G networks is presented in [16]."]} +{"165136896|206578224": ["In2014, the ESTI MEC ISG [95] was initiated to look into Multi-access Edge Computing (MEC) security standards and empower NFV capabilities within the Radio Access Network (RAN) to deliver security and robustness."]} +{"165136896|28209458": ["Mobile botnets, compromised limited capability devices, are already posing serious security challenges due to connectivity to the Internet through cellular networks [18].", "Similarly, the increased number of VNFs is also a major concerns for unauthorized data access, traffic eavesdropping, and theft of services [18].", "A survey on security threats and attacks on mobile networks is presented in [18].", "For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks."]} +{"165136896|4502294": ["1) Security Challenges: The backhaul network comprise network elements and communication channels between the base station and the core network [152]."]} +{"165136896|15449163": ["Therefore, the survey article [11] provides some interesting insights on the limitations of the current 4G networks that must be solved in 5G.", "Since 5G is yet to be deployed, \u201cwhat will be done by 5G and how will it work?\u201d as presented in a survey on 5G [11], is still a question.", "overcoming those limitations is discussed in [11].", "The ubiquitous connectivity with below 1 ms latency and Gigabit speed aimed by 5G has gained momentum towards its realization [11]."]} +{"165136896|19938676": ["There are a number of survey articles that thoroughly discuss 5G networks such as [1], [12]\u2013[14]."]} +{"165136896|6779551": ["For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks.", "Security challenges and the possible mitigation techniques in the wireless air interfaces are discussed in [19]."]} +{"165136896|3453202": ["active eavesdropper are presented in [184].", "techniques for such threats is presented in [184]."]} +{"165136896|2387055": ["SDN is also termed as security-defined networking [344], since"]} +{"165136896|4395259": ["The fundamental principle behind physical layer security is to utilize the randomness of the noise and communication channels to restrict the amount of information that can be revealed by unauthorized receivers [131].", "Initiated mainly by Shannon [129], and further strengthened with theoretical basis using information-theoretic approach by Wyner [130], physical layer security of wireless communications does not rely on higher-layer security systems or encryptions [131].", "Therefore, there are many surveys and magazine articles [20], [131], [133]\u2013[135] that cover various aspects of physical layer security."]} +{"165136896|8909218": ["Small cells, such as femtocells [116], [117] and picocells [118], [119] using low power access points have gained momentum due to many benefits such as low-cost and indoor"]} +{"165136896|3494096": ["5G networks will integrate low power and low data rate IoT devices [325]."]} +{"165136896|925507": ["blockchain based approaches in such cases can offer decentralized means of security and privacy mechanisms for IoT applications [379], [380]."]} +{"52012534|206578224": []} +{"52012534|15449163": []} +{"52012534|18503837": []} +{"52012534|393948": []} +{"52012534|8909218": []} +{"6634488|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [93], [94], [95]."]} +{"51879581|5605271": ["More and more users are surrounded by large scale edge devices and data belonging to different stakeholders [5], [6]."]} +{"199657967|52059869": ["AI-Enabled Autonomous Networks Softwarization, cloudization, virtualization, and slicing are still important characteristics of autonomous networks; thus, software-defined networking (SDN), network function virtualization (NFV), and network slicing (NS) [8], first introduced to design the 5G network architecture, are still an important technique set for designing 6G."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"88495141|3757239": ["The interconnection-based setting makes energy service offerings varied, which involves a large number of distinct edge infrastructure or devices [1]\u2013[3]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"86758804|925507": ["Overhead and reliability conditions would be more difficult to satisfy in a public blockchain deployment [45, 46]."]} +{"195218608|209444175": [", user clustering, signal decoding, and CSI acquisition) is the main barrier against the NOMA practicality [92]."]} +{"195218608|209202834": ["A survey of blockchain in the context of cloud of things can be found in [47] and applications of blockchain for 5G and beyond networks were reviewed in [54]."]} +{"195218608|202888951": []} +{"195218608|202676686": ["One of the most important use cases of IoT is smart city and its important subset smart home/building [183]."]} +{"195218608|203566947": ["The survey in [9], [11] reviewed several edge computing concepts and focused on computation of\ufb02oad-ing.", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23]."]} +{"195218608|150373910": []} +{"195218608|149724363": ["n of\ufb02oading and resource allocation, mobility management, security, privacy, and trust management, have been well indicated and manifested in some recent MEC-IoT surveys, such as, [33], [186], [188], [191]\u2013 [193]to which the interested readers are recommended to refer. In the following, we discuss key open problems in MECenabled IoT systems which are different to the mentioned challenging technical asp", "189] A new architecture is proposed to store and process scalable sensor data. \u2713 \u2713 \u2713 [190] A concise tutorial of three edge computing technologies including MEC, cloudlets, and fog computing. \u2713 \u2713 \u2713 \u2713 [191] The hardware architectures of typical IoT devices and sums up many of the low power techniques which make them appealing for a large scale of applications \u2713 \u2713 \u2713 [192] A comprehensive survey on the em"]} +{"195218608|109939628": ["Monitoring the marine environment with IoT including cloud, fog, and edge computing mechanisms was also discussed in [265]."]} +{"195218608|85500300": ["ibly combined with many existing wireless technologies and emerging ones including MIMO, massive MIMO, mmWave communications, cognitive and cooperative communications, visible light communications, physical layer security, energy harvesting, wireless caching, and so on [61].", "Massive MIMO-NOMA is another scenario to support massive connectivity and high spectral efficiency [61]."]} +{"195218608|53018231": ["Moreover, some surveys and tutorials on ML, DL, (deep) RL, as well as their applications in communications and networking [230]\u2013[232] have come out, and readers can refer to these literature for more details."]} +{"195218608|52015330": ["us reducing the execution latency and network congestion [11], [12]. Since fog nodes are generally deployed in distributed locations, they are widespread and geographically available in large numbers [13]. Due to its characteristics, fog computing plays an important role in many use cases and applications [14], e.g., smart cities, connected vehicle, smart grid, wireless sensor and actuator networks, s"]} +{"195218608|21705502": ["Several works in [21]\u2013[23] revealed the role of MEC for IoT applications and realization.", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23]."]} +{"195218608|21713386": ["migration execution cost, incentive payment to the target MEC server, and transmission cost due to radio resource usage. Several challenges arise in computation migration due to the following reasons [331]. First, when should the computation task be migrated from the source server? Next, which is the target server to execute the task when a computation is needed? This problem becomes very challenging s", "hat new computation migration can be fastly deployed without any internal modi\ufb01cation. For more details of service migration in edge computing, interested readers may refer to the recent survey paper [331]. D. Learned Lessons and Potential Works Due to the great bene\ufb01ts offered by MEC and HetNet as well as their complementary properties, it is convinced that the combination of MEC and dense HetNet is u"]} +{"195218608|5022650": ["utations from and data collected by end users can be processed and analyzed by fog nodes (i.e., nodes in fog computing) at the network edge, thus reducing the execution latency and network congestion [11], [12]. Since fog nodes are generally deployed in distributed locations, they are widespread and geographically available in large numbers [13]. Due to its characteristics, fog computing plays an impo"]} +{"195218608|53958589": []} +{"195218608|3457064": ["These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "Mathematical frameworks for optimization of MEC systems were reported in [15], [16].", "In particular, the authors in [15] conducted a survey on the computation offloading decisions when multiple challenges, e."]} +{"195218608|4884302": ["d execute an ML model to extract necessary information before sending the output to the central cloud for further training.Moreover, some surveys and tutorials on ML [248], DL [249], (deep) RL [250], [251], as well as their applications in communications and networking [252], [253] have come out, and readers can refer to the aforementioned literature for more details. Due to the rapid evolution of wire"]} +{"195218608|206578486": ["Since VM provisioning is used in cloudlets, cloudlets can operate in the standalone mode without the intervention of the cloud [11], [12]."]} +{"195218608|7942157": ["readers to read the surveys in [39], [40] for more detail."]} +{"195218608|22221919": ["There are many bene\ufb01ts of MEC and NOMA, including supporting massive users, reducing the transmission latency and the energy consumption of end users and providing high performance for more complex network scenarios, i.e. mmWave massive MIMO.", "Promoted by a variety of opportunities and advantages offered by MEC and NOMA, both academic and industrial communities have conducted extensive researches to design the 5G network with MEC and NOMA [65]\u2013[67].", "The combination of MEC and NOMA can provide low-latency transmission.", "To cope with demands for lower latency, MEC and NOMA are two promising solutions.", "The combination of MEC and NOMA can reinforce the services and applications that are supported by the 5G network.", "The combination of MEC and NOMA can signi\ufb01cantly improve the user satisfaction and network performance through the provision of golden opportunities."]} +{"195218608|206578224": ["In [12], the authors described four fundamental enabling technologies for MEC including virtual machines and containers, network functions virtualization (NFV), software-de\ufb01ned networking (SDN), and network slicing.", "There are many bene\ufb01ts of employing MEC into IoT systems, including but not limited to, lowering the amount of traf\ufb01c passing through the infrastructure and reducing the latency for applications and services [12].", "For more information on these issues, we refer the interested readers to [12], [48], [53] and references therein."]} +{"195218608|24386836": ["These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "The authors in [16] reviewed research works that applied theoretical games in addressing problems and", "Mathematical frameworks for optimization of MEC systems were reported in [15], [16]."]} +{"195218608|3757239": ["Recent studies in [13], [14] focused on reviewing the integration of communication, caching, and computation.", "The survey paper [13] showed that there are five main algorithms: content replacement policies such as the least frequently used (LFU) and least recently used (LRU), user preference based policies, learning based policies, non-cooperative caching, and cooperative caching."]} +{"195218608|31245252": ["In particular, the IoT basic architecture consists of three layers: Perception, Network, and Application [142], [143]."]} +{"195218608|6909107": ["Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23].", "These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "devices, which can be made open to authorised developers and content providers to deploy versatile and uninterrupted services on IoT applications [9].", "The survey in [9], [11] reviewed several edge computing concepts and focused on computation offloading.", "the offloading concept [9], [286], [287], the authors in [288], [289] proposed differentMEC architecture to further improve the network performance compared with the standard MEC.", "The cloudlet and fog computing are similar in that cloudlets and fog nodes are not integrated into the mobile network architecture, thus fog nodes and cloudlets are commonly deployed and owned by private enterprises and it is not easy to provide mobile users with the quality of service (QoS) and quality of experience (QoE) guarantees [9], [10]."]} +{"195218608|206578365": ["The authors in [1] reviewed joint communication and computation resource management in MEC systems.", "These surveys are limited to specific aspects and potential use cases of MEC, for instance, MEC overview [17], [19], architecture and computation offloading [9], resource allocation [1], and mathematical frameworks [15], [16].", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23].", "Compared with previous generations, 5G will support not only communication, but also computation, control, and content delivery (4C) functions [1]."]} +{"195218608|3270620": ["d accurate CSI is only used for power allocation in power-domain NOMA, thus the requirement of channel feedback in NOMA is relaxed [91]. The comparison between OMA and NOMA is summarized in Table III [92]. Although NOMA is able to support a large number of users simultaneously and surpasses OMA in several aspects, various challenging problems associated with NOMA must be addressed before this technolo"]} +{"195218608|3767252": ["In edge computing paradigms, there are numerous security and privacy threats, for example, wireless jamming, denial of service, man-in-the-middle, spoofing attacks, privacy leakage, virtual machine manipulation, and injection of information [24], [255].", "The following reasons explain why security and privacy are the greatest challenges [24]."]} +{"195218608|19938676": ["eneration (3G) in 1998, fourth generation (4G) in 2008, to hopefully \ufb01fth generation 5G in 2020. Fundamental services and applications supported in these network generations are summarized as follows [1]. Back to early 1980s, 1G was introduced as the \ufb01rst commercial cellular network, where voice services are supported with the peak data rate of 2.4 kbps and no security mechanisms. The second generati", "owing a zero-mean normal distribution when t = 1 . The DNN rst outputs a relaxed computation ofoading action x^t, represented by a parameterized function x^t = f t (h t), where x^t = fx^t;i jx^t;i 2 [0;1];i = 1 ; ;Ng (7) and ^xt;i denotes the i-th entry of x^t. xt* Fig. 15: Architecture of the DRL based online of\ufb02oading algorithm [385]. drawbacks of existing methods, which are high computation overhea"]} +{"195218608|7329149": ["nized Agriculture with IoT: IoT emerging the use of low-cost hardware (sensors/microcontrollers) and 5G communication technologies has opened new era for cultivating soil, namely \u201csmart agricultural\u201d [256], [257]. MEC-enabled IoT can offer advanced abilities for smart agricultural, e.g., predictive analytic, weather forecasting for crops or smart logistics and warehousing [258]. Recently, there are som"]} +{"195218608|18687271": ["For example, two localized mobility management schemes for dense HetNets were proposed in [214], a cache-enabled mobility management framework in mmWave-microwave HetNets was studied in [215], various energy-efficient cell discovery techniques were discussed in [217], a comprehensive review of mobility management was provided in [218], and the adoption of distributed mobility management was presented in [219]."]} +{"195218608|3055684": ["g, solar, wind), individual MEC servers may be overloaded at any moment due to the limited harvested power and computing capacity [111]."]} +{"195218608|12029139": ["The basic concept of EH is to capture various available energy from different sources to power the energy-constrained devices for prolonging their lifetime [98].", "For deeper understanding of the benefits and opportunities offered by EH and WPT techniques as well as their challenges and potential application scenarios, the interested readers are recommended to refer to EH and WPT surveys, such as [98], [103], [104]."]} +{"195218608|33867211": [" resource, the corresponding techniques can be employed to convert that energy into the electrical power [110]\u2013[112]. In particular, solar cells can be used to harvest sunlight power for solar energy [116]. The piezoelectric, electrostatic, and electromagnetic conversion techniques are utilized to convert the energy from some movement or mechanical deformation into electrical energy for the mechanical "]} +{"195218608|13172512": ["Recently, some surveys and tutorials on machine learning [339], deep learning [340], (deep) reinforcement learning [341]\u2013[343], as well as their applications in communications and networking [344]\u2013[346] have come out, and readers can refer to the aforementioned"]} +{"195218608|8909218": ["HetNets have been developed because of its following benefits: 1) better coverage and capacity, 2) improved macrocell reliability, cost benefits, and 3) reduced cost and subscriber turnover [41], [201]."]} +{"195218608|3818445": ["Several works in [21]\u2013[23] revealed the role of MEC for IoT applications and realization.", "Many also consider the importance of MEC in 5G enabling technologies and applications and cover certain research aspects discussed in our article, for example, [1], [9], [11]\u2013[19], [21]\u2013[23]."]} +{"195218608|3494096": ["Inversely, 5G is considered a basic platform to facilitate emerging IoT applications [140]."]} +{"195218608|12060835": ["At the network-level, MEC can allow deploying a centralized EH strategy to tune the functionality of all devices for better EH and performance [108]."]} +{"56895323|49527603": ["In [19], a brief summary of the emerging blockchain-based applications ranging from"]} +{"56895323|9461213": ["fields [221], [222], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secure Multi-Party Computation (MPC)."]} +{"56895323|27262729": ["A systematic survey is conducted in [20] with respect to the security in the Bitcoin network including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", "vacy [20] and quantitative analysis of smart contract performance [217].", ", Sybil attacks [41] and doublespending attacks [20]), node mistakes (e."]} +{"56895323|2457428": ["the security is a main concern. Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]. In [182], the authors present a framework for providing secure key management in VCSs, where the security managers are considered as blockchain miners which capture the vehicle departure information"]} +{"56895323|3434731": ["trusted virtual computers [6] for decentralized, transactiondriven resource management in communication networks and distributed autonomous systems [5], [7].", "In [7] and [16], two brief surveys on consensus protocols in blockchain networks are provided."]} +{"52877233|3932531": ["For example, the work [26] introduces how to use blockchain technology in intrusion detection systems (IDSs) and [19] utilizes blockchain to protect the security of users\u2019 data."]} +{"86417045|3799929": ["It may not be acceptable for most users to expose such a sensitive information, especially in the presence of malicious entities that can exploit it for malicious purposes [9]\u2013[11].", "reveal other personal information about SU s including their behavior, health condition, personal habits or beliefs [9]."]} +{"86417045|5325544": ["PU s are top/\ufb01rst tier users with the highest priority, while new CBRS users, considered as secondary users, operate either at the second tier as PAL users or at the third tier as GAA users [3]."]} +{"52124766|21557844": ["Recently, Rappaport et al. [34] present a comprehensive survey of mmWave radio propagation models to date."]} +{"31102928|925507": []} +{"201666240|209202834": ["RECENT years have witnessed the explosion of interest in blockchain, across a wide span of applications from cryptocurrencies to industries [1], [2]."]} +{"201666240|195736509": ["Final, smart contracts are programmable applications that run on a blockchain network according to predefined contractual conditions such as payment terms, liens, confidentiality, and even enforcement [40]."]} +{"201666240|173991065": ["For example, Bitcoin is able to execute a maximum of only four transactions/second, and the throughput of Ethereum achieved is about 20 transactions/second, while Visa can process up to 1667 transactions/second [24].", "The authors in [24] also discussed the integration of blockchain technology with IoT."]} +{"201666240|167222332": ["This promises to offer on-demand healthcare services, save healthcare costs, and improve quality of experience [98]."]} +{"201666240|139108728": ["In addition, the security aspect of smart contract, which is regarded as core software on blockchain, is also very important since a small bug or attack can result in significant issues like privacy leakage or system logic modifications [157], [158]."]} +{"201666240|52169284": ["e providers. UAVs can be regarded as \ufb02ying IoT devices and have been employed widely in various areas, ranging from military, security, healthcare, and surveillance to vehicle monitoring applications [246]. In the era of modern 5G communication networks, due to the rapidly growing IoT traf\ufb01c, it is very challenging for static base stations (i.e. access point, router) to support data demands of billions"]} +{"201666240|49574823": ["The survey papers [21], [22], [23] presented the review of recent efforts in the adoption of blockchain technology in various IoT scenarios and applications."]} +{"201666240|56895323": ["s Proof-of-stake (PoS), Byzantine Faulty Tolerant (BFT). Details of conceptual features and related technical issues of such consensus algorithms can be referenced to previous excellent surveys [41], [42]. - Smart contracts: A smart contract is a programmable application that runs on a blockchain network. Since the \ufb01rst smart contract platform known as Ethereum [43] was released in 2015, smart contrac"]} +{"201666240|4880047": ["tem based on blockchain for educational collaboration. Real implementation results have not been reported to verify the proposal. and NFV can support secure and trusted mobile services in 5G networks [168]. As an example, blockchain can be used to achieve trust management for IoT services in SDN-based 5G mobile vehicular communication thanks to its decentralized and immutable characteristics [134]. Wit"]} +{"201666240|52059869": ["works. In order to support various types of IoT applications, 5G relies on the concept of Network Slicing, which is the separation of multiple virtual networks operating on the same physical hardware [158]. It enables telecom operators to portion their networks for speci\ufb01c services and applications, such as smart home, smart factory or vehicular network. Network slicing is well supported by Network Sof"]} +{"201666240|24855581": ["learning in BCoT scenarios. Some works in [235], [236] demonstrate the ef\ufb01ciency of machine learning tools in improving intelligence of BCoT applications. Specially, deep reinforcement learning (DRL) [239] has recently emerged as one of the most attractive machine learning techniques to solve many critical issues in BCoT networks. Indeed, it is proven that DRL can be useful to address effectively issue"]} +{"201666240|3628110": ["Seriously, attackers can exploit this vulnerability to perform attacks, for example, they can modify the ordering of transactions, hamper normal mining operations or initiate double spending attack, all of which can degrade the blockchain network [156].", "security weaknesses in blockchain operations which are mostly related to BCoT systems [156]."]} +{"201666240|31245252": ["IoT has reshaped and transformed our lives with various new industrial, consumer, and commercial services and applications [8], [9].", "1) Blockchain: Blockchain is mostly known as the technology underlying the virtual cryptocurrency Bitcoin which was invented in 2008 by a person known as Satoshi Nakamoto [8]."]} +{"201666240|18750590": ["A set of issues, challenges, and future research directions on resource management in cloud-based networks is discussed in [160], for example, the optimization of cloud resource allocation to computation demands and the adaption to dynamic service usage patterns."]} +{"201666240|5551880": ["from storage and computation attacks, virtual machine (VM) migration attacks to malware injection and DoS attacks [155]."]} +{"181996713|24785273": ["For optimal performance, 5G networks will adopt a more coordinated approach to radio access network (RAN) technology based on CoMP transmission and Inter-cell Interference Coordination (ICIC) as already demonstrated in the recent release-15 systems [47]."]} +{"181996713|10235514": []} +{"181996713|19938676": []} +{"181996713|2510839": []} +{"181996713|8280144": ["The predicted data rate for the 5G network is around 100 Gbps with a minimum of 1 ms latency along with better user capacity and battery life [4, 5]."]} +{"69800362|3434731": ["[13] proposed a comprehensive review of the"]} +{"69800362|925507": ["[15] studied whether blockchain and peering methods can be used to promote decentralized and design-specific IoT."]} +{"195774878|15662958": ["The homomorphic encryption [51] offers solution to this issue by enabling the processing of"]} +{"195774878|2756896": []} +{"201889328|86512149": []} +{"201889328|129943863": []} +{"201889328|76667957": []} +{"201889328|86416942": []} +{"201889328|4880047": ["Furthermore, in our previous research articles [21], [22], we briefly discuss the important of 5G security and the secu-"]} +{"201889328|2014729": []} +{"201889328|206456479": ["In addition, when UEs are capable of accessing all network slices separately then either they should authenticate themselves before accessing each slice or they need to first access the low security slice by authentication then access high security slice [206], [208]."]} +{"201889328|25911553": ["Moreover, large and increasing variety of proprietary hardware appliances in operators network make it so complex and expensive to manage [177]."]} +{"201889328|31245252": []} +{"201889328|4502294": []} +{"201889328|3583771": []} +{"201889328|15449163": []} +{"201889328|19938676": ["As a result several surveys were already published on 5G networks [1], [16]\u2013[20]."]} +{"201889328|21386749": []} +{"201889328|6779551": ["Later 3G network versions were able to support high data rates and new services such as video call, MMS (Multimedia Message Services), mobile television and mobile Internet.", "Due the coherent IP connectivity of 4G core network with the Internet, 4G networks becomes vulnerable to millions of attackers and new security threats from the Internet [62], [67].", "Such observation motivated mobile researchers to introduce data applications and Internet in 3G mobile communication technology.", "Especially, the content of roaming SMS messages were exposed to external attackers who reside within the Internet [63].", "The proposed scheme is comparable to some of other techniques and verified for security by resorting to Burrows-Abadi-Needham logic, formal and informal security analysis via automated validation of application tools and Internet security protocol.", "NTT DoCoMo launched the first commercial 3G network on 2001, using the Wideband Code Division Multiple Access WCDMA technology by enabling mobile Internet access."]} +{"201889328|62140781": ["Some of these attacks became harder to detect the presence of an attack in IP based 4G mobile network [23], [68].", "use of none IP protocols in the core network [68].", "Comparably, non-3GPP networks such as Wi-Fi and WIMAX have lower levels of security than a mobile network [23], [68] With the new 4G technology mobile operators were capable of providing new offers including high speed of the services."]} +{"201889328|2829149": []} +{"201889328|2387055": ["The ONF typically recommends to make use of SDN and network operating systems in the applications and industrial verticals [338]."]} +{"209965070|51935081": ["Moreover, blockchain is different from other distributed systems based on consensus and following properties [25]:"]} +{"209965070|49574823": ["With the help of standardized protocols and layers, an architecture can be developed to execute the relevant services by IoT devices [5].", "It consists of a chain of time-stamped blocks that are linked together using cryptographic hashes [5]."]} +{"209965070|21386749": ["5G-enabled IoT considered as a potential solution to alleviate the pressures on healthcare system [55\u201357]."]} +{"4872238|206456479": ["In [5], the interested reader may find a nice overview of the latest research proposals."]} +{"49863956|206578486": ["1, which includes edge, fog, and cloud stratum [21]."]} +{"49863956|8523192": ["models enable real-time surveillance leveraging the fog computing paradigm [20]."]} +{"4880047|3767252": []} +{"52157765|2623404": ["Compared to traditional networking paradigms, SDN makes it easier to introduce new abstractions in networking, lowering operation costs, simplifying network management, and facilitating network evolution [17], [18].", "Notably among these are the integrated services (IntServ) model [14], the differentiated services (DiffServ) model [15], and network function virtualization (NFV) [16], [17] and software-defined networking (SDN) [17], [18]."]} +{"52157765|10559330": ["Notably among these are the integrated services (IntServ) model [14], the differentiated services (DiffServ) model [15], and network function virtualization (NFV) [16], [17] and software-defined networking (SDN) [17], [18]."]} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"165017855|53046901": ["For more information on the Blockchain concept, the reader may refer to [4].", "Blockchain technology [4], initially developed to be used in Bitcoin to provide a fully-distributed and secure ledger, has already been studied as an enabler for a diverse set of services."]} +{"165017855|56895323": ["However, other consensus mechanisms may also be used without altering the system design and objective (e.g., Proof of Stake, Proof of Burn, Proof of Retrievability, etc.) [14]."]} +{"165017855|52059869": ["For the radio domain, resources could be related with the functional split type [1], the MAC scheduler algorithm, the number of Physical Resource Blocks (PRB) and others.", "The recent evolution of network architecture [1], known as Network Softwarization , will be the main enabler of Network Slicing."]} +{"195416001|2014729": ["It exploits the unique wireless physical layer medium features, which provides advantages such as low computational complexity and high scalability [75]."]} +{"195416001|21418": []} +{"195416001|8440916": ["The authenticity of the communication system [71] in the future shall be improved by allowing power line communication [72] for the integration of information and communication.", "The first among these is a home area network (HAN) [71], which involves interaction between the utility and the users through underlying connections such as smart meters and sensors."]} +{"195416001|15449163": ["Opportunistic scheduling of the cells [56,57] is imperative for achieving high throughput where there are more overloaded cells in the network."]} +{"195416001|29060869": []} +{"195416001|595093": []} +{"195416001|11720829": ["This also shows the low service isolation requirement and the medium service priority [85]."]} +{"195416001|121289": []} +{"195416001|18037424": ["The public key infrastructures, the hashing schemes, and the trusted computing are effective key security technologies for smart grids [104,105]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"67866940|21705502": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|206578224": ["Also, to better cope with lowlatency IoT applications, the Edge computing paradigm is boosting the deployment of micro data centers at the edge of the network [40].", "In this vein, the Edge computing paradigm [40] is rapidly gaining momentum, promoting distributed small-scale cloud environments deployed at the edge of the network to execute applications near to the IoT devices."]} +{"67866940|24110634": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [102] [117] [118] [119]."]} +{"67866940|34643772": ["Different works have started to investigate and address some of these challenges [25], [26].", "In [23]\u2013[25], SDN-based security solutions are proposed to enhance network protection."]} +{"67866940|9495329": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|4427557": [", Narrowband IoT) [44]."]} +{"67866940|2332366": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|26368310": ["Several solutions are available to enable resilience and availability for cloud-based deployment [154]."]} +{"67866940|3767252": ["Indeed, accounting for the exponential increase of micro edge data centers, verification of their trustworthiness can be highly challenging [191]."]} +{"67866940|2829149": []} +{"67866940|12029139": ["Therefore, RFID tags present extremely low costs and can be battery-free by leveraging electromagnetic energy harvesting [33]."]} +{"67866940|485843": ["The most promising usage concerns smart home automation [55], Industrial Internet [36], intelligent transportation systems [56], smart energy [57], enhanced health-care services [58], and smart cities [59]."]} +{"67866940|595093": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|1940388": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|2357830": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17205659": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15].", "Furthermore, remarkable efforts have been carried out over the\npast years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17869045": ["In the following, we focus on the Authentication, Authorization, and Accounting (AAA) framework, which is dedicated for intelligent access control of resources and security policy enforcement [85]."]} +{"67866940|1230643": ["and represent a key enabler for IoT adoption [34]."]} +{"199508751|51613885": ["IoT brings great benefits across various sectors, including agriculture [3]\u2013[6], healthcare [7]\u2013[11], smart grids [12]\u2013[16], smart homes [17]\u2013[19], and others [20]."]} +{"199508751|50776107": ["IoT brings great benefits across various sectors, including agriculture [3]\u2013[6], healthcare [7]\u2013[11], smart grids [12]\u2013[16], smart homes [17]\u2013[19], and others [20]."]} +{"199508751|61132": ["Although UAVs were initially designed for military purposes, they have been exploited to civil applications by virtue of their promising functionalities such as ease of deployment, low maintenance cost, and availability [23], [24]."]} +{"67867402|49527603": ["Blockchain technology has the key characteristics of decentralization, traceability, anonymity and auditability [119]."]} +{"67867402|51935081": ["[73] believed that in the blockchain, the generation, verification, storage and transmission of data do not depend on any centralized organization, and each node has the same rights and obligations in the whole network and has the same status.", "Content References Characteristic description Blockchain technology [6, 12, 14, 46, 50, 51, 69, 71, 73, 75,80,102] [71] put forward the concept of bitcoin and made the blockchain step into peoples horizons; [75] introduced the workflow of blockchain; [73, 102] introduced the characteristics of decentralization and tamper resistance of blockchain Blockchain-based new architecture [13,15,22, 25, 36, 44, 55, 78, 96, 109, 110] [78] presented three possible architectures of blockchain applications for the IoT front-end; [110] proposed a blockchainbased framework for updating IoT firmware devices; [36] proposed a traceability system architecture Blockchainbased resource management [4, 17, 21, 38, 43, 64, 86, 88, 93, 104, 108] [108] convenient, [86,93] the limited resource and lower computation of mobile devices, [104] profit maximize"]} +{"67867402|3932531": ["\u2026blockchain-based key management system using anti-quantum cryptosystem Blockchain-based intrusion detection [2,5,9\u201311, 20, 35, 67, 68, 79, 97, 103] [68] elaborated the possibility of combing blockchain technology and IDS; [79] and [11] focused on the trust computing and vulnerability scanning of\u2026", "Meng et al. [68] elaborated the possibility of combining blockchain and IDS, and discussed the applicability of blockchain technology in solving data sharing and trust computing problems in the collaborative detection, and pointed out the direction of future work.", "\u2026[18] proposed a blockchain-based key management system using anti-quantum cryptosystem Blockchain-based intrusion detection [2,5,9\u201311, 20, 35, 67, 68, 79, 97, 103] [68] elaborated the possibility of combing blockchain technology and IDS; [79] and [11] focused on the trust computing and\u2026", "There are still many problems un-solved with intrusion detection, such as massive false alerts and overhead package with limited handling [68]."]} +{"67867402|31245252": []} +{"67867402|3348390": []} +{"204089501|53046901": ["In recent years, blockchain technology [20]\u2013[22] has attracted growing attention of researchers, which may provide possible solutions addressing the above challenges because of its advantages of decentralization, anonymity, and trust."]} +{"147704064|2014729": ["The available approaches [5], [17] for privacy protection apply a complex key agreement, mutual interaction, by adding signs to protect data, which could lead to latency, and introduce computational load encryption and complexity to the AP [18], something not appropriate for small and low power 5G\u2026", "With the advent of new communication models in 5G in heterogeneous environments like vehicles [1], SDNs [5], IoTs [6], and fog computing [1], [17]."]} +{"147704064|25911553": []} +{"147704064|206584087": ["\u2022 Class 1 attacks: DOS/DDOS attacks like, UDP Flood, SYN Flood, TCP Flood which are common in the network level [25]."]} +{"32280043|3834736": ["[6] S.", "While adaptive beaconing approaches could be used to reduce load and improve latencies [6], the current status of IEEE 802."]} +{"32280043|7644489": ["An important feature of 5G-enabled communications is the proximity service (ProSe) [8].", "[8] X."]} +{"199016021|54446993": ["However, these data contain sensitive personal information and can reveal the identity of the associated stakeholders if a proper privacy preserving mechanism is not in place [2]."]} +{"199016021|3818445": ["On the other hand, a hierarchical edge computing architecture can resolve the issues associated with centralized architectures by pushing data pipeline functions towards the edge of the IoT networks depending on the resource availability and application requirements [4, 5]."]} +{"201126242|1083483": ["r privacy in machine learning, there are many other privacy de\ufb01nitions, such as k-anonymity [36], d-presence [81] and distance correlation [117], that may be applicable to different learning problems [118]. 10 !"#$"# %"$&'"! (a) Federated learning without additional privacy protection mechanisms. !"#$"# %"$&'"! (b) Global privacy, where a truste"]} +{"201126242|20905429": ["te nature of the data and the limited connectivity of each device. Federated learning methods can help to train models that ef\ufb01ciently adapt to changes in these systems while maintaining user privacy [84, 98]. 1.1 Problem Formulation The canonical federated learning problem involves learning a single, global statistical model from data stored on tens to potentially millions of remote devices. We aim to le"]} +{"202750347|209202834": []} +{"202750347|209382714": ["be accessed or cloned without tampering it due to quantum principles [63]."]} +{"202750347|195874391": ["Artificial Intelligence : The most important and newly introduced technology for 6G communication systems is AI [26]\u2013[30].", "[30] A survey of intelligent reflecting surfaces for 6G wireless communications is presented."]} +{"202750347|173991065": ["The blockchain is essentially a perfect complement to the massive IoT with improved interoperability, security, privacy, reliability, and scalability [46]."]} +{"202750347|3930401": ["OWC technologies, such as light fidelity, visible light communication, optical camera communication, and FSO communication based on the optical band are already well-known technologies [34]\u2013[37]."]} +{"202750347|10235514": ["The 5G network will provide new features and provide better quality of service (QoS) as compared with fourth-generation (4G) communications [5]\u2013[8]."]} +{"202750347|4502294": []} +{"86431222|49527603": ["[30], [31] have presented a comprehensive overview on the blockchain, from"]} +{"86431222|3628110": ["[36]"]} +{"86431222|12675271": ["Fog computing for sustainable smart cities has been surveyed in [29], which analyzes the characteristics and functionalities of an ideal fog computing architecture, and discusses some future research challenges and directions."]} +{"86431222|6909107": ["Computing and Mobile Edge Computing (MEC) [256]."]} +{"86431222|37424351": ["Issues and solutions regarding the information security in smart cities have been studied in [16]."]} +{"86431222|15093994": ["[18] have surveyed the economic models of electric vehicles\u2019 charging process in smart cities considering both unidirectional and bidirectional energy flows, and given some valuable classification and comparison."]} +{"86431222|2489034": ["Wang and Sng [24] have surveyed the deep learning algorithms applied to video analytics in smart cities."]} +{"86431222|14849079": ["[14] have presented a comprehensive survey on smart cities, from the definition, application domains, architectures, key enabling technologies and research challenges."]} +{"86431222|6355516": ["Other specific areas of smart cities, such as software architectures [19], business models [20] and people movement analytics [21], are also studied respectively."]} +{"86431222|925507": ["Due to the redundancy in computation, the PoW is not an energy efficient approach and consumes a large amount of electricity energy [226], [228], [244]."]} +{"117143236|16378550": []} +{"117143236|3330461": []} +{"51879536|925507": ["The first work is a systematic literature review [23] that classifies works according to the use of the blockchain in order to foster a decentralized and private-by-design IoT."]} +{"207758775|27262729": ["Several recent proposals based on the use of the BC in the IoT for data storage and security, have been proposed [4], [6], [8], [5]."]} +{"2282184|8523192": ["To summary, Edge computing [11]\u2013[13] is totally edgelocalized, however, fog computing extends the computing and communication resources towards edge of the network."]} +{"2282184|2756896": ["Location privacy, as discussed in [28], is one of the most important models for privacy, since the place of equipment can be linked to the owners."]} +{"2282184|3348390": ["As resources of EU\u2019s devices are shared among other geographically close devices to support context-aware services [63], [64], location, massive amount data and other information of EU need to be protected in very secure manner."]} +{"2282184|12815020": ["SCADA [65], cloud [66], smart grid [67] etc."]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"195699446|4502294": ["In addition, [26] discusses challenges for 5G backhaul connectivity in order to meet the stringent requirements of data rate and latency at the 5G RAN.", "In this paper, we complement the work of [24\u2013 26] by focusing on providing connectivity for rural areas.", "The most relevant to this work are [24\u201326]."]} +{"59316859|3628110": ["These consensus algorithms are different in identity management mechanism, energy saving, and tolerating power of adversary [3]."]} +{"32138437|52059869": ["Recently, there has been a lot of work on specific network services, such as mobility management [111], resource management and sharing [112]\u2013[114], CoMP (Coordinated Multi Point) [115], service chaining [116], network slicing [117], [118], service-customized networking [119], energy efficient traffic engineering- e."]} +{"32138437|20991784": ["The survey in [171] looks at the proposals for softwarization and cloudification of cellular networks in terms of optimization and provisions for energy harvesting for sustainable future."]} +{"32138437|25911553": []} +{"32138437|21930333": ["The switching-off strategies are also discussed in [136].", "[136] also discussed the idea in relation to heterogeneous CloudRANs, where macro base-station or RRU can provide signaling to the area and small base-stations or RRUs can only be used on-demand.", "[135], [136] 4- xhaul:backhaul & fronthaul [137]", "Heterogeneous CloudRANs are also studied in literature where small RRUs and macro RRUs are distinguished by their service area [136].", "4- Control/data split in RAN [11], [40], [136] 1- Management and virtualization as control modules [11]"]} +{"32138437|207262843": ["In a recent and most comprehensive survey of SDN and virtualization research for LTE mobile networks [72], the authors have provided a general overview of SDN and virtualization technologies and their respective benefits.", "On the other hand, the open challenges briefly discussed at the end of [72] and the relevant work under each challenge are discussed in detail in the present paper.", "An interesting classification of proposed SDN-based mobile network architectures based on revolutionary or evolutionary migration is done in [72].", "If the readers want better understanding about the material covered in Section IV, they are recommended to read [72]."]} +{"32138437|8650651": ["Security vulnerabilities and scalability issues in centralization of control layer are also needed be explored in further details besides other technical challenges [41].", "The survey in [41] provides a comprehensive account of research in control layer framework, access control, security, QoS monitoring, virtualization mechanisms, etc."]} +{"32138437|2535224": ["The survey in [162], although is relatively recent but, presents a case for SDN by highlighting the issues with the current networks, such as, heterogeneous access networks, network ossification, increase in cost for operator amid dwindling revenues, etc."]} +{"32138437|27633619": ["Another recent survey [169] briefly surveys all technologies"]} +{"201107148|52169284": ["Motivated by our previous work [52], the use of unmanned aerial vehicle (UAV) with its high mobility and flexibility can be a promising solution [53] that can assist base stations to offload IoT data workload to edge-cloud servers."]} +{"201107148|49574823": ["Recently, blockchain has emerged as a promising approach to tackle security issues in future IoT networks, including mobile offloading systems [12], [13]."]} +{"201107148|5039874": ["s with high \ufb02exibility to achieve computation objectives for future 5G IoT [8], [9]. However, the MECCO also poses many challenges on computation of\ufb02oading and one of the major challenges is security [10]. As mobile task of\ufb02oading relies on MDs in a dynamic environment where mobile users are untrusted, the MEECO is vulnerable to various types of threats. Unauthorized MDs may gain malicious access to e"]} +{"201107148|4884302": ["]. Nevertheless, in complex of\ufb02oading problems with multi-user multi-IoT device scenarios, the dimension of state and action space can be extremely high that makes RL-based solutions inef\ufb01cient [27], [28]. Fortunately, Deep Reinforcement Learning (DRL) methods [29] such as deep Q-network (DQN) have been introduced as a strong alternative to solve such high-dimensional problems and demonstrated its sca"]} +{"201107148|6909107": ["To further improve efficiency of mobile computation, mobile edge computing (MEC) has emerged as a promising solution to enable MDs to offload their computation tasks to a nearby edge server [5], [6]."]} +{"201107148|206578365": ["s [4]. To further improve ef\ufb01ciency of mobile computation, mobile edge computing (MEC) has emerged as a promising solution to enable MDs to of\ufb02oad their computation tasks to a nearby edge server [5], [6]. Particularly, the combination of cloud and edge computing can lead to a new paradigm to facilitate of\ufb02oading computation for IoT networks with an uni\ufb01ed model of mobile edge-cloud computation of\ufb02oad"]} +{"201107148|21386749": ["etc, which have been driving the evolution of Internet of Things (IoT) [1]. MDs can be used to run IoT applications such as smart home, smart healthcare, smart city with high \ufb02exibility and ef\ufb01ciency [2], [3]. However, due to the rapid growth of mobile data traf\ufb01c, executing extensive IoT applications merely on overloaded MDs is incapable of providing satisfactory Quality of Services (QoS) to users. "]} +{"13785718|18212759": []} +{"204230427|50776107": ["With the emergence of Mobile Cloud Computing (MCC) and Internet of Medical Things (IoMT) technologies, the healthcare industry has experienced a paradigm shift in clinical assessment and healthcare management in recent years [3-6]."]} +{"204230427|13881738": ["With the emergence of Mobile Cloud Computing (MCC) and Internet of Medical Things (IoMT) technologies, the healthcare industry has experienced a paradigm shift in clinical assessment and healthcare management in recent years [3-6]."]} +{"44182431|3474164": ["managing the state information of massive number of IoT devices is also an issue that needs to be considered [62, 63]."]} +{"44182431|2871699": ["M2M communicaiton has been extensively reviewed in [54, 55, 56, 57, 58].", "The ETSI standard and applications has been discussed in [54] and [55], in which mobile devices are used as mobile gateways for resource constrained IoT devices."]} +{"44182431|3494096": ["The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time [1, 20, 21].", ", have been used in IoT applications, in which billion of devices will be connected by wireless communication technologies [20].", "The 3G and 4G are widely used for IoT but not fully optimized for IoT applications [20].", "Existing communication technologies are diverse and it is challenge for the fifth generation (5G) mobile network to meet the requirements of applicaitons in IoT [20].", "To ensure that M2M applications, the three generation partnership project (3GPP) proposed Enhanced Machine-Type Communication (eMTC), Extended Coverage-Global System for Mobile Communications for the IoT (EC GSM-IoT) and Narrowband-IoT (NB-IoT) as cellular-based LPWA technologies for the IoT [20].", "by inferences, such as WiFi signals, buildings, microwaves, etc [20]."]} +{"199013279|4566470": ["), a large amount of data will be collected [1]."]} +{"199013279|3932531": ["At present, the blockchain has provided the solutions to some problems in the fields of the finance [7], the medical care [8], the intrusion detection [9], the food industry [10], and the supply chain management [11]."]} +{"195445688|990486": []} +{"67911592|49343018": []} +{"26193763|27262729": ["This process can be referred as the speed game among the miners with different computing capacities [3], [4]."]} +{"52169284|61132": ["For example, the surveys in [8], [9] focussed on forming ad hoc networks between many UAVs in the sky."]} +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"201103638|209202834": ["The hash power pn that the MU n purchases from the edge-cloud provider follows a uniform distribution on [20-100] MHash/s.", "issue is called as orphaning [33], and this miner does not receive a reward for its mining."]} +{"201103638|53046901": ["The hash power pn that the MU n purchases from the edge-cloud provider follows a uniform distribution on [20-100] MHash/s."]} +{"201103638|49574823": ["\u2022 As shown in the previous work [1], there are some regularities of user\u2019s preferences and network features.", "At each time slot t, the miner receives new IoT data D t 1nm from IoT devices and adds it into a block based on the blockchain concept [1]."]} +{"201103638|5039874": ["The hash power pn that the MU n purchases from the edge-cloud provider follows a uniform distribution on [20-100] MHash/s.", "In addition to mining efficiency, privacy of blockchain users is another important issue that needs to be considered for mobile offloading in MEC-based blockchain networks [25]\u2013[27]."]} +{"201103638|4884302": ["in high-dimensional offloading problems, the dimension of state and action space can be extremely high that makes RL-based solutions inefficient [15], [16].", "In the literature, to solve the offloading issues in mobile systems, various approaches have been proposed, using convex optimization-based methods [12], [13], or machine learning techniques such as reinforcement learning (RL) [14]\u2013[16]"]} +{"201103638|6909107": ["The size of block data to be mined is [5-10] kB."]} +{"201103638|206578365": ["The size of block data to be mined is [5-10] kB.", "Recently, mobile edge computing (MEC), which enables mobile devices to offload their computation tasks to a nearby computationally powerful MEC server, provides effective solutions to solve computation issues of mobile devices [6]\u2013[8]."]} +{"67867352|49574823": ["Any claim process can be catered by incorporating medical facilities, government agencies, smart contracts, and IoT data with the assistance of AI and would allow automatic payouts to different beneficiaries [12].", "The advantage of Blockchain is that it has the potential to eliminate faults and errors as well as detect fraudulent activity associated with falsified IoT data [4], [5], [10]\u2013[12], [19]\u2013[21].", "Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]."]} +{"67867352|4880047": ["Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]."]} +{"67867352|3434731": ["For example, recent medical equipment, such as CT Scan machine, has embedded IoT devices that enable data processing locally and upload the results to Blockchain and off-chain nodes running at the nearby edge [3], [7], [9], [22], [24], [28], [31].", "Recent advancements in decentralized data transactions via Blockchain [5], [11], IoT [12], MEC and Fog Computing [2], [7], [30] and 5G device-to-device (D2D) communication capability [27] will allow secure sharing economy services wherein any number of entities within a mass crowd, such as in a smart city, can perform a multiparty transaction in a decentralized manner [6], [7], [24], [25]."]} +{"15449163|18687271": ["[52] provided three distributed mobility management protocols, the first is based on the existing Proxy Mobile IPv6 (PMIPv6), the second is based on SDN, and the third is based on routing protocols.", "Proposed solutions: Inter-tier, intra-tier, and multi-RATs handoff mechanisms, and a mechanism for secure handoff [40, 93, 102, 52], which we will discuss in Section 5."]} +{"15449163|3330461": ["For a detailed review of D2D communication, interested readers may refer to [24]."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"52454156|3555631": ["Furthermore, it should be considered that some UEs could exploit U/C-plane splitting or DUDe mechanisms [93], [94] to improve their reliability and/or QoS."]} +{"52454156|2623404": ["For more details on SDN, please refer to [16], [21], [22], [23]."]} +{"52454156|10693567": ["From a network point of view, Software Defined Networking (SDN) is considered as the main realization of the softwarization concept [18]."]} +{"52454156|4269723": ["For more details on SDN, please refer to [16], [21], [22], [23].", "SDN introduces the possibility of decoupling network control from forwarding functions by thus allowing flexibility and reconfigurability of the physical network [21]."]} +{"52454156|25929315": ["[12], [13], the next-to-come generation of mobile networks has to face with applications with heterogeneous characteristics and Quality of Service (QoS) requirements."]} +{"52118784|6779551": ["efforts have been exploring novel techniques that can minimize interference in order to enable secure and reliable D2D communication [191]."]} +{"52118784|12206204": ["However, owing to lack of standardization, the wide spread implementation of IoT and subsequently D2D integration with IoT is still a far cry [293], [294]."]} +{"52118784|3330461": ["In [18] the existing literature on D2D is categorized under inband and outband D2D communication."]} +{"52118784|7644489": ["[51] proposed the resource selection scheme namely sensing based selection"]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"210943008|195874391": ["0 in 6G and analysed in [31]\u2013[33]."]} +{"210943008|52008841": ["PHY security technologies and quantum key distribution via visible light communications (VLC) would be the solutions to the data security challenge in 6G [58]\u2013[60]."]} +{"210943008|3738168": ["extending the communication network to underwater environment is a crucial and even necessary element of worldwide connectivity, especially that more than 70% of the earth\u2019s surface is covered by water, and several marine applications needs live monitoring [43]."]} +{"210943008|35260120": []} +{"210943008|3055684": ["ambient radios, but also the energy from micro-vibrations and sunlight [66]."]} +{"210943008|7988320": ["These new communication devices can be wearable devices, integrated headsets, and implantable sensors [37]."]} +{"203703880|11853471": ["A machine learning differentially private [5] was proposed to publish data structures instead of publishing queries and answers directly, in the constraint of differential privacy."]} +{"108312721|49527603": ["blocks, and each block contains a timestamp and a block mark [4]\u2013[6]."]} +{"52059869|206578224": ["[8] focus on how Multi-access Edge Computing", "intelligence and control as advocated by [8] and [93]."]} +{"52059869|206456479": []} +{"52059869|25911553": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|10342730": ["To the best knowledge of the authors, there are no detailed surveys on the topic of network slicing in the literature, except those presented in [6], [7], [9].", "Likewise, in [7], the authors describe how wireless network resources can be adequately allocated to network slices without the resources of one slice negatively impacting the quality of others and with a focus on the Radio Access Net-"]} +{"52059869|6583734": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|11414835": []} +{"52059869|12017064": ["Security concerns in virtual or cloud platforms are well determined [167], [168]."]} +{"52059869|4269723": ["SDN provides key characteristics such as flexibility, service-oriented adaptation, scalability, and robustness [72], which are essential for"]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"139108728|59314746": ["application [56], [57], or particular application such as healthcare [58], [59] or IoT [60]."]} +{"139108728|49527603": ["There are several generic reviews of blockchain technology such as [53], [54] or review papers that target a specific aspect such as security [55] or decentralized"]} +{"139108728|51935081": ["[125] M. Samaniego and R. Deters, \u2018\u2018Blockchain as a service for IoT,\u2019\u2019 in Proc.", "Panarello et al. represent a survey to analyze the research related to blockchain and IoT context [60].", "In Table 11, the list of related studies in the context of blokchain and IoT with the focus on smart contract is presented.", "We categorized them in seven main groups include healthcare, IoT, identity management, record keeping, supply chain, BPM, and voting.", "Samaniego and Deters [125], [126] introduce blockchain as a service for IoT systems.", "Access control management, sharing resources, and record keeping are the primary focus of the decentralized applications specifically in the fields of the healthcare, and IoT, so despite the verity of the applications their focus is narrow down to these three aspects.", "[60] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliafito, \u2018\u2018Blockchain and IoT integration: A systematic survey,\u2019\u2019 Sensors, vol. 18, no. 8, p. 2575, 2018.", "IoT decentralized application.", "Chen et al. [14] present a supply chain quality insurance framework, which includes four layers, IoT devices, distributed ledger, smart contract, and business layer.", "Summary of the selected papers.\napplication [56], [57], or particular application such as healthcare [58], [59] or IoT [60].", "Living Internet Things Cybersecurity IoT, 2018, pp. 1\u20136.", "[126] M. Samaniego and R. Deters, \u2018\u2018Hosting virtual IoT resources on edgehosts with blockchain,\u2019\u2019 in Proc.", "Huh et al. [30] implemented a system based on Ethereum blockchain to configure and synchronize IoT devices by the\nVOLUME 7, 2019 50771\nTABLE 11.", "The required data for monitoring the quality of products, assets, and transactions generates by IoT devices.", "In their system, the written smart contracts control the configuration of IoT devices such as tracking the value of the meter or defining saving policy values.", "They discuss that blockchain and smart contracts can be applied for the configuration of IoT devices, recording data captures from sensors, and micro-payments.", "The privacy and security of the data produced by IoT devices are the major challenges in this field.", "They used IoT devices for measuring the temperature of every parcel containing pharmaceutical products and recorded them on blockchain to make sure about data immutability.", "Healthcare decentralized application.\ndecentralized approach provided by blockchain and manage public key infrastructure (PKI) associated with IoT devices.", "application [56], [57], or particular application such as healthcare [58], [59] or IoT [60].", "Mainly the represented studies focused on using blockchain and smart contracts to control the access to the data generated by IoT devices as well as addressing the privacy concern [26]\u2013[29].", "[27] A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, \u2018\u2018Towards a novel privacy-preserving access control model based on blockchain technology in IoT,\u2019\u2019 in Proc.", "[30] S. Huh, S. Cho, and S. Kim, \u2018\u2018Managing IoT devices using blockchain platform,\u2019\u2019 in Proc.", "represent a survey to analyze the research related to blockchain and IoT context [60].", "[32] F. Lombardi, L. Aniello, S. de Angelis, A. Margheri, and V. Sassone, \u2018\u2018A blockchain-based infrastructure for reliable and cost-effective IoTaided smart grids,\u2019\u2019 in Proc.", "A. INTERNET OF THINGS The significant increase in IoT devices in last years leads to exposing insecure big data."]} +{"139108728|49867601": ["A. CLASSIFICATION OF SECURITY PROBLEMS Luu et al. introduce classes of security problems in Ethereum smart contracts and they propose methods to refine the operational semantic of Ethereum to increase the security of smart contract [84].", "M\u00fchle et al. present four essential components of selfsovereign identity (SSI) [37].", "present four essential components of selfsovereign identity (SSI) [37].", "PLATFORMS OVERVIEW AND KEY CONCEPTS A. PUBLIC AND PERMISSIONED BLOCKCHAIN Public blockchain initially introduced by Bitcoin, which its nodes are untrusted."]} +{"139108728|13688847": ["Because of the initial user filtering, permissioned blockchain can use lighter consensus mechanism (semi-centralized consensus methods [64]) so, they process transactions faster.", "[64] reviews blockchain consensus algorithms with the focus on both distributed consensus system design and incentive mechanism design for permission-less blockchains."]} +{"54454620|3434731": ["The PBFT assumed that the faulty nodes only comprise less than thirty percent of the total nodes of the network [37]."]} +{"46894900|36400013": ["Past studies have suggested different approaches to this problem and concluded that the most efficient solution consists of a distributed network of trusted validators [2]."]} +{"46936025|13756844": []} +{"174820745|21386749": ["significant changes in e-health operations [7], [8]."]} +{"4735659|9651858": ["Reference [28] outlined the spectrum sharing mechanism for the next generation cellular networks to overcome the"]} +{"4735659|13019489": ["Reference [25] studied the concept of dynamic spectrum sharing, and investigated various existing spectrum sharing scenarios with different network topologies, features, challenges, and probable use cases."]} +{"4735659|19938676": ["With the rapid development of broadband wireless access and mobile terminal technology, people are eager to obtain information and services from the Internet at anytime, anywhere and even in the process of moving, and the mobile Internet has been developed rapidly in such a background [2]."]} +{"4735659|12029139": ["Electromagnetic waves energy harvested by CR focused by many scholars, and there have been a number of representative studies [106], [129], [130], including hardware design and efficient energy sensing algorithms, etc."]} +{"4735659|3348390": ["As it can be seen, by the year 2020, when 33 billion devices like machine to machine (M2M), smart objects, smart grid, smart home, smartphones, PCs, tablets and wearable devices will be in use [10], [11]."]} +{"4735659|15116409": ["In order to satisfy the needs of cognitive users to detect spectrum opportunities reliably in a wide frequency range in the future, [20] summarized various wideband spectrum sensing algorithms and discusses the advantages and disadvantages of each algorithm and their challenging problems.", "In spite of the extensive literature on CR, there are few papers to discuss the available spectrum exploration issues toward 5G, while several studies separate overview the spectrum sensing [20] and spectrum access [26] in CR networks.", "Based on the compressed sensing theory, compressive spectrum sensing algorithm was presented in [20], [76], and [77], which can extract and detect the wideband signal directly to achieve efficient wideband"]} +{"4735659|8974063": ["Reference [23] presented an up-to-date survey of spectrum decision in CRNs based on spectrum characterization, spectrum selection, and CR reconfiguration."]} +{"4735659|2509135": ["In order to improve the utilization of licensed spectrum as much as possible, various multiplexing technologies such as Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Multiple-Input Multiple-Output (MIMO) techniques are used to support more users on the limited spectrum resources [32], but they cannot fundamentally solve the problem of spectrum resources scarcity caused by fixed allocation policy."]} +{"4735659|31662905": ["energy crisis, and the spectrum sharing between satellite telecommunication networks and terrestrial has been surveyed in [29], which focuses on the investigation of the feasibility of spectrum sharing between geostationary orbit and non-geostationary orbit satellite systems."]} +{"4735659|15453366": ["Many countries, including the United States and Europe, have divided 60GHz band into 5GHz \u223c 7GHz unlicensed continuous spectrum resources for general use [38]."]} +{"2459484|16378550": []} +{"2459484|3330461": ["Authors in [1] proposed taxonomy based on the D2D communication spectrum and reviewed the available literature under the proposed taxonomy.", "In academia, different surveys have been proposed in the literature [1, 2, 15] in which, different fields related to this technology was addressed (node discovery, interference and radio resource management, use cases and requirements, power control, system architecture and design, etc."]} +{"2459484|7644489": ["In [4], a brief overview of standardization activities of the 3GPP ProSe in LTE-A is presented."]} +{"86722298|49574823": ["Some variants [18], such as Delegated PoS (DPoS), Transactions as PoS (TaPoS), PoS-Velocity (PoSV), Delegated Byzantine Fault Tolerance (DBFT) and Bitcoin-NG, select some ones to generate and validate blocks to improve the scalability, throughput and latency."]} +{"86722298|27262729": ["2) Security and Privacy: Despite the original security and privacy issues of blockchain [96], outsourcing services at the edges in the integrated system of blockchain and edge computing presents new security and privacy challenges."]} +{"86722298|206578365": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "With these short propagation distances, edge computing has the potential of realizing tactile-level latency for many latency critical applications that may require tactile speed with latency approaching 1ms [29]."]} +{"86722298|9495329": ["The virtual resources of network virtualization share many common elements in notions and interchangeably terms with SDN [53]."]} +{"86722298|3818445": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "Nonetheless, its security and privacy are signi\ufb01cant challenges, due to the interplay of heterogeneous edge nodes and the migration of services across edge nodes [5].", "Nonetheless, its security is a signi\ufb01cant challenge [5], [30], [31].", "These promised gains make it a key technology for realizing various visions for next-generation Internet, such as IoT [5] and Tactile Internet (with millisecond-scale reaction time) [28]."]} +{"86722298|3434731": ["Therefore, the integration of blockchain and edge computing into one system becomes a natural trend [6]\u2013[8].", "The sidechain scheme permits developers to connect new sidechains to the mainchain (e.g., Ethereum) with to-and-from transferring of the ledger assets [6]."]} +{"49654055|206578365": ["To address this issue, mobile edge computing (MEC) emerges as an enabling technology that brings computing resources closer to the end users, which can significantly educe energy consumption and shorten transmission delay [4]."]} +{"52902669|21386749": ["The Internet of Things (IoT) concept has already been implemented by numerous application domains such as smart home, healthcare, vehicles, and wearables [1\u20133]."]} +{"203655643|56895323": []} +{"21704199|925507": ["security issues in IoT service system as it is essentially distributed and users are anonymous in it [28]."]} +{"52954768|3932531": ["Once the transaction considered complete it is stored as a permanent record in the blockchain [12] [13]."]} diff --git a/edge/graph_20925476.jsonl b/edge/graph_20925476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fe94982161ddbf1c5f8afcfd558aa208af82d68 --- /dev/null +++ b/edge/graph_20925476.jsonl @@ -0,0 +1,3 @@ +{"7003539|2451860": []} +{"9266479|1413700": ["In client-server model, mobile clients are connected to fix host through mobile base station [3].", "In other non-optimistic environments, using optimistic protocols led to high rate of abortion [2, 3, 5]."]} +{"9266479|2451860": ["Applying pessimistic common classic methods of concurrency control (like 2pl) in mobile database leads to long duration blocking and increasing waiting time of transactions.", "To reduce abortion rate of transactions, in execution time of transactions` operators a timestamp is assigned to them.", "KEYWORDS\nConcurrency Control, Mobile Database, Commitment Ordering"]} diff --git a/edge/graph_209316260.jsonl b/edge/graph_209316260.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209319585.jsonl b/edge/graph_209319585.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a3aef74a717d8da70b98c1e04e3609f2a10e741 --- /dev/null +++ b/edge/graph_209319585.jsonl @@ -0,0 +1,37 @@ +{"15602039|763939": []} +{"3800093|3834736": ["to other vehicles in the vicinity [3].", "The literature contains several congestion control proposals based on the message frequency adaptation, and transmit power adaptation [3], [7]\u2013[13].", "While inherent VANET characteristics cannot be controlled, technological limitations can be reduced to an acceptable range using techniques such as adaptive beaconing approaches for congestion control [3], [6]."]} +{"27353195|2835258": []} +{"11022734|763939": ["In the rest of this section, we briefly review the most well known, but an extended survey and comparison of such tools can be found in [30]."]} +{"49563222|3834736": ["Different strategies have been proposed to control the load generated by beaconing in the control channel (CCH), and at the same time to guarantee the communication requirements of safety applications [6]."]} +{"6059772|763939": ["An extended description of mobility models for vehicular networks is given in [78]."]} +{"15332946|763939": ["Yet, a micro-macro approach may be seen more as a broad classification schema than a formal description of the models\u2019 functionalities in each class [4]."]} +{"54462649|8523192": ["Fog computing includes a series of mechanisms and features of cloud computing, but its proximity to end-users, geographical distribution and supporting of mobility distinguishes it from cloud [14, 15]."]} +{"54462649|2758659": ["Data forwarding methods are divided into five groups: ad-hoc routing, position-based routing, cluster-based routing, broadcast routing, geographic-based routing [4]."]} +{"54462649|4269723": ["In SDN architecture, network controller is responsible for providing the routing information in the network and is centralized and independent of the network nodes [13, 14].", "The application layer consists of SDN applications designed to meet the needs of users [13]."]} +{"155950886|17206258": ["Recent years, some VANET broadcasting algorithms have been proposed, such as [6]\u2013[9]."]} +{"1030016|10329355": []} +{"1030016|18801114": []} +{"5384228|4787452": ["Existing proposals have developed CSMA (Carrier Sense Multiple Access)- and TDMA (Time Division Multiple Access)-based MAC protocols to tackle this problem [8]."]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"7976343|11210789": ["ROVER: VANET Robust Vehicular Routing.", "The example of this approach is Robust Vehicular Routing (ROVER)\nprotocol [20] whichwill be explained in Section 4 and summarized in Table 2 also [21].", "7 ROVER [25, 26] Y N N N N Y Y N Y N Y N 2007", "ROVER is categorized as multicast geographical protocol.", "The delay also rises due to retransmissions and redundant messages [5, 26].", "ROVER is reliable and efficient geographical multicast protocol because it floods only control packets, whereas the data packets are unicasted."]} +{"83459215|45443560": ["Hogie et al.(2) presented a performance comparison between NS-2, NS3, OMNeT++, and GloMoSiM using ad hoc ondemand distance vector (AODV) routing protocol.", "Hogie et al.2 presented a performance comparison between NS-2, NS3, OMNeT++, and GloMoSiM using ad hoc ondemand distance vector (AODV) routing protocol.", "Currently, there are many network simulation tools (listed in Hogie et al.2) that allow users to model local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs); these include NS-2,3 NS-3,4 OPtimized Network Engineering Tool (OPNET),5 QualNet,6 and OMNet++.7 There are several criteria for evaluating the behavior and performance of network simulators.", "Three variables must be considered to evaluate routing protocol using simulators: memory usage, computation time, and CPU utilization.(2) Table 2 illustrates the comparison.", "Currently, there are many network simulation tools (listed in Hogie et al.(2)) that allow users to model local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs); these include NS-2,(3) NS-3,(4) OPtimized Network Engineering Tool (OPNET),(5) QualNet,(6) and OMNet++."]} +{"3431063|3834736": ["Adaptive beaconing can be divided into message frequency control, transmit power control or hybrid based approaches [11] [12]."]} +{"3431063|2335874": ["Adaptive beaconing can be divided into message frequency control, transmit power control or hybrid based approaches [11] [12]."]} +{"16516363|2835258": ["Such networks composed of moving vehicles, are capable of providing communication among nearby vehicles and the roadside infrastructure."]} +{"116846186|1116024": []} +{"116846186|4787452": ["[38] also discusses the different protocols under each approach with their pros and cons.", "3 Scheduling based MAC Protocol: The author in [38] has performed an intensive survey on the use of TDMA protocol in VANETs."]} +{"116846186|38911919": []} +{"18205214|4787452": []} +{"23562783|7972041": ["between transmitter and receiver [43], [46]."]} +{"23562783|12127373": []} +{"15463998|7972041": ["\u2022 Due to varying vehicular tra\ufb03c density and mobility, the network topology is highly dynamic and depends on the time of day, type of road and other features [40, 41]."]} +{"54167138|3834736": ["A key characteristic of ITSs is the public interest in the sensed information by any vehicle [5].", "For a detailed discussion on various beaconing approaches in literature, readers can refer to our previous work [5].", "Beaconing refers to the periodic transmissions of small messages (i.e., beacons) within the communication range of a vehicle [5]."]} +{"62877856|4787452": ["However, safety services require not only fast access but also low delay, while user-oriented services require large bandwidth [8].", "To provide wireless communications in a VANET environment, MAC layer design must overcome the following challenges to implementing a highly efficient MAC protocol for VANET networks [8,10].", "In addition, contention-based MAC protocols allow that each vehicle will randomly attempt to transmit on the channel when it needs to transmit by using a priority-based access scheme that employs both Enhanced Distributed Channel Access (EDCA) and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanisms [8].", "[8] 2015 Identify the reasons for using the Time-Division Multiple Access (TDMA)-based MAC paradigm in VANETs TDMA-based protocols using dynamic intervals are not clearly discussed", "[8] studied the TDMA-based MAC paradigm in VANETs through analyzing the advantages and disadvantages compared with other MAC methods.", "In [8], the authors classified TDMA-based MAC protocols under different scenarios and studied their advantages and limitations."]} +{"62877856|207748179": []} +{"62877856|4709516": ["protocols cannot guarantee appropriate operation [11]."]} +{"62877856|38911919": ["two cluster head election methods [19]: 1) a secondary and"]} +{"206741247|2335874": ["In addition, the MObility model generator for VEhicular network (MOVE) was used to convert the mobility model generated by SUMO to an acceptable scenario for NS2 [65]."]} +{"16139052|7482876": ["Due to high mobility of vehicles, communication channels are susceptible to fast fading, whereby reliable links cannot be guaranteed [98]."]} +{"16139052|763939": ["In the literature, many research studies have been undertaken so as to provide a close-to-reality mobility model for VANETs [129,130]; however, those proposed models are suitable for only a small number of scenarios (e."]} +{"86721071|7972041": []} +{"86721071|38911919": []} diff --git a/edge/graph_209319719.jsonl b/edge/graph_209319719.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9379f9746e0feee1d32925e06410d4d473b6496e --- /dev/null +++ b/edge/graph_209319719.jsonl @@ -0,0 +1,13 @@ +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"14544742|13093354": []} +{"44587140|8310135": ["Since the latter tasks can be achieved with an accuracy varying from 80 to 90% [ 2 ], obtaining precision/recall figures oscillating around 60% for event extraction (usually involving several entities and relations) is considered to be a good result."]} +{"13807460|1142636": []} +{"13807460|8310135": []} +{"70346512|14176218": ["\u2026unstructured texts, and it has shown to be bene\ufb01cial for a big variety of real-world applications including Information Retrieval (IR) (Allan 2002; Campos et al. 2014), Question Answering (QA) (Saur\u00b4\u0131 et al. 2005; Kuchmann-Beauger, Aufaure, and Thollot 2015), Automatic Text Summarization (Ge et\u2026", "\u2026in unstructured texts, and it has shown to be bene\ufb01cial for a big variety of real-world applications including Information Retrieval (IR) (Allan 2002; Campos et al. 2014), Question Answering (QA) (Saur\u00b4\u0131 et al. 2005; Kuchmann-Beauger, Aufaure, and Thollot 2015), Automatic Text Summarization (Ge et\u2026"]} +{"2476229|8310135": ["Recently, Huang et al. (2015) showed that building a conditional random \ufb01eld (CRF) layer on top of bidirectional LSTM-RNNs performs comparably to the state-of-the-art methods in the part-of-speech (POS) tagging, chunking, and NER.", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and\u2026", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and relation is important for high performance (Li and Ji, 2014; Miwa and Sasaki, 2014) since relations interact closely with entity information.", "LSTM-RNNs have been widely used for sequential labeling, such as clause identi\ufb01cation (Ham-merton, 2001), phonetic labeling (Graves and Schmidhuber, 2005), and NER (Hammerton, 2003)."]} +{"62348764|18526204": ["Application Area (Domain) Authors News tracking [36] Joint ventures [10, 11] Academic citations [17] Business intelligence gathering [62] Microelectronics [12] Project reports [65] Corporate news [2, 9] Corporate filings [26, 28, 40, 66, 68] Terrorism [3, 29, 39, 56, 57, 58] Customer care Data cleaning See [32, 47, 59, 63] Classified advertisements Comparison shopping TABLE 2."]} +{"62348764|206742377": []} +{"62348764|8125630": ["\u2026extraction task is important as it could facilitate the creation of highly useful multi-dimensional online analytical processing (OLAP) reports [6] \u2013 such as \u201cincidents by time of day\u201d, \u201cincidents by week of year\u201d, \u201cincidents by place\u201d, \u201cincidents by mode of attack\u201d, \u201cterrorist organization by\u2026"]} diff --git a/edge/graph_209319743.jsonl b/edge/graph_209319743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4318da3ab30030c0d2c856dd05653377c7c98db3 --- /dev/null +++ b/edge/graph_209319743.jsonl @@ -0,0 +1,18 @@ +{"127339990|15093118": []} +{"3285930|16403716": ["image retrieval [8], [9], content-based video search [10], and object instance search [11], vehicle Re-Id is to find the vehi-"]} +{"3285930|16525678": ["Vehicle Re-Id can be pervasively applied in intelligent surveillance systems [5], smart transportation [6], and urban"]} +{"206592484|456491": []} +{"1033682|174797842": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"29910972|16525678": ["pervasive applications in video surveillance [4], intelligent transportation [5], and urban computing [6], which can quickly discover, locate, and track the target vehicles in large-scale surveillance videos."]} +{"5276358|393948": ["The third class of algorithms and more related to our paper is unsupervised learning of visual representations from the pixels themselves using deep learning approaches [21, 26, 44, 39, 29, 47, 9, 33, 2, 49, 8]."]} +{"53283703|15093118": []} +{"3871203|1596835": ["Due to the space limit, we refer the interested readers to re\u00ad cent surveys on hashing methods [18], [19], [20], and only focus on recent works on deep hashing."]} +{"3871203|5671282": ["Due to the space limit, we refer the interested readers to re\u00ad cent surveys on hashing methods [18], [19], [20], and only focus on recent works on deep hashing."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"54442699|16525678": ["Vehicle reID has pervasive applications in public security [4], intelligent transportation [5] and video surveillance [3], which can quickly discover, locate and track the target vehicle."]} +{"162168531|58981448": ["With great progress in person Re-ID [31]\u2013[33], vehicle Re-ID has gradually gained a lot of attention recently since vehicles are the most important object in urban surveillance."]} +{"53600613|16525678": []} +{"24463805|15093118": []} +{"123081582|14970359": [", [18], [19] provide a broad overview of over three hundred papers and numerous approaches for analyzing human motion in videos, including human motion capture, tracking, segmentation and recognition."]} +{"123081582|7788290": []} diff --git a/edge/graph_209320179.jsonl b/edge/graph_209320179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0eb9ad1f1282a5ec9ba94a286439a5db40b02dd --- /dev/null +++ b/edge/graph_209320179.jsonl @@ -0,0 +1,27 @@ +{"52006776|10739218": ["The main advantage is that they are universal approximators and capable of adapting interpretable IF-THEN rules to training data [2]."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"54602508|393948": ["Different from the traditional hand-crafted features [5], [6], [7], a multi-layer neural network architecture can ef\ufb01-ciently capture sophisticated hierarchies describing the raw H. Li is with the School of Computer and Information Engineering, Jiangxi Normal University, Jiangxi, China."]} +{"206725404|393948": ["While the low-level features can be hand-crafted with great success for some speci\ufb01c data and tasks, designing effective features for new data and tasks usually requires new domain knowledge since most hand-crafted features cannot be simply adopted to new conditions [1], [2].", "Each stage generally comprises of \u201cthree layers\u201d \u2013 a convolutional \ufb01lter bank layer, a nonlinear processing layer, and a feature pooling layer."]} +{"9928823|393948": ["(2013) extended the recursive neural network to its tensor, in a similar way that the DNN was extended to its tensor version (Yu et al., 2013), and"]} +{"17776695|27637541": ["Despite the presence of surveys [2], [15], [16] and proliferation of different types of sensors in the AL field, a comprehensive study concentrating on the utilized sensor signal processing methods is not available."]} +{"17776695|14397159": ["Despite the presence of surveys [2], [15], [16] and proliferation of different types of sensors in the AL field, a comprehensive study concentrating on the utilized sensor signal processing methods is not available."]} +{"29473256|23774449": ["Some related review articles have been presented [19, 23, 37]; however, these papers have not investigated specifically different action recognition approaches in temporal dimension modelling.", "Furthermore, they were particularly investigated in the area of time-series data [19] and human action recognition [23].", "[23] introduced recent human action recognition datasets and reviewed important works that applied deep learning methods to these datasets."]} +{"29473256|18599847": ["Some related review articles have been presented [19, 23, 37]; however, these papers have not investigated specifically different action recognition approaches in temporal dimension modelling.", "Furthermore, they were particularly investigated in the area of time-series data [19] and human action recognition [23].", "They obtain impressive results in learning powerful models with high capabilities of representation [19]."]} +{"29473256|9928823": ["\u2026\u2022 learning unrelated factors to the discriminating task \u2022 BMs, while having very simple learning algorithm, are very slow to compute in learning [31] \u2022 fine-tuning phase of a stochastic gradient descent learning algorithm, which makes it difficult to parallelise across-machines and deploys at\u2026", "Its hierarchical architecture makes it possible to create high-level concepts from related low-level ones where many models of this group are based on unsupervised learning [12, 31, 32]."]} +{"29473256|393948": []} +{"10048432|12801953": ["In a broad sense, learning novel categories is addressed by exploiting and transferring knowledge gained from familiar categories [70, 14, 86, 77, 72, 87]."]} +{"17399198|393948": ["A hierarchical feature representation is considered to be richer in a sense that more properties can be represented in a multilevel structure[3], [2], [8], [13]."]} +{"206757279|393948": []} +{"18468934|393948": ["The main reason for this disadvantage is that a multi-layer ANN with more than one hidden layer cannot be trained using conventional training\napproaches because of the vanishing gradient problem [7].", "PREDICTION METHODOLOGY"]} +{"7038503|393948": ["For a basic auto-encoder as a typical module of SAE, it reconstructs the input through two stages, an encoder and a decoder [26]."]} +{"23450275|393948": []} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"4376168|8516210": ["Depending on the properties of surface texture, ASI methods can be divided into four categories [6]: 1) structural; 2) statistical; 3) \ufb01lter-based; and 4) model-based approaches."]} +{"37959765|393948": ["employed to de-correlate the data and widely used in many DNN architectures [2], [3].", "the regularizer ( ) can be defined based on the KL divergence [16], the distance between the average hidden states of all features and a small constant vector [2], or some other sparsity inducing functions [3].", "Furthermore, we preprocess the local descriptors before learning [2], [3] and initialize the parameters with kmeans result for the stacked DAE network."]} +{"207217044|9928823": []} +{"32093723|15273230": ["In each iteration boosting provides equal weights to the misclassified samples, thereby, classifying them correctly [18].", "This technique is known as SMOTEBoost[17] where in SMOTE is combined with standard boosting procedure [18]."]} +{"3388071|393948": ["As already mentioned, scattering networks follow the architecture of DCNNs [2], [7]\u2013[11], [15]\u2013[21] in the sense of cascading convolutions (with atoms { \u03c8 \u03bb } \u03bb \u2208 \u039b W of the wavelet frame \u03a8 \u039b W ) and non-linearities, namely the modulus function, but without pooling.", "While DCNNs can be used to perform classi\ufb01cation (or other machine learning tasks such as regression) directly [2], [7], [9]\u2013[11], typically based on the output of the last network layer, they can also act as stand-alone feature extractors [15]\u2013[21] with the resulting features fed into a classi\ufb01er\u2026", "Spectacular success in practical machine learning tasks has been reported for feature extractors generated by so-called deep convolutional neural networks (DCNNs) [2], [7]\u2013[11], [13], [14].", "A central task in machine learning is feature extraction [2]\u2013[4] as, e.g., in the context of handwritten digit classi\ufb01cation [5]."]} +{"5017487|18543658": ["To address this issue we propose a data augmentation method that we describe in the next section."]} +{"5017487|6028805": ["infrared imaging is ideal for low-light nighttime and covert face recognition applications [24], but it is not possible to"]} +{"4300209|393948": ["The generation of the final cosaliency map is introduced in Section III-E."]} +{"52965917|2088679": ["In other words, deep learning technologies can convert input data (e.g. images, speech and video) into outputs (e.g. object category, password unlocking and tra\ufb03c information) by the model [24]."]} diff --git a/edge/graph_209321121.jsonl b/edge/graph_209321121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d120a7bef1a463a1d73c367c7d432257196b2c19 --- /dev/null +++ b/edge/graph_209321121.jsonl @@ -0,0 +1,28 @@ +{"49537257|15880829": ["Basically, WSN is a distributed network formed by a large number of sensor nodes where each node is equipped with a sensing and computing device, radio transceivers and power components [1], [2]."]} +{"53014287|16939966": ["Several challenges have to be tackled during BSN development, and a few remarkable ones include interference reduction [31], data validation and consistency [32], heterogeneity and interoperability [33], security and privacy [34], and programming [27]."]} +{"56176442|19788427": []} +{"20712275|15453366": ["propagation channels, antenna technology, transceiver integration, and digital signal processing [17].", "less otherwise specified, the parameters in (1) are dB [17], dB [33], dBm at a standard temperature 17 , GHz, dB (a reasonable assumption based on Table III for Si technologies), dB,"]} +{"52962752|3504276": []} +{"53018287|10235514": ["THE next generation communications systems are anticipated to connect billions of devices arising from the popularity of wearable electronics and handhold devices as well as to provide orders of magnitude increase in capacity [1]."]} +{"53018287|21418": ["To differentiate different relays, we set the distances in meters from HAP to the relays as df = [2, 3, 4], which implies that relay-1 generally has the most preferable channel condition."]} +{"53018287|12029139": ["million practically), high charge and discharge efficiency at small energy levels [5]."]} +{"5067739|19938676": ["G MASSIVE MIMO OCAs Massive Multiple Input Multiple Output (MIMO) is one of the key emerging technologies of the next generation networks i.e. 5-", "[57] L. Jing, C. R. Rowell, S. Raju, M. Chan, R. D. Murch, and C. P. Yue, \u2018\u2018Fabrication andmeasurement ofmillimeter-wave on-chipMIMOantenna for CMOS RFIC\u2019s,\u2019\u2019 in Proc.", "To achieve these features, the front-end of 5-G enabled devices would rely on hundreds of antennas which will be operating simultaneously referred to as massive MIMO [63].", "G enabled devices would rely on hundreds of antennas which will be operating simultaneously referred to as massive MIMO [63]."]} +{"5067739|21386749": ["There are several auspicious domains in this regards, few of which are briefly discussed below:\nA. MEASUREMENT SETUPS FOR MINIATURIZED OCAs FOR IoT BASED BIOMADICAL IMPLANTS Themost promising future application of OCA is in IoT wireless devices and systemswhich are expected to get dominance in near future [59].", "A large proportion of IoT devices will be wireless [60] and they need to be compact, ultra-low power and in some cases battery-less.", "Remote health monitoring of patients is one of the most prominent applications of IoT [61] which may also include the use of\nTABLE 2.", "Remote health monitoring of patients is one of the most prominent applications of IoT [61] which may also include the use of TABLE 2."]} +{"52927900|2357830": ["To resolve these concerns, a number of research disciplines are brought forward, including signal processing, hardware design, supply chain logistics, privacy rights, and cryptography [24]."]} +{"52964890|1902483": ["In fact, microwave power transmission (MPT) seems the most suitable method for long distance WPT applications [2]."]} +{"4604329|12029139": ["[12] study a cognitive D2D communication underlying a cellular network where the D2D transmitters first harvest energy from the ambient energy sources and then use the energy for further transmission, and the locations of wireless terminals are modeled by PPP."]} +{"11739870|19788427": ["wireless technology is more mature and is completely CMOS compatible [16], [10].", "links and surface-wave interconnects are also more power and cost efficient than the on-chip optical links [16]."]} +{"23431701|12029139": []} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"49557456|8323234": []} +{"52957695|12029139": ["Rather than relying solely on the batteries, IoT devices are also able to replenish energy by WIPT in a sustainable and controllable way [1]."]} +{"49886356|1177069": ["or VRP methods [8], or they consider covering a single region, which can be solved by CPP methods [12].", "In cases when a UAS is assigned to survey a region, the coverage path planning (CPP) problem [12], [13] is formulated, which aims at finding the optimal path, so that the vehicle covers a region completely."]} +{"46955352|207547101": []} +{"49194701|8132405": []} +{"52198319|8323234": []} +{"10251731|8323234": ["Compared to architecture A1, the maximum gain of each transceiver is reduced by a factor 1 /L r ."]} +{"3662785|35695099": ["INTRODUCTION In the last years Unmanned Aerial Vehicles (UAVs) have experienced a great cost reduction while improving technical capabilities such as avionics and propulsion systems [1], batteries capacity, obstacle avoidance methods [2], multiband communications [3], and sensor integration."]} +{"8633715|8323234": []} +{"49557409|19788427": ["A comparison between the different solutions with their advantages and disadvantages is presented in [3]."]} +{"52986808|9045705": []} diff --git a/edge/graph_209322162.jsonl b/edge/graph_209322162.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18d3aad374e32b15a2a0534d7b4bf20dab437255 --- /dev/null +++ b/edge/graph_209322162.jsonl @@ -0,0 +1,5 @@ +{"16502769|9176080": ["This makes pure steganography impractical without cryptography, which deals with secure communication over an insecure channel: the message is scrambled and authenticated with some keyed algorithm before being concealed in a cover medium, [9, 10]."]} +{"64613175|9176080": ["2 Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON N9B 3P4, Canada steganography can conceal the very existence of the secret communication itself (Cheddad et al. 2010)."]} +{"51889259|9176080": []} +{"40079327|9176080": []} +{"1033682|174797842": []} diff --git a/edge/graph_209323127.jsonl b/edge/graph_209323127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..971788296eca3a87a51166f1709d82271b952129 --- /dev/null +++ b/edge/graph_209323127.jsonl @@ -0,0 +1,14 @@ +{"15214450|13785718": ["According to Kiah [13] the cloud has a layered architecture in which it has a backbone layer (physical servers and switches), supervisor software layer (OS, Hypervisor, Middle-ware),Software infrastructure layer shown in fig 2 which provides data storage, communication as service and", "Therefore according to Kiah [13] MCC is defined as \u2018\u2018a service that allows resource constrained mobile users to adaptively adjust processing and storage capabilities by transparently partitioning and offloading the computationally intensive and storage demanding jobs on traditional cloud resources by providing ubiquitous wireless access\u2019\u2019."]} +{"17889756|627405": ["identified several issues of electronic search derived from their experience in conducting SLRs (Brereton et al., 2007).", "Brereton et al. (2007) identified several issues of electronic search derived from their experience in conducting SLRs."]} +{"27054455|6670217": ["There are also a variety of other ways for malware to infect targets [4]."]} +{"17074660|1113420": ["One of the proposed testing techniques, based on a systematic and automatic exploration of the behaviour of an Android app, has been implemented and some preliminary case studies on real apps have been carried out in order to explore their effectiveness."]} +{"63841224|18269383": ["Artificial intelligence based applications [6,8,16,27,37] The proposed work aims to reduce computation time on robots by using an offloading technique."]} +{"63841224|16654832": ["These applications are partitioned at different granularity levels and the components are sent (of\ufb02oaded) to remote servers for remote execution in order to extend and enhance the SMD\u2019s capabilities.", "A consistent access to cloud services is expected wherein SMDs are enabled to access cloud computing services regardless of the installed operating system or the used hardware.", "It calls the SMD\u2019s operating system, like Android OS, to execute the application.", "In MCC, mobility is one of the most important attributes of SMDs.", "Although the predictions that mobile devices will be dominating the future computing devices, mobile devices along with their applications are still restricted by some limitations such as the battery life, processor potential, and the memory capacity of the SMDs [31].", "MCC can be seen as a bridge that \ufb01lls the gap between the limited computing resources of SMDs and processing requirements of intensive applications on SMDs."]} +{"18916471|10398826": []} +{"23391297|26688999": []} +{"72682|17365575": ["Studies [15][16] provide an overview of software testing as a service (TaaS), while literature survey [17] highlighting the current situation of security measurement and testing on the cloud."]} +{"72682|10398826": ["In particular, one study focuses on publications dated during the period 2009-2012 and classifies relevant literature according to the type of testing activities for cloud services and the type of application domains [7]."]} +{"72682|627405": ["The review protocol provides a plan for the process of conducting a review, including study selection and data extraction, with the aim to answer the research questions [4]."]} +{"70211941|627405": []} +{"207696020|8250043": ["There are several ways to analyze the existence of vulnerabilities in SOA (Service Oriented Architecture) [19], e.", "The interested reader can consult [19] and [20] for a more complete introduction on the subject.", "Under the concept of Service Oriented Architecture (SOA), Web Services are in constant communication with other services.", "There are several ways to analyze the existence of vulnerabilities in SOA (Service Oriented Architecture) [19], e.g. compare server responses in the presence of attacks\nand absence of them, sensitive information exposure, XML schema modification request, among others."]} +{"54464833|24766563": ["These digital libraries were chosen because they are considered relevant search engines for SLRs in software engineering [31]."]} diff --git a/edge/graph_209324034.jsonl b/edge/graph_209324034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209324068.jsonl b/edge/graph_209324068.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf03d0686a9107e0d44150203bdca0293233ce54 --- /dev/null +++ b/edge/graph_209324068.jsonl @@ -0,0 +1,3 @@ +{"3362349|393948": ["This can be attributed to the DNN\u2019s ability to learn higher level abstractions of raw features (termed representation-learning [3]), which substitutes manual feature engineering or the usage of high level features."]} +{"146806722|12595430": ["Analyzing and monitoring heterogeneous data is a complex challenge and exacerbates the problems facing intrusion detection systems [36]."]} +{"9302624|10996225": ["Machine learning has been applied to malware detection at least since [25], with numerous approaches since (see reviews [12, 17])."]} diff --git a/edge/graph_209324099.jsonl b/edge/graph_209324099.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a205d327aeba591837669b801987f9600865a7ff --- /dev/null +++ b/edge/graph_209324099.jsonl @@ -0,0 +1,7 @@ +{"52964401|3330313": ["CDF (Cumulative Distribution Function) of normal distribution [1] is given by Anomaly score of this observation X i,j is then calculated as which is a measure of outlier [4]."]} +{"14427572|206778480": ["[21] recently conduct a systematic review on defect prediction models.", "Hall et al. (2012) recently conduct a systematic review on defect prediction models."]} +{"19032755|206778480": ["\u2026best performing classifiers independently from data manipulation used in cross-validation, confirming the results in Menzies et al. (2007b) and Hall et al. (2012), and is crucial to determine key input variables for the classification problem (Khoshgoftaar et al. 2010; Menzies et al. 2007b;\u2026", "Yet, we did not repeat the analysis with different types of classifiers (i.e., Bayesian models) that seem promising with software modules (Menzies et al. 2007b; Hall et al. 2012).", "This confirms the findings in Hall et al. (2012) where SVMs are used as fault predictors for software modules.", "In their systematic literature review on fault prediction performance in software engineering, Hall et al. (2012) report that feature reduction improves performance of models.", "It might also lead to the undesirable consequence of model under-fitting or over-fitting, i.e. to use models with a complexity that does not correspond to the one of the actual system behavior (Hall et al. 2012; Alpaydin 2010).", "Other models have been proven to be good predictor of faults in software modules, like the Bayesian models (Hall et al. 2012).", "The method we propose builds predictors that managers and practitioners can easily use to perform risk analyses, as suggested by Hall et al. (2012).", "This increases the noise in fitting and possibly cause overfitting (Alpaydin 2010; Hall et al. 2012)."]} +{"8674730|9913343": ["The ratio of login failure is considerably lower than that typically seen in computer systems [3]."]} +{"199502002|17084360": []} +{"15864147|17567998": []} +{"52068548|7165993": ["They have been used widely in both academia and industry to assess and improve the effectiveness of existing test suites [3, 5, 43, 46, 51, 53].", "Consider the if statement at line 4 in our running example: depending on the true/false values for the conditional variable a, there can be two call paths generated: [4, 5, 50, 51, 52] and [4, 6, 7]."]} diff --git a/edge/graph_209335131.jsonl b/edge/graph_209335131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209336262.jsonl b/edge/graph_209336262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..201709dcce8cc0aab02b91e2e83bc904b64e4cdd --- /dev/null +++ b/edge/graph_209336262.jsonl @@ -0,0 +1,13 @@ +{"3351302|495481": ["As proved by some previous researches [34\u201337], the combination of visible light and thermal images can be used to enhance the performance of several image-based systems such as pedestrian detection, disguise detection and face recognition."]} +{"206592484|456491": []} +{"4549119|4570087": []} +{"25539509|4570087": ["Generally speaking, from the perspective of model, classi\ufb01cation models as used in image classi\ufb01cation [23] and siamese models that use image pairs [26] or triplets [27] are two types of CNN models that are commonly employed in re-ID."]} +{"13787722|9959529": []} +{"13787722|14814753": ["This challenge remains even with current deep learning approaches (Asadi-Aghbolaghi et al., 2017; Herath et al., 2017)."]} +{"13787722|41505326": ["[172] described available benchmark RGB-D datasets for action/activity recognition and included 27 single-view datasets, 10 multi-view datasets and 7 multi-person datasets.", "Several survey papers have summarized the research on human motion recognition using RGB-D data [14, 166, 3, 16, 172, 28, 100, 46].", "[16] for hand gestures and [172] for action recognition)."]} +{"13787722|12724190": ["The sources of the datasets are mainly of three categories (Chen et al., 2013; Cheng et al., 2016; Han et al., 2017): Motion capture (Mocap) system, structured-light cameras (e.", "Several survey papers have summarized the research on human motion recognition using RGB-D data (Aggarwal and Xia, 2014; Chen et al., 2013; Cheng et al., 2016; Escalera et al., 2016; Han et al., 2017; Presti and La Cascia, 2016; Ye et al., 2013; Zhang et al., 2016b)."]} +{"13787722|1634674": ["For example, Wan et al. (2016a) proposed the novel spatial-temporal features for one-shot learning gesture recognition and have got promising performances on Chalearn Gesture Dataset CGD) (Guyon et al.", "Early research on human motion recognition was dominated by the analysis of still images or videos (Aggarwal and Cai, 1999; Guo and Lai, 2014; Poppe, 2010; Turaga et al., 2008; Wang et al., 2003; Zhu et al., 2016a)."]} +{"13599403|4570087": ["Person re-ID lies inbetween image classi\ufb01cation [14] and instance retrieval [19] in terms of the relationship between training and testing classes (Table 1).", "For basic knowledge and state-of-the-art advances of the inverted index in instance retrieval, we refer readers to a recent survey [19]."]} +{"13599403|3693305": ["On the other hand, when it comes to retrieval, ef\ufb01cient indexing structures [22] and hashing techniques [23] can be bene\ufb01cial for re-ID in a large gallery.", "Hashing has been an extensively studied solution to approximate nearest neighbor search, which aims to reduce the cost of \ufb01nding exact nearest neighbors when the gallery is large or distance computation is costly [23]."]} +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} +{"13992382|17516538": ["In last years, great effort has been put into the problem of people identification based on gait recognition [18]."]} diff --git a/edge/graph_209336589.jsonl b/edge/graph_209336589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0264abda84cdaf7f9735e02f8a55a18a584cf2d --- /dev/null +++ b/edge/graph_209336589.jsonl @@ -0,0 +1,3 @@ +{"23960080|18078738": ["While model- and signal-based schemes are the cornerstones of existing fault detection and isolation (FDI) techniques in the literature, knowledge-based and hybrid approaches are gaining more attentions [3], [4]."]} +{"6955055|905827": ["References [67] and [68] provide a good review of MCSA-based techniques."]} +{"14147633|12098072": ["According to the trapezoidal or sinusoidal shape of the no-load electromotive force (EMF) waveforms, the PM brushless motor can operate in the BLDC mode or BLAC mode [7]."]} diff --git a/edge/graph_209337122.jsonl b/edge/graph_209337122.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf28637b3edee798cc5bce068e545d4e258032b7 --- /dev/null +++ b/edge/graph_209337122.jsonl @@ -0,0 +1,7 @@ +{"12486741|5768126": []} +{"1169808|5768126": ["research, and interesting results have been reported, see [92], [186], [187], and the references therein."]} +{"11311753|5768126": ["The main problem is associated with the bridge balancing since it employs a similar capacitor as the piezoelectric capacitance where the accurate measurement of the piezoelectric capacitance is difficult [32], [33]."]} +{"877270|5768126": ["The conclusion and future work directions are summarized in Section VI."]} +{"110867820|15594382": []} +{"11190983|5768126": ["Shunt Impedance Design The Smart Structures and Vibration Control literature contains a multitude of passive, active, linear, and non-linear piezoelectric shunt impedance designs (reviewed in [14], [15])."]} +{"19745979|5768126": []} diff --git a/edge/graph_209343314.jsonl b/edge/graph_209343314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9727106fa1aa94477c7b5c49d3ed8d0a8db85e8 --- /dev/null +++ b/edge/graph_209343314.jsonl @@ -0,0 +1,3 @@ +{"7206775|4962939": ["\u2026knowledge to be represented from a guideline and do not allow for managing uncertainty well \u2013 either in the interpretation and encoding of ambiguous statements within a guideline, or in making a recommendation for action to the end user with some sense of certainty of the recommendation [161-164]."]} +{"7206775|11009327": ["no surprise that many clinicians view CDS as arising at an inopportune time in their workflow [219, 220], and many CDS alerts are simply ignored or overridden [221-224]."]} +{"25040300|15273230": ["However, it has some significant and long acknowledged limitations, particularly in the context of imbalanced datasets [19].", "Methods of dealing with imbalance are well studied for classical machine learning models [19, 17, 20, 18]."]} diff --git a/edge/graph_209362777.jsonl b/edge/graph_209362777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8f0fefda52e7347cb7b1c256fdc985aaaae9b95 --- /dev/null +++ b/edge/graph_209362777.jsonl @@ -0,0 +1,11 @@ +{"13818577|1876898": ["Before pose estimation, an object should be recognized by using local features, as this is an effective way for matching [36]."]} +{"7527756|7665100": []} +{"7527756|7360895": ["[ 1 ], [2], the definition and research direction of HRC are still in hot debate."]} +{"53225449|31216129": ["Collaborative robots play an important role in smart factories since it contributes to the achievement of higher productivity and greater efficiency [1].", "Moreover, the rigid contact with severe impact between robot and human cannot satisfy the security requirements of collaborative robots [1]."]} +{"115872266|16280711": []} +{"198485144|3347463": ["Regardless of cultural differences in consistent teamwork and management styles, the emotional alignment of the individual with the team has long since been recognised as vital both for performance and sustained mental health [165].", "\u2026group sentiment, both with surveys building a general corpus of conventions and customs within a given working culture, as well as with physiological measurement and machine learning techniques that respond to variations of the individual or deviations from past patterns and cultural average [165]."]} +{"198485144|14826946": ["Such tasks are typically information and knowledge discovery, situation assessment, and strategic decision making [57,93,125]."]} +{"198485144|469744": ["According to Azuma [13], an AR system shall possess three characteristics: (1) the system should combine real and virtual worlds; (2) the system is interactive in real time; and (3) the system is registered in three dimensions."]} +{"198485144|7185733": ["According to Pavlovic et al. [192], gestures describe intended movements, usually the arms and hands, with a manipulative or communicative character (Fig.", "Taxonomy of gestures in control and programming of industrial robots (adapted from [192]).", "Different publications [192,19,164,99] have shown that multimodal design of industrial control and programming systems increases productivity.", "Based on the classification of hand gestures according to Pavlovic et al. [192], Fig."]} +{"113438750|6415369": []} +{"49557291|7360895": ["While these robots are mostly utilized for social services [38], their applications can be effectively extended to other HRI scenarios."]} diff --git a/edge/graph_209370704.jsonl b/edge/graph_209370704.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01945f7303ce3b6a9aee7d8dd388cabd3573c237 --- /dev/null +++ b/edge/graph_209370704.jsonl @@ -0,0 +1,7 @@ +{"2320924|12675271": [", Raspberry Pi, Cubie boards etc) are drawing significant attention for several reasons: these devices are cheap, consume low energy and (if optimised) have enough resources to support applications of practical interest such as those used in smart cities [1]."]} +{"1751411|14697846": []} +{"5843471|26368310": ["The service replication approaches have been highly studied in the literature for VMs to support high availability (HA) [14]."]} +{"9524546|14295689": []} +{"44203315|12675271": ["For these reasons, Fog/Edge computing can be exploited in many IoT scenarios, ranging from smart agriculture to smart cities [8]."]} +{"9294564|7971188": ["Distributed Hash Tables are distributed data structures where the information objects are placed deterministically, at the peer whose identi\ufb01er corresponds to the information object\u2019s unique key according to a given distance metric [32]."]} +{"195831624|38200299": []} diff --git a/edge/graph_209376485.jsonl b/edge/graph_209376485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..518c301fb173715eab10c21c4c16131ef2b0dccd --- /dev/null +++ b/edge/graph_209376485.jsonl @@ -0,0 +1,58 @@ +{"206710835|8212328": ["Fleet-wide approach to improve predictive diagnosis One of the industrial reality is the lack of capitalization of knowledge and model reuse which represents high costs and efforts for the enterprises (Weber et al., 2012) (Medina-Oliva et al.", "One of the industrial reality is the lack of capitalization of knowledge and model reuse which represents high costs and efforts for the enterprises (Weber et al., 2012) (Medina-Oliva et al., 2013b)."]} +{"107147308|956843": []} +{"53046427|393948": ["A considerable amount of progress has been made in terms of automated image and speech feature extraction [24]."]} +{"122364764|51929263": ["Different domain adaptations as well as transfer learning techniques have been developed in other fields to address domain-shifting problems, such as handwriting-digit recognition [16] and object recognition [17], [18]."]} +{"67867317|393948": ["It tries to minimize the reconstruction error to make the output similar to input [43]."]} +{"1033682|174797842": []} +{"164444126|17403085": []} +{"69823968|11632848": ["Wo\u00b4zniak et al. (2014) present an up-to-date survey on MCS."]} +{"133585910|54440351": ["ligence techniques, the data-driven intelligent fault diagnosis techniques have received wide attention in recent years [2]."]} +{"115297281|17403085": []} +{"42870514|15888893": []} +{"42870514|393948": []} +{"111838731|905827": []} +{"3706921|393948": ["In the autoencoder (AE) framework, an AE is a discriminative graphical model that tries to reconstruct the input signals [30]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"126544299|3761015": []} +{"21688963|4097106": []} +{"21688963|20404279": []} +{"21688963|3330313": []} +{"21688963|12948993": ["s (230;275) are extracted via an overlapping sliding window from a full X-ray image, constructed using single conventional X-ray imagery with associated false color materials mapping from dual-energy [42]. Abnormal classes (122;803) are of 3 sub-classes - knife (63;496), gun (45;855) and gun component (13;452) - contain manually cropped threat objects together with sliding window patches whose interse"]} +{"53080888|469744": ["Therefore, AR supplements reality, rather than replacing it [20], [21].", "Since its origination, several AR applications have been envisioned and conceived to the manufacturing sector, such as assembly, maintenance, and repair of machinery [20], [21], [24], [25]."]} +{"49194344|350515": ["formed based on gradient-based search methods [20]."]} +{"52163874|18078738": []} +{"4709758|18078738": ["The model-based fault diagnosis method was originally developed by Beard, in 1971, to replace hardware redundancy by analytical redundancy [4], which has been developed for linear or linearized models."]} +{"49619808|7399829": []} +{"41928030|393948": []} +{"195775324|905827": ["Motor is the key component of many mechanical systems as the power source, in which a huge demand exists for higher reliability, security, and availability [1]."]} +{"207214341|8601873": ["Because we can not assign positive label to a specific day before the failure we use multi-instance learning [28, 3, 10] setting to deal with this problem.", "Many different ways of solving MIL exist[10]; our approach combines instance-to-example, meta-examples and instance-based supervised learning."]} +{"52982570|393948": ["additional information on the input data and aims at extracting relevant characteristics of the input data itself. Examples of unsupervised feature learning include clustering and dictionary learning [1]. Deep neural networks have also been used for unsupervised feature learning tasks for PHM applications, e.g., with Deep Belief Networks [11], [12], and with different types of autoencoders [11], e.g.", " j 1 YTest i j (8) The choice of both pand is to some extent a single problem, consisting in fact in choosing a robust threshold. In this paper, we chose to \ufb01x p= 99:5 and experiments will show that 2[1;3] provides good results. We denote by magni\ufb01cation coef\ufb01cient the ratio between the distance of the one-class classi\ufb01er output to 1 and the threshold: Mag = (j1 TestY j) Thrd : (9) This ratio is above ", "enerators. 1 Introduction Machine learning and arti\ufb01cial intelligence have recently achieved some major breakthroughs leading to signi\ufb01cant progress in many domains, including industrial applications [1]\u2013[4]. One of the major enablers has been the progress achieved on automatic feature learning, also known as representation learning [1]. It improves the performance of machine learning algorithms whil", "a much faster and easier process and has an unique solution. In Problem (4), any combination of \u02d9 1, \u02d9 2, u, vleads to a different solution of Problem (4), it is however usual to take (\u02d9 1;\u02d9 2;u;v) 2[[1;2]] . When \u02d9 1 = \u02d9 2 = 2 and u= v= 2, Eq. (4) is known as the ridge regression problem (also referred to as Tikhonov regularisation problem) [24], and it has an explicit solution: = CI+H>H 1 H>", ";1)] 1 1000 9: XBase Base XBase + Base 10: XBase[9000 : 10000;1] = 1:2 11: XBase[10000 : 11000;1] = 1:5 12: XBase[11000 : 12000;1] += 0:2 Base[0] 13: XBase[12000 : 13000;1] f X f + f 14: Draw: 2[U([0;1])]D 15: Draw: b2[U([[1;n]])]D 16: Draw: 2N 0;0:01 f( Base[b]) 17: X f XBase[:;b] + 18: Draw: i f 2[U([[1;D]])] 10 19: X[13000 : 14000;i f] = 1:2 20: for Every Model and every set of hyperpa"]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"52287102|16544012": []} +{"5308509|34621298": []} +{"114755796|17403085": []} +{"49186725|18188725": ["Its weaknesses in complex domains such as: the design of handcrafted features that needs a human intervention and a well-knowledge, the extraction and selection of features is the other difficult problem, which includes the prior selection of hyper parameters like latent dimension and unable for data with large scales that are known as the curse of dimensionality [26].", "The comparison between conventional data-driven and Deep Learning Methods illustrated in Table III [26]."]} +{"49186725|9928823": ["The methods of the Deep Learning provides features that are\nautomatically extracted and classified in the diagnosis and prognostic of faults compared side by side with other traditional methods.", "Recently, Deep Learning (DL) [6] is a new level of useful techniques in machine learning, which seeks to learn high-level representations of the raw data across multiple processing layers.", "A number of algorithms of Deep Learning [16] such as Auto-Encoders, Deep Belief Network, Convolutional Neural Networks, etc., have been used to diagnostic and prognostic add to the Remaining of Useful Life.", "Deep Learning has arisen since 2006 as a new level of machine learning.", "Furthermore, the Deep Learning crosses the bounds of traditional methods and avoids their limits.", "The comparison between conventional data-driven and Deep Learning Methods illustrated in Table III [26].", "A number of algorithms of Deep Learning [16] such as Auto-Encoders, Deep Belief Network, Convolutional Neural Networks, etc.", "Chen Zhiqiang et al. [18] proposed an implementation of Deep Learning technique presented in CNN for fault identification and classification in gearbox by using the vibration signals measured with an accelerometer.", "So many algorithms of Deep Learning have been addressed to fix these weaknesses."]} +{"125976702|393948": ["Various deep learning algorithms, such as autoencoders, stacked autoencoders [103], DBM and DBN [16], have been applied successfully also in fault diagnosis."]} +{"125608550|393948": []} +{"116131557|18388986": []} +{"116131557|11810221": []} +{"125305425|393948": []} +{"111065752|905827": ["In contrast, single-point defects are localized and can be classified according to the following affected element (Vas (1993) (Benbouzid [2000], Li et al. [2000]), It should be noticed that this prediction is based on the assumption of pure rolling races, however, in reality, some sliding motion\u2026"]} +{"69210821|44064877": []} +{"4738641|18078738": []} +{"67869288|9928823": []} +{"7282208|34621298": ["\u20266, 2017\nAC CE\nPT ED\nM AN\nUS CR\nIP T\nMaintenance policies for multi-component systems have been reviewed in the past by many authors, including McCall (1965), Cho and Parlar (1991), Dekker et al. (1997), Wang (2002), and Nicolai and Dekker (2008), where the latter also considers CBM strategies.", "Originally, structural dependence was focusing on the situation where the replacement of a certain component requires the dismantling or replacement of other components (see e.g. Thomas (1986), Dekker et al. (1997), and Nicolai and Dekker (2008)).", "In line with Thomas (1986), Dekker et al. (1997), and Ebeling (2010), we refer to this type of dependence as common-mode deterioration.", "Existing literature overviews, such as Thomas (1986), Dekker et al. (1997), and Nicolai and Dekker (2008), usually distinguish three types of dependencies (structural, stochastic, and economic)."]} +{"11393480|9928823": ["When these operators with the same parameters are applied on local signals (or their mapping) at different time segments, a form of translation invariance is obtained [2,7,8].", "Recently, a family of learning models has emerged called as deep learning that aim to learn higher level abstractions from the raw data [2,7], deep learning models doesn\u2019t require any hand crafted features by people, instead they will automatically learn a hierarchical feature representation from raw data."]} +{"11393480|393948": ["In this paper we treat RUL estimation problem as multivariate time series regression and solve it by adapting one particular deep learning model, namely Convolutional Neural Network (CNN) adapted from deep learning model for image classification [1,12,13], which is the first attempt to leverage deep learning to estimate RUL in prognostics."]} +{"46801935|15273230": ["Predictive accuracy, a popular choice for evaluating performance of a classifier, is not appropriate where data are class-imbalanced [17]."]} +{"4695765|8212328": ["For PHM activities, one of the industrial realities is the lack of capitalization of knowledge and model reuse which represents high costs and efforts for the enterprises (Weber et al., 2012) (Medina-Oliva et al., 2012a).", "The proposed fleet-wide approach allowing case-reuse could bring benefits to almost all PHM activities (Monnin et al., 2011a), (Monnin et al., 2011b), (Medina-Oliva et al., 2012b)."]} +{"34170710|393948": ["Deep learning has the ability to yield useful and important features from data that can ultimately be useful for improving predictive power [20]."]} +{"110793996|34621298": ["[23] with a focus on economic dependence; and Wang [21] with an emphasis on single-component systems."]} +{"202100696|4884302": []} +{"202100696|49418885": []} +{"201832628|393948": ["In particular, autoencoder (AE) has been more attractive and presents better insights into the representation learning methods and fault diagnosis due to its simplicity and efficiency [2], [18]\u2013[23]."]} +{"3385026|393948": []} +{"213944638|51929263": ["In addition, this dataset also enables the alidation of deep transfer learning and domain adaptation lgorithms [32], [33] to predict a more realistic bearing fault from accelerated life testing with classifiers trained on artificially induced scratches or drills.", "Designed to tackle this practical and widely existing issue in numerous applications, transfer learning has aroused extensive attention in the machine learning community, and various transfer learning frameworks are proposed based on classical ML algorithms [32], [33], [157], [158]."]} +{"213944638|905827": []} diff --git a/edge/graph_209382167.jsonl b/edge/graph_209382167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53757170f3051993009f8f93c71e85b8e01ae941 --- /dev/null +++ b/edge/graph_209382167.jsonl @@ -0,0 +1,2 @@ +{"6740811|11266709": []} +{"149771586|27533715": []} diff --git a/edge/graph_209382714.jsonl b/edge/graph_209382714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d9f9abc03747e0f35a5c587b14bececf5053c29 --- /dev/null +++ b/edge/graph_209382714.jsonl @@ -0,0 +1,51 @@ +{"206828353|7686677": ["from those in the existing literature on terrestrial communication systems [15], [16]."]} +{"171096642|51935081": ["Since forming blockchain requires a mining task, that is, proof-of-work (PoW), which demands both heavy computation resources and energy, it is hard to widely facilitate blockchain in a wireless network [5]."]} +{"199657967|52059869": ["AI-Enabled Autonomous Networks Softwarization, cloudization, virtualization, and slicing are still important characteristics of autonomous networks; thus, software-defined networking (SDN), network function virtualization (NFV), and network slicing (NS) [8], first introduced to design the 5G network architecture, are still an important technique set for designing 6G."]} +{"49568000|3273340": ["For a more detailed survey on ef\ufb01cient DNN accelerators, refer to [48] and [100].", "The commercial viability of DNNs has spawned a wave of products from large companies and startups, including Google\u2019s TPU [10], [43], [44], Nvidia\u2019s SCNN [45], Wave Computing [46], Graphcore [3], Movidius [47], and many others (complete list in [48])."]} +{"31060152|3392135": ["can be found in [93], [94], [122], [123], and [131].", "In [131], the state of the art in electromagnetic-based nanocommunication that provides understanding of current models, considering various communication paradigms, antenna design issues, radio channel models based on numerical and experimental analysis and network, and system models for biomedical application, is presented."]} +{"31060152|6111895": ["Specifically, the works in [93], [94], and [123] do not offer extensive technical details into the design and development of MC nanosystems and networks for TDD applications.", "However, while some of the existing review works, namely, [93], [94], and [123], discuss various application areas of MC, the discussion on the application of MC concept to TDD is very briefly.", "The survey in [123] presents recent advancements in the field of MC engineering with discussions on the biological, chemical, and physical processes in the MC transmitter and receiver, as well as the propagation and transport mechanisms.", "can be found in [93], [94], [122], [123], and [131]."]} +{"31060152|9107727": []} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"199440218|6197039": ["[14] Y."]} +{"199440218|6111895": ["Moreover, a 6G network may also include other communication types, such as molecular communications [13] for future micro- or nano-scale medical applications.", "[13] N."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"165136896|50776107": ["will impose very diverse requirements on the network [108]\u2013[110]."]} +{"165136896|4880047": ["Similarly, conventional access control mechanisms use firewalls on network boundaries to examine incoming or outgoing packets to prevent attacks and unauthorized access [342], [343]."]} +{"165136896|6197039": ["The security vulnerabilities in massive MIMO: passive eavesdropping and active eavesdropping, are described in [20].", "A survey on physical layer security techniques for 5G wireless networks is presented in [20].", "For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks.", "Therefore, there are many surveys and magazine articles [20], [131], [133]\u2013[135] that cover various aspects of physical layer security."]} +{"165136896|22380247": ["Similarly, proper security keying models for IoT are still lacking [333] and routing protocols have vulnerabilities [334]\u2013[336]."]} +{"165136896|2014729": ["For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks.", "set up fake base stations and act as real network base stations [16].", "A survey on security of 4G and 5G networks is presented in [16]."]} +{"165136896|206578224": ["In2014, the ESTI MEC ISG [95] was initiated to look into Multi-access Edge Computing (MEC) security standards and empower NFV capabilities within the Radio Access Network (RAN) to deliver security and robustness."]} +{"165136896|28209458": ["Mobile botnets, compromised limited capability devices, are already posing serious security challenges due to connectivity to the Internet through cellular networks [18].", "Similarly, the increased number of VNFs is also a major concerns for unauthorized data access, traffic eavesdropping, and theft of services [18].", "A survey on security threats and attacks on mobile networks is presented in [18].", "For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks."]} +{"165136896|4502294": ["1) Security Challenges: The backhaul network comprise network elements and communication channels between the base station and the core network [152]."]} +{"165136896|15449163": ["Therefore, the survey article [11] provides some interesting insights on the limitations of the current 4G networks that must be solved in 5G.", "Since 5G is yet to be deployed, \u201cwhat will be done by 5G and how will it work?\u201d as presented in a survey on 5G [11], is still a question.", "overcoming those limitations is discussed in [11].", "The ubiquitous connectivity with below 1 ms latency and Gigabit speed aimed by 5G has gained momentum towards its realization [11]."]} +{"165136896|19938676": ["There are a number of survey articles that thoroughly discuss 5G networks such as [1], [12]\u2013[14]."]} +{"165136896|6779551": ["For instance, [21] and [22] are focused on authentication, [19] and [20] are targeted towards security of physical layer and air interfaces respectively, [18] presents security in access and core networks, presents LTE security and general security requirements of 5G, and [16] covers privacy issues in future networks.", "Security challenges and the possible mitigation techniques in the wireless air interfaces are discussed in [19]."]} +{"165136896|3453202": ["active eavesdropper are presented in [184].", "techniques for such threats is presented in [184]."]} +{"165136896|2387055": ["SDN is also termed as security-defined networking [344], since"]} +{"165136896|4395259": ["The fundamental principle behind physical layer security is to utilize the randomness of the noise and communication channels to restrict the amount of information that can be revealed by unauthorized receivers [131].", "Initiated mainly by Shannon [129], and further strengthened with theoretical basis using information-theoretic approach by Wyner [130], physical layer security of wireless communications does not rely on higher-layer security systems or encryptions [131].", "Therefore, there are many surveys and magazine articles [20], [131], [133]\u2013[135] that cover various aspects of physical layer security."]} +{"165136896|8909218": ["Small cells, such as femtocells [116], [117] and picocells [118], [119] using low power access points have gained momentum due to many benefits such as low-cost and indoor"]} +{"165136896|3494096": ["5G networks will integrate low power and low data rate IoT devices [325]."]} +{"165136896|925507": ["blockchain based approaches in such cases can offer decentralized means of security and privacy mechanisms for IoT applications [379], [380]."]} +{"201622574|35260120": ["\u2022 An even more drastic approach will rely on the exploitation of ambient backscattering, which enables tiny devices to operate with no battery by redirecting ambient radio-frequency (RF) signals (for example, using on/off encoding) without requiring active RF transmission [14]."]} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"6111895|6518885": ["In [11] a survey of molecular communication based on microtubules and physical contact was presented, and in [12] a very brief survey of microscale molecular communication was presented."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"4527235|33063270": []} +{"4527235|206578365": []} +{"1397543|7644489": ["The proposed concept goes well beyond the current 3GPP device-to-device (D2D) proximity services, which are limited to a single hop and typically rely on assistance from the network infrastructure, and the well-known mobile ad hoc networks, which are based on multihop routing with limited network performance [13], [14].", "In this sense, the notion of the bearer graph defines capabilities beyond what is currently possible with relay control, in in-coverage and out-of-coverage modes [13]."]} +{"59308208|49574823": ["Currently, blockchain technology has been discussed and investigated in various potential application scenarios, such as Internet of Things (IoT) [14]\u2013[16], edge computing [17]\u2013[19], smart grid [20]\u2013[22], vehicular network [23]\u2013[25], smart city [26], etc."]} +{"198331184|6111895": ["[3] N."]} +{"7915606|7644489": ["We transform the nonconvex optimization problem into a convex one by applying constraint relaxation and nonlinear fractional programming."]} +{"31355144|13475127": []} +{"164886219|3392135": []} +{"164886219|14561706": []} +{"204817355|51922975": ["Vehicle-to-everything (V2X) communication is a technology that aims to connect every entity to vehicles [1]."]} +{"88492340|52008841": ["Please refer to [22] and [23] for further details on PLS for VLC systems."]} +{"67873207|52954708": ["INTRODUCTION Due to the tremendous growth in the number of Internetof-Things (IoT) devices, it is highly imperative to design novel spectrum- and energy-efficient communication technologies to support massive wireless connections [1]."]} +{"67873207|22221919": ["A. SIC CONSTRAINT To ensure that SIC is implemented successfully at the PR, the achievable rate of s(n) at the PR R2,s should be greater than that at the BD R1,s [23].", "The received signal is represented as\ny2(n) = hH2 xt (n)+ gxb(n)+ z2(n),\n= \u221a phH2 vs(n)+ \u221a (1\u2212 \u03b2)pghH1 vc(n)s(n)+ z2(n), (9)\nwhere the first term is the broadcast signal from the PT, the second term is the backscattered signal from the BD, and z2(n) \u223c CN ( 0, \u03c3 22 ) is the received noise at the PR.\nC. ACHIEVABLE RATE 1) BROADCAST MESSAGES s(n) At the BD, the received signal-to-noise ratio (SNR) of s(n) is\n\u03b31,s = \u03b2p \u2223\u2223hH1 v\u2223\u22232 \u03c3 21 , (10)\nand the achievable rate of s(n) is thus written as\nR1,s = log2 ( 1+ \u03b31,s ) .", "To ensure that SIC is implemented successfully at the PR, the achievable rate of s(n) at the PR R2,s should be greater than that at the BD R1,s [23].", "(22)\nB. BROADCAST AND BD RATE REQUIREMENTS To guarantee the quality of the transmissions for the broadcast messages and the BD messages, we introduce the minimum rate requirements \u03b7s to s(n) and \u03b7c to c(n), which can be written as R1,s \u2265 \u03b7s and RGau2,c \u2265 \u03b7c (or R QAM 2,c \u2265 \u03b7c), respectively."]} +{"3872429|11414835": []} +{"108397530|10235514": ["2906789 HD live streaming, autonomous driving, industry automation, smart home, and so forth, which reap the benefits provided by 5G networks, such as ultra-high data rate, low latency, high reliability, and massive connections [1], [2]."]} diff --git a/edge/graph_209383011.jsonl b/edge/graph_209383011.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..586949e51b2e1b821872d7d580f5fdbacba3d94e --- /dev/null +++ b/edge/graph_209383011.jsonl @@ -0,0 +1,5 @@ +{"116738023|16502294": []} +{"5297546|192934": ["In this stage the Sequential Forward Selection method (SFS) [10] is adopted.", "Successive trainings of the classifiers are performed, incrementing the number of features based on the ranking provided by SFS."]} +{"4376168|8516210": ["Depending on the properties of surface texture, ASI methods can be divided into four categories [6]: 1) structural; 2) statistical; 3) \ufb01lter-based; and 4) model-based approaches."]} +{"206594196|469744": ["Successful image segmentation techniques could facilitate a large group of applications such as image editing [17], augmented reality [3] and self-driving vehicles [22]."]} +{"63900366|8516210": ["However,\nrequired to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al. [2], existing methods roughly be divided into four main categories: statistical, structu filter based, and model based.", "However, required to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al.", "References\n[1] Xie X (2008) A Review of Recent Advances in Surface Defect Detection Using Texture Analysis Techniques."]} diff --git a/edge/graph_209383058.jsonl b/edge/graph_209383058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a02cab5a80b966a9f28dd0f231d8b73f4a2fc8c9 --- /dev/null +++ b/edge/graph_209383058.jsonl @@ -0,0 +1,7 @@ +{"205324293|1400872": ["This is in contrast to traditional recurrent neural networks, which are notoriously dif\ufb01cult to train 3,4 ."]} +{"13753997|2088679": []} +{"1798273|7414579": ["The performance analysis of DRTLG and interconnect design was evaluated by comparing the performance of DRTL with 4-input LUT based CMOS FPGA [33], for some ISCAS-85 benchmarks.", "Modelling a neuron as a threshold logic gate (TLG) that fires when input reaches a threshold has been the basis of the research on neural networks (NNs) and their hardware implementation in standard CMOS logic [18].", "xn) = sgn(w1x1 + w2x2 + \u00b7 \u00b7 \u00b7 + wnxn) = sgn( n i=1wi xi \u2212 T ) (1) where the values of wi are the synaptic weights associated with the inputs xi , and T is the threshold that the gate needs to meet to fire, and n is the fan-in of the TLG [63].", "The first simplified mathematical model of the biological neuron was introduced by McCulloch and Pitts [17] in 1943 in the form of the threshold logic gate (TLG).", "The survey in [63] concludes with an interesting observation.", "The spin-torque switches based on magneto-metallic domain wall (DW) motion [91], [92] allows ultra-low voltage operation of mem-ristive TLGs leading to low energy dissipation at the gate level.", "[63] offer another insight: \u201cLastly, because nano (and reconfigurable) computing will probably get center-stage positions in the (near) future, TL will surely benefit from that.", "According to the analysis carried out in Matlab-Simulink/Cadence, the TLGs with Ag-Ch memristive devices had a fan-in of > 10, switched at > 1 GHz speed and dissipated lower static power than a corresponding CMOS implementation.", "The performance analysis done on common benchmarks show that the proposed hardware can achieve more than 100x improvement in energy and 1000x improvement in energy-delay product, as compared to the state of the art CMOS FPGA based TLG. Threshold logic computing using hybrid Memristive-CMOS cell architecture designed for Fast Fourier Transform and Vedic Multiplication have been proposed by James A.P. et al. in 2014 [93].", "The design exploration of reconfigurable Threshold Logic Gates (TLG) implemented using Silver-chalcogenide memristive Fig.", "The design was extended to the implementation of an image classifier which classifies a 3x5 image into a rectangle or a triangle using three 5-input TLG in the first level and a Goto pair based majority voter as shown in Fig.", "\u201d The fundamental reason, the authors point out, is that TLGs need full custom design and have been in direct competition with Boolean gates and a lot of research effort has been spent on improving boolean logic gates since the 1970s.", "The proposed re-programmable TLG shown in Fig.", "the literature, a comprehensive survey of which can be found in [63].", "The distinguishing feature of PTLA was the combination of Negative Differential Resistance (NDR) based molecular switch and a multi-level resistance memristor leading to the where w i are the synaptic weights associated to inputs x i and T the threshold that the gate needs to meet to fire, and n is the fan-in of the TLG [63]."]} +{"38932250|1284183": ["proaches could achieve such low-power phase shifting [154], [155], though this remains speculative."]} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"90263309|1895753": ["SNNs are still under active research by computational neuroscientists, whose goal is to understand how cognitive skills emerge from the self-organization of spiking neural networks [67], [68]."]} diff --git a/edge/graph_209383074.jsonl b/edge/graph_209383074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa1c4a38dad238fdb7949d15989370ae93d00aee --- /dev/null +++ b/edge/graph_209383074.jsonl @@ -0,0 +1,80 @@ +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"88491427|49527603": ["A private blockchain can provide a relatively better degree of privacy; however, it is generally considered an unsecure environment as it is only controlled by a single entity [72].", "Examples of surveys on general blockchain concepts, opportunities, and applications are [72]\u2013[75]."]} +{"88491427|51935081": []} +{"88491427|3932531": ["applications [104]\u2013[107], intrusion detection [91], and Internet of Things (IoT) [95]\u2013[100]."]} +{"88491427|3628110": []} +{"88491427|27262729": []} +{"88491427|925507": []} +{"49411044|49574823": ["Detailed examples of these classes are illustrated in [24].", "Although the above-mentioned surveys [7], [24], [31], [32] have laid a solid foundation for blockchain technologies, our survey differs in several aspects.", "There are related survey papers [7], [24], [29]\u2013[32] that covered different aspects of the blockchain technology.", "Recently, the surveys [24] presented the overview of blockchain-based IoT (BIoT) applications."]} +{"49411044|3932531": ["[63] discussed the applicability of blockchain technology in an IDSs."]} +{"49411044|3628110": ["In Monero [74], users can include some chaff coins, called", "Although blockchains are one of the promising technologies for securing IoT application, but they suffer from the following vulnerabilities [74], [75]."]} +{"49411044|2014729": ["In the IoT era, 5G will enable a fully mobile and connected society for billions of connected objects [53]."]} +{"49411044|27262729": ["Although the above-mentioned surveys [7], [24], [31], [32] have laid a solid foundation for blockchain technologies, our survey differs in several aspects.", "There are related survey papers [7], [24], [29]\u2013[32] that covered different aspects of the blockchain technology.", "The security and privacy aspects are presented in [31] and [32] for bitcoin,"]} +{"68245425|3628110": ["The survey in [3] describes different kinds of security threats in blockchain-based systems and security-related enhancement solutions for them."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"52183530|8589228": ["In this study, results were analyzed using a SMC (Statistical Model Checking) [23] tool, which allowed the authors to reveal scenarios where the smart contract behaviors could be compromised by malicious users."]} +{"108312721|49527603": ["blocks, and each block contains a timestamp and a block mark [4]\u2013[6]."]} +{"3546145|21386749": ["[44] reviewed the advances in health care which relies on Internet of Things (IoT) technologies.", "In particular, the work [44] also included security related taxonomies in the context of healthcare."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"34330359|28628245": ["There raise a number of security threats in IoT, especially inWNoT, where the conventional security countermeasures used in wired networks may not work well in WNoT due to the following inherent constraints of WNoT: (i) the wireless medium is open for any nodes [15]; (ii) it is extremely difficult to deploy centralized control mechanisms in such distributed WNoT [2, 16, 17]."]} +{"34330359|5747564": ["The typical killer applications of IoT include the logistic management with RFID technology [3], environmental monitoring with wireless sensor networks [4], smart homes [5], e-health [6], smart grids [7], Maritime Industry [8], and so forth."]} +{"34330359|4395259": ["An alternate approach is either to design light-weighted encryption schemes [34] or to generate noise to limit the amount of information that can be extracted by an eavesdropper [35, 36]."]} +{"86431222|49527603": ["[30], [31] have presented a comprehensive overview on the blockchain, from"]} +{"86431222|3628110": ["[36]"]} +{"86431222|12675271": ["Fog computing for sustainable smart cities has been surveyed in [29], which analyzes the characteristics and functionalities of an ideal fog computing architecture, and discusses some future research challenges and directions."]} +{"86431222|6909107": ["Computing and Mobile Edge Computing (MEC) [256]."]} +{"86431222|37424351": ["Issues and solutions regarding the information security in smart cities have been studied in [16]."]} +{"86431222|15093994": ["[18] have surveyed the economic models of electric vehicles\u2019 charging process in smart cities considering both unidirectional and bidirectional energy flows, and given some valuable classification and comparison."]} +{"86431222|2489034": ["Wang and Sng [24] have surveyed the deep learning algorithms applied to video analytics in smart cities."]} +{"86431222|14849079": ["[14] have presented a comprehensive survey on smart cities, from the definition, application domains, architectures, key enabling technologies and research challenges."]} +{"86431222|6355516": ["Other specific areas of smart cities, such as software architectures [19], business models [20] and people movement analytics [21], are also studied respectively."]} +{"86431222|925507": ["Due to the redundancy in computation, the PoW is not an energy efficient approach and consumes a large amount of electricity energy [226], [228], [244]."]} +{"108353663|925507": ["data management architecture for IoT devices [17], [18].", "A systematic survey was performed in [18] to find a computationally less expensive proof-of-work (PoW) for computationally lightweight IoT devices such as low cost RFID tags."]} +{"108353663|3390598": ["All traffic to and from the terminals can be encrypted over SSL/TLS protocol, as proposed in [32] for confidential IoT-based application services."]} +{"86808618|56208985": []} +{"86808618|53046901": ["The unique properties of the blockchain technology make its application an attractive idea for many business areas, such as banking [17], logistics [18], the pharmaceutical industry [19], smart contracts [20,21], andmost importantly, in the context of this paper, cyber security [22,23]."]} +{"56597218|49574823": ["Reference [49] is a bibliometric study reporting the number of blockchain papers in the surveyed set in four categories: Internet of Things (IoT), Smart Con-tracts, E-governance, and Others, with brief explanation on each category.", "There are much more related work that center on specific domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on finance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60].", "An example of this model is urban decision-making leveraging big-data collected from IoT sensor networks.", "[121] built a system using IoT sensors to collect those transport condition parameters and log the readings to a blockchain for public veri\ufb01ability.", "An additional 3 use cases also used proof-of-work even though the name of the speci\ufb01c blockchain is not mentioned, including for electricity meter reading security [173], an energy trading market involving industrial IoT and the grid [186], and peer-to-peer electricity trading between electric vehicles [206].", "Such systems can trace the origins of drugs by logging time series drug transaction data generated by IoT sensors to a blockchain to prevent counterfeits [118].", "There are much more related work that center on speci\ufb01c domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on \ufb01nance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60].", "Reference [186] proposes a system that targets at various typical industrial IoT scenarios, such as micro grids, energy harvesting networks, and vehicle-to-grids."]} +{"56597218|56002532": ["There are much more related work that center on speci\ufb01c domains with various levels of depth and may or may not adopt a systematic literature review approach, for instance, on \ufb01nance and cryptocurrencies [54]\u2013[56], governance [24], education [57], energy [58], IoT [59], healthcare [60]."]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"116422191|49527603": ["hybrids that stand between public and private blockchains [44].", "detailed comparison of different algorithms can also be found in [15,44,46,47,56]."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"106410481|59314746": ["The blockchain-based system can be divided into two categories according to the openness: permissioned blockchain and permissionless blockchain (public blockchain) [26], [27]."]} +{"64681061|3205677": ["In contrast to the so called \u201ccrash recovery\u201d fault which does not impact the rest of the system, \u201cByzantine\u201d fault means that even when a node fails with an arbitrary and inconsistent behavior, it may continue interacting with the rest of the system, or collude in order to devise more malicious output [32]."]} +{"88499166|49574823": ["Although blockchain can be considered to be still under development in many aspects [13], some of its applications for \ufb01elds where trust is a necessity (e.g., \ufb01nance) have been already deployed."]} +{"88499166|46973566": ["The concept Industry 4.0 fosters the evolution of traditional factories towards smart factories through the use of some of the latest technologies, like 3D printing, augmented reality [1,2], cyber-physical systems [3], fog computing [4] or the Industrial Internet of Things (IIoT) [5,6]."]} +{"88499166|4625011": ["The concept Industry 4.0 fosters the evolution of traditional factories towards smart factories through the use of some of the latest technologies, like 3D printing, augmented reality [1,2], cyber-physical systems [3], fog computing [4] or the Industrial Internet of Things (IIoT) [5,6]."]} +{"88499166|3579945": ["The concept Industry 4.0 fosters the evolution of traditional factories towards smart factories through the use of some of the latest technologies, like 3D printing, augmented reality [1,2], cyber-physical systems [3], fog computing [4] or the Industrial Internet of Things (IIoT) [5,6]."]} +{"199013359|51613885": ["Despite the aforementioned potentials, the IIoT is also facing a number of challenges [9]\u2013[12], including interoperability, devices security and privacy, silo mentality, standardization, and so on."]} +{"199013359|3434731": ["4) PBFT: Practical Byzantine Fault Tolerance (PBFT) algo-rithm have been well discussed in [18], [40], [41], [42], which works on the assumption that the number of fault participants less than one third of all participants."]} +{"86722298|49574823": ["Some variants [18], such as Delegated PoS (DPoS), Transactions as PoS (TaPoS), PoS-Velocity (PoSV), Delegated Byzantine Fault Tolerance (DBFT) and Bitcoin-NG, select some ones to generate and validate blocks to improve the scalability, throughput and latency."]} +{"86722298|27262729": ["2) Security and Privacy: Despite the original security and privacy issues of blockchain [96], outsourcing services at the edges in the integrated system of blockchain and edge computing presents new security and privacy challenges."]} +{"86722298|206578365": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "With these short propagation distances, edge computing has the potential of realizing tactile-level latency for many latency critical applications that may require tactile speed with latency approaching 1ms [29]."]} +{"86722298|9495329": ["The virtual resources of network virtualization share many common elements in notions and interchangeably terms with SDN [53]."]} +{"86722298|3818445": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "Nonetheless, its security and privacy are signi\ufb01cant challenges, due to the interplay of heterogeneous edge nodes and the migration of services across edge nodes [5].", "Nonetheless, its security is a signi\ufb01cant challenge [5], [30], [31].", "These promised gains make it a key technology for realizing various visions for next-generation Internet, such as IoT [5] and Tactile Internet (with millisecond-scale reaction time) [28]."]} +{"86722298|3434731": ["Therefore, the integration of blockchain and edge computing into one system becomes a natural trend [6]\u2013[8].", "The sidechain scheme permits developers to connect new sidechains to the mainchain (e.g., Ethereum) with to-and-from transferring of the ledger assets [6]."]} +{"49272880|3628110": ["The main blockchain characteristics are depicted in Figure 1 [6], [7]."]} +{"86850570|49527603": ["In order to ensure that all management hubs are trusted, some consensus algorithms must be applied to the architecture, such as Proof of Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT), etc. [19]."]} +{"86850570|2521001": ["requirements: confidentiality, integrity, and availability (CIA), which can be referred to as the CIA requirement [26]."]} +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"173991065|209444308": ["eaches the contract, the corresponding penalty (as speci\ufb01ed in the contract) will be automatically paid from Bob\u2019s deposit. The whole life cycle of smart contracts consists of four consecutive phases [31] as illustrated in Fig.4: 1) Creation of smart contracts. Several involved parties \ufb01rst negotiate on the obligations, rights and prohibitions on contracts. After multiple rounds of discussions and neg"]} +{"173991065|49527603": ["1) Blockchain: A blockchain is essentially a distributed ledger spreading over the whole blockchain system [18]."]} +{"173991065|51935081": ["The work of [9] gives a categorization of applications of blockchain for IoT."]} +{"173991065|49574823": ["The work of [7] presents a review on integrating blockchain with IoT in the application aspect."]} +{"173991065|52059869": ["In addition to SDN and NFV, the appearance of network slicing technologies [57] brings the agility and flexibility of networks to support different functional and performance"]} +{"173991065|3628110": ["Meanwhile, blockchain systems also have their own security vulnerabilities such as program defects of smart contracts [20].", "It is worth mentioning that block propagation mechanisms (such as relay network propagation and advertisement-based propagation [20]) are the prerequisite for the distributed consensus protocols.", "This computationally difficult problem (also know as a puzzle) can nevertheless be verifiable without difficulty [20]."]} +{"173991065|27262729": ["For example, it is shown in [21] that user pseudonyms can be cracked via learning and inferring the multiple transactions associated with one", "The probability of solving the puzzle at a miner is often proportional to the computational capability and resource of a miner [21]."]} +{"173991065|31245252": ["However, the open wireless medium also makes IoT suffering from the security breaches, such as passive eavesdropping [105], jamming, and replaying attacks [106]."]} +{"173991065|2829149": ["Moreover, due to the resource constraints of IoT devices, conventional heavy-weighted encryption algorithms may not be feasible to IoT [107]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} diff --git a/edge/graph_209386377.jsonl b/edge/graph_209386377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4cbea8ee3dac84e4260c579a5db14f214c9b3ad --- /dev/null +++ b/edge/graph_209386377.jsonl @@ -0,0 +1,83 @@ +{"53280100|6909107": ["Although edge cloud (EC) is beneficial in terms of low delay [2] and less backhaul bandwidth consumption, its computing capability is relatively limited compared to CC [3]."]} +{"52831791|206578365": ["The power consumption of the MEC server can be calculated by [16] , = , + , \u2212 , \u2211 ( ) , (9)"]} +{"33621679|3757239": ["As a result, vehicular edge networks is emerged with the development of VEC [2]."]} +{"33621679|36400013": ["Reputation query should be processed promptly to facilitate regular interactions [3]."]} +{"86496553|21685661": []} +{"86496553|16654832": ["According to [44], due to constrained resources, individual vehicles are not able to meet huge computation demands."]} +{"86496553|1113420": []} +{"77384131|53730401": ["Task offloading scheme in VECN is the special case of the data offloading in vehicular networks [14].", "1, the computation task offloading process in VECN includes three parts: 1)Offloading: Same as the data offloading scheme in vehicular Ad Hoc networks [14], the vehicles send the computation tasks to the MEC servers via 5G DSA strategy."]} +{"77384131|3782888": ["For the calculation tasks, we set the data sizes {sn,i} are selected randomly from [2, 6]Mbit , and the corresponding task required CPU cycles {cn,i} are randomly distributed in range [40, 120]Mcycle, same as the setting in single vehicle case.", "The data size of each task {sn,i} is selected randomly from [2, 6]Mbit , and the corresponding task required CPU cycles {cn,i} are randomly distributed in range [40, 120]Mcycle."]} +{"52289007|19938676": ["The development of mobile communication technologies brings new opportunities for the low-latency and high-speed scenario of vehicular networks [2]."]} +{"77388092|3757239": ["Despite these advantages, VEC also meets some challenges [11]."]} +{"4571529|206578365": ["Then the total required CPU cycles of the task in time period t is xtwt [3].", ", when and where to offload the computation tasks, and how to allocate radio and computing resources, which have been widely investigated [3]\u2013[5]."]} +{"19664674|17934515": ["2723430 strategy to increase road traffic capacity, improve traffic safety, and reduce fuel consumption and exhaust emissions [1]\u2013[4]."]} +{"73503369|3767252": ["Despite its essential role, trust management research in the context of edge computing is quite limited, basically because it is a very recent paradigm, and its infrastructure is not standardized yet [36]."]} +{"115822394|763939": ["Based on the studies in [48], v is related Fig."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"52124201|206578365": ["5G network [13], [15]."]} +{"52124201|17787193": ["The focus of [17] is on offloading traffic with the assistance of infrastructure devices.", "Different from [17], we review these existing related works in this area from a multi-dimensional view, e.", "[17] provided a survey on traffic offloading solutions, in which mobile devices with multiple wireless interfaces are efficiently used.", "More specifically, [17] takes delay as the single matric to classify these related works of traffic offloading based on opportunistic networking into two categories, delayed offloading and non-delayed offloading.", "There are several surveys on offloading [17]\u2013[20], but they are very different from ours.", "By contrast, we focus on offloading cellular traffic through opportunistic network, consisting of mobile devices, as well as on computation offloading, which was not considered in [17]."]} +{"56853332|6909107": ["In comparison, mobile edge computing [6] is a novel paradigm aiming to exploit a multitude of devices and facilities (e."]} +{"53015239|763939": ["According to the existing scheme, we select Manhattan grid model as vehicle mobility model in the proposed network architecture [5], [20]."]} +{"53046224|206578365": ["Especially, SIoV also significantly benefits from MEC applications by deploying high-performance computation and geo-distributed servers at roadside RSUs [14]\u2013[16].", "To alleviate the workloads at roadside RSUs and reduce the costs of deployed RSUs, unmanned aerial vehicles (UAV) assisted MEC as flying RSUs has been proposed to improve computation performance owing to their low cost and flexible deployment [16]\u2013[20].", "To resolve this issue, mobile edge computing (MEC) has been recognized as a cost-effective method to enhance the computation capability in proximity to mobile devices [16]."]} +{"5021660|3757239": []} +{"5021660|6909107": ["Additionally, many researchers have studied different aspects of MEC [11]\u2013[13], and many the current study is for proposing architectures and/or derivation and analyzing the computation offloading from mobile nodes to MEC servers."]} +{"69511851|3757239": ["2876298 by computation-intensive applications, thus resulting in bottlenecks and making it challenging for the vehicles to ensure the required level of quality of service (QoS) [1], [2].", "Mobile edge computing (MEC) can alleviate the need of heavy computation from the vehicles, yet enable such applications by providing computation capabilities at the edge of the radio access network and in close proximity to mobile users [1]\u2013[4]."]} +{"69511851|6909107": []} +{"69511851|206578365": ["2876298 by computation-intensive applications, thus resulting in bottlenecks and making it challenging for the vehicles to ensure the required level of quality of service (QoS) [1], [2]."]} +{"3450996|17787193": ["According to the initiator diversity of the data of\ufb02oad-ing, we classify the data of\ufb02oading techniques into four categories, i.e., data of\ufb02oading through small cell networks (SCNs), WiFi networks, opportunistic mobile networks or heterogeneous networks (HetNets), respectively [4]."]} +{"51712343|3757239": ["constrained vehicles can be strained by computationintensive applications, resulting in bottlenecks and making it challenging for the vehicles to ensure the required level of Quality of Service (QoS) [1]. Mobile Edge Computing (MEC) can alleviate the need of heavy computation from the vehicles, yet enable such applications by providing computation capabilities at the edge of the radio access network ", " For the RSU that cannot meet the threshold, let x ij = 0;j=2 B i. Thus, the complexity of (10) will be greatly reduced. Once B i is determined, we relax the binary variable x ij into a real value in [0;1]. Then the MINLP problem (10) is relaxed into an RNLP as follows: max U(x) = X i2N X j2B i log(1 + i x ijT ij) (12a) s:t: X j2B i x ij( ij + c i f ij ) 6 T0 i ; 8i2N (12b) x i0 + X j2B i x ij = 1; 8i2", "al fractional solution, which is an upper bound of the original MINLP problem, because it is obtained by expanding the solution space. We denote the fractional solution of (12) as x 0= fx ij jx0 ij 2 [0;1]g. The solution of RNLP is usually an infeasible solution to the original MINLP problem as it is fractional. Therefore, we adopt a rounding method from [16] to obtain a feasible solution for the MINLP"]} +{"51712343|6909107": ["Mobile Edge Computing (MEC) can alleviate the need of heavy computation from the vehicles, yet enable such applications by providing computation capabilities at the edge of the radio access network and in close proximity to mobile users [1], [2].", "Computation offloading is a process where mobile users offload their computation-heavy and latency-sensitive tasks to base stations (BSs) for edge execution [2]."]} +{"49274056|3782888": []} +{"53711326|763939": ["Since the recorded data does not consider any constant period, the vehicular mobility in each period is obtained from the Manhattan grid mobility model [10]."]} +{"38161114|763939": ["Based on the studies in [13], the mean of vehicle speeds is related to the vehicle density in the road segment, which can be expressed as"]} +{"58007046|6909107": []} +{"58007046|206578365": ["manage radio and computing resources to execute tasks, which has been widely investigated recently, see surveys [4]\u2013[6] and technical papers [7]\u2013[9].", "For the task generated in time period t, the total workload is given by xtwt , where wt is computation intensity (in CPU cycles per bit) representing how many CPU cycles are required to process one bit input data [4]."]} +{"58007046|3818445": ["manage radio and computing resources to execute tasks, which has been widely investigated recently, see surveys [4]\u2013[6] and technical papers [7]\u2013[9]."]} +{"86808679|18750590": ["In [18], Luong et al. proposed a comprehensive literature survey of pricing-based incentive mechanisms for resource allocation in cloud-enabled wireless networks."]} +{"173990181|51922975": ["Connecting vehicles via Vehicular Ad-hoc Networks (VANET) represents an early attempt to support safety-related applications, such as accident warning, crash notification, and cooperative cruise control [4], [5]."]} +{"173990181|206741902": ["Edge servers may also assist cooperation among multiple vehicles for SLAM, which is called as centralized SLAM [68].", "For challenges of SLAM for autonomous driving, the readers are referred to [68] for a more detailed discussion.", "the simultaneous estimation of the state of a vehicle and the construction of a map of the environment [65], [66], [67], [68].", "Multi-vehicle SLAM with cooperation among vehicles can also help to improve the performance of SLAM [68]."]} +{"173990181|6909107": ["points [28], [29], [30], [31], [36].", "This is aligned with the recent trend to deploy computing resources at the edge of wireless networks [28], [29], [30], [31], to be elaborated below."]} +{"173990181|206578365": ["different offloading models can be considered, namely, binary and partial offloading [31].", "This is aligned with the recent trend to deploy computing resources at the edge of wireless networks [28], [29], [30], [31], to be elaborated below."]} +{"24386836|206578224": ["We have found some contributions on MEC [95], [208] covering the topics of: the communication perspective [88]; computation offloading [89]; convergence of computing, caching and communications [94]; emerging 5G network edge cloud architecture and orchestration [96]; software-defined networking [76]; architecture harmonization between cloud radio access networks and fog networks [93]; Internet of Things [99]; and latency control in softwaredefined mobile-edge vehicular networking [98].", "[96] discuss virtualization technologies such as VMs and containers, SDN and NFV as well as network slicing and smarter mobile devices.", "The technologies to support MEC are discussed in [96] and [97]."]} +{"24386836|1116024": ["bine header fields from any stack layer, creating a cross-layer design that is suitable for emerging wireless scenarios such as D2D [261], vehicular [262], and sensor networks [263], [264]."]} +{"24386836|3757239": ["We have found some contributions on MEC [95], [208] covering the topics of: the communication perspective [88]; computation offloading [89]; convergence of computing, caching and communications [94]; emerging 5G network edge cloud architecture and orchestration [96]; software-defined networking [76]; architecture harmonization between cloud radio access networks and fog networks [93]; Internet of Things [99]; and latency control in softwaredefined mobile-edge vehicular networking [98].", "In particular, [94] surveys key MEC features."]} +{"24386836|6909107": ["We have found some contributions on MEC [95], [208] covering the topics of: the communication perspective [88]; computation offloading [89]; convergence of computing, caching and communications [94]; emerging 5G network edge cloud architecture and orchestration [96]; software-defined networking [76]; architecture harmonization between cloud radio access networks and fog networks [93]; Internet of Things [99]; and latency control in softwaredefined mobile-edge vehicular networking [98].", "Initially, we present and describe some architecture options, viz: mobile cloud computing [85], [86], cloudlet [81], [87], MEC [88], [89],", "Considering the computation offloading from mobile devices to edge servers [89], it enables new applications at the user"]} +{"24386836|18750590": ["To the best of our current knowledge, the only literature covering both GT and MEC is [20], but it is focused on pricing models.", "To our best knowledge, the only survey about Game Theory (GT) and Multi-Access Edge Computing is [20], but it"]} +{"24386836|206578365": ["We have found some contributions on MEC [95], [208] covering the topics of: the communication perspective [88]; computation offloading [89]; convergence of computing, caching and communications [94]; emerging 5G network edge cloud architecture and orchestration [96]; software-defined networking [76]; architecture harmonization between cloud radio access networks and fog networks [93]; Internet of Things [99]; and latency control in softwaredefined mobile-edge vehicular networking [98].", "The models for distinct entities of MEC systems are discussed in [18], [88], including for computational tasks, wire-", "Initially, we present and describe some architecture options, viz: mobile cloud computing [85], [86], cloudlet [81], [87], MEC [88], [89],", "Computing (FC) [77] (proposed by Cisco) or Multi-Access Edge Computing (MEC \u2013 coined by ETSI and used preferentially in this paper) [18], [88]."]} +{"24386836|10299098": ["The models for distinct entities of MEC systems are discussed in [18], [88], including for computational tasks, wire-", "Computing (FC) [77] (proposed by Cisco) or Multi-Access Edge Computing (MEC \u2013 coined by ETSI and used preferentially in this paper) [18], [88]."]} +{"24386836|8523192": ["computational demand of real-time latency-sensitive applications of largely geo-distributed IoT devices [91].", "FC [90], [91], and heterogeneous cloud radio access network [92], [93]."]} +{"24386836|5385031": ["ing models [110]; energy efficiency [111]; security issues [7]; and clustering protocols [112]."]} +{"24386836|3925000": ["A recent work presents a comprehensive review and taxonomy of GT models of complex interactions between agents [40]."]} +{"24386836|18011174": ["ing models [110]; energy efficiency [111]; security issues [7]; and clustering protocols [112].", "2863030 GT in wireless networks, such as cognitive radio [6], sensor networks [7], and mobile social networks [8], [9].", "In [7] GT is used to control security threats in WSNs.", "game (RG) [7], [23] is an effective tool to avoid potential conflicts among wireless nodes."]} +{"24386836|11498812": ["ization technology [273], [274] to support indoor location based services; high mobility wireless communications [275], such as a cloud-Radio Access Network architecture for cloud"]} +{"24386836|15449163": ["appropriately to unexpected situations [10], such as load variation, conflicting strategies, incomplete information, latency, jitter, or cyber-attacks.", "More precisely, the deployment of more dense wireless cells and the advent of 5G [10], [15] access technology promise mobile users the eventual prospect of gigabit wireless access to cloud data with only a few milliseconds of"]} +{"24386836|12325031": ["2863030 GT in wireless networks, such as cognitive radio [6], sensor networks [7], and mobile social networks [8], [9].", "A discussion about challenges and open issues in model-free learning for cognitive radio networks is available in [6]."]} +{"24386836|1686572": ["security [229], [230]; enhanced cooperation among players via pricing [231]."]} +{"24386836|8833120": ["In addition, repeated games [23], [54] can enforce coordination among their rational players.", "In addition, [23] discusses some interesting scenarios (also", "game model should incorporate an external mechanism such as pricing [41]\u2013[44], [45], [46] reputation [23], [47], [48], or others [21], [23], [49]\u2013[52], [53].", "[23] propose a taxonomy of RGs in wireless networks.", "rier sense multiple access [104]; radio resource management and admission control [105]; repeated games [23]; reputationbased network selection [47]; evolutionary games [35]; uplink", "game (RG) [7], [23] is an effective tool to avoid potential conflicts among wireless nodes.", "evolve and study cooperation for all game players [23]."]} +{"24386836|7320605": ["current action on the future actions of others [27].", "We have also found contributions in the area of wireless sensor networks [27], [109]: pric-"]} +{"24386836|17062686": ["between the players strongly affects the characteristics as well as the outcome of the game [32]."]} +{"24386836|17109970": ["From the vast number of literature contributions in the scope of non-cooperative (NC) games, we have selected the ones which results can be potentially more appealing for the upcoming MEC scenarios, as follows: network resource sharing [69][99][100][101][102], power control [103][104][105][106][107][44][108][109][110][111][112][113][114], medium access control [33][115][116][117][118][119], business model [22][24][25][120][121], routing [122], energy efficiency [104][105][108][109][112][123][124][125][126][127][128][33][129][130][131][132][133], micro-grid [134], proactive network resource reservation [135].", "[103][104][105][106][107][44][10 8][109][110][111][112][113][114] Power control Limiting the interference and increasing the Signal to Noise Ratio (SINR)."]} +{"32156263|7971188": ["However, the well established P2P techniques on the Internet [8] should be carefully inspected for PCD in VANETs, given that:", "Inspired by the peer-to-peer (P2P) protocols on the Internet [6], [7], which go beyond client-server protocols by letting a client also be a server, we introduce similar ideas for PCD in VANETs by allowing vehicle-to-vehicle (V2V) transmissions.", "However, the well established P2P techniques on the Internet [8] should be carefully inspected for PCD in VANETs, given that:\n1) due to deep channel fading and co-channel interferences, wireless links in VANETs, relative to the wired links on the Internet, are very unreliable; 2) due to unreliable links and high mobility of vehicles, network topologies of VANETs, relative to the static topology of the Internet, are ever-changing and highly unpredictable."]} +{"56597344|18750590": ["In [8], Luong et al."]} +{"67772211|3488022": ["Not only that, the applications of the IoT can be found in other areas, such as home automation [14], industrial manufacturing [15], environmental monitoring [16], and so on."]} +{"67772211|6909107": ["Multi-access edge computing (MEC) [18] or formerly mobile edge computing, as a new architecture and key technology for the coming 5G networks, has been proposed to tackle the above issues.", "The parked vehicles can be treated as static cloud nodes, which are stable resources and the corresponding task offloading policy has been well examined [18]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"54437370|52059869": ["[38] discuss the network slicing from an end to end perspective, where the principal concepts, enabling technologies and solutions are elaborated."]} +{"54437370|206578224": ["[42] introduce a survey on mobile edge computing (MEC) including the architectures and main deployment scenarios, where the key enabling technologies such as SDN, network function virtualization (NFV) and network slicing are discussed."]} +{"54437370|763939": ["We then apply the fluid traffic model [43] to characterize the evolution of the network."]} diff --git a/edge/graph_209386477.jsonl b/edge/graph_209386477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ea7e65fb83ab411cdd77046bb2cecac711f9785 --- /dev/null +++ b/edge/graph_209386477.jsonl @@ -0,0 +1,35 @@ +{"7482306|9659809": ["Several approaches to find communities in signed graphs have been proposed (see [23] for an overview)."]} +{"3623887|17084176": []} +{"57362238|9659809": ["While some problems such as link sign prediction [18], [21] and centrality [22] have been heavily explored, other directions such as network modeling [23], node relevance [24], and network embedding [19] are still in early development [25]."]} +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"15508624|16532505": ["The augmented Lagrangian for the above problem is given by\nL\u03c1(X, Y,Z; \u039b) = 1\n2 \u2016Z \u2212M\u20162F + \u3008\u039b, Z \u2212XY \u3009+\n\u03c1 2 \u2016Z \u2212XY \u20162F .\nwhere \u039b \u2208 RN\u00d7Q is the dual variable."]} +{"15508624|16925069": ["The seminal work of Lee and Seung [1] has motivated a variety of applications of NMF/NMFC, such as text mining [3], pattern discovery [4], bioinformatics [5], as well as clustering [6]; for a recent survey, see [7]."]} +{"49310446|3766791": ["While use of vector-Jacobian products for solving the adjoint method has been explored in optimal control (Andersson, 2013), we explore a fully general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) and highlight its potential in deep learning and generative modeling.", "\u2026for solving the adjoint method has been explored in optimal control (Andersson, 2013; Andersson et al., In Press, 2018), we highlight the potential of a general integration of black-box ODE solvers into automatic differentiation (Baydin et al., 2018) for deep learning and generative modeling."]} +{"49310446|1400872": ["The use of the adjoint method for training continuous-time neural networks was previously proposed (LeCun et al., 1988; Pearlmutter, 1995), though was not demonstrated practically."]} +{"51975153|15562587": ["\u2026within the theory of TNs, which often employ physical constraints of locality, symmetry, compositional hierarchical functions, entropy, and polynomial log-probability, that are imposed on the measurements or input training data [Chen et al., 2017, Lin and Tegmark, 2016, Poggio et al., 2016].", "However, the locality at each layer is a key factor which gives DCNNs an exponential advantage over shallow NNs in terms of the representation ability [Anselmi et al., 2015, Mhaskar and Poggio, 2016, Poggio et al., 2016].", "For example, it was shown recently how NNs with a univariate rectified linear unit (ReLU) nonlinearity may perform multivariate function approximation [Poggio et al., 2016].", "\u2026have recently investigated the application of tensor decompositions to simplify DNNs and to establish links between deep learning and low-rank tensor networks [Chen et al., 2017, Cohen et al., 2016, Lebedev and Lempitsky, 2015, Novikov et al., 2015, Poggio et al., 2016, Yang and Hospedales, 2016]."]} +{"6674407|192934": []} +{"15418196|1805048": []} +{"59604494|3766791": ["Automatic differentiation has proven a key technology for machine learning (for a review, see Baydin et al., 2018)."]} +{"125410214|12161567": ["Furthermore, if A B then the PVD model is equivalent to the RESCAL model (Nickel et al., 2016)."]} +{"125410214|43059": ["raction matrices. Another useful constrained tensor decomposition model, which can be represented graphically as a nested Tucker-(K, N)model, is the PARATUCK-(K, N) model (see, e.g., the review paper [97] and references therein). The PARATUCK(K, N), like the PARALIND/CONFAC-(K, N) models, performs a decomposition in which the core tensor is de\ufb01ned through the interaction matrices, however, the PARATUC", "dopted in widely diverse disciplines, including signal and image processing, machine learning, Psychometrics, Chemometrics, Biometric, Quantum Physics/Information, Quantum Chemistry and Brain Science [51,53,97,112,153,160,239,253]. This is largely due to their advantages for data that exhibit not only large volume but also very high variety (see Figure 1), as is the case in bio- and neuro-informatics and in computational neuro", "eferred to as the NTD-2 (Nonnegative Tucker-2 decomposition). 17PARALIND is an abbreviation of PARAllel with LINear Dependencies, while CONFAC refers to CONstrained FACtor model; for more details see [69,97] and references therein. 62 Table 5: Different forms of CP and Tucker representations of a third-order tensor X PRI J K. CP Decomposition Tucker Decomposition Scalar representation x ijk = \u00b0R r=1 lr a"]} +{"16306883|297464": []} +{"7863583|393948": []} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"155089274|9659809": ["See (Tang et al., 2016b; Gallier, 2016) for recent surveys on the topic.", "\u2026graphs, as for example edge prediction (Kumar et al., 2016; Leskovec et al., 2010a; Falher et al., 2017), node classification (Bosch et al., 2018; Tang et al., 2016a), node embeddings (Chiang et al., 2011; Derr et al., 2018; Kim et al., 2018; Wang et al., 2017; Yuan et al., 2017), node ranking\u2026"]} +{"13847951|3540699": []} +{"14801183|7064380": ["3) Fiedler vector-based clustering: The coefficients of the Fiedler vector contain a powerful heuristic to approximate the ratio cut to partition the network graph into two well-separated node clusters [12], [14], [16], [18], which may indeed prove useful in the design of TA distributed algorithms.", "1) Ratio cut: If we aim to partition a network graph with a set of nodes K in two non-overlapping node clusters K1 and K2, a commonly used approach, leading to the so-called ratio cut, is to minimize the edge density [12]", "2) Algebraic connectivity and the ratio cut: One important property of the algebraic connectivity is that it provides a lower bound on the edge density of the ratio cut of the network graph [12], i."]} +{"14064264|11608263": ["Tsoumakas and Katakis [2] have presented the \ufb01rst overview of methods for multi-label learning where the methods for multi-label learning are divided into two categories: algorithm adaptation and problem transformation methods.", "Tsoumakas and Katakis [2] summarize them into two main categories: (a) algorithm adaptation methods and (b) problem transformation methods.", "MR is designed to \ufb01nd a hypothesis which ranks the correct labels at the top.", "Decision trees : Clare et al. [11] adapted the C4.5 algorithm for multi-label data (ML-C4.5) by modifying the formula for calculating entropy.", "This group of methods consists of methods that use ensembles to make multi-label predictions and their base classi-\ufb01ers belong to either problem transformation or algorithm adaptation methods."]} +{"3379733|15636504": ["All these technological advancements introduced a progressive change in various health care facilities such as information management, Hospital Information System (HIS), medical imaging and health social networks [15, 30].", "The continuous developments in Information and Communication technologies (ICTs) and multimedia technology offers widespread use of multimedia contents such as images, audio and video [30]."]} +{"3379733|9176080": []} +{"8973749|1176034": ["[65]."]} +{"8973749|8365617": ["In this regard, most efforts have been devoted to data representation using so called segmentation algorithms[64]."]} +{"207853383|56517517": ["However, the GCN proposed by [19] simplified the Graph Laplacian by restricting the filters to merely operate the first-order neighbors around each node, which fails to capture this kind of semantics, even when stacked over multiple layers [1, 37]."]} +{"17445560|14808716": []} +{"3093888|10096898": ["These questions can be answered by the theory of independence systems using methods from discrete optimization and combinatorics [11,12].", "For example, the hardness of computing the minimal hitting sets (transversal of a hypergraph) is an open question in complexity theory [11]."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} +{"13961767|634975": ["Very recently [328] the attention of the community has been extended to the n-player (n > 2) generalization of the PDG, also called Public Goods Game (PGG) [343]."]} diff --git a/edge/graph_209386804.jsonl b/edge/graph_209386804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cec044500ab7988b87fa283df99b3fd7931a910 --- /dev/null +++ b/edge/graph_209386804.jsonl @@ -0,0 +1,112 @@ +{"207870939|4880047": ["Therefore, ensuring the reliability and security of wireless data remains one of the most important tasks in developing future generation networks and has drawn increasing attention from the wireless communities [1]."]} +{"207870939|4395259": ["It is worth noting that the CSI of Willie can be reasonably estimated when Willie is an active transmitter [14]."]} +{"196471246|21418": ["INTRODUCTION Radio frequency (RF) transmission enabled simultaneous wireless information and power transfer (SWIPT) is a promising solution for future wireless powered Internet-of-Things (IoT) [1]."]} +{"52280924|10979806": ["have been lately proposed [7], [8], ranging from renewable energy sources and energy efficient hardware to green resource allocation and transceiver signal processing techniques."]} +{"442109|206576720": ["Consequently, this gives rise to the consideration of 3D-MIMO [39] which might be used as a backhauling alternative in vertically densified net-"]} +{"442109|12206204": ["THE EVOLUTION of mobile devices and applications in the current decade have drawn a new picture for wireless networks [1]."]} +{"442109|12029139": ["ent scopes, specifically Heterogeneous Networks (HetNets), massive multiple-input multiple-output (massive-MIMO) networks, millimeter waves (mmWaves) networks, and energy harvesting networks [9]."]} +{"442109|1588237": ["In the frequency domain, interference mitigation is done through the use of orthogonal frequency channels, either by the static allocation of these orthogonal channels to different cells or by dynamic allocation [164]."]} +{"442109|7851743": ["Also, the transmission power of each node is small and the OAM functions are automated via self organizing network functionality (SON) [178]."]} +{"141503814|21418": ["Therefore, research on finding innovative, spectral and energy efficient, and yet cost-effective solutions for future/beyond-5G wireless networks is still imperative [2]."]} +{"208202222|195874391": []} +{"204743870|206578365": ["Given that the computation result is typically of a small size [5], the feedback latency can be negligible, upon using the technique of ultra-reliable low-latency communications [36].", "[5]: single-user [6]\u2013[9] and multi-user systems [10]\u2013[14]."]} +{"14052007|13019489": ["4GHz Wi-Fi frequency band [1]\u2013[5]."]} +{"14052007|8323234": ["11ad networks can be used to change the direction of the TX and RX beams to reestablish the antenna alignment and restore the link [13]\u2013[15]."]} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"34127088|16050825": ["form is modulated onto the instantaneous power of the optical carrier [270]\u2013[274]."]} +{"34127088|13074005": ["For a comprehensive overview of these studies, interested readers are referred to previous survey papers on SM [61], [65]\u2013[67].", "This is another way of exploiting the SM principle [65] and of encoding the information not only in the impulse response of the channel, but in the interplay between antenna radiation pattern and nearby scatterers.", "For a comprehensive historical overview of the SM concept, interested readers are referred to [65]\u2013[68] and the references therein.", "In light of the above discussion on the concept of SM, MIMO systems employing SM provide attractive advantages over their traditional counterparts [65]\u2013[67], [83].", "Similar to the conventional SM principle [65], the receiver can retrieve the information by solving a hypothesis testing problem based on the four radiation patterns depicted in Fig.", "Our survey article also differs from the existing magazines/survey articles/books in the literature [6], [65]\u2013[69] by several aspects."]} +{"49872142|10979806": ["The recent tutorial [8] and survey [9] provide a comprehensive review of green solutions, including renewable energy sources, energy-efficient hardware, and green radio resource allocation and transmission."]} +{"189928582|35260120": ["To overcome this challenging issue, AmBC has been proposed recently, which exploits the RF signals from a primary communication system in the ambient environment [4]\u2013[6].", "Ambient backscatter communication (AmBC) exploits RF signals from the primary source such as TV tower, cellular BS, and WiFi access point in the ambient environment, [4]\u2013[6], thus no dedicated RF emitter is required."]} +{"166228241|4395259": ["Note that it is reasonable to assume that hAE and hIE are known in the scenario when the eavesdropper is an active user in the system but untrusted by the legitimate receiver [10]."]} +{"8351022|3330461": ["For D2D communication, [118] and [119] provide comprehensive survey and tutorial on the subject."]} +{"8351022|10837932": ["The green attribute of the cellular communication refers to reduction of unnecessary power consumption and its subsequent impact on the environment in the form of CO2 emissions [6]\u2013[11]."]} +{"8351022|15694215": ["For example, in ad-hoc networks, wireless nodes spontaneously and dynamically self-organize into an arbitrary and temporary infrastructure [94] without relying on central"]} +{"199543872|61132": [",N \u2212 1, (1a) \u2016q[N ]\u2212 qF \u20162 \u2264 D, q[1] = q0, (1b)", "INTRODUCTION W ITH the rapid development of the fifth-generation (5G) wireless networks, unmanned aerial vehicles (UAVs) are playing an increasingly significant role in improving spectral efficiency [1]."]} +{"1750395|19938676": ["The cognitive idea has also been extended to 5G networks, where we refer readers to [212] for more discussion."]} +{"1750395|14765802": ["More recently, the literature surveys for EE improvement have nailed down to several speci\ufb01c technical areas in cellular networks, including radio resource management [29], dynamic resource provisioning [30], base station sleeping [31] as well as low power hardware techniques [32]."]} +{"1750395|16412228": ["More recently, the literature surveys for EE improvement have nailed down to several speci\ufb01c technical areas in cellular networks, including radio resource management [29], dynamic resource provisioning [30], base station sleeping [31] as well as low power hardware techniques [32]."]} +{"1750395|7686677": ["However, [43] emphasizes cognitive radio and cooperative techniques while we focus on the main 4G technologies and the promising 5G technologies, which are fundamentally different."]} +{"1750395|10837932": ["In [27], a complete overview for both wired and wireless networks has been conducted."]} +{"1750395|17109970": []} +{"208527271|10979806": ["However, the high hardware complexity and cost required by massive MIMO systems are still the main roadblock that hinders its implementation in practice, especially in the high frequency band such as millimeter wave (mmWave) bands [4], [5]."]} +{"319357|4668902": ["The metamaterial community can leverage existing knowledge in these areas, which have been applied across the computing stack: building approximate circuits, bounding the error probability throughout execution, debugging approximate devices, or combining the approach with energy harvesting, to name a few examples [21]\u2013[24]."]} +{"67894063|13074005": ["2 Introduction Spatial modulation (SM) [1] is a promising lowcomplexity [2] and energy-efficient [3] multiple-antenna modulation scheme, which is considered to be especially suitable for application to the Internet of Things (IoT) [4].", "In a conventional SM transmission scheme [1], the data stream is divided into two blocks, where the first block of log2(Nt) bits is used to identify the index of the transmitted antenna and log2(M) bits are used to identify a symbol of the signal constellation diagram."]} +{"52166820|21418": ["Therefore, research on finding both spectral and energy efficient techniques with low hardware cost is still imperative for realizing sustainable and green fifth-generation (5G) wireless networks and beyond [2].", "Such a system can be employed to facilitate wireless information and/or power transfer in various Internet-of-things (IoT) applications [2], [6]\u2013[10]."]} +{"56173958|3453202": ["However, for eavesdroppers who are actively jamming the channels, these advantages can also serve to their favors, which are the downside of massive MIMO system that needs to be tackled [25]."]} +{"27866378|9436861": ["On the contrary, heterogeneous computing aims to exploit the strengths of different types of processors with intelligent load balancing to improve the computational performance [126]."]} +{"27866378|393948": ["cial type of learning [68], namely \u201crepresentation learning."]} +{"27866378|1708582": ["ing\u201d has also been proposed and developed in the past years, for which the training data comes from the interaction between the learning machine and the feedback of its environment [69]."]} +{"202577544|195874391": ["Recently, intelligent re\ufb02ecting surface (IRS) had been envisioned as a cost-effective and green solution to signi\ufb01-cantly increase spectrum and energy ef\ufb01ciencies [1]."]} +{"208139395|52169284": ["Indeed, recent 3GPP studies have confirmed that UAVs receive poor signals from existing terrestrial base stations, and hence supporting aerial users will require further research and development [7]."]} +{"59158900|1541773": ["As stated in [176], the metric of secret bits per Joule is more popular since it is convenient to capture the degree of proportionality between the energy consumption and different levels of load."]} +{"59158900|6779551": ["For instance [14], the reliability and throughput of the"]} +{"59158900|3453202": ["Even worse, the process of channel estimation may be attacked by pilot contamination attack which not only dramatically reduces the achievable secrecy capacity but is also difficult to detect [17]."]} +{"59158900|4395259": ["with separate confidential messages of each user in which each downlink message must be kept secret from all other unintended users (each user is seen as an eavesdropper for messages not intended to it) [10].", "air interface, and the constraints of network resources [10].", "The typical wiretap channel models usually include multiple-input multiple-output (MIMO) wiretap channels, broadcast wiretap channels, multiple-access wiretap channels, interference wiretap channels, and relay wiretap channels [10], etc.", "Relay nodes can be used for not only cooperative relaying but also cooperative jamming [10], [11], [116]."]} +{"204509322|21418": ["To this end, the dual use of radio frequency (RF) signals for simultaneous wireless information and power transfer (SWIPT) has recently gained an upsurge of interest [1]\u2013[3].", ", millimeter wave and terahertz) frequencies [3]\u2013[5]."]} +{"208909866|195874391": ["Hence, by adaptively adjusting the phase shift matrix of RIS, it can enhance the transmission quality of the intended incident-re\ufb02ection signal [5], which is also called as passive beamforming [6]."]} +{"3557411|8523192": []} +{"3557411|1541773": ["In the literature, energy efficiency issues of wireless networks have been studied for a long time, and a number of surveys have been published [14]\u2013[24] (as compared with this work in Table I)."]} +{"3557411|12325031": ["1) Cognitive Radio Networks (CRNs): In order to exploit the underexploited spectrum resource (e.g., TV white bands), the cognitive radio (CR) technique allows unlicensed users (i.e., secondary users or SUs) to dynamically access the licensed spectrum when licensed users (i.e., primary users or PUs) are temporally absent.", "In the literature, data analytics have been successfully applied in WSNs [25] and CRNs [199] dealing with issues such as data aggregation, routing, localization, clustering, security, dynamic channel allocation, transmission control and cross-layer resource allocation.", "Basically, technologies such as CRNs, D2D communications and OFDMA networks are primarily designed to improve the SE for higher capacity, and hence providing effective ways for delivering large-volume big data.", "We focus our major attention on studies in recent 5-6 years and cover many emerging technologies such as cognitive radio networks (CRNs), future cellular networks integrated with D2D communications, mobile social networks, crowdsensing networks, cloud networks, and SDNs.", "4) General MR-MC Networks: One mathematical generalization of CRNs, OFDMA networks and WiMAX systems is multi-radio multi-channel (MR-MC) wireless networks, where each node has multiple radios that can operate on multiple channels [134]\u2013[136]."]} +{"3557411|14765802": ["The essence of many energy-efficient technologies is to exploit the network spatio-temporal diversities in order to mitigate interference [14], [15]."]} +{"3557411|3055684": ["For both offline and online algorithms, interested readers are referred to the survey in [13].", "vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"3557411|2535224": ["2: A conceptual architecture of SDWN [31].", "An overview of SDWN is illustrated in Fig.", "Although SDN was firstly defined for Internet systems, many efforts have been devoted toward softwaredefined wireless networks (SDWN) including OpenRadio and OpenRoad systems and SDWN based on various wireless technologies such as LTE cellular networks, WLANs, WPANs and WSNs [28], [29]."]} +{"3557411|16412228": ["The essence of many energy-efficient technologies is to exploit the network spatio-temporal diversities in order to mitigate interference [14], [15].", "In the literature, energy efficiency issues of wireless networks have been studied for a long time, and a number of surveys have been published [14]\u2013[24] (as compared with this work in Table I)."]} +{"3557411|12029139": ["vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"3557411|3330461": ["enhance the network energy efficiency by switching between cellular and D2D modes [125]."]} +{"3557411|4269723": ["proposed in which the network data plane and control plane are decoupled to allow flexible and programmable control such that new protocols and applications can be implemented more easily [27]."]} +{"3557411|12060835": ["vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"4059073|1230643": ["WSNs [11], nodes in such networks typically decrease their transmission range to reduce contention and resort to multiple hops to reach the intended destinations.", "As a result, a large amount of research has been devoted to the development of protocols that are energy-ef\ufb01cient or even energy-constrained in extreme cases such as WSNs.", "In fact, latency constraints discourage the use of techniques with low duty cycles as proposed in numerous MAC protocols for WSNs [11].", "Although high-density wireless networks are not new, e.g. WSNs [11], nodes in such networks typically decrease their transmission range to reduce contention and resort to multiple hops to reach the intended destinations.", "Architectural Requirements [7], [10], [11]", "Finally, the on-chip networking scenario shares with mission-critical WSNs the need for latency and reliability guarantees, although with much more restrictive deadlines and power budget [10].", "Physical Constraints [1], [5], [6], [9], [11]"]} +{"35260120|15501047": ["The reflection coefficient of the antenna is computed by [6], [16], [17], [18]:"]} +{"35260120|1902483": ["WPT has many practical applications such as home electronics, medical implants, electric vehicles, and wireless grid [14]."]} +{"35260120|12029139": [", static and dynamic ambient RF sources [128]."]} +{"35260120|14650419": ["However, due to some limitations [7]\u2013[10], conventional backscatter communications"]} +{"35260120|2415608": []} +{"35260120|2357830": ["However, due to some limitations [7]\u2013[10], conventional backscatter communications"]} +{"59608733|51929263": ["Here, following the taxonomy by the recent tutorial [148], we categorize transfer learning techniques into four main classes."]} +{"59608733|4884302": ["This implementation of Q-learning is referred to as the Deep Q-Network approach [95], [96], which can be considered an algorithm belonging to the family of Q-learning methods, with the peculiarity that the approximate function Q\u0302(s, a, w) is specified through an ANN.", "Reinforcement learning will also be considered, primarily considering its integration with deep learning tools, which leads to the recently introduced paradigm of deep reinforcement learning [95], [96].", "This section presents the framework of deep reinforcement learning, which merges deep learning with reinforcement learning [95], [96]."]} +{"59608733|3645740": ["As far as communications are concerned, most previous surveys discuss general machine learning techniques [14], [17], [18], [38]\u2013[40], without providing a dedicated analysis of deep learning."]} +{"59608733|10979806": ["Already 5G wireless networks are requested to increase the bit-per-Joule energy efficiency by a factor 2000 compared to previous wireless networks [2], [4]."]} +{"59608733|8323234": [") apply to using millimeter-wave communications [67], [68]."]} +{"59608733|6111895": ["Among others, we mention optical wireless communications [31], [32], which promise very high data rates by communicating over the visible spectrum, and molecular communications, which are not based on electromagnetic waves but exploit chemical signals as information carriers, thus enabling communication through media where electromagnetic signals do not propagate well, such as water, the inside of human bodies or the walls of buildings [33], [34]."]} +{"59608733|7851743": ["As a consequence, operational expenditures (OPEX) and capital expenditures (CAPEX), which are already a major challenge in present wireless networks [5], will significantly increase."]} +{"59608733|7774517": []} +{"67867215|13074005": ["sends a sequence of 4 bits = \u2208 ( ) using a complex modulation symbol and a precoder ( , with \u2208 [1,4], picked among 4 stored precoders.", "Recently, it has been shown that, for some high signal to noise ratios values, and still with a single RF chain at the transmitter side, by using transmit spatial modulation [3] with conventional arrays of antenna elements [4], one can achieve a higher spectral efficiency than by using a conventional modulation with the same single RF chain [5].", "More precisely, let , be the channel coefficient between the transmit antenna \u2208 [1, ] of the base station and the antenna port \u2208 [1,4] of the object.", "We assume that the receiver has computed and stored the variables: = = ( ) ( s | \u2208 [1,4] & \u2208 ."]} +{"202750109|21418": ["This motivates the research on key technologies, such as massive multi-input multi-output (MIMO), ultradense network, and the use of millimeter wave (mmWave) bands [1], for the fifth-generation (5G) and beyond wireless communications."]} +{"53755823|9651858": []} +{"53755823|16378550": []} +{"53755823|3330461": ["7) Impact in Complex Heterogeneous Networks: In the presence of macro cell, micro cells, home cells and fixed relays, the impact of the wide deployment of D2D communications also needs further considerations [24]."]} +{"53755823|7644489": ["more difficult to manage in small coverage scenarios than with respect to their respective large coverage areas of the BS [65].", "However finding the impact of these techniques on WAN also need considerations [65].", "\u2022 UEs radio interface is by-default designed to send data in Uplink [65].", "Thus further studies are required to investigate optimal solutions for splitting the control functionality between the network and the UE [65]."]} +{"208527432|206578365": ["The BSs are resource-enhanced with strong computation and storage capabilities [34]."]} +{"208527432|1541773": ["As running DNN models often incurs high energy consumption due to their high computational complexity [37]\u2013[38] and energy-efficiency is one of the key performance indicators for green communications [39], we in this subsection present the power consumption model of the proposed edge inference system, taking into consideration both the computation power for inference and the communication power for uplink and downlink transmissions."]} +{"25746527|5766836": ["In contrast to previous surveys of WSN testbeds [228], [229], [230], we introduce some of our representative WNCS testbeds."]} +{"25746527|5660618": ["discard disordered messages [48], [93], [94].", "Some surveys present controller design for NCSs [48], [57].", "5) Estimator Design: Due to network uncertainties, plant state estimation is a crucial and significant research field of NCSs [22], [48].", "Hence, controller\u2013actuator delays are more critical than the sensor\u2013 controller delays [22], [48].", "3 is also called two-channel feedback NCS [48].", "3 depicts the generalized closed-loop diagram of WNCS where multiple plants are remotely controlled over a wireless network [48]."]} +{"25746527|6275330": [", heat, ventilation and air-conditioning control systems [99]."]} +{"2193047|13074005": ["For arbitrary Nt and M , the rate of SM is RSM = log2 (M) + log2 (Nt) bpcu [3].", "As a consequence, MIMO techniques can provide high data rates without any bandwidth-expansion and without increasing the transmit power [3].", "Again, in SMMIMO research, this third dimension is often termed as the \u201cspatial-constellation diagram\u201d [3].", "Fueled by these considerations, Spatial Modulation (SM) has recently established itself as a promising transmission concept, which belongs to the few-RF MIMO wireless system family, whilst exploiting the availability of multiple antennas in a novel fashion compared to state-of-the-art highcomplexity and power-hungry classic MIMO systems [3]."]} +{"195345175|13074005": []} +{"52946522|21418": ["As such, innovative research on finding both spectrum and energy efficient techniques with low hardware cost is still imperative for realizing a sustainable wireless network evolution with scalable cost in the future [4]."]} +{"129944987|21418": ["The highly demanding data rate requirements of emerging and future wireless networks ( 5 -th Generation (5G) and beyond) have raised serious concerns on their energy consumption [2], [3].", "As a consequence, the bit-per-Joule Energy Ef\ufb01ciency (EE) has emerged as a key performance indicator to ensure green and sustainable wireless networks [2], [3], [8], and several energy ef\ufb01cient wireless solutions have been proposed."]} +{"129944987|10979806": ["A survey on the different approaches to implement energy efficient 5G wireless networks has recently appeared in [9]."]} +{"129944987|1541773": ["As a consequence, the bit-per-Joule Energy Ef\ufb01ciency (EE) has emerged as a key performance indicator to ensure green and sustainable wireless networks [2], [3], [8], and several energy ef\ufb01cient wireless solutions have been proposed."]} +{"207757512|10979806": ["To improve the spectral efficiency and reduce the energy consumption, researchers are exploring new ideas for future wireless systems [3]\u2013[15]."]} diff --git a/edge/graph_209393489.jsonl b/edge/graph_209393489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b800e5055eaa54bab6a6e84ddc7e4f5fac2849d3 --- /dev/null +++ b/edge/graph_209393489.jsonl @@ -0,0 +1,5 @@ +{"18752719|14424486": ["However, so far, these systems generally incorporate simple rule-based extensions to deal with students' affective states, and are based on virtual tutors, not physically embodied robots Nye, Graesser, and Hu (2014).", "(2010) or in one-on-one tutoring sessions Saerbeck et al. (2010); Kory, Jeong, and Breazeal; Fridin (2014)."]} +{"13672317|393948": ["Higher layers capture information more related to the task at hand, e . g . phoneme classes, object types [37]."]} +{"207178553|7360895": ["In the Human-Robot Interaction (HRI) community it is still under debate what characteristics de\ufb01ne a social robot [9, 12]."]} +{"63772988|1225103": ["An important aspect in this kind of research is ASR performance, since it is known that automatic recognition of L2 speech can be problematic (Benzeghiba, De Mori, & Deroo, 2007)."]} +{"27029504|7665100": []} diff --git a/edge/graph_209393502.jsonl b/edge/graph_209393502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9542ddf7abafcab35b7747324ab2ec54bacabb8 --- /dev/null +++ b/edge/graph_209393502.jsonl @@ -0,0 +1,17 @@ +{"18045748|53990263": ["The output connections are then tuned via minimizing the cost function through a linear system [18]."]} +{"115200805|9141490": ["However, researchers currently use these two terms (heuristic and metaheuristic) interchangeably, as there is little difference in their definitions [3] [4] [5]."]} +{"909630|15485264": []} +{"46832122|6339062": []} +{"64807001|16897832": ["A survey on evolutionary computation approaches to feature selection is delineated in [4].", "The classical optimization techniques have some limitations in solving the feature selection problems [16] and hence evolutionary computation(EC) algorithms are the alternative for solving these limitations and searching for the optimum solution [4]."]} +{"15779555|13292799": ["Its low computational complexity com- 978-1-4673-9991-3/16/$31.00 \u00a92016 IEEE 1012 pared to conventional algorithm is one of many advantages which makes swarm intelligence interesting to explore [2]."]} +{"15779555|34657644": []} +{"59273760|209393502": []} +{"8178141|4474193": ["Robust Single-Objective Optimization (RSOO) with respect to Type B is formulated as follows [28]: : (2.", "005 of uncertainty is called Type B [28], and we use the same term in this paper."]} +{"203102170|3053192": []} +{"203102170|12162909": ["Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey. The authors mention the flexibility of metaheuristics in adapting to different modeling approaches. A description and classification of the modeling approaches of optimization under uncertainty are provided. Blum et al. (2010) give a survey on the approaches of hybrid metaheuristics. They mention that combining different metaheuristic algorithms is one of the most successful techniques in optimization. Dorigo and Blum (2005) provide a survey on theoretical notations of ACO. The authors examine the convergence outcomes and discuss the relations of ACO and other optimization methods. They focus on research efforts of understanding the behavior of ACO. Feature aspects of ACO are given in this study. Mohan and Baskaran (2012) review recent research ACO algorithms and propose a new ACO algorithm that is applied for network routing.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey. The authors mention the flexibility of metaheuristics in adapting to different modeling approaches. A description and classification of the modeling approaches of optimization under uncertainty are provided. Blum et al. (2010) give a survey on the approaches of hybrid metaheuristics. They mention that combining different metaheuristic algorithms is one of the most successful techniques in optimization. Dorigo and Blum (2005) provide a survey on theoretical notations of ACO. The authors examine the convergence outcomes and discuss the relations of ACO and other optimization methods. They focus on research efforts of understanding the behavior of ACO. Feature aspects of ACO are given in this study. Mohan and Baskaran (2012) review recent research ACO algorithms and propose a new ACO algorithm that is applied for network routing. Hao and Solnon (2019) describe the common features of metaheuristics by grouping them in two main approaches, perturbative and constructive metaheuristics.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey. The authors mention the flexibility of metaheuristics in adapting to different modeling approaches. A description and classification of the modeling approaches of optimization under uncertainty are provided. Blum et al. (2010) give a survey on the approaches of hybrid metaheuristics. They mention that combining different metaheuristic algorithms is one of the most successful techniques in optimization. Dorigo and Blum (2005) provide a survey on theoretical notations of ACO. The authors examine the convergence outcomes and discuss the relations of ACO and other optimization methods. They focus on research efforts of understanding the behavior of ACO. Feature aspects of ACO are given in this study. Mohan and Baskaran (2012) review recent research ACO algorithms and propose a new ACO algorithm that is applied for network routing. Hao and Solnon (2019) describe the common features of metaheuristics by grouping them in two main approaches, perturbative and constructive metaheuristics. The authors also introduce the diversification and intensification notions, which are used by metaheuristics. Pedemonte et al. (2011) present a comprehensive survey on parallel ACO implementations and give a new taxonomy to classify parallel ACO algorithms.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey. The authors mention the flexibility of metaheuristics in adapting to different modeling approaches. A description and classification of the modeling approaches of optimization under uncertainty are provided. Blum et al. (2010) give a survey on the approaches of hybrid metaheuristics. They mention that combining different metaheuristic algorithms is one of the most successful techniques in optimization. Dorigo and Blum (2005) provide a survey on theoretical notations of ACO. The authors examine the convergence outcomes and discuss the relations of ACO and other optimization methods. They focus on research efforts of understanding the behavior of ACO. Feature aspects of ACO are given in this study. Mohan and Baskaran (2012) review recent research ACO algorithms and propose a new ACO algorithm that is applied for network routing. Hao and Solnon (2019) describe the common features of metaheuristics by grouping them in two main approaches, perturbative and constructive metaheuristics. The authors also introduce the diversification and intensification notions, which are used by metaheuristics. Pedemonte et al. (2011) present a comprehensive survey on parallel ACO implementations and give a new taxonomy to classify parallel ACO algorithms. Cant\u00fa-Paz (1998) provides detailed information about parallel GA. The author collects and presents the most representative publications on parallel GA. Blum et al. (2011) provide a survey on hybrid metaheuristic algorithms with other optimization techniques.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey. The authors mention the flexibility of metaheuristics in adapting to different modeling approaches. A description and classification of the modeling approaches of optimization under uncertainty are provided. Blum et al. (2010) give a survey on the approaches of hybrid metaheuristics. They mention that combining different metaheuristic algorithms is one of the most successful techniques in optimization. Dorigo and Blum (2005) provide a survey on theoretical notations of ACO. The authors examine the convergence outcomes and discuss the relations of ACO and other optimization methods. They focus on research efforts of understanding the behavior of ACO. Feature aspects of ACO are given in this study. Mohan and Baskaran (2012) review recent research ACO algorithms and propose a new ACO algorithm that is applied for network routing. Hao and Solnon (2019) describe the common features of metaheuristics by grouping them in two main approaches, perturbative and constructive metaheuristics. The authors also introduce the diversification and intensification notions, which are used by metaheuristics. Pedemonte et al. (2011) present a comprehensive survey on parallel ACO implementations and give a new taxonomy to classify parallel ACO algorithms. Cant\u00fa-Paz (1998) provides detailed information about parallel GA.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey. The authors mention the flexibility of metaheuristics in adapting to different modeling approaches. A description and classification of the modeling approaches of optimization under uncertainty are provided. Blum et al. (2010) give a survey on the approaches of hybrid metaheuristics. They mention that combining different metaheuristic algorithms is one of the most successful techniques in optimization. Dorigo and Blum (2005) provide a survey on theoretical notations of ACO.", "Baghel et al. (2012) give a review of combinatorial optimization problems that are solved by metaheuristics. The paper examines the evolution of metaheuristic and their process of converging. The authors divide the metaheuristic algorithms categories and make some suggestions to develop well-performed metaheuristic algorithms. Bianchi et al. (2006) introduce ACO, Evolutionary Computation, SA, TS and Stochastic Partitioning methods and their recent applications in their survey. The authors mention the flexibility of metaheuristics in adapting to different modeling approaches. A description and classification of the modeling approaches of optimization under uncertainty are provided. Blum et al. (2010) give a survey on the approaches of hybrid metaheuristics."]} +{"203102170|1497912": []} +{"203102170|9141490": []} +{"203102170|16467945": ["Puchinger and Raidl (2005) discuss different state-of-the-art techniques to combine metaheuristics with brute-force algorithms to optimize\ncombinatorial problems.", "Puchinger and Raidl (2005) present another survey on recent methods of combining metaheuristics and exact algorithms."]} +{"203102170|7252389": []} +{"3880682|289357": [", \u2018conjecture [5]\u2019 and \u2018NP-hard problem [6]\u2019 are leading research areas."]} +{"205707365|12957829": ["[43] 2012 --Review and Taxonomy of hybrid DE and PSO Nwankwor et al."]} diff --git a/edge/graph_209405100.jsonl b/edge/graph_209405100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2df0ed27ab32a863308e8482d27722d14c84c874 --- /dev/null +++ b/edge/graph_209405100.jsonl @@ -0,0 +1,23 @@ +{"3809961|9495329": ["[59] N. Bizanis and F. A. Kuipers, \u2018\u2018SDN and virtualization solutions for the Internet of Things: A survey,\u2019\u2019 IEEE Access, vol. 4, pp. 5591\u20135606, 2016.", "Bizanis and Kuipers [59] supposed that SDNs", "Bizanis and Kuipers [59] supposed that SDNs and networks virtualization technology provide scale and versatility necessary for IoT service, and they pointed out that SDNs could be used together with machine learning technology to make network more intelligent and self-adaptive."]} +{"3809961|6583734": ["by a software, which facilitates network management and satisfies requirements of dynamic networks for intelligent manufacturing [57], [58]."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"21705502|52059869": []} +{"21705502|206578224": ["In addition to MEC integration technologies like SDN, NFV, and network slicing discussed in [4], we consider ICN in", "Furthermore, in our previous survey [4], we discuss the role of MEC in 5G network edge cloud architecture and orchestration.", "As summarized in [4], the three key benefits of the collaboration between IoT and MEC are: 1) lowering the amount of traffic passing through the infrastructure; 2) reducing the latency for applications and services; and 3) scaling network services diversely."]} +{"21705502|3757239": ["1) Requirements: Computation offloading is the most prominent and widely discussed feature of MEC that empowers resource-constrained IoT devices with augmented computational capabilities [29], [33]."]} +{"21705502|31245252": ["Few other papers are focused on the combined aspects of IoT research and their potential application scenarios [7], [18]\u2013[20]."]} +{"21705502|6909107": ["2) Related Work: Several mobility management policies have been proposed for the MEC architecture [29], [133]\u2013[135].", "In addition to the literature mentioned in [29], Table X summarizes the reviewed state-of-the-art mobility management in MEC enabled IoT.", "in [29], the existing work that addresses MEC computation offloading decisions have been nicely summarized based on full and partial offloading types.", "Moreover, [29] provides an overview of the latest research works that address", "in scenarios where the UEs mobility is confined within a given space such as an office room [29], [136], [137].", "Mach and Becvar [29] presented a user-oriented use case of MEC from the perspective of computational offloading and", "1) Requirements: Computation offloading is the most prominent and widely discussed feature of MEC that empowers resource-constrained IoT devices with augmented computational capabilities [29], [33].", "capabilities, or cloud capabilities, and availability [29]."]} +{"21705502|206578365": ["out in [32], the task models for partial offloading can be represented by task-call graphs with sequential, parallel, and general dependencies.", ", task model for binary offloading) [32].", "The inherent challenges with wireless communication channels like multi-path fading, interference, and spectrum shortage should always be taken into account for the design of MEC systems to seamlessly integrate computation offloading and radio resource management [32]."]} +{"21705502|4427557": ["vacy [12], trust [13], Social Internet of Things (SIoT) [14], communication [15], context awareness [16], and future directions [6], [17].", "[15], interoperability among various IoT LPWAN technologies encountered in IoT is still an open research question to address."]} +{"21705502|3767252": ["Typical security threats in these areas are Denial of Service (DoS) attacks, Man-in-the-Middle (MitM) attacks and malicious node problems [34], [143].", "More detailed descriptions of these threats are presented in [34].", "understand the particularities of every edge paradigm, as they have subtle differences that will affect the implementation and deployment of the security mechanisms [34].", "Although trust is an equally important property similar to security and privacy in IoT and MEC, it is hardly addressed lately in research works [34].", "As discussed in [34], the \u201canything, anytime\u201d principle should be the underlying building blocks and application scenarios for MEC-enabled IoT systems [152].", "2) Related Work: Security and privacy challenges in MEC like edge computing paradigms are surveyed in [34] and [154]."]} +{"21705502|21386749": ["Although IoT technologies are widely adopted in the health sector [47], their performance goals will not be achievable without edge"]} +{"21705502|7329149": ["the agricultural sector will require some major evolution where IoT will be integrated in various production, management, and analytical processes [77], [78]."]} +{"21705502|1598350": ["efits such as improving connectivity, efficiency, scalability, time savings, as well as cost savings for manufacturing processes with the maximum use of smart machines [92], [94]."]} +{"21705502|18687271": ["[142] Analyzed distributed mobility management for future IoT sensor networks."]} +{"21705502|3348390": ["vacy [12], trust [13], Social Internet of Things (SIoT) [14], communication [15], context awareness [16], and future directions [6], [17]."]} +{"117689368|21386749": []} +{"9121328|1775475": ["In [5], Chalmers et al. explain how context-awareness and missioncritical requirements would be critical issues with respect to managing Quality-of-Service (QoS) in future mobile computing environments."]} +{"3503216|3579945": ["Note that, although this improvement in the energy efficiency is especially useful for battery-operated gateways, the increase on the level of security may also benefit other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which can be the target of cyberwarfare attacks [20]."]} +{"3503216|13991708": ["\u2026gateways, the increase on the level of security may also bene\ufb01t other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which\u2026", "As explained in [16], the fog layer must provide horizontal integration between different layer protocols."]} +{"52896323|4570697": []} +{"57756894|29859741": ["\u2026modern vision, healthcare edge computing is emerging as a way for entities to embrace near real-time results by processing data as close as possible to the source, de\ufb01nitely stating that cloud computing is not an ef\ufb01cient way to process data when data are produced at the edge of the network [5].", "The main contribution of this paper is the design of a new communication and computing architecture for mobile healthcare monitoring based on the edge paradigm [5] rather than on the classical cloud paradigm to achieve the following."]} diff --git a/edge/graph_209405111.jsonl b/edge/graph_209405111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7052bb58b2e29235562e07b7b7e7a93b22a9f0ef --- /dev/null +++ b/edge/graph_209405111.jsonl @@ -0,0 +1 @@ +{"204734176|44157913": ["Using domain adaptation ideas [15, 16, 17], we associate a tag to each sentence of the source corpus, which represents the document information."]} diff --git a/edge/graph_209414629.jsonl b/edge/graph_209414629.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209414738.jsonl b/edge/graph_209414738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..708e7cb0edcdf4fa7956b70dddbd7b590c3e3919 --- /dev/null +++ b/edge/graph_209414738.jsonl @@ -0,0 +1,27 @@ +{"4983376|15468128": ["\u2026of some linear block codes (e.g., BCH codes) [9], the Viterbi decoding of convolutional codes [9], the iterative decoding of Turbo codes [10], [11] and graph-based codes (e.g., low-density parity-check (LDPC) codes) [12], [13], and the Berlekamp-Massey algorithm [9] and the list decoding [14]\u2026", "When the number of 1\u2019s lies in the closed intervals [0 , 1] , [2 , 4] , [5 , 7] , [8 , 10] and [11 , 12] , the coded-modulation in effect will decode the information bits as \u201c00\u201d, \u201c01\u201d, \u201c10\u201d, \u201c11\u201d, and \u201c00\u201d, respectively."]} +{"1985564|6111895": ["Recent breakthroughs in bio-nano technology have motivated molecular communicati on [1, 2] to be a biologically-inspired technique for nanonetw orks, where devices with functional components on the scale of 1\u2013 100 nanometers (i."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"23354442|15199849": []} +{"23354442|10762348": []} +{"3489980|3392135": []} +{"52043586|1353379": ["[88] discuss three machine learning data fusion techniques for IoT data, named as probabilistic methods, artificial intelligence, and theory of belief."]} +{"52043586|15553087": ["There are different clustering approaches like Partitional, Density-based, Hierarchical, Spectral, Grid-based, Gravitational, Correlation, and Herd clustering [108]."]} +{"52043586|3304959": ["But the idea of leveraging from conventional medical data using big data analytics tools to address different healthcare challenges is not a new topic [6].", "There already exists an ongoing debate on the possible role of big data analytics in healthcare [5], [6], [8], [61], [63], and its practical implications [64]-[67] that is very promising."]} +{"17765186|1940388": ["Wonderful survey papers have been published on this topic [18, 19, 20] covering all aspects from authentication techniques to confidentiality and integrity solutions and also"]} +{"11719728|6111895": ["I. INTRODUCTION\nMolecular communication (MC) is a new interdisciplinary research paradigm, where small particles such as molecules are used to convey information [1]."]} +{"3620051|3392135": ["1\u201310 THz) is considered as the most promising band for operation of nano devices [5], because of its non-ionization and robustness to the fading characteristics.", "SYSTEM MODEL The envisioned architecture for nano-network based in-vivo healthcare is given in [5], and is shown in Fig.", "Envisioned architecture for nano-healthcare [5].", ") with remarkable properties, interest in development of nano devices, their interconnectivity to realize the internet of nano things [1]\u2013[4], and its applicability in biomedical applications [5] is increasing rapidly.", ", endoscopy [6], the wireless-capable nano-scale devices are less obtrusive and non-invasive in nature which makes them an ideal candidate for the in-vivo biomedical applications [5], [7].", "As of today, there are very limited studies in open literature which discuss nano-scale communication in THz band and its applicability in the biomedical domain [1], [5], [8]\u2013[15]."]} +{"21635662|6111895": ["However, its performance has important drawbacks such as low capacity, high latency, and sensitivity to environmental parameters [9]."]} +{"5463512|6111895": ["2525538 ratio of the antenna size to the wavelength of the electromagnetic signal [1]\u2013[3]."]} +{"58014134|3392135": ["nanomachines capable of networking with each other and their surroundings in order to accomplish a desired task still evades us [26]."]} +{"58014134|10709221": ["of diseases, such as continuous health monitoring, smart drug delivery, artificial organs, and lab-on-a-chips [3], [4] (see Fig.", "Moreover, the ligand-receptor docking mechanism, which serves as a header for receptor/cell specific long range targeting, enables the possibility of design of very complex and large scale networking schemes with applications in gene therapy [4]."]} +{"58014134|6111895": ["communications via pheromone between plants [6].", "processing unit can operate via chemical pathways [6] or through biocompatible micro-scale processors, or via synthetic genetic circuits [44].", "There are three main propagation channels that can be exploited by MC: free diffusion, flow-assisted propagation, and motor-powered propagation [6], [47].", ", intrabody medium [5] and confined channels like pipe networks [6], [7].", "This motion can be mathematically represented as [6]", "Diffusion-based MC provides short range information transfer in the order of micrometers [6]."]} +{"144421|21386749": []} +{"4622351|6111895": ["The possibility of harnessing information processing and communication functionalities from chemical and physical processes at the level of molecules has been at the basis of a great bulk of research in recent years on Molecular Communication (MC) [1\u20134]."]} +{"3632470|3392135": ["1-10 THz) inside the human body [2], [3]."]} +{"3678573|6111895": []} +{"2703985|1230643": ["Despite being similar to micro- and macroscale sensors [2], it should be taken into account that (i) the solutions in the nanoscale are limited not just in terms of existing manufacturing"]} +{"15588759|1236072": ["A signi\ufb01cant amount of research on routing and forwarding techniques for traditional WSNs started more than a decade ago [3]."]} +{"3297885|6111895": ["Furthermore, inspired by the biological behaviour of MC system, different types of molecules with resistance or kill effect on information carrying molecules have also been proposed as another method to overcome the ISI effect [1].", "W ITH the advancements in nano-technology, new multidisciplinary research on communication between bionanomachines via chemical signals is emerging [1].", "In (3) and (4), Phj denotes Phit (d, j Tb) and it can be derived as in [1], using Eq.", "As summarized in [1], borrowing from traditional communication system designs, equalization techniques like decision feedback filter technique, transmitter-based novel modulation techniques such as molecular transition shift keying and Molecular ARray-based COmmunication (MARCO), and energy efficient transmitter and receiver-side signal power adjustment methods have been proposed as ISI mitigation techniques for MC environment."]} +{"23030053|6111895": ["Its applications include targeted drug delivery [1], [3], [4] and industrial monitoring [2].", "MOLECULAR communications has gained significant research attention in recent years, providing an alternative and attractive way to communicate at small-scales and in biological environments [1], [2].", "It has been shown that the binomial distributed noise can be approximated to a Normal distribution [2]."]} +{"207022752|11732290": ["At the submillimeter scale, other significant milestone studies in untethered microrobotics include a study on bacteria-inspired swimming propulsion [54], bacteriapropelled beads [23], [55], steerable electrostatic crawling microrobots [30], catalytic self-propelled microtubular swimmers [24], laser-powered microwalkers [31], magnetic resonance imaging (MRI) device-driven magnetic beads [29], and magnetically driven millimeter-scale nickel robots [56].", "Through off-board actuation approach, many groups used remote magnetic actuation to stop, propel, or navigate capsule millirobots in the GI tract [77].", "For the localization of millirobots inside the GI tract, as the first approach, medical imaging devices such as fluoroscopy, which uses low-dose X-rays to image the capsule region at 1\u20132 frames per second [77] ultrasonic imaging [77]\u2013[80], positron emission tomography (PET) [77], [81] and magnetic resonance imaging (MRI) [77].", "[195] B. Huang, M. W. M. Law, and P. L. Khong, \u2018\u2018Whole-body PET/CT scanning: Estimation of radiation dose and cancer risk 1,\u2019\u2019 Radiology, vol. 251, pp. 166\u2013174, 2009.", "Using MRI to localize the medical microrobot has the same considerations as those above for actuating the microrobot.", "However, the fringing fields at the end of an MRI device or solenoid can lead to large spatial magnetic gradients.", "[179] H. F. Wehrl et al., \u2018\u2018Preclinical and translational PET/MR imaging,\u2019\u2019 J. Nucl.", "[95] P. Pouponneau, J. C. Leroux, G. Soulez, L. Gaboury, and S. Martel, \u2018\u2018Co-encapsulation of magnetic nanoparticles and doxorubicin into biodegradable microcarriers for deep tissue targeting by vascular MRI navigation,\u2019\u2019 Biomaterials, vol. 32, pp. 3481\u20133486, May 2011.", "[71] S. Martel et al., \u2018\u2018MRI-based medical nanorobotic platform for the control of magnetic nanoparticles and flagellated bacteria for target interventions in human capillaries,\u2019\u2019 Int.", "[137] S. Martel, M. Mohammadi, O. Felfoul, Z. Lu, and P. Pouponneau, \u2018\u2018Flagellated magnetotactic bacteria as controlled MRI-trackable propulsion and steering systems for medical nanorobots operating in the human microvasculature,\u2019\u2019 Int.", "[180] M. S. Judenhofer et al., \u2018\u2018Simultaneous PET-MRI: A new approach for functional and morphological imaging,\u2019\u2019 Nat.", "[178] F. Chen et al., \u2018\u2018In vivo tumor vasculature targeted PET/NIRF imaging with TRC105(Fab)-conjugated, dual-labeled mesoporous silica nanoparticles,\u2019\u2019 Mol.", "Many successful localization methods are available for millirobots [77], [78], [81]\u2013[85], while localization of micron scale medical robots is a great challenge due to their much smaller size [94].", "Medical imaging systems such as MRI [71], [137], fluoroscopy [177], PET [178], NIR [179], and ultrasound [178] are possible candidates for microrobot localization.", "Spatial gradients are reported for the patient accessible volume of MRI machines to reach several Tesla per meter, but are typically found outside the central bore and the procedures to measure the maximum possible spatial gradient are not well defined [194].", "Moreover, by placing a small magnet inside the millirobot, hall-effect sensor arrays outside the patient have been used to localize the device [77], [82].", "an alternative approach, a radio transmitter has been placed on the commercial passive capsule endoscopes, and by placing multiple receiver antennas around the patient, an average position error of approximately 38 mm has been realized [77].", "Limitations on PET are already set for staff preparing the tracer nucleotide as well as during patient care.", "[191] I. C. Atkinson, L. Renteria, H. Burd, N. H. Pliskin, and K. R. Thulborn, \u2018\u2018Safety of human MRI at static fields above the FDA 8 T guideline: Sodium imaging at 9.4 T does not affect vital signs or cognitive ability,\u2019\u2019 J. Magnet."]} diff --git a/edge/graph_209429824.jsonl b/edge/graph_209429824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..157bb64ade3d3efa2cd571cb1f30fef18bda6e3b --- /dev/null +++ b/edge/graph_209429824.jsonl @@ -0,0 +1,160 @@ +{"5037902|16313703": ["2764330 and 4G/5G cellular communications, the Internet of Things (IoT) is evolving to a paradigm that enables the interconnection of physical objects and human in smart cities/homes, and so on [1], [2]."]} +{"1236771|206576469": ["Each of these bu\ufb00ers introduces some extra-delay [7] but they guarantee reliable, in-order E2E communication on multi-paths."]} +{"44100586|206578224": ["The rational is to proactively cache appropriate segment encodings (based on rate estimation) in appropriate edge cloud platforms or MEC locations considering user\u2019s mobility prediction, thus avoiding the backhaul delay, while regulating congestion on backhaul links.", "In these use cases, the partial sub-problems introduced in Section V are solved; specifically, a) the segment-to-BS mapping sub-problem is approached via the mobility prediction algorithm (Algorithm 1) in use cases 2 and 3, determining where appropriate segment encodings will be placed (i.e., in which MEC platforms), and b) the segment-to-quality layer mapping sub-problem is approached via the rate adaptation algorithm (Algorithm 2) in all use cases, determining the appropriate segments to be selected (use cases 1 and 3) or to be encoded (use case 2).", "M BS (and equal MEC platforms).", "Computing (MEC) [11], which can cache HAS segments in advance based on forecasted user mobility in order to enhance", "In such a case, the MEC platform can be collocated at the baseband unit (or in a 5G scenario at the CU or DU).", "As before, three HAS variations are considered named: a) the standard HAS, where there is no proactive caching, b) the rate-guided HAS, where the rate estimation is used to enforce the VSP segment selection, with the mobility prediction guiding the\nproactive caching of these selected segments to the appropriate MEC locations, and c) the minimum stallings HAS that caches the lowest segment quality layers only.", "Also, [33], explores the MEC paradigm, proposing a reference architecture for orchestration and management, where Channel State Information (CSI) is sampled to enforce service-level management.", "The need to improve the end users\u2019 experience together with the emergence of technologies such as SDN, MEC and personalized network slicing [46], which enable such improvements through service/application and user/OTT differentiation, pose a challenge to net neutrality principles.", "The entire network comprises m = 1, 2, . . . , M BSs, each co-located with a MEC server, used for caching of video segments.", "The unknown optimization variable in this problem is xmusl, which represents the selection of a segment with index number s of quality l that is destined for user u from the BS/MEC m.", "3) Segment-to-Quality Layer Mapping Sub-Problem: As soon as the number of segments per BS per user is known from the previous step, the segments can be cached in the respective queues at the local caches, e.g. MECs.", "The appropriate segment is placed on the MEC server closer to the user, considering the user mobility prediction with respect to a predefined prediction window, and will be offered to the user replacing the original segment selection that may lead to stalling events.", "So, in order to find the segments that need to be handled by one BS (local MEC cache) we need to find the proportion of time the user stays at the BS coverage so as to transmit the requested segments in advance.", "In terms of the constraints imposed, equation (4) expresses the binary nature of the unknown variable xmusl, while equation (5) mandates that each user can request a segment at only one quality layer and from only one MEC platform.", "2) Use case 2: Segment encoding and placement considers the network-aware encoding and potential distribution of segments to MECs based on expected network conditions within each BS coverage area.", "For the purposes of the simulations, the complete end-to-end HAS logic (i.e., video file encodings at different rates, streaming logic, user HAS strategies, user buffers with a maximum buffer size and a minimum playout threshold, etc.) is adopted considering also caching logic within BSs that represent MEC platforms, while the user distribution and mobility are implemented using the SLAW model.", "We complementary explore the use of Multi-access Edge Computing (MEC) [11], which can cache HAS segments in advance based on forecasted user mobility in order to enhance QoE, while allowing MNOs to utilize the network resources more efficiently.", "Hence, by this step we estimate how many segments per user need to be cached per BS (assuming that a MEC server is co-located with a BS)."]} +{"53242304|14849079": []} +{"33804042|2623404": ["ONF describes the SDN architecture in three functional parts which are infrastructure layer, control layer and application layer [30], [32], [33]:"]} +{"33804042|2387055": ["Several SDN security threats have been reported in [87] apart from DDoS others includes unauthorized access, data leakage, data modi\ufb01cation, and malicious applications."]} +{"38495583|64404": ["Most video coding standards, including H.263, H.264/AVC [24], H.265/HEVC [25], VP8, and VP9, use block-based coding to remove correlations among adjacent pixels Note that in the above process, steps 1, 2, and 4 are invertible and lossless."]} +{"38495583|3540699": ["Most video coding standards, including H.263, H.264/AVC [24], H.265/HEVC [25], VP8, and VP9, use block-based coding to remove correlations among adjacent pixels Note that in the above process, steps 1, 2, and 4 are invertible and lossless."]} +{"38495583|7439310": ["SVC (Scalable Video Coding) allows a video to be encoded once and decoded and accessed many times at different rates and ideally at any rate [26]."]} +{"6014916|64404": ["6 is considered as reference light field coding and decoding architecture; b) JPEG 2000 and HEVC compression standards are the coding tools adopted in the processing chain; c) a dataset of light field images is coded with different coding parameters for each one of the compression standards; d) the objective quality metrics presented in Section 4.1 are computed for all the decompressed light fields obtained in the previous step; e) the subjective quality evaluation presented in Section 4.2 is performed and the mean opinion scores are computed; f) the proposed full reference objective quality evaluation metric presented in Section 4.3 is computed for all the decompressed light fields; g) the performances of the reference methods and of the proposed method are computed in terms of correlation with the subjective evaluation using the method described in Section 4.4.", "The average MOS results for each JPEG2000 coding rate are shown in Table 2, while the average MOS results for each HEVC quantization parameter are shown in Table 3.", "Four different compression\nrate (0.1, 0.25, 0.5, 0.75, and 1bpp) are plotted for the compression with JPEG 2000, while four quantization parameters (QP = {22, 27, 32, 37}) are plotted for the compression with HEVC.", "Table 5 shows the PCC results obtained for HEVC encoded light fields.", "For all tests, JPEG 2000 resulted having slightly better compression performance than HEVC, for both the PSNR comparison and the SSIM comparison.", "The average PSNR\ndifference between JPEG 2000 and HEVC computed on the whole dataset using the Bjontegaard metric [2] is PNSR = 0.47dB.", "The main contributions of this paper are as follows: a framework for evaluating the visual quality of uncompressed light fields is proposed; state of the art image compression algorithms, namely JPEG 2000 and HEVC, are used as coding tools for light field data and results are evaluated in terms of objective metrics, namely PSNR and SSIM; quality of experience in viewing a motion animation of the scene captured by the light field is subjectively evaluated; a novel full reference objective quality metric is proposed; correlation between objective metrics and mean opinion scores is computed and discussed.", "Two image coding standards, namely JPEG 2000 [48] and HEVC [49], have been selected, among the various possibilities, for the interest in comparing the compression performances of two of the main approaches to image compression, which are wavelet based (as JPEG 2000) and block based (as HEVC)."]} +{"14517768|15170341": ["Moreover do the large number of QoE models which exist e.g. for VoIP traffic [9], [10] or video streaming [11], [12], [13] only allow to quantify the user satisfaction after the application has been terminated.", "In Section VI we summarize the contributions of this paper and give an outlook on future work."]} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"51874354|6909107": ["Among the available MEC solutions [14], [15], [16], [17], [18], [19], [20], [20], [21], we adopted the approach described in [22].", "A good survey on the placement algorithms is presented in [14], nevertheless most of them only consider of private VM allocation."]} +{"44755539|14889616": []} +{"15035771|2623404": ["Nunes et al. [1] presented a standard survey with emphasis on past, present and future implementations of SDN.", "In [1] and [7] a list of hardware switches is given, all OpenFlow compliant."]} +{"15035771|4608889": ["[6] take a similar approach concerning OpenFlow technologies in carrier-grade and data center networks."]} +{"15035771|10693567": ["The controllers contain the forwarding logic, but can be enhanced with additional routing logic.", "OpenFlow has attracted many researchers, organizations and foundations, so a wide collection of open-source software is available in the form of OpenFlow controllers (section III-C), as well as physical and virtual switch implementations (section III-D).", "In [7], Lara et al. provide an extensive survey on network innovations using OpenFlow, where the OpenFlow speci\ufb01cation is discussed in detail and recent experiences with OpenFlow deployments on campus networks and testbeds are shared."]} +{"15035771|2387055": ["A survey on security in SDN is given by Scot-Hayward et al. [3]."]} +{"15035771|14276831": ["Multiple schemes can be applied to recover paths in case of link failures, where a distinction can be made between protection and restoration schemes [24].", "To create a robust and resilient network, the network topology must include redundant paths [24]."]} +{"1319536|14889616": ["264/SVC [17], when congestion in the mobile network is detected, the operator may decide to drop the least important video packets in the flow in case of small losses, while whole video layers may be dropped whenever the bandwidth reduction persists.", "264/SVC [17], designed to address the issues of serving heterogeneous user terminals."]} +{"52289726|2261490": []} +{"16580150|7686677": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|14388097": ["While most studies analyze multimedia streaming in the regular client-server architecture, a survey on the research on quality of service for peer-to-peer media distribution was presented in [113]."]} +{"16580150|10837932": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|17428811": ["[38] included SVC for an MPEG-4 FGS streaming system [65], in which a mobile client can control its decoding capability according to the energy management policy."]} +{"23627391|399542": ["These QoS\u2013QoE models were mainly built for voice and video services, which means that they are lacking universal applicability for other services [6].", "Research has shown that raw QoS measurements and the associated KPIs are not necessarily a reliable predictor of QoE [6, 13], which is why modern QoE models focusing on perceptual characteristics of the monitored systems can help at providing a user perspective, based on measurements from the network."]} +{"23627391|2261490": ["In the recent years, a shift from traditional technology-centric QoS models to more holistic user-centric QoE models could be observed [8], although QoS\u2013QoE mapping models", "Since probes may just forward captured information, with the quality calculation happening at a central location, we identify two distinct points [8]: 1) the monitoring point, at which information is collected, and 2) the quality estimation point, at which the information is used to calculate a quality indicator."]} +{"10803927|5122855": ["For any video streaming application, avoiding rebuffer-ing and streaming the best possible video quality are the two main objectives of any rate adaptation algorithm [144]."]} +{"10803927|64404": ["One solution is to improve the compression efficiency as proposed in [23]."]} +{"10803927|16748080": []} +{"10803927|3540699": ["On the other hand, modern video compression techniques, such as H.264 [15], rely on compensation prediction algorithms, which in turn rely on the interdependence between successive frames.", "According to [22], a 720p video is encoded at an average of 2.5-3.5 Mbps, a 1080p at 5-6 Mbps and a 4K within a range of 18-20 Mbps\u2014all having 30fps and using H.264 [15]."]} +{"10803927|18647611": ["A detailed survey of the various approaches that use content adaptation to manage the energy consumption of the wireless mobile devices is presented in [105]."]} +{"64333084|8363289": ["For discussion of MPC from the point of view of optimal control, see [21]\u2013[23]; for a survey of stability and optimality results, see [24]."]} +{"203706479|52059869": ["Such a massive amount of the multimedia traf\ufb01c in combination with the quality demanding users requires Network Operators (Internet Service Providers (ISPs) and Mobile Network Operators (MNO)), to include Quality of Experience (QoE) in the network management [2], [3]."]} +{"203706479|206578224": ["Though numerous efforts in the state-of-the-art can be found related to QoE management in 5G [25], [26], we would like to highlight most relevant studies from the literature with regards to data-driven approaches for the QoE management in the 5G networks."]} +{"203706479|2261490": ["However, the provision of higher QoE to the users requires network operators to incorporate novel QoEaware network management approaches [5]\u2013[8]."]} +{"2949800|2623404": ["The concept of SDN [15], [12] has emerged as a popular tool for the management of network services through abstraction of low-level functionality on a large cluster of network devices."]} +{"15632821|14889616": ["In [10] an overview of interesting use cases for applying\nSVC in a network environment are presented, among which the graceful degradation of videos when the network load increases.", "The authors argue the need for Media Aware Network Elements (MANEs), capable of adjusting the SVC stream based on a set of policies specified by the network provider.", "In [12] and [13] the use of SVC has been optimized for wireless networks.", "The videos were encoded using a SVC encoder, after which the PSNR-values of each segment were calculated.", "Available: http://doi.acm.org/10.1145/2155555.2155580 [7] T. Schierl, Y. Sanchez de la Fuente, R. Globisch, C. Hellge, and T. Wiegand, \u201cPriority-based media delivery using SVC with RTP and HTTP streaming,\u201d Multimedia Tools and Applications, vol. 55, pp. 227\u2013246, 2011.", "In [11] a prototype of an intermediary adaptation node is proposed, where the media gateway estimates the available bandwidth on the client link and extracts the supported SVCstreams.", "Network optimizations for SVCstreaming have been applied on lower layers as well.", "This also induced the adoption of SVC in HAS by the development of new client heuristics using the specific properties of SVC such as the incremental characteristics of these videos [6].", "In [14], Krishnamurthy et al. propose a pricing mechanism for SVC delivery for characterizing the costs of bandwidth allocations.", "Recently, the standardization of the extension to the widely used video coding standard H.264/AVC called Scalable Video Coding (SVC) [5] has led to an increased adoption of this encoding scheme."]} +{"2261490|6581557": ["Traffic collection closer to the end user will provide input for a more accurate estimate of QoE, as discussed also in [85]."]} +{"24534627|14889616": ["MGS scalability provides sufficient bitrate granularity for rate adaptation.", "The video sequences are encoded with the SVC codec (Medium Grain Scalability (MGS) [16]) and comprise a base layer and 12 quality layers."]} +{"3923912|10299098": ["To reduce the heavy traffic load of the base station and provide context-aware services in close proximity to the mobile multimedia users, mobile edge computing has been introduced to push mobile computing, network control and storage to network edges [3]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"35240178|2261490": []} +{"208636924|209429824": []} +{"208636924|52059869": [". 5G network softwarization Network softwarization is an approach that involves the use of software programming to design, implement, deploy, manage and maintain network equipment/components/services [20,55] . Net- work softwarization aims to deliver 5G services and applications with greater agility and cost-effectiveness. Along with the realiza- tion of 5G network requirements (e.g., programmability, \ufb02e", "Networks 167 (2020) 106984 \u201c 3 Table 1 A Summary of Related Survey Papers on Network Softwarization and 5G Network Slicing. Contributions and covered [15]-2016 [16]-2016 [17]-2016 [18]-2017 [19]-2017 [20]-2018 [21]-2018 [22]-2018 [23]-2018 Our paper-2019 5G Service Quality Requirements \u2717 \u2717 \u2717 \u2717 \u2717 \u2717 \u2717 5G Market Drivers & Key Vertical Segments \u2717 \u2717 \u2717 \u2717 \u2717 \u2717 \u2717 Network Softwarization \u2717 5G Networks Consid"]} +{"208636924|206578224": ["Furthermore, it marries the speed and style of a DevOps/NetOps approach with the formal models and processes an operator require to introduce new services and technologies [201] .", "Within the context of the catalyst project, ZOOM has been providing demos supported by operators and vendors that establishes DevOps, Ne-tOps and ServOps user scenarios [201] ."]} +{"208636924|206456479": ["Foukas et al. [19] presented a survey of network slicing in the 5G context and identify some challenges regarding service-oriented 5G. Yousaf et al. [10] presented the design of a \ufb02exible 5G architecture for network slicing with an emphasis on techniques that ultimately provide \ufb02exi-ble\u2026", "We summarize our contributions as follows: Contributions and covered scope [15] -2016 [16] -2016 [17] -2016 [18] -2017 [19] -2017 [20] -2018 [21] -2018 [22] -2018 [23] -2018 \u2022 We describe the prominent service and business requirements for the upcoming 5G network of 2020 and beyond.", "Following the conception of network slicing, different works in the past have been proposed to identify the potential approaches, uses cases, architectures and the huge bene\ufb01ts brought by network slicing technology in meeting the demands of vertical applications in 5G networks [10,16,17,19,23\u201329] .", "Despite these effort s, a signi\ufb01cant challenge for 5G network slicing realization in terms of infrastructure and NFs as stipulated in [19] is how to move from a high-level description of the service to the concrete network slice."]} +{"208636924|25911553": ["We summarize our contributions as follows: Contributions and covered scope [15] -2016 [16] -2016 [17] -2016 [18] -2017 [19] -2017 [20] -2018 [21] -2018 [22] -2018 [23] -2018 \u2022 We describe the prominent service and business requirements for the upcoming 5G network of 2020 and beyond."]} +{"208636924|44621519": []} +{"208636924|206578365": ["MEC [120] offers application and content providers cloud-computing capabilities and an IT service environment at the edge of the mobile network [121] ."]} +{"208636924|10342730": []} +{"208636924|10979806": []} +{"208636924|11414835": []} +{"208636924|18687271": ["The new introduced distributed mobility management (DMM) [34,36] proposals for 5G seems to be a solution to overcome the current mobility management limitations."]} +{"208636924|10693567": []} +{"208636924|69839438": ["We summarize our contributions as follows: Contributions and covered scope [15] -2016 [16] -2016 [17] -2016 [18] -2017 [19] -2017 [20] -2018 [21] -2018 [22] -2018 [23] -2018 \u2022 We describe the prominent service and business requirements for the upcoming 5G network of 2020 and beyond."]} +{"46853057|2623404": ["Though SDN gained the popularity very recently, its principle of segregation of the data, control and management planes are not very new [5].", "In [5], these past, present and future aspects SDN have been addressed."]} +{"46853057|10693567": ["Gradually, OpenFlow became popular for SDN applications which are being tried in many different networks these days [4].", "SDN was started at Stanford university as OpenFlow as an experimental initiative for unified network operation, control and management [4].", "IoT architecture is going to dodge these issues and maintain stable and convenient managing principles using SDN [4] \u2013 [7]."]} +{"23979583|2261490": ["The QoE is measured with the Mean Opinion Score (MOS) and ranges in the interval [1, 5] where 1 means minimum quality and 5 maximum quality."]} +{"46927402|25208151": ["With regards to cross-layer, QoE-driven approaches, we note References [13, 16, 37, 75, 103, 128]."]} +{"46927402|18263962": ["In Reference [35], Engelke et al. classify physiological measurements and survey methods that are most accessible and promising for meaningful exploration of multimedia QoE."]} +{"46927402|5122855": ["Currently, there is no widely accepted QoE model for HAS, but ITU-T provides a parametric bitstream-based quality assessment model in ITU-T P.1203 (formerly referred to as P.NATS) [68], while the key influences factors of HAS are surveyed in References [45, 121]."]} +{"46927402|11381680": ["Existing frameworks for QoE evaluation are surveyed in Reference [62]."]} +{"46927402|7909810": ["Monitoring architectures commonly collect data using passive or active probes deployed along various parts of the service delivery chain [50, 110]."]} +{"46927402|399542": ["The general relationships and functional forms are discussed in References [6, 7, 40, 82, 116]."]} +{"46927402|2261490": ["With regards to cross-layer, QoE-driven approaches, we note References [13, 16, 37, 75, 103, 128].", "An in-depth overview and comparison of previous studies is given by Barakovic and Skorin-Kapov [13], who focus in particular on QoE modeling, monitoring, and control in wireless networks."]} +{"46927402|15170341": []} +{"46927402|40202226": []} +{"16729077|2261490": ["This calls for new quality of experience (QoE) driven resource management mechanisms, as the demand and popularity of advanced multimedia services aiming to meet user experience requirements are expected to grow (Agboma and Liotta, 2012; Barakovi\u0107 and Skorin-Kapov, 2013)."]} +{"22011446|2261490": ["Moreover, the service quality is most of the time degraded by the poor network conditions and occurrence of congestion in the access network of the Internet Service Providers (ISPs) [2]."]} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"49564388|206578486": ["\u2026where the server is then hosted in the home gateways of the end-users [29, 89, 135, 139, 143], and ( ii ) in mobile networks, where the server is part of a wide distributed cloud platform [37, 93, 113], which has been successively called MEC [66, 100, 138], cloudlet [80, 81], and fog [106].", "Readers who are interested in more details on fog computing are referred to these two surveys [106, 150].", "Mouradian et al. [106] present an even more comprehensive survey on fog computing."]} +{"49564388|19711892": []} +{"49564388|206576469": ["An extensive overview of means for reducing Internet latency is given by Briscoe et al. [20]."]} +{"49564388|3042864": ["Depending on specific criteria, including network bandwidth, latency, and processing time, the software is spread into client and server partitions [1, 79, 122]."]} +{"25082076|45775424": ["Researchers began to bring techniques from HCI into the field and started performing formal evaluations and experiments on AR systems to learn more about effective interfaces, compelling presentation strategies, collaboration, and how to craft engaging user experiences [7][19]."]} +{"11182915|2623404": ["Software-defined networking (SDN) [4, 5] is a recently emerging paradigm."]} +{"11182915|14889616": ["[3]."]} +{"11182915|3540699": ["264/AVC) [2] is used to encode video segments."]} +{"46955039|3645740": ["Afterwards, Section III-B explains the QoS and QoE metrics, that must be considered for media services, and Section III-C covers the Key Performance Indicators (KPIs) which come into play.", "Machine Learning is a good technology candidate to support the vision of the Self-Organised Network (SON) [14].", "However, the main limitation in the related work is that QoS and QoE provision are not specifically targeted toward novel use cases of NFV and SDN.", "In the context of self-configuration, self-optimization and self-healing, some works deal with growth in traffic and provide better QoS and QoE [14].", "To this end, the system processes signals from multiple network nodes and end-to-end QoS and QoE metrics.", "Section II reviews the related work in terms of network solutions for QoS and QoE-sensitive media delivery.", "The overall Network Resource Allocator diagram is depicted in Figure 2 where the QoS and QoE metrics from network nodes, media servers and players are probed in realtime and stored in the metrics database to be processed by the machine learning components.", "In terms of QoS and QoE provisioning in the core and the edge of the network, an automated topology management tool can address flexible QoS schemes, congestion control mechanisms, load balancing and management features.", "\u2022 Service probing: a client-side data collection system involves capturing and sharing QoS and QoE metrics and benchmarks."]} +{"46955039|9495329": ["Today, this vision is not yet realized [36]."]} +{"46955039|207262843": []} +{"13984592|206456479": ["Adaptive video streaming will have a central role to enable these dynamic services, especially when combined with new network paradigms as 5G and softwarized networks [32]."]} +{"13984592|3540699": ["Each quality level can be decoded independently from the others and is characterized by a specific encoding bitrate, resolution, framerate and codec [106]."]} +{"27532782|40202226": ["as YouTube, the number of stalling events have a higher impact on the user perceived quality than video quality [12]."]} +{"15268074|2623404": ["Software-Defined Networking (SDN) [6] has been widely expected to play an important role in 5G networks."]} +{"15268074|64404": []} +{"15268074|3540699": ["264/AVC) [13] and its scalable extension (H."]} +{"18220375|16748080": []} +{"18220375|15170341": []} +{"5454910|2623404": ["As a newly defined network architecture, SDN is proposed to further enhance network performance while simplifying the management complexity of large-scale networks [5]."]} +{"3030832|11960624": ["Another major work is focusing on the current AR visualization technologies [13]."]} +{"3030832|469744": ["Azuma [3] defines Augmented Reality (AR) as systems that have the following three characteristics:"]} +{"88289|19938676": []} +{"88289|54636584": []} +{"88289|954543": ["For this purpose, it uses the information available on Monitor & Analyzer sublayer (topology, sensor data, HoN metrics) and takes advantage of stochastic algorithms [25,26], arti\ufb01cial intelligence [27,28], data mining [29] to estimate the location of the source of the problem."]} +{"25911553|9495329": ["Bizanis and Kuipers [8] presented a survey about SDN and virtualization for Internet of Things (IoT), which covers proposals adopting these two concepts into MCN and WSNs."]} +{"25911553|37966695": ["There are a large number of solutions proposed to solve this problem in wired SDN research [39], [63], [158] such as horizontally distributed SDN controllers where multiple controllers are organized in a flat control plane (e.", "or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|207262843": ["[12] are the related surveys, which only focus on the MCN architecture, which is typically composed of Radio Access Networks (RANs), mobile backhaul networks, and the MPC network.", "Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the field of mobile and wireless networks [12]."]} +{"25911553|6583734": ["In turn, SDN serves NFV by providing programmable network connectivity between VNFs to achieve optimized traf\ufb01c engineering and steering [49]."]} +{"25911553|11414835": ["Regarding SDN, the network slicing concept has been discussed in several proposals in the context of network hypervisors [148], such as FlowVisor [149], OpenVirteX [150].", "The network slicing can also be done by using the concept of a network hypervisor [148] such as FlowVisor [149] or OpenVirteX [150] in full-SDN MPC architectures."]} +{"25911553|2535224": ["[5] mainly surveyed current efforts applying SDN and virtualization into MCN and", "[5] 2015 WLAN, MCN SDN Year, network type, network position 4"]} +{"25911553|15035771": ["It could be overcome by using multiple controllers or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|2623404": ["Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the \ufb01eld of mobile and wireless networks [12].", "Interested readers can \ufb01nd more about SDN and its applications in [37]\u2013[41]."]} +{"25911553|11735843": ["As shown in this figure, most of the related surveys [4]\u2013[9]"]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"14329113|14961769": ["Similarly authors in [14] propose taxonomy to categorize existing works based on three main techniques, reducing queue length, prioritizing mice flows, and exploiting multi-path."]} +{"2924626|10559330": ["Many approaches to achieve some of these goals have been previously proposed including active networking [45], IntServ networking [7], and distributed reservation protocols such as RSVP [8] and NSIS [33]."]} +{"2058474|2623404": ["Moreover, another prominent feature of next generation wireless networks would be the full support of software-defined networking (SDN) [2] design in wireless networks [3]."]} +{"57754751|46951415": ["The choice of SVM was due to its high performance in quality assessment for different applications [7]."]} +{"3892521|8523192": ["In Computational Component, resources are virtualized amongMicro Computing Instances, (MCI), where the applications are assigned for execution [27].", "Hence, it reduces network load and ensures in-time service delivery [27]."]} +{"52973375|14889616": ["The video sequences are encoded with the SVC codec (Medium Grain Scalability (MGS) [120]) and comprise a base layer and 12 quality layers.", "2) Objective video quality based scheduling by utilizing scalable video: Scalable Video Coding (SVC) [120] represents a video sequence via multiple layers with different quality, resolution, and/or frame rate as shown in Figure 4."]} +{"6325172|5122855": ["The impact of quality switches (denoted as SI) is influenced by the amplitude and the distribution of switching events [8]."]} +{"17710213|399542": ["These types of business decisions lead to different service options and offers, impacting in\na different way the user\u2019s expectations with the service and, thus, the quality experienced by the customer when using the service."]} +{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]} +{"31851714|15170341": []} +{"207181702|14697846": ["Finally, while peer-to-peer technologies [8] provide a highly-distributed option for serving static web content, the lack of management and control features in current implementations make them unsuitable as stand-alone solutions for enterprise-quality delivery."]} +{"53226541|3042864": [", smartphones, tablet-PCs and wearable devices) to satisfy the rapidly growing demand of computationintensive applications through remote cloud data centers [1]."]} +{"42356197|3348390": ["In the survey of [7], the application is mainly divided into three categories: industry, environment and society."]} +{"207670015|64404": ["The last few years have seen the introduction of a new generation of video encoding standards including VP9 [10] and H.265 [7].", "The starting point for this work will be a scalable video solution based on the very recent scalable extension [8] to the new H.265 standard [7] which offers substantial bandwidth savings [19] over the scalable extension to H.264.", "The self-optimisation use case will also support the transition from current video encoding standards to the new H.265 standard [7] and its scalable extension [8].", "NEA encryption has two main drawbacks: firstly encryption and decryption of the entire H.265 [7] video streams would be both time and energy intensive and secondly, and perhaps more importantly for SELFNET, prevent trusted middleboxes such as MANEs from preforming in-network adaptation of the video\u2026"]} +{"207670015|3540699": ["The H.265 standard, also known as High Efficiency Video Coding (HEVC), is widely seen as the replacement for the popular H.264 [11] standard, which is widely used in consumer electronics products and multimedia services today.", "In IPTV and RTP/RSTP, traditional MPEG encryption [23] algorithms have been applied to H.264 [11] encoded video content."]} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"10724558|14889616": ["Instead of SVC-encoded multimedia content, we use AVC-encoded multimedia content since it is the most used video coding standard in conjunction with DASH.", "We further assume that the server provides SVC-encoded multimedia content with the following three layers/bitrates: {L0 = 640 kbps, L0+L1 = 995 kbps, L0+L1+L2 = 1400 kbps}.", "SVC offers the possibility to encode video content into a base layer and several enhancement layers.", "We adopt the adaptation logic described in [18] which uses a deadline-based approach for selecting the appropriate representation and is optimized for SVC content.", "For our experiments we use MPEG-DASH-compliant multimedia content that is encoded using Scalable Video Coding (SVC) [15].", "As test content we use MPEG-DASH-compliant SVC-encoded multimedia content with a segment size of two seconds.", "Lederer et al. [9], [10] investigated the performance of pull-based DAS using multiple links and the benefits of SVC in CCN/NDN (CCN is a concrete implementation of ICN).", "The multimedia content is taken from the SVC dataset [27]."]} +{"8709346|14889616": ["The DASH framework makes it very convenient to use Scalable Video Coding (SVC) [11], where the video is encoded", "264/AVC standard supports temporal scalability, spatial scalability, and quality scalability [11].", "The default MGS weight vector is W = [1, 2, 2, 11], i."]} +{"8709346|3540699": []} +{"2060045|64404": ["264/AVC as well as newly developed High Efficiency Video Coding (HEVC) standard [35] and its scalable extension."]} +{"2060045|14889616": ["Video is assumed to be encoded in different layers according to the SVC standard [2] and temporally organized in units which can be decoded independently from each other, each referred as group of pictures (GOP).", "MGS scalability provides sufficient bitrate granularity for rate adaptation.", "The video sequences are encoded with the SVC codec (medium grain scalability (MGS) [2]) and comprise a base layer and 12 quality layers.", "264/SVC [2] or Scalable High Efficiency Video Coding (SHVC) [3], is an attractive solution for real-time rate adaptation at the wireless access network."]} +{"85499937|5122855": ["For a more detailed analysis of subjective test assessment methodologies and some related open questions, we refer the reader to the work of Tavakoli et al. [107] and Garcia et al. [123]."]} +{"85499937|2261490": ["As mentioned in [22], successful QoE management will lead to satis\ufb01ed end users as their requirements and/or expectations will be met and hence they may be further open to adopt new and complex services, leading to growth of more advanced technologies.", "Depending on the application area or range of system or service the model applies to, there exist many ways to classify models such as based on model input parameters, application scope, measurement scope, etc. [22].", "Managing Quality of Experience (QoE) in a communication system is a complex task, primarily consisting of three steps, as shown in Figure 2 and discussed in [21] and [22].", "Network-side monitoring, while overcoming these issues, is not that effective regarding insight into the in\ufb02uence of factors on QoE [22]."]} +{"85499937|64404": ["The effort in this direction resulted in the recently introduced new video compression standard H.265/MPEG-HEVC, which on an average, for the tested sequences, is shown to achieve 50% higher compression ef\ufb01ciency than its predecessor H.264/MPEG-AVC [2]\u2013[4]."]} +{"21122110|64404": []} +{"33354449|7971188": ["The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|14697846": ["The interested reader is referred to [160,392,393,202] for more detailed surveys.", "and (iii) partially centralised (or hierarchical) [160].", "However, this form of overlays is usually still classified in the unstructured family [160,202].", "The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|10559330": []} +{"18441478|973730": ["The concept of using multiple channels at different bit rates can be seen as using the simulcast paradigm on the video level [30]."]} +{"9254687|5404353": ["Recently adoption of cross layer model [17], [18] in multimedia communications in IoTs mainly focused on QoS parameters."]} +{"566971|16748080": ["The resulting distorted videos usually exhibit the following typical visual distortions [35]: \u2022 Blocking effect ."]} +{"566971|15170341": ["For example, [32], [69] mainly follow the psychophysical/engineering approach classi\ufb01cation method; [31], [70]\u2013[72] mainly adopt the reference-based clas-si\ufb01cation method, and [47] adopts a combination of the two.", "2) Psychophysical Approach: Objective quality models of the psychophysical approach are based on the features of the HVS, which is related to visual perception, for instance, contrast sensitivity, frequency selectivity, spatial and temporal features, masking effects, and color perception [72]."]} +{"566971|10099297": ["[ 11] and [12] consider both network and application QoS support."]} +{"566971|12130888": ["A survey of user behavior in P2P video system is recently given by [154]."]} +{"15458556|15449163": []} +{"18294721|10559330": ["The increasing popularity of QoE demanding services has resulted in the standardization of architectures such as Diffserv [4] and Intserv [5], which incorporate techniques for classifying traffic and providing them with a differentiated behavior based on the service type.", "The standardized AC solutions such as those defined in the Diffserv [4] and Intserv [5] architecture are too static to cope with the high dynamics in the traffic characteristics of today's videos."]} +{"25575499|5122855": ["[11] summarized the ongoing research topics on QoE-aware HTTP Adaptive Streaming (HAS) where they con-"]} +{"25575499|2261490": ["Barakovi\u0107 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors.", "Barakovic\u0301 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors."]} +{"25575499|64404": [", I, P and B frames [53]) on QoE were studied in [54] with different video contents."]} +{"21533588|2261490": ["this shift of research paradigm towards QoE is leading to a big change in network monitoring, modeling and management techniques from Key Performance Indicators (KPIs) to Key Quality Indicators (KQIs) [3], [4]."]} +{"21533588|40202226": ["A survey on parametric QoE estimation models for popular services is provided in [18]."]} +{"17443776|991041": []} +{"11282887|12017064": ["In [12], Modi et al.", "[12] C."]} +{"16364135|9107727": ["As indicated by Bouveyron et al. [43], when conventional methods deal with high dimensional data they are susceptible to suffer the well-known curse of dimensionality, where considering a large number of irrelevant, redundant and noisy attributes leads to important prediction errors."]} +{"16364135|7851743": ["\u2026the combination of advanced technologies such as Software De\ufb01ned Networking (SDN) [3,4], Network Function Virtualization (NFV) [5,6], Cloud Computing [7], Self-organized Networks (SON) [8,9], Arti\ufb01cial Intelligence, Big Data [10\u201312], Device to Device Communications (D2D), among others [13\u201317]."]} +{"52964208|991041": ["Finally, we consider the fourth group of investigations which deal with QoS-aware path selection [30], [27], [20].", "The first contender (DKS - Delay) minimizes distance according to the Dijkstra algorithm, using delay as the distance metric [27]."]} +{"14041731|2261490": ["Specifically, as suggested in [8], four basic questions should be answered: (1) what to control? (2) where to control? (3) when to control? and (4) how to control? In Section 4, we provide a reference architecture for collaboration between OTTs and ISP where we try to address these questions as well as to further questions which arise from the considered collaboration such as: (5) what information is shared between OTT and ISP? (6) when and how frequently this information is shared? (7) how this information is shared? Moreover, we consider a further question which goes beyond the joint collaborative management, i.", "3 PROBLEM DEFINITION The objective of QoE management is the optimization of end-user QoE, while making efficient (current and future) use of network resources and maintaining a satisfied customer base (provider perspective) [8]."]} +{"14041731|40202226": ["A survey on parametric QoE estimation models for popular services is provided in [39]: such models are typically a function of both network KPIs and application KQIs."]} diff --git a/edge/graph_209433370.jsonl b/edge/graph_209433370.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5748d0ea2f3d537d05978173782ab06f586e66e7 --- /dev/null +++ b/edge/graph_209433370.jsonl @@ -0,0 +1 @@ +{"10921965|7260566": []} diff --git a/edge/graph_209434154.jsonl b/edge/graph_209434154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..912cc0ba77c078d9f75871ad5485d31a9cec1058 --- /dev/null +++ b/edge/graph_209434154.jsonl @@ -0,0 +1,65 @@ +{"201886741|61132": []} +{"67771773|61132": ["Unmanned Aerial Vehicles (UAVs) cluster intelligence and cooperation depend on timely and effective information exchange between different nodes, therefore the communication network is one of the most important design issues of multi-UAV system [1]."]} +{"88482240|205286236": []} +{"9806107|12765832": ["Protocols for providing IP mobility are also discussed in [12], [13], with a focus on the aeronautical environment in [14]."]} +{"3834736|2335874": ["A recent survey also summarized salient features of beaconing approaches [8] along with some simulation results.", "Despite the vast number of proposals, only a few surveys exist on beaconing approaches [6]\u2013[8]."]} +{"53031640|51615396": ["Nevertheless, speed in VANETs could be higher than in FANETs in some particular cases [10].", "9 [10] was used in its default configuration to send TCP (transport control protocol) traffic."]} +{"53031640|61132": []} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"86766127|24785273": []} +{"86766127|61132": ["Even if it is not quite suitable for FANETs [16], the reason behind adopting such kind of mobility model is to study the critical impact of random movements on the proposed routing protocol.", ", do not exceed \u2248300 m during the flight) [16]."]} +{"61809844|51858916": ["Drones, also known as unmanned aerial vehicles (UAVs), have numerous commercial applications, such as photography, surveillance, and agriculture mapping.", "The major difficulty of channel estimation lies in the high mobility of UAVs in free space.", "For example, UAVs can be deployed to help offload conventional cellular data as well as provide network coverage in emergency situations [1].", "Much research effort has been made on UAVs serving as aerial base stations (BSs) to increase the coverage, capacity, and energy efficiency of wireless networks.", "Since the channels between UAVs and BSs are in general dominated by LoS paths with small angle spread, the inter-cell interference can be effectively reduced by directional beamforming, which is also the enabling technique of mmWave communications.", "UAV Detection: With UAVs integrated into the cellular network, it is critical for the network to first detect whether a communication device is aerial or not, because the operation protocol or regulation may be different for aerial and traditional ground devices.", "Interference Mitigation: UAVs can fly much higher than BSs and buildings.", ", different types of wings and engine of UAVs) [3] \u2022 Doppler effect due to high mobility of UAVs \u2022 Three-dimensional blockage models Propagation characteristics of conventional cellular systems are suited to well-established analytical models.", "This function enables the UAVs to operate with both high mobility and data transmission capabilities.", "However, the random velocity of UAVs leads to uncertainty of temporal correlation.", "\u2022 New channel models, including air-to-air chan-\nnel, air-to-ground channel, and air-to-sea channel \u2022 Temporal and spatial channel variations of non-stationary channels \u2022 Airframe shadowing mainly caused by the motion of UAVs and antennas, depending on the design structure (e.g., different types of wings and engine of UAVs) [3] \u2022 Doppler effect due to high mobility of UAVs \u2022 Three-dimensional blockage models Propagation characteristics of conventional cellular systems are suited to well-established analytical models.", "Hence, the detection of UAVs is necessary in the future UAV-enabled network.", "It can be explored by UAV mmWave communication when UAVs are deployed on demand to utilize the atmospheric ducts."]} +{"8819688|9022135": ["In literature [2], motion detection schemes are categorized as: 1) background subtraction; 2) spatio-temporal filtering; and 3) optical flow."]} +{"53016658|206578224": ["Indeed, MEC is deemed as a key enabling technology of 5G.", "In addition, the advances in MEC would maintain the expected quality of service (QoS) throughout the drone mobility.", "MEC is based on reforming the cloud hierarchy and performing the computation processes nearby end-users.", "The MEC principle can be considered for UAV applications by pushing the control and the management logics to the edge servers nearest to the base stations drones are connected to.", "This can be achieved thanks to the use of Multi-Access Edge Computing (MEC) [10].", "While moving the orchestration and control logics to the vicinity of UAVs, leveraging MEC, would allow reducing the response time, the issue of degrading the network spectrum remains the same."]} +{"4311986|61132": []} +{"4311986|18657007": []} +{"4311986|17206258": []} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"21672824|61132": ["This communication overhead reduces network throughput, introduces additional delays and wastes the limited battery energy of UAVs [3].", "This small battery can sustain a flight time of about 30 min [3,4]."]} +{"21672824|38911919": ["It helps to make the network more scalable, reduce routing overhead and maximize the throughput [6].", "Regardless of the potential benefits of node clustering in FANETs, the cluster formation and maintenance demand explicit exchange of control messages [6,7]."]} +{"59538091|3767252": []} +{"59538091|6583734": []} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"52283749|1230643": ["FANETS (Flying Adhoc Networks) [1] [4] [5] represents a new category of ad-hoc networks which typically comprise of homogeneous or heterogeneous flying agents (UAVs\u2019/Drones) that suitably communicate, interact and coordinate among themselves along with environment to capture data via sensors.", "Keywords\u2014Flying Adhoc Networks, Mobile Adhoc Networks, Drones, UAVs, Simulation, AODV, DSDV, DSR, OLSR, AOMDV, HWMP, NS-2, Routing Protocols, Mobility Models, Ad-Hoc Networks\nI. INTRODUCTION 21st Century has seen rapid advancements in varied technologies especially with regard to Sensor Communications [4], Wireless Communications, MEMS technology, Machine Learning, Deep Learning, Internet of Things (IoT) which has led to the development of Autonomous Vehicles, Unmanned Aerial Vehicles [2] [3], Drones, which can fly autonomously and can operated remotely without any intervention of human beings.", "21st Century has seen rapid advancements in varied technologies especially with regard to Sensor Communications [4], Wireless Communications, MEMS technology, Machine Learning, Deep Learning, Internet of Things (IoT) which has led to the development of Autonomous Vehicles, Unmanned Aerial Vehicles [2] [3], Drones, which can fly autonomously and can operated remotely without any intervention of human beings."]} +{"2425056|3555631": ["We consider CDSA model which is a recently emerging radio access network (RAN) architecture proposed for 5G networks where macro base stations (MBSs) are used to provide coverage and handle most of the control signalling and small cells (SCs) under the MBSs provide the required data services [28]."]} +{"2425056|7851743": ["For further reading on SON, an extensive survey is presented in [9]."]} +{"52300773|205286236": ["bee-inspired algorithms and many others, have been recognized to be efficientmethods to address complex optimization problems [27]."]} +{"52300773|38911919": ["It shows an exceptional variety of opportunities and challenges for routing [12].", "[12] has compared different VANETs clustering"]} +{"2835258|14441987": ["A survey and comparison of topology-based approaches can be found in [ 10 , 11]."]} +{"195698278|51858916": ["Recently, various studies have been made on the channel model between UAVs and between UAV and ground devices [26]."]} +{"65040891|11210789": []} +{"53432777|8011310": ["Cortes [225] observe that, similar to platooning for conventional trucks [27, 31], flying in a formation enables the drones that are following the lead drone to consume less energy."]} +{"53432777|61132": ["[105] on communication protocols, Nex and Remondino [190] on drone platforms for 3D mapping, and Jawhar et al."]} +{"53432777|15517134": []} +{"53432777|7271501": ["[114], and Robin and Lacroix [228] for general surveys of the literature on the search problem.", "Other articles elaborate on adaptations of specific optimization problems to robotic applications in general, such as Galceran and Carreras [87] on coverage path planning and Robin and Lacroix [228] on target tracking."]} +{"53432777|1177069": ["Coverage path planning with drones refers to finding paths of drones such that all points of some area P are covered at least once (see general surveys by Choset [49] and Galceran and Carreras [87] on coverage path planning for robotics).", "Other articles elaborate on adaptations of specific optimization problems to robotic applications in general, such as Galceran and Carreras [87] on coverage path planning and Robin and Lacroix [228] on target tracking."]} +{"53432777|1230643": []} +{"17488594|2835258": ["The main proposed geographic mechanisms are based on the idea that greedy forwarding is used when a neighbour closer to the final destination exists [2], [3].", "Geographical routing was introduced to provide scalable routing in mobile ad-hoc networks by exploiting location information of mobile nodes in the network [2]."]} +{"29177417|61132": []} +{"29177417|11206792": []} +{"29177417|763939": []} +{"26853250|53018231": ["SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions Section II: Artificial Neural Networ", "se works are limited in a number of ways. First,a majority of the existing worksfocuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks. Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radi"]} +{"26853250|9461213": ["e Learning Tools Key Applications FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in ", "ss application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing sur"]} +{"26853250|3645740": ["FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions ", "3], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing surveys and tutorials, such as [3], [51]\u2013[53"]} +{"26853250|206578365": ["In addition to caching, the wireless network\u2019s edge devices can be used for performing effective, low-latency computations, using the emerging paradigm of mobile edge computing [189]."]} +{"26853250|17485266": ["The mini batch gradient descent is an algorithm that strikes a balance between stochastic gradient descent and batch gradient descent [78].", "To solve these challenges, several algorithms have been proposed, such as momentum SGD, RMSProp [78], nesterov accelerated gradient [80], Adagrad [81], and AdaDelta [82].", "To overcome these drawbacks of SGD, the mini batch gradient descent [78] can be used."]} +{"26853250|5385031": ["More recently, ANNs have started to attract significant attention in the context of wireless communications and networking [2], [4], [5], [31] and [32], since the development of smart devices and mobile applications has significantly increased the level at which human users interact with the wireless communication system.", "Finally, the introductory literature on machine learning for wireless networks such as in [2], [4], [32], and", "Third, a large number of the existing surveys, such as [2], [4], and [52]\u2013[57], are highly qualitative and do not provide an in-depth technical and quantitative description on the variety of existing machine learning tools that are suitable for wireless communications.", "Meanwhile, a number of surveys on machine learning and neural network applications in wireless networking have emerged, such as in [2], [4], [32], and [51]\u2013[64]."]} +{"26853250|7774517": []} +{"26853250|1708582": ["RL algorithms are used for robotics, gaming, and navigation [67]."]} +{"13346735|61132": ["In contrast to the inconvenient deployment of dynamic infrastructure on land, flexible aerial relay (FAR) nodes could be effective even in remote and unreachable areas [8]."]} +{"13346735|7644489": ["However, the range of the D2D-enabled devices is not always enough to guarantee reliable communication [7]."]} +{"56556445|51768512": ["Furthermore, the Integrated Sensor Orientation (ISO), which is commonly referred to as the pose of the image (Aasen et al., 2018; Wouda et al., 2016), is not a trivial procedure for a nonspecialized user.", "\u2026images by means of optical sensors installed in 25 kg Unmanned Aerial Vehicles (UAV) or drones is gaining importance in quantitative remote sensing (Aasen et al., 2018), environmental research (Manfreda et al., 2018), remote sensing applications for vegetated areas (Kom\u00e1rek et al., 2018),\u2026"]} +{"198169064|19938676": ["Novel concepts and technologies are constantly introduced to achieve higher data rates and spectral efficiency with significantly reduced latency [1]."]} +{"67855867|52014912": ["A recent survey on control, planning, and design of aerial swarm robots can be found in [9]."]} +{"67855867|1177069": ["Continuous surveillance involves gathering sensory data (such as from a camera) from all regions in an area or volume of interest by traversing a path optimized for maximum coverage while accounting for static and dynamic obstacles [1]."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"53281175|61132": ["Unmanned aerial vehicles (UAVs) are promising as a new application area for military and civil use due to the rapid deployment of network technologies such as low-cost Wi-Fi radio interfaces, sensors, global positioning system (GPS), and micro-embedded computers [1]."]} +{"61811103|61132": ["UNMANNED aerial vehicle (UAV) is an emerging facility which has been effectively applied in military, public, and civil applications [2]."]} +{"61811103|76603": ["Driven by such real-time requirements, the upcoming network is committed to support UAV communication, where the collected data can be effectively transmitted [10]."]} +{"34965859|1353379": ["First, security-related data composition [14, 128] plays an important role in measuring the real-time security of MANETs and allowing the networks to react e(cid:14)ciently, but literatures lack investigation on security-related data composition."]} +{"34965859|18189153": ["In addition, although there exist several surveys [4, 5, 6, 7] on attack detection, they mostly focus on the architecture, analysis and performance of detection methods and still neglect trustworthy security-related data collection."]} +{"34965859|17009788": ["In addition, although there exist several surveys [4, 5, 6, 7] on attack detection, they mostly focus on the architecture, analysis and performance of detection methods and still neglect trustworthy security-related data collection."]} diff --git a/edge/graph_209435279.jsonl b/edge/graph_209435279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..501b77d6f7d96871d10837d60639e23928efa53f --- /dev/null +++ b/edge/graph_209435279.jsonl @@ -0,0 +1,8 @@ +{"208112821|1542716": []} +{"4614969|1542716": ["Detection can be carried out without complex instrumentation, or even with a naked-eye and nowadays the use of smart-phones for this application has become very popular [81]."]} +{"4386144|1542716": ["[29] and Choi [12], which addressed the necessity and market-gap for user-friendly food detection."]} +{"67858486|6101305": ["Towards the large-scale commercialization of SOI-based ring resonator biosensors, a low-cost and scalable packaging including a micro-fluidic system is required [89]."]} +{"59252650|209435279": []} +{"5518088|2390193": ["Among various types of nanomaterials that were applied to increase the analytical performance of electrochemical sensors [80] and bioassays, magnetic nanoparticles have been largely preferred for functionalization of electrode surface because of their high surface to volume ratio [75,81], which facilitates quantitative immobilization [32,82\u201386].", "of electrochemical sensors [80] and bioassays, magnetic nanoparticles have been largely preferred for"]} +{"51924138|209435279": []} +{"89785423|10065043": []} diff --git a/edge/graph_209439571.jsonl b/edge/graph_209439571.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..714f3948ba0a733027f5ae07d55c8b009145690b --- /dev/null +++ b/edge/graph_209439571.jsonl @@ -0,0 +1,16 @@ +{"15100363|3102110": []} +{"206592484|456491": []} +{"846192|8424228": ["RELATED WORK The tradeoff between consistency and performance/availability is \nwell under\u00adstood [Coan et al. 1986; Davidson et al. 1985]."]} +{"1033682|174797842": []} +{"4505261|3273340": []} +{"4505261|19034128": ["supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "There are three main types of learning, i.e. supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "One of the representative learning methodologies is Machine Learning, that is related to changes in the systems that perform tasks associated with artificial intelligence such as recognition, diagnosis, prediction, etc. [23]."]} +{"11438116|7971188": ["To make Gaia more scalable with more data centers, we use the concept of overlay networks [48]."]} +{"3126100|18503837": []} +{"3126100|393948": ["Representation learning aims to achieve that a reasonably sized learned representation can capture a huge number of possible input configurations, which can greatly facilitate improvements in both computational efficiency and statistical efficiency [25].", "Fortunately, representation learning [25, 26], a promising solution to learn the meaningful and useful representations of the data that make it easier to extract useful information when building classifiers or other predictors, has been presented and achieved impressive performance on many dimensionality reduction tasks [27]."]} +{"5702686|8575576": ["Scientists are also leveraging biology graphs to understand protein interactions [26] and cell graphs for automated cancer diagnosis [18]."]} +{"38352604|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} +{"6720323|17485266": ["In parallel SGD[39, 44, 46], each worker processes an independent portion of the data set."]} +{"54461890|54448042": ["A greatly detailed survey comparing various software libraries for homomorphic encryption is provided in [115]."]} +{"54461890|3519414": []} +{"54461890|2088679": []} +{"1708582|17464562": []} diff --git a/edge/graph_209439590.jsonl b/edge/graph_209439590.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d664e40c39cdf507b968f9ef59c9e449a338b79 --- /dev/null +++ b/edge/graph_209439590.jsonl @@ -0,0 +1,15 @@ +{"12897038|17084176": ["For instance, considering the best-performing runs of M-EMCD , the number of iterations varied from few units (less than ten on London, VC-Graders and AUCS) to few tens (23 on EU-Air, 38 on FF\u2013TW\u2013YT, 70 on DBLP, 75 on Higgs-Twitter).", "EU-Air transport network (Kim and Lee 2015) ( EU-Air , for short) represents European air-123 port connections considering different airlines.", "EU-Air transport network [16] (EU-Air, for short) represents European airport connections considering different airlines.", "One general remark relevant for the comparison between M-EMCD and the baseline is that the highest NMI values do not necessarily correspond to the \u03b8 value by which the best-modularity consensus was obtained (indicated with a colored vertical line in each of the plots): in fact, while on AUCS and London the maximum NMI (about 0.8 and 0.75, respectively) is reached for their respective best-modularity \u03b8 , on Higgs-Twitter and FF\u2013TW\u2013YT (along with the remaining datasets, not shown), the best-performing \u03b8 does not match the \u03b8 corresponding to the best NMI for the particular dataset.", "AUCS (Kim and Lee 2015) describes relationships among university employees: work together, lunch together, off-line friendship, friendship on Facebook, and coau-thorship.", "Higgs-Twitter (Kim and Lee 2015) represents friendship, reply, mention, and retweet relations among Twitter users.", "Furthermore, coupling redundancy results from Table 4 and results shown in this \ufb01gure, it should be noted that the highest values of redundancy of M-EMCD , observed in AUCS (0.91) and VC-Graders (0.95), correspond to situations in which the distribution of layer-characteristic communities is more uniform.", "As shown in Table 4, M-EMCD gains 0.32 (up to 1.03 on FF\u2013TW\u2013YT) w.r.t. CC-EMCD and 0.28 (up to 0.81 on AUCS) w.r.t. C-EMCD \u2014recall that silhouette may range from \u2212 1 to 1.", "DBLP (Kim and Lee 2015) represents co-authorships over different time slices, which correspond to the publication years in the period 1971\u20132014.", "Note also that, with the exception of Higgs-Twitter and DBLP, CC-EMCD tends to prevail against C-EMCD in terms of modularity.", "For instance, on Higgs-Twitter (results not shown), there is one layer predominant on the others; Conversely, on DBLP (results not shown), all layers participated almost equally in the edge distribution of the consensus communities.", "Higgs-Twitter [16] represents friendship, reply, mention, and retweet relations among Twitter users.", "AUCS [16] describes relationships among university employees: work together, lunch together, off-line friendship, friendship on Facebook, and coauthorship.", "A great deal of attention has recently been devoted to the problem of community detection in a multilayer network [23,16].", "We selected this dataset to appreciate at best the effect of ensemble perturbations in the performance of M-EMCD \u2014this choice is justi\ufb01ed since it has much more layers than the other datasets but DBLP, however unlike the latter, there is no excessive proliferation in the number of consensus communities (cf. Table 3).", "A great deal of attention has recently been devoted to the problem of community detection in a multilayer network (Mucha et al. 2010; Kim and Lee 2015)."]} +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"3951790|207372751": ["Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention (Liben-Nowell and Kleinberg 2007; Lu\u0308 and Zhou 2011).", "Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention [7], [82]."]} +{"3951790|239537": ["\u2026and analysis tasks such as node classi\ufb01cation (Sen et al. 2008; Perozzi, Al-Rfou, and Skiena 2014), node clustering (Wang et al. 2017b), network visualization (Herman, Melanc\u00b8on, and Marshall 2000; Wang, Cui, and Zhu 2016) and link prediction (Liben-Nowell and K-leinberg 2007; Ou et al. 2016).", "Network embedding, as a promising way of network representation, is capable of supporting subsequent network processing and analysis tasks such as node classification [2], [3], node clustering [4], network visualization [5], [6] and link prediction [7], [8]."]} +{"67791209|4621813": ["On the other hand, it was shown that NMI is an efficient way for empirical evaluation of the performance of community detection methods [95]."]} +{"2452205|207372751": [", 2014] and link prediction [L\u00fc and Zhou, 2011].", "In recent years, researchers have extensively studied on many important machine learning applications in networks, such as vertex classification [Sen et al., 2008], tag recommendation [Tu et al., 2014], anomaly detection [Bhuyan et al., 2014] and link prediction [L\u00fc and Zhou, 2011]."]} +{"15850185|239537": ["Studies on graph visualization are surveyed in [3, 10].", "Graph drawing techniques [3, 10] can help one better visualize graphs, but visualizing large graphs quickly becomes overwhelming."]} +{"14450292|2368628": []} +{"14450292|191396": []} +{"2701448|393948": ["By stacking these non-linear single layers together, deep learning are believed to yield better representations (Part 4 in (Bengio, Courville, and Vincent 2013))."]} +{"13999578|393948": ["On the other hand, representation learning obtains data representations that make it easier to extract useful information when building classifiers or other predictors [9].", ", graph analytics [8] and representation learning [9]."]} +{"43951901|192934": []} +{"122255|4621813": ["Although there have been studies surveying different approaches mostly on the detection of nonoverlapping [43, 69, 116] and overlapping [57, 136] communities separately, no attempts have been initiated to understand thoroughly the metrics used to design the algorithms and to evaluate the goodness of a community structure.", "\u2026different approaches mostly on the detection of non-overlapping [Lancichinetti and Fortunato 2009; Fortunato 2010] and overlapping [Xie et al. 2013; Harenberg et al. 2014] communities separately, no attempts have been initiated to understand thoroughly the metrics used to design the algorithms and\u2026"]} +{"59606101|13151033": ["However, it is necessary to be careful because structure and attributes may disagree (Peel et al. 2017)."]} +{"59606101|17084176": []} diff --git a/edge/graph_209439710.jsonl b/edge/graph_209439710.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209444175.jsonl b/edge/graph_209444175.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28aa2546bdc515ad800b902686bdbc7e2bbda422 --- /dev/null +++ b/edge/graph_209444175.jsonl @@ -0,0 +1,10 @@ +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"3598004|8323234": ["Millimeter-wave systems are primarily for indoor applications [85], [86]."]} +{"51988843|22221919": ["NOMA schemes are briefly introduced in [11] and [12]."]} +{"51988843|3270620": []} +{"59233327|22221919": ["Due to the strong interest in both academia and the industry [2][3], NOMA study was revived in Rel-15 [4]."]} +{"292102|22221919": ["Such new requirements impose unprecedented challenges that cannot be fulfilled via the conventional orthogonal multiple-access (OMA) with centralized base station controlled communications [4], [5]."]} +{"292102|3330461": ["Instead, the 3GPP considers more aggressive spectral utilization schemes such as device-to-device (D2D) communication [6], [7] and nonorthogonal multiple access (NOMA) [8], [9] to support such massive number of connections."]} +{"292102|8280144": ["Although the locations of two users are specified in this paper, it has been proved in [50] that the analysis holds for random d1, d2 and D."]} +{"58675832|22221919": ["For instance, at Pmax = 25 dBm and Rmin = 2 bits/sec/Hz, the sum rate of EUs is 31 bits/sec/Hz for MUST with \u03b1 = 0.14 and 20 bits/sec/Hz for CR-NOMA, while the probability of rate guarantee for GUs is 0.27 for MUST (the best case) and 0.57 for CR-NOMA.", "5, we compare our power allocation policy based on CR-NOMA with the conventional PD-NOMA which is used in MUST [8], from the perspective of sum rate for EUs and feasibility for serving GUs.", "Accordingly, the power allocation policy is to serve the user with a poorer channel condition with adequate power to fulfill its QoS requirement and allocate the remaining power to the user with a better channel condition [5].", "In addition, various practical forms of MC-NOMA, such as sparse code multiple access (SCMA) [17] and pattern division multiple access (PDMA) [18], have been proposed as promising multiple access technologies for 5G [5].", "In this paper, we addressed the maximization of the total data rate of elastic users in a multi-cell multi-carrier-based network using CR-NOMA scheme to guarantee the specific rates for streaming traffic users.", "However, in CR-NOMA scheme the power ratio is adjusted for each paired user to guarantee the minimum rate for GUs and, therefore, the sum rate that CR-NOMA can provide for EUs\ndepends on Rmin .", "In a survey on NOMA for 5G [5], NOMA schemes are categorized into two classes, namely, single-carrier NOMA (SC-NOMA) and multi-carrier NOMA (MC-NOMA).", "4, for some values of \u03b1 and in some ranges of Pmax , MUST can provide a higher sum rate for EUs compared to CR-NOMA.", "In particular, to guarantee the minimum rate for GUs in the considered scenario, we adopt CR-NOMA scheme as a special case of PD-NOMA which can meet the QoS requirements.", "Higher achievable rate and reduced dead zone for elastic users were among the gains of applying CR-NOMA scheme compared to TDMA.", "In particular, we consider suitable partner selection, subchannel assignment, and power allocation according to the CR-NOMA concept where multiple users are served by a BS.", "To tackle this problem, a variation of PD-NOMA which is referred to as cognitive radio inspired NOMA (CR-NOMA) has been introduced in [7].", "Particularly, in MC-NOMA systems with more than two users, instead of applying NOMA to all users in one orthogonal resource block, the users are divided into multiple groups to implement NOMA with fewer users on different orthogonal resource blocks [5].", "In contrast to the previous works on CR-NOMA [5], [7] which study the power allocation for two selected primary and secondary users on a single carrier, and analyze the outage and the diversity order, our paper focuses on resource allocation for MC-NOMA systems.", "Note that the power allocation policy in all aforementioned papers is according to the conventional PD-NOMA and, to the best of our knowledge, the problem of resource allocation in MC-NOMA systems considering CR-NOMA power allocation policy has not been studied yet.", "5 shows that MUST can guarantee the minimum rate for GUs with less probability compared to CR-NOMA.", "Our simulation and analytical results show that 1) our iterative algorithm for subchannel assignment and power allocation improves the network sum rate considerably with few iterations, 2) the proposed subchannel assignment based on Hungarian algorithm and power allocation based on SCALE method have superior performance than the existing methods for resource allocation in PD-NOMA-based schemes studied in [8], [9], [10] and [12], 3) imperfect CSI can degrade the system performance at high transmit powers but its effect is negligible at low transmit powers, and 4) our MC-NOMA system based on CR-NOMA scheme with proposed subchannel assignment and power allocation outperforms the time division multiple access (TDMA) system in terms of sum rate for EUs and feasibility for serving GUs.", ", allocating different power levels to different users [5].", "We modify the power allocation procedure of [9] to use CR-NOMA power allocation policy for the paired users in each subchannel.", "The key idea behind CR-NOMA is to interpret NOMA as a special case of cognitive radio systems, in which a user with a better channel condition, viewed as a secondary user, is squeezed into the same resource block occupied by a user with a poorer channel condition, viewed as a primary user with strict QoS requirement."]} +{"8321223|18148591": ["Multiple-input-multiple-output (MIMO) transmission [1] \u2013 [19], combined with the space-time coding (STC) [20]\u2013[23], is among the best approaches for exploiting the spatial diversity, particularly over rich scattered environments."]} diff --git a/edge/graph_209444230.jsonl b/edge/graph_209444230.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..abf91ab09601debde5be44818b24d6d649a92c8c --- /dev/null +++ b/edge/graph_209444230.jsonl @@ -0,0 +1,8 @@ +{"53399785|18599847": ["Convolutional neural networks (CNN) are a widely used deep learning al-gorithm which performs especially well for images input data, although they are now increasingly applied in time series data including human physiological data and \ufb01nancial data [42, 21]."]} +{"108317149|49544416": ["The whole framework of emotion recognition based on physiological signals has recently been described by [55]."]} +{"57191786|49544416": ["Real-time emotion recognition using physiological signals is usually impossible to implement because of the complexity related to sensor placement, data analysis, and accuracy [52]."]} +{"52896590|9079835": ["However, ECs did not achieve a significant result due to their convergence property and trapping in local optima [71], [72].", "[71] achieved higher accuracy using tethered-laboratory BVP signal, while the performance of EEG signals, tetheredlaboratory and wireless, is low."]} +{"52058875|11068865": []} +{"52058875|1734833": []} +{"174806243|7102404": []} +{"11090415|21386749": ["challenges in energy efficiency, low power design and power management are posed [6][11]."]} diff --git a/edge/graph_209444308.jsonl b/edge/graph_209444308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36c1499a69be4d272ccaa65d915b6208042051cb --- /dev/null +++ b/edge/graph_209444308.jsonl @@ -0,0 +1,34 @@ +{"86850570|49527603": ["In order to ensure that all management hubs are trusted, some consensus algorithms must be applied to the architecture, such as Proof of Work (PoW), Proof of Stake (PoS), Practical Byzantine Fault Tolerance (PBFT), etc. [19]."]} +{"86850570|2521001": ["requirements: confidentiality, integrity, and availability (CIA), which can be referred to as the CIA requirement [26]."]} +{"567397|3148588": ["We also re-proved handshake log integrity and properties such as partial inverses between parsing and marshalling messages directly in F \u22c6 , without relying on Coq.", "For example, with Hoare Type Theory, Nanevski et al. (2008) extend Coq with support for interactive proofs of imperative programs.", "Unlike Coq, F \u22c6 does not generate induction principles for datatypes.", "This language would provide the nearly arbitrary expressive power of a logic like Coq\u2019s, but with a richer, effectful dynamic semantics.", "While this illustrates the power of F \u22c6 \u2019s termination check, we found that the detour via accessibility predicates is very rarely needed (as opposed to Coq, for instance).", "Thus, while Coq (The Coq development team) and Agda (Norell 2007) are functional programming languages, one does not typically use them for general-purpose programming\u2014that they are implemented in OCaml and Haskell is a case in point.", "This approach is attractive in that one retains all the tools for speci\ufb01cation and interactive proving from Coq.", "While the new proof is considerably shorter (4466 lines of F \u22c6 , compared to 8577 lines of Coq), it takes over half an hour to verify.", "The style of mechanization is rather different than what is typical in tools like Coq.", "Outside dependent type theory, veri\ufb01cation-oriented languages like Dafny (Leino 2010) and WhyML (Filli\u02c6atre and Paske-vich 2013) provide good support for effects and semi-automated proving via SMT solvers, but have logics that are much less powerful than Coq or Agda, and only limited support (if at all) for higher-order programming.", "Proving that parallel substitutions terminate is tricky\u2014e.g., Adams (2006); Benton et al. (2012); Sch\u00a8afer et al. (2015) all give examples of ad hoc workarounds to Coq\u2019s termination checker.", "This is enabled by our heavy reliance on SMT solving and termination arguments based on lexical orderings\u2014lacking these features, such a style of proof seems unthinkable in Coq and maybe even Agda.", "Non-syntactic termination checks Most dependent type theories rely crucially on normalization for consistency, many researchers have been investigating improving on Coq\u2019s syntactic termination check via more semantic approaches.", "Our starting point is miTLS (Bhargavan et al. 2013), a reference implementation of TLS (from SSL 3.0 to TLS 1.2) with detailed proofs of functional correctness, authentication, and con\ufb01dentiality. miTLS is veri\ufb01ed using a patchwork of SMT-based proofs in F7 (Bhargavan et al. 2010), Coq proofs where F7 is inadequate, code reviews, and manual arguments.", "Adding effects to a type-theory based proof assistant Nanevski et al. (2008) develop Hoare type theory (HTT) as a way of extending Coq with effects.", "In addition, we have ported the proof of injectivity of handshake message formatting from Coq to F \u22c6 .", "We aim for a language that spans the capabilities of interactive proof assistants like Coq and Agda, general-purpose programming languages like OCaml and Haskell, and SMT-backed semi-automated program veri\ufb01cation tools like Dafny and WhyML.", "On the downside, one also inherits Coq\u2019s limitations, e.g., the syntactic termination check and lack of SMT-based automation.", "One cohort of researchers mainly use interactive tools like Coq and Is-abelle/HOL; another uses SMT-based tools like Dafny and F7.", "The strategy there is to provide an axiomatic extension of Coq with a single catch-all monad in which to encapsulate imperative code\u2014the discussion about a single monad in \u00a7 2.1 applies to HTT as well.", "Our style of termination proofs is in contrast with the type theories underlying systems like Coq, which rely instead on a syntactic \u201cguarded by destructors\u201d criterion.", "Using a technique similar to the one in Coq (Letouzey 2008), F \u22c6 implements code extraction to OCaml and F#.", "While it is premature to claim that F \u22c6 is simultaneously a replacement for, say, Coq, OCaml and Dafny, our initial experience is encouraging\u2014we know of no other language that supports semi-automated proving and general-purpose programming to the same extent as F \u22c6 ."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"164904896|51935081": []} +{"164904896|2134031": []} +{"164904896|925507": []} +{"2634617|2387055": ["A survey on these issues is provided in [17]."]} +{"26619090|18973396": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"26619090|3241708": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"155155126|31245252": []} +{"155155126|6664074": []} +{"155155126|2521001": []} +{"155155126|3348390": []} +{"53951647|3628110": []} +{"53951647|1313790": []} +{"49573944|3628110": ["There are many vulnerabilities in the Ethereum smart contract, including \"Call Stack Attack Vulnerability\" [10], \"Time Dependance Vulnerability\" [11] and various other known vulnerabilities [2].", "At present, the technologies have been applied to many fields such as medical science, economics, Internet of Things [2]."]} +{"173991065|209444308": ["eaches the contract, the corresponding penalty (as speci\ufb01ed in the contract) will be automatically paid from Bob\u2019s deposit. The whole life cycle of smart contracts consists of four consecutive phases [31] as illustrated in Fig.4: 1) Creation of smart contracts. Several involved parties \ufb01rst negotiate on the obligations, rights and prohibitions on contracts. After multiple rounds of discussions and neg"]} +{"173991065|49527603": ["1) Blockchain: A blockchain is essentially a distributed ledger spreading over the whole blockchain system [18]."]} +{"173991065|51935081": ["The work of [9] gives a categorization of applications of blockchain for IoT."]} +{"173991065|49574823": ["The work of [7] presents a review on integrating blockchain with IoT in the application aspect."]} +{"173991065|52059869": ["In addition to SDN and NFV, the appearance of network slicing technologies [57] brings the agility and flexibility of networks to support different functional and performance"]} +{"173991065|3628110": ["Meanwhile, blockchain systems also have their own security vulnerabilities such as program defects of smart contracts [20].", "It is worth mentioning that block propagation mechanisms (such as relay network propagation and advertisement-based propagation [20]) are the prerequisite for the distributed consensus protocols.", "This computationally difficult problem (also know as a puzzle) can nevertheless be verifiable without difficulty [20]."]} +{"173991065|27262729": ["For example, it is shown in [21] that user pseudonyms can be cracked via learning and inferring the multiple transactions associated with one", "The probability of solving the puzzle at a miner is often proportional to the computational capability and resource of a miner [21]."]} +{"173991065|31245252": ["However, the open wireless medium also makes IoT suffering from the security breaches, such as passive eavesdropping [105], jamming, and replaying attacks [106]."]} +{"173991065|2829149": ["Moreover, due to the resource constraints of IoT devices, conventional heavy-weighted encryption algorithms may not be feasible to IoT [107]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"46936025|13756844": []} +{"32008949|29654897": []} +{"32008949|16830291": []} diff --git a/edge/graph_209444344.jsonl b/edge/graph_209444344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fee92210a92714ac0f7cd801918fb787b303be93 --- /dev/null +++ b/edge/graph_209444344.jsonl @@ -0,0 +1,55 @@ +{"24819096|592204": ["Daily activities are crucial to characterize human behavior, and enabling their automatic recognition would pave the road to novel applications in the field of Preventive Medicine, such as health monitoring [2,3], among others [6]."]} +{"24819096|499315": ["With the advances on wearable technologies in recent years, there has been a growing interest in analyzing data captured by wearable cameras [1]."]} +{"19870626|7185733": ["[22] presented application of Adaboost for hand detection and meanshift for hand tracking."]} +{"5631604|499315": []} +{"5631604|5807554": ["These cues are mostly absent in egocentric video [10], [31], [32] and, therefore, are not available for its analysis.", "Two recent surveys [31], [32] study, respectively, the methods used to summarize sets of egocentric pictures, and the state-of-", "in the analysis in [31], [32], and [38].", "[32] review the first-person view (FPV) video summariza-"]} +{"5631604|16403716": ["Whereas TPV segmentation approaches typically try to identify the shot boundaries comparing consecutive frames, or even using the frames\u2019 time-stamp [33], [34], this methodology cannot be directly applied over FPV, since egocentric videos consist of a single shot with extremely smooth transitions between consecutive events.", "Even though the existing literature regarding non-FPV summarization is already documented [33], [34], the specific characteristics of egocentric"]} +{"5631604|10397481": ["Whereas TPV segmentation approaches typically try to identify the shot boundaries comparing consecutive frames, or even using the frames\u2019 time-stamp [33], [34], this methodology cannot be directly applied over FPV, since egocentric videos consist of a single shot with extremely smooth transitions between consecutive events.", "Even though the existing literature regarding non-FPV summarization is already documented [33], [34], the specific characteristics of egocentric"]} +{"4263017|1336603": ["Much previous work use sensor groves or marker-based motion capture system to acquire hand motion and poses composed of joint angles [3]."]} +{"69774072|5807554": ["Therefore, increasing works have been proposed to analyze the egocentric videos from different aspects [1], e."]} +{"49313340|592204": ["As a consequence, ADL recognition from data captured by egocentric cameras has become an active \ufb01eld of research [3], where current systems generally rely on, \ufb01rst, detecting and identifying the objects present in each frame and, second, using temporal information to infer the performed activities."]} +{"49313340|14397159": ["Although those system employ di\ufb00erent sensors, usage of cameras is becoming more popular [1] especially that automatic solutions ensuring individuals privacy are now available [2]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"762084|5807554": ["See [20] for a general overview of FPV methods."]} +{"3319906|5807554": ["For a more detailed introduction to first-person-view wearable devices and their applications, the reader may refer to [10]."]} +{"378809|1634674": ["Action and activity recognition have been the subject of a vast amount of research in computer vision literature [22, 32].", "Understanding human activities from video is a fundamental problem in computer vision which has spawned a rich literature [22, 32]."]} +{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]} +{"16840584|1634674": ["Despite the tremendous effort on understanding actions in a surveillance setting [1, 35], it remains unclear whether previous methods for action recognition can be successfully applied to egocentric videos."]} +{"4640855|5807554": ["According to survey of [11], the most commonly explored objective of egocentric vision is object recognition and tracking."]} +{"2844110|15627472": []} +{"2844110|5807554": [", [15] and Bambach [16], are published to summarize the latest progress."]} +{"57363430|592204": ["A large number of these have been comprehensively reviewed in [3]."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"3706999|5807554": ["Although the use of CV for analyzing hand gestures in video from fixed cameras has been the subject of a large body of work [13], [16], egocentric-based CV methods have only recently become an active topic of research [17], [18]."]} +{"27637541|1634674": ["[118] distinguish between actions and activities by defining that", "Inside 2D-template-based approaches described in [118], temporal templates are estimated for each action class.", "methods shown in [118]); or based on the extraction of features from each silhouette and model the dynamics of the action explicitly (again, similarly to the aforementioned \u2018holistic\u2019 approaches).", "\u2019s [118] action modelling classification.", "[118], approaches for modelling actions can be categorised into three major classes: nonparametric, volumetric, and parametric time-series approaches (see Fig.", "In volumetric approaches, in contrast, features are not extracted on a frame-by-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case [118]."]} +{"27637541|12127129": []} +{"27637541|17516538": ["[41]; this paper is highly comprehensive, as it starts with motion detection and object classification and tracking, but also deals with HBU; it divides the approaches to this task", "There are handfuls of previous surveys which analyse and describe \u201chuman motion\u201d or \u201chuman behaviour understanding\u201d [41, 88, 43, 87, 121]; earlier works, as is logic, review lower level techniques (e.", "At the motion level, tasks such as movement detection, and background extraction and segmentation are faced [41, 72, 89]."]} +{"27637541|14970359": ["Moeslund et al. [72] defined an action taxonomy which has been adopted in later works and subsequent surveys.", "The work by Moeslund et al. [72], from 2006, can be divided into two major parts: pose and motion capture, and action recognition.", "In the work by Moeslund [71], bigger emphasis is given to the recognition of motion and actions, whereas activities and behaviours are treated to a minor extent.", "Pose estimation techniques are introduced next, and they are classified into three groups as in [71], according to the presence and use of an explicit model: model-free, indirect model use, direct model use.", "An evolution of the works presented under this section of Moeslund\u2019s work, can be seen in the papers by Bandouch, Beetz, et al. [7, 9]; which are commented later on.", "Nevertheless, the techniques revealed in [71] allow a greater understanding of current methods, and thus, both this and [34] can be used to introduce the"]} +{"27637541|7788290": []} +{"52233948|5807554": ["The advent of wearable cameras has led to growing interest in First Person Vision (FPV)\u2014the automatic analysis of first person videos (see a recent survey in [1])."]} +{"52233948|1634674": ["There is a large body of literature on action recognition (see [41] for a survey)."]} +{"18547250|5807554": []} +{"18547250|393948": []} +{"56033|14171067": []} +{"59414|5807554": ["Our approach stands over the task division proposed in [10, 4] and is summarized in the hierarchical structure proposed in Figure 3.", "In [4, 10] the authors propose a hierarchical division of the processing steps that can be independently solved e."]} +{"44303833|11632848": ["In addition to the combination technique, putting multiple neural networks together, which is known as ensemble learning, committee-based learning or multiple classifier system, can also improve recognition accuracy [24\u201326]."]} +{"51611819|5807554": ["In contrast to conventional third-person capturing, egocentric video is recorded by a wearable camera from a first-person perspective [2], [3]."]} +{"51611819|1634674": ["In ADL\nTABLE I SUMMARY OF RELATED DATASETS WITH HAND-OBJECT INTERACTIONS\nFig.", "UNDERSTANDING human activities of daily living (ADL) [1] is an important research topic in computer vision.", "I. INTRODUCTION\nUNDERSTANDING human activities of daily living(ADL) [1] is an important research topic in computer vision.", "In contrast to these early works, which have achieved nearly perfect performances on standard dataset, such as KTH [4], recognizing daily actions that involves object manipulation is still far to be solved and has attracted increasing attention recently [1], [16], [17].", "As an important research topic, human action recognition has attracted research focus for decades and is related to many different domains, such as visual tracking [5], [6], human/salient object detection [7]\u2013[9], event classification [10], pattern recognition [1], [11], [12] etc."]} +{"5035347|7185733": ["1) Gesture Classes: Pavlovic [44] classified gestures into two categories: manipulative and communicative."]} +{"10576983|5807554": []} +{"10576983|18803401": []} +{"198147445|2670121": ["There exists a rich literature [52] on transfer learning of \u201cpre-CNN\u201d features for action recognition, focusing especially on transfer across input modalities."]} +{"1213867|60779308": ["ion [27,28] and some of them have been applied to hand posture ecognition."]} +{"10199420|5807554": ["The emergence of new wearable video recording devices such as action cameras and smart-glasses during the last five years has driven an important trend in the evolution of computer vision methods [1]."]} +{"207079297|16770050": []} +{"207079297|14970359": []} +{"207079297|7185733": []} +{"24522968|15757638": ["In this section, we will discuss some of the more recent works on hand gesture recognition; for a detailed survey of earlier hand gesture recognition approaches, see [34] and [36]."]} +{"43251074|5807554": []} +{"592204|5807554": ["Despite the presented approaches, hand segmentation is still far from being solved due to computational cost and variations in illumination [10].", "While they could be classified as \u201clow-level\u201d and \u201chigh-level\u201d, in this manuscript, the two categories proposed in [10] will be applied, i."]} +{"592204|15757638": ["A wider overview of hand gesture recognition systems can be found in [62]."]} +{"592204|27637541": ["According to this, human behaviour analysis tasks are classified [9] into motion, action, activity and behaviour (Figure 1).", "Human behaviour analysis tasks: classification (reprinted from [9])."]} +{"592204|14397159": ["Recently, cameras have begun to be employed in AAL systems to monitor ADLs [6,7], as they provide richer sensory information than the traditional sensors employed in those systems to monitor people, e."]} +{"17155306|16669269": ["During the last couple of years, several successful applications of wearable cameras have been proposed in different fields such as Law Enforcement [10], Medical Applications [13], Lifelogging [14], among others."]} +{"17155306|5807554": ["The videos recorded from this point of view are referred as First-Person Vision (FPV) or Egocentric videos [6]."]} +{"3434714|5807554": ["According to survey of [12] that the most commonly explored objective of egocentric vision is object recognition and tracking."]} diff --git a/edge/graph_209444428.jsonl b/edge/graph_209444428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b7604388d435693ec9bcf7af2ee33ce6a55c473 --- /dev/null +++ b/edge/graph_209444428.jsonl @@ -0,0 +1,2 @@ +{"2495315|10440280": []} +{"2934855|2818055": []} diff --git a/edge/graph_209444730.jsonl b/edge/graph_209444730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0118583343f01e5ef98cceb8aa3f765f02c8b78 --- /dev/null +++ b/edge/graph_209444730.jsonl @@ -0,0 +1,54 @@ +{"117635016|30189749": []} +{"54457648|1229096": ["Finally, there exists a large volume of work on vehicle motion planning outside the machine learning context and Paden et al. (2016) present a notable survey."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"3915263|206764452": ["Recently, several safety systems including collision avoidance, pedestrian detection, and front collision warning (FCW) have been proposed to enhance the safety of the autonomous vehicle [1]\u2013[4]."]} +{"3915263|2113024": ["Recently, several safety systems including collisio n avoidance, pedestrian detection, and front collision warn ing (FCW) have been proposed to enhance the safety of the autonomous vehicle [1]\u2013[4]."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} +{"30383535|1708582": ["In this paper, reinforcement learning (RL) is selected to build the learning module as it has merits in continuous learning and self-improvement [19]."]} +{"16931611|1708582": ["In RL, the learning agent interacts with an initially unknown environment and modifies its action policies to maximize its cumulative payoffs [1], [2]."]} +{"42628306|8815923": ["A complete survey of grasping is outside the scope of this work, and we refer the reader to standard surveys on the subject for a more complete treatment [Bohg et al., 2014], while in this section we primarily discuss data-driven prior grasping methods, which are the most related to the present work.", "\u2026complete survey of grasping is outside the scope of this work, and we refer the reader to standard surveys on the subject for a more complete treatment [Bohg et al., 2014], while in this section we primarily discuss data-driven prior grasping methods, which are the most related to the present work."]} +{"112446|1932843": []} +{"6414987|23566570": ["Recent research shows an increasing interest in use of machi ne learning algorithms for modeling surgical skills, workflow , and environment and integration of this knowledge into control and automation of surgical robots [13]."]} +{"140118807|118649017": ["We refer the interested reader to the overview paper [16], which may serve as a good starting point for a more comprehensive study of recent advances in this direction."]} +{"140118807|15562587": ["The other methods also highlight \u201cnegatively\u201d relevant features speaking against the decision (shown in blue): Layer-wise Relevance Propagation [23], Guided Backprop [24], LIME [25], and SHAP [26]. when approximating complicated functions, e.g., see [14] [15] and the references therein."]} +{"10242377|8533795": []} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"6198785|15093118": ["The optical flow was also proposed to analyze road scenes [9], [118].", "The framework of vehicle tracking and behavior analysis [9].", "sure dynamics and motion characteristics and to predict and estimate the upcoming position of vehicles [9].", "Key developments on vehicle detection were summarized in [9] and [101].", "Haar features are sensitive to vertical, horizontal, and symmetric structures [9].", "Compared with Radar and LiDAR, the raw measurement of vision sensor is the light intensity [9].", "The vehicle detection methods can be categorized into appearance-based and motionbased [9]."]} +{"6198785|206739910": ["As the detection step is coupled with the feature extraction step, the choice of detection method depends on the features from the previous stage [63].", "Results for detection with these data sets and tracking are presented in [63] and [64]."]} +{"52035171|206741902": ["Although the analysis we perform is applicable to any vision-based driving pipeline (including ones that comprise separate perception [21, 24, 28, 2, 12] and control modules [17]), in this paper we focus on end-to-end trained models."]} +{"52035171|1229096": ["Although the analysis we perform is applicable to any vision-based driving pipeline (including ones that comprise separate perception [21, 24, 28, 2, 12] and control modules [17]), in this paper we focus on end-to-end trained models."]} +{"2996148|4975452": ["While we mention a select number of relevant works here, the interested reader is referred to Argall et al. (2009) for a detailed summary.", "While IRL already generalises better than direct imitation learning in this case (Argall et al., 2009), the problem can be additionally addressed by adapting a DAgger-like (Ross et al., 2010) approach, where additional demonstration samples are collected for environments that the system encounters\u2026"]} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"53873353|1229096": ["Consequently, designing a control policy by following the traditional model-plan-then-act approach [18, 21] becomes challenging, as it is dif\ufb01cult to adequately characterize the robot\u2019s interaction with the environment a priori ."]} +{"4708677|14843594": ["Bayesian optimization [34, 7] and kernelbased bandits [9] construct an explicit surrogate function to minimize; often, one assumes it is possible to perfectly model the function f ."]} +{"13741394|1229096": [" not validate their ideas with actual driving. Driving policies. Autonomous driving systems are commonly implemented via modular pipelines that comprise a multitude of carefully engineered components [14,26,33,49]. The advantage of this modular design is that each component can be developed in isolation, and the system is relatively easy to analyze and interpret. One downside is that such architectures can lea", "e in robotics. One important instantiation of this problem is autonomous driving. Autonomous driving is typically addressed by highly engineered systems that comprise up to a dozen or more subsystems [14,26,33,49]. Thousands of person-years are being invested in tuning these systems and subsystems. Yet the problem is far from solved, and the best existing solutions rely on HD maps and extensive sensor suites, "]} +{"49869682|8815923": ["Grasping is one of the fundamental problems in robotic manipulation and we refer readers to recent surveys Bicchi and Kumar [31], Bohg et al. [32] for a comprehensive review."]} +{"116137690|4861446": []} +{"116137690|30189749": []} +{"116137690|84832337": ["The reader is referred to recent surveys on cybersecurity for CAVs [154{157] available in the computer science literature on mobile computing for a detailed and comprehensive analysis of the cyber threats and the corresponding solutions."]} +{"116137690|16049411": []} +{"2294751|14478191": ["Learning with respect to multiple reward functions is also a topic of multi-objective learning (Roijers et al., 2013)."]} +{"207772590|1708582": []} +{"1708582|17464562": []} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} +{"1185580|15929566": []} +{"1185580|1708582": []} diff --git a/edge/graph_209444848.jsonl b/edge/graph_209444848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d8c5e00811dcb444713c97b7244c298695e0e4d --- /dev/null +++ b/edge/graph_209444848.jsonl @@ -0,0 +1,45 @@ +{"10713737|393948": ["The core idea of deep learning is to use artificial neural networks to model complex hierarchical or compositional data abstractions and representations from raw input data (Bengio et al., 2013)."]} +{"10713737|1708582": ["Reinforcement learning (Bertsekas & Tsitsiklis, 1996; Powell, 2011; Sutton & Barto, 1998; Kaelbling et al., 1996) studies these problems and algorithms which learn policies to make decisions so as to maximize a reward signal from the environment."]} +{"26036647|9588126": ["However, many important tasks require the collaboration of multiple agents, for example, the co-ordination of autonomous vehicles Cao et al. (2013), multi-robot control Matignon et al. (2012), network packet delivery Ye et al. (2015) and multi-player games Synnaeve et al. (2016) to name a few."]} +{"195346786|9316331": ["One strategy for on-line planning is to use look-ahead tree search (Knuth & Moore, 1975; Browne et al., 2012)."]} +{"21686041|9316331": ["The standard leaf evaluator for MCTS is to simulate a default or \u201crollout\u201d policy (Browne et al., 2012) until the end of the game, though in related tree search techniques, authors have also opted for a value function approximation (Campbell et al., 2002; Enzenberger, 2004).", "Monte-Carlo tree search (MCTS), introduced in Coulom (2006) and surveyed in detail by Browne et al. (2012), has received attention in recent years for its successes in gameplay arti\ufb01cial intelligence (AI), culminating in the Go-playing AI AlphaGo (Silver et al., 2016).", "The standard leaf evaluator for MCTS is to simulate a default or \u201crollout\u201d policy (Browne et al., 2012) until the end of the game, though in related tree search techniques, authors have also opted for a value function approximation (Campbell et al.", "\u2026evaluators (either a policy function (Chaslot et al., 2006) rollout, a value function evaluation (Campbell et al., 2002; Enzenberger, 2004), or a mixture of both (Silver et al., 2016)) to produce estimates of downstream values once the tree has reached a certain depth (Browne et al., 2012).", ", 2016)) to produce estimates of downstream values once the tree has reached a certain depth (Browne et al., 2012)."]} +{"52298807|5014732": ["Please refer to [18, 19] for a review."]} +{"44065826|1708582": ["This is among the reasons why \u201clearning to plan\u201d has been an active research area to address these shortcomings (Russell et al., 1995; Kaelbling et al., 1996)."]} +{"4533648|9588126": ["Reinforcement learning (RL) holds considerable promise to help address a variety of cooperative multi-agent problems, such as coordination of robot swarms (Hu\u0308ttenrauch et al., 2017) and autonomous cars (Cao et al., 2012)."]} +{"51976825|5014732": ["Up to now, bots participating in these competitions, such as Artificial Intelligence and Interactive Digital Entertainment (AIIDE) StarCraft AI Competition, CIG StarCraft Competition, Student StarCraft AI Competition, mainly depend on hard-code rule and tree search methods [12], [13]."]} +{"51976825|9316331": ["The most common method to adapt to different opponents strategies is Upper Con\ufb01dent Bounds(UCB) [14], which still shows its limit of \ufb02exibility in different games."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"3555094|5014732": ["2) Multi-Player GVGAI: Multi-agent games has drawn people\u2019s attention, for instance, real time strategy games (e.g. StarCraft) and board games (e.g. Mahjong).", "The more well-known include the Ms Pac-Man competition [1], the Mario AI competition [2], the Simulated Car Racing competition [3], the Arcade Learning Environment [4] and the StarCraft [5] competitions."]} +{"3555094|9316331": ["The score difference is calculated between an Monte Carlo Tree Search agent and One Step Look Ahead agent.", "All agents use online learning in one way or another (the simplest form being the base Monte Carlo Tree Search backups, used to gather statistics about each action through multiple simulations), but only the overall 2016 and 2018 Championship winner, adrienctx , uses of\ufb02ine learning on the training set supplied to tune the parameters in the Stochastic Gradient Descent function employed, learning rate and mini batch size.", "One of the strongest and in\ufb02uential sample controllers is sampleMCTS , which implements the Monte Carlo Tree Search (MCTS) algorithm for real-time games.", "Two methods stood out as the base of most entries received so far, Monte Carlo Tree Search (MCTS) and Evolutionary Algorithms (EA) [10].", "One of the strongest and influential sample controllers is sampleMCTS, which implements the Monte Carlo Tree Search [24] algorithm for real-time games."]} +{"1552061|9316331": ["By expanding the more valuable branches of the tree and carrying out a random simulation at the leaf nodes, UCT is known to perform well in many different settings (Browne et al., 2012)."]} +{"59554437|5014732": ["Several competitions have been held every year to stimulate the development of StarCraft AI, including IEEE CIG, AIIDE, and SSCAIT StarCraft AI competitions [1]."]} +{"53211390|115456": []} +{"53211390|5014732": ["Its predecessor StarCraft has attracted numerous research efforts, including hierarchical planning (Weber, Mateas, and Jhala 2010) and tree search (Uriarte and Onta\u02dcn\u00b4on 2016) (see survey by Onta\u02dcn\u00b4on et al. (2013)).", "See the survey of Onta\u02dcn\u00b4on et al. (2013) and Robertson and Watson (2014) for complete summaries."]} +{"6897121|5014732": ["For a more detailed overview of AI research on StarCraft, the reader should consult [23]."]} +{"14208912|1185580": ["Actor-critic models [Barto et al. (1983); Sutton (1984); Konda & Tsitsiklis (1999); Grondman et al. (2012)] aim to jointly estimate V (s) and \u03c0(a|s): from the current state st, the agent explores the environment by iteratively sampling the policy function \u03c0(at|st;w\u03c0) and receives positive/negative\u2026"]} +{"52824204|5014732": ["Traditionally, researches on real-time strategy games are based on search and planning approaches (Onta\u00f1\u00f3n et al. 2013)."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"52171619|1708582": ["For many reinforcement learning (RL) problems [37, 96, 106], an arti\ufb01cial RL agent may also bene\ufb01t from a predictive model (M) of the future [95, 104] (model-based RL)."]} +{"47082037|5014732": ["This is the case in Minecraft (Project Malmo; Johnson et al., 2016), Starcraft (Ontan\u0303o\u0301n et al., 2013), and robotic RL platforms (Sutton et al., 2011).", ", 2016), Starcraft (Onta\u00f1\u00f3n et al., 2013), and robotic RL platforms (Sutton et al."]} +{"3521972|73497737": ["A plethora of continual learning techniques exist in the supervised learning setting (see [33] for a full review).", "However, as noted by Parisi et al. [33], more research is needed to tackle continual learning with autonomous agents in uncertain environments - a setting well-suited to Reinforcement Learning (RL)."]} +{"4559747|115456": ["In recent years, the study of StarCraft AI has an impressive progress, driven by some StarCraft AI competitions and Brood War Application Programming Interface (BWAPI)1 [10]."]} +{"4559747|5014732": ["at solving a series of challenges, such as spatial and temporal reasoning, multi-agent collaboration, opponent modeling and adversarial planning [8]."]} +{"4559747|1708582": ["raw experience without a model of the environment, and update estimates based on part of the sequence, without waiting for a final outcome [25]."]} +{"2294751|14478191": ["Learning with respect to multiple reward functions is also a topic of multi-objective learning (Roijers et al., 2013)."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"19141434|9588126": []} +{"28808621|115456": ["[21] and Robertson & Watson [25] for an overview.", "We recommend the surveys by Ontanon et al. [22] and Robertson & Watson [26] for an overview."]} +{"28808621|5014732": ["[21] and Robertson & Watson [25] for an overview."]} diff --git a/edge/graph_209450009.jsonl b/edge/graph_209450009.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26ea4fd2aa7444cee3d6b797f00cd8aa6bec6d6d --- /dev/null +++ b/edge/graph_209450009.jsonl @@ -0,0 +1,12 @@ +{"49296637|1230643": ["Wireless sensor networks (WSNs) provide deployment of low cost wireless nodes which are useful to collect and measure data about a certain environment [1].", "Wireless sensor networks are widely used in many application areas such as rescue operations, habitat monitoring, structural monitoring, and wild fire detection [1]."]} +{"52233575|3330461": ["It allows to exploit direct opportunistic communications among end-user devices with a device-to device (D2D) approach [2] , without the (or with a minimal) intervention of the network operator resources (but possibly under the network operator control, when under network coverage)."]} +{"3473576|1230643": []} +{"14414129|1230643": ["I. INTRODUCTION Growing interest in wireless sensor network (WSN) applications has motivated lots of research work during recent years [1]."]} +{"199489166|205286988": ["Optimization is considered as the first choice for sending the data from the sensor node to sink so that an optimized path can save the energy as well as the time [9]."]} +{"2292839|1230643": ["This paper focuses on reducing the sensitivity of the operation and monitoring of sensor networks to the ambiguity of the propagation model of the radio signal."]} +{"26216054|10096622": []} +{"26216054|1230643": []} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"10209796|1230643": ["THE growing interest in the applications of wireless sensor networks (WSNs) has motivated lots of research work during recent years [1], [2]."]} +{"10585332|1230643": ["After being deployed into the target field, these nodes can self-organize into a multihop wireless sensor network [13], [5], [4], [31]."]} +{"33914677|1230643": ["Interest in the applications of wireless sensor networks (WSNs) has been on the rise in recent years [1]."]} diff --git a/edge/graph_209454849.jsonl b/edge/graph_209454849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209456687.jsonl b/edge/graph_209456687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209456963.jsonl b/edge/graph_209456963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9caa0814c368b2e7b9feb82a05a62006e459b1cb --- /dev/null +++ b/edge/graph_209456963.jsonl @@ -0,0 +1,31 @@ +{"7973010|57194320": ["2014 [5] Survey on using DTN for underwater WSN (UWSN)", "In particular, underwater WSN have known many new DTN solutions to enable delay tolerance.", "In [18], S\u00f6derman et al have proposed SmartGap, a buffer management algorithm for delay tolerant WSN. SmartGap is composed of two main parts: a queueing policy and a forwarding strategy.", "[12], where the first has studied the feasibility of implementing BP for WSN.", "Many other DTN solutions for underwater WSN have been surveyed in [5].", "After a comparison, authors conclude that scheduled contact solutions are efficient for UWSN but incur greater cost for base station.", "Each of the proposed papers address one specific challenge, in particular the use of opportunistic interaction [8], combination of ICN and DTN schemes [14], solutions for underwater WSN [5][7].", "Authors explain how the solution can be useful for resource-limited sensors, even for 8- bit based WSN. Al Turjman et al. have proposed [2] a combined RFID and sensor platform which uses delay tolerance in case of intermittent connections."]} +{"7973010|9410318": ["[6] have proposed an IoT of underwater objects where DTN routing techniques are required to address the intermittent network connectivity.", "[6] D\u2019souza, R. J., & Jose, J. Routing approaches in delay tolerant networks: A survey.", "2010 [6] \u2022 Taxonomy using flooding-based, historybased, & special device-based classification", "In addition to previous routing families (flooding and forwarding), D\u2019zousa & Jose [6] introduce in their paper another category based on using special device.", "The majority of papers was interested in network topology class where DTN schemes are classified into deterministic, stochastic, and eventual category such as coding based or special device [1][6][16][20]."]} +{"44083468|3450996": ["To improve the performance of data forwarding in MSNs, a significant problem in the research of MSNs is to measure the centrality (importance) of nodes in the network [9]\u2013[11]."]} +{"86472352|26335185": ["ing data dissemination in WSNs [41]."]} +{"86472352|9830350": ["Such a hierarchical topology has apparent advantages, such as more scalability and more robustness [42], [43]."]} +{"198333766|53730401": []} +{"6038542|15068419": ["nity by considering its internal compactness or identifying outlier data with probability model [10]."]} +{"201084322|58672147": ["States about the need for enhanced prediction property, so as to improve the performance, further, [24] explained about LBS and insist the need for enhancing the performance.", "[24] explained about the location-based services (LBS) which provides clients with location centric information dependent on their area."]} +{"201084322|4861446": ["[12] compared several types of localization techniques, whereas Light Detection and Ranging (LiDAR) based technique provides higher accuracy.", "The propelled sensors enabled systems provides more precise and dependable position estimations than GPS however at greater computing and communication cost [12].", "Moreover [25] described about the security issues of VANET during localization, in addition [12] stated about LiDAR, which is highly sensitive to environmental."]} +{"201084322|35098173": ["For example, map coordinating, dead-end route computation, on-street cell localization, picture/video-based incidence guidance, localization administrations and relative distributed ad-hoc localization, and various other confinement strategies, that are utilized in VANETs to conquer such constraints [13].", "[2] O. Kaiwartya and S. Kumar, \u2018\u2018Cache agent-based geocasting in VANETs,\u2019\u2019 Int.", "A cooperative group of sensor-enabled vehicles operating in a dynamic road traffic network environment by interconnecting among on-road vehicles and, with neighboring Road Side Units (RSUs) are referred to as Vehicular Ad-hoc Networks (VANETs) [2].", "His research interests include mobile\nsocial networks, VANETs, opportunistic mobile networks, and wireless sensor networks.", "Thus, the performance of VANETs increases with better accuracy, high throughput, greater packet of delivery ratio and reduced packet loss ratio.", "VANETs can support a promising intelligent transportation system technology for many real time traffic applications including safety message dissemination, dynamic route planning, content distribution, gaming, and Internet of connected vehicles, connected autonomous vehicles, electric vehicles and related smart applications [4].", "[22] N. Alam, A. T. Balaei, and A. G. Dempster, \u2018\u2018Relative positioning enhancement in VANETs: A tight integration approach,\u2019\u2019 IEEE Trans.", "Dynamic mobility patterns, frequent connectivity disruptions, and irregular topology changes are some of the examples of challenging communication network environments in VANETs [5], [6].", "The anti-jammer centric security approaches in VANETs can be broadly categorized into two types of strategies including GPS and RSU enabled location verification."]} +{"21666363|763939": ["[22] are the first to put forward the guidelines of ve-"]} +{"4871719|1230643": ["W rapid development of microelectronics and wireless communication in recent decades, wireless sensor networks (WSNs) have been widely used in a broad range of applications including military battlefield, medical health, traffic management, environmental monitoring, space exploration, and so on [1]\u2013[14]."]} +{"53102302|3450996": ["The aforementioned scenario in fact is just like data offloading through opportunistic mobile networks [12]."]} +{"53102302|38911919": [", it tries to prolong the lifetime of a cluster to keep a stable topology [13]\u2013[15].", "Then it claims itself as the cluster head [13]."]} +{"27874608|13454399": ["EE [10] Restricted High High Tree Disjoint Query-based x x x", "[10] M.", "IEEE Wireless Communications \u2022 October 2017 127 DYNAMIC SPECTRUM MANAGEMENT FOR 5G were discussed in [10].", "Proactive routing protocols This survey investigates Robust Multipath Routing (RM-DSR) and Multipath Dynamic Source Routing (MDSR) as examples of DSR, Tiny Optimal Node-Disjoint Multipath Routing (TinyONDMR) protocol as an example of proactive AODV, and SHRP as a reactive protocol [10].", "SHRP [10] Energy efficiency and", "MMSPEED [10]", "emergencies Hazard detection EE [10] Security, QoS, and data", "For instance, the Multipath Multi-SPEED (MMSPEED) routing protocol has many improvements and modifications in order to guarantee specific QoS parameters in WSNs spanning over the network and MAC layers [10]."]} +{"27874608|2295142": ["Alternative path routing, reliable data transmission, and efficient resource utilization were the three major criteria in which multipath routing protocols were classified in [11], whereas a different classification based on selection techniques and traffic distribution mechanisms was presented in [12].", "[11] M."]} +{"27874608|3826739": ["Position-based routing algorithms and metrics like energy consumption, negotiation overheads, complexity, reliability, scalability, and multipath strategies were considered in [7].", "[7] Z."]} +{"27874608|1236072": ["[4] N.", "The authors of [4] discussed constraints and solutions related to each layer of the WSN stack."]} +{"199578282|2473728": ["While on the other hand, it tends to produce greater environmental pollution [15], [16]."]} +{"17902417|207372751": ["In our experiments, we use the Precision metric [20] to evaluate the accuracy of predicted link patterns:", "Link prediction has been explored for long in both social networks and complex networks [15], [20].", "[20] divide link prediction into two categories: similarity based prediction and model driven prediction."]} +{"36445608|14441987": []} +{"132222493|53730401": ["For groups, such as school classes, teams and interest groups, the frequency and time of their behavior and the law of group activities are relatively stable [25\u201327]."]} +{"132222493|3450996": []} +{"2892242|870434": ["In underwater acoustic networks [1,26], DTNs are more critical as no \ufb01xed infrastructure exists and less than ten expensive autonomous underwater vehicles may roam an area hundreds of km in diameter carrying acoustics transducers that reach only 2\u20135 km."]} +{"8420169|763939": ["A survey is presented in chapter by Awwad, Yi, and Stojmenovic in [ ]. fsew other chapters in the same book survey ongoing research activities on experimental testbeds and simulation"]} +{"8420169|1940388": ["Indeed, while MANET represents an engineering approach to hide node mobility by constructing \u201cstable\u201d end-to-end paths as in opportunity to exploit ."]} +{"8420169|6275330": ["The need for real development produced orthogonal approach to MANET validation While initially simulation was largely used [27 it was quite soon replaced by large testbeds deployed at several universities, 3 which are open for access to the research community."]} +{"8420169|1230643": []} +{"35094382|763939": []} +{"35094382|870434": ["Underwater communication presents several challenges [8,18]: almost all underwater communication uses acoustic waves, since radio waves suffer severe attenuation in salty water; the medium access is an open problem in underwater networks; nodes are expensive and the monitoring areas are 6 V."]} +{"35094382|1230643": ["Those networks employ low power sensor nodes due to size, price and battery constraints, and as such the network lifetime is usually short [27]."]} diff --git a/edge/graph_209456971.jsonl b/edge/graph_209456971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e0a76163ce99da678e2eacefd107ba81c644dc4 --- /dev/null +++ b/edge/graph_209456971.jsonl @@ -0,0 +1 @@ +{"116365592|12537501": []} diff --git a/edge/graph_209457050.jsonl b/edge/graph_209457050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad7786b35f93f2d9dd71940f53e50c321e3b304a --- /dev/null +++ b/edge/graph_209457050.jsonl @@ -0,0 +1,47 @@ +{"49353991|15595198": []} +{"51614810|1770055": ["More complete and in-depth analysis of these techniques are available in [11], [12], [13], [14]."]} +{"1605434|9928823": []} +{"9385544|16362395": []} +{"9385544|8365617": []} +{"38001318|4071247": []} +{"38001318|10975328": []} +{"38001318|8365617": []} +{"4597502|1176034": ["Since aggregated movement data have the form of spatially referenced time series, it is possible to use interactive visualizations [11] and computational methods from statistics [24] and data mining [34] devised for time series.", "There are many methods that can be used for analyzing spatially referenced time series, including spatial and non-spatial interactive visualizations [1][11] and computational methods from statistics [24] and data mining [34]."]} +{"5389712|2451860": ["Moreover, the recent advances in mobile computing, sensor and GPS technology have made it possible to collect large amounts of spatiotemporal data and there is increasing interest to perform data analysis tasks over this data [4]."]} +{"37976749|1174262": []} +{"6133639|3102110": ["Clustering is an exploratory data analysis process [47, 7] that groups a set of data items such that the intra-cluster similarity is maximized and the inter-cluster similarity is minimized."]} +{"6133639|239537": ["Examples of such techniqu es include various 2D and 3D dendrograms [43, 19], which are highl y effective for representing hierarchical clustering solut i ns; 2D and 3D non-linear projections of clustering solutions such as S mmon map [40], MDS [30], SOM [29], and various projections based o n PCA and LSI [20, 4]; and hyperbolic visualizations [31, 19, 5 1]."]} +{"5605332|7530272": ["Most existing TSC approaches fall into two categories [31]: distance-based methods and feature-based methods."]} +{"205462948|7530272": ["The sequence classification methods can be classified as one of three categories: feature-based, distance-based and model-based [2,83]."]} +{"205462948|16362395": []} +{"205462948|9240891": ["The issue of trust has been exhaustively discussed in literature from different perspectives for the purpose of trust-based decision making [30,48]."]} +{"114064825|54134680": []} +{"114064825|12457965": []} +{"114064825|7530272": []} +{"114064825|16156203": []} +{"114064825|191396": []} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"17089577|7530272": ["Please refer to a recent survey on the topic [14] and the references therein."]} +{"31577539|7530272": ["Model based classification methods try to build a model that represents a collection of time series [16].", "The studies in time series classification can be analyzed in three main categories with respect to the classification scheme: feature based, model based and distance based [16]."]} +{"52057648|14205872": []} +{"8973749|1176034": ["[65]."]} +{"8973749|8365617": ["In this regard, most efforts have been devoted to data representation using so called segmentation algorithms[64]."]} +{"12407825|1174262": []} +{"7341582|4071247": ["[2]), rather than all possible interactions in visual analytics.", "In general, knowledge learned in visual analytics can be defined as \u201cjustified belief\u201d [2]."]} +{"12597448|239537": ["Once this pre-processing stage is done, the network is visualized using graph or network visualization techniques [Ead84, KV06, HMM00]."]} +{"14586834|1734833": ["However, analyzing many physiological data sessions with respect to specific events is very challenging [4].", "Recently, machine learning algorithms have been explored to predict target behaviors or events using physiological data [2], [4]."]} +{"14586834|20905429": ["A growing number of individuals who are interested in collecting physiological data in their everyday lives using wearable sensors [8], [9] can use our tool to understand their physiological data changes in relation to their behaviors or events (e."]} +{"1631622|393948": ["Feature learning (or representation learning) is becoming an important field in machine learning community in recent years [9]."]} +{"1631622|7530272": ["Other than sequence distance based methods, feature-based classification methods [8] follow the traditional classification framework."]} +{"385307|3102110": []} +{"17329552|1176034": ["Since aggregated movement data have the form of spatially referenced time series, it is possible to use interactive visualizations [7] and computational methods from statistics [19] and data mining [27] devised for time series data.", "There are many methods that can be used for analyzing spatially referenced time series, including spatial and non-spatial interactive visualizations [1][7] and computational methods from statistics [19] and data mining [27]."]} +{"17321106|239537": []} +{"14971684|18722099": []} +{"14971684|2593345": []} +{"51934871|53958589": []} +{"51934871|13172512": [", Voice over IP [56]."]} +{"34916619|4071247": ["Lalanne\u2019s [16] distinction of human intervention levels, that distinguishes, for example, between scheme tuning (e."]} +{"34916619|16557526": ["There is much previous work on visualization techniques to display data uncertainty of spatial data, such as volume or flow visualization [62, 63]."]} +{"15919503|12260867": []} +{"2244423|393948": ["This need is consistent with the findings of previous research [5, 20].", "However, a deep CNN is often treated as a \u201cblack box\u201d model because of its incomprehensible functions and unclear working mechanism [5].", "Without a clear understanding of how and why these networks work, the development of high-performance models typically relies on a time-consuming trial-and-error procedure [4, 5, 58].", "Second, CNNs consist of many functional components whose values and roles are not well understood either as individuals or as a whole [5]."]} +{"2244423|2593345": ["Possible solutions are to employ the range traversal technique [16] or provide additional visual hint(s)."]} diff --git a/edge/graph_209457379.jsonl b/edge/graph_209457379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26cb9ae5fda001b4ae10ba8c8d151de26255ee4f --- /dev/null +++ b/edge/graph_209457379.jsonl @@ -0,0 +1,6 @@ +{"14205306|21632806": ["The mentioned transformations can be done by means of transformation languages such as QVT, Acceleo, ATL and VIATRA, [10]."]} +{"14205306|31086789": ["Using modern Information and Communication Technology (ICT) as well as automation approaches in multifunctional, flexible ESS will improve the implementations of storage capacities worldwide [2]."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"29812191|485843": ["Communication standards, protocols, and common services play a key role to implement this smart and coordinated system approach [8]."]} +{"21303841|5747564": ["Starting from node 0, the initial longest path could either be node 0 -> 1 -> 2 -> 3 -> [4-11], node 0 -> 1 -> 22 -> 23 -> [24-31] or node 0 -> 1 -> 12 -> 13 -> [14-21]."]} +{"21303841|121289": ["interoperability challenge [3, 4]."]} diff --git a/edge/graph_209459465.jsonl b/edge/graph_209459465.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e0116afaeccf055ec4c7368a8d090fe8aa55651 --- /dev/null +++ b/edge/graph_209459465.jsonl @@ -0,0 +1,39 @@ +{"4883076|14776754": []} +{"53017285|16748080": ["Another survey in [43] has focused on the QoS provisioning in both EDCA and HCCA over IEEE802."]} +{"27388536|270804": ["In [4], [19], [91]\u2013[100], authors present surveys for transport layer protocols or congestion control based protocols."]} +{"27388536|1230643": ["A WSN comprises a large set of distributed nodes over a wide geographical (indoor or outdoor) area to monitor a physical or environmental event [1].", "Some typical applications of WSN includes telemedicine monitoring, intelligent transportation, home automation, factory monitoring, energy conservation, target tracking and environmental monitoring, etc [1], [12]\u2013[15]."]} +{"14542931|17205659": ["Current intrusion detection systems (IDSes) are typically only able of detecting packet losses and are thus unable to determine the cause of the losses, whether it is node or link related [11]\u2013[13]."]} +{"121461429|5660618": []} +{"26526868|28210515": ["4 GHz industrial, scientific and medical (ISM) band.(1) As multiple wireless communication network standards (e."]} +{"11498812|22833814": ["In GBSM, the impulse responses of channel is characterized by the law of wave propagation applied to specific transmitter, receiver, and scatterer geometries that are predefined in a stochastic fashion according to certain probability distributions [33]."]} +{"49874214|3540699": ["264/advanced video coding (AVC) standard [85]."]} +{"54222295|51716069": ["The first type is the low-power nodes that mostly rely on battery power [151]."]} +{"54222295|3450189": ["For instance, Gomez et al. [107] and Darroudi and Gomez [264] review the BLE standard from a protocol stack point of view and research to provide a BLE mesh network, respectively.", "[107] and Darroudi and Gomez [264] review the BLE standard from a protocol stack point of view and research to provide a BLE mesh network, respectively."]} +{"54222295|4427557": ["[263] reviewed the LPWAN for long-range communication networks such as SigFox and LoRaWAN."]} +{"54222295|13361214": ["[79] pointed out the overhead of topology change in large-scale networks."]} +{"54222295|8618569": ["attacks by generating a different session, joint, and network keys [90]."]} +{"13140229|17787193": ["\u2026trend, the seam-less integration of cellular (e.g., 3G/LTE) and WiFi technologies has attracted signi\ufb01cant research interest in recent years (see [202] for a survey), a few solutions have already been standardised [203, 204], and roaming between cellular and WiFi is becoming increasingly\u2026"]} +{"13140229|8462498": ["How to optimally exploit the new DL-MU-MIMO capabilities provided by IEEE 802.11ac is still an open challenge.", "In [44], the authors compare di\ufb00erent strategies to assign the spatial streams between the available destinations at each transmission in a fully connected mesh network, showing in ideal channel conditions the theoretical bene\ufb01ts of MU-MIMO vs. SU-MIMO.", "An analytical model to evaluate the performance of the IEEE 802.11ac TXOP sharing mechanism in DL-MU-MIMO communications is developed in [38].", "Compared to IEEE 802.11n, IEEE 802.11ac supports larger channel widths (up to 160 MHz), introduced a new modulation scheme, i.e., a 256-QAM modulation, and downlink multiuser MIMO (DL-MU-MIMO).", "The performance bene\ufb01ts of uplink MU-MIMO have been already extensively studied, showing its bene\ufb01ts but also the requirements and challenges to implement such a solution [59].", "MIDAS (Multiple-Input Distributed Antenna Systems) [198] implementation using the WARP platform shows the bene\ufb01ts of distributing the antennas over the area to cover instead of co-locating them at the AP in terms of capacity when MU-MIMO is employed.", "It is worth mentioning that DL-MU-MIMO was not yet implemented in the equipment they were using, and that feature was therefore not considered.", "Since the IEEE 802.11ac amendment has recently been \ufb01-nalised, current research around it should cover two main aspects: a) understanding the performance bounds of IEEE 802.11ac, which entails the development of new models, simulation tools and experimental platforms of IEEE 802.11ac-based WLANs, and b) proposing speci\ufb01c solutions for those aspects that are not de\ufb01ned by the IEEE 802.11ac amendment on purpose, such as the mechanism for creating the groups of STAs for DL-MU-MIMO transmissions, smart packet schedullers able to decide when the use of DL-MU-MIMO outperforms SU-MIMO transmissions, and the implementation of the TXOP sharing feature between several ACs.", "The evaluation of a DL-MU-MIMO implementation for WLANs using the WARP platform is presented in [35], where a deep evaluation of the potential bene\ufb01ts of DL-MU-MIMO transmissions is done in terms of the location of the receivers, number of users, and user mobility, among other aspects.", "First, due to the need of frequent CSI exchanges between STAs and the AP, it is not yet clear in which conditions DL-MU-MIMO outperforms SU-MIMO [39, 40, 41, 42], or even whether MU-MIMO does or does not out-perform multi-user packet aggregation when the amount of data directed to each destination is not balanced [43].", "11ac by allowing multiple simultaneous transmissions in the plink, which is known as uplink (UL-) MU-MIMO [58].", "Similar to DL-MU-MIMO transmissions, an open challenge to enable uplink MU-MIMO is to design a mechanism able to e\ufb03ciently schedule the users that will transmit simultaneously.", "IEEE 802.11ax will further develop the MU-MIMO capabilities of IEEE 802.11ac by allowing multiple simultaneous transmissions in the uplink, which is known as up-link MU-MIMO.", "A solution that combines both packet aggregation and DL-MU-MIMO transmissions is presented in [36].", "The main novelty introduced by the IEEE 802.11ac amendment compared with the IEEE 802.11n one is the support of MU-MIMO transmissions in the downlink, hence allowing multiple simultaneous transmissions from the AP to di\ufb00erent STAs.", "The challenges in the design of the IEEE 802.11ax PHY layer are related with the extensions required to support multi-user MU-MIMO and OFDMA transmissions, and Dynamic CCA."]} +{"13140229|12187956": ["\u2026hando\ufb00 issues (e.g. in case PUs suddenly appear in a region) must be resolved in advance to minimise the latency of re-establishing a functional communication channel, e.g. by implementing a proactive alternative rendezvous channel selection in background to ongoing communication processes [161]."]} +{"13140229|5621151": ["This reorganisation has shown that there are many empty TV hannels, called TV white spaces, that can be used for data communiation, especially in rural regions [28]."]} +{"13140229|1230643": []} +{"31767324|6581557": []} +{"31767324|1615097": []} +{"31767324|3540699": []} +{"53716816|46642131": ["[25] used accuracy, coverage, and cost to compare the quality of location sensing systems.", "Ultra wideband (UWB) is good for time-based ranging that uses TOA and TDOA [25].", "UWB is good for time-based ranging that uses TOA and TDOA [25].", "Therefore, the accuracy of TOA and TDOA-based VLC positioning approaches depends on the accuracy of the time measurements, which in turn depends on the resolution of clocks and the photo diode (PD) [42].", "In propagation modeling based positioning, position calculations are done usually using multilateration based on distances calculated by referring the RSS to a signal propagation model [25].", "TOA and TDOA measurements are not suitable for BT as BT lacks precise time synchronisation [67]."]} +{"53716816|5476476": ["A good review of improvements in localization algorithms can be found in [57].", "Algorithm level adaptation: In parallel to the improvement of sensors, localization methods have also been improved or new methods have been developed to cope with variations in the quality of location information [57].", "[57] provides a detailed review on the fusion of information from different technologies to improve localization accuracy.", "[57] provide a detailed review on the fusion of various localization technologies."]} +{"53716816|17165859": ["Quality of TOA-based VLC positioning approaches also depends on the response time of the receivers and rising and falling times of the light emitting diodes (LEDs) [42].", "Accuracy of fingerprinting-based VLC positioning depends on how the fingerprinting database is constructed [42].", "Due to the high speed of light, even a small error in time measurements can cause large errors in distance estimation [42].", "Image based VLC positioning approaches depend on the quality of the image sensors used [42].", "Therefore, the accuracy of TOA and TDOA-based VLC positioning approaches depends on the accuracy of the time measurements, which in turn depends on the resolution of clocks and the photo diode (PD) [42].", "VLC-based positioning also suffers from multipath issues [94].", "These technologies include, GNSS, mobile networks [36], WiFi [1,37], inertial sensors [38\u201340], infrared (IR) light [41], visible light communication (VLC) [42,43], ultrasound [44,45], audible sound [46], radio frequency identification (RFID) [47], bluetooth (BT) [48], ultra wideband (UWB) [16,49], Zigbee [50], vision (image/video) based techniques [51\u201354] and frequency modulation (FM) [55].", "The degree of mobility of the user also affects the quality of the location information produced [42] by VLC positioning.", "A description of the measurements used by visible light based positioning and example systems are available in [42].", "A further example relates to VLC-based positioning: image analysis can be used as a localization method and its accuracy depends, amongst other things, on the speed of the camera being used [42].", "Visible light based positioning basically uses TOA, TDOA, AOA, CoO and RSS [42].", "Visible light communication based position is highly affected from the interference from ambient light such as sunlight [42]."]} +{"53716816|28763840": ["For example, the well-known Okumura-Hata model models the path loss according to the distance between emitter and receiver, antenna characteristics and transmission frequency [73].", "Signal propagation models model the signal strength degradation as a function of other relevant parameters such as the traveled distance and the transmission frequency [73]."]} +{"53716816|206583375": ["Environmental Nature of the environment X[58] X[16,90] X[22] X[58,79] X[58,79] X[42]", "Interference X[86] X[48,66] X[16,23,92] X[16,50,71] X[22,90] X[42] X[40,95] X[68] X[40,95]", "[22] security and privacy, cost, performance, robustness and fault tolerance, complexity, user preference, commercial availability, limitation X", "A robust positioning system functions well even when problematic situations such as when sensors are stolen or malfunction [22,23].", "It is highly affected by other light sources such as sunlight and fluorescent light [22,90].", "Signal-related Multipath X[83] X[65,85] X[48,66] X[50] X[22,90] X[94] X[58] X[58]", "[22] describe eight aspects that can be used to evaluate Indoor Positioning Systems (IPSs): security and privacy, cost, performance, robustness and fault tolerance, complexity, user preference, commercial availability and, limitations."]} +{"46958729|3450189": ["Finally, Darroudi and Gomez [26] survey state-of-the-art BLE mesh network solutions and discuss their advantages and drawbacks."]} +{"67867677|14159066": ["A possible solution to improve spatial reuse in a dense deployment environment is by tuning carrier sensing mechanisms [66], e."]} +{"18276707|7439310": ["increase the robustness of video communication over lossy networks [1]\u2013[7]."]} +{"8420169|763939": ["A survey is presented in chapter by Awwad, Yi, and Stojmenovic in [ ]. fsew other chapters in the same book survey ongoing research activities on experimental testbeds and simulation"]} +{"8420169|1940388": ["Indeed, while MANET represents an engineering approach to hide node mobility by constructing \u201cstable\u201d end-to-end paths as in opportunity to exploit ."]} +{"8420169|6275330": ["The need for real development produced orthogonal approach to MANET validation While initially simulation was largely used [27 it was quite soon replaced by large testbeds deployed at several universities, 3 which are open for access to the research community."]} +{"8420169|1230643": []} +{"11138393|8462498": ["11ac amendment [81], based on MU-MIMO [145].", "Also, novel MAC schemes for multiuser channel access should be developed for HEWs which employ PHY technologies such as OFDMA and MU-MIMO.", "The term \u2018multiuser channel access\u2019 refers to a technique by which multiple STAs, each with one or more antennas, either simultaneously transmit to a single STA or simultaneously receive from a single STA independent data streams over the same frequency channel.4 Multiuser channel access is supported by a PHY layer technology such as OFDMA or MU-MIMO (Sections II-A and II-B) for uplink or downlink communication, i.e., for the AP to transmit/receive data to/from multiple STAs simultaneously.", "MU-MIMO can be categorized into MIMO broadcast channels (MIMO-BC) and MIMO multiple access chandelles (MIMO-MAC).", "As mentioned in Section III-B, while downlink multiuser channel access is adopted in the IEEE 802.11ac based on MU-MIMO, realizing uplink multiuser channel access is a more challenging task.", "In order to maximize the throughput gain achieved in HEWs by applying an improved PHY layer, either based on IBFD communications, or via OFDMA and MU-MIMO techniques (Sections II-A and II-B), suitable MAC strategies should be developed for HEWs, as discussed in the following.", "Similarly, while there exist some uplink MU-MIMO MAC protocols proposed in [145], either with the AP coordinating", "PHY layer enhancements can be based on improving the current WLANs\u2019 OFDM and MU-MIMO techniques, and/or on employing other technologies such as OFDMA and IBFD communications.", "MU-MIMO leverages the spatially distributed user locations to achieve a spatial multiple access gain, which is useful when the number of STAs is large and the number of antennas at the AP is more than the number of antennas at each STA.", "However, the employment of OFDMA or MU-MIMO technologies at the PHY layer requires a suitable MAC scheme that can achieve the maximum benefit of multiuser channel access.", "The performance of MU-MIMO systems, including MIMO-BC and MIMO-MAC, has been extensively studied [61]\u2013[66].", "Also, a comparison between the downlink MU-MIMO and downlink OFDMA technologies is presented in [118] and [119], in terms of throughput gain and additional control overhead with respect to single-user channel access.", "The second direction focuses on new MAC schemes for simultaneous multiuser transmission, based on the OFDMA or MU-MIMO technologies, as discussed in Sections II-A and II-B respectively.", "In summary, this section discusses three potential PHY layer technologies for HEWs, which are OFDMA, MU-MIMO, and IBFD.", "Downlink multiuser transmission is recently introduced in the IEEE 802.11ac amendment [81], based on MU-MIMO [145].", "These enhancements include adopting orthogonal frequency division multiple access (OFDMA) and deploying technologies such as multiuser multiple-input multiple-output (MU-MIMO) and inband full-duplex (IBFD) communications.", "Also, the IEEE 802.11ac provides simultaneous data streams for up to four downlink MU-MIMO STAs (i.e., MIMO-BC).", "On the other hand, in a MU-MIMO system, the available antennas are spread over multiple independent transmitters and receivers.", "Similarly, while there exist some uplink MU-MIMO MAC protocols proposed in [145], either with the AP coordinating uplink transmission of sending STAs [124], [125] or without AP coordination [126]\u2013[128], it is still unclear which approach can be adopted for the IEEE 802.11ax standard to achieve efficient uplink multiuser transmission, while preserving backward compatibility with the IEEE 802.11 standard and its previous amendments.", "In addition, MU-MIMO is more immune to signal propagation issues that degrade the SU-MIMO performance, such as antenna correlations or channel rank loss."]} +{"11138393|9321930": ["11 MAC improvements Multiuser MAC IBFD MAC Cooperative MAC Development platforms Section III Subsection III-A Subsection III-B Subsection III-C [31], [32] [33], [34]"]} +{"11138393|1588237": ["ing cell-edge users and cell-center users, respectively [186]."]} +{"11138393|7892994": ["In general, a smaller frequency reuse factor (FRF)6 is allocated to cell-center users to improve the frequency reuse, while a larger FRF is allocated to cell-edge users, who are affected to a larger extent by inter-cell interference (ICI).", "However, static schemes may not work well for all network conditions in terms of cell load, ICI level, etc.", "Furthermore, in some SFR schemes, cell-center users are always allowed to access the minor band, provided that the transmit power level is sufficiently low, in order to prevent excessive ICI [169].", "10, PFR is sometimes referred to as FFR with full isolation, since the cell-edge users are fully isolated from ICI [187].", "For instance, information exchange among neighboring base stations can be used to minimize the ICI and guarantee a minimum data rate for the users in a cell [180], or to dynamically adjust the boundary between the cell center and cell edge in order to maximize the cell throughput [181].", "10, at the expense of allowing for additional ICI, as a result of a maximum of 1/3 B0 frequency band overlap between two neighboring celledge regions.", "In order to address the ICI and low spectral efficiency issues of SFR schemes, intelligent reuse schemes are developed, such as incremental frequency reuse (IFR) and enhanced fractional frequency reuse (EFFR) [174], [175].", "However, even by controlling the transmit power, SFR schemes cannot completely eliminate ICI.", "since the cell-edge users are fully isolated from ICI [187]."]} +{"15023432|8462498": ["A survey of MU-MIMO MAC protocols for WLANs is shown in [12], where both uplink and downlink MU-MIMO MAC proposals for WLANs are reviewed."]} diff --git a/edge/graph_209460443.jsonl b/edge/graph_209460443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5de1021c6b5896ae6dbb3f8c488eadcf695472f7 --- /dev/null +++ b/edge/graph_209460443.jsonl @@ -0,0 +1,10 @@ +{"125577726|9594629": []} +{"10978994|6681074": ["Registration is performed in two steps, namely, coarse and fine registration [6].", "An excellent survey of free-form object representation and recognition techniques can be found in [6]."]} +{"2305273|1932843": ["Previous work on Reinforcement Learning typically do not consider highdimensional perceptual inputs [48]."]} +{"54441746|8574504": ["Besides, real-time applications of this framework are limited due to the high computational cost of multi-class classifiers [5]."]} +{"128358874|83458568": []} +{"128358874|56517517": ["Graph neural network is an applicable method to process point cloud because it propagates on each node individually ignoring the input order of nodes and extracts edges to learn the information of dependency between two nodes [26]."]} +{"86747326|2088679": []} +{"106407125|21656238": ["Guo et al. [18] provided a review of semantic segmentation approaches, i.e., region-based, FCN-based and weakly supervised approaches."]} +{"106407125|9869210": ["Martin Thoma [16] presented a taxonomy of segmentation algorithms and overview of completely automatic, passive, semantic segmentation algorithms."]} +{"52955695|8574504": []} diff --git a/edge/graph_209460745.jsonl b/edge/graph_209460745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b994c5d13b21c0d17f94a4a551f50af0220cfe3a --- /dev/null +++ b/edge/graph_209460745.jsonl @@ -0,0 +1,14 @@ +{"17379833|1142636": ["Web ontology language (OWL) 1 is a well-known standard that originated from the semantic web and it is a W3C recommendation.", "Improving the users\u2019 interpretation of discovered patterns has been mainly focused in the literature on the semantic annotation for the Web [41,48]."]} +{"18165463|1314237": []} +{"18165463|15093118": ["Smartphone cameras can for example be used to aid an inertial navigation system [102], to detect or track surrounding vehicles [103], to estimate the gaze direction of drivers [104], to detect traf\ufb01c signals [105], or to detect traf\ufb01c signs [106]."]} +{"115435169|9514634": ["Paradigms found in other domains need to be investigated and transferred to smartphone-based ITS applications (Hao et al., 2017; Kang et al., 2017; Restuccia et al., 2017; Shao et al., 2015; Zamora et al., 2016).", "Paradigms found in other domains need to be investigated and transferred to smartphone-based ITS\napplications (Hao et al., 2017; Kang et al., 2017; Restuccia et al., 2017; Shao et al., 2015; Zamora et\nal., 2016)."]} +{"115435169|19705830": [", 2015), commerce (Shaikh and Karjaluoto, 2015), education (Merchant, 2012), and well-being (Morillo et al."]} +{"115435169|28756420": []} +{"21738890|3348390": ["[22] highlights context-awareness from an IoT perspective, and presents the background of IoT paradigm, context-aware essentials and their relations to sensor networks."]} +{"21738890|3202525": ["[23], [24] survey context-awareness for recommender systems to build such intelligent systems that can better predict and anticipate the needs of users, and act more efficiently in response to their behaviors."]} +{"21738890|1077083": []} +{"21738890|8909218": []} +{"21738890|2187403": []} +{"21738890|1113420": ["[18] presents a detailed explanation of context, context types along", "In this regard, many context modeling schemes have been proposed [18], [21], [27]\u2013[29]."]} +{"21738890|20905429": []} +{"1157211|14002306": ["In recent years, mobile phone data have been used for human travel pattern visualization (e.g. 25,26,27,28), mobility pattern extraction (e.g. 29,30,31,32,33,34,35, 35), route choice modeling (e.g. 37,38), traffic model calibration (e.g. 39), traffic flow estimation (e.g. 40,41) to name a few."]} diff --git a/edge/graph_209461005.jsonl b/edge/graph_209461005.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..153650e4f3a397838004e256c7f04365dd152279 --- /dev/null +++ b/edge/graph_209461005.jsonl @@ -0,0 +1,4 @@ +{"129946046|4110304": ["They are fed input and produce output, but the exact functional process for generating this output is hard to interpret even to the very scientists who generate the algorithms themselves 44 , though some progress in interpretability is being made 45,46 ."]} +{"129946046|17253721": []} +{"1389483|8372620": ["Various approaches have been proposed to make a \u201cfair\u201d binary classi\ufb01cation (Baro-cas and Selbst, 2014; Dwork et al., 2012; Feldman et al., 2015; Zliobaite, 2015)."]} +{"21670658|8372620": ["on measuring discrimination in data as well as on evaluating performance of discrimination-aware predictive models (Zliobaite, 2015; Pedreshi et al., 2008; Hajian and Domingo-Ferrer, 2013; Goh et al., 2016)."]} diff --git a/edge/graph_209470740.jsonl b/edge/graph_209470740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209489386.jsonl b/edge/graph_209489386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d38b9dc0f0042c67c1d351bad069c0cba2d3751d --- /dev/null +++ b/edge/graph_209489386.jsonl @@ -0,0 +1,46 @@ +{"113862583|1598350": []} +{"113862583|16515889": []} +{"52932598|1598350": ["including healthcare, education, transportation, manufacturing, and retail are already generating 76% of the total radio frequency identification (RFID) market demand [5].", "In the case of IIoT, context awareness can be primary [5], such as gathering context without any existing contextual information; or secondary, such as gathering context from an existing"]} +{"85499942|393948": ["be extracted for ANN and SVM methods [8], and the upperbound performances of ANN and SVM methods are defined by these handcrafted features [9]."]} +{"3434863|18599847": ["They contain complex information from real world and the dynamics are either too complex or unknown [7]."]} +{"3623821|3590989": []} +{"125567144|48359428": []} +{"125567144|38200299": []} +{"125567144|3761015": []} +{"125567144|3918777": []} +{"62593626|33286487": []} +{"52163874|18078738": []} +{"56718800|44104746": ["Machine learning has demonstrated great use in leveraging algorithms and mathematical models to gain the insight and intelligence of numerous systems, including image and video recognition, natural language and text analysis, robotics, autonomous vehicles, and others [134]\u2013[140].", "of I-IoT systems, both holistically and individually in control, networking and computing systems [135], [140]\u2013[143]."]} +{"56718800|4566470": ["Enabling big data sharing is important and the key techniques include the design trading platforms and algorithms [98], [99]."]} +{"56718800|9461213": ["industrial data [108]."]} +{"56718800|31245252": [", confidentiality, integrity, availability, identification and authentication, privacy and trust, among others) in the context of I-IoT [2].", "In the recent past, IoT has become a highly active research area, as it enables the interconnection of anything, anytime and anywhere [2], [6], [7].", "In smart manufacturing systems [1], along with other typical cyber-physical systems (CPS) like the smart grid [2], [3], modern information communication technologies (computation, control, communication, etc.", "I-IoT systems valuable targets for attackers [2], [14], [105], [121]\u2013[126].", "the merger of industrial cyber and physical systems that provide productive and efficient manufacturing and automation [2], [24]\u2013[27].", "connection of massively deployed and dispersed physical devices that can be used to monitor and control physical objects in CPS, such as a smart grid or smart transportation system, leading to a smart and connected world where vast numbers of everyday devices are interconnected [2], [28]."]} +{"56718800|15895606": []} +{"56718800|9495329": ["For instance,\nBizanis and Kuipers [73] surveyed techniques in radio access networks (RANs) and core networks (CNs).", "SDN can be further integrated with network virtualization (NV) to provide service to I-IoT [73], [74].", "For instance, Bizanis and Kuipers [73] surveyed techniques in radio access networks (RANs) and core networks (CNs)."]} +{"56718800|2332366": ["A typical SCADA system, as shown in Figure 6, consists of human machine interface (HMI), SCADA servers, remote terminal units (RTUs), sensors and actuators, and others [36]."]} +{"56718800|2623404": ["SDN, as a networking technique, can play a critical role in enabling the scalability and programmability of networks while coping with increasingly diverse and complex networking functions [67]."]} +{"56718800|49267479": []} +{"56718800|3818445": ["Examples include programming for edge computing, edge device naming in networks, and others [85], [88].", "Compared to cloud computing, edge computing can provide computing services with much better latency performance, as they are usually located close to end-devices [88], [92].", "Advancements in computing technologies enable the handling of complex and large-volume industrial data in a timely and efficient manner [85], [88]."]} +{"56718800|25929315": ["Along with the research and development of the 3rd Generation Partnership Project (3GPP) on LongTerm Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) [54], and the fifth generation wireless network (5G),\nM2M has been identified as a key technology for the future of communication.", "Term Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) [54], and the fifth generation wireless network (5G), M2M has been identified as a key technology for the future of communication.", "[54] A. Laya, L. Alonso, and J. Alonso-Zarate, \u2018\u2018Is the random access channel of LTE and LTE-A suitable for M2M communications?"]} +{"36646781|44461432": []} +{"36646781|17905276": []} +{"21674558|1489715": ["To overcome these challenges, many studies modified traditional data mining algorithms, to make them more suitable for deployment in WSNs, or suggested innovative approaches that consider the prerequisites of WSNs in the design phase [12]."]} +{"15744581|15700537": ["However, diagnosis of functional failures is more difficult compared to diagnosis in structural test, because the controllability and observability of functional test are limited, and it is very challenging to reproduce functional failures [7]."]} +{"69647367|15895606": []} +{"51909308|6556803": []} +{"51909308|5766836": []} +{"51909308|7774517": ["It is for this reason that anomaly detection algorithms in this application scenario should seek to limit the amount of communication required to perform the task [22]."]} +{"51909308|3494096": []} +{"118673774|13794961": ["AI methods will help optimise and analyse such big datasets [94, 95]."]} +{"118673774|8183369": []} +{"118673774|7329149": []} +{"118673774|1598350": []} +{"86617495|905827": []} +{"2380770|393948": ["This would make intelligent fault diagnosis methods less dependent on the prior knowledge or human labor, so that novel applications could be done faster, and more importantly, to make mechanical fault diagnosis toward real artificial intelligence [20]."]} +{"57663186|54134680": ["There are two general models: the statistical model (Xu and Tian 2015) and the neural network model (Du 2010)."]} +{"201095080|52015330": ["In the cloud-to-edge fabric, major concerns consist of the collection of sensitive data from the end-user devices and their aggregation for analytics, the protection of end-user identity during authentication and management, as well as end-user location privacy [33]."]} +{"201095080|5039874": ["Inherent data security and privacy areas in cloud-to-edge fabric include: (1) lightweight and fine-grained data encryption and sharing methods, (2) distributed access control under resource constraints and (3) preservation of data privacy among heterogeneous environments [32]."]} +{"86426678|56718800": ["In general, energy in the IoT-based industrial platforms is scavenged by different methods, such as wireless power transfer (WPT), wind turbines, vibration, etc. [1], [8]."]} +{"57377930|393948": [", methods originally developed for traditional/classical machining [17]\u2013[19]."]} +{"15886476|15700537": ["There are two scenarios that lead to the absence of observation of a syndrome."]} +{"117659476|579475": []} +{"117659476|468992": ["The principles of collective (swarm) intelligence can be applied to robotics [22]."]} diff --git a/edge/graph_209493993.jsonl b/edge/graph_209493993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86055afaa22031d696f94bae8f602be2aeb129b1 --- /dev/null +++ b/edge/graph_209493993.jsonl @@ -0,0 +1,13 @@ +{"69276340|61796894": []} +{"3215337|12161567": ["\u2026work, which we do not review in detail here\u2014including latent space models of social networks [32], embedding methods for statistical relational learning [42], manifold learning algorithms [37], and geometric deep learning [7]\u2014all of which involve representation learning with graph-structured data.", "We refer the reader to [32], [42], [37], and [7] for comprehensive overviews of these areas.", "Indeed, the literature on knowledge-graph completion\u2014where the goal is predict missing relations in knowledge graphs\u2014contains many related techniques for decoding a large number of edge types ( i.e. , relations) [42].", "A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12] and (ii) extend pairwise decoders with type-speci\ufb01c parameters [42, 52].", "More generally, link prediction is closely related to statistical relational learning [24], where a common task is to predict missing relations between entities in a knowledge graph [42].", "Adapted from [60]. edge types, the standard inner-product edge decoder ( i.e. , z i z j \u2248 A i,j ) can be replaced with a bilinear form [12, 42, 52]: where \u03c4 indexes a particular edge type and A \u03c4 is a learned parameter speci\ufb01c to edges of type \u03c4 ."]} +{"3215337|18986679": []} +{"4892614|1479507": ["Detailed survey on network embedding (NE) or Network Representation Learning (NRL) can be found in [9] or [31]."]} +{"2452205|207372751": [", 2014] and link prediction [L\u00fc and Zhou, 2011].", "In recent years, researchers have extensively studied on many important machine learning applications in networks, such as vertex classification [Sen et al., 2008], tag recommendation [Tu et al., 2014], anomaly detection [Bhuyan et al., 2014] and link prediction [L\u00fc and Zhou, 2011]."]} +{"3866630|393948": ["Such methods cannot be applied to large graphs, as they operate on dense matrices.", "It is visible that the nonlinear minimization of KL divergence between distributions preserves most of the information in the original matrix, while the linear SVD-based reconstruction fails to differentiate some nodes."]} +{"3866630|207372751": ["Besides, the hyperparameter-supervised hsVERSE variant outruns Node2vec on all datasets.", "Then, we optimize our objective (Equation 4) by gradient descent using the NCE algorithm discussed in the previous section."]} +{"3866630|11608263": ["Besides, the hyperparameter-supervised hsVERSE variant outruns Node2vec on all datasets."]} +{"35493|393948": ["We use the LINE model to learn unsupervised embeddings with the word-word network, word-document network or the combination of the two networks."]} +{"13659997|393948": ["Many methods have been proposed to improve the generalization of autoencoders for tasks like image and speech recognition [31]."]} +{"13659997|207372751": ["Many tasks can be defined on such networks including visualization [3], [11], link prediction [12], [13], virtualization [14], [15], and node clustering [16], [17], and classification [18], [19]."]} +{"13659997|6116234": ["NETWORKS exist in various forms in the real world including author collaboration [1], [2], social [3], [4], router communication [5], [6], biological interactions [7], [8], and word cooccurrence networks [9], [10]."]} +{"3657626|13370607": []} diff --git a/edge/graph_209495776.jsonl b/edge/graph_209495776.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df3ef66287e812b77a7883ba48c37774e372dde7 --- /dev/null +++ b/edge/graph_209495776.jsonl @@ -0,0 +1,22 @@ +{"52140652|3348390": []} +{"13692664|6332923": ["Therefore, it is necessary to develop an efficient model to ensure the security and integrity of the patient\u2019s diagnostic data transmitted and received from IoT environment [2]\u2013[8]."]} +{"30547822|14382980": []} +{"199509120|55729907": ["The explosion of interest and research in recent years has inspired a lot of progress in the field, but the general field is still nascent [80], [85]."]} +{"199509120|21386749": ["Advances in technology have led to a new paradigm called the Internet of Things [1], [2]."]} +{"199509120|6332923": ["For example, [3] summarizes the American Health Insurance Portability and Accountability Act (HIPAA), which has the following requirements: 1) provide protection against any infringements of security, confidentiality, and integrity, if they occur, 2) provide protection against unauthorized access to or usage of patient health information, 3) establish systems that require user identities (i.", "Smart devices use secure Internet Protocols (IPs) to transfer complex data [3]."]} +{"6332923|1940388": ["So far, numerous of routing protocols have been proposed for sensor networks, but none of them have been designed with strong security as a goal [59,86].", "In [86,87] the authors argue that mobility supported secure localization protocols still need to be explored."]} +{"6332923|17205659": ["In forward secrecy, a medical sensor cannot read future messages transmitted after it leaves the network, while in backward secrecy a sensor joining the network cannot read any previously transmitted messages [93].", "In [56,93] the authors did not consider public key authentication."]} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"4809836|21717841": ["In addition, most free wireless networks in public place, which have not been certified, are untrusted networks [31]."]} +{"24845856|206583375": []} +{"44129345|61239939": ["In the real world, no such biometric system or technology currently exists (Buciu and Gacsadi, 2016)."]} +{"3279960|16781041": ["This is along with the introduction and use of popular social media applications for e-Healthcare social networking [65]."]} +{"3279960|6332923": ["), but threat perception and mitigation is IoT-centric and thus needs specific understanding and handling [20]."]} +{"3279960|12604503": ["from sensors to cloud storage andmandates a vigilant security mechanism to protect it from all threats [19]."]} +{"182277704|3818445": ["Therefore, edge computing is widely used in IoT [18], [19]."]} +{"208127341|21386749": []} +{"1954458|6332923": ["Besides, it also greatly improves aged peoples quality of life."]} +{"11472225|7988320": ["Access to medical devices is a common problem that limits researchers\u2019 ability to validate prior results; food-grade meat as a phantom also complicates reproducibility due to its inaccurate approximation of a human body [8], [21]."]} +{"11472225|6332923": ["The system should also satisfy data origin authentication; the source of any received data should be verifiable."]} +{"59621792|21386749": []} +{"26827903|6332923": [", medicine overdose) [19]."]} diff --git a/edge/graph_209496648.jsonl b/edge/graph_209496648.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..294352bd47e98ce035524ad5bdfe4658980ec8b8 --- /dev/null +++ b/edge/graph_209496648.jsonl @@ -0,0 +1,4 @@ +{"62314095|16096875": []} +{"44179729|16096875": []} +{"6434021|206778480": ["While hundreds of defect prediction studies have been published, including multiple systematic literature reviews [5], using a wide range of software metrics and predictive modeling techniques, only a few dozen vulnerability prediction studies have been published."]} +{"15762469|16096875": []} diff --git a/edge/graph_209497267.jsonl b/edge/graph_209497267.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5c3f21f14d1be09b30780c0927c10112f790639 --- /dev/null +++ b/edge/graph_209497267.jsonl @@ -0,0 +1,4 @@ +{"10705249|2616070": []} +{"205397264|15744805": ["\u2026Zhang *, Minghong Pi Centre for Intelligent Mining Systems, University of Alberta, Edmonton, Alta., Canada T6G 2E8\na r t i c l e i n f o a b s t r a c t\nArticle history: Received 7 August 2006 Received in revised form 14 July 2008 Accepted 18 September 2008\nKeywords: Image segmentation\u2026"]} +{"14914367|191396": ["achieve because of noise and outliers in real-world data, various approaches have been attempted [32, 25]."]} +{"20382199|393948": ["These deep architectures have been shown to lead to state-of-the-art results on a number of classification and regression problems [24].", "As a form of neural network, the classical autoencoder [24] is an unsupervised learning algorithm that applies backpropagation and sets the target values of the network outputs to be equal to the inputs.", "According to [24] and [25], x\u0303i = q D(x\u0303i|xi) is implemented by randomly selecting a fraction (10% in this paper) of the input data and forcing them to be zero."]} diff --git a/edge/graph_209497298.jsonl b/edge/graph_209497298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0f41021ea9d9fe4b2edad371ed3df644e768cef --- /dev/null +++ b/edge/graph_209497298.jsonl @@ -0,0 +1,51 @@ +{"10050878|5724477": []} +{"28717563|28210515": ["Experimental results [17]\u2013[19] have demonstrated that Wi-Fi networks and WSNs may function together even if they operate in the same frequency band."]} +{"28717563|4631990": []} +{"54602508|393948": ["Different from the traditional hand-crafted features [5], [6], [7], a multi-layer neural network architecture can ef\ufb01-ciently capture sophisticated hierarchies describing the raw H. Li is with the School of Computer and Information Engineering, Jiangxi Normal University, Jiangxi, China."]} +{"116863260|50776107": []} +{"116863260|57762290": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"206592484|456491": []} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"53022704|4570697": ["Current social robots focus on four major applications: health care and treatment, education, public and work environment, and home environment [17] [18] [19]."]} +{"86768862|57825759": ["Among the available localization approaches, acousticbased localization methods attract much attention due to the advancement in acoustic sensing [17]\u2013[23]."]} +{"86768862|4570697": ["Over decades of innovative research, there have been many available approaches [11]\u2013[16].", "Although the existing solutions have achieved high accurate localization accuracy, yet they either require dedicated devices [12]\u2013[14] or cumbersome device-dependent kernel hacking [11], [15], [16]."]} +{"71152819|4915696": ["thus can be easily detected by applying anomaly [31], [38]"]} +{"2098713|206583375": ["There has been considerable literature on indoor localization 802 [18]."]} +{"49557547|29859741": ["[79] review and discuss the usage of fog computing in healthcare."]} +{"49557547|1353379": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|3757239": ["A detailed discussion on the mobile edge can be found in [48]."]} +{"49557547|4427557": ["Other standards proposed by various researchers can be found in [62], [65], and [66].", "These features make LPWAN a suitable candidate for a large number of healthcare applications that do not require significant data rate and low latency [65]."]} +{"49557547|86629084": []} +{"49557547|21386749": ["A survey on the use of IoT for healthcare can be found in [70]."]} +{"49557547|62658395": ["Advancements in Information and Communication Technologies (ICT) such as cloud computing [2], [3], Internet of Things (IoT) [4], [5], wireless communications (WSN, WBAN) [6], [7], big data [8], [9], robotics [10], [11], and artificial intelligence [12]\u2013[14], have played a major role in changing the healthcare landscape."]} +{"49557547|393948": ["A thorough discussion of deep learning is covered in [50]\u2013[52]."]} +{"49557547|13172512": ["DEEP LEARNING NETWORK TRAFFIC CLASSIFICATION (DLNTC) COMPONENT Traffic classification is fundamental for any network, especially mobile cloud networks for determining anomalies, for traffic prioritization over a limited bandwidth, to ensure Quality of Service (QoS) [128], [129]."]} +{"2380770|393948": ["This would make intelligent fault diagnosis methods less dependent on the prior knowledge or human labor, so that novel applications could be done faster, and more importantly, to make mechanical fault diagnosis toward real artificial intelligence [20]."]} +{"64534454|393948": []} +{"13072941|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment (Bohg et al., 2014)."]} +{"52197351|6909107": ["Communication latency can be reduced and the data amount transmitted to the cloud can be decreased with the development of edge computing [8, 9]."]} +{"117248575|18188725": []} +{"117248575|8516210": []} +{"117248575|17403085": []} +{"5039759|46764901": ["The corresponding applications are: health monitor- 239 ing, smart healthcare, smart home, smart city and emotional 240 care [27]\u2013[29]."]} +{"16795386|1230643": []} +{"4570697|2357830": ["Systems that leverage biometric signatures [58] or user-owned RFID tag [59] are well-known technologies."]} +{"2740197|393948": ["Conventional techniques are composed of a single, often linear, transformation of the input space and are limited in their ability to process natural data in their raw form [21].", "AEs are mostly used for representation learning [21] and are often regularized by adding noise to the original data (i.", "Alternatively, representation learning methods allow to automatically discover the representations needed for prediction from the raw data [21, 22]."]} +{"2740197|15669036": ["work called \u2018differential privacy\u2019 [109, 110] to ensure the indistin-"]} +{"196000386|6909107": ["The authors in [23] propose a Lyapunov optimization-based dynamic computation offloading algorithm to jointly decide the offloading decision, the CPU-cycle frequencies for mobile execution, and the transmit power for computation offloading.", "The authors in [23] survey the existing concepts integrating edge computing functionalities to the mobile networks and discuss the latest advancement in the standardization of edge computing.", "The authors in [23], [24], [25] investigate the computation off-"]} +{"70032223|3913780": ["to the total times of requests from UEs, and it follows the Zipf distribution [33]."]} +{"70032223|393948": ["for feature learning or representation learning [27]."]} +{"205972327|3304959": ["Its successful applications in business [1], sciences and healthcare [2] have radically changed their traditional practices."]} +{"67790690|16319937": []} +{"148572748|16319937": ["The routing problem for VDC can be categorized as variations of the traveling salesman problem (TSP) [20] and vehicle routing problem (VRP) [21]."]} diff --git a/edge/graph_209497306.jsonl b/edge/graph_209497306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60bc0861e6d78d5448109b4eacac9513b54fa726 --- /dev/null +++ b/edge/graph_209497306.jsonl @@ -0,0 +1,8 @@ +{"59413227|36698883": []} +{"30689362|1708582": ["Reinforcement learning was first surveyed from a computer science perspective in [53].", "In addition, reinforcement learning has been studied and utilized in many fields such as machine learning and artificial intelligence [53]\u2013[55]."]} +{"58014237|201139709": ["These adverse effects reduce visibility, decrease contrast, and even introduce color casts, which limit the practical applications of underwater images and videos in marine biology and archaeology [8], marine ecological [9], to name a few [10]."]} +{"58014237|197545095": ["Therefore, the performance and the amount of deep learning-based underwater image enhancement methods do not match the success of recent deep learning-based low-level vision problems [50]."]} +{"58014237|126180710": []} +{"53215001|197545095": ["This can also explain the relative unsuccess of learning-based techniques in this field [52].", "A recent thorough review [52] found that our method outperforms deep-learning methods and therefore we excluded comparison to them."]} +{"127638530|9010313": ["Although many scholars proposed to use polarization filters to reduce or eliminate sunlight reflection [7], [8], [13]\u2013[17] received by infrared sensors, this kind of methods can only be implemented in specific imaging angles.", "Since the sun glitter contamination appears only when the imaging angle is in a certain range [7], the seriously uneven image intensity distribution could be a common phenomenon", "Although the IRST system has excellent environment adaptability [6], its performance is still seriously limited when working in strong sun glitters, the diffuse reflection of sunlight from wave surfaces [7]."]} +{"5620858|3540699": []} diff --git a/edge/graph_209500440.jsonl b/edge/graph_209500440.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4325b38c32a9af07d76ab06112c8d338aebc33a --- /dev/null +++ b/edge/graph_209500440.jsonl @@ -0,0 +1,26 @@ +{"21657320|15093118": ["A comprehensive survey of maneuver-based models can be found in [1], [6]."]} +{"10405949|15093118": ["Since such driving behaviors as lane changing and overtaking have been studied in [7], [60], Fig.", "There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections.", "Radar technology usually is mounted on poles or embedded in vehicles to detect surrounding vehicles [7] and pedestrians [4]."]} +{"10405949|206764452": ["There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections."]} +{"10405949|5755403": ["This includes measuring and learning vehicle kinematics, dynamics , and making predictions [50]."]} +{"10405949|1029120": ["There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections.", "A variety of sensors have been used for vehicle and pedestrian detection at intersections [4], including global positioning systems (GPS), light detection and ranging (LIDAR), radar and cameras.", "Radar technology usually is mounted on poles or embedded in vehicles to detect surrounding vehicles [7] and pedestrians [4]."]} +{"115758427|4861446": ["A more comprehensive report on current sensors for AV applications can be found in [15] and [16]."]} +{"115758427|15093118": ["Such configuration uses matching algorithms to find correspondences in both images and calculate the depth of each point relative to the camera, demanding more processing power [18]."]} +{"15178364|206764452": ["Recent reviews on human behavior understanding focused on specific aspects of the overall problem, such as monocular pedestrian detection [11], human detection for driver-assistance systems [12], and pedestrian detection benchmarks [13], [14].", "Algorithms based on appearance features are specialized detectors trained on large pedestrian databases [11], [12]."]} +{"15178364|1634674": ["[20], [128], [129], which represent the human body in terms", "Note that this definition differs from that of [20], which made no distinctions between activities and interactions.", "From these atomic elements, it is possible to compose actions, namely, temporal concatenations of gestures [20]."]} +{"15178364|5755403": ["Morris and Trivedi [15] surveyed features and model motion trajectories focusing on trajectory analysis."]} +{"15178364|5401262": ["The interest in behavior understanding has dramatically increased in recent years, motivated by societal needs that include security [1], natural interfaces [2], gaming [3], affective computing [4], and assisted living [5]."]} +{"155093065|51880898": ["We extend existing reviews of the benchmarking and evaluation efforts for motion prediction (Poiesi and Cavallaro 2015; Hirakawa et al. 2018; Ridel et al. 2018; Quehl et al. 2017) with additional datasets, probabilistic and robustness metrics, and a principled analysis of existing benchmarking\u2026", "Poiesi and Cavallaro (2015) and Hirakawa et al. (2018) describe several datasets of human trajectories in crowded scenarios, used to study social interactions and evaluate path prediction algorithms.", "Hirakawa et al. (2018) survey video-based methods for semantic feature extraction and human trajectory prediction.", "Related to our discussion of the benchmarking practices, several works survey the datasets of motion trajectories (Poiesi and Cavallaro 2015; Hirakawa et al. 2018; Ridel et al. 2018) and metrics for prediction evaluation (Quehl et al. 2017)."]} +{"155093065|44096871": ["Apart from the contextual cues, discussed in this survey, there are many other factors influencing pedestrian motion, according to the recent studies (Rasouli and Tsotsos 2019), e."]} +{"155093065|5755403": ["In addition to the metrics considered in (Morris and Trivedi 2008; Quehl et al. 2017), relevant metrics used in the reviewed literature include the Quaternionbased Rotationally Invariant LCS (QRLCS), which is the rotationally invariant counterpart of LCS (Hermes et al.", "In addition to the metrics considered in (Morris and Trivedi 2008; Quehl et al. 2017), relevant metrics used in the reviewed literature include the Quaternion-based Rotationally Invariant LCS (QRLCS), which is the rotationally invariant counterpart of LCS (Hermes et al. 2009), and two measures that\u2026", "Several surveys have considered the topic of trajectory analysis and comparison (Zhang et al. 2006; Morris and Trivedi 2008; Zheng 2015; Quehl et al. 2017; Pan et al. 2016) where, based on the previous ones, only the recent survey by Quehl et al. (2017) speci\ufb01cally considers similarity measures for\u2026", "Several surveys have considered the topic of trajectory analysis and comparison (Zhang et al. 2006; Morris and Trivedi 2008; Zheng 2015; Quehl et al. 2017; Pan et al. 2016) where, based on the previous ones, only the recent survey by Quehl et al.", "Summarizing (Morris and Trivedi 2008; Quehl et al. 2017), we consider eight metrics: Mean Euclidean Distance (MED), also called Average Displacement Error (ADE), averages Euclidean distances between points of the predicted trajectory and the ground truth that have the same temporal distance from their respective start points.", "Morris and Trivedi (2008) survey methods for trajectory learning and analysis for visual surveillance.", "Summarizing (Morris and Trivedi 2008; Quehl et al. 2017), we consider eight metrics: Mean Euclidean Distance (MED), also called Average Displacement Error (ADE), averages Euclidean distances between points of the predicted trajectory and the ground truth that have the same temporal distance from\u2026", "2018), and computer vision (Morris and Trivedi 2008; Murino et al. 2017; Hirakawa et al. 2018).", "2006; Morris and Trivedi 2008; Zheng 2015; Quehl et al. 2017; Pan et al. 2016) where, based on the previous ones, only the recent survey by Quehl et al. (2017) specifically considers geometric similarity measures for trajectory prediction evaluation."]} +{"206852927|18599847": ["are challenging for machine learning [8], but well-studied by the sensor fusion community [9], [10].", "For this, the algorithm uses advanced sensor fusion techniques regarding latency and variance in time domain which are hard to compensate by learning based approaches [8]."]} +{"9854676|5755403": []} +{"59222833|5293125": ["Algorithms used for spatio-temporal point detections and their applications in vision domain have been covered in [101]."]} +{"59222833|1828831": ["Speci\ufb01c anomaly detection techniques are used for detecting anomalies using anomaly scoring or labeling mechanism. been conducted focusing on data acquisition [175], feature extraction [80, 164], scene learning [14, 36, 67, 124], activity learning [181], behavioral understanding [15, 162], etc."]} +{"59222833|15093118": ["Speci\ufb01c anomaly detection techniques are used for detecting anomalies using anomaly scoring or labeling mechanism. been conducted focusing on data acquisition [175], feature extraction [80, 164], scene learning [14, 36, 67, 124], activity learning [181], behavioral understanding [15, 162], etc.", "With the availability of video feeds from public places, there has been a surge in the research outputs on video analysis and anomaly detection [115, 158, 162, 164].", "In [162], an object oriented approach from the perspective of vehicle mounted sensors for object detection, tracking and behavior analysis detailing the progress of the last decade of works, has been presented."]} +{"59222833|15178364": ["Authors of [25] present the researches on human behavioral understanding through actions and interactions of human entities.", "Borges(2013)[25] Human behavior analysis Human detection methods: Appearance, motion and hybrid approaches; Action recognition approaches: Low-level and spatio-temporal interest points, mid and high-level, silhouettes features; Interaction recognition: One-to-one, group interactions, models;\u2026"]} +{"59222833|13287576": ["Once the normal patterns are learned, anomalies can be detected with the help of established approaches [97, 137]."]} +{"59222833|7361943": ["The research presented in [144] discusses safety, security and law enforcement related applications from the computer vision perspective."]} +{"59222833|5058720": ["Au-thors of [171] discuss events, which are considered as a subset of anomalous events, requiring immediate attention, occuring unintentionally, abruptly and unexpectedly."]} +{"59222833|5755403": ["Speci\ufb01c anomaly detection techniques are used for detecting anomalies using anomaly scoring or labeling mechanism. been conducted focusing on data acquisition [175], feature extraction [80, 164], scene learning [14, 36, 67, 124], activity learning [181], behavioral understanding [15, 162], etc.", "Authors of [124] have explored object detection, tracking, scene modeling and activity analysis using video trajectories."]} +{"17964596|17485266": ["[89] provides a good overview of these various methods with equations and notes a few other concerns when performing stochastic optimization."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_209500540.jsonl b/edge/graph_209500540.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d06dcb4525975450911b30b8d092773c07741282 --- /dev/null +++ b/edge/graph_209500540.jsonl @@ -0,0 +1,2 @@ +{"201059507|7158350": ["This technique reduces the dimension of the data set without losing any of the intrinsic information provided by the data set (Zhang, 2000)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_209500765.jsonl b/edge/graph_209500765.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51c73b203b341d7470d4e3bab8113cb80edeb472 --- /dev/null +++ b/edge/graph_209500765.jsonl @@ -0,0 +1,6 @@ +{"20059796|11746788": ["It is attractive to develop methods that are capable of deeper image understanding by answering open-domain questions [28], which requires the system to have the mechanisms in connecting VQA with structured knowledge, as is shown in Fig.", "The recent availability of large training datasets [28] makes it feasible to train a complex model in an end-to-end fashion by leveraging the recent advances in deep neural networks (DNN) [2, 9, 34, 17, 1].", "However, most of questions in the current VQA dataset are quite simple, which are answerable by analyzing the question and image alone [2, 28].", "Compared with the alternative dataset, Visual7W has a diverse type of question-answer and image content [28], which provides more opportunities to assess the human-level capability of a system on the open-domain VQA."]} +{"59413789|393948": ["The discovery of underlying explanatory variables has come under different names, in particular the notion of disentangling underlying variables (Bengio et al., 2013; Locatello et al., 2019), and studied in the causal setting (Chalupka et al.", "The discovery of underlying explanatory variables has come under di\ufb00erent names, in particular the notion of disentangling underlying variables (Bengio et al., 2013).", "To tackle this, we propose to follow the deep learning objective of disentangling the underlying causal variables (Bengio et al., 2013), and learn a representation in which these properties hold.", "As stated already by Bengio et al. (2013) and clearly demonstrated by Locatello et al. (2018), assumptions, priors or biases are necessary to identify the underlying explanatory For the former, we obtain \u03b8 = 0 corresponding to the correct causal graph U \u2192 V ; and for the latter, \u03b8 = \u03c0 2 ,\u2026", "To tackle this, we propose to follow the deep learning objective of disentangling the underlying causal variables (Bengio et al., 2013), and learn a representation in which the variables can be meaningfully be cause or effect for each other."]} +{"3726684|1634674": ["This is a major advantage due to the fact the system can be more adaptable and flexible than classic approaches [5].", "[5], where they suggested the semantics of human activities requires higher level representations and reasoning methods.", "Semantics refer to the study of meaning and several methods have been used to define semantics in the domain of human behavior such as linguistic descriptions [6,17], syntactic approaches [5,10], and graphical models [13,22]."]} +{"123321|393948": ["\u2026from the traditional hand-crafted features, a multi-layer neural network architecture ef\ufb01ciently captures sophisticated hierarchies describing the raw data [1], which has shown superior performance on standard scene recognition [51], object recognition [15] and image captioning [21] benchmarks."]} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"10559817|6627566": ["Exploiting hierarchical structure of object categories has a long history [34]."]} diff --git a/edge/graph_209501128.jsonl b/edge/graph_209501128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f4d586e28ab0dc305dc213687f087fe7eedf1be --- /dev/null +++ b/edge/graph_209501128.jsonl @@ -0,0 +1,38 @@ +{"73728733|56517517": [" we are already given a trained model in the GNN-family and aim to explain its predictions. 3 BACKGROUND General Formulation of GNNs. A per-layer update of a GNN model involves three key computations [6, 50, 51]: ml ij = Msg(hl\u22121 i ,h l\u22121 j ,rij) (1) Ml i = Agg({ml ij |vj \u2208Nv i }) (2) hl i = Update(Mli,hl\u22121 i ) (3) First, the model computes neural messages between every pair of nodes (Equation 1). The messag", "elies on for computing zi is completely determined byvi\u2019s computation graph, which is defined by Equation 2. The GNN uses that computation graph to generate vi\u2019s representation zi (Equations 1 and 3) [50, 51]. Importantly, the structure of the computation graph is different for each nodevi, and depends on how the neighborhood Nv i is defined. LetGc(vi) denote the computation graph used by the GNN to compu", "t are crucial for prediction. graph [11, 47, 54]. Machine learning over graph data is challenging because it requires modeling node attribute information as well as the graph\u2019s structural information [50, 51]. Graph Neural Networks (GNNs) provide a powerful tool for machine learning on graphs, thanks to their ability to recursively incorporate information/messages from neighboring nodes in the network, na", "fied into a general Neural Message-Passing scheme [19], and more recently into the relational inductive bias model [6]. For a more detailed review of recent developments we please refer the reader to [6, 21, 50, 51]. Under this model, GNNs have achieved state-of-the-art performance across a variety of tasks, such as node classification [22, 27], link prediction [36, 49], graph clustering [14, 46] or graph classi"]} +{"73728733|52965836": ["Instead of creating new, inherently interpretable models, thse approaches consider the model as a black box [1, 20] and then probe it for relevant information."]} +{"73728733|3342225": ["Instead of creating new, inherently interpretable models, thse approaches consider the model as a black box [1, 20] and then probe it for relevant information."]} +{"3951790|207372751": ["Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention (Liben-Nowell and Kleinberg 2007; Lu\u0308 and Zhou 2011).", "Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention [7], [82]."]} +{"3951790|239537": ["\u2026and analysis tasks such as node classi\ufb01cation (Sen et al. 2008; Perozzi, Al-Rfou, and Skiena 2014), node clustering (Wang et al. 2017b), network visualization (Herman, Melanc\u00b8on, and Marshall 2000; Wang, Cui, and Zhu 2016) and link prediction (Liben-Nowell and K-leinberg 2007; Ou et al. 2016).", "Network embedding, as a promising way of network representation, is capable of supporting subsequent network processing and analysis tasks such as node classification [2], [3], node clustering [4], network visualization [5], [6] and link prediction [7], [8]."]} +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"207238980|393948": []} +{"207238980|11608263": ["In a typical node classification task, we are interested in predicting the most probable labels of nodes in a network [33]."]} +{"207853307|56517517": ["Although GCN has been shown to be effective for network representation learning [14], there are some challenges that we need to address when using it to learn"]} +{"207853307|207730550": ["Brain network analysis has been an emerging research area, as it yields new insights concerning the understanding of brain function and many neurological disorders [32]."]} +{"173188615|59600034": ["For insight on such grouping refer to (Gilpin et al., 2018) (2)as described in the authors\u2019 rebuttal: (NIPS reviews, 2015) edges E = {ek}, nodes V = {vi} and graph-level u."]} +{"13741853|14414383": ["and dynamic mixed-membership role models [22, 59], anomaly detection in dynamic networks [55], influence modeling and online advertisement [24], finding important entities in dynamic networks [23, 49] temporal network centrality and measures [29]."]} +{"13741853|44843617": [", every second/millisecond) [2, 3, 5, 27] and therefore can be used for a variety of applications requring real-time performance [6, 12, 53]."]} +{"1479507|3951790": ["Recently, [24], [25] extend to cover work leveraging other side information, such as vertex attributes and/or vertex labels, to harness representation learning."]} +{"1479507|207372751": ["theway for awide range of network analytic tasks to be easily and efficiently tackled in the new vector space, such as node classification [10], [11], link prediction [12], [13], clustering [2], recommendation [14], [15], similarity search [16], and visualization [17].", "Readers can refer to the survey papers [12], [73] for the recent progress in this field."]} +{"1479507|239537": ["[80] surveys a range of methods used to visualize graphs from an information visualization perspective."]} +{"53691235|44843617": [", every second/millisecond) [21], [22], [23], [24] and therefore can be used for a variety of applications requring real-time performance [25], [26], [27]."]} +{"135463287|118649017": []} +{"202547413|29756857": [", how much effort has to be invested to break obfuscation) since it requires to quantify a human reverse engineer which is challenging and still unsolved so far [34]."]} +{"90263007|56517517": ["Many variants of GNN have been developed since [34], which is comprehensively discussed in [48]."]} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"86450923|3951790": ["entations are learned independently between graphs, which makes them generally unsuitable for graph similarity computations. For more information on this area, we recommend recent surveys in the area [14, 18]. Unlike these methods, our goal is to learn representations of graphs, not of nodes. Graph statistics: Finally, another family of unsupervised graph similarity measures define a hand-engineered featu"]} +{"49475306|7761990": []} +{"3866630|393948": ["Such methods cannot be applied to large graphs, as they operate on dense matrices.", "It is visible that the nonlinear minimization of KL divergence between distributions preserves most of the information in the original matrix, while the linear SVD-based reconstruction fails to differentiate some nodes."]} +{"3866630|207372751": ["Besides, the hyperparameter-supervised hsVERSE variant outruns Node2vec on all datasets.", "Then, we optimize our objective (Equation 4) by gradient descent using the NCE algorithm discussed in the previous section."]} +{"3866630|11608263": ["Besides, the hyperparameter-supervised hsVERSE variant outruns Node2vec on all datasets."]} +{"207759094|207730550": ["Brain network analysis has been an emerging research area[31]."]} +{"54526291|3951790": ["Furthermore, [11] discusses the differences between the traditional graph embedding and the recent network embedding methods."]} +{"201645182|1479507": []} +{"201645182|14414383": []} +{"14106275|14545307": []} +{"213095523|12161567": [", 2019), and many others (Santoro et al., 2017b; Nickel et al., 2015)."]} +{"14571424|18782652": ["1) Relational Feature Classes Graph features (V;E) [33], [93] Relational link-value features (X; V; E) [84] Relational node-value features (X; V; E) [30] Non-relational features (X) [35], [94]"]} diff --git a/edge/graph_209501181.jsonl b/edge/graph_209501181.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d1876c08255a9a6c1fccc4a84fa7b1b11244c59 --- /dev/null +++ b/edge/graph_209501181.jsonl @@ -0,0 +1,38 @@ +{"106406155|16428983": ["Work on scene flow estimation with other input formats (stereo [19], RGBD [20], light field [27]) is less related, and we refer to Yan and Xiang [45] for a survey."]} +{"206767722|8601873": ["[89], [90], [91], but adapted to our weakly supervised scenario using a formulation (given by Equation (5)) similar to multiple instance learning [92], [93], [94]."]} +{"206592484|456491": []} +{"195218586|21656238": ["Recent surveys can be found in [13,16]."]} +{"195218586|8574504": ["Recent surveys can be found in [13,16]."]} +{"16387148|4351505": []} +{"16387148|9928823": ["Deep Belief Networks (DBNs) are probabilistic generative models consisting of multiple layers of stochastic hidden variables [Deng 2014].", "In Deng [2014], several DL techniques were presented and a categorization of them into three classes, namely, discriminative, generative, and hybrid, was provided.", "These methods can be divided into two general categories based on how they are used [Deng 2014]: (1) discriminative and (2) generative.", "Recently, a few review papers have also become available [Deng 2014; LeCun et al. 2015; Guo et al. 2016b; Schmidhuber 2015]."]} +{"16387148|13946824": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"16387148|987239": ["Several surveys on 3D object retrieval are available [Bustos et al. 2007; Tangelder and Veltkamp 2007; Liu 2012]."]} +{"102353690|9959529": [", video classification [1], 3D object recognition [26, 2] and MRI volume segmentation [27, 3]."]} +{"56482426|207023804": []} +{"52815788|7559976": ["Recent UDA methods have focused on transferring deep neural network representations [13], [14]."]} +{"51930309|18889901": ["3D data representations, but not all of them [25], [26], [27], [28]."]} +{"51930309|987239": ["Initially, researchers made use of the already established developments in the feature extraction algorithms [68], [69] to extract features from 3D data.", "Although multiple handcrafted low-level descriptors were proposed in the literature [68], [69], they suffer from several significant limitations, as they cannot learn the discriminative features from 3D shapes."]} +{"69729584|6988770": ["In recent years, the analysis of point clouds has gained much attention due to its wide application in real world problems such as autonomous driving (Chen et al. 2017), robotics (Kehoe et al. 2015), and navigation (Liu 2016).", "2017), robotics (Kehoe et al. 2015), and navigation (Liu 2016)."]} +{"52955695|8574504": []} +{"691081|192934": []} +{"8063966|8983048": ["Two reviews on 3D modeling and range image registration by [30] and [31] are also worth mentioning.", "Moreover, computing the intersection of a sphere with the surface is not easy, especially when the surface is represented as a point cloud or a mesh [30]."]} +{"8063966|6681074": []} +{"102354012|5902682": ["ally operate on graphs or meshes for surface analysis. However, building a mesh from raw point clouds is a very dif\ufb01cult task and requires in practice priors regarding the surface to be reconstructed [8]. A fourth class of machine learning approaches processes directly the raw point clouds; the method proposed in this paper belongs to this category. One of the recent breakthroughs in dealing with uns"]} +{"21386240|9594629": ["As can be seen on Table III, the least relevant information set for our detection and classification architecture corresponds to intensity values acquired by the LiDAR, as it might be expected due to many factors affecting reflectance measurements [22]."]} +{"201645228|56517517": ["As SPG [2], DGCNN [3], RGCNN [191] and GAC [112] employed graph structures in neural networks, they can also be regarded as Graph Neural Networks (GNNs) in 3D [193], [194].", "4) PCSS with GNNs: GNN is becoming increasingly popular in 2D image processing [193], [194]."]} +{"52177403|56517517": ["Given this time of tremendously rapid evolution, there exist many recent survey papers on deep learning [13, 86, 89, 145, 166, 212, 280, 290, 305, 312, 317].", "These surveys reviewed deep learning techniques from different perspectives [13, 86, 89, 145, 212, 280, 312], or with applic tion to medic l image anal sis [166], natural language processing [290], speech recognition systems [305], and remote sensing [317]."]} +{"52177403|53109768": []} +{"52177403|21955893": []} +{"52177403|2088679": []} +{"52177403|207060556": ["A Survey on Face Detection in the Wild: Past, Present and Future [301] 2015 CVIU 2000 \u5e74\u4ee5\u964d\u306e \u201cin the wild\u201d(\u975e\u5236\u7d04\u74b0\u5883,\u5b9f\u74b0\u5883)\u9854\u691c\u51fa\u306e\u30b5\u30fc\u30d9\u30a4", "\u6b69\u884c\u8005\u691c\u51fa [66, 79, 59],\u9854\u691c \u51fa [294, 301],\u8eca\u4e21\u691c\u51fa [258],\u30c6\u30ad\u30b9\u30c8\u691c\u51fa [295] \u306a\u3069,\u7279 \u5b9a\u7269\u4f53\u691c\u51fa\u554f\u984c\u306b\u95a2\u3059\u308b\u512a\u308c\u305f\u8abf\u67fb\u304c\u591a\u6570\u884c\u308f\u308c\u3066\u304d\u305f."]} +{"52177403|5729190": []} +{"52177403|1223851": ["15 Salient Object Detection: A Survey [19] 2014 arXiv A survey for salient object detection"]} +{"52177403|393948": []} +{"52177403|206764452": []} +{"52177403|9045232": []} +{"67877141|987239": ["Several works focus on \ufb01nding ef\ufb01cient geometric representations [52] such as occupancy grids and TSDF cubes."]} +{"204788552|206491647": ["Deep clustering [4, 44, 86, 28, 83, 22, 61, 87, 29] models are recently proposed to learn clusterfriendly features by jointly optimizing a clustering loss with a network-specific loss."]} +{"128358874|83458568": []} +{"128358874|56517517": ["Graph neural network is an applicable method to process point cloud because it propagates on each node individually ignoring the input order of nodes and extracts edges to learn the information of dependency between two nodes [26]."]} +{"4412075|5902682": ["One important family of bases are the Radial Basis Functions (RBF), that were proven to be useful for surface representation [Berger et al. 2017; Carr et al. 2001]."]} +{"208290898|209501181": ["Recent learning based approaches [16, 43, 37] mainly include projection-based, voxel-based and pointbased schemes which are outlined here."]} diff --git a/edge/graph_209515601.jsonl b/edge/graph_209515601.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13948e252fcc7179c1b3bba5c7db531b8fd434a6 --- /dev/null +++ b/edge/graph_209515601.jsonl @@ -0,0 +1,137 @@ +{"67864523|3055684": ["In recent years, energy harvesting (EH) has been recognized as a promising technique that may significantly increase the network lifetime in Internet of Things (IoT) applications and help reduce the greenhouse gas emissions in general wireless applications [1] [2]."]} +{"49863597|3055684": ["Scheduling for energy harvesting systems has been considered in offline and online settings in recent research; see recent survey articles on scheduling approaches [1], [2]."]} +{"20634644|206578365": ["With limited computation, energy and memory resources, Internet of Things (IoT) devices such as sensors, cameras and wearable devices have a computation bottleneck to limit the support for advanced applications such as interactive online gaming and facial recognition applications [1], [2]."]} +{"20634644|3055684": ["r the computation intensive IoT applications [2]. Energy harvesting (EH) is another promising technique to prolong the battery lifetime and provide satisfactory quality of experiences for IoT devices [3]. Equipped with EH modules, an IoT device can capture the ambient renewable energy, such as the solar radiation, wind and human motion, and other resources, such as the ambient radio-frequency (RF) si"]} +{"20634644|12029139": ["Simulations are performed for IoT devices with wireless power transfer to capture the ambient RF signals from a dedicated RF energy transmitter to charge the IoT battery [21], [22]."]} +{"20634644|12060835": ["Energy harvesting (EH) is another promising technique that prolongs battery lifetime and provides a satisfactory quality of experiences for IoT devices [6]\u2013[9]."]} +{"2879330|1123458": ["This is related to the so-called S -lemma (or S -procedure) in control (e.g., Boyd et al. [40], P\u00b4olik and Terlaky [119]): The S -lemma essentially gives the boundary between what we can solve exactly, and where solving the subproblem becomes di\ufb03cult."]} +{"10040669|12029139": ["2 mW RFID, low power device RF Signal [12] unpredictable"]} +{"10040669|8909218": ["r experience. Besides this, the low-cost and low-power SCBSs can be easily installed without costly cell site acquisition, and their self-organization manner further helps save operating expenditures [1, 2]. However, as the SCBSs are densely and irregularly located, some of them may be inaccessible to the power grid. Moreover, the network power consumption of the SCNs will be high despite the small powe"]} +{"10040669|12060835": ["The previous discussions on the three basic tradeoffs in EH-SCNs provide us with the\nfollowing deployment guidelines:\n\u2022 Satisfactory coverage can be guaranteed in EH-SCNs with a reasonable network density."]} +{"61809277|6583734": ["2877336 DECOUPLING dedicated hardware from network services and replacing it with programmable virtual machines (VMs), Network Functions Virtualization (NFV) is able to provide critical network functions on top of optimally shared physical infrastructure [1]\u2013[3]."]} +{"4778283|12060835": ["This is be cause the use of energy harvesting devices can prolong the lifetime of a transmitter (or a user) [1][2]."]} +{"78086914|22221919": []} +{"78086914|12029139": ["As a result, SWIPT is regarded as a potential energy-efficient solution for the forthcoming 5G [14], which has attracted extensive attention in both academia and industry.", "transfer (WPT) provides possibility of improving EE [14]."]} +{"706371|18148591": ["Inter-cell interference is treated as noise at the receiver side and is handled by resorting to improved point-to-point communications between the base station (BS) and the mobile station (MS), using efficient coding and/or single-link multiple-antenna techniques [2]."]} +{"12248514|21930333": []} +{"12248514|7686677": ["RE has shown to yield significant OPEX and carbon dioxide (CO2) reductions for cellular operators by reducing reliance on traditional electricity supply [22].", "The benefit of using RE in cellular networks has been thoroughly investigated in literature [22]\u2013[26]."]} +{"7193801|24110634": ["SDN has been applied to data centers [11], [12], WAN,Ahmed14commag, enterprises [14], [15], optical networks [16], wireless networks [17], wireless sensor networks [18], and under water sensor networks (UWSN) [19].", "wireless networks [17], wireless sensor networks [18], and under water sensor networks (UWSN) [19]."]} +{"7193801|34643772": ["Security issues for SDN are discussed in [67]\u2013[69].", "Security and privacy issues for SDN are discussed in [67]\u2013[69], [179], while security and privacy related work for SG are surveyed in [46]\u2013[48]."]} +{"7193801|30102381": ["From the testbed perspective, though there are lot of testbeds available for evaluation of SDN [71] and SG [219], [220] alone but less efforts are done on integrating these components together."]} +{"7193801|8650651": ["SDN has been applied to data centers [11], [12], WAN,Ahmed14commag, enterprises [14], [15], optical networks [16], wireless networks [17], wireless sensor networks [18], and under water sensor networks (UWSN) [19].", "SDN has been applied to data centers [11], [12], wide area networks (WAN) [13], enterprises [14], [15], optical networks [16],"]} +{"7193801|11414835": ["A survey article on Hypervisors (which isolates the underlying physical SDN and its devices into virtual SDN network), has been presented in [70]."]} +{"7193801|10440280": ["Main Domain Sub-Topic Reference Publication Year [1] 2012 General Introduction of SG [25] 2012 [26] 2014 [37] 2017 [34] 2011 [32] 2013 [33] 2013 [27] 2012 Communication Aspects [28] 2013 [29] 2011 [30] 2014 [31] 2011 [35] 2013 [36] 2016 [38] 2016 Routing and Networking Issues [39] 2014 [40] 2014 Smart Grid [41] 2015 Demand Response [42] 2015 [43] 2014 Energy Efficiency [44] 2014 [45] 2015 [46] 2012 Security and Privacy [47] 2012 [48] 2014 [49] 2018 Load Balancing [50] 2014 Simulation to Support Power and Communication Network [51] 2014 Use of Wireless Sensor Networks in SG [52] 2015 [53] 2010 Stochastic Information Management [54] 2014 Context Awareness [55] 2015 SG NANs [56] 2014 [57] 2015 General Introdcution of SDN [58] 2016 [59] 2014 Fault Management [60] 2017 Traffic Engineering [61] 2017 Transport Network [62] 2017 Topology Discovery [63] 2017 Software Defined Networks Routing [64] 2018 Comparison of NFV and SDN [65] 2016 [66] 2017 Security [67] 2017 [68] 2016 Hypervisors [69] 2016 Testbed for SDN [70] 2017"]} +{"7193801|29060869": ["Studies on energy efficiency for SG have been surveyed in [44], [45], while security and privacy related work for SG are surveyed in [46]\u2013[50].", "detailed description of these ICT and infrastructure to support SG operation can be found in [45]."]} +{"7193801|2521001": ["Security and privacy issues for SDN are discussed in [67]\u2013[69], [179], while security and privacy related work for SG are surveyed in [46]\u2013[48]."]} +{"7193801|2623404": ["General discussion on SDN technology is presented in [58]\u2013[60].", "defined controllers led the network intelligence [60]."]} +{"7193801|485843": ["enhanced communication technologies are necessary [80]."]} +{"7193801|595093": ["Studies on energy efficiency for SG have been surveyed in [44], [45], while security and privacy related work for SG are surveyed in [46]\u2013[50].", "Security and privacy issues for SDN are discussed in [67]\u2013[69], [179], while security and privacy related work for SG are surveyed in [46]\u2013[48]."]} +{"7193801|5747564": ["Survey articles dealing with communication aspects of smart grid are presented in [25], [26], [28], [29], [33]\u2013[40].", "Different SG components follow different standards and protocols [26]\u2013[29] and SDN controller should be able to cope with all such diverse communication systems."]} +{"7193801|121289": ["Main Domain Sub-Topic Reference Publication Year [1] 2012 General Introduction of SG [25] 2012 [26] 2014 [37] 2017 [34] 2011 [32] 2013 [33] 2013 [27] 2012 Communication Aspects [28] 2013 [29] 2011 [30] 2014 [31] 2011 [35] 2013 [36] 2016 [38] 2016 Routing and Networking Issues [39] 2014 [40] 2014 Smart Grid [41] 2015 Demand Response [42] 2015 [43] 2014 Energy Efficiency [44] 2014 [45] 2015 [46] 2012 Security and Privacy [47] 2012 [48] 2014 [49] 2018 Load Balancing [50] 2014 Simulation to Support Power and Communication Network [51] 2014 Use of Wireless Sensor Networks in SG [52] 2015 [53] 2010 Stochastic Information Management [54] 2014 Context Awareness [55] 2015 SG NANs [56] 2014 [57] 2015 General Introdcution of SDN [58] 2016 [59] 2014 Fault Management [60] 2017 Traffic Engineering [61] 2017 Transport Network [62] 2017 Topology Discovery [63] 2017 Software Defined Networks Routing [64] 2018 Comparison of NFV and SDN [65] 2016 [66] 2017 Security [67] 2017 [68] 2016 Hypervisors [69] 2016 Testbed for SDN [70] 2017"]} +{"7193801|18037424": ["Survey articles dealing with communication aspects of SG are presented in [27]\u2013[38]."]} +{"2880536|3055684": ["These mmWave design features are also attractive for RF (radio frequency) energy harvesting where a harvesting device may extract energy from the incident RF signals [4].", "In this section, we consider the case where the energy harvesting device also attempts to decode information from the received signals, in what is known as simultaneous wireless information and power transfer (SWIPT) [4], [11].", "This has also led to considerable research in advancing the theoretical understanding of wireless-powered systems (see [4], [11] for a comprehensive overview)."]} +{"17547961|7686677": []} +{"31389309|12029139": ["and [8])."]} +{"31389309|12060835": ["ergy has attracted research attention (see recent surveys in [7]"]} +{"1750395|19938676": ["The cognitive idea has also been extended to 5G networks, where we refer readers to [212] for more discussion."]} +{"1750395|14765802": ["More recently, the literature surveys for EE improvement have nailed down to several speci\ufb01c technical areas in cellular networks, including radio resource management [29], dynamic resource provisioning [30], base station sleeping [31] as well as low power hardware techniques [32]."]} +{"1750395|16412228": ["More recently, the literature surveys for EE improvement have nailed down to several speci\ufb01c technical areas in cellular networks, including radio resource management [29], dynamic resource provisioning [30], base station sleeping [31] as well as low power hardware techniques [32]."]} +{"1750395|7686677": ["However, [43] emphasizes cognitive radio and cooperative techniques while we focus on the main 4G technologies and the promising 5G technologies, which are fundamentally different."]} +{"1750395|10837932": ["In [27], a complete overview for both wired and wireless networks has been conducted."]} +{"1750395|17109970": []} +{"7518568|12029139": ["The motivations lie in two aspects: the multiple antenna can greatly improve the WPT efficiency by energy beamforming [6]; and a low-complexity design with simple multi-user access scheme other than [11] is highly appreciated [1].", "The interested readers are referred to [1] and references therein for a comprehensive survey on RF-EH based wireless communication networks."]} +{"25181297|7686677": ["These economic and ecological concerns drive the need for \u201cgreen communications\u201d solutions [1]\u2013[8]."]} +{"7191574|14441987": ["The emergence of wireless networks gives new perspectives on optimal routing problems, in particular, when they are coupled with resource allocation problems (e.g., [4, 5 ])."]} +{"8664559|7686677": ["With the development and maturity of these technologies, EH will become a promising technique for future green wireless network design [4], [5], which can effectively alleviate the contradiction between the huge wireless communication demands and the low energy consumption target."]} +{"6546491|1114486": ["As polar codes are currently proposed for the 5G control channel [4], decoding algorithms for very short block lengths are of practical importance [5]."]} +{"6546491|95570": ["Besides algorithmic optimizations [7] of the existing algorithms, modifying the code structure [8] can be considered to overcome this issue.", "This leads to high decoding latency when compared to state-of-the-art low density parity check (LDPC) codes/decoders [7]."]} +{"10979806|3055684": ["Comprehensive surveys on this approach are [112] and [113]."]} +{"10979806|12029139": ["Surveys on this approach are [114] and [115]."]} +{"11528984|7686677": ["The deployment of heterogeneous networks is an important technique to increase the energy efficiency of wireless cellular networks [3].", "Since BSs are power hungry elements, absorbing them in the smart grid can significantly increase power efficiency [3].", "Due to their small coverage area, femtocells require much less transmission power than macrocells, and therefore their BSs are much more energy efficient in providing broadband coverage [3]."]} +{"22487435|16412228": []} +{"22487435|12029139": ["Recently, wireless energy harvesting has been introduced for wireless networks [9]."]} +{"22487435|15438029": ["By exploiting social relations among users, information routing in mobile networks can be efficiently optimized [30]."]} +{"22487435|14988542": [", reducing energy consumption and deploying an energy harvesting technology [1]\u2013[4]."]} +{"22487435|10837932": [", reducing energy consumption and deploying an energy harvesting technology [1]\u2013[4]."]} +{"22487435|12060835": ["One solution to this problem is to deploy energy harvesting in the network, which allows the wireless nodes and mobile devices to replenish their batteries [6], [7].", "Such energy harvesting has been used widely in sensor networks [6] and fixed wireless network infrastructure such as base stations and access points [8]."]} +{"58004713|7942157": ["Due to stringent delay constraints, once a URLLC packet is generated, the packet must be transmitted immediately without any delay [3, 6].", "Apart from the non-scheduled URLLC traf\ufb01c, we also need serving scheduled URLLC traf\ufb01c which is not necessary of short payload size [3, 10].", "One observes that non-scheduled traf\ufb01c transmissions include (i) FPT of devices which transmit critical data and reserve access for further messages [3] (refer to FPT-NS in Fig.", "However, in URLLC applications, due to the limitations of time-diversity and crucial need to large spectrum bands for providing frequency diversity, isolation through orthogonal slicing is challenging [3, 5].", "URRLC is considered as an essential prerequisite of a new wave of services including drone-based delivery, smart factory, remote control, and intelligent transportation systems (ITS) [3].", "The coexistence of scheduled and non-scheduled traf\ufb01c could happen in many scenarios like vehicular networks, and monitoring and alarm systems [3, 4]."]} +{"49346244|10979806": ["THE EXPLOSIVE progress of information and communication technologies (ICT), such as the fifth generation (5G) networks, has resulted in a tremendous demand for energy to prolong the lifetime of devices in wireless networks [1]\u2013[3].", "Especially, by integrating RF wireless power transfer techniques into traditional wireless communications, the research community has witnessed the prompt development of simultaneous wireless information and power transfer (SWIPT) technique [2], [3], [5], [6]."]} +{"49346244|19938676": ["The explosive progress of information and communication technologies (ICT), such as the \ufb01fth generation (5G) networks, has resulted in a tremendous demand for energy to prolong the lifetime of devices in wireless networks [1]\u2013[3]."]} +{"49346244|12029139": ["Over past few years, the SWIPT technique has showed its bright potential of prolonging the lifetime of wireless devices in many applications, such as cellular, wireless sensor, cognitive radio and Internet-of-Things networks [5], [7]\u2013[10].", "Especially, by integrating RF wireless power transfer techniques into traditional wireless communications, the research community has witnessed the prompt development of simultaneous wireless information and power transfer (SWIPT) technique [2], [3], [5], [6]."]} +{"17631216|3055684": ["Paper [24] summarizes the recent contribution in energy harvesting communications, whereas only few literatures related to energy harvesting networks are discussed."]} +{"17631216|12029139": ["Unlike the traditional battery-operated communications, the energy of ambient energy sources available to energy harvesting communication nodes is time-variant and often sporadic even though there is potentially an infinite amount of energy."]} +{"17631216|9862516": ["In fact, if the node\u2019s energy requirement is low enough [192], it is possible for IoT nodes to exclusively rely on"]} +{"17631216|2509135": ["Cognitive radio has been deemed as a key enabling technology to resolve the problem of spectrum scarcity due to the ever increasing demand for wireless services and applications [141], [142]."]} +{"17631216|12060835": ["3) Mechanical Motion/Vibration Energy Sources: Electric power can also be produced by extracting energy from mechanical motion and vibration through transduction methods, including electrostatic, piezoelectric and electromagnetic [3]\u2013 [6].", ", wind and liquid flow [3], [6], [9], [10], or partially controllable human actions, e.", "4) Electromagnetic Radiation Energy Sources: Harvesting energy from EM radiation has attracted more and more attention due to the broadcast nature of wireless communications [3]\u2013[6], [12].", "To achieve this, energy harvesting has been proposed as a viable solution that enables wireless nodes to scavenge energy physically or chemically from natural or man-made phenomena [2], [3].", "1) Solar/Light Energy Sources: One of the most popular ambient energy sources is visible sunlight/light, and it is well studied and exploited in a wide variety of applications [3]\u2013 [6]."]} +{"206825907|12060835": ["In the latter mode, the device first stores its harvested energy before use [15].", "However, nearly all practical storage devices suffer a storage loss to varying extents, ranging from 10% to 30% [15].", "Certainly, any battery can experience self-discharging with a leakage rate \u03c1leak,i typically ranging from 10% to 20% energy loss per month [15]."]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"20211919|7686677": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"42657947|15589021": ["widely available in the literature [23] and [24], in this section we discuss power consumption of gas WSN platforms relevant to our work and overview the intelligent approaches proposed recently.", "The reader can find more details on sensor technologies comparison in [23] and [24]."]} +{"43983034|12029139": ["This line of works focus on the fundamental tradeoff between achievable throughput and the harvested energy [5], [6]."]} +{"85501359|1185580": ["We denote the optimal policy as \u03c0\u2217(s), which can be calculated by the Bellman optimality equation as follows [9]:", "3, a typical actor-critic agent is composed of two elements [9]: the actor part and the critic part."]} +{"85501359|7686677": ["Among various types of renewable energy, solar power is considered the most common and effective energy resource because it can be harvest directly from sunlight [7]."]} +{"1708582|17464562": []} +{"13359825|29060869": ["The opposite direction where smart grid advantages can be exploited to improve ICT infrastructure operation is also considered as a promising solution for enabling green communications [16]."]} +{"13359825|121289": ["It enables dynamic real-time pricing and demand response optimization in order to enhance the efficiency and reliability of the electrical grid [4]."]} +{"53101455|6909107": ["[17] P."]} +{"53101455|10299098": ["See recent surveys [9], [10], [63] and references therein."]} +{"53101455|6779551": ["More complex dynamics are also possible in IoT due to e.g., strategic human interactions and malicious attack [110]."]} +{"53101455|3494096": ["A few examples of applications are [4], [5], [104]: (i) lifestyles (wearable gadgets, gaming, augmented/virtual reality, wellness); (ii) smart environments (homes, of\ufb01ces, cities); (iii) automotive (self-driving, traf\ufb01c monitoring, intelligent transportation systems, vehicle-to-vehicle\u2026", "This shift of computing paradigms is further promoted by the advanced communication techniques emerging with standards such as Narrowband-IoT (NB-IoT) [2], [4]."]} +{"53755823|9651858": []} +{"53755823|16378550": []} +{"53755823|3330461": ["7) Impact in Complex Heterogeneous Networks: In the presence of macro cell, micro cells, home cells and fixed relays, the impact of the wide deployment of D2D communications also needs further considerations [24]."]} +{"53755823|7644489": ["more difficult to manage in small coverage scenarios than with respect to their respective large coverage areas of the BS [65].", "However finding the impact of these techniques on WAN also need considerations [65].", "\u2022 UEs radio interface is by-default designed to send data in Uplink [65].", "Thus further studies are required to investigate optimal solutions for splitting the control functionality between the network and the UE [65]."]} +{"40436113|7686677": []} +{"40436113|12060835": ["In [2], a comprehensive survey of sensor nodes with an energy harvesting capability was provided.", "Energy harvesting for wireless nodes is an important issue [2]."]} +{"2723416|7686677": ["For example, the total energy cost of China Mobile, a Chinese state-owned telecommunication company, is almost 3 billion US dollars in the year of 2011 [4], and is still increasing considerably year by year."]} +{"24618167|3055684": ["As an ecology and economy friendly solution, energy harvesting (EH) technology has been intensively researched for the past several decades [6]\u2013[9]."]} +{"24618167|7686677": ["The wireless data traf\ufb01c requires a drastic increase in energy consumption, which translates to a signi\ufb01cant amount of greenhouse gas emissions and a surge of the energy bill [2].", "The base stations (BSs) account for 70% to 80% of the overall energy bill of a typical wireless communication system (WCS) [2]\u2013[4], and tremendous number of BSs will be deployed by 2020 to cope with the target of 1000X objective [5]."]} +{"24618167|12060835": ["Yet, both the HSU and the HUS strategies require the energy storage medium, which suffers from imperfections such as storage loss and energy leakage [8], [13]\u2013[15]."]} +{"67870065|31245252": ["CONVERGING the Internet and wireless sensors, Internet-of-Things (IoT) provides a new paradigm of ubiquitous connectivity and pervasive intelligence [1]."]} +{"67870065|206578365": [", for computing and storage) close to smart devices and objects [3], [4]."]} +{"3775251|7686677": ["In addition to reducing the energy consumption on the demand side [6]\u2013[8], powering communication systems with renewable energy on the supply side is another effective approach to reduce grid energy cost [5], [9].", "As an ecological and economic friendly technique, energy harvesting, which can scavenge cheap and clean renewable energy from ambient environment, has attracted extensive attention and inspired thorough research in both academia [5], [9] and industry [10]\u2013[12].", "Under the pressures from both ecology and economy, green communication has thereby become an inevitable trend for future wireless networks [5]."]} +{"52932325|3055684": ["In addition, EH technology harvests the surrounding renewable resources to provide the major power for MEC systems [28] and provides support for the sustainable operation of mobile devices [29]."]} +{"52932325|12060835": ["In addition, EH technology harvests the surrounding renewable resources to provide the major power for MEC systems [28] and provides support for the sustainable operation of mobile devices [29]."]} +{"21896662|7686677": ["Due to their small coverage area, femtocells require much less transmission power than macrocells, and therefore their base stations (BSs) are much more energy efficient in providing broadband coverage [4]."]} +{"18438113|7686677": ["I. INTRODUCTION\nTo meet the dramatically increasing mobile data traffic, recently the cellular operators are deploying more and\nmore base stations (BSs) and their daily energy cost amountsto a large portion of the operational expenditure (OPEX).", "To meet the dramatically increasing mobile data traffic, recently cellular operators are deploying more and more base stations (BSs), and their daily energy cost amounts to a large portion of operational expenditure (OPEX) [1].", "IT\n] 15\nN ov\n2 01\n4 1\nEnergy cost of cellular networks is ever-increasing to match the surge of wireless data traffic, and the saving of this cost is important to reduce the operational expenditure (OPEX) of wireless operators in future.", "On the demand side, various techniques have been proposed in cellular networks across different layers of communication protocols for reducing energy consumption [1]."]} +{"86611450|1123458": ["By applying the celebrated S-procedure in robust optimization [35] [29, Appendix B."]} +{"12103882|17774971": []} +{"12103882|192934": []} +{"4617786|13738536": ["Due to its ability to guarantee the users\u2019 Quality of Service (QoS) and optimize the usage of facilities to maximum operators\u2019 revenue, how to allocate radio resources more ef\ufb01ciently is always one hot topic for future wireless communications [2]."]} +{"3748884|7686677": ["The concern for the energy consumption has triggered the rapid development of green radio, which primarily focuses on energy-efficient design in wireless networks [1]\u2013[3]."]} +{"27678177|10213552": ["20 The major difference between storm topologies and MapReduce jobs as identi \ufb01 ed by Sundaresan and Kandavel 17 is that storm topologies keep on executing due to real-time date ingestion of stream data, whereas MapReduce jobs eventually \ufb01 nish.", "20 Several big data projects have been proposed in literature that addresses the shortcomings of MapReduce while still maintaining scalability and fault tolerance capability, such as Incoop, IncMR, Haloop, Twister, iMapReduce, Continous MapReduce, Shark, Dremel, and Scalding."]} +{"27678177|3750204": ["4 However, due to self-managing and a fault-tolerant \ufb01 le system, the default data store for big data is the Hadoop Distributed File System (HDFS)."]} +{"27678177|16052126": ["Hadoop is the open-source implementation of MapReduce, which also provides its own DFS, HDFS. Doulkeridis and N\u00f8rv\u00e5g 19 have pointed out various weaknesses and limitations of MapReduce, such as high communication cost, lack of iteration, and lack of real-time processing.", "17,19"]} +{"1670139|1123458": ["\u2026} lim T \u2192\u221e\n1\nT T \u22121\u2211 t=0 \u2211 i\u2208I G(Pti ) (10a)\ns. t. Pti = Pc,i + \u2211 k\u2208K wtk H Bi wtk + Ptb,i , \u2200i, t (10b)\n0 \u2264 Pc,i + \u2211 k\u2208K wtk H Bi wtk \u2264 Pmaxg,i , \u2200i, t (10c)\nCt+1i = Cti + Ptb,i , \u2200i, t (10d) Cmini \u2264 Cti \u2264 Cmaxi , \u2200i, t (10e) Pminb,i \u2264 Ptb,i \u2264 Pmaxb,i , \u2200i, t (10f) S\u0303INRk({wtk}) \u2265 \u03b3k, \u2200k, t. (10g)"]} +{"7314182|1420935": ["and the policy makers, as energy sharing can contribute to improving the efficiency of power grid operations, while also reducing power generation cost and CO2 emission [21]."]} +{"14586280|3055684": []} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"17770239|12060835": ["However, the expected high variability in the energy harvesting process, in both time and space, has exemplified the challenges in designing networking protocols [2] for EHWSNs."]} +{"1753644|3055684": ["IN RECENT years, radio frequency (RF) energy harvesting technology has attracted great research interests from both academia and industry [1]."]} +{"1753644|12029139": ["This idea is known as simultaneous wireless information and power transfer (SWIPT) [2], which has become an emerging area of research."]} +{"2172141|10299098": ["In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless access points (APs) and base stations (BSs) [3], [4].", "By applying dynamic voltage and frequency scaling techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where (3)Note that to avoid the issue of dividing by zero, we define \u03b2( li ti ) = 0 when either li = 0 or ti = 0 holds.", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} +{"2172141|206578365": ["To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless APs and base stations (BSs) [3], [4].", "In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "By applying dynamic voltage and frequency scaling (DVFS) techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where fi,n \u2208 (0, f max i ], n \u2208 {1, .", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} +{"51988843|22221919": ["NOMA schemes are briefly introduced in [11] and [12]."]} +{"51988843|3270620": []} +{"40928711|6909107": ["Optimal offloading schedules are obviously important to MEC, but yet to be established due to sophisticated stochasticity and changing availability of resources at the MEC server, random data arrival per device, and fluctuating wireless channels [5]."]} +{"40928711|206578365": ["Different from cloud computing with dedicated high-speed wired connections, MEC has all devices operate in shared wireless media which feature unpredictable channel changes, and become increasingly congested with the increase of devices [4]."]} +{"43921535|22221919": ["A more detailed literature review on MIMO-NOMA can be found in [19]."]} +{"69358745|6909107": ["Accordingly, computation offloading for MEC systems attracts more and more research efforts [11]."]} +{"7620256|3055684": [", solar radiation and wind energy, w hich is promising to achieve green networking [6], [7]."]} +{"206862196|7686677": ["nventional energy consumed, because it is only then cost-effective to deploy renewable energy sources and storage. A survey of issues involved in deploying renewable energy sources in BSs is given in [3]. Related work on deploying renewable energy sources in smart grids, not necessarily constrained to a communications systems setup can be found in [4], [5] and the references therein. Other than work "]} +{"3936846|15971774": ["The use of multiple communication technologies is conceptually very similar to many existing multipath protocols that increase end-to-end reliability [10].", "While there are many multipath protocols [10], we have not identi\ufb01ed any works that allow to \ufb02exibly trade-off latency and reliability, as considered in this paper."]} +{"4988552|6583734": ["DECOUPLING dedicated hardware from network services and replacing them with programmable virtual machines (VMs), Network Function Virtualization (NFV) is able to provide critical network functions on top of optimally shared physical infrastructure [1], [2]."]} +{"263823|7686677": ["An attractive solution is to harvest cheap and clean energy from renewable sources such as solar, wind or radio-frequency waves [2].", "However, the large-scale deployment of small-cell base stations can pose a problem to the overall energy efficiency of multi-tier networks [2]."]} +{"598907|17109970": ["\u2026issues related to EE in wireless networks, [4] presents four fundamental\nC. Isheden was with the Vodafone Chair Mobile Communications Systems, Technische Universit\u00e4t Dresden, D-01069 Dresden, G rmany, and is currently with Actix GmbH, D-01067 Dresden, Germany, e-mail: christian.isheden@actix.com."]} +{"37925315|12681089": []} +{"56594506|12029139": ["In particular, it has been shown that relay-assisted SWIPT significantly improves the overall transmission performance [8], [9]."]} +{"6034965|15255963": ["A survey providing an in-depth understanding of the fundamental results of PEC and FSMC along with their applications in wireless communication systems can be found in [100]."]} +{"6034965|1708582": ["The survey available in [202] summarizes the historical basis of the reinforcement learning and provides practical implementations."]} +{"3593591|22221919": ["NOMA has a higher information-theoretic rate region than orthogonal techniques albeit, which is achieved by increasing the receiver\u2019s implementation complexity [4].", "Cognitive radio (CR) and non-orthogonal multiple access (NOMA) constitute promising techniques of achieving high SE [2]\u2013[4]."]} +{"3593591|12029139": ["One of the categories focuses on the techniques that can achieve high energy efficiency (EE) [8], [9], while the other one aims for recycling energy, where both wireless charging as well as simultaneous wireless information and power transfer (SWIPT) [10] fit."]} diff --git a/edge/graph_209515898.jsonl b/edge/graph_209515898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..072fc246ddfef96465f885f485178b87f1910fb1 --- /dev/null +++ b/edge/graph_209515898.jsonl @@ -0,0 +1,24 @@ +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"58021842|14076440": []} +{"58021842|44132017": []} +{"145820585|21559689": ["An overview of dictionary learning can be found in [11]."]} +{"206592484|456491": []} +{"70016579|2088679": ["denoising method in computer vision and there has been increased interest in applying similar strategies to medical imaging problems [11], [12]."]} +{"49299682|7525856": ["CS has been applied in many practical applications, including but not limited to singlepixel imaging [11, 33], accelerating magnetic resonance imaging (MRI) [26], wireless tele-monitoring [50] and cognitive radio communication [36]."]} +{"49299682|64404": ["Motivated by the fact that the residuals of natural images and videos are more compressible [38, 37], an enhanced version, dubbed ISTA-Net, is derived from ISTA-Net to further improve CS performance."]} +{"2088679|393948": []} +{"59601410|17485266": []} +{"132039711|11112426": ["The task of hyperspectral unmixing is to decompose the mixed pixels into a set of pure pixels called \u201cendmember,\u201d and the corresponding score of each endmember, namely, \u201cabundance\u201d [8], [9]."]} +{"44131640|11112426": ["Hyperspectral images (HSIs), which simultaneously acquire both spatial and spectral information, have already been applied in many remote sensing applications, such as classification [1], target detection [2], unmixing [3], etc."]} +{"21955893|20404279": [" process as an image generation process, with the aid of a discriminative network to enhance the generative quality of the generative network. With recent rapid development of GAN in machine learning [84], it can be expected that further improvements will be achieved in speech/feature enhancement in the future. However, while many works simply regard the spectrogram as a traditional visual image, few "]} +{"21011865|2323881": []} +{"21011865|393948": []} +{"52965917|2088679": ["In other words, deep learning technologies can convert input data (e.g. images, speech and video) into outputs (e.g. object category, password unlocking and tra\ufb03c information) by the model [24]."]} +{"53096525|52965917": []} diff --git a/edge/graph_209515914.jsonl b/edge/graph_209515914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2a3c8747a59792a1a620fc82e199ab91c09d12d --- /dev/null +++ b/edge/graph_209515914.jsonl @@ -0,0 +1,20 @@ +{"332918|1230643": ["Sensor nodes of the first generation had only very simple sensing capabilities, providing scalar sensors for parameters such as temperature, humidity, movement, lightning conditions, pressure, and noise level (Akyildiz et al., 2002).", "In such situations, airborne cameras and sensors are valuable sources of information helping us to build an \u2018\u2018overview\u2019\u2019 of the environment and to assess the current situation."]} +{"35695099|7686677": ["This dynamic spectrummanagement using CRs can also offer up to 50% energy savings in radio networks [83]."]} +{"35695099|13348951": ["Furthermore, the VDL modes that were capable of increasing spectral efficiency by restricting transmission channel bandwidth resulted in degradation of system data rate which leads to the concept of broadband-overlay systems [26], [32]."]} +{"14462235|1230643": ["The advancements made in technologies for powering UAS such as solar-powered UAS with battery reserves may allow the UAS to carry long-term surveillance missions [3, 4]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"64792997|51858916": ["was provided in [41].", "agation channel measurements and modeling [37], [40], [41]."]} +{"64792997|35695099": []} +{"63083099|7986140": ["In order to prevent certain types of attacks, various papers have suggested using different techniques [63]."]} +{"63083099|10310014": ["In order to solve this issue, UAV Ad hoc networks can be used to restore communication with the public telephone network [50, 51, 52]."]} +{"4690848|22221919": ["Studies have revealed that compared to conventional orthogonal multiple access (OMA), NOMA yields the highest performance gain when the channel conditions of the users are most different [13].", "ground-AerIAl nomA Non-orthogonal multiple access (NOMA) is a promising technology to increase the spectrum efficiency in 5G cellular systems [13]."]} +{"21712422|88513503": ["To this end, we first build a model for f\u0302(x, y, z;h) using the locations of all drone-UEs except one [34]."]} +{"16418391|13348951": ["L-DACS1 is a multicarrier communication system whose channels will be deployed in between Distance Measurement Equipment (DME) channels in frequency."]} +{"52192448|61132": ["In practice, the endurance of the UAVs is restricted by the limited onboard battery capacity [21]."]} +{"3529521|21418": ["This is analogous and yet in sharp contrast to the existing small-cell technology [14], where the cell radius is reduced by increasing the number of small-cell BSs deployed, but at the cost of increased infrastructure expenditure [15]."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"12885242|13348951": ["Both current and future air-to-ground (AG) communications systems will be deployed in the Lband (960-1164 MHz), and possibly in other bands."]} diff --git a/edge/graph_209516000.jsonl b/edge/graph_209516000.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0b850c6d1eeba3b5dd777a41455c10d4fe8b352 --- /dev/null +++ b/edge/graph_209516000.jsonl @@ -0,0 +1,73 @@ +{"9269722|11894197": ["High dimensional data can be handled with dimension reduction [23] or feature selection [24]."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"3638140|3249779": ["While the definition of disentanglement is open to debate, many believe a factorial representation, one with statistically independent variables, is a good starting point [1, 2, 3].", "As a means to describe the properties of disentangled representations, factorial representations have been motivated by many [1, 2, 3, 22, 32, 33].", "Such representations distill information into a compact form which is oftentimes semantically meaningful and useful for a variety of tasks [2, 4]."]} +{"3638140|393948": ["Such representations distill information into a compact form which is oftentimes semantically meaningful and useful for a variety of tasks [2, 4]."]} +{"2612052|393948": ["Recently, significant progress has been made in learning image representations from pixel (or low) level image features to capture high level shape and edge interactions between different objects in images [35]."]} +{"2612052|8575576": ["W ITH the recent advent of cost-effective whole-slide digital scanners, tissue slides can now be digitized and stored in digital image form [1]."]} +{"51982231|2088679": ["CNNs are now the state-of-the-art approach for computer vision problems and show high promise in the field of medical image analysis (Litjens et al., 2017; Tajbakhsh et al., 2016) because they are easy to set up, require little applied field knowledge (specially when compared with handcrafted feature approaches) and allow to migrate base features from generic natural image applications (Deng et al.", "trend on the field of medical image analysis, where deep learning approaches are complementing or even replacing the standard manual feature engineering approaches since they allow to achieve high performances while significantly reducing the need for field-knowledge (Litjens et al., 2017)."]} +{"3668673|8575576": ["In fact, texture features such as grayscale co-occurrence matrices, local binary patterns, wavelet transforms, among others, have been widely adopted in histopathology image analysis [18], [19].", "Among the most popular ones, color deconvolution [18] decomposes an RGB image into its staining components by estimating a \u201cstaining matrix\u201d that represents the RGB colors of each stain present in the tissue image."]} +{"206592484|456491": []} +{"199518561|2088679": ["In recent years, deep learning methods, particularly convolutional networks, have rapidly become the main approach for analyzing medical images [12], [13]."]} +{"3654323|10092092": []} +{"3654323|2899523": [" sharply decreases in higher layers. Therefore, recent work has addressed this problem by deep DA, which combines deep learning and DA. There have been other surveys on TL and DA over the pastfewyears[67, 80,14,68, 109, 13]. Panetal. [67]categorizedTL underthreesubsettings,includinginductiveTL, transductiveTL,andunsupervisedTL,buttheyonlystudied homogeneous feature spaces. Shao et al. [80] categorized TL techniques into", "forth. In this section, we present different application examples using various visual deep DA methods. Because the information of commonly used datasets for evaluating the performance is provided in [109] in detail, we do not introduceit in this paper. 6.1. Image Classi\ufb01cation Because image classi\ufb01cation is a basic task of computervisionapplications,mostof the algorithmsmentioned above were originally", "e transfer. The surveywritten byPatel [68] onlyfocusedon DA, a subtopicof TL. [14] discussed 38 methods for heterogeneous TL that operate under various settings, requirements, and domains. Zhangetal. [109] werethe\ufb01rst to summarizeseveraltransferring criteria in detail from the concept level. These \ufb01ve surveys mentioned above only cover the methodologies on shallow TL or DA. The work presented by Csurka"]} +{"3654323|7559976": ["In one-step DA, the deep approaches can be summarized into three cases, which refers to [23] .", "[23] briefly analyzed the state-of-the-art shallow DA methods and categorized the deep DA methods into three subsettings based on training loss: classification loss, discrepancy loss and adver-", "hose from the survey papers by [18,23] to maintain consistency cross surveys."]} +{"237132|8575576": []} +{"14197771|393948": ["Recently, generalized representation and feature learning approaches that do not incorporate domain knowledge have been employed in complex learning tasks.(10,11) These methods address learning tasks like a fully learn-from-data approach avoiding segmentation and manual selection of handcrafted features.", "These approaches typically involve multiple non-linear transformations of the data, with the goal of yielding more abstract and ultimately more useful representations.(11) These methods are becoming increasingly popular, often outperforming traditional approaches that include handcrafted features for data representation and machine learning methods for learning task."]} +{"14197771|8575576": []} +{"53228946|2088679": ["GIGAPIXEL images are three-dimensional arrays com-posed of more than 1 billion pixels; these are common in fields like Computational Pathology [1] and Remote Sensing [2], and are often associated with labels at image level.", "Typically, these patches are manually annotated to perform automatic detection or segmentation using a neural network, relegating the task of performing image-level prediction to a rule-based decision model about the patch-level predictions [1], [3]\u2013[5].", "We used P \u00bc 128, a common patch size used in the Computational Pathology literature [28], with a stride of the same size S \u00bc 128 to perform non-overlapping patch sampling.", "GIGAPIXEL images are three-dimensional arrays composed of more than 1 billion pixels, common in fields like Computational Pathology [1] and Remote Sensing [2], and often associated with image-level labels."]} +{"51615869|2088679": ["This is in line with the trend observed in recent years, which has seen CNNs as the top-performing approach in image analysis, both in computer vision and medical imaging [23], and corroborates the fact that CNNs have become the standard methodology for automatic mitosis detection."]} +{"1685059|2088679": ["(12-17) The mean, median, and standard deviation of the area and eccentricity of DCIS connected components and (18-23) IDC connected components."]} +{"1685059|8575576": []} +{"52305483|20404279": []} +{"52305483|2088679": ["It is estimated that there were over 400 papers published in 2016 and 2017 in major medical imaging related conference venues and journals (Litjens et al., 2017)."]} +{"13661099|8575576": ["Breast cancer has been one of the leading cancer killers threatening women in the world [14]."]} +{"511308|8575576": ["A variety of classi\ufb01cation and segmentation algorithms have been developed in the past [1], [2], [3], [4], [5], [6], [7], [8], focusing primarily on the design of local pathological patterns, such as morphological [2], geometric [1], and texture [9] features based on various clinical\u2026"]} +{"3807116|2088679": []} +{"3807116|8575576": ["The development of high resolution whole-slide image (WSI) scanners has paved the way for computer-aided diagnosis of histopathological slides.(1) In addition, convolutional neural networks (CNNs) have shown the potential to reduce the workload of pathologists by automating tedious tasks."]} +{"187547|393948": ["There is a rich literature in unsupervised learning of visual representations [5]."]} +{"91938210|8575576": ["This is a desirable property in digital pathology as the substantial portion of a pathologists\u2019 time is performed sifting through benign tissue [21] and any method for increasing throughput has significant advantage in the pathology workflow."]} +{"2088679|393948": []} +{"58623962|8575576": [", image size 500 \u00d7 500, pre-selected by pathologists from WSIs [4], [8].", "Histopathological examination of tissue biopsies plays a fundamental role in cancer diagnosis and survival analysis [4].", "However, the pathologic diagnosis is extremely timeconsuming, laborious and highly dependent on expertise which requires pathologists to carefully examine the biopsies under the microscope [3], [4]."]} +{"54592994|8575576": ["Although manual examination is still the most common approach in clinical pathology, digitalization of stained tissue biopsies and microarrays (TMA) is increasingly gaining ground so as to allow easy sharing and use of computer algorithms to analyze these images [1]."]} +{"46798026|393948": ["It has been suggested that learning a disentangled representation of the data generative factors can be useful for a large variety of tasks and domains (Bengio et al., 2013).", "A disentangled representation can be de\ufb01ned as one where single latent units are sensitive to changes in single generative factors, while being relatively invariant to changes in other factors (Bengio et al., 2013).", "Having a representation that is well suited to the particular task and data domain can signi\ufb01cantly improve the learning success and robustness of the chosen model (Bengio et al., 2013).", "Learning a disentangled posterior distribution of the generative factors of the observed unsupervised sensory input is a major challenge in AI research (Bengio et al., 2013; Lake et al., 2016)."]} +{"202583929|10175374": ["MTL has been widely used in di\ufb00erent domains such as natural language processing, speech, and computer vision [26].", "Multitask Learning Multitask Learning (MTL), also known as joint learning or learning with auxiliary tasks, is a machine learning scenario that uses training signals from other related tasks to solve the harder tasks simultaneously [3, 26]."]} +{"202583929|10137425": ["There have been a wide success of multimodal learning in di\ufb00erent \ufb01elds [23, 1].", "For shared representation learning, early fusion and late fusion are the two most prominent approaches [1]."]} +{"202583929|2088679": ["For pathology, researchers have shown the capability pathologists-level performance on various tasks, such as tumor detection [18, 7], survival outcome prediction [22], and even augmentation of the work\ufb02ow through real-time feedback [4]."]} +{"206870456|8575576": []} +{"44133841|393948": ["This approach therefore helps accelerating the process of gradient-based learning during the training stage [5].", "In particular, representation learning and deep learning approaches are the current state-of-the-art in several computer vision tasks such as object detection, object recognition and image annotation [5, 6].", "These methods attempt to discover more abstract features via higher levels of representation which then could help facilitate high-level decision tasks such as classification or prediction [5].", "CNNs are multilayer neural networks, combining different types of layers (convolutional, pooling, classification) which then need to be trained in a supervised manner [5] for image analysis and classification tasks, which have focused on very small images [7\u20139].", "By contrast, representation learning aims to automatically learn the transformation of data that facilitates high-level prediction and classification tasks using one level or multiple levels of representation (i.e. deep learning) [5\u20137].", "The CNN model is then trained using a stochastic gradient descent approach [5] in order to minimize a softmax loss function (Eq 1): 1 f y \u00f0 i \u00de \u00bc c g log e w c s \u00f0 i \u00de P \u00bc 1 e w l s \u00f0 i \u00de where m is the number of training examples, C is the number of classes, W 2 R C (cid:2) n are the weights of\u2026"]} +{"44133841|8575576": []} +{"8448839|8575576": ["utational capacity have also caused an upsurge of interest in digital pathology. Breast Cancer (BCa) is the most commonly diagnosed cancer among women, and the second leading cause of death worldwide [2]. According to Cancer Research UK, the risk for women being diagnosed with breast cancer is 1 out of 8 in the UK, and approximately 11,600 women died from breast cancer in 2012 [3]. In routine diagnos", "was deemed negative and the amplification ratio for Her2 over-expression was 1.92. 35 Supplementary Material B Related Work on Automated IHC Scoring Automated image analysis is observed as a solution [1,2] to overcome the inter- and intra- observer variations found in conventional assessment of tissue slides. Hence, the automated scoring of routine H&E and IHC stained slides has received huge inter"]} +{"20188920|8575576": ["Pathologists make diagnosis of the disease based on features such as morphology and spatial arrangement of cells [2]."]} +{"4520256|8575576": ["Digital pathology (DP) is the process by which histology slides are digitized to produce high resolution images via whole slide digital scanners [1]."]} +{"50779568|8574504": ["However, deep learning approaches based on FCNs [11] showed significantly higher performance and eventually have substituted them [7]."]} +{"52815643|393948": []} +{"197544975|2088679": ["Deep learning has already shown promise in many medical \ufb01elds 14 with examples in radiology 15 , ophthalmology 16,17 , dermatology 18 and pathology 8 ."]} +{"59250729|8575576": []} +{"85514234|8575576": ["Hence, attaining tissue-level annotations for a significantly large dataset is one of the factors that may delay the acceptability of automated methods in clinical practice [44]."]} +{"7683265|8601873": ["Several surveys of MIL assumptions and algorithms were published in the literature [4], [5], [6], [7]."]} +{"4535622|8575576": ["H ISTOPATHOLOGY images are considered to be the gold standard in the diagnosis of many diseases [1]."]} +{"21593159|8575576": ["Recent literature [1], [2] shows that computer-aid image analysis can significantly improve the objectivity and reproducibility."]} +{"14039779|2088679": []} +{"14039779|8575576": ["Generally, this uncertainty is estimated through a data dependent noise model (Kendall and Gal, 2017), however it would require us to modify the existing architecture."]} +{"204950411|2088679": ["Deep learning has recently received high attention in the computational pathology community [16], [17], [18]."]} +{"204950411|8575576": ["Computational pathology has been used in nuclei segmentation to extract nuclear features such as size, shape, and relationship between them [6], [7]."]} +{"3537028|2088679": ["Current supervised approaches utilize pixel-level annotations (Litjens et al., 2017)."]} +{"24964897|8575576": []} +{"195833671|2088679": []} +{"23873598|8575576": []} +{"59523744|2088679": []} +{"13686104|8575576": []} +{"73459929|10175374": ["ing training data such that it can lower the overfitting risk [48]."]} +{"73459929|2088679": ["Deep neural networks, which automatically learn multi-level feature representations from raw data, have demonstrated stateof-the-art performance in various biomedical image computing applications [8], [10], [11]."]} +{"73459929|8575576": []} +{"1913691|393948": ["Ultimately, to reach a level of usable intelligence, we need (1) to learn from prior data, (2) to extract knowledge, (3) to generalize, (4) to \ufb01ght the curse of dimensionality, and (5) to disentangle the underlying explanatory factors of the data (Bengio et al., 2013)."]} +{"1913691|14843594": []} +{"202540605|209516000": []} +{"202540605|4903005": ["Under this scenario, powerful techniques for multiple-instance learning (MIL) (Carbonneau et al., 2018; Cheplygina et al., 2019; Wang et al., 2018; Zhou, 2004) are generally considered, where individual instance labels (e.g . image pixels, segments or patches) are not observable or do not belong to\u2026", "Under this scenario, powerful techniques for multiple-instance learning (MIL) (Carbonneau et al., 2018; Cheplygina et al., 2019; Wang et al., 2018; Zhou, 2004) are generally considered, where individual instance labels (e.", "Deep WSL techniques (Cheplygina et al., 2019; Zhou, 2017) also provide the advantage of interpretability (Zhang and Zhu, 2018)."]} +{"202540605|4110304": ["In computer vision, visual attention maps represent one of such methods developed to localize reliable regions within the image used by the network to make its prediction (Zhang and Zhu, 2018).", "In computer vision, visual attention maps represent one of such technique developed for pixel-wise localization of regions within the image used by the network to make its prediction (Zhang and Zhu, 2018).", ", 2019; Zhou, 2017) also provide the advantage of interpretability (Zhang and Zhu, 2018).", "Deep WSL techniques (Cheplygina et al., 2019; Zhou, 2017) also provide the advantage of interpretability (Zhang and Zhu, 2018)."]} +{"202540605|2088679": ["Samples are patches from WSIs, and each patch has two levels of annotation:\n\u2022 Image-level label y: the class of the patch, where y \u2208 {normal, metastatic}.", "The WSIs with metastases are further annotated at pixel-level to indicate regions of tumors.", "In order to provide more histology image benchmarks for large scale evaluations of WSL methods, we also propose a protocol to build WSL datasets from WSIs.", "Two tasks were defined in the challenge: identification of individual metastases in WSIs (task 1), and classification of every WSI as either containing or lacking SNL metastases (task 2).", "The WSIs were acquired at two different centers using two different scanners.", "Assuming there is h normal WSIs in this set, we sample the same number of normal patches as the total number of metastatic ones.", "The WSIs are annotated globally to normal or metastases.", "\u20262016; Kandemir\nand Hamprecht, 2015; Daisuke and Shumpei, 2018; Sudharshan et al., 2019; Litjens et al., 2017) and medical video analysis (Quellec et al., 2017), they are focused on fully supervised or semi-supervised learning scenarios (Litjens et al., 2017) for classification and segmentation.", "In order to build train, validation, and test sets, we sample a set of patches from the WSIs where a patch is given an image-level label of metastases or normal depending on whether it contains cancerous pixels or not.", "In histology image analysis, this issue arises as a result of the way the pathologists grade WSIs.", "This section presents a review of state-of-the-art deep WSL models that can be trained to simultaneously perform two tasks \u2013 image classification and pixel-wise localization \u2013 using only WSIs annotated with global labels.", "CAMELYON16 Cancer metastasesin Lymph Nodes WSIs 399 2 classes: normal, metastases Yes Yes (tumor seg.)\nbreast tumor (Spanhol et al., 2016b).", "We note that the sampling of metastatic patches is done separately on the original provided train, and test sets of WSIs.", "Cancer is mainly diagnosed by pathologists who must analyze WSIs, often identifying groups of cells organized in ducts or lobules within a heterogeneous stroma.", "A large annotated dataset of H&E stained breast histology images, composed of both microscopy and WSIs, was specifically compiled and made publicly available for the challenge.", "Recently, histology image analysis has attracted much attention in the ML and computer vision communities (Daisuke and Shumpei, 2018; Litjens et al., 2017; Spanhol et al., 2016a; Sudharshan et al., 2019) resulting in open competitions and public datasets such as GlaS (Sirinukunwattana et al.,\u2026", "The WSIs are extremely large (many gigabytes per image and a resolution of \u223c 100, 0002 pixels for each image) which makes it inconvenient to conduct our experiments for the purposes of this survey.", "Among the provided 399 WSIs, 270 are used for training (111, 159 with and without nodal metastases), and 129 for test (49, 80 with and without nodal metastases)13.", "Metastatic patches are sampled only from metastatic WSIs around the cancerous regions.", "4.2.3) to sample patches from WSIs of the CAMELYON16 dataset (Sec.", "Analyzing WSIs from digitized histology slides allows to facilitate and potentially automate\nComputer-Aided Diagnosis (CAD) in pathology, where the main goal is to confirm the presence or absence of disease and to grade or measure disease progression.", "\u2026for histology slides analysis (Janowczyk and Madabhushi, 2016; Kandemir\nand Hamprecht, 2015; Daisuke and Shumpei, 2018; Sudharshan et al., 2019; Litjens et al., 2017) and medical video analysis (Quellec et al., 2017), they are focused on fully supervised or semi-supervised learning scenarios\u2026", "In our experiments, we consider only Part A since working directly on WSIs adds a heavy complexity to the learning algorithms in terms of memory and running time (Sec.", "The organizers of the challenge collected 399 WSIs of SNLs during the first half of 2015.", "While there have been different reviews of ML/DL models for medical image analysis, and particularly for the analysis of histology WSIs (Daisuke and Shumpei, 2018; Janowczyk and Madabhushi, 2016; Kandemir and Hamprecht, 2015; Litjens et al., 2017; Sudharshan et al., 2019) and medical video analysis (Quellec et al."]} +{"202540605|8575576": ["To put this in context, a single prostate biopsy procedure can contain anywhere between 12 and 20 biopsy samples or approximately 2.5\u20134 billion pixels of data generated per patient study (Hipp et al., 2011; Gurcan et al., 2009).", "Moreover, this type of image often results from the least invasive biopsies, contributing to their common use in disease screening and biopsy purposes (Gurcan et al., 2009).", "The analysis of a histology image remains the gold standard in diagnosing several diseases including most types of cancer (He et al., 2012; Gurcan et al., 2009; Veta et al., 2014).", "An overview of techniques and their applications is provided in (He et al., 2012; Gurcan et al., 2009; Veta et al., 2014).", "For instance, some disease characteristics (e.g . lymphatic infiltration of cancer) may be predicted using only histology images (Gurcan et al., 2009)."]} +{"2001431|8575576": ["For a wider overview of histopathology image analysis techniques for breast cancer and other tissue types, we refer the reader to the recent reviews in Gurcan et al. (2009) and Veta et al. (2014)."]} +{"10159635|8575576": []} +{"715578|8575576": []} diff --git a/edge/graph_209516079.jsonl b/edge/graph_209516079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75d539b04e20374fab5c2ebdcaeb67b52d85cfa5 --- /dev/null +++ b/edge/graph_209516079.jsonl @@ -0,0 +1,12 @@ +{"14118080|6681074": ["3D object representation and matching has been a fundamental part of computer vision research with applications in modeling, visualization, recognition, classification, and scene understanding [3][4][12]."]} +{"62361231|8983048": ["\u2026registration in medical imagery [Maintz and Viergever, 1998, Markelj et al., 2012, Fluck et al., 2011, Pluim et al., 2003] and object reconstructions/recognition [Salvi et al., 2007, Bowyer et al., 2006], there is no scientific publication covering the evolution of registration applied to robotics."]} +{"62361231|206051485": ["Data association is also used in a variety of applications based on images acquired by black and white or color cameras [Zitov\u00e1 and Flusser, 2003]."]} +{"3331003|1482463": ["A popular paradigm for point cloud registration is to estimate f from a set of point correspondences or matches extracted using a 3D keypoint technique [1]."]} +{"10255588|1482463": ["\u2026et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013; Tam et al. 2013] that provide comparative studies, they are far from comprehensive and dif\ufb01cult to extend to all methods in the literature.", "\u2026some reviews and benchmarks that implemented and tested the most commonly used methods [Tangelder and Veltkamp 2004; Salvi et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011 ; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013; Tam et al. 2013]."]} +{"10255588|8983048": []} +{"10255588|987239": ["Although there are some benchmarks [Tangelder and Veltkamp 2004; Salvi et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013; Tam et al. 2013] that provide comparative studies, they are far from\u2026", "Then, a \ufb01tting plane to the translated points is computed. apply principal component analysis (PCA) to the set of points and choose the eigenvector with the lowest associated eigenvalue as the normal of the \ufb01tting plane.", "However, there are some reviews and benchmarks that implemented and tested the most commonly used methods [Tangelder and Veltkamp 2004; Salvi et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011 ; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013;\u2026"]} +{"123987181|8983048": []} +{"52839918|1482463": ["Second, the TLS data pose four major challenges as follows (Tam et al., 2013; Theiler et al., 2015; Yang et al., 2015):\n(1) Data size: A TLS system can rapidly acquire a large volume of point clouds (e.g., up to 300,000 pts/s).", "Second, the TLS data pose four major challenges as follows (Tam et al., 2013; Theiler et al., 2015; Yang et al., 2015): (1) Data size: A TLS system can rapidly acquire a large volume of point clouds (e.", "For a more complete overview, please refer to the evaluation papers (Salvi et al., 2007; Tam et al., 2013; Pomerleau et al., 2015; Weinmann, 2016)."]} +{"52839918|8983048": ["For a more complete overview, please refer to the evaluation papers (Salvi et al., 2007; Tam et al., 2013; Pomerleau et al., 2015; Weinmann, 2016)."]} +{"689166|1482463": ["For other papers, the reader is referred to two surveys on ICP variants [6], [25], a recent survey on 3D point cloud and mesh registration [26], an overview of 3D registration [27] and the references therein."]} +{"15002864|1482463": []} diff --git a/edge/graph_209516328.jsonl b/edge/graph_209516328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1cb3b0b46ee6229ad1f0726e82a963601d2d313d --- /dev/null +++ b/edge/graph_209516328.jsonl @@ -0,0 +1 @@ +{"160010524|3638888": ["have been several surveys that holistically examined the security and privacy of IoT [37, 50, 51]."]} diff --git a/edge/graph_209516429.jsonl b/edge/graph_209516429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38a10da0732eee93dca041eeb6c5d150a57a7aa1 --- /dev/null +++ b/edge/graph_209516429.jsonl @@ -0,0 +1,15 @@ +{"2474294|11608263": ["This intuition has motivated numerous multilabel learning algorithms (see Tsoumakas and Katakis 2007; Tsoumakas et al. 2010; Sorower 2010 for surveys)."]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} +{"704519|38476": ["Structured learning problems have been addressed by algorithms such as conditional random elds (Laert y et al., 2001), max-margin Markov networks (Taskar et al., 2003) and constrained perceptrons (Punyakanok & Roth, 2001); see ( Dietterich, 2002 ) for a review."]} +{"52177689|456491": ["\u2026of that kind are often critisized for computational reasons, and claimed to be in-feasible for large sample studies, but ef\ufb01cient implementations based on algebraic shortcuts exist (Van Loan, 2000; Kashima et al, 2009; Raymond and Kashima, 2010; \u00b4 Alvarez et al, 2012; Pahikkala et al, 2013).", "Output kernels have been mainly developed for multivariate regression, under the framework of vector-valued kernel functions (Caponnetto et al, 2008; Baldassarre et al, 2012; \u00b4Alvarez et al, 2012)."]} +{"52177689|11608263": ["In the multi-label classification community, this approach has an own name and is known as binary relevance learning (Tsoumakas and Katakis 2007).", "Multivariate regression and multi-label classification consider the simultaneous prediction of multiple binary or real-valued targets, respectively (Dembczy\u0144ski et al. 2012; Tsoumakas and Katakis 2007).", "In the multi-label classi\ufb01cation community, this approach has an own name and is known as binary relevance learning (Tsoumakas and Katakis, 2007).", "See Examples 1 to 6 in the text for more details. respectively (Dembczy\u00b4nski et al, 2012; Tsoumakas and Katakis, 2007)."]} +{"3627653|11608263": ["Hamming loss, Subset Accuracy, Accuracy, Precision and Recall are the mostly used evaluation metrics for the performance of a multi-label classifier (Lin et al. , 2013; Tsoumakas and Katakis, 2007; Tsoumakas et al. , 2010; Xiao et al. , 2013)."]} +{"3627653|15273230": ["Various over-and under-sampling methods have been proposed (Bunkhumpornpat et al. , 2009; Chawla, 2010; Chawla et al. , 2002; Dong and Wang, 2011; Gao et al. , 2011a,b; Luengo et al. , 2011; Seiffert et al. , 2008; Zhang et al. , 2012).", "Chawla (2010) argued that SMOTE creates effective regions for learning the minority class rather than being subsumed by the majority class samples around them.", "Among them, SMOTE (Synthetic Minority Oversampling TEchinque) (Chawla, 2010; Chawla et al. , 2002) is a state-of-art over-sampling methods.", "Unquestionably, the sampling approach continues to be popular (Chawla, 2010)."]} +{"14064264|11608263": ["Tsoumakas and Katakis [2] have presented the \ufb01rst overview of methods for multi-label learning where the methods for multi-label learning are divided into two categories: algorithm adaptation and problem transformation methods.", "Tsoumakas and Katakis [2] summarize them into two main categories: (a) algorithm adaptation methods and (b) problem transformation methods.", "MR is designed to \ufb01nd a hypothesis which ranks the correct labels at the top.", "Decision trees : Clare et al. [11] adapted the C4.5 algorithm for multi-label data (ML-C4.5) by modifying the formula for calculating entropy.", "This group of methods consists of methods that use ensembles to make multi-label predictions and their base classi-\ufb01ers belong to either problem transformation or algorithm adaptation methods."]} +{"15372267|11608263": ["Independent classifiers (IC) [24] Classifier Chains (CC) [15] Maximum Entropy Markov Model (MEMM) [13] Random k-labelled Subsets (RAkd) [17] k1\u204443 Classifier Trellis (CT) [22] l = 2 Probabilistic Classifier Chains (PCC) [16] M1\u20444100 Viterbi Classifier Chains (VCC) Seq.", "called \u2018problem transformation\u2019 methods [24])."]} +{"15372267|38476": ["MEMMs are thus very efficient, but without a backward smoothing pass, they suffer from the label-bias problem [13], where a weak probability dilutes the probability inertia across time.", "Independent classifiers (IC) [24] Classifier Chains (CC) [15] Maximum Entropy Markov Model (MEMM) [13] Random k-labelled Subsets (RAkd) [17] k1\u204443 Classifier Trellis (CT) [22] l = 2 Probabilistic Classifier Chains (PCC) [16] M1\u20444100 Viterbi Classifier Chains (VCC) Seq.", "Linear chain conditional random fields (CRFs) [6,13] and CRFs in general are a class of model that overcomes the label-bias problem by generalizing feature functions.", "Approaching the same task from a discriminative point of view, the marginals ( | ) p y x t t 1: can be modelled directly, resulting in a socalled Maximum-entropy Markov Model (MEMMs) [13], see Fig."]} +{"16615590|393948": ["Secondly , hidden ReLUs encourage a sparse intermediate representation that is presumably more discriminative (Bengio et al., 2013b; Olshausen & Field, 1997).", "\u2026such relationships can undoubtedly be exploited directly\u2014some labels are predictable based on the co-occurrence with the others\u2014the traditional deep neural networks incorporate label dependence information into the learning process only through multitasking (Nam et al., 2014; Bengio et al., 2013b).", "Finally, techniques such as Laconic (Bengio et al., 2013a) use external knowledge about label co-occurrences to regularize the model."]} +{"16615590|11608263": ["(MLC) consists in reducing the original problem to several independent single-label tasks (Tsoumakas & Katakis, 2007).", "While performance on the former task is well summarized by two principal measures , precision and recall (and their combinations, such as F 1 ), performance on the latter can be assessed in a variety of ways (Tsoumakas & Katakis, 2007)."]} +{"9232391|456491": ["\u00b4Alvarez et al. 47 reviewed at length kernel methods for vector-valued functions, focusing especially on regularization and Bayesian prospective, connecting the two points of view.", "2005 Micchelli and Pontil(9) 2005 \u00c1lvarez at al.(47) 2012 De\u2019ath(49) 2002 Appice and D\u017eeroski(2) 2007 Kocev et al.", "\u00c1lvarez et al.(47) reviewed at length kernel methods for vector-valued functions, focusing especially on regularization and Bayesian prospective, connecting the two points of view."]} +{"9232391|11608263": []} +{"8399243|11608263": ["\u2026problems can often be found when text is assigned with different topics or tagged with keywords, but there are alsomany examples fromother domains such as the identification of music instruments or emotions in audio recordings or the classification of scenes in images (Tsoumakas and Katakis 2007).", "Such so-called multi-label problems can often be found when text is assigned with different topics or tagged with keywords, but there are alsomany examples fromother domains such as the identification of music instruments or emotions in audio recordings or the classification of scenes in images (Tsoumakas and Katakis 2007).", "Due to the vast amount of work onMLC, we refer the reader to the excellent surveys available for a more complete overview (Tsoumakas and Katakis 2007; Tsoumakas et al. 2010; Zhang and Zhou 2014; Gibaja andVentura 2014)."]} diff --git a/edge/graph_209526906.jsonl b/edge/graph_209526906.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e221f2c46470180d67d1c42e14541fa87ccbdc89 --- /dev/null +++ b/edge/graph_209526906.jsonl @@ -0,0 +1,3 @@ +{"182325840|15273230": []} +{"55430922|9594629": ["Since both TLS instruments operate at different wavelengths, intensity features cannot be used comparatively within the time series of point clouds in a straight forward manner and would require correction (e.g. Kashani et al., 2015)."]} +{"210637588|9594629": []} diff --git a/edge/graph_209527782.jsonl b/edge/graph_209527782.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..584cdaedce1aee64ee3819ca39be77d9468842f7 --- /dev/null +++ b/edge/graph_209527782.jsonl @@ -0,0 +1,3 @@ +{"204246431|7076154": ["For a point of view through temporal scales, multiscale entropy allows to quantify the complexity of a time series by studying the evolution of the irregularity through temporal scales [4]."]} +{"195825312|7076154": []} +{"45035476|7076154": []} diff --git a/edge/graph_209528420.jsonl b/edge/graph_209528420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e719a55866e02d1c0c18f0d6e2e74d98f7ee6f59 --- /dev/null +++ b/edge/graph_209528420.jsonl @@ -0,0 +1,7 @@ +{"19294741|35981896": ["While PAT\u2019s potential for an increasing variety of clinical applications is currently being explored [2, 3], it is already widely used in preclinical studies to examine small animal anatomy, physiology and pathology [4, 5, 6]."]} +{"5748593|2088679": ["Deep learning techniques are currently the state of the art for visual object recognition, natural language understanding or applications in other domains such as drug discovery or biomedical image analysis (see, for example, [5, 14, 27, 39, 43, 50, 52, 70] and the references therein)."]} +{"206592484|456491": []} +{"51981351|2088679": []} +{"4321879|35981896": ["2820382 energy by sensing laser-generated ultrasound (US) [2]\u2013[7]."]} +{"3899943|35981896": ["PAT is increasingly widely used in preclinical studies to image small animal anatomy, pathology and physiology [37, 41, 38] and PAT\u2019s potential as a clinical technique is also being actively explored [20, 42, 31]."]} +{"46899325|10198276": ["To determine the authenticity and processing history of digital images, researchers have developed numerous forensic approaches during the last decade [1]."]} diff --git a/edge/graph_209531673.jsonl b/edge/graph_209531673.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209531740.jsonl b/edge/graph_209531740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ae8808d14c461d67b009fb6d5ab499b852fd185 --- /dev/null +++ b/edge/graph_209531740.jsonl @@ -0,0 +1,54 @@ +{"15641792|16907530": ["The same argument is shared by Kotlarsky and Oshri (Kotlarsky and Oshri, 2005) and Nurdiani et al. (Nurdiani et al, 2011)."]} +{"15641792|11139156": ["Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge exchange is found to be one of the critical success factors for o \u21b5 shore software development by Khan et al. (Khan et al, 2009).", "Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge\u2026"]} +{"45869488|30026035": []} +{"207046637|6755414": ["Mathematical Information Retrieval (MIR) is a relatively new research area, lying at the intersection of text-based information retrieval [62,125], content-based image retrieval [35, 38, 132] and Mathematical Knowledge Management (MKM [25])."]} +{"207046637|2762290": ["OCR for math is a difficult problem, due to the large number of classes (see [94]), and problems caused by touching and over-segmented characters [27,52,99,136]."]} +{"207046637|15782139": ["ument recognition, perhaps the most well-known example of post-processing is the use of dictionaries and n-grams to refine preliminary OCR results obtained for individual characters [107,115]."]} +{"9608446|15782139": []} +{"206592484|456491": []} +{"28964806|15782139": []} +{"23896497|619938": ["They can be obtained from each document image by means of conventional text line detection and segmentation techniques [29]."]} +{"53286887|5729190": ["There have been already several excellent review papers [136], [154], [160], [172], which also comb and analyze works related text detection and recognition.", "More detailed and comprehensive coverage of these works can be found in [136], [154], [160], [172]."]} +{"53286887|6972141": [", 2016), robots navigation (DeSouza and Kak, 2002; Liu and Samarabandu, 2005a,b; Schulz et al., 2015), and industrial automation (Ham et al."]} +{"2228310|11792588": ["[12]."]} +{"54445891|3680335": ["nown as feature maps. Every output feature map consists of patterns or features extracted on locations of the input feature map. Every stage is made up of layers after which classication takes place [35,36,37]. Generally, these layers are: 1.Convolution layer: This layer makes use of lters, which are convolved with the image, producing activation or feature maps. 2.Feature Pooling layer: This layer is inse"]} +{"54445891|5401262": ["uthor Preprint submitted to Elsevier January 23, 2019 arXiv:1812.01555v2 [cs.CV] 20 Jan 2019 1. Introduction Computing paradigm has shifted from computer-centered computing to humancentered computing [1]. This paradigm shift has created tremendous opportunity for computer vision research community to propose solution to existing problems and invent ingenious applications and products which were not t"]} +{"2811761|15782139": ["The extraction of the features which are used for the recognition process is a very difficult task [22, 26]."]} +{"14986843|15782139": ["Handwriting recognition is traditionally divided into off-line and on-line recognition [12]."]} +{"371064|15782139": ["Signature verification has been reviewed in [61], [102] and recent works are reported in [44], [57].", "A recent comprehensive survey of handwriting recognition, by Plamondon and Srihari, mainly concerns western handwriting [102]."]} +{"371064|192934": ["pattern recognition [43], is effective to improve the", "), which can be estimated from samples using well-known estimation and learning techniques [22], [25], [43].", "Various statistical techniques [43] are applicable for classification when describing the input pattern as a feature vector."]} +{"16201062|11792588": ["The on-line methods have been shown to be superior to their off-line counterparts in recognizing handwritten characters due to the temporal information available with the former [3]."]} +{"16201062|2762290": ["Segmentation In the segmentation stage, an image of sequence of characters is decomposed into sub-images of individual character [11]."]} +{"16201062|15782139": ["However, in the off-line systems, the neural networks have been successfully used to yield comparably high recognition accuracy levels [4]."]} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} +{"155093487|5729190": []} +{"9065822|619938": []} +{"49680066|67717275": []} +{"27527196|619938": ["A good overview of algorithms for text-line extraction is given in [72]."]} +{"27527196|16082889": ["Comparable arguments can, for example, also be found in [22,108,115], just to mention some examples."]} +{"27527196|11792588": ["In this respect, Arica and Yaman-Vural in [2] discuss a kind of taxonomy very thoroughly."]} +{"27527196|14580698": ["Comparable arguments can, for example, also be found in [22,108,115], just to mention some examples."]} +{"27527196|15782139": [", [2,22,54,99,115])."]} +{"62693226|13088291": ["Different types of Nearest Neighbour techniques have been reported in the literature [22]."]} +{"62693226|11792588": ["Pre-processing shapes the input image into a form suitable for segmentation [4]."]} +{"62693226|2762290": ["Segmentation In the segmentation stage, an image consisting of sequence of characters is decomposed into sub-images of individual character [13]."]} +{"62693226|15782139": ["edu information available with the former [3]."]} +{"3047756|12663580": ["There are many pieces of work towards handwritten recognition of Roman, Japanese, Chinese and Arabic scripts, and various approaches have been proposed by the researchers towards handwritten character recognition [1, 6-11]."]} +{"3047756|15782139": ["There are many pieces of work towards handwritten recognition of Roman, Japanese, Chinese and Arabic scripts, and various approaches have been proposed by the researchers towards handwritten character recognition [1, 6-11]."]} +{"205905441|192934": []} +{"52273993|15782139": ["sibility of dynamic data, for example, the strokes of handwriting [1]."]} +{"15782139|2762290": []} +{"15782139|6746689": []} +{"14635907|16082889": ["Despite more than 30 years of handwriting recognition research [2], [3], [ 4 ], [5], developing a reliable, general-purpose system for unconstrained text line recognition remains an open problem."]} +{"14635907|15782139": []} +{"12531971|11792588": []} +{"12531971|15782139": ["Related surveys are found in [12], [13], [ 14 ], [15]."]} +{"1738470|10500613": []} +{"13845213|5729190": ["Most of the work on natural scene text detection and recognition has been performed for English text due to the availability of large datasets [11], [12].", "to identify speed limits and road traffic rules), and many more [11], [12]."]} +{"13845213|6972141": ["Accurate detection and recognition of text could also be helpful for a variety of vision-based applications such as: robot navigation [4], text-based target identification [5], language translation for foreign visitors [6], navigation assistance for visually impaired persons [7], industrial automation [8], content-based image retrieval [9], video indexing [10], intelligent vehicle number plate recognition, autonomous driving systems (e."]} +{"17106540|2762290": []} +{"18143011|11792588": []} +{"37819212|6746689": []} +{"15788075|13558235": ["Different types of range block partitioning were described in [ 9 ]."]} +{"15788075|15782139": ["Some previous works on recognition of isolated characters, words and scripts of Farsi and Arabic language have used some structural features [ I ] [2] and moment features [3].Fractal theory has been used in several areas of image processing and computer vision.", "As mentioned before, a 0, block has 4 times as many pixels as an^, , so we must either subsample (choose I from each 2x2 suh-square OfD,) or average the 2x2 sub-squares corresponding to each pixel of R,wben we minimize equation (2) [SI.", "Encoding algorithm can be summarized as follow I - Input the original binary image."]} diff --git a/edge/graph_209531954.jsonl b/edge/graph_209531954.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11669a9ff996c72019759de1b573b2f9670a0afe --- /dev/null +++ b/edge/graph_209531954.jsonl @@ -0,0 +1,13 @@ +{"206596260|393948": ["We interpret the network as a trainable feature extractor, \u03c6 : X \u2192 R, followed by a single classification layer with as many sigmoid output nodes as classes observed so far [3].", "The recent success of (deep) neural networks can in large parts be attributed to their ability to learn not only classifiers but also suitable data representations [3, 21, 25, 36], at least in the standard batch setting."]} +{"206592484|456491": []} +{"61807685|10198276": []} +{"204939260|67873215": ["Based on this security gap in the process, the vulnerability of face recognition systems to so-called morphing attacks has been recently exposed [71], [72].", ", spoofing attacks (also referred to as presentation attacks) [81] or face morphing attacks [71], [72]."]} +{"204939260|416565": ["Certainly, there is a need for reliable presentation attack detection in face recognition systems [84], [85].", "Also, presentation attack detection methods for face recognition systems [84], [85], especially those designed for skin detection, could be applied for detecting facial beautification."]} +{"1033682|174797842": []} +{"2460828|7158350": ["This kind of neural networks show very good results on various classification problems [24]."]} +{"18800070|393948": ["Very recently, inspired by impressive results in the closely related \u0080elds of computer vision and pa\u008aern recognition [17], the multimedia forensics community began focusing on the use of deep learning [3, 19], especially convolutional neural networks (CNN) [27]."]} +{"207930418|210838881": []} +{"207930418|209531954": []} +{"52157475|9415965": []} +{"207237303|10198276": ["variety of information forensic techniques to determine the authenticity and processing history of digital images [20]."]} +{"206652126|17221751": ["Recent years have seen an increased interest in machine analysis of faces [58], [45].", "these respective fields [18], [31], [58], [17].", "Past years have seen huge progress in automatic analysis of above mentioned behaviors [20], [58], [45]."]} diff --git a/edge/graph_209542772.jsonl b/edge/graph_209542772.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63bbfaa680f8ba227f45679430fe51d0e482a928 --- /dev/null +++ b/edge/graph_209542772.jsonl @@ -0,0 +1,9 @@ +{"195835568|15136633": []} +{"8997902|10500613": []} +{"53424462|15136633": []} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} +{"202984536|64487699": ["For instance, there is continuous debate between researchers in the global north and south about open pedagogy [35]."]} +{"202984536|627405": ["Qualitative syntheses are applied in several computer science areas, such as software engineering [19] and educational robots [20]."]} +{"202984536|15164501": ["Hu, Li, Li and Huang [12] stated that there is insufficient investigation of OER adoption in developing countries, including China, and that this should be changed, especially because understanding the cultural context of educational institutions within a country is critical to considering how to successfully mainstream OER [14,15]."]} diff --git a/edge/graph_209545802.jsonl b/edge/graph_209545802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2095850.jsonl b/edge/graph_2095850.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_20959692.jsonl b/edge/graph_20959692.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209695855.jsonl b/edge/graph_209695855.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4229872365f18f0d0b3f6db1c940796e201975f5 --- /dev/null +++ b/edge/graph_209695855.jsonl @@ -0,0 +1,4 @@ +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"30645043|49527603": ["Some of the emerging applications that can bene\ufb01t from this model include \ufb01nance, government services [30,31], IOT (Internet of Things) [26] and regulation compliance [27]."]} +{"46973701|15459551": ["The bidirectional power flow of EV charging/discharging in the smart grid system is envisaged to reduce the subsidiary (reserved) power generation cost and increase the grid system robustness [1]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} diff --git a/edge/graph_209832359.jsonl b/edge/graph_209832359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf655c03b73b37ceed98e820da62741defaa4e6a --- /dev/null +++ b/edge/graph_209832359.jsonl @@ -0,0 +1,2 @@ +{"2856058|16364156": ["approximately, we apply the decadic logarithm to the approximately Rayleigh-distributed amplitude images [31]."]} +{"2333412|3110415": ["For the study of other objects in urban areas, such as roads, roofs, and fa\u00e7ades, we refer the readers to the papers [61]\u2013[63] and the survey [64]."]} diff --git a/edge/graph_209843428.jsonl b/edge/graph_209843428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15a51d85584b99b66b5359676b708f4b244cf174 --- /dev/null +++ b/edge/graph_209843428.jsonl @@ -0,0 +1,6 @@ +{"85872|6396569": ["For a general overview, we refer to [12] for a more comprehensive survey."]} +{"3249290|53116003": ["While we discuss the type of services that localization can provide by leveraging the IoT framework [87] in Section VII, below we present and"]} +{"3249290|4427557": ["Low Power Wide Area Networks (LPWANs) such as LoRA and Sigfox in its current shape cannot provide high localization accuracy and must be combined with other localization techniques and technologies for higher localization accuracy [156]."]} +{"3249290|6396569": ["Amundson and Koutsoukos [11] presents a survey on different localization methods for wireless sensors."]} +{"3249290|206583375": []} +{"52965866|3272873": ["The localization accuracy (less than 1 meter) of RFID [17] depends on densely deployed RFID readers, which are very expensive."]} diff --git a/edge/graph_209861991.jsonl b/edge/graph_209861991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7594bcd48ca111c97757176cbe2e030ed49a07e8 --- /dev/null +++ b/edge/graph_209861991.jsonl @@ -0,0 +1,20 @@ +{"208910757|198986097": ["Generally, object detection and recognition within the computer vision community is one of the well-known problems and many researchers have proposed promising methods to autonomously detect and track objects from daily life photographs and videos [5]."]} +{"208910757|198147317": ["Apart from this, many researchers have used convolutional neural networks (CNN) for detecting and tracking objects [13-15].", "Morris et al. [13] used CNN for automatically identifying threatening items through x-ray imaging."]} +{"26106276|62701834": ["BoWs model is a well-known methodology that has been widely used in the computer vision community on optical images [56] and X-ray images [12]."]} +{"26106276|393948": ["In recent years, \u201cdeep learning\u201d has been successfully used in image and video recognition [49], [50]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"59291942|4097106": ["Anomaly detection is a major area of interest within the field of machine learning with various real-world applications spanning from biomedical [9] to video surveillance [10].", "A significant body of prior work exists within anomaly detection for visual scene understanding [1]\u2013[5] with a wide range of application domains [6]\u2013[10].", "Taken together, these studies support the notion that the use of reconstruction-based approaches shows promise within the field [9], [10], [12]\u2013[14]."]} +{"59291942|20404279": ["Training AAE provides superior reconstruction as well as the capability of controlling the latent space [20], [27], [28]."]} +{"21688963|4097106": []} +{"21688963|20404279": []} +{"21688963|3330313": []} +{"21688963|12948993": ["s (230;275) are extracted via an overlapping sliding window from a full X-ray image, constructed using single conventional X-ray imagery with associated false color materials mapping from dual-energy [42]. Abnormal classes (122;803) are of 3 sub-classes - knife (63;496), gun (45;855) and gun component (13;452) - contain manually cropped threat objects together with sliding window patches whose interse"]} +{"52222391|12948993": ["This work largely concludes that the choice of the feature descriptor, feature sampling/detection strategy and the final classification framework had a significant impact on performance [10, 11, 13] with the use of simplistic feature descriptors notably outperforming 3D derivatives of established approaches (e.", "A related body of work in 3D Computed Tomography (CT) for baggage security has investigated a 3D BoVW approach with suitable extensions to the relevant feature detection and descriptor approaches [10, 11, 12, 13]."]} +{"15677402|20611849": ["\u2026on visual search in x-ray images, optimizing technology, and using security training programs to improve detection performance (e.g., von Bastian et al., 2008; Koller et al., 2009; Halbherr et al., 2013; Mendes et al., 2013; Wolfe et al., 2013; Biggs and Mitroff, 2014; Mitroff et al., 2015)."]} +{"18641337|15744805": ["This is a nearly impossible task for most images and for this reason alone most comparisons have been based on artificial data sets for which ground-truth is easy to establish [2,20,21, 22 ]."]} +{"61809429|4097106": ["[22]\u2013[24]), and rarely in security X-ray [25]\u2013[28]."]} +{"2084038|12948993": ["Our data-set (6997 X-ray images) are constructed using single conventional X-ray imagery with associated false color materials mapping (from dual energy, [26] see Figure 1 and 2)."]} +{"3451234|12948993": ["Previous work [2,3] has focused on image enhancement [4\u20136], segmentation [7, 8], classification [9\u201313] or detection [14\u201317] tasks in order to further investigate the real time applicability of CAS to automatize aviation security screening.", "We use a dataset constructed using multi-view conventional X-ray imagery with associated false color materials mapping (from dual energy, [2] see Figure 1)."]} +{"9019758|12948993": ["More ATD research has been carried out in baggage, and detailed summaries can be found in the review by Mouton et al. [54]."]} +{"21720699|12948993": ["1) Datasets: To perform classification tasks, we use four types of datasets described below: Dbp2: Our data-set (11, 627 X-ray images) are constructed using single conventional X-ray imagery with associated false color materials mapping from dual-energy [21] (see Figure 1).", "An extensive review is presented in [21] and [22].", "For a detailed overview the reader is directed to Mouton and Breckon [21] and Rodgers et al. [22].", "For a detailed overview the reader is directed to Mouton and Breckon [21] and Rodgers et al.", "Previous work [21], [22] has focused on image enhancement [23]\u2013[25], segmentation [26], [27], classification [1], [2], [4], [6], [17] or detection [5], [10], [28], [29] tasks in order to further investigate the real time applicability of CAS to automatize aviation security screening.", "S. Akcay, C. G. Willcocks, and T. P. Breckon are with the Department of Computer Science, Durham University, Durham DH1 3LE, U.K. (e-mail: samet.akcay@durham.ac.uk; christopher.g.willcocks@durham.ac.uk; toby.breckon@durham.ac.uk)."]} +{"202750087|12948993": ["To date, contemporary X-ray security scanners already implement material discrimination via dual-energy multiple view X-ray imagery to enable threat material detection [18]."]} diff --git a/edge/graph_209862035.jsonl b/edge/graph_209862035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..447287aff57516a27dba5b04552e3a361ca4b733 --- /dev/null +++ b/edge/graph_209862035.jsonl @@ -0,0 +1,6 @@ +{"19186315|10175374": ["Therefore, we propose to train them together as multi-task learning (Ruder, 2017)."]} +{"14786967|393948": ["As argued by Bengio et al. (2013), the use of deep networks can offer both computational and statistical ef\ufb01ciency for complex tasks."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"6582185|10175374": ["It can be performed jointly on multiple tasks [37] which includes learning linguistic tasks in a hierarchical fashion [41] on many levels [11] or even perform the knowledge transfer between tasks from different modalities [18]."]} +{"61191991|2281773": []} +{"7228830|17652653": []} diff --git a/edge/graph_209862736.jsonl b/edge/graph_209862736.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8360ec9f5b52a42139b2e595ca66afc88fdbbc8c --- /dev/null +++ b/edge/graph_209862736.jsonl @@ -0,0 +1,5 @@ +{"17964596|17485266": ["[89] provides a good overview of these various methods with equations and notes a few other concerns when performing stochastic optimization."]} +{"44157913|7559976": ["Domain adaptation surveys have been done in the perspective of computer vision (Csurka, 2017) and machine learning (Pan and Yang, 2010; Weiss et al."]} +{"195069084|44157913": ["In-domain monolingual data has been used for NMT in other ways [31]."]} +{"202660912|44157913": ["While several approaches have been explored in literature (Chu and Wang, 2018), full \ufb01ne-tuning of model parameters remains the dominant approach for adapting to new domains and languages (Luong and Manning, 2015; Neubig and Hu, 2018).", "Several approaches have been proposed in recent literature that try to address the shortcomings of full \ufb01ne-tuning when applied to domain adaptation (Chu and Wang, 2018)."]} +{"1359852|1040974": ["As for the known difficulties concerning\ne.g. the formulation of fail-soft rules or the presence of surface clues (see Slocum, 1985,5; Vauquois and Boitet, 1985), it appears that for a multilingual system of MT these disadvantages have to be compared with those present in the large number of binary\u2026"]} diff --git a/edge/graph_209901047.jsonl b/edge/graph_209901047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..991001b82b96576215d17f213c4163c32d7f53bd --- /dev/null +++ b/edge/graph_209901047.jsonl @@ -0,0 +1,2 @@ +{"14955970|12957829": ["The tradeoff, between exploration and exploitation for formidable population-based optimizers that follow different philosophies and paradigms [12], has been successfully and widely applied in scientific and engineering research [13]."]} +{"52946873|6430931": []} diff --git a/edge/graph_209901187.jsonl b/edge/graph_209901187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f848415aea5cb7b5a3f9ed57f4d38a9fe4710dd2 --- /dev/null +++ b/edge/graph_209901187.jsonl @@ -0,0 +1,35 @@ +{"1648742|11608263": ["They are described as follows [8], [1], [9].", "5, Naive Bayes and Binary-SVM [8], [9]."]} +{"5539628|11608263": ["Binary relevance (BR) (Tsoumakas and Katakis 2007): It serves as a baseline that trains each label independently."]} +{"195588633|11608263": ["It has already been well established that multi-label data can be transformed into single-label data via the process of problem transformation [18].", "Scene and Yeast are well known datasets in the multi-label literature (see for example [18]), although they are unfortunately of insufficient size for a data-stream setting.", "We use subset accuracy as defined in [18]:", "The most well-known and widely documented problem transformation method is the binary relevance method (BR) [18]."]} +{"15198485|11608263": ["The adopted measures are common and used in [4], [5], [6], and [11].", "= = \u2227 = \u2228 \u2211 \u2211 \u2211 (7) Hamming-accuracy [4], [5], [6]: The metric analyses the binary relevance of each label for all samples.", "They used the multilabel information gain to filter the multi-label data streams to different leaf nodes where a multi-label classifier was built by PS [3] method based on Label Combination.", "RELATED WORK The current approaches for multi-label stream classification can be sorted to Binary Relevance and Label Combination [5], [6].", "Binary Relevance transforms a multi-label classification problem into multiple binary problems, one for each label, but Label Combination treats each label combination as an atomic class to form a single-label problem.", "Subset Accuracy [4], [5], [6], [11]: It gives a score ([0, 1]) calculated from the actual and predicted label set for each sample."]} +{"12545196|11608263": ["The existing MLC methods can be cast into two strategies: problem transformation and algorithm adaptation [Tsoumakas and Katakis, 2007]."]} +{"40586773|11608263": ["Multi-label classification methods could be categorized into two groups [4]: i) problem transformation methods; and ii) algorithm adaptation methods.", "On the other hand, traditional classification problems where each example assigned to a single label l from a set of disjoint labels L [4], while, multi-label classification problems where each example can be assigned to a set of labels Y \u2286 L, where L is a set of disjoint labels."]} +{"17856845|11608263": ["al [23] categorized the existing batch learning based multilabel classification algorithm available in literature into two categories: Problem Transformation (PT) methods and Algorithm Adaptation (AA) methods.", "Label density also factors the number of labels in the dataset in addition to the average number of labels [23]."]} +{"6418797|11608263": ["\u2026apart from the fact that complexity is not our main concern here, one may argue that several other methods suffer from the same problem, including the label power-set approach (Tsoumakas & Katakis, 2007), as also graphical models estimating the joint distribution (Ghamrawi & McCallum, 2005)."]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} +{"9481781|11608263": ["Finally, section 7 concludes this work and points to future research directions."]} +{"127142471|11608263": []} +{"2474294|11608263": ["This intuition has motivated numerous multilabel learning algorithms (see Tsoumakas and Katakis 2007; Tsoumakas et al. 2010; Sorower 2010 for surveys)."]} +{"46839264|11632848": []} +{"46839264|11608263": []} +{"207211581|11608263": ["In a survey on multilabel classification, Tsoumakas and Katakis (2007) distinguish between two categories of approaches, namely, those which employ a transformation into a set of binary classification problems and approaches adapting existing methods to handle multilabeled data directly.", "In a survey on multilabel classification, Tsoumakas and Katakis (2007) distinguish between two categories of approaches, namely, those which employ a transformation into a set of binary classification problems and approaches adapting existing methods to handle multilabeled data directly."]} +{"13603335|11608263": ["Experimental results on yeast dataset Method HamLoss Accuracy Recall Precision2 BinarykNN[3] 0.", "Experimental results on yeast dataset\nMethod HamLoss Accuracy Recall Precision2 BinarykNN[3] 0.229 0.495 0.628 0.596 C4.5[3] 0.286 0.339 0.528 0.529 Na\u00efve Bayes[3] 0.243 0.464 0.608 0.575 BinarySVM[4] 0.206 0.530 0.672 0.615 OVO3CSVM[14] 0.199 0.537 0.654 0.693 OVODLSVM(our) 0.181 0.572 0.697 0.606\nTable 3.", "(19) According to (19), four criteria in [3][5][6] are utilized in this paper, i.", "Experimental results on scene\ndataset Method HamLoss Accuracy Recall Precision2 BinarykNN [3] 0.113 0.668 0.703 0.668 C4.5[3] 0.148 0.572 0.598 0.584 Na\u00efve Bayes [3] 0.139 0.603 0.631 0.633 BinarySVM [4] 0.100 0.704 0.737 0.713 OVO3CSVM [14] 0.089 0.746 0.800 0.775 OVODLSVM(our) 0.098 0.701 0.853 0.711\nIn order to compare our method with some other existed ones, we directly cite some experimental results from [3][4][14], as shown in Tables 2 and 3 too, in which the best results are underscored using bold fonts.", "The multi-label problem is a special classification issue where some instances belong to many classes or include many labels at the same time [1]-[3].", "In [3][4][11], combing this decomposition strategy with binary SVM was validated, whose main drawbacks cover that the optimization scale is the same for all sub-classifiers and positive instances are much less than negative ones.", "711 In order to compare our method with some other existed ones, we directly cite some experimental results from [3][4][14], as shown in Tables 2 and 3 too, in which the best results are underscored using bold fonts.", "Experimental results on scene dataset Method HamLoss Accuracy Recall Precision2 BinarykNN [3] 0.", "So SVM has been used as a baseline classifier to build several SVMbased multi-label methods [3][4][11]-[14]."]} +{"52802891|11608263": ["For the reasons mentioned previously, our main interest is focused on MLKNN, which is arguably the state-of-the-art in instance-based multilabel ranking; we used its implementation in the MULAN package (Tsoumakas and Katakis 2007).", "For the reasons mentioned previously, our main interest is focused on MLKNN, which is arguably the state-of-the-art in instance-based multilabel ranking; we used its implementation in the MULAN package (Tsoumakas and Katakis 2007). MLKNN is parameterized by the size of the neighborhood, for which we adopted the value k = 10. This value is recommended in Zhang and Zhou (2007), where it was found to yield the best performance."]} +{"30620986|11608263": ["For each example, if original example contains label l, (l \u2208 L), then it is labeled as l in the generated single label data set Dl, and as \u00acl otherwise [5].", "Multi-label classification methods could be categorized into two groups [5]: problem transformation methods, and algorithm adaptation methods.", "For the traditional classification tasks, each example is assigned to a single label l from a set of disjoint class labels L [5], while for multi-label classification tasks, each example can be assigned to a set of class labels Y \u2286 L.", "Binary Relevance (BR) learning is a widely used problem transformation method [5]."]} +{"53722003|11608263": ["The binary context as used in ECC usually entails considerable redundancy in the learning space, as also noticed in the case of the multi-label binary approach in Yan et al. (2007). Some other methods have also been used in the literature for reducing the complexity of binary relevance problems by taking advantage of label sparsity using compressive sensing techniques (Tai and Lin 2010; Hsu et al.", "The most common problem transformation method is the binary relevance method (BR) (Tsoumakas and Katakis 2007; Godbole and Sarawagi 2004; Zhang and Zhou 2005).", "Here, Label Cardinality (LCARD) is a standard measure of \u201cmulti-labelled-ness\u201d, introduced in Tsoumakas and Katakis (2007). It is simply the average number of labels associated with each example; defined for N examples as:"]} +{"18515363|11608263": ["Several works sought to model this information by using the vector of class labels as additional example attributes.", "Recall that N and L denote the numbers of examples and classes, respectively."]} +{"14676146|11608263": ["\u2026j=1 min(log-loss(y\u0302(i)j , y (i) j ), ln(N))\nwhere:\nlog-loss(y\u0302, y) = \u2212(ln(y\u0302)y + ln(1 \u2212 y\u0302)(1 \u2212 y)) All measures have been reviewed in Read (2010) and are commonly used in the literature (e.g. Tsoumakas and Katakis 2007; Tsoumakas and Vlahavas 2007; Read et al. 2009; Cheng et al. 2010).", "We use the version of this dataset specified in Tsoumakas and Vlahavas (2007). IMDB comes from the Internet Movie DataBase; data, where movie plot text summaries are labelled with relevant genres.", "The methods which we outline\nhere have been previously discussed and cited in many works, for example, Tsoumakas and Katakis (2007), Read (2010) both give detailed overviews.", "Table 2 displays the performance of the binary relevance BR and label combination LC problem transformation methods on both synthetic datasets, as well as a selection of real datasets (Scene, Yeast, Enron, and Medical; see e.g. Tsoumakas and Katakis 2007;\nRead 2010 for details), for comparison."]} +{"52843253|11608263": ["dataset is, Label Cardinality and Label Density are used. Label Cardinality is the average number of relevant labels of the instances in D; Label Density is the Label Cardinality per number of labels [30], indicating the percentage of labels that are relevant on average. LC(D)= 1 N \u00d5N i=1 |yi| LD(D)= LC(D) L = 1 LN \u00d5N i=1 |yi| Our experiments are conducted on 7 datasets1 that are from diverse applicat"]} +{"14509243|11608263": ["(Tsoumakas and Katakis 2006) categorized the techniques into two categories: PT methods and AA methods.", "2 (Tsoumakas and Katakis 2006) Label density of the dataset is the average number of labels of the examples in the dataset divided by |m| where m is the dimensionality of label set L.", "1 (Tsoumakas and Katakis 2006) Label cardinality of the dataset is the average number of labels of the examples in the dataset.", "The batch learning based multi-label classifiers are further classified by (Madjarov et al. 2012; Tsoumakas and Katakis 2006) into problem transformation (PT) methods, algorithm adaptation (AA) methods and ensemble (EN) methods."]} +{"14220380|5556391": ["Recently, class imbalance problem in drifting data streams has received attention for chunk-bychunk learning [14\u201319].", "Moreover, most of the existing methods assume that a full chunk of data is always available for training [14].", "Compared to single classifier methods, ensemble methods tend to better cope with concept drift problem, particularly with gradual drifts [14]."]} +{"17496428|11608263": ["In this example we have s = [4,1,3,2], so that ys \u2014 \\y4,y^,y3,y2] T \u2022", "In order to model dependencies explicitly, several alternative schemes have been proposed, such as the so-called label powerset ( L P ) method [4], LP considers each potential combination of labels in the MDC problem as a single label.", "The recently popularised task of multi-label classification (see [4-7] for overviews) can be viewed as a particular case of the mult i -dimensional problem that only involves binary classes, i.", "The method of using independent classifiers ( ic) on each label is commonly mentioned in the MLC and MDC literature [4,7,15,18], For each \u20ac =\\, .", "Table 5 A collection of datasets and associated statistics, where LC is label cardinality: the average number of labels relevant to each example; relevant for binary labels [4]."]} +{"15714834|11608263": []} +{"16592739|4474193": ["So, we propose a new categorization for concept drift, seeking inspiration from the dynamic optimisation problems area [27]\u2013[29]."]} +{"16592739|1097238": ["Although there are some theoretical results, they are highly restricted and make strong assumptions unlikely to be hold in practice [39]."]} +{"16059274|11608263": ["They will be referred to in this paper as the Binary Method (BM), the Ranking Method (RM) and the Combination Method (CM).", "The multi-label problem is receiving increased attention and is relevant to many domains such as text classification [7, 4, 5], scene classification [8] and genomics [12, 10, 8].", "RAKEL, which needs a threshold to run, is given the initial value of 0.5 (as suggested by its authors) which it later adjusts as described below."]} +{"11101741|11608263": []} +{"205163|11608263": ["First tutorials about MLL were published in its earlier stages [33], [208].", "3 381 Multi-label classification: An overview [208] Tsoumakas and Katakis International Journal of Data Warehousing and Mining 2007"]} +{"16986440|11608263": ["The adopted measures are common and used in [12,13].", "b) Real-world datasets Table III provides the particular statistics of two real-world datasets, which can be found in [12,13]."]} +{"73429849|11608263": []} +{"17038278|11608263": ["\u2026force many existing effective multi-label classification methods (Boutell et al., 2004; Evgeniou et al., 2005; Tsochantaridis et al., 2006; Tsoumakas & Katakis, 2007; Argyriou et al., 2008; Hariharan et al., 2010; Tsoumakas et al., 2010; Zhou & Tao, 2012) to become unaffordable, since\u2026"]} +{"6068124|11608263": []} diff --git a/edge/graph_209901240.jsonl b/edge/graph_209901240.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_209901261.jsonl b/edge/graph_209901261.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9bb0038d8f12c130281fcbc5f96afe2467e6ac2 --- /dev/null +++ b/edge/graph_209901261.jsonl @@ -0,0 +1,10 @@ +{"198169225|19788427": ["The rapid advancement of the integrated circuit (IC) technology processes greatly improves transistor density and enables the development of chip multi-processors (CMPs) [1]."]} +{"52156763|53760697": ["As a result, emerging interconnect technologies are being explored as well [5], [6]."]} +{"69651456|30920332": ["These issues can be partly tackled by optical networks on chip (ONoC) [4,5], which take advantage of optical interconnects to provide high-speed communications (also exploiting wavelength division multiplexing) with lower propagation delays and weaker propagation losses.", "Furthermore, important optical devices like micro-rings require extra-power expenditure to compensate for the resonant wavelength shift due to manufacturing geometric inaccuracies [4].", "In particular, electrical wires undergo propagation delays and losses which do not scale down at the same rate as transistors, and they can hardly support the high data-rate required by core-to-core communications [2,4].", "Finally, interfacing the optical network with the electrical circuitry of the cores entails some electro-optical conversion with negative effects on both energy loss/consumption and networking delays [4].", "On the other hand, off-chip lasers are more ef\ufb01cient but their coupling to the chip introduces additional losses [4] and poses additional issues related to the mechanical interconnection between the source and the die."]} +{"69651456|19788427": ["In particular, electrical wires undergo propagation delays and losses which do not scale down at the same rate as transistors, and they can hardly support the high data-rate required by core-to-core communications [2,4].", "Finally, surface wave interconnects represent a sort of emerging solution currently under investigation mainly at millimeter frequencies [2], and no significant studies have so far addressed design challenges for integrated surface wave launchers in the optical range.", "To this aim, traditional bus architectures have been replaced by networks on chip (NoC), where the processor chip includes electrical wires and routers besides cores and cache banks [1,2].", "Since the surface wave is confined at the planar interface, its wavefronts undergo a smaller spatial broadening compared to a spatial wave, and therefore the corresponding path loss would increase proportionally to the link distance d instead of d2 as in free space [2].", "In this regard, surface electromagnetic waves are sometimes referred to as an effective means to improve propagation conditions compared to free space [2,14,15].", "Finally, surface wave interconnects represent a sort of emerging solution currently under investigatio mainly at millim ter freque cies [2], and no significant studies have so fa addresse design ch lle ges for integrated su face wave launchers in the optical range."]} +{"209065846|19788427": ["T HE RAPID advancement of the integrated circuit (IC) technology processes in recent years greatly improves transistor density and enables the development of chip multi-processors (CMPs) [1].", "Second, the wireless communication natively supports multicast and broadcast communication patterns in cache coherence protocols, which decide the performance of the CMPs [1], [6]."]} +{"4618438|19788427": ["Longer lines consume more power due to higher resistance and capacitance associated with them [3].", "through radiation in the air above the chips at near the speed of light [3]."]} +{"5846577|15453366": ["wherePTX andGTX+RX represent transmitted power and overall joint Tx and Rx gain which is dependent upon the geometric alignment of the Tx \u2194Rx antennae [48]."]} +{"58004699|209901261": ["Many works [18], [30]\u2013[37] either neglect the influence of the chip package, which introduce losses and dispersion, or directly neglect dispersion whatsoever."]} +{"56596744|3930401": ["At the macro-scale OW communications have emerged as a promising solution to growing demand of large spectrum bandwidth for indoor and outdoor applications with a wide range of systems such as visible light communication, lightfidelity, free space optical communication [1]."]} +{"53106186|19788427": ["Four emerging interconnects are explored to address the long-range multi-hop communication bottleneck [5]: three-dimensional (3D) [6], photonic [7], RF/wireless NoC [8].", "In Ka band, based on the channel measurements results, we set the carrier frequency to 35 GHz, for a data rate of 2 Gbps, no global gain implies an SNR of around 17 dB which seems sufficient for WiNoC applications [5]."]} diff --git a/edge/graph_20991784.jsonl b/edge/graph_20991784.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4068ea9572a358ea6562ea5418f48c2ecde583e2 --- /dev/null +++ b/edge/graph_20991784.jsonl @@ -0,0 +1,59 @@ +{"10778136|14765802": []} +{"10778136|7686677": []} +{"13411709|10693567": ["The H-CRAN based 5G systems have capabilities to provide anytime, anywhere gigabit data rate service to the desired user equipments (UEs), where an \u201cedgeless\u201d experience to UEs is provided under the help of heterogeneous MBSs and ultra dense RRHs. Based on cloud computing technologies, the\u2026", "In addition, Node C has a powerful computing capabilities to execute the large-scale cooperative signal processing in the physical layer and large-scale cooperative networking in the upper layers."]} +{"9644440|9223482": []} +{"9644440|7851743": []} +{"9644440|393948": []} +{"9644440|13172512": []} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"442109|206576720": ["Consequently, this gives rise to the consideration of 3D-MIMO [39] which might be used as a backhauling alternative in vertically densified net-"]} +{"442109|12206204": ["THE EVOLUTION of mobile devices and applications in the current decade have drawn a new picture for wireless networks [1]."]} +{"442109|12029139": ["ent scopes, specifically Heterogeneous Networks (HetNets), massive multiple-input multiple-output (massive-MIMO) networks, millimeter waves (mmWaves) networks, and energy harvesting networks [9]."]} +{"442109|1588237": ["In the frequency domain, interference mitigation is done through the use of orthogonal frequency channels, either by the static allocation of these orthogonal channels to different cells or by dynamic allocation [164]."]} +{"442109|7851743": ["Also, the transmission power of each node is small and the OAM functions are automated via self organizing network functionality (SON) [178]."]} +{"1065426|7686677": ["Greening HetNets have thus attracted tremendous research efforts [3], [4]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"23994545|7686677": ["Until now, mobile operators have relied on diesel generators to run such BSs for most of these cases, which is not only expensive due to its price and transportation [11], but also one of the most polluting sources of energy."]} +{"23994545|12060835": ["The main challenge in using renewable energy sources is that they are not controllable [37]."]} +{"23994545|18037424": ["in [31]."]} +{"10040669|12029139": ["2 mW RFID, low power device RF Signal [12] unpredictable"]} +{"10040669|8909218": ["r experience. Besides this, the low-cost and low-power SCBSs can be easily installed without costly cell site acquisition, and their self-organization manner further helps save operating expenditures [1, 2]. However, as the SCBSs are densely and irregularly located, some of them may be inaccessible to the power grid. Moreover, the network power consumption of the SCNs will be high despite the small powe"]} +{"10040669|12060835": ["The previous discussions on the three basic tradeoffs in EH-SCNs provide us with the\nfollowing deployment guidelines:\n\u2022 Satisfactory coverage can be guaranteed in EH-SCNs with a reasonable network density."]} +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"22661441|12452682": ["A game theoretical overview of dynamic spectrum sharing is provided in [12].", "On the other hand, game theory has been widely investigated in wireless networks [12]\u2013[16]."]} +{"3775251|7686677": ["In addition to reducing the energy consumption on the demand side [6]\u2013[8], powering communication systems with renewable energy on the supply side is another effective approach to reduce grid energy cost [5], [9].", "As an ecological and economic friendly technique, energy harvesting, which can scavenge cheap and clean renewable energy from ambient environment, has attracted extensive attention and inspired thorough research in both academia [5], [9] and industry [10]\u2013[12].", "Under the pressures from both ecology and economy, green communication has thereby become an inevitable trend for future wireless networks [5]."]} +{"9625012|7686677": []} +{"9625012|10837932": []} +{"6953986|8909218": ["These small cell deployments are mainly in the form of home small cells, known as femtocells [10], [11], [27], but many operators have also already started to deploy outdoor small cell solutions to complement their macrocell coverage [28]."]} +{"15265867|9651858": ["cell interference, whilst the authors of [93] suggested partial spectrum reuse as an efficient technique to overcome the interference in the HetNet."]} +{"15265867|4502294": ["RRU has been called \u201cRRH\u201d as in a number of studies after it has been separated from BBU, such as in [29, 229, 230]."]} +{"15265867|10979806": ["\uf076 Network Densification: the dense deployment of many small cells is referred as \u201cNetwork densification\u201d [79] which is considered a promising technology to provide a high capacity to 5G networks [30] and deals with the explosively increasing number of devices [80] and the user traffic [81].", "These studies can be grouped into main four categories [80] listed as follows"]} +{"15265867|29464310": ["A number of parameters affect the data carried by AxC, [255]:"]} +{"15265867|15449163": ["\uf076 Other key features of 5G networks includes 100% coverage [52-55], 10 times lower power consumption than current systems [24, 56], up to 10 years battery life of devices [57-62], and 10x \u2013 100x number of connected devices [63-66].", "mobile data traffic [24] and this is considered to be a crucial driver towards a new generation of mobile wireless networks, which is 5G.", "3 5G Key Technologies: The revolutionary requirements of the envisaged 5G networks have inspired the researchers around the world to look for new methodologies, architectures, and technologies [24] as well as amalgamate different technologies to cope with the 5G requirements [67].", "1 is constructed based on scattered data and parameters in [24, 86, 89, 90]."]} +{"15265867|19938676": ["The authors of [25] and [26] presented some of the 5G requirements and the emerging technologies to ameliorate the 5G architecture."]} +{"15265867|2623404": ["4 illustrates the SDN architecture [96]."]} +{"15265867|6971827": ["These libraries are provided by the containers to delude the applications that they are running on their dedicated machines [180]."]} +{"15265867|7892994": ["LTE network uses single-carrier frequency-division multiple access (SC-FDMA) uplink (UL), whilst orthogonal frequency-division multiple access (OFDM) is used in downlink (DL) [247]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"17631216|3055684": ["Paper [24] summarizes the recent contribution in energy harvesting communications, whereas only few literatures related to energy harvesting networks are discussed."]} +{"17631216|12029139": ["Unlike the traditional battery-operated communications, the energy of ambient energy sources available to energy harvesting communication nodes is time-variant and often sporadic even though there is potentially an infinite amount of energy."]} +{"17631216|9862516": ["In fact, if the node\u2019s energy requirement is low enough [192], it is possible for IoT nodes to exclusively rely on"]} +{"17631216|2509135": ["Cognitive radio has been deemed as a key enabling technology to resolve the problem of spectrum scarcity due to the ever increasing demand for wireless services and applications [141], [142]."]} +{"17631216|12060835": ["3) Mechanical Motion/Vibration Energy Sources: Electric power can also be produced by extracting energy from mechanical motion and vibration through transduction methods, including electrostatic, piezoelectric and electromagnetic [3]\u2013 [6].", ", wind and liquid flow [3], [6], [9], [10], or partially controllable human actions, e.", "4) Electromagnetic Radiation Energy Sources: Harvesting energy from EM radiation has attracted more and more attention due to the broadcast nature of wireless communications [3]\u2013[6], [12].", "To achieve this, energy harvesting has been proposed as a viable solution that enables wireless nodes to scavenge energy physically or chemically from natural or man-made phenomena [2], [3].", "1) Solar/Light Energy Sources: One of the most popular ambient energy sources is visible sunlight/light, and it is well studied and exploited in a wide variety of applications [3]\u2013 [6]."]} +{"10342730|2535224": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "In contrast to previous surveys on wireless virtualization [2]\u2013[4], our interest focuses on the problems derived from wireless slicing and on the existing techniques that deal with these speci\ufb01c problems."]} +{"10342730|11735843": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "For instance, approaches for network programmability [11] such as Software-De\ufb01ned Radio (SDR) [56]\u2013[58] or programmable MAC protocols [59]\u2013[61] may be used to circumvent this challenge."]} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"37451636|3007529": ["To name a few application scenarios include intelligent transportation systems (ITS) [11], volunteer information networks [12], Internet of Things (IoT) [13]\u2013[15], smart grids [16], [17] and much more."]} +{"37451636|3348390": []} +{"37451636|9104850": []} +{"9791243|3055684": ["Energy cooperation has been proposed to allow energy-harvesting devices to share their harvested energy in order to enhance system performance [11], [13]\u2013[15]."]} diff --git a/edge/graph_210023930.jsonl b/edge/graph_210023930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52289925db8aa34ff4112ca597f129ed62e02e8e --- /dev/null +++ b/edge/graph_210023930.jsonl @@ -0,0 +1,94 @@ +{"9492901|2082499": ["Record linkage is inherently a di\ufb03cult problem [2, 11, 12].", "Record linkage is made scalable by \u201cblocking,\u201d which involves partitioning data\ufb01les into \u201cblocks\u201d of records and treating records in di\ufb00erent blocks as non-co-referent a priori [2, 11].", "Other data-dependent blocking methods [2, 23] are highly application-speci\ufb01c or are based on placing similar records into the same block, using techniques of \u201clocality-sensitive hashing\u201d (LSH)."]} +{"8463827|386036": ["Keywords Blocking, Link Discovery, Identity Resolution, Duplicate Detection, Record Linkage, Linked Data"]} +{"1793818|2082499": ["To enhance the efficiency of ER, blocking is typically used [2, 3].", "In this category fall practically all blocking methods that are inherently crafted for relational data [2]."]} +{"4357021|2082499": ["Many approaches have been proposed and evaluated as described in a recent survey [3]."]} +{"8509218|2082499": ["To show how precise comparison candidates are chosen, we evaluated the pairs quality PQ [19] of PSNM, PB, and SNM over time."]} +{"8509218|386036": ["\u202623: bPairs bPairs [ pBPs 24: procedure compare(blocks, pBPs, order) 25: for pBP 2 pBPs do 26: dPairs;cNum h i comp(pBP, blocks, order) 27: emit(dPairs) 28: pBP[2] dPairs j j/ cNum At first, PB calculates the number of records per partition pSize by using a pessimistic sampling function in Line 2.", "Much research on duplicate detection [2], [3], also known as entity resolution and by many other names, focuses on pairselection algorithms that try to maximize recall on the one hand and efficiency on the other hand."]} +{"29251214|2082499": ["For comparison, we generate the datasets according to parameters specified by Christen [3].", "Figure 2 provides a comparison of the average F-measure and standard deviation of the best performing algorithms [3] and Algorithm 1.", "Experiments analysis reported by Christen [3] indicates that the effectiveness of all blocking approaches begins to decline with the size of the dataset (see Figure 7).", "This algorithm is based on the sorted neighborhood algorithm, [23, 1] whose performance is recorded as inferior to other algorithms [3].", "Figure 7 compares the F-measure of Algorithm 1 with other blocking algorithms [3] on synthetic datasets.", ", sorted neighborhood [1], canopy clustering [2], and q-gram indexing [3].", "When comparing our algorithm to 12 other blocking techniques implemented in FEBRL [15], we have relied on the authors\u2019 selection of blocking keys as well as other parameters (similarity function, similarity threshold, q-gram size) that were set in [3].", "All experiments were conducted using FEBRL [15] and followed the guidelines provided by Christen [3].", "We now compare the performance of Algorithm 1 with the blocking algorithms surveyed in [3] on three real-world datasets.", "The blocking algorithms were assessed using three measures, namely Recall (known in the entity resolution literature as Pairs Completeness PC), Reduction Ratio (RR) [21] and Precision (known as Pairs Quality PQ) [3]."]} +{"29251214|386036": ["provided a comprehensive survey covering the complete Deduplication process [28]."]} +{"40122412|2082499": ["For Dirty ER, the datasets RxD with x \u2208 [1, 6] were derived by merging the entity profiles of the individually clean collections forming RxC .", "Depending on the input entity collection(s), we identify two general ER tasks [1,2,7]: (i) Dirty ER takes as input a single entity collection that contains duplicates and produces as output a set of equivalence clusters.", "mate, with blocking being the most popular among them [1].", "The synthetic datasets pertain to Dirty ER and are mainly used for scalability analysis [1,3].", "Performance Evaluation Metrics To assess the performance of a blocking method, we follow the best practice in the literature, treating entity matching as an orthogonal task [1,3,2].", "With their help, the following measures for block collections are defined [1,3,7]: (i) Pairs Quality (PQ) assesses precision, expressing the portion of comparisons that correspond to a non-redundant pair of duplicates.", "Most blocking methods deal with these high levels of noise through redundancy [1,7]: they place every entity profile into multiple blocks so as to reduce the likelihood of missed matches.", "In the context of Databases, the former task is called Deduplication and the latter Record Linkage [1]."]} +{"40122412|386036": ["It groups similar entities into clusters (called blocks) so that comparisons are executed only between the entities within each block [4, 5].", "Entity Resolution has been the focus of numerous works that aim to tame its quadratic complexity and scale it to large volumes of data [4,5]."]} +{"16320392|2082499": ["Another related problem is record linkage [34], [35], [36], [37], [38], [39], [40], [41] (also called duplicate detection, entity matching, and reference reconciliation) in the database community."]} +{"16320392|8310135": []} +{"16320392|386036": []} +{"26644079|386036": []} +{"53104602|2082499": ["One of the most prominent blocking methods is based on su\ufb03xes [20, 23].", "To evaluate the accuracy of the blocking stage (discussed in Section 2) o\ufb00ered by SuffBlock , SAB and RSAB , we use pairs completeness [23, 28, 29] and pairs quality [23, 29] metrics.", "We, then, have [23, 29]: \u2022 Pairs completeness , corresponds to recall, de\ufb01ned as | R \u2229 L | | L | , shows the fraction of the correct pairs that are outputted by the blocking stage.", "Similarly to [23], we have created two datasets called Clean and Dirty each containing 10 6 records.", "Similarly to previous record linkage research e\ufb00orts [3, 19, 23, 27], to create synthetic datasets, we have used the Febrl tool [27].", "Contrary to su\ufb03x-based blocking, this technique is computationally expensive and applicable only to small datasets [23]."]} +{"7026371|386036": ["The work in [25] is a recent survey with a section on similarity search and join methods for the task of record linkage and near duplicate object detection."]} +{"35439586|2082499": ["This process is commonly called Entity Resolution (ER) [Christen 2012a].", "However, such attribute values are often of low quality, as they can be incomplete, contain errors, or change over time [Christen 2012a].", "We also provide a comparative evaluation of our proposed indexing technique with an existing q-gram technique that has previously been used for ER [Baxter et al. 2003; Christen 2012b; McCallum et al. 2000].", "Standard blocking [Christen 2012b] is based on inserting records into blocks according to blocking key criterion and only comparing records that are in the same block.", "Assuming we rank the tree nodes N i , 1 \u2264 i \u2264 k , according to their sizes (number of records in a node\u2019s list I ), the size of a node S i is calculated as where the denominator is the Harmonic number of the partial harmonic sum [Christen 2012b].", "The ER process encompasses several steps [Christen 2012a]: data preprocessing , which cleans and standardizes the data to be used; indexing , which reduces the number of candidate record pairs to be compared in detail; record comparison , which compares candidate record pairs in detail using a set\u2026", "To expand the window forwards (next), we compare the SKV of node N 6 with the SKV \u201crobinstevens\u201d of its next neighbor N 3 using the edit distance approximate string comparison function [Christen 2012a].", "The second baseline approach is a q-gram-based inverted index (QGI) [Baxter et al. 2003; Christen 2012b; McCallum et al. 2000] that converts the attribute values of each record in the database into a list of q grams.", "Whole records (for each record identi\ufb01er within C ) are then retrieved from the inverted index or database table D , and the attributes of q are compared with the retrieved records using similarity comparison functions [Christen 2012a] appropriate to the content of each attribute (line 9).", "Then the query record q is compared with all unique records in C in detail using similarity comparison functions [Christen 2012a] in the same way as is done in the DySNI."]} +{"35439586|386036": ["ManyER models were proposed in previous years (see Christen [2012a], Elmagarmid et al. [2007], and Winkler [2006] for existing ER models).", "However, such identi\ufb01ers are commonly not available, and therefore ER approaches need to be employed [Elmagarmid et al. 2007; Naumann and Herschel 2010]."]} +{"53081790|2082499": []} +{"18765581|2082499": ["Although multiple methods have investigated the use of a given scheme in a variety of ways [2], there has been negligible research on learning the scheme itself.", "employed in the record linkage and blocking key literature [2], and can be found in the SecondString1 toolkit.", "The blocking step is comprehensively surveyed by Christen [2].", "This is because blocking methods require a blocking scheme, a function assumed to be provided by a domain expert [2].", "Two metrics, Reduction Ratio and Pairs Completeness are employed to express these goals [2], [6]."]} +{"18765581|386036": ["This final candidate set of pairs becomes the input to the second step of the record linkage process, which essentially involves classifying each pair as a match, non-match or possible match [1].", "Record Linkage typically requires two primary steps [1].", "Record Linkage, or the identification of entities within a database that are coreferent, is a long standing problem with no less than eight separate terms referring to the same problem [1]."]} +{"15592556|2082499": []} +{"52889483|6923178": ["Matthews correlation coe\ufb03cient (MCC) [4] is de\ufb01ned as Heuristically, a value of 0.2 or lower is considered as good [35], i.e., D S can be used as a source for D T .", "Two datasets might be di\ufb00er-ent from each other in terms of prior probability distribution Train classi\ufb01er M on D 7: Evaluate performance of M on D S \u222a D T \\ D 8: Compute MCC using Equation 12 9: if average MCC over 10 runs \u2264 0 .", "Matthews correlation coefficient (MCC) [4] is defined as", "One can use Algorithm 5 and rank the datasets based on MCC."]} +{"52889483|386036": ["ER has been widely studied by using (a) declarative rules [49, 9] (b) ML-based models [30, 19, 29], and (c) experts or crowdsourcing [54, 23] (see surveys [20, 38] for more details)."]} +{"14433445|2082499": ["The most important ER blocking methods are summarized in [3].", "2 Metric Space for Blocking Techniques To meet the goal of high PC in the context of noisy or heterogeneous information spaces, blocking methods typically rely on redundancy: entities are associated with multiple, overlapping blocks, thus minimizing the likelihood of missed matches [3, 19, 24, 25]."]} +{"14433445|386036": ["They typically associate each record with a Blocking Key Value (BKV), which summarizes the values of selected attributes, and operate exclusively on it [6].", "Thus, instead of operating on the entire collection, it suffices to handle the data inside each block separately [6].", "A comprehensive overview of the most important works in this domain can be found in [6]."]} +{"7195313|2082499": ["This means that the schema-based blocking keys have to be manually con\ufb01gured in most of the cases, a requirement that signi\ufb01cantly restricts their utility [7].", "A bulk of relevant research has focused on improving its e \ufb03 ciency [6, 7, 11].", "The schema-based con\ufb01guration exploits a-priori schema information to come up with blocking keys that summarize the content of the attributes with the most distinctive values and / or the lowest levels of noise [6, 7].", "This task is also called Deduplication [6, 7] in the context of homogeneous data collections and involves a quadratic time complexity, as every entity has to be compared with all the possibly matching pro\ufb01les.", "The e \ufb00 ectiveness of a block collection B is assessed using three well-known measures [6, 7, 26, 27]: (M1) Pairs Completeness ( PC ) estimates the recall of B , i.e., the portion of duplicates from the input entity collection(s) that co-occur in at least one block.", "On the other hand, the performance of schema-based con\ufb01guration is very sensitive to the de\ufb01nition of the blocking keys, where minor modi\ufb01cations can result in major di \ufb00 erences in the quality of the produced blocks [6, 7].", "The most popular approach in this direction is blocking [3, 7, 26].", "For each method, we compare its schema-agnostic con\ufb01guration with 3 different schema-based ones that have been used in [7].", "The schema-based con\ufb01guration is typically applied to blocking methods like Sorted Neighborhood and Su \ufb03 x Arrays that are crafted for homogeneous data collections [6, 7, 10].", "Its size ( | B | ) denotes the number of blocks it contains, while its cardinality denotes the total number of comparisons it involves: Following the best practice in the literature, we consider entity matching as an orthogonal task to blocking [6, 7, 26, 27]."]} +{"7195313|386036": ["General discussions about blocking methods can be found in several surveys, books and tutorials about Entity Resolution [6, 11, 13, 14, 20].", "A bulk of relevant research has focused on improving its e \ufb03 ciency [6, 7, 11]."]} +{"14923249|2082499": []} +{"14923249|386036": ["refer to this as the structural heterogeneity problem [5].", "Blocking is critical in data integration systems [5],[3].", "Blocking has been extensively studied in the record linkage community [5], with a comprehensive survey by Christen [3]."]} +{"479755|2082499": ["Separately, blocking has witnessed much speci\ufb01c research, with Christen surveying blocking methods [9].", "The \ufb01rst step, blocking , mitigates brute-force pairwise comparisons on all entities by clustering entities into blocks and then comparing pairs of entities only within blocks [9].", "In contrast, DNF-BSLs can be applied generally , with multiple studies showing strong empirical performance [21, 3, 6, 16]."]} +{"479755|386036": []} +{"12256374|386036": ["For a more comprehensive overview on general duplicate detection see [7]."]} +{"3116016|386036": ["To avoid verifying every pair of strings in the data set and improve performance, string similarity join typically consists of two phases: candidate generation and verification [9], [19]."]} +{"13372189|386036": ["A comprehensive overview of the existing work in this domain can be found in [6], [14], [15].", "rizing the values of selected attributes, and operate exclusively on it [6]."]} +{"16691132|2082499": ["We actually follow the best practice in the literature and consider entity matching as an orthogonal task to blocking [5, 24, 27].", "Standard Blocking ( StBl ) [5, 26] has a parameter-free functionality: every distinct token t i in the input creates a separate block b i that contains all entities having t i in their attribute values as long as t i is shared by at least 2 entities (Figure 2).", "These cover all datasets and almost all techniques considered in [5].", "Typically, two duplicate entities are considered detected as long as they co-occur in at least one block \u2013 independently of the selected entity matching technique [2, 5, 22, 26].", "As an illustrating example, consider Figure 2, which demonstrates the functionality of Standard Blocking [5] when using the unsupervised, schema-agnostic keys proposed in [24].", "In the context of homogeneous data (databases), the former task is called Record Linkage and the latter Deduplication [5].", "Standard Blocking (StBl) [5, 26] has a parameter-free functionality: every distinct token ti in the input creates a separate block bi that contains all entities having ti in their attribute values as long as ti is shared by at least 2 entities (Figure 2).", "Christen\u2019s survey [5] examines the main blocking methods for structured data, concluding that they all require careful fine-tuning of internal parameters in order to yield high performance.", "Our experimental analysis builds on two previous surveys of approximate blocking methods for structured data [5, 24].", "In the example of Q-grams Blocking ( QGBl ) [15] transforms the blocking keys of StBl into a format more resilient to noise: it converts every token into sub-sequences of q characters ( q -grams) and builds blocks on Standard Blocking ( StBl ) [5,26] Sorted Neighborhood ( SoNe ) [16] Q-grams Blocking ( QGBl ) [15] Extended Q-grams Blocking ( EQGBl ) [5] Suffix Arrays ( SuAr ) [1] Extended Suffix Arrays ( ESuAr ) [5] Canopy Clustering ( CaCl ) [21] Extended Canopy Clustering ( ECaCl ) [5] Attribute Clustering ( ACl ) [26] TYPiMatch ( TYPiM ) [20] MFIBlocks ( MFIB ) [18] Extended Sorted Neighborhood ( ESoNe ) [5] Figure 3: The relations between lazy and proactive methods. their equality.", "Extended Sorted Neighborhood (ESoNe) [5] sorts the blocking keys of StBl in alphabetical order and slides a window of size w over them.", "Three measures are used for estimating the effectiveness of a block collection B [5, 24]: (E1) Pairs Completeness (PC) assesses the portion of the duplicate entities that co-occur at least once in B (also known as recall in other research fields)."]} +{"16691132|386036": ["The blocking techniques for ER [6, 9, 10, 12] can be distinguished in two broad categories: the approximate methods sacrifice recall to a minor extent in an effort to achieve significantly higher precision, whereas the exact methods guarantee that all pairs of duplicates are identified [17, 23].", "ESoNe w \u2208 [2, 100] 1 99 99 QGBl q \u2208 [2, 6] 1 5 5 EQGBl q \u2208 [2, 6] 1 5 20 t \u2208 [0.", "provide a comprehensive survey covering the complete deduplication process [6].", "ECaCl q \u2208 [2, 6] (inherent) 1 5 4,775 n1 \u2208 [1, 10] 1 10 n2 \u2208 [n1, 100] 1 \u2264100 SuAr lm \u2208 [2, 6] 1 5 495 bM \u2208 (1, 100] 1 99 ESuAr lm \u2208 [2, 6] 1 5 495 bM \u2208 (1, 100] 1 99"]} +{"4946049|2082499": []} +{"4946049|10500613": []} +{"4946049|386036": []} +{"14804641|2082499": ["Compared with supervised meta-blocking, Blast yields a lower F1-score only with ar1, though \u2206PC is +6%.", "We also consider the F1-score [5], useful to compare block collections that present different values of both PC and PQ.", "While, compared to traditional CNP techniques, Blast yields a lower PQ and F1-score than cnp2 only in ar2; though \u2206PCpBcnp2 ,BBlastq is `12%.", "We also consider the F1-score [5], useful to compare block collections that present different values of both PC and PQ. Formally:\nPCpBq\u201c", "Metrics: We employ Pair Completeness (PC) and Pair Quality (PQ) [5] to evaluate the quality of a block collection B, which are surrogates of recall and precision, respectively.", "Hence, we compare Blast meta-blocking in three different settings (chi, wsh, and bch) described in the following. chi: We run Blast switching off the aggregate entropy, i.e., the weights of the blocking graph are computed using \u03c72 without the multiplicative entropy factor. wsh: We run Blast replacing the \u03c72-based weighting function with the traditional weighting scheme\n10Standard Blocking is equivalent to Token Blocking modified to exploit schema-mapping to disambiguate tokens according to the attribute in which they appear.", "Finally, we compare Blast against schema-based Standard Blocking [5, 17] on the fully-mappable datasets (ar1, ar2, and prd).", "One fundamental step in data integration is Entity Resolution (ER), namely the task of matching records (the entity profiles) from several data sources (the entity collections) that refer to the same real-world entity [5].", "Overall, the experimental results presented above show that Blast outperforms traditional meta-blocking (both WNP and CNP) in terms of PQ and F1-score on 2 out of 3 of the fully-mappable dataset comparisons, and on 2 out of 2 of the partially-mappable ones.", "Blocking Background: Traditional schema-based blocking techniques generate blocks according to a blocking criterion (blocking key), either based on a single attribute, or a combination of attributes [5].", "To evaluate the performances of Blast we compared it against traditional meta-blocking techniques on 3 real-world benchmark datasets [5].", "Standard Blocking is one of the best performing approaches in the literature [5], and is compatible with meta-blocking10.", "In fact, Blast achieves significantly higher F1-score than the one achieved by traditional meta-blocking, maintaining high level of PC. Differently, Token Blocking combined with LMI and traditional meta-blocking achieves a slightly higher F1score than that achieved by Token Blocking alone.", "Standard Blocking is one of the best performing approaches in the literature [5], and is compatible with meta-blocking(10).", "Evaluation Metrics: We evaluate the quality of the produced block collections in terms of precision and recall, through their surrogates PC, PQ and F1-score (section 2).", "Blast achieves higher PQ and F1-score than traditional WNP, and a slightly lower PC."]} +{"14729165|386036": ["\u2026attention has already been focused on ER in the DB, data mining and statistics communities, where the typically-stated goals are computational performance (good runtime) and statistical performance (good precision/recall)\u2014 cf. e.g. , [13, 18] and references therein for general discussions on ER."]} +{"15021425|386036": ["A comprehensive overview of the existing work in this domain can be found in [4, 6, 13].", "They define blocks on the equality (or similarity) of BKVs and compare solely the entities that are contained in the same block [6].", "To enhance its efficiency, blocking methods are typically employed [6, 11, 15]; they extract from every entity profile (or record) a Blocking Key Value (BKV) that encapsulates its most distinguishing information and define blocks on the equality (or similarity) of BKVs."]} +{"40881959|2082499": ["To overcome the issues with data that are of low quality, q-gram based indexing techniques can be used that insert each record into several blocks by generating variations of the record\u2019s blocking key value through the use of q-grams (sub-strings of length q characters) [17,19].", "The second step in record linkage is indexing [19], which is aimed at reducing the number of comparisons that need to be conducted between records by removing as many record pairs as possible that are unlikely to correspond to matches [17].", "Techniques that accomplish this are generally known as indexing, searching, or blocking techniques [17,19].", "A variety of evaluation measures have been proposed to assess the complexity [19] and the quality of a linkage [18].", "Record linkage is a complex process consisting of several steps [8,19], as Fig.", "To overcome this challenge, speci\ufb01c indexing techniques have been developed which remove record pairs that obviously correspond to non-matches (i.e., refer to different entities) while they maintain candidate pairs that potentially will be matching (i.e., refer to the same entity) [19].", "The manually classi\ufb01ed record pairs can also be used as training data for training supervised classi\ufb01cation techniques [19].", "On the other hand, a less speci\ufb01c blocking key de\ufb01nition will lead to larger blocks and more candidate record pairs, but likely also to more true matches that are found [19].", "Various indexing techniques for record linkage have been developed in recent years, and several surveys of these techniques have been presented [17,19,39].", "It is also not necessary, because the majority of these comparisons corresponds to non-matching records [19]."]} +{"40881959|386036": ["Record linkage is a complex process consisting of several steps [8,19], as Fig.", "The analysis of integrated data can, for example, facilitate the detection of adverse drug reactions in particular patient groups, or enable the accurate identi-\ufb01cation of terrorism suspects [7,8].", "Record linkage can also be applied on a single database to detect duplicate records [8,14].", "\u2026the compared candidate record pairs into matches and non-matches, many recently developed classi\ufb01cation techniques for record linkage employ supervised machine learning approaches [8,61,62] that require training data with known class labels for matches and non-matches to train a decision model."]} +{"2444840|386036": ["Entity resolution is a very active research topic and many approaches have been proposed and evaluated as described in recent surveys [12, 18].", "Many approaches for entity resolution have been proposed [2, 12, 18, 20] and included in matching frameworks [4, 6]."]} +{"2056381|2082499": ["As is common with other blocking techniques, we can also improve the robustness of our approaches by running them multiple times with di\ufb00erent lists of blocking keys for a single ER task [3].", "Blocking (also called indexing ) for ER is an area of active research and several recent surveys have been conducted [3, 7, 15]."]} +{"2056381|191396": ["To combine the pairwise similarity between BKVs into an overall block similarity measure, denoted as \u03c2(b1,b2), we make use of three traditional approaches [24]: (1) single link \u03c2(b1,b2) = max(T ), (2) average link \u03c2(b1,b2) = mean(T ) and (3) complete link \u03c2(b1,b2) = min(T ), where T = {\u03b6(v1, v2) : v1 \u2208 V (b1) and v2 \u2208 V (b2)}."]} +{"2056381|386036": ["Entity resolution (ER) is a common data cleaning and pre-processing task that aims to determine which records in one or more data sets refer to the same real-world entities [7].", "Blocking (also called indexing ) for ER is an area of active research and several recent surveys have been conducted [3, 7, 15].", "For example, possible functions include the \ufb01rst two characters ( F2 ), exact value ( Ext ) and a Soundex encoding ( Sdx ) [7].", "Phonetic encodings such as Soundex and Double Metaphone [7], which have hard limits on the maximum number of unique BKVs they can create, can be particularly e\ufb00ective in this regard.", "To evaluate our approaches we compared performance with standard blocking [8], Soundex encoding [7], and sorted neighbourhood based indexing [11]."]} +{"14718042|2082499": ["Examples for overlapping blocking methods are SNM, canopy clustering, suffix array-based blocking, and Q-gram based indexing, surveyed in [18]."]} +{"8102607|2082499": ["We do not review the wider literature on entity resolution, where there are existing surveys on the topic as a whole [11, 20], on blocking [4] and on clustering [14].", "There is lots of work on each of these phases; for example, Christen [4] provides a survey of indexing techniques that support blocking, and Hassanzadeh et al. [14] compare clustering algorithms that take as input the results of blocking 1 .", "In practice, as surveyed by Christen [4], blocking typically yields an index I : T \u2192 { T } , where the index may be based on a subset of the attributes of T or some form of string pattern such as n -grams.", "In this paper we do not exhaustively re-review related work on blocking [4] or clustering [14]; the contribution of this paper is on pay-as-you-go configuration of entity resolution, and not on entity resolution techniques per se.", "We have chosen this proposal because: (i) the blocking phase, in employing a q-gram based hashing scheme, is using an approach that has been shown to be effective in a recent comparison [4]; (ii) the clustering algorithm meets all the generic requirements from [14], in that it is unconstrained (the number of clusters is not known in advance), unsupervised (clusters can be produced without training data) and disjoint (there is no overlap in the membership of clusters); (iii) the clustering algorithm is incremental, enabling new data to be incorporated as it becomes available; (iv) the full entity resolution process, from blocking, through pairwise comparison to clustering is included within a single proposal; and (v) the approach has been shown to be scalable in empirical studies [5].", "For example, blocking algorithms may use a subset of the fields in a record as the basis for comparison with other records, and apply a function that, given a record, generates one or several blocking keys, each of which gives rise to an index entry; such functions depend on the data to which the algorithm is to be applied, and manual tuning is often both laborious and difficult [4].", "There is lots of work on each of these phases; for example, Christen [4] provides a survey of indexing techniques that support blocking, and Hassanzadeh et al.", "In practice, as surveyed by Christen [4], blocking typically yields an index I : T \u2192 {T}, where the index may be based on a subset of the attributes of T or some form of string pattern such as n-grams."]} +{"8102607|1708582": ["Furthermore, in reinforcement learning [18], learning is intrinsically closely associated with an ongoing process, with the normal behaviour of a system interleaved with learning steps that follow a trial-and-error approach."]} +{"8102607|386036": ["We do not review the wider literature on entity resolution, where there are existing surveys on the topic as a whole [11, 20], on blocking [4] and on clustering [14].", "Entity resolution is the task of identifying different records that represent the same entity, and is an important step in many data integration and data cleaning applications [11, 21]."]} +{"5635178|2082499": ["We used four common measures to evaluate the quality of blocking: Pair Completeness (PC), Pair quality (PQ), Reduction Ratio (RR) and F-Measure (FM) [12], [17], [26].", "In general the goal is to develop techniques that generate blocks such that (i) all comparisons between records within a block will have a certain minimum similarity with each other, and (ii) the similarity between records in different blocks is below this minimum similarity [12].", "We conducted an experiment to compare the quality of our proposed blocking methods with the state-of-the-art blocking techniques discussed in Christen\u2019s survey paper [12].", "The reason why we used 30,000 records for the experiments on blocking quality is to facilitate the comparison with the state-of-the-art blocking techniques discussed in Christen\u2019s survey paper [12].", "Following the experimental setup in [12], we used a total of 163 parameter settings for Cora and 161 parameter settings for NC Voter.", "Note that, PQ*= j G tp j j G m j is used in [37], which is different from PQ used by us and some others [12], [26], and accordingly, FM*= 2 (cid:2) PC (cid:2) PQ (cid:13) PC \u00fe PQ (cid:13) .", "A number of blocking techniques have previously been studied [12], [14], [22], [32], [35], [36], [39].", "For ASor, RSuA, StMT and StMNN, the string similarity functions Jaro-Winkler , bigram , edit-distance and longest common substring [12] were used.", "Previously, blocking has been studied by many works [7], [12], [14], [22], [26], [27], [32], [39].", "\u2026techniques nonetheless have some limitations as we have discussed before, including: generating blocks inef-\ufb01ciently over large data sets [14], [32], or \ufb01ltering out true matches that are textually dissimilar but semantically similar during the blocking process [7], [12], [22], [26], [27], [39]."]} +{"2875479|386036": ["E NTITY resolution (ER) [1], [2] (also known as record linkage or deduplication) is the process of identifying records that represent the same real-world entity.", "Entity resolution has been studied under various names including record linkage, merge/purge, deduplication, reference reconciliation, object identification, and others (see [1], [10] for recent surveys)."]} +{"44005138|2082499": ["According to a comprehensive analysis of blocking algorithms in [7], traditional blocking is one of the fastest approaches, however, there are several drawbacks.", "Higher pair quality for a blocking approach shows that this approach is more efficient and generates mostly true matched candidate pairs while a lower pair quality value means a large number of non-matches are also generated [7]."]} +{"44005138|386036": ["Our system follows the standard high-level structure of a record linkage pipeline [10] by being divided into four major components: 1) data cleaning 2) blocking 3) pairwise linkage and 4) clustering.", "where a single real-world entity gives rise to multiple records (see [10] for an overview)."]} +{"2200918|386036": []} +{"14891551|2082499": []} +{"14891551|386036": [", record linkage1 [7]), where duplicates are merged or removed, is critical to ensure big data repositories are managed efficiently and effectively.", "Large-scale record linkage frameworks involve three fundamental data-intensive steps [7]."]} +{"11280427|2082499": [", [4, 8, 14, 18, 16, 28, 20, 7, 21]) has been identified as a standard technique for scaling deduplication: The basic idea is to find a set of (possibly overlapping) subsets of the entire dataset (called blocks), and then compute similarity scores only for pairs of entities appearing in the same block."]} +{"11280427|386036": ["As a post-processing step to automatically generated blocks, CBLOCK rolls-up smaller blocks to increase recall."]} +{"16857207|386036": ["A comprehensive overview of the existing ER work can be found in [10, 17]."]} +{"34779534|2082499": ["Grouping entity descriptions in blocks before comparing them for matching is an important pre-processing step for pruning the quadratic number of comparisons required to resolve a collection of entity descriptions [7]."]} +{"44351081|14171067": []} +{"14985495|386036": ["For example, existing blocking methods use a transformation function that extracts \na BKV from an entity pro.le and a set of constraint functions that de.ne blocks on the equality -or similarity \n-of the BKVs. Applying a blocking scheme bst,c on an entity collection E yields a set of blocks BE t,c.", "They typically associate each record with a Blocking Key Value (BKV), and then operate exclusively on the BKVs [2].", "They typically associate each record with a Blocking Key Value (BKV), and then operate \nex\u00adclusively on the BKVs [2].", "Among these methods, data blocking is the most prevalent one: it clusters the data into blocks, and handles the data inside each block separately, instead of operating on the entire collection [2]."]} +{"1871232|386036": ["However, their fundamental assump\u00adtions are broken by the (semi-)structured \ndata sets of the Web of Data,due to the inherent characteristics of the latter: Loose schema binding, \nsince the schemata describing entities may range from locally de.ned to pure tag-style annotations.", "A complete overview of the existing work in this domain can be found in [5, 7, 15].", "As demonstrated by other approaches [7, 23], it is better to split the data into blocks, such that profiles within a block are more likely to generate matches in comparison to profiles in separate blocks.", "In IIWeb, 2003.", "Applying \na schema matching method to address this problem is not possible in the settings we consider, due to \nthe overabundance of schemata and attributes, the high change rates, and the subtle di.erences in the \nmeaning of attributes that the (user-generated) Web data encompasses [16].", "Web-scale data integration: You can a.ord to pay as you go.", "INTRODUCTION \nDue to the success of Social and Semantic Web applications, as well as the establishment of standards \nand best practices for pub\u00adlishing and exchanging data on the Web, a large and quickly grow\u00ading volume \nof structured and semi-structured data sets has become available on the Web.", "To make ER techniques applicable to large data sets, blocking mechanisms [7, 4, 22] have been introduced.", "Therefore, it cannot deal with the unstructured \nand semi-structured noisy data coming from the Web [7].", "Ef.cient Entity Resolution for Large Heterogeneous Information Spaces George Papadakis Ekaterini Ioannou \nL3S Research Center L3S Research Center Hannover, Germany Hannover, Germany papadakis@L3S.de ioannou@L3S.de \nABSTRACT We have recently witnessed an enormous growth in the volume of structured and semi-structured \ndata sets available on the Web.", "In our experiments, we had n = 7 and i \u2208 [1, 7] with a step of 0, 5, which results in dhmax values that span several orders of magnitude.", "It is suitable, therefore, for representing data both \nin Web [24] and dataspace applications [10].", "A variety of effective and efficient ER approaches exist [7, 23].", "Therefore, it cannot deal with the unstructured and semi-structured noisy data coming from the Web [7].", "As noted in [7], the prevalent method for enhancing the efficiency of the resolution process is data blocking."]} +{"33208889|2082499": ["A good indexing technique should group similar records into one block or close to each other in the index [5].", "However, an optimal key for one domain will likely not work for another domain [5].", "The main drawback of this method is its sensitivity to errors and variations at the beginning of the attribute values that are used as sorting keys, which can signi\ufb01cantly a\ufb00ect the quality of the matching results [5]."]} +{"33208889|386036": ["\u2026), which reduces the search space; record comparison , which compares candidate records in detail using a set of similarity matching functions [8]; classi\ufb01cation , where pairs or groups of candidate records are classi\ufb01ed into matches (records that are assumed to refer to the same entity) and\u2026"]} +{"34328658|2082499": ["More formally, two established measures are used for assessing the performance of a block collection [11, 2, 3, 10]:", "To assess the effectiveness of the (restructured) block collections, we employ four established measures [2, 3, 10, 11, 17]: (i) Pairs Completeness (PC) expresses recall \u2013 see Section 2.", ", placing every entity into multiple blocks, is employed by most blocking methods that handle noisy data [2, 3].", "A comprehensive survey can be found in [3]."]} +{"34328658|386036": ["Comprehensive surveys of the relevant techniques can be found in [1, 20, 21, 22, 23, 24, 25]."]} +{"38463562|2082499": ["In this context, the following measures are typically used for estimating the effectiveness of a block collection B that is extracted from the input entity collection E [4, 5, 22]: (i) Pairs Quality (PQ) corresponds to precision, assessing the portion of comparisons that involve a non-redundant pair of duplicates.", "To assess the effectiveness of a blocking method, we follow the best practice in the literature, which treats entity matching as an orthogonal task [4, 5, 7].", "Entity Resolution has been the focus of numerous works that aim to tame its quadratic complexity and scale it to large volumes of data [4, 8].", "To assess the effectiveness of a restructured block collection B\u2032, we use four established measures [4, 5, 22]: (i) its cardinality ||B\u2032||, i.", "Depending on the input entity collection(s), we identify two ER tasks [4, 21, 22]: (i) Dirty ER takes as input a single entity collection with duplicates and produces as output a set of equivalence clusters.", "In the context of Databases, the former task is called Deduplication and the latter Record Linkage [4].", "Typically, ER scales to these volumes of data through blocking [4].", "to achieve high recall in the context of noisy and heterogeneous data [4].", "They also rely on redundancy, placing every entity profile into multiple blocks so as to reduce the likelihood of missed matches [4, 22]."]} +{"38463562|386036": ["Entity Resolution has been the focus of numerous works that aim to tame its quadratic complexity and scale it to large volumes of data [4, 8].", "compare the profiles within each block [7, 8]."]} +{"103063|2082499": ["Index Terms\u2014Information integration, entity resolution, blocking methods\n\u00c7", "2) high levels of noise: they suffer from incomplete information, as their usergenerated part involves missing or inconsistent data, with extraction errors.", "The most prominent among these techniques is data blocking, which clusters similar entities into blocks and performs comparisons only among entities in the same block."]} +{"103063|386036": ["THE amount of global, digital information has exhibitedan annual increase of 30 percent in the last few years [16], due to the distributed production of information in businesses and organizations, the increased ability and interest for automatic extraction of information from raw data, and the\u2026", "Index Terms\u2014Information integration, entity resolution, blocking methods\n\u00c7"]} +{"5794644|386036": ["I. INTRODUCTION\nIn many telecom and web applications, there is a need to identify whether data objects in the same source or different sources represent the same entity in the real-world."]} +{"12017023|2082499": ["[4]presentsasystemforautomaticallydeterminingthepolarityofrelationsbetweenactors,e.g. politiciansandparties,andissues,suchasunemploymentandhealthcare,inDutchtext.", "Blocking methods may place each entity pro\ufb01le into only one block, forming disjoint blocks, or into multiple blocks, creating redundancy [4].", "We apply them to seven synthetic datasets that were created by FEBRL [5] and have been widely used in the literature for this purpose [4, 13].", "It is de\ufb01ned as: Note that we follow a known best practice [1, 4, 18, 25], examining the quality of a block collection independently of pro\ufb01le matching techniques.", "Redundancy constitutes an indispensable and reliable means of reducing the likelihood of missed matches in the context of highly heterogeneous information spaces (HHIS), such as the Web of Data [4] and Datas-paces [16]."]} +{"12017023|386036": ["The same applies to other related methods, such as the Adaptive Sorted Neighborhood [33] and the Sorted Blocks approach [11].", "For example, even though Canopy Clustering and the Sorted Neighborhood approaches are scalable to large entity collections, they require an a-priori known schema in order to create blocks.", "In the middle of these two extremes lie redundancy-neutral blocking methods, which involve the same number of common blocks across all pairs of entity pro\ufb01les (e.g., Sorted Neighborhood [17]).", ", Sorted Neighborhood [12], Suffix Array [7], HARRA [14], Canopy Clustering [17], and q-grams blocking [10]) group entities based on knowledge about the semantics of their attributes.", "Schema-based methods (e.g., Sorted Neighborhood [12], Suf-\ufb01x Array [7], HARRA [14], Canopy Clustering [17], and q-grams blocking [10]) group entities based on knowledge about the semantics of their attributes."]} +{"15659119|386036": ["(Standard) Blocking algorithms use some blocking key to partition a set of records into disjoint partitions (blocks) [4], [8].", "Duplicate detection, also known as entity matching or record linkage, is the problem of identifying pairs of records that represent the same real-world entity [8], [13]."]} +{"2467151|386036": ["Entity Resolution has been studied under various names including record linkage [19], merge/purge [12], deduplication [20], reference reconciliation [7], object identification [21], and others (see [8, 23, 9] for recent surveys)."]} +{"11668048|386036": ["RELATED WORK There is a large body of related work on record linkage [5] and duplicate detection [4] within the database community as well as on ontology matching [6] in the knowledge representation community."]} +{"2067543|2082499": ["Different indexing techniques are summarized in [6]."]} +{"2067543|386036": ["The entity resolution process encompasses several steps [7]: Data Preprocessing, which cleans and standardizes the data to be used; Indexing, which creates candidate records that potentially correspond to matches; Record Pair Comparison, which compares the candidate records using one or more similarity matching functions [10]; Classification, where candidate record pairs are classified into"]} +{"47178135|386036": ["[12] is a recent survey on this topic."]} +{"16711198|2082499": ["We explain the bene\ufb01ts of blocking and refer to the qualitative measures that assess its performance [6].", "We conclude with their pros and cons and present an assessment of their relative performance, based on the experimental analysis of a recent survey [6]."]} +{"16711198|386036": ["We begin with an introduction to the main concepts of Entity Resolution, based on recent surveys [4] and books [5]."]} +{"16759742|386036": ["The main application of set-similarity joins is near-duplicate object detection [14] (e."]} +{"6111745|386036": ["The task of discovering links between knowledge bases is closely related with record linkage [22, 9] and de-duplication [7]."]} +{"17494085|386036": ["Several techniques have been proposed in the literature, see [7, 16] for recent surveys.", "In the domain of strings, there are a variety of metrics including the Edit distance, SmithWaterman distance, Jaro distance, q-gram and others (refer to [5, 7] for a survey)."]} +{"2082499|386036": ["While statisticians and health researchers commonly name the task of matching records as data or record linkage [11] (the term used in this paper), the computer science and database communities refer to the same process as data or field matching [12], data integration [13], data scrubbing or cleaning [14], [15], data cleansing [16], duplicate detection [17], [18], information integration [19], entity resolution [20], [21], [22], reference reconciliation [23], or as the merge/purge problem [24].", "Two recent surveys have provided overviews of record linkage and deduplication techniques and challenges [4], [18]."]} +{"1164504|386036": ["An extensive amount of literature has been published by the database community on record linkage (see [7,4] for surveys)."]} +{"8558810|8125630": ["Bibliographic databases like Citeseer [5] or social network databases that proliferate in the web nowadays are examples of data sources that contain a large quantity of information about the relationship between entities."]} +{"16748895|2082499": ["Most of the previous work on data deduplication is situated in a centralized setting [4, 6, 7], and does not leverage the capabilities of a distributed environment to scale out computation; hence, it does not scale to large distributed data."]} +{"16748895|386036": ["Data deduplication has been extensively covered in many surveys [12, 13, 17].", "Data deduplication is a pervasive problem, and is extremely important for data quality and data integration [12].", "Since one blocking function might miss placing duplicate tuples in the same block, thus resulting in a false negative (for example, zipcode can be wrong or obsolete), multiple blocking functions [12] are often employed to reduce the number of false negatives."]} diff --git a/edge/graph_21005052.jsonl b/edge/graph_21005052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21005931.jsonl b/edge/graph_21005931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..83dd925dc659f2a5876f1270fbb98419ebd88cba --- /dev/null +++ b/edge/graph_21005931.jsonl @@ -0,0 +1,2 @@ +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} diff --git a/edge/graph_21006293.jsonl b/edge/graph_21006293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90f6a11535638f9ff2a4629c9835ace455f99e4d --- /dev/null +++ b/edge/graph_21006293.jsonl @@ -0,0 +1 @@ +{"22818168|18862495": []} diff --git a/edge/graph_210064253.jsonl b/edge/graph_210064253.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f7690e4159b66e2fd8dbf0a4b86c0b2994518a7 --- /dev/null +++ b/edge/graph_210064253.jsonl @@ -0,0 +1,17 @@ +{"2184150|6607209": ["The agents that regulate the infrastructure can be built to act as a team, i.e., they may share a global objective function that represents the system designer\u2019s preferences over all possible solutions, as it occurs in multi-robot domains (Dias, Zlot, Kalra, & Stentz, 2006)."]} +{"40244280|2373140": []} +{"17934515|7085121": ["As an important complement to vehicular networking, wireless sensor networks (WSNs) also have been deployed along the roadside to enhance traffic safety and efficiency [41]\u2013[43]."]} +{"17934515|763939": ["Some other reviews were stated from the special aspects: such as communication protocols for green environment [24], mobility models in VANET [18], and simulators develop-"]} +{"19581383|468992": ["The main inspiration for swarm drones comes from the observation of social animals, such as ants, bees, birds, and fishes, exhibiting a sort of collective intelligence which appears to achieve complex goal through simple rules and local interactions [3]."]} +{"11023409|1517662": ["An elaborate survey of these approaches is provided in [13]."]} +{"990486|205286236": []} +{"990486|9141490": []} +{"990486|63137": ["\u2026ACO algorithms and probabilistic learning algorithms such as the stochastic gradient ascent and the cross-entropy method; \ufb01nally, Zlochin et al. [160] have proposed a unifying framework for so-called model-based search algorithms that allows a better understanding of what are the important\u2026"]} +{"21221579|627405": ["In this paper, we identify, record, classify, synthesize and report adjustable autonomy research by a SLR.", "The guidelines consist of three phases and their corresponding steps (Brereton et al. 2007).", "Figure 1 shows the SLR methodology based on Brereton et al. (2007).", "This step also ensures that the selected scope is not covered in other similar SLRs.", "Identifying the research scope is an important step of the SLR.", "This paper presents a Systematic Literature Review (SLR) on adjustable autonomy.", "The questions are empirical methods that shape the scope and outcomes of the SLR. Table 1 presents the research questions and their corresponding objectives.", "It provides protocols and methods that help on setting the frame and \ufb02ow of the SLR.", "The research methodology of this work encompasses a Systematic Literature Review (SLR) (Brereton et al. 2007).", "Subsequently, a research methodology that adopts the SLR is not available.", "The methodology of the SLR is adopted from Brereton et al. (2007) guidelines.", "The SLR entails formulating a number of research questions to be investigated (Jatoth et al. 2015).", "It is applied in many SLR studies within the software engineering domain e.g., Calero et al. (2013) and Jatoth et al. (2015).", "The applied SLR methodology has three phases of Plan Review, Conduct Review, and Document Review.", "Consequently, we search the well-known research scholar digital libraries to verify that there is no SLR that has been made on adjustable autonomy topic.", "To the best of our knowledge, no SLR has been made on adjustable autonomy.", "The review protocol de\ufb01nes the review plan including the review process, conditions and quality measures of a conducted SLR study.", "We implement the review protocol according to the guidelines of Brereton et al. (2007) and the SLR example of Jatoth et al. (2015)."]} +{"17370570|30189749": []} +{"51985615|3348390": ["dedicated ontologies, the injection of domain knowledge, and the integration of context-aware mechanisms [8].", "2775047 computer vision [6], [7], ontologies [8] and commonsense reasoning [9], human-computer interfaces [10], among the many."]} +{"51985615|9588126": [", a multiagent system) has been studied extensively [18]."]} +{"41008456|7839197": []} +{"30189749|16049411": ["There is a solid body of research now available for optimizing vehicle system efficiency both for conventional [12] and hybrid powertrain systems [13]."]} +{"277144|9104850": ["There are numerous techniques for cache placement and replacement [34]."]} +{"201102779|30189749": ["In the past, some approaches were proposed to address collaborative management of intersections [5, 10]."]} diff --git a/edge/graph_210064261.jsonl b/edge/graph_210064261.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0989fa4af24dc52ccc01dd4cdcb29ea372fb05f0 --- /dev/null +++ b/edge/graph_210064261.jsonl @@ -0,0 +1,7 @@ +{"8031843|15012959": ["A number of query interface clustering algorithms have been developed [Noor et al., 2011]."]} +{"8031843|206742377": []} +{"8031843|10500613": []} +{"8031843|386036": []} +{"8031843|913718": ["Database schema matching has been extensively researched and several surveys and summaries of the main techniques can be found in the literature (e.g., Bellahsene et al., 2011; Rahm and Bernstein, 2001; Shvaiko and Euzenat, 2005)."]} +{"8735030|55524073": ["[48] divided honeypot research into 5 major areas: types of honeypots, analysis of"]} +{"8735030|2867949": ["First, various surveys tackled the detection techniques in network traffic such as NIDS [37], threats such as DDoS [38], botnet [39], [40] and worms [41], and malicious activities such as scanning [42].", "work traffic such as NIDS [37], threats such as DDoS [38], botnet [39], [40] and worms [41], and malicious activities such as scanning [42]."]} diff --git a/edge/graph_210064534.jsonl b/edge/graph_210064534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc17b689d5d026e00f2d72e5325892ce5421b546 --- /dev/null +++ b/edge/graph_210064534.jsonl @@ -0,0 +1,25 @@ +{"14343656|987239": ["Features Global shape descriptors, such as statistics of shapes [21] and distance functions [15], have been used for 3D shape retrieval [25]."]} +{"52145130|1770055": ["We direct readers to a recent survey [Bernardi et al. 2016], which summarizes related datasets and an evaluation of various models."]} +{"1033682|174797842": []} +{"13750877|15361180": ["As we are proposing a retrieval system where input queries can be of different modalities, our work is related to multimodal retrieval approaches like [5]."]} +{"59337593|10092092": ["According to [23, 114], based on whether the feature spaces and label spaces in the source and target domains/tasks are the same, transfer learning can be classified into homogeneous transfer learning and heterogeneous transfer learning .", "Although there are surveys on transfer learning [115, 152], and particularly on heterogeneous transfer learning [23], they do not cover the topic of zero-shot learning with sufficient depth.", "Many existing methods for HTL-DLS are proposed for problems under the setting in which there are some labeled instances for the target label space classes [23]."]} +{"59337593|3761015": ["Although there are surveys on transfer learning [115, 152], and particularly on heterogeneous transfer learning [23], they do not cover the topic of zero-shot learning with sufficient depth."]} +{"22879156|987239": ["The comprehensive study of 3D shape retrieval can be found in [1, 2, 4]."]} +{"9779851|4915696": ["Massive researches on crowd analysis [26] and video retrieval [16] have been conducted in recent years."]} +{"9779851|16403716": ["Massive researches on crowd analysis [26] and video retrieval [16] have been conducted in recent years."]} +{"202539097|9045232": [", segmentation [39], image recognition [38, 30]), or even in the modern tasks such as image-to-image translation [41], photo sketching [18] and so on."]} +{"199135406|18543658": []} +{"199135406|18599847": []} +{"11732635|6627566": ["A survey on three typical semantics processing (relevance feedback, machine learning, and ontology) has been performed in [6], while Tousch et al. [28] presented a survey on semantics-based image annotation."]} +{"204509162|8574504": ["We refer two comprehensive review papers [36] [37] of the semantic segmentation to readers with more interest."]} +{"201103938|5039465": []} +{"201103938|6288895": []} +{"4570087|3693305": ["We refer readers to [67] for a survey of ANN approaches.", "For learning to hash, a recent survey [67] categorizes it into quantization and pairwise similarity preserving."]} +{"10197975|987239": ["While research on example-based retrieval \u2013 where users provide a full model as the query \u2013 has recently found a lot of interest in the community [Tangelder and Veltkamp 2008], its practical application is difficult, since a good example is often not at hand."]} +{"2826476|18543658": []} +{"173188134|3654323": ["For a general primer, we refer the reader to the following reviews (Weiss et al., 2016; Csurka, 2017; Wang and Deng, 2018).", "For a general primer, we refer to several literature reviews (Weiss et al., 2016; Csurka, 2017; Wang and Deng, 2018)."]} +{"173188134|7559976": ["For a general primer, we refer the reader to the following reviews (Weiss et al., 2016; Csurka, 2017; Wang and Deng, 2018).", "For a general primer, we refer to several literature reviews (Weiss et al., 2016; Csurka, 2017; Wang and Deng, 2018)."]} +{"4939466|987239": ["Most of the existing works fall into the \ufb01rst group, which is provided with a query 3D model and returns similar models [1]\u2013[7].", "Most of the existing works about 3D shape retrieval is the example-based framework [1], [3], [5]\u2013[7], [18]\u2013[32], which could be roughly classi\ufb01ed into three categories, projection based methods, diffusion based methods and deep learning based methods."]} +{"13311218|6746689": []} +{"4293318|6746689": ["Prior to using the TU-Berlin sketches as input to the CNN training, skeletonization is performed [44]."]} +{"4402568|15361180": ["For a comprehensive survey, please refer to [60, 61]."]} diff --git a/edge/graph_210064603.jsonl b/edge/graph_210064603.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6c505be5f4bb0a9623a53e3cdd90cadcd683640 --- /dev/null +++ b/edge/graph_210064603.jsonl @@ -0,0 +1,41 @@ +{"6515071|7971188": ["The small-world phenomenon\u2014connectivity by short chains of acquaintances\u2014has become the subject of computer and social network analysis [52,55], including P2P networks [49,5]."]} +{"6515071|14697846": []} +{"8305806|8496692": ["There are several strategies to construct AL multicast over lays [2], [17], [20], [33], [46]:", "Several performance metrics have been defined to characterize the multicast communication service and impacts on t he network [17], [44].", "The algorithms for topology creation can be implemented in different ways, each of them with different advantages an d drawbacks [17], [20]:", "Two of the most popular algorithms are the recursive algorithm and the clustering algorithm [17]."]} +{"8305806|6265393": ["Hop-by-hop reliable AL multicast communication has been shown to considerably reduce the average latency and jitterof reliable communication [4].", "Planned future work is to develop a dedicated middleware environment, which will be used to develop new protocols for multimedia distribution over IP and to offer soft QoS guarantees for specific applications in a multicast environme t."]} +{"37950978|7971188": []} +{"37950978|14697846": []} +{"16875753|1107573": []} +{"16875753|10926328": ["The other approach is to list the security problems or possible attacks against a P2P system that could violate the security properties of the P2P system [Palomar et al. 2006].", "The other approach is to list the \nsecurity problems or possible attacks against a P2P system that could violate the security properties \nof the P2P system [Palomar et al. 2006]."]} +{"16875753|14697846": ["The existence of groups is especially emphasized in the case of Peer-to-Peer (P2P) networks because they are, inherently, platforms for both interpersonal communication and distributed systems consisting of computing nodes [Androutsellis-Theotokis and Spinellis 2004].", "One approach is to list the desirable properties of a secure P2P system [Androutsellis-Theotokis and Spinellis 2004].", "Classi.cation \nof Peer-to-Peer Systems P2P technologies are typically used for implementing overlay networks at the \napplica\u00adtion layer, on top of the underlying (usually IP-based) network topology [Androutsellis-Theotokis \nand Spinellis 2004].", "Scalability is the ability to accommodate \nan increasing number of nodes in a P2P system without severely degrading the performance of the system \n[Androutsellis-Theotokis and Spinellis 2004].", "\u2026\n 20:2 T. Koskela et al. The existence of groups is especially emphasized in the case of Peer-to-Peer \n(P2P) networks because they are, inherently, platforms for both interpersonal communication and distributed \nsystems consisting of computing nodes [Androutsellis-Theotokis and Spinellis 2004].", "One approach is to list the desirable properties \nof a secure P2P system [Androutsellis-Theotokis and Spinellis 2004].", "Scalability is the ability to accommodate an increasing number of nodes in a P2P system without severely degrading the performance of the system [Androutsellis-Theotokis and Spinellis 2004]."]} +{"33984499|7971188": ["The interested reader is also referred to Androutsellis-Theotokis and Spinellis (2004) and Eng Keong et al. (2005) for slightly outdated yet related reviews on P2P overlays.", "They are organized in a distributed manner without any hierarchy or centralized control (Eng Keong et al., 2005).", "Flooding mechanisms are used for resource discovery and peer locations are random (Eng Keong et al., 2005).", "Performance: According to Stoica et al. (2003) a lookup procedure in a stable N-node Chord overlay requires O(log N) messages, while Eng Keong et al. (2005) indicate a \u00f0log N\u00de2 performance under churn."]} +{"33984499|14697846": ["The interested reader is also referred to Androutsellis-Theotokis and Spinellis (2004) and Eng Keong et al. (2005) for slightly outdated yet related reviews on P2P overlays."]} +{"17795935|7971188": ["Approaches for peer-to-peer overlay networks are surveyed in [16], which discusses both structured and unstructured models."]} +{"195357231|21629724": ["\u2022 OSNs are vulnerable to specific attacks (like sybil attacks (Al-Qurishi et al. 2017) or social spamming (Gao et al."]} +{"20939998|7971188": ["In other words, they have a close coupling between the P2P topology and location of data, which commonly make use of Distributed Hash Tables (DHTs [11])."]} +{"3144189|7971188": ["This choice is motivated mainly by the good properties that DHTs offer [36]."]} +{"49331995|8215225": ["[11] divide the field of distributed data aggregation into structured, unstructured and hybrid."]} +{"22157387|7971188": ["Topologies based on overlay of brokers [20], [21], [36]\u2013 [38] generally enable the management of a larger number of users and events because the responsibility and complexity of matching and routing decisions is spread across the overlay nodes [39]."]} +{"22157387|10559330": ["The only example of this kind of support is provided by IndiQoS, which builds on the Integrated Services model to offer guaranteed timing bounds for its event distribution service.", "Publishers and subscribers include QoS parameters in their advertisement/subscription messages; these parameters respectively correspond to TSPEC/FLOWSPEC objects of IntServ.", "IndiQoS assumes that the IP network, on top of which the Bamboo overlay and the PUB/SUB subsystem are built, supports deterministic routing behavior through mechanisms such as DiffServ [75] or IntServ [76].", "A more important problem comes from the fact that IndiQoS is practically implemented using IntServ, and thus it inherits all the well-known limitations of the IntServ architec-\n4Not to be confused with RSVP reservations.\nture.", "In practice, in their articles, the authors describe a protocol and an implementation that use the Integrated Services [76] and RSVP [77].", "B. IndiQoS\n1) Motto: \u201cEvent routing with guaranteed latency via IntServ resource reservations\u201d\n2) Description: The main goal of the IndiQoS system is to provide QoS-aware event routing in type-based PUB/SUB systems.", "Most importantly, RSVP paths need to be created on the IP segments connecting any pair of neighboring brokers: this may be impossible if at least one path passes through a router that does not support IntServ."]} +{"10922780|7971188": []} +{"3112290|7971188": []} +{"13639283|14697846": ["Although file sharing probably still today is the best-known application of P2P systems, applications of P2P systems go beyond that and can be divided into at least the following four categories (as introduced by [1]): Information sharing, Communication, Collaboration, and Distributed computation ."]} +{"21629724|16828740": ["An OSN can be described as a website that provides a venue for users to connect with other users, friends, and family members [28].", "Generally, a Sybil attacker is a user that creates many fake identities to increase the power and influence of the attacker in the network and thereby generate engage in malevolent activities, such as disseminating social spam, distributing malware, distorting online ratings, executing phishing attacks, and so on [28], [49], [50].", "SYBIL ATTACK DEFENSE: SOLUTIONS AND SCHEMES Recently, interest and efforts for defending against malicious attacks in social networks using reliable solutions and schemes have increased [28], [44], [49]\u2013[52]."]} +{"21629724|12574246": ["These techniques are commonly used in areas such as pattern recognition (speech and image processing) and financial algorithms (credit scoring and algorithmic trading) [77]."]} +{"21629724|6444031": ["Second, they assume that a legitimate region in a social graph is always fast mixing; however, this assumption cannot be confirmed as being true [50], [51], [53], [54] because real social graphs are randomly formed and dynamically grow.", "Generally, a Sybil attacker is a user that creates many fake identities to increase the power and influence of the attacker in the network and thereby generate engage in malevolent activities, such as disseminating social spam, distributing malware, distorting online ratings, executing phishing attacks, and so on [28], [49], [50].", "[50], [53] mentioned that the calculation of the property of mixing time in the social graphwas used without careful measurements in the respective studies."]} +{"21629724|36438802": ["Moreover, they are convenient because they enable users to create new connections with people who have similar affinities, such as a similar profession or similar interests [31]\u2013[33].", "\u2019\u2019 These ties can be manifold and assorted, and may include concepts, such as genealogy, age, ideas, gender, education, club membership, and political affiliations, among other characteristics that may influence relationships in the OSN, as described in [29], [32], [33], [35]."]} +{"21629724|2294541": ["Moreover, false reputation can be created based on Sybil accounts [48]."]} +{"3040787|7971188": []} +{"3040787|14697846": ["Peer-to-Peer overlay networks are distributed syste ms consisting of interconnected nodes able to be selforganized into network topologies with purpose of sharing res ources such as content, CPU cycles, storage and bandwidth, and accommodating transient populations of nodes while maintaining acceptable connectivity and performance , without requiring the intermediation or support of a global centralized server or authority [2]."]} +{"8010851|8914588": []} +{"6317415|10559330": ["Other approaches to network QoS include Integrated Services (IntServ), in which flows must reserve resources that will be needed [10], and Differentiated Services (DiffServ), in which classes of flows (say, from the same ISP) are provided service based on a service level agreement [8]."]} +{"43326729|14889616": []} +{"1024220|14441987": []} +{"3220248|7971188": ["Scalable storage and retrieval of arbitrary resources in P2P networks are provided by a structured network overlay organised as a Distributed Hash Table (DHT) [1]."]} +{"13799939|14697846": ["Moreover, P2P networks enable the participants to share resources, such as computational power, storage, and bandwidth [Androutsellis-Theotokis and Spinellis 2004]."]} +{"5410823|8207294": ["As a result, many of the database techniques developed for recursive query processing may be relevant for network routing protocols, particularly those techniques that have been mapped to parallel or distributed scenarios [5]."]} +{"18876358|2457428": ["We avoid repetition by referring the reader to [9, 16] for performance analysis and to [1, 19] for parameters and e\ufb03ciency comparisons."]} +{"33354449|7971188": ["The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|14697846": ["The interested reader is referred to [160,392,393,202] for more detailed surveys.", "and (iii) partially centralised (or hierarchical) [160].", "However, this form of overlays is usually still classified in the unstructured family [160,202].", "The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|10559330": []} +{"37109390|7971188": ["Our work, with its focus on deployable peer-assisted content delivery, is complementary to several survey articles which have focused on traditional P2P-based content delivery [7] , or on speci\ufb01c P2P issues such as P2P overlay construction [68] , or chunk scheduling [62] .", "A comprehensive survey of various techniques proposed for structured and un-structured P2P networks has been presented in [68] ."]} +{"37109390|14697846": ["Our work, with its focus on deployable peer-assisted content delivery, is complementary to several survey articles which have focused on traditional P2P-based content delivery [7], or on specific P2P issues such as P2P over-", "For instance, the authors of [7] present a critical analysis on different design"]} diff --git a/edge/graph_210076541.jsonl b/edge/graph_210076541.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210116691.jsonl b/edge/graph_210116691.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18eaa9778b31f74f350a2c88a17d1ccc239b8b04 --- /dev/null +++ b/edge/graph_210116691.jsonl @@ -0,0 +1,26 @@ +{"206489374|5313655": ["For an exhaustive review of works dealing with with cancelable biometrics and cryptobiometrics template protection for biometric characteristics other than signature, the reader is referred to [30], [31]."]} +{"86760143|4861446": ["The use of location information and its potential for the development of ambient intelligence applications has significantly promoted the design of local positioning systems during the last decade [8]."]} +{"86760143|13756560": []} +{"49563397|6387482": ["This method of proving liveliness has been widely studied in the field of information fusion [12, 17, 29]."]} +{"49563397|8042572": ["This method of proving liveliness has beenwidely studied in the field of information fusion [12, 17, 29]."]} +{"15662958|25206420": ["Although [Moore et al. 2014b] is one of the most recent surveys, it focuses on the hardware implementation solutions of FHE schemes.", "However, the conventional encryption schemes can not work on the encrypted data without decrypting it \ufb01rst.", "\u2026FHE and SWHE schemes mainly focused on three implementation platforms: Graphics Processing Unit (GPU), Application-Speci\ufb01c Integrated Circuit (ASIC), and Field-Programmable Gate Array (FPGA) (A useful survey of hardware implementations of homomorphic schemes can be found in [Moore et al. 2014b]).", "\u2026by FPGAs motivates many researchers to speed up the practicality of FHE schemes [Cousins et al. 2012; Wang and Huang 2013; Cao et al. 2013; Moore et al. 2013; Chen et al. 2015; Cao et al. 2014; Moore et al. 2014a; Cousins et al. 2014; Roy et al. 2015; P\u00f6ppelmann et al. 2015; \u00d6zt\u00fcrk et al. 2015]."]} +{"15662958|14067375": []} +{"14946100|2357830": ["Due to the inherent weaknesses of underlying wireless radio communication, NFC systems are plagued with a wide variety of security and privacy threats similar to the RFID systems [12]."]} +{"192521836|53730401": ["Recently, for satisfying users\u2019 various mobile Internet service requests for data exchange anytime and anywhere even in their moving vehicles, the generated mobile data traffic has been rapidly increasing and has become a serious burden on current cellular networks [105]."]} +{"192521836|12187684": ["[67] [68] [69] [70] [71] [72] [73] [74] [75] [76] [77]", "Recommendation system based Contextualized recommendation [26] Social fusion [67] Evaluates a set of social condition and context-aware actions, and to prove whether or not the conditions have been logically verified for both logically verified for both individual and groups of MSN users Focus on analyzing and discovering the social relationships between users Fuse the data streams from mobile users, social networks and sensors"]} +{"1585495|27527196": []} +{"1585495|15782139": ["Handwriting Recognition: The techniques for automatic handwriting recognition (HWR) can be classi\ufb01ed as online and of\ufb02ine case [12].", "Of\ufb02ine recognition usually processes images of handwriting only, whereas online recognition can further utilize rich sensor data such as stylus positions and temporal information during the writing process [12, 13]."]} +{"6957595|2357830": ["This information may also be used to impersonate the tag owner via cloning [2].", "Unlike other devices, such information can easily be subject to clandestine eavesdropping when stored on RFID tags, which can lead to owner tracking [2]."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"15009759|18418184": []} +{"17279615|9913343": ["Other knowledge-based schemes have been proposed in the past, such as cognitive and graphical passwords [Zviran and Haga 1990; Suo et al. 2005], but none of them are used by the banks examined in the survey."]} +{"17279615|5246835": []} +{"18339794|18418184": ["[14] defined an audio-fingerprint as a succinct description generated from a piece of audio."]} +{"52884581|6414421": []} +{"2946560|18454590": ["Interested readers may refer to more detailed readings for additional background on speech recognition [9, 12, 16, 18]."]} +{"206508064|17574321": ["Studies show that there are three level of features characterize the individuality of speakers: high level, spectro-temporal and short-term features [16].", "The objective of a speaker veri\ufb01cation system is to automatically accept or reject a claimed identity S of one speaker based on just the speech sample [16].", "As it is more reliable to characterize speakers by their spectral cues [16], most of the state-of-the-art speaker veri\ufb01cation systems are built to detect the difference of spectral patterns."]} +{"927187|7185733": ["Vision-based gesture recognition systems [23] are perhaps closest to audio location, in that the user does not need any special hardware or devices, and in that it is possible to consider using cheap \u201cwebcams\u201d to produce low-cost 3D interfaces (though much of the research presented uses top-of-the-line cameras with significant cost)."]} +{"58981424|3553112": ["Second, many IoT devices do not feature user interfaces, making it impossible to perform security establishment using traditional mechanisms like passwords [7]."]} +{"58981424|3348390": ["), augmented with metadata like timestamps [22]."]} diff --git a/edge/graph_210116808.jsonl b/edge/graph_210116808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55d77320f2d41e794332c263e4be2623698d1371 --- /dev/null +++ b/edge/graph_210116808.jsonl @@ -0,0 +1,8 @@ +{"201142233|52181356": ["Many approaches have not been tested on real SCADA networks but only in (simulation) testbeds, as criticized by [16], [32], [33]."]} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} +{"201065498|47021799": ["Otherwise, it will easily be flagged or blocked by existing ICS intrusion detection tools [14].", "Recently, a survey on intrusion detection solutions for industrial control systems is presented in [14]."]} +{"53015016|207209718": ["[33], anomaly detection techniques used in ICS intrusion detection can be broadly divided into supervised, unsupervised, and semi-supervised techniques.", "[33], ICS anomaly detection methods include knowledge and behavior-based methods."]} +{"2332366|18740719": ["Research challenges faced by SCADA systems in risk assessment are outlined in [37] and [38]."]} +{"2332366|86629084": []} +{"21702602|2142482": ["Instead, they look for irregular runtime features that are different from normal network behavior [26].", "Network traffic that matches the attack signatures raises operator alarms [26, 38]."]} +{"21702602|18977370": ["AC CE PT ED M AN US CR IP T In contrast, anomaly detection techniques can detect previously-unknown attacks [16]."]} diff --git a/edge/graph_210117984.jsonl b/edge/graph_210117984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7b4bfc51e277034468c16f9c6222b84b0162bf8 --- /dev/null +++ b/edge/graph_210117984.jsonl @@ -0,0 +1,4 @@ +{"116172163|8363289": []} +{"53282407|9651858": ["green cellular networking has drawn considerable attention in ICT sectors [11]."]} +{"23805277|6556803": []} +{"52913836|31086789": ["SMART grids offer significant potential for reliable electricity supply and improved energy efficiency with the integration of various electrical components such as renewable energy sources (RESs), electrical storage, and electric vehicles [1]\u2013[3]."]} diff --git a/edge/graph_210122798.jsonl b/edge/graph_210122798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9cd0050840d2d98aa2187cc645c36ca9e27153dd --- /dev/null +++ b/edge/graph_210122798.jsonl @@ -0,0 +1,10 @@ +{"30375532|3102110": ["Clustering technique is usually used to segment markets (Punj and Stewart, 1983; Chen et al., 1996), which seeks to maximize variance among groups while minimizing variance within groups."]} +{"19713519|207372751": []} +{"199000916|210122798": []} +{"2462496|1386147": ["Given the constrained optimization perspective, in the simple case where l = 1 we could analyze how g trends as a function of various values for c , from which we could extract the Pareto frontier [6] and which we could use to make a data-driven decision on what value of c is appropriate."]} +{"815321|1805048": ["The CF-based algorithms cannot make predictions for these users (Su & Khoshgoftaar, 2009)."]} +{"199000958|210122798": []} +{"15936575|13392386": ["2 For a review of the literature in mobile recommender systems, please see (Liu et al. 2013; Ricci 2010)."]} +{"15936575|16298606": ["This is mainly due to the inherent difficulty of measuring the economic impact of RSes, the limited availability of appropriate datasets, and the increasingly important privacy concerns that RSes and location-based services raise (Krumm 2009; Riboni et al. 2009)."]} +{"10501425|1805048": ["For a broad survey of recommendation methods see [1, 29]."]} +{"202639561|8372620": ["In some contexts, we may separate borrowers into protected and unprotected groups, where the borrowers from the protected group are the particular concern [18]."]} diff --git a/edge/graph_210129319.jsonl b/edge/graph_210129319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..145b435fa9ac7c7e5e4073900284cee79afcfe38 --- /dev/null +++ b/edge/graph_210129319.jsonl @@ -0,0 +1,37 @@ +{"53943607|9232391": []} +{"7447615|9316331": []} +{"38938891|5014732": ["It is important to understand that MMORTS games differ from classic RTS games in various aspects, and the use of well-known benchmark and frameworks, such as Senior (2010), Ontanon et al. (2013), does not apply here."]} +{"38938891|12068725": ["Evolutionary algorithms have been successfully applied by PCG researchers to generate content for several game genres, such as racing games (Cardamone et al. 2015), arcade (Cook and Colton 2011), collectible cards (Mahlmann et al. 2012), platform (Shaker et al. 2011), and many others.", "In this paper, we perform a simulation-based evaluation (Togelius et al. 2011; Shaker et al. 2014).", "This work follows the assumption that the PCG for the NPCs, that are adapting to human strategies, can contribute to making these games more attractive and challenging to human players.", "Among many other bene\ufb01ts of PCG, stand out is its potential to turn computers into creators of massive, varied worlds for players to explore, at a fraction of the cost of human authorship (Tozour and Champandard 2012).", "Thishasbeenoneofthecentralideasofthe Procedural Content Generation (PCG) research (Smith 2014; Shaker et al. 2014).", "This work consists in a search-based PCG (Togelius et al. 2011; Ferreira and Toledo 2014), where the content is a team of the evolved heroes, featuring their own battle formations.", "Such methods are the most common choice among researches of search-based PCG (Togelius et al. 2011).", "Finally, the PCG algorithm is executed.", "In recent years, PCG has been receiving attention from both academic researchers and industrial developers."]} +{"52295626|12068725": ["This paper explores how machine learning can be used for procedural content generation as a surrogate model, indirectly influencing the fitness function of a search-based PCG algorithm [33].", "An important strength of the surrogate model is its speed when it replaces simulation-based evaluations for a search-based generator [33].", "Similar simulation-based evaluations abound in the PCG literature [33]; their main limitation is that they are very computationally expensive.", "Moreover, many academic papers have formulated properties of game levels [22] or rulesets [3] in a quantitative fashion, often to use them as an objective to optimize towards [33]."]} +{"9950600|12068725": ["\u2026sps74@drexel.edu, mguzdial3@gatech.edu, christoffer@holmgard.org, amy.hoover@gmail.com, aisaksen@appabove.com, nealen@nyu.edu, julian@togelius.com\nThis survey explores Procedural Content Generation via Machine Learning (PCGML), defined as the generation of game content using machine learning\u2026"]} +{"52297812|12068725": ["[15, 16] present a detailed overview of recent research on PCG and discuss its multiple dimensions, such as dungeon generation [14], grammars and L-systems with applications to vegetation [13] and search-based approaches [12].", "PCG is the programmatic generation of game content using a random or pseudorandom process that results in an unpredictable range of possible game play spaces1.", "Experience-Driven Procedural Content Generation [19] explores various approaches for creating models of player experience based on data obtained from the players themselves, which are extremely relevant for assessing the content of online PCG [10] [3] [6].", "PCG can be used to generate engaging and refreshing game worlds providing less predictable gameplay, as well as ensuring more replayability.", "Togelius et al. [15, 16] present a detailed overview of recent research on PCG and discuss its multiple dimensions, such as dungeon generation [14], grammars and L-systems with applications to vegetation [13] and search-based approaches [12].", "Procedural Content Generation (PCG) [11, 16] is a growing trend in the software games industry and games research."]} +{"16187247|12068725": ["It is well known that the risk of catastrophic failure and a lack of quality are among common concerns for existing PCG techniques [3] given the fact that a content generator may generate unplayable content or content that is not appropriate for anyone's tastes.", "While there are various content representations [3], our current work is confined to a class of representations characterized by a game parameter vector of parameters denoted by", "While existing techniques [3] may be used to carry out the IP model as discussed later on, we would develop more efficient techniques to enable the IP model to generate content online.", "Although substantial progress has been made in PCG, existing PCG techniques still encounter a number of challenging problems such as content representation, content space management, content quality evaluation, content generation efficiency and so on, which have been thoroughly summarized in [3].", "While our method working in the generate-and-test style is designed for computational efficiency, more sophisticated search-based techniques [3] might make use of four component models to generate quality contents."]} +{"3068042|12068725": ["EDPCG primarily focuses on bottom-up, search-based [6] approaches for generating content, which are driven by computational heuristics of player experience.", "employing PCG algorithms since the 80s, academic research on PCG methods (such as the search-based PCG paradigm [6]) has bloomed only in the last five years.", "global optimization techniques such as evolutionary algorithms and particle swarm optimization [6]."]} +{"3068042|3387861": ["Such signals are obtained through electrocardiography (ECG) [13], galvanic skin response (GSR) [11], respiration [13], electroencephalography (EEG) [15], and electromyography (EMG).", "For instance, existing techniques for physiological recording require physical contact between body parts (e.g., head, fingertips) and sensors, making physiological signals such as EEG and skin conductance impractical and intrusive.", "through electrocardiography (ECG) [13], galvanic skin response (GSR) [11], respiration [13], electroencephalography (EEG) [15], and electromyography (EMG).", "On a positive note, recent advances in sensor technology have resulted in low-cost unobtrusive biofeedback devices appropriate for gaming applications (such as the Emotiv2 EEG system and Empatica\u2019s Embrace bracelet3)."]} +{"52043563|12068725": ["A popular approach is search-based PCG, where an evolutionary algorithm or other stochastic search algorithm is used to find good game content [17]."]} +{"14960131|12068725": ["Nevertheless, it is often employed in design tools or so-called offline PCG [5].", "While much work has been done applying procedural content generation (PCG) techniques to individual aspects of game design, to the best of our knowledge there has been no major concerted effort to investigate the possibility of a system which procedurally generates many or even all aspects\nManuscript received September 14, 2014; revised March 29, 2015; accepted November 29, 2015.", "This is mostly likely due to the way in which PCG is typically employed in modern game development: as a tool to solve a specific problem, or a feature within a large creative vision that stems from a person."]} +{"13155548|12068725": ["[9] which in turn utilizes Searchbased Procedural Content Generation [10]."]} +{"40846237|12068725": ["In the context of learning games, procedural content generation (PCG) can alleviate the manual creation of game content, specially when considering that personalized learning may require content that cannot be accounted for at design time [11, 31].", "A common approach in PCG for related problems is to use stochastic algorithms that generate puzzles and then evaluate and check wether the generated puzzles satisfy the desired constrains [14, 31].", "For example, most search-based and generate-and-test approaches require evaluation or heuristic functions [14, 30, 31]."]} +{"23592094|10565822": ["Learning to program involves a variety of complex cognitive activities, from conceptual knowledge construction to basic structural operations, including program design, programming understanding, modifying, debugging, and documenting [14-15]."]} +{"6938144|14826104": ["Educational data mining researchers have shown the power of recommender systems to model learner skills [19]."]} +{"6938144|1805048": ["We quantified prediction quality as cross-validated percent variance explained\u2014a standard evaluation metric for matrix and tensor decomposition evaluations [30], [32].", "Matrix and tensor factorization handle missing information from players, achieve high accuracy, and can be trained efficiently even with large amounts of data [22], [31], [32].", "Tensor factorization is an extension of matrix factorization, which has been used in collaborative filtering applications\u2014such as the Netflix Prize data mining competition\u2014to great success [31], [32]."]} +{"35197876|12068725": ["Lastly, human imagination is limited (Togelius et al. 2011), making it hard for experts to create a variety of interesting-looking puzzles that meet the target educational goals.", "Related Work There have been a lot of studies on generating game content for entertainment games (Khalifa and Fayek 2015; Togelius et al. 2011; Hendrikx et al. 2013).", "There have been a lot of studies on generating game content for entertainment games (Khalifa and Fayek 2015; Togelius et al. 2011; Hendrikx et al. 2013)."]} +{"84186616|9316331": ["cess in discrete, turn-based, and nondeterministic game domains [32]."]} +{"84186616|12068725": ["This allows the system to gather general, reusable knowledge that can serve many purposes and contexts, rather than producing a single, optimal design for a pre-defined criteria as in searchbased procedural content generation [28], [29].", "an algorithm iteratively optimizes a single design, discarding any learned information after a design is found to optimize the (current) objective [28], [29]."]} +{"15796834|12068725": []} +{"52283008|12068725": ["2766218 of these genres, evaluating feasibility is relatively simple and can be solved with path-finding algorithms [8]."]} +{"9854233|12068725": ["via numerical evaluations of one or more game properties used as gradients for a search-based generator [32], via a set of constraints for what is an acceptable level in constraint-based PCG [29], or via a set of expressive and high-quality modular components that can be combined in grammar-based PCG [6]."]} +{"16305773|12068725": ["In particular, evolutionary computation and other search-based approaches [19] can enable the design of new content outside the scope of a \ufb01xed space of rules.", "This paper describes a new form of gameplay and a corresponding method of procedural content generation [17, 19, 5] which are made possible by evolutionary computation.", "When applied to games, procedural content generation (PCG) allows game elements (e.g. maps, textures, items, quests, etc.) to be generated algorithmically rather than through direct human design [19, 5]."]} +{"12489763|4855722": ["[20, 21] presented an evolutionary algorithm for the in-game generation of terrains based on a set of height-map patches extracted from sample maps whose layout was optimized through evolution."]} +{"14819920|12068725": [", [11, 15, 16]) that ensure a game content is playable for the players."]} +{"465150|14826104": ["Intelligent Tutoring Systems researchers have explored several models for capturing student knowledge and selecting problems [14]."]} +{"4612779|12068725": ["In particular, evolutionary computation and other searchbased approaches [3] can limit the need for hand-designed rules, and may thus further save on PCG development costs.", "A promising technique for automatically creating new game content is procedural content generation (PCG; [1], [2], [3]).", ") to be generated algorithmically rather than through direct human design [3], [5]."]} +{"37037359|12068725": ["Togelius et al. [25] designed a PCG system capable of generating tracks for a simple racing game from a parameter vector using a deterministic genotype-to-phenotype mapping.", "There is a subfield in PCG (i.e. Searchbased PCG [7,8]) whose techniques apply a generate and test scheme so the content is firstly generated based on previous evaluations and then evaluated according to some criteria (this paper presents a method that follows this scheme).", "These benefits are well known by the industry as demonstrated by the use of PCG techniques during the development of commercial games such as Borderlands saga with procedurally generated weapons and items, Skyrim (terrains and forests), and Minecraft or Terraria with procedurally generated worlds.", "Procedural Content Generation (PCG) [5,6] refers to the algorithmic creation of game content, either with human intervention or without it, such as maps, levels, textures, characters, rules and quests, but excluding the behavior of non-playable characters and the game engine itself.", "This function is used in turn to determine how close/far each map generated by the PCG method (a self-adaptive evolutionary algorithm) is to a collection of maps which were taken initially to be aesthetic or non-aesthetic.", "The application of the aforementioned PCG techniques for Planet Wars involves, in this case, generating the maps on which the game takes place.", "R. Lara-Cabrera \u21d1, C. Cotta, A.J. Fern\u00e1ndez-Leiva Department of \u2018\u2018Lenguajes y Ciencias de la Computaci\u00f3n\u2019\u2019 ETSI Inform\u00e1tica, University of M\u00e1laga, Campus de Teatinos, 29071 M\u00e1laga, Spain\na r t i c l e i n f o\nArticle history: Received 30 January 2014 Revised 3 July 2014 Accepted 1 August 2014 Available online 13 August 2014\nKeywords: Procedural content generation Game aesthetics Computational intelligence Real-time strategy games\na b s t r a c t\nThis paper presents a procedural content generation (PCG) method that is able to generate aesthetic maps for a real-time strategy game.", "Searchbased PCG [7,8]) whose techniques apply a generate and test scheme so the content is firstly generated based on previous evaluations and then evaluated according to some criteria (this paper presents a method that follows this scheme).", "PCG techniques are usually employed to generate maps, as exhibited by the large number of papers on this topic [6].", "The use of PCG has several advantages, including saving memory and disk space, improving human creativity and providing adaptivity to games.", "At the moment, there are three main goals [5] of PCG research that are currently not obtainable and it would require significant further research effort: multi-level multi-content PCG (i.e. systems that are able to generate multiple types of quality content at multiple levels of granularity in a coherent fashion while taking game design constraints into consideration), PCG-based game design (i.e. creating games where a PCG algorithm is an essential part of the game instead of being a design tool) and PCG systems that could create complete games including the rules and game engine.", "In the following, we will describe these different characterizations, and study the results obtained when an evolutionary PCG method is deployed on them."]} +{"2614242|12068725": ["The search-based procedural content generation paradigm (Togelius et al., 2011) often uses genetic algorithms to search for new content which maximize a fitness function pertaining to its entertainment value (Yannakakis and Togelius, 2011), its learnability (Browne and Maire, 2010), its visual\u2026", "Genetic search has early on demonstrated its power at numerical optimization in a plethora of domains including evolutionary design (Lewis, 2008) and search-based procedural content generation (Togelius et al., 2011)."]} +{"44008936|12068725": ["The paper defines several categories that specify the types of content generated, how to insure quality, and when content is being generated [9]."]} +{"16571361|12068725": []} +{"14626303|12068725": []} +{"22577553|12068725": ["PCG is the algorithmic creation of content [3], typically for video games.", "Generate-and-test approaches are a popular family of PCG approaches.", "We test our approaches in three domains: Super Mario Bros., a platforming game often used as a testbed for PCG techniques [2]; Loderunner, a game with maze-like structures; and Kid Icarus, a platforming game with vertically progressing levels.", "Index Terms\u2014Loderunner, Markov models, procedural content generation, Super Mario Bros.\nI. INTRODUCTION\nG ENERATING video game maps algorithmically [via pro-cedural content generation (PCG)] can allow players to experience new and unique content.", "fast sampling times also compare favorably against other approaches, which have been reported to take several hours to generate content [1].", "Most PCG techniques integrate game-specific design and domain knowledge into their algorithm design [1] and, therefore, have limited applicability outside of the target game.", "Most search-based approaches to PCG [1] are instances of this generate-and-test idea."]} +{"2175311|12068725": []} +{"52295724|12068725": ["\u2026can be adopted in problem domains through classical artificial intelligence methods, to a more formal classification of techniques and paradigms [20] and the more recent work in PCG driven by machine learning methods [7, 17]. maturation of the research field has enabled a greater flexibility\u2026"]} +{"12572399|27533715": ["84).(42) All differences were discussed until full agreement was reached."]} diff --git a/edge/graph_210164273.jsonl b/edge/graph_210164273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4c0ade38055358c5af33676cd48daf578a45f46 --- /dev/null +++ b/edge/graph_210164273.jsonl @@ -0,0 +1,18 @@ +{"202699290|4570087": ["PERSON re-identification (re-ID) is a recognition task which aims at matching a specific query person from a set of person images captured by other disjoint surveillance cameras [1]."]} +{"206592484|456491": []} +{"8201287|5755403": ["It is an important task to many surveillance applications such as person association [25], multi-target tracking [39] and behavior analysis [14]."]} +{"8201287|17516538": ["It is an important task to many surveillance applications such as person association [25], multi-target tracking [39] and behavior analysis [14]."]} +{"52954941|4570087": ["Person re-identification (re-ID) addresses the problem of searching specific persons across disjoint camera views [54,55]."]} +{"3351302|495481": ["As proved by some previous researches [34\u201337], the combination of visible light and thermal images can be used to enhance the performance of several image-based systems such as pedestrian detection, disguise detection and face recognition."]} +{"206595765|4570087": ["Re-ranking methods have been successfully studied to improve object retrieval accuracy [53]."]} +{"204837634|4570087": []} +{"4796796|15361180": ["The models for crossmodality retrieval can be classified into real-value representation and binary representation learning [43]."]} +{"4025566|5755403": ["In recent times, person re-id has attracted a significant amount of research interest because of its various security and surveillance related applications [8, 23]."]} +{"4025566|17516538": ["In recent times, person re-id has attracted a significant amount of research interest because of its various security and surveillance related applications [8, 23]."]} +{"70014962|15514398": ["Cross-modality retrieval (Peng, Huang, and Zhao 2017) refers to searching instances across different modality data."]} +{"4549119|4570087": []} +{"25539509|4570087": ["Generally speaking, from the perspective of model, classi\ufb01cation models as used in image classi\ufb01cation [23] and siamese models that use image pairs [26] or triplets [27] are two types of CNN models that are commonly employed in re-ID."]} +{"46903897|1708582": ["We formulate the re-id attention selection as a reinforcement learning problem [18].", "Reinforcement Learning in Computer Vision: Reinforcement Learning (RL) [35] is a problem faced by an agent that learns its optimal behaviour by trial-and-error interactions with a dynamic environment [18]."]} +{"3278289|5671282": []} +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} +{"78548|4570087": ["Person re-identification (re-ID), a retrieval problem in its essence [39, 33, 38], aims to search for the queried person from a gallery of disjoint cameras."]} diff --git a/edge/graph_210164920.jsonl b/edge/graph_210164920.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c9ef10b8c1bb1702ecfb3ea9320cd0fd7697867 --- /dev/null +++ b/edge/graph_210164920.jsonl @@ -0,0 +1,12 @@ +{"206592484|456491": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"213287814|146120676": []} +{"213287814|1315930": []} +{"213287814|17485266": []} +{"60440399|1315930": ["Never-theless, CNNs have shown great promise in medical image segmentation in recent years [22, 23], and most of the credit go to U-Net [24]."]} +{"60440399|2088679": ["Unfortunately, in the context of medical images, not only the acquisition of images is expensive and complicated, accurate annotation thereof adds even more to the complexity [22].", "U-Net has been showing impressive potential in segmenting medical images, even with a scarce amount of labeled training data, to an extent that it has become the de-facto standard in medical image segmentation [22].", "Expensive imaging equipments, sophisticated image acquisition pipelines, necessity of expert annotation, issues of privacy-all adds to the complexity of developing medical imaging datasets [22].", "Never-theless, CNNs have shown great promise in medical image segmentation in recent years [22, 23], and most of the credit go to U-Net [24]."]} +{"60440399|17485266": ["This idea, in fact combines the advantages of both AdaGrad [50] and RMSProp [51]; therefore Adam has been often used in benchmarking deep learning models as the default choice [52]."]} +{"13980455|393948": ["This strategy is different from the dominant paradigm in recent neural network literature of unsupervised tranfer learning (see [40] for a survey covering unsupervised pre-training and represetation learning more generally)."]} +{"145975515|8574504": []} +{"122523543|33286487": []} +{"21204330|8953108": ["A comparison of this method to others can be found in [49]."]} diff --git a/edge/graph_210166540.jsonl b/edge/graph_210166540.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2510c4b257631bc6e294173add37a42c71415f63 --- /dev/null +++ b/edge/graph_210166540.jsonl @@ -0,0 +1,9 @@ +{"132070548|18212759": []} +{"201084322|58672147": ["States about the need for enhanced prediction property, so as to improve the performance, further, [24] explained about LBS and insist the need for enhancing the performance.", "[24] explained about the location-based services (LBS) which provides clients with location centric information dependent on their area."]} +{"201084322|4861446": ["[12] compared several types of localization techniques, whereas Light Detection and Ranging (LiDAR) based technique provides higher accuracy.", "The propelled sensors enabled systems provides more precise and dependable position estimations than GPS however at greater computing and communication cost [12].", "Moreover [25] described about the security issues of VANET during localization, in addition [12] stated about LiDAR, which is highly sensitive to environmental."]} +{"201084322|35098173": ["For example, map coordinating, dead-end route computation, on-street cell localization, picture/video-based incidence guidance, localization administrations and relative distributed ad-hoc localization, and various other confinement strategies, that are utilized in VANETs to conquer such constraints [13].", "[2] O. Kaiwartya and S. Kumar, \u2018\u2018Cache agent-based geocasting in VANETs,\u2019\u2019 Int.", "A cooperative group of sensor-enabled vehicles operating in a dynamic road traffic network environment by interconnecting among on-road vehicles and, with neighboring Road Side Units (RSUs) are referred to as Vehicular Ad-hoc Networks (VANETs) [2].", "His research interests include mobile\nsocial networks, VANETs, opportunistic mobile networks, and wireless sensor networks.", "Thus, the performance of VANETs increases with better accuracy, high throughput, greater packet of delivery ratio and reduced packet loss ratio.", "VANETs can support a promising intelligent transportation system technology for many real time traffic applications including safety message dissemination, dynamic route planning, content distribution, gaming, and Internet of connected vehicles, connected autonomous vehicles, electric vehicles and related smart applications [4].", "[22] N. Alam, A. T. Balaei, and A. G. Dempster, \u2018\u2018Relative positioning enhancement in VANETs: A tight integration approach,\u2019\u2019 IEEE Trans.", "Dynamic mobility patterns, frequent connectivity disruptions, and irregular topology changes are some of the examples of challenging communication network environments in VANETs [5], [6].", "The anti-jammer centric security approaches in VANETs can be broadly categorized into two types of strategies including GPS and RSU enabled location verification."]} +{"67387192|1940388": ["But if the same node re-enters the network, it should be unable to read the messages that are being communicated on the network later [13]."]} +{"67387192|17205659": ["Backward secrecy Similarly, if a new sensor node is added to the network, it should be inept to read the previous messages circulated within the network [14]."]} +{"67387192|1230643": ["Data integrity and authentication are closely inter-related as message authentication code is used to provide both the features [11]."]} +{"53221131|2363064": ["Regardless, such systems are shown to be detectable as well [18, 106, 107, 130]."]} +{"30567993|2363064": []} diff --git a/edge/graph_210172997.jsonl b/edge/graph_210172997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa31aeeff216d0ec5e80e8d07b0137b08c22e235 --- /dev/null +++ b/edge/graph_210172997.jsonl @@ -0,0 +1,10 @@ +{"28732860|6947805": ["In the work of [27], models using P = AD \u2212 1 are called \u201cprobabilistic spreading\u201d, and those using P = D \u2212 1 A are called \u201cheat spreading\u201d."]} +{"40808631|8125630": ["Because OLAP has the capability of hierarchy aggregate calculating in every dimension (Chaudhuri & Dayal, 1997), it could solve the contextual data handling problem of the recommendation system."]} +{"12585270|1805048": ["on collaborative filtering techniques [2, 25], which predict a user\u2019s interest in an item by mining the patterns from the past rating information of other similar users and/or items."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"17850110|1805048": ["\u2026filtering approaches make recommendations by using both the target user\u2019s previous recommendation activities and other users\u2019 history behaviors [Su and Khoshgoftaar, 2009], which include two groups of methods, neighborhood-based methods [Sarwar et al., 2001; Deshpande and Karypis, 2004;\u2026", "Collaborative filtering approaches make recommendations by using both the target user\u2019s previous recommendation activities and other users\u2019 history behaviors [Su and Khoshgoftaar, 2009], which include two groups of methods, neighborhood-based methods [Sarwar et al."]} +{"58792962|8125630": []} +{"207204594|1805048": ["always leads to coverage problems, which is the percentage of items in the system that recommendations can be made for [68]"]} +{"12349227|393948": ["engineering and leading to be\u008aer performance [2]."]} +{"8794761|393948": ["The CARS 2 models in this work can be seen as part of the literature on Learning Representations [8]."]} +{"5493334|14148655": ["Collaborative Filtering beyond the User-Item Matrix 3:31 by allowing them to adjust the recommendations for this user [Chen and Pu 2012]."]} diff --git a/edge/graph_210177304.jsonl b/edge/graph_210177304.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63a5c88aec3defdaa9b63de1e63d22cd88e1bdf5 --- /dev/null +++ b/edge/graph_210177304.jsonl @@ -0,0 +1,19 @@ +{"205467191|2616070": ["AC CE PT ED M AN US CR IP T and can yield closed and smooth contours of the desired objects with promising accuracy [4]."]} +{"139587111|393948": []} +{"11308512|2616070": []} +{"18143241|8516210": ["Surface defect detection using machine vision has been largely tackled by texture analysis techniques [2]."]} +{"13719041|8516210": ["1) statistical methods; 2) structural methods; 3) filter-based methods; 4) model-based methods [7]."]} +{"77389555|10799412": ["In order to obtain the arc length information of the scratches, the scratch skeleton is extracted by the K3M algorithm [18]."]} +{"59265742|8953108": ["Sezgin and Sankur did a thorough survey in global thresholding techniques and discovered that the Otsu was one of the most commonly used methods.(25)"]} +{"15576532|8516210": ["A comprehensive survey on recent developments in vision based surface inspection using image processing techniques, particularly those that are based on texture analysis methods, can be found in [21]."]} +{"20722883|8516210": []} +{"3916415|8516210": ["Over the years, a number of review papers [6-12] on various aspects of surface defect detection have been reported.", "Two comparatively recent review papers are [6,7].", "Advances in surface defect detection using texture analysis techniques have been dealt with by Xie [6] covering applications in mainly textiles, tiles and wood."]} +{"32383127|8516210": []} +{"32383127|8540351": []} +{"4376168|8516210": ["Depending on the properties of surface texture, ASI methods can be divided into four categories [6]: 1) structural; 2) statistical; 3) \ufb01lter-based; and 4) model-based approaches."]} +{"17427022|18353243": ["Approaches for anomaly detection exist in various domains, ranging from video analysis [1] to remote sensing [2]."]} +{"205398304|6137971": ["However, Bandelet bases are regular functions with compact support, and the algorithm of searching the best Bandelet basis is very complicated [14]."]} +{"7649214|710141": []} +{"30017706|8953108": []} +{"16807804|8516210": []} +{"63900366|8516210": ["However,\nrequired to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al. [2], existing methods roughly be divided into four main categories: statistical, structu filter based, and model based.", "However, required to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al.", "References\n[1] Xie X (2008) A Review of Recent Advances in Surface Defect Detection Using Texture Analysis Techniques."]} diff --git a/edge/graph_210179868.jsonl b/edge/graph_210179868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210182736.jsonl b/edge/graph_210182736.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a654ce05f8c13b37ee1c1ccf0682d0013fe6079 --- /dev/null +++ b/edge/graph_210182736.jsonl @@ -0,0 +1,20 @@ +{"69444615|4427557": ["results are within the range of those in [6] and [27] which reported that LP-WAN could achieve up to 20 dB improvement over cellular systems.", "Insufficient comparative studies of LPWAN technologies has been identified as one of the major barriers to potential IoT users [6]."]} +{"69444615|3494096": ["[34] 5G, LTE-M, Description of various Comparative EC-GSM cellular , LP-WANs No performance enablers & applications."]} +{"108358640|3474164": ["WSN management and SDN techniques that could improve the management of WSN have been discussed in [54,55]."]} +{"108358640|24110634": ["This is taking in consideration the number of smart-objects, their location, their battery lifetime, their data efficiency [6] and security [7,8].", "The authors of [6] highlights the various inherited challenges associated with WSN and discuss the important of SDN in WSN and how most prevalent and critical WSN problems can potentially be addressed by SDN."]} +{"108358640|9495329": ["This is not meant to replace WPAN, WLAN networks or cellular networks, rather to complement them, since IoT will be based mostly on multi-tier access networks [20\u201325]."]} +{"108358640|4427557": ["[29] presents the design goals and techniques of LPWAN, while surveying the a number of LPWAN technologies and standards.", "The costs are also influenced by the complexity, hence the need for low complexity of the hardware and software of the smartobjects [29]."]} +{"108358640|6583734": ["In order to address the LPWAN and IoT associated needs, the operators are required to invest towards adopting the use of Software defined networking (SDN) and Network Virtualization as potential enabling technologies [44]."]} +{"108358640|19938676": ["In a nut shell, SDN is envisioned to be an enabler of quicker reaction to access-node, higher utilization of the accessible resources and faster deployment of updates in networking [52]."]} +{"108358640|21386749": ["IoT network connectivity to wireless technologies [9,10]."]} +{"108358640|801245": ["It is projected that through Network functions virtualization (NFV), innovation will soar in deploying new services with less risk, service delivery will be made easy, entry barrier will be minimised, and the network cost will be reduced through infrastructure sharing and automation [48,49]."]} +{"108358640|9862516": ["One method of enabling GLPWAN is developing cloud computing with ef\ufb01cient energy consumption methods [64\u201366]."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"56718822|3656886": ["Although each LPWA technology can support regular reporting by sending short periodic messages, not all are suitable for frequently changing environments (ex: smart healthcare where reporting event-driven alerts is inevitable) such as SigFox due to local regulations and other operating restrictions."]} +{"56718822|3249290": []} +{"56718822|4427557": ["Non-cellular wireless technologies cover a few hundred meters at most, whereas traditional cellular technologies require devices to consume considerable energy [9].", "Similar efforts have previously been made to review the LPWA literature in [9], [13], [2], [14], [8], [15] and [16].", "This allows end devices to stay connected to their base stations over tens of kilometers [9] (Figure 2).", "Both [2] and [9] have explored the advantages and disadvantages of LPWA solutions as well as efforts to standardize the technologies; the current deployment status in Spain is", "We refer readers interested in other LPWA technologies to [9] and [2].", "low power consumption but wide network range and simple deployment management for an enormous number of low cost devices [9] [36] [13].", "Some of these techniques include the use of ultra narrow band (UNB) communication, which enables the coexistence of a large number of devices within a cell while controlling interference and adaptive data rates and channel selection [9].", "ization of their LPWA technologies [9].", "TABLE 2: Characteristics of LoRaWAN, SigFox, RPMA, Telensa, NB-IoT [52] [9] [8] [2] [40] [39] [45] [61] [14] [62] [63]", "[9], on the other hand, is a more comprehensive survey."]} +{"56718822|16313703": []} +{"56718822|19636511": ["Cooperative relaying, signaling, radio resource allocation, and random access schemes are identified as main areas of energy efficiency improvement in [123]."]} +{"56718822|21386749": ["We refer interested readers to [3], [4], [5] and [6] for more details on the IoT technologies and applications.", "This should not be overlooked for healthcare systems, where privacy is mandatory [3] [4] [34].", "This is also true for data encryption [9] [113] [114] [4]."]} +{"56718822|1598350": []} +{"56718822|121289": ["In addition to the delivery of electricity, information is exchanged between the consumer\u2019s smart meter and supplier\u2019s controller to allow real-time control of power delivery [90]."]} diff --git a/edge/graph_210192227.jsonl b/edge/graph_210192227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7722d843f177405528d7de5cfa69993fcd683b8 --- /dev/null +++ b/edge/graph_210192227.jsonl @@ -0,0 +1 @@ +{"33795408|43331360": []} diff --git a/edge/graph_21029079.jsonl b/edge/graph_21029079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bf40ac6960e9b639f9616112e09d35f028f0dfc --- /dev/null +++ b/edge/graph_21029079.jsonl @@ -0,0 +1,2 @@ +{"854486|5724477": []} +{"17860920|12817488": [", the network sink, algorithms for data fusion and aggregation (Rajagopalan and Varshney 2006) are needed to reduce congestion and system overloading (Cao et al."]} diff --git a/edge/graph_210332949.jsonl b/edge/graph_210332949.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210472264.jsonl b/edge/graph_210472264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffdd18276a16b4a93098e8d5031ec84e33d13d57 --- /dev/null +++ b/edge/graph_210472264.jsonl @@ -0,0 +1,14 @@ +{"2253910|11497061": []} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"34378473|1990579": ["2) Distance Based Approaches: Distance based access control approaches grant access to external agents through the concept of touch and close proximity [2]."]} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"52882934|3628110": []} +{"52882934|7971188": []} +{"31102928|925507": []} +{"52165904|11497061": ["They can be compromised to (1) change insulin pump settings; (2) modify existing blood glucose information; (3) include fresh glucose information values [7]."]} +{"52158502|21386749": ["[2] Applications of Blockchain to healthcare domain have been extensively explored to enable interoperability between several Health Units in a secure and auditable way."]} +{"71150523|11497061": ["A few reviews have considered such an attack of listening stealthily or eavesdropping to steal patients\u2019 information [13], [14]."]} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"51881582|21386749": ["With the development of the Internet of things (IoT) technology [2] [3], numerous personal healthcare data are generated by the IoT devices every day [4]."]} +{"51881582|17474643": ["However, the CSPs have been struggling a lot to provide data sharing service [7]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} diff --git a/edge/graph_210472559.jsonl b/edge/graph_210472559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29961ffbdc034ebade2d03987329402e04ed87a8 --- /dev/null +++ b/edge/graph_210472559.jsonl @@ -0,0 +1,14 @@ +{"174780551|592204": ["For further context, please see the literature reviews on egocentric activity recognition [20] as well as human-robot collaboration facilitated through AR [21] and online learning [22]."]} +{"174780551|16280711": ["For further context, please see the literature reviews on egocentric activity recognition [20] as well as human-robot collaboration facilitated through AR [21] and online learning [22]."]} +{"3695232|16280711": ["Augmented reality (AR) is a technology that overlays computer graphics onto real world environments in real-time [16, 17].", "Although we are not the first to recognize that AR holds potential for improving human-robot interactions (see [8, 16, 17, 26, 35]), we believe that this area is critically understudied and represents a fairly nascent research space, especially within the context of the capabilities provided by\u2026", "Our work is inspired by prior research envisioning that augmented reality head-mounted displays (ARHMDs) might one-day support intuitive human-robot communication for collocated users [8, 16, 17, 26, 35]."]} +{"3695232|7360895": ["Research has demonstrated that robots may also use social cues to convey both movement intent and affective state [12, 27, 36]."]} +{"49268508|468992": []} +{"7737926|4361938": ["Applications of gaze trackers can be found in fields ranging from psychology to marketing to computing science; many interesting examples are given in the survey provided by Duchowski [7]."]} +{"202158950|7360895": ["Anthropomorphism is a function of the robot\u2019s appearance, behavior, and interaction [19]."]} +{"15576052|7748652": ["Appearance in Human-Robot Interaction (HRI) Mavridis [13] discusses verbal and non-verbal human-robot collaboration and establishes a list of necessary features (desiderata) towards fluid HRI.", "Mavridis [13] discusses verbal and non-verbal human-robot collaboration and establishes a list of necessary features (desiderata) towards fluid HRI."]} +{"15576052|7360895": ["al [26] argue that one way to characterize personality is using emotions to portray stereotype personalities."]} +{"3696346|16280711": ["Augmented reality (AR) technology overlays computer graphics onto real world environments in real time [13, 14].", "Our approach is inspired by research exploring the integration of teleoperation and virtual reality [21, 25, 28] and prior work en-visioning that augmented reality might someday afford new ways of facilitating information exchange between people and robots [6, 13, 14, 24, 31, 36, 40].", "Although we are not the first to recognize that AR holds potential for improving human-robot interactions (see [6, 13, 14, 24, 36]), we believe that this area is critically un-derstudied and represents a fairly nascent research space, especially within the context of examining how the capabilities\u2026"]} +{"6293973|23041951": ["The security of wireless communication has been well researched, but the security of unconventional and more exotic interaction methods should be explored and presents a compelling security challenge [14]."]} +{"6293973|14122909": ["On the other hand, recognising objects or patterns can be achieved using various sensors, including infra-red [38], LiDAR [39], ultra-sound [40] or optical camera sensor [41]."]} +{"6293973|12127129": ["Algorithmically, a foreground detector system compares the current video framewith either a predefined backgroundmodel or adaptively learned background model [46]."]} +{"4375101|16013270": ["In the vision community, the problems of gesture and action recognition have received considerable attention in the past [7]."]} diff --git a/edge/graph_210473041.jsonl b/edge/graph_210473041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..473d38b221a8c7d23e5406c038a7b697dba75a20 --- /dev/null +++ b/edge/graph_210473041.jsonl @@ -0,0 +1,29 @@ +{"11058994|9835525": ["First, the shot boundaries are determined by comparing colour histograms [17] to \ufb01nd the within-shot frames for which tracking is to be run."]} +{"1662180|9835525": ["tected by comparing colour histograms across consecutive frames [24]."]} +{"21579823|206602044": ["The task of clustering speaker turns has received considerable attention in the context of speaker diarization, which tries to answer the question: \u201cwho spoke when\u201d [13, 14, 15]."]} +{"21704094|8777381": []} +{"4797928|206603045": ["by using voice characteristics of a known speaker [3, 4, 5, 6, 7]."]} +{"4797928|16528630": ["Prior to deep learning, a large number of previous works have been developed for audio-visual speech enhancement by predicting masks [15, 16] or otherwise [17, 18, 19, 20, 21, 22, 23], with an overview of audio-visual source separation is provided in [24]."]} +{"4797928|2122433": ["Noisy magnitude Spectrogram 1D Residual block, K=5, 1536 1D Residual block, K=5, 1536 1D Conv Bl ck , C=1536 S=1 1D Residual block, K=5, 1536 1D Residual block, K=5, 1536 1D Conv Bl ck , C=1536 S=[1,2,1,2,1] x10 x5 Linear + Concatenation over channels", "There are many possible applications of this model; one of them is automatic speeech recognition (ASR) \u2013 while machines can recognise speech relatively well in noiseless environments, there is a significant deterioration in performance for recognition in noisy environments [2]."]} +{"1033682|174797842": []} +{"52168058|9835525": ["color histograms across consecutive frames [31]."]} +{"9188911|15361180": ["In (Feng, Wang, and Li 2014; Pereira et al. 2014; Rasiwasia et al. 2010; Wang et al. 2016), people focus on cross-modal indexing and retrieval."]} +{"4748509|206603045": ["More recently, deep learning methods have gained popularity [22,23]."]} +{"38895231|18440098": ["Where hand movements have been considered explicitly, the emphasis has been on communicative gestures such as those used in sign languages [57, 61] or on the use of hand motion to control computers and musical instruments [83]."]} +{"38895231|7360895": ["While there is extensive work on producing expressivity in humanoid robots [12, 17, 32], fewer works consider generalizing human-like affective expressions to other non-anthropomorphic structures and mechanisms [6, 71, 84]."]} +{"119295059|206603045": ["gave an overview [48] on this series of approaches."]} +{"9479308|18050848": []} +{"19806033|9835525": ["This is done by comparing color histograms across consecutive frames [20]."]} +{"52177577|206603045": ["However, instead of only separating human speakers [42] or musical instruments [45], we aim to separate multiple unidenti\ufb01ed types of sound sources.", "For example, [18] proposes a recurrent neural-network for monaural separation of two speakers, [1, 12, 11] seek to isolate sound sources by leveraging synchronized visual information in addition to the audio input, and [42] studies a wide range of frequency-based separation methods."]} +{"52177577|1440555": ["Source localization Sound source localization is a mature area of signal processing and robotics research [3, 34, 33, 40]."]} +{"12608931|10397481": []} +{"3548486|8042572": ["Although various works on audiovisual fusion have been recently presented, feature-level fusion (FF) and decision-level fusion (DF) remain the two most common types [7], [9].", "A full review of existing audiovisual fusion approaches and applications can be found in [7], [9] The extracted audio and visual features are combined, usually by concatenation, and then fed to a classifier."]} +{"3548486|1118130": ["A UDIOVISUAL fusion approaches have been successfully applied to various problems like speech recognition [1], [2], affect recognition [3], [4], laughter recognition [5], [6], biometric systems [7] and meeting analysis [8]."]} +{"53246944|16528630": ["Regarding audio-visual speech enhancement and separation methods an extensive review is provided in [14]."]} +{"15512141|18050848": ["Such improvements have been typically demonstrated on databases of small duration, and, in most cases, limited to a very small number of speakers (mostly less than ten, and often singlesubject) and to small vocabulary tasks [18], [ 21 ].", "A number of audio-visual corpora, commonly used in the literature, are listed in Table II. Notice that most are the product of efforts by few university groups or individual researchers with limited resources, and as a result, they suffer from one or more shortcomings [18], [ 21 ], [136]: They contain a single or small number of subjects, affecting the generalizability of developed methods to the wider population; they typically have small ..."]} +{"15512141|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory, an active area of research with many applications [91] [92] [93]."]} +{"4724792|16528630": ["Other methods use face detection and multi-microphone beamforming [40]."]} +{"57759395|17221751": ["This score is widely used for AU-detection and classification of facial expressions of emotions [41], [60] because of its robustness to the imbalance in positive and negative samples, which is very common in the case of AUs.", ", [19], [41]) and recent database papers (e."]} +{"50771929|16528630": ["This idea has been explored by nondeep models [20]\u2013[25]: in [12] and [21], motion information is exploited to indicate whether speakers are silent; and in [22], [23], and [26], methods are proposed to model audio\u2013visual data joint distributions."]} +{"13262955|15361180": ["[3] gave a comprehensive overview of existing approaches to another practical application of shared semantic spaces: cross-modality information retrieval.", "The ability to learn semantic relevance with input pairings alone unlocks the potential of training models using inexpensively-collected data with the only supervisory signal being the co-occurrence of sensory inputs [3].", "The unsupervised problem of learning semantic relations through the co-occurrence and lack of co-occurrence of sensory inputs is an increasingly attractive pursuit for researchers [2, 3, 4, 5]."]} +{"206742471|8777381": ["It is well accepted amongst the research community that certain acoustic and prosodic features play an important role in recognising the affective state [28]."]} diff --git a/edge/graph_210473293.jsonl b/edge/graph_210473293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..311ea86b6f1d6f7765eb64674604f7a6c9337703 --- /dev/null +++ b/edge/graph_210473293.jsonl @@ -0,0 +1,6 @@ +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} +{"12845273|8372620": ["Barocas and Selbst survey a range of ways in which data-analysis algorithms can lead to discriminatory outcomes [3], and review articles by Romei and Ruggieri [25] and Zliobaite [30] survey data-analytic and algorithmic methods for measuring discrimination."]} +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} +{"306403|51987740": ["[64], there are three types of stakeholders\u2019 requirements: resource constraints (threshold such as response time < 1 hour), stakeholders\u2019 preferences (e."]} +{"306403|9766972": ["on sampling for product line testing, we refer to [19, 50, 54, 56, 102]."]} +{"306403|8296351": ["re product lines (SPLs), software generators, dynamic, self-adaptive systems, variability-intensive systems are well studied in the literature and enter in this class of configurable software systems [8, 12, 13, 32, 58, 71, 81, 95, 98]. From an abstract point of view, a software configuration is simply a combination of options\u2019 values. Though customization is highly desirable, it introduces an enormous complexity due to the combina", "over the years. Although these reviews are not directly related to ours, the high level of detail of their research methodology supported to structure and define our own methodology. Benavides et al. [12] presented the results of a literature review to identify a set of operations and techniques that provide support to the automatic analysis of variability models. In a similar scenario, Lisboa et al. "]} diff --git a/edge/graph_210473356.jsonl b/edge/graph_210473356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebe2e1294748ef9108c3bf8c2e1ca239575b78ca --- /dev/null +++ b/edge/graph_210473356.jsonl @@ -0,0 +1,107 @@ +{"49194130|13172512": ["There is some literature that already included ML for solving problems on different layers of the wireless stack [10, 11]."]} +{"57377578|31245252": ["Although these wireless devices provide ubiquitous internet access to people and enable device to device communications, the inherent broadcast nature of wireless transmissions introduces security and privacy challenges where malicious users can carry out many types of attacks [1]."]} +{"16279144|2509135": ["Recent surveys on CRs can be found in [41], [54], [55].", "In distributed cooperative spectrum sensing [55], [172], on the other hand, secondary users within a CRN exchange their local sensing results among themselves without requiring a backbone or centralized infrastructure."]} +{"16279144|12452682": []} +{"16279144|2340253": []} +{"21083499|1680300": ["Although a FB method performance may not be considered as optimal as that of LB method, but can be with near-optimal performance when designed properly [4].", "Mostly a solution offered by the LB algorithms is optimal [4].", "This is because LB algorithms are capable of minimizes the probability of false classification [4]."]} +{"21083499|7158350": ["The study presented in this paper on classification is considered as an ideal study to investigate the hypothesis because, classification has been observed as one of the most active research and application areas of ANN [7]."]} +{"3645740|7851743": ["In contrast to other surveys in the area, such as [10], which", "In SON, the concept of self-optimization can be defined as a function that constantly monitors the network parameters and its environment and updates its parameters accordingly in order to guarantee that the network performs as efficiently as possible [10].", "The concept of SON in cellular networks was defined in [10]", "needs to reconfigure its parameters [10].", "feeding more data to the system, adding more features to the input data or adding more layers in a NN, without it limitlessly increasing its complexity [10].", "work that is also scalable, stable and agile enough to maintain its desired objectives [10].", "These categories are: self-configuration, self-optimization and self-healing and are commonly denoted jointly as self-x functions [10].", "Based on that, it is assumed that the reader already is familiar with SON concepts and its use cases, otherwise the reader can refer to [10].", "Self-healing in cellular systems can occur in terms of network troubleshooting (fault detection), fault classification, and cell outage management [10]\u2013[13]."]} +{"3645740|6105131": ["which focused on basic definitions and concepts of selforganizing systems and how could self-organization be applied in the context of wireless sensor networks, or even [21],"]} +{"3645740|1708582": ["For readers interested in Reinforcement Learning, please refer to: [184] and [185]."]} +{"6721504|8835588": ["The information on the physical activity is also valuable as a source of contextual knowledge [3]."]} +{"6721504|192934": ["The feature extraction approach revolves around the idea that data representations can be constructed in subspaces with reduced dimension, while at the same retaining, if not increasing, the discriminative capability of the new set of feature variables [37].", "A taxonomy of classifiers can be built according to different criteria [37].", "These methods are based on two main approaches: feature selection and feature extraction [37]."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"207113536|9928823": []} +{"17440175|7774517": ["Surprisingly, most anomaly detection methods available in the literature are based on an offline, centralized data processing paradigm, as evidenced in the recent surveys [10, 45, 46]."]} +{"17440175|12815020": ["It has also been used in several other domains, as summarized next."]} +{"17440175|50458504": ["It has also been used in several other domains, as summarized next."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"4494858|26429034": ["These tasks require real-time traffic analysis and accurate prediction capabilities [33], which are challenging to implement with existing tools [21]."]} +{"8683793|1708582": ["RL is a machine-learning paradigm, where agents learn successful strategies that yield the largest long-term reward from trial-and-error interactions with their environment [5], [6]."]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"69387854|8462498": ["[34] 2015 Survey random access-based MAC protocols that support Performance WLANs Multi-user Multiple-Input and Multiple-Output (MU-MIMO)."]} +{"69387854|9321930": ["Some other surveys [22], [27], [30] focused on the identifi-"]} +{"69387854|3892600": ["In addition, surveys [18], [20], [23]\u2013[25], [29], [36] analyzed similar aspects, but applied to other scenarios and technologies (e.", "Since then, several others have been proposing classifications of MAC protocols [20], [21], [23]\u2013[26], [28], [29], [31]\u2013[36], [38]."]} +{"69387854|141053": ["In addition, surveys [18], [20], [23]\u2013[25], [29], [36] analyzed similar aspects, but applied to other scenarios and technologies (e.", "Since then, several others have been proposing classifications of MAC protocols [20], [21], [23]\u2013[26], [28], [29], [31]\u2013[36], [38]."]} +{"86485018|1680300": ["Traditional algorithms of MR could mainly be separated into two groups: likelihood-based (LB) and feature-based (FB) approaches [5]."]} +{"1204381|1708582": ["These hidden states are critical to RL as they hinder with determining the reward maximizing action as pointed out in [23] and [40].", "Although RL can be computationally simple, it can take significant time to converge to a steady state as discussed in [23] and [40].", "Indeed, the environment in which the IoT devices are deployed is subject to unpredictable events and uncertainties, such as abnormal sensor readings due to sudden increase in noise, device failures, and unexpected obstacles preventing normal device operation as discussed in [23] and [40]."]} +{"149781963|9461213": []} +{"149781963|59235678": []} +{"15703235|7686677": ["Due to the unprecedented growth in cellular industry, power consumption of base station is expected to be doubled every two years in the future [2]."]} +{"195767238|53018231": ["First, a majority of the existing works focuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks."]} +{"195767238|9461213": ["The smartphone-centric networks of yesteryears are gradually morphing into an Internet of Things (IoT) system [1]\u2013[3] that integrates a heterogeneous mix of wireless-enabled devices ranging from smartphones, to drones, connected vehicles, wearables, sensors, and virtual reality devices.", "of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks.", "2) Neural Networks for the Internet of Things: ANNs can be used to address some of the key challenges within the context of the IoT.", "In addition, the emergence of the Internet of Things further motivates the use of ANNs to improve the way in which wireless data is processed, collected, and used for various sensing and autonomy purposes.", "F. Internet of Things\n1) The Internet of Things: In the foreseeable future, it is envisioned that trillions of machine-type devices such as wearables, sensors, connected vehicles, or mundane objects will be connected to the Internet, forming a massive IoT ecosystem [160].", "Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software defined networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks.", "In particular, we have investigated many emerging applications including unmanned aerial vehicles, wireless virtual reality, mobile edge caching and computing, Internet of Things, and multi-RAT wireless networks."]} +{"195767238|3645740": ["of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks."]} +{"195767238|206578365": ["can be used for performing effective and low-latency computations using the emerging paradigm of mobile edge computing [140]."]} +{"195767238|17485266": []} +{"195767238|5385031": ["The smartphone-centric networks of yesteryears are gradually morphing into an Internet of Things (IoT) system [1]\u2013[3] that integrates a heterogeneous mix of wireless-enabled devices ranging from smartphones, to drones, connected vehicles, wearables, sensors, and virtual reality devices."]} +{"195767238|7774517": []} +{"195767238|1708582": ["ta from implementation. The goal of RL is to learn an environment and \ufb01nd the best strategies for a given agent, in different environments. RL algorithms are used for robotics, gaming, and navigation [67]. To perform these learning tasks, several frameworks have been developed. Among those frameworks, arti\ufb01cial neural networks (ANNs) [60] constitute one of the most important pillars of machine learnin"]} +{"53281798|1680300": ["As a result, automatic modulation classification (AMC) [1], [2] is of great importance for both civilian and military applications in achieving automatic receiver configuration, interference mitigation, and spectrum management."]} +{"53776110|11381530": ["it is an ideal choice to use DL approaches to detect network intrusions by learning traffic features [105]."]} +{"18592012|14669932": ["TABLE V shows the hardware configuration used in our experiments."]} +{"67864862|14669932": ["like mobile traffic patterns [17], [18]."]} +{"2098713|206583375": ["There has been considerable literature on indoor localization 802 [18]."]} +{"2666574|1520906": ["To integrate the sensory data collected from heterogeneous sources is challenging [14,38].", "The most recent advances made in IoT began when RFID tags were put into use more frequently, lower cost sensors became more available, web technology developed, and communication protocols changed [14,15]."]} +{"2666574|44461432": ["[11] introduced a systematic method for reviewing data mining knowledge and techniques in most common applications."]} +{"2666574|3330313": []} +{"2666574|38476": ["In these cases, data points consist of sequences of \u00f0 x ; y \u00de pairs rather than being drawn in an i.i.d. manner from a joint distribution p \u00f0 x ; y \u00de ; and such the sequences exhibit signi \ufb01 cant sequential correlations [55,127].", "It is worth noting that there is another closely-related task, called sequence classi \ufb01 cation , in which the goal is to predict the desired single categorical output y given an input sequence x [127]."]} +{"2666574|17374870": []} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"1362316|16323798": []} +{"121392315|4787452": ["Over the last years, we have seen more and more technologies using TDMA schemes, especially in sensor networks [11] and Vehicular Ad hoc Networks (VANETs) (such as STDMA, SOFTMAC, TC-MAC, ect) [12]."]} +{"15255885|1634674": []} +{"18886146|18503837": []} +{"2412094|1680300": ["A thorough review of MC methods can be found in [2].", "In the hybrid maximum likelihood approach [2], the LF is marginalized over the unknown constellation symbols In and then maximized over the remaining unknown (nuisance) parameters."]} +{"119301430|4735659": ["Cognitive radio networks (CRNs), in which secondary users (SUs) are able to sense and access the spectrum white spaces by using dynamic spectrum access (DSA) technology, has become a promising approach to improve SU\u2019s spectrum efficiency [4], [6]."]} +{"14433451|206583375": ["Indoor localization has attracted considerable interest in the research community with many interesting prior works [18], [19]."]} +{"1680300|192934": ["FEATURE-BASED APPROACH TO AMC The design of a FB algorithm first needs some features for data representation and then decision making [100]."]} +{"110988692|9928823": []} +{"110988692|393948": []} +{"6503285|1680300": ["An extensive overview of these methods is given in [2].", "on the HML approach [2], where the likelihood function is marginalized over the unknown random constellation symbols In and then maximized over the remaining unknown (nuisance) parameters.", "1HML is also referred to as the hybrid likelihood ratio test (HLRT) in some modulation classification literature [2], [6], [7], [13].", "These are commonly made assumptions in the modulation classification literature [2], [6], [7], [12], [13], [16], [17], and these estimates can be obtained using the techniques outlined in [16]."]} +{"54953410|1680300": ["Even for modulation recognition, different deep learning methods such as multilayer perceptron (MLP) [6], convolutional neural network (CNN) [1] and convolutional long short-term deep neural networks (CLDNN) [7] have shown to outperform feature extraction based methods such as [8], [9], and [10]."]} +{"36339883|1680300": ["For more details about AMC methods with a comprehensive literature review, the reader is referred to [5,23]."]} +{"6342690|1940388": ["A review of security threats to WSNs and a survey of defense mechanisms is presented in [26]."]} +{"6342690|12817488": ["A survey of data aggregation algorithms used in WSNs is presented in [22]."]} +{"6342690|1230643": ["This scenario is used in most monitoring applications in agriculture [7], [8], microclimate [4], [5], [9] and habitat surveillance [10]\u2013[12], military operations [13], and disaster relief [14]."]} +{"6342690|1708582": ["RL [41], [42] is a sub-area of machine learning concerned with how an agent should take actions in an environment so as to maximize some notion of a long-term reward."]} +{"6342690|6555395": ["A survey of NN learning methods, their properties and applications is presented in [32]."]} +{"3065222|1680300": ["While there has been a substantial amount of work in the literature (please see [2], [3] for an extensive overview), there are still some important aspects to be further considered in the AMC problem to fully utilize it in practice.", "In [11], the authors have considered an HML approach [2] assuming that all the observation vectors yl\u2019s are available at a central processing unit."]} +{"22904445|12527758": ["The term future Internet was introduced in [6] and [7] to depict the Internet architecture and protocols research in the next 20 coming years."]} +{"10985974|1634674": []} +{"68176541|206456479": ["The next generation of mobile networks will enable an unprecedented heterogeneity of applications with very diverse Quality of Service (QoS) requirements [1]."]} +{"68176541|14669932": ["(i) Predictors of mobile traffic invariably focus on providing forecasts of the future demands that minimize some absolute error [8], [9].", "Our problem is tightly linked to mobile traffic prediction, which is the object of a vast literature [8], [9]."]} +{"141053|1775475": []} +{"141053|14441987": []} +{"9931536|2623404": ["The Software-Defined Network (SDN) technology [77] is one important enabler for the evolution of current networks towards the intelligent 5G HetNets [78]."]} +{"9931536|7851743": ["From the aspect of reducing the operational and capital expenditure (O/CAPEX) of MNOs, AI-based techniques can substantially diminish human involvement in operational tasks, and optimize network capacity, coverage, and Quality of Service (QoS) in HetNets, according to the advanced features discussed in Self-Organizing Networks (SONs) along following directions [3], [4], [6]: 1) self-configuration, where newly deployed high variety of cells are automatically configured and updated before entering operation tasks, 2) self-healing, where cells and networks can automatically detect and recover from failure and even execute compensation mechanisms whenever failures occur, and 3) self-optimization, where cellular systems can measure the network conditions and optimize the settings to improve the performance in terms of coverage, bandwidth, interference avoidance, and QoS, while the corresponding issues of system scalability and energy conservation are also considered.", "They have relatively lower complexity enabled by recursive feedback-based learning and local interactions, and hence faster speed of finding sub-optimal solutions compared to conventional techniques [3], [4]."]} +{"9931536|9072047": ["A fuzzy system is a control system based on fuzzy logic, which mathematically analyzes analog input values in terms of logical variables that take on continuous values between 0 and 1 [59]."]} +{"9931536|7158350": ["Artificial neural networks (ANNs) are one type of statistical learning models inspired from the biological neural networks of human brains [57]."]} +{"9931536|1708582": ["Among many ML techniques, the reinforcement learning (RL) is one particular learning algorithm inspired by behaviorist psychology, concerned with how software agents ought to take actions in an environment so as to maximize some notion of cumulative rewards [27]."]} +{"9931536|13215551": []} +{"53018231|20384442": []} +{"53018231|206456479": ["Network slicing [157] and NFV [97] are two emerging concepts for resource allocation in the 5G ecosystem to provide cost-effective services with better performance."]} +{"53018231|18750590": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|5385031": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|12325031": ["Also, there are surveys discussing the applications of machine learning for networking such as [9], [10], [11], [12], and [13]."]} +{"4545672|4122595": ["As a key component of cognitive radio [6]\u2013[9], it is a prerequisite for the wireless operation of a device to adapt to its environment and maximize the utility of the available spectrum resources.", "This has led to research on cognitive radio technology [6]\u2013[9] and machine learning [10]\u2013[13], both of which form the pillars to support the intelligent processing requirements of wireless communication systems.", "As a key component of cognitive radio [6]\u2013[9], it allows the wireless operation of a device to adapt to its environment and maximize the utility of the available spectrum resources."]} +{"4545672|8909218": ["The deployment of small cells, such as femtocells, has emerged as a promising technology to extend service coverage and increase network throughput [179]."]} +{"7066133|3348390": ["Various other works about context aware in term of IoT perspective is discussed in [27]."]} +{"84187010|4572654": ["between LTE and Wi-Fi on 5 GHz together with the corresponding deployment scenarios is given in [19]."]} +{"17683419|1230643": ["Sensor networks, usually composed of a few sinks and a large quantity of inexpensive and small sensor nodes, have been deployed in a variety of applications [5] such as habitat monitoring [14], forest fire detection, etc."]} +{"9812026|7774517": ["Sensor data of adjacent nodes in a densely deployed WSN tend to be spatially and temporally correlated [10].", "Outlier detection techniques can be categorized into statistical-based, nearest neighborbased, clustering-based, classification-based, and spectral decomposition-based approaches [1], [10]."]} +{"57764841|5338241": ["Nowadays a large number of technologies are sharing the same radio spectrum and it has become a scarce commodity [1].", "One of the key features in CR is the Dynamic Spectrum Access (DSA), which allows radios to dynamically access and use the unused spectrum [1]."]} +{"57764841|1680300": []} +{"69711459|9171235": ["The network life-time is de\ufb01ned as the time elapsed until the \ufb01rst node consumes all of its battery energy [70]."]} +{"69711459|16362395": ["MLP model is generally preferred due to its relatively simple implementation, superior performance over a wide range of problems and well-studied working structure [36]."]} +{"69711459|205286988": ["Although, it is possible to create a WSN topology where all sensor nodes communicate directly with the base station, typically, sensor nodes convey the data they acquire from the environment via other sensor nodes acting as relays [2]."]} diff --git a/edge/graph_21053932.jsonl b/edge/graph_21053932.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c35c490c38a90fe8d83698cd415d2625cadc6be7 --- /dev/null +++ b/edge/graph_21053932.jsonl @@ -0,0 +1,11 @@ +{"44776407|469744": ["In the field of Mixed Reality, one of the most popular topics is about displaying a virtual object into real world [ 1 ]."]} +{"10775732|469744": ["For the past decade, there have been remarkable advances in Augmented Reality (AR) [6][7]."]} +{"326702|206986719": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"2928411|469744": ["A well known subset of MR is augmented reality (AR), where virtual objects are inserted into the real imagery in such a way that they appear to be part of the real environment (Azuma 1997)."]} +{"55694240|469744": ["1 Introduction Augmented reality (AR) [1], [2] is a term of the technology that composites the computer generated image to the real image viewed by the user."]} +{"7181648|469744": ["For the most part the community has been focused on solving the technical challenges of AR, since the technical obstacles are still large and have not changed significantly since they were first recognized [2, 3]."]} +{"6108923|469744": []} +{"30083140|17024419": []} +{"3336987|11960624": ["present an extensive literature review of medical AR in [30]."]} +{"15376712|469744": ["This yields a somewhat degraded view of the real world due to artifacts introduced by cameras, processing, and redisplay, but also provides significant advantages for implementers and users alike [ Azuma 1997 ].", "40\u00b0 horizontal) and (2) eye-camera offset or parallax (see [ Azuma 1997 ] for an explanation), which gave the wearer the impression of being taller and closer to the surroundings than she actually was."]} diff --git a/edge/graph_210690758.jsonl b/edge/graph_210690758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10cc0243ec30a9adc67278a24f55d759f144afe3 --- /dev/null +++ b/edge/graph_210690758.jsonl @@ -0,0 +1,68 @@ +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"51970488|3348390": ["We can define IoT as a paradigm that \u201callows people and things to be connected Anytime, at Anyplace, with Anything and Anyone, ideally using Any path/network and Any service\u201d [4]."]} +{"35986198|21386749": []} +{"7807961|1940388": ["Following table 3 shows the comparative chart for security evaluation for the broad key management schemes[20-21]."]} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"52899540|5022650": []} +{"52899540|206578486": []} +{"52899540|3119314": []} +{"52879114|14397159": ["Previous reviews have taken different approaches, yet all failed to provide a framework within which all AAL systems could be classified according to their primary function [5,6]."]} +{"12915039|30134048": ["[8] argue that mature infrastructures for sensing data generation, collection, classification, analysis, and processing are desired."]} +{"199089153|29859741": ["[24] 2017 X \u2022 Complete a thorough survey on fog computing for healthcare."]} +{"199089153|31245252": ["As a result, by reviewing several studies on healthcare security model [2,10,167], Figure 11 is created to show the security trend for healthcare applications."]} +{"199089153|21386749": ["In 2015, a comprehensive IoT in healthcare survey was carried out by [20] which discussed several aspects of IoT in the healthcare such as architectures, services and applications; they also discussed several issues including security and standardization that require more research.", "[20] 2015 X X \u2022 Review services and applications in IoT in healthcare systems."]} +{"15825320|627405": ["This method of reviewing literature was realized in accordance with the steps proposed for the software engineering review process [16] and was adapted to the area of gerontechnology as follows:"]} +{"15528648|3348390": [", [4] and [44]), it is established that one of the most appropriate formats to manage context is ontology."]} +{"45410942|14397159": ["universal definition of AAL has been adopted [18].", "AAL technologies have been identified as \u201cinformation and communication technology-based products, services, and systems to provide older and vulnerable people with a secure environment, improve their quality of life, and reduce the costs of health and social care\u201d [18]."]} +{"168284508|3348390": []} +{"168284508|1503157": []} +{"16482666|6939676": ["In recent years, wireless devices became pervasive and more computationally powerful, making radio-based localization an attractive solution [15]."]} +{"58668262|8523192": []} +{"148570035|46642131": []} +{"25753765|31245252": ["Extensible messaging and presence protocol is based on XML protocols; this protocol is mainly famous for key features such as open source and the public security mechanism and is completely free [106].", "This protocol is interoperable and can be implemented in different platforms to connect objects to the internet [106, 107].", "MQTT is able to easily connect the \u201cthings\u201d to the web and supports unreliable networks with low bandwidth [106].", "1 3 prominent features such as low cost and low power consumption is suitable for IoT implementation [106].", "Although security challenges are among the most important issues in healthcare [106, 171, 197], it can be concluded that concentration on this topic is still low and only 10% of the papers reviewed discussed it.", "It is recommended for networks with low bandwidth [106]."]} +{"25753765|21386749": ["[132], patient monitoring systems based on IoT can be categorized into two aspects, i.", "1 Security In remote healthcare delivery in IoT environments, considering security vulnerability not only for medical data sharing, patient privacy, and confidentiality but also for IoT setting is essential [132, 178]."]} +{"25753765|7505270": ["Sensing technologies are essential tools for acquisition of physiological parameters from the patient [40, 98].", "Furthermore, results obtained from such sensors can be exploited for suitable decision-making about patients\u2019 situations [98, 100, 101]."]} +{"206491297|6909107": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|21386749": ["An extensive survey is presented in [10], with focus placed on commercially available solutions, possible applications, and remaining problems.", "work of devices interacting with each other via machine to machine (M2M) communications, enabling collection and exchange of data [7], [10], [11]."]} +{"206491297|3042864": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|23893450": ["crash-avoiding cars [19], and smart grids [20]."]} +{"208214961|169570837": []} +{"208214961|303976": ["In terms of infrastructure and technologies for implementation of M2M, Kartsakli et al. [35] made an extensive review of wireless communication technologies used in M2M-based healthcare solutions."]} +{"208214961|198147243": ["However, the number of IoMT devices is expected to grow considerably in the coming years and the heterogeneity present in different IoMT components (network interfaces, communication protocols, data structure, data semantics) will impose interoperability and privacy related challenges [9]."]} +{"617016|11293874": ["Other research has focused on fall detection based on accelerometers using wearable sensors [19\u201324]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"11070626|7988320": ["Monitoring activities of soldiers in the battlefield by WBAN by using sensors, cameras and wireless technologies [31]."]} +{"11070626|20905429": ["It can also communicate with the remote healthcare facilities and caregivers, thus allowing the healthcare personnel to keep track of the overall physiological condition of the occupants and respond, if necessary, from a distant facility [16,20]."]} +{"204156766|55729907": ["Currently, there is a vast diversity of communication protocols with different battery dependability and data range transmissions, such as Wi-Fi, ZigBee, and mobile networks [29].", "Currently, there are different healthcare systems that incorporate several technologies to monitor several human physiological status and environmental parameters using different wireless communications technologies, such as ZigBee, 3G, Bluetooth, Ethernet, and Wi-Fi [3].", "The Bluetooth and Zigbee protocols are usually used for device-to-device communication, as well as Wi-Fi and mobile networks technologies, such as 3G/4G, have been used recurrently to provide Internet access [139].", "The most used technologies, used in six studies, are the Bluetooth protocol and the GPRS/ 3G / HDSPA / 4G, with Wi-Fi in second place.", "Smartphones are equipped with short-range communication technologies, such as Bluetooth and Wi-Fi, but also long-range technologies, such as GPRS, UMTS, and 3G/4G, that can be used for monitoring co-morbid patients remotely using short-range communication inside hospitals and long-range communication inside patients\u2019 home [68].", "Wearable sensors are used on a large scale for healthcare systems, such as diagnostic procedures and visualization software, to measure and define living environments and real-time personal activity [3].", "The GPRS/3G/HSDPA and 4G are incorporated in the majority of smartphones and are significant to provide Internet connection when Wi-Fi networks are not available.", "The Wi-Fi communication is commonly used to provide Internet connection; however, due to energy consumption concerns, it is not used in battery-powered systems."]} +{"204156766|14315321": ["The achievements of platforms and frameworks are related to different requirements, such as [57]:"]} +{"204156766|21386749": [", normalization, network setup, business models, QoS, and dat security as referred by [24].", ", normalization, network setup, business models, QoS, and data security as referred by [24]."]} +{"204156766|2829149": []} +{"204156766|10817088": ["Non-invasive sensors incorporated in wristbands are used to measure and supervise several biological parameters, such as ECG, EEG, electrodermal (EDA), breathing, and biochemical procedures [79]."]} +{"204156766|3390598": ["The IoT platforms and operating systems researched in this study were selected according to the criteria used by the authors of [58] and [59]."]} +{"3533639|1520906": []} +{"3533639|1230643": ["Large numbers of sensor nodes allow for the implementation of sensor networks and have applications in several areas [14]."]} +{"404886|14116122": ["Activity recognition can be defined as the process of how to interpret sensor data to classify a set of human activities [11]."]} +{"404886|5724477": ["Moreover, technological development possibilities of other applications are still arising, including virtual reality systems."]} +{"404886|5664472": []} +{"404886|1634674": ["As a result, the sensor-based real-time monitoring system to support independent living at home has been a subject of many recent research studies in human activity recognition (HAR) domain [3\u201310]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"201115587|4635292": ["[19] made a detailed review of the communications protocols in order to meet the communications requirements of IoT, and their suitability to implement the Fog-based IoT systems."]} +{"201115587|55729907": ["Two different types of authentication problem may be distinguished in the Edge-Fog node part of Fog architecture while applied for healthcare applications [11,43]: Authentication of the Edge devices and authentication of the patient [44,45]."]} +{"201115587|29859741": ["[11] analyzed 163 papers and summarized the main requirements and issues for the Fog computing architecture: Low latency, energy efficiency, bandwidth requirements, etc.", "Two different types of authentication problem may be distinguished in the Edge-Fog node part of Fog architecture while applied for healthcare applications [11,43]: Authentication of the Edge devices and authentication of the patient [44,45]."]} +{"201115587|3767252": []} +{"201115587|21386749": ["As a result, new distributed computing paradigms have emerged that combine portable devices with medical items over the Internet in order to be able to change remote telecommuting and services [2]."]} +{"201115587|15247126": ["The protocol uses UDP packets with modified headers inspired by techniques used in covert channel solutions [52,53].", "The destination port field is left untouched from the original UDP packet header [52]."]} +{"52118409|141366": []} +{"52118409|46642131": []} +{"52118409|10089999": []} +{"59223254|40462024": ["Wireless sensor network [2, 9] is presented to the collection of physical data such as blood pressure (BMP180 sensor), heartrate (Pulse sensor) and ECG (ADS1292R sensor) which is widely used to collect vital signs."]} +{"59223254|21386749": ["The improvement of healthcare systems is gaining significant focus from both researchers and industry alike, by providing more convenient and automated healthcare products [19]."]} +{"59223254|20905429": ["healthcare sensors are available today [9, 31, 34, 35, 41].", "There are different type of sensor use in healthcare monitoring, each sensor has different capability [34], for instance, Pulse sensor use to measure heartrate [34], BMP180 sensor measuring blood pressure [9], and ADS1292R sensor use for both ECG and respiration [9, 34].", "Moreover, there are different type of devices that can be used as a gateway such as a network router, and smart-phones [15, 20, 34, 35]."]} +{"144976126|7360895": []} +{"29872125|17325804": ["The substitute method is to estimate the distance of unknown node to reference node from some sets of measuring units using the attenuation of emitted signal strength [3, 12]."]} +{"29872125|206583375": ["ToA is the most accurate technique used in indoor environment which can filter out multi-path effects [4].", "IR signals have some limitations for location determination, like interference from fluorescent light and sunlight [4].", "Unfortunately, GPS does not perform well in urban canyons, close to walls, buildings, trees, indoors, and in underground environments as the signal from the GPS satellites is too weak to come across most buildings thus making GPS ineffective for indoor localization [4]."]} +{"14242462|5766836": ["In 2014, Tonneau et al discussed the \u201cemergence of a new paradigm: the [IoT] and of the physical world\u201d [1]."]} diff --git a/edge/graph_210692184.jsonl b/edge/graph_210692184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..acfc4010b31b8f15eba998e946793f469421d498 --- /dev/null +++ b/edge/graph_210692184.jsonl @@ -0,0 +1,73 @@ +{"53726738|21557844": ["The use of the mmWave spectrum, however, is challenging because it is sensitive to blockage and requires the LoS propagation between the transmitter and the receiver [79]."]} +{"53726738|61132": ["Furthermore, in military applications, such as reconnaissance, surveillance, attack, and patrol, the usage of the single-UAV networks is almost thirty years old [6].", "\u2026node may trigger the recon\ufb01guration of the whole UAV network [46]. b) Decentralized self-organization: Under the decentralized self-organization model, each entity makes self-decisions and takes actions according to nearby/local information, i.e., the direct interaction with neighbor UAV nodes [6].", "Depending on applications, the speed of a UAV may be in the range of 0-460 km/h [6], [13].", "For more information on transmission mechanisms of UAV networks, please refer to [6], [13] and references therein.", "Multi-UAV networks present a star/mesh topology structure [6].", "The procedure of the self-organization network model is as follows [6]: when a UAV node fails or new UAV node joins, its neighbor(s) monitors the incoming and outgoing links.", "Moreover, the network self-organization generates computational overhead and requires high bandwidth [6].", "On the other hand, owing to frequent changes of the network con\ufb01guration, UAV networks should be self-healing/self-organized to be more fault tolerant [6].", "To improve the reliability of the end-to-end data transmission in highly dynamic networks, delay/disruption-tolerant network (DTN) routing protocols may be required [6]."]} +{"53726738|19938676": ["Moreover, UAV communication networks have been regarded as promising proposals for the 5G system where the gigabits per second (Gb/s) data transfer rate is considered as one of the key performance indicators [51]."]} +{"53726738|26398795": ["\u2026three groups: deterministic, stochastic, and enhanced routing protocols. a) Deterministic routing protocol: In the deterministic routing protocol, a node carrying packets may select a next hop node according to deterministic/known information (e.g., contact, queue, and traf\ufb01c demand) [66], [67].", "The disadvantages of the broadcast-based routing protocol are [66]: \u2022 Contention: It may create contention for buffer space and transmission time (or the channel resource)."]} +{"53754251|14543932": ["[11] reviewed various research in the"]} +{"53754251|61132": ["[12] surveyed some important issues about high mobility, dynamic topology, intermittent links, energy constraints, and changing", "A detailed survey on the types of handover and existing handover schemes in UAV networks had been given in [12]."]} +{"53754251|2623404": ["Leveraging the concepts of software and virtualization, SDN [157] and Network Function Virtualization (NFV) [158] are redefining the network architecture to support"]} +{"53754251|38911919": ["Oubbati et al. [96] proposed a connectivity-based traffic density aware routing algorithm for VANETs using UAVs.", "\u2022 UAV-enhanced VANET: VANET aims at enhancing safety and efficiency in future ITS.", "Specifically, in SAGIN, various heterogeneous communication systems such as satellite networks, FANETs, VANETs, and mobile communications are coexisting in a dynamic integration.", "For the past decades, several new kinds of ad hoc network architectures have been proposed and applied, including terrestrial networks such as VANET [140], wireless mesh network (WMN) [141], WSN [142] and aerial networks like flying ad hoc network (FANET) [143].", "What\u2019s more, the topology of FANET is more dynamic than that of MANET and typical VANET, the available routing protocols applied in\nMANET, such as optimized link-state routing (OLSR), may partly fail in tracking network topology changes.", "A detailed survey on the offloading approaches at different part of the terrestrial cellular network (access, gateway, and core) has been presented in [76], and many research works have put their attention into traffic loading about heterogeneous cellular network (HCN) [77], [78], ultra-dense network (UDN) [79], and vehicular ad hoc networks (VANETs) [80], etc.", "As an emerging technology, UAV communication has exhibited valuable features such as flexible deployment, broadband wireless access, and dynamic networking, which can enhance the performance and applications of VANET [147].", "By definition, FANET is a\nformation of MANET, and can also be classified as a subgroup of VANET.", "Currently, the potential candidates for VANET wireless communication mainly include IEEE 802.11p based dedicated short range communication (DSRC) [145] and LTE based LTE-V [146].", "architectures have been proposed and applied, including terrestrial networks such as VANET [140], wireless mesh network (WMN) [141], WSN [142] and aerial networks like flying ad hoc network (FANET) [143].", "UAV-enhanced VANET can not only improve infrastructure coverage and vehicle-to-vehicle connectivity, but also provide better safety and security on the road, and bring more comfort to the driver [148]."]} +{"8974063|8443371": ["For a detailed comparison of different CR platforms see [88], where five different platforms are discussed and compared: the Universal Software Radio Peripheral (USRP) hardware [89] and GNU Radio software [90] platform; the Wireless Open Access Research Platform (WARP); the OpenAirInterface."]} +{"8974063|5621151": ["In the absence of signalling between PUs and SUs, spectrum holes may be identified by performing direct spectrum sensing, using geo-location databases, beaconing techniques, or by combining spectrum sensing with geo-location database information [7], [12].", "TVWS refers to large portions of RF spectrum, in the very high frequency (VHF) and ultra high frequency (UHF) bands, that will become vacant after the switch-over from analogue to digital TV [7].", "22 standard would be in sparsely populated rural areas [7]."]} +{"50781799|14478191": ["[23] have proposed a solution based on reinforcement learning (RL) [24], [25], and Ferreira et al."]} +{"52900651|4427557": ["There are a number of technologies currently available to support mMTC services in terrestrial low-power wide area networks (LPWANs), and most of them have been captured in [2]."]} +{"52902113|31662905": ["Use of a database/repository is indicated in [6\u2013 8]; how information can be dynamically contributed to these repositories and coordination between licensees managed, especially when mobile platforms such as LEO satellites are involved."]} +{"64792997|51858916": ["was provided in [41].", "agation channel measurements and modeling [37], [40], [41]."]} +{"64792997|35695099": []} +{"6645760|1252121": ["Inter-domain routing is strongly affected by business relationships between the involved parties and is an area of active research even in the context of the current Internet architecture [79]."]} +{"6758116|6583734": ["However, we emphasize that the virtualization and deployment of network functions do not necessarily rely on SDN technologies, and viceversa [4], [35]."]} +{"31662905|13019489": ["Spectrum databases are currently considered the most favoured approach to achieve spectrum awareness in the terrestrial domain due to the uncertainties and dif\ufb01culties related to the spectrum sensing approach [18]\u2013[20]."]} +{"31662905|4122595": ["Spectrum sensing can be defined as the task of obtaining awareness about the spectrum use in a given geographical area [36], [45]\u2013[48].", "Frequency and power should be allocated in a way that optimizes the use of available resources while keeping the interference at an acceptable level [15], [45], [56], [57].", "It is a way to inform the transmitters to avoid transmitting in the same frequencies [45], [66], [67]."]} +{"31662905|3330461": []} +{"31662905|8974063": ["In addition, history data can be used in predicting the future spectrum use in order to allocate the most promising channels for the requesting users [40]\u2013[42]."]} +{"31662905|2509135": ["Over the last decade, signi\ufb01cant effort has been devoted to spectrum sharing research, especially in terrestrial networks, see e.g., [1]\u2013[3]."]} +{"14246903|2623404": []} +{"14246903|10693567": ["inspects the packet, decides what the appropriate action is and instructs the switch to execute this action for all packets of this particular flow [6]."]} +{"6378778|1077083": ["The context-awareWeb service system [2] can be regarded as an attempt in this direction.", "enabling adaptable Web service systems [2]."]} +{"6378778|1113420": ["building such context-aware systems [1]."]} +{"7560874|453954": ["The early generations of television were mostly based on electromechanical systems, where the TV screen had a small motor with a spinning disc and a neon lamp [2, 6].", "T ELEVISION (TV) is probably the most cost-effective platform for informing, educating and entertaining people all over the globe [1\u20136].", "As a further advance, several all-digital systems were proposed, which led to the development of a system combining the bene\ufb01ts of several of these standards [6, 43].", "A history of the Analogue TV enhancement projects and their development can be found in [1, 2, 6].", "In Europe, the Sequential Couleur A Memoire (SECAM), French for sequential color with memory, and then the Phase Alter-nating Line (PAL) systems were developed and adopted by the European countries and then other countries in the world with several different variants [1, 2, 6]."]} +{"17591210|11720829": ["THE SUCCESS story of MIMO technology in terrestrial applications now spans more than a decade with spectacular results, as it offers substantial leverage in realizing the next generation gigabit wireless [1].", "[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"17591210|18148591": ["[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"206189574|2623404": []} +{"206189574|7851743": []} +{"25152758|11720829": ["ISSN 1045-9243/2012/$26 \u00a92014 IEEE As new requirements for greater bandwidth, higher data rates, and improved quality of service (QoS) emerge, the multiple-input multiple-output (MIMO) technology [4] has played an important role in revolutionizing terrestrial wireless networks, leading to growing acknowledgement from the research community, industry, and wireless standardization bodies, e.", "As new requirements for greater bandwidth, higher data rates, and improved quality of service (QoS) emerge, the multiple-input multiple-output (MIMO) technology [4] has played an important role in revolutionizing terrestrial wireless networks, leading to growing acknowledgement from the research community, industry, and wireless standardization bodies, e."]} +{"21111811|3330461": ["Another approach facilitating higher capacity and improving coverage is to use multi-tier/multi-mode network structures with diverse scales ranging from femtocells to wide area satellite connectivity [3].", "For mobility, we assign each HU a random direction determined at the beginning of each cell visit and speed in the range of [3,7] km/h."]} +{"50780698|2871699": ["While 5G is still on its way, 4G is struggling to accommodate the needs of current IoT/M2M deployments: in fact, 4G networks can be insufficient to deal with such an enormous traffic rate [1]\u2013[3]."]} +{"50780698|25929315": []} +{"3431971|2623404": ["[7] and NFV [8] based integrated space-terrestrial satellite"]} +{"3431971|10693567": ["We define the time between the generation of OpenFlow packet and corresponding bundle packet as the tunnel processing delay.", "To the best of our knowledge, we are the first ones to deploy OpenFlow over DTN.", "That is, OpenFlow data is transmitted in a bundle tunnel when the controller (GEO satellite) sets up connection to switches (MEO satellites) and when controllers send instructions to switches.", "The four OpenFlow enabled switches are divided into two layers, the aggregation layer and the access layer.", "space networks and deploy OpenFlow [14] in both space", "We adopt DTN [13] in the space networks and deploy OpenFlow [14] in both space networks and terrestrial networks.", "WedeployOpenFlow (v1.", "We implement SERvICE in a real and large prototype, which has more than 40 nodes with the help of DTN and OpenFlow.", "Then, we give a description of the implementation of the prototype with the help of the Delay Tolerant Network (DTN) and OpenFlow.", "The scheme is a spaceground integrative network and is deployed by OpenFlow and network virtualization.", "POX is a popular lightweight controller for OpenFlow networks and we use POX for the reason that it is written in python and is convenient to add functions in it.", "We use OpenFlow as the southbound interface protocol because it is widely used in the SDN-related\ncontroller and switch.", "The small data center network contains four OpenFlow enabled switches and four servers.", "The signaling data of the OpenFlow signaling packets between controller and switches are taken out and then encapsulated in payload data."]} +{"201143564|9651858": ["Although maximum power allocation can achieve full reliability, power efficiency of gateways has become increasingly important for the sake of network greenness [15]\u2013[17]."]} +{"201143564|6583734": ["Traditional communication networks implement both control and data planes in the same purpose-built network devices, which results in inflexibility and high CAPEX/OPEX for upcoming data demand for the 5G applications [6], [10], [11]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"10566532|7686677": ["Therefore, it is desired to optimize the user association with the consideration of backhaul constraints and the performance of BSs\u2019 content cache system in SCNs. Enhancing energy ef\ufb01ciency is also a critical task for next generation mobile networks [12], [13]."]} +{"421642|2623404": []} +{"10850897|12601073": ["A primary network consists of transmitters and receivers with the licence to use a specific frequency band [10] while a secondary network comprises the transmitters and receivers that share resources with the primary network."]} +{"201620434|61132": ["With the capabilities discussed above, the swarm can be fault-tolerant [3].", "However, the UAV swarm network is still in its infancy with many open issues and challenges [3], and commercial off-the-shelf systems cannot always handle military needs well [2].", "SDN can help in path selection, which helps in reducing conflicts and improving the utilization of communication resources [3].", "In hybrid mode, some control functions run in the master, and other functions are distributed among other UAVs [3]."]} +{"52169284|61132": ["For example, the surveys in [8], [9] focussed on forming ad hoc networks between many UAVs in the sky."]} +{"49349222|4269723": ["With the decoupling and programmability, SDN brings many benefi ts such as effi cient confi guration, improved performance, higher flexibility and encouraged innovation [4]."]} +{"9308128|4395259": ["In addition to upper layer approaches, the security problem has also been addressed from an information-theoretic perspective [8]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206491417|485843": ["Latency requirements are assumed low [6].", "Table I shows the major QoS requirements of SG applications, as analyzed by both standardization [5] and research [6] communities.", "While in the past narrowband communications for SCADA systems represented the most common scenario, nowadays SG applications requiring higher data rates exist, which are usually divided among those below and above 100 kbps [6].", "The most agreed upon is 15 minutes which is enough to accommodate demand-response programs [6].", "Concerning security, no classification is given since any SG application has high requirements, as highlighted in [6]."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"23668684|9928823": ["By combining the generative and discriminative deep architectures, a hybrid model may be constructed, particularly to carry out discrimination tasks, which are aided by the optimized outputs obtained from the generative architecture [20].", "Other deep learning architectures also exist in [20]."]} +{"23668684|7851743": ["Also, in future wireless networks, self-organization has been identi\ufb01ed as a critical issue by a number of researchers [250]."]} +{"23668684|393948": ["This idea of knowledge sharing was demonstrated in [27].", "The state-of-the-art deep learning algorithms, on the other hand, still hinge upon multi-layer architectures according to the work conducted by Bengio et al. [27]."]} +{"23668684|13172512": ["to the networking community [163]\u2013[171]."]} +{"3955006|1598350": ["As the world enters the age of the Internet of Things (IoT), an enormous number of devices will be connected to each other, and satellite communication systems are expected to serve as a means of communication to such devices [1]\u2013[4]."]} +{"53435023|61132": ["Although SDN was originally designed for wired networks, researchers are investigating the utility of SDN in wireless networks [16]."]} +{"23659965|2623404": ["Further details on the differences between traditional networking and SDN are presented in [118]."]} +{"23659965|13172512": ["Future research directions concerning the individual key building blocks have already been discussed in other publications, such as [54], [142], and [147], and are therefore not repeated here.", "This leads to more complex methods, such as Deep Packet Inspection (DPI) or machine learning approaches [54]."]} +{"23659965|2282515": ["As it is working flow-based and stateful, scalability can easily become an issue [80], regardless of the presence of satellite links in"]} +{"23659965|10287248": ["For example, selecting a path based on multiple independent QoS-constraints such as delay and cost has already proven to be a NP-complete problem, if the QoS metrics are real numbers or unbounded integers [76]\u2013[78]."]} +{"23659965|3994942": ["terrestrial networks focuses mainly on putting \u201cthe data traffic where the network bandwidth is available\u201d [50], [51], which is not sufficient in converged satellite and terrestrial networks due"]} +{"3469935|2623404": ["ically or logically centralized network controller to determine network management policies and define operation for the whole network [19], [20]."]} +{"341121|2623404": ["Various open interfaces [3] have been defined to communicate between the control plane and data plane (south bound interface), and OpenFlow [4] is a de-facto standard."]} +{"206608231|393948": ["Index Terms\u2014Big Data, cross-domain datamining, data fusion, multi-modality data representation, deep neural networks, multi-view learning, matrix factorization, probabilistic graphical models, transfer learning, urban computing\n\u00c7"]} diff --git a/edge/graph_210692500.jsonl b/edge/graph_210692500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4c15e97ae94e114d1434c18e6d3f70dc7762f47 --- /dev/null +++ b/edge/graph_210692500.jsonl @@ -0,0 +1,19 @@ +{"15903005|24856837": ["Group targets consist of a number of a objects that move in a coordinated and interacting fashion [35]."]} +{"15903005|15093118": ["The amount of information contained in images allow for a multitude of detection methods, which can be roughly grouped as appearance- or motion-based [2].", "For radars, moving objects are identified by either tracking detections over time, or by extracting the relative motion of the return signal using the Doppler effect [2], [3]."]} +{"29641161|15093118": []} +{"71714742|1262156": ["Unwearable methods, on the other hand, overcome these issues and therefore become a more preferred choice[1, 2, 3, 4, 5, 7]."]} +{"195769597|4787452": ["Improvements to the current standard include the utilization of contention windows [60], a better estimation of communication channels [61], as well as the improvement of the performance of the MAC layer to minimize the bit error rate [62]."]} +{"49656164|6198785": ["The different on-board sensors such as cameras [1,2], laser lidar [3] and radars [4] are equipped to track nearby targets and improve the perception of the vehicle at its surroundings."]} +{"49656164|15093118": ["Detected objects are then tracked and filtered based on motion characteristics to identify vehicles and other obstacles [10].", "Literature [10] pointed out that the measurements of radar are quite noisy, requiring extensive filtering and cleaning."]} +{"52096379|1229096": ["These datasets are collected through various methods, some rely on crowd-sourcing [1, 3], some exploit technical approach [4, 5, 6, 7].", "GPS provides coded satellite signals that can be processed in a GPS receiver, allowing the receiver to estimate position, velocity and time [1].", "In computer vision, there are always datasets for individual fundamental problems, such as image classification [1, 2], semantic segmentation [1, 2, 3], optical flow [4, 5], stereo [6, 7], and tracking [8, 9]."]} +{"13378841|1029120": ["Many accidents are the result of driver inattention or difficult weather conditions causing poor visibility, as well as pedestrian inattentiveness to their surroundings [2]."]} +{"67859546|8446711": ["Perception systems that includes IR cameras [14,15] work in near-infrared (NIR: 780 nm\u20133 mm) or mid-infrared (MIR: 3 mm\u201350 mm, known as thermal cameras) ranges."]} +{"67859546|18388986": ["In a review carried out by [30], it is possible to find an extensive classification of fusion methods according to different criteria such as: (1) relations between the input data sources; (2) input/output data types and their nature; (3) abstraction level of the employed data; (4) different data fusion levels, and (5) architecture types."]} +{"4073525|15562587": ["Above methods somehow expand the data source; however, the introduction of redundant data may not only lead to extra burden on computational capability, but also cause dimension disaster problem [6] which on the contrary degrades the classifier\u2019s Hindawi Computational Intelligence and Neuroscience Volume 2018, Article ID 4160652, 12 pages https://doi."]} +{"10243030|15093118": ["Current techniques utilize various features to detect vehicles [17], e. g. HoG features [5], [18], Haar-like features [19], [20], edge features [21] and optical \ufb02ow [22], [23], [24]."]} +{"42598149|18388986": []} +{"42598149|4491892": []} +{"46741806|16789883": ["The target model is used to describe the movement of the target, which associates the state of the previous moment with the state of the moment [11]."]} +{"125899878|4491892": []} +{"52974134|16374808": []} +{"116421704|15093118": ["\u2026and most of the works were primarily focused on improving detection range and accuracy, as well as reducing computational cost (Premebida et al., 2007; Premebida et al., 2009; Ismail et al., 2009; Sivaraman and Trivedi, 2013; Ai and Tsai, 2016; Chavez-Garcia and Aycard, 2016; Du et al., 2017)."]} diff --git a/edge/graph_210693653.jsonl b/edge/graph_210693653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88336bbd6cad541854726475a21cae67318c7e22 --- /dev/null +++ b/edge/graph_210693653.jsonl @@ -0,0 +1,47 @@ +{"63984181|17279511": []} +{"63984181|15199849": []} +{"63984181|17205659": []} +{"3919233|162478": ["Applications of RNN have been reported for modeling, optimization, pattern recognition, classification, and communication [Timotheou 2010]."]} +{"3919233|6430931": []} +{"69422280|22380247": ["In our opinion, the contributions mentioned above will provide the targeted readers with an integrated survey to keep up with most recent RPL updates and current research directions, which are not available (in one survey) in [2], [4], [12]\u2013[15], and [17]\u2013[21].", "However, this would lead to many incompatible implementations as each will have a different set of the optional features [21].", "6) Advancements in Platform\u2019s Hardware: As found during our investigation and confirmed by [21], most of the evaluation presented in the literature is carried out with simulation on ContikiOS or TinyOS, and they used either the TelosB [98] or Zolertia Z1 [99] platforms.", "[21] reviewed 97 RPL-related papers, covering many research directions."]} +{"19991626|7023859": ["[31] and White et al."]} +{"165159654|207209718": ["INTRODUCTION Misbehavior detection techniques for Internet of Things (IoT) embedded cyber-physical systems (CPS) in general can be classified into three types: signature-based, anomaly-based and specification-based techniques [12], [28]."]} +{"198310220|2142482": []} +{"198310220|3390598": ["[7] published another article related to IoT security."]} +{"2542827|14441987": ["Initially a source floods a route request packet as shown in figure 7. A route reply is generated either by the destination or an intermediate node, which contains an unexpired route to a destination in its route cache [ 13 ]."]} +{"19491678|1230643": []} +{"54465033|3119314": []} +{"17262567|2382521": ["Will sale or transfer of customer data be allowed, and under what terms and to whose bene\ufb01t?"]} +{"17262567|45806091": []} +{"43392823|5660618": []} +{"64548909|6332923": []} +{"199381089|73483767": ["The IoT [6] is now contributing to solving many issues and problems arising in business, industry, science and socio-economic areas to positively and significantly improve the quality of our lives [7,8]."]} +{"199381089|31245252": []} +{"199381089|2829149": []} +{"199381089|3390598": []} +{"32561943|1230643": ["One can refer to the seminal survey paper [2] for more details regarding WSNs."]} +{"41672022|205286988": ["In Bojkovic et al. (2008), authors conduct a survey on security issues of WSNs.", "It binds together the advantages of RFID and WSNs.", "DoS attacks may be launched in a number of ways in WSNs.", "It is a mature research field for wired networks or ad hoc networks while it is an emerging area of research in IMS and WSNs. IDS is an additional unit installed at the clients or server or both.", "We just highlight them here to provide an overall picture of the security requirements for WSNs.", "It is thought that \u2018IDS is not fit\u2019 for securing WSNs.", "Akkaya and Younis (2005) classify them into three major categories: hierarchical, data-centric and location-based routing protocols.", "Since recently, various IDSs have been proposed for detecting compromised node(s) in WSNs.", "Energy-efficient IDSs are suitable for WSNs. Purely centralised IDS approaches are power-efficient because the most powerful part of the network (sink or BS) detects intrusion.", "The paper does not provide a complete picture of IDS approaches that are proposed for WSNs.", "CUSUM algorithm is not simulated by authors in Phuong et al. (2006), so it is difficult to analyse the effectiveness of this algorithm in WSNs.\nTable 3 categorises the IDS-based security mechanisms on the basis of detection policy, decision-making and attacks encountered.", "Researchers use three different ways of installing IDS agent in WSNs.", "There are a number of routing protocols proposed for WSNs. Akkaya and Younis (2005) classify them into three major categories: hierarchical, data-centric and location-based routing protocols.", "Ad hoc networks have several similarities with sensor networks such as no infrastructure, distributed nodes and dynamic\ntopology while sensor networks differ in various aspects too, i.e.,\n\u2022 sensor nodes are densely deployed in an area to check the surrounding activities\n\u2022 sensor nodes transmit the information to the BS or sink\n\u2022 nodes are self-organising in WSNs.\nWSNs inherit a number of security threats of ad hoc networks while several others are new.", "The rest of the paper is organised as follows: Section 2 provides a brief description of security issues in WSNs. Section 3 contains an introduction to the IDSs.", "According to Wood and Stankovic (2002), various attacks are possible on different layers of the sensor node that may cause DoS in WSNs.", "In this section, we briefly discuss the DoS attack, Sybil attack, routing attacks and some other possible attacks in WSNs."]} +{"32377726|1230643": ["One can refer to the seminal survey paper [1] for more details regarding WSNs."]} +{"115194320|10283038": ["In this paper, we consider the typical attacks reported in the literature [15]\u2013[17], [44], [45]."]} +{"206466492|1230643": ["The seminal survey paper can also be considered for more details [2]."]} +{"70025477|21386749": []} +{"18318697|1230643": []} +{"4028992|3042864": []} +{"54444519|2142482": ["In 2014, Mitchell and Chen [47] surveyed 60 papers on IDSs designed for wireless environments.", "Mitchell R, Chen I-R (2014) A survey of intrusion detection in wireless network applications.", "Xu C, Chen S, Su J, Yiu SM, Hui LCK (2016) A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms.", "However, such IDSs face challenges in terms of their high false positive rate and computational complexity [47].", "Mitchell and Chen [47] proved that an anomaly-based IDS is the most suitable design for mobile telephony systems.", "In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai. pp 1903\u20131908 83.", "Liu C, Yang J, Chen R, Zhang Y, Zeng J (2011) Research on immunity-based intrusion detection technology for the internet of things.", "Anomaly-based IDSs also face challenges with regard to illegal analysis methods, such as packet-based methods, that infringe on user privacy [47].", "IEEE, Chennai. pp 1\u20136 59.", "If any user packet is dropped by mistake, the user will suffer a billing error, and the user packet will be delayed [47].", "Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2011) An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming, Vol. 41 77.", "Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices."]} +{"54444519|13299749": ["[46] presented a survey on intelligent techniques for feature selection and classification-based intrusion detection in networks."]} +{"54444519|26690303": ["A pattern classification method in machine learning depends on pattern recognition, whereas a single classifier method depends on a single machine learning algorithm [72, 73]."]} +{"12458348|1236072": ["A large number of sensors can be deployed in an ad hoc fashion to form a Wireless Sensor Network (WSN) for many civil and military applications [3], [4]."]} +{"8503622|1230643": ["Contents lists available at ScienceDirect\nAd Hoc Networks\njournal homepage: www.elsevier .com/locate /adhoc\nPrivacy preservation in wireless sensor networks: A state-of-the-art survey\nNa Li a,*, Nan Zhang b, Sajal K. Das a, Bhavani Thuraisingham c\na Department of Computer Science and Engineering, The University of Texas at Arlington, Box 19015, 416 Yates St., Room 300, Nedderman Hall, Arlington, TX 76019-0015, United States b Department of Computer Science, The George Washington University, 801 22nd Street NW, Suite 704, Washington DC 20052, United States c Department of Computer Science, Erik Jonsson School of Engineering & Computer Science, The University of Texas at Dallas, 800 W. Campbell Road, MS EC31, Richardson, TX 75080, United States\na r t i c l e i n f o\nAvailable online 22 April 2009\nKeywords: Wireless sensor network Privacy\n1570-8705/$ - see front matter 2009 Elsevier B.V doi:10.1016/j.adhoc.2009.04.009\n* Corresponding author.", "\u2026survey\nNa Li a,*, Nan Zhang b, Sajal K. Das a, Bhavani Thuraisingham c\na Department of Computer Science and Engineering, The University of Texas at Arlington, Box 19015, 416 Yates St., Room 300, Nedderman Hall, Arlington, TX 76019-0015, United States b Department of Computer Science, The\u2026"]} +{"44175270|26690303": ["Existing intrusion detection and prevention models generally use statistical approaches [15] such as Hidden Markov Model (HMM) [15], Bayes theory [16], cluster analysis [17], signal processing [18] and distance measuring [19] to detect anomalous activities."]} +{"13582031|17205659": ["WSNs have the following general security requirements [56]:"]} +{"13582031|1230643": []} +{"198310460|3456635": ["It provides various security services, such as secure access to services for IoT users, secure transmission of signaling data and user data, and secure access to mobile stations including mutual authentication along Universal Subscriber Identity Module (USIM) and User Equipment (UE) [27] ."]} +{"198310460|52248423": ["Although there are some security features within IoT protocols, it is not enough to fully secure the IoT systems [24] .", "Salman and Jain [24] recently provided a detailed survey of various protocols for IoT."]} +{"23651908|2142482": ["Based on four basic concepts, intrusion detection researchers traditionally use the following metrics [34], [36]: The True Positive Rate (TPR) or Detection Rate(DR) or Sensitive (SR) measures the proportion of positive pattern that are correctly recognized as positive, which indicates the detection rate of normal samples:"]} +{"201813787|46978224": ["Study [16] uses big data to help optimize power distribution in Volt-VAR Control (VVC) processes in wind power generation."]} +{"150293156|30102381": []} +{"150293156|29060869": []} +{"150293156|595093": []} +{"9789312|29060869": ["A detailed survey on the smart grid environment is provided in [3], [4], [5], [6], [7], [8], [9]."]} +{"9789312|2521001": ["After battery charging, Ui can pay to the service provider for charging (energy) with the help of maintained secure session with SMj [27], [28]."]} +{"171095717|5671282": ["Several techniques are developed for selecting the features of malware [14], [19]\u2013[21] for instance information gain technique [19], but they are based on limited types of feature to detect the malware.", "Among the 145 permission set, 48 permission are risky permissions which are mentioned in previous literature [19]\u2013[21] as shown in Table 3."]} diff --git a/edge/graph_210693664.jsonl b/edge/graph_210693664.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50387f93c4a9419f2beaaad04e4d5764b3a88864 --- /dev/null +++ b/edge/graph_210693664.jsonl @@ -0,0 +1,6 @@ +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} diff --git a/edge/graph_210694141.jsonl b/edge/graph_210694141.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..770c4829c3394e3c74b546401f6224f431635357 --- /dev/null +++ b/edge/graph_210694141.jsonl @@ -0,0 +1,46 @@ +{"8184681|5660618": ["A comprehensive survey of the current results in networked control systems has been carried out in [21]."]} +{"8184681|6327434": ["A lot of literature deals with failure detectors in dynamic systems (Willsky (1976)).", "Several failure-detection schemes in dynamic systems are reviewed in [11]."]} +{"107643554|485843": []} +{"146042654|6400766": []} +{"111695018|35109549": []} +{"482252|33247252": ["The application and services provided by the IoT can be both residential and commercial ranging from e-health [24], e-marketing [25], intelligent car parking system [26], intelligent transportation system [27], [28], automation, and logistic services."]} +{"115905089|10440280": ["The DR and its application from the supplier\u2019s perspective are summarized by John in [26].", "The survey in [26] is based on various optimization algorithms and pricing methods.", "[26] In this paper, the authors review different demand response (DR) schemes for energy management."]} +{"115905089|29060869": ["[30] In this paper, the authors review the energy efficient communications networks among the smart grid and the various data centers that manage the power system."]} +{"115905089|485843": ["[27] In this paper, the authors highlight the potential applications of communication and information technology in smart grid architecture that could be helped by an economic and reliable power system."]} +{"115905089|595093": ["[29] In this paper, the authors review various cyber security issues associated with communication networks in the smart grid that can effect the reliability and system operation of the power system."]} +{"115905089|6959212": ["[21] In this paper, the authors review all the communication media that is needed in smart grid technology."]} +{"115907587|16323798": []} +{"86804038|8854215": ["In 2016, He and Yan [26] focused on the cyber physical attacks in the SG.", "via communication channels to the gateway devices at substations to knock the system down [26].", "In 2016, He and Yan focused on the cyber physical attacks in the SG [26].", "Some of the work presented in [21], [25], [26], and [30] categorized many of security issues, for instance smart grid to home and"]} +{"86804038|12537501": []} +{"86804038|21930333": ["More details on the recent communication technologies for the SG can be found in [39]\u2013[46]."]} +{"86804038|2521001": ["goals are directly adopted from [21] and [79]\u2013[81].", "Some of the work presented in [21], [25], [26], and [30] categorized many of security issues, for instance smart grid to home and", "could affect individual consumers, as well as infrastructure such as substations and control centers [21].", "[21] presented smart grid and smart home security."]} +{"86804038|35109549": ["goals are directly adopted from [21] and [79]\u2013[81]."]} +{"86804038|595093": ["However, these stakeholders are required to enforce adequate authorization policies, so that customers data can not be accessed without permission [83]."]} +{"86804038|23893450": ["Some of the work presented in [21], [25], [26], and [30] categorized many of security issues, for instance smart grid to home and", "[25] discussed security advances in SG over the period of 2010 \u2013 2015."]} +{"113320335|20178897": []} +{"113454498|1876323": ["1 Introduction The history of the variable structure control such as the sliding mode control (SMC) can be traced back to the 1950s when it was first proposed by Emelyanov and several co-authors in the former Soviet Union [92]."]} +{"108943506|10542290": []} +{"108943506|17737221": []} +{"108943506|20178897": []} +{"108943506|8363289": []} +{"21993314|2521001": []} +{"1722540|8363289": []} +{"116676360|35109549": []} +{"62303805|8530790": []} +{"19892329|6327434": ["In [2], the author provides a survey of detection schemes for the class of stochastic linear discrete time systems."]} +{"17816736|10440280": ["For a better implementation of DR programs, DAP schemes are more suitable than TOU pricing [4\u20136].", "The most widely-used DR programs include: critical peak pricing (CPP), time of use pricing (TOU), day ahead pricing (DAP), real-time pricing (RTP), flat rate pricing (FRP) and inclining block rate (IBR) [4\u20136]."]} +{"8854215|595093": []} +{"8854215|121289": []} +{"113935519|13088291": ["In other words, an object is assigned to a category based on the category of its k nearest neighbors [12]."]} +{"113935519|5246835": ["[59] surveyed the various techniques used for this purpose."]} +{"114428353|33247252": []} +{"114428353|5747564": []} +{"114428353|17381415": []} +{"51982945|121289": ["[6], making the operations of electrical infrastructure efficient, cost-effective, and environmentally sustainable."]} +{"131774523|12537501": []} +{"131774523|2521001": []} +{"131774523|207209718": ["Specifically, in [44], the authors provided an extensive study and comparison of multiple IDPSs devoted to the Cyber-Physical Systems (CPSs), such as SG."]} +{"131774523|485843": ["- Wireless Fidelity) standards [14], [54].", "16, PLC, DSL, satellite, cellular and fibre-optic communications [14], [54].", "The SG paradigm combines various kinds of systems, technologies and infrastructures such as microgrids, AMI, substations, synchrophasor systems, SCADA systems and electric vehicles [14], [54].", "Specifically, they receive the generated power, configure the distribution function and control the power increase [54].", "More information about the components of SG is provided in [54]."]} +{"131774523|23893450": []} +{"43634799|8008208": []} +{"43634799|289357": []} diff --git a/edge/graph_210694642.jsonl b/edge/graph_210694642.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddaf41204143749c41bb0a8db39fa224d5a96e06 --- /dev/null +++ b/edge/graph_210694642.jsonl @@ -0,0 +1,3 @@ +{"115512991|17381415": ["exchanged with the power grid [4]."]} +{"40691149|17381415": ["working on a \u03b1\u03b2 stationary reference frame [33].", "where kP is the proportional gain, kR is the resonant gain at the grid frequency, kih is the resonant gain at the h-harmonic to be controlled, and \u03c9o is the detected fundamental frequency [33]."]} +{"33946315|12083425": ["In Mode 2, coordinated operation methods and energy management strategies are the major focuses for both gridconnected [20], [21] and islanded operation modes [22]."]} diff --git a/edge/graph_210695152.jsonl b/edge/graph_210695152.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..169f41839cbd68f95ac1473ff1fc7b0f75f490c4 --- /dev/null +++ b/edge/graph_210695152.jsonl @@ -0,0 +1,3 @@ +{"12307663|45796493": ["Studies on the steering of audible sound beams from superdirectional loudspeakers have been published [11, 12]."]} +{"5048357|469744": []} +{"1300282|10727646": []} diff --git a/edge/graph_210695841.jsonl b/edge/graph_210695841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fcb6e829ab487ca13cfc2752a0f200ffb01384e3 --- /dev/null +++ b/edge/graph_210695841.jsonl @@ -0,0 +1,4 @@ +{"4830007|17514014": ["Numerous other visualization software are available including Cytoscape, Gephi, VANTED, and VisANT [73]."]} +{"199088075|34704358": []} +{"17843829|1184328": []} +{"124404229|1876323": []} diff --git a/edge/graph_210696017.jsonl b/edge/graph_210696017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..320e5ce6658df9ccd876add653c1b61d2291970e --- /dev/null +++ b/edge/graph_210696017.jsonl @@ -0,0 +1,6 @@ +{"3404230|155150": ["Also, the measured FBG sensor signals are highly influenced by temperature, and temperature compensation needs to be provided for, negatively impacting on design simplification [24]."]} +{"3826058|15167343": ["and design process [8], [9]."]} +{"3826058|155150": ["and design process [8], [9]."]} +{"2087828|42279552": ["For high aspect ratios, the applied force could cause also a reorientation and reshaping of the particles that could induce the destruction of the existing conductive network or a reduction of the conductivity of the filler [70,77]."]} +{"4226575|34420887": []} +{"4226575|15167343": []} diff --git a/edge/graph_210696059.jsonl b/edge/graph_210696059.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54d5a0cce0dee6ac24d601cbc880d232089a96e0 --- /dev/null +++ b/edge/graph_210696059.jsonl @@ -0,0 +1,251 @@ +{"21920577|359842": ["Jafri and Arabnia [14] provide a comprehensive survey of this evolution, identifying landmark systems such as Eigenfaces (1991) [34] and Fisherfaces (1997) [4]."]} +{"6358353|393948": ["Examples of both approaches can be found in [11]."]} +{"27796701|64404": ["The BPG encoder is based on HEVC encoding [9].", "[46] V. Sze, M. Budagavi, and G. J. Sullivan, Eds., High Efficiency Video Coding (HEVC).", "HEVC (High Efficiency Video Coding) [9] and compatibility considerations are accommodated in the form of a small JavaScript (56KB) decoderwhich is one of the key composing elements of the new format."]} +{"53242304|14849079": []} +{"5037902|16313703": ["2764330 and 4G/5G cellular communications, the Internet of Things (IoT) is evolving to a paradigm that enables the interconnection of physical objects and human in smart cities/homes, and so on [1], [2]."]} +{"9496996|12815020": []} +{"21929389|64404": ["265/MPEG-HEVC-based encoding [19], [20], the HM reference software encoder [21] was selected, since it is currently considered as the most popular available encoder implementation."]} +{"21929389|3540699": ["264/MPEG-4 Advanced Video Coding (AVC) [2] standards, the development of which was coordinated by the ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving Pictures Expert Group (MPEG).", "264/MPEGAVC-based products and services [2], [4]."]} +{"12724251|10693567": []} +{"12724251|3348390": ["SDNs can play a crucial role in managemen BLE sensors or ZigBee-based WSNs.", "For example, the sensing layer is expected to utilize different technologies such as Bluetooth Low Energy (BLE) and ZigBee [2].", "In addition, ller can optimize ated application ode has multiple h ones to activate on application communications oreover, it allows without the need nly the required e achieved. sensor technology nor ZigBee are s OpenFlow."]} +{"64821106|85585": []} +{"64821106|13365762": []} +{"15693805|10397481": []} +{"15693805|16525678": []} +{"49647524|1353379": []} +{"49647524|26071662": []} +{"49556028|9495329": ["Some authors, such as Bizanis and Kuipers [22], study the state of the art when applying SDN and Network Virtualization (NV) to IoT.", "Available: https://doi.org/ 10.1109/ICIN.2015.7073808 [22] N. Bizanis and F. Kuipers, \u2018\u2018SDN and virtualization solutions for the Internet of Things: A survey,\u2019\u2019 IEEE Access, vol. 4, pp. 5591\u20135606, Sep. 2016."]} +{"32859534|9554464": ["Thus the isolated resources can be used by independent processes [19]."]} +{"32859534|1230643": ["1) WSN Hardware: Includes transceiver units, processing units, sensor interfaces, power supply, and multiple A/D convertors [18]."]} +{"67290075|30747069": ["Mode indices 0-17 use prediction units of 4 \u00d7 4 pixels and discrete sine transform(DST), whereas modes 0-34 use prediction units of size 8 \u00d7 8, 16 \u00d7 16 and 32 \u00d7 32 pixels and discrete cosine transform(DCT) [25]."]} +{"206417547|17428811": ["According to FGS sequence [27], [28], the FGS-encoded sequence consists of two streams: a nonscalable base layer (BL) for basic reconstructed quality and a scalable enhancement layer (EL) for fine additional quality."]} +{"59526201|8876870": ["Using such a realistic digital map and the locations for base stations and users, 3-D channel parameters are collected [52], [90], [100] using the ray-tracing tool called wireless system engineering (WiSE) developed by Bell Laboratories [85].", "To exploit such a real geography, map-based channel models utilizing ray-tracing tools have drawn much interest from academia and industry, such as in [84]\u2013[90]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"127380745|22221919": ["Unlike the NOMA technology in downlinks [28], where the central BS controls the power allocation, the interference"]} +{"127380745|31245252": ["In [9], authors conducted a comprehensive overview of IoT with respect to system architecture, security, privacy issue, enabling technologies of IoT and the integration of fog/edge computing of it."]} +{"127380745|3494096": []} +{"56178064|49574823": ["As for the underlying transaction model, the framework supports an UTXO model for financial transactions and a smart contract for the spatiotemporal activity log of a patient [21].", "Sidechains, off-chains, and altchains are assumed to be loosely coupled with the chain and will not be part of a main blockchain consensus mechanism within the permissioned consensus mechanisms in the proposed private or public shared blockchain ledger system to support scalability and avoid latency problems [21].", "A bridge among different therapy applications running on different types of blockchain models can be maintained to support altchains [21].", "While reading or querying the file, the patient has to first authenticate with the private key to obtain the hash of the distributed file pointers and then acquire the actual file by providing the distributed hash to the cloud controller [21].", "A comprehensive survey on blockchain for IoT applications can be found in [21]."]} +{"56178064|4880047": ["In addition to security and privacy, aMECnode can be used in tandem with other scalability solutions, such as 5G interIoT node and IoT-to-MEC node communication [20], [25]."]} +{"56178064|3434731": []} +{"1817751|512561": ["level and network lifetime [151]."]} +{"1817751|85585": ["increases the accuracy of various tracking in a variety of civilian and military applications [71].", "due to bottleneck link/node failure for non-disjoint paths which negatively impacts the performance of multipath routing [71].", "Reliability has emerged as a factor to classify multipath routing protocols, since a reliable monitoring of the environment is very important in a variety of multimedia applications [71]."]} +{"1817751|36432451": ["The design of the routing protocol is highly influenced by the data delivery model, especially when the design involves minimization of energy consumption and route stability [45].", "Multimedia applications encompass monitoring of reallife events which necessitates that efficient multipath routing mechanism should be developed for the transmission of information while meeting QoS requirements [45].", "tion, cooperative and distributed algorithms [14], [43]\u2013[45].", "Some routing protocols adhere to some requirements and resource-constraints nature of WMSNs to meet QoS in order to handle various types of multimedia and mixed traffic [45]."]} +{"1817751|6556803": ["This means that each sensor node shall be modified distinctively according to the application scenarios [6]."]} +{"1817751|13454399": ["The benefits of various multipath routing protocols for WSNs and their benefits were presented in [33] and [34].", "are two relevant aspects of an allocation strategy: granularity and scheduling [16], [34]."]} +{"1817751|29997805": ["dant traffic reduction based on similarity of multimedia data sources from nearby locations were studied in [7].", "A plethora of research on taxonomies for Mobile Ad-hoc NETwoks (MANETs) and WSNs have reported the baseline model of routing protocols [7], [69].", "[7] classified the WMSNs routing protocols", "constraints, multimedia source coding techniques, crosslayer coupling of functionality, and multimedia in-network processing [7].", "Designing multipath routing protocols for WMSNs requires additional research that extends the protocols proposed for WSNs [7]."]} +{"1817751|2295142": ["selection for each multipath routing protocol is independently determined and should be selected to meet the performance demands of WMSNs applications [1], [13].", "The third approach is more interesting than the others since it represents a trade-off between energy expenses and the likelihood of total multipath failure [13], [76].", "The demands of multipath routing strategy combined with various performance demands dictated by different applications have led to the proposal of a number of new routing protocols to efficiently utilize the limited available resources in addition to the features of multimedia data [13].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "[13] classified a multipath routing taxonomy for WSNs into three categories with emphasis on their advantages and disadvantages.", "vides fault tolerance by increasing the probability of a data packet sent by a source node, via alternatives of selected paths, arriving at the destination sink with minimum packet loss [13].", "However, our survey and the survey presented in [13] have several major differences.", "requirements along with their respective routing strategies [8], [13], [14], [16].", "In [13], multipath routing protocols were classified based on three main criteria: alternative path routing, reliable data transmission, and efficient resource"]} +{"1817751|41998167": ["diately to the changes in the sensed attribute, or a query is generated by the base station [52]."]} +{"1817751|3755658": ["ability [29], and cross-layer approaches [21]."]} +{"1817751|14132386": ["Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "cols for traffic load balancing and repartition [62], [96]\u2013[98].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62]."]} +{"1817751|3826739": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "In [28], position-based routing protocols were surveyed"]} +{"1817751|1236072": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "Early surveys focused on general architectural issues and open research problems in the field of WSNs [8], [19]\u2013[27].", "These characteristics are handled either by modifying existing protocols in WSNs or by proposing new methodologies such as multi-radio multi-channel systems, switching between multiple channels, multipath routing, or mixtures of these methods [8].", "Therefore, the prime role of a routing protocol is to establish a path between the sources and sink node while keeping track of the path availability and facilitating successful transmission of data along the selected paths [8].", "constrained routing protocols were studied in [30], where the taxonomy presented in [8] was expanded to consider energy efficiency.", "Routing strategy is defined in terms of the process of discovering and selecting paths in wireless networks from the target area that sends network traffic towards the sink node [8].", "requirements along with their respective routing strategies [8], [13], [14], [16].", "multiple performance metrics to meet the additional QoS requirements [8], [68].", "In [8], routing protocols for WSNs were discussed and classified into", "Several techniques have been proposed to understand how different routing approaches respond when handling various requests in different network environments [8], [57]\u2013[64]."]} +{"1817751|44944144": ["better than proactive routing protocols during inactivity [144]."]} +{"1817751|1230643": []} +{"1817751|14441987": ["the network with up-to-date routing information [142].", "The proactive approach responds to changes in the network topology or another metric such as bandwidth and interference by propagating updates throughout the network to maintain a consistent network [142]."]} +{"1817751|41907762": ["It should be noted that, they are difficult to measure and generally can generate high overhead in networks [60], since resource availability information are periodically exchanged among nodes [35].", "Actually, the discovery, selection and maintenance of paths depend on some node-specific and/or network-wide metrics such as QoS requirements, residual-energy budget along the selected path, and more [60].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "have been proposed to solve routing problems in traditional WSNs [60]\u2013[64].", "Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62]."]} +{"1817751|13458486": ["In addition, cross-layer design between MAC layer and routing allow packet-level service differentiation or priority-based scheduling, and more power efficient routing mechanisms [17].", "The multipath routing protocol taxonomy in [17] used path selection techniques and traffic distribution mechanisms to classify the surveyed protocols.", "Consequently, the objective is to assign more loads to under-utilized multiple paths and less load to over-committed paths so that uniform resource utilization of all available paths can be ensured to distribute network traffic [16], [17]."]} +{"1817751|1762301": ["Otherwise, reactive routing protocols may result in a large volume of messaging overhead [133].", "final destination route are discovered [133]."]} +{"10807928|2623404": ["presented a survey on Software-Defined Networking, focusing on OpenFlow [9].", "In SDNs [9], the programmable data plane stops at the switching elements.", "Several manufacturers sell today programmable switches and routers [9], and there are many commercial and educational SDR platforms on the market [10], spanning several frequency bands.", "Authors in [9] also did not discuss the importance of network virtualization or data plane programmability.", "Currently, OpenFlow is also implemented in hardware on several commercial switches and routers [9]."]} +{"10807928|3189715": []} +{"7114876|5747564": ["Recent survey reported in [21] discussed new challenges and opportunities in smart grid wireless communications."]} +{"16580150|7686677": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|14388097": ["While most studies analyze multimedia streaming in the regular client-server architecture, a survey on the research on quality of service for peer-to-peer media distribution was presented in [113]."]} +{"16580150|10837932": ["We refer the readers to some projects, such as EARTH and Green Touch [31], OPERA-Net [6], Mobile VCE Green Radio [4], and other recent surveys and articles that cover such work [47], [48], [107], [29]."]} +{"16580150|17428811": ["[38] included SVC for an MPEG-4 FGS streaming system [65], in which a mobile client can control its decoding capability according to the energy management policy."]} +{"206478312|6387482": []} +{"9048073|5401262": ["Modeling human behavior and understanding displayed patterns of behavioral signals, involve a number of tasks [12]:"]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"19519512|28392119": ["H OME networks, which facilitate communications among devices inside a home, can improve the quality of life of the residents [1]."]} +{"198146665|61806265": []} +{"16843952|8649087": ["\u2022 Encryption and watermarking are two groups of technologies used in developing technical solutions for the copy protection problem in DHNs [66,67, 63 ,64]."]} +{"18199187|15300368": ["The final disadvantage of Z-Wave is its requirement of a larger antenna for the sub 1 GHz range, which may be detrimental towards the attempt for smaller devices [30]."]} +{"51611290|6111895": ["For further readings, see [47]\u2013[50]."]} +{"14352252|10559330": ["Internet QoS focuses a lot on the performance requirement of end to end data transmission capacity."]} +{"46883908|12083425": []} +{"61806265|206491434": ["limited energy, limited computation, and limited processing capabilities [7]."]} +{"61806265|3656886": ["It supports two way communication thereby acknowledges all transmissions, further in order to maintain QoS and to assure reliability Automatic retransmission request (ARQ) and Forward Error Correction (FEC) is used [36]."]} +{"61806265|9651858": ["Fig.18 demonstrates the percentage of carbon emissions due to various such activities [136]."]} +{"61806265|4427557": ["Long Range (LoRa), SigFox, RPMA, N-Wave and Dash 7 are unlicensed, NBIoT, EC-GSM-IoT, LTE-M are licensed technologies [31], [32]."]} +{"61806265|206901977": ["[125] classified the energy efficiency techniques classified into five categories of radio"]} +{"61806265|3494096": ["Therefore to select an optimal technology for an application various factors such as power consumption, security issues, deployment cost, communication range, data rate, throughput, latency are required to be considered [26], [27]."]} +{"52184272|52248423": ["Standardization: the interoperability between the different IoT solutions call for well-defined IoT .", "IoT Standardization [44-48] The standardization efforts in the IoT domain are reviewed.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|29859741": ["Additionally, other innovative applications (e.g. healthcare, smart cars, etc.) will benefit from the fog computing emergence [126, 127]."]} +{"52184272|3757239": ["More recently, MEC solutions have been proposed in the 5G domain [135-137]."]} +{"52184272|6909107": ["Additionally, computation offloading is one of the main MEC challenges having processing and memory limitations [140-143]."]} +{"52184272|206578365": []} +{"52184272|8523192": ["Other issues are also encountered in the fog domain such as security and privacy, provisioning and resource management, offloading, charging and accounting, and QoS guarantees in terms of capacity, storage, bandwidth, connectivity, and reliability [130-133]."]} +{"52184272|9495329": ["SDN application in IoT [49-54] The SDN application at different IoT levels are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|1442447": ["SDN application in IoT [49-54] The SDN application at different IoT levels are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|31860478": ["In [122], the authors shed light on the relation between fog and cloud.", "\"Why Fog and Why Now?\u2016 delay, cognition, agility, and efficiency are defined to be the main reasons for the fog invocation [122]."]} +{"52184272|14315321": ["IoT frameworks [32-37] The different proposed IoT frameworks are presented.", "AC CE PT ED M AN US CR IP T In the literature, several surveys have tackled different IoT related subjects (see Table 2): IoT applications, challenges, and opportunities [21-31], IoT frameworks [32-37], IoT security [38-43], IoT standardization [44-48], SDN application in IoT [49-54], IoT and cloud integration [55, 56]."]} +{"52184272|2769147": ["Accordingly, it is important to show the distinction between these concepts in the aim to solve their specific problems and to allow their realization in the near future [78]."]} +{"61811796|1236072": []} +{"5321585|13365762": []} +{"5321585|192934": []} +{"27874608|13454399": ["EE [10] Restricted High High Tree Disjoint Query-based x x x", "[10] M.", "IEEE Wireless Communications \u2022 October 2017 127 DYNAMIC SPECTRUM MANAGEMENT FOR 5G were discussed in [10].", "Proactive routing protocols This survey investigates Robust Multipath Routing (RM-DSR) and Multipath Dynamic Source Routing (MDSR) as examples of DSR, Tiny Optimal Node-Disjoint Multipath Routing (TinyONDMR) protocol as an example of proactive AODV, and SHRP as a reactive protocol [10].", "SHRP [10] Energy efficiency and", "MMSPEED [10]", "emergencies Hazard detection EE [10] Security, QoS, and data", "For instance, the Multipath Multi-SPEED (MMSPEED) routing protocol has many improvements and modifications in order to guarantee specific QoS parameters in WSNs spanning over the network and MAC layers [10]."]} +{"27874608|2295142": ["Alternative path routing, reliable data transmission, and efficient resource utilization were the three major criteria in which multipath routing protocols were classified in [11], whereas a different classification based on selection techniques and traffic distribution mechanisms was presented in [12].", "[11] M."]} +{"27874608|3826739": ["Position-based routing algorithms and metrics like energy consumption, negotiation overheads, complexity, reliability, scalability, and multipath strategies were considered in [7].", "[7] Z."]} +{"27874608|1236072": ["[4] N.", "The authors of [4] discussed constraints and solutions related to each layer of the WSN stack."]} +{"52116125|13991708": []} +{"52116125|206986475": ["Most survey papers focus on WSN [25]\u2013[27], software platforms and hardware items [37]\u2013[39], architectures [47]\u2013[49], and applications of IoT [50]\u2013[52]."]} +{"52116125|1599458": ["Besides, researchers investigate the new technology and issues about IoT that are data fusion and service-oriented framework [40], [41], context awareness techniques [45], [46], cloud computing [43], [44], industrial applications [29], [30], etc."]} +{"52116125|8650651": ["Defined Networks (SDN) [124], [125] have been proposed to implement different data transfer between HNEs."]} +{"52116125|17262196": []} +{"52116125|1082096": []} +{"52116125|20473693": []} +{"52116125|3348390": ["Besides, researchers investigate the new technology and issues about IoT that are data fusion and service-oriented framework [40], [41], context awareness techniques [45], [46], cloud computing [43], [44], industrial applications [29], [30], etc."]} +{"22832840|9495329": []} +{"17064172|15947359": ["There have been studies on image/multimedia sensors [1], [2], [3], [4], [5] but few of them really consider timing on realistic hardware constraints for sending/receiving packets."]} +{"40484012|16023210": ["context, have focused on network architecture [3]\u2013[5], operating systems [6], [7], network layer [8]\u2013[10] and MAC layer [11], [12], [18]\u2013[21].", "Taxonomy of Energy-aware mechanisms in routing protocols for WSNs was presented in [8]."]} +{"40484012|17683338": ["Farooq and Kunz [14] identified major strengths and weaknesses of operating systems for WSNs in terms of resource sharing, memory management and protection, communication protocols and other features."]} +{"40484012|28210515": ["11-based networks can be found in [26]."]} +{"40484012|1230643": ["The automatic information acquisition could be achieved thanks to a wireless sensor network (WSN) with sensor nodes constrained in energy [1] and placed on farmland."]} +{"4568863|7365537": ["There are various technologies that can be used to accurately identify and locate a faulty machine in a large deployment sites based on CM unit associated with it [1]."]} +{"22954019|8652282": ["Energy-efficient routing protocols can be classified into the following four types based on their energy conservation approaches [16], [17]: Network Structure: The network layout becomes the basis for energy-efficient approaches."]} +{"51949333|22380247": ["However, although these protocols have been making progress gradually under the assumption of stationary network, they cannot be apparently adopted in LLNs with mobility, due to lack of providing any specific operation for mobility and identifying mobile nodes [12], [13], [14].", "Several studies [12], [13], [14] confirm that protocols designed for stationary network, such as RPL, experience significant performance degradation when operating with mobile devices.", "Several studies [12], [13], [14], however, found that RPL suffers significant performance degradation when operating with mobile endpoints since it was not designed with mobility in mind."]} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"7132356|25929315": ["Although di \ufb00 erent subtleties have been suggested to share optimally the RACH channel [4], the most e \ufb03 cient way relies on providing MTDs and UEs (User Equipment) with separate access channels."]} +{"27532782|40202226": ["as YouTube, the number of stalling events have a higher impact on the user perceived quality than video quality [12]."]} +{"34611353|7525856": []} +{"34611353|8606364": ["schemes including the radio resource allocation are surveyed in [84] and [85]."]} +{"34611353|512561": ["Moreover, network coding in conjunction with channel bonding schemes for multimedia communications in CRNs is also a good direction of future research [337]."]} +{"34611353|1686572": ["Different standards related to CRNs and the TVWS are discussed in [74]\u2013[77], while the authors in [78]\u2013[83] have studied various security approaches related to CRNs."]} +{"34611353|14988542": ["[14] and Pudlewski and Melodia [37] explore the various compression techniques related to multimedia applications.", "The existing surveys on the energyefficient multimedia communications in the wireless networks are [14]\u2013[16], while QoS in the various wireless networks is discussed in [17]\u2013[27]."]} +{"34611353|8974063": []} +{"34611353|14088590": []} +{"34611353|2282515": ["The existing surveys on the energyefficient multimedia communications in the wireless networks are [14]\u2013[16], while QoS in the various wireless networks is discussed in [17]\u2013[27]."]} +{"34611353|1775475": ["The existing surveys on the energyefficient multimedia communications in the wireless networks are [14]\u2013[16], while QoS in the various wireless networks is discussed in [17]\u2013[27]."]} +{"9814623|3055684": ["In fact, advanced ICTs, monitoring and control, energy harvesting [23] and innovative metering technologies via smart wireless"]} +{"53433041|206743327": ["Although still limited by fault-tolerance and consistent power supply, the last decade has witnessed rapidly decreasing cost of main memory and growing demand of high-speed computing which makes it possible for in-memory processing to take place, turning RAM into the new disk [3], [17]."]} +{"7595137|15947359": ["Different valuable surveys such as [2], [3] and [4] clearly highlight the state of the art and the main research challenges for the development of WMSNs."]} +{"6109808|7988320": []} +{"6109808|17205659": ["A brief summary of these attacks is given in Table 1 [8]."]} +{"6109808|1230643": []} +{"21823056|2623404": ["The SDN-based system we propose mitigates this effect by reacting to congestion and opportunistically moving parts of the data stream to the LTE network.", "In the proposed framework, the edge-assisted SDN architecture dynamically selects the network resource to be used by the data stream, or specific portions of it, to trade-off licensed bandwidth usage and QoC.", "In this paper, we propose a dynamic network selection mechanism based on Software Defined Networks (SDN) [2] designed to provide QoC in Urban IoT scenarios, where IoT data streams coexist with other services on the same network resource.", "In this paper, we propose a dynamic network\nselection mechanism based on Software Defined Networks (SDN) [2] designed to provide QoC in Urban IoT scenarios, where IoT data streams coexist with other services on the same network resource."]} +{"21823056|3540699": ["264 encoder [18] and then transmits using Real Time Protocol (RTP) [19]."]} +{"21404231|4427557": ["15 km in open area with strong penetrability [8], [9]."]} +{"3350771|6583734": ["high-data-rate services (such as video service) and low-datarate services (such as meter reading service) [4]."]} +{"3350771|25929315": ["Researches generally set service arrival process as a homogeneous/compound Poisson process or an independent Bernoulli process [41] with identical distribution [40] and retransmission user number and packet retransmission number at queue head or channel state (busy/idle) in a certain time slot as state variables to obtain a stabilized design scheme [42] on the premise of completing the multi-channel S-ALOHA steady-state performance analysis [43], [44].", "In order to solve the overload of LTE access network when a large number of MTC terminals enter network simultaneously, researchers focused analyses on the load pressure of LTE RACH and its overload control mechanisms, such as classified controlled access, exclusive RACH resources, dynamic RACH resources allocation, exclusive backoff mechanism, time division access and active paging mechanism [19], [40]."]} +{"17283214|562065": []} +{"23556999|44461432": ["Na\u00efve, selective na\u00efve, semi-na\u00efve Bayes, and Bayes multi-nets are the proposed categories for classi\ufb01cation [48]."]} +{"23556999|3750204": ["Big data analytics processes consume considerable time to provide feedback and guidelines to users, whereas only a few tools [29] can process huge data sets within reasonable amount of processing time."]} +{"23556999|121289": ["The smart grid is a new generation of power grid in which managing and distributing electricity between suppliers and consumers is upgraded using two-way communication technologies and computing capabilities to improve reliability, safety, ef\ufb01ciency with real-time control, and monitoring [73], [74]."]} +{"49188253|3330461": ["Such a flexible transmission protocol alleviates the stringent design requirements usually placed on infrastructure devices and reduces transmission overheads caused by centralized coordination and management [4].", "However, the systems in [4]\u2013[6] and [8]\u2013[16] mostly assume that nodes are grouped into transmitter/receiver pairs."]} +{"33455989|13361214": ["4 specification is the most widely adopted point-to-point communication standard for low-rate wireless personal area networks [5].", "The physical layer is responsible for frequency selection, carrier frequency generation, signal detection, modulation, and signal encryption [5].", "According to [5], the WBAN design phase must consider several significant requirements influencing performance: energy-management policy, energy-efficient design, link reliability, robustness, scalability support, interoperability, selforganization, point-to-point reliability, security, andmobility support."]} +{"33455989|42497499": ["In the slotted ALOHA protocol, the nodes access the channel using predefined user priorities.", "These two types of connections can be useful to WBANs when there is a need for a sensor node to overlap other nodes, because of the urgency or importance of the information provided, but in ALOHA could have collisions and consequently being energy inefficient.", "At MAC level, it uses slotted ALOHA or CSMA/CA protocol, depending on the physical layer, and divides the channel into beacon periods.", "In a pure Additive Link On-Line Hawaii System (ALOHA), a node simply transmits whenever it has a packet to send.", "A slotted ALOHA [42] is also a timeslot method.", "6 standard defines a Medium Access Control (MAC) layer that supports several physical (PHY) layers and supports three security levels: unsecured communication level, authentication level, and authentication and encryption with a 256-bit preshared key [42].", "Slotted ALOHA [42] Beacon mode with superframe.", "In slotted ALOHA [42], time is divided into discrete timeslots.", "6 [42] Authentication, encryption, high priority traffic, and slotted channels.", "In the slotted ALOHA, the nodes access the channel using predefined user priorities."]} +{"33455989|30383344": []} +{"33455989|6332923": []} +{"33455989|12604503": ["CodeBlue [16] MoteTrack TinyADMR IEEE 802.", "However, Bluetooth has been designed for high data rate networks and large battery capacity, which does not match the WBAN requirements [16].", "One approach explores the use of reliable transport protocols, while the other explores the use of redundant transmissions and coding techniques to allow data to be reconstructed at the receiver [16].", "In the route discovery phase of TinyADMR, each node builds a table that contains an entry for the publisher, previous hop node, and the estimated cost for the best path from the publisher to the subscriber.", "The developers of CodeBlue use the TinyADMR [16] as a routing protocol to meet their defined requirements of delivering data reliably and efficiently to multiple receivers.", "CodeBlue [16] is referred to as a prototype healthcare Wireless Sensor Network that defines the architecture for hardware and a framework for software."]} +{"33455989|1230643": ["[11] mention three possible application layer protocols: the Sensor Management Protocol (SMP), Task Assignment and Data Advertisement Protocol (TADAP), and Sensor Query and Data Dissemination Protocol (SQDDP).", "TADAP permits users to send their interest to a sensor node, a subset of the nodes, or whole network.", "TADAP [11] Task assignment and data advertisement protocol.", "Akyildiz et al. [11] mention three possible application layer protocols: the Sensor Management Protocol (SMP), Task Assignment and Data Advertisement Protocol (TADAP), and Sensor Query and Data Dissemination Protocol (SQDDP).", "The communication between the sink and sensor nodes may be purely because of the UDP type protocols, because each sensor node has limited memory and energy [11].", "Protocols, such as IJA (that provides commands for data aggregation) and TADAP and SQDDP (in which queries are performed only to part of the network or to some relevant nodes), allow for a reduction of the bandwidth used and the consequent minimization of the energy consumed by the nodes.", "SQDDPprovides user applicationswith interfaces to issue queries, respond to queries, and collect incoming replies.", "[11] state that the networking layer of sensor networks is usually designed according to power efficiency, data-centric approach, data aggregation, and attribute-based addressing.", "In a wireless multihop self-organizing sensor network, these protocols serve two goals: the creation of the network infrastructure and the fairly and efficient sharing of communication resources between sensor nodes [11].", "Self-Organizing Medium Access Control for Sensornets (SMACS) [11] is a medium access control protocol to enable\nthe formation of random network topologies without the need to establish global synchronization among all the network nodes.", "Once SMACS creates links between adjacent nodes, SAR works with the SMACS to establish end-to-end connections.", "SQDDP [11] Sensor query and data dissemination protocol.", "It is responsible for themultiplexing of data streams, data frame detection,medium access, and error control [11], addressing, and packet encoding.", "Internally, a sensor node is made up of four basic components: a sensing unit, a processing unit, a transceiver unit, and a power unit [11].", "[11] is that routing in networking layers may be data centric.", "Self-Organizing Medium Access Control for Sensornets (SMACS) [11] is a medium access control protocol to enable the formation of random network topologies without the need to establish global synchronization among all the network nodes.", "The EAR is generally used in conjunction with SMACS."]} +{"3799811|1598350": []} +{"52119456|206491434": []} +{"52119456|6664074": []} +{"52119456|1230643": []} +{"52119456|20905429": []} +{"22323778|1229096": ["Renowned car manufacturers like, Bavarian Motor Works (BMW), Ford, General Motors (GM), Google/ Waymo, and Tesla are also trying to build autonomous cars [3]."]} +{"17515906|10837932": ["Environmental awareness in society regarding the carbon dioxide (CO2) emissions and its effects, has aspired the Information and Communication Technology (ICT) community to ensure low-power and greener operation of communication systems in order to minimize carbon footprint emissions [6], [7]."]} +{"47231503|10658846": []} +{"3493586|2623404": ["Although all these solutions adequately and automatically reconfigure the edge network, the static and manually configured core of the network remains the same [15].", "In SDN, research is gaining momentum to secure both the control and data plane [15]."]} +{"69523411|2623404": ["Meanwhile, the programmers need not worry about the details of underlying Physical-D, and can make full use of the programmability of hardware [24]."]} +{"69523411|3348390": ["In this process, the Physical-D\u2019s related information, including identity, location, ownership, functionality, data format, and service capacity, the Cyber-D\u2019s related information, including identifier, creation time, and log, and the related context information, including environments, and resource status, are all described into the Cyber-D model [26]."]} +{"6428110|206743327": []} +{"197402539|50776107": []} +{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]} +{"31851714|15170341": []} +{"4793692|469744": ["It can be used in many fields, such as gaming, education, machine operation, and medical treatments [5]."]} +{"1883158|17574321": []} +{"44224986|52059869": ["Virtualization helps to reduce network costs, while improving network performance and efficiency [341]."]} +{"44224986|7679009": []} +{"44224986|22582078": ["[101] have recently surveyed the range of opportunities and research challenges arising from the deployment of pure SDN networks in government, industry, as well as small and large-scale organizations.", "[101] do not conduct a detailed survey of hybrid SDN networks."]} +{"44224986|206578197": [", [96]\u2013[99], while virtual network embedding has been surveyed in [100]."]} +{"44224986|25911553": []} +{"44224986|6909107": []} +{"44224986|13372398": ["In a pure SDN network, the controller has complete topology knowledge, which can be readily exploited for energy efficient operation [248], [249]."]} +{"44224986|34643772": []} +{"44224986|18750590": []} +{"44224986|206578365": [", in mobile edge computing [78], [347]\u2013[350] and the Internet of Things [351]\u2013[353]."]} +{"44224986|6583734": ["Several surveys have covered the virtualization of SDN networks [93], [94] and SDN network functions [95]."]} +{"44224986|8650651": ["wireless networks [77]\u2013[83] optical networks [3], [84]\u2013[86], as well as the Internet of Things (IoT) [87], [88], cyberphysical systems [89], and smart cities [90], [91]."]} +{"44224986|11414835": ["In network virtualization, hardware and software network resources can be combined to form a single virtual network resource object or a single resource can be \u201csliced\u201d into multiple virtual resources [93], [94], [152]\u2013[158].", "Several surveys have covered the virtualization of SDN networks [93], [94] and SDN network functions [95].", "Flowvisor [338], Hyperflow [339], and the Optical Flowvisor [340] are prominent network virtualization approaches for pure SDN networks [93]."]} +{"44224986|154032": ["Green computing and networking has become a highly important research area in recent years [85], [330]\u2013[332]."]} +{"44224986|801245": []} +{"44224986|16768404": ["A semantic learning algorithm [240] is proposed to infer the legacy device configuration"]} +{"44224986|2535224": ["SDN has not only been used in wired network but also in wireless networks [97], [98], [342]\u2013[346]."]} +{"44224986|2623404": ["proposed for network management in pure SDN networks, see [50], [207]\u2013[209]."]} +{"44224986|10693567": []} +{"44224986|4269723": []} +{"44224986|10532321": []} +{"44224986|58783012": []} +{"44224986|11195746": ["This virtualization can be achieved by introducing virtual local area networks (VLANs) [119], [120] in the network."]} +{"19154496|3818445": ["The interested readers can find the description of advantages, drawbacks, and peculiarities of the two domains in [42], [43]."]} +{"20603166|6909107": ["This helps operators to increase the service quality through the effective mobility management in addition to the benefits of utilizing cloud-like resources at the edge [101]."]} +{"20603166|9436049": ["Although there are studies focus on this area [231], [232], server placement in the Metropolitan area need to be studied in detail and analyzed"]} +{"20603166|3767252": ["Because of the major differences with respect to the implementation and deployment of the mentioned proposals, the security mechanisms and underlying protocols will also vary [77].", "Therefore, MEC developments should intrinsically enable security and privacy for protecting the applications and user data at the edge server and provide an authentication system for the vehicles [25], [77], [99].", "On the other hand, any casual user such as a public place owner can deploy a Cloudlet or Fog server within a private environment [77]."]} +{"20603166|8650651": ["In the case of SDON, standardization of this interface may improve the operations to a greater level since an optical network may cover a large area consisting multiple domains [221].", "The role of the northbound interface in SDONs is still raw for the time being and research in this area is more challenging since there are multitude of interfaces that should be managed in physical and transport layers [221]."]} +{"20603166|11414835": ["virtualization are feasible for abstraction and isolation, it is observed that there is a lack of complete performance evaluation [219]."]} +{"20603166|2535224": ["ization in wireless and mobile networks is more challenging and complicated [224]."]} +{"20603166|2623404": ["Moreover, there are surveys on SDN [26]\u2013[30], Software Defined Wireless Networks (SDWN) [31], [32] and Network Functions Virtualization (NFV) [33], [34] which are the complementary technologies for improving the operations of edge servers."]} +{"20603166|10693567": ["[138], OpenFlow was firstly used for a campus network which is an inspiration to support campus-based scenarios for Edge Computing."]} +{"20603166|3042864": ["There are recent surveys on cloud computing [18], [19] and MCC [8], [20]\u2013[22].", "In [20], the mobile cloud is defined in two different ways: \u2022 Infrastructure based \u2022 Ad-hoc mobile cloud According to this classification, the infrastructure based model specifies the hardware infrastructure of cloud datacenters serving to mobile users."]} +{"20603166|10532321": ["to the data plane [135]."]} +{"15016885|3348390": ["Watson and Sasse [8] presented the importance of context-awareness in the IoT and introduced QoC as a quality metric.", "and Sasse [8] presented the importance of context-awareness in the IoT and introduced QoC as a quality metric.", "Note that the metaphysical metrics in the information layer can also be interpreted as the QoC and QoI proposed in previous studies [8], [10].", "[8], acquiring context information from sensor data is a key in IoT applications."]} +{"21122110|64404": []} +{"58991122|512561": []} +{"52541254|24222234": [", for the remote perception of object surface properties [20]."]} +{"52541254|1906759": ["This technique has proven to achieve high efficiency and better network utilization [144], compared to other multiplexing schemes such as neural networks [145] and Round Robin approaches [146]."]} +{"52541254|7158350": ["This technique has proven to achieve high efficiency and better network utilization [144], compared to other multiplexing schemes such as neural networks [145] and Round Robin approaches [146]."]} +{"53211739|2295142": ["In addition, multipath routing can provide reliable data transmission, QoS guarantee and even load distribution [6]."]} +{"53211739|41907762": ["In WMSN, QoS routing is an essential component that offers required QoS level for heterogeneous data traffic and is an active field of research over couple of years [4], [5].", "Several surveys on QoS routing schemes in WMSN have been conducted in recent years [4], [5], [8]."]} +{"4625011|3579945": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|13991708": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|4719202": ["Note that picking items represents from 55 % to 65 % of the total cost of warehousing operations [75], which are still mostly carried out through a pick-by-paper approach."]} +{"4625011|469744": ["This definition is broader than the one given by other researchers [3], who disregarded photo-based augmentations, which have proved to be effective in industrial environments."]} +{"9254687|5404353": ["Recently adoption of cross layer model [17], [18] in multimedia communications in IoTs mainly focused on QoS parameters."]} +{"51982660|3348390": ["THE INTERNET of Things (IoT) is a term describing a system of connected people, devices, and services [1]."]} +{"17175894|1230643": [", micro-electromechanical systems (MEMS)[1]."]} +{"21707192|1598350": ["Moreover, a context-aware system is a systemwhich provides pertinent information and/or services to the user, using context, while pertinency depends on user\u2019s task [65]\u2013[67].", "Context is any information that can be used to typify the situation of an entity, in which an entity is an object, place or person, that is considered pertinent to the interaction between a user and an application, including the user and applications themselves [65]\u2013[67]."]} +{"21707192|3348390": ["Moreover, a context-aware system is a systemwhich provides pertinent information and/or services to the user, using context, while pertinency depends on user\u2019s task [65]\u2013[67].", "Context is any information that can be used to typify the situation of an entity, in which an entity is an object, place or person, that is considered pertinent to the interaction between a user and an application, including the user and applications themselves [65]\u2013[67]."]} +{"53430151|10329355": ["The congestion problem also attracts enormous attention [45], [46], such as from Nellore and Hancke [47], who surveyed current urban, traffic management schemes for priority-based signaling to reduce the congestion problem.", "The congestion problem also attracts enormous attention [45], [46], such as from Nellore and Hancke [47],"]} +{"24498127|64404": []} +{"26186328|7278743": []} +{"122329170|53018231": ["Another thorough literature survey indicating various emerging applications of DL in communication networks is presented in [96]; where the highlighted applications are: dynamic spectrum access, joint user association, data caching and of\ufb02oading, security, connection preservation, traf\ufb01c routing,\u2026"]} +{"122329170|51929263": ["A survey on deep transfer learning methods has been presented in [104], where the deep transfer learning methods have been classi\ufb01ed into instance, mapping, network-, and adversarial-based transfer learning categories."]} +{"122329170|49411802": ["Furthermore, the recent article [157] analyzed the existing works on quantum games from three perspectives, namely, co-authorship, co-occurrence and co-citation, and also reviewed main quantum game models and applications."]} +{"122329170|52059869": ["To enable these and other services, the 5G network infrastructure is based on the revolutionary novel concepts of Network Function Virtualization (NFV) [51] and end-to-end Network Slicing (NS) [52]."]} +{"122329170|6197039": ["In order to secure the 6G communication links, physical layer security schemes [71] may be deployed in tandem with conventional cryptography schemes."]} +{"122329170|10235514": ["Further investigations and field trials are in progress [45] and the 5G standardization is expected to conclude with 3GPP Release 16 in the year 2020."]} +{"122329170|10979806": ["To this end the design efforts for 5G networks have considered energy-efficient approaches to network deployment and resource allocation, including new technologies such as M-MIMO and ultra-dense heterogeneous networks [62]."]} +{"122329170|19938676": ["Previous works have separately characterized ML, QC, QML, and communication networks, see e.g., [1], [28], [29], [39]\u2013[43], and [2], [3], [22], respectively."]} +{"122329170|4122595": ["In this regard, several survey papers including [107], [108] exist, which discuss various aspects of intelligent cognitive radio wireless networks."]} +{"122329170|6111895": ["Description of radio propagation channels characteristics for molecular communications is not well established in the literature [89]; for such communica-"]} +{"27408709|3348390": []} +{"52004810|64404": ["While, high efficiency video coding standard (HEVC) is the newest video compression standard that was developed by Joint Collaborative Team on Video Coding [5] in 2012."]} +{"52004810|8070893": ["264/AVC bitstream is first fully decoded into pixel domain, and then re-encoded into the new HEVC bitstream [7], [8]."]} +{"52004810|3540699": ["264/AVC is one of the most popular video compression standards, which was jointly developed by Joint Video Team [3], [4], and successfully applied in a wide range of platform architectures and application environments.", "H.264/AVC is one of the most popular video compression standards, which was jointly developed by Joint Video Team [3], [4], and successfully applied in a wide range of platform architectures and application environments."]} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} +{"32711727|2535224": []} +{"21241630|1230643": []} +{"67866940|21705502": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|206578224": ["Also, to better cope with lowlatency IoT applications, the Edge computing paradigm is boosting the deployment of micro data centers at the edge of the network [40].", "In this vein, the Edge computing paradigm [40] is rapidly gaining momentum, promoting distributed small-scale cloud environments deployed at the edge of the network to execute applications near to the IoT devices."]} +{"67866940|24110634": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [102] [117] [118] [119]."]} +{"67866940|34643772": ["Different works have started to investigate and address some of these challenges [25], [26].", "In [23]\u2013[25], SDN-based security solutions are proposed to enhance network protection."]} +{"67866940|9495329": ["The reader interested in aspects related to the integration of SDN networking with IoT systems can refer to these cited surveys [99], [114]\u2013[116]."]} +{"67866940|4427557": [", Narrowband IoT) [44]."]} +{"67866940|2332366": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|26368310": ["Several solutions are available to enable resilience and availability for cloud-based deployment [154]."]} +{"67866940|3767252": ["Indeed, accounting for the exponential increase of micro edge data centers, verification of their trustworthiness can be highly challenging [191]."]} +{"67866940|2829149": []} +{"67866940|12029139": ["Therefore, RFID tags present extremely low costs and can be battery-free by leveraging electromagnetic energy harvesting [33]."]} +{"67866940|485843": ["The most promising usage concerns smart home automation [55], Industrial Internet [36], intelligent transportation systems [56], smart energy [57], enhanced health-care services [58], and smart cities [59]."]} +{"67866940|595093": ["Other surveys deeply discuss security features for precise IoT application domains, such as smart grids [78], [79], vehicular networking [80], and Industrial Internet [81], [82]."]} +{"67866940|1940388": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|2357830": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17205659": ["Furthermore, remarkable efforts have been carried out over the past years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15].", "Furthermore, remarkable efforts have been carried out over the\npast years for securing Wireless Sensors Networks [11]\u2013[13] and Radio Frequency Identification (RFID) systems [14], [15]."]} +{"67866940|17869045": ["In the following, we focus on the Authentication, Authorization, and Accounting (AAA) framework, which is dedicated for intelligent access control of resources and security policy enforcement [85]."]} +{"67866940|1230643": ["and represent a key enabler for IoT adoption [34]."]} +{"195810989|7329149": ["The emerging internet of things (IoT) paradigm envisions a ubiquitous network of smart objects interconnected with one another using the Internet as a global platform [1].", "The current Internet will play a key role in providing a global backbone for the interconnection of these objects across a varied range of communication technologies, capabilities, and requirements [1]."]} diff --git a/edge/graph_210696203.jsonl b/edge/graph_210696203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a00d79fabfb2bf36f0b08ffde1b4728e26c9706 --- /dev/null +++ b/edge/graph_210696203.jsonl @@ -0,0 +1,4 @@ +{"19805741|12098072": ["It should be emphasized that all of the PM machines mentioned have magnets located on the rotor, and they are referred to as \u201crotor-PM machines\u201d in this paper, which predominate in the industry applications due to outstanding advantages [1], [2]."]} +{"10275876|12098072": []} +{"199509240|49410639": ["Previous review papers focus on either the control [20] or design of CSRMs [21]."]} +{"52927750|12098072": ["In recent years, the development trend is to develop different types of commutatorless machines [3], especially the class of doubly-salient machines and the class of vernier machines."]} diff --git a/edge/graph_210696583.jsonl b/edge/graph_210696583.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df0b384fde3bd6c1be99e5e65df0320b53478cd6 --- /dev/null +++ b/edge/graph_210696583.jsonl @@ -0,0 +1,15 @@ +{"11252699|11990480": ["These methods are very well described in [32]."]} +{"15411779|3330313": ["While outlier detection (see [12] for a survey) identi\ufb01es dirty points, data repairing further modi\ufb01es the points for correction."]} +{"195259481|386036": []} +{"3177872|386036": []} +{"6927139|18986679": ["Within the time series literature, which spans simplification and reduction [26, 30, 38, 54, 58, 65], information retrieval [32], and data mining [12, 29, 47, 56], visualization plays an important role in analyzing and understanding time series data [28]."]} +{"57394512|386036": ["To further validate the effectiveness of applying imputation in real applications, we consider the accuracy of record matching application [19]."]} +{"38514319|3102110": []} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"113499121|3330313": ["\u2026nor MCD uniformly performs optimally in outlier detection capability; both MVE and convex peeling can only be applied to small data sets because they suffer the \u201cCurse of Dimensionality\u201d, where the boundaries blur as the number of dimensions grows (Barnett and Lewis 1984, Hodge and Austin 2004).", "For example, Hodge and Austin (2004) from computer science, and Singh (1996) and Daszykowski et\u00a0al."]} +{"14542832|10500613": ["Data management research has supplied a variety of tools to deal with errors originating from integrating data from multiple sources [1,5,47,49], identifying data items that refer to the same entity [33,37], resolving conflicts [22, 58, 59], and providing language extensions for cleaning [28]."]} +{"7219108|7020971": ["Convergence Conditions and Properties The convergence rates of SGD are also well analyzed [7,10,37]."]} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"53114537|17683338": ["Some works are achieving good results in fields such as energy efficiency using WSN [5], control of operations [17], optimal routing in WSN [33], and some other applications such as social good [28]."]} +{"2492255|10500613": [", [23] for a survey) in the context of schema integration."]} diff --git a/edge/graph_210697086.jsonl b/edge/graph_210697086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..09b4fa6cce173c0c2b3f8296a26897d998f0eda0 --- /dev/null +++ b/edge/graph_210697086.jsonl @@ -0,0 +1 @@ +{"61514461|6288895": []} diff --git a/edge/graph_210698043.jsonl b/edge/graph_210698043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d5678af18a9aa6d6c22d04933672b0bf4b8fb1e --- /dev/null +++ b/edge/graph_210698043.jsonl @@ -0,0 +1,2 @@ +{"2579251|20905429": ["These systems have received a lot of attention and many studies, in a broad application range, are found in literature, such as (but not limited to): integrated radar for firefighters [3], search and rescue systems in lifejackets [4], and wearable biosensor systems [5]."]} +{"41966876|700123": []} diff --git a/edge/graph_210698925.jsonl b/edge/graph_210698925.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16fe12dd25f2018d197b0fabcc4883ea7db084cc --- /dev/null +++ b/edge/graph_210698925.jsonl @@ -0,0 +1,13 @@ +{"116671656|16049411": []} +{"116671656|17934515": []} +{"21721984|7252389": ["These data sets are for pmedian problem (Hamacher and Drezner 2002; Mladenovi\u0107 et al. 2007).", "These data sets are for p-median problem (Hamacher and Drezner 2002; Mladenovi\u00b4c et al. 2007)."]} +{"108360919|205286236": []} +{"108360919|2373140": []} +{"108360919|4474193": ["It should also be noted that the ideas related to Worst Case Optimization [20] or Robust Optimization [21] have been utilized within metaheuristic approach only to a small degree [22, 23]."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"15482526|353822": []} +{"12473555|3053192": []} +{"12473555|2373140": []} +{"23711285|2373140": ["Such problems are often seen as dynamic or real-time vehicle routing problems since emergencies occur in the course of time at unforeseeable locations, see e.g., the surveys of Ghiani et al. (2003) and Pillac et al. (2013)."]} +{"1708582|17464562": []} diff --git a/edge/graph_210700206.jsonl b/edge/graph_210700206.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..216bf12bf76db5dd07ffcb6741ed6675cf5fedc3 --- /dev/null +++ b/edge/graph_210700206.jsonl @@ -0,0 +1,6 @@ +{"11248506|9270553": []} +{"13004362|10290908": []} +{"18953744|10290908": ["For a detailed explanation of the spike sorting steps, the reader is referred to other review articles (Lewicki, 1998; Einevoll et al., 2012a)."]} +{"32467225|9270553": []} +{"136184948|10290908": []} +{"19362788|10290908": []} diff --git a/edge/graph_210701552.jsonl b/edge/graph_210701552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a998daddf6525c225d20a870da4ee591c691952f --- /dev/null +++ b/edge/graph_210701552.jsonl @@ -0,0 +1,5 @@ +{"374298|206743327": ["Database optimizations on scale-up architectures: Scaleup architectures have brought many research challenges and opportunities for in-memory data management, as outlined in recent surveys [37], [38]."]} +{"14624311|206743327": ["For design and optimization of distributed and in-memory data processing, please refer to [26, 42]."]} +{"4504838|9318802": ["First, some existing studies [11], [12] mainly compare query keywords with titles/categories/tags of the audio streams for", "audio search studies are based on one of the two mainstream methods: sound based search and text based search [12]."]} +{"6407934|14140377": ["Temporal query languages [35] are based on a rich model of history, and with their many special-purpose language constructs they dramatically subsume CQL in terms of expressiveness."]} +{"6922016|9176080": ["Furthermore, in each video frame, a secret image is hidden using least significant bit which is a steganographic transform whereby secret information is written into least significant bits of image pixels, thus causing hard-to-perceive degradations in visual quality of cover image (the interested reader is referred to [15] for a survey of this and other image steganographic methods)."]} diff --git a/edge/graph_210702818.jsonl b/edge/graph_210702818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93bfb34a4a413f3a09d4dc1713bf0cb6be6284e6 --- /dev/null +++ b/edge/graph_210702818.jsonl @@ -0,0 +1,2 @@ +{"66910747|3932089": ["Some of these emerging memories are already in early stage production, such as FeRAM, MRAM and PCM, while others are still too immature to be considered for mass fabrication, such as DNA and quantum dot [8]."]} +{"3110454|13034818": ["It has shown that the write power per bit of STT-MRAM is one order of magnitude higher than SRAM.", "With continuous technology scaling, the increasing leakage power and reliability concerns have become two critical challenges for conventional CMOS-based memories, such as SRAM, DRAM and Flash.", "We compare the performance in terms of area, read latency, read power, write latency and write power among SRAM, 1T1MTJ (TS) cell, 2T2MTJ cell (DS), 3T3MTJ cell cluster (PDS) as well as 1T3MTJ cell cluster (PDS), as shown in Fig.", "In addition to the nonvolatility like Flash, STT-MRAM provides high integration density close to DRAM, fast access speed and practically unlimited endurance comparable to SRAM [4-6]."]} diff --git a/edge/graph_210708291.jsonl b/edge/graph_210708291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1598521dd347189f841cdf96f940d8a4ad66b886 --- /dev/null +++ b/edge/graph_210708291.jsonl @@ -0,0 +1,41 @@ +{"195884028|4427557": ["Low Power Wide Area Network (LPWAN) technologies [1] [2] such as LoRaWAN, SigFox, or Weightless complement the established short range communication systems such as Wifi, ZigBee or Bluetooth due to their combination of long range and low energy consumption and therefore also become interesting for industrial applications with higher demands on short and deterministic latency [3], although these technologies basically are not designed for time-critical data transfers."]} +{"29108654|21386749": ["Moreover, the interaction between the real world and its digital counterpart using secure and real-time technologies may lead to the solution of many issues related to smart cities, pollution monitoring, transportation, remote health care and more [1]-[3]."]} +{"21404231|4427557": ["15 km in open area with strong penetrability [8], [9]."]} +{"3260095|1230643": ["tiple sensor nodes observing a physical phenomenon [1]."]} +{"6021747|5630105": ["A literature review of these scheduling techniques can be found in [91]."]} +{"6021747|37052879": ["paper [25], published in 2010, briefly introduced the differences of technical features among WIA-PA, ISA100."]} +{"6021747|1503157": ["During the past decade, WSNs had found their way into a wide variety of applications [3], such as health monitoring of civil infrastructures [4], personal health monitoring [5], smart grid [6], agriculture [7], habitat monitoring [8], and industrial automation [9]."]} +{"182791091|25746527": ["Two major issues of using wireless in control systems are communication delays and packet dropouts [20]."]} +{"25746527|5766836": ["In contrast to previous surveys of WSN testbeds [228], [229], [230], we introduce some of our representative WNCS testbeds."]} +{"25746527|5660618": ["discard disordered messages [48], [93], [94].", "Some surveys present controller design for NCSs [48], [57].", "5) Estimator Design: Due to network uncertainties, plant state estimation is a crucial and significant research field of NCSs [22], [48].", "Hence, controller\u2013actuator delays are more critical than the sensor\u2013 controller delays [22], [48].", "3 is also called two-channel feedback NCS [48].", "3 depicts the generalized closed-loop diagram of WNCS where multiple plants are remotely controlled over a wireless network [48]."]} +{"25746527|6275330": [", heat, ventilation and air-conditioning control systems [99]."]} +{"41685384|7350786": []} +{"206898075|5630105": []} +{"2020260|1230643": ["Several mechanisms to conserve energy in protocols and applications have been developed in the context of wireless (sensor) networks [28]\u2013[30]."]} +{"2020260|7278743": ["The computation of any upper bounds requires knowledge of the upper bounds for the medium access delay."]} +{"52901992|4427557": ["Despite this simplistic use-model, the complexity inherited from the underlying LTE network is noticeable in the \ufb01gure, especially when compared with random access technologies such as LoRaWAN or SigFox (see [21], [22], for example)."]} +{"17654493|37052879": ["WIP-PA also relies on a security manager to manage the security keys, authentication of field and other (gateway) devices [66].", "Three types of frequency hopping mechanisms are used: Adaptive Frequency Switch, Adaptive Frequency Hopping, and Timeslot hopping [66]."]} +{"17654493|41998167": ["QoS-Aware Protocols aim at providing application specific QoS [49] and network QoS [99]."]} +{"17654493|17960632": ["Fixed Assignment Protocols .", "Real-Time Protocols [28], [29], [94] do fall in the class of QoS-Aware protocols, but are speci\ufb01ed differently since they have now become a separate branch of research.", "QoS-Aware Protocols aim at providing application speci\ufb01c QoS [49] and network QoS [99].", "Real-Time Protocols [28], [29], [94] do fall in", "Energy-ef\ufb01cient Protocols [96] have as their main objective to prolong network life-time and support as much data communication as possible within its life-time.", "Thus main classes of MAC protocols can be de\ufb01ned as Energy-Ef\ufb01cient Proto-cols , QoS-Aware Protocols , and Real-Time Protocols .", "Demand Assignment Protocols .", "application-oriented MAC protocols [28], [29].", "Random Access Protocols .", "Protocols should be event-based both for the transport and routing functions.", "Hybrid Protocols ."]} +{"17654493|8618569": ["On the other end, we have surveys on IWSN [30], [31], [32] focusing on challenges, design principles, technical approaches to build IWSN, their requirements, WSN standards, and QoS."]} +{"17654493|7889189": ["For comprehensive information on security issues and solutions we refer to [73], [74], [75], [76]."]} +{"17654493|1940388": ["For comprehensive information on security issues and solutions we refer to [73], [74], [75], [76]."]} +{"17654493|270804": ["Different protocols use different methods to detect congestion and can use various parameters listed in [19], [27].", "Transport protocols in WSNs are responsible for congestion control and loss recovery [19], with the aim of providing end-to-end packet delivery and hence increase reliability.", "There are other surveys which focus on specific layers or functions like Medium Access Control(MAC) [21], [22], [23], [24], routing [18], [25], [26], and transport functions [19], [27].", "The hop-by-hop method is considered to be more suitable for WSNs than the end-to-end method [19], [134], [135].", "The hop-by-hop retransmission method used in the transport function is preferred over the end-to-end method for WSN in several approaches [19], [134], [135]."]} +{"17654493|17205659": ["For comprehensive information on security issues and solutions we refer to [73], [74],"]} +{"17654493|1236072": ["Other functions like the routing function can considerably affect the energy efficiency [18], latency, and reliability.", "Routing protocols can be classified based on network structure, functions provided, QoS provided and other operational requirements [18], [25].", "There are many design requirements [18], [25] that can be used to select a routing protocol.", "There are other surveys which focus on specific layers or functions like Medium Access Control(MAC) [21], [22], [23], [24], routing [18], [25], [26], and transport functions [19], [27].", "Over the years, various routing protocols have been proposed [26], [18], [25] to satisfy the QoS requirements.", "[18] is more energy efficient than flat-based routing, the results are size dependent."]} +{"17654493|1230643": ["Various other applications for which WSN is used can be found in [3], [4].", "A wide range of applications are served by these systems [4], [43], [44] including environmental monitoring, industrial monitoring, traffic monitoring and also military applications.", "There exists already various surveys on WSN [20], [4] that describe protocols proposed for various layers, key challenges in WSN, hardware, test-beds used, and applications for these WSN.", "Technological advances in the area of wireless communication, sensors, and batteries have opened up many new prospects for applications [3], [4] and research."]} +{"86703740|25746527": ["A recent research trend suggests to jointly design these two entities [55]\u2013[57], with the aim of relaxing the communication requirements while meeting the same control performance or, alternatively, to improve the control performance while maintaining the same requirements to wireless communication.", "Moreover, the design of the control application can signi\ufb01-cantly relax or tighten the required level of communication reliability [56], [57]."]} +{"86703740|49267479": ["Several researchers are currently working on coding schemes that can achieve reliable transmission at the maximum possible rate under the constraint of a \ufb01nite block length [69]\u2013[72].", "Several studies on coding schemes for short packets have been published [72], especially within the 5G URLLC community [87], indicating low-density parity-check codes with progressive edge growth decoding [88] and polar codes with successive cancellation list [89] as promising candidates\u2026", "However, the current version of the experimental demonstrator employs simple CC and RS schemes, which are a good choice for short packets [69], [72], but are still far from approaching the channel capacity."]} +{"18878090|1230643": ["With reference to factory automation systems, however, the low energy efficiency of current IEEE 802.11 technology makes its use recommendable only for applications relying on the power supply line while requiring a certain degree of mobility (moving platforms, robots).", "Indeed, sensor networks, which represent an important field of application of ad hoc networks are envisaged to be profitably used in industrial environments [3]."]} +{"51716069|3450189": ["The BLE survey in [4] presents a general overview of these solutions and analyzes several approaches to implement a BLE Mesh solution.", "As such, it is relevant to find out how this new standard operates, tackles the other open issues identified in [4] and handles the disadvantages of using the advertising capability of BLE as a basis for communication.", "For both approaches, several implementations already exist [4], with each approach having its own advantages and disadvantages.", "Consequently, several attempts were made to add meshing capabilities to BLE, resulting in different techniques, which are discussed in detail in [4]."]} +{"201709945|2527194": []} +{"201709945|4427557": []} +{"53711791|21683864": ["[12] Medical \u2022 \u2022 [13] Medical \u2022 \u2022 \u2022 [14] Agriculture [15] Agriculture \u2022 [16] Agriculture \u2022 [17] Agriculture \u2022 [18] Sensor Networks \u2022 \u2022 [19] Sensor Networks \u2022 [20] Traffic Monitoring \u2022 \u2022 [23] Localization \u2022 [26] Tele-metering \u2022 \u2022 [28] Smart Grid [24] Smart City \u2022 \u2022", "LoRaWAN has been demonstrated to be useful for Internet of Medical Things (IoMT) too [12]."]} +{"4620692|44461432": ["Meanwhile, new information and communication technologies (ICTs), such as the industrial cloud [76], big data [19, 93], wireless cloud networks [75, 104], industrial internet of things [21] and high performance embedded system [74] have been introduced into the manufacturing industry to meet the demands for higher productivity, green production, higher market share and flexibility."]} +{"4620692|1598350": ["Meanwhile, received signals experience path loss and reflection interference based on the characteristics of wireless-wave propagation, resulting in wireless nodes with limited transmission distance [60].", "Although there are many surveys and reviews on IWSNs or IWNs, such as [35, 51, 60], few & Jiafu Wan jiafuwan_76@163.", "and scalability; however it introduces adverse risks for security and privacy [18, 60].", "mobility, which has made mobile wireless networks popular in consumer electronics [18, 35, 51, 60, 81]."]} +{"4620692|206901977": ["Power-ef\ufb01ciency In recent years, many research efforts have focused on power-ef\ufb01ciency within application speci\ufb01cations [66]."]} +{"4620692|5574189": ["IWNs are not an exception; many studies have divided the IWNs into a physical, medium access control (MAC), routing, transporting and application layer [47, 49, 51]."]} +{"4620692|9923206": ["However, due to the particular features of the industrial environment and since Industry 4.0 industrial wireless networks are different from traditional WSNs [17, 37], there are some new constraints and requirements for IWNs."]} +{"4620692|37052879": ["IWNs are not an exception; many studies have divided the IWNs into a physical, medium access control (MAC), routing, transporting and application layer [47, 49, 51]."]} +{"4620692|9494512": []} +{"16344|4427557": ["These types of requirements are hard to ful\ufb01ll using traditional Machine to Machine technologies such as cellular or WPAN [2].", "2768498 technologies such as cellular or WPAN [2]."]} diff --git a/edge/graph_210712724.jsonl b/edge/graph_210712724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210714234.jsonl b/edge/graph_210714234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a1745a8bf082ca3639b6528922e7e47a666766d --- /dev/null +++ b/edge/graph_210714234.jsonl @@ -0,0 +1,11 @@ +{"36997628|7842253": []} +{"57755899|17474643": ["Assis and Bittencourt [2], Grozev and Buyya [4], Toosi et al. [1] provide an excellent survey on various cloud federation models and architectures.", "So multiple cloud providers have to come together and form a temporary coalition or a federation to serve such requests [1]\u2013[4].", "Assis and Bittencourt [2], Grozev and Buyya [4], Toosi et al.", "In this section, we introduce the existing taxonomy of InterCloud architectures and brokering mechanisms [4]; and show how the proposed Multi-Cloud marketplace structure extends that taxonomy."]} +{"159043412|3300488": []} +{"159043412|15209496": []} +{"16360674|816774": []} +{"36482639|8530790": ["nament selection make scaling information negligible (Fonseca and Fleming, 1994; Fonseca and Fleming, 1995d)."]} +{"28800568|21930333": ["For example, an edge cloud data center in MEC only serves the users in its coverage area [54]."]} +{"5791328|15209496": ["Several possible formulations can be proposed for modeling each objective function, totalizing at least 80 different objective function formulations identified in the specialized literature [20, 21]."]} +{"34251444|207228303": ["VM reassignment has been studied for different types of data centres in the literature [30]."]} +{"28448424|33492114": ["This section summarizes some of the previous efforts on surveying VM placement and migration which have been found in the literature, namely [62, 73, 74, 12, 75, 8, 76, 77, 78, 79].", "Usmani and Singh (2016) [76] X XX X X X X X X X X"]} +{"28448424|207228303": ["This section summarizes some of the previous efforts on surveying VM placement and migration which have been found in the literature, namely [62, 73, 74, 12, 75, 8, 76, 77, 78, 79].", "The survey in [74] states that most of the works only deals with two PM states, namely on and sleep, instead of taking advantage of the additional states off and hibernated.", "\u2026u lin g / V M m igration ord er\n(shu ffl e)\nAhmad et al. (2015) [62] X X X X X X X X X XX X Masdari et al. (2016) [73] X X XX X X X XX X XXX XX XX Mann (2015) [74] XX XX X X XX X X XXX XX XX Leelipushpam and Sharmila (2013) [12] X X X X X X X Acharya et al. (2013) [75] X X X X X X X X XX X\u2026", "Mann (2015) [74] XX XX X X XX X X XXX XX XX Leelipushpam and Sharmila (2013) [12] X X X X X X X"]} diff --git a/edge/graph_210815293.jsonl b/edge/graph_210815293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d71542548c80a51ef53fd443ed7cd39d8f4dce54 --- /dev/null +++ b/edge/graph_210815293.jsonl @@ -0,0 +1,23 @@ +{"9685893|9045232": ["ift for both images) when compared to manually selected eye centres. Those readers who are interested in automatical face and facial features detection methods can \ufb01nd an overview of such methods in (Yang et al., 2002) and (Perlibakas, 2003). In real life situations the accuracy of face recognition is also a\ufb00ected by many other factors like aging and manual change of appearance (hairstyle, makeup), image input (cam", "Those readers who are interested in automatical face and facial features detection methods can find an overview of such methods in (Yang et al., 2002) and (Perlibakas, 2003)."]} +{"3952088|5171123": ["Recently, the image partitioning based algorithms become popular for solving the SSPP problem.", "In this section, we test the performance of the competing algorithms on all the above-mentioned databases with a Single training Sample Per Person (SSPP) [2,44] (which is an extreme case of the SSS problem that severely challenges conventional face recognition algorithms).", "Note that since Fisherface [16] (based on LDA) cannot deal with the SSPP problem, its performance is not reported in this section.", "For instance, Su et al. [45] proposed an Adaptive Generic Learning (AGL) algorithm, which is specially designed for solving the SSPP problem by using a generic training set.", "In this paper, we focus on the SSS problem, which is one of the most challenging issues in face recognition [2,8].", "In Section 4.5, we will discuss the case that the value of t is set to 1 for the SSPP problem in particular.", "In particular, in many real-world applications, it often suffers from the small sample size (SSS) problem [2] since the training samples of each subject are very few, which can severely affect the performance of most face recognition algorithms especially when the dimension of facial feature space is high.", "We have evaluated MS-CFB under different conditions, including variations in illumination, facial expression, and pose, as well as dealing with the SSPP problem.", "Table 5 shows the average recognition accuracies obtained by the competing algorithms in dealing with the SSPP problem."]} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"52193324|14543002": []} +{"55509771|5664472": ["There are two methods of human activity recognition: human activity recognition based on visual images [6, 7] and based on wearable sensors [8].", "In human action data features, we have to deal with a variance problem as explained in the survey paper [6, 7, 15]."]} +{"242645|9045232": ["In general, the face verification task is more difficult than face identification because a global threshold is required to make a decision."]} +{"22180385|13128481": ["Gender of a person can be classified from biology or physiology of human body [1]."]} +{"7000966|5171123": ["This is generally called the small sample size (SSS) problem [1].", "To overcome such a problem, various methods have been proposed over the years [1], [4], [5], [6], [7]."]} +{"7000966|36705207": ["A known fact in a face recognition task is that the differences of the face images of the same person (intra-class) can be much bigger than differences of the face images of different subjects (inter-class) due to different poses and illumination conditions [2], [3]."]} +{"53278659|2323881": ["The weakness of this method is the loss of significant texture features which can be further useful for classification [13]."]} +{"123534075|9045232": ["The feature pool is constructed as follows: (1) setting six kinds of number of histogram bin: 3, 6, 9, 12, 15, 18, (2) the entire face is partitioned in the following 15 kinds of ways: 1 1, 1 2, 2 2, 1 3, 2 3, 3 3, 2 4, 1 1, 3 4, 2 5, 3 5, 4 5, 5 5, 8 10, 10 10.", "Thus the key problem in face detection is the classification between face and non-face, in which the characteristics has the following two: (1) the number of non-face is far greater than that of face and the distribution of non-face pattern is very widespread, so it is hard to classify face and non-face by one model; (2) the computing capacity is large and a high demand for real time is required.", "Among the above, (2), (3), and (4) may be obtained in training; (1) and (5) need be determined in advance and (4) can be manually adjusted.", "According to this standard, we construct the classifier of every stage by taking the following measures: (1) selecting different features from the pool introduced in 2; (2) adjusting the parameters of weak classifier; (3) stacking the multiple classifier; (4) adding the misclassified samples into training set for training the classifier of next stage.", "Their success is largely due to the following: (1) extracting Haar feature and introducing integral map to speed up the calculation; (2) the cascade classifier was used to remove most of the background regions in the early stages; (3) bootstrap was used to generate a effective classifier: misclassified samples were focused in the later and a small part of the key features were selected from a large feature set.", "Measures (1), (2), and (3) can ensure high DR, and (4) and (5) can avoid the over fitting.", "However, this approach has two weaknesses: (1) discriminatory ability is not strong for Haar features only reflect brightness differences in different regions;", "To construct the classifier of the various stages we take the following measures: (1) increasing the penalty factor(23) of positive cases in training to improve the DR; (2) adjusting the DR and false detection by changing the threshold, that is, moving the position of SVM hyperplane; (3) parts of the classifiers were weighted 190 Journal of Algorithms & Computational Technology 10(3)"]} +{"38486528|18487363": ["As in many other papers [19, 13, 43], our confidence measure is based on the estimation of the a posterior class probability.", "This technique is mainly used in the automatic speech processing field [19, 43] and mostly based on the a posterior class probability."]} +{"10496400|192934": ["[4] H. Yu and J. Yang, \u201cA direct LDA algorithm for high-dimensional data with application to face recognition,\u201d Pattern Recognit., vol.34, no.12, pp.2067\u20132070, 2001.", "In the test, the numbers of selected frequency bands are 22, 25, and 21 for DCTLDA, DCT-GDA, and DCT-KDCV, respectively.", "In our previous work, we combined the DCT and linear discriminant techniques and presented a DCT-LDA face recognition method which outperforms some conventional linear discriminant methods [6].", "In this paper, we develop DCT-LDA and propose a nonlinear DCT discriminant feature extraction approach for face recognition.", "We compare the proposed approach with five representative discriminant methods which include the DCTLDA method [6], the generalized discriminant analysis (GDA) method [7], the DCT-GDA method, the DCT-KDCV method, and the Gabor-GDA method [9].", "To date, many linear discriminant methods have been put forward, such as linear discriminant analysis (LDA) [3], direct LDA (DLDA) [4], and discriminative common vector (DCV) [5].", "The proposed nonlinear DCT discriminant approach is obviously superior to DCT-LDA, and it can extract more effective nonlinear discriminant features than the two representative methods of GDA and KDCV."]} +{"61782886|359842": []} +{"27825813|2473564": []} +{"27825813|2323881": []} +{"27825813|11179184": []} +{"27825813|2301292": []} +{"27825813|16620699": []} +{"27825813|6028805": []} +{"1318470|2323881": ["However, it remains a challenging task for multimedia applications, as observed in recent works [1], [2].", "An extensive and systematic comparison among existing local descriptors for face recognition can be found in [6]; and a detailed summarization on local descriptor-based face representations can be found in a recent survey [1].", "The distorted facial texture is adverse to face recognition, as argued in our previous work [1]."]} +{"6602493|5171123": ["More importantly, we take the challenging and practical setup that only one frontal images present in the gallery set for recognition [4]."]} diff --git a/edge/graph_210826197.jsonl b/edge/graph_210826197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..140da82cd2ecaeaaa635d9534e7737497c351a72 --- /dev/null +++ b/edge/graph_210826197.jsonl @@ -0,0 +1,26 @@ +{"57190996|206901977": ["Data reduction techniques can be classified as follows [6] [7]:"]} +{"57190996|10206347": ["The interest in WBSN has been increasing recently, due to enabling an important number of innovative and interesting applications, such as distant patients monitoring and monitoring hospital and elderly patients [3] [4] [1].", "After that, the coordinator forwards the received data to the sink node or the base station [1] [2]."]} +{"29453109|9431428": ["Readers are encouraged to refer to other sources for more in-depth review of SVMs (Burges 1998; Cristianini and Shawe-Taylor 2000; Pereira et al. 2009)."]} +{"7959184|14047190": ["An optimal number of training samples is strongly dependent on the data, so empirical approach is often used to find this value [6], [7]."]} +{"7959184|192934": ["An optimal number of training samples is strongly dependent on the data, so empirical approach is often used to find this value [6], [7]."]} +{"198230539|27533715": []} +{"40803020|9431428": ["The input for classifier functions is a set of examples, called features (i.e., independent variable), and the outputs are a class (i.e., dependent variable), or discrete group that the example belongs to 15 ."]} +{"3462681|393948": ["One hypothesis is that different representations can more or less entan-gle and hide the different explanatory factors of variation behind the data [24, 25]."]} +{"85460111|14307102": []} +{"17970733|1634674": [", video sensors [1,6,7] and non-optical sensor systems e."]} +{"621581|192934": ["For classification, various machine learning methods (supervised classification in our case) can be used [33]."]} +{"28667319|5401262": ["In the past several years, significant progress has been made in machine learning to automatically recognize facial expressions related to emotion [20,21]."]} +{"146121426|49544416": ["Alternatively, arousal and valance together can discriminate between complex emotions; both sadness and anger have negative valance, but anger has high arousal and sadness has low arousal (Shu et al., 2018)."]} +{"18633314|9431428": ["This classifier is often used in brain reading studies but other linear and nonlinear classifiers may be equally or even more powerful (for a discussion of different classifiers, see Mur et al. 2009; Pereira et al. 2009).", "but other linear and nonlinear classifiers may be equally or even more powerful (for a discussion of different classifiers, see Mur et al. 2009; Pereira et al. 2009).", "Classification accuracy of these approaches to the initial approach was compared by using the nonparametric Wilcoxon signed-rank test (Pereira et al. 2009)."]} +{"18633314|16362395": ["Such multivariate \u2018\u2018brain reading\u2019\u2019 approaches have recently beenused to identify patterns of brain activity that differentiate betweenmental states (Haynes andRees 2006;Normanet al. 2006; Lotte et al. 2007).", "2006) and electrophysiological (Lotte et al. 2007) data which are intended to identify patterns of brain activity that differentiate between mental states (e.", "Our approach builds upon recent MVPA of fMRI (Haynes and Rees 2006; Norman et al. 2006) and electrophysiological (Lotte\net al. 2007) data which are intended to identify patterns of brain activity that differentiate between mental states (e.g., Haxby et al. 2001; Haynes and Rees 2005; Formisano et\u2026"]} +{"199126416|15116409": []} +{"115198228|393948": ["In recent years, deep learning has become the breakthroughs of the data-driven representation learning methods in the field of machine learning [12-13]."]} +{"3936258|9431428": []} +{"21978053|10067743": []} +{"21978053|20905429": []} +{"1921438|5401262": []} +{"1921438|9036392": ["(The details of this procedure were presented in [30]."]} +{"1921438|192934": ["As reported in [35], an acceptable rule of thumb for the size of the", "Feature selection was preferred to PCA in this case since the needed reduction was lower, permitting us to retain a large number of the original features, together with their physical interpretation [35]."]} +{"116375788|15380857": ["When the retina is excited by a visual stimulus, the brain generates electrical activity at the same (or multiples of) frequency of the visual stimulus [39]."]} +{"21082874|7761990": ["to full rank group ICA [37]."]} +{"21308332|2809360": []} diff --git a/edge/graph_210829308.jsonl b/edge/graph_210829308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7be6c6d27976b210c7abb575fa17f9287bcd15d0 --- /dev/null +++ b/edge/graph_210829308.jsonl @@ -0,0 +1,16 @@ +{"1059919|16362395": ["LDA is a popular classification method in BCI application [13]."]} +{"4872813|9470480": []} +{"4872813|5755816": []} +{"4872813|16362395": []} +{"4872813|9270553": []} +{"59274344|210829308": []} +{"141528046|16362395": []} +{"14363304|1708582": []} +{"22472204|16362395": ["The LDA classifier uses a linear hyperplane to separate feature vectors from two classes [10].", "This last point, namely the long calibration time of BCI, is due to the fact that many examples of the user\u2019s EEG signals must be recorded in order to calibrate the BCI using machine learning [10]."]} +{"38548204|14866098": []} +{"38548204|16362395": ["LDA and SVMs were chosen for classification because of their efficiency and widespread use in the BCI field (for review, see Lotte, et al., 2007).", "\u2026arising from differences in mental strategy, fatigue, or attention (Krauledat, et al., 2007; Baillet, et al., 2001; Samek, et al., 2013; Lotte, et al., 2007) that were not considered in our simulation, but stationarity issues remain open questions throughout many areas of BCIs and\u2026"]} +{"11265895|14866098": ["With the exception of the phase-locking value (PLV) [24, 68], most state-of-the-art BCI methods [3, 32] rely on different amplitude/power-related estimators and non-circular statistics, respectively."]} +{"11265895|16362395": ["With the exception of the phase-locking value (PLV) [24, 68], most state-of-the-art BCI methods [3, 32] rely on different amplitude/power-related estimators and non-circular statistics, respectively."]} +{"11299419|9270553": ["Although the importance of feedback for BCI performance has been known for many years (Neuper et al., 1999; Wolpaw et al., 2000) the effect of feedback based on one modality has hardly been validated with a second, feedback-independent modality."]} +{"54441907|9270553": ["The ITR was selected to take into account both the accuracy and the speed of data transfer [13].", "The ITR calculation was performed according to Wolpow\u2019s definition [13] using Equation 2 in which it is expressed in bits per", "Information transfer rate (ITR) is a BCI performance measure that not only reflects the accuracy of performance but also reveals the speed of communication [13]."]} +{"7470460|6116761": []} diff --git a/edge/graph_210838728.jsonl b/edge/graph_210838728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5dcfe4643db57a2224ce7e6cb5f857eef03a07ff --- /dev/null +++ b/edge/graph_210838728.jsonl @@ -0,0 +1,58 @@ +{"203581060|5755816": ["bio-optical neurophysiological measurement is limited due to a slow information transfer rate, and high error rates [5]."]} +{"1605434|9928823": []} +{"4323375|16013270": ["It has received signi\ufb01cant 7:2 \u2022 X. Fan et al. attention from both academia and industry, with diverse solutions based on radars [30], cameras [4], inertial sensors [3], etc."]} +{"53011858|207330385": ["Inspired by [21], we categorize deep learning approaches for HAR into three classes: generative deep architecture, discriminative deep architecture, and hybrid deep architecture."]} +{"53011858|5401262": ["With the diversity and popularity of wearables and on-body sensing devices, unobtrusive and automatic human activity recognition (HAR) has drawn extensive attention, and plays an important role in various areas, such as humancomputer interaction (HCI) [1], human behavior analysis [2], mobile and ubiquitous computing [3], [4]."]} +{"10050878|5724477": []} +{"201837356|192934": ["When using a decision fusion framework, a mechanism for capturing the reliability of each modality was provided by borrowing from classifier combination theory [32]."]} +{"1033682|174797842": []} +{"49191580|17747015": ["less transceivers [3]."]} +{"49191580|5724477": ["most widely used [22] since it allows recognizing a variety of activities."]} +{"2945098|8928686": ["There exist several commercial wearable devices to detect falls [24]; most of them use accelerometers to capture motion information."]} +{"7551351|17747015": ["Activity recognition methods are classified into three main types of vision-based [1], radio-based [2], and sensor-based [3] methods."]} +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"53217000|14814753": ["Human activity recognition has been widely studied over the decades [9]."]} +{"52985667|207330385": ["Inspired by [15], we classify deep learning approaches for HAR into three categories: generative architecture, discriminative architecture and hybrid architecture."]} +{"52985667|5401262": ["Human activity recognition (HAR) plays an important role in peoples daily life and has become a key problem in humancomputer interaction (HCI) [1], human behavior analysis [2], mobile and ubiquitous computing [3] [4]."]} +{"49668283|3761015": []} +{"49668283|2670121": ["Cook et al. (2013) classified transfer learning in regards to the presence of labeled data.", "This has been explained in details in Cook et al. (2013).", "Transfer learning concerns \u201c developing systems that can leverage experience from previous tasks into improved performance in a new task which has not been encountered before \u201d (Cook et al. 2013)."]} +{"49668283|3348390": ["It is expected that with the rise in the Internet of Things (IoT) in the coming years, activity recognition will be a core component in many IoT applications (Perera et al. 2014)."]} +{"49668283|11050081": ["Thus, the trade-off between the cost of updates and the gain in performance has to be considered for choosing an adequate interval length (Gama 2012)."]} +{"49668283|3918777": ["Some approaches in data stream mining might be seen as applicable for activity recognition (\u017dliobait\u02d9e et al. 2016)."]} +{"52298127|2088679": ["There is a huge gap of deep learning methods in this domain, with only a few notable papers concentrating on deep survival analysis [97]."]} +{"52298127|9928823": ["Among various machine-learning algorithms, \u201cdeep learning,\u201d also known as representation learning [29], is widely used in these applications."]} +{"53091950|36366678": ["Although differential privacy [8, 34] offers a strong privacy guarantee for X\u20321j"]} +{"43953426|14116122": ["A variety of sensor modalities like accelerometer, ambient sensors, RFID tags, Radar etc [44] [25] have been used in sensor based approach."]} +{"88522722|207330385": ["Increasing network\u2019s depth improves the quality of extracted features[27]."]} +{"88522722|2670121": ["Transfer learning is researched under a variety of different names such as life-long learning, knowledge transfer, learning to learn, inductive transfer, contextsensitive learning, and meta-learning in the field of machine learning,[7]."]} +{"49428582|207330385": ["Deep learning based HAR [22] achieves the state-of-the-art performance than conventional machine learning approaches.", "Several survey articles have elaborated on the recent advance of activity recognition using conventional machine learning [20, 21] and deep learning [22] approaches."]} +{"49428582|2670121": ["Human activity recognition (HAR) aims to seek high-level knowledge from the low-level sensor inputs [1].", "A recent work evaluated deep models for cross-domain HAR [30], which provides experience on this area.", "Feuz et al. [44] proposed a heterogeneous transfer learning method for HAR, but it only learns a global domain shift.", "HAR has been widely used to applications such as smart care [2], wireless sensing [3, 4], adaptive systems [5], and smart home sensing [6, 7].", "Deep learning based HAR [22] achieves the state-of-the-art performance than conventional machine learning approaches.", "To tackle the above challenges, several transfer learning methods have been proposed [12].", "Transfer Learning based Activity Recognition Some existing work also focused on transfer learning based HAR [12].", "Those methods typically treat HAR as a standard time series classi\ufb01cation problem.", "We studied cross-domain activity recognition through the proposed STL framework and evaluated its performance on cross-position HAR tasks.", "Some existing work also focused on transfer learning based HAR [11].", "Conventional machine learning approaches have made tremendous progress on HAR by adopting machine learning algorithms such as similarity-based approach [23, 24], active learning [25], crowdsourcing [26], and other semi-supervised methods [27, 28].", "We construct several CPAR tasks according to each scenario and use the labels for the target domain only for testing by following the common setting in existing work [12, 38]."]} +{"96431550|3387861": ["UNDERSTANDING humans\u2019 intentions is crucial to improve the user-experience in many applications, such as recommendation systems [1], assisted living [2] and entertainment [3]."]} +{"6130931|16013270": ["While each sensory type has advantages in certain applications [1][2], it still faces limitations."]} +{"59553885|5664472": ["In human action data features, we have to deal with variance problem as explained in the survey paper [13], [15], [25].", "Deep learning makes computer vision (CV) efficient to solve the problem of human activity recognition [7], [13], [15]."]} +{"44130250|18599847": []} +{"44130250|9928823": []} +{"44130250|1634674": []} +{"207241157|2670121": ["Transfer learning approaches in HAR can be categorised along four dimensions: sensor modalities, differences between source and target environments, available types of data labelling, and representation of the knowledge [5]."]} +{"16484761|10817088": ["While there have been several review papers published over the recent years devoted to activity recognition and to smart environments in general [Acampora et al. 2013; Chan et al. 2009; Sadri 2011], there is no study on multioccupancy that draws the picture of the current advances in this area;\u2026"]} +{"21336443|2318389": ["However, if the original data follows a multivariate Gaussian distribution, a large portion of the data can be reconstructed via MAP estimation [24, 31]."]} +{"49665108|10175374": ["In this way, information coming from related tasks is ignored, which might help HAR models do better [27]."]} +{"21011865|2323881": []} +{"21011865|393948": []} +{"10985974|1634674": []} +{"199488711|207330385": ["Now-a-days, deep learning methods have been controlling over other ML algorithms for a tremendous scope of utilizations [20]\u2013[28]."]} +{"19100991|2895124": []} +{"49902207|207330385": ["Deep learning based HAR [33, 39] achieves the state-of-the-art performance than conventional machine learning approaches.", "Several survey articles have elaborated the recent advance of activity recognition using conventional machine learning [6, 21] and deep learning [39] approaches.", "\u008ce LSTM layer is mainly for capturing the time features [39].", "A recent work evaluated deep models for cross-domain HAR [28], which provides some\nexperience for future research on this area.", "Conventional machine learning approaches have made tremendous progress on HAR by adopting machine learning algorithms such as similarity-based approach [9, 48], active learning [19], crowdsourcing [22], and other semi-supervised methods [20, 29].", "As previous work has demonstrated the e\u0082ectiveness of deep neural network on feature extraction [39], it will help the network to extract more high-level features.", "Those methods typically treat HAR as a standard time series classification problem.", "HAR has been widely applied to many applications such as indoor localization [43], sleep state detection [46], and smart home sensing [41].", "Human activity recognition (HAR) aims to seek the profound highlevel information from the low-level sensor inputs [39]."]} +{"49902207|2670121": ["A detailed survey on transfer learning for activity recognition is conducted in [11]."]} +{"41355145|1634674": ["Activity recognition remains a hot research topic in decades, and its major objective is to explore footprints from historical information for recognizing physical activities [9] [10]."]} +{"41355145|14970359": ["Activity recognition remains a hot research topic in decades, and its major objective is to explore footprints from historical information for recognizing physical activities [9] [10].", "Besides accelerometer sensors, vision information also captures human motions and thus can be explored for recognition [9]."]} +{"1631622|393948": ["Feature learning (or representation learning) is becoming an important field in machine learning community in recent years [9]."]} +{"1631622|7530272": ["Other than sequence distance based methods, feature-based classification methods [8] follow the traditional classification framework."]} +{"19476662|5724477": ["[42]."]} +{"51978366|393948": ["In 2006, an unsupervised pretraining algorithm was proposed for initializing the weights and biases of AE [44] that was highly effective when only a small number of labeled training samples were available [23], [45]."]} +{"51978366|11894197": ["In this paper, the sequential backward elimination (SBE) method for feature selection is employed [32]."]} +{"173990835|207330385": ["Especially, on-device machine learning for monitoring physical activities has been on the rise as an alternative to server-based computes owing to communication and latency overheads [20]."]} +{"3950510|9959529": []} +{"202159122|2670121": []} +{"20443520|14970359": ["Visionbased activity recognition deals with video sequence, and it has been widely studied in computer vision area [8]."]} diff --git a/edge/graph_210838783.jsonl b/edge/graph_210838783.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34aba065a18613ee87f654717e9d44955d132291 --- /dev/null +++ b/edge/graph_210838783.jsonl @@ -0,0 +1,67 @@ +{"64612612|26364249": []} +{"64612612|10213552": []} +{"51876245|205286988": []} +{"51876245|1236072": []} +{"46616488|3834736": []} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"155108789|12675271": []} +{"80627818|51615396": []} +{"7120895|3102110": ["An overview of data mining from the database perspective can be found in [CHY96]."]} +{"52012534|206578224": []} +{"52012534|15449163": []} +{"52012534|18503837": []} +{"52012534|393948": []} +{"52012534|8909218": []} +{"67856815|15449163": []} +{"67856815|10693567": []} +{"59513522|7644489": []} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} +{"67864261|6556803": ["Nowadays, the widespread of mobile devices and wireless communications has led to higher demands for data exchange and computing requirements [1]."]} +{"57467825|19938676": []} +{"57467825|12206204": []} +{"110636907|53531425": []} +{"174818908|17485266": ["We train the network using ADAptive Moment estimation (Adam) [15] which fits for fast convergence and satisfactory performance [16]."]} +{"195832739|3645740": ["Artificial intelligence (AI) is a promising technique to address such challenges and can assist in complex resource allocation [11]."]} +{"52124201|206578365": ["5G network [13], [15]."]} +{"52124201|17787193": ["The focus of [17] is on offloading traffic with the assistance of infrastructure devices.", "Different from [17], we review these existing related works in this area from a multi-dimensional view, e.", "[17] provided a survey on traffic offloading solutions, in which mobile devices with multiple wireless interfaces are efficiently used.", "More specifically, [17] takes delay as the single matric to classify these related works of traffic offloading based on opportunistic networking into two categories, delayed offloading and non-delayed offloading.", "There are several surveys on offloading [17]\u2013[20], but they are very different from ours.", "By contrast, we focus on offloading cellular traffic through opportunistic network, consisting of mobile devices, as well as on computation offloading, which was not considered in [17]."]} +{"6500433|8769043": []} +{"59554672|35098173": ["A detailed survey on geographic routing protocols in VANETs can be found in [89]."]} +{"59554672|3330461": ["[111] have addressed opportunistic traffic offloading where cellular traffic of the users inside the vehicles, is offloaded through carrier WiFi networks."]} +{"59554672|38911919": ["More detail on clustering in VANET can be found in the survey paper [127]."]} +{"207172599|3330313": []} +{"9158916|10213552": ["Apache Spark is natively designed to handle such kind of iterative processing which requires more than one pass over the same dataset (e.g., MLlib for designing and tuning machine learning algorithms and pipelines).", "Spark\u2019s MLlib is divided into two main packages (Fig.", "Spark\u2019s MLlib comes with a number of machine learning algorithms for classification, regression, clustering, collaborative filtering and dimensionality reduction.", "Several libraries have been built on top of Spark core for handling different workloads: Spark\u2019s MLlib for machine learning [61], GraphX [33,83] for graph processing, Spark\n19 http://mattturck.com/2016/02/01/big-data-landscape/.", "It has led to the current Spark\u2019s MLlib.", "In this section,we investigate Spark\u2019s scalablemachine learning library, MLlib.", "To simplify this task, Spark\u2019s MLlib supports several methods for feature extraction, transformation and selection.", "In this regard, several papers provide comparisons between some of these tools including MLlib [51,69].", "For example, the development of Spark\u2019s MLlib\n4 https://sparkhub.databricks.com.", "Iterative algorithms DryadLINQ [88], Iterative MapReduce (e.g., HaLoop [13] and Twister [26]), GraphLab [56] PowerGraph [34], Google\u2019s Pregel [58] (a Pregel API was implemented on top of Spark core [94]) and of course Spark\u2019s MLlib [61].", "Apache Spark system consists of several main components including Spark core [90,93,94] and upper-level libraries: Spark\u2019sMLlib formachine learning [61],GraphX [33,83,85] for graph analysis, Spark Streaming [95] for stream processing and Spark SQL [7] for structured data processing.", "5, we focus on Spark\u2019sMLlib for machine learning.", "With a major commitment to Apache Spark, IBM founded a Spark technology center.13 Also, IBM SystemML14 was open sourced and there is a plan to collaborate with Databricks to enhance machine learning capabilities in Spark\u2019s MLlib.", "In this regard, Spark\u2019s MLlib is designed as a distributed machine learning library to simplify the design and implementation of such algorithms and pipelines."]} +{"51998096|206456479": ["The 5G network slicing concept [5], [7], [12], could effectively serve the purpose, with the promise to logically isolate control plane (CP) and user plane (UP) network functions (NFs) and resources that are specifically tailored to a vertical market\u2019s need on a single common"]} +{"59553461|1185580": ["The actor determines which action to take, and the critic tells the actor the quality of the action and how it should adjust the policy[13]."]} +{"7703219|16335158": ["In the CC, MCC and Sensor-cloud architecture, a physical datacentre unit is in charge of performing the data computation and storage (Hossain, 2013), (Dinh, Lee, 2011)."]} +{"7703219|16654832": ["However, the mobile devices suffer from computing resources limitations, battery restriction and processing time (Shiraz et al., 2012)."]} +{"4775145|3330461": ["Device-to-cloud [4] and device-to-device [5] communication can be made by exploiting a wide range of communication channels: 3G, 4G, WiFi, Bluetooth, and even in some cases,"]} +{"4775145|14433834": ["Mobile Augmented reality (MAR) is the research area that deals with integrating the physical environment with virtual objects for mobile devices [1], [2], [3]."]} +{"4775145|469744": ["The physical and virtual objects are therefore synchronously coexisting in an intermediate plane, at the intersection between virtual reality and telepresence [9]."]} +{"37574235|763939": []} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"195218859|1932843": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"5871627|304226": []} +{"5871627|6413523": ["For more information about UMLS, see [17, 148]."]} +{"5871627|191396": ["For an experimental comparison of different clustering algorithms see [132, 151], and for a survey of clustering algorithms see [145]."]} +{"5871627|3102110": ["structured such as RDBMS data [28, 43], semi-structured such as XML and JSON [39, 111, 112], and unstructured text resources such as word documents, videos,", "An overview for the data mining from the database perspective can be found in [28]."]} +{"32280043|3834736": ["[6] S.", "While adaptive beaconing approaches could be used to reduce load and improve latencies [6], the current status of IEEE 802."]} +{"32280043|7644489": ["An important feature of 5G-enabled communications is the proximity service (ProSe) [8].", "[8] X."]} +{"678032|8323234": ["Rain attenuation in different frequency bands [35]. needs to increase with the bandwidth if the signal-to-noise ratio (SNR) should remain intact [14].", "[14] is a recent overview paper on signal processing for mmWave MIMO.", "However, since the analog circuit can only partly adjust the signals, it is hard to adjust the beam to the channel conditions and this leads to a considerable performance loss [14], particularly for mobile users.", "However, realizing a fully digital MIMO implementation at mmWave frequencies is a non-trivial task, using current circuit design technology [14].", "The analog circuits of the hybrid architecture can be implemented by different circuit networks, leading to different hardware constraints [14], [115], [116].", "Yet, reference [14] is focused in mmWave MIMO and other topics e.g., recent developments of channel measure/modeling, multiple access, standardization, \ufb01eld test are missing.", "Note that references [7], [12]\u2013[14], [16] gave excellent overviews of some aspects of mmWave mobile networks from different aspects.", "In addition, fully analog architecture can only support single-stream transmission, which cannot achieve the multiplexing gain to improve spectral ef\ufb01ciency [14]."]} +{"10826583|1113420": ["Context-aware systems are those systems that are capable of adapting their operations to the current context without user interaction and are thus aimed at augmenting usability and effectiveness by taking into account the environment\u2019s contextual information [28]."]} +{"173990181|51922975": ["Connecting vehicles via Vehicular Ad-hoc Networks (VANET) represents an early attempt to support safety-related applications, such as accident warning, crash notification, and cooperative cruise control [4], [5]."]} +{"173990181|206741902": ["Edge servers may also assist cooperation among multiple vehicles for SLAM, which is called as centralized SLAM [68].", "For challenges of SLAM for autonomous driving, the readers are referred to [68] for a more detailed discussion.", "the simultaneous estimation of the state of a vehicle and the construction of a map of the environment [65], [66], [67], [68].", "Multi-vehicle SLAM with cooperation among vehicles can also help to improve the performance of SLAM [68]."]} +{"173990181|6909107": ["points [28], [29], [30], [31], [36].", "This is aligned with the recent trend to deploy computing resources at the edge of wireless networks [28], [29], [30], [31], to be elaborated below."]} +{"173990181|206578365": ["different offloading models can be considered, namely, binary and partial offloading [31].", "This is aligned with the recent trend to deploy computing resources at the edge of wireless networks [28], [29], [30], [31], to be elaborated below."]} +{"18581927|3555631": ["A study conducted in [8] found that power consumption levels remained high even if BS utilization ratios are between (1045%).", "Authors in [8] noted that in current LTE systems, BSs remain active regardless of their state of utilization."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"51973406|16992768": [", for face- and eyedetection and head-pose analysis [23].", "If the driver accesses a phone or does not look at the road for a specific time duration, an alert or attempt to get off the road will be made [23]."]} +{"51973406|18388986": ["The classification of different levels of sensor fusion along with the most commonly used techniques for fusing data are discussed in [25]."]} +{"51973406|206764452": [", [18]."]} +{"146107433|16654832": []} +{"199003201|16654832": ["However, the mobile devices suffer from computing resource limitation, battery restriction and processing time constraint [14]."]} +{"52126821|4787452": ["DSRC-related MAC protocols are covered in great detail in [34] and [35], covering both weaknesses of current standards and potential alternative schemes.", "For example, the use of TDMA-based MAC protocols shows significant improvement over the relatively low performance of contention-based CSMA/CA conditions [35]."]} diff --git a/edge/graph_210838881.jsonl b/edge/graph_210838881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68fe0320c02e2bbd1094a2964a0040be4e1cffc3 --- /dev/null +++ b/edge/graph_210838881.jsonl @@ -0,0 +1,65 @@ +{"53219451|3536399": []} +{"195698111|10198276": ["To address these issues, researchers have developed forensic algorithms that verify the authenticity and source of digital content [1]\u2013[4]."]} +{"208857721|210838881": ["3001516 have been found to be very effective for detecting and localizing image forgeries [15]."]} +{"208857721|10198276": []} +{"11058994|9835525": ["First, the shot boundaries are determined by comparing colour histograms [17] to \ufb01nd the within-shot frames for which tracking is to be run."]} +{"113533|8785789": []} +{"13012110|2323881": ["Other works, such as [Hassner et al. 2015], specifically address the problem of face frontalization, as it is extremely beneficial for facial recognition [Ding and Tao 2016]."]} +{"52285354|10198276": []} +{"52390857|10198276": ["CF and anti-CF techniques are iteratively developed in a neverending loop, whose outcome can hardly be foreseen [13], [14].", "Game theory can be used to study this dynamic interplay, and to identify optimal attack and detection strategies for the attacker and the analyst [13], [14]."]} +{"11285357|9415965": []} +{"49555906|9415965": ["Especially, passive forensics approaches [1]\u2013[4], which detect tampering traces without the aid of any prior axillary infor-", "Meanwhile, the proliferation of powerful video editing tools makes it much easier than ever to produce faked videos without leaving any perceptible traces [1]."]} +{"71455702|3732796": ["\ue062e technology, de\ufffdned multimedia forensics [13\u201315], relies on the observation that each phase of the image history, from the acquisition process, to its storing in a compressed format, to any post processing operation leaves a distinctive trace on the data, as a sort of digital \ufffdngerprint."]} +{"10299788|9415965": ["In the last years, Video Forensics has emerged as a discipline aiming at investigating the processing history of DVs in a blind fashion [1]."]} +{"203591646|393948": []} +{"90260135|4884302": ["The recent developments in deep neural networks [1, 3, 4, 21], and in particular, the generative adversary networks (GANs) [5], have spawned a new type of image synthesis methods that can produce images with high levels of realism.", "The detected landmarks are warped into a standard configuration in the region of [0, 1] \u00d7 [0, 1] through an affine transformation by minimizing the alignment errors."]} +{"90260135|9928823": ["The recent developments in deep neural networks [1, 3, 4, 21], and in particular, the generative adversary networks (GANs) [5], have spawned a new type of image synthesis methods that can produce images with high levels of realism."]} +{"52097748|10198276": ["Driven by these phenomena, in the last decade, a large number of methods have been proposed for forgery detection and localization or camera identification [1], [2], [3]."]} +{"205396128|10198276": ["Camera identification is an important topic in the forensics community [1, 2]."]} +{"15866771|10198276": []} +{"61807685|10198276": []} +{"207237303|10198276": ["variety of information forensic techniques to determine the authenticity and processing history of digital images [20]."]} +{"6911460|3732796": []} +{"16441285|18144244": ["Generally speaking, existing image forgery detection approaches are described as active [2],[3],[4] and passive (blind) [5],[6] techniques."]} +{"19159569|10198276": ["In the last few years, the digital media forensic community has explored several techniques to evaluate the truthfulness of digital images and media [4, 5]."]} +{"3381583|207743293": ["[43] present a survey of approaches for rumor detection, including veracity classification and the collection and annotation of rumor-focused datasets from socialmedia."]} +{"3847983|20404279": ["Also, there is a recent review paper on GAN [15] which reviews several GAN architectures and training techniques, and introduces some applications of GAN."]} +{"3847983|4875951": ["This problem is related to style transfer [68] [69], which takes a content image and a style image and output an image with the content of the content image and the style of the style image."]} +{"53243980|10198276": ["One of the cornerstones of this branch is accumulation of and fetching data regarding criminal activities [3,4], sharing of the data that have been tampered with and content manipulation [5]."]} +{"53243980|9176080": ["One of the cornerstones of this branch is accumulation of and fetching data regarding criminal activities [3,4], sharing of the data that have been tampered with and content manipulation [5]."]} +{"4823784|18144244": ["Existing digital forgery detection methods are divided into active [1] [2] [3] and passive (blind) [4] [5] [6] [7] [8] [9] approaches."]} +{"63017839|10198276": []} +{"63017839|9415965": []} +{"13911271|9415965": []} +{"52957091|10198276": ["techniques for many years to distinguish fake images to overcome these problems and restore digital image credibility [1, 2]."]} +{"204955047|10198276": ["The identi\ufb01cation of manipulated images has been studied in the \ufb01eld of image forensics [34, 18] for more than a decade."]} +{"22710856|3540699": []} +{"195218495|9415965": ["As covered by (Milani et al., 2012), image-based forensics techniques that leverage camera noise residuals (Khanna et al., 2008), image compression artifacts (Bianchi & Piva, 2012), or geometric and physics inconsistencies in the scene (Bulan et al., 2009) can also be used in videos when applied\u2026", "(Milani et al., 2012) provide an extensive and thorough overview of the main research directions and solutions that have been explored in the last decade."]} +{"2460828|7158350": ["This kind of neural networks show very good results on various classification problems [24]."]} +{"24752322|10198276": ["In fact, the increasing need of authentication techniques for digital images without a priori information (like the presence of a watermark) has brought researchers to develop a number of forensic approaches designed to work passively and facing different forensic issues, like forgery detection, source identification, and computer generated versus natural content discrimination [1]\u2013[3]."]} +{"18800070|393948": ["Very recently, inspired by impressive results in the closely related \u0080elds of computer vision and pa\u008aern recognition [17], the multimedia forensics community began focusing on the use of deep learning [3, 19], especially convolutional neural networks (CNN) [27]."]} +{"207930418|210838881": []} +{"207930418|209531954": []} +{"1945729|9415965": ["false videos that may fool even expert analysts, and may cause huge damage. In this context, like in many others, establishing the integrity of visual assets of interest becomes of primary importance [1]. Recently, there has been intense activity on video forgery detection and localization. These papers, however, focused only on a few speci\ufb01c attacks, trying to detect frame erasure/substitution [2, 3"]} +{"1945729|393948": ["An autoencoder is able to learn, by proper training, a representation (coding) of the input data in oder to guarantee some desired properties [28]."]} +{"54447831|7559976": []} +{"52049245|4884302": ["For example, in model-based reinforcement learning [2,24], a video synthesis model \ufb01nds use in approximating visual dynamics of the world for training the agent with less amount of real experience data."]} +{"51603906|10198276": ["A number of surveys present the evolution of the state-of-the-art through time [15, 16, 1, 17, 2].", "\u2026image block B ( i, j ) is then processed by all 58 kernels in order to calculate an edge con\ufb01dence score based on Equation 8. where M w and M b the number of white and black pixels in the kernel, respectively, and \u00af k z ( i, j ) is the bitwise NOR for position ( i, j ) of kernel k z , z \u2208 [1 , 58].", "Even though active methods can be very reliable, their use is not possible in situations where content from unknown or untrusted sources may contain important information [1]."]} +{"8139575|3732796": ["Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org."]} +{"16852038|393948": ["Nonlinear autoencoders with more hidden units than inputs (called overcomplete) are also useful in applications [15]."]} +{"69953011|207743293": []} +{"52070266|416565": ["Face spoo\ufb01ng attack attempts to bypass a face biometric system by presenting a fake face to the system [3].", "Therefore, determining the authenticity of images has attracted increasing attention in many applications, such as image forensics [1], [2] and biometric anti-spoo\ufb01ng [3]."]} +{"52070266|10198276": ["Therefore, determining the authenticity of images has attracted increasing attention in many applications, such as image forensics [1], [2] and biometric anti-spoo\ufb01ng [3]."]} +{"3640362|10198276": ["For this reason, over the years, the forensic community has developed several techniques for image authenticity detection and integrity assessment [1, 2, 3]."]} +{"52157475|9415965": []} +{"8661252|10198276": ["In recent years, a number of surveys of the field have attempted to organize the state-of-the-art and the major challenges [46] [6] [49]."]} +{"202783065|10198276": ["During the last decade, many forensics researchers have developed techniques relying on inherent statistical fingerprints [1]."]} +{"4626645|10198276": ["D IGITAL multimedia forensics has shown that statistical features intrinsic to images can be used to identify altered images [1]."]} +{"31758701|416565": ["It is also applicable in the \ufb01eld of biometrics for countering spoo\ufb01ng attacks [158]."]} +{"31758701|10198276": ["In contrast to recent surveys of image forensics [17\u201320], I will address both active and passive approaches to image authentication.", "For a detailed treatment of these topics, interested readers are referred to the original publications, other topic-speci\ufb01c surveys [17\u201320, 64, 65], or books [66, 67]."]} +{"70350052|55111989": ["In [5], a review on different image forgery detection techniques is presented."]} +{"32096248|10198276": ["In order to restore faith in digital photography, in the last decade, a considerable number of works have addressed the problem of determining origin and authenticity of digital images [34, 35]."]} +{"201058738|12574304": ["Digital watermarking is a complementary forensics technique for image authentication [58, 39, 51]."]} +{"1313835|10198276": ["Therefore, image forensics [1] is attracting more and more attention."]} +{"54445675|10198276": ["Two general approaches to assurance and verification of digital image integrity include [24, 30, 32]: (1) pro-active protection methods based on digital signatures or watermarking; (2) passive forensic analysis which exploits inherent statistical properties resulting from the photo acquisition pipeline."]} +{"208310297|210838881": ["The research community has responded to this threat by developing a number of forensic detectors [53]."]} diff --git a/edge/graph_210838947.jsonl b/edge/graph_210838947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..117bdf4e38d617813bbefb8670980a9d23294e5a --- /dev/null +++ b/edge/graph_210838947.jsonl @@ -0,0 +1,8 @@ +{"13357627|14478191": ["The most commonly used techniques in MORL are scalarizations of the multi-objective problem [12], [14], [15], either before the fact by reducing the dimensionality of the problem to a single scalar objective, or after the fact, by applying them to Q\u0302-vectors.", "Multi-objective reinforcement learning [12] (MORL) is an extension to standard reinforcement learning, where the environment is a multi-objective MDP, or MOMDP, and the feedback signal returns a vector rather than a single scalar value, i."]} +{"10536042|1452734": []} +{"10536042|1708582": []} +{"7503127|1708582": ["The domain which has been chosen for the experiments is a discrete two dimensional maze-world (e.g., Kaelbling et al., 1996).", "The domain which has been chosen for the experiments is a discrete two dimensional maze-world (e.g., Kaelbling, Littman, and Moore, 1996 )."]} +{"10757799|1708582": []} +{"1708582|17464562": []} +{"12583391|1708582": ["discussion of these properties and other types of returns, see [9,28]."]} +{"53096951|175549": ["Evolutionary algorithms (EAs) are a class of search algorithms with three primary operators: new solution generation, solution alteration, and selection [19, 50].", "One approach well suited to address these challenges in theory is evolutionary algorithms (EA) [19, 50]."]} diff --git a/edge/graph_210839301.jsonl b/edge/graph_210839301.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..688e6e5ec0fe4966a7f4722388acc32b00014a76 --- /dev/null +++ b/edge/graph_210839301.jsonl @@ -0,0 +1,25 @@ +{"53038310|33063270": ["peration in the full P2P market [97]. The DC-OPF is incorporated in the full P2P design to internalize grid constraints. The recent breakthroughs concerning distributed optimization on grid operation [71,82] can also inspire other works on the redesign of grid operation under P2P markets. We also give incentive to future research in appraising the impact on grid operation practices and its potential adap", "In this way, privacy of all members of the community is guaranteed. The equations (2c), (2d) and (2e) are linking constraints. The literature recommends the use of distributed optimization techniques [81,82]. The problem is also iteratively solved as in the previous design. For instance, references [61,83] employed ADMM to solve a community-based problem. 3.3. Hybrid P2P market This design is the combina"]} +{"115367837|562855": ["As an active research direction of MAS, multi-agent coalition technique has been widely studied [17], [18]."]} +{"115286169|49343018": ["The scalability of centralised energy management is of concern, since renewable generation and load predictions are required for all of the prosumers [11]."]} +{"54919268|1420935": ["However, non-renewable energy sources are being depleted and becoming more expensive from time to time which indicates that the energy from these sources will not be able to support the increasing demand caused by a growing population [1].", "Several published papers discussed various aspects of P2P DET [1,30\u201333].", "RES cause less pollution and are also more economical than their counter parts as they reduce transmission cost [1].", "The authors in [1] provided a high level overview while not covering most recent research problems.", "Furthermore, energy trading also brings various bene\ufb01ts to utility companies such as increasing the overall ef\ufb01ciency of the grid and reducing operation cost [1]."]} +{"132635196|49574823": ["To facilitate the construction of ADR models, blockchain technique is a promising means for offsetting the limitations in terms of energy trading due to its advantages of decentralization, anonymity, and trust [22], [23]."]} +{"169077028|49343018": ["Communication architectures can be broadly divided into centralized, where all prosumers communicate with a central coor-dinator, distributed, with prosumer-to-prosumer communication, and unidirectional, with prosumers receiving broadcasts from a coordinator 23 ."]} +{"202231530|51935081": []} +{"202231530|485843": []} +{"202231530|595093": ["For example, some applications need low latency, some necessitate high privacy protection, and so on, [38], [39]."]} +{"116422191|49527603": ["hybrids that stand between public and private blockchains [44].", "detailed comparison of different algorithms can also be found in [15,44,46,47,56]."]} +{"86831022|10390713": ["\u2026collection of distinct networks, sources, sinks, their corresponding responsible parties, and the associated physical and information flows 1,2 . information flows come from monitoring physical processes (for example, voltage and current at a transformer) and decisions made by individual actors 3 ."]} +{"115583875|33984499": ["Speci\ufb01c protocols such as Kademlia and Gia have improved performance than other protocols [24], and are therefore studied.", "Among the structured P2P protocols, Kademlia [25] has been shown as the most robust protocol for mobile networks [14] and for pervasive environment in terms of lookup, dynamicity, churn, security and queries [24].", "For instance, a review presented in [24] showed that inactivity period of peers result in high overhead and performance degradation in Chord protocol compared with Kademlia [25] that is more robust through redundancy for fault or failure of peers.", "In addition, considering the unstructured protocol Gia [26], a topology adaptation algorithm implemented makes the network more robust in high churn rates (connection and disconnection of peers) [24]."]} +{"115583875|1420935": [", service charges by utility company, and active participation of prosumers in growing the economy [6]."]} +{"115583875|485843": ["Meter data management systems have the capability to manage other meter types including electric, heat, and gas, by turning it on and off and transmitting data when appropriate [44].", "Some of the key indicators that can be balanced by asset management includes the assets, system performance, maintenance cost, failure risks and reliability through the use of a communication infrastructure [44].", "Depleted batteries of the EVs are charged in G2V mode, and the EVs supply energy to the grid through its charged batteries in V2G mode [43,44]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"116255833|1420935": ["reduce voltage fluctuations and line losses, which make the system more reliable [21].", "Energy trading is gradually becoming a profit-making option for end users since DERs and Electrical Energy Storages (EESs) are becoming economically feasible [21]."]} +{"67871438|49343018": ["Lower level primary and secondary control layers operating at faster time-scales will still be necessary to maintain power quality and stability [30]."]} +{"116531100|33063270": []} +{"117166591|30102381": []} +{"8420994|6959212": ["Also, we assume that SESs and EUs can communicate with each other and with the agent using the two-way communication infrastructure of the smart grid [1], [23]."]} +{"133589584|19792818": []} +{"139108375|49343018": ["Indeed, at global perspective, decentralized EM schemas have already become a pivotal topic drivers involving self-suffice or standalone energy legislations, balancing electricity market participations, strengthening demand-side responses, and annex cloud database for secure data transportations [3], [4]."]} +{"56177468|35109549": ["[10].", "\u03c3 = 50, \u03bc=4 \u03c3 2 =[50,20,10,5,1]", "Node density=[10,50,100,150,200]"]} +{"56177468|121289": ["In recent decades, conventional power networks are becoming increasingly interconnected with different communication technologies that aim supporting various future smart grid services [2]."]} +{"52890017|205435103": [" behavior [43]. It is a branch of behavioural science that helps us to understand how to mediate the psychological process that guides real behavior [52], [53], and has been used in engineering [54], [55], public health [56], education system [57], economics [58], and medicine [59]. In motivational psychology, there are several models that can be studied to show how users can be motivated to adopt a c"]} diff --git a/edge/graph_210839434.jsonl b/edge/graph_210839434.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4ca4054efa0a2c3de277d1c961d5576bbc69e5c --- /dev/null +++ b/edge/graph_210839434.jsonl @@ -0,0 +1,19 @@ +{"9662116|11034610": ["ite (see also [49] for a somewhat simpler presentation of the algorithm). This paper introduced the technique of \u201citerative compression,\u201d which has b ecome a standard tool in parameterized complexity [63]. The running time of this algorithm is O(k\u00b73k|V(G)|\u00b7|E(G)|), i.e., quadratic time for \ufb01xed k. Very recently, a signi\ufb01cantly more complex new algorithm w ith almost linear running time were presented ", "This paper introduced the technique of iterative compression, \nwhich has become a standard tool in parameterized complex\u00adity [Sloper and Telle 2008]."]} +{"36105533|1453547": []} +{"7691489|16525711": ["For both of our algorithms, the input is an undirected graph G = (V ,E) and an integer k; each algorithm outputs either a minimum size set of at most k fill edges, or NO if each chordal completion of G requires at least k + 1 fill edges."]} +{"10406340|289357": ["[20] and Woeginger [26]."]} +{"4779570|15553087": ["As a general computational procedure, clustering is fundamental in several scientific fields including machine learning, information retrieval, bioinformatics, data compression, and pattern recognition (see [7, 69, 71])."]} +{"4779570|54134680": ["As a general computational procedure, clustering is fundamental in several scientific fields including machine learning, information retrieval, bioinformatics, data compression, and pattern recognition (see [7, 69, 71])."]} +{"537798|1453547": ["a graph is a cograph if and only if it does not contain any induced P4 (see [7, 20] for example).", "Proof The two rules can be computed in linear time using any linear-time modulardecomposition algorithm [20]."]} +{"6049117|1453547": []} +{"934546|16525711": ["The survey of Heggernes [32] gives an overview of techniques and applications of minimum and minimal triangulations.", "The survey of Heggernes [30] gives an overview of techniques and applications of minimum and minimal triangulations."]} +{"121929409|289357": ["of research [15, 24]."]} +{"165111032|18543241": []} +{"9299184|1453547": []} +{"42202732|191396": []} +{"11242156|1453547": []} +{"18969742|191396": ["There are numerous approaches to clustering and \u201cthere is no clustering algorithm that can be universally used to solve all problems\u201d [36]."]} +{"2735390|41878962": ["[5,3]) Babel and Olariu studied the classes of (q; q\u2212 4) and (q; q\u2212 3) graphs."]} +{"14649944|1453547": []} +{"46501688|2294541": []} +{"2327128|6375360": ["a method for generating or listing all the objects in the class, without repetition so that successive objects differ in a pre-specified way, ideally as small as possible [ 83 ]."]} diff --git a/edge/graph_210839653.jsonl b/edge/graph_210839653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3caa3a61191b10a681aeeaa87d5c3d0c8e2d97e5 --- /dev/null +++ b/edge/graph_210839653.jsonl @@ -0,0 +1,46 @@ +{"19096428|206603045": ["Besides the conventional enhancement techniques [3], deep neural networks have been widely adopted to either directly reconstruct clean speech [7, 8] or estimate masks [9, 10, 11] from the noisy signals."]} +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"56171147|7559976": ["Visual domain adaptation [42, 13] is a process that allows a machine learning model trained with samples from a source domain to generalize to a target domain, by utilizing existing but (mostly) unlabeled target data."]} +{"56171147|8815923": ["Robotic grasping is a well studied problem [2]."]} +{"29162614|206739910": ["traffic sign dataset containing 47 different road signs [21]."]} +{"34040907|393948": ["The prospect of marrying the two approaches (VAEs and GANs) comes with multiple benefits: auto-encoder based methods can be used to reconstruct data and thus can be used for inpainting [28] [43]; having an inference network allows our model to be used for representation learning [2], where we can learn disentangled representations by choosing an appropriate latent prior."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"3686035|2088679": []} +{"150373736|108354880": ["Our experimental procedure is illustrated in [Wang et al., 2018c].", "We used a rapid serial visual presentation (RSVP) paradigm [Wang et al., 2016, 2018a] to elicit the P300 ERP.", "We use LDA beamformer [Treder et al., 2016; Wang et al., 2018b] to reconstruct P300 source signal from the recorded raw EEG epochs."]} +{"8597029|393948": ["The basic idea is based on learning interpretable and disentangled representations [Bengio et al., 2013] of images."]} +{"57373775|9316331": ["The reinforcement learning reward comes from the discriminator based on the likelihood that it would be fooled judged on a complete sequence of tokens, and is passed back to the intermediate state-action steps using Monte Carlo search (Browne et al., 2012)."]} +{"21011865|2323881": []} +{"21011865|393948": []} +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} +{"196173887|3951790": ["Network embedding [3, 8] has shown its potential to learn structure-preserving node representations, and has been successfully applied tomany data mining tasks.", "In recent years, network embedding [3, 8] has emerged as a promising direction for unsupervised learning of node representations, which aims to project the nodes of a network into a low-dimensional space whilst preserving the structural properties of the original network."]} +{"196173887|7885409": ["Our study focuses on heterogeneous information networks [28], which can be defined as follows.", "Recently, heterogeneous information networks (HIN) [28] have been proposed to model complex entities and their rich relations in various applications [7, 16, 17, 27, 34, 39].", "Such networks are known as Heterogeneous Information Networks (HIN) [28], as illustrated in Fig."]} +{"165163834|304226": ["Unsupervised word level text generation is a stepping stone for a plethora of applications, from dialogue generation to machine translation and summarization [1, 2, 3, 4]."]} +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"44213294|3608506": []} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} +{"52049245|4884302": ["For example, in model-based reinforcement learning [2,24], a video synthesis model \ufb01nds use in approximating visual dynamics of the world for training the agent with less amount of real experience data."]} +{"3424196|7559976": ["One method to achieve this is to construct a common representation space wherein the two distributions are projected indistinguishably from each other [1, 11, 44, 60], and then train a task model with the projected source domain data."]} +{"3424196|8815923": ["Data-driven methods are also known to seek a robust solution (Bohg et al., 2014)."]} +{"19142960|3693305": []} +{"19142960|5671282": ["With the rapidly increasing amount of images, similarity search in large image collections has been actively pursued in a number of domains, including computer vision, information retrieval and pattern recognition [39, 43].", "Recently, learning-based hashing methods [16, 17, 27, 34, 43, 45] have become the mainstream for scalable image retrieval due to their compact binary representation and ef\ufb01cient Hamming distance 1 Our anonymous code is available at: https://github.com/htconquer/BGAN Permission to make digital or\u2026"]} +{"1033682|174797842": []} +{"58594944|20404279": ["premade assumption [19], [20], so it has the potential to mine inherent information in PolSAR data automatically.", "As for automatical data analysis, deep generative models are of increasing importance in recent years, such as a deep belief network (DBN) [12]\u2013[14], a variational autoencoder (VAE) [15], [16], and a generative adversarial network (GAN) [17]\u2013[20]."]} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"3419504|393948": ["Recently, a new method of representing data has gained popularity: learning a high-dimensional representation from the collected data [Bengio et al., 2013]."]} +{"46898502|393948": ["8 and 9 can be written as:\n{ Y\u0303 = UTD,(G)UE,(G)X\nY\u0302 = UTDUEY (10)\nThe AE approximates under mild condition robustly the target manifold of the data Bengio et al. (2013)."]} +{"206852495|8815923": ["Refer to [32], [33] for surveys of prior work."]} +{"3100155|393948": ["To this end, we build on the success of deep learning \u2013 especially unsupervised autoencoder networks \u2013 to learn \u201cgood\u201d representations from large amounts of data [4]."]} +{"6781584|7559976": ["There has recently been a signi\ufb01cant amount of work on domain adaptation, particularly for computer vision [16], [17]."]} +{"6781584|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment [2].", "However, the complexity of unstructured realworld scenes has a tendency to confound these assumptions, and learning-based methods have emerged as a powerful complement [2], [3], [4], [5], [6].", "neural networks into the grasp selection process [2], [5], [4], [7]."]} +{"5911448|5807554": ["Egocentric video analysis [2], i."]} +{"52055207|20404279": []} +{"56421016|6337591": []} +{"53278419|108354880": []} +{"53278419|206098228": ["While there are several key BCI applications (Lees et al., 2018; Healy et al., 2017a; Solon et al., 2017), there is a growing interest in using EEG signals in a BCI to help in searching through sets of images."]} +{"3401524|12161567": ["(Nickel et al., 2015) is a comprehensive survey on these models."]} +{"23042392|2323881": ["Up to now, the key ability of Pose-Invariant Face Recognition (PIFR) desired by real-world applications is far from solved [4], [5], [6], [7], [8]."]} +{"23042392|393948": ["Representation Learning Designing the appropriate objectives for learning a good representation is an open question [39]."]} +{"19257811|14478191": ["The main issue is the imbalance between the various objectives in the reward function, a problem occurring also in RL. Multi-objective reinforcement learning is a broad topic (for a survey, see (Roijers et al. 2013))."]} +{"207190974|15782139": []} +{"196200412|52305483": ["Technically, there are three types of variants, including (1) varying objective of the discriminator, (2) varying objective of the generator, and (3) varying architecture [47]."]} diff --git a/edge/graph_210839661.jsonl b/edge/graph_210839661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a32397cefc60a33754493ae257f7fd1488b3e5d --- /dev/null +++ b/edge/graph_210839661.jsonl @@ -0,0 +1,7 @@ +{"5546550|595093": ["Security concerns in smart grid can be categorized into three major groups [2], [4], [6]\u2013[8]: the first concern is the network availability."]} +{"5546550|5747564": ["The last network is the wide area network (WAN), which is utilized by NANs to forward the electricity reports to CC [2]\u2013[5]."]} +{"24104193|17381415": ["The challenge of connecting a renewable source to the utility network is largely solved by electronic power converters that handle two main tasks [3], [21], [22]: 1) Maximum Power Transfer and Power Limit: On the input side (source), power electronics control and transform the load characteristics so that maximum power is extracted from the source.", "The most relevant goals of PV energy include 40% cost reduction of PV panels and of the power-converter stage within five years, increased efficiency of both panels and converters [3], [4], and considerable improvement RENEWABLE ENERGY\u2014THE NEXT INDUSTRIAL REVOLUTION"]} +{"24104193|12083425": ["The challenge of connecting a renewable source to the utility network is largely solved by electronic power converters that handle two main tasks [3], [21], [22]: 1) Maximum Power Transfer and Power Limit: On the input side (source), power electronics control and transform the load characteristics so that maximum power is extracted from the source."]} +{"9554932|485843": ["R ECENTLY, unprecedented global initiatives have been undertaken to upgrade the aging power grid with bidirectional power and information flow capabilities into what is known as the smart grid [1]\u2013[3].", "0000, and \u03c6a,t = 0 \u2200t / \u2208 [3, 6]."]} +{"796583|18037424": []} +{"11787406|485843": []} diff --git a/edge/graph_210839695.jsonl b/edge/graph_210839695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea052567a150280f8f1477262a2e51185ae771a3 --- /dev/null +++ b/edge/graph_210839695.jsonl @@ -0,0 +1,3 @@ +{"16475487|7360895": ["However, some challenges still exist in the development of software agents and robots capable of interacting with humans in very natural ways [9].", "This type of intelligent system is expected to be used in a variety of applications [9, 10]."]} +{"26625253|7923260": []} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} diff --git a/edge/graph_210845728.jsonl b/edge/graph_210845728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210859156.jsonl b/edge/graph_210859156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44fa14f6fb0d1bd149c4a6c5c814ad58929d5dcc --- /dev/null +++ b/edge/graph_210859156.jsonl @@ -0,0 +1,46 @@ +{"14140372|6863252": ["x). Here, ddenotes the spatial dimension and xis the spatial coordinate of the xed target image T.Due to the importance of image registration, a large number of dierent approaches have been proposed [1,37,38,39]. Typically, these approaches are formulated as optimization problems, where one seeks to minimize an energy of the form E() = Reg[] + 1 \u02d92 Sim[I 0 1;I 1]; (1) where \u02d9>0 is a balancing constant, "]} +{"54439509|3519414": ["Deep learning methods in general have found a pervasive suite of applications in biology, clinical medicine, genomics and public health as surveyed in [24, 23, 25, 29, 30, 31]."]} +{"54439509|2088679": ["Deep learning methods in general have found a pervasive suite of applications in biology, clinical medicine, genomics and public health as surveyed in [24, 23, 25, 29, 30, 31]."]} +{"3644467|16988556": ["Generally speaking, cancer tumor classi\ufb01cation task consists of a segmenting step [10\u201313] to identify the tumor region from medical images followed by a feature extraction step, which selects useful features to be used for tumor classi\ufb01cation [14]."]} +{"88515314|14843594": ["Well-calibrated uncertainties would be very useful in areas such as Bayesian optimization [54] or active learning [53], as well as when using predictions from machine learning algorithms in the real world and noticing when models are in domains away from those upon which they were trained."]} +{"169033851|2088679": ["In [49], many other sections of medical image analysis like classification, detection, and registration is also covered which makes it medical image analysis review not a specific medical image segmentation survey.", "There are a few recent survey articles on medical image segmentation, such as [49] and [67]."]} +{"204966115|73497737": []} +{"53767144|3342225": ["A recent survey compiled an overview of methods used to explain black-box ML models [8]."]} +{"53858584|21386749": ["Healthcare records are stored in different locations and data silos, including but not limited to hospitals, pharmacies, payors, and personal devices[6, 17, 2, 9]."]} +{"202771805|3126100": []} +{"202771805|206988459": []} +{"202771805|14774186": []} +{"207172599|3330313": []} +{"12188411|5835640": ["Overfitting is further aggravated by complex classification models with many degrees-of-freedom that easily fine-tune to a specific population but overestimate the performance on the general population (Adaszewski et al., 2013; Mwangi et al., 2014).", "Over\ufb01tting is further aggravated by complex classi\ufb01cation models with many degrees-of-freedom that easily \ufb01ne-tune to a speci\ufb01c population but overestimate the performance on the general population (Adaszewski et al., 2013; Mwangi et al., 2014)."]} +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"53432181|3654323": ["We can divide the literature on DDA as follows: (i) methods based on building domain-invariant feature spaces through auto-encoders (Ghifary et al., 2016), adversarial training (Ganin et al., 2016), GANs (Hoffman et al., 2017; Sankaranarayanan et al., 2018), or disentanglement strategies (Liu et\u2026", "Deep Domain Adaptation (DDA), which is a \ufb01 eld unrelated in essence to medical imaging, has been widely studied in the recent years (Wang & Deng, 2018)."]} +{"53432181|2088679": ["Deep learning methods for medical imaging has become a popular research focus in recent years (Litjens et al., 2017).", "A recent survey by Litjens et al. (2017) analyzed more than 300 medical imaging studies, and found that deep neural networks have become pervasive throughout the \ufb01 eld of medical imaging, with a signi \ufb01 cant increase in the number of publications between 2015 and 2016."]} +{"199405252|393948": ["Data representation is important for robust model learning (Bengio et al., 2013); however, many of the structures that make learning effective in popular ML benchmarks (e.", "Data representation is important for robust model learning (Bengio et al., 2013); however, many of the structures that make learning effective in popular ML benchmarks (e.g., Gabor filters for computer vision given natural images) do not map over to clinical equivalents (Raghu et al., 2019)."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"85543316|8372620": [", race, gender, on the basis of the legal notions of disparate treatment or disparate impact [3] (see [3, 4, 32, 40, 60] for reviews)."]} +{"85543316|2511280": ["Among the graphical criteria, we use quantile-quantile (QQ), and jitter plots recommended by [17, 51].", "Several matching methods exist (see [51] for a survey)."]} +{"170079064|67773053": ["More details on adversarial ML attacks can be found in [3], [4], [15], [16], [136], [137].", "[16] arXiv 128 Adversarial ML attacks and defenses in text domain \u00d7 \u221a \u221a \u221a \u00d7 \u00d7 \u00d7"]} +{"170079064|53800586": ["Various factors and challenges impacting driveability of autonomous vehicles along with an overview of available datasets for training self-driving is presented in [229] and challenges in designing such datasets are described in [230]."]} +{"170079064|3536399": ["More details on adversarial ML attacks can be found in [3], [4], [15], [16], [136], [137].", "[4] IEEE Access 195 Adversarial attacks and defenses in computer vision \u00d7 \u00d7 \u221a \u221a \u2248 \u00d7 \u00d7"]} +{"170079064|51922975": []} +{"170079064|5538934": ["[2] ACM Computing Surveys (CSUR) 40 Security of ML for malware classification \u00d7 \u221a \u221a \u2248 \u00d7 \u00d7 \u00d7"]} +{"170079064|84832337": ["For example, consider the message replaying attack by a malicious vehicle that is attempting to jam traf\ufb01c [37]."]} +{"198897554|62841734": ["Self-supervised visual representation learning An extensive review of deep learning-based self-supervised general visual feature learning methods from images or videos is provided in [26]."]} +{"198897554|3654323": ["According to recent surveys [43, 20], most methods are built on the principle of domain adversarial training [44], with differences on how to incorporate it to the training of the segmentation network.", "In domain adaptation [17, 18, 19, 20], a model is trained to perform a visual task in a specific domain (e."]} +{"247457|393948": []} +{"3306376|2088679": ["Deep neural networks have been extensively used in medical image analysis and have outperformed the conventional methods for specific tasks such as segmentation, classification and detection [1]."]} +{"62258495|15315731": []} +{"21106824|586521": ["It is lazy as they store entire the training examples [16]."]} +{"143421968|59600034": []} +{"13044786|393948": ["Learning features from data has become popular both in academia and in industry, because many interesting priors can be conveniently captured by a learner [15]."]} +{"206491372|2088679": ["Unsupervisedmachine learningmethods are also being researched, but the majority of the algorithms from 2015-2017 in the published literature have employed supervised learning methods, namely Convolutional Neural Networks (CNN) [4].", "Currently, CNNs are the most researched machine learning algorithms in medical image analysis [4].", "[4] provides a thorough list of papers published in the field, Shen et al."]} +{"206491372|3644401": []} +{"206491372|393948": ["The rationale behind this, is as Bengio states, for a given observation, only a small fraction of the possible factors are relevant, meaning that much of the features extracted from the data could be represented by being set to zero [34]."]} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"908193|18090012": ["De-identification normally allows researchers to circumvent costly consent regimes 94 , but the lack of identifiers makes certain types of population-wide research impossible, as other information cannot be linked to data subjects."]} +{"908193|2809360": ["22 and the September 2011 special issue of the Journal of the American Medical Informatics Association (JAMIA) 32 .", "It is highly heterogeneous, does not always conform to normal grammar and is rich in author-and domain-specific idiosyncrasies, acronyms and abbreviations, as well as spelling and typing errors 22 ."]} +{"44139346|393948": ["Dealing with representations explicitly may be advantageous because they can conveniently express general priors that are not specific to a single predictive task (Bengio et al., 2013), and this is particularly important for zero-shot learning (Socher et al.", "Dealing with representations explicitly may be advantageous because they can conveniently express general priors that are not specific to a single predictive task (Bengio et al., 2013), and this is particularly important for zero-shot learning (Socher et al., 2013) in unseen categories."]} +{"715578|8575576": []} +{"11391174|21386749": ["These solutions include remote health monitoring, remote diagnostics, tele-auscultation, chronic diseases management, independent care for elderly and much more [20]."]} +{"62044054|8575576": ["Histological images are more challenging due to the underlying tissue architecture, but have the benefit of providing a more comprehensive view of a disease.(20)", "5-4 billion pixels of data.(20) Additional challenges for automated methods include the large variability present including cell types, cell densities, stains, and magnification levels.", "The classifier of this data must be able to deal with large, dense datasets.(20) Ensemble schemes,(27) support vector machines,(28) and Adaboost(29) classifiers have been popular choices in automatic cytopathology classification."]} diff --git a/edge/graph_210859208.jsonl b/edge/graph_210859208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1150cc915e6dc0ebd501e441c0cc1f4cdd123d15 --- /dev/null +++ b/edge/graph_210859208.jsonl @@ -0,0 +1,13 @@ +{"52123864|20384442": ["The profit metric will be important in the 5G era [4-5] for the InPs to be guaranteed of their Return on Investment (ROI).", "[5] on the economic and pricing models for resource management in 5G Wireless Networks."]} +{"52123864|206456479": ["Although 5G Networks have not been deployed, it has been widely accepted by the academia, and the industry that Network Function Virtualization, Software Defined Networking, and Networking Slicing will play critical roles in the 5G Network architecture [3-4]."]} +{"56594839|10342730": [", [2]\u2013[5]."]} +{"53107630|52059869": ["\u03c61 = [1, 2] and \u03c62 = [2, 1], are available.", "The emerging technology of network slicing identified as the main enhancement [1] of the fifth generation of mobile networks (5G) enables infrastructure providers and mobile network operators (MNOs) to abstract (radio, transport and computational) resources in the form of logically independent \u201cnetwork slices\u201d.", "a static admission strategy that \u03c6 = [2, 1] for all s \u2208 A.", "In the numerical simulations1 we define a simplified scenario, where the MNO holds a normalized two-dimensional (M = 2) resource pool r = [1, 1] and N = 2 different slice types are defined and specified with the parameters listed in Table I."]} +{"6636212|10342730": ["Finally there is much ongoing work on developing the network slicing concept, see e.g., [18], [24] and references therein, including development of approaches to network virtualization in RAN architectures, e.g, [8], [15], and SDN-based implementation, e.g., [4]."]} +{"52157271|1185580": ["The CSCC will be implemented as an additional function on the top of the admission control framework at the orchestrator level.", "The Cross-slice Congestion Control (CSCC) function shown in Figure 4 may decide, based on resources availability, slices requirements, and the queue state, to scale down the allocated resources to one or multiples slices in order to accept a larger number of slices of higher priority.", "This intelligence is ensured by using reinforcement learning (RL) techniques that allow to make the optimal decisions jointly maximizing resources utilization and guaranteeing that available resources are allotted according to the slice priorities [17].", "The proposed CSCC has to be able to foresee the impact of such decision on the overall system performance [16].", "In this first study Q-learning is used to learn to optimal strategy to implement at the CSCC [17]."]} +{"46907091|10342730": ["To this end, multiple services over the RAN domain can flexibly utilize available radio resources, by means of virtualization [9]."]} +{"52963665|10342730": ["[10]\u2013[12]), and in [13], the authors focus on resource allocation of processing resources in network slicing in the context of C-RAN; see [14] for a survey on resource slicing in virtual wireless networks."]} +{"69955559|206578197": ["For example, the concept of WNV was discussed in [22] and [23] systematically, and then the modeling, embedding, and isolation schemes of wireless resources were studied."]} +{"69955559|206456479": ["requirements of users [13]."]} +{"69955559|31245252": ["W ITH the advent of the fifth generation (5G) mobile communication system, the Internet of Things (IoT) is merging into our daily life and bringing huge changes to future network [1]."]} +{"69955559|10342730": ["For example, the concept of WNV was discussed in [22] and [23] systematically, and then the modeling, embedding, and isolation schemes of wireless resources were studied."]} +{"69955559|3818445": []} diff --git a/edge/graph_210860959.jsonl b/edge/graph_210860959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9fd2163a48e2ddb81f2d972321902c81fa14f8b --- /dev/null +++ b/edge/graph_210860959.jsonl @@ -0,0 +1,13 @@ +{"12154662|1236072": ["This is especially true in most sensor network applications, since sensor nodes usually generate time-driven traffic or event\u00ad driven traffic [1]."]} +{"13887767|7278743": ["Bluetooth is an open technological specification for short-range wireless connectivity between electronic devices."]} +{"13750920|5660618": ["d on different system architectures, delay models, and message loss processes (see, e.g., [3, 22, 37, 46, 50, 51, 56, 59, 63]); recent surveys provide an overview of this body of fundamental research [27, 62]. However, the majority of those works focuses on theoretical analyses or validates new wireless CPS designs (e.g., based on WirelessHART [35, 42]) only in simulation, thereby ignoring many fundamenta", "x(k)\u2208Rn with discrete time index k \u2208N in response to the control input ICCPS \u201919, April 16\u201318, 2019, Montreal, QC, Canada F. Mager et al. u(k)\u2208Rm andrandomprocessnoisev(k)\u2208Rn.Astypicalintheliterature [6, 27], the process noise is modeled as an i.i.d. Gaussian randomvariablewithzeromeanandvariance \u03a3proc,v(k)\u223cN(0,\u03a3proc), and captures, for example, uncertainty in the model. We assume that the full system st"]} +{"1837434|1236072": ["A large body of research on communication issues in mobile sensor networks has been carried out [Wang et al. 2007; Al-Karaki and Kamal 2004].", "\u2026and Reijers 2003]; time synchronization protocols [Elson and Roemer 2003; Sundararaman et al. 2005]; distributed storage services [Ratnasamy et al. 2002; Luo et al. 2007]; code deployment and reprogramming functionality [Wang et al. 2006]; and routing protocols [Al-Karaki and Kamal 2004].", "2006], and routing protocols [Al-Karaki and Kamal 2004]."]} +{"596177|6875365": []} +{"202734461|5660618": ["The Bernoulli assumption is very common as it can significantly simplify control design and stability analysis [31, 71], but unlike traditional wireless systems [59] this assumption is indeed valid for our wireless embedded design (P2).", "The process noise is (as typical in the literature [6, 31]) modeled as an i.", "The control community has investigated design and stability analysis for wireless (and wired) networks based on different system architectures, delay models, and message loss processes; recent surveys provide an overview of this large body of fundamental research [31, 71]."]} +{"15475035|12817488": ["As a workaround solu-tion, all-to-all interactions are commonly split into three sequential phases: ( i ) all-to-one data collection, possibly combined with application-speci\ufb01c data aggregation [32], ( ii ) centralized processing, and ( iii ) one-to-all dissemination of the result.", "Unlike most prior aggregation schemes that fuse data toward a collection sink [32], Chaos delivers the \ufb01nal aggregate to all participating nodes.", "Consequently, there exists is a large body of previous work that uses in-network processing mainly in the context of data aggregation [25, 32] and query processing [19, 40]."]} +{"67866951|512561": ["A third type is focused on speci\ufb01c techniques , for example utilizing channel bonding to increase the bandwidth of wireless networks [28] and presenting a new fuzzy logic based node localization mechanism [29]."]} +{"11225693|8462498": ["Indeed, stateof-the-art techniques such as uplink MU-MIMO [6, 26, 40] can", "We observe that while MU-MIMO\u2019s gain over standard LoRaWAN is capped at 9.994 \u21e5 (3.04 \u21e5 ) vs. LoRaWAN(+Oracle), Choir, with even a single antenna is at 11.07 \u21e5 (3.37 \u21e5 ).", "Our experiments using MU-MIMO deploy with up to 3 base-station antennas synchronized by a Jacksonlab Fury clock.", "Further, the presence of multiple antennas can be used to further improve Choir\u2019s gain to 13.8489 \u21e5 (4.217 \u21e5 ), demonstrating that its gains are complementary to MU-MIMO.", "5), we additionally compare our system with the state-of-the-art uplink MU-MIMO [40].", "We compare our system with a baseline that employs uplink MU-MIMO [38] as well as di \ufffd erent modes of the standard LoRaWAN PHY and MAC [28].", "Indeed, state-of-the-art techniques such as uplink MU-MIMO [6, 26, 40] can at best separate as many sensor nodes as there are base station antennas (atmost 3-4 today due to limits on the size and cost [16, 27, 39]).", "We evaluate the performance of Choir relative to MU-MIMO for a base station with 3-antennas.", "Much of this work relies on using multiple antennas on wireless nodes be it MU-MIMO on the downlink [6], uplink [40] or fully distributed MIMO [33]."]} +{"11225693|1230643": ["We measure three metrics: (1) network throughput of all nodes; (2) latency measured between a beacon packet from the base station and the response packet from a client; (3) total number of transmissions and re-transmissions required to send one packet worth of data \u2013 a useful metric to measure energy efficiency, as that packet transmission is a major drain on battery for sensors [3]."]} +{"8591409|2080455": ["These operations are supported by nearly all priority queue data structures [Brodal 2013]."]} +{"5836171|12029139": []} +{"5836171|12060835": ["A few works mainly focus on integrating energy harvesting into the node design; for example, by discussing different energy storage solutions possibly coupled with WSN nodes [Sudevalayam and Kulkarni 2011; Kausar et al. 2015].", "Conversion ef\ufb01ciency data, whenever available, are taken from Vullers et al. [2009] and Sudevalayam and Kulkarni [2011]."]} diff --git a/edge/graph_210861185.jsonl b/edge/graph_210861185.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..253bee41d240d703aabada94c5eba87bbb3d6436 --- /dev/null +++ b/edge/graph_210861185.jsonl @@ -0,0 +1,24 @@ +{"195457135|4640616": ["Among others, evolutionary algorithm is one of the most promising categories of search algorithms for many SBSE problems [2][13]."]} +{"8622994|7774517": ["The problem of detecting sensory measurements that mismatch with the expected pattern of observed data has been thoroughly studied in the literature [11], with the aim of eliminating outliers from the fusion process."]} +{"46937368|14843594": ["\u201cexpected improvement\u201d acquisition function for BOGP [19], which measures the expected amount of improvement of a configuration w.", "7 re-routing frequency [10-70] Controls how often the router should be invoked to re-route a smart car", "Optimization in the BOGP framework works in the following way [19].", "5 exploration weight [5-20] Controls the degree of exploration of the explorers"]} +{"102496634|4640616": ["In this work, we focus on the performance indicators that demands regression as they are arguably the most popular ones in existing work [21][22]."]} +{"8648737|10464056": []} +{"13266016|1975139": ["Self-adaptivity has been a goal of software and systems engineering research for some time, with work on architectures to support adaptive middleware [11, 59], Artificial Immune Systems (AIS) [45] for intrusion detection [47] and fault tolerance [68] and the vision of autonomic systems [29]."]} +{"49247633|6076208": ["A general survey on using SBSE within software engineering is available in [59], while the comprehensive survey from [3] focuses on the application of SBSE to software architecture design."]} +{"83458695|59943180": []} +{"83458695|8530790": ["The dominance ranking indicator considers the combined collection of all the sets and assigns each set a rank on the basis of a dominance criterion, for example, dominance count Fonseca and Fleming (1995) or nondominated sorting Goldberg (1989). However, all dominance-based QIs have some weaknesses. They provide little information about what extent one set outperforms another. More importantly, they may leave solution sets incomparable if all solutions of the sets are nondominated to each other, which may happen frequently in many-objective optimisation Ishibuchi et al. (2008); Li et al.", "The dominance ranking indicator considers the combined collection of all the sets and assigns each set a rank on the basis of a dominance criterion, for example, dominance count Fonseca and Fleming (1995) or nondominated sorting Goldberg (1989). However, all dominance-based QIs have some weaknesses. They provide little information about what extent one set outperforms another. More importantly, they may leave solution sets incomparable if all solutions of the sets are nondominated to each other, which may happen frequently in many-objective optimisation Ishibuchi et al. (2008); Li et al. (2015b); Purshouse and Fleming (2007).", "The dominance ranking indicator considers the combined collection of all the sets and assigns each set a rank on the basis of a dominance criterion, for example, dominance count Fonseca and Fleming (1995) or nondominated sorting Goldberg (1989). However, all dominance-based QIs have some weaknesses. They provide little information about what extent one set outperforms another. More importantly, they may leave solution sets incomparable if all solutions of the sets are nondominated to each other, which may happen frequently in many-objective optimisation Ishibuchi et al. (2008); Li et al. (2015b); Purshouse and Fleming (2007). In addition, it is worth noting that some dominance-based QIs may partially imply the cardinality of a solution set since a bigger-size set may result in more solutions nondominated, such as the C Zitzler and Thiele (1998), contribution indicator Meunier et al. (2000), and Pareto dominance indicator Goh and Tan (2009).", "The dominance ranking indicator considers the combined collection of all the sets and assigns each set a rank on the basis of a dominance criterion, for example, dominance count Fonseca and Fleming (1995) or nondominated sorting Goldberg (1989).", "The dominance ranking indicator considers the combined collection of all the sets and assigns each set a rank on the basis of a dominance criterion, for example, dominance count Fonseca and Fleming (1995) or nondominated sorting Goldberg (1989). However, all dominance-based QIs have some weaknesses. They provide little information about what extent one set outperforms another. More importantly, they may leave solution sets incomparable if all solutions of the sets are nondominated to each other, which may happen frequently in many-objective optimisation Ishibuchi et al. (2008); Li et al. (2015b); Purshouse and Fleming (2007). In addition, it is worth noting that some dominance-based QIs may partially imply the cardinality of a solution set since a bigger-size set may result in more solutions nondominated, such as the C Zitzler and Thiele (1998), contribution indicator Meunier et al.", "The dominance ranking indicator considers the combined collection of all the sets and assigns each set a rank on the basis of a dominance criterion, for example, dominance count Fonseca and Fleming (1995) or nondominated sorting Goldberg (1989). However, all dominance-based QIs have some weaknesses."]} +{"1487611|8914588": ["However, adaptation in some classes of systems \n(e.g., safety\u00adcritical) can bene.t by receiving information from humans (e.g., acting as sophisticated \nsensors, decision-makers), or by involving them as system-level effectors to execute adaptations (e.g., \nwhen automation is not possible, or as a\u2026"]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"205708506|9766972": []} +{"205708506|8296351": ["Extended feature models can also include complex constraints among feature attributes [9].", "Our approach of preprocessing is by exploiting the core features and dead features [9] of the products.", "Besides, to improve the efficiency of searching, before the execution of an EA, the feature model is first preprocessed via propositional satisfiability (SAT) solving to remove the core (or dead) features that must be selected (or deselected) [9]."]} +{"205708506|417250": []} +{"8395709|14022070": ["A natural choice in any approach to testing a software product line (with its characteristic feature combinations) is the use of Combinatorial Interaction Testing (CIT) [122]."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"207171842|8914588": ["2006; Huebscher and McCann 2008].", "point out, trust is not necessarily based on self-adaptive services or its quality [McCann et al. 2006; Huebscher and McCann 2008]."]} +{"207171842|1975139": ["survey several ADLs based on graphs, process algebras, and other formalisms for dynamic software architectures [Bradbury et al. 2004]."]} +{"11057538|59943180": ["Then where l is the Euclidean distance between P 1 and P 2 (i.e., Since the polygon is regular, the same property holds for the edge \u2190\u2212\u2212\u2192 A 2 A 3 , with the difference that the angle between \u2190\u2212\u2212\u2192 A 2 A 3 and X axis is 2 \u03c0/m ."]} +{"14857290|4474193": ["needs to take into account changes during the optimization process as time goes 36 by [1, 12, 13].", "\u2022 Slow : Continuously focusing on diversity may slows down, or even distract 706 the optimisation process [12].", "\u2022 Difficulty in identifying the correct mutation size (in case of Hyper-mutation 610 and VLS) or the number of sub-swarms (in case of Hierarchy PSO): too small 611 steps will resemble local search while too large steps will result in random 612 search [12].", "the broader area of uncertainty and dynamic environments, was briefly surveyed 59 and classified in 2005 in [12]."]} +{"33944708|8296351": ["\u2026=\u21d2 HSPA \u2228 LTE \u2228 WiFi (1) Thanks to the extensive use of FMs, it is possible to take advanage of their wide support (Acher et al., 2010; Benavides et al., 2010;\natinlassi, 2004; White et al., 2009a) and the existing tools (e.g., AMA,2 Hydra,3 SPLOT,4 FeatureIDE; Kastner et al.,\u2026", "In this sense, several algorithms have been defined which are able to obtain an optimal configuration of an FM according to a given optimization criteria (Benavides et al., 2010; Guo et al., 2011; Li et al., 2012; Sayyad et al., 2013; Soltani et al., 2012; White et al., 2009a, 2009b).", "Thanks to the extensive use of FMs, it is possible to take advanage of their wide support (Acher et al., 2010; Benavides et al., 2010; atinlassi, 2004; White et al., 2009a) and the existing tools (e."]} +{"16087537|8296351": ["Result of Number Of Products operation [3] considering attributes as decision variables.", "Finally, a wide catalog of analysis operations [3] is also available to extract information from these models and, therefore, we can apply or tailor existing analysis operations to our purposes."]} +{"67724178|6076208": ["Recent SLRs in the fields of empirical software engineering [43] and search-based software engineering [26], [44] have been taken as a reference, too.", "requirements management [24], software design [25], [26],", "[26] for the field of Operations Research), may be important for promoting future industrial adoption."]} +{"67724178|17446703": ["Recent SLRs in the fields of empirical software engineering [43] and search-based software engineering [26], [44] have been taken as a reference, too."]} diff --git a/edge/graph_210867635.jsonl b/edge/graph_210867635.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c593447289e45cde790dc4030d5842d99db9533 --- /dev/null +++ b/edge/graph_210867635.jsonl @@ -0,0 +1,33 @@ +{"18318380|14047190": ["After transforming the data, we investigated the preliminary feasibility of these behavioral biometrics by k-NN classification method that is widely used in data analysis [8] [ 11 ]."]} +{"14300465|15219853": ["Behavioral biometrics is mostly non-intrusive and includes touch gestures, motion, and orientation (that one normally applies to mobile devices), as well as other characteristics such as eye tracking, voice, mouse dynamics, handwriting, grip, or gait/stride [40] which users worldwide are performing daily.", "Further, natural motions are committed continually in holding or walking around with a device or when holding it up to the user\u2019s ear; therefore there is an opportunity for a continuous form of authentication [40].", "\u201cbehavioral biometrics,\u201d covers many gestures like touch, motion, orientation, mouse dynamics, handwriting, voice, hand geometry, and gait [40]."]} +{"52931303|15219853": ["Different authentication schemes based on behavioural biometrics have been proposed as illustrated in [5], [6]."]} +{"53109025|393948": ["Those techniques have been employed in many ields, with various applications, as reported in [9, 10].", "This process is sometimes labor-intensive and heavily dependent on human prior-knowledge in the classiication application ield [10]."]} +{"3154215|15219853": [", retinal patterns [9], fingerprint [13], facial features [17]) could provide stable and accurate verification rate for the their trait of static, behavioral biometrics [15] have advantage over traditional biometric technologies due to their non-obtrusive."]} +{"6121466|17950466": ["\u2026a variety of angles, including the way in which individuals type on a keyboard (keystroke dynamics e.g. Maxion et al., 2010; Killourhy et al., 2009; Banerjee and Woodard, 2012; Monrose and Rubin, 2000; Zahid et al., 2009), how they use their mouse (Zheng et al., 2011; Shen et al., 2013) and even\u2026", "Human\u2013computer interaction research has explored potential sources of behavioural biometric material from a variety of angles, including the way in which individuals type on a keyboard (keystroke dynamics e.g. Maxion et al., 2010; Killourhy et al., 2009; Banerjee and Woodard, 2012; Monrose and Rubin, 2000; Zahid et al., 2009), how they use their mouse (Zheng et al."]} +{"9269724|17950466": ["Over time, the security field has categorized these into three primary groups [1]:", "These areas include desktop keystroke dynamics using traditional methods [1], mobile phone keypress dynamics using traditional methods [18] and key inference using side-channel sensors [13].", "A wide variety of extracted features, learning algorithms, success metrics and testing environments have been studied [1,14].", "Additionally, studies can either focus on authentication of a single user or identification from among a pool of users [1]."]} +{"18395575|15219853": ["Human behavioural is generated from motor-skills [19]."]} +{"17095570|9913343": ["\u20262005a], and BDAS [Dunphy and Yan 2007]\u2014have been proposed in the past decade (for more, please refer to Dhamija and Perrig [2000], Thorpe and Van Oorschot [2004], Suo et al. [2005], Chiasson et al. [2007], Gao et al. [2008], Bicakci et al. [2009], Biddle et al. [2011], and Chiasson et al. [2012])."]} +{"17574321|192934": []} +{"32048|5313655": []} +{"36465362|9576764": ["Patel et al. [20] and Teh et al. [71] provide good reviews of extant research and identify promising avenues in this \ufb01led."]} +{"36465362|6670217": ["A widely-adopted mechanism for addressing this problem is smartphone authentication [5], such as PIN-based passcodes, pattern-based passcodes, \ufb01ngerprints and faces, which have been integrated into smartphone operating systems."]} +{"8443300|15219853": ["Yampolskiy and Govindaraju [10], 2008 X x x x x x x x"]} +{"8443300|9913343": ["These methods are also deficient in dealing with various non-conventional attacks such as smudge attack [21], which picks up oils from users\u2019 skin to detect patterns or PINs, or a make conventional one such as the shoulder surfing attack, which uses direct observation techniques like glancing over the shoulder of a user to gain information [19].", "smudge attacks [21] and shoulder surfing attacks [19]), overcome evasions, and also be practical.", "weaknesses of the current security mechanisms are that they are easy to evade, weak against shoulder surfing and other attacks and cumbersome to use [19]."]} +{"8443300|17950466": ["example, FAR is defined as the percentage of impersonators who were incorrectly identified by security systems as genuine users [26].", "the shape and flow of one\u2019s handwriting, timing of keystrokes, unique patterns inherent in one\u2019s gait, speech and usage of styluses, and other features of one\u2019s general behavior [26].", "of biometrics, generally, is divided into two groups based on the type of application: identification and authentication [26]."]} +{"13982453|9913343": []} +{"28191008|206602044": []} +{"28191008|17574321": ["In order to answer this question the following list of characterstics of optimal features were identified ( Hansen & Hasan, 2015;\ninnunen & Li, 2010 ):\n1) Easily measurable and extractable."]} +{"916546|5313655": ["There has been lots of work on voice, as Jain et al 3 and Rathgeb et al 6 discussed in their survey papers which discuss the state of the art."]} +{"4452207|5724477": []} +{"17237637|17950466": ["Some works concentrate on authentication while others, like this work, concentrate on identifying a user from a pool [1], [12]."]} +{"49538447|17950466": ["A lower FAR is preferred in cases where security is very important [36]."]} +{"44130250|18599847": []} +{"44130250|9928823": []} +{"44130250|1634674": []} +{"7359259|365692": ["4) Decision Tree (DT): DT is a tree structure based predictive learning model which maps features of an observation about an item to the item\u2019s target value where leaves represent class labels, and branches represent conjunctions of features that lead to those class labels [25]."]} +{"7359259|15219853": ["KEYSTROKE DYNAMICS (KD) is a well established behavioural biometric modality due to the unobtrusive nature of biometric data collection, low computational complexity and no special hardware required for data collection [1]\u2013[4]."]} +{"7359259|17950466": ["In such a system, the keystroke timing information has to be captured for pattern analysis [2], [5]."]} +{"30234301|18315586": []} +{"30234301|15219853": []} +{"86486914|14116122": ["[22] provided a detailed review of recent and state-of-the-art research advances in the field of human activity classification."]} +{"10994869|192934": ["It has been established that descriptive statistics have the ability to determine potential positive features for forming unique patterns to discriminate individual users [18]."]} diff --git a/edge/graph_210869519.jsonl b/edge/graph_210869519.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..191166b7b95ef9b96766907555b2c3b3369c6144 --- /dev/null +++ b/edge/graph_210869519.jsonl @@ -0,0 +1,46 @@ +{"23207276|1333339": ["There are many solutions proposed in the literature dealing with trust models for mobile ad hoc networks, as presented in [9]."]} +{"27353195|2835258": []} +{"36559659|1333339": []} +{"36559659|62617427": []} +{"16640429|12815020": []} +{"11421219|17934515": []} +{"59553818|36400013": ["Existing surveys including [6] [7] have not yet covered the trust-based schemes for routing scenarios and still there is a gap."]} +{"59553818|62617427": ["Existing surveys including [6] [7] have not yet covered the trust-based schemes for routing scenarios and still there is a gap."]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"14247647|1333339": []} +{"199007325|4880047": ["through the architecture and through enabling technologies [40, 66, 67] such as SDN and NFV."]} +{"199007325|6197039": ["and hardly take into consideration network-level properties including feedback, cooperation and cognition [53].", "5G offers strong PLS mechanisms that can mitigate such attacks [59, 53]."]} +{"199007325|2014729": []} +{"199007325|42420797": ["Furthermore, cloud RAN is prone to various threats such as DoS, man-in-the-middle, malicious node problems, and inconsistent security policies [70]."]} +{"199007325|19938676": ["Next, we discuss the specific 5G security architecture with a special emphasis on the supported security features and potential security challenges [46, 47, 48]."]} +{"199007325|3453202": []} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"198930967|19181256": ["VANET has its own unique characteristics when compared with other types of Ad hoc networks, the unique characteristics of VANET includes [5] [6] :"]} +{"7703219|16335158": ["In the CC, MCC and Sensor-cloud architecture, a physical datacentre unit is in charge of performing the data computation and storage (Hossain, 2013), (Dinh, Lee, 2011)."]} +{"7703219|16654832": ["However, the mobile devices suffer from computing resources limitations, battery restriction and processing time (Shiraz et al., 2012)."]} +{"35389397|15093118": []} +{"33627357|763939": []} +{"33627357|207424517": []} +{"195282045|38911919": ["Throughout the literature, group formation enhances vehicular safety in VANETs [1, 8\u201311]."]} +{"195282045|62617427": ["Many researchers investigated the Trust evaluation within VANETs [ 15\u2013 39 ] using various Trust establishment approaches can be divided into an infrastructure based trust or self-organizing based trust [15].", "The proposed solutions mentioned above [ 15\u2013 38 ] designed particularly As a result, this triggers further research in this \ufb01eld for potential improvements to de\ufb01ne a new framework for a trust model in VANETs."]} +{"49186154|36400013": [", entity-oriented, data-oriented and hybrid TMs [16]\u2013[19]."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"203165058|3630870": ["[25] launched a survey on pseudonym changing strategies for VANETs."]} +{"203165058|36400013": ["Specifically, in VANETs, it can be ensured by using the public key infrastructure and cryptography revocation process [48].", "If more dangerous attacks happen in VANETs, then availability is more than any other security aspect [48].", "In this attack, untrustworthy vehicles can replicate the same messages by modifying the message or generate and insert a new message in the VANETs while behaving as a transmit node for intervehicle communication [48].", "It is the variant of blackhole attack, and it occurs when untrustworthy vehicles select some of the data packets to forward and drop the others packet without being tracked [48]."]} +{"61271790|32692242": []} +{"206904116|6556803": ["We assume that the arrival rates of \u201eagree\u201f and \u201edisagree\u201f messages regarding an event are based on a Poisson process with the rate of \u03bb and \u03bc [20], [21].", "The Markov chain, as a tool for optimal decision-making, has frequently been used in wireless networks [20]."]} +{"28812378|2835258": ["On the other hand, the communication system will depend on correct sensor data; for geographic based routing, as it will probably be employed in vehicular networks [4], this is the position of neighboring nodes."]} +{"36400013|10137283": ["Trust can be defined as a subjective belief of a peer about other peers belonging to the same society or geographical zone [9]."]} +{"49325841|6779551": []} +{"18722494|14745481": ["proposed and studied during the last decade [5]."]} +{"86588961|3630870": []} +{"32238406|2294541": []} +{"49326208|17279511": []} +{"5052420|6909107": []} +{"7855317|1333339": ["Bad mouthing attack is very common in recommendation based trust computing methods [19].", "A fairly comprehensive survey on various trust computing approaches geared towards MANETs is provided in [19].", "As well, a significant body of work has been dedicated to survey existing trust-based defense approaches for mobile ad hoc networks [11], [14], [15], [19], [23], [41], [47].", "Over recent years, a number of research [11], [14], [15], [19] has been carried out overviewing recent advancements and trends in providing trust management frameworks for MANETs."]} +{"7855317|17067678": ["A significant number of research papers [3], [26], [38] are dealt with generalized security issues and possible countermeasures in MANETs."]} +{"7855317|10837932": ["Along with recent green trend which aims at diminishing the environmental pollution of Information and Communication Technology (ICT) sector [8],"]} +{"7855317|14745481": ["As well, a significant body of work has been dedicated to survey existing trust-based defense approaches for mobile ad hoc networks [11], [14], [15], [19], [23], [41], [47].", "mouthing attacker can frame good nodes, disseminating false accusation that a disciplined node is malicious or misbehaving [11], also referred to as blackmailing.", "2496147 allow nodes infer how much they can trust on other nodes\u2019 behavior [11].", "Over recent years, a number of research [11], [14], [15], [19] has been carried out overviewing recent advancements and trends in providing trust management frameworks for MANETs.", "In [11], authors provided an overview on various potential attacks in MANETs and enumerated metrics used in the literature to measure the performance of existing trust frameworks."]} +{"10305213|763939": []} diff --git a/edge/graph_210873518.jsonl b/edge/graph_210873518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210883031.jsonl b/edge/graph_210883031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff9a5d0f7ed130fb3988ab77e16f06c973270fb8 --- /dev/null +++ b/edge/graph_210883031.jsonl @@ -0,0 +1,6 @@ +{"49416376|10903568": []} +{"19007668|4110304": []} +{"52965836|3342225": ["[63] reviewed methods for explaining black-box models at a large scale including data mining as well as machine learning."]} +{"52965836|17779926": ["One effort to gain insight into highly complex models is the use of rule extraction [114]\u2013[116]."]} +{"51607811|7681233": ["The individuals then form a network of trust based on techniques from the reputation modelling literature [Yu et al. , 2010; Yu et al. , 2013] to achieve collective self-governance through dynamic interactions."]} +{"41366996|17756238": ["surveillance and threats to data protection and privacy (Zimmer, 2008; Toch et al., 2012; Lyon, 2003);", "\u2026example, censorship by intelligent filtering (Zittrain and Palfrey, 2008);\n4. surveillance and threats to data protection and privacy (Zimmer, 2008; Toch et al., 2012; Lyon, 2003);\n5. social discrimination (Gandy, 2010; Gangadharan, 2014);\n6. violation of intellectual property rights (Clark, 2010,\u2026"]} diff --git a/edge/graph_210888245.jsonl b/edge/graph_210888245.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..739ead5a39c791cd4ea5eed2278c513038e78b0c --- /dev/null +++ b/edge/graph_210888245.jsonl @@ -0,0 +1,40 @@ +{"56596419|4427557": ["Among dozens of the LPWAN technologies existing today, LoRaWAN [2]-[4] is among the most popular ones.", "Albeit the landscape of the wireless communication technologies today is excessively diverse [1], the ones, which are known as the Low Power Wide Area Networks (LPWANs) [2][3], stand out of the mass."]} +{"53719103|4427557": ["This scalability problem in LPWA technologies has been seriously issued to meet the requirements of IoT applications [5-11]."]} +{"115202105|4427557": ["The LoRaWAN standard is open and is under active development by commercial and industrial partners [4]."]} +{"55701846|53711791": ["data collection applications [3] such as environmental monitoring applications."]} +{"55701846|10329355": [", vehicle and railway infrastructure monitoring [7], traffic monitoring [8], air quality monitoring [9], smart metering [10], etc."]} +{"55701846|17905276": [", vehicle and railway infrastructure monitoring [7], traffic monitoring [8], air quality monitoring [9], smart metering [10], etc."]} +{"208243485|16762549": ["Such increase in the connected devices will bring a burden in terms of the uplink data since these devices are also considered as data generators [3]."]} +{"208243485|4427557": ["LoRaWAN is a promising IoT technology due to its low power consumption and long distance transmission capability [5]."]} +{"4382139|6275330": []} +{"4382139|1230643": ["The BS, also known as the sink, usually communicates with the users through a satellite or an internet connection [1]."]} +{"4382139|10559330": ["QoS is achieved in this approach through particular QoS methodologies such as queuing mechanism, admission control, and traffic class and policy managers [12]."]} +{"4382139|14133285": ["Jadhav and Satao [98] have discussed the opportunistic routeing protocol(OPR) for WSNs.", "[98] P. Jadhav and R. Satao, \u2018\u2018A survey on opportunistic routing protocols for wireless sensor networks,\u2019\u2019 in Proc."]} +{"54222295|51716069": ["The first type is the low-power nodes that mostly rely on battery power [151]."]} +{"54222295|3450189": ["For instance, Gomez et al. [107] and Darroudi and Gomez [264] review the BLE standard from a protocol stack point of view and research to provide a BLE mesh network, respectively.", "[107] and Darroudi and Gomez [264] review the BLE standard from a protocol stack point of view and research to provide a BLE mesh network, respectively."]} +{"54222295|4427557": ["[263] reviewed the LPWAN for long-range communication networks such as SigFox and LoRaWAN."]} +{"54222295|13361214": ["[79] pointed out the overhead of topology change in large-scale networks."]} +{"54222295|8618569": ["attacks by generating a different session, joint, and network keys [90]."]} +{"51973597|4427557": ["tances greater than 15 km in sub-GHz bands [30]."]} +{"51973597|6556803": ["It is usually accepted that this otherwise infinite lifespan of motes may come to an end with certain small probability [6], [10].", "framework stands out for its particularly well-suited form, optimal results and mathematical robustness [10]."]} +{"122577849|11293874": ["Data collection through the formerly mentioned methods provides pertinent information, but these statistics cannot be treated always as the reliable medical record since elderly people often forget or fail to recall the precise circumstances of their fall event [5], [6].", "It is crucial for the healthcare providers to determine circumstances and scenarios that led to a fall event and advise a mechanism to mitigate such falls [5]."]} +{"49555884|4427557": ["LPWAN are designed to allow wide-area connectivity for low power at a low bit rate [7]."]} +{"7861232|17708892": ["Among the recently proposed LPWAN standards, including the SIGFOX, INGENU, TELENSA, and the 3GPP NB-IoT, LoRa is considered of having strengths in many of the aforementioned aspects [4],[5]."]} +{"51925882|4427557": ["To this end, low-power wide-area networks (LPWAN) are recently taking the research spotlight [4]."]} +{"51925882|485843": ["In urban cities, as the massive number of metering devices are to be connected, the choice of the communication technology depends on the number of supported devices and its scalability [9]."]} +{"51925882|3494096": ["At the moment, IoT applications are supported by available technologies such as Zigbee, Bluetooth and WiFi for short-range communication; and cellular networks (e.g., 3G, LTE, 5G) for long-reach scenarios [2], [3]."]} +{"206491297|6909107": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|21386749": ["An extensive survey is presented in [10], with focus placed on commercially available solutions, possible applications, and remaining problems.", "work of devices interacting with each other via machine to machine (M2M) communications, enabling collection and exchange of data [7], [10], [11]."]} +{"206491297|3042864": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|23893450": ["crash-avoiding cars [19], and smart grids [20]."]} +{"44085007|4427557": ["The trade-off is with regards to the volume of data that can be relayed back to base [63]\u2013[65]."]} +{"44085007|21386749": ["These, as well as cross-application with supporting technologies [15]\u2013[17] helps to generate a range of novel medical applications [18] including imaging [19]\u2013[21] and object detection [22] that address growing societal needs for early cancer detection and"]} +{"208107514|4427557": ["LoRaWAN, SigFox, NB-IoT, Weightless, and other sub-GHz communication technologies are successfully providing these functionalities, however, LoRaWAN took the attention of organizations, communities, and researchers and have become a popular LPWAN technology [1]."]} +{"1527872|4427557": ["Given the inadequacies of legacy communication solutions (expensive hardware and communication costs and short battery life), a new breed of connectivity solutions have emerged popularly referred to as Low Power Wide Area (LPWA) networking technologies [6]."]} +{"5330658|485843": ["Smart grids add value to the entire industry, but the segments in which its application is most intensive is in distributed generation and mainly in the distribution system [2, 3].", "9% or higher), performance, and security are more under the control of distribution company if the infrastructure is own [3].", "Table 1 presents the typical requirements of a smart grid network [3, 4, 6].", "The basic idea of distribution system automation is to allow management (supervision and control) of network elements remotely from an operations center [3].", "In the case of DA actions must be taken by an operator who performs a fault diagnosis and try to restore as much as possible of network segments [3, 5].", "This system shall take decisions autonomously to open and close ARs in order to restrict the scope of a failure and restore maximum number of possible network segments [3]."]} +{"3470128|4427557": ["Industry, academia and standards development organizations have devoted significant efforts to LPWAN in the last years [1,2]."]} +{"59230987|4427557": ["An overview of various LPWAN technologies, including LoRa and SigFox, is provided in [12]."]} +{"86596330|210888245": []} +{"16344|4427557": ["These types of requirements are hard to ful\ufb01ll using traditional Machine to Machine technologies such as cellular or WPAN [2].", "2768498 technologies such as cellular or WPAN [2]."]} +{"203700773|3450189": []} +{"203700773|4427557": ["Comparing with other technologies, such as NB-IoT and Sigfox, LoRaWAN operates in the license-free spectrum, whereas NB-IoT uses licensed frequency bands.", "LPWANs include several technologies, such as LoRaWAN, SigFox, and NB-IoT [24]."]} diff --git a/edge/graph_210889050.jsonl b/edge/graph_210889050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57efe6fd5b35b94d5ad33b570c2afc27bae0effe --- /dev/null +++ b/edge/graph_210889050.jsonl @@ -0,0 +1,25 @@ +{"57765051|33775901": []} +{"42296715|7782275": []} +{"202149525|7782275": ["Meta-feature selection is just an instance of feature selection [43].", "The use of a feature-selection algorithm can be an alternative to deal with this problem [43, 61]."]} +{"6898072|11608263": ["These algorithms are usually grouped into two general categories: problem trans\u00adformation \nand algorithm adaptation [Tsoumakas and Katakis 2007; Tsoumakas et al. 2010].", "Therefore, the multilabel \nclassi.ca\u00adtion, which is drawing more and more attention in the .eld of data mining [Tsoumakas and Katakis \n2007; Tsoumakas et al. 2010; Spyromitros Xiou.s et al. 2011; Katakis et al. 2008; Clare and King 2001; \nVeloso et al. 2007; Esuli et al. 2008; Zhang 2009; Godbole\u2026", "\u2026well-known metrics \nHamming Loss, Precision, Recall, F-measure, and Accuracy, which were proposed for performance evaluation \nin mul\u00adtilabel learning [Tsoumakas and Katakis 2007; Tsoumakas et al. 2010; Godbole and Sarawagi 2004; \nSchapire and Singer 2000; Read et al. 2009; Sechidis et al. 2011],\u2026"]} +{"6898072|192934": ["(3) Landmarking-Based Measures This kind of measure falls within the concept of landmarking [Pfahringer et al. 2000; Bensusan and Giraud-Carrier 2000; Jain et al. 2000; Duin et al. 2004].", "(3) Landmarking-Based Measures This kind of measure falls within the concept of landmarking [Pfahringer \net al. 2000; Bensusan and Giraud-Carrier 2000; Jain et al. 2000; Duin et al. 2004]."]} +{"261945|5281246": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|14659766": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|2840997": ["applications including formal verification [81], scheduling [20], planning [59] and graph coloring [110]."]} +{"205699441|192934": ["Moreover, the hold-out method and leave-oneout method suffer from either large bias or variance [10]."]} +{"29746357|11632848": []} +{"29746357|192934": []} +{"644234|14659766": []} +{"9367548|11894197": []} +{"29291215|7782275": []} +{"29291215|191396": []} +{"29291215|3330313": []} +{"37599234|11894197": ["As well as their extremely high dimensionality, microarray datasets have other properties that complicate the classification task [3,4]."]} +{"2351470|192934": []} +{"53750327|69981142": []} +{"53750327|3053192": ["Another approach for online algorithm selection and the selection of an appropriate algorithm for a given problem instance is provided by so-called hyper-heuristics; these are algorithms for selecting or generating solvers for a given problem from a set of given heuristic components (Burke et al., 2013).", "\u2026approach for online algorithm selection and the selection of an appropriate algorithm for a given problem instance is provided by so-called hyper-heuristics ; these are algorithms for selecting or generating solvers for a given problem from a set of given heuristic components (Burke et al., 2013)."]} +{"53750327|33583074": ["Overviews on the early works related to this problem class can be found in Pitzer and Affenzeller (2012), Malan and Engelbrecht (2013), Sun et al. (2014) and Mu\u02dcnoz Acosta et al. (2015b)."]} +{"53750327|14659766": ["Over the years, algorithm selection techniques have achieved remarkable results in several research areas \u2013 especially for discrete combinatorial problems (see, e.g., Smith-Miles, 2009; Kotthoff, 2014).", "A more recent overview on algorithm selection was published by Kotthoff (2014).", "The ASAP planning system is based on similar ideas (Vallati et al., 2013, 2014)."]} +{"52964798|7885409": []} +{"52964798|7782275": []} +{"52964798|207372751": []} diff --git a/edge/graph_210897864.jsonl b/edge/graph_210897864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33b101f23a3ff302d21a5c2e41bd86d9e4831cd7 --- /dev/null +++ b/edge/graph_210897864.jsonl @@ -0,0 +1,17 @@ +{"11495077|19938676": ["Hence, novel multiple access techniques and efficient network architectures are needed for modern cellular networks [2]."]} +{"30284563|12060835": []} +{"2471950|10310014": ["Up until recently, PSC has been handled through narrowband communication technologies such as the land mobile radio (LMR), which can deliver reliable voice communications, but do not support broadband data [1], and are also often limited in terms of coverage and interoperability [2]."]} +{"4945649|19938676": ["2Such system is practically applicable for the future wireless networks, such as cellular networks [10], and cognitive relay networks [13].", "For example, in the fifth generation (5G) cellular networks, a single relay (or multiple relays) assists the bidirectional information exchange between the base station (BS) and mobile users (USs) [10]\u2013[12]; in overlay cognitive cooperative 5G cellular networks, the two-way information exchange between the primary BS and primary mobile USs can be accomplished via secondary relay(s) [13], [14]; in vehicle-tovehicle cooperative systems, a roadside BS can communicate bidirectionally with several vehicle USs with the aid of fixed relays or mobile relays [15]."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"4599139|4502294": ["INTRODUCTION In recent years, the growing demand for higher data rate has become the main challenge in the fifth-generation wireless communication [1]."]} +{"14232575|41035405": []} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"4949537|61132": []} +{"4951980|3055684": ["Several storage methods for energy harvesting are described in [11], including energy tunneling and water-flooding."]} +{"4951980|12060835": ["Several sources of energy harvesting are described in [9] [10], including thermal energy harvesting, solar energy harvesting, wind harvesting, vibration energy harvesting, and radio frequency energy harvesting."]} +{"5030704|12029139": ["Radio frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to power the next generation wireless networks [3].", "2Please note, this is also known in the literature [3], [15] as harvest-use architecture as opposed to the harvest-store-use architecture the channel gains such as |hSR|(2) and |hRD|(2) are exponential random variables (RVs) with mean values of \u03bb1i and \u03bb2j , respectively."]} +{"7346954|3054454": ["In order to make the simulation more realistic, we use Lee\u2019s channel model described in [27] to generate RTx and RRx."]} diff --git a/edge/graph_210898522.jsonl b/edge/graph_210898522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210911707.jsonl b/edge/graph_210911707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4886280c629958fb781b51c1552886648c910391 --- /dev/null +++ b/edge/graph_210911707.jsonl @@ -0,0 +1,5 @@ +{"17865893|207216469": ["A recent Systematic Literature Review (SLR) [19] aggregated and described the state of the art related to estimation techniques, e\ufb00ort predictors, accuracy measures and agile methods used, gathered from 20 papers reporting 25 studies.", "A recent Systematic Literature Review (SLR) [19] aggregated and described the state of the art related to estimation techniques, effort predictors, accuracy measures and agile methods used, gathered from 20 papers reporting 25 studies.", "This \ufb01nding is in line with the results of the SLR [19], where these team related cost drivers were the ones that are identi\ufb01ed in most of the primary studies.", "These findings also corroborate those from the SLR [19].", "project domain and non functional requirements, that are considered important by several respondents (about 40%); these findings are contrary to those from the SLR [19].", "As a follow up research, the survey detailed herein gathered evidence on the state of the practice on e\ufb00ort estimation in ASD, in order to complement the \ufb01ndings from the SLR and provide a combined and detailed understanding relating to e\ufb00ort estimation in ASD.", "Note that none of the primary studies included in the SLR [19] investigated the application of e\ufb00ort estimation techniques in combination.", "We believe that this issue has been mitigated, since the questionnaire was iteratively designed and updated by the authors based on the results from the SLR [19].", "Note that none of the primary studies included in the SLR [19] investigated the application of effort estimation techniques in combination.", "These \ufb01ndings are in line with the results of an SLR [19] on e\ufb00ort estimation in ASD.", "These \ufb01ndings also corroborate those from the SLR [19].", "These findings are in line with the results of an SLR [19] on effort estimation in ASD.", "Due to its focus on fully refereed empirically-based research, the SLR did not include works that were not peer reviewed, white papers, technical reports, and practitioners\u2019 opinion in articles/forums/blogs.", "However we also identi\ufb01ed some cost drivers in the survey presented here, e.g. project domain and non functional requirements, that are considered important by several respondents (about 40%); these \ufb01ndings are contrary to those from the SLR [19].", "This finding is in line with the results of the SLR [19], where these team related cost drivers were the ones that are identified in most of the primary studies."]} +{"15036265|627405": []} +{"18054013|206778480": ["A literature study published in 2011, [8], found that 208 papers were published on this subject between 2000 and 2010 and since then the number of papers has increased."]} +{"18054013|15273230": ["In the literature, two options are usually presented for adding more defective entities: oversampling (when some defective entities are duplicated) and SMOTE (when new minority-class entities are created using the existing ones) [23]."]} +{"206541802|207216469": ["Effort Estimation in Agile Software Development: A Systematic Literature Review, PROMISE '14 Proceedings of the 10th International Conference on Predictive Models in Software Engineering, Torino, Italy, 82-91.", "\u2026on gathering the criteria specific for software effort estimation from the existing literature (Abouelela and Benedicenti, 2010; Hearty et al., 2009; Mendes et al., 2012; Misirli and Bener, 2014; Nagy et al., 2010; Perkusich et al., 2013; Radlinski, 2010; Torkar et al., 2010; Usman et al., 2014).", "There is a great diversity in the use of cost drivers and no consensus exists regarding which criteria should be used in a specific context (Usman et al., 2014).", "A Systematic Literature Review (Usman et al., 2014) confirms these results.", "This step focuses on gathering the criteria specific for software effort estimation from the existing literature (Abouelela and Benedicenti, 2010; Hearty et al., 2009; Mendes et al., 2012; Misirli and Bener, 2014; Nagy et al., 2010; Perkusich et al., 2013; Radlinski, 2010; Torkar et al., 2010; Usman et al., 2014).", "The Systematic Literature Review of Usman et al. (2014) shows that only Extreme Programming (XP) and Scrum Methods have been investigated in the estimation studies."]} diff --git a/edge/graph_210911761.jsonl b/edge/graph_210911761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58ac9df2c49edb974397fb647e9269f29930dd75 --- /dev/null +++ b/edge/graph_210911761.jsonl @@ -0,0 +1,28 @@ +{"7457449|206459491": ["There have also been numerous proposals that focus on hardware Trojan detection [30,31]."]} +{"14638564|206459491": []} +{"16430074|206459491": ["Microcontrollers are extensively used in embedded systems, and they are equipped with \u2018\u2018fuse bits\u2019\u2019 to prevent unauthorized users from reading or modifying selected sections of its memory.", "The left column shows\nthe goals of the attack, and the right column shows the location of the attacker within the IC supply chain.", "Similarly, critical control and communication functions assume that the hardware platforms that they are implemented on are resilient to attacks.", "Different assumptions are typically made concerning the hardware-based vulnerabilities, threats that exploit them, models for the considered threats, and defenses."]} +{"1731177|206459491": ["We conclude this section with Section 4.3 with some practical considerations, specifically, scalability and layout-anonymization."]} +{"174802457|61153482": ["The interested reader may also want to see [9] for more details."]} +{"12192198|12489337": ["Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org."]} +{"53227383|3273340": []} +{"14385634|206459491": []} +{"136050037|12904520": []} +{"918407|3540699": ["Each profile specifies a subset of entire bitstream of syntax and limits that shall be supported by all decoders conforming to that Profile [32]."]} +{"139499316|40249": []} +{"47492355|206459491": ["An attacker anywhere in the IC supply chain can perform the following attacks: reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property (IP) piracy [2], [4]\u2013[8]."]} +{"8517701|206459491": ["This assumes that V has access to auxiliary inputs that have been precomputed offline; auxiliary inputs are independent of the input to C ."]} +{"16043488|206459491": ["The detection of HTs through conventional IC testing is difficult since the HTs are normally designed to be triggered under extremely rare conditions (in the case of functional HTs) [55] or triggered after a relatively long time such as a few year (in the case of parametric HTs) [52].", "Parametric HTs are implemented by modifying the fabrication process parameters that can undermine the reliability or performance of the ICs.", "3) Hardware Trojan (HT) insertion: In general, there are two types of HTs: functional HTs and parametric HTs. Functional HTs intend to modify or disable existing functionalities of a circuit.", "BISA block is a hardware authentication circuitry which guarantees that when it\u2019s modified by HTs, faults can be generated and observed.", "The obfuscation due to 2.5D split fabrication can also prevent the insertion of targeted HTs, i.e., malicious modification to a specific target gate."]} +{"5254845|206459491": ["The inserted SCs are then connected to form a circuitry called built-in self-authentication (BISA) circuit, which is independent of the original circuit.", "Due to the numerous logical states in a circuit, it is impractical to enumerate all states of a real design."]} +{"110171317|2381561": []} +{"2020120|206459491": ["We do not address this threat in our work and refer the reader to an excellent survey paper on this topic [33]."]} +{"15731390|206459491": []} +{"199543743|61153482": []} +{"115788535|3932089": []} +{"16157693|206459491": ["With this knowledge, an attacker can more efficiently mount various attacks (e.g., fault injection, sidechannel), clone/counterfeit the design possibly with hardware Trojans inserted, and discover trade secrets (e.g., proprietary algorithms, hard-coded keys and instruction sequences) [1]\u2013 [5]."]} +{"102346128|206459491": ["For instance, postfabrication detection techniques that rely on logic testing cannot detect backdoors designed to stay dormant during post-fabrication testing [89, 98]."]} +{"19686742|206459491": []} +{"14851679|206459491": []} +{"128361709|206459491": ["Once a backdoor is inserted, those SoCs are almost owned and controlled by the first country [31].", "A classification of hardware Trojans based on trigger and payload is presented in Reference [31]."]} +{"210919952|61153482": ["Popular countermeasures against IP piracy are logic locking, split manufacturing, and camouflaging [11]."]} +{"9365379|385243": []} +{"4921868|3815882": ["Researchers have proposed error correcting codes (ECCs) and other novel algorithms and architectures to improve PUF reliability [19]."]} diff --git a/edge/graph_210920132.jsonl b/edge/graph_210920132.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5ceef0b7dd49d617cdd17e71c0c24f8bb4329eb --- /dev/null +++ b/edge/graph_210920132.jsonl @@ -0,0 +1,25 @@ +{"6123992|7329149": []} +{"6123992|12060835": ["There is a need to implement new powering strategies for such autonomous sensors, widen technology awareness and increase uptake by eliminating battery change as a major operational and environmental issue [3]."]} +{"12407716|469744": []} +{"32798996|14164493": ["In this context, the estimation of the behavioral drift of these applications is intimately linked into theQuality of Experience (QoE) [39] as an assessment of the human satisfaction when interacting with technology in a particular context.", "In this context, the approach proposed in this paper, by estimating the behavioral drift of a concrete application against its expected ideal behavior, is intimately linked to theQuality of Experience (QoE) [39] as an assessment of users\u2019 satisfaction when interacting with the controlled environment."]} +{"482049|14441987": ["\u2022 mobile networking, including Mobile IP [2], ad hoc protocols [27], and techniques for improving TCP performance in wireless networks [1, 5]."]} +{"482049|15640936": ["\u2022 mobile networking, including Mobile IP [2], ad hoc protocols [27], and techniques for improving TCP performance in wireless networks [1, 5]."]} +{"482049|2256372": ["\u2022 remote information access, including caching, function shipping, distributed file systems, and distributed databases [30]."]} +{"482049|8424228": ["\u2022 high availability, including optimistic and pessimistic replica control [9], mirrored execution [4], and optimistic recovery [37]."]} +{"52984425|59333092": ["For instance [22], in the previous example: \u2022 \u03bc({1}) +\u03bc({2}) = \u03bc({1, 2})\u21d2 additivity, i."]} +{"204985297|12675271": []} +{"206491297|6909107": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|21386749": ["An extensive survey is presented in [10], with focus placed on commercially available solutions, possible applications, and remaining problems.", "work of devices interacting with each other via machine to machine (M2M) communications, enabling collection and exchange of data [7], [10], [11]."]} +{"206491297|3042864": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|23893450": ["crash-avoiding cars [19], and smart grids [20]."]} +{"86463743|54974489": []} +{"86463743|4625011": []} +{"86463743|15895606": []} +{"86463743|7350786": []} +{"86445340|3330461": []} +{"86445340|7644489": ["\u2026resources surrounding a user in a pervasive computing environment (Amadeo et al. 2014; Gu et al. 2005; Guo et al. 2013; Jenson et al. 2014; Lin et al. 2014; Liu et al. 2014; Mayer et al. 2014; Quevedo et al. 2016; Wehner et al. 2014), and for combining them according to some static\u2026"]} +{"3197929|1230643": ["Offering high ef\ufb01ciency and accuracy in tracking different events, wireless sensors have already been deployed widely in various environments for the purposes of data collection and monitoring [21\u201325]."]} +{"3197929|289357": ["We argue that the discussed problem is that of the NP-hard nature [83] and the mentioned solution principle cannot be applied."]} +{"195467438|27650400": ["Research has emphasised the need for social adaptation, where the software system analyses users\u2019 feedback and updates its behaviour to best satisfy the requirements in the given context [35]."]} +{"206480255|14441987": []} +{"12535136|8835588": ["Br\u00e9zillon [8], [18], [19] and Brun [20] collected a set of definitions of context, mainly on the Web.", "This epistemological problem [18], [19] will be not discussed in this paper."]} diff --git a/edge/graph_210920204.jsonl b/edge/graph_210920204.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e89e36efc27c6ab0a5d0e40eee8192836cc3de74 --- /dev/null +++ b/edge/graph_210920204.jsonl @@ -0,0 +1,6 @@ +{"205572964|3519414": ["The next generation of automatic speech recognition 32 and information extraction models will likely develop clinical voice assistants to accurately transcribe patient visits.", "As such, applyication of deep-learning methods to EHR data is a rapidly expanding area 32,33 ."]} +{"205572964|2088679": ["Medical imaging, for instance, can greatly benefit from recent advances in image classification and object detection 2,8 ."]} +{"205572964|23566570": ["RL can be useful in healthcare whenever learning requires physician demonstration, for instance in learning to suture wounds for robotic-assisted surgery 7 .", "Modern genomic technologies collect a wide variety of measurements, from an individual\u2019s DNA sequence to the quantity of"]} +{"70058975|3761015": []} +{"54574300|3125111": ["If a model is deployed, the performance of the model and outcome measurements should be monitored, possibly through formal trial design (such as stepped-wedge trials [50])."]} +{"128363183|2088679": ["Recently, deep learning has been shown to have higher performance than conventional radiomics (39).", "Image augmentation was performed on the training tumor region, as conventional practice in the field of deep learning and biomedical image processing (38), to improve performance and the small-scale deformations were applied to prevent overfitting (39) on our relatively small training set."]} diff --git a/edge/graph_210920298.jsonl b/edge/graph_210920298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d240ee77d18df6e4ed4a553a459afbcd6cd9e512 --- /dev/null +++ b/edge/graph_210920298.jsonl @@ -0,0 +1,15 @@ +{"49671507|8533795": ["\u2019s data alone. Differentially private approaches to machine learning work in a similar way: models lacking data relating to a particular individual function extremely similarly to those containing it [45]. This provides intrinsic protection against a great deal of model inversion attacks. Theoretically, such learning algorithms are just as powerful as non-differentially private ones [46]. Since algori"]} +{"49671507|17675973": ["5% of global power consumption [34], as well as time and labour costs."]} +{"41668540|53531807": ["To this end, we utilize Kullback-Leibler divergence (KLD). is technique has been used in Bayesian optimal experiment design (BOED) [24] to select the optimal design of experiment so that the expected utility of the experiment outcome can be maximized.", "Di erent from the general case in BOED, we focus on the utility of a given sample instead of the expected utility.", "\u008cis technique has been used in Bayesian optimal experiment design (BOED) [24] to select the optimal design of experiment so that the expected utility of the experiment outcome can be maximized."]} +{"41668540|2701596": []} +{"2716553|11608263": ["Ideas, how to apply those for more than two groups, can be borrowed from multi-class classi\ufb01cation (Bishop 2006), the multi-label classi\ufb01cation (Tsoumakas and Katakis 2007), and one-class classi\ufb01cation (Tax 2001) literature.", "Ideas, how to apply those for more than two groups, can be borrowed from multi-class classification (Bishop 2006), the multi-label classification (Tsoumakas and Katakis 2007), and one-class classification (Tax 2001) literature."]} +{"52965836|3342225": ["[63] reviewed methods for explaining black-box models at a large scale including data mining as well as machine learning."]} +{"52965836|17779926": ["One effort to gain insight into highly complex models is the use of rule extraction [114]\u2013[116]."]} +{"51607811|7681233": ["The individuals then form a network of trust based on techniques from the reputation modelling literature [Yu et al. , 2010; Yu et al. , 2013] to achieve collective self-governance through dynamic interactions."]} +{"4562004|4110304": ["Our previous paper [39] provides a comprehensive survey of recent studies in exploring visual interpretability of neural networks, including 1) the visualization and diagnosis of CNN representations, 2) approaches for disentangling CNN representations into graphs or trees, 3) the learning of CNNs with disentangled and interpretable representations, and 4) middle-to-end learning based on model interpretability."]} +{"52846040|3342225": ["In their comprehensive survey on black box explanation methods, Guidotti et al. distinguish between four different explanation problems [ Guidotti et al. , 2018 ] : model explanation aims at model-wise explanation and outcome explanation aims at prediction-wise explanation (analogous to Du et al.).", "For a more comprehensive survey on explainability and transparency, we refer to [ Guidotti et al. , 2018; Du et al. , 2018 ] ."]} +{"1320907|8372620": ["\u2026did not introduce or reuse any discrimination measures, since measuring potential discrimination by algorithms is a subject of scienti\ufb01c discussion (see e.g., a broad review by Romei and Ruggieri (2014), or a recent survey by Zliobaite (2015) for a discussion of various existing measures)."]} +{"51682040|3342225": [", [15,50,68], also see [32] for a survey on explaining black box models."]} +{"51682040|15986963": [", based utilizing a set of (class) association rules [5, 49, 53, 81] can be applied for obtaining interpretable models for explicative data mining."]} +{"2014883|8372620": ["There has been much recent interest in designing algorithms that make fair predictions [4, 6, 9, 10, 12, 14\u201317, 19, 21, 30\u201333]."]} +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} diff --git a/edge/graph_210920379.jsonl b/edge/graph_210920379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210920510.jsonl b/edge/graph_210920510.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4995720f9a48a37e78bb04ccc6422883987084d --- /dev/null +++ b/edge/graph_210920510.jsonl @@ -0,0 +1,21 @@ +{"5052904|6583734": ["As a solution for these problems, researchers proposed network function virtualization (NFV) in order to promote the manageability of their network architectures when confronting dramatic changes of demands and also to support broader range of use cases [4]."]} +{"267047|7893490": ["Most of the prediction methods used by WMSs were crafted for characterizingparallel applications [17].", "The prediction of applications\u2019 performance has been studied since the genesis of parallel and distributed computing [2,17] due to its importance on the management of applications."]} +{"5929770|10658846": []} +{"53287489|10536678": []} +{"1878208|1507400": ["The use of MapReduce for data intensive scientific analysis and bioinformatics are well studied in [41, 80]."]} +{"4774976|10658846": ["Dynamic power management (DPM), de\ufb01ned as the selective shut-off or slow-down of system components that are idle or underutilized, has proven to be an effective technique for reducing power dissipation at system level [9].", "The design of such DPM policies has been an active research area, while a variety of adaptive power management techniques including machine learning have been applied [9\u201311]."]} +{"39245183|1932843": []} +{"39245183|8914588": []} +{"39245183|1708582": []} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"18290265|14382980": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"34388150|14478191": ["However, it covers the much broader topic of multiobjective sequential decision-making [18].", "One class comprises single-policy MORL approaches and the other, multiple-policy MORL approaches [12], [18]."]} +{"34388150|1708582": ["REINFORCEMENT learning (RL) was originally studied from the perspective of animal learning behaviors [1], and it has become a major class of machine learning methods [2] to solve sequential decision making problems under uncertainties [3], [4]."]} +{"115136979|18125683": ["Common mechanisms include on-demand pattern, reserved pattern, and spot pattern [1]."]} +{"115136979|1708582": ["Reinforcement learning (RL) is an important method in the field of machine learning and intelligent control [18]."]} +{"59284268|14046529": []} +{"59284268|8914588": []} +{"41832153|8914588": ["The auto-scaling process is usually represented and implemented by a MAPE-K (Monitor, Analyze, Plan and Execute phases over a Knowledge base) control loop [12]."]} +{"29606799|3042864": ["It is investigated under 3 cases, namely, (1) queueing theory\u2013based data set, (2) SP2 log\u2013based data set with fixed execution time, and (3) SP2 log\u2013based data set with stochastic execution time.", "Because the execution time in case (3) is stochastic, the corresponding experiments of Figures 10B and 11B repeat 50 times, and the 95% confidence intervals are depicted.", "When the execution time becomes uncertain in case (3), our algorithm gets worse than MCT as Figure 11B shows.", "Especially, the workload in cases (2) and (3) is heavy; MET always assigns jobs to the best resources, which are blocked."]} +{"29606799|1708582": []} diff --git a/edge/graph_210920646.jsonl b/edge/graph_210920646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c1137f85ebcdc0ea0213ea5516533464e111b01 --- /dev/null +++ b/edge/graph_210920646.jsonl @@ -0,0 +1,46 @@ +{"85499827|12395887": []} +{"3306364|11381530": ["[25] have produced a comprehensive taxonomy and survey on notable NIDSs approaches that utilise deep and shallow learning."]} +{"3306364|18188725": ["[2] presented a state-of-the-art survey of deep learning applications within machine health monitoring.", "Not only is this a labour intensive and expensive process but it is also error prone [2].", "One of the most prominent techniques currently used within deep learning research is DBNs [1], [2], [7]."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"207959570|5556391": ["Indeed, imbalanced datasets which do notmaintain the inter-classes balance along time are a common phenomena resulting in concept drift in real data [16].", "Of particular relevance for stream machine learning model evaluation are the problems of imbalanced classes and concept drift, which are extensively addressed in [16]."]} +{"22177268|3330313": ["This is defined in an intuitive fashion in Acuna and Rodriguez (2004 ) a s follows (for alternate definitions see Hawkins 1980, Barnett and Lewis 1978):", "In addition to the slowing effect this has on performance, it also spreads the convex hull, thus distorting the data distribution [\u201cCurse of Dimensionality\u201d ( Hodge and Austin 2004 )].", "In addition to the slowing effect this has on performance, it also spreads the convex hull, thus distorting the data distribution [\u201cCurse of Dimensionality\u201d (Hodge and Austin 2004)]."]} +{"22177268|2656838": ["Similar work was presented in Geerts et al. (2005), Calders et al. (2004) for a tight upper bound on number of candidates generated by frequent itemset mining methods and itemsets that can be derived based on smaller itemsets and their support.", "(2005), Calders et al. (2004) for a tight upper bound on number of candidates generated by frequent itemset mining methods and itemsets that can be derived based on smaller itemsets and their support."]} +{"46493545|6430931": ["In the last years, different intrusion detection approaches have been proposed, including the use of artificial intelligence techniques, such as neural networks [55]."]} +{"45081771|6430931": []} +{"8356516|11632848": []} +{"8356516|6430931": []} +{"206259012|18654252": ["Most recently, Gogoi et al. (2011) classified outlier detection techniques as supervised and unsupervised but their taxonomy is slightly confusing because they consider proximity-based approaches under the supervised category."]} +{"26217158|192934": ["[13], k-NN can be conveniently used as a benchmark for all the other classifiers since it is likely to provide a reasonable classification performance in most applications."]} +{"203852680|3330313": []} +{"203852680|50458504": ["For instance, in security, intruders are abnormalities (Ribeiro et al. 2016; Pimentel et al. 2014; Luca et al. 2016; Phua et al. 2010; Yeung and Ding 2001); in traffic data, road accidents (Theofilatos et al."]} +{"3501526|11894197": []} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"9942752|8364569": ["provide a comprehensive overview about flow-based intrusion detection in general [16]."]} +{"12615360|12595430": ["As the amount of network traffic data increases, it becomes more difficult to collect and analyze the network activity [2].", "Moreover, due to the large amount of network data, it is normally impossible to log and store the traffic activity [2].", "However, due to the increase in the amount of generated data by networked systems, a lot of attention has been brought for the measurement of massive network activities [2]."]} +{"3346652|12260867": ["From this stand\u00adpoint, and provided that \nrandom access is prohibitively expensive [Guha et al. 2003], performing linear scans of the data is the \nonly acceptable access method in terms of computational ef.ciency.", "Extracting potentially useful knowledge \nfrom data streams is a challenge per se."]} +{"19892398|192934": []} +{"67796638|13172512": ["Inourevaluation,weconsideredthreeindivid-ualanddifferentclassifiersthatareusuallyemployedforintrusion detection:decisiontree(DT)[28],randomforest(RF)[29],gradient boosting(GB)[30],andanensemble[31]classifiercomposedfrom DT,RF,andGBthatdecidesbasedonmajorityvotingacrosseach classifier\u2019sdecisions."]} +{"34955078|8364569": []} +{"67749839|3767252": []} +{"67749839|12595430": []} +{"28991223|2867949": []} +{"197645932|4863690": ["Prior studies such as (Sadotra & Sharma, 2016; Buczak & Guven, 2016) have not completely reviewed IDSs in term of the datasets, challenges and techniques."]} +{"197645932|11246470": []} +{"197645932|16621677": ["Intercept packets, rainbow attack, social engineering Rootkit, load module, (Perl Raiyn, 2014).", "Warezclient, ftp write, multihop,phf, spy, warezmaster, imap (Raiyn, 2014)."]} +{"197645932|206584087": []} +{"197645932|12815020": ["SIDS have also been labelled in the literature as Knowledge-Based Detection or Misuse Detection (Modi et al., 2013).", "Signature intrusion detection systems (SIDS) are based on pattern matching techniques to find a known attack; these are also known as Knowledge-based Detection or Misuse Detection (Khraisat et al., 2018).", "Compared to previous survey publications (Patel et al., 2013; Liao et al., 2013a), this paper presents a discussion on IDS dataset problems which are of main concern to the research community in the area of network intrusion detection systems (NIDS)."]} +{"35066811|3423198": ["Multi-objective feature selection has been addressed in several fields, such as Quality of Service (QoS) constraints in multimedia content distribution [41], handwritten digit recognition [42], among others [43]; however, for intrusion detection purposes its use remains rare."]} +{"35066811|13172512": ["In studies in the literature, anomaly-based intrusion detection was in general treated as a pattern\u2013recognition problem [16] through machine learning techniques."]} +{"51614191|393948": ["Sparse AEs attempt to construct a sparse representation in an overcomplete setting in which a few of the outputs of the hidden unit activations can vary at a time, and others are set to a saturating value [33]."]} +{"44433229|18189153": ["Another survey for intrusion detection and prevention system in MANETs is presented in Nadeem and Howarth (2013).", "Another survey for intrusion detection and prevention system in MANETs is presented in (Nadeem and Howarth, 2013)."]} +{"44433229|8364569": ["However, flow-based intrusion detection is not matured enough to replace the traditional packet-based techniques (Sperotto et al., 2010).", "Sperotto et al. (2010) give detailed survey of flow-based intrusion detection systems.", "An earlier survey of flow-based techniques, conducted by Sperotto et al. (2010), is now seven years old."]} +{"44433229|8793295": ["Traditionally, intrusion\ndetection systems use deep packet inspection (AbuHmed et al., 2008) or stateful protocol analysis to detect attacks in the network traffic.", "Traditionally, intrusion detection systems use deep packet inspection (AbuHmed et al., 2008) or stateful protocol analysis to detect attacks in the network traffic."]} +{"44433229|6430931": ["A survey of intrusion detection systems using computational intelligence techniques is given in Wu and Banzhaf (2010)."]} +{"6006612|5556391": ["[22] for a recent book on that subject), and has also been studied to some extent in the online, stream-based setting (see [23] for a recent survey).", "However, among the few existing stream-based approaches, most do not pay attention to drift of the minority class, and as [23] pointed out, a more rigorous evaluation of these algorithms on real-world data needs yet to be done."]} diff --git a/edge/graph_210921052.jsonl b/edge/graph_210921052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210927844.jsonl b/edge/graph_210927844.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..028d69ae0e7b3f9534c04b5f17a74a07ac1d1b56 --- /dev/null +++ b/edge/graph_210927844.jsonl @@ -0,0 +1,2 @@ +{"5044878|14951406": []} +{"206111384|18862495": []} diff --git a/edge/graph_210930674.jsonl b/edge/graph_210930674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ee3b97b57c536cbb64ab62eed435dc6eeeb6582 --- /dev/null +++ b/edge/graph_210930674.jsonl @@ -0,0 +1,15 @@ +{"198932055|49527603": ["The typical digital signature algorithm used in Blockchains is the elliptic curve digital signature algorithm (ECDSA) [14].", ", SHA256) that secure the contents of the transaction [14]."]} +{"199090964|49527603": []} +{"30645043|49527603": ["Some of the emerging applications that can bene\ufb01t from this model include \ufb01nance, government services [30,31], IOT (Internet of Things) [26] and regulation compliance [27]."]} +{"52301248|51935081": ["The pieces of the best quality are then marked with QR code stickers, to enhance and certify the timber and its origin.", "Different kinds of IoT open source devices and tags were used, and a specific app aiming the forest operations was developed to collect and store in a centralized database information such as species, date, position, number of logs produced for each tree, dendrometric and commercial information."]} +{"169077471|7492478": ["[21] claim that performance expectancy and behavioral intention are the best predictors for using technology.", "For a comprehensive literature review see Williams, Rana, & Dwivedi [21] who examined 174 existing articles on the UTAUT model."]} +{"88491427|49527603": ["A private blockchain can provide a relatively better degree of privacy; however, it is generally considered an unsecure environment as it is only controlled by a single entity [72].", "Examples of surveys on general blockchain concepts, opportunities, and applications are [72]\u2013[75]."]} +{"88491427|51935081": []} +{"88491427|3932531": ["applications [104]\u2013[107], intrusion detection [91], and Internet of Things (IoT) [95]\u2013[100]."]} +{"88491427|3628110": []} +{"88491427|27262729": []} +{"88491427|925507": []} +{"55531366|2762484": ["Therefore, each product carries the product's ID and the URL referring to the location of the required product information (Meyer et al., 2009)."]} +{"202101956|3932531": []} +{"197446826|49527603": []} +{"53601028|3628110": ["There are current concerns with the use of blockchain crowdsourcing-related malicious agents in all areas of blockchain processing and activities (see [31])."]} diff --git a/edge/graph_210931529.jsonl b/edge/graph_210931529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89050021c989551e4dcd3b17aa25c3ff21f2abd4 --- /dev/null +++ b/edge/graph_210931529.jsonl @@ -0,0 +1,62 @@ +{"18038175|206459491": []} +{"13915850|206459491": ["Almost all design houses have become fabless, i.e., they fabricate their products in third party foundries offshore to lower costs, which provides attackers with opportunities to make malicious inclusions and alterations, known as hardware Trojans.", "After completing placement and routing, designers usually fill the empty spaces with filler cells or decoupling capacitor (DECAP) cells to reduce the design rule check (DRC) violations created by the base layers and ensure power rail connection [10]."]} +{"16430074|206459491": ["Microcontrollers are extensively used in embedded systems, and they are equipped with \u2018\u2018fuse bits\u2019\u2019 to prevent unauthorized users from reading or modifying selected sections of its memory.", "The left column shows\nthe goals of the attack, and the right column shows the location of the attacker within the IC supply chain.", "Similarly, critical control and communication functions assume that the hardware platforms that they are implemented on are resilient to attacks.", "Different assumptions are typically made concerning the hardware-based vulnerabilities, threats that exploit them, models for the considered threats, and defenses."]} +{"42927548|206459491": ["Tehranipoor and Koushanfar [11] have also given a survey of Trojan taxonomy and detection techniques, but this does not cover the current threats and Trojan designs."]} +{"16043488|206459491": ["The detection of HTs through conventional IC testing is difficult since the HTs are normally designed to be triggered under extremely rare conditions (in the case of functional HTs) [55] or triggered after a relatively long time such as a few year (in the case of parametric HTs) [52].", "Parametric HTs are implemented by modifying the fabrication process parameters that can undermine the reliability or performance of the ICs.", "3) Hardware Trojan (HT) insertion: In general, there are two types of HTs: functional HTs and parametric HTs. Functional HTs intend to modify or disable existing functionalities of a circuit.", "BISA block is a hardware authentication circuitry which guarantees that when it\u2019s modified by HTs, faults can be generated and observed.", "The obfuscation due to 2.5D split fabrication can also prevent the insertion of targeted HTs, i.e., malicious modification to a specific target gate."]} +{"9595231|6302811": ["Although study of reversible computing can be traced back to the early 1960s when Landauer pointed out that irreversible erasure of an information bit consumes power and dissipates heat [34], reversible computing has received much renewed research attention recently for low power computing, signal processing, cryptography, computer graphics, program inversion, reversible debugging, networks on chip, nano- and photonic circuits, and quantum computation [52]."]} +{"59234246|206459491": ["There are several types of HT [1] and it is impractical to study them by inducing HTs into the actual SHA at the hardware level.", "more vulnerable to malicious insertions of hardware units [1], [2], called as hardware Trojans (HT), because of globalization and usage of third party intellectual properties (3PIP) [3]."]} +{"2859644|206459491": ["or enhanced functional testing [3], [4], it has to alter the parametric profile of a chip [5]."]} +{"27976881|206459491": ["With the globalization of integrated-circuit chip designprocess, the chances of malicious hardware design intrusion, known as hardware Trojan, have grown tremendously [1]\u2013[3].", "Hardware Trojans can lead to many unwanted activities, including leaking confidential information, changes in the timing characteristics of the circuits, malfunctioning, denial of service and counterfeiting [1][4][5]."]} +{"62477319|206459491": ["With globalization of the semiconductor industry, today\u2019s integrated circuit (IC) designs involve many third-parties during the design and manufacturing process, and hence they are vulnerable to a wide range of malicious alterations, namely hardware Trojans (HTs) [1]."]} +{"23711827|206459491": ["Recently, there is a lot of research on HT creation, classification and detection methods [1], [2]."]} +{"10687|206459491": ["[2] presented a more in-depth discussion and classification of HT attacks, covering three topics: Trojan design and taxonomy, Trojan detection methods and design for hardware trust."]} +{"59232545|206459491": ["Malicious attackers can alter IC designs or insert hardware Trojans during IC design and fabrication process [2]."]} +{"9868548|206459491": []} +{"8504637|206459491": []} +{"22071511|206459491": []} +{"12836653|206459491": [", denial of service attack) or cause privacy leakage [1], [2], [3], [4]."]} +{"34188768|206459491": ["classification of hardware Trojans, and a survey and analysis of published techniques for Trojan detection in [7]."]} +{"64337834|12489337": []} +{"11597432|206459491": ["which attempt to gain undetected privileged access on a system, leak secret information through side channels, or weaken random number generator output [2]."]} +{"14638564|206459491": []} +{"18074843|206459491": []} +{"6444667|206459491": ["Trojan detection methods have been recently proposed [3]."]} +{"52891108|206459491": ["The HT listed in [1] and [2] is to be implemented inside the IC.", "On the other hand, the threat of a hardware Trojan (HT: Hardware Trojan) that adds malicious circuits in the manufacturing process of information equipment, disturb the operation of the equipment and leaks information has been reported [1], [2]."]} +{"24677596|206459491": []} +{"16550789|206459491": ["This can also be achieved by deleting logic [17].", "Trojans have previously been classified by their physical characteristics, by the effects they cause to a system, and by their activation mechanisms [6], [17].", "This condition is typically an internal logic state or a pattern of input/output signals [17].", "However, testing at an untrusted facility can lead to test vectors being revealed and detection deficiencies [17]."]} +{"5242798|206459491": ["using transient power analysis [6]\u2013[10] require patterns that in-"]} +{"17281609|206459491": []} +{"15731390|206459491": []} +{"13539345|206459491": []} +{"12801225|206459491": ["[12] presented a more indepth discussion and classification of HT attacks, covering three topics: Trojan design and taxonomy, Trojan detection methods and design for hardware trust."]} +{"10603203|206459491": ["[1] M.", "Existing research have exposed vulnerability of a design to various forms of Trojan attacks [1], [2].", "These attacks, popularly known as hardware Trojan attacks, are poised to greatly affect the design and test landscape of ICs due to increasing use of untrusted intellectual properties and tools in the design flow and outsourcing of fabrication services to untrusted foundries [1].", "Such design solutions are referred to as Design-for-Security (DfS) techniques, such as ringoscillators [4] to detect delay variations and modified scan flip-flops [1] to increase Trojan trigger probability.", "In the past, various approaches to detect hardware Trojans during post-manufacturing test have been proposed [1]."]} +{"207022595|206459491": ["KEYWORDS | Hardware intellectual property (IP) trust; hardware obfuscation; hardware Trojan attacks; self-referencing;\nside-channel analysis; Trojan detection; Trojan taxonomy;\nTrojan tolerance"]} +{"15715621|206459491": ["Compared with the traditional software Trojan, hardware Trojan has the characteristics of strong concealment, large destruction, and difficult detection and so on [3]."]} +{"59231844|206459491": ["As far as security attacks in SoC is concerned, the malicious hardware modification of the original design in the chip, known as Hardware Trojan (HT) [6] plays a vital role in security threats, where the hardware platform becomes insecure."]} +{"5923290|206459491": ["\u2026single employees or full government agencies [5] act as rogue agents who can potentially infringe on the hardware\u2019s trust and threaten to undermine hardware integrity through malicious additions, modifications or removal of transistors to create hardware trojans (HTs) [1], [6], [7], [8], [9]."]} +{"31198689|1722293": ["Harvested data is typically further processed and analyzed to extract physiological features that assist in the diagnosis of health conditions [9-12].", "We extract two main physiological features from the ECG and BCG HF data, namely, the heart rate and an approximation of the R-J interval [9-12].", "The BCG force-plate adjusts itself with pumps to non-invasively capture three-dimensional forces that represent the cardiogenic vibrations of the body [9, 10]."]} +{"31198689|206459491": ["1) Functional verification: This type of HT detection relies on checking the functionality of the hardware by monitoring the output to check for expected behavior [2, 6].", "A formal HT taxonomy, introduced in [2], characterizes HT attacks according to physical, activation, and action characteristics.", "Several HT detection methods [1, 2, 5-8] have been proposed to address specific types of attacks.", "In conclusion, we consider small size HT logic which is conditionally triggered on certain internal logic conditions or states able to be externally activated by an attacker where the HT attack aims to alter the functionality of the microchip [2].", "Malicious layout alterations during the chip manufacturing process are referred to in the literature as Hardware Trojans (HTs) [1, 2].", ") are compared to data generated by the chip\u2019s normal behavior to detect anomalies [2, 6].", "The HT payload attacks input values based on trigger circuitry which is conditionally triggered [2].", "2) Hardware Trojan triggering: Many HT detection architectures have been presented and surveyed able to detect HTs with significant hardware footprints, typically using a \u201cgolden die\u201d to compare with the chip extensively tested after fabrication and prior to deployment [2, 6].", "2 shows an example of our HT threat model which is representative of most prior work [1, 2, 5-8]."]} +{"37657882|206459491": []} +{"206486845|206459491": ["1 shows the modern IC production life-cycle phases: specification, design, fabrication (including interfacing, masking, wafer fabrication and assembly, and packaging), testing and deployment [3]\u2013[6]."]} +{"6193568|206459491": ["A hardware Trojan is an alteration of the original integrated circuit (IC) design by an attacker in order to access and manipulate information stored or disable processing on the chip [1], [2]."]} +{"15283469|206459491": ["According to the summary, literature [2] ranked the most popular detection method as physical detection, function detection, self-built in detection (BISD) and side channel analysis detection etc.", "As early as 2010, Tehranipoor [2] has found that integrated circuits are vulnerable to hardware Trojan attacks both in the process of designing and manufacturing."]} +{"20568732|206459491": ["This radical change raises the concerns about untrusted foundries and hardware piracy: the thefts of masks for unauthorized overproduction [1] [2], as well as the insertion of Hardware Trojan-horses (HTs), malicious circuitry, or alterations [3] [4] became a major cause of concern."]} +{"6922021|12489337": ["Reconfigurable area for hiding the design in IC [29]."]} +{"6922021|206459491": []} +{"13197102|206459491": ["In order to mitigate those risks, several families of detection techniques have been studied and proposed [1], [2]."]} +{"17895839|206459491": ["In those domains, the key challenges and current available techniques are analyzed respectively as follows."]} +{"61809406|206459491": ["There are three main spots in an IC fabrication process where the HT can be inserted [12]."]} +{"2574812|206459491": ["Comprehensive reviews can be found in [2] and [3].", "Because the functional triggering of the Trojans may be hidden [2], the logic-based testing methods are unlikely to trigger and distinguish malicious alterations."]} +{"207236805|206459491": []} +{"18729612|206459491": []} +{"21532732|206459491": ["With the globalization of integrated-circuit chip designprocess, the chances of malicious hardware design intrusion, known as hardware Trojan, have grown tremendously [1], [2].", "Hardware Trojans can lead to many unwanted activities, including leaking confidential information, changes in the timing characteristics of the circuits, malfunctioning, denial of service and counterfeiting [1], and affect the power consumption and, in most cases, the delay of the underlying circuits."]} +{"38201666|206459491": ["Many researchers in [14]\u2013[20] have recognized that although detecting Trojans before ICs are deployed in the field is ideal, this ideal goal cannot be guaranteed by existing techniques, and is extremely challenging (more complex and difficult in SoCs) to achieve.", "This concern is why hardware Trojans are inactive in pre-deployment time, and are activated by stealthy activation vectors in post deployment [14]."]} +{"7187415|206459491": ["Recently, hardware trojan horses (HTH) insertion and detection have received significant attention in the literature [6], [9], [17], mainly because they can maliciously disturb the normal functionality of a circuit or change its characteristics."]} +{"64096520|206459491": ["In 2010, Teh-ranipoor et al. [12] exposed a more in-depth discussion of HT taxonomy, detection, and design for trust techniques."]} +{"15137479|206459491": ["Furthermore, a number of approaches have been proposed for Trojan detection at lower levels of chip design [12], [27]\u2013[30].", "Finally, detection of such Trojan using analysis of parametric signals is considered ineffective [12] due to decrease in physical feature size because of evolution in technology.", ") which makes them unlikely to be activated and detected during normal functional verification by test vectors [12]."]} +{"201877335|96441": ["[115] summarized some anti-fault injection techniques specific to elliptic curve cryptography (ECC)."]} +{"201877335|206459491": ["The trust of FPGA device is the same as the trust of ASIC, and there are several surveys about it [5, 95, 96]."]} +{"59235920|206459491": ["As previously mentioned, hardware Trojans are malicious modifications of a hardware IP [3]."]} +{"15856740|206459491": ["Making things more difficult is the diversity with which HTs can be implemented along with the payloads [2].", "[2] Finally, we prioritize packet allocation to enhance quality of service and provide path sensitization for secure packets."]} +{"9274068|206459491": ["tive to detect custom hardware trojans: logic verification and side-channel analysis [4], [5]."]} +{"13113094|206459491": ["The purpose of hardware Trojans could be multiple: Disable or destroy a system at some future time, leak confidential information or compromise information [1].", "The 2011 Embedded Systems Challenge (ESC 2011) [1] showed a wide range of possibilities to attack a processor through hardware Trojans.", "Trojans may also be inserted during the circuit design flow [1].", "Processor Trojans submitted to the ESC 2011[1] had the following characteristics and capabilities: \u2022 The Trigger depended either on the executed software or the system interface [5]."]} diff --git a/edge/graph_210932052.jsonl b/edge/graph_210932052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2e94f056ff975a5bcd50389334105f993939c03 --- /dev/null +++ b/edge/graph_210932052.jsonl @@ -0,0 +1,9 @@ +{"113790717|12083425": []} +{"46978224|19825066": ["Big data techniques can be used in two ways when combined with the optimization of VVC: by improving the performance of optimization algorithms [83], and by modeling the reactive power and voltage regulation behaviors of external power grids.", "Each individual presents a potential solution in the processes of population-based algorithms [83]."]} +{"114826608|12083425": ["The major problem in the operation of wind turbines, is that the momentarily changes in wind speed cause fluctuations in the output power of the wind turbine which are reflected as frequency change throughout the system and affect the system performance [8]."]} +{"110802640|485843": []} +{"110802640|5747564": []} +{"110802640|12083425": []} +{"110802640|6959212": []} +{"110802640|14240886": []} +{"41696213|17381415": ["An alternative technique consists of controlling the switching pattern of the converter, as described in [12-16], allowing for the harmonic content of a power converters to be fixed to preset values, without hardware modifications."]} diff --git a/edge/graph_210932539.jsonl b/edge/graph_210932539.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b95f2486eace222c7458ed7eb71db73450d8775 --- /dev/null +++ b/edge/graph_210932539.jsonl @@ -0,0 +1,18 @@ +{"139100563|15164501": []} +{"117689368|21386749": []} +{"159045711|1353379": []} +{"159045711|1599458": []} +{"197447349|8440916": []} +{"197447349|20416796": ["Making the grid decentralized also increases its resilience against different types of attacks, natural disasters, and human errors (Eder-Neuhauser et al., 2016)."]} +{"197447349|37424351": ["This platform is proven to be a weak link in security and privacy management of smart cities, as it is vulnerable to various attacks that might be originated by insiders, outsiders, or a collaboration of both (Ijaz, Shah, Khan, & Ahmed, 2016)."]} +{"197447349|23893450": []} +{"208106289|4880047": ["The inherent communication security of \ufb01ber optics, NB-IoT [4], 4G, and 5G [65, 66] technology will also add another layer of security over the blockchain P-2-P communication."]} +{"208106289|2014729": []} +{"208106289|6909107": ["However, FMC with decentralized control and distributed architecture is the preferred choice over SCC and MCC [64].", "However, depending upon the MEC architecture the computational and storage resources are located (can be in hardware or virtual form) at SCeNB/eNB for SCC and MCC, and at distributed CN (Core Network) in the case of FMC."]} +{"78093865|37976266": ["According to a recent review conducted by Bibri and Krogstie [25], the roots of the smart city concept date back to the 1970s under what is labeled the \u2018cybernetically planned cities\u2019, and then in urban development and planning proposals associated with networked or wired cities since the 1980s.", "Furthermore, concerning the lack of connection, integration, and synergy between smart cities and sustainable cities, Bibri and Krogstie [25] provide a list of the key discrepancies in this regard, which include in relevance to the topic of this paper:\n\u2022 Smart cities focus mostly on ICT advancement and the efficiency of solutions and fall short in considering, if not ignoring, design concepts and principles and planning practices of urban sustainability and their effects and benefits.", "For a detailed analytical account and deep discussion of the diverse dimensions of the social shaping of sustainable smart cities, the interested reader can be directed to Bibri and Krogstie [24].", "They tend to offer different perspectives on, or emphasise various dimensions of, the topic, while overlapping in many computational, analytical, and technological aspects [21, 27] pertaining to such components as techniques, algorithms, models, software tools, data processing platforms, and application forms, adding to related research issues and opportunities", "For a detailed account and discussion on the shaping role of political action in sustainable smart cities of the future, the interested reader can directed to Bibri and Krogstie [24].", "In response to this paucity of literature and thus research on the core enabling technologies of big data analytics and its application in the context of sustainable smart cities, Bibri and Krogstie [27] provide a thorough survey on the topic by identifying and reviewing such technologies, in addition to synthesising and illustrating the key computational and analytical techniques, processes, and frameworks associated with the functioning and application of big data analytics.", "It is a commonly held view that the more technologies monitor urban environments and collect information, the larger becomes the privacy threats, and the larger the networks, the higher the security risks (see [27] for a discussion of privacy mechanisms and security measures).", "See Bibri and Krogstie [24] for a detailed discussion.", "As a result, vast troves of information have become widely available on numerous aspects of urbanity, including social trends, global shifts, environmental dynamics, socio-economic needs, spatial and scalar patterns, land use patterns, travel and mobility patterns, traffic patterns, energy consumption patterns, life quality levels, and citizens\u2019 lifestyles and participation levels [20, 27].", ", [16, 73, 79]) as well as to those of sustainable smart cities of the future [20, 27], much of the existing knowledge of urban sustainability has long been gleaned from studies characterised by data scarcity (\u2018small data\u2019 studies) and involving the use of traditional data collection and analysis methods [20].", "However, while there are various permutations of the core enabling technologies that may well apply to most domains, there are some technical aspects and details that remain specific to the area of smart and smarter cities, more specifically, to the requirements, objectives, and resources of the smart and smarter city projects that are to be developed and implemented, which are usually determined by the nature, scale, and extension of the endeavor within a given context [27].", "Moreover, the broad availability of urban data is pushing research ever more into further advancing software technologies, including methods, techniques, algorithms, models, simulations, and protocols towards enhancing the efficiency of the extraction of useful knowledge pertaining to sustainability for the purpose of enhancing related urban intelligence functions and simulation models associated with energy, transport, mobility, healthcare, education, planning, and so on [27]."]} +{"78093865|44461432": []} +{"117583111|37976266": []} +{"117583111|1520906": []} +{"117583111|17675973": []} +{"32008949|29654897": []} +{"32008949|16830291": []} diff --git a/edge/graph_210936735.jsonl b/edge/graph_210936735.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b7dfb5b27bb754466d0c73e7abe4698d90179e4 --- /dev/null +++ b/edge/graph_210936735.jsonl @@ -0,0 +1 @@ +{"22070075|11392986": []} diff --git a/edge/graph_210940931.jsonl b/edge/graph_210940931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5cdd1d691752ba299b05a32c1a945296f63e84c0 --- /dev/null +++ b/edge/graph_210940931.jsonl @@ -0,0 +1,13 @@ +{"30645043|49527603": ["Some of the emerging applications that can bene\ufb01t from this model include \ufb01nance, government services [30,31], IOT (Internet of Things) [26] and regulation compliance [27]."]} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"169077471|7492478": ["[21] claim that performance expectancy and behavioral intention are the best predictors for using technology.", "For a comprehensive literature review see Williams, Rana, & Dwivedi [21] who examined 174 existing articles on the UTAUT model."]} +{"36400013|10137283": ["Trust can be defined as a subjective belief of a peer about other peers belonging to the same society or geographical zone [9]."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"102750333|51881458": []} +{"102750333|52877341": []} diff --git a/edge/graph_210942662.jsonl b/edge/graph_210942662.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f71890bab7f3ac7b1a3f105aa4791efef9f897bd --- /dev/null +++ b/edge/graph_210942662.jsonl @@ -0,0 +1,22 @@ +{"204800604|210942662": ["6D object pose estimation from a single image has been extensively researched in the past decades [11], [12], [13], [14]."]} +{"52953916|7559976": ["Domain Adaptation (DA) [5] refers to leveraging training data from a source domain to a target domain of which a small portion of labeled data (supervised DA) or unlabeled data (unsupervised DA) is available."]} +{"58006460|9978124": ["6D object pose estimation is the crux to many important real-world applications, such as robotic grasping and manipulation [7, 35, 44], autonomous navigation [6, 11, 42], and augmented reality [19, 20]."]} +{"207237260|9597596": ["Two related systems include ROS Commander [29] and RoboFlow [4], which integrate robot actions, including those programmed by demonstration, with a visual programming language using a data flow model [21]."]} +{"12888763|393948": ["It has been shown that convnet representations trained on classification problems generalize well to other tasks [18, 17, 2, 6].", "Such \u2018transfer learning\u2019 has been demonstrated elsewhere for training classifiers [18, 17, 2], but here we demonstrate transfer learning from classification to the qualitatively different task of pose regression."]} +{"12971705|6681074": []} +{"1670463|1634674": ["A detailed overview of the current state-of-the-art in activity recognition can be found in, e.g., [8], [9]."]} +{"3933114|206986719": ["A vast range of input techniques have been proposed for use in mixed-reality systems [61], such as gaze input [4][51], hand gestures [16][34][36], voice input [8][44], physical controllers (using physical buttons [46], motion sensing [45], or external tracking [27]), tangible interfaces [7][29], or multimodal combinations of these approaches (e."]} +{"13122447|2616070": ["For pose tracking using RGB images, region-based methods relying on statistical level-set segmentation [6] have shown to produce state of the art results."]} +{"5054222|469744": ["We refer readers to work by Billinghurst et al. [4] An alternative approach is diminished reality or illusionary transparency [23, 24, 25] which usually focuses on removing objects from a video feed."]} +{"52177403|56517517": ["Given this time of tremendously rapid evolution, there exist many recent survey papers on deep learning [13, 86, 89, 145, 166, 212, 280, 290, 305, 312, 317].", "These surveys reviewed deep learning techniques from different perspectives [13, 86, 89, 145, 212, 280, 312], or with applic tion to medic l image anal sis [166], natural language processing [290], speech recognition systems [305], and remote sensing [317]."]} +{"52177403|53109768": []} +{"52177403|21955893": []} +{"52177403|2088679": []} +{"52177403|207060556": ["A Survey on Face Detection in the Wild: Past, Present and Future [301] 2015 CVIU 2000 \u5e74\u4ee5\u964d\u306e \u201cin the wild\u201d(\u975e\u5236\u7d04\u74b0\u5883,\u5b9f\u74b0\u5883)\u9854\u691c\u51fa\u306e\u30b5\u30fc\u30d9\u30a4", "\u6b69\u884c\u8005\u691c\u51fa [66, 79, 59],\u9854\u691c \u51fa [294, 301],\u8eca\u4e21\u691c\u51fa [258],\u30c6\u30ad\u30b9\u30c8\u691c\u51fa [295] \u306a\u3069,\u7279 \u5b9a\u7269\u4f53\u691c\u51fa\u554f\u984c\u306b\u95a2\u3059\u308b\u512a\u308c\u305f\u8abf\u67fb\u304c\u591a\u6570\u884c\u308f\u308c\u3066\u304d\u305f."]} +{"52177403|5729190": []} +{"52177403|1223851": ["15 Salient Object Detection: A Survey [19] 2014 arXiv A survey for salient object detection"]} +{"52177403|393948": []} +{"52177403|206764452": []} +{"52177403|9045232": []} +{"197635980|7559976": ["Domain Adaptation (DA) (Csurka, 2017) refers to leveraging training data from a source domain to a target domain of which a small portion of labeled data (supervised DA) or unlabeled data (unsupervised DA) is available."]} +{"8671334|987239": []} diff --git a/edge/graph_210952899.jsonl b/edge/graph_210952899.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..198e26c9b95480eb1585a3fbcdea509bfeec401c --- /dev/null +++ b/edge/graph_210952899.jsonl @@ -0,0 +1,4 @@ +{"44371551|9494512": []} +{"12331948|205286988": ["However, the hierarchical clustering design may has some challenges which are required to be considered when designing low power resources networks such as smart WSNs [2]."]} +{"44882134|1230643": ["Typically, motes consist of batteries, processor, transceiver and sensors [1].", "WSNs are used in many applications such as military applications, environmental monitoring, health care monitoring, security monitoring and so on [1]."]} +{"1250400|16514036": []} diff --git a/edge/graph_210955216.jsonl b/edge/graph_210955216.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79ed8db217e5c2e9bbe58c7ac9ea1d5b19eb48fe --- /dev/null +++ b/edge/graph_210955216.jsonl @@ -0,0 +1,17 @@ +{"125371943|3110415": []} +{"125371943|393948": []} +{"17422880|62701834": []} +{"49342191|3924799": []} +{"199088049|35695099": ["Moreover, a spectrum sensing architecture has been investigated to enhance UAVs connectivity over the unlicensed spectrum in [31]."]} +{"199088049|39936276": ["NDN is evolving as the most likely or prominent information-centric future Internet architecture [18,21,57]."]} +{"85498223|81985472": []} +{"85498223|7981750": []} +{"206592484|456491": []} +{"203145255|53578654": ["The former essentially only considers the damage expressed in the roof, and in addition makes use of proxies such as debris piles for specific shadow configurations (for a recent review of those proxies see Ghaffarian et al. 2018)."]} +{"199449568|3924799": []} +{"59291942|4097106": ["Anomaly detection is a major area of interest within the field of machine learning with various real-world applications spanning from biomedical [9] to video surveillance [10].", "A significant body of prior work exists within anomaly detection for visual scene understanding [1]\u2013[5] with a wide range of application domains [6]\u2013[10].", "Taken together, these studies support the notion that the use of reconstruction-based approaches shows promise within the field [9], [10], [12]\u2013[14]."]} +{"59291942|20404279": ["Training AAE provides superior reconstruction as well as the capability of controlling the latent space [20], [27], [28]."]} +{"53578654|3957028": []} +{"53578654|132150752": []} +{"208229839|53578654": ["However, this requires indirect observations and the use of proxies [19], as demonstrated in recent studies on vulnerability [37,38], resilience [39], damage [40,41], and recovery [42].", "All make use of physical proxy indicators (hereafter: proxies) constituting indirect measures that provide insights into not directly observable features or processes [19].", "Nevertheless, this does not agree with the generally accepted notion of resilient communities showing faster recovery [19,20].", ", built-up, social, and economic [19] are needed to cover the entire damage and recovery process comprehensively."]} +{"52949543|1877246": []} diff --git a/edge/graph_210956229.jsonl b/edge/graph_210956229.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1843b9b25d9e57504d0a58007f659cf708fd034 --- /dev/null +++ b/edge/graph_210956229.jsonl @@ -0,0 +1,55 @@ +{"1515207|870434": []} +{"9679671|870434": ["NDERWATER sensor networks have attracted significant research interest in recent years due to their potential applications in environmental monitoring, assisted navigation, and seismic data monitoring and transmission for disaster warning systems and offshore oil and gas exploration projects [1][2][3][4]."]} +{"18792674|870434": ["Several characteristics specific to underwater acoustic communications and networking introduce additional design complexity into almost every layer of the network protocol stack [1], [2], [3], [4], [5]."]} +{"3573412|8316096": ["Some survey papers have concluded routing techniques [7,14,15].", "In [15], the authors conclude these characteristics of the challenges:", "Different from the taxonomy of [15], the authors in [14] discuss these routing techniques based on localization, routing, and reliability.", "Routing techniques are the guarantee for the reliable and efficient communication between the anchor nodes and the unknown sensor nodes [15].", "The authors present various protocols and compare them in detail, while in [15], the authors describe the routing protocols in two aspects, namely, the cross-layer design routing and the non-cross-layer design routing."]} +{"3573412|31355144": ["In [2], the authors have pointed out that the algae collection on the camera lens and salt accumulation may lead to the lower effectiveness of sensors.", "In [2], three types of communications (3D) are described as follows: (1) inter-cluster node communication at different depths; (2) sensor-anchor node communication; and (3) anchor-buoyant node communication.", "In the constrained communication, the currently tethered technology can be used but with additional cost [2].", "Those sensor nodes are spatially distributed in underwater and carry out some sensing work aiming at obtaining water-related properties [2]."]} +{"3573412|2469117": ["[13] Stationary localization algorithms, Mobile localization algorithms, Hybrid localization algorithms Medium 2012 Medium Detailed", "Then, in [13], the authors classify the localization algorithms according to the mobility of the sensor nodes."]} +{"549834|870434": ["There are still many issues unsolved for the large scale UWSNs, such as reliable transport, routing, MAC and localization [2] [3] [4] [5] [6] because of the limited bandwidth, and high and variable propagation delays, severely impaired underwater channel, limited battery power."]} +{"6939676|17683338": []} +{"6939676|15300368": []} +{"6939676|3212818": ["In particular, positioning accuracy decreases moving away from the node which started algorithm and in real network the complete graph realization is not always guaranteed."]} +{"6939676|12817488": []} +{"6939676|270804": []} +{"6939676|6275330": []} +{"6939676|1230643": []} +{"3738168|73678081": []} +{"3738168|4502294": ["However, FSO communication focuses more on long-range and high data rate outdoor terrestrial optical wireless communication (TOWC) applications such as wireless X-hauling [117]."]} +{"3738168|8316096": []} +{"3738168|8650651": []} +{"3738168|31355144": ["where the transmission between the surface station and optical sensor nodes is single hop [58].", "The architecture of static one-dimensional UOWNs also follows star topology, where the transmission between the surface station and optical sensor nodes is single hop [58]."]} +{"3738168|13475127": ["A detailed survey on marine life research using underwater sensor networks is presented in [298]."]} +{"3738168|902018": ["\u2022 Stationary two-Dimensional UOWNs: In the stationary two-dimensional architecture of UOWNs, a group of static optical sensor nodes is deployed in underwater environment [59]."]} +{"3738168|870434": ["- Fig. 4: Comparison of acouistic, RF, and optical waves under different performance metrics which are highlighted with green and red colors if they favor for high and low values, respectively. bulky [70]. The cost per acoustic node makes creating a large scale underwater acoustic network economically demanding, energy inef\ufb01cient which may necessitate battery replacement burden that can be quite a pro"]} +{"3738168|12060835": ["As surveyed in [390], ongoing research efforts on terrestrial communications have shown that energy harvesting plays a significant role in enhancing the performance."]} +{"2082003|17325804": ["Some hybrid schemes of TOA, AOA, TDOA, and RSS have been proposed for target tracking and localization (Gezici (2008))."]} +{"2082003|1230643": ["(2006); Akyildiz et al. (2002)). One of the most fundamental tasks for wireless sensor networks is underwater target tracking. There are mainly four different types of measurements that available for underwater target tracking and localization: time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and received signal strength (RSS) (Rong and Sichitiu (2006); Chan et al. (2006); Schau and Robinson (1987); Kaemarungsi (2006)). Some hybrid schemes of TOA, AOA, TDOA, and RSS have been proposed for target tracking and localization (Gezici (2008)). The hybrid approaches can reduce the number of distinct sensors required to achieve a desired level of localization performance. And the hybrid approaches can overcome the drawbacks such as the payload limit, especially for the small agents which cannot be equipped with many localization sensors (Bishop et al. (2008)). It is well known that the relative sensor-target geometry can significantly affect the potential performance of target localization algorithm (Gustafsson and Gunnarsson (2005)). In this paper, we address the problem of computing the optimal geometric configuration of a WSN that will maximize the information available for target localization, the hybrid bearing and range information are used as measurements. Some relevant researches in the WSN are mainly focus on the terrestrial target. In the work, the measurement noises are assumed to be mutually independent and Gaussian distributed with zero mean and the same variance. The relative sensor-target geometry for localization with range-only, bearing-only and TOA measurements was studied in Bishop et al. (2010), where the optimal geometry for the bearing-only localization is dependent on the distance between sensors to the target while the optimal geometries are independent on the distance for the others. In Lui and So (2009), under the assumption that each sensor received a white signal source in the presence of additive white noise, an optimum sensor placement strategy was derived using the TDOA measurements. A complete characterization of optimal angular separation for AOA sensors in passive localization problems was developed for arbitrary but fixed sensor ranges in paper Do\u011fan\u00e7ay and Hmam (2008), the optimality condition was built by complex exponentials.", "Underwater wireless sensor networks (UWSNs) are attracting considerable research attentions in a number of potential applications in the civil and military fields, ranging from the environmental surveillance and battlefield monitoring to health care (Otto et al. (2006); Akyildiz et al. (2002)).", "(2006); Akyildiz et al. (2002)). One of the most fundamental tasks for wireless sensor networks is underwater target tracking. There are mainly four different types of measurements that available for underwater target tracking and localization: time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and received signal strength (RSS) (Rong and Sichitiu (2006); Chan et al. (2006); Schau and Robinson (1987); Kaemarungsi (2006)). Some hybrid schemes of TOA, AOA, TDOA, and RSS have been proposed for target tracking and localization (Gezici (2008)). The hybrid approaches can reduce the number of distinct sensors required to achieve a desired level of localization performance. And the hybrid approaches can overcome the drawbacks such as the payload limit, especially for the small agents which cannot be equipped with many localization sensors (Bishop et al. (2008)). It is well known that the relative sensor-target geometry can significantly affect the potential performance of target localization algorithm (Gustafsson and Gunnarsson (2005)). In this paper, we address the problem of computing the optimal geometric configuration of a WSN that will maximize the information available for target localization, the hybrid bearing and range information are used as measurements. Some relevant researches in the WSN are mainly focus on the terrestrial target. In the work, the measurement noises are assumed to be mutually independent and Gaussian distributed with zero mean and the same variance. The relative sensor-target geometry for localization with range-only, bearing-only and TOA measurements was studied in Bishop et al. (2010), where the optimal geometry for the bearing-only localization is dependent on the distance between sensors to the target while the optimal geometries are independent on the distance for the others. In Lui and So (2009), under the assumption that each sensor received a white signal source in the presence of additive white noise, an optimum sensor placement strategy was derived using the TDOA measurements. A complete characterization of optimal angular separation for AOA sensors in passive localization problems was developed for arbitrary but fixed sensor ranges in paper Do\u011fan\u00e7ay and Hmam (2008), the optimality condition was built by complex exponentials. The performance improvement contributed by an additional AOA sensor to an existing AOA localization system was analyzed in Dogancay et al. (2008) assuming the prior knowledge of the emitter location.", "(2006); Akyildiz et al. (2002)). One of the most fundamental tasks for wireless sensor networks is underwater target tracking. There are mainly four different types of measurements that available for underwater target tracking and localization: time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and received signal strength (RSS) (Rong and Sichitiu (2006); Chan et al. (2006); Schau and Robinson (1987); Kaemarungsi (2006)). Some hybrid schemes of TOA, AOA, TDOA, and RSS have been proposed for target tracking and localization (Gezici (2008)). The hybrid approaches can reduce the number of distinct sensors required to achieve a desired level of localization performance. And the hybrid approaches can overcome the drawbacks such as the payload limit, especially for the small agents which cannot be equipped with many localization sensors (Bishop et al. (2008)). It is well known that the relative sensor-target geometry can significantly affect the potential performance of target localization algorithm (Gustafsson and Gunnarsson (2005)). In this paper, we address the problem of computing the optimal geometric configuration of a WSN that will maximize the information available for target localization, the hybrid bearing and range information are used as measurements. Some relevant researches in the WSN are mainly focus on the terrestrial target. In the work, the measurement noises are assumed to be mutually independent and Gaussian distributed with zero mean and the same variance. The relative sensor-target geometry for localization with range-only, bearing-only and TOA measurements was studied in Bishop et al. (2010), where the optimal geometry for the bearing-only localization is dependent on the distance between sensors to the target while the optimal geometries are independent on the distance for the others. In Lui and So (2009), under the assumption that each sensor received a white signal source in the presence of additive white noise, an optimum sensor placement strategy was derived using the TDOA measurements. A complete characterization of optimal angular separation for AOA sensors in passive localization problems was developed for arbitrary but fixed sensor ranges in paper Do\u011fan\u00e7ay and Hmam (2008), the optimality condition was built by complex exponentials. The performance improvement contributed by an additional AOA sensor to an existing AOA localization system was analyzed in Dogancay et al. (2008) assuming the prior knowledge of the emitter location. A family of decentralized control laws that steers the sensors to a set of points of maximum for the costs functions were derived in Mart\u0301\u0131nez and Bullo (2006) under the assumption of Gaussian noise measurements with diagonal correlation. The problem of optimal trajectory generation for a team of mobile sensors tracking a moving target using distance-only measurements was presented in Zhou and Roumeliotis (2008) with the constraints on the speed of the sensors.", "(2006); Akyildiz et al. (2002)). One of the most fundamental tasks for wireless sensor networks is underwater target tracking. There are mainly four different types of measurements that available for underwater target tracking and localization: time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and received signal strength (RSS) (Rong and Sichitiu (2006); Chan et al. (2006); Schau and Robinson (1987); Kaemarungsi (2006)). Some hybrid schemes of TOA, AOA, TDOA, and RSS have been proposed for target tracking and localization (Gezici (2008)). The hybrid approaches can reduce the number of distinct sensors required to achieve a desired level of localization performance. And the hybrid approaches can overcome the drawbacks such as the payload limit, especially for the small agents which cannot be equipped with many localization sensors (Bishop et al. (2008)). It is well known that the relative sensor-target geometry can significantly affect the potential performance of target localization algorithm (Gustafsson and Gunnarsson (2005)). In this paper, we address the problem of computing the optimal geometric configuration of a WSN that will maximize the information available for target localization, the hybrid bearing and range information are used as measurements. Some relevant researches in the WSN are mainly focus on the terrestrial target. In the work, the measurement noises are assumed to be mutually independent and Gaussian distributed with zero mean and the same variance. The relative sensor-target geometry for localization with range-only, bearing-only and TOA measurements was studied in Bishop et al. (2010), where the optimal geometry for the bearing-only localization is dependent on the distance between sensors to the target while the optimal geometries are independent on the distance for the others. In Lui and So (2009), under the assumption that each sensor received a white signal source in the presence of additive white noise, an optimum sensor placement strategy was derived using the TDOA measurements. A complete characterization of optimal angular separation for AOA sensors in passive localization problems was developed for arbitrary but fixed sensor ranges in paper Do\u011fan\u00e7ay and Hmam (2008), the optimality condition was built by complex exponentials. The performance improvement contributed by an additional AOA sensor to an existing AOA localization system was analyzed in Dogancay et al. (2008) assuming the prior knowledge of the emitter location. A family of decentralized control laws that steers the sensors to a set of points of maximum for the costs functions were derived in Mart\u0301\u0131nez and Bullo (2006) under the assumption of Gaussian noise measurements with diagonal correlation.", "(2006); Akyildiz et al. (2002)). One of the most fundamental tasks for wireless sensor networks is underwater target tracking. There are mainly four different types of measurements that available for underwater target tracking and localization: time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and received signal strength (RSS) (Rong and Sichitiu (2006); Chan et al. (2006); Schau and Robinson (1987); Kaemarungsi (2006)). Some hybrid schemes of TOA, AOA, TDOA, and RSS have been proposed for target tracking and localization (Gezici (2008)). The hybrid approaches can reduce the number of distinct sensors required to achieve a desired level of localization performance. And the hybrid approaches can overcome the drawbacks such as the payload limit, especially for the small agents which cannot be equipped with many localization sensors (Bishop et al. (2008)). It is well known that the relative sensor-target geometry can significantly affect the potential performance of target localization algorithm (Gustafsson and Gunnarsson (2005)). In this paper, we address the problem of computing the optimal geometric configuration of a WSN that will maximize the information available for target localization, the hybrid bearing and range information are used as measurements. Some relevant researches in the WSN are mainly focus on the terrestrial target. In the work, the measurement noises are assumed to be mutually independent and Gaussian distributed with zero mean and the same variance. The relative sensor-target geometry for localization with range-only, bearing-only and TOA measurements was studied in Bishop et al. (2010), where the optimal geometry for the bearing-only localization is dependent on the distance between sensors to the target while the optimal geometries are independent on the distance for the others.", "(2006); Akyildiz et al. (2002)). One of the most fundamental tasks for wireless sensor networks is underwater target tracking. There are mainly four different types of measurements that available for underwater target tracking and localization: time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and received signal strength (RSS) (Rong and Sichitiu (2006); Chan et al. (2006); Schau and Robinson (1987); Kaemarungsi (2006)).", "(2006); Akyildiz et al. (2002)). One of the most fundamental tasks for wireless sensor networks is underwater target tracking. There are mainly four different types of measurements that available for underwater target tracking and localization: time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA) and received signal strength (RSS) (Rong and Sichitiu (2006); Chan et al. (2006); Schau and Robinson (1987); Kaemarungsi (2006)). Some hybrid schemes of TOA, AOA, TDOA, and RSS have been proposed for target tracking and localization (Gezici (2008)). The hybrid approaches can reduce the number of distinct sensors required to achieve a desired level of localization performance. And the hybrid approaches can overcome the drawbacks such as the payload limit, especially for the small agents which cannot be equipped with many localization sensors (Bishop et al. (2008)). It is well known that the relative sensor-target geometry can significantly affect the potential performance of target localization algorithm (Gustafsson and Gunnarsson (2005)). In this paper, we address the problem of computing the optimal geometric configuration of a WSN that will maximize the information available for target localization, the hybrid bearing and range information are used as measurements. Some relevant researches in the WSN are mainly focus on the terrestrial target. In the work, the measurement noises are assumed to be mutually independent and Gaussian distributed with zero mean and the same variance. The relative sensor-target geometry for localization with range-only, bearing-only and TOA measurements was studied in Bishop et al. (2010), where the optimal geometry for the bearing-only localization is dependent on the distance between sensors to the target while the optimal geometries are independent on the distance for the others. In Lui and So (2009), under the assumption that each sensor received a white signal source in the presence of additive white noise, an optimum sensor placement strategy was derived using the TDOA measurements."]} +{"31799015|870434": ["On the other hand, optical modems have been shown to achieve data rates reaching to Mbit/s with ranges up to 100m, only in very clear water conditions [2].", "In underwater, radio signals attenuate rapidly, hence they can only travel to short distances while optical signals scatter and cannot travel far in adverse conditions, as well [2]."]} +{"10085832|164835": ["For example, multipath signals using a pseudo-random code arriving at the receiver later than the direct path signal will have negligible effects on a high-resolution DS-BPSK receiver [ 4 ]."]} +{"844715|870434": ["The event is sensed by the low power sensor node deployed in neighbourhood and the sensed information is transmitted to a remote processing unit or base station."]} +{"14845035|1230643": []} +{"10901077|870434": ["\u2026Gerla Istanbul Technical University UCLA UCLA Computer Engineering Computer Science \nComputer Science Department Department Department melike.erol@itu.edu.tr luiz.lipe@ucla.edu gerla@cs.ucla.edu \n ABSTRACT In this paper, we address the localization issue in Underwater Sen\u00adsor Networks (UWSNs)."]} +{"3989426|18011174": ["[72] Preventing malicious attack and Assuring trustworthiness Evolutionary game theoretic approach Prevent nodes form attack and guarantee trustworthiness of data These is no much impasses on cooperation issues", "In a partition form of coalition, the players participant number would be determined by the coalition value which is regardless of establishment of the network [72].", "[59] No No No No Yes Yes No No [24] Yes No Yes No No Yes No Yes [32] No No Yes Yes Yes Yes Yes No [72] No No No Yes Yes No Yes No [21] Yes No Yes No No No Yes No [70] Yes No Yes Yes Yes No Yes No [71] Yes Yes Yes Yes No No No No [48] No Yes No No No Yes No No [81] No No No Yes Yes No Yes No [28] Yes Yes No No No Yes No No [35] Yes Yes Yes No No Yes Yes Yes [83] No Yes No Yes Yes Yes Yes No [60] Yes Yes No Yes No Yes No No [51] Yes No Yes Yes Yes Yes No No [33] No No Yes Yes Yes Yes No No [40] No Yes Yes No No Yes No No [50] No Yes No Yes No Yes No Yes [59] No Yes No Yes Yes Yes No No"]} +{"3989426|2469117": ["A survey of comprehensive localization schemes is presented in [46] that classified the algorithms based on three components of the mobility in the sensor called mobile, stationary and hybrid algorithms."]} +{"17189448|870434": ["Index Terms\u2014 underwater localization, semi-definite\nprogramming, convex hull, buoyed anchors"]} +{"3076551|870434": ["Furthermore, threedimensional localization becomes even more challenging (e.g., being in range of a sufficient number of anchor nodes) due to the economically-driven sparseness of USN deployments [5]."]} +{"35631918|870434": ["NDERWATER sensor networks are different from terrestrial wireless sensor networks in a few aspects [1], [2]."]} +{"1420402|870434": ["In this section, we briefly overview the localization techniques proposed in UWA-SNs."]} +{"1420402|164835": ["It is a modified version of the indoor S-V channel model [27]."]} +{"199509461|57760262": ["Because the underwater environment is deep, so vertical transceiver has enough range [12]."]} +{"199509461|1489715": ["In such conditions, the overall data cannot be saved and required quick processing [20], [21]."]} +{"14858110|3054454": ["The spatial properties of the wireless channel have signi\ufb01cant impact on the detection of AOA [10]."]} +{"1574615|3054454": ["Various survey articles have recently appeared which have a large number of references on indoor propagation [9], [10], [11], and one discusses statistical channel modeling for both indoor and outdoor channels [12]."]} +{"57760262|2473728": ["The major problem in routing is limited bandwidth, energy consumption, propagation delay, and short of memory [61]."]} +{"57760262|8316096": ["To address the problem of long propagation delay and high lite error rate a routing protocol QERP was proposed to handle end-to-end delay but this protocol still needs to address the mobility issues [14]."]} +{"57760262|31355144": ["demands methodologies from research community that better utilize the acoustic channel [58, 59]."]} +{"6044445|870434": ["\u2026the Chinese National High Technology Research and Development Plan (863 program) under Grant No. 2006AA09Z113.\nlocalization, localization schemes often need to deploy anchor nodes underwater and the precision of anchor deployment significantly affects the location accuracy of nodes\u2026", "We first describe the network model, then we propose LDB scheme and at the end of this section we present the LDB algorithm."]} +{"3543138|31355144": ["Sensor nodes are spatially distributed in UWSNs with some sensing work to obtain water-related properties such as mass, temperature and pressure data [2]."]} +{"3543138|2469117": ["Recently, numerous localization algorithms have been put forward, and some researchers have done some surveys of localization algorithms [13,14]."]} +{"15379285|164835": ["Several radio-location methods are proposed for locating the Mobile Stations (MSs) in cellular systems [ 4 ]: the Signal Strength method, the Angle of Arrival (AOA) method, the Time of Arrival (TOA) and Time Difference of Arrival (TDOA) methods."]} +{"11343279|870434": ["There are still many issues unsolved for the large scale UWSNs, such as reliable transport, routing, MAC and localization [2] [3] [4] [5] [6]."]} +{"206675|870434": ["To simplify our discussion, we assume the received range of underwater sensors is a disc in 2D, which means that the shape of range is a sphere in 3D."]} +{"118898491|870434": []} +{"2416360|870434": ["Categories and Subject Descriptors C.2.m [COMPUTER-COMMUNICATION NETWORKS]: Miscellaneous\nGeneral Terms Design, Experimentation, Measurement\nKeywords Underwater Sensor Networks, Lab Testbed, Acoustic Communication, Emulator"]} +{"7191848|870434": ["Since underwater acoustic devices are expensive and deployment is costly [1], we expect UASNs to be deployed for long durations."]} +{"35794798|870434": []} +{"16631775|17325804": []} diff --git a/edge/graph_210956524.jsonl b/edge/graph_210956524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a54af0979b305215d6cd77cd3cdadff6dd0790ef --- /dev/null +++ b/edge/graph_210956524.jsonl @@ -0,0 +1,7 @@ +{"11933981|1770055": ["As such, there is an urgent need to develop new automated evaluation metrics for this task [8,9]."]} +{"57189218|3693305": ["ges, especially for videos, has been regarded as a challenging task. Video captioning is a critical step towards machine intelligence and many applications in daily scenarios, such as video retrieval [3], [4], video understanding, blind navigation and automatic video subtitling. Thanks to the rapid development of deep Convolutional Neural Network (CNN), recent works have made signi\ufb01cant progress for "]} +{"14903630|10397481": ["Key-frames can generate summaries of the videos to provide browsing capabilities to the users [2, 3]."]} +{"3633912|3693305": []} +{"3633912|1596835": ["The loss usually takes place in the process of hash function learning [13], which is a post-step after pooling; Compared to dominant video"]} +{"13743385|14814753": ["This is a standard practice in the deep learning literature [42], as the network learns generic features for image recognition; for example, it can distinguish corners, textures, basic geometric elements, and so on."]} +{"19158922|1770055": ["In-depth study of these different models is beyond the scope of this article and falls within the surveys such as [5]."]} diff --git a/edge/graph_210958580.jsonl b/edge/graph_210958580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2109604.jsonl b/edge/graph_2109604.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210962688.jsonl b/edge/graph_210962688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f3a29a625c97a5c8d3a72b16fe840168945552b --- /dev/null +++ b/edge/graph_210962688.jsonl @@ -0,0 +1,5 @@ +{"53670316|27262729": ["But in fact, there are a lot of forms of double-spend attacks against PoW, including Finney attack [12], race condition attack [14], Vector76 [13] attack and so on."]} +{"208291135|210962688": ["A proof of work (PoW) is a procedure that allows a prover to demonstrate that he is very likely to having performed a specific amount of computational work within a prescribed interval of time [34]."]} +{"208291135|90260954": ["The existence of different types of block in blockchains has become common, as it is considered suitable for tackling the problem of scalability [35]."]} +{"10184200|14171067": ["In computational science, the matrix dimension n can grow up to Billions [57], [36], [7], [28], and thus a petaflops machine may take several months to solve the matrix product, which may serve as an PoX for cryptocurrencies.", "The choice behind matrixbased problems is two-fold: (1) matrices have interesting composability properties that help in tuning difficulty, collaborative verification, and pool-mining (see later); and (2) matrix-based problems span a wide range of useful real world problems, being a principle abstraction for most scientific computation problems, among them: DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15],", ") as in DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15], [2], collaborative-filtering recommendation, data mining [28], computational geometry [19],"]} +{"67877115|27262729": []} diff --git a/edge/graph_210966254.jsonl b/edge/graph_210966254.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210966417.jsonl b/edge/graph_210966417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a3d342233de3868c0d4edba2f700be4990859c6 --- /dev/null +++ b/edge/graph_210966417.jsonl @@ -0,0 +1,24 @@ +{"52180360|1932843": ["used DRL in conjunction with supervised learning on human game data to train the policy networks of their program AlphaGo [11]; [12], [13] present an overview of RL and DRL respectively."]} +{"67859546|8446711": ["Perception systems that includes IR cameras [14,15] work in near-infrared (NIR: 780 nm\u20133 mm) or mid-infrared (MIR: 3 mm\u201350 mm, known as thermal cameras) ranges."]} +{"67859546|18388986": ["In a review carried out by [30], it is possible to find an extensive classification of fusion methods according to different criteria such as: (1) relations between the input data sources; (2) input/output data types and their nature; (3) abstraction level of the employed data; (4) different data fusion levels, and (5) architecture types."]} +{"36500119|1708582": []} +{"5018124|1229096": ["A full review on Motion Planning techniques can be found in [13] and [14]."]} +{"21657320|15093118": ["A comprehensive survey of maneuver-based models can be found in [1], [6]."]} +{"146808048|17485266": ["In parallel to the collection of new training samples, the neural network parameters \u03b8 are optimized from the stored samples by using a gradient descent algorithm [27]."]} +{"146808048|9316331": ["MCTS can be used to select approximately optimal actions in POMDPs [14].", "MCTS can be used to select approximately optimal actions in POMDPs [13].", "is Monte Carlo tree search (MCTS) [14], which has been applied to lane changes on a highway [15]."]} +{"118649538|1708582": ["In reinforcement learning (RL), the environment is modeled as an MDP with unknown transition and reward models (Kaelbling et al., 1996).", "lements of the tuple are the same as in the previous de\ufb01nition. 3.2 Reinforcement Learning In reinforcementlearning(RL), the environmentis modeled as an MDP with unknown transition and reward models (Kaelbling et al., 1996). The agent observes the state of the environment and receives a reward at every time step. While gathering experience, the agent updates its policy to maximize its accumulated reward. This paradigmdo"]} +{"182112986|4884302": []} +{"139104552|1708582": ["Supervised Learning has two main tasks called Regression and Classi\ufb01cation whereas Reinforcement Learning has different tasks such as exploitation or exploration, Markov\u2019s decision processes, Policy Learning, Deep Learning and value learning [6]."]} +{"19121365|4528002": ["ower grids or cellular communication systems that provide service to the ITSs [6], [7]. Recently, a number of security solutions have been proposed for addressing intra-vehicle security problems [8]\u2013 [11]. In [8], the authors identi\ufb01ed the key vulnerabilities of a vehicle\u2019s controller and proposed a number of intrusion detection algorithms to secure this controller. Moreover in [9], the authors show t", "s of plug-in electric vehicles, while accounting for their impact on the power system. Moreover, a survey on security threats and protection mechanisms in embedded automotive networks is presented in [11]. Furthermore, vehicular communication security challenges and solutions have also been studied recently in [12]\u2013 [16]. In [12], the security vulnerabilities of current vehicular communication archite"]} +{"57375704|1185580": ["The updated value function is then used to improve the actor\u2019s policy (Grondman et al., 2012)."]} +{"202578158|1229096": []} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"59553461|1185580": ["The actor determines which action to take, and the critic tells the actor the quality of the action and how it should adjust the policy[13]."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"90262164|4884302": ["This can be mainly attributed to augmenting RL with deep learning techniques [15]."]} +{"90262164|1229096": ["Autonomous vehicles (AVs) have enormous economic potential, can significantly enhance mobility options, and potentially reducing carbon footprint [5]."]} +{"62901671|4884302": ["eration for deep RL algorithm, an increasing number of deep RL algorithms, such as deep Q network (DQN) [2], Double DQN [11], Dueling DQN [12], etc., have been proposed and applied in various studies [13]. In addition, the algorithms are brie\ufb02y explained as follows. 2.1 DQN Deep Q Network is a combination between the convolutional neural network (CNN) and Q-Learning algorithm. The input of CNN is the "]} +{"67932433|1229096": []} +{"195218859|1932843": []} diff --git a/edge/graph_210966478.jsonl b/edge/graph_210966478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e0f0b7dec537dbf7995d29f6b65c10ff5968934 --- /dev/null +++ b/edge/graph_210966478.jsonl @@ -0,0 +1,79 @@ +{"14996842|393948": ["However, recent developments in deep learning gave rise to an\nend-to-end framework, incorporating automatic feature extraction in the process [3]."]} +{"209516011|10092092": ["There have been some heterogenous feature space DA approaches [14], [28], [29], which address the problem that the source domains have different feature spaces from the target domain."]} +{"209516011|15888893": ["Computational intelligence techniques have also been used in transfer learning, as reviewed by Lu et al. [25]."]} +{"58014179|4853233": ["The performance of DLmethods on EEG is of great interest as it is still not clear whether DL can outperform traditional EEG processing pipelines [105].", "Given the high dimensionality of EEG signals [105], one would assume that a considerable amount of data is required.", "State-of-the-art techniques, such as Riemannian geometry-based classifiers and adaptive classifiers [105], can handle these problems with varying levels of success."]} +{"206098228|16362395": []} +{"23449|11894197": []} +{"21927779|2088679": []} +{"54439125|51605426": ["The combination of brain-computer interfaces with AR are gaining broad acceptance in today\u2019s scientific community [14]."]} +{"54439125|9270553": ["Historically, BCI has always been related to medical applications, guaranteeing alternative ways of communication to people with sever motor disabilities [5], [6]."]} +{"54439125|17024419": ["become the \u201cultimate interface\u201d, through which thoughts can become acts, AR aims at increase our perception of the world, mixing physical objects with virtual information [15]."]} +{"1721126|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs).", "Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"1721126|18782652": ["Breslow and Aha (1997) survey methods of tree simplification to improve their comprehensibility.", "Breslow and Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"206917364|37213650": []} +{"5174201|7761990": ["Furthermore, principal component analysis (PCA) and ICA have also been widely applied to remove artifacts or\nextract data features and decrease the noise in neural imaging data sets (Calhoun et al., 2001b; Calhoun et al., 2009).", "Furthermore, principal component analysis (PCA) and ICA have also been widely applied to remove artifacts or extract data features and decrease the noise in neural imaging data sets (Calhoun et al., 2001b; Calhoun et al., 2009)."]} +{"184483761|52305483": []} +{"58551240|393948": ["Recently, deep learning (DL) techniques have shown distinctive capabilities in object detection, speech recognition, and time series classification [22], [23]."]} +{"15956407|16362395": ["We compared the performance of CFIS with that of three classifiers widely used in the BCI community which provided the best results in several BCI experiments [2].", "To do so, most BCI systems rely on a classifier [2]."]} +{"14641488|16362395": ["Oscillatory responses are the most common and well-studied characteristics in EEG [1, 2, 10]."]} +{"24527881|9270553": ["national meeting devoted to BCI [21], [36], requires a measure to evaluate all BCIs on a common basis.", "The number of achievable bits per decision is given by (see [21])"]} +{"60672758|11608263": ["If C contains more than 2 classes, there are two possible approaches to obtain a classification function [81, 82]."]} +{"60672758|14866098": ["Preprocessing consists in cleaning and denoising input data in order to enhance the relevant information contained in the raw signals [19].", "Feature extraction aims to describe the signals by a few relevant values called \u201cfeatures\u201d [19]."]} +{"60672758|16362395": ["Classification assigns a class to a set of features extracted from the signals within a certain time range [20].", "SVM are linear or non-linear models, depending on the selected kernel, that maximise the distance between the decision boundary and the patterns of each class [20].", "LDAs are simple linear models which do not require any hyperparameter [20]."]} +{"9470480|5755816": []} +{"9470480|2895124": ["Recently, BCIs also have been employed for healthy individuals\u2019 entertainment purposes (Ahn et al., 2014; Bai et al., 2015; Li et al., 2016), though this is not the main priority of BCI research."]} +{"9470480|1695607": ["These signals are an indication of muscles\u2019 electrical activity, which arises whenever there exists a voluntary or involuntary contraction (Chowdhury et al., 2013; Patil and Patil, 2014; Xie et al., 2014)."]} +{"52193519|6682153": ["Previous studies consistently reported signi\ufb01cant relationship between asymmetry patterns of brain activities and emotional process, based on which the asymmetry has been regarded as an important descriptor of emotion [19, 20]."]} +{"52193519|6116761": []} +{"199578568|51929263": ["It has been proven in several previous studies [36]\u2013[40] that 1) network-based deep transfer learning, which always transfer the partial structure and parameters of a pre-trained deep neural network in source domain to another network in target domain, is effective in reducing the training time and the need of labeled data in the target domain."]} +{"199578568|16362395": ["More specifically, in a MI BCI system, MI EEG signals indicating the people\u2019s intention or imagination are collected by electrodes placed on the scalp, then the BCI system processes and translates the collected signals into the commands to control external devices [5], [6]."]} +{"9823884|15929566": ["With respect to applications in solving dynamic optimization problems, Gosavi surveys Q-learning, temporal differences, semi-Markov decision problems, stochastic games, policy gradients, and hierarchical RL with detailed underlying mathematics [38]."]} +{"9823884|1708582": ["discussed RL from the perspective of the trade-off between exploitation and exploration, RL\u2019s foundation via Markov decision theory, the learning mechanism using delayed reinforcement, construction of empirical learning models, use of generalization and hierarchy, and reported some exemplifying RL systems implementations [36]."]} +{"6350935|192934": []} +{"2440414|5755816": ["2688423 [32], functional magnetic resonance imaging [44], functional near-infrared spectroscopy [33], and invasive recordings such"]} +{"3395547|5503545": ["A system that merges a normal BCI together with other physiological signals has been termed \u2018\u2018hybrid BCI\u2019\u2019 (hBCI) [2], [49]."]} +{"60774934|1400872": ["Of course, other existing on-line learning algorithms [ 39 ], [40] for tuning the weights of recurrent neural networks can be possibly adopted for tuning the RSONFIN, too."]} +{"4626093|7076154": []} +{"9935738|20905429": []} +{"150373805|4853233": ["Second, although some overviews have conducted in deep learning ([42, 43, 174]) and BCI ([2, 20, 48, 119, 120, 134]), few focus on their combination.", "To the best of our knowledge, the limited existing surveys [2, 20, 48, 114, 119, 120, 134, 222] only focus on partial EEG signals.", "[119] have not considered ERD and RSVP; Roy et al.", "2 [222] No fMRI Yes 2018 Mental Disease Diagnosis 3 [120] Partial EEG (mainly MI EEG and P300) No 2007 Classi\u0080cation 4 [119] Partial EEG (Mainly MI EEG, P300) Partial 2018 Classi\u0080cation 5 [134] Partial EEG (ERD, P300, SSVEP, VEP, AEP) No 2007", "Brain-Computer Interface (BCI)1 is a system that translates activity pa\u008aerns of the human brain into messages or commands to communicate with the outer world [119]."]} +{"150373805|206098228": ["Nowadays, BCI research mainly focuses on the static mode RSVP.", "In the analysis of RSVP, a number of discriminative deep learning models (e,g., CNN [29, 112, 185] and MLP [131]) have achieved great success.", "In terms of RSVP, CNN is the most prevelent algorithm employed.", "For example, Lo e et al. [120] and Wang et al. [220] focus on EEG without analyzing EEG signal types; Ceco i et al. [32] focus on Event-Related Potentials (ERP); Haseer et al. [142] focus on functional near-infrared spectroscopy (fNIRS); Fatourechi et al. [48] only focus on EMG and EOG; Wen et al. [222] and Liu et al. [114] only focus on Functional magnetic resonance imaging (fMRI); Mason et al. [134] brief the neurological phenomenons like event-related desynchronization (ERD), P300, SSVEP, Visual Evoked Potentials (VEP), Auditory Evoked Potentials (AEP) but have not organized them systematically; Abdulkader et al. [2] present a topology of brain signals but have not mentioned spontaneous EEG and Rapid Serial Visual Presentation (RSVP).", "(iii) RSVP Among various VEP diagrams, RSVP has a racted much a ention [59].", "A common preprocessing method used in RSVP signals is frequency ltering. e pass bands are generally ranged from0.", "In RSVP diagram, several items will be presented on a screen one-by-one.", "Based on the theory, visual target recognition main uses RSVP signals.", "RSVP contains a static mode (the items appear on the screen and then disappear without moving) and a moving mode (the items appear on the screen, move to another place, and nally disappear).", "Hajinoroozi et al. [66] adopted a CNN model for cross-subject and cross-task detection of RSVP. CNN was designed to capture both temporal and spatial features. e experimental results showed that CNN worked good in cross-task but failed to get satisfying performance in the cross-subject scenario.", "Manor et al. [127] applied two deep learning models to deal with the RSVP signals a er lowpass ltering (0 \u223c 51 Hz). e discriminative CNN achieved the accuracy of 85.06%.", "On the one hand, in ERP, VEP and the subcategory RSVP has drawn lots of investigations because visual stimuli, compared to other stimuli, are easier to present and more applicable in the real world (e.g., P300 speller can be used for brain typing).", "Ceco i et al. [30] worked on the classi cation of ERP signals in the RSVP paradigm. is paper proposed a CNN algorithm with a layer dedicated to spatial ltering for the detection of the speci c target in RSVP.", "Koike et al. [94] have adopted deep neural networks to identify the user\u2019s ID based on VEP signals while Mao et al. [132] applied CNN for person identi cation based on RSVP signals.", "Visual evoked potentials are the most common used potentials. erefore, it is essential to distinguish the three di erent visual evoked potential paradigms: VEP, RSVP, SSVEP.", "Similar to RSVP, Rapid Serial Auditory Presentation (RSAP) refers to experiments with rapid serial presentation of sound stimuli. e task for the subject is to recognize the target audio among the distracters.", "Rapid Serial Visual Presentation (RSVP) [101] can be regarded as one kind of VEP.", "First, the frequencies are di erent: the frequency of VEP is less than 2Hz while the frequency of RSVP is around 10Hz, and the frequency of SSVEP ranges from 3.5 to 75Hz.", "; Lo e et al. [119] have not considered ERD and RSVP; Roy et al. [233] list some deep learning based EEG studies but provide li le analysis.", "Usually, the frequency of RSVP is 10Hz which means that each item will stay on the screen for 0.1 seconds.", "Representative deep learning models are also applied in RSVP. Vareka et al. [212] veri ed if deep learning performs well for single trial P300 classi cation. ey conducted an RSVP experiment while the subjects were asked to recognize the target from non-target and distracters. e A DBN-AE was implemented and compared with some non-deep learning algorithms. e DBN-AE was composed of ve AEs while the hidden layer of the last AE only has two nodes which can be used for classi cation through so max function.", "For example, the video12 shows an RSVP scenario which is called speed reading.", "Mao et al. [130] compared three di erent deep learning models in the prediction of whether the subject had seen the target or not. e MLP, CNN, and DBN models obtained the AUC of 81.7%, 79.6%, and 81.6%, respectively. e author also applied a CNN model to analyze the RSVP signals for person identi cation [132].", "Single-trial EEG RSVP classi cation using convolutional neural networks.", "An RSVP diagram is commonly used to examine the temporal characteristics of a ention. e subject is required to stare at a screen where a series of items (e.g., images) are presented one-by-one. ere is a speci c item (called the target) separates from the rest of the other items (called distracters). e subject knows which is the target before the RSVP experiment."]} +{"150373805|207017399": ["7 [233] No EEG Yes (but without any model introduction) 2019 8 [20] No EEG No 2007 Signal Processing 9 [220] Partial EEG No 2016 BCI Applications 10 [2] Yes No 2015 11 [140] No EEG Partial (only DBN) 2018"]} +{"150373805|207330385": ["It has shown excellent representation learning ability since 2006 [42] and therefore been impacting a wide range of information-processing domains such as computer version, natural language processing, activity recognition, and logic reasoning [217]."]} +{"150373805|2088679": ["[113] review some leading deep learning concepts pertinent to medical image analysis without covering many other deep learning models; Soekadar et al.", "6 [113] No MRI, CT Partial 2017 Medical Image Analysis"]} +{"150373805|5755816": ["In current studies, three emi\u008aers and eight detectors would su\u0081ce for adequately acquiring the prefrontal cortex signals; and six emi\u008aers and six detectors would su\u0081ce for covering the motor cortex area [142].", "[142] focus on functional near-infrared spectroscopy (fNIRS); Fatourechi et al."]} +{"150373805|9928823": ["Deep learning is a class of machine learning techniques that uses many layers of information-processing stages in hierarchical architectures for pa\u008aern classi\u0080cation and feature/representation learning [42].", "Second, although some overviews have conducted in deep learning ([42, 43, 174]) and BCI ([2, 20, 48, 119, 120, 134]), few focus on their combination.", "It has shown excellent representation learning ability since 2006 [42] and therefore been impacting a wide range of information-processing domains such as computer version, natural language processing, activity recognition, and logic reasoning [217]."]} +{"150373805|14866098": ["To the best of our knowledge, the limited existing surveys [2, 20, 48, 114, 119, 120, 134, 222] only focus on partial EEG signals.", "Although traditional BCI systems have made tremendous progress [2, 20] in the past decades, the research in BCI still faces signi\u0080cant challenges.", "Second, although some overviews have conducted in deep learning ([42, 43, 174]) and BCI ([2, 20, 48, 119, 120, 134]), few focus on their combination.", "7 [233] No EEG Yes (but without any model introduction) 2019 8 [20] No EEG No 2007 Signal Processing 9 [220] Partial EEG No 2016 BCI Applications 10 [2] Yes No 2015 11 [140] No EEG Partial (only DBN) 2018"]} +{"150373805|16362395": []} +{"91184238|211112123": []} +{"91184238|15380857": [", P300 evoked potentials [10], [33], [40], [43], motor imagery (MI) [29], steady-state visual evoked potential (SSVEP) [47], drowsiness/reaction time estimation [41], [42], [44], etc.", "There are different paradigms in using EEG signals in BCIs, e.g., P300 evoked potentials [10], [33], [40], [43], motor imagery (MI) [29], steady-state visual evoked potential (SSVEP) [47], drowsiness/reaction time estimation [41], [42], [44], etc."]} +{"135469115|51929263": []} +{"18928468|16362395": []} +{"18928468|9270553": ["In contrast to various other types of systems [7], [8], brain\u2013computer interfaces (BCIs) are effective, because they can directly evaluate the cognitive states of human beings [8], [9]."]} +{"38457698|5503545": ["Due to natural and nonintrusive characteristics, most BCI systems select the EEG signal as input [1]."]} +{"16188626|16362395": ["Most of the effective solutions use machine learning models [5], [6], [7], [8].", "Each cell of the matrix contains a character: [A-Z], [1-9], and [_]."]} +{"52984752|16362395": ["[2].", "However, EEG signal analysis has many challenges to deal with such as low signal-to-noise (SNR) ratio, non-stationary characteristics of the signal, and the small datasets size [2]."]} +{"7432166|2895124": []} +{"7432166|5503545": []} +{"51712070|4853233": ["In addition, as suggested in Lotte et al (2018), there is thus a need to study and validate new classification algorithms not only offline, but online as well, to ensure they are sufficiently computationally efficient to be used in real time, can be calibrated quickly enough to be convenient to use\u2026", "Lotte et al (2018) proposed an interesting review about classification algorithms employed in BCI-based applications during the last ten years."]} +{"11796980|14866098": []} +{"11796980|16362395": ["Interested readers can refer, among others, to introductory papers by Bashashati et al. (2007); Lotte et al. (2007) and Blankertz et al. (2011)."]} +{"11796980|9270553": ["Typically, authors have reported changes using diverse metrics including accuracy, information transfer rate (Wolpaw et al., 2000), ef\ufb01ciency (Quitadamo et al., 2012) or utility value (Seno et al., 2010)."]} +{"3849381|14866098": ["For example, the [16, 4] \u00d7 [2, 16] model configuration, while performing the best on P300, was slightly worse in SMR and among the worst models for MRCP.", "When we ranked the 12 EEGNet models in descending order per dataset (so the 1st model performed the best and 12th model performed the worst) and averaged over the 4 datasets, we found that the [2, 32]\u00d7[8, 4] model configuration seemed to perform the best overall (Table 3), although it is difficult to determine statistical significance, given only four data points per model configuration.", "While these stages are largely the same across BCI paradigms, each paradigm relies on manually specified methods for signal processing [4], feature extraction [5] and classification [6], a process which often requires significant subject-matter expertise and/or a priori knowledge about the expected EEG signal.", "We see that the [2, 32] \u00d7 [8, 4] model ranks the best among all kernel configurations.", "The EEGNet model with the [2, 32] \u00d7 [8, 4] configuration will be used for the remainder of the manuscript."]} +{"3849381|16362395": ["methods [9], a process which often requires significant subject-"]} +{"51605426|7350786": ["This ratio is due to a reduction in the cost of sensors, actuators, and controller technology coupled with advanced manufacturing demand [14]."]} +{"207674859|2875192": []} +{"49865142|12127373": []} +{"206608942|9270553": ["Current systems can reach no more than 25 bits/min,1 even under optimal conditions [13]."]} +{"208548542|15380857": []} +{"3886555|6116761": []} +{"202750226|12127373": ["The former use cameras and/or other sensors, which are not attached to the driver\u2019s body, to monitor the driver\u2019s facial activities and/or driving patterns to estimate the drowsiness level [6], [8], [9]."]} +{"207852970|15380857": ["Various paradigms are used in EEG-based BCIs, such as P300 evoked potentials [3]\u2013[6], motor imagery (MI) [7], steady-state visual evoked potential (SSVEP) [8], etc.", "Various paradigms are used in EEG-based BCIs, such as P300 evoked potentials [3]\u2013[6], motor imagery (MI) [7], steady-state visual evoked potential (SSVEP) [8], etc. Deep learning has achieved great success in numerous \ufb01elds."]} +{"18453199|16362395": []} +{"4774633|2895124": []} +{"4774633|15380857": []} +{"4867616|16362395": []} +{"4867616|9270553": []} +{"22836795|16527268": ["Since biometric features cannot be stolen or duplicated easily, biometric authentication [4] is becoming increasingly a commonplace."]} +{"22836795|11179184": ["rnel functions to represent transformations of iris biometrics. \u201eis method restrains both the intra-class and inter-class variability to solve the sensor mismatch problem. Face recognition techniques [12, 18, 53] are the most common used and accepted by the public for its unique features and non-intrusiveness. Since face recognition systems require tackling di\u2021erent challenges including expression, image qual"]} +{"33682292|16362395": ["The comparison of different classification algorithms is presented in the literature [8], [26]\u2013[30].", "Specifically, [8] and [26] provide an extensive study of different classifiers; however, CNN and LSTM were not included in the study.", "in [26] and presented SVM as the superior classifier.", "The comparison studies between various classifiers have been presented in [8], [26]\u2013[30]."]} +{"52272775|46924129": []} diff --git a/edge/graph_210967584.jsonl b/edge/graph_210967584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fcb0b6da24ff01ec3197fbbed99a64b7adf47dcb --- /dev/null +++ b/edge/graph_210967584.jsonl @@ -0,0 +1,7 @@ +{"3413241|6746689": ["Morphological image operations [18] are applied to thin ridges and wrinkle contours to obtain ridges of one-pixel-width."]} +{"9022135|1634674": ["The successful interpretations of higher-level human motions greatly rely on the precision of human detection [45][47]."]} +{"9022135|17516538": ["The camera could be fixed, pure translational or mobile in nature [63]."]} +{"44136267|16010181": ["Other domain specific approaches rely on the extraction of handcrafted features from specific points, known as fiducial points [37]."]} +{"44136267|14674468": ["For instance, by just looking at faces, humans recognize the gender and the ethnicity [1], [2], estimate the age [3], deduce the emotions and the state of mind [4], [5], determine if the person has a familiar face or is a stranger [6], and verify or recognize the identity of the individual [7]\u2013[9]."]} +{"16403716|50041": ["The task of video classification [106], [245] is to find rules or"]} +{"16403716|2748484": ["as a supplement to previous surveys [39], [181] on video summarization.", "Video summarization [39], [156], [157], [181] removes the redundant data in videos and makes an abstract representation"]} diff --git a/edge/graph_210970589.jsonl b/edge/graph_210970589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b63a8e3c74c129e1ab0af0c94918436ef53631ab --- /dev/null +++ b/edge/graph_210970589.jsonl @@ -0,0 +1,17 @@ +{"59842873|14843594": ["Our REMBO and InterleavedREMBO implementation is based on https://github.com/jmetzen/bayesian optimization.", "For GP-UCB and REMBO, we optimize the acquisition function using L-BFGS with 50 restarts, where starting points are either randomly chosen or from a previous maximizer.", "Bayesian optimization is a family of algorithms using probabilistic models to determine which point to evaluate next (Mockus, 1982; Shahriari et al., 2016).", "Success stories, where Bayesian optimization outperforms classical techniques, include applications in laser technology (Schneider et al., 2018), performance optimization of Free Electron Lasers (McIntire et al., 2016a;b) and parameter optimization in the CPLEX suite (Shahriari et al., 2016).", "The latter category includes REMBO (Wang et al., 2016), which also optimizes on a random low-dimensional subspace, however, in contrast to our method, the dimension of the low-dimensional embedding needs to be known a priori and an iterative procedure to de\ufb01ne the subspaces is not considered.", "For the subspace problems we additionally compare to REMBO and its interleaved variant.", "In contrast to other algorithms that exploit subspace structure, including the REMBO algorithm of Wang et al. (2016) and SI-BO of Djolonga et al. (2013), our formulation does not require the knowledge of d e in advance.", "Instances, where random search is competitive have been reported in literature (Bergstra & Bengio, 2012; Wang et al., 2016; Li et al., 2017b) and this has been attributed to the same effect."]} +{"13068209|14843594": ["Therefore, Gaussian process based ef\ufb01cient global optimization 1 (Jones et al., 1998; Shahriari et al., 2015), as a sample-ef\ufb01cient method to solve black-box optimization problems (Xu et al., 2022a), has recently been becoming more and more popular."]} +{"111298514|26257441": ["[5] gave a very focused review on metamodels and MBDO by going through many popular sampling methods (or experimental design methods), approximation models (metamodels), metamodeling strategies, and applications.", "Table 1 categorizes the metamodeling techniques according to sampling, model types, and model fitting [5].", "[5] gave a detailed review on the equations and fitting methods for common metamodel types.", "However, insights have been gained through a number of studies [2, 5, 13, 28, 57, 58]."]} +{"6653028|14843594": ["By carefully choosing the points on which to evaluate the objectives and the constraints, Bayesian optimization methods find a good estimate of the solution of the original optimization problem with a small number of evaluations [2], [15]."]} +{"28374524|14843594": ["In recent years, Bayesian optimization has gained a growing attention from machine learning experts in, both, academia and industry (Shahriari et al., 2016).", "The protocol for sequential Bayesian optimization proceeds as follows (Mockus et al., 1978; Shahriari et al., 2016).", "Combining basis expansion with linear models for Bayesian optimization is by no means new (see (Shahriari et al., 2016) and references therein)."]} +{"3467239|1932843": ["The key insight is that, whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling\u2026", "\u2026whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling injured animals to\u2026", "The results also indicate that Intelligent Trial and Error signi\ufb01cantly outperforms previous algorithms for both damage recovery 63,12,64,65,66 and gait learning 67,62,68,48,69,32,61,42,17,49 , and can therefore be considered the state of the art.", "However, state-of-the-art learning algorithms are impractical because of the \u201ccurse of dimensionality\u201d 17 : the fastest algorithms constrain the search to a few behaviors (e.g. tuning only 2 parameters, requiring 5-10 minutes) or require human demonstrations 17 .", "Algorithms without these limitations take several hours 17 .", "7d, maximum p-value over each time step 10 \u2212 16 ), which is the current state of the art technique for direct policy search in robotics 32,61,42,17 .", "42 \u2022 Variant 3 (MAP-Elites in 6 dimensions + policy gradient): evaluates the bene\ufb01t of Bayesian optimization compared to a more classic, local search algorithm 17,62 ; there is no obvious way to use priors in policy gradient algorithms.", "This approach is a classic reinforcement learning algorithm for locomotion 17 and it is a baseline in many papers 32 .", "These results are consistent with the previously published results 62,32,42,17 , which optimize in 4 to 10 dimensions in a few hundred trials."]} +{"3467239|15700537": ["\u2026are expensive, because self-monitoring sensors are expensive, and are dif\ufb01-cult to design, because robot engineers cannot foresee every possible situation: this approach often fails either because the diagnosis is incorrect 12,13 or because an appropriate contingency plan is not provided 14 .", "Current damage recovery in robots typically involves two phases: self-diagnosis, and then selecting the best, pre-designed contingency plan 11,12,13,14 ."]} +{"1041684|1932843": ["While exploiting knowledge from simulation models has been considered before, no principled way to trade off between the relative costs and accuracies of simulations and experiments exists [2].", "A typical approach is twostage learning, where algorithms are trained for a certain amount of time in simulation in order to warm-start the learning on the real robot [2]."]} +{"12234219|19502816": ["We ran MOE-qEI and CL-mix on a range of standard test functions for global optimization (Jamil and Yang 2013): 2-dimensional Branin2; 3-dimensional Hartmann3; 5-dimensional Ackley5; and 6-dimensional Hartmann6."]} +{"46937410|14843594": ["Even with its successes in many applications, several theoretical as well as practical issues (Shahriari et al., 2016) still exist when employing Bayesian Optimization to real world problems."]} +{"202636911|14843594": ["This title limits the application of IECI to small dimensional problems (Hern\u00b4andez-Lobato et al., 2015; Shahriari et al., 2016).", "Bayesian optimization (Shahriari et al., 2016; Brochu et al., 2010b) addresses the problem of \ufb01nding a global minimum (or maximum), x \u2217 , of an objective function f ( x ) over a bounded box B \u2208 R d , where f is unknown but available to evaluate pointwise via computationally costly queries."]} +{"51759334|31194450": ["Some reviews and comparison studies regarding MFM can be found in (Toal 2015; Fern\u00e1ndez-Godino et al. 2016; Peherstorfer et al. 2016; Park et al. 2017).", "\u2026problem is usually referred as transfer learning (Pan and Yang 2010) in the machine learning community, while it is restricted to multi-fidelity modeling (MFM), variable-fidelity modeling (VFM), or data fusion in the engineering community (Fern\u00e1ndez-Godino et al. 2016; Peherstorfer et al. 2016)."]} +{"51759334|456491": ["\u2026through cross-covariance functions built using linear model of coregionalization or convolved process (Bonilla et al. 2007; Alvarez and Lawrence 2009; Alvarez et al. 2012), and the general stacked single-target framework and ensemble of regressor chains (Spyromitros-Xioufis et al. 2016).", "Some commonly used symmetric multi-response modeling approaches include, for example, the artificial neural networks (ANNs) that are extended to support multi-response by defining how inputs are shared across responses (Caruana 1995; Collobert and Weston 2008), the multi-response Gaussian process framework that captures the response correlations through cross-covariance functions built using linear model of coregionalization or convolved process (Bonilla et al. 2007; Alvarez and Lawrence 2009; Alvarez et al. 2012), and the general stacked single-target framework and ensemble of regressor chains (Spyromitros-Xioufis et al."]} +{"51759334|13985031": ["(Wang and Shan 2007; Kleijnen 2009; Razavi et al. 2012b; Viana et al. 2014)."]} +{"18145185|6415369": ["Some reviews pertaining to the decomposition can be found in the literature (Browning 2001; Li 2009; Papalambros 1995; Papalambros and Michelena 1997, 2000).", "For DSM, Browning (2001) found that mostly clustering and sequencing algorithms are used.", "DSM is a square matrix that has identical row and column listings to represent a single set of objects (Browning 2001; Li 2009)."]} +{"18145185|26257441": ["Simpson et al. (2001a) compared and contrasted five types of experimental design and four types of approximation model.", "For evaluating the experimental design, Simpson et al. (2001b) and Chen et al. (2003, 2006) discussed some metrics of merits."]} +{"196638505|14843594": ["This produces a robustly validated model across a potentially high-dimensionality space while simultaneously identifying task conditions that produce the optimal outcome 30,31 ."]} diff --git a/edge/graph_210971227.jsonl b/edge/graph_210971227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c3e335cc3a383c385a65bf68a22984f1332f5fa --- /dev/null +++ b/edge/graph_210971227.jsonl @@ -0,0 +1,3 @@ +{"174803047|3693305": ["As the tremendous progress of deep learning, recently, deep neural network (DNN) has been deployed to perform binary code learning in cross-modal hashing methods [2, 4, 11, 16, 22, 26] for its appealing representation power."]} +{"40755081|5671282": []} +{"4606637|393948": ["In recent years, deep learning has become very successful at learning highly discriminative features for various applications [1][13]."]} diff --git a/edge/graph_210971285.jsonl b/edge/graph_210971285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f300adfe73d68d76cf41f634dfc5e2fd832a7493 --- /dev/null +++ b/edge/graph_210971285.jsonl @@ -0,0 +1,5 @@ +{"21995154|15369615": ["In this work we use the Canny operators for feature extraction, a common choice in the literature [3,4].", "The problem of adequately selecting the value of s is recurrent in the literature, and is deeply studied in the Gaussian Scale-Space [4,25,26].", "The accuracy and reliability of gradient computation techniques have been widely studied in the literature [3,4,20,44].", "The simplest and most common way to do so is contentunaware smoothing (CUS), which is usually performed using twodimensional Gaussian filters [3,4].", "The problem of adequately selecting the value of s is recurrent in the literature, and is deeply studied in the Gaussian Scale-Space [4,25,26].2 In the remainder of this work the standard deviation of the filter used to regularize the image prior to feature extraction is referred to as sr ."]} +{"3193801|30443041": []} +{"11654868|14122909": []} +{"57303475|14122909": []} +{"42681391|14122909": []} diff --git a/edge/graph_210971743.jsonl b/edge/graph_210971743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..461e09e467579e3c65fe98cf241ec587c69eb126 --- /dev/null +++ b/edge/graph_210971743.jsonl @@ -0,0 +1,20 @@ +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} +{"102352657|201303574": ["It is worth noting that transaction throughput and scalability in network size are often recognized as two integral parts in scalability evaluation of a blockchain system [3], [18], [140]."]} +{"102352657|56895323": ["[21] provides a comprehensive survey of blockchain consensus protocols and an in-depth review of incentive mechanism designs.", "Transaction: A blockchain transaction can be regarded as a public static data record showing the token value redistribution between sender and receiver [21]."]} +{"102352657|13688847": ["Transaction A blockchain transaction can be regarded as a public static data record showing the token value redistribution between senders and receivers [21].", "[21] provides a comprehensive survey of"]} +{"102352657|31333609": ["Since posterior corruption is only possible because the private/public keys are fixed for blockchain participants, key-evolving cryptography (KEC) [114] can be applied so that the past signatures cannot be forged by the future private keys.", "Ouroboros Praos [101] currently adopts KEC for this purpose."]} +{"195820467|13688847": []} +{"195820467|3628110": []} +{"195820467|16972183": ["Many automakers have adopted cellular modems into vehicles, enabling a rich set of infrastructure connectivity services such as ad-hoc vehicle to everything (V2X), VANETs [1] [2], LTE-Advanced [3], and high throughput Millimeter Wave [63] connections.", "Many automakers have adopted cellular modems into vehicles, enabling a rich set of infrastructure connectivity services such as ad-hoc vehicle to everything (V2X), VANETs [1] [2], LTE-Advanced [3],"]} +{"86722298|49574823": ["Some variants [18], such as Delegated PoS (DPoS), Transactions as PoS (TaPoS), PoS-Velocity (PoSV), Delegated Byzantine Fault Tolerance (DBFT) and Bitcoin-NG, select some ones to generate and validate blocks to improve the scalability, throughput and latency."]} +{"86722298|27262729": ["2) Security and Privacy: Despite the original security and privacy issues of blockchain [96], outsourcing services at the edges in the integrated system of blockchain and edge computing presents new security and privacy challenges."]} +{"86722298|206578365": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "With these short propagation distances, edge computing has the potential of realizing tactile-level latency for many latency critical applications that may require tactile speed with latency approaching 1ms [29]."]} +{"86722298|9495329": ["The virtual resources of network virtualization share many common elements in notions and interchangeably terms with SDN [53]."]} +{"86722298|3818445": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "Nonetheless, its security and privacy are signi\ufb01cant challenges, due to the interplay of heterogeneous edge nodes and the migration of services across edge nodes [5].", "Nonetheless, its security is a signi\ufb01cant challenge [5], [30], [31].", "These promised gains make it a key technology for realizing various visions for next-generation Internet, such as IoT [5] and Tactile Internet (with millisecond-scale reaction time) [28]."]} +{"86722298|3434731": ["Therefore, the integration of blockchain and edge computing into one system becomes a natural trend [6]\u2013[8].", "The sidechain scheme permits developers to connect new sidechains to the mainchain (e.g., Ethereum) with to-and-from transferring of the ledger assets [6]."]} +{"67867402|49527603": ["Blockchain technology has the key characteristics of decentralization, traceability, anonymity and auditability [119]."]} +{"67867402|51935081": ["[73] believed that in the blockchain, the generation, verification, storage and transmission of data do not depend on any centralized organization, and each node has the same rights and obligations in the whole network and has the same status.", "Content References Characteristic description Blockchain technology [6, 12, 14, 46, 50, 51, 69, 71, 73, 75,80,102] [71] put forward the concept of bitcoin and made the blockchain step into peoples horizons; [75] introduced the workflow of blockchain; [73, 102] introduced the characteristics of decentralization and tamper resistance of blockchain Blockchain-based new architecture [13,15,22, 25, 36, 44, 55, 78, 96, 109, 110] [78] presented three possible architectures of blockchain applications for the IoT front-end; [110] proposed a blockchainbased framework for updating IoT firmware devices; [36] proposed a traceability system architecture Blockchainbased resource management [4, 17, 21, 38, 43, 64, 86, 88, 93, 104, 108] [108] convenient, [86,93] the limited resource and lower computation of mobile devices, [104] profit maximize"]} +{"67867402|3932531": ["\u2026blockchain-based key management system using anti-quantum cryptosystem Blockchain-based intrusion detection [2,5,9\u201311, 20, 35, 67, 68, 79, 97, 103] [68] elaborated the possibility of combing blockchain technology and IDS; [79] and [11] focused on the trust computing and vulnerability scanning of\u2026", "Meng et al. [68] elaborated the possibility of combining blockchain and IDS, and discussed the applicability of blockchain technology in solving data sharing and trust computing problems in the collaborative detection, and pointed out the direction of future work.", "\u2026[18] proposed a blockchain-based key management system using anti-quantum cryptosystem Blockchain-based intrusion detection [2,5,9\u201311, 20, 35, 67, 68, 79, 97, 103] [68] elaborated the possibility of combing blockchain technology and IDS; [79] and [11] focused on the trust computing and\u2026", "There are still many problems un-solved with intrusion detection, such as massive false alerts and overhead package with limited handling [68]."]} +{"67867402|31245252": []} +{"67867402|3348390": []} diff --git a/edge/graph_210971995.jsonl b/edge/graph_210971995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5121db4f9886c5d964ebfb286a0b753cabba4563 --- /dev/null +++ b/edge/graph_210971995.jsonl @@ -0,0 +1 @@ +{"129943454|394767": ["For this reason, different techniques have been adapted for transmission through metallic barriers [5] for example RFID [34], planar IPT [35] and piezoelectric ultrasound [36].", "Moreover, in many cases, sensors placed in harsh environments are frequently isolated from their control or power management units, which are usually located outside the harsh zone [5]."]} diff --git a/edge/graph_210972056.jsonl b/edge/graph_210972056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5738526fdb9790489c8f0d3dc91bc88c3770143b --- /dev/null +++ b/edge/graph_210972056.jsonl @@ -0,0 +1,22 @@ +{"84186823|206456479": ["Recently, network slicing [7], [8] has been arising as a promising technique to provide flexibility and scalability for a variety of 5G services that attach with manifold technical, service and operation requirements."]} +{"84186823|10235514": ["The services catered by the incoming \ufb01fth generation (5G) wireless systems is expected to fall into three categories [1], [2], i.e., enhanced Mobile BroadBand (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), and massive Machine-Type Communications (mMTC)."]} +{"44117259|6583734": ["2815318 functions virtualization (NFV), with a higher level of flexibility and agility [1], [2]."]} +{"68176541|206456479": ["The next generation of mobile networks will enable an unprecedented heterogeneity of applications with very diverse Quality of Service (QoS) requirements [1]."]} +{"68176541|14669932": ["(i) Predictors of mobile traffic invariably focus on providing forecasts of the future demands that minimize some absolute error [8], [9].", "Our problem is tightly linked to mobile traffic prediction, which is the object of a vast literature [8], [9]."]} +{"46772707|801245": ["The interested reader may refer to the following surveys on the topic [3], [4].", "One insightful classification of such technologies available in the literature distinguishes virtualization technologies at the node level and at the network level [3]."]} +{"46772707|1230643": ["The aforementioned trend calls for novel design good practices to overcome the limits in flexibility, efficiency and manageability of vertical, task-oriented and domain-specific WSNs.", "Typically, energy consumption due to wireless communication (i.e., transmitting and receiving) has been considered the dominant factor in power consumption for WSNs [27].", "W IRELESS Sensor Networks (WSNs) are one of the key enabling building blocks for the Internet of Things.", "In this context, the premium deployment domains for WSNs are nowadays Smart Cities, Smart Home and Buildings and Intelligent Transportation Systems, which are all characterized by the coexistence of sensor nodes with heterogeneous sensing, processing and communication capabilities, which all together support multiple applications and services.", "Virtualization is already a consolidated reality at the very heart of cloud-based services in data centers and the Internet core, and is also gauging momentum in the domain of wireless mobile networks under the push of network \u201csoftwareization\u201d; as an example, one of the major innovation of the fifth generation (5G) of the mobile broadband systems under current standardization is network slicing, which allows allocating/partitioning the physical resources of the radio access network and the core network to Similar virtualization approaches have been recently proposed in the domain of WSNs to ease up reconfigurability and manageability of network resources, eventually opening up for novel business opportunities where the roles of WSN infrastructure provider and WSN service/application provider are decoupled.", "In addition, due to the multi-hop nature of WSNs, routing and link capacity constraints must be considered when the data generated by the applications have to be delivered remotely.", ", transmitting and receiving) has been considered the dominant factor in power consumption for WSNs [27].", "Looking back at the evolution of WSNs, a clear trend can be observed moving from stand-alone, application-specific deployments to highly integrated wireless sensor systems used to support heterogeneous ecosystems of services and applications.", "The proposed framework is thoroughly evaluated on realistic heterogeneous WSNs.", "Along the same lines, Fok et al. [12] and [13] introduce middleware abstractions to support multiple applications in heterogeneous WSNs.", "WSNs Virtualization includes all technologies to abstract the physical communication, sensing, and processing resources in a shared wireless sensor network to efficiently allocate them to multiple independent applications or clients.", "Specifically, we consider visual sensor networks, i.e. WSNs designed to perform visual analysis (e.g. object recognition) [34].", "Only recently virtualization technologies have also been studied in the domain of WSNs with the primary goal to improve the flexibility, the manageability and the Return On Investment (ROI) of widespread and large WSNs deployments.", "Finally, in WSNs routes from each sensor node to a sink node follow typically a single path, such as the Destination Oriented Directed Acyclic Graph (DODAG) of RPL [26]."]} +{"59834031|7020971": []} +{"59834031|8909218": []} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"68026749|52059869": ["The success and sustenance of the fourth industrial revolution lies strongly in the adoption of emerging Information and Communications Technology (ICT) technologies, such as IoT, Cloud Computing, and network softwarization [4], which can be integrated into manifold manufacturing processes."]} +{"68026749|206578224": []} +{"68026749|4427557": ["In particular, beyond conventional short-range communication protocols for industrial wireless sensor networks, Low Power Wide Area (LPWA) networks, such as Lora and Sigfox, can provide long-range communications with low energy consumptions [10]."]} +{"84186969|52059869": ["Several schemes are compared in the simulations: DF (Dedicated Frequency) in which the bandwidth is hard partitioned into subbands and each slice can only use the resources within its allocated subband, NVS [7], EDF_Basic, EDF_ReplenishX (X is the replenishing limit of the uRLLC slice.", "For CN slicing, throughput can be controlled in a relatively precise way given fixed and comparatively larger link bandwidth using Software Defined Networking (SDN) and Network Functions Virtualization (NFV) [6], [7], however supporting uRLLC is still challenging."]} +{"52157271|1185580": ["The CSCC will be implemented as an additional function on the top of the admission control framework at the orchestrator level.", "The Cross-slice Congestion Control (CSCC) function shown in Figure 4 may decide, based on resources availability, slices requirements, and the queue state, to scale down the allocated resources to one or multiples slices in order to accept a larger number of slices of higher priority.", "This intelligence is ensured by using reinforcement learning (RL) techniques that allow to make the optimal decisions jointly maximizing resources utilization and guaranteeing that available resources are allotted according to the slice priorities [17].", "The proposed CSCC has to be able to foresee the impact of such decision on the overall system performance [16].", "In this first study Q-learning is used to learn to optimal strategy to implement at the CSCC [17]."]} +{"195470390|10342730": []} +{"195740071|19938676": ["This leads toward challenges to the network such as burden on core due to massive traffic, congestion, user dropping, high power consumption and more importantly, resources inefficiency in term of usage [3], [4]."]} +{"1185580|15929566": []} +{"1185580|1708582": []} +{"133044595|10235514": ["Network slicing is envisioned to deliver diverse fifth-generation (5G) services over isolated logical networks called slices, which are created on common infrastructure [1], [2]."]} +{"58675419|206456479": ["Reference [3] discusses the management and orchestration for end-to-end slices, including infrastructure layer, network function layer, and service layer, but does not enter into the RAN implementation details.", "The slicing concept has then emerged as an efficient way for serving all these services on a common infrastructure [3]."]} diff --git a/edge/graph_210972160.jsonl b/edge/graph_210972160.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aae39267ffa720b9b3a4d2a694b6d606e4dff57a --- /dev/null +++ b/edge/graph_210972160.jsonl @@ -0,0 +1,31 @@ +{"26617387|1805048": ["As previously mentioned, CF, which only relies on past users \u2019 preferences, is one of the most widely used recommendation methods in recommender systems (Su and Khoshgoftaar 2009)."]} +{"16179637|8125630": ["The system uses an indexing technique called bitmap indexes (O'Neil and Quass, 1997,Chaudhuri and Dayal, 1997) that have been introduced in OLAP systems (online analytical processing)."]} +{"37609803|14215645": ["Another survey of mobile recommender systems in tourism and a classi\ufb01cation of such systems is presented by Gavalas et al. (2014b).", "The surveys of Vansteenwegen et al. (2011b), Gavalas et al. (2014a) and Gunawan et al. (2016) present a detailed overview of existing algorithms and heuristics for solving the OP and the presented variants of the OP."]} +{"54566672|14215645": ["The tour recommendation problem is closely related to the tourist trip design problem covered in the operations research community, and consequently, there have been various survey papers [45,88] focusing on the aspects of problem formulation, algorithmic design and the complexity of this problem."]} +{"54566672|9316331": ["To solve this problem, the authors proposed the PersQ algorithm, adapted from Monte Carlo Tree Search [18,33], which involves:", "To solve this problem, the authors proposed the PersQ algorithm, adapted from Monte Carlo Tree Search [33, 18], which involves: \u2013 Selection ."]} +{"4030757|1805048": ["Collaborative filtering (CF) [34] uses the known preferences of a group of users to make recommendations or predictions of the unknown preferences for other users.", "Well-known model-based CF techniques include Bayesian belief nets (BNs) CF models [34], clustering CF models [36], and Singular Value Decomposition (SVD) CF models [22].", "There are generally two ways to build CF systems: memory-based methods and model-based methods [34]."]} +{"3434768|1805048": ["Interested readers are referred to References [2, 9, 38, 39, 60, 69, 91] for further details.", "The result from the proposed algorithm is more accurate than that from such studies as the Periodic & Social Mobility Model [14], social-historical model [20], CF [91], and random recommendation."]} +{"11088190|4269723": []} +{"206710454|1805048": ["Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.", "Su and Khoshgoftaar [212] presents a survey of CF techniques.", "The rest of this section deal is dealt with the concepts and research in the two lines considered previously: Filtering of social information and content filtering.", "The pure CBF has several shortcomings [16,176,212]:", "Breese et al. [43] evaluated the predictive accuracy of different algorithms for CF; later, the classical paper [94] describes the base for evaluating the Collaborative Filtering RS.", "Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.g. videos, songs, films, etc. in a CF based website) in such a way that when enough information is stored on the system, we can make recommendations to each user based on information provided by those users we consider to have the most in common with them.", "Collaborative Filtering (CF) methods play an important role in the recommendation, although they are often used along with other filterning techniques like content-based, knowledge-based or social ones."]} +{"14135612|1230643": ["A reasonable choice for such a solution is the use of small-to medium-scale wireless sensor networks (WSNs).", "WSNs represent a modern wireless technology whereby nodes communicate with each other over a wireless connection and push collected data to a processing element (sink).", "Additionally, recognizing that tourists often labour to interact with a remote tourist portal while on travel due to lack of networking infrastructures or even avoid mobile data communications due to high roaming charges, we have implemented a cost-effective wireless sensor network (WSN) [2] prototype (incorporated within MTRS) which may be deployed around tourist sites for providing mobile users effortless and inexpensive uploading of tourist information and ratings about POIs though their mobile devices.", "4 presents the infrastructure and update mechanism for tourist information portal (based on WSN installations).", "A basic principle of WSNs is that they do not require a stable network infrastructure to operate.", "(WSN) [2] prototype (incorporated within MTRS) which may be deployed around tourist sites for providing mobile users effortless and inexpensive uploading of tourist information and ratings about POIs though their mobile devices.", "The typical function of WSNs involves periodic multihop forwarding of recorded sensory data from distributed nodes to the centralized sink.", "Namely, WSNs enable self-configuration and selforganization of an infrastructureless ad hoc network topology.", "WSN installations also enable accurate users' localization (hence, location-aware recommendations) without posing any hardware requirements (e.g. GPS modules) on end user devices.", "We also proposed the use of cost-effective WSN installations around tourist sites for allowing mobile users to upload tourist information and ratings about POIs via their mobile devices."]} +{"14135612|1805048": []} +{"13364278|1805048": ["We choose user-based collaborative filtering for such recommendation (Su and Khoshgoftaar 2009) as shown below:", "We choose user-based collaborative filtering for such recommendation (Su and Khoshgoftaar 2009) as shown below: P t u (l) = v\u2208U s(u, v)r v,l v\u2208U s(u, v) ."]} +{"207708416|62040085": []} +{"207708416|1805048": []} +{"207204594|1805048": ["always leads to coverage problems, which is the percentage of items in the system that recommendations can be made for [68]"]} +{"23022338|1805048": []} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"14990640|60455": ["In the example from Figure 2, the function for S and S is {(1, 1), (2, 2)}.", "Pattern Support S13 = City , {} 2 S14 = Destination,Accommodation , {hasAccommodation (1, 2)}, 2 S15 = UrbanArea,Activity , {} 3 S16 = UrbanArea,Accommodation , {} 2 S17 = Destination,Activity , {hasActivity (1, 2)} 3 S18 = Destination, Activity, Accommodation , {} 2 Table 7.", "The process eventually reaches step 16, which yields a unique frequent pattern S30 = Capital, Museum, LuxuryHotel , {hasMuseum(1, 2), hasLuxuryHotel(1, 3)} (support equal to two)."]} +{"24545362|15164501": ["[74], and these background differences can inhibit the successful use of information technology [75] and user acceptance [76]."]} +{"31121981|10813427": ["Therefore, out-of-core solutions are widely used, which store the complete dataset in a remote server, from where the required parts of the terrain are progressively streamed to the client over a network, see [50] for further details."]} +{"2695431|1805048": []} +{"169921928|10777439": ["Secondly, the recommendation of a sequential travel route is far more complex and time-consuming than individual POIs, since the distance between the locations or opening times of different POIs should be considered [4]."]} +{"23003537|14215645": []} +{"52980429|1805048": ["Collaborative filtering (CF) methods make use of the community data to build user profiles (Su et al. 2009)."]} +{"5526398|1805048": ["However, such hybrid systems mainly rely on the content-based approach to solve the problems of cold-start and data sparsity [14], i."]} +{"13749181|10777439": ["Despite the vital beneficial role of temporal influence [47], an insufficient amount of research work has been devoted to the time factor in location recommendation."]} +{"40622795|13151033": ["[67] for an excellent survey on such methods."]} +{"40622795|2685137": ["CWM \u2013 but also other interfaces and 43 http://www.ddialliance.org/ 44 http://www.omg.org/spec/CWM/ protocols to share multidimensional datasets such as XML for Analysis and OLE DB \u2013 lack a formal de\ufb01nition making it more dif\ufb01cult to use such formalism as a basis for integration [41]."]} +{"15197189|6275330": ["\u2026avoid mobile data communications due to high roaming charges, the mTRS enables the use of cost\u2010effective Wireless Sensor Network (WSN) installations [3] around tourist sites for providing mobile users convenient and inexpensive means for uploading tourist information and ratings about POIs via\u2026"]} +{"52948006|1805048": []} +{"29536649|13022232": ["Early LD visualization techniques were described in Dadzie and Rowe (2011)."]} diff --git a/edge/graph_210972267.jsonl b/edge/graph_210972267.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4cf663cc2c78076469867d2da3d6f5aaf9cf659f --- /dev/null +++ b/edge/graph_210972267.jsonl @@ -0,0 +1,8 @@ +{"49222558|49527603": ["), they have gained a lot of attentions from both industry and academic in recent years [21, 35]."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"196832048|59314746": ["According to experts, apart from disrupting financial services, blockchain could end up transforming a number of important industries, from healthcare to politics, whereas has the potential to create new foundations for economic and social systems [12], [5], [13].", "As this new generation of applications is evolving, blockchain\u2019s technical characteristics and specifications are becoming even more advanced and sophisticated [12]."]} +{"196832048|84185792": ["\u2026considering that immutability is an emergent, and not intrinsic, property of a blockchain data structure, and therefore an agent or set of agents with a suf\ufb01cient amount of computing power can modify it, stating that a blockchain is by default immutable is incorrect and misleading [54], [55], [56]."]} +{"196832048|49527603": ["Blockchain\u2019s technological breakthrough has been even compared to the one brought by the use of the TCP/IP to modern computing or the one Linux brought to modern application development [4], [5], [6], [7], [8]."]} +{"196832048|51935081": ["According to experts, apart from disrupting \ufb01nancial services, blockchain could end up transforming a number of important industries, from healthcare to politics, whereas has the potential to create new foundations for economic and social systems [12], [5], [13]."]} +{"90242652|3628110": []} diff --git a/edge/graph_2109857.jsonl b/edge/graph_2109857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_210987395.jsonl b/edge/graph_210987395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18a62eb31bbace22e1749d815008ce30746790ef --- /dev/null +++ b/edge/graph_210987395.jsonl @@ -0,0 +1,25 @@ +{"31220533|485843": ["Applying different local policies for single consumer near-term cost savings will dramatically influence the overall cluster energy efficiency [12]."]} +{"125645418|393948": []} +{"21706800|393948": []} +{"17339829|18078738": []} +{"198319705|191396": []} +{"70029744|18078738": []} +{"96437536|18078738": ["Therefore, datadriven fault diagnosis methods have received significant interests from academics and engineers [1, 2, 3, 4, 5]."]} +{"11487346|6327434": ["Several state observers are designed for a definite fault signal and detected by a hypothesis test (Willsky, 1976).", "Process model-based fault-detection methods Different approaches for fault-detection using mathematical models have been developed in the last 20 years, see, e.g., (Chen & Patton, 1999; Frank, 1990; Gertler, 1998; Himmelblau, 1978; Isermann, 1984, 1997; Patton, Frank, & Clark, 2000; Willsky, 1976)."]} +{"7849609|393948": ["DAN constructs the network structure by stacking multiple layers of autoencoders [8]."]} +{"6674407|192934": []} +{"128352339|393948": []} +{"99792955|6327434": []} +{"125871295|18078738": []} +{"49416276|2065587": []} +{"49416276|9316331": []} +{"198144980|6327434": []} +{"103545418|18078738": []} +{"110697653|905827": []} +{"101558956|2483888": []} +{"101398791|3330313": []} +{"8894326|393948": ["The performance of machine learning algorithms i highly sensitive to the specific feature representation of the data used [3].", "Machine learning algorithms are highly sensitive to the specific feature representation of the data used [3]."]} +{"36646781|44461432": []} +{"36646781|17905276": []} +{"126345068|15305295": []} +{"20529822|18078738": []} diff --git a/edge/graph_211010433.jsonl b/edge/graph_211010433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccfe230220821e304d84f20b2df339f79b6b91e3 --- /dev/null +++ b/edge/graph_211010433.jsonl @@ -0,0 +1,40 @@ +{"5403702|393948": ["Deep neural networks, emerging recently, provide a way of highly automatic feature learning (Bengio et al., 2013), and have exhibited considerable potential (Zeng et al.", "Deep neural networks, emerging recently, provide a way of highly automatic feature learning (Bengio et al., 2013), and have exhibited considerable potential (Zeng et al., 2014; Santos et al., 2015)."]} +{"207880490|12161567": ["KG embedding, which aims to project symbolic entities and relations into continuous vector spaces, has thus been proposed and quickly gained broad attention (Nickel et al., 2016a; Wang et al., 2017).", "We refer readers to (Nickel et al., 2016a; Wang et al., 2017) for a thorough review.", "\u2026been devised, e.g., translation-based models (Bordes et al., 2013; Wang et al., 2014; Lin et al., 2015b), simple semantic matching models (Yang et al., 2015; Nickel et al., 2016b; Trouillon et al., 2016), and neural network models (Dettmers et al., 2018; Jiang et al., 2019; Nguyen et al., 2018)."]} +{"3401524|12161567": ["(Nickel et al., 2015) is a comprehensive survey on these models."]} +{"3882054|12161567": ["Previous work shows that TransE obtains very competitive results (Lin et al., 2015a; Nickel et al., 2016b; Trouillon et al., 2016; Nguyen et al., 2016a).", "Many embedding models have proposed to learn vector or matrix representations for entities and relations, obtaining state-of-the-art (SOTA) link prediction results (Nickel et al., 2016a)."]} +{"4328400|12161567": []} +{"202539551|182952502": [", 2019) or reinforcement learning (Branavan et al., 2011; Chevalier-Boisvert et al., 2018; Bahdanau et al., 2019; Luketina et al., 2019).", "\u2026could transfer factual and commonsense knowledge reliably to downstream tasks such as commonsense (visual) question answering (Zellers et al., 2018; Talmor et al., 2019) or reinforcement learning (Branavan et al., 2011; Chevalier-Boisvert et al., 2018; Bahdanau et al., 2019; Luketina et al., 2019)."]} +{"202539551|12161567": ["This is similar to ranking-based metrics from the knowledge base completion literature (Bordes et al., 2013; Nickel et al., 2016)."]} +{"638838|12161567": []} +{"638838|5473785": []} +{"6071257|12161567": ["(15), we are estimating a probability distribution over possible states of the knowledge graph which allows us to predict the probability of any possible triple in the graph (Nickel et al. 2015).", "For a review of machine learning on knowledge graphs see also Nickel et al. (2015).", "(15), we are estimating a probability distribution over possible states of the knowledge graph which allows us to predict the probability of any possible triple in the graph Nickel et al. (2015)."]} +{"3087701|12161567": ["Knowledge graph completion (KGC) (Nickel et al., 2015) aims at augmenting missing knowledge in an incomplete knowledge graph automatically.", "In recent years, methods based on vector embeddings of graphs have been actively pursued as a scalable approach to KGC (Bordes et al., 2011; Socher et al., 2013; Guu et al., 2015; Yang et al., 2015; Nickel et al., 2016; Trouillon et al., 2016b).", "These models are simple yet achieve the current state-of-the-art performance in KGC."]} +{"14775471|8310135": ["Fine level of understanding is also desirable in many other important tasks, such as named entity recognition (NER) [23] and word sense disambiguation (WSD) [24].", "NER seeks to locate and tag real-world entities mentioned in the text with their types (i.e., concepts).", "Some previous work in named entity recognition (NER) has also addressed similar issues.", "While early research on NER is confined to coarsegrained named entity classes such as person and location, it is generally agreed that fine-grained NER [14, 15] (i.e., by using more specific subcategories) is more beneficial for a wide range of web applications, including Information Retrieval (IR), Information Extraction (IE), or Query-Answering (QA)."]} +{"982761|12161567": ["Due to its excellent generalization capability, distributed representations, a.k.a. embeddings, have been popularized to address the KBC task (Nickel et al., 2011; Bordes et al., 2011, 2014, 2013; Socher et al., 2013; Wang et al., 2014; Guu et al., 2015; Nguyen et al., 2016b).", "In KBC, CTransR (Lin et al., 2015b) enables relation embedding sharing across similar relations, but they cluster relations before training rather than learning it in a principled way.", ", 2014), leading to a number of studies on automatic knowledge base completion (KBC) (Nickel et al., 2015) or link prediction.", "However, knowledge bases suffer from incompleteness despite their formidable sizes (Socher et al., 2013; West et al., 2014), leading to a number of studies on automatic knowledge base completion (KBC) (Nickel et al., 2015) or link prediction."]} +{"3385146|12161567": ["Large-scale knowledge bases (KB) such as DBPedia (Lehmann et al. 2015) or YAGO (Rebele et al. 2016) contain millions of entities and facts, but they are nevertheless far from being complete (Nickel et al. 2016)."]} +{"59516071|12161567": ["ng qualities. In this paper, the explanation reliability for triple (h,r,t)is evaluated with the number of similar structures in knowledge graph, on which the inferences are mainly based, as noted by [24]. Similar structures contain same relations but different specific entities. Y X S LV)DWKHU2I KDV:LIH KDV&KLOG Z KDV:LIH M KDV&KLOG LV)DWKHU2I Figure 3: Similar structures for the example subg"]} +{"203704895|12161567": ["As some researchers have pointed out, a KG is not just a graph database [5].", "Another stream of research on large KGs is representation learning [5], which builds statistical models of KGs by embedding entities and relations in KGs into low-dimensional latent spaces (called embeddings), and has achieved favourable accuracy in KG completion tasks such as link prediction [16],\u2026"]} +{"13151033|14074802": ["Those are often created automatically [70]."]} +{"13151033|12161567": ["The numbers follow the latest DBpedia 2014 release6, the YAGO3 release [47], the Freebase website7, the NELL statistics heatmap8, the recent version of Cyc9, an announcement about the Google Knowledge Graph by Google10, the Wikidata class and property browser11 and a recent article on Wikidata [81], as well as the comparison of knowledge graphs in [16] and [55]."]} +{"13151033|3646491": ["In particular, for many of the methods applied in the works discussed above \u2013 such as outlier detection or association rule mining \u2013 graph-based variants have been proposed in the literature [2,43]."]} +{"13151033|11608263": [", Arnold Schwarzenegger being both an Actor and a Politician), and single-label classification, which only assigns one class to an instance [100]."]} +{"19135805|13151033": [", completion or de-duplication) of the input KG [123], from different viewpoints and application context."]} +{"19135805|12161567": ["For more details about these combined models, refer to [36] and references therein.", "Minimizing the pairwise ranking loss has an additional advantage: it does not assume that negative examples are necessarily false, just that they are more invalid than those positive ones [36].", "[36] have made a survey of statistical relational learning methods on KGs, including embedding techniques, path ranking algorithms [37], [38], [39], and Markov logic networks [40], [41], [42].", "For more details about tensor representation of KGs and tensor factorization models, refer to [13], [36] and references therein."]} +{"52183483|12161567": [", p , o ) (Nickel et al., 2016)."]} +{"84843937|12161567": ["istency. It is attracting research interest and is important for completing and cleaning up KGs. Two of the most common learning methods for KGR are embedding-based reasoning and rule-based reasoning [26]. One of the crucial tasks for embedding-based and rule-based reasoning is to learn embeddings and rules respectively. Embedding learning methods such as TransE [3], HolE [27] and ComplEx [35] learn l"]} +{"19139252|12161567": ["\u2026of KGs, such as DBPedia (Lehmann et al. 2015), and Concept-Net (Speer, Chin, and Havasi 2017), have been curated in the service of fact checking (Shi and Weninger 2016), question answering (Lukovnikov et al. 2017), entity linking (Hachey et al. 2013), and for many other tasks (Nickel et al. 2016)."]} +{"6086752|8310135": ["Traditional named entity recognition systems [16] focus on coarse types ( e.g. , person , location ) and cast the problem as multi-class classi\ufb01cation following the type mu-0 tual exclusion assumption ( i.e. , one type per mention) [18].", "In terms of the dependence on context information, existing work can be categorized into context-dependent [18, 14] and context-independent approaches [19, 13].", "Traditional entity typing systems [22, 18] focus on a small set of coarse types (typically fewer than 10)."]} +{"2476229|8310135": ["Recently, Huang et al. (2015) showed that building a conditional random \ufb01eld (CRF) layer on top of bidirectional LSTM-RNNs performs comparably to the state-of-the-art methods in the part-of-speech (POS) tagging, chunking, and NER.", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and\u2026", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and relation is important for high performance (Li and Ji, 2014; Miwa and Sasaki, 2014) since relations interact closely with entity information.", "LSTM-RNNs have been widely used for sequential labeling, such as clause identi\ufb01cation (Ham-merton, 2001), phonetic labeling (Graves and Schmidhuber, 2005), and NER (Hammerton, 2003)."]} +{"195218696|12161567": ["Following existing studies [27], the problem can be reformulated in a probabilistic way."]} +{"11202498|12161567": ["the place of birth attribute is missing for 71% of all people included in FreeBase (Nickel et al. 2015)."]} +{"184488099|7885409": []} +{"2600027|12161567": []} +{"53250562|8310135": ["\u2026or events from unstructured texts is crucial for building large-scale, reusable knowledge which can facilitate many other tasks (Mintz et al. 2009; Nadeau and Sekine 2007), including knowledge base construction (Dong et al. 2014; Luan et al. 2018), question answering (Fader, Zettlemoyer, and\u2026"]} +{"3674966|12161567": []} +{"3674966|1259855": ["Several recent surveys and comparative studies describe and compare the approaches in one or more of these categories on several tasks (Kimmig et al., 2015; Nickel et al., 2016a; Kazemi et al., 2017)."]} +{"18367155|12161567": []} +{"59316623|12161567": ["This way we make use of the local-closed world assumption (Nickel et al., 2016), where we assume that a knowledge graph is only locally complete, i."]} +{"8040343|12161567": ["Other sophisticated models include Holographic Embeddings (HoLE) (Nickel et al., 2016b) that employs circular correlation on entity embeddings and Neural Association Models (NAM) (Liu et al., 2016), a deep network used for probabilistic reasoning.", "(Nickel et al., 2016a) and (Yang et al., 2015; Toutanova & Chen, 2015) contains comprehensive reviews and empirical comparison of relational learning techniques respectively."]} +{"119113221|167217933": []} +{"16080480|6486398": []} +{"15150247|12161567": ["However, due to time constraints and the complexity of an ef\ufb01cient implementation of HolE, we record the original results for HolE as reported in Nickel et al. (2016b).", "However, the asymmetry in the composition function in HolE stems from the asymmetry of circular correlation, an O ( nlog ( n )) operation, whereas ours is inherited from the complex inner product, in O ( n ) .", "In HolE the circular correlation is used for combining entity embeddings, measuring the covariance between embeddings at different dimension shifts.", "Indeed, the DistMult and TransE models are outperformed here by ComplEx and HolE, which are on par with respective \ufb01l-tered MRR scores of 0.941 and 0.938.", "Furthermore, we chose TransE, DistMult and HolE as baselines since they are the best performing models on those datasets to the best of our knowledge (Nickel et al., 2016b; Yang et al., 2015).", "For a given fact r(s,o) in which subject s is linked to object o through relation r , the score can then be recovered as a multi-linear product between the embedding vectors of s , r and o (Nickel et al., 2016a).", "In these cases all eigenvalues and eigenvectors live in the real space and E is orthogonal: DistMult (Yang et al., 2015) < w r , e s , e o > w r \u2208 R K O ( K ) O ( K ) HolE (Nickel et al., 2016b) w Table 1.", "Since ranking measures are used, previous studies generally preferred a pairwise ranking loss for the task (Bordes et al., 2013b; Nickel et al., 2016b).", "On FB15K, the gap is much more pronounced and the ComplEx model largely outperforms HolE, with a \ufb01ltered MRR of 0.692 and 59.9% of Hits at 1, compared to 0.524 and 40.2% for HolE.", "\u2026sign-pattern as Y : This is theoretically justi\ufb01ed by the fact that the sign-rank is a natural complexity measure of sign matrices (Linial et al., 2007) and is linked to learnability (Alon et al., 2015), and empirically con\ufb01rmed by the wide success of factorization models (Nickel et al., 2016a).", "A recent novel way to handle antisymmetry is via the Holographic Embeddings (HolE) model by (Nickel et al., 2016b)."]} diff --git a/edge/graph_211011033.jsonl b/edge/graph_211011033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49cfbe4d6e7568aaba4b456f61656c75bdbe45e2 --- /dev/null +++ b/edge/graph_211011033.jsonl @@ -0,0 +1,39 @@ +{"54457648|1229096": ["Finally, there exists a large volume of work on vehicle motion planning outside the machine learning context and Paden et al. (2016) present a notable survey."]} +{"202237164|202540003": []} +{"202237164|3212631": []} +{"202237164|14478191": []} +{"202237164|13171013": ["Recent works have surveyed multiagent decision making from a variety of different perspectives, including: the evolutionary dynamics of multi-agent learning [20], non-stationarity in multi-agent environments [66], modelling other agents in MAS [3], and deep reinforcement learning in MAS [67,109]."]} +{"54033845|14843594": ["Bayesian optimization (BO) [6], [7], [8] is an approach for finding global optima of a noisy black box function."]} +{"1033682|174797842": []} +{"386824|1708582": ["Additional information about RL can be found in several references (e.g., [2] [5] [32] [72])."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"52185833|9316331": ["For the community, this would provide the ability to test algorithms in domains with as much depth and diversity as today\u2019s video games."]} +{"11227891|1708582": ["A closely related concept to maximum entropy policies is Boltzmann exploration, which uses the exponential of the standard Q-function as the probability of an action (Kaelbling et al., 1996)."]} +{"57573831|1229096": ["While some (Bojarski et al., 2016) achieve all tasks in one unique module, others do follow the logic of one task - one module (Paden et al., 2016).", "Vehicle control : Vehicle control classically has been achieved with predictive control approaches such as Model Predictive Control (MPC) (Paden et al., 2016)."]} +{"3503217|9588126": ["nce paper at ICLR 2018 due to complexity of the emergent behavior and are of practical interest with applications ranging from multiplayer games (Peng et al., 2017) to coordinating self-driving \ufb02eets Cao et al. (2013). Multi-agent environments are nonstationary from the perspective of any individual agent since all actors are learning and changing concurrently (Lowe et al., 2017). In this paper, we consider the pr"]} +{"7355869|1708582": ["In later variants such as (Brafman & Tennenholtz, 2002) this choice of exploration vs. exploitation policy was made less explicitly, but through a reward scheme reminiscent of \u201coptimism in the face of uncertainty,\u201d (e.g., Kaelbling, Littman & Moore, 1996 )."]} +{"53768123|14478191": ["An overview of multi-objective optmization can be found in [11], and a summary of multi-objective sequential decision making is given in [19]."]} +{"59291974|3638188": ["State representation learning (SRL) (Lesort et al., 2018) aims at learning those states as a compact representation from raw observations and without explicit supervision.", "We can define it more precisely as a particular kind of representation learning where the learned features are in low dimension, evolve through time, and are influenced by the actions of an agent (Lesort et al., 2018).", "We refer to (Lesort et al., 2018) for a complete review of SRL for control.", "We can de\ufb01ne it more precisely as a particular kind of representation learning where the learned features are in low dimension, evolve through time, and are in\ufb02uenced by the actions of an agent (Lesort et al., 2018)."]} +{"14478191|1932843": ["\u2026problems, commonly modeled as Markov decision processes (MDPs) (Bellman, 1957a), occur in a range of real-world tasks such as robot control (Kober & Peters, 2012), game playing (Szita, 2012), clinical management of patients (Peek, 1999), military planning (Aberdeen, Thi\u00b4ebaux, & Zhang,\u2026"]} +{"28793151|14478191": ["Rewards for each objective are first normalised [15] before linear scalarisation [16] is applied with an even weighting."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"49407715|1708582": ["1 There are an endless number of problems where this formulation is applied [14, 39, 76] from online decision making in games [20, 51, 68, 79] to engagement maximization on internet platforms [19, 72]."]} +{"6781584|7559976": ["There has recently been a signi\ufb01cant amount of work on domain adaptation, particularly for computer vision [16], [17]."]} +{"6781584|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment [2].", "However, the complexity of unstructured realworld scenes has a tendency to confound these assumptions, and learning-based methods have emerged as a powerful complement [2], [3], [4], [5], [6].", "neural networks into the grasp selection process [2], [5], [4], [7]."]} +{"35869294|30189749": ["Low-level vehicle dynamics, however, are of crucial importance, as exhibited by [24] and because many traf\ufb01c phenomena, which affect energy consumption, safety, and travel time are exhibited at the level of low-level dynamics [5], [25], [26], [27]."]} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"67859546|8446711": ["Perception systems that includes IR cameras [14,15] work in near-infrared (NIR: 780 nm\u20133 mm) or mid-infrared (MIR: 3 mm\u201350 mm, known as thermal cameras) ranges."]} +{"67859546|18388986": ["In a review carried out by [30], it is possible to find an extensive classification of fusion methods according to different criteria such as: (1) relations between the input data sources; (2) input/output data types and their nature; (3) abstraction level of the employed data; (4) different data fusion levels, and (5) architecture types."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"52171619|1708582": ["For many reinforcement learning (RL) problems [37, 96, 106], an arti\ufb01cial RL agent may also bene\ufb01t from a predictive model (M) of the future [95, 104] (model-based RL)."]} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"203902759|155093065": []} +{"128350527|1229096": ["Current autonomous driving decision making systems are focusing on the non-learning model-based approaches, which often requires to manually design a driving policy [12], [21]."]} +{"20999239|1932843": ["Recently, paradigms such as reinforcement learning [12], learning-by-demonstration [2] and transfer learning [25] are proving a natural means to train various robotics systems."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"15176564|1932843": ["Similar hand-coded feature extraction pipelines underpin most successful applications of RL to robotics (we refer the interested reader to [21] for a recent review)."]} +{"15176564|1708582": ["Formally this minimizes the squared Bellman error [2, 19, 51], of function ~ Qh with parameters h, for all training samples fz; a; rgnt1\u204441:"]} +{"15083675|8363289": ["It is also common to include an addition penalty term penalizing the \ufb01nal state (cid:98) x t + N | t in order to achieve stability (Mayne et al., 2000)."]} diff --git a/edge/graph_211020553.jsonl b/edge/graph_211020553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..320918cb86add3b8a5fbfd0b76e682c5c853ff24 --- /dev/null +++ b/edge/graph_211020553.jsonl @@ -0,0 +1,21 @@ +{"31681049|11632848": ["Some assessment tools for testing an operator\u2019s cognitive capabilities may include: (a) Cognitive Abilities Tests (CATs) [32] capable of matching the cognitive abilities of an operator with the mental demands and cognitive skills needed for performing a job (or operation) up-front to its allocation; and (b) Advanced Trained Classifiers (ATCs) [26] based on various machine learning techniques, to measure (test) in real-time the operator\u2019s cognitive performance and dynamically identify when an assisted/ enhanced action is necessary, and do so in an unobtrusive manner, relying on cognitive load measurements (cf.", "such methods are getting increased attention in the defence community); and (b) Advanced Trained Classifiers (ATCs) [26], based on a variety of machine learning techniques, to measure (test) in real-time the operator\u2019s physical performance and dynamically identify when an assisted/enhanced operation is necessary in an unobtrusive manner, relying on physiological measures (cf.", "Part of this situation recognition may be implemented by machine learning techniques, such as (b) Advanced Trained Classifiers (ATCs) [26], where part of an intelligent"]} +{"3805855|3579945": ["Today, sectors like transportation [14], Industry 4."]} +{"3805855|13991708": ["0 [15], or even defense [16], [17] are benefiting from such advances."]} +{"183030|469744": ["AR allow users to see the real world, with virtual objects superimposed upon or composited with their real environment (Azuma 1997)."]} +{"48358084|44461432": []} +{"3533788|35426346": ["There is a large volume of related work using Multi-Agent Systems (MAS), Holonic Manufacturing System (HMS) or Service Oriented Architecture (SoA) [7] [8] [9] were similar concepts were applied."]} +{"16020561|15438029": []} +{"44894845|16280711": ["Many human avoidance schemes based on human activity prediction or human and robot position estimation at the same time [33\u201335], risk prediction control [36] and augmented reality [37] are considered to be implementable in an interactive environment."]} +{"5429882|44461432": ["Recently, the emerging technologies (e.g., Internet of Things (IoT) [1\u20133], wireless sensor networks [4, 5], big data [6], cloud computing [7\u20139], embedded system [10], and mobile Internet [11]) are being introduced into the manufacturing environment, which ushers in a fourth industrial revolution."]} +{"5429882|37052879": ["The IWN is superior to wired network in a manufacturing environment; but the existing IWNstandards such asWIA-PA [29] andWirelessHART [30] cannot provide enough bandwidth for heavy communication and high-volume data transfer."]} +{"2262098|469744": ["If production volume increases a ro reducing the workload on the assembly work system should then provide the worker wit adapted instructions."]} +{"13818332|17670369": ["Popular applications are training of technicians [7], manufacturing process simulation [2], product design [1] and assembly tasks [8, 9]."]} +{"108560308|469744": ["\u2026interaction tool that overlays computer-generated information on the real-world environment [2] and can be described as a set of three key features [3]: combination of real and virtual objects in a real environment; real-time interaction with the system, able to reac t to user\u2019s inputs;\u2026"]} +{"112404345|16280711": []} +{"7271974|469744": ["Based on his early survey on AR [4], Azuma published a complementary paper [3] that also explicitly names industrial application domains for AR, such as supporting the assembly of wire bundles in aircrafts or using AR for factory floor or pipeline planning."]} +{"7271974|17024419": []} +{"110857012|17670369": ["Expert assembly planners typically use modern commercial CAD systems, with which, the 3D CAD models of the components to be assembled are displayed on computer screens to aid the planners to determine component\u2019s geometric characteristics and assembly features for a new product [13].", "Virtual reality (VR) technology plays a vital role in simulating advanced 3D human computer interactions, especially for mechanical assembly [13], allowing users to be completely immersed in a synthetic environment."]} +{"110857012|11960624": ["Due to the growing amount of efforts in AR from several reputed corporations (IBM, HP, Sony, Google, etc.) and universities, this novel technology has been applied successfully in many areas, e.g., medicine [3], maintenance and repair [4], cultural heritage [5] and education [6]."]} +{"110857012|206986719": ["AR enriches the way that users experience the real world by embedding virtual objects to coexist and interact with real objects in the real world [2].", "Another issue is that although a number of collaborative AR systems have been implemented, few of them have been integrated with rigorous user studies [2]."]} +{"6440462|1113420": ["Since the application is meant to be used in a production environment, much emphasis is placed on the stability of the tracking process."]} +{"206647728|17670369": []} diff --git a/edge/graph_211023386.jsonl b/edge/graph_211023386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c5b10769d398ec0b806ce261bea6fe9bb26740f --- /dev/null +++ b/edge/graph_211023386.jsonl @@ -0,0 +1 @@ +{"198383510|27996699": []} diff --git a/edge/graph_211030243.jsonl b/edge/graph_211030243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8244e28b67b529f64ec979fc0bb95d321e5c5464 --- /dev/null +++ b/edge/graph_211030243.jsonl @@ -0,0 +1,8 @@ +{"63774461|17290408": []} +{"67421933|170825": ["Tracing the data path (data lineage) is important for auditing in cloud computing, especially in the public cloud apart from the above stages [11].", "One of the neglected issues is data-after-delete [11] and this is also called as data remanence."]} +{"21658252|9176080": []} +{"67868048|3443381": []} +{"67868048|18702964": []} +{"67868048|9176080": []} +{"67868048|7199412": []} +{"12972725|12017064": ["According to Modi et al.6 & NIST4, there are three deployment and three delivery models that are considered as industry standards.", "According to Modi et al.(6) & NIST(4), there are three deployment and three delivery models that are considered as industry standards."]} diff --git a/edge/graph_211031894.jsonl b/edge/graph_211031894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..770cbaabf727f47a3e660b236920113129ceb992 --- /dev/null +++ b/edge/graph_211031894.jsonl @@ -0,0 +1,24 @@ +{"17889756|627405": ["identified several issues of electronic search derived from their experience in conducting SLRs (Brereton et al., 2007).", "Brereton et al. (2007) identified several issues of electronic search derived from their experience in conducting SLRs."]} +{"67282358|393948": []} +{"159045711|1353379": []} +{"159045711|1599458": []} +{"30072765|7165993": []} +{"30072765|4602249": ["Unfortunately, this can cause unintended side effects that manifest false positives, e.g. additional overheads (Kanewala and Bieman 2014) may cause premature time-outs.", "Harman et al. (2013), Kanewala and Bieman (2014), and Nardi and Delamaro (2011) conducted a higher level synthesis, which means their synthesis was effective for finding high level research opportunities, e.g. measurements for oracles (Harman et al. 2013), but less capable of identifying lower\u2026", "For example, Kanewala and Bieman (2014), Nardi and Delamaro (2011), and Baresi and Young (2001) had a more constrained scope; they were restricted to Scientific Software, Dynamical Systems, and specification-and model-based testing, respectively.", "One may wish to extend the classifier with a graph kernel, 5 that has parameters (Kanewala et al. 2014) that might have to be tuned to improve accuracy.", "For example, training datasets are necessary for the machine learning classifiers (Kanewala et al. 2014), and obtaining these can be difficult (Chen et al. 2016)."]} +{"3429901|393948": ["To meet the requirement of analyzing Big Data, specific deep learning techniques have been developed by many researchers [6, 16]."]} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} +{"202660787|173991065": ["nerable to malicious attacks such as trojaning attack [227] and poisoning attack [228]. Hence, security countermeasures to remedy these vulnerabilities are expected. The recent advances in blockchain [229] may help to improve the security of big data analytics. VIII. FUTURE RESEARCH DIRECTIONS Table VIII summarizes the solutions to challenges in big data analytics for large scale wireless networks in t"]} +{"202660787|52336302": []} +{"202660787|49527603": []} +{"202660787|3645740": []} +{"202660787|10235514": ["tion of mobile communication systems. For example, the downlink data rate of a wireless device in the 5G mobile networks is greater than 20 Gbps, which is about 100 times of that in 4G mobile systems [17]. This shift also exhibits in the wide diversity of data types (e.g., 4k video streams, high \ufb01delity audio, RAW pictures, heart rate, spatial and temporal data in 5G mobile networks). Note that the da"]} +{"202660787|3273340": ["Recently, deep learning architectures have received extensive attention [190]."]} +{"202660787|31245252": ["ctions for BDA of wireless networks However, it is still challenging to enforce the privacypreserved operations in data storage [241], especially when data storage service is offered by a third party [242]. Mobile Edge Computing (MEC) [243] can essentially offer a solution to the privacy-preservation in data storage by of\ufb02oading the data from the untrusted third party to the trusted MEC server (deploye"]} +{"202660787|6909107": ["Mobile Edge Computing (MEC) [243] can essentially offer a solution to the privacy-preservation in data storage by offloading the data from the untrusted third party to the trusted MEC server (deployed in proximity to the user)."]} +{"202660787|3649200": []} +{"202660787|3423198": []} +{"202660787|4427557": ["ransferring the data to another sensor node or a sink. There are a number of wireless communication technologies proposed to support the data communications of WSNs including Bluetooth, IEEE 802.15.4 [46], etc. Data sources of WSNs have similar features to the aforementioned networks including a wide range of data types (including temperature, light, pressure and speed), various physical dimensions an"]} +{"202660787|3126100": []} +{"202660787|38911919": []} +{"3021110|1734833": []} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} diff --git a/edge/graph_211031968.jsonl b/edge/graph_211031968.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd0e7c83c04afdeb3fc33964d7ac6aa859c8a00f --- /dev/null +++ b/edge/graph_211031968.jsonl @@ -0,0 +1,10 @@ +{"16539414|7158350": ["031 systems rely on a wide range of classifiers, such as traditional statistical and Bayesian classifiers (Duda, Hart, & Stork, 2000), case-based reasoning classifiers (Aha, Kibler, & Albert, 1991), decision trees (Mitchell, 1997), and neural networks (Zhang, 2000).", "\u2026doi:10.1016/j.neunet.2007.12.031\nsystems rely on a wide range of classifiers, such as traditional statistical and Bayesian classifiers (Duda, Hart, & Stork, 2000), case-based reasoning classifiers (Aha, Kibler, & Albert, 1991), decision trees (Mitchell, 1997), and neural networks (Zhang, 2000)."]} +{"52980394|46924129": []} +{"997764|6116761": ["\u2026and effective connectivity is important because it determines the nature of the inferences made about functional integration and the sorts of questions that can be addressed with careful con\u00ad sideration of the intricate interrelationship between effective and functional connectivity [9], [10].", "Interested readers are directed to our previous review [10] for a more detailed discussion on brain connectivity."]} +{"102352588|3918777": ["The terms \u201cdata mismatch\u201d, \u201cconcept drift\u201d, and \u201ccovariate shift\u201d have been used to refer to the situation where data characteristics (distribution) change over time [27]."]} +{"206916371|26179088": ["Filter techniques are computationally fast and simply scalable since they are classification independent [20].", "Second, wrapper techniques are not efficient fo large number of features, when the classifica120 tion model is complex [20]."]} +{"3565527|2088679": []} +{"49419707|23374959": ["We suggest that readers consult the applicable references [211], [242]\u2013[245] for more details on the analysis and removal of artifacts from highdensity EEG signals."]} +{"49419707|2644350": []} +{"44139346|393948": ["Dealing with representations explicitly may be advantageous because they can conveniently express general priors that are not specific to a single predictive task (Bengio et al., 2013), and this is particularly important for zero-shot learning (Socher et al.", "Dealing with representations explicitly may be advantageous because they can conveniently express general priors that are not specific to a single predictive task (Bengio et al., 2013), and this is particularly important for zero-shot learning (Socher et al., 2013) in unseen categories."]} +{"206917364|37213650": []} diff --git a/edge/graph_211038940.jsonl b/edge/graph_211038940.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ae41455a0e0313d89ea8ff00d75e1b84fbfc62a --- /dev/null +++ b/edge/graph_211038940.jsonl @@ -0,0 +1,14 @@ +{"8601310|11009327": []} +{"25298188|1987550": []} +{"51716703|1734833": ["Alarm is a subtask mainly used in anomalies detection, raising an alarm as soon as an anomaly is detected [11]; (2.", "For example, sleep issues such as apnea, can be analyzed through saved data from the patient: a home sleep monitoring allows to monitor sleep in a familiar environment resulting in reliable data acquisition [11,84].", "1) Prediction\u2014consists in the identification of events that have not occurred yet, providing medical information to help in the prevention of further chronic problems, and sometimes, can support a diagnosis decision [11]; (2.", "unobtrusiveness; privacy and ethical issues as already covered; legislation within and between states or countries; interoperability; end-user training to use WHDs; and social inclusion preventing users isolation, which can lead to a decrease of interaction with caregivers and physicians [11,15].", "Alarm is a subtask mainly used in anomalies detection, raising an alarm as soon as an anomaly is detected [11];", "Nowadays technology and wearable scenarios let us to classify WHDs according to three aspects (Figure 1): scenario of use (home/remote or clinical environment); the type of monitoring (offline or online); and the type of user (healthy or patient) [11].", "3) Diagnosis Support\u2014is one of the most important tasks of clinical monitoring, resulting in a clinical decision according to retrieved knowledge of vital signs, health records and anomaly detection data [11]."]} +{"51716703|30383344": ["Another example is the use of these devices in the health status monitoring of firefighters and combatants in field using mobile technologies, such as GPRS [81,84].", "This system can also be helpful to label the timing of important events using external devices [5,10,81,84].", "Monitoring that enables to visualize live data [81,82].", "For example, if an elderly person is subjected to an excessive cold or hot weather that can cause lung infection, dehydration or other diseases, an appropriate action might be taken to prevent a dangerous situation [15,81].", "The vital signs can also be recorded in Medical Information Systems to be later analyzed by a medical professionals [81,88].", "electronic; (C) Data Analysis, an offline method to see the recorded data; (D) and Real Time Monitoring that enables to visualize live data [81,82].", "Mobile telecommunications technologies can also be used to transmit real-time data using GPRS, a standard mobile data service in the global mobile communication.", "With LOBIN it was possible to monitor patient health status in real-time easily using a graphical user interface, which allowed the monitoring of several patients at the same time in the same screen, independently of the patient location [81]."]} +{"51716703|20905429": ["This system can also be helpful to label the timing of important events using external devices [5,10,81,84].", "If each node from the connecting network has a sensor or medical device with a sensing unit, containing more than just the sensor, we should refer it as a BSN rather than a BAN [10,12].", "The interconnection of these sensors creates a network of sensors (BAN), which are sent to a processing unit like a portable unit.", "With new advances in new materials, electronics and telecommunication information technology, together with the entry of big multinational companies, such as Google, but also of small startups, WHDs are expected to overcome their challenges and enter in the consumer market with a higher impact in the following years [10,15,55].", "These advantages culminate in an optimization of the resources usage [10].", "On the other hand, some other publications are strongly focused on the WHDs architecture and technical aspects of it, such as in [10].", "In the image, the terminology BAN is used because it is related only with the sensors placed around the human body.", "The term Body Area Network (BAN) can be sometimes confused with two other terminologies: Body Sensor Network (BSN) and Wireless Sensor Network (WSN).", "With WHDs it is possible to perform clinical monitoring outside a medical environment, alerting the patient in case of any physiological problem or just to monitor himself and be updated of his vital signs during daily activities [10]."]} +{"7206775|4962939": ["\u2026knowledge to be represented from a guideline and do not allow for managing uncertainty well \u2013 either in the interpretation and encoding of ambiguous statements within a guideline, or in making a recommendation for action to the end user with some sense of certainty of the recommendation [161-164]."]} +{"7206775|11009327": ["no surprise that many clinicians view CDS as arising at an inopportune time in their workflow [219, 220], and many CDS alerts are simply ignored or overridden [221-224]."]} +{"11505196|11009327": []} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"3905162|8436865": []} +{"10432603|11009327": ["The extent of the benefit of implementing CDS is seldom realized, in part, due to \u201calert fatigue\u201d.(3) Alert fatigue results when a provider, after receiving too many alerts, ignores and/or overrides them, even clinically significant ones.", "5 Studies recommend reducing alert fatigue by lowering the number of alerts presented to clinicians and by increasing alert specificity.(3) 6 7 Most KBs tier DDIs based on their severity and strength of evidence but there is little overlap between these KBs on even the highly significant DDIs."]} +{"3804097|21386749": ["Among IoT application domains, health care is one of the most attractive, giving rise to many health-related devices [18]."]} +{"3804097|7494281": ["In the case of a relative profile, some authors distinguish these profiles in terms of accessing the PHR with some limitations or full access with the permission of the patient [5,23,65].", "Journal BioMedd Castillo et al, 2010 [5] A08", "The EHR evolved from a number of electronic methods of storing patients\u2019 health data that became a structured and interoperable approach [5,6]."]} diff --git a/edge/graph_211040748.jsonl b/edge/graph_211040748.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bfd53e26d306cab088a3970f7f1c6bccb2674c6 --- /dev/null +++ b/edge/graph_211040748.jsonl @@ -0,0 +1,17 @@ +{"10043111|3540699": ["264 describes the lossy compression of a video stream [25] and is also part of ISO/IEC MPEG-4."]} +{"7270249|1188683": []} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"14438457|14750997": []} +{"14438457|1188683": []} +{"9742510|1188683": []} +{"15201550|206459491": ["They are embedded in real circuits and can lead to serious security \nfailures [Karri et al. 2010; Tehranipoor and Koushanfar 2010]."]} +{"15201550|15331799": []} +{"31463392|1188683": ["The reconfigurable unit, based on the one presented in [5], is a dynamic coarse-grained array tightly coupled to the processor [27]."]} +{"10653956|8950567": ["Recent surveys [1, 2] provide a good overview of some of these design decisions."]} +{"10653956|14750997": ["opcode) and the parameters from the software to the hardware implementation [ 6 , 7]. However, the main characteristic to classify SIs according their efficiency is the amount of data they process:"]} +{"15231769|1188683": ["However, for complex operations and large computations, CGRAs are far more efficient in terms of area, power, and performance [5, 7, 18].", "There are numerous compile-time solutions using new languages, compilers, and other design tools, many of which are summarized in [5, 7, 18].", "The benefits of implementing a CGRA as a coprocessor have already been adequately demonstrated [5, 7, 18], and growing chip density allows designers to attach a CGRA in systems on chips with minimal additional hardware cost."]} +{"15140621|1188683": ["On the other hand, GPPs are very flexible but may not offer the necessary performance."]} +{"10389838|3042864": ["\u2026mobile devices have transitioned from handheld sets, which enable simple voice and message services, to smartphones, which host multiple applications with high performance requirements, such as video processing, object recognition, and interactive games [Khan et al. 2014; Ahmed et al. 2015].", "\u2026other mobile processors, such as (1) ef\ufb01cient virtualization solutions built on hardware virtualization support, which has matured over the past decade, and (2) virtualization solutions supporting VM migrations for energy ef\ufb01ciency and computational of\ufb02oading [Khan et al. 2014; Sud et al. 2012]."]} +{"10389838|28577245": ["Alternatively, the guest OSs in type-2 virtualization are virtualized over a host OS [Gu and Zhao 2012].", "Virtualization technologies can be broadly categorized as type-1 (bare-metal) and type-2 (hosted) virtualization techniques [Gu and Zhao 2012].", "In paravirtualization, modi\ufb01ed front-end drivers in the guest OSs can communicate with the back-end driver in the hypervisor that exposes optimized hardware interface [Gu and Zhao 2012].", "Gu and Zhao [2012] presented a survey on the real-time issues of mobile virtualization."]} +{"1883569|1188683": ["Compton and Hauck [2002] present a survey on systems and software tools for reconfigurable computing, and Todman et al."]} +{"1883569|206011846": []} diff --git a/edge/graph_211043705.jsonl b/edge/graph_211043705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f13c2c4f12b9d478420222e7fd1f1039b63b0fc --- /dev/null +++ b/edge/graph_211043705.jsonl @@ -0,0 +1,5 @@ +{"51557856|13268141": []} +{"51557856|582949": []} +{"3506224|1188683": ["bioinformatics algorithms are mapped to reconfigurable hardware [ 20 ] and streaming applications are becoming more commonplace for FPGAs it would be really interesting to examine common attributes of bioinformatics algorithms and biological problems for FPGAs [21], aiming at a general platform for bioinformatics problems.", "The use of reconfigurable hardware for computationally intensive problems is a trend since the early 1990s [ 20 ]."]} +{"52112351|28518402": []} +{"20778663|3420321": ["The S-W algorithm can be used for identifying these aberrations since it is quite sensitive to identify most complex aberrations which instead result unrecognizable by using alternative heuristics provided by faster algorithms [3]."]} diff --git a/edge/graph_211043849.jsonl b/edge/graph_211043849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84c3a83a66043a119722e202bdf5248efa5c1025 --- /dev/null +++ b/edge/graph_211043849.jsonl @@ -0,0 +1 @@ +{"2119519|8921624": ["01 63\n3v 1\n[c s.\nLO ]\n5 N\nov 2\nCategories and Subject DescriptorsF.3.1 [Logics and Meanings of Programs]: Specifying and Verifying and Reasoning about Programs\u2014Logics of Programs\nKeywords String analysis, XSS, word equations, transducers", "\u2026of the form P1(x) \u2227 \u00b7 \u00b7 \u00b7 \u2227 Pm(x), in such a way that a wordw satisfies this constraint if and only if it codifies a sequence of configurations ofM, the first such configuration corresponds to the initial configuration ofM on inputw, and the final such configuration corresponds to a final\u2026"]} diff --git a/edge/graph_211048417.jsonl b/edge/graph_211048417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18eeba0be517674eeaada75d6a38be1b21347c9b --- /dev/null +++ b/edge/graph_211048417.jsonl @@ -0,0 +1,5 @@ +{"5949436|62198990": []} +{"57757940|2916525": []} +{"182600801|2916525": ["\u2026and valid measure for the timing of cognitive processes, due to the low spatial resolution of EEG, their suitability for localising brain regions ascribed with certain aspects of language processing is limited (Jobard, Crivello, & Tzourio-Mazoyer, 2003; Price, 2012; Taylor, Rastle, & Davis, 2013)."]} +{"182600801|6116761": ["It must be emphasised, however, that methods applied so far might only be suitable for testing undirected network processing , since they are indicative of functional (i.e. correlative) but not e \ufb00 ective (i.e. causal) connectivity (see Friston, 2011 for a review)."]} +{"2339273|2916525": ["\u2026semantic violations elicited a beta suppression as early as 200 ms after stimulus onsets (Luo et al., 2010; Wang et al., 2012a) and the localization of the effect was over areas typically associated with the reading network (for a review see Price, 2012; Taylor et al., 2013; Martin et al., 2015).", "For the purpose of the present study we will not focus on the functional neuroanatomy of the reading network (for a review see Price, 2012; Taylor et al., 2013; Martin et al., 2015), but rather on neuronal communication between and within areas as related to sentence-level predictions."]} diff --git a/edge/graph_211056288.jsonl b/edge/graph_211056288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7380e8fbd3027a22bc8c63aaff751c0bc90f4c48 --- /dev/null +++ b/edge/graph_211056288.jsonl @@ -0,0 +1,14 @@ +{"228479|17774971": ["\u2026\u00a92014 IEEE\nIndex terms- Cascade H-bridge inverter; phase-shifted PWM; level-shifted PWM; total harmonic distortion; switching device losses\nI. INTRODUCTION\nMultilevel converters are finding increased attention in industry and academia as one of the preferred choices of electronic power\u2026", "978-1-4799-2526-1/14/$31.00 \u00a92014 IEEE\nIndex terms- Cascade H-bridge inverter; phase-shifted PWM; level-shifted PWM; total harmonic distortion; switching device losses\nI. INTRODUCTION\nMultilevel converters are finding increased attention in industry and academia as one of the preferred choices of electronic power conversion for high power applications [1]-[3]."]} +{"45922005|17774971": ["The main drawback of the NPC topology is unequal voltage sharing between the series connected capacitors, which leads to dc-link capacitor unbalancing and requires a great number of clamping diodes for a high number of voltage levels [6].", "2148177 variety of control strategies have been developed [6]\u2013[9]."]} +{"113193259|17774971": []} +{"20403945|17774971": ["One of the soft-switching circuits is a zerovoltage-switching type, which includes an auxiliary resonant commutated poleandacoupledinductor withzero-voltagetransition [11], [ 12 ]."]} +{"17525995|17774971": []} +{"619647|17774971": []} +{"37231712|17774971": ["SUPPORTED by the fast development of high-power semiconductors over recent years, multilevel converters have emerged and enable better line-side behavior than current converter topologies [6].", "Two further advantages are worth mentioning in comparison to other multilevel inverters (like the diode-clamped inverter as well as the capacitor-clamped inverter [6]).", "Neutral-point-clamped (NPC) inverters [6], realized in a back-to-back configuration, would be one of the most common alternatives to the ac/ac M LC."]} +{"35577999|17774971": ["Power semiconductors in MLIs normally tolerate less voltage stress in comparison with the traditional two-levels counterparts [2]."]} +{"14815643|17774971": ["Among different topologies [4], the cascaded multicell [5], [6] inverter has received much attention."]} +{"17990339|17774971": ["ULTILEVEL inverters include an array of power semiconductors and dc voltage sources, the output of which generate voltages with stepped waveforms [1]."]} +{"17510579|18985591": []} +{"114678298|17774971": []} +{"9618579|18985591": []} +{"115784893|12083425": []} diff --git a/edge/graph_211057194.jsonl b/edge/graph_211057194.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68cc3622c222f2674bd31d8f71870a479530e214 --- /dev/null +++ b/edge/graph_211057194.jsonl @@ -0,0 +1,71 @@ +{"121316845|49527603": ["preserved by the blockchain inherent properties [18]."]} +{"56895323|49527603": ["In [19], a brief summary of the emerging blockchain-based applications ranging from"]} +{"56895323|9461213": ["fields [221], [222], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secure Multi-Party Computation (MPC)."]} +{"56895323|27262729": ["A systematic survey is conducted in [20] with respect to the security in the Bitcoin network including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", "vacy [20] and quantitative analysis of smart contract performance [217].", ", Sybil attacks [41] and doublespending attacks [20]), node mistakes (e."]} +{"56895323|2457428": ["the security is a main concern. Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]. In [182], the authors present a framework for providing secure key management in VCSs, where the security managers are considered as blockchain miners which capture the vehicle departure information"]} +{"56895323|3434731": ["trusted virtual computers [6] for decentralized, transactiondriven resource management in communication networks and distributed autonomous systems [5], [7].", "In [7] and [16], two brief surveys on consensus protocols in blockchain networks are provided."]} +{"53304340|49574823": ["\u2026home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security issues can pose risks for human safety\u2026"]} +{"53304340|46973566": ["\u2026are present in numerous environments, such as in agriculture [5], home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in\u2026"]} +{"53304340|4625011": ["\u2026[6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security issues can pose risks for human safety and privacy [21]."]} +{"53304340|3579945": ["Nowadays, IoT devices are present in numerous environments, such as in agriculture [5], home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality\u2026"]} +{"53304340|13991708": ["\u2026such as in agriculture [5], home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security\u2026"]} +{"53304340|3434731": ["\u2026home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security issues can pose risks for human safety\u2026"]} +{"58577818|53213623": ["Some authors investigated energy harvesting techniques [40\u201342], which allow IoT end devices to obtain energy from their environment, and thus remove the need for external power sources and increase battery replacement periods."]} +{"58577818|13991708": ["Nowadays, IoT devices are connected to the Internet in diverse environments and \ufb01elds such as industry or defense and public safety [1]."]} +{"61809190|56178838": ["Previous papers have already demonstrated that, in general, ECC is faster [52]\u2013[55] and more energy efficient [56]\u2013 [62] than RSA."]} +{"61809190|49574823": ["Further details on the specifics of the different types of blockchain can be found in [24].", "Specifically, a comprehensive overview on blockchain that emphasizes its application to IoT is provided in [24]."]} +{"61809190|46973566": ["\u2026The inclusion of blockchain in software-based manufacturing can increase productivity and quality control, reducing the costs for tracking in inspections (e.g., it simplifies version management), warranty, inventory management [153], [154], ownership issues, maintenance or recycling tasks."]} +{"61809190|4625011": []} +{"61809190|27262729": ["Although, to protect privacy, public keys are independent from the identity of a user, it is possible to determine certain identities by analyzing the performed transactions [68], [69], although such an analysis can be made more difficult by using multichains [70] or mixing protocols [71]\u2013[73]."]} +{"61809190|3579945": ["\u2026techniques, the improvements in connectivity and computational power, the emergence of new machine learning approaches, the development of new computing paradigms (e.g., cloud, fog, mist and edge computing), novel human-machine interfaces [2]\u2013[4], IIoT enhancements [5] or the use of robotics and 3-"]} +{"61809190|25206420": ["\u2026be fast and secure in terms of collision avoidance [78], [79] Finally, it is also worth noting that privacy has been recently considered as essential in different recent initiatives [86]\u2013[88], which have suggested the use of techniques like ring signatures [89] or homomorphic encryption [90]\u2013[93]."]} +{"115684784|49574823": ["Blockchain can be considered to be still under development in many aspects [52,114], but some of its applications for \ufb01elds where trust is a necessity to interact with third-parties have been already studied [115\u2013119].", "Due to the expected impact of blockchain and smart contracts on future IoT devices [52,54], Figure 3 shows a speci\ufb01c blockchain module associated to the storage subsystem.", "Although it is not essential for the basic functioning of a smart clothing system, it enables different useful features like redundancy, data security and trustworthiness [52].", "\u2022 A communications gateway that exchanges information with the smart garments in order to send it through the Internet or an internal LAN to remote services provided, for instance, by cloud servers or a blockchain [52]."]} +{"115684784|44147498": ["Similarly, Radio-Frequency IDentification (RFID) and Near Field Communication (NFC) tags attached to objects can be read from a certain distance through a reader embedded into a smart garment [73]."]} +{"115684784|46973566": []} +{"115684784|49472839": ["The sensor subsystem may be composed by several types of sensors that can monitor diverse phenomena or events from the surrounding environment [35,51,59,60]."]} +{"115684784|4625011": ["\u2026IoT and wearables, when coupled with advances in 5G communication networks for device-to-device communications [16], virtual/augmented reality [17,18], cyber-physical systems [19], Arti\ufb01cial Intelligence (AI) [20] and smart textiles [21], can bring human-to-human and human-to-machine\u2026"]} +{"115684784|3579945": ["The Internet of Things (IoT) is already unlocking the bene\ufb01ts of the data economy in numerous industries like healthcare [5], agriculture [6], manufacturing [7], home automation [8\u201310], transportation [11], energy [12,13], emergency management or defense and public safety [14,15]."]} +{"115684784|18303304": ["The sensor subsystem may be composed by several types of sensors that can monitor diverse phenomena or events from the surrounding environment [35,51,59,60]."]} +{"115684784|13991708": ["The Internet of Things (IoT) is already unlocking the bene\ufb01ts of the data economy in numerous industries like healthcare [5], agriculture [6], manufacturing [7], home automation [8\u201310], transportation [11], energy [12,13], emergency management or defense and public safety [14,15]."]} +{"115684784|30383344": ["It is also important to note that most architectures divide the previously mentioned components into three layers [55]: \u2022 Body Area Network (BAN)."]} +{"115684784|469744": ["\u2026was actually not developed until the early 1990s: \ufb01rst empirically by Caudell and Mizell [30], from Boeing, who presented a head-up see-through display used to augment the visual \ufb01eld of an operator with information related to the task she/he was carrying out, and then theoretically by Azuma [31]."]} +{"115684784|3494096": []} +{"115684784|206583375": ["There are other technologies that enable positioning a smart garment, like traditional cameras, infrared systems [101], ultrasounds [102], UWB [103] or inertial navigation systems [104]."]} +{"51614104|49574823": [", industrial augmented reality [12\u201314], blockchain [15], smart devices [16]), has enabled performing and automating certain actions."]} +{"51614104|46973566": [", industrial augmented reality [12\u201314], blockchain [15], smart devices [16]), has enabled performing and automating certain actions."]} +{"51614104|4625011": []} +{"51614104|3579945": []} +{"51614104|13991708": ["IoT systems allow for carrying out enhanced decision-making in fields such as defense [17,18] and high-security applications [19], telemetry [20], transportation [21\u201324] or"]} +{"203073953|199012443": ["There are also many other communications technologies that can be used by DL-UAVs, like 3G/4G/5G [106,107], ZigBee (IEEE 802.15.4) [103], Long-Range Wide Area Network (LoRaWAN) [108], Ultra Wide Band (UWB) [109], IEEE 802.11ah [110], or Wi-Fi Direct [111]."]} +{"203073953|61809190": []} +{"203073953|49574823": ["Figure 2 also includes in the Remote Service Layer the use of Distributed Ledger Technologies (DLTs) like blockchain, which have been previously applied to multiple IoT applications [85\u201387], including UAV systems [88]."]} +{"203073953|46973566": ["Table 3 shows a comparison on the main characteristics of the latest communications technologies for DL-UAVs [4], indicating their frequency band, coverage, data rate, power consumption, and potential applications."]} +{"203073953|4002053": ["Regarding the use of DL techniques for robotic solutions, in the work by the authors of [35], a survey is presented on the use of DL techniques for robotic perception, robotic control and exploration, and robotic navigation and autonomous driving.", "In the speci\ufb01c context of autonomous collision avoidance, DL techniques have shown their effectiveness when solving a wide variety of robotic tasks in areas like perception, planning, positioning, and control [35], which involve learning complex behaviors."]} +{"203073953|81985472": ["Alternatively, computer vision methods can be used, which involve tasks such as optical flow or depth estimation from the data captured by monocular and stereo cameras [30,31].", "In the speci\ufb01c context of UAV navigation, the authors of [31] reviewed vision-based techniques for positioning and mapping, obstacle avoidance, and path planning."]} +{"203073953|2958701": ["Moreover, DL techniques excel when learning data representations from raw sensor data acquired by robotic solutions in real environments [39].", "For instance, in the work by the authors of [39], the current literature is systematically reviewed according to a taxonomy that includes different abstraction levels related to perception, guidance, navigation, and control."]} +{"167210863|61809190": ["Blockchain and other Distributed Ledger Technologies (DLTs) are also predicted to be essential for many industries [18,19], since they allow for storing the collected data (or a proof of such data) so that they can be exchanged in a secure way among entities that do not trust each other.", "Finally, it must be noted that the use of current DLTs, and speci\ufb01cally blockchain, involve certain weaknesses related to the immature status of the technology, like the lack of scalability, high energy consumption, low performance, interoperability risks or privacy issues [18\u201322]."]} +{"167210863|49574823": ["Although blockchain can be considered to be still under development in many aspects [20,21], some of its applications for fields where trust is a required (e.g., finance) have been already deployed [22]."]} +{"167210863|46973566": ["The next step in the tag evolution are the so-called smart labels [30], which are noticeably more complex than RFID tags and allow for providing industry 4.0 functionality like event detection [31], operator interactivity, a display for visual feedback, one or more communication technologies,\u2026"]} +{"167210863|4625011": ["\u2026of traditional factories towards smart factories through the use of some of the latest advances in paradigms and technological enablers like big data [1], augmented reality [2\u20135], robotics [6], cyber\u2013physical systems [7], fog computing [8,9] or the Industrial Internet-of-Things (IIoT) [10]."]} +{"167210863|31216129": ["\u2026of traditional factories towards smart factories through the use of some of the latest advances in paradigms and technological enablers like big data [1], augmented reality [2\u20135], robotics [6], cyber\u2013physical systems [7], fog computing [8,9] or the Industrial Internet-of-Things (IIoT) [10]."]} +{"167210863|3579945": ["There are diverse BLE profiles and specific devices called beacons that can be useful in certain inventory and traceability applications, as well as in indoor locations [35,36] and IoT applications [37,38], since they transmit a periodic signal to be located and identified."]} +{"2847229|1230643": []} +{"58015430|3932531": []} +{"58015430|3628110": []} +{"198985260|61809190": ["Moreover, transparency is provided to the authorized third-parties that access the stored information, which allows them to monitor and analyze it in order to determine whether it has been tampered [57]."]} +{"198985260|49574823": ["Speci\ufb01cally, a blockchain can be used to preserve user anonymity and transaction privacy, so that patient data can remain private to non-authorized parties [56]."]} +{"198985260|46973566": ["Finally, it is worth noting that, with the rise of IoT [45,46], crowdsourcing is gaining momentum in a wide range of sectors and tasks [47\u201351]."]} +{"198985260|29859741": ["A good compilation of fog computing based healthcare applications can be found in [24], which describes potential applications for monitoring Chronic Obstructive Pulmonary Disease (COPD) patients [25], tools for in-home Parkinson disease treatments [26] or hospital platforms that make use of\u2026"]} +{"198985260|13765327": ["For example, physical exercise clearly alters glucose concentration levels on Type-1 DM patients: glucose regulation problems may arise during or after exercising and even when performing certain daily activities [19]."]} +{"198985260|57764303": ["Finally, it is worth noting that, with the rise of IoT [45,46], crowdsourcing is gaining momentum in a wide range of sectors and tasks [47\u201351]."]} +{"198985260|57378792": ["In addition, there are incentive mechanisms that enable community participation [48].", "accomplish problem solving, data processing, surveillance/monitoring, and surveying [52], but there are not many mobile crowdsourcing applications [11,53] and even less decentralized while focused on healthcare [48]."]} +{"67856722|61809190": ["Other articles focused on the application of blockchain to speci\ufb01c Industry 4.0 technologies like big data [19], to speci\ufb01c industries [20], [21], [22] or important characteristics like energy ef\ufb01ciency [23]."]} +{"67856722|49574823": ["There exist different types of blockchains depending on how users interact with them and how data are managed/accessed [18].", "Similarly, the architecture and the possible optimizations to be performed for creating and deploying blockchain-based IoT applications are detailed in [18]."]} +{"67856722|4625011": ["Both AR and VR evolved remarkably in the last decade, where they proved to increase productivity [98] and to be helpful in industrial design processes [99], [100], when manufacturing certain goods [101], [102], [103], [104] or for maintaining specific industrial components [105], [106]."]} +{"67856722|31216129": ["Cobots are able to collaborate with humans in certain tasks [114], while robots can automate other tasks in an autonomous way [115]."]} +{"67856722|27262729": ["Therefore, although blockchain technology can increase Industry 4.0 application security, its use entails certain security issues that should be identi\ufb01ed and addressed [152]."]} +{"67856722|3579945": ["This is essential in the case of critical infrastructures [34], [35] and defense [36], whose data, due to legal and privacy concerns (e.g., certain defense data are considered strategic and therefore classi\ufb01ed), have to be stored through trusted service providers, specially in countries where data\u2026"]} +{"67856722|13991708": ["This is essential in the case of critical infrastructures [34], [35] and defense [36], whose data, due to legal and privacy concerns (e.g., certain defense data are considered strategic and therefore classi\ufb01ed), have to be stored through trusted service providers, specially in countries where data\u2026"]} +{"195218803|56895323": ["[16] and \u2018\u2018SoK: Consensus in the age of blockchains\u2019\u2019 [32], have been carried out in the past few years.", "Most of the review and survey works such as [15], [16] discuss security, privacy, consensus or other challenges in blockchain.", "Reference [16] gives a brief idea about the mining strategy management in blockchain networks, while reference [49] provides a strategic study of mining through stochastic games."]} +{"195218803|13688847": []} +{"195218803|27262729": ["Most of the review and survey works such as [15], [16] discuss security, privacy, consensus or other challenges in blockchain."]} diff --git a/edge/graph_211057806.jsonl b/edge/graph_211057806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2187a6ea95be0f66587edf772c91e2f5d5d6d5d1 --- /dev/null +++ b/edge/graph_211057806.jsonl @@ -0,0 +1,12 @@ +{"10620211|4474193": ["There are many multiobjective optimization problems existing in the real world and changing over time, which are called dynamic multiobjective optimization (DMO) problem (Jin and Branke 2005; Chen and Jiao 2010)."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"16543210|4474193": []} +{"7537095|17381201": ["Different GAs or hybrid GAs have been successfully applied to a wide range of problems including vehicle routing problems [20], many-objective optimization problems [12], software testing [17], and unmanned aerial vehicles (UAVs) path planning [16]."]} +{"13997318|8530790": []} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"20131489|1099309": []} +{"32917836|191396": ["The degree of belonging of data point to cluster is described by a function which varies from fuzzy to possibilistic clustering (Xu and Wunsch, 2005)."]} +{"7621359|8953108": ["There exists a number of popular CVI in the literature [24]."]} +{"25933492|191396": ["The hierarchical clustering algorithms [1] organize the data in a tree structure and produce the partitions that allow the data points to belong to a particular group with a degree of membership equal to one or zero."]} +{"8529355|508912": ["Let us first revisit a well-known classification of adaptive EAs [23], [24] (see Fig."]} diff --git a/edge/graph_211058008.jsonl b/edge/graph_211058008.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2661c671aa7f48562a54df1c7f454a578b9b72d2 --- /dev/null +++ b/edge/graph_211058008.jsonl @@ -0,0 +1,27 @@ +{"15048794|18212759": ["Previous researches have addressed the traditional hazards, such as malware attacks, networktraveling worms, and data abuse [1], [2]."]} +{"19737659|18212759": []} +{"27434345|5246835": ["[47] highlight that an important advantage of data mining is that it can be used to develop a new class of models to identify new attacks before"]} +{"27434345|50458504": ["[58] describe fraud as leading to the abuse of a profit organization's systemwithout necessarily leading to direct legal consequences.", "2 consists of two layers, the first comprising the aforementioned financial fraud based categories and the second comprising the six data mining application classes of classification, clustering, prediction, outlier detection, regression, and visualization [13,24,32,48,58,61,74,76], supported by a set of algorithmic approaches to extract the relevant relationships in the data [73].", "[58] point out that fraud detection has become one of the best established applications of data mining in both industry and government.", "[58] present a survey of data mining-based fraud detection research, including credit transaction fraud, telecoms subscription fraud, automobile insurance fraud and the like.", "2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"27434345|954543": ["2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"38207804|12017064": []} +{"6872689|2294541": []} +{"51881732|4449": []} +{"51881732|2294541": []} +{"3668455|6906699": []} +{"3668455|13287576": ["Multiple intrusion detection approaches can be simultaneously deployed based on the security demands [71,74,79,80].", "Finally, a machine learning-based technique [70,71] is a procedure of constructing new behavior models based on the observations of activities, events, and behaviors."]} +{"3668455|18269383": []} +{"3668455|16654832": []} +{"3668455|10780757": ["Three common techniques [67] supporting comparisons include statistical-based [68], knowledge-based, and machine learning-based techniques [69,70].", "Next, the knowledge-based technique is applicable for those systems that consist of speci\ufb01c knowledge structures or attached to a set of rules [67], such as symbolic representations.", "Statistical-based technique tracks all networking traf\ufb01cs and generates a pro\ufb01le examining whether there are any improper traf\ufb01c by a statistical analysis [67].", "The obstacle of adopting this technique is the extensive requirement of computing resources [67], which imply that the examination is highly dependent on the stored secure behavior assumptions."]} +{"3668455|18212759": ["The technologies supporting cloud computing are very similar regardless of service types or deployments [25,26]."]} +{"3668455|12815020": ["In a networking context, attackers can only gain controls on VMs by attacking the lower layer hyper-visor [40]."]} +{"15344314|25943273": ["Various form of attacks on IT infrastructure and computer networks have been serious problems to enterprises, and many of them making great efforts to prevent these attacks [4]."]} +{"16608783|9316331": ["As a statistical approach, MCM is considered one of the efficient schemas for processing random data with outputting the results from the repeated input data [23]."]} +{"16608783|18212759": ["However, current cloud platform providers do not have efficient solutions to prevent counterfeits due to massive workload and technical restrictions [18]."]} +{"16087532|50458504": ["The cost of misclassification (false positive and false negative errors) differs, with a false negative error (misclassifying a fraudulent activity as a normal activity) usually being more costly than a false positive error (misclassifying a normal activity as a fraudulent activity) [3].", "\u2016 In academic literature fraud is defined as leading to the abuse of a profit organization's system without necessarily leading to direct legal consequences [3].", "1 consists of two layers, the first comprising the six data mining application classes of classification, clustering, prediction, outlier detection, regression, and visualization [3,16,18,22,23], supported by a set of algorithmic approaches to extract the relevant relationships in the data [14].", "In a study [3], Na\u00efve Bayes classifier outperformed the conventional classifier.", "1, is based on a literature review of existing knowledge on the nature of data mining research [19,20], fraud detection research [1,3,16,17,18].", "A survey of data mining-based fraud detection research is presented in [3], including credit transaction fraud, telecoms subscription fraud, automobile insurance fraud, terrorist detection, financial crime detection, intrusion and spam detection.", "Concerning this reality, the most optimal and cost effective option is to find out enough evidences of fraud from the available data using specialized mathematical and data processing algorithms [3].", "This area has become one of the key applications of data mining techniques in established industry or government organizations [3]."]} +{"16087532|954543": ["1, is based on a literature review of existing knowledge on the nature of data mining research [19,20], fraud detection research [1,3,16,17,18]."]} +{"26639027|9316331": ["However, the major limitation of using MCM in the \ufb01nancial industry is that an effective-like outcome requires a large-volume samples [56]."]} +{"2487903|16087532": ["In addition, using electronic approaches for financial frauds [27] is another emerging issue in Fin-Tech."]} +{"17700093|2357830": []} +{"31955368|50458504": ["While academic fraud research has examined many business areas [34], very little effort has been made to use quantitative approaches to examine textual data for automated financial reporting fraud detection.", "The major categories of fraud previously investigated have been classified into four areas: internal, insurance, credit, and telecom [34]."]} +{"30250858|1940388": ["Anonymous protection is generally divided into anonymous sender, receiver anonymity, unrelated sender and receiver according to the hidden object [3]."]} +{"27807436|393948": ["where, u 1\u20444 W \u00f01\u00de; b\u00f01\u00de;W \u00f02\u00de; b\u00f02\u00de is the parameter set, both the encoder function and the decoder function adopt the Sigmoid function [34]: sf\u00f0x\u00de 1\u20444 1=\u00f01\u00fe e x\u00de, represents the multi-dot product of two tensors, i,e."]} diff --git a/edge/graph_211058102.jsonl b/edge/graph_211058102.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64b5fc1c874c93d3f0efa25a9bb83ea61aa91c7e --- /dev/null +++ b/edge/graph_211058102.jsonl @@ -0,0 +1,55 @@ +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"206450227|10817088": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"53212049|9461213": ["Therefore, the capacities of processing big data and optimizing the transmission channel require more intelligent methods, such as machine learning and deep learning [8]."]} +{"10316859|8606364": []} +{"204231244|37424351": ["This is a vision to create efficiency within the city with the use of technology [2] For example, IoT devices have provided new infrastructure for managing traffic daily."]} +{"24110634|9495329": ["The surveys in [22] and [27] review SDN application in IoT, furthermore Bizanis and Kuipers [28] review the conjunction of SDN and NFV for IoT."]} +{"24110634|6583734": ["Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|11414835": ["The virtualizer ensures that all information collected is collated to form a virtualisation of the network state to the controller [29], [141]."]} +{"24110634|801245": ["WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization."]} +{"24110634|9040432": ["The survey study below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in\u2026"]} +{"24110634|2535224": ["\u2026below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in IoT [22], [27].", "Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|2623404": ["Large networks also become heterogeneous due to the use of different proprietary protocols, which fundamentally means they consist of different network islands that only cooperate at lower levels of communication [13], [33], [36].", "If no match is found, then appropriate rules are actioned, i.e. drop the packet, pass it to the next \ufb02ow table or send it to the controller for new rules to be made [13].", "The LFB has a speci\ufb01c function (such as routing) to process the packets [43], and enables the CE to control the FE [13].", "Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "If they match, appropriate actions are applied and if more than one entry match is found, prioritization, based on the highest degree of match, applies [13], [40].", "The instruction \ufb01eld determines what action should be taken upon a packet match [13].", "Recent research has focused on the development of both the southbound and northbound API standard-isation, with more focus on the southbound API [13].", "They both conform to the principle of decoupling the control and the data plane, but are fundamentally different [13].", "SDN introduces bene\ufb01ts such as vendor independence, heterogeneous network management, reliability and security not possible in traditional networks [12], [13], [16], [34], [35].", "Traditional networks are also mostly hierarchical, tree based and static, which leads to what most have termed \u2018\u2018ossi\ufb01cation\u2019\u2019 [13]."]} +{"24110634|10693567": ["The two most popular southbound interface speci\ufb01ca-tions are Forwarding and Control element separation (ForCes) [38], [39] and OpenFlow [40]\u2013[42]."]} +{"24110634|11735843": ["Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "The issue of virtualisation and cloud computing services has also necessitated a shift from conventional data storage towards SDN-oriented data storage and management [14].", "Another area which is the crux of this paper, is wireless sensor networks [14], [32], [56], [58]."]} +{"24110634|1230643": ["As Akyildiz et al. [8] and Qin et al. [106] allude, there has been less focus on the NB interface, whereas much attention has been dedicated to SB interfaces.", "WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization.", "Radio communication also consumes a huge chunk of power [8], it involves data transmission and reception."]} +{"24110634|10532321": ["The memory management techniques explored in [180] could be investigated from the SDWSN perspective.", "The rules placement problem is expounded with a comprehensive review of different solutions in [180]."]} +{"3494096|3474164": []} +{"3494096|24110634": []} +{"3494096|4427557": []} +{"3494096|2871699": ["M2M communications have been extensively reviewed in the literature [1], [31]\u2013[36].", "Pereira and Aguiar [31] discussed on European Telecommunication Standard Institute (ETSI) standard and application protocols while considering mobile devices such as smartphones to be used as mobile gateways for other connected devices with constrained capabilities and the process of aggregating data from embedded sensors in M2M network architecture."]} +{"3494096|2521001": ["Smart homes are expected to communicate regularly with their environments (internal and external) [17]."]} +{"3494096|121289": []} +{"174818593|206578224": ["On the other hand, if all these tasks are offloaded to cloud, they will consume a mass of transmission delay and the big number of these tasks will bring challenges of cost and energy consumption for cloud [9], [13]\u2013[15].", "EC is a novel computing paradigm which is powerful to offload the computation tasks of MDs to the Edge Computing Nodes (ECNs) for performing, to alleviate the transmission delay [9]."]} +{"32859534|9554464": ["Thus the isolated resources can be used by independent processes [19]."]} +{"32859534|1230643": ["1) WSN Hardware: Includes transceiver units, processing units, sensor interfaces, power supply, and multiple A/D convertors [18]."]} +{"44182431|3474164": ["managing the state information of massive number of IoT devices is also an issue that needs to be considered [62, 63]."]} +{"44182431|2871699": ["M2M communicaiton has been extensively reviewed in [54, 55, 56, 57, 58].", "The ETSI standard and applications has been discussed in [54] and [55], in which mobile devices are used as mobile gateways for resource constrained IoT devices."]} +{"44182431|3494096": ["The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time [1, 20, 21].", ", have been used in IoT applications, in which billion of devices will be connected by wireless communication technologies [20].", "The 3G and 4G are widely used for IoT but not fully optimized for IoT applications [20].", "Existing communication technologies are diverse and it is challenge for the fifth generation (5G) mobile network to meet the requirements of applicaitons in IoT [20].", "To ensure that M2M applications, the three generation partnership project (3GPP) proposed Enhanced Machine-Type Communication (eMTC), Extended Coverage-Global System for Mobile Communications for the IoT (EC GSM-IoT) and Narrowband-IoT (NB-IoT) as cellular-based LPWA technologies for the IoT [20].", "by inferences, such as WiFi signals, buildings, microwaves, etc [20]."]} +{"16604512|19938676": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"4502294|3555631": ["System information is broadcast over the anchor cell which also manages most of the radio resource control and signalling, while the small cells play an assistant role, having data offload as a main task [48]."]} +{"86706563|62902684": ["Two comprehensive reviews on CS can be found in [31] and [32]."]} +{"86706563|52094967": ["Details and security considerations of the three-layer IoT architecture [137].", "However, this layer can also suffer from DoS attacks and malicious insider attack, as illustrated in [137], [155], and [156].", "Perception/sensor Collecting information from sensors/ devices Eavesdropping [137], Node Capture [139], Add Malicious Node [137], Replay Attack [140], Timing Attack [141] Most attacks are on data confidentiality and integrity [137], [138]", "Further details on each can be found in [137] and the corresponding references.", "Network/transmission Connects devices to each other and to higher layer through wired/wireless media Denial of Service (DoS) [137], Man-in-the-Middle Attack [142], Storage Attack [137], Exploit Attack [137] Most attacks are on data integrity [137]"]} +{"86706563|1598350": ["9 March/April 2019 3) Security: IoT systems envision automatic discovery and support for a new target device without human intervention [6], [7], which immediately raises concerns on the security and privacy aspects of the network."]} +{"86706563|3348390": ["Further details on this can be found in [6] and [21].", "Reference [6] presents a detailed survey on QoC.", "9 March/April 2019 3) Security: IoT systems envision automatic discovery and support for a new target device without human intervention [6], [7], which immediately raises concerns on the security and privacy aspects of the network."]} +{"86706563|16209841": ["\u2026\u2014Ma-licious user needs both the secret private key and a passphrase to pose any threat 1) Key hacking: The private key needs to be protected and 2) not very scalable Open Authentication (OAuth/OAuth 2.0) [147]\u2013[149] Client-server-based system where server has the list of authorized clients."]} +{"86706563|7774517": ["Outlier detection algorithms utilize spatiotemporal correlations among the data points from the same node and/or neighboring nodes to distinguish between normal operation and anomalies [70].", "\u201d Figure 11 shows an example of anomaly in a sensor readout and explains the three classes of anomaly that are common in IoT devices and wireless sensor networks [70]."]} +{"86706563|7185733": ["Given the objective of the camera front end (FE), the computation complexity can be largely reduced (768\u00d7, as demonstrated in [33]) from existing algorithms that are targeted for continuous gesture recognition [35], [36]."]} +{"86706563|1708582": []} +{"26539168|206901977": ["[30] presented a survey of energy-saving techniques in WSNs."]} +{"26539168|9494512": ["[31] provided a brief survey of energy-efficient schemes used in WSNs for conserving the battery power of sensor nodes."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"3474164|24110634": []} +{"3474164|13991708": ["Recently Fraga-Lamas et al. [70] reviewed the possibility of applying IoT to warfare to increase ef\ufb01ciency."]} +{"3474164|17683338": ["Dynamic memory management on the other hand is \ufb02exible as it provides for allocation and de-allocation of memory at run-time [132].", "Other available operating systems include MultimodAl system for NeTworks of In situ wireless Sensors (MANTIS), Nano-RK and LiteOS [132] however there is little or no implementation of these operating systems in SDN-based management of WSNs but rather for ordinary WSNs. Table 4 compares the\u2026", "Contiki supports dynamic memory management and memory block functions but does not provide a management mechanism for memory protection between function executions [132]."]} +{"3474164|1230643": ["Multi-hop techniques based on short range radio communication such Meshlogic and ZigBee [46] have been proposed [108] for dense WSNs enabling consumption of less energy compared to direct communication.", "A network with high security features should be developed to meet these requirements however, the challenge here is the limited resource in bandwidth and energy inherent to WSNs [46,47]."]} +{"3474164|10532321": ["OpenFlow [20,21,58] is standard commonly used as a southbound interface [27] and most vendors are producing more OpenFlow capable network infrastructure.", "These rules are then used to enforce policies on the network hardware using OpenFlow [20,21,58,63]."]} +{"3474164|9494512": ["Other energy management schemes such as energy provisioning using batteries and energy harvesting have been been presented in the past years [43]."]} diff --git a/edge/graph_211058228.jsonl b/edge/graph_211058228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..161af929243e4a0628ef547ce004c21a8e348d15 --- /dev/null +++ b/edge/graph_211058228.jsonl @@ -0,0 +1,175 @@ +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"37702245|8909218": ["We assume that the interference between femtocells is negligible [14], [15] as they are transmitting much lower power [14] than MBS and separated by a larger distance to cause any significant interference."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"442109|206576720": ["Consequently, this gives rise to the consideration of 3D-MIMO [39] which might be used as a backhauling alternative in vertically densified net-"]} +{"442109|12206204": ["THE EVOLUTION of mobile devices and applications in the current decade have drawn a new picture for wireless networks [1]."]} +{"442109|12029139": ["ent scopes, specifically Heterogeneous Networks (HetNets), massive multiple-input multiple-output (massive-MIMO) networks, millimeter waves (mmWaves) networks, and energy harvesting networks [9]."]} +{"442109|1588237": ["In the frequency domain, interference mitigation is done through the use of orthogonal frequency channels, either by the static allocation of these orthogonal channels to different cells or by dynamic allocation [164]."]} +{"442109|7851743": ["Also, the transmission power of each node is small and the OAM functions are automated via self organizing network functionality (SON) [178]."]} +{"17804774|3555631": ["Under the premise of control-data separation architecure in WSDN, there will be two types of base stations, namely ontrol base stations (CBS) and data base stations (DBS) [115] ."]} +{"17804774|3330461": []} +{"17804774|7644489": []} +{"17804774|875676": []} +{"17804774|12452682": []} +{"17804774|12681089": ["This type of antenna array configuration has been proven to e inadequate [93,94] ."]} +{"52126871|206578486": ["Moreover, cloudlets use only VM for virtualization, however, both fog and MEC can use other technologies other than VMs for virtualization [32].", "However, compared to [32], our survey is different in the organization of resource sharing and research issues in F-RAN architecture.", "A more detail analysis is presented in [32] covering on the two different applications domain namely IoT and content delivery networks (CDN) as the basis of driving force to the emergence of fog computing.", "Another main difference is that cloudlet mainly focuses on mobile offloading, and MEC aims to handle the applications that are better suited in either mobile or non-mobile edge networks, however, fog computing overlaps between edge and cloud while satisfying a large number of latency-sensitive applications for resource-constraint end devices [32].", "The resource-rich computers with high computation power are placed in a strategic location with EU\u2019s vicinity [32]."]} +{"52126871|12675271": ["There are related survey papers [20], [37]\u2013[40] that", "While the aforementioned surveys [20], [37], [39], [40], [42]", "com/news/onq/2017/02/01/vr-and-ar-are-pushinglimits-connectivity-5g-our-rescue management [170] are suggested in [40] as a case study in fogenabled smart cities.", "Recently, another survey is focused on how cloud and fog computing paradigm handle the research challenges such as knowledge discovery using data analytics with limited computational resources of edge devices to build a sustainable IoT infrastructure for smart cities [40].", "potential to fulfill the diverse requirements in various applications ranging from smart cities [40], [151]\u2013[156], transportation [157]\u2013[159], surveillance (e.", "Some case studies are presented with the characteristics of fog computing in smart cities [40].", "However, algorithmic aspects are not considered in [40]."]} +{"52126871|6909107": ["Moreover, cloudlets use only VM for virtualization, however, both fog and MEC can use other technologies other than VMs for virtualization [32].", "In March 2017, the ETSI has expanded the scope of MEC and after that replaced the term \u201cMobile\u201d by \u201cMulti-access\u201d.", "This consortium was founded by ARM, Cisco, Dell, Intel, Microsoft Corp., and the Princeton University Edge Laboratory on November 19, 2015.", "Table II summarizes the basic differences between fog, cloudlets, and MEC.", "The edges of non-mobile networks are also being considered in multi-access edge computing (MEC) [36].", "Another main difference is that cloudlet mainly focuses on mobile offloading, and MEC aims to handle the applications that are better suited in either mobile or non-mobile edge networks, however, fog computing overlaps between edge and cloud while satisfying a large number of latency-sensitive applications for resource-constraint end devices [32].", "This standardization effort is driven by several leading mobile operators such as DOCOMO, Vodafone, and TELECOM Italia and manufacturers such as IBM, Nokia, Huawei, and Intel [34].", "However, as cloudlets are not an integral part of a mobile network, sometimes it becomes hard to fulfill the Quality-of-Service of the mobile devices [34].", "Fog computing is being promoted by several companies such as intelligent edge by Intel [19].", "Finally, until today, MEC works only in standalone mode while cloudlets can function in standalone and can connect to the cloud, although there is a lack of detail discussion in literature how to interact between cloud and cloudlets, fog computing needs the support of the cloud for the tasks that might not be performed in the resource-constraint fog layer.", "Note that the ETSI is the main driving force for MEC [34], [36], however, fog and cloudlets are driven by", "Note that the ETSI is the main driving force for MEC [34], [36], however, fog and cloudlets are driven by research and development, although OpenFog consortium aims at the development of fog architecture and standardization details.", "From the above discussion, it is observed that cloudlets, MEC, and fog computing focus on edge computing, however, there is a significant difference between these technologies."]} +{"52126871|8523192": ["There are related survey papers [20], [37]\u2013[40] that", "While the aforementioned surveys [20], [37], [39], [40], [42]", "[37] detailed a taxonomy of fog computing according to challenges and features of fog computing.", "2) Virtual Cluster: The EU nodes form a virtual cluster, also termed as mini-cloud [37], that corresponds to the logical boundary of these EU nodes.", "ing a local \u2018mini-cloud\u2019 [37] is one of the main research challenges."]} +{"52126871|3348390": ["In such cases, location-awareness [156], [170] and almost real-time response", "[159] discuss the requirements such as reusable, scalable, context-aware [156], [174], and high-level abstraction in applications model and programming abstractions.", "potential to fulfill the diverse requirements in various applications ranging from smart cities [40], [151]\u2013[156], transportation [157]\u2013[159], surveillance (e."]} +{"3225335|25911553": []} +{"3225335|3799929": []} +{"3225335|34643772": []} +{"3225335|7525856": []} +{"3225335|8606364": ["CRN radio resource allocation has been discussed in [59]\u2013[61], and green energy-powered CRNs have been presented in [60] and [62]."]} +{"3225335|512561": ["CRNs, especially cognitive radio sensor networks (CRSNs) [246], can greatly benefit from energy harvesting approaches [247]."]} +{"3225335|1541773": ["Energy conservation is an important research domain in wireless communications [60], [62], [250]."]} +{"3225335|8650651": []} +{"3225335|4122595": ["2) Hardware Imperfections: Hardware imperfections in CRNs [107], such as non-linear distortions, phase noise, non-ideal frequency responses of circuits, power amplifier"]} +{"3225335|11414835": ["Network virtualization allows multiple virtual networks to operate over a given single physical network [267]\u2013[270]."]} +{"3225335|1686572": ["Surveys on MAC protocols for CRNs are provided in [50] and [51], while the security, privacy, and threats of CRNs have been surveyed in [52]\u2013[58].", "However, various CRNs related threats, such as primary user emulation (PUE) attacks [56] and others, as discussed in [58], have not been analyzed for FD-CRNs."]} +{"3225335|8974063": []} +{"3225335|8909218": ["2718618 This exceptional growth has motivated the development of next generation wireless technologies, such as femtocells [2], [3],"]} +{"9465821|8909218": []} +{"21993323|8909218": ["A FC user in a building is shielded from the interference from the FBSs in different buildings, due to double penetration loss from exterior building walls [1].", "FEMTOCELLS have emerged as a cost-effective means to enhance capacity and coverage [1]."]} +{"42100362|18750590": ["for traffic offloading and resource allocation by standardized interfaces such as OpenFlow-enable switches [7], [15], which need some corresponding modifications for the requested and released information mentioned above.", "analyzed through economics theory [15]."]} +{"142532|19938676": ["They operate inside the coverage area of a macro-cell, creating a heterogeneous network (HetNet), and offer great advantages for operators and for users, allowing better coverage and higher data rates [1]\u2013[3]."]} +{"142532|206576720": ["A survey on massive MIMO, also known as large-scale MIMO, including channel modeling, applications scenarios and physical and networking techniques, was provided in [12]."]} +{"1397543|7644489": ["The proposed concept goes well beyond the current 3GPP device-to-device (D2D) proximity services, which are limited to a single hop and typically rely on assistance from the network infrastructure, and the well-known mobile ad hoc networks, which are based on multihop routing with limited network performance [13], [14].", "In this sense, the notion of the bearer graph defines capabilities beyond what is currently possible with relay control, in in-coverage and out-of-coverage modes [13]."]} +{"3924740|8909218": ["Researchers are endeavoring to develop a priority-based self-explanatory interference management scheme such that the QoS requirements of the macrocell users with higher access priority are always considered, and the network capacity is assimilated by the femtocell users so that their own performances are optimized [11], [12]."]} +{"4502294|3555631": ["System information is broadcast over the anchor cell which also manages most of the radio resource control and signalling, while the small cells play an assistant role, having data offload as a main task [48]."]} +{"6953986|8909218": ["These small cell deployments are mainly in the form of home small cells, known as femtocells [10], [11], [27], but many operators have also already started to deploy outdoor small cell solutions to complement their macrocell coverage [28]."]} +{"35076520|8909218": ["Femtocells will also provide power and battery savings due to short range transmissions [1]."]} +{"49271562|19938676": ["To this end, deploying UDN in millimeter-wave (mm-Wave) band seems to be extremely attractive [10], due to a low risk of interference (i."]} +{"49271562|12206204": ["A TTRIBUTED to the explosive development of wireless communications, the data traffic has been growing in an exponential manner [1]."]} +{"4807693|16412228": ["According to the taxonomy introduced in the survey article [16], our approach applies to cellular, homogeneous, ultra-dense networks (including dense WLAN"]} +{"4807693|7686677": ["surveyed in [14], [15], in which also a broad overview on the trade-offs between quality-of-service and EE, power-saving BS"]} +{"4807693|10096622": ["or swarming algorithms [21], [22]."]} +{"9437584|8909218": ["To enjoy an unprecedented enhancement of spectrum reuse, however, the major obstacle lies in an effective interference management among the two-tier networks [1]\u2013[3]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"21318805|31193955": ["Although mechanisms to ensure isolation are well established in multi-tenant data centers or wired network domains [10], isolation is currently one of the main open research challenges in wireless network virtualization [11].", "[10] V."]} +{"206454765|8909218": []} +{"46893184|10235514": ["One of the most challenging 5G operational models is URLLC [4], conceived for supporting tactile Internet applications [5], vehicle-to-vehicle communications [6], remote control of industrial manufacturing, and so forth.", "3 5 , 10 12 # - when i is chosen as , 10 .18 i = - which satisfies URLLC\u2019s stringent delay requirement [4], while, for the case of , D 2 ms max = the delay-outage probability can reach , 10 15 - when i is set as ."]} +{"46893184|3649200": ["This issue can be mitigated by using AI techniques [10]."]} +{"23428505|8909218": ["\u2026Increasing the spectrum efficiency of the air interface (bits per second per Hertz) modulation and channel coding Adding more spectrum bandwidth Spectrum reuse by reducing the cell size In [5], it is observed that by 2008, the wireless communication capacity had increased 1 million times from 1957."]} +{"7921587|8909218": ["layout of micro-sites [48]\u2013[51], picocells and femtocells [52]\u2013[58], and CoMP technology [59] as well as the new", "Heterogeneous Networks [44-61] Network architecture design", "A detailed description of femtocellular networks from both the technical and business aspects can be found in [58], where the challenges of implementing these networks and some potential research opportunities are also introduced.", "The energy-efficient MIMO and OFDMA schemes in multi-cell scenarios need to be further investigated. only BS site Not introduced in this paper - Service Differentiation [42,43] both BS site and Terminal site - Heterogeneous Networks [44-61] Network architecture design Relay and Cooperative Communications [62-71] both BS site and Terminal site - MIMO [72,73,75] both BS site and Terminal site - - [28,29,74,76-78] only Terminal site OFDMA [81,82,84] both BS site and Terminal site - [32,79] only BS site [80,83] existing work only considers the single cell scenarios.", "It is indicated in [58] that femtocellular networks must deal with additional timing and synchronization, as well as interference management issues, which cause more signaling overhead and potentially more energy consumption."]} +{"7921587|16629628": []} +{"507972|8909218": []} +{"7963693|2477727": ["A wide range of context-aware functionalities for mobile and wireless networking are surveyed in [81], and a classi\ufb01cation of current state-of-the-art proposals per functionality is also provided.", "The report in [81] provides a brief discussion on the key aspects of MM support for femtocells in LTE Rel."]} +{"7963693|8909218": ["The key features and a number of open issues for femtocell support are summarized in [12], while in a more recent article [1], the authors discuss the present market status, the recent advances in algorithmic design and the ongoing standardization efforts for femtocells."]} +{"17314836|7686677": []} +{"17314836|8909218": ["\u2026wireless devices communications (Machine-to-Machine; M2M), accessing different radio access technology,\nconsidering energy efficiency, supporting multiple input multiple output (MIMO) technique, and using the cognitive radio technology for spectrum reuse, although 5G is not defined clearly."]} +{"53729921|4344513": ["The hardware complexity of hybrid beamforming in terms of ADC resolution is surveyed in [63]."]} +{"53729921|8999817": ["The analog beamforming potential candidates are phase-shifters, switches, and antenna lens [21], whereas, the digital beamforming can utilize the established techniques on the effective channel to facilitate the multiple data streams.", "A CSI based classification of hybrid beamforming structures has been presented in [21].", "vided by [21], [23], and [103] and reported in the Table VI.", "This structure reduces the signaling overhead and computational complexity by providing users\u2019 grouping through analog beamforming and serving alike users in the same digital beamformer [21].", "In contrast to centimeter wave (cmWave) communication systems which make the use of large antenna arrays at either TX or RX or both to have sufficient link margin, the mmWave communication systems are much more compact and require fewer spatial degrees of freedom for parallel multi-stream transmission [21].", "The FD-MIMO uses sub-connected-like structure for the transmission of the beamformed pilots [21].", "lower-bounded by the number of transmitted data streams; while the beamforming gain and diversity order are given by the number of antenna elements [21].", "While the two previous surveys on beamforming [21], [22] focused more inclined on mmWave"]} +{"53729921|21930333": ["Reference [67] summarizes the state-of-the-art BS switch-off strategies on the basis of optimization objective and the constraints, specific BS-switching techniques, joint BS-switching and another 5G enabling strategy, and BSswitching techniques in cloud-RAN (C-RAN)/heterogeneous C-RAN in tabular forms.", "enable cellular networks to evolve to greener 5G systems [67]."]} +{"53729921|26667032": []} +{"53729921|4502294": []} +{"53729921|10979806": ["Hybrid analog and digital beamforming structures have been proposed to lower energy consumption for mmWave communications [70]."]} +{"53729921|10937383": ["systems with the name of full-dimensional MIMO (FDMIMO, 16 antenna ports) in Release 13 for seamless integration with the current 4G LTE system [32]."]} +{"53729921|8323234": ["[12] classify the hybrid beamforming on the basis of analog beamforming components.", "In mmWave massive MIMO, the high cost and power consumption of mixed analog/digital signal components per antenna makes it infeasible to perform all signal processing tasks at baseband [12], [42].", "Thus, mmWave along with massive multiple-input-multipleoutput (MIMO) communications enable an additional access to the 30 \u2212 300 GHz bands and improves SE [12], [13].", "But on the other side, the intended frequencies suffer from higher path losses [12]."]} +{"53729921|15449163": []} +{"53729921|19938676": ["Reference [58] describes 5G wireless network architectures"]} +{"53729921|206576720": ["[55] provide a survey on the state-of-the-art of massive MIMO systems.", "to [15] and [55], for general beamforming in indoor and outdoor mmWave communications we refer to [22], for hybrid beamforming categorization on the basis of instantaneous"]} +{"53729921|12206204": ["From the papers [60]\u2013[62], it is evident that in order to", "Pirinen [62] summarizes the key activities toward 5G wireless network in particular those conducted in Europe."]} +{"20758220|7686677": ["Moreover, about 80% of this energy is consumed by the Radio Access Network (RAN) [1].", "According to recent studies, around 2% of the global CO2 emissions is contributed by the Information and Communication Technology (ICT) industry [1]."]} +{"7159542|8909218": []} +{"4955858|8999817": ["Various efficient hybrid beamforming structures are discussed in [6].", "[6] A.", "On the other hand, the hybrid beamforming architecture supports a minimum number of RF chains, which helps in reaping the benefits of multiple antennas, and offers a reasonable trade-off between cost and performance [6]."]} +{"7885462|8909218": ["Moreover, another report on wireless usage reveals that more than 50% of mobile phone calls and 70% of mobile data traffic emanate from indoors [4]."]} +{"5547171|8909218": []} +{"17631216|3055684": ["Paper [24] summarizes the recent contribution in energy harvesting communications, whereas only few literatures related to energy harvesting networks are discussed."]} +{"17631216|12029139": ["Unlike the traditional battery-operated communications, the energy of ambient energy sources available to energy harvesting communication nodes is time-variant and often sporadic even though there is potentially an infinite amount of energy."]} +{"17631216|9862516": ["In fact, if the node\u2019s energy requirement is low enough [192], it is possible for IoT nodes to exclusively rely on"]} +{"17631216|2509135": ["Cognitive radio has been deemed as a key enabling technology to resolve the problem of spectrum scarcity due to the ever increasing demand for wireless services and applications [141], [142]."]} +{"17631216|12060835": ["3) Mechanical Motion/Vibration Energy Sources: Electric power can also be produced by extracting energy from mechanical motion and vibration through transduction methods, including electrostatic, piezoelectric and electromagnetic [3]\u2013 [6].", ", wind and liquid flow [3], [6], [9], [10], or partially controllable human actions, e.", "4) Electromagnetic Radiation Energy Sources: Harvesting energy from EM radiation has attracted more and more attention due to the broadcast nature of wireless communications [3]\u2013[6], [12].", "To achieve this, energy harvesting has been proposed as a viable solution that enables wireless nodes to scavenge energy physically or chemically from natural or man-made phenomena [2], [3].", "1) Solar/Light Energy Sources: One of the most popular ambient energy sources is visible sunlight/light, and it is well studied and exploited in a wide variety of applications [3]\u2013 [6]."]} +{"37752396|31756370": ["the spectrum utilization was presented in [111], which compared different methods to solve the coexistence problem, such as cross-technology sensing, interference avoidance, MIMO"]} +{"37752396|1598350": ["The purpose of IoT is to create a network, where \u201cpeople and things can be connected anytime, anyplace, with anything and anyone, ideally using any path/network and any service\u201d [23]."]} +{"37752396|25929315": ["Several schemes have been discussed in [30], [43] and [96] to avoid congestion in sending a random preamble over PRACH, such as defining new PRACH resource for MTCDs,", "The reason is that cellular networks were primarily designed to support mobile devices with a large amount of data to transmit; whereas most M2M communications are duty-cycling and delay-tolerant with small data packets between stationary terminals [43].", "tions are different from H2H communications [43], as shown in Fig."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"2912231|1588237": ["Intercell interference coordination is one form of RRM that is used to control interference by allocating users orthogonally in the time and frequency domains such that potential interference is prevented [3]."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"21391909|29060869": ["The authors in [153], distinguish their work from previous surveys", "In [153], a comprehensive survey on the smart grid-driven approaches in energy-efficient communications and data cen-", "like in smart grid in order to ensure energy efficiency and reliability [153]."]} +{"21391909|12029139": ["[12] present an extensive literature review on RF energy harvesting networks", "These include much greater spectrum allocations at untapped mmWave frequency spectrum bands [13], [22], highly directional massive beamforming antennae at both the mobile devices and BSs [18], [22], longer battery life sustained by energy harvesting techniques [12], full-duplexing communications (FDCs) [21], lower outage probability, much", "energy is predictable and relatively stable over time due to fixed distance [12].", "Authors in [12] have also discussed an RF-powered CR network whereby the RF energy harvesting capability allows secondary users to harvest and store energy from nearby trans-", "The authors in [12], also add that multi-hop RF-EHNs via cooperative relaying techniques can help to overcome fading and attenuation by using intermediate relay nodes, resulting in improved network performance in terms of efficiency and reliability.", "There are several advantages of the RF energy-harvesting techniques for the 5G RAN systems that has been identified in literature [12].", "energy within the 5G RAN systems [12], [13].", "The authors in [12], assert that one of the key concerns for RF information and energy transfer is the decay in energy transfer efficiency with the increase of transmission distance due to propagation path loss.", ", through innovative energy harvesting), will be a crucial component of the design [2], [12].", "Typically, the macrocells are served by high power base stations (MeNBs) with transmit powers close to 43 dBm and antennae gains close to 12 \u2212 15 dBi [12]."]} +{"21391909|2443013": ["(CCs) dispersed within and across different bands (intra/interband) thereby boosting the user throughput in LTE-Advanced (LTE-A) as well as the future 5G RAN systems [75].", "heavy computational burden and a huge amount of the CSI feedback [75]."]} +{"21391909|8974063": ["[108] and Tsiropoulos et al."]} +{"21391909|5338241": []} +{"21391909|7686677": ["generation wireless networks is a growing concern for operators not only for profitability maintenance but also for the overall adverse environmental effects reduction [124], [142].", "2) Dynamic Power Saving (DPS) Techniques: Several researchers have presented research trends, exposed some research issues and challenges and suggested some techniques for the green cellular networks [124], [143]."]} +{"6538096|206578365": ["Computation Task and Service Model A widely used three-parameter model (see [4] and references therein) is adopted to describe each computation task m: input data size \u03bbm \u2208 [0, \u03bbmax] (in bits) that needs to be offloaded, computation intensity \u03b3m \u2208 [0, \u03b3max] (in CPU cycles per bit) indicating how many CPU cycles are required to compute one bit input data, and completion deadline Dm.", "Related Work Mobile edge computing has received an increasing amount of attentions recently, see [4] for a comprehensive survey.", "fog computing) [3] [4] are regarded as key building blocks for the next generation mobile network."]} +{"6538096|10299098": ["A widely used three-parameter model [5] is adopted to describe each computation task: input data size, computation intensity and completion deadline.", "fog computing) [3]\u2013[5] are considered as key building blocks for the next generation 5G mobile network.", "Related Work Mobile edge computing has received an increasing amount of attentions recently, see [5] for a comprehensive survey."]} +{"11567752|2509135": ["For wireless network architectures operating with multichan-nels, it is important to set up the most appropriate network model to ensure \ufb02exible and effective use of the spectrum resources [1], [2]."]} +{"10437714|8280144": ["Furthermore, in [92], the authors showed\n9Alpha-stable distributions generalize Gaussian distributions and have heavier tails [10, Sec."]} +{"28907048|8909218": ["It is designed to operate on plug and play features and installed by the end users in an ad-hoc manner inside building such as residential, small office/home office (SOHO) [2], [6]-[8].", "The cognitive radio (CR) technology enables a FAP to perform self-organization roles such as spectrum sensing, spectrum sharing and adaptive transmission [6]-[8].", "In hybrid access mode, limited amount of resources are available to all nearby users but certain amount of resources are reserved for the subscribed users [2], [6]-[8]."]} +{"12069073|7851743": []} +{"12069073|12884178": ["Conversely, the survey in [30] provides neither an in-depth discussion nor an analysis in terms of interference mitigation, resource utilization and QoS.", "Several surveys and reviews [23], [27]\u2013[30] related to the RRM for HetNets with femtocells and RNs have been published recently."]} +{"12069073|8909218": ["\u2022 Improved QoS satisfaction: Since a femtocell typically serves a small number of mobile users, more resources can be received by each user, thus leading to better QoS [24].", "This \u201cplug and play\u201d feature enables mobile operators to save the backhaul cost as the traffic of the femtocell can be carried via subscribers\u2019 broadband communication links (such as the digital subscriber line [24], fiber optic and satellite links [36]) to the core network.", "1) Femtocells: A femtocell, also known as the Home evolved NodeB (HeNB), serves as a short-range BS with low transmission power, mainly to be deployed in indoor environments [24]."]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"38777028|19938676": ["Next generation architectures are expected to support various heterogeneous technologies and networks given in [113]."]} +{"38777028|3936425": []} +{"38777028|41035405": ["The Gaussian relay channel was introduced in [69] and [70]."]} +{"25911553|9495329": ["Bizanis and Kuipers [8] presented a survey about SDN and virtualization for Internet of Things (IoT), which covers proposals adopting these two concepts into MCN and WSNs."]} +{"25911553|37966695": ["There are a large number of solutions proposed to solve this problem in wired SDN research [39], [63], [158] such as horizontally distributed SDN controllers where multiple controllers are organized in a flat control plane (e.", "or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|207262843": ["[12] are the related surveys, which only focus on the MCN architecture, which is typically composed of Radio Access Networks (RANs), mobile backhaul networks, and the MPC network.", "Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the field of mobile and wireless networks [12]."]} +{"25911553|6583734": ["In turn, SDN serves NFV by providing programmable network connectivity between VNFs to achieve optimized traf\ufb01c engineering and steering [49]."]} +{"25911553|11414835": ["Regarding SDN, the network slicing concept has been discussed in several proposals in the context of network hypervisors [148], such as FlowVisor [149], OpenVirteX [150].", "The network slicing can also be done by using the concept of a network hypervisor [148] such as FlowVisor [149] or OpenVirteX [150] in full-SDN MPC architectures."]} +{"25911553|2535224": ["[5] mainly surveyed current efforts applying SDN and virtualization into MCN and", "[5] 2015 WLAN, MCN SDN Year, network type, network position 4"]} +{"25911553|15035771": ["It could be overcome by using multiple controllers or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|2623404": ["Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the \ufb01eld of mobile and wireless networks [12].", "Interested readers can \ufb01nd more about SDN and its applications in [37]\u2013[41]."]} +{"25911553|11735843": ["As shown in this figure, most of the related surveys [4]\u2013[9]"]} +{"20885175|8909218": ["planned cellular networks of the femtocell network operator [4], [5], which is also taken into account in [24], [25], [27].", "Furthermore, user association design in the CFN presents another major challenge [2], [4], [5].", "and user association problem in the uplink CFN [2], [4]\u2013[13], [15]\u2013[17].", "Each FBS has the quota equal to 4 N\u0302m = 4(\u2200m) [4].", "To reap the benefits of CFN deployment, some technical challenges such as interference management, efficient spectrum usage, and cell association must be addressed [4]\u2013[6]."]} +{"10307837|3555631": ["As investigated recently [158], a better way to plan for next generation 5G networks is to leverage CDSA.", "Examples of recent work that investigate this problem include [161], [158].", "One possibility to do so, as recently proposed in [158] is to exploit CDSA such that mmWave is used for DBS and HF spectrum is used for CBS."]} +{"10307837|7851743": ["While SON is a promising paradigm that improves capacity, and reduces total cost of ownership (TCO) for the network operators [21]."]} +{"5257124|8909218": ["This mode needs to avoid starving the paying home UEs [8].", "The HetNet is a new technology that can cost-efficiently improve system coverage and capacity [8]."]} +{"5257124|12060835": []} +{"12427471|206456479": ["Although SDN and NFV have been integrated to implement 5G NS, there still have many challenges in Radio Access Network (RAN) slicing, E2E management and orchestration (MANO) [10].", "In the middle layer, we expose main functional blocks of MANO for 5G UDN.", "Hence, the MANO framework need to analyze the vulnerability and robustness, and provide efficient mechanisms to improve the security and stability of 5G UDN.", "Researchers of Huawei technologies have proposed a novel NS MANO architectural framework, NESMO [13].", "However, MANO of E2E slices still have many challenges, for example, network slices should meet the requirements precisely while at the same time efficiently utilizing the underlying resources.", "Compared with the traditional MANO framework, the proposed framework has the advantages in management of massive slices and infrastructure resource domains, control of resources competition and attack prevention.", "have been integrated to implement 5G NS, there still have many challenges in Radio Access Network (RAN) slicing, E2E management and orchestration (MANO) [10]."]} +{"7329149|3348390": ["The term was \ufb01rst coined in 1998 and later de\ufb01ned as \u201cThe Internet of Things allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/ network and Any service\u201d [1]."]} +{"7329149|485843": ["Smart grid is one of the domains in which academia, industry, and governments are interested and invested significantly [72], [73]."]} +{"7329149|20905429": ["In addition to the industry IoT solutions, academic solutions in the wearable computing area are discussed in [26], [27]."]} +{"8916104|8909218": ["Femtocell technically referred to as femto access point (FAP) is a short range, low power, low cost cellular base station that operates in licensed spectrum to connect standard mobile devices to an operator\u2019s network using digital subscriber line (DSL) or wireless [6].", "Moreover, another report on wireless usage reveals that more than 50% of mobile phone calls and 70% of mobile data traffic emanate indoors [5], [6]."]} +{"3494096|3474164": []} +{"3494096|24110634": []} +{"3494096|4427557": []} +{"3494096|2871699": ["M2M communications have been extensively reviewed in the literature [1], [31]\u2013[36].", "Pereira and Aguiar [31] discussed on European Telecommunication Standard Institute (ETSI) standard and application protocols while considering mobile devices such as smartphones to be used as mobile gateways for other connected devices with constrained capabilities and the process of aggregating data from embedded sensors in M2M network architecture."]} +{"3494096|2521001": ["Smart homes are expected to communicate regularly with their environments (internal and external) [17]."]} +{"3494096|121289": []} +{"26667032|8909218": ["FBSs are typically installed impromptu in the residential domain or small office/home Office (SOHO) and provide wireless cellular access to a closed or open group of subscribers as configured by the subscriber and/or the service provider [5].", "They are seen as an alternative to traditional MBSs for increasing coverage, quality of service (QoS), capacity and energy efficiency (EE) [5], [6]."]} +{"44068413|17325804": ["[19] 2008 Wireless Survey of positioning algorithms and theoretical limits for wireless networks."]} +{"44068413|164835": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "For instance, the use of registration update messages in the IS-95A standard was proposed in [7] for time-based localization, called reverse link."]} +{"44068413|13372227": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "As an example, several survey articles [6]\u2013[10] reviewed the challenges and performance of cellular positioning in April 1998.", "way system (IVHS) applications [5] or to support emergency services based on proprietary location solutions [6], such as Grayson Wireless with a joint TDoA and AoA solution or"]} +{"44068413|206583375": ["On the one hand, fingerprinting techniques are typically implemented in WLAN systems [15], [18], [20], [26], to take advantage of"]} +{"49274573|8909218": ["In addition, the FGW works as the coordinator of FAPs and\northogonal frequency division multiple access (OFDMA) scheme is used in this paper.", "To reduce the amount of information transmitted overhead, the distance matrix is stored both in the FGW and in the local so that it can be obtained quickly and easily when it is needed in the coalition formation and subchannel allocation processes.", "Therefore, information exchange between users and the FGW through FAPs is inevitable.", "Each FAP collects the estimated distance information from users associated with it and transmits the collected distance information to the FGW, which works as the coordinator of FAPs, through a backhaul.", "In the network, each FAP is connected to the core network (CN) through an Internet Protocol (IP) backhaul and femtocell gateway (FGW) [23].", "Then, the FGW gathers these information into a distance matrix of the whole network and broadcasts it to each user through FAPs.", "The FGW, the coordinator of the network, needs to collect the throughput of each user and calculate the aggregate throughput which is used in deciding whether the net-\nAlgorithm 3: Supplementary Allocation Algorithm (SAA)."]} +{"52960035|8909218": []} +{"18392084|14028362": []} +{"18392084|8909218": ["(UE) to the cellular core network through subscribers broadband internet access [4], [11].", "provide high speed communication to end users [4].", "industrial critics see significant potential for the use of technology, so called femtocells [2], [4], [11], [19]\u2013[21].", "the cellular functionalities to the end users [2], [4], [11]."]} +{"9651858|16378550": ["Various aspects of D2D communication have been addressed in [76]."]} +{"9651858|10979806": ["For various such approaches, the state-of-the-art has been provided in [30] and [32].", "Extensive surveys for enhancing energy efficiency and driving the ICT towards green communication have been studied in [29]\u2013[32] and [34]."]} +{"9651858|19938676": ["The vision of an intensely connected network has been proposed in [33].", "A detailed survey on 5G networks has been presented in [33]."]} +{"9651858|206576720": []} +{"9651858|14765802": ["Various techniques incorporating the sleep mode in base stations have been surveyed in [45]."]} +{"9651858|12029139": ["The deployment of EH networks needminute examining of the hardware devices required [22]."]} +{"9651858|7644489": ["It plays a critical role in enhancing the energy efficiency and spectral efficiency [75] of the cellular networks."]} +{"9651858|7686677": ["ciency of wireless networks have been presented in [29].", "Extensive surveys for enhancing energy efficiency and driving the ICT towards green communication have been studied in [29]\u2013[32] and [34]."]} +{"9651858|17109970": ["niques have been studied in the literature, which are capable of optimizing the energy efficiency [13]\u2013[17], through optimal energy saving."]} +{"64428928|3330461": []} +{"16267209|8909218": ["3) Small-to-small Interference: Due to the large number of the small cells and the irregular deployment topology, the small-to-small interference mitigation schemes were preferably at SUE side or the small-cell BS side in a distributed manner [65], [10]."]} +{"44075909|21557844": ["Each of the PL models of Figure 19 were independently used in the projects presented in Table III, which has been detailed in [189]."]} +{"44075909|10235514": ["Furthermore, as shown in Figure 1, combining the three techniques would enormously increase the capacity [16], given that the technology at the new frequency band is available and can be practically implemented."]} +{"44075909|8323234": ["However, most of these disadvantages associated with the increased carrier frequency can be mitigated by sophisticated processing techniques, such as high-gain directional antenna arrays associated with narrow beams, such as beamforming (BF) techniques [7], [44]\u2013[46], in addition to diverse other classic Multiple-Input Multiple-Output (MIMO) solutions [47]\u2013[49].", "Hybrid techniques empower digitally processing multiple data streams before being transmitted by the antenna arrays employed [49], [92]."]} +{"44075909|12681089": ["At mmWave frequencies, several studies involved the ray tracing model for predicting the propagation behaviour of the channel in diverse scenarios, as in [102], [141], [150], [159], [163]\u2013[165].", "further divided into two groups: deterministic and stochastic physical models [150].", "Channel classification according to [150] showing that the stochastic channel models is considered in this review, as characterized by the \u201cModeling Method\u201d roundabout of Figure 2.", "Channel models are generally classified into two categories, which are shown in Figure 15, known as physical models and analytical models [150].", "Generally, the probability density functions (PDFs) of channel parameters are used for characterizing both the large-scale and small-scale fading components [150], [167]\u2013[169]."]} +{"44075909|13367219": ["Numerous channel models exist in the literature, such as the WINNER II [187], WINNER+ [188], 3GPP [170] and COST [207], [210] models."]} +{"44075909|15453366": []} +{"20127483|8909218": ["It is notable that in (5), intratier interference between femtocells is deemed as part of the thermal noise due to the serious relatively low power of the FAPs and wall penetration loss [2].", "2500902 and lower cost, which usually serves a registered group of subscribers, is deemed as a promising solution to meeting the ever-increasing wireless data requirement [2]."]} +{"14783766|8909218": ["One of the successful sample application scenarios is macro\u2013femto HetNet, which has drawn tremendous attentions from academia, industry, and business, and has already been included in the LTE-advanced standardization process [2]\u2013[4]."]} +{"16463095|8909218": ["Also, this new palette of low-power \u2018miniature\u2019 BSs requires little or no upfront planning and lease costs, therefore drastically reducing the Operational (OPEX) and Capital (CAPEX) Expenditures of networks [3]."]} diff --git a/edge/graph_211058538.jsonl b/edge/graph_211058538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ccde26f02fe921f0666555dac8ca7ad6f197b18 --- /dev/null +++ b/edge/graph_211058538.jsonl @@ -0,0 +1,36 @@ +{"12407555|2294541": []} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"26619090|18973396": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"26619090|3241708": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"15122954|14697846": []} +{"85518244|3932531": ["[17] in addition to the dimension of trust between the IDS nodes, refer to issues that pertain to privacy when collaborating nodes belong to different trust domains, as shared data may have sensitive information linked to individuals or organizations, e."]} +{"64681061|3205677": ["In contrast to the so called \u201ccrash recovery\u201d fault which does not impact the rest of the system, \u201cByzantine\u201d fault means that even when a node fails with an arbitrary and inconsistent behavior, it may continue interacting with the rest of the system, or collude in order to devise more malicious output [32]."]} +{"15775160|2294541": ["short-term abuse and denial-of-service [10]."]} +{"13389647|9240891": []} +{"14415885|2294541": ["In essence, the system uses the direct experience of others and a local perception of the reporting peer to compute trust [37].", "[37], the authors present a survey of attack and defense techniques for reputation systems."]} +{"14415885|1462862": ["A reputation system works by facilitating the collection, aggregation and distribution of data about an entity, that can, in turn, be used to characterize and predict [18,67,69] that entity\u2019s future", "Using the reputation information obtained from the Recommenders , the Trustor is able to make its trust decision.", "However, if there was not any previous interaction, the Trustor will then query 1..n Recommenders [72] [69] [47] [51] that may have previously interacted or observed an interaction with the Trustee for their opinions.", "[69], Koutrouli and Tsalgatidou [48], Hoffman et al.", "n Recommenders [72,69,47,51] that may have previously interacted or observed an interaction with the Trustee for their opinions."]} +{"208534353|28340539": []} +{"4872056|27262729": []} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"58005505|49313524": ["Besides several attempts of binding MAS and BCT can be enumerated [17], [29], no actual implementation of computing the agent reputation via smart contracts can be acknowledged yet.", "Finally, even combining such approaches, the abovementioned requirements cannot be met [17].", "Recent studies show that binding MAS and blockchain technologies (BCT) are gathering theoretical contributions from many fields [17].", "BCT can be the key to enhance MAS security, and some attempts at merging these two technologies have already been done [17]."]} +{"37128184|2294541": ["[10] attacker model, thus deviating from the designated honest-but-curious behavior examined here."]} +{"174802027|10283038": ["Therefore, the only kind of protection from these attacks exploiting the open and dynamic topology is to embedd trust management within the architecture [5], so as to implement a dynamic access control and being able to detect, and consequently oust, the malicious nodes despite exhibiting valid security claims."]} +{"174802027|9646739": ["Such an attack can be avoided if the number of the contacted nodes is greater then three times the number of the malicious nodes [12].", "Having more than one node allows also increasing the resiliency of the overall solution to possible attacks and to deal with Byzantine behaviors of the trust providers [12]."]} +{"13150320|14368770": []} +{"13150320|35426346": []} +{"18129749|6444031": ["The ability to prevent multiple identities from a single machine, is key in preventing a Sybil attack, this combined with the expensive cost of entrance [20] to our network, makes it unviable for all but the most powerful adversary to conduct a Sybil attack on the network."]} +{"49868160|36400013": []} +{"49868160|17934515": []} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"7014569|2457428": ["The reader is referred to [14] for a survey on key management for secure group communication."]} diff --git a/edge/graph_211058688.jsonl b/edge/graph_211058688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec02080e4661f634405383f0666ecad253b27597 --- /dev/null +++ b/edge/graph_211058688.jsonl @@ -0,0 +1,10 @@ +{"30078155|2623404": ["Recent years have witnessed a new way to conceive the dynamic provision of Network Services (NSs) thanks to the introduction of Network Function Virtualization (NFV) [1] and Software Defined Networking (SDN) [2] paradigms."]} +{"51879752|8650651": ["\u2026network control and management have become logically centralized with Software-defined Networks (SDN) and Software-defined Optical Networks (SDON, [9]), network telemetry has not benefited much due to the continued reliance on traditional data collection mechanisms by the network elements, and\u2026"]} +{"26760274|2623404": []} +{"26760274|4269723": ["Today, SDN research has led to a multitude of tools, multiple north and south bound interface controllers but lack implementation standards [17]."]} +{"67865325|52059869": ["is commonly identified as a key enabler for 5G networks since it can efficiently provide on-demand reconfiguration of the critical networking resources [6], [7]."]} +{"67865325|2623404": []} +{"67865325|10693567": []} +{"19007901|7679009": []} +{"3803334|2387055": ["Therefore, it is concerned with preserving the integrity of flow tables and flow rules [9].", "Security of controllers/orchestrators has been addressed in other studies [9,11] and is not part of this work."]} +{"3803334|32080645": ["enFlow switches [12]. Therefore, it is concerned with preserving the integrity of \ufb02ow tables and \ufb02ow rules [9]. Eavesdropping is a general threat in computer networks and it applies to the electrical [13] as well as the optical domain [14]. A natural countermeasure is encryption. In OpenFlow networks 3 TABLE I OVERVIEW OF ENCRYPTION LAYER PROPERTIES. Requirement IPsec (L3) MACsec (L2) Physical (L1) La"]} diff --git a/edge/graph_211059131.jsonl b/edge/graph_211059131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8403a062c64803462b617b0ba3c46d88221fd01 --- /dev/null +++ b/edge/graph_211059131.jsonl @@ -0,0 +1,7 @@ +{"38711918|627405": ["In addition, Brereton et al. (2007) provide field tips on reviewer training related to developing the protocol.", "Brereton et al. (2007) give examples from the field that illustrate the value of using a protocol in conducting a review."]} +{"38711918|15164501": ["\u2026on electronic sources and whether they always retrieved papers through computer searches (Alavi & Joachimsthaler, 1992; Alavi & Leidner, 2001; Cotton & Tuttle, 1986; Dub\u00e9 & Par\u00e9, 2003; Griffin et al., 1981; Joseph et al., 2007; Leidner & Kayworth, 2006; Marakas et al., 1998; Petty et al., 1984).", "\u2026criteria (Alavi & Carlson, 1992; Alavi & Joachimsthaler, 1992; Robey et al., 2008; Te\u2019eni, 2001) or in their summing up what research methodology would be included (Cotton & Tuttle, 1986; Dub\u00e9 & Par\u00e9, 2003; Griffin et al., 1981; Leidner & Kayworth, 2006; Petty et al., 1984; Pierce & Dunham, 1976)."]} +{"38711918|35897447": ["Piccoli and Ives (2005) present a shorter protocol than the other reviews but nonetheless confirm that they reviewed 117 relevant papers; however, they do not go into much detail beyond this description.", "\u2026negotiation support systems (Lim & Benbasat, 1992), interorganizational systems (Robey, Im, & Wareham, 2008), technology adoption (Venkatesh, Davis, & Morris, 2007), information technology-dependent strategic initiatives (Piccoli & Ives, 2005), and the resource-based view (Wade & Hulland, 2004).", "Piccoli and Ives (2005) first explain the three principal contributions of their framework and then organize their literature review around this framework.", "Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how they examined and coded the papers in their studies.", "Piccoli and Ives (2005) only briefly mention in the conclusion section that they reviewed abstracts for 648 papers from IS, strategic management, and the marketing literature."]} +{"49332829|5612847": ["The effect of graph displays in risk avoidance is likely due to the advantage of graphical displays in attracting and holding people\u2019s attention (Nurse et al., 2011; Smerecnik et al., 2010), and thus when risks or certain dimensions of risks are displayed in graphs, higher risks are perceived.", "The risk display format has not been examined much in the context of app selection, although it has been investigated extensively in other related contexts involving risks (Lipkus & Hollands, 1999; Nurse et al., 2011)."]} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/edge/graph_211059993.jsonl b/edge/graph_211059993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a5c72f697a1ea373538002c5dd6442138e25cf6 --- /dev/null +++ b/edge/graph_211059993.jsonl @@ -0,0 +1,4 @@ +{"4881818|15174674": ["A recent survey on control allocation methods, in general, is given in [32]."]} +{"4881818|30413921": [", [25]\u2013[29] for surface vessels, and in [30] and [31] for underwater vehicles."]} +{"145901833|57846582": []} +{"57661774|1177069": []} diff --git a/edge/graph_211060751.jsonl b/edge/graph_211060751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f09116f74270563435d30af4623a6f12e1b7be5 --- /dev/null +++ b/edge/graph_211060751.jsonl @@ -0,0 +1,10 @@ +{"29044845|207424188": []} +{"28229681|3348390": ["stantly monitor and sense the environment, allowing easier inference of a user\u2019s context [140]."]} +{"11566780|3102110": []} +{"8973749|1176034": ["[65]."]} +{"8973749|8365617": ["In this regard, most efforts have been devoted to data representation using so called segmentation algorithms[64]."]} +{"64837634|7216886": ["[28] Yang Xu, Tinghuai Ma, Meili Tang and Wei Tian.", "In 2014, Yang Xu in [28] presented a survey of PPDP includes privacy preserving model for record linkage and anonymity operations.", "[20-52] [20-52] [20-52] [20-52] * * * * 4790* 4790* 4790* 4790* Dyspepsia Flu Flu Bronchitis [54-64] [54-64] [54-64] [54-64] * * * * 4730* 4730* 4730* 4730* Flu Dyspepsia Dyspepsia Gastritis"]} +{"1443666|10500613": []} +{"206485523|10150488": ["Please refer to [276] and [277] for more details on this topic."]} +{"206485523|16403716": ["Multimedia indexing and retrieval concerns the description, storage, and organization of multimedia information to help people find multimedia resources conveniently and quickly [218]."]} +{"51973666|1230643": ["Body sensor networks (BSNs), as a special application of wireless sensor networks [1], are deployed on the surface of bodies for periodically monitoring physical conditions."]} diff --git a/edge/graph_211066551.jsonl b/edge/graph_211066551.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec3ea0583d723905de2173d9eb5d66e1d5e4c4a2 --- /dev/null +++ b/edge/graph_211066551.jsonl @@ -0,0 +1,10 @@ +{"19028036|2511280": ["A simple and popular method to address this bias is to match the distribution of covariates in the two groups in order to create a subsample that is more balanced in the covariates [Rubin, 1973a; Stuart, 2010; Hainmueller, 2012].", "Since then it has been widely studied and applied in several fields of science [Stuart, 2010; Morgan and Winship, 2014]."]} +{"35098489|2511280": ["Under the assumption of unconfoundedness, propensity score matching and weighting methods aim to balance observed covariates across different values of a treatment variable [e.g., Imbens (2004), Ho et al. (2007), Stuart (2010)].", "Under the assumption of unconfoundedness, propensity score matching and weighting methods aim to balance observed covariates across different values of a treatment variable (e.g., Imbens, 2004; Ho et al., 2007; Stuart, 2010)."]} +{"51992418|2511280": ["\u2026modeling of the assignment mechanism was largely ignored until the past decade, particularly in the context of propensity score estimation, because it was seen by many primarily as a means to an end for achieving good balance (Lee, Lessler and Stuart, 2010; Westreich, Lessler and Funk, 2010).", "Matching handpicks a comparison group for the treated by choosing only those control observations that are closest with regard to a given distance metric; comparison units that are not similar enough to the treated are dropped from the analysis (Stuart, 2010)."]} +{"88516968|2511280": []} +{"320456|393948": ["The bound we derive points the way to a family of algorithms based on the idea of representation learning (Bengio et al., 2013): Jointly learn hypotheses for both treated and control on top of a representation which minimizes a weighted sum of the factual loss (the standard supervised machine learning objective), and the IPM distance between the control and treated distributions induced by the representation.", "The bound we derive points the way to a family of algorithms based on the idea of representation learning (Bengio et al., 2013): Jointly learn a hypothesis and a representation which minimize a weighted sum of the factual loss (the standard supervised machine learning objective), and the IPM\u2026", "The bound leads naturally to a new family of representation-learning based algorithms (Bengio et al., 2013), which we show to match or outperform state-of-the-art methods on several causal effect inference tasks."]} +{"26260300|2511280": ["To address the aforementioned missing data problem, a simple yet effective strategy has been developed, which is matching [32, 33, 14, 40]."]} +{"15589829|456491": ["To that end, we construct a linear model of coregionalization (LMC) [15], which mixes two intrinsic coregionalization models as follows where k w ( x, x (cid:48) ) , w \u2208 { 0 , 1 } , is the radial basis function (RBF) with automatic relevance determination, i.e. ,w , . . . , 2 d,w ) , with d,w being\u2026", "2.2, 15].", "H K , and with a reproducing kernel K : X \u00d7 X \u2192 R 2 \u00d7 2 , where K is a (symmetric) positive semi-de\ufb01nite matrix-valued function [15].", ") , with W i acting as the \"task index\" for the i th training point [15].", "That is, we view a subject\u2019s potential outcomes as the outputs of a vector-valued function in a reproducing kernel Hilbert space (vvRKHS) [15].", "3.2, 15]) can be highly problematic: in the presence of a strong selection bias, the empirical loss for f ( ."]} +{"15589829|2511280": ["hat subject, i.e. T(x) = E h Y (1) i \u2212Y (0) i Xi = x i . (1) The central goal of this paper is to e\ufb03ciently estimate the function T(x) from an observational dataset, e.g. a retrospective cohort study [26, 34] or a hospital\u2019s electronic health record [15]. Since our primary motivation for addressing the problem above comes from its medical application, it is important to associate our estimate of T(x) with", "ng Neural Networks (BNN) with the BNN-2-2 con\ufb01guration (i.e. 2 output layers and 2 representation layers) [15]. We also compare our method with a standard matching approach, k-nearest neighbor (k-NN) [26], and classical direct modeling approaches that \ufb01t separate regression models for the two potential outcomes using Random Forests (RF) [17] and Gaussian Processes (GP) [19]. 3.3 Evaluation Methodology"]} +{"203641780|53280687": []} +{"8558103|393948": ["Deep neural networks have been shown to successfully learn good representations of high-dimensional data in many tasks (Bengio et al., 2013).", "Second, we derive new families of representation algorithms for counterfactual inference: one is based on linear models and variable selection, and the other is based on deep learning of representations (Bengio et al., 2013)."]} diff --git a/edge/graph_211066631.jsonl b/edge/graph_211066631.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e87e134007076eb1db3e7c5a40816e5e4701766 --- /dev/null +++ b/edge/graph_211066631.jsonl @@ -0,0 +1,6 @@ +{"199509370|49867601": ["On the other hand, the authors in [14] investigated different components of a self-sovereign identity using existing non-academic literature."]} +{"56895323|49527603": ["In [19], a brief summary of the emerging blockchain-based applications ranging from"]} +{"56895323|9461213": ["fields [221], [222], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secure Multi-Party Computation (MPC)."]} +{"56895323|27262729": ["A systematic survey is conducted in [20] with respect to the security in the Bitcoin network including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", "vacy [20] and quantitative analysis of smart contract performance [217].", ", Sybil attacks [41] and doublespending attacks [20]), node mistakes (e."]} +{"56895323|2457428": ["the security is a main concern. Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]. In [182], the authors present a framework for providing secure key management in VCSs, where the security managers are considered as blockchain miners which capture the vehicle departure information"]} +{"56895323|3434731": ["trusted virtual computers [6] for decentralized, transactiondriven resource management in communication networks and distributed autonomous systems [5], [7].", "In [7] and [16], two brief surveys on consensus protocols in blockchain networks are provided."]} diff --git a/edge/graph_21106824.jsonl b/edge/graph_21106824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d818395e59942cdfa786f43840847964df31ade7 --- /dev/null +++ b/edge/graph_21106824.jsonl @@ -0,0 +1,5 @@ +{"14641341|192934": ["Thus, the very complex patterns can be described by a small number of primitives and grammatical rules [2][4].", "This paradigm has been used in situations where the patterns have a definite structure which can be captured in terms of a set of rules [2].", "Also it does not work efficiently in the presence of distorted patterns [1][2].", "Artificial Neural network models attempt to use some organizational principles such as learning, generalization, adaptivity, fault tolerance and distributed representation, and computation in the network of weighted directed graphs in which the artificial neurons forms the nodes of the model and the directed edges (with weights) are connections between neuron outputs and neuron inputs[2][4]."]} +{"10497517|15916359": ["In a recent study, a comparison between a number of classification algorithms for the purpose of predicting the presence of heart disease is presented [13].", "Thus, ML algorithms can be very beneficial in exploring hidden patterns in medical data sets and can be utilized for clinical diagnosis [13]."]} +{"61905815|586521": []} +{"61905815|13088291": []} +{"61905815|5781914": []} diff --git a/edge/graph_211068761.jsonl b/edge/graph_211068761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03c9f08b0fd69090d571003b3ecbbecd3cea45b4 --- /dev/null +++ b/edge/graph_211068761.jsonl @@ -0,0 +1,2 @@ +{"19956421|40596005": ["Many significant technical difficulties inspired by aesthetic requirements, such as enhancing realistic impressions and simplifying interactive manipulations, induce rapidly expanding researches [1], [2]."]} +{"15044843|7788290": ["In the future, AGES could be integrated, through multimodal fusion technology [29], with the algorithms from other biometric research, such as speaker recognition [6] and gait recognition [9], for multi-cue age estimation."]} diff --git a/edge/graph_211069666.jsonl b/edge/graph_211069666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82ba48771f706388734c9501cf54171dca4981a4 --- /dev/null +++ b/edge/graph_211069666.jsonl @@ -0,0 +1,18 @@ +{"52113920|3273340": ["The main drawback of this approach is that it can introduce overhead, especially within convolutional layers, within which data need to be rearranged into Toeplitz matrices prior to computation [62]\u2013[64]."]} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"13662098|207591052": ["DNNs have recently used to model program source code [90] for various software engineering tasks (see also Section VI-C), but so far there is little work of applying DNNs to compiler optimisation."]} +{"202786778|3766791": []} +{"29160233|14843594": ["Bayesian optimization methods [34, 33, 35, 17] use acquisition functions other than the mean when an uncertainty estimate of f\u0302 is available.", "This problem formalization is similar to that of traditional hyper-parameter optimization problems [34, 33, 35, 13, 17, 25] but with several key differentiating characteristics: Relatively Low Experiment Cost."]} +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"202125179|3766791": ["TF\u2019s representation captures many state-of-the-art models, provides support for heterogeneous hardware back-ends, and enables reverse-mode automatic differentiation [4, 1].", "%while_loop(meta[Constant][3], meta[Constant][4], meta[Constant][5])"]} +{"67877144|3766791": ["We implement a variant of tracing-based reverse-mode automatic differentiation (Baydin et al., 2018), with a few changes to better support partially staged computation."]} +{"203593417|3273340": ["The increasing processing demand of learningmodels [4, 5] has naturally pushed most of the computation to the cloud [6]."]} +{"44014988|12161567": ["Large scale embeddings [55] are used as a portable encoding."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"11527748|8533795": ["Answering to complex queries by combining simple queries is the way various learning models, such as Principal Component Analysis and k-means, can be made differentially private (see the surveys by [26] and [27])."]} +{"40910013|3908141": []} diff --git a/edge/graph_211075794.jsonl b/edge/graph_211075794.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a9b630bd76ad936efee8e9662c4212e470bcc61 --- /dev/null +++ b/edge/graph_211075794.jsonl @@ -0,0 +1,14 @@ +{"849747|3330313": []} +{"51887805|7774517": []} +{"6096711|18654252": []} +{"6096711|3330313": ["Recent surveys include the ones from Hodge and Jim [18] and Chandola et al.", "Recent surveys include the ones from Hodge and Jim [18] and Chandola et al. [88].", "For a detailed coverage of the same, the reader is referred to books and survey papers [16, 17, 18, 19].", "A lot of research has been done in the context of anomaly detection in various domains such as, but not limited to, statistics, signal processing, finance, econometrics, manufacturing, and networking [16, 17, 18, 19].", "[18] Victoria J. Hodge and Jim Austin."]} +{"14266119|3330313": []} +{"3346652|12260867": ["From this stand\u00adpoint, and provided that \nrandom access is prohibitively expensive [Guha et al. 2003], performing linear scans of the data is the \nonly acceptable access method in terms of computational ef.ciency.", "Extracting potentially useful knowledge \nfrom data streams is a challenge per se."]} +{"207172599|3330313": []} +{"30444761|13093354": ["Most of these are surveys describing available methods and some domains of applications [13, 14]."]} +{"659263|3330313": []} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"559398|3330313": ["Automated Load Curve Data Cleansing in\nPower Systems\nby\nJiyi Chen\nB.Sc. Peking University, China, 2008"]} +{"16199748|7774517": ["Outlier detection has attracted much attention in the field of WSNs , and in recent years many outlier detection techniques specifically developed for WSNs have emerged ( Zhang et al ."]} +{"16199748|6275330": ["A recent development in data acquisition concerns the use of wireless sensors, consisting of nodes that measure environmental variables such as temperature, humidity, sound, pressure, light, vibration or motion (Arampatzis et al. 2005)."]} diff --git a/edge/graph_211076154.jsonl b/edge/graph_211076154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55d08c1c3f97b516a14354de350d4d7955635fc7 --- /dev/null +++ b/edge/graph_211076154.jsonl @@ -0,0 +1,22 @@ +{"53013137|206459491": ["More than a decade of research in this field has produced a number of approaches to detect Trojans [1], [2].", "Such method can equally be applicable for detecting hardware Trojans in PCBs.\nReverse engineering attack is associated with various threats such as IP piracy, cloning, counterfeiting and hardware Trojan insertion.", "Test approaches based on functional testing and side channel fingerprinting have been widely proposed to detecting hardware Trojans at post-silicon stage [25]\u2013[28] .", "For this technique, decapsulating, delayering and imaging are required to detect hardware Trojans [4].", "In addition, using side channel signal analysis using transient and quiescent power, delay, and electromagnetic (EM) have been widely proposed for trust verification against Trojans [1], [2].", "To date, relatively little research has been performed on the use of computer vision and machine learning methods for reverse engineering or to detect hardware Trojans.", "The authors assumed that reverse engineering can provide such golden chip [1].", "Functionality or side-channel information of IUA are compared with a golden IC to detect hardware Trojans.", "These inserted circuits or modifications cannot be easily detected because of stealthy nature of Trojans."]} +{"195222024|206459491": ["This has raised concerns over supply chain threats like intellectual property (IP) piracy, counterfeit ICs, low grade or defective ICs, and insertion of hardware Trojans [3].", "There has been extensive research on detecting hardware Trojans using run-time monitoring [18] and logic test approaches [3], [19]\u2013[23]."]} +{"28314987|206459491": ["The former method depends on making use of reverse engineering process to destroy the IC under test in order to detect any injected Trojans, whereas the latter can be further divided into design-time, run-time and test-time approaches [21]."]} +{"13461913|8540351": []} +{"5713606|206459491": ["I. INTRODUCTION\nAn emerging security concern with integrated circuit (IC) involves its malicious modification during fabrication [1] in untrusted foundry."]} +{"12855543|206459491": ["A detailed taxonomy for tampering a device by hardware Trojans can be found in [68]."]} +{"11927107|206459491": ["The alignment process is based on Iterative Closest Point (ICP) algorithm [15]."]} +{"10921969|206459491": ["The literature provides several taxonomies, see for instance [6], [7], [8]."]} +{"13194395|8540351": []} +{"3461016|8540351": ["AVI approaches are mainly divided into three different methods: referential, non-referential and hybrid methods [3]."]} +{"18038175|206459491": []} +{"58027821|29756857": ["[5] Every step in the physical lab is connected to tools and costs, the knowledge of their impact and dependencies on the final results is helpful to weigh the effort for reverse engineering."]} +{"59336908|206051485": ["First, the raw golden IC and IUA SEM images need to be aligned by using image registration [39] and secondly the image needs to be enhanced for better feature detection."]} +{"59336908|206459491": ["\u2026Nidish Vashistha nidish@ufl.edu Extended author information available on the last page of the article. has opened up an avenue to various kinds of threats in ICs including hardware Trojan insertion, overproduction, IP piracy, and out-of-specification/defective ICs appearing in the market [28].", "There has been extensive research on detecting hardware Trojans using run-time monitoring [19] and logic test approaches [7, 15, 21, 25, 28, 33]."]} +{"102350085|29756857": ["One of the most underestimated challenges is the lack of quantification of human effort in fully reverse engineering ICs [14]."]} +{"102350085|206459491": ["Recent development inHT detection has focused on non-invasive methodologies because of ease and scalability [30, 34]."]} +{"42480837|206459491": ["The former method depends on making use of reverse engineering (RE) process to destroy the IC under test in order to detect any injected Trojans, whereas the latter can be further divided into side-channel analysis, conduction behavior and logic [21]."]} +{"5249939|206459491": ["Abstract Integrated circuits (ICs) are now designed and fabricated \nin a globalized multi-vendor environment making them vulnerable to malicious design changes, the insertion \nof hardware trojans/malware and intellectual property (IP) theft."]} +{"15278557|206459491": []} +{"170900|206459491": []} +{"9649818|206459491": ["The alignment process is based on the iterative closest point algorithm [18]."]} +{"166321665|206459491": []} diff --git a/edge/graph_211082794.jsonl b/edge/graph_211082794.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211086128.jsonl b/edge/graph_211086128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4942606ee744d097c0e15fae8bd20b1b9d6fa6c2 --- /dev/null +++ b/edge/graph_211086128.jsonl @@ -0,0 +1,10 @@ +{"7965194|10290908": ["Lewicki [2] provides a thorough review of most of these spike detection methods."]} +{"18538341|10290908": []} +{"35178611|10290908": ["In order to reduce the data size, on-chip preprocessing before telemetry circuits becomes a necessary and critical step [1]."]} +{"4347367|9270553": []} +{"17441198|10290908": ["In this respect automatic spike-sorting algorithms are needed for studying large neuronal populations, because they minimize the user's interaction and allow a fast analysis of large numbers of channel"]} +{"11954843|10290908": ["Overlapping spikes further reduce the efficacy of simple threshold detectors [10].", "Although simple thresholding is attractive for realtime implementations because of its computational simplicity, it is thought to be sensitive to noise and often requires user input to set effective threshold levels [10]."]} +{"2931626|10290908": []} +{"35546735|10290908": ["signal processing digital backend will be essential in creating a relatively natural neuroprosthesis [1], [2]."]} +{"9048865|10290908": ["Indeed, it is worth mentioning that the best performance arises when complete waveshape representations are available [62,63]."]} +{"44897745|14866098": []} diff --git a/edge/graph_211094582.jsonl b/edge/graph_211094582.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cc31c42b45800b6598de8c1243250885bfc4eeb --- /dev/null +++ b/edge/graph_211094582.jsonl @@ -0,0 +1,22 @@ +{"67816488|6809492": []} +{"73487522|270804": ["As a result, there are a variety of protocols for the MAC [13\u201315], routing [16,17], and transport [18] layers developed to overcome the different issues present in WSN communications, such as energy-efficiency, latency, scalability, throughput or quality of service (QoS)."]} +{"73487522|1236072": ["As a result, there are a variety of protocols for the MAC [13\u201315], routing [16,17], and transport [18] layers developed to overcome the different issues present in WSN communications, such as energy-efficiency, latency, scalability, throughput or quality of service (QoS)."]} +{"5253541|6275330": ["A variety of applications are developed with WSNs for environmental observation, structural health monitoring, human health monitoring, inventory tracking, home/office automation and military surveillance [1, 2]."]} +{"59126261|9377669": ["Open Source Network simulators are of different types viz NS2, NS3, OMNET++, JSIM, OPNET, QualNet, MATLAB, etc.", "With the help of MATLAB, one can\n Develop Algorithms for Digital Signal Processing.", "OMNET++ (Objective Modular Network Testbed in C++) OMNET++ [3, 6-9, 11-14, 16-20] is a general purpose, extensible, modular, componentbased, open architecture discrete event based network simulator.", "Comparative Study of Various Network Simulators Table 1 shows the comparative study of the different open source simulators (NS2, NS3, J-Sim, OMNeT++, OPNET, QUALNET and MATLAB)[3, 6, 7, 9, 10, 15-17, 19, 21-23].", "All these open source network simulators (NS2, NS3, J-Sim, OMNeT++, OPNET, QUALNET and MATLAB) are useful for academic as well as industries point of view, as it helps students and researchers for doing research.", "JSIM (Java-Based Simulation) JSIM [3, 6, 7, 10-14, 16-19] as the name suggest, it is a Java based simulation system which is used for analysis and building of quantitative numeric models with respect to the reference data of experiments.", "Table 1 shows the comparative study of the different open source simulators (NS2, NS3, J-Sim, OMNeT++, OPNET, QUALNET and MATLAB)[3, 6, 7, 9, 10, 15-17, 19, 21-23].", "QUALNET [3, 7, 10, 14, 16-20] simulator is a commercial ad-hoc network simulator which has been developed by Scalable Network Technologies and is based on GloMoSim protocol.", "QUALNET QUALNET [3, 7, 10, 14, 16-20] simulator is a commercial ad-hoc network simulator which has been developed by Scalable Network Technologies and is based on GloMoSim protocol.", "Keywords: Open-Source Technology, Network Simulation, Open Source Network simulators, NS2, NS3, J-Sim, OMNeT++, OPNET, QUALNET and MATLAB", "NS2 (Network Simulator Version2) Network Simulator [3, 6, 7, 11-20] is also known as discrete event simulator that can support simulation of TCP, multicast protocols and routing over wireless and wired networks.", "MATLAB [3, 24] stands for mathematical laboratory which has been founded in 1984 by the Math Works and it provides an interactive software environment for programming.", "OPNET (Optimized Network Engineering Tools) OPNET [3, 10, 13, 14, 16-20] is a discrete event network simulator written in C++ and proposed in 1986 by MIT.", "No FEATURES\nSIMULATORS\nNS2 NS3 J-Sim OMNET\n++ OPNET QUALN ET\nMATLAB\n1 Applicability Network/ System Network/ System\nNetwork Network/ System Network/ System Network/ System\nSystem\n2 Interface or Language\nused\nC++/OT cl\nParsec (Cbased) Java\nC++/NE D\nC or C++\nParsec (Cbased) C++\n3 Availability\nTradition al\nmodel/ Wireless support/ Ad-hoc support/ Advance Wireless Sensor Network Support Tradition al model/W ireless support/ Ad-hoc Support\nTraditional model/Wireles\ns support/ Ad-hoc\nsupport/Advan ce Wireless\nSensor Network Support\nTradition al model/W ireless support/ Ad-hoc Support\nTradition al model/W ireless support/ Ad-hoc support/ Wireless Sensor Network Support\nTradition al model/W ireless support/ Ad-hoc support/ Advance Wireless Sensor Network Support Data Acquisition Toolbox, Instrument Control Toolbox, Image Acquisition Toolbox\n4 Mobility Support Support Support No Support Support Support\n5 Graphical Support\nNo or very limited Visual\nAid\nLimited Visual\nAid\nGood Visualization and debug\nfacility\nGood Visualiz\nation and\nexcellent debug facility\nExcellen t graphica l support, Excellen t facility\nfor debug\nGood graphica\nl support, Excellen\nt for debug\nExcellent graphical support, Excellent facility for\ndebug\n6 License Open Source Open Source Open Source\nFree for Academi\nc and educatio\nn use\nFree for Academi\nc and educatio\nn use\nCommer cial Commercial\n7 Scalability Small Large Small Large Medium Very Large\nVery Large\n8 Documentati on & User\nSupport\nExcellen t Excellen t\nPoor Good Excellen\nt Good Excellent\n9 Extendibility Excellen t Excellen t Excellent\nExcellen t Excellen t Excellen t\nExcellent\n10 Emulation Limited Limited Yes Limited Not\nDirect Yes Yes"]} +{"58404112|12060835": ["Although in some application it is possible to directly power the sensor node using the harvested energy, with no energy storage (harvest-use architecture [117]), in general this is not a viable solution."]} +{"12101476|8296351": ["Finally, Section 6 concludes the paper."]} +{"2713324|17683338": ["Because of these design trade-offs, TinyOS and Contiki are thus lacking several key developerfriendly features: standard C and C++ programability, standard multi-threading, and real-time support (see Table I).", "The programming models in Contiki and TinyOS are based on the event driven model, in a way that all tasks are executed\n978-1-4673-5946-7/13/$31.00 \u00a92013 IEEE\n3569\nwithin the same context, although they offer partial multithreading support.", "Contiki uses a subset of the C programing language, where some keywords cannot be used, while TinyOS is written in a C dialect called nesC.", "The scheduling in Contiki is purely event driven, similar to that in TinyOS, where a FIFO strategy is used.", "The dominant WSN OS, Contiki and TinyOS [3], follow an event driven design, which is useful for typical WSN scenarios, but exhibit drawbacks for efficient and functional networking implementations."]} +{"52121943|512561": ["the cognitive radio can only use the frequency band with their cognitive ability [248], [249]."]} +{"52121943|6556803": ["[30] reviewed the localization methods to address data transfer, topology formulation, power optimization, resource optimization, sensing coverage, object discovery and security challenges."]} +{"52121943|6939676": ["[24] have evaluated localization strategies as"]} +{"52121943|11732290": ["imaging [240], Computer Aided Tomography (CAT) [242], 3D Magnetic Resonance Imaging (MRI) [241], 3D X-ray [239] and hybrid RF [243]."]} +{"52121943|6396569": ["Mobile WSNs are analyzed and classified by Amundson and Koutsoukos [13]."]} +{"52121943|1230643": ["\u2018Things\u2019 refers to device or sensors that sense physical world signals and records it in digital forms [1]."]} +{"52121943|34657644": ["As discussed, the majority of survey is only based on either range-based and range-free [11], [19], [25], [29] or Centralized", "[25] have studied localization approaches based on different range measurement techniques."]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"10359599|1230643": []} +{"10359599|2835258": []} +{"10359599|14441987": []} diff --git a/edge/graph_211096719.jsonl b/edge/graph_211096719.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e1492eff24f401379213ff1df258442693a8095 --- /dev/null +++ b/edge/graph_211096719.jsonl @@ -0,0 +1 @@ +{"115367837|562855": ["As an active research direction of MAS, multi-agent coalition technique has been widely studied [17], [18]."]} diff --git a/edge/graph_211097971.jsonl b/edge/graph_211097971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b65312b41c2906c142176cd8be0b0c22fa191d04 --- /dev/null +++ b/edge/graph_211097971.jsonl @@ -0,0 +1,26 @@ +{"69690141|17205659": []} +{"49724635|15895606": ["The security issues of insulin pump in the context of cybersecurity systems were shown in [17]."]} +{"49724635|21386749": ["The authors of [4] presented all healthcare IoT trends, solutions, platforms, services and applications."]} +{"195697968|9107060": ["Reactive adaptive defense uses cyber epidemic dynamics model to enhance the resilience of cyber systems against attacks [12], [13]."]} +{"10876304|2829149": ["DoS cause network non availability and creates problems in the accessibility of data to the end users by interfering of the third party intruders which causes prevention of information and can be take place at the different layers of network [22][37]."]} +{"10876304|206584087": [", & Tipper, D [53]"]} +{"10876304|2357830": ["Sensor Networks can also be used with RFID to trace an object [15].", "The threat goes bigger in terms of inventorying when the personal data is also attached with the tag [15]."]} +{"10876304|17205659": ["Other significant security requirements that are mentioned in [26] are patching capabilities [27], intrusion lockout and input validation, Mobility, Wireless, Un-traceability, Embedded Use, Diversity and Scale [5]."]} +{"59526541|2521001": ["This attack is an attack on the privacy of the Smart Home [14].", "There are two types of attacks under this class:\n\u25aa Eavesdropping Attack: It is possible for an attacker to unlawfully monitor home user traffic, such as email messages, Internet surfing details, and telephone conversations, by the Smart Home (internal network) and by a third party without alarming its legitimate communicating parties.", "Security is a key concern within the Smart Home ecosystem."]} +{"30863156|15199849": ["A malicious node can also be used by the attacker to inject false data into the system or prevent delivery of true messages [46].", "process, send, or redirect packets [44], [46]."]} +{"30863156|2415608": [", the tag will not be able to transmit any further information after receiving this command [58].", "Note that although the anonymous ID emitted by an RFID tag has no intrinsic valuable information, it can still enable tracking as long as the ID is fixed over time [58].", "These protocols can be used in authenticating tags, but can be broken by a powerful adversary [58]."]} +{"30863156|2357830": []} +{"30863156|206459491": ["have been proposed in the last decade [24], [91], [92].", "PUFs enable unique device identification and authentication [103], [105], and offer Trojan detection mechanisms [24].", "Hardware Trojan is a malicious modification of an integrated circuit (IC), which enables the attacker to use the circuit or to exploit its functionality to obtain access to data or software running on the integrated circuits [24].", "Trojans are generally divided into two categories based on their triggering mechanisms [23], [24]: (i) externally-activated Trojans, which can be triggered by an antenna or a sensor that can interact with the outside world, and (ii) internally-activated Trojans that are activated after a certain condition is met inside the integrated circuit, e.", "Trojan detection: Side-channel signals, including timing [24], [82], [83], power [84]\u2013[86], and spatial temperature [84], [87] can be used for Trojan detection."]} +{"199509120|55729907": ["The explosion of interest and research in recent years has inspired a lot of progress in the field, but the general field is still nascent [80], [85]."]} +{"199509120|21386749": ["Advances in technology have led to a new paradigm called the Internet of Things [1], [2]."]} +{"199509120|6332923": ["For example, [3] summarizes the American Health Insurance Portability and Accountability Act (HIPAA), which has the following requirements: 1) provide protection against any infringements of security, confidentiality, and integrity, if they occur, 2) provide protection against unauthorized access to or usage of patient health information, 3) establish systems that require user identities (i.", "Smart devices use secure Internet Protocols (IPs) to transfer complex data [3]."]} +{"201069400|31245252": ["Authorization rules are used to guarantee data privacy which is an important security principle since many devices, services, and people are sharing the same communication network in IoT [8]."]} +{"19806874|21386749": [", 2012), and (Islam et al., 2015) ) less research challenge over context-aware has been developed.", "According to, (Viswanathan et al., 2012), and (Islam et al., 2015) ) less research challenge over context-aware has been developed.", "A features component, security requirements based (Islam et al., 2015) are described as following:\n\u2022 Confidentiality: has to ensure the inaccessibility of medical information for unauthorized users.", "From the literature (Al-Fuqaha et al., 2015), (Islam et al., 2015) we can distinguish that a general architecture IoT can basically consist of three layers, perception layer, network layer, and application layer.", "Now, according to (Islam et al., 2015) and (AlFuqaha et al., 2015), Internet of Things (IoT) is expected to be a potential alternative to cope with this\nserve.", ", 2015), (Islam et al., 2015) we can distinguish that a general architecture IoT can basically consist of three layers, perception layer, network layer, and application layer.", "A features component, security requirements based (Islam et al., 2015) are described as following:", "Now, according to (Islam et al., 2015) and (AlFuqaha et al."]} +{"5080167|15895606": [", neglecting security-by-design), increased connectivity, and heterogeneity [23]."]} +{"5080167|207209718": ["There has been considerable research activity on attack detection for CPS [28]."]} +{"51982227|1520906": []} +{"51982227|6779551": ["The physical layer encryption exploits the features of the physical wireless channel for its security by communications, signal processing, and coding techniques [29].", "1) Physical Wireless InSecurity: The broadcast nature of wireless communications makes the physical channel extremely vulnerable to classic data transit attacks [29]."]} +{"27633917|28209458": []} +{"27633917|21386749": ["Due to the above-mentioned advantages, the IoT is currently playing a vital role in transforming the healthcare industry [17, 47]."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} diff --git a/edge/graph_211107413.jsonl b/edge/graph_211107413.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211112123.jsonl b/edge/graph_211112123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dbafa415f736e29c94e22814c649e0186aca47e --- /dev/null +++ b/edge/graph_211112123.jsonl @@ -0,0 +1,23 @@ +{"184483761|52305483": []} +{"202689953|18440098": ["Therefore, sign language recognition (SLR), whose ultimate goal is to translate the sign language into speech or text, can bridge communication barriers between the hearing and the non-hearing people [1]."]} +{"73505740|46924129": ["The only difference is in the convolution operation, which is called as the 1D convolution operation, and is known to be suitable for input data in one dimension, such as biomedical signals [37].", "There has been a notable increase in the use of deep learning approaches for the evaluation of biomedical signals (EEG, ECG, EMG, and EOG) [37]."]} +{"58637020|21656238": []} +{"195757966|207017399": ["More speci\ufb01cally, deep neural networks use unsupervised learning to adjust the weights between hidden layers, enabling the network to identify the best internal features of the inputs [93]."]} +{"165130850|46924129": []} +{"165130850|55316842": []} +{"52273649|3680335": []} +{"53440599|46924129": ["\u2026regulation of emotion is a difficult concept, arousal and valence recognition studies have been undertaken to provide an understanding of affective experiences using physiological signals, such as such as electrocardiography (ECG), photoplethysmography (PPG), and electroencephalography (EEG) [3-5]."]} +{"201057401|211112123": []} +{"201057401|46924129": ["There are many applications of deep learning in biomedical image and signal processing studies [31-37]."]} +{"201057401|55316842": ["The deep learning performs the automatic feature learning [28-30] and it mimics the structure of the human brain."]} +{"52349839|55316842": []} +{"52349839|393948": []} +{"111390110|9270553": []} +{"199388042|203698614": ["Furthermore, estimate shows that 30% of the world storage was occupied by medical images in 2011 and will progressively increase in subsequent years [2,7].", "and signals creating the concept of big data [1-4]."]} +{"111390350|7102404": ["In a review on adaptation in affective video games, Bontchev [16] concludes that SFS is the most used feature selection technique and that LDA is widely employed for classifying emotions in small datasets, considering the Power Spectral Density values of the EEG frequencies.", "Other common physiological responses indicating emotional changes are electromyography (EMG) that records the electrical activity of the muscles, respiration rate and body temperature [16]."]} +{"198980924|15562587": ["Deep learning algorithms are designed for the task of exploiting compositional structure in data [15]."]} +{"198132454|46924129": ["These developments have encouraged the use of deep learning approaches in numerous fields, including physiological signal analysis [21] and stress recognition [5,12,15]."]} +{"164994692|46924129": []} +{"164994692|393948": []} +{"73490348|17485266": []} +{"73456881|6387482": ["proaches can be divided into feature-level fusion and decisionlevel fusion [40]."]} diff --git a/edge/graph_211118757.jsonl b/edge/graph_211118757.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06b700af5d395e1eb0afc107657eba1337552f1a --- /dev/null +++ b/edge/graph_211118757.jsonl @@ -0,0 +1,10 @@ +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"86588961|3630870": []} +{"208210952|3555631": ["The fundamentals, advantages, and general structure of CUPS were presented in [4]."]} +{"7703219|16335158": ["In the CC, MCC and Sensor-cloud architecture, a physical datacentre unit is in charge of performing the data computation and storage (Hossain, 2013), (Dinh, Lee, 2011)."]} +{"7703219|16654832": ["However, the mobile devices suffer from computing resources limitations, battery restriction and processing time (Shiraz et al., 2012)."]} +{"20500104|763939": ["Harri, Filali and Bonnet [ 21 ] provide a taxonomy and a detailed summary of existing mobility and network simulator projects."]} +{"2509135|12452682": []} +{"198315050|6909107": ["As a result, this can further reduce the delay and ensure high bandwidth connection in the computation offloading process [16]."]} +{"35205982|17594297": ["[121] provide detailed background discussion on IBC and give an overview of IBC applications in mobile ad-hoc networks."]} +{"36400013|10137283": ["Trust can be defined as a subjective belief of a peer about other peers belonging to the same society or geographical zone [9]."]} diff --git a/edge/graph_211119607.jsonl b/edge/graph_211119607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..880c5786ea2b6068e31b44b181d3479e39f46ae9 --- /dev/null +++ b/edge/graph_211119607.jsonl @@ -0,0 +1,22 @@ +{"7108693|206764452": ["Other laboratories in Spain are also working on the topic with important contributions, such as the works presented by Universitat Aut\u00f2noma de Barcelona [7,8] and Universidad de Alcal\u00e1 de Henares [9,10]."]} +{"16946859|206764452": ["For instance, in the last years, three significant surveys in pedestrian detection and protection systems, in the context of Intelligent Vehicles (IV) and Intelligent Transportation Systems (ITS), were published in [4], [5], [6]."]} +{"16946859|1029120": ["A key problem in monocular image-based pedestrian detection, in the field of ADAS applications [4], [5], is the huge amount of negatives (potential false alarms) in contrast with the number of positives, what demands a vast processing time consumption and a high confidence detector.", "Pedestrian protection systems can be divided, in general words, in two fields of research: passive and active safety systems [5].", "For instance, in the last years, three significant surveys in pedestrian detection and protection systems, in the context of Intelligent Vehicles (IV) and Intelligent Transportation Systems (ITS), were published in [4], [5], [6]."]} +{"9560913|15093118": []} +{"9560913|8212226": []} +{"16040122|15093118": ["When designing tracking solutions, one of the most important choices to be made is the choice of the object model, the state to be estimated over time.", "The most challenging objects of the driving environment are the dynamic ones, and for this reason a considerable amount of research has been dedicated to the modeling and tracking of these entities [1], [4]."]} +{"52073117|1314237": ["Among many works: [9, 65, 66, 67, 68, 69,70,71]."]} +{"115843016|6198785": []} +{"115843016|15093118": []} +{"117529|206764452": ["need for new methods in order to tackle more complex cases such as pedestrians not visible from the vehicles [4], [5], i.", "[4] highlight that the number of false alarms is still too high in the current sensor based pedestrian detection systems to allow their deployment in commercial vehicles and propose to explore multi-class classification, 3D sensing, multi-model training as well as pedestrian tracking to improve their reliability.", "On the other hand, video cameras are natural sensors to recognize VRUs surrounding a vehicle both in illuminated scenes [4], [16]\u2013[18] and night conditions [19], [20], but are weak to estimate precisely the relative position of a detected obstacle."]} +{"117529|1029120": ["In 2007, Gandhi and Trivedi [3] proposed a large review of perception based systems for protection of VRUs.", "Relying on embedded sensors data has been a first solution at very close range and low speed [3] to ensure the safety of VRUs who are visible from the vehicles, i.", "2) Classification: Classification with the perception system is done by comparing models of road obstacles to features extracted from the sensors data [3]."]} +{"15441533|2113024": ["From this observation, many method s to detect human beings were developed in computer vision based on monocular or stereoscopic images [3] [4]."]} +{"49325841|6779551": []} +{"42188370|15093118": []} +{"11111480|206764452": ["Email: cpremebida@isr.uc.pt\nobtained by LIDARs or stereovision as discussed by Geronimo et al. (2010).", "\u2026in the fields of Intelligent Transportation Systems (ITS) and Intelligent Vehicles (IV), as evidenced by the significant amount of work carried out in these areas, see for instance the recent surveys of Geronimo et al. (2010), Faouzi et al. (2011), Stiller et al. (2011) and Dollar et al. (2012)."]} +{"11111480|1029120": ["The latter, which is the focus of this work, can be divided, in general terms, into two fields of research: passive and active systems, as mentioned by Gandhi and Trivedi (2007).", "Onboard sensor-based pedestrian detection systems (Gandhi and Trivedi, 2007), in the domain of ADAS applications, is a research topic which has received considerable attention, as evidenced by the work of Felzenszwalb et al. (2010), Markoff (2010), Navarro-Serment et al. (2010), Spinello et al.\u2026"]} +{"14785767|206764452": ["Since an exhaustive survey of pedestrian detection is beyond the scope of this paper, interested readers are referred to some general surveys, such as [2], [9], [10] and the references therein, for an excellent review of pedestrian detection frameworks and benchmark datasets."]} +{"64757622|7482876": []} +{"116421704|15093118": ["\u2026and most of the works were primarily focused on improving detection range and accuracy, as well as reducing computational cost (Premebida et al., 2007; Premebida et al., 2009; Ismail et al., 2009; Sivaraman and Trivedi, 2013; Ai and Tsai, 2016; Chavez-Garcia and Aycard, 2016; Du et al., 2017)."]} +{"10805930|15093118": ["There have been lots of solutions proposed in the ITS fields, including the enhanced satellite signal processing [3], road map assistance [4], and the multisensor integrated solutions with inertial sensors [5], vision sensors [6], radars [7], laser range finder [8] and the in-vehicle sensors [9], etc."]} +{"54462554|51922975": ["According to the trends of cooperative intelligent transportation systems (C-ITS) [1] and connected vehicles [8] many solutions are being developed at present."]} +{"54462554|1029120": ["Many VRU protection systems based on perception of different sensors have been developed and actually supplied in markets [2]."]} diff --git a/edge/graph_211120802.jsonl b/edge/graph_211120802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7788ac7f7244df5f215cce8280e11a13382289c3 --- /dev/null +++ b/edge/graph_211120802.jsonl @@ -0,0 +1,7 @@ +{"199579764|205286988": []} +{"49651458|10096622": ["PSO has been widely applied in function optimization, neural network training, mode classification, fuzzy system control and other engineering fields [31]\u2013[36]."]} +{"205286236|8008208": []} +{"205286236|16866891": ["Their differences, apart from their behaviour inspiration, lie in the way the search space is explored and exploited by the \u201cagents\u201d [89]."]} +{"205286236|4474193": ["The field of dynamic optimization is closely related with EAs, known as evolutionary dynamic optimization (EDO) [12].", "However, it does not mean that a high level of diversity will lead to better performance [12, 55].", "EDO has received extensive attention with several surveys [13, 12, 14, 15] and books [16, 17, 18, 19, 20], whereas SI dynamic optimization (SIDO) has not received much attention, with exception of some very brief reviews of PSO in [14] and ACO in [15] included as subsections in the EDO surveys.", "Hence, DOPs are more challenging to address than stationary optimization problems since repeated optimization of the changing optimum is required [12].", "The \ufb01eld of dynamic optimization is closely related with EAs, known as evolutionary dynamic optimization (EDO) [12]."]} +{"206682327|4474193": []} +{"206682327|8113021": ["Elaborations on some of the applications cited above are available in [71] and [78]."]} diff --git a/edge/graph_211123234.jsonl b/edge/graph_211123234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5944be397d53b42758542b5a3cba7b121489434 --- /dev/null +++ b/edge/graph_211123234.jsonl @@ -0,0 +1,4 @@ +{"8640449|14745481": ["Trust as a social concept can be de\ufb01ned as the degree of subjective belief about the behaviour of a particular entity [5].", "Collusion attack in providing false recommendation is not considered by this work, and this may cause incorrect evaluation of the received recommendations [5].", "An interesting direction of trust research in MANETs is to utilise social relationships in evaluating trust among nodes in a group setting by employing the concept of social structures [5]."]} +{"8640449|2294541": []} +{"31174357|1762301": []} +{"25029410|9395674": []} diff --git a/edge/graph_211126822.jsonl b/edge/graph_211126822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebc8095782985f09843bd22a95707539bb3117f6 --- /dev/null +++ b/edge/graph_211126822.jsonl @@ -0,0 +1,36 @@ +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"3815098|1078272": []} +{"202565715|12724190": ["(b) Chains Ct considering 25 Kinect joints: [2, 21, 3, 4, 3, 21, 5, 6, 7, 8, 22, 23, 22, 8, 7, 6, 5, 21, 9, 10, 11, 12, 24, 25, 24, 12, 11, 10, 9, 21, 2, 1, 13, 14, 15, 16, 15, 14, 13, 1, 17, 18, 19, 20, 19, 18, 17, 1, 2], as defined in [18].", "These approaches have the advantage of being computationally efficient due to smaller data size and being robust to illumination changes, background noise and invariance to camera views [1]."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"413488|41505326": ["With the advent of depth sensors, such as Microsoft Kinect, Asus Xtion, and Intel RealSense, action recognition using 3D skeleton sequences has attracted a lot of research attention, and lots of advanced approaches have been proposed [33, 14, 1, 72]."]} +{"413488|12724190": ["With the advent of depth sensors, such as Microsoft Kinect, Asus Xtion, and Intel RealSense, action recognition using 3D skeleton sequences has attracted a lot of research attention, and lots of advanced approaches have been proposed [33, 14, 1, 72]."]} +{"152282878|13787722": ["Readers are referred to these survey papers [31], [32], [33], [34], [35], [36] for a more extensive list of the current 3D activity analysis datasets and methods.", "Since the samples of certain categories may be dif\ufb01cult to collect [32], one-shot visual recognition becomes an important research branch in computer vision."]} +{"152282878|41505326": ["Readers are referred to these survey papers [31], [32], [33], [34], [35], [36] for a more extensive list of the current 3D activity analysis datasets and methods.", "It is worth mentioning that there are more than 40 datasets for 3D human action recognition [31]."]} +{"152282878|12724190": ["Readers are referred to these survey papers [31], [32], [33], [34], [35], [36] for a more extensive list of the current 3D activity analysis datasets and methods."]} +{"152282878|1262156": ["Readers are referred to these survey papers [31], [32], [33], [34], [35], [36] for a more extensive list of the current 3D activity analysis datasets and methods."]} +{"7832844|17516538": ["There are three conventional approaches commonly used for foreground detection [17], [18]: (1) background subtraction; (2)temporal differencing; (3)optical flow."]} +{"49671086|12724190": []} +{"198985864|12724190": ["2Chain C considering 25 Kinect joints: [2, 21, 3, 4, 3, 21, 5, 6, 7, 8, 22, 23, 22, 8, 7, 6, 5, 21, 9, 10, 11, 12, 24, 25, 24, 12, 11, 10, 9, 21, 2, 1, 13, 14, 15, 16, 15, 14, 13, 1, 17, 18, 19, 20, 19, 18, 17, 1, 2], as defined in [34].", "Moreover, skeleton data are robust to illumination changes, robust to background noise and invariant to camera views [6]."]} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"2654595|12724190": []} +{"5057838|12724190": []} +{"67856333|13787722": ["The RGB video based action recognition methods [24, 34, 27, 35] mainly focus on modeling spatial and temporal representations from RGB frames and temporal optical flow."]} +{"15928602|4351505": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|41505326": ["It is worth mentioning, there are more than 40 datasets speci\ufb01cally for 3D human action recognition [47].", "For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|12724190": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|1262156": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"51927857|13787722": []} +{"51927857|41505326": ["Readers are referred to [53]\u2013 [55] for a comprehensive survey."]} +{"3482198|393948": ["Please refer to [22, 5] for a more detailed review."]} +{"3482198|3241708": []} +{"3482198|1634674": ["Most of the approaches surveyed in these works adopted hand-crafted features coupled with typical machine learning pipelines for action recognition and event detection [1, 88, 61, 35]."]} +{"2697895|12358655": ["Therefore, there is a vast literature, including interesting surveys [13 \u2013 19], on human body pose estimation [20 \u2013 24] and activity/action classi \ufb01 cation [25 \u2013 30]."]} +{"2697895|14970359": ["Other systems make use of one or multiple LEDs with software to identify them by their relative positions [13].", "Therefore, there is a vast literature, including interesting surveys [13 \u2013 19], on human body pose estimation [20 \u2013 24] and activity/action classi \ufb01 cation [25 \u2013 30]."]} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"198179694|14970359": ["Adjacent indices but not locally correlated joints: [9, 10], [11, 12], [13, 14], etc.", "Nowadays, with the fast advancement of deep learning, skeleton acquisition is not limited to use motion capture systems [10] and depth cameras [11]."]} diff --git a/edge/graph_211128781.jsonl b/edge/graph_211128781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea394b7845d250849c562c5b904bd529e935f570 --- /dev/null +++ b/edge/graph_211128781.jsonl @@ -0,0 +1,43 @@ +{"18173541|15222577": ["The authors of [1], [3] list several examples such as a", "One interesting aspect of [24], [25], [1], [22], [26] is that", "1 The extraction of a sentiment can be made either on a whole document (document-level SA), on each paragraph (paragraph-level SA), or on each sentence (sentence-level SA) [1]."]} +{"51918752|15222577": []} +{"3845601|15222577": ["A good starting survey on this particular subject is found in [4]."]} +{"3778916|15847221": []} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} +{"7142671|15222577": []} +{"2788865|15222577": ["Surveys of[7, 8, 9] give very good summaries."]} +{"158424818|11894197": []} +{"168823262|15222577": []} +{"20559168|16768404": ["For details regarding the works, we refer the interested reader to the surveys by [3] and [14].", "The analysis of the SA litterature [1][2][3][4]shows that Machine Learning techniques lead to good results in general.", "While different combinations of features are used, using n-gram features, seems to generally lead to good performances[1] [2][3]."]} +{"20559168|15222577": []} +{"17123958|15222577": ["[15] study exhibits different methods used to"]} +{"64697648|15222577": []} +{"6626683|15222577": ["Another reason is that Arabic is one of the fastest-growing languages on the web [108].", "This is where the research area of SA plays a major role in capturing and analysing the subjective content from text produced by the general public on social media [108]."]} +{"13207782|15222577": []} +{"11741285|207079655": ["Graph-based methods Graph-based learning has been focused by researchers in the last decade (Wang et al. 2015b; Lu 2015) and has been confirmed to be effective for many NLP tasks (Xing et al. 2018).", "2015b; Lu 2015) and has been confirmed to be effective for many NLP tasks (Xing et al. 2018)."]} +{"11741285|205488310": ["Some literature reviews and books on opinion mining and sentiment analysis techniques and methods have also been represented before, which have investigated the problem from different points of views (Bouadjenek et al. 2016; Liu 2015)."]} +{"11741285|16768404": ["Several recent surveys and reviews on sentiment analysis consider these levels of opinion mining from this point of view (Medhat et al. 2014; Ravi and Ravi 2015; Balazs and Velasquez 2016; Yan et al. 2017; Sun et al. 2017; Lo et al. 2017)."]} +{"16703447|16768404": []} +{"16703447|15222577": ["These researches have been the object of some surveys (Korayem et al., 2012) (Al-Twairesh et al., 2014)."]} +{"18346340|15222577": ["Arabic language is the official language of 22 countries; it is spoken by more than 300 million people, and is the fastestgrowing language on the web (with an annual growth rate of 2501 % in the number of Internet users) [2]."]} +{"13411596|15222577": ["A good starting survey on this particular subject is found in [4]."]} +{"15718491|15222577": ["That is, it could give low accuracy when is applied on such a different domain from what it was learned from [4].", "This new technology results in a massive amount of raw data for which creative data mining techniques are needed in order to extract valuable knowledge."]} +{"6814857|16768404": ["\u008cus, Arabic language remains among the less studied and underresourced languages in the domain of sentiment analysis [27] [8]."]} +{"6814857|54934748": ["Among several tasks related to de\u0080ned proprieties of an opinion expression such as opinion holder identi\u0080cation, opinion target identi\u0080cation, opinion Summarization, we \u0080nd subjectivity and polarity classi\u0080cation which are considered as a core task [21], [29], [13]."]} +{"35900027|15222577": []} +{"19948701|586521": ["The goal of classification is to accurately predict the target class for each case in the data [8]."]} +{"17020965|16768404": ["[23] survey the different techniques used for subjectivity and sentiment analysis for Arabic."]} +{"9409562|75696": []} +{"9409562|15222577": []} +{"18208941|18484924": ["One operator of particular interest to our study is the Optimize Parameter, which is able to find the optimal values of the selected parameter.", "No capitalization makes Arabic more challenging [12]."]} +{"18208941|15222577": ["One operator of particular interest to our study is the Optimize Parameter, which is able to find the optimal values of the selected parameter."]} +{"52182665|16768404": ["At this stage, features are engineered, i.e., applying feature extraction (Medhat et al. 2014), and feature selection (Liu 2012), for building classification models."]} +{"52182665|15222577": ["Many of the supervised learning approaches report that SVM outperformed other classification models for TSA (Korayem et al. 2012), including RM (2014), who compared SVM with decision tree, kNN, and NB; Rushdi-Saleh et al. (2011), who trained NB and SVM; and Shoukry (2013), reporting that SVM has\u2026"]} +{"3687636|15222577": ["Various methods for subjectivity and sentiment analysis for Arabic language has plotted in [9]"]} +{"19125959|16768404": ["We refer interested readers to two recent and comprehensive surveys on the sentiment analysis process and its related tasks, algorithms and applications in [2], [8]."]} +{"26062127|15222577": ["A good starting survey on this particular subject is found in [4]."]} +{"15751548|54934748": ["On the other hand, Khan, Baharudin, Baharum, Khan, Ullah [20] reported that the problem of domain dependency and a pre-knowledge base remains unsolved."]} +{"53093144|15847221": ["Kharde, V., Sonawane, P., et al. (2016).", "Some studies tackled this problem like Pursa[21] and Kharde[15]."]} +{"37492873|18484924": []} +{"194528725|65219850": ["Unlike data mining, where the work is to track meaningful knowledge from structured data, in sentiment analysis it is subject to find structured knowledge from unstructured amounts of data [10]."]} diff --git a/edge/graph_211129042.jsonl b/edge/graph_211129042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10358dd9bd38be2233b3852f5507d6ae58ba1bf5 --- /dev/null +++ b/edge/graph_211129042.jsonl @@ -0,0 +1,16 @@ +{"49671507|8533795": ["\u2019s data alone. Differentially private approaches to machine learning work in a similar way: models lacking data relating to a particular individual function extremely similarly to those containing it [45]. This provides intrinsic protection against a great deal of model inversion attacks. Theoretically, such learning algorithms are just as powerful as non-differentially private ones [46]. Since algori"]} +{"49671507|17675973": ["5% of global power consumption [34], as well as time and labour costs."]} +{"51682040|3342225": [", [15,50,68], also see [32] for a survey on explaining black box models."]} +{"51682040|15986963": [", based utilizing a set of (class) association rules [5, 49, 53, 81] can be applied for obtaining interpretable models for explicative data mining."]} +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} +{"52965836|3342225": ["[63] reviewed methods for explaining black-box models at a large scale including data mining as well as machine learning."]} +{"52965836|17779926": ["One effort to gain insight into highly complex models is the use of rule extraction [114]\u2013[116]."]} +{"115715107|11608263": ["Ideas, how to apply those for more than two groups, can be borrowed from multi-class classi\ufb01cation (Bishop 2006), the multi-label classi\ufb01cation (Tsoumakas and Katakis 2007), and one-class classi\ufb01cation (Tax 2001) literature.", "Ideas, how to apply those for more than two groups, can be borrowed from multi-class classification (Bishop 2006), the multi-label classification (Tsoumakas and Katakis 2007), and one-class classification (Tax 2001) literature."]} +{"51607811|7681233": ["The individuals then form a network of trust based on techniques from the reputation modelling literature [Yu et al. , 2010; Yu et al. , 2013] to achieve collective self-governance through dynamic interactions."]} +{"4562004|4110304": ["Our previous paper [39] provides a comprehensive survey of recent studies in exploring visual interpretability of neural networks, including 1) the visualization and diagnosis of CNN representations, 2) approaches for disentangling CNN representations into graphs or trees, 3) the learning of CNNs with disentangled and interpretable representations, and 4) middle-to-end learning based on model interpretability."]} +{"52846040|3342225": ["In their comprehensive survey on black box explanation methods, Guidotti et al. distinguish between four different explanation problems [ Guidotti et al. , 2018 ] : model explanation aims at model-wise explanation and outcome explanation aims at prediction-wise explanation (analogous to Du et al.).", "For a more comprehensive survey on explainability and transparency, we refer to [ Guidotti et al. , 2018; Du et al. , 2018 ] ."]} +{"1320907|8372620": ["\u2026did not introduce or reuse any discrimination measures, since measuring potential discrimination by algorithms is a subject of scienti\ufb01c discussion (see e.g., a broad review by Romei and Ruggieri (2014), or a recent survey by Zliobaite (2015) for a discussion of various existing measures)."]} +{"41668540|53531807": ["To this end, we utilize Kullback-Leibler divergence (KLD). is technique has been used in Bayesian optimal experiment design (BOED) [24] to select the optimal design of experiment so that the expected utility of the experiment outcome can be maximized.", "Di erent from the general case in BOED, we focus on the utility of a given sample instead of the expected utility.", "\u008cis technique has been used in Bayesian optimal experiment design (BOED) [24] to select the optimal design of experiment so that the expected utility of the experiment outcome can be maximized."]} +{"41668540|2701596": []} +{"1171836|1805048": ["Recommender systems have attracted a lot of research attention and have been deployed in a wide range of applications [23, 1]."]} +{"2014883|8372620": ["There has been much recent interest in designing algorithms that make fair predictions [4, 6, 9, 10, 12, 14\u201317, 19, 21, 30\u201333]."]} diff --git a/edge/graph_211130367.jsonl b/edge/graph_211130367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d4162d6fabab60de1dbafe5924eebfafed1e7ac --- /dev/null +++ b/edge/graph_211130367.jsonl @@ -0,0 +1 @@ +{"450200|393825": ["It does not occur in solution or in physiological states [1]."]} diff --git a/edge/graph_211132689.jsonl b/edge/graph_211132689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a3d44783d1f52d3e5602fb5e3edbee204a9f46e --- /dev/null +++ b/edge/graph_211132689.jsonl @@ -0,0 +1,4 @@ +{"279533|14171067": ["See Bille (2005) for a review."]} +{"16725676|14171067": ["Tree Edit Distance (TED) have been studied extensively in theoretical and algorithmic research (Klein, 1989; Zhang and Shasha, 1989; Bille, 2005)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"14644892|14171067": ["Following Bille (2005), we de\ufb01ne an edit script be-tween trees T 1 , T 2 as the edit sequence transforming T 1 to T 2 according to a cost function , with the total summed cost known as the tree edit distance ."]} diff --git a/edge/graph_211132750.jsonl b/edge/graph_211132750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35ca6dd0c5eba86290121de0529abec8776c3cf5 --- /dev/null +++ b/edge/graph_211132750.jsonl @@ -0,0 +1,18 @@ +{"12445460|619938": ["For a survey of text line extraction methods for historical documents, we refer to [11]."]} +{"3759588|12562564": ["These include global properties, such as the amount of black background speckle, image sharpness, and uniformity, as well as local properties of the text, such as stroke thickness and continuity, and character/word height to width ratio [10]."]} +{"31605658|16082889": []} +{"16475655|619938": ["I n [9], a survey of text line extraction methods is presented."]} +{"16475655|15782139": []} +{"15465562|14415030": ["Manual evaluation of segmentation methods is time consuming and lacks precision [4]."]} +{"40587859|8953108": []} +{"9608446|15782139": []} +{"8888639|619938": ["For a more exhaustive comparison of layout analysis algorithms, we refer the reader to recent surveys and contests [16] [17] [18] [19]."]} +{"2442996|619938": ["Traditional TLAD approaches which are popular nowadays include methods based on Vertical Projection Profiles (VPP) [4] and on the Hough Transform [7].", "Several TLAD methodologies exist for both modern and historical handwritten documents [4]\u2013[6]."]} +{"29339181|8953108": ["\u2022 Binarization is the process that converts a given input greyscale or color document image into a bi-level representation [17]."]} +{"3772349|619938": ["of historical handwri\u2212en documents, many researchers in the last years have focused on solving sub-problems, including word spo\u2212ing [19, 20], handwriting classi\u2022cation [5], and text line segmentation [17]. Crowdsourcing solution for cultural heritage has been experienced in many projects. One of the pioneering initiative to crowdsource the transcription of manuscripts is the Transcribe Bentham project"]} +{"26484429|27527196": ["For HMM, four typical system parameters are optimized with respect to the word accuracy on the validation set, namely the number of states, the number of Gaussian mixtures, the grammar scale factor, and the word insertion penalty.", "Automatic transcription is performed with both HMM and RNN (see Section III) based on the same sequence of geometric features.", "The handwriting recognition module [22] transcribes the text line images into machine-readable text based on a sequence of geometric features using traditional hidden Markov models (HMM) [23] as well as recently introduced recurrent neural networks (RNN) termed bidirectional long short-term memory neural networks (BLSTM) [24].", "For automatic transcription, well-known methods include hidden Markov models (HMM) that are able to recognize text images without prior segmentation into characters.", "For example, Edwards et al. [12] have suggested generalized HMM for the recognition of Latin manuscripts based on character templates.", "An HMM word recognizer has been used by Toselli et al. [14] for the interactive transcription of old Spanish manuscripts.", "Used software toolkits include HTK 5 for HMM, an earlier version of RNNLIB [28] for RNN, and SRILM 6 for language modeling.", "The HMM and RNN character appearance models can be learned for arbitrary scripts.", "Howe et al. [13] propose HMM in conjunction with so-called alphabet soup to detect vocabulary words as well as out-of-vocabulary words."]} +{"26484429|619938": ["A comprehensive survey on text line segmentation methods is provided by Likforman-Sulem et al. in [2]."]} +{"18753441|2886931": ["[12], [26], and [13] show good and reasonable applications for on-line applications.", "Most of the Indian languages are phonetic in nature and are derived from Ancient Brahmi \n[13].", "Most of the Indian languages are phonetic in nature and are derived from Ancient Brahmi [13].", "India is a multi linguistic country having twenty two scheduled languages [13], [41]."]} +{"18753441|6746689": ["Two space domain techniques are thinning and thresholding which reduces the storage requirements and increases the speed of processing by converting the color and gray scale images into the binary images [43],[16]."]} +{"11148545|15782139": []} +{"18094322|619938": []} diff --git a/edge/graph_211132805.jsonl b/edge/graph_211132805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ee0d7846273d8b638d52dfa05bb3703dd916479 --- /dev/null +++ b/edge/graph_211132805.jsonl @@ -0,0 +1,9 @@ +{"203605371|3654323": []} +{"198898096|4903005": ["Secondly, there is an empirical comparison of domain adaptation methods for genomic sequence analysis [27] and thirdly, a survey paper on, amongst others, transfer learning in biomedical imaging [28]."]} +{"198898096|3654323": ["We refer to [24], [25], [26] for extensive reviews.", "articles covering visual domain adaptation [24], [25], with a third one specializing in deep learning [26]."]} +{"198898096|24936482": ["For extensive overviews of these topics, see [70], [71]."]} +{"198898096|393948": ["one formulation will extract meaningful information by pushing the input through a bottleneck (contractive autoencoders) while another adds artificial noise to the input which the network has to remove (denoising autoencoders) [152]."]} +{"198898096|12204996": ["For some problem settings, the goal is to generalize from one model organism to another [62], such as from nematodes to fruit flies [27]."]} +{"3654323|10092092": []} +{"3654323|2899523": [" sharply decreases in higher layers. Therefore, recent work has addressed this problem by deep DA, which combines deep learning and DA. There have been other surveys on TL and DA over the pastfewyears[67, 80,14,68, 109, 13]. Panetal. [67]categorizedTL underthreesubsettings,includinginductiveTL, transductiveTL,andunsupervisedTL,buttheyonlystudied homogeneous feature spaces. Shao et al. [80] categorized TL techniques into", "forth. In this section, we present different application examples using various visual deep DA methods. Because the information of commonly used datasets for evaluating the performance is provided in [109] in detail, we do not introduceit in this paper. 6.1. Image Classi\ufb01cation Because image classi\ufb01cation is a basic task of computervisionapplications,mostof the algorithmsmentioned above were originally", "e transfer. The surveywritten byPatel [68] onlyfocusedon DA, a subtopicof TL. [14] discussed 38 methods for heterogeneous TL that operate under various settings, requirements, and domains. Zhangetal. [109] werethe\ufb01rst to summarizeseveraltransferring criteria in detail from the concept level. These \ufb01ve surveys mentioned above only cover the methodologies on shallow TL or DA. The work presented by Csurka"]} +{"3654323|7559976": ["In one-step DA, the deep approaches can be summarized into three cases, which refers to [23] .", "[23] briefly analyzed the state-of-the-art shallow DA methods and categorized the deep DA methods into three subsettings based on training loss: classification loss, discrepancy loss and adver-", "hose from the survey papers by [18,23] to maintain consistency cross surveys."]} diff --git a/edge/graph_211137367.jsonl b/edge/graph_211137367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211146401.jsonl b/edge/graph_211146401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13fd0e61d2c156e294de9b68474d50e5bfb75c27 --- /dev/null +++ b/edge/graph_211146401.jsonl @@ -0,0 +1,4 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"102350916|3342225": ["However, neural networks, particularly deep learning architectures have been criticized for their lack of interpretability [Guidotti et al., 2018]."]} +{"2009318|9340653": []} +{"59606205|3342225": ["Interestingly, attention could provide a key to interpret and explain, at least to some extent, neural network behaviour (Guidotti, Monreale, Ruggieri, Turini, Giannotti, & Pedreschi, 2018)."]} diff --git a/edge/graph_211146665.jsonl b/edge/graph_211146665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85a87bf56bd7d4a43e08dfaeb7bb960b9ff2bffb --- /dev/null +++ b/edge/graph_211146665.jsonl @@ -0,0 +1,10 @@ +{"70027481|8652282": []} +{"70027481|1230643": []} +{"201620011|58587365": []} +{"201620011|9171235": ["There are various de\ufb01nitions given for network lifetime by researchers [50,51]."]} +{"201620011|15300368": []} +{"203605495|8652282": ["Actually, previous studies prove that the consumption of the energy is major consumed in the data transmission, and the transmission performance depends largely on the routing strategy [4].", "In the first order radio model, to operate the transmitter or receiver circuit, the radio consumption is Eelec, to achieve acceptable signal-to-noise ratio, the transmitting amplifier is \u03b5amp and the propagation loss index is \u03b3 , where \u03b3 \u2208 [2, 4] [37]."]} +{"67857442|206901977": ["This fact is due to sensors are usually powered by batteries, whose replacement is often difficult, involving a cost and a loss of performance [6]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"7914547|9830350": ["[7] X.", "Most sensor nodes are meant for specific applications, and each application has requirements, and this is the main objectives in the design of wireless sensor networks, which is wholly or partially an important element in the design of the network [6] and [7]:"]} +{"83459368|205286988": ["WSNs are widely used in various applications like border security, monitoring patients in the hospitals and smart traffic control (Akkaya and Younis 2005).", "This may lead to isolation of the sink from the rest of the network (Akkaya and Younis 2005; Kumar and Kumar 2018)."]} diff --git a/edge/graph_211146667.jsonl b/edge/graph_211146667.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cfec2ad9fbf544b0ae0370caee1fc338a7aae6b --- /dev/null +++ b/edge/graph_211146667.jsonl @@ -0,0 +1,9 @@ +{"39914994|14171067": []} +{"168956|14171067": ["Edit distance has attracted most of the interest in the context of metric learning for structured data because (i) it is defined for a variety of objects: sequences (Levenshtein, 1966), trees (Bille, 2005) and graphs (Gao et al."]} +{"14721076|10500613": []} +{"207372751|1805048": ["tering 2 framework [30]. 2 Collaborative \ufb01ltering is the process of \ufb01ltering for information or patterns using techniques involving collaboration among multiple agents, viewpoints, data sources, etc. [29] 5 Node similarity can be de\ufb01ned by using the essential attributes of nodes: two nodes are considered to be similar if they have many common features [31]. However, the attributes of nodes are general"]} +{"14223048|14171067": []} +{"593561|10500613": []} +{"14106275|14545307": []} +{"11336685|14171067": ["The similarity of labeled trees is compared in [61] by various methods, in which de\ufb01nitions of cost functions are given ahead."]} +{"198894|38476": ["Some restricted forms of level 3 behaviors can be reduced to level 2 behaviors by using techniques such as sliding windows [11], but in general this is not always possible.", ", Ot\u2212(k\u22121) (which corresponds to the typical \u201csliding window\u201d approach [11]).", "Thus, the form of supervised learning that is more related to LfO is that of sequential learning [11]."]} diff --git a/edge/graph_211146669.jsonl b/edge/graph_211146669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2412276a1011f56db38541694499e8f64ee06c98 --- /dev/null +++ b/edge/graph_211146669.jsonl @@ -0,0 +1 @@ +{"8559923|14122909": ["Secondly, typical factors in ultrasound, including signal dropout, speckle noise, acoustic shadow and low contrast against surrounding tissues, cause the ambiguity, poor visibility and long-span occlusion in prostate boundaries (Noble and Boukerroui 2006)."]} diff --git a/edge/graph_211171556.jsonl b/edge/graph_211171556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5cb75496f334896e84460a65eddd4438bb755627 --- /dev/null +++ b/edge/graph_211171556.jsonl @@ -0,0 +1,6 @@ +{"46947382|17403085": []} +{"114284502|3348390": ["It allows devices communication with each other with minimum human intervention [12]."]} +{"5308509|34621298": []} +{"53141267|33286487": []} +{"16619149|34621298": []} +{"17977694|18841702": ["Gorjian et al. (2009b) presented a review of the existing literature on commonly used degradation models in reliability analysis.", "Gorjian et al. (2009a) presented a state-of-the-art review of the existing literature on covariate-based models in reliability modeling .", "(2006), Heng et al. (2009), Pecht (2008), Gorjian et al."]} diff --git a/edge/graph_211171639.jsonl b/edge/graph_211171639.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9db529faa1917cdcb024460cbc393d3081f109b2 --- /dev/null +++ b/edge/graph_211171639.jsonl @@ -0,0 +1,2 @@ +{"3330979|14261802": ["RELATED WORK Adaptation and personalization have long been established as effective techniques to support individual users in a variety of tasks and applications, including personalized search [27], adaptive hypermedia [27], desktop assistance [19], as well as e-learning [19]."]} +{"17308324|14261802": ["\u2026as effective techniques to support individual users in a variety of tasks and applications, including personalized search and adaptive hypermedia [Steichen et al. 2012], and desktop assistance traditionally maintained a , one-size-\ufb01ts-all approach by ignoring an individual user\u2019s needs,\u2026"]} diff --git a/edge/graph_211171854.jsonl b/edge/graph_211171854.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a8330e9b364aaab3a578fe9788884bd64eef14d --- /dev/null +++ b/edge/graph_211171854.jsonl @@ -0,0 +1,7 @@ +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"1033682|174797842": []} +{"54465161|2616070": ["This idea is related to classical level set [10, 14, 50] approaches to multi-view 3D reconstruction [18,24,32,40,53,78]."]} +{"58007025|393948": ["representation learning techniques aim at automatically discovering a set of features that compactly but expressively describe data. For a more extensive review of the \ufb01eld, we refer to Bengio et al. [4]. Generative Adversial Networks. GANs [21] and their variants [13, 41] learn deep embeddings of target data by training discriminators adversarially against generators. Applications of this class of n"]} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"209501181|102352525": []} +{"14106275|14545307": []} diff --git a/edge/graph_211205131.jsonl b/edge/graph_211205131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a6fc77d107f717775564f309f6b18d025f3ab71f --- /dev/null +++ b/edge/graph_211205131.jsonl @@ -0,0 +1,79 @@ +{"30212945|61132": ["The UAVs can be integrated also into communication systems [2] for provisioning of wireless connectivity in sparsely populated areas, or where building entirely new mobile network infrastructure is complicated or commercially ineffective (e."]} +{"8018915|9828770": []} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"53726738|21557844": ["The use of the mmWave spectrum, however, is challenging because it is sensitive to blockage and requires the LoS propagation between the transmitter and the receiver [79]."]} +{"53726738|61132": ["Furthermore, in military applications, such as reconnaissance, surveillance, attack, and patrol, the usage of the single-UAV networks is almost thirty years old [6].", "\u2026node may trigger the recon\ufb01guration of the whole UAV network [46]. b) Decentralized self-organization: Under the decentralized self-organization model, each entity makes self-decisions and takes actions according to nearby/local information, i.e., the direct interaction with neighbor UAV nodes [6].", "Depending on applications, the speed of a UAV may be in the range of 0-460 km/h [6], [13].", "For more information on transmission mechanisms of UAV networks, please refer to [6], [13] and references therein.", "Multi-UAV networks present a star/mesh topology structure [6].", "The procedure of the self-organization network model is as follows [6]: when a UAV node fails or new UAV node joins, its neighbor(s) monitors the incoming and outgoing links.", "Moreover, the network self-organization generates computational overhead and requires high bandwidth [6].", "On the other hand, owing to frequent changes of the network con\ufb01guration, UAV networks should be self-healing/self-organized to be more fault tolerant [6].", "To improve the reliability of the end-to-end data transmission in highly dynamic networks, delay/disruption-tolerant network (DTN) routing protocols may be required [6]."]} +{"53726738|19938676": ["Moreover, UAV communication networks have been regarded as promising proposals for the 5G system where the gigabits per second (Gb/s) data transfer rate is considered as one of the key performance indicators [51]."]} +{"53726738|26398795": ["\u2026three groups: deterministic, stochastic, and enhanced routing protocols. a) Deterministic routing protocol: In the deterministic routing protocol, a node carrying packets may select a next hop node according to deterministic/known information (e.g., contact, queue, and traf\ufb01c demand) [66], [67].", "The disadvantages of the broadcast-based routing protocol are [66]: \u2022 Contention: It may create contention for buffer space and transmission time (or the channel resource)."]} +{"5600111|25929315": ["In parallel, terrestrial wireless networks are also facing the challenge of ef\ufb01ciently supporting M2M type of traf\ufb01c with several orders of magnitude increase for the population of supported terminals by each base station [10]."]} +{"28482859|2623404": ["One central protocol in SDN architectures is OpenFlow (OF) [27]."]} +{"3585389|22221919": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massiveMIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cellular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machine (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "In addition, se veral survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7, 55\u201357], mmWave [7, 8, 58], Non Orthogonal Multiple Access (NOMA) [59, 60], cell ular and heterogeneous networks [61\u201363], Internet of Things (IoT) [66, 68], Machine to Machi ne (M2M) communication [64\u201366] and Device to Device (D2D) communication [67].", "[59] S. M. R. Islam, N. Avazov, O. A. Dobre, and K. s. Kwak, \u201cPower-domain non-orthogonal multiple access (NOMA) in 5G\nsystems: Potentials and challenges,\u201dIEEE Communications Surveys Tutorials, vol. 19, no. 2, pp. 721\u2013742, Secondquarter 2017."]} +{"3585389|10235514": ["Furthe rmore, the contribution in [51] provided a tutorial overview of 5G research activities, dep loyment challenges and standardization trials."]} +{"3585389|4572654": ["Several survey papers exist in the literature in the contextof dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as spectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underlay DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectrum assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfections [13], licensed spectrum sharing\ntechniques [45], and the coexistence of LTE and WiFi [46].", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]", "techniques [45], and the coexistence of LTE and WiFi [46].", "Considering a typical WiFi setup with two nodesN1 andN2 trying to connect to the core network via an access point, theclassical hidden node problem occurs when the nodeN2 starts transmitting data to the access point without being able to hear transmissions from the nodeN1 to the access point, thus causing collision at the access point [73]."]} +{"3585389|4344513": ["In addition, several survey and overview papers exist in the area of 5G enabling technologies such as massive MIMO [7], [59]\u2013[61], mmWave [7], [8], [62], Non-Orthogonal Multiple Access (NOMA) [63], [64], cellular and heterogeneous networks [65]\u2013[67], Internet of Things (IoT) [70]\u2013[73], Machine to Machine (M2M) communication [68]\u2013[70] and Device to Device (D2D) communication [74]."]} +{"3585389|13019489": ["sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|10979806": ["[58] carried out a detailed survey of the existing works in the areas of energy-efficient techniques for 5G networks, and subsequently analyzed various green trade-offs including spectrum efficiency versus energy efficiency, delay versus power, deployment efficiency versus energy efficiency, and bandwidth versus power for the effective design of energy-efficient 5G networks [57]."]} +{"3585389|7525856": ["and measurements [30]\u2013[32], interweave DSS [33], [34], [36], underlay DSS [37]\u2013[39], cooperative DSS [40], [41], Medium Access Control (MAC) protocols for DSS [42], spectrum deci-", "model [185], and (iii) Radio Environment Map (REM) which can be created either based on sensing information obtained from the sensor nodes or database information obtained from regulators/operators or both [34], [186]."]} +{"3585389|8606364": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"3585389|19938676": ["In the context of 5G wireless networks, authors in [50] provi ded a detailed survey on 5G cellular network architecture and described some of the eme rging 5G technologies including massive MIMO, ultra-dense networks, DSS and mmWave."]} +{"3585389|4122595": ["The detailed mapping of various spectrum awareness and exploitation techniques was provided in [13].", "The main enabling techniques for DSS in wireless networks can be broadly categorized into spectrum awareness and spectrum exploitation techniques [13].", "cal imperfections such as noise uncertainty, channel uncertainty, hardware imperfections, noise/channel correlation in the context of FD-CR communications [13].", "sion [46], spectrum assignment [47], security for DSS [43], learning for DSS [44], [45], DSS under practical imperfections [13], licensed spectrum sharing techniques [48], and the"]} +{"3585389|8974063": ["Several survey papers exist in the literature in the context of dynamic spectrum sharing and spectral coexistence covering a wide range of areas such as s pectrum occupancy modeling and measurements [29, 30], interweave DSS [31, 32, 34], underla y DSS [35\u201337], overlay DSS [38], MAC protocols for DSS [39], spectrum decision [43], spectru m assignment [44], security for DSS [40], learning for DSS [41, 42], DSS under practical imperfe ctions [13], licensed spectrum sharing", "Main domain Sub-topics References Spectrum occupancy modeling and measurements[29, 30] Interweave DSS [31\u201334] Underlay DSS [35\u201337] Overlay DSS [38] MAC protocols for DSS [39] Dynamic spectrum sharing DSS under practical imperfections [13] Security for DSS [40] Learning for DSS [41, 42] Spectrum decision and assignment [43, 44] Licensed spectrum sharing [45] Coexistence of LTE and WiFi [46] Overview, challenges and research directions [21] SI cancellation techniques [19, 21] Full duplex communications FD relaying [47] Physical layer perspective [48] FD cognitive radio [25] MAC layer perspective [48, 49] 5G overview, architecture and enabling technologies [50\u201353] Energy-efficient 5G network [53, 54] Massive MIMO system [7, 55\u201357] 5G wireless networks mmWave communication [7, 8, 58] Non-Orthogonal Multiple Access (NOMA) [59, 60] Cellular and Heterogeneous Networks (HetNets) [61\u201363] IoT, M2M and D2D [64\u201367]"]} +{"135449974|60442746": ["The focus of such works is more general except for the revision of MAC protocols for IoT presented by Oliveira et al. [14]; nevertheless, besides the fact that the mentioned works do not include a quantitative performance evaluation and comparison, a good part only discuss terrestrial IoT wireless\u2026", "In the case of Class A nodes, the MAC protocol performs a \ufb01xed allocation of resources (in bandwidth and code) together with a random access scheme [14].", "Reviews devoted to the IoT, the enabling technologies, and services are also found in [11\u201314]."]} +{"135449974|4427557": ["For low consumption sensor arrays deployed across extensive areas, technologies such as LoRaWAN [24] and Sigfox [25] are available; for sensors and actuators networks deployed in urban environments, there are Wi-Sun [26] and NB-IoT [27], to mention some of the available technologies."]} +{"135449974|6779551": []} +{"135449974|3494096": ["Although nanosatellite connectivity is being identi\ufb01ed as part of the IoT technologies ecosystem [6\u20139], it is still not considered as low-cost as to become part of the LPWA category [72,73]."]} +{"208633567|17708892": ["So far, however, there are only systems that transmit data to GEO satellites with compact antennas at frequencies in the L-band or S-band [5], [7]\u2013[9]."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"14543932|18685876": ["The majority of cubesat programs utilize the Ultra High Frequency/Very High Frequency (UHF/VHF) transceivers for downlink communication with no inter-satellite links [51].", "These two systems support numerous S-Band frequencies (2-4 GHz) and work with a variety of communication protocols and encryption schemes [51]."]} +{"67875113|4427557": ["INTRODUCTION Low Powered Wide Area Networks (LPWAN) [1] for Internet of Things (IoT) communications is a growing market.", "Low Powered Wide Area Networks (LPWAN) [1] for Internet of Things (IoT) communications is a growing market.", "Using a Low-Earth Orbit (LEO) satellite system to extend a LPWAN coverage is an attractive option, and has already been proposed [2, 3].", "The time randomness is inherent in state of the art LPWAN solutions, because leading market technologies (Sigfox, LoRa) use plain Aloha [4].", "Index Terms\u2014 Satellite, NB-IoT, LPWAN, Time-Frequency Aloha, Mutual information\n1.", "LPWAN network operators try to outperform competition by having the widest coverage."]} +{"52147041|19938676": ["September 2018 | Ieee vehIcular technology magazIne 1556-6072/18\u00a92018Ieee ||| 39 ith the fifth generation (5G) of cellular communications around the corner, operators are searching for efficient solutions to accommodate the tremendous traffic increase with limited latency [1]."]} +{"6568347|11909843": ["In this case, satellite capacity can be deployed as a redundant backhaul capacity to any network node and also may be available to operate in challenging post disaster scenarios, allowing rapid emergency communication network deployments as those based on vehicular or transportable network nodes (referred to as mobile cells) described in [6] e.", "One of the ways to minimize the network vulnerabilities in case of a disaster is introducing an appropriate redundancy within the network [6].", "This is especially of interest in public protection and disaster relief (PPDR) efforts given the high dependability on communication systems for effective disaster mitigation [6]."]} +{"202699580|64199278": ["However, as the cost of deploying new \ufb01ber cables may become prohibitive, particularly in dense urban areas or isolated sub-urban areas, Free Space Optical (FSO) technology appears as a convenient solution when a high-capacity link is needed to connect two edge nodes that are relatively close [4]."]} +{"17591210|11720829": ["THE SUCCESS story of MIMO technology in terrestrial applications now spans more than a decade with spectacular results, as it offers substantial leverage in realizing the next generation gigabit wireless [1].", "[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"17591210|18148591": ["[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"16031066|2623404": []} +{"16031066|2387055": []} +{"16031066|3189715": []} +{"70211811|53116003": ["Another article [59] presented a panoramic survey on the"]} +{"70211811|9461213": ["Furthermore, depending on the objective of how a learning architecture will be utilized, DL architectures can be broadly categorized into [35], [166]: generative, discriminative and hybrid.", "Some promising techniques in this direction include the following [35]: (i) network compression, (ii) approximate computing, and (iii) accelerators.", "several Deep Learning (DL) techniques are being investigated in wireless networks including IoT networks [35].", "Also, due to multi-layer structure of DL techniques, they become advantageous for complex edge computing environments [35]."]} +{"70211811|4884302": ["\u2026rewards from the environment, resulting in the return of L l =0 \u03b3 l r l +1 , where \u03b3 \u2208 [0 1] is the discount factor which provides more weights on the immediate rewards and L denotes the length of one episode, which denotes the time period after which the state is reset for an episodic MDP [45].", "Also, the recent article [45] provided a brief survey of the existing deep RL algorithms along with the highlights on current research areas and the associated challenges.", "At each time-step, the device aims to maximize the expected discounted return in the long-term, i.e., long-term reward, given by [44, 45] where E denotes the expectation operator and this is taken over probability state transitions, i.e., dynamics of the considered environment.", "\u2026[19,39,40] QoS provisioning [41] Intelligence in 5G networks [16,20] Machine Learning (ML) Learning in IoT/sensor networks [26,42,43] Reinforcement learning [44,45] Ultra-Dense Networks (UDNs) [46\u201348] and the distinct features of mMTC traf\ufb01c as compared to the conventional HTC traf\ufb01c [26]."]} +{"70211811|21930333": ["several base station switch-off strategies including random, distance-aware, load-aware and auction-based can be employed to balance the energy related performance trade-offs such as a trade-off between energy efficiency and data throughput [102]."]} +{"70211811|12325031": ["Furthermore, RL techniques can work in model-free wireless environments where the system dynamics are usually unknown [183]."]} +{"70211811|25929315": ["Sub-topics References Enabling technologies/protocols, challenges and applications [1,2,6,11,14,28\u201332] Random access schemes [22,33\u201335] IoT/mMTC Traf\ufb01c characterization and issues [36] Transmission scheduling [37,38] IoT big data analytics [19,39,40] QoS provisioning [41] Intelligence in 5G\u2026", "5 [33, 88], which mainly involves the following four stages: (i) RA preamble transmission from the device to the eNodeB (Message 1), (ii) RA Response (RAR) from the eNodeB to the device (Message 2), (iii) connection request message from the device to the eNodeB (Message 3), and (iv) connection\u2026", "Besides, there are some strict separation schemes and soft separation schemes to concurrently support both the HTC and MTC traf\ufb01c in LTE-A networks [33, 91].", "\u2026must go through the access procedure to establish a connection to the Base Station (BS)/eNodeB/access point mainly in the following situations [33]: (i) while establishing an initial access to the network, (ii) while receiving/transmitting new data and MTC device is not synchronized to the\u2026", "The four-stage message handshake procedure followed in the current LTE standard results in very high overhead for most of the IoT devices since the packets transmitted by the resource-constrained IoT devices are quite short as compared to the conventional cellular packets [33].", "In LTE-based cellular networks, the eNodeB broadcasts the periodicity of the RA slots by means of a variable referred to as the Physical RACH (PRACH) con\ufb01guration Index [33], and subsequently, the MTC devices and the legacy cellular users can perform RA by using the PRACH channel.", "The periodicity of RA slots is broadcasted by the eNodeB in terms of the PRACH con\ufb01guration index, which varies between every 1 ms (i.e., a maximum of 1 RA slot per 1 subframe) to 20 ms (i.e., the minimum of 1 RA slot every 2 frames) [33].", "Besides, the main performance metrics to be improved include access success probability, preamble collision rate, access delay and device energy consumption [33].", "This corresponds to the absolute maximum capacity of 10 , 800 preambles per seconds in the absence of access collisions [33].", "Furthermore, the article [33] presented a comprehensive survey of various RA solutions attempting to enhance the RACH operation of LTE/LTE-A based cellular networks, and carried out the performance evaluation of LTE RACH from the energy ef\ufb01ciency perspective."]} +{"7995555|512561": ["Channel bonding in wireless sensor networks is also considered [19] which can be applied to combine multiple contiguous non-overlapping wireless channels to form a single channel of higher bandwidth for operational efficiency."]} +{"7995555|1686572": ["A number of protocols have been proposed in [39], [222], and [223] however, those protocols suffer from limitations which make them unsuitable for practical deployment, e."]} +{"7995555|8974063": ["[41] surveyed research in this area"]} +{"7995555|2509135": ["Spectrum sensing techniques with their advantages and disadvantages, different CR MAC protocols, spectrum handoff, mobility, routing issues, and different CR platforms and standards are reviewed in [37]."]} +{"3603149|8999817": [", see [33]) instead of the usual array-fed reflector in SatCom."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"201658874|56718822": ["Comparison between short-range and long-range technologies [7,8].", "In the \ufb01rst option, UAVs communicate with the IoT devices through a wireless non-5G interface, e.g., one of the commercial or standardized LPWA solutions shown in Tables 1 and 2.", "One UAV is in charge of sending/receiving data to/from the satellites, and each of the other UAVs is equipped with one LPWA technology different from the others, to take care of a speci\ufb01c access technology.", "All the proposed solutions fall in the category of the so-called Low Power Wide Area protocols (LPWA) [7]."]} +{"201658874|31245252": ["DDS: Data Distributed Service, developed by the Object Management Group [13,14]."]} +{"201658874|4427557": ["Comparison between short-range and long-range technologies [7,8].", "Technical specifications for standardization bodies and special interest groups for IoT solutions [8]."]} +{"201658874|3494096": ["Solutions to extend the Internet connectivity to smart farming and smart villages, among other 5G application scenarios [45], need to go beyond the terrestrial infrastructure."]} +{"201314944|8334698": ["For instance, Vespe et al. (2016) proposed a method for mapping the fishing footprint at the European level by extracting fishing", "Because this part has already been reviewed by Tu et al. (2018), Sidib\u00e9 and Shu (2017) and Zhao et al. (2014), in this section we only briefly explain the ideas and review the most up-to-date studies."]} +{"199015244|18253650": []} +{"73488857|6909107": []} +{"4122595|15116409": ["of the examples are [11]: (i) Random Filtering, (ii) Com-"]} +{"4122595|8974063": []} +{"4122595|2509135": []} +{"4122595|12601073": ["Several survey papers exist in the literature in the context of CR communications covering a wide range of areas such as spectrum occupancy measurement campaigns [8], Spectrum Sensing (SS) [9]\u2013[13], spectrum management [14], emerging applications [15], spectrum decision [16], spect rum assignment [17], spectrum access strategies [18], resourc e allocation [19], [20], machine-learning techniques [21] a nd"]} +{"421642|2623404": []} +{"174818355|3494096": ["Based on the nature of the deployed application, IoT can be segmented into massive and critical IoT, with very distinguishable network requirements [4]."]} +{"1733983|25929315": ["Interestingly, as pointed out by the review paper [12], very few works are looking into optimizing the energy efficiency and performance of RA protocols."]} +{"3332929|2443013": []} +{"52901302|19938676": ["5G systems will need to achieve important key performance indicators (KPIs), in terms of low latency, high level of security, massive device connectivity, and consistent quality of service (QoS) provisioning [2]."]} +{"1693526|7851743": ["However, a major challenge in such networks is how to design and manage Self-organisation in cellular networks which is mostly seen as a result of distributed decision making [8]."]} +{"1693526|10096622": ["3) PSO: models the social behavior of a group of birds [14]."]} +{"53082533|14543932": ["Typically, frequency allocation candidates for ISC include S-, K u-, and K a-bands [5], [6].", "In [6], Universal Software Radio Peripheral N210 was employed with its transceiver operating in the frequency range from 400 MHz to 4.", "In small satellite communications, a codeword with some special requirements is needed: a code rate is higher than 1/2 and the size of information block or code block should be an integer multiples of 8 or 16 [6] so that information block can be integral multiple of a byte."]} +{"52117872|3649200": []} +{"52117872|13738536": []} +{"11506737|4122595": []} +{"341121|2623404": ["Various open interfaces [3] have been defined to communicate between the control plane and data plane (south bound interface), and OpenFlow [4] is a de-facto standard."]} +{"58011555|3757239": ["Content Caching/Storage: The explosive growth of user data, especially multimedia data, has brought considerable stress on mobile networks [13]."]} +{"58011555|6909107": ["Instead of local execution, there are the following two computation off loading modes [12]."]} +{"58011555|206578365": ["As such, mobile edge computing (MEC) has been proposed to transfer the computation and storage capacity from cloud computing to local servers, and is able to greatly improve the QoS to users, such as reducing user-perceived latency and energy consumption of user devices [7]."]} +{"3469935|2623404": ["ically or logically centralized network controller to determine network management policies and define operation for the whole network [19], [20]."]} diff --git a/edge/graph_211205915.jsonl b/edge/graph_211205915.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211207928.jsonl b/edge/graph_211207928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ba84794c40463e7e264b99096fa7270ae5f6e6f --- /dev/null +++ b/edge/graph_211207928.jsonl @@ -0,0 +1,5 @@ +{"109958893|15174674": []} +{"59236948|3924799": ["The recent development of complex aerial systems such as aerial manipulators [1] calls for the design of wholebody control laws capable of stabilizing the overall system dynamics while guaranteeing robustness with respect to external disturbances and modeling errors [2],[3],[4]."]} +{"203593321|3924799": ["For instance, manipulation and aerial locomotion have been combined by Aerial Manipulation [6], a branch of robotics often exemplified by a quadrotor", "For instance, manipulation and aerial locomotion have been combined by Aerial Manipulation [6], a branch of robotics often exemplified by a quadrotor\nManuscript received September 10, 2019; accepted January 8, 2020."]} +{"203593321|26683758": ["Quadrotors, tail-sitters, and scale airplanes are only few examples of the large variety of existing flying robots [1]."]} +{"37998499|15174674": ["Following a typical approach in control allocation [25], [26], the redundancy in the control is dealt with by an appropriate change of coordinates that separates the directions in the input space that affect the actuated degrees of freedom from the ones that leave the system dynamics unchanged.", "Control allocation strategies [25] can be adopted to select an optimal value for \u03b1 yielding the desired triplet (Fx , Fy, \u03c4z)."]} diff --git a/edge/graph_211210976.jsonl b/edge/graph_211210976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c74c365a1fa999ab10fcb4ead49e502403fa7b3 --- /dev/null +++ b/edge/graph_211210976.jsonl @@ -0,0 +1,46 @@ +{"3628668|11013798": ["So far, cloud-based fault localization [42, 25] focused on few fault types, the most common ones being performance faults, resource faults, and operational faults."]} +{"3628668|6486398": ["The interested reader can refer to the excellent description of Langville et al. [24] for a detailed survey on the HITS algorithm and PageRank.", "\u2026resources, such as the server application that processes the requests issued by the client or the host machine that runs the VM. Based on this assumption, LOUD exploits graph centrality indices [24, 27, 39] to identify the anomalous KPIs that best characterize the root cause of a predicted failure.", "PageRank [24] scores nodes according to both the number of incoming edges and the probability of anomalies to randomly spread through the graph ( teleportation )."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"9496996|12815020": []} +{"150325733|7329149": ["We combine the latter two cases into a joint \u03c6-edge and \u03ba\u03c6-node failure for the simplicity of notation, where \u03c6 = \u03c6p and \u03ba \u2208 [0, 1].", "Since the residual networks Gp(Pt) and Gc(Ct) are nodeinduced graphs of Gp and Gc, random variables Rt and Rt both take value in [0, 1], and the residual processes {Rt }t and {Rt }t are nonincreasing in time t.", "so on [1].", "consider a generic triggering incident model, in which each physical edge in Ep (cyber edge in Ec, respectively) disconnects with probability \u03c6p (\u03c6c), and each physical node in P (cyber node in C, respectively) fails with probability \u03b8p (\u03b8c), where probabilities \u03c6p, \u03c6c, \u03b8p, and \u03b8c all take value in [0, 1]."]} +{"52007255|26368310": ["Only one or few aspects of resilience actions are taken into consideration, such as network topology[4], server redundancy and virtualization[5] and fault detection[6], instead of comprehensively covering the overall actions in the whole life circle."]} +{"19055306|10390713": ["1) to illustrate more realistic scenarios similar to power grids and their monitoring systems [23]."]} +{"10109950|12815020": []} +{"88489390|121289": ["Hence, essential efforts are needed to improve the reliability and efficiency of power distribution without any increase of vulnerability to cyber exploitation and attack [16]."]} +{"7702299|8523192": ["A detailed discussion of such heterogeneities is presented by Bonomi et al. [3], and Mahmud and Buyya [13] It is widely accepted [1], that the architecture of IoT is based on 3-layers model to assure the perception of signal from various sensors or by reading bar code labels, RFID tags, inputs from\u2026"]} +{"12237313|11013798": ["Fault ? error ? failure chain A fault is a flaw in the system that can cause an error [9] [10]."]} +{"12237313|1230643": ["The third contributor is energy-constrained networks, exemplified by wireless sensor networks [39], in which nodes that have drained their battery can no longer contribute to network connectivity [40,41]."]} +{"12237313|1991786": []} +{"17900274|1991786": ["Multilevel resilience [101] is needed in three orthogonal dimensions: Protocol layers in which resilience at each layer provides a foundation for the next layer"]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"6569840|8618991": ["We recently conducted a systematic literature review (SLR) on architectures for cyber-foraging systems that identified 57 primary studies and a total of 60 cyber-foraging systems in these studies (52 computation offload and 8 data staging systems) [4]."]} +{"3527459|2256477": []} +{"3527459|9588126": ["According to the usual notion of consensus [1], the network nodes should converge to an equilibrium point where all the nodes have the same value lying somewhere between the minimum and maximum of their initial values.", "The prototypical problem to study resilience in the presence of misbehaving nodes is the so-called consensus problem [1], which forms the foundation for distributed computing."]} +{"4302945|17183431": ["Such environments pave the way towards implementing any non-trivial pervasive computing service through the inherent distributed cooperation of a large set of devices, so as to address by self-adaptation the unforeseen changes in working conditions that necessarily happen\u2014much in the same way adaptivity and resilience are addressed in complex natural systems at all levels, from molecules and cells to animals, species, and entire ecosystems [59]."]} +{"8796556|16717715": ["Cyber foraging is most useful for applications that can be divided into loosely-coupled components; otherwise the cost of communication between the client and the surrogate will offset the performance or energy benefits of using a surrogate."]} +{"91186802|5022650": ["Papers Focus on the IoT [4, 12, 126, 134, 197], this article Discussion of existing software and hardware platforms", "\u2026[4, 102, 103, 126, 134, 164], this article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88, 102, 107, 117, 118, 126, 164, 197], this article The objective of this article is to provide a comprehensive survey on FC, with a specific\u2026"]} +{"91186802|206578486": ["In-depth analysis of the state-of-the-art architectures and algorithms [102, 117] Focus on resource management and offloading of user tasks [102, 107] Standardisation efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118,\u2026", "\u2026134, 164], this article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88, 102, 107, 117, 118, 126, 164, 197], this article The objective of this article is to provide a comprehensive survey on FC, with a specific focus on its\u2026"]} +{"91186802|25374274": ["This is demonstrated by the great number of works that have been proposed to face such challenges and, as a consequence, by the considerable number of surveys focusing on this topic [88, 118, 126, 150, 164, 167].", "\u2026102, 103, 126, 134, 164], this article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88, 102, 107, 117, 118, 126, 164, 197], this article The objective of this article is to provide a comprehensive survey on FC, with a specific focus\u2026", "\u2026[102, 107] Standardisation efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118, 126, 150, 164, 167] Focus on developers and engineers [4, 102, 103, 126, 134, 164], this article Historical context & background of FC this\u2026"]} +{"91186802|29859741": ["FC can be the solution to the problem [63, 90], especially but not only in the following three ways: (i) it enables low and predictable response times, which can often make the difference between life and death for patients; (ii) it ensures that at least the most critical portion of the overall\u2026"]} +{"91186802|12675271": ["Papers Focus on the IoT [4, 12, 126, 134, 197], this article Discussion of existing software and hardware platforms", "\u2026efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118, 126, 150, 164, 167] Focus on developers and engineers [4, 102, 103, 126, 134, 164], this article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88, 102, 107, 117,\u2026"]} +{"91186802|6909107": ["\u2026management and offloading of user tasks [102, 107] Standardisation efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118, 126, 150, 164, 167] Focus on developers and engineers [4, 102, 103, 126, 134, 164], this article\u2026", "In-depth analysis of the state-of-the-art architectures and algorithms [102, 117] Focus on resource management and offloading of user tasks [102, 107] Standardisation efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118,\u2026", "\u2026Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118, 126, 150, 164, 167] Focus on developers and engineers [4, 102, 103, 126, 134, 164], this article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88,\u2026", "While migration policies are extensively debated in other surveys [102, 107], we did not find any article reporting the FC platforms that specifically provide mobility support.", "\u2026103, 126, 134, 164], this article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88, 102, 107, 117, 118, 126, 164, 197], this article The objective of this article is to provide a comprehensive survey on FC, with a specific focus on\u2026", "Therefore, in 2009 Satyanarayanan et al. [155] suggested to cope with such shortcomings (and in particular with the high and unpredictable latencies) through the concept of Cloudlet , which was the de facto birth of a paradigm known as Mobile Edge Computing (MEC) [102]."]} +{"91186802|206578365": ["In-depth analysis of the state-of-the-art architectures and algorithms [102, 117] Focus on resource management and offloading of user tasks [102, 107] Standardisation efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118,\u2026", "\u2026management and offloading of user tasks [102, 107] Standardisation efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118, 126, 150, 164, 167] Focus on developers and engineers [4, 102, 103, 126, 134, 164], this article\u2026", "While migration policies are extensively debated in other surveys [102, 107], we did not find any article reporting the FC platforms that specifically provide mobility support.", "\u2026126, 134, 164], this article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88, 102, 107, 117, 118, 126, 164, 197], this article The objective of this article is to provide a comprehensive survey on FC, with a specific focus on its\u2026"]} +{"91186802|8523192": ["Standardisation efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118, 126, 150, 164, 167] Focus on developers and engineers [4, 102, 103, 126, 134, 164], this article Historical context & background of FC this article Summary of recent work (i."]} +{"91186802|3767252": ["\u2026efforts from the OFC [4], this article Standardisation efforts from ETSI [4, 102, 107, 164] Security and privacy issues [88, 118, 126, 150, 164, 167] Focus on developers and engineers [4, 102, 103, 126, 134, 164], this article Historical context & background of FC this article\u2026", "This is demonstrated by the great number of works that have been proposed to face such challenges and, as a consequence, by the considerable number of surveys focusing on this topic [88, 118, 126, 150, 164, 167]."]} +{"91186802|3348390": ["Context awareness enables provision of improved services and resources utilization [135]."]} +{"91186802|3818445": ["Papers Focus on the IoT [4, 12, 126, 134, 197], this article Discussion of existing software and hardware platforms", "\u2026article Historical context & background of FC this article Summary of recent work (i.e., from 2017 onward) [4, 12, 88, 102, 107, 117, 118, 126, 164, 197], this article The objective of this article is to provide a comprehensive survey on FC, with a specific focus on its integration with the IoT."]} +{"2668802|8618991": ["One of these system-level concerns is security [19].", "A set of 57 primary studies was identified (their preliminary analysis is available in [19])."]} +{"53281522|2683208": []} +{"53281522|14043655": []} +{"53281522|15411200": []} +{"53281522|4668902": []} +{"53281522|16780247": []} +{"53281522|12904520": []} +{"16029496|33286487": ["Even though authors in [8] support the incentive of employing a TF energy distribution function by having a signal under its analytical form they argue that the resulting distributions cannot be considered as proper probabilities for real valued signals.", "Finally, Section 5 presents our concluding remarks. have particularly employed formulations belonging in the Cohen class of distributions [8]."]} +{"5322364|16654832": ["Among limited studies of the domain, [19] and [56] survey"]} +{"5322364|6670217": []} +{"5322364|7287857": ["fingertip\u2019 [1] and \u2018unrestricted mobile computing\u2019 [2] aroused the need to enhance computing power of mobile devices to meet the insatiable computing demands of mobile users [3]."]} +{"5322364|10837932": ["Moreover, researchers aim at reducing the energy overhead in different aspects of computing, including hardware, OS, application, and networking interface [83], [84]."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"67866994|3348390": ["The contextawareness requires the answers of i)Who, ii)What, iii)When, and iv) Where [23].", "Context Awareness specifically related to IoT is less considered in state of the art.", "The \u2018When\u2019 describes the service timing and the \u2018Where\u2019 tells the location of an entity.", "These are the basic concepts of Context Awareness [23]."]} +{"37020035|9240891": []} diff --git a/edge/graph_211211505.jsonl b/edge/graph_211211505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..019eda9eb9f1d22597adf30c4c6758df4388fa3c --- /dev/null +++ b/edge/graph_211211505.jsonl @@ -0,0 +1,8 @@ +{"27434345|5246835": ["[47] highlight that an important advantage of data mining is that it can be used to develop a new class of models to identify new attacks before"]} +{"27434345|50458504": ["[58] describe fraud as leading to the abuse of a profit organization's systemwithout necessarily leading to direct legal consequences.", "2 consists of two layers, the first comprising the aforementioned financial fraud based categories and the second comprising the six data mining application classes of classification, clustering, prediction, outlier detection, regression, and visualization [13,24,32,48,58,61,74,76], supported by a set of algorithmic approaches to extract the relevant relationships in the data [73].", "[58] point out that fraud detection has become one of the best established applications of data mining in both industry and government.", "[58] present a survey of data mining-based fraud detection research, including credit transaction fraud, telecoms subscription fraud, automobile insurance fraud and the like.", "2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"27434345|954543": ["2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"206989240|5246835": ["of general fraud detection using analytic techniques including neural networks [30]."]} +{"206989240|50458504": ["None of the existing reviews (for example, [32], [62] and [63]) covers this aspect."]} +{"54483972|50458504": []} +{"22284090|50458504": ["A variety of approaches on computational intelligence based technique have been proposed to deal with fraud detection [1],[2]."]} +{"31828962|15164501": ["Literature reviews often focus on specific aspects of research disciplines such as the quality of empirical research methods (e.g., Basili 1996) or the state of research on particular phenomena such as culture (Leidner and Kayworth 2006) or outsourcing (Lacity et al. 2009), to name just two.", ", Basili 1996) or the state of research on particular phenomena such as culture (Leidner and Kayworth 2006) or outsourcing (Lacity et al."]} diff --git a/edge/graph_211215557.jsonl b/edge/graph_211215557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20c2e4754db6f5b09687579b61a1bd37007d2b16 --- /dev/null +++ b/edge/graph_211215557.jsonl @@ -0,0 +1,30 @@ +{"21360737|1177069": ["Many researches have been carried out on coverage path planning algorithms for non-tethered robots [15]\u2013[17] and shortest path planning algorithms for tethered robots [18]\u2013[20]."]} +{"191137964|1230643": []} +{"209052896|3390598": []} +{"64982505|7329149": []} +{"61155849|15300368": ["Another precision agriculture testbed has been developed for eal-time sensing in the field [79] ."]} +{"169895416|6275330": []} +{"195832430|49574823": ["M2M connections cover a broad range of applications like smart cities, The associate editor coordinating the review of this manuscript and approving it for publication was Alberto Cano. smart environment, smart grids, smart retail, smart farming, etc. [3]."]} +{"195832430|29859741": []} +{"195832430|2134031": ["Authors of [11] have discussed the security issues specific to location-based services in IoT.", ", [11] security issues specific to location-based services in IoT"]} +{"195832430|31245252": ["Jie Lin et al. in [9] have discussed the relationship between IoT and fog computing."]} +{"195832430|2829149": ["Yuchen et al. [10] have summarized various security issues in IoT applications."]} +{"195832430|4663919": ["This may lead to the hijacking of the IoT network [40]."]} +{"195832430|3818445": ["In [8] the authors have compared edge computing with traditional cloud systems to secure IoT systems."]} +{"32162622|1503157": []} +{"54441355|9862516": ["\u201d [3]."]} +{"69582438|52094967": ["Burhan et al. have depicted various network elements, security, and solutions [7]."]} +{"69582438|485843": []} +{"69582438|5747564": ["The integration of renewable energy resources will lead to reduced carbon footprint and emissions [1\u20134]."]} +{"69582438|121289": ["The field area IEEE 802.15.1 (Bluetooth), IEEE 802.15.4 (Zigbee), IEEE 802.3 (Ethernet), IEEE 802.11 (WLAN/Wi-Fi), and narrowband power line communication (PLC) standards, among others, can be used for \ufb01eld area networks [26\u201331]. network ranges for the coverage area of a few meters."]} +{"52281577|1503157": ["The combination of the aforementioned systems with wireless sensor networks (WSNs) allows multiple unassisted embedded devices (sensor nodes) to transmit wirelessly data to central base stations [2], [3].", "The agricultural applications frequently involve large, expansive areas where wire connection for communication and power is undesirable or impracticable [2]."]} +{"68021957|17769444": ["For a survey on hardware systems for WSNs, we refer the reader to [25] and see references therein."]} +{"68239394|17769444": []} +{"54205305|21386749": ["A. Zanella et al [4] point out the different sections where the IoT could be embedded in the healthcare sector.", "A. Zanella et al [3] have proposed the architecture of IoT application in the smart cities with the example \u2018Padova\u2019 city.", "Zanella et al [4] point out the different sections where the IoT could be embedded in the healthcare sector."]} +{"58584294|52169887": ["Orion only stores the latest version of entity attributes and it needs to work together with other applications in order to maintain historical data."]} +{"42573021|9560561": []} +{"201813787|46978224": ["Study [16] uses big data to help optimize power distribution in Volt-VAR Control (VVC) processes in wind power generation."]} +{"64952930|1230643": []} +{"52845705|52883988": []} +{"182902013|49527603": []} +{"159171211|1503157": []} diff --git a/edge/graph_211218188.jsonl b/edge/graph_211218188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7471101443e6ce836909c20d8e4ab01eac98dd67 --- /dev/null +++ b/edge/graph_211218188.jsonl @@ -0,0 +1,3 @@ +{"195732137|508178": ["We refer to [4], [5], [52] for more detailed survey on trust mechanisms for cloud", "To increase user\u2019s trust on Cloud Providers (CP), the reputation of the CPs can be used [4], [5] as it helps users to choose an appropriate CP."]} +{"118557|8424228": ["\u2026this regard, Gilbert and Lynch [2002] formally proved the CAP theorem, an assertion informally presented in previous works [Johnson and Thomas 1975; Davidson et al. 1985; Coan et al. 1986; Brewer 2000] that binds linearizability to the ability of a system to maintain a nontrivial level of\u2026"]} +{"6044301|8424228": []} diff --git a/edge/graph_211226813.jsonl b/edge/graph_211226813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..476e97d5cbff4b466b07eeaff85e844d43444e59 --- /dev/null +++ b/edge/graph_211226813.jsonl @@ -0,0 +1,7 @@ +{"6285720|1582463": ["modules, called watchdog processors [6], to monitor the control-flow of programs, as well as memory accesses.", "They exploit special purpose hardware modules, called watchdog processors [6], to monitor memory accesses."]} +{"41965624|1188683": ["Many examples have demonstrated the increased performance and efficiency of reconfigurable systems over traditional programmable processor approaches [2]."]} +{"30347672|6809492": []} +{"30347672|1582463": ["Examples of this approach are presented in [17]\u2013[20]."]} +{"116406473|16502602": []} +{"60929349|1188683": []} +{"60929349|10739218": []} diff --git a/edge/graph_211226824.jsonl b/edge/graph_211226824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be3d4f76fb54eb2c3540c4b7c954ce996b3c26af --- /dev/null +++ b/edge/graph_211226824.jsonl @@ -0,0 +1,7 @@ +{"1845983|16209841": []} +{"53285581|6414421": ["In fact, chaotic maps are used ordinarily in generating the encryption keys for the cipher structure [12], or for key generation from wireless channels [13]."]} +{"51613885|207209718": ["Some surveys [25, 89] have discussed intrusion detection systems (IDS) in wireless sensor networks and Internet of Things and have provided analysis and comparison of the main existing IDSs."]} +{"207240812|3348390": ["IoT can impact various application domains either by enabling new services, or by improving the efficiency of existing ones [12].", "IoT-enabled solutions for automation, control and monitoring may improve industry by lowering operational and maintenance cost, and increasing quality of service [5], for industrial domains such as supply chain management, transportation and logistics, and automotive [12, 18]."]} +{"206446574|1230643": []} +{"189824716|51613885": ["A further innovative application field for hash functions is the IoT [18], for example targeting the biomedical sector [19], [20] as well as other areas where security is of paramount importance due to the sensitiveness and potential life-criticality of the involved data.", "These often have reduced computation capabilities [18], meaning that their processors struggle to perform complex cryptographic algorithms such as SHA-2 [24], let alone the Proof-of-Work of the Nakamoto consensus [22].", "Consider for example the distributed consensus protocol in the Bitcoin blockchain, where the energy cost of hash computation is the critical factor determining the economic profitability of coin mining, or the energy requirements of many battery-powered IoT devices, where the battery life often coincides with the lifetime of the device itself.", "Rao, \u2018\u2018Defence against black hole and selective forwarding attacks for medical WSNs in the IoT,\u2019\u2019 Sensors, vol. 16, no. 1, pp. 1\u201325, 2016, Art. no. 118.", "Moreover, IoT applications make increasing use of the blockchain technology to enforce integrity and nonrepudiation of data communications [18], [22], or to implement smart contracts [23] in distributed environments such as an IoT network.", "Another application is presented in [20], where SHA-256 is employed as the underlying hash function for the authentication of the nodes in the IoT network, employing the algorithm presented in [21].", "In fact, power consumption is a fundamental issue in IoT scenarios, since the battery life is typically limited and often determines the very lifetime of the device itself.", "The adoption of a blockchain in IoT applications is challenging due to the resource limitations of the involved devices.", "They are a fundamental building block for a number of cryptographic services which are critical for security applications and protocols, but they also provide the essential ingredient for emerging innovative applications, like blockchains and distributed ledgers, involving a wide range of platforms from high-end servers down to resource-constrained Internet-of-Things (IoT) devices.", "[20] A. Mathur, T. Newe, W. Elgenaidi, M. Rao, G. Dooly, and D. Toal, \u2018\u2018A secure end-to-end IoT solution,\u2019\u2019 Sens. Actuators A, Phys., vol. 263, pp. 291\u2013299, Aug. 2017."]} +{"189824716|925507": ["Moreover, IoT applications make increasing use of the blockchain technology to enforce integrity and nonrepudiation of data communications [18], [22], or to implement smart contracts [23] in distributed environments such as an IoT network.", "These often have reduced computation capabilities [18], meaning that their processors struggle to perform complex cryptographic algorithms such as SHA-2 [24], let alone the Proof-of-Work of the Nakamoto consensus [22]."]} diff --git a/edge/graph_211230973.jsonl b/edge/graph_211230973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211232017.jsonl b/edge/graph_211232017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d12bad5c06698685261d0f782766b917951b8dcd --- /dev/null +++ b/edge/graph_211232017.jsonl @@ -0,0 +1,12 @@ +{"115434433|18303304": []} +{"115434433|7834819": []} +{"1033682|174797842": []} +{"4632519|9976187": ["Latent Tree Models, in particular, are interesting as they are able to represent complex relationships in the data [11] and, furthermore, recent methods for constructing these models ([2, 7]) enable us to learn consistent and minimal latent tree models in a computationally efficient manner."]} +{"145028773|1336603": []} +{"145028773|1078272": []} +{"145028773|8815923": []} +{"7013774|2186746": ["Collisions are then penalized using distance fields [31]."]} +{"2018737|7185733": []} +{"8021846|393948": ["Convolutional networks [40,39], a class of representation learning methods [8], began to exhibit performance gains not only in human pose estimation, but various areas of computer vision [37]."]} +{"3080437|18440098": ["The reader is referred to [89], [90] for a detailed description of methods for data clas-", "ferred to [89] and [90] for a detailed comparison."]} +{"8150245|7788290": ["For more detailed descriptions of past works in the human tracking domain, see [1] and [ 14 ]."]} diff --git a/edge/graph_211246488.jsonl b/edge/graph_211246488.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04f8d6a0ba810ffa30ec5431cc661acdb6ae05ac --- /dev/null +++ b/edge/graph_211246488.jsonl @@ -0,0 +1,8 @@ +{"4935557|40725508": ["The automotive society [31] has proposed several communication technologies to exchange data among vehicles, transport infrastructure and pedestrians."]} +{"4935557|18388986": []} +{"10805453|18986679": ["The resulting visual display enables scientists or engineers to perceive visually the features that are hidden in the data but nevertheless are needed for data exploration and analysis [ 5 ]."]} +{"13329164|1174262": ["Movement data has recently received substantial attention in the visualization community (see [5] for a survey)."]} +{"13329164|2593345": []} +{"16494521|191396": ["Despite a vast number of surveys for clustering algorithms available in the literature [1], [2], [7], and [38] for various domains (such as machine learning, data mining, information retrieval, pattern recognition, bio-informatics and semantic ontology), it is difficult for users to decide a priori\u2026"]} +{"15538672|192934": []} +{"20269434|10241432": ["TMS includes traffic estimation and optimisation to improve the traffic conditions and reduce travel delays [1], [2]."]} diff --git a/edge/graph_211252383.jsonl b/edge/graph_211252383.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..faecd22e6b27c7665593225d0a71553ca19d2536 --- /dev/null +++ b/edge/graph_211252383.jsonl @@ -0,0 +1,35 @@ +{"2305273|1932843": ["Previous work on Reinforcement Learning typically do not consider highdimensional perceptual inputs [48]."]} +{"12104564|7788290": ["Many examples of people tracking have used cameras as their primary sensor [19, 26], however laser rangefinders have also been used [52]."]} +{"196621428|8574504": ["The most classic version is semantic segmentation [66].", "We recommend the works of Alberto Garcia-Garcia [66] to get an overview of some of the best image segmentation techniques using deep learning while our focus would be to understand why, when and how these techniques perform on various challenges.", "[66] lists a variety of deep learning based segmentation techniques."]} +{"196621428|2088679": ["While some of them specialized in application areas [107, 123, 185], while other focused on specific types of algorithms [20, 19, 59].", "In medical image processing [123] as well we need to localize various abnormalities"]} +{"196621428|1223851": ["While some of them specialized in application areas [107, 123, 185], while other focused on specific types of algorithms [20, 19, 59].", "A particular class of problem called saliency detection [19] is born from this."]} +{"5973965|17024419": ["This is not possible in most of conventional augmented reality methods [31] where one can put a new object in a scene"]} +{"15699494|4716814": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"15699494|1932843": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"125724991|534755": ["Typical applications of switched systems can be seen in engineering practice, such as vehicles [2], power electronics [3], biological systems [4], and so on."]} +{"132852708|16324149": []} +{"12998110|1932843": ["However, most of the e ort has been devoted to two areas: , as in [47, 121, 120, 164], most of the work with [ An entity satisfying the conditions can be hypothesized to be a car, a hypothesis which is subject to being withdrawn if the entity ceases to display the normative characteristics, thereby\u2026"]} +{"12998110|7813891": ["It is attracting a growing interest in AI, as revealed in the two surveys of [99, 213]."]} +{"12998110|15929566": ["Most approaches rely on learning an MDP policy, progressively improved with respect to a reward criterion [112, 205, 93]."]} +{"12998110|778117": ["Several monitoring systems, along that line, are surveyed in [169], most of which are mainly concerned with a robot sensory-motor level.", ", planning [91], monitoring [169], goal reasoning [213], recognition of actions and plans [129], architectures [127], or human\u2013aware navigation [130].", "The relationship between monitoring and planning was not a major concern for the work discussed in [169]."]} +{"12998110|1708582": ["Most approaches rely on learning an MDP policy, progressively improved with respect to a reward criterion [112, 205, 93]."]} +{"12998110|14526964": []} +{"52298127|2088679": ["There is a huge gap of deep learning methods in this domain, with only a few notable papers concentrating on deep survival analysis [97]."]} +{"52298127|9928823": ["Among various machine-learning algorithms, \u201cdeep learning,\u201d also known as representation learning [29], is widely used in these applications."]} +{"12888763|393948": ["It has been shown that convnet representations trained on classification problems generalize well to other tasks [18, 17, 2, 6].", "Such \u2018transfer learning\u2019 has been demonstrated elsewhere for training classifiers [18, 17, 2], but here we demonstrate transfer learning from classification to the qualitatively different task of pose regression."]} +{"12971705|6681074": []} +{"52158437|10175374": ["Simultaneously addressing multiple tasks through multi-task learning [52] has shown advantages over methods that tackle individual ones [70]."]} +{"32487629|5660618": []} +{"126795914|7981750": []} +{"45130498|1932843": ["Real world tasks have also been a target for RL algorithms, especially for difficult perception and control problems in robotics [8]."]} +{"115441594|9928823": []} +{"115441594|15093118": []} +{"115441594|1708582": []} +{"7183629|393948": ["Since it is known that training deep architectures in a global way is an open problem [25], we use the standard greedylayerwise method to find good local minima for the filter coefficients of each layer and then we perform a global training to fine-tune them."]} +{"165133518|52014912": ["Quadrotor swarms are expected to be more powerful than a single large vehicle, o \ufb00 ering signi \ufb01 cantly enhanced \ufb02 exibility (adaptability, scalability, and maintainability) and robustness (reliability, survivability, and fault-tolerance) [9]."]} +{"85784|6875365": []} +{"85784|9588126": ["Nevertheless, in multi-agent systems, the self-dynamics of each agent is usually neglected and thus the asymptotic consensus state is in general a constant (Cao et al., 2013; Wielanda et al., 2011).", "(D\u00f6fler & Bullo, 2014), coordination of multi-agent systems (Cao et al., 2013; Saber, Fax, & Murray, 2007), collective motions (Vicsek & Zafeiris, 2012), regulatory networks (Fiedler, Mochizuki, Kurosawa, & Saito, 2013; Mochizuki, Fiedler, Kurosawa, & Saito, 2013) and oscillation death versus amplitude death (Koseska, Volkov, & Kurths, 2013; Saxena, Prasad, & Ramaswamy, 2012; Zou, Senthilkumar, Zhan, & Kurths, 2013).", "\u2026complex networks (Arenas et al., 2008), synchronization in complex oscillator networks (D\u00f6fler & Bullo, 2014), coordination of multi-agent systems (Cao et al., 2013; Saber, Fax, & Murray, 2007), collective motions (Vicsek & Zafeiris, 2012), regulatory networks (Fiedler, Mochizuki, Kurosawa, &\u2026"]} +{"85784|5660618": ["\u2026For studies of synchronization of complex networks, it is interesting to introduce distinct networked-induced constraints (Gao et al., 2008; Hespanha et al., 2007; Zhang et al., 2013) into the frameworks of synchronization such as time delays, time-varying sampling intervals, packet\u2026", "Like for controllability of complex networks, networked induced constraints like measurement noise, measurement uncertainties, packet dropouts, time-delays, time-varying sampling intervals and quantization (Gao et al., 2008; Hespanha et al., 2007; Zhang et al., 2013) will possibly increase the number of sensors to guarantee its robustness and feasibility.", "\u2026constraints like measurement noise, measurement uncertainties, packet dropouts, time-delays, time-varying sampling intervals and quantization (Gao et al., 2008; Hespanha et al., 2007; Zhang et al., 2013) will possibly increase the number of sensors to guarantee its robustness and feasibility.", "(i) For studies of synchronization of complex networks, it is interesting to introduce distinct networked-induced constraints (Gao et al., 2008; Hespanha et al., 2007; Zhang et al., 2013) into the frameworks of synchronization such as time delays, time-varying sampling intervals, packet dropouts, saturations, communication noises and quantization errors, where the networked-induced constraints can be modeled either in a deterministic or a stochastic way.", "However, most real systems are driven by nonlinear processes (Gao et al., 2008; Hespanha et al., 2007; Zhang et al., 2013), which can exhibit more rich dynamics (Khalil, 2002)."]} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"72940839|3273340": ["Prior research on designing fast and ef\ufb01cient networks has primarily focused on encoder networks for tasks such as image classi\ufb01cation and object detection [1]."]} +{"3714620|7360895": ["These technologies have wide industrial applications, including autonomous driving platforms [6], interactive collaborative robotics [11], and localization and navigation systems [12], etc."]} diff --git a/edge/graph_211255628.jsonl b/edge/graph_211255628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88accd4a803ff523b429ed78b438124cfbf1a62a --- /dev/null +++ b/edge/graph_211255628.jsonl @@ -0,0 +1,4 @@ +{"1572378|15333587": ["Tags were also influential in predicting shares on other social media sites (Bornmann, 2014b,).", "Numerous reviews of these tools and their strengths and weaknesses have been published (Bornmann, 2014a; Brigham, 2014; Chamberlain,\n2013; Das & Mishra, 2014; Galligan & Dyas-Correia, 2013; Galloway, Pease, & Rauh, 2013; Gunn, 2014; Jobmann et al., 2014; Kwok, 2012; Melero, 2015; Neylon, Willmers,\u2026"]} +{"15632555|15333587": []} +{"49484381|1572378": []} +{"21693936|12574246": []} diff --git a/edge/graph_211257060.jsonl b/edge/graph_211257060.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fda9258e85ac4acad510ea6a671ba75bbe51cb7 --- /dev/null +++ b/edge/graph_211257060.jsonl @@ -0,0 +1,177 @@ +{"54465258|206576720": []} +{"155106477|22221919": ["Comparing with the conventional orthogonal multiple access (OMA) techniques, NOMA allows multiple users to multiplex on non-orthogonal resources, such as frequency channels or spreading codes [9]."]} +{"155106477|191396": ["In Algorithm 1, for K SCs, a worstcase complexity can be calculated as O( \u2211K i=1 FkFcIt ), where It denotes the iterations, Fk is the number of SUs to be clustered in the kth SUs, tand Fc denotes the proposed clusters number of each SC [19].", "Then, we introduce the sub-optimal SUs clustering scheme which is inspired by kmeans clustering [19]."]} +{"52304067|22221919": ["One of the key technologies to increase the per-cell spectral efficiency is non-orthogonal multiple access (NOMA) which has attracted a considerable attention of researchers [1]."]} +{"56594630|22221919": ["NOMA exploits power domain to serve multiple users at the same time, frequency and spreading codes [1], [2]."]} +{"53229703|22221919": ["2We adopt the max-min fairness because it is a typical and extensively used fairness rule in NOMA [11], [25].", "For power-domain NOMA, the signals are superimposed with different transmission powers at the transmitter, and successive interference cancellation (SIC) is required at the receivers to remove the multi-user interference [6]\u2013[11].", ", low-density spreading (LDS), sparse code multiple access (SCMA), multiuser shared access (MUSA), pattern division multiple access (PDMA), and so on [9], [11], [13]."]} +{"53726738|21557844": ["The use of the mmWave spectrum, however, is challenging because it is sensitive to blockage and requires the LoS propagation between the transmitter and the receiver [79]."]} +{"53726738|61132": ["Furthermore, in military applications, such as reconnaissance, surveillance, attack, and patrol, the usage of the single-UAV networks is almost thirty years old [6].", "\u2026node may trigger the recon\ufb01guration of the whole UAV network [46]. b) Decentralized self-organization: Under the decentralized self-organization model, each entity makes self-decisions and takes actions according to nearby/local information, i.e., the direct interaction with neighbor UAV nodes [6].", "Depending on applications, the speed of a UAV may be in the range of 0-460 km/h [6], [13].", "For more information on transmission mechanisms of UAV networks, please refer to [6], [13] and references therein.", "Multi-UAV networks present a star/mesh topology structure [6].", "The procedure of the self-organization network model is as follows [6]: when a UAV node fails or new UAV node joins, its neighbor(s) monitors the incoming and outgoing links.", "Moreover, the network self-organization generates computational overhead and requires high bandwidth [6].", "On the other hand, owing to frequent changes of the network con\ufb01guration, UAV networks should be self-healing/self-organized to be more fault tolerant [6].", "To improve the reliability of the end-to-end data transmission in highly dynamic networks, delay/disruption-tolerant network (DTN) routing protocols may be required [6]."]} +{"53726738|19938676": ["Moreover, UAV communication networks have been regarded as promising proposals for the 5G system where the gigabits per second (Gb/s) data transfer rate is considered as one of the key performance indicators [51]."]} +{"53726738|26398795": ["\u2026three groups: deterministic, stochastic, and enhanced routing protocols. a) Deterministic routing protocol: In the deterministic routing protocol, a node carrying packets may select a next hop node according to deterministic/known information (e.g., contact, queue, and traf\ufb01c demand) [66], [67].", "The disadvantages of the broadcast-based routing protocol are [66]: \u2022 Contention: It may create contention for buffer space and transmission time (or the channel resource)."]} +{"198147552|174797842": []} +{"198147552|88492544": ["Recently, GANs have been extensively used in the applications leveraging ML and DL methods [114]\u2013[116]."]} +{"198147552|53018231": ["In the same spirit, authors presented and discussed various advance level deep Q learning (DQL) models in [111]."]} +{"198147552|52965836": ["XAI is a branch of AI (and its descendant ML and DL methods) that break the black-box nature of the inner layers of these model and make it transparent, and thus more reliable (or at least understandable) [190], [191]."]} +{"198147552|51613885": ["2018 [11] Blockchain and SDN solutions for IoT N/A Generic IoT and in-depth review of the ML- and DL-based solutions in multiple domains"]} +{"198147552|3536399": ["Recently, the ML has been used in an adversarial setting to fool the learning mechanism and make the model decide other than what it is trained for [193]."]} +{"198147552|9461213": ["2018 [16] IoT data analytics through DL N/A In-depth review of ML- and DL-based solutions in IoT"]} +{"198147552|24855581": []} +{"198147552|24386836": ["often do not incorporate heterogeneity of players as well as dynamic change in the network topology and number of players for resource allocation [54].", "It is worth noting that traditionally, the optimization techniques cannot incorporate the context and are unable to react according to the changing environments [53], [54]."]} +{"198147552|13738536": ["Similarly, in [178], the authors presented a Radio Resource Management (RRM) and hybrid beamforming method for downlink massive MIMO system using ML techniques.", "In [184], the authors proposed a MIMO-based anti-jamming game for NOMA transmission.", "Index Terms\u2014Internet-of-Things (IoT), wireless IoT, machine learning, deep learning, resource allocation, resource management, D2D, MIMO, HetNets, NOMA.", "In this context, ML techniques have also been used to address different problems in massive MIMO systems.", "For instance, [126] used DL for high-resolution channel estimation in MIMO systems.", "In another work, Mauricio et al. [177] presented an ML approach to solve the grouping problem in multi-user massive MIMO systems.", "Similarly, in [174], the authors proposed a supervised learning for pilot assignment to address the pilot contamination in MIMO systems, considering the output features as pilot assignment while the input features as user locations in the cells.", "After covering the resource management challenges in different IoT networks (e.g., cellular IoT, low-power IoT, cognitive IoT, and mobile IoT networks), we discuss the existing solutions including those for Device-to-Device (D2D), HetNet, (massive) Multiple Input Multiple Output (MIMO), and Non-Orthogonal Multiple Access (NOMA) systems.", "We have carried out a comprehensive survey of the ML- and DL-based resource management techniques in the IoT networks with enabling technologies such as HetNets, D2D, MIMO/massive MIMO, and NOMA.", "The positioning problem in MIMO systems was addressed in [173] using least square SVM. SVM finds the mapping between the sample space and coordinate space based on MIMO channel established by the multipath propagation.", "Various ML techniques have been proposed for modern cellular networks including D2D communication, massive MIMO and mmWave communications technologies as well as heterogeneous cellular networks (HetNets).", "4) Based on the conducted survey of the ML- and DL-based resource management in IoT networks supporting D2D, MIMO and massive MIMO, HetNets, and NOMA technologies, we identify the existing challenges and future research directions.", "Furthermore, in [103], the authors recommended a supervised ML technique, i.e., SVM-based technique for MIMO channel learning.", "Furthermore, Wang et al. [137] proposed an ML-based beam allocation method for MIMO systems that outperforms the conventional methods.", "Device-to-Device (D2D) Communications [28], [29], [30], [52], Heterogeneous Networks [31], [32], [33], Vehicular Networks [53], [54] Multiple Input Multiple Output (MIMO) and Massive MIMO [55], [56], [57]", "Many algorithms have been studied for channel estimation, beamforming, mitigating pilot contamination, and improving energy-efficiency in massive MIMO systems.", "CELLULAR IOT NETWORKS\nIn this section, we survey the existing ML- and DL-based resource management solutions for specific cellular IoT technologies including HetNets, D2D, MIMO (massive MIMO), and NOMA.", "The computationally complex resource management in multi-user massive MIMO is replaced with neural network using supervised learning.", "Then, we provide a comprehensive survey of the existing ML- and DL-based resource management techniques in wireless IoT networks and the techniques specifically designed for HetNets, MIMO and D2D communications, and NOMA networks.", "For the selection of suitable modulation scheme and coding rate in MIMO-OFDM systems, the past observations of the CSI and errors can be used.", "Recently, a relatively new concept known as massive MIMO has been an active area of research.", "In [175], the authors presented ML algorithms for link adaptation in MIMO systems.", "DL has also been used for advanced wireless transmission technologies such as MIMO and NOMA."]} +{"198147552|4427557": ["The authors in [32] presented emerging LPWA technologies and the standardization activities carried out by different standards development organizations (e.", "with different types of resource allocation problems [32]."]} +{"198147552|206576720": []} +{"85500300|22221919": []} +{"85500300|6909107": ["interactive gaming [29]."]} +{"85500300|3270620": ["There exist a number of interesting survey papers in this topic [30]\u2013[33]."]} +{"85500300|8323234": ["\u2026wave (mmWave) bands (30 GHz to 300 GHz spectrum) has been subject to intensive research during the past decade, and it has been proven theoretically and experimentally to provide gigabit-per-second data rates due to huge available bandwidths (e.g. up to 2 GHz bandwidth in 60 GHz) [21], [22].", "The feasibility of supporting gigabits-per-second data rates by wireless communications at mmWave bands (30 GHz to 300 GHz) has been veri\ufb01ed both theoretically and experimentally [21], [22], [55], [56].", "The large path-losses encountered at these mmWave frequencies can be compensated by leveraging the unprecedentedly high array gains that can be obtained by densely packing a massive number of antennas in a very-small area thanks to much smaller wavelengths of mmWaves [21], [22], [55], [56]."]} +{"85500300|3055684": ["\u2026to eavesdroppers and can bene\ufb01t from PHY security as we elaborate this in Section VI. 5) Energy harvesting: Energy harvesting communications offer the promise of providing an energy self-suf\ufb01cient and self-sustaining means of communications; a step toward realizing green communications [30]."]} +{"85500300|4395259": ["These approaches aim at degrading the quality of signal reception at eavesdroppers compared to the main channel and thereby preventing them from decoding the con\ufb01dential information from the intercepted signals [26]\u2013 [29]."]} +{"3775231|22221919": []} +{"169033894|22221919": []} +{"135464918|53018231": ["For example, [11] recently applied DRL to address several emerging issues in communication and networking, including adaptive modulation, wireless caching, data offloading, and so on, as shown in Fig."]} +{"135464918|206578365": ["and privacy constraints on individual devices, increasing research interests are moving towards leveraging the dispersed computing resources across the cloud, network edge and enddevices of 6G networks through the lens of mobile edge computing [14]."]} +{"210931929|199012443": ["Therefore, the hybrid satellite/UAV (HS-UAV) communication is important for further applications, such as precision agri-culture, disaster response, prehospital emergency care and mineral exploration,among others [13]."]} +{"3424351|22221919": ["A good survey on NOMA for 5G networks can be found in [10]."]} +{"3289536|22221919": ["While in multi-carrier NOMA, overloading is realized at reduced complexity since the number of users at each subcarrier is limited [16]."]} +{"68051776|22221919": ["Hence, compared to the conventional OMA, NOMA not only can provide more efficient utilization for scarce resources [2]\u2013[4] but also can improve user fairness [5], [6]."]} +{"52287824|3270620": ["Although several NOMA techniques have been actively investigated over the last few years, majority of the efforts have focused on power-domain NOMA [6], [7], which exploits signal power diversity for each NOMA user at each NOMA receiver end."]} +{"148574438|22221919": ["It is assumed that the CHs can communicate with all CMs to obtain its perfect CSI in this paper, which is motivated by the concept of cooperative NOMA4 [3], [33]."]} +{"57762487|22221919": ["Unlike conventional orthogonal multiple access (OMA), the power-domain NOMA ensures multiple users to be served by the same time-frequency resources via power-domain multiplexing, thus offering a significant improvement in spectral efficiency and connectivity performance [4], [5].", "From a practical viewpoint, the relay-assisted cooperative NOMA is easy to implement, since there can be a large number of idle users in realistic wireless networks, which can be temporarily used as dedicated relays to help other users [4]."]} +{"211039032|51988843": []} +{"211039032|22221919": []} +{"211039032|21418": []} +{"211039032|3270620": []} +{"198146785|22221919": ["Power domain non-orthogonal multiple access (NOMA) is a promising key multiple access technology in 5G to improve the spectral efficiency significantly, meet the increasing demand in mobile data traffic, and lower the latency compared with traditional orthogonal multiple access (OMA) including frequency division multiplexing (FDM), time division multiplexing (TDM) and code division multiple (CDM) [13], [14].", "demand in mobile data traffic, and lower the latency compared with traditional orthogonal multiple access (OMA) including frequency division multiplexing (FDM), time division multiplexing (TDM) and code division multiple (CDM) [13], [14]."]} +{"58515925|11720829": ["The combination of MIMO and NOMA (called MIMO-NOMA) introduces advantages of both technologies and can further improve spectrum reuse efficiency [6], transmission throughputs [7], [8] and power efficiency [9]."]} +{"199570055|22221919": ["This advantage has elevated NOMA to a prime solution for the massive connectivity requirements of the next generation of wireless networks [9]."]} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} +{"3548474|875676": ["There are two types of typical pulses: the pulse based on the isotropic orthogonal transform algorithm (IOTA) [20] and the pulse adopted in the PHYDYAS project [21]."]} +{"182730814|22221919": ["It is worth mentioning that the key idea of the NOMA system is to allocate more power to the user with poorer channel conditions [5], thus, p 1 > p 2 always holds in our system.", "To meet these requirements, numerous transmission and multiple access techniques have been proposed and investigated, such as massive multiple-input multiple-output (MIMO) [1], millimeter-wave (mmWave) [2], non-orthogonal multiple access (NOMA) [3]\u2013[5], and sparse code multiple access (SCMA) [6]."]} +{"102343670|22221919": []} +{"102343670|26259297": ["When the channel needs to be updated, the BS only needs to re-estimate the remaining channel gain components [37]\u2013[39]."]} +{"102343670|21418": []} +{"181604928|22221919": ["In particular, power-domain NOMA systems have been proposed as a way to increase the achievable rate [1]."]} +{"201873207|22221919": ["To this end, non-orthogonal multiple access (NOMA) is emerging as a competitive candidate to improve the spectrum efficiency, in which the transmitter broadcasts the superposed signal of several users through a single resource block, and users\u2019 messages can be identified by different power levels with successive interference cancellation (SIC) performed at receivers [2]."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"202940886|3738168": ["The UWC system includes communication devices and tools support to minimize the different noise, multi-path propagation, attenuation and the Doppler effect [5, 15].", "The multiple access techniques suggested along with the major losses in acoustic and optical propagation in the water channel are given in [5].", "Coastal ocean water shows high rate dissolve properties of suspended particles in it, which cause scattering, absorption cause of turbidity [5, 38].", "In the late 19th century, acoustic waves were proposed with data rates of 8 kbps in underwater for 20 m depth approximately and 13 km over the water surface [5].", "UWOC has many distinct properties during propagation at different frequencies over different ranges with dissimilar water medium [5].", "A high rate of absorption and scattering occur in it as compared to coastal ocean water [5] (Table 4).", "In a recent survey work [5] of UWOC, where the authors proposed UWOC communication technologies and comparison with among of UWC techniques.", "The main focus was extensively suggested in the article where the underwater optical sensor network model on a distinct layer was presented in [5, 15].", "[5] Underwater optical wireless networks (UWONs) Underwater optical wireless communication Optical signal absorption and scattering phenomena", "4 Inherent optical properties cause scattering and absorption during underwater optical communication [5, 15]"]} +{"202940886|73678081": ["[14] Not specified Multicarrier communication Communication affecting factors (Noise and losses)", "The defined frequency ranges generally from a few kHz to 1 GHz especially for military applications [6, 14].", "In UWOC, each color has a different frequency range and does not affect the same way [14].", "UWOC, UWAC and UWRF propagation reviewed in most recent articles [14, 30].", "According to the literature [35, 36] and due to optical inherent properties, seawater has been divided into four types [14].", "UWOC technique has high attenuation but is more reliable over short distance propagation in shallow water [14, 15].", "The deployment of configurations in underwater system consists of fixed and anchored sensor nodes such as floating unmanned under-water vehicle nodes (UUVs) or AUVs, signal receiver processing towers, floating buoys, submarines, ship, and onshore base station [14].", "A survey article [14] on UWC system, investigated Acoustic, Optical and Electromagnetic waves for underwater communication and related technical issues are discussed.", "A comprehensive research and scope of the above technologies are mentioned in [14, 15].", "Acoustic, Optical and EM underwater communication technologies a particular direction of research are widely discussed in [14]."]} +{"202940886|12206204": []} +{"202940886|2469117": []} +{"202940886|870434": ["Acoustic nodes are power consuming, bulky and expensive [79]."]} +{"202940886|1230643": []} +{"211058939|52954708": ["Massive IoT connections require huge spectrum and energy resources [4]."]} +{"211058939|22221919": ["On the other hand, NOMA, which transmits (receives) signals to (from) multiple users in the same radio resource, is recognized as an important candidate for future wireless communication systems, due to its appearing advantages such as enhanced spectrum efficiency and support for massive connections [16]\u2013[18]."]} +{"211058939|31245252": ["INTRODUCTION Internet-of-Things (IoT) which supports the interconnection of massive wireless devices, is an important application scenario of the fifth-generation (5G) and future wireless communication systems [1]\u2013[3]."]} +{"5779923|22221919": ["INTRODUCTION RECENTLY non-orthogonal multiple access (NOMA) has received significant attention as a main enabling technique for future wireless networks [2]\u2013[4]."]} +{"5918010|4395259": ["Recently, physical layer security, which achieves secure transmissions by exploiting the dynamics in the physical layer, has drawn considerable attention [6], [7]."]} +{"61809651|22221919": ["However, the high power consumption for conducting successive interference cancellation (SIC) is the main bottleneck for the sake of employing NOMA technique to the low-power IoT.", "Recently, simultaneous wireless information and power transfer (SWIPT) was proposed to provide stable energy supply for low-power IoT devices.", "The rapid development of the internet of things (IoT) leads to the explosive increase of diverse wireless devices and the rapid growth of high-rate mobile services [1]\u2013[3].", "Thus, it is recognized as a promising technique to achieve massive connectivity and low latency requirements in the IoT era.", "In addition, non-orthogonal multiple access (NOMA) has been envisioned as another emerging technique to improve SE and achieve massive connectivity in IoT [7], [8].", "With the explosive growth of IoT devices, how to extend their lifetime in an ef\ufb01cient manner has been recognized as a popular research topic [23], [24].", "However, the spectrum scarcity has become a major bottleneck for the employment of the IoT.", "Therefore, the integration of CR and NOMA has great potential to satisfy the IoT requirements, namely massive connectivity and high throughput.", "By exploiting power-domain multiplexing of NOMA, the users have to consume nonnegligible energy for powering their successive interference cancellation (SIC) decoders [9], which will largely prevents the application of the NOMA in energy-constraint IoT.", "In NOMA, since the superposition signal received by the user carries substantial energy, the IoT device may harvest a portion of this energy for powering its decoder."]} +{"61809651|3504276": []} +{"61809651|3055684": ["In general, either time switcher or power splitter is adopted by the receiver to simultaneously collect both energy and information from the received radio-frequency (RF) signal [11], [25], [26]."]} +{"61809651|12029139": ["In general, either time switcher or power splitter is adopted by the receiver to simultaneously collect both energy and information from the received radio-frequency (RF) signal [11], [25], [26].", "The classic linear model [11], cannot accurately characterize the property of practical energy harvester."]} +{"3927845|22221919": ["Towards these goals and among all components in the radio link design, NoMA has attracted great attention across both academia and industry [2-15].", "As one example, the integration of NoMA with (massive) MIMO has been raised in literatures [15]."]} +{"56728085|49316045": ["NOMA has been reviewed as a potential access scheme for uplink and grant free transmission [19, 20]."]} +{"56728085|51988843": []} +{"56728085|22221919": []} +{"56728085|3270620": ["Detailed surveys on PD-NOMA, its state-of-the-art, research trends, implementation issues, architecture and challenges can be found in [4, 13\u201315, 17, 28].", "Detailed surveys on PD-NOMA could be found in multiple review articles [4, 13, 15, 17, 21, 22, 28]."]} +{"56728085|15449163": []} +{"56728085|12206204": []} +{"56728085|12029139": []} +{"150134626|22221919": ["Therefore, the coverage and average throughput can be increased significantly with a moderate increase in the system complexity [4, 5].", "Following this concept, a variation of NOMA called cognitive radio inspired NOMA has been proposed in [5]."]} +{"3900203|22221919": []} +{"3619201|3504276": ["Concurrently, WPT has been identified as a potential solution to this issue [7]."]} +{"52196595|3330461": ["Meanwhile, D2D communication is another effective approach to improve coverage and capacity for the regions where no infrastructure can be used [20]\u2013[22]."]} +{"4942707|1708582": ["Note that the random exploration of standard Q-learning at the beginning of the game due to the all-zero Q-value initialization usually requires exponentially more data than the optimal policy [34]."]} +{"56594281|3757239": []} +{"56594281|206578365": [", base stations, BSs) has provided a promising approach to address this issue [1]\u2013[4]."]} +{"59842990|51858916": ["Most of the air-to-ground channel measurements and models focus on the large-scale statistics such as mean path-loss and shadowing [20].", "When UAV \ufb02ies above the vegetation, it is likely that the communication path to the ground devices is either line of sight (LOS) or non line of sight (NLOS) due to obstacles, where the path loss exponent and variation in shadowing increases as the altitude of UAV increases [20]."]} +{"59842990|35260120": ["\u2026a long-range backscatter communication link the following are needed: 1) A backscatter transmitter (tag), 2) a backscatter receiver (reader, data collector), and 3) one (or multiple) carrier emitter (RF energy source); it should be noted that the emitter may be collocated with the receiver [3]."]} +{"59842990|22221919": ["Recently, power-domain non-orthogonal multiple access (NOMA) is envisaged as an essential enabling technology for 5G wireless networks especially for uncoordinated transmissions [10]."]} +{"3812885|21418": ["Considering the high power consumption of mixed signal components in mm-Wave systems, the hybrid analog and digital beamforming was proposed as one possible energy efficient solution for mm-Wave communications [10], [11]."]} +{"164778509|22221919": ["Apart from invoking the D2D technique to improve the system spectral efficiency, non-orthogonal multiple access (NOMA) is also a promising technology to improve the spectral efficiency, on the standpoint of providing power dimension formultiple access [8], [9]."]} +{"52290948|4884302": ["The aim of Q-learning is to obtain a policy (a set of actions) that maximizes the observed rewards over the interaction time [15]."]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"192585568|22221919": ["NON-ORTHOGONAL multiple access (NOMA) can provide superior spectral efficiency in the future wireless networks, which is regarded as a potential enabler for the 5G networks [1]."]} +{"59608733|51929263": ["Here, following the taxonomy by the recent tutorial [148], we categorize transfer learning techniques into four main classes."]} +{"59608733|4884302": ["This implementation of Q-learning is referred to as the Deep Q-Network approach [95], [96], which can be considered an algorithm belonging to the family of Q-learning methods, with the peculiarity that the approximate function Q\u0302(s, a, w) is specified through an ANN.", "Reinforcement learning will also be considered, primarily considering its integration with deep learning tools, which leads to the recently introduced paradigm of deep reinforcement learning [95], [96].", "This section presents the framework of deep reinforcement learning, which merges deep learning with reinforcement learning [95], [96]."]} +{"59608733|3645740": ["As far as communications are concerned, most previous surveys discuss general machine learning techniques [14], [17], [18], [38]\u2013[40], without providing a dedicated analysis of deep learning."]} +{"59608733|10979806": ["Already 5G wireless networks are requested to increase the bit-per-Joule energy efficiency by a factor 2000 compared to previous wireless networks [2], [4]."]} +{"59608733|8323234": [") apply to using millimeter-wave communications [67], [68]."]} +{"59608733|6111895": ["Among others, we mention optical wireless communications [31], [32], which promise very high data rates by communicating over the visible spectrum, and molecular communications, which are not based on electromagnetic waves but exploit chemical signals as information carriers, thus enabling communication through media where electromagnetic signals do not propagate well, such as water, the inside of human bodies or the walls of buildings [33], [34]."]} +{"59608733|7851743": ["As a consequence, operational expenditures (OPEX) and capital expenditures (CAPEX), which are already a major challenge in present wireless networks [5], will significantly increase."]} +{"59608733|7774517": []} +{"3800081|21418": ["Moreover, a comprehensive overview of the most recent research about energy harvesting and green 5G techniques is provided in [6]."]} +{"52311221|8323234": ["For general comparison, the fully-connected architecture can achieve higher spectrum efficiency, while the sub-connected architecture is expected to achieve higher energy efficiency [5].", "In this way, the use of a very large number of antennas in mmWave massive MIMO systems leads to an equally large number of RF chains, which will result in unaffordable hardware cost and energy consumption [5].", "Usually, two typical HP architectures are adopted [5]: 1) Fully-connected architecture, where each RF chain is connected to all antennas; 2) Sub-connected architecture, where each RF chain is connected to only a subset of antennas."]} +{"67864903|22221919": ["\u2026power domain nonorthogonal multiple access (NOMA) has been regarded as a promising key technology in 5G systems [21], which can signi\ufb01cantly improve the spectral ef\ufb01ciency (SE), support more user connections, and reduce the latency compared with traditional orthogonal multiple access (OMA) [22]."]} +{"4110032|22221919": ["NON-ORTHOGONAL multiple access (NOMA) is a key technology of the fifth generation (5G) mobile networks [1], in which the transmitters superimpose the signals and send them to the corresponding receivers."]} +{"195740426|21557844": ["For all mmWave frequencies where the urban cell sizes are on the order of 200 m, rain or snow attenuation can clearly be overcome with additional antenna gain (obtainable by switching in more antenna array elements) [2], [4], [6].", "These frequency bands could easily be used for high speed 6G mobile wireless networks with up to km size coverage range, and perhaps even up to 10 km or beyond in \ufb01xed applications [4], [25], [105]\u2013[107].", "This feature makes THz signals exceedingly dif\ufb01cult to intercept or eavesdrop [4], [10], [25], [29].", "\u2026model had slightly better PLE and standard deviation stability for the indoor environments than the single-frequency CI and Floating Intercept (FI) models (although a sensitivity analysis such as provided in [133] has not yet been performed for indoor sub-THz channels) [4], [132], [134]\u2013[136].", "\u2026free space loss, making these particular bands well suited for very short range and secure communications such as \u201cwhisper radio\u201d applications, where massive bandwidth channels will attenuate very rapidly out to a few tens of meters, meters, or fractions of a meter [2], [4], [6], [25], [104].", "Theoret-ically, the path loss in free space decreases quadratically as frequency increases , so long as the physical size of the antenna (effective aperture) is kept constant over frequency at both link ends [4], [6], [28], [118].", "\u2026autonomous driving, Internet of Things (IoT), and wireless backhaul (as a replacement for labor-intensive installation of optical \ufb01ber) [3], [4], as well as newer applications that have not been conceived yet, will need even greater data rates and less latency than what 5G networks will\u2026"]} +{"52302250|85500300": []} +{"86769598|51858916": []} +{"86769598|22221919": ["the spectrum efficiency but also allow more users or devices to access the network [3]\u2013[7].", "Different from the conventional orthogonal multiple access (OMA), NOMA is built upon the idea that multiple users can simultaneously share one resource block, such as a subcarrier or a spreading code [3]."]} +{"181562676|22221919": ["NON-ORTHOGONAL multiple-access (NOMA) is a promising multiple-access technique for the fifth generation (5G) and beyond wireless networks [1], [2].", "The multi-users\u2019 data bits are estimated using an appropriate detection method such as the successive-interference cancellation (SIC) and the message passing algorithm (MPA) [1]."]} +{"208099912|22221919": ["In order to improve the spectrum efficiency, the new multiple access technologies are expected in 5G [4]."]} +{"88495969|7851743": ["technique is not feasible due to which, there is a need for tuning and self-organization by the FBSs [13], [15]."]} +{"53018231|20384442": []} +{"53018231|206456479": ["Network slicing [157] and NFV [97] are two emerging concepts for resource allocation in the 5G ecosystem to provide cost-effective services with better performance."]} +{"53018231|18750590": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|5385031": ["Networks: Pricing and economic models have been widely applied to wireless networks [195], [196]."]} +{"53018231|12325031": ["Also, there are surveys discussing the applications of machine learning for networking such as [9], [10], [11], [12], and [13]."]} +{"58670108|21418": ["Working in the FD mode, mobile users can harvest energy and receive information from the AP using one antenna [15], and simultaneously utilize the harvested energy to transmit information to the AP using the other antenna."]} +{"58670108|3504276": ["On one hand, the information/energy FD operation at mobile users enables an additional benefit known as self-energy recycling [16], where each mobile user can harvest energy from its own transmitted information signals."]} +{"46893352|4502294": ["With the emergence of C-RAN, the conventional backhaul has evolved to a more complex network that can be divided into fronthaul, midhaul, and backhaul [9]."]} +{"51988843|22221919": ["NOMA schemes are briefly introduced in [11] and [12]."]} +{"51988843|3270620": []} +{"57763421|73678081": ["The long-range wireless communications is dominated by underwater acoustic (UWA) transmission [2]."]} +{"173188187|21705502": []} +{"173188187|22221919": ["In contrast to orthogonal multiple access (OMA) that serves users in different orthogonal resource blocks, NOMA is capable of serving multiple users with different quality of service (QoS) requirements using the same time-frequency resource by either power-domain or code-domain multiplexing, therefore offering a number of advantages, including improved spectrum efficiency, reduced end-toend latency, and massive connectivity [1].", "Code-Domain NOMA: Typical examples of code-domain NOMA are pattern division multiple access (PDMA) and sparse code multiple access (SCMA), which are based on the idea that one user\u2019s information is spread over multiple subcarriers [1, 4].", "For instance, for a case where six pairs of users are densely located, the typical factor graph matrix for SCMA is given in [1], and the typical PDMA pattern matrix is given in [4].", "Power-Domain NOMA: Power-domain NOMA superposes multiple users in the power domain and exploits the channel gain difference between multiplexed users [1].", "IEEE Wireless Communications \u2022 August 2019 149 ACCEPTED FROM OPEN CALL ing (CS)-based NOMA, and so on [1, 3]."]} +{"53280713|22221919": ["This power domain feature provides rich opportunities for NOMA to support massive connectivity and meet the users\u2019 diverse quality of service (QoS) requirements [2]."]} +{"69877765|22221919": ["Recently, based on the successive interference cancelation (SIC) [3] and the far near effect, it has been proved that the multicarrier power domain nonorthogonal multiple access (NOMA) can provide more connectivity opportunities and provide higher spectrum efficiency (SE) of the networks than the conventional orthogonal frequency division multiple access (OFDMA) in downlink transmissions [4].", "Previously, CRNOMA was only proposed to guarantee the quality of service (QoS) of all the users in power allocation schemes [4], [5],"]} +{"67770143|9978124": ["\u2026location has bene\ufb01ts for several applications, such as positioning of unmanned aerial vehicles (UAVs), ground robots, in factory automation, or for automated vehicles [93], as well as new disruptive applications in the contexts of virtual and augmented reality, gaming, social networking, etc. [94]."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"52192001|24785273": []} +{"52192001|22221919": ["Interested readers may refer to [23]\u2013[27] for the detailed literature survey."]} +{"51921032|3330461": ["Moreover, D2D communication is based on low power transmission that improves the energy efficiency and enables re-usability of the frequency spectrum, thus, enhancing spectral efficiency [2]."]} +{"53429416|22221919": []} +{"3860279|22221919": ["Note that the power allocation problems studied are network-based optimization problems since they are formulated based on a large-scale multicell HetNet, which are different from the single-cell-based power allocation problems in almost all the prior works (typically see [21]\u2013[23])."]} +{"52946522|21418": ["As such, innovative research on finding both spectrum and energy efficient techniques with low hardware cost is still imperative for realizing a sustainable wireless network evolution with scalable cost in the future [4]."]} +{"56594431|22221919": ["NON-ORTHOGONAL multiple access (NOMA) is considered to be a great potential technology for providing superior spectral efficiency in 5G wireless systems [1], [2]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"2424255|22221919": []} +{"150333780|22221919": ["N ON-ORTHOGONAL multiple access (NOMA) is a key enabler for spectrally ef\ufb01cient wireless communications in the \ufb01fth-generation (5G) cellular networks [3]\u2013[5].", "Hence, NOMA has been mainly exploited to improve user fairness [3]\u2013[5], [8]\u2013[11]."]} +{"174819908|88489458": ["V2X communications typically include vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) and vehicle-to-pedestrian (V2P) transmissions to enable real-time traffic information exchange among vehicles, pedestrians and infrastructure [4]\u2013[6]."]} +{"174819908|4709516": ["It is well known that the vehicular networks are dynamic due to the real-time change of road traffic, thereby inevitably bringing about the problem of unstable network topology [14]\u2013[16]."]} +{"174819908|38911919": ["However, a clustering method has been proposed that makes the network topology hierarchical and scalable by establishing a connectivity graph between vehicular networks nodes [17], and supports data dissemination"]} +{"70093533|206578365": ["One main challenge in edge caching is to strike a good trade-off between a massive data base and finite storage capacity [1].", "The main idea of mobile edge computing (MEC) was proposed for the first time in 2014 as an alternative to mobile cloud computing (MCC) by bringing storage, computation, and network control resources to edge nodes of a network [1]."]} +{"4952202|3270620": []} +{"52008841|52125636": ["Some review articles focused on specific aspects of VLC such as VLC channel modeling methods [28], noise optical sources and noise mitigation mechanisms [29], VLC-based positioning techniques for indoor and outdoor applications [30], and the pertinent issues associated with the outdoor usage of VLC in vehicular communication [31]."]} +{"52008841|3930401": ["In [27], authors explored the differences among optical wireless communications (OWC) technologies such as infrared communications, VLC, lightfidelity (LiFi), free space optical (FSO) communications, etc."]} +{"52008841|22221919": ["More details on NOMA in traditional RF networks are provided in [143], [144]."]} +{"52008841|10235514": []} +{"52008841|10979806": ["The EE can be improved by efficient resources optimization, power allocation, energy transfer and harvesting, and hardware solutions [87]."]} +{"52008841|12206204": ["95 exabyte-per-month in 2021 [1]), there is an urgent need to develop a fifth-generation (5G) of networks with a higher system-level spectral efficiency that will offer higher data rates, massive device connectivity, higher energy efficiency (EE), lower traffic fees, a more robust security, and ultralow latency [2]\u2013[4]."]} +{"52008841|12029139": ["Extensive work has been done to design, evaluate, and optimize simultaneous wireless information and power transfer in RF networks [160], [161]."]} +{"52008841|4395259": ["For the PLS in RF networks, readers can refer to [177] and [178]."]} +{"59993342|2509135": []} +{"59993342|7482876": []} +{"59993342|13367219": []} +{"59993342|1708582": []} +{"37925315|12681089": []} +{"122329170|53018231": ["Another thorough literature survey indicating various emerging applications of DL in communication networks is presented in [96]; where the highlighted applications are: dynamic spectrum access, joint user association, data caching and of\ufb02oading, security, connection preservation, traf\ufb01c routing,\u2026"]} +{"122329170|51929263": ["A survey on deep transfer learning methods has been presented in [104], where the deep transfer learning methods have been classi\ufb01ed into instance, mapping, network-, and adversarial-based transfer learning categories."]} +{"122329170|49411802": ["Furthermore, the recent article [157] analyzed the existing works on quantum games from three perspectives, namely, co-authorship, co-occurrence and co-citation, and also reviewed main quantum game models and applications."]} +{"122329170|52059869": ["To enable these and other services, the 5G network infrastructure is based on the revolutionary novel concepts of Network Function Virtualization (NFV) [51] and end-to-end Network Slicing (NS) [52]."]} +{"122329170|6197039": ["In order to secure the 6G communication links, physical layer security schemes [71] may be deployed in tandem with conventional cryptography schemes."]} +{"122329170|10235514": ["Further investigations and field trials are in progress [45] and the 5G standardization is expected to conclude with 3GPP Release 16 in the year 2020."]} +{"122329170|10979806": ["To this end the design efforts for 5G networks have considered energy-efficient approaches to network deployment and resource allocation, including new technologies such as M-MIMO and ultra-dense heterogeneous networks [62]."]} +{"122329170|19938676": ["Previous works have separately characterized ML, QC, QML, and communication networks, see e.g., [1], [28], [29], [39]\u2013[43], and [2], [3], [22], respectively."]} +{"122329170|4122595": ["In this regard, several survey papers including [107], [108] exist, which discuss various aspects of intelligent cognitive radio wireless networks."]} +{"122329170|6111895": ["Description of radio propagation channels characteristics for molecular communications is not well established in the literature [89]; for such communica-"]} +{"61810889|22221919": ["Non-orthogonal multiple access (NOMA) is suggested for LTE enhancements and 5G systems for higher spectral efficiency [6]."]} +{"85555771|9651858": ["With limited available wireless resources, including radio spectrum and transmit power, meeting higher data requirements will only be possible through novel techniques and ef\ufb01cient resource utilizations [16].", "Recently, energy ef\ufb01cient techniques are considered as one of the key avenues for addressing these issues in the development of future wireless systems [16]."]} diff --git a/edge/graph_211260116.jsonl b/edge/graph_211260116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d3d784d1d2d15b68822bd23ffb085774e1622f8b --- /dev/null +++ b/edge/graph_211260116.jsonl @@ -0,0 +1,47 @@ +{"117497949|52014912": ["THE growing interest in compact cooperative flights of Unmanned Aerial Vehicles (UAVs) [1] motivates an ongoing pursuit for efficient and embeddable onboard source of mutual relative localization."]} +{"209094447|52014912": []} +{"209094447|10235514": []} +{"209094447|17024419": []} +{"3800579|29776467": []} +{"3800579|65041751": []} +{"3800579|2473564": []} +{"3800579|14814753": []} +{"3800579|7665100": []} +{"202676119|9975315": ["A leader-follower architecture combined with autonomous intra-swarm coordination allows easier operation by a single ground supervisor [37], permitting him to treat the swarm as a single entity."]} +{"202676119|5724477": ["In the simplest scenario, the latter may consist in a set of rules regarding the relative positions of targets in the 3D map, but more elaborate methods can be exploited (e.g., on-line activity recognition from the visual input [72])."]} +{"1171257|17262196": []} +{"3399083|468992": ["(2006); Bredeche et al. (2009) and Wolpert and Tumer (2008). Evaluation Time The robots must run a controller for some time to assess the resultant behaviour. This implies a time sharing scheme where robots run their current controllers to evaluate their performance. In many similar implementations, a robot runs a controller for a fixed evaluation time; Haasdijk et al. (2012) showed that this is a very important parameter in encapsulated on-line evolution, and it is likely to be similarly influential in embodied evolution. Evaluation in Varying Circumstances Because the evolutionary machinery (mating, evaluating new individuals, etc.) is an integral part of robot behaviour which runs in parallel with the performance of regular tasks, there can be no thorough re-initialisation or re-positioning procedure between genome replacements. This implies a noisy evaluation: a robot may undervalue a genome starting in adverse circumstances and vice versa. As Nordin and Banzhaf (1997, p.121) put it: \u201cEach individual is tested against a different real-time situation leading to a unique fitness case. This results in \u2018unfair\u2019 comparison where individuals have to navigate in situations with very different possible outcomes. However, [. . . ] experiments show that over time averaging tendencies of this learning method will even out the random effects of probabilistic sampling and a set of good solutions will survive\u201d. Bredeche et al. (2009) proposed a re-evaluation scheme to address this issue: seemingly efficient candidate solutions have a probability to be re-evaluated in order to cope with possible evaluation noise. A solution with a higher score and a lower variance will then be preferred to one with a higher variance. While re-evaluation is not always used in embodied evolution, the evaluation of relatively similar genomes on different robots running in parallel provides another way to smooth the effect of noisy evaluations. Multiple Objectives To deal with multiple objectives, evolutionary computation techniques typically selects individuals on the basis of Pareto dominance. While this is eminently possible when selecting partners as well, Pareto dominance can only be determined vis \u00e0 vis the population sample that the selecting robot has acquired. It is unclear how this affects the overall performance and if the robot collective can effectively cover the Pareto front. Haasdijk et al. (2014a) and Bangel and Haasdijk (2017) investigated the use of a \u2018market mechanism\u2019 to balance the selection pressure over multiple tasks in a concurrent foraging scenario, showing that this at least prevents the robot collective from focussing on single tasks, but that it does not lead to specialisation in individual robots.", "(2006); Bredeche et al. (2009) and Wolpert and Tumer (2008). Evaluation Time The robots must run a controller for some time to assess the resultant behaviour.", "(2006); Bredeche et al. (2009) and Wolpert and Tumer (2008). Evaluation Time The robots must run a controller for some time to assess the resultant behaviour. This implies a time sharing scheme where robots run their current controllers to evaluate their performance. In many similar implementations, a robot runs a controller for a fixed evaluation time; Haasdijk et al. (2012) showed that this is a very important parameter in encapsulated on-line evolution, and it is likely to be similarly influential in embodied evolution.", "(2006); Bredeche et al. (2009) and Wolpert and Tumer (2008). Evaluation Time The robots must run a controller for some time to assess the resultant behaviour. This implies a time sharing scheme where robots run their current controllers to evaluate their performance. In many similar implementations, a robot runs a controller for a fixed evaluation time; Haasdijk et al. (2012) showed that this is a very important parameter in encapsulated on-line evolution, and it is likely to be similarly influential in embodied evolution. Evaluation in Varying Circumstances Because the evolutionary machinery (mating, evaluating new individuals, etc.) is an integral part of robot behaviour which runs in parallel with the performance of regular tasks, there can be no thorough re-initialisation or re-positioning procedure between genome replacements. This implies a noisy evaluation: a robot may undervalue a genome starting in adverse circumstances and vice versa. As Nordin and Banzhaf (1997, p.121) put it: \u201cEach individual is tested against a different real-time situation leading to a unique fitness case. This results in \u2018unfair\u2019 comparison where individuals have to navigate in situations with very different possible outcomes. However, [. . . ] experiments show that over time averaging tendencies of this learning method will even out the random effects of probabilistic sampling and a set of good solutions will survive\u201d. Bredeche et al. (2009) proposed a re-evaluation scheme to address this issue: seemingly efficient candidate solutions have a probability to be re-evaluated in order to cope with possible evaluation noise.", "\u2026for a review) and with a plethora of bioinspired control rules for swarm-like collective robotics (see Nouyan et al. (2009) and Rubenstein et al. (2014) for recent examples involving real robots and Beni (2005), Brambilla et al. (2012), and Bayindir (2016) for discussions and recent reviews).", "Please read and use the following updated open-access version for citation: \u2022 Bredeche N, Haasdijk E and Prieto A (2018) Embodied Evolution in Collective Robotics: A Review.", ", Bredeche, N., Mouret, J.-B., and Eiben, A. (2015). Evolutionary Robotics: What, Why, and Where to.", "Please read and use the following updated open-access version for citation: \u2022 Bredeche N, Haasdijk E and Prieto A (2018) Embodied Evolution in Collective Robotics: A Review. Front. Robot. AI 5:12. doi: 10.3389/frobt.2018.00012 1 Introduction This paper provides an overview of evolutionary robotics research where evolution takes place in a population of robots in a continuous manner. Ficici et al. (1999) coined the phrase embodied evolution for evolutionary processes that are distributed over the robots in the population to allow them to adapt autonomously and continuously.", "Montanier and Bredeche (2011) showed that embodied evolution enables the population to react appropriately to changes in the regrowth rate of resources, but generally this aspect of embodied evolution has to date not been sufficiently addressed.", "(2006); Bredeche et al. (2009) and Wolpert and Tumer (2008).", ", Bredeche, N., Mouret, J.-B., and Eiben, A. (2015). Evolutionary Robotics: What, Why, and Where to. Frontiers in Robotics and AI, 2(March):1\u201318. Eiben, A. and Smith, J. (2008). Introduction to Evolutionary Computing."]} +{"49885447|468992": []} +{"51867754|468992": ["By using many simple and cheap robots, it is hoped that goals such as pollution control, mapping and exploration, and disaster recovery could be met in ways which are resilient, scalable and decentralised [1]."]} +{"2717018|468992": ["This does not mean that evolutionary robotics is deemed to failure, as the several successful Swarm Intell experiences demonstrate (Trianni and Nolfi 2011; Brambilla et al. 2013).", "\u2026presents several major challenges, among which the difficulty to reward the individual contribution to the global behaviour (i.e., the credit assignment problem), the large size of the state space, and the dynamic and uncertain working conditions\u2014for a discussion, see Brambilla et al. (2013).", "For an extensive review of the swarm robotics literature, we refer the reader to Brambilla et al. (2013).", "The application of the behavior-based approach to swarm robotics is straightforward, and has been the most common choice to date (Brambilla et al. 2013)."]} +{"201872741|44118313": []} +{"201872741|468992": []} +{"201872741|18701981": []} +{"201872741|8767649": []} +{"6719512|468992": ["A swarm robotics system consists of autonomous robots with local sensing and communication capabilities , lacking centralized control or access to global information , situated in a possibly unknown environment performing a collective action (Brambilla et al., 2013).", "The control community subsequently established a formal framework (Olfati-Saber et al., 2007; Ren and Beard, 2008; Jadbabaie et al., 2003b), which has been put into practice and expanded by multi-robot systems and swarm robotics community (Brambilla et al., 2013; Turgut et al., 2008).", "Using the taxonomy introduced by Brambilla et al. (Brambilla et al., 2013), our decentralized cooperative control strategy follows a behavior-based design approach in a similar vein as Vicsek et al. (Vir \u00b4 agh et al., 2014).", "The system is thus capable of performing global collective actions under a wide range of group sizes (scalability), despite the possible sudden loss of multiple agents (robustness), and under unknown and dynamic circumstances (\ufb02exibility) (Brambilla et al., 2013).", "Swarm robotics systems mimic natural swarms in that communications between units is restricted to local information exchanges through short-range interactions (Brambilla et al., 2013)."]} +{"6719512|8767649": ["Based on this de\ufb01nition, one can easily distinguish swarm robotics systems from other multi-robot approaches (Iocchi et al., 2001)."]} +{"14273915|2204231": []} +{"14273915|468992": ["Although the literature describes a number of robot swarms that have been developed and demonstrated, a reliable engineering approach to the design of control software for robot swarms is still at dawn (Brambilla et al., 2013)."]} +{"5561185|468992": ["The current practice of swarm behavior development focuses on individual behaviors and low-level interactions [3]."]} +{"468992|1708582": ["RL has been intensively studied in the single robot case where an elegant and unified mathematical framework has been developed (Kaelbling et al. 1996; Sutton and Barto 1998).", "We first introduce reinforcement learning (Kaelbling et al. 1996; Sutton and Barto 1998) and we identify the key challenges in the application of the methods developed for reinforcement learning to swarm robotics.", "For a more formal introduction and more details about RL, the interested reader can refer to Kaelbling et al. (1996)."]} +{"468992|8767649": ["In this review, we use these characteristics to discriminate between the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al., 2001).", "In this review, we use these characteristics to discriminate the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al. 2001).", "replicate the behavior observed in cockroaches by Jeanson et al. (2005). The robots are able to collectively aggregate in a circular arena using a PFSM approach."]} +{"1072953|8953108": ["Much previous work has been done on automatic thresholding (surveyed in [15]), but here we propose a computationally simple approach that allows prior knowledge of the average aircraft dynamics and imaging areas to be incorporated."]} +{"15416390|1452734": ["Developmental robotics [108,109] addresses the problem of environmental-based learning by attempting to endow robotswithenvironmentallystimulatedself-organizingabilitiesor environmentally stimulated novelty-seeking.", "This broader area of inquiry includes developmental robotics [108,109], artificial life, and a variety of other non-evolutionary computation-based machine learning specialties applied to fully autonomous systems."]} +{"52014912|468992": ["swarms [2], we emphasize swarms of aerial robots flying in a 3-D world."]} +{"52014912|1708582": ["\u2026approaches are pervasive in both the machine learning and con-trol \ufb01elds for dealing with complexity and high dimensionality (e.g., hierarchical task networks [11], hierarchical tree or lattice networks employed in sequential game theory [12], and singular perturbation theory [13], [14])."]} +{"202540292|1229096": ["This is especially true for applications such as aerial vehicles [18] and autonomous cars [16]."]} +{"62860406|6951208": []} +{"203923287|49862415": ["A detailed overview of object detection systems using Deep Learning including comparisons in terms of accuracy and e \ufb03 ciency can be found in [59,60]."]} +{"15019293|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"14793313|468992": []} +{"53039685|468992": ["The real parameter \u03b1 \u2208 [1, 5] controls the speed of divergence.", "Often control software is designed manually in a trial-and-error process [5].", "In swarm robotics, a group of simple robots works together to achieve a common goal that is beyond the capabilities of a single robot [2,4,5,11,19,34].", "The speed of convergence towards the detected peers is controlled by a real parameter \u03b1 \u2208 [1, 5]."]} +{"59599914|61132": ["Furthermore, the dynamic nature of UAVs pose some additional challenges, e.g., if a single node goes down, self-organization is required, and if not addressed carefully, it may a\ufb00ect the availability [25]."]} +{"46986051|24847": ["Thirdly, swarm design patterns should be created based on an extensive set of experiments and attention should be paid to their generality and reusability (Fernandez-Marquez et al., 2013).", "Multiple design patterns are then combined within a single program and the programmer decides how to implement them together, given a specific application and hardware available (Hern\u00e1ndez et al., 2013; Fernandez-Marquez et al., 2013).", "This makes BDRML a suitable choice for representing design patterns for robot swarms, where information processing and exchange play a pivotal role (Trianni et al., 2011; Wang et al., 2012; Fernandez-Marquez et al., 2013; Miller et al., 2014; Reina et al., 2015).", "For example a \u201cGradient\u201d pattern can be composed from a \u201cSpreading\u201d and an \u201cAggregation\u201d patterns (Fernandez-Marquez et al., 2013).", ", 2017b) \u2022Increases the probability of incurring misinformation cost, as a result of outdated information potentially being spread across the swarm (Gardelli et al., 2007; Fernandez-Marquez et al., 2013; Pitonakova et al., 2017b) \u2022Can lead to the spread of erroneous information among robots, e.", "Other related patterns include \u201cEvaporation\u201d (Gardelli et al., 2007; Fernandez-Marquez et al., 2013), \u201cDiffusion\u201d (Gardelli et al.", "Other related patterns include \u201cEvaporation\u201d (Gardelli et al., 2007; Fernandez-Marquez et al., 2013), \u201cDiffusion\u201d (Gardelli et al., 2007), \u201cGradient\u201d, \u201cDigital pheromone\u201d and \u201cAnt foraging\u201d (Fernandez-Marquez et al., 2013) 4.4.", "Each design pattern includes the following properties (as in, e.g., Gamma et al., 1994; De Wolf and Holvoet, 2007; Gardelli et al., 2007; Fernandez-Marquez et al., 2013):", ", 1994), but also featured additional information due to the complex nature of multi-robot systems, including (Gardelli et al., 2007; Fernandez-Marquez et al., 2013):", "In swarm robotics, a design pattern usually defines a part of a robot control algorithm that is responsible for a specific robot behaviour (e.g., Nagpal, 2004; Gardelli et al., 2007; Fernandez-Marquez et al., 2013).", "Information processing and exchange have previously been emphasised as important elements of any swarm behaviour (e.g., Trianni et al., 2011; Wang et al., 2012; Fernandez-Marquez et al., 2013; Miller et al., 2014; Reina et al., 2015), and are therefore the main focus of the patterns presented here."]} +{"12606136|468992": ["In swarm robotics, foraging serves as an metaphor for a broad range of important problems involving: cooperative exploration, navigation, resource localisation, and recruitment [34, 35]."]} +{"109358014|6327434": ["Fault diagnosis algorithms were reviewed in Willsky (1976) and Frank (1990)."]} +{"14069817|2204231": ["When the task to which solutions are sought reaches a certain level of complexity, traditional evolutionary approaches are prone to suffer from bootstrap problems and deception [41, 42]."]} +{"14069817|468992": ["Swarm robotics systems (SRS) are a promising approach to collective robotics, in which large groups of relatively simple and autonomous robots are able to display collectively intelligent behavior [1].", "ER has become a popular alternative to manual programming in a variety of SRS applications [1].", "As discussed by Brambilla et al. [1] and Bay\u0131nd\u0131r [3] in recent reviews of the field of swarm robotics, all real-robot experiments presented in the literature covered have, in fact, been performed in controlled laboratory environments such as enclosed arenas in which the relevant conditions are defined by the experimenter.", "[1]: (i) robots are autonomous; (ii) robots are situated in the environment; (iii) robots\u2019 sensing and communication capabilities are local (up to 40 m, while the robots can be over 200 m apart from each other); (iv) robots do not have access to centralized control and/or to global information; and (v) robots cooperate to solve a given task.", "world domains, such as search and rescue, exploration, surveillance, and clean up [1, 2].", "This problem is exacerbated when trying to achieve behaviors capable of dealing with the complexity of real tasks and uncontrolled environments, as opposed to the abstract tasks and highly controlled environments that have been used in the majority of previous works [1, 3].", "Despite the advances in the field, SRS have, however, up to this point not leveraged their full potential, and have been confined to controlled laboratory environments [1], still far from realworld applications.", "As discussed by Brambilla et al.[1] and Bay\u0131nd\u0131r [3] in recent reviews of the field of swarm robotics, all realrobot experiments presented in the literature covered have, in fact, been performed in controlled laboratory environments such as enclosed arenas in which the relevant conditions are defined by the experimenter.", "All the collective tasks presented in this paper can be classified as swarm robotics tasks, according to the classification proposed by Brambilla et al. [1]: (i) robots are autonomous; (ii) robots are situated in the environment; (iii) robots\u2019 sensing and communication capabilities are local (up to 40 m, while the robots can be over 200 m apart from each other); (iv) robots do not have access to centralized control and/or to global information; and (v) robots cooperate to solve a given task.", "SRS are typically associated with ground robots [1, 8] and, more recently, with aerial robots [9, 10].", "Clustering, also known as aggregation, is a canonical task in swarm robotics [1]."]} +{"15921522|2204231": ["The interested reader can refer to recent reviews highlighting the variety of methodologies and problems addressed in ER (Floreano and Keller, 2010; Bongard, 2013; Bongard and Lipson, 2014; Doncieux and Mouret, 2014).", "Each choice may introduce selective pressures and/or alter the search space (Doncieux and Mouret, 2014), and needs to be performed with a principled methodological approach.", "Novel algorithmic solutions and design methods should also be proposed, and systematically contrasted with the state of the art, possibly in the context of a wellconceived benchmarking exercise (Clune et al., 2011; Mouret and Doncieux, 2012; Trianni and L\u00f3pez-Ib\u00e1\u00f1ez, 2014).", "The way in which the ecological context is explored during the evolutionary optimization may produce selective pressures that have a bearing on the flexibility and robustness of the generated solutions [see also the already mentioned review by Doncieux and Mouret (2014)]."]} +{"20999239|1932843": ["Recently, paradigms such as reinforcement learning [12], learning-by-demonstration [2] and transfer learning [25] are proving a natural means to train various robotics systems."]} +{"49397158|7660436": ["telescope mirrors or solar panels in space to the build-up of entire space stations (Leitner, 2009).", "Finally, constellation formations such as those created by GPS satellites are typically characterised by highly dispersed nodes that provide some service coverage for positioning or communication (Leitner, 2009).", "Such modular satellites have been envisioned for a large range of applications from building large\n34 Aerial Collective Systems\ntelescope mirrors or solar panels in space to the build-up of entire space stations (Leitner, 2009)."]} +{"52166168|586323": ["This amount of microphones is very popular when carrying out multiple sound source localization [11]."]} diff --git a/edge/graph_211296655.jsonl b/edge/graph_211296655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dcc5c24955216b958071179b5af48594c26840bd --- /dev/null +++ b/edge/graph_211296655.jsonl @@ -0,0 +1,24 @@ +{"4563592|31245252": ["backend infrastructure [3], which need to be addressed to ensure a smooth development of this promising technology."]} +{"4415243|7679009": []} +{"4415243|12819773": ["In [155], for example, the authors propose a taxonomy and survey of cloud orchestration techniques.", "Several works have somehow addressed the theme of orchestration in different scopes, including clouding computing [155], SDN [82], [88], and NFV [158], [100], [11]."]} +{"4415243|44621519": ["Similarly, several (academic and industrial) research and (commercial) development efforts in orchestration, SDN and NFV have been going in recent years, concretized in a number of collaborative endeavors such as OSM [5], OpenStack [6], ONAP [7], 5G-EX [8], CORD [9], etc.", "Similarly, several (academic and industrial) research and (commercial) development efforts in orchestration, SDN and NFV have been going in recent years, concretized in a number of collaborative endeavors such as Open Source MANO (OSM) [5], OpenStack [6], Open Network Automation Platform (ONAP) [7], 5G-Exchange (5G-EX) [8], Central Office Re-architected as a Datacenter (CORD) [9], etc."]} +{"4415243|18167210": [", networks, servers, storage, and services) with high flexibility, cost efficiency, and centralized management [90]."]} +{"4415243|6583734": ["stance, the NFV should meet performance requirements to support, in a standard server, the packet processing, including high I/O speed, fast transmission, and short delays [158].", "Templates and standards should be developed to guarantee automated and consistent translation [158].", "Several works have somehow addressed the theme of orchestration in different scopes, including clouding computing [155], SDN [82], [88], and NFV [158], [100], [11]."]} +{"4415243|8650651": []} +{"4415243|15449163": []} +{"53280254|3750204": ["For mainstream GPU applications such as bigdata analytics [21] and machine learning [22], one application could fully occupy the resource of one or multiple SMs, which could achieve a high utilization efficiency of GPU."]} +{"4809123|10559330": ["2There may also be contention within the fabric connecting different servers; that is outside the scope of this paper, but we envisage that standard fabric QoS and provisioning mechanisms [6, 54] can be applied there."]} +{"88483588|4415243": ["Whereas orchestration is out of the scope of this paper, [11] and [28] testify that effort is ongoing into making it possible to harness acceleration techniques in a seamless way.", "An overview of efforts from research projects, standardization bodies, and both open-source and commercial implementations is provided in [28]."]} +{"88483588|11414835": ["A survey of SDN hypervisors is available in [26].", "This paper leverages the technologies described in [26] and clearly build upon [25]; speci\ufb01cally, we go one step further with respect to [25] by understanding how functions can be implemented and, especially, accelerated with either software, hardware, or hybrid approaches."]} +{"6758116|6583734": ["However, we emphasize that the virtualization and deployment of network functions do not necessarily rely on SDN technologies, and viceversa [4], [35]."]} +{"26428978|6583734": []} +{"26428978|2623404": ["Since NFV deals with implementing the network services as software, SDN plays an important role in the orchestration of NFV [58, 65, 110].", "Recent advancements in the field of SDN and NFV allow ISPs to deploy many network services over the virtualized infrastructures [4, 24, 58, 65, 89].", "Advances in SDN have already addressed most of these aforementioned problems [27, 58]."]} +{"26428978|2387055": ["There have been recent studies towards the security in cloud and virtualized environments [113-115]."]} +{"26428978|39706822": ["As mentioned by John et al. [48], WSDL helps define web services from a technical perspective, including the aspects of a service, its interfaces, operations, endpoints, binding, and type definitions.", "[16], cloud service declarative definition language (CSDL) [21], SUN [22], and SMI [23] focus on the description of the services in the clouds.", "One of the most prominent ways for the service description in the Internet is Web Service Description Language (WSDL) [16, 48].", "NFF Network function forwarder\nNFV Network function virtualization\nNFVI Network function virtualization infrastructure\nNFVMANO\nNFV Management And Orchestration\nNMS Network management system\nNP Nondeterministic polynomial\nNS Network service\nNSH Network service header\nNVF Network virtual function\nOA&M Operations, administration and management\nOF OpenFlow\nOPEX Operational expenses\nPaaS Platform as a Service\nPM Physical machine\nQoS Quality of service\nSDL Service description language\nSDN Software defined networking\nSF Service function\nSFC Service function chaining\nSFCC Service function chaining controller\nSFCR Service function chaining router\nSFF Service function forwarder\nSFP Service function path\nSLA Service level agreement\nSMI Service measurement index\nSWA Software architecture\nUSDL Unified service description language\nVF Virtual function\nVIM Virtualized Infrastructure Manager\nVM Virtual machine\nVNF Virtual network function\nVNFC Virtual network function component\nVNFFG VNF Forwarding Graph\nVNFM VNF Manager\nWSDL Web service description language\nII.", "USDL has significant applicability to Internet service discovery, comparison, evaluation and management, enabling rigorous decision-making by service requestors [16].", "[16], there is a lack of a comprehensive specification model for cloud services covering multiple perspectives.", "WSDL is not sufficient for the specification of network services [48].", "[16] provide a detailed description and discussion for these languages.", "For example, current WSDLs may not support dynamic traffic steering among the various branches of the service functions, which may be formed due to SFC. Beek et al. and O'Sullivan have focused on the definition of non-functional properties of the electronic services with the purpose of improving the technology of automated service discovery, comparison, selection and substitution [18, 19]."]} +{"18859281|8450611": []} +{"201620621|206456479": ["Most of these verticals will be delivered as a service chain over multiple independent network operators collaborating with each other [1]."]} +{"206904221|4718973": ["Proxy [34] Flow, session Mapping, rewrite and routing Similarity detect, caching, proxy rule", "Firstly, due to the fact that middle-boxes are standalone and closed, they naturally introduce new failures when they crash, and the diagnosis for these failures and some mis-configurations would be rather complex [34] ."]} +{"206904221|20991784": []} +{"206904221|9495329": []} +{"206904221|11414835": []} +{"206904221|4269723": []} diff --git a/edge/graph_211298117.jsonl b/edge/graph_211298117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..514e204bd9dadb986a36efba2691c6388f30cd4d --- /dev/null +++ b/edge/graph_211298117.jsonl @@ -0,0 +1,32 @@ +{"52114676|65219850": []} +{"52884516|8310135": []} +{"17826594|8310135": ["Named entities (NEs) have received much attention over the last two decades (Nadeau and Sekine, 2007), mostly focused on recognizing the boundaries of textual NE mentions and classifying them as, e.g., Person, Organization or Location.", "Named entities (NEs) have received much attention over the last two decades (Nadeau and Sekine, 2007), mostly focused on recognizing the boundaries of textual NE mentions and classifying them as, e."]} +{"4626036|8310135": []} +{"2088400|885218": ["The integration of domain ontologies in OntoILPER IE process has the big advantage of improving system portability by allowing the adaptation of system behaviour via chances in the ontology [20].", "Keywords\u2014 Relation Extraction; Ontology-based Information Extraction; Ontology Population; Inductive Logic Programming;\nI. INTRODUCTION The goal of IE consists in discovering and structuring information found in semi-structured or unstructured documents, leaving out irrelevant information [10].", "Contrarily to previous ACE programmes, these datasets introduced a type and subtype hierarchy to entities and relations mentions, a crucial step towards OBIE [20], which makes the task even more challenging.", "This process is also known as Ontology Population [20].", "In OntoILPER, relying on the domain ontology in the RE process enables: (i) reasoning for improving RE; (ii) storage of the extracted information in a more flexible formalism than databases, (iii) performing Ontology Population; and (iv) system portability, by allowing the adaptation of its behaviour via changes in the ontology.", "In fact, OntoILPER as an OBIE system can be regarded as an OP system, since it is able to assimilate extracted instances into the domain ontology.", "Ontology Population.", "OntoILPER can also be regarded as an Ontology-based Information Extraction (OBIE) system, performing the ontology population (OP) task [20].", "As already mentioned, reACE 2004/2005 corpora defined both entity and relation hierarchies, providing a useful scenario for evaluating OntoILPER as an OBIE system, since hierarchical classification is made possible using these datasets.", "\u2022 (EQ-2) In an OBIE scenario, what is the influence of ontological hierarchical information on the results?"]} +{"2088400|15273230": ["The most straightforward way of dealing with this problem consists in employing sampling techniques, such as undersampling [3], which selects a subset of negative examples for training.", "Reference [3] pointed out that datasets with unbalanced class distributions present a number of problems for all machine learning algorithms."]} +{"16320392|2082499": ["Another related problem is record linkage [34], [35], [36], [37], [38], [39], [40], [41] (also called duplicate detection, entity matching, and reference reconciliation) in the database community."]} +{"16320392|8310135": []} +{"16320392|386036": []} +{"14106304|15529291": ["For a comprehensive survey of the approaches for author name disambiguation, you could refer to the survey paper [8]."]} +{"28333457|10500613": ["[Rahm & Bernstein 2001] E. Rahm and P. A. Bernstein."]} +{"2657822|8310135": ["A plethora of named entity recognition techniques and systems is available for general full text (cf. Nadeau & Sekine, 2007; Roberts, Gaizauskas, Hepple, & Guo, 2008; Marrero, Sanchez-Cuadrado, Lara, & Andreadakis, 2009)."]} +{"10046354|11777996": ["Recent years have witnessed increased interest in keyphrase extraction (Gollapalli et al., 2015), and several benchmark datasets have become available in various domains and languages (Hasan and Ng, 2014).", "However, this framework requires users to learn UIMA before they can get started, and does not provide supervised approaches that are known to perform better (Hasan and Ng, 2014)."]} +{"5112317|8310135": []} +{"2086183|8310135": []} +{"49587276|18484924": ["They also achieved 78.72 on Arabic, 72.19 on Czech and 91.30 on Turkish.", "There have also been surveys focused on NER systems for speci\ufb01c domains and languages, including biomedical NER, (Leaman and Gonzalez, 2008), Chinese clinical NER (Lei et al., 2013), Arabic NER (Shaalan, 2014; Etaiwi et al., 2017), and NER for Indian languages (Patil et al., 2016).", "NER shared tasks have also been organized for a variety of other languages, including Indian languages (Rajeev Sangal and Singh, 2008), Arabic (Shaalan, 2014), German (Benikova et al., 2014), and slavic languages (Piskorski et al., 2017).", "(2016) implemented word level feed forward NN, bi-directional LSTM (bi-LSTM) and window bi-LSTM for NER of English, German and Arabic."]} +{"49587276|1271753": ["Eltyeb and Salim (2014) presented an survey of various NER systems developed for such NER datasets with a focus on chemical NER."]} +{"49587276|42939535": ["There have also been surveys focused on NER systems for speci\ufb01c domains and languages, including biomedical NER, (Leaman and Gonzalez, 2008), Chinese clinical NER (Lei et al., 2013), Arabic NER (Shaalan, 2014; Etaiwi et al., 2017), and NER for Indian languages (Patil et al., 2016)."]} +{"49587276|8310135": ["These systems were followed by NER systems based on feature-engineering and machine learning (Nadeau and Sekine, 2007).", "The \ufb01rst comprehensive NER survey was Nadeau and Sekine (2007), which covered a variety of supervised, semi-supervised and unsupervised NER systems, highlighted common features used by NER systems during that time, and explained NER evaluation metrics that are still in use today."]} +{"88389|1142636": []} +{"37330540|14586568": ["Situated between natural languages \u2013 that are expressive but sometimes ambiguous, and formal languages \u2013 that are semantically limited but precise, Controlled Natural Languages (CNL) proved valuable for automatic translation and interfaces with human agents [1]."]} +{"12645846|8310135": ["Semi-Supervised Learning (SSL) and Unsuper-vised Learning (UL) approaches attempt to solve this problem by either providing a small initial set of labeled data to train and seed the system, or by resolving the extraction problem as a clustering one (Nadeau and Sekine, 2007)."]} +{"56895382|49587276": ["Yadav and Bethard [24] presented a short survey of recent advances in NER based on representations of words in sentence.", "Traditional approaches to NER are broadly classified into three main streams: rule-based, unsupervised learning, and feature-based supervised learning approaches [1], [24].", "More germane to this work are the two recent surveys [24], [25] in 2018.", "Yadav and Bethard [26] presented a short survey of recent advances in NER based on representations of words in sentence.", "Why we use a new taxonomy in this survey? Existing taxonomy [24], [86] is based on character-level encoder, word-level encoder, and tag decoder."]} +{"56895382|1708582": ["Reinforcement learning (RL) is a branch of machine learning inspired by behaviorist psychology, which is concerned with how software agents take actions in an environment so as to maximize some cumulative rewards [161], [162]."]} +{"56895382|8310135": ["A typical approach of unsupervised learning is clustering [1].", "Feature vector representation is an abstraction over text where a word is represented by one or many Boolean, numeric, or nominal values [1], [55].", "N AMED Entity Recognition (NER) aims to recognize mentions of rigid designators from text belonging to prede\ufb01ned semantic types such as person, location, organization etc [1].", "Nadeau and Sekine [1] claimed that the word \u201c Named \u201d restricted the task to only \u2022 J. Li those entities for which one or many rigid designators stands for the referent.", "More feature designs are discussed in [1], [28], [67] Based on these features, many machine learning algorithms have been applied in supervised NER, including Hidden Markov Models (HMM) [68], Decision Trees [69], Maximum Entropy Models [70], Support Vector Machines (SVM) [71], and Conditional\u2026", "Traditional approaches to NER are broadly classi\ufb01ed into three main streams: rule-based, unsupervised learning, and feature-based supervised learning approaches [1], [26].", "However, it is problematic because the \ufb01nal scores are comparable only when parameters are \ufb01xed [1], [22], [23].", "Arguably the most established one was published by Nadeau and Sekine [1] in 2007."]} +{"49868781|8310135": ["Named entity recognition [29], coreference resolution [38], and word sense disambiguation [28, 30] represent efforts to this effect at the document and corpus level, where named entity linking is concerned with connecting passages to standardized resolution targets known as knowledge bases [34]."]} +{"570683|2746910": [", Cm can only lead to a high predictive performance when these classifiers are accurate and diverse [45]."]} +{"570683|8310135": ["Nowadays, hand-crafted rules for recognizing NEs are usually implemented when no training examples are available for the domain or language to process [32].", "One of the first research papers in the field of named entity recognition (NER) was presented in 1991 [32]."]} +{"53094884|14774186": []} +{"3701267|8310135": []} +{"6111745|386036": ["The task of discovering links between knowledge bases is closely related with record linkage [22, 9] and de-duplication [7]."]} +{"15491909|8310135": ["named entity recognition (individual induction) [27]"]} diff --git a/graph_2113024.jsonl b/edge/graph_2113024.jsonl similarity index 100% rename from graph_2113024.jsonl rename to edge/graph_2113024.jsonl diff --git a/edge/graph_211476565.jsonl b/edge/graph_211476565.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..829bf13d3c27a0afcf40ba23f6ff8c0c4f1c7fa3 --- /dev/null +++ b/edge/graph_211476565.jsonl @@ -0,0 +1,2 @@ +{"4855722|12068725": []} +{"14418263|8530790": ["1 (0.1, 0.2, 0.9) (0.1, 0.1, 0.4) (1, 1, 2) 1.33 0.922 2 (0.2, 0.1, 0.5) (0.1, 0.1, 0.1) (1, 1, 1) 1.0 0.90 3 (0.4, 0.3, 0.4) (0.2, 0.1, 0.1) ( 2 , 1, 1) 1.33 0.922 4 (0.8, 0.9, 0.0) (0.4, 0.6, 0.4) (3, 2, 2) 2.33 0.99", "1 (0.1, 0.2, 0.9) (0.1, 0.1, 0.4) (1, 1, 2 ) 1.33 0.922 2 (0.2, 0.1, 0.5) (0.1, 0.1, 0.1) (1, 1, 1) 1.0 0.90 3 (0.4, 0.3, 0.4) (0.2, 0.1, 0.1) (2, 1, 1) 1.33 0.922 4 (0.8, 0.9, 0.0) (0.4, 0.6, 0.4) (3, 2, 2) 2.33 0.99", "1 (0.1, 0.2, 0.9) (0.1, 0.1, 0.4) (1, 1, 2) 1.33 0.922 2 (0.2, 0.1, 0.5) (0.1, 0.1, 0.1) (1, 1, 1) 1.0 0.90 3 (0.4, 0.3, 0.4) (0.2, 0.1, 0.1) (2, 1, 1) 1.33 0.922 4 (0.8, 0.9, 0.0) (0.4, 0.6, 0.4) (3, 2, 2 ) 2.33 0.99", "1 (0.1, 0.2, 0.9) (0.1, 0.1, 0.4) (1, 1, 2) 1.33 0.922 2 (0.2, 0.1, 0.5) (0.1, 0.1, 0.1) (1, 1, 1) 1.0 0.90 3 (0.4, 0.3, 0.4) (0.2, 0.1, 0.1) (2, 1, 1) 1.33 0.922 4 (0.8, 0.9, 0.0) (0.4, 0.6, 0.4) (3, 2 , 2) 2.33 0.99"]} diff --git a/edge/graph_211505964.jsonl b/edge/graph_211505964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d84cd3e26f0b5b6c32c5589dc072276c623d11eb --- /dev/null +++ b/edge/graph_211505964.jsonl @@ -0,0 +1 @@ +{"14408688|8124666": ["reduce by key([0, 0, 1, 1, 1, 2], [10, 20, 30, 40, 50, 60])\u2192 [0, 1, 2], [30, 120, 60].", "AMG methods have been successfully parallelized on distributed-memory CPU clusters using MPI [12, 10] and more recently with a combination of MPI and OpenMP [2], to better utilize multicore CPU nodes.", "exclusive scan([3, 4, 1, 5, 2], 10)\u2192 [10, 13, 17, 18, 23],", "sort by key([3, 4, 1, 5, 2], [10, 20, 30, 40, 50])\u2192 [1, 2, 3, 4, 5], [30, 50, 10, 20, 40].", "Algebraic multigrid methods have been successfully parallelized on distributed-memory CPU clusters using MPI [12, 10] and more recently with a combination of MPI and OpenMP [2], to better utilize multi-core CPU nodes."]} diff --git a/edge/graph_211505976.jsonl b/edge/graph_211505976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211505984.jsonl b/edge/graph_211505984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1fe99d83200769f39b41299e073be7363a6a561 --- /dev/null +++ b/edge/graph_211505984.jsonl @@ -0,0 +1,5 @@ +{"2305273|1932843": ["Previous work on Reinforcement Learning typically do not consider highdimensional perceptual inputs [48]."]} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"2054748|6972141": ["and outdoor categories, as DeSouza and Kak [28] did, this survey distinguishes between map-based and mapless navigation, since some navigation systems proposed for indoor could also be properly adapted to work in outdoor environments and vice versa.", "Therefore, it is a selection of the most outstanding contributions surveyed in the work by De Souza and Kak, although some references not considered there have also been included.", "De Souza and Kak in [28] structure robot visual navigation in two main subjects: indoor navigation and outdoor navigation.", "(In order to make compatible this section of the survey with the one by De Souza and Kak, the rest of this section is structured in the same way as De Souza and Kak's survey, maintaining thus the same category labels.)", "a map can be in turn subdivided in metric map-using systems, metric map-building systems and topological map-based systems [28].", "in [28]; second, Section 3 reviews new approaches presented after the submission of [28]; finally, Section 4 concludes the paper.", "The progress made in vision-based navigation and localization for mobile robots up to the late 1990s was widely surveyed by DeSouza and Kak in [28]."]} +{"4670339|11746788": []} +{"4670339|1708582": ["For more comprehensive surveys of pre-deep and post-deep era applications of RL techniques, we refer the reader to [4, 28]."]} diff --git a/edge/graph_211506486.jsonl b/edge/graph_211506486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e50a7c90fb967d4991c27dc3208b5232c7051f17 --- /dev/null +++ b/edge/graph_211506486.jsonl @@ -0,0 +1 @@ +{"1033682|174797842": []} diff --git a/edge/graph_211522497.jsonl b/edge/graph_211522497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ce4a23c5c4ea7bc183767a99c3015ed4805cb42 --- /dev/null +++ b/edge/graph_211522497.jsonl @@ -0,0 +1,13 @@ +{"1153012|8928686": ["Index Terms\u2014Fall detection, activity recognition, channel state information (CSI), WiFi, phase difference\n\u00c7", "Falls not only bring a main threat to elders\u2019 health, they account for a large part of medical cost as well."]} +{"4063197|8928686": ["For a comprehensive survey on wearable/non-wearable technologies we refer the interested readers to the following publications [10\u201312]."]} +{"15799692|1113420": ["This idea is inspired by widely used context-aware approaches in automatic speech recognition [47]."]} +{"3839177|16362395": ["Wi-Chase employs k-Nearest Neighbor (kNN) [21] and Support Vector Machine (SVM) [22] based machine learning classifiers for the classification of activities from different users."]} +{"55268517|36366678": ["Existing methods usually use the relative error, absolute error, standard deviation, variance, and false negatives of an algorithm to evaluate its rationality [37]."]} +{"51899742|206583375": ["This aspect has motivated extensive work on alternative localization solutions [1], which are based on radio signals that are either transmitted by dedicated sensors or by opportunistic transmitters (e."]} +{"8254430|15782139": ["As pointed out in [7], standard segmentation methods from natural language processing [16] can be used to further improve the word segmentation accuracy."]} +{"16095829|206583375": ["R ADIO LOCAL positioning (particularly indoor positioning) has been an active field of research in recent years [1], [2]."]} +{"6014101|21738890": ["The ever-increasing smart devices surrounding our daily lives have offered a great opportunity for building a cost-ef\ufb01cient system that can recognize human-centric motions anytime anywhere [13]."]} +{"6014101|5724477": ["The vision-based approaches [21]\u2013[24] and wearable sensor-based approaches [9], [11], [25] are two dominating solutions, leading to a success transition from academic study to industrial work.", "With the rapid development of wireless communication recently, researchers soon realize that the smart phone with built-in sensors is another alternative [11]."]} +{"6014101|3348390": ["It is well-known that human presence interferences the wireless signals due to multipath and fading effects [12].", "Thebursting development of wireless communications and embedded platforms has greatly accelerated the approach of Internet of Things and envisioned a new era of ubiquitous computing [12]."]} +{"6014101|1634674": ["The former usually employs surveillance cameras to take footage, from which gradient-based features are extracted for motion recognition, while the latter explores virtual footprints caused by human beings from speci\ufb01c sensors for recognizing physical motions [10]."]} +{"6014101|14970359": ["To date, vision-based and sensor-based motion detection are the dominating methods [4]\u2013[9]."]} diff --git a/edge/graph_211532501.jsonl b/edge/graph_211532501.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..643e902529518ac7e3b0f902c27ceb5cc0ef51bd --- /dev/null +++ b/edge/graph_211532501.jsonl @@ -0,0 +1,6 @@ +{"18045748|53990263": ["The output connections are then tuned via minimizing the cost function through a linear system [18]."]} +{"10276143|39297241": ["In addition, many bio-inspired algorithms are used to solve different problems and applications [26], [30], [27], [28], [29]."]} +{"115200805|9141490": ["However, researchers currently use these two terms (heuristic and metaheuristic) interchangeably, as there is little difference in their definitions [3] [4] [5]."]} +{"205707365|12957829": ["[43] 2012 --Review and Taxonomy of hybrid DE and PSO Nwankwor et al."]} +{"64807001|16897832": ["A survey on evolutionary computation approaches to feature selection is delineated in [4].", "The classical optimization techniques have some limitations in solving the feature selection problems [16] and hence evolutionary computation(EC) algorithms are the alternative for solving these limitations and searching for the optimum solution [4]."]} +{"56173517|205286236": ["This has been shown to be the case even when the environment is changed [4]."]} diff --git a/edge/graph_211532784.jsonl b/edge/graph_211532784.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b73499433ef4ce10f2e7a83d7ccf3dfe11c5b07 --- /dev/null +++ b/edge/graph_211532784.jsonl @@ -0,0 +1,7 @@ +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"210165090|44157913": ["l problem (Blitzer, McDonald, and Pereira 2006; Pan and Yang 2010; Kulis, Saenko, and Darrell 2011; Glorot, Bordes, and Bengio 2011; Blitzer, Kakade, and Foster 2011; Csurka 2017; Wang and Deng 2018; Chu and Wang 2018; Ponti et al. 2018; Murthy, Kunchukuttan, and Bhattacharyya 2018; Saito et al. 2018; Kuroki et al. 2019; Lee et al. 2019). When labeled data from target domain is available, supervised domain adaptat", "\u20262006; Pan and Yang 2010; Kulis, Saenko, and Darrell 2011; Glorot, Bordes, and Bengio 2011; Blitzer, Kakade, and Foster 2011; Csurka 2017; Wang and Deng 2018; Chu and Wang 2018; Ponti et al. 2018; Murthy, Kunchukuttan, and Bhattacharyya 2018; Saito et al. 2018; Kuroki et al. 2019; Lee et al. 2019)."]} +{"210165090|3654323": ["Building an algorithm for domain adaptation is an open theoretical as well as practical problem (Blitzer, McDonald, and Pereira 2006; Pan and Yang 2010; Kulis, Saenko, and Darrell 2011; Glorot, Bordes, and Bengio 2011; Blitzer, Kakade, and Foster 2011; Csurka 2017; Wang and Deng 2018; Chu and Wang 2018; Ponti et al. 2018; Murthy, Kunchukuttan, and Bhattacharyya 2018; Saito et al. 2018; Kuroki et al. 2019; Lee et al. 2019).", "\u2026Pereira 2006; Pan and Yang 2010; Kulis, Saenko, and Darrell 2011; Glorot, Bordes, and Bengio 2011; Blitzer, Kakade, and Foster 2011; Csurka 2017; Wang and Deng 2018; Chu and Wang 2018; Ponti et al. 2018; Murthy, Kunchukuttan, and Bhattacharyya 2018; Saito et al. 2018; Kuroki et al. 2019; Lee et\u2026"]} +{"210165090|7559976": ["\u2026McDon-ald, and Pereira 2006; Pan and Yang 2010; Kulis, Saenko, and Darrell 2011; Glorot, Bordes, and Bengio 2011; Blitzer, Kakade, and Foster 2011; Csurka 2017; Wang and Deng 2018; Chu and Wang 2018; Ponti et al. 2018; Murthy, Kunchukuttan, and Bhattacharyya 2018; Saito et al. 2018; Kuroki et al.\u2026", "n theoretical as well as practical problem (Blitzer, McDonald, and Pereira 2006; Pan and Yang 2010; Kulis, Saenko, and Darrell 2011; Glorot, Bordes, and Bengio 2011; Blitzer, Kakade, and Foster 2011; Csurka 2017; Wang and Deng 2018; Chu and Wang 2018; Ponti et al. 2018; Murthy, Kunchukuttan, and Bhattacharyya 2018; Saito et al. 2018; Kuroki et al. 2019; Lee et al. 2019). When labeled data from target domain "]} +{"1033682|174797842": []} +{"52815788|7559976": ["Recent UDA methods have focused on transferring deep neural network representations [13], [14]."]} diff --git a/edge/graph_211542908.jsonl b/edge/graph_211542908.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211543791.jsonl b/edge/graph_211543791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211550265.jsonl b/edge/graph_211550265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c026bdb820f1d24cd1082d3792ec14afa90658f --- /dev/null +++ b/edge/graph_211550265.jsonl @@ -0,0 +1,6 @@ +{"29162614|206739910": ["traffic sign dataset containing 47 different road signs [21]."]} +{"4111957|14258620": []} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"1033682|174797842": []} +{"52901134|3536399": []} +{"52901134|10869869": ["[42] provided a comprehensive survey of prior works by categorizing the attacks under four overlapping classes."]} diff --git a/edge/graph_211572503.jsonl b/edge/graph_211572503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c05e559c263a5d36c3c4a3bbeaaf5960e25d0cb5 --- /dev/null +++ b/edge/graph_211572503.jsonl @@ -0,0 +1,3 @@ +{"5605332|7530272": ["Most existing TSC approaches fall into two categories [31]: distance-based methods and feature-based methods."]} +{"211258817|211572503": ["Unlike data augmentation for image [17] and speech [11], few work has been done on data augmentation for time series [23].", "Currently, very few work has been done on data augmentation for time series data [4, 19, 23]."]} +{"211258817|204743865": ["As is reviewed in [37], many state-of-the-art image segmentation approaches have adopted an encoder-decoder network structure, which helps to extract hidden features from the input."]} diff --git a/edge/graph_211572679.jsonl b/edge/graph_211572679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..159a4d414574385eaf7cbb505440976a134cddd5 --- /dev/null +++ b/edge/graph_211572679.jsonl @@ -0,0 +1,109 @@ +{"29293173|17109970": ["In [14], the authors form a set of power control games and develop a distributed algorithms with emphasis on energy efficiency in wireless code-division multiple-access (CDMA) networks."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"69523365|13765327": []} +{"407791|16084499": ["The existing technologies supporting WBANs are Bluetooth, Bluetooth low energy and ZigBee [1]."]} +{"69444615|4427557": ["results are within the range of those in [6] and [27] which reported that LP-WAN could achieve up to 20 dB improvement over cellular systems.", "Insufficient comparative studies of LPWAN technologies has been identified as one of the major barriers to potential IoT users [6]."]} +{"69444615|3494096": ["[34] 5G, LTE-M, Description of various Comparative EC-GSM cellular , LP-WANs No performance enablers & applications."]} +{"3281233|11498812": [", [4]\u2013[11] and their references), authors evaluate different types of ICI reduction techniques."]} +{"3281233|18287489": ["Equation (2) assures that LICIS is based on the same reference clock as LTE because the integer and fraction frequency synthesizers offer a simple circuital realization for synthesizing different frequencies based on the same common reference [20], [23]."]} +{"11498812|22833814": ["In GBSM, the impulse responses of channel is characterized by the law of wave propagation applied to specific transmitter, receiver, and scatterer geometries that are predefined in a stochastic fashion according to certain probability distributions [33]."]} +{"16986437|18594141": []} +{"16986437|1230643": ["The IEEE 802.11ac is an improved version of the IEEE 802.11n, and it provides high throughput wireless local area networks (WLANs) in the 5 GHz band with more spatial streams and higher modulation with MIMO yielding data rates up to 433.33 Mbps [12]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"169663059|4427557": ["10+ years of battery lifetime [3]) and inexpensive, with the cost of a radio chipset being less than 2e and an operating cost of 1e per device per year [4].", "220 MHz is divided into 400 orthogonal 100 Hz channels (among them 40 channels are reserved and not used) [4]."]} +{"16044940|18007143": ["We refer the interested reader to [ 5 ] and references therein for a survey of decoding algorithms for Reed-Muller codes."]} +{"60442746|4427557": []} +{"60442746|5630105": []} +{"60442746|5002530": []} +{"60442746|562065": []} +{"60442746|15300368": []} +{"46953990|3271705": []} +{"46953990|25374274": []} +{"46953990|14315321": ["(iv) Distributed applications design Design flow for web service applications [51] Model-based design The web of things [52] Web service -based design Cloud-based platform for distributed IoT applications [53] Deployment platform Commercial frameworks for the IoT [54] Survey of design platforms A Self-Managing Containerized IoT Platform [55] Design platform IoT Design Patterns [56] Design patterns Data Mining proposal of distributed applications events [57] Data Mining Open IoT Ecosystem [58] Deployment platform Future Internet of Things Controller [59] Decentralized Intelligence IoT and Multiagent Systems [60] Decentralized Intelligence", "There are also commercial frameworks and platforms designed for developing and running Internet of Things applications [54]."]} +{"9122404|2623404": ["Interested readers are referred to [12], [13] and the refere nc s therein."]} +{"9122404|7971188": ["From a networking perspective, CMuHC will inevitably require the formation of a peer-to-peer overlay in order to orchestrate the participation of multiple users in additio n the facilitation of a number of other necessary functions perta ining to the tasks of overlay maintenance and operation [9]."]} +{"51716069|3450189": ["The BLE survey in [4] presents a general overview of these solutions and analyzes several approaches to implement a BLE Mesh solution.", "As such, it is relevant to find out how this new standard operates, tackles the other open issues identified in [4] and handles the disadvantages of using the advertising capability of BLE as a basis for communication.", "For both approaches, several implementations already exist [4], with each approach having its own advantages and disadvantages.", "Consequently, several attempts were made to add meshing capabilities to BLE, resulting in different techniques, which are discussed in detail in [4]."]} +{"70211811|53116003": ["Another article [59] presented a panoramic survey on the"]} +{"70211811|9461213": ["Furthermore, depending on the objective of how a learning architecture will be utilized, DL architectures can be broadly categorized into [35], [166]: generative, discriminative and hybrid.", "Some promising techniques in this direction include the following [35]: (i) network compression, (ii) approximate computing, and (iii) accelerators.", "several Deep Learning (DL) techniques are being investigated in wireless networks including IoT networks [35].", "Also, due to multi-layer structure of DL techniques, they become advantageous for complex edge computing environments [35]."]} +{"70211811|4884302": ["\u2026rewards from the environment, resulting in the return of L l =0 \u03b3 l r l +1 , where \u03b3 \u2208 [0 1] is the discount factor which provides more weights on the immediate rewards and L denotes the length of one episode, which denotes the time period after which the state is reset for an episodic MDP [45].", "Also, the recent article [45] provided a brief survey of the existing deep RL algorithms along with the highlights on current research areas and the associated challenges.", "At each time-step, the device aims to maximize the expected discounted return in the long-term, i.e., long-term reward, given by [44, 45] where E denotes the expectation operator and this is taken over probability state transitions, i.e., dynamics of the considered environment.", "\u2026[19,39,40] QoS provisioning [41] Intelligence in 5G networks [16,20] Machine Learning (ML) Learning in IoT/sensor networks [26,42,43] Reinforcement learning [44,45] Ultra-Dense Networks (UDNs) [46\u201348] and the distinct features of mMTC traf\ufb01c as compared to the conventional HTC traf\ufb01c [26]."]} +{"70211811|21930333": ["several base station switch-off strategies including random, distance-aware, load-aware and auction-based can be employed to balance the energy related performance trade-offs such as a trade-off between energy efficiency and data throughput [102]."]} +{"70211811|12325031": ["Furthermore, RL techniques can work in model-free wireless environments where the system dynamics are usually unknown [183]."]} +{"70211811|25929315": ["Sub-topics References Enabling technologies/protocols, challenges and applications [1,2,6,11,14,28\u201332] Random access schemes [22,33\u201335] IoT/mMTC Traf\ufb01c characterization and issues [36] Transmission scheduling [37,38] IoT big data analytics [19,39,40] QoS provisioning [41] Intelligence in 5G\u2026", "5 [33, 88], which mainly involves the following four stages: (i) RA preamble transmission from the device to the eNodeB (Message 1), (ii) RA Response (RAR) from the eNodeB to the device (Message 2), (iii) connection request message from the device to the eNodeB (Message 3), and (iv) connection\u2026", "Besides, there are some strict separation schemes and soft separation schemes to concurrently support both the HTC and MTC traf\ufb01c in LTE-A networks [33, 91].", "\u2026must go through the access procedure to establish a connection to the Base Station (BS)/eNodeB/access point mainly in the following situations [33]: (i) while establishing an initial access to the network, (ii) while receiving/transmitting new data and MTC device is not synchronized to the\u2026", "The four-stage message handshake procedure followed in the current LTE standard results in very high overhead for most of the IoT devices since the packets transmitted by the resource-constrained IoT devices are quite short as compared to the conventional cellular packets [33].", "In LTE-based cellular networks, the eNodeB broadcasts the periodicity of the RA slots by means of a variable referred to as the Physical RACH (PRACH) con\ufb01guration Index [33], and subsequently, the MTC devices and the legacy cellular users can perform RA by using the PRACH channel.", "The periodicity of RA slots is broadcasted by the eNodeB in terms of the PRACH con\ufb01guration index, which varies between every 1 ms (i.e., a maximum of 1 RA slot per 1 subframe) to 20 ms (i.e., the minimum of 1 RA slot every 2 frames) [33].", "Besides, the main performance metrics to be improved include access success probability, preamble collision rate, access delay and device energy consumption [33].", "This corresponds to the absolute maximum capacity of 10 , 800 preambles per seconds in the absence of access collisions [33].", "Furthermore, the article [33] presented a comprehensive survey of various RA solutions attempting to enhance the RACH operation of LTE/LTE-A based cellular networks, and carried out the performance evaluation of LTE RACH from the energy ef\ufb01ciency perspective."]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"38103082|2532914": ["HDI is also called mobile human machine interaction [8], mobile human computer interaction [9], and human mobile device interaction [10]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"56718822|3656886": ["Although each LPWA technology can support regular reporting by sending short periodic messages, not all are suitable for frequently changing environments (ex: smart healthcare where reporting event-driven alerts is inevitable) such as SigFox due to local regulations and other operating restrictions."]} +{"56718822|3249290": []} +{"56718822|4427557": ["Non-cellular wireless technologies cover a few hundred meters at most, whereas traditional cellular technologies require devices to consume considerable energy [9].", "Similar efforts have previously been made to review the LPWA literature in [9], [13], [2], [14], [8], [15] and [16].", "This allows end devices to stay connected to their base stations over tens of kilometers [9] (Figure 2).", "Both [2] and [9] have explored the advantages and disadvantages of LPWA solutions as well as efforts to standardize the technologies; the current deployment status in Spain is", "We refer readers interested in other LPWA technologies to [9] and [2].", "low power consumption but wide network range and simple deployment management for an enormous number of low cost devices [9] [36] [13].", "Some of these techniques include the use of ultra narrow band (UNB) communication, which enables the coexistence of a large number of devices within a cell while controlling interference and adaptive data rates and channel selection [9].", "ization of their LPWA technologies [9].", "TABLE 2: Characteristics of LoRaWAN, SigFox, RPMA, Telensa, NB-IoT [52] [9] [8] [2] [40] [39] [45] [61] [14] [62] [63]", "[9], on the other hand, is a more comprehensive survey."]} +{"56718822|16313703": []} +{"56718822|19636511": ["Cooperative relaying, signaling, radio resource allocation, and random access schemes are identified as main areas of energy efficiency improvement in [123]."]} +{"56718822|21386749": ["We refer interested readers to [3], [4], [5] and [6] for more details on the IoT technologies and applications.", "This should not be overlooked for healthcare systems, where privacy is mandatory [3] [4] [34].", "This is also true for data encryption [9] [113] [114] [4]."]} +{"56718822|1598350": []} +{"56718822|121289": ["In addition to the delivery of electricity, information is exchanged between the consumer\u2019s smart meter and supplier\u2019s controller to allow real-time control of power delivery [90]."]} +{"35260120|15501047": ["The reflection coefficient of the antenna is computed by [6], [16], [17], [18]:"]} +{"35260120|1902483": ["WPT has many practical applications such as home electronics, medical implants, electric vehicles, and wireless grid [14]."]} +{"35260120|12029139": [", static and dynamic ambient RF sources [128]."]} +{"35260120|14650419": ["However, due to some limitations [7]\u2013[10], conventional backscatter communications"]} +{"35260120|2415608": []} +{"35260120|2357830": ["However, due to some limitations [7]\u2013[10], conventional backscatter communications"]} +{"14629784|2871699": []} +{"69233915|6664074": []} +{"69233915|9495329": []} +{"69233915|3348390": []} +{"53696817|17737221": ["The non-flexible appliances are those that are associated with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "These appliances usually present burst loads (Khan et al., 2014; Ullah et al., 2013)."]} +{"53696817|16335158": ["The IoT Cloud (Alamri et al., 2013; Botta et al., 2016) will enable the long-time storage and complex analysis of this data."]} +{"68014583|24386836": ["in computation offloading and the overall system performance [19]."]} +{"68014583|6909107": ["edge computing can provide pervasive, prompt and agile computation services at anytime and anywhere [3], [4]."]} +{"18195911|9862516": ["Furthermore, we assume that the channel gains are constant in one observation interval and vary independently in different intervals.", "ETPL WC - 001 Two-Stage Multiple Access for Many Devices of Unique Identifications\nover Frequency-Selective Fading Channels\nIn this paper, we study the distributed energy-based detectors for spectrum sensing in cognitive radio networks."]} +{"52816888|3645740": ["Here, it is necessary to distinguish between two different time metrics, namely training time and response time as per [26].", "Moreover, authors in [25] and [26] focus on the potentials of machine learning in enabling the self-organization of cellular networks with the perspectives of self-configuration, self-healing and self-optimization."]} +{"52816888|206578365": ["For example, computing and caching resources can be deployed at the network edge to fulfill the demands for low latency and reduce energy consumption [7], [8]."]} +{"52816888|17485266": []} +{"52816888|12325031": ["In addition, only a specific network scenario is covered in [20]\u2013[24], while literatures [28], [31]\u2013[33]", "Specifically, authors in [23] classify those applications into decision-making tasks and classification tasks, while authors in [24] mainly concentrate on model-free strategic learning.", "The applications of machine learning in cognitive radio (CR) environments are investigated in [23] and [24]."]} +{"52816888|7851743": ["CAPEX and OPEX, and to simplify the coordination, optimization and configuration procedures of the network, self-organizing networks have been widely studied [162]."]} +{"52816888|1185580": ["In addition, since value function and policy are updated separately, policy knowledge transfer is easier to achieve [141]."]} +{"52816888|3557411": []} +{"51934006|16378550": []} +{"51934006|8323234": ["[139] overviews existing approaches for beamforming design in mmWave networks."]} +{"51934006|1574544": ["the core of a cellular network [146], [147]."]} +{"51934006|14088590": ["There are several survey papers on the QoS routing protocols for general ad hoc networks [110] and for vehicular networks [111], [112] where the topology is dynamic."]} +{"51934006|11210789": ["There are several survey papers on the QoS routing protocols for general ad hoc networks [110] and for vehicular networks [111], [112] where the topology is dynamic."]} +{"3930401|10235514": []} +{"3930401|4502294": []} +{"3930401|12206204": ["prise ultra-dense heterogeneous networks for which mobile data volume per area will be 1000 times and the number of connected wireless devices will be 100 times higher compared to those in existing wireless networks [1].", "It will offer new services with ultra-high system capacity, massive device connectivity, ultra-low latency, ultra-high security, ultra-low energy consumption, and extremely high quality of experience [1]\u2013[6].", "Therefore, upcoming networks must have the capability to support high user data rates, low power consumption, and negligible endto-end delays [1]\u2013[6]."]} +{"3930401|16050825": ["There exist few literature reviews [14]\u2013[16], [18], [20], [44]\u2013[48] in different aspects of OWC."]} +{"4400432|21386749": ["al [39] has reviewed a state-of-the art of IoT healthcare"]} +{"4400432|5724477": ["Magnetic field sensors [77] Location of higher spatial resolution"]} +{"4400432|10817088": []} +{"3500026|17165859": ["(ToA, like in GPS) data of the light signals from various directions, on time difference of arrival (TDoA) data, on angle of arrival (AoA) data, or on received signal strength (RSS) data [39]."]} +{"70176787|4427557": ["research communities in particular with the rise of Low Power Wide Area Networks (LPWANs) [1]\u2013[3]."]} +{"70176787|21386749": ["Today, a wide range of data acquisition devices is already implemented in IoT applications [11], [12], that require mobility such as smart cities [13]\u2013[15], health-care [16], [17], smart vehicles [18], aging society [19], hospital [20], [21], and in post-emergency networks [22].", "One of the most attractive applications in IoT is the medical and healthcare [16], [17], [20], [21]."]} +{"70176787|7329149": ["Today, a wide range of data acquisition devices is already implemented in IoT applications [11], [12], that require mobility such as smart cities [13]\u2013[15], health-care [16], [17], smart vehicles [18], aging society [19], hospital [20], [21], and in post-emergency networks [22]."]} +{"86375278|7942157": ["the dominant communication paradigm for various emerging smart services including industrial automation, public safety, health-care, utilities, transportation, smart metering, remote manufacturing, and numerous other applications [4], [5], [6] while mobile devices communication among humans still exists.", "\u2022 Caching solutions including caching placement, content delivery, centralized caching, and distributed caching [5], [46].", "In [5], a comprehensive survey is provided for low-latency solutions in the context of 5G from three different perspectives: Core network solutions, RAN solutions, and Caching solutions."]} +{"86375278|76603": ["This is due to the fact that mcMTC require communications with a very high reliability, high availability, and small latency going down to millisecond level [6], [9], [25]."]} +{"53591902|4427557": ["The study in [1] surveyed and compared different LPWA technologies and their important role of offering and providing very wide area coverage to the low power devices.", "As more than twenty five billion devices are expected to be connected through wireless communications in 2020, LPWA technologies are expected to follow in wide spread deployment and popularity [1]."]} +{"3350771|6583734": ["high-data-rate services (such as video service) and low-datarate services (such as meter reading service) [4]."]} +{"3350771|25929315": ["Researches generally set service arrival process as a homogeneous/compound Poisson process or an independent Bernoulli process [41] with identical distribution [40] and retransmission user number and packet retransmission number at queue head or channel state (busy/idle) in a certain time slot as state variables to obtain a stabilized design scheme [42] on the premise of completing the multi-channel S-ALOHA steady-state performance analysis [43], [44].", "In order to solve the overload of LTE access network when a large number of MTC terminals enter network simultaneously, researchers focused analyses on the load pressure of LTE RACH and its overload control mechanisms, such as classified controlled access, exclusive RACH resources, dynamic RACH resources allocation, exclusive backoff mechanism, time division access and active paging mechanism [19], [40]."]} +{"23668684|9928823": ["By combining the generative and discriminative deep architectures, a hybrid model may be constructed, particularly to carry out discrimination tasks, which are aided by the optimized outputs obtained from the generative architecture [20].", "Other deep learning architectures also exist in [20]."]} +{"23668684|7851743": ["Also, in future wireless networks, self-organization has been identi\ufb01ed as a critical issue by a number of researchers [250]."]} +{"23668684|393948": ["This idea of knowledge sharing was demonstrated in [27].", "The state-of-the-art deep learning algorithms, on the other hand, still hinge upon multi-layer architectures according to the work conducted by Bengio et al. [27]."]} +{"23668684|13172512": ["to the networking community [163]\u2013[171]."]} +{"12756405|25929315": []} +{"85501358|3119314": []} +{"49188548|22221919": ["For example, under poor channel conditions, users are allocated increased transmission power as compared to users operating under improved channel conditions [24]\u2013[26]."]} +{"52930218|4427557": ["It allows up to 40 km as communication range in rural zones and 10 km in urban zones [2], up to 10 years of battery lifetime [3], less than 5$ of device cost, and less than 1$ per device per year of operator subscription cost [4]."]} +{"52930218|17713112": ["excessive energy consumption) and thus limit the entire network lifetime [14][15]."]} +{"29854968|512386": ["Furthermore, as mentioned before, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7].", "In this letter, we consider the more practical scenario that the active user sets can be changed in several continuous time slots, and propose a low-complexity dynamic compressive sensing (DCS)-based MUD [7] for NOMA to jointly realize user activity and data detection.", "In practical scenarios, although users can randomly access or leave the system, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7].", "Specifically, although users can randomly access or leave the system, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7]."]} +{"204701417|18594141": ["To date numerous techniques have been developed to increase the spectral efficiency including complex modulation schemes and multi-antenna systems in addition to the deployment of small cells [1], [2]."]} diff --git a/edge/graph_211573011.jsonl b/edge/graph_211573011.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..283b0738c178fb8744bb835e7f69255e7ebe8f39 --- /dev/null +++ b/edge/graph_211573011.jsonl @@ -0,0 +1,10 @@ +{"57745829|2088679": []} +{"119383263|14890820": []} +{"209862603|4795312": ["See [31], [5] and [7] for overviews of current techniques.", "In DL for inverse problems (see, e.g., [7, 28, 31]) this is achieved using a training set T = { ( y j , x j ) : y j = Ax j , j = 1 , . . . , K , consisting of pairs of the form ( Ax, x ), where x is a training image and y = Ax are its measurements."]} +{"660263|4795312": ["3) Learning-Based Algorithms: Recently, a surge in using deep learning to solve inverse problems in imaging [15]\u2013[19], has established new state-of-the-art results for tasks such as sparse-view CT reconstruction [16]."]} +{"68083619|4795312": []} +{"1204991|2616070": ["Regions are frequently de\ufb01ned through their intensity, color, texture, or motion (Chan and Shen 2005; Cremers et al. 2007; Brox et al. 2010).", "One principled way of regularizing them is to use a Bayesian formulation (Geman and Geman 1984; Mumford 1994; Zhu and Yuille 1996; Kersten et al. 2004; Cremers et al. 2007).", "Regions are frequently defined through their intensity, color, texture, or motion (Chan and Shen 2005; Cremers et al. 2007; Brox et al. 2010)."]} +{"1204991|6923178": ["The sequential approach achieves MCCs of 0 .", "We quantitatively compare the two approaches using the MCC ( cf. Sect.", "9290dB, whereas the sequential approach achieves MCCs of 0 .", "The MCC correlates the observed classi\ufb01cation to the predicted one, and is normalized between 0 and 1: a value close to 1 represents perfect classi\ufb01cation and a value close to 0 corresponds to an average random prediction.", "This robustness is re\ufb02ected in the MCC saturating at 1.", "We use the Matthews correlation coef\ufb01-cient (MCC) (Matthews 1975; Baldi et al. 2000) (solid red line) as quality measure.", "For the arti\ufb01cial ER, the joint approach achieves an MCC of 0 .", "For both datasets, the joint approach outperforms the sequential one, both in MCC and in SER gain.", "We observe that the MCC is negatively correlated with the a posteriori upper bound, and that the threshold corresponding to the minimum upper bound corresponds to the maximum MCC.", "We use the Matthews correlation coefficient (MCC) (Matthews 1975; Baldi et al. 2000) (solid red line) as quality measure.", "For the arti\ufb01cial wing disc, the joint approach achieves an MCC of 0 ."]} +{"52272143|4795312": []} +{"1033682|174797842": []} +{"4173387|393948": []} diff --git a/edge/graph_211677471.jsonl b/edge/graph_211677471.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..98b724cf89f92c30a25f6a4ab2641df5cccab7cf --- /dev/null +++ b/edge/graph_211677471.jsonl @@ -0,0 +1,8 @@ +{"181964640|52965836": ["Regarding the accuracy of the proposed PalmNet, it has been stated in the literature that high accuracy of a CNN often comes at the price of limited explainability [77]."]} +{"181964640|192934": ["In this work, to demonstrate the validity of PalmNet for extracting highly discriminative features, we classify the generated templates using a k-Nearest-Neighbors (k-NN) classifier with k = 1 based on the Euclidean distance, which has no parameters and does not require a training procedure [61].", "by 1-NN in the following), which does not need to be trained and has no parameters to tune [61]."]} +{"206725404|393948": ["While the low-level features can be hand-crafted with great success for some speci\ufb01c data and tasks, designing effective features for new data and tasks usually requires new domain knowledge since most hand-crafted features cannot be simply adopted to new conditions [1], [2].", "Each stage generally comprises of \u201cthree layers\u201d \u2013 a convolutional \ufb01lter bank layer, a nonlinear processing layer, and a feature pooling layer."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"28767443|393948": []} +{"18341854|5171123": ["The palmprint is then straightened, resized with a fixed size of 64\u00d7 64 pixels, and converted to a gray level image."]} +{"20144495|359842": ["Facial images can be easily acquired from a distance by a few inexpensive fixed cameras without the user\u2019s active participation or any health risks [3]."]} +{"8569877|5171123": []} diff --git a/edge/graph_211677517.jsonl b/edge/graph_211677517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2dea455ecbee37de80ff8e6254fac864fbbe133 --- /dev/null +++ b/edge/graph_211677517.jsonl @@ -0,0 +1,21 @@ +{"1998533|239537": ["Graph Visualization Various network visualizations [15] have been designed to analyze relational patterns."]} +{"1141362|2593345": ["Due to the scale and noisiness of data, important attributes of the threads, such as the actual message contents, features used in the anomaly detection, and other meta-data information, should be visually summarized and aggregated when appropriate, to facilitate the discovery of interesting subsets of data [22, 39].", "Second, by manipulating the slider on the toolbar, FluxFlow allows a user to quickly collapse all nodes below certain tree level, shown in the compact forms, which is suggested as the above traversal paradigm in [22]."]} +{"6243322|239537": ["state that \"navigation and interaction facilities are essential\" [24].", "to place annotations on graphical entities [59] [7] [60] or code [70], and to manipulate graphs, specifically zooming [6, Fll] [15] [59] [37], panning [61] [24], deleting/editing of view entities [15] [7], and saving [6, F24] [37] [60]."]} +{"49672518|2387055": []} +{"288816|15105704": ["One way to achieve system comprehension is software landscape visualization."]} +{"26857972|5358365": ["Visualization based on real-world metaphors relies on the human natural understanding of the physical world, including spatial factors in perception and navigation and so it prevents the problem of the users\u2019 disorientation [15]."]} +{"51721147|5358365": ["For a survey of software dependency visualization, see Caserta and Zendra [8]."]} +{"17864425|5358365": ["\u2026understanding not\nPermission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page."]} +{"14043924|15105704": []} +{"14089341|8296351": []} +{"18432749|5358365": ["A city metaphor is widely adopted in many studies [5][6][7][9][12][13], it is intuitive and navigable, and it can represent various software structures and metrics at the same time [3].", "Caserta and Zendra pointed out that one drawback of a city metaphor is it can be laid out on only a 2D space [3], but we take advantage of the restriction.", "To recover lost or outdated knowledge, software visualization techniques and tools have been often utilized in various software understanding contexts [1][2][3].", "Software visualization has been studied for various goals [1][2][3], such as to understand the overview of large software"]} +{"31321676|5810468": ["Zhou and Hansen present a comprehensive review of color-map generation techniques, and provide a reference for readers who are faced with color mapping decisions [ZH15]."]} +{"31321676|15480190": []} +{"31321676|5358365": ["The paper de\ufb01nes visualization of the static aspects of software as \u2018 visualizing software as it is coded, and dealing with information that is valid for all possible executions of the software \u2019 [CZ11]."]} +{"31321676|15233735": []} +{"31321676|2593345": []} +{"31321676|9907884": []} +{"31321676|18986679": []} +{"31321676|16557526": []} +{"31321676|239537": []} +{"206535583|53087935": []} diff --git a/edge/graph_211677661.jsonl b/edge/graph_211677661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..358a7b5a475585c5b58d099c7712f6ca491fab6d --- /dev/null +++ b/edge/graph_211677661.jsonl @@ -0,0 +1 @@ +{"155092677|47023662": ["Neural-symbolic computing aims at integrating, as put forward by Valiant, two most fundamental cognitive abilities: the ability to learn from experience, and the ability to reason from what has been learned [2, 12, 16].", "We start by outlining the main important characteristics of a neural-symbolic system: Representation, Extraction, Reasoning and Learning [2, 17], and their applications.", "On the other hand, model-based approaches have been shown implementable in neural networks in the case of nonmonotonic, intuitionistic and propositional modal logic, as well as abductive reasoning and other forms of human reasoning [2, 5]."]} diff --git a/edge/graph_211677665.jsonl b/edge/graph_211677665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ae0e51da06aa2e9f6395bbf0a69a617ce2f6e94 --- /dev/null +++ b/edge/graph_211677665.jsonl @@ -0,0 +1,24 @@ +{"49644765|3202525": ["With the rapid development of recommender systems, various context information has become available [31]."]} +{"8296207|12860838": ["There has been extensive research on the topic of mapping the structures of two databases or knowledge bases (some surveys are [5, 8, 25])."]} +{"204788875|211010433": ["on representation, acquisition and applications of KGs can be found in the survey [9]."]} +{"12349227|393948": ["engineering and leading to be\u008aer performance [2]."]} +{"13999578|393948": ["On the other hand, representation learning obtains data representations that make it easier to extract useful information when building classifiers or other predictors [9].", ", graph analytics [8] and representation learning [9]."]} +{"196173551|3951790": ["eserved. It can bene\ufb01t a variety of tasks including recommendation.Manye\ufb00ectivenetworkembeddingalgorithmshavebeenproposed[10,15,17,19,25].Webrie\ufb02y review someof thesemethods here. Readers can refer to[4, 9] for a comprehensive survey. DeepWalk [15] deployed truncated random walks on nodes to learn latent representations by treating walks as the equivalent of sentences.Followingthispioneerwork,node2vec[1"]} +{"13151033|14074802": ["Those are often created automatically [70]."]} +{"13151033|12161567": ["The numbers follow the latest DBpedia 2014 release6, the YAGO3 release [47], the Freebase website7, the NELL statistics heatmap8, the recent version of Cyc9, an announcement about the Google Knowledge Graph by Google10, the Wikidata class and property browser11 and a recent article on Wikidata [81], as well as the comparison of knowledge graphs in [16] and [55]."]} +{"13151033|3646491": ["In particular, for many of the methods applied in the works discussed above \u2013 such as outlier detection or association rule mining \u2013 graph-based variants have been proposed in the literature [2,43]."]} +{"13151033|11608263": [", Arnold Schwarzenegger being both an Actor and a Politician), and single-label classification, which only assigns one class to an instance [100]."]} +{"19135805|13151033": [", completion or de-duplication) of the input KG [123], from different viewpoints and application context."]} +{"19135805|12161567": ["For more details about these combined models, refer to [36] and references therein.", "Minimizing the pairwise ranking loss has an additional advantage: it does not assume that negative examples are necessarily false, just that they are more invalid than those positive ones [36].", "[36] have made a survey of statistical relational learning methods on KGs, including embedding techniques, path ranking algorithms [37], [38], [39], and Markov logic networks [40], [41], [42].", "For more details about tensor representation of KGs and tensor factorization models, refer to [13], [36] and references therein."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"201134536|29654897": []} +{"201134536|1805048": ["works endeavored to conduct literature reviews on collaborative filtering techniques (Sarwar et al. 2001; Breese et al. 1998; Adomavicius and Tuzhilin 2005; Schafer et al. 2007; Su and Khoshgoftaar 2009; Desrosiers and Karypis 2011; Ekstrand et al. 2011; Bobadilla et al. 2013; Ricci et al. 2015)."]} +{"2409634|3951790": ["On the other hand, network embedding has shown its potential in structure feature extraction and has been successfully applied in many data mining tasks [39], [40], [41], [42], such as classification [43], clustering [44], [45] and recommendation [46], [47]."]} +{"2409634|7885409": ["As a newly emerging direction, heterogeneous information network [5] can naturally model complex objects and their rich relations in recommender systems, in which objects are of different types and links among objects represent different relations [31], [32].", "Recently, HIN has become a mainstream approach to model various complex interaction systems [5].", "As a promising direction, heterogeneous information network (HIN), consisting of multiple types of nodes and links, has been proposed as a powerful information modeling method [4], [5], [6]."]} +{"50772365|7885409": ["As a promising direction, heterogeneous information network (HIN), consisting of multiple types of nodes and links, has been proposed as a general information modeling method [28, 30].", "As a newly emerging direction, heterogeneous information network [28] can naturally model complex objects and their rich relations in recommender systems, in which objects are of different types and links among objects represent different relations [27, 30]."]} +{"11202498|12161567": ["the place of birth attribute is missing for 71% of all people included in FreeBase (Nickel et al. 2015)."]} +{"207759099|1932843": ["Reinforcement learning is a kind of machine learning techniques, which has been examined in various fields, such as robotics [14], game [26] and recommender systems [40].", "To deal with this problem, classical applications usually resort to the solution of self-play or simulation [14, 26]."]} +{"13122651|1805048": ["The second one is the collaborative filtering (CF) approach [28]."]} +{"20401422|9659809": ["Our problem of predicting positive and negative sentiment links connects to a large body of work on signed social networks, including trust propagation [9], spectral analysis [13], and social media mining [22]."]} +{"67769538|5523008": ["ral network models had a great impact on learning effective feature representations in various fields, such as speech recognition [12], Computer Vision (CV) [14] and Natural Language Processing (NLP) [4]. Some recent efforts have applied deep neural networks to recommendation tasks and shown promising results [41], but most of them used deep neural networks to model audio features of music [32], text"]} +{"201650137|3951790": []} diff --git a/edge/graph_211677810.jsonl b/edge/graph_211677810.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b46544340434137f0392cdaf3295d50e971544d8 --- /dev/null +++ b/edge/graph_211677810.jsonl @@ -0,0 +1,49 @@ +{"55009707|170825": []} +{"9496996|12815020": []} +{"11926819|18654252": ["Thus, in accordance [8, 7], network anomalies can be defined as patterns of interaction that significantly differ from the norm and in order to capture the appropriate patterns of interaction, specific aspects of entities\u2019 behavior are used (e."]} +{"1517537|2398835": []} +{"1517537|18189153": ["Routing Attacks [65] Spoo\ufb01ng attacks (IP and URL spoo\ufb01ng), rushing, gray hole, black hole, Cybil, man-in-the-middle attacks, and sleep deprivation."]} +{"1517537|16654832": ["Meanwhile, different communication networks are available, such as Wi-Fi, LTE 3G/4G, and wireless networks, which connect end users to network resource [45]."]} +{"1517537|12815020": ["Port Scanning Scan the free and less secure port for attempting attacks.", "Port Scanning [63] TCP scanning, UDP Scanning, SYN scanning, FIN scanning, ACK scanning, and Window scanning."]} +{"6666687|31086789": ["CYBERSECURITY is currently one of the main concerns for supervisory control and data acquisition (SCADA) industrial control system (ICS) operators, as a result of a series of recent successful cyberattacks against several targets, such as electric power substations and distribution grids [1], sewage processing units, or even nuclear power plants [2]."]} +{"6666687|207209718": ["These have had far reaching impact, affecting a substantial number of persons, potentially causing significant damage and ultimately threatening human lives [3]."]} +{"53987176|8523192": ["[5]. Based on the capabilities of these edge resources, many consider Fog and Edge computing similar and use them interchangeably. Conversely, others treat Edge computing as a subset of Fog computing [6]. Fog computing manages an intermediate layer between IoTenabled systems and Cloud computing. The computing instances of Fog computing are commonly known as Fog nodes and deployed across the edge netw"]} +{"42475332|15545863": []} +{"42475332|7971188": []} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"14849884|1333339": ["Trust Predictions: Trust prediction is a method of predicting potentially unknown trust between nodes using the present and past behavior of nodes and also the recommendations received from other nodes [17].", "The core factor to be considered for trust propagation is cooperation in the network in transporting the trust information [17, 18].", "The chain of nodes that transmits the trust information about target node to the trust requesting node constitutes a trust path [17, 18]."]} +{"14849884|1462862": []} +{"14849884|10137283": []} +{"14849884|9240891": ["The contributions of this paper are: (1) to give a clear definition of trust in the communication and networking field, drawing upon definitions from different disciplines; (2) to extensively survey the existing trust management schemes developed for MANETs and investigate their general trends; and\u2026", "Also, confidence level is used as a weight to evaluate trust of other nodes based on a Bayesian approach."]} +{"52124951|25374274": []} +{"52124951|8523192": []} +{"52124951|17694107": []} +{"52124951|3767252": []} +{"10109950|12815020": []} +{"3710820|25943273": ["Recent review papers detail the challenges facing security auditing, and in particular in the areas of intrusion [40] and attack detection [20]."]} +{"3710820|12595430": ["It should be noted that currently, many security con\ufb01gurations respect the mentioned assumptions [40].", "Recent review papers detail the challenges facing security auditing, and in particular in the areas of intrusion [40] and attack detection [20]."]} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"28952352|2294541": ["Bad-mouthing and ballot-stuffing attacks are the most common forms of reputation attacks [30]."]} +{"34664429|12815020": ["In 2013, Modi et al. (2013) argued that a firewall is not sufficient to provide security to data stored in a cloud system."]} +{"3982682|31245252": ["Recent reports [2][3] indicates that malware cyber attacks such as man-in-the-middle and distributed denial of service (DDoS) are typical threats to the IoT."]} +{"2282184|8523192": ["To summary, Edge computing [11]\u2013[13] is totally edgelocalized, however, fog computing extends the computing and communication resources towards edge of the network."]} +{"2282184|2756896": ["Location privacy, as discussed in [28], is one of the most important models for privacy, since the place of equipment can be linked to the owners."]} +{"2282184|3348390": ["As resources of EU\u2019s devices are shared among other geographically close devices to support context-aware services [63], [64], location, massive amount data and other information of EU need to be protected in very secure manner."]} +{"2282184|12815020": ["SCADA [65], cloud [66], smart grid [67] etc."]} +{"195813098|53716504": ["The general architecture of fog is categorized into three layers [33]: IoT layer, fog layer, and cloud layer, as shown in Figure 1."]} +{"195813098|52015330": ["The fog computing environment consists of multiple autonomous computational devices from independent users [32]."]} +{"195813098|49564949": ["Fog computing is envisioned to empower the integration of computation and storage of idle autonomous end devices such as smartphones, tablets, laptops, and other stationary computation devices [3]."]} +{"195813098|8523192": ["In the fog computing environment, researchers have only considered the use of resources and response time for allocating the resources without considering the cost [6]."]} +{"52203634|49318466": ["These sites let users create semi- or fully public profiles to communicate and share information with others [1,2], as well as to see other individuals\u2019 activities regarding the defined restrictions for their profile [3].", "Confidentiality itself addresses the revealing information of an individual, while the privacy of data considers the ownership of information and the influences that information revelation has on data access permissions and privileges of the individual and his/her connections (friends) [2]."]} +{"67174649|3119314": ["The most common way to measure availability is based on mean time to failure and mean time to repair [34] [35]."]} +{"25374274|8523192": ["Like Cloud systems, a Fog system is composed of Infrastructure, Platform, and Software-as-a-Service (IaaS, PaaS, and SaaS, respectively), along with the addition of Data services [12, 13]."]} +{"25374274|3374322": ["As many Fog systems are also deployed on smart-phones and tablets such as in BCI applications, they can become a source of malware infection [125]."]} +{"25374274|84832337": []} +{"40248125|3119314": []} +{"40248125|12815020": []} +{"3880342|3767252": []} +{"33115280|15545863": ["Finally, the decoy should be detectable; this feature refers to the ability of decoys to alert their owners once they have been accessed [24], [25], [26]."]} +{"33115280|44956948": ["MBD in the healthcare industry includes patient data in electronic patient records (EPRs); clinical data from computerized physician order entries (CPOEs); machine generated/sensor data, such as from monitoring vital signs; clinical decision support systems (medical imaging, physician\u2019s written notes and prescriptions, insurance, laboratory, pharmacy, and other administrative data); social media posts, including Twitter feeds (so-called tweets) [8], [9], blogs [10], [11], status updates on Facebook and other platforms, andweb pages; and non-patient-specific information, including emergency care data, news feeds, and articles in medical journals."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"2685460|2623404": ["Software-Defined IoT Components Software-defined networking (SDN) [12, 13] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic).", "Network Virtualization [15] goes beyond SDN by focussing on the virtualization of all components resulting in the ability to define customized virtual networks.", "Software-defined networking (SDN) [12] [13] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic)."]} diff --git a/edge/graph_211677983.jsonl b/edge/graph_211677983.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..481d361ffd345e1fa25fcc14a8d92de994cf77ab --- /dev/null +++ b/edge/graph_211677983.jsonl @@ -0,0 +1,14 @@ +{"14794475|5888685": []} +{"31324502|13151033": ["overview of approaches for knowledge graph refinement is present in [6].", "A very recent survey that scopes evaluation of type assignment is presented in [6]."]} +{"8296207|12860838": ["There has been extensive research on the topic of mapping the structures of two databases or knowledge bases (some surveys are [5, 8, 25])."]} +{"57190036|13151033": ["Such knowledge graphs contain information on millions of entities from multiple topical domains [3].", "In the past, many approaches for refining knowledge graphs have been proposed [3]."]} +{"207828126|13151033": []} +{"13151033|14074802": ["Those are often created automatically [70]."]} +{"13151033|12161567": ["The numbers follow the latest DBpedia 2014 release6, the YAGO3 release [47], the Freebase website7, the NELL statistics heatmap8, the recent version of Cyc9, an announcement about the Google Knowledge Graph by Google10, the Wikidata class and property browser11 and a recent article on Wikidata [81], as well as the comparison of knowledge graphs in [16] and [55]."]} +{"13151033|3646491": ["In particular, for many of the methods applied in the works discussed above \u2013 such as outlier detection or association rule mining \u2013 graph-based variants have been proposed in the literature [2,43]."]} +{"13151033|11608263": [", Arnold Schwarzenegger being both an Actor and a Politician), and single-label classification, which only assigns one class to an instance [100]."]} +{"31104082|14074802": ["Links between knowledge graphs can be determined using entity linkage approaches [5], e."]} +{"31104082|13151033": ["Previous works mostly report global numbers, such as the overall size of knowledge graphs, such as [6], and focus on other aspects, such as data quality [2]."]} +{"195750883|13151033": ["The systematic analysis of knowledge graph quality has inspired a lot of research around an automatic or semi-automatic improvement or refinement [22]."]} +{"15886037|10500613": []} +{"15886037|386036": ["Thus, in order to determine suitable classification criteria for data linking techniques, we considered both the techniques themselves and existing classification schemas proposed in the literature on database record linkage (Elmagarmid et al., 2007; Winkler, 2006; K\u00f6pcke & Rahm, 2010) and schema matching (Rahm & Bernstein, 2001; Euzenat & Shvaiko, 2007).", ", 2003), (Elmagarmid et al., 2007), (Winkler, 2006)) and we refer the reader to these papers for the detailed description of different similarity functions.", "In the record linkage research there is a distinction between field matching and record matching techniques, which focus on two different stages of the linkage process (Elmagarmid et al., 2007).", "In this case we talk about anaphora resolution or named entity disambiguation (Elmagarmid et al., 2007)."]} diff --git a/edge/graph_211678150.jsonl b/edge/graph_211678150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf10922489a830025d025a49028b571467bb8937 --- /dev/null +++ b/edge/graph_211678150.jsonl @@ -0,0 +1,18 @@ +{"199442418|3536399": ["That being said, a bunch of recent works have posed the risk of GNNs against adversarial attacks, just like what the researchers are anxious for on conventional deep neural networks [5]."]} +{"199442418|207023804": ["Graph Signal Processing (GSP) focuses on analyzing and processing data points whose relations are modeled as graph [19, 20]."]} +{"199442418|3951790": ["mall graph perturbations like one-edge \ufb02ip is able to consistently make a strong attack in performance to different graph embedding models. Introduction Graph embedding models (Scarselli et al. 2009; Cui et al. 2018), which elaborate the expressive power of deep learning on graph-structure data, have achieved promising success in various domains, such as predicting properties over molecules (Duvenaud et al. 2015)"]} +{"86509174|207372751": ["Link prediction is essential for many applications such as extracting missing information and identifying spurious interaction [20]."]} +{"11496208|207372751": []} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"52917305|207372751": ["imited attack is less than 80%. We can explain the results. In single node attack, 9 TABLE 5: ASR of links with different degree. Networks Modi\ufb01ed links Degree [2, 3] [4, 5] [6, 7] [8, 9, 10, 11, 12] [13, 14, 15, 16, 17, 18, 19, 20] [21, 22, 23, 24, 25, 26, 27, 28, 29, 30] [31-] NS 1 0.00 0.00 0.00 0.00 0.00 0.00 0.00 2 35.14 5.00 1.96 5.88 8.77 7.14 8.33 3 67.57 22.5 17.67 19.51 14.04 11.76 9.52 Yeast 1 12.5 4.26 1.43 2.78 0.00", "but ef\ufb01cient similarity-based method. The Common Neighbors (CN) and Resource Allocation (RA) [18], classic neighbor-based similarity methods, successfully applied to personalized recommendation [19], [20]. Path-based index and randomwalk-based index [21] are two other kinds of similarity index, taking advantage of network\u2019s global topological J. Chen, J. Shi, Y. Wu, X. Xu and H. Zheng are with the C"]} +{"208548428|202660800": ["Various adversarial attack methods have been designed, showing the vulnerability of GNNs [2, 4, 6, 42, 50]."]} +{"3952914|393948": ["In light of these issues, as well as the opportunities offered by the recent emergence of representation learning [1], learning latent representations for networks, a.k.a., network embedding, has been recently extensively studied in order to automatically discover and map a network\u2019s structural\u2026"]} +{"67856057|54559476": ["local window, convolution based methods iteratively aggregate representation of neighbor nodes to learn a node embedding [3], [4], [7], [11], [25], [26], [27], [28], [29], [30]."]} +{"67856057|3951790": ["It should be noted that most of the graphs are sparse in real world applications [51]."]} +{"57189241|212675130": ["It has stimulated (and been cited by) various followingup novel research in this line [17], [57], [64], [130], [144] as well as other attempts of survey [25], [58]."]} +{"57189241|211678150": ["It has stimulated (and been cited by) various followingup novel research in this line [17], [57], [64], [130], [144] as well as other attempts of survey [25], [58]."]} +{"57189241|2088679": ["edu analysis [78], brain circuits analysis [69], and functionality of mutations in DNA [124]."]} +{"57189241|7885409": ["[50] is the first and only paper investigating the vulnerability of Heterogeneous Information Network (HIN) which is a graph model with heterogeneous node and edge types [88]."]} diff --git a/edge/graph_211684416.jsonl b/edge/graph_211684416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adce53f0068d003b13a51a8fc4a3338ac3313ae7 --- /dev/null +++ b/edge/graph_211684416.jsonl @@ -0,0 +1,48 @@ +{"3086892|5544758": ["Similarly, MIT big data lab, CSAIL, is also working on the solution of different challenges that are associated with the large data generated by network of devices [30].", "UC Berkeley through their Berkeley Data Analytics (BDA) software is trying to integrate the software for the better analysis of big data [30]."]} +{"26362039|205286988": ["Techniques in this direction range from clustering, multihop transmission, data aggregation, and data fusion, just to mention a few [ 15 ], [19]\u2013[21].", "These factors are potentially devastating to the performance and the overall quality of service (QoS) of WSNs [4], [7], [8], [ 15 ], [16]."]} +{"26362039|1230643": ["2020802 fire, toxic gas leaks, and explosions [2], [3], [6].", "computation [2], [3]), as well as the unreliability of wireless", "ADVANCES in wireless technologies and microelectronic devices have led to the development of sensor nodes that are capable of sensing, processing, and transmitting data [2], [3]."]} +{"24237735|3348390": ["In our review, we have evaluated different solutions based on the classification of the IoT application domains of industry, environment, and society [4, 5].", "Another sensor network des a part of the Intelligent T according to [5], transport solu industry.", "Although Perera and colleagues [5] consider both smart building and home applications as belonging to the society domain, building and home automation really straddle the society and industry domains."]} +{"9413021|17623152": []} +{"9413021|2357830": []} +{"9413021|1236072": []} +{"9413021|1230643": ["Multihopping is a common technique to save energy and overcome the scalability issue [123]\u2013[125]."]} +{"46921999|44461432": ["Data mining techniques are used to analyze the data collected [9], [10] and enhance IoT intelligence [7], [10]."]} +{"53231033|8760041": ["Many modern incremental learers rely on a local partitioning of the input space, and a separate classification/regression model for each partition [160, 121, 148, 18, 21]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"3858307|3348390": ["In IoT environment, the context-aware information is normally collected and extracted from sensor data, and can be used to improve the service quality of IoT [11]."]} +{"18738774|1176034": ["Roddick and Spiliopoulou [35] survey the issues and solutions in temporal data mining."]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"207172599|3330313": []} +{"207011971|11050081": [", statistical dependencies characterizing a given phenomenon (such as client behavior), may change (Gama 2012).", "Furthermore, the relation within the data, i.e., statistical dependencies characterizing a given phenomenon (such as client behavior), may change (Gama 2012)."]} +{"196170644|2332366": []} +{"33218381|1489715": ["They already address numerous issues in data mining including execution time, complexity, and rule or query processing needed to mine stored (static) and/or stream data [8], [9], [10], [11], [14], [16].", "Recently, extracting knowledge from sensor data has received a great deal of attention in the data mining community [8], [9], [10], [11].", "computational complexity [8], [12], [13], [14], and the process of forming patterns and producing association rules is straightforward.", "sons [8] separating out actual data from the acquired data is"]} +{"23556999|44461432": ["Na\u00efve, selective na\u00efve, semi-na\u00efve Bayes, and Bayes multi-nets are the proposed categories for classi\ufb01cation [48]."]} +{"23556999|3750204": ["Big data analytics processes consume considerable time to provide feedback and guidelines to users, whereas only a few tools [29] can process huge data sets within reasonable amount of processing time."]} +{"23556999|121289": ["The smart grid is a new generation of power grid in which managing and distributing electricity between suppliers and consumers is upgraded using two-way communication technologies and computing capabilities to improve reliability, safety, ef\ufb01ciency with real-time control, and monitoring [73], [74]."]} +{"2594237|1489715": ["Our definitions can be seen as combined variants of the definitions from traditional domains [2,3,12] and XML domains [11,28].", "Recently, extracting knowledge from stream data has received great attention by the data mining community [12], because many modern applications require the robust transmission of streaming data over a sensor or telecommunication network."]} +{"2594237|981659": ["Figure 1 depicts a system architecture for a WSN environment [2,29,30] and presents simple examples of XML-encoded sensor data."]} +{"10864536|1489715": []} +{"35697745|3007529": []} +{"1893507|1734833": []} +{"206256778|3330313": ["Moreover, an anomaly in a dataset is defined as an observation that appears to be inconsistent with the remainder of the dataset (Hodge and Justin, 2004)."]} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} +{"18045606|1230643": []} +{"1489715|7774517": ["Most of the techniques examined in [27, 28] heavily rely on data mining techniques, but their focus is detection of irregularities in WSNs data rather than information extraction and analysis."]} +{"1489715|13726263": ["For example, frequent pattern mining over data stream is presented in [31, 32]."]} +{"1489715|6275330": ["With the capabilities of pervasive surveillance, sensor networks have attracted significant attention in many applications domains, such as habitat monitoring [1, 2], object tracking [3, 4], environment monitoring [5\u20137], military [8, 9], disaster management [10], as well as smart environments."]} +{"207756688|2469117": ["For example, the fish domain may consider the location more than pigeon domain, because the signal can be different underwater [7]."]} +{"5575228|17403085": []} +{"88481447|49668283": ["The goal of human tracking is to identify the next event based on occurrences of past events [33], [38], [39]."]} +{"60847542|1230643": ["Wireless sensor networks (WSNs) have been successfully applied for detailed observation of a variety of real-world applications, especially in battlefields, smart buildings, the human body and other applications that require the fine-grain monitoring of physical environments that are subject to critical conditions, such as fires, toxic gas leaks and explosions [1-3]."]} +{"13367130|205286988": []} +{"13367130|1230643": ["G 0 0 (:0 [1 ,2,3,5] [9] [1] [3] [5] \u00ae 0 0 [5] [9] 0 \u00ae \u00ae [8] [1] [2] [3] [4] [1,2,3,4,5] Figure 1: Sensors with activity sets Assuming minimum support to be 3, only SI, S3, S8 and S9 are frequent."]} +{"40853878|1489715": []} +{"53714599|44461432": []} +{"39354646|44461432": []} +{"39354646|1489715": []} +{"38742547|1489715": []} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} diff --git a/edge/graph_211684651.jsonl b/edge/graph_211684651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4db44990589b205cac5faadbd31f1532ebe948e --- /dev/null +++ b/edge/graph_211684651.jsonl @@ -0,0 +1,21 @@ +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"54559476|57189241": ["[12] briefly surveyed adversarial attacks on graphs."]} +{"54559476|56517517": ["Concurrent to our work, Zhou et al. [13] and Wu et al. [14] surveyed this \ufb01eld from different viewpoints and categorizations."]} +{"54559476|207023804": []} +{"54559476|3951790": ["Another closely related topic is network embedding, trying to embed nodes into a low-dimensional vector space [11]\u2013[13]."]} +{"50776812|3951790": []} +{"51608273|1479507": ["This merit has motivated a number of studies in this area [Cai et al., 2017; Zhang et al., 2017a].", "The key idea is to preserve the topological structure, vertex content, and other side information [Zhang et al. , 2017a].", "UPP-SNE employs an approximated kernel mapping scheme to exploit user pro\ufb01le features to enhance the embedding learning of users in social networks [ Zhang et al. , 2017b ] ."]} +{"51608273|3951790": ["However, the high computational complexity, low parallelizability, and inapplicability of machine learning methods to graph data have made these graph analytic tasks profoundly challenging [Cui et al., 2017].", "However, the high computational complexity, low parallelizability, and inapplicability of machine learning methods to graph data have made these graph analytic tasks profoundly challenging [ Cui et al. , 2017 ] ."]} +{"201070021|56517517": ["As such, most state-of-the-art GCN models are usually no more than 3 layers deep [52].", "Other works [43, 52] also show the limitations of stacking multiple GCN layers, which lead to highly complex backpropagation and the common vanishing gradient problem.", "Recent work [19, 43, 52] suggests that GCNs do not scale well to deep architectures, since stacking multiple layers of graph convolutions leads to high complexity in back-propagation.", "Designing deep GCN architectures [43, 52] is an open problem in the graph learning space.", "In contrast, it is not yet clear how to properly train deep GCN architectures, where several works have studied their limitations [19, 43, 52].", "Due to these limitations, most state-of-the-art GCNs are no deeper than 4 layers [52]."]} +{"206594947|12724190": []} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"210971227|1596835": ["Commonly used are Minkowski distance [9] and cosine distance [10]."]} +{"207238964|393948": ["Representation learning has long been an important problem of machine learning and many works aim at learning representations for samples [3, 35]."]} +{"7964594|987239": []} +{"19787452|393948": ["As described in [10], transfer learning refers to the ability to share and transfer knowledge between different tasks."]} +{"3657626|13370607": []} diff --git a/edge/graph_211685093.jsonl b/edge/graph_211685093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..426c6dd50077d946d9c105d9ac7bbea03c2144de --- /dev/null +++ b/edge/graph_211685093.jsonl @@ -0,0 +1,9 @@ +{"115374251|350515": []} +{"14109057|8530790": ["This means that the ratio of the computational effort of executing a GA by the computational cost of executing a deterministic algorithm becomes much smaller in the case of multiobjective optimization problems since a deterministic algorithm would have to run once a time for finding each Pareto point [3], [4].", "The GAs become particularly suitable for the problem posed here, once they have a well-established formulation for dealing with multiobjective problems [3], [4].", "In this way, instead of running an optimization algorithm once a time for finding each point of such a set, the GA can find this set in a single run [3], [4]."]} +{"22581282|191396": ["the SPEA [12] needs to reduce the number of solutions, and for this purpose, the clustering techniques are a good election [16].", "The FCM algorithm is one of the best available clustering methods [16], [23]."]} +{"114539383|350515": []} +{"122434745|8530790": []} +{"12450423|8530790": []} +{"169143537|16335158": []} +{"169143537|6355516": []} +{"14074696|1708582": ["The process is then iterated."]} diff --git a/edge/graph_211686379.jsonl b/edge/graph_211686379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e084e9065cf1dcf62c5592d7e906150740cae37a --- /dev/null +++ b/edge/graph_211686379.jsonl @@ -0,0 +1,11 @@ +{"52961629|10500613": ["Schema matching techniques [21], as a fundamental problem in many database application domains, can be employed to evaluate event similarities."]} +{"28811181|7704963": []} +{"12014952|10500613": ["Unfortunately, directly applying existing schema matching techniques [19] may fail to obtain the right mapping of heterogeneous events."]} +{"8155077|17981371": ["For more details on the computational complexity of various Fd and Ind discovery algorithms, we refer the interested reader to [94]."]} +{"8155077|191396": ["We refer the reader to surveys by Jain et al. [78] and Xu and Wunsch II [137] for more details on clustering algorithms for relational data."]} +{"8155077|3102110": ["Classi\ufb01cations of data mining tasks include an overview by Chen et al., who distinguish the kinds of databases (relational, OO, temporal, etc.), the kinds of knowledge to be mined (association rules, clustering, deviation analysis, etc.), and the kinds of techniques to be used [130]."]} +{"979951|8155077": ["A more complete summary of dependency discovery could be found in [2] or [12].", "While [2] consider a more general view of data profiling, [12] focus specifically on the relaxed extensions of FDs, including conditions and similarity metrics."]} +{"979951|386036": ["MDsare \ufb01rst proposed in [20] to specify matching rules for record matching (also known as record linkage or object identi\ufb01-cation, see [19] for a survey).", "For the similarity operator \u2248 on the remaining attributes, we use cosine similarity on q-grams [19] with threshold 0.8."]} +{"15411779|3330313": ["While outlier detection (see [12] for a survey) identi\ufb01es dirty points, data repairing further modi\ufb01es the points for correction."]} +{"26075706|10500613": ["Unfortunately, directly applying existing schema matching techniques [4] may fail to obtain the right mapping of heterogeneous events."]} +{"32613657|54997534": []} diff --git a/edge/graph_211686414.jsonl b/edge/graph_211686414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d20f5964451cd108fe95696797e361d430b0b7c7 --- /dev/null +++ b/edge/graph_211686414.jsonl @@ -0,0 +1,77 @@ +{"53110806|26429034": ["Examples abound, and are comprehensively reviewed in [1]: they include original insights on mobility laws [2], patterns of daily commuters [3], dynamics of infective disease epidemics [4], or people reaction to disaster situations [5].", "Instead, metadata collected by mobile network operators is fairly inexpensive to obtain, and covers large portions of the population [1]."]} +{"32173141|8909218": ["Massive femtocell deployment for improving indoor coverage has important advantages compared to the common approach of increasing the number of macrocellular sites [4]."]} +{"32173141|1708582": ["To evaluate transient response by a single figure, an infinite-horizon discounted model [43] is considered, as in [20]."]} +{"191163215|24110634": []} +{"191163215|15116409": []} +{"191163215|1185580": []} +{"191163215|1708582": []} +{"191163215|12188993": []} +{"191163215|46966524": []} +{"58012839|206578365": ["With MEC, the telecommunication network can provide ultralow latency, high bandwidth, and real-time services to users.", "MEC also allows effi cient execution of context-aware, computation-intensive applications in close proximity to mobile and computing customers [9].\nroutIng recommendAtIon methods Routing selection by recommending highly efficient paths is one of the significant shifts in current network technologies.", "Mobile edge computing (MEC) [8] can provide computing capabilities and an application running environment at the edge of the telecommunication network."]} +{"58012839|19938676": ["With the integration of software defined networks, network functions virtualization, artificial intelligence, big data, and the Internet of Things, the fifth generation (5G) [1] telecommunication network is expected to be a fundamental technology of digital transformation in our society.", "One feature of future telecommunication networks such as 5G [1] is the complete separation of the forwarding and controlling planes."]} +{"58012839|1236072": ["Also, routing techniques are investigated and surveyed in [11], where the routing techniques are classified into service groups from the perspective of the underlying network structure or protocol operation."]} +{"61811030|53116003": ["Consequently, in IoT, the distributed data can be efficiently collected with the support of crowdsourcing, and the collected data may be shared efficiently and further used in cognitive computing [2], [3]."]} +{"52153031|10213552": ["mented in Hadoop ecosystem was presented in [133].", "In contrast to most conventional shallow-structured learning methods, Deep learning has been successfully applied in many domains such as classification [133], traffic flow prediction [134], and object recognition [135]."]} +{"52153031|16559155": ["tion tool, ontology is widely used in semantic domains such as Semantic Web, information integration, and data warehousing to eliminate semantic ambiguity among different semantic systems [42]."]} +{"52153031|1507400": ["As an effective method of data processing, Google\u2019s MapReduce [116] for data compuation was devel-", "As an effective method of data processing, Google\u2019s MapReduce [116] for data compuation was developed tomeet the large data trend."]} +{"53116003|5022650": []} +{"53116003|3488022": ["Marine oil spills can be detected using a large archive of remote sensing big data [10]; and a real-time warning can be generated from a quantitative data analysis using supervised oil system [277]."]} +{"53116003|17397315": ["BigTable supplies highly adaptable, reliable, applicable and dynamic control and management in the \ufb01eld of big data placement, representation, indexing and clustering for enormous and distributed commodity servers, and it constitutes of a row, column, record tablet and time stamp.", "3) Tools for Cloud-Based Big Data Analytics: As the most popular tool for cloud-based big data analytics, Google\u2019s cloud computing platform [193] consists of GFS [26] (big data storage), BigTable [20] (big data management) and MapReduce (cloud computing), which was discussed in the previous section.", "After the data are transformed into manageable sizes, data mining tools (HDFS [14], MapReduce [15], R [16], S), real-time big data analytic tools (Storm [16], [17], Splunk [18]), and cloud-based big data analytic tools (GFS [19], BigTable [20], MapReduce) can be used to extract useful information and make sense of data, which would revolutionize the field of smart cities, environmental monitoring and others.", "As the most popular tool for cloud-based big data analytics, Google\u2019s cloud computing platform [193] consists of GFS [26] (big data storage), BigTable [20] (big data management) and MapReduce (cloud computing), which was discussed in the previous section.", "After the data are transformed into manageable sizes, data mining tools (HDFS [14], MapReduce [15], R [16], S), real-time big data analytic tools (Storm [16], [17], Splunk [18]), and cloud-based big data analytic tools (GFS [19], BigTable [20], MapReduce) can be used to extract useful information and make sense of data, which would rev-olutionize the \ufb01eld of smart cities, environmental monitoring and others."]} +{"53116003|16515889": ["The paper [35] surveyed the general concepts, challenges and applications for CPS."]} +{"53116003|303976": ["With 774 million connected health-related devices [309] by 2020, a large volume of data from small-scale networks, such as ehealth systems or mobile-health systems, needs to be stored,"]} +{"53116003|3348390": ["is considered the primary context, while obtaining the same information from the plant\u2019s database is referred to as the secondary context [9], [21].", "Context-aware computing from acquisition, processing, storing and reasoning, can be performed by the applications themselves, or by using libraries and toolkits, or even by using a middleware platform [9].", "Unlike other previous relevant literature surveys [5], [9], [21]\u2013[26], this paper provides a broader viewpoint on CPS from different aspects, mainly data collection and storage, processing, analytics, cybersecurity, and green solutions, rather than focusing on specific aspects of CPS."]} +{"53116003|10150488": ["GFS adopts clustered approach that divides data chunks into 64-KB blocks and stores a 32-bit checksum for each block.", "HDFS is developed from an inspiration of GFS [19], and it is a scalable and distributed storage system, which is an appropriate solution for data-intensive applications, such as Gigabyte and Terabyte scale.", "In order to deal with the commodity component failure problem, GFS facilitates continuous surveillance, errors detection and component faults tolerance.", "Unlike other previous relevant literature surveys [5], [9], [21]\u2013[26], this paper provides a broader viewpoint on CPS from different aspects, mainly data collection and storage, processing, analytics, cybersecurity, and green solutions, rather than focusing on specific aspects of CPS.", "3) Tools for Cloud-Based Big Data Analytics: As the most popular tool for cloud-based big data analytics, Google\u2019s cloud computing platform [193] consists of GFS [26] (big data storage), BigTable [20] (big data management) and MapReduce (cloud computing), which was discussed in the previous section.", "GFS is a distributed \ufb01le system and it is enchanced to meet the requirements of big data storage and usage demands of Google Inc.", "As the most popular tool for cloud-based big data analytics, Google\u2019s cloud computing platform [193] consists of GFS [26] (big data storage), BigTable [20] (big data management) and MapReduce (cloud computing), which was discussed in the previous section.", "After the data are transformed into manageable sizes, data mining tools (HDFS [14], MapReduce [15], R [16], S), real-time big data analytic tools (Storm [16], [17], Splunk [18]), and cloud-based big data analytic tools (GFS [19], BigTable [20], MapReduce) can be used to extract useful information and make sense of data, which would rev-olutionize the \ufb01eld of smart cities, environmental monitoring and others."]} +{"53116003|25929315": ["g overhead, packet scheduling problems due to MTC traf\ufb01c requiring a number of radio resources below the minimum allocated to a cellular device;, and the large interferences generated from MTC devices[73]. Differentrelevantworks, suchas [74]\u2013[77], suggested of\ufb02oading the MTC traf\ufb01c onto device-to-device (D2D) communications links. As a matter of fact, Google OnHub router can support direct D2D communi"]} +{"53116003|10310014": ["In case of a disaster or emergency event, the people who are first on scene are referred to as first responders, and they include law enforcement, firefighters, medical personnel and others [314].", "Some of the major public safety requirements relate to the necessity of first responders to exchange information (voice and/or data) in a timely manner [314]."]} +{"53116003|20905429": ["\u2026surgery, patients\u2019 health monitoring, which will signi\ufb01cantly enhance the healthcare system by providing timely, ef\ufb01cient and effective medical decisions for a myriad of health applications such as diabetes management, blood pressure and heart rhythm monitoring, elderly support and so on [308]."]} +{"53116003|30815820": ["Social computing allows the integration of these social behaviors and contexts into web technologies to assist with predicting social dynamics, which can render the operation, planning and maintenance of social wireless networks easier than ever [47], [48]."]} +{"3645740|7851743": ["In contrast to other surveys in the area, such as [10], which", "In SON, the concept of self-optimization can be defined as a function that constantly monitors the network parameters and its environment and updates its parameters accordingly in order to guarantee that the network performs as efficiently as possible [10].", "The concept of SON in cellular networks was defined in [10]", "needs to reconfigure its parameters [10].", "feeding more data to the system, adding more features to the input data or adding more layers in a NN, without it limitlessly increasing its complexity [10].", "work that is also scalable, stable and agile enough to maintain its desired objectives [10].", "These categories are: self-configuration, self-optimization and self-healing and are commonly denoted jointly as self-x functions [10].", "Based on that, it is assumed that the reader already is familiar with SON concepts and its use cases, otherwise the reader can refer to [10].", "Self-healing in cellular systems can occur in terms of network troubleshooting (fault detection), fault classification, and cell outage management [10]\u2013[13]."]} +{"3645740|6105131": ["which focused on basic definitions and concepts of selforganizing systems and how could self-organization be applied in the context of wireless sensor networks, or even [21],"]} +{"3645740|1708582": ["For readers interested in Reinforcement Learning, please refer to: [184] and [185]."]} +{"133413287|3757239": ["Deploying intelligent caching is efficient and able to cope with the demands of users for it can quickly obtain the information they required [6], [7]."]} +{"133413287|4502294": ["d is a parameter that affects the quality of video synthesis [2]."]} +{"32343949|26429034": ["Mobile traffic analysis attracts much attention with the increase of smart phones[25]."]} +{"32343949|14765802": ["However, previous work [5, 29, 38] designs the BS sleeping strategy based on the static temporal traffic characteristics.", "Such a BS sleeping strategy is proposed and implemented in [29, 38].", "8 W as the minimum energy cost only keeping power-on, while the former value is doubled in its load dependency part compared with [38] to achieve the maximum coverage in the activation mode according to [29], and the latter is consistent with the [38].", "Insofar various approaches are proposed to reduce the energy consumption for green cellular networks, which can be broadly classified into four categories [38].", "The slept BS will save the power consumption and reduce the whole consumption up to 50% [29, 38].", "In addition to low power design of the BS hardware and software, the traffic-driven BS sleeping strategy is a recent research hot spot to improve existing cellular networks, which switches the BSes to low energy consumption mode, namely the \u201csleep\u201d mode, according to the traffic patterns [29, 38]."]} +{"19084734|34643772": []} +{"8196780|8909218": ["Femtocells are small cells whose role in HetNets is essential due to its effectiveness for increasing capacity and coverage in indoor environments [1]."]} +{"8196780|1708582": []} +{"2425056|3555631": ["We consider CDSA model which is a recently emerging radio access network (RAN) architecture proposed for 5G networks where macro base stations (MBSs) are used to provide coverage and handle most of the control signalling and small cells (SCs) under the MBSs provide the required data services [28]."]} +{"2425056|7851743": ["For further reading on SON, an extensive survey is presented in [9]."]} +{"195767238|53018231": ["First, a majority of the existing works focuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks."]} +{"195767238|9461213": ["The smartphone-centric networks of yesteryears are gradually morphing into an Internet of Things (IoT) system [1]\u2013[3] that integrates a heterogeneous mix of wireless-enabled devices ranging from smartphones, to drones, connected vehicles, wearables, sensors, and virtual reality devices.", "of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks.", "2) Neural Networks for the Internet of Things: ANNs can be used to address some of the key challenges within the context of the IoT.", "In addition, the emergence of the Internet of Things further motivates the use of ANNs to improve the way in which wireless data is processed, collected, and used for various sensing and autonomy purposes.", "F. Internet of Things\n1) The Internet of Things: In the foreseeable future, it is envisioned that trillions of machine-type devices such as wearables, sensors, connected vehicles, or mundane objects will be connected to the Internet, forming a massive IoT ecosystem [160].", "Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software defined networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks.", "In particular, we have investigated many emerging applications including unmanned aerial vehicles, wireless virtual reality, mobile edge caching and computing, Internet of Things, and multi-RAT wireless networks."]} +{"195767238|3645740": ["of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks."]} +{"195767238|206578365": ["can be used for performing effective and low-latency computations using the emerging paradigm of mobile edge computing [140]."]} +{"195767238|17485266": []} +{"195767238|5385031": ["The smartphone-centric networks of yesteryears are gradually morphing into an Internet of Things (IoT) system [1]\u2013[3] that integrates a heterogeneous mix of wireless-enabled devices ranging from smartphones, to drones, connected vehicles, wearables, sensors, and virtual reality devices."]} +{"195767238|7774517": []} +{"195767238|1708582": ["ta from implementation. The goal of RL is to learn an environment and \ufb01nd the best strategies for a given agent, in different environments. RL algorithms are used for robotics, gaming, and navigation [67]. To perform these learning tasks, several frameworks have been developed. Among those frameworks, arti\ufb01cial neural networks (ANNs) [60] constitute one of the most important pillars of machine learnin"]} +{"67693197|5022650": []} +{"67693197|25929315": ["Second, current networks are already dealing with scarcity of spectrum resources, which means there might not be enough resources to support CPS communications and packet scheduling problems will quickly result leading to a significant decrease in network capacity and spectral efficiency [13, 15]."]} +{"14997243|16554578": []} +{"53289908|1598350": ["5G mobile communication system puts forward the requirements that are high-speed, high efficiency, and high security under three typical application scenarios: enhanced Mobile Broadband (eMBB), Large-Scale Internet of Things (IoT), and ultraReliable& Low-latencyConnections (uRLLC) [1, 2].", "However, it is still very difficult to use the cipher algorithm that meets the resource-constrained application scenarios such as wireless mobile terminals, IoT, and sensor networks.", "Meanwhile, 5G involves the interconnection and communication between a large number of machines and equipment, which is a necessary condition for the operation of IoT [3]."]} +{"17361846|7851743": ["For this reason, Self-organizing Network (SON) in [4][5][6]is a key concept for Picocell management, where a set of principles and concepts is defined for automating network management while improving network quality."]} +{"44091851|3348390": []} +{"44091851|25929315": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"9563770|7851743": ["If there is no intelligent and automated small cells management strategy, users will suffer serious interference and the operators will have high operational expense (OPEX).", "Operators can utilize the self organizing network (SON) to automatically manage and optimize the system performance for lower OPEX [1]."]} +{"19820055|23893450": ["[28] present a survey of the recent data driven approaches in smart grid security."]} +{"146120019|22203221": []} +{"23872521|3913780": []} +{"6216458|6344722": ["In a word, a learning and prediction study over application-level data traffic might contribute to understanding data service\u2019s characteristics and performing finer resource management in the 5G era [8]."]} +{"34715674|7851743": ["In [5] Aliu and colleges provide a survey of the existing literature in SO cellular networks, comparing the strengths and weakness of existing solutions and highlighting the key research areas for further development."]} +{"21707066|1708582": ["We consider three approaches for comparison: 1) Distributed Individual Reinforcement Learning - each user adjusts the selected network to maximize the achieved utility, according to the reinforcement learning algorithm [18], [19], 2) Social Best Response - a randomly selected user is activated and deviates his small cell association to maximize the sum utility of all users in each iteration, and 3) Coordinated Reinforcement Learning - Under the framework of reinforcement learning, a marginal cost pricing is added in each user\u2019s utility to reflect the loss of throughput caused by his presence in the currently associated small cell."]} +{"12187684|8606364": ["References [9] and [10] present two surveys of methodologies and measurement campaigns of spectrum occu-", "In addition, they review the reliability of these types of measurements [9] and they illustrate how to predict the system evolution thanks to available information and regression analysis [10].", "For instance, [9] and [10] provide two independent taxonomies of methodologies, campaigns and models.", "CR networks consist of devices that exploit channels that are unused at specific locations and times [10], but that are usually allocated to primary users (i.", "In particular, [9] proposes a conservative approach to account for measurement uncertainty, while [10] exploits predictors to provide the future channel status."]} +{"12187684|512561": ["Finally, [90] describes how to exploit CR to realize a complete smart grid scenario; [91] describes how to exploit channel bonding to increase the bandwidth and decrease the delay of CR."]} +{"12187684|3330461": ["nication between mobile phones to support the operations of a cellular network [168]."]} +{"12187684|2261490": ["Barakovi\u0107 and Skorin-Kapov [8] provide a thorough survey including various methods for modeling QoE for different applications and also discuss tools for estimating and predicting QoE values by probing network parameters.", "2698 [8] S. Barakovic\u0301 and L. Skorin-Kapov, \u201cSurvey and challenges of QoE 2699 management issues in wireless networks,\u201d Hindawi J. Comput.", "Barakovic\u0301 and Skorin-Kapov [8] provide a thorough 225 survey including various methods for modeling QoE for dif- 226 ferent applications and also discuss tools for estimating and 227 predicting QoE values by probing network parameters."]} +{"12187684|13172512": ["In a similar attempt, [6] reviews real time Internet traffic classification.", "Among other attributes, the prediction of data traffic and throughput has been the subject of [5] and [6]."]} +{"12187684|191396": ["The interested reader is referred to [150] for a complete review."]} +{"52046218|14843594": ["In addition, we use the Bayesian optimization algorithm [15] to tune the hyper-parameters for the comparing methods and present the optimized results here."]} +{"19008847|7851743": ["[9] [10].", "The reader is referred to [9] for further details on operation timescales of SON.", "While these projections promise that capacity targets of 5G are theoretically achievable, it is alarming to note that the complexity of operation, OPEX, CAPEX, and shrinking profit margins are already major challenges for operators of state-of-the-art cellular networks [9].", "A detailed review of the state-of-the-art SON functions for legacy cellular networks can be found in [9]."]} +{"96431854|15438029": ["In [16], they introduced the basic concepts of socially aware networking (SAN) to exploit the network node\u2019s social properties in the design of networking solution and presented a survey of state-of-the-art works in SAN.", "A number of works have examined the social context in communications [16], [17].", "\u2026relationship or not and it is given by We use a degree centrality in the social graph as the user\u2019s social impact in a social network as follows. where deg ( i ) is the number of directly connected neighbors of user i and n is the maximum number of possible connected edges in the social graph [16]."]} +{"16524479|2623404": ["Software Defined Networks: Within the idea of a programmable network proposed as an approach to facilitate network evolution, SDN is a novel paradigm, which decouples the forwarding hardware from control decisions [7] [8]."]} +{"198354812|14650419": ["In general, RFID systems normally comprise many tags that send signals and a reader that receives and then processes such signals (Klair et al. 2010; Zhu and Yum 2011).", "Moreover, a Framed Slotted ALOHA ( FSA ) algorithm was investigated and extended in Klair et al. (2010), Shih et al. (2006), and Bin et al. (2005), where a time slot can be randomly chosen to send signals.", "In the original Pure ALOHA ( PA ) algorithm (Klair et al. 2010), each tag responds to the reader randomly.", "As an improved algorithm with more effective throughput, Slotted ALOHA ( SA ) based algorithms were reported in Klair et al. (2010), Shih et al. (2006), and Eom and Lee (2010)."]} +{"10466980|7851743": ["On the other hand, in order to cope with growing network density, the replacement of human-driven (half-manual) network management solutions with techniques providing self-organising networks is also being considered [11, 12].", "The self-organising framework proposed in this paper is applicable for short-term to large-term dynamics of cellular systems [11], that is, the density of active cloud cells can change in a time scale of seconds to days in response to the cellular ecosystem dynamics, such as mobility, temporary\u2026"]} diff --git a/edge/graph_211724404.jsonl b/edge/graph_211724404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eda08113e893ba1f2b33319dc19f4ff16dc6cce4 --- /dev/null +++ b/edge/graph_211724404.jsonl @@ -0,0 +1,7 @@ +{"145853878|3932089": []} +{"133603697|17675973": []} +{"133603697|193574": ["A survey of techniques for improving energy efficiency in distributed systems focused more on grids and clouds was presented in [8]."]} +{"16619644|9436861": ["Existing work has systematically studied the literature about GPU-accelerated systems [10], compared programming productivity of OpenACC and CUDA using a group of students to parallelize sequential codes [7], or used kernels for comparing execution time of OpenCL and CUDA-based implementations.", "Mittal and Vetter [10], provide a comprehensive coverage of literature for GPU-accelerated computing systems."]} +{"198445505|53277970": []} +{"198445505|52260417": []} +{"27270790|19127869": ["This support for the user defined shader codes provides a great flexibility to the users to obtain more elaborated visual representation during the rendering process [10] [25]."]} diff --git a/edge/graph_211734103.jsonl b/edge/graph_211734103.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df9335bab2c2410229aa1f33cae00f0ba0de4973 --- /dev/null +++ b/edge/graph_211734103.jsonl @@ -0,0 +1,19 @@ +{"4563592|31245252": ["backend infrastructure [3], which need to be addressed to ensure a smooth development of this promising technology."]} +{"4415243|7679009": []} +{"4415243|12819773": ["In [155], for example, the authors propose a taxonomy and survey of cloud orchestration techniques.", "Several works have somehow addressed the theme of orchestration in different scopes, including clouding computing [155], SDN [82], [88], and NFV [158], [100], [11]."]} +{"4415243|44621519": ["Similarly, several (academic and industrial) research and (commercial) development efforts in orchestration, SDN and NFV have been going in recent years, concretized in a number of collaborative endeavors such as OSM [5], OpenStack [6], ONAP [7], 5G-EX [8], CORD [9], etc.", "Similarly, several (academic and industrial) research and (commercial) development efforts in orchestration, SDN and NFV have been going in recent years, concretized in a number of collaborative endeavors such as Open Source MANO (OSM) [5], OpenStack [6], Open Network Automation Platform (ONAP) [7], 5G-Exchange (5G-EX) [8], Central Office Re-architected as a Datacenter (CORD) [9], etc."]} +{"4415243|18167210": [", networks, servers, storage, and services) with high flexibility, cost efficiency, and centralized management [90]."]} +{"4415243|6583734": ["stance, the NFV should meet performance requirements to support, in a standard server, the packet processing, including high I/O speed, fast transmission, and short delays [158].", "Templates and standards should be developed to guarantee automated and consistent translation [158].", "Several works have somehow addressed the theme of orchestration in different scopes, including clouding computing [155], SDN [82], [88], and NFV [158], [100], [11]."]} +{"4415243|8650651": []} +{"4415243|15449163": []} +{"53280254|3750204": ["For mainstream GPU applications such as bigdata analytics [21] and machine learning [22], one application could fully occupy the resource of one or multiple SMs, which could achieve a high utilization efficiency of GPU."]} +{"4809123|10559330": ["2There may also be contention within the fabric connecting different servers; that is outside the scope of this paper, but we envisage that standard fabric QoS and provisioning mechanisms [6, 54] can be applied there."]} +{"206904221|4718973": ["Proxy [34] Flow, session Mapping, rewrite and routing Similarity detect, caching, proxy rule", "Firstly, due to the fact that middle-boxes are standalone and closed, they naturally introduce new failures when they crash, and the diagnosis for these failures and some mis-configurations would be rather complex [34] ."]} +{"206904221|20991784": []} +{"206904221|9495329": []} +{"206904221|11414835": []} +{"206904221|4269723": []} +{"88483588|4415243": ["Whereas orchestration is out of the scope of this paper, [11] and [28] testify that effort is ongoing into making it possible to harness acceleration techniques in a seamless way.", "An overview of efforts from research projects, standardization bodies, and both open-source and commercial implementations is provided in [28]."]} +{"88483588|11414835": ["A survey of SDN hypervisors is available in [26].", "This paper leverages the technologies described in [26] and clearly build upon [25]; speci\ufb01cally, we go one step further with respect to [25] by understanding how functions can be implemented and, especially, accelerated with either software, hardware, or hybrid approaches."]} +{"201620563|3273340": ["9 billion MACs, respectively) [2].", "requiring significant compute power, typically requiring specialized accelerators such as GPUs to speed up the processing [2], [3]."]} +{"18859281|8450611": []} diff --git a/edge/graph_211818156.jsonl b/edge/graph_211818156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5453873a34202fef575a0c0b4fa7bf080c8c04e8 --- /dev/null +++ b/edge/graph_211818156.jsonl @@ -0,0 +1 @@ +{"8720775|14221868": ["See [1, 3] for a comprehensive survey of these approaches.", "[3], most of these approaches that combine risk assessment and testing focus on specific aspects of the risk or testing process such as test case generation or risk estimation."]} diff --git a/edge/graph_211818180.jsonl b/edge/graph_211818180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d49b9c233bb3b5a48093f1655fbe05a970779ff6 --- /dev/null +++ b/edge/graph_211818180.jsonl @@ -0,0 +1,15 @@ +{"8379583|393948": ["\u2026achieved in recent years using machine learning \u2217 The \ufb01rst two authors contributed equally. methods, more speci\ufb01cally with neural architectures [1]; however, it is worth noting that many of the most successful approaches, in particular convolutional and recurrent neural networks, were known for\u2026"]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"18380963|6337591": ["Early work on modeling dialogues is either rule-based (Weizenbaum, 1966) or learning-based (Litman et al., 2000; Schatzmann et al., 2006; Williams and Young, 2007)."]} +{"2816661|8310135": ["NeuroNER is based on a fully supervised learning algorithm, which is the most studied approach (Nadeau and Sekine, 2007)."]} +{"3147007|6337591": ["This dialogue literature thus widely applies reinforcement learning (Walker, 2000; Schatzmann et al., 2006; Gasic et al., 2013b; Singh et al., 1999; Singh et al., 2000; Singh et al., 2002) to train dialogue policies."]} +{"1033682|174797842": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"55186354|52877341": ["Alterna-tively, meta-based-approaches can be used to conducting a literature review and include the work of Mishra, Gunasekaran, Papadopoulos, and Childe (2016), which adopt a bibliometric and network analysis approach to obtain and compare in \ufb02 uential work in a speci \ufb01 c domain (in this example,\u2026"]} +{"55186354|2652752": ["\u2026and Teuteberg (2014) \u2013 BD logistics; Eembi, Ishak, Sidi, Affendey, and Mamat (2015) \u2013 on data veracity research for pro \ufb01 ling digital news portal, and Abdellatif, Capretz, and Ho (2015) \u2013 on software analytics (a distinct branch of BDA), this paper attempts to broaden the scope of their\u2026"]} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} +{"3397190|10137425": ["We also expect to see more research on multimodal learning [190] as, in the real world, language is often grounded on (or correlated with) other signals."]} +{"16756501|393948": ["Recently, deep neural networks (Hinton and Salakhutdinov 2006) and representation learning (Bengio, Courville, and Vincent 2013) have led to new ideas for solving the data sparsity problem, and many neural models for learning word representations have been proposed (Bengio et al. 2003; Mnih and\u2026"]} +{"6058083|16768404": ["ML approaches address sentiment analysis as a regular text classification problem that makes use of syntactic and/or linguistic features [20]."]} +{"704519|38476": ["Structured learning problems have been addressed by algorithms such as conditional random elds (Laert y et al., 2001), max-margin Markov networks (Taskar et al., 2003) and constrained perceptrons (Punyakanok & Roth, 2001); see ( Dietterich, 2002 ) for a review."]} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} diff --git a/edge/graph_2119856.jsonl b/edge/graph_2119856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_211990905.jsonl b/edge/graph_211990905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2120546.jsonl b/edge/graph_2120546.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2122433.jsonl b/edge/graph_2122433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2eb30d7a9b4339d9a57331eb6b3b8a3f73f0be78 --- /dev/null +++ b/edge/graph_2122433.jsonl @@ -0,0 +1 @@ +{"3230690|18487363": ["In essence, these methods replace the alternative hypothesis score by some quantity calculated from the class models."]} diff --git a/edge/graph_212415067.jsonl b/edge/graph_212415067.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e364c32a8638c762cc67fb004d2fa54e9533e9e5 --- /dev/null +++ b/edge/graph_212415067.jsonl @@ -0,0 +1,20 @@ +{"5024194|393948": ["Deep learning methods, especially convolutional neural networks (CNNs), have recently led to breakthroughs in many computer vision tasks such as object detection and recognition, and image segmentation and captioning [22]\u2013[24].", "Deep learning has completely transformed the performance of many computer vision tasks [23], [24]."]} +{"49866497|7158350": ["Deep neural networks convince by successful application with a huge variety of tasks [17], including classification specifically [24]."]} +{"52919290|12487207": ["Texture synthesis is the process of generating new texture images which are perceptually equivalent to a given texture sample (Efros and Leung 1999; Gatys et al. 2015; Portilla and Simoncelli 2000; Raad et al. 2017; Wei and Levoy 2000; Zhu et al. 1998).", "Researchers (Raad et al. 2017; Akl et al. 2018) presented a review of exemplar based texture synthesis approaches."]} +{"52919290|4570087": ["\u2026applications of texture analysis include medical image analysis [48, 158, 177], quality inspection [250], content based image retrieval [148, 216, 266], analysis of satellite or aerial imagery [96, 83], face analysis [4, 49, 215, 265], biometrics [137, 185], object recognition [210, 173, 263],\u2026"]} +{"52919290|393948": ["A full review of these networks is beyond the scope of this paper, and we refer readers to the original papers [84, 87, 103, 214, 220] and to excellent surveys [15, 31, 75, 112, 133] for additional details."]} +{"52919290|192934": ["As a classical pattern recognition problem, texture classi\ufb01cation primarily consists of two critical subproblems: texture representation and classi\ufb01cation [90].", "The global feature is used as the basis for classi\ufb01cation, for which many approaches are possible [90, 242]: Nearest Neighbor Classi\ufb01er (NNC), Support Vector Machines (SVM), neural networks, and random forests.", "Many classi\ufb01cation approaches are possible [90, 242], although Nearest Neighbor Classi\ufb01er (NNC) and Support Vector Machine (SVM) are the most widely-used classi\ufb01ers for the BoW representation."]} +{"53248665|5238287": ["The resulting image can then be subject to \"gender recognition\" which\u2014while experimentally undertaken using gait[107] or overall body shape [80] \u2014is usually based on the person\u2019s face [69]."]} +{"18256170|5313655": ["In related literature [16], to protect the privacy of stored biometric data (e.", "These approaches, such as fuzzy vault cryptosystems, invariably result in loss of matching accuracy as demo nstrated in the literature [16]."]} +{"198968250|4951598": ["The emergence of deep convolutional neural networks (CNN) [38, 55, 59, 31, 32] greatly advances the frontier of face recognition (FR) [63, 58, 54]."]} +{"198968250|3654323": ["Unsupervised domain adaptation (UDA) [64] is one of the promising methodologies to address algorithm biases, which can map two domains into a domain-invariant feature space and improve target performances in an unsupervised manner [61, 40, 60, 24].", "UDA [64] utilizes labeled data in relevant source domains to execute new tasks in a target domain [61, 40, 41, 24, 60]."]} +{"152282664|16527268": ["The explosive growth in the use of smartphones and wearable devices, such as smartwatches and activity trackers, presents an unprecedented opportunity for biometric researchers [3, 24]."]} +{"18600985|14674468": ["[55] which provides a comprehensive study on human and automated analysis of race classification."]} +{"18600985|2301292": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"18600985|5238287": ["To reduce dimensionality (a critical step for obtaining better gender estimation accuracy [177]), often, the human silhouette is extracted and a statistical feature - namely an average silhouette - is computed."]} +{"18600985|14303607": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"54441633|5243419": ["The study of biometric sample quality has been particularly intense in the field of fingerprint recognition where multiple works have proposed different methods to measure it [4], [5]."]} +{"91168921|3342225": ["For commercial systems, the audit itself is characterized as a \"black box audit\", where the direct or indirect influence of input features on classifier accuracy or outcomes is inferred through the evaluation of a curated benchmark [30, 33]."]} +{"65337002|18702964": []} +{"65337002|18609918": []} +{"65337002|17574321": ["It is based on human voice which is a unique pattern that identifies an individual \u2013 there are no two individuals that sound identical [86]."]} diff --git a/edge/graph_212426432.jsonl b/edge/graph_212426432.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_212563994.jsonl b/edge/graph_212563994.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6a6f5eebe60ca0bf695c03438a73218ae0da8b2 --- /dev/null +++ b/edge/graph_212563994.jsonl @@ -0,0 +1,28 @@ +{"1355871|17325804": []} +{"202102648|5771653": ["4 [26] and Bluetooth Low Energy (BLE), a position can be established with 5-10 meters range.", "ultrasonic [12], dead-reckoning, signature-based and hybrid technologies [26].", "RSSIn) in a training phase, where RSSIn is the signal strength between an object and each reference point [26]."]} +{"19888241|16050825": ["short-range wireless transmission [33], [34]."]} +{"19888241|13074005": ["Generalised Space Shift Keying (GSSK): GSSK is a subset of spatial modulation [146], [147], where spatial domain is exploited to modulate information [148]."]} +{"24716244|18438336": ["Museums are another beneficiary of location-enabled IoT technology [51]."]} +{"7618954|10089999": ["CUPID [15] reduces the effect of multipath on signal strength, but is fundam ntally susceptible to indoor shadowing.", "However, we found that the angle estimation granularity with recent 3antenna commodity APs is only 60 degrees [15], resulting in large location estimation errors of more than 7m on average.", "However, we found that the angle estimation granularity with recent 3a tenna commodity APs is ly 60 degrees [15], resulting in large location estimation errors of more than 7m on average.", "CUPID [15] reduces the effect of multipath on signal strength, but is fundamentally susceptible to indoor shadowing."]} +{"4874075|17165859": ["But most importantly from the localization perspective, visible light based systems have the ability to estimate an object\u2019s location to an accuracy within the centimeter range [8].", "Visible light based localization algorithms can be broken down into three categories: proximity, fingerprinting and geometry based techniques [8]."]} +{"52125636|17165859": ["Another difference from [15] and [24] is that the discussion of all the key features of the VLC positioning system are tightly connected with the positioning system (i.e., channel model, multiplexing protocols, \ufb01eld of view, noise, multipath, and error).", "The work [24] focused on the positioning algorithms while many characteristics of the VLC positioning (e.g., multiplexing protocols, \ufb01eld of view, and rolling shutter effect) were only generally discussed or mentioned.", "In the article [24], an intensive effort was made to present the published literature of VLC positioning systems."]} +{"52125636|4491892": ["The PF, which is a Monte Carlo method, uses a set of weighted particles to approximate the real posterior distribution [90-93].", "Unlike KF, linearity and Gaussian distribution are not required in PF process [90-93]."]} +{"40008312|17165859": ["Modern buildings usually use several types of light bulbs, such as the compact fluorescent lamp (CFL) and light-emitting diode (LED) [26].", "To eliminate the need for customized LEDs, LiTell system [19] extracts high-frequency features from fluorescent light for localization.", "Existing visible light localization systems, such as polarized LEDs [17] and collocated LEDs [18], require customized LED drivers to emit identity beacons, which increases the system cost."]} +{"40008312|206583375": ["Indoor localization has been a research hotspot for decades [1]."]} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} +{"4559027|52125636": ["Indoor localization systems using LEDs have shown to be more accurate with 0.1\u20130.35 m positioning error when compared to WiFi (1\u20137 m) and Bluetooth (2\u20135 m) [11]."]} +{"4559027|17165859": ["Recently, authors in [12] mainly classi\ufb01ed VLC based positioning techniques into four groups: proximity, \ufb01ngerprinting, triangulation and vision analysis."]} +{"49570234|52125636": ["ing low cost of transmitter, less multipath effect due to the inherent characteristic of line-of-sight transmission, and great potential of higher bandwidth usage [2], [3].", "In recent years, visible light positioning (VLP) becomes more and more promising in the scenario of indoor positioning services as the LED lighting infrastructure is blooming worldwide [1], [2]."]} +{"68089507|46642131": ["specific indoor objects [5], [6]."]} +{"68089507|17165859": ["In follow-up studies, various algorithms used for determining the location were proposed, which can be summarized as TOA, TDOA, RSS, AOA, fingerprinting, and vision analysis [40], [41]."]} +{"68089507|206583375": ["In follow-up studies, various algorithms used for determining the location were proposed, which can be summarized as TOA, TDOA, RSS, AOA, fingerprinting, and vision analysis [40], [41]."]} +{"3249290|53116003": ["While we discuss the type of services that localization can provide by leveraging the IoT framework [87] in Section VII, below we present and"]} +{"3249290|4427557": ["Low Power Wide Area Networks (LPWANs) such as LoRA and Sigfox in its current shape cannot provide high localization accuracy and must be combined with other localization techniques and technologies for higher localization accuracy [156]."]} +{"3249290|6396569": ["Amundson and Koutsoukos [11] presents a survey on different localization methods for wireless sensors."]} +{"3249290|206583375": []} +{"169033212|17165859": ["Taking into consideration the system complexity and cost, PD-based systems using the RSS algorithm are most widely reported [5\u20138]."]} +{"4707564|9978124": ["The ROS package visp auto tracker [17] was used to process image data from the drone\u2019s camera to enable QR-code detection for interactive demonstration."]} +{"125241903|17165859": []} +{"52965866|3272873": ["The localization accuracy (less than 1 meter) of RFID [17] depends on densely deployed RFID readers, which are very expensive."]} +{"48357926|17165859": ["State of the art surveys on the topic of indoor positioning systems using visible light communication, or otherwise referred to as visible light positioning (VLP), generally outline the specific components that are possible to use in such a system [2,3]."]} diff --git a/edge/graph_212628281.jsonl b/edge/graph_212628281.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..358445f32c8a6a3f3dfb7909e39a8b6e48084cda --- /dev/null +++ b/edge/graph_212628281.jsonl @@ -0,0 +1,6 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"52008288|17485266": ["Each worker, say the k -th worker, holds a local dataset (Ruder (2016)), like momentum SGD and ADAM."]} +{"11438116|7971188": ["To make Gaia more scalable with more data centers, we use the concept of overlay networks [48]."]} +{"206592484|456491": []} +{"207240067|1805048": ["YouTube is the world\u2019s largest platform for creating, sharing and discovering video content."]} +{"202741181|17485266": [", random search, grid search and SGD with momentum [30].", "Some simple heuristic algorithm like SGD with momentum [30] may work when the training speed has a trend of unimodality, but we can not get the accurate gradient of the curve as it is non-parametric.", "For SGD with momentum [30], we randomly choose an initial point and restart the algorithm in case that it is stuck in a local optimum."]} diff --git a/edge/graph_212628603.jsonl b/edge/graph_212628603.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9954cec0bf142c93258da9dfcd5f865c59c2408 --- /dev/null +++ b/edge/graph_212628603.jsonl @@ -0,0 +1,50 @@ +{"174801158|3693305": []} +{"201679685|3693305": ["A comprehensive survey is provided in [46].", "This work focuses on learning to hash [46], a data-dependent hashing scheme for ef\ufb01cient image retrieval that has shown better performance than data-independent methods.", "There are two solutions to ANN search: indexing [22] and hashing [46]."]} +{"3691446|3693305": ["For a more comprehensive survey of the hashing literature, we refer readers to [39]."]} +{"78094295|1596835": ["Therefore more attention is being paid to hash-based methods [20], [21], [23], [31]\u2013[36], which have relative low storage cost and a fast query speed."]} +{"206592484|456491": []} +{"174803047|3693305": ["As the tremendous progress of deep learning, recently, deep neural network (DNN) has been deployed to perform binary code learning in cross-modal hashing methods [2, 4, 11, 16, 22, 26] for its appealing representation power."]} +{"6055846|5671282": ["Please refer to [38] for a comprehensive survey.", "In this paper, we will focus on learning to quantization methods [38] that build data-dependent binary encoding schemes for efficient image retrieval, which have shown better performance than data-independent hashing methods, e.", "Parallel to the traditional indexing methods [24], another advantageous solution is hashing methods [38], which transform high-dimensional data into compact binary codes and generate similar binary codes for similar data items."]} +{"6055846|393948": ["Recently, deep hashing methods [41, 23, 35, 12, 45, 5, 7, 6] have shown that end-to-end learning of feature representation and hash coding can be more effective using deep networks [21, 3], which can naturally encode any nonlinear hash functions."]} +{"198920237|3693305": []} +{"1033682|174797842": []} +{"202700099|5671282": ["Since the hash-based approach [8] can encode an image into a compact binary code with similarity preservation, the burden of computation and memory requirements can be reduced."]} +{"51986423|5671282": ["Image similarity search in big datasets has gained tremendous attentions in different applications such as information retrieval, data mining and pattern recognition [47]."]} +{"40430109|14843594": [", (Snoek et al., 2012; Shahriari et al., 2016)) in which we use an acquisition function, such as expected improvement or upper confidence bound, to rank the candidate models; this takes into account uncertainty in the prediction of a model\u2019s performance, which encourages us to try models for which our predictor may be unreliable."]} +{"199064719|5671282": ["By projecting high-dimensional data to compact binary hash codes in the Hamming space via a proper hashing function [24], hashing methods offer remarkable ef\ufb01ciency Figure 1."]} +{"4606637|393948": ["In recent years, deep learning has become very successful at learning highly discriminative features for various applications [1][13]."]} +{"11321040|5671282": ["Since discrete optimization of Equation (1) with binary constraints hi \u2208 {\u22121, 1}K is very challenging, for ease of optimization, continuous relaxation is applied to the binary constraints, as widely adopted by existing hashing methods (Wang et al. 2014).", "An advantageous solution is hashing methods (Wang et al. 2014), which transform highdimensional data into compact binary codes and generate similar binary codes for similar data items.", "The continuous relaxation (Wang et al. 2014), i.e. solving the discrete optimization of hash codes by more viable continuous optimization, may give rise to two important issues widely ignored by previous learning to hash work: (1) uncontrollable quantization error by binarizing continuous\u2026", "Refer to (Wang et al. 2014) for a comprehensive survey.", "Since discrete optimization of Equation (1) with binary constraints h i \u2208 {\u22121, 1} K is very challenging, for ease of optimization, continuous relaxation is applied to the binary constraints, as widely adopted by existing hashing methods (Wang et al. 2014)."]} +{"11321040|393948": ["\u2026revolution in deep learning shows that deep convolutional neural network (CNN) (Krizhevsky, Sutskever, and Hinton 2012; Lin, Chen, and Yan 2014; Bengio, Courville, and Vincent 2013) can automatically learn effective image representations that yield breakthrough performance on general computer\u2026"]} +{"49897094|3693305": ["learning to hash), which aims to generate compact binary codes by learning from data [48]."]} +{"52163920|3693305": [" to yield nearly lossless hash codes. As discrete optimization of Equation (5) with binary constraintshi \u2208{\u2212 1, }K is very challenging, continuousrelaxation widely adopted by existing hashing methods [32] to apply to the binary constraints for ease of optimization. However, the continuous relaxation will give rise to two important technical issues: 1) uncontrollable quantization error caused by binari", "benchmark datasets, ImageNet, NUS-WIDE, and MS-COCO. 2 RELATED WORK Learning to hash has become an important research direction in multimediaretrieval,whichtradesoffefficacyfromefficiency.Wang et al. [32] has provided a comprehensive literature survey that covers most of important methods and latest advances. Existing hashing methods can be divided into unsupervised hashing and supervised hashing. Uns", "Seoul, Republic of Korea \u00a9 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-5665-7/18/10...$15.00 https://doi.org/10.1145/3240508.3240516 another advantageous solution is hashing methods [32] for data compression, which transform high-dimensional media data into compact binary codes while similar binary codes are generated for similar data items. In this paper, we focus on the learning to"]} +{"13782944|3693305": ["Since discrete optimization of Equation (6) with binary constraints hi \u2208 {\u22121, 1}K is very challenging, continuous relaxation hi \u2208 R is applied to the binary constraints for ease of optimization, as adopted by most hashing methods [37, 42].", "Please refer to [37] for a comprehensive survey.", "Parallel to the traditional indexing methods [21], another advantageous solution is hashing methods [37], which transform high-dimensional media data into compact binary codes and generate similar binary codes for similar data items.", "mitigate the diversity of vector lengths and improve retrieval quality, while it has not been integrated with cross-entropy loss for supervised hash learning [37].", "This paper will focus on the learning to hash methods [37] that build data-dependent hash encoding schemes for efficient image retrieval, which have shown better performance than data-independent hashing methods, e."]} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"3595890|3693305": ["The recent works have demonstrated that hashing is a powerful technique for efficient and accurate image retrieval (Wang et al. 2016).", "Please refer to (Wang et al. 2016) for more elaborate survey."]} +{"53859386|15361180": [", retrieving images/videos using text queries and vice versa) [3].", "An extensive discussion on CMH and uni-modal hash learning can be found in [3] and [19] respectively."]} +{"53859386|3693305": ["An extensive discussion on CMH and uni-modal hash learning can be found in [3] and [19] respectively."]} +{"51927574|3693305": ["For a general survey, please refer to [23]."]} +{"6305490|5671282": ["Please refer to [35] for a comprehensive survey.", "Parallel to the traditional indexing methods [21], another advantageous solution is hashing methods [35], which transform high-dimensional media data into compact binary codes and generate similar binary codes for similar data items.", "In this paper, we will focus on learning to hash methods [35] that build data-dependent hash encoding schemes for efficient image retrieval, which have shown better performance than data-independent hashing methods, e."]} +{"6305490|393948": ["Recently, deep learning to hash methods [37, 20, 31, 8, 40] have shown that end-to-end learning of feature representation and hash coding can be more effective using deep neural networks [18, 2], which can naturally encode any nonlinear hash functions."]} +{"18554757|5671282": ["Data-dependent hash functions are well-known to perform better than randomized ones (Wang et al., 2014)."]} +{"210971227|1596835": ["Commonly used are Minkowski distance [9] and cosine distance [10]."]} +{"207995796|3693305": ["Among various hashing techniques [29, 28], supervised hashing has proven to be effective to generate domain relevant and compact codes and achieve satisfactory performance."]} +{"207995796|1596835": ["Among various hashing techniques [29, 28], supervised hashing has proven to be effective to generate domain relevant and compact codes and achieve satisfactory performance."]} +{"53035938|3693305": ["S-WIDE, CIFAR-10, and MS-COCO. 2 RELATED WORK Existing hashing methods can be categorized into unsupervised hashing and supervised hashing [9, 12, 13, 18, 23, 25, 27, 32, 33, 38, 39]. Please refer to [34] for a comprehensive survey. Unsupervised hashing methods learn hash functions to encode data points to binary codes by training from unlabeled data. Typical learning criteria include reconstruction e"]} +{"54445825|3693305": ["[21] have provided a comprehensive literature survey that covers the most important methods and latest advances in image retrieval."]} +{"54445825|3423943": []} +{"70008378|3693305": ["The sheer volume of high dimensional multimedia data like images and videos in search engines and social networks makes precise and yet ef\ufb01cient retrieval a challenging research problem which has attracted a lot of attention in recent years (Wang et al. 2018; Yu et al. 2018).", "The sheer volume of high dimensional multimedia data like images and videos in search engines and social networks makes precise and yet efficient retrieval a challenging research problem which has attracted a lot of attention in recent years (Wang et al. 2018; Yu et al. 2018)."]} +{"28438474|3693305": ["Hashing technique has become a popular nearest neighbor search technique for image retrieval on large datasets [31]."]} +{"19749101|3693305": ["Hence, ANN search has attracted much attention in recent years [2]\u2013[9].", "Detailed surveys on learning to hash can be found in [7]\u2013[9]."]} +{"19749101|1596835": []} +{"19749101|5671282": []} +{"148571850|1596835": []} +{"4546146|1223851": ["As mentioned by the previous studies [7], [43], and [44], in the branch of bottom-up SOD, approaches are to detect saliency under free viewing, which is automatically determined by the physical characteristics of the scene, while approaches in the other branch are to detect the task-driven saliency determined by the current goals of the observer."]} +{"13775777|3693305": ["In real search engines, normalized distance is widely used to mitigate the diversity of vector lengths and improve the retrieval quality, which has not been integrated with the cross-entropy loss [31].", "Since discrete optimization of Equation (1) with binary constraints hi \u2208 {\u22121, 1} is very challenging, continuous relaxation is applied to the binary constraints for ease of optimization, as adopted by most previous hashing methods [31, 36].", "to hash methods [31] that build data-dependent hash encoding schemes for efficient image retrieval, which have shown better performance than the data-independent hashing methods, e.", "Please refer to [31] for a comprehensive survey.", "Parallel to the traditional indexing methods [18] for candidates pruning, another advantageous solution is hashing methods [31] for data compression, which transform high-dimensional media data into compact binary codes and generate similar binary codes for similar data items."]} +{"88516685|3693305": ["A comprehensive survey that covers the recent hashing techniques are provided in [25]."]} +{"88516685|3423943": ["quantization error [37], and minimize reconstruction error [9], [11], [33]\u2013[35]."]} +{"69853652|15361180": ["two groups: classical linear modeling and nonlinear modeling based on deep networks [22].", "Hence, some works choose to learn the common semantic space via a shared layer across the multi-layer nonlinear projection of different modalities [22].", "7Due to the limited memory of our desktop personal computer, the reported MAP score of IMH in [22] is adopted, but the hash lookup results are not supported in [22]; hence, IMH is not considered in the hash lookup evaluation on the NUS-WIDE dataset."]} +{"69853652|3693305": ["nearest neighborhood structure of the data points [10]."]} +{"1451650|5671282": ["We refer readers to (Wang et al. 2014) for a recent survey.", "An advantageous solution is hashing methods (Wang et al. 2014), which transform high-dimensional data into compact binary codes and generate similar binary codes for similar data items.", "In real-world retrieval systems, cosine distance is widely adopted to mitigate the diversity of vector lengths and improve the retrieval quality, while it has not been well explored for supervised hash learning (Wang et al. 2014)."]} +{"1451650|393948": ["\u2026revolution in deep learning shows that deep convolutional neural network (CNN) (Krizhevsky, Sutskever, and Hinton 2012; Lin, Chen, and Yan 2014; Bengio, Courville, and Vincent 2013) can automatically learn effective image representations that yield breakthrough performance on general computer\u2026"]} +{"4387615|5671282": ["Hashing is a widely used approach for practical nearest neighbor retrieval [39], thanks to the efficiency of evaluating Hamming distances using bitwise operations, as well as the low memory and storage footprint."]} +{"15281206|3693305": []} diff --git a/edge/graph_212628626.jsonl b/edge/graph_212628626.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a336dcf8c20f87bd1fdaccd85ef9b7c39867f029 --- /dev/null +++ b/edge/graph_212628626.jsonl @@ -0,0 +1,24 @@ +{"21603200|4820875": ["multi-resolution image registration, deep self-supervision, unsupervised learning, deep learning Introduction Medical image registration plays an important role in many medical image processing tasks [1, 2]. The image registration is typically formulated as an optimization problem to seek a spatial transformation that establishes pixel/voxel correspondence between a pair of fixed and moving images by ma", " regularizer can be used [14] \ufffd(\ud835\udc37\ud835\udc63)=\u2211\ud835\udc41\ufffd=1\u2016\u2207\ud835\udc37\ud835\udc63(\ud835\udc5b)\u20161 , (2) where \ud835\udc41 is the number of pixel/voxels in the deformation field. The above optimization problem can be solved by gradient descent based methods [1, 2]. However, such an optimization based image registration task is typically computational expensive and time consuming. (a) (b) Fig. 1. Schematic illustration for image registration based on FCNs. (a) ", "ed image similarity measures. As the image registration problem is an ill-posed problem, regularization techniques are usually used to obtained smooth and physically plausible spatial transformations [1, 2]. In general, the optimization based image registration problem is formulated as min \ud835\udc37\ud835\udc63 \u2212\ufffd(\ud835\udc3c\ud835\udc53(\ud835\udc63),\ud835\udc3c\ufffd(\ud835\udc37\ud835\udc63\u2218\ud835\udc63))+\ud835\udf06\ufffd(\ud835\udc37\ud835\udc63) (1) where \ud835\udc63 is spatial coordinates of pixel/voxels in \ud835\udc3c\ud835\udc53 , \ud835\udc37\ud835\udc63\u2218\ud835\udc63 is deformed spatial co"]} +{"21603200|6863252": ["ed image similarity measures. As the image registration problem is an ill-posed problem, regularization techniques are usually used to obtained smooth and physically plausible spatial transformations [1, 2]. In general, the optimization based image registration problem is formulated as min \ud835\udc37\ud835\udc63 \u2212\ufffd(\ud835\udc3c\ud835\udc53(\ud835\udc63),\ud835\udc3c\ufffd(\ud835\udc37\ud835\udc63\u2218\ud835\udc63))+\ud835\udf06\ufffd(\ud835\udc37\ud835\udc63) (1) where \ud835\udc63 is spatial coordinates of pixel/voxels in \ud835\udc3c\ud835\udc53 , \ud835\udc37\ud835\udc63\u2218\ud835\udc63 is deformed spatial co", "nd bilinear interpolation [7, 13]. Such a network architecture also naturally leads to a multi-resolution image registration that has been widely adopted in conventional image registration algorithms [2]. In this study, normalized cross-correlation is used as the image similarity metric between images, and a total variation based regularizer as formulated by Eq. (2) is adopted to regularize the defor", "multi-resolution image registration, deep self-supervision, unsupervised learning, deep learning Introduction Medical image registration plays an important role in many medical image processing tasks [1, 2]. The image registration is typically formulated as an optimization problem to seek a spatial transformation that establishes pixel/voxel correspondence between a pair of fixed and moving images by ma", " regularizer can be used [14] \ufffd(\ud835\udc37\ud835\udc63)=\u2211\ud835\udc41\ufffd=1\u2016\u2207\ud835\udc37\ud835\udc63(\ud835\udc5b)\u20161 , (2) where \ud835\udc41 is the number of pixel/voxels in the deformation field. The above optimization problem can be solved by gradient descent based methods [1, 2]. However, such an optimization based image registration task is typically computational expensive and time consuming. (a) (b) Fig. 1. Schematic illustration for image registration based on FCNs. (a) ", "ised models. Our deep learning based image registration model is implemented in a multi-resolution image registration framework, similar to conventional multi-resolution image registration algorithms [2]. However, the training for deep learning models with feedforward and backpropagation computation jointly optimizes deformation fields at different resolutions, fundamentally different from convention"]} +{"174801313|1482463": []} +{"148573852|56517517": ["Learning on graphs and point sets: A broad class of deep architectures for geometric data termed geometric deep learning [7] includes recent methods learning on graphs [51, 60, 12] and point clouds [33, 34, 50, 57]."]} +{"52815664|9869210": []} +{"3604585|1482463": []} +{"49867520|41559599": ["Passive stereo provides an alternative approach [43, 21]."]} +{"24660412|206051485": ["Different spectra capture different scenes, therefore their registration is challenging and cannot be solved by state-of-the-art approaches for geometric alignment [21].", "Image registration methods [3, 21] are the basis for many applications such as image fusion and 3d object recovery."]} +{"3680335|3273340": ["AI: Artificial Intelligence, ML, NN, DL, and Spiking Neural Networks (SNN) according to [294].", "There are some surveys that have been conducted recently in this field [294,295]."]} +{"3680335|2088679": []} +{"3680335|17485266": ["Adam has improved overall accuracy and helps for efficient training with better convergence of deep learning algorithms [126].", "The Adam optimization approach is proposed based on the momentum and the magnitude of the gradient for calculating adaptive learning rate similar RMSprop.", "The improved version of the Adam optimization approach has been proposed recently, which is called EVE.", "There are different optimization methods such as SGD, Adagrad, AdaDelta, RMSprop, and Adam [125]."]} +{"3680335|18599847": ["From the application point of view, RNNs can solve different types of problems which need different architectures of RNNs shown in Fig.", "Convolutional RNNs based on multi-language identification system was been proposed in 2017 [153].", "Recently, TimeNet was proposed based on pre-trained deep RNNs for time series classification (TSC) [155].", "In addition, RNNs, such as LSTM and RL, are also used for unsupervised learning in many application domains [243].", "Another example: the RNNs are able to connect previous information to the present task: using previous video frames, understanding the present and trying to generate the future frames as well [142].", "Sections 6 and 7 discuss RNNs and LSTMs in detail.", "Time series data analysis using RNNs [154].", "Early heart failure detection is proposed using RNNs [160].", "The RNNs are unique as they allow operation over a sequence of vectors over time.", "RNNs are applied in tracking and monitoring: data driven traffic forecasting systems are proposed using Graph Convolutional RNN (GCRNN) [161].", "Section V. discusses on RNNs. AEs and RBMs are discussed in Section VI. GANs with applications are discussed in Section VII.", "Sound event prediction using convolutional RNNs [158].", "In most of these cases RNNs or Recursive Neural Networks are used for language understanding [292].", "RNNs are networks with loops in them, allowing information to persist.", "RNNs including LSTM and GRU are applied on Tensor processing [150].", "This idea of RNNs were developed in 1980.", "\ud835\udcb3t + who \u2217 \u210bt\u22121 + who \u2218 \ud835\udc9et + bo (48)\nht = ot \u2218 tanh (Ct) (49)\nE. Variant of architectures of RNN with respective to the applications\nTo incorporate the attention mechanism with RNNs, Word2Vec is used in most of the cases for word or sentence encoding.", "First initiative for RNNs with attention that\n> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <\n21\nautomatically learns to describe the content of images is proposed by Xu, et al. in 2015 [145].", "Different versions of RNNs have been proposed in Jordan and Elman."]} +{"3680335|1932843": []} +{"3680335|393948": ["Learning methods based on representations of data can also be defined as representation learning [3]."]} +{"206725404|393948": ["While the low-level features can be hand-crafted with great success for some speci\ufb01c data and tasks, designing effective features for new data and tasks usually requires new domain knowledge since most hand-crafted features cannot be simply adopted to new conditions [1], [2].", "Each stage generally comprises of \u201cthree layers\u201d \u2013 a convolutional \ufb01lter bank layer, a nonlinear processing layer, and a feature pooling layer."]} +{"102480806|1482463": ["A survey of rigid and non-rigid registration of 3D point clouds is available in [52]."]} +{"1194129|1482463": ["Methods for point cloud data analysis have been developed throughout the past few decades [1], and the significance of research in this field is trending upwards due to advances in affordable high-quality 3D scanning technology [2], machine learning breakthroughs, and new interesting applications."]} +{"75138979|46937427": []} +{"75138979|6198785": ["Point set registration is a challenging aspect in pattern recognition [1\u20135], computer vision [6,7], robotics [8\u201311] and image processing [12\u201314]."]} +{"75138979|1482463": ["Some surveys on recent developments in pairwise point set registration can be found in [29,30]."]} +{"1482463|8983048": ["Among all the existing surveys (Table 1), [11]\u2013[15] focus on rigid registration only."]} +{"1482463|7861381": ["We further discuss the problem of over-\ufb01tting and provides up-to-date references beyond those in existing surveys."]} +{"21063964|2088679": ["Consequently, the learning-based methods have not been widely used to solve medical image registration problems [17].", "There have been few works to use CNNs for medical image registration [17]."]} +{"21063964|14395478": ["For such tasks, ROI segmentation is a prerequisite for successful image registration as shown in [48], [50], [51], as it can focus the registration process on specific regions of interest (ROI) and avoid the undesired alignment of artifacts."]} diff --git a/edge/graph_212633493.jsonl b/edge/graph_212633493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e83706546c7ee86ea5253ce2b517ae36391e1f12 --- /dev/null +++ b/edge/graph_212633493.jsonl @@ -0,0 +1,6 @@ +{"122344153|11955283": []} +{"53249885|8407263": ["This setting is relevant in modelling infant language acquisition, where models can be used to test particular cognitive hypotheses [5]; lowresource speech processing, where new concepts could be taught in an arbitrary language [6]; and robotics, where novel concepts must be acquired online from co-occurring multimodal sensory inputs [7\u201311]."]} +{"53249885|11955283": ["This setting is relevant in modelling infant language acquisition, where models can be used to test particular cognitive hypotheses [4]; lowresource speech processing, where new concepts could be taught in an arbitrary language [5]; and robotics, where novel concepts must be acquired online from co-occurring multimodal sensory inputs [6\u201310]."]} +{"53595907|4110304": ["In recent years, a growing interest has been thus devoted to the development of interpretable machine learning [6, 7], as witnessed by the numerous works in the field, ranging from visualization [8, 9], diagnosis of DNNs [10], explanatory graphs [11], and explainable models [12], just to name a few."]} +{"53595907|39860496": ["In recent years, a growing interest has been thus devoted to the development of interpretable machine learning [6, 7], as witnessed by the numerous works in the field, ranging from visualization [8, 9], diagnosis of DNNs [10], explanatory graphs [11], and explainable models [12], just to name a few."]} +{"11955283|18454590": ["\u2026various techniques, such as Hidden Markov Models (HMM) [Young, 2008], Dynamic Time Warping (DTW) or Dynamic Programming [Jing, 2010], Dynamic Bayesian Networks (DBN) [Stephenson, 2002], Support Vector Machines (SVM) [Solera-Urena, 2007] or some hybrid models [Trentin, 2001; Ganapathiraju, 2000]."]} diff --git a/edge/graph_212633747.jsonl b/edge/graph_212633747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d6f14d82832c6918b07f2579337a0aa2870f2906 --- /dev/null +++ b/edge/graph_212633747.jsonl @@ -0,0 +1,3 @@ +{"53080330|3330313": ["There is a large literature on anomaly detection (Hodge and Austin, 2004), in general, offering methods for applying this insight."]} +{"167217477|9316331": ["The \ufb01rst one is the Graph Neural Networks (GNNs), including the Graph Isomorphism Networks (GINs) [10], and the second one is the Monte-Carlo Tree Search (MCTS) [11, 12], which was also used in AlphaGo Zero [13]."]} +{"167217477|289357": ["Such problems include the Maximum Clique , the Minimum Vertex Cover and the Traveling Salesperson Problem , which are also NP-hard [31]."]} diff --git a/edge/graph_212633917.jsonl b/edge/graph_212633917.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbe73994509fbdbf5e40b4eccd33f8820bf216e3 --- /dev/null +++ b/edge/graph_212633917.jsonl @@ -0,0 +1,2 @@ +{"49563609|38025936": ["[32] have conducted a systematic literature review (SLR) of customer involvement of users in continuous deployment."]} +{"53028386|43120813": []} diff --git a/edge/graph_212634030.jsonl b/edge/graph_212634030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ddfb0d432b47da38473fd4b0b68a2cc34f0d005 --- /dev/null +++ b/edge/graph_212634030.jsonl @@ -0,0 +1,16 @@ +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"59158761|6588866": ["(2019) showed that the set of problems that message passing GNNs can solve is the same as that which can be solved by distributed local algorithms (Angluin, 1980; Suomela, 2013).", "Sato et al. (2019) showed that the set of problems that message passing GNNs can solve is the same as that which can be solved by distributed local algorithms (Angluin, 1980; Suomela, 2013)."]} +{"211126885|212634030": ["We refer the reader to (Sato, 2020) for a survey about expressivity of GNNs.\nInvariance."]} +{"53223913|6588866": []} +{"56517517|212675130": []} +{"56517517|54559476": []} +{"56517517|1479507": []} +{"56517517|3951790": ["an domain to non-Euclidean domain. Fig. 1. Left: image in Euclidean space. Right: graph in non-Euclidean space arXiv:1812.08434v4 [cs.LG] 10 Jul 2019 2 The other motivation comes from graph embedding [11]\u2013 [15], which learns to represent graph nodes, edges or subgraphs in low-dimensional vectors. In the \ufb01eld of graph analysis, traditional machine learning approaches usually rely on hand engineered fea"]} +{"211068787|6588866": ["They demonstrated that the representation power of GNNs is the same as that of distributed local algorithms (Angluin, 1980; Hella et al., 2012; Suomela, 2013), and derived the approximation ratios of the algorithms that can be learned by GNNs considering the theory of distributed local algorithms.", "Sato et al. (2019) showed the representation power of GNNs is the same as that of distributed local algorithms (Angluin, 1980; Hella et al., 2012; Suomela, 2013), which have the same representation power as model logic (Hella et al., 2012)."]} +{"152282292|56517517": ["See (Zhou et al., 2018; Bronstein et al., 2017) for thorough reviews."]} +{"174797862|15333444": []} +{"3215337|12161567": ["\u2026work, which we do not review in detail here\u2014including latent space models of social networks [32], embedding methods for statistical relational learning [42], manifold learning algorithms [37], and geometric deep learning [7]\u2014all of which involve representation learning with graph-structured data.", "We refer the reader to [32], [42], [37], and [7] for comprehensive overviews of these areas.", "Indeed, the literature on knowledge-graph completion\u2014where the goal is predict missing relations in knowledge graphs\u2014contains many related techniques for decoding a large number of edge types ( i.e. , relations) [42].", "A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12] and (ii) extend pairwise decoders with type-speci\ufb01c parameters [42, 52].", "More generally, link prediction is closely related to statistical relational learning [24], where a common task is to predict missing relations between entities in a knowledge graph [42].", "Adapted from [60]. edge types, the standard inner-product edge decoder ( i.e. , z i z j \u2248 A i,j ) can be replaced with a bilinear form [12, 42, 52]: where \u03c4 indexes a particular edge type and A \u03c4 is a learned parameter speci\ufb01c to edges of type \u03c4 ."]} +{"3215337|18986679": []} +{"67769538|5523008": ["ral network models had a great impact on learning effective feature representations in various fields, such as speech recognition [12], Computer Vision (CV) [14] and Natural Language Processing (NLP) [4]. Some recent efforts have applied deep neural networks to recommendation tasks and shown promising results [41], but most of them used deep neural networks to model audio features of music [32], text"]} diff --git a/edge/graph_212634247.jsonl b/edge/graph_212634247.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21d8901345719c70220afcc6eb9ab8fe42d21492 --- /dev/null +++ b/edge/graph_212634247.jsonl @@ -0,0 +1,28 @@ +{"3839179|12264500": ["Automated driving promises to significantly reduce the number of road fatalities, increase traffic efficiency, reduce environmental pollution, give mobility to handicapped members of our society and empower new services such as mobility on demand [1]."]} +{"3839179|1229096": ["Usually, MP for automated vehicles is structured hierarchically [3],", "approaches in vehicle automation domain [3]\u2013[5]."]} +{"114862052|15093118": ["For more information on conventional hand-crafted feature/cue based approaches, interested readers may refer to the following survey papers: [68,69] for lane line marking detection, [70] for road surface detection, [71,72] for vehicle detection and [73] for pedestrian detection."]} +{"4802984|30189749": ["Due to space limitations, we refer the interested reader to the recent survey [200], that has summarized these e \ufb00 orts."]} +{"4802984|1229096": ["As a consequence, estimation, prediction, and learning techniques play a major role in this \ufb01eld [59].", "In the literature, path planning generally indicates the problem of planning future motion in the con\ufb01guration space of the vehicle, while trajectory planning indicates the search of a time-parametrized solution [59, 164].", "Optimal path and trajectory planning are both PSPACE-hard in their general formulations [59].", "These blocks also depend on the driving context, and their boundaries are quite blurred [59].", "Trajectory planning can be solved using variational methods in the time domain, or converting it to a path planning problem with a time dimension [59].", "Comprehensive reviews can be found in [164, 59]; here we only give a brief overview of the problems and the related computational techniques."]} +{"4802984|16049411": ["This problem has been extensively studied in the literature: we refer the interested reader to [75, 76, 77] for extensive literature reviews and to [78, 79] for systematic comparisons between existing approaches."]} +{"4802984|8363289": []} +{"3007213|1229096": ["Tire slip is not considered, but the kinematic singletrack model can be used when the vehicle does not operate close to its physical capabilities [26], [35]."]} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"32648178|36510460": []} +{"52143262|1229096": ["Rear wheel feedback steering control and PID speed control [25] Iterative linear model predictive control Figure 6: Path tracking simulation results \u2022 Adding image processing samples for autonomous navigation using OpenCV[9].", "E. Frazzoli et al. wrote a great survey paper about path planning and control techniques for autonomous driving [25]."]} +{"58004724|1229096": ["Methods for motion planning can be mainly categorized into four classes: graph search based, sampling based, interpolating curve based, and numerical optimization based methods (Gonz\u00e1lez et al., 2015; Paden et al., 2016).", "It consists of finding a point in the path at some look-ahead distance from the current path and turning the front wheel so that a circular arc connects the center of the rear axle with the point in the path (Paden et al., 2016), as shown in Figure 13.", "tions in the literature (Paden et al., 2016).", "Figure 1 shows a block diagram of the typical architecture of the automation system of self-driving cars, where the Perception and Decision Making systems (Paden et al., 2016) are shown as a collection of subsystems of different colors.", "is typically organized into two main parts: the perception system, and the decision-making system (Paden et al., 2016).", "For earlier works, readers are referred to Petrovskaya et al. (2012), Bernini et al.", "Methods for path planning can be mainly categorized into two classes: graph search based and interpolating curve based (Gonz\u00e1lez et al., 2015; Paden et al., 2016)."]} +{"58004724|206739910": []} +{"186206717|118684904": ["A recent survey outlines progress in pose estimation and SLAM, visual-inertial odometry and 3D reconstruction, as well as other applications [143]."]} +{"186206717|58004724": ["[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "For more detailed studies of this topic [22], [27], [244] can be referred."]} +{"186206717|58598634": []} +{"186206717|53569365": ["naming, caching, reliability and multi-access computing [77]."]} +{"186206717|49862415": []} +{"186206717|4861446": ["to [106] for a broader localization overview.", "Localization is the task of finding ego-position relative to a reference frame in an environment [106], and it is fundamental to any mobile robot."]} +{"186206717|3775239": ["algorithms for intelligent vehicles is given in [216]."]} +{"186206717|206741902": ["Like in aircraft, ADSs need to be designed with high redundancies that will minimize the chance of a catastrophic failure.", "[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "One of the key \ufb01ndings of this study is that even though human drivers are still better at reasoning in general, the perception capability of ADSs with sensor-fusion can exceed humans, especially in degraded conditions such as insuf\ufb01cient illumination.", "Annual social bene\ufb01ts of ADSs are projected to reach nearly $800 billion by 2050 through congestion mitigation, road casualty reduction, decreased energy consumption and increased productivity caused by the reallocation of driving time [3].", "ADSs are complicated robotic systems that operate in inde-terministic environments.", "Increasing the mobility of elderly with ADSs can have a huge impact on the quality of life and productivity of a large portion of the population.", "It is especially crucial for ADSs [25]; the vehicle must use the correct lane and position", "Ego-only is the most common approach amongst the state-of-the-art ADSs [20], [43], [47]\u2013 [52], [52]\u2013[54].", "State-of-the-art ADSs employ a wide selection of onboard sensors.", "Most of the ADSs divide the massive task of automated driving into subcategories and employ an array of sensors and algorithms on various modules.", "1) Problems that can be solved : preventing traf\ufb01c accidents, mitigating traf\ufb01c congestions, reducing emissions 2) Arising opportunities : reallocation of driving time, trans-porting the mobility impaired 3) New trends : consuming Mobility as a Service (MaaS), logistics revolution Widespread deployment of ADSs can reduce the societal loss caused by erroneous human behavior such as distraction, driving under in\ufb02uence and speeding [3].", "During DARPA Urban Challenge [7], held in 2007, many different research groups around the globe tried their ADSs in a test environment that was modeled after a typical urban scene.", "On the other hand, extremely cautious ADSs are also making a negative impression [39].", "Widespread usage of ADSs is not imminent, yet, it is still possible to foresee the potential impact and bene\ufb01ts of it to a certain degree.", "We refer the readers to [25] for a detailed SLAM survey in the intelligent vehicle domain.", "Furthermore, an increase in public interest and market potential precipitated the emergence of ADSs with varying degrees of automation.", "A detailed comparison of sensor setups of 10 different full-size ADSs is given in Table IV.", "Large scale deployment of ADSs can accelerate this trend.", "Automated driving systems (ADSs) are being developed with the promise of preventing accidents, reducing emissions, transporting the mobility-impaired and reducing driving related stress [2].", "Fatalities [17], [18] caused by immature ADSs undermine trust.", "As such, single stage detectors are often the detection algorithms of choice for ADSs.", "ADSs are designed either as standalone, ego-only systems [20], [43] or connected multi-agent systems [44]\u2013[46].", "The present paper attempts to provide a structured and comprehensive overview of the hardware-software architectures of state-of-the-art ADSs.", "It is especially crucial for ADSs [25]; the vehicle must use the correct lane and position Fig.", "Furthermore, system failures lead to accidents: in the Hyundai competition one of the ADSs crashed because of rain [15], Google\u2019s ADS hit a bus while lane changing because it failed to estimate the speed of a bus [16], and Tesla\u2019s Autopilot failed to recognize a white truck and collided with it, killing Fig."]} +{"186206717|1229096": ["[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "There are overview papers on the subject, which covered several core functions [20], [21], and which concentrated on the motion planning aspect [22], [23].", "For more detailed studies of this topic [22], [27], [244] can be referred."]} +{"186206717|17036197": ["Object tracking is also often referred to as multiple object tracking (MOT) [180] and detection and tracking of multiple objects (DATMO) [181].", "tracking (MOT) [180] and detection and tracking of multiple objects (DATMO) [181]."]} +{"186206717|36510460": ["A detailed overview of Sampling Based Planning (SBP) methods can be found in [262]."]} +{"11971675|36510460": ["The development of intelligent planning algorithms is one of the key issues when designing robotic architectures [20], [21].", "In [21] and [95] descriptions, applications and improvements of these algorithms are reviewed.", "The approach consists on randomly sampling the configuration space or state space, looking for connectivity inside it [21]."]} +{"11971675|1029120": []} diff --git a/edge/graph_212644660.jsonl b/edge/graph_212644660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6613348e7ba1d25a1e91d50827c27941527b3641 --- /dev/null +++ b/edge/graph_212644660.jsonl @@ -0,0 +1,4 @@ +{"7485863|1452734": ["Arti\ufb01cial development [61], [62] will require particular structures that will guide exploration and learning beyond what can be addressed by pure measures of learning progress."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} diff --git a/edge/graph_212645108.jsonl b/edge/graph_212645108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f7c02a243aede5a0a04b43b3ef2986c9d26af2c --- /dev/null +++ b/edge/graph_212645108.jsonl @@ -0,0 +1,47 @@ +{"6758116|6583734": ["However, we emphasize that the virtualization and deployment of network functions do not necessarily rely on SDN technologies, and viceversa [4], [35]."]} +{"69632723|8650651": ["The advantages of the HAL are especially reflected in the Software-Defined Optical Network (SDON) [6].", "widely used in different scenarios such as Google\u2019s backbone network [3], Microsoft\u2019s public cloud [4], NTT\u2019s edge gateway [5], and optical (IP/WDM) network [6].", "[6] briefly describe several representative hybrid SDN solutions in their SDN survey."]} +{"69632723|17248887": []} +{"69632723|4269723": ["Software defined networks (SDN) is an emerging network architecture which separates the control plane and the data plane [2]."]} +{"69632723|58783012": ["debug and operate SDN networks, and companies need to hire experienced SDN network engineers [20]."]} +{"21686410|393948": ["feature learning was then developed by stacking single-layer feature extractors [12]\u2013[14]."]} +{"8650651|207262843": ["SDN and virtualization strategies for LTE wireless cellular networks have been surveyed in [50]."]} +{"8650651|6583734": []} +{"8650651|11414835": ["SDN hypervisor can create multiple isolated virtual SDN networks [80], [81]."]} +{"8650651|801245": ["Bitar [39] has surveyed use cases for SDN controlled broad-band access, such as on-demand bandwidth boost, dynamic service re-provisioning, as well as value-added services and service protection."]} +{"8650651|2535224": ["we note that for the field of wireless and mobile networks, SDN based networking mechanisms have been surveyed in [41]\u2013[47] while network virtualization has been surveyed in [48] for general wireless networks and in [49] for wireless sensor networks."]} +{"8650651|15035771": []} +{"8650651|17248887": ["(b) SDN controller utilizes the path computation ability of the PCE [246], [269], [270] and controls network through OpenFlow protocol.", "using an SBI protocol, such as OpenFlow [246], [269], [270]; see illustration b) in Fig.", "devices [33], [34], [242], [244], [246]."]} +{"8650651|2623404": []} +{"8650651|10693567": [", with OpenFlow (OF) switches [7] or network elements (devices) controlled with the NETCONF protocol [8].", "The OpenFlow protocol [2], [7], [56] has been the first protocol for the SouthBound Interface (SBI, also referred to as Data-Controller Plane Interface (D-CPI)) between the con-", ", the OpenFlow protocol [7] for the SBI.", "OpenFlow switching element (data plane) and an OpenFlow controller (control plane) is carried out through the OpenFlow protocol [7], [56].", "The general principles of SDN have been extensively covered in several surveys, see for instance, [2], [6], [7], [10]\u2013[27]."]} +{"8650651|1580493": ["For a \ufb02exi-grid network based on OFDM [31], Zhao et al. [310] have compared a greedy heuristic that maps requests in decreasing order of the required resources with an arbitrary \ufb01rst-\ufb01t benchmark.", "1) [31], [87]\u2013[89] allows the center frequency to be any multiple of 6.", "In a related study on SDN controlled switching in a PON, Yeh et al. [178] have designed an ONU with an optical switch that selects OFDM subchannels in a TWDM-PON.", "For a flexi-grid network based on OFDM [31], Zhao et al.", "The proposed communication is based on carrierless amplitude and phase modulation [215] enhanced with optical Orthogonal frequency Division Multiplexing (OFDM) [150].", "The OFDMA transmissions and receptions are processed in a DSP module that is controlled by a central SDN control module.", "The different OFDM channels are manipulated through DSP \ufb01ltering.", "The FlexPON employs OFDM for adaptive transmissions.", "The survey brie\ufb02y notes how OFDM-based elastic networking can facilitate network virtualization and surveys a few studies on OFDM-based network virtualization in core networks.", "Similar OFDMA based slicing strategies for supporting cloud computing have been examined by Jinno et al. [286].", "Simulation experiments indicate a 40% increase in network bandwidth utilization as a result of the global coordination compared to operating the bandwidth allocation only within the individual PONs [261], [262]. b) Access and Wireless: Bojic et al. [263] expand on the concept of SDN controlled OFDMA enabled VPONs [257] to provide mobile backhaul service.", "Each small-cell site contains an OFDMA-PON ONU that provides the backhaul service through the access network over a VPON.", "[31] have presented a thorough survey on flexible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core (backbone) networks.", "An SDN controller is utilized to assign bandwidth to each small-cell site through OFDMA subcarrier assignment in a VPON to the constituent ONU.", "c) Flexi-grid: The principle of flexi-grid (elastic) optical networking [31], [87]\u2013[92], [226] has been explored in several SDN infrastructure studies.", "Bandwidth allocation is performed at the granularity of OFDMA subcarriers that compose the optical spectrum.", "1) General Multidomain Networks: a) Optical Multitechnologies Across Multiple Domains: Optical nodes are becoming increasingly recon\ufb01gurable (e.g., through variable BVTs and OFDM transceivers, see Section III), adding \ufb02exibility to the switching elements.", "Illustration of DSP recon\ufb01gurable ONU and OLT designs [151]: Each ONU passes the electrical Optical OFDM signal [150] through a Shaping Filter (SF) that is SDN-con\ufb01gured by the DSP controller, followed by a Digital-to-Analog Converter (DAC) and Intensity Modulator (IM) to generate the optical signal.", "Zhang et al. [31] have presented a thorough survey on \ufb02exible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core Fig.", "The virtualization studies on access networks [282]\u2013[284], [286]\u2013[295] have primarily focused on exploiting and manipulating the speci\ufb01c properties of the optical physical layer (e.g., different OFDMA subcarriers) and MAC layer (e.g., polling based MAC protocol) of the optical access networks for virtualization."]} +{"8650651|16972183": ["wireless networks provide Internet access to a wide range of mobile devices [113]\u2013[115]."]} +{"8650651|7686677": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention.", "QoS levels in an energy-efficient manner [465]\u2013[467] is an important future research direction."]} +{"8650651|10837932": ["e) Energy-efficient embedding: Motivated by the growing importance of green networking and information technology [348], a few studies have begun to consider the energy efficiency of the embedded virtual optical networks."]} +{"8650651|8909218": ["For instance, the cell structure of wireless cellular networks [458] has advanced to femtocell networks [459] as well as heterogeneous and multitier cellular structures [460], [461]."]} +{"8650651|10532321": []} +{"8650651|25929315": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention."]} +{"4568427|16897832": ["Evolutionary computation (EC) approaches have gained much attention in feature selection [41] due to their global search potential in the large-scale search spaces."]} +{"22737502|205430214": ["Over the last two decades, much effort has been devoted in developing multiobjective evolutionary algorithms (MOEAs) [3][4]."]} +{"16502434|205430214": ["Due to these factors MAP research is vibrant in the EA community, something that can be attested by the number of EAs available for MAPs, see [8]."]} +{"199509907|18748870": ["Portfolio selection problem [1] is a well-known financial problem and appeals to allocate limited money among a finite number of available risky assets, such as bonds, stocks, and derivatives."]} +{"202688751|6021680": []} +{"51880534|6021680": ["However, it is well-known that the selection pressure of Pareto-domination becomes weaker with the increasing number of objectives [10], [22], [25]."]} +{"14002461|6021680": ["Li et al [33] gave a survey of many-objective evolutionary algorithms in 2015, in which various types of studies on many-objective evolutionary algorithms in recent years were referred to and summarized."]} +{"199489511|25911553": []} +{"44827868|8530790": ["In the past decades, multiobjective evolutionary algorithms (MOEAs) have been recognized as a major methodology for approximating the PF [9], [11], [13], [14], [16], [19], [25], [33], [63], [71]."]} +{"25519105|205430214": ["Since, an evolutionary algorithm (EA) because of its population based nature, can obtain multiple P-O solutions in a single simulation run, multiobjective EAs (MOEAs) have been very popular in solving MOPs [3], [4]."]} +{"25519105|3053192": ["Hyper-heuristics [92] is a high level methodology for automatic selection and/or generation of heuristics for solving"]} +{"54452311|6021680": ["When the dimension of objective space is over 3, these problems are called manyobjective optimization problems (MaOPs) [1]."]} +{"25839098|6021680": ["In recent years, many work has been done in the field of many-objective evolutionary algorithms (MaOEAs) [14], which gives us a new way to solve CMOPs."]} +{"4562145|205430214": []} +{"29648256|1386147": ["MOEA has been widely used in many fields, such as path planning of unmanned air vehicles [5], data mining [6], machine learning [7], software engineering [8], etc."]} +{"51612100|36582512": ["To overcome this, many follow-up studies [43]\u2013[50] have been recently proposed."]} +{"4607784|2670373": ["Optical packet switching (OPS), optical burst switching (OBS), and optical flow switching (OFS) are proposed as the main representatives of OTDM [2]\u2013[4]."]} +{"199011001|3119314": ["In addition, in case of malicious attacks or system failures that edge infrastructure may experience, VMs may also need to be migrated to other sites in a proactive manner to avoid data loss and to decrease the service downtime [48]."]} +{"199011001|3757239": ["Since edge computing can provide not only computing capability, but also storage at network edge, Ref [4] studied computation offloading and cloud-edge cooperation issues from a caching perspective.", "Ref.", "Focusing on workload of cellular networks introduced by D2D communications, Ref.", "From the security perspective, Ref."]} +{"199011001|6909107": ["[3] studied the edge resource allocation and mobility management issues in mobile networks."]} +{"199011001|206578365": ["[2] surveyed the state-of-the-art MEC research from the communications perspective."]} +{"199011001|8523192": []} +{"199011001|26368310": ["Resiliency strategies in cloud computing have been summarized by a survey [72]."]} +{"199011001|3767252": ["[5] surveys security threats, challenges, and mechanisms in edge computing, and studies the synergies among security mechanisms originally designed for edge paradigms and other related fields."]} +{"13862476|10096622": []} diff --git a/edge/graph_212645894.jsonl b/edge/graph_212645894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_212646687.jsonl b/edge/graph_212646687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71454f41d032ffc447ccf364f8b578b2868cc1f9 --- /dev/null +++ b/edge/graph_212646687.jsonl @@ -0,0 +1,14 @@ +{"32078110|20473693": ["It is estimated that by 2020, 50 billion \u2018things\u2019 will be connected to the Internet [9]."]} +{"13515341|1230643": ["he software system needs to integrate interoperability [20], flexibility [20], and remote maintenance [20]."]} +{"114996794|1687471": []} +{"114996794|1230643": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"52026862|7329149": ["IoT brings intelligence to the interconnected objects [16] with minimal human interventions [14].", "IoT is interconnection of objects (things), such as sensing and actuating devices, and other smart appliances utilizing the internet as a means of communication [11] [14] [15]."]} +{"52026862|9830350": []} +{"24844867|1503157": []} +{"9833140|1230643": ["All rights reserved."]} +{"6437336|3932089": []} +{"198145031|1230643": ["node consists of four modules [8]:"]} +{"26577972|15300368": ["Thus, the WSN to the real world is practically unlimited from physical security, environmental monitoring and climate changes, positioning and tracking and health care to logistic, localization, and so on [6]."]} +{"26577972|1230643": ["The remote sensor network is commonly used for different purposes such as surveying the development of city infrastructure, environmental monitoring, telemedicine or remote health care, research in agriculture, fishing surveillance, farming, border security, traffic management, forestry management, and disaster prevention [2]."]} diff --git a/edge/graph_212646885.jsonl b/edge/graph_212646885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4f649de42b00fcb5ec78d4c3b939f71e3b9a024 --- /dev/null +++ b/edge/graph_212646885.jsonl @@ -0,0 +1,4 @@ +{"103212831|31086789": []} +{"109934700|73654058": ["Prototypes in operation network have been developed at home and abroad [5]\u2013[7]."]} +{"206702068|18985591": ["4) VSC internal faults: In terms of fault-tolerant VSCs, the research aims are to protect the system from possible insulated-gate bipolar transistor (IGBT) faults (for example, short circuits), where there are many opportunities to allocate a backup function or include redundant devices [18]\u2013[20]."]} +{"206702068|17774971": ["Multilevel VSCs are particularly promising for high-power conversion applications, such as diode neutral-point-clamped converters and flying capacitor converters [29], [30]."]} diff --git a/edge/graph_212647327.jsonl b/edge/graph_212647327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d815f65177e3279ffc88b9057f6d2e8884c9e52 --- /dev/null +++ b/edge/graph_212647327.jsonl @@ -0,0 +1,22 @@ +{"41952828|191396": []} +{"61167697|33286487": []} +{"146005566|6972141": ["By comparing the camera images taken during navigation with the prerecorded images, the robot is capable out of finding its location.100 For a survey on vision for mobile robot navigation, see DeSouza and Kak.101", "For a survey on vision for mobile robot navigation, see DeSouza and Kak.(101)"]} +{"146005566|15231229": []} +{"9115543|469744": ["I. INTRODUCTION\nACCURATE 3D tracking is important for manyapplications including navigation, visualization, humancomputer interaction and augmented reality [1]."]} +{"54918877|6972141": ["In [10], an analysis of primary vision-based localization techniques for mobile robots up to the late 1990\u2019s is proposed, and vision-based techniques are classified into two main categories: Indoor Localization and Outdoor Localization.", "Progresses made in vision-based localization for mobile robots up to 2008 were widely surveyed by [10] and [11]."]} +{"6981610|6387482": ["As regard to fusion, this method is used to solve pattern classification problem in which case the input of the classifier is the scores given by the individual classifier [194].", "Using the state-space model this can be represented by the equations [194]:", "The particle filter approach represents the derived filtering distribution by a set of random samples with weights and compute estimates [194].", "The input and output nodes are connected by weights that decide the mapping behavior [194].", "the mass of hypothesis H based on two modalities Ii and Ij can be described mathematically as [194]:", "Then if these modalities are statistically independent, the joint probability of a hypothesisH as regard the fused feature vectors can be given as [194]:"]} +{"12479774|118142": ["For grasp planning, models with higher quality and coverage are required [32]."]} +{"120228211|6972141": ["Numerous approaches have been developed in the literature to address the indoor localization problem using different sensors, such as sonar [1,2], laser range finder [3,4], radio-frequency identification (RFID) [5,6] inertial sensor [7,8], and visual system [9]."]} +{"18388986|4491892": ["Particle filters are recursive implementations of the sequential Monte Carlo methods [39]."]} +{"38292926|206986719": []} +{"38292926|12127129": ["In addition, the foreground is detected by frame differencing with a static background model [40], used to remove background (environment) areas with colors similar to those of the fiducial."]} +{"3544535|206583375": ["However, most research efforts have focused on indoor localization in office or residential domains [1].", "Localization has recently received significant attention from the research community for a wide range of location aware applications using radio frequency (RF) based communication [1], [2]."]} +{"110348652|16866891": []} +{"15294065|2357830": ["following papers for a detailed overview of specifi c attack scenarios and countermeasures [17][18][19] [20][ 21]."]} +{"126296984|4491892": ["A comprehensive survey of convergence results on particle filters could be found in [12] where almost sure convergence and mean square convergence of particle filtering are studied, respectively.", "Note that the mean square convergence results stated in [12] relies on some strict assumptions.", "Furthermore, it has been shown in [12] that the error accumulation seems to be inevitable, unless certain mixing conditions on the dynamic model (thus the true optimal filter) are satisfied."]} +{"54446039|551238": ["Many computational approaches have been applied such as heuristic, greedy [23], and stochastic algorithms, some others used, expectation maximization (EM) [24], Gibbs Sampling algorithms [25], Hidden Markov model (HMM) [13], Bayesian network [26], Genetic algorithms (GA) [25], and others [16].", "Because of this diversity of algorithms and programs available, many studies present a comprehensive review of motifs predictors that provide comparison and guidance to researchers such as Stormo [48], Das and Dai [16], and tompa et al. [57].", "A statistically overrepresented motif signify a motif that occurs more often than one would expect by chance [16].", "They can be categorized into two main strategies [16, 17]: enumeration of short words (counting and comparing oligonucleotide frequencies) [18, 19] and probabilistic methods [20, 21]."]} +{"33362991|18801114": []} +{"9978124|206986719": ["Among various solutions, we will explain more deeply two classical algorithms widely considered in augmented reality: one method that does not require any initialization of the pose (Direct Linear Transform) and a method based on a gradient approach that needs an initial pose but which can be\u2026"]} +{"9978124|469744": ["In the past, two surveys related to AR (in general) have been published in 1997 [7] and 2001 [8].", "Back in 1997, registration was considered as \u201cone of the most basic problems currently limiting augmented reality [7]\u201d.", "A widely acknowledged definition of augmented reality is due to Azuma in the first survey dedicated to the subject [7].", "Nevertheless, when Azuma\u2019s survey [7] was published, only few vision-based techniques meeting his definition existed."]} +{"2614506|206986719": ["A few attempts have been made in this direction [6], [7], but it still remains an open research problem.", "Many attempts have been made to solve the problem of object tracking in real-time where the environment is prepared in advance using fiducial markers [5], [6]."]} +{"2614506|469744": []} diff --git a/edge/graph_212648321.jsonl b/edge/graph_212648321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85d4e2ed24563d2ed622b2b06d149c2057361323 --- /dev/null +++ b/edge/graph_212648321.jsonl @@ -0,0 +1,40 @@ +{"64416903|15035771": []} +{"8541093|2758659": []} +{"59401964|2335874": ["Eltahir et al. in [19] have investigated the VANET and cellular network for different classification."]} +{"30755655|7972041": []} +{"30755655|2535224": []} +{"30755655|15438029": ["Hence the movement of the vehicles is predictable [25, 57\u201365]."]} +{"7976343|11210789": ["ROVER: VANET Robust Vehicular Routing.", "The example of this approach is Robust Vehicular Routing (ROVER)\nprotocol [20] whichwill be explained in Section 4 and summarized in Table 2 also [21].", "7 ROVER [25, 26] Y N N N N Y Y N Y N Y N 2007", "ROVER is categorized as multicast geographical protocol.", "The delay also rises due to retransmissions and redundant messages [5, 26].", "ROVER is reliable and efficient geographical multicast protocol because it floods only control packets, whereas the data packets are unicasted."]} +{"52124047|10329355": ["A survey on urban traffic management and congestion avoidance is performed in [14] by Kapileswar Nellore et al."]} +{"202780370|58672147": []} +{"202780370|3782888": []} +{"202780370|4709516": []} +{"202780370|38911919": []} +{"3232761|763939": ["In the other types of the mobility models, microscopic approach, the movement of each individual vehicle and the vehicle behavior is important [11]."]} +{"61657379|22084305": ["9 GHZ band for DSRC, this is to be utilized by the Intelligent Transportation Systems (ITS) [22].", "USA allocated 75 MHZ of spectrum in the 5.9 GHZ, while Europe allocated 30 MHZ of spectrum in the 5.9 GHZ band for DSRC, this is to be utilized by the Intelligent Transportation Systems (ITS) [22]."]} +{"61657379|44944144": []} +{"208206552|3782888": ["Reliable traffic information dissemination faces many challenges [17]."]} +{"131030053|2854761": []} +{"131030053|1230643": []} +{"57754461|53236024": ["In this scenario, vehicles can act as communication hubs or intermediaries to share local resources, instead of sending redundant bulk of big data to cloud servers [17], [18]."]} +{"57754461|8523192": ["Being FoG nodes vehicles are capable to setup high scalable and distributed FoG environment [27], [29].", "Secondly, fault tolerance with QoS requirements is a challenging task in this environment [29] .", "Secondly, researchers have highlighted advantages of FoG computing [27]\u2013[29] towards strengthening the term and its use for future directions."]} +{"57754461|2335874": []} +{"57754461|1885014": ["It integrates traffic information from different regions using data aggregation techniques in a secure manner where RSU acts as router to exchange data [23].", "transportation accidents or dangers happened on the ahead roads [23], [46].", "Indeed, several detailed review of message dissemination schemes in VANET including [2], [3], [5], [6], [23]\u2013[26] have been given in literature."]} +{"1030016|10329355": []} +{"1030016|18801114": []} +{"117189111|2535224": []} +{"117189111|2623404": []} +{"13624914|512561": []} +{"13624914|7972041": ["The authors in [56] has covered the area of channel and propagation models in VANETs."]} +{"13624914|2535224": ["The ref [7] presented the concept, architecture and challenges of SDNs and virtualization."]} +{"13624914|2736673": []} +{"13624914|1724544": ["the capacity, robustness, tomography, and security [1]."]} +{"13624914|763939": ["Vehicular mobility models are classi\ufb01ed into four different classes, which are brie\ufb02y discussed below [53]."]} +{"13624914|62617427": ["The survey based on wireless networks presented by researchers, cover the different domains of VANETs such as VANET\u2019s applications [16\u201318], routing protocols [19\u201322], trust management in VANETs [23, 24], and VANETs security [25]."]} +{"1906795|1885014": ["In Vehicular adhoc networks, there is very high mobility in which each vehicle node act as a router as well as host and sending packets to other mobile nodes and changing their topology very fast [3].", "This scheme is mainly used by vehicles for making queries and receiving response [3].", "In VANETs, delivery is not single hop rather multihop delivery is done and even the vehicle which is miles away from destination can also send their request like- traffic conditions, obstacle information can be obtained by the vehicles when they are currently not in the city [3].", "Therefore, routing protocols used in MANETs are not necessarily be suitable for VANETs as in MANET\u2019s protocols there is an implicit assumption of network connectivity [2, 3].", "for safety and entertainment convenience purpose [3].", "i) Multihop data delivery is challenging task as frequent disconnections and high mobility is there in VANETs [3].", "And buffers are placed at intersection points to store the data and from these buffers data will be transmitted to moving vehicles [3]."]} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"209319585|92998157": ["6) Java in simulation time (JiST) [102] \u2013 Is built on the", "4) Mininet2 [102] \u2013 is an open-source network emulator that can emulate an environment with the help of an extensible python APIs."]} +{"209319585|7976343": []} +{"209319585|4787452": []} +{"209319585|38911919": ["while going for cluster-based routing, where the network is converted from flat to hierarchical [80], [81]."]} +{"195589219|763939": ["For example, in [3, 4], the authors discuss the research challenges of routing in VANETs and then summarize and compare the performance of routing protocols; Hartenstein and Laberteaux present an overview on the communication and networking aspects of VANETs and summarize the current state of the art at that time [5]; Raya and Hubaux address the security of VANETs comprehensively and provide a set of security protocols as well [6]; in [7], the authors propose a taxonomy of a large range of mobility models available for vehicular ad hoc networks."]} diff --git a/edge/graph_21265344.jsonl b/edge/graph_21265344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a6ab8a5c448967a89c78580e6c1a79ad6dc79d7f --- /dev/null +++ b/edge/graph_21265344.jsonl @@ -0,0 +1,9 @@ +{"9269724|17950466": ["Over time, the security field has categorized these into three primary groups [1]:", "These areas include desktop keystroke dynamics using traditional methods [1], mobile phone keypress dynamics using traditional methods [18] and key inference using side-channel sensors [13].", "A wide variety of extracted features, learning algorithms, success metrics and testing environments have been studied [1,14].", "Additionally, studies can either focus on authentication of a single user or identification from among a pool of users [1]."]} +{"32048|5313655": []} +{"9576764|6906699": []} +{"11730478|15219853": ["Previous studies on biometric-based re-authentication concentrated on either physiological or behavioral features [29]."]} +{"3035274|18315586": ["Moreover, the use of arti\ufb01cial rhythms to improve authentication performance has been discussed in [21], while the use of pressure information, derived from the pressed area for keystrokes\u2019 acquisition in"]} +{"2169238|6906699": []} +{"2169238|17950466": ["We refer to related work for more details on these models [19, 43] and their applications [5, 50].", "Anomaly Detection: Many models for keystroke-based authentication exist [5, 34, 50].", "At the same time, related work has revealed the need to address mobile applications of keystroke biometrics and to develop novel features [5, 16, 50]."]} +{"10994869|192934": ["It has been established that descriptive statistics have the ability to determine potential positive features for forming unique patterns to discriminate individual users [18]."]} +{"17558010|15219853": []} diff --git a/edge/graph_212657371.jsonl b/edge/graph_212657371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21d65e8caf0e023fb29192b38f6ae6dd0e68b266 --- /dev/null +++ b/edge/graph_212657371.jsonl @@ -0,0 +1,25 @@ +{"169034726|52965836": ["For this type of surveys, please refer to [1, 35, 86]."]} +{"169034726|3342225": ["As its name indicates, data-driven XAI is about understanding of a decision of a \u201cblack-box\u201d machine learning mechanism given the data used as an input [35].", "Thus, the majority of the recent studies and surveys focus on providing an overview on interpretability and explainability of data-driven algorithms [5, 24, 35, 72, 86].", "For this type of surveys, please refer to [1, 35, 86]."]} +{"169034726|4110304": ["Nevertheless, recent studies on the explanation methods mainly focused on the data-driven algorithms aiming to interpret the results of \u201cblack-box\u201d machine learning mechanisms such as deep neural networks (DNN) [108].", "This research line, pushed by the intriguing results of DNNs (e.g., a DNN mistakenly labeling a tomato as a dog [97]), aims to interpret, or provide a meaning for an obscure machine learning model whose inner-workings are otherwise unknown or non-understandable by the human observer."]} +{"10543103|14997956": []} +{"96445267|3347463": ["In general there are four ways [57] in which emotion elicitation can occur: 1) homeostasis", "In a recent survey [57] we address the different approaches towards emotion simulation in RL agents and robots.", "The function of simulated emotion has been linked to five major parts in the RL loop [57]: 1) reward"]} +{"96445267|1932843": ["computational technique enabling agents to learn skills by trial and error, for example learning to walk [3].", "In a recent survey [3] a large variety of tasks was shown to be enabled by RL, such as walking, navigation, table tennis, and industrial arm control."]} +{"118687946|3342225": [" is likely complicated by the fact that the terms, \u201cexplainability, interpretability and transparency" are often used synonymously while other researchers implicitly de\ufb01ne these terms dierently [36, 37, 48, 53, 87, 115]. Arti\ufb01cial intelligence researchers tend to use the term Explainable AI (XAI) [1, 54], and focus on how explainable an arti\ufb01cial intelligence (XAI) system is without necessarily directly addressing t", "irement for transparency, or a soft-constraint that transparency exist in cases where one suspects that the agent made a mistake or does not understand why the agent chose one possibility over others [51, 53, 117, 133, 138]. Explainability can be important for other reasons, including building trust between the user and system even when mistakes were not made [21]\u2013 something we now explore. 3 Why a Human-Agent System sh", "orrectness of their solution, aiding in the adoption of these agent based technologies [102]. In both cases, the information the agent provides should build trust to ensure its decisions are accepted [48, 53, 65, 83]. Furthermore, these explanations might be necessary for legal considerations [37, 138]. In all cases we need to consider and then evaluate how these explanations were generated, presented, and if the", "r logic, interpretability and transparency can help form explanations, but are only part of the process. Guidotti et al. state that \u201can interpretable model is required to provide an explanation" [53], thus an explanation is obtained by the means of an interpretable model. Similarly, Montanavon et al., de\ufb01ne explanations as \u201ca collection of features of the interpretable domain, that have contribut", "he system reached its conclusion [127]. More formally, transparency has been de\ufb01ned as a decision model where the decision-making process can be directly understood without any additional information [53]. It is generally accepted that certain decision models are inherently transparent and others are not. For example, decision trees, and especially relatively small decision trees, are transparent, whi"]} +{"118687946|4110304": []} +{"118687946|11894197": []} +{"204824113|197430935": []} +{"204824113|167217864": []} +{"204824113|88492544": []} +{"204824113|52965836": ["One of the last surveys very brie\ufb02y introduced the idea of algorithm property and trade secrets [14] ."]} +{"204824113|59600034": ["[13] ; and (b) its connection to the taxonomy in Fig.", "6 are included in a single category ( Explanation of Deep Network Processing with Salience Mapping ) when considering the classi\ufb01cation from [13] .", "As it has been commented in Section 5.1 , there is a trade-o\ufb00 be-tween interpretability and accuracy [13] , i.e., between the simplicity of the information given by the system on its internal functioning, and the exhaustiveness of this description.", "Another type of classi\ufb01cation is indeed proposed in [13] with a segmentation based on 3 categories.", "Unfortunately, scarce contributions have attempted to de\ufb01ne such goals from a conceptual perspective [5,13,24,30] .", "Although some recent surveys [8,10,13\u201317] summarize the upsurge of activity in XAI across sectors and disciplines, this overview aims to cover the creation of a complete uni\ufb01ed framework of categories and concepts that allow for scrutiny and understanding of the \ufb01eld of XAI methods.", "6 while being in 2 di\ufb00erent categories (namely, Explanation of Deep Network Processing with Decision Trees and Explanation of Deep Network Representation with the Role of Representation Vectors ) in [13] , as shown in Fig."]} +{"204824113|3342225": ["Although some recent surveys [8,10,13\u201317] summarize the upsurge of activity in XAI across sectors and disciplines, this overview aims to cover the creation of a complete uni\ufb01ed framework of categories and concepts that allow for scrutiny and understanding of the \ufb01eld of XAI methods.", "This same duality also appears in the paper presented in [17] in which the distinction its authors make refers to the methods to solve the transparent box design problem against the problem of explaining the black-box problem.", "\u2022 Explainability : Explainability is associated with the notion of explanation as an interface between humans and a decision maker that is, at the same time, both an accurate proxy of the decision maker and comprehensible to humans [17] .", "Given its di\ufb03cult quanti\ufb01cation, comprehensibility is normally tied to the evaluation of the model complexity [17] ."]} +{"204824113|17779926": ["Automatic-Rule Extraction [217, 251, 252, 253, 254, 255, 256, 319, 320, 321]"]} +{"7873494|53531425": ["A production system [ 2 ] consists of three basic components: a set of production rules, a data base which is both used and updated by these rules, and a rule interpreter."]} +{"11245362|7360895": ["A substantial literature on the social mechanisms of human-robot interaction exists and has been surveyed in [10]."]} +{"22991403|118142": ["This latter method make the synthesized actions implicitly encode the properties of natural human behaviors [36], [37]."]} +{"59604438|4975452": ["Several types of teaching signals can be provided, such as demonstrations [1], instructions [35] and evaluative feedback [18]."]} +{"59604438|1932843": []} +{"141631|7360895": ["Only slight orientation towards a person, for example, can indicate attentiveness and caring [7, 11, 23]."]} +{"7035643|1932843": ["While the main advantage of RL is the autonomy of the learning process, when applied to real-world problems it presents some limitations such as the difficulty to implement a reward function [14], slow convergence and unsafe exploration [10]."]} +{"3362388|9316331": ["We evaluate the classical Q-learning algorithm(QPlayer, see Algorithm 4 and Equation 2), in three different games against Random player on GGP system, and compare QPlayer with MCTS [10], finding (1) that Q-learning works in GGP, and (2) that classical Q-learning converges slowly (see also [11]).", "By adding a (time limited) MCS, we effectively add the last two stages of MCTS to Q-learning: the playout and backup stage [10]."]} +{"14678361|1708582": ["Several papers have shown how the policy information in human demonstrations can be used for inverse optimal control [14, 15], to seed an agent\u2019s exploration [16, 17], and in some cases be used entirely in place of exploration [18, 19]."]} diff --git a/edge/graph_212657607.jsonl b/edge/graph_212657607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0606a7e52e71450033f029bf9966b09399b6c166 --- /dev/null +++ b/edge/graph_212657607.jsonl @@ -0,0 +1,2 @@ +{"52111124|3766791": ["tain the required derivatives to compute the residual network fL by applying the chain rule for differentiating compositions of functions using automatic differentiation [17].", "Physics informed neural networks exploit recent developments in automatic differentiation [17] \u2013 one of the most useful but perhaps under-utilized techniques in scientific computing \u2013 to differentiate neural networks with respect to their input coordinates and model parameters to leverage the underlying physics of the problem.", "We use automatic differentiation [17] to obtain the required derivatives to compute the residual networks e1, e2, and e3.", "We use automatic differentiation [17] to obtain the required derivatives to compute the additional residual network e4.", "In its most basic description [17], automatic differentiation relies on the fact that all numerical computations are ultimately compositions of a finite set of elementary operations for which derivatives are known."]} +{"52111124|14843594": []} diff --git a/edge/graph_212657666.jsonl b/edge/graph_212657666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fe26ac633d7a2a4c1b3ab2d1d99e65095de460f --- /dev/null +++ b/edge/graph_212657666.jsonl @@ -0,0 +1,28 @@ +{"16510135|10087812": ["In recent years, research in transfer learning (TL) has improved the performance of reinforcement learning (RL) methods by enabling them to re-use knowledge from one task to another (see [31] and [14] for a review)."]} +{"16056316|1708582": ["Reinforcement Learning (RL) [1] is a powerful control learning technique based on a trial and error process guided by reward signals received from the environment .", "A Markov Decision Process is a tuple < SA T R > , where S is the set of all possible states, A is the set of all possible actions, T is a stochastic state transition function, T : S \u00d7 A \u00d7 S \u2192 \u211c, and R is a stochastic reward function, R : S \u00d7 A \u2192 \u211c [1]."]} +{"202782694|393948": ["Such continuation schemes can reduce the impact of local minima within neural networks [Bengio et al., 2013, Bengio, 2014]."]} +{"11506209|1708582": ["The final goal of the agent is to behave choosing the actions that tend to increase the long-run sum of values of the reinforcement signal, r , learning its behavior by systematic trial and error, guided by a wide variety of algorithms [15]."]} +{"1552061|9316331": ["By expanding the more valuable branches of the tree and carrying out a random simulation at the leaf nodes, UCT is known to perform well in many different settings (Browne et al., 2012)."]} +{"2516142|12191695": ["The loss function used is akin to to minimizing the squared loss of the Bellman error [15]."]} +{"2516142|38476": ["We circumvent this problem by storing a batch data matrix, update it with new observations using a (FIFO) sliding window and compute the required parameters [12] online."]} +{"2516142|1708582": ["Several papers have shown how the policy information in human demonstrations can be used for inverse optimal control [28, 2], for teaching [8], to seed an agent\u2019s exploration [5, 38], and in some cases be used entirely in place of exploration [21, 33]."]} +{"1670455|10087812": ["More recently, transfer learning methodologies have been developed for RL settings (Taylor and Stone 2009; Lazaric 2012).", "To address such situations, transfer learning (TL) methods reuse knowledge learned in a source task so that an agent can learn a difficult target task faster or converge to a better policy (Taylor and Stone 2009; Lazaric 2012)."]} +{"14208912|1185580": ["Actor-critic models [Barto et al. (1983); Sutton (1984); Konda & Tsitsiklis (1999); Grondman et al. (2012)] aim to jointly estimate V (s) and \u03c0(a|s): from the current state st, the agent explores the environment by iteratively sampling the policy function \u03c0(at|st;w\u03c0) and receives positive/negative\u2026"]} +{"10891229|393948": ["\u2026Bengio and his colleagues presented insightful explorations for the rationality underlying this learning paradigm, and discussed the relationship between CL and conventional optimization techniques, e.g., the continuation and annealing methods (Bengio, Courville, and Vincent 2013; Bengio 2014)."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"14678361|1708582": ["Several papers have shown how the policy information in human demonstrations can be used for inverse optimal control [14, 15], to seed an agent\u2019s exploration [16, 17], and in some cases be used entirely in place of exploration [18, 19]."]} +{"29516310|1708582": ["Most hierarchical reinforcement learning approaches use gated behaviors: a gating function decides which among a collection of behaviors should be executed, with each behavior mapping potential environment states to low-level actions [30]."]} +{"1033682|174797842": []} +{"4559747|115456": ["In recent years, the study of StarCraft AI has an impressive progress, driven by some StarCraft AI competitions and Brood War Application Programming Interface (BWAPI)1 [10]."]} +{"4559747|5014732": ["at solving a series of challenges, such as spatial and temporal reasoning, multi-agent collaboration, opponent modeling and adversarial planning [8]."]} +{"4559747|1708582": ["raw experience without a model of the environment, and update estimates based on part of the sequence, without waiting for a final outcome [25]."]} +{"11905557|10087812": ["Transfer learning [10] [27] is a recent area of research that has been shown to speed up learning on a complex task by transferring knowledge from one or more easier source tasks."]} +{"60806958|1708582": []} +{"15313471|1932843": ["An overview of recent advances in deep RL is presented in (Li, 2017) and (Kaelbling et al., 1996; Kober & Peters, 2012) provide a comprehensive history of RL research."]} +{"15313471|1708582": ["An overview of recent advances in deep RL is presented in (Li, 2017) and (Kaelbling et al., 1996; Kober & Peters, 2012) provide a comprehensive history of RL research."]} +{"189897626|10087812": ["Analogous objectives have been considered in the literature in the case of single-task exploration (regret [Jaksch et al. , 2010]), and transfer learning (area under the curve [Taylor and Stone, 2009], and area ratio [ Lazaric, 2012 ] )."]} +{"2463824|10087812": ["Thus our methods can work with existing RL algorithms and transfer methods introduced in the literature [6, 10]."]} +{"54442967|10087812": ["Thisideaisthebasisfortransferlearning[12,25].", "Over the past two decades, transfer learning [12, 25] is one of several lines of research that have sought to increase the efficiency of training reinforcement learning agents."]} +{"477376|1708582": ["At any given time, such an agent uses a reinforcement learning (RL) method (Kaelbling et al., 1996) to maximize not only expected future external reward for achieving certain goals, but also intrinsic reward for improving an internal model of the environmental responses to its actions, learning to better predict or compress1", ", 1995) used traditional RL methods (Kaelbling et al., 1996) with theoretically unlimited look-ahead.", "Example: general decision-making tasks in dynamic environments In the more general context of general problem solving/sequential decision making/reinforcement learning/reward optimization (Newell and Simon, 1963; Kaelbling et al., 1996; Sutton and Barto, 1998) in unknown environments, there may be a set I \u2282B of possible task identification patterns and a set J \u2282B of programs that test properties of bitstrings."]} +{"189928218|14843594": []} +{"59523682|10087812": ["context of single-task transfer learning [12], [28], and can be imported into curriculum learning."]} diff --git a/edge/graph_212657759.jsonl b/edge/graph_212657759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c16876ed3db06f931aad1073c5a4094ea79e7695 --- /dev/null +++ b/edge/graph_212657759.jsonl @@ -0,0 +1,21 @@ +{"16790723|1708582": []} +{"51921962|6909107": ["Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [4], [5], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability."]} +{"51921962|206578365": ["However, it is challenging to perform distributed machine learning on resource-constrained MEC systems.", "In contrast to the above research, our work in this paper formally addresses the problem of dynamically determining the global aggregation frequency to optimize the learning with a given resource budget for federated learning in MEC systems.", "With the increasing amount of data being generated by new applications and with more applications becoming data-driven, one can foresee that machine learning tasks will become a dominant workload in distributed MEC systems in the future.", "Existing work on MEC focuses on generic applications, where solutions have been proposed for application of\ufb02oad-ing [10], [11], workload scheduling [12], [13], and service migration triggered by user mobility [14], [15].", "Local data storing and processing with global coordination is made possible by the emerging technology of mobile edge computing (MEC) [4], [5], where edge nodes, such as sensors, home gateways, micro servers, and small cells, are equipped with storage and computation capability.", "In addition, the approach in [24] is designed empirically and does not consider a concrete theoretical objective, nor does it consider computation resource constraint which is important in MEC systems in addition to constrained communication resource."]} +{"2968155|1708582": ["The agent employs this signal to enhance its ability to make decisions [1]."]} +{"413488|41505326": ["With the advent of depth sensors, such as Microsoft Kinect, Asus Xtion, and Intel RealSense, action recognition using 3D skeleton sequences has attracted a lot of research attention, and lots of advanced approaches have been proposed [33, 14, 1, 72]."]} +{"413488|12724190": ["With the advent of depth sensors, such as Microsoft Kinect, Asus Xtion, and Intel RealSense, action recognition using 3D skeleton sequences has attracted a lot of research attention, and lots of advanced approaches have been proposed [33, 14, 1, 72]."]} +{"5969377|1580493": ["BVTs [15] are used to tune the bandwidth by adjusting", "[11] presented a spectrum efficient elastic optical network based on OFDM technology [15], [18].", "optical networks [11]\u2013[15] have been shown to be a promising", "Recent studies [15], [59], [60] on modulation based spectrum allocation claim that this type of spectrum allocation scheme increases the spectral utilization by approximately 9%\u201360% compared to fixed-modulation based spectrum allocation in the elastic optical network."]} +{"2704826|2670373": ["packet switching; however, it is difficult to give QoS assurances (best effort service), and packets can have variable delays [ 5 ]."]} +{"5859740|1708582": ["Based on the value of the received reinforcement feedback (also called signal), the agent updates its parameters so that good decisions become more likely to be made in the future, while bad decisions become less likely to occur [21]."]} +{"199006036|53018231": ["In particular, such novel techniques have shown applicability in network routing and virtualization [16]\u2013 [21]."]} +{"199006036|53958589": ["be found in the following surveys: [1]\u2013[3]."]} +{"199006036|4943134": []} +{"199006036|13172512": []} +{"3461846|19938676": ["availability of cloud platforms, and consequent extreme data rate and reliability requirements [1], [4]; traditional procedures are not only prohibitive from a cost viewpoint, but also from"]} +{"49675440|5035162": []} +{"49675440|3456635": []} +{"49675440|8364569": []} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"28222603|1708582": ["Three methods namely, DP, Gittins indices and learning automata exist in the literature to solve the MABP optimally [14].", "The bandit problem described above is equivalent to an MDP with a single state, multiple actions and an action resulting in self transition [14]."]} diff --git a/edge/graph_212665971.jsonl b/edge/graph_212665971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e247a542641a23fbf8e0093d7f69ad822b2c7ef --- /dev/null +++ b/edge/graph_212665971.jsonl @@ -0,0 +1,17 @@ +{"46859251|8516210": []} +{"206802022|8953108": ["In-depth survey and evaluation of various thresholding methods are given by Sahoo et al. (1988), Lee et al. (1990), Glasbey (1993) and more recently, by Sezgin and Sankur (2004)."]} +{"3456543|393948": ["Construction of broad and extensive nets of connections between layers results in multiple possibilities of representation of the same data, focusing on different attributes [20,24,25]."]} +{"17427022|18353243": ["Approaches for anomaly detection exist in various domains, ranging from video analysis [1] to remote sensing [2]."]} +{"37575051|8516210": ["However, methods in the \ufb01eld of detection of thin structures are numerous (Xie, 2008), for instance: in medical images (Chaudhuri et al., 1989), in satellite images (Geman and Jedynak, 1996), and, also in any kind of speci\ufb01c applications: crack detection in ceramic (Elbehiery et al., 2005;\u2026"]} +{"116738023|16502294": []} +{"124464836|8953108": []} +{"137557202|8953108": []} +{"13719041|8516210": ["1) statistical methods; 2) structural methods; 3) filter-based methods; 4) model-based methods [7]."]} +{"7270997|8540351": ["This pixel-bypixel matching scheme has been widely used for PCB (printed circuit board) inspection [7,8]."]} +{"117248575|18188725": []} +{"117248575|8516210": []} +{"117248575|17403085": []} +{"2820717|14415030": []} +{"63900366|8516210": ["However,\nrequired to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al. [2], existing methods roughly be divided into four main categories: statistical, structu filter based, and model based.", "However, required to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al.", "References\n[1] Xie X (2008) A Review of Recent Advances in Surface Defect Detection Using Texture Analysis Techniques."]} +{"108958959|8516210": ["The major contributions of this work are as follows: a novel application of the structural similarity index (SSI) for defect detection in industrial flat surface products and a fast and efficient context based algorithm for defect detection compared to the state of art approaches [1 \u2013 23", "Many algorithms have been recently developed for inspection of fabrics [1 \u2013 23 ], paper [ 24 \u2013"]} +{"210177304|8516210": ["A number of AVI surveys (such as [11-13]) with a wide coverage of inspection problems can be available successively."]} diff --git a/edge/graph_212667483.jsonl b/edge/graph_212667483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67494adb3bcf47ecaebf61181ec396b2d4093f3b --- /dev/null +++ b/edge/graph_212667483.jsonl @@ -0,0 +1,7 @@ +{"52283717|7834819": ["Accelerometers and gyroscopes have been widely accepted as useful and practical sensors for wearable devices to measure and assess physical activity [10]."]} +{"5334638|12663580": ["This margin-based approach typically constructs classification models with excellent generalization ability, making it a powerful tool in various applications [33]."]} +{"40608207|1734833": []} +{"40608207|2670121": []} +{"40608207|10206347": []} +{"40608207|20905429": []} +{"58175941|3330313": []} diff --git a/edge/graph_212675130.jsonl b/edge/graph_212675130.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42dc7679a2025b53c40439576f88beb84f91dfbd --- /dev/null +++ b/edge/graph_212675130.jsonl @@ -0,0 +1,15 @@ +{"165163996|56517517": ["Recently, GCNs and variants have been applied to a wide range of domains, achieving state-of-the-art performances in social networks [34], traffic prediction [46], recommendation systems [55], applied chemistry and biology [32, 21], computer vision [23, 50], and natural language processing [5, 26, 7, 41], just to name a few [56, 53].", "Subsequent GCN variants have different architectures, but they all share the use of the Laplacian matrix as the convolution operator [56, 53]."]} +{"349242|1708582": ["The term \" reinforcement learning \" refers to a framework for learning optimal decision making from rewards or punishment (Kaelbling et al., 1996)."]} +{"166228485|67773053": []} +{"166228485|3536399": ["The constrained optimization formulation has been effectively deployed in many recent works, especially for images (see [1] for a survey).", "Adversarial attacks can be classi\ufb01ed under different threat models, which impose different access and resource restrictions on the attacker [1].", "For more comprehensive overviews of recent advancements in adversarial attacks, we direct the interested reader to survey papers for adversarial attacks in the image [1], text [35], and graph domains [32]."]} +{"52917305|207372751": ["imited attack is less than 80%. We can explain the results. In single node attack, 9 TABLE 5: ASR of links with different degree. Networks Modi\ufb01ed links Degree [2, 3] [4, 5] [6, 7] [8, 9, 10, 11, 12] [13, 14, 15, 16, 17, 18, 19, 20] [21, 22, 23, 24, 25, 26, 27, 28, 29, 30] [31-] NS 1 0.00 0.00 0.00 0.00 0.00 0.00 0.00 2 35.14 5.00 1.96 5.88 8.77 7.14 8.33 3 67.57 22.5 17.67 19.51 14.04 11.76 9.52 Yeast 1 12.5 4.26 1.43 2.78 0.00", "but ef\ufb01cient similarity-based method. The Common Neighbors (CN) and Resource Allocation (RA) [18], classic neighbor-based similarity methods, successfully applied to personalized recommendation [19], [20]. Path-based index and randomwalk-based index [21] are two other kinds of similarity index, taking advantage of network\u2019s global topological J. Chen, J. Shi, Y. Wu, X. Xu and H. Zheng are with the C"]} +{"202541045|207372751": []} +{"52157705|207372751": ["In our study, we consider the following local similarity indices, taken from the survey by L\u00fc and Zhou [32]:(2) \u2022 Common Neighbours [37]: s(v, w) = |N(v, w)| \u2022 Salton [39]: s(v, w) = |N(v,w)| \u221a d(v)d(w)", "have been proposed in the literature [30, 32, 3].", "In our study, we consider the following local similarity indices, taken from the survey by L\u00a8u and Zhou [32]: \u2022 Common Neighbours [37]: \u2022 Jaccard [22]: \u2022 Hub Promoted [38]: \u2022 Hub Depressed [38]: \u2022 Leicht-Holme-Newman [28]: The set consisting of all those similarity indices will be denoted by S .", "One of the main network analysis tools is link prediction [30, 32].", "2 Global Similarity Indices Another important class of link prediction algorithms are those categorized by L\u00fc and Zhou [32] as global similarity indices.", "Unlike the other indices in [32], the Preferential Attachment index is based on the assumption that the degree distribution follows a power law\u2014an assumption that does not hold for many of the networks on which we conduct our experiments.", "We focus in this article on the mainstream class of linkprediction algorithms based on similarity indices [32] which analyse the network topology to quantify the similarity between any two disconnected nodes in that network.", "2The only local similarity index in [32] that is excluded from our analysis is the Preferential Attachment Index.", "With this notation in place, we can now present the global similarity indices outlined in [32]: \u2022 Katz [24] is based on the number of paths between the two nodes, where longer paths are taken with lesser weight according to the dampening factor.", "Another important class of link prediction algorithms are those categorized by L\u00a8u and Zhou [32] as global similarity indices."]} +{"67856057|54559476": ["local window, convolution based methods iteratively aggregate representation of neighbor nodes to learn a node embedding [3], [4], [7], [11], [25], [26], [27], [28], [29], [30]."]} +{"67856057|3951790": ["It should be noted that most of the graphs are sparse in real world applications [51]."]} +{"57189241|212675130": ["It has stimulated (and been cited by) various followingup novel research in this line [17], [57], [64], [130], [144] as well as other attempts of survey [25], [58]."]} +{"57189241|211678150": ["It has stimulated (and been cited by) various followingup novel research in this line [17], [57], [64], [130], [144] as well as other attempts of survey [25], [58]."]} +{"57189241|2088679": ["edu analysis [78], brain circuits analysis [69], and functionality of mutations in DNA [124]."]} +{"57189241|7885409": ["[50] is the first and only paper investigating the vulnerability of Heterogeneous Information Network (HIN) which is a graph model with heterogeneous node and edge types [88]."]} +{"208267687|211678150": []} +{"208267687|207372751": [", Common Neighbor and Resource Allocation [4]), most DNLP algorithms are achieved through machine learning, especially deep learning based approach."]} diff --git a/edge/graph_212693359.jsonl b/edge/graph_212693359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e40b4d4892aad40bd986caab632e810ef67da1c4 --- /dev/null +++ b/edge/graph_212693359.jsonl @@ -0,0 +1 @@ +{"205271714|6442720": []} diff --git a/edge/graph_212693734.jsonl b/edge/graph_212693734.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cce8dfe7e43b0275eed79035295703ad0102479b --- /dev/null +++ b/edge/graph_212693734.jsonl @@ -0,0 +1,10 @@ +{"6033290|8601873": ["In this sense, we hypothesize that the problem of learning of the concept of interest could be casted in some cases as a problem of \u201dlearning to count\u201d without explicitly giving information about what we are counting.", "In multiple instance learning we find another approach closely related to our work, count-based multiple instance learning[8].", "Multiple instance learning [8] is a variation of supervised learning where instead of having individually labeled examples, instances comes in bags."]} +{"22800986|4915696": ["Image-based dense object tracking is of broad interest in the monitoring of crowd movement as well as the study of collective behavior in biological systems [19]."]} +{"145853979|212693734": []} +{"91200119|52010796": []} +{"92561575|13161071": []} +{"201238863|15782139": []} +{"14340477|8446711": ["In order to address this problem, we leverage a strategy similar to [18]."]} +{"135191639|393948": ["Representation learning is the sub \ufb01 eld of machine learning that studies models that can extract automatically a descriptive representation from raw data (Bengio, Courville, and Vincent 2013)."]} +{"201066982|8574504": ["Instance segmentation, in particular, has drawn increasing interest from the computer vision community [10]."]} +{"113451170|12974382": []} diff --git a/edge/graph_212695038.jsonl b/edge/graph_212695038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdaf953d060d71d4fe6d3e0f052ce825f20684c6 --- /dev/null +++ b/edge/graph_212695038.jsonl @@ -0,0 +1,8 @@ +{"14366345|10137283": ["overview of general trust management approaches can be found in [2], [3]."]} +{"42866997|17934515": []} +{"111660759|17934515": ["One typical application is the so-called platoon-based cooperative driving (Fernandes, 2012, Jia et al., 2016, Jia and Ngoduy, 2015, Ngoduy, 2013b).", "The issues of CDS have been extensively studied in recent years (see Jia et al. (2016) and references there-in)."]} +{"15162100|11206792": []} +{"15162100|2335874": []} +{"114039155|18740719": []} +{"114039155|37424351": []} +{"114039155|544688": []} diff --git a/edge/graph_212717861.jsonl b/edge/graph_212717861.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f001bfdbbfbc89acb7d2cd81b51a5f54dc053d1d --- /dev/null +++ b/edge/graph_212717861.jsonl @@ -0,0 +1,37 @@ +{"1335059|1708582": []} +{"4055261|17292349": ["[27], McMinn et al."]} +{"4055261|14920988": []} +{"67788034|115758427": ["[10] survey the 3D object detection problem in autonomous driving."]} +{"67788034|73497737": ["Finally, as there can always be new driving scenarios that are different from the training data, it is an interesting research topic to leverage lifelong learning [186] to update the multi-modal perception network with continual data collection."]} +{"67788034|22163846": ["At the \u201chow to fuse\u201d level, finding fusion operations that are suitable for network acceleration, such as pruning and quantization [199]\u2013[202], is an interesting future work."]} +{"67788034|8574504": ["segmentation, we refer the interested reader to the review papers [11], [12]."]} +{"1033682|174797842": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"3668011|10175374": ["This soft parameter sharing approach has been shown to be susceptible to over\ufb01tting in comparison to hard parameter sharing [23].", "[23] 4."]} +{"49669425|1229096": ["Autonomous driving has recently attracted extensive research interests [3].", "Autonomous urban driving is a long-studied and still under-explored task [1,2] particularly in the crowded urban environments [3]."]} +{"3672301|1229096": ["Autonomous driving is the subject of intensive research [25]."]} +{"3672301|1932843": ["In robotics, movement primitives have been used as building blocks for advanced motor skills [17], [26]."]} +{"29162614|206739910": ["traffic sign dataset containing 47 different road signs [21]."]} +{"198906510|1229096": ["In this paper, we employ the bicycle model [22], which is widely used for planning in self-driving cars."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"54457648|1229096": ["Finally, there exists a large volume of work on vehicle motion planning outside the machine learning context and Paden et al. (2016) present a notable survey."]} +{"52035171|206741902": ["Although the analysis we perform is applicable to any vision-based driving pipeline (including ones that comprise separate perception [21, 24, 28, 2, 12] and control modules [17]), in this paper we focus on end-to-end trained models."]} +{"52035171|1229096": ["Although the analysis we perform is applicable to any vision-based driving pipeline (including ones that comprise separate perception [21, 24, 28, 2, 12] and control modules [17]), in this paper we focus on end-to-end trained models."]} +{"53873353|1229096": ["Consequently, designing a control policy by following the traditional model-plan-then-act approach [18, 21] becomes challenging, as it is dif\ufb01cult to adequately characterize the robot\u2019s interaction with the environment a priori ."]} +{"186206717|118684904": ["A recent survey outlines progress in pose estimation and SLAM, visual-inertial odometry and 3D reconstruction, as well as other applications [143]."]} +{"186206717|58004724": ["[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "For more detailed studies of this topic [22], [27], [244] can be referred."]} +{"186206717|58598634": []} +{"186206717|53569365": ["naming, caching, reliability and multi-access computing [77]."]} +{"186206717|49862415": []} +{"186206717|4861446": ["to [106] for a broader localization overview.", "Localization is the task of finding ego-position relative to a reference frame in an environment [106], and it is fundamental to any mobile robot."]} +{"186206717|3775239": ["algorithms for intelligent vehicles is given in [216]."]} +{"186206717|206741902": ["Like in aircraft, ADSs need to be designed with high redundancies that will minimize the chance of a catastrophic failure.", "[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "One of the key \ufb01ndings of this study is that even though human drivers are still better at reasoning in general, the perception capability of ADSs with sensor-fusion can exceed humans, especially in degraded conditions such as insuf\ufb01cient illumination.", "Annual social bene\ufb01ts of ADSs are projected to reach nearly $800 billion by 2050 through congestion mitigation, road casualty reduction, decreased energy consumption and increased productivity caused by the reallocation of driving time [3].", "ADSs are complicated robotic systems that operate in inde-terministic environments.", "Increasing the mobility of elderly with ADSs can have a huge impact on the quality of life and productivity of a large portion of the population.", "It is especially crucial for ADSs [25]; the vehicle must use the correct lane and position", "Ego-only is the most common approach amongst the state-of-the-art ADSs [20], [43], [47]\u2013 [52], [52]\u2013[54].", "State-of-the-art ADSs employ a wide selection of onboard sensors.", "Most of the ADSs divide the massive task of automated driving into subcategories and employ an array of sensors and algorithms on various modules.", "1) Problems that can be solved : preventing traf\ufb01c accidents, mitigating traf\ufb01c congestions, reducing emissions 2) Arising opportunities : reallocation of driving time, trans-porting the mobility impaired 3) New trends : consuming Mobility as a Service (MaaS), logistics revolution Widespread deployment of ADSs can reduce the societal loss caused by erroneous human behavior such as distraction, driving under in\ufb02uence and speeding [3].", "During DARPA Urban Challenge [7], held in 2007, many different research groups around the globe tried their ADSs in a test environment that was modeled after a typical urban scene.", "On the other hand, extremely cautious ADSs are also making a negative impression [39].", "Widespread usage of ADSs is not imminent, yet, it is still possible to foresee the potential impact and bene\ufb01ts of it to a certain degree.", "We refer the readers to [25] for a detailed SLAM survey in the intelligent vehicle domain.", "Furthermore, an increase in public interest and market potential precipitated the emergence of ADSs with varying degrees of automation.", "A detailed comparison of sensor setups of 10 different full-size ADSs is given in Table IV.", "Large scale deployment of ADSs can accelerate this trend.", "Automated driving systems (ADSs) are being developed with the promise of preventing accidents, reducing emissions, transporting the mobility-impaired and reducing driving related stress [2].", "Fatalities [17], [18] caused by immature ADSs undermine trust.", "As such, single stage detectors are often the detection algorithms of choice for ADSs.", "ADSs are designed either as standalone, ego-only systems [20], [43] or connected multi-agent systems [44]\u2013[46].", "The present paper attempts to provide a structured and comprehensive overview of the hardware-software architectures of state-of-the-art ADSs.", "It is especially crucial for ADSs [25]; the vehicle must use the correct lane and position Fig.", "Furthermore, system failures lead to accidents: in the Hyundai competition one of the ADSs crashed because of rain [15], Google\u2019s ADS hit a bus while lane changing because it failed to estimate the speed of a bus [16], and Tesla\u2019s Autopilot failed to recognize a white truck and collided with it, killing Fig."]} +{"186206717|1229096": ["[20] X X X X X [21] X X X [22] X X [23] X [24] X X X X [25] X X X [26] X [27] X X X X X [28] X X X X Ours X X X X X X X X X", "There are overview papers on the subject, which covered several core functions [20], [21], and which concentrated on the motion planning aspect [22], [23].", "For more detailed studies of this topic [22], [27], [244] can be referred."]} +{"186206717|17036197": ["Object tracking is also often referred to as multiple object tracking (MOT) [180] and detection and tracking of multiple objects (DATMO) [181].", "tracking (MOT) [180] and detection and tracking of multiple objects (DATMO) [181]."]} +{"186206717|36510460": ["A detailed overview of Sampling Based Planning (SBP) methods can be found in [262]."]} +{"13741394|1229096": [" not validate their ideas with actual driving. Driving policies. Autonomous driving systems are commonly implemented via modular pipelines that comprise a multitude of carefully engineered components [14,26,33,49]. The advantage of this modular design is that each component can be developed in isolation, and the system is relatively easy to analyze and interpret. One downside is that such architectures can lea", "e in robotics. One important instantiation of this problem is autonomous driving. Autonomous driving is typically addressed by highly engineered systems that comprise up to a dozen or more subsystems [14,26,33,49]. Thousands of person-years are being invested in tuning these systems and subsystems. Yet the problem is far from solved, and the best existing solutions rely on HD maps and extensive sensor suites, "]} +{"5136932|1932843": ["First, as noted in [19], usually in robotics, we may only be able to \ufb01nd some approximate notion of a Markovian behaving state.", "Traditionally, machine learning approaches for planning strategies are studied under the framework of Reinforcement Learning (RL) \u2014 see [6, 17, 31, 35] for a general overview and [19] for a comprehensive review of reinforcement learning in robotics."]} +{"5136932|1708582": []} +{"5136932|28670512": []} +{"85517776|1314237": ["A large body of work has studied human driving styles [33, 43]."]} +{"17947354|8363289": ["The first one follows the work presented in [7] and uses a nonlinear vehicle model to predict the future evolution of the system [26].", "This is done in the spirit of model predictive control (MPC) [14], [26] along the lines of our ongoing internal research efforts dating from early 2000", "The main concept of MPC is to use a model of the plant to predict the future evolution of the system [6], [14], [17], [26], [27]."]} diff --git a/edge/graph_212718058.jsonl b/edge/graph_212718058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..433fb2c1f6647f98fd741af8caeec3046ba0dc44 --- /dev/null +++ b/edge/graph_212718058.jsonl @@ -0,0 +1,8 @@ +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"7967806|17485266": ["Yet, many current works still use simple variants of SGD (Ruder, 2016) for all or part of the optimization process (Wu et al., 2016).", "Yet, many current works still use simple variants of SGD (Ruder, 2016) for all or part of the optimization process (Wu et al."]} +{"9297955|9588126": []} +{"202741181|17485266": [", random search, grid search and SGD with momentum [30].", "Some simple heuristic algorithm like SGD with momentum [30] may work when the training speed has a trend of unimodality, but we can not get the accurate gradient of the curve as it is non-parametric.", "For SGD with momentum [30], we randomly choose an initial point and restart the algorithm in case that it is stuck in a local optimum."]} +{"67864686|3273340": ["Acceleration on single platform impacts on distributed systems significantly[14][15]."]} +{"10667549|1230643": []} +{"22523676|3273340": []} +{"211146401|102350916": ["extensive investigation [121] [125] [117] [116], we summarize the major challenges and list some potential directions in the following several aspects.", "kinds of AI tasks with Attention [116] [117].", "Later research in attention mechanism would try to relieve the weakness in NMT such as interpretation ability [116]."]} diff --git a/edge/graph_212718127.jsonl b/edge/graph_212718127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..693c19e2a46db6f8a1059115725b8d7313b2fde9 --- /dev/null +++ b/edge/graph_212718127.jsonl @@ -0,0 +1,3 @@ +{"54618457|6375360": ["A survey of results concerning combinatorial Gray codes can be found in Savage [13].", "It is defined recursively by L1 = 0, 1; and for n > 1, Ln = 0 \u00b7 Ln\u22121, 1 \u00b7 Ln\u22121, where \u2018\u00b7\u2019 denotes concatenation and Ln\u22121 lists the elements of Ln\u22121 from last to first [13].", "According to Savage [13], this term was introduced in 1980 as a generalization of minimal change listings."]} +{"54618457|17233734": ["It is an open question as to whether every connected Cayley graph on Sn is Hamiltonian [6]."]} +{"17201395|6375360": []} diff --git a/edge/graph_212719774.jsonl b/edge/graph_212719774.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7a24c3c81c0b54108212b8179480124ba63a2e3 --- /dev/null +++ b/edge/graph_212719774.jsonl @@ -0,0 +1,4 @@ +{"208814827|52226318": ["At the same time, there are some overlap between BIM and 3D city models because they specify semantic data and both domains model buildings and constructions [40]."]} +{"197402330|52226318": ["It is possible to extend the CityGML model using Generic city objects or ADEs [11].", "They could be developed by anyone using different naming conventions and different geometric and semantic notations [11].", "Modelling these use cases in IFC and CityGML would require creating an extension to the original data models of these standards, i.e. using ADEs or Generics in CityGML, and Property Sets in IFC."]} +{"197402330|3371831": []} +{"209056479|4040035": ["Victorian cadastre modernization journey (modified after [9]).", "According to Figure 1, by 2013, SPEAR supported the digital submission of cadastral plans in digital format (LandXML), namely ePlan [9]."]} diff --git a/edge/graph_212725052.jsonl b/edge/graph_212725052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f25df42a94b55d0c70f255ccb8429f3c8588c96a --- /dev/null +++ b/edge/graph_212725052.jsonl @@ -0,0 +1,22 @@ +{"196621428|8574504": ["The most classic version is semantic segmentation [66].", "We recommend the works of Alberto Garcia-Garcia [66] to get an overview of some of the best image segmentation techniques using deep learning while our focus would be to understand why, when and how these techniques perform on various challenges.", "[66] lists a variety of deep learning based segmentation techniques."]} +{"196621428|2088679": ["While some of them specialized in application areas [107, 123, 185], while other focused on specific types of algorithms [20, 19, 59].", "In medical image processing [123] as well we need to localize various abnormalities"]} +{"196621428|1223851": ["While some of them specialized in application areas [107, 123, 185], while other focused on specific types of algorithms [20, 19, 59].", "A particular class of problem called saliency detection [19] is born from this."]} +{"1033682|174797842": []} +{"204964673|6972141": ["Depth sensing and ego-motion estimation from image and videos play an important role in 3D scene geometry understanding and are widely applicable to many real-world domains, such as navigation systems [9, 7], video analysis [39] and autonomous driving platforms [4]."]} +{"3290651|9928823": ["Previously, several generic deep learning reviews (Bengio, 2009; Schmidhuber, 2015; Deng, 2014; LeCun et al., 2015), reviews that deal with deep", "\u2026even more research focusing on image classification with DCNNs.\nPreviously, several generic deep learning reviews (Bengio, 2009; Schmidhuber, 2015; Deng, 2014; LeCun et al., 2015), reviews that deal with deep\nDownloaded from http://www.mitpressjournals.org/doi/pdf/10.1162/neco_a_00990 by guest on\u2026", "The most common algorithm used for this purpose is backpropagation (LeCun, 1989; LeCun et al., 1998; Bengio, 2009; Deng & Yu, 2014; Deng, 2014; Srinivas et al., 2016)."]} +{"3290651|393948": []} +{"198162846|53800586": ["[16] Junyao Guo, Unmesh Kurup, and Mohak Shah.", "Many existing datasets for object tracking focus on pedestrian tracking from image/video sequences [16, 48, 43, 2]."]} +{"211563106|155101573": ["25 Generally, in SVS, a matching process of a specific region is performed between images from different perspectives in order to locate 3-"]} +{"52158437|10175374": ["Simultaneously addressing multiple tasks through multi-task learning [52] has shown advantages over methods that tackle individual ones [70]."]} +{"196470796|10175374": ["Because often geometric reasoning tasks are intrinsically coupled, several methods aim to leverage their inter-dependencies by joint supervision [34, 46]."]} +{"206592484|456491": []} +{"32487629|5660618": []} +{"210064580|49862415": ["For example, CNN-based models are widely used for the related works of environment perception, like monocular depth estimation [218], egomotion prediction [88], objective detection [214], semantic segmentation [64], and so on.", "The methods towards object detection and image segmentation are reviewed in [214] and [64]."]} +{"210064580|12998110": ["Intelligent and \u2217 These authors contributed equally to the work. autonomous robot systems will be the ultimate aim, which can perform advanced tasks autonomously, interact with humans and even more than humans [75]."]} +{"209202833|212725052": ["Several effective unsupervised frameworks for predicting motion have been reviewed in [18], and the pose network is trained jointly with a depth network by a view reconstruction loss."]} +{"209202833|211252383": []} +{"72940839|3273340": ["Prior research on designing fast and ef\ufb01cient networks has primarily focused on encoder networks for tasks such as image classi\ufb01cation and object detection [1]."]} +{"3714620|7360895": ["These technologies have wide industrial applications, including autonomous driving platforms [6], interactive collaborative robotics [11], and localization and navigation systems [12], etc."]} +{"1849941|2877147": ["Examples of such applications include view interpolation [11] and view morphing [38], frame-rate conversion [35], and deinterlacing [13]."]} +{"1849941|25699143": [") Descriptions of commonly used stereo and motion estimation algorithms can be found in computer vision textbooks [3, 20, 34, 15] and in a number of survey articles [4, 1, 14, 9, 5, 32]."]} +{"1849941|53680608": [") Descriptions of commonly used stereo and motion estimation algorithms can be found in computer vision textbooks [3, 20, 34, 15] and in a number of survey articles [4, 1, 14, 9, 5, 32]."]} diff --git a/edge/graph_212725577.jsonl b/edge/graph_212725577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..043efce1c3beb6ab9e250683eb7b471ae4e10b06 --- /dev/null +++ b/edge/graph_212725577.jsonl @@ -0,0 +1,8 @@ +{"84841767|56657817": ["( \u00a7 6) We use probing models 1 (Shi et al., 2016b; Adi et al., 2017; Hupkes et al., 2018; Belinkov and Glass, 2019) to analyze the linguistic information within CWR s. Concretely, we generate features for words from pretrained contextualiz-ers and train a model to make predictions from those\u2026", "\u2026et al., 2015; Li et al., 2015; Shi et al., 2016a, inter alia ), ablating components of the model and dataset (Kuncoro et al., 2017; Gaddy et al., 2018; Khandelwal et al., 2018), or interpreting attention mechanisms (Bahdanau et al., 2015); see Belinkov and Glass (2019) for a recent survey."]} +{"202538609|56657817": ["Applying dropout, the most popular probing regularization method (Adi et al., 2017; Belinkov and Glass, 2019; \u015eahin et al., 2019; Kim et al., 2019; Elloumi et al., 2018; Belinkov and Glass, 2017; Belinkov et al., 2018) does not consistently lead to high-accuracy, high-selectivity MLP probes across a broad range of dropout probabilities (p = 0."]} +{"204838007|10175374": ["An alternative approach, called \u201cmultitask learning\u201d (Ruder, 2017; Caruana, 1997), is to train the model on multiple tasks at a time.", "An alternative approach, called \u201cmulti-task learning\u201d [Ruder,\n2017; Caruana, 1997], is to train the model on multiple tasks at a time."]} +{"195477534|56657817": ["BERT outperforms previous state-of-the-art models in the eleven NLP tasks in the GLUE benchmark (Wang et al., 2018) by a signi\ufb01cant margin.", "They conclude that all architectures learn high quality representations that outperform standard word embeddings such as GloVe (Pennington et al., 2014) for challenging NLP tasks.", "This highlights the need for BERT to have deeper layers to perform competitively on NLP tasks.", "The trained model can be \ufb01ne-tuned for downstream NLP tasks such as question answering and language inference without substantial modi\ufb01cation.", "This question falls under the topic of the interpretability of neural networks, a growing \ufb01eld in NLP (Belinkov and Glass, 2019).", "Indeed, BERT improved the state-of-the-art for a range of NLP benchmarks (Wang et al., 2018) by a signi\ufb01cant margin."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"40100965|17485266": ["For context, the regular stochastic gradient descent (SGD) update of a model\u2019s parameters \u03b8 at time step t looks like the following (Ruder, 2016):"]} +{"174798232|10175374": ["A crucial difference between our continual learning setup and previous work is that we do not assume that each example comes with a dataset descriptor (1)Contrast this with a more common setup where the model learns in a multitask setup (Ruder, 2017; McCann et al., 2018)."]} +{"2493033|11591301": ["One concept that the LSTM layers likely learn is negation, which is known to be important for sentiment analysis (Wiegand et al., 2010)."]} diff --git a/edge/graph_212725770.jsonl b/edge/graph_212725770.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8de5006a43db1c2dc2c613ab9fe3f9c9f7a6c11 --- /dev/null +++ b/edge/graph_212725770.jsonl @@ -0,0 +1,54 @@ +{"52294119|207244886": [", [58]) that include the classification accuracy (Acc), the False-Positive Rate (FPR), and the False-Negative Rate (FNR)."]} +{"52294119|393948": ["This allows the DAE to retain the locality information by reconstructing the hash representation matrix MH, which is related to manifold learning [54] or representation learning [55]."]} +{"205572964|3519414": ["The next generation of automatic speech recognition 32 and information extraction models will likely develop clinical voice assistants to accurately transcribe patient visits.", "As such, applyication of deep-learning methods to EHR data is a rapidly expanding area 32,33 ."]} +{"205572964|2088679": ["Medical imaging, for instance, can greatly benefit from recent advances in image classification and object detection 2,8 ."]} +{"205572964|23566570": ["RL can be useful in healthcare whenever learning requires physician demonstration, for instance in learning to suture wounds for robotic-assisted surgery 7 .", "Modern genomic technologies collect a wide variety of measurements, from an individual\u2019s DNA sequence to the quantity of"]} +{"1033682|174797842": []} +{"67855357|393948": ["This is an issue especially for deep learning, where the empirical successes are thought to be due to rich internal representations of the data that are learned to re\ufb02ect task-speci\ufb01c invariances (Bengio et al., 2013; Farabet et al., 2013)."]} +{"35431421|2992477": []} +{"35431421|5246835": []} +{"59528442|51909308": ["\u2026behavior may change over time, for instance, the nature of anomaly had changed so signi\ufb01cantly and that it remained unnoticed at Maroochy water treatment plant, for a long time which resulted in leakage of 150 million liters of untreated sewerage to local waterways (Ramotsoela et al. [2018])."]} +{"59528442|49669060": ["A survey of traditional anomaly detection techniques and its challenges to detect anomalies in social networks is a well studied topic in literature (Liu and Chawla [2017], Savage et al. [2014], Anand et al. [2017], Yu et al. [2016], Cao et al. [2018b], Yu et al. [2016])."]} +{"59528442|52043210": []} +{"59528442|4097106": ["Several works have studied the state-of-the-art deep models for video anomaly detection and have classi\ufb01ed them based on the type of model and criteria of detection (Kiran et al. [2018], Chong and Tay [2015]).", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017].", "\u2026contributions as follows: \u2022 Most of the existing surveys on DAD techniques either focus on a particular application domain or speci\ufb01c research area of interest (Kiran et al. [2018], Mohammadi et al. [2017], Litjens et al. [2017], Kwon et al. [2017], Adewumi and Akinyelu [2017], Ball et al. [2017]).", "The state-of-the-art deep learning based methods for video anomaly detection along with various categories have been presented in Kiran et al. [2018].", "A review of deep learning based semi-supervised techniques for anomaly detection is presented by Kiran et al. [2018] and Min et al. [2018]."]} +{"59528442|9461213": ["al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.al Ball et al. [2017]. The state-of-the-art deep learning based methods for video anomaly detection along with various categories has been presented in Kiran et al. [2018]. Although there are a number of reviews in applying DAD techniques, there is shortage of comparative analysis of deep learning architecture adopted for outlier detection.", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017].", "domain is presented by Mohammadi et al. [2018]. In this section we present some of the DAD techniques used in this domain in Table 14.", "al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.al Ball et al. [2017]. The state-of-the-art deep learning based methods for video anomaly detection along with various categories has been presented in Kiran et al.", "[2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.", "al Mohammadi et al. [2017]. Sensor networks anomaly detection has been reviewed by Ball et.", "[2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017]. 1 2 3 4 5 6 7"]} +{"59528442|2088679": ["\u2026contributions as follows: \u2022 Most of the existing surveys on DAD techniques either focus on a particular application domain or speci\ufb01c research area of interest (Kiran et al. [2018], Mohammadi et al. [2017], Litjens et al. [2017], Kwon et al. [2017], Adewumi and Akinyelu [2017], Ball et al. [2017]).", "An extensive review of using DAD techniques in the medical domain is presented by Litjens et al. [2017].", "Our Survey, 2 \u2014Kwon and Donghwoon Kwon et al. [2017], 5 \u2014John and Derek Ball et al. [2017] 3 \u2014Kiran and Thomas Kiran et al. [2018], 6 \u2014Mohammadi and Al-Fuqaha Mohammadi et al. [2017] 4 \u2014Adewumi and Andronicus Adewumi and Akinyelu [2017] 7 \u2014Geert and Kooi et.al Litjens et al. [2017]."]} +{"59528442|18188725": ["Several studies have been conducted to understand the theoretical and practical applications of deep learning in medical and bio-informatics (Min et al. [2017], Cao et al. [2018a], Zhao et al. [2016], Khan and Yairi [2018])."]} +{"59528442|8965636": ["Many traditional machine learning algorithms have been applied successfully in fraud detection (Sorournejad et al. [2016])."]} +{"59528442|17195518": ["7 Brown et al. [2018], Zhang et al."]} +{"59528442|1828831": ["Several works have studied the state-of-the-art deep models for video anomaly detection and have classi\ufb01ed them based on the type of model and criteria of detection (Kiran et al. [2018], Chong and Tay [2015])."]} +{"59528442|18599847": []} +{"705210|18654252": ["The aim of anomaly detection or outlier detection is to separate anomalous and normal data by using machine learning techniques [5].", "In unsupervised training, the model is trained using completely unlabeled data and then in the test stage, the trained model tries to cluster the anomalous and normal data into separate clusters [5].", "An anomaly detection model can be trained in supervised, unsupervised [5] or semi-supervised manner [7]."]} +{"705210|7158350": ["They are appropriate for classification tasks because of their ability to convergence to complex decision boundaries due to their non-linear activation functions [14], [15]."]} +{"207172599|3330313": []} +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"46847954|393948": ["In this paper, we propose a network intrusion detection model by stacking dilated convolutional autoencoders which actually combines the concepts of self-taught learning [6] and representation learning [7]."]} +{"8903176|13407903": ["They are the state of the art in many vision and content-base multimedia indexing tasks such as classification [18, 31, 36], recognition [32], image tagging [21], video captioning [4], face verification [28, 30], contentbased image retrieval [1, 16], super resolution [10], cross-media searching [7, 11], and image forensics [5, 39, 40]."]} +{"8903176|393948": ["The relevance of the internal representation learned by the neural network during training have been proved by many recent works [2, 6, 9, 20]."]} +{"60894829|6430931": ["As lots of machine learning methods such as Neural Network [3], Fuzzy Logic [4, 5], and Hidden Markov Model [6] have made great achievements in IDS."]} +{"67855299|3536399": ["[19]\u2013 [21] Generating adversarial samples for time series classi\ufb01cation model has not been focused on, albeit the potentially large security risk they may possess."]} +{"17686631|18977370": ["card or mobile phone fraud detection [6,7], video surveillance [8,9], mobile robotics [10,11], sensor networks [12], astronomy catalogues [13,14] and text mining [15].", "Other surveys have focused on novelty detection methods used in specific applications such as cyber-intrusion detection [6,42,7] and wireless sensor networks [12]."]} +{"17686631|36784649": ["A number of surveys have been published since then [26\u201332,24], but none of these attempts to be as wideranging as we are in our review.", "Some novelty detection methods have been the topic of a number of other very brief overviews that have recently been published [31,38\u201341,32]."]} +{"17686631|3330313": ["Hodge and Austin [29], Agyemang et al. [30], and Chandola et al. [36] provide comprehensive surveys of outlier detection methodologies developed in machine learning and statistical domains.", "According to Hodge and Austin [29], this approach is analogous to a semi-supervised recognition approach, which they term novelty detection or novelty recognition.", "Three fundamental approaches to the problem of outlier detection are addressed in [29].", "detection methods are grouped into \u201cstatistical models\u201d and \u201cneural networks\u201d in [29,30].", "According to Hodge and Austin [29], most \u201cstatistical\u201d and \u201cneural network\u201d approaches require cardinal or ordinal data to allow distances to be computed between data points.", "The surveys [29,30,24] agree that approaches to anomaly detection can be supervised, unsupervised, or semi-supervised.", "This survey builds upon the three previous methods discussed in [29,30,36] by expanding"]} +{"4320462|13709403": []} +{"4320462|1303485": ["[157] 2016 Captures the crowd behaviour using the amalgamation of the concepts of physics and biology."]} +{"4320462|4915696": ["[156] 2015 Discusses crowd motion analysis and crowd behaviour analysis Multi-sensor feature fusion (MSFF) is missing in the discussion"]} +{"4320462|9928823": ["The three architectures mentioned in the literature are generative, discriminative, and hybrid [8]."]} +{"4320462|61238909": ["[153] 2013 Physics-based approach for crowd analysis and crowd simulation is used and discussed Abnormality detection on datasets which are closer to realistic human domain needs more discussion"]} +{"4320462|393948": ["Deep learning has emerged as a new concept of machine learning [1,2].", "[2] provided a thorough analysis of various techniques such as principal component analysis, clustering of image patches, dictionary approaches, sparse representations and much more that have been a popular choice with CNN.", "[2,24] attributed the foundation of CNNs, where the authors had proposed a neural architecture called LeNet"]} +{"4320462|17516538": ["[149] 2004 Key discussion on object detection, object tracking, person identification Occlusion, anomaly detection, a fusion of data from multiple cameras"]} +{"4320462|14970359": ["Crowd analysis is an interesting technique focusing on various diverse fields such as Computer Vision [14], Pattern Recognition (PR) [15], and Soft Computing methodology [16],MathematicalModelling (MM) [17], Biomedical Information (BI) [18], Image Signal Processing (ISP) [19], Data Mining (DM) [20], Computational Intelligent (CI) [19] and Artificial Intelligence (AI) [21]."]} +{"4362859|3536399": ["Several possible explanations for the existence of adversarial examples have been proposed in the literature (Akhtar & Mian, 2018)."]} +{"207627753|38476": ["A general review on the properties of sequential classification tasks and suitable methods to cope with them can be found in [Dietterich, 2002]."]} +{"207627753|50458504": ["Likewise, a plethora of methods from supervised learning, unsupervised learning, anomaly detection and ensemble learning lend themselves to address individual or several of these properties [Carneiro et al., 2017, Abdallah et al., 2016, Phua et al., 2010]."]} +{"67856197|44143673": ["While alternatives to ism exist in the literature (Gan et al. 2018), few provide both a probabilistic framework and an open source software."]} +{"67856197|4110304": ["Neural networks are closer to black-box systems, and their interpretability has recently gained a lot of attention (Zhang and Zhu 2018).", "e information, and interesting patterns learnt by ism could be emphasized similarly. Neural networks are closer to black-box systems, and their interpretability has recently gained a lot of attention [50]. However, recent eorts mostly focus on numerical and convolutional networks, which leaves room for future lstm representations. Dierences between the input sequence and the reconstructed output cou"]} +{"67856197|3330313": ["\u2026data (Emmott et al. 2016; Breunig et al. 2000; Ramaswamy et al. 2000), novelty detection methods have been successfully applied to categorical data (Hodge and Austin 2004), time-series (Marchi et al. 2015; Kundzewicz and Robson 2004; Taylor and Letham 2018), discrete sequences (Chandola et al.\u2026", "Novelty detection is an unsupervised learning problem and an active research area [1,21].", "data [21], time-series [25, 32, 47], discrete sequences [8, 10, 49] and mixed data types [13].", "Novelty detection is an unsupervised learning problem and an active research area (Aggarwal 2015; Hodge and Austin 2004)."]} +{"67856197|55850333": ["recom.fr Jeremie Barlet Amadeus, 485 Route du Pin Montard, Sophia Antipolis, France jeremie.barlet@amadeus.com arXiv:1902.10940v1 [cs.LG] 28 Feb 2019 2 Remi Domingues et al. data [21], time-series [25, 32, 47], discrete sequences [8, 10, 49] and mixed data types [13]. This paper surveys the problem of detecting anomalies in temporal data, specifically in discrete sequences of events which have a temporal o", "\u2026et al. 2000), novelty detection methods have been successfully applied to categorical data (Hodge and Austin 2004), time-series (Marchi et al. 2015; Kundzewicz and Robson 2004; Taylor and Letham 2018), discrete sequences (Chandola et al. 2008;Warrender et al. 1999; Cohen 1995) and mixed data types\u2026", "Use cases relating to this problem are sensor readings (Kundzewicz and Robson 2004) and first story detection (Petrovic\u0301 et al. 2010).", "ion, where datasets are long sequences in which we seek anomalous and contiguous subsequences, denoting a sudden change of behavior in the data. Use cases relating to this problem are sensor readings [25] and rst story detection [36]. A second category considers datasets as sets of sequences, and targets the detection of anomalous sequences with respect to nominal samples. Our study focuses on the lat"]} +{"374685|3918777": ["Most existingmethods, such as those reviewed inGama et al. (2014) and \u017dliobaite\u0307 et al. (2016), address the problem of concept drift and evolution with a focus on supervised learning tasks.", "The problem is both interesting and important as evolving data streams are present in a large number of dynamic processes (\u017dliobaite\u0307 et al. 2016).", "The problem is both interesting and important as evolving data streams are present in a large number of dynamic processes (\u017dliobait\u0117 et al. 2016)."]} +{"75137541|51929263": ["In general, OSDA supposes C S \u2282 C T and PDA supposes The earlier related reviews on TL and DA can be referred to as [4], [8]\u2013[17], which are summarized in Table I."]} +{"75137541|3654323": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"75137541|7559976": []} +{"75137541|15888893": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"75137541|2670121": ["Several related reviews on transfer learning and domain adaptation can be referred to as [4], [6], [7], [8], [9], [10], [11], [12], [13]."]} +{"195345608|2088679": ["\u2026such as image classi\ufb01cation (Krizhevsky, Sutskever, and Hinton 2012; Simonyan and Zisserman 2014), playing complex games (Silver et al. 2017b; Silver et al. 2017a; Mnih et al. 2013), controlling driverless vehicles (Chen et al. 2015; Bojarski et al. 2016), and medical imaging (Litjens et al. 2017)."]} diff --git a/edge/graph_212746354.jsonl b/edge/graph_212746354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..02835069e2790036f210fede9eb7fef8d917c0d2 --- /dev/null +++ b/edge/graph_212746354.jsonl @@ -0,0 +1,16 @@ +{"3621944|38476": []} +{"2185196|1634674": []} +{"16789819|27533715": ["tions st) or ICC: based on ANOVA statistics: between-subjects var/(betweensubjects var + error), six different computational methods are possible; 0 \u2264 ICC\u2264 1, unitless [212, 213]."]} +{"16789819|43331360": ["devices for neurorehabilitation training in clinical centers [6\u20138]."]} +{"12529281|11894197": ["In order to reduce the number of employed features principle component analysis (PCA) was performed [11]."]} +{"16219458|11608263": ["Tsoumakas and colleagues [15] and Freund and colleagues [4] describe methods for performing multi-label classification based on algorithm modification or problem transformation (similar to what is presented here)."]} +{"17104065|3102110": ["Similarity search is of growing importance in many new applications such as data mining and data warehousing [6, 19]."]} +{"7979910|7788290": ["S YSTEMS that can detect, recognize, and synthesize human motion are of interest in both research and industry due to the large number of potential applications in virtual reality, smart surveillance systems for advanced user interfaces, and motion analysis (see [1], [2], [3] for a review)."]} +{"3687682|1634674": []} +{"981831|1262156": ["With the advent of affordable depth cameras [34] and the associated skeleton trackers [25], 3D joint location has become a popular low-level feature [17, 11]."]} +{"13273775|14970359": ["Recently, a lot of attempts have been made to design a marker-free tracking system for the human motion capture [7] [9] [14]."]} +{"13273775|7788290": ["Recently, a lot of attempts have been made to design a marker-free tracking system for the human motion capture [ 7 ] [9] [14]."]} +{"189824807|63074864": ["It is the result of a new development phase produced by the Therapist Project [34], the goal of which is to design and develop an autonomous robotic prototype that supports rehabilitation in children with OBPP and infantile CP (ICP).", "Finally, eight patients were enrolled, of which six had OBPP and two had ICP.", "Figure 2 shows an OBPP patient playing the imitation game with this robot during one of our previous evaluations.", "In contrast, some patients showed an improvement in general ranges of motion following their\nID Number Gender Age Pathology Number of Sessions Duration (Mean \u00b1 SD)\n1 Male 4 Left OBPP 15 19.46 \u00b1 2.19\n2 Male 10 Left ICP 15 24.64 \u00b1 3.24\n3 Female 3 Left OBPP 15 22.26 \u00b1 2.25\n4 Male 7 Left OBPP 7 28.85 \u00b1 2.47\n5 Female 6 Left OBPP 14 24.92 \u00b1 3.31\n6 Female 8 Right OBPP 8 23.5 \u00b1 4.62\n7 Male 9 Left OBPP 6 25.16 \u00b1 4.87\n8 Male 8 Right ICP 13 24.84 \u00b1 2.51\n\u2014 \u2014 6.9 \u00b1 2.42 \u2014 11.6 \u00b1 3.93 24 \u00b1 2.71\nNote: SD: standard deviation.", "This demonstrates how patients 1 and 2, with different pathologies (ICP and OBPP, respectively, in the left limb) and who attended all of the sessions, improved by 3 and 2 points, respectively.", "This evaluation performs motor training with pediatric patients affected by OBPP or ICP-type hemiparesis.", "However, some works in the past decade have been aimed at extending the spectrum of target patients and have developed and evaluated platforms for children suffering from brain injuries, such as CP or OBPP [23].", "Six of these patients suffered from cerebral palsy (CP), and two were afflicted with obstetric brachial plexus palsy (OBPP).", "Measuring Instruments To carry out the previously discussed assessment, the following measuring instruments were administered: 1) motor function\n\u25cf MACS to describe how children handle objects in daily activities \u25cf the motor scale of Mallet; although this scale is indicated for patients with OBPP, it is also used to assess the overall mobility of the upper limb.", "The inclusion criteria are as follows: \u25cf patients 3\u201310 years of age who suffer from OBPP or ICP \u25cf recruited from or clinically assessed in the Infantile Reha-\nbilitation Service of VRUH \u25cf clinically stable and capable of starting the treatment \u25cf authorization by parents or guardians with the correspond-\ning signed agreement."]} +{"60078101|1634674": ["The method used to train the model varies significantly, from simple ones such as obtaining average joint angles at a set of feature points [4], to particle filters [6], to finite state machines [7], and to sophisticated statistical methods such as hidden Markov models [8] and neural networks [9].", "This line of work in the context of gesture recognition has been reviewed in recent surveys [8] and [10]."]} +{"111797|2814871": ["or community-based training environments where resources are limited [19]\u2013[22]."]} +{"67788361|1262156": ["Another approach is to apply gesture recognition [10, 24] that classifies incorrect movements."]} diff --git a/edge/graph_212747631.jsonl b/edge/graph_212747631.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f31d8f3f4409e8d685576f1c6ba7aece6a750077 --- /dev/null +++ b/edge/graph_212747631.jsonl @@ -0,0 +1,12 @@ +{"11071309|1805048": ["Recent advances in cloud computing enable on-demand service delivery and promote the rapid growth of service markets, where more and more Web services are expected to become available."]} +{"2363038|1805048": ["Some examples [6] are: Filterbots, Fab and Ripper.", "Some of the most important limitations [6], [15] are sparseness, scalability, cold start, shilling, synonymy, bribing, copy-profile attacks, and the lack of privacy.", "Authors use public key Paillier cryptosystem [21] for its homomorphic properties and its faster decryption process (compared with ElGamal), to calculate the simple Cosine correlation between items [6] with privacy.", "There are many examples of CF referenced databases [6] in the literature: Eachmovie, MovieLens, Jester, and Netflix prize data.", "The state-of-the-art proposes a classification of CF methods into three main categories depending on the data they use to make the recommendation: memory-based methods (which use the full matrix with all the ratings), model-based (which use statistical models and functions of the data matrix but not the complete data matrix) and hybrid methods (which combine the previous methods with content-based [6] recommendation methods).", "There exists a huge variety of model-based CF methods: dimensionality reduction methods (SVD [2], RSVD, Improved RSVD, NSVD2 and SVD++ [9], [12]), linear regression methods [13], clustering methods [6], [14], and Bayesian network models amongst others [6].", "Examples of these are the Personality Diagnosis [6] and the Probabilistic memory-based model [6].", "If the user ub decides to collaborate, she calculates the similarity between ub and ua using the Cosine similarity metric [6] and sends the result to ua, with her valuation of the item on which the request was made."]} +{"13164646|1805048": ["Our framework is practical since a lot of real world data is extremely sparse such as those in commercial recommender systems [16]."]} +{"13902036|3202525": []} +{"13902036|4859605": []} +{"13902036|18540015": ["The different algorithms used in user-based and item-based techniques are analyzed by Almazro et al. [2010], and the metrics used for evaluation are discussed. A detailed and well-presented survey of collaborative filtering methods is provided by Ekstrand et al. [2011]. The different collaborative filtering methods are presented, and an analysis is given regarding which method is adequate for each problem that needs to be addressed. Detailed information is also provided on how to evaluate a recommender system. Sachan and Richariya [2013] realized a survey on collaborative filtering approaches, mostly emphasizing how each approach addresses the most common challenges of collaborative filtering recommendations. This work concludes that more research is needed to address sparsity issues because sparsity affects the quality of the recommendations and also because datasets are expected to be even sparser in the future. Shi et al. [2014] present the state of the art and discusses the challenges in the field of collaborative filtering recommendations for systems that in addition to using ratings also use information such as the features and characteristics of the users and items, or information related to the users\u2019 interactions. Yang et al. [2014] survey collaborative filtering recommender systems that use information from social networks. The surveyed approaches are classified according to whether they use matrix factorization models or neighborhood-based approaches. Matrix factorization models are also presented by Bokde et al. [2015], who describe how they are used in collaborative filtering algorithms.", "The different algorithms used in user-based and item-based techniques are analyzed by Almazro et al. [2010], and the metrics used for evaluation are discussed. A detailed and well-presented survey of collaborative filtering methods is provided by Ekstrand et al. [2011]. The different collaborative filtering methods are presented, and an analysis is given regarding which method is adequate for each problem that needs to be addressed. Detailed information is also provided on how to evaluate a recommender system. Sachan and Richariya [2013] realized a survey on collaborative filtering approaches, mostly emphasizing how each approach addresses the most common challenges of collaborative filtering recommendations.", "The different algorithms used in user-based and item-based techniques are analyzed by Almazro et al. [2010], and the metrics used for evaluation are discussed.", "The different algorithms used in user-based and item-based techniques are analyzed by Almazro et al. [2010], and the metrics used for evaluation are discussed. A detailed and well-presented survey of collaborative filtering methods is provided by Ekstrand et al. [2011]. The different collaborative filtering methods are presented, and an analysis is given regarding which method is adequate for each problem that needs to be addressed.", "The different algorithms used in user-based and item-based techniques are analyzed by Almazro et al. [2010], and the metrics used for evaluation are discussed. A detailed and well-presented survey of collaborative filtering methods is provided by Ekstrand et al. [2011]. The different collaborative filtering methods are presented, and an analysis is given regarding which method is adequate for each problem that needs to be addressed. Detailed information is also provided on how to evaluate a recommender system. Sachan and Richariya [2013] realized a survey on collaborative filtering approaches, mostly emphasizing how each approach addresses the most common challenges of collaborative filtering recommendations. This work concludes that more research is needed to address sparsity issues because sparsity affects the quality of the recommendations and also because datasets are expected to be even sparser in the future. Shi et al. [2014] present the state of the art and discusses the challenges in the field of collaborative filtering recommendations for systems that in addition to using ratings also use information such as the features and characteristics of the users and items, or information related to the users\u2019 interactions. Yang et al. [2014] survey collaborative filtering recommender systems that use information from social networks.", "The different algorithms used in user-based and item-based techniques are analyzed by Almazro et al. [2010], and the metrics used for evaluation are discussed. A detailed and well-presented survey of collaborative filtering methods is provided by Ekstrand et al. [2011]. The different collaborative filtering methods are presented, and an analysis is given regarding which method is adequate for each problem that needs to be addressed. Detailed information is also provided on how to evaluate a recommender system. Sachan and Richariya [2013] realized a survey on collaborative filtering approaches, mostly emphasizing how each approach addresses the most common challenges of collaborative filtering recommendations. This work concludes that more research is needed to address sparsity issues because sparsity affects the quality of the recommendations and also because datasets are expected to be even sparser in the future. Shi et al. [2014] present the state of the art and discusses the challenges in the field of collaborative filtering recommendations for systems that in addition to using ratings also use information such as the features and characteristics of the users and items, or information related to the users\u2019 interactions."]} +{"13902036|62040085": []} +{"13902036|1805048": ["The implementations are classified into the collaborative filtering categories that are analyzed by Su and Khoshgoftaar [2009]. The implementations of each category are discussed according to their chronological appearance.", "Other model-based techniques are Bayesian networks, clustering methods, and association rule-based methods [Su and Khoshgoftaar 2009]."]} +{"11869725|1805048": ["We review some of the concepts for collaborative filtering (CF); see [12] for a detailed survey."]} +{"23290860|1805048": ["Due to their limitations (CF does not consider feature information, while content-based schemes do not incorporate preference similarity), hybrid approaches can be used.(1) Such approaches combine the advantages of both types of methods to avoid the limitations of content-based and CF schemes.", "Examples include privacy, accuracy, online performance, scalability, cold start, coverage, grey sheep, robustness, being subject to shilling attacks, diversity, data sparsity, and synonymy.(1) Due to increasing privacy concerns, online vendors prefer utilizing CF schemes with privacy protection measures to make their customers feel more comfortable.", "Such systems can be classified as collaborative filtering (CF), content-based filtering, and hybrid filteringmethods.(1) Content-based filtering, as the name implies, provides recommendations based on the content of the textual information."]} +{"11821148|1805048": ["Model-based CF methods [2], [6], [12], [15] build a model from the full matrix on which to make predictions.", "There are many examples of CF referenced databases [6] in the literature, like Eachmovie, MovieLens, Jester, and Netflix prize data.", "Some of the most important limitations [6], [8], [18] are sparseness, scalability, cold start, shilling, synonymy, bribing, copy-profile attacks, and the lack of privacy.", "CF methods can be classified into three main categories depending on the data they use to compute recommendations: memory-based methods, which use the full matrix with all ratings; model-based methods, which utilise statistical models and functions of the data matrix but not the complete data matrix; and hybrid methods, which combine the previous methods with content-based recommendation methods [6].", "Some well-known examples [6] are: Filterbots, Content-boosted, Fab and Ripper."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} diff --git a/edge/graph_212747705.jsonl b/edge/graph_212747705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c93e5ef2b69d1f14a84e39ca613243b1ae9d368f --- /dev/null +++ b/edge/graph_212747705.jsonl @@ -0,0 +1 @@ +{"67769525|49527603": ["It is practical and works in asynchronous environments [20,125].", "Tendermint is also a consensual mechanism based on the Byzantine general problem mentioned above [20,128].", "The application fields of the blockchain technology include finance, Internet of Things [19], public social services, reputation system, security and privacy, and so on [20]."]} diff --git a/edge/graph_212747830.jsonl b/edge/graph_212747830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c7eeaabc7e57955c80b29d2db789192701b45c8 --- /dev/null +++ b/edge/graph_212747830.jsonl @@ -0,0 +1,23 @@ +{"195477534|56657817": ["BERT outperforms previous state-of-the-art models in the eleven NLP tasks in the GLUE benchmark (Wang et al., 2018) by a signi\ufb01cant margin.", "They conclude that all architectures learn high quality representations that outperform standard word embeddings such as GloVe (Pennington et al., 2014) for challenging NLP tasks.", "This highlights the need for BERT to have deeper layers to perform competitively on NLP tasks.", "The trained model can be \ufb01ne-tuned for downstream NLP tasks such as question answering and language inference without substantial modi\ufb01cation.", "This question falls under the topic of the interpretability of neural networks, a growing \ufb01eld in NLP (Belinkov and Glass, 2019).", "Indeed, BERT improved the state-of-the-art for a range of NLP benchmarks (Wang et al., 2018) by a signi\ufb01cant margin."]} +{"211532403|56657817": []} +{"204509486|10694510": ["Deep learning algorithms have been applied to different tasks of text mining and natural language processing, such as identifying parts of speech [17] [13], entity extraction [3] [25], sentiment analysis [35], text classification [9], and other aspects of text [2]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"198968327|73497737": ["Continual learning(Parisi et al. 2019; Chen and Liu 2018) aims to train the model with several tasks in sequence so that it remembers the previously-learned tasks when learning the new ones."]} +{"202539551|182952502": [", 2019) or reinforcement learning (Branavan et al., 2011; Chevalier-Boisvert et al., 2018; Bahdanau et al., 2019; Luketina et al., 2019).", "\u2026could transfer factual and commonsense knowledge reliably to downstream tasks such as commonsense (visual) question answering (Zellers et al., 2018; Talmor et al., 2019) or reinforcement learning (Branavan et al., 2011; Chevalier-Boisvert et al., 2018; Bahdanau et al., 2019; Luketina et al., 2019)."]} +{"202539551|12161567": ["This is similar to ranking-based metrics from the knowledge base completion literature (Bordes et al., 2013; Nickel et al., 2016)."]} +{"211532645|212747830": ["Several recent surveys have focused on pretrained representations and large-scale Transformerbased models (Qiu et al., 2020; Rogers et al., 2020; Wang et al., 2020a)."]} +{"211532645|182952667": ["Several recent surveys focus on pre-trained representations and large-scale Transformer-based models e.g., [Storks et al., 2019; Jing and Xu, 2019; Wang et al., 2019b].", ", [Storks et al., 2019; Jing and Xu, 2019; Wang et al., 2019b]."]} +{"211532645|22163846": ["Similarly to knowledge distillation for CNNs [Cheng et al., 2017], the student can directly learn from the logits (i.e., from soft labels) of the final softmax layer.", "Although most methods in this area were originally proposed for convolutional neural networks (CNNs), e.g., [Cheng et al., 2017], many ideas are directly applicable to Transformers."]} +{"84841767|56657817": ["( \u00a7 6) We use probing models 1 (Shi et al., 2016b; Adi et al., 2017; Hupkes et al., 2018; Belinkov and Glass, 2019) to analyze the linguistic information within CWR s. Concretely, we generate features for words from pretrained contextualiz-ers and train a model to make predictions from those\u2026", "\u2026et al., 2015; Li et al., 2015; Shi et al., 2016a, inter alia ), ablating components of the model and dataset (Kuncoro et al., 2017; Gaddy et al., 2018; Khandelwal et al., 2018), or interpreting attention mechanisms (Bahdanau et al., 2015); see Belinkov and Glass (2019) for a recent survey."]} +{"204838007|10175374": ["An alternative approach, called \u201cmultitask learning\u201d (Ruder, 2017; Caruana, 1997), is to train the model on multiple tasks at a time.", "An alternative approach, called \u201cmulti-task learning\u201d [Ruder,\n2017; Caruana, 1997], is to train the model on multiple tasks at a time."]} +{"204824113|197430935": []} +{"204824113|167217864": []} +{"204824113|88492544": []} +{"204824113|52965836": ["One of the last surveys very brie\ufb02y introduced the idea of algorithm property and trade secrets [14] ."]} +{"204824113|59600034": ["[13] ; and (b) its connection to the taxonomy in Fig.", "6 are included in a single category ( Explanation of Deep Network Processing with Salience Mapping ) when considering the classi\ufb01cation from [13] .", "As it has been commented in Section 5.1 , there is a trade-o\ufb00 be-tween interpretability and accuracy [13] , i.e., between the simplicity of the information given by the system on its internal functioning, and the exhaustiveness of this description.", "Another type of classi\ufb01cation is indeed proposed in [13] with a segmentation based on 3 categories.", "Unfortunately, scarce contributions have attempted to de\ufb01ne such goals from a conceptual perspective [5,13,24,30] .", "Although some recent surveys [8,10,13\u201317] summarize the upsurge of activity in XAI across sectors and disciplines, this overview aims to cover the creation of a complete uni\ufb01ed framework of categories and concepts that allow for scrutiny and understanding of the \ufb01eld of XAI methods.", "6 while being in 2 di\ufb00erent categories (namely, Explanation of Deep Network Processing with Decision Trees and Explanation of Deep Network Representation with the Role of Representation Vectors ) in [13] , as shown in Fig."]} +{"204824113|3342225": ["Although some recent surveys [8,10,13\u201317] summarize the upsurge of activity in XAI across sectors and disciplines, this overview aims to cover the creation of a complete uni\ufb01ed framework of categories and concepts that allow for scrutiny and understanding of the \ufb01eld of XAI methods.", "This same duality also appears in the paper presented in [17] in which the distinction its authors make refers to the methods to solve the transparent box design problem against the problem of explaining the black-box problem.", "\u2022 Explainability : Explainability is associated with the notion of explanation as an interface between humans and a decision maker that is, at the same time, both an accurate proxy of the decision maker and comprehensible to humans [17] .", "Given its di\ufb03cult quanti\ufb01cation, comprehensibility is normally tied to the evaluation of the model complexity [17] ."]} +{"204824113|17779926": ["Automatic-Rule Extraction [217, 251, 252, 253, 254, 255, 256, 319, 320, 321]"]} +{"211258996|212747830": []} +{"40100965|17485266": ["For context, the regular stochastic gradient descent (SGD) update of a model\u2019s parameters \u03b8 at time step t looks like the following (Ruder, 2016):"]} +{"119308351|3519414": ["Machine learning techniques leverage structured features in ehr data, such as lab results and electrocardiography measurements, to uncover patterns and improve predictions (Shickel et al., 2018; Xiao et al., 2018a; Yu et al., 2018)."]} +{"52055130|393948": ["\u2026(Gretton et al., 2012), independent (Hyv \u00a8 arinen & Oja, 2000; Hinton, 2002; Dinh et al., 2014; Brakel & Bengio, 2017), disentangled (Schmidhuber, 1992; Rifai et al., 2012; Bengio et al., 2013; Chen et al., 2018; Gonzalez-Garcia et al., 2018), or independently controllable (Thomas et al., 2017).", "Usefulness of a representation is not just a matter of information content: representational characteristics like independence also play an important role (Gretton et al., 2012; Hyv\u00a8arinen & Oja, 2000; Hinton, 2002; Schmidhuber, 1992; Bengio et al., 2013; Thomas et al., 2017)."]} diff --git a/edge/graph_212747977.jsonl b/edge/graph_212747977.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53a136cba6b188927ffb50fc5b000d717624ca59 --- /dev/null +++ b/edge/graph_212747977.jsonl @@ -0,0 +1,2 @@ +{"121417024|2457428": []} +{"119531776|198360918": []} diff --git a/edge/graph_212751868.jsonl b/edge/graph_212751868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f14bad3e004d2874028b8af7cc56f54a8bed6f66 --- /dev/null +++ b/edge/graph_212751868.jsonl @@ -0,0 +1,16 @@ +{"22688707|1230643": []} +{"11242390|1230643": ["Now, with the advent of meshed systems and enabling of networking technologies such as multi-hop link networks, coverage over large area has been made possible [12], [13]."]} +{"114408765|33867211": []} +{"202092178|29060869": []} +{"202092178|121289": []} +{"202092178|18037424": []} +{"51876142|12060835": ["lem of energy-constrained devices such as wireless sensor nodes [2]."]} +{"18306152|7988320": []} +{"18306152|7085121": []} +{"18306152|562065": []} +{"18306152|15300368": []} +{"18306152|1503157": ["This issue can be addressed by integrating RFID with WSN as WSN provides longer reading range as well as other benefits like different network topologies and flexibility, variety of sensors that are already implemented and low power consumption [31]."]} +{"18306152|1236072": ["techniques [7, 13, 14], MAC protocols [15\u201317], congestion control [18, 19], data col-"]} +{"24095010|121289": ["In broad terms, the concept is to use new technologies to create a de-centralised grid structure with bidirectional electrical energy flows within the network to match generation to demand on a localized basis [1]."]} +{"1604544|485843": []} +{"1604544|12060835": ["Magnetic field (M-field) energy harvesting, in particular, is based on coupling the outward field flow of AC current carrying conductors by clamping the field source with a current transformer [7], [10], [12].", "With the unprecedented growth in the number of wireless devices, Radio Frequency (RF) EH has received significant attention in recent years [7], [8]."]} diff --git a/edge/graph_2128503.jsonl b/edge/graph_2128503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2128658.jsonl b/edge/graph_2128658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_213004721.jsonl b/edge/graph_213004721.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ab7deabc68c6737ecab8631bb8a0891e5934ac7 --- /dev/null +++ b/edge/graph_213004721.jsonl @@ -0,0 +1,6 @@ +{"208526865|10175374": ["Since deep learning models naturally yield to multi-task formulations due to their layered structure (Ruder, 2017), it should be possible to study federated deep multi-task learning setups that generalize assumptions in Smith et al. (2017)."]} +{"211296702|213004721": []} +{"209202606|54448042": ["A review of some homomorphic encryption software libraries along with brief explanations of criteria/features to be considered in choosing a library is surveyed in [345]."]} +{"209202606|11311635": ["If one considers each client\u2019s local problem (the learning problem on the local dataset) as a separate task (rather than as a shard of a single partitioned dataset), then techniques from multi-task learning [433] immediately become relevant."]} +{"3586416|20905429": ["Examples of potential applications include: learning sentiment, semantic location, or activities of mobile phone users; predicting health events like low blood sugar or heart attack risk from wearable devices; or detecting burglaries within smart homes [3, 37, 40]."]} +{"211296700|31245252": [", in the smart edge gateway at home for smart home applications) without uploading the data to the remote cloud [7]."]} diff --git a/edge/graph_2131792.jsonl b/edge/graph_2131792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_213346145.jsonl b/edge/graph_213346145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..062290369f42059d27bd1f4d15f05f47d8527d49 --- /dev/null +++ b/edge/graph_213346145.jsonl @@ -0,0 +1,7 @@ +{"52988022|206603045": ["Although, DNNbased methods have substantially advanced the state-of-the-art performance by leveraging large training data and increasing computing resources [3], there are some constraints when such advanced program or models are applied in practice.", "Recently, supervised speech separation has substantially advanced the state-of-the-art performance by leveraging large training data and increasing computing resources, and Deep Neural Network (DNN) based separation methods are the most practical ones [3]."]} +{"7666160|3488022": ["Methods based on deep learning have obtained state-of-the-art results in many different remote sensing applications, such as image classification [15], oil spill [17], poverty mapping [18], and urban planning [19]."]} +{"7666160|62701834": []} +{"131771552|3273340": ["To read the non-zero weights from a speci\ufb01c column, e.g., column 1 (assuming indexing starts from 0), the PE \ufb01rst reads address[1] and address[2] from the address vector in the CSC compressed weights, which gives the inclusive lower bound and non-inclusive upper bound of the addresses, i.e., 2 and\u2026", "In addition, there has been an increasing effort to reduce the computational complexity of DNNs, particularly for those targeted at mobile devices [2]."]} +{"206592484|456491": []} +{"9816947|207060556": ["As stated in [33], existing face detection models can be roughly grouped into three categories, in which models are based on boosting, Deformable Part Model (DPM) [6] and Convolutional Neural Network (CNN) [16], respectively."]} +{"53475807|52005096": ["shown in Figure 1. %LQDUL]DWLRQ 8 U+ C )RUZDUG 3M %DFNZDUG 3DUDPHWHU 8SGDWHV 8 U 3#TAB#M 8 3M Figure 1: Binary training, where arrows indicate operands \ufb02owing into operation or block. Reproduced from Guo (2018) (left). A convolutional layer depicting weight histogram progression during the popular binary training. The initial weight distribution is a standard Gaussian (right). 3.2 IMPROVED TRAINING METHOD O"]} diff --git a/edge/graph_21338552.jsonl b/edge/graph_21338552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21338719.jsonl b/edge/graph_21338719.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2134031.jsonl b/edge/graph_2134031.jsonl similarity index 100% rename from graph_2134031.jsonl rename to edge/graph_2134031.jsonl diff --git a/edge/graph_2134574.jsonl b/edge/graph_2134574.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_213462225.jsonl b/edge/graph_213462225.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_213485852.jsonl b/edge/graph_213485852.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e83a038b0a47b3490b1f4934f5eede3796c84172 --- /dev/null +++ b/edge/graph_213485852.jsonl @@ -0,0 +1,54 @@ +{"36867983|1400872": ["(1995). Gradient calculations for dynamic recurrent neural networks: A survey. IEEE Zhnsactions on Neural Networks, 6(5), 1212-1228. Plaut, D. C., Nowlan, S. J., & Hinton, G. E. (1986). Experiments on learning back propagation.", "(1995). Gradient calculations for dynamic recurrent neural networks: A survey. IEEE Zhnsactions on Neural Networks, 6(5), 1212-1228. Plaut, D. C., Nowlan, S. J., & Hinton, G. E. (1986). Experiments on learning back propagation. Tech. rep. CMUCS-86-126, Carnegie-Mellon University, Pittsburgh, PA. Rodriguez, P., & Wiles, J. (1998). Recurrent neural networks can learn to implement symbol-sensitive counting. In Advances in Neural Information Processing Systems, Vol. 10, pp. 87-93. The MIT Press. Tsung, F.-S., & Cottrell, G. W. (1995). Phase-space learning. In Advances in Neural Information Processing Systems, Vol. 7, pp. 481-488. The MIT Press. Wiles, J., & Elman, J. (1995). Learning to count without a counter: A case study of dynamics and activation landscapes in recurrent networks. In In Proceedings of the Seventeenth Annual Conference of the Cognitive Science Society, pp. pages 482 - 487 Cambridge, MA. MIT Press. Williams, R. J., & Zipser, D. (1989). A learning algorithm for continually running fully recurrent net works.", "(1995). Gradient calculations for dynamic recurrent neural networks: A survey. IEEE Zhnsactions on Neural Networks, 6(5), 1212-1228. Plaut, D. C., Nowlan, S. J., & Hinton, G. E. (1986). Experiments on learning back propagation. Tech. rep. CMUCS-86-126, Carnegie-Mellon University, Pittsburgh, PA. Rodriguez, P., & Wiles, J. (1998). Recurrent neural networks can learn to implement symbol-sensitive counting.", "(1995). Gradient calculations for dynamic recurrent neural networks: A survey.", "(1995). Gradient calculations for dynamic recurrent neural networks: A survey. IEEE Zhnsactions on Neural Networks, 6(5), 1212-1228. Plaut, D. C., Nowlan, S. J., & Hinton, G. E. (1986). Experiments on learning back propagation. Tech. rep. CMUCS-86-126, Carnegie-Mellon University, Pittsburgh, PA. Rodriguez, P., & Wiles, J. (1998). Recurrent neural networks can learn to implement symbol-sensitive counting. In Advances in Neural Information Processing Systems, Vol. 10, pp. 87-93. The MIT Press. Tsung, F.-S., & Cottrell, G. W. (1995). Phase-space learning. In Advances in Neural Information Processing Systems, Vol. 7, pp. 481-488. The MIT Press. Wiles, J., & Elman, J. (1995). Learning to count without a counter: A case study of dynamics and activation landscapes in recurrent networks."]} +{"207940065|201666566": [", IBM\u2019s AI Fairness 360 [6], Google\u2019s ML-FairnessGym [9]) and academic communities [29, 36, 39].", "Definitions of fairness in existing work fall into two categories [29]: 1) individual fairness, i."]} +{"207940065|56517517": ["A comprehensive description of existing approaches for GNNs and their applications can be found in [66, 72, 73]."]} +{"207940065|54559476": ["A comprehensive description of existing approaches for GNNs and their applications can be found in [66, 72, 73]."]} +{"207940065|53211000": []} +{"207940065|52965836": []} +{"207940065|3342225": []} +{"207940065|22753124": ["\u2026(WhatsApp for Business) initiative (ID01)- 40,000 trade associations and 80 million traders across India [were trained] ... to provide digital and skill train-ingto equipbusinesses withessential knowledge to help digitizetheirstorefronts andbuildtheir\u2018digitaldukaan\u2019 on the WhatsApp Business\u2026"]} +{"207940065|7844555": ["Techniques that compare two similar executions to produce various results already exist [21].", "However, in some instances, developers have access to an interesting source of information to help them: a previous version of the software not exhibiting the bug [21]."]} +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"53304118|9928823": []} +{"53304118|393948": []} +{"206592484|456491": []} +{"28679427|393948": ["For one-hot encoded features, LR(\u03b8;xij) measures the cross-entropy between two independent multivariate Bernoulli distributions, with mean x and mean x\u0302 respectively [Bengio et al., 2013b].", "In the case of linear autoencoders, the latent space representation is similar to the one learned by Principal Component Analysis (PCA) [Bengio et al., 2013a]."]} +{"5560643|393948": []} +{"7201816|393948": ["Regularized auto-encoders (see Bengio et al. (2012b) for a review and a longer exposition) capture the structure of the training distribution thanks to the productive opposition between reconstruction error and a regularizer.", "In preliminary work (Bengio et al., 2012a), we studied how the optimal reconstruction could possibly estimate so-called local moments.", "In particular, Rifai et al. (2012); Bengio et al. (2012a) argue that the \ufb01rst and second derivatives tell us in which directions it makes sense to randomly move while preserving or increasing the density, which may be used to justify sampling procedures.", "This motivates us here to study so-called local moments as captured by the auto-encoder, and in particular the local mean, following the de\ufb01nitions introduced in Bengio et al. (2012a)."]} +{"52901134|3536399": []} +{"52901134|10869869": ["[42] provided a comprehensive survey of prior works by categorizing the attacks under four overlapping classes."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"37606221|393948": ["An improvement over traditional machine learning models, the new one can successfully model complex real-world data by extracting robust features that capture the relevant information [9] and achieve even better performance than before [10]."]} +{"13662360|17485266": ["tion is minimizing the whole loss function which is \ufb01nding: L(X I;y; ;P) = argmin L AE(X I;X C) + L F(x;y; ;P) (11) For learning the parameters, the optimization function we chose here is the RMSProp(Ruder, 2016), which is a mini-batch version of RProp, and RProp is equivalent to using the gradient but also dividing by the size of the gradient, the parameters are updating by: g t = rL( t1;B;P) (12) G t = G t ", "\u2026function is minimizing the whole loss function which is \ufb01nding: For learning the parameters, the optimization function we chose here is the RMSProp(Ruder, 2016), which is a mini-batch version of RProp, and RProp is equivalent to using the gradient but also dividing by the size of the gradient,\u2026", "Then our \ufb01nal optimal function is minimizing the whole loss function which is \ufb01nding: For learning the parameters, the optimization function we chose here is the RMSProp(Ruder, 2016), which is a mini-batch version of RProp, and RProp is equivalent to using the gradient but also dividing by the size of the gradient, the parameters are updating by: where g t is the gradient, the \u03b7 and (cid:15) are learning rates, and B is a random subset of training data set."]} +{"2088679|393948": []} +{"12485056|393948": []} +{"3126100|18503837": []} +{"3126100|393948": ["Representation learning aims to achieve that a reasonably sized learned representation can capture a huge number of possible input configurations, which can greatly facilitate improvements in both computational efficiency and statistical efficiency [25].", "Fortunately, representation learning [25, 26], a promising solution to learn the meaningful and useful representations of the data that make it easier to extract useful information when building classifiers or other predictors, has been presented and achieved impressive performance on many dimensionality reduction tasks [27]."]} +{"67282358|393948": []} +{"55807666|393948": ["The multiple computation layers structure increases the feature abstraction capability of the network, which makes them more ef\ufb01cient in learning complex non-linear patterns [32]."]} +{"49651286|4895965": ["The traditional Quantum-behaved Particle Swarm Optimization (QPSO) algorithms [1-3] (both Types I and II) extend the classical Newtonian dynamics of agent propagation in the canonical Particle Swarm Optimization (PSO) [4-5] [13] to a quantum framework."]} +{"60441402|4895965": ["Prediction of remaining useful lives using quantum particle swarm optimization [14] [15] of lithium-ion battery has been discussed in [16] and a host of recent swarm intelligence algorithms [17] can be effectively applied in prediction of RUL of various devices in conjuction with other ML approaches."]} +{"59528925|393948": []} +{"52898779|5246835": []} +{"11392154|393948": []} +{"4151628|16897832": ["[66] survey different evolutionary approaches to feature selection."]} +{"1740355|1708582": []} +{"1740355|14843594": ["Bayesian optimization has also been used (Shahriari et al., 2016) for automatic selection of network architectures (Bergstra et al., 2013; Domhan et al., 2015) and hyperparameters (Snoek et al., 2012; Swersky et al., 2013)."]} +{"1387897|18188725": ["Many of these architectures and applications of deep learning to machine health monitoring have been surveyed in [48]."]} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"195675160|393948": ["As an alternative to such predefined feature sets, representation learning or feature learning methods [1] learn a high-level representation directly from the training data."]} +{"52983066|4795312": ["Recent developments in this image-to-image reconstruction are summarized in [103]."]} +{"52983066|2088679": ["In this introduction, we are not able to highlight all developments, because this would go well beyond the scope of this document, and there are other sources that are more suited for this purpose [31,37,12].", "[12], as they did the incredible effort to review more than 300 papers in their article."]} +{"52983066|393948": ["In the literature, many arguments are found why a deep structure has benefits for feature representation, including the argument that by recombination of the weights along the different paths through the network, features may be re-used exponentially [31].", "In this introduction, we are not able to highlight all developments, because this would go well beyond the scope of this document, and there are other sources that are more suited for this purpose [31,37,12]."]} +{"53234442|4895965": ["The proposed paradigm is well-suited for application in single-objective unimodal/multimodal optimization problems such as those discussed in [8,13-14,30] along the lines of digital filtering, fuzzy-clustering, scheduling, routing etc.", "The interested reader may look at [8-11] for detailed operating conditions, possible applications and troubleshooting of issues when working with the PSO algorithm.", "3 according to equation (24) as an LTV weight [8]."]} +{"53234442|8008208": ["The interested reader may look at [8-11] for detailed operating conditions, possible applications and troubleshooting of issues when working with the PSO algorithm."]} +{"18360974|8601873": ["In terms of \ufb01nding common semantic features within a set of images having the same class label, this can be interpreted as a varient of multiple instance learning (MIL) [1, 15, 5]."]} +{"1044293|393948": ["An even more radically different solution to the problem of avoiding explicit latent variables was recently introduced in Bengio et al. (2013c) and Bengio and Thibodeau-Laufer (2013).", "They are hurt by the problem of mode mixing, discussed at greater length in Bengio et al. (2013b), and summarized here.", "The hypothesis proposed (Bengio et al., 2013b) to explain this observation is that unsupervised representation learning procedures (such as for the RBM and contractive or denoising auto-encoders) tend to discover a representation whose distribution has more entropy (the distribution of vectors in\u2026", "Instead, they are based on the construction of a direct parametrization of an encoding function which immediately maps an input x to its representation f(x), and they are motivated by geometrical considerations in the spirit of manifold learning algorithms (Bengio et al., 2013d).", "An interesting observation (Bengio et al., 2013b) which could turn out to be helpful is that after we train a deep model such as a DBN or a stack of regularized auto-encoders, we can observe that mixing between modes is much easier at higher levels of the hierarchy (e.g. in the top-level RBM or\u2026", "\u2026result was only valid for asymptotically small Gaussian corruption noise, squared reconstruction error, and continuous inputs, the result from Bengio et al. (2013c) is applicable for any type of input, any form of reconstruction loss (so long as it is a negative log-likelihood), any form of\u2026", "Although the result from Alain and Bengio (2013) suggests that when the amount of injected noise is small, a unimodal distribution is sufficient, it is convenient to accomodate large amounts of injected noise to make training more efficient, as discussed by Bengio et al. (2013c).", "As explained in Bengio et al. (2013d), the tug-of-war between minimization of reconstruction error and the regularizer means that the intermediate representation must mostly capture the variations necessary to distinguish training examples, i.e., the directions of variations on the manifold (a\u2026", "Furthermore many pieces of evidence in the results of experiments on deep learning suggest that training deep networks (including recurrent networks) involves a difficult optimization (Bengio, 2013b; Gulcehre and Bengio, 2013; Bengio et al., 2013a).", "See (Bengio, 2009; Bengio et al., 2013d) for reviews and Bengio (2013c) and the other chapters of the book by Montavon and Muller (2012) for practical guidelines.", "See section 3 of Bengio et al. (2013d) for a review of representation learning procedures based on directed or undirected graphical models.4 Section 2.5 describes sparse coding in more detail.", "A general strategy was outlined in Bengio et al. (2013d) to enhance the discovery of representations which disentangle the underlying and unknown factors of variation: it relies on exploiting priors about these factors.", "Another encouraging observation (already mentioned in the section on mixing) is that deeper representations were empirically found to be more amenable to quickly mixing between modes (Bengio et al., 2013b).", "See Bengio et al. (2013d) for a brief overview in the context of deep learning, along with connections to other unsupervised representation learning algorithms."]} +{"57362815|393948": ["A varying number of layers can provide a different level of abstraction to improve the learning ability and task performance [1]."]} diff --git a/graph_2135510.jsonl b/edge/graph_2135510.jsonl similarity index 100% rename from graph_2135510.jsonl rename to edge/graph_2135510.jsonl diff --git a/graph_2135552.jsonl b/edge/graph_2135552.jsonl similarity index 100% rename from graph_2135552.jsonl rename to edge/graph_2135552.jsonl diff --git a/edge/graph_213581413.jsonl b/edge/graph_213581413.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21362469.jsonl b/edge/graph_21362469.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_213628657.jsonl b/edge/graph_213628657.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2930979b7bd95f3a5e43414e782d96cb93e63e0 --- /dev/null +++ b/edge/graph_213628657.jsonl @@ -0,0 +1,4 @@ +{"206267260|10290908": []} +{"16068650|10290908": ["For feature extraction, several methods, such as Wavelet Transform (WT) [3] and Principal Component Analysis (PCA) [4] [5], have been used.", "The benchmark feature extraction method in spike sorting is PCA [4] [5]."]} +{"58864773|10290908": ["The cluster method usually involves three steps [5].", "A cluster method [2, 5-12] is a popular spike sorting method, which works better in the case of multi-neuron spikes collected by multiple electrodes.", "Third, cluster the extracted eigenvalues via some clustering method, such as k-means [5], superparamag-netic clustering (SPC) [2] and other hybrid cluster method [8]."]} +{"25883211|6116761": []} diff --git a/edge/graph_213753259.jsonl b/edge/graph_213753259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee6d20f69627882a0eb8e879dc967857fad0296e --- /dev/null +++ b/edge/graph_213753259.jsonl @@ -0,0 +1,9 @@ +{"4753950|12454277": []} +{"55383394|10175374": []} +{"197560796|10175374": []} +{"125220632|10175374": []} +{"127510404|7487572": []} +{"129917576|192934": []} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} +{"51878174|7062181": []} +{"51878174|2910221": []} diff --git a/edge/graph_21385416.jsonl b/edge/graph_21385416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48500957d20b53dc16b7d9a37191867793abd357 --- /dev/null +++ b/edge/graph_21385416.jsonl @@ -0,0 +1 @@ +{"18264477|8397295": ["Timed extensions of some process algebras have been proposed [9, 10, 11, 12] but these make a distinction between time progressing and computation progressing."]} diff --git a/edge/graph_21386407.jsonl b/edge/graph_21386407.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d9ca31d205d995f94175fe073765d12db5547f8 --- /dev/null +++ b/edge/graph_21386407.jsonl @@ -0,0 +1,5 @@ +{"119802406|60455": []} +{"15572115|4967411": []} +{"6338061|4967411": ["CWW has been applied successfully to hierarchical and distributed decision making [8], [22], Perceptual Reasoning and Perceptual Computing [21], [23], [40], and decision support [9], [15]."]} +{"30665258|4967411": ["Virtual linguistic terms have no practical meaning; their main role is ranking the alternatives [29]."]} +{"11174611|4967411": []} diff --git a/edge/graph_21386749.jsonl b/edge/graph_21386749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1168f994678a8137e9bba912f21d5d254b9f6760 --- /dev/null +++ b/edge/graph_21386749.jsonl @@ -0,0 +1,10 @@ +{"15398271|6332923": ["They are key targets for m-Health system security in our architecture.", "Being mobile and using open network environments, data collection and transfer must be kept private as well as strict secure access must be applied [10], [5]."]} +{"17369195|18717047": ["It is can be flexible for resource representation [20], and for ubiquitous service application with wireless communication [21]."]} +{"5624458|28609200": []} +{"12239912|7988320": []} +{"12239912|16514036": []} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"9498710|1503157": ["This is a challenging work due to the scattered pattern of existing research on IoT technologies and devices (WHO 2011, Ruiz-Garcia et al. 2009, 2011, Lee et al. 2010, Alemdar and Ersoy 2010).", "But many reviews (WHO 2011, Ruiz-Garcia et al. 2009, 2011, Lee et al. 2010, Alemdar and Ersoy 2010), as well as our investigation, have indicated the scattered pattern of the existing research."]} +{"9498710|1230643": ["Akyildiz et al. (2002) and Yick et al. (2008) have thoroughly reviewed the architectures, applications, protocols and challenges.", "Akyildiz et al. (2002) and Yick et al."]} +{"3307807|16081379": ["Many projects are developed or in developing stage[8]."]} +{"15397013|1113420": []} diff --git a/edge/graph_213867523.jsonl b/edge/graph_213867523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc4341c9511b47e8e99d2541e9b353ea12727e74 --- /dev/null +++ b/edge/graph_213867523.jsonl @@ -0,0 +1,15 @@ +{"108580304|121289": []} +{"108580304|18037424": []} +{"485843|4631990": ["The fundamental task of the HEM system is energy efficiency [11], data measurement, and transmission."]} +{"485843|6959212": ["From a slightly different perspective, a \u201csmart grid\u201d can be considered as a data communication network that achieves, with the support of specific power management hardware devices, flexible, seamless inter-operation abilities among different advanced components of the system for efficient utilization of the energy [12]."]} +{"485843|121289": ["values for power system control signals should not exceed 15 ms [44].", "TABLE I REQUIREMENTS OF SG APPLICATIONS [44], [60]"]} +{"112121583|14240886": []} +{"112121583|18037424": []} +{"390409|535786": []} +{"390409|2398835": ["The phenomenon of big data has long been characterized by volume, velocity, and a variety of data types that have been created at everincreasing rates (Khan et al., 2014)."]} +{"53280697|8854215": ["Advanced metering architecture (AMI) of microgrids and smart grids connect all the smart meters in the network as well as data storage and analyzing facilities [17], [28].", "It can be noted that for many attack types, attackers do not need detailed information about the target system, and can launch attacks resulting in serious blackouts, based on only publicly available data [17], [38].", "leading to unstable voltage and frequency, cascading failures, and malicious use of energy storage systems for destabilization [17], [24]\u2013[26].", "Being cyber-physical establishments, microgrids and smart grids come with all the security and vulnerability concerns of such systems [17], which is discussed in detail in section II.", "Smart meters on the other hand, are only equipped with basic security features because of hardware and cost constraints [17].", "of substations [17].", "AGCs can also be attacked by inserting false frequency deviation data, leading to load shedding [17].", "Automated generation control systems (AGC) can fall victim to Aurora attacks \u2013 which manipulate the opening and closing of circuit breakers is a way that the generators under attack become desynchronized and can even be damaged and destroyed as a result [17]."]} +{"20034184|6959212": ["The smart grid communication systems must be robust enough to accommodate new media, as they emerge from the communication industries, while preserving interoperable and secured systems [ 3 ].", "Real-time pricing capability of WAMR systems can also be beneficial to the customers by shifting their loads during off-peak times [ 17 ].", "NIST has recognized IEC 61850 standard for substation automation and protection applications in smart grid environment [ 3 ].", "ESI can be a local controller or customer\u2019s EMS [ 3 ].", "[1], [2]. According to [ 3 ], the term \u201cSmart Grid\u201d refers to a modernization of the electricity delivery system so it monitors, protects and automatically optimizes the operation of its interconnected elements \u2013 from the central and distributed generator through the high-voltage transmission network and the distribution system, to industrial users and building automation systems, to energy storage installations and to end-use consumers and ...", "Several activities are going on to address this communication infrastructure related challenges [ 3 ].", "In the recent report on National Institute of Standard and Technology (NIST) framework and roadmap for smart grid interoperability standards [ 3 ], several wired and wireless communication technologies are identified for smart grid.", "Using the conceptual model of smart grid proposed in [ 3 ], the smart grid framework of information exchange among the communication domains (represented as clouds) has been illustrated in Fig. 1. The lower layer domains related to electric power system are generation domain; transmission domain presented as regional Control Center (CC) and"]} +{"110932092|485843": []} +{"110932092|5747564": []} +{"110932092|121289": []} +{"29782204|17381415": ["The connection of DGs to the utility network can lead to grid instability or even failure if these systems are not properly controlled [9], [10]."]} diff --git a/edge/graph_21389228.jsonl b/edge/graph_21389228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ac4b83bf8a0f09cb230d11a638d0ab643ed37e0 --- /dev/null +++ b/edge/graph_21389228.jsonl @@ -0,0 +1,21 @@ +{"40929937|8909218": []} +{"8350993|8909218": ["Recent studies show that more than 50% of all voice calls and more than 70% of the data traffic originate indoors [2]."]} +{"32066597|11720829": ["Recent researches have shown that dramatic capacity gains can be achieved by the use of multiple antennas for point-to-point communication [4]-[6]."]} +{"17078053|12884178": ["It is suspected that the main cause of these deficiencies is the limited number of fixed relays that can be deployed in practice and the difficulty of optimizing their locations [12].", "In contrast with the fixed relays proposed in LTE-A, terminal relays are typically battery operated with limited processing and transmission capabilities [12]."]} +{"12828630|8909218": ["Therefore, home eNBs have recently reemerged as a promising technology component and many believe it will definitely be one of the next steps in the evolutionary path of cellular wireless systems [3], [4]."]} +{"37626213|12884178": ["While in [9], the authors considered both Type-I and Type-II multi-relay system with flexible relay locations, and also proposed an optimal algorithm.", "Distance between the source and the centre of relays [m] B a n d w id th e ff c ie n c y [ b p s /H z ] Asymmetric RA Symmetric RA [9]", ", TSR = TRD = T/2 in [9], the optimal power allocation results have a similar form to (14) and (15), except that (1\u2212 \u03bbk)(2)/2 and (1 + \u03bbk) (2)/2 in (14), (15), (18) and (19), are replaced with (1 \u2212 \u03bbk) and (1 + \u03bbk), respectively.", "Simulation results show that, the proposed asymmetric RA scheme significantly outperforms the symmetric RA scheme [9] when the centre of relays is not in the middle between source and destination.", "Second, an optimal algorithm is proposed to perform joint asymmetric time allocation, power allocation, and subcarrier selection/allocation, which requires a similar complexity to the symmetric RA scheme in [9], but with improved performance.", "The asymmetric RA scheme outperforms the symmetric RA scheme in [9], especially when the relays\u2019 centre is not in the middle between the source and the destination, while requiring a similar complexity to symmetric 100 150 200 250 300 350 400 450 500 0.", "\u2018Asymmetric RA\u2019 denotes the proposed algorithm in this paper, while \u2018Symmetric RA\u2019 denotes the algorithm in [9]."]} +{"2720694|8909218": []} +{"12657421|8909218": ["However, this technology is still under development and there are numerous problems needed to be investigated such as access control, timing and synchronization, and interference coordination [3]."]} +{"16274035|8909218": ["It has been analyzed in the literature that deploying femtocells in such environments can attain substantial improvements both technically and financially [3], [4]."]} +{"16066837|10658846": ["However, as wireless clients become increasingly mobile, the focus of recent efforts tends to shift toward energy consumption at all layers of communication systems [5], from architectures [6] to algorithms [19]."]} +{"23119833|11720829": []} +{"11763133|8909218": ["In [1] the authors identified the key benefits of femtocells, the technological, business challenges and research opportunities."]} +{"15293181|5621151": ["Therein, some TV channels are never occupied in a given geographic area so as to reduce the interference to co-channel or adjacent channel stations [3]."]} +{"27984410|18148591": []} +{"18392084|14028362": []} +{"18392084|8909218": ["(UE) to the cellular core network through subscribers broadband internet access [4], [11].", "provide high speed communication to end users [4].", "industrial critics see significant potential for the use of technology, so called femtocells [2], [4], [11], [19]\u2013[21].", "the cellular functionalities to the end users [2], [4], [11]."]} +{"16463095|8909218": ["Also, this new palette of low-power \u2018miniature\u2019 BSs requires little or no upfront planning and lease costs, therefore drastically reducing the Operational (OPEX) and Capital (CAPEX) Expenditures of networks [3]."]} +{"38032903|8909218": ["However, with the rapid growing demand for data services, it is increasingly difficult to support the required data capacity through traditional cell-splitting which requires deployment of additional macro eNodeBs (MeNBs) [2]."]} +{"25551701|12884178": ["The problem of routing has been addressed in many literatures, such as Distance-based routing, Path-loss based routing, or SINR (signal to interference/noise ratio)-based routing algorithm and throughput enhancement routing algorithm [6][7][8][9][10]."]} +{"1660091|8909218": []} +{"26842694|8909218": ["Dense deployment of low-power base stations offers several potential benefits to operators as well as end-users, such as capacity offload of the macro-cellular network and improved indoor broadband wireless services [2], [3]."]} diff --git a/edge/graph_214172669.jsonl b/edge/graph_214172669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c3de9fb725d50d7be203f9925090056b429e981 --- /dev/null +++ b/edge/graph_214172669.jsonl @@ -0,0 +1,49 @@ +{"18089407|12083425": ["in order to avoid an unexpected frequency and voltage fluctuations [6-8]."]} +{"52157149|19353761": ["the author\u2019s previous work on the security of IoT protocols [5] by adding a higher-level, industrial-use specification that allows for industry 4."]} +{"117220636|31245252": []} +{"117220636|3390598": []} +{"12537501|8440916": ["A comparison based analysis is presented in [15] where several contemporary wireless standards have been reviewed."]} +{"12537501|29060869": ["[14] discussed the possibility to reduce operational costs by upgrading SG communication infrastructure to utilize energy efficient communication techniques."]} +{"12537501|485843": ["TABLE II LATENCY AND BANDWIDTH REQUIREMENT FOR DIFFERENT SG APPLICATIONS [8]", "Severe drawbacks are associated with the existing power grids [8], such as: (1) disjointed architectural configuration; (2) bandwidth limitations for bidirectional communication; (3) inter-operability issues between vendor based network components; and (4) inefficient", "Available survey journals [8-12] on SG cover a wide range of topics such as defining the SG communication network architecture, communication requirements, security issues and related standards.", "> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) \n5\nTABLE II LATENCY AND BANDWIDTH REQUIREMENT FOR DIFFERENT SG APPLICATIONS [8]\nApplication Bandwidth Latency Payload\n(bytes)\nReliability\nElectric Vehicles (V2G, EV\ncharging)\n9.6-56kbps 2s \u2013 5 min 255 >98%\nDemand Response 14-100kbps 500ms-1min 100 >99.5%\nMeter reading 10Kbps to\n128Kbps\n2-15s 200 >98%\nOverhead Transmission Line\nMonitoring\n9.6-56kbps 15-200 ms 25 >99.5%\nSubstation Automation 9.6-56kbps 15-200 ms 25 >99.5%\nOutage management 56kbps 2s 25 >98%\nDistribution automation\nPeriodical\n9.6-56kbps 25 _ 100 ms 150-200 >99.5%\nFig."]} +{"12537501|121289": ["Also, applications may require high bandwidth with flexible delay bounds, such as Advance Metering Infrastructure (AMI), EV Charging and Vehicle to Grid (V2G) power transfer [9].", "Available survey journals [8-12] on SG cover a wide range of topics such as defining the SG communication network architecture, communication requirements, security issues and related standards."]} +{"14741413|485843": []} +{"14741413|17381415": ["Taking advantage of the V2G capability and technology, the batteries on PHEVs can be used to boost DERs by feeding electricity back to the grid when they are parked.", "The authors in [87] apply the PSO approach to solve the problem of cooperative scheduling of pervasive DERs, due to its easy implementation and manageable computational time duration.", "Integrating the uncertain and intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46].", "\u2026intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46]."]} +{"14741413|12083425": ["\u2026intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46]."]} +{"14741413|8783262": ["As a popular existence of energy storage, PHEVs are emerging as a transportation alternative to reduce greenhouse gas emissions; however, the large electricity demand of widespread adoption of PHEVs will also pose significant challenges to the existing stable grid [60]\u2013 [64]."]} +{"52454156|3555631": ["Furthermore, it should be considered that some UEs could exploit U/C-plane splitting or DUDe mechanisms [93], [94] to improve their reliability and/or QoS."]} +{"52454156|2623404": ["For more details on SDN, please refer to [16], [21], [22], [23]."]} +{"52454156|10693567": ["From a network point of view, Software Defined Networking (SDN) is considered as the main realization of the softwarization concept [18]."]} +{"52454156|4269723": ["For more details on SDN, please refer to [16], [21], [22], [23].", "SDN introduces the possibility of decoupling network control from forwarding functions by thus allowing flexibility and reconfigurability of the physical network [21]."]} +{"52454156|25929315": ["[12], [13], the next-to-come generation of mobile networks has to face with applications with heterogeneous characteristics and Quality of Service (QoS) requirements."]} +{"69286716|2521001": []} +{"69286716|121289": []} +{"115679086|1353379": []} +{"115679086|15888893": []} +{"115679086|10440280": []} +{"67043125|25891793": []} +{"67043125|19938676": []} +{"67043125|7278743": []} +{"7193801|24110634": ["SDN has been applied to data centers [11], [12], WAN,Ahmed14commag, enterprises [14], [15], optical networks [16], wireless networks [17], wireless sensor networks [18], and under water sensor networks (UWSN) [19].", "wireless networks [17], wireless sensor networks [18], and under water sensor networks (UWSN) [19]."]} +{"7193801|34643772": ["Security issues for SDN are discussed in [67]\u2013[69].", "Security and privacy issues for SDN are discussed in [67]\u2013[69], [179], while security and privacy related work for SG are surveyed in [46]\u2013[48]."]} +{"7193801|30102381": ["From the testbed perspective, though there are lot of testbeds available for evaluation of SDN [71] and SG [219], [220] alone but less efforts are done on integrating these components together."]} +{"7193801|8650651": ["SDN has been applied to data centers [11], [12], WAN,Ahmed14commag, enterprises [14], [15], optical networks [16], wireless networks [17], wireless sensor networks [18], and under water sensor networks (UWSN) [19].", "SDN has been applied to data centers [11], [12], wide area networks (WAN) [13], enterprises [14], [15], optical networks [16],"]} +{"7193801|11414835": ["A survey article on Hypervisors (which isolates the underlying physical SDN and its devices into virtual SDN network), has been presented in [70]."]} +{"7193801|10440280": ["Main Domain Sub-Topic Reference Publication Year [1] 2012 General Introduction of SG [25] 2012 [26] 2014 [37] 2017 [34] 2011 [32] 2013 [33] 2013 [27] 2012 Communication Aspects [28] 2013 [29] 2011 [30] 2014 [31] 2011 [35] 2013 [36] 2016 [38] 2016 Routing and Networking Issues [39] 2014 [40] 2014 Smart Grid [41] 2015 Demand Response [42] 2015 [43] 2014 Energy Efficiency [44] 2014 [45] 2015 [46] 2012 Security and Privacy [47] 2012 [48] 2014 [49] 2018 Load Balancing [50] 2014 Simulation to Support Power and Communication Network [51] 2014 Use of Wireless Sensor Networks in SG [52] 2015 [53] 2010 Stochastic Information Management [54] 2014 Context Awareness [55] 2015 SG NANs [56] 2014 [57] 2015 General Introdcution of SDN [58] 2016 [59] 2014 Fault Management [60] 2017 Traffic Engineering [61] 2017 Transport Network [62] 2017 Topology Discovery [63] 2017 Software Defined Networks Routing [64] 2018 Comparison of NFV and SDN [65] 2016 [66] 2017 Security [67] 2017 [68] 2016 Hypervisors [69] 2016 Testbed for SDN [70] 2017"]} +{"7193801|29060869": ["Studies on energy efficiency for SG have been surveyed in [44], [45], while security and privacy related work for SG are surveyed in [46]\u2013[50].", "detailed description of these ICT and infrastructure to support SG operation can be found in [45]."]} +{"7193801|2521001": ["Security and privacy issues for SDN are discussed in [67]\u2013[69], [179], while security and privacy related work for SG are surveyed in [46]\u2013[48]."]} +{"7193801|2623404": ["General discussion on SDN technology is presented in [58]\u2013[60].", "defined controllers led the network intelligence [60]."]} +{"7193801|485843": ["enhanced communication technologies are necessary [80]."]} +{"7193801|595093": ["Studies on energy efficiency for SG have been surveyed in [44], [45], while security and privacy related work for SG are surveyed in [46]\u2013[50].", "Security and privacy issues for SDN are discussed in [67]\u2013[69], [179], while security and privacy related work for SG are surveyed in [46]\u2013[48]."]} +{"7193801|5747564": ["Survey articles dealing with communication aspects of smart grid are presented in [25], [26], [28], [29], [33]\u2013[40].", "Different SG components follow different standards and protocols [26]\u2013[29] and SDN controller should be able to cope with all such diverse communication systems."]} +{"7193801|121289": ["Main Domain Sub-Topic Reference Publication Year [1] 2012 General Introduction of SG [25] 2012 [26] 2014 [37] 2017 [34] 2011 [32] 2013 [33] 2013 [27] 2012 Communication Aspects [28] 2013 [29] 2011 [30] 2014 [31] 2011 [35] 2013 [36] 2016 [38] 2016 Routing and Networking Issues [39] 2014 [40] 2014 Smart Grid [41] 2015 Demand Response [42] 2015 [43] 2014 Energy Efficiency [44] 2014 [45] 2015 [46] 2012 Security and Privacy [47] 2012 [48] 2014 [49] 2018 Load Balancing [50] 2014 Simulation to Support Power and Communication Network [51] 2014 Use of Wireless Sensor Networks in SG [52] 2015 [53] 2010 Stochastic Information Management [54] 2014 Context Awareness [55] 2015 SG NANs [56] 2014 [57] 2015 General Introdcution of SDN [58] 2016 [59] 2014 Fault Management [60] 2017 Traffic Engineering [61] 2017 Transport Network [62] 2017 Topology Discovery [63] 2017 Software Defined Networks Routing [64] 2018 Comparison of NFV and SDN [65] 2016 [66] 2017 Security [67] 2017 [68] 2016 Hypervisors [69] 2016 Testbed for SDN [70] 2017"]} +{"7193801|18037424": ["Survey articles dealing with communication aspects of SG are presented in [27]\u2013[38]."]} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"13471990|121289": ["Communication infrastructure manages in general three types of networks: Home Area Networks (HANs), Business Area Networks (BANs) and Neighborhood Area Networks (NANs) [5].", "This system manages and maintains electrical networks, because it has the ability to collect data from any system in order to control it, using several devices for example sensors, SCADA master and SCADA Remote Terminal Unit (RTU) [5]."]} +{"13471990|14240886": ["efficient power quality management, based on intelligent transmission and distribution, policies and pricing mechanisms for real-time power markets [3, 4]."]} +{"13223117|20905429": ["They are equipped with medical sensors that are capable of measuring different parameters such as the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels [35]."]} +{"485843|4631990": ["The fundamental task of the HEM system is energy efficiency [11], data measurement, and transmission."]} +{"485843|6959212": ["From a slightly different perspective, a \u201csmart grid\u201d can be considered as a data communication network that achieves, with the support of specific power management hardware devices, flexible, seamless inter-operation abilities among different advanced components of the system for efficient utilization of the energy [12]."]} +{"485843|121289": ["values for power system control signals should not exceed 15 ms [44].", "TABLE I REQUIREMENTS OF SG APPLICATIONS [44], [60]"]} +{"69400026|8854215": []} +{"69400026|23893450": []} diff --git a/graph_21418.jsonl b/edge/graph_21418.jsonl similarity index 100% rename from graph_21418.jsonl rename to edge/graph_21418.jsonl diff --git a/edge/graph_21423678.jsonl b/edge/graph_21423678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54ef420953f54484318df76964a762aa81a4d7a6 --- /dev/null +++ b/edge/graph_21423678.jsonl @@ -0,0 +1,2 @@ +{"6042116|627405": []} +{"515113|10604465": []} diff --git a/graph_2142482.jsonl b/edge/graph_2142482.jsonl similarity index 100% rename from graph_2142482.jsonl rename to edge/graph_2142482.jsonl diff --git a/graph_2142665.jsonl b/edge/graph_2142665.jsonl similarity index 100% rename from graph_2142665.jsonl rename to edge/graph_2142665.jsonl diff --git a/edge/graph_2144172.jsonl b/edge/graph_2144172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_214429.jsonl b/edge/graph_214429.jsonl similarity index 100% rename from graph_214429.jsonl rename to edge/graph_214429.jsonl diff --git a/edge/graph_214495360.jsonl b/edge/graph_214495360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_214537991.jsonl b/edge/graph_214537991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0eecd2e8ca374ac73e3282fa1ed7de950136699f --- /dev/null +++ b/edge/graph_214537991.jsonl @@ -0,0 +1,5 @@ +{"62545486|33208891": ["\u2026i.e. becoming sufficiently digitally literate to compete in a workplace that demands high-level technological skills, Cuban (2001) comments that there is no consensus on what digital literacy is (see Bawden [2001] for a review of concepts pertaining to information and digital literacies)."]} +{"46643649|7147372": ["In this context, research shows teachers' uptake of ICT to be related to available resources, rewards, and a supportive and collegial school culture (Agyei & Voogt, 2014; Mumtaz, 2000; Uluyol & Sahin, 2014).", "This need for TPD goes together with the professional uptake of ICT by teachers lagging behind requirements from everyday practice related to computer technologies (Mumtaz, 2000).", "Research in this context often emphasizes the importance of incentives and support, combined with a stimulating school culture (e.g. Mumtaz, 2000; Agyei & Voogt, 2014)."]} +{"35253012|60844751": []} +{"145098997|20528549": ["7\nTorgerson and Elbourne (2002)\n5 Cohen\u2019s d 0.37 0.16 0 0.0\nWaxman, Lin, and Michko (2003)\n42 Glass\u2019s \u0394 0.45 0.14 5 11.9\nYaakub (1998) 20 Glass\u2019s \u0394 and g\n0.35 0.05 4 20.0\nZhao (2003) 9 Hedges\u2019s g 1.12 0.26 1 11.1\na. Converted to Cohen\u2019s d.\nAPPEnDIx B (continued)"]} +{"14744633|6739283": ["As Liu, Han, and Li (2010) suggested, \" the adoption of mobile technology\u2026does not guarantee the adoption of mobile services \" (p. 212) and vice versa."]} diff --git a/edge/graph_21456752.jsonl b/edge/graph_21456752.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21459580.jsonl b/edge/graph_21459580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_214611728.jsonl b/edge/graph_214611728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c795cd05a5659d2d68483f73ab52ae92c09f1e8 --- /dev/null +++ b/edge/graph_214611728.jsonl @@ -0,0 +1,8 @@ +{"207852400|3342225": []} +{"49665203|393948": ["Similarly, [18] discusses invariance and manifold learning mainly in the context of auto-encoders, focusing primarily on X .", "For example, the hierarchical organization of explanatory factors discussed in [18] can lead to more abstract concepts at deeper layers.", "Both [18] and [19] have introduced an additional desired property of representations that they call disentanglement.", "Nevertheless, P1-P4 have similarities to the properties discussed in [18]."]} +{"49584497|15562587": ["\u20262016), mostly in terms of the properties and dynamics of the optimization problem in the space of weights (Saxe et al 2014, Choromanska et al 2015, Advani and Saxe 2017), or the classes of functions that can be efficiently represented by deep networks (Montufar et al 2014, Poggio et al 2017)."]} +{"155100374|53531807": ["Mutual information estimators are used in computational neuroscience (Palmer et al., 2015), Bayesian optimal experimental design (Ryan et al., 2016; Foster et al., 2018), understanding neural networks (Tishby et al., 2000; Tishby & Zaslavsky, 2015; Gabri\u00b4e et al., 2018), and more."]} +{"53250067|393948": ["For instance, see Bengio et al. (2013).", "A learned representation can signi\ufb01cantly affect the performance of deep networks, and the repre-sentation\u2019s distributed and deep natures are the essential elements for the success of deep learning (Bengio et al., 2013)."]} +{"84844485|1929234": ["Remember that the MB M of a target variable Y is the smallest subset of S such that Y is conditional independent of the rest of the variables S \u2212 M , i.e., Y \u22a5 ( S \u2212 M ) | M [55]."]} +{"5541663|393948": ["Their performance currently surpass most competitor algorithms and DL wins top machine learning competitions on real data challenges [1], [2], [3]."]} +{"52014299|393948": []} diff --git a/edge/graph_214612164.jsonl b/edge/graph_214612164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d9e54840ad13482155b661696769d743bc0cd88 --- /dev/null +++ b/edge/graph_214612164.jsonl @@ -0,0 +1,98 @@ +{"67865580|19938676": ["INTRODUCTION The main theme for fifth generation (5G) of cellular network pivots around co-existence of multiple radio access technologies [1], and cells with different sizes [2]."]} +{"61810401|1932843": ["This motivates us to design a reinforcement learning [32] based iterative algorithm, by simulating the exact content requested by an MU (action), and then observing the resultant reward or penalty."]} +{"52161537|8909218": []} +{"41850355|860072": ["A large number of technologies, including the system architecture [9], [10], [11], [12], signal processing methods at the physical layer [13], [14], [15], [16], novel seamless handover algorithms [17], [18], have been proposed to mitigate impacts due to the high mobility in the literature."]} +{"442109|206576720": ["Consequently, this gives rise to the consideration of 3D-MIMO [39] which might be used as a backhauling alternative in vertically densified net-"]} +{"442109|12206204": ["THE EVOLUTION of mobile devices and applications in the current decade have drawn a new picture for wireless networks [1]."]} +{"442109|12029139": ["ent scopes, specifically Heterogeneous Networks (HetNets), massive multiple-input multiple-output (massive-MIMO) networks, millimeter waves (mmWaves) networks, and energy harvesting networks [9]."]} +{"442109|1588237": ["In the frequency domain, interference mitigation is done through the use of orthogonal frequency channels, either by the static allocation of these orthogonal channels to different cells or by dynamic allocation [164]."]} +{"442109|7851743": ["Also, the transmission power of each node is small and the OAM functions are automated via self organizing network functionality (SON) [178]."]} +{"860072|12765832": ["Furthermore, emerging Internet Engineering Task Force (IETF) protocols for network mobility [22] can be deployed to manage TAT handoffs."]} +{"4502294|3555631": ["System information is broadcast over the anchor cell which also manages most of the radio resource control and signalling, while the small cells play an assistant role, having data offload as a main task [48]."]} +{"7064439|860072": ["One of the European HSR operators started in 2005 to offer Internet access to its customers [8]."]} +{"7064439|7482876": ["It is randomly time varying: its identifiability from the measurements, the statistical characterization, and the modeling is rather challenging [80], [81]."]} +{"7206819|8323234": ["A discussion on some other approaches to model mmWave MIMO channel can be found in [120].", "channels for system capacity analysis or precoder design [55], [103], [120]."]} +{"67866077|22833814": ["A relay-based network architecture for vehicular communication systems especially for high speed train has been widely investigated [11]\u2013[13].", "In [13], a mobile relay architecture was investigated in the aspects of high speed train channel modeling."]} +{"67866077|11498812": ["at the same time, thereby leading to network congestion and handover failure [2], [42].", "These 5G requirements are to be fulfilled in various deployment scenarios, among which vehicular communication scenarios for providing wireless connectivity to trains and cars have attracted great attentions from both research and industry communities [2], [3].", "First, by relaying signals through the onboard relay, it is possible to avoid severe signal penetration loss due to a metallic vehicle body, which can be up to 20-35 dB [2]."]} +{"19084734|34643772": []} +{"3485023|22833814": ["of up to 350 km/hr, 500 km/hr, or higher [26][24], for various subjects such as cooperative MRN [19][13], multiple-input multiple-output (MIMO) channel model [6], millimeter-wave beamforming [10], and distributed antenna systems [25]."]} +{"3485023|11498812": ["of up to 350 km/hr, 500 km/hr, or higher [26][24], for various subjects such as cooperative MRN [19][13], multiple-input multiple-output (MIMO) channel model [6], millimeter-wave beamforming [10], and distributed antenna systems [25]."]} +{"3485023|860072": ["To provide broadband Internet access in trains has been significant research topics [5], and a major one of which is vehicular communications systems for high speed trains (HSTs) at speeds"]} +{"51925769|19938676": ["The upcoming Fifth Generation (5G) of cellular technology is expected to boost network performance by supporting a number of new features including multi-layered network architecture [1], [2]."]} +{"3382645|61132": ["In [16], Gupta et al . discussed the key issues of routing and protocol in UAV-aided communications."]} +{"108399069|25686668": ["There are a number of papers investigating the HSR channel characteristics in different scenarios, including viaducts [13]\u2013 [15], tunnels [16], [17] and cuttings [18]\u2013[20]."]} +{"108399069|13367219": ["spread can be approximated to have a lognormal distribution [34].", "Motivated by the visibility region concept in the COST 259 and COST 2100 channel model for cellular communications [33][34], we define an active scatterer region to express the movement of scatterers with the motion of the train."]} +{"202181131|35260120": ["Moreover, due to the round-trip path loss of ambient carrier signals [19], ambient backscattering is only feasible for short-range communication.", "The reason is that ambient backscattering just passively reflects the incident signals from the ambient carrier emitters which are not controllable by the ambient backscatter transmitter [19]."]} +{"202181131|3504276": ["Therefore, it is considered to be an enabling technology to support machine-type communications (MTC) for Internet-ofThings (IoT) applications [6], [7], such as smart sensors and wearable devices [8]."]} +{"202181131|12029139": ["1, a time switching-based receiver architecture [14] is adopted to enable R to work in either energy harvesting, information decoding or transmission.", "Consequently, the relay may need to spend a long time to harvest and accumulate energy for the relaying operation [14]."]} +{"18781605|8909218": ["Femtocell has many advantages, such as improved coverage, low power, improved SINR (Signal-to-Interference-plusNoise Ratio) level, low cost, reduced infrastructure and capital cost, improved throughput, and etc.[1-5]\nNowadays, femtocell technology is considered to be deployed not only in fixed environments but also in the movable environments, such as buses, trains, subways, and etc., referred to as moving femtocell.", "Femtocell has many advantages, such as improved coverage, low power, improved SINR (Signal-to-Interference-plusNoise Ratio) level, low cost, reduced infrastructure and capital cost, improved throughput, and etc.[1-5]\nNowadays, femtocell technology is considered to be deployed not only in fixed\u2026"]} +{"1695768|16972183": ["Once the models agree, the system-level models can easily be scaled to hundreds of users, higher bandwidth and longer transmit durations with high likelihood to correctly resemble such behavior [10]."]} +{"7975452|7644489": ["D2D based PS has been extensively studied in recent years [6], [10], [11]."]} +{"86376691|25911553": []} +{"86376691|16412228": ["This can bring savings in OPEX, especially those related to energy [5], but does not alleviate the CAPEX due to cell deployment."]} +{"108354741|3649200": ["A different innovative approach can envision the geo-coordination of MoBSs, so that they collectively \u201clook like\u201d a single BS for terminals, possibly exploiting CoMP [19] , with the advantage of also reducing the handover rate."]} +{"108354741|4382139": ["\u2026desirable feature in networking, and some classes of networks have been based on adaptivity to the environment, in particular sensor networks [31,32] , ad-hoc networks [33] , delay tolerant networks [34] , and networking paradigms based on opportunistic communications, such as Floating Content\u2026"]} +{"108354741|4427557": ["The many emerging IoT applications are expected to either exploit speci\ufb01c technologies, like LORA [29] , or the narrowband version of 5G [30] ."]} +{"108354741|206576720": ["More innovative approaches are possible, such as the exploitation of the many MoBSs for cooperative transmission approaches derived from MIMO or CoMP [15,16] ."]} +{"108354741|16412228": ["This can bring savings in OPEX (operational expenditures), especially in relation to energy consumption [5] , but does not alleviate the CAPEX entailed by cell deployment."]} +{"108354741|3494096": ["The many emerging IoT applications are expected to either exploit speci\ufb01c technologies, like LORA [29] , or the narrowband version of 5G [30] ."]} +{"198168961|3330461": ["Examples of such use-cases include multimedia exchange between proximity users, broadcasting advertisements, and relaying information to the unconnected regions etc. [3]\u2013[5]."]} +{"198168961|7644489": ["\u2026on the presence of a network entity (base-station, etc) to assist in basic operations such as resource allocation [8], power-control [9], [10], and device synchronization [11], [12] etc. Mode-1 discovery mechanisms offer guaranteed time-to-discovery but at the same time are not fully autonomous."]} +{"16754344|3913780": ["However, most of requested data are related on some specific contents [3]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"57364820|8909218": []} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"22353733|6355516": ["The distribution of MRs is getting denser and more randomized with the urbanization due to the growing number of vehicles and higher coverage of vehicle routing in smart cities [24]."]} +{"34767149|8909218": ["One of the solutions to provide better signal quality for cellular users in enclosed region is to deploy small cells [2], [3], [8]."]} +{"1604551|8909218": ["Femtocells are added on top of the existing cellular architecture and therefore, resource allocation (RA) of the femtocell network is important [4], [5], [6]."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"86492414|10235514": ["2957319 of IMT 2020 [1]."]} +{"86492414|3649200": ["In order to mitigate the inter-cell interferences, coordinated multipoint (CoMP) transmission schemes were proposed to explore the cooperation among adjacent cells to mitigate the interferences [9] [10]."]} +{"1526760|25929315": []} +{"49412233|22833814": ["To provide broadband Internet access in trains has been signi\ufb01cant research topics [18], and a major one of which is to adopt wireless communications technologies to high speed trains (HSTs) moving at speeds of up to 350 km/hr, 500 km/hr, or higher [19], [20]."]} +{"49412233|11498812": ["To provide broadband Internet access in trains has been signi\ufb01cant research topics [18], and a major one of which is to adopt wireless communications technologies to high speed trains (HSTs) moving at speeds of up to 350 km/hr, 500 km/hr, or higher [19], [20]."]} +{"49412233|860072": ["To provide broadband Internet access in trains has been signi\ufb01cant research topics [18], and a major one of which is to adopt wireless communications technologies to high speed trains (HSTs) moving at speeds of up to 350 km/hr, 500 km/hr, or higher [19], [20]."]} +{"150373910|35260120": ["As a recent survey comprehensively reviewed the advancements and remaining issues of ambient backscatter communication, we will not repeat them here, but refer the reader to [166].", "However, the passive operation makes backscatter communication vulnerable to various security attacks like eavesdropping and jamming [166]."]} +{"150373910|3055684": []} +{"150373910|12060835": ["The concept of energy harvesting is not new and there exists publications surveying the recent advances in energy harvesting materials and techniques [12]."]} +{"69841025|11498812": ["In [19] and [20], the technical feasibility and challenges of the distributed antenna system (DAS) for HST communications were discussed, and in conjunction with the DAS, new HO technologies were developed in [21] and [22], which showed that the DAS is one of the most effective solutions to alleviating the frequent HO problem in HST communications."]} +{"53784614|10663005": [", [13] and [14] for massive MIMO communication scenarios, [15]\u2013[17] for V2V communication scenarios, [18] and [19] for HST communication scenarios, [5] and [20] for mmWave communication scenarios.", "A 3D cylinder-shape GBSM for HST tunnel scenario was proposed in [19] and [144]."]} +{"53784614|22833814": [", [13] and [14] for massive MIMO communication scenarios, [15]\u2013[17] for V2V communication scenarios, [18] and [19] for HST communication scenarios, [5] and [20] for mmWave communication scenarios.", "A non-stationary wideband ellipse channel model for HST communication system was proposed in [18] and [140].", "A multiple confocal ellipses HST channel model [18]."]} +{"53784614|860072": [", 500 km/h, the future HST channel modeling has to address challenges such as non-stationarity, large Doppler shift [136], fast handover [137], and adapting to diverse HST propagation environments [138], including open space, viaduct, cutting, hilly terrain, tunnel, station, etc."]} +{"53784614|7482876": ["Because of the unique propagation conditions, V2V channels exhibit very different propagation characteristics compared to the cellular communication channels [16].", "Measurements in [16] and [33] show that the mean Doppler spreads of most V2V channels are in the order of 100\u2013300 Hz when vehicles move at speeds between 50\u201380 km/h and measurements conducted with a center frequency of 5."]} +{"1806655|7686677": ["small-cell deployments, the cell switch-off approach [4]\u2013[6] is an effective scheme in energy saving; the extent of cell switchoff depends mainly on the distribution of UEs."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"119304769|167222315": []} +{"119304769|51613885": ["However, the cornerstone of the commercialization of IoT technology is the security and privacy guarantee as well as consumer satisfaction [7], [12], [18]."]} +{"119304769|51877788": ["One of the most relevant papers to our survey is [33].", "In fact, our paper is complementary to [33] but we take a different approach to discuss the IoT security from the ML"]} +{"119304769|4111957": []} +{"119304769|3536399": []} +{"119304769|9461213": ["2018 [48] IoT data analytics through DL N/A In-depth review of ML- and DL-based security solutions in IoT"]} +{"119304769|24855581": ["In this situation, RL has a powerful capability to automatically learn from environment without any feature crafting and helps DL in efficient classification [102]\u2013[104]."]} +{"119304769|4884302": ["Most recent work in DRL can be found in [72], [73]."]} +{"119304769|31245252": ["II Coverage of entire IoT from security, privacy standpoint 2017 [6] System architecture, and security, privacy in edge-/fog-based IoT Sec."]} +{"119304769|2340740": []} +{"119304769|5538934": []} +{"119304769|14341962": []} +{"119304769|3126100": ["Most of the traditional ML techniques are not inherently efficient and scalable enough to manage IoT data and thus need considerable modifications [54]."]} +{"119304769|10657013": ["[45] outlined in detail, the stealth malware and its mitigation techniques.", "In this regard, there are a number of countermeasure techniques for malware to evade the detection mechanisms [45], [174], [175]."]} +{"119304769|2829149": ["[21] discussed in detail, the security issues in IoT at different layers and their existing solutions."]} +{"119304769|2387055": ["php/Top_10-2017_Top_10 and applications [84], [85]."]} +{"51922975|16844049": []} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"22833814|860072": ["diverse scenarios, and large Doppler spreads [11], [12] besides some challenges inherited from conventional trains such as high penetration losses, limited visibility in tunnels, and the harsh"]} +{"22833814|7482876": ["that have been thoroughly investigated in the literature [2]\u2013[10], a comprehensive study of HST communication channels is still missing."]} +{"53761542|21930333": []} +{"53761542|14247248": ["In addition, so far, the researches on massive MIMO mainly focus on static channel conditions, and only several researchers investigated on the massive MIMO under high mobility scenarios [71]."]} +{"27093116|8909218": [", a SAP deployed on fixed locations such as offices, a broadband connection works as the backhaul [3], [5], whereas for M-SAPs, a wireless backhaul is required."]} +{"22639504|3330461": ["The other ProSe use case is in the situation when the cellular coverage is not available (due to disaster, etc) [5], [6]."]} +{"15677593|8909218": ["Several studies in literature show that that the use of the Femtocell Access Point (FAP) improves the users\u2019 throughput and extends the network coverage in indoor environment [5-7]."]} +{"1631663|3913780": ["addition, the popularity of on-line contents can be predicted [4], [5].", "In the Internet, a small number of popular contents occupy a large proportion of Internet data traffic [4]."]} +{"65559034|8909218": ["Number of FUEs per femtocell uniform distributed between [1, 4]"]} +{"19712065|3054454": ["For comparison, we also include a sample generated with Lee\u2019s model [11], which contains an LOS path with a shadowing process, and scattering paths from a nearby circle, without the effect of poles along the rail."]} diff --git a/edge/graph_214640987.jsonl b/edge/graph_214640987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..939b8289eb18bfc956927ac490653c61b499f5ff --- /dev/null +++ b/edge/graph_214640987.jsonl @@ -0,0 +1 @@ +{"6493647|10093798": ["Using dynamical systems as computers has become increasingly attractive over the last ten years or so among physicists, computer scientists, and others exploring the physical basis of computation [131\u2013134].", "[133] P."]} diff --git a/edge/graph_214641179.jsonl b/edge/graph_214641179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..09798bc84346176f097678992509c37c802ab10c --- /dev/null +++ b/edge/graph_214641179.jsonl @@ -0,0 +1,16 @@ +{"890737|1932843": ["\u2026it will be useful to also de\ufb01ne the value function V \u03c0 ( x t , u t ) and advantage function A \u03c0 ( x t , u t ) of a given policy \u03c0 : (Deisenroth et al., 2013; Kober & Peters, 2012), two are particularly relevant for this work: iterative LQG (iLQG) (Li & Todorov, 2004) and Dyna-Q (Sutton, 1990).", "Model-free reinforcement learning (RL) has been successfully applied to a range of challenging problems (Kober & Peters, 2012; Deisenroth et al., 2013), and has recently been extended to handle large neural network policies and value functions (Mnih et al., 2015; Lillicrap et al., 2016; Wang et\u2026"]} +{"4251721|12925459": ["Traditional portfolio management methods can be classified into four classes: \u201cFollow-the-Winner\u201d, \u201cFollow-theLoser\u201d, \u201cPattern-Matching\u201d and \u201cMeta-Learning\u201d [3].", "The performance of our back-test is compared that of three recent portfolio selection algorithms, summarised and implemented by Hoi [3], in the same cryptocurrency exchange.", "The \u201dMeta-Learning\u201d method Online Newton Step , \u201dFollow-the-Loser\u201d method Passive Aggressive Mean Reversion (PAMR) and our CNN Agent performs well, gaining \ufb01nal portfolio value larger than the best single asset of all.", "The last class, \u201dMeta-Learning\u201d method, tries to combine multiple classes of methods to achieve better performance [7] [8].", "Traditional portfolio management methods can be classi\ufb01ed into four classes, \u201dFollow-the-Winner\u201d, \u201dFollow-the-Loser\u201d, \u201dPattern-Matching\u201d and \u201dMeta-Learning\u201d [3]."]} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"129947643|59314746": ["As an emerging technology trend, different research [115] and industrial [29] perspectives are being assembled to document its potential disruptive impact [22]."]} +{"129947643|51935081": ["Since the introduction of Bitcoin [94] and rise of blockchain-related algorithms [96] and technologies [10,74,98,130,137], there has been a signi\ufb01cant increase in their recognition and analysis."]} +{"129947643|13688847": ["Since the introduction of Bitcoin [94] and rise of blockchain-related algorithms [96] and technologies [10,74,98,130,137], there has been a significant increase in their recognition and analysis."]} +{"59604174|14755547": []} +{"54457633|52894928": ["We refer the interested readers to [24] for a more comprehensive review of recent applications of TDA in time series analysis."]} +{"54457633|18599847": ["\u2026tremendous increase in the computing processing power and the developments of novel methodologies and theories for data analysis, researchers have started harnessing more innovational approaches once considered irrelevant to time series analysis (e.g., deep-learning architectures [35, 2, 38, 26])."]} +{"199509035|14692220": ["As a result, many other areas in finance and economics have embraced the use of these heuristic solvers [16]-[18]."]} +{"199509035|17485266": ["The model is trained for 20 epochs using a batch size of 256 examples, RMSProp [37] with learning rate equal to 0.", "The model is trained for 20 epochs using a batch size of 256 examples, RMSProp [37] with learning rate equal to 0.001 and Mean Square Error (MSE) as the loss function to minimize by backpropagation through time."]} +{"199509035|27824252": []} +{"69559491|1708582": ["Since the observation states are derived from market data at a given point in time, most of them are unique and thus learning time is expected to scale exponentially with the size of the state space[27, 44]."]} +{"158663502|3628110": ["Li et al. [2017] propose a framework to present greater transparency to the users of cryptocurrencies through the reduction of sensitive information such as the amount traded using the Paillier cryptosystem for encryption and decryption in an attempt to mitigate active and passive attacks."]} +{"22475926|1805048": ["[139] presented a comprehensive review on collaborative filtering techniques; Burke et al."]} +{"127018794|393948": []} diff --git a/edge/graph_214641221.jsonl b/edge/graph_214641221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a834b2d01918da99f4a4685d149653f36c03efd --- /dev/null +++ b/edge/graph_214641221.jsonl @@ -0,0 +1,3 @@ +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"2172545|7158350": []} +{"7333079|956843": ["Due to the finite number of samples, PF suffers from degeneracy and impoverishment problems when the highly likely particles replace the less likely ones [Li et al. 2014].", "PF with finite number of samples suffer from degeneracy and impoverishment problems when less likely particles are replaced by highly likely particles [24]."]} diff --git a/edge/graph_214641408.jsonl b/edge/graph_214641408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5abef5e1ec29e0d66ef0217149863c9737d45457 --- /dev/null +++ b/edge/graph_214641408.jsonl @@ -0,0 +1,10 @@ +{"212737102|6736412": ["CNN is feed-forward neural network which is generally used for spatial data such as image recognition [19]."]} +{"8767362|206602044": ["Another relevant technique is speaker diarization [2], which essentially determines \u201cwho spoke when\u201d in an audio recording that contains an unknown amount of speech and also an unknown number of speakers."]} +{"208138154|206603045": ["Neural network based models for audio denoising (Liu et al., 2014) and separation (Wang and Chen, 2018; Huang et al., 2014) have been reported in the literature to be e\ufb00ective and surpass some classic algorithms which are built on some additional assumptions (Delic et al., 2019)."]} +{"59337327|15662958": ["s little possibility of leakage at the raw data level. Recent works adopted homomorphic encryption for centralizing and training data on cloud [75, 76]. In practice, Additively Homomorphic Encryption [2] are widely used and polynomial approximations need to be made to evaluate non-linear functions in machine learn algorithms, resulting in the trade-offs between accuracy and privacy [4,35]. 2.2.1 Indi"]} +{"27576711|17574321": ["Speech parameterisation or feature extraction is the transformation of the raw speech signal into a more abstract representation of the signal with fewer redundancies (Kinnunen and Li, 2009).", "The negative effect of varying channel characteristics and techniques to mitigate the effects are widely studied in speaker recognition, (Kenny et al., 2008; Kinnunen and Li, 2009) and discussed further in relation to mental state in Section 8.", "(2013c) employed MFCC/GMM supervectors (Kinnunen and Li, 2009) in combination with either Kullback\u2013Leibler (KL-means) divergence kernel (Campbell et al.", "The foundation for feature extraction methodologies are not covered in this section; for this the reader is referred to either Kinnunen and Li (2009) or Quatieri (2001)."]} +{"27576711|18436400": [", 2006); however these time instants are difficult to automatically extract due to non-uniform vocal fold behaviour and formant ripple and noise remaining after the inverse filtering required in their extraction, needed to remove the effects of a constantly changing vocal tract (Walker and Murphy, 2007)."]} +{"23739775|20905429": ["Increasing healthcare costs and an aging world population have recently motivated a considerable amount of research effort on wearable health-monitoring systems (WHMS) [1].", "This paper focuses on detecting and classifying five common and easily replicable tracheal activities namely chewing, clearing the throat, coughing, swallowing and speech from acoustic recordings of a neckworn WHMS.", "This is promising to mitigate privacy concerns associated with neck-worn WHMS interfering with the user\u2019s conversations.", "I. INTRODUCTION\nIncreasing healthcare costs and an aging world population have recently motivated a considerable amount of research effort on wearable health-monitoring systems (WHMS) [1].", "The ability to classify speech with almost perfect accuracy can mitigate privacy concerns associated with audio-based WHMS by ensuring that the user\u2019s conversations can be eliminated before access is provided for further analysis on tracheal events of interest for health monitoring purposes.", "Little research effort has been committed to recording and discriminating common tracheal activities from one another to facilitate the potential benefit of a neckworn WHMS."]} +{"207041771|8777381": ["For a detailed description of the corpus please refer to Schiel and Heinrich (2009) and Schiel et al. (2012). ALC comprises 162 speakers (84 male, 78 female) within the age range 21\u201375, mean age 31.", "For a detailed description of the corpus please refer to Schiel and Heinrich (2009) and Schiel et al."]} +{"52965836|3342225": ["[63] reviewed methods for explaining black-box models at a large scale including data mining as well as machine learning."]} +{"52965836|17779926": ["One effort to gain insight into highly complex models is the use of rule extraction [114]\u2013[116]."]} diff --git a/edge/graph_21465731.jsonl b/edge/graph_21465731.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_214667089.jsonl b/edge/graph_214667089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11374d87b694ebb835c9df395bf661b8f451dcfc --- /dev/null +++ b/edge/graph_214667089.jsonl @@ -0,0 +1,13 @@ +{"17012108|1174262": []} +{"5389712|2451860": ["Moreover, the recent advances in mobile computing, sensor and GPS technology have made it possible to collect large amounts of spatiotemporal data and there is increasing interest to perform data analysis tasks over this data [4]."]} +{"198162846|53800586": ["[16] Junyao Guo, Unmesh Kurup, and Mohak Shah.", "Many existing datasets for object tracking focus on pedestrian tracking from image/video sequences [16, 48, 43, 2]."]} +{"49406258|7704963": []} +{"208114487|3439067": ["The problems of trajectory clustering have been studied for years [28]."]} +{"13667955|393948": ["Two straightforward representations exist for the cells, the one-hot representation [32] and the centroid coordinates of the cells (GPS coordinates).", "This is important, as differences in the loss function would encourage the model to learn different representations [32]."]} +{"26475325|393948": ["In this section, we describe a model that uses LSTM (Long Short Term Memory) to reconstruct the moving behavior sequence and generate a \ufb01xed-length deep representation of the trajectory[21]."]} +{"196195970|393948": ["Inspired by the success of word2vec, the idea of representation learning [3] is widely used for many tasks such as natural language processing [13] and graph embedding [19]."]} +{"4883741|1805048": ["Matrix factorization (MF) [18, 29] emerges from recommendation system and the basic idea of it is to factorize the users-items matrix into two latent matrices which represent the users and items characteristics."]} +{"201904600|53236024": ["Recently, some papers have been published to review the topic of trajectories classification [66, 84, 88, 153].", "Reference [66] gives a brief review on trajectory data and relevant usage in the reality including application of trajectories, service of trajectories and challenge of trajectories."]} +{"201904600|5755403": ["For example, two types of POI are introduced in Reference [88] where the first ones are the points in entry/exit zones and the second one are the points at the scene landmarks that objects intend to approach, move away, or stay for a long time.", "For instance, activity analysis is a key part in surveillance application to seek low-level situational awareness by understanding and characterizing behaviors of objects in the scene [88], so it is critical to extract POI in the special regions.", "Reference [88] discusses the papers by following the clustering procedure, including data preprocessing, clustering, and path modeling, which is used for further inferring.", "Reference [88] reviews vision-based trajectory data classification methods.", "Recently, some papers have been published to review the topic of trajectories classification [66, 84, 88, 153]."]} +{"59232326|7252621": ["Generally, the higher the compression ratio, the more inexact the accuracy of the compressed trajectory data [3].", "ally, a higher compression ratio leads to a poorer quality of the compressed trajectory data [3].", "Trajectory data is the foundation for a wide spectrum of services driven and improved by trajectory data mining [3].", "The framework is based on the work of Feng and Zhu [3], Zheng [2], and Tanuja and Govindarajulu [8].", "However, it is a challenging task to manage, store, process, and mine trajectory data [3].", "978-1-5386-5035-6/18/$31.00 \u00a92018 IEEE 562\nThe framework is based on the work of Feng and Zhu [3], Zheng [2], and Tanuja and Govindarajulu [8]."]} +{"86642027|3766791": ["To this end, we group the trips in test dataset into subgroups by their lengths (in 5KM step), [0, 5), [5, 10), .", "On the other hand, the automatic-differentiation [5] permits us to perform inference on large-scale datasets."]} diff --git a/edge/graph_214667531.jsonl b/edge/graph_214667531.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..039f27300cb762b03a0f3af65f0a54a30bc8a855 --- /dev/null +++ b/edge/graph_214667531.jsonl @@ -0,0 +1,36 @@ +{"12757870|393948": ["Recent studies reveal that deep networks (Bengio et al., 2013) can learn more transferable representations than traditional hand-crafted features (Oquab et al.", "Deep networks learn abstract representations that disentangle the explanatory factors of variations behind data (Bengio et al., 2013) and extract transferable factors underlying different populations (Glorot et al."]} +{"18221187|6923178": ["Several indices can be used to score the e ciency of the algorithm [5]."]} +{"1033682|174797842": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"53815954|2088679": ["The lack of interpretability in deep image-to-image regression models makes it hard to provide guarantees of robustness in the presence of adversarial input [29], and confer reliability needed for researchers in biology and medical science [34]."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"4635704|1271753": ["The rule-based techniques recognize biomedical entities using several rules manually defined based on the textual patterns of entities (Narayanaswamy et al., 2003; Eltyeb and Salim, 2014)."]} +{"198190157|9060471": []} +{"198190157|3241708": ["Other forms include crowdsourced labels [41,63], rules and heuristics for labeling data [47,65], and others [33,34,34,55,64]."]} +{"187547|393948": ["There is a rich literature in unsupervised learning of visual representations [5]."]} +{"52811641|10175374": ["There has been extensive prior work on multi-task learning (Caruana, 1997; Ruder, 2017)."]} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} +{"52167718|393948": []} +{"202888747|3654323": ["\u2026of deep learning, a convolutional neural network maps images to learned representations in some feature space, so inducing alignment is done by making the distribution shifts small between the source and target in this shared feature space (Csurka, 2017; Wang & Deng, 2018; Gopalan et al., 2011)."]} +{"202888747|7559976": ["\u2026of deep learning, a convolutional neural network maps images to learned representations in some feature space, so inducing alignment is done by making the distribution shifts small between the source and target in this shared feature space (Csurka, 2017; Wang & Deng, 2018; Gopalan et al., 2011).", "In the context of deep learning, a convolutional neural network maps images to learned representations in some feature space, so inducing alignment is done by making the distribution shifts small between the source and target in this shared feature space (Csurka, 2017; Wang & Deng, 2018; Gopalan et al., 2011)."]} +{"199574483|17172098": []} +{"12397462|11608263": ["In general, there are two multi-label classification methods [59]: problem transformation methods and algorithm adaptation methods."]} +{"5938812|1708582": ["For example, in (Kaelbling et al. 1996), (Strehl and Littman 2004), and (Strehl and Littman 2005), measures of confidence are used to guide exploration."]} +{"195791303|1271753": []} +{"204838007|10175374": ["An alternative approach, called \u201cmultitask learning\u201d (Ruder, 2017; Caruana, 1997), is to train the model on multiple tasks at a time.", "An alternative approach, called \u201cmulti-task learning\u201d [Ruder,\n2017; Caruana, 1997], is to train the model on multiple tasks at a time."]} +{"52281312|6863252": ["Most existing deformable registration algorithms iteratively optimize a transformation based on an energy function [7]."]} +{"206771654|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"203593843|58020292": ["Many of the properties of DNNs were extremely appealing: remarkable and robust performance, relatively fast inference due to GPU hardware, and ef\ufb01cient code due to modern packages like TensorFlow and PyTorch (reviewed in (47))."]} +{"203593843|3680335": ["The current deep learning revolution started with achieving human-level accuracy for object recognition on the ImageNet challenge, a popular benchmark with many categories and millions of images [16 ,17]."]} +{"203593843|2088679": ["Over time, these systems re\ufb02ected all \ufb02avors of arti\ufb01cial intelligence from rule-based via expert systems, to machine learning (11, 12).", "A combination of large annotated data sets, sophisticated network architectures, and advances in hardware made this possible and quickly impacted many problems in computer vision (see reviews (12, 16, 18)).", "Other computer vision techniques, such as using texture or color to segment the person from the background to create silhouettes (14, 15), or using so-called hand-crafted features with decoders (11, 12, 16) were also popular before deep learning \ufb02ourished."]} +{"203593843|2616070": ["Other computer vision techniques, such as using texture or color to segment the person from the background to create silhouettes (14, 15), or using so-called hand-crafted features with decoders (11, 12, 16) were also popular before deep learning \ufb02ourished."]} +{"203593843|3540699": ["\u2026pipelines should be robust to a myriad of perturbations: such as changes in setups (backgrounds, light sources, cameras, etc.), subject appearance (due to different animal strains), and compression algorithms (which allow storage of perceptually good videos with little memory demands (64))."]} +{"40100965|17485266": ["For context, the regular stochastic gradient descent (SGD) update of a model\u2019s parameters \u03b8 at time step t looks like the following (Ruder, 2016):"]} +{"52055130|393948": ["\u2026(Gretton et al., 2012), independent (Hyv \u00a8 arinen & Oja, 2000; Hinton, 2002; Dinh et al., 2014; Brakel & Bengio, 2017), disentangled (Schmidhuber, 1992; Rifai et al., 2012; Bengio et al., 2013; Chen et al., 2018; Gonzalez-Garcia et al., 2018), or independently controllable (Thomas et al., 2017).", "Usefulness of a representation is not just a matter of information content: representational characteristics like independence also play an important role (Gretton et al., 2012; Hyv\u00a8arinen & Oja, 2000; Hinton, 2002; Schmidhuber, 1992; Bengio et al., 2013; Thomas et al., 2017)."]} diff --git a/edge/graph_21470706.jsonl b/edge/graph_21470706.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_214713521.jsonl b/edge/graph_214713521.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40b73d701322b7ed2266c19cf75de304cdff0402 --- /dev/null +++ b/edge/graph_214713521.jsonl @@ -0,0 +1,20 @@ +{"3456398|18078738": ["While several general reviews of data fusion [9,50\u201352] and data inconsistency [46,53,54] exists; this paper is intended to provide readers with the methodology of fusion under unknown correlation and data inconsistency in the context of distributed data fusion."]} +{"3456398|18388986": ["However, processing all the information at a central node poses various issues, such as a large computational load on the central node, large communication bandwidth requirement, the possibility of failure (due to failure of the central node) and inflexibility to changes in architecture [50,52,55].", "While several general reviews of data fusion [9,50\u201352] and data inconsistency [46,53,54] exists; this paper is intended to provide readers with the methodology of fusion under unknown correlation and data inconsistency in the context of distributed data fusion.", "Interested readers can refer to References [50,52] for more general perspectives and approaches to multisensor data fusion."]} +{"199440381|49527603": ["On the other hand, the survey in [114] focused on blockchain applications and challenges for real world applications."]} +{"199440381|11649076": []} +{"199440381|3474164": ["\u2022 5G-IoT architecture is the main challenge which needs to be addressed since architecture design still impose many challenges, including, scalability and network management, interoperability and heterogeneity, security assurance and privacy concerns [140]\u2013[142]."]} +{"199440381|31245252": ["Data encryption is adopted to avoid the interference and eavesdropping of unauthorized users; in other words, strictly limiting the data accessibility and disclosure to the authorized users [106]."]} +{"199440381|44461432": ["The discussion of datamining algorithms and architectures is beyond the scope of this survey; however, the surveys in [146]\u2013[148] provided thorough overviews on the data mining algorithms, architectures and their challenges for IoT."]} +{"199440381|5338241": ["4 GHz) for open access, but mandates that users should never exceed the imposed peak transmission power [78]."]} +{"208127545|206741902": ["It has found broad applications in many areas including vehicular surveillance, autonomous driving, navigation, mobility management, intelligent spectrum control, and industry automation [6]\u2013[14]."]} +{"208127545|3423198": ["As a particular case that the prior quantity budget constraint is given, such as K, a SOOP can be formulated and can be regarded as another transformation of the MOP (P2) by the \u03b5-constraints method [30].", "We introduce a linear weighted-sum cost function [28], [30] to reduce the number of objectives, as shown in (P2).", "The MOP is transformed into a single objective optimization problem (SOOP) by using the linear weighted-sum method [30]."]} +{"33274686|205286988": []} +{"195738432|33286487": ["has typically low-pass filter characteristics to suppress signal cross terms and preserve auto terms, leading to reduced interference distributions [21].", "The Cohen\u2019s class of QTFDs of signal ( ) x t is defined as follows [21]:"]} +{"108329824|46940456": ["As a result, numerous FPGA-based CNN accelerators have been proposed, targeting both High Performance Computing data-centers and embedded applications [29,30].", "However, half-precision floating-point format seems to be interesting to address future implementations on FPGA as well as approximated computing to maintain good energy-performance trade-offs [30]."]} +{"108329824|3645740": ["It can be defined differently based on the adopted SL, for example Bayes\u2019 theory (NB), K-Nearest Neighbors (K-NN), Support Vector Machines (SVM), Decision Trees, Neural Networks (NN) all described in [7]; or based on DL such"]} +{"108329824|18388986": [", signal, feature, and/or decision [15]."]} +{"108329824|7358409": []} +{"108329824|192934": ["recognition of patterns? Given a new, unknown test data sample, this will be assigned to a class/category predefined by the researcher/engineer/clinician [6].", "Figure 2: right) Common high-level framework of classification applications \u2013 adapted from [6]; left) Classification example for a binary class problem and performance metrics for class 1."]} +{"8372082|5972227": []} +{"29236356|5473785": ["Details for this method can be referred to [25] and [34]."]} +{"18227642|7185733": ["HUMAN hand gesture recognition (HGR) is originally a topic in the area of computer science, aiming at interpreting hand gestures based on cameras and computer vision algorithms [1]\u2013[5]."]} diff --git a/edge/graph_214713915.jsonl b/edge/graph_214713915.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..350bf11d0bd2f49024b7c99e5cc7c71968b2784f --- /dev/null +++ b/edge/graph_214713915.jsonl @@ -0,0 +1,3 @@ +{"109132295|8783262": []} +{"43997194|8783262": ["Instead, a few academic references are recommended for further reading on the subject [8], [9].", "2571783 in [5] and [7]\u2013[9] general EV powertrain technology overviews"]} +{"85558226|21726474": ["Battery state-of-health estimations, together with thermal safety issues, are of utmost importance for improving performance, safety, and cost-effectiveness of these vehicles, as they strongly influence driving performance and particularly range per charge [5,6]."]} diff --git a/edge/graph_214713946.jsonl b/edge/graph_214713946.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a676221059d40cc789f39a1bd8c8ca73f3388668 --- /dev/null +++ b/edge/graph_214713946.jsonl @@ -0,0 +1,67 @@ +{"2305273|1932843": ["Previous work on Reinforcement Learning typically do not consider highdimensional perceptual inputs [48]."]} +{"196470796|10175374": ["Because often geometric reasoning tasks are intrinsically coupled, several methods aim to leverage their inter-dependencies by joint supervision [34, 46]."]} +{"205693103|1708582": ["This problem can be substantially alleviated by using reinforcement learning (RL; [4,5]), where a"]} +{"44213294|3608506": []} +{"18389147|1932843": ["Neural networks are powerful function approximators, but they have significantly more parameters than the simpler linear models that are often used in robotic learning [23], [8].", "However, practical real-world applications of RL typically require significant engineering beyond the learning algorithm itself: an appropriate representation for the policy or value function must be chosen so as to achieve training times that are practical for physical hardware [8], and example demonstrations must often be provided to initialize the policy and mitigate safety concerns during training [9]."]} +{"18389147|6988770": ["Accelerating robotic learning by pooling experience from multiple robots has long been recognized as a promising direction in the domain of cloud robotics, where it is typically referred to as collective robotic learning [31], [32], [33], [34]."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"195218586|21656238": ["Recent surveys can be found in [13,16]."]} +{"195218586|8574504": ["Recent surveys can be found in [13,16]."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} +{"1033682|174797842": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"52938664|7782275": ["There exists a rich body of earlier work (Brazdil et al., 2009; Lemke et al., 2015; Giraud-Carrier, 2008; Luo, 2016) on building meta-models for algorithm selection (Bensusan and Giraud-Carrier, 2000; Pfahringer et al."]} +{"52938664|5281246": []} +{"7559976|393948": ["As shown also in [13, 266], this suggests that deep neural networks learn more abstract and robust representations, encode category level information and remove, to a certain measure, the domain bias [65, 216, 51, 188]."]} +{"52206410|4875951": ["As demonstrated in [47], style transfer can be considered as a distribution alignment process from the content image to the style image [34]."]} +{"17141050|4716814": ["More recently, there have been several attempts at combining task transfer with Deep RL [19], [20], [21], [22], [23], [24]."]} +{"17141050|1932843": ["Although individually the problems of SLAM, localization, path planning and control are well understood [1], [2], [3], and a lot of progress has been made on learning control [4], they have mainly been treated as separable problems within robotics and some often require human assistance during"]} +{"51969394|17036197": ["Object tracking [8], [9] has been conducted in both passive"]} +{"51969394|195346070": []} +{"211252383|58004724": []} +{"211252383|49862415": ["rapidly developments in learning systems, such as deep learning and reinforcement learning, they have been widely applied in various \ufb01elds in smart grid [1], biology [2], \ufb01nance [3], object detection [4], industrial production processes [5], and particularly in the autonomous systems of robots. Autonomous systems have gained a broad application prospect in various industries, such as autonomous robot", "ith the developments in deep neural networks, several detection and segmentation methods are proposed based on deep learning. Methods for object detection and image segmentation have been reviewed in [4] and [33]. Leveraging deep learning-based image segmentation into SLAM for semantic mapping is also a hot topic. In [172], Li et al. combined the LSDSLAM [16] with CNN-based image segmentation to reco", "vehicles [12]. For example, CNN-based models are widely used in relevant works of environment perception, such as monocular 4322 depth estimation [32], ego-motion prediction [31], objective detection [4], and semantic segmentation [33]. Furthermore, to overcome the shortcomings (e.g., running in low texture or high dynamic scenes) and improve the robustness of the current SLAM methods, attempts have "]} +{"211252383|12998110": ["nomous systems has signi\ufb01cant potential. Intelligent and autonomous systems are the ultimate aim, which can perform advanced tasks autonomously, interact with humans, and even work better than humans [10]. For example, there is no drunk or tired driving in autonomous vehicles. Primarily, autonomous vehicle systems should have the ability of autonomous or obstacle recognition, which heavily rely on the"]} +{"9854676|5755403": []} +{"129946046|4110304": ["They are fed input and produce output, but the exact functional process for generating this output is hard to interpret even to the very scientists who generate the algorithms themselves 44 , though some progress in interpretability is being made 45,46 ."]} +{"129946046|17253721": []} +{"49470584|8815923": ["This stands in contrast to the kinds of grasping behaviors observed in humans and animals, where the grasp is a dynamical process that tightly interleaves sensing and control at every stage [9, 10].", "Real-world robotic manipulation requires broad generalization, and indeed much of the research on robotic grasping has sought to achieve such generalization, either through the use of grasp metrics based on first principles [20] or learning [21, 10], with the latter class of methods achieving some of the best results in recent years [8, 7]."]} +{"3689180|8815923": ["Prior work in robotic manipulation has sought to address the grasping problem through a wide range of methods, from analytic grasp metrics [43], [36] to learning-based approaches [2]."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"210839653|174797842": ["However, MLP does not have good generalization on more complex images [10].", "The reference [10] introduced the architecture-variants and loss-variants of GANs only related to computer vision."]} +{"210839653|88492544": ["Other related work can be found in [11]\u2013[13]."]} +{"210839653|3536399": ["To be against adversarial attacks [118], [119], references [120], [121] utilize GANs to conduct the right defense."]} +{"210839653|196150698": ["1) GANs for specific applications: There are surveys of using GANs for specific applications such as image synthesis and editing [5], audio enhancement and synthesis [6]."]} +{"210839653|20404279": ["References [8], [9] mainly introduced the progress of GANs prior to 2018."]} +{"25539509|4570087": ["Generally speaking, from the perspective of model, classi\ufb01cation models as used in image classi\ufb01cation [23] and siamese models that use image pairs [26] or triplets [27] are two types of CNN models that are commonly employed in re-ID."]} +{"18089422|2762484": ["Product Intelligence A physical order or product instance that is linked to information and rules governing the way it is intended to be stored, prepared or transported that enables the product to support or influence these operations [8, 13].", "Intelligent Products for Managing Customer Orders [R23a, R33a, R33b] Using automatic identification and data capture technologies, product intelligence [37, 38, 13] allows products to be uniquely identified and interact with their environment (systems, products, people) to gather and store information for instant or later use."]} +{"18089422|4719202": []} +{"212995406|64404": []} +{"8574504|9869210": ["Various semantic segmentation surveys already exist such as the works by Zhu et al. [12] and Thoma [13], which do a great work summarizing and classifying existing meth-ods, discussing datasets and metrics, and providing design choices for future research directions."]} +{"152282330|11311635": ["For a comprehensive introduction of multitask learning, please refer to [144] and [97]."]} +{"152282330|10175374": ["For a comprehensive introduction of multitask learning, please refer to [144] and [97]."]} +{"152282330|26071662": [" in E to make the learning of the supervised targetT feasible. Existing FSL methods use prior knowledge from a single modality, which is the output of a sensor for observing some phenomena or systems [61], such as images, texts, and videos. However, multi-modality prior knowledge can be used to provide a prior knowledge of complementary views, hence a comprehensive understanding can be gained and bett"]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"6317914|1932843": ["Reinforcement learning (RL) agents have emerged as a viable approach to robot control [16].", "Reinforcement learning has recently gained popularity in solving motion planning problems for systems with unknown dynamics [16], and has enabled robots to learn tasks that have been previously difficult or impossible [1], [6], [20]."]} +{"6317914|18315024": ["problems from robotics [13], [24] to molecular folding [3],"]} +{"3690396|7559976": ["Domain adaptation Csurka [3] published a comprehensive survey on domain adaptation techniques for visual applications."]} +{"195811894|53164212": []} +{"195811894|52305483": []} +{"195811894|2088679": []} +{"195811894|3761015": []} +{"212414793|1932843": []} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} +{"30994737|1932843": ["Naturally, the use of RL for robot control is gaining popularity over the last few years [1, 2] in a broad spectrum of robotics applications [3]."]} +{"78548|4570087": ["Person re-identification (re-ID), a retrieval problem in its essence [39, 33, 38], aims to search for the queried person from a gallery of disjoint cameras."]} +{"1708582|17464562": []} diff --git a/edge/graph_214728128.jsonl b/edge/graph_214728128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c27146b9ef8ab239330286fa5eb1aa4ca0464f37 --- /dev/null +++ b/edge/graph_214728128.jsonl @@ -0,0 +1,9 @@ +{"207911785|10175374": ["This concept of learning several outputs from a single input simultaneously is called multi-task learning [7] and is applied to numerous tasks and techniques, including artificial neural network architectures with parameter sharing."]} +{"1121210|6288895": []} +{"4854526|17071125": []} +{"1851875|17071125": ["46], most papers focus on predicting facial beauty averaged across all ratings, whereas we aim at predicting the rating by a speci\ufb01c person; (ii) as pointed out in the study by Laurentini and Bottino [26] usually small datasets are used, sometimes with less than 100 images and with only very few ratings per image \u2013 our dataset contains more than 13,000 images with more than 17 million ratings; (iii) m"]} +{"27262869|3913780": ["In recent years, popularity prediction on social media has attracted extensive attention because of its widespread applications, such as online marketing, trend detection and resource allocation (Tatar et al. 2014)."]} +{"6891957|6288895": ["In computer graphics, hair acquisition [1] [2] and hair geometry modeling [3] have achieved significant progresses."]} +{"17071125|16620699": ["While a comprehensive 3D survey is still lacking, references to the principal techniques can be found in [3][19][142]."]} +{"17071125|7185733": []} +{"2032309|6288895": []} diff --git a/edge/graph_214743032.jsonl b/edge/graph_214743032.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..097be4f6b34a67dcae02cefb3fe376d909ce26f1 --- /dev/null +++ b/edge/graph_214743032.jsonl @@ -0,0 +1,27 @@ +{"73463628|6021680": []} +{"213370699|4795312": []} +{"3639128|2088679": []} +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"208538978|2088679": []} +{"11392154|393948": []} +{"206491372|2088679": ["Unsupervisedmachine learningmethods are also being researched, but the majority of the algorithms from 2015-2017 in the published literature have employed supervised learning methods, namely Convolutional Neural Networks (CNN) [4].", "Currently, CNNs are the most researched machine learning algorithms in medical image analysis [4].", "[4] provides a thorough list of papers published in the field, Shen et al."]} +{"206491372|3644401": []} +{"206491372|393948": ["The rationale behind this, is as Bengio states, for a given observation, only a small fraction of the possible factors are relevant, meaning that much of the features extracted from the data could be represented by being set to zero [34]."]} +{"17233601|6280485": []} +{"3680335|3273340": ["AI: Artificial Intelligence, ML, NN, DL, and Spiking Neural Networks (SNN) according to [294].", "There are some surveys that have been conducted recently in this field [294,295]."]} +{"3680335|2088679": []} +{"3680335|17485266": ["Adam has improved overall accuracy and helps for efficient training with better convergence of deep learning algorithms [126].", "The Adam optimization approach is proposed based on the momentum and the magnitude of the gradient for calculating adaptive learning rate similar RMSprop.", "The improved version of the Adam optimization approach has been proposed recently, which is called EVE.", "There are different optimization methods such as SGD, Adagrad, AdaDelta, RMSprop, and Adam [125]."]} +{"3680335|18599847": ["From the application point of view, RNNs can solve different types of problems which need different architectures of RNNs shown in Fig.", "Convolutional RNNs based on multi-language identification system was been proposed in 2017 [153].", "Recently, TimeNet was proposed based on pre-trained deep RNNs for time series classification (TSC) [155].", "In addition, RNNs, such as LSTM and RL, are also used for unsupervised learning in many application domains [243].", "Another example: the RNNs are able to connect previous information to the present task: using previous video frames, understanding the present and trying to generate the future frames as well [142].", "Sections 6 and 7 discuss RNNs and LSTMs in detail.", "Time series data analysis using RNNs [154].", "Early heart failure detection is proposed using RNNs [160].", "The RNNs are unique as they allow operation over a sequence of vectors over time.", "RNNs are applied in tracking and monitoring: data driven traffic forecasting systems are proposed using Graph Convolutional RNN (GCRNN) [161].", "Section V. discusses on RNNs. AEs and RBMs are discussed in Section VI. GANs with applications are discussed in Section VII.", "Sound event prediction using convolutional RNNs [158].", "In most of these cases RNNs or Recursive Neural Networks are used for language understanding [292].", "RNNs are networks with loops in them, allowing information to persist.", "RNNs including LSTM and GRU are applied on Tensor processing [150].", "This idea of RNNs were developed in 1980.", "\ud835\udcb3t + who \u2217 \u210bt\u22121 + who \u2218 \ud835\udc9et + bo (48)\nht = ot \u2218 tanh (Ct) (49)\nE. Variant of architectures of RNN with respective to the applications\nTo incorporate the attention mechanism with RNNs, Word2Vec is used in most of the cases for word or sentence encoding.", "First initiative for RNNs with attention that\n> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <\n21\nautomatically learns to describe the content of images is proposed by Xu, et al. in 2015 [145].", "Different versions of RNNs have been proposed in Jordan and Elman."]} +{"3680335|1932843": []} +{"3680335|393948": ["Learning methods based on representations of data can also be defined as representation learning [3]."]} +{"206592484|456491": []} +{"3614841|2088679": ["In 2012, Krizhevsky et al(4) introduced a deep convolution neural network (DCNN) which outperformed traditional methods by a significant margin in image classification and localization.(6) In such models, the features are learned and extracted automatically.", "Before 2012, traditional computer vision techniques based on handcrafted features were popular for medical image analysis.(6) In 2012, Krizhevsky et al(4) introduced a deep convolution neural network (DCNN) which outperformed traditional methods by a significant margin in image classification and localization."]} +{"73457422|2088679": []} +{"85445103|3644401": ["However, the single-atlas segmentation suffers inferior performance when targeting large inter-subject variation on anatomy [6], as reviewed in [7]."]} +{"85445103|206051485": ["In multiatlas segmentation, the typical framework is: (1) a set of labeled atlases are registered to a target image [10-13], and (2) the"]} +{"29166777|2088679": []} +{"1033682|174797842": []} +{"22040860|1902238": []} +{"46926453|2088679": ["vision [8] and medical imaging [9], [10]."]} +{"46926453|14395478": ["IMAGE registration is one of the most fundamental tools in biomedical image processing, with applications that range from image-based navigation in imaging and image-guided interventions to longitudinal and group analyses [1]\u2013[7]."]} +{"46926453|6863252": ["The most widely used transformations in biomedical image registration range from rigid and affine to high-dimensional small or large deformations based on biophysical/biomechanical, elastic, or viscous fluid models [6]."]} diff --git a/edge/graph_214743520.jsonl b/edge/graph_214743520.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c73e529ee649c43d28ae3da8b67ca1be55fd6c2 --- /dev/null +++ b/edge/graph_214743520.jsonl @@ -0,0 +1,15 @@ +{"196173551|3951790": ["eserved. It can bene\ufb01t a variety of tasks including recommendation.Manye\ufb00ectivenetworkembeddingalgorithmshavebeenproposed[10,15,17,19,25].Webrie\ufb02y review someof thesemethods here. Readers can refer to[4, 9] for a comprehensive survey. DeepWalk [15] deployed truncated random walks on nodes to learn latent representations by treating walks as the equivalent of sentences.Followingthispioneerwork,node2vec[1"]} +{"207240067|1805048": ["YouTube is the world\u2019s largest platform for creating, sharing and discovering video content."]} +{"49648969|393948": ["the Skip-gram architecture [2, 18, 20], which is originally developed for natural language processing and word embedding."]} +{"49648969|1805048": ["Item-based Collaborative Filtering [23]: Recommended English citations using Item-based Collaborative Filtering based on (monolingual + cross-language) citation relations, denoted as CFI .", "Popularity-based Collaborative Filtering [25]: Recommended English citations using Popularity-based Collaborative Filtering based on (monolingual + cross-language) citation relations, denoted as CFP .", "Machine Translation by Google Translation API + Language Model (with Dirichlet smoothing) [30]: We translated the testing Chinese paper\u2019s abstract into English, and then used language model to recommend English citations, denoted asMT+LM.\nCollaborative Filtering Based Method."]} +{"202572927|56517517": ["Graphs are powerful data representations but are challenging to work with because they require modeling of rich relational information as well as node feature information [45, 46].", "At layer l, the update of GNN model \u03a6 involves three key computations [4, 45, 46]."]} +{"202572927|52965836": ["Instead of creating new, inherently interpretable models, post-hoc interpretability methods [1, 14, 15, 17, 23, 38] consider models as black boxes and then probe them for relevant information."]} +{"202572927|3342225": ["Instead of creating new, inherently interpretable models, post-hoc interpretability methods [1, 14, 15, 17, 23, 38] consider models as black boxes and then probe them for relevant information."]} +{"7885409|7389705": ["It is hard to model these interacted objects as homogeneous networks, while it is natural to model different types of objects and relations among them as heterogeneous networks."]} +{"198904065|4110304": ["[41] for a survey of explainability meth-ods for CNNs. Graph Convolutional Neural Networks: The mathematical foundation of GCNNs is deeply rooted in the \ufb01eld of graph signal processing [3, 4] and spectral graph theory in which signal operations like Fourier transform and convolutions are extended\u2026", "Zhang et al. [41] provide a good survey on methods for explainability of CNNs. Deep CNNs, however, are designed for grid structured data, e.g. images, in Euclidean spaces, as convolution is an operation de\ufb01ned on Euclidean space for inputs with ordered elements.", "Recently, explain-ability methods have been devised for deep networks and speci\ufb01cally CNNs [32, 42, 31, 39, 40, 41]."]} +{"67769538|5523008": ["ral network models had a great impact on learning effective feature representations in various fields, such as speech recognition [12], Computer Vision (CV) [14] and Natural Language Processing (NLP) [4]. Some recent efforts have applied deep neural networks to recommendation tasks and shown promising results [41], but most of them used deep neural networks to model audio features of music [32], text"]} +{"12349227|393948": ["engineering and leading to be\u008aer performance [2]."]} +{"170079233|52056521": ["Our architecture is generic and can be used in other applications, such as abnormal behavior detection, spatiotemporal forecasting [Shi and Yeung, 2018; Zhao et al., 2016], and so on [Chan and King, 2018; Gao et al.", "Our architecture is generic and can be used in other applications, such as abnormal behavior detection, spatiotemporal forecasting [Shi and Yeung, 2018], thread popularity prediction [Chan and King, 2018], and so on [Gao et al., 2018]."]} +{"57375753|54559476": []} +{"57375753|1479507": []} +{"57375753|3951790": []} diff --git a/edge/graph_214746428.jsonl b/edge/graph_214746428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b1fc0719f576e6192ee81e6001ca66936c1c01c --- /dev/null +++ b/edge/graph_214746428.jsonl @@ -0,0 +1,2 @@ +{"15596758|6409498": ["A general survey of surg ical tool and tissue interaction models, which describes both physics- and nonphysics-based interaction models, is provided in [43]."]} +{"2088679|393948": []} diff --git a/edge/graph_214774848.jsonl b/edge/graph_214774848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f729a7349f292c7a522aaeaf09fc3d5443438e4 --- /dev/null +++ b/edge/graph_214774848.jsonl @@ -0,0 +1,5 @@ +{"225938|16013270": ["Most existing benchmark datasets\u2014e.g., the Weizmann, Trecvid, PETS04, CAVIAR, IXMAS, Hollywood datasets\u2014 show relatively simple punctual or repetitive actions with little structural variability [10], [11], [12].", "Graphical models have been successfully used for modeling spatiotemporal structure of activities [10], [11], [12]."]} +{"14482401|5664472": ["ACTION recognition from videos has been an active research topic in computer vision for more than two decades [1]\u2013[8]."]} +{"3445530|9976187": ["4, but that almost all distributions realized by SPQNs cannot be realized by tree-like SPNs3, known also as Latent Tree Models (Mourad et al., 2013), unless they are of exponential size.", "4, but that almost all distributions realized by SPQNs cannot be realized by tree-like SPNs(3), known also as Latent Tree Models (Mourad et al., 2013), unless they are of exponential size."]} +{"8113150|393948": []} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} diff --git a/edge/graph_214774912.jsonl b/edge/graph_214774912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48c8b1a3aa91daa466b7ec9a97f88756662adf97 --- /dev/null +++ b/edge/graph_214774912.jsonl @@ -0,0 +1,23 @@ +{"2361808|14148655": ["Recently there has been renewed interest in critiquing [3, 4, 10, 11, 15, 16, 18] because of its advantages: it is simple to implement for a variety of interface types, and it can be appropriate for users who are not experts in a given product domain."]} +{"2944283|7919236": ["An integrated view on the user experience of recommender systems can be obtained by means of user-centric development (McNee et al. 2006b) and evaluation (Pu and Chen 2010; Pu et al. 2012).", "Pu and Chen (2010, see also Pu et al. 2012) provide an extensive questionnaire to test several specific experience concepts of recommender systems.", "\u2026the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012).", "However, several researchers have argued that there are other factors that influence the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012)."]} +{"2944283|14148655": ["\u2026recommenders let users rate items, (e.g. youtube.com, see also McNee et al. 2002; Cena et al. 2010; Gena et al. 2011), critique items (see also Chen and Pu 2012; Viappiani et al. 2006), assign weights to item attributes (see also H\u00e4ubl et al. 2004), or indicate their specific needs (e.g.\u2026", "The research on these different preference elicitation methods shows that they have a substantive impact on the user experience (Chen and Pu 2012).", "\u2026users may indicate their preference by assigning weights to attributes (H\u00e4ubl et al. 2004; Kramer 2007), prioritizing user needs (Felix et al. 2001; Stolze and Nart 2004; Hu and Pu 2009) or critiquing examples (Pu and Chen 2006; Pu et al. 2008; Chen and Pu 2012; Viappiani et al. 2006, 2008).", "Hu and Pu (2011, see also Chen and Pu 2012) show that putting a logical structure on the list of recommendations (specifically, categorizing the recommendations to reflect different trade-offs) leads to a higher perceived categorical diversity of the recommendations, a higher satisfaction and\u2026", "Whereas a substantial amount of research considers the individual qualities of these recommendations, little research has considered the composition of the list (Hu and Pu 2011; Chen and Pu 2012; Ziegler et al. 2005; Cooke et al. 2002)."]} +{"49268956|14148655": ["For the average customer navigating through this domain, the task of locating a desired choice among a large set of options is intimidating [5]."]} +{"49268956|1983971": ["This type of test is adequate for prototypes that already incorporate a significant part of the required functionality, and it focuses on gathering both qualitative and quantitative data [25]."]} +{"208329638|12161567": ["We investigate holographic embeddings (HolE) (Nickel et al. 2016b), which exploit the circular correlation of entity embeddings to create compositional representations of binary relational data coming from Wikidata.", "In our approach, we rely on graph embeddings that have recently gained considerable attention (Nickel et al. 2016a)."]} +{"201303572|210122798": ["line are usually designed to serve a certain purpose and to create a certain value, either for the consumer, the provider, some other stakeholder like an item producer, or several of them in parallel [2, 3, 37]. Academic research mostly focuses on the consumer perspective, with the implicit assumption that improved customer value is indirectly also bene\u2022cial for the recommendation provider. Indeed, among ot"]} +{"207756925|14148655": []} +{"53242735|14148655": []} +{"196212386|18069725": ["Image retrieval with user feedback has been comprehensively studied [14, 37, 45]."]} +{"50769215|14148655": ["Critique [10] \u2717 \u2717 \u2713 \u2717 multi-turn cold & warm features small prototype users Interactive CF [47] \u2717 \u2717 \u2717 \u2713 multi-turn cold & warm items small offline recomm.", "The need to present recommendations in a conversational manner [14, 28] has been studied from many perspectives, including interview-based [41], active-learning [39], entropy [47], picturebased [36], explore-exploit [47], critiquing [10], constraint [16], dialog [8], and utility-based strategies [33]."]} +{"6839206|14148655": ["Recently, a speech-based natural language recommender system was mentioned as a promising future research direction in [8]."]} +{"1029363|14148655": ["Further studies could, for example, continue related lines of research described in [9, 27, 28, 29, 30] and further investigate what level of control users expect from recommender systems, whether more control is always better, or if different users call for different control mechanisms."]} +{"11744847|14148655": ["There have been many works (critique-based [7], constraint-based [10], dialog, utility-based recommenders [19]) emphasizing the importance of interactivity in recommenders so that the user has a more active role over the recommendations."]} +{"212689272|7919236": []} +{"212689272|14148655": []} +{"202639661|10777439": []} +{"69856334|14148655": ["For example, a critiquing-based recommender system uses the user \u2019 s feed-back or critiques about recommended items to narrow down suitable items for recommendation (Chen & Pu, 2012)."]} +{"14241242|7919236": ["The importance of increasing user control over the recommendation process and to improve user experience has recently been pointed out by several authors [18,24,33].", "These approaches are also beneficial in terms of reducing the user\u2019s cognitive effort when deciding which item to choose from a large set of mostly unknown choices [24].", "While the algorithms currently used for generating recommendations can already be considered quite mature with room only for moderate improvements [18,24], studies have demonstrated that users often desire a more active role in the recommendation process [33], and that interactive control might increase the system\u2019s transparency and acceptance."]} +{"14241242|14148655": ["Critique-based recommenders [6] increase the degree of interactivity by allowing the users to rate the recommendations concerning certain features."]} +{"14241242|1805048": ["However, the user\u2019s role in current popular recommender techniques such as Collaborative Filtering (CF) [29], is very limited.", "The method extracts latent factors from a matrix of user rating data as commonly used in Collaborative Filtering, and generates dialogs in which the user iteratively chooses between two sets of sample items.", "The only prerequisite for our approach is the availability of a standard user-item matrix 1 with numerical ratings, which is typical for Collaborative Filtering [29], the most frequently used method for generating recommendations.", "The only prerequisite for our approach is the availability of a standard user-item matrix(1) with numerical ratings, which is typical for Collaborative Filtering [29], the most frequently used method for generating recommendations."]} +{"199668753|14148655": ["(2004), Mahmood and Ricci (2009), Chen and Pu (2012), Widyantoro and Baizal (2014) and Liao et al."]} +{"204837148|18069725": ["Among all these tasks, the most relevant one to our work is the image search or recommendation [6, 13, 16, 17, 38, 47]."]} diff --git a/edge/graph_214775044.jsonl b/edge/graph_214775044.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54b5bf4eb4adf2c9a1bb546585f6cc62cde2c808 --- /dev/null +++ b/edge/graph_214775044.jsonl @@ -0,0 +1,3 @@ +{"209320294|59554672": ["Compared with common cellular networks, VANETs indicate great advantages including low communication expense, no energy constraints, excellent scalability, high self-organization and so forth [33]."]} +{"209320294|18451845": ["However, the rapid penetration of EVs in traffic scenarios and uncoordinated EV charging operations can result in huge power loss, heavy overloads and serious harmonic distortions [3], all of which are detrimental to the reliability and security of current power systems.", "tion offloading (such as charging navigation decisions) from mobile EVs, and the aforementioned middle-ware functions can be easily achieved on each MEC with low computation time, to improve coordinated V2V charging navigation services, which are regarded as a kind of delay-tolerant application [3]."]} +{"211383930|35990525": []} diff --git a/edge/graph_2147845.jsonl b/edge/graph_2147845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_214803074.jsonl b/edge/graph_214803074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c18c29c232d08115d52202070f9b96dc20848d9 --- /dev/null +++ b/edge/graph_214803074.jsonl @@ -0,0 +1,18 @@ +{"206592484|456491": []} +{"1033682|174797842": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"52138086|9176080": []} +{"59336948|14814753": [", video surveillance, human-computer interaction [11]), has been focused on developing innovative solutions for the subject matter via deep learning [21, 23, 25, 16]."]} +{"208794187|24222234": ["The sense of touch is essential for robots the same way as for human beings for performing both simple and complex tasks such as object recognition or dexterous manipulation [18\u201320]."]} +{"62841478|54437297": ["Existing approaches for fake news detection can be divided into three main categories, based on content , social context , and propagation [36, 44]."]} +{"49742704|17485266": ["However, we studied the impact of di\ufb00erent gradient based learning algorithms [20], namely RMSProp, Adam, NAdam and Stochastic Gradient Decent (SGD) [21]."]} +{"3614841|2088679": ["In 2012, Krizhevsky et al(4) introduced a deep convolution neural network (DCNN) which outperformed traditional methods by a significant margin in image classification and localization.(6) In such models, the features are learned and extracted automatically.", "Before 2012, traditional computer vision techniques based on handcrafted features were popular for medical image analysis.(6) In 2012, Krizhevsky et al(4) introduced a deep convolution neural network (DCNN) which outperformed traditional methods by a significant margin in image classification and localization."]} +{"88480532|17485266": []} +{"84846748|393948": []} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"203594043|201900417": []} +{"203594043|51893910": ["A large number of increasingly complex network architectures have been introduced to deal with the complexity and variation of the visual performance of human actions in videos [12], [30]."]} +{"203594043|14814753": []} +{"14583395|393948": ["Following [19], the activations of the network\u2019s hidden layers can be interpreted as hierarchical feature representations of the input data."]} +{"4746618|3273340": ["We refer the readers to [21] for a comprehensive survey, and summarize the main approaches below."]} +{"206597741|7185733": []} diff --git a/graph_2148612.jsonl b/edge/graph_2148612.jsonl similarity index 100% rename from graph_2148612.jsonl rename to edge/graph_2148612.jsonl diff --git a/edge/graph_215238575.jsonl b/edge/graph_215238575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..142f839fb11172e99b122ef83422b01cb3304385 --- /dev/null +++ b/edge/graph_215238575.jsonl @@ -0,0 +1,4 @@ +{"208334389|43927188": []} +{"22537783|12377645": []} +{"22537783|627405": ["Thirdly, due to the known limitations of the search engines [6], we also noticed and confirmed that the automated search missed important studies."]} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} diff --git a/edge/graph_21541119.jsonl b/edge/graph_21541119.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db10b384414bbacfbc0333b8495312d49cae2959 --- /dev/null +++ b/edge/graph_21541119.jsonl @@ -0,0 +1,2 @@ +{"15267237|6415369": ["These interdependencies can be clarified in a service blueprint [24] or in a time-based design structure matrix (DSM) [25].", "The DSM then allows a reordering of the process elements in order to avoid interdependencies between the service elements.", "These are evaluated qualitatively in a design structure matrix (DSM)."]} +{"168076209|21541119": []} diff --git a/edge/graph_215416197.jsonl b/edge/graph_215416197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..083073b4136191ede050981f880ae4ee5204a6b0 --- /dev/null +++ b/edge/graph_215416197.jsonl @@ -0,0 +1,87 @@ +{"14857609|456491": ["The topic is also covered by \u00b4Alvarez et al. (2012)."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"52181296|206583375": []} +{"5779256|17325804": []} +{"5779256|164835": ["It is also one of the common techniques for the estimation of an MT\u2019s location, which is given by [30]", "In [19], [30], with the assumption that the variances of the distance measurements are larger for NLOS FTs, the"]} +{"16402554|206583375": ["A number of techniques [4]\u2013[7] have been proposed in the last decade for robust indoor positioning."]} +{"1116542|206583375": ["IN LIGHT of numerous emerging location-aware wireless applications like cooperative communications [1] and mobile queries [2], various localization approaches based on WiFi [3]\u2013[5], UWB [6]\u2013[8], ultrasound [9], etc."]} +{"3249290|53116003": ["While we discuss the type of services that localization can provide by leveraging the IoT framework [87] in Section VII, below we present and"]} +{"3249290|4427557": ["Low Power Wide Area Networks (LPWANs) such as LoRA and Sigfox in its current shape cannot provide high localization accuracy and must be combined with other localization techniques and technologies for higher localization accuracy [156]."]} +{"3249290|6396569": ["Amundson and Koutsoukos [11] presents a survey on different localization methods for wireless sensors."]} +{"3249290|206583375": []} +{"8558052|9498511": ["RSS based indoor localisation techniques are more popular among WiFi based systems [4], because WiFi devices cannot directly measure either TOA or TDOA information due to hardware limitations."]} +{"69444615|4427557": ["results are within the range of those in [6] and [27] which reported that LP-WAN could achieve up to 20 dB improvement over cellular systems.", "Insufficient comparative studies of LPWAN technologies has been identified as one of the major barriers to potential IoT users [6]."]} +{"69444615|3494096": ["[34] 5G, LTE-M, Description of various Comparative EC-GSM cellular , LP-WANs No performance enablers & applications."]} +{"52125636|17165859": ["Another difference from [15] and [24] is that the discussion of all the key features of the VLC positioning system are tightly connected with the positioning system (i.e., channel model, multiplexing protocols, \ufb01eld of view, noise, multipath, and error).", "The work [24] focused on the positioning algorithms while many characteristics of the VLC positioning (e.g., multiplexing protocols, \ufb01eld of view, and rolling shutter effect) were only generally discussed or mentioned.", "In the article [24], an intensive effort was made to present the published literature of VLC positioning systems."]} +{"52125636|4491892": ["The PF, which is a Monte Carlo method, uses a set of weighted particles to approximate the real posterior distribution [90-93].", "Unlike KF, linearity and Gaussian distribution are not required in PF process [90-93]."]} +{"11016781|4427557": ["Low Power Wide Area Networks (LPWAN) propose to reduce the energy requirement of the mobile data connection, albeit at reduced data rates [7].", "The communication range is around 30 km outside cities and 3 km inside cities [7,9]."]} +{"18754888|7365537": ["Furthermore, RSS fluctuate significantly due to obstructions, reflections [4], and multipath effects [5]."]} +{"18754888|14290416": ["Wireless positioning technologies have been applied to provide long-term absolute positions [2]."]} +{"14025821|4427557": ["Raza et al summarize a few \ufb02aws of NB-IoT [2].", "In general, a trade-off between these measures and data rate has to be made [2]. device has to be obtained with minimal location error."]} +{"2608020|3054454": ["The idea of confining the area of interest inside an ellipsoid shape has been presented in the literature primarily for studying the mulitpath scattering [15]."]} +{"52121943|512561": ["the cognitive radio can only use the frequency band with their cognitive ability [248], [249]."]} +{"52121943|6556803": ["[30] reviewed the localization methods to address data transfer, topology formulation, power optimization, resource optimization, sensing coverage, object discovery and security challenges."]} +{"52121943|6939676": ["[24] have evaluated localization strategies as"]} +{"52121943|11732290": ["imaging [240], Computer Aided Tomography (CAT) [242], 3D Magnetic Resonance Imaging (MRI) [241], 3D X-ray [239] and hybrid RF [243]."]} +{"52121943|6396569": ["Mobile WSNs are analyzed and classified by Amundson and Koutsoukos [13]."]} +{"52121943|1230643": ["\u2018Things\u2019 refers to device or sensors that sense physical world signals and records it in digital forms [1]."]} +{"52121943|34657644": ["As discussed, the majority of survey is only based on either range-based and range-free [11], [19], [25], [29] or Centralized", "[25] have studied localization approaches based on different range measurement techniques."]} +{"16251944|206583375": []} +{"53440106|206870493": ["For example, optical tracking systems achieve great accuracy, but their tracking accuracy is highly susceptible to light and sight [2]."]} +{"9945281|1113420": ["Luckily, however, surveys of the most prominent challenges and issues in ubiquitous computing have shown that it is sufficient to localize a user within room-level accuracy for almost all applications [1, 3, 6, 12, 15, 30]."]} +{"21111781|17325804": ["Thus, the location fingerprinting technique is developed to provide a high accuracy in a challenging indoor environments [4], [5], [6], [7]."]} +{"198481446|10089999": ["To avoid this labor intensive work, recent studies focus on building the radio map with less effort by crowdsourcing [16], [17], where any user can contribute to the RSS database."]} +{"44068413|17325804": ["[19] 2008 Wireless Survey of positioning algorithms and theoretical limits for wireless networks."]} +{"44068413|164835": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "For instance, the use of registration update messages in the IS-95A standard was proposed in [7] for time-based localization, called reverse link."]} +{"44068413|13372227": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "As an example, several survey articles [6]\u2013[10] reviewed the challenges and performance of cellular positioning in April 1998.", "way system (IVHS) applications [5] or to support emergency services based on proprietary location solutions [6], such as Grayson Wireless with a joint TDoA and AoA solution or"]} +{"44068413|206583375": ["On the one hand, fingerprinting techniques are typically implemented in WLAN systems [15], [18], [20], [26], to take advantage of"]} +{"27824087|7365537": []} +{"27824087|14290416": []} +{"56597680|52125636": ["In contrast, robust indoor positioning remains an open issue due to factors such as the degradation of GNSS signals in deep indoor areas, the complexity of indoor environments and the diversity in low-cost devices and system deployments [3]."]} +{"56597680|10089999": ["Crowdsourcing based on DR data has also been researched [20], [21]."]} +{"15699494|4716814": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"15699494|1932843": ["Reinforcement learning has been widely applied in robotic tasks [16], [17]."]} +{"9424941|17325804": ["Radio irregularity is a common occurrence in wireless environments [40], [45], [46]."]} +{"9424941|206583375": ["Equation (11) is used to reshape the array in (10) into a row vector \u03a6 with M \u00b7 q elements, where\u03c61 = \u03c81,r [1], \u03c6q = \u03c81,r [q], \u03c6q+1 = \u03c82,r [1], and\u03c6M\u00b7q = \u03c8M,r [q].", "L OCATION awareness has become a crucial concern for various mobile applications [1]\u2013[7]."]} +{"53439908|7365537": ["Hence, many approaches that provide indoors positioning information have been developed [1].", "Many locators [1], [7], [10]\u2013[12], [19] use this method."]} +{"50789172|4427557": ["Several technologies are emerging to support such transmissions [2]."]} +{"45130498|1932843": ["Real world tasks have also been a target for RL algorithms, especially for difficult perception and control problems in robotics [8]."]} +{"18407461|10817088": ["A recent survey on ambient intelligence in health care [1] illustrates the wide range of applications that could be supported by a cm-accuracy indoor positioning system alone: activity recognition, behavioral pattern discovery, anomaly detection, and decision support methods can all be based on such a sensor modality.", "60 IEEE SIgnal ProcESSIng MagazInE | March 2016 | before/during/after meals) or as an orthotic and rehabilitation tool for individuals suffering from cognitive decline, geofencing for people with dementia, and even as a navigation aid for visually impaired (see [1] and the references therein)."]} +{"6048302|3330461": ["MIP methods find application in industrial and agricultural production plants (when only integral quantities can be produced), scheduling of transport routes, and resource allocation problems in cellular and D2D networks [20]."]} +{"57755243|4427557": ["(LoRa) [4]."]} +{"202151206|52125636": ["A detailed review of these solutions is given in [12] and [13]."]} +{"202151206|17165859": ["A detailed review of these solutions is given in [12] and [13]."]} +{"2945349|468992": ["A Mobile Robot Swarm is a new strategy that describes the coordination of multi-robot systems collaboratively accomplishing a speci\ufb01c task, or set of tasks, in an ef\ufb01cient and autonomous manner, within an unknown environment [19]."]} +{"2305273|1932843": ["Previous work on Reinforcement Learning typically do not consider highdimensional perceptual inputs [48]."]} +{"17141050|4716814": ["More recently, there have been several attempts at combining task transfer with Deep RL [19], [20], [21], [22], [23], [24]."]} +{"17141050|1932843": ["Although individually the problems of SLAM, localization, path planning and control are well understood [1], [2], [3], and a lot of progress has been made on learning control [4], they have mainly been treated as separable problems within robotics and some often require human assistance during"]} +{"206859661|17325804": ["IN recent years, there has been a great deal of interest in research towards localization of wireless devices [2], [3]."]} +{"32351014|17325804": ["In range-based techniques, the range estimates used for source localization are typically based on either received signal strength (RSS), time-of-arrival (TOA), time-difference-of-arrival (TDOA), angle-of-arrival (AOA), or their combinations [1], [2].", "Despite the similarity of the geometric shapes to those found in trilateration approaches [1], we show here that the geometry and redundancy of the circles are very different."]} +{"167746|17325804": ["1) Normal distribution: Assuming a normal distribution with mean \u00b5 and variance \u03c32, the likelihood function is given by (Gezici, 2008):\np(r | u) = 1 (2\u03c0)Nanc/2 |C|1/2\nexp ( \u22121\n2 (r \u2212 f(u)\u2212 \u00b5)TC\u22121(r \u2212 f(u)\u2212 \u00b5)\n) (7)\nwhere C = diag(\u03c321, \u03c3 2 2, . . . , \u03c3 2 Nanc ) is the covariance matrix for r in case\u2026"]} +{"73496974|46642131": []} +{"73496974|206583375": ["Many different systems have been proposed during recent years [3,24]: based on computer vision [24], radio waves such as ultrawideband (UWB) [25] or radio frequency identification (RFID) [26], ultrasounds [27], optical signals [28], and, more recently, new approaches based on inertial measurement units (IMUs) [10,29,30] and radio frequency (RF) communications networks such as global system for mobile communications (GSM) or wireless local area network (WLAN) [31]."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"30245160|206583375": ["The indoor position tracking has received a great deal of attention for location-based services such as indoor navigation, retail, and entertainment services [1]."]} +{"66962033|206583375": ["1 shows such elements might be associated with a three-tier architecture [2].", "In the future of communication systems, location information can bring many benefits such as the autonomous organisation of sensors or devices in ad hoc networks [2]."]} +{"169663059|4427557": ["10+ years of battery lifetime [3]) and inexpensive, with the cost of a radio chipset being less than 2e and an operating cost of 1e per device per year [4].", "220 MHz is divided into 400 orthogonal 100 Hz channels (among them 40 channels are reserved and not used) [4]."]} +{"182617035|26259297": ["MIMO channel estimation problem has been studied in [12, 13, 14], where their algorithm developments are based on specular reflection models and p(\u03b8l) = \u03b4(\u03b8\u2217 l \u2212 \u03b8l)."]} +{"182617035|8323234": ["Indeed, large-scale antenna system does not only offer advantages in communications by assigning the same time-frequency resources to multiple users, it also has the potential for localization, due to its high angular resolution [7, 8, 9]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"58675778|7365537": ["\u2026for the promotion of WiFi positioning include the dependency on the availability and geometric distribution of WiFi signals [8]; \ufb02uctuation [9], attenuation and multipath effects on received signal strength (RSS) [10]; low update rate of WiFi chips in consumer products, and the existence\u2026"]} +{"58675778|14290416": ["In addition, the need for frequent updates and maintenance of the database is also an important factor limiting the use of WiFi localization [12]."]} +{"53098783|21386749": ["Localizing people and objects in a precise and accurate way is a key requirement for future location-aware Internet of Things (IoT) applications such as assisted living [54], health care [20], and robot navigation [14, 24]."]} +{"9912202|9932808": [", \u03b3\u0302tls [11]."]} +{"1796185|2835258": ["\u2026\nHeemin Park and Mani B. Srivastava Networked and Embedded Systems Lab Electrical Engineering Department \nUniversity of California, Los Angeles {asavvide,hmpark,mbs}@ee.ucla.edu ABSTRACT The recent advances \nin MEMS, embedded systems and wire\u00adless communication technologies are making the\u2026"]} +{"2491540|164835": []} +{"43925233|5476476": ["\u2026systems proposed in the literature, such as those based on GPS (Gowdayyanadoddi et al. 2015), RFID (Zhao et al. 2017), infrared (Vidal and Lin 2016), ultrasound (Hammoud et al. 2016), WLAN (Khalajmehrabadi et al. 2016), Bluetooth (Gu and Ren 2015), and other approaches (Yassin et al. 2016)."]} +{"52118409|141366": []} +{"52118409|46642131": []} +{"52118409|10089999": []} +{"6032843|164835": ["OVER the past few decades, localization technology has been investigated extensively and numerous applications have been proposed in various wireless systems [1]\u2013[8].", "In cellular systems, the location information of mobile terminals (MTs) is collected to improve radio resource management, mobility management, and overall cellular system design [1]."]} diff --git a/edge/graph_215548006.jsonl b/edge/graph_215548006.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3f0a3a85f76a9cfa0e9e02d7224bd9f2ed08432 --- /dev/null +++ b/edge/graph_215548006.jsonl @@ -0,0 +1,15 @@ +{"1114067|20905429": ["To sustain bio-signal processing workloads [14] at ultralow power levels, a number of domain-specific processors have been proposed, usually operating at Near-Threshold"]} +{"10043111|3540699": ["264 describes the lossy compression of a video stream [25] and is also part of ISO/IEC MPEG-4."]} +{"204728876|2874621": []} +{"4382018|282697": ["First, like VLIW architectures [Rau and \nFisher 1993], the placement of instructions onto ALUs is encoded into the instruction stream."]} +{"18924739|1188683": []} +{"51557856|13268141": []} +{"51557856|582949": []} +{"6163322|1188683": ["Research efforts have shown the advantages of FPGA accelerators in a wide range of application domains [1]."]} +{"1681133|1188683": ["According to the terminologies in the literature [4]\u2013[6], RA, including FPGAs, can be classified according to the configuration in three distinct models as single-time configurable, statically reconfigurable, and dynamically reconfigurable.", "[6] discussed reconfigurable architectures containing heterogeneous computation elements, such as CPU and FPGA, and compared several fine- and coarse-grained architectures with partial and dynamic configuration capability."]} +{"11426966|1188683": ["Among these overlays, CGRA overlays are particularly suitable for compute intensive loop acceleration as demonstrated by numerous prior works [38], [39]."]} +{"6022816|1188683": ["SCGRA overlay provides unique advantages on compromising hardware implementation and performance for compute intensive nested loops as demonstrated by numerous ASIC CGRAs [21], [22]."]} +{"131771552|3273340": ["To read the non-zero weights from a speci\ufb01c column, e.g., column 1 (assuming indexing starts from 0), the PE \ufb01rst reads address[1] and address[2] from the address vector in the CSC compressed weights, which gives the inclusive lower bound and non-inclusive upper bound of the addresses, i.e., 2 and\u2026", "In addition, there has been an increasing effort to reduce the computational complexity of DNNs, particularly for those targeted at mobile devices [2]."]} +{"16853216|17287266": ["To solve this, one approach is to use two Benes network in series [17]."]} +{"3416640|11977718": ["Space limitations preclude a detailed review of prior architectures and the interested reader is referred to excellent survey articles [7], [8], [9], [10], [11]."]} +{"3416640|8073217": ["CGRAs have been studied in academia for over a decade, and a variety of different architectures have been proposed [1]."]} diff --git a/edge/graph_215548799.jsonl b/edge/graph_215548799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d474d75d0c8c9e318507f83cf7fb991772c60f96 --- /dev/null +++ b/edge/graph_215548799.jsonl @@ -0,0 +1,7 @@ +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"3531095|393948": ["Deep Neural Network takes a feedforward-Back Error Propagation strategy to learn features and classifiers simultaneously, from large scale of training samples [15, 25, 20, 23, 2]."]} +{"1033682|174797842": []} +{"21277286|3330313": ["Outlier detection techniques [ Hodge and Austin, 2004 ] could be employed if we treat unseen class instances as outliers.", "The outlier detection problem [ Hodge and Austin, 2004 ] requires the identi\ufb01cation of anomaly instances from a given data set."]} +{"3630237|10657013": ["[21] outline ways to extend existing closed set intrusion detection approaches for open set scenarios."]} +{"24089567|3330313": ["As mentioned by Hodge and Austin (2004), a Type-3 method \u201caims to de\ufb01ne a boundary of normality\u201d.", "As presented by Hodge and Austin (2004), there are three fundamental approaches for the problem of outlier detection: Type 1 \u201cDetermine the outliers with no prior knowledge of the data."]} +{"3641676|11608263": ["Note that although multi-label classification (Huang et al., 2013; Zhang and Zhou, 2006; Tsoumakas and Katakis, 2006) may also leverage multiple sigmoid functions, Eq."]} diff --git a/edge/graph_215548987.jsonl b/edge/graph_215548987.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..564f3a7579a90070285e59a6f921a7ce8648d78e --- /dev/null +++ b/edge/graph_215548987.jsonl @@ -0,0 +1,7 @@ +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"201126242|1083483": ["r privacy in machine learning, there are many other privacy de\ufb01nitions, such as k-anonymity [36], d-presence [81] and distance correlation [117], that may be applicable to different learning problems [118]. 10 !"#$"# %"$&'"! (a) Federated learning without additional privacy protection mechanisms. !"#$"# %"$&'"! (b) Global privacy, where a truste"]} +{"201126242|20905429": ["te nature of the data and the limited connectivity of each device. Federated learning methods can help to train models that ef\ufb01ciently adapt to changes in these systems while maintaining user privacy [84, 98]. 1.1 Problem Formulation The canonical federated learning problem involves learning a single, global statistical model from data stored on tens to potentially millions of remote devices. We aim to le"]} +{"73729063|3536399": ["For example, to attack a victim black-box model, the adversary needs to build a substitute model for generating adversarial examples [16, 17, 20, 21], while the similarity of characteristics between substitute and victim models strongly impacts the effectiveness of these adversarial examples\u2026", "Despite the rising opportunities for DNNs to bene\ufb01t our life [13], the security problems introduced by DNN systems have emerged as an urgent and severe problem , especially for mission critical applications [14\u201317]."]} +{"20714|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} +{"27807436|393948": ["where, u 1\u20444 W \u00f01\u00de; b\u00f01\u00de;W \u00f02\u00de; b\u00f02\u00de is the parameter set, both the encoder function and the decoder function adopt the Sigmoid function [34]: sf\u00f0x\u00de 1\u20444 1=\u00f01\u00fe e x\u00de, represents the multi-dot product of two tensors, i,e."]} +{"197678286|20905429": ["The paradigm has found widespread applications ranging from mobile apps deployed on millions of devices [6, 87], to sensitive healthcare applications [40, 73]."]} diff --git a/graph_2155716.jsonl b/edge/graph_2155716.jsonl similarity index 100% rename from graph_2155716.jsonl rename to edge/graph_2155716.jsonl diff --git a/edge/graph_21557844.jsonl b/edge/graph_21557844.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a2e574714f73edede6acf677d07cc0eae15e49f --- /dev/null +++ b/edge/graph_21557844.jsonl @@ -0,0 +1,16 @@ +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"19088651|21557844": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"2722298|15453366": []} +{"1539241|8909218": []} +{"20394149|21557844": ["The general forms of the CIF and CIH path loss models can be found in [9], [11], [12], [21]."]} +{"20394149|3054454": ["channel models, the statistical spatial channel model NYUSIM developed by New York University (NYU), and others [3], [4]."]} +{"3013154|3054454": ["It is worth mentioning that previous published work used intra-cluster subpaths to successfully model the indoor multipath channel [86], [87], [89]."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"206454765|8909218": []} +{"17054056|3054454": ["Previous work modeled the CIR as a function of time [65], azimuth AOA [66], [67], and both AOD and AOA azimuth/elevation angles [42]."]} +{"15000211|3054454": ["Omnidirectional channel models have widely been studied and adopted by industry and researchers around the world to assist in wireless system design, yet directional channel models are also important to properly design and implement antenna arrays to exploit spatial diversity and/or beamforming gain in multiple-input multiple-output (MIMO) systems [21], [22].", "This is different than joint time-angle distributions [21]."]} diff --git a/edge/graph_21559689.jsonl b/edge/graph_21559689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74d0e92e6aeb7f3054d473107ae3578fec70b4c9 --- /dev/null +++ b/edge/graph_21559689.jsonl @@ -0,0 +1,4 @@ +{"20743789|495481": ["Due to these three aspects, multi-spectral face recognition is regarded to have the potential to improve face recognition performance, and has attracted a lot of research interest [1, 3, 7-8].", "Multi-spectral imaging refers to the process of concurrent acquisition of a set of images, each image corresponding to a band of the electromagnetic spectrum [1]."]} +{"20743789|6028805": ["[25] provided a review of research efforts in face recognition techniques based on two-dimensional images in the visual and infrared spectra."]} +{"8175953|192934": ["From the perspective of pattern recognition, dimensionality reduction is an effective means of avoiding the \u201ccurse of dimensionality\u201d [1] and improving the computational efficiency of pattern matching."]} +{"9685024|5171123": ["As a result, one would encounter the challenging task of undersampled face recognition [1]."]} diff --git a/edge/graph_21587628.jsonl b/edge/graph_21587628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..817cb32c7ebab09b1f472917c33661a1d2e47876 --- /dev/null +++ b/edge/graph_21587628.jsonl @@ -0,0 +1,19 @@ +{"2076754|7988320": ["Three PHY layer options are de\ufb01ned for WBANs in [11]: a narrowband; ultra-wideband; and human body communications (HBC).", "The purpose of the CRA margin is to take care that there will not be unnecessary code rate changes due to channel \ufb02uctuations because the fact is that in WBANs, the channel condition can change rapidly due to human body movements.", "munication is very important in wireless sensor networks [3,4,7] and the same applies to WBANs [23] which use sim-", ", in the field of sports, healthcare, entertainment and military [23].", "In this work, the IR-UWB with OOK modulation and ED receiver will be studied because it enables low cost and low power implementations [23].", "Energy ef\ufb01ciency of the wireless communication is very important in wireless sensor networks [3,4,7] and the same applies to WBANs [23] which use similar type low-power nodes with radio transceivers."]} +{"18311420|13367219": []} +{"7854020|7988320": []} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"13638081|7854020": []} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"7291895|7854020": ["The application areas are divided into two major categories: medical (wearable and implanted systems) and non-medical (consumer electronics/personal entertainment, data transfer and command and control for interactive gaming) [2, 5]."]} +{"42497499|7988320": []} +{"42497499|7854020": ["We analysed the performance of an IEEE 802.15.6-based CSMA/CA for NB PHYs in terms of the theoretical throughput, delay and bandwidth efficiency, as presented in Table 2 [19\u201321]."]} +{"42497499|16514036": []} diff --git a/edge/graph_21604950.jsonl b/edge/graph_21604950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4d4b735b38539ea621bbcbd605a15bc99b93b64 --- /dev/null +++ b/edge/graph_21604950.jsonl @@ -0,0 +1,29 @@ +{"26640648|16403716": []} +{"17397506|11960624": ["Beside medical navigation techniques based on AR [5], various other concepts have been proposed for image guided surgery."]} +{"30904614|192934": ["These methods usually require two phases: (1) training and (2) classification [105]."]} +{"9399674|585863": [", color or intensity histograms, changes in edges) and temporal information [16]\u2013[20]."]} +{"9399674|9835525": [", color or intensity histograms, changes in edges) and temporal information [16]\u2013[20]."]} +{"12067468|10397481": ["Money and Agius [16], who recently presented a survey on video summarization, classified existing methods into internal, external, and hybrid ones."]} +{"18256551|2616070": ["Cremers et al [16] extended the ACWE model to include the variance terms for Gaussian distributions of the regions.", "Cremers et al [16] extended the ACWE model to include the"]} +{"2393709|2616070": []} +{"36937141|1099309": ["Common approaches to video representation follow the framework of the MPEG-7 standardization [2]."]} +{"1174054|14122909": ["[90], non-rigid image-to-image registration has been reviewed by Crum et al."]} +{"1174054|1720774": ["Although a static distortion can be compensated by means of calibration procedures [57], dynamic changes in surgical environment are difficult to compensate."]} +{"11960624|469744": ["Azuma described AR by its properties of aligning virtual and real objects, and running interactively and in real-time [9], [10]."]} +{"46885815|12434256": []} +{"39487304|12434256": []} +{"39487304|3330313": []} +{"3130134|2875192": ["In [14] a more recent review emphasizing the multi-dimensional (2D and 3D) and multimodality nature of the medical retrieval scenario is provided."]} +{"9180089|2875192": ["[5] provides a more recent review, emphasizing"]} +{"19867539|6536700": ["Image guidance for this type of neurosurgery is typically achieved through optical tracking and the pre-operative volumes registered to the patient [68], or using fiducial markers around the targets to provide the transformation [7]."]} +{"5949692|2080630": []} +{"12867558|11960624": ["5-33)) was significantly longer than for those who missed the findings (19(12-30)) (p=0."]} +{"12867558|469744": []} +{"1557857|18992935": []} +{"1557857|206051485": ["Goshtaby [146], and Zitov and Flusser [147]."]} +{"17570379|64404": ["265/HEVC (high efficiency video coding) [8] has been introduced and presumably will establish as state-of-the-art in the next years."]} +{"17570379|3540699": ["264/AVC [3] because it is the current state-of-the-art standard for HD video."]} +{"7864729|11960624": ["The fact that the surgeon\u2019s view of the operated scene is digitized via a stereo camera has made augmented reality (AR) in minimally invasive surgery (MIS) an very active research area since the early 2000s [2][3]."]} +{"16227658|7788290": ["work in human tracking made use of local features such as edges [15], [ 10 ] to optimize over body pose, building upon several systems for tracking rigid or low-DOF articulated 3D objects which rely upon visual contours [9], [29], [22], [28].", "The 3D pose recovery is then either formulated as an inverse kinematics problem or a constrained optimization problem, the latter formulation typically being more robust over time [ 10 ].", "Examples range from tracking rigid objects in motion [15] to tracking robot arms or hands [30], [6] to tracking one or more humans in images [ 10 ]."]} +{"13827484|1720774": ["While static error can be partially corrected (Kindratenko, 2000), dynamic error caused, e.g., by ferromagnetic material (which also contains the bronchoscope) is difficult to correct, unless combined with optical tracking (Feuerstein et al., 2009).", "While static error can be partially corrected (Kindratenko, 2000), dynamic error caused, e."]} +{"7773181|13365762": ["Our previous studies [21], [ 22 ] and literature examples such as Eidenberger [26] have shown that MPEG-7 descriptor coefficients are highly correlated, resulting in vectors with high redundancies.", "The previous standards (MPEG-1, 2, and 4) focused on coding and representation of audio-visual content but MPEG-7 focuses on description of multimedia content [ 22 ], including combinations of audio, video, speech, and graphics."]} diff --git a/graph_2160968.jsonl b/edge/graph_2160968.jsonl similarity index 100% rename from graph_2160968.jsonl rename to edge/graph_2160968.jsonl diff --git a/graph_2162062.jsonl b/edge/graph_2162062.jsonl similarity index 100% rename from graph_2162062.jsonl rename to edge/graph_2162062.jsonl diff --git a/edge/graph_21629724.jsonl b/edge/graph_21629724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea26413239e3fef6d37a87a4621eefc528a70afa --- /dev/null +++ b/edge/graph_21629724.jsonl @@ -0,0 +1,8 @@ +{"57894595|26071662": ["As for the integration problem of the data [32], we give out the integration on the basis of the decision-level, that is"]} +{"12574246|14774186": []} +{"18671721|7593875": ["For example, they can out-voting honest people throughout on the internet options [2-4].", "John Douceur was the first one who mentioned this term in computer security [1-3], in which an attacker subverts the system by creating a large number of pseudonymous identities (i.", "Consequently, it becomes a concern of numerous scientific researches [2, 3, 5-12] in the domain of OSN.", "Social network tend to be at risk of Sybil problems [2-4], in which an attacker makes numerous of fake accounts referred as Sybils, along with poisons the network with fake information."]} +{"4386840|207372751": ["Katz Index [24] and LeichtHolme-Newman Index [24], which may cost a longer time to compute.", "For each edge (u,v) \u2208 E on graph G = (V,E), we compute the following similarity metrics: Number of Common Neighbors [23] Suv = |\u0393(u)\u2229\u0393(v)| Cosine Similarity Index [24] Suv = |\u0393(u)\u2229\u0393(v)| kukv Jaccard Similarity Index [23] Suv = |\u0393(u)\u2229\u0393(v)| |\u0393(u)\u222a\u0393(v)| Adamic-Adar Similarity Index [23] Suv = \u2211s\u2208\u0393(u)\u2229\u0393(v) 1 ks .", "We can also use other similarity metrics, such as Cosine index [24] or Adamic-Adar index [23] , and combine them to obtain an overall similarity score."]} +{"1837859|2294541": ["Our evaluation shows that DSybil would continue to provide high-quality recommendations even when a millionnode botnet uses an optimal strategy to launch a sybil attack."]} +{"18436897|9828770": []} +{"16828740|11163715": ["The certificate may be a digital number [43] ,[44] or special hardware [5].", "Using Sybil identities, an adversary may access the system to gain sensitive information like passwords, personal data or can even compromise the whole system drive [44].", "The network networked society [22],[23] must therefore find new ways to connect, which also leads it open to a variety of attacks [24],[44]."]} +{"18439951|3241708": ["\u2026that, unlike its alternative, is attainable, but because (1) the guarantees it provides are in practice what nodes that engage in crowd-sourcing [Yuen et al., 2011] or cooperative P2P applications [Pouwelse et al., 2005], [Cox and Noble, 2003] need, and (2) the computational cost of providing\u2026"]} diff --git a/edge/graph_21632806.jsonl b/edge/graph_21632806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..943b7163e1403da1c9d9b508ccdb5868bd5a116d --- /dev/null +++ b/edge/graph_21632806.jsonl @@ -0,0 +1 @@ +{"482312|16378248": [", template-based, rulebased, triple graph grammars, with or without explicit control flow [2]."]} diff --git a/edge/graph_21648178.jsonl b/edge/graph_21648178.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2165257.jsonl b/edge/graph_2165257.jsonl similarity index 100% rename from graph_2165257.jsonl rename to edge/graph_2165257.jsonl diff --git a/edge/graph_21656238.jsonl b/edge/graph_21656238.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af380770a0682f4f037cb9c468d1d114ab2cb358 --- /dev/null +++ b/edge/graph_21656238.jsonl @@ -0,0 +1,13 @@ +{"53235165|987239": ["A number of survey papers have been written on the topic [15, 8, 13]."]} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"31980349|15744805": []} +{"31980349|8953108": ["45 for a comprehensive survey] is a spatially blind technique primarily based on the principle that segments of an image can be identified by delineating peaks, valleys, and/ or shapes in its corresponding intensity histogram."]} +{"1974107|14415030": ["A survey of segmentation evaluation methods that do not require manually annotated ground-truth data is provided in [114,115]."]} +{"1974107|2616070": []} +{"1974107|15744805": []} +{"61785445|15026905": []} +{"206592484|456491": []} +{"15331747|5401262": ["Several fundamental directions for the future include (1) User Understanding - learn more about the user [23] and create systems which will adapt"]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"61230801|14415030": ["Compared to edge detection method, segmentation algorithms based on region are relatively simple and more immune to noise [4, 6]."]} diff --git a/edge/graph_21661554.jsonl b/edge/graph_21661554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3104c4d51aae31233319ac4fc91255f3cb8e4b7c --- /dev/null +++ b/edge/graph_21661554.jsonl @@ -0,0 +1 @@ +{"27608288|20905429": ["Increasing interest surrounds wearable biosensors(10) which can monitor a range of biosignals including blood pressure, respiration rate and blood glucose levels.(2) Particularly important are wearable strain and motion sensors which can be used to monitor joint and muscle motion with the aim of sensing posture, movement and even breathing."]} diff --git a/edge/graph_2166540.jsonl b/edge/graph_2166540.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21683864.jsonl b/edge/graph_21683864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ae1225bd2e01c2053d4e305aeb5b7ed042b3b13 --- /dev/null +++ b/edge/graph_21683864.jsonl @@ -0,0 +1,46 @@ +{"206905945|1230643": ["WSNs are finding various applications in areas of medicine, agriculture, sports and multimedia (Akyildiz et al., 2002; Alemdar and Ersoy, 2010).", "WSNs are finding 39 various applications in areas of medicine, agriculture, sports and multimedia (Akyildiz et al., 2002; 40 Alemdar and Ersoy, 2010)."]} +{"39545617|1503157": []} +{"29021877|2509135": ["Thus in CRN, the SU can use the spectrum temporarily, which makes the SU an important component in CRN architecture [7]."]} +{"29021877|14132386": ["These kinds of consideration are not required in QoS calculation of traditional ad-hoc networks [27,28]."]} +{"25980494|26398795": []} +{"25980494|57194320": []} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"154198436|1503157": []} +{"153435763|634975": []} +{"206442285|25929315": ["The above rule (4) of joint ToA and residual CFO estimation is intuitive.", "Note that the estimation rule (4) takes the form of a two-dimensional (2-D) discrete-time Fourier transform that can be implemented by a 2-D FFT."]} +{"45904897|1503157": ["Compared with wired networks, WSNs can be installed in a wide range of environments and provide benefits in terms of cost, size, power, flexibility, and distributed intelligence [1]."]} +{"41691880|21386749": ["\u2026IoT healthcare system aims at providing a remote monitoring of a patient health status in real time, the prevention of critical patient conditions, life quality improvement of the elderly through the smart environment, medical and drugs database administration, wellbeing services, etc. [44, 45]."]} +{"110896183|1230643": []} +{"110896183|12060835": []} +{"7782639|2535224": ["In this work, the reviewed routing approaches in the literature are compared according to their features and selected working factors that are effective in data routing strategies such as mobility [23, 39, 75, 103, 117, 118, 121, 128], number of sinks [51, 52, 77, 124] and data aggregation [36, 69, 123]."]} +{"7782639|7876249": ["In such applications, patient\u2019s data must be routed reliably and in a certain period; otherwise, they are not useful [15]."]} +{"18167210|19938676": ["Nowadays, the most emerging cellular network system is 5G [46]."]} +{"18167210|21386749": []} +{"18167210|12206204": ["The 5G wireless network will mainly focus on new spectrum, multiple-input-multiple-output (MIMO) diversity, transmission access, and new architecture for capacity and connection time [1]."]} +{"18167210|2623404": []} +{"18167210|10693567": []} +{"18167210|3330461": ["We can categorize D2D communication types into inband D2D and out-band D2D as well, regarding spectrum resources [154]."]} +{"18167210|7644489": ["Furthermore, D2D communication enables new services such as public safety services, location-based commercial proximity services, and traffic offloading [153]."]} +{"18167210|3348390": ["However, the World Wide Web (WWW) was launched in 1991 to connect all computers worldwide [89, 90]."]} +{"18167210|58783012": []} +{"18167210|20905429": ["Smart health-care systems cover healthcare records [130], remote prescription [131], patient observation [132], urgent treatment [133], smart diagnosis [16], and so on."]} +{"31381421|16335158": ["Sensor-cloud computing: sensor-cloud computing refers to the on-field WSN applications empowered with cloud computing (Ojha et al., 2014; Alamri et al., 2013; Zhu et al., 2014)."]} +{"31381421|1503157": ["Among all these technologies, the agriculture domain is mostly explored concerning the application of WSNs in improving the traditional methods of farming (ur Rehman et al., 2014; Zhao et al., 2013; Wang et al., 2006; Akyildiz et al., 2002a,b; Akyildiz and Kasimoglu, 2004; Yick et al., 2008; Ruiz-Garcia et al., 2009)."]} +{"31381421|1230643": []} +{"6413114|1230643": []} +{"62490608|205286988": []} +{"13752892|16422199": []} +{"25402701|1230643": ["W IRELESS sensor networks (WSNs) for the purposes of environmental monitoring are becoming increasingly popular due to their ability to collect information at a high resolution across increasingly larger temporal and spatial scales for a declining cost per unit area [1]."]} +{"18418718|1230643": []} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"13335597|3826739": ["BS collects the data transmitted to it in order to act either as a supervisory control processor or as an access point for a human interface or even as a gateway to other networks [3,4]."]} +{"13335597|1230643": ["A WSN consists of spatially distributed sensor nodes, which are interconnected without the use of any wires [1,2]."]} +{"44966604|1230643": []} +{"13165868|1230643": ["Dynamic power management ensures that these components are usually in sleep mode and activated only when required, as the power consumption is of the same order of magnitude in the active and idle modes, and it is much less in the sleep mode [18]."]} +{"123080913|1236072": ["A survey of routing protocols in sensor networks can be found in [7], [10], [11]."]} +{"123080913|1230643": ["A survey of routing protocols in sensor networks can be found in [7], [10], [11]."]} +{"110497058|12060835": []} +{"25043073|1230643": ["In wireless sensor networks (WSNs), energy efficiency and range are essential requirements for the development of applications in precision agriculture (Akyildiz et al. 2002; Cha\u0301vez et al. 2010; Pierce and Elliott 2008; Zhang et al. 2002).", "In wireless sensor networks (WSNs), energy efficiency and range are essential requirements for the development of applications in precision agriculture (Akyildiz et al. 2002; Ch\u00e1vez et al. 2010; Pierce and Elliott 2008; Zhang et al. 2002)."]} +{"8566011|205286988": []} +{"18945948|41998167": ["The MAC protocol based on the token According to the MAC protocols based on demand assignment[11] and TDMA[12], the CMAC-T is an improved protocol combined with access on demand and stationary distribution of time slot.", "According to the MAC protocols based on demand assignment[11] and TDMA[12], the CMAC-T is an improved protocol combined with access on demand and stationary distribution of time slot."]} +{"17891937|14132386": ["Traditional SPIN is a data-centric [11] routing protocol for WSN."]} diff --git a/edge/graph_21684955.jsonl b/edge/graph_21684955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a22c064026341a9f96aa583e4ce969387ee585c4 --- /dev/null +++ b/edge/graph_21684955.jsonl @@ -0,0 +1 @@ +{"15278816|207372751": ["Generally, there are two most known maximum likelihood approaches which are Hierarchical Structure Model and Stochastic Block Model [19]."]} diff --git a/edge/graph_21685661.jsonl b/edge/graph_21685661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39d4e8c88f9b8ff4f13f94b47e8fa2743c0dc77b --- /dev/null +++ b/edge/graph_21685661.jsonl @@ -0,0 +1,20 @@ +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"3872429|11414835": []} +{"30782116|15545863": ["big data and real time analytics [11]."]} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} +{"12049975|2445817": ["Different tasks consume different kinds of resources, e.g., image processing consumes CPU resources (FLOPS) and data transmission consumes bandwidth resources (Mbps)."]} +{"22832840|9495329": []} +{"9496996|12815020": []} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"18070225|15545863": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"18070225|913718": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"26801650|18388986": ["Following many studies on data fusion [39], [40], [41], we introduce an approach on how to mix QoS data and edge server data in this section."]} +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"3119314|3767252": ["Threat model distribution for fog computing component (adapted from [64]).", "[64] presented a threat model by reviewing the scope and nature of potential attacks.", "manipulation and rogue infrastructure have been identified as possible security threats [64].", "Table 2 summarizes the threat model distribution in fog computing component as identified in [64].", "A common characteristics associated with fog computing is its deployment at the \u2018\u2018edge of the network\u2019\u2019 [64], [94], which implies that fog computing has features that make it a nontrivial extension of cloud computing."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} diff --git a/edge/graph_21686476.jsonl b/edge/graph_21686476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fa9d1d9707a2e9acdd109aacd7b90c411ee98d9 --- /dev/null +++ b/edge/graph_21686476.jsonl @@ -0,0 +1,14 @@ +{"17327992|16335158": ["Wireless sensor network (WSN) applications have been used in vital areas, such as healthcare system, military applications, building infrastructure monitoring, environmental tracking and monitoring, and manufacturing [5]."]} +{"17327992|1230643": ["Base station has large bandwidth and strong computing capability than sensors, with sufficient memory [3] [4]."]} +{"61736767|18469839": []} +{"3798371|17713112": ["In addition to the development of efficient software [13] and communication protocols, e."]} +{"3798371|16335158": ["in [22] provide a comprehensive survey of sen-"]} +{"14913343|15981390": ["Thus MAC protocols currently available depend on duty cycle control techniques (S-MAC, TMAC), random access (B-MAC, CSMA/p*) and fixed access (ERMAC) or a hybrid of both (Z-MAC) [7][11]."]} +{"14913343|12347712": ["WSNs are widely used in low bandwidth and delay tolerant applications such as healthcare monitoring [1]."]} +{"14635315|16335158": ["Alamri et al. [2] presented a detailed survey of the sensor-cloud framework, applications, and its pros and cons.", "The sensor-cloud framework refers to the advent of cloud computing [1] for enhanced monitoring of on-\ufb01eld distributed WSNs [2], [3]."]} +{"7761627|16335158": ["Of late, sensor-cloud infrastructure is being viewed as a potential substitute of traditional WSNs [9], [10].", "Sensor-cloud infrastructure is primarily a sensor-management platform that functions as an interface between the physical and cyber world [9]."]} +{"55963643|14988542": ["Data compression, efficient image data coding, cross-layer communication protocols, smart activity scheduling, and energy-efficient routing techniques are typical ways to alleviate problems faced[12-15]."]} +{"55963643|270804": []} +{"2220499|7329149": []} +{"2220499|1598350": ["T HE INTERNET of Things (IoT) [1] has become popular over the past decade."]} +{"16335158|17336376": ["Storage issues can be tackledwith the introduction of predictive storage concept proposed by the authors in [70].", "To handle these issues, the authors in [70] have proposed PRESTO architecture that enables users/clients to view the data in a single logical view which is distributed across several sensor proxies and remote sensors."]} diff --git a/edge/graph_21690024.jsonl b/edge/graph_21690024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1e541ca21956d072e44e232528b48f22f723c57 --- /dev/null +++ b/edge/graph_21690024.jsonl @@ -0,0 +1,14 @@ +{"43370769|12815020": ["Because of this, distributed approaches are prone to malfunctioning of IDS instances at the Client side [22]."]} +{"18434328|12815020": []} +{"54457270|21690024": ["Compared to research proposing novel algorithms and tools for SOC operations, e.g., [1,3,5,6,10,12\u201315], there are relatively few works engaging the actual security workers to inform these e\ufb00orts.", "The research presented here complements our work to survey the research literature on host-based intrusion detection [10]."]} +{"28522079|6952653": ["Some novel approaches for network forensics are discussed for the first time, such as network forensics server, network forensics database, network forensics agents, forensics data integration and active real time network forensic."]} +{"15265295|12815020": ["Software as a Service (SaaS) which enables users to execute provider\u2019s applications [1] such as Google apps [3].", "It provides services to its users in different ways: Infrastructure as a Service (IaaS), where the user has control over complete virtual machines [2] such as Eucalyptus, Open Nebula [3].", "Hacker can use backdoor channels to get control of victim\u2019s resources and utilize it as zombie to launch DDoS attack [3].", "Attackers target the hypervisor or VMs to access them by exploiting the zero-day vulnerabilities in virtual machines [11], prior to the developers\u2019 awareness about such exploits [3].", "In cloud environment, attacker can discover the open ports using port scanning and attack the services running on these ports [3].", "The most common intrusions that affect the CIA of cloud are the following: [3]", "Traditional network security measures like firewall are better to stop many outsider attacks but attacks from within the network [3] as well as some complicated outsider attacks (e.g. DoS and DDoS) [5]can\u2019t be tackled effectively by using such mechanisms.", "The attackers are the authorized users who try to obtain and misuse the privileges that are either assigned or not assigned to them officially [3].", "This attack violates the integrity of cloud based systems [3].", "Platform as a Service (PaaS), where the user can deploy user-created applications in cloud if the provider supports the languages, APIs, and tools used for creating application, [1] like Google App Engine, Microsoft\u2019s Azure [3]."]} +{"463368|13172512": ["A detailed survey paper about different machine learning based internet traffic classifier is presented in [ 23 ]."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"40335152|12815020": ["Such type of attack is called indirect DoS attack [8].", "For example [8], Buffer overflows are used to generate root shells from a process running as root.", "As firewall sniffs the network packets only at the boundary of a network, insider attacks cannot be detected by it [8].", "Cloud user is responsible for monitoring of HIDS deployed at a VM while cloud provider is responsible for the deployment of HIDS on hypervisor [8]."]} +{"2036736|17174635": ["There is a vast spectrum of research available on anomaly detection algorithms and can be classified as follows [10] [11]: 1) Heuristic based \u2013 estimating traffic behavior using statistical behavior of the data stream and finding statistical threshold to define normal and anomalous data flows."]} +{"2036736|12815020": []} +{"1407948|8364569": ["However, research has shown that flow-based techniques have a number of advantages and are successful at detecting a variety of malicious network behaviors Sperotto et al. (2010)."]} +{"15087039|14077778": []} diff --git a/edge/graph_21691239.jsonl b/edge/graph_21691239.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4756c8a10ba47e18db0506386fe18c92490ce591 --- /dev/null +++ b/edge/graph_21691239.jsonl @@ -0,0 +1,4 @@ +{"45545117|11988348": ["CART typically requires less data preparation than CHAID (Lee & Siau, 2001)."]} +{"206739717|206764452": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43]."]} +{"206739717|1029120": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43].", "easy task to separate pedestrians from background in an image or video sequences in the computer vision domain [38], and"]} +{"62170181|4361938": []} diff --git a/graph_2169403.jsonl b/edge/graph_2169403.jsonl similarity index 100% rename from graph_2169403.jsonl rename to edge/graph_2169403.jsonl diff --git a/edge/graph_21705502.jsonl b/edge/graph_21705502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..321dcbd330dab16c9476cc740fb06f2202e75646 --- /dev/null +++ b/edge/graph_21705502.jsonl @@ -0,0 +1,109 @@ +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"6299685|3330461": ["Our proposed protocol is specific to the memory replication traffic, and not to any uplink traffic type, and its validity is conditioned by the evolution of D2D communication technologies [11], [26], [27].", "\u2026neighbor device j performs the following:\n2.1) solicits memory replicas periodically from neighbor devices until it receives at least d = O(log(n/k)/ updated replicas ( \u2208 (0, 1)) from N \u2282 Neigh(j) neighbor devices; 2.2) aggregates all the received replicas into one compressed replica yj =\u2026"]} +{"6299685|7644489": ["Our proposed protocol is specific to the memory replication traffic , and not to any uplink traffic type, and its validity is conditioned by the evolution of Device-t oDevice Communication technologies [11], [26], [27]."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"38730704|3330461": ["Multicast D2D transmissions have already been standardized by 3GPP, whereas unicast transmissions so far have only received attention from the scientific community [13], [14]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"10344967|4427557": []} +{"2210696|10299098": ["Application/task o\u0082loading: Application o\u0084oading, both from the device to the edge and from the core to the edge, has been extensively studied [10]."]} +{"2210696|26429034": ["For instance, the mobile traffic in the business areas differ from the mobile traffic in the transport, residential and entertainment areas [11, 14, 17]."]} +{"3824458|6909107": ["The Mobile Edge Computing (MEC) concept [8] is essentially bringing the computing and storage capability from remote data centers to the mobile edge in order to reduce the network delay between end devices and computing resources."]} +{"3824458|17962754": ["One of the most common Access Control (AC) models that has been applied in the IoT system is the AC list [34], [35], where access rights/policies are listed in IoT devices."]} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"2757390|207262843": []} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"19954277|17708892": ["Due to the extensive interest in LPWANs, a number of other technologies are already deployed and in development [4]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"15343672|2387055": []} +{"6988770|8815923": ["For grasping [37], grasp stability of finger contacts can be learned from previous grasps on an object [45]."]} +{"4407487|206578224": []} +{"4407487|6909107": [", [3]\u2013[5])."]} +{"4407487|206578365": []} +{"22832840|9495329": []} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"206578131|1598350": ["The concept of smart manufacturing is based on the integration of both CPS and IIoT concepts [134]."]} +{"206578131|7278743": []} +{"9681222|19938676": ["Number of task requests per ICP 3 Sensing units per task request [1-10] Computation capacity per device [1-10] MFLOPS Storage resource units per device [10-100] MBs Sensing resource units per device [0-1] Computation capacity of Cloud Unlimited Storage resource units of Cloud Unlimited Computation capacity of Edge node 10 MFLOPS Storage resource units of Edge node 100 MBs Number of ICPs [4-24] Number of devices per ICP 3 Mobility pattern ICP Levy Flights (\u03b1 = 1) Round Trip Time Remote Cloud 80 ms Round Trip Time X2 inter-edge link 10 ms Edge coverage radius 100 m LTE Bandwidth [1.", "The efforts of academic, industrial, and standardization bodies are pushing towards the fulfillment of IoT requirements through the next-to-come fifth generation (5G) wireless systems [14], [15], [16]."]} +{"2222104|6664074": []} +{"2222104|19938676": []} +{"37985560|2871699": []} +{"37985560|365692": ["The chosen methods have been: Multiple Linear Regression (MLR) [33], Regression Tree (RT) [34], Bagged Decision Tree (BDT) [35] and Artificial Neural Network (ANN) [36]."]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"20815533|2623404": ["First adopted in datacenters, SDN is now considered for WAN, mobile networks and wireless networks [8], [9]."]} +{"3681659|21386749": []} +{"6538096|206578365": ["Computation Task and Service Model A widely used three-parameter model (see [4] and references therein) is adopted to describe each computation task m: input data size \u03bbm \u2208 [0, \u03bbmax] (in bits) that needs to be offloaded, computation intensity \u03b3m \u2208 [0, \u03b3max] (in CPU cycles per bit) indicating how many CPU cycles are required to compute one bit input data, and completion deadline Dm.", "Related Work Mobile edge computing has received an increasing amount of attentions recently, see [4] for a comprehensive survey.", "fog computing) [3] [4] are regarded as key building blocks for the next generation mobile network."]} +{"6538096|10299098": ["A widely used three-parameter model [5] is adopted to describe each computation task: input data size, computation intensity and completion deadline.", "fog computing) [3]\u2013[5] are considered as key building blocks for the next generation 5G mobile network.", "Related Work Mobile edge computing has received an increasing amount of attentions recently, see [5] for a comprehensive survey."]} +{"33864426|2623404": ["These works mainly just touch the security and privacy implications of MEC and no adequate solutions have been proposed to address all the challenges, especially when considering the interaction of MEC with other technologies, such as SDN, and NFV, within the 5G networks context.", "Traditionally, SDN and NFV although not dependent on each other, are seen as \u201cclosely related\u201d and as \u201ccomplementary\u201d concepts [5].", "In [12], the security issues of MEC have been discussed in the context of smart grids, smart traffic lights, wireless sensor networks, and SDN.", "This architecture benefits from the recent advances in Software Defined Networking (SDN) [3] and Network Function Virtualization (NFV) [4], which are natively integrated into the new and novel architecture.", "Keywords: 5G, Mobile Edge Computing (MEC), Network Functions Virtualization (NFV), security, Software Defined Networking (SDN), Small Cell (SC), virtual network function (VNF).", "As security will be a fundamental enabling factor of future 5G networks, we are concerned with identifying and mitigating security threats and vulnerabilities against a broad range of targets at the intersection of MEC with \u201cSmall Cells-as a-Service\u201d (SCaaS), SDN, and NFV.", "In this work, we focus on Small Cell (SC) BSs, which include both physical BSs as well as BSs that are virtualized via NFV and SDN technologies."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"28388578|206578224": []} +{"7329149|3348390": ["The term was \ufb01rst coined in 1998 and later de\ufb01ned as \u201cThe Internet of Things allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/ network and Any service\u201d [1]."]} +{"7329149|485843": ["Smart grid is one of the domains in which academia, industry, and governments are interested and invested significantly [72], [73]."]} +{"7329149|20905429": ["In addition to the industry IoT solutions, academic solutions in the wearable computing area are discussed in [26], [27]."]} +{"53696817|17737221": ["The non-flexible appliances are those that are associated with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "These appliances usually present burst loads (Khan et al., 2014; Ullah et al., 2013)."]} +{"53696817|16335158": ["The IoT Cloud (Alamri et al., 2013; Botta et al., 2016) will enable the long-time storage and complex analysis of this data."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"26974550|19938676": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"196065645|31245252": []} +{"196065645|6909107": []} +{"196065645|206578365": []} +{"196065645|9495329": []} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"27060711|10693567": []} +{"24596784|64404": ["In each case, the selected spherical content is first mapped onto a 2D plane [22] and then encoded using traditional video compression [23]."]} +{"20603166|6909107": ["This helps operators to increase the service quality through the effective mobility management in addition to the benefits of utilizing cloud-like resources at the edge [101]."]} +{"20603166|9436049": ["Although there are studies focus on this area [231], [232], server placement in the Metropolitan area need to be studied in detail and analyzed"]} +{"20603166|3767252": ["Because of the major differences with respect to the implementation and deployment of the mentioned proposals, the security mechanisms and underlying protocols will also vary [77].", "Therefore, MEC developments should intrinsically enable security and privacy for protecting the applications and user data at the edge server and provide an authentication system for the vehicles [25], [77], [99].", "On the other hand, any casual user such as a public place owner can deploy a Cloudlet or Fog server within a private environment [77]."]} +{"20603166|8650651": ["In the case of SDON, standardization of this interface may improve the operations to a greater level since an optical network may cover a large area consisting multiple domains [221].", "The role of the northbound interface in SDONs is still raw for the time being and research in this area is more challenging since there are multitude of interfaces that should be managed in physical and transport layers [221]."]} +{"20603166|11414835": ["virtualization are feasible for abstraction and isolation, it is observed that there is a lack of complete performance evaluation [219]."]} +{"20603166|2535224": ["ization in wireless and mobile networks is more challenging and complicated [224]."]} +{"20603166|2623404": ["Moreover, there are surveys on SDN [26]\u2013[30], Software Defined Wireless Networks (SDWN) [31], [32] and Network Functions Virtualization (NFV) [33], [34] which are the complementary technologies for improving the operations of edge servers."]} +{"20603166|10693567": ["[138], OpenFlow was firstly used for a campus network which is an inspiration to support campus-based scenarios for Edge Computing."]} +{"20603166|3042864": ["There are recent surveys on cloud computing [18], [19] and MCC [8], [20]\u2013[22].", "In [20], the mobile cloud is defined in two different ways: \u2022 Infrastructure based \u2022 Ad-hoc mobile cloud According to this classification, the infrastructure based model specifies the hardware infrastructure of cloud datacenters serving to mobile users."]} +{"20603166|10532321": ["to the data plane [135]."]} +{"1540619|3757239": ["[13] focuses on the convergence of computing, caching and communication by introducing the key technologies that are enabling the concept of mobile edge networks."]} +{"1540619|6909107": ["Mach and Becvar [14] published a thorough survey on architecture and computation offloading including reference scenarios to point out how existing concepts which might be employed to integrate MEC functionalities into existing mobile networks."]} +{"40928711|6909107": ["Optimal offloading schedules are obviously important to MEC, but yet to be established due to sophisticated stochasticity and changing availability of resources at the MEC server, random data arrival per device, and fluctuating wireless channels [5]."]} +{"40928711|206578365": ["Different from cloud computing with dedicated high-speed wired connections, MEC has all devices operate in shared wireless media which feature unpredictable channel changes, and become increasingly congested with the increase of devices [4]."]} +{"9121328|1775475": ["In [5], Chalmers et al. explain how context-awareness and missioncritical requirements would be critical issues with respect to managing Quality-of-Service (QoS) in future mobile computing environments."]} +{"44160492|7085121": ["WSNs have demonstrated exceptional features, such as flexibility, scalability, reliability, and power efficiency [11]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"7220735|2623404": []} +{"21225730|3767252": ["A comparison between MEC, fog computing and cloudlet is in [6] and a complete conceptual MEC architecture considering full functionalities, interfaces, and applications are also provided in [7]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} diff --git a/edge/graph_21712523.jsonl b/edge/graph_21712523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eafc9f58c9911cfb146463dd9bcbdba1812f2ce3 --- /dev/null +++ b/edge/graph_21712523.jsonl @@ -0,0 +1,10 @@ +{"20540560|12127373": []} +{"36967670|12127373": []} +{"13199047|12127373": ["Although these approaches have proven relatively effective for examining physiological and cognitive states in humans, issues with wearability, particularly for EEG devices, have limited the feasibility of using these systems in real-world driving conditions.", "to detect drowsiness using EEG and ECG alone, and combining both modalities to improve the performance of the system; \u2022 to propose a channel reduction paradigm to reduce the number of electrodes and to increase the practicality of the proposed technique in real driving environments.", "These measures include steering wheel movement, speed variability and standard deviation of lateral position [7\u201310].", "Although driver behavioral measures are non-intrusive, such measures have not been found to be reliable for the detection of drowsiness, because their detection capabilities are strongly affected by variations in environmental factors and driving conditions [25\u201327].", "Recent approaches for detecting driver drowsiness can be divided into four main categories: vehicle-based measures, subjective measures, driver behavioral measures and physiological measures [3].", "Other studies have also used ECG for the detection of drowsiness, and HRV derived from ECG has been used to differentiate between alertness and drowsiness [32\u201335].", "Therefore, the present study sought to examine the performance of these physiological measures in detecting driver drowsiness."]} +{"15450957|4643404": []} +{"114334354|12127373": []} +{"7263451|12127373": ["Various approaches for estimating vigilance levels have been proposed in the literature (Ji, Zhu & Lan 2004, Dong, Hu, Uchimura & Murayama 2011, Sahayadhas, Sundaraj & Murugappan 2012)."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"18160362|16362395": ["These rhythms contain delta [0-4]Hz, theta [47]Hz and Alpha [8-12]Hz components.", "The SVM technique [11], [12]uses kernel to handle non-linearly separable data.", "Besides, it has been successfully utilized in a number of synchronous BCIs [11]."]} +{"18928468|16362395": []} +{"18928468|9270553": ["In contrast to various other types of systems [7], [8], brain\u2013computer interfaces (BCIs) are effective, because they can directly evaluate the cognitive states of human beings [8], [9]."]} diff --git a/edge/graph_21713386.jsonl b/edge/graph_21713386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e1d534ff6a16ab9fe3c518b4c0bbbba9acc246c --- /dev/null +++ b/edge/graph_21713386.jsonl @@ -0,0 +1,18 @@ +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"15099960|3042864": ["Implementing VM isolation policies and VM resource introspection (by the hypervisor) helps to design profound security systems for secure VM migration [28,118,119]."]} +{"15099960|7142427": []} +{"15099960|16654832": ["applications along OS states from a desktop server to smart phone or vice versa [35].", "A cloud operator charges the customer for cloud resource usage based on the \u201cpay-as-you-go\u201d service model [35]."]} +{"2386168|62924": ["This work devises a complex cloud negotiation mechanism by using negotiation strategies and protocols in multiagent systems [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20] as the basic building blocks (Section 3)."]} +{"3472188|11238636": ["In this paper, we employ a recent proposed coalition formation mechanism [25] to do the multiple microgrid coordination.", "In this paper, to make it fit the proposed application, the mechanism in [25] is modified to integrate the proposed concept of subtask."]} +{"17179782|16654832": ["For instance, Shiraz et al. (2013) review the state-of-the-art for enabling intensive applications on SMDs.", "As discussed above, currently a number of surveys are presented in MCC and seamless connectivity which focuses a single aspect which is either MCC (Shiraz et al., 2013; Fernando et al., 2013; Dinh et al., 2013; Sanaei et al., 2013; Saeid Abolfazli et al., 2013) or seamless connectivity (Andersson, 2012; Fernandes and Karmouch, 2012; Emmelmann et al.", "MCC application such as remote processing, big data offloading, distributed application processing is prone to service degradation and demand QoS aware services (Shiraz et al., 2013; Fernando et al., 2013).", "Though the method introduces extra packet over load in the network, however applications such as big data transfer distribute application processing that requires continuous communication between mobile device and the cloud (Shiraz et al., 2013).", "In MCC, ensuring seamless connectivity in the wireless network access medium and mobile nature of SMD is a challenging research perspective (Shiraz et al., 2013).", "It employs intermediate and available wireless data networks intensively for long time while accessing the services and resources of computational clouds (Shiraz et al., 2013; Fernando et al., 2013).", "In contrast, MCC requires cloud service availability through homogenous access over the heterogeneous wireless data networks (Shiraz et al., 2013).", "As discussed above, currently a number of surveys are presented in MCC and seamless connectivity which focuses a single aspect which is either MCC (Shiraz et al., 2013; Fernando et al., 2013; Dinh et al., 2013; Sanaei et al., 2013; Saeid Abolfazli et al., 2013) or seamless connectivity (Andersson,\u2026"]} +{"21697461|16762549": ["Smart Home/City Real-time crowd control [69] [70], realtime irregularity detection of senior citizens [71] [72] Number of smartphones and surveillance cameras."]} +{"21697461|6664074": []} +{"21697461|5385031": ["[27] surveyed a wide range of economic and pric-"]} +{"21697461|21386749": ["[24] provided the state-of-the-art network architecture, applications, and industrial trends in IoT-based healthcare services."]} +{"21697461|7329149": []} +{"35934113|26675425": []} +{"4861350|3348390": ["[15] proposed a context life cycle management for IoT composed of four phases: 1) context acquisition; 2) modeling; 3) reasoning; and 4) dissemination."]} +{"4861350|1113420": ["Context-aware systems acquire different types of information for reasoning and adapt their behavior without explicit user intervention [2]\u2013[11]."]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} diff --git a/edge/graph_21716912.jsonl b/edge/graph_21716912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21717841.jsonl b/edge/graph_21717841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2ae5d4bebc9637aeb91112ed8b4f47dccfc64ba --- /dev/null +++ b/edge/graph_21717841.jsonl @@ -0,0 +1,11 @@ +{"31599568|2623404": ["A considerable effort to address these issues is the new networking paradigm called Software-Defined Networks (SDN) (Nunes et al., 2014).", "This emerging architecture promises to simplify the network management while allowing to innovate and develop on the network in simpler way (Nunes et al., 2014)."]} +{"1478875|2387055": ["There are some researches on security issues of SDN itself [15][16][17]."]} +{"17683418|2623404": []} +{"4308030|21717841": ["For future work, we plan to estimate the end-toend latency utilizing LLMP, and design a more accurate measurement module for the controller, because it is vital important for the controller to gain the links delay information([21])."]} +{"55068416|2387055": []} +{"24764375|11414835": ["(c) Modification of user privileges for application execution: Due to network virtualization, each user can treat the network with its own requirement provided with isolation [15], [61].", "Several threats to the security of the SDN architecture have been identified and discussed in [8]\u2013[15].", "The survey presented in [15] classifies the SDN-based hypervisors with reference to their centralized and distributed architectures.", "One of the possible solutions is to save the topology discovery state in the neighbor controller [15]."]} +{"24764375|2623404": ["ciency, reduced complexity, and better user experience [25].", "The infrastructure plane consists of all the network devices that communicate and share information with each other [25]."]} +{"24764375|2387055": ["There are various possible attacks in the SDN application plane which are briefly discussed as follows: (a) Unauthorized access to applications: An unauthorized access to these applications can help attackers bypass the security level of the controller [58], [59]."]} +{"15726198|10559330": ["Discussion to add qualityof-service capability to the Internet resulted in proposals such as RSVP [55], IntServ [10] and DiffServ [35], which again focussed on bandwidth provisioning."]} +{"7898359|1333339": ["SDNs have different behavioral and structural characteristics when compared to other systems in typical trust literature focusing on mobile ad-hoc networks (MANETs), Agent-based systems, social media, or typical e-commerce systems [3]\u2013[7].", "Trust in general has been extensively studied, with recent work on Bayesian, Fuzzy Logic, and Game Theoretic models [3]\u2013[7]."]} +{"7858847|2387055": ["As such, this paper extended an SDN security survey performed in [23] with a formal evaluation.", "The authors of [23] provide a survey of SDN security research."]} diff --git a/edge/graph_21726474.jsonl b/edge/graph_21726474.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2172676.jsonl b/edge/graph_2172676.jsonl similarity index 100% rename from graph_2172676.jsonl rename to edge/graph_2172676.jsonl diff --git a/edge/graph_21726903.jsonl b/edge/graph_21726903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b0d33342514bf6d7eec8647b426bf317d034612 --- /dev/null +++ b/edge/graph_21726903.jsonl @@ -0,0 +1,2 @@ +{"41340998|8212328": []} +{"113724216|8212328": []} diff --git a/edge/graph_21729113.jsonl b/edge/graph_21729113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21738890.jsonl b/edge/graph_21738890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b90a8c08aee4018273c8a1eb419319c1c85acc8f --- /dev/null +++ b/edge/graph_21738890.jsonl @@ -0,0 +1,18 @@ +{"15667455|1113420": ["Context models can be classified into six different model categories, namely Key-value models, markup scheme models, graphical models, object oriented models, logic based models and ontology based models [ 2 ]."]} +{"6757944|1113420": ["With the complexity of context-aware applications and heterogeneity of contextual data with different quality of information, it is important that context-aware applications are supported by appropriate model and reasoning of context (Baldauf et al. 2007).", "Context reasoning also involves a trade-off between complexity of reasoning and expressiveness, and description logic have emerged among other logic based representation (Baldauf et al. 2007; Baader 2003).", "Some of the bene\ufb01ts of ontologies are capability to automatically infer new knowledge about the current context, and detect possible inconsistencies in the context data (Baldauf et al. 2007).", "The Quality of Context (QoC) is any information related to the quality of contextual information that are involved in making context-aware decisions (Kim and Lee 2006; Manzoor et al. 2008; Buchholz et al. 2003; Baldauf et al. 2007)."]} +{"28333457|10500613": ["[Rahm & Bernstein 2001] E. Rahm and P. A. Bernstein."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"2187403|1113420": ["Although interesting comparisons of context models already exist [5,30, 39,45], we felt the need to establish a framework to systematically evaluate them, by defining a set of relevant, objective and rather general categories.", "Interesting surveys on context-aware systems and models have already been presented in [5, 14, 39, 45]; we contribute with a review on recent evolutions and new systems for context modeling, and challenge each model with respect to the problem of context-aware data tailoring."]} +{"206480255|14441987": []} +{"5912538|1666690": ["Unger [26] and Hauck [12] summarize timing", "Unger [26] \nand Hauck [12] summarize timing problems in sequential circuits and describe techniques for predicting \nand correcting them.", "[12] S. Hauck."]} +{"9704070|2509135": ["Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)", "spaces via cognitive radio techniques [157], e) dynamic"]} +{"9704070|12884178": ["expressive power of context representations [25], d) relay and mesh-enabled networks development with cooperative communication features in OFDMA-based wireless network technologies [126] [156] and exploitation of spectrum white", "Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)"]} +{"9704070|14745481": []} +{"16567194|1113420": ["The middleware aims to manage different aspects of context and location management as well as situation reasoning and other related tasks."]} +{"16567194|2835258": ["We discuss implementation and experimentation issues of the framework in personal digital assistance (PDA) devices which form the ad hoc network as proof-of-concept of the framework."]} +{"7993325|1775475": ["service provision in a mobile computing environment [30]."]} +{"7055296|1634674": ["One way is using cameras to visually detect people\u2019s motion [8, 7]."]} +{"7055296|17516538": ["One way is using cameras to visually detect people\u2019s motion [8, 7]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_21739998.jsonl b/edge/graph_21739998.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bbcefc8b6b48f4664375001e73a945b264e5dfd --- /dev/null +++ b/edge/graph_21739998.jsonl @@ -0,0 +1 @@ +{"14940249|468992": [", 2011), robotics (Brambilla et al., 2013), social transport (Helbing, 2001), soft matter (Marchetti et al.", "\u2026field and to explore its applications in a diverse set of disciplines such as statistical physics (Ramaswamy, 2010), biology (Viswanathan et al., 2011), robotics (Brambilla et al., 2013), social transport (Helbing, 2001), soft matter (Marchetti et al., 2013), and biomedicine (Wang and Gao, 2012)."]} diff --git a/edge/graph_21755580.jsonl b/edge/graph_21755580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fb8233d1a4faf67ee4210fdc42b7577dfbf21e2 --- /dev/null +++ b/edge/graph_21755580.jsonl @@ -0,0 +1,5 @@ +{"84293659|17054454": ["Introduction Vegetation mapping is often of prime importance in monitoring, protection and restoration programs, and has therefore been the focus of many remote sensing applications (Xie et al., 2008)."]} +{"60246745|11894197": []} +{"9939192|423305": ["These approximations include the Bayesian Information Criterion (BIC) (Schwarz, 1978), which is equivalent to Risannen's (1987) Minimum-Description- Length (MDL) measure, diagonal and block diagonal approximations for the Hessian term in the Laplace approximation (Becker and LeCun, 1988; Buntine and Weigand, 1994), and an approximation suggested by Cheeseman and Stutz (1995).", "\u20261978), which is equivalent to Risannen's (1987) Minimum-Description- Length (MDL) measure, diagonal and block diagonal approximations for the Hessian term in the Laplace approximation (Becker and LeCun, 1988; Buntine and Weigand, 1994), and an approximation suggested by Cheeseman and Stutz (1995)."]} +{"587699|62532103": ["There are extensions of AIC which have an adjustment related to the e\ufb00ective number of parameters (see Vehtari and Ojanen, 2012, section 5.5, and references therein) but these are seldom used due to stability problems and computational di\ufb03culties, issues that have motivated the construction of the\u2026", "Vehtari and Ojanen (2012) discus di\ufb00erent prediction scenarios where the future explanatory variable \u02dc x is assumed to be random, unknown, \ufb01xed, shifted, deterministic, or constrained in some way.", "However, when these methods are used for model selection, the predictive performance estimate of the selected model is biased due to the selection process (see references in Vehtari and Ojanen, 2012).", "\u2026posterior distribution rather than a point estimate), gives reasonable results in the examples we have considered here, and has a more-or-less explicit connection to cross-validation, as can be seen its formulation based on pointwise predictive density (Watanabe, 2010, Vehtari and Ojanen, 2012).", "WAIC is fully Bayesian (using the posterior distribution rather than a point estimate), gives reasonable results in the examples we have considered here, and has a more-or-less explicit connection to crossvalidation, as can be seen its formulation based on pointwise predictive density (Watanabe 2010; Vehtari and Ojanen 2012)."]} +{"13863600|62532103": ["In essence, these scoring rule characteristics guarantee that the predictive score adheres to the chosen model and data (Vehtari and Ojanen 2012, Gelman et al. 2014b).", "Understanding this approach requires a familiarity with statistical decision theory, which we describe briefly here, referring the interested reader to more comprehensive references (e.g., Berger 2006, Vehtari and Ojanen 2012) for further details."]} diff --git a/edge/graph_21766170.jsonl b/edge/graph_21766170.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..def4d984b1901134cc5f26eb738546a10ff7bafc --- /dev/null +++ b/edge/graph_21766170.jsonl @@ -0,0 +1,7 @@ +{"15471179|9270553": []} +{"9303877|9431428": []} +{"11299419|9270553": ["Although the importance of feedback for BCI performance has been known for many years (Neuper et al., 1999; Wolpaw et al., 2000) the effect of feedback based on one modality has hardly been validated with a second, feedback-independent modality."]} +{"5835640|9431428": ["SVM or RVM) to neuroimaging data (Bray et al. 2009; Cheng et al. 2012; De Martino et al. 2008; Duchesnay et al. 2007; Duchesnay et al. 2004; Duff et al. 2011; Franke et al. 2010; Liu et al. 2012; Lohmann et al. 2007; Mitchell et al. 2004; Mwangi et al. 2012a; Norman et al. 2006; Pereira et al. 2009; Rizk-Jackson et al. 2011; Schrouff et al. 2013; Valente et al. 2011; Van De Ville and Lee 2012).", "Through permutation methods (Kriegeskorte et al. 2006; Pereira et al. 2009), the searchlight accuracies at every voxel are converted into p-values, which are subsequently thresholded to remove non-relevant voxels.", "In this review, we assume both (training and testing datasets) have been adequately separated using a cross-validation procedure such as hold-out or leave-one-out which are explored elsewhere (Johnston et al. 2012; Pereira et al. 2009; Strother et al. 2002; Theodoridis and Koutroumbas 2009)."]} +{"5835640|7761990": []} +{"5835640|11894197": []} +{"32991711|9431428": []} diff --git a/graph_2177212.jsonl b/edge/graph_2177212.jsonl similarity index 100% rename from graph_2177212.jsonl rename to edge/graph_2177212.jsonl diff --git a/edge/graph_21776617.jsonl b/edge/graph_21776617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21783963.jsonl b/edge/graph_21783963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d35a42e49dd595ade61555bdccbcf036f6d17c41 --- /dev/null +++ b/edge/graph_21783963.jsonl @@ -0,0 +1,3 @@ +{"1066255|21783963": ["As mentioned in the Introduction, see [BCP16] for a comprehensive survey of various types of time consistency and connections between them.", "3 for stochastic processes (see [BCP16]) we get", "[BCP16], where we provide a comprehensive literature overview, present various examples of dynamic LM-measures, update rules and different types of time consistency, such as middle time consistency, strong time consistency, supermartingale time consistency etc.", "5 for the case of stochastic processes see [BCP16].", "In particular, it allows for in depth comparative analysis of (most of) the existing types of time consistency \u2013 a feat that has not be possible before and which is done in the companion paper [BCP16] to this one.", "As it turns out, this simple and intuitive definition of time consistency, with appropriately chosen \u03bc, will cover various cases of time consistency for risk and performance measures that can be found in the existing literature (see [BCP16] for a survey).", "Such study is done in the companion paper [BCP16]."]} +{"207033365|13227763": ["A literature review of this model is given in [23]."]} +{"35221660|21783963": []} diff --git a/edge/graph_2178565.jsonl b/edge/graph_2178565.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2181694.jsonl b/edge/graph_2181694.jsonl similarity index 100% rename from graph_2181694.jsonl rename to edge/graph_2181694.jsonl diff --git a/graph_2182386.jsonl b/edge/graph_2182386.jsonl similarity index 100% rename from graph_2182386.jsonl rename to edge/graph_2182386.jsonl diff --git a/edge/graph_21841235.jsonl b/edge/graph_21841235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9605cd6d1351500671e66c3f518cb5893ff13fe6 --- /dev/null +++ b/edge/graph_21841235.jsonl @@ -0,0 +1 @@ +{"15035750|7439310": []} diff --git a/edge/graph_2185499.jsonl b/edge/graph_2185499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2186746.jsonl b/edge/graph_2186746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2187403.jsonl b/edge/graph_2187403.jsonl similarity index 100% rename from graph_2187403.jsonl rename to edge/graph_2187403.jsonl diff --git a/edge/graph_21875534.jsonl b/edge/graph_21875534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8ce22312b8fcb252793868c17471c0d9e4c65f5 --- /dev/null +++ b/edge/graph_21875534.jsonl @@ -0,0 +1,3 @@ +{"18436837|17381415": ["converter-based DER units need phase-locked loop (PLL) with negative sequence filtering [16], [23] or some other stable and reliable synchronization method with FRT capability (see [35] and [36])."]} +{"2151697|31086789": []} +{"503375|12083425": []} diff --git a/edge/graph_21880010.jsonl b/edge/graph_21880010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5430512db90755d3e50dac62cdec536c1f98b3d2 --- /dev/null +++ b/edge/graph_21880010.jsonl @@ -0,0 +1 @@ +{"33487046|6392800": []} diff --git a/edge/graph_21881522.jsonl b/edge/graph_21881522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2188672.jsonl b/edge/graph_2188672.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21898569.jsonl b/edge/graph_21898569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97076afc35150bb5f164edf105ecaecc85546895 --- /dev/null +++ b/edge/graph_21898569.jsonl @@ -0,0 +1 @@ +{"119845198|1704452": []} diff --git a/edge/graph_219028.jsonl b/edge/graph_219028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21930333.jsonl b/edge/graph_21930333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a672476d8e9f3447acbc08a5ce0b56fe198ba9a --- /dev/null +++ b/edge/graph_21930333.jsonl @@ -0,0 +1,19 @@ +{"1654125|7686677": ["Green cellular networks powered by renewable energy sources is a key objective for mitigating energy crisis in the future [1]."]} +{"206454765|8909218": []} +{"13007404|7851743": ["It is therefore relevant to explore the use of other simpler selforganizing techniques such as docitive learning and cellular automata [112] which use limited inter-cell cooperation in"]} +{"13007404|7686677": ["A more comprehensive survey of the recent techniques proposed with the aim of reducing the energy consumption in cellular networks is given in [12].", "management in cellular networks, similar to the topic treated in [9]-[12]."]} +{"13007404|2833151": ["For performing resource allocation at the physical layer, the authors of [8] provide a clear theoretical foundation to characterize the EE"]} +{"13007404|8280144": ["While the concepts from stochastic geometry have been traditionally applied to study ad hoc networks since the 1990s [91], it is only in recent years that some studies have considered its applicability in cellular networks."]} +{"13411709|10693567": ["The H-CRAN based 5G systems have capabilities to provide anytime, anywhere gigabit data rate service to the desired user equipments (UEs), where an \u201cedgeless\u201d experience to UEs is provided under the help of heterogeneous MBSs and ultra dense RRHs. Based on cloud computing technologies, the\u2026", "In addition, Node C has a powerful computing capabilities to execute the large-scale cooperative signal processing in the physical layer and large-scale cooperative networking in the upper layers."]} +{"44757681|8909218": ["Considering the fact that 50 percent voice and 70 percent data service occur in indoor environments [2], the femtocell is a very promising technology to expand the coverage of cellular networks and improve QoS."]} +{"1423589|7686677": ["ional University of Singapore (e-mail: elezhang@nus.edu.sg). 2 (HetNets). The power consumption of a HetNet comes from both the macro-cell base stations (MBSs) and the small-cell base stations (SBSs) [1]. Researchers have paidmuch attention to study power saving at the MBS side, by dynamically changing the MBSs\u2019 on and off states to meet the stochastic traf\ufb01c (see, e.g., [2], [3]), but very few work "]} +{"10244102|7686677": []} +{"31407073|8909218": []} +{"206486152|8909218": ["\u2022 Femto-cells and indoor distributed antenna systems usingMIMO channel: This architecture is used to reduce co-channel interference introduced by frequency reuse among the femto cells and maintain high spectral efficiency [15]."]} +{"1678110|7686677": ["Asa result, energy saving, or energy efficiency (EE), becomes a rising concern for the design of wireless networks [12], [13]."]} +{"14959264|7686677": ["H. Shin is with the Department of Electronics and Radio Engineering, Kyung Hee University, Gyeonggi-do 446-701, Korea (e-mail: hshin@khu.ac.kr) (corresponding author)."]} +{"14959264|8909218": ["A heterogeneous network uses a mixture of macrocells and small cells such as microcells, picocells, and femtocells."]} +{"3080125|7686677": ["2520221 economic impacts, thus triggering the emerging research area called \u201cgreen cellular networks\u201d [3]."]} +{"15706046|7686677": []} +{"7921587|8909218": ["layout of micro-sites [48]\u2013[51], picocells and femtocells [52]\u2013[58], and CoMP technology [59] as well as the new", "Heterogeneous Networks [44-61] Network architecture design", "A detailed description of femtocellular networks from both the technical and business aspects can be found in [58], where the challenges of implementing these networks and some potential research opportunities are also introduced.", "The energy-efficient MIMO and OFDMA schemes in multi-cell scenarios need to be further investigated. only BS site Not introduced in this paper - Service Differentiation [42,43] both BS site and Terminal site - Heterogeneous Networks [44-61] Network architecture design Relay and Cooperative Communications [62-71] both BS site and Terminal site - MIMO [72,73,75] both BS site and Terminal site - - [28,29,74,76-78] only Terminal site OFDMA [81,82,84] both BS site and Terminal site - [32,79] only BS site [80,83] existing work only considers the single cell scenarios.", "It is indicated in [58] that femtocellular networks must deal with additional timing and synchronization, as well as interference management issues, which cause more signaling overhead and potentially more energy consumption."]} +{"7921587|16629628": []} diff --git a/edge/graph_21947084.jsonl b/edge/graph_21947084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_21955893.jsonl b/edge/graph_21955893.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07a153b526f5e3512c8b1defc20208567292792e --- /dev/null +++ b/edge/graph_21955893.jsonl @@ -0,0 +1,4 @@ +{"1033682|174797842": []} +{"18726425|393948": ["Firstly, DNNs are a powerful framework for learning representations [15] from multiple sources of information, acting as a cascade of nonlinear feature extractors (followed by a log-linear classifier)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"206742471|8777381": ["It is well accepted amongst the research community that certain acoustic and prosodic features play an important role in recognising the affective state [28]."]} diff --git a/edge/graph_21962344.jsonl b/edge/graph_21962344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b70c7a52fedaddca1e8357aaddd3cd7154f68937 --- /dev/null +++ b/edge/graph_21962344.jsonl @@ -0,0 +1,9 @@ +{"15592556|2082499": []} +{"15124992|8125630": []} +{"11438116|7971188": ["To make Gaia more scalable with more data centers, we use the concept of overlay networks [48]."]} +{"21644355|18212759": ["Many other surveys of cloud computing are available (e.g., [8\u201310]) with more breadth but much less technical detail on the application of MapReduce to multimedia computations."]} +{"7783255|8125630": ["Data warehouses [9, 14] provide OLAP support for mining and analyzing large scale data."]} +{"3166380|16920842": []} +{"15335836|12817488": ["In sensor networks, aggregation is often performed over a hierarchical topology to improve energy e\ufb03ciency and network longevity [18, 24], whereas we focus on cost (tra\ufb03c) and information quality (staleness)."]} +{"26896841|17397315": ["Detailed survey on the hybrid cloud based MapReduce security may be found in [44]."]} +{"4705769|8125630": ["Data warehousing techniques [15] were then introduced to support analytical processing."]} diff --git a/edge/graph_21983610.jsonl b/edge/graph_21983610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3dff539bb383b6bbbd72dfaaf66882039ffe72bd --- /dev/null +++ b/edge/graph_21983610.jsonl @@ -0,0 +1 @@ +{"1878555|17003768": []} diff --git a/edge/graph_22018248.jsonl b/edge/graph_22018248.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df57580380d736a4cb877e1e96e76a0108a77bd4 --- /dev/null +++ b/edge/graph_22018248.jsonl @@ -0,0 +1,7 @@ +{"50721|1805048": [", memory-based CF and model-based CF approaches [22, 23]."]} +{"8278616|1230643": []} +{"4422720|1805048": ["Generally speaking, the commonly used CF methods can be categorized into two types: the memory-based method and the model-based method [47].", "Generally speaking, the model-based CF method performs better than the memory-based method because it addresses the sparsity better, improves the prediction performance, and gives an intuitive rationale for recommendations [47]."]} +{"15538672|192934": []} +{"10315032|6555395": ["Finally, we applied VBMF to a reduced rank regression (RRR) (Reinsel and Velu, 1998) task, and show the results in Figure 7.", "(28)\nThen, the likelihood of the RRR model (27) is expressed as\np(V n|A,B) \u221d exp ( \u2212 1\n2\u03c3\u20322\nn\n\u2211 i=1\n\u2016yi \u2212BA\u22a4xi\u20162 ) .", "Partial least-squares (PLS) (Worsley et al., 1997; Rosipal and Kra\u0308mer, 2006) is similar to RRR.", "For the standard ICM algorithm, the following update rule should be substituted for Equation (14):\n(\u03c32)RRR = n\u22121 \u2211ni=1 \u2016yi\u20162 \u2212 tr(2V\u22a4B\u0302A\u0302\u22a4)+ tr\n( (A\u0302\u22a4A\u0302+M\u03a3A)(B\u0302\u22a4B\u0302+L\u03a3B) )\nnL .", "(34)\nOnce the rescaled noise variance \u03c32 is estimated, Equation (31) gives the original noise variance \u03c3\u20322 of the RRR model (29).", "Taking into account of these differences, the VB free energy of the RRR model (29) with the priors (2) and (3) is given by\nFVB\u2212RRR = \u2329 logrA(A)+ logrB(B)\u2212 log p(V n|A,B)p(A)p(B) \u232a r(A)r(B)\n= \u2211ni=1 \u2016yi\u20162\n2n\u03c32 +\nnL\n2 log\u03c32 +\nM\n2 log |CA| |\u03a3A| + L 2 log |CB| |\u03a3B|\n+ 1 2 tr { C\u22121A ( A\u0302\u22a4A\u0302+M\u03a3A ) +C\u22121B ( B\u0302\u22a4B\u0302+L\u03a3B )\n+\u03c3\u22122 ( \u22122A\u0302\u22a4V\u22a4B\u0302+ ( A\u0302\u22a4A\u0302+M\u03a3A )( B\u0302\u22a4B\u0302+L\u03a3B ))} + const.", "Reduced rank regression (RRR) (Baldi and Hornik, 1995; Reinsel and Velu, 1998) is aimed at learning a relation between an input vector x \u2208 RM and an output vector y \u2208 RL by using the following linear model:\ny = BA\u22a4x+\u03b5, (27)\nwhere A \u2208 RM\u00d7H and B \u2208 RL\u00d7H are parameter matrices, and \u03b5 \u223c NL(0,\u03c3\u20322IL) is\u2026", "Thus, RRR is reduced to MF.", "Reduced rank regression (RRR) (Baldi and Hornik, 1995; Reinsel and Velu, 1998) is aimed at learning a relation between an input vector x \u2208 RM and an output vector y \u2208 RL by using the following linear model:\ny = BA\u22a4x+\u03b5, (27)\nwhere A \u2208 RM\u00d7H and B \u2208 RL\u00d7H are parameter matrices, and \u03b5 \u223c NL(0,\u03c3\u20322IL) is a Gaussian noise vector."]} +{"11216640|12127129": ["separation in video analysis [50], [51] and anomaly detection in the field of network security [52], [53], which share a common data model as we will see."]} +{"60136185|1708582": []} diff --git a/graph_2202454.jsonl b/edge/graph_2202454.jsonl similarity index 100% rename from graph_2202454.jsonl rename to edge/graph_2202454.jsonl diff --git a/graph_2204231.jsonl b/edge/graph_2204231.jsonl similarity index 100% rename from graph_2204231.jsonl rename to edge/graph_2204231.jsonl diff --git a/edge/graph_22045105.jsonl b/edge/graph_22045105.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22049490.jsonl b/edge/graph_22049490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2206212.jsonl b/edge/graph_2206212.jsonl similarity index 100% rename from graph_2206212.jsonl rename to edge/graph_2206212.jsonl diff --git a/edge/graph_22065302.jsonl b/edge/graph_22065302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2edab103269148113bc17f3b8bfbb632dbea985 --- /dev/null +++ b/edge/graph_22065302.jsonl @@ -0,0 +1,2 @@ +{"12168749|1452734": []} +{"8260170|1708582": []} diff --git a/edge/graph_2207146.jsonl b/edge/graph_2207146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2207564.jsonl b/edge/graph_2207564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22076086.jsonl b/edge/graph_22076086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e9ea75eeafc3a4d4d81b3879705f5168a25cd3b --- /dev/null +++ b/edge/graph_22076086.jsonl @@ -0,0 +1,2 @@ +{"64163408|12595430": []} +{"64163408|1507400": []} diff --git a/edge/graph_22084305.jsonl b/edge/graph_22084305.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..811e1e91d90280e69795f245f965ed10a7ce4399 --- /dev/null +++ b/edge/graph_22084305.jsonl @@ -0,0 +1,3 @@ +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} +{"207172599|3330313": []} diff --git a/edge/graph_2208818.jsonl b/edge/graph_2208818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2213096.jsonl b/edge/graph_2213096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22160216.jsonl b/edge/graph_22160216.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df0ac8c424afef530975d6f839ccc92469afaba5 --- /dev/null +++ b/edge/graph_22160216.jsonl @@ -0,0 +1 @@ +{"16602037|14799853": []} diff --git a/edge/graph_22163846.jsonl b/edge/graph_22163846.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7136c48b5219986f5508dae4ed8d51becd7d28bd --- /dev/null +++ b/edge/graph_22163846.jsonl @@ -0,0 +1,3 @@ +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"206592484|456491": []} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} diff --git a/graph_2220294.jsonl b/edge/graph_2220294.jsonl similarity index 100% rename from graph_2220294.jsonl rename to edge/graph_2220294.jsonl diff --git a/edge/graph_22203221.jsonl b/edge/graph_22203221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1e86b4c3eb77b4b98137473e320ee752c946cff --- /dev/null +++ b/edge/graph_22203221.jsonl @@ -0,0 +1,22 @@ +{"711999|9828770": []} +{"8313629|9828770": []} +{"6283712|9828770": ["In the framework of adaptive network models (Gross and Blasius, 2008), the mechanism of avoiding contact with infective acquaintances amounts to breaking the links between susceptible and infective agents."]} +{"14732469|9828770": []} +{"14732469|634975": []} +{"17507216|9828770": []} +{"1223627|634975": []} +{"121629051|634975": []} +{"1920175|9828770": ["This question comes close to the goal of adaptive network studies [162] that model the feedback from network structure (and how it affects dynamics on the network) to the success of the agents forming the network (and how they seek to change their position in it)."]} +{"17341648|9828770": []} +{"10170321|9828770": []} +{"11690006|12122055": ["[223] D'Orsogna MR, Perc M.", "To some extent, their purpose is to reduce the opponent\u2019s anonymity relative to the primitive, well-mixed situation [222-239]."]} +{"11690006|10430339": ["rock-paper-scissors [108-114], public goods [115-125], and ultimatum [126-131] games) is currently being investigated in conjunction with spatially structured populations.", "[114] Szolnoki A, Mobilia M, Jiang L-L, Szczesny B, Rucklidge AM, Perc M."]} +{"11690006|9828770": ["Lately, the co-evolution schemes [35, 80, 81, 158, 206-219], which involve the joint adjustment of individual strategies and network topology (or the updating rules), emerged as another potential promoter of cooperation (refer to [220] for a comprehensive review).", "[217] Gross T, Blasius B."]} +{"11690006|634975": ["Finally, we have not touched upon multiple interaction games, such as the public goods game [116, 286-290], which should be regarded as the extensions of pairwise games, and therefore are of importance to the universality of scaling for the dilemma strength considered herein.", "[286] Perc M, G\u00f3mez-Garde\u00f1es J, Szolnoki A, Flor\u00eda LM, Moreno Y."]} +{"17344170|634975": []} +{"16592539|9828770": ["Modelling the network response to an ongoing epidemic leads to an adaptive network, a system in which a dynamical interplay between the dynamics of the network and the dynamics on the network takes place [31, 32]."]} +{"11187861|9828770": ["7 For a first attempt, see Section 5 of [146]."]} +{"122907607|7064380": []} +{"13961767|634975": ["Very recently [328] the attention of the community has been extended to the n-player (n > 2) generalization of the PDG, also called Public Goods Game (PGG) [343]."]} +{"4525398|10430339": []} +{"4525398|634975": []} diff --git a/edge/graph_2220473.jsonl b/edge/graph_2220473.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22221919.jsonl b/edge/graph_22221919.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b72757271e3977e3e5c5bf2e91926a26595634d8 --- /dev/null +++ b/edge/graph_22221919.jsonl @@ -0,0 +1,14 @@ +{"3719923|3270620": ["Although it has been clearly discussed that the capacity-achieving decodi ng order for conventional NOMA schemes without the secrecy consideration is in the descending order of channel gains normalized by noise [29, 34], i."]} +{"3477723|3504276": ["Inspired by the fact that the near user receives strong radio signal (including desired signal and interference), it is promising to apply RF-enabled wireless energy harvesting technology [3], [4] for this near user, which facilitates the application of self-sustained devices in the IoT networks [5], such as sensor nodes and RFIDs."]} +{"8359699|3270620": ["The basic idea of NOMA is to implement multiple access in the power domain [9].", "Then, the NOMA protocol allo-cates higher powers to the users with lower CNRs [9], [28], \u2264 \u00b7 \u00b7 \u00b7 \u2264 \u2264 \u00b7 \u00b7 \u00b7 \u2264 is able to decode signals of UE i,m for i > n and remove them from its own signal, but treats the signals from UE i,m for i n as interference.", "\u2026are with the National Mobile Communications Research Lab, Information Science and Engineering School, Southeast University, Nanjing, China (email: {zhujy, jhwang, huangym, shiwenhe, xhyu, lxyang}@seu.edu.cn). the spectral ef\ufb01ciency [9], arises as a promising technology for 5G communication systems.", "In NOMA systems, SIC is performed according to the order of the CNRs of the users on one channel [9], [28], which is guaranteed by imposing an inverse order of the powers allocated to the users, i.e., p 1 ,m \u2264 p 2 ,m on channel m ."]} +{"5918010|4395259": ["Recently, physical layer security, which achieves secure transmissions by exploiting the dynamics in the physical layer, has drawn considerable attention [6], [7]."]} +{"19452680|3270620": []} +{"1142029|30430657": ["0 system, to provide higher data capacity, more robust performance, better spectrum efficiency, and to enable new services [1]."]} +{"5042549|3270620": []} +{"3957395|12060835": ["th respect to the number of users. I. INTRODUCTION Amajor limitation of untethered communication equipments is that devices operate for a \ufb01nite duration, which is limited by the lifetime of batteries [1]. To this end, energy harvesting (EH), which refers to harnessing energy from the environment or other energy sources and converting it to electrical energy, has recently received a lot of attention. "]} +{"13554665|41035405": ["A fundamental structure of cooperative systems can be traced back to the relay systems in the early works of van der Meulen [1] and Cover and El Gamal [2].", "REFERENCES [1] E. C. van der Meulen, \u2018\u2018A survey of multi-way channels in information\ntheory: 1961\u20131976,\u2019\u2019 IEEE Trans."]} +{"1344235|3270620": ["The non-orthogonal multiple access (NOMA) technique has been emerged as a promising solution to signi\ufb01cantly improve the spectral ef\ufb01ciency of the next-generation wireless networks [2]\u2013[4]."]} +{"11608218|17423404": ["Following [11, 29, 30], the channel between each MTC device and the BS is modeled by path loss, shadowing and small scale fading.", "A comparison between NOMA and OMA has been provided in [10, 11].", "In uplink NOMA multiple devices simultaneously perform transmission in a shared radio resource; therefore, their transmissions are overlapping [9, 11, 25]."]} +{"11608218|9862516": ["There are several approaches to mitigate the multi-path effect, such as time reversal (TR) strategy [31, 32], which has been recently studied for M2M communications as an effective strategy to focus signal waves in both time and space domains; thus improving system throughput and energy ef\ufb01ciency.", "These two assumptions can be well satis\ufb01ed for \ufb01xed-location MTC applications [31]."]} +{"7749855|3270620": ["In this context, nonorthogonal multiple access (NOMA), although not completely new to the wireless industry and research community [3], has been regarded as a promising radio access technology for the 5G wireless communication systems [4]\u2013[7], due to its"]} +{"10742168|12060835": []} diff --git a/edge/graph_22227042.jsonl b/edge/graph_22227042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bcc6c4b727ea71c1d437c70736e9bd39b593a5a7 --- /dev/null +++ b/edge/graph_22227042.jsonl @@ -0,0 +1 @@ +{"14594210|7839197": ["In building a new orchestrated service, we engineer a number of web services as agents performing the role of transaction coordinators, and we wrap external web services as resource provider agents."]} diff --git a/graph_2223672.jsonl b/edge/graph_2223672.jsonl similarity index 100% rename from graph_2223672.jsonl rename to edge/graph_2223672.jsonl diff --git a/edge/graph_22259070.jsonl b/edge/graph_22259070.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22352825.jsonl b/edge/graph_22352825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79a5d5f86ea2ce4dd6ebce94f6d2640f205798af --- /dev/null +++ b/edge/graph_22352825.jsonl @@ -0,0 +1,5 @@ +{"18963052|191396": ["Keywords: Tick data, Clustering, Storage"]} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} +{"8335839|8424228": ["The scale of these applications is bringing the wellknown tradeoff between consistency and availability [4] into very sharp relief."]} +{"2411481|43059": ["Another important, more complex constrained CPD model, which can be represented graphically as nested 2PARALIND is abbreviation of PARAllel with LINear Dependencies, while CONFAC means CONstrained FACtor model (for more detail see [42] and references therein.", "Similarly, we can define PARALIND/CONFAC-(K, N) models2described as [42] X \u223c= G\u00d71 B(1) \u00d72 B(2) \u00b7 \u00b7 \u00b7 \u00d7N B(N) (15) = JI; B(1)\u03a6(1), .", "Tucker-(K, N) model is the PARATUCK-(K, N) model (see review paper of Favier and de Almeida [42] and references therein)."]} +{"2411481|7761990": ["In the case of statistical independence constraints, the problem can be related to models of group ICA through suitable pre-processing, dimensionality reduction and post-processing procedures [22]."]} diff --git a/edge/graph_22361305.jsonl b/edge/graph_22361305.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22380247.jsonl b/edge/graph_22380247.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46abd12a393615381f9df770a63e990bac8f99df --- /dev/null +++ b/edge/graph_22380247.jsonl @@ -0,0 +1,19 @@ +{"17036426|485843": ["L and lossy networks (LLNs) comprised of thousands of embedded networking devices can be used in a variety of applications including smart grid automated metering infrastructures (AMIs) [1]\u2013[4], smart city management, home and building automation, wireless sensor networks, and the newly proposed concept of Industry-4."]} +{"17036426|5747564": ["That is, industrial LLN solutions will adopt well-tested standard Internet protocols for scalability, compatibility, security, and development cost reasons [6], [8]."]} +{"205288793|2295142": []} +{"205288793|1230643": ["Moreover, the devices composing them are very limited in terms of memory, processing power and battery [1]."]} +{"206904100|801245": []} +{"37867550|13295407": []} +{"9150090|1230643": ["This includes wireless sensor networks in forests for detecting fires, in pipelines for detecting leaks, on light poles along streets to control luminosity etc [1]."]} +{"2348148|1762301": ["lish end-to-end paths for data transmissions [2]."]} +{"10037976|5747564": ["\u2026advanced metering infrastructure (AMI), envisaged to be a network of meter and concentrator nodes wherein meter readings are automatically sent by smart meters located at the customer premises to the meter data management system (MDMS) through concentrators provisioned by the utility provider [8]."]} +{"14251709|485843": [", energy usage data from power meters installed in houses [23], [44])."]} +{"14356571|6275330": []} +{"14356571|1230643": ["Ensuring energy efficient and reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems."]} +{"29456483|13454399": ["Considerable research efforts [10, 11] are carried out on non-RPL based reactive routing protocols especially for WSNs."]} +{"29456483|2295142": ["Considerable research efforts [10, 11] are carried out on non-RPL based reactive routing protocols especially for WSNs."]} +{"12293434|5747564": ["Whilst this infrastructure continues to deliver what it was originally designed for, it is envisaged that the \u2019Smart Grid\u2019, commonly considered as the energy grid with bi-directional communications capability, can help to achieve energy efficiencies by changing the way energy is managed [1]."]} +{"10212843|10206347": ["Indeed, patients use body sensor networks to monitor their vital signs (e.g. heart rate, blood pressure, etc.) which are transmitted to doctors and medical staff for tracking and monitoring patients health status [18]."]} +{"10226823|17205659": ["Many studies have been conducted on security issues regarding mobile ad-hoc networks [1, 5] and wireless sensor networks [29]."]} +{"16885631|485843": ["\u2026McGill University Montreal, Canada tho.le-ngoc@mcgill.ca Quang-Dung Ho Department of Electrical \nand Computer Engineering McGill University Montreal, Canada quang.ho@mcgill.ca ABSTRACT The Smart Grid \n(SG) optimizes the existing power grid with a reliable and secure SG Communications Network."]} +{"16714810|5660618": ["Although WSNs provide a great advantage for process, manufacturing and industry, they are not yet efficiently deployed.", "In particular, a WSN with nodes uniformly distributed in the walls or in the ceiling can be deployed as the network infrastructure that support the control of the state of the robots in a manufacturing cell.", "There have been many contributions to the problem of protocol design for WSNs, both in academia (e.g., [3], [12]) and industry (e.g., [13], [14], [15]).", "Retransmission of old data to maximize the reliability may increase the delay and is generally not useful for control applications [8].", "By a system-level design for WSNs, the control algorithm designers impose a set of requirements on reliability, packet delay and energy consumption that the communication infrastructure must satisfy.", "W IRELESS Sensor Networks (WSNs) are networks of tiny sensing devices for wireless communication, monitoring, control, and actuation.", "Some cross-layer design challenges of the physical, MAC, and network layers to minimize the energy consumption of WSNs have been surveyed in [34], [35], [36].", "1, where a plant is remotely controlled over a WSN [8], [10].", "The system scenario is quite general, because it applies to any interconnection of a plant by a multihop WSN to a controller tolerating a certain degree of data loss and delay [9], [10], [11].", "In this paper, we present Breath, an adaptive protocol for WSNs for reliable and timely data gathering.", "An efficient system-level design process for operations of WSNs in industrial control applications poses extra challenges compared to more traditional communication networks, namely: .", "In addition, experimental results of Dozer [27] show good energy efficiency and reliability under very low traffic intensity (with data sampling interval of 120 s) but the delay in the packet delivery is not considered, which is essential for control applications [8], [9].", "Note that retransmission of old data to maximize the reliability may increase the delay and is generally not useful for control applications [8].", "Fixed routing is inefficient in WSNs due to the cost of building and maintaining routing tables.", "Since high reliability and low delay may demand a significant energy consumption of the network, thus reducing the WSN lifetime, the reliability and delay must be flexible design parameters that need to be adequate for the requirements.", "Energy efficiency: The lack of battery replacement, which is essential for affordable WSN deployment, requires energy-efficient operations.", "The reverse approach to LPL was redesigned for WSNs as the Receiver-Initiated (RI)-MAC [20].", "The variety of application domains and theoretical challenges for WSNs has attracted research efforts for more than a decade."]} diff --git a/graph_223927.jsonl b/edge/graph_223927.jsonl similarity index 100% rename from graph_223927.jsonl rename to edge/graph_223927.jsonl diff --git a/edge/graph_2246.jsonl b/edge/graph_2246.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2246892.jsonl b/edge/graph_2246892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_224701.jsonl b/edge/graph_224701.jsonl similarity index 100% rename from graph_224701.jsonl rename to edge/graph_224701.jsonl diff --git a/edge/graph_22475926.jsonl b/edge/graph_22475926.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab9ca1358252bd7eac71baaf3d1ec3648ae9d950 --- /dev/null +++ b/edge/graph_22475926.jsonl @@ -0,0 +1,37 @@ +{"207112036|393948": ["As described in [20], deep architectures are more abstract representations and generally invariant to most local changes of the input data.", "Because of its excellent performance on extracting e ective representations of raw data [20], deep neural networks have been applied in many elds, such as image classi cation [21 23] and natural language processing [24 26].", "For deep neural networks, depth is an essential aspect to learn more abstract representations [20] .", "Through the activation function, nonlinear representations of the input data will be obtained in the hidden layer [20]."]} +{"207112036|4859605": ["Arbitrarily associated by users, tags may form an uncontrolled vocabulary, which usually leads to two common situations [18]: (i) similar meanings are expressed with di erent words, which will be treated as di erent tags in tagging systems, such as bike and bicycle ; (ii) polysemy, for example, Hummer may indicate a buzzer, while it can also represent the brand of a famous car from General Motors Corporation.", "From the folksonomy, the model of tag-aware recommender systems can be considered in two ways [18] : (i)", "Given that the most urgent problem in information era is to lter irrelevant items for users [18], the recommendation of items based on tagging information is mainly considered in this paper."]} +{"207112036|1805048": []} +{"49669436|1708582": ["iled analysis on the computational complexity of FPM methods. 7The work of Du et al. [29] represents an exception in that respect. 8See [31] for details on Markov Models for pattern recognition. 9See [65] for a comprehensive review on Reinforcement Learning. ACM Computing Surveys, Vol. 1, No. 1, Article 1. Publication date: February 2018. 1:16 M. Quadrana et al. \u2022Recurrent Neural Networks (RNNs) are d"]} +{"32993784|627405": ["We followed guidelines provided in Brereton et al. [2007] comprising a three-step review process that consists of planning, conducting, and documenting of phases."]} +{"32105394|8047599": []} +{"1033682|174797842": []} +{"21852763|8047599": ["utilised a role of matrix factorization model to overcome sparseness constraints [10]."]} +{"5493334|14148655": ["Collaborative Filtering beyond the User-Item Matrix 3:31 by allowing them to adjust the recommendations for this user [Chen and Pu 2012]."]} +{"20288249|1805048": ["Nevertheless, CF-based methods are often preferred to content-based methods because of their impressive performance (Su and Khoshgoftaar 2009)."]} +{"3332579|1805048": []} +{"207240067|1805048": ["YouTube is the world\u2019s largest platform for creating, sharing and discovering video content."]} +{"304614|1805048": ["Collaborative filtering (CF) has been studied for a long time and has achieved some success in recommendation systems [27, 37]."]} +{"23886520|3202525": ["To address this problem, a high-quality recommendation algorithm is needed to make a better resource service [6-11]."]} +{"7302064|14148655": ["recommender systems are case-based [15, 19, 45]."]} +{"50768534|3951790": ["In recent years, the progress in neural embedding has achieved tremendous advances in many domains, such as NLP [3, 24], social networks [5, 10, 26] and recommendations [1]."]} +{"50768534|393948": ["In recent years, the progress in neural embedding has achieved tremendous advances in many domains, such as NLP [3, 24], social networks [5, 10, 26] and recommendations [1].", "However, for a superb collection of items in the big e-commerce platforms, on one hand, the 1-of-N encoding networks may cost unaffordable time and always cannot to be optimized well because of the high sparsity [3]."]} +{"45426075|7782275": ["In this paper, we propose to view recommendations from a meta-learning perspective [28, 18]."]} +{"17605386|3202525": ["Since latent context is unsupervised and often consists of sensor data (such as location, accelerometer data, light, etc.) which is relatively correlated, we apply autoencoding in order to discover correlations between the different features and extract them in low-dimensional representation."]} +{"50769215|14148655": ["Critique [10] \u2717 \u2717 \u2713 \u2717 multi-turn cold & warm features small prototype users Interactive CF [47] \u2717 \u2717 \u2717 \u2713 multi-turn cold & warm items small offline recomm.", "The need to present recommendations in a conversational manner [14, 28] has been studied from many perspectives, including interview-based [41], active-learning [39], entropy [47], picturebased [36], explore-exploit [47], critiquing [10], constraint [16], dialog [8], and utility-based strategies [33]."]} +{"13907106|12161567": ["Many relational machine learning methods have been devised [24]."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"10560000|12161567": ["(See (Nickel et al., 2015) for a review of relational machine learning and Knowledge Graphs.)", "There have been many scalable techniques proposed to model very large KGs. Nickel et al. (2015) split existing models into two categories: latent feature models and graph feature models.", "(See (Nickel et al., 2015) for a review of relational machine learning and Knowledge Graphs."]} +{"6723974|14287707": [", activities, locations, environment, mood, or physiological states) or text context [Wang et al. 2012; Braunhofer et al. 2013; Kaminskas et al. 2013; Cheng and Shen 2014; Schedl and Schnitzer 2014; Eck et al. 2007; Knees and Schedl 2013].", "\u2026aspects of the user \ncontext (e.g., activities, locations, environment, mood, or physiolog\u00adical states) or text context [Wang \net al. 2012; Braunhofer et al. 2013; Kaminskas et al. 7:4 X. Wang et al. 2013; Cheng and Shen 2014; Schedl \nand Schnitzer 2014; Eck et al. 2007; Knees and Schedl 2013]."]} +{"3890973|393948": ["Fortunately, recent advances on representation learning [5] has shed light on this problem, which makes it possible to learn the representations of very di\u0082erent information sources in a shared representation space.", "Recent promising advances on representation learning [5] shed light on this problem."]} +{"3890973|1805048": []} +{"207217022|393948": ["Recent development in deep learning techniques [6] has made such a unified approach possible."]} +{"39108197|393948": ["In any statistical learning setting, it is known that the representation of the data has a considerable impact on performance, and that different representations can entangle different explanatory factors [3]."]} +{"50772365|7885409": ["As a promising direction, heterogeneous information network (HIN), consisting of multiple types of nodes and links, has been proposed as a general information modeling method [28, 30].", "As a newly emerging direction, heterogeneous information network [28] can naturally model complex objects and their rich relations in recommender systems, in which objects are of different types and links among objects represent different relations [27, 30]."]} +{"50776993|3951790": ["To obtain a negative item, the most straightforward and widely adopted method is random sampling [1, 7, 8, 24, 38] or popularity-biased sampling strategies [5, 11]."]} +{"11392154|393948": []} +{"13122651|1805048": ["The second one is the collaborative filtering (CF) approach [28]."]} +{"3728944|28465771": []} +{"32232821|393948": ["Due to its capability to extract effective representati-ons [22], deep learning has already been successfully applied in many personalized recommendation applications, such as music recommendation [23], movie recommendation [24], tag-aware recommendation [25], and multi-view item recommendation\u2026"]} +{"2757279|393948": ["Learning representations of the data can make it easier to extract useful information when building classifiers or other predictors [39]."]} +{"2757279|1805048": ["Generally the number of users in the computation of similarity is regarded as the neighborhood size of the active user [4].", "There are also different kinds of CF approaches, one way is to distinguish them as neighborhood-based algorithms modelbased algorithms and hybrid models [4, 5]."]} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} diff --git a/graph_2248617.jsonl b/edge/graph_2248617.jsonl similarity index 100% rename from graph_2248617.jsonl rename to edge/graph_2248617.jsonl diff --git a/edge/graph_22510203.jsonl b/edge/graph_22510203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2253457.jsonl b/edge/graph_2253457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22538204.jsonl b/edge/graph_22538204.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cef666f497703676c03a5909f3a5f8fa6a1d7f45 --- /dev/null +++ b/edge/graph_22538204.jsonl @@ -0,0 +1 @@ +{"63972415|2509135": []} diff --git a/edge/graph_22548642.jsonl b/edge/graph_22548642.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8be8d3216d04ad2459ef8d0f90197ac18f45e499 --- /dev/null +++ b/edge/graph_22548642.jsonl @@ -0,0 +1,2 @@ +{"8883887|11894197": ["The large number of sequences lowers the in\ufb02uence r d j In total, we have three datasets, one with promoter sequences, one with r l s"]} +{"8324202|22548642": ["Moreover, promoter is immediately \nupstream of the transcription start site (TSS) recognition should be accomplished without the support \nof of a gene."]} diff --git a/graph_2254944.jsonl b/edge/graph_2254944.jsonl similarity index 100% rename from graph_2254944.jsonl rename to edge/graph_2254944.jsonl diff --git a/edge/graph_2256372.jsonl b/edge/graph_2256372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2256477.jsonl b/edge/graph_2256477.jsonl similarity index 100% rename from graph_2256477.jsonl rename to edge/graph_2256477.jsonl diff --git a/edge/graph_2257431.jsonl b/edge/graph_2257431.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22582078.jsonl b/edge/graph_22582078.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92e6cc3e778f4ea6a943acd4b8876cc6a34d3f84 --- /dev/null +++ b/edge/graph_22582078.jsonl @@ -0,0 +1,42 @@ +{"8707777|8450611": ["Most previous research in this area (see Taylor [24] for a survey) focuses on static compilation.", "Most previous research in this area (seeTay\u00adlor [24] for a \nsurvey) focuses on static compilation.", "[24] D.Taylor."]} +{"4635462|3330461": ["Several methods have been proposed to deal with this coexistence [30]."]} +{"6758116|6583734": ["However, we emphasize that the virtualization and deployment of network functions do not necessarily rely on SDN technologies, and viceversa [4], [35]."]} +{"2695288|5547019": ["Each thread runs on a separate CPU core attached to one of the Non-Uniform Memory Access (NUMA) [45] nodes on the machine."]} +{"54974547|7453720": ["Initially, Stone et al . proposed a path-based policy language (PPL) that abstracts topological (physical) paths and \ufb02ows to check network properties [22]."]} +{"5187730|2623404": []} +{"5187730|7851743": []} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"61840683|11013798": []} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"40621293|2623404": ["[88], we presented the state-of-the-art for SDN programming languages, instead of focusing on programmable networks [86] or SDN applications/use cases [87], [88]."]} +{"40621293|10693567": []} +{"40621293|2818055": ["Reactive programming also makes it easier to express applications parts as behaviors that react to external events [44]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"5054763|2623404": []} +{"18637039|2623404": ["Several survey papers [9], [10], [12] introduced this promising network architecture and presented possible research directions to work on."]} +{"15898165|2535224": []} +{"31022395|2623404": ["However, it suffers from scalability and latency issues [4].", "Nevertheless, the advent of the OpenFlow interface has given a new lease on life to SDN [4].", "[4] B."]} +{"23265283|11414835": ["SDN hypervisors have been surveyed in [38], which categorizes and sub-classi\ufb01es SDN hypervisors, and does some valuable comparisons and evaluations.", "As many surveys [38], [40] have put forward, these slicing strategies have their characteristics and defects.", "More details on network hypervisors can be found in [38], which provides numerous comprehensive and deep insights."]} +{"23265283|2535224": ["Software-Defined Wireless Networks (SDWNs) have been studied in [37], [42]\u2013[44]."]} +{"23265283|16332018": ["As many surveys [38], [40] have put forward, these slicing strategies have their characteristics and defects.", "Rygielski and Kounev [40] have surveyed existing network virtualization methods brie\ufb02y, and speci\ufb01cally characterized them according to QoS management and performance isolation."]} +{"18859281|8450611": []} +{"25439673|3330461": ["Recently, the benefits of D2D have been well recognized [11]\u2013[13]."]} +{"6192401|9923206": ["Various works have been proposed for protocol veri\ufb01cation including rigorous speci\ufb01cation and conformance testing techniques for network protocols [212], rigorous treatment of the TCP protocol [165] [196], veri\ufb01cation of ad-hoc routing protocols for wireless sensor networks: [213]."]} +{"6192401|8974063": ["For furt her details, interested readers are referred to the survey pape rs [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occu pancy are reviewed in detail."]} +{"6192401|6507312": []} +{"6192401|12401050": ["It has been posited that for practical purposes of analyzing DSA/ CRNs, a simple two-state semi-Markov ON-OFF model is adequate for modeling spectrum usage [155] (table IV may be referred to see the popularity of this model).", "For further details, interested readers are referred to the survey papers [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occupancy are reviewed in detail."]} +{"6192401|6400766": ["In addition, RL can work with very large number of states when used along with function approximation [67].", "In RL, instead of explicit specification of the tr ansition probabilities, the transition probabilities can be en visioned to be accessed through a simulator that typically is restart ed from a uniformly random initial state many times [67]."]} +{"6192401|17062686": ["Indeed, there has been a lot of work in applying various economics-based approaches to wireless networkin g [40].", "Cooperative spectrum selection : [43]; Game Theory Resource allocation : see references in [40] [41]; Routing games[44] [45] [46]; Spectrum Sharing : [47] [48]; Mitigating selfish routing[49] [50] [51]; Medium Access Control (MAC) : [52]; Modeling routing: see references in [29]."]} +{"6192401|8589228": ["The key insight is to use hypothesis testing with a simulation based approach to deduce from some sample executions if the system under test satisfies the specification [132]."]} +{"6192401|15929566": ["We note here that reinforcement learning is also known by alternate monikers such as neuro-dynamic programming (NDP) [64] and adaptive (or approximate) dynamic programming (ADP) [65] [25].", "Therefore, classical DP techniques are rather ineffective at solving large-scale complex MDPs [25].", "We also discussed in section III-A that classical DP techniques are ineffective at solving large-s cale complex MDPs [25] [66]."]} +{"6192401|17109970": []} +{"6192401|12452682": []} +{"6192401|2840997": ["With the preclusion of approximation techniques, this method then becomes unwieldy for large-scale problems complex problems."]} +{"6192401|1708582": []} +{"1326816|2387055": ["SDNs enable this intelligence to be written in software, as network applications, us\u00ading \nopen APIs that better facilitate agile development and perhaps faster network innovations.", "Several recent studies have investigated security issues in SDNs [19, \n33, 32].", "Several recent studies have investigated security issues in SDNs [19, 33, 32].", "[32] survey possible SDN security issues."]} +{"15250830|2387055": ["In this paper, after having recalled the main security threats of SDN, we identified a key one that may have notably a strong impact regarding these regulation and trust aspects."]} diff --git a/edge/graph_2259204.jsonl b/edge/graph_2259204.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22605670.jsonl b/edge/graph_22605670.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e46432d39e254dfaf86e162c9596a85464faffd3 --- /dev/null +++ b/edge/graph_22605670.jsonl @@ -0,0 +1,9 @@ +{"15036265|627405": []} +{"8495923|12663580": ["This corresponds to important survey literature, depicting the popularity of these techniques in many domain problems, [17], [38], [126], [155], [156], [169]."]} +{"11149239|14808716": ["9 represents any top-down decision tree induction algorithm (Rokach and Maimon 2005a) with the following modification: the decision tree is not pruned and at each node, rather than choosing the best split among all attributes, the inducer randomly samples N of the attributes and choose the best\u2026"]} +{"11149239|1097238": ["These techniques alter the way the induction algorithm traverses the hypothesis space (Brown et al. 2005).", "However, in the classification context, there is no complete and agreed upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005).", "Brown et al. (2005) suggested a taxonomy of methods for creating diversity in ensembles of classifiers: varying the starting points within the hypothesis space; varying the set of hypotheses that are accessible by the ensemble members (for instance by manipulating the training set); and varying the\u2026", "While it is very simple way to gain diversity, it is now generally accepted that it is not sufficient for achieving good diversity (Brown et al. 2005).", "upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005)."]} +{"26695461|1097238": ["A recent review on diversity creation techniques can be found in Brown et al. (2005)."]} +{"27434345|5246835": ["[47] highlight that an important advantage of data mining is that it can be used to develop a new class of models to identify new attacks before"]} +{"27434345|50458504": ["[58] describe fraud as leading to the abuse of a profit organization's systemwithout necessarily leading to direct legal consequences.", "2 consists of two layers, the first comprising the aforementioned financial fraud based categories and the second comprising the six data mining application classes of classification, clustering, prediction, outlier detection, regression, and visualization [13,24,32,48,58,61,74,76], supported by a set of algorithmic approaches to extract the relevant relationships in the data [73].", "[58] point out that fraud detection has become one of the best established applications of data mining in both industry and government.", "[58] present a survey of data mining-based fraud detection research, including credit transaction fraud, telecoms subscription fraud, automobile insurance fraud and the like.", "2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"27434345|954543": ["2, is based on a literature review of existing knowledge on the nature of data mining research [3,52], fraud detection research [13,24,58,86,88], and the financial crime framework of the U."]} +{"10198239|954543": ["(v) Regression: Regression is a kind of statistical estimation technique used to map each data object to a real value provide prediction value (Carrier & Povel, 2003; Mitra et al., 2002).", "In addition, Ahmed, 2004; Carrier and Povel, 2003; Mitra et al., 2002; Shaw et al., 2001 described the types of data mining model as Association, Classification, Clustering, Forecasting, Regression, Sequence Discovery and Visualization.", "It aims at building a model to predict future customer behaviours through classifying database records into a number of predefined classes based on certain criteria (Ahmed, 2004; Berson et al., 2000; Chen, Hsu, & Chou, 2003; Mitra et al., 2002).", "(iii) Clustering: Clustering is the task of segmenting a heterogeneous population into a number of more homogenous clusters (Ahmed, 2004; Berry & Linoff, 2004; Carrier & Povel, 2003; Mitra et al., 2002).", "(i) Association: Association aims to establishing relationships between items which exist together in a given record (Ahmed, 2004; Jiao, Zhang, & Helander, 2006; Mitra et al., 2002).", "Its goal is to model the states of the process generating the sequence or to extract and report deviation and trends over time (Mitra et al., 2002).", "(vi) Sequence discovery: Sequence discovery is the identification of associations or patterns over time (Berson et al., 2000; Carrier & Povel, 2003; Mitra et al., 2002)."]} diff --git a/edge/graph_22607308.jsonl b/edge/graph_22607308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd79bbd32b1a11b25781dc897102752fac82b270 --- /dev/null +++ b/edge/graph_22607308.jsonl @@ -0,0 +1,6 @@ +{"14559293|14033856": []} +{"7917275|14033856": ["erstand what data about them are collected and how they are used. Transparency-enhancing technologies (or: transparency tools) may comprise various properties that promote privacy and data protection [115, 118, 52]: (1) provision of information about the intended 50 http://csrc.nist.gov/groups/ST/PEC2011/presentations2011/toft.pdf 51 http://www.dyadicsec.com/technology/ 52 https://sharemind.cyber.ee/ Privacy an", "ivacy seals. 18 http://www.cnil.fr/linstitution/labels-cnil/procedures-daudit/ 19 https://www.commoncriteriaportal.org/ 20 https://www.european-privacy-seal.eu/EPS-en/Home 21 This section is based on [118]. Privacy and Data Protection by Design \u2013 from policy to engineering December 2014 Page 17 Software architecture involves the set of significant decisions about the organisation of a software system22"]} +{"6033936|11139156": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"6033936|205435103": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"15209947|14033856": ["Detail overviews of other transparency-enhancing tools are presented in [9] and [10]."]} +{"205758|14033856": ["Although at this moment there exist some tools that provide some privacy transparency, none of these tools have been designed for the purpose of transparency, they all provide only limited privacy transparency functionality, and are rarely deployed (Hedbom, 2009) (Janic, 2013)."]} diff --git a/edge/graph_22608122.jsonl b/edge/graph_22608122.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d0cdc1f989f66c47a943e0a2944de4e2ef788c0 --- /dev/null +++ b/edge/graph_22608122.jsonl @@ -0,0 +1,3 @@ +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/graph_2261490.jsonl b/edge/graph_2261490.jsonl similarity index 100% rename from graph_2261490.jsonl rename to edge/graph_2261490.jsonl diff --git a/graph_2265977.jsonl b/edge/graph_2265977.jsonl similarity index 100% rename from graph_2265977.jsonl rename to edge/graph_2265977.jsonl diff --git a/graph_2266049.jsonl b/edge/graph_2266049.jsonl similarity index 100% rename from graph_2266049.jsonl rename to edge/graph_2266049.jsonl diff --git a/edge/graph_22664407.jsonl b/edge/graph_22664407.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22698651.jsonl b/edge/graph_22698651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db981965be288914e588c43982cf9aef8b79fc95 --- /dev/null +++ b/edge/graph_22698651.jsonl @@ -0,0 +1 @@ +{"207021430|13034818": []} diff --git a/graph_227061.jsonl b/edge/graph_227061.jsonl similarity index 100% rename from graph_227061.jsonl rename to edge/graph_227061.jsonl diff --git a/edge/graph_22753124.jsonl b/edge/graph_22753124.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ba6c1669957f039561d780833e1979ff2b706b1 --- /dev/null +++ b/edge/graph_22753124.jsonl @@ -0,0 +1,8 @@ +{"56899177|10739218": []} +{"5327003|14843594": []} +{"10242377|8533795": []} +{"14563079|18487363": []} +{"5349381|1932843": ["Reinforcement learning has been applied to a wide range of robotic problems, ranging from locomotion and manipulation to autonomous helicopter \ufb02ight [14, 4]."]} +{"7798441|393948": ["[3] give an overview on representation learning in the context of deep learning."]} +{"7798441|4071247": ["Hoffman and Grinstein [24] and Bertini and Lalanne [4] discuss visualization methods for high-dimensional\ndata mining, including projection and interaction methods.", "Hoffman and Grinstein [24] and Bertini and Lalanne [4] discuss visualization methods for high-dimensional Fig."]} +{"56793059|70923": []} diff --git a/graph_2276717.jsonl b/edge/graph_2276717.jsonl similarity index 100% rename from graph_2276717.jsonl rename to edge/graph_2276717.jsonl diff --git a/graph_2277438.jsonl b/edge/graph_2277438.jsonl similarity index 100% rename from graph_2277438.jsonl rename to edge/graph_2277438.jsonl diff --git a/edge/graph_22785980.jsonl b/edge/graph_22785980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43e5628442247b8c2569d5036dd329b211c64e46 --- /dev/null +++ b/edge/graph_22785980.jsonl @@ -0,0 +1 @@ +{"17741902|239537": ["Given the elevated number of nodes on the graph (the number of workgroups in an IT large support organization can be up to thousands), the map is represented through a hyperbolic graph [81]."]} diff --git a/graph_2281773.jsonl b/edge/graph_2281773.jsonl similarity index 100% rename from graph_2281773.jsonl rename to edge/graph_2281773.jsonl diff --git a/edge/graph_22819087.jsonl b/edge/graph_22819087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71e8f241a3b214f3e6e5fef5490a79eb8398803f --- /dev/null +++ b/edge/graph_22819087.jsonl @@ -0,0 +1,3 @@ +{"7405490|14415030": []} +{"11559229|6972141": ["The criteria were as follows: (1) the system is easy to use, (2) the system is easy to learn, (3) the", "The results show no significant difference in the ease of learning between the two conditions, (1) (2) (3) (4)"]} +{"126966246|6681074": ["Although research in visual landmark recognition has been ongoing for over 30 years, all existing techniques seem to suffer from at least one of the following problems (2, 3): (1) The sensor must have previously observed the scene from similar vantage points for it to be recognized; (2) excessive computations are needed to match image data to a terrain model, thus limiting real-time operation; (3) accurate localization information cannot be obtained from recognized landmarks; and (4) background clutter causes recognition and localization errors."]} diff --git a/graph_2282515.jsonl b/edge/graph_2282515.jsonl similarity index 100% rename from graph_2282515.jsonl rename to edge/graph_2282515.jsonl diff --git a/edge/graph_22825737.jsonl b/edge/graph_22825737.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da972e9d2bdf65f3b92fc4d5daa6586e664e8643 --- /dev/null +++ b/edge/graph_22825737.jsonl @@ -0,0 +1,4 @@ +{"110554723|8530790": ["Next, useful de nitions related to the dominated and non-dominated vectors and Pareto solutions appearing in the multi-objective terminology [14, 15] are introduced.", "The set of Pareto solutions can be obtained using Evolutionary Algorithms [13] well-suited to solve multi-objective optimization problems [14, 15]."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"24041554|15026160": ["A rotating tool composed of a shoulder and a pin in the end is inserted into workpiece and moved along the weld line [2].", "Moreover, it does not need shielding gas, electrodes or filling material and outputs less distortion in the welded joints [2, 3]."]} +{"16941799|62635091": ["A number of conventional techniques have been employed to solve this nonlinear, non-deterministic and polynomial time hard problem like lambda gamma iteration method [11], gradient method [12], dynamic programming [13] and Newton\u2013Raphson method [14] which have their own strengths and weaknesses [15, 16]."]} diff --git a/graph_2283018.jsonl b/edge/graph_2283018.jsonl similarity index 100% rename from graph_2283018.jsonl rename to edge/graph_2283018.jsonl diff --git a/edge/graph_22833814.jsonl b/edge/graph_22833814.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cff2be69dd8c5d54aa2548a96b76f42258d64c9d --- /dev/null +++ b/edge/graph_22833814.jsonl @@ -0,0 +1,21 @@ +{"30835661|15255963": ["Some researches have been done in FSMC modeling for slow fading channels [7]\u2013[9], but little has been done in HSR scenarios."]} +{"41850355|860072": ["A large number of technologies, including the system architecture [9], [10], [11], [12], signal processing methods at the physical layer [13], [14], [15], [16], novel seamless handover algorithms [17], [18], have been proposed to mitigate impacts due to the high mobility in the literature."]} +{"7064439|860072": ["One of the European HSR operators started in 2005 to offer Internet access to its customers [8]."]} +{"7064439|7482876": ["It is randomly time varying: its identifiability from the measurements, the statistical characterization, and the modeling is rather challenging [80], [81]."]} +{"860072|12765832": ["Furthermore, emerging Internet Engineering Task Force (IETF) protocols for network mobility [22] can be deployed to manage TAT handoffs."]} +{"59441240|12681089": ["The geometry-based stochastic channel model (GSCM) is widely used in MIMO channel modeling [5]."]} +{"206454765|8909218": []} +{"7482876|12681089": ["A complete description of the channel is therefore given by the time-variant channel impulse response [2]."]} +{"11579477|13367219": []} +{"6806007|12681089": ["Both deterministic and stochastic models of propagation channels in high-speed railway environments are of importance for designing these algorithms and techniques [1]."]} +{"22071924|22833814": ["To satisfy these demands, HST wireless communication systems have to overcome many challenges resulting from the high speed of the train that can easily exceed 250 km/h, such as fast handover, fast travel through widely diverse scenarios, and large Doppler spreads [2] besides some challenges inherited from conventional trains such as high penetration losses, limited visibility in tunnels, and the harsh electromagnetic environment [3]."]} +{"11390343|15255963": [", [4], the existing models are based on the assumption that the average received signal to noise ratio (SNR) remains unchanged."]} +{"1539241|8909218": []} +{"1721313|2835258": []} +{"27389270|12681089": ["Many MIMO channel models are summarized in [7]."]} +{"62597602|13367219": []} +{"62597602|3054454": []} +{"54970178|25686668": []} +{"24434425|22833814": ["In [34] and [35], this model was further improved by involving more time-varying parameters such as angles of arrival (AoAs) and angles of departure (AoDs)."]} +{"24434425|13074005": []} +{"24434425|860072": ["Consequently, there is a great demand for high data rate and reliable communication services [2], [3]."]} diff --git a/edge/graph_2289178.jsonl b/edge/graph_2289178.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22895184.jsonl b/edge/graph_22895184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2290665.jsonl b/edge/graph_2290665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2290994.jsonl b/edge/graph_2290994.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22915148.jsonl b/edge/graph_22915148.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_22927417.jsonl b/edge/graph_22927417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba7e3cef75fe5dd72d758255cf01cf8a5d76acb6 --- /dev/null +++ b/edge/graph_22927417.jsonl @@ -0,0 +1,24 @@ +{"196141089|6116761": ["There is over-whelming evidence that brain areas are not acyclic due to reciprocal polysynaptic connections (Friston, 2011; Markov et al., 2014).", "\u2026though most variation is between subjects, there is also variation between brain regions (Handwerker et al., 2004) which can be problematic As a result, lag-based methods, such as Granger causality, can be confounded by the variability of the HR in different brain areas (Smith et al., 2013b, 2011)."]} +{"44151132|6116761": ["By contrast, effective connectivity refers to directed interactions among neuronal populations and rests on a model describing both dynamics within the (neuronal) system and how activity of local network nodes is transformed into observations (Friston, 2011; Valdes-Sosa et al., 2011).", "\u2026affords valuable insights into the dynamics of brain networks both in health and disease (Buckner et al., 2013; Bullmore and Sporns, 2009; Fornito et al., 2015), it provides undirected measures of coupling (Friston, 2011), without an explicit model of the system of interest (Stephan, 2004)."]} +{"7176957|6116761": []} +{"3137987|6116761": ["This led to a series of articles in NeuroImage (e.g., Daunizeau et al., 2011; David, 2011; Friston, 2011a; Roebroeck et al., 2011a, b; Valdes-Sosa et al., 2011) and other journals (Friston, 2011b; Roebroeck et al., 2011c) that discussed differences between the approaches and potential problems,\u2026", "\u2026in NeuroImage (e.g., Daunizeau et al., 2011; David, 2011; Friston, 2011a; Roebroeck et al., 2011a, b; Valdes-Sosa et al., 2011) and other journals (Friston, 2011b; Roebroeck et al., 2011c) that discussed differences between the approaches and potential problems, such as neuro-physiological\u2026"]} +{"2677458|7761990": ["Some group-level ICA techniques have the potential to establish correspondences between individual and group-level analysis , i.e. back-reconstruction in temporally-concatenated group ICA (Calhoun et al., 2009) or dual-regression (Filippini et al., 2009).", "back-reconstruction in temporally-concatenated group ICA (Calhoun et al., 2009) or dual-regression (Filippini et al.", "A number of stability methods were developed in the context of group analysis of ICA results in fMRI, see (Calhoun et al., 2009) for a comprehensive review on this issue."]} +{"4417965|4576140": ["Since there is no gold-standard for simulations of fMRI data[21], we based our simulations on the Ornstein-Uhlenbeck process [22], which provides a simple linear model for neural activity."]} +{"4417965|6116761": ["The term effective connectivity has been suggested for this [2]."]} +{"9144284|6116761": ["\u2026directed (effective) connectivity using dynamic causal modelling (DCM) (Friston et al., 2003) on fMRI data consider a small number of regions (e.g., less than 10 regions), typically excited by carefully designed experimental manipulations (for a review see (Friston, 2011b; Seghier et al., 2010b)).", "Although functional connectivity cannot identify directed interactions within a system (e.g. see recent discussion in Friston, 2011b), our results suggest that models with functional connectivity constraints provide better explanations for distributed responses than models without constraints.", "Regions are labelled from 1 to 20 in the same order as in Table 1. inferences on models with a small number of nodes are generally suf \ufb01 - cient, given that conditional estimates of effective connectivity from a full graph are often consistent with estimates based on subgraphs (Friston, 2011a).", "Further details about DCM for fMRI responses can be found elsewhere (Friston, 2011b; Seghier et al., 2010b)."]} +{"15239414|6116761": ["further ambition of effective connectivity is to allow the inference of (biophysical) mechanisms by which causal links are expressed in measured neuroimaging signals (16)."]} +{"9175644|6116761": ["While functional connectivity describes non-directional instantaneous correlations in activity between brain regions, effective connectivity describes the directional influence of one neural system on another (Friston, 2011)."]} +{"8357450|6116761": ["By contrast, effective connectivity is best conceived as \u2018the simplest possible circuit diagram explaining observed responses\u2019 (Aertsen and Prei\u00dfl, 1991) and is explicitly a claim about underlyingmechanisms, and especially their modulation by experimental condition (Friston, 2011).", "Connectivity analysis methods (as applied to time series data) are commonly divided into two classes: functional and effective (Friston, 2011; Friston et al., 1993)."]} +{"2543074|6116761": ["Functional connectivity is an observable phenomenon quanti\ufb01able with measures of statistical dependencies, such as correlations, coherence, or transfer entropy (Friston, 1994, 2011)."]} +{"26803709|6116761": ["Causal Discovery The range of methods for analyzing brain function at the network level vary from essentially descriptive (such as looking at correlations between regions, i.e., standard functional connectivity approaches) to methods for inferring parameters of pre-specified models (such as dynamic causal modeling (DCM) (Friston, 2011; Friston et al., 2013)).", "But the primary challenge for DCM remains unsolved: how does one constrain reverse inference and search efficiently over candidate models given measured data?", "It should be noted that there are continuous improvements, such as the novel regression-DCM approach, which has been scaled to 66 regions with 300 free parameters (Fr\u00e4ssle and al, 2015; Fr\u00e4ssle and al., 2017).", "All of these have tradeoffs: standard \u201cfunctional connectivity\u201d from correlations does not provide a causal model; DCM is limited by our knowledge of the physiological basis of the BOLD response, the lack of a search algorithm over models, and poor scalability.", "The sweet spot, we believe, lies in the middle between standard functional connectivity approaches and physiologically-based models like DCM: causal modeling that takes advantage of the strengths of current BOLD-fMRI, and that enables the integration of experimental and observational data.", "The number of candidate DCM models is enormous even for a small number of nodes, and there exists no efficient algorithm to search over all of them.", "\u2026at the network level vary from essentially descriptive (such as looking at correlations between regions, i.e., standard functional connectivity approaches) to methods for inferring parameters of pre-specified models (such as dynamic causal modeling (DCM) (Friston, 2011; Friston et al., 2013)).", "In its classical implementation, for instance, DCM can only test very simple models (10 - 20 nodes) that are too restrictive for understanding realistic whole-brain networks (Smith, 2012; Smith et al., 2011)."]} +{"10049993|6116761": []} +{"12735340|6116761": ["the existing interactions between neuronal populations located in different brain areas [1], [2]."]} +{"12012341|6116761": ["Publication statistics suggest that there is an increasing focus on connectivity analyses (Friston, 2011), as the field has turned from addressing questions of functional segregation to investigating functional integration.", "However, functional connectivity analyses do not consider causal interactions within the network, i.e. how information propagates through brain regions (Friston, 1994, 2009, 2011; Smith, 2012)."]} +{"26542556|22927417": []} +{"26542556|6116761": ["Multiple methods were proposed to estimate effective connectivities from fMRI data (Friston, 2011)."]} +{"196658569|6116761": ["The construct validity of spectral DCM has been established using both simulated and empirical data (Friston et al., 2014; Razi et al., 2015). Friston et al. (2014) simulated resting state fMRI timeseries for a network with three regions.", "However, interactions between brain regions are directed and are therefore not fully captured by (undirected) functional connectivity (Friston, 2011; Razi & Friston, 2016) .", "However, interactions between brain regions are directed and are therefore not fully captured by (undirected) functional connectivity (Friston, 2011; Razi & Friston, 2016)."]} +{"18784951|6116761": ["There has been great recent interest in Granger causality methods in particular, which make use of lag-based information, with over 300 citations per year making use of the techniques[14]."]} +{"6377195|6116761": []} +{"3277082|6116761": ["Extending network research in fMRI from functional to effective connectivity could provide a substantial advance to the understanding of brain dynamics in health and disease (Bielczyk, Buitelaar, Glennon, & Tiesinga, 2015; Fornito, Zalewsky, & Breakspear, 2015; Friston, 2011; Sporns, 2014).", "There is an ongoing debate upon which class of models is better suited for this research problem (Valdes- Sosa, Roebroeck, Daunizeau, & Friston, 2011)."]} +{"3409699|6116761": ["Whilst the relative capabilities of the above algorithms to map truly \u201ccausal\u201d or \u201ceffective\u201d connections have been debated (Friston, 2011; Roebroeck et al., 2011), they nonetheless collectively entail a conceptual advance over undirected methods by linking cognitive operations to more precise computational mechanisms."]} +{"96129|6116761": ["Functional connectivity can be computed in numerous ways, including correlation, mutual information, or spectral coherence (Friston, 2011)."]} diff --git a/graph_2293014.jsonl b/edge/graph_2293014.jsonl similarity index 100% rename from graph_2293014.jsonl rename to edge/graph_2293014.jsonl diff --git a/graph_2293083.jsonl b/edge/graph_2293083.jsonl similarity index 100% rename from graph_2293083.jsonl rename to edge/graph_2293083.jsonl diff --git a/graph_2293773.jsonl b/edge/graph_2293773.jsonl similarity index 100% rename from graph_2293773.jsonl rename to edge/graph_2293773.jsonl diff --git a/graph_2294141.jsonl b/edge/graph_2294141.jsonl similarity index 100% rename from graph_2294141.jsonl rename to edge/graph_2294141.jsonl diff --git a/graph_2294541.jsonl b/edge/graph_2294541.jsonl similarity index 100% rename from graph_2294541.jsonl rename to edge/graph_2294541.jsonl diff --git a/edge/graph_22946509.jsonl b/edge/graph_22946509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ac2e2a3646d47cb8b83122e9fcf47eaa0735962 --- /dev/null +++ b/edge/graph_22946509.jsonl @@ -0,0 +1 @@ +{"11421382|8296351": ["Most of these approaches are described by Benavides et al. (2010), which nicely summarizes those scenarios where feature models must be checked if modified (e.g., valid product, valid partial configuration, anomaly detection like redundancies in the feature model, optimization, etc.).", "Moreover , DSPL solutions can exploit off-the-shelf logical solvers (e.g., SPLOT \u2013 http://www.splot-research.org/ \u2013 and FAMA) are AAFM solutions that can manage the dynamic checking and diagnosis of variability models.", "Also, the validity of the feature model must be checked to avoid unfeasible products when, for instance, a new set of features is selected (Benavides et al., 2010).", "Today, feature models provide a comprehensive set of analysis operations to achieve what is known as Automated Analysis of Feature Models (AAFM) (Benavides et al., 2010).", "This solution complements the solution suggested in the previous section for changing the structural variability, as AAFM approaches will ensure the validity of the changes made on the feature model.", "Reconfiguration process assisted by AAFM tools. with \" Ambient \" measures but also with \" Health \" , as this super-type can be used to incorporate new functions related with the health of users and can use this to connect to, for instance, a medical service.", "In order to incorporate runtime variability management facilities to the DSPL, we advocate the use of AAFMs that can be supported by well-known declarative paradigms such as SAT 3 or constraint programming problems 4 (Benavides et al., 2010)."]} diff --git a/graph_2295142.jsonl b/edge/graph_2295142.jsonl similarity index 100% rename from graph_2295142.jsonl rename to edge/graph_2295142.jsonl diff --git a/edge/graph_22958414.jsonl b/edge/graph_22958414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afd0e70e018502d94b5ff12594006660be6e247f --- /dev/null +++ b/edge/graph_22958414.jsonl @@ -0,0 +1 @@ +{"83974294|10859746": []} diff --git a/edge/graph_22968238.jsonl b/edge/graph_22968238.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2298017.jsonl b/edge/graph_2298017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2301292.jsonl b/edge/graph_2301292.jsonl similarity index 100% rename from graph_2301292.jsonl rename to edge/graph_2301292.jsonl diff --git a/graph_2301325.jsonl b/edge/graph_2301325.jsonl similarity index 100% rename from graph_2301325.jsonl rename to edge/graph_2301325.jsonl diff --git a/edge/graph_2302916.jsonl b/edge/graph_2302916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_230371.jsonl b/edge/graph_230371.jsonl similarity index 100% rename from graph_230371.jsonl rename to edge/graph_230371.jsonl diff --git a/edge/graph_23041951.jsonl b/edge/graph_23041951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_542269.jsonl b/edge/graph_23072959.jsonl similarity index 100% rename from graph_542269.jsonl rename to edge/graph_23072959.jsonl diff --git a/graph_2310089.jsonl b/edge/graph_2310089.jsonl similarity index 100% rename from graph_2310089.jsonl rename to edge/graph_2310089.jsonl diff --git a/graph_2313952.jsonl b/edge/graph_2313952.jsonl similarity index 100% rename from graph_2313952.jsonl rename to edge/graph_2313952.jsonl diff --git a/edge/graph_2318389.jsonl b/edge/graph_2318389.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23207080.jsonl b/edge/graph_23207080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23219032.jsonl b/edge/graph_23219032.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23228624.jsonl b/edge/graph_23228624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2323881.jsonl b/edge/graph_2323881.jsonl similarity index 100% rename from graph_2323881.jsonl rename to edge/graph_2323881.jsonl diff --git a/edge/graph_2324636.jsonl b/edge/graph_2324636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23248070.jsonl b/edge/graph_23248070.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea1f3648c693c13814b4fc6ad117e8baee2f3ecf --- /dev/null +++ b/edge/graph_23248070.jsonl @@ -0,0 +1,4 @@ +{"5423390|33286487": ["J. K. Hiltunen is with the Section of Clinical Neurosciences, Finnish Institute of Occupational Health, FIN-00250 Helsinki, Finland."]} +{"2154749|7761990": []} +{"775793|10725980": ["For wind instruments , researchers designed artificial mouths to play the trumpet [1], the trombone [2] or the clarinet [3]."]} +{"15863686|7761990": ["The temporal sorting algorithm in GIFT (Calhoun et al., 2009) first convolves the input timings with the canonical hemodynamic response function to create SPM-type regressors before calculating, on an individual subject level, the slopes of the regressors between the time courses of each of the four EEG microstates and the time courses of each of the 15 RSNs of interest.", "Both the choice of preprocessing steps and group ICA analytic procedures were performed in accordance with the best practices laid out by Allen et al. (2011) for the GIFT group ICA toolbox.", "The temporal sorting algorithm in GIFT (Calhoun et al., 2009) first convolves the input timings with the canonical hemodynamic response function to create SPM-type regressors before calculating, on an individual subject level, the slopes of the regressors between the time courses of each of the\u2026", "These onsets and durations were used as input to the multiple regression temporal sorting algorithm in the GIFT toolbox.", "Functional connectivity was calculated using a group ICA algorithm (Calhoun et al., 2001), as implemented in the GIFT 2.0a toolbox4."]} diff --git a/edge/graph_2326457.jsonl b/edge/graph_2326457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23267485.jsonl b/edge/graph_23267485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4d250b3f0a9425486cc259171a11fc97710e5ae --- /dev/null +++ b/edge/graph_23267485.jsonl @@ -0,0 +1,5 @@ +{"833974|8921624": ["While moats prevent unwanted and unanticipated communication between cores, drawbridges allow for controlled and secure communication channels."]} +{"61128305|16587593": []} +{"17930044|206459491": []} +{"2236226|206459491": ["With the ever-increasing hardware complexity and the large number of third-parties involved in the design and fabrication process of integrated circuits (ICs), today\u2019s IC products are vulnerable to a wide range of malicious alterations, namely hardware Trojans (HTs) [1\u20133]."]} +{"62477319|206459491": ["With globalization of the semiconductor industry, today\u2019s integrated circuit (IC) designs involve many third-parties during the design and manufacturing process, and hence they are vulnerable to a wide range of malicious alterations, namely hardware Trojans (HTs) [1]."]} diff --git a/edge/graph_23279314.jsonl b/edge/graph_23279314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23279769.jsonl b/edge/graph_23279769.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26a285002968ebf10450dab98d759d6a99d204a5 --- /dev/null +++ b/edge/graph_23279769.jsonl @@ -0,0 +1,5 @@ +{"24505593|14970359": ["[51] T.", "In classifying the available literature, the functional taxonomy presented in the 2001 survey by Moeslund and Granum [51] dealing with vision-based human motion capture has been considered."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"28667319|5401262": ["In the past several years, significant progress has been made in machine learning to automatically recognize facial expressions related to emotion [20,21]."]} +{"17233601|6280485": []} diff --git a/graph_2332366.jsonl b/edge/graph_2332366.jsonl similarity index 100% rename from graph_2332366.jsonl rename to edge/graph_2332366.jsonl diff --git a/graph_2335874.jsonl b/edge/graph_2335874.jsonl similarity index 100% rename from graph_2335874.jsonl rename to edge/graph_2335874.jsonl diff --git a/edge/graph_2336721.jsonl b/edge/graph_2336721.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23374959.jsonl b/edge/graph_23374959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..056083824e95156eb46f98682de88c1e57446db5 --- /dev/null +++ b/edge/graph_23374959.jsonl @@ -0,0 +1,4 @@ +{"16762154|7761990": ["ICA, for example, is an unsupervised learning method which is used to discover hidden factors (independent components) from a set of observations such that the identified components are maximally statistically independent (not merely uncorrelated; Bell and Sejnowski, 1995; Hyva\u0308rinen and Oja, 2000).", "A number of frameworks have been proposed to use ICA for multimodal data fusion.", "Alternatively a\nfrequently used algorithm that enables the unmixing of spatiotemporally overlapping EEG signals before feature extraction is independent component analysis (ICA; James and Hesse, 2005; Onton et al., 2006).", "Taking joint ICA (Calhoun et al., 2006, 2009; Mijovic et al., 2012) as an example, the differing biosignal modalities are first processed separately, and ICA is subsequently applied to examine the relationships between data types (Fig.", "Hence, fMRI statistical maps and ERP data of all subjects are merged into a single matrix and subjected to a joint ICA."]} +{"16762154|9431428": ["Over the past years machine learning algorithms have successfully been applied to both EEG and fMRI data (Besserve et al., 2007; Pereira et al., 2009)."]} +{"13945906|10290908": []} +{"4714730|9270553": ["Several present-day BCI systems rely on mu (8 \u2013 12 Hz) or beta (18 \u2013 24 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000).", "Several present-day BCI systems rely on mu (8\u201312 Hz) or beta (18\u201324 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000)."]} diff --git a/edge/graph_2338214.jsonl b/edge/graph_2338214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23384282.jsonl b/edge/graph_23384282.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3943ec142d3ba020fbdf89042df8ec2de8312f4a --- /dev/null +++ b/edge/graph_23384282.jsonl @@ -0,0 +1,4 @@ +{"2929000|23384282": ["Similar to other traditional techniques of artistic expression or illustrative depiction, stippling has also been reproduced in the non-photorealistic rendering (henceforth NPR) domain [1\u2013 4].", "A more comprehensive survey of these and other digital stip-pling techniques was recently presented by Mart \u00b4 \u0131n et al. [4] who also provide a taxonomy of the different techniques and discuss their relationship to traditional stippling as well as to halftoning."]} +{"61913259|9629338": ["The placement of \ufb01ber stipples is very similar to the placement of glyphs [KW06,ROP11]."]} +{"64171676|40857498": []} +{"64171676|3052779": []} diff --git a/edge/graph_23384543.jsonl b/edge/graph_23384543.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18e67e5586b1d203d20e9ec0b32dfef18e19c581 --- /dev/null +++ b/edge/graph_23384543.jsonl @@ -0,0 +1,2 @@ +{"2201076|16575201": ["(Kageura & Umino 1996) summarized five groups of weighting measure: (i) a word which appears in a document is likely to be an index term; (ii) a word which appears frequently in a document is likely to be an index term; (iii) a word which appears only in a limited number of documents is likely to\u2026"]} +{"15170786|2593345": ["Antichains have been used extensively for the purposes of information visualisation and graph visualisation [25, 9] to show or hide details."]} diff --git a/graph_2340253.jsonl b/edge/graph_2340253.jsonl similarity index 100% rename from graph_2340253.jsonl rename to edge/graph_2340253.jsonl diff --git a/graph_2340740.jsonl b/edge/graph_2340740.jsonl similarity index 100% rename from graph_2340740.jsonl rename to edge/graph_2340740.jsonl diff --git a/edge/graph_2341328.jsonl b/edge/graph_2341328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2341679.jsonl b/edge/graph_2341679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23470432.jsonl b/edge/graph_23470432.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..077b2257e4c8cd000d20b204db272ca51ceb8820 --- /dev/null +++ b/edge/graph_23470432.jsonl @@ -0,0 +1,2 @@ +{"14967029|32559576": ["Again the application on live subjects rather than relying on stored datasets can lead to breakthrough research in the field of diabetes."]} +{"29297406|14356173": []} diff --git a/graph_2352715.jsonl b/edge/graph_2352715.jsonl similarity index 100% rename from graph_2352715.jsonl rename to edge/graph_2352715.jsonl diff --git a/graph_2355696.jsonl b/edge/graph_2355696.jsonl similarity index 100% rename from graph_2355696.jsonl rename to edge/graph_2355696.jsonl diff --git a/edge/graph_2355873.jsonl b/edge/graph_2355873.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23565906.jsonl b/edge/graph_23565906.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c50e7f42d6c43e3aada977ce2d0066fc34e8f1e4 --- /dev/null +++ b/edge/graph_23565906.jsonl @@ -0,0 +1,10 @@ +{"4365426|1074202": ["A privacy metric to measure how similar the original and the perturbed data are is crucial [18]."]} +{"114163118|14056879": []} +{"207236254|16514036": ["Capacitive and galvanic coupling have been explored extensively in the electrical engineering literature [9, 23, 34] and appear to be plausible candidates for deployment; for instance, they have been standardized in the IEEE 802."]} +{"53590232|3453202": ["Disastrous results of this type of attacks, such as transferring the data to other parties from criminal organizations to insurance companies or spammers without permission and consent, cannot be avoided because the victim does not know when the attack is happening [13]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"2124743|16323798": ["Zoha et al. [26] and Zeifman et al. [25] provide two good reviews of related work in \u201cnon-intrusive load monitoring\u201d (NILM)."]} +{"15158283|8618569": ["\u2026mentioned earlier are generic in the sense that they can be applied to both wired and wireless solutions, the wireless nature of the communication between sensors and devices makes these objectives more vulnerable, as there is no apparent physical boundary of the transmission medium [8] .", "In an outside attack, an outsider adversary or attacker is not a participant of the network while an inside attack consists of attacking nodes by running malicious code in them [8]."]} diff --git a/edge/graph_23566570.jsonl b/edge/graph_23566570.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0478821d5383137bbcc2e99b97a2401b3ca7137 --- /dev/null +++ b/edge/graph_23566570.jsonl @@ -0,0 +1 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/graph_2356917.jsonl b/edge/graph_2356917.jsonl similarity index 100% rename from graph_2356917.jsonl rename to edge/graph_2356917.jsonl diff --git a/graph_2356998.jsonl b/edge/graph_2356998.jsonl similarity index 100% rename from graph_2356998.jsonl rename to edge/graph_2356998.jsonl diff --git a/edge/graph_2357830.jsonl b/edge/graph_2357830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2358732.jsonl b/edge/graph_2358732.jsonl similarity index 100% rename from graph_2358732.jsonl rename to edge/graph_2358732.jsonl diff --git a/graph_2359588.jsonl b/edge/graph_2359588.jsonl similarity index 100% rename from graph_2359588.jsonl rename to edge/graph_2359588.jsonl diff --git a/graph_2363064.jsonl b/edge/graph_2363064.jsonl similarity index 100% rename from graph_2363064.jsonl rename to edge/graph_2363064.jsonl diff --git a/edge/graph_23651393.jsonl b/edge/graph_23651393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23658100.jsonl b/edge/graph_23658100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bffcc61d8289088e24f4cb46af9b6cccce07d90c --- /dev/null +++ b/edge/graph_23658100.jsonl @@ -0,0 +1,11 @@ +{"43852498|206778272": []} +{"43852498|11607029": ["The terminology we use leans towards the works of Mens (2002)"]} +{"216968|12482333": []} +{"5173500|13867632": ["Several proposals and tools in that area, e.g., aimed at program comprehension [5], appeared around at that time."]} +{"5340522|10500613": ["Sometimes this relationship can be discovered semi-automatically [31] but ultimately Match depends on human feedback (and hence may be partial or even inaccurate)."]} +{"1492856|16378248": ["Czarnecki and Helsen in [12] present a feature model for model transformation approaches, where theymention directionality, but do not focus on it.", "In this section, we apply domain analysis to bidirectional transformation approaches in a similar way to [12].", "The feature model we introduce in this paper can be seen as complementary to [12] in the sense that: (1) the two feature models do not overlap on any common features and (2) all our features refer implicitly to a bidirectional engine; hence, they depend on the multidirectional feature of the model in [12]."]} +{"16460039|11607029": ["\u2026model composition approaches in different application domains: requirements engineering [Nuseibeh03] [Chitchyan07], design by aspects [Baniassad04] [France04], development by subjects [Clarke02] [Ossher96], software merging [Mens02], composition of concerns in software architectures [Barais05]."]} +{"361671|10500613": ["There, the identification of interconnections is referred to as schema matching [29, 30, 31]."]} +{"2039733|10500613": ["There is a big literature on this topic, offering many different algorithms to compute correspondences [86][92]."]} +{"2039733|8125630": []} +{"2039733|913718": []} diff --git a/edge/graph_2368628.jsonl b/edge/graph_2368628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2369792.jsonl b/edge/graph_2369792.jsonl similarity index 100% rename from graph_2369792.jsonl rename to edge/graph_2369792.jsonl diff --git a/graph_2370308.jsonl b/edge/graph_2370308.jsonl similarity index 100% rename from graph_2370308.jsonl rename to edge/graph_2370308.jsonl diff --git a/edge/graph_23727036.jsonl b/edge/graph_23727036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29ecbd580e605128b2cad76b616d955eb71068a1 --- /dev/null +++ b/edge/graph_23727036.jsonl @@ -0,0 +1,2 @@ +{"539333|1895753": []} +{"7593529|18960196": ["Especially in the light of strong experimental evidence on the important role of the precise timing of the action potentials emitted by biological neurons (Bohte, 2004), this is a strong motivation for the use of spiking neural networks in neurorobotic applications."]} diff --git a/graph_2373140.jsonl b/edge/graph_2373140.jsonl similarity index 100% rename from graph_2373140.jsonl rename to edge/graph_2373140.jsonl diff --git a/graph_2373572.jsonl b/edge/graph_2373572.jsonl similarity index 100% rename from graph_2373572.jsonl rename to edge/graph_2373572.jsonl diff --git a/graph_2374977.jsonl b/edge/graph_2374977.jsonl similarity index 100% rename from graph_2374977.jsonl rename to edge/graph_2374977.jsonl diff --git a/edge/graph_23750843.jsonl b/edge/graph_23750843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23774449.jsonl b/edge/graph_23774449.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbb0f44701064375954cc13ed0e3d62c025536ac --- /dev/null +++ b/edge/graph_23774449.jsonl @@ -0,0 +1,30 @@ +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"14775089|12127129": ["Generally the reference frame often call ed the \u201cbackground image\u201d or \u201cbackground model\u201d must be a representation of the scene without moving objects and must be kept regularly updated so as to adapt to the varying luminance conditions and geometry settings [30]."]} +{"14775089|17516538": ["dent on the performance of the human detection [25], [26], [29].", "Motion segmentation is used to detect regions corresponding to moving objects that can be potential targets in natural scenes in order to provide a focus of attention for later processes such as tracking and activity analyses [26]."]} +{"14775089|14970359": []} +{"12733197|17516538": ["Recognizing human activities from videos is a hot topic of research in computer vision [1, 2], which has a wide range of applications such as intelligent surveillance, analysis of the physical condition of people and caring of aged people [3, 4, 5]."]} +{"12733197|205131192": ["The moments are computationally intensive and sensitive for disjoint shapes or shapes with noise where the silhouette information is not correct."]} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"2170785|1634674": ["localization of human actions in video, and action recognition, the classification of a given video into one of several predefined categories."]} +{"2857532|53680608": []} +{"12903970|1634674": ["A 2008 literature review [20] provides a"]} +{"12903970|38476": []} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"17209773|1634674": ["The database is freely available for research purposes."]} diff --git a/graph_2378906.jsonl b/edge/graph_2378906.jsonl similarity index 100% rename from graph_2378906.jsonl rename to edge/graph_2378906.jsonl diff --git a/edge/graph_23811349.jsonl b/edge/graph_23811349.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17f1051968b4e0774b05195d7783ef9a3fc317e2 --- /dev/null +++ b/edge/graph_23811349.jsonl @@ -0,0 +1 @@ +{"11127252|4361938": ["\u2026in the context of usability research, where the pattern of eye movements can yield insight into the processing steps taken by users (for a review of eye tracking in the field of usability see Ehmke & Wilson, 2007; for a more general review of eye tracking in applied contexts, see Duchowski, 2002)."]} diff --git a/edge/graph_2381561.jsonl b/edge/graph_2381561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2382521.jsonl b/edge/graph_2382521.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2383780.jsonl b/edge/graph_2383780.jsonl similarity index 100% rename from graph_2383780.jsonl rename to edge/graph_2383780.jsonl diff --git a/edge/graph_23845644.jsonl b/edge/graph_23845644.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2387055.jsonl b/edge/graph_2387055.jsonl similarity index 100% rename from graph_2387055.jsonl rename to edge/graph_2387055.jsonl diff --git a/graph_2387255.jsonl b/edge/graph_2387255.jsonl similarity index 100% rename from graph_2387255.jsonl rename to edge/graph_2387255.jsonl diff --git a/edge/graph_2388738.jsonl b/edge/graph_2388738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23893450.jsonl b/edge/graph_23893450.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b7eff0218023ffff747827e8bcd261d73f262a3 --- /dev/null +++ b/edge/graph_23893450.jsonl @@ -0,0 +1,18 @@ +{"5869310|5246835": ["The detection and identification of frauds in power systems has been initially addressed with statistical techniques[25, 26]."]} +{"42352459|595093": ["There are many publications on SG security, including survey style articles and books, such as [44], [8], [12], [24], [30], [37], [61], [62], [63], [75], [82], [88], [104], [109], [114], [117], [125], [150], [156], [157], [161], [163], [171], [2], [4], and [3]."]} +{"42352459|2382521": ["When a web interface is used and there is a back-end database, web attacks (such as Structured Query Language (SQL) injection [95]) could affect the privacy of the user by disclosing not-tobe-exposed data from the back-end database."]} +{"206485523|10150488": ["Please refer to [276] and [277] for more details on this topic."]} +{"206485523|16403716": ["Multimedia indexing and retrieval concerns the description, storage, and organization of multimedia information to help people find multimedia resources conveniently and quickly [218]."]} +{"14096275|595093": ["Several surveys of this work have been published in the past few years [8,9,10,16]."]} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"207881413|595093": ["(A more detailed discussion on Smart Grid domains can be found in [14] [15] [16].)"]} +{"207881413|6959212": ["Compared with legacy power systems, the Smart Grid is envisioned to fully integrate high-speed and two-way communication technologies [4] [5] [6] [7] [8] into millions of power equipments to establish a dynamic and interactive infrastructure with new energy management capabilities, such as advanced\u2026"]} +{"207881413|2457428": ["As key management for conventional computer networks has been well categorized and summarized in several survey papers [117,118], in the following, we focus on the new requirements of key management for the Smart Grid, and present an overview of existing key management schemes for power systems."]} +{"8083671|595093": ["It is therefore imperative to have strong security policies in place to ensure that exploitable weaknesses due to weak policies, are nonexistent."]} +{"12971333|485843": []} +{"12971333|6959212": []} +{"27381984|30443041": ["have also been extensively studied in the literature [4]\u2013[6]."]} +{"2096079|206584087": ["The attacker broadcasts ICMP requests disguised with the victim's IP address, most devices accept the ICMP request and respond to the victim's computer [10].", "Denial of Service Interruption [2], [5]-[7], [10]-[14], [21] Physical Attack Interruption [2], [6], [14], [23] Man in the Middle Interception/Fabrication [2], [5], [6], [11], [14], [16], [18] Packet Analysis Interception [11], [13], [14], [16] Malicious Code Injection Modification [2], [5], [8],\u2026"]} +{"2096079|595093": []} +{"3500624|2906773": []} +{"3500624|18037424": []} diff --git a/graph_2390193.jsonl b/edge/graph_2390193.jsonl similarity index 100% rename from graph_2390193.jsonl rename to edge/graph_2390193.jsonl diff --git a/edge/graph_23905284.jsonl b/edge/graph_23905284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bf1202bfd5d094d92bd0cf97fb562487c5b6533 --- /dev/null +++ b/edge/graph_23905284.jsonl @@ -0,0 +1,6 @@ +{"25495091|10762348": []} +{"7267674|16079696": ["over [1\u20134]."]} +{"14495635|16079696": ["In view of the high demand for bioinformatics scientist, many universities in various countries today have already incorporated bioinformatics, in part or in whole, in their undergraduate and graduate courses [2-5]."]} +{"22453748|16079696": ["puter science concepts and methods\u2019 [1]."]} +{"31941316|10762348": []} +{"109769030|60684456": []} diff --git a/edge/graph_239537.jsonl b/edge/graph_239537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_23964121.jsonl b/edge/graph_23964121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2396555.jsonl b/edge/graph_2396555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2398112.jsonl b/edge/graph_2398112.jsonl similarity index 100% rename from graph_2398112.jsonl rename to edge/graph_2398112.jsonl diff --git a/graph_2398835.jsonl b/edge/graph_2398835.jsonl similarity index 100% rename from graph_2398835.jsonl rename to edge/graph_2398835.jsonl diff --git a/edge/graph_2399855.jsonl b/edge/graph_2399855.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2399892.jsonl b/edge/graph_2399892.jsonl similarity index 100% rename from graph_2399892.jsonl rename to edge/graph_2399892.jsonl diff --git a/edge/graph_24049311.jsonl b/edge/graph_24049311.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a89df9492ad4b5414620423837d1ee56f376e3f3 --- /dev/null +++ b/edge/graph_24049311.jsonl @@ -0,0 +1,3 @@ +{"11034736|7983519": ["Research on gre has moved on considerably since 1995, when Dale and Reiter put forward their hypotheses (see Krahmer and van Deemter (2011) for a survey)."]} +{"2970563|7983519": ["One characteristic of the GBA particularly emphasized by Krahmer et al. (2003), advancing from research on algorithms such as the Incremental Algorithm (Dale and Reiter, 1995) and the Greedy Algorithm (Dale, 1989), was the treatment of relations between entities."]} +{"2233826|5375832": ["\u2026linguistic summaries of large clinical data sets; instead they focus on generating patient information material (often to support behavior change) [26], helping clinicians write routine documents [27], summarizing medical literature [28], and generating explanations for recommendations [29]."]} diff --git a/edge/graph_240618.jsonl b/edge/graph_240618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24067042.jsonl b/edge/graph_24067042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c745df648f6d11188dc0dc2f7787df90422c7f5 --- /dev/null +++ b/edge/graph_24067042.jsonl @@ -0,0 +1,7 @@ +{"113129210|12083425": []} +{"29804063|11990480": ["Single-Windings Transformer Single windings transformer as well, known as \u201cswitched transformer\u201d [1-3], [9], [19-20], is actually a selectable energy converter [3].", "The resistor element will be either in fixed mode as [5-6] or switched according the system as [1-5], [7-9].", "Second topology, the multiple transformer balancing as in [1-3], [9] is shown in Fig.", "Quite a lot of cell balancing/equalization methods have been proposed such [1-34] and reviewed in [1-5].", "Switched Capacitor The switched capacitor [1-4], [10-11] is shown in Fig.", "First topology, the multi-windings transformer \u201cshared transformer\u201d topology [1-3], [21-22] has a single magnetic core with one primary windings and multi secondary windings one for each cell.", "It can be only used for Lead-acid and Nickel based batteries because they can be brought into overcharge conditions without cell damage [3].", "Multi-Windings Transformer Multi-windings transformer [1-3], [9], [21-22] is shown in Fig."]} +{"6778362|11990480": ["Traditional cell balancing circuits use dissipative resistors, resulting in energy loss [6]."]} +{"14097347|16323798": ["Multiple groups have published algorithms to optimize the disaggregation analysis [7]\u2013[14]."]} +{"24566583|11990480": []} +{"35257349|11990480": []} +{"97014320|9932808": []} diff --git a/edge/graph_240747.jsonl b/edge/graph_240747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2410132.jsonl b/edge/graph_2410132.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24110634.jsonl b/edge/graph_24110634.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c505a94fe9990f281734b897c6030267b3f56ae --- /dev/null +++ b/edge/graph_24110634.jsonl @@ -0,0 +1,86 @@ +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"263015|2623404": ["[38] present programable networks in the context of SDN."]} +{"263015|1230643": ["Wireless Sensor Networks (WSNs) [57], [58] differ substantially from WCNs with respect to network and node"]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} +{"16389300|2623404": []} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"106659955|2623404": ["cation requirements may force us to tailor every single WSN deployment individually and this can only be achieved by a high degree of reconfiguration capabilities, something that can be realised by using concepts and ideas from software-defined networking (SDN) [1]."]} +{"32377418|2623404": ["Control granularity is another issue associated with SDN [45]."]} +{"32377418|3189715": ["I NTRODUCTION N ETWORK programmability was the main objective of two schools of thought that dominated the networking research agenda in the mid-90 s up until the early 2000 s: Active [1] and Programmable Networks [2] (A&PN)."]} +{"35638190|2623404": []} +{"207218531|2535224": []} +{"207218531|10693567": ["Innovative application software has been built to function on top of SDN controllers so that various application requirements are met [21], such as network virtualization [22], topology discovery [23], traffic monitoring [24], security enhancement [25], load balancing [26], and others."]} +{"207218531|2387055": ["At the same time, some solutions against SDN security threats have been proposed, which include controller replication schemes, authentication and authorization mechanisms, schemes to protect controllers against Denial of Service or Distributed Denial of Service (DoS/DDoS) attacks, traffic monitoring and analysis, flow-table overflow attack protection, and others [15]."]} +{"59359754|2623404": ["[8] provided historic review about programmable network idea from its beginning time down to the SDN revolution."]} +{"59359754|10693567": ["[9] discussed the architecture of OpenFlow Protocol as an SDN Implementation network to understand SDN, and centralized control concept by using different controllers' platform."]} +{"801245|17336376": []} +{"801245|1230643": []} +{"801245|12060835": []} +{"14271431|1230643": []} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"2534840|15300368": []} +{"2534840|17205659": []} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"11304884|15300368": ["The networks have different topologies; common examples include star and mesh topologies [9]."]} +{"15444463|2623404": []} +{"15444463|10693567": ["Several surveys of SDN already exist [1\u20133]; this contribution differs from them through an analysis of architectural design choices for OpenFlow-based SDN networks."]} +{"15444463|3189715": ["Programmable networks (PN) [18,19] also provide a means for programmability in the network by executing programs on packets similar to AN."]} +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"206925480|11735843": ["The above problem can be overcome by making WSNs programmable and thus, there has been significant research effort devoted to design programmable WSNs [9]\u2013[11]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"27153649|14132386": ["Besides matching flow table item, center node needs to identify various existing WSNS routing protocols, by reserved interface it is convenient for extensions in the future [17]."]} +{"10532321|2623404": ["\u2026opens a plethora of research questions such as how to design network programming languages, obtain robust systems with centralized management, control traf\ufb01c at the packet level, perform network virtualization, or even co-exist with traditional network protocols [2], [3], [4], [5], [6], [7], [8].", "1, is the most popular implementation of the southbound interface of SDN [5], [6], [7], [11], [12]."]} +{"206650877|205286988": []} +{"17088097|6305682": []} +{"17088097|17683338": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"15460345|10693567": ["A list of common SDN Controllers can be seen in Table I, which is a modified version of Table 5 presnted in [7]."]} +{"11735843|2623404": ["3 Software-defined networking (SDN) The major insight of \u2018software-defined networking\u2019 (SDNs) is to allow horizontally integrated systems by allowing the separation of the control plane and the data plane [11,107] while providing increasingly sophisticated set of abstractions.", "In particular, it is the culmination of many varied ideas and proposals in the general field of programmable networks [11,18] with many of the initial ideas of programmable networking (of \u2018open interfaces\u2019 and \u2018separation of control and data plane\u2019) espoused by the OpenSig and Active Networking community now maturing in the form of the SDN) architecture.", "Our paper is different from other survey papers [11,18,19] in its focus on wireless programmable networks while the previous papers had focused mainly on generic (wired) programmable networks.", "Applications of programmability include rapid provisioning of services [10], flexible resource management [11], efficient resource sharing [12], and support for new architectures such as cloud computing, Internet of things (IoT) [13], etc."]} +{"11735843|10693567": []} +{"11735843|3189715": ["The lack of programmability of networks has long been recognized, and various approaches have been proposed to address this deficiency [14] [15].", "in 1999 [14], t he impending impact of numerous programming trends is anticipated using surprisingly modern terminology.", "The main reason OpenSig approach could not quite become mainstream was the static nature of the interfaces it defined [14]."]} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"6192401|9923206": ["Various works have been proposed for protocol veri\ufb01cation including rigorous speci\ufb01cation and conformance testing techniques for network protocols [212], rigorous treatment of the TCP protocol [165] [196], veri\ufb01cation of ad-hoc routing protocols for wireless sensor networks: [213]."]} +{"6192401|8974063": ["For furt her details, interested readers are referred to the survey pape rs [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occu pancy are reviewed in detail."]} +{"6192401|6507312": []} +{"6192401|12401050": ["It has been posited that for practical purposes of analyzing DSA/ CRNs, a simple two-state semi-Markov ON-OFF model is adequate for modeling spectrum usage [155] (table IV may be referred to see the popularity of this model).", "For further details, interested readers are referred to the survey papers [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occupancy are reviewed in detail."]} +{"6192401|6400766": ["In addition, RL can work with very large number of states when used along with function approximation [67].", "In RL, instead of explicit specification of the tr ansition probabilities, the transition probabilities can be en visioned to be accessed through a simulator that typically is restart ed from a uniformly random initial state many times [67]."]} +{"6192401|17062686": ["Indeed, there has been a lot of work in applying various economics-based approaches to wireless networkin g [40].", "Cooperative spectrum selection : [43]; Game Theory Resource allocation : see references in [40] [41]; Routing games[44] [45] [46]; Spectrum Sharing : [47] [48]; Mitigating selfish routing[49] [50] [51]; Medium Access Control (MAC) : [52]; Modeling routing: see references in [29]."]} +{"6192401|8589228": ["The key insight is to use hypothesis testing with a simulation based approach to deduce from some sample executions if the system under test satisfies the specification [132]."]} +{"6192401|15929566": ["We note here that reinforcement learning is also known by alternate monikers such as neuro-dynamic programming (NDP) [64] and adaptive (or approximate) dynamic programming (ADP) [65] [25].", "Therefore, classical DP techniques are rather ineffective at solving large-scale complex MDPs [25].", "We also discussed in section III-A that classical DP techniques are ineffective at solving large-s cale complex MDPs [25] [66]."]} +{"6192401|17109970": []} +{"6192401|12452682": []} +{"6192401|2840997": ["With the preclusion of approximation techniques, this method then becomes unwieldy for large-scale problems complex problems."]} +{"6192401|1708582": []} +{"3640736|10693567": []} +{"113924061|24110634": []} +{"113924061|2623404": []} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} diff --git a/edge/graph_24132043.jsonl b/edge/graph_24132043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c702ec27304943e411406032ae5ce736fff777b1 --- /dev/null +++ b/edge/graph_24132043.jsonl @@ -0,0 +1,19 @@ +{"14983111|38476": ["In addition, we incorporate sliding window [15] and crossvalidation [11,12] techniques in the training and prediction stages and consequently evaluate the validity of the learning algorithms for prediction accuracy using statisticalmetrics, as discussed in the following sections.", "The sliding window technique [15] maps an input sequence x of size k to an individual output y by using a prediction model; this approach is very effective in the data mining field e."]} +{"11724005|10559330": ["Research in the networking community addressed the problem of bounding network delays, as in diff-serv [10] and int-serv [11] architectures."]} +{"5746950|13210924": ["The performance of the auto-scaler will depend on the quality of the available metrics, the sampling granularity, and the overheads (and costs) of obtaining the metrics [38]."]} +{"14046529|17474643": ["[Grozev and Buyya 2014b] proposed a better approach by integrating a similar auto-scaler with a load balancing algorithm that consolidates sessions within as few instances as possible.", "Modern applications are often deployed in multiple cloud data centers for various purposes [Grozev and Buyya 2014a]: 1) multi-cloud deployment helps reducing response latency if users can be served by the nearest data center; 2) it improves availability and reliability of the application against\u2026"]} +{"4712196|14046529": []} +{"10464056|8914588": ["Analyzing the characteristics and trends of a large body of literature is a challenging task, consequently results of the exiting surveys [2], [4], [6]\u2013[8], [11], [15], [20] are often significantly limited to application domains or solution domains."]} +{"10464056|2109857": ["In [7], a comprehensive survey has been conducted on different types of control engineering approaches applied to middleware (e.g., web and application servers)."]} +{"5725885|8914588": ["The dif.culty \nis mainly due to highly dynamic workloads, the complexity of underlying computer systems, and the lack \nof accurate performance models.", "Autonomic resource management for Internet \nservices aims to reduce the degree of human involvement in the management of com\u00adplex computing systems \n[Huebscher and McCann 2008]."]} +{"15723340|207228303": ["In [8], the authors surveyed the VM allocation problem and models and algorithmic approaches."]} +{"15723340|14382980": []} +{"15723340|1222880": ["In [12], the authors summarised different method and theory used in cloud resource allocation and monitoring."]} +{"10590243|7842253": ["In other words, the amount of resources should be minimum for a workload to maintain a required level of service quality or to minimize the workload completion time (or maximize through-put) of a workload automatically [Zhan et al. 2015]."]} +{"10590243|17675973": ["Basically, there are three types of scheduling architecture in the cloud: hierarchical, centralized, and decentralized [Mastelic et al. 2014]."]} +{"10590243|8914588": ["There is a need for an autonomic resource management system that considers all the important QoS parameters like availability, security, execution time, SLA violation rate, and so forth for better resource management [Huebscher et al. 2008; Simonin et al. 2013]."]} +{"5865583|1708582": ["If the decision speed is not fast enough to make the system adapt to the increased workload in time, or the decision itself is not accurate to meet the real performance requirement, the adaptation process has to be performed several times, which usually and inevitably violates the SLO [46]."]} +{"17270398|8914588": ["It applies machine learning based self-adaptive modeling to capture the complex and time-varying relationship between the application performance and allocation of resources to various application components, in the face of highly dynamic and bursty workloads."]} +{"2339709|8914588": ["\u201d Since then, many research have been devoted to the methodology; see [11] for a recent comprehensive survey on autonomic computing."]} +{"2339709|1708582": ["A survey of reinforcement learning technology from a computer science perspective can be seen in [14]."]} +{"8816652|16378248": ["A detailed overview of transformation approaches is given in [ 28 , 54, 76].", "MDD has been actively investigated in the last years, and some taxonomies of model transformation approaches have been defined to help a software developer choosing the method that is best suited for his or her needs [ 28 , 58, 76]."]} diff --git a/edge/graph_24142614.jsonl b/edge/graph_24142614.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..208d853b5ef5bc8d02d53f454d90bf33b090123d --- /dev/null +++ b/edge/graph_24142614.jsonl @@ -0,0 +1,20 @@ +{"7811409|14970359": ["Many approaches have been proposed for video-based human movement analysis [1]\u2013[6], [9], [10]."]} +{"12733197|17516538": ["Recognizing human activities from videos is a hot topic of research in computer vision [1, 2], which has a wide range of applications such as intelligent surveillance, analysis of the physical condition of people and caring of aged people [3, 4, 5]."]} +{"12733197|205131192": ["The moments are computationally intensive and sensitive for disjoint shapes or shapes with noise where the silhouette information is not correct."]} +{"16525678|16169670": []} +{"16525678|7788290": []} +{"108544358|15178364": ["This definition is also adopted in other reviews (Borges et al., 2013; Vishwakarma and Agrawal, 2013)."]} +{"108544358|5058720": ["There are some reviews which analyse and describe \u2018human motion\u2019, \u2018activity recognition\u2019 or \u2018human behaviour understanding\u2019 (Aggarwal and Ryoo, 2011; Holte et al., 2012; Hu et al., 2004; Jaimes and Sebe, 2007; Moeslund, 2001; Moeslund et al., 2006; Poppe, 2007, 2010; Suriani et al., 2013; Wang, 2003).", "Traditionally, in video analysis also the term event can be found (Hongeng et al., 2004; Suriani et al., 2013), even though its use is not consistent among authors."]} +{"108544358|16013270": ["For further datasets and details we refer to the recent review of Chaquet et al. (2013)."]} +{"108544358|27637541": []} +{"108544358|1634674": ["In volumetric approaches, in contrast, features are not extracted on a frameby-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case (Turaga et al., 2008).", "5: Action modelling classification of Turaga et al. (2008).", "Various categorisations have been found for action recognition methods (Li et al., 2010; Turaga et al., 2008; Weinland et al., 2007).", "5 Action modelling classification of Turaga et al. (2008). .", "Robustness to occlusions and viewpoint changes is targeted in Weinland et al. (2010). A 3D histogram of oriented gradients is computed for densely distributed regions and combined with temporal embedding to represent an entire video sequence."]} +{"108544358|17516538": ["At the motion level, tasks such as movement detection, and background extraction and segmentation are faced (Hu et al., 2004; Moeslund et al., 2006; Porle et al., 2009).", "There are some reviews which analyse and describe \u2018human motion\u2019, \u2018activity recognition\u2019 or \u2018human behaviour understanding\u2019 (Aggarwal and Ryoo, 2011; Holte et al., 2012; Hu et al., 2004; Jaimes and Sebe, 2007; Moeslund, 2001; Moeslund et al., 2006; Poppe, 2007, 2010; Suriani et al., 2013; Wang, 2003).", "Approach Actions Test Rate fps \u0130kizler and Duygulu (2007) 9 LOSO 100% N/A Tran and Sorokin (2008) 10 LOSO 100% N/A Fathi and Mori (2008) 10 LOSO 100% N/A Hern\u00e1ndez et al."]} +{"108544358|7360895": ["(2009)), to the need of socially interactive robots (Fong et al., 2003), across many others."]} +{"108544358|14970359": ["There are some reviews which analyse and describe \u2018human motion\u2019, \u2018activity recognition\u2019 or \u2018human behaviour understanding\u2019 (Aggarwal and Ryoo, 2011; Holte et al., 2012; Hu et al., 2004; Jaimes and Sebe, 2007; Moeslund, 2001; Moeslund et al., 2006; Poppe, 2007, 2010; Suriani et al., 2013; Wang, 2003)."]} +{"108544358|7788290": []} +{"619149|1634674": ["Initially, in the video-based HAR, a human activity has been generally represented in a time-series of binary silhouettes derived from RGB cameras [4]-[7]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"9194043|7788290": ["from videos. A survey of work in human motion analysis can be found in [ 48 ]."]} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"37174796|11042075": []} +{"30926655|7788290": ["D. Gavrila presented a detailed survey on human action recognition in [ 4 ]."]} diff --git a/edge/graph_2415608.jsonl b/edge/graph_2415608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24183677.jsonl b/edge/graph_24183677.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2419167.jsonl b/edge/graph_2419167.jsonl similarity index 100% rename from graph_2419167.jsonl rename to edge/graph_2419167.jsonl diff --git a/edge/graph_24222234.jsonl b/edge/graph_24222234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..580a61eed6a2b49a344398a65048e99dd66373b2 --- /dev/null +++ b/edge/graph_24222234.jsonl @@ -0,0 +1,16 @@ +{"14212762|8815923": ["Haptic and force-torque sensors have been studied extensively for control of grasping and manipulation [3] to avoid slippage and prevent damaging objects."]} +{"1924791|206051485": ["Similarly, a \u201csuper\u2013resolution\u201d algorithm [151], used in digital image processing to enhance the resolution of images, can be adopted to improve on the tactile sensing resolution, in case of insufficient resolution from the available tactile sensor hardware."]} +{"1924791|14561706": []} +{"6293134|6409498": ["Misra et al. used the parameters from Kim and Srinivasan [16] to simulate the indentation deformation of human liver using a 2-D FE model [ 17 ]."]} +{"3943307|14561706": []} +{"42581601|192934": ["Feature extraction is a crucial step in classification systems [48]."]} +{"15304753|192934": ["Many tools exist involving both supervised and unsupervised training (Jain et al., 2000).", "Adding these results to the system would also increase the amount of training data it has available, eventually enabling multivariate analysis as opposed to the univariate methods used in this study to avoid the curse of dimensionality (Jain et al., 2000).", "Many tools exist involving both supervised and unsupervised (Jain et al., 2000).", "Several machine learning algorithms exist to reduce unnecessary dimensionality of inputs, such as principle component analysis and other multidimensional scaling techniques (Jain et al., 2000).", "In practice, however, it has been observed that additional dimensions will actually degrade performance of a classifier for a constant sample size, a property that has become known as the curse of dimensionality (Jain et al., 2000)."]} +{"31367497|14485408": ["While there is no well-accepted definition of what constitutes an artificial skin, in general an artificial skin is a flexible, interlinked array of individual sensing elements capable of detecting external contact at a medium to high resolution [17]."]} +{"31367497|14561706": ["Recent advances in tactile sensing for robotics have opened up new pathways for humanoids to more accurately communicate with humans.[1] Through tactile interaction, various touch modalities may be carried out; a robot may be patted, slapped, punched, or tickled, with each action representative of a separate communicative intent."]} +{"3928302|2087828": ["Materials possessing this e \ufb00 ect are called piezoresistors [51]."]} +{"14850970|118142": ["Planning and executing a grasp that is robust and stable is an important topic in grasp research (see [13] for a recent review)."]} +{"49186177|18374428": ["in subsequent research on the iCub that targets the development of multimodal body representations (see [33] for a survey of the notion of body schema in robotics, [34] for an account of the iCub learning a peripersonal space representation using the artificial skin, [35] for learning a proprioceptive representation)."]} +{"49186177|14561706": ["isolation and reaction) or in tactile human\u2013robot interaction (see [25] for a survey; [26] for a recent implementation on the iCub humanoid robot)."]} +{"17855219|6972141": [", 2003; Blais, 2004) and intelligent environment interpretation (DeSouza and Kak, 2002; Thrun, 2002; Bonin-Font et al., 2008; Chen et al., 2011)."]} +{"17678990|14561706": ["During the past few years, the problem of the physical interaction through touch between robots and humans or the surrounding environment has received increasing attention in the literature [1], [2], [3], [4]."]} +{"22265159|393948": []} diff --git a/edge/graph_2424020.jsonl b/edge/graph_2424020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24248164.jsonl b/edge/graph_24248164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a02ccad4a506b5feb2696a297c964a23129db1c4 --- /dev/null +++ b/edge/graph_24248164.jsonl @@ -0,0 +1 @@ +{"12899885|3785059": ["based on open standards enabling interoperability [18]."]} diff --git a/graph_2426922.jsonl b/edge/graph_2426922.jsonl similarity index 100% rename from graph_2426922.jsonl rename to edge/graph_2426922.jsonl diff --git a/edge/graph_24313591.jsonl b/edge/graph_24313591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_24339.jsonl b/edge/graph_24339.jsonl similarity index 100% rename from graph_24339.jsonl rename to edge/graph_24339.jsonl diff --git a/edge/graph_24343572.jsonl b/edge/graph_24343572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24345431.jsonl b/edge/graph_24345431.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2435535.jsonl b/edge/graph_2435535.jsonl similarity index 100% rename from graph_2435535.jsonl rename to edge/graph_2435535.jsonl diff --git a/edge/graph_24364368.jsonl b/edge/graph_24364368.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24386836.jsonl b/edge/graph_24386836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..02fcbe5a904fdd6c74c4adcdac2ceeaa466eda08 --- /dev/null +++ b/edge/graph_24386836.jsonl @@ -0,0 +1,183 @@ +{"27633972|12884178": []} +{"27633972|12452682": ["The NE, from which no selfish player would have the incentive to unilaterally change its action, provides a stable point in which the system resides [29].", "Unlike a game played once, a repeated game allows a strategy to be contingent on past moves, thus allowing reputation effects and retribution, which gives possibility for cooperation [29]."]} +{"15524033|7320605": []} +{"24037236|3330461": ["in a centrally-controlled WMN, such as the LTE-controlled device-to-device network2 [27] and the centrally-controlled BS-to-BS network via wireless interfaces in the ultra-dense networks3 [28]."]} +{"580203|13171013": [", [13, 15], rather than on designing new learning algorithms.", ", direct reciprocity [4, 5, 6, 7], indirect reciprocity [8], norm enforcement [9, 10], simple reinforcement learning variants [3], multiagent reinforcement learning [11, 12, 13, 14, 15], spatial structure [16], emotions [17], and social network effects [18, 19]."]} +{"37451636|3007529": ["To name a few application scenarios include intelligent transportation systems (ITS) [11], volunteer information networks [12], Internet of Things (IoT) [13]\u2013[15], smart grids [16], [17] and much more."]} +{"37451636|3348390": []} +{"37451636|9104850": []} +{"18201168|12029139": ["Since the information can also be transmitted using RF in wireless networks, the concept of simultaneous wireless information and power transfer (SWIPT) has become a promising approach for energy and information delivery in wireless networks [7], [8].", "In this paper, the relay is RFpowered [8]."]} +{"17804774|3555631": ["Under the premise of control-data separation architecure in WSDN, there will be two types of base stations, namely ontrol base stations (CBS) and data base stations (DBS) [115] ."]} +{"17804774|3330461": []} +{"17804774|7644489": []} +{"17804774|875676": []} +{"17804774|12452682": []} +{"17804774|12681089": ["This type of antenna array configuration has been proven to e inadequate [93,94] ."]} +{"10299098|11370991": []} +{"10299098|3767252": ["In existing solutions, the certification authority can only distribute the credentials to all the elements located within its own trust domain [183], making it hard to guarantee the privacy and data integrity for communications among different trust domains.", "Authentication management provides a possible solution to ensure \u201ctrust\u201d [183]."]} +{"10299098|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [165], [166]."]} +{"10299098|3042864": ["\u2026signi\ufb01cant disparities between MEC and MCC systems in terms of computing server, distance to end users and typical latency, etc. Compared with MCC, MEC has the advantages of achieving lower latency, saving energy for mobile devices, supporting context-aware computing, and enhancing privacy and\u2026"]} +{"10299098|3348390": []} +{"10299098|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [165], [166]."]} +{"51979814|17109970": ["To properly capture the tradeoff between obtaining a satisfactory throughput and saving transmit power\u2014similar to what is considered for the NFE and IC games\u2014we will adopt a \u201cgreen\u201d approach based on improving each player\u2019s energy efficiency [8].", "A good approximation for the effective throughput in a packet-oriented transmission is ( ) { ( )} s s exp t t 1 k k L c = - ^ h [8], whose behavior is depicted (red line, left axis) in Figure 3."]} +{"991448|3330461": [", [22] among others, but only single operator D2D is taken into account.", "An intra-D2D overlay enjoys higher spectral efficiency than the case where D2D communication is not enabled, and less implementation complexity than the underlay case [22]."]} +{"61108354|14988542": []} +{"61108354|2706428": []} +{"61108354|18717047": []} +{"61108354|1453418": []} +{"1299327|17062686": []} +{"18011174|202482": ["Cyber Physical Systems (CPSs) Cyber Physical Systems represent the new generation of complex sensor networks that combine physical subsystems and cyber components [25,138].", "In [138], several future directions for sensor networks have been studied that serve CPSs based on two baselines, namely, security and privacy."]} +{"18011174|7320605": []} +{"18011174|1756215": ["Therefore, the cooperating nodes are supposed to achieve the security targets in WSNs [32]."]} +{"18011174|17205659": ["In [33,34,76,78,79], WSN attacks are classi\ufb01ed based on the layer attacked and the countermeasures which can be summarized as follows."]} +{"7893622|17109970": ["Moreover, an overview of game theoretic approaches and a set of noncooperative games for energy-efficient resource allocation are presented in [27]."]} +{"11553741|12452682": []} +{"6953986|8909218": ["These small cell deployments are mainly in the form of home small cells, known as femtocells [10], [11], [27], but many operators have also already started to deploy outdoor small cell solutions to complement their macrocell coverage [28]."]} +{"26018453|1708582": ["in [49] make use of the Boltzmann function [45] as an efficient strategy selection to strike a balance between exploration and exploitation."]} +{"11498812|22833814": ["In GBSM, the impulse responses of channel is characterized by the law of wave propagation applied to specific transmitter, receiver, and scatterer geometries that are predefined in a stochastic fashion according to certain probability distributions [33]."]} +{"30932961|3330461": ["The number of recent papers addressing D2D communications is wide [5], and the potential applications range increases, from mobile data offloading [6], to cell coverage extension [7],"]} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"23990039|8909218": ["As in [1], femtocells benefit not only home subscribers but also an operator.", "Femtocells communicate with the cellular network through a local broadband connection such as digital subscriber line, cable, Ethernet, Worldwide Interoperability for Microwave Access (WiMAX), or fiber [1]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"738212|8974063": ["O PPORTUNISTIC spectrum access (OSA) is a promising solution for dealing with the spectrum shortage problem in wireless communications today since it provides flexible and efficient spectrum usage [2]\u2013[4]."]} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"14908254|8909218": ["Of\ufb02oading data is, in fact, viewed as the primary role of SCBSs, particularly those deployed by an operator in outdoor environments such as picocells [1], [2], [15].", "For reaping the bene\ufb01ts of small cell deployment, numerous technical challenges must be addressed such as resource management, interference avoidance, and user association [2], [4\u20139].", "These SCBSs are seen as a key approach for of\ufb02oading traf\ufb01c from the macro-cell network while providing high capacities by bringing the users and their access points closer to one another [2].", "We mainly focus on outdoor SCBSs such as picocells/microcells/metrocells that are used by the operator to of\ufb02oad data by serving any of the N macro-cell users when needed [1], [2]."]} +{"8467994|7851743": []} +{"7320605|1756215": ["[6] had proposed a taxonomy which divides current existing typical game theory approaches for WSN security into four categories: preventing DoS attacks, intrusion detection, strengthening security, and coexistence with malicious sensor nodes.", "A relatively smaller portion of the contributions in this area has been summarized in [5,6].", "[6] summarized 30 publications of the existing game theoretical approaches that are designed to strengthen WSN security."]} +{"52125542|3189715": ["Borrowing some concepts from active networking [41]\u2013[43], a user can send an interest to the network with a function expression or a program that includes code and data."]} +{"207249455|206584087": ["A DoS attack explicitly prevents the service providers from continuously providing their service to the user, and a distributed DoS (DDoS) attack organizes many attacking agents to achieve this [Zargar et al. 2013].", "Recently, Zargar et al. [2013] surveyed DoS attacks, but there is no game-theoretic approach in almost all of the DoS surveys."]} +{"207249455|1940388": ["There are several methods for packet scheduling attacks, such as putting malicious code into one of the packets in the path between the destination and source, or performing unfairness attacks [Chen et al. 2009]."]} +{"17070882|3330461": ["Device-to-device (D2D) communication over cellular networks has emerged as an innovative technology that can significantly improve the performance of cellular systems [1]."]} +{"17070882|7644489": ["eration partnership project (3GPP) [3], long-term evolution (LTE), and LTE-advanced (LTE-A) [4] projects consider to employ D2D as the potential solution for supporting growing communication demands.", "in the realm of D2D, most of them focuses on the single-cell scenarios [3]\u2013[12]."]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"12390607|3330461": [", in-band underlaid D2D under the direct control of a cellular network, whereas WLAN operates in an unlicensed band and possesses high degree of uncertainty in the overall performance [4]."]} +{"12390607|7851743": ["Thus, self-organized resource management approaches have drawn attentions because they can help in providing range of benefits including reduced information exchange, low complexity, scalability, and etc [8]."]} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"374344|870434": ["Therefore, the \u2018ability to resolve requests\u2019 ( A ) is de\ufb01ned as, De\ufb01nition 5.", "De\ufb01nition 1.", "However, UWSNs pose few unique challenges that differ from those of the terrestrial sensor networks in many respects [8], [9], [10].", "To start opportunistic localization, the unlocalized nodes \ufb01rst explore their maximum opportunities by following the procedure described in Algorithm According to Theorem 4.2.1 and De\ufb01nition 1, the OPR S of an unlocalized node S have higher number of localized nodes, which act as potential anchors for the unlocalized node to get localized.", "Therefore De\ufb01nition 4.", "Thus, the \u2018ability to serve demand\u2019 ( A ) is calculated as, De\ufb01nition 9.", "De\ufb01nition 8.", "De\ufb01nition 3.", "The additional number of reference nodes required for any unlocalized node i to get successfully localized is de\ufb01ned as the difference between the total number of reference nodes required and the number of localized neighbors present, De\ufb01nition 7.", "The number of localized neighbors of any node i for transmission power p i is de\ufb01ned as, De\ufb01nition 6."]} +{"19820055|23893450": ["[28] present a survey of the recent data driven approaches in smart grid security."]} +{"26853250|53018231": ["SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions Section II: Artificial Neural Networ", "se works are limited in a number of ways. First,a majority of the existing worksfocuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks. Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radi"]} +{"26853250|9461213": ["e Learning Tools Key Applications FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in ", "ss application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing sur"]} +{"26853250|3645740": ["FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions ", "3], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing surveys and tutorials, such as [3], [51]\u2013[53"]} +{"26853250|206578365": ["In addition to caching, the wireless network\u2019s edge devices can be used for performing effective, low-latency computations, using the emerging paradigm of mobile edge computing [189]."]} +{"26853250|17485266": ["The mini batch gradient descent is an algorithm that strikes a balance between stochastic gradient descent and batch gradient descent [78].", "To solve these challenges, several algorithms have been proposed, such as momentum SGD, RMSProp [78], nesterov accelerated gradient [80], Adagrad [81], and AdaDelta [82].", "To overcome these drawbacks of SGD, the mini batch gradient descent [78] can be used."]} +{"26853250|5385031": ["More recently, ANNs have started to attract significant attention in the context of wireless communications and networking [2], [4], [5], [31] and [32], since the development of smart devices and mobile applications has significantly increased the level at which human users interact with the wireless communication system.", "Finally, the introductory literature on machine learning for wireless networks such as in [2], [4], [32], and", "Third, a large number of the existing surveys, such as [2], [4], and [52]\u2013[57], are highly qualitative and do not provide an in-depth technical and quantitative description on the variety of existing machine learning tools that are suitable for wireless communications.", "Meanwhile, a number of surveys on machine learning and neural network applications in wireless networking have emerged, such as in [2], [4], [32], and [51]\u2013[64]."]} +{"26853250|7774517": []} +{"26853250|1708582": ["RL algorithms are used for robotics, gaming, and navigation [67]."]} +{"12399704|62585398": ["In fact, many optimization mechanisms have addressed different aspects of the communications in wireless visual sensor networks [9,18]."]} +{"12399704|5404353": ["coding (DVC) [9], may also be exploited.", "In order to attain high efficiency, protocols and algorithms of the MAC, network, transport and applications layers can operate in a cooperative way that disrupts the conventional data flow [9].", "In fact, many optimization mechanisms have addressed different aspects of the communications in wireless visual sensor networks [9,18].", "However, again, other techniques, such as distributed video\ncoding (DVC) [9], may also be exploited.", "A common approach to optimize WVSN is to exploit some characteristics of an active transmission flow [9].", "A common approach is to give higher priority to parts of the encoded data that are more relevant for the reconstruction of the original data [9,40].", "Reduction of the source rate is an adaptive approach that allows minimal packet losses, as proposed by some works [9,13], but it adds some complexity to the communications."]} +{"12399704|16120075": ["When performing a 2D modeling, the FoV is commonly approximated to an isosceles triangle for simplicity, but 3D modeling is also possible [5,6].", "In wireless visual sensor networks, the unique view of camera-enabled sensors over the monitored field [6] turns the recovery of lost packets into a required service.", "Actually, the FoV is a sector-like visible region emanating from the camera [5,6], defining a direction of viewing (the camera\u2019s pose).", "The area sensed by camera-enabled sensors is defined as the field of view [5,6], a sector-like area that is defined by a viewing angle, a sensing range and an orientation [19]."]} +{"12399704|7889189": ["Wireless sensor networks have to deal with many security issues, where confidentiality, integrity, authentication and availability are major goals do achieve [36].", "especially when multimedia data is transmitted [36]."]} +{"12399704|1230643": ["Wireless sensor networks (WSN) have been employed as an effective resource for a series of monitoring applications, providing information, such as humidity, pressure, temperature and luminosity, among many others [1,2]."]} +{"15041001|8909218": ["1, we consider an OFDMA cognitive small cell network where K co-channel cognitive small base stations (CSBSs) are overlaid on a primary macrocell.", "In the simulations, spectrum-sharing CSBSs and primary users are randomly distributed in the range of MBS, and cognitive small cell users are uniformly distributed in the coverage area of their serving small cell; the carrier frequency is 2 GHz, B = 10 MHz, N = 50, M = 50, and \u03c3 2 = B N N 0 , where N 0 = \u2212174 dBm/Hz is the AWGN power spectral density.", "Note that in (1), co-channel interference between small cells is assumed as part of the thermal noise because of the severe wall penetration loss and low power of CSBSs [21]."]} +{"8884763|2509135": []} +{"13513101|2509135": ["N RECENT years, cognitive radio technology [1] [2] [3] has been proposed as a promising communication paradigm to solve the conflict between the limited spectrum resources and the increasing demand for wireless services."]} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"24820984|8909218": []} +{"19552313|10299098": ["The choice of the right service model is application and environment-depending, and may also depend on the level of context-awareness of the involved devices [33].", "nodes is a still challenging research issue [33]\u2013[35].", "Under this perspective, the FC paradigm differs from the related Mobile Edge Computing (MEC) one [7], [8], [33], [34], in which only edge nodes are employed for the device augmentation."]} +{"19552313|32360363": ["The final goal is the \u2018\u2018smart\u2019\u2019 management of the overall city asset [98]."]} +{"19552313|3330461": ["However, due to the multi-hop nature of the Internet backbone and the short-range capability of the network technologies currently envisioned for the support of inter-device communication [25], [26], guaranteeing reliable network connections is a challenging task in the envisioned IoE realm [27], [28].", "However, these (positive) attributes are counterbalanced by the fact that: (i) FNs are small-size data centers with reduced fault-tolerance capability; and (ii) the Device-Fog communication typically relies on short-range WiFi/UWB/\nVOLUME 5, 2017 9887\nBluetooth-based connections that are intermittent, interferenceaffected and failure-prone [58]\u2013[60].", "11/15 transmission technologies, like WiFi, UWB and Bluetooth [25], [126].", "However, in this case, the resulting perconnection round-trip-time RTT becomes quite sensitive on the corresponding (generally, time-varying) inter-vehicle distance d (m) and tends to scale up/down proportionally to it, that is [25], [137], [135]:", "Since the IoE devices could be randomly distributed over the SG, it is expected that theNetwork layer relies on short/mediumrange wireless transmission technologies, like WiFi, UWB and/or Bluetooth [26];\n(iii) the Fog layer is responsible for the management of the massive volume of metered data.", "However, we note that [25]: (i) due to fading and path-loss, the energy consumption of D2D links increases with the inter-thing distance in an (at least) cubic way; (ii) due to thing mobility, D2D mobile links are intermittent, and their average failure rates typically increase with the average thing speeds [131]; and, (iii) under the D2D model, the initiator thing needs, at first, to discover proximate things, and, then, must perform task distribution, thing synchronization and task retrieval.", "For this purpose, the cooperating devices build up D2D links, that typically rely on short-range wireless communication technology, like UWB, WiFi or Bluetooth [25], [26].", "9 will rely on short/medium-range wireless networking technologies, like WiFi, UWB and/or Bluetooth [26]; (iii) thank to the virtualization of the underlying manufacturing things, it is expected that the Fog layer of Fig.", "It operates under the same vehicular scenario previously described for the V-FoE test-bed, but, according to [25], [137], it utilizes only \u201cad-hoc\u201d D2D IEEE802.", "For this purpose, the cooperating devices build up D2D links, that typically rely on shortrange wireless communication technology, like UWB, WiFi or Bluetooth [25], [26]."]} +{"19552313|18037424": ["The underlying networking infrastructure acts as glue: it allows the SG to perform remote metering by (possibly) exploiting the support of smart Energy Storage Devices [95], [96]."]} +{"15002700|9830350": ["Compared with flat protocols, hierarchical protocols offer a more feasible solution to handling large-scale networks with their enhancements to share limited wireless channel bandwidth, balance node energy consumption and reduce communication expense more optimally (Lung and Zhou, 2010; Liu, 2012)."]} +{"15002700|8326114": ["Meanwhile, adversaries may possess passive and active access to secret information, such as keys stored in a compromised node by eavesdropping (Schaffer et al., 2012) or Denial of Services (DoS) attacks."]} +{"15002700|9670348": ["Among the numerous proposed network routing protocols over the past years, hierarchical routing protocols significantly contribute to a system's scalability, lifetime, and energy efficiency (Akkaya and Younis, 2005; Anisi et al., 2012)."]} +{"15002700|1230643": ["In this research study, the Open System Interconnect (OSI) model is classified into five layers (Akyildiz et al., 2002): physical layer, link/MAC layer, network layer, transport layer, and application layer."]} +{"15002700|1331167": []} +{"26428978|6583734": []} +{"26428978|2623404": ["Since NFV deals with implementing the network services as software, SDN plays an important role in the orchestration of NFV [58, 65, 110].", "Recent advancements in the field of SDN and NFV allow ISPs to deploy many network services over the virtualized infrastructures [4, 24, 58, 65, 89].", "Advances in SDN have already addressed most of these aforementioned problems [27, 58]."]} +{"26428978|2387055": ["There have been recent studies towards the security in cloud and virtualized environments [113-115]."]} +{"26428978|39706822": ["As mentioned by John et al. [48], WSDL helps define web services from a technical perspective, including the aspects of a service, its interfaces, operations, endpoints, binding, and type definitions.", "[16], cloud service declarative definition language (CSDL) [21], SUN [22], and SMI [23] focus on the description of the services in the clouds.", "One of the most prominent ways for the service description in the Internet is Web Service Description Language (WSDL) [16, 48].", "NFF Network function forwarder\nNFV Network function virtualization\nNFVI Network function virtualization infrastructure\nNFVMANO\nNFV Management And Orchestration\nNMS Network management system\nNP Nondeterministic polynomial\nNS Network service\nNSH Network service header\nNVF Network virtual function\nOA&M Operations, administration and management\nOF OpenFlow\nOPEX Operational expenses\nPaaS Platform as a Service\nPM Physical machine\nQoS Quality of service\nSDL Service description language\nSDN Software defined networking\nSF Service function\nSFC Service function chaining\nSFCC Service function chaining controller\nSFCR Service function chaining router\nSFF Service function forwarder\nSFP Service function path\nSLA Service level agreement\nSMI Service measurement index\nSWA Software architecture\nUSDL Unified service description language\nVF Virtual function\nVIM Virtualized Infrastructure Manager\nVM Virtual machine\nVNF Virtual network function\nVNFC Virtual network function component\nVNFFG VNF Forwarding Graph\nVNFM VNF Manager\nWSDL Web service description language\nII.", "USDL has significant applicability to Internet service discovery, comparison, evaluation and management, enabling rigorous decision-making by service requestors [16].", "[16], there is a lack of a comprehensive specification model for cloud services covering multiple perspectives.", "WSDL is not sufficient for the specification of network services [48].", "[16] provide a detailed description and discussion for these languages.", "For example, current WSDLs may not support dynamic traffic steering among the various branches of the service functions, which may be formed due to SFC. Beek et al. and O'Sullivan have focused on the definition of non-functional properties of the electronic services with the purpose of improving the technology of automated service discovery, comparison, selection and substitution [18, 19]."]} +{"13958303|17024419": []} +{"5385031|7320605": ["Moreover, the surveys on applications of game theory for wireless sensor network focus on general problems not specifically from economic and pricing aspects [12], [13].", "\u2022 Strategy: Player\u2019s strategy is a complete plan of actions/instructions that the player can choose [12], and the payoff depends on not only its own actions but also the actions of others."]} +{"5385031|1756215": [", the attacker and the WSN owners) which strengthen the network security [222]."]} +{"5385031|12817488": ["redundancy as well as saving the energy required for information transmission to the sink node [99], [100]."]} +{"5385031|17205659": ["Various WSN security protocols were classified and evaluated in [221]."]} +{"7328077|64404": ["H IGH Ef\ufb01ciency Video Coding (H.265/HEVC) [1] has become the most popular video coding standard after its \ufb01nal release in 2013 [2] by the Joint Collaborative Team on Video Coding (JCTVC), which is organized by the ITU-T Video Coding Experts Group (VCEG) and the ISO Moving Picture Experts Group\u2026"]} +{"7328077|3540699": ["HEVC achieves better coding ef\ufb01ciency than its predecessor H.264/AVC [3] by adopting many new and complex coding tools [4]."]} +{"2329205|12452682": []} +{"10550494|8909218": ["Once a FAP has sensed the spectrum, it will send the information regarding the used and unused spectrum list to the database at the FGW. FAPs from other femtocells can access these information from the database, and share the spectrum information with neighboring FAPs.", "Subscribed femtocell customers can autonomously deploy FAPs to create cellular hotspots [1].", "network (CN) through an Internet protocol (IP) backhaul and femtocell gateway (FGW) [1].", "In the network, each FAP is connected to the core network (CN) through an Internet protocol (IP) backhaul and femtocell gateway (FGW) [1].", "The FGW serves as the coordinator of FAPs for a local area, such as FAPs in the same apartments building or nearby houses.", "The sensing coordination among multiple FAPs can be implemented by exchanging neighboring femtocell information through the FGW."]} +{"15862888|7686677": ["For energy-efficient communications, it is desirable to the maximize transmission rate and take the electricity cost into account [5], [36]."]} +{"1990757|2535224": []} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"9801723|3042864": ["An efficient way to alleviate the resource scarcity of mobile devices is to offload their resource-demanded tasks to remote cloud [1]\u2013[4] through pay as you go."]} +{"207172280|12452682": ["[6] provides a game theoretical overview of dynamic spectrum sharing from three aspects: analysis of network users\u2019 behaviors, efficient dynamic distributed design and optimality analysis."]} +{"24595524|17336376": ["The access of the service providers to the WSN-sensed data is implemented through the virtualization of the WSNs [5]."]} +{"15449163|18687271": ["[52] provided three distributed mobility management protocols, the first is based on the existing Proxy Mobile IPv6 (PMIPv6), the second is based on SDN, and the third is based on routing protocols.", "Proposed solutions: Inter-tier, intra-tier, and multi-RATs handoff mechanisms, and a mechanism for secure handoff [40, 93, 102, 52], which we will discuss in Section 5."]} +{"15449163|3330461": ["For a detailed review of D2D communication, interested readers may refer to [24]."]} +{"2374737|3330461": ["can share spectrum with at most one cellular subscriber [7], [25]\u2013[27]."]} +{"2374737|7644489": ["For example, in Release 12 of the LTE standard, an eNB (Evolved Node B) can keep track of the interference received at each of its cellular subscribers in each sub-band and can simply remove the D2D link from the sub-band once it observes a higher-than-tolerable interference level [28], [29]."]} +{"7314182|1420935": ["and the policy makers, as energy sharing can contribute to improving the efficiency of power grid operations, while also reducing power generation cost and CO2 emission [21]."]} +{"64428928|3330461": []} +{"20603166|6909107": ["This helps operators to increase the service quality through the effective mobility management in addition to the benefits of utilizing cloud-like resources at the edge [101]."]} +{"20603166|9436049": ["Although there are studies focus on this area [231], [232], server placement in the Metropolitan area need to be studied in detail and analyzed"]} +{"20603166|3767252": ["Because of the major differences with respect to the implementation and deployment of the mentioned proposals, the security mechanisms and underlying protocols will also vary [77].", "Therefore, MEC developments should intrinsically enable security and privacy for protecting the applications and user data at the edge server and provide an authentication system for the vehicles [25], [77], [99].", "On the other hand, any casual user such as a public place owner can deploy a Cloudlet or Fog server within a private environment [77]."]} +{"20603166|8650651": ["In the case of SDON, standardization of this interface may improve the operations to a greater level since an optical network may cover a large area consisting multiple domains [221].", "The role of the northbound interface in SDONs is still raw for the time being and research in this area is more challenging since there are multitude of interfaces that should be managed in physical and transport layers [221]."]} +{"20603166|11414835": ["virtualization are feasible for abstraction and isolation, it is observed that there is a lack of complete performance evaluation [219]."]} +{"20603166|2535224": ["ization in wireless and mobile networks is more challenging and complicated [224]."]} +{"20603166|2623404": ["Moreover, there are surveys on SDN [26]\u2013[30], Software Defined Wireless Networks (SDWN) [31], [32] and Network Functions Virtualization (NFV) [33], [34] which are the complementary technologies for improving the operations of edge servers."]} +{"20603166|10693567": ["[138], OpenFlow was firstly used for a campus network which is an inspiration to support campus-based scenarios for Edge Computing."]} +{"20603166|3042864": ["There are recent surveys on cloud computing [18], [19] and MCC [8], [20]\u2013[22].", "In [20], the mobile cloud is defined in two different ways: \u2022 Infrastructure based \u2022 Ad-hoc mobile cloud According to this classification, the infrastructure based model specifies the hardware infrastructure of cloud datacenters serving to mobile users."]} +{"20603166|10532321": ["to the data plane [135]."]} +{"18168518|3330461": ["Most of the existi ng works on SCNs and D2D enabled user association are focused on conventional physical layer metrics to optimize the netw ork performance [1]\u2013[4], [7], [8], [11]."]} +{"8295786|19938676": ["However, 3.9G long term evolution (LTE) includes capabilities that exceed those of 3G mobile communications [9,10].", "\u2026without encryption due to used analogue modulation, (ii) limited sub-scribers due to used FDMA technique, (iii) power radiation of base station being unsafe and lack of a handoff process, (iv) limited to voice service, and (v) incompatible systems that lack a uni\ufb01ed international standard [8\u201310].", "The EDGE has been added to enhanced the packet-switched services and enabled new high speed data applications such as multimedia applications [9,10].", "However, GSM suffers from a low data rate, which prompted for an improvement in the cellular system by general packet radio services (GPRS) technology [8\u201310]."]} +{"8295786|14765802": ["Data traffic will increase to 82 GB per subscriber per year [1] due to the unprecedented demand for data high bandwidth video streaming, which will represent more than half of global mobile data traffic [2]."]} +{"8295786|2443013": ["Although the joint implementation of these mechanisms may provide very high data rates that are theoretically more than 1 Gbps for stationary users, further increases are limited due to the smaller number of available frequencies [11,16]."]} +{"8295786|24491750": ["The BS accounts for 57 % of the total energy consumption in cellular networks, and the power ampli\ufb01er (PA) has the highest energy consumption of the BS [46]."]} +{"518308|10283694": ["protocols [15]\u2013[19], encouraging participation in vehicular networks [20], security [21], [22], and vehicular Delay-/"]} +{"518308|3330461": []} +{"518308|763939": ["Several related surveys and tutorials on vehicular networks have been published previously, related to requirements and architectures [8], inter-vehicle communications [9], [10] and information dissemination [11], mobility models [12], information management for safety applications [13], applications [14], routing"]} +{"518308|1230643": ["In-network data aggregation (or, simply, data aggregation) has been the focus of significant research in the field of Wireless Sensor Networks (WSNs) [278], which are energy-constrained; for example, see [279]."]} +{"12325031|8974063": ["These problems include th e DSA-based MAC protocol design in CRNs [3], [4], [27], [28], routing protocol design in CRNs [14], [29] and cross-layer", "Network management DSA-based MAC protocol design [3], [4], [27], [28] Unsupervised learning (model-free learning) [25], [26], [33]\u2013[35] Single-agent-based reinforcement learning [25] Spectrum-aware routing [14], [29] Multi-agent-based reinforcement learning [26], [34] Self-organization [12], [30] Learning automata [35] Network security [20], [31] Repeated-game-based learning [33], [36], [37]"]} +{"12325031|7851743": [", CRNs and self-organized networks [12], [13]) emphasize more on autonomous, adaptive reconfigurability."]} +{"12325031|1185580": []} +{"12325031|2509135": ["Therefore, it is considered especially appropriate for the network management problems in the CRNs, device-to-device (D2D) networks, heteronomous networks (HETNETs) and ad-hoc networks, which consist of multiple independent decision-11 [55], [56], [59], [60], [82] Q-learning [55], [56], [82], SARSA [59], [60] Neural Network [56], State abstraction [59], [60], N/A [82] N/A Multirate transmission control MDP [57] Q-learning Neural network with feature extraction [57] N/A Call admission con-trol CMDP [68], [75] Q-learning [68], [75] State abstraction [68], [75] N/A Joint admission-bandwidth control CMDP [73], [83] Q-learning [83], Neural network [73] N/A N/A Single link", "A device in a CRN is expected to be aware of its surrounding environment and uses the methodology of understanding-by-building to reconfigure the operational parameters in real-time to achieve optimal network performance [2], [3].", "These problems include the DSA-based MAC protocol design in CRNs [3], [4], [27], [28], routing protocol design in CRNs [14], [29] and cross-layer network control problems in CRNs such as self-organization [12], [30] and network security problems [20], [31].", "This section provides a comprehensive survey on the applications of model-free learning in the cognitive wireless networks (following the broad-sense de\ufb01nition of CRNs), and will cover a wide spectrum of problems across different layers of the network-protocol stacks.", "Apart from [124], the direct applications of the standard L R \u2212 I learning scheme (with the convergence property of Theorem 4 and the pure-strategy NE existence condition) is also employed by a number of studies, which range from relay-selection in the cooperative network [125] to the CSMA-based DSA management [126] and the MIMO-based DSA management [127] in the CRNs.", "In recent years, Cognitive Radio Networks (CRNs) have been widely recognized from a high-level perspective as an intelligent wireless communication system .", "As we have discussed in Section III-B, for the Aloha-like spectrum access problem in CRNs [100], the near-NE policies of the stochastic access game can be obtained if all the SUs update their local polices with the Logit function (44) and the Q-value at state s is updated following (25).", "Although the detailed discussion on these topics is beyond the scope of this survey, it is believed that addressing these issues will bring great improvement to the existing learning mechanisms in the CRNs.", "It is worth noting that by emphasizing the network architecture of spectrum sharing between the licensed/primary networks and the unlicensed/secondary networks [4], \u201cDSA networks\u201d is frequently considered a terminology that is interchangeable with \u201cCR networks\u201d [3].", "One example of such exploitation can be found in [157], which models the distributed dynamic routing in multi-hop CRNs as an SG (Figure 16).", "In addition to L R \u2212 I learning, other learning schemes based on the general LA updating rule in (11) are also employed by research on resource allocation in the CRNs.", "The feature extraction method is further adopted in stochastic-game-based modeling for strategy learning in CRNs [61], [62].", "In the framework of CRNs, the following abilities are typically emphasized: Wenbo Wang and Andres Kwasinski are with the Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY 14623 USA (email: wxw4213@rit.edu, axkeec@rit.edu)."]} +{"12325031|3042022": ["Based on the MDP framework, various model-free learning methods such as Temporal Difference (TD) learning [44] and learning automata [35] can be adopted to define the behavior rules of an agent.", "In the literature, important surveys on these model-free learning methods from the perspective of control/game theory include [25], [26], [33]\u2013[35].", "Then an LA-based algorithm should be able to achieve the following goal [35]:", "Instead of updating the action according to the myopic optimal Q-value in discounted-reward MDP and bias-value in average-reward MDP, the LA directly updates the probabilities of actions based on the utility feedback [35]."]} +{"12325031|1708582": []} +{"12325031|12601073": ["As indicated by our discussion in Sections I-A and I-B, the problem domain of learning in cognitive wireless networks can be divided into two categories: the problems of wireless environment cognition (namely, spectrum sensing) [7]\u2013[9] and the problems of network management (namely, strategy learn-", "For an overview of the relevant techniques, the readers may refer to recent survey works in [7]\u2013[9]."]} +{"11103675|16839827": ["Given that \u201cMusic\u201d and \u201cEntertainment\u201d are mostly viewed on YouTube [51], these categories are selected for analysis."]} +{"5633340|2833151": ["This formulation is particularly appealing for next-generation wireless systems [27], as it captures the tradeoff between obtaining a satisfactory spectral efficiency and saving as much energy as possible [19, 22, 33].", "Consequently, solutions that focus exclusively on spectral efficiency maximization are not aligned with energy-efficiency requirements [18, 19] \u2013 which, as we mentioned above, are crucial for the deployment and operation of HetNets."]} +{"20805124|16972183": []} +{"10319033|12452682": []} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"18668415|9040432": []} +{"18668415|11735843": ["the iii) development of new sophisticated control abstractions [152].", "Big data techniques have the ability to scalably and reliably process massive amounts of data using a cluster of commodity servers (Qadir et al. 2014).", "SDN is generally understood to entail (i) the separation of the control and data plane; (ii) the control of multiple data planes by a single controller; and the (iii) development of new sophisticated control abstractions (Qadir et al. 2014)."]} +{"205824238|8833120": []} +{"27981027|10837932": []} +{"27981027|12884178": ["A survey of resource allocation in relay-enhanced OFDMA-based networks is presented in [85]."]} +{"27981027|8909218": []} +{"27981027|7892994": ["Part of the RBs is used with reuse of 1 in the cell center region, whereas reuse 3 is applied in regions A, B, and C [114]."]} +{"22661441|12452682": ["A game theoretical overview of dynamic spectrum sharing is provided in [12].", "On the other hand, game theory has been widely investigated in wireless networks [12]\u2013[16]."]} +{"11288384|8909218": ["Femtocells aim to enhance the poor indoor coverage, boost the overall spectral efficiency, and offload the overlay macrocell traffic [4]."]} +{"36698537|14745481": []} +{"36698537|17205659": ["Although many stateof-the-art solutions have been proposed earlier in areas such as mobile ad hoc networks (Djenouri and Badache, 2005; Cho and Chen, 2011), and wireless sensor networks (Yong Wang and Ramamurthy, 2006), still M2M paradigm may require new approaches to security."]} +{"36698537|1236072": []} +{"8833120|2871699": ["communication are often small, infrequent, diverse and mainly in the uplink [180]."]} +{"8833120|12029139": ["2) Wireless powered communication networks: The remarkable advancement of wireless energy harvesting and transfer technologies has created many new research directions recently [163], [164]."]} +{"8833120|1932843": ["5) Learning Algorithms: Reinforcement learning algorithms have been used commonly to address many problems in computer science such as robotics or optimization control [176]."]} +{"8833120|15694215": [", QoS, multicasting, security, as presented in [46] and [47] which are not well examined using repeated games.", "However, lack of infrastructure poses many issues such as interference, decentralization, limited-range, and insecurity [46], [47].", "Thus, there are many advantages and applications of wireless ad hoc networks in practice as discussed in [46], [47]."]} +{"8833120|44944144": [", QoS, multicasting, security, as presented in [46] and [47] which are not well examined using repeated games.", "However, lack of infrastructure poses many issues such as interference, decentralization, limited-range, and insecurity [46], [47].", "Thus, there are many advantages and applications of wireless ad hoc networks in practice as discussed in [46], [47]."]} +{"20264664|5660618": ["plant is remotely controlled over a wireless mesh network [20]."]} +{"1212871|17109970": ["Recently, there has been a number of researches that apply the non-cooperative game theoretical approach to EE design in ICs [31]\u2013[34] or the MAC [35].", "However, all these studies considered single-antenna ICs and they applies for multi-antenna case only if the transmit powers are optimized with fixed transmit directions as shown in [36].", "In this paper, we apply the non-cooperative game theoretical approach to deal with the EE maximization problem for MIMO ICs, where each link attempts to maximize its own EE by jointly optimizing transmit power and beamformers.", "A number of researches have applied game theory to design energy efficient communications for ICs [21]\u2013[24], multiple access channel (MAC) [25], or wireless data dissemination scenarios [26], [27].", "In [19], a decentralized beamforming EE (DBFEE) algorithm was devised for symmetric MIMO ICs, where the distance from one transmitter to its desired receiver is identical for all links, and each transmitter has the same distance to all its unintended receivers.", "To the best of our knowledge, only a few works have studied distributed algorithms concerning the overall performance for EE maximization problem for MIMO ICs [19], [20].", "Studies in this direction are plentiful in literature, e.g., [21] for the MIMO multiple access channel (MAC), [22]\u2013[29] for the MIMO ICs.", "The EE optimization problem in flat fading single-input single-output (SISO) ICs was considered in [32], where one distributed algorithm based on non-cooperative game was proposed.", "This paper focuses on the EE maximization problem for MIMO ICs with the per-link transmit power constraint.", "For the MIMO ICs, the authors in [22] first utilized the noncooperative game framework to deal with the SE maximization problem, where the iterative water-filling algorithm was proposed to find the NE of the game.", "However, in this paper we consider the EE maximization problem for MIMO ICs with multiplexing.", "The work that is most closely related to ours is [24], where the noncooperative game was formulated for the SE maximization problem of the MIMO ICs and one asynchronous distributed algorithm was proposed to reach the NE of the game."]} +{"7796069|141053": []} +{"9431951|17109970": []} diff --git a/edge/graph_24406680.jsonl b/edge/graph_24406680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9ad50986250f38dae4b8762300879fe28f9a818 --- /dev/null +++ b/edge/graph_24406680.jsonl @@ -0,0 +1,2 @@ +{"207249455|206584087": ["A DoS attack explicitly prevents the service providers from continuously providing their service to the user, and a distributed DoS (DDoS) attack organizes many attacking agents to achieve this [Zargar et al. 2013].", "Recently, Zargar et al. [2013] surveyed DoS attacks, but there is no game-theoretic approach in almost all of the DoS surveys."]} +{"207249455|1940388": ["There are several methods for packet scheduling attacks, such as putting malicious code into one of the packets in the path between the destination and source, or performing unfairness attacks [Chen et al. 2009]."]} diff --git a/edge/graph_244288.jsonl b/edge/graph_244288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2443013.jsonl b/edge/graph_2443013.jsonl similarity index 100% rename from graph_2443013.jsonl rename to edge/graph_2443013.jsonl diff --git a/graph_2445817.jsonl b/edge/graph_2445817.jsonl similarity index 100% rename from graph_2445817.jsonl rename to edge/graph_2445817.jsonl diff --git a/edge/graph_2445985.jsonl b/edge/graph_2445985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24460912.jsonl b/edge/graph_24460912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6f0a3527c131092f036874061b9cc0247c2679d --- /dev/null +++ b/edge/graph_24460912.jsonl @@ -0,0 +1,4 @@ +{"34748939|12127129": []} +{"8310886|27637541": []} +{"32771998|4716814": ["The biggest involvement of this type of algorithms can be found in the Artificial Intelligence field, bringing contribution to numerous applications, such as in fire detection in forests [1], robotics [2], autonomous driving [3] and mobile applications [4]."]} +{"11691363|1146543": ["Software simulations are useful for investigating the capabilities of neural network models, and creating new algorithms, but they fall short where fast execution and training is required [21], and fall short as problem size scales up, creating a bottleneck [22]."]} diff --git a/edge/graph_24463701.jsonl b/edge/graph_24463701.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b589b959c444f538aee8b188757766dc869185a0 --- /dev/null +++ b/edge/graph_24463701.jsonl @@ -0,0 +1,31 @@ +{"11074632|12817488": ["When configuring the simulation, the First Order Radio Model [4, 10] like the Fig."]} +{"11074632|1236072": ["Among them, various protocols based on LEACH (Low Energy Adaptive Clustering Hierarchy) of hierarchical routing are being proposed [1, 2, 5, 6, 11]."]} +{"6636679|1230643": ["It has gathered a considerable research interest in recent years mainly due to its possible wide applicability, such as monitoring (habitat, medical, seismic), surveillance and pre-warning purposes [1]."]} +{"10438889|1230643": ["As a new technology for information collecting and processing, there are a wide range of applications of WSNs in military, health, commercial applications and so on [2]."]} +{"63509790|3755658": []} +{"14314501|205286988": []} +{"686120|945077": ["We have also found [20], authored by Agarwal and Motwani."]} +{"14487867|3894519": ["[18] gives a detailed comparison analysis on different variants of LEACH as A-LEACH, S-LEACH and M-LEACH in terms of energy"]} +{"2802728|9830350": ["Many researchers have found that the hierarchical routing and specifically the clustered based routing play an important role in reducing energy depletion and increasing the network endurance ( [1], [2], [3])."]} +{"9133445|1230643": []} +{"8114005|1230643": []} +{"36833022|1230643": []} +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"17039770|2835258": []} +{"17039770|14441987": []} +{"17617867|1236072": ["As for network aspects, routing algorithms for WSNs can be classi\ufb01ed into three categories: multihop \ufb02at, hierarchical, and location-based [24]."]} +{"6297068|1230643": ["Energy conservation plays a crucial in wireless sensor networks since such networks are designed to be placed in hostile and non-accessible areas."]} +{"1687747|1236072": []} +{"1687747|1230643": ["Energy conservation is one of the most important and discussed issues in WSN application and protocol development [1][14]."]} +{"1097523|12817488": ["In the synchronous case, the sensor readings are sent to the base stations in real-time using multi-hop wireless communications, where the sensor nodes cooperatively forward data packets on behalf of other sensor nodes towards the base stations."]} +{"53341028|1230643": []} +{"18429074|9830350": []} +{"18429074|1236072": []} +{"13770956|6275330": ["With the developments of low-power and multi-functional sensors, wireless sensor networks (WSNs) (Akyildiz et al., 2002; Arampatzis et al., 2005; Prabhakar et al., 2010; Vullers et al., 2010) composed of sensor nodes with abilities of data sensing/processing and wireless communication have paved\u2026", "With the developments of low-power and multi-functional sensors, wireless sensor networks (WSNs) (Akyildiz et al., 2002; Arampatzis et al., 2005; Prabhakar et al., 2010; Vullers et al., 2010) composed of sensor nodes with abilities of data sensing/processing and wireless communication have paved the way for a wide variety of practical applications in monitoring, tracking and control etc."]} +{"13770956|1230643": ["Extensive researches have been carried out to tackle the problem and many solutions have been proposed, among which include clusteringbased approaches (Akyildiz et al., 2002; Karl and Willig, 2005).", "With the developments of low-power and multi-functional sensors, wireless sensor networks (WSNs) (Akyildiz et al., 2002; Arampatzis et al., 2005; Prabhakar et al., 2010; Vullers et al., 2010) composed of sensor nodes with abilities of data sensing/processing and wireless communication have paved\u2026", "With the developments of low-power and multi-functional sensors, wireless sensor networks (WSNs) (Akyildiz et al., 2002; Arampatzis et al., 2005; Prabhakar et al., 2010; Vullers et al., 2010) composed of sensor nodes with abilities of data sensing/processing and wireless communication have paved the way for a wide variety of practical applications in monitoring, tracking and control etc."]} +{"13770956|12060835": ["Parallel to the significantly improved network clustering techniques, another important recent progress is the development of energy harvesting (EH) sensors (Bergonzini et al., 2009; Gorlatova et al., 2009; Hasenfratz et al., 2010; Raghunathan et al., 2005; Sudevalayam and Kulkarni, 2010).", "\u2026can harvest energy (e.g., solar, kinetic, thermal etc) from their environment, converting this energy into electrical energy which is then stored in devices with large numbers of recharge cycles (such as super-capacitors) (Sudevalayam and Kulkarni, 2010) to achieve virtually infinite lifetime.", "The energy harvesting rate is assumed according to the previous literature (Calhoun et al., 2005; Sudevalayam and Kulkarni, 2010), typically tens of milliwatts.", ", solar, kinetic, thermal etc) from their environment, converting this energy into electrical energy which is then stored in devices with large numbers of recharge cycles (such as super-capacitors) (Sudevalayam and Kulkarni, 2010) to achieve virtually infinite lifetime."]} +{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]} +{"6125731|9830350": ["Besides, long-range communications directly from CHs to the BS can breed too much energy consumption; despite the fact that CHs rotation is performed at each round to achieve load balancing, LEACH cannot ensure real load balancing in the case of sensor nodes with different amounts of initial energy, because CHs are elected in terms of probabilities without energy considerations [8]."]} +{"6125731|3755658": ["For instance, CH changes and advertisements may diminish the gain in energy consumption [9,10]."]} +{"6125731|1236072": ["It is not always a realistic assumption for single-hop inter-cluster routing with long communication range [7]."]} +{"6125731|1230643": ["Leach performs the single-hop inter-cluster, directly from CHs to the BS, routing method, which is not applicable to large-region networks [6]."]} diff --git a/edge/graph_2446461.jsonl b/edge/graph_2446461.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2448188.jsonl b/edge/graph_2448188.jsonl similarity index 100% rename from graph_2448188.jsonl rename to edge/graph_2448188.jsonl diff --git a/edge/graph_2448554.jsonl b/edge/graph_2448554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24491750.jsonl b/edge/graph_24491750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbdafdd082e5cf6067756dc93b5a6ec9775d543b --- /dev/null +++ b/edge/graph_24491750.jsonl @@ -0,0 +1,6 @@ +{"17679053|2833151": []} +{"17679053|8909218": ["The literature mentions the advantages of these technologies like lower energy consumption and low maintenance costs compared to those of a macroBS [33,34], as well as higher dedicated data rates and better QoS for small groups of users levels, which leads to better user perception [8,33].", "Operating a macroBS during 1 year can cost 60000 Euros/year, whereas a femtoBS only 200 Euro/year [33]."]} +{"11480188|18148591": ["As proposed in [ 12 ,13], Alamouti code with two transmitting antennas uses two different symbols s1 and s2 to transmit simultaneously during the first symbol period, followed by is\u20442 and s\u20441 during"]} +{"32451657|8909218": ["A femtocell base station (BS) is a BS with low transmit power, typically installed by a subscriber in home or SOHO (small office/home office) to provide access to a closed or open group of users as configured by the subscriber and/or the access provider [1][2]."]} +{"36035645|10837932": []} +{"2896766|1236072": ["Many routing and MAC protocols have been proposed to prolong the network lifetime [22], [26], [34]."]} diff --git a/graph_2451860.jsonl b/edge/graph_2451860.jsonl similarity index 100% rename from graph_2451860.jsonl rename to edge/graph_2451860.jsonl diff --git a/edge/graph_2457428.jsonl b/edge/graph_2457428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2457664.jsonl b/edge/graph_2457664.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2457805.jsonl b/edge/graph_2457805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24588236.jsonl b/edge/graph_24588236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bd2a56e4ca0a3c1d55bf239debdc403d4cc0b48 --- /dev/null +++ b/edge/graph_24588236.jsonl @@ -0,0 +1,26 @@ +{"12337968|10837932": []} +{"9765242|193574": ["In the past, different surveys [9], [12]\u2013[15] have been published on the topic of energy-efficient core networks."]} +{"9765242|10837932": ["Bianzino, 2012 [9] wired (focus), wireless communications, computer and data center architectures \u2013 (ALR (sleep mode, rate switch), interface proxying (LC and external proxying), energyaware infrastructure (applications and routing), energy-aware software (user-level and kernellevel applications)) \u2013 (power measurements surveyed) \u2013 \u2013 \u2013", "[8] different solutions are being studied to reduce the energy waste, or, equivalently, to make the network consumption proportional to the traffic load [9, 10]."]} +{"19959132|16515612": ["Calzarossa et al. (2000) extended their work in Calzarossa and Serazzi (1993), discussing methodologies and modelling techniques for workload characterisation through two use case studies: client/server environments and parallel systems.", "Secondly, while the works of Calzarossa and Serazzi (1993), Calzarossa et al. (2000), Elnaffar and Marin (2002), and Elnaffar and Martin (2006) focus on the methodologies and techniques for construction of workload models, and parameters associated with the systems which are subject of the process,\u2026", "3 Related works Calzarossa and Serazzi (1993) carried out a survey on workload characterisation focusing on the steps required for the construction of workload models and the sets of parameters to be considered in various types of systems (i.e., batch, interactive, database, network-based,\u2026", "Workload analysis plays a key role in all the studies where the performance indices of a system are to be determined (Calzarossa and Serazzi, 1993).", "Workload analysis plays a key role in all the studies where the performance indices of a system are to be determined (Calzarossa and Serazzi, 1993). The development of accurate workload models involves challenges such as defining the desired level of detail, selecting a representative set of metrics, choosing the methods and tools to measure the metrics, and validating the generated method. According to Ferrari et al. (1983), the main steps to produce workload models are fourfold: formulation, collection of parameters, statistical analysis of the measured data (preliminary analysis, analysis of the parameter distributions, sampling, static analysis, and dynamic analysis), and representativeness.", "We started by deriving search terms based on analysis of previous literature surveys (i.e., Calzarossa and Serazzi, 1993; Calzarossa et al., 2000; Elnaffar and Marin, 2002; Elnaffar and Martin, 2006).", "In Elnaffar and Marin (2002), and Elnaffar and Martin (2006), some of those case studies presented in Calzarossa and Serazzi (1993) are revisited, and new ones are included (i.e., WWW and client/server), emphasising the techniques used to characterise workloads in such systems."]} +{"5929770|10658846": []} +{"168800330|193574": ["In literature [25], [47], energy aware scheduling algorithms either focus on scheduling of tasks in such a manner that their execution completes in minimum time with reduced energy consumption or tasks are balanced over a number of processors so that all processors runs with similar utilization level.", "Figure 4 shows a taxonomy of different approaches that are proposed in the literature to achieve energy efficiency in cloud datacenters [9], [25], [100].", "As stated in [25], the difference between an idle and a fully utilized Ethernet link is negligible, hence the energy savings with ALR are not much significant.", "Other techniques like delaying the execution of a job (with the hope that another job will finish in near future) [48] and migrating a job to another system (in case some job on the system have finished execution) [25] would also save significant amount of energy for", "In the literature [9], [14], [25], [68], [70] energy efficiency of computing devices is considered at three different levels including efficiency of hardware, resource management systems and applications as shown in Figure 3.", "Given the well-known growth in datacenter TCO, several solutions that can decrease the energy consumed by storage module, and keeping customers data highly available, are proposed in the literature [25].", "Despite the potential benefits of switching components off, the motherboard is a high consuming component (Table 2), that can be switched off only if the whole server can [25].", "Other models like PowerTOP and Joulemeter [25] are also accurate for non-virtualized servers.", "Low power idle (LPI) mode [25] for Ethernet devices are defined by IEEE 802.", "For such systems, high level energy efficient techniques like Green TCP, network algorithms, Clean-slate approaches and energy-aware framework (network virtualization) [25] can be more performance-energy efficient."]} +{"168800330|2254944": ["Similarly, scheduling can be categorized as centralized, distributed and hierarchical policies as explained in [2].", "In hierarchical models the scheduling is a combination of centralized and decentralized schedulers, where a centralized scheduler is working at the top level and a decentralized scheduler is installed at the lower level [2].", "Typically clusters are homogeneous, however there are certain heterogeneous HPC clusters like OSCAR [2].", "Conceptually clusters, grids and clouds are treated the same [2], hence considerable efforts have been made to analyze and differentiate the energy efficiency methods proposed for these systems.", "A brief survey on resource allocation (high level scheduling) problem in clusters, grids and cloud computing systems is conducted in [2].", "If QoS and expected performance level is not achievable, then the customers would not even pay or may alternately switch to other similar service providers [2].", "Due to multiple administrative domains, a hierarchical job scheduler (local and meta) is responsible for resource management in grids [2].", "Such approaches are able to allocate resources (VM placement) near-optimally, in view of task characteristics and performance requirements [2].", "Distributed systems (grids and clouds) are preferred over non-distributed systems for three main reasons including reliability, distributed nature of applications and concurrent execution of applications [2].", "Large scale computing systems as observed in the top500 [1] supercomputers, clusters, grids [2], and clouds [3] consist of a large number of Information & Communication Technology (ICT) resources that are connected through a network."]} +{"168800330|10608305": ["A number of techniques are used to implement energy efficient mechanisms [20] in ICT equipment like processors and network cards, to make them less power hungry.", "In [20], the authors have briefly surveyed the energy efficiency in clusters using load balancing, power scalable processors (DVFS) and low power memory chips."]} +{"168800330|10837932": ["Such type of energy efficient protocols can reduce the energy consumption of datacenter networks [34] as shown in Table 7.", "A classic illustration of virtualization is to share servers that reduces hardware cost, improves energy management, reduces cooling cost and carbon footprints in datacenters [34].", "Similarly, Selective connectedness allows resources to go idle or low power mode for some time transparently in the network [34]."]} +{"27151882|193574": ["Given that more than fifty percent of the overall costs in data centers account for energy, it is eligible for data center operators even to slightly decrease the energy consumption since this can have a significant impact on their profitability [2].", "An important method that can improve the utilization of resources and at the same time reduce the overall energy consumption is to load distribution within a data center by migrating virtual machines [2]."]} +{"9132797|16717715": ["Finally, in order to evaluate our system for workloads that consist of random accesses to files, we use the SPHINX-II Speech Recognition utility [16] from CMU (referred to as SPHINX)."]} +{"29073951|14765802": []} +{"29073951|193574": []} +{"29073951|7876249": []} +{"29073951|2206212": []} +{"29073951|17379362": []} +{"29073951|10837932": []} +{"29073951|12030667": []} +{"29073951|3994942": []} +{"29073951|991041": []} +{"17695954|10658846": []} +{"44336963|11810221": ["Notice task execution times are assumed to be available before scheduling , and schedule results of CRS can be considered as the schedule is reoptimized at any decision point by fully available at that time (Herroelen and Leus, 2005)."]} +{"154032|193574": []} +{"154032|10837932": []} +{"17675973|10837932": []} +{"6047395|525062": ["Such anomalies have severe consequences in general on the performance of the TCP/IP networking stack [24].", "How to rebalance flows across processing cores without impacting network performance, given that dataplane operating systems implement their own TCP/IP networking stack and that TCP/IP performance is negatively impacted whenever packets are either lost or processed out of order [24]."]} diff --git a/graph_2459674.jsonl b/edge/graph_2459674.jsonl similarity index 100% rename from graph_2459674.jsonl rename to edge/graph_2459674.jsonl diff --git a/edge/graph_2461269.jsonl b/edge/graph_2461269.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24626066.jsonl b/edge/graph_24626066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2463419.jsonl b/edge/graph_2463419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24641318.jsonl b/edge/graph_24641318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39208ca4a22f75590d5630c639f52a18c3ab4f4a --- /dev/null +++ b/edge/graph_24641318.jsonl @@ -0,0 +1,16 @@ +{"7885409|7389705": ["It is hard to model these interacted objects as homogeneous networks, while it is natural to model different types of objects and relations among them as heterogeneous networks."]} +{"2127100|12161567": ["We begin by introducing notation to de\ufb01ne the task, largely following the terminology in Nickel et al. (2015).", "This has motivated research in automatically deriving new facts to extend a manually built knowledge base, by using information from the existing knowledge base, textual mentions of entities, and semi-structured data such as tables and web forms (Nickel et al., 2015).", "Several approaches (Nickel et al., 2015) use a margin-based loss function."]} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"207192966|8310135": ["Starting from the domain of named entity recognition (NER), current approaches establish links not just to entity types, but to the actual entities themselves [15, 20, 30]."]} +{"16320392|2082499": ["Another related problem is record linkage [34], [35], [36], [37], [38], [39], [40], [41] (also called duplicate detection, entity matching, and reference reconciliation) in the database community."]} +{"16320392|8310135": []} +{"16320392|386036": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"2131938|10500613": ["The data challenge is more formally framed as ontology or (textual) schema matching (Hobbs, 1985; Rahm and Bernstein, 2001; Euzenat and Shvaiko, 2007): matching structure of two ontologies/databases or (in extension) mapping between KB relations and NL text."]} +{"11790493|6746689": ["S3a) that reduces the line width to one pixel (68) (Fig."]} +{"14775471|8310135": ["Fine level of understanding is also desirable in many other important tasks, such as named entity recognition (NER) [23] and word sense disambiguation (WSD) [24].", "NER seeks to locate and tag real-world entities mentioned in the text with their types (i.e., concepts).", "Some previous work in named entity recognition (NER) has also addressed similar issues.", "While early research on NER is confined to coarsegrained named entity classes such as person and location, it is generally agreed that fine-grained NER [14, 15] (i.e., by using more specific subcategories) is more beneficial for a wide range of web applications, including Information Retrieval (IR), Information Extraction (IE), or Query-Answering (QA)."]} +{"1907637|16575201": ["Automatic Term Recognition (ATR) (Kageura and Umino, 1996) focuses on extracting phrases that are signi\ufb01cant for a given domain, usually with the aim of building a terminology."]} +{"2600027|12161567": []} +{"16178102|17323154": []} +{"2265838|10500613": ["Schema matching (Rahm and Bernstein, 2001; Ehrig et al., 2004; Giunchiglia et al., 2005) is a task from the database and knowledge representation community in which systems attempt to identify a \u201ccommon schema\u201d that covers the relations de\ufb01ned in a set of databases or ontologies, and the mapping\u2026"]} +{"704519|38476": ["Structured learning problems have been addressed by algorithms such as conditional random elds (Laert y et al., 2001), max-margin Markov networks (Taskar et al., 2003) and constrained perceptrons (Punyakanok & Roth, 2001); see ( Dietterich, 2002 ) for a review."]} diff --git a/edge/graph_2465991.jsonl b/edge/graph_2465991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2469117.jsonl b/edge/graph_2469117.jsonl similarity index 100% rename from graph_2469117.jsonl rename to edge/graph_2469117.jsonl diff --git a/graph_2469314.jsonl b/edge/graph_2469314.jsonl similarity index 100% rename from graph_2469314.jsonl rename to edge/graph_2469314.jsonl diff --git a/edge/graph_24719329.jsonl b/edge/graph_24719329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d209f911a43778a40481e2732c96a750cc99208e --- /dev/null +++ b/edge/graph_24719329.jsonl @@ -0,0 +1,2 @@ +{"63055129|19938676": []} +{"33403146|12673419": ["The vast majority of studies have focused on implementation of advanced techniques to achieve higher data rates and spectrally efficient communication links such as: i) blue filtering that suppresses the slow phosphor layer; thus increasing the LED bandwidth up to 20 MHz [3], ii) pre- and post-equalization [4], [5]; iii) utilizing multiple LEDs via wavelength-division multiplexing (WDM) and spatial-multiplexing known as multiple-input multiple-output (MIMO) [6]; iv) advanced modulation schemes such as carrier-less amplitude and phase modulation (CAP) [7] and orthogonal frequency division multiplexing (OFDM) [8], [9]."]} diff --git a/edge/graph_2471981.jsonl b/edge/graph_2471981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2473564.jsonl b/edge/graph_2473564.jsonl similarity index 100% rename from graph_2473564.jsonl rename to edge/graph_2473564.jsonl diff --git a/graph_2473728.jsonl b/edge/graph_2473728.jsonl similarity index 100% rename from graph_2473728.jsonl rename to edge/graph_2473728.jsonl diff --git a/edge/graph_24766563.jsonl b/edge/graph_24766563.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf8ba9722dc54926fcb2317253e0e02059ab45c5 --- /dev/null +++ b/edge/graph_24766563.jsonl @@ -0,0 +1,5 @@ +{"207561477|8197990": ["There has been a significant amount of computer science research on content-based image retrieval in which a particular query image (possibly a sketch or primitive graphic) is used to find matching relevant images [5]."]} +{"61674660|8627028": []} +{"15407543|5835346": []} +{"53305681|16768404": ["A sentiment lexicon is a collection of known sentiment terms [32]."]} +{"18137952|393948": ["To approach this problem, many existing methods bound the target error by the source error plus a discrepancy metric between the source and the target [18].", "\u2026Description Ds,Dt source, target x, x\u0303 input: original, corrupted d, n #features, #samples z, z\u0303 activation: original, corrupted c corruption probability W,b deep network parameters \u03bb adaptation penalty f\u03b8, g\u03b8\u2032 encoder, decoder k,\u03b2 multi-kernel function f sup\u03b8 supervised classifier: softmax", "F", "Both pre-training and fine-tuning are vital for effective learning of deep models: pre-training mitigates the trap of local minima and fine-tuning exploits the supervised information.", "The frequent notations and their descriptions are summarized in Table 1.", "In such cases, effective domain adaptation methods are highly desirable to reduce domain discrepancy and labeling consumption."]} diff --git a/edge/graph_2477727.jsonl b/edge/graph_2477727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24785273.jsonl b/edge/graph_24785273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d5a897f53f7a8e9999b303b0e5aad578a190189 --- /dev/null +++ b/edge/graph_24785273.jsonl @@ -0,0 +1 @@ +{"28645338|61132": ["116 ||| IEEE VEHICULAR TECHNOLOGY MAGAZINE | SEPTEMBER 2019 connectivity support from backbone communication networks for command and control as well as for payload communications [2]."]} diff --git a/edge/graph_2479237.jsonl b/edge/graph_2479237.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24817150.jsonl b/edge/graph_24817150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2481856.jsonl b/edge/graph_2481856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2483888.jsonl b/edge/graph_2483888.jsonl similarity index 100% rename from graph_2483888.jsonl rename to edge/graph_2483888.jsonl diff --git a/graph_24847.jsonl b/edge/graph_24847.jsonl similarity index 100% rename from graph_24847.jsonl rename to edge/graph_24847.jsonl diff --git a/edge/graph_24855581.jsonl b/edge/graph_24855581.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03bb98ee7d60a7ef9bb86fbd28765f1960b3867e --- /dev/null +++ b/edge/graph_24855581.jsonl @@ -0,0 +1,9 @@ +{"10823754|1708582": ["Reinforcement learning is an embodied, trial-and-error problem formulation for arti\ufb01cial intelligence (Sutton and Barto, 1998; Kaelbling et al., 1996; Bertsekas and Tsitsiklis, 1996).", "Reinforcement learning is an embodied, trial-and-error problem formulation for artificial intelligence (Sutton and Barto, 1998; Kaelbling et al., 1996; Bertsekas and Tsitsiklis, 1996)."]} +{"1552061|9316331": ["By expanding the more valuable branches of the tree and carrying out a random simulation at the leaf nodes, UCT is known to perform well in many different settings (Browne et al., 2012)."]} +{"514983|393948": ["\u2026experiences \u2013 in contrast to the relatively dense similarity-based coding scheme thought to operate in the parametric neocortical system (Box 4)[17,38\u201345] \u2013 may be adaptive for some purposes but comes with a cost: it disregards shared structure between experiences, thereby limiting both\u2026"]} +{"53304118|9928823": []} +{"53304118|393948": []} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"386824|1708582": ["Additional information about RL can be found in several references (e.g., [2] [5] [32] [72])."]} diff --git a/graph_2485641.jsonl b/edge/graph_2485641.jsonl similarity index 100% rename from graph_2485641.jsonl rename to edge/graph_2485641.jsonl diff --git a/edge/graph_24856837.jsonl b/edge/graph_24856837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7aa2bb9945cfcf37a30baf70656379f19d787b90 --- /dev/null +++ b/edge/graph_24856837.jsonl @@ -0,0 +1,9 @@ +{"122725027|4491892": []} +{"17231796|4491892": ["In addition, let the lower and upper bound of the interval be denoted by and , respectively, that is ."]} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"9614092|1517662": ["Some systems contain discontinuities (for example, the process model might be jump-linear [14], in which the parameters can change abruptly, or the sensor might return highly quantized sensor measurements [15]), others have singularities (for example, perspective projection equations [16]), and in others the states themselves are inherently discrete (e.g., a rule-based system for predicting the evasive behavior of a piloted aircraft [ 17 ])."]} +{"18000859|4491892": []} +{"15594905|4491892": ["Particle filtering techniques have the advantage that they provide computational tractability [51], have provable convergence properties [ 12 ], and are applicable under the most general of circumstances, as there is no assumption made on the form of the density [15]."]} +{"505582|4491892": ["Further, most convergence results as surveyed in [56] are restricted to bounded functions of the state g(x) such that|g(x)| < C for someC."]} +{"2549497|4491892": ["Note that the proposed SMC implementation inherits the usual convergence properties [26], [27] since the recursion (16), (17) propagates the true posterior density of the target state."]} +{"61441241|4491892": []} diff --git a/graph_2488484.jsonl b/edge/graph_2488484.jsonl similarity index 100% rename from graph_2488484.jsonl rename to edge/graph_2488484.jsonl diff --git a/graph_2489034.jsonl b/edge/graph_2489034.jsonl similarity index 100% rename from graph_2489034.jsonl rename to edge/graph_2489034.jsonl diff --git a/graph_2489146.jsonl b/edge/graph_2489146.jsonl similarity index 100% rename from graph_2489146.jsonl rename to edge/graph_2489146.jsonl diff --git a/edge/graph_24898419.jsonl b/edge/graph_24898419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e1a7436965feedfae70e21a134e8117d9d85c47 --- /dev/null +++ b/edge/graph_24898419.jsonl @@ -0,0 +1 @@ +{"14204416|28294111": ["This is likely to be caused by the fact that ACS and Elsevier refused to collaborate with Google Scholar (Kousha and Thelwall 2008; Neuhaus and Daniel 2008)."]} diff --git a/edge/graph_24899447.jsonl b/edge/graph_24899447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e180e63a07b739a0972b7b0dcee4e8db8ceec27b --- /dev/null +++ b/edge/graph_24899447.jsonl @@ -0,0 +1,3 @@ +{"2691042|18081102": []} +{"17385833|63776596": ["A survey on the use of VR in medical training and education reports the use of VR in support of communication between medical staff, surgical simulations, pain management, several kinds of therapies and rehabilitation interventions [36]."]} +{"17385833|11266709": ["The feeling of being somewhere real when you are in VR is well known to researchers, and is referred to as \u201cpresence,\u201d [42] and it most distinguishes VR from 3D on a screen [43]."]} diff --git a/graph_2490136.jsonl b/edge/graph_2490136.jsonl similarity index 100% rename from graph_2490136.jsonl rename to edge/graph_2490136.jsonl diff --git a/edge/graph_24911472.jsonl b/edge/graph_24911472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24936482.jsonl b/edge/graph_24936482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99d948916134762dec570df2cd0172e631de569d --- /dev/null +++ b/edge/graph_24936482.jsonl @@ -0,0 +1,15 @@ +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"207172599|3330313": []} +{"9594939|38476": ["Another plausible sequential learning method to apply to this task are maximum-entropy Markov models (MEMMs) [9], also called maximum-entropy taggers [11], conditional Markov models [7], and recurrent sliding windows [4]."]} +{"1632078|192934": ["In particular this holds if the feature spaces are different, but also combinations of classifiers trained in the same feature space by the same training set may show improved results [5,12]."]} +{"17606924|8601873": ["A review of MIL assumptions can be found in [7].", "It has indeed been pointed out that the de\ufb01nition of distance or similarity can in\ufb02uence how well the representation is suited for one or more concepts [7]."]} +{"16546406|8601873": ["Alternative modelling assumptions have been adopted for MIL algorithms and applications [13]."]} +{"3873540|17123336": ["There exist many methods to deal with imbalanced data [155]."]} +{"3873540|393948": ["Recently, methods for representation learning [160] have gained in popularity because they usually yield a high level of accuracy."]} +{"3873540|8601873": []} diff --git a/edge/graph_24938466.jsonl b/edge/graph_24938466.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_24961043.jsonl b/edge/graph_24961043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25eeeee6a5b458a0243245b1a6541d1bbe716da5 --- /dev/null +++ b/edge/graph_24961043.jsonl @@ -0,0 +1,43 @@ +{"774526|7788290": []} +{"44337427|9036392": []} +{"44337427|9045232": ["[10])."]} +{"7178101|7788290": ["Although there has been much work on human motion analysis over the past two decades (see reviews [ 1 ]\u2013[3]), activity understanding still remains challenging.", "For clarity, we roughly divide the existing work into three major categories, based on the used low-level feature cues, as follows: 1) Feature Tracking Based Methods: Many traditional methods of activity recognition are based on feature tracking in either 2-D or 3-D space [ 1 ], [2]."]} +{"8909542|6857179": ["Recent works in HCI/HRI have investigated the use of a dimensional representation and further exploration of the utility of dimensional representations in HCI/HRI is advised [4], [7]."]} +{"8909542|2355696": []} +{"8909542|1118130": ["This is closely related to social signal processing in HCI/HRI [192], [193]."]} +{"35921735|1923606": ["Different surveys have been published so far reviewing gesture recognition systems (LaViola Jr., 1999; Mitra and Acharya, 2007; Chaudhary et al., 2011; Ibraheem and Khan, 2012; Avci et al., 2010; Khan and Ibraheem; Kausar and Javed, 2011).", "2 Overview of gesture recognition methods Different surveys have been published so far reviewing gesture recognition systems (LaViola Jr., 1999; Mitra and Acharya, 2007; Chaudhary et al., 2011; Ibraheem and Khan, 2012; Avci et al., 2010; Khan and Ibraheem; Kausar and Javed, 2011)."]} +{"35921735|18284918": []} +{"35921735|14303607": ["One paper focused on the topic of facial expression analysis (Martinez and Du, 2012)."]} +{"2473564|17221751": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12].", "For a more processing oriented review of the literature the reader is mainly referred to [10], [12]."]} +{"2473564|16010181": ["This work introduces them briefly, referring the reader to more specific surveys for each topic [176], [180], [181]."]} +{"2473564|1482463": ["For RGB images , Viola&Jones [60] still is one of the most used algorithms [10], [61], [177]."]} +{"2473564|2301292": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12]."]} +{"2473564|2355696": []} +{"2473564|14303607": ["FE recognition techniques are grouped into categorical and continuous depending on the target expressions [184]."]} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"7807670|14970359": ["A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "The initial model is then refined using a Bayesian network that imposes human body proportions onto the body part size estimates."]} +{"7807670|7788290": ["55], 100 UAm [1], 200 UAm0 [1], 100 LowerArm [0.", "9], 100 Thm [1], 200 Thm0 [1], 100 Calf [1], 100 Cm [1], 200 Cm0 [1], 100 UpperArm [0.", "A reliable motion capture system would be valuable in many applications [1, 2].", "A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "75], 100 LAm [1], 200 LAm0 [1], 100 Torso (\u03bc, \u03c3) = (500, 300) Height [1, 1, 1], 100 Table 3 The parameters used in the Bayesian network shown in Figure 13."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"17067636|14970359": ["An overview of markerless motion capture systems and algorithms is given in [7]."]} +{"23774449|16013270": []} +{"41019898|6857179": []} +{"190913|14970359": ["Modeling the human body and its motion is attracting enormous interest in the Computer Vision community, as attested by recent and lengthy surveys [11,12]."]} +{"190913|7788290": ["Modeling the human body and its motion is attracting enormous interest in the Computer Vision community, as attested by recent and lengthy surveys [11,12]."]} +{"8729004|7788290": ["We will only mention a few of the more recent works on human detection here \u2013 see Gavrilla\u2019s survey [ 7 ] for older references."]} +{"15972216|14970359": ["We refer the reader to various surveys for a broad overview of the popular topic [6, 16]."]} +{"6620538|17221751": ["cation is non-verbal [body language, facial expression and the tone of the voice]) [4], [5] and emotional speech recognition (ESR) [6], [7], [8], [9]."]} +{"28218567|7185733": []} +{"20857021|5575638": ["[1, 2, 3, 4, 5]), we consider two settings of practical importance that have not been studied deeply."]} +{"2591356|7185733": ["For gesture recognition, see Pavlovic et al. [45]."]} +{"2591356|7788290": []} +{"206597741|7185733": []} +{"7364441|6387482": ["Recent studies in emotion recognition verify the significance of combining modalities from different sources of information in order to enhance the accuracy of the recognition task [8], [9]."]} +{"2803986|6857179": ["Recently, there has been more interest in the automatic recognition of dimensional affect [22], [23], [46]."]} +{"464515|6857179": ["We therefore describe here a developmental robot system with the goal of: 1) advancing computational models of emotion in both developmental psychology and autonomous robotics; and 2) using infant development as a clue to develop a robot with a powerful emotion system."]} +{"15751455|9045232": []} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"6068449|7185733": ["An overview of work up to 1995 in hand gesture modeling, analysis, and synthesis is presented by Huang and Pavlovic in [31].", "Gesture is used for control and navigation in CAVEs [31,32] and in other virtual environments such as smart rooms [33] and virtual work environments."]} +{"7332452|393948": ["Recent progress on deep learning is reviewed in [3]."]} +{"6258457|9045232": ["From the plethora of face detection algorithms [40] we selected the Viola Jones algorithm, which is actually a cascade of boosted classifiers working with Haarlike features."]} diff --git a/edge/graph_2496836.jsonl b/edge/graph_2496836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71c58e3a7b9fdb36ee42d03f98bef7a17814ea8a --- /dev/null +++ b/edge/graph_2496836.jsonl @@ -0,0 +1 @@ +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} diff --git a/graph_2497115.jsonl b/edge/graph_2497115.jsonl similarity index 100% rename from graph_2497115.jsonl rename to edge/graph_2497115.jsonl diff --git a/edge/graph_24992843.jsonl b/edge/graph_24992843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1a4bc3b0a6eea531e9ca37ca033309d836c74f2 --- /dev/null +++ b/edge/graph_24992843.jsonl @@ -0,0 +1,45 @@ +{"40436268|192934": ["In [49], it is pointed out that the simple combination of N best individual bands usually cannot reach an optimal solution."]} +{"5737262|11112426": ["In [1], it is explained that linear mixtures are reasonable when two assumptions are wholly fulfilled.", "As a consequence, SU is a challenging problem that has received considerable attention in the remote sensing, signal and image processing communities [1].", "The first automated spectral unmixing algorithms, proposed in the 1990\u2019s, were based on geometrical concepts and were designed to identify endmembers as pure pixels (see [1] and [23] for comprehensive reviews of geometrical linear unmixing methods).", "There are, however, practical situations in which the LMM is not a suitable approximation [1]."]} +{"17670990|11112426": ["This is due to limited spatial resolution of imaging spectrometers or microscopic mixture effects [1].", "A review of the different approaches and methods can be found in [1]."]} +{"13592650|11112426": ["We consider only scenes affected by noise, because in the noiseless case the true solutions can always be recovered with very high accuracy [2].", "Linear spectral unmixing [2], [4]\u2013[7] is a standard technique for spectral mixture analysis that infers a set of pure spectral signatures, called endmembers, and the fractions of these endmembers, called abundances, in each pixel of the scene.", "observation for each distinct material present in the scene may not be valid [2].", "Recent works [2] and [16] present a detailed analysis of the strong influence that high mutual coherences of the libraries have on the hyperspectral unmixing solutions."]} +{"131529751|16374808": ["On the other side, they may be unable to account for local dissimilarities between Pan and MS images, which may produce significant spectral distortions [246, 39].", "Critical reviews of the second generation of pansharpening methods, established with the advent of a formal multiresolution analysis and objective quality assessments, can also be found [216, 117, 246, 39, 16, 257].", "The definition of a technique that fulfills the constraints defined in the protocol is still an open problem [39, 92] and relates closely to the general discussion regarding image quality assessment [262] and image fusion [32], also outside RS [210].", "Actually, the spatial information is mapped onto the first component, to an extent proportional to the correlation among the MS channels [39]."]} +{"131529751|206051485": ["Evidently, these four steps, and especially the selection of the features of interest, can only be accurately made if the images have been previously corrected geometrically [280]."]} +{"13631379|206051485": ["Typically, either a feature-based or an area-based method is used to detect possible common feature points from the image pairs [18].", "The first constraint is defined as CD = {F : |r| < \u03b4} where the residual r is used to update the targeted HR image [18]."]} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"30885174|11112426": ["Nonetheless, as pointed out in [1] and [2], due to the wide existence of nonlinear effects caused by the interactions of photons with multiple components in the image, the LMM may not be an appropriate model in many practical situations.", "2281981 Thus, the spectral unmixing (SU) problem, which consists of identifying the pure materials (endmembers) and estimating their associated fractions (abundances), has become a major issue in HSI and has recently been extensively investigated [1], [2].", "In this step, the inherent source separation problem should be efficiently solved under certain assumptions on the mixture model [1], [2]."]} +{"1900124|8584223": ["In order to tackle this problem, several significant efforts, such as kernel-based methods and feature extraction/selection algorithms, have been developed in recent years [7]\u2013[15]."]} +{"3408395|393948": ["key engine of the subsequent classification task [21], [22]."]} +{"13199086|11112426": ["Although linear spectral unmixing techniques have shown their effectiveness in decomposing mixed pixels [40], in many situations the estimated abundances may not be completely accurate due to noise, atmospheric interferers, nonlinearity of the mixtures, and so on."]} +{"15142807|30443041": []} +{"20581818|11112426": []} +{"13769911|11112426": ["fication [1], unmixing [2], [3], and target detection [4]."]} +{"4953912|12135664": [", Sentinel-2, WorldView), digital surface models and spectral libraries of surface materials, is thought to be useful [70]."]} +{"9712149|11112426": ["According to the linear mixing model [17, 7] the intensities z \u2208 R at a given pixel of Z are described by an additive mixture"]} +{"690087|11112426": ["\u2026images (HSIs) obtained by multidetectors are often corrupted by different types of noise, which severely degrades the quality of the imagery and limits the precision of the subsequent processing, including classi\ufb01cation [3]\u2013[5], segmentation [6], unmixing [7], [8], and target detection [9], [10]."]} +{"2078144|393948": ["classifiers, whereas decision tree or kernel SVMs are believed to have two layers [24].", "The widely used PCA and ICA are singlelayer learning methods [24]."]} +{"15637777|8584223": [") or based on an iterative error minimization [3], [4], [5], [6], [7]."]} +{"739131|11112426": ["Soft classification and spectral unmixing techniques [2], which"]} +{"25065829|11112426": ["Spectral unmixing [8] is an important technique to solve this problem identifying pure spectral components and their"]} +{"5714193|11112426": ["The case of the LMM (for a recent review see Bioucas-Dias et al., 2012) is the best studied one, and sufficient for many purposes.", "Following the LMM (Keshava and Mustard, 2002, Bioucas-Dias et al., 2012), mixing accurs additively within each pixel and the spectral response z \u2208 RB of a given pixel of Z is approximated as\nz = p\u2211 j=1 ejaj (1)\nwhere ej \u2208 RB denotes the spectral measurement (e.g. reflectance) of the j \u2208 {1, . . . ,\u2026"]} +{"17595980|11112426": ["A geometry-based N_FINDR algorithm [27] is used for endmember selection."]} +{"23745472|11112426": ["crucial task to successfully accomplish the process of unmixing it [2]."]} +{"1127130|11112426": ["Another problem aggravating the spectral unmixing problem is that the number of endmembers M is usually unknown, and has to be estimated by some means."]} +{"24309481|393948": ["Unlike the binary RBM, as introduced in Section II-B, we replace it with real-valued units [30], [44], [50] that add Gaussian noise to model the input data.", "Deep architectures with more layers, however, can potentially extract abstract and invariant features for better image or signal classification [30].", "Especially, deep learning-based techniques have been developed to solve this challenging problem [30]."]} +{"206725361|11112426": [", aP ] for each observation [5], [6]."]} +{"125391767|11112426": ["considering that the contributions of each endmember sum up in a linear way [7]."]} +{"16027087|11112426": ["These models are commonly used for spectral unmixing, owing to their physical effectiveness and mathematical simplicity [27].", "The main advantage of HS image with respect to MS one is the more accurate spectral information they provide, which clearly benefits many applications such as unmixing [27], change detection [28], object recognition [29], scene interpretation [30] and classification [31].", "Using geometrical considerations well grounded in the HS imaging literature devoted to the linear unmixing problem [27], the high spatial resolution HS image to be estimated is assumed to live in a low dimensional subspace.", "[27] J."]} +{"16027087|16374808": ["However, the definition of an assessment method that fulfills these constraints is still an open issue [80], [81], and closely relates to the general discussion regarding image quality assessment [82] and image fusion [83], [84]."]} +{"665111|15315731": ["A more precise description of the problem formulation is provided in the following paragraph."]} +{"665111|16374808": []} +{"9812683|11112426": ["S PECTRALmixture analysis (also called spectral unmixing [1]) has been an alluring exploitation goal from the earliest days of hyperspectral remote sensing [2] to our days [3], [4]."]} +{"11316303|11112426": ["Vol. 101, No. 3, March 2013 | Proceedings of the IEEE 701"]} +{"17236362|11112426": ["We assume that these vectors are well approximated by the linear mixin g model [1]; that is, fori \u2208 {1, 2, .", "If the pure pixel assumption is not fulfilled (this is a more re alistic scenario since hyperspectral data are often dominated by highly mixed pixels [1], [2]) the unmixing proc ess is a rather challenging task.", "This shortcoming may be avoided by using the projective projection instead of the affine projection (see [1] for a detailed discussion on this issue).", "Below, we summarize the se steps (for more details, see [1]).", "Some popular algorithms implemented using this assumption are the verte x component analysis (VCA) [15] and N-FINDR [16], among many others (see [1], [11] and [17] for more extensive o rviews).", "Pure pixel based a lgorithms assume that the scene contains at least one pure pixel per endmember [1].", "Here, we focus on the geometrical approach to spectral unmix i g (additional details about the statistical approach can be found in [1] and refere nces therein) .", "Hence, the identification of the minimum volume simplex is, in the absence of noise, equivalent to the identification of M (see [1] for further details about the minimum volume approach to hyperspectral unmixing).", "It has been found that the solutions provided by greedy solvers are stro ngly dependent on the initialization [1].", "These characteristics, together with the high dimensionality of hyperspectral vec tors and the large number of pixels present in real scenes, place the unmixing of hyperspectral mixtures beyond the rea ch of most source separation algorithms, thus fostering active research in the field (see [1] for a recent overview of a dvances in this area)."]} +{"6340275|192934": []} +{"5959307|11112426": ["Some recent works also take sparsity constraints into account in the unmixing process [2], [15]\u2013[18]."]} +{"15471174|11112426": ["Linear spectral mixture models are commonly used for spectral unmixing owing to their physical effectiveness and mathematical simplicity [33]."]} +{"12849760|11112426": ["Supervised methods such as kernel-based and artificial neural networks (ANNs) have been proposed to perform unmixing on microscopic scale [4], [7].", "However, the definition of the aforementioned parameters changes according to the mixture model that is considered [4]."]} +{"21245572|393948": []} +{"21245572|192934": []} +{"15875962|11112426": ["As their name suggests, statistical methods [3] are based on analyzing mixed pixels by means of statistical principles, such as B yesian approaches [9, 10].", "In order to fully unmix a given hyperspectral image b y means of a geometrical method, the majority of the state-ofthe-art approaches are based on dividing the whole process into thre e concatenated steps [3]: 1) estimation of the number of endmembe rs; 2) identification of the spectral signatures of these endmembe rs; and 3) estimation of the endmember abundances in each pixel of th e scene.", "This is because, when the number of endmember increases, most pixels are likely to fluctuate aro und the facets, a situation in which minimum volume-based algorith ms are likely to fail [3].", "Within the LMM paradigm, three main types of unmixing algorithms can be identified: geometrical, statistical, an d sparse regression-based [3].", "geometrical approaches have been the ones most frequently u sed by the hyperspectral research community up to now [3].", "In the last few years, several techniques have been de v loped for addressing each part of the chain, with particular e mphasis on the identification of endmembers (with and without assumi ng the presence of pure spectral signatures in the input hypers pectral data [3,4])."]} +{"10913825|11112426": ["6, are the linear model, the bilinear model, and the Hapke model [3], [40].", "JUNE 2013 IEEE GEOSCIENCE AND REMOTE SENSING MAGAZINE 7 and spectral resolution instruments (see [3] and references therein).", ", principal component analysis (PCA) [3], is commonly applied.", ", [55] [3] and references therein): The posterior distribution of the parameters of interest is computed from the linear observation model (1) within a hierarchical Bayesian model, where conjugate prior distributions are chosen for some unknown parameters to account for physical constraints.", "In [146], a modification to the RX algorithm called SubSpace RX (SSRX) was outlined that is based on the PCA of the background covariance matrix.", "Visualization of hyperspectral AVIRIS image, from (a) to (d) using PCA and the methods of [20]\u2013[22], respectively.", "Advanced morphological techniques such as morphological profiles (MPs) [93] have been successfully used for feature\nextraction prior to classification of hyperspectral data by extracting the first few principal components of the data using the PCA [3], and then building so-called extended morphological profiles (EMPs) on the first few components to extract relevant features for classification [94].", "Nevertheless, because the spectral vectors are non-negative, is it always possible to build rescaled versions thereof, belonging to an affine set [41], and thus satisfying the ASC (see [3] for details).", "Traditionally, methods based on PCA are applied that decorrelate bands.", "The segmented PCA [78] reduces the computational load significantly for feature extraction, compared with the conventional PCA.", "We focus mainly on supervised and semi-supervised classification, although techniques for unsupervised classification and/or clustering have also been used in the literature [3].", "In order to address these issues, feature mining [3], subspace-based approaches [58] and semi-supervised learning techniques [1] have been developed.", "A widely used approach has been the generation of features in a new space, like those obtained from the PCA [3] or the minimum noise fraction (MNF) [77].", "This ill-conditioning is typically addressed by a regularization procedure such as PCA-based regularization or adding a scaled identity matrix to the background covariance matrix [147].", "However, it has been demonstrated that the original spectral features contain high redundancy [3].", "Since the spectral correlation is high, the data are likely to reside on a very low-dimensional submanifold of the spectral space, and projection of the data on a subspace of dimension d nb% , using, e.g., principal component analysis (PCA) [3], is commonly applied.", "For variations of these ideas recently introduced, see [3].", "We have, however, discarded those orthogonal directions corresponding to 10 SNR 1 to avoid instability of the endmember identification (see [3] for more details).", "5, four different color visualizations of an AVIRIS hyperspectral image of 224 spectral bands are shown, obtained by PCA and the methods of [20]\u2013[22] respectively."]} +{"33100676|8584223": ["alleviate the aforementioned issues [6]\u2013[9], [13].", "ing the predictions of multiple classifiers, thereby reducing the dependence on the performance of a single classifier [8], [13]\u2013[15]."]} diff --git a/edge/graph_2499424.jsonl b/edge/graph_2499424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2502158.jsonl b/edge/graph_2502158.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25036350.jsonl b/edge/graph_25036350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b652d8becbdb99ce44a5d41928df9c7e7b05d0a8 --- /dev/null +++ b/edge/graph_25036350.jsonl @@ -0,0 +1 @@ +{"54870401|6923178": ["workers present a very good review on different indexes that can help towards this aim [420]."]} diff --git a/graph_2504309.jsonl b/edge/graph_2504309.jsonl similarity index 100% rename from graph_2504309.jsonl rename to edge/graph_2504309.jsonl diff --git a/edge/graph_2507429.jsonl b/edge/graph_2507429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2507931.jsonl b/edge/graph_2507931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2509135.jsonl b/edge/graph_2509135.jsonl similarity index 100% rename from graph_2509135.jsonl rename to edge/graph_2509135.jsonl diff --git a/graph_2510839.jsonl b/edge/graph_2510839.jsonl similarity index 100% rename from graph_2510839.jsonl rename to edge/graph_2510839.jsonl diff --git a/graph_2511280.jsonl b/edge/graph_2511280.jsonl similarity index 100% rename from graph_2511280.jsonl rename to edge/graph_2511280.jsonl diff --git a/edge/graph_25113020.jsonl b/edge/graph_25113020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..008841d5efae1664fa0e31953cca13969a55acbc --- /dev/null +++ b/edge/graph_25113020.jsonl @@ -0,0 +1 @@ +{"10074245|21841235": []} diff --git a/edge/graph_2511656.jsonl b/edge/graph_2511656.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25119529.jsonl b/edge/graph_25119529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da1551ac4e68645c65bbdfd412135203f066b3e1 --- /dev/null +++ b/edge/graph_25119529.jsonl @@ -0,0 +1,10 @@ +{"18395486|206051485": []} +{"18753816|13365762": []} +{"12607466|534755": ["most widely studied in the literature [52\u201354]."]} +{"3915350|13365762": ["Although CLD is created for color images, it equally suitable for gray-level images with proper choice of coefficients [4].", "The distance between two Tamura feature vector is calculated as:\nDtamura(Q, I) = \u221a\u2211 i (TQi \u2212 TIi)2 (38)\nEdge Feature: The Edge Histogram Descriptor (EHD) [20] is used to represented the global edge feature in this paper.", "In our work, a CLD with 64 Y , 3 Cb, and 3 Cr, is extracted to form 70-dimensional feature vector.", "In this paper, we extract the low-level feature representation for medical image retrieval as follows: Color Feature: we utilize the Color Layout Descriptor (CLD) [20] to represent spatial color distribution within the medical image.", "In this paper, we extract the low-level feature representation for medical image retrieval as follows:\nColor Feature: we utilize the Color Layout Descriptor (CLD) [20] to represent spatial color distribution within the medical image.", "The distance between two EHD vectors is calculated as shown below:\nDehd = \u2211 i |HQi \u2212HIi | (39)", "Edge Feature: The Edge Histogram Descriptor (EHD) [20] is used to represented the global edge feature in this paper.", "The EHD represents local edge distribution in an image by dividing the image into 4 \u00d7 4 sub-images and generating a histogram from the edges present in each of these sub-images.", "The distance between two CLD vectors is calculated as :\nDcld(Q, I) = \u221a\u2211 i (YQi \u2212 YIi)2 + \u221a\u2211 i (CbQi \u2212 CbIi)2\n+ \u221a\u2211 i (CrQi \u2212 CrIi)2\n(37) Texture Feature: In [21], Tamura propose six texture features corresponding to human visual perception: coarseness, contrast, directionality, line-likeness, regularity, and roughness."]} +{"23130260|9270553": ["Color allows implement with following Internal Variable (i.e., INT rotate, INT translation, DECIMAL scale), it has been proved to be superior to others [ 3 ] when color images being represented by a single feature (i.e., color, shape, texture, et)."]} +{"15315731|12607466": ["The fuzzy logic is applied both as a feature transform operator or a decision operator for image fusion [47, 51, 48, 52, 53, 49, 54, 55, 50, 56, 41, 57, 58, 60, 88, 59, 87, 89, 90, 91, 43, 82, 92].", "There are several applications of fuzzy logic base image fusion such as brain diagnosis [47, 48, 49, 50], cancer treatment [51], image segmentation and integration [51, 52], maximization mutual information [53], deep brain stimulation [54], brain tumor segmentation [55], image retrieval [56, 57], spatial weighted entropy [56], feature fusion [56], multimodal image fusion [41, 58, 59], ovarian cancer diagnosis [60], sensor fusion [88], natural computing methods [87] and gene expression [89, 90].", "The ability to train the neural network to adopt to these changes enable several applications for medical image fusion such as solving the problems of feature generation [36], classification [36], data fusion [36, 19, 27], image fusion [37, 38, 27, 39, 40, 41, 42, 43], micro-calcification diagnosis [19], breast cancer detection [38, 44, 45], medical diagnosis [27, 28, 42], cancer diagnosis [46], natural computing methods [87] and classifier fusion [45].", "The improvements of feature processing and analysis can be improved to fit the fuzzy space better when combined with probabilistic approaches such as fuzzy-neural network [41, 43], fuzzy-genetic-neural network-rough set [87], fuzzy-probability [89] and neuro-fuzzy-wavelet [82].", "Some of examples of these are wavelet-neural network [27, 28, 40], neural-fuzzy [41, 43], fuzzy-genetic-neural network-rough set [87] and SVM-ANN-GMM [45]."]} +{"15315731|10863733": []} +{"8284492|12894036": ["The diversity of kernel functions in SVM extends its applicable domains when utilizing a priori knowledge derived from classification problems [10]."]} +{"1949981|9270553": ["to others[ 5 ]in previous experiments while images being"]} +{"57423805|206051485": ["For the fusion of PET and HR-MR images, image registration technique [1, 2] is required to correct differences between the images caused by patient movement, scanning location, and image resolution."]} diff --git a/graph_2511964.jsonl b/edge/graph_2511964.jsonl similarity index 100% rename from graph_2511964.jsonl rename to edge/graph_2511964.jsonl diff --git a/edge/graph_25121813.jsonl b/edge/graph_25121813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75153999ea9352b40d19a65aa9e5d9b6b6492440 --- /dev/null +++ b/edge/graph_25121813.jsonl @@ -0,0 +1,14 @@ +{"11058870|6682153": []} +{"2425354|17516538": []} +{"2425354|4361938": []} +{"2425354|7185733": []} +{"2425354|9045232": []} +{"144889442|5943294": ["[6\u201310] More specifically, users may feel frustrated and confused trying to find and select multimedia content that they are in the mood of experiencing at a certain moment."]} +{"144889442|14866098": ["[50\u201357] Many signal processing [58] and classification algorithms [59] for EEG-based emotion recognition have been developed, and researchers are still exploring new ways for better emotion recognition systems from EEG signals."]} +{"144889442|16362395": ["[50\u201357] Many signal processing [58] and classification algorithms [59] for EEG-based emotion recognition have been developed, and researchers are still exploring new ways for better emotion recognition systems from EEG signals."]} +{"17185798|6857179": ["At present, there is no consensus on the dimensions of emotion [Gunes et al. 2011]."]} +{"13335186|18050848": ["1984 [1], several researchers have reported their own AVSR systems [ 2 ].", "On the other hand, when the integration weights are not estimated appropriately for the given noise conditions, we cannot expect complementarity and synergy of the two information sources and, moreover, the combined recognition performance may be even inferior to that of any of the unimodal systems (which is called \u201cattenuating fusion\u201d [ 2 ])."]} +{"621581|192934": ["For classification, various machine learning methods (supervised classification in our case) can be used [33]."]} +{"14670121|15170341": ["Perceptually motivated methods adapt properties of the human visual system (HVS) [2].", "On the one hand, different quality measures based on knowledge about human visual perception have been developed [2].", "In [1], for example, nonlinear perception of luminance, contrast sensitivity, and masking effects based on spatial frequencies are built into a complex model of the low-level HVS.", "In [6], a top-down approach implements the supposed functionality of the HVS by locally comparing pixel intensity patterns after normalization for luminance and contrast."]} +{"19373706|9270553": ["To this end, brain\u2013computer interfaces (BCI) have been investigated as alternative access solutions and have shown promising results in controlled environments [4], [5]."]} +{"6677003|16362395": ["SVM uses regularization parameter (C) that enables accommodation to outliers and allows errors on the training set [43]."]} diff --git a/edge/graph_2515019.jsonl b/edge/graph_2515019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2516916.jsonl b/edge/graph_2516916.jsonl similarity index 100% rename from graph_2516916.jsonl rename to edge/graph_2516916.jsonl diff --git a/edge/graph_25202113.jsonl b/edge/graph_25202113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..017f91e57b80484271dbe3e75da549c4b966c3f1 --- /dev/null +++ b/edge/graph_25202113.jsonl @@ -0,0 +1 @@ +{"7507419|15247126": ["Covert storage channels operate by modifying packet headers [15], [17], [33].", "time between phone calls, or inter-packet delays) [18], [33].", ", jpeg, audio files, or packet headers), [11], [33] and timing channels that embed a covert message into the timing characteristics of overt carrier(s) (e."]} diff --git a/edge/graph_25206420.jsonl b/edge/graph_25206420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80393b5861de88d96151901c05b1c0553925023f --- /dev/null +++ b/edge/graph_25206420.jsonl @@ -0,0 +1 @@ +{"149260|10346685": []} diff --git a/edge/graph_25208151.jsonl b/edge/graph_25208151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9a5b4a1bac64629069be69b8e10cdc8328e2606 --- /dev/null +++ b/edge/graph_25208151.jsonl @@ -0,0 +1,12 @@ +{"3214405|8909218": ["Among the main factors influencing the QoE are the (1) amount of time spent in rebuffering and the distribution of rebuffering event over the streaming session, (2) the average and minimum video quality during the streaming session, (3) the number and distribution of quality changes, and (4) the\u2026", "In addition, an increasing fractionof the video content is distributed via wireless networks, including mobile networks, leading to a dramatic increase of wireless data traffic."]} +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} +{"3386782|14889616": ["E-mail: Partha.Dutta@xerox.com."]} +{"7320894|7686677": ["A typical off-grid cell site consumes more than 1500 litres of diesel a month that can incur a cost of about $30,000 per year [3]."]} +{"399542|10559330": ["Different mechanisms and solutions can be used to form the QoS at the Network Layer, such as, Differentiated Services (DiffServ) [5], Integrated Services [6] and Multi-Protocol Label Switching (MPLS) [7]."]} +{"8507529|2814864": ["The optimal scheduling of jobs depends on whether the job size is known in advance or it is unknown by the scheduler [13]."]} +{"22304396|2261490": ["Currently, the concept of quality of experience (QoE) has become an important research topic [5]."]} +{"20102430|14889616": ["Dynamic adaptive streaming using Scalable Video Coding (SVC) [2] has emerged as an important mechanism that"]} +{"8709346|14889616": ["The DASH framework makes it very convenient to use Scalable Video Coding (SVC) [11], where the video is encoded", "264/AVC standard supports temporal scalability, spatial scalability, and quality scalability [11].", "The default MGS weight vector is W = [1, 2, 2, 11], i."]} +{"8709346|3540699": []} +{"2060045|64404": ["264/AVC as well as newly developed High Efficiency Video Coding (HEVC) standard [35] and its scalable extension."]} +{"2060045|14889616": ["Video is assumed to be encoded in different layers according to the SVC standard [2] and temporally organized in units which can be decoded independently from each other, each referred as group of pictures (GOP).", "MGS scalability provides sufficient bitrate granularity for rate adaptation.", "The video sequences are encoded with the SVC codec (medium grain scalability (MGS) [2]) and comprise a base layer and 12 quality layers.", "264/SVC [2] or Scalable High Efficiency Video Coding (SHVC) [3], is an attractive solution for real-time rate adaptation at the wireless access network."]} diff --git a/graph_2521001.jsonl b/edge/graph_2521001.jsonl similarity index 100% rename from graph_2521001.jsonl rename to edge/graph_2521001.jsonl diff --git a/graph_2523102.jsonl b/edge/graph_2523102.jsonl similarity index 100% rename from graph_2523102.jsonl rename to edge/graph_2523102.jsonl diff --git a/edge/graph_25262758.jsonl b/edge/graph_25262758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2526989.jsonl b/edge/graph_2526989.jsonl similarity index 100% rename from graph_2526989.jsonl rename to edge/graph_2526989.jsonl diff --git a/graph_2527194.jsonl b/edge/graph_2527194.jsonl similarity index 100% rename from graph_2527194.jsonl rename to edge/graph_2527194.jsonl diff --git a/edge/graph_25279956.jsonl b/edge/graph_25279956.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb84c52b1a31ce3487c2fd3110bd673d28a8e652 --- /dev/null +++ b/edge/graph_25279956.jsonl @@ -0,0 +1 @@ +{"17363292|6670217": ["Thus, mobile security researchers are continually discovering sophisticated new forms of malicious activities which are known to have been operating on computer and computer networks [17, 19].", "Although the aforementioned functionalities were initial requirements to secure BYOD, nowadays managing mobile devices, applications and information is not enough as the mobile devices and networks being targeted by advanced types of attacks [3, 9, 17].", "[17] provide a comprehensive review paper on mobile security solution but none of the reviewed studies particularly focus on Botnets and organized cybercrime detection.", "Moreover, there are new challenges with mobile security solutions such as lack of protection and users\u2019 lack of awareness, resource limitations, mobility and strict personalization [7, 17]."]} diff --git a/graph_2528314.jsonl b/edge/graph_2528314.jsonl similarity index 100% rename from graph_2528314.jsonl rename to edge/graph_2528314.jsonl diff --git a/edge/graph_25291441.jsonl b/edge/graph_25291441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fde40fa7d3891345114d3b639ec5d852eccc6592 --- /dev/null +++ b/edge/graph_25291441.jsonl @@ -0,0 +1,32 @@ +{"45674094|206051485": ["The details of existing proposed algorithms can be found in references [1]."]} +{"14648880|13365762": ["In addition to the previous features, the MPEG-7 [20]-based color layout descriptor (CLD) f cld and edge histogram descriptor (EHD) f ehd and descriptors from the lucene image retrieval library [21], such as fuzzy color texture histogram (FCTH) f fcth and color edge direction descriptor (CEDD) f cedd are extracted"]} +{"2304390|15744805": ["Zhang [ 2 ] broadly divides segmentation evaluation methods into two categories: Analytical Methods which directly examine the theory behind segmentation algorithms; and Empirical methods which measure the quality of the segmentation results."]} +{"19992796|6746689": ["Finally, the morphological thining operation [22] is applied to obtain the boundaries Lj(j = 1, ."]} +{"1157778|11112426": ["More recently, hyperspectral imaging, whiconsists of acquiring a same scene in several hundreds of contiguous spectral bands, has opened a w range of relevant applications, such as target detection [5], classification [6] and spectral unm ixing [7].", "Moreover, to define the prior d ist ibution assigned to this image, we resort to geometrical considerations well admitted in the h yperspectral imaging literature devoted to the linear unmixing problem [7]."]} +{"1157778|16374808": []} +{"4816060|206051485": ["Compared with object motion, camera motion is relatively easy to tackle via either setting a tripod or employing some registration techniques [15]\u2013[17].", "We assume that the input source sequence is aligned, for example by setting a tripod or some image registration algorithms [15]\u2013[17], [48]."]} +{"61167697|33286487": []} +{"38270944|10863733": []} +{"12607466|534755": ["most widely studied in the literature [52\u201354]."]} +{"28305469|622308": []} +{"41659012|16364156": []} +{"3915350|13365762": ["Although CLD is created for color images, it equally suitable for gray-level images with proper choice of coefficients [4].", "The distance between two Tamura feature vector is calculated as:\nDtamura(Q, I) = \u221a\u2211 i (TQi \u2212 TIi)2 (38)\nEdge Feature: The Edge Histogram Descriptor (EHD) [20] is used to represented the global edge feature in this paper.", "In our work, a CLD with 64 Y , 3 Cb, and 3 Cr, is extracted to form 70-dimensional feature vector.", "In this paper, we extract the low-level feature representation for medical image retrieval as follows: Color Feature: we utilize the Color Layout Descriptor (CLD) [20] to represent spatial color distribution within the medical image.", "In this paper, we extract the low-level feature representation for medical image retrieval as follows:\nColor Feature: we utilize the Color Layout Descriptor (CLD) [20] to represent spatial color distribution within the medical image.", "The distance between two EHD vectors is calculated as shown below:\nDehd = \u2211 i |HQi \u2212HIi | (39)", "Edge Feature: The Edge Histogram Descriptor (EHD) [20] is used to represented the global edge feature in this paper.", "The EHD represents local edge distribution in an image by dividing the image into 4 \u00d7 4 sub-images and generating a histogram from the edges present in each of these sub-images.", "The distance between two CLD vectors is calculated as :\nDcld(Q, I) = \u221a\u2211 i (YQi \u2212 YIi)2 + \u221a\u2211 i (CbQi \u2212 CbIi)2\n+ \u221a\u2211 i (CrQi \u2212 CrIi)2\n(37) Texture Feature: In [21], Tamura propose six texture features corresponding to human visual perception: coarseness, contrast, directionality, line-likeness, regularity, and roughness."]} +{"205432776|206051485": []} +{"140213|10863733": ["fusion techniques [2]\u2013[4]."]} +{"23130260|9270553": ["Color allows implement with following Internal Variable (i.e., INT rotate, INT translation, DECIMAL scale), it has been proved to be superior to others [ 3 ] when color images being represented by a single feature (i.e., color, shape, texture, et)."]} +{"10090662|10863733": []} +{"9263669|15315731": ["U S In recent years, pixel-level image fusion has been used in a wide variety of applications, such as remote sensing [7, 116], medical diagnosis[10], surveillance[29], and photography[70] applications.", "imaging \ufb01eld, James and Dasarathy summarize the state-of-the-art image fusion methods in [10].", "Pixel-level image fusion, as mentioned above, is widely sensing[8], medical imaging[10], and computer vision [6]."]} +{"9263669|11112426": []} +{"15315731|12607466": ["The fuzzy logic is applied both as a feature transform operator or a decision operator for image fusion [47, 51, 48, 52, 53, 49, 54, 55, 50, 56, 41, 57, 58, 60, 88, 59, 87, 89, 90, 91, 43, 82, 92].", "There are several applications of fuzzy logic base image fusion such as brain diagnosis [47, 48, 49, 50], cancer treatment [51], image segmentation and integration [51, 52], maximization mutual information [53], deep brain stimulation [54], brain tumor segmentation [55], image retrieval [56, 57], spatial weighted entropy [56], feature fusion [56], multimodal image fusion [41, 58, 59], ovarian cancer diagnosis [60], sensor fusion [88], natural computing methods [87] and gene expression [89, 90].", "The ability to train the neural network to adopt to these changes enable several applications for medical image fusion such as solving the problems of feature generation [36], classification [36], data fusion [36, 19, 27], image fusion [37, 38, 27, 39, 40, 41, 42, 43], micro-calcification diagnosis [19], breast cancer detection [38, 44, 45], medical diagnosis [27, 28, 42], cancer diagnosis [46], natural computing methods [87] and classifier fusion [45].", "The improvements of feature processing and analysis can be improved to fit the fuzzy space better when combined with probabilistic approaches such as fuzzy-neural network [41, 43], fuzzy-genetic-neural network-rough set [87], fuzzy-probability [89] and neuro-fuzzy-wavelet [82].", "Some of examples of these are wavelet-neural network [27, 28, 40], neural-fuzzy [41, 43], fuzzy-genetic-neural network-rough set [87] and SVM-ANN-GMM [45]."]} +{"15315731|10863733": []} +{"4350029|17346817": ["Although most of the dictionary learning based methods have achieved competitive performance compared to the stateof-the-art, the sparse model is computationally expensive [44].", "Learning-based approaches have been introduced, which is the progress made in the past several years in denoising [44]."]} +{"4350029|17069874": ["The major drawback of nonlocal spatial filters is that they still tend to bring artifacts such as over-smoothing [30]."]} +{"665111|15315731": ["A more precise description of the problem formulation is provided in the following paragraph."]} +{"665111|16374808": []} +{"8284492|12894036": ["The diversity of kernel functions in SVM extends its applicable domains when utilizing a priori knowledge derived from classification problems [10]."]} +{"7424882|387610": ["It is obvious that the ripplet based codec preserves more details of texture, compared to JPEG2000.", "Moreover, the ripplet based codec keeps more details around the beard in \u2018mandrill\u2019 than JPEG2000 does.", "The result shows that the ripplet based codec achieves 3 dB higher PSNR than JPEG2000 for the same bit-rate.", "As shown in Table 1, both ripplet and curvelet based codec achieves a slightly higher PSNR at low bit rate, compared to JPEG2000.", "When used for image compression, ripplet transform based image coding outperforms JPEG for the whole bit rate range; and it achieves performance comparable to JPEG2000, when the compression ratio is high; but ripplet transform can provide better visual quality than JPEG2000.", "We employed the EBCOT [20] used in JPEG2000 [21] to code the coefficients, in which an adaptive binary arithmetic coder is used for entropy coding [22].", "Compared to JPEG2000, the ripplet based codec achieves about 1 dB lower PSNR on average at the same bit-rate.", "7, we compare the subjective quality of the ripplet (c = 1,d = 2,3) based codec and JPEG2000.", "When compression ratio is high, there are a lot of white spots around the face in the image coded by JPEG2000 in Fig.", "Table 2 shows comparisons between the best performance of ripplet and performance of curvelet, JPEG and JPEG2000.", "When applied to image compression, ripplet transform based image coding can achieve roughly 2 dB higher PSNR on average than JPEG, and provide better visual quality than JPEG2000 at low bit-rates."]} +{"206692734|16374808": ["The group of methods defined by (5), varying with the choice of spectral weights in (2), is sometimes referred to as relative spectral contribution (RSC) [1], [6].", "The definition of a technique that fulfills the constraints defined in the protocol is still an open problem [6], [37] and relates closely to the general discussion regarding image quality assessment [38] and image fusion [39], [40].", "On the other side, they are not able to account for local dissimilarities between the PAN and MS images originated by the spectral mismatch between the PAN and MS channels of the instruments, which may produce significant spectral distortions [1], [6].", "In fact, the spatial information is mapped to the first component, to an extent proportional to the correlation among the MS channels [6]."]} +{"1949981|9270553": ["to others[ 5 ]in previous experiments while images being"]} +{"18402406|206485791": ["Recently, some review papers have also appeared on sparse representation theory [34], [35] with the aim to explain the mathematical and theoretical aspects of SR models, but they do not particularly discuss image fusion problems."]} +{"18402406|15315731": ["To date, a large number of image fusion algorithms have been proposed [2], [3], [4], [5], [6], in which multiscale transform-based (MST) fusion methods are the most popular [7], [8], [9].", "The early reviews [2], [5], [9], [32], [33] that focus mainly on traditional MST-based [2], [9] or spatial-domain-based (e.g., patches) fusion methods are outdated as they missed out on important recent advances, such as SR-based image fusion methods.", "In addition, most of them are only limited to one single application of image fusion, such as multi-focus [9], medical [5] or remote sensing image fusion [32], [33]."]} +{"1502555|15315731": []} diff --git a/edge/graph_2530790.jsonl b/edge/graph_2530790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2531622.jsonl b/edge/graph_2531622.jsonl similarity index 100% rename from graph_2531622.jsonl rename to edge/graph_2531622.jsonl diff --git a/graph_2535224.jsonl b/edge/graph_2535224.jsonl similarity index 100% rename from graph_2535224.jsonl rename to edge/graph_2535224.jsonl diff --git a/edge/graph_25374274.jsonl b/edge/graph_25374274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..834e22673d42b0df3718e42c4ad93ffa79a8e929 --- /dev/null +++ b/edge/graph_25374274.jsonl @@ -0,0 +1,32 @@ +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"9496996|12815020": []} +{"5680434|2623404": ["A flow entity consists of match fields, counters, and a set of instructions to match to the incoming packets, collect statistics regarding the current flow, and handle a matched packet.", "\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"5680434|10693567": ["\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"30782116|15545863": ["big data and real time analytics [11]."]} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"41231463|12017064": []} +{"14093686|15545863": ["While Fog nodes provide localization, therefore enabling low latency and context awareness, the Cloud provides global centralization.", "Do, Nguyen H. Tran, Chuan Pham, Md. Golam Rabiul Alam, Jae Hyeok Son and Choong Seon Hong\nDepartment of Computer Enginneering, Kyung Hee University, 446-701, Korea Email: {dtcuong, nguyenth, pchuan, robi, sonjaehyeok, cshong}@khu.ac.kr\nAbstract\u2014Large-scale Internet applications, such as content\u2026", "Fog computing is one potential approach to dealing with the demands of the ever-increasing number of Internet-connected devices sometimes referred to as the Internet of Things."]} +{"1024448|10824066": ["However, the selections of a number of recommendations [7-9; 20-24] have identified about eight", "[20] has provided an extensive survey on security requirements methods which help to identify security requirements systematically and structure them."]} +{"55009707|170825": []} +{"6745457|12817488": []} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"3668455|6906699": []} +{"3668455|13287576": ["Multiple intrusion detection approaches can be simultaneously deployed based on the security demands [71,74,79,80].", "Finally, a machine learning-based technique [70,71] is a procedure of constructing new behavior models based on the observations of activities, events, and behaviors."]} +{"3668455|18269383": []} +{"3668455|16654832": []} +{"3668455|10780757": ["Three common techniques [67] supporting comparisons include statistical-based [68], knowledge-based, and machine learning-based techniques [69,70].", "Next, the knowledge-based technique is applicable for those systems that consist of speci\ufb01c knowledge structures or attached to a set of rules [67], such as symbolic representations.", "Statistical-based technique tracks all networking traf\ufb01cs and generates a pro\ufb01le examining whether there are any improper traf\ufb01c by a statistical analysis [67].", "The obstacle of adopting this technique is the extensive requirement of computing resources [67], which imply that the examination is highly dependent on the stored secure behavior assumptions."]} +{"3668455|18212759": ["The technologies supporting cloud computing are very similar regardless of service types or deployments [25,26]."]} +{"3668455|12815020": ["In a networking context, attackers can only gain controls on VMs by attacking the lower layer hyper-visor [40]."]} +{"17548561|7923075": []} +{"46438095|3540699": ["H.264/AVC, is the state-of-the-art video coding technique to meet a wide range of applications providing compression ef\ufb01ciency of up to 50 % over a wide range of bit rates and video resolutions [23]."]} +{"46438095|1230643": ["Clustering has been proven to be energy-ef\ufb01cient in sensor networks by Akyildiz [3] since data routing and relaying are only operated by cluster heads."]} +{"3330144|13916820": []} +{"3330144|45478730": ["Typical SLAs include data exchange rates, mean time to repair, jitter and other service properties related with security as well [3].", "Afterward, a user interface with fine-grained configuration capabilities is provided to manage, orchestrate, and monitor the activity of the service usage [3,100].", "Malicious insiders, as are usually called [3,203,306], can overtake the physical security controls and penetrate the facilities.", "The interface, by default, is a gateway into the cloud and makes it an attractive attack target that can compromise the overall service security [3,281], therefore requiring proper security measures.", "User frontend Internet exposure of frontend interfaces [3,100,211,281]", "So far, ten cloud outages of major cloud providers have been reported in various studies [3,17,224].", "Another issue in terms of availability is related with hardware availability [3].", "Ahuja and Komathukattil [3] 2012 Software, perimeter, virtualization, compliance, access, storage \u00d7 \u2013 \u00d7 ++ \u2013 \u00d7", "Ahuja and Komathukattil [3] presented a survey on some common threats and associated risks to clouds."]} +{"3330144|17290408": ["Software Platforms and frameworks Isolation, resource accounting, safe thread termination [232]", "NET and the Java Virtual Machine (JVM) [232].", "RoderoMerino et al. explain the Multitasking Virtual Machine (MVM) [67], isolates-based KaffeOS [22] and I-JVM [91] solutions, and a heap-based protection [263].", "[232] have given a survey on the security state in PaaS cloud environments.", "[232] 2012 PaaS clouds, isolation, resource accounting, and safe thread termination \u00d7 \u00d7 \u00d7 + +", "[232] enlightened of the fact that PaaS providers are twofold.", "[232] provided an in-depth study on PaaS sharing-based cloud development and running platforms.", "[232], are, in their majority, prior to the rise of cloud environments.", "The most straightforward way for guaranteeing isolation is to create one JVM per application.", "[232] emphasized that such a layout can be compromised by malicious tenants in a straightforward way."]} +{"3330144|12815020": []} +{"11140333|27466065": ["The Offloading Granularity: In our previous work [20] we analyzed different categories of approaches that allow computation offloading."]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"2797500|485843": ["We have referred many literatures for the advances metering infrastructure (AMI) and to the best of our knowledge none of those have discussed about a data aggregation mechanism for PLC [14-16]."]} +{"2797500|8215225": ["[10] has provided the distributed data aggregation algorithm for sensor network nodes."]} diff --git a/edge/graph_2538212.jsonl b/edge/graph_2538212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2543328.jsonl b/edge/graph_2543328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_254522.jsonl b/edge/graph_254522.jsonl similarity index 100% rename from graph_254522.jsonl rename to edge/graph_254522.jsonl diff --git a/graph_2546285.jsonl b/edge/graph_2546285.jsonl similarity index 100% rename from graph_2546285.jsonl rename to edge/graph_2546285.jsonl diff --git a/edge/graph_25467178.jsonl b/edge/graph_25467178.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2548500.jsonl b/edge/graph_2548500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25488094.jsonl b/edge/graph_25488094.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64df4e96382b2497419cb46463b853d7ab248dce --- /dev/null +++ b/edge/graph_25488094.jsonl @@ -0,0 +1,2 @@ +{"8174184|913718": ["Methods and tools for matching, aligning, merging, and integrating ontologies have been present during a number of years, early surveys were presented by Fensel and G\u00f3mez-Per\u00e9z [61] and Kalfoglou and Schorlemmer [109], Shvaiko and Euzenat [177], and a more recent book by Euzenat and Shvaiko [56] also contains a comprehensive summary of the field."]} +{"6025109|9180844": ["This pro\ufb01le is suf\ufb01ciently expressive for many biomedical ontologies, such as the very large ontology SNOMED CT [13], and basic reasoning problems for OWL 2 EL can be decided in polynomial time."]} diff --git a/edge/graph_2552155.jsonl b/edge/graph_2552155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25552182.jsonl b/edge/graph_25552182.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0f263208e7544a397b44b3f4b1cf3c16a02eb3a --- /dev/null +++ b/edge/graph_25552182.jsonl @@ -0,0 +1,24 @@ +{"9385544|16362395": []} +{"9385544|8365617": []} +{"1506066|551238": []} +{"12586806|1176034": ["The signal processing and data mining communities have made wide use of the clustering of subsequence time series, , that were extracted using a temporal sliding window [16]\u2013[18]."]} +{"207722960|13490401": ["While deep learning models such as RNN, LSTM and word2vec have shown promising performance in sequential data mining [4, 13, 15, 26], their application in land cover discovery is still limited."]} +{"6919525|8365617": []} +{"6051566|3330313": []} +{"16284677|2162062": []} +{"8314390|8365617": ["The algorithm then looks at candidate split points using a search strategy that can be top-down or bottom-up [14]."]} +{"6837802|7788290": []} +{"8973749|1176034": ["[65]."]} +{"8973749|8365617": ["In this regard, most efforts have been devoted to data representation using so called segmentation algorithms[64]."]} +{"21983064|8601873": ["A survey of multiinstance learning approaches can be found in [53] and [54]."]} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"92082|7761990": ["Group ICA and postprocessing\nSpatial group ICA (Calhoun and Adali, 2012; Calhoun et al., 2001, 2009b; Du and Fan, 2013) was performed on the fMRI data using the GIFT software (http://mialab.mrn.org/software/gift).", "Most studies which implement this technique have discovered altered FNC in patients with brain disorder such as schizophrenia (Calhoun and Adali, 2012; Calhoun et al., 2009a; Yu et al., 2012)."]} +{"18437730|9431428": []} +{"207209834|191396": []} +{"16817296|8365617": ["The residual error is such a measure, which is commonly used in conjunction with linear regression [15].", "In this section, we first present the new segmentation criterion that reduces the time complexity of the classic SW method by making use of the maximum vertical distance (MVD) measure, and then, we introduce the proposed two novel online segmentation algorithms, the FSW and SFSW methods.", "Since we are mainly concerned with the PLA segmentation approach in this paper, our segmentation problem can be stated in the following form: for a given time series T \u00bc \u00f0 a 1 ; a 2 ; . . . ; a n \u00de of length n , the goal is to divide T into a sequence of segments S 1 S 2 . . .", "\u2026is one of the solutions, and several high-level representations have been proposed, including Discrete Fourier Transform [1], [23], Discrete Wavelet Transform [4], Singular Value Decomposition [12], Piecewise Aggregate Approximation [17], [26], and Piecewise Linear Approximation (PLA) [15], [18].", "To produce the best segmentation scheme to meet the first requirement, the following criteria are used in [15]: 1. minimizing the representation error due to approximation by given K segments, 2. minimizing the number of segments such that the representation error of any segment is less than\u2026", "In some of the literature, the segmentation scheme is only evaluated from the aspect of representation error [15], [21], [26]."]} +{"14106275|14545307": []} +{"4875801|4576140": ["Validations have instead mainly been performed using simulated data (3), but it is obviously very hard to simulate the complex spatiotemporal noise that arises from a living human subject in an MR scanner."]} +{"9503300|8365617": []} +{"62484220|5755403": []} +{"2897063|7704963": ["Index Terms\u2014Spatial colocations, spatially uncertain data set, possible worlds, probabilistic prevalent colocations (PPCs), dynamic programming, approximate algorithms\n\u00c7", "This section first introduces a probabilistic data model which can be easily used for spatial colocation mining in spatially uncertain data."]} diff --git a/edge/graph_2555576.jsonl b/edge/graph_2555576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2558059.jsonl b/edge/graph_2558059.jsonl similarity index 100% rename from graph_2558059.jsonl rename to edge/graph_2558059.jsonl diff --git a/graph_2558103.jsonl b/edge/graph_2558103.jsonl similarity index 100% rename from graph_2558103.jsonl rename to edge/graph_2558103.jsonl diff --git a/edge/graph_2561969.jsonl b/edge/graph_2561969.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25623952.jsonl b/edge/graph_25623952.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_256317.jsonl b/edge/graph_256317.jsonl similarity index 100% rename from graph_256317.jsonl rename to edge/graph_256317.jsonl diff --git a/edge/graph_2565171.jsonl b/edge/graph_2565171.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25670768.jsonl b/edge/graph_25670768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..429b2973d0045d5a8120c5c1b5a434e0b9c340a7 --- /dev/null +++ b/edge/graph_25670768.jsonl @@ -0,0 +1,20 @@ +{"5240721|8815923": ["This makes the problem of grasping significantly more challenging (Bohg et al., 2014), as the algorithm must use more limited and potentially noisier information to detect a good grasp."]} +{"5240721|118142": ["[53], Bicchi and Kumar [2] and Shimoga [58]."]} +{"92545|8575576": ["However, consistency, reproducibility and agreement on mitotic count for the same slide can vary largely among pathologists.[2,3] An automatic tool for this task may help for reaching a better consistency, and at the same time reducing the burden of this demanding task for pathologists."]} +{"206592484|456491": []} +{"3177253|8815923": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"13072941|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment (Bohg et al., 2014)."]} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"17659523|1708582": ["Well-known examples of this kind include knowledge-based inductive learning (KBIL) [20] and delayed reinforcement learning [21]."]} +{"14517547|393948": ["\u20262004; Dalal and Triggs 2005), a multi-layer neural network architecture efficiently captures sophisticated hierarchies describing the raw data (Bengio, Courville, and Vincent 2013), which has shown superior performance on standard object recognition benchmarks (Krizhevsky, Sutskever, and\u2026"]} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} +{"5539001|1932843": ["An overview of recent reinforcement learning methods in robotics can be found in a recent survey paper [15]."]} +{"16028707|1400872": ["Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al.", "Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al., 2002), and statistical learning algorithms (e.g. locally weighted regression ) for dynamical systems\u2026"]} diff --git a/edge/graph_25671836.jsonl b/edge/graph_25671836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c4e6c0f816529539b0f9a91c76a74af08f6b54a --- /dev/null +++ b/edge/graph_25671836.jsonl @@ -0,0 +1 @@ +{"17096325|1230643": ["Wireless Sensor Network (WSN) is a kind of self-organized and self-managed peer-to-peer network which is form by sensor nodes temporarily without building the network infrastructure in advance[1,2]."]} diff --git a/edge/graph_25683140.jsonl b/edge/graph_25683140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25686668.jsonl b/edge/graph_25686668.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d37ca4f403f084d81d08e968e62817dac07ee46c --- /dev/null +++ b/edge/graph_25686668.jsonl @@ -0,0 +1,3 @@ +{"62736269|18148591": []} +{"121902227|11720829": ["One of the factors influencing our work is the possibility of increasing channel capacity in a tunnel by using multiple-input multiple-output (MIMO) technology [10], [11], [21], [ 22 ]."]} +{"121902227|18148591": ["One of the factors influencing our work is the possibility of increasing channel capacity in a tunnel by using multiple-input multiple-output (MIMO) technology [10], [11], [ 21 ], [22]."]} diff --git a/edge/graph_25699143.jsonl b/edge/graph_25699143.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2571971.jsonl b/edge/graph_2571971.jsonl similarity index 100% rename from graph_2571971.jsonl rename to edge/graph_2571971.jsonl diff --git a/graph_2573978.jsonl b/edge/graph_2573978.jsonl similarity index 100% rename from graph_2573978.jsonl rename to edge/graph_2573978.jsonl diff --git a/edge/graph_25746527.jsonl b/edge/graph_25746527.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..079c74afacd497cba96f597a910965b6399a98be --- /dev/null +++ b/edge/graph_25746527.jsonl @@ -0,0 +1,65 @@ +{"14851937|5660618": []} +{"10582476|5660618": ["Investigations on the codesign of the network QoS and the controller parameters build the mainstream in this research field [3], [5]\u2013[7]."]} +{"6021747|5630105": ["A literature review of these scheduling techniques can be found in [91]."]} +{"6021747|37052879": ["paper [25], published in 2010, briefly introduced the differences of technical features among WIA-PA, ISA100."]} +{"6021747|1503157": ["During the past decade, WSNs had found their way into a wide variety of applications [3], such as health monitoring of civil infrastructures [4], personal health monitoring [5], smart grid [6], agriculture [7], habitat monitoring [8], and industrial automation [9]."]} +{"7287858|5660618": ["The retransmission of outdated packets are generally not useful since the latest information of the plant state is the most critical information for control applications [1].", "W IRELESS Networked Control Systems (WNCSs) are spatially distributed systems in which sensors, actuators, and controllers connect through a wireless network instead of traditional point-to-point links [1]."]} +{"7287858|6275330": ["Many practical NCSs have several sensing channels, whereas the controllers are collocated with the actuators, as in heat, ventilation and air conditioning control systems, because the control command is very critical [28]."]} +{"844071|5660618": []} +{"11124837|11720829": ["Some of the enhancement technologies include rate adaptation [11], [12], frequency diversity [13], [14], spatial diversity [15], [16], and ordered"]} +{"20759118|6583734": ["In the direction of cutting overhead and delay in the mobile core, softwarization and virtualization paradigms are gaining importance in the design of future 5G system architecture [24]\u2013[27].", "A reduction in the overall end-to-end delay could be achieved through the exploitation of softwarization and virtualization paradigms [24]\u2013[26], as mentioned in Sec."]} +{"20759118|1598350": ["This testifies the applicability of our proposed MtMS in enabling end-to-end communications in smart environments, such as management of traffic lights to handle emergency services [44] or to balance car traffic to reduce congestion and pollution [1], [2] in smart cities.", "However, the IoT landscape is expected to change significantly with more \u2018\u2018things\u2019\u2019 becoming active elements [1].", "The Internet of Things (IoT) [1], [2] is predicted to inter-connect billions of devices over the next decades to come [3].", "Reaching this goal would enable the provisioning of end-to-end mission critical applications, with consequent novel business opportunities for telco operators [1], [37]."]} +{"20759118|25929315": ["By considering the former aspect, it is worth noticing that the CE-RA is characterized by a large set of access code-words and this guarantees a high success probability in the transmission of Msg1.", "At the reception of Msg1, the base station sends the Random Access Response (RAR, a.k.a. Msg2), which contains information about the detected preamble, uplink timing alignment, and the grant for the transmission of the Msg3 on the Physical Uplink Shared Channel (PUSCH).", "Every RA slot, UL radio resources (Physical Random Access Channel, PRACH) are reserved to initiate the RA procedure by means of the transmission of an orthogonal preamble (Msg1).", ", 54) available to perform the transmission of Msg1 [9], [18]; this aspect strongly limits the scalability of the RA and thus introduces delay as devices that experience collisions on the preamble transmission need to re-schedule a novel RA attempt.", "To overcome the limitations of the legacy 3GPP RA, the access class barring (ACB) [19] has introduced the idea of exploiting a backoff mechanism before the transmission of Msg1 to avoid a high number of collisions in case of network overload.", "In more details, milestone state of the art contributions for UL machine-type communications (MTC) are related to the improvement of the random access (RA) procedure [9].", "A novel approach for the RA is represented by the code expanded [11], which is based on the idea of sending an access code-word composed of several preambles instead of sending only one Msg1.", "This behaviour is due to the fact that a large set of devices perform a successfully Msg1 transmission, but due to the lack of resources the Msg2 is not received within the RAR window: these devices thus need to perform another RA attempt after the backoff period.", "Studies in literature investigate the issues of the 3GPP RA, mainly related to the limited number of preambles (i.e., 54) available to perform the transmission of Msg1 [9], [18]; this aspect strongly limits the scalability of the RA and thus introduces delay as devices that experience collisions on the preamble transmission need to re-schedule a novel RA attempt.", "In terms of RA, to avoid the high collision probability of the legacy 3GPPRA [9], [16], the code-expanded scheme represents a viable solution to manage the large group of devices involved in the MtMS session [11]."]} +{"206739717|206764452": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43]."]} +{"206739717|1029120": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43].", "easy task to separate pedestrians from background in an image or video sequences in the computer vision domain [38], and"]} +{"38360673|8363289": ["They sponsored research and arranged workshops at Shell to interact with academia [545,544], which in turn initiated research on stability and robustness [241,480,457,60].", "The paper [457] was selected for the first High Impact Paper Award at the IFAC World Congress in Milan in 2011."]} +{"14897482|11720829": ["Recent multiple-input, multiple-output (MIMO) techniques [143], [144] like the upcoming IEEE 802."]} +{"14897482|1387401": ["In realistic environments the wireless channel suffers from phenomena like path loss and shadowing, multipath propagation and thermal noise [132]\u2013[134]."]} +{"14897482|1230643": ["Wireless sensor networks (WSN) [55], [56], [30], [57], [58], [59], [60] consist of a large number of small, energy- and resource-constrained sensor nodes."]} +{"4289791|6959212": []} +{"15054411|5660618": ["In [1], authors provide a comprehensive survey of the recent work done in this area and an analysis of the significance of network characteristics on the performance of the feedback loop can be found in [2].", "On the other hand, model predictive controllers are used in similar scenarios as given in [5]\u2013[8], but these works either do not take the synchronization between the nodes into account or are not set up to be NCSs due to the fact that they rely on a direct-link between the sensor and the controller or between the controller and the actuator and a transmission failure would adversely affect the performance of the system as given in [1], [2], and [9].", "Interested reader is referred to [1], [2], and [39] for a broader theoretical discussion on the stability of model-based networked control systems in case of communication failures and to [11] for the specific case of MBPNCS."]} +{"6820964|6959212": []} +{"10255305|5660618": ["\ud835\udc57 , for all \ud835\udc58 \u2265 0, (12)\nthen system \ud835\udc56 is stabilizable, i.e., there exists a policy for sensor \ud835\udc56 such that system \ud835\udc56 is mean square stable according to (7)."]} +{"1674038|5660618": ["Determining the packet generation period and transmission delay requirement of the sensors, given the reliability of the underlying wireless channel, i.e., packet success probability, to keep the system within a certain control performance has been a very active area of research in the last decade\u2026"]} +{"9047026|5660618": ["bility of the control system due to the varying packet losses and delays of the network [4].", "This problem is motivated by the most general scenario in which sensors, actuators, and controllers are not colocated and use a shared lossy network to communicate [4].", "lowable state update interval (SUI) to guarantee the stability of control systems [4], [5].", "with the actuators, because the control signal is very crucial [4].", "We assume that ti \u2264 hi since the control signal is updated based on the received sensing information of the plant state [4].", "Thus it is widely used for various control applications [4]."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"8379348|5660618": [", [3], [4] and the references therein."]} +{"6275330|1230643": ["Other applications of wireless sensors to healthcare that have been proposed include tracking and monitoring doctors and patients, or tracking drug usage inside hospitals [36]."]} +{"22678385|875676": ["Some non-orthogonal FBMC schemes, such as generalized frequency division multiplexing (GFDM) and the faster-than-Nyquist approach, induce additional interference from neighboring subcarriers due to non-orthogonality [18], [19]."]} +{"22678385|8280144": ["16TC was introduced as a way to evaluate performance for specific communication strategies and different medium access control (MAC) protocols in ad hoc networks [85]."]} +{"18180453|1236072": ["Routing protocols for WISNs must be carefully designed, to consider resource constraints such as low processing power, small memory and limited energy of sensor nodes [11], [12]."]} +{"18180453|1230643": ["Routing protocols for WISNs must be carefully designed, to consider resource constraints such as low processing power, small memory and limited energy of sensor nodes [11], [12]."]} +{"62232249|5660618": ["Although the problem of state estimation under random sampling and loss has received signi\ufb01cant attention (e.g. [ 15\u201318 ] ), we are aware of few papers in the literature analyzing the interaction between sampling rates, network performance statistics and the estimation performance."]} +{"5295769|5660618": []} +{"1227397|25929315": ["Thus, it makes them prone to the notorious problem of existing wireless standards, namely, congestion during the connection establishment phase [8,9,14]."]} +{"7804298|5660618": ["\u2026at the estimator at time t, we assume that a zero 3 is stored in the 2 For example, ATM communication protocols adopts packets with 384-bit data field, Ethernet IEEE 802.3 packets allows for at least 368 bits for data payload, Bluetooth for 499 bits [18] and IEEE 802.15.4 for up to 1000 bits."]} +{"29249709|5660618": []} +{"1213112|5660618": []} +{"12357259|8363289": []} +{"5700756|16515889": ["SGs, six key functionalities are required [13], namely, 1) high dependability so that the system has to be repaired in", "vision of CPSs is more concentrated on connection between embedded systems and the physical world, while the European version highlights interaction with the cloud/cyberspace and human factors [13]."]} +{"20501884|5660618": ["\u2026and Phillips 2001; Ling and Lemmon 2002; Sinopoli et al. 2004b; Wang, Ho, and Liu 2004; Schenato 2006a; Gao and Chen 2007; Gao and Chen 2007a, b; Sahebsara et al. 2007a, b; Hespanha, Naghshtabrizi, and Xu 2007; Sun et al. 2008), we assume each packet transmitted contains only one measurement.", "\u2026at each sampling instant (which is the case for many existing approaches (Nilsson 1998; Yaz and Ray 1998; Zhang et al. 2001; Ling and Lemmon 2002; Sinopoli et al. 2004b; Wang et al. 2004; Gao and Chen 2007; Sahebsara et al. 2007a, b; Hespanha et al. 2007; Sun et al. 2008, Gao and Chen 2007))."]} +{"6228422|14441987": ["Zhao Jindong, Liang Zhenjun, Zhao Yaopei T 978-1-4244-3608-8/09/$25.00 \u00a9 2009 IEEE. working in such network that the nodes are moving [9]."]} +{"62314423|205286988": []} +{"60062975|5660618": ["Outdated packets are generally not useful for control applications [23].", "1, where a plant is remotely controlled over a WSN [23, 25].", "Note that retransmission of old data to maximize the reliability may increase the delay and is generally not useful for control applications [23]."]} +{"60062975|6275330": ["Many practical NCSs have several sensing channels, whereas the controllers are collocated with the actuators, as in heat, ventilation and air-conditioning control systems [143].", "For example, many practical NCSs have several sensing channels and the controllers are collocated with the actuators, as in heat, ventilation and air-conditioning control systems [143]."]} +{"60062975|1236072": ["There are several surveys for both MAC protocols [37]\u2013[39] and routing protocols [40]\u2013[45] of WSNs.", "Even though many communication protocols are available in [38] and [40], these protocols are designed mainly to achieve high reliability and high energy efficiency for various applications of WSNs and not specifically for control applications.", "By considering the underlying network structure, we classify the routing protocols as follows: topology, data-centric, hierarchical, and location-based routing similar to [40]."]} +{"12879715|1230643": ["This has made them attractive for many embedded systems applications including environmental and habitat monitoring, healthcare, traffic control, and industrial automation [1], [2]."]} +{"16714810|5660618": ["Although WSNs provide a great advantage for process, manufacturing and industry, they are not yet efficiently deployed.", "In particular, a WSN with nodes uniformly distributed in the walls or in the ceiling can be deployed as the network infrastructure that support the control of the state of the robots in a manufacturing cell.", "There have been many contributions to the problem of protocol design for WSNs, both in academia (e.g., [3], [12]) and industry (e.g., [13], [14], [15]).", "Retransmission of old data to maximize the reliability may increase the delay and is generally not useful for control applications [8].", "By a system-level design for WSNs, the control algorithm designers impose a set of requirements on reliability, packet delay and energy consumption that the communication infrastructure must satisfy.", "W IRELESS Sensor Networks (WSNs) are networks of tiny sensing devices for wireless communication, monitoring, control, and actuation.", "Some cross-layer design challenges of the physical, MAC, and network layers to minimize the energy consumption of WSNs have been surveyed in [34], [35], [36].", "1, where a plant is remotely controlled over a WSN [8], [10].", "The system scenario is quite general, because it applies to any interconnection of a plant by a multihop WSN to a controller tolerating a certain degree of data loss and delay [9], [10], [11].", "In this paper, we present Breath, an adaptive protocol for WSNs for reliable and timely data gathering.", "An efficient system-level design process for operations of WSNs in industrial control applications poses extra challenges compared to more traditional communication networks, namely: .", "In addition, experimental results of Dozer [27] show good energy efficiency and reliability under very low traffic intensity (with data sampling interval of 120 s) but the delay in the packet delivery is not considered, which is essential for control applications [8], [9].", "Note that retransmission of old data to maximize the reliability may increase the delay and is generally not useful for control applications [8].", "Fixed routing is inefficient in WSNs due to the cost of building and maintaining routing tables.", "Since high reliability and low delay may demand a significant energy consumption of the network, thus reducing the WSN lifetime, the reliability and delay must be flexible design parameters that need to be adequate for the requirements.", "Energy efficiency: The lack of battery replacement, which is essential for affordable WSN deployment, requires energy-efficient operations.", "The reverse approach to LPL was redesigned for WSNs as the Receiver-Initiated (RI)-MAC [20].", "The variety of application domains and theoretical challenges for WSNs has attracted research efforts for more than a decade."]} +{"17642379|6275330": ["Many practical NCSs have several sensing channels, whereas the controllers are collocated with the actuators, as in heat, ventilation and air-conditioning control systems [12]."]} +{"17642379|1236072": ["Even though many communication protocols are available in [10] and [11], these protocols are designed mainly to achieve high reliability and high energy efficiency for various applications of WSNs and not specifically for control applications."]} +{"17654493|37052879": ["WIP-PA also relies on a security manager to manage the security keys, authentication of field and other (gateway) devices [66].", "Three types of frequency hopping mechanisms are used: Adaptive Frequency Switch, Adaptive Frequency Hopping, and Timeslot hopping [66]."]} +{"17654493|41998167": ["QoS-Aware Protocols aim at providing application specific QoS [49] and network QoS [99]."]} +{"17654493|17960632": ["Fixed Assignment Protocols .", "Real-Time Protocols [28], [29], [94] do fall in the class of QoS-Aware protocols, but are speci\ufb01ed differently since they have now become a separate branch of research.", "QoS-Aware Protocols aim at providing application speci\ufb01c QoS [49] and network QoS [99].", "Real-Time Protocols [28], [29], [94] do fall in", "Energy-ef\ufb01cient Protocols [96] have as their main objective to prolong network life-time and support as much data communication as possible within its life-time.", "Thus main classes of MAC protocols can be de\ufb01ned as Energy-Ef\ufb01cient Proto-cols , QoS-Aware Protocols , and Real-Time Protocols .", "Demand Assignment Protocols .", "application-oriented MAC protocols [28], [29].", "Random Access Protocols .", "Protocols should be event-based both for the transport and routing functions.", "Hybrid Protocols ."]} +{"17654493|8618569": ["On the other end, we have surveys on IWSN [30], [31], [32] focusing on challenges, design principles, technical approaches to build IWSN, their requirements, WSN standards, and QoS."]} +{"17654493|7889189": ["For comprehensive information on security issues and solutions we refer to [73], [74], [75], [76]."]} +{"17654493|1940388": ["For comprehensive information on security issues and solutions we refer to [73], [74], [75], [76]."]} +{"17654493|270804": ["Different protocols use different methods to detect congestion and can use various parameters listed in [19], [27].", "Transport protocols in WSNs are responsible for congestion control and loss recovery [19], with the aim of providing end-to-end packet delivery and hence increase reliability.", "There are other surveys which focus on specific layers or functions like Medium Access Control(MAC) [21], [22], [23], [24], routing [18], [25], [26], and transport functions [19], [27].", "The hop-by-hop method is considered to be more suitable for WSNs than the end-to-end method [19], [134], [135].", "The hop-by-hop retransmission method used in the transport function is preferred over the end-to-end method for WSN in several approaches [19], [134], [135]."]} +{"17654493|17205659": ["For comprehensive information on security issues and solutions we refer to [73], [74],"]} +{"17654493|1236072": ["Other functions like the routing function can considerably affect the energy efficiency [18], latency, and reliability.", "Routing protocols can be classified based on network structure, functions provided, QoS provided and other operational requirements [18], [25].", "There are many design requirements [18], [25] that can be used to select a routing protocol.", "There are other surveys which focus on specific layers or functions like Medium Access Control(MAC) [21], [22], [23], [24], routing [18], [25], [26], and transport functions [19], [27].", "Over the years, various routing protocols have been proposed [26], [18], [25] to satisfy the QoS requirements.", "[18] is more energy efficient than flat-based routing, the results are size dependent."]} +{"17654493|1230643": ["Various other applications for which WSN is used can be found in [3], [4].", "A wide range of applications are served by these systems [4], [43], [44] including environmental monitoring, industrial monitoring, traffic monitoring and also military applications.", "There exists already various surveys on WSN [20], [4] that describe protocols proposed for various layers, key challenges in WSN, hardware, test-beds used, and applications for these WSN.", "Technological advances in the area of wireless communication, sensors, and batteries have opened up many new prospects for applications [3], [4] and research."]} +{"17289057|5660618": []} +{"20264664|5660618": ["plant is remotely controlled over a wireless mesh network [20]."]} +{"19754897|5660618": ["A Networked Control System (NCS) exploits a packet switching network to connect spatially distributed sensors, actuators, and controllers [1]."]} +{"38137070|485843": ["studied for a wide range of applications in industrial automation [2], building automation [3], automated highway [4], smart grid [5] and vehicle control systems [6], and backed up by several", "generating data periodically at various frequencies exist in many WNCS applications such as industrial automation [2], smart grid [5] and vehicle control [6]."]} +{"38137070|5660618": ["The network consists of 4 sensor nodes denoted by sn i for i \u2208 [1, 4].", "WNCSs are spatially distributed feedback control systems in which sensor nodes transmit information to controllers via a wireless network [1]."]} +{"38137070|6275330": []} diff --git a/edge/graph_25817172.jsonl b/edge/graph_25817172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2581766.jsonl b/edge/graph_2581766.jsonl similarity index 100% rename from graph_2581766.jsonl rename to edge/graph_2581766.jsonl diff --git a/edge/graph_25834497.jsonl b/edge/graph_25834497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d186f46c088f13e84f04724946b09e224186059 --- /dev/null +++ b/edge/graph_25834497.jsonl @@ -0,0 +1,2 @@ +{"13429602|9932808": ["For the LS method and the TLS method, though they also have iterative solutions based on the steepest-descent method, for simplicity of comparison, we use their respective analytical solutions (for the batch mode) [11].", "Specifically, it introduces a weighting matrix, which is appropriately designed according to the covariance matrix of the noise, in its cost function [11].", "2437836 The total least squares (TLS) method is prominent among the numerous solutions have been proposed to solve the parameter estimation problem of EIV system [9]\u2013[11]."]} +{"118106484|423305": []} diff --git a/edge/graph_25867152.jsonl b/edge/graph_25867152.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25885415.jsonl b/edge/graph_25885415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9295fa2babbfbf4b8b3e255cc3890227cc5cacac --- /dev/null +++ b/edge/graph_25885415.jsonl @@ -0,0 +1,4 @@ +{"15596758|6409498": ["A general survey of surg ical tool and tissue interaction models, which describes both physics- and nonphysics-based interaction models, is provided in [43]."]} +{"15003171|206268920": []} +{"8760319|206268920": []} +{"2797072|206268920": []} diff --git a/edge/graph_25891793.jsonl b/edge/graph_25891793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..986dc7264e40e630d7a29c23f995e823f54e7d94 --- /dev/null +++ b/edge/graph_25891793.jsonl @@ -0,0 +1,16 @@ +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"30041218|6950376": []} +{"6158193|14745481": ["Although many lessons and technical solutions have been learned from research in areas such as mobile ad hoc networks [31] [32] or wireless sensor networks [33], M2M systems may also require new approaches to security."]} +{"6158193|17205659": ["Although many lessons and technical solutions have been learned from research in areas such as mobile ad hoc networks [31] [32] or wireless sensor networks [33], M2M systems may also require new approaches to security."]} +{"205288494|1230643": ["Heterogeneous WSN consists of multiple, simple, low-cost sensor nodes that have limited computational and communicational capabilities and of at least one sink node, also called gateway node (GWN) [28]."]} +{"42256999|17205659": []} +{"3838373|1230643": ["One of these technologies, wireless sensor networks [4], is able to provide an autonomous and intelligent link between the virtual world and the physical world, and in fact it has been thoroughly studied."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"11000825|1230643": ["[14] points out that power consumption of wireless sensor network devices could be divided into three domains: sensing, communication, and data processing."]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"13641891|16335158": []} +{"13641891|7854020": []} +{"13641891|1940388": []} diff --git a/edge/graph_25911553.jsonl b/edge/graph_25911553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ea86326f18e6a5a4f0ff3d0e644011c0978ff56 --- /dev/null +++ b/edge/graph_25911553.jsonl @@ -0,0 +1,55 @@ +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} +{"15035771|2623404": ["Nunes et al. [1] presented a standard survey with emphasis on past, present and future implementations of SDN.", "In [1] and [7] a list of hardware switches is given, all OpenFlow compliant."]} +{"15035771|4608889": ["[6] take a similar approach concerning OpenFlow technologies in carrier-grade and data center networks."]} +{"15035771|10693567": ["The controllers contain the forwarding logic, but can be enhanced with additional routing logic.", "OpenFlow has attracted many researchers, organizations and foundations, so a wide collection of open-source software is available in the form of OpenFlow controllers (section III-C), as well as physical and virtual switch implementations (section III-D).", "In [7], Lara et al. provide an extensive survey on network innovations using OpenFlow, where the OpenFlow speci\ufb01cation is discussed in detail and recent experiences with OpenFlow deployments on campus networks and testbeds are shared."]} +{"15035771|2387055": ["A survey on security in SDN is given by Scot-Hayward et al. [3]."]} +{"15035771|14276831": ["Multiple schemes can be applied to recover paths in case of link failures, where a distinction can be made between protection and restoration schemes [24].", "To create a robust and resilient network, the network topology must include redundant paths [24]."]} +{"6758116|6583734": ["However, we emphasize that the virtualization and deployment of network functions do not necessarily rely on SDN technologies, and viceversa [4], [35]."]} +{"263015|2623404": ["[38] present programable networks in the context of SDN."]} +{"263015|1230643": ["Wireless Sensor Networks (WSNs) [57], [58] differ substantially from WCNs with respect to network and node"]} +{"26916273|121289": ["With the ongoing, rapid transition to smart architectures however the need for new approaches to the associated communication infrastructures arises [2].", "robust and flexible communication networks for handling these new information flows [2]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"33526809|10693567": ["OpenFlow [20, 21] is a most common realization of the SDN control protocol in wired networking, which has attracted great attention of both academia and industry."]} +{"207337471|18687271": []} +{"33118584|2623404": []} +{"33118584|10693567": []} +{"33118584|3189715": []} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"19995599|7644489": ["D2D communication will improve spectrum and energy efficiency of the overall system while increasing the throughput and end-to-end delay performance for D2D links [6].", "For both D2D discovery and communication, uplink resources are favored [6].", "If an ad hoc mechanism is employed, each UE controls itself, and discovery and communication may utilize one of the well-known random medium access control (MAC) protocols such as carrier sense multiple access (CSMA) [6]."]} +{"16684533|19938676": ["CleanG seeks to exploit a large, scalable software based packet \u201cCORE\u201d that re-places the EPC elements of current cellular networks, and supports a large number of eNBs."]} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"16031066|2623404": []} +{"16031066|2387055": []} +{"16031066|3189715": []} +{"37966695|2623404": ["Another idea was proposed [3] before implementing multiple controllers, which is installing replicated controllers to remove the single point of failure.", "There is another interesting survey [3] about SDN that presents chronologically its development."]} +{"38912441|11735843": []} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"306038|28577245": ["This application mode only requires low latency from the mobile network, and not the high bandwidth as the video stream is skipped."]} +{"11735843|2623404": ["3 Software-defined networking (SDN) The major insight of \u2018software-defined networking\u2019 (SDNs) is to allow horizontally integrated systems by allowing the separation of the control plane and the data plane [11,107] while providing increasingly sophisticated set of abstractions.", "In particular, it is the culmination of many varied ideas and proposals in the general field of programmable networks [11,18] with many of the initial ideas of programmable networking (of \u2018open interfaces\u2019 and \u2018separation of control and data plane\u2019) espoused by the OpenSig and Active Networking community now maturing in the form of the SDN) architecture.", "Our paper is different from other survey papers [11,18,19] in its focus on wireless programmable networks while the previous papers had focused mainly on generic (wired) programmable networks.", "Applications of programmability include rapid provisioning of services [10], flexible resource management [11], efficient resource sharing [12], and support for new architectures such as cloud computing, Internet of things (IoT) [13], etc."]} +{"11735843|10693567": []} +{"11735843|3189715": ["The lack of programmability of networks has long been recognized, and various approaches have been proposed to address this deficiency [14] [15].", "in 1999 [14], t he impending impact of numerous programming trends is anticipated using surprisingly modern terminology.", "The main reason OpenSig approach could not quite become mainstream was the static nature of the interfaces it defined [14]."]} +{"207262843|2535224": []} +{"207262843|2623404": []} +{"207262843|2387055": []} +{"207262843|3330461": []} +{"49291010|207262843": ["SDN-based mobile packet core approaches [4\u20137, 13 ] which Multicast and broadcast modes can be enabled in the mobile network to support ef\ufb01cient multimedia content delivery to multiple users using minimum radio and network bandwidth resources.", "However, these approaches [4] can be classi\ufb01ed into two major categories: evolutionary approaches and revolutionary approaches."]} diff --git a/edge/graph_2592807.jsonl b/edge/graph_2592807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_25929315.jsonl b/edge/graph_25929315.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..765c4ad9e59464c59b6a1bbf09b4363f17a4524d --- /dev/null +++ b/edge/graph_25929315.jsonl @@ -0,0 +1,2 @@ +{"7921587|8909218": ["layout of micro-sites [48]\u2013[51], picocells and femtocells [52]\u2013[58], and CoMP technology [59] as well as the new", "Heterogeneous Networks [44-61] Network architecture design", "A detailed description of femtocellular networks from both the technical and business aspects can be found in [58], where the challenges of implementing these networks and some potential research opportunities are also introduced.", "The energy-efficient MIMO and OFDMA schemes in multi-cell scenarios need to be further investigated. only BS site Not introduced in this paper - Service Differentiation [42,43] both BS site and Terminal site - Heterogeneous Networks [44-61] Network architecture design Relay and Cooperative Communications [62-71] both BS site and Terminal site - MIMO [72,73,75] both BS site and Terminal site - - [28,29,74,76-78] only Terminal site OFDMA [81,82,84] both BS site and Terminal site - [32,79] only BS site [80,83] existing work only considers the single cell scenarios.", "It is indicated in [58] that femtocellular networks must deal with additional timing and synchronization, as well as interference management issues, which cause more signaling overhead and potentially more energy consumption."]} +{"7921587|16629628": []} diff --git a/graph_2593345.jsonl b/edge/graph_2593345.jsonl similarity index 100% rename from graph_2593345.jsonl rename to edge/graph_2593345.jsonl diff --git a/edge/graph_25941873.jsonl b/edge/graph_25941873.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec6b19c66325fb08b6746cda588730d59249887e --- /dev/null +++ b/edge/graph_25941873.jsonl @@ -0,0 +1 @@ +{"14683639|15782139": ["Also, while for modern handwriting recognition it is possible to use special input devices to record on-line information about the handwriting process [4], this information is not available for off-line recognition of digital images of handwritings."]} diff --git a/edge/graph_25943273.jsonl b/edge/graph_25943273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa55a7de88e7213afe746751d478ce0770fe9f07 --- /dev/null +++ b/edge/graph_25943273.jsonl @@ -0,0 +1,5 @@ +{"6187669|2867949": []} +{"6909552|5551880": ["Other works have presented classifications of security issues at different levels, such as network, host or application [2]."]} +{"8722112|8364569": ["[1, 22] was captured in the University of Twente network by monitoring a honeypot.", "Modern Intrusion Detection Systems (IDSs) analyze the content of network packets to predict attacks; however, inspecting individual packets has become a fairly hard task with today\u2019s high speed Gigabit networks which carry vast volumes of network traffic [1].", "Flow-based intrusion detection process complements the typical packet inspection intrusion detection approach [1].", "[1, 22] were the first who contributed a labeled flow based dataset intended to train and evaluate flow based intrusion detection techniques."]} +{"14347172|206584087": []} +{"2205192|6430931": []} diff --git a/graph_2597421.jsonl b/edge/graph_2597421.jsonl similarity index 100% rename from graph_2597421.jsonl rename to edge/graph_2597421.jsonl diff --git a/edge/graph_2598183.jsonl b/edge/graph_2598183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2598486.jsonl b/edge/graph_2598486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26005580.jsonl b/edge/graph_26005580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2601045.jsonl b/edge/graph_2601045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_260343.jsonl b/edge/graph_260343.jsonl similarity index 100% rename from graph_260343.jsonl rename to edge/graph_260343.jsonl diff --git a/graph_2607051.jsonl b/edge/graph_2607051.jsonl similarity index 100% rename from graph_2607051.jsonl rename to edge/graph_2607051.jsonl diff --git a/edge/graph_26071662.jsonl b/edge/graph_26071662.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..968bc84dfbe8ffa2320e59353ac97018ce0c2c35 --- /dev/null +++ b/edge/graph_26071662.jsonl @@ -0,0 +1,26 @@ +{"1639020|11112426": ["Because the HS bands are usually spectrally correlated, the HS vector xi usually lives in a subspace whose dimension m\u0303\u03bb is much smaller than m\u03bb [2].", "In recent years, hyperspectral (HS) imaging, acquiring a same scene in several hundreds of contiguous spectral bands, has opened a new range of relevant applications such as spectral unmixing [2] and classi\u007fcation [3]."]} +{"1639020|16374808": ["Fusion of multi-sensor images has been a very active research topic during recent years [1].", "The de\u007fnition of these indexes can be found in [1, 27]."]} +{"61685447|2463419": ["[23] for details).", "The exact relationships between these methods have been published elsewhere [23] and will not be repeated here."]} +{"18193336|12204996": ["\u2026\ufb01l-tering [41], [23], [42], [43], link prediction [44], [45], fusion of metabolomics data [46], [25], [26], predicting protein-protein interactions [47]\u2013[49], multilingual text analysis [50], analysis of batch processes [51], spectral clustering [52], gene expression pro\ufb01ling [53], [54], gene\u2026"]} +{"13703374|2463419": []} +{"28298062|7761990": ["ICA is intrinsically a multivariate approach and is particularly useful for data fusion of multiple tasks or data modalities (Calhoun et al., 2009b).", "It may help explain the complex relationships between distributed cerebral sites in the brain and possibly provide new understanding of neurological and psychiatric disorders (Calhoun et al., 2009a; Lei et al., 2011b)."]} +{"7500426|7761990": ["and (ii) the corresponding latent variables are statistically independent [107], [108], both quite stringent and limiting assumptions."]} +{"504880|26071662": []} +{"8042572|1113420": ["Context aware intelligent spaces[56][57] are good example of systems that can exploit complementary information across modalities by extracting information from different sensors based on the context."]} +{"8042572|7360895": ["Human-robot interaction [50][36] and avatar"]} +{"37888043|2463419": ["See Van Deun et al. (2009) for more information about the preprocessing and weighting of data blocks.", "Selecting the number of simultaneous components To solve the problem of selecting the number of simultaneous components, we rely on a method proposed by Van Deun et al. (2009).", "Selecting the number of simultaneous components To solve the problem of selecting the number of simultaneous components, we rely on a method proposed by Van Deun et al. (2009). In their method, the percentage of variance accounted for by every simultaneous component in each data block is inspected; subsequently, each component that accounts for a sizeable amount of variance in at least one of the data blocks is retained.", "In this section, simultaneous component (SC) methods are briefly discussed (Van Deun et al., 2009).", "Van Deun et al. (2009) did not formalize \u201c sizeable."]} +{"3143687|8042572": ["Applications are diverse: understanding brain functionality [6,8], health monitoring [13], developing non-invasive medical diagnosis techniques [12], exploring the relationship between tasks for human-machine interaction (HMI) [10], and so forth.", "This approach can be found in certain audio-visual applications [9, 10], as well as in the fMRI-constrained solution for the otherwise-underdetermined, ill-posed EEG inverse problem [6].", "As a result, certain multimodal applications are based on imitating natural multimodality: the most prevalent is audio-video [9,10].", "This practice can be found in certain mutli-sensor [2], HMI [10] and remote-sensing [14] applications."]} +{"2767598|2463419": []} +{"11878898|7761990": ["We need rather to apply an ensemble of strategies by mploying several suitably 2This form of factorizations are typical with EEG /MEG related data for multi-subjects, multi-tasks, while the factorization for the transposed of Y is typical for fMRI data [16, 17, 18].", "This problem is related to various models of grou p ICA, with suitable pre-processing, dimensionality reduction and post-p rocessing procedures [16, 17, 18]."]} +{"9378160|206602044": ["Given an audio or video recording, the speaker diarization task consists in finding \u201cwho speaks when\u201d in a non-supervised fashion [23]."]} +{"16236042|192934": ["score, minimum-redundancy-maximum-relevance selection, Fisher score, Laplacian score, and entropy [5]."]} +{"39749329|2463419": ["Regarding the first model selection problem, Van Deun et al. (2009) proposed selecting the simultaneous components that explain a sizeable amount of variance in at least one data block.", "A possible strategy then could be to scale each data block to the sum of squares 1 (see, e.g., Timmerman, 2006; Van Deun et al., 2009; and Wilderjans, Ceulemans, & Van Mechelen, 2009, for more information about preprocessing and weighting linked data blocks).", "In the first step, the linked data are analyzed by means of simultaneous component (SCA) methods (see, e.g., Kiers & ten Berge, 1989; ten Berge, Kiers, & Van der Stel, 1992; for a review, see Van Deun, Smilde, van der Werf, Kiers, & Van Mechelen, 2009)."]} +{"120530563|2463419": ["\u2026between blocks, one may rely on the MxLSCA-P approach (Wilderjans, Ceulemans, Van Mechelen, & van den Berg, 2011), a stochastic extension of standard simultaneous component analysis (Kiers & ten Berge, 1994; Timmerman & Kiers, 2003; Van Deun, Smilde, van der Werf, Kiers, & Van Mechelen 2009).", "To handle these tasks, an analysis technique needs to be developed in which all available pieces of information are simultaneously integrated and in which noise heterogeneity between and within data blocks is taken into account (see Van Mechelen & Smilde, 2009, 2010)."]} +{"13036921|8042572": ["For automated camera control, acoustic [2], visual [3] or multi-modal person detection and tracking [4] is required."]} +{"121428794|2463419": ["Different variants of SCA have been proposed that differ in the way the data blocks are scaled prior to the actual simultaneous component analysis; see [9] for an overview.", "Note that this paper differs considerably from our previous paper on simultaneous component analysis [9] as the latter does not discuss the issue of common and distinctive sources of variation and, on the level of the methods, does not include the adapted GSVD, DISCO-SCA, ECO-POWER, canonical\u2026", "To our knowledge, these are several variants of (generalized) canonical correlation analysis [7] and simultaneous component analysis [8,9], ECO-POWER [10], OnPLS [11], generalized singular value decomposition [12], and DISCO-SCA [13,14].", "Such effects may be accounted for by mean-centering and scaling to equal sum-of-squares per block [19]; see [18] for a discussion on the matter of centering variables either per block or over the blocks for the case of variable-wise linked data and [9] on the matter of block-scaling."]} +{"8009256|20905429": []} +{"961984|9554464": ["Indeed, it is already being actively researched for the related problem of data aggregation within sensor network community [178,179], which further signifies the importance of considering security-related issues while developing modern decentralized fusion systems."]} +{"961984|4491892": ["Probabilistic [32,40,45] Represents sensory data using probability", "Particle filters are a recursive implementation of the SMC algorithm [45]."]} +{"206692734|16374808": ["The group of methods defined by (5), varying with the choice of spectral weights in (2), is sometimes referred to as relative spectral contribution (RSC) [1], [6].", "The definition of a technique that fulfills the constraints defined in the protocol is still an open problem [6], [37] and relates closely to the general discussion regarding image quality assessment [38] and image fusion [39], [40].", "On the other side, they are not able to account for local dissimilarities between the PAN and MS images originated by the spectral mismatch between the PAN and MS channels of the instruments, which may produce significant spectral distortions [1], [6].", "In fact, the spatial information is mapped to the first component, to an extent proportional to the correlation among the MS channels [6]."]} +{"2411481|43059": ["Another important, more complex constrained CPD model, which can be represented graphically as nested 2PARALIND is abbreviation of PARAllel with LINear Dependencies, while CONFAC means CONstrained FACtor model (for more detail see [42] and references therein.", "Similarly, we can define PARALIND/CONFAC-(K, N) models2described as [42] X \u223c= G\u00d71 B(1) \u00d72 B(2) \u00b7 \u00b7 \u00b7 \u00d7N B(N) (15) = JI; B(1)\u03a6(1), .", "Tucker-(K, N) model is the PARATUCK-(K, N) model (see review paper of Favier and de Almeida [42] and references therein)."]} +{"2411481|7761990": ["In the case of statistical independence constraints, the problem can be related to models of group ICA through suitable pre-processing, dimensionality reduction and post-processing procedures [22]."]} diff --git a/edge/graph_26073421.jsonl b/edge/graph_26073421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14e20a15089b979ed7091c22013e5f26be370c76 --- /dev/null +++ b/edge/graph_26073421.jsonl @@ -0,0 +1,4 @@ +{"13638564|456491": ["A\u0301lvarez et al. (2011) show how several models in machine learning are special cases of LMC.", "David Ginsbourger referred us to A\u0301lvarez et al. (2011)."]} +{"13638564|26257441": ["Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al.", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al. (2013). Fricker et al. (2010) explain both nonseparable models and separable models.", "Note that Simpson et al. (2001) claim that Ordinary Kriging defined in (1) with a Gaussian correlation function defined in (2) is the most common Kriging model in engineering.", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al. (2013). Fricker et al. (2010) explain both nonseparable models and separable models. Separable models assume \u03a3Y = \u03a30R where we defined the crosscovariance matrix \u03a30 in (13) and the auto-covariance matrix R below (2); i.e., separable models assume that the matrix \u03a3Y can be separated into two components with the second component implying that all outputs have the same auto-correlation matrix. Moreover, Fricker et al. (2010) show that separable models have an undesirable so-called Markov property; see equation (6) in Fricker et al. (2010) or equation (4) in Fricker et al. (2013). An example of a separable model is Zhang (2007). Furthermore Fricker et al.", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al.", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al. (2013). Fricker et al. (2010) explain both nonseparable models and separable models. Separable models assume \u03a3Y = \u03a30R where we defined the crosscovariance matrix \u03a30 in (13) and the auto-covariance matrix R below (2); i.e., separable models assume that the matrix \u03a3Y can be separated into two components with the second component implying that all outputs have the same auto-correlation matrix. Moreover, Fricker et al. (2010) show that separable models have an undesirable so-called Markov property; see equation (6) in Fricker et al. (2010) or equation (4) in Fricker et al. (2013). An example of a separable model is Zhang (2007). Furthermore Fricker et al. (2010, 2013) discuss how nonseparable models may be created through either convolution method or LMC. These former methods convolve a Gaussian white noise process with a smoothing kernel; see Ver Hoef & Barry (1998); Higdon (2002).", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al. (2013). Fricker et al. (2010) explain both nonseparable models and separable models. Separable models assume \u03a3Y = \u03a30R where we defined the crosscovariance matrix \u03a30 in (13) and the auto-covariance matrix R below (2); i.e., separable models assume that the matrix \u03a3Y can be separated into two components with the second component implying that all outputs have the same auto-correlation matrix. Moreover, Fricker et al. (2010) show that separable models have an undesirable so-called Markov property; see equation (6) in Fricker et al.", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al. (2013). Fricker et al. (2010) explain both nonseparable models and separable models. Separable models assume \u03a3Y = \u03a30R where we defined the crosscovariance matrix \u03a30 in (13) and the auto-covariance matrix R below (2); i.e., separable models assume that the matrix \u03a3Y can be separated into two components with the second component implying that all outputs have the same auto-correlation matrix. Moreover, Fricker et al. (2010) show that separable models have an undesirable so-called Markov property; see equation (6) in Fricker et al. (2010) or equation (4) in Fricker et al.", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al. (2013). Fricker et al.", "Our formalization follows the nonseparable dependence model in Svenson & Santner (2010), who in turn follow Fricker et al. (2010), who precede Fricker et al. (2013). Fricker et al. (2010) explain both nonseparable models and separable models. Separable models assume \u03a3Y = \u03a30R where we defined the crosscovariance matrix \u03a30 in (13) and the auto-covariance matrix R below (2); i.e., separable models assume that the matrix \u03a3Y can be separated into two components with the second component implying that all outputs have the same auto-correlation matrix. Moreover, Fricker et al. (2010) show that separable models have an undesirable so-called Markov property; see equation (6) in Fricker et al. (2010) or equation (4) in Fricker et al. (2013). An example of a separable model is Zhang (2007)."]} +{"562815|10290908": []} +{"34758855|15300368": ["WSNs are very attractive technology because they are relatively cheap to deploy, relatively easy to maintain, and have minimal impact to the environment (Buratti et al., 2009; Yick et al., 2008). This work is part of a long-term study aimed at investigating how the connection between chemical and physical properties (such as carbon, nitrogen, phosphorus, and soil moisture), and microbial communities may be influenced by two different farming practices and micro-climatic conditions. As part of this work, soil grab samples will be collected a few times a year; the soil\u2019s chemical, physical, and microbial properties will be examined. These samples will be collected near sensor nodes that will be monitoring various climatic variables (such as ambient temperature, humidity, and soil moisture) every 5 min. The ultimate aim is to examine if it is possible to relate the chemical, physical, and microbial properties of the soil to the micro-climatic conditions. In this study, we aim to develop methodology to interpolate soil temperature readings in space and time, and to forecast readings of data from a WSN by proposing spatio-temporal functional principal components regression (Ramsay and Silverman, 2005). Since the beginning of the 1990s, functional data analysis (FDA) has been an emerging branch of Statistics for the analysis of data about curves, surfaces, and other multidimensional objects measured over a continuum. In practice, discrete data points collected over a continuum can be thought of as a function that is assumed to be a reasonably smooth mechanism giving rise to those discrete observed points. Several functional versions of a wide range of statistical tools have been developed during the last 10 years (see a complete overview of FDA techniques in Gonz\u00e1lez-Manteiga and Vieu, 2007). The use of WSNs data will contribute to our understanding of environmental conditions and patterns that may affect farming practices. Standard statistical techniques for FDA produce a curve over time for each location but ignores the spatial correlation between the curves, and this should be accounted for. Several approaches has been proposed in the literature to deal with spatially correlated functional data extending kriging methods (Cressie, 1993). Some examples are Delicado et al. (2010), Nerini and Monestiez (2010), or Giraldo et al.", "WSNs are very attractive technology because they are relatively cheap to deploy, relatively easy to maintain, and have minimal impact to the environment (Buratti et al. , 2009; Yick et al. , 2008).", "WSNs are very attractive technology because they are relatively cheap to deploy, relatively easy to maintain, and have minimal impact to the environment (Buratti et al., 2009; Yick et al., 2008). This work is part of a long-term study aimed at investigating how the connection between chemical and physical properties (such as carbon, nitrogen, phosphorus, and soil moisture), and microbial communities may be influenced by two different farming practices and micro-climatic conditions. As part of this work, soil grab samples will be collected a few times a year; the soil\u2019s chemical, physical, and microbial properties will be examined. These samples will be collected near sensor nodes that will be monitoring various climatic variables (such as ambient temperature, humidity, and soil moisture) every 5 min. The ultimate aim is to examine if it is possible to relate the chemical, physical, and microbial properties of the soil to the micro-climatic conditions. In this study, we aim to develop methodology to interpolate soil temperature readings in space and time, and to forecast readings of data from a WSN by proposing spatio-temporal functional principal components regression (Ramsay and Silverman, 2005). Since the beginning of the 1990s, functional data analysis (FDA) has been an emerging branch of Statistics for the analysis of data about curves, surfaces, and other multidimensional objects measured over a continuum. In practice, discrete data points collected over a continuum can be thought of as a function that is assumed to be a reasonably smooth mechanism giving rise to those discrete observed points. Several functional versions of a wide range of statistical tools have been developed during the last 10 years (see a complete overview of FDA techniques in Gonz\u00e1lez-Manteiga and Vieu, 2007). The use of WSNs data will contribute to our understanding of environmental conditions and patterns that may affect farming practices. Standard statistical techniques for FDA produce a curve over time for each location but ignores the spatial correlation between the curves, and this should be accounted for. Several approaches has been proposed in the literature to deal with spatially correlated functional data extending kriging methods (Cressie, 1993). Some examples are Delicado et al. (2010), Nerini and Monestiez (2010), or Giraldo et al. (2011). All these methods assume that the spatial functional process is stationary, that is, no spatial trend, isotropic, and the covariance function depends on the distance between locations.", "WSNs are very attractive technology because they are relatively cheap to deploy, relatively easy to maintain, and have minimal impact to the environment (Buratti et al., 2009; Yick et al., 2008)."]} diff --git a/graph_2607758.jsonl b/edge/graph_2607758.jsonl similarity index 100% rename from graph_2607758.jsonl rename to edge/graph_2607758.jsonl diff --git a/graph_2609569.jsonl b/edge/graph_2609569.jsonl similarity index 100% rename from graph_2609569.jsonl rename to edge/graph_2609569.jsonl diff --git a/edge/graph_26114626.jsonl b/edge/graph_26114626.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2612055.jsonl b/edge/graph_2612055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26131992.jsonl b/edge/graph_26131992.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d887a8aea4c7afa5266a8561b6910251eaad6d83 --- /dev/null +++ b/edge/graph_26131992.jsonl @@ -0,0 +1,8 @@ +{"41219872|11894197": []} +{"205015030|6746689": ["(6) contour profiles; (7) zoning; (8) geometric moment invariants;"]} +{"11594830|15279105": []} +{"11594830|2809360": ["literature[17], biological literature[18], electronic health records[19], and healthcare related social"]} +{"5403702|393948": ["Deep neural networks, emerging recently, provide a way of highly automatic feature learning (Bengio et al., 2013), and have exhibited considerable potential (Zeng et al.", "Deep neural networks, emerging recently, provide a way of highly automatic feature learning (Bengio et al., 2013), and have exhibited considerable potential (Zeng et al., 2014; Santos et al., 2015)."]} +{"3406567|393948": ["Learning good representations for text, such as words, sentences and documents, is essential for information retrieval (IR) and natural language processing (NLP) tasks like text classification and sentiment analysis, which has attracted considerable attention from both academic and industrial communities [2]."]} +{"2476229|8310135": ["Recently, Huang et al. (2015) showed that building a conditional random \ufb01eld (CRF) layer on top of bidirectional LSTM-RNNs performs comparably to the state-of-the-art methods in the part-of-speech (POS) tagging, chunking, and NER.", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and\u2026", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and relation is important for high performance (Li and Ji, 2014; Miwa and Sasaki, 2014) since relations interact closely with entity information.", "LSTM-RNNs have been widely used for sequential labeling, such as clause identi\ufb01cation (Ham-merton, 2001), phonetic labeling (Graves and Schmidhuber, 2005), and NER (Hammerton, 2003)."]} +{"15083174|15782139": ["The other terms being off-line and on-line recognition [2] modes of obtaining input for recognition can be explained as follows."]} diff --git a/edge/graph_26151914.jsonl b/edge/graph_26151914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26153109.jsonl b/edge/graph_26153109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c3eef248fb0155424bd7c7a3e7e28adf269b939 --- /dev/null +++ b/edge/graph_26153109.jsonl @@ -0,0 +1,3 @@ +{"7467283|7800459": ["Conversely, network coding applications such as distributed storage repair [39], caching [40], etc."]} +{"14278660|41035405": []} +{"23919432|6779551": ["Note that in [5], a survey of wireless physical-layer security is provided including authentication, confidential communications, and secretkey generation."]} diff --git a/graph_2616070.jsonl b/edge/graph_2616070.jsonl similarity index 100% rename from graph_2616070.jsonl rename to edge/graph_2616070.jsonl diff --git a/edge/graph_26162819.jsonl b/edge/graph_26162819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26171836.jsonl b/edge/graph_26171836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81cf037398fc8bc60f9e23afb5f9c4893af70394 --- /dev/null +++ b/edge/graph_26171836.jsonl @@ -0,0 +1,8 @@ +{"294790|17561208": ["The thermal infrared bands play an important role in mapping and understanding wildfire ecology (Wang et al. 2010), managing of water resources and monitoring of evapotranspiration (Anderson et al. 2012), and land cover classification (Sun and Schulz 2015)."]} +{"294790|206051485": ["There are numerous approaches for both georeferencing and registering Landsat data, and the process might involve a simple pixel shift or a more complex automated feature detection and matching between images (for review, see Brown 1992, Zitov\u00e1 and Flusser 2003)."]} +{"63914549|11112426": ["A substantial number of endmember extraction algorithms have been proposed in the literature (Bioucas-Dias et al. 2012)."]} +{"42137031|14415030": []} +{"14283205|16665885": ["This trend seems continuing and more applications areas would benefit from the advancements of the technologies and data sources (Blaschke et al., 2011; Weng, 2011)."]} +{"14283205|10859746": ["The early RS data had limited spatial, spectral and temporal resolutions which were the major cause of the limitation in RS based change detection methodologies (Boyd and Foody, 2011).", "The higher spatial resolution is also linked to the mixed pixel problem, which is considered as one of the largest source of error and uncertainty in land cover CD (Boyd and Foody, 2011)."]} +{"35917065|17054454": []} +{"129835282|17054454": []} diff --git a/edge/graph_26179088.jsonl b/edge/graph_26179088.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..98b3649d5afe6040dea26ffbf0db898574b15603 --- /dev/null +++ b/edge/graph_26179088.jsonl @@ -0,0 +1,7 @@ +{"1640344|16362395": ["Fisher\u2019s discriminant analysis (Fisher\u2019s LDA) is a very popular classification algorithm in BCI research [1], because it has a very low computational cost and usually yields good results for motor imagery BCIs [11]."]} +{"16412517|16362395": ["SVM find the optimal hyperplane for generalization [12]", "These advantages are gained at the expense of a low speed of execution [12]."]} +{"16655243|9270553": []} +{"16980053|14866098": []} +{"16980053|16362395": []} +{"16980053|9270553": ["Advanced signal processing and machine learning techniques have been applied to system implementation [8, 9]."]} +{"12524156|9270553": ["2 ): A := {x \u2208 2 | \u00b5 3 x > \u03a6 2 /2 \u2227 arg(x) > \u03c0/3} B := {x \u2208 2 | \u00b5 2 x > \u03a6 2 /2 \u2227 arg(x) < 0} C l := {x \u2208 2 | ||x|| 2 > \u03a6/ \u221a 3 \u2227 arg(x) \u2208 [0, \u03c0/3]} C u := {x \u2208 2 | ||x|| 2 > \u03a6/2 \u2227 arg(x) \u2208 [0, \u03c0/3]} R := {x \u2208"]} diff --git a/edge/graph_26193858.jsonl b/edge/graph_26193858.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26195071.jsonl b/edge/graph_26195071.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b4af93cba02188ee4858e1568afdde4298941d6 --- /dev/null +++ b/edge/graph_26195071.jsonl @@ -0,0 +1 @@ +{"110090164|469744": ["The most significant factor that hinders the effective development and use of AR systems is the requirement of accurate, long-range sensors and trackers [27]."]} diff --git a/edge/graph_2621834.jsonl b/edge/graph_2621834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2623404.jsonl b/edge/graph_2623404.jsonl similarity index 100% rename from graph_2623404.jsonl rename to edge/graph_2623404.jsonl diff --git a/graph_2624945.jsonl b/edge/graph_2624945.jsonl similarity index 100% rename from graph_2624945.jsonl rename to edge/graph_2624945.jsonl diff --git a/graph_2625702.jsonl b/edge/graph_2625702.jsonl similarity index 100% rename from graph_2625702.jsonl rename to edge/graph_2625702.jsonl diff --git a/edge/graph_26257441.jsonl b/edge/graph_26257441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..547c4fb69eccf10f5d3b09b3dc156d9e37b5dbba --- /dev/null +++ b/edge/graph_26257441.jsonl @@ -0,0 +1 @@ +{"122523543|33286487": []} diff --git a/edge/graph_26259297.jsonl b/edge/graph_26259297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc5901a76c9522eb7259c3fb721af65545cbb0f3 --- /dev/null +++ b/edge/graph_26259297.jsonl @@ -0,0 +1 @@ +{"2221695|3054454": []} diff --git a/edge/graph_26314206.jsonl b/edge/graph_26314206.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c1128a252c7d4f864e8c568f7411869210ec7d4c --- /dev/null +++ b/edge/graph_26314206.jsonl @@ -0,0 +1,3 @@ +{"13901818|11608263": ["Since multiple fields in a bug report would get reassigned, we would refer to multi-label learning algorithms [28] to solve the problem."]} +{"17772484|11608263": ["By default, we set the input criterion EC as Recall@k [10], [11] (see Definition 3)."]} +{"18627014|5375832": []} diff --git a/edge/graph_26323658.jsonl b/edge/graph_26323658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42e88ed91bae22702e36bbcb31565e0896775294 --- /dev/null +++ b/edge/graph_26323658.jsonl @@ -0,0 +1,2 @@ +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"207649994|1230643": ["[ 1-4 ]. A wireless sensor network consists of tiny sensing devices, deployed in a region of interest.", "On the other hand, protocol designers are seeking an energy efficient communication architecture, which involves all levels from the physical layer to the application layer [ 4 ].", "Our work is dedicated to scheduling nodes by using application knowledge (i.e., it belongs to one branch of application layer protocols according to the categories in [ 4 ]) and does not address the data communication problem."]} diff --git a/edge/graph_26335185.jsonl b/edge/graph_26335185.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa1452c1195c791ef653b1e6ef5d98a0e8d6be4b --- /dev/null +++ b/edge/graph_26335185.jsonl @@ -0,0 +1,51 @@ +{"206584302|5002530": ["Although the mobility of the sink is bene\ufb01cial due to the dif\ufb01culty in compromising and snif\ufb01ng, in multiple mobile sink strategy, the probability that a malicious node plays the role of sink node and collects the data is very high [76], [77]."]} +{"206584302|1236072": ["Greedy geographic routing is regarded as highly scalable and energy-ef\ufb01cient; therefore, it is an attractive routing solution for WSNs with position-aware sensors [21], [22]."]} +{"113935830|7988320": []} +{"46644174|1236072": ["WSNs have wide application areas, such as military reconnaissance, disaster management, security surveillance, habitat monitoring, medical and health, industrial automation, and etc. [1][2][3]."]} +{"46644174|1230643": []} +{"1161967|3826739": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|1236072": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|14441987": ["The requirements of routing protocols for WSNs are similar to those of routing protocols for mobile ad hoc networks (MANETs) [69].", ", see [19,69] for more extensive discussions and examples)."]} +{"8787020|14132386": []} +{"8787020|17872696": ["Baranidharan and Shanti (2010) survey work was based on energy efficient protocols and on classical routing."]} +{"8787020|205286988": ["\u2026due to technological advancement has encouraged researchers in the past years to engage in an intensive research on addressing the potential of collaboration among sensors in data gathering, processing, coordination, and management of the sensed data flow to the sink (Akkaya and Younis, 2005).", "In a similar survey, Akkaya and Younis (2005) survey was still based on classical routing protocols, and not much different from that of Karaki and Kamal (2004), even as it was more recent, did not capture in their work protocols that were designed as of 2004.", "\u2026the main function of wireless sensor nodes is to sense and collect information (data) from a target area, process, and transmit the information via a radio transmitter back to a command center where the underlying application resides (sink) (Akkaya and Younis, 2005; Sohraby et al., 2007).", "Routing in sensor networks involves a lot of challenges due to differences in some properties between them and contemporary communication and wireless ad hoc networks (Akkaya and Younis, 2005).", "\u2026and the differences in the way data are forwarded from the nodes to the sink, leads to classifying the routing protocols as either classical or swarm intelligence based, and or data-centric, hierarchical, location based, network flow and quality of service (QoS) awareness (Akkaya and Younis, 2005).", "\u2026is an infrastructure composed of sensing (measuring), computing, and communication elements that gives a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment (Akkaya and Younis, 2005; Sohraby et al., 2007; Akyildiz et al., 2002).", "Each node has a GPS sensor on it indicating its location so as to associate itself with a point on the virtual grid (Akkaya and Younis, 2005).", "The clusters formation is based on the energy reserve of sensor nodes and its proximity to the cluster head (Akkaya and Younis, 2005; Lin and Gerla, 1997).", "Its main idea is to maintain the number of hops when the interest is diffused through the network (Akkaya and Younis, 2005).", "RR (Akkaya and Younis, 2005; Braginsky and Estrin, 2002; Patra et al., 2010) is another improved version of Directed Diffusion."]} +{"8787020|1236072": ["Data aggregation and multi-hop relays can affect latency (Zaman and Abdullah, 2010; Karaki and Kamal, 2004).", "In a similar survey, Akkaya and Younis (2005) survey was still based on classical routing protocols, and not much different from that of Karaki and Kamal (2004), even as it was more recent, did not capture in their work protocols that were designed as of 2004.", "Karaki and Kamal (2004) surveyed different routing techniques in WSNs."]} +{"8787020|1230643": ["Hence, the stability of the routing data is an important design issue in addition to energy consumptions and bandwidth utilization (Akyildiz et al., 2002; Chong and Kumar, 2003; Singh et al., 2010).", "The characteristics of sensor networks and application requirements have direct impact on the network design issues in terms of network performance and capabilities (Akyildiz et al., 2002).", "For applications in the battle field where it is virtually impossible to access the sensors and recharge their batteries (Akyildiz et al., 2002; Chong and Kumar, 2003), routing protocols design for sensor networks should be as energy efficient as possible to extend their lifetime, and hence,\u2026", "A sensor network is an infrastructure composed of sensing (measuring), computing, and communication elements that gives a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment (Akkaya and Younis, 2005; Sohraby et al., 2007; Akyildiz et al., 2002).", "As sensor nodes are battery powered and expected to operate and execute their duties without attendance for a long duration of time during the application, it is difficult and even impossible to change or recharge batteries for the sensor nodes (Akyildiz et al., 2002; Chong and Kumar, 2003).", "\u2026is an infrastructure composed of sensing (measuring), computing, and communication elements that gives a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment (Akkaya and Younis, 2005; Sohraby et al., 2007; Akyildiz et al., 2002).", "For applications in the battle field where it is virtually impossible to access the sensors and recharge their batteries (Akyildiz et al., 2002; Chong and Kumar, 2003), routing protocols design for sensor networks should be as energy efficient as possible to extend their lifetime, and hence, prolong the network lifetime without performance degradation.", "Akyildiz et al. (2002) surveyed protocols on wireless sensor networks, while dealing with few of the classical routing protocols and their methods of information forwarding."]} +{"17240776|17205659": []} +{"6980456|16120075": []} +{"6980456|205286988": ["A WSN consists of a large number of sensors, which have the ability of sensing, computing and communicating, observing and reacting to relative events and phenomena in a specific region (Akyildiz et al., 2002; Akkaya and Younis, 2005; Sohraby et al., 2007)."]} +{"6980456|1230643": ["A WSN consists of a large number of sensors, which have the ability of sensing, computing and communicating, observing and reacting to relative events and phenomena in a specific region (Akyildiz et al., 2002; Akkaya and Younis, 2005; Sohraby et al., 2007)."]} +{"10027151|8652282": ["Furthermore, although the load balance level of EBDG is the best in Fig.", "It is regarded that radio is the main consumer of energy in WSNs [14], [15].", "Based on the coronabased model, the authors present an energy-balanced transmission protocol EBDG, in which all nodes in the same corona use the same probability for direct transmission and the same probability for hop-by-hop transmission.", "To demonstrate the efficiency and advantages of ADTS in terms of load balance level and network lifetime, ADTS is compared with three conventional transmission methods: 1) a direct transmission manner named DT [15]; 2) a multihop transmission scheme named EEGR [15]; and 3) a hybrid transmission method named EBDG [15]."]} +{"10027151|9830350": ["Due to lots of advantages of clustering in WSNs [30], [31], the network is divided into n layers, which are regarded as n clusters, denoted as C1, C2, C3, ."]} +{"10027151|1230643": ["INTRODUCTION Wireless sensor networks (WSNs) generally consist of a large number of sensor nodes, which are constrained by limitations in energy resources, processing ability, storage capability, and radio communication range, etc [1], [2].", "As the foundation, key components, and important network technologies of the Internet of Things (IoT) [3]\u2013[8], WSNs have a wide range of military and civilian applications [1], [2], such as such as environment surveillance, health care, military battlefield, agriculture monitoring, industrial control, and smart life."]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"14056371|1236072": ["proposed SPIN family protocols that disseminate all the information in the network assuming that all nodes are potential base nodes [5]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"9229405|9830350": ["Clearly, similar to clustering [46], [47], this region division method can significantly enhance scalability of such networks."]} +{"56557657|205286988": ["Extensive research results have shown that the routing protocol has a direct influence on the performance of wireless sensor networks [1][2][ 3 ]."]} +{"28765323|9830350": ["In [30], the advantages and objectives of clustering for WSNs were outlined, and a comprehensive taxonomy of TABLE I"]} +{"28765323|1230643": ["W IRELESS sensor networks (WSNs) consist of a large number of low-cost, low-power and intelligent sensor nodes and one or more sinks or base stations (BSs) [1], [2]."]} +{"4916173|9830350": ["This is equivalent to the hierarchical model, which can increase the scalability of the network [13]."]} +{"6238038|1230643": ["The proposed method consists of estimating the current position of a single target."]} +{"12797509|6275330": []} +{"9199492|18643817": ["\u2026protocols, and techniques have been done in the last few years to deliver multimedia content over large-scale networks, such as single-hop wired LANs (e.g., [3], [4]), multi-hop wired LANs (e.g., [5]), ATM (e.g., [6], [7]), mobile adhoc networks(e.g., [8], [9]) and the Internet (e.g., [10]\u2013 [14])."]} +{"9199492|14088590": []} +{"9199492|12817488": []} +{"9199492|1236072": ["For example, some applications might require a diverse mixture of sensors for monitoring temperature, pressure, and humidity of the surrounding environment, detecting motion via acoustic signatures, and capturing images or video tracking of moving objects [24]."]} +{"9199492|1230643": ["Although plethora of works on surveying architecture, applications and communication protocols for wireless sensor networks are performed beforehand [1], [15]\u2013[20], this survey is distinguished from the previous efforts in that it pioneers to investigate those routing techniques which address application-specific QoS as well as energy efficiency for WMSNs.", "[15], [34], [35], [36], [39], [40], [41], [42] Hard Real-time Bounded"]} +{"1722090|206901977": []} +{"1722090|17960632": ["Although some real-time collision-free protocols have been proposed [Ramezani and Leus 2013; Guimaraes et al. 2013; Teng and Kim 2010], they cannot be directly used in DiMEMSs because they do not support mobility."]} +{"1722090|10271586": []} +{"1722090|64292": ["Task scheduling is a widely researched subject in traditional distributed real-time systems [Sha et al. 2004; Shen et al. 2006; Schmidt and Schmidt 2012]."]} +{"1722090|14441987": []} +{"8652282|57194320": []} +{"8652282|7876249": []} +{"8652282|3755658": [", [2], [12]\u2013[14], are available in the literature.", "iii) LEACH (Low Energy Adaptive Clustering Hierarchy) [22] is cited and studied by almost all the survey papers [1], [2], [7], [12]\u2013[16], [20], [21].", "From Table 1, we have: i) The 2004 survey [14] presents a comprehensive survey of earlier routing protocols, but not all described are energyefficient; [7] addresses various aspects of energy harvesting sensor systems; [12] exploits routing protocols designed for large-scale WSNs; [2] describes energy-efficient routing protocols; [15] classifies routing protocols based on different design criteria, and discusses the mobility including mobile sinks only, few mobile nodes act as mobile relays, all nodes mobile and few nodes are stationary; [1] gives an overview of WSNs from an industrial perspective; [12] discusses routing protocols based on intelligent algorithms; [16] considers only the routing protocols with mobile sinks; [20] focuses on hierarchical routing protocols for heterogeneous WSNs; and [21] categorizes various heterogeneous routing protocols for WSNs based upon various predefined parameters.", "All the sensor nodes in homogeneous WSNs in [2], [12], and [13] are assumed to be of the same type, especially in their power supply, communication bandwidth, computation and storage capacity.", "However, in [2], [12], and [13], most routing protocols assume their sensors to be static.", "The work [12] presents a survey with its focus on the scalability of routing protocols.", "In addition, this work gives application scopes of each protocol which were missing in the earlier surveys [2], [12], [14], [15], [17], [20]."]} +{"8652282|1236072": [", [2], [12]\u2013[14], are available in the literature.", "Furthermore, each protocol involved in [14] also considers only one base station.", "This is because cluster-based routing is more energy-efficient, more scalable, and more secure as compared with traditional flat routing [14].", "From Table 1, we have: i) The 2004 survey [14] presents a comprehensive survey of earlier routing protocols, but not all described are energyefficient; [7] addresses various aspects of energy harvesting sensor systems; [12] exploits routing protocols designed for large-scale WSNs; [2] describes energy-efficient routing protocols; [15] classifies routing protocols based on different design criteria, and discusses the mobility including mobile sinks only, few mobile nodes act as mobile relays, all nodes mobile and few nodes are stationary; [1] gives an overview of WSNs from an industrial perspective; [12] discusses routing protocols based on intelligent algorithms; [16] considers only the routing protocols with mobile sinks; [20] focuses on hierarchical routing protocols for heterogeneous WSNs; and [21] categorizes various heterogeneous routing protocols for WSNs based upon various predefined parameters.", "In addition, this work gives application scopes of each protocol which were missing in the earlier surveys [2], [12], [14], [15], [17], [20].", "Their classification in [2] is extended in [14] which is comprehensive but not all the protocols described are energy-aware."]} +{"8652282|12060835": ["From Table 1, we have: i) The 2004 survey [14] presents a comprehensive survey of earlier routing protocols, but not all described are energyefficient; [7] addresses various aspects of energy harvesting sensor systems; [12] exploits routing protocols designed for large-scale WSNs; [2] describes energy-efficient routing protocols; [15] classifies routing protocols based on different design criteria, and discusses the mobility including mobile sinks only, few mobile nodes act as mobile relays, all nodes mobile and few nodes are stationary; [1] gives an overview of WSNs from an industrial perspective; [12] discusses routing protocols based on intelligent algorithms; [16] considers only the routing protocols with mobile sinks; [20] focuses on hierarchical routing protocols for heterogeneous WSNs; and [21] categorizes various heterogeneous routing protocols for WSNs based upon various predefined parameters.", "The energy of a WSN can be saved by applying different techniques, such as dutycycle scheduling [3], energy-efficient MAC (Medium Access Control) [4], energy-efficient routing [5], node replacement [6], energy harvesting [7], energy replenishment [8], and energy balance [9].", "iii) LEACH (Low Energy Adaptive Clustering Hierarchy) [22] is cited and studied by almost all the survey papers [1], [2], [7], [12]\u2013[16], [20], [21]."]} +{"3491029|14132386": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|17872696": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|3117516": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|1236072": []} +{"3491029|1708582": []} +{"38262985|9830350": ["Such sector division can be regarded as a clustering technique which has apparent advantages, such as more scalability and more robustness [21], [22]."]} diff --git a/edge/graph_26336776.jsonl b/edge/graph_26336776.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2635807.jsonl b/edge/graph_2635807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26360610.jsonl b/edge/graph_26360610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26364249.jsonl b/edge/graph_26364249.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..067bf907dd93fdef4ea3e3e64a3bbb9c0beab2e2 --- /dev/null +++ b/edge/graph_26364249.jsonl @@ -0,0 +1,10 @@ +{"5120196|16403716": []} +{"16295078|10096622": ["Swarm intelligence is an effective way to handle these data, and to obtain \u201cuseful\u201d information [23]."]} +{"16295078|4474193": ["The dynamic problems, sometimes termed as non-stationary environments, or uncertain environments [19], dynamically change over time.", "In all these cases, additional measures must be taken so that swarm intelligence algorithms are still able to solve satisfactorily dynamic problems [19]."]} +{"16295078|13215551": ["Generally, there are two kinds of approaches that apply swarm intelligence as data mining techniques [27]."]} +{"14258620|9928823": []} +{"14258620|393948": ["Representation learning) has emerged as new area of ML research [43\u201345] that exploits multiple layers of information-processing in a hierarchical architecture for pattern classification and or representation learning (e."]} +{"14258620|2746910": ["Recent data-modeling research has shown that ensemble methods have gained much popularity as they often perform better than individual models [28][29]."]} +{"205972327|3304959": ["Its successful applications in business [1], sciences and healthcare [2] have radically changed their traditional practices."]} +{"14874327|8281388": ["Many other works based on Hadoop are present in literature [33\u201336]; for example, some specific libraries were developed as Hadoop-BAM, a library for distributed processing of genetic data from next generation sequencer machines [37], and Seal, a suite of distributed applications for aligning short DNA reads, manipulating short read alignments, and analyse the achieved results [38], was also developed relying on this framework."]} +{"14874327|1507400": ["Many other works based on Hadoop are present in literature [33\u201336]; for example, some specific libraries were developed as Hadoop-BAM, a library for distributed processing of genetic data from next generation sequencer machines [37], and Seal, a suite of distributed applications for aligning short DNA reads, manipulating short read alignments, and analyse the achieved results [38], was also developed relying on this framework."]} diff --git a/edge/graph_26368310.jsonl b/edge/graph_26368310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3b95a74b1089aafc6fdbe300f7750c768753bce --- /dev/null +++ b/edge/graph_26368310.jsonl @@ -0,0 +1,17 @@ +{"16006550|3330313": ["Hodge and Austin [26] provide an extensive survey of failure/anomaly detection techniques.", "Hodge and Austin [26] provide an extensive"]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"11557820|10390713": ["An extensive survey appears in [14]."]} +{"12237313|11013798": ["Fault ? error ? failure chain A fault is a flaw in the system that can cause an error [9] [10]."]} +{"12237313|1230643": ["The third contributor is energy-constrained networks, exemplified by wireless sensor networks [39], in which nodes that have drained their battery can no longer contribute to network connectivity [40,41]."]} +{"12237313|1991786": []} +{"5990651|7800459": ["Regenerating codes (see survey [9]) exploit the optimal trade-off between storage cost and repair traffic."]} +{"1878208|1507400": ["The use of MapReduce for data intensive scientific analysis and bioinformatics are well studied in [41, 80]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"17788363|193574": ["The field of network energy-efficiency is described in many excellent surveys [7,9,49,67].", "For almost all devices [49], energy profiles consist of the static (fixed) part, active only when a link is used, and the dynamic part dependent on various parameters (frequency, voltage, or traffic load)."]} +{"17788363|10837932": ["The field of network energy-efficiency is described in many excellent surveys [7,9,49,67].", "Sleep mode is one of the methods of consolidating resources [7], where traffic is consolidated in some network elements while the other elements are put in sleep mode (i."]} +{"7186505|15209496": ["This approach includes workload characterization and clustering techniques applied to the VMP problem to minimize the inter-VM network traffic [33].", "Additionally, other approaches are also presented in VMP literature, mainly based on the optimization of: (1) network communication costs, (2) live migration overhead, (3) network metrics such as: delay, data access and data transfer time, link congestion, network performance, service response time as well as average latency, and (4) Wide Area Network (WAN) communication in geo-distributed clouds [33].", "Finally, it should be mentioned that the studied articles proposed nearly 60 different objective functions for the three optimization approaches presented in Section III [33].", "Achieving energy consumption minimization by consolidating VMs on the minimum number of PMs is a very studied approach for the VMP problem [33].", "In fact, in the last years, a growing number of articles have proposed formulations of the VMP problem with this hybrid approach [33].", "Finally, CSPs can maximize its economical revenue by leasing all its available resources or at least the maximum possible [33].", "A detailed description of the selection process can be found in [33].", "The most widely used method for solving a multi-objective formulation of the VMP problem as mono-objective is the weighted sum method [33].", "In this context, economical cost minimization is studied and trending dynamic pricing schemes of VMs introduces many open challenges in this research area [33].", "Reducing penalty costs of SLA violations is another studied approach in the VMP literature in order to maximize the economical revenue of a CSP [33]."]} +{"7186505|17474643": ["Considering the large number of current CSPs and the different prices and features of VMs, the VMP problem could also be studied as the process of selecting which virtual machines (VMs) should be hosted at each CSP [23]."]} +{"16334756|122575": ["System administrators can use this capacity to consolidate many underutilized \nservers into only one machine, thus ensuring isolation and ef.cient performance [Whitaker et al. 2005] \nby expanding these capacities to clustering environments [Kiyanclar 2005]."]} diff --git a/edge/graph_26398795.jsonl b/edge/graph_26398795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9575961a6551773f7bcad6aa8734206f35724079 --- /dev/null +++ b/edge/graph_26398795.jsonl @@ -0,0 +1,12 @@ +{"22713174|2835258": ["The TrafficLab project [19], for example, used interVANETs to collect and disseminate road traffic information, whereas FleetNet [20] and NoW [21] studied how multihop wireless networks can improve driver and passenger safety [22] and comfort by means of intervehicular communications."]} +{"8841451|2835258": ["The former algorithm is a DTN variation of existing location-based greedy algorithms [11, 12] where the packet is forwarded to the neighbour that is closest to the destination (if closer than the position of the current carrier).", "A number of existing geographic routing protocols are available [13, 12]."]} +{"60468427|870434": ["Applications of DTNs include large-scale disaster recovery networks, sensor networks for ecological monitoring [36], ocean sensor networks [28, 24], vehicular networks [26, 6], and projects such as TIER [2], Digital Study Hall [15], and One Laptop Per Child [1] to benefit developing nations."]} +{"60793992|14441987": ["However, most protocols [12], [13], [20], [30], [ 21 ] assume that intermediate nodes can be found to setup an end-toend connection; otherwise, the packet will be dropped."]} +{"15972464|2835258": ["A large body of work appeared in literature addressing geographic routing in ad hoc networks [14], [16] and, lately, in vehicular networks (e."]} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"37668806|2736673": ["In literature, one can find number of\nsurvey papers on vehicular ad hoc network (Wai et al., 2008; Lee et al., 2012; Kakarla et al., 2011; Preetida and Sanyal, 2012; Bernsen and Manivannan, 2008; Cha et al., 2012) but we focus on analyzing the position-based routing protocol which seems to be the\u2026", "In literature, one can find number of survey papers on vehicular ad hoc network (Wai et al., 2008; Lee et al., 2012; Kakarla et al., 2011; Preetida and Sanyal, 2012; Bernsen and Manivannan, 2008; Cha et al., 2012) but we focus on analyzing the position-based routing protocol which seems to be the best choice for routing."]} +{"14304379|14441987": ["Most of the previous researches on routing protocols in VANET assume that intermediate nodes can be found to setup an end-to-end connection [3, 4, 5, 6, 7]; otherwise, the packet will be dropped."]} +{"13888005|763939": ["VanetMo-biSimisbasedonCanuMobiSim[27]thatsupportsbothmicroandmacrolevelmobility[28]."]} +{"12736301|14441987": ["Unlike traditional routing protocols for mobile ad hoc networks (MANETs) [13], epidemic routing achieves message delivery, even in the case where a connected path from the source to the destination is rarely available."]} +{"2465022|2835258": []} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} diff --git a/edge/graph_26429034.jsonl b/edge/graph_26429034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebcff4d8f9f8dc9dfaf895217274bda02e2e93b8 --- /dev/null +++ b/edge/graph_26429034.jsonl @@ -0,0 +1,9 @@ +{"9772641|26429034": ["1 reports, for each mobile subscriber, an identi\ufb01er , 1 The actual precision (e.g., in space and time) of the information recorded varies signi\ufb01cantly with the nature of the probes used for data collection [4].", "They have become an important instrument for large-scale analyses in sociology, demography, epidemiology, and computer science: recent surveys are available in [3, 4]."]} +{"7668248|2509135": ["These solutions range from cognitive radio [4] to femtocell and WiFi offloading [5], from cooperative relaying [6] to re-thinking the access network architecture entirely [7]."]} +{"7668248|191396": ["We selected the Unweighted Pair Group Method with Arithmetic Mean (UPGMA) algorithm [21] \u2013 also known as mean or average linkage clustering \u2013 as the hierarchical clustering method.", "To that end, we assign each unclassified snapshot to a category, via the k-means algorithm [21]."]} +{"13485415|13372227": ["There has been a large body of work in localizing mobile phones without GPS support, mainly driven by location based services [12], including the E911 service [13]."]} +{"13485415|164835": ["Clearly popular localization techniques such as TOA, AOA [6], [9], or signal-strength fingerprinting [10] are not applicable because they require two or more distinct base stations.", "Most localization techniques rely on time-of-arrival (TOA) or angle-of-arrival (AOA) measurement from nearby base stations [6], [9]."]} +{"5117502|7686677": ["A lot of effort has been made to cut energy consumption in every aspect of the RAN, for example, efficient power amplifiers, remote radio head, natural cooling, cell breathing, use of renewable sources [5]."]} +{"29380901|3102110": []} +{"7875693|15683881": ["SVMs have been extensively and successfully used in similar classification problems [13, 14]."]} +{"10265411|26429034": ["We refer the interested reader to the recent surveys in [8,9] for a thorough discussion of these and more topics."]} diff --git a/edge/graph_26433586.jsonl b/edge/graph_26433586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2644350.jsonl b/edge/graph_2644350.jsonl similarity index 100% rename from graph_2644350.jsonl rename to edge/graph_2644350.jsonl diff --git a/edge/graph_26452417.jsonl b/edge/graph_26452417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4099cb971bfd2c03369ed708a6884b173c284e0f --- /dev/null +++ b/edge/graph_26452417.jsonl @@ -0,0 +1 @@ +{"41944000|30815820": ["Examples of social computing platforms include popular names such as Wikipedia, YouTube, and MySpace; more esoteric systems names such as Bit-Torrent and Slashdot; as well as generic concepts such as blogs (Parameswaran & Whinston 2007b).", "Social computing is an overarching designation for many of the distributed, web-based technologies that have gained momentum in recent years (Parameswaran & Whinston, 2007a, 2007b; Barton, 2005).", "\u2026content that enables the virtually boundless surveillance (if not personal association) associated with Wikipedia contrasts sharply with the complete lack of traceability associated with the many-to-many distribution paradigm of BitTor-rent\u2019s \ufb01le sharing structure (Parameswaran & Whinston 2007b).", "We leverage the case of Wikipedia\u2014a popular \u201cfree content\u201d online encyclopedia ( www.wikipedia.com ) and a prime example of a new stream of social computing applications (Parameswaran & Whinston, 2007a)\u2014to illustrate the potential of information systems for supporting rational discourse."]} diff --git a/edge/graph_26459167.jsonl b/edge/graph_26459167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2645929.jsonl b/edge/graph_2645929.jsonl similarity index 100% rename from graph_2645929.jsonl rename to edge/graph_2645929.jsonl diff --git a/graph_264691.jsonl b/edge/graph_264691.jsonl similarity index 100% rename from graph_264691.jsonl rename to edge/graph_264691.jsonl diff --git a/graph_2648730.jsonl b/edge/graph_2648730.jsonl similarity index 100% rename from graph_2648730.jsonl rename to edge/graph_2648730.jsonl diff --git a/edge/graph_26490015.jsonl b/edge/graph_26490015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ecd0494da05f92d90132371a57cf8cc379535de --- /dev/null +++ b/edge/graph_26490015.jsonl @@ -0,0 +1,2 @@ +{"18211609|16049649": []} +{"29047923|12454277": ["For example, in random forests various parameters can be controlled by the user, such as the number of candidate predictors considered at each split (often denoted as \u201cmtry\u201d), the minimal size of terminal leaves, the maximal depth of the trees, and so on (Boulesteix et al., 2012)."]} diff --git a/edge/graph_26494868.jsonl b/edge/graph_26494868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2650198.jsonl b/edge/graph_2650198.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26506009.jsonl b/edge/graph_26506009.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94265c753a41a4ca48a07f4f247de031010ad90b --- /dev/null +++ b/edge/graph_26506009.jsonl @@ -0,0 +1,2 @@ +{"2875479|386036": ["E NTITY resolution (ER) [1], [2] (also known as record linkage or deduplication) is the process of identifying records that represent the same real-world entity.", "Entity resolution has been studied under various names including record linkage, merge/purge, deduplication, reference reconciliation, object identification, and others (see [1], [10] for recent surveys)."]} +{"15659119|386036": ["(Standard) Blocking algorithms use some blocking key to partition a set of records into disjoint partitions (blocks) [4], [8].", "Duplicate detection, also known as entity matching or record linkage, is the problem of identifying pairs of records that represent the same real-world entity [8], [13]."]} diff --git a/edge/graph_26526868.jsonl b/edge/graph_26526868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..02e2924b9bc85fa561827a940d0297cc52e0a923 --- /dev/null +++ b/edge/graph_26526868.jsonl @@ -0,0 +1,8 @@ +{"38725090|10553058": []} +{"6413|12452682": []} +{"45084217|44461432": []} +{"45084217|3055684": []} +{"45084217|7851743": []} +{"45084217|2509135": []} +{"45084217|5621151": []} +{"45084217|121289": []} diff --git a/edge/graph_2652752.jsonl b/edge/graph_2652752.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26528956.jsonl b/edge/graph_26528956.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..142a8803a8ff365115f811f3787e55e94cd00830 --- /dev/null +++ b/edge/graph_26528956.jsonl @@ -0,0 +1 @@ +{"5921320|18252922": []} diff --git a/edge/graph_26542291.jsonl b/edge/graph_26542291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26551051.jsonl b/edge/graph_26551051.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cada81a9fb77c857327d96c3b28f4ca824c8e50e --- /dev/null +++ b/edge/graph_26551051.jsonl @@ -0,0 +1 @@ +{"6540000|15744805": ["A survey of some of the earliest evaluation metrics can be found in [29], where, in general, supervised evaluations utilized one reference image for evaluation, while their unsupervised counterparts utilized requirements, utilities, complexity, etc."]} diff --git a/edge/graph_2656838.jsonl b/edge/graph_2656838.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9707bd9372c5e5f47d7ac211680a5477ef8aa881 --- /dev/null +++ b/edge/graph_2656838.jsonl @@ -0,0 +1 @@ +{"16520917|3102110": []} diff --git a/edge/graph_26583724.jsonl b/edge/graph_26583724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc52d0e0d620b40c7bc308c5e2fca134f127afca --- /dev/null +++ b/edge/graph_26583724.jsonl @@ -0,0 +1,8 @@ +{"2722298|15453366": []} +{"17482174|16514036": ["A specific class of WSN is Body Sensor Networks (BSN) [9, 34, 37] that represents an emerging platform for many human-centred applications, spanning from medical to sports performance monitoring, gaming, and social networking."]} +{"16335158|17336376": ["Storage issues can be tackledwith the introduction of predictive storage concept proposed by the authors in [70].", "To handle these issues, the authors in [70] have proposed PRESTO architecture that enables users/clients to view the data in a single logical view which is distributed across several sensor proxies and remote sensors."]} +{"21304623|12452682": []} +{"59851580|12452682": []} +{"5851613|8974063": ["2013 [34] Vertical Licensed CR secondary networks CR technology: spectrum characterization/selection and CR"]} +{"5851613|2509135": ["2011 [25] Vertical Licensed CR secondary networks CR technology: spectrum sensing and dynamic spectrum allocation"]} +{"5851613|12452682": ["In particular, the Nash bargaining solution is widely used in solving cooperative games, which is a unique Pareto optimal solution games modeling bargaining interactions [99] ."]} diff --git a/graph_2660687.jsonl b/edge/graph_2660687.jsonl similarity index 100% rename from graph_2660687.jsonl rename to edge/graph_2660687.jsonl diff --git a/graph_2662250.jsonl b/edge/graph_2662250.jsonl similarity index 100% rename from graph_2662250.jsonl rename to edge/graph_2662250.jsonl diff --git a/graph_2663804.jsonl b/edge/graph_2663804.jsonl similarity index 100% rename from graph_2663804.jsonl rename to edge/graph_2663804.jsonl diff --git a/graph_2664140.jsonl b/edge/graph_2664140.jsonl similarity index 100% rename from graph_2664140.jsonl rename to edge/graph_2664140.jsonl diff --git a/edge/graph_266462.jsonl b/edge/graph_266462.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26667032.jsonl b/edge/graph_26667032.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8cc0554b8355f08edf19ceeef3dfa6091134eae --- /dev/null +++ b/edge/graph_26667032.jsonl @@ -0,0 +1,26 @@ +{"11630407|8909218": []} +{"900661|8909218": ["Considering the indoor scenario for FBS where the channel strength of hMF and hFM are much lower than that of hFF due to penetration losses [3], we set \u03c3(2) h,FF = 1, and \u03c3 2 h,MF = \u03c3 2 h,FM = 0.", "121111 may significantly degrade users\u2019 QoS at the femtocell and macrocell [3]."]} +{"55069954|8909218": ["FAPs (Femtocell access points) or home-base stations [2] have been proposed in such a scenario to enhance the coverage and data rate.", "It has been shown from previous studies that a two-tier underlay with 50 femtocells per cell-site network can obtain a nearly 25 times improvement in overall spatial reuse compared to a macrocell-only network [2]."]} +{"30535123|8909218": ["The maximum allowable number of subchannels for each user is qi,k = [1, 2, 2].", "However, as femtocells are deployed extensively, the serious two-tier interference problem occurs [1]\u2013 [3]."]} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"27098200|8909218": ["Femtocells are low-power, shortrange data access points that can provide improved indoor coverage and increased throughput to home users while offloading traffic from expensive macro radio access networks on to the low-cost public internet [2]."]} +{"60135|8909218": ["A femtocell serves as a small range end-consumer installed data access point situated around high user density hotspots serving stationary or low-mobility users [3]."]} +{"12545755|8909218": ["A drawback of OA is the network overhead [1], [5] and the need for sufficient backhaul capacity to avoid starving the paying home user.", "A microcell underlay allows the operator to handoff and load balance users between each tier [1].", "An alternative with lower upfront costs is to improve indoor coverage and capacity using the concept of end-consumer installed femtocells or home base stations [1]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"11618148|8909218": ["A simple and effective method of circumvent this problem is to make the transmitter and receiver of a wireless system closer so that the capacity of a wireless link can be increased as well as dual benefits of higher quality links and more spatial reuse are acquired [1]."]} +{"260331|2835258": []} +{"260331|41035405": []} +{"19008847|7851743": ["[9] [10].", "The reader is referred to [9] for further details on operation timescales of SON.", "While these projections promise that capacity targets of 5G are theoretically achievable, it is alarming to note that the complexity of operation, OPEX, CAPEX, and shrinking profit margins are already major challenges for operators of state-of-the-art cellular networks [9].", "A detailed review of the state-of-the-art SON functions for legacy cellular networks can be found in [9]."]} +{"7902298|11720829": ["The combination of STBCs with MIMO-OFDM was, for example, considered in [19],"]} +{"7902298|18148591": []} +{"32451657|8909218": ["A femtocell base station (BS) is a BS with low transmit power, typically installed by a subscriber in home or SOHO (small office/home office) to provide access to a closed or open group of users as configured by the subscriber and/or the access provider [1][2]."]} +{"4501868|14028362": ["This is achieved by having the endusers setup indoor femtocellular access points using an approach similar to establishing a WLAN access point [11], for example, WiFi hotspot, where the wireless access point is connected to a wired communications infrastructure commonly available in dense urban population centers, for example, DSL, fiber-to-the-home, cable."]} +{"4501868|8909218": ["\u2026Wichman,1 Zhong Zheng,1 and Alexander M. Wyglinski2\n1 Department of Communications and Networking, Helsinki University of Technology, P.O. Box 3000, 02015 TKK, Espoo, Finland 2 Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA 01609-2280,\u2026"]} +{"37974380|8909218": ["transmit and/or receive beamforming, interference cancellation decoding) [2], [3]."]} +{"16353256|8909218": ["Depending on the access control mechanism employed by the femtocells, the effect of cross-tier interference will differ significantly [3], [4]."]} +{"13970861|8909218": ["Keywords: Femtocell, Transmit Beamforming, Egoistic, Altruistic."]} +{"3103263|18148591": []} +{"7964225|8909218": ["Studies indicate that a significant proportion of data traffic originates indoors [3].", "HeNBs aim at extending broadband coverage to authorized UEs located indoors where it is most needed [3]."]} diff --git a/edge/graph_26675425.jsonl b/edge/graph_26675425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..049fd2485a9cfa50ea0fbf6a8d7e391e6f635f2e --- /dev/null +++ b/edge/graph_26675425.jsonl @@ -0,0 +1 @@ +{"205284768|8835588": ["We do not intend to perform a complete review of what is context in this paper, interested reader might refer to Brezillon\u2019s work [20], but we report on definitions, elaborated by people working on context-awareness computing to produce the required framework that could be used for the review of the existing researches on this topic."]} diff --git a/edge/graph_26683758.jsonl b/edge/graph_26683758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30db16a4f7dc47ada0ab99c739ca5dae1154dc7f --- /dev/null +++ b/edge/graph_26683758.jsonl @@ -0,0 +1,4 @@ +{"12140707|7360895": ["In particular, we are inspired by prior work on human-robot interaction that highlights their potential for companionship [6, 12] and recent developments in our understanding of designing technologies to support exertion activities [31, 38].", "This aligns with prior work on social robots that highlights that people can experience a social connectedness with them [6, 12], here we extend this work by highlighting that perceived control matters in contributing to a social exertion experience."]} +{"6293973|23041951": ["The security of wireless communication has been well researched, but the security of unconventional and more exotic interaction methods should be explored and presents a compelling security challenge [14]."]} +{"6293973|14122909": ["On the other hand, recognising objects or patterns can be achieved using various sensors, including infra-red [38], LiDAR [39], ultra-sound [40] or optical camera sensor [41]."]} +{"6293973|12127129": ["Algorithmically, a foreground detector system compares the current video framewith either a predefined backgroundmodel or adaptively learned background model [46]."]} diff --git a/edge/graph_26688999.jsonl b/edge/graph_26688999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da412ad880dde3ff5ef5f10a1e0862aa6773a8ef --- /dev/null +++ b/edge/graph_26688999.jsonl @@ -0,0 +1,7 @@ +{"35342164|7045726": ["Heiser [6], but buffer overflows can be checked by standard safety verification techniques [3, 8]."]} +{"11598143|14221868": ["Two of them are primary studies on risk-based testing [32,7] presenting novel risk-based testing approaches, and two are secondary studies on risk-based testing [16,10] empirically evaluating existing risk-based testing approaches.", "The article \u201cApproaches for the combined use of risk analysis and testing: a systematic literature review\u201d by Erdogan et al. [10] provides a systematic literature review on risk-based testing approaches, which use risk analysis to support testing, as well as test-based risk analysis approaches,\u2026", "The two other articles [16,10] comprise secondary studies on risk-based testing.", "Afterwards, it has been applied to the work on risk-based testing [32, 7,16,10] presented in this special section of the International Journal on Software Tools for Technology Transfer (STTT, see Section 4)."]} +{"11511556|16186842": ["Remarkable results have been achieved in the field of regression testing of functional requirements [4,8\u201313].", "Fahad and Nadeem [10] provided a survey of regression test selection techniques based on UML models.", "Most work on regression testing has been done on the code level [10] for arbitrary programming languages like C [24], C++ [25], C# [26], or Java [27].", "It has been reported that most classical regression (functional) testing approaches are code-based [10]."]} +{"11511556|627405": ["These libraries were chosen because they cover the most relevant sources in software and security engineering [51].", "3), which all take respective guidelines and best practices [51,52] into account."]} +{"14161008|17292349": ["Georgiev et al. focus primarily on the incorrect validation\nof hostnames in server certificates at a different level in the software stack\u2014in applications, transport libraries, and Webservices middleware.", "The focus of this paper is on server certificate authentication, which is the most common usage pattern for SSL certificates."]} +{"15364134|9236463": []} +{"1027795|880321": ["The reader is referred to [9] for more details."]} diff --git a/edge/graph_26690303.jsonl b/edge/graph_26690303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..143cf04e8f459447acc1af46822f0d718eed7a49 --- /dev/null +++ b/edge/graph_26690303.jsonl @@ -0,0 +1,11 @@ +{"108393727|12815020": []} +{"108393727|13785718": []} +{"33147685|8364569": ["Since the scans' threat is similar to worms' victim finding phase [1], some IP flow-based methods that are dedicated to defend against scan threats can be extended to worms detection [5,6,7].", "Generally, the NID systems inspect the payloads of every network packet to find known or unknown attacks [1], [2]."]} +{"207172599|3330313": []} +{"116649162|6430931": ["Several machinelearning techniques including neural networks, fuzzy logic [11], support vector machines (SVM) [9, 11] have been studied for the design of IDS."]} +{"36176167|6430931": ["For explicit review of current development, refer to the recent review (Tsai, Hsu, Lin, & Lin, 2009; Wu & Banzhaf, 2010)."]} +{"14376593|6430931": ["Other commonly used combinations include precision and recall, or sensitivity and specificity[ 23 ]."]} +{"9446238|12894036": ["The choice of representation can have a significant impact on learning algorithms [6]."]} +{"25540268|8364569": ["[16] survey current flow-based ID techniques."]} +{"17426217|192934": []} +{"7510040|191396": ["Contributing areas of research include statistics, machine learning, data mining, pattern recognition, and image processing [25] [26] [27] [28]."]} diff --git a/edge/graph_2669135.jsonl b/edge/graph_2669135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2669421.jsonl b/edge/graph_2669421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2670121.jsonl b/edge/graph_2670121.jsonl similarity index 100% rename from graph_2670121.jsonl rename to edge/graph_2670121.jsonl diff --git a/edge/graph_2670373.jsonl b/edge/graph_2670373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26717263.jsonl b/edge/graph_26717263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d6fab946b7c351232c102645bc3030a8f8f68e9 --- /dev/null +++ b/edge/graph_26717263.jsonl @@ -0,0 +1,8 @@ +{"2332366|18740719": ["Research challenges faced by SCADA systems in risk assessment are outlined in [37] and [38]."]} +{"2332366|86629084": []} +{"29044845|207424188": []} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"17980328|18567112": ["The BaseBridge [18] and Anserverbot [18] malware families employ this technique, and some malware families download the embed malicious payload from the remote server and successfully evade detection; the DroidKungFuUpdate [18] is a notable example[14].", "For instance, Geinimi conceals URLs by encrypting them with DES; RootSmart and Fjcon use AES to hide URLs and domain names [6].", "The Repackage technique replaces the original APP with a malware APP by disassembling/decompiling the original APP and attaching additional malicious code in it [14].", "Malicious applications between 2004-2007 are mostly designed for Symbian OS, and few of them are designed for iPhone and Android OS[6]."]} diff --git a/graph_2672495.jsonl b/edge/graph_2672495.jsonl similarity index 100% rename from graph_2672495.jsonl rename to edge/graph_2672495.jsonl diff --git a/graph_2672783.jsonl b/edge/graph_2672783.jsonl similarity index 100% rename from graph_2672783.jsonl rename to edge/graph_2672783.jsonl diff --git a/edge/graph_26728811.jsonl b/edge/graph_26728811.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2673440.jsonl b/edge/graph_2673440.jsonl similarity index 100% rename from graph_2673440.jsonl rename to edge/graph_2673440.jsonl diff --git a/edge/graph_26783342.jsonl b/edge/graph_26783342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26793080.jsonl b/edge/graph_26793080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4df48d209f84faa7581952c62148130d864dca2d --- /dev/null +++ b/edge/graph_26793080.jsonl @@ -0,0 +1 @@ +{"13738800|1230643": ["itoring of remote or hostile geographical regions, tracking of animals and objects, and monitoring in smart building and industries [1,2]."]} diff --git a/edge/graph_26802553.jsonl b/edge/graph_26802553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74764d52e7a59586316108c4e0be26c24137a5cc --- /dev/null +++ b/edge/graph_26802553.jsonl @@ -0,0 +1,4 @@ +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} diff --git a/graph_2680573.jsonl b/edge/graph_2680573.jsonl similarity index 100% rename from graph_2680573.jsonl rename to edge/graph_2680573.jsonl diff --git a/graph_2680824.jsonl b/edge/graph_2680824.jsonl similarity index 100% rename from graph_2680824.jsonl rename to edge/graph_2680824.jsonl diff --git a/graph_2683208.jsonl b/edge/graph_2683208.jsonl similarity index 100% rename from graph_2683208.jsonl rename to edge/graph_2683208.jsonl diff --git a/edge/graph_26842564.jsonl b/edge/graph_26842564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2685137.jsonl b/edge/graph_2685137.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26874889.jsonl b/edge/graph_26874889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca7752e521827fe2b8f529d7a5ff08d9fc367f4c --- /dev/null +++ b/edge/graph_26874889.jsonl @@ -0,0 +1,2 @@ +{"7604132|6415369": ["\u2026related to key performance characteristics [4] [5], design structure matrix focusing on the decomposition and integration of design problems [6] [7], product architecture dealing with product platform and variety [8], decision making for modeling multiple trade-offs [5] [9] [10], and\u2026"]} +{"46908017|12815020": []} diff --git a/edge/graph_26934181.jsonl b/edge/graph_26934181.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_26941769.jsonl b/edge/graph_26941769.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2c92901e39cdd2320a1fbac7871a060aa326ec0 --- /dev/null +++ b/edge/graph_26941769.jsonl @@ -0,0 +1,3 @@ +{"59470821|14170176": []} +{"59470821|2473564": []} +{"9978744|26257441": ["A good pair of review papers in the practical use of emulation for engineering problems are given in [30,31]."]} diff --git a/edge/graph_26966489.jsonl b/edge/graph_26966489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ab9fe943264d37f284912bffb6a9355ef07213c --- /dev/null +++ b/edge/graph_26966489.jsonl @@ -0,0 +1,13 @@ +{"32683569|205286988": ["The design should take into consideration the power limitation and incorporate some techniques to maximize the network\u2019s lifetime [2, 3]."]} +{"32683569|1230643": ["In recent years, wireless sensor networks (WSNs) have seen rapid development in many applications, such as in environmental monitoring, target tracking, outer space exploring, and industrial automation [1]."]} +{"29532810|1230643": ["While modern research on sensor networks started on the late seventies [6], this paradigm acquired an identity of its own at the beginning of the twenty-first century [21]."]} +{"206256786|2294541": ["The diverse attacks (Hoffman et al., 2009; Lopez et al., 2009; Karlof and Wagner, 2003; Xiao and Yu, 2006; Xiao et al., 2007a) that target sensor networks will be concluded as the Table 1.", "Furthermore, Hoffman et al. (2009) surveyed the defense mechanisms employed by existing reputation systems and suggests five defense strategies against attackers for reputation systems in common networks.", "A few existing surveys on trust and security issues can be found (Fern\u00e1ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|1940388": ["The security mechanisms for sensor networks have been raised by many researchers (Chen et al., 2009b; Lopez et al., 2009; Law and Havinga, 2005; Kyriazanos et al., 2008).", "A few existing surveys on trust and security issues can be found (Ferna\u0301ndezGago et al., 2007; Chapin et al., 2008; Chen et al., 2009b; Sun et al., 2006; Peng et al., 2007; Hoffman et al., 2009)."]} +{"206256786|9240891": ["This problem is subsequently discussed in various literature, providing diverse trust classification (Grandison and Sloman, 2000) and evaluation models in various domains, such as E-commerce, P2P, ad hoc networks etc."]} +{"207231270|5860048": []} +{"207231270|1756215": ["Also, Shen et al. [2011] survey defensive strategies against attacks to the network layer."]} +{"207231270|9554464": ["Several surveys discuss trust management for security in WSNs (e.g., Lopez et al. [2010], \u00a8Ozdemir and Xiao [2009], and Sang et al. [2006])."]} +{"44252715|1940388": ["Based on related works [6,12,14,30,32], reputation of a sensor node is the neighbor nodes\u2019 perception of its past behaviors.", "In order to save energy and improve security, many WSNs are organized into clusters [12]."]} +{"6950376|17205659": ["The security issue has been raised by many researchers [14-24], and, due to the deployment of WSN nodes in hazardous and/or hostile areas in large numbers, such deployment forces the nodes to be of low cost and therefore less reliable or more prone to overtaking by an adversary force."]} +{"6950376|1230643": ["Originally motivated by surveillance in battlefields for the military, interest in WSNs spread over a wide range of applications, from scientific exploration and monitoring, for example, the deployment of a WSN on an active volcano [6, 7], to monitoring the microclimate throughout the volume of redwood trees [8], to building and bridge monitoring [9, 10], to health-care monitoring [11] and a number of other applications such as [3, 4, 12, 13] such as:", "Due to impressive technological innovations in electronics and communications, small low-cost sensor nodes are available, which can collect and relay environmental data [4, 5]."]} +{"1837434|1236072": ["A large body of research on communication issues in mobile sensor networks has been carried out [Wang et al. 2007; Al-Karaki and Kamal 2004].", "\u2026and Reijers 2003]; time synchronization protocols [Elson and Roemer 2003; Sundararaman et al. 2005]; distributed storage services [Ratnasamy et al. 2002; Luo et al. 2007]; code deployment and reprogramming functionality [Wang et al. 2006]; and routing protocols [Al-Karaki and Kamal 2004].", "2006], and routing protocols [Al-Karaki and Kamal 2004]."]} diff --git a/edge/graph_26971321.jsonl b/edge/graph_26971321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..858dddfd5ffe6dde2bf87af3e737104777494095 --- /dev/null +++ b/edge/graph_26971321.jsonl @@ -0,0 +1,32 @@ +{"14188738|8909218": []} +{"4119678|2623404": ["It has been recognized that the SDN concept originally proposed for wired networks and data centers can be leveraged to engineer the 5G software defined wireless networks [142\u2013146]."]} +{"4119678|8909218": ["Ultra-dense wireless networks with multi-tier cells including dense small cells supporting multiple frequency bands (microwave and mmWave frequency), multiple radio access technologies (multi-RATs) for enhanced network capacity and energy efficiency through short-range communications, and dynamic load balancing play an important role in future 5G networks [3\u20135, 12\u201315]."]} +{"206576720|7686677": ["Meanwhile, with excessive power consumption in wireless communications networks, both carbon emissions and operator expenditure increase year by year [2], [3]."]} +{"1885588|1588237": ["Conventionally, most of the performance analyses of ICIC are based on network-level simulation, and the hexagonal-grid model is frequently used [7]."]} +{"13068662|8909218": ["Remark 3 (Femtocells): We can apply the approach for non-circular regions to model the aggregate interference generated by femtocell base stations (FBSs) in the macrocell networks [62]."]} +{"2505166|15453366": ["IEEE Communications Magazine \u2022 September 201470 0163-6804/14/$25.00 \u00a9 2014 IEEE\nThe authors are with the University of Texas at Austin."]} +{"14591698|8909218": ["\u2026may be valid for certain wireless networks (e.g., wireless sensor and ad hoc networks ), it may be common for interfering users to cluster in space due to geographical factors (e.g., gathering places or femtocell networks [12] and [13]), or medium access control (MAC) layer protocols [6], [14]."]} +{"26257316|8909218": []} +{"9685812|8909218": ["For example, in conventional Rayleigh fading H is \u0393[1, 1] while Rayleigh fading with Nr receive antennas and maximum ratio combining H is \u0393[Nr, 1].", "Cellular network deployment is taking on a massively heterogeneous character as a variety of infrastructure is being deployed including macro, pico, and femto base stations [1], as well as fixed relay stations [2] and distributed antennas [3].", "X = |Z|(2) is \u0393[1, 1], which corresponds to Rayleigh channel assumption.", "For example, with single antenna transmission and conventional Rayleigh fading Gk is \u0393[1, 1] for any Nr at the receiver, while with multiuser MIMO zero-forcing beamforming with multiple transmit antennas serving U \u2264 Nt users Gk is \u0393[U, 1]."]} +{"60135|8909218": ["A femtocell serves as a small range end-consumer installed data access point situated around high user density hotspots serving stationary or low-mobility users [3]."]} +{"2881447|8909218": ["High power macro-cell BSs are already being joined by operator managed pico-cells [2], [3], compact form-factor distributed antennas [4]\u2013[6], and low-power userinstalled femtocells [7], [8]."]} +{"18851741|8909218": ["Femtocells \u2013 low power, 3rd party miniature base stations \u2013 are rapidly being added to cellular networks in an adhoc fashion, to enhance their capacity and coverage [6]."]} +{"3207155|8909218": ["For example, in conventional Rayleigh fading H is \u0393[1, 1] while Rayleigh fading with Nr receive antennas and maximum ratio combining H is \u0393[Nr, 1].", "Cellular network deployment is taking on a massively heterogeneous character as a variety of infrastructure is being deployed including macro, pico, and femto base stations [1], as well as fixed relay stations [2] and distributed antennas [3].", "X = |Z|(2) is \u0393[1, 1], which corresponds to Rayleigh channel assumption.", "For example, with single antenna transmission and conventional Rayleigh fading Gk is \u0393[1, 1] for any Nr at the receiver, while with multiuser MIMO zero-forcing beamforming with multiple transmit antennas serving U \u2264 Nt users Gk is \u0393[U, 1]."]} +{"1999116|8280144": []} +{"10437714|8280144": ["Furthermore, in [92], the authors showed\n9Alpha-stable distributions generalize Gaussian distributions and have heavier tails [10, Sec."]} +{"41672150|8909218": ["Moreover, FBSs, which are mainly deployed indoor, provide capacity offload to outdoor users or macrocell user equipments (MUEs), and some studies foresee that in future communication scenarios, almost 50% of voice and 70% of data traffic are likely to be generated indoors [2]."]} +{"8411142|8280144": ["Note that this assumption, which does not consider the total aggregate power sensed on a channel, will lead to a tight lower bound on the probability that the channel is busy [16]."]} +{"18731125|15453366": []} +{"1078185|8909218": []} +{"206986053|303976": ["For instance, authors in [14] addressed the M2M e-healthcare application, i.e., m-Health, by highlighting the benefits of using M2M technology for both patients and service providers due to reliable autonomous communication.", "Several review papers [14\u201322] discussed M2M communications in the context of wireless technologies by focusing on various M2M applications such as e-healthcare, smart metering, smart grids, IoT paradigm, and radio resource management.", "Furthermore, in [14], a first detailed analysis of wireless body area networks (WBANs) towards the patient side is provided, and various end-to-end (E2E) solutions for practical e-healthcare applications were discussed."]} +{"206986053|2535224": ["In [23], authors discussed applicability of software-defined networks and network virtualization to mobile and wireless networks."]} +{"206986053|8909218": ["In order to support increasing mobile traffic, several enhancements in existing LTE systems [10] such as femtocells [11] and relay nodes (RNs) [12] were introduced to fulfill the International Mobile Telecommunications-Advanced (IMTAdvanced) demands of maximum throughput of up to 1Gbps in downlink and 500Mbps in uplink [13]."]} +{"9438985|8280144": [", [1] - [9] and the many references therein) assume the ad hoc network has an infinite number of mobiles spread over an infinite area and use the methods of stochastic geometry [10].", "This trade-off can be quantified by the transmission capacity, which represents the network throughput per unit area [1]."]} +{"15686984|8909218": []} +{"206985987|5621151": ["Most of these home devices are communicating based on various wireless networking technologies such as WiFi, ZigBee, and Bluetooth which typically operated in the already congested ISM licensed-free frequency band [1]."]} +{"16712297|8909218": ["Unlike cellular systems with fixed relays [12], [13], DAS does not incur an over-the-air penalty for transmissions to and from the RRU."]} +{"16362569|8909218": ["Uncoordinated locations and transmission powers of interfering base stations (BSs) are considered in the model to take into account the deployment of femtocells (or home BSs) [11] in an indoor environment."]} +{"31407073|8909218": []} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"19370323|7851743": ["10 Xitucheng Road, Haidian District, Beijing, 100876, China Full list of author information is available at the end of the article heterogeneous networks are also expected to operate in self-organizing manner to reduce operational expenditures (OPEX) due to the deployment of large numbers of BSs [8]."]} +{"19370323|7686677": ["As a result, green wireless communication has attracted the attention of both researchers and network operators, and energy efficiency has become one of the key network management parameters [2,7]."]} diff --git a/edge/graph_26973045.jsonl b/edge/graph_26973045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..113a3c8a9aa583146020dda42dd76e1c65d1ea5d --- /dev/null +++ b/edge/graph_26973045.jsonl @@ -0,0 +1,4 @@ +{"2261995|534755": []} +{"117089352|7023859": []} +{"32674823|15294930": ["Before going further, we borrow from [1] the following description of discrete dynamical model (briefly DDM): \u201cAt each (discrete) time step, such a model is in some state, which we call a configuration.", "The excellent survey [1] describes several subsets of integer partitions which have a lattice structure in terms of discrete dynamical models."]} +{"72192372|15294930": ["An excellent survey on these topics is [21].", "For the terminology concerning the discrete dynamical system we refer to [21]."]} diff --git a/edge/graph_26983554.jsonl b/edge/graph_26983554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7eb3c1d26fc11cd8fe74267f9a4552b024d2d38 --- /dev/null +++ b/edge/graph_26983554.jsonl @@ -0,0 +1,9 @@ +{"1196091|206778272": ["Refactoring is the process of changing a program\u2019s design structure without modifying its external functional behavior in order to improve program readability, maintainability, and extensibility [19]."]} +{"53233|206778272": []} +{"2271599|206778272": ["While the related topic of refactoring has been the subject of a significant number of research and other studies [2\u20139], the empirical and theoretical study of code smells seems to have been largely overlooked by the research community."]} +{"3227111|206778272": ["In this paper, we address the following research questions: (1) What is the definition of refactoring from developers\u2019 perspectives? By refactoring, do developers indeedmean behavior-preserving code transformations that modify a program structure [1], [10]? (2) What is the developers\u2019 perception about refactoring benefits and risks, and inwhich contexts do developers refactor code? (3) Are there visible refactoring", "literature [10], the de-facto definition of refactoring in practice seems to be very different from such rigorous definition."]} +{"7913742|206778272": ["Its aim is to decrease the complexity of a system at design and source code level, allowing it to evolve further in a low-cost manner by ensuring the developers\u2019 productivity and leaving less room for design errors[29]."]} +{"37926482|206778272": []} +{"7701585|206778480": ["Our previous study [Hall et al. 2010] comparing three approaches to fault data collection suggests that the precision and recall of the Zimmermann et al. [2007] approach to identifying software faults from open-source projects is not as competitive as a manual approach.", "In \nour review of 208 previous fault prediction studies [Hall et al. 2012], we found that several other research \ngroups have used negative binomial regression in their studies of software faults (e.g., [Ostrand et \nal.", "In our review of 208 previous fault prediction studies [Hall et al. 2012], we found that several other research groups have used negative binomial regression in their studies of software faults (e."]} +{"7701585|206778272": []} +{"7617039|206778272": []} diff --git a/edge/graph_26986012.jsonl b/edge/graph_26986012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2700101.jsonl b/edge/graph_2700101.jsonl similarity index 100% rename from graph_2700101.jsonl rename to edge/graph_2700101.jsonl diff --git a/graph_2701087.jsonl b/edge/graph_2701087.jsonl similarity index 100% rename from graph_2701087.jsonl rename to edge/graph_2701087.jsonl diff --git a/graph_2701596.jsonl b/edge/graph_2701596.jsonl similarity index 100% rename from graph_2701596.jsonl rename to edge/graph_2701596.jsonl diff --git a/edge/graph_27031478.jsonl b/edge/graph_27031478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11d76ef791a658e8ea0b3f720a756ac3ff178b47 --- /dev/null +++ b/edge/graph_27031478.jsonl @@ -0,0 +1,19 @@ +{"27447604|13932708": ["A rather extensive and recent review on inventory sharing and lateral transshipments is by Paterson et al. (2011)."]} +{"39443796|14269689": []} +{"123570228|34621298": ["We refer the interested readers to \u00d6zekici [13], Cho and Parlar [4], Dekker, Wildeman and Van der Duyn Schouten [7], Wang [16], and Nicolai and Dekker [12] for related literature on optimal maintenance.", "We refer the interested readers to O\u0308zekici [13], Cho and Parlar [4], Dekker, Wildeman and Van der Duyn Schouten [7], Wang [16], and Nicolai and Dekker [12] for related literature on optimal maintenance."]} +{"53141267|33286487": []} +{"17873150|13932708": []} +{"14764053|34621298": ["Compared with the review of Dekker et al. (1996) we refine the concept of (positive) economic dependence and distinguish the following forms:", "Nearly all articles reviewed by Dekker et al. (1996) fall into this category.", "Following the review of Dekker et al. (1996) we distinguish between models with finite and infinite planning horizons.", "Dekker et al. (1996) deal exclusively 264 R. Nicolai and R. Dekker", "This problem is an extension of the standard-indirect grouping problem (for an overview of this problem see Dekker et al. 1996 ).", "That is, we refine the definition of economic dependence as compared to the definition used in the review article of Dekker et al. (1996) .", "We focus on articles appearing since the review of Dekker et al. (1996) .", "In comparison with Dekker et al. (1996) the category \u2018general economies of scale\u2019 is new.", "In the first policy, also known as the standard indirect-grouping strategy (introduced in maintenance by Goyal and Kusy 1985; for a review of this strategy we refer to Dekker et al. 1996 ), corrective and preventive replacements are strictly separated.", "The classification scheme of Dekker et al. (1996) differs from that of Cho and Parlar (1991)."]} +{"120174149|34621298": []} +{"13083405|34621298": ["Cho and Parlar (1991) [14] and Dekker et al (1997) [15] deal with the maintenance of multi-component systems."]} +{"17977694|18841702": ["Gorjian et al. (2009b) presented a review of the existing literature on commonly used degradation models in reliability analysis.", "Gorjian et al. (2009a) presented a state-of-the-art review of the existing literature on covariate-based models in reliability modeling .", "(2006), Heng et al. (2009), Pecht (2008), Gorjian et al."]} +{"55247293|14228694": ["For a comprehensive survey on Stochastic ELSP we refer to Winands et al. (2011)."]} +{"62536191|34621298": []} +{"22074680|34621298": []} +{"55608127|13932708": ["Research on systems with lateral transshipments (proactive and reactive) started already in the late 1950s, with a first paper by Allen [71]; see [66].", "We refer to [66] for an overview of the literature on both reactive and proactive lateral transshipments."]} +{"109659461|14269689": []} +{"16784629|13932708": []} +{"29561938|207584909": []} +{"23253067|14038195": []} +{"5806352|13932708": []} +{"5806352|7308363": []} diff --git a/edge/graph_27031674.jsonl b/edge/graph_27031674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8a3b4d4e708b7adba4770d36ebea0db886f0429 --- /dev/null +++ b/edge/graph_27031674.jsonl @@ -0,0 +1,3 @@ +{"59850647|18050848": ["\u2026person identification and verification (Jourlin et al., 1997; Wark and Sridharan, 1998; Fr\u00f6ba et al., 1999; Jain et al., 1999; Maison et al., 1999; Chibelushi et al., 2002; Zhang et al., 2002), speaker localization (Bub et al., 1995; Wang and Brandstein, 1999; Zotkin et al., 2002), detection of\u2026"]} +{"59850647|192934": ["Audio-visual fusion is an instance of the general classifier combination problem (Jain et al., 2000).", "Classifier combination based on their individual decisions about the classes of interest is an active area of research with many applications (Xu et al., 1992; Kittler et al., 1998; Jain et al., 2000).", "This corresponds to the adaptive product rule in the likelihood domain (Jain et al., 2000), and it is also known as the separate identification model to audio-visual fusion (Rogozan, 1999; Teissier et al., 1999).", "Finally, an important problem in data classification is the issue of feature selection within a larger pool of candidate features (Jain et al., 2000)."]} +{"16603388|18050848": []} diff --git a/edge/graph_27036850.jsonl b/edge/graph_27036850.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2703920.jsonl b/edge/graph_2703920.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27062173.jsonl b/edge/graph_27062173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49055ff0775e4d62ed492f5dae6616d8eab7294e --- /dev/null +++ b/edge/graph_27062173.jsonl @@ -0,0 +1 @@ +{"56780702|14441987": ["Node mobility results in a time-varying network topology, and hence prior research has focused on evaluating the impact of node mobility on the performance of various routing protocols proposed for MAWNs [1], [8-12]."]} diff --git a/graph_2706428.jsonl b/edge/graph_2706428.jsonl similarity index 100% rename from graph_2706428.jsonl rename to edge/graph_2706428.jsonl diff --git a/edge/graph_27079894.jsonl b/edge/graph_27079894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ff66650e44d09f9863fd6005f8ca974ae4f2f88 --- /dev/null +++ b/edge/graph_27079894.jsonl @@ -0,0 +1 @@ +{"28102891|192934": ["These methods provide suboptimal solution with a low computational cost and computational complexity [13]."]} diff --git a/graph_270804.jsonl b/edge/graph_270804.jsonl similarity index 100% rename from graph_270804.jsonl rename to edge/graph_270804.jsonl diff --git a/edge/graph_27099298.jsonl b/edge/graph_27099298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91d0c08bf3da133b544ec2df45956cbbc2437606 --- /dev/null +++ b/edge/graph_27099298.jsonl @@ -0,0 +1,8 @@ +{"19952946|1163508": ["Several research studies have addressed the issue of knowledge for the field of security [7][8].", "We analyzed about 20 security ontologies, based on previous literature surveys; the full list of these ontologies can be found in [7] and [8].", "The analysis of these ontologies reveals that they vary a lot in the way they cover security aspects as reported in previous work [7].", "In a previous research, several security ontologies were compared and classified [7].", "A previous survey [7] classifies the existing security ontologies into eight main families: theoretical basis, security taxonomies, general, specific, risk based, web oriented, requirements related and modeling."]} +{"18069847|1163508": []} +{"60341311|12860838": ["According to Choi and colleagues [46], current tools that support ontology merging include SMART, PROMPT/AnchorPROMPT, OntoMorph, HICAL, CMS, FCA-Merge and Chimaera.", "Tools that facilitate this kind of mapping include MOMIS and OIS framework [46].", "According to Choi and colleagues [46], tools that support this type of integration include CTXMatch, GLUE, MAFRA, LOM, QOMm ONION, OKMS, OMEN and P2P ontology mapping.", "The global integrated ontology provides a unified view to users, who may query the local ontologies via the integrated global ontology [46]."]} +{"60341311|10500613": ["For a comprehensive overview of different aspects of ontology matching, the reader is advised to consult the following survey articles: [18, 156, 161, 185, 278, 296, 298, 338]."]} +{"60341311|913718": ["For example, Shvaiko and colleagues [300] have proposed a dynamic ontology matching method for peer-to-peer systems.", "In a recently published book about ontology matching [91], Euzenat and Shvaiko have classified fifty of these matching systems into four groups: (i) systems that focus on schema-level information (schema-based systems), (ii) systems that concentrate on instance-level information (instance-based systems), (iii) systems which exploit both schema-level and instance-level information (schema- and instance-based systems), and (iv) meta-matching systems (i.e., systems which use and combine other matching systems).", "See [297] and [86] for a detailed review of all these techniques.", "Euzenat and Shvaiko [297, 86] have presented a classification of available matching techniques in terms of granularity and input interpretation.", "According to Euzenat and Shvaiko, available matching techniques may be classified as lexical matchers, structural matchers or semantic matchers.", "Shvaiko and colleagues have also identified plausible directions for dynamic ontology matching, including approximate querying and partial matching (which involve trading some of the quality of the results for greater efficiency) and interactive ontology matching (in which multiple agents negotiate ways of dealing with mismatches).", "Shvaiko and colleagues [300] cite the following research tools as attempting to deal with dynamic applications: the DCM framework, NOM, QOM, OntoBuilder, ORS, PowerMap and S-Match."]} +{"15144899|1163508": ["In [16] security ontologies have been proposed.", "They [16] proposed an analysis and a typology of existing security ontologies and their use for requirements definition."]} +{"3631487|627405": []} +{"14759349|18044357": ["By contrast other models link dependability features with system structures and development processes (e.g.,[ 41 ,42])."]} diff --git a/edge/graph_27113594.jsonl b/edge/graph_27113594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3b81a0fb4bd3bc08748a9def2b41924640be195 --- /dev/null +++ b/edge/graph_27113594.jsonl @@ -0,0 +1,3 @@ +{"206186836|9410318": []} +{"54078691|2457428": []} +{"20309493|9410318": ["In the design of DTN architecture, one of the main considerations is the security provision [5]."]} diff --git a/edge/graph_27114572.jsonl b/edge/graph_27114572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2713392.jsonl b/edge/graph_2713392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2713956.jsonl b/edge/graph_2713956.jsonl similarity index 100% rename from graph_2713956.jsonl rename to edge/graph_2713956.jsonl diff --git a/edge/graph_2714078.jsonl b/edge/graph_2714078.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2717662.jsonl b/edge/graph_2717662.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27190378.jsonl b/edge/graph_27190378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2720099.jsonl b/edge/graph_2720099.jsonl similarity index 100% rename from graph_2720099.jsonl rename to edge/graph_2720099.jsonl diff --git a/edge/graph_27211991.jsonl b/edge/graph_27211991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27262729.jsonl b/edge/graph_27262729.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ff3fbbf10ebd070559d2bcaa9e592645f3a424a --- /dev/null +++ b/edge/graph_27262729.jsonl @@ -0,0 +1 @@ +{"2197062|2177212": [", to [13] for more details on secret sharing; some examples are also discussed below."]} diff --git a/edge/graph_27267827.jsonl b/edge/graph_27267827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2728116.jsonl b/edge/graph_2728116.jsonl similarity index 100% rename from graph_2728116.jsonl rename to edge/graph_2728116.jsonl diff --git a/edge/graph_2728814.jsonl b/edge/graph_2728814.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27292487.jsonl b/edge/graph_27292487.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27303984.jsonl b/edge/graph_27303984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27317885.jsonl b/edge/graph_27317885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11e8484b3acdb9878948c3d28725f08900f13449 --- /dev/null +++ b/edge/graph_27317885.jsonl @@ -0,0 +1,9 @@ +{"38941216|36610012": []} +{"85562787|41998167": []} +{"85562787|17960632": []} +{"85562787|14441987": []} +{"32778938|8125630": []} +{"32778938|2451860": ["Challenging research issues abound in the area of data management in mobile computing systems (Barbara 1999, Jing et al. 1999)."]} +{"195885945|1775475": ["Based on the time scale these functions are involved, they are classified as static and dynamic functions [2, 3]."]} +{"982284|2532914": ["In practice, however, these typically apply laboratory-based evaluations [10].", "Exceptions include studies comparing techniques yet exists within the field 62 J. Kjeldskov et al. While the literature study [10] also revealed that 71% of mobile device evaluation was done through laboratory experiments and only 19% through field studies, it in the field [1, 5, 8].", "These concerns have since been confirmed through a number of studies e.g. [5, 6, 7, 9, 16, 18]. mobile HCI involved evaluation [10]."]} +{"629325|14441987": []} diff --git a/edge/graph_27336247.jsonl b/edge/graph_27336247.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2734644.jsonl b/edge/graph_2734644.jsonl similarity index 100% rename from graph_2734644.jsonl rename to edge/graph_2734644.jsonl diff --git a/edge/graph_27347705.jsonl b/edge/graph_27347705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2736673.jsonl b/edge/graph_2736673.jsonl similarity index 100% rename from graph_2736673.jsonl rename to edge/graph_2736673.jsonl diff --git a/edge/graph_27400747.jsonl b/edge/graph_27400747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..95d771ffd98dbd011ab35b0effcf0974390070fb --- /dev/null +++ b/edge/graph_27400747.jsonl @@ -0,0 +1,4 @@ +{"41931611|6670217": ["[39], [40]", "Worms [39] Malware [43] Trojan [40].", "Backdoor [37] Virus [39]", "Worms: Worms are the programs that transport their copies from one device to another device with the help of different transport mechanism throughout the network without user interference [39] [41] [42].", "Viruses also give a link to an unknown source like installation software without a request from a user [39]."]} +{"41931611|15199849": []} +{"41931611|10334828": ["According to [32] Smartphones have many vulnerabilities that can lead to insecurity or be victimized by malicious attackers to create attacks.", "network attacks [34] Vulnerabilities [32]", "Lack of user awareness [32]", "If attackers gain the APIs control, could easily initiate attacks and exploit the privileges of the APIs [32] [33].", "Insufficient management of Apps [32] System fault/defects [32]", "Unsecure wireless network [32]", "11i is a new security protocol ensuring that only authorized users can access the network [32]."]} +{"14691714|18567112": []} diff --git a/edge/graph_27410217.jsonl b/edge/graph_27410217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..374e2cf599df2db4db97c87514c264f5c86c6f26 --- /dev/null +++ b/edge/graph_27410217.jsonl @@ -0,0 +1,25 @@ +{"1319528|2187403": ["Hence, accessing, storing, and understanding data from different context sources has to be solved in the context-aware system, using some dedicated context model [13,66], for it to be usable by different types of context-aware applications and to be able to scale linearly with each new type of context information."]} +{"1319528|1113420": ["Context-awareness is one of the cornerstones of mobile and ubiquitous computing [1][2]."]} +{"13447772|3348390": ["categories 2,3,4 in Figure 1) in IoT is validation, fusing, filtering, context discovery, and annotation [14]."]} +{"10043143|1113420": ["[5] summarizes the main approaches and aspects of context-aware systems and discusses the strengths and weaknesses of existing implementations."]} +{"16567194|1113420": ["The middleware aims to manage different aspects of context and location management as well as situation reasoning and other related tasks."]} +{"16567194|2835258": ["We discuss implementation and experimentation issues of the framework in personal digital assistance (PDA) devices which form the ad hoc network as proof-of-concept of the framework."]} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"2220499|7329149": []} +{"2220499|1598350": ["T HE INTERNET of Things (IoT) [1] has become popular over the past decade."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"12239912|7988320": []} +{"12239912|16514036": []} +{"304534|14697846": ["According to [1], a peer-to-peer system is defined as a distributed system where the interconnected nodes are able to self-organize in an overlaynetwork (see Figure 4) for sharing resources such as CPU cycles, storage and bandwidth."]} +{"5754838|801245": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"1252141|1113420": []} +{"7993325|1775475": ["service provision in a mobile computing environment [30]."]} diff --git a/edge/graph_27414678.jsonl b/edge/graph_27414678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2742199.jsonl b/edge/graph_2742199.jsonl similarity index 100% rename from graph_2742199.jsonl rename to edge/graph_2742199.jsonl diff --git a/edge/graph_27466065.jsonl b/edge/graph_27466065.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2490f939c537733e387a448543aa551de3eb27c0 --- /dev/null +++ b/edge/graph_27466065.jsonl @@ -0,0 +1 @@ +{"206258446|16654832": ["The fundamental attributes of elastic applications are as follows (Shiraz et al., 2013b):\nad hoc platform is created by splitting up the distributed platform between SMDs and cloud at runtime.", "The granularity level of the application partitioning can affect the complexity of distributed application processing and the resources utilization overheads in runtime component migration (Shiraz et al., 2013b).", "\u2026of elastic/adaptive applications requires continuous profiling mechanism which is time critical, energy consuming, and resources intensive (Shiraz et al., 2013b; Cuervo et al., 2010; Giurgiu et al., 2009, 2012; Abebe and Ryan, 2011; Chun et al., 2011; Gu et al., 2003; Kovachev and Klamma,\u2026", "The successful implementation of cloud computing for stationary computers has motivated leveraging the on-demand services of computational clouds for mitigating resources limitations in SMDs (Shiraz et al., 2013b).", "SMDs are predicted to be the essential computing devices in the near future with high user expectations for accessing computational intensive applications analogous to the powerful stationary computing machines (Shiraz et al., 2013b).", "A number of recent studies have highlighted the different aspects of MCC (Abolfazli et al., 2014b; Shiraz et al., 2013a,b; Abolfazli et al., 2014a; Sanaei et al., 2014; Gani et al., 2014).", "However, applications on the latest generation of SMDs are still overshadowed by battery power, CPU potentials, memory capacity, wireless network bandwidth, and the intrinsic limitations in the mobile computing environment (Shiraz et al., 2013b, 2014; Kumar et al., 2012).", "The granularity level of the application partitioning affects the complexity of distributed application processing and the overhead of resources utilization in runtime component migration (Shiraz et al., 2013b).", "Mobile users, however, are currently using SMDs that have limited processing power as well as resources to execute mobile applications effectively (Shiraz et al., 2013b)."]} diff --git a/graph_2746910.jsonl b/edge/graph_2746910.jsonl similarity index 100% rename from graph_2746910.jsonl rename to edge/graph_2746910.jsonl diff --git a/graph_2747193.jsonl b/edge/graph_2747193.jsonl similarity index 100% rename from graph_2747193.jsonl rename to edge/graph_2747193.jsonl diff --git a/graph_2748125.jsonl b/edge/graph_2748125.jsonl similarity index 100% rename from graph_2748125.jsonl rename to edge/graph_2748125.jsonl diff --git a/graph_2748484.jsonl b/edge/graph_2748484.jsonl similarity index 100% rename from graph_2748484.jsonl rename to edge/graph_2748484.jsonl diff --git a/edge/graph_27488308.jsonl b/edge/graph_27488308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c99d8af052509c4a7f5e1104c9a1237e9fb277ca --- /dev/null +++ b/edge/graph_27488308.jsonl @@ -0,0 +1,23 @@ +{"5239046|32584958": ["This realworld applicability combined with the computational challenge of creating a schedule in such environments has led to job shop scheduling problems being widely studied in the academic literature over the past 50 years [2], [5]."]} +{"15754969|1142274": []} +{"31813790|3053192": []} +{"19886739|27488308": []} +{"19886739|3053192": ["Thus, our approach constitutes a hyper-heuristic approach (Burke et al., 2009, 2013)."]} +{"968252|13867280": ["The framework presented in this paper can be placed in the third generation, alongside co-evolutionary [51] and self-generating [36] memetic methods."]} +{"20644536|3053192": ["Heuristic selection and heuristic generation are currently the two main research methodologies in HH [24]."]} +{"28900144|12846121": ["Already Panwalkar and Iskander (1977) suggested the merits of combination, but they have not discussed or tested this principle in detail.", "\u2026often used as stand-alone solution methods in dynamic problems (see, e.g., Holthaus, 1997; Mohanasundaram et al., 2003; Chtourou & Haouari, 2008; Ouelhadj & Petrovic, 2009), for solving large instances (especially in optimization of real-world instances) and whenever the speed of getting a good\u2026"]} +{"9893195|32584958": ["Some authors also refer to reactive scheduling schemes as online scheduling or dynamic scheduling (Aytug et al. 2005; Potts and Strusevich 2009; Vieira et al. 2003)."]} +{"36838772|15915200": []} +{"36838772|15527933": []} +{"16454257|19632381": []} +{"9491035|27488308": []} +{"9491035|9734434": ["After reviewing related work in Section 2 we describe our application area in Section 3."]} +{"9491035|4474193": ["The data used to learn the surrogate model can come from an experimental design conducted before the EA, but usually is learned and adopted online during the run (Jin, 2005, 2011; Jin and Branke, 2005).", "For a more comprehensive review, the interested reader is referred to, e.g., Jin (2005, 2011); Shi and Rasheed (2010); Jin and Branke (2005)."]} +{"62627356|17403085": []} +{"62627356|15527933": []} +{"12385361|3053192": ["In the work presented in this paper, GP is used as a hyperheuristic method [25] for the automatic design of SPs that include sequencing/DRs and DDARs for dynamic JSS problems.", "In order to address drawbacks of existing methods, three important aspects are considered in our proposed algorithms: 1) representations of different scheduling rules; 2) evolutionary optimization to evolve the tradeoffs in SPs; and 3) reusability (ability to be reused on new unseen problems [25], [26]) of the evolved SPs."]} +{"12385361|32584958": ["A comprehensive review of these methods is given in Ouelhadj and Petrovic [52] and Potts and Strusevich [53].", "and Petrovic [52] and Potts and Strusevich [53]."]} +{"12385361|12846121": ["A comprehensive review of these methods is given in Ouelhadj and Petrovic [52] and Potts and Strusevich [53].", "and Petrovic [52] and Potts and Strusevich [53]."]} +{"27185656|3053192": []} +{"3053192|13867280": []} +{"3053192|1708582": ["One of the commonly used methods in hyper-heuristics is reinforcement learning , see Kaelbling et al (1996) and Sutton and Barto (1998) for more details."]} diff --git a/edge/graph_27493593.jsonl b/edge/graph_27493593.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d98693b59f630ad2474dfb494e51d467def29dd3 --- /dev/null +++ b/edge/graph_27493593.jsonl @@ -0,0 +1,4 @@ +{"6512700|7857223": ["I. INTRODUCTION"]} +{"16803605|10287248": ["[6] There are many QoS-based routing algorithms that are systematically classified on [5]."]} +{"61683540|10287248": []} +{"62561972|10287248": ["Generally, these methods can be classified into two basic algorithms: vector-distance algorithm and link-state algorithm [1].", "Generally, the range of traffic sharing path number is within [1,3]."]} diff --git a/edge/graph_27498091.jsonl b/edge/graph_27498091.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36fa0f0286a80a470a7460942500cd7c256a4b5a --- /dev/null +++ b/edge/graph_27498091.jsonl @@ -0,0 +1,2 @@ +{"23505390|987239": ["And these have resulted in the rise of a 3D model retrieval platform for public usages (Funkhouser et al., 2003; Chen et al., 2003; Zhang, 2005; Tangelder and Veltkamp, 2008)."]} +{"23505390|1099309": ["Moving Picture Experts Group (MPEG) researched multimedia content description interface standard (MPEG7) to provide the standardization of content-based description and retrieval specifications of 3D models (Sikora, 2001)."]} diff --git a/edge/graph_27527196.jsonl b/edge/graph_27527196.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c94637c39536044169365bfea7c9e99f8a9df7d1 --- /dev/null +++ b/edge/graph_27527196.jsonl @@ -0,0 +1,33 @@ +{"5631634|1097238": ["This is because an EoC is known to be capable of performing better than its best single classifier [7, 31, 32, 41]."]} +{"5631634|38476": ["An HMM is one of the most popular classification methods for pattern sequence recognition, especially for speech recognition and handwritten pattern recognition problems [4, 9, 10, 39, 40, 45]."]} +{"61140043|14580698": ["Recognition of handwritten words has been a subject of intensive research in the last years [8, 13]."]} +{"34231915|14580698": ["Usually, Hidden Markov Model-based techniques (HMM) are used for recognition of cursive handwritten words because of their segmentation-free recognition capability (see [26, 33 ])."]} +{"14580698|2762290": ["Many algorithms have been proposed for this task and we recommend two surveys that review this field [52] and [8].", "The reader might be interested in other relevant surveys involving online cursive recognition [82], OCRs [42,84], and segmentation techniques [52,8]."]} +{"3155409|16082889": ["Recent surveys on cursive Roman script recognition are [93, 112, 120]."]} +{"3155409|14580698": []} +{"3155409|2762290": ["[11] R.", "For surveys see [11, 110]."]} +{"3155409|15782139": ["Recent surveys on cursive Roman script recognition are [93, 112, 120]."]} +{"15041553|15782139": ["Although online handwriting recognition has advanced to the level of commercial application, offline handwriting recognition has only been successful in small-vocabulary and highly constrained domains [17, 13]."]} +{"2811761|15782139": ["The extraction of the features which are used for the recognition process is a very difficult task [22, 26]."]} +{"31669083|2762290": []} +{"27267406|192934": ["sifier methods [12,34] boosted recognition accuracy."]} +{"15056685|15782139": []} +{"37658386|14580698": []} +{"37658386|15782139": []} +{"1745101|16082889": ["The recognition of unconstrained handwritten text is still a great challenge although research in the area has started more than 30 years ago [1, 17, 22 ]."]} +{"1745101|15782139": ["The recognition of unconstrained handwritten text is still a great challenge although research in the area has started more than 30 years ago [1, 17, 22]."]} +{"8717387|16082889": ["O FFLINE cursive handwriting recognition systems presented in the literature deal, almost without exception, with single words [1], [2], [3]."]} +{"8717387|14580698": []} +{"8717387|15782139": ["OFFLINE cursive handwriting recognition systems presented in the literature deal, almost without exception, with single words [1][2][3]."]} +{"9187881|15782139": ["Although text line segmentation for machineprinted or hand-printed documents is usually seen as a solved problem [4], freestyle handwritten text lines still present a significant challenge."]} +{"18323791|14580698": ["For an extensive survey of off-line cursive script word recognition see [ 16 ]."]} +{"18323791|15782139": ["e.g. [ 14 ]). Whereas these systems are limited to isolated characters or isolated words, only few systems exist for the recognition of unconstrained handwritten texts."]} +{"15782139|2762290": []} +{"15782139|6746689": []} +{"20411856|6746689": ["As (11) must hold regardless of the parameter \u03c3y, it is easy to obtain cos [2\u03c0f(\u2212W/2 + t)] \u2265 cos [2\u03c0f(W/2 + t)] ."]} +{"17535832|15782139": ["The problem of handwriting recognition has been studied for several decades but is still open [6]."]} +{"432122|14580698": ["The HMM-approach has been established for those applications because of its segmentation-free recognition capability [11]."]} +{"46470049|2762290": ["A number of research efforts have used HMMs in offline printed and handwriting recognition [3-31]."]} +{"10368264|14580698": []} +{"10368264|2762290": [", [3])."]} +{"10368264|15782139": []} diff --git a/edge/graph_27533715.jsonl b/edge/graph_27533715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27542024.jsonl b/edge/graph_27542024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27547076.jsonl b/edge/graph_27547076.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2756896.jsonl b/edge/graph_2756896.jsonl similarity index 100% rename from graph_2756896.jsonl rename to edge/graph_2756896.jsonl diff --git a/edge/graph_27569632.jsonl b/edge/graph_27569632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..325aefa5ffaed34e895f249851dd89d66783a707 --- /dev/null +++ b/edge/graph_27569632.jsonl @@ -0,0 +1 @@ +{"385307|3102110": []} diff --git a/edge/graph_27585117.jsonl b/edge/graph_27585117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2758659.jsonl b/edge/graph_2758659.jsonl similarity index 100% rename from graph_2758659.jsonl rename to edge/graph_2758659.jsonl diff --git a/graph_2760914.jsonl b/edge/graph_2760914.jsonl similarity index 100% rename from graph_2760914.jsonl rename to edge/graph_2760914.jsonl diff --git a/edge/graph_2762290.jsonl b/edge/graph_2762290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2762484.jsonl b/edge/graph_2762484.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27633619.jsonl b/edge/graph_27633619.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7a597190e588221b3d58b4d9d98c6ec869a6843 --- /dev/null +++ b/edge/graph_27633619.jsonl @@ -0,0 +1,31 @@ +{"125895178|9207335": ["In the past few years mobile wireless communication has experienced various generations from 0G to 4G technology[1-2]."]} +{"9122404|2623404": ["Interested readers are referred to [12], [13] and the refere nc s therein."]} +{"9122404|7971188": ["From a networking perspective, CMuHC will inevitably require the formation of a peer-to-peer overlay in order to orchestrate the participation of multiple users in additio n the facilitation of a number of other necessary functions perta ining to the tasks of overlay maintenance and operation [9]."]} +{"16549900|12681089": ["Much of the channel measurements and modeling literature has focused only on the azimuth dispersion [5]\u2013[7], as the number of antenna elements at each link end is limited and the dispersion in azimuth is much larger than the dispersion in elevation."]} +{"14479234|1898434": ["autonomy, sociality, rationality, responsiveness, proactiveness, situatedness, mobility) [3], which make them very suitable to effectively model CSOs."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"10307837|3555631": ["As investigated recently [158], a better way to plan for next generation 5G networks is to leverage CDSA.", "Examples of recent work that investigate this problem include [161], [158].", "One possibility to do so, as recently proposed in [158] is to exploit CDSA such that mmWave is used for DBS and HF spectrum is used for CBS."]} +{"10307837|7851743": ["While SON is a promising paradigm that improves capacity, and reduces total cost of ownership (TCO) for the network operators [21]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"206454765|8909218": []} +{"9951503|5621151": []} +{"15449163|18687271": ["[52] provided three distributed mobility management protocols, the first is based on the existing Proxy Mobile IPv6 (PMIPv6), the second is based on SDN, and the third is based on routing protocols.", "Proposed solutions: Inter-tier, intra-tier, and multi-RATs handoff mechanisms, and a mechanism for secure handoff [40, 93, 102, 52], which we will discuss in Section 5."]} +{"15449163|3330461": ["For a detailed review of D2D communication, interested readers may refer to [24]."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"550361|11498812": ["Ironically, while mobility models have been routinely used in the evaluation of human-centric communications technologies, such as mobile ad-hoc and legacy cellular networks, the effects of mobility in mobile 5G systems that are targeting the mcMTC market are much less understood [3]."]} +{"5443664|15453366": ["Millimeter wave communication is a promising candidate that can address the challenge of bandwidth shortage for the next generation of wireless cellular communication systems [1]\u2013[4]."]} +{"10289379|2623404": ["And the OpenFlow is a representative protocol of SDN currently [27] .", "Its type coincides with OpenFlow that is why SDN controller suitable to place to cloud platform.", "Any OpenFlow switches handle the own area and report to the controller.", "Open Networking Foundation (ONF) proposed a new communications protocol called OpenFlow [26] that any forwarding switches adds the flow table for traffic forwarding.", "In short, the concept of OpenFlow controller is a centralization me approach."]} +{"6993231|14765802": ["Sleep mode techniques for green communications have been broadly studied for traditional RAN architectures with the goals of energy efficiency, cost reduction and environmental awareness [4], [5].", "[4], [16], [17]) to detect when eNodeB M cannot serve any more UEs."]} +{"206584313|41998167": ["A lot of MAC protocols for WSNs have been proposed in the literature, and numerous surveys on WSN MAC protocols can be found in [53], [52], and [51].", "Despite the long history of MAC/Routing protocols, Problems remain and others keep emerging with regard to the rapid growth of M2M applications [52], [53], [51], [54], [55], [56]."]} +{"206584313|1230643": ["services, as they are focused on energy efficiency, wireless networking, and protocols [14]."]} diff --git a/edge/graph_27637541.jsonl b/edge/graph_27637541.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2d4347524c5a5422c073628f7401ff87f697cf5 --- /dev/null +++ b/edge/graph_27637541.jsonl @@ -0,0 +1,30 @@ +{"7757210|14970359": ["We givea brief overview here and refer the reader to [ 13 ] for a more comprehensive survey."]} +{"8728793|14970359": ["Earlier activity recognition systems mostly used vision as the sensing modality [1,2] and that track of research is still going on today [3]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"17349307|14970359": ["Recently, an attempt has been made to design a visualbased marker-free tracking system for human motion capture (Aggarwal and Cai 1999 Gavrila 1999 Moeslund and Granum 2001 Wang et al. 2003).", "KEY WORDS\u2014sensor fusion, extended Kalman filter, inertial sensor, human motion tracking, home-based rehabilitation"]} +{"17349307|7788290": ["Recently, an attempt has been made to design a visualbased marker-free tracking system for human motion capture (Aggarwal and Cai 1999 Gavrila 1999 Moeslund and Granum 2001 Wang et al. 2003).", "Recently, an attempt has been made to design a visualbased marker-free tracking system for human motion capture (Aggarwal and Cai 1999 Gavrila 1999 Moeslund and Granum 2001 Wang et al. 2003)."]} +{"7807670|14970359": ["A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "The initial model is then refined using a Bayesian network that imposes human body proportions onto the body part size estimates."]} +{"7807670|7788290": ["55], 100 UAm [1], 200 UAm0 [1], 100 LowerArm [0.", "9], 100 Thm [1], 200 Thm0 [1], 100 Calf [1], 100 Cm [1], 200 Cm0 [1], 100 UpperArm [0.", "A reliable motion capture system would be valuable in many applications [1, 2].", "A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "75], 100 LAm [1], 200 LAm0 [1], 100 Torso (\u03bc, \u03c3) = (500, 300) Height [1, 1, 1], 100 Table 3 The parameters used in the Bayesian network shown in Figure 13."]} +{"52847824|987239": []} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"206769463|7788290": []} +{"7554004|17516538": []} +{"7554004|14970359": ["A good review can be found in [6] and [20]\u2013[22]."]} +{"7554004|7788290": ["A good review can be found in [6] and [ 20 ]\u2010[22]."]} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"96189|14970359": ["A large body of work on pose tracking precedes this paper, dating back to the early 1980\u2019s [14, 7]; a 2001 survey lists many recent contributions [12]."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"5945684|11894197": ["Feature selection and combination is a central problem and many methods of varying degrees of sophistication have been proposed [6], [7]."]} +{"142979|5401262": ["This is evident from the abundance of different motion analysis approaches that have been developed [20] [19]."]} +{"2375324|7788290": []} +{"14647068|14970359": []} +{"18585846|14970359": ["Our indexing and sequencing-based approach differs from all the methods surveyed by Gavrila [10] and Moeslund and Granum [17] since it combines the static and dynamic recognition approaches.", "More recently, there has been a survey by Moeslund and Granum [17] which describes various computer vision-based human motion capture."]} +{"18585846|7788290": ["However, since this paper is focused on a novel method for human activity recognition and since there are many other methods for human tracking (see a survey in [ 10 ]), we shall describe our method very briefly in the Appendix.", "A paper by Gavrila [ 10 ] is an excellent reference which conducts an intensive survey on the different methodologies for visual analysis of human movement.", "Our indexing and sequencing-based approach differs from all the methods surveyed by Gavrila [ 10 ] and Moeslund and Granum [17] since it combines the static and dynamic recognition approaches."]} +{"9333559|1634674": ["Dynamic time warping (DTW) algorithms and hidden Markov models (HMMs) have been popularly used to recognize actions by analyzing sequential changes in features extracted per frame (e.g. joint angles) [15]."]} +{"6566960|7185733": ["Inside-out activity recognition, in particular the visual interpretation of everyday manipulation tasks using head-\nmounted gaze directed cameras, is an essential tool for understanding vision-guided action."]} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"1612022|12127129": ["median of squares (LMeds), eigen-backgrounds, and illumination distribution analysis have been proposed [5], [6], [24], [25].", "An excellent review of background subtraction techniques is given in [24].", "A number of efficient silhouette extraction algorithms have been developed in the literature [24]."]} diff --git a/edge/graph_27650400.jsonl b/edge/graph_27650400.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27677869.jsonl b/edge/graph_27677869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d829f9d6051994d462e58891e3e7660059b87958 --- /dev/null +++ b/edge/graph_27677869.jsonl @@ -0,0 +1,3 @@ +{"13074025|22203221": ["And network models have been widely employed [3]."]} +{"25533607|44944144": ["popular due to the no-restricted mobility and feasible deployment (Sesay et al. 2004).", "Currently, MANETs are very popular due to the no-restricted mobility and feasible deployment (Sesay et al. 2004)."]} +{"206567635|22203221": ["Finally, the incentives for the different behavioral responses to an epidemic could be systematically incorporated into our framework by means of evolutionary game theory (Perc and Szolnoki, 2010; Wang et al., 2015).", "To address the problem of combining several information sources, we may need to resort to the framework of multilayer networks (Wang et al., 2015), such that each network layer represents one type of information."]} diff --git a/edge/graph_27680352.jsonl b/edge/graph_27680352.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f82603e8057606352f33201902b47a1d95425e6a --- /dev/null +++ b/edge/graph_27680352.jsonl @@ -0,0 +1,9 @@ +{"15358274|289357": ["As we all know, BPP and QAP both are NP-hard problem [14, 15], so we attempt to minimize network communication traffic, the less traffic in the network, the fewer the number of the active network elements."]} +{"15099960|3042864": ["Implementing VM isolation policies and VM resource introspection (by the hypervisor) helps to design profound security systems for secure VM migration [28,118,119]."]} +{"15099960|7142427": []} +{"15099960|16654832": ["applications along OS states from a desktop server to smart phone or vice versa [35].", "A cloud operator charges the customer for cloud resource usage based on the \u201cpay-as-you-go\u201d service model [35]."]} +{"18574777|18137319": ["In Kapil et al. [2013; Medina and Garc\u00b4\u0131a 2014; Ahmad et al. 2015; Sv\u00a8ard et al. 2015], the authors survey LM techniques discussing related issues, while Khoshkholghi et al. [2014] provide a survey on cloud-based DR.", "\u2026the SDN paradigm can serve the increasing networking demands and requirements of VM LM and DR over long distances, providing network orchestration [Khoshkholghi et al 2014; Asensio et al. 2015; Samadi et al. 2015; Asensio et al. 2014; Mandal et al. 2014; Mayoral et al. 2015] and virtualization\u2026"]} +{"1567605|10559330": []} +{"6872146|206584087": ["of-service\u201d and \u201dstackover flow\u201d [6] [7] [8]."]} +{"13694725|16654832": ["Resource-intensive workloads are intelligently offloaded to benefit from cloud resources (Shiraz et al., 2013a, Shiraz and Gani, 2012).", "The rich mobile application features demand adequate system resources due to computationally expensive operations involved in application execution (Shiraz et al., 2013a).", "\u2026practice exploits live or non-live patterns to move a complete virtual server across physical machines to successfully attain load balancing (Shiraz et al., 2013b, Yao et al., 2014), power efficiency (Dong et al., 2013; Mishra et al., 2012; Shrivastava et al., 2011), fault tolerance\u2026"]} +{"16334756|122575": ["System administrators can use this capacity to consolidate many underutilized \nservers into only one machine, thus ensuring isolation and ef.cient performance [Whitaker et al. 2005] \nby expanding these capacities to clustering environments [Kiyanclar 2005]."]} diff --git a/edge/graph_27685096.jsonl b/edge/graph_27685096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27690826.jsonl b/edge/graph_27690826.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2769147.jsonl b/edge/graph_2769147.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2769379.jsonl b/edge/graph_2769379.jsonl similarity index 100% rename from graph_2769379.jsonl rename to edge/graph_2769379.jsonl diff --git a/edge/graph_27721607.jsonl b/edge/graph_27721607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27728340.jsonl b/edge/graph_27728340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2773536.jsonl b/edge/graph_2773536.jsonl similarity index 100% rename from graph_2773536.jsonl rename to edge/graph_2773536.jsonl diff --git a/graph_2774524.jsonl b/edge/graph_2774524.jsonl similarity index 100% rename from graph_2774524.jsonl rename to edge/graph_2774524.jsonl diff --git a/graph_2774711.jsonl b/edge/graph_2774711.jsonl similarity index 100% rename from graph_2774711.jsonl rename to edge/graph_2774711.jsonl diff --git a/edge/graph_27749879.jsonl b/edge/graph_27749879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..160f047b892b2d034fb3f24adc87b2e1d26d46e4 --- /dev/null +++ b/edge/graph_27749879.jsonl @@ -0,0 +1 @@ +{"7850481|19005250": ["is given in McKinley et al. [1995]."]} diff --git a/edge/graph_27789260.jsonl b/edge/graph_27789260.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..374f6ba002b7994288dfaab68a76f624d8ad4f17 --- /dev/null +++ b/edge/graph_27789260.jsonl @@ -0,0 +1,4 @@ +{"1624724|10500613": []} +{"2039733|10500613": ["There is a big literature on this topic, offering many different algorithms to compute correspondences [86][92]."]} +{"2039733|8125630": []} +{"2039733|913718": []} diff --git a/edge/graph_27792371.jsonl b/edge/graph_27792371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27806871.jsonl b/edge/graph_27806871.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bfea725638eb77d3290f4981440056a3c9e6e1a --- /dev/null +++ b/edge/graph_27806871.jsonl @@ -0,0 +1,25 @@ +{"25220211|14164279": ["Among existing MD video coding schemes, the domainpartitioning approach has been shown to be efficient in achieving MD coding [9]."]} +{"25220211|7439310": []} +{"62908932|7439310": []} +{"24494080|7439310": ["Using spatial or temporal redundancy, error concealment is the extension of correctly received areas of the images and video signals to areas corrupted by transmission errors [1]."]} +{"32675361|64404": ["Recently, in a combined effort, the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group, created the Joint Collaborative Team on Video Coding (JCT-VC) with the aim of developing the new video coding standard High Efficiency Video Coding (HEVC) [5].", "Instead, the information belonging to a LCU is embedded within the LCU in the same position into the next slice, making it compatible with the wavefront parallel processing (WPP) feature in HEVC [5].", "264/AVC, an intra coding mode is calculated; many modes are calculated per LCU and there are 35 different intra modes to chose from (for luma) [5]."]} +{"32675361|3540699": ["264/AVC [12] in most video applications."]} +{"18728984|3540699": ["Therefore, SEC techniques are the most suitable choice to conceal the I-frames [17].", "The block-based video coding standard H.264/AVC has introduced several error resilience mechanisms that draw on speci\ufb01c data organization tools such as network abstraction layer units (NALU), \ufb02exible macroblock order-J ing (FMO), or arbitrary slice ordering (ASO) [4, 17]."]} +{"15206372|7439310": ["Most of the disparity matching methods in the encoder are based on blocks [5]."]} +{"20784613|396631": []} +{"27682342|64404": []} +{"12132121|7439310": ["Fortunately, the standardization of higher bandwidth networks, such as the universal mobile telecommunications system (UMTS) [1], [2], is well underway, and, together with continued progress in video\nManuscript received January 27, 1998; revised March 11, 1998.", "Nevertheless, residual transmission errors cannot be avoided with a mobile radio channel, even when FEC and ARQ are combined.", "We discuss these measures and the interframe propagation of the remaining picture impairment in this section."]} +{"9802847|7439310": ["Many post-processing EC methods have been proposed (see [1] for a review article)."]} +{"17785972|7439310": ["Lots of error concealment algorithms have been proposed to recover pictures in terms of MB or pixel [32]."]} +{"59993130|15170341": ["This triggers the research on objective metrics that simulate the subjective evaluation [122\u2013126]."]} +{"59993130|453954": ["Different nations adopt different digital television broadcast standards [160], such as the DVB [161] in Europe and ATSC [162] in North America."]} +{"59993130|3540699": ["264/AVC [80]."]} +{"59993130|7439310": ["conventional error resilience and concealment methods for 2D [97\u2013102] and ste-", "rupted information during transmission [97\u201399]."]} +{"10338742|64404": ["264/AVC, HEVC promises to reduce the overall cost of delivering and storing video assets without decreasing the quality of experience delivered to the viewer, and two key issues have been a particular focus: increased video resolution and increased use of parallel processing architectures [1]."]} +{"10338742|7439310": ["Various error concealment methods have been proposed to overcome packet loss in video transmission for prior standards [2]."]} +{"13353648|3540699": ["TATE-OF-THE-ART video coding standard H.264/AVC [1] significantly outperforms the previous coding stan- Manuscript received May 5, 2010; revised August 19, 2010 and November 18, 2010; accepted December 2, 2010.", "H.264/AVC reference software JM 10.0 is utilized to evaluate the proposed algorithm; however, it should be noted that the proposed algorithm can be extended to any block-based video compression scheme.", "Although the highly efficient redundancy removing techniques in spatial and temporal domains leads to the success of H.264/AVC, the highly compressed bit stream is susceptible to transmission errors for error-prone networks."]} +{"13353648|7439310": ["Error resilience [5] and error concealment [6] are two major techniques to combat the visual quality degradation caused by noisy channels during transmission."]} +{"37632883|7439310": []} +{"41635780|3540699": ["This scheme is illustrated in Fig. 1. In this scheme, all the video frames are firstly encoded using the H.264 [ 17 ] video encoder."]} +{"24600098|14889616": ["The testing benchmark of the JMVC_8_3_1 version was provided by the JVT. Figs.", "Index Terms\u2014Error concealment, fuzzy reasoning, multi-view video coding (MVC).", "Therefore, the error concealment (EC) method with the consideration of interview and temporal correlations should be developed in MVC. EC technique development has becomes more sophisticated in recent years and many differingmethods have been proposed.", "2 shows an illustration of the error influence on the HBP structure of MVC.", "According to the above results, the proposed EC selection achieves both higher reconstructed image quality and lower complexity in MVC.", "The coding structure of the reference software JMVC [2] released by JVT for MVC uses a Hierarchical B Picture (HBP) structure [3] as shown in Fig.", "This study proposed an adaptive EC selection which not only maintains the quality of the reconstructed image but also reduces the computational complexity in MVC.", "1 with inter-view and intra-view correlation to improve coding efficiency in MVC [4]\u2013[7].", "To improve the coding efficiency of the multi-view video sequence, the Joint Video Team (JVT) introduced multi-view video coding (MVC) [1] that is extended by H.", "The above studies use a unitary EC method to reconstruct all damaged blocks in the MVC video sequence, which will increase the computation time in the MVC decoding.", "To improve the coding efficiency of the multi-view video sequence, the Joint Video Team (JVT) introduced multi-view video coding (MVC) [1] that is extended by H.264/AVC."]} +{"16038110|7439310": ["Keywords: Error Concealment; H.264; Video Transmission; Feature-based; Spatio-temporal Adaptive"]} diff --git a/edge/graph_27814013.jsonl b/edge/graph_27814013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f40636f8aa248f7b8df2cd2a59bc5f5f50dd0299 --- /dev/null +++ b/edge/graph_27814013.jsonl @@ -0,0 +1,6 @@ +{"38605171|5313655": ["alignment can not be performed properly at the time of comparison [5].", "Biometric template protection schemes [5] which are categorized as biometric cryptosystems [6] and cancelable biometrics [7] offer solutions to privacy preserving biometric authentication.", "Biometric template protection schemes [5] are commonly classified as biometric cryptosystems and cancelable biometrics."]} +{"37043796|5313655": ["Nandakumar and Nagar [16] and the work of Rathgeb and Uhl [28].\nfor BTP performance assessment.", "Nandakumar and Nagar [16] and the work of Rathgeb and Uhl [28]."]} +{"58422226|5313655": ["As previously mentioned, a fusion of multiple biometric indicators have been shown to improved the accuracy and reliability of biometric systems."]} +{"27134648|34263386": []} +{"27134648|5313655": []} +{"8046724|5313655": ["Generally, BCSs could be classified into 2 subsystems including key-binding and keygeneration systems [11].", "Related Works To preserve the security and user privacy of biometric authentication systems, various modern approaches have been proposed [11], wherein biometric cryptosystems (BCSs) have attracted much research in recent years."]} diff --git a/edge/graph_27824252.jsonl b/edge/graph_27824252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25154af32b91bb0999438a7e571cd5227e174587 --- /dev/null +++ b/edge/graph_27824252.jsonl @@ -0,0 +1 @@ +{"14225257|8530790": []} diff --git a/edge/graph_27836806.jsonl b/edge/graph_27836806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27851566.jsonl b/edge/graph_27851566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f156b5207cd0824ba1885a82acc75f22e3a74af --- /dev/null +++ b/edge/graph_27851566.jsonl @@ -0,0 +1,2 @@ +{"1354501|1507400": ["Troilkatt MapReduce jobs provide optimized access to the data stored by Troilkatt.", "MapReduce [13][14] is a widely used programming model and infrastructure system for data-intensive parallel computation.", "Biological data analysis applications, especially for next-generation sequencing data, have already been implemented using MapReduce ([20] provides examples).", "It offers a richer programming model than MapReduce, including iterative operations.", "The main advantage of MapReduce is that it scales to peta-scale datasets.", "In addition, most cloud platforms provide a MapReduce interface.", "We use HBase for data storage and MapReduce for generating input files and merging output files.", "The main disadvantage is that the MapReduce programming model may not be suited for all biological data analysis applications.", "Troilkatt supports three types of tools: unmodified binaries or scripts, Troilkatt scripts, and MapReduce jobs.", "Troilkatt executes unmodified binaries in parallel using MapReduce.", "Second, Troilkatt leverages the Hadoop software stack for reliable storage and scalable fault-tolerant data processing, including the Hadoop Distributed File System (HDFS), Hadoop MapReduce, and HBase.", "Several high-level programming models are built on top of MapReduce to make it easier to write data analysis programs, including Pig [23], Hive [24], Cascading [25], Cassandra [26], and the Mahout [27] library of machine learning algorithms."]} +{"381386|3900204": []} diff --git a/edge/graph_27860277.jsonl b/edge/graph_27860277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7666106dc628983e63cb387c1c10a9a108dc1119 --- /dev/null +++ b/edge/graph_27860277.jsonl @@ -0,0 +1 @@ +{"1397113|8953108": []} diff --git a/edge/graph_27867885.jsonl b/edge/graph_27867885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7cbee49a6f6d6d077c231062b29377ac49db030c --- /dev/null +++ b/edge/graph_27867885.jsonl @@ -0,0 +1 @@ +{"92327|1040974": ["Systems have been designed to interact with human translators in order to solve different types of (lexical, syntactic, or semantic) ambiguities (Slocum 1985; Whitelock et al. 1986). existing ef\ufb01cient searching algorithms can be adapted in order to provide completions (rather than full\u2026", "Systems have been designed to interact with human translators in order to solve different types of (lexical, syntactic, or semantic) ambiguities (Slocum 1985; Whitelock et al. 1986).", "Other interaction strategies have been considered for updating user dictionaries or for searching through dictionaries (Slocum 1985; Whitelock et al. 1986)."]} diff --git a/edge/graph_278772.jsonl b/edge/graph_278772.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27895355.jsonl b/edge/graph_27895355.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..12b528fe9d24e354ad18cdeb6ce8c648cd7c096d --- /dev/null +++ b/edge/graph_27895355.jsonl @@ -0,0 +1,5 @@ +{"16813134|1333339": ["According to [4] trust management systems target the information itself, they allow the detection of malicious data and dishonest peers."]} +{"21373055|763939": []} +{"14366345|10137283": ["overview of general trust management approaches can be found in [2], [3]."]} +{"17170586|1333339": ["Trust establishment is tagged in many existing research works for peer to peer, sensors, and mobile ad hoc networks [1] [2].", "The trust and reputation models [1] are proposed as new approaches to circumvent with this constraint and to filter out inaccurate messages and malicious vehicles."]} +{"32238406|2294541": []} diff --git a/edge/graph_27898609.jsonl b/edge/graph_27898609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46b48ea79e0b260129ebf78fe95c0c25296c6a36 --- /dev/null +++ b/edge/graph_27898609.jsonl @@ -0,0 +1,26 @@ +{"7124120|1708582": []} +{"2553026|7360895": ["The role as co-worker and assistant in human environments leads to new challenges in the design process of robot behaviors (Fong et al., 2003).", "Verbally communicating the results of its internal action simulation and monitoring processes greatly facilitates the interaction with naive users since it helps a human to quickly adjust his/her expectations about the capacities the robot might have (Fong et al., 2003)."]} +{"16085742|8777381": ["However, this decrease in the recognition rate for speaker-independent systems does not surprise, since even humans could hardly reach emotion recognition rates of 60% from natural language for unknown speakers [6]."]} +{"16085742|7360895": ["A good overview of such socially interactive robots can for instance be found in [1]."]} +{"18028824|16481413": ["In recent years, this approach has been adapted to the robotics domain [3], e."]} +{"7896306|7360895": ["Many research problems are emerging with regard to how people may interact with a service robot, and how such robots may be designed to be \" socially interactive \" [9]."]} +{"2981653|7983519": ["These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options [20].", "These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options (Krahmer and Deemter 2012).", "\u2026the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \" near \" or \" under \" which may not be directly computed from the robot's perceptual system (Krahmer and Deemter 2012).", "Hard-coded or template-based methods for generating requests do not take into account the ability of a person to understand the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \u201cnear\u201d or \u201cunder\u201d which may not be directly computed from the robot\u2019s perceptual system [20]."]} +{"38157287|7360895": ["Natural language communications, gestures, showing feelings, etc., are some of the important behaviors [3]."]} +{"6994739|7360895": ["To copyotherwise, to republish, to post on servers or to redistribute \nto lists, requires prior speci.c permission and/or a fee."]} +{"6994739|14997956": []} +{"9020209|18487363": ["Reference [27] is an extensive overview of con\ufb01dence measures for speech recognition."]} +{"14734113|7360895": ["Research into the issues involved with social robotics is important for the creation of robots that will operate alongside people and integrate themselves into human environments [10]."]} +{"18752719|14424486": ["However, so far, these systems generally incorporate simple rule-based extensions to deal with students' affective states, and are based on virtual tutors, not physically embodied robots Nye, Graesser, and Hu (2014).", "(2010) or in one-on-one tutoring sessions Saerbeck et al. (2010); Kory, Jeong, and Breazeal; Fridin (2014)."]} +{"7117568|7788290": []} +{"167197|7360895": ["Due to the variety of design goals and methodologies in social robotics, it is difficult to compare human-robot social interaction across projects and to present results that can be generalized from one social robot design to another [ 6 ].", "In the case of robots for which social human-robot interaction plays a focal role [ 6 ], fine-grained observational analysis of the robot interacting in a real-world environment can be used to analyze how humans react to and interact with the robot; how humans interact with each other while interacting with the robot; which aspects of the robot\u2019s, and human\u2019s, actions lead to breakdowns in the interaction; and how the robot succeeds and ..."]} +{"8098601|206742377": []} +{"3138852|1932843": ["These quantities can be taken to be finite, but continuous state and action spaces are often valuable for capturing interactions in important reinforcement-learning applications such as robotic control 57 ."]} +{"3138852|1708582": []} +{"11533813|7360895": ["Fong, Nourbakhsh, & Dautenhahn (2003) developed a collaborative control system in which robots asked human partners questions via a PDA interface.", "However, there is not consensus that human-robot interfaces should be built around natural language due to the challenges in building dialog interfaces in changing social contexts (Fong, Nourbakhsh, & Dautenhahn, 2003; Severinson-Eklundh, Green, & H\u00a8uttenrauch, 2003)."]} +{"4297798|2080630": ["The sensor-based method, which means different types of sensors such as RFID sensors are used to collect surgical data automatically, is usually integrated with surgical systems such as surgical robots to record all the surgeries, with low time/labor costs [31][34-35].", "To reduce the time/labor cost, one strategy is the replacement of the observer-based data collection method with the sensor-based data collection method [31].", "limited targeted surgeries, with high time/labor costs [31-33]."]} +{"18943176|1113420": ["The context information includes location, people, objects, time, weather, season, temperature, user\u2019s emotional states, focus, etc [18][19][27][28]."]} +{"7529010|7360895": ["Having robots to assist people in human-centered environments is a goal that the robotics community has aspired to for many years (Fong et al. 2003)."]} +{"207079297|16770050": []} +{"207079297|14970359": []} +{"207079297|7185733": []} +{"977486|1452734": ["We adopt a developmental robotics approach [4], [5] to tackle the language acquisition problem."]} diff --git a/graph_2790013.jsonl b/edge/graph_2790013.jsonl similarity index 100% rename from graph_2790013.jsonl rename to edge/graph_2790013.jsonl diff --git a/edge/graph_27903512.jsonl b/edge/graph_27903512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2792114.jsonl b/edge/graph_2792114.jsonl similarity index 100% rename from graph_2792114.jsonl rename to edge/graph_2792114.jsonl diff --git a/graph_2794252.jsonl b/edge/graph_2794252.jsonl similarity index 100% rename from graph_2794252.jsonl rename to edge/graph_2794252.jsonl diff --git a/edge/graph_2795037.jsonl b/edge/graph_2795037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_279507.jsonl b/edge/graph_279507.jsonl similarity index 100% rename from graph_279507.jsonl rename to edge/graph_279507.jsonl diff --git a/edge/graph_27952530.jsonl b/edge/graph_27952530.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2796899.jsonl b/edge/graph_2796899.jsonl similarity index 100% rename from graph_2796899.jsonl rename to edge/graph_2796899.jsonl diff --git a/edge/graph_27973241.jsonl b/edge/graph_27973241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e106ca7594ee472125efb207afc3b761df2a5530 --- /dev/null +++ b/edge/graph_27973241.jsonl @@ -0,0 +1,5 @@ +{"5124412|469744": ["Optical see-through HMDs have the advantage of letting the user see the real world, however, they may suffer from a time lag between the physical view and the virtual image [5].", "This approach is very similar to Head-Up Displays (HUDs) used in military aircrafts, hence, optical see-through HMDs have sometimes been described as \u201dHUDs\u201d [5]."]} +{"7581189|469744": ["Many different types of sensors have been used to achieve this, including GPS, gyroscopes, cameras, hybrid vision, accelerometers and others, as reported in [1], [2], [17], [41]."]} +{"15936745|469744": []} +{"4604162|1876898": []} +{"19142587|469744": ["between virtual contents and reality difficult to obtain [16]."]} diff --git a/edge/graph_2798065.jsonl b/edge/graph_2798065.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2798946.jsonl b/edge/graph_2798946.jsonl similarity index 100% rename from graph_2798946.jsonl rename to edge/graph_2798946.jsonl diff --git a/edge/graph_27994746.jsonl b/edge/graph_27994746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_27996699.jsonl b/edge/graph_27996699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28011476.jsonl b/edge/graph_28011476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92fc8f833b252772ce3790f07315f0e509ef7066 --- /dev/null +++ b/edge/graph_28011476.jsonl @@ -0,0 +1 @@ +{"11086575|3766791": []} diff --git a/graph_2801426.jsonl b/edge/graph_2801426.jsonl similarity index 100% rename from graph_2801426.jsonl rename to edge/graph_2801426.jsonl diff --git a/edge/graph_2802048.jsonl b/edge/graph_2802048.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28028484.jsonl b/edge/graph_28028484.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28051138.jsonl b/edge/graph_28051138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28060618.jsonl b/edge/graph_28060618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3840d6d0cf41f52256b14943a47ee0c97c56b62 --- /dev/null +++ b/edge/graph_28060618.jsonl @@ -0,0 +1,16 @@ +{"206592484|456491": []} +{"47405606|60779308": ["The length ratio is defined as the ratio of distance between \u00ed \u00b5\u00ed\u00b1\u009d and \u00ed \u00b5\u00ed\u00b1\u009e and distance between \u00ed \u00b5\u00ed\u00b1\u009d \u2032 and \u00ed \u00b5\u00ed\u00b1\u009e \u2032 :", "Use compact hashing (e.g., PCA hashing (PCH) or SPICA hashing [9] ) instead of random hash functions like Locality Sensitive Hashing (LSH) [5]."]} +{"44867268|9928823": ["The successful deep learning techniques developed so far share two key attributes [229]: 1) the generative nature of learning model, which typically requires adding an additional top layer to perform discriminative tasks, and 2) the unsupervised pre-training step that makes an effective use of\u2026", "Unsupervised learning [212-214], Supervised learning [221-228], Deep learning [20,229-234], Distance metric learning [263-268], Rank learning [302-306]."]} +{"44867268|2875192": ["Recently, Kumar et al [248] have developed a tool, namely the visual analytics for medical image retrieval (VAMIR), which enables a guided visual exploration of large features in the search space.", "Recently, Kumar et al. [254] have designed a CBIR user interface to assist the user interpretation of retrieved 3D and multi-D medical images.", "CBIR domains and applications Medical imaging [309, 310], Google search-by-example, Apple\u2018s iPhoto, eBay fashion.", "Muller et al. [308] and Kumar [309] provide reviews of CBIR systems in the medical domain.", "Kumar et al. [158] have developed a graph-based framework applied in medical CBIR which represents the relationships of multi-modality image contents on a complete graph.", "[308] and Kumar [309] provide reviews of CBIR systems in the medical domain."]} +{"44867268|14415030": ["Based on many studies [25-34] on image segmentation, image segmentation methods are categorized into eight groups as shown in Figure 2."]} +{"44867268|2616070": []} +{"44867268|8953108": ["[93] Critically affects the performance of successive steps such as", "Thresholding methods have been discussed in [93]."]} +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} +{"13407903|6387482": []} +{"207217044|9928823": []} +{"9823657|1223851": ["Fixation prediction models aim to predict human eye movements [51, 52]."]} +{"9823657|17252389": []} +{"29952402|16403716": ["To overcome several of these limitations, many content-based image retrieval (CBIR) systems have been proposed in recent decades, including QBIC, Photobook, MARS, NeTra, PicHunter, Blobworld, VisualSEEK, SIMPLIcity, and others [1,2]."]} +{"15281206|3693305": []} diff --git a/edge/graph_28085012.jsonl b/edge/graph_28085012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2809360.jsonl b/edge/graph_2809360.jsonl similarity index 100% rename from graph_2809360.jsonl rename to edge/graph_2809360.jsonl diff --git a/graph_2809365.jsonl b/edge/graph_2809365.jsonl similarity index 100% rename from graph_2809365.jsonl rename to edge/graph_2809365.jsonl diff --git a/edge/graph_28124233.jsonl b/edge/graph_28124233.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28126897.jsonl b/edge/graph_28126897.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..842ba8742d3046fd632d14e33f31481a11cd5faa --- /dev/null +++ b/edge/graph_28126897.jsonl @@ -0,0 +1 @@ +{"61286612|14697846": []} diff --git a/edge/graph_28134753.jsonl b/edge/graph_28134753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67b1cd9f6eeea29ea82ccfec0c6e37c4b004b732 --- /dev/null +++ b/edge/graph_28134753.jsonl @@ -0,0 +1,4 @@ +{"6609898|205007974": [", springs and dampers [79]) [80]."]} +{"3467239|1932843": ["The key insight is that, whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling\u2026", "\u2026whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling injured animals to\u2026", "The results also indicate that Intelligent Trial and Error signi\ufb01cantly outperforms previous algorithms for both damage recovery 63,12,64,65,66 and gait learning 67,62,68,48,69,32,61,42,17,49 , and can therefore be considered the state of the art.", "However, state-of-the-art learning algorithms are impractical because of the \u201ccurse of dimensionality\u201d 17 : the fastest algorithms constrain the search to a few behaviors (e.g. tuning only 2 parameters, requiring 5-10 minutes) or require human demonstrations 17 .", "Algorithms without these limitations take several hours 17 .", "7d, maximum p-value over each time step 10 \u2212 16 ), which is the current state of the art technique for direct policy search in robotics 32,61,42,17 .", "42 \u2022 Variant 3 (MAP-Elites in 6 dimensions + policy gradient): evaluates the bene\ufb01t of Bayesian optimization compared to a more classic, local search algorithm 17,62 ; there is no obvious way to use priors in policy gradient algorithms.", "This approach is a classic reinforcement learning algorithm for locomotion 17 and it is a baseline in many papers 32 .", "These results are consistent with the previously published results 62,32,42,17 , which optimize in 4 to 10 dimensions in a few hundred trials."]} +{"3467239|15700537": ["\u2026are expensive, because self-monitoring sensors are expensive, and are dif\ufb01-cult to design, because robot engineers cannot foresee every possible situation: this approach often fails either because the diagnosis is incorrect 12,13 or because an appropriate contingency plan is not provided 14 .", "Current damage recovery in robots typically involves two phases: self-diagnosis, and then selecting the best, pre-designed contingency plan 11,12,13,14 ."]} +{"16028707|1400872": ["Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al.", "Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al., 2002), and statistical learning algorithms (e.g. locally weighted regression ) for dynamical systems\u2026"]} diff --git a/edge/graph_28145007.jsonl b/edge/graph_28145007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2814864.jsonl b/edge/graph_2814864.jsonl similarity index 100% rename from graph_2814864.jsonl rename to edge/graph_2814864.jsonl diff --git a/graph_2814871.jsonl b/edge/graph_2814871.jsonl similarity index 100% rename from graph_2814871.jsonl rename to edge/graph_2814871.jsonl diff --git a/graph_281665.jsonl b/edge/graph_281665.jsonl similarity index 100% rename from graph_281665.jsonl rename to edge/graph_281665.jsonl diff --git a/edge/graph_28170508.jsonl b/edge/graph_28170508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbd01cef204ed1d461e060dba35492d9531d703f --- /dev/null +++ b/edge/graph_28170508.jsonl @@ -0,0 +1,23 @@ +{"54060494|469744": ["AR is used in many different areas, including training aid for surgery [16], maintenance and repair, annotation, robot path planning, entertainment, and military aircraft navigation and targeting [1]."]} +{"15575030|469744": ["Azuma (1997) mentions three criteria that have to be fulfilled for a system to be classified as an AR system: they all combine the real and the virtual, they are supposedly interactive in real time (meaning that the user can interact with the system and get response from it without delay), and they are registered and aligned in three dimensions [1].", "Technically, there are two principally different solutions for merging reality and virtuality in real time today \u2013 video seethrough and optic see-through [1, 2, 16].", "A way to overcome the problems with optic see-through is by using a camera in front of the users\u2019 eyes, and then projecting the camera image on a small display in front of the users\u2019 eyes [1, 8, 16].", "2.1 Augmented Reality Azuma (1997) mentions three criteria that have to be fulfilled \nfor a system to be classified as an AR system: they all combine the real and the virtual, they are supposedly \ninteractive in real time (meaning that the user can interact with the system and get response from it\u2026"]} +{"12049258|469744": ["analysis, and communication systems [10], [11], [13], [14], [15], [16], [17]."]} +{"15904153|206986719": []} +{"15904153|469744": ["Researcher such as Azuma (1997) tended to present a definition of AR based on a system that fulfills three basic criteria: (1) combination of real and virtual, (2) interactive in real time, and (3) 3D registration of virtual and real objects. A similar definition is proposed by other researchers (H\u00f6llerer & Feiner, 2004; Kaufmann, 2003; Zhou, Duh & Billinghurst, 2008), who define AR based on its features which the real and computer-generated information are combined in a physical world, interactively in real time, and display virtual object intrinsically align to real world orientation. Besides that, Klopfer and Squire (2008) give an even broader perspective on AR, stating it as a situation in which a real world context is dynamically overlaid with coherent location or context sensitive virtual information.", "Researcher such as Azuma (1997) tended to present a definition of AR based on a system that fulfills three basic criteria: (1) combination of real and virtual, (2) interactive in real time, and (3) 3D registration of virtual and real objects. A similar definition is proposed by other researchers (H\u00f6llerer & Feiner, 2004; Kaufmann, 2003; Zhou, Duh & Billinghurst, 2008), who define AR based on its features which the real and computer-generated information are combined in a physical world, interactively in real time, and display virtual object intrinsically align to real world orientation. Besides that, Klopfer and Squire (2008) give an even broader perspective on AR, stating it as a situation in which a real world context is dynamically overlaid with coherent location or context sensitive virtual information. A less inclusive definition is provided by Martin et al., (2011) who indicated that the term AR is a system that is basically merging information such as images with video streamed from a webcam while as El Sayed, Zayed, and Sharawy (2011) states in their recent article, they describe AR as technology of adding virtual objects to real scenes through enabling the addition of missing information in real life.", "Researcher such as Azuma (1997) tended to present a definition of AR based on a system that fulfills three basic criteria: (1) combination of real and virtual, (2) interactive in real time, and (3) 3D registration of virtual and real objects."]} +{"17288395|45775424": ["Survey by [24], for example, has shown that out of 161 publications, only 2 focused on collaborative learning."]} +{"17288395|206986719": []} +{"17288395|469744": ["Moreover, an augmented reality (AR) is closely-tied to a virtual reality (VR), because AR is believed to be a variation or extension of VR [11].", "Furthermore, [11] as well as [12] and [13] have characterized AR systems by three properties: (a) combination of real and virtual objects, (b) interactive in real time, and (c) 3D registration of the virtual and real objects According to [14], AR could also be broadly defined as a technology that\u2026"]} +{"111323280|469744": ["Azuma (1997) defines AR as a variation of virtual environments (VR)."]} +{"54817075|469744": ["Azuma [21] defined AR as a variation of virtual reality that helps users to see the real world through virtual objects."]} +{"19019748|469744": ["Presently, AR is applied extensively in the fields of education, medical technology, military training, engineering, industrial design, arts, and entertainment (Azuma, 1997; Azuma, et al., 2001)."]} +{"145721344|469744": ["Azuma (1997) offers further definition by characterizing AR as bringing together the real and the virtual, allowing for interactivity in real time, and manifesting in three dimensions (3-D). Within the context of environmental design education, Blalock and Carringer (2006) identify five AR system affordances supportive of human inquiry: rapid and accurate object identification (especially in stripped down environments), invisible feature identification and exploration; the layering of multiple information sources; readily apparent object relationships; and easy manipulation of perspectives.", "Azuma (1997) offers further definition by characterizing AR as bringing together the real and the virtual, allowing for interactivity in real time, and manifesting in three dimensions (3-", "Azuma (1997) offers further definition by characterizing AR as bringing together the real and the virtual, allowing for interactivity in real time, and manifesting in three dimensions (3-D).", "Azuma (1997) offers further definition by characterizing AR as bringing together the real and the virtual, allowing for interactivity in real time, and manifesting in three dimensions (3-D). Within the context of environmental design education, Blalock and Carringer (2006) identify five AR system affordances supportive of human inquiry: rapid and accurate object identification (especially in stripped down environments), invisible feature identification and exploration; the layering of multiple information sources; readily apparent object relationships; and easy manipulation of perspectives. Whether designing a new landscape or practicing a surgical procedure, these AR affordances not only offer alternatives to real experiences but even offer opportunities to expand on what is possible in a real-world learning environment. Virtual reality can be distinguished from AR in that an individual is immersed in a completely synthetic environment (Milgram & Kishino, 1994) where natural laws (e.g., gravity, time, etc.) likely do not apply. Second Life (2007) is an example of a Web-based VR world growing in popularity and grabbing the attention of researchers interested in its educational potential."]} +{"10959831|469744": []} +{"207222616|206986719": ["Many early research and current commercial AR applications have emphasised the value of AR for guidance and information \ufb01nding in domains such as maintenance, medicine, navigation and more [37]."]} +{"207222616|469744": ["We suggest that the potential for AR to superimpose interactive virtual information onto immediate reality [1] extends beyond typical guidance and information finding, to offer support for more complex cognitive skills."]} +{"38564611|11266709": ["To sum up, a temporary result found in this paper is that there are three main aspects of science learning afforded by image-based AR, including spatial ability (Kerawalla et al. 2006 (Shelton and Stevens 2004).", "\u2026several articles included in this paper afford learners\u2019 spatial ability (Kerawalla et al. 2006; Mar-t\u0131\u00b4n-Gutie\u00b4rrez et al. 2010; Nu\u00b4n\u02dcez et al. 2008; Shelton and Stevens 2004), spatial cognition, which concerns knowledge or beliefs about spatial properties (e.g., size, shape, location, or\u2026", "Several studies regarding image-based (Kerawalla et al. 2006; Shelton and Stevens 2004) and location-based AR (Dunleavy et al. 2009; O\u2019Shea et al. 2011; Rosenbaum et al. 2007; Squire and Jan 2007; Squire and Klopfer 2007) reviewed in this paper have highlighted and investigated participants\u2019\u2026", "Moreover, setting with a projector in a traditional classroom, students can operate the card with an AR marker to control the 3D objects on a projected screen (Nu\u00b4n\u02dcez et al. 2008) or a whiteboard (Kerawalla et al. 2006).", "Similarly, in the \ufb01eld of astronomy, Shelton and Stevens (2004) also used an image-based AR system (with HMD) to provide a way to understand the spatial concept of Earth\u2013Sun relationships, as well as to make a conceptual (2011) was devoted to assisting students to learn about the importance of the\u2026", "\u2026(Mart\u0131\u00b4n-Gutie\u00b4rrez et al. 2010), qualitative analyses were also used to investigate the learning outcomes in image-based AR (Kerawalla et al. 2006; Shelton and Stevens 2004) and location-based AR-related learning (Dunleavy et al. 2009; O\u2019Shea et al. 2011; Rosenbaum et al. 2007; Squire and Jan\u2026", "Also, from the aspect of usability evaluation, the acceptance, ease to use, and acknowledgment of the effectiveness of the image-based AR systems were indicated by the users\u2019 responses (Andu\u00b4jar et al. 2011; Eursch 2007; Koong Lin et al. 2011; Nu\u00b4n\u02dcez et al. 2008).", "One possible reason is that most studies focus on the design and evaluation of a newly developed system (Andu\u00b4jar et al. 2011; Eursch 2007; Koong Lin et al. 2011; Nu\u00b4n\u02dcez et al. 2008).", "For inorganic chemistry education, the image-based AR setup in a multimedia classroom could support students in developing spatial intuition regarding the 3D arrangement of crystalline structures (Nu\u00b4n\u02dcez et al. 2008).", "Relatively, the learning processes and outcomes of AR-related research have been explored by very few image-based AR studies (Kerawalla et al. 2006; Mart\u0131\u00b4n-Gutie\u00b4rrez et al. 2010; Shelton and Stevens 2004).", "The consequent mental models may also relate to a personal cognition [e.g., conceptual understanding or changes in image-based AR (Kerawalla et al. 2006 Due to the fact that several articles included in this paper afford learners\u2019 spatial ability (Kerawalla et al. 2006; Mar-t\u0131\u00b4n-Gutie\u00b4rrez et al. 2010; Nu\u00b4n\u02dcez et al. 2008; Shelton and Stevens 2004), spatial cognition, which concerns knowledge or beliefs about spatial properties (e.g., size, shape, location, or direction) of objects and events in the world (Montello 2001), could be an essential theoretical framework to guide AR research either in image-based or in location-based settings.", "\u2026applications (Johnson et al. 2011), several studies have probed its effects on science education regarding the issues of conceptual change (Shelton and Stevens 2004), laboratory work (Andu\u00b4jar et al. 2011), inquiry-based learning (Squire and Klopfer 2007), scienti\ufb01c argumentation (Squire\u2026", "Most of the studies regarding the utilization of image-based AR did not clearly explore the students\u2019 learning process or examine their learning outcomes, except for those studies undertaken by Kerawalla et al. (2006), Mart\u0131\u00b4n-Gutie\u00b4rrez et al. (2010), and Shelton and Stevens (2004).", "These studies have extended this characteristic to enhance learners\u2019 scienti\ufb01c spatial ability (Ker-awalla et al. 2006; Mart\u0131\u00b4n-Gutie\u00b4rrez et al. 2010; Nu\u00b4n\u02dcez et al. 2008; Shelton and Stevens 2004), conceptual understanding (Koong Lin et al. 2011), and conceptual change (Shelton and Stevens 2004).", "Moreover, Shelton and Stevens (2004) used iterative videotape analysis to qualitatively explore university students\u2019 learning processes and outcomes regarding conceptual change in an AR exercise."]} +{"38564611|469744": ["The de\ufb01nition of AR commonly adopted by relevant studies is what Azuma (1997) described as a variation of VR.", "The HMD devices which are used to combine real-world and computer-generated information are often categorized into two forms: optical see-through and video see-through (Azuma 1997).", "To avoid limiting AR to speci\ufb01c technologies or required devices such as head-mounted displays (HMD), Azuma (1997) identi\ufb01ed three characteristics of AR: (1) combines real and virtual, (2) interactive in real time, and (3) registered in 3D. Recently, instead of emphasizing the 3D characteristic,\u2026"]} +{"11204391|469744": ["There are different definitions and classifications of AR: Azuma [6] describes AR as a variation of Virtual Reality (VR), a technology which consists of the complete immersion of a user inside a synthetic environment."]} +{"17065543|469744": ["Hands and Speech in Space: Multimodal Interaction with Augmented Reality interfaces Mark Billinghurst \nHuman Interface Technology Laboratory New Zealand University of Canterbury Ilam Road, Christchurch, New \nZealand +64-3-364-2349 mark.billinghurst@hitlabnz.org ABSTRACT Augmented Reality (AR) is technology \nthat allows virtual imagery to be seamlessly integrated into the real world.", "\u2026in Space: Multimodal Interaction with Augmented Reality interfaces Mark Billinghurst \nHuman Interface Technology Laboratory New Zealand University of Canterbury Ilam Road, Christchurch, New \nZealand +64-3-364-2349 mark.billinghurst@hitlabnz.org ABSTRACT Augmented Reality (AR) is technology\u2026"]} +{"207032943|469744": ["Augmented reality brings virtual information into a user\u2019s physical environment and allows the user to user their whole body to interact with the virtual content [1, 2]."]} +{"791733|469744": ["In 1997, the first author published a survey [ 3 ] (based on a 1995 SIGGRAPH course lecture) that defined the field, described many problems, and summarized the developments up to that point."]} +{"60555285|469744": ["Azuma, Yohan, Reinhold, Steven, Simon and Blair (2001) remarked that although many research systems have been developed, only a few have matured beyond laboratory based prototypes, and social acceptance issues need to be addressed before they can be accepted more widely.", "However, the definition by Azuma (1997) is widely accepted as a \u201cbenchmark\u201d to describe AR and MR."]} +{"17713223|469744": []} diff --git a/edge/graph_28178187.jsonl b/edge/graph_28178187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2846b3bd9b4546efe2355a0da4b7c411590c20e9 --- /dev/null +++ b/edge/graph_28178187.jsonl @@ -0,0 +1,2 @@ +{"17728293|28178187": []} +{"17728293|239537": ["According to [5], there are three major methods for graph layouting: force-directed, hierarchical and topology-shape-metrics, where the force directed method introduced by [7] is most used today, despite its disadvantageous behavior in interactive systems [14]."]} diff --git a/graph_2818055.jsonl b/edge/graph_2818055.jsonl similarity index 100% rename from graph_2818055.jsonl rename to edge/graph_2818055.jsonl diff --git a/edge/graph_28191500.jsonl b/edge/graph_28191500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28203953.jsonl b/edge/graph_28203953.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dbc5f3054d287e33275ccd09217861b6bc24b42 --- /dev/null +++ b/edge/graph_28203953.jsonl @@ -0,0 +1,9 @@ +{"22049746|6430931": ["R The use of computational intelligence methods in the IDS realm has been well documented in the 2010 survey compiled by Wu and Banzhaf [73].", "E Rough sets and fuzzy cognitive maps have been independently applied to network intrusion detection [8, 73], although the number of reported works thus far is not sig-113 ni\ufb01cant compared to the volume of documented applications of other CI techniques."]} +{"30725538|7782275": [", problems\u2019 features) to un654 derstand how learning models can become flexible in solving different kinds 655 of classification problems [76]."]} +{"30725538|2746910": []} +{"30725538|11608263": ["More complex classification problems include learning in presence of 13 class imbalance [2] [3], class noise [4], partially labeled data [5] or multiple 14 decision classes per object [6] [7] [8], among other scenarios."]} +{"30725538|7158350": ["Decision trees [9], neural networks [10], 18 rule-based models [11], Bayesian networks [12], support vector machines [13] 19 or k-nearest neighbors learners [14] stand among the most popular classifiers, 20 each having its own inherent advantages and limitations."]} +{"27859934|10739218": []} +{"3039526|39332633": []} +{"3039526|11608263": ["GMLC [5] was formalized as an extension of multilabel classification problems [3] where one is interested in the degree of association between a data point and a label.", "More recently, multilabel classification [3] [4] has emerged as an extension of traditional classification problems in which each input object is associated with multiple labels; for instance, a patient and his symptoms, a document and its topics or a photograph and its themes."]} +{"12622368|10739218": []} diff --git a/edge/graph_28209458.jsonl b/edge/graph_28209458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..280fd2e351da83abdc11b58a2bc626506643f389 --- /dev/null +++ b/edge/graph_28209458.jsonl @@ -0,0 +1,19 @@ +{"18754779|2261490": []} +{"18754779|14889616": []} +{"706371|18148591": ["Inter-cell interference is treated as noise at the receiver side and is handled by resorting to improved point-to-point communications between the base station (BS) and the mobile station (MS), using efficient coding and/or single-link multiple-antenna techniques [2]."]} +{"207223163|15247126": ["A covert channel tries to hide the very existence of any communication [Lampson 1973; Zander et al. 2007] by using a channel that is usually not intended for communication (e.g., timing information in between packets or unused bits in the IP header).", "Afterward, adversary could use covert channels [Zander et al. 2007] to send sensitive data outside the protected network."]} +{"207223163|14697846": []} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"12655150|2457428": ["The group key upgrade of group communication has been widely studied, and it is out of scope for this paper and speci\ufb01c technology can be found in reference [37,38]."]} +{"21391909|29060869": ["The authors in [153], distinguish their work from previous surveys", "In [153], a comprehensive survey on the smart grid-driven approaches in energy-efficient communications and data cen-", "like in smart grid in order to ensure energy efficiency and reliability [153]."]} +{"21391909|12029139": ["[12] present an extensive literature review on RF energy harvesting networks", "These include much greater spectrum allocations at untapped mmWave frequency spectrum bands [13], [22], highly directional massive beamforming antennae at both the mobile devices and BSs [18], [22], longer battery life sustained by energy harvesting techniques [12], full-duplexing communications (FDCs) [21], lower outage probability, much", "energy is predictable and relatively stable over time due to fixed distance [12].", "Authors in [12] have also discussed an RF-powered CR network whereby the RF energy harvesting capability allows secondary users to harvest and store energy from nearby trans-", "The authors in [12], also add that multi-hop RF-EHNs via cooperative relaying techniques can help to overcome fading and attenuation by using intermediate relay nodes, resulting in improved network performance in terms of efficiency and reliability.", "There are several advantages of the RF energy-harvesting techniques for the 5G RAN systems that has been identified in literature [12].", "energy within the 5G RAN systems [12], [13].", "The authors in [12], assert that one of the key concerns for RF information and energy transfer is the decay in energy transfer efficiency with the increase of transmission distance due to propagation path loss.", ", through innovative energy harvesting), will be a crucial component of the design [2], [12].", "Typically, the macrocells are served by high power base stations (MeNBs) with transmit powers close to 43 dBm and antennae gains close to 12 \u2212 15 dBi [12]."]} +{"21391909|2443013": ["(CCs) dispersed within and across different bands (intra/interband) thereby boosting the user throughput in LTE-Advanced (LTE-A) as well as the future 5G RAN systems [75].", "heavy computational burden and a huge amount of the CSI feedback [75]."]} +{"21391909|8974063": ["[108] and Tsiropoulos et al."]} +{"21391909|5338241": []} +{"21391909|7686677": ["generation wireless networks is a growing concern for operators not only for profitability maintenance but also for the overall adverse environmental effects reduction [124], [142].", "2) Dynamic Power Saving (DPS) Techniques: Several researchers have presented research trends, exposed some research issues and challenges and suggested some techniques for the green cellular networks [124], [143]."]} +{"30537028|6670217": []} +{"18183485|14271395": ["In order to take advantage of the existing e\ufb00ective tools that work in the symbolic model but, at the same time, obtain the stronger security guarantees of the computational model, a line of research focuses on so-called Computationally Sound frameworks, e.g. [16,28,33,31,30]."]} +{"11495876|14441987": []} diff --git a/edge/graph_28210495.jsonl b/edge/graph_28210495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d107dd1d7b965124cd8b8f88abe91e8a48ef7bd6 --- /dev/null +++ b/edge/graph_28210495.jsonl @@ -0,0 +1 @@ +{"26813944|7876633": ["The agents dynamically allocate resources by routing traffic demands in an optimal way, lowering cost and optimizing performance [28] [29]."]} diff --git a/edge/graph_28210515.jsonl b/edge/graph_28210515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c8adc57801515b91d83b8d5f1645d4b46137b50 --- /dev/null +++ b/edge/graph_28210515.jsonl @@ -0,0 +1,2 @@ +{"7858690|1236072": []} +{"14273842|1230643": ["Environmental monitoring, battlefield intelligence, emergency response support, and real-time data fusion and collection are among their frequently cited applications [2] [12] [14] [8]."]} diff --git a/graph_282697.jsonl b/edge/graph_282697.jsonl similarity index 100% rename from graph_282697.jsonl rename to edge/graph_282697.jsonl diff --git a/graph_2828886.jsonl b/edge/graph_2828886.jsonl similarity index 100% rename from graph_2828886.jsonl rename to edge/graph_2828886.jsonl diff --git a/graph_2829149.jsonl b/edge/graph_2829149.jsonl similarity index 100% rename from graph_2829149.jsonl rename to edge/graph_2829149.jsonl diff --git a/edge/graph_28294111.jsonl b/edge/graph_28294111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2830636.jsonl b/edge/graph_2830636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2832085.jsonl b/edge/graph_2832085.jsonl similarity index 100% rename from graph_2832085.jsonl rename to edge/graph_2832085.jsonl diff --git a/graph_2833151.jsonl b/edge/graph_2833151.jsonl similarity index 100% rename from graph_2833151.jsonl rename to edge/graph_2833151.jsonl diff --git a/edge/graph_28340539.jsonl b/edge/graph_28340539.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a06956956a363cf0bc03b7d1bb35f5839eebfa7 --- /dev/null +++ b/edge/graph_28340539.jsonl @@ -0,0 +1,2 @@ +{"15993798|28340539": [", they do not take into account rebound effects that may (partly) compensate for the substitution effect, because people will spend the time or money saved on trips either for additional trips or for other activities with relevant environmental impacts (see also Gossart [38], in this volume).", "These macro-level estimates usually assume that a 1:1 substitution takes place, i.e., they do not take into account rebound effects that may (partly) compensate for the substitution effect, because people will spend the time or money saved on trips either for additional trips or for other activities with relevant environmental impacts (see also Gossart [38], in this volume)."]} +{"5731287|28340539": ["\u2022 Gossart [30] provides a review of the literature on rebound effects counter-acting ICT-induced progress in energy ef\ufb01ciency."]} diff --git a/graph_2835258.jsonl b/edge/graph_2835258.jsonl similarity index 100% rename from graph_2835258.jsonl rename to edge/graph_2835258.jsonl diff --git a/edge/graph_28368285.jsonl b/edge/graph_28368285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28369267.jsonl b/edge/graph_28369267.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2837012.jsonl b/edge/graph_2837012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28385769.jsonl b/edge/graph_28385769.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a16144f0723761a1251a1b8f835170dd33975067 --- /dev/null +++ b/edge/graph_28385769.jsonl @@ -0,0 +1 @@ +{"25900262|9104850": []} diff --git a/edge/graph_2839618.jsonl b/edge/graph_2839618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2840272.jsonl b/edge/graph_2840272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2840997.jsonl b/edge/graph_2840997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47f3b758a328afb4bf8d2ce52ec525110b3bc50c --- /dev/null +++ b/edge/graph_2840997.jsonl @@ -0,0 +1 @@ +{"61218849|15040462": []} diff --git a/edge/graph_2843620.jsonl b/edge/graph_2843620.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28440727.jsonl b/edge/graph_28440727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..864d27102b2f014d27aa31212440f6055bda482a --- /dev/null +++ b/edge/graph_28440727.jsonl @@ -0,0 +1,16 @@ +{"1301344|1230643": []} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"46357969|1230643": ["WSNs consist of sensor nodes with limited capacity, low cost and communicating with each other in short distances using considerably low power rate [1]."]} +{"18043097|14745481": ["Authentication, Authorization and Accounting (AAA) are key mechanisms for increasing the trustworthiness of CRNs."]} +{"110506701|1230643": ["The rapid deployment, self-organization and fault tolerance characteristics of wireless sensor networks make it a very promising sensing technique for military, environmental and health [1]."]} +{"1940388|17205659": ["Besides implementing the security goal discussed above, the following metrics are also important to evaluate whether a security scheme is appropriate for WSNs [7], [8].", "A few existing surveys on security issues in WSNs can be found [7], [8]."]} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"59851800|2383780": ["Observe-Orient-Decide-Act (OODA) [28], Omnibus [29], Waterfall [30] and the UK Intelligence Cycle [31]), and role-based models (e."]} +{"59851800|622308": ["Observe-Orient-Decide-Act (OODA) [28], Omnibus [29], Waterfall [30] and the UK Intelligence Cycle [31]), and role-based models (e."]} +{"8428336|1230643": ["with the limited resources available to most ad hoc and wireless sensor network (WSN) nodes [1]."]} +{"30245703|1940388": ["A number of countermeasures have been introduced for thwarting these attacks, mainly focusing on intrusion detection, and cryptographic schemes [12]."]} +{"39423462|28440727": []} diff --git a/edge/graph_28444948.jsonl b/edge/graph_28444948.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28457848.jsonl b/edge/graph_28457848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81ce194251d5d73298ddcd9b360464482095aa50 --- /dev/null +++ b/edge/graph_28457848.jsonl @@ -0,0 +1,8 @@ +{"22299901|14868015": []} +{"9300595|4474193": ["A DOP is di\ufb00erent from a static optimization problem only if the DOP is solved in an on-line manner [6, 9], i.e., the algorithm for DOPs has to provide solutions repeatedly as time goes by.", "Applying population-based search algorithms to solving Dynamic Optimization Problems (DOPs) has become very active [6, 13] as most real-world optimization problems are subject to environmental changes."]} +{"2956742|8530790": []} +{"11661272|19632381": []} +{"109283997|8530790": []} +{"11921446|28457848": []} +{"206682327|4474193": []} +{"206682327|8113021": ["Elaborations on some of the applications cited above are available in [71] and [78]."]} diff --git a/edge/graph_28465771.jsonl b/edge/graph_28465771.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0478821d5383137bbcc2e99b97a2401b3ca7137 --- /dev/null +++ b/edge/graph_28465771.jsonl @@ -0,0 +1 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_28468602.jsonl b/edge/graph_28468602.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6438dd7f62fd5e3a9e91ca6f6a7cad2199ea22e9 --- /dev/null +++ b/edge/graph_28468602.jsonl @@ -0,0 +1,3 @@ +{"13039013|10500613": ["To validate this link between PPO (handling mainly product data and information) and WindChill (managing the project and company organisation), an application case was defined: the portative drill machine [originally proposed by Roucoules et al. (2006) and Dufaure and Teissandier (2006)]."]} +{"6526656|10500613": ["See [21,14,23] for surveys on ontology and schema mappings in general."]} +{"6526656|913718": ["See [21,14,23] for surveys on ontology and schema mappings in general.", "A more restricted conception of the term is used in surveys [6,23] or alignment API [7], that conceive alignments as pairs of elements of the ontologies 2 , together with information on the type of the relation and the con\ufb01dence in its correctness."]} diff --git a/edge/graph_2847597.jsonl b/edge/graph_2847597.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28476435.jsonl b/edge/graph_28476435.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2847792.jsonl b/edge/graph_2847792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28487730.jsonl b/edge/graph_28487730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b73c946563a331cc1d1cf8a6b34e465ff98008a --- /dev/null +++ b/edge/graph_28487730.jsonl @@ -0,0 +1,4 @@ +{"255295|1230643": []} +{"1044435|2905017": []} +{"1044435|2187403": []} +{"1044435|1113420": []} diff --git a/edge/graph_28496209.jsonl b/edge/graph_28496209.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28441f4c5cb3c42035c59284cd32c0d28964532e --- /dev/null +++ b/edge/graph_28496209.jsonl @@ -0,0 +1,3 @@ +{"205823407|11762115": []} +{"36229286|7440843": []} +{"11762115|6988077": []} diff --git a/edge/graph_28508594.jsonl b/edge/graph_28508594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28518402.jsonl b/edge/graph_28518402.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7599772c4d9bd5437d144aa76c343633b8b2dcd9 --- /dev/null +++ b/edge/graph_28518402.jsonl @@ -0,0 +1 @@ +{"10642170|880321": []} diff --git a/edge/graph_28520128.jsonl b/edge/graph_28520128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ca6cae6fd153f7d812d08e2e78c2061bc814628 --- /dev/null +++ b/edge/graph_28520128.jsonl @@ -0,0 +1,33 @@ +{"11235792|1230643": []} +{"29484353|12604503": ["In recent years, WSNs have been used for various important applications like environmental monitoring [2], early detection of forest fire [3], real-time target tracking [4], cloud computing [5], security surveillance [6], multimedia [7], structural monitoring [8], and health care [9]."]} +{"1840653|2835258": ["In large scale ad hoc networks, node localization can assist in routing [1], [2], [3]."]} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"18761676|3348390": ["Context awareness may provide a great support to process and store the Big Data, and to make their interpretation easier [330]."]} +{"18761676|16209841": ["To ensure security of data, services and entire IoT system, a series of properties, such as confidentiality, integrity, authentication, authorization, non-repudiation, availability, and privacy, must be guaranteed [228,229]."]} +{"18761676|270804": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"18761676|205286988": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"16935329|6396569": []} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"18015668|14441987": ["Furthermore, some applications only require relative positions of nodes, such as some direction-based routing algorithms [4], [5]."]} +{"110097988|2835258": ["It is essential when nodes perform jointly certain tasks, such as decision making, sensor data fusion, object tracking [3\u20137] to localize the node positions and movement [2, 8, 9], as the transmitter range is generally fairly small with respect to the size of the area."]} +{"18060622|10658846": ["\u2026of MC based on methods a variety of variance reduction techniques have been developed during the last decades [20].at the same time Power Management is an important area of research [28] [29] because of an increasing trend in the usage of portable, mobile, and hand-held electronic devices."]} +{"17264210|1230643": ["For many applications, the localization among sensor nodes is a fundamental issue because WSNs may be deployed in inaccessible terrains or disaster relief operations [1]."]} +{"16110787|17325804": []} +{"6010936|1236072": []} +{"18662726|6396569": ["[1]) has shown that using mobile nodes (e."]} +{"114691345|10096622": ["Swarm intelligence is one of the well-researched examples [12]."]} +{"30552699|6396569": []} +{"30552699|17205659": ["WSN has many limitations such as small memory, limited energy resources, and use of insecure channels in communication; these problems make security in WSN a challenge [62]."]} +{"30552699|8767649": ["Their potential of doing work is way far better than that of single robot system [73]."]} +{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]} +{"61867103|1230643": []} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"15708239|1236072": ["From [1], one of the IEEE 802.15.4 physical layers operates in the 2.4 GHz industrial, scientific and medical band with nearly worldwide availability; this band is also used by other IEEE 802 wireless standards."]} +{"10897139|16514036": ["Sensor nodes can be used to build body area networks [7], smart homes [5] and intelligent environments [14]."]} +{"10897139|2762484": ["The proposed practical uses of WSNs include areas such as environmental sensing [19, 20, 32], industrial monitoring, military applications [18], on-site tracking of materials [23] and security monitoring [18]."]} +{"41849031|206583375": []} +{"13314133|3117516": ["Energy efficiency is directly related to effective data routing wherein cluster of nodes is formed to reduce the energy consumption and control overhead while limiting the interference among the sensor nodes [13]."]} +{"13314133|12817488": ["In the literature, many earlier approaches employ the flat sensor networks for data aggregation [19, 20]."]} diff --git a/graph_2853514.jsonl b/edge/graph_2853514.jsonl similarity index 100% rename from graph_2853514.jsonl rename to edge/graph_2853514.jsonl diff --git a/graph_2854761.jsonl b/edge/graph_2854761.jsonl similarity index 100% rename from graph_2854761.jsonl rename to edge/graph_2854761.jsonl diff --git a/edge/graph_28551720.jsonl b/edge/graph_28551720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28577245.jsonl b/edge/graph_28577245.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c750a62b0c2fc22bd5a0f3e2ca7793ae0c96cee2 --- /dev/null +++ b/edge/graph_28577245.jsonl @@ -0,0 +1 @@ +{"7888391|9270553": ["A brain-computer interface (BCI) is an alternative communication and control channel that does not depend on the brain\u2019s normal output pathway of peripheral nerves and muscles [11] .", "Some scientists exploit evoked potentials, or the automatic responses of the brain to external stimuli [11]; evoked potentials are, in principle, easily picked up but require subjects to synchronize themselves to the external machinery.", "A BCI can also be used to control external devices (such as to open and close a hand orthosis) [6, 11]."]} diff --git a/edge/graph_28595459.jsonl b/edge/graph_28595459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef2a44663cca4e792f36e87305dda24599fa92d2 --- /dev/null +++ b/edge/graph_28595459.jsonl @@ -0,0 +1,6 @@ +{"110361521|6607209": ["Dias et al. [14, 15 ] first use the concept of market based for multiple robots that cooperate for achieving a common goal."]} +{"17203637|5401262": []} +{"17203637|17516538": []} +{"17203637|987239": []} +{"17203637|7185733": []} +{"17203637|7788290": ["Among the various motion analysis related surveys, Gavrilla [2], Moeslund et al. [6] [18], Buxton [20], Wang et al. [19], Aggarwal et al. [3] [21] [23] covered the issues related to human motion recognition extensively."]} diff --git a/edge/graph_28609200.jsonl b/edge/graph_28609200.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28609491.jsonl b/edge/graph_28609491.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28610709.jsonl b/edge/graph_28610709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cadb0a5c51fd0b21291284853e05f449d5c27ff2 --- /dev/null +++ b/edge/graph_28610709.jsonl @@ -0,0 +1,6 @@ +{"5768408|12127129": ["A good review of the state-of-the art on 2D-background subtraction methods can be found here [21]."]} +{"34221593|396631": []} +{"13181540|14970359": []} +{"6253283|396631": ["(invited paper) [16] Hideyoshi Horimai, \u201c360 degree viewable 3D Display \u201cHolo-Table\u201d\u201d, Joint Collaborative Team on 3D Video Coding Extension Development of ITU-T SG 16 WP 3 and ISO/IEC JTC 1/SC 29/WG 11 (MPEG), JCT3V-C0234, M28301, January 2013.", "(invited paper) [5] Masayuki Tanimoto, \u201cFTV (Free-viewpoint Television)\u201d, APSIPA Transac-tions on Signal and Information Processing, Vol. 1, Issue 1, e4 (14 pages) (August 2012). doi: 10.1017/ATSIP.2012.5 (invited paper) [6] \u201cIntroduction to Multi-view Video Coding\u201d, ISO/IEC JTC1/SC29/WG11 N7328, July 2005. http://www.chiariglione.org/mpeg/technologies/mpmv/index.htm [7] \u201cIntroduction to 3D Video\u201d, ISO/IEC JTC1/SC29/WG11 N9784, May 2008. http://www.chiariglione.org/mpeg/technologies/mp3d/index .htm [8] M. Tanimoto, T. Senoh, S. Naito, S. Shimizu, H. Horimai, M. Doma\u0144ski, A. Vetro, M. Preda and K. Mueller, \u201cProposal on a New Activity for the Third Phase of FTV,\u201d ISO/IEC JTC1/SC29/WG11 MPEG2013/M30229, Vienna, Austria, July 2013.", "[10] \u201cApplications and Requirements on 3D Video Coding\u201d, ISO/IEC JTC1/SC29/WG11 N10570, April 2009.", "Then, MVC (Multi-view Video Coding) [9] started as the coding part of FTV.", "[9] A. Vetro, T. Wiegand, and G. J. Sullivan, \u201cOverview of the Stereo and Multiview Video Coding Extensions of the H.264/MPEG-4 AVC Standard\u201d, Proc.", "[11] \u201cStandardization Tracks Considered in 3D Video Coding,\u201d ISO/IEC JTC1/SC29/WG11 MPEG, N12434, December 2011.", "MVC (Multi-view Video Coding) [6] was the first phase of FTV, which enabled the efficient coding of multiple camera views.", "Then, MVC (Multi-view Video Coding) [9] started as the coding part of FTV. MVC was the first phase of FTV."]} +{"15154116|17516538": []} +{"1393200|396631": []} diff --git a/edge/graph_28628245.jsonl b/edge/graph_28628245.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..999780e1582d1ed26ba151c022cee6d5a4580cdd --- /dev/null +++ b/edge/graph_28628245.jsonl @@ -0,0 +1,23 @@ +{"16437182|562065": ["WSNs have been applied to many areas such as military applications [3], health care [4], traffic surveillance [5], environmental monitoring [6], habitat [7] and many other areas [8]."]} +{"16437182|1483907": ["Hence, QoS in WSNs can be characterized by reliability, timeliness, robustness, availability, security, etc. [9].", "The throughput, delay, jitter, and packet loss rate are the most fundamental parameters [9] to measure the satisfaction degree of these services."]} +{"16437182|1236072": ["The growing interest for applications requiring assured end-to-end QoS guarantees have raised additional challenges to QoS-based routing in WSNs cited in [10], [11] and [12]."]} +{"16437182|1230643": ["These nodes collaborate to accomplish a common task by collecting data, performing local processing and then routing the results to destination node named sink using short-range transmissions [1]."]} +{"2542827|14441987": ["Initially a source floods a route request packet as shown in figure 7. A route reply is generated either by the destination or an intermediate node, which contains an unexpired route to a destination in its route cache [ 13 ]."]} +{"14182585|17205659": []} +{"45055425|12347712": ["Sensor networks are constrained in resources as compare to other wireless networks [ 11 ]."]} +{"24318293|17205659": ["wormhole [32\u201335], rushing [36], routing loops [15], fake route reply, fairness reduction [29, 37], node isolation, jellyfish [38, 39], sybil [37] and byzantine [40, 41]."]} +{"1928156|17205659": ["The comparison of attacks in WSN is shown in TABLE I [5,10,11]."]} +{"15199849|1940388": []} +{"15199849|17205659": ["Attacks in sensor networks do not just involve the alteration of packets; adversaries can also inject additional false packets [14]."]} +{"42695702|17205659": []} +{"8923358|17205659": ["CSROR is resilient to packet dropping attacks such as blackhole grayhole [4,23] and packet misdirecting attacks such as wormhole attacks [10,15,29,30]."]} +{"11135536|1230643": ["This technology has mainly been made possible by the convergence of micro-electromechanical systems technology, wireless communications, and digital electronics, enabling the construction of low-cost, lowpower, multifunctional sensor nodes that are small in size and communicate untethered in short distances, thus forming the sensor network [93]."]} +{"11135536|14441987": ["Data Dispersal This approach is based on Rabin\u2019s algorithm [11], which takes advantage of the existence of multiple routes from a source to a destination to increase reliability when transmitting packets.", "in [11]; it has been omitted since it requires a rigorous mathematical pre-", "(A survey of the two classes of routing protocols is available in [11]."]} +{"16694529|205286988": []} +{"16694529|2835258": ["Others focus only on certain aspects, like mobility [10] or forwarding strategies and the local minima problem [11].", "While some surveys are very detailed covering numerous algorithms, they do not take into consideration some novel protocols because of their date of publication [5] [7-10].", "[7 ] 10."]} +{"6391459|1236072": ["\u2026agent also monitors packets which are addressed directly to the node, although developing a lightweight detection technique for every existent protocol is out of scope of this paper because of large number of protocols and packet formats present in the literature (e.g., routing algorithms [17])."]} +{"6391459|1230643": []} +{"13364815|562065": ["Recent advances in digital signal processing, digital electronics, nanotechnology, micro-electro-mechanical systems (MEMS) technology, wireless communications and radio technology have tremendously led to the development of smart and miniaturized sensor devices [1].", "In addition to this, radio model issues cannot be overlooked in WSN protocol design because the most energy consuming functions are radio operations, i.e., data transmission and reception [1], [4]."]} +{"13364815|1230643": []} +{"206446574|1230643": []} +{"5579904|1230643": ["This paper describes the major security threats in WSN and also describes different intrusion detection techniques.", "There are two main types of WAHNs, namely: mobile ad hoc networks (MANET) and wireless sensor networks (WSN).", "Most of the WSN researches were based on homogeneous and heterogeneous network [2].", "In this paper, we have focused on the various threats on WSN and then we focused on some existing approaches to find out how they have implemented their intrusion detection system (IDS) for wireless sensor networks.", "Here we have summarized some of the major security threats for WSN. Table 1 summarizes all the security threats.", "Varieties of potential applications such as environment monitoring, health monitoring, military solution are provided by WSN [1].", "IDS proposed in ad hoc network cannot be implemented directly in the sensor networks because of the following reasons: \uf0b7 Number of nodes in WSN is higher than the node in ad hoc network."]} diff --git a/edge/graph_28643454.jsonl b/edge/graph_28643454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f4b3bf45fe2b91a93ee85c587feee93fc1d03be --- /dev/null +++ b/edge/graph_28643454.jsonl @@ -0,0 +1,20 @@ +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"8003224|5724477": ["In some studies, classifiers are combined in different ways, thereby creating multi-layer or hierarchical classification ( Shoaib et al., 2015 ), whereas other ones proposed relational graph of visual words for activity analysis for smart home security ( Zhang et al., 2015b )."]} +{"8003224|5807554": ["Despite this kind of wearable computing has long history ( Betancourt et al., 2015; Mann, 1997 ), it has become of more interest in the last years with the advancement of both hardware and software technologies ."]} +{"8003224|16013270": ["Additional researches focus on the evidence that activities are normally related to the concept of interaction between a person with one or more people or between one or more people with objects of the surrounding environment ( Chaquet et al., 2013 )."]} +{"41639864|10817088": []} +{"41639864|2357830": []} +{"41639864|7278743": []} +{"12790394|7839197": ["It is because they offer the high-level software abstractions needed to manage complex applications and because they were invented to cope with distribution and interoperability [2,9,12,19,24,36]."]} +{"14370320|10658846": ["Dynamic power management [ 4 ] is a powerful technique for reducing device power consumption by taking advantage of idle periods during the operation of the device."]} +{"14894961|7923463": []} +{"16940389|11894197": ["In general, feature selection techniques can be grouped into three categories: filter methods, wrapper methods and embedded methods [16]."]} +{"16940389|192934": ["The two main techniques that are used to identify important features and reduce dimensionality in pattern recognition are: (1) feature transformation - creating new features based on transformations or combinations of the original extracted feature set; and (2) feature selection - selecting the best subset of the original extracted feature set [5]."]} +{"18525978|27637541": []} +{"33309785|16013270": ["In addition, vision-based approaches often suffer from illumination variations, ambient occlusion and background change that greatly limits their actual use [9], [10]."]} +{"15356848|10817088": ["Many ambient sensor systems were applied to address different health issues, such as mental health, emotional state, sleep measures, Diabetes and Alzheimer\u2019s Disease [10]."]} +{"15356848|28392119": ["Saito [21] reviewed the home gateway from a broad, practical perspective, and proposed a home gateway architecture suitable for better implementation and management."]} +{"15356848|5664472": ["Systems for daily life assistance have been designed for monitoring people with dementia, measuring sleeping-respiration, and tracking medication habits [16]."]} +{"15356848|15947359": ["Analysis of human motion by way of visual information has been achieved through the use of multi-camera architectures in indoor and outdoor environments [15], by using centralised or distributed platforms predicated on processing requirements and scalability issues."]} +{"791085|14397159": ["Video cameras have long been used to capture human actions and for positioning purposes [11] [25] [26] [43] [50] [60] [61]."]} diff --git a/edge/graph_28647946.jsonl b/edge/graph_28647946.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fea6270c8c701e3d85ddc23c55f6630bb7e559c8 --- /dev/null +++ b/edge/graph_28647946.jsonl @@ -0,0 +1,3 @@ +{"35988107|2511280": ["For a review of different matching methods, the reader is referred elsewhere.(12) A rarely used alternative matching method is full matching."]} +{"27181736|2511280": []} +{"36857539|2511280": ["If the extreme weights arise from a correct model for the odds of inclusion in one trial versus another, then the decreased statistical power is an honest reflection of the information available for cross-trial comparison.([35]) For example, if baseline charac-"]} diff --git a/graph_2866580.jsonl b/edge/graph_2866580.jsonl similarity index 100% rename from graph_2866580.jsonl rename to edge/graph_2866580.jsonl diff --git a/edge/graph_28670512.jsonl b/edge/graph_28670512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a9221ac399be8282e9698aa63db393fcf5a140a --- /dev/null +++ b/edge/graph_28670512.jsonl @@ -0,0 +1 @@ +{"45239253|28670512": []} diff --git a/edge/graph_28675223.jsonl b/edge/graph_28675223.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d7fa19b72e30ead77bfe483471f9d4e575ff596 --- /dev/null +++ b/edge/graph_28675223.jsonl @@ -0,0 +1,8 @@ +{"14273842|1230643": ["Environmental monitoring, battlefield intelligence, emergency response support, and real-time data fusion and collection are among their frequently cited applications [2] [12] [14] [8]."]} +{"147952|2835258": ["Although GPSR guarantees the delivery of a packet to any connected destination within the same network, it may use a long de-tour compared with the shortest path to the destination [14]."]} +{"206446574|1230643": []} +{"6512637|1230643": []} +{"1009884|1230643": ["Due to the inextricable relation with the physical world, the proper deployment of sensors is very important for the successful completion of the sensing tasks issued [5], [6], [ 7 ]."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"5750439|14441987": ["There has been a lot of research on routing in ad-hoc networks [3, 2, 9, 11, 12, 13]."]} +{"11713469|2835258": ["On the \nother hand we are able to drop the formerly necessary assump- tion that the distance between network \nnodes may not fall below a constant value, an assumption that cannot be main- tained for practical networks."]} diff --git a/graph_2867949.jsonl b/edge/graph_2867949.jsonl similarity index 100% rename from graph_2867949.jsonl rename to edge/graph_2867949.jsonl diff --git a/edge/graph_28686900.jsonl b/edge/graph_28686900.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdc0e17a51ca67df75706429580aaee48e5be476 --- /dev/null +++ b/edge/graph_28686900.jsonl @@ -0,0 +1,2 @@ +{"18454619|9175918": ["Unfortunately, both practical aspects and security analysis are studied much less [2, 13, 18, 23], especially for continuous time systems due to prevalently used chaotic masking [1, 20]."]} +{"13480983|6430339": ["The fading coefficients given by a, and are assumed to follow a Rayleigh distribution, fA (a) = a b2 exp ( \u2212 a(2) 2b2 ) , where b is the mode of the Rayleigh distribution chosen in such a way to make E [ a(2) ] = 1 [44].", "As a result, it is assumed the fading coefficients change every bit period [44], this assumption allows for a mathematically tractable analysis.", "The duration of the fading coefficients are generally larger than a chip period and normally are as long as a bit interval [44].", "The value of the fading mode is fixed to b = \u221a 1 2 , causing the average power of the fading coefficients to be unity [44], [47]."]} diff --git a/edge/graph_28692739.jsonl b/edge/graph_28692739.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2871699.jsonl b/edge/graph_2871699.jsonl similarity index 100% rename from graph_2871699.jsonl rename to edge/graph_2871699.jsonl diff --git a/edge/graph_28719937.jsonl b/edge/graph_28719937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6dc260fb7dedf258adddbae2b74cff5ab031cb72 --- /dev/null +++ b/edge/graph_28719937.jsonl @@ -0,0 +1,2 @@ +{"10258319|11575230": ["Finally, the bus channel is locked for control signals that request the flash die to send data from a specific page and sending the data."]} +{"17958433|13268141": ["SSDs are made up of NAND flash memory chips, with data read and written in parallel from multiple chips on the disk (not unlike a RAID array) (Pavan et al., 1997).", "It is non-volatile (unlike DRAM or SRAM) and provides sufficient density and speed for use as a primary storage device (Bez et al., 2003; Pavan et al., 1997)."]} diff --git a/edge/graph_2874621.jsonl b/edge/graph_2874621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2875192.jsonl b/edge/graph_2875192.jsonl similarity index 100% rename from graph_2875192.jsonl rename to edge/graph_2875192.jsonl diff --git a/edge/graph_28756420.jsonl b/edge/graph_28756420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e226681c4297f65e714d7dbc2d96bc1930ffde1d --- /dev/null +++ b/edge/graph_28756420.jsonl @@ -0,0 +1,3 @@ +{"7984872|16665885": ["The notion of Urban Sensing [2]\u2013[4] has given rise to several crowdsensing and crowdsourcing platforms which has found applications mainly for the management of cities.", "In the recent literature [4], [10]\u2013[16], there has been immense focus in the area of crowdsensing to solve the problems which require involvement of a human and are hence difficult to automate."]} +{"13447772|3348390": ["categories 2,3,4 in Figure 1) in IoT is validation, fusing, filtering, context discovery, and annotation [14]."]} +{"1944120|523675": ["In [38], a very interesting survey about Grid resource allocation mechanisms for different architectures is provided, including distributed and dynamic infrastructures."]} diff --git a/edge/graph_28763840.jsonl b/edge/graph_28763840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bcb63fbfcf065cb2bded91d897c8a09e532eb428 --- /dev/null +++ b/edge/graph_28763840.jsonl @@ -0,0 +1,2 @@ +{"2608020|3054454": ["The idea of confining the area of interest inside an ellipsoid shape has been presented in the literature primarily for studying the mulitpath scattering [15]."]} +{"61667852|13372227": []} diff --git a/graph_2876552.jsonl b/edge/graph_2876552.jsonl similarity index 100% rename from graph_2876552.jsonl rename to edge/graph_2876552.jsonl diff --git a/edge/graph_2877147.jsonl b/edge/graph_2877147.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28771682.jsonl b/edge/graph_28771682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2877460.jsonl b/edge/graph_2877460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28774896.jsonl b/edge/graph_28774896.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39d751a62bb457a85207943ad9245210bd8edc83 --- /dev/null +++ b/edge/graph_28774896.jsonl @@ -0,0 +1 @@ +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} diff --git a/edge/graph_28790398.jsonl b/edge/graph_28790398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..957dcf6762cee4f50c9ecdec9de07fd742ec6f18 --- /dev/null +++ b/edge/graph_28790398.jsonl @@ -0,0 +1,14 @@ +{"15729548|206051485": []} +{"14415030|15744805": ["Supervised evaluation methods [5,6], also known as relative evaluation methods [7] or empirical discrepancy methods [4], evaluate segmentation algorithms by comparing the resulting segmented image against a manually-segmented reference image, which is often referred to as a gold standard [8] or ground-truth.", "Analytic methods [4,71] assess segmentation algorithms independently of their output, evaluating them based on certain properties of the segmentation algorithms, such as processing strategy (parallel, sequential, iterative, or mixed), processing complexity, resource efficiency, and segmentation resolution, which are usually not deemed effective for assessing the segmentation quality (e.", "Whereas supervised methods evaluate segmented images against a reference image, unsupervised evaluation methods [45], also known as stand-alone evaluation methods [38] or empirical goodness methods [4] do not require a reference image, but instead evaluate a segmented image based on how well it matches a broad set of characteristics of segmented images as desired by humans."]} +{"60275147|14122909": []} +{"13341633|1902238": ["An advantage of untagged MR images is that the cardiac anatomy and in particular the myocardium is clearly visible and can be identified using state-of-the-art image segmentation algorithms [14]."]} +{"1902238|2616070": ["Methods based on a statistical model mainly fall into three categories: shape prior segmentation (Cremers et al., 2007), active shape and appearance models (Heimann and Meinzer, 2009) and atlas-based segmentation techniques (Rohlfing et al."]} +{"2026284|205131192": []} +{"16201824|192934": ["This concept is similar to classifier combination strategies as often applied in pattern recognition methods (Jain et al., 2000)."]} +{"34534181|206051485": []} +{"2362265|1902238": ["several types of acquisitions that can be performed during one scanning session.(9) It provides high-resolution visuali-", "In addition, it forms an important preliminary step to provide useful diagnostic information by quantifying clinically important parameters, including end-diastolic volume (EDV), end-systolic volume (ESV), ejection fraction (EF), wall motion and thickening, wall thickness, stroke volume (SV), and transient ischemic dilation (TID).(9) Furthermore, segmentation of the LV is necessary for the quantification of myocardial perfusion,(10) the size of the myocardial infarct,(11) or myocardial mass.", "Recently, full volume 3-D MRI acquisitions have been proposed.(9) Cardiac MR tagging is an important reference technique"]} +{"2362265|14122909": ["101 However, US imaging suffers from low SNR (signal-to-noise ratio) and speckle noise, 102 making the LV segmentation task challenging.", "102."]} +{"458328|206051485": ["The inverse compositional algorithm There is a wealth of literature on image alignment algorithms and the reader is referred to Baker et al. (2004), Baker and Matthews (2001), Maintz and Viergever (1998), Zitova and Flusser (2003) and the references therein for an overview."]} +{"24416856|15744805": ["A survey on this topic has been provided (36)."]} +{"28251291|206051485": ["Registration refers to a set of techniques with the shared goal of establishing anatomical or functional correspondence between images acquired at different times, of different subjects, or with different modalities [1], [2]."]} +{"28251291|15744805": ["Classically, these homogeneity and heterogeneity measures were based solely on the intensity characteristics of the voxels in the image [3]."]} diff --git a/edge/graph_28809130.jsonl b/edge/graph_28809130.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..593b5317dde2d65a65345f9f5813210a8a6fced3 --- /dev/null +++ b/edge/graph_28809130.jsonl @@ -0,0 +1 @@ +{"14811549|28809130": ["The CMA security architecture and the integration with NRL FIM are presented in [8]."]} diff --git a/edge/graph_28831146.jsonl b/edge/graph_28831146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4972f41359315b175aaefd9a07cfae11c714682d --- /dev/null +++ b/edge/graph_28831146.jsonl @@ -0,0 +1,2 @@ +{"16288784|17857669": ["Recently, there has been an increase in the amount of data being collected electronically, either on laptops [1, 12] or on PDAs and mobile phones [15, 16, 21, 33, 34, 36]."]} +{"167957280|62298337": ["[6] and a number of recent workshops sponsored by NEAAPOR and the Washington Statistical Society 12Out of the 1,008 country-year data sets, 350 were conducted in current OECD countries and 658 are from non-OECD countries."]} diff --git a/graph_2883353.jsonl b/edge/graph_2883353.jsonl similarity index 100% rename from graph_2883353.jsonl rename to edge/graph_2883353.jsonl diff --git a/edge/graph_28850709.jsonl b/edge/graph_28850709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28858359.jsonl b/edge/graph_28858359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_28865148.jsonl b/edge/graph_28865148.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..192834c1fd3f1cc05b2f369bc66fd8317e5e2240 --- /dev/null +++ b/edge/graph_28865148.jsonl @@ -0,0 +1,4 @@ +{"123386644|6681074": []} +{"15559996|118142": ["A recent survey on grasp planning methods for 3D objects is presented in (Sahbani et al. 2012).", "Two approaches have been used to solve this problem (Sahbani et al. 2012; Mishra and Silver 1989): an empirical (physiological) approach, trying to mimic the behavior of the human hand (Feix et al. 2009; Cutkosky 1989), and an analytical (mechanical) approach, considering the physical and\u2026"]} +{"8815923|118142": ["[1], the authors divide the methodologies into analytic and empirical.", "[1] divide the data-driven methods that are based on whether they employ object features or observation of humans during grasping."]} +{"31283744|118142": ["A detailed review of various approaches can be found in Sahbani et al. (2012).", "Few works have considered the task information in grasp planning due to the difficulty of modeling a task (Borst et al., 2004; Li and Sastry, 1988; Sahbani et al., 2012)."]} diff --git a/graph_2886931.jsonl b/edge/graph_2886931.jsonl similarity index 100% rename from graph_2886931.jsonl rename to edge/graph_2886931.jsonl diff --git a/graph_2887819.jsonl b/edge/graph_2887819.jsonl similarity index 100% rename from graph_2887819.jsonl rename to edge/graph_2887819.jsonl diff --git a/edge/graph_28925351.jsonl b/edge/graph_28925351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91f7ee35725f1fbc219fcb0efcdc9e9ce6bf9e45 --- /dev/null +++ b/edge/graph_28925351.jsonl @@ -0,0 +1,2 @@ +{"17162033|10500613": ["Finally, our work is not addressing the problem of automatic schema matching [10] but perhaps suggests the possibility of trying to match user interfaces directly and then rely on the corresponding channels to determine the mappings between schemas."]} +{"2419893|14140377": []} diff --git a/edge/graph_289357.jsonl b/edge/graph_289357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2895124.jsonl b/edge/graph_2895124.jsonl similarity index 100% rename from graph_2895124.jsonl rename to edge/graph_2895124.jsonl diff --git a/edge/graph_28965631.jsonl b/edge/graph_28965631.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e2e73d597c40d0082d8eb16df77e4801e1d6a5e --- /dev/null +++ b/edge/graph_28965631.jsonl @@ -0,0 +1,2 @@ +{"45370567|763939": ["For example, in [3, 4], the authors discuss the research challenges of routing in VANETs and then summarize and compare the performance of routing protocols; Hartenstein and Laberteaux present an overview on the communication and networking aspects of VANETs and summarize the current state of the art at that time [5]; Raya and Hubaux address the security of VANETs comprehensively and provide a set of security protocols as well [6]; in [7], the authors propose a taxonomy of a large range of mobility models available for vehicular ad hoc networks."]} +{"10535135|2835258": ["Position-based routing protocols as explained in [46, 47] require the availability of the participating nodes\u2018 physical position."]} diff --git a/edge/graph_28988594.jsonl b/edge/graph_28988594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f14878cbf85938e930466a2ed5968a3a9031cf7 --- /dev/null +++ b/edge/graph_28988594.jsonl @@ -0,0 +1,6 @@ +{"29333247|3892110": ["where minter , the mean service inter-arrival time, is generated using a random uniform distribution between 10 and 100 seconds, as in [16], and a \u2208 [2, 8], a positive integer that controls the load in the system."]} +{"6672490|10658846": ["Thus, reducing the voltage, which consequently lead to the frequency reduction, provides substantial savings in power at the cost of slower program execution [18]."]} +{"18438108|10837932": ["In Tent and Marlow projects [26] an alternative cooling system is investigated by Microsoft by leaving servers in the open air so that heating dissipates more easily [27]."]} +{"17342822|10837932": ["Aligned with Green Cloud Computing, Green Networking [3] is a recent \ufb01eld of research that aims to improve the energy ef\ufb01ciency of the networks via new techniques of network design and operations."]} +{"26394807|34219341": []} +{"57079027|17542426": []} diff --git a/edge/graph_28991300.jsonl b/edge/graph_28991300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80f7acc744c0f7aa7936e18c4c396db567954f1b --- /dev/null +++ b/edge/graph_28991300.jsonl @@ -0,0 +1,5 @@ +{"15901683|1113420": ["the physical context such as location, light, movement, touch is measurable by hardware sensors, whereas the logical context such as user\u2019s goals, tasks, business processes and user\u2019s emotional state is captured by monitoring user interactions or specified by the user [12], or can be inferred from the underlying physical context [9].", "PIDF [14]), UML models, logic based models and ontology based models [12] among others.", "There exists a variety of research literature identifying the nature of context and providing its taxonomy [12]."]} +{"11258877|1077083": ["Based on the data structure used for expressing and exchanging contextual information, papers [28\u201330,49] have summarized context models that have been proposed earlier.", "Although several survey papers can be found in literature, focusing on context modeling techniques [27\u201330] and service discovery protocols for PvC environments [31\u201333], the current paper is a comprehensive survey, which summarizes the general issues, characteristics and design considerations of available PvC middleware solutions."]} +{"11258877|1113420": ["Based on the data structure used for expressing and exchanging contextual information, papers [28\u201330,49] have summarized context models that have been proposed earlier.", "Although several survey papers can be found in literature, focusing on context modeling techniques [27\u201330] and service discovery protocols for PvC environments [31\u201333], the current paper is a comprehensive survey, which summarizes the general issues, characteristics and design considerations of available PvC middleware solutions."]} +{"11258877|12817488": ["Data aggregation [58] is the process of aggregating data from multiple sensors to eliminate redundant transmission and provide fused information to the base station in an energy-efficient manner while reducing latency."]} +{"2941927|1113420": ["This data is considered to be vital context information [1] that can be exploited to customize services, to anticipate user intentions and to ultimately reduce human-to-machine interactions [2]."]} diff --git a/graph_2899523.jsonl b/edge/graph_2899523.jsonl similarity index 100% rename from graph_2899523.jsonl rename to edge/graph_2899523.jsonl diff --git a/edge/graph_29001007.jsonl b/edge/graph_29001007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6719cf7bdb2df708c47f7824938d3f5fcf0e2b24 --- /dev/null +++ b/edge/graph_29001007.jsonl @@ -0,0 +1 @@ +{"20885957|192934": ["with an empty feature set and expand the search space by adding one feature at the time according to the outcome of a criterion function, the area under the receiver operator characteristics (ROC) curve [31]."]} diff --git a/edge/graph_29007366.jsonl b/edge/graph_29007366.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29023363.jsonl b/edge/graph_29023363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2904567.jsonl b/edge/graph_2904567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2905017.jsonl b/edge/graph_2905017.jsonl similarity index 100% rename from graph_2905017.jsonl rename to edge/graph_2905017.jsonl diff --git a/edge/graph_2905351.jsonl b/edge/graph_2905351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29060869.jsonl b/edge/graph_29060869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92958ad9d847ef1a0b001ad28fdaa736f47f69c3 --- /dev/null +++ b/edge/graph_29060869.jsonl @@ -0,0 +1,24 @@ +{"8811492|6959212": ["[7]\u2013[11] investigate communication requirements and corresponding system architectures, while [12], [13] survey feasible communication technologies and applicable standards for communications in the smart grid."]} +{"5862330|18148591": ["Then, the achievable spectral efficiency of MIMO using equal power allocation into each antenna given H is expressed as [5]", "It is generally accepted that MIMO achieves better energy-efficiency than SIMO thanks to spatial multiplexing gain [5]."]} +{"12895606|5747564": ["For more works about security issues for SG communications, the reader may refer to [3] and [19].", "SG communication technologies are anticipated to enable electric distribution systems to incorporate large amounts of distributed energy resources into the grid and to deal with the intermittent nature of renewable energy [3]."]} +{"12895606|6959212": []} +{"18042732|3994942": ["Power saving mechanisms based on network and topology control are currently founded on the extension of traffic engineering and routing criteria to use (see [78] for a recent survey"]} +{"17197561|8909218": []} +{"206778849|6959212": ["Besides residential premises, smart grid also needs a communication infrastructure to connect the utility assets [14]\u2013[16]."]} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"2373572|6959212": [")) into current electricity grid with some modifications regarding QoS, latency, reliability, and power consumption [13\u201316], whereas the other strategy relies upon developing novel communication protocols particularly addressing the smart grid communication needs based upon the fact that integration of existing communication standards could lead to a performance far below the expectations in a network with such heterogeneity [7, 9, 17].", "the other options considering the cost of initial investment required for the smart grid communication infrastructure [7]."]} +{"17823770|121289": [", cellular base station) to provide two-way data communications between the MDMS server and home area network (HAN) gateways [21]."]} +{"43404881|6959212": ["A wireless solution is thus sought [3].", "To transmit the sensing data back to the substation, wireless communication is likely to be the most cost-effective way in terms of the equipment installation cost and the initial installation time [3]."]} +{"18356612|15471820": []} +{"21896662|7686677": ["Due to their small coverage area, femtocells require much less transmission power than macrocells, and therefore their base stations (BSs) are much more energy efficient in providing broadband coverage [4]."]} +{"39634994|5747564": []} +{"39634994|6959212": []} +{"39634994|18037424": []} +{"12103882|17774971": []} +{"12103882|192934": []} +{"1297322|10658846": ["In [9], Lin et al. adopted DPM scheme.", "In contrast, the DPM scheme can save more energy by powering down all the components of computing servers.", "There are two main approaches for reducing energy consumption in computing servers: dynamic voltage frequency scaling (DVFS) [7] and dynamic power management (DPM) [8].", "There are two main approaches for reducing energy consumption in computing servers: dynamic voltage frequency scaling (DVFS) [7] and dynamic power management\n(DPM) [8]."]} +{"5747564|595093": ["Analyzing and implementing smart grid security is a challenging task, especially when considering the scale of the potential damages that could be caused by cyber attacks [46]."]} +{"18929380|595093": []} +{"18929380|121289": ["The growing needs of multimedia sensor applications for smart grid system require wireless huge amount of bandwidth and network resources, it is critical to use the CR to support various traffic types including multimedia for future smart grid system."]} +{"206545197|6959212": ["\u2026characteristics (e.g., interoperability, ease-of-use and extensibility, and distributed and parallel data management techniques) [147], using IPv6 framework for industrial monitoring and home automation system [148], and using Internet-based virtual private networks as the core network [149,150]."]} +{"20034184|6959212": ["The smart grid communication systems must be robust enough to accommodate new media, as they emerge from the communication industries, while preserving interoperable and secured systems [ 3 ].", "Real-time pricing capability of WAMR systems can also be beneficial to the customers by shifting their loads during off-peak times [ 17 ].", "NIST has recognized IEC 61850 standard for substation automation and protection applications in smart grid environment [ 3 ].", "ESI can be a local controller or customer\u2019s EMS [ 3 ].", "[1], [2]. According to [ 3 ], the term \u201cSmart Grid\u201d refers to a modernization of the electricity delivery system so it monitors, protects and automatically optimizes the operation of its interconnected elements \u2013 from the central and distributed generator through the high-voltage transmission network and the distribution system, to industrial users and building automation systems, to energy storage installations and to end-use consumers and ...", "Several activities are going on to address this communication infrastructure related challenges [ 3 ].", "In the recent report on National Institute of Standard and Technology (NIST) framework and roadmap for smart grid interoperability standards [ 3 ], several wired and wireless communication technologies are identified for smart grid.", "Using the conceptual model of smart grid proposed in [ 3 ], the smart grid framework of information exchange among the communication domains (represented as clouds) has been illustrated in Fig. 1. The lower layer domains related to electric power system are generation domain; transmission domain presented as regional Control Center (CC) and"]} diff --git a/edge/graph_29064401.jsonl b/edge/graph_29064401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36c1c5699a7bb5181c72a2f786b99b141d02582e --- /dev/null +++ b/edge/graph_29064401.jsonl @@ -0,0 +1,4 @@ +{"206819634|17934515": ["Among all of issues in platooning technique, how to manage the platooning system has always been an urgent topic [20]."]} +{"17934515|7085121": ["As an important complement to vehicular networking, wireless sensor networks (WSNs) also have been deployed along the roadside to enhance traffic safety and efficiency [41]\u2013[43]."]} +{"17934515|763939": ["Some other reviews were stated from the special aspects: such as communication protocols for green environment [24], mobility models in VANET [18], and simulators develop-"]} +{"21225142|5660618": [", the time instant when information is sent out) [40], [41]."]} diff --git a/graph_2906773.jsonl b/edge/graph_2906773.jsonl similarity index 100% rename from graph_2906773.jsonl rename to edge/graph_2906773.jsonl diff --git a/edge/graph_29068935.jsonl b/edge/graph_29068935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47f3b758a328afb4bf8d2ce52ec525110b3bc50c --- /dev/null +++ b/edge/graph_29068935.jsonl @@ -0,0 +1 @@ +{"61218849|15040462": []} diff --git a/graph_2906926.jsonl b/edge/graph_2906926.jsonl similarity index 100% rename from graph_2906926.jsonl rename to edge/graph_2906926.jsonl diff --git a/edge/graph_29090172.jsonl b/edge/graph_29090172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b36047a474d3ca0a6df8d8ba0d7258a0911238e3 --- /dev/null +++ b/edge/graph_29090172.jsonl @@ -0,0 +1 @@ +{"1609303|2034384": ["The former one emphasizes the conceptual analysis of relations between entities; the latter one emphasizes the description of the data structure."]} diff --git a/edge/graph_2910221.jsonl b/edge/graph_2910221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29124202.jsonl b/edge/graph_29124202.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa40fdc6f2f1bdc109d0140d62aea27f56b988ea --- /dev/null +++ b/edge/graph_29124202.jsonl @@ -0,0 +1,7 @@ +{"40111268|164835": ["In the angle-based PL system, several directional antennas are used to calculate the position of the MS [11].", "Three different circles are formed around the three BSs where the MS position is somewhere at the intersection of the circumference of these three circles [10, 11]."]} +{"6546013|1230643": ["Recent technological advances have made it possible to deploy large scale sensor networks consisting of a large number of low-cost, low-power, and multi-functional senso r nodes that communicate in short distances through wireless links [1]."]} +{"953880|1230643": ["Wireless sensor networks (WSNs) are composed of small, low cost, and low power sensor nodes [1].", ", environmental applications like volcano monitoring and military applications like battlefield surveillance [1]."]} +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"61820315|1230643": []} +{"16673607|1230643": ["WSN has been widely used in many areas [10], such as environmental monitoring [11] and control [12], healthcare and medical research [13], national defense and military affairs [14,15], etc."]} diff --git a/edge/graph_29145577.jsonl b/edge/graph_29145577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..481192b3a92537bae2fc5aebb4145abe08dc8448 --- /dev/null +++ b/edge/graph_29145577.jsonl @@ -0,0 +1,11 @@ +{"39614129|13172512": ["To put our results in perspective, we note that most previous statistical classification methods were tested in an off-line environment [14].", "For more details on related work see [10,14]."]} +{"16221616|8364569": ["However, it also states that an analysis of the attack strategy can provide an opportunity to perform a pro-active lookahead auditing."]} +{"20792087|13172512": ["Thus, statistical classification methods circumvent these issues by using payload-independent parameters such as packet length, inter-arrival time and flow duration [1].", "The first survey [1], focuses solely on statistical traffic classification approaches.", "For such approaches, we refer the reader to the survey presented in [1] which performs an exhaustive analysis and comparison between the most significant works based on the mentioned approaches.", "For this evaluation, the common used metrics True Positives (TPs), False Positives (FPs), False Negatives (FNs) and True Negatives (TNs), which are described in detail in [1], are applied.", "date from 2008 and 2009 [1] [2], respectively.", "For a complete description of works published prior to 2008, we refer the reader to the survey presented in [1] since, in the following section we only focus on works published after the mentioned survey.", "In addition, the mentioned surveys [1] [2] solely reported"]} +{"11252319|13172512": ["However, existing surveys [5,9,10] are outdated because the number of publications has doubled in the last three years, with many promising approaches being proposed.", "Supervised classifiers are generally more accurate than unsupervised classifiers, as shown in earlier comparisons [5,6].", "Input reduction can be achieved through sampling [12], feature selection [5] and early classification methods [35\u201337] focusing on the first few packets in a flow.", "Some surveys have focused on one specific research trend, such as machine learning (ML) [5].", "However, some existing surveys have taken a narrow view [5] by focusing on one category of techniques, while most surveys [5,9,10] are now outdated."]} +{"11252319|11608263": ["For example, host classification might refer to multi-label classification [79], where an instance can belong to more than one class at the same time."]} +{"11252319|12130888": ["This group includes basic statistical techniques [55,56] and extended ones such as heuristics [25,28] and profiles [13,17,26,27,37,57,58].", "Profiling techniques are also applied in traffic classification [13,17,26,37,57,58] to provide higher-level views of the statistical characteristics of applications [37,57], hosts [13,17,26] or even users [58].", "At a higher level, the user behavior [58] can provide discriminative information for some applications (e."]} +{"5056688|13172512": ["Though Gtalk may relay on TCP and UDP at the transport layer, communication data are favorably carried over UDP."]} +{"15520321|13172512": ["978-1-4244-5638-3/10/$26.00 \u00a92010 IEEE\nsimple K-Means, Nearest Neighbor, Decision Tree, and Bayesian Network [6].", "Furthermore, these methods classify traffic at traffic points, and are difficult to evaluate and obtain comprehensive and stable results [6].", "simple K-Means, Nearest Neighbor, Decision Tree, and Bayesian Network [6]."]} +{"13862112|8364569": ["Although flow data only provides an aggregated view of the network activity, it can be used in various application areas, including network security (see [7] for an overview).", "Flow-based intrusion detection is a very active research topic [7]."]} +{"383106|13172512": ["This difficulty triggered the development of statistical analysis based approaches [6] often based on Machine-Learning Algorithms (MLAs) [7], [8] instead of direct payload inspection."]} +{"18788312|13172512": ["In addition, \u201cgovernments may impose privacy regulations constraining the ability of third parties to lawfully inspect payloads at all\u201d [21].", "An alternative to port number inspection is payload inspection, which consists of inferring the type of the application by searching for protocol specific behavior or data inside the TCP or UDP payloads [21]."]} diff --git a/edge/graph_29154054.jsonl b/edge/graph_29154054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29162113.jsonl b/edge/graph_29162113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80020d4b853c5666723e1b92765ecdf8de351e12 --- /dev/null +++ b/edge/graph_29162113.jsonl @@ -0,0 +1,7 @@ +{"9151645|1236072": ["Our multi-hop protocol is a full featured multi-hop, ad hoc, mesh networking protocol driven for events (Al-Karaki & Kamal, 2004; Li, Thai, & Wu, 2008; Sagduyu & Ephremides, 2004)."]} +{"16977533|7834819": ["Due to the miniaturization and lightweight of wearable motion sensors, they can be integrated into clothing or accessories from an ergonomic point of view [78]."]} +{"16977533|20905429": ["Additionall, risks of radiation and other kinds of health hazards should be eliminated [76].", "Additionall, risks of radiation and other ki ds of health hazards should be eliminate [76]."]} +{"4539991|2814871": []} +{"12310463|1634674": ["Currently, the approaches employed to sense the activities could be majorly classified into three categories [10], [11], detailed as 1) computer vision-based method: real-time movements of subjects are detected by videos; 2) acoustic and ambient sensor-based method: the frequency component of vibration produced by the fall is processed to detect a fall; 3) wearable sensor-based method: kinematic or electrophysiological signal sensors, such as surface electromyography (SEMG) sensors, are utilized to detect daily activities [6], [12]\u2013[14]."]} +{"3020377|11894197": ["Improved classification accuracy is one of the expected advantages of feature selection [3, 4, 23].", "Embedded methods are similar to wrapper methods but feature selection is built into the classifier construction, which reduces computational complexity compared to wrapper methods [4].", "information theory) because the original features are not altered [4].", "Wrapper methods are developed for a specific classification method and different feature subsets are tested with the chosen classifier to optimize performance [3, 4].", "Wrapper methods can achieve better performance than filter methods but are computationally expensive and can result in overfitting [4].", "Filter methods focus on intrinsic data properties, with features scored on relevance [3, 4].", "Furthermore, filter methods reduce the computational cost and reduce the risk of overfitting [4].", "Reducing feature-space size reduces the risk of prediction-model overfitting and may improve classification performance [3, 4]."]} +{"11216826|7834819": ["Inertial sensors in physical activity-monitoring systems have been used to detect falls, and several review papers summarize advances in this area [13,22-26]."]} diff --git a/graph_2916525.jsonl b/edge/graph_2916525.jsonl similarity index 100% rename from graph_2916525.jsonl rename to edge/graph_2916525.jsonl diff --git a/edge/graph_29185701.jsonl b/edge/graph_29185701.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29231240.jsonl b/edge/graph_29231240.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74ff87c3bc71b347c401c2abe2e32ceb987f7629 --- /dev/null +++ b/edge/graph_29231240.jsonl @@ -0,0 +1,3 @@ +{"8268930|10500613": ["11 In fact, this field potentially can supply many heuristic matchers to the P ROMPT D IFF algorithm."]} +{"8268930|1574374": []} +{"8563771|1574374": ["The problem of schema evolution and schema versioning support has been extensively studied in relational and database papers ([1,28])."]} diff --git a/edge/graph_29231986.jsonl b/edge/graph_29231986.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..773766b9250a08a20ff570662a8eaaad698dd843 --- /dev/null +++ b/edge/graph_29231986.jsonl @@ -0,0 +1,21 @@ +{"42080215|10271586": []} +{"42080215|2937482": []} +{"46690774|10271586": []} +{"46690774|2937482": []} +{"23490096|2937482": ["In this section, an FBS protocol is designed to solve the clock-synchronization problem in WSNs.", "FTSP [11] works in a way similar to DMTS. Based on an assumption that the delays obey Gaussian distributions, the method in NTP [17] that estimates the round-trip transmission time is employed in WSNs for offset compensation purposes [10], [13], [14].", "It is clear that FBS consumes far fewer resources than FTSP, since L should be made relatively large, making it very difficult to use FTSP in resourceconstrained WSNs.", "Index Terms\u2014Clock synchronization, closed-loop control, proportional\u2013integral (PI) controller, sleep clock, wireless sensor networks (WSNs).", "Digital Object Identifier 10.1109/TVT.2010.2049869\nA common time reference for all sensor nodes is essential to ensure the WSN applications working properly, and it plays a pivotal role in sensor activation [6], medium-access control [7], etc.\nAchieving time synchronization in WSNs is a challenging issue.", "In this paper, a lightweight synchronization protocol, namely, FBS, has been proposed to solve the problems associated with clock model perturbation and external disturbances, which widely exist in most low-frequency sleep clocks in WSNs.", "In recent years, numerous synchronization protocols have been proposed, focusing on different aspects of the synchronization problem in WSNs [15].", "WSNs can be used for monitoring [2], [3], object localization and tracking [4], [5], etc.\nManuscript received November 9, 2009; revised February 27, 2010; accepted April 23, 2010.", "Due to all aforementioned challenges, several timesynchronization schemes for WSNs have been proposed since Elson and Romer first discussed this problem in 2002 [8], including the reference broadcast synchronization (RBS) protocol [9], time synchronization protocol for sensor networks (TPSN) [10], the delay measurement time synchronization protocol (DMTS) [1], the flooding time synchronization protocol (FTSP) [11], tiny synchronization/mini synchronization (TS/MS) [12], etc."]} +{"456783|1230643": ["Time-Diffusion Synchronization Protocol for Wireless Sensor Networks Weilian Su, Member, IEEE, and Ian \nF. Akyildiz, Fellow, IEEE Abstract In the near future, small intelligent devices will be de\u00adployed in \nhomes, plantations, oceans, rivers, streets, and highways to monitor the environment."]} +{"2709461|1230643": ["\u2026Peng Ning \nCliff Wang An Liu, Yuzheng Zhou Computer Science Dept. Army Research Of.ce Computer Science Dept. NC \nState University RTP, NC 27709 NC State University Raleigh, NC 27695 Raleigh, NC 27695 cliff.wang@us.army.mil \n{ksun3,pning}@ncsu.edu ABSTRACT Accurate and synchronized time is\u2026"]} +{"11676698|1230643": ["In wireless sensor networks, the basic operation is data fusion , whereby data from each sensor is agglomerated to form a single meaningful result [17,44,71,74,76\u201378].", "Several open research issues\u2014includ-ing hardware design, modulation protocols, and strategies to overcome signal propagation ef-fects\u2014are discussed along with various MAC protocols."]} +{"15550271|1230643": ["where x = [x[1] x[2] \u00b7 \u00b7 \u00b7 x[N ]] , w = [w[1] w[2] \u00b7 \u00b7 \u00b7 w[N ]] , \u03b8 = [\u03b8 offset \u03b8 skew ] , and", "IN recent years, wireless sensor networks (WSNs) have received a huge attention due to their promising applications in a variety of areas [1].", "These delay components have been carefully investigated in the literature [1], [3], [5] and [6]."]} +{"1762639|1230643": []} +{"42334630|1230643": ["On application level, it is required for data fusion, which combines concurrently measured data of distributed sensors [1,2], supporting e."]} +{"36407559|1230643": []} +{"652798|1230643": ["\u2026{huid, rhan}@cs.colorado.edu Department of Computer Science University of Colorado \nat Boulder Boulder, Colorado, USA Time synchronization in a wireless sensor network is critical for \naccurate timestamping of events and .ne-tuned coordination of wake/sleep duty cycles to reduce power \nconsumption."]} +{"16566313|1230643": ["Wireless sensor networks (WSN) have been recognized as a high-impact technology to revolutionize sensing in a huge number of applications: monitoring the health status of humans, animals, plants and environment, control and instrumentation of industrial machines and home appliances, and detection of chemical and biological leaks [1], [2]."]} +{"2366819|2937482": []} +{"25430743|7601289": ["3 More about self-organization in distributed systems can be found in Schillo (2003), Mills (2007) and Elmenreich et al. (2009).\nanswer the question why fireflies synchronize, let alone how they do it."]} +{"12230244|1230643": ["Wireless sensor networks (WSNs) are a special type of ad hoc networks formed by networking these tiny devices in a certain area without any infrastructure [1], [2]."]} +{"8079896|1230643": ["In recent years, wireless sensor networks (WSNs) have drawn much attention from the academia and industry as they offer an unprecedented range of potential applications [1] [2]."]} +{"2937482|1230643": ["In other words, data from each sensor is collected to produce a single meaningful result value [5]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"206896161|2937482": ["Most crystal oscillators are not very precise because the frequency, which makes the time increase, is never exactly right [26]."]} diff --git a/graph_2926549.jsonl b/edge/graph_2926549.jsonl similarity index 100% rename from graph_2926549.jsonl rename to edge/graph_2926549.jsonl diff --git a/edge/graph_29281109.jsonl b/edge/graph_29281109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29313707.jsonl b/edge/graph_29313707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0e921901cfe21ae007a26e221855c56cbbea3f7 --- /dev/null +++ b/edge/graph_29313707.jsonl @@ -0,0 +1,23 @@ +{"4464061|2916525": []} +{"19806033|9835525": ["This is done by comparing color histograms across consecutive frames [20]."]} +{"4714730|9270553": ["Several present-day BCI systems rely on mu (8 \u2013 12 Hz) or beta (18 \u2013 24 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000).", "Several present-day BCI systems rely on mu (8\u201312 Hz) or beta (18\u201324 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000)."]} +{"18191244|2916525": []} +{"16958728|9045705": ["Recent comprehensive reviews on fNIRS technology (Ferrari and Quaresima, 2012) and instrumentation (Scholkmann et al., 2013) confirm that the vast majority of instrumentation development was on continuous wave (CW) type fNIRS which is limited in terms of its information content (i.e., it measures\u2026"]} +{"6011553|10290908": ["\u2026program, utilizing a standard manual convex-hull cluster-cutting algorithm according to five features: peak/valley amplitude, height (peak-to-peak amplitude), energy (area under the spike), and amplitude at the spike alignment point (See Lewicki, 1998 for review of spike sorting techniques)."]} +{"18764234|10290908": ["Sharp peaks ( 1 ms) represent multiple spikes (MSPs), which can be sorted by shape and size into several SUs, representing putative neurons (Abeles and Goldstein, 1977; Lewicki, 1998)."]} +{"5902902|2916525": ["ORIGINAL RESEARCH ARTICLE published: 27 May 2014\ndoi: 10.3389/fneng.2014.00014\nDecoding spectrotemporal features of overt and covert speech from the human cortex", "\u2026and\nFrontiers in Neuroengineering www.frontiersin.org May 2014 | Volume 7 | Article 14 | 1\nNEUROENGINEERING\nposterior inferior frontal regions (e.g., Broca\u2019s area) (Fiez and Petersen, 1998; Heim et al., 2002; Duffau et al., 2003; BillingsleyMarshall et al., 2007; Towle et al., 2008; Price, 2012)."]} +{"56977191|9270553": []} +{"16004953|9045705": ["The fNIRS modules were designed considering the current understanding of fNIRS instrumentation technology as reviewed by Scholkmann et al. (2014) and others (Obrig and Villringer, 2003; Son and Yazici, 2006) with special regard to hardware design and wavelength-selection for SNR\u2026", "\u2026fNIRS and fNIRI have entered neuroscience as a reliable and trustworthy research tool for research based on investigating groups of subjects (Scholkmann et al., 2014), o\ufb00ering potentially complementary information to fMRI, PET and EEG (e.g., oxygenation information or cytochrome oxidase as\u2026", "\u2026and strength of pulse artifacts are indicators for the signal quality and have been widely documented in fNIRS literature with the pulse artifact\u2019s amplitude being in the order of metabolic variations due to brain activity (Boas et al., 2004; Lareau et al., 2011; Scholkmann et al., 2014).", "Shot noise is based on the quantum nature of the photons and therefore unavoidable and, for detectors without internal ampli\ufb01cation, proportional to the square root of the average incident intensity (Scholkmann et al., 2014)."]} +{"1300841|6479846": [", also referred to as Monte Carlo cross-validation"]} +{"4697298|16362395": []} +{"16984232|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory [ 27 ]."]} +{"59850647|18050848": ["\u2026person identification and verification (Jourlin et al., 1997; Wark and Sridharan, 1998; Fr\u00f6ba et al., 1999; Jain et al., 1999; Maison et al., 1999; Chibelushi et al., 2002; Zhang et al., 2002), speaker localization (Bub et al., 1995; Wang and Brandstein, 1999; Zotkin et al., 2002), detection of\u2026"]} +{"59850647|192934": ["Audio-visual fusion is an instance of the general classifier combination problem (Jain et al., 2000).", "Classifier combination based on their individual decisions about the classes of interest is an active area of research with many applications (Xu et al., 1992; Kittler et al., 1998; Jain et al., 2000).", "This corresponds to the adaptive product rule in the likelihood domain (Jain et al., 2000), and it is also known as the separate identification model to audio-visual fusion (Rogozan, 1999; Teissier et al., 1999).", "Finally, an important problem in data classification is the issue of feature selection within a larger pool of candidate features (Jain et al., 2000)."]} +{"17571592|16362395": ["In their review of the literature on BCI classifiers, Lotte et al. 16 concluded that SVMs are particularly efficient, attributing the efficiency to their regularization property and immunity to the curse of dimensionality.", "While many early BCI studies satisfied this requirement, 24,38 later studies were often based on offline analyses of pre-recorded data 1 ; for example, the Lotte et al. 16 review of studies evaluating BCI signal-classification algorithms found most used offline analyses."]} +{"17571592|9270553": []} +{"17571592|192934": []} +{"2124602|29313707": ["For a general overview of biosignal-based spoken interaction, refer to the survey paper in this special issue [32]."]} +{"42318986|2916525": ["Finally, beyond clinical applications there is large area of speech and language research [193,194] where the addition of real-time"]} +{"12889062|1225103": ["\u2026speech require the user to perform tasks which introduce limitations on speech production, thereby causing speaker variability and reduced speech system performance (Baber et al., 1996; Benzeghiba et al., 2007; Bosch, 2003; Corrigan, 1996; Cosmides, 1983; Hansen, 1994; Murray et al., 1996).", "Many interactive systems involving speech require the user to perform tasks which introduce limitations on speech production, thereby causing speaker variability and reduced speech system performance (Baber et al., 1996; Benzeghiba et al., 2007; Bosch, 2003; Corrigan, 1996; Cosmides, 1983; Hansen, 1994; Murray et al., 1996)."]} +{"205222501|16362395": ["Good overviews can be found in (Dornhege et al., 2007) and in (Wolpaw et al., 2002), while Lotte et al. (2007) provides a review of classification algorithms.", "Numerous authors have considered methods of tracking this motion using implanted coils which are electrically connected to external equipment and are electromagnetically coupled to external excitation coils (Carstens, 2008; Scho\u0308nle et al., 1987; Hummel et al., 2006)."]} +{"4032323|29313707": []} diff --git a/edge/graph_29315306.jsonl b/edge/graph_29315306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15aa98ebabebbec1ec8a923c6527e2782f6289dc --- /dev/null +++ b/edge/graph_29315306.jsonl @@ -0,0 +1 @@ +{"15241824|18986679": ["Traditional multidimensional visualizations, such as scatter plot matrices, parallel coordinate plots or pixel-based techniques [ 8 ] operate by mapping each data attribute into a corresponding visual axis or other representation."]} diff --git a/edge/graph_29316347.jsonl b/edge/graph_29316347.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2931788.jsonl b/edge/graph_2931788.jsonl similarity index 100% rename from graph_2931788.jsonl rename to edge/graph_2931788.jsonl diff --git a/edge/graph_29326265.jsonl b/edge/graph_29326265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22853fe2ea410eb892f2023ae0338468a6e71a34 --- /dev/null +++ b/edge/graph_29326265.jsonl @@ -0,0 +1,2 @@ +{"116015221|12029139": ["Although electromagnetic energy sources usually have low power densities (0.01-0.1\nW/cm2) as compared with other sources [Lu 2015], the power in free space can be useful for\nremotely distributed sensors.", "Aparicio et al. and Lu et al. recently present a good introduction and review of such energy harvesters [Lu 2015, Aparicio 2016].", "1 \uf06dW/cm2) as compared with other sources [Lu 2015], the power in free space can be useful for"]} +{"17119265|16783458": []} diff --git a/edge/graph_29349043.jsonl b/edge/graph_29349043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c10e9b9ce3e76a70b66c1b1e52556b7834e9ec52 --- /dev/null +++ b/edge/graph_29349043.jsonl @@ -0,0 +1 @@ +{"41614969|29349043": ["The available inclusive design techniques vary in format and scope, including, among others, guidelines, user tests and physical or virtual simulation tools (Zitkus et al., 2011; Zitkus, 2017)."]} diff --git a/edge/graph_2935788.jsonl b/edge/graph_2935788.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29364193.jsonl b/edge/graph_29364193.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2937482.jsonl b/edge/graph_2937482.jsonl similarity index 100% rename from graph_2937482.jsonl rename to edge/graph_2937482.jsonl diff --git a/edge/graph_29395800.jsonl b/edge/graph_29395800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20c3a9e6516e01bdd69b045d483a620feb920416 --- /dev/null +++ b/edge/graph_29395800.jsonl @@ -0,0 +1 @@ +{"16050963|1574374": []} diff --git a/edge/graph_29398427.jsonl b/edge/graph_29398427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f0ea9f2825584d95a595b06553a61060d1e7051 --- /dev/null +++ b/edge/graph_29398427.jsonl @@ -0,0 +1,16 @@ +{"17488594|2835258": ["The main proposed geographic mechanisms are based on the idea that greedy forwarding is used when a neighbour closer to the final destination exists [2], [3].", "Geographical routing was introduced to provide scalable routing in mobile ad-hoc networks by exploiting location information of mobile nodes in the network [2]."]} +{"8311233|870434": []} +{"2185957|870434": ["While self-deployment/reconfiguration of terrestrial wireless sensor networks (WSNs) has been studied extensively, such selforganization has just started to receive attention for Underwater Acoustic Sensor Networks (UWSNs)."]} +{"59670204|2835258": []} +{"18664196|1230643": ["After deployment, sensors are lowered to various depths selected by our scheme such that the maximum coverage of the three dimensional sensor space is maintained."]} +{"897167|2469117": ["The issue of anchor node\u2019s placement should not be neglected [30].", "Other drawback of SLMP is its high computational complexity [30].", "There is little research on UWSNs\u2019 localization problem for duty-cycle environment [30]."]} +{"12566043|2469117": ["With the regular static mooring sensing system, it is difficult to observe these dynamic ocean phenomena (Zhang\net al., 2012).", "For more detailed techniques, please refer to more comprehensive surveys (Erol-Kantarciz et al., 2011; Tan et al., 2011; Han et al., 2012).", "Since energy for communications is usually plentiful in AUVs compared with ordinary sensors, they can play more important roles than ordinary ocean sensors in collecting, processing, and managing the desired data."]} +{"7967026|870434": ["\u2026in 3D aerial space can be used in supporting intelligent computer vision systems [1], helping overcome human paropsia [2], constructing aerial defense systems [3], and building aerosphere pollution monitoring systems, etc. 3D underwater WSNs also have various important applications [4] [5]."]} +{"31799015|870434": ["On the other hand, optical modems have been shown to achieve data rates reaching to Mbit/s with ranges up to 100m, only in very clear water conditions [2].", "In underwater, radio signals attenuate rapidly, hence they can only travel to short distances while optical signals scatter and cannot travel far in adverse conditions, as well [2]."]} +{"9547168|14441987": ["The surveys of protocols that do not use geographic location in the routing decisions are given in [BMJHJ, RS, RT ]."]} +{"2835258|14441987": ["A survey and comparison of topology-based approaches can be found in [ 10 , 11]."]} +{"34681302|42347181": ["Underwater wireless sensor networks (UWSNs) have a lot of potential application areas such as oceanographic data collection, disaster prevention, pollution monitoring, offshore exploration, and military surveillance [1\u20133]."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"17648974|1230643": ["LARGE-SCALE-DISTRIBUTED wireless networks are becoming common in the military and civilian domains because of their relative ease of deployment and minimal infrastructure requirement [1]."]} +{"9954896|2835258": ["Packets are sequenced by the sender to allow nodes to identify packets which have already been rebroadcast."]} diff --git a/edge/graph_29464310.jsonl b/edge/graph_29464310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29475921.jsonl b/edge/graph_29475921.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94f1a2b112e1aec4b08e152ef01189d7c2fd5904 --- /dev/null +++ b/edge/graph_29475921.jsonl @@ -0,0 +1 @@ +{"15686151|7360895": ["The scope study in this paper thus covers functionally designed social robots [7] of which appearance and body movement add value to interpersonal communication, but does not include highly autonomous mobile robots that recognize social cues, make decisions, and learn social skills from human users."]} diff --git a/edge/graph_29478176.jsonl b/edge/graph_29478176.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2951180.jsonl b/edge/graph_2951180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_295128.jsonl b/edge/graph_295128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29512913.jsonl b/edge/graph_29512913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf67a6a45567b6717aabfee14a9f114622d69b83 --- /dev/null +++ b/edge/graph_29512913.jsonl @@ -0,0 +1,2 @@ +{"2886468|15219853": ["All biometric modalities are subject to an intra-class variability (leading to a high False Non Match Rate) due to several facts: acquisition of a reflex for behavioral biometrics [1], use of different sensors for enrollment and verification acquisitions, noise due to the acquisition environment (humidity, lightning, stress."]} +{"36615390|17950466": ["Duration and latency are the most used features in SKD [1, 6].", "In [6] this is denoted also by RP latency.", "Another possible definitions of latency is the PPlatency which is the elapsed time between pressing down one key and pressing down the next key [6].", "It can be used either for continuous authentication [1] or for static authentication, for example for strengthening the usernamepassword system [2, 3, 4, 5, 6].", "There are various definitions for latency [6] possible, but we use the time between release of one key and pressing down the next key."]} diff --git a/graph_2952299.jsonl b/edge/graph_2952299.jsonl similarity index 100% rename from graph_2952299.jsonl rename to edge/graph_2952299.jsonl diff --git a/edge/graph_29525531.jsonl b/edge/graph_29525531.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a22c494896b34f3f08805fdc47a454a1eba28cf7 --- /dev/null +++ b/edge/graph_29525531.jsonl @@ -0,0 +1,5 @@ +{"1194368|1029120": []} +{"1194368|9045232": []} +{"1194368|7788290": []} +{"25875135|15929566": []} +{"12104564|7788290": ["Many examples of people tracking have used cameras as their primary sensor [19, 26], however laser rangefinders have also been used [52]."]} diff --git a/edge/graph_295283.jsonl b/edge/graph_295283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29545580.jsonl b/edge/graph_29545580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2957250.jsonl b/edge/graph_2957250.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_2958701.jsonl b/edge/graph_2958701.jsonl similarity index 100% rename from graph_2958701.jsonl rename to edge/graph_2958701.jsonl diff --git a/graph_295904.jsonl b/edge/graph_295904.jsonl similarity index 100% rename from graph_295904.jsonl rename to edge/graph_295904.jsonl diff --git a/edge/graph_29613693.jsonl b/edge/graph_29613693.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..365eeedf7810d634bde407c9e3880c0fbc0e7236 --- /dev/null +++ b/edge/graph_29613693.jsonl @@ -0,0 +1 @@ +{"35539922|35897447": []} diff --git a/graph_2962797.jsonl b/edge/graph_2962797.jsonl similarity index 100% rename from graph_2962797.jsonl rename to edge/graph_2962797.jsonl diff --git a/edge/graph_2965443.jsonl b/edge/graph_2965443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29654897.jsonl b/edge/graph_29654897.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28120cc2baf4c9497c765030a23f6b39fc867322 --- /dev/null +++ b/edge/graph_29654897.jsonl @@ -0,0 +1,3 @@ +{"45604505|1805048": []} +{"11578312|30815820": ["In particular, gaining reputation among likeminded people has been shown to motivate sharing in online communities and open-source projects (Parameswaran & Whinston, 2007; Raymond, 1999)."]} +{"16116742|359842": []} diff --git a/edge/graph_29681907.jsonl b/edge/graph_29681907.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29689714.jsonl b/edge/graph_29689714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29707799.jsonl b/edge/graph_29707799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd2c9cc3e86620971246acfcc86df8ba296a589a --- /dev/null +++ b/edge/graph_29707799.jsonl @@ -0,0 +1,5 @@ +{"33899228|18421953": ["Technology-based scaffolding The most frequent design feature employed by the mobile apps was the use of technology-based scaffolding (23 apps). Many of these apps utilized scaffolding to address one of the common challenges withmobile learning, which is that students can become overwhelmed or overloaded by studying real-world issues with minimal supports (Dunleavy, Dede, & Mitchell, 2009; Rosenbaum et al., 2007). There were a variety of different types of scaffolds found in these mobile apps, which can be classified based on their functions: conceptual, metacognitive, procedural, and strategic (Hannafin, Land, & Oliver, 1999). Conceptual scaffolds provide guidance on the underlying concepts and knowledge to consider. Many of the apps provided hints, feedback, access to experts, and just-in-time resources to provide this type of guidance. One example of this type of scaffolding was an app that utilized two-tier guidance developed by Chu, Hwang, Tsai, et al. (2010). In this app, students are provided with personalized guidance to observe and classify plants through adaptive supports. In the first tier, students are asked to identify a feature of a plant and are guided to observe comparative plants to detect the differences in that feature. In the second tier, once the students correctly identify the feature, they are asked a more in-depth conceptual question and are providedwith hints and supplementarymaterials as needed. Chu, Hwang, Tsai, et al. (2010) conducted a study to compare the two-tier guidance app with a tour-based app. Both apps guided learners to observe plants and provided related information about the plants, but the tour-based app did not provide the two-tier guidance. Elementary students who received the twotier guidance had significantly better conceptual knowledge about plant classifications than those who received the tourbased app (Chu, Hwang, Tsai, et al., 2010). Metacognitive scaffolds offer guidance to help students monitor and manage their learning (Hannafin et al., 1999). One example of an app that utilized metacognitive scaffolding was the MyDesk app (Looi et al., 2014). In the MyDesk app, a KWL tool prompts students to continually reflect on their learning by responding to the \u201cquestions (i.e. what do I already Know? what do IWant to know?What have I Learned?) to allow students to learn in a self-regulatedway\u201d (Looi et al., 2014, p.105). In an earlier study on a similar app, Looi et al. (2011) observed that student questions in response to theWprompt reflected deep thinking, and one student commented that he enjoyed seeing how his learning progressed. Although these researchers did not specifically isolate this one design feature, they found that students who used the app, which contained the KWL prompts alongwith several other features, did significantly better on the end-of-year science exams than students who did not use this app (Looi et al., 2011). Future research that isolates the use of metacognitive scaffolds would be useful to confirm these results. Procedural scaffolds provide assistance with how to use features or perform certain tasks (Hannafin et al., 1999). One example of an app that provided this type of assistance was the Ubiquitous Scientific Device Trainer (USDT) developed by Hwang, Tsai, Chu, Kinshuk, and Chen (2012). The USDT app guided students to different scientific devices within a museum and gave instructions for how to operate each device.", "Technology-based scaffolding The most frequent design feature employed by the mobile apps was the use of technology-based scaffolding (23 apps). Many of these apps utilized scaffolding to address one of the common challenges withmobile learning, which is that students can become overwhelmed or overloaded by studying real-world issues with minimal supports (Dunleavy, Dede, & Mitchell, 2009; Rosenbaum et al., 2007). There were a variety of different types of scaffolds found in these mobile apps, which can be classified based on their functions: conceptual, metacognitive, procedural, and strategic (Hannafin, Land, & Oliver, 1999). Conceptual scaffolds provide guidance on the underlying concepts and knowledge to consider. Many of the apps provided hints, feedback, access to experts, and just-in-time resources to provide this type of guidance. One example of this type of scaffolding was an app that utilized two-tier guidance developed by Chu, Hwang, Tsai, et al. (2010). In this app, students are provided with personalized guidance to observe and classify plants through adaptive supports. In the first tier, students are asked to identify a feature of a plant and are guided to observe comparative plants to detect the differences in that feature. In the second tier, once the students correctly identify the feature, they are asked a more in-depth conceptual question and are providedwith hints and supplementarymaterials as needed. Chu, Hwang, Tsai, et al. (2010) conducted a study to compare the two-tier guidance app with a tour-based app.", "Given the prevalence of mobile devices in education, research on mobile learning is rapidly increasing (Hung & Zhang, 2012; Hwang & Tsai, 2011; Wu et al., 2012) and thus has been reviewed in several studies (Cheung & Hew, 2009; Hung &\ny).", "Also, none of the studies on mobile learning thoroughly examined the specific theoretical foundations underlying the mobile learning research, although one review by Cheung and Hew (2009) noted that much of the research was not theoretically grounded.", "Some reviews focused on specific aspects of mobile learning, such as mobile learning games (Avouris & Yiannoutsou, 2012; Schmitz, Klemke, & Specht, 2012), mobile computersupported collaborative learning (Hsu & Ching, 2013), or mobile apps (Jeng, Wu, Huang, Tan, & Yang, 2010). Trends in the literature have also been reported across multiple reviews. For example, reviews have shown that mobile learning is highly motivating for students (Hsu& Ching, 2013; Hwang&Wu, 2014; Schmitz et al., 2012). On the other hand, some of the findings from these past reviews have been contradictory. For example, reviews reported mixed findings on the effect of mobile environments on learning outcomes. Hwang and Wu (2014) did a review on mobile learning studies spanning 2008e2012 from select journals and found that 83% of the studies that measured learning achievements reported positive outcomes.", "Some reviews focused on specific aspects of mobile learning, such as mobile learning games (Avouris & Yiannoutsou, 2012; Schmitz, Klemke, & Specht, 2012), mobile computersupported collaborative learning (Hsu & Ching, 2013), or mobile apps (Jeng, Wu, Huang, Tan, & Yang, 2010). Trends in the literature have also been reported across multiple reviews. For example, reviews have shown that mobile learning is highly motivating for students (Hsu& Ching, 2013; Hwang&Wu, 2014; Schmitz et al., 2012). On the other hand, some of the findings from these past reviews have been contradictory. For example, reviews reported mixed findings on the effect of mobile environments on learning outcomes. Hwang and Wu (2014) did a review on mobile learning studies spanning 2008e2012 from select journals and found that 83% of the studies that measured learning achievements reported positive outcomes. Similarly, Hsu and Ching (2013) reviewed studies on mobile computer-supported collaborative learning from 2004 to 2011 and reported that six of the nine studies found positive improvements in students' understanding and application of concepts. In contrast to these positive findings, Schmitz et al. (2012) reviewed studies on mobile games from 2001 to 2011 and found that there was not sufficient evidence on whether mobile games improved learning outcomes.", "These studies often cited the work of Brown, Collins, and Duguid (1989) and emphasized the importance of connecting learning to an authentic context inwhich it can be used. For example, Hwang, Chu, Shih, Huang, and Tsai (2010) applied situated learning theory to their design of a mobile app that guided students in studying butterflies and plants in their natural habitat.", "Similarly, Cheung and Hew (2009) reviewed studies on mobile devices from 2000 to 2008 and found no significant differences in students' test scores for studies that comparedmobile devices to equivalent paper-and-pencil treatments. They also reported that claims of enhanced learning were often not experimentally tested. Although there have been several valuable syntheses of previous studies on mobile learning, there are areas that require further examination. For example, there is strong potential for using mobile learning in the area of science education due to a number of aspects that make it unique and well suited to the affordances of mobile technology. Much of science takes place outside of the classroom and is arguably better studied in its natural environment, while other science content is impossible to see with the naked eye and requires graphical visualizations for students to be able to fully understand it. In addition, scientific system models cannot be completely comprehended without an immersive experience that demonstrates how the variables interact. These distinct aspects of science learning are well aligned with the mobility of newer devices as well as their ability to display interactive, three-dimensional graphics and simulations. However, there have been no reviews of research conducted to date on mobile learning in science. Furthermore, only a few studies reviewed the attributes or design patterns/features of mobile apps (Avouris & Yiannoutsou, 2012; Jeng et al., 2010; Schmitz et al., 2012), and two of these studies were focused specifically on games. Also, none of the studies on mobile learning thoroughly examined the specific theoretical foundations underlying the mobile learning research, although one review by Cheung and Hew (2009) noted that much of the research was not theoretically grounded.", "Technology-based scaffolding The most frequent design feature employed by the mobile apps was the use of technology-based scaffolding (23 apps). Many of these apps utilized scaffolding to address one of the common challenges withmobile learning, which is that students can become overwhelmed or overloaded by studying real-world issues with minimal supports (Dunleavy, Dede, & Mitchell, 2009; Rosenbaum et al., 2007). There were a variety of different types of scaffolds found in these mobile apps, which can be classified based on their functions: conceptual, metacognitive, procedural, and strategic (Hannafin, Land, & Oliver, 1999). Conceptual scaffolds provide guidance on the underlying concepts and knowledge to consider. Many of the apps provided hints, feedback, access to experts, and just-in-time resources to provide this type of guidance. One example of this type of scaffolding was an app that utilized two-tier guidance developed by Chu, Hwang, Tsai, et al. (2010). In this app, students are provided with personalized guidance to observe and classify plants through adaptive supports. In the first tier, students are asked to identify a feature of a plant and are guided to observe comparative plants to detect the differences in that feature. In the second tier, once the students correctly identify the feature, they are asked a more in-depth conceptual question and are providedwith hints and supplementarymaterials as needed. Chu, Hwang, Tsai, et al. (2010) conducted a study to compare the two-tier guidance app with a tour-based app. Both apps guided learners to observe plants and provided related information about the plants, but the tour-based app did not provide the two-tier guidance. Elementary students who received the twotier guidance had significantly better conceptual knowledge about plant classifications than those who received the tourbased app (Chu, Hwang, Tsai, et al., 2010). Metacognitive scaffolds offer guidance to help students monitor and manage their learning (Hannafin et al., 1999). One example of an app that utilized metacognitive scaffolding was the MyDesk app (Looi et al., 2014). In the MyDesk app, a KWL tool prompts students to continually reflect on their learning by responding to the \u201cquestions (i.e. what do I already Know? what do IWant to know?What have I Learned?) to allow students to learn in a self-regulatedway\u201d (Looi et al., 2014, p.105). In an earlier study on a similar app, Looi et al. (2011) observed that student questions in response to theWprompt reflected deep thinking, and one student commented that he enjoyed seeing how his learning progressed.", "Similarly, Cheung and Hew (2009) reviewed studies on mobile devices from 2000 to 2008 and found no significant differences in students' test scores for studies that comparedmobile devices to equivalent paper-and-pencil treatments.", "Some reviews focused on specific aspects of mobile learning, such as mobile learning games (Avouris & Yiannoutsou, 2012; Schmitz, Klemke, & Specht, 2012), mobile computersupported collaborative learning (Hsu & Ching, 2013), or mobile apps (Jeng, Wu, Huang, Tan, & Yang, 2010). Trends in the literature have also been reported across multiple reviews. For example, reviews have shown that mobile learning is highly motivating for students (Hsu& Ching, 2013; Hwang&Wu, 2014; Schmitz et al., 2012). On the other hand, some of the findings from these past reviews have been contradictory. For example, reviews reported mixed findings on the effect of mobile environments on learning outcomes. Hwang and Wu (2014) did a review on mobile learning studies spanning 2008e2012 from select journals and found that 83% of the studies that measured learning achievements reported positive outcomes. Similarly, Hsu and Ching (2013) reviewed studies on mobile computer-supported collaborative learning from 2004 to 2011 and reported that six of the nine studies found positive improvements in students' understanding and application of concepts.", "Technology-based scaffolding The most frequent design feature employed by the mobile apps was the use of technology-based scaffolding (23 apps). Many of these apps utilized scaffolding to address one of the common challenges withmobile learning, which is that students can become overwhelmed or overloaded by studying real-world issues with minimal supports (Dunleavy, Dede, & Mitchell, 2009; Rosenbaum et al., 2007). There were a variety of different types of scaffolds found in these mobile apps, which can be classified based on their functions: conceptual, metacognitive, procedural, and strategic (Hannafin, Land, & Oliver, 1999). Conceptual scaffolds provide guidance on the underlying concepts and knowledge to consider. Many of the apps provided hints, feedback, access to experts, and just-in-time resources to provide this type of guidance. One example of this type of scaffolding was an app that utilized two-tier guidance developed by Chu, Hwang, Tsai, et al. (2010). In this app, students are provided with personalized guidance to observe and classify plants through adaptive supports."]} +{"33899228|59459303": ["In contrast to these positive findings, Schmitz et al. (2012) reviewed studies on mobile games from 2001 to 2011 and found that there was not sufficient evidence on whether mobile games improved learning outcomes.", "For example, reviews have shown that mobile learning is highly motivating for students (Hsu& Ching, 2013; Hwang&Wu, 2014; Schmitz et al., 2012).", "Furthermore, only a few studies reviewed the attributes or design patterns/features of mobile apps (Avouris & Yiannoutsou, 2012; Jeng et al., 2010; Schmitz et al., 2012), and two of these studies were focused specifically on games.", "Note: the affective domainwas not included because it was not a focus of this review, given the consistent findings among prior reviews that mobile learning is motivating, engaging, and of interest to students (Hsu & Ching, 2013; Hwang & Wu, 2014; Schmitz et al., 2012)."]} +{"42193302|469744": ["\u2026a learning support technology is achievable through the use of Augmented Reality (AR), which combines human senses (e.g., sight, sound, and touch) with virtual objects to facilitate real-world environment interactions for users to achieve an authentic perception of the environment (Azuma, 1997).", "AR is a technology that allows users to combine real-life sensory experience with digital environment perceptions (Azuma, 1997).", "Recently, the advancement and popularity of handheld devices and sensing technologies has enabled researchers to implement more effective learning methods (Ogata, Li, Hou, Uosaki, El-Bishouty, & Yano, 2011).", "Moreover, it was found that the students who learned with the augmented reality-based mobile learning approach showed significantly higher motivations in the attention, confidence, and relevance dimensions than those who learned with the conventional inquiry-based mobile learning approach."]} +{"15775130|469744": []} +{"33810005|469744": ["AR is a highly complicated system that integrates mobile computing, tracking technology, visual simulation, digital synthesis, and a human\u2013machine interface and its characteristics include combining real and virtual environments, interacting in real time, and registering in a 3D environment (Azuma, 1997)."]} diff --git a/edge/graph_29722528.jsonl b/edge/graph_29722528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29737967.jsonl b/edge/graph_29737967.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_297464.jsonl b/edge/graph_297464.jsonl similarity index 100% rename from graph_297464.jsonl rename to edge/graph_297464.jsonl diff --git a/edge/graph_29756857.jsonl b/edge/graph_29756857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b6e1ba800d894701e600305cb23c8413ef8dd53 --- /dev/null +++ b/edge/graph_29756857.jsonl @@ -0,0 +1,10 @@ +{"18607652|206459491": ["In other IC design related processes/issues, functional module extraction is also employed in Trojan detection [3], copyright infringement investigation and competitive analysis [4]."]} +{"16430074|206459491": ["Microcontrollers are extensively used in embedded systems, and they are equipped with \u2018\u2018fuse bits\u2019\u2019 to prevent unauthorized users from reading or modifying selected sections of its memory.", "The left column shows\nthe goals of the attack, and the right column shows the location of the attacker within the IC supply chain.", "Similarly, critical control and communication functions assume that the hardware platforms that they are implemented on are resilient to attacks.", "Different assumptions are typically made concerning the hardware-based vulnerabilities, threats that exploit them, models for the considered threats, and defenses."]} +{"3745099|206459491": ["The possibility that malicious chips might be used in sensitive locations such as military, financial and government infrastructure is a serious and pressing concern to both the users and designers of contemporary ICs [1], [8], [15], [17], [28]."]} +{"207022595|206459491": ["KEYWORDS | Hardware intellectual property (IP) trust; hardware obfuscation; hardware Trojan attacks; self-referencing;\nside-channel analysis; Trojan detection; Trojan taxonomy;\nTrojan tolerance"]} +{"2130144|12489337": ["Colombier and Bossuet [35] provide a detailed discussion on protection of design data and IP with exhaustive survey of previous research into hardware protection.", "Colombier and Bossuet [35] provide a detailed discussion on"]} +{"2130144|206459491": ["Finally, the requirement of being stealthy is often more crucial in the case of obfuscation, as the adversary speci\ufb01cally tries to overcome the stealthiness, something that is not always the case for hardware Trojans.", "Second, Trojans and obfuscation have vastly different reliability requirements.", "This type of dopant manipulation has been used to create stuck-at faults and create Trojans [37].", "An attacker may want to learn the details of a security module with the goal of subsequently weakening it or inserting carefully crafted Trojans.", "While physical design obfuscation aims at protecting a design through various low level manipulations as discussed above, hardware Trojans can potentially exploit the same techniques to insert malicious functionality into a target circuit [37].", "First, Trojans have malicious intent and are therefore inserted by adversaries in the design \ufb02ow, while obfuscation is introduced by designers aiming to protect a circuit.", "More concretely, what are sometimes called parametric Trojans [64] are quite similar to the mechanisms discussed in Secs.", "Below, we brie\ufb02y discuss two related concepts, hardware Trojans and tamper protection techniques.", "There are, however, several important differences between Trojans and obfuscation."]} +{"64414843|206459491": []} +{"170900|206459491": []} +{"5249939|206459491": ["Abstract Integrated circuits (ICs) are now designed and fabricated \nin a globalized multi-vendor environment making them vulnerable to malicious design changes, the insertion \nof hardware trojans/malware and intellectual property (IP) theft."]} +{"15766845|206459491": ["Such components can either act as a silicon time bomb where the device can behave differently under certain conditions or act as a backdoor where secret information from the chip can be sent out to an adversary [32]."]} diff --git a/edge/graph_29776467.jsonl b/edge/graph_29776467.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29778392.jsonl b/edge/graph_29778392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91bce66cced93628b3168def1bb513e3405b72c6 --- /dev/null +++ b/edge/graph_29778392.jsonl @@ -0,0 +1,4 @@ +{"37174796|11042075": []} +{"6863252|7861381": ["The rest of the section is organized by following coarsely and extending the classi\ufb01cation of deformation models given by Holden [14]."]} +{"40343147|18992935": ["Since HCI devices are possible sources of contamination due to the difficulty in sterilization, clinical protocols have been devised to delegate control of the terminal to a sterile human assistant [1], [2].", "Nevertheless, this mode of communication has been shown to be cumbersome [3], prone to errors [1] and overall, inefficient."]} +{"922959|7834819": ["Recent studies proposed the use of wearable sensors [10], [11]."]} diff --git a/edge/graph_2979954.jsonl b/edge/graph_2979954.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_29833732.jsonl b/edge/graph_29833732.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d5211d10e1031ab4d00347689d670015a11848b --- /dev/null +++ b/edge/graph_29833732.jsonl @@ -0,0 +1,13 @@ +{"14139654|14441987": []} +{"141053|1775475": []} +{"141053|14441987": []} +{"44944144|14441987": []} +{"38589205|10559330": ["Two service models, integrated service (IntServ) [2] and differentiated service (DiffServ) [3], have been proposed to provide QoS support in the Internet."]} +{"8220723|1110872": ["[36] present a survey on the various suggestions to improve TCP behavior over heterogeneous networks."]} +{"7039303|11726599": []} +{"2527210|10559330": []} +{"6722528|10559330": ["For example, we can introduce IntServ [15] or DiffServ [16] to Network Layer for IP-based QoS management."]} +{"32115376|17669480": ["There exist several surveys that discuss QoS support in MANETs (Shigang, 1999; Chakrabarti and Mishra, 2001; Al-Karaki and Kamal, 2004). The other recent surveys have been done by Zhang and Mouftah (2005), Reddy et al.", "(2006), Hanzo and Tafazolli (2007), Chen and Heinzelman (2007), Abbas and Kure (2010) and Asokan (2010).", "Abbas and Kure (2010) present a review of the research related to the provision of QoS in an ad hoc environment."]} +{"32115376|18643817": []} +{"32115376|14088590": []} +{"6981637|10559330": ["Generally, these components work together to achieve specific goals that are specified by a QoS service model [18\u201320]."]} diff --git a/edge/graph_29859741.jsonl b/edge/graph_29859741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31a7368e2602e8d3a8530105078461d365e2fc6e --- /dev/null +++ b/edge/graph_29859741.jsonl @@ -0,0 +1,16 @@ +{"17701994|5914350": []} +{"17701994|9436742": []} +{"1189413|3892600": ["To this aim, many communication protocols meant for different WBAN applications are being developed and can be found in literature."]} +{"1189413|7988320": ["Authors propose a set of requirements referring to technical (radio interface) characteristics of WBANs."]} +{"1684082|2220294": ["These sensors can be used to monitor various conditions such as cardiac symptoms [28] and enable transmission of other health data and health information to the provider [27]."]} +{"1684082|20905429": ["Such potential sensor approaches could include accelerometers as have been proposed for fall detection [53], car-based sensors to detect car accident\u2013related emergencies [54], or ECG, EEG or other vital sign sensors worn by or implanted for the individual [55, 56].", "A pulse oximeter sensor, which is able to measure heart rate, is a sensor that could be a candidate sensor for detecting life-threatening emergencies, as it has relatively advanced commercial availability including in a convenient form [56]."]} +{"9496996|12815020": []} +{"2220499|7329149": []} +{"2220499|1598350": ["T HE INTERNET of Things (IoT) [1] has become popular over the past decade."]} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"62093910|16209841": ["placing security within the application payload, has been discussed as an option [5], [31] the related work in the literature leverages its benefits to provide fine grained access control with an assertionbased authorization framework [32]."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} diff --git a/edge/graph_29892722.jsonl b/edge/graph_29892722.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_2992477.jsonl b/edge/graph_2992477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d96dbc115532a47c1623680824b4466652252ad4 --- /dev/null +++ b/edge/graph_2992477.jsonl @@ -0,0 +1,2 @@ +{"12293616|1437067": ["GAs for rule discovery can be further divided into two main approaches (Freitas, 2001), based on how rules are encoded in the population of individuals.", "However, there is a problem when rules are encoded into a GP individual, due to the closure property of GP (Freitas, 2001)."]} +{"12293616|954543": []} diff --git a/graph_2993463.jsonl b/edge/graph_2993463.jsonl similarity index 100% rename from graph_2993463.jsonl rename to edge/graph_2993463.jsonl diff --git a/edge/graph_29967607.jsonl b/edge/graph_29967607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a00faa9bfbfdb9ed65afc0aed5c7b5ac950e9ab7 --- /dev/null +++ b/edge/graph_29967607.jsonl @@ -0,0 +1,9 @@ +{"39172249|17446703": []} +{"39172249|627405": []} +{"12254063|16378248": ["we use a shaded feature to mean a feature specific to model-to-text transformation languages, and a non-shaded feature to mean a feature that also applies to model-tomodel transformation languages and has been re-used from the feature model of Czarnecki and Helsen [2].", "This feature is re-used from the feature model of Czarnecki and Helsen [2].", "We draw inspiration from a previous feature-based survey of model transformation languages by Czarnecki and Helsen [2].", "In an extension to the ModularityMechanisms feature of Czarnecki and Helsen [2], we recognise that there are a range of modularity mechanisms available in contemporary M2T languages, including Queries (i.", "The feature model is inspired by previous work by Czarnecki and Helsen [2] on surveying model transformation, but focuses on template-based M2T languages (which Czarnecki and Helsen considered only as a degenerate case of model-tomodel transformation).", "This feature is a more restrictive version of the RuleSelection feature of Czarnecki and Helsen [2].", "Following the comparison, we listed the primary features of each language, grouping them into categories based on similarities, using the MOFM2T standard and the feature model of Czarnecki and Helsen [2] for guidance.", "the feature model of Czarnecki and Helsen [2] for two reasons.", "org/acceleo/ languages are template-based [2] (rather than using a visitor pattern or explicit printing statements), and we focus on template-based M2T languages in our feature model and throughout the remainder of the paper.", "This feature is analogous to the TransformationRules feature of Czarnecki and Helsen [2]."]} +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} +{"27616236|1497267": ["The concept of enterprise framework specializes the notion of application framework [7][8] [31][39], and denotes a reusable, semi-complete application \u201cskeleton\u201d that can be easily adapted to produce custom software products in a specific business sector\u201d [6].", "Any framework holds a reusability property that can yield substantial improvements in the productivity of a development team, and can enhance the quality, performance, and reliability of the final product [7][8][17][41]."]} +{"11209668|16378248": ["Hence, platform models allow comparing different transformation approaches, in a similar way as in [12].", "Java), but with M2M transformation languages specially tailored for the task of transforming models [12]."]} +{"15777872|16378248": ["Czarnecki and Helsen [20] proposed a hierarchical classification of the model transformations specification (mainly centered on graph transformations), whereas Mens and Van Gorp [7] focused more on providing a multidimensional taxonomy, thus covering as well formalisms and tools underlying model transformations.", "Two works [7][20] addressed the model transformation classification issue."]} +{"646568|16378248": ["The right hand side of figure 2 (column model transformation (MT) implementation) aligns different kinds of properties for model transformations with the well-known model transformation pattern [35]."]} +{"16397799|5722102": []} diff --git a/edge/graph_29983729.jsonl b/edge/graph_29983729.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff7611aa2aaaef80959ce2e13689e1795d82245d --- /dev/null +++ b/edge/graph_29983729.jsonl @@ -0,0 +1,2 @@ +{"15796366|1962133": ["| T H E A U S T R A L I A N N A T I O N A L U N I V E R S I T Y\n1\nCrawford School of Public Policy\n2\nResearch Assessment Using Early Citation Information\nCrawford School Research Paper No. 15-01 April 2015 Stephan B. Burns Meta-Research In Economics Group University of Kassel David I. Stern\u2026"]} +{"3023580|2253457": ["This is a form of contextual normalization (Turney, 1993, 1996), where the citing paper is the context of a feature."]} diff --git a/edge/graph_29997805.jsonl b/edge/graph_29997805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9d1f9e91797159724f3a38fd157fdee166d71ef --- /dev/null +++ b/edge/graph_29997805.jsonl @@ -0,0 +1,12 @@ +{"670285|1230643": ["Recent advances in micro-electro-mechanical systems (MEMS) and low power and highly integrated digital electronics have led to the development of micro sensors [1,9,17,21,22,24,27].", "Each sensor node i will calculate its r-value ri by using d as follows: From [1],", "using the approaches presented in [1,3].", "Then d will be calculated as follows:\nd = Trequired\u2211 \u2200i\u2208Path ( pi + \u2211qi j=1 p j ) \u2217 \u03bbRT (4) Each sensor node i will calculate its r-value ri by using d as follows:\nFrom [1],\nd = 1 ri\u00b5 \u2212 \u03bbRT \u2217 ( pi + \u2211qi j=1 p j ) ri = 1\nd \u2217 \u00b5 + \u03bbRT \u00b5 \u2217\n( pi +\nqi\u2211 j=1 p j\n) (5)\nThen the problem will be to maximize the total throughput on each particular path:\nMax ( \u2211 \u2200i\u2208Path (1 \u2212 ri ) ) where 0 \u2264 ri < 1."]} +{"14457825|1230643": ["Generally paths in WSNs routing protocol are established based on min hops, max available power and low latency etc [ 1 ] [6] [7].", "The scalar data generated from simple scalar nodes does not require high bandwidth and low latency and is treated as best effort traffic [ 1 ]."]} +{"14315331|3540699": ["\u2026VIDEO ENCODING Implementations of current video compression standards, such as the ISO MPEG schemes or the ITU-T recommendations H.263 and H.264 [56], [57] require much more computation for the encoder than for the decoder; typically the encoder is 5\u201310 times more complex than the decoder."]} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"9199492|18643817": ["\u2026protocols, and techniques have been done in the last few years to deliver multimedia content over large-scale networks, such as single-hop wired LANs (e.g., [3], [4]), multi-hop wired LANs (e.g., [5]), ATM (e.g., [6], [7]), mobile adhoc networks(e.g., [8], [9]) and the Internet (e.g., [10]\u2013 [14])."]} +{"9199492|14088590": []} +{"9199492|12817488": []} +{"9199492|1236072": ["For example, some applications might require a diverse mixture of sensors for monitoring temperature, pressure, and humidity of the surrounding environment, detecting motion via acoustic signatures, and capturing images or video tracking of moving objects [24]."]} +{"9199492|1230643": ["Although plethora of works on surveying architecture, applications and communication protocols for wireless sensor networks are performed beforehand [1], [15]\u2013[20], this survey is distinguished from the previous efforts in that it pioneers to investigate those routing techniques which address application-specific QoS as well as energy efficiency for WMSNs.", "[15], [34], [35], [36], [39], [40], [41], [42] Hard Real-time Bounded"]} diff --git a/edge/graph_30026035.jsonl b/edge/graph_30026035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8c443f308ac6cd2dff36c116b4c92610986f62f --- /dev/null +++ b/edge/graph_30026035.jsonl @@ -0,0 +1,15 @@ +{"9065822|619938": []} +{"5652781|15782139": ["With the proliferation of pen-based and touch-based mobile computers, online handwriting recognition has many potential applications [1\u20134], including text input, handwritten notes and diagrams recording, signature verification, and mathematical expressions recognition [5].", "sentence classes of Chinese texts, over-segmentation-based character string recognition approaches are commonly used [1]."]} +{"11210346|11792588": ["In the literature, feature extraction methods have been based on three types of features: a) statistical, b) structural and c) global transformations [4]."]} +{"44268933|27527196": []} +{"44268933|16082889": ["Since handwritten text is one of the most frequently used forms of communication, there has been a substantial interest in the last decades for pattern recognition methods that allow an automatic transcription [1,2]."]} +{"44268933|15782139": []} +{"23322680|14580698": ["\u2013 Slant correction: the most commonly used method for slant estimation is the calculation of the average angle of near-vertical strokes [16, 17, 18]."]} +{"18356248|2762290": ["Many methods have been proposed for alphanumeric character string (word) segmentation [1, 2], and some works have focused on the splitting of touching characters (multiple characters in a connected component, also called a touching pattern), which appear frequently in both printed and handwritten images."]} +{"10697189|16082889": []} +{"205905441|192934": []} +{"13382244|11792588": ["From this perspective, we opted for a method exploiting the morphological characteristics of the Amazigh language using a Markov model optimized by algorithms based on dynamic programming [3]."]} +{"11470786|27527196": ["text [30].", "The general trend for cursive text recognition is to use HMM [30]."]} +{"17899938|2762290": ["To deal with the ambiguity of character segmentation, handwritten text recognition is usually accomplished by integrated segmentation and recognition [1]."]} +{"15750821|27527196": ["Therefore model for example HMM [6] not be used frequently."]} +{"11216140|2762290": ["This problem is solved by integrated segmentation and recognition with a hypothesis-and-test strategy [1], [2], also called recognition-based segmentation [3], classification-based segmentation [4], or internal segmentation, as opposed to external segmentation."]} diff --git a/edge/graph_30037917.jsonl b/edge/graph_30037917.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b9f5479ffca96d0478f078fd53833c68fd91cf9 --- /dev/null +++ b/edge/graph_30037917.jsonl @@ -0,0 +1,4 @@ +{"15039825|2762484": []} +{"8272806|12377645": ["Major, Kyriacou and Brereton\u2019s report [13] from 2012 provides a pure literature review of teaching novice programming using robots."]} +{"4087845|3348390": ["In a broader scope, third-party applications or the end-user can subscribe to a particular node of the tree."]} +{"14479234|1898434": ["autonomy, sociality, rationality, responsiveness, proactiveness, situatedness, mobility) [3], which make them very suitable to effectively model CSOs."]} diff --git a/edge/graph_3003898.jsonl b/edge/graph_3003898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30047652.jsonl b/edge/graph_30047652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30049275.jsonl b/edge/graph_30049275.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30056587.jsonl b/edge/graph_30056587.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47e16833639b76105887c13477f3d56ce0e468b0 --- /dev/null +++ b/edge/graph_30056587.jsonl @@ -0,0 +1 @@ +{"14817131|2736673": []} diff --git a/graph_3006511.jsonl b/edge/graph_3006511.jsonl similarity index 100% rename from graph_3006511.jsonl rename to edge/graph_3006511.jsonl diff --git a/edge/graph_30071442.jsonl b/edge/graph_30071442.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3007529.jsonl b/edge/graph_3007529.jsonl similarity index 100% rename from graph_3007529.jsonl rename to edge/graph_3007529.jsonl diff --git a/edge/graph_30102381.jsonl b/edge/graph_30102381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..133cc625c68ac4cc51a47a225a0958f67952b547 --- /dev/null +++ b/edge/graph_30102381.jsonl @@ -0,0 +1,15 @@ +{"5747564|595093": ["Analyzing and implementing smart grid security is a challenging task, especially when considering the scale of the potential damages that could be caused by cyber attacks [46]."]} +{"12699980|121289": ["This leads to larger overall data volumes and a high degree of complexity which needs to be handled by the ICT infrastructure [2]."]} +{"22165647|12083425": []} +{"3178691|18956392": ["[10]."]} +{"3178691|6959212": ["In general, sensor nodes have limited battery energy supply [11].", "monitoring and diagnostic systems [1], [4], [9], [11], [19], [30].", "reliable communication capabilities of the deployed WSNs [11], [13].", "system reliability and efficiency by optimizing the management of electric power systems [11], [13].", "online energy consumption of the customers [20] and for asset protection through advanced remote monitoring [11], [23].", ", accidents in the electric power systems, it is important to receive the data at the controller node in a timely manner [11].", "become essential to maintain safety, reliability, efficiency, and uptime of the smart grid [11], [13], [19], [30].", "in a remote and online manner [11], [12], [18], [24], [27].", "These harsh environmental conditions and dynamic network topologies may cause a portion of sensor nodes to malfunction or render the information they gather obsolete [11]."]} +{"3178691|1230643": ["monitoring and diagnostic systems [1], [4], [9], [11], [19], [30]."]} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"20034184|6959212": ["The smart grid communication systems must be robust enough to accommodate new media, as they emerge from the communication industries, while preserving interoperable and secured systems [ 3 ].", "Real-time pricing capability of WAMR systems can also be beneficial to the customers by shifting their loads during off-peak times [ 17 ].", "NIST has recognized IEC 61850 standard for substation automation and protection applications in smart grid environment [ 3 ].", "ESI can be a local controller or customer\u2019s EMS [ 3 ].", "[1], [2]. According to [ 3 ], the term \u201cSmart Grid\u201d refers to a modernization of the electricity delivery system so it monitors, protects and automatically optimizes the operation of its interconnected elements \u2013 from the central and distributed generator through the high-voltage transmission network and the distribution system, to industrial users and building automation systems, to energy storage installations and to end-use consumers and ...", "Several activities are going on to address this communication infrastructure related challenges [ 3 ].", "In the recent report on National Institute of Standard and Technology (NIST) framework and roadmap for smart grid interoperability standards [ 3 ], several wired and wireless communication technologies are identified for smart grid.", "Using the conceptual model of smart grid proposed in [ 3 ], the smart grid framework of information exchange among the communication domains (represented as clouds) has been illustrated in Fig. 1. The lower layer domains related to electric power system are generation domain; transmission domain presented as regional Control Center (CC) and"]} +{"39634994|5747564": []} +{"39634994|6959212": []} +{"39634994|18037424": []} +{"21962788|4631990": ["This analysis may also include the communication which might be based on different protocols typically used in the area of building automation and smart homes (SH) [9], [10]."]} +{"109859722|18037424": []} +{"12103882|17774971": []} +{"12103882|192934": []} diff --git a/edge/graph_30113988.jsonl b/edge/graph_30113988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30118266.jsonl b/edge/graph_30118266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a50fc79cb3aaf9d70a14f314edaf4e950bd83e84 --- /dev/null +++ b/edge/graph_30118266.jsonl @@ -0,0 +1,20 @@ +{"28386639|64404": ["Prediction and transform are two well-known and frequently applied methods for data decorrelation in visual signal coding and compression applications [14], [111]."]} +{"28386639|396631": []} +{"28386639|14889616": ["Finally, perceptual video coding has been applied to new video applications, including layered/scalable coding [134]\u2013[136] for heterogeneous and dynamic transmission and consumption [62], full HD 3-D video [137]\u2013[140], and high-quality digital cinematic materials or motion picture coding applications [141]."]} +{"28386639|7439310": ["Buffering strategies are common to minimize the variations in the time-varying bandwidths and jitter; error concealment can minimize the visual impact of a lost packet [164]; and retransmission and forward error correction (FEC) can reduce the number and frequency of packet loss."]} +{"6200974|17113548": ["BIQUITOUS transmission of compressed video sequences over computer networks may be achieved in the near future [ 1 ] provided that transmission costs are reduced and bandwidth constraints are addressed."]} +{"6415922|15744805": ["To date, no standard evaluation method prevails [25], and different measures may yield distinct rankings [24] (as an aside note, the present authors are nowadays developing image noise measures by mathematical morphology [21], allowing for instance, his use in image filtering design by GAs)."]} +{"12977363|3540699": ["Many of the first 3D video systems are likely to use the Multiview Video Coding (MVC) extension [1] of the Advanced Video Coding (H.264/AVC) standard [2] as the compression format."]} +{"8191230|3540699": ["fact that they are sparsely sampled and thus lack accuracy [18]."]} +{"5664868|64404": []} +{"20817296|3540699": ["The process of H.264/AVC video codec is explained in Wiegand and Sullivan (2003), Marpe et al. (2003) and Sullivan and Wiegand (1998)."]} +{"16582470|64404": []} +{"16273904|25699143": ["Numerous stereo matching methods that appeared in the literature were developed for the standard stereo images (see review papers in [11]\u2013[13])."]} +{"36510258|5473785": ["The evaluated association measure is used to instantiate a virtual evidence node [ 20 ] which contributes probability values in favor and against the saliency of the grouping.", "As a result of instantiation of virtual evidence nodes, belief propagation [ 20 ] takes place in the Bayesian network, and the nodes A, B, C, D, and S compute the grouping saliency."]} +{"617582|3540699": ["Regarding single view video coding, where prediction is limited to reference pictures in temporal dimension, the concept of hierarchical B pictures (see [11] for a detailed description) has proven to provide high compression efficiency."]} +{"6429726|12127129": ["Background subtraction [24] is a widely used approach for detecting moving objects in videos from static cameras.", "A very simple and computationally efficient method to do this is the running average method [24]:", "We remark that a good quality of the extracted foreground, related to a high value of PSNR, is fundamental to achieve good results in the subsequent analysis stage [24]."]} +{"16359426|987239": ["In particular, they are dedicated to shape-based retrieval in database of 3D mesh models [17]."]} +{"29130650|3540699": ["264/AVC), the coding information (such as the motion vector) of the U and V channels is directly derived from that of the Y channel in the intra- or inter-frame prediction process [28].", "264/AVC encoder block diagram (refer to [28] for more details)."]} +{"10607510|3540699": ["In the long literature of standard video compression [4], a variety of methods have been proposed to exploit these redundancies."]} +{"14693265|987239": []} +{"61632611|3540699": []} diff --git a/edge/graph_30134048.jsonl b/edge/graph_30134048.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9a4f77659ba3717df4b5d670befca1eb7d9036d --- /dev/null +++ b/edge/graph_30134048.jsonl @@ -0,0 +1,9 @@ +{"14750410|8006086": ["4 wireless links and enables WSNs to communicate with the Internet more efficiently [31]."]} +{"14750410|18717047": ["Then, the CSV file is used to store the data in the database."]} +{"14750410|562065": ["It is now widely used in several areas since it provides a wide range of environment monitoring and military surveillance applications among others [1, 2]."]} +{"16466935|3755658": ["The acquisitional query processing [20] permits to reducing the numenergy consumption in the network by sensor nodes participating in the reduction is done by expressing in the query when or what sensors to sample."]} +{"16466935|562065": ["The goal of this work is not only to present how data and query management techniques have advanced nowadays, but also show their benefits and drawbacks, and to identify open issues providing guidelines for further contributions in this type of distributed architectures."]} +{"16466935|7889189": ["Moreover like in traditional computer networks, sensor networks are particularly vulnerable to several key types of attacks that can be performed in a variety of ways [62], [63], [64], [65], as Sybil attack [66], trafic analysis attacks [67], node replication attacks [68],"]} +{"16466935|1236072": ["The acquisitional query processing [20] permits to reducing the numenergy consumption in the network by sensor nodes participating in the reduction is done by expressing in the query when or what sensors to sample."]} +{"16466935|1230643": ["Index Terms\u2014Distributed database management; wireless se networks; distributed storage; query techniques, data\nduction techniques; query optimization."]} +{"14478372|10011823": ["Regarding the online sensor data model-based segmentation, we applied the PCA(piecewise constant approximation) [1].", "To this end, various modelbased sensor data management techniques [1]-[4] have been proposed."]} diff --git a/edge/graph_30141420.jsonl b/edge/graph_30141420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3015999.jsonl b/edge/graph_3015999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30169298.jsonl b/edge/graph_30169298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30188093.jsonl b/edge/graph_30188093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..238d36274c7dafcb979e50a09bb27fc1d75ea94a --- /dev/null +++ b/edge/graph_30188093.jsonl @@ -0,0 +1,2 @@ +{"13985810|11979239": []} +{"64377385|11979239": ["To the best of our knowledge, there is only one paper surveying this area [16], with an incomplete overview and imprecise classification of some recently proposed protocols."]} diff --git a/edge/graph_30189749.jsonl b/edge/graph_30189749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8948d008f6e0bc289f10cefdad2f16b9a3c05abc --- /dev/null +++ b/edge/graph_30189749.jsonl @@ -0,0 +1,8 @@ +{"124086543|30189749": []} +{"19012488|5660618": ["A recent review of the vast literature on multi -agent systems can be found in [9], [15], [17], [18]."]} +{"19012488|1517662": ["The reader can refer to [12] for an elaborate survey of conflict resolution approaches."]} +{"8222916|16049411": ["Likewise, communication with traffic structures, nearby buildings, and traffic lights should allow for individual vehicle control systems to account for unpredictable changes in local infrastructures [6]."]} +{"17370570|30189749": []} +{"16854252|8363289": []} +{"1499480|8363289": []} +{"12135020|8363289": ["In the future, approaches surveyed in [16] can be adapted to achieve this goal."]} diff --git a/edge/graph_30209571.jsonl b/edge/graph_30209571.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c5afe30c71b91a6ee95a09ea7c191300236c7123 --- /dev/null +++ b/edge/graph_30209571.jsonl @@ -0,0 +1 @@ +{"11789508|11118693": []} diff --git a/edge/graph_3024182.jsonl b/edge/graph_3024182.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3024483.jsonl b/edge/graph_3024483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30254958.jsonl b/edge/graph_30254958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92c78c53a49c4f8a23d4f93816234e4dda085bea --- /dev/null +++ b/edge/graph_30254958.jsonl @@ -0,0 +1,2 @@ +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} diff --git a/edge/graph_30255496.jsonl b/edge/graph_30255496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c481eb2adae4b472bf68544f6497a0d40f9e525 --- /dev/null +++ b/edge/graph_30255496.jsonl @@ -0,0 +1,2 @@ +{"11372438|1252121": []} +{"9763901|5991584": ["This has made BGP vulnerable to a number of routing attacks, the most common [19,21,41,50,51,56] and devastating [10,14,26,31] of which are pre\ufb01x-and subpre\ufb01x hijacks."]} diff --git a/edge/graph_30265227.jsonl b/edge/graph_30265227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38e9e74844a68bb84a86aad0c3102389a923341e --- /dev/null +++ b/edge/graph_30265227.jsonl @@ -0,0 +1,2 @@ +{"42392887|206051485": ["Here, we have adapted a robust and highly accurate phase-only correlation (POC) method, which is based on image phase information alone [4].", "The image stabilizer alleviates the shaking of images by using a phase-only correlation technique [4]."]} +{"85049111|6746689": []} diff --git a/edge/graph_30270627.jsonl b/edge/graph_30270627.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c93014e8041924b8e268c8d0d148947996f49760 --- /dev/null +++ b/edge/graph_30270627.jsonl @@ -0,0 +1 @@ +{"9961884|8953108": ["1Sezgin and Sankur review 40 thresholding techniques in [33]."]} diff --git a/edge/graph_302716.jsonl b/edge/graph_302716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3029414.jsonl b/edge/graph_3029414.jsonl similarity index 100% rename from graph_3029414.jsonl rename to edge/graph_3029414.jsonl diff --git a/edge/graph_30314751.jsonl b/edge/graph_30314751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6f304c01150eca1331c4711389bdaf1f4e25910 --- /dev/null +++ b/edge/graph_30314751.jsonl @@ -0,0 +1,12 @@ +{"2337263|14022070": ["CIT is an approach to software testing that produces tests to expose faults that occur when parameters or configurations to a system are combined [22]."]} +{"32307729|15428874": ["Unfortunately this throws the load back on to the coder [17]."]} +{"7259091|14920988": ["For a detailed overview of symbolic execution techniques, we refer the reader to previously published surveys in the area, such as [11, 19, 32, 34]."]} +{"8395709|14022070": ["A natural choice in any approach to testing a software product line (with its characteristic feature combinations) is the use of Combinatorial Interaction Testing (CIT) [122]."]} +{"20869112|6076208": ["Within the field of search-based software design, software architecture optimisation (Aleti et al. 2013) encompasses those works devoted to automatically specifying,", "Within the field of search-based software design, software architecture optimisation (Aleti et al. 2013) encompasses those works devoted to automatically specifying,\nre-designing, discovering or deploying software architectures.", "According to Aleti et al. (2013), the proposed approach can be classified as an architecture optimisation method, where a search-based algorithm is applied on a number of architectural artefacts in order to get the best trade-off between certain quality attributes."]} +{"18145202|15126268": ["While it is very di\ufb00erent in its methods and implementation, using a GLR parsing algorithm, providing grammar-based modularity and so on, most tasks appropriate to TXL can be expressed in ASF+SDF. Stratego[53,54] is a modern language aimed at the same kinds of problems as TXL. Stratego augments pure rewriting rules with the separate speci\ufb01cation of generic rewriting strategies, an idea adapted from the Elan[9] deduction metasystem.", "\u2026most tasks appropriate to TXL can be expressed in ASF+SDF. Stratego[53,54] is a modern language aimed at the same kinds of problems as TXL. Stratego augments pure rewriting rules with the separate speci\ufb01cation of generic rewriting strategies, an idea adapted from the Elan[9] deduction metasystem."]} +{"1774752|7844555": ["RQ2 uses the small programs shown in Table I and known as the Siemens Suite which have been widely-studied in previous work on analysis and manipulation [25]."]} +{"31071862|3053192": ["This has lead to the generation of hyper-heuristics [28], in which the GA or other basic solver is tweaked automatically."]} +{"12631997|3053192": ["\u2026design [Lohn and Hornby, 2006], creating art [Reynolds, 2011; Jacob, 2001; Langdon, 2004; Romero et al., 2013], the generation of hyper-heuristics [Burke et al., 2013], Web mashups [Rodriguez-Mier et al., 2010], Hashing [Hussain and Malliaris, 2000], Heap managers [Risco-Martin et al., 2014],\u2026"]} +{"207224618|7165993": ["We thereby use the original code as an oracle [3] to guide the GI to functionally correct solutions."]} +{"207224618|14022070": ["Combinatorial Interaction Testing (CIT) is a black box test sampling technique used to test highly configurable software [34].", "CIT has been successfully translated and run as a Boolean satisfiability problem [1, 34], though running these SAT problems is a computationally intensive task."]} +{"15272060|7165993": []} diff --git a/edge/graph_30383344.jsonl b/edge/graph_30383344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6ebedf800f221f9e1fad0591ab3446c0f941adf --- /dev/null +++ b/edge/graph_30383344.jsonl @@ -0,0 +1,4 @@ +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"7854020|7988320": []} +{"12594700|1230643": ["We refer readers interested in studies on software and network architectures to any of the many excellent surveys that have recently been published on these topics [26,27]."]} diff --git a/graph_3038523.jsonl b/edge/graph_3038523.jsonl similarity index 100% rename from graph_3038523.jsonl rename to edge/graph_3038523.jsonl diff --git a/graph_303976.jsonl b/edge/graph_303976.jsonl similarity index 100% rename from graph_303976.jsonl rename to edge/graph_303976.jsonl diff --git a/edge/graph_30399972.jsonl b/edge/graph_30399972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0f10537c5447a51537e5d448034f4f4446009db --- /dev/null +++ b/edge/graph_30399972.jsonl @@ -0,0 +1,4 @@ +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"108517776|763939": []} +{"29115419|1940388": ["In those sensor networks scenarios where sensors have absolutely no chance for the execution of these tasks [16, 17], they incorporate only the minimum functions to protect sent"]} +{"17947354|8363289": ["The first one follows the work presented in [7] and uses a nonlinear vehicle model to predict the future evolution of the system [26].", "This is done in the spirit of model predictive control (MPC) [14], [26] along the lines of our ongoing internal research efforts dating from early 2000", "The main concept of MPC is to use a model of the plant to predict the future evolution of the system [6], [14], [17], [26], [27]."]} diff --git a/edge/graph_30404460.jsonl b/edge/graph_30404460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd6cfde149e425d518830ff9f9bbd9e70b04bb3c --- /dev/null +++ b/edge/graph_30404460.jsonl @@ -0,0 +1,3 @@ +{"41692620|17381415": []} +{"41692620|12083425": ["The step prior to WECS grid interconnection is its synchronization by means of appropriate power electronics and a suitable control strategy [47]."]} +{"6165372|1876323": ["Therefore, transmission-line active and reactive powers present first-order dynamics and have a strong relative degree of one [25], since from the control viewpoint, its first time derivative already contains the control variable (the strong relative degree generally represents the number of times the control output variable must be differentiated until a control input appears explicitly in the dynamics) [26]\u2013[29].", "Still, there is room to further improve the dynamic response of UPFCs, using nonlinear robust controllers [26].", "These P, Q controllers were designed based on control laws not dependent on system parameters, but only on the errors of the controlled output to ensure robustness to parameter variations or operating conditions and allow system order reduction, minimizing response times [26]."]} diff --git a/edge/graph_30413921.jsonl b/edge/graph_30413921.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0389fdeb2fbc189db09776f771fdd3f74417e11 --- /dev/null +++ b/edge/graph_30413921.jsonl @@ -0,0 +1,2 @@ +{"18032803|8363289": [", terminal set constraints) have to be added to the original problem which may result in degraded performance [25, 24].", "12c) the closed-loop system is guaranteed to be stabilizing for receding horizon control [13, 24].", "12c) is a user defined set-constraint on the final state which may be chosen such that stability of the closed-loop system is guaranteed [24].", "Finite Time Optimal Control [8, 3, 9, 24] To use this method, set probStruct.", "For a good overview of receding horizon control we refer the reader to [24, 22]."]} +{"122449604|8363289": []} diff --git a/graph_3042022.jsonl b/edge/graph_3042022.jsonl similarity index 100% rename from graph_3042022.jsonl rename to edge/graph_3042022.jsonl diff --git a/graph_304226.jsonl b/edge/graph_304226.jsonl similarity index 100% rename from graph_304226.jsonl rename to edge/graph_304226.jsonl diff --git a/graph_3042864.jsonl b/edge/graph_3042864.jsonl similarity index 100% rename from graph_3042864.jsonl rename to edge/graph_3042864.jsonl diff --git a/edge/graph_30430657.jsonl b/edge/graph_30430657.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..98d383fdfead9da19d40316da6a8c18903d8eacb --- /dev/null +++ b/edge/graph_30430657.jsonl @@ -0,0 +1,6 @@ +{"34784452|30430657": ["0 [1] aims to reliably deliver live broadcast television and accompanying services in the entire coverage area for a range of device types."]} +{"31655207|30430657": ["0 as an optional method [10]\u2013[27]."]} +{"26544960|11720829": []} +{"29226484|30430657": []} +{"1142029|30430657": ["0 system, to provide higher data capacity, more robust performance, better spectrum efficiency, and to enable new services [1]."]} +{"206606565|30430657": ["In order to achieve this requirement, a new physical layer system [6] is being designed and the physical layer has no consideration of compatibility with the legacy physical layer ATSC system."]} diff --git a/edge/graph_30434123.jsonl b/edge/graph_30434123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30443041.jsonl b/edge/graph_30443041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30518875.jsonl b/edge/graph_30518875.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3052779.jsonl b/edge/graph_3052779.jsonl similarity index 100% rename from graph_3052779.jsonl rename to edge/graph_3052779.jsonl diff --git a/graph_3053192.jsonl b/edge/graph_3053192.jsonl similarity index 100% rename from graph_3053192.jsonl rename to edge/graph_3053192.jsonl diff --git a/graph_3053914.jsonl b/edge/graph_3053914.jsonl similarity index 100% rename from graph_3053914.jsonl rename to edge/graph_3053914.jsonl diff --git a/edge/graph_3054454.jsonl b/edge/graph_3054454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30548952.jsonl b/edge/graph_30548952.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30552699.jsonl b/edge/graph_30552699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9b0a15332ba63f930149085cf6425c552e3b249 --- /dev/null +++ b/edge/graph_30552699.jsonl @@ -0,0 +1,14 @@ +{"11913098|1230643": []} +{"15379285|164835": ["Several radio-location methods are proposed for locating the Mobile Stations (MSs) in cellular systems [ 4 ]: the Signal Strength method, the Angle of Arrival (AOA) method, the Time of Arrival (TOA) and Time Difference of Arrival (TDOA) methods."]} +{"11135536|1230643": ["This technology has mainly been made possible by the convergence of micro-electromechanical systems technology, wireless communications, and digital electronics, enabling the construction of low-cost, lowpower, multifunctional sensor nodes that are small in size and communicate untethered in short distances, thus forming the sensor network [93]."]} +{"11135536|14441987": ["Data Dispersal This approach is based on Rabin\u2019s algorithm [11], which takes advantage of the existence of multiple routes from a source to a destination to increase reliability when transmitting packets.", "in [11]; it has been omitted since it requires a rigorous mathematical pre-", "(A survey of the two classes of routing protocols is available in [11]."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"17074461|1230643": []} +{"1009884|1230643": ["Due to the inextricable relation with the physical world, the proper deployment of sensors is very important for the successful completion of the sensing tasks issued [5], [6], [ 7 ]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"26805493|1230643": ["applications such as vegetation and environmental monitoring, military applications [1], object tracking (for example, tracking and monitoring patients and doctors in hospitals), search and rescue operations [2], and other industrial applications."]} +{"29872125|17325804": ["The substitute method is to estimate the distance of unknown node to reference node from some sets of measuring units using the attenuation of emitted signal strength [3, 12]."]} +{"29872125|206583375": ["ToA is the most accurate technique used in indoor environment which can filter out multi-path effects [4].", "IR signals have some limitations for location determination, like interference from fluorescent light and sunlight [4].", "Unfortunately, GPS does not perform well in urban canyons, close to walls, buildings, trees, indoors, and in underground environments as the signal from the GPS satellites is too weak to come across most buildings thus making GPS ineffective for indoor localization [4]."]} +{"106815534|1236072": ["During the development of such applications, challenges on several fronts have been investigated by researchers: ad -hoc networking [89, 2], power efficiency [67], in-network data aggregation [60, 62], time synchronization [34], and automatic node localization [93] to list a few."]} +{"5299993|6972141": ["On the other hand, a great number of vision-based indoor navigation methods have been proposed in the area of mobile robotics (Borenstein et al. 1996 DeSouza and Kak 2002)."]} +{"60450859|1230643": []} diff --git a/graph_3055684.jsonl b/edge/graph_3055684.jsonl similarity index 100% rename from graph_3055684.jsonl rename to edge/graph_3055684.jsonl diff --git a/graph_3056461.jsonl b/edge/graph_3056461.jsonl similarity index 100% rename from graph_3056461.jsonl rename to edge/graph_3056461.jsonl diff --git a/edge/graph_30575518.jsonl b/edge/graph_30575518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b49cccef94ac6dd69e6419c0a106c40734e517d5 --- /dev/null +++ b/edge/graph_30575518.jsonl @@ -0,0 +1,57 @@ +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"16017629|870434": ["In acoustic networks the power required for transmitting is typically about 100 times more than the power required for receiving [11]."]} +{"2628288|870434": ["Categories and Subject \nDescriptors C.2.1 [Computer-Communication Networks]: Network Architecture and Design Wireless communication; \nH.1.1 [Information Systems]: Systems and information the\u00adory Information theory General Terms Performance, \ntheory Keywords Underwater Acoustic Networks, Network\u2026"]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"38834550|42347181": []} +{"38834550|870434": []} +{"38834550|1236072": []} +{"392872|870434": ["Underwater sensor networks (UWSNs) consists of under\u00ad water sensor nodes deposed in different depths, equipped with a low bandwidth acoustic modem and with various sensors, that acts collaboratively to support applications such as underwater tactical surveillance, undersea exploration, underwater disaster prevention, etc [1], [2]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"11540749|16755687": ["Another paper has been presented by [14] that provides an in-depth discussion of geographical routing protocols."]} +{"11540749|42347181": ["the node may not be able to find the next neighbor towards the sink [13, 34].", "Many survey papers published in UWSNs by [6, 8, 10-13] presented a general review and categorizations for routing protocols.", "The location-based category requires expensive full location information while the beacon-based subcategory is expected to obtain expensive network information by sending beacon messages [13].", "This part contributes to a better delivery ratio than single path under a specific scenario [13, 21] and also consumes more energy as multipath generation results in duplicate packets."]} +{"11540749|16490750": ["Many survey papers published in UWSNs by [6, 8, 10-13] presented a general review and categorizations for routing protocols."]} +{"11540749|2835258": ["Source nodes could have knowledge about their neighbor nodes and can select the next forwarding nodes according to different factors in the protocols such as the nearest neighbor nodes to the destination or sink [31, 32]."]} +{"9585967|2835258": ["There is no need to transmit routing messages to update route states either [6].", "This undesirable phenomenon, called a communications void, is often also referred to as local maximum phenomenon [6] or local minimum phenomenon [13].", "Various greedy-forwarding algorithms [6] differ in the optimization criterion that is applied in the selection of a next-hop node.", "Geographic routing [6] usually consists of two main elements: a location service and a geographic forwarding strategy."]} +{"2366893|1762301": ["There has been an intensive study in routing protocols for terrestrial wireless ad hoc [9] and sensor networks [10] in the last few years."]} +{"829251|1230643": ["Sensor networks [1] differ from \" traditional \" ad hoc networks in many aspects."]} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"11188425|870434": ["As a promising solution to aquatic environmental monitoring and exploration, Underwater Sensor Network (UWSN) has attracted significant attention recently from both academia and industry [1], [2], [3], [4], [5]."]} +{"2897528|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [5], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"2897528|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [11].", "divided into three categories, namely proactive, reactiveand geographicalrouting protocols [11]:"]} +{"3410773|870434": []} +{"4700370|14441987": []} +{"18464069|1236072": ["Hence, different routing mechanisms have been proposed for different applications [1]."]} +{"29900686|13310760": ["9 that the energy dissipation increases with \u03c4 but it is less than [14].", "Moreover the proposed routing algorithm has less energy consumption than [13], less energy dissipation than [14] and also has less transmission delay than [13] as observed during simulation."]} +{"42347181|16490750": ["In [23], a number of routing protocols are examined and compared with each other in terms of different quality metrics, including successful packet delivery ratio, the average end-to-end delay, and energy consumption."]} +{"42347181|1236072": ["Then, the data packets are sent based on the existing paths in the table [9].", "The founded path is stored in a route table for a specific time to prevent a repeat of this algorithm in this period [9].", "A large number of routing protocols have been proposed for finding a path from source node to sink in the terrestrial wireless sensor networks (TWSNs) [8, 9]."]} +{"42347181|1230643": ["A large number of routing protocols have been proposed for finding a path from source node to sink in the terrestrial wireless sensor networks (TWSNs) [8, 9]."]} +{"11327046|14441987": []} +{"31799015|870434": ["On the other hand, optical modems have been shown to achieve data rates reaching to Mbit/s with ranges up to 100m, only in very clear water conditions [2].", "In underwater, radio signals attenuate rapidly, hence they can only travel to short distances while optical signals scatter and cannot travel far in adverse conditions, as well [2]."]} +{"46139527|870434": ["First of all, bandwidth of acoustic communication is limited to 40 km\u22c5kbps in deep water [3]."]} +{"16755687|16490750": ["In spite of the existence of a considerable number of papers about routing protocols in UWSNs presented by [4] [5] [6], we perceived a lack of a specific overview involving the geographic routing protocols."]} +{"16755687|2835258": ["According to how many nodes host the service four possible combinations can be resulted as some-for-some, some-for-all, all-for-some and all-for-all introduced in [12].", "\u2026create and maintain paths from source to the destination; as an alternative, a source node includes the approximate position of the receiver in the data packet and selects the next hop according the optimization process of the protocol; the closest neighbor to the destination for example [12] [13]."]} +{"28115800|870434": []} +{"2791173|205286988": ["There has been an intensive study in routing protocols for terrestrial ad hoc [2] and wireless sensor networks [3] in the last few years."]} +{"2791173|1762301": []} +{"17166573|870434": [", building underwater sensor networks) to enable/enhance applications such as oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications [9], [8], [2], [4], [3], [7]."]} +{"16506639|902018": ["As a promising solution to aquatic environmental monitoring and exploration, UWSNs have attracted significant attention recently from both academia and industry (Han et al., 2012; Partan et al., 2007; Han et al., 2013)."]} +{"16506639|2469117": ["As a promising solution to aquatic environmental monitoring and exploration, UWSNs have attracted significant attention recently from both academia and industry (Han et al., 2012; Partan et al., 2007; Han et al., 2013).", "A source node u acquires the location \u00f0xu; yu; zu\u00de of itself and the location of sink node \u00f0xs; ys; zs\u00de based on range-based or range free localization algorithm (Han et al., 2012)."]} +{"16506639|2295142": ["Many researchers have proposed multipath protocols in TWSNs (Liang et al., 2011; Kulkarni et al., 2011; Radi et al., 2012; Han et al., 2014), while those protocols cannot be directly applied in UWSNs."]} +{"16506639|870434": ["As a promising solution to aquatic environmental monitoring and exploration, UWSNs have attracted significant attention recently from both academia and industry (Han et al., 2012; Partan et al., 2007; Han et al., 2013)."]} +{"12848559|14441987": []} +{"28282424|2469117": ["Each sensor node knows its own location by means of distributed localization system [13]."]} +{"22910100|991041": []} +{"27824170|2469117": []} +{"27824170|870434": []} +{"7159282|870434": ["For example, due to acoustic modem limitations, FDMA was preferred for an initial deployment of SeaWeb [3, 15], one of the first underwater networks experimented at sea.", "For example, due to acoustic modem limitations, FDMA was preferred for an initial deployment of SeaWeb [15,3], one of the first underwater networks experimented at sea."]} +{"22746920|42347181": ["An efficient routing protocol should be able to work appropriately in both dense and sparse environments [5], [12].", "Therefore, a new class of geographic routing protocols, using only depth information obtained from a pressure gauge at each node [4], have been proposed in the literature to forward packets [5]."]} +{"11444935|14441987": ["Since research on ad hoc routing began with packet radio networks, numerous protocols have been proposed [7]."]} +{"31355144|13475127": []} +{"896997|42347181": ["Several routing protocols in UASNs are based on a greedy hop-by-hop method for packet delivery [6]."]} +{"13611605|1236072": []} +{"45859395|870434": ["In addition, because a node will consume much more energy to send a packet than to receive a packet [15], we use overhearing technology to reduce the sending actions whenever possible."]} +{"5178260|141053": ["There has been intensive recent research on MAC protocols fo r ad hoc [17] and wireless terrestrial sensor networks [16]."]} +{"5178260|1762301": ["In recent years there has been a great interest to develop new routing protocols for terrestrial ad hoc [1] and wireless se nsor networks [2]."]} diff --git a/edge/graph_3057614.jsonl b/edge/graph_3057614.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30608809.jsonl b/edge/graph_30608809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30613287.jsonl b/edge/graph_30613287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4477d1abe8997d50f23a0d20e2c517ae6e781f7 --- /dev/null +++ b/edge/graph_30613287.jsonl @@ -0,0 +1 @@ +{"55604092|6555395": []} diff --git a/edge/graph_30633371.jsonl b/edge/graph_30633371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30648372.jsonl b/edge/graph_30648372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..12a561070d4718a6ebf3751c917d4f2677de8831 --- /dev/null +++ b/edge/graph_30648372.jsonl @@ -0,0 +1,2 @@ +{"206485523|10150488": ["Please refer to [276] and [277] for more details on this topic."]} +{"206485523|16403716": ["Multimedia indexing and retrieval concerns the description, storage, and organization of multimedia information to help people find multimedia resources conveniently and quickly [218]."]} diff --git a/edge/graph_3067314.jsonl b/edge/graph_3067314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3071309.jsonl b/edge/graph_3071309.jsonl similarity index 100% rename from graph_3071309.jsonl rename to edge/graph_3071309.jsonl diff --git a/edge/graph_30714842.jsonl b/edge/graph_30714842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30715668.jsonl b/edge/graph_30715668.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f3c1ae697da9ba209cf548e893db3c8df2b8dc1 --- /dev/null +++ b/edge/graph_30715668.jsonl @@ -0,0 +1,15 @@ +{"2654767|15170341": ["no-reference video quality measurement methods, we refer to [30]\u2013[37]."]} +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} +{"30035885|6581557": []} +{"30035885|3540699": []} +{"1188252|3540699": ["264/AVC video, as this coding standard has demonstrated superior coding performance in comparison to previous codecs [5], and it is especially suitable for transmitting video over IP [6] and wireless [7] networks."]} +{"33681845|3540699": []} +{"15663427|6581557": ["When switching to new digital video services, customers expect superior quality compared to the traditional TV services (such as analog TV), for which they are willing to pay [3]\u2013[5]."]} +{"62589939|44132017": ["Quality measures in can be classified into two state-of-art category: Subjective and objective [1]."]} +{"9044765|15170341": ["Readers can refer to [2], [7], [8] for detailed review on video quality metrics."]} +{"6609024|3540699": ["In order to efficiently utilize wireless bandwidth, video data is compressed using sophisticated encoding techniques such as H.264/AVC [49], where each video frame is divided into independently coded slices (i.e., network abstraction layer units (NALU)) that consist of a group of macroblocks.", "However, the transmission of compressed video over wireless channels is highly susceptible to congestion and/or channel-induced packet losses, resulting in error propagation along the motion prediction path, and causing video quality degradation [22, 43, 49]."]} +{"12342360|1615097": ["In addition, there is a call for new methodology to assess perceptual quality of IPTV, HDTV, 3D and multi-view data, with the progress in the related technology [6,44,96,103], since most of the existing metrics are for standard-definition and single-view visual data."]} +{"566971|16748080": ["The resulting distorted videos usually exhibit the following typical visual distortions [35]: \u2022 Blocking effect ."]} +{"566971|15170341": ["For example, [32], [69] mainly follow the psychophysical/engineering approach classi\ufb01cation method; [31], [70]\u2013[72] mainly adopt the reference-based clas-si\ufb01cation method, and [47] adopts a combination of the two.", "2) Psychophysical Approach: Objective quality models of the psychophysical approach are based on the features of the HVS, which is related to visual perception, for instance, contrast sensitivity, frequency selectivity, spatial and temporal features, masking effects, and color perception [72]."]} +{"566971|10099297": ["[ 11] and [12] consider both network and application QoS support."]} +{"566971|12130888": ["A survey of user behavior in P2P video system is recently given by [154]."]} diff --git a/edge/graph_30730796.jsonl b/edge/graph_30730796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e12b038b23c13009387562f36cdf431ca3f623f --- /dev/null +++ b/edge/graph_30730796.jsonl @@ -0,0 +1,2 @@ +{"10357783|9045232": []} +{"24643438|9045232": ["So far, many approaches for face detection have been proposed in the literature (see [1] and references therein)."]} diff --git a/graph_3073281.jsonl b/edge/graph_3073281.jsonl similarity index 100% rename from graph_3073281.jsonl rename to edge/graph_3073281.jsonl diff --git a/edge/graph_30747069.jsonl b/edge/graph_30747069.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..772d249f9b1ccf5bb98b564825d3b6acfac50f0f --- /dev/null +++ b/edge/graph_30747069.jsonl @@ -0,0 +1,4 @@ +{"34249835|3540699": ["been introduced; however, we refrain from an in-depth discussion here and refer to [15].", "With respect to all other NAL unit types, we refer to [15] and [20] and the specifications [8],", "order (ASO), and redundant pictures [15], [20].", "See [15] and [20] for more discussions of the parameter set concept."]} +{"34249835|17428811": ["The second truly innovative step in standards-based SVC occurred with the inclusion of fine granularity scalability (FGS) into MPEG-4 around 2000 [ 7 ]."]} +{"10449388|3540699": ["Calling parameter sets an error-resilience tool is not entirely appropriate\u2014they are generally used in all H.264 bit streams and hence described elsewhere in this special issue [1].", "Its main design goals, implementation, and performance are reported elsewhere in this special issue [1]."]} +{"10449388|7439310": []} diff --git a/edge/graph_30781054.jsonl b/edge/graph_30781054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30785863.jsonl b/edge/graph_30785863.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00526adf8810b2778e622d88d4417414508eaa2e --- /dev/null +++ b/edge/graph_30785863.jsonl @@ -0,0 +1,6 @@ +{"54308643|469744": ["By overlaying virtual content onto the real world, Augmented Reality (AR) allows users to perform tasks in the real and virtual environment at the same time [1]."]} +{"54308643|17024419": ["Lee et al. [12] designed gloves with conductive fabric on the fingertips and the palm for gesture recognition and vibration motors for haptic feedback."]} +{"37777845|16540884": ["of inputs [35], mainly involving speech and gesture signals in our scope."]} +{"37777845|18454590": ["Recently others proposed hybrid ANN/HMM approaches [28]."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"1318914|7185733": ["\u2026literature, there are several researchers who attempt to provide a classification of the physical characteristics of gestures, including Alan Wexelblat [Wexelblat 1998], Dr. Sanshzar Kettebekov [Kettebekov 2004], Margot Brereton [Brereton et al. 2003], and Vladimar Pavlovic [Pavlovic et al. 1997]."]} diff --git a/edge/graph_30815820.jsonl b/edge/graph_30815820.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3081642.jsonl b/edge/graph_3081642.jsonl similarity index 100% rename from graph_3081642.jsonl rename to edge/graph_3081642.jsonl diff --git a/graph_3083025.jsonl b/edge/graph_3083025.jsonl similarity index 100% rename from graph_3083025.jsonl rename to edge/graph_3083025.jsonl diff --git a/edge/graph_3086072.jsonl b/edge/graph_3086072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30897632.jsonl b/edge/graph_30897632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4585664207b297e222039d3d3490a927937b93d9 --- /dev/null +++ b/edge/graph_30897632.jsonl @@ -0,0 +1,3 @@ +{"14350305|6308019": ["(1972), Richter, H. (1982), and for more than two fare classes in Belobaba, P."]} +{"7752498|6308019": ["McGill and van Ryzin (1999) give an explanation of the EMSR-b method along with a review of the booking limits problem in general.", "Weatherford and Bodily (1992) and McGill and van Ryzin (1999) provide general reviews of the broad range of literature in the revenue management \ufb01eld."]} +{"12920589|6308019": ["There\nare several other papers on the single-leg problem with various assumptions on demand or arrivals\n(see Brumelle and Walczak, 2003, McGill and van Ryzin, 1999, and Talluri and van Ryzin, 2004a)."]} diff --git a/edge/graph_30902058.jsonl b/edge/graph_30902058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_30920332.jsonl b/edge/graph_30920332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7775c107708ec222587ccc9db6db7eebdc7a6e21 --- /dev/null +++ b/edge/graph_30920332.jsonl @@ -0,0 +1 @@ +{"10043111|3540699": ["264 describes the lossy compression of a video stream [25] and is also part of ISO/IEC MPEG-4."]} diff --git a/edge/graph_30946995.jsonl b/edge/graph_30946995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6bfac772be0722548f0c1317b808e8e61350e81 --- /dev/null +++ b/edge/graph_30946995.jsonl @@ -0,0 +1,5 @@ +{"156860777|9948664": []} +{"156860777|54878689": []} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/edge/graph_30948085.jsonl b/edge/graph_30948085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bc86e3055d8e0ed1a8639986a3e156f00876ac6 --- /dev/null +++ b/edge/graph_30948085.jsonl @@ -0,0 +1,2 @@ +{"35246774|17442795": []} +{"60681926|6189942": []} diff --git a/edge/graph_30952575.jsonl b/edge/graph_30952575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3095512.jsonl b/edge/graph_3095512.jsonl similarity index 100% rename from graph_3095512.jsonl rename to edge/graph_3095512.jsonl diff --git a/graph_3096077.jsonl b/edge/graph_3096077.jsonl similarity index 100% rename from graph_3096077.jsonl rename to edge/graph_3096077.jsonl diff --git a/edge/graph_31014716.jsonl b/edge/graph_31014716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3102110.jsonl b/edge/graph_3102110.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3102935.jsonl b/edge/graph_3102935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31044116.jsonl b/edge/graph_31044116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fb60e5374fdcc18b2e6d598687b601947336b5a --- /dev/null +++ b/edge/graph_31044116.jsonl @@ -0,0 +1 @@ +{"207164129|7053950": []} diff --git a/edge/graph_31044123.jsonl b/edge/graph_31044123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..160d73e7396a5c4d06eb385b67a5af53965bde56 --- /dev/null +++ b/edge/graph_31044123.jsonl @@ -0,0 +1,2 @@ +{"14478688|15847982": ["In contrast, it is well known tha the satisfiability of\u03b1acyclic instances of the C ONSTRAINT SATISFACTION PROBLEM (CSP) can be decided in polynomial time [13].", "ManyNP-hard problems such as CSP or Boolean database queries can be solved in p olynomial time for instances with associated hypergraphs of bounded hypertree width [13]."]} +{"9060814|2840997": ["This solver outperforms existing solvers on application instances from recent SAT competitions as well as on instances that are provably hard for resolution, such as XOR-SAT instances.", "Although current solvers are very effective for instances generated from formal verification problems (Prasad, Biere, and Gupta 2005), new instances arising from areas such as cryptography and bioinformatics (SAT Competition 2009) have been quite challenging."]} diff --git a/edge/graph_31044354.jsonl b/edge/graph_31044354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e32d0865f763fab695b8394d29d2d404f2a22404 --- /dev/null +++ b/edge/graph_31044354.jsonl @@ -0,0 +1 @@ +{"18420521|1876323": ["Comprehensive surveys of variable-structure control can be found in [3], [4].", "Each describes a constituent linear surface (5) The eventual switching surface, , of dimension is the intersection [4] of all component surfaces ( 5) (6) The sliding mode is the constrained motion of states along trajectories on the sliding surface ."]} diff --git a/edge/graph_3104600.jsonl b/edge/graph_3104600.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3105159.jsonl b/edge/graph_3105159.jsonl similarity index 100% rename from graph_3105159.jsonl rename to edge/graph_3105159.jsonl diff --git a/edge/graph_31086789.jsonl b/edge/graph_31086789.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d73e8e2ef623489ba6388e5cb4e40b3fef244af --- /dev/null +++ b/edge/graph_31086789.jsonl @@ -0,0 +1,24 @@ +{"18184894|12083425": ["\u2026of inverters named multi-level inverters have received more and more attention because of their capability of high voltage operation, high efficiency, lower switching losses, low Electromagnetic Interference (EMI) and superior power quality when compared to traditional (2-level) inverters [2-3]."]} +{"18184894|17774971": ["Results, including the effect of running times on the probability of reaching to global solution for some low level inverters, are compared with results obtained by Continuous Genetic Algorithm (CGA) and Sequential Quadratic Programming (SQP).", "\u2026) ( ) ( )621\n621\n621\n17cos...17cos17cos0\n5cos...5cos5cos0\ncos...coscos1\n\u03b8\u03b8\u03b8\n\u03b8\u03b8\u03b8\n\u03b8\u03b8\u03b8\n+++=\n+++=\n+++= S M\n(3)\nWhere, M, i.e. Modulation Index, is defined as:\n( )10 4\n1 \u2264\u2264= \u0394\nM SV\nV M\ndc \u03c0\n(4)\nIt is desirable to find six switching angles, namely \u03b81, \u03b82, and \u03b83, satisfying above non-linear equation set.", "978-1-4244-2800-7/09/$25.00 \u00a92009 IEEE ICIEA 2009\nIndex Terms\u2014Multi-level Inverters; Optimized Harmonic Stepped Waveform (OHSW); Particle Swarm Optimization (PSO); Continuous Genetic Algorithm (CGA); Sequential Quadratic Programming (SQP)."]} +{"5186654|12083425": ["NE important application of multilevel converters is focused on medium- and high-power conversion [1], [ 2 ]."]} +{"5186654|17774971": ["ONE important application of multilevel converters is focused on medium- and high-power conversion [1], [2]."]} +{"35296887|12083425": ["The induction generator stator is directly connected to the grid, while the rotor winding is connected via slip rings to an ac/dc/ac converter [45]."]} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"20318232|17381415": ["The PWM grid converter is equivalent to multiple synchronous machines; in fact, the grid converter can control the active and reactive power flow in a wide frequency range [25]."]} +{"20318232|12083425": ["Particularly, if attention is paid to the power converter, the increase in power leads to the use of more voltage levels, leading to more complex structures based on single-cell converter (like NPC multilevel converters) or multicell converter (like CHB or interleaved converters) [26]."]} +{"20318232|17774971": ["Multilevel PWM converters are gaining popularity in the field of renewable energies because of the need of connecting several distributed power sources, whose power is continuously growing, guaranteeing at the same time good power-quality levels [13]\u2013 [20]."]} +{"6002|12083425": ["\u2026a direct pathway to the deployment of multiagent controls on networked embedded control devices, which will pave the way to the industrial adoption of the automation and monitoring devices capable of combining different functions and achieving goals in collaborative effort with other such devices."]} +{"20690578|6809492": []} +{"20690578|17774971": []} +{"25014423|35426346": ["These principles provide a fast response to condition changes and supports reconfigurability on the fly quite naturally [2].", "Multi-Agent Systems (MAS) [1], derived from the field of distributed artificial intelligence, is a paradigm that allows an alternative way to design large-scale distributed control systems based on autonomous and cooperative agents, exhibiting modularity, flexibility and robustness [2]."]} +{"109077100|5747564": []} +{"108529053|17774971": []} +{"9717936|6809492": []} +{"112886742|17774971": ["where \u2206 denotes a vector in the random direction whose elements lie in [-1, 1].", "9 kV) is difficult to achieve [1]."]} +{"15246725|6159806": []} +{"31493016|12083425": ["and others [2], and renewable energy systems, especially in large penetration of renewable resources, such as solar and wind [3], [4]."]} +{"31493016|17774971": ["Type C topologies may not face such a problem because lots of work has been done for HVAC/HVDC conversion [62]."]} +{"24104193|17381415": ["The challenge of connecting a renewable source to the utility network is largely solved by electronic power converters that handle two main tasks [3], [21], [22]: 1) Maximum Power Transfer and Power Limit: On the input side (source), power electronics control and transform the load characteristics so that maximum power is extracted from the source.", "The most relevant goals of PV energy include 40% cost reduction of PV panels and of the power-converter stage within five years, increased efficiency of both panels and converters [3], [4], and considerable improvement RENEWABLE ENERGY\u2014THE NEXT INDUSTRIAL REVOLUTION"]} +{"24104193|12083425": ["The challenge of connecting a renewable source to the utility network is largely solved by electronic power converters that handle two main tasks [3], [21], [22]: 1) Maximum Power Transfer and Power Limit: On the input side (source), power electronics control and transform the load characteristics so that maximum power is extracted from the source."]} +{"4659915|485843": ["is not designed to manage the upcoming complexity [9], [10]."]} diff --git a/edge/graph_31086976.jsonl b/edge/graph_31086976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d72a46e785e3b0399b29f88434a81a3c3bbd7e4 --- /dev/null +++ b/edge/graph_31086976.jsonl @@ -0,0 +1 @@ +{"207221521|1805048": []} diff --git a/edge/graph_31090017.jsonl b/edge/graph_31090017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31094119.jsonl b/edge/graph_31094119.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0dc1fffee95adcc5ce0a836a01dc239ee7f22df4 --- /dev/null +++ b/edge/graph_31094119.jsonl @@ -0,0 +1,27 @@ +{"12724251|10693567": []} +{"12724251|3348390": ["SDNs can play a crucial role in managemen BLE sensors or ZigBee-based WSNs.", "For example, the sensing layer is expected to utilize different technologies such as Bluetooth Low Energy (BLE) and ZigBee [2].", "In addition, ller can optimize ated application ode has multiple h ones to activate on application communications oreover, it allows without the need nly the required e achieved. sensor technology nor ZigBee are s OpenFlow."]} +{"37451636|3007529": ["To name a few application scenarios include intelligent transportation systems (ITS) [11], volunteer information networks [12], Internet of Things (IoT) [13]\u2013[15], smart grids [16], [17] and much more."]} +{"37451636|3348390": []} +{"37451636|9104850": []} +{"17262901|9104850": ["Some of the results of this study are also applicable to other caching architectures, such as distributed and hybrid caching architectures [5], [12]."]} +{"2754570|2445817": ["INTRODUCTION Mobile Ad-Hoc Networks (MANETs) are autonomous networks comprised of mobile nodes, equipped with wireless interfaces and communicating among nodes without relying on any infrastructure [1]."]} +{"2754570|10859599": ["They are especially available in selforganized mobile scenarios, including vehicle networks, battlefields and disaster recovery [2]."]} +{"31995157|17787193": []} +{"16021893|14889616": ["264/SVC [37] in a P2P VOD system."]} +{"16021893|18418184": ["IBR lookup and lookup performance: As mentioned earlier, the same content may provide slightly different IBRs due to the random noise introduced by different encoding methods."]} +{"10799667|7971188": []} +{"52802355|2445817": []} +{"52802355|10859599": []} +{"6649739|1230643": []} +{"7956442|14697846": ["Indeed following efforts on peer-to-peer content distribution [2] and content delivery networks (CDNs) [3], research on ICN has been largely motivated by the proliferation of content-centric applications in the Internet."]} +{"7956442|121289": ["While most ICN works relate to Internet applications, recent works have started to advocate the adoption of the ICN networking paradigm in addressing security and resilience concerns in the context of smart grids [4], mostly focusing"]} +{"988681|2905017": ["Many caching schemes have been proposed for wireless cellular networks [11] and to enhance data accessibility among mobile nodes when these are not covered by the fixed network infrastructure [12]."]} +{"5528809|12060835": [", optimized protocols [2]."]} +{"3661612|193574": [", componentlevel, link-level and network-level) have been proposed to address the energy efficiency issue in ICN, such as hardware optimizations [39]\u2013[41], shutdown techniques (also known as on/off and sleeping solutions) [4], [42]\u2013[44], adapting the rate of network operation to the current offered workload [45], and energy-efficient cache strategies [46]\u2013[48].", "suggested to put routers and switches to sleep [97], and then conducted a seminal work dealing with on/off approaches where they proposed two solutions to reduce energy wastage [39]:", ", power on/off button, low power mode, port auto power down) [39]."]} +{"3661612|7686677": ["Generally speaking, energy efficiency metrics used in traditional telecommunication systems can be classified into three main categories: facility-level, equipment-level and networklevel metrics [71]."]} +{"3661612|7971188": [", Mobile IP (MIP) [4], peer-to-peer (P2P) networks [5] and content delivery networks (CDNs) [6], which can patch the existing Internet architecture but only superficially bridge the gap between the limited network service capabilities and increasing user needs [1], [7]\u2013[9]."]} +{"7049202|3583771": []} +{"36597694|10562205": ["ACCC is a cluster based [22, 23, 24] cooperative caching technique, which divides the network into a set of overlapping clusters.", "Although routing is important, data availability and consistency are foremost issues since the ultimate goal of using MANETs is to provide data access to MNs. Caching data is a very important and useful trend in MANETs which can significantly improve the performance , decrease access latency and save both node and network resources.", "Clustering is considered as an effective approach to maintain the MANET\u2019s stability and scalability, so In [18], Abdulaziz Zam and N. Movahedinia have proposed an efficient cache management method for the Cluster Based Mobile Adhoc NETwork (C-B-MANET) by dividing the local cache table into two lists Pre-fetched List Table (CH-PLT) and Non pre-fetched List Table\nPage 5 of 37\n(NLT) in order to increase the Cache hit ratio and the cluster hit ratio.", "This paper introduces a new cooperative caching strategy for MANETs, which is called Administrative Cluster-Based Cooperative Caching (ACCC).", "Page 2 of 37\nMost recent researches on MANETs are concerned in developing dynamic routing protocols for improving the connectivity among MNs.", "The whole environment was simulated using a user defined java enterprise application using a client/server model to act as a professional accurate tool for simulating the MANETs with all its requirements (nodes, protocols, database\u2026, etc.).", "There are several clustering schemes that have been used in MANETs [22, 23, 24], which depend on several criteria such as; node identity, network connectivity, and nodes mobility.", "For the future work, we have two important issues which have to be considered in MANETs [6].", "Table 1: Cooperative caching critical issues\nUnfortunately, Due to mobility and resource constraints of MANETs, caching techniques designed for wired networks are not applicable to MANETs.", "Setting Up Network Clusters\nThere are several clustering schemes that have been used in MANETs [22, 23, 24], which depend on\nseveral criteria such as; node identity, network connectivity, and nodes mobility.", "Several generations of WNs have been emerged ranging from the well-known infrastructure-based cellular networks such as personal communication service networks (PCS) to infrastructure-less Mobile Ad-Hoc Networks (MANETs) [1].", "However, there are still several challenges in data caching on MANETs.", "MANETs are multi-hop [2] heterogeneous self-configured temporary networks with dynamic topologies, which have neither infrastructure nor any centralized administration [3-5].", "A new cooperative caching technique has been introduced by P. Nagaraju et al. [10] to minimize objects' download cost through using MANET\u2019s service which includes search and price models.", "Although cooperative caching improves the data access by reducing access latency and bandwidth usage in MANETs, it still suffers from several hurdles and technical problems.", "Hence, MANETs have an increasing growth in potential applications in various fields such as; military purposes, emergency and rescue operations, commercial and civilian tasks, and sensor networks [3, 6].", "Keywords: MANETs, Cooperative Caching, Cache Management, Cluster Management.", "In general, a good cooperative cache management technique for MANETs should address four different issues, which are; (i) cache discovery, which is essential to discover and deliver requested data items from the neighboring MNs, moreover, it decides which data items can be cached for future use.", "Decentralization makes MANETs more flexible and more robust.", "MANETs offer an advantageous decentralized character to the network in the absence of a fixed infrastructure."]} +{"14678465|15255963": []} +{"15142320|3994942": ["According to [2] Internet traffic engineering is the process", "In traditional IP/MPLS networks TE has been extensively studied [2] and various TE solutions, both offline and online have been proposed."]} +{"17505900|8280144": ["The information access protocol within pushing and caching is then described."]} diff --git a/edge/graph_31097760.jsonl b/edge/graph_31097760.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3110415.jsonl b/edge/graph_3110415.jsonl similarity index 100% rename from graph_3110415.jsonl rename to edge/graph_3110415.jsonl diff --git a/edge/graph_31129243.jsonl b/edge/graph_31129243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3113396.jsonl b/edge/graph_3113396.jsonl similarity index 100% rename from graph_3113396.jsonl rename to edge/graph_3113396.jsonl diff --git a/edge/graph_31134320.jsonl b/edge/graph_31134320.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d74e507cbbff1e850508ac0c34a7eaccf57ee48 --- /dev/null +++ b/edge/graph_31134320.jsonl @@ -0,0 +1,12 @@ +{"11581278|8407263": ["The symbol emergence in robotics is one of research areas of embodied artificial intelligence which aims at developing computational models of these bottom-up learning processes and building robots that can learn language and communicate with humans naturally [2]."]} +{"8489933|1452734": ["One possible way out of this dilemma was the idea to let robots develop similar to human infants, leading to the growing field of \u201c developmental robotics \u201d (Weng et al., 2001; Lungarella et al., 2003).", "One possible way out of this dilemmawas the idea to let robots develop similar to human infants, leading to the growing field of \u2018\u2018developmental robotics\u2019\u2019 [58,29]."]} +{"6724742|16717715": ["One can view the context as being represented as a set of parameters that need to be instantiated before the system action can be taken (for example, Seneff and Polifroni [2000]).", "The speech recognizer in TRIPS uses the SPHINX-II system (Huang et al. 1993), which outputs a set of word hypotheses to the parser."]} +{"386824|1708582": ["Additional information about RL can be found in several references (e.g., [2] [5] [32] [72])."]} +{"1849801|393948": ["Second, researchers are increasingly motivated to employ complex probabilistic models and at an unprecedented scale of massive data (Bengio et al., 2013; Ghahramani, 2015; Lake et al., 2016)."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"25705913|1452734": []} +{"8407263|393948": ["[69] Bridging representation learning using neural networks and multimodal categorization using generative models represent important elements in this field.[70]"]} +{"8407263|7400701": ["For example, Weng provided a critical survey on symbolic models and emergent models in artificial intelligence.[22] In our terminology, such symbol models are concerned with internal representation systems."]} +{"206630519|8407263": []} +{"10168773|1452734": ["This is one of the biggest differences from artificial systems [23].", "Here, we briefly review the facets of development in the survey by Lungarella et al. [23] from viewpoints of external observation, internal structure, its infrastructure, and social structure, especially focusing on the underlying mechanisms in different forms."]} diff --git a/edge/graph_3113514.jsonl b/edge/graph_3113514.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31136679.jsonl b/edge/graph_31136679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5382b03cfab2efbba1b2c88e7196dc0f496a8c1 --- /dev/null +++ b/edge/graph_31136679.jsonl @@ -0,0 +1,2 @@ +{"31828962|15164501": ["Literature reviews often focus on specific aspects of research disciplines such as the quality of empirical research methods (e.g., Basili 1996) or the state of research on particular phenomena such as culture (Leidner and Kayworth 2006) or outsourcing (Lacity et al. 2009), to name just two.", ", Basili 1996) or the state of research on particular phenomena such as culture (Leidner and Kayworth 2006) or outsourcing (Lacity et al."]} +{"4643514|627405": ["Therefore, for the construction of the search string we identified alternative spellings, synonyms and related terms as suggested in [30]."]} diff --git a/edge/graph_3115258.jsonl b/edge/graph_3115258.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3117516.jsonl b/edge/graph_3117516.jsonl similarity index 100% rename from graph_3117516.jsonl rename to edge/graph_3117516.jsonl diff --git a/graph_3119314.jsonl b/edge/graph_3119314.jsonl similarity index 100% rename from graph_3119314.jsonl rename to edge/graph_3119314.jsonl diff --git a/edge/graph_31193955.jsonl b/edge/graph_31193955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d22523291aab92c36caef6ceacf90daad3d469ec --- /dev/null +++ b/edge/graph_31193955.jsonl @@ -0,0 +1,4 @@ +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} diff --git a/edge/graph_31194450.jsonl b/edge/graph_31194450.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ad93041e310210db23f58e0ce73adc8dc7bbca7 --- /dev/null +++ b/edge/graph_31194450.jsonl @@ -0,0 +1,9 @@ +{"13068209|14843594": ["Therefore, Gaussian process based ef\ufb01cient global optimization 1 (Jones et al., 1998; Shahriari et al., 2015), as a sample-ef\ufb01cient method to solve black-box optimization problems (Xu et al., 2022a), has recently been becoming more and more popular."]} +{"56010146|26257441": ["It is also a good choice for deterministic computer models since it interpolates the observed or known data points [4,5]."]} +{"121037152|53984205": ["S URROGATE-BASED optimization is becoming increasingly popular due to savings in computational time [1\u201312]."]} +{"121037152|26257441": []} +{"17895486|26257441": ["Kriging model was chosen to approximate the objective function for its accuracy and robustness with small datasets [13]."]} +{"2506245|53984205": ["Simpson et al. [8] provide a comprehensive summary of the evolution and recent advancements of this metamodelling approach in the context of multidisciplinary design optimization."]} +{"122058217|26257441": []} +{"106530141|26257441": ["This means a low-fidelity model could be the same type of physical simulation as the high-fidelity one, but with additional physical approximations, it could be the same simulation as the high-fidelity but solved on a coarser discretization [5], it could be an empirical code, a response surface [36, 105, 114], or a reduced order model [6]."]} +{"18074003|53692127": ["This is in agreement with the rapid decay phenomenon observed in the inverse of a band matrix [58]."]} diff --git a/edge/graph_31216129.jsonl b/edge/graph_31216129.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..530caae58f6e6465ba3d27b26ebaf82da3472c5f --- /dev/null +++ b/edge/graph_31216129.jsonl @@ -0,0 +1,11 @@ +{"7527756|7665100": []} +{"7527756|7360895": ["[ 1 ], [2], the definition and research direction of HRC are still in hot debate."]} +{"62693606|16280711": ["This synergy enables the development of more flexible and complex tasks which cannot be performed individually by a human or a robot [1]."]} +{"62693606|15231229": ["Collision detection and minimum distance computation between 3D objects are two important techniques which are used in different applications [9, 10] such as robotic motion planning, computer graphics, computational geometry and simulation."]} +{"62455719|16280711": ["This synergy between humans and robots enables the development of more flexible and complex tasks which cannot be performed individually by a human or a robot [4]."]} +{"11109159|17516538": []} +{"54907950|16280711": ["HRC represents most key characters of next generation of robots working without cages and sharing the same workspace with human community [1, 2]."]} +{"54907950|7665100": ["HRC represents most key characters of next generation of robots working without cages and sharing the same work-space with human community [1, 2]."]} +{"15641789|14415030": ["The foreground/background segmentation is an important step for many video surveillance applications, being thus a well studied problem in the context of computer vision [9]."]} +{"7744394|12127129": ["Background subtraction methods for detecting moving objects have been prop osed, analysed, and employed to locate object motion in a 2D image sequence [49-51]."]} +{"8366602|15231229": ["An important feature of the proposed contribution is the use of collision avoidance strategies directly in the actuation (joint) space, thus avoiding the limitations, due to time-consuming computations, of other approaches defined in the 3D Cartesian space [25]."]} diff --git a/edge/graph_31220827.jsonl b/edge/graph_31220827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31878b5051d40e4275837ad90aa93c17414c8023 --- /dev/null +++ b/edge/graph_31220827.jsonl @@ -0,0 +1,15 @@ +{"6367505|10559330": ["Differentiated Services (DiffServ) [3] and Integrated Services (IntServ) [4] already define architectures for classifying network traffic to provide QoS in modern IP networks."]} +{"14045100|3189715": ["Network programmability was the main objective of the two converged schools of thought that dominated the networking research agenda in the mid-90s up until early-00s: Active [1] and Programmable Networks [2] (A&PN)."]} +{"21608033|2623404": ["solutions combined with resource virtualization and distributed cloud computing [12]."]} +{"21608033|10693567": ["SDN-enabled optical network devices, provisioned through protocols like OpenFlow (OF) [13], along"]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"40932686|10693567": []} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"206985996|2535224": ["[7, 8] depicts an overall picture of SDN and NFV use for the WMNs.", "[8] shows comparative analysis among proposed SDN solutions with research challenges for the SDN-based wireless networks."]} +{"17633143|10693567": ["Therefore , the extended architecture is a feasible approach to extend the OpenFlow specification for supporting NFV modules in SDN in the future.", "The evaluation shows that only 0.12 percent of the input traffic is handled by the controller , while 77.23 percent is handled on the controller in conventional SDN. ing packets by matching the entries in the Open- Flow pipeline, which consists of one or multiple flow tables.", "In summary, the extensions involve modifications on the switch, the NFV modules, and the extended OpenFlow to lift the limitations of the conventional SDN architecture.", "We simulated each scenario by adjusting the SDN application design.", "OpenFlow was proposed by McKeown et al. to standardize the communications between the centralized controller and the managed switches in SDN [5].", "OpenFlow followed up, and its success further promoted the wide deployment of SDN. Due to limited space, we refer the readers to [5] for a complete survey of Open- Flow development.", "The SDN application implements the service routing logic via the northbound interfaces.", "We used mininet (mininet.org) and a Ryu controller (osrg.github.io/ryu) to build Open- Flow-based SDN for a network service.", "In conventional software-defined networking (SDN), a controller classifies the traffic redirected from a switch to determine the path to network function virtualization (NFV) modules.", "In the second experiment, we implemented the modules of the extended SDN architecture with a C/C++ program for traffic simulation and analysis.", "We propose an extended SDN architecture to reduce the traffic overhead to the controller for providing NFV.", "Compared with OpenFlow-based SDN, the extended architecture causes little controller overhead for providing NFV modules .", "Overview of the Extended Architecture The extended architecture is intended to map NFV modules to SDN. Compared with deploying NFV modules in an Open- Flow-based SDN, this architecture moves traffic classification from the controller to the data plane, and extends OpenFlow messages with a matched field of network events.", "SDN is the evolutionary consequence toward the desire for a programmable network and the separation of the control plane and the data plane."]} diff --git a/edge/graph_31245252.jsonl b/edge/graph_31245252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f24fa872b5d3086d3e5a04426c94eeb9d65e9f73 --- /dev/null +++ b/edge/graph_31245252.jsonl @@ -0,0 +1,38 @@ +{"16219038|2357830": ["A. Juels [7] surveyed and summarized the previous security and privacy issues for RFID system."]} +{"9496996|12815020": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"3698150|17474643": ["when services depend on multiple providers in order to improve application performance and resilience or vendor lock-in [80]."]} +{"3698150|16335158": []} +{"3698150|17336376": ["One possible direction to address such issues involves the introduction of predictive storage and caching [66]."]} +{"3698150|1230643": ["Recent technological advances have made efficient, low-cost, and lowpowerminiaturized devices available for use in large-scale, remote sensing applications [89]."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"1098863|121289": ["We then review the multistep electricity price policy.", "Particularly, in the one-dimensional MEP model, the steps are scaled only by the quantity of electricity whereas in the two-dimensional MEP model, the steps are scaled by both the quantity of electricity and the time when the electricity is used.", "With the measurements reported from these devices, consumers can estimate their bills and manage their electricity consumption effectively whereas utility providers can estimate real-time electricity prices and optimize the power dispatch [19], [53]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"29044845|207424188": []} +{"10614697|3348390": ["Furthermore, by integrating the sensing, communication, and computation capabilities [8], [9], IoT can offer diverse intelligent services [10] to form smart home [11], smart grid [12]\u2013[14], smart community [15], and smart city [16], [17], as shown in Fig."]} +{"10614697|20905429": ["One of the most value-added functionalities of IoT is to sense the environments including the living environment [28] and human body [29]\u2013[31], enabling users to interact with the physical world [32]."]} +{"18199187|15300368": ["The final disadvantage of Z-Wave is its requirement of a larger antenna for the sub 1 GHz range, which may be detrimental towards the attempt for smaller devices [30]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"5933709|5660618": ["Several extensions to this formulation have been proposed by various researchers [15].", "Such problems are studied in robust networked control systems [28, 15]."]} +{"7765934|141053": ["Link layer: the authors in [18] present a broad overview of the MAC protocols conducted in the field of wireless sensor and ad hoc networks."]} +{"7765934|1236072": ["In addition, in [21], the authors study the design trade-offs between energy and communication overhead savings for the existing routing protocols."]} +{"42455857|1940388": ["The 2003 Eastern blackout was caused by the fact that programs for key areas were abnormal and failed to provide the system operators the correct state information [2]."]} +{"14451080|9104850": ["Depending on user Web access patterns and network topology, the Web caching strategies aim to find the best place for Web proxies on the network and allow the proxies to cache popular contents for reducing user access latency and the amount of Internet access traffic [18]."]} +{"3480493|6779551": []} +{"3480493|3453202": []} +{"9077942|1819274": ["In terms of middleware support, middleware systems for ad hoc networks, robotics, and wireless sensor networks are surveyed in [5] [6] [7], however, no survey could be found for middleware platforms designed specifically for IoT."]} +{"11668209|6327434": ["For more details on the choice of window size, please refer to [8].", "In [8], the author reviews several failure detection algorithm in dynamic systems."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"3945114|31245252": ["Smart environment is another key area that aims at improving our living ecosystem from the perspective of efficient energy management [20], [29], water management to smart building, waste management and carbon emission reduction, and traffic management [22], [23].", "To deal with big data processed in smart city, the fog and edge computing can be leveraged so that data can be stored and processed locally before transmitting the massive data to the centralized data center [23]."]} +{"3945114|14849079": ["in [30] conducted survey on smart cities, and extensively reviewed existing"]} +{"13195599|3348390": ["Although IoT has great potential and many prototype IoT systems have been built [Perera et al. 2014; Panga et al. 2015; Xu et al. 2014], some fundamental issues have yet to be addressed."]} +{"16371788|945077": []} +{"2656223|1940388": ["Even worse, the attackers could launch the false data injection attacks via compromised nodes, posing serious threats to WSNs [1], [2]."]} +{"63920970|21386749": []} +{"63920970|12817488": []} +{"63920970|17205659": []} +{"16404448|14132386": ["An IDS becomes very tedious structure when a high value of attack Detection Rate (DR) along with simultaneously providing low False Alarm Rate (FAR) value is the main aim of the network [4]."]} diff --git a/edge/graph_31246274.jsonl b/edge/graph_31246274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31251006.jsonl b/edge/graph_31251006.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc6088609f9143a22577c16add6d9396f6d13cdd --- /dev/null +++ b/edge/graph_31251006.jsonl @@ -0,0 +1,2 @@ +{"4979708|2187403": ["The \ufb01ltered client query is shown in Figure 5b."]} +{"9683859|5888685": ["The solution we propose builds on an existing work that defines access control policies based on RDF patterns that are in turn enforced over RDF datasets [23].", "[23] provide a comprehensive survey of existing access control proposals for RDF."]} diff --git a/edge/graph_3125111.jsonl b/edge/graph_3125111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3126100.jsonl b/edge/graph_3126100.jsonl similarity index 100% rename from graph_3126100.jsonl rename to edge/graph_3126100.jsonl diff --git a/edge/graph_31280505.jsonl b/edge/graph_31280505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bade532f1add813efab369ed22016aa2a2f4956d --- /dev/null +++ b/edge/graph_31280505.jsonl @@ -0,0 +1 @@ +{"113533|8785789": []} diff --git a/graph_3129994.jsonl b/edge/graph_3129994.jsonl similarity index 100% rename from graph_3129994.jsonl rename to edge/graph_3129994.jsonl diff --git a/edge/graph_31321676.jsonl b/edge/graph_31321676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c45c267954cf437fcf485b4584f4fc38e8e4de8 --- /dev/null +++ b/edge/graph_31321676.jsonl @@ -0,0 +1,6 @@ +{"2593345|18986679": ["However, overview is becoming increasingly difficult to effectively achieve with the ever-increasing size of real-world datasets."]} +{"8045400|6116234": ["Matrix-based visualizations and parallel coordinates provide possible visual solutions to meet these two design concerns, and the former has been studied in the bioinformatics domain [67, 73]."]} +{"8045400|18986679": ["Parallel coordinates is a well explored visual technique to present highdimensional or multivariate data [22, 44, 86]."]} +{"8045400|17953874": ["Biclustering is a data mining technique that has been extensively used in bioinformatics, especially for gene expression data analysis [5, 18, 60, 61, 62, 69, 72, 81], Biclusters, the computational outcome of biclustering algorithms, potentially provide a rich high-level abstraction that represents coordinated relationships between groups of entities of different types (e."]} +{"8045400|239537": [", focus+context [43, 57]) that allows users to explore meaningful biclusters based on the context."]} +{"26628405|9629338": ["[14] X X X [24] X X [25] X X [26] X X [27] X X [28] X X [29] X X [1] X X [15] X X [19] X X [10] X [30] X [31] X FUCHS ET AL."]} diff --git a/graph_3133068.jsonl b/edge/graph_3133068.jsonl similarity index 100% rename from graph_3133068.jsonl rename to edge/graph_3133068.jsonl diff --git a/edge/graph_31333609.jsonl b/edge/graph_31333609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31355144.jsonl b/edge/graph_31355144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bcfef28e4c917c1c611c6fe140acf54bf5c87557 --- /dev/null +++ b/edge/graph_31355144.jsonl @@ -0,0 +1,10 @@ +{"20725571|870434": []} +{"18664196|1230643": ["After deployment, sensors are lowered to various depths selected by our scheme such that the maximum coverage of the three dimensional sensor space is maintained."]} +{"18479344|1230643": ["D ISTRIBUTED environmental monitoring with wireless sensor networks (WSNs) is one of the most challenging research activities faced by the embedded system community in the last decade [1], [2], and [3]."]} +{"40739558|6275330": ["WSN has been applied in many applications [8], such as habitat monitoring [9], Point of Interest Building monitoring [10], pipeline monitoring [11], smart agriculture [12], and smart electrical grid [13]."]} +{"35563047|7085121": []} +{"16017629|870434": ["In acoustic networks the power required for transmitting is typically about 100 times more than the power required for receiving [11]."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"6560401|2469117": ["Radio signal propagates at long distances through water only at extra low frequency between 30Hz and 300Hz, which requires long antennae and high propagation power [8].", "Localization algorithms also can be classified into distributed and centralized [8]."]} +{"6635819|1503157": ["To confront these problems, sensor network technology has been proposed in many monitoring applications [3]."]} diff --git a/edge/graph_3139686.jsonl b/edge/graph_3139686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31418421.jsonl b/edge/graph_31418421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7904bf66eddac5eb705020538484d3e78fab3995 --- /dev/null +++ b/edge/graph_31418421.jsonl @@ -0,0 +1,2 @@ +{"9828396|14441987": ["[Royer & Toh 99] Elizabeth Royer and C.-K. Toh.", "\u2026research on ad hoc networks has focused on multi-hop \nrouting algorithms, such as DSDV, DSR, AODV, ZRP, TORA, CEDAR and many others ([Perkins & Bhagwat \n94, Broch et al. 96, Perkins 97, Haas & Pearlman 98, Park & Corson 98, Sivak-umax et al. 99], \nsee [Royer & Toh 99] for a survey)."]} +{"4187130|2457428": []} diff --git a/edge/graph_31424895.jsonl b/edge/graph_31424895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31435853.jsonl b/edge/graph_31435853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3144583.jsonl b/edge/graph_3144583.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3147582.jsonl b/edge/graph_3147582.jsonl similarity index 100% rename from graph_3147582.jsonl rename to edge/graph_3147582.jsonl diff --git a/edge/graph_31481155.jsonl b/edge/graph_31481155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7c012f42ac2c8497d93ee2ebc4acbdb98522745 --- /dev/null +++ b/edge/graph_31481155.jsonl @@ -0,0 +1,15 @@ +{"28823666|11894197": []} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"15631423|3330313": ["A number of surveys, review articles and books especially Hodge and Austin [12], cover outlier detection techniques in machine learning and statistical domains."]} +{"25995246|1400872": ["In addition to the network structure, another factor that may inGuence the performance of recurrent networks is the learning algorithm, and many supervised learning algorithms for recurrent network learning have been proposed [32]."]} +{"207172599|3330313": []} +{"377868|3102110": ["For the purpose of classification problems, the classifying system has usually been implemented with rules using if-then clauses, which state the conditions of certain attributes and resulting rules [2], [3]."]} +{"17627549|192934": []} +{"60494712|1176034": []} +{"10715511|2746910": []} +{"10715511|11894197": ["In [1], univariate nonparametric filter techniques are split in two groups: pure model-free methods and methods based on random permutation associated to parametric tests.", "Different strategies have been proposed over the last years for feature/gene selection: filter, wrapper, embedded [1], and more recently ensemble techniques [5].", "filter methods in an extended taxonomy inspired from [1].", "According to [1], univariate methods for FS can be either parametric or nonparametric.", "1) has many common points with the one presented in [1].", "[1] also stress on the practical advantages of these methods stating that \u201ceven when the subset of features is not optimal, they may be preferable due to their computational and statistical scalability."]} +{"35744666|16156203": ["These techniques provide a signi\ufb01cant support to the \ufb01nancial analyst in terms of understanding, usefulness and prediction [33,46]."]} +{"15838114|60455": ["Hartley et al. (2010) outline several active EI systems, Kosala and Blockeel\u2019s paper on mining the Web (Kosala and Blockeel 2000) raises many issues that are still relevant today and Howard Global Public Health 745 Burkom\u2019s tutorial slides 13 from ISDS 2008 provide an excellent foundation for\u2026", "( 2010 ) outline several active EI systems, Kosala and Blockeel's paper on mining the Web (Kosala and Blockeel 2000 ) raises many issues that are still relevant today and Howard Burkom's tutorial slides 13 from ISDS 2008 provide an excellent foundation for getting to grips with aberration detection along with R project software packages 10 ."]} +{"15838114|8310135": ["Following from NER is usually a stage of normalisation so that surface forms of names get linked to a unique identifier in a dictionary or ontology (i.e., a structured conceptual representation of the terms and relationships in the domain).", "\u2026start with a specialised module for recognising the names of important entities in the text (cid:1) a process called named entity recognition (NER) (Nadeau and Sekine 2007), which can be done using either data driven techniques such as support vector machines (SVMs) or rule-based techniques.", "Widely used open source toolkits include NLTK 9 , the R project's text mining package 10 and Sheffield University's GATE project 11 . ", "@Most text mining systems start with a specialised module for recognising the names of important entities in the text \u2013 a process called named entity recognition (NER) (Nadeau and Sekine 2007 ), which can be done using either data driven techniques such as support vector machines (SVMs) or rule-based techniques.", "@For computers to extract high quality information from text requires some degree of linguistic understanding. Systems typically require two sets of knowledge \u2013 domain knowledge that show the classes of objects of interest and their relationships and the patterns that show how these relationships are realised in the language of an actual text. ", "Most text mining systems start with a specialised module for recognising the names of important entities in the text (cid:1) a process called named entity recognition (NER) (Nadeau and Sekine 2007), which can be done using either data driven techniques such as support vector machines (SVMs) or rule-based techniques."]} +{"32599226|192934": []} +{"46189|3330313": ["41 In evolutionary training set selection, it is likely that outliers, together with redundant data, are removed from the datasets."]} diff --git a/edge/graph_3148588.jsonl b/edge/graph_3148588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31505160.jsonl b/edge/graph_31505160.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31537667.jsonl b/edge/graph_31537667.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe684aa89cc832d37fdf384028faf5b927dc4a9f --- /dev/null +++ b/edge/graph_31537667.jsonl @@ -0,0 +1,5 @@ +{"32954408|18190006": ["Brynjolfsson and Yang (1996), Dedrick et al. (2000), and Banker and Kauffman (2004) provide useful reviews of the existing literature that quantifies this value."]} +{"35981567|35897447": ["\u2026strategic initiative perspective also provides an embryonic challenge to the notion that IT is a commodity by claiming that \u2018 at a minimum, the documented high failure rate of IT projects casts some doubts on the accuracy of the \u201c easily replic-able \u201d hypothesis \u2019 (Piccoli & Ives, 2005, p. 767).", "The four barriers \u2018 contribute independently or in combination with one another \u2019 (Piccoli & Ives, 2005, p. 751), although little is known about how they combine to hinder imitation.", "The IT-dependent strategic initiative perspective indicates that an initiative can enable sustained competitive advantage when the \ufb01 rm \u2019 s competitors face high barriers to erosion in replicating the leader \u2019 s initiative (Piccoli & Ives, 2005).", "Information systems (IS) scholars have started to rectify this shortcoming by conceptualizing IT-depen-dent strategic initiatives (Piccoli & Ives, 2005) and IT-enabled resources (Nevo & Wade, 2010) as the basis for understanding the role of IT in the quest for sustained competitive advantages.", "\u2026on whether IT-enabled competitive advantage is sustainable based on the premise that IT \u2018 does not contribute to \ufb01 rm performance in isolation, but instead contributes as a part of an activity system that fosters the creation and appro-priation of economic value \u2019 (Piccoli & Ives 2005, p. 766).", "Our work informs an emerging stream of research on the business value of IT by moving beyond a reductionist approach and acknowledging the importance of interactions and mutual in \ufb02 uence of IT assets as well as organizational resources (Piccoli & Ives, 2005; Nevo & Wade, 2010).", "We do so within the paradigm of application level research (Piccoli & Ives, 2005; Setia et al , 2008) by studying the effect of an IT-enabled customer service (CS) initiative on competitive-level outcomes.", "\u2026the additive, synergistic, or suppressive interaction effects among the components of an IT-dependent strategic initiative, we envision scenarios where resources act as prerequisites or constraints for one another and thus create path dependencies (Dierickx & Cool, 1989; Piccoli & Ives, 2005).", "\u2026this reason, IT-dependent strategic initiatives, de \ufb01 ned as \u2018 identi \ufb01 able competitive moves that depend on the use of IT to be enacted and are designed to lead to sustained improvements in a \ufb01 rm \u2019 s competitive position \u2019 (Piccoli & Ives, 2005, p. 748), represent the unit of analysis in study.", "This is not equivalent to creating a comparable \u2018 IT system \u2019 because the IT-dependent strategic initiatives that underlie value propositions depend on the characteristics of the technology itself, the \ufb01 rm \u2019 s characteristics, and the value network in which the \ufb01 rm operates (Piccoli & Ives, 2005)."]} +{"42097465|31537667": ["The challenge that remains is incorporating the value proposition in HCSSs, allowing to create and enhance customer value and business turnover (Kleinschmidt et al. 2016).", "In HCSSs, the characteristics of service systems that influence the design of the services and BMs have a great extent (Kleinschmidt et al. 2016; Maglio et al. 2015)."]} +{"14990549|15164501": []} +{"14990549|35897447": []} diff --git a/edge/graph_31562825.jsonl b/edge/graph_31562825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31563803.jsonl b/edge/graph_31563803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c642f2d4f0c9b73e003672ef214874e10d5270d --- /dev/null +++ b/edge/graph_31563803.jsonl @@ -0,0 +1,7 @@ +{"41599029|18190006": ["Much of the theory in the information systems \ufb01 eld has been developed in the context of enterprise information systems (see Banker & Kauffman, 2004, for a review)."]} +{"20980833|594415": ["It has been used sporadically as a lens through which to understand and explain individuals \u2019 use of systems, organizational changes associated with system implementation, or ways of designing systems (Whitley et al. , 2014).", "\u2019 reveals the surge of new identity tensions (Whitley et al. , 2014).", "Most studies of identity in the IS context focus on the effects of IT use on individual user identity or the interactions between organizational identity and ways of using internal IT (Whitley et al. , 2014).", "So far, according to Whitley et al. (2014), identity research in IS has mainly explored the effects of IT use on individual user identity or the interactions between organizational identity and speci \ufb01 c ways of using internal IT.", "At the same time, Whitley et al. (2014) note, in particular, the need to focus on such identity processes at the level of organizations.", "Forging a new organizational identity depends also on the legitimacy of the organization in the eyes of its partners (Tripsas, 2009; Whitley et al. , 2014)."]} +{"5120196|16403716": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} diff --git a/edge/graph_31567906.jsonl b/edge/graph_31567906.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25068034c96414af46ed3f4788c93bae5756b94a --- /dev/null +++ b/edge/graph_31567906.jsonl @@ -0,0 +1,3 @@ +{"13997318|8530790": []} +{"12072764|8530790": ["The process of updating the archive at each generation employs the concept of Pareto optimality in a set of selected optimization objectives (see [14], [15], and Fig.", "An excellent description of the elite-based strategy for multiobjective evolutionary computation is given in [15] and [16]."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} diff --git a/edge/graph_31577697.jsonl b/edge/graph_31577697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31662905.jsonl b/edge/graph_31662905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33b91c590e4eb9cacd17228a9c7845be8f8cc82c --- /dev/null +++ b/edge/graph_31662905.jsonl @@ -0,0 +1,26 @@ +{"13019489|8606364": ["The spectrum occupancy in 20MHz-to-3GHz was found to be 32% for indoor scenarios (in the case of outdoor, however, almost 100%, of this range is utilised), and very low in 3-to-6GHz [136], [62]."]} +{"13019489|4122595": ["Although the performance of other sensing techniques such as; feature detection, covariance, matched filter-based techniques may be superior, the implementation and computational complexity remain prohibitive [61], [95]."]} +{"13019489|42449870": ["For instance, in Cognitive Radio Networks (CRNs), many surveys on Opportunistic Spectrum Access (OSA) and Dynamic Spectrum Access (DSA) have been carried out.", "This type of spectrum sharing is similar to the interweave approach in CRNs, i.e., exclusive shared spectrum access where no interference is tolerable and almost always the actual owner of the spectrum (who is referred to as host operator) has the priority to access the band [57].", "Spectrum leasing policies have been applied to offer a more robust (in terms of access guarantees) form of OSA/DSA schemes in licensed bands in CRNs [66], where for example, the white spaces are leased to SUs subject to pre-negotiation with PUs.", "The authors also study the architectures of CRNs, as well as the cognitive-based spectrum sensing approaches, routing protocols, and interference mitigation schemes for smart grids.", "=> Spectrum assignment in CRNs is discussed.", "In CRNs, radios are capable of learning/monitoring theenvironment and change their transmission parameters adaptively based on the observations [42].", "A wide range of sensing techniques have been proposed and investigated in CRNs.", "In [38], a survey on resource allocation challenges in CRNs according to different design techniques such as, SINR-based, transmission power-based, centralised and distributed methods of decision making, is presented.", "It can be observed from the previous section that, there are extensive literature surveys that focus on spectrum sharing and access techniques in CRNs.", "The latter however, involves all OSA sharing types in CRNs incorporating distributed techniques (sensing technique in this work is mainly considered).", "Various schemes, which are defined under this authorisation regime, have been widely applied in CRNs under DSA/OSA contexts and based on prioritisation of the users into primary and secondary hierarchies.", "Spectrum sharing in future cellular systems (namely 5G), has a scope far beyond that addressed in previous studies of CRNs.", "These surveys mainly focus on the principals of CRNs and investigate the applicability of a wide range of available coordination protocols/methods, as well as the spectrum access/allocation/assignment techniques under various licensing regimes covering different spectrum ranges.", "Various enabling techniques that have been studied extensively in CRNs, comprise wide ranges of sensing techniques [61], Geo-location database, beacon signalling, etc. [37], in order to enable SUs to exploit the PUs\u2019 spectrum in an opportunistic manner.", "However, in contrast to the CRNs interweave approach, and based on the agreement among operators, access to the spectrum as well as QoS must be guaranteed for both sharing players.", "The term mapping is referred to the spectrum situational awareness with the aid of transmission observations which facilitates characterisation of CRNs, e.g., identification of how particular bands are being used and estimate spectrum occupancy and usage throughout the particular area [153].", "In [35] and [36], the authors provide a comprehensive survey of challenges related to the spectrum decision/assignment in CRNs, including spectrum characterisation process and primary-system activity modelling, spectrum selection, and reconfiguration.", "of OSA/DSA schemes in licensed bands in CRNs [66], where for example, the white spaces are leased to SUs subject to pre-negotiation with PUs.", "posed varieties of trading schemes for the pricing such as channel-quality based price, game-theoretic based (such as NE), and also demand-supply model in which the shared bands are assigned to the highest bidders [102], and spectrum leasing [66].", "Radio Networks: A Survey\u201d [35] => An overview of CRNs is presented."]} +{"13019489|8974063": ["In [35] and [36], the authors provide comprehensive survey on the challenges related to the spectrum decision/assignment in CRNs including; \u201cspectrum characterisation process\u201d, \u201cprimary-system activity modelling\u201d, \u201cspectrum selection\u201d, and \u201creconfiguration\u201d."]} +{"2509135|12452682": []} +{"9413775|8606364": ["There are articles on the methodological aspects [19], [28], guidelines [26], [27], and time-domain modeling [29], [30] of spectrum measurements.", "The use of equipment that is not matched to the signals present in the environment has led to dubious findings and conclusions, such as the claim in [29], where several papers report that the satellite bands below 3 GHz are unutilized.", "The data is processed to estimate the spectrum occupancy and models are developed [29], [79] to characterize the use of the spectrum being studied.", "Furthermore, a useful survey on spectrum occupancy modeling [29] provided good insight especially on time-"]} +{"9413775|2398835": [", graphical processing units (GPU) [98] in conjunction with distributed database storage, processing and access [99] are becoming mainstream in the development", "To overcome the scaling problem for large scale datasets, sparse approximation methods [73] and parallel computing approaches [99] can be applied."]} +{"9413775|5621151": ["Our work extends the previous research reported in [19] and [26]\u2013[35]."]} +{"8397762|7957076": ["areas [ 1 ]. In some cases, on the other hand, the same frequency bands are employed by the FS for terrestrial telecommunications infrastructure and/or broadband wireless access (BWA)."]} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"4122595|15116409": ["of the examples are [11]: (i) Random Filtering, (ii) Com-"]} +{"4122595|8974063": []} +{"4122595|2509135": []} +{"4122595|12601073": ["Several survey papers exist in the literature in the context of CR communications covering a wide range of areas such as spectrum occupancy measurement campaigns [8], Spectrum Sensing (SS) [9]\u2013[13], spectrum management [14], emerging applications [15], spectrum decision [16], spect rum assignment [17], spectrum access strategies [18], resourc e allocation [19], [20], machine-learning techniques [21] a nd"]} +{"8974063|8443371": ["For a detailed comparison of different CR platforms see [88], where five different platforms are discussed and compared: the Universal Software Radio Peripheral (USRP) hardware [89] and GNU Radio software [90] platform; the Wireless Open Access Research Platform (WARP); the OpenAirInterface."]} +{"8974063|5621151": ["In the absence of signalling between PUs and SUs, spectrum holes may be identified by performing direct spectrum sensing, using geo-location databases, beaconing techniques, or by combining spectrum sensing with geo-location database information [7], [12].", "TVWS refers to large portions of RF spectrum, in the very high frequency (VHF) and ultra high frequency (UHF) bands, that will become vacant after the switch-over from analogue to digital TV [7].", "22 standard would be in sparsely populated rural areas [7]."]} +{"205823874|2509135": ["The applicability of CR technology constitutes a significant research subject during the last decade, focusing mainly on terrestrial networks [4, 5]."]} +{"17926950|2443013": ["Recent technology developments in the mobile communication systems arising from research are already paving the way spectrum sharing, see [55] for an overview for LTE-Advanced."]} +{"17591210|11720829": ["THE SUCCESS story of MIMO technology in terrestrial applications now spans more than a decade with spectacular results, as it offers substantial leverage in realizing the next generation gigabit wireless [1].", "[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"17591210|18148591": ["[1], [13], [14], [15]) that serve this purpose\u2212 but to provide an easy reference to the various MIMO techniques when discussing their application in the satellite"]} +{"207256461|12452682": ["In fact, CR should not be thought as being similar to generic MAC problems in existing wireless networks and limited to wireless resource allocation issues [34]."]} +{"207256461|8836911": ["According to Hamdaoui and Shin [28] and to Wang et al. [29], dedicating a piece of the spectrum as a \u2018\u2018common good\u2019\u2019 (the control channel) is an absolute necessity to achieve ef\ufb01cient spectrum access."]} +{"341121|2623404": ["Various open interfaces [3] have been defined to communicate between the control plane and data plane (south bound interface), and OpenFlow [4] is a de-facto standard."]} diff --git a/edge/graph_31670805.jsonl b/edge/graph_31670805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9666fa574d85e5ede153a48b0ca88fe6430401fc --- /dev/null +++ b/edge/graph_31670805.jsonl @@ -0,0 +1,9 @@ +{"483160|20905429": ["Many researches show that the body area technology has made great progress in the past few years and wearable sensors can be used in piratical applications now [2].With this progress, many crucial health data (such as heart rate, blood pressure, blood sugar, electrocardiogram, fetal heart rate) can be collected continuously in pregnant women\u2019s daily life [ 3 ].", "During the past few years, many miniaturization, multiparameter, low-power digital sampling and monitoring equipments have been developed [ 3 ]."]} +{"9571649|17887301": []} +{"38941978|15916359": []} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"13433608|11894197": []} +{"10817088|2670121": ["Generative probabilistic graphical models such as hidden Markov models [72], [70], [73], [74] and dynamic Bayesian networks [64], [48] have been used to model activity sequences and to smooth recognition results of an ensemble classifier [75]."]} +{"4653178|1230643": ["Index Terms \u2014Body sensor networks (BSNs), collaborative signal processing, distributed computing, motion primitives, physical movement monitoring."]} +{"15852327|7788290": ["Moreover, a preliminary study on posture recognition is proposed according to a 3D hybrid approach in which model#based and learning#based techniques are used in conjunction in order to estimate location and orientation of the different body articulations (more details about the posture recognition taxonomy can be found in [ 15 ])."]} +{"10461892|62198990": ["There are several different ways to track the eye movements, such as refection of light [9]-[13] and electrooculographic potential (EOG) [10], [14]-[19], etc."]} diff --git a/edge/graph_31699432.jsonl b/edge/graph_31699432.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31711300.jsonl b/edge/graph_31711300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0af6df78e6b9eace096052831e367c6ff535e4e0 --- /dev/null +++ b/edge/graph_31711300.jsonl @@ -0,0 +1,4 @@ +{"35559558|543643": ["The physically distributed system of power distribution network is a natural case for application of Multi Agent System (MAS) [1].", "Together with agent development platforms for agent communication, power system simulation programs such as Matlab/Simulink in [5] and InterPSS in [1] have also been used."]} +{"21155623|10440280": ["A comprehensive view of optimization algorithms for DR applications can be found in [24]."]} +{"21155623|543643": ["There is a trend that the smart grid moves toward to a distributed system with a large number of heterogeneous components [6]."]} +{"2600322|7839197": ["Nwana [7] describes agents as having a combination of the following three characteristics; ability to cooperate, act autonomously and the ability to learn."]} diff --git a/edge/graph_31732877.jsonl b/edge/graph_31732877.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31a7fe6a1e9c5319aef3c582148373478d880c61 --- /dev/null +++ b/edge/graph_31732877.jsonl @@ -0,0 +1,2 @@ +{"742161|1819274": [", about robotics middleware [22] or complete development environments for mobile robots [23]."]} +{"1986192|1819274": []} diff --git a/graph_3174919.jsonl b/edge/graph_3174919.jsonl similarity index 100% rename from graph_3174919.jsonl rename to edge/graph_3174919.jsonl diff --git a/edge/graph_31756370.jsonl b/edge/graph_31756370.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53763d6da2b4f3caffffe734231efd30b042f8ae --- /dev/null +++ b/edge/graph_31756370.jsonl @@ -0,0 +1,4 @@ +{"16082707|1230643": ["We propose a system architectur and a set of lightweight collaborative signal processing algorithms that achieve real-time behavior while minimizing inter-node communication to extend the system lifetime."]} +{"46690774|10271586": []} +{"46690774|2937482": []} +{"3060863|1236072": ["The flooding technique [4]-[5] is used to establish a local routing table for each sensor node in the routing table establishment phase.", "Classic flooding is an old technique that can also be used for routing in sensor networks [4]-[5].", "There has been much research in the field of network layer protocols for wireless sensor networks, such as flooding [4]-[5], directed diffusion [6], sequential assignment routing [7], gradient-based routing [8] to mention a few.", ", nodes broadcast using the same transmission power level without any power control [4]-[8]."]} diff --git a/edge/graph_3175951.jsonl b/edge/graph_3175951.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3176028.jsonl b/edge/graph_3176028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31783303.jsonl b/edge/graph_31783303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31804116.jsonl b/edge/graph_31804116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31816372.jsonl b/edge/graph_31816372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3182765.jsonl b/edge/graph_3182765.jsonl similarity index 100% rename from graph_3182765.jsonl rename to edge/graph_3182765.jsonl diff --git a/graph_3183229.jsonl b/edge/graph_3183229.jsonl similarity index 100% rename from graph_3183229.jsonl rename to edge/graph_3183229.jsonl diff --git a/edge/graph_3183240.jsonl b/edge/graph_3183240.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31832898.jsonl b/edge/graph_31832898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ead8a9e92d1f81e4988fe6504d9a2078f37d1ebd --- /dev/null +++ b/edge/graph_31832898.jsonl @@ -0,0 +1,12 @@ +{"2102067|239537": ["Discovering clusters in graphs not only helps visualize and define hierarchies [Herman et al., 2000], but is also meaningful for many real world problems, such as community detection [Fortunato, 2010; Smyth and White, 2005] and outlier detection [Gupta et al., 2012].", "Discovering clusters in graphs not only helps visualize and define hierarchies [Herman et al., 2000], but is also meaningful for many real world problems, such as community detection [Fortunato, 2010; Smyth and White, 2005] and outlier detection [Gupta et al."]} +{"62602425|1413177": ["Genetic algorithm (GA) (Romero & Abell\u00f3, 2009; Goldberg, 1989), is a powerful evolutionary computing technique based on the principles of evolution."]} +{"140362042|36438802": ["The recent publication of the first pedagogical article on social network analysis to appear in a criminological journal (McGloin and Kirk, 2010) may be a harbinger of future developments."]} +{"28906826|7158350": []} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"11422092|191396": ["\u2026315211, PR China\nA R T I C L E I N F O A B S T R A C T\nArticle history: Received 22 January 2009 Received in revised form 19 July 2009 Accepted 24 July 2009\nKeywords: Graph-based clustering Well-separated cluster Touching cluster Two rounds of MST\nMany clustering approaches have been proposed\u2026", "The main goal of clustering is to partition a dataset into clusters in terms of its intrinsic structure, without resorting to any a priori knowledge such as the number of clusters, the distribution of the data elements, etc. Clustering is a powerful tool and has been studied and applied in many\u2026"]} +{"206522771|191396": []} +{"206522771|710141": []} +{"206522771|11038925": []} +{"6634435|192934": []} +{"385307|3102110": []} diff --git a/edge/graph_3183613.jsonl b/edge/graph_3183613.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3184786.jsonl b/edge/graph_3184786.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3185872.jsonl b/edge/graph_3185872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31860478.jsonl b/edge/graph_31860478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31884266.jsonl b/edge/graph_31884266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3189549.jsonl b/edge/graph_3189549.jsonl similarity index 100% rename from graph_3189549.jsonl rename to edge/graph_3189549.jsonl diff --git a/graph_3189715.jsonl b/edge/graph_3189715.jsonl similarity index 100% rename from graph_3189715.jsonl rename to edge/graph_3189715.jsonl diff --git a/edge/graph_31926647.jsonl b/edge/graph_31926647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5a163a39daf41eca55100dcf72fda8ff108ad94 --- /dev/null +++ b/edge/graph_31926647.jsonl @@ -0,0 +1,7 @@ +{"1075617|1230643": ["An MSN consists of a large number of low-cost smart sensors with limited computational capacities and energy resources [1]."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"109955985|7774517": ["techniques have been investigated in [16\u201318]."]} +{"109955985|3330313": ["techniques have been investigated in [16\u201318]."]} +{"375999|1230643": ["Also, the positions of unknown nodes play a critical role in many WSNs applications, such as monitoring applications include environmental monitoring, health monitoring, and tracking applications include tracking objects, animals, humans, and vehicles [4]."]} +{"5207304|1230643": ["The aim of WSN is to perceive, collect and process the information of sensor nodes within the coverage of the network [1]."]} diff --git a/edge/graph_31926936.jsonl b/edge/graph_31926936.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31951812.jsonl b/edge/graph_31951812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31954778.jsonl b/edge/graph_31954778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f234370f6dd6bd7f842a3fe53426a93b71f24ce --- /dev/null +++ b/edge/graph_31954778.jsonl @@ -0,0 +1,3 @@ +{"8036385|6486398": ["We will explore credibility computation in future work, based on popular mechanisms for trust-propagation such as pagerank and HITS (Langville & Meyer 2004).", "We wish to express our sincerest thanks to Prof. S. Keshav and Prof. R. Cohen for their comments on early drafts of the paper, and to the anonymous reviewers who gave us invaluable suggestions to improve the paper."]} +{"28691882|60455": []} +{"7903612|60455": ["Moreover, if concepts are defined in a way that each instance exists in the form of a web page, there will also exist a relationship instance in the form of web page pair [6].", "The web mining process is usually divided into three categories: (1) web content mining, (2) structure mining and (3) usage mining [6]."]} diff --git a/edge/graph_31962972.jsonl b/edge/graph_31962972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c79c5d644374d8eea5d628f8c228315083cf9b6 --- /dev/null +++ b/edge/graph_31962972.jsonl @@ -0,0 +1,9 @@ +{"14182585|17205659": []} +{"14849884|1333339": ["Trust Predictions: Trust prediction is a method of predicting potentially unknown trust between nodes using the present and past behavior of nodes and also the recommendations received from other nodes [17].", "The core factor to be considered for trust propagation is cooperation in the network in transporting the trust information [17, 18].", "The chain of nodes that transmits the trust information about target node to the trust requesting node constitutes a trust path [17, 18]."]} +{"14849884|1462862": []} +{"14849884|10137283": []} +{"14849884|9240891": ["The contributions of this paper are: (1) to give a clear definition of trust in the communication and networking field, drawing upon definitions from different disciplines; (2) to extensively survey the existing trust management schemes developed for MANETs and investigate their general trends; and\u2026", "Also, confidence level is used as a weight to evaluate trust of other nodes based on a Bayesian approach."]} +{"2142482|14745481": ["We recognize that many reputation and trust management systems actually take into consideration of both multitrust and unitrust in trust composition [49, 50, 51, 52, 53, 54, 55, 56, 57]."]} +{"6541402|2181694": []} +{"11972743|14745481": ["At the SN level, each SN is responsible to report its peer-to-peer trust evaluation results towards other SNs in the same cluster to its CH which applies statistical analysis and", "The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"11972743|1940388": ["The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} diff --git a/edge/graph_31973880.jsonl b/edge/graph_31973880.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_31980349.jsonl b/edge/graph_31980349.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2313f08b729049a729c4408a9801a9a4f384e15c --- /dev/null +++ b/edge/graph_31980349.jsonl @@ -0,0 +1,40 @@ +{"6390196|15744805": []} +{"247263|191396": ["In this paper, we will focus our attention to image segmentation methods based on clustering."]} +{"15500946|192934": ["Many clustering methods are not suitable for this kind of analysis since they require the knowledge of the number of clusters (see [ 32 ])."]} +{"6727124|15744805": []} +{"15151944|191396": ["Concerning the initialization of the parameter vector , we employ the -means algorithm, but we note that other clustering algorithms [29] can be used also."]} +{"15301163|15744805": []} +{"14580402|14415030": ["[28] also compared the measures on different environments, confirming that each measure generally works better in a different context.", "With the same nomenclature as in [28], these measures are E, ECW, Zeb and FRC, which can be described as follows(1):", "unsupervised measures as a way of judging the segmentation quality [27, 28, 42] and they have been generally", "The quality measures used in this work have been used in several reviews [27, 28].", "These criteria were recently employed in several comparisons, obtaining an excellent performance in almost all the tests [27, 28].", "mentations were contrasted against the human segmentations in [28].", "There are other measures in [28] that have not been used in our experiments because they focus on video sequences, are based on shape regularity, or provided poor performance in other studies [27, 42].", "In [28], authors carried out several experiments comparing eight evaluation measures.", "Recent reviews on unsupervised evaluation methods [27, 28] compare the performance of these measures by means of different experiments and suggest which ones work better on each scenario."]} +{"14580402|15744805": ["In the often-cited work of Zhang [25], the different methodologies to evaluate segmentation algorithms are broadly divided into two categories: analytical methods and empirical methods.", "In their review, Zhang et al. [28] also compared the measures on different environments, con\ufb01rming that each measure generally works better in a different context.", "In the often-cited work of Zhang [25], the different methodologies to evaluate segmentation algorithms are broadly divided into two categories: analytical methods and empirical methods ."]} +{"6989098|2616070": []} +{"6989098|8953108": []} +{"8348605|11038925": ["[ 4 ]. In exclusive clustering methods, the objects are partitioned into a number of (crisp) subsets, such"]} +{"8953108|15744805": []} +{"41313157|191396": []} +{"41313157|12894036": []} +{"14741304|14415030": []} +{"16978259|2616070": []} +{"691081|192934": []} +{"3331677|2616070": []} +{"1915994|2616070": ["\u00c7"]} +{"1915994|15767558": []} +{"15132594|2616070": ["It has been the subject of a large number of theoretical and practical studies [1]\u2013[ 3 ].", "The most effective minimizes active curve functionals via level sets [2], [ 3 ], [6]."]} +{"15132594|192934": []} +{"7853727|192934": ["Classified as feature extraction and feature selection in [9] or as embedded, filter and wrapper in [2], feature selection methods address the problem of selecting a subset of features, which are relevant for an inference process."]} +{"6191106|2616070": []} +{"1902452|2616070": []} +{"14800136|2616070": ["I. INTRODUCTION\nD EPENDING on the assumption of how object boundaryis described, active contours can be classified into edge based [2]\u2013[5], region based [6]\u2013[8], and hybrid approaches [9]\u2013[11]."]} +{"9139637|8953108": ["Sezgin and Sankur [27] have examined and evaluated the quantitative performance of several thresholding techniques.", "A comprehensive survey of image thresholding methods is provided in [27]."]} +{"6540000|15744805": ["A survey of some of the earliest evaluation metrics can be found in [29], where, in general, supervised evaluations utilized one reference image for evaluation, while their unsupervised counterparts utilized requirements, utilities, complexity, etc."]} +{"5771115|2616070": ["central problem in computer vision, image segmentation has been the subject of a considerable number of studies [6]\u2013[8], [10]\u2013[ 13 ], [16].", "In this case, it is convenient to cast segmentation in a Bayesian framework [12], [ 13 ], [25], [35].", "The second term in (4) embeds prior information on the segmentation [ 13 ].", "The first term, referred to as the data term, measures the conformity of image data within each region , ,t o a parametric distribution . The Gaussian distribution has been the focus of most studies because the ensuing algorithms are computationally simple [ 13 ]."]} +{"5771115|192934": []} +{"18594764|2616070": ["\u2026during the past three decades; variational (Mumford and Shah 1985; Paragios et al. 2005), statistical (Geman and Geman 1984; Zhu and Yuille 1996; Cremers et al. 2007), curve evolution based (Kass et al. 1988; Caselles et al. 1993, 1997; Malladi et al. 1995; Kichenassamy et al. 1995; Tsai et al.\u2026"]} +{"15274829|191396": ["Among them, clustering based methods rely on arranging data into groups having common characteristics [3], [4]."]} +{"10492299|6302771": ["For example, newly established multimedia standards, such as MPEG-4 and MPEG-7, are based on the object content of videos [13]."]} +{"16116940|15744805": []} +{"18110411|14415030": []} +{"6315738|192934": [", thresholding methods [1,2], clustering methods [3,4], edge-based methods [5], region splitting and merging methods [6\u20138], and multi-resolution techniques [9\u201311]."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} +{"6145793|14047190": []} +{"6145793|8953108": []} +{"5671625|387610": ["\u2026(cid:1) M1 (cid:2) performs a dyadic (cid:1) powers of 2 (cid:2) wavelet decomposition scheme, 8 utilizing the Daubechies 9 / 7 analysis coef\ufb01cients employed in the JPEG2000 compression methodology 41 to obtain high-quality approximations of the input RGB image at different resolution levels."]} diff --git a/edge/graph_32001173.jsonl b/edge/graph_32001173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d9b621dbc2af0207c1bfdf88db9f18866f7df73 --- /dev/null +++ b/edge/graph_32001173.jsonl @@ -0,0 +1,6 @@ +{"14439508|6952653": []} +{"10451908|6952653": []} +{"11873874|9240891": ["Trust is essential to agent-mediated electronic commerce (Grandison and Sloman 2000)."]} +{"11873874|6952653": []} +{"14923111|6952653": []} +{"11586451|6952653": []} diff --git a/graph_3200945.jsonl b/edge/graph_3200945.jsonl similarity index 100% rename from graph_3200945.jsonl rename to edge/graph_3200945.jsonl diff --git a/edge/graph_32022216.jsonl b/edge/graph_32022216.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3202525.jsonl b/edge/graph_3202525.jsonl similarity index 100% rename from graph_3202525.jsonl rename to edge/graph_3202525.jsonl diff --git a/edge/graph_32030837.jsonl b/edge/graph_32030837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32034492.jsonl b/edge/graph_32034492.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb922af65024d57aaa801b11fbb503b94687a70f --- /dev/null +++ b/edge/graph_32034492.jsonl @@ -0,0 +1 @@ +{"119628475|32034492": []} diff --git a/graph_3203531.jsonl b/edge/graph_3203531.jsonl similarity index 100% rename from graph_3203531.jsonl rename to edge/graph_3203531.jsonl diff --git a/edge/graph_3204760.jsonl b/edge/graph_3204760.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3205677.jsonl b/edge/graph_3205677.jsonl similarity index 100% rename from graph_3205677.jsonl rename to edge/graph_3205677.jsonl diff --git a/edge/graph_32080645.jsonl b/edge/graph_32080645.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d4f98d0237be2675745d42267cf81bc80e51c5f --- /dev/null +++ b/edge/graph_32080645.jsonl @@ -0,0 +1,9 @@ +{"19007459|2387055": ["The work presented in this paper tackles the security challenge identified in [1] regarding an unauthorized application or controller access.", "A number of security issues have been identified with respect to the SDN platform in [1], [3] with specific issues relating to the security of the northbound interface.", "In [1], these challenges are identified and associated with each layer and interface of the framework."]} +{"701206|28628245": ["As summarized in [4, 18], there are two types of eavesdropping attacks in WSNs: passive eavesdropping and active eavesdropping."]} +{"701206|1230643": ["Recently, wireless sensor networks (WSNs) have received enormous interests from both industry and academia [1]."]} +{"16371983|2387055": ["However, none of them focus closely enough to defence against DoS attack [3]."]} +{"1326816|2387055": ["SDNs enable this intelligence to be written in software, as network applications, us\u00ading \nopen APIs that better facilitate agile development and perhaps faster network innovations.", "Several recent studies have investigated security issues in SDNs [19, \n33, 32].", "Several recent studies have investigated security issues in SDNs [19, 33, 32].", "[32] survey possible SDN security issues."]} +{"1478875|2387055": ["There are some researches on security issues of SDN itself [15][16][17]."]} +{"7858847|2387055": ["As such, this paper extended an SDN security survey performed in [23] with a formal evaluation.", "The authors of [23] provide a survey of SDN security research."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"8125949|2623404": ["Driven by a set of flow rules, it enables high pro-grammability and dynamic orchestration of many enterprise networks by centralizing network control logic and separat-ing itself from the underlying routers and switches [2, 4\u20136, 17, 19, 21, 29, 40]."]} diff --git a/edge/graph_321117.jsonl b/edge/graph_321117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3212631.jsonl b/edge/graph_3212631.jsonl similarity index 100% rename from graph_3212631.jsonl rename to edge/graph_3212631.jsonl diff --git a/graph_3212818.jsonl b/edge/graph_3212818.jsonl similarity index 100% rename from graph_3212818.jsonl rename to edge/graph_3212818.jsonl diff --git a/edge/graph_32139815.jsonl b/edge/graph_32139815.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32169105.jsonl b/edge/graph_32169105.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf04039150eb67020d955ec6ced4dcee12abfff0 --- /dev/null +++ b/edge/graph_32169105.jsonl @@ -0,0 +1,6 @@ +{"53312663|6906699": []} +{"53312663|13785718": []} +{"9362532|18315586": []} +{"42032813|18315586": []} +{"17950466|18315586": ["In recent years there have been a few surveys on keystroke dynamics [119] [140] [88] [44]."]} +{"17950466|15219853": ["Human-computer interactions play an important role in keystroke dynamics [160]."]} diff --git a/edge/graph_32197913.jsonl b/edge/graph_32197913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3220291.jsonl b/edge/graph_3220291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32210766.jsonl b/edge/graph_32210766.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32244414.jsonl b/edge/graph_32244414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32257861.jsonl b/edge/graph_32257861.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a48b41b9885805615b443b6a9a026da3d70ef009 --- /dev/null +++ b/edge/graph_32257861.jsonl @@ -0,0 +1,30 @@ +{"12099805|10500613": ["[1] E.Ralun and P. A. Bernstein, \u201cA survey of approaches to automatic schema matching\u201d, VLDB Journal, vol. V10, pp. 334-350, 2001.", "The survey of approaches to automated schema matching by Rahm and Bernstein[1] includes a taxonomy which uses several criteria to categorize the matching approaches such as schema and instance based methods, element-level and structure-level methods, and linguistic and constraint-based methods.", "A number of schema matching publications [1,2,3,4,5] tailored to the database community and instance-based ontology matching [9,10] from the"]} +{"14888308|10500613": ["[5] E. Ralun, P.A. Bernstein, A survey of approaches to automatic schema matching, VLDB J. 10 (2001) 334\u2013350.", "A number of schema matching publications [5,6,7,8] tailored to the database community influenced our work.", "The survey of approaches to automated schema matching by Rahm and Bernstein[5] includes a taxonomy which uses several criteria to", "The survey of pproaches to automated schema matching by Ralun and Bernstein 5] includes a taxonomy which uses several criteria to categoize matching approaches such as schema and instance based ethods, element-level and structure-level methods, and linguisic and constraint-based methods."]} +{"7546760|10500613": ["This is the most common real-world scenario [28].", "(for instance, in cases where the schema is not known) or the information is limited, such as in the case of semistructured data [28].", "In [28], the authors present a taxonomy that classify the existing schema matching approaches in the following three categories: (1) Schema-Level Approaches\u2014use structural schema information as well as some knowledge on the application domain considered; (2) Instance-Level Approaches\u2014use only the stored data instances as source of evidence; (3) Hybrid Approaches\u2014combine information extracted from both the schema structure and the stored instances.", ", for security reasons), or even when useful schema information is limited, as in the case of semistructured data [28].", "For this reason, this is the most difficult scenario for any schema matching system based on the instance-level approach [28].", "As discussed in [28], current research is mostly based on hybrid approaches."]} +{"7546760|386036": ["We notice that this strategy is strongly influenced by solutions applied to record-linkage and deduplication problems [3,5,12,18]."]} +{"1640541|10500613": []} +{"5063137|10500613": ["Instance based matching could be an alternative choice for schema matching especially in cases where the schema information is unavailable or is unable to determine the correct match [2]."]} +{"5063137|386036": ["For instance, two strings like \u201cCompter Science department\u201d and \u201cDeprtment of computer scence\u201d will not have the same similarity under this measure, and the similarity value will be zero [21].", "Hence, the similarity of two fields or attributes are computed as the number of their matching atomic strings divided by their average number of atomic strings [21]."]} +{"9318211|10500613": ["A recent survey on automatic schema matching proposed a solution taxonomy differentiating between schema-and instance-level, element-and structure-level, and language-and constraint-based matching approaches [ 18, 12].", "For this purpose, previous prototypes have followed either a so-called hybrid or composite combination of match techniques [ 18]."]} +{"7250008|10500613": ["Most previous work on schema matching have focused on developing interpreted matching techniques (see [48] and [53] for survey)."]} +{"7250008|913718": ["Most previous work on schema matching have focused on developing interpreted matching techniques (see [48] and [53] for survey)."]} +{"17619911|10500613": []} +{"3254766|885218": ["Ontology based information extraction techniques are reviewed by (Wimalasuriya and Dou, 2010)."]} +{"3254766|10500613": ["Reuse of the previous schema matching results has been introduced by (Rahm and Bernstein, 2001) for improving the effectiveness and efficiency of schema matching system.", "Review of Ontology Matching Approaches and Challenges\nSarawat Anam, Yang Sok Kim, Byeong Ho Kang , Qing Liu\nSchool of Engineering and ICT, University of Tasmania, Australia\nDepartment of Management Information Systems, Keimyung University, Korea\nAutonomous Systems, CSIRO Computational Informatics, Hobart, Tasmania, Australia Abstract Ontology mapping aims to solve the semantic heterogeneity problems such as ambiguous entity names, different entity granularity, incomparable categorization, and various instances of different ontologies.", "In mapping expressions, matching cardinality problems are also considered (Rahm and Bernstein, 2001).", "Constraint-based matching is necessary to consider in measuring similarity between schemas if the schemas contain the constraint information (Rahm and Bernstein, 2001).", "Classification of the Ontology Matching Approaches\n(Rahm and Bernstein, 2001) classify the schema-based matching into element-level and structure level, and the instance-based matching into only element-level.", "(Rahm and Bernstein, 2001) classify the schema-based matching into element-level and structure level, and the instance-based matching into only element-level."]} +{"3254766|913718": ["(Shvaiko and Euzenat, 2005) find out three large classes such as syntactic, external and semantic.", "(Shvaiko and Euzenat, 2005) classify the schema matching systems according to three dimensions such as input of the systems, characteristics of the matching process and outputs of the systems.", "After determining mapping between two schemas, next step is to generate query expressions that automatically translate data instances of these schemas under an integrated schema (Shvaiko and Euzenat, 2005).", "Constraint-based Matching Techniques\nConstraint-based matching techniques are used to handle the internal constraints which are applied to the definitions of entities such as datatypes, keys and cardinality (Shvaiko and Euzenat, 2005).", "In the survey (Shvaiko and Euzenat, 2005), the authors distinguish approximate and exact techniques at schema-level, and syntactic, semantic, and external techniques at element and structure-level.", "C. Output Dimensions\nThe ontology matching systems have been classified based on the match results they produce.", "Constraint-based matching techniques are used to handle the internal constraints which are applied to the definitions of entities such as datatypes, keys and cardinality (Shvaiko and Euzenat, 2005).", "The dimensions are described below:\nA. Input Dimensions\nThe ontology matching systems have been classified depending on the data/conceptual models they take as input.", "B. Process Dimensions\nThe classification of the matching process depends on the approximate or exact nature of its computation (Shvaiko and Euzenat, 2005).", "two schemas, next step is to generate query expressions that automatically translate data instances of these schemas under an integrated schema (Shvaiko and Euzenat, 2005).", "The classification of the matching process depends on the approximate or exact nature of its computation (Shvaiko and Euzenat, 2005).", "The element-level matching is divided into syntactic and external, and the structure-level matching is divided into syntactic, external and semantic according to (Shvaiko and Euzenat, 2005).", "Matching Dimensions (Shvaiko and Euzenat, 2005) classify the schema matching systems according to three dimensions such as input of the systems, characteristics of the matching process and outputs of the systems."]} +{"2584101|10500613": ["(4) Normalization of features As the input values for neural network need to be in the range [0, 1], except composition features other features should be normalized into values of range [0, 1 ]. We use the following function to normalize features", "(4) Normalization of features As the input values for neural network need to be in the range [0, 1 ], except composition features other features should be normalized into values of range [0, 1]. We use the following function to normalize features"]} +{"12071193|10500613": []} +{"12514803|10500613": ["present taxonomy of many existing approaches for schema matching [4]."]} +{"39345827|17658947": []} +{"2773001|10500613": ["Several semi-automatic solutions to the schema matching problem have been proposed (see survey of Rahm and Bernstein [28]).", "In general, schema matching can be performed by comparing the names of the attributes, by comparing properties of underlying data instances, by comparing the structure in which an attribute is embedded, or any combination of the three [28]."]} +{"16961268|10500613": ["Here one can distinguish between schemabased matchers and instance-based matchers [2]."]} +{"16961268|386036": ["Here a number of different metrics have been proposed, including edit distance, affine gap distance, Smith-Waterman distance and q-gram distance [13]."]} +{"62120742|10500613": ["Existing works [98] develop automatic algorithms to generate a set of possible matchings, by considering linguistic and structural information."]} +{"1226659|10500613": ["Roughly, a mapping between two concepts is decomposed into a number of submappings, \nand a sloppiness value determines the fraction of these submappings that can be ignored when establishing \nthe mapping."]} +{"1226659|913718": ["We can express the strength at which the relation (1) holds as the ratio between the number of false subproblems (subproblems for which the subclass relation doesn\u2019t hold) and the total number of subproblems."]} +{"17643732|10500613": ["Schema matching has been extensively studied over the past two decades (See [15] for a comprehensive literature survey until 2001)."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} +{"6302654|10500613": []} +{"6302654|913718": []} +{"7588542|10500613": ["Previous approaches to schema matching can be categorized into two classes, label-based and instance-based, according to the different information on which they rely (see [22] for a survey).", "Schema matching is a basic problem in database research with numerous techniques proposed to address the problem (see [11] and [22] for surveys)."]} +{"10052039|10500613": ["Using the classification given in [20], such an approach is an example of schema-based matching [4][18].", "Again referring to the classification from [20], this approach is called instancebased matching [6][12][13].", "Most previously proposed work on schema matching has focused on developing interpreted matching techniques (see [20] for survey)."]} diff --git a/edge/graph_32264803.jsonl b/edge/graph_32264803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..422634a4c67ced22f38bd3f6b90252682a4d731f --- /dev/null +++ b/edge/graph_32264803.jsonl @@ -0,0 +1 @@ +{"15055218|7158350": ["firstly it is vital to know what the situation is, that means what is poor and where is the poor located in country? So These Parameters for classifying poverty are: (1)Land holdings:values contained in this may be one among (i) nil holding (ii) less than1 ha (iii) more than 1 and less than 2 ha (2)Types of house: (i) nil house (ii) non-cemented house (iii) cemented house (3) Availability of clothing :(i)Less than 2 pairs(ii)More than 2 but less than 4 pairs(iii)More than 4 but less than 6 (4)Food security: (i)Less than 1 meal per day in major part of year(ii)Normal 1 meal but sometimes less(iii)Normal 1 meal throughout the year (5)sanitation: (i) open (ii) group bathrooms with irregular water supply (iii) group bathrooms with regular water supply."]} diff --git a/edge/graph_32279515.jsonl b/edge/graph_32279515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ffe4e21c449c8ccc068497056c434bf1945f778 --- /dev/null +++ b/edge/graph_32279515.jsonl @@ -0,0 +1 @@ +{"17399667|393948": ["ing, we propose to utilize sparse autoencoders to learn nonlinear feature representations of the input data [8]."]} diff --git a/edge/graph_32300172.jsonl b/edge/graph_32300172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e40b38b25fe32496cff95c1052ad46016a5476e --- /dev/null +++ b/edge/graph_32300172.jsonl @@ -0,0 +1,6 @@ +{"110414845|1142274": ["The motivation behind this assumption is to obtain tremendous savings when setup times are explicitly included in scheduling decisions [4].", "[4]."]} +{"109641291|34621298": []} +{"7743767|17438822": ["A survey of multicriteria scheduling problems is provided by T\u2019kindt and Billaut (2001)."]} +{"38588282|62204132": []} +{"17453545|2135552": ["All rights reserved. oi:10.1016/j.compchemeng.2007.03.001\noptimization; Sensitivity analysis; Parametric programming\nThere are a great variety of aspects that need to be considered hen developing scheduling models.", "16 Z. Li, M. Ierapetritou / Computers and\nlarge number of publications have focused on developing fficient methods based on a continuous-time representation Floudas & Lin, 2004)."]} +{"154200914|34621298": []} diff --git a/edge/graph_3230168.jsonl b/edge/graph_3230168.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3232122.jsonl b/edge/graph_3232122.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0478821d5383137bbcc2e99b97a2401b3ca7137 --- /dev/null +++ b/edge/graph_3232122.jsonl @@ -0,0 +1 @@ +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_32328964.jsonl b/edge/graph_32328964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d279b48bcfb5a0c5ed1b685e2064340a0e776df --- /dev/null +++ b/edge/graph_32328964.jsonl @@ -0,0 +1 @@ +{"13373306|8530790": ["Recently, Fonseca and Fleming [127] published a survey of evolutionary algorithms for multiobjective optimization."]} diff --git a/edge/graph_32360363.jsonl b/edge/graph_32360363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c78be84bca05006223e023617f95dd81b02ea697 --- /dev/null +++ b/edge/graph_32360363.jsonl @@ -0,0 +1 @@ +{"16879475|1507400": ["It was also applied in the biological analysis [26], [27], scientific analysis [28], retrieval for large RDF graph [29], scalable distributed reasoning [30], and etc."]} diff --git a/graph_3236185.jsonl b/edge/graph_3236185.jsonl similarity index 100% rename from graph_3236185.jsonl rename to edge/graph_3236185.jsonl diff --git a/edge/graph_32367790.jsonl b/edge/graph_32367790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32390914.jsonl b/edge/graph_32390914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23cd0fdc78a66de6b53610ecdbb100adcad3dbb0 --- /dev/null +++ b/edge/graph_32390914.jsonl @@ -0,0 +1,10 @@ +{"760243|15233735": []} +{"760243|239537": ["General graph visualization has been a long standing research problem and we refer the reader to Herman et al. [15] for an excellent survey."]} +{"6584884|239537": []} +{"8694919|11013798": ["For communications networks, whose components have highly constrained and well specified behavior, a wide range of fault localization techniques have been explored [16]."]} +{"16125167|205435103": ["Search strategies in literature surveys often involve automatic keyword searches (e.g., [55], [56])."]} +{"16125167|627405": ["[57], we enforced this criterion by utilizing predefined selection criteria that clearly define the scope, and evaluated these criteria through a pilot study that yielded positive results (Section 3.", "sions [57]; borderline cases are resolved by discussion", "[57] recently pointed out that: 1) Current software engineering digital libraries do not provide good support for the identification of relevant research and the selection of primary studies and 2) in comparison to other disciplines, the standard of abstracts in software engineering publications is poor.", "[57], who state that \u201ccurrent software engineering search engines are not designed to support systematic literature reviews;\u201d this observation is confirmed by Staples and Niazi [83]."]} +{"59103688|15105704": []} +{"2477461|11013798": ["Fault localization in computer networks has a close goal to find the root cause from a set of observed symptoms [24]."]} +{"8085527|60455": ["As a general data structure, graphs have become increasingly important in modeling sophisticated structures and their interactions, with broad applications including chemical informatics, bioinformatics, computer vision, video indexing, text retrieval, and Web analysis.", "and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "Web usage mining is focused on the analysis of users\u2019 activities when they browse and navigate through the Web.", "Web content mining is a knowledge discovery task of \ufb01nding information within web pages, while web structure mining aims to discover knowledge hidden in the structures linking web pages.", "Web mining is the application of data mining techniques to discover patterns and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "There are many applications involving sequence data, such as customer shopping sequences, Web clickstreams, and biological sequences.", "Web access patterns via association rule mining in web logs were proposed by (Chen et al. 1996; Pei et al. 2000; Srivastava et al. 2000; Punin and Krishnamoorthy 2001)."]} +{"112306874|7971188": ["These form an integral part of complex systems, exemplified by peer-to-peer networks [104], voice over IP, distributed computational projects [9], and by current terms such as \u2018cloud computing\u2019 [7, 70] and \u2018software as a service\u2019 [145]."]} diff --git a/graph_3241708.jsonl b/edge/graph_3241708.jsonl similarity index 100% rename from graph_3241708.jsonl rename to edge/graph_3241708.jsonl diff --git a/edge/graph_32430104.jsonl b/edge/graph_32430104.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eba27b48520eaafdab6574b045cc2cc9e3347ec2 --- /dev/null +++ b/edge/graph_32430104.jsonl @@ -0,0 +1,2 @@ +{"18591366|15030193": []} +{"1252141|1113420": []} diff --git a/edge/graph_32433497.jsonl b/edge/graph_32433497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c24207d24f267d29c968403b7a871b39e5393187 --- /dev/null +++ b/edge/graph_32433497.jsonl @@ -0,0 +1,2 @@ +{"4232203|5577146": ["In other words, agents\u2019 interactions may eventually create dynamic organizations [44].", "Similar classification proposed by Sichman et al. [44], but he used the concept of observer in the same position as the agent awareness of the organization.", "Agent organizations are considered as an emergent area of MAS research that relies on the notion of openness and heterogeneity of MAS and imposes new demands on traditional MAS models [44]."]} +{"4232203|562855": ["Further, Horling et al. [5] stated that our real world getting more complex and highly distributed and that should be reflected in new software engineering paradigms such as MAS.", "Horling and Lesser [5] also stated that organizational design employed by an agent system can have a significant, quantitative effect on its performance characteristics, and they surveyed the major organizational paradigms used in multi-agent systems.", "Table 1 provides a summary of Horling and Lesser [5] work."]} diff --git a/edge/graph_32433825.jsonl b/edge/graph_32433825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca3f48fff5c3ece17f9ff015641f861e9b2862f7 --- /dev/null +++ b/edge/graph_32433825.jsonl @@ -0,0 +1,20 @@ +{"206667199|393948": []} +{"172567|207372751": []} +{"60385584|3330313": []} +{"60385584|1097238": []} +{"60385584|15273230": []} +{"60385584|192934": ["Jain, Duin and Mao (2000) include a section on classi\ufb01er combination.", "Jain, Duin and Mao (2000) list eighteen classi\ufb01er combination schemes; Witten and Frank (2000) detail four methods of combining multiple models: bagging, boosting, stacking and error-correcting output codes whilst Alpaydin (2004) covers seven methods of combining multiple learners: voting,\u2026"]} +{"11899584|393948": []} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"12534604|393948": ["Fortunately, it is widely believed such problem can be resolved by deep learning mechanisms [8]-[9]."]} +{"56906324|393948": ["Representation learning aims to automatically learn data representations (also called features) from relatively raw data that can be effectively exploited by downstream machine learning models to improve the task performances [17] [18] [19]."]} +{"77797|6923178": ["In the case of classification, the assessment of the prediction quality of statistical models is typically performed on the basis of several parameters [35]."]} +{"4363729|11632848": ["More elegant combination methods are discussed in [59]."]} +{"50721|1805048": [", memory-based CF and model-based CF approaches [22, 23]."]} +{"468681|207372751": []} +{"7863583|393948": []} +{"9109259|13370607": ["Many data sources are publicly available online that support efforts in computational drug repositioning [4]."]} +{"10574953|9928823": []} +{"10574953|393948": []} +{"3896336|13370607": ["According to a recent survey paper [1], different machine learning techniques can be either categorized as feature-based methods [11\u201313] or similarity-based methods.", "For example, drug repositioning, which is a rising trend in drug discovery, focuses on discovering the interactions between new targets and existing drugs [1].", "Currently, efforts for predicting drug-target interactions (either novel drug discovery efforts or drug repositioning efforts for existing drugs) are being supported by different computational methods working on different types of data sources [1,7]."]} +{"9283052|207372751": ["Most drugs1 \naffect multiple targets, and Polypharmacol\u00adogy, the study of such interactions, is an area of growing \ninterest [2]."]} diff --git a/graph_3244604.jsonl b/edge/graph_3244604.jsonl similarity index 100% rename from graph_3244604.jsonl rename to edge/graph_3244604.jsonl diff --git a/graph_3245007.jsonl b/edge/graph_3245007.jsonl similarity index 100% rename from graph_3245007.jsonl rename to edge/graph_3245007.jsonl diff --git a/edge/graph_32452263.jsonl b/edge/graph_32452263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32484644.jsonl b/edge/graph_32484644.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3249290.jsonl b/edge/graph_3249290.jsonl similarity index 100% rename from graph_3249290.jsonl rename to edge/graph_3249290.jsonl diff --git a/graph_3249779.jsonl b/edge/graph_3249779.jsonl similarity index 100% rename from graph_3249779.jsonl rename to edge/graph_3249779.jsonl diff --git a/graph_325004.jsonl b/edge/graph_325004.jsonl similarity index 100% rename from graph_325004.jsonl rename to edge/graph_325004.jsonl diff --git a/edge/graph_32517922.jsonl b/edge/graph_32517922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0392c932810333b86b2094d9c81c3564f354ca83 --- /dev/null +++ b/edge/graph_32517922.jsonl @@ -0,0 +1,3 @@ +{"206368434|32517922": []} +{"35402964|16944441": []} +{"11522056|10500613": ["He) Tel: +86 20 85290257; Fax: +86 20 85290130."]} diff --git a/edge/graph_32526909.jsonl b/edge/graph_32526909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc9818e412f148ee42e45ba4638887346021459c --- /dev/null +++ b/edge/graph_32526909.jsonl @@ -0,0 +1,11 @@ +{"34704195|16467945": ["In [68], Puchinger and Raidl, propose a survey of the state-ofthe-art approaches that combine exact methods and metaheuristics."]} +{"15999431|16866891": ["A possible reason for this is that a majority of the spiders observed are solitary [5], which means that they spend most of their lives without interacting with others of their species."]} +{"34603659|205286988": []} +{"34603659|1236072": []} +{"17713470|16467945": ["A recent survey has been published by Puchinger and Raidl on this subject [16]."]} +{"17713470|8530790": ["We use the Pareto ranking [7]."]} +{"44761686|1708582": []} +{"21873258|8530790": ["Moreover, EAs have been successfully used in solving complex problems such as discontinuities, multimodality, disjoint feasible spaces, and noisy function evaluations [5]."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"20249385|627405": ["We followed the guidelines for conducting systemic literature review which have also been proposed in previous examples Kitchenham and Charters (2007) and Brereton et al. (2007). The collected articles are published during the years 2000 to 2015."]} diff --git a/edge/graph_32536533.jsonl b/edge/graph_32536533.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f0aa8bcebfcc9b24d25dc2f14190f01f7416fde --- /dev/null +++ b/edge/graph_32536533.jsonl @@ -0,0 +1,2 @@ +{"6280716|62040085": ["Nowadays those two approaches are often combined to create systems that utilize both of the above-mentioned approaches (hybrid recommender systems) [9]."]} +{"15170786|2593345": ["Antichains have been used extensively for the purposes of information visualisation and graph visualisation [25, 9] to show or hide details."]} diff --git a/edge/graph_32555138.jsonl b/edge/graph_32555138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32559576.jsonl b/edge/graph_32559576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32584958.jsonl b/edge/graph_32584958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b61e6cff31f9a5193c5fbef93b9b325d10a2dec0 --- /dev/null +++ b/edge/graph_32584958.jsonl @@ -0,0 +1,4 @@ +{"62151587|62204132": []} +{"2902296|62204132": ["There are reviews of models which combine scheduling with batching by Potts and Van Wassenhove [63] and Webster and Baker [79].", "Potts and Van Wassenhove [63] observe that, for anticipatory setups, the search for an optimal permutation schedule may be restricted to schedules in which the jobs within each family are sequenced according to the algorithm of Johnson [48]."]} +{"6849168|7773456": ["Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12.0). BrumeUe & Sidney [1982] show that Johnson's [1954] algorithm for F21 I C max also applies to the exponential case.", "Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12."]} +{"4004854|62204132": ["However, the F21batch setupICm,x problem is NP-hard [6], although Potts and Van Wassenhove [3] point out that if the number of batches is fixed and processing orders on the two machines are constrained to be identical, then the problem is polynomially solvable by dynamic programming.", "Practical applications involving batch setup times are given by Monma and Ports [2] and by Potts and Van Wassenhove [3]."]} diff --git a/graph_3260124.jsonl b/edge/graph_3260124.jsonl similarity index 100% rename from graph_3260124.jsonl rename to edge/graph_3260124.jsonl diff --git a/graph_3261435.jsonl b/edge/graph_3261435.jsonl similarity index 100% rename from graph_3261435.jsonl rename to edge/graph_3261435.jsonl diff --git a/edge/graph_32627508.jsonl b/edge/graph_32627508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c29779d5ed992c494abc20106c4b882aba777c65 --- /dev/null +++ b/edge/graph_32627508.jsonl @@ -0,0 +1,2 @@ +{"10229079|9045232": ["However, one drawback is that the network architecture has to be extensively tuned (number of layers, number of nodes, learning rates, etc.) to get exceptional performance\u201d [10].", "This network has been tailored to the face detection task and has become a standard reference for neural network based face detection [10]."]} +{"8690848|9045232": []} diff --git a/edge/graph_32628868.jsonl b/edge/graph_32628868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a95584f768030c462faba0181bcb1251e32450b --- /dev/null +++ b/edge/graph_32628868.jsonl @@ -0,0 +1,8 @@ +{"5641711|14441987": ["Researchers in Mobile Ad Hoc NETworks (MANETs) have tackled mobility problems with a major focus on routing [9], [14], [15], [16].", "Work in MANETs has mainly focused on routing, introducing various protocols that find end-to-end paths between nodes [9], [14], [15], [16].", "Research in the areas of MANETs [9], [14], [15], [16], disconnected mobile networks [12], [20], [19], sparse sensor networks [17], and delay tolerant networks (DTNs) [4], [8], [6], have addressed issues related to the challenges stated in Section 1."]} +{"1174664|1236072": ["However, research in routing for wireless sensor networks has extensively investigated this issue [1]."]} +{"1174664|2835258": ["The coordinates can have physical meaning, such as GPS coordinates, as has been studied for mobile adhoc networks [31]."]} +{"1174664|14441987": ["There is a huge body of work on routing protocols [12, 13, 1, 15] and metrics [16, 4, 5] for this environment."]} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"2465022|2835258": []} +{"5750439|14441987": ["There has been a lot of research on routing in ad-hoc networks [3, 2, 9, 11, 12, 13]."]} diff --git a/edge/graph_32631031.jsonl b/edge/graph_32631031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d74c5f10842307252c30d65055e541efed752cd --- /dev/null +++ b/edge/graph_32631031.jsonl @@ -0,0 +1,12 @@ +{"15068920|8742997": ["An industrial case study by Haugset and Hannssen presents effects which arise in industry projects using FIT [14].", "While there are numerous publications on acceptance testing, e.g. [14], [19], and system testing, e.g. [7], [22], [17], few focus on how to perform system or acceptance tests through the GUI."]} +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} +{"862251|17446703": ["The results were coherent and showed that paired students\u2019 self esteem did not influence pair compatibility [70, 49, 25]."]} +{"862251|62667623": ["Second, we consider BSE research to be interdisciplinary and argue that BSE studies would benefit from becoming more interdisciplinary, which supports previous software engineering researchers conclusions [16]."]} +{"862251|17373041": []} +{"862251|205435103": ["There has been work on consolidating results on motivation in software engineering [6] but in other areas for which there is quite a lot of research, e.", "the pilot review excluded motivation, previously reviewed in [6])."]} +{"6033936|11139156": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"6033936|205435103": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"785838|8742997": ["of articles Experiment [6][7][8][9][10][11][12][13][14][15] 10 Industrial Case [16][17][18][19][20][21][22] 7 Experience [23][24][25][26][27][3][28][29] 8", "10 Industrial Case [16][17][18][19][20][21][22] 7 Experience [23][24][25][26][27][3][28][29] 8 Tables IV and V provide an overview of the benefits and limitations identified in the literature review."]} +{"15941034|627405": ["[1] highlight the difficulty with primary studies when they state that the quality of the abstracts is too low, and hence in many cases it is impossible to judge the relevance of a paper for inclusion or exclusion in a systematic literature review based on the title and abstract."]} +{"11769655|14920988": ["Anand, Pasareanu and Visser (2009) proposed to store and match abstract program states during symbolic execution to explore a subset of paths that are distinguishable under a given state abstraction function.", "\u2026in the last decade on symbolic execution and its applications can be found at http://sites.google. com/site/symexbib/; Cadar et al. (2011) and Pasareanu and Visser (2009) provide an overview of prior research on symbolic execution.\ncompute the specification, referred to as the summary in\u2026"]} +{"11769655|14022070": ["Test selection may happen by generating test suites in a suitable language ahead of test execution time, called offline test selection, or maybe intervened with test execution, called online test selection."]} diff --git a/edge/graph_3264875.jsonl b/edge/graph_3264875.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32651408.jsonl b/edge/graph_32651408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3266540.jsonl b/edge/graph_3266540.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3266931.jsonl b/edge/graph_3266931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32684277.jsonl b/edge/graph_32684277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32692184.jsonl b/edge/graph_32692184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6547ca0f51bc504599154141e0af7ad7ee70db6a --- /dev/null +++ b/edge/graph_32692184.jsonl @@ -0,0 +1,2 @@ +{"22026011|41768464": ["Considerable amount of research has been done for watermarking multimedia data [1,2,3], however there has been relatively little research done on watermarking database systems [4,5,6]."]} +{"36156970|18144244": ["A large number of techniques available for multimedia watermarking [3, 5, 7, 10] which proved to be effective but these cannot be applied directly to database."]} diff --git a/edge/graph_32692242.jsonl b/edge/graph_32692242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32698771.jsonl b/edge/graph_32698771.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30525ee53a53b7e587385d8aa6b80d1d4d9a0f3c --- /dev/null +++ b/edge/graph_32698771.jsonl @@ -0,0 +1 @@ +{"8611317|9770908": ["In tissue engineering applications, however, continuousmonitoring of glucose in culture media is used as an indicator of metabolic activities of cells [33, 36]."]} diff --git a/graph_3270620.jsonl b/edge/graph_3270620.jsonl similarity index 100% rename from graph_3270620.jsonl rename to edge/graph_3270620.jsonl diff --git a/graph_3271705.jsonl b/edge/graph_3271705.jsonl similarity index 100% rename from graph_3271705.jsonl rename to edge/graph_3271705.jsonl diff --git a/graph_3272873.jsonl b/edge/graph_3272873.jsonl similarity index 100% rename from graph_3272873.jsonl rename to edge/graph_3272873.jsonl diff --git a/graph_3273340.jsonl b/edge/graph_3273340.jsonl similarity index 100% rename from graph_3273340.jsonl rename to edge/graph_3273340.jsonl diff --git a/graph_3273576.jsonl b/edge/graph_3273576.jsonl similarity index 100% rename from graph_3273576.jsonl rename to edge/graph_3273576.jsonl diff --git a/edge/graph_32738224.jsonl b/edge/graph_32738224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c5f634eb4eef16babdc540dd45d24490c01bee4 --- /dev/null +++ b/edge/graph_32738224.jsonl @@ -0,0 +1,4 @@ +{"11558801|469744": ["Augmented reality [1] is particularly well suited as a user interface (UI) for location-aware applications."]} +{"15218665|206986719": []} +{"15218665|469744": ["For example, as proposed by Azuma (1997), AR can be defined as a system that fulfills three basic features: a combination of real and virtual worlds, realtime interaction, and accurate 3D registration of virtual and real objects.", "As being defined as a situation, AR signifies a variation of virtual reality, and plays a supplemental role rather than a replacement of reality (Azuma, 1997; Martin-Gutierrez et al., 2010).", "As being defined as a situation, AR signifies a variation of virtual reality, and plays a supplemental role rather than a replacement of reality, (Azuma, 1997; Martin-Gutierrez, et al., 2010).", "For example, as proposed by Azuma (1997), AR can be defined as a system that fulfills three basic features: a combination of real and virtual worlds, real time interaction, and accurate 3D registration of virtual and real objects.", "As being defined as a situation, AR signifies a variation of virtual reality, and plays a supplemental role rather than a replacement of reality, (Azuma, 1997; Martin-Gutierrez, et al., 2010). To describe to what extent reality is supplemented or augmented, previous research has been developed several taxonomies of AR. Milgram et al. (1994) proposed a so-called Reality-Virtuality continuum, ranging from a completely real environment to a completely virtual one."]} +{"14744633|6739283": ["As Liu, Han, and Li (2010) suggested, \" the adoption of mobile technology\u2026does not guarantee the adoption of mobile services \" (p. 212) and vice versa."]} diff --git a/edge/graph_32740889.jsonl b/edge/graph_32740889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32768800.jsonl b/edge/graph_32768800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e07c9a3f9dbb687a30d789808f6dd140daa3827 --- /dev/null +++ b/edge/graph_32768800.jsonl @@ -0,0 +1,2 @@ +{"63805971|18643817": []} +{"9622909|10559330": ["Index Terms\u2014Hybrid wireless networks, multihop cellular networks, routing algorithms, quality of service\n\u00c7"]} diff --git a/graph_3277310.jsonl b/edge/graph_3277310.jsonl similarity index 100% rename from graph_3277310.jsonl rename to edge/graph_3277310.jsonl diff --git a/edge/graph_32780086.jsonl b/edge/graph_32780086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..679d081b1c28647f267d4ddf564d439eaf03dced --- /dev/null +++ b/edge/graph_32780086.jsonl @@ -0,0 +1,3 @@ +{"19952946|1163508": ["Several research studies have addressed the issue of knowledge for the field of security [7][8].", "We analyzed about 20 security ontologies, based on previous literature surveys; the full list of these ontologies can be found in [7] and [8].", "The analysis of these ontologies reveals that they vary a lot in the way they cover security aspects as reported in previous work [7].", "In a previous research, several security ontologies were compared and classified [7].", "A previous survey [7] classifies the existing security ontologies into eight main families: theoretical basis, security taxonomies, general, specific, risk based, web oriented, requirements related and modeling."]} +{"18069847|1163508": []} +{"15144899|1163508": ["In [16] security ontologies have been proposed.", "They [16] proposed an analysis and a typology of existing security ontologies and their use for requirements definition."]} diff --git a/edge/graph_32781188.jsonl b/edge/graph_32781188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a05b2098dda8783423e72c9db340f15ab8c28ac8 --- /dev/null +++ b/edge/graph_32781188.jsonl @@ -0,0 +1 @@ +{"7981612|12860838": []} diff --git a/edge/graph_32786517.jsonl b/edge/graph_32786517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08bb218ac6f2667ff24968bd1f5d1ccb491b562a --- /dev/null +++ b/edge/graph_32786517.jsonl @@ -0,0 +1,2 @@ +{"37703810|10559330": ["12 2.3.3 Communication Model . . . . . . . . . . . . . . . . . . . . . . . . . 13\n2.3.4 Generic Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.4 Selected Distributed Interactive Applications . . . . .. . . . . . . . . . .", "For applications requiring guarantees about delivery parameters such as packet loss rate, bandwidth, and end-to-end delays [274],Quality of Service(QoS) infrastructures were proposed: IntServ (Integrated Services) [15] and DiffServ (Differentiated Services) [13] are two examples.", "196\nAbbreviations\nACK ACKnowledgement\nADSL Asymmetric Digital Subscriber Line\nADU Application Data Unit\nALF Application-Level Framing\nALM Application-Level Multicast\nALMI Application-Level Multicast Infrastructure protocol\nAOF Authoring On the Fly\nARQ Automatic Repeat reQuest\nBGMP Border Gateway Multicast Protocol\nBGP Border Gateway Protocol\nBTP Banana Tree Protocol\nCAN Content Addressable Network\nCBT Computer-Based Training\nCBT Core-Based Tree\nCName Canonical Name\nCSMT Constrained Steiner Minimum Tree\nDHCP Dynamic Host Configuration Protocol\nDiffServ Differentiated Services\ndlb digital lecture board\nDSL Digital Subscriber Line\nDVMRP Distance Vector Multicast Routing Protocol\nFEC Forward Error Correction\nGPS Global Positioning System\nGT-ITM Georgia Tech Internetwork Topology Models\nHMTP Host Multicast Tree Protocol\nHTML HyperText Markup Language\nHTTP HyperText Transfer Protocol\nxvi Abbreviations\nICMP Internet Control Message Protocol\nIGMP Internet Group Management Protocol\nILP Integrated Layer Processing\nIMoD Interactive Media on Demand\nIntServ Integrated Services\nIP Internet Protocol\nIPv4 Internet Protocol version 4\nIPv6 Internet Protocol version 6\nIRI Interactive Remote Instruction\nISDN Integrated Services Digital Network\nISP Internet Service Provider\nLAN Local Area Network\nMAC Medium Access Control\nMACS Modular Advanced Collaboration System\nMALLOC Multicast Address Allocation Architecture\nMBone Multicast Backbone\nmlb multimedia lecture board\nMOSPF Multicast Open Shortest Path First\nMPEG Moving Picture Experts Group\nMSDP Multicast Source Discovery Protocol\nMST Minimum Spanning Tree\nMTU Maximum Transmission Unit\nNACK Negative ACKnowledgement\nNAT Network Address Translation\nNSTP Notification Service Transport Protocol\nNTE Network Text Editor\nNTP Network Time Protocol\nOBJID OBJect IDentifier\nOpenPGP Open Pretty Good Privacy\nOSPF Open Shortest Path First\nPC Personal Computer\nPGP Pretty Good Privacy\nPID Participant IDentifier\nPIM Protocol Independent Multicast\nPIM-DM Protocol Independent Multicast Dense Mode\nxvii\nPIM-SM Protocol Independent Multicast Sparse Mode\nPST Priority-based minimum Spanning Tree\nPSTP Priority-based minimum Spanning Tree Protocol\nQoS Quality of Service\nRDP Relative Delay Penalty\nRIP Routing Information Protocol\nRMF Reliable Multicast Framework\nRMFP Reliable Multicast Framing Protocol\nRPC Remote Procedure Call\nRSVP Resource ReserVation Protocol\nRTCP RTP Control Protocol\nRTP Real-time Transport Protocol\nRTCP/I RTP/I Control Protocol\nRTP/I Real-Time Protocol for distributed Interactive applications\nSAP Session Announcement Protocol\nSDR Session DiRectory\nSMP Scalable Multicast Protocol\nSMTP Simple Mail Transfer Protocol\nSOAP Simple Object Access Protocol\nSPT Shortest Path Tree\nSRM Scalable Reliable Multicast\nSSM Source-Specific Multicast\nSV State Vector\nTAG Topology Aware Grouping\nTCP Transmission Control Protocol\nUDP User Datagram Protocol\nVRML Virtual Reality Modeling Language\nwb whiteboard\nWILD Wireless Interactive Learning Devices\nWYSIWIS What You See Is What I See\nWWW World Wide Web\nXML eXtensible Markup Language\nChapter 1\nIntroduction\nComputer technology in general and the Internet in particular have a great impact on how people retrieve information and communicate.", "147 7.4 Generic Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ."]} +{"18759227|7624176": []} diff --git a/edge/graph_32786995.jsonl b/edge/graph_32786995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8644b6aac5c1272c023356be7ba644a1b8b3279c --- /dev/null +++ b/edge/graph_32786995.jsonl @@ -0,0 +1 @@ +{"13147703|6746689": ["The Ridge thinning algorithm utilized for Minutiae points\u2019 extraction in the proposed approach has been employed by the authors of [36]."]} diff --git a/edge/graph_32787373.jsonl b/edge/graph_32787373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..977113797c9a531c2125272ee0ed7512eaebca01 --- /dev/null +++ b/edge/graph_32787373.jsonl @@ -0,0 +1,2 @@ +{"112923583|8212328": []} +{"55574832|17403085": []} diff --git a/graph_327876.jsonl b/edge/graph_327876.jsonl similarity index 100% rename from graph_327876.jsonl rename to edge/graph_327876.jsonl diff --git a/graph_3281207.jsonl b/edge/graph_3281207.jsonl similarity index 100% rename from graph_3281207.jsonl rename to edge/graph_3281207.jsonl diff --git a/edge/graph_328134.jsonl b/edge/graph_328134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32856349.jsonl b/edge/graph_32856349.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32874109.jsonl b/edge/graph_32874109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32894276.jsonl b/edge/graph_32894276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f816f759908e63bd7f0609e985d0082746f6b772 --- /dev/null +++ b/edge/graph_32894276.jsonl @@ -0,0 +1,3 @@ +{"14789363|2762290": []} +{"7538626|14889616": ["264 SVC standard [14], [27], which has been incorporated into the H."]} +{"15726249|7439310": []} diff --git a/edge/graph_32901660.jsonl b/edge/graph_32901660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84235054878f58a391deffc4eeb70f273c1a7175 --- /dev/null +++ b/edge/graph_32901660.jsonl @@ -0,0 +1,6 @@ +{"3331192|1708582": ["Reinforcement \nlearning, Q-learning in particular, is used to search for a good decision (a.k.a. action in RL term) \nin each MDP step, and the decision is sent to a Monte Carlo simulator (Cao et al. 2002) which evaluates \nthe outcome, in terms of the concerned costs, of this certain action in the cor\u00adresponding decision epoch.", "3 SOLUTION FRAMEWORK: MDP AND REINFORCEMENT LEARNING An MDP is characterized by four components: \na state space S that specifies all possible configurations of the sys\u00adtem; the action space A that lists \nall available actions for the learning agent to perform; the transition function that specifies the possibly \nstochastic outcomes of taking each action in any state; and a reward function that defines the possible \nreward of taking each of the actions.", "To model a problem as an MDP, the S and A should be carefully de\u00adfined \nso that the transition function only depends on the current state and action, and not on earlier states \nor actions.", "Firstly, we show that the production planning \nproblem in question can be modeled as a Markov Decision Process (MDP), which reduces the search space \nbecause of the implicit dependency of control parameters between any two successive decision steps.", "Section 3 takes a \nclose look at our solution framework by elaborating on the MDP model\u00ading, Q-learning algorithm and the \ntwo-phase learning scheme.", "RL is a simulation-based technique for solving com\u00adplex MDP (Kaelbling et al. 1996, Van Roy \net al. 1997).", "Please refer to Kaelbling et al. (1996) for a more detailed discussion \nof Q-learning.", ". for the initial build plan value, we have significantly re\u00ad . i (t )] + . hc \u00b7 E[ Inv pc m \u00b7 \nE[ Backlog m (t )] i duced the searchable action space. i.I m.M 1419 To further improve the learning \nefficiency, we trans\u00adform this constraint optimization problem into a two-phase MDP learning problem."]} +{"1522994|17464562": []} +{"8373829|1708582": ["PAPER\nRTP-Q: A Reinforcement Learning System with Time", "In simulations, parameters are set as follows: the learning rate \u03b1 = 1.0\u2020, the discounted rate \u03b2 = 0.95, independent action selecting probability = 10\u22122\u2020\u2020, the queue threshold parameter \u03b4 = 10\u22127 and 50 update plans in every steps for Dyna-Q architecture, the Queue-Dyna\n\u2020It is optimal learning rate\u2026"]} +{"6742598|1708582": []} +{"16950597|1708582": ["(1995), Sutton (1988), and other more recent RL approaches (Kaelbling et al., 1996)."]} +{"1708582|17464562": []} diff --git a/edge/graph_3290545.jsonl b/edge/graph_3290545.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_32930952.jsonl b/edge/graph_32930952.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de7fe49211ec73a0e1d87b70bdd33b1a28f98f90 --- /dev/null +++ b/edge/graph_32930952.jsonl @@ -0,0 +1,4 @@ +{"359842|16620699": ["Comprehensive recent surveys of literature on 3D face recognition can be found in [251] and [252]."]} +{"359842|6028805": ["A comprehensive review of recent advances in face recognition from infra-red imagery may be found in [268]."]} +{"359842|9045232": ["\u2026one or more of the following: low quality images (though image quality may be enhanced by exploiting super-resolution techniques [220-223]); cluttered backgrounds (which complicate face detection [224]); the presence of more than one face in the picture; and a large amount of data to process [71]."]} +{"359842|192934": ["A couple of classifiers described in [211] are then applied to identify the individual in the frame and, finally, a super-classifier based on a voting scheme [212] performs the final classification for the entire video sequence (Figs."]} diff --git a/graph_3293903.jsonl b/edge/graph_3293903.jsonl similarity index 100% rename from graph_3293903.jsonl rename to edge/graph_3293903.jsonl diff --git a/edge/graph_3294633.jsonl b/edge/graph_3294633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3297262.jsonl b/edge/graph_3297262.jsonl similarity index 100% rename from graph_3297262.jsonl rename to edge/graph_3297262.jsonl diff --git a/graph_3300488.jsonl b/edge/graph_3300488.jsonl similarity index 100% rename from graph_3300488.jsonl rename to edge/graph_3300488.jsonl diff --git a/edge/graph_3300588.jsonl b/edge/graph_3300588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33009117.jsonl b/edge/graph_33009117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3301109.jsonl b/edge/graph_3301109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3304059.jsonl b/edge/graph_3304059.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3304959.jsonl b/edge/graph_3304959.jsonl similarity index 100% rename from graph_3304959.jsonl rename to edge/graph_3304959.jsonl diff --git a/edge/graph_33063270.jsonl b/edge/graph_33063270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ed96663dbf8d5e227d32e9ad70ce00a6728709d --- /dev/null +++ b/edge/graph_33063270.jsonl @@ -0,0 +1,19 @@ +{"16975366|7516226": []} +{"16975366|6875365": []} +{"35110452|10390713": ["Interestingly, the role of similar spectral connectivity measures of the grid has been recently investigated also for grid synchronization and resilience problems (see the discussion in [34] and [35], respectively)."]} +{"5745314|5473785": ["3) With \u03c3, perform Fill-In Computation [13] to obtain a chordal graph G\u0303.", "3) With \u03c3, perform Fill-In Computation [13] to obtain a\nchordal graph G\u0303."]} +{"8154829|7020971": []} +{"924748|7516226": []} +{"206708737|7516226": ["The qualifier \u201cgrid-feeding\u201d means that the additional third inverter is controlled in such a way that it consumes or delivers a prespecified amount of active and reactive power [12], [33].", "In the experimental setup, the active and reactive powers Pk and Qk are calculated in real time based on the instantaneous power theory for three-phase three-wire systems, see [35], [33].", "Under the (implicit) assumption of ideal clocks, the inverterinterfaced unit operated in grid-forming mode and connected at the ith node i \u2208 N is typically modeled as an ideal AC voltage source, the frequency and amplitude of which can be specified by the designer1 [6], [14], [33], i.", "Thus, it can increase and decrease its power output within a certain range, see [33]."]} +{"814717|4796356": []} +{"18231244|8363289": ["A treatment of sufficient stability conditions goes beyond the scope of this work and can be found in the surveys [7, 18, 19].", "The main idea of RHC is to use the model of the plant to predict the future evolution of the system [19].", "Stability follows from the fact that J N (x) and J N (x) can be lower and upper bounded by functions \u03b1(\u2016x\u0303\u2016) and \u03b2(\u2016x\u0303\u2016), where \u03b1, \u03b2 : R \u2192 R are of class K [19].", "In this case, the terminal set has to be control invariant and the terminal cost is chosen as a control Lyapunov function [19]."]} +{"10440280|485843": ["grid, the adoption of standards across the communication infrastructure is essential [65].", "On the other hand, bandwidth requirements of DR programs are in the range of a few kilobits per second per consumer, and depend on the communication frequency between utilities and consumers [64], [65]."]} +{"10440280|595093": ["block or even corrupt information transmission, and provide authentication, authorization, auditability and trust components to the communication infrastructure [72]."]} +{"10440280|5747564": ["reader may refer to [6], [62], [63], [71]-[73].", "Other advantages of DSM include the blackouts elimination, the reduction of operational costs and decreased CO2 emissions [6].", "It should be noted that some researchers and practitioners assume that DSM and DR are interchangeable [4], [6]."]} +{"10440280|121289": ["of the grid, which are necessary for the implementation of a DR program [62]: Quality of Service\u2014(QoS): The provision of QoS guarantees for the communication technologies used in the smart grid is essential for the smooth implementation of a DR program.", "For a more comprehensive study on the communication requirements, challenges and solutions for DR, the interested reader may refer to [6], [62], [63], [71]\u2013[73]."]} +{"10440280|18037424": ["reliability, and safety of the system [2]."]} +{"3050133|15891636": ["extensions of the graphs are computed a priori for each case [42]."]} +{"13167689|12083425": ["INTRODUCTION Changes to the electric power grid are being driven by many factors such as increased demand, renewable energy mandates [1] and further deregulation of the industry [2], [3]."]} +{"124496776|16525711": []} +{"31090902|12083425": []} +{"17906026|15891636": ["However, for a balanced network with N nodes, this problem requires O(N2) optimization variables; consequently, this approach may become computationally expensive as the distribution-system size grows [8], even when parallel decomposition arguments for SDP programs are advocated [9]."]} diff --git a/edge/graph_33077286.jsonl b/edge/graph_33077286.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1994d4fe0c97afb75fc7464d60a19f50fac4d673 --- /dev/null +++ b/edge/graph_33077286.jsonl @@ -0,0 +1,13 @@ +{"9077942|1819274": ["In terms of middleware support, middleware systems for ad hoc networks, robotics, and wireless sensor networks are surveyed in [5] [6] [7], however, no survey could be found for middleware platforms designed specifically for IoT."]} +{"9294564|7971188": ["Distributed Hash Tables are distributed data structures where the information objects are placed deterministically, at the peer whose identi\ufb01er corresponds to the information object\u2019s unique key according to a given distance metric [32]."]} +{"4884206|9732448": ["A more recent effort [108] emphasizes the degree of distribution of the service registry and the use of semantic information in the service matchmaking process.", "First, the centralized approach does not scale well with respect to the increasing number of clients that pose service discovery queries [51, 108]."]} +{"4884206|8250043": ["Specifically, it is not clear how to automate the testing of service compositions [26]."]} +{"4884206|2445817": ["Nevertheless, even multicasting is a costly approach that does not scale well [135].", "Further works focus on service discovery protocols for mobile ad hoc environments, which are part of the Future Internet [95, 135].", "curity, privacy, and trust are not completely covered [135].", "As discussed in [135], purely distributed service discovery protocols are more suitable for environments consisting of a small number of devices that are characterized by high physical mobility.", "The aforementioned issues become even more important, in the cases where service discovery is supposed to be handled in mobile computing environments that consist solely of mobile nodes [95, 135]."]} +{"4884206|1300682": ["An interesting classification of privacy attacks along with an approach for dealing with such problems is discussed in [32], while in [47] the authors give a list of requirements that should be provided by service discovery protocols toward achieving security."]} +{"33354449|7971188": ["The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|14697846": ["The interested reader is referred to [160,392,393,202] for more detailed surveys.", "and (iii) partially centralised (or hierarchical) [160].", "However, this form of overlays is usually still classified in the unstructured family [160,202].", "The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|10559330": []} +{"18761676|3348390": ["Context awareness may provide a great support to process and store the Big Data, and to make their interpretation easier [330]."]} +{"18761676|16209841": ["To ensure security of data, services and entire IoT system, a series of properties, such as confidentiality, integrity, authentication, authorization, non-repudiation, availability, and privacy, must be guaranteed [228,229]."]} +{"18761676|270804": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"18761676|205286988": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} diff --git a/edge/graph_33110872.jsonl b/edge/graph_33110872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..365eeedf7810d634bde407c9e3880c0fbc0e7236 --- /dev/null +++ b/edge/graph_33110872.jsonl @@ -0,0 +1 @@ +{"35539922|35897447": []} diff --git a/edge/graph_33142914.jsonl b/edge/graph_33142914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3314561.jsonl b/edge/graph_3314561.jsonl similarity index 100% rename from graph_3314561.jsonl rename to edge/graph_3314561.jsonl diff --git a/graph_3314665.jsonl b/edge/graph_3314665.jsonl similarity index 100% rename from graph_3314665.jsonl rename to edge/graph_3314665.jsonl diff --git a/edge/graph_33208162.jsonl b/edge/graph_33208162.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5dc1ca9266e45e44edbb11c554ad2deb9104595 --- /dev/null +++ b/edge/graph_33208162.jsonl @@ -0,0 +1 @@ +{"60472989|14808716": []} diff --git a/edge/graph_33208891.jsonl b/edge/graph_33208891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33211520.jsonl b/edge/graph_33211520.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba44facd6e2308ee2457950bb3c30a2158764d14 --- /dev/null +++ b/edge/graph_33211520.jsonl @@ -0,0 +1,3 @@ +{"111163614|164835": []} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} diff --git a/edge/graph_33238478.jsonl b/edge/graph_33238478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33239168.jsonl b/edge/graph_33239168.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c73199eb3d92a3f28749d4fbc69e4f3d13ba768 --- /dev/null +++ b/edge/graph_33239168.jsonl @@ -0,0 +1,9 @@ +{"11312430|1188683": []} +{"10533856|3540699": []} +{"10533856|1188683": []} +{"2840399|1188683": ["functions: As devices are migrated to more advanced technologies, the number of transistors that can be devoted to the reconfigurable logic fabric increases.", "At the same time, the power consumption targets, the acceptable packaging and manufacturing costs, and the time-to-market requirements of these computation units are all decreasing rapidly, especially in the embedded hand-held devices market."]} +{"60929349|1188683": []} +{"60929349|10739218": []} +{"110300385|14750997": []} +{"110300385|1188683": []} +{"14859111|1188683": ["One of the major continuous concerns of general-purpose processors is performance.", "In our proposal, for a given instruction set architecture, a onetime instruction set extension of eight instructions is sufficient to implement the reconfigurable functionality of the processor."]} diff --git a/edge/graph_33247252.jsonl b/edge/graph_33247252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0df8fa72d26772745a52e42d48dcc579cec0cd2 --- /dev/null +++ b/edge/graph_33247252.jsonl @@ -0,0 +1,8 @@ +{"206454765|8909218": []} +{"485843|4631990": ["The fundamental task of the HEM system is energy efficiency [11], data measurement, and transmission."]} +{"485843|6959212": ["From a slightly different perspective, a \u201csmart grid\u201d can be considered as a data communication network that achieves, with the support of specific power management hardware devices, flexible, seamless inter-operation abilities among different advanced components of the system for efficient utilization of the energy [12]."]} +{"485843|121289": ["values for power system control signals should not exceed 15 ms [44].", "TABLE I REQUIREMENTS OF SG APPLICATIONS [44], [60]"]} +{"3500624|2906773": []} +{"3500624|18037424": []} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"11486728|8909218": ["5) Facilitating communication overhead: The proposed framework should be efficient in terms of communication overhead and processing latency."]} diff --git a/edge/graph_33250337.jsonl b/edge/graph_33250337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de480144deba56aec021c4c54083413311b640a5 --- /dev/null +++ b/edge/graph_33250337.jsonl @@ -0,0 +1,3 @@ +{"7590868|17157304": ["Spam detection has been extensively studied on various kinds of texts, such as email [6], webpage [18, 1, 28], SMS [16] and review [22].", "Content-based methods are extensively studied and popularly used for spam detection [6, 28, 16, 22].", "\u2022 LR: Logistic Regression, another widely used supervised clas-si\ufb01cation method [6, 25].", "The methods to be compared are listed as follows: \u2022 SVM: Support vector machine, a standard supervised clas-si\ufb01cation method, widely used in social spammer detection and spam message classi\ufb01cation [6, 10, 27]."]} +{"14544742|13093354": []} +{"34933902|1143625": ["[41] in a survey under the subject of communication channels during mass convergence and emergency events, gave an overview of the challenges and existing computational methods to process social media messages that may lead to an effective response in mass emergency scenarios.", "[41] lack evaluation or are evaluated empirically."]} diff --git a/edge/graph_33253527.jsonl b/edge/graph_33253527.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16ee5ff746575f28e98fc60597e0ca1ff36e10dc --- /dev/null +++ b/edge/graph_33253527.jsonl @@ -0,0 +1 @@ +{"6215504|1040974": []} diff --git a/graph_3326518.jsonl b/edge/graph_3326518.jsonl similarity index 100% rename from graph_3326518.jsonl rename to edge/graph_3326518.jsonl diff --git a/edge/graph_33280530.jsonl b/edge/graph_33280530.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc82be6db55742172e588dd936623c89cebb6c44 --- /dev/null +++ b/edge/graph_33280530.jsonl @@ -0,0 +1,4 @@ +{"106994532|7193476": []} +{"10989272|35897447": ["Such consecutive strategic initiatives would reinforce the barriers to imitation and thus develop barriers to erosion by its competitors\u2019 behavior (Piccoli and Ives 2005).", "Piccoli and Ives (2005) further propose that IT management capabilities are an important part of basis through which firms can launch and sustain competitive success through ITdependent initiatives.", "By focusing on two emerging concepts, organizational agility (Sambamurthy et al. 2003) and IT-enabled sustainable competitive advantage (Piccoli and Ives 2005), the study suggests a theoretical perspective on the relationships among IT capability, operational capability, organizational agility, and\u2026", "\u2026advantage also allows a firm\u2019s technological leadership, preemption of business assets, and/or buyer switching costs (Lieberman and Montgomery 1988), and thus leads to high response lags to its competitors and high barriers to erosion by its competitors\u2019 behavior (Piccoli and Ives 2005).", "Though several theoretical conceptualizations have been advanced on the above questions (cf., Piccoli and Ives 2005;\nSambamurthy et al. 2003; Wade and Hulland 2004), we conduct one of the first large scale empirical efforts to test the hypothesized nomological network models derived from the\u2026", "This capability strengthens the ability of firms to capture first-mover advantages and erect barriers to competitive imitation (Dehning and Stratopoulos 2003; Piccoli and Ives 2005).", "\u2026advantage represents a firm\u2019s success in continually seizing competitive opportunities for enhancing performance, defending itself again rivals\u2019 competitive moves, as well as erecting barriers to the erosion of its prevailing competitive advantage (Piccoli and Ives 2005; Reed and DeFillippi 1990)."]} +{"11014760|35897447": []} +{"17339242|35897447": ["another, allowing IT to be a facilitator rather than an inhibitor of agility [4,42,54]."]} diff --git a/edge/graph_33283652.jsonl b/edge/graph_33283652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3330313.jsonl b/edge/graph_3330313.jsonl similarity index 100% rename from graph_3330313.jsonl rename to edge/graph_3330313.jsonl diff --git a/graph_3330461.jsonl b/edge/graph_3330461.jsonl similarity index 100% rename from graph_3330461.jsonl rename to edge/graph_3330461.jsonl diff --git a/graph_3331246.jsonl b/edge/graph_3331246.jsonl similarity index 100% rename from graph_3331246.jsonl rename to edge/graph_3331246.jsonl diff --git a/edge/graph_33315503.jsonl b/edge/graph_33315503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9756eeaeb3308695281a9943ddbb8eba04eefb8d --- /dev/null +++ b/edge/graph_33315503.jsonl @@ -0,0 +1 @@ +{"55051926|13640443": ["\u2026and Cheng (2007), M ula et al. (2007), Anosike and Zhang (2007), Arruda and do Val (2008), Ben-Daya and Noman (2008), Grubbstrom (1999), Agatz et al. (2008), Ahmed et al. (2003)\nProbabilistic market demand and product sales price Lan and Lan (2005), M ula et al. (2007), Leung et al.\u2026"]} diff --git a/edge/graph_3334451.jsonl b/edge/graph_3334451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3335250.jsonl b/edge/graph_3335250.jsonl similarity index 100% rename from graph_3335250.jsonl rename to edge/graph_3335250.jsonl diff --git a/graph_3336775.jsonl b/edge/graph_3336775.jsonl similarity index 100% rename from graph_3336775.jsonl rename to edge/graph_3336775.jsonl diff --git a/edge/graph_33392070.jsonl b/edge/graph_33392070.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dec1674729f38b084b7e44420dcca8f10cee6399 --- /dev/null +++ b/edge/graph_33392070.jsonl @@ -0,0 +1,2 @@ +{"30060023|7147372": []} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/edge/graph_33394959.jsonl b/edge/graph_33394959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21e508e32a8c2a8be892d98fc69eb8a4c09dcb3c --- /dev/null +++ b/edge/graph_33394959.jsonl @@ -0,0 +1,5 @@ +{"16258461|15222577": ["So, Korayem [20] survey a different techniques and methods for building subjectivity and sentiment analysis systems for Arabic."]} +{"40099315|6834470": ["Unfortunately, these rules are not written and there are no available dictionaries for their vocabularies [6]."]} +{"12195840|15222577": ["This text can be characterized as objective, i.e. containing facts, or subjective i.e. containing opinions and/or sentiments about entities."]} +{"15980568|15222577": ["In particular, there has been little work on sentiment analysis in Arabic (Abbasi et al., 2008; Abdul-Mageed et al., 2011; Abdul-Mageed et al., 2012; Abdul-Mageed and Diab, 2012b; Korayem et al., 2012), and very few, considerably small-sized, datasets to work with (Rushdi-Saleh et al.", "Most of the current research has focused on building sentiment analysis applications for the English language (Pang and Lee, 2008; Liu, 2010; Korayem et al., 2012), with much less work on other languages."]} +{"5245646|16768404": []} diff --git a/graph_3339734.jsonl b/edge/graph_3339734.jsonl similarity index 100% rename from graph_3339734.jsonl rename to edge/graph_3339734.jsonl diff --git a/edge/graph_33413610.jsonl b/edge/graph_33413610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20761892cf6c0e65c13af73e75089853c77fa616 --- /dev/null +++ b/edge/graph_33413610.jsonl @@ -0,0 +1,39 @@ +{"18657007|17206258": ["In contrast to deterministic schemes, in probabilistic protocols, nodes retransmit the broadcast packets with a precalculated forwarding probability [60, 61]."]} +{"18657007|1230643": ["WSNs are centralized networks where nodes are normally grouped in clusters [53].", "Other static ad hoc networks such as WSNs [53] or Wireless Mesh Networks (WMNs) [54] are also evolutions of classical MANETs applicable to disaster scenarios."]} +{"36029380|1236072": ["Moreover, the protocols must be scalable, and performance-efficient, with an ability to keep the network alive for a longer period of time [3]."]} +{"46279309|14088590": []} +{"46279309|1230643": []} +{"46279309|14441987": []} +{"12245757|763939": []} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} +{"8420169|763939": ["A survey is presented in chapter by Awwad, Yi, and Stojmenovic in [ ]. fsew other chapters in the same book survey ongoing research activities on experimental testbeds and simulation"]} +{"8420169|1940388": ["Indeed, while MANET represents an engineering approach to hide node mobility by constructing \u201cstable\u201d end-to-end paths as in opportunity to exploit ."]} +{"8420169|6275330": ["The need for real development produced orthogonal approach to MANET validation While initially simulation was largely used [27 it was quite soon replaced by large testbeds deployed at several universities, 3 which are open for access to the research community."]} +{"8420169|1230643": []} +{"205703388|14088590": []} +{"205703388|14441987": []} +{"7091368|763939": ["mobility models [33,37] and for tactical mobile networks [4]."]} +{"34458761|17787193": ["ral problems remain open, such as how to integrate in a coherent arhitecture the different data offloading opportunities, or to what exent the operator should impose a control on the content disseminaion process (see [125] for a thorough discussion).", "Within this framework, pportunistic device-to-device communications operate in synergy ith the cellular infrastructure and are seen as capacity enhancer in a erminal-to-terminal delayed offloading scenario [125]."]} +{"34458761|29060869": ["Energy efficiency is also a key requirement when ow-power devices are used [22]."]} +{"34458761|206901977": ["Initially researchers considered energy and resource constraints o be the key challenge in designing WSNs in comparison with genral ad-hoc networks [181,182]."]} +{"34458761|12029139": ["When multi-hop comunication is considered, routing protocols also need to be specifcally designed to ensure a proper energy distribution to maintain nd-to-end communication [41]."]} +{"34458761|3330461": ["nd needs considering novel approaches such as Heterogeneous Netorks (HetNets for short) [16] and Device-to-Device (D2D) commuication [17].", "r m i e a further means to improve spectral efficiency [17]."]} +{"34458761|7644489": ["wireless technologies need to be faced [31]."]} +{"34458761|7988320": ["In articular, deterministic performance guaranteed by TDMA may not e suitable since periodic synchronization requires extra energy conumption, and viable alternatives need be investigated [40]."]} +{"34458761|41998167": []} +{"34458761|763939": ["[153]."]} +{"34458761|1940388": []} +{"34458761|141053": ["[195] S.", "sive listening and support sleep modes [195\u2013197]."]} +{"34458761|17205659": []} +{"34458761|6275330": []} +{"34458761|205286988": []} +{"14718350|17206258": []} +{"14718350|10562205": []} +{"18816960|1453418": ["Some important characteristics of Oppnets [6,7] are: (1) a complete end-to-end path between sender and receiver rarely exists due to network partition which may divide the network into several regions; (2) frequent disconnections and re-connections may occur due to the node failure, small radio range, and node power-saving efforts; (3) the contact opportunities and the contact durations between the nodes are very less due to their high mobility; (4) due to the inconsistent and unstable behaviour of the wireless links, the link performance is highly variable; and (5) nodes have large buffers and use store-carry-and-forward paradigm for message passing in the network.", "The routing and forwarding of messages in Oppnets is based on the contact opportunity between the nodes that occurs due to their mobility, their willingness to cooperate in forwarding, and store-carry-and-forward paradigm [7]."]} +{"14471683|763939": ["Vehicular Ad Hoc Networks (VANETs) [1] are dynamic networks composed of a set of communicating vehicles (nodes) equipped with devices which are able to spontaneously interconnect each other without any pre-existing infrastructure."]} +{"14276212|7971188": ["Other types of information dissemination methods such as geocasting [3], [4], [5], multicasting [6], [7], [8], peer-to-peer content distributing [9], [10], [11], and streaming [12], [13], [14] will not be discussed in this paper."]} +{"14276212|11894335": ["Other types of information dissemination methods such as geocasting [3], [4], [5], multicasting [6], [7], [8], peer-to-peer content distributing [9], [10], [11], and streaming [12], [13], [14] will not be discussed in this paper."]} +{"17206258|205286988": ["In routing protocols for ad hoc networks, broadcasting is part of the discovery phase, which is responsible for nding a communication path to route the application data from a source node to one or more destination nodes (unicast [18] or multicast routing protocols[6, 5, 26])."]} +{"17206258|1230643": ["Broadcasting is used in ad hoc networks such as Wireless Sensor Networks (WSNs) [7,121,106], Mobile Ad Hoc Networks (MANETs) [48], and Vehicular Ad Hoc Networks (VANETs) [107,116]."]} +{"17206258|1762301": ["In routing protocols for ad hoc networks, broadcasting is part of the discovery phase, which is responsible for nding a communication path to route the application data from a source node to one or more destination nodes (unicast [18] or multicast routing protocols[6, 5, 26])."]} +{"6297942|4474193": ["A survey on evolutionary algorithms for problems with changing environments is given by [38]."]} diff --git a/graph_3341986.jsonl b/edge/graph_3341986.jsonl similarity index 100% rename from graph_3341986.jsonl rename to edge/graph_3341986.jsonl diff --git a/graph_3342225.jsonl b/edge/graph_3342225.jsonl similarity index 100% rename from graph_3342225.jsonl rename to edge/graph_3342225.jsonl diff --git a/edge/graph_33436043.jsonl b/edge/graph_33436043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33436235.jsonl b/edge/graph_33436235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3344701.jsonl b/edge/graph_3344701.jsonl similarity index 100% rename from graph_3344701.jsonl rename to edge/graph_3344701.jsonl diff --git a/graph_3345066.jsonl b/edge/graph_3345066.jsonl similarity index 100% rename from graph_3345066.jsonl rename to edge/graph_3345066.jsonl diff --git a/edge/graph_33452313.jsonl b/edge/graph_33452313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c315b562617b21ef83c0fb06e01a652588d00e62 --- /dev/null +++ b/edge/graph_33452313.jsonl @@ -0,0 +1,3 @@ +{"36296676|13985031": ["We also refer to the recent review on Kriging in [16]."]} +{"62562073|26257441": ["Batill (1996), Chen and Varadarajan (1997), and Simpson, Peplinski, Koch and Allen (2001) have discussed the use of ANNs in computer experiments.", "In general, since models in computer experiments tend to be highly complex, and are dif\ufb01cult to understand in advance,space-\ufb01llingdesigns,whichdonotrequireknowledge abouttheunderlyingmodel,maybepreferred(Simpson, Peplinski,KochandAllen,2001)."]} +{"60493929|13985031": ["A general review of Kriging is given in Kleijnen (2009)."]} diff --git a/graph_3345556.jsonl b/edge/graph_3345556.jsonl similarity index 100% rename from graph_3345556.jsonl rename to edge/graph_3345556.jsonl diff --git a/edge/graph_33458904.jsonl b/edge/graph_33458904.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed62322a57e0c83bf7343c8d1d07cafb4415e4a4 --- /dev/null +++ b/edge/graph_33458904.jsonl @@ -0,0 +1,7 @@ +{"9645359|386036": [", for joining different relations or for duplicate detection [9].", "Record linkage is also known under many other names, such as object identification, data cleaning, entity resolution, coreference resolution or object consolidation [25, 14, 9].", "Record linkage(13) is concerned with finding pairs of data records (from one or multiple datasets) that refer to (describe) the same real-world entity [25, 9].", "A comprehensive survey of record linkage research can be found in [9]."]} +{"14914272|3330313": []} +{"28002538|2685137": ["We use hierarchical BLs, similar to dimension hierarchies common to most OLAP data models [28]."]} +{"1757354|3330313": []} +{"18349527|386036": ["There are a lot of approaches (see [3] or [10] for a survey) that aim to reconcile data."]} +{"11715253|10500613": []} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} diff --git a/graph_3347463.jsonl b/edge/graph_3347463.jsonl similarity index 100% rename from graph_3347463.jsonl rename to edge/graph_3347463.jsonl diff --git a/graph_3348390.jsonl b/edge/graph_3348390.jsonl similarity index 100% rename from graph_3348390.jsonl rename to edge/graph_3348390.jsonl diff --git a/edge/graph_33484963.jsonl b/edge/graph_33484963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68a6e019a1dc68e431491091320c2acda28af3da --- /dev/null +++ b/edge/graph_33484963.jsonl @@ -0,0 +1,11 @@ +{"4007031|431089": []} +{"11473206|38476": ["Sequential labeling tasks are also known as sequential supervised learning problems [43] and can be formulated as follows:"]} +{"885218|1142636": []} +{"5871627|304226": []} +{"5871627|6413523": ["For more information about UMLS, see [17, 148]."]} +{"5871627|191396": ["For an experimental comparison of different clustering algorithms see [132, 151], and for a survey of clustering algorithms see [145]."]} +{"5871627|3102110": ["structured such as RDBMS data [28, 43], semi-structured such as XML and JSON [39, 111, 112], and unstructured text resources such as word documents, videos,", "An overview for the data mining from the database perspective can be found in [28]."]} +{"304226|5871627": ["Other examples include news websites which produce condensed descriptions of news topics usually as headlines to facilitate browsing or knowledge extractive approaches [8, 61, 72]."]} +{"304226|10157083": ["Since then, many works have been published to address the problem of automatic text summarization (see [24, 26] for more information about more advanced techniques until 2000s)."]} +{"16522754|6413523": ["of scientific hypotheses from large experimental data sets and from biomedical literature [4, 5]."]} +{"8410430|431089": []} diff --git a/edge/graph_33492114.jsonl b/edge/graph_33492114.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78a90431d80687ee9f1876a742bc6e72bbfe2215 --- /dev/null +++ b/edge/graph_33492114.jsonl @@ -0,0 +1,2 @@ +{"59098228|289357": []} +{"5929770|10658846": []} diff --git a/graph_3350723.jsonl b/edge/graph_3350723.jsonl similarity index 100% rename from graph_3350723.jsonl rename to edge/graph_3350723.jsonl diff --git a/edge/graph_3350876.jsonl b/edge/graph_3350876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33524607.jsonl b/edge/graph_33524607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3354138.jsonl b/edge/graph_3354138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3354212.jsonl b/edge/graph_3354212.jsonl similarity index 100% rename from graph_3354212.jsonl rename to edge/graph_3354212.jsonl diff --git a/graph_335662.jsonl b/edge/graph_335662.jsonl similarity index 100% rename from graph_335662.jsonl rename to edge/graph_335662.jsonl diff --git a/edge/graph_33577184.jsonl b/edge/graph_33577184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db7c59a28dbe0de8f349a1d7f81e88b06da88bd8 --- /dev/null +++ b/edge/graph_33577184.jsonl @@ -0,0 +1 @@ +{"8753922|2457428": []} diff --git a/edge/graph_33583074.jsonl b/edge/graph_33583074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3099ea6a401ecdf19adb37355ce2bdddac1c6694 --- /dev/null +++ b/edge/graph_33583074.jsonl @@ -0,0 +1 @@ +{"17303703|508912": []} diff --git a/edge/graph_33600368.jsonl b/edge/graph_33600368.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1895787d80f7adb410ffc3140ec3569721ea4e6d --- /dev/null +++ b/edge/graph_33600368.jsonl @@ -0,0 +1,3 @@ +{"14530058|14799853": ["Nodes in such networks communicate with each other via wireless communication devices [1]."]} +{"2835258|14441987": ["A survey and comparison of topology-based approaches can be found in [ 10 , 11]."]} +{"18994879|1230643": []} diff --git a/edge/graph_33625721.jsonl b/edge/graph_33625721.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33632733.jsonl b/edge/graph_33632733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33644565.jsonl b/edge/graph_33644565.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33650943.jsonl b/edge/graph_33650943.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..556c1e870ffde2c41fa75daa612ba580a70784b2 --- /dev/null +++ b/edge/graph_33650943.jsonl @@ -0,0 +1 @@ +{"17493831|14290834": ["Attribute-Based Encryption (ABE) [2], [3], [4] is a promising mechanism which allows implementing ef\ufb01ciently \ufb01ne-grained access control in IoT applications."]} diff --git a/edge/graph_33663768.jsonl b/edge/graph_33663768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3366529.jsonl b/edge/graph_3366529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3371831.jsonl b/edge/graph_3371831.jsonl similarity index 100% rename from graph_3371831.jsonl rename to edge/graph_3371831.jsonl diff --git a/graph_3373610.jsonl b/edge/graph_3373610.jsonl similarity index 100% rename from graph_3373610.jsonl rename to edge/graph_3373610.jsonl diff --git a/edge/graph_3374040.jsonl b/edge/graph_3374040.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33750550.jsonl b/edge/graph_33750550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e4d8020ff1725e47d7347158e970a63095a56d5 --- /dev/null +++ b/edge/graph_33750550.jsonl @@ -0,0 +1,23 @@ +{"2681888|10500613": ["Hybrid flows come as a variation of multi-flows."]} +{"8035903|10500613": ["These mappings have also been referred to as schema matching in the literature [23]."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"5519522|2795037": ["In general, any operation that eliminates duplicates cannot be composed with an operation that uses the cleansed list for further processing [15]."]} +{"15450397|1574374": ["Keywords: Data warehousing; Schema versioning; Cross-version querying; Schema augmentation"]} +{"10303734|5184436": [", meeting MD integrity constraints [9])."]} +{"293799|10500613": ["In specification, the major topics of interest have been schema mapping and schema matching [18, 19]; although work on dataflow systems [20] and workflow [21] is also relevant, these technologies have not typically been applied to information integration by the research community (though they are used in enterprises)."]} +{"862332|719646": []} +{"18189491|10500613": []} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} +{"8390013|1574374": ["In [21] a survey on schema versioning and evolution is presented, whereas a categorization of the overall issues regarding evolution and change in data management is presented in [20]."]} +{"14107183|5184436": [", it forms a data cube and thus, if each instance of factual data is identified by a point in each of the analysis dimensions [32]); and (ii) whether data summarization performed is correct by examining whether the following conditions hold [33]: (a) disjointness (the sets of objects to be aggregated must be disjoint); (b) completeness (the union of subsets must constitute the entire set); and (c) compatibility of the dimension, the type of measure being aggregated and the aggregation function."]} +{"7291977|5184436": []} +{"7291977|2276717": ["SW technologies can be used for all three kinds, but their power is especially necessary to manage the more complex needs of semi- and unstructured data."]} +{"8262693|10500613": []} +{"14058153|2795037": ["As with traditional query optimizers in relational systems [5], HFMS needs: (a) a search space, (b) a cost estimation technique for each plan in the space, and (c) an enumeration algorithm that searches through the space."]} +{"665720|10500613": []} +{"5184436|1413177": []} +{"136866|8125630": ["Data warehouse architecture: Figure 1 shows a typical DW architecture [4]."]} +{"8728283|2795037": []} +{"8728283|8125630": []} +{"14802238|5184436": ["The validation process introduced in this stage guarantees the multidimensional normal forms presented in [7, 8] for validating the output MD schema, and the summarizability constraints discussed in [11]."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} diff --git a/edge/graph_33751177.jsonl b/edge/graph_33751177.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9e63c2fa044dff2d6fb3013ed97958c73a57895 --- /dev/null +++ b/edge/graph_33751177.jsonl @@ -0,0 +1 @@ +{"25455286|1219725": ["\u2026convenience, cost effectiveness, and the desire for technological literacy all support the decision to incorporate digital media into medical teaching through podcast lectures, helpful hints in recruitment, and digital classroom databases (Friedl et al. 2006; Potomkova, Mihal, and Cihalik 2006)."]} diff --git a/edge/graph_33760234.jsonl b/edge/graph_33760234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1723a994a3bd95d55705ed4461f12ce55da5d7a6 --- /dev/null +++ b/edge/graph_33760234.jsonl @@ -0,0 +1,5 @@ +{"9140319|192934": ["Can the classification be improved using feature subset selection methods? Selecting the optimal features is a problem of exponential time complexity and various suboptimal heuristics have been proposed [12], [13].", "tain number (thecurse of dimensionality[4], [12], [29])."]} +{"17059745|30443041": ["In such a case, the performance of classical adaptive filtering schemes, such as recursive least squares (RLS) or simple weighted average filters, is seriously degraded [44]."]} +{"162180|9045232": ["Over the years various methods for the detection of faces in images and image sequences are reported, see [95] for a comprehensive and critical survey of current face detection methods.", "Face detection techniques aim to identify all image regions which contain a face, regardless of its three-dimensional position, orientation, and lighting conditions used, and if present return their image location and extents [95]."]} +{"162180|192934": ["According to [37] the four best approaches for pattern recognition are:", "\u2022 Bayes classifier: assigns a pattern to the class which has the maximum estimated posterior probability [37]; \u2022 Decision tree: assigns a pattern to a class based on a hierarchical division of feature space [37]; \u2022 k-Nearest neighbor: assigns a pattern to the majority class among the k patterns with smallest distance in feature space [37]; \u2022 Hidden Markov model (HMM): assigns a pattern to a class based on a sequential model of state and transition probabilities [46, 69];"]} +{"207561477|8197990": ["There has been a significant amount of computer science research on content-based image retrieval in which a particular query image (possibly a sketch or primitive graphic) is used to find matching relevant images [5]."]} diff --git a/graph_3376811.jsonl b/edge/graph_3376811.jsonl similarity index 100% rename from graph_3376811.jsonl rename to edge/graph_3376811.jsonl diff --git a/edge/graph_33775901.jsonl b/edge/graph_33775901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f31607f50ebac04e4bb3c534f069bfd89d92e83 --- /dev/null +++ b/edge/graph_33775901.jsonl @@ -0,0 +1,11 @@ +{"43299811|5281246": ["In the second phase, this metamodel is used to predict the best algorithm for a given dataset [21]."]} +{"7259012|1805048": ["Following the classification of traditional CF-based RSs [2,3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches.", "CF approaches can be further grouped into model-based CF and neighborhood-based CF [2,3].", "Following the classification of traditional CF-based RSs [2] [3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches."]} +{"206710454|1805048": ["Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.", "Su and Khoshgoftaar [212] presents a survey of CF techniques.", "The rest of this section deal is dealt with the concepts and research in the two lines considered previously: Filtering of social information and content filtering.", "The pure CBF has several shortcomings [16,176,212]:", "Breese et al. [43] evaluated the predictive accuracy of different algorithms for CF; later, the classical paper [94] describes the base for evaluating the Collaborative Filtering RS.", "Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.g. videos, songs, films, etc. in a CF based website) in such a way that when enough information is stored on the system, we can make recommendations to each user based on information provided by those users we consider to have the most in common with them.", "Collaborative Filtering (CF) methods play an important role in the recommendation, although they are often used along with other filterning techniques like content-based, knowledge-based or social ones."]} +{"34507236|1805048": []} +{"62012522|1805048": ["(3) According to the nearest neighbor\u2019s rating information that they give to the item to predict the target user rating on other items, and finally generate recommendation result [12]."]} +{"1914653|8125630": ["3.2 Aggregation \nCapabilities One of the key characteristics of multidimensional databases is the ability to store measurements \n(such as sales numbers) in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "Moreover, this method \ncombines some of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "When con\u00adsidering multiple dimensions, we will \nfollow the multidimensional data model used for data warehousing and OLAP applications in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "\u2026his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "However, there are certain idiosyncrasies \npertaining to our model that make it different from the classical OLAP models used in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "This multidimensional approach is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions.", "Then, as shown in Figure 2, we \ncan compute an overall rating of how John Doe likes action movies as a genre by aggregating his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "\u2026is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions."]} +{"4876217|14148655": ["\u2026users tend to visit very popular items and select similar items, while old users usuallyhavemorespecificinterests[53,54],andusersbehavemuchdifferentlybetweenlow-risk(e.g.,collectingbookmarks, downloading music, etc.) and high-risk (e.g., buying a computer, renting a house, etc.) activities [55,56]."]} +{"4876217|4859605": ["The tripartite network representation has found its application in collaborative tagging systems (also called folksonomies in the literature) [79, 80, 81, 82], where users assign tags to online resources, such as photographs in flickr.", "In [82], the present tag-aware algorithms are"]} +{"4876217|207372751": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices.", "Some challenges can also be partially solved by hybridization, for example, the link prediction algorithm can be used to generate artifical links that could eventually improve the recommendation in very sparse data [123, 319]."]} +{"4876217|18540015": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices."]} +{"4876217|1805048": ["For additional information see the recent review articles [123,124], and [125] is a nice survey that contains a number of similarity indices.", "[15,123]), many hybrid algorithms are proposed to avoid certain weaknesses in each approach and thereby improve the recommendation performance."]} diff --git a/edge/graph_33829339.jsonl b/edge/graph_33829339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61e11414c9dad84fed33d16ecb9e3a85e6c9ef0f --- /dev/null +++ b/edge/graph_33829339.jsonl @@ -0,0 +1,8 @@ +{"1196394|32584958": ["This difficulty pushed researchers to develop heuristic algorithms or approximation procedures (see [1,2,14,15]).", "For instance, the recent review papers are addressed to a determined class of scheduling problems (see, for instance, [1] on scheduling problems arising in production industries, [2] on scheduling problemswith setup considerations, [3] on dynamic scheduling inmanufacturing systems, [4] onmulticriteria scheduling, [5] on scheduling with learning effects, and so on)."]} +{"1196394|1142274": []} +{"1196394|12846121": ["For instance, the recent review papers are addressed to a determined class of scheduling problems (see, for instance, [1] on scheduling problems arising in production industries, [2] on scheduling problemswith setup considerations, [3] on dynamic scheduling inmanufacturing systems, [4] onmulticriteria scheduling, [5] on scheduling with learning effects, and so on)."]} +{"14288360|16467945": []} +{"15986120|14295689": ["Brucker et al. (1999) and Hartmann and Briskorn (2009) provide extensive reviews of the RCPSP.\n\u201cMulti-mode resource-constrained project scheduling problem\u201d (MM-RCPSP) is a generalization of the RCPSP in which human-resources are considered (see for example De Reyck and Herroelen (1999))."]} +{"16352699|33829339": []} +{"38622873|33829339": []} +{"154410981|33829339": []} diff --git a/edge/graph_33843577.jsonl b/edge/graph_33843577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0631027903d739cf4b67ad616e38e58f5d79cee --- /dev/null +++ b/edge/graph_33843577.jsonl @@ -0,0 +1,4 @@ +{"8619177|7876633": ["Our Granules [26, 27] runtime is targeted at data driven computations."]} +{"25612856|1230643": ["The need to develop and deploy an integrated framework for data management is no more keenly felt than by scientists who generate massive quantities of data via wireless sensor networks [1,22,27,59,60]."]} +{"12748221|2839618": []} +{"942711|7876633": ["Data hosting services often package various types of data into a dataset."]} diff --git a/edge/graph_33867211.jsonl b/edge/graph_33867211.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bbf8a5f377ce67f2eb1e0366e7b3ec1e7652a90 --- /dev/null +++ b/edge/graph_33867211.jsonl @@ -0,0 +1,5 @@ +{"18781573|1137487": []} +{"42708625|1230643": ["Above all, the research and development encompassing sensor networks has been channeled in a manner where they can be applied to a huge system, similar to a power grid [2]-[9]."]} +{"27182979|270804": []} +{"15615346|1230643": ["Furthermore, the concept of micro-sensing and wireless connection of these nodes promises many new application areas [11]."]} +{"18166727|12060835": ["Every energy source has distinctive characteristics in terms of controllability, predictability and magnitude [3]: all these three factors are relevant for the choice of the most suited source for a certain application [4].", "The devices used more often in energy harvesting applications are supercapacitors and rechargeable batteries [3]."]} diff --git a/edge/graph_3387861.jsonl b/edge/graph_3387861.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3390598.jsonl b/edge/graph_3390598.jsonl similarity index 100% rename from graph_3390598.jsonl rename to edge/graph_3390598.jsonl diff --git a/graph_3392135.jsonl b/edge/graph_3392135.jsonl similarity index 100% rename from graph_3392135.jsonl rename to edge/graph_3392135.jsonl diff --git a/edge/graph_33927280.jsonl b/edge/graph_33927280.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_33984499.jsonl b/edge/graph_33984499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1ffd39393fec654849d60705953099f6748a570 --- /dev/null +++ b/edge/graph_33984499.jsonl @@ -0,0 +1,26 @@ +{"2525789|14697846": ["[3] features a detailed survey of these and further approaches.", "[3]) are a prominent example of P2P systems."]} +{"10306949|14597368": ["Prime examples are found in ring networks [4], [5] and Cayley graphs [1], [12], which span a wide variety of networks and have been studied extensively by mathematicians, computer scientists, and computer design engineers."]} +{"2486771|14697846": ["Many approaches to query routing in unstructured peerto-peer networks [1] exist."]} +{"504163|1230643": []} +{"14856906|1762301": ["Finally, flooding has also been used in ad hoc routing (e.g., [ 1 ], [9])."]} +{"17795935|7971188": ["Approaches for peer-to-peer overlay networks are surveyed in [16], which discusses both structured and unstructured models."]} +{"20939998|7971188": ["In other words, they have a close coupling between the P2P topology and location of data, which commonly make use of Distributed Hash Tables (DHTs [11])."]} +{"8769118|7055228": []} +{"6325258|7971188": ["[4] covers P2P networks, but the traditional service discovery systems are out of scope", "TABLE III OVERVIEW OF DHT P2P OVERLAYS, PART 2 (ADAPTED FROM [4]).", "Overlays of this type commonly make use of Distributed Hash Tables [4].", "The systems are vulnerable, for example, to Trojan and manin-middle attacks [4].", "TABLE II OVERVIEW OF DHT P2P OVERLAYS, PART 1 (ADAPTED FROM [4])."]} +{"6325258|10500613": ["More detail information can be found for example in [12]."]} +{"6325258|8496692": ["3) Multicast: Multicast protocols [33], [34] employ oneto-many communication that allows a sender to propagate a packet to the group of nodes with a single send operation."]} +{"14797120|14697846": ["P2P models are classified into unstructured and structured based on the way nodes are linked to each other and data about resources is placed on the nodes [5]."]} +{"15621943|7971188": []} +{"10748355|7971188": []} +{"10748355|14697846": ["In [10], a survey and taxonomy of content sharing P2P systems are presented, while a comprehensive tutorial can be found in [86].", "Decentralized (control) and distributed (workload) search techniques are required for a network composed of transient populations of nodes\nManuscript received 21 October 2009; revised 4 January 2010."]} +{"10748355|10500613": ["R. Boutaba is with the David R. Cheriton School of Computer Science, University of Waterloo, Ontario, Canada, (e-mail: rboutaba@uwaterloo.ca)."]} +{"10748355|913718": ["R. Boutaba is with the David R. Cheriton School of Computer Science, University of Waterloo, Ontario, Canada, (e-mail: rboutaba@uwaterloo.ca)."]} +{"10414484|14697846": ["Definition 3: The nodes with similar resources in a domain are formed into Group.", "For the simplicity, in this paper, the distance can be denoted by the\nLevel1-SP\nLevel2-SP\nNormal Peer Group Domain\nRound-Trip Time (RTT) value of two peers.", "Algorithm1 Load-balancing (pr: the level1_SP) 1 if pr.Load( ) > thresholdDomainMaxLoad { 2 Group \u2190 SortGroupbyLoadDesc(pr.Group) 3 tDomainA \u2190 { Group [0] } 4 tDomainB \u2190 { Group [1] } 5 i=1 6 while i < pr.numGroup { 7 i \u2190 i+1 8 if tDomainA.", "Load( ) 9 tDomainB\u2190tDomainB\u222a{Group [i]} 10 else 11 tDomainA\u2190tDomainA\u222a{Group [i]} } 12 ConstructDomain ( tDomainA, pr) 13 ConstructDomain ( tDomainB, pr.backup) 14 } 15 } 16 17 if pr.Load( ) thresholdDomainMinLoad { 18 p \u2190GetNearestNeighbor(pr) 19 pr applies p to merge 20 p.AddGroup(pr\u222apr.Group) 21 p.UpdateNeighborInformation(pr) 22 pr informs its children to update their parent information to p 23 } 24 return", "Domain is defined as a tuple D = (r, Groups), referred as Domainr, where r\u2208 Level1-SPs, Groups={Group1, Group2 ,\u2026,Groupk} is a set of the groups in Domainr.", "Group) 3 tDomainA \u2190 { Group [0] } 4 tDomainB \u2190 { Group [1] } 5 i=1 6 while i < pr.", "Definition 7: The Load of Groupp, refered as Loadp, is the sum of the access frequency of all the peers in Groupp in the predifined unit time, calculated as\n\u2211 \u2208 = pGroupi ip AFLoad (3)\nDefinition 8: The Load of Domainp, refered as Loadp, is the sum of the load of groups in Domainp in the predifined unit time, calculated as\n\u2211 \u2208 \u2208 = SPsLeveli Domaini ip p LoadLoad _2\n(4)\nA super peer can decide to divide its domain into two or more smaller ones if the load of its domain or group is too much.", "P2P networks can be categorized as structured and unstructured in terms of their structure [1] .", "Group is defined as a tuple Group=(gr, { p0, p1, \u2026 , pm }), referred as Groupgr, where gr\u2208Level2-SPs, pi\u2208NPs.\nDefinition 4: SLUP model is a connected graph G= (Domains,E) where Domains={D1, D2 ,\u2026, Dk} is a set of Domain, E={e0, e1, \u2026 , en } is a set of undirected\nedges.", "To level2_SP q, suppose ip AFAF max= , qGroupi \u2208 , then peer p can be selected as the backup of peer q."]} +{"26964474|7971188": ["However, it is poorly suited for locating rare items, and it is not scalable as the load on each node grows linearly with the total number of queries and the system size [14]."]} +{"16258898|7971188": ["However, the high dynamicity of pervasive environments incurs considerable overhead for maintaining the desired structures [2].", "In line with the adoption of bio-inspired approaches, Self-Chord exploits ACO principles to optimize the positioning of data on traditional Chord rings [9], while in our previous work we explored the potential of ACO in constructing self-organized, unstructured overlays in grids with very promising\u2026"]} +{"14702067|14697846": ["P2P information systems are usually classified into unstructured and structured [16]."]} +{"6317415|10559330": ["Other approaches to network QoS include Integrated Services (IntServ), in which flows must reserve resources that will be needed [10], and Differentiated Services (DiffServ), in which classes of flows (say, from the same ISP) are provided service based on a service level agreement [8]."]} +{"1024220|14441987": []} +{"94399|14697846": []} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"28984615|7971188": ["The UP2P architecture is based on emerging P2P overlay technology [2], which provides high scalability, end-to-end connectivity, and rapid low-cost deployment and upgradeability."]} diff --git a/graph_3399083.jsonl b/edge/graph_3399083.jsonl similarity index 100% rename from graph_3399083.jsonl rename to edge/graph_3399083.jsonl diff --git a/edge/graph_34013163.jsonl b/edge/graph_34013163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc72cc8f6ab42d3f66d72867efa665b54c3276c6 --- /dev/null +++ b/edge/graph_34013163.jsonl @@ -0,0 +1,7 @@ +{"18919738|14814526": []} +{"25878902|36510460": ["Elebanhawi and Simic presented a comprehensive survey of samplingbased planning schemes in [38]."]} +{"8243396|5646762": ["These algorithms are randomized algorithms that can give quasi-optimal solutions and that can be adapted to multiple different problems, such as patter recognition [7], control"]} +{"8243396|1517662": ["In [19, 20] a detailed survey on CDR techniques and planning algorithms is presented, respectively."]} +{"14462777|36510460": ["Hence to solve the higher dimensional planning problems, the sampling-based algorithms were introduced [5]; the main advantage of sampling-based algorithms as compared to other state-of-the-art algorithms is avoidance of explicit construction of obstacle con\ufb01g-uration space.", "\u2026search space makes the algorithm computationally expensive for higher dimensional spaces, that is why the application of such algorithms like Cell Decomposition methods [19] [1], Delaunay Triangulations [10] and Dynamic Graph Search methods [4] [25] are limited to low dimensional spaces only [5]."]} +{"21100222|36510460": ["Sampling-based planners rely on stochastic sampling to effectively search c-space [9].", "RRTs were selected as a result of their increasing popularity in robot planning [9]."]} +{"229853|873842": ["Zelinsky [15] increases efficiency by using a quad-tree [ 131 to represent free and obstacle space, thus reducing the number of states to search in the planning space."]} diff --git a/graph_3402363.jsonl b/edge/graph_3402363.jsonl similarity index 100% rename from graph_3402363.jsonl rename to edge/graph_3402363.jsonl diff --git a/edge/graph_34032865.jsonl b/edge/graph_34032865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3403798.jsonl b/edge/graph_3403798.jsonl similarity index 100% rename from graph_3403798.jsonl rename to edge/graph_3403798.jsonl diff --git a/edge/graph_34051717.jsonl b/edge/graph_34051717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4af3a0b5642b6e304b47dfec312f552e1526dde --- /dev/null +++ b/edge/graph_34051717.jsonl @@ -0,0 +1 @@ +{"61645631|18148591": []} diff --git a/edge/graph_34093101.jsonl b/edge/graph_34093101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..236a1e011fe3cce83205dbc73c1c8efd95cd5532 --- /dev/null +++ b/edge/graph_34093101.jsonl @@ -0,0 +1,37 @@ +{"38605171|5313655": ["alignment can not be performed properly at the time of comparison [5].", "Biometric template protection schemes [5] which are categorized as biometric cryptosystems [6] and cancelable biometrics [7] offer solutions to privacy preserving biometric authentication.", "Biometric template protection schemes [5] are commonly classified as biometric cryptosystems and cancelable biometrics."]} +{"12884154|17950466": ["[5] distinguished between systems using keystroke dynamics for biometric authentication and identification purposes in multiple categories.", "Keystroke dynamics in continuous authentication is a well researched field [5] [6] [7] and should complement the face recognition adequately.", "Additionally some secondary features can be derived by further processing this information such as: the minimum and maximum speed of typing, the mean and standard deviations of the features and the entropy [5].", "A wide variety of data can be collected from keystroke dynamics and various features can be extracted from this data [5] [6].", "divide keystroke recognition algorithms into four different categories [5], statistical algorithms, neural networks, pattern recognition, and Search Heuristics and Combination of Algorithms."]} +{"10568573|5313655": ["This security analysis is based on metrics commonly used in the cancelable biometrics literature [14], [15]."]} +{"2288136|5313655": ["Biometric template protection schemes are conventionally divided [12] into biometric cryptosystems (such as fuzzy commitment and vault schemes [13], [14] and shielding functions [15]) and cancelable biometrics as introduced by Ratha et al."]} +{"29118926|6387482": ["The sensor level and the feature level are referred to as pre-mapping fusion (early fusion) while the matching score level and the decision level are referred to as post-mapping fusion (late fusion) [13, 14]."]} +{"18256170|5313655": ["In related literature [16], to protect the privacy of stored biometric data (e.", "These approaches, such as fuzzy vault cryptosystems, invariably result in loss of matching accuracy as demo nstrated in the literature [16]."]} +{"15994967|15898213": ["Currently, state-of-the-art methods for fingerprint reproduction are classified in consensual and non-consensual [4].", "This motivated several attempts to increase the ability of systems to \u201cdetect\u201d physiological, \u201cliveness\u201d features: for example, by using additional hardware [2], or by image processing and pattern classification methods [3-6].", "Performance of our proposal have been compared with five state-of-the-art \u201cdynamic features\u201d [3-4] based on the perspiration effect."]} +{"43561239|359842": []} +{"15972048|6028805": ["Some biometric combinations which have been tested include face, fingerprint and hand geometry [11]; face, fingerprint and speech [12]; face and iris [13]; face and ear [14]; and face and speech [15, 16, 17]."]} +{"15294065|2357830": ["following papers for a detailed overview of specifi c attack scenarios and countermeasures [17][18][19] [20][ 21]."]} +{"18678873|53680608": ["KEYWORDS: Biometrics Technology, Live Face Detection, Fourier Spectra"]} +{"18203924|205131192": ["Legendre Moments have been widely studied in [10], [24].", "\u2026equation can now be expressed in discrete form as, where the normalizing constant is, \ud835\udc65 \ud835\udc56 and \ud835\udc66 \ud835\udc57 denote the normalized pixel coordinates in the range of [-1,1], which are given by Zernike moments [24] are rotational invariant and uses complex Zernike polynomials as the moments basis set."]} +{"18203924|9045232": []} +{"13469860|16525678": []} +{"34261628|15219853": ["However, research revealed that human behaviors that are strongly dominated by individual\u2019s skill, intelligence, and interest exhibit strong personal characteristics as well [4].", "Behavioural biometrics are more volatile to changes one undergoes through the life time, but have the advantages of being non-intrusive and cost effective [4, 24].", "Majority of the existing behavioural biometrics are based on either human-computer interactions or measuring body parts and muscle actions [4]."]} +{"16571519|5171123": ["There are mainly three SSL based methods proposed for the biometric systems which are named self-training based method [43], [44], graph based method [45], [46] and co-training based method [22], [23], respectively."]} +{"32832492|5313655": []} +{"60053723|16525678": []} +{"60053723|206051485": []} +{"8918672|6670217": ["and the recent surveys regarding mobile security [125], malware propagation modeling [166] and evolution [204], [242]."]} +{"8918672|15219853": []} +{"35690279|6746689": []} +{"33014382|5313655": ["alignment can not be performed properly at the time of comparison [16].", "Technologies of cancelable biometrics are commonly categorized as non-invertible transforms and biometric salting [16]."]} +{"10414690|5313655": ["Biometric template protection schemes [1], commonly categorized as biometric cryptosystems and cancelable biometrics, offer solutions to privacy preserving biometric authentication.", "the required number of protected templates need to obtain a false acceptance [1] and privacy protection is defined as the number of different bit sequences yielding a distinct representation.", "For a detailed survey on cancelable biometrics, the reader is referred to [1].", "Most existing approaches to cancelable biometrics report a significant decrease in biometric performance [1]."]} +{"44747671|5313655": []} +{"58422226|5313655": ["As previously mentioned, a fusion of multiple biometric indicators have been shown to improved the accuracy and reliability of biometric systems."]} +{"46208615|15898213": ["Vitality detection methods have been developed to help assessing the authenticity of the test sample and thus protect fingerprint readers against spoof attacks [2,3,7\u20139,13\u201316,20\u2013 24,29]."]} +{"33572132|17574321": ["This procedure is similar to the one proposed in Kinnunen and Li (2010)."]} +{"6765007|15219853": []} +{"8623180|6028805": ["The variation of lighting conditions mainly includes illumination and low lighting [9, 43, 20].", "The low lighting may diminish facial features since the luminance in face region is too low for face recognition algorithms to recognize [20].", "For lighting condition, we further classify it into different types of illumination and low lighting [9, 43, 20]."]} +{"17614918|14543002": []} +{"18600985|14674468": ["[55] which provides a comprehensive study on human and automated analysis of race classification."]} +{"18600985|2301292": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"18600985|5238287": ["To reduce dimensionality (a critical step for obtaining better gender estimation accuracy [177]), often, the human silhouette is extracted and a statistical feature - namely an average silhouette - is computed."]} +{"18600985|14303607": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"9636510|9045232": ["It is difficult to describe all the approaches reported in the literature [15, 37, 126, 130, 145, 105, 72, 109, 56, 42, 32, 64, 96, 180, 98, 171, 79], so we focus only on the most important works.", "Many of these methods are cited and reviewed in face detection and face recognition surveys [179, 38, 171]."]} +{"60684524|192934": []} diff --git a/edge/graph_34120020.jsonl b/edge/graph_34120020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34136203.jsonl b/edge/graph_34136203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30edec45ac0cb442171cf18e10636e5fc72932c5 --- /dev/null +++ b/edge/graph_34136203.jsonl @@ -0,0 +1,3 @@ +{"3559751|35990525": []} +{"18356736|11810221": []} +{"60681198|12846121": ["This is in line with a general trend for scheduling and managing systems under uncertainty for complex real-world scheduling problems, that use solving procedures based on fully deterministic information [20,15]."]} diff --git a/graph_341671.jsonl b/edge/graph_341671.jsonl similarity index 100% rename from graph_341671.jsonl rename to edge/graph_341671.jsonl diff --git a/edge/graph_34176399.jsonl b/edge/graph_34176399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34177367.jsonl b/edge/graph_34177367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51922a649ba1602ab7ee7a81e443164d68d77280 --- /dev/null +++ b/edge/graph_34177367.jsonl @@ -0,0 +1,3 @@ +{"6896735|25699143": ["The review by Dhond and Aggarwal [ 23 ] provides an account of much of this work.", "Feature Matching [8], [11], [ 23 ], [62], [72], [84] Match dependable features rather than intensities themselves.", "of research in the computer vision community through the eighties. Dhond and Aggarwal [ 23 ]"]} +{"16084807|25699143": ["The literature contains several detailed reviews of various approaches and comparisons of performances (Dhond and Aggarwal, 1989; Hsieh et al., 1992).", "Stereo matching has been intensively studied (Barnard and Fischler, 1982; Dhond and Aggarwal, 1989) and is still a major research topic within the computer vision community to satisfy demands in new application domains such as virtual reality and virtual studio (McMillan and Bishop, 1995)."]} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} diff --git a/graph_3418537.jsonl b/edge/graph_3418537.jsonl similarity index 100% rename from graph_3418537.jsonl rename to edge/graph_3418537.jsonl diff --git a/graph_3419617.jsonl b/edge/graph_3419617.jsonl similarity index 100% rename from graph_3419617.jsonl rename to edge/graph_3419617.jsonl diff --git a/edge/graph_34202713.jsonl b/edge/graph_34202713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3420321.jsonl b/edge/graph_3420321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3421099.jsonl b/edge/graph_3421099.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34219341.jsonl b/edge/graph_34219341.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9cb0aefea54301a8899164d8415c314df3c5f925 --- /dev/null +++ b/edge/graph_34219341.jsonl @@ -0,0 +1,4 @@ +{"5929770|10658846": []} +{"7759719|33644565": []} +{"1194595|8914588": ["We define migration_time, startup_time and shutdown_time as the time (in iterations through the MAPE-K cycle) it takes a VM to migrate, and a PM to start up or shut down, respectively.", "Governing the Cloud infrastructure is achieved by an autonomic control loop called MAPE-K [9], where we monitor (M) relevant metrics on the infrastructure; next we analyze (A) them and plan (P) proactive and reactive actions, which are then executed (E)."]} +{"18984610|8914588": []} diff --git a/graph_3422611.jsonl b/edge/graph_3422611.jsonl similarity index 100% rename from graph_3422611.jsonl rename to edge/graph_3422611.jsonl diff --git a/graph_3422712.jsonl b/edge/graph_3422712.jsonl similarity index 100% rename from graph_3422712.jsonl rename to edge/graph_3422712.jsonl diff --git a/graph_3423198.jsonl b/edge/graph_3423198.jsonl similarity index 100% rename from graph_3423198.jsonl rename to edge/graph_3423198.jsonl diff --git a/edge/graph_34234598.jsonl b/edge/graph_34234598.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d73504b8afae2184a0254dd8b9d9cd57aee65ba --- /dev/null +++ b/edge/graph_34234598.jsonl @@ -0,0 +1 @@ +{"206490150|14077778": ["More sophisticated and efficient versions of the binary method have been developed (e.g., [ 10 ])."]} diff --git a/edge/graph_34236617.jsonl b/edge/graph_34236617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00cfa2ca498a37f1455d3726bacbff3f9d836a83 --- /dev/null +++ b/edge/graph_34236617.jsonl @@ -0,0 +1,5 @@ +{"9789095|4474193": ["magnitudes of change are easier to adapt to, primarily by \u201ctransferring knowledge from the past\u201d [9, p 311] which may help to accelerate the rate of convergence after a change has occurred."]} +{"1667410|8530790": []} +{"29769361|4474193": []} +{"1178306|13867280": ["Coevolutionary systems have been developed that coevolve a local searcher alongside the evolution of solutions [19, 38]."]} +{"13893812|4474193": ["\u2026have been applied very successfully in domains featuring uncertainty ; for example, the objective functions (so-called \ufb01t-ness functions) can be randomized or dynamically changing (see Jin and Branke, 2005 for an excellent survey on evolutionary algorithms in settings featuring uncertainty)."]} diff --git a/edge/graph_34238898.jsonl b/edge/graph_34238898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3423943.jsonl b/edge/graph_3423943.jsonl similarity index 100% rename from graph_3423943.jsonl rename to edge/graph_3423943.jsonl diff --git a/graph_342438.jsonl b/edge/graph_342438.jsonl similarity index 100% rename from graph_342438.jsonl rename to edge/graph_342438.jsonl diff --git a/edge/graph_34263386.jsonl b/edge/graph_34263386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f3e69f4a370f9f3ad14a4adc5206090e87fc283 --- /dev/null +++ b/edge/graph_34263386.jsonl @@ -0,0 +1,9 @@ +{"8920314|15898213": ["Numerous solutions have been proposed to protect fingerprint sensors against these attacks, such as the use of perspiration, skin optical properties or skin temperature [6-18]."]} +{"21419993|15898213": ["Among all the vulnerabilities of a fingerprint recognition system, the attack directed against the sensor is one of the most important [6,11,15,18,19,21,22,29,34,37,40,41]."]} +{"18308933|15898213": []} +{"46208615|15898213": ["Vitality detection methods have been developed to help assessing the authenticity of the test sample and thus protect fingerprint readers against spoof attacks [2,3,7\u20139,13\u201316,20\u2013 24,29]."]} +{"9738483|15898213": []} +{"15994967|15898213": ["Currently, state-of-the-art methods for fingerprint reproduction are classified in consensual and non-consensual [4].", "This motivated several attempts to increase the ability of systems to \u201cdetect\u201d physiological, \u201cliveness\u201d features: for example, by using additional hardware [2], or by image processing and pattern classification methods [3-6].", "Performance of our proposal have been compared with five state-of-the-art \u201cdynamic features\u201d [3-4] based on the perspiration effect."]} +{"18865224|15898213": []} +{"15591040|15898213": ["This tendency can be studied by using the Fast Fourier Transform (FFT), then the fingerprint image has to be transformed into a ridge signal, representing the gray-level value along the ridge.", "\u2026spaces between two temporarily divergent ridges), spurs (a notch protruding from a ridge), bridges (small ridges joining two longer adjacent ridges), and crossovers (two ridges which cross each other). tion can be found by using Wavelet Transform and Fast Fourier Transform (Coli et al., 2007).", "This algorithm is fast and convenient but it works well only in presence of an high resolution sensor (1000 dpi, while the common commercial sensors present a resolution of about 500 dpi) (Coli et al., 2007).", "tion can be found by using Wavelet Transform and Fast Fourier Transform (Coli et al., 2007).", "Many types of minutiae exist, including dots (very small ridges), islands (ridges slightly longer than dots, occupying a middle space between two temporarily divergent ridges), ponds or lakes (empty spaces between two temporarily divergent ridges), spurs (a notch protruding from a ridge), bridges (small ridges joining two longer adjacent ridges), and crossovers (two ridges which cross each other). tion can be found by using Wavelet Transform and Fast Fourier Transform (Coli et al., 2007).", "A novel morphologic static feature based on the Fourier Transform has been exploited in (Coli et al., 2007), where the modulus of the Fourier Transform of a given fingerprint image is computed."]} +{"206176066|15898213": ["Several hardware-and software-based liveness detection systems have been proposed (see, e.g., [9]), but neither the \ufb01rst ones, nor the second ones, have shown acceptable performances and costs against direct attacks.", "The issue of spoo\ufb01ng attacks has been especially studied in the case of \ufb01ngerprints and faces, and, rarely, on other biometrics, in the novel research \ufb01eld of biometric liveness detection [11, 20, 9, 10, 23, 33, 22, 21, 34, 4, 6].", "Although liveness detection can be exploited to counteract spoo\ufb01ng attacks, as mentioned in the previous section, state-of-the-art techniques may increase the percentage of genuine users rejected by the system (i.e., the false rejection rate, FRR) [9, 22, 23, 33, 4, 6]."]} diff --git a/graph_3427126.jsonl b/edge/graph_3427126.jsonl similarity index 100% rename from graph_3427126.jsonl rename to edge/graph_3427126.jsonl diff --git a/graph_3428776.jsonl b/edge/graph_3428776.jsonl similarity index 100% rename from graph_3428776.jsonl rename to edge/graph_3428776.jsonl diff --git a/graph_3434731.jsonl b/edge/graph_3434731.jsonl similarity index 100% rename from graph_3434731.jsonl rename to edge/graph_3434731.jsonl diff --git a/graph_3439067.jsonl b/edge/graph_3439067.jsonl similarity index 100% rename from graph_3439067.jsonl rename to edge/graph_3439067.jsonl diff --git a/edge/graph_3439503.jsonl b/edge/graph_3439503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34399589.jsonl b/edge/graph_34399589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34407607.jsonl b/edge/graph_34407607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..663935c17b4278f5cdc5b5ba8aa7a38ab3b1a5d4 --- /dev/null +++ b/edge/graph_34407607.jsonl @@ -0,0 +1,17 @@ +{"14701659|16378248": []} +{"14701659|11607029": []} +{"18114947|16378248": ["In model transformation, [2] identifies two categories of relationship between source and target model, new-target and existing-target."]} +{"18180623|10500613": ["Regarding structural knowledge, the structural similarity between the objects in M and M \u2032 as well as between M and MM \u2032 may be employed, by using methods which are similar to existing schema and ontology matching techniques [7, 26]."]} +{"15795279|11607029": ["Alternatively, operation-based approaches [11], [6] could be used.", "Model differencing is not only crucial for being able to reason about the evolution of models, but is also the basis for further model versioning functionalities such as model patching [4] or model merging [5], [6].", "The problem that an automatic approach to model differencing cannot calculate the differences correctly in all cases especially holds when working with state-based model differencing approaches [11], [6]."]} +{"5615659|16378248": ["In model transformation, [5] identifies two categories of relationship between source and target model, new-target and existing-target.", "Many model management tasks, such as model transformation, are specified in metamodel-specific terms [5] and hence cannot be used to manage models that do not conform to their metamodel."]} +{"15944844|11607029": ["It remains to be investigated if the above mechanism is feasible, or if a merging algorithm is required which would consider more differences in parallel [3] [8]."]} +{"15368393|913718": ["D.2.12 [Interoperability]: \nData mapping."]} +{"14466182|11607029": ["There is no need for di.erencing, since the changes are recorded and persisted, and thus do not need \nto be derived later on."]} +{"16125167|205435103": ["Search strategies in literature surveys often involve automatic keyword searches (e.g., [55], [56])."]} +{"16125167|627405": ["[57], we enforced this criterion by utilizing predefined selection criteria that clearly define the scope, and evaluated these criteria through a pilot study that yielded positive results (Section 3.", "sions [57]; borderline cases are resolved by discussion", "[57] recently pointed out that: 1) Current software engineering digital libraries do not provide good support for the identification of relevant research and the selection of primary studies and 2) in comparison to other disciplines, the standard of abstracts in software engineering publications is poor.", "[57], who state that \u201ccurrent software engineering search engines are not designed to support systematic literature reviews;\u201d this observation is confirmed by Staples and Niazi [83]."]} +{"16301984|11607029": ["Since operations are essentially a command pattern with persistent commands, the operations can also be used to implement undo and redo functionality [10], [29].", "and merging [2], [9], [10], repository mining [11], inconsistency detection [12], and coupled evolution [13], [14].", "This can help to understand changes, but is also helpful for conflict detection and merging [28], [10].", "The merge result can not be as accurate, since composite changes are not available [3], [9], [10].", "This is an important information for understanding changes, but is also useful to improve applications such as conflict detection and merging [9], [10].", "Conflict detection can fully rely on the operations, their temporal order and composites to supply a more accurate result and avoid unnecessary conflicts [10]."]} +{"10938355|10500613": ["present surveys on schema matching [20, 21]."]} +{"10938355|913718": ["present surveys on schema matching [20, 21]."]} +{"13092300|10500613": ["In the context of relational and object-oriented data bases, the production of equivalences between two schemas/ontologies has been invested in [3][4]."]} +{"5689082|16125167": ["[9] and systematically followed references in identified papers."]} +{"8952045|16378248": ["Czarnecki and Helsen [9] present a feature model to classify transformation languages according to their technical properties."]} diff --git a/edge/graph_34420887.jsonl b/edge/graph_34420887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be3d69f6f713d6a9dfcec5dbcaac4b6c6e3d113d --- /dev/null +++ b/edge/graph_34420887.jsonl @@ -0,0 +1,15 @@ +{"1924791|206051485": ["Similarly, a \u201csuper\u2013resolution\u201d algorithm [151], used in digital image processing to enhance the resolution of images, can be adopted to improve on the tactile sensing resolution, in case of insufficient resolution from the available tactile sensor hardware."]} +{"1924791|14561706": []} +{"3509059|2087828": ["In general, the rigid and fragile substrate of pressure-sensitive array will bring about failures on the permissible stress, or repeated deformation [13]."]} +{"15304753|192934": ["Many tools exist involving both supervised and unsupervised training (Jain et al., 2000).", "Adding these results to the system would also increase the amount of training data it has available, eventually enabling multivariate analysis as opposed to the univariate methods used in this study to avoid the curse of dimensionality (Jain et al., 2000).", "Many tools exist involving both supervised and unsupervised (Jain et al., 2000).", "Several machine learning algorithms exist to reduce unnecessary dimensionality of inputs, such as principle component analysis and other multidimensional scaling techniques (Jain et al., 2000).", "In practice, however, it has been observed that additional dimensions will actually degrade performance of a classifier for a constant sample size, a property that has become known as the curse of dimensionality (Jain et al., 2000)."]} +{"101800|16527268": []} +{"9680244|15167343": ["For instance, a miniaturized fiber optic tactile force sensors based on FPI has been proposed to provide tactile feedback and measure the forces of interactions during needle-based percutaneous procedures in an MRI, or in vitreoretinal microsurgery applications [103,104]."]} +{"9680244|155150": ["Fiber-optic based sensors are very attractive for many applications of medical field, such as the immunity to electromagnetic interference and MRI compatibility, biocompatibility, non-toxicity and chemical inertness, robustness, flexibility, high versatility and the feasibility of being miniaturized [97\u201399]."]} +{"9680244|14485408": ["The paper of Lee was one of the most complete reviews within the nineties [23], followed by the paper of Eltaib about tactile sensing technology for minimally invasive surgery in 2003 [24] and the paper of Tiwana and colleagues in 2012 [25], concluding with the review of Lucarotti and colleagues about bio-artificial tactile sensing [26]."]} +{"14829651|2087828": ["Detailed surveys of tactile sensors used for robotic applications can be found in [3], [8], [9] and [10]."]} +{"25770815|14485408": ["These approaches have been employed in different application fields in robotics [5, 17-21].", "Main tactile transduction methods are based on capacitive, optical, piezoelectric, piezoresistive, strain gauge and magnetic techniques [5, 11, 12, 13].", ", size, hardness, texture, roughness, temperature, vibration) [5,6]."]} +{"1986975|1400872": ["The training of the RNN (2) used for the approximation of the dynamical time-variant system (18) was carried out by means of a kind of hybrid method that combines Genetic Algorithm (GA) and another gradient-descent based method called recurrent backpropagation algorithm by Pearlmutter [12]."]} +{"2049043|2087828": ["Despite the mentioned advantages, piezoresistors suffer from hysteresis, temperature sensitivity, fragility, rigidity and high cost [51].", "Another advantage is the easiness to be implemented in microelectromechanical systems (MEMSs) or integrated to printed circuit boards [51]."]} +{"2049043|14485408": ["PROPERTIES OF FOUR TYPES OF MECHANORECEPTORS IN HUMAN SKIN (SUMMARIZED FROM [17], [25], [30], AND [31])", "Despite existing literature of tactile sensing on robotics [17], [18], [24], biomedical engineering [25], [26], and tactile stimulation on prosthetic hands [27], [28], it is required to have a comprehensive understanding for the whole process of tactile sensation restoration consisting of sensing, stimulating, and related applications to pave the way for further study, especially in the context of upper-extremity prosthetic devices."]} +{"6460455|14485408": []} +{"630606|14485408": ["Over the last years several projects have been focusing on the critical aspects concerned with the realization of electronic skin [4],[5],[6]."]} diff --git a/edge/graph_34423577.jsonl b/edge/graph_34423577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3443381.jsonl b/edge/graph_3443381.jsonl similarity index 100% rename from graph_3443381.jsonl rename to edge/graph_3443381.jsonl diff --git a/edge/graph_34453073.jsonl b/edge/graph_34453073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34460949.jsonl b/edge/graph_34460949.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dcb4539c7d539090e86871a9367bc9e18886ed8a --- /dev/null +++ b/edge/graph_34460949.jsonl @@ -0,0 +1,3 @@ +{"3506224|1188683": ["bioinformatics algorithms are mapped to reconfigurable hardware [ 20 ] and streaming applications are becoming more commonplace for FPGAs it would be really interesting to examine common attributes of bioinformatics algorithms and biological problems for FPGAs [21], aiming at a general platform for bioinformatics problems.", "The use of reconfigurable hardware for computationally intensive problems is a trend since the early 1990s [ 20 ]."]} +{"1110858|3420321": ["The FM-index is a type of substring index based on the BurrowsWheeler transform (BWT), with some similarities to the suffix array.", "The processing speed of traditional methods, such as BLAT [4], cannot keep pace with the high-throughput rate of the new sequencing technologies [3].", "Amongst the numerous work published in literature, two of the most important categories, according to the applied index structure, are the hash-index and the FM-index [3].", "The strength of using BWT-based algorithms lies in the low memory space [3].", "For example, both Illumina HiSeq 2000 [1] and Applied Biosystem 5500 Genetic Analyzer [2], can generate tens of billions of base-pairs (bp) data every day [3]."]} +{"9813043|28518402": ["[21] present PSA implementations on CPU, GPU, and FPGA platforms."]} diff --git a/edge/graph_34469714.jsonl b/edge/graph_34469714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f99846f5553c91025da34874e6184d547e79e534 --- /dev/null +++ b/edge/graph_34469714.jsonl @@ -0,0 +1,8 @@ +{"27655055|10500613": ["domain knowledge required: some methods require domain knowledge, instance data or user interactions before or during the matching process [2, 5, 8, 14, 16, 17].", "[14, 10] are similar approaches in that they manage to combine multiple algorithms and reuse their matching results.", "Being an important step for data integration, schema matching has attracted much attention [2, 5\u201310, 12, 14, 16, 17]."]} +{"9989830|10500613": ["Various languages have been proposed for specifying these mappings [20, 25] and multiple techniques developed for creating these mappings semi-automatically [30]."]} +{"17384569|206742377": []} +{"2761350|10500613": ["How can our framework bene(cid:12)t from existing techniques (as [16] surveys)?", "The more recent development of general model management essentially abstracts schema matching as pairwise similarity mappings between two input sources [16].", "The survey [16] presents a taxonomy of these approaches.", "Fourth, how can our framework integrate various techniques [16] for schema matching?"]} +{"1753589|14171067": ["When no confusion can arise, we just write [1]grp([2]row([1]text)) = grp([2]row(text)).", "In the following, we follow the approach of [1] and define a metric cost function on pairs of nodes.", "See [1] for a deep discussion on the tree edit distance problem.", "The subterm \u201c[2]row([1]text)\u201d represents that the term row([1]text) appears twice."]} +{"18271216|386036": ["A recent survey[34] has been given to summary the research works in this field."]} +{"6338383|206742377": ["and compared in [5], andwe do not discuss them any further here.", "Good surveys about previous works on Web data extraction can be found in [16] and [5]."]} +{"3339536|10500613": ["However, existing schema matching works mostly focus on simple 1:1 matching [18, 9, 15] between two schemas.", "Although 1:1 matching has got great attention [18, 9, 15, 10], m:n matching has not been extensively studied, mainly due to the much more complex search space of exploring all possible combinations of attributes (as Section 7 will discuss)."]} diff --git a/graph_3449543.jsonl b/edge/graph_3449543.jsonl similarity index 100% rename from graph_3449543.jsonl rename to edge/graph_3449543.jsonl diff --git a/graph_3450189.jsonl b/edge/graph_3450189.jsonl similarity index 100% rename from graph_3450189.jsonl rename to edge/graph_3450189.jsonl diff --git a/edge/graph_34506027.jsonl b/edge/graph_34506027.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8700e49bbf9e161234bc3f935ca25f3c65ebc40b --- /dev/null +++ b/edge/graph_34506027.jsonl @@ -0,0 +1,2 @@ +{"5476896|16766019": ["\u2026for similarity assessment in image databases (Chu et al. 1994; Del Bimbo et al. 1995; Del Bimbo and Pala 1997; Chu et al. 1998), multimedia databases (Al-Khatib et al. 1999; Yoshitaka and Ichikawa 1999), and video databases (Jiang and Elmagarmid 1998; Pissinou et al. 1998; Aslandogan and Yu 1999)."]} +{"18971364|14140377": []} diff --git a/graph_3450996.jsonl b/edge/graph_3450996.jsonl similarity index 100% rename from graph_3450996.jsonl rename to edge/graph_3450996.jsonl diff --git a/graph_345263.jsonl b/edge/graph_345263.jsonl similarity index 100% rename from graph_345263.jsonl rename to edge/graph_345263.jsonl diff --git a/edge/graph_34526738.jsonl b/edge/graph_34526738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a648a352a6e6bdbe6123b18d362121cb0710945b --- /dev/null +++ b/edge/graph_34526738.jsonl @@ -0,0 +1,15 @@ +{"3178691|18956392": ["[10]."]} +{"3178691|6959212": ["In general, sensor nodes have limited battery energy supply [11].", "monitoring and diagnostic systems [1], [4], [9], [11], [19], [30].", "reliable communication capabilities of the deployed WSNs [11], [13].", "system reliability and efficiency by optimizing the management of electric power systems [11], [13].", "online energy consumption of the customers [20] and for asset protection through advanced remote monitoring [11], [23].", ", accidents in the electric power systems, it is important to receive the data at the controller node in a timely manner [11].", "become essential to maintain safety, reliability, efficiency, and uptime of the smart grid [11], [13], [19], [30].", "in a remote and online manner [11], [12], [18], [24], [27].", "These harsh environmental conditions and dynamic network topologies may cause a portion of sensor nodes to malfunction or render the information they gather obsolete [11]."]} +{"3178691|1230643": ["monitoring and diagnostic systems [1], [4], [9], [11], [19], [30]."]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} +{"13851160|17279511": ["However, due to the limited energy resources and computational capabilities of WSN nodes, access control techniques used for traditional wired and/or wireless network security do not apply [61]."]} +{"13851160|6275330": ["[23] provide a survey of WSN applications including a section on military applications where the areas of interest are not limited to information collection only, but also include enemy tracking, battlefield surveillance and target classification via networks consisting of sensor nodes equipped with seismic and acoustic sensing capabilities.", "WSNs compensate for their small size (and accordingly limited power) by being deployed in large numbers (typically hundreds or thousands [23]) over a relatively small area (up to a few city blocks)."]} diff --git a/graph_3453202.jsonl b/edge/graph_3453202.jsonl similarity index 100% rename from graph_3453202.jsonl rename to edge/graph_3453202.jsonl diff --git a/graph_3455549.jsonl b/edge/graph_3455549.jsonl similarity index 100% rename from graph_3455549.jsonl rename to edge/graph_3455549.jsonl diff --git a/edge/graph_34556145.jsonl b/edge/graph_34556145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dbcea69f9ea13a0591a0ed2a4f7f6cfe8d28cbc1 --- /dev/null +++ b/edge/graph_34556145.jsonl @@ -0,0 +1,3 @@ +{"6672490|10658846": ["Thus, reducing the voltage, which consequently lead to the frequency reduction, provides substantial savings in power at the cost of slower program execution [18]."]} +{"7109928|10608305": ["A lot of interesting examples of recently developed static and dynamic power and energy management techniques in the distributed computing environments are presented in the following surveys [5, 40, 43, 44]."]} +{"574971|1708582": ["For example, jobs which may have different behavior because of insufficient memory, i.e., intensive swapping operations, are outside the scope of our paper."]} diff --git a/graph_3456635.jsonl b/edge/graph_3456635.jsonl similarity index 100% rename from graph_3456635.jsonl rename to edge/graph_3456635.jsonl diff --git a/graph_3457064.jsonl b/edge/graph_3457064.jsonl similarity index 100% rename from graph_3457064.jsonl rename to edge/graph_3457064.jsonl diff --git a/edge/graph_34586100.jsonl b/edge/graph_34586100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3461906.jsonl b/edge/graph_3461906.jsonl similarity index 100% rename from graph_3461906.jsonl rename to edge/graph_3461906.jsonl diff --git a/edge/graph_34621298.jsonl b/edge/graph_34621298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34627026.jsonl b/edge/graph_34627026.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34627232.jsonl b/edge/graph_34627232.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34636822.jsonl b/edge/graph_34636822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..87c45c6853cc2c4e2dbe472b10474ba8f4dd4f0d --- /dev/null +++ b/edge/graph_34636822.jsonl @@ -0,0 +1,5 @@ +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"515567|18148591": ["In Multiple Input Multiple Output (MIMO) systems the maximum-likelihood (ML) decoder is the optimum scheme in the sense of minimizing bit-error-rate (BER) [ 1 ]."]} diff --git a/edge/graph_34643772.jsonl b/edge/graph_34643772.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e1776be78e79f33470c42b93d521ca8b9153bd0 --- /dev/null +++ b/edge/graph_34643772.jsonl @@ -0,0 +1,39 @@ +{"7858847|2387055": ["As such, this paper extended an SDN security survey performed in [23] with a formal evaluation.", "The authors of [23] provide a survey of SDN security research."]} +{"12699980|121289": ["This leads to larger overall data volumes and a high degree of complexity which needs to be handled by the ICT infrastructure [2]."]} +{"18725272|2623404": ["6M new flow requests per second with average response time of 2 milliseconds on a eight core machine [22]."]} +{"18725272|206584087": ["To cope with DDoS attacks, tremendous efforts have been made from both academia and industry [26], [39]."]} +{"108393727|12815020": []} +{"108393727|13785718": []} +{"30548534|8364569": ["Most of the different techniques used in the NIDS field are summarized in [5, 6]."]} +{"206309507|13456854": ["[1] surveyed Internet service providers and network operators to discover whether flow-based anomaly detection had been adopted by them.", "Despite considerable advances in the research of flow-based anomaly detection in the recent decade, flow-based anomaly detection systems are not commonly used [1]."]} +{"206309507|8364569": ["Although there are various taxonomies of attacks and anomalies [2,18], none completely fit to the detection capabilities of detection methods based on network flows.", "We limit the scope of the paper to the methods that make use of network flows as their main input (as well as [2])."]} +{"16809905|2623404": ["In this work, to avoid delay communication between routers and the centralized controller, we consider the default rule which is just to forward packets to a default port (without contacting the controller), and each switch has exactly one default port [28]."]} +{"16809905|10837932": ["Therefore the green networking has been attracting a growing attention during the last years (see the survey [2]).", "Starting from the pioneering work of Gupta [10], the idea of power proportionality has gained a growing attention in networking research area [2][6]."]} +{"6303054|2535224": []} +{"7485096|12452682": ["As a consequence, severe spectrum shortage will be faced in IoT era [2, 3, 11, 14, 27] where almost all objects will be connected to the Internet and controlled by the networked systems [3, 18]."]} +{"14357813|6913007": ["ATM switches need hard state since a circuit is established once at the beginning of a session, while OpenFlow switches can maintain soft state since they only cache information from the controller , and all packets of a flow are treated in the same way.", "ATM [22] follows a similar pattern where a virtual circuit is established across a network before packets traverse the network.", "OpenFlow uses the link, network, and transport layers to define a flow, while ATM operates on a single layer, namely the link layer."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"25786029|2623404": [", data layer, control layer and application layer [23] [24]."]} +{"25786029|2387055": ["Recently many techniques have been proposed to detect and mitigate these attacks to some extent [68], [69]."]} +{"1700924|8253022": ["Cloud Networking Issues [4] Helpers Impediments", "It is worth mentioning that there are other works in the literature that analyze cloud issues and provide different\nCloud Networking Issues [4] Helpers Impediments\nProper installation of network firewalls With the logically centralized intelligence and global topology overview, SDN helps identifying threats and giving more efficient and rapid answers with the deployment of firewall rules [23]\nNetwork security configurations Even with orchestration solutions, traditional networks still keep many configuration aspects dependent on specific proprietary commands.", "The new model of service provisioning introduced by Cloud Computing, which reduces costs by sharing resources among applications, impacts directly information technology (IT) budget [12].", "Considering the already known security issues of Cloud Computing [4], SDN helps to give fast answers to emerging threats, but also", "In this paper, we discuss recent security proposals arising from SDN, and analyze whether SDN helps to improve trust, security and privacy in Cloud Computing.", "In Table I, we synthesize from [4] some indicators on whether SDN helps or hinders to solve the cloud network and infrastructure issues.", "In Section III we discuss the role of the SDN architecture in Cloud Computing environments.", "A similar study has been provided by in [4], a paper arguing that cloud computing security related issues comprise five categories, namely, Security Standards, Network, Access Control, Cloud infrastructure, and Data.", "In face of this, from the security point of view, it is relevant to investigate whether SDN constitutes a solution or a problem for Cloud Computing environments, since the answers to this question are important indicators of the trust that a costumer can place in SDN and SDN based cloud computing services.", "Considering the already known security issues of Cloud Computing [4], SDN helps to give fast answers to emerging threats, but also introduces new vulnerabilities related to its own architecture.", "I. INTRODUCTION\nAccording to the National Institute of Standards and Technology (NIST) [1] Cloud Computing comprises on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service as essential characteristics.", "In [4] as well as in [25], network related issues represent 14% of stated total."]} +{"1700924|2387055": ["On the other hand, SDN Security issues [5], such as fraudulent rule insertion, controller-switch communication flood, unauthorized controller access, and controller hijacking, could be explored in Cloud environments to harm client applications and network performance."]} +{"1700924|4269723": ["Concerning networking resources, Software-Defined Networking (SDN) [2] became one of the most important architectures for the management of large-scale and complex networks, which may require frequent re-policing or re-configurations [3]."]} +{"56058942|206584087": ["TIPS is a destination-based [5] IPS that offers the following contributions to the \ufb01eld."]} +{"23852348|12452682": ["Dynamic spectrum access (DSA) is an emerging concept for an efficient utilization of RF spectrum by allowing SUs to access the licensed spectrum opportunistically without causing harmful interference to the licensed primary users (PUs) [6], [7]."]} +{"954107|29060869": []} +{"954107|193574": []} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"15762598|2623404": ["Software-Defined Network (SDN) has been envisioned as the next generation network infrastructure, which promises to simplify network management by decoupling the control plane and data plane [1], [2]."]} +{"381326|8450611": ["One method \nfor coping with these limi\u00adtations is to use compression schemes to reduce the number of TCAM rules required \nto represent a classi.er."]} +{"25070990|10559330": []} +{"11528463|2623404": []} +{"11528463|2387055": []} +{"11528463|206584087": []} +{"1367922|206584087": ["The surveys [21,22] have included most of these work."]} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} +{"107137336|2623404": []} +{"17296108|206584087": ["Detecting DDoS attacks has been widely covered [7] especially by focusing on the victim (who is under attack?) without identifying real sources."]} diff --git a/edge/graph_34645798.jsonl b/edge/graph_34645798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34657644.jsonl b/edge/graph_34657644.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..812072421d6ce4fd07b78e5e246ca60f3000f530 --- /dev/null +++ b/edge/graph_34657644.jsonl @@ -0,0 +1,14 @@ +{"23428441|1230643": ["Some good reviews on localization techniques can be found in [4] and [5].", "probabilistic framework has achieved good performance in robotics [6] and has recently been successfully applied to sensor networks in [4] and [7]\u2013[9]."]} +{"23428441|4491892": []} +{"17477235|1230643": ["The sensor nodes can collaborate to deal with many kinds of complicated tasks including monitoring ecological environments, protecting infrastructures, tracking targets and so on [1-3]."]} +{"14713786|164835": ["Cell phone radio-location services such as E911 commonly employ TDOA and are centralized, absolute, and noncooperative [ 78 ], [79]."]} +{"18991749|2835258": ["One such challenge is the need to accurately locate devices in a network, which is an important prerequisite to everything from event detection to routing [19]."]} +{"61072845|13372227": []} +{"5554325|9932808": []} +{"15721280|1236072": ["Moreover, the location information is also indispensable in geographic routing protocols [2]."]} +{"15721280|1230643": ["INTRODUCTION Nowadays, wireless sensor networks (WSN) can supply many applications, such as national resources investigation, targets tracking, unapproachable places monitoring and so forth [1]."]} +{"15900663|17325804": []} +{"1862414|1230643": ["Due to many attractive characteristics of sensor nodes such as small size and low cost, sensor networks [2], [12], [15], [19] become adopted to many military and civil applications, such as target tracking, surveillance, environmental control, and health care."]} +{"340387|3054454": []} +{"1094755|14441987": ["Communication in the sensor network is based on the wireless ad hoc networking technology [2]."]} +{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]} diff --git a/edge/graph_34702324.jsonl b/edge/graph_34702324.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34704358.jsonl b/edge/graph_34704358.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e30a567c7302d6cacf731b1ce9d7aed95c3e2fa7 --- /dev/null +++ b/edge/graph_34704358.jsonl @@ -0,0 +1 @@ +{"1473065|8150108": []} diff --git a/edge/graph_34714.jsonl b/edge/graph_34714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34718712.jsonl b/edge/graph_34718712.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a1a274fe8a103044dbc97c6971a1962c2a6992a --- /dev/null +++ b/edge/graph_34718712.jsonl @@ -0,0 +1,15 @@ +{"3882516|5551880": ["Despite the promising business model and hype surrounding cloud computing, security is the major concern for businesses shifting their applications to clouds [3], [4]."]} +{"11477596|3042864": ["The aforementioned limitations served as motivation for a new computing paradigm called MCC that enhances the abilities of mobile devices by moving the storage and compute intensive tasks of mobile to the cloud [56,82]."]} +{"11477596|13210924": ["The resources are provided to the users and released based on demands from the pool of shared resources [4].", "The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]."]} +{"11477596|13916820": []} +{"11477596|12017064": ["The security solutions have also been presented in [71].", "[71] reviewed the security issues at different levels of cloud computing."]} +{"3330144|13916820": []} +{"3330144|45478730": ["Typical SLAs include data exchange rates, mean time to repair, jitter and other service properties related with security as well [3].", "Afterward, a user interface with fine-grained configuration capabilities is provided to manage, orchestrate, and monitor the activity of the service usage [3,100].", "Malicious insiders, as are usually called [3,203,306], can overtake the physical security controls and penetrate the facilities.", "The interface, by default, is a gateway into the cloud and makes it an attractive attack target that can compromise the overall service security [3,281], therefore requiring proper security measures.", "User frontend Internet exposure of frontend interfaces [3,100,211,281]", "So far, ten cloud outages of major cloud providers have been reported in various studies [3,17,224].", "Another issue in terms of availability is related with hardware availability [3].", "Ahuja and Komathukattil [3] 2012 Software, perimeter, virtualization, compliance, access, storage \u00d7 \u2013 \u00d7 ++ \u2013 \u00d7", "Ahuja and Komathukattil [3] presented a survey on some common threats and associated risks to clouds."]} +{"3330144|17290408": ["Software Platforms and frameworks Isolation, resource accounting, safe thread termination [232]", "NET and the Java Virtual Machine (JVM) [232].", "RoderoMerino et al. explain the Multitasking Virtual Machine (MVM) [67], isolates-based KaffeOS [22] and I-JVM [91] solutions, and a heap-based protection [263].", "[232] have given a survey on the security state in PaaS cloud environments.", "[232] 2012 PaaS clouds, isolation, resource accounting, and safe thread termination \u00d7 \u00d7 \u00d7 + +", "[232] enlightened of the fact that PaaS providers are twofold.", "[232] provided an in-depth study on PaaS sharing-based cloud development and running platforms.", "[232], are, in their majority, prior to the rise of cloud environments.", "The most straightforward way for guaranteeing isolation is to create one JVM per application.", "[232] emphasized that such a layout can be compromised by malicious tenants in a straightforward way."]} +{"3330144|12815020": []} +{"1367922|206584087": ["The surveys [21,22] have included most of these work."]} +{"3057478|14420517": ["There are several security standard specifications [79] such as Security Assertion Markup Language (SAML), WSSecurity, Extensible Access Control Markup (XACML), XML Digital Signature, XML Encryption, Key Management Specification (XKMS), WS-Federation, WS-Secure Conversation, WS-Security Policy and WS-Trust."]} +{"3057478|627405": ["We have carried out a systematic review [13-15] of the existing literature regarding security in Cloud Computing, not only in order to summarize the existing vulnerabilities and threats concerning this topic but also to identify and analyze the current state and the most important security issues for Cloud Computing."]} +{"8253022|13916820": []} +{"8253022|448220": []} +{"8253022|5551880": []} diff --git a/graph_3474164.jsonl b/edge/graph_3474164.jsonl similarity index 100% rename from graph_3474164.jsonl rename to edge/graph_3474164.jsonl diff --git a/edge/graph_34770588.jsonl b/edge/graph_34770588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58c6d45b1b25274da80e76d9759c0671d799d2cf --- /dev/null +++ b/edge/graph_34770588.jsonl @@ -0,0 +1,3 @@ +{"39078143|14697846": []} +{"39078143|9104850": ["Given the explosive growth of the Internet, web-servers suffer congestion and bottleneck, which substantially decreases their quality of service [Wang, 1999]."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} diff --git a/edge/graph_34804199.jsonl b/edge/graph_34804199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fde991fcd717c4dfacd3726caff2fb2e0623912f --- /dev/null +++ b/edge/graph_34804199.jsonl @@ -0,0 +1,3 @@ +{"17838725|33644565": []} +{"31825515|15986963": ["The main reason behind producing the additional useful information is that AC utilises association rule discovery methods in the training phase (Thabtah, 2007)."]} +{"17076119|3330313": ["Details of such methodologies can be found in [62].", "Details of these statistical techniques can be found in [62] and [65]."]} diff --git a/edge/graph_3480971.jsonl b/edge/graph_3480971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34847251.jsonl b/edge/graph_34847251.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_34862941.jsonl b/edge/graph_34862941.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_348701.jsonl b/edge/graph_348701.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3487706.jsonl b/edge/graph_3487706.jsonl similarity index 100% rename from graph_3487706.jsonl rename to edge/graph_3487706.jsonl diff --git a/graph_3488022.jsonl b/edge/graph_3488022.jsonl similarity index 100% rename from graph_3488022.jsonl rename to edge/graph_3488022.jsonl diff --git a/graph_3489184.jsonl b/edge/graph_3489184.jsonl similarity index 100% rename from graph_3489184.jsonl rename to edge/graph_3489184.jsonl diff --git a/edge/graph_34894134.jsonl b/edge/graph_34894134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3490612.jsonl b/edge/graph_3490612.jsonl similarity index 100% rename from graph_3490612.jsonl rename to edge/graph_3490612.jsonl diff --git a/graph_3493224.jsonl b/edge/graph_3493224.jsonl similarity index 100% rename from graph_3493224.jsonl rename to edge/graph_3493224.jsonl diff --git a/graph_3494096.jsonl b/edge/graph_3494096.jsonl similarity index 100% rename from graph_3494096.jsonl rename to edge/graph_3494096.jsonl diff --git a/graph_3496250.jsonl b/edge/graph_3496250.jsonl similarity index 100% rename from graph_3496250.jsonl rename to edge/graph_3496250.jsonl diff --git a/graph_3498240.jsonl b/edge/graph_3498240.jsonl similarity index 100% rename from graph_3498240.jsonl rename to edge/graph_3498240.jsonl diff --git a/graph_3499442.jsonl b/edge/graph_3499442.jsonl similarity index 100% rename from graph_3499442.jsonl rename to edge/graph_3499442.jsonl diff --git a/edge/graph_3503030.jsonl b/edge/graph_3503030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3504276.jsonl b/edge/graph_3504276.jsonl similarity index 100% rename from graph_3504276.jsonl rename to edge/graph_3504276.jsonl diff --git a/graph_350515.jsonl b/edge/graph_350515.jsonl similarity index 100% rename from graph_350515.jsonl rename to edge/graph_350515.jsonl diff --git a/graph_3507555.jsonl b/edge/graph_3507555.jsonl similarity index 100% rename from graph_3507555.jsonl rename to edge/graph_3507555.jsonl diff --git a/edge/graph_35095793.jsonl b/edge/graph_35095793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35098173.jsonl b/edge/graph_35098173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..680f788d3283213a8226cb7430529a1de55a014f --- /dev/null +++ b/edge/graph_35098173.jsonl @@ -0,0 +1,21 @@ +{"4343072|35098173": ["In particular, a recent survey [7] has reviewed this explicit branch, where related works have already shown the improved routing performance of geographic routing over topological routing in DTNs."]} +{"3086208|14552902": ["In opportunistic routing (OR) [16], a packet is sent in a broadcast mode to several eligible forwarders, and the best forwarder that received the packet will continue to forward it."]} +{"12826359|2835258": ["The various geographic routing survey papers [9]\u2013[11] break down different geographic forwarding decisions into MFR (most forward with radius r), NFP (nearest with forward progress), and compass."]} +{"14718350|17206258": []} +{"14718350|10562205": []} +{"10407884|763939": ["An extensive survey on mobility models is provided in [36]."]} +{"10407884|870434": ["For example, underwater networks make use of the DTN paradigm to enable applications for oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications [17]."]} +{"8438778|2335874": ["\u2026et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility management [Zhu et al. 2011] Beaconing approaches [Ghafoor et al. 2013] Vehicular cloud [Whaiduzzaman et al. 2014] Note : More than 50% of the surveys are on routing protocols and communication\u2026", "\u2026[Al-Sultan et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility management [Zhu et al. 2011] Beaconing approaches [Ghafoor et al. 2013] Vehicular cloud [Whaiduzzaman et al. 2014] Note : More than 50% of the surveys are on routing protocols and communication\u2026"]} +{"8438778|16844049": ["\u2026et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014], [Al-Sultan et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility\u2026", "\u2026[Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014], [Al-Sultan et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility\u2026"]} +{"8438778|940632": ["\u2026et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012], [Dhamgaye and Chavhan 2013], [Araniti et al. 2013], [Javadi et al. 2013], [Al-Sultan et al. 2014], [Ajmal et al. 2014], [Mejri\u2026"]} +{"8438778|2758659": ["\u2026Manivannan 2009], [Lee et al. 2010], [Willke et al. 2009], [Lin et al. 2010], [Karagiannis et al. 2011], [Spaho et al. 2011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012],\u2026", "\u2026[Lee et al. 2010], [Willke et al. 2009], [Lin et al. 2010], [Karagiannis et al. 2011], [Spaho et al. 2011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012], [Jayachandran et al. 2012],\u2026", "\u2026[Sichitiu and Kihl 2008], [Zeadally et al. 2012], [Jarupan and Ekici 2011], [Karagiannis et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012], [Dhamgaye and Chavhan 2013], [Araniti et\u2026", "\u20262008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014], [Al-Sultan et al.\u2026", "\u2026Laberteaux 2008], [Sichitiu and Kihl 2008], [Zeadally et al. 2012], [Jarupan and Ekici 2011], [Karagiannis et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012], [Dhamgaye and Chavhan\u2026", "\u2026and Kihl 2008], [Krishnamurthy 2008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014],\u2026"]} +{"8438778|2736673": ["\u20262009], [Lin et al. 2010], [Karagiannis et al. 2011], [Spaho et al. 2011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012], [Jayachandran et al. 2012], [Nagaraj and Dhamal 2012],\u2026"]} +{"8438778|1874975": []} +{"8438778|53605608": ["\u20262006], [Hartenstein and Laberteaux 2008], [Sichitiu and Kihl 2008], [Zeadally et al. 2012], [Jarupan and Ekici 2011], [Karagiannis et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012],\u2026"]} +{"8438778|1885014": ["\u20262008], [Schoch et al. 2008], [Hartenstein and Laberteaux 2008], [Sichitiu and Kihl 2008], [Krishnamurthy 2008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012],\u2026", "\u2026[Schoch et al. 2008], [Hartenstein and Laberteaux 2008], [Sichitiu and Kihl 2008], [Krishnamurthy 2008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012],\u2026"]} +{"8438778|763939": ["\u2026al. 2014], [Liu et al. 2015] Simulators and mobility models [Youse\ufb01 et al. 2006], [Luo and Hubaux 2006], [Li and Wang 2007], [Martinez et al. 2009], [Harri et al. 2009], [Spaho et al. 2011], [Bajare and Alvi 2013], [Al-Sultan et al. 2014], [Li and Li 2014] Propagation models [Hartenstein and\u2026", "\u20262014], [Liu et al. 2015] Simulators and mobility models [Youse\ufb01 et al. 2006], [Luo and Hubaux 2006], [Li and Wang 2007], [Martinez et al. 2009], [Harri et al. 2009], [Spaho et al. 2011], [Bajare and Alvi 2013], [Al-Sultan et al. 2014], [Li and Li 2014] Propagation models [Hartenstein and\u2026"]} +{"8438778|11210789": ["VANET routing protocols can be classi\ufb01ed as topology-based and position-based [Paul and Islam 2012; Allal and Boudjit 2013; Kumar and Dave 2011].", "\u20262011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012], [Jayachandran et al. 2012], [Nagaraj and Dhamal 2012], [Vinayakray-Jani and Sanyal 2012], [Panichpapiboon and Pattara-Atikom\u2026"]} +{"206584117|763939": ["Although mobility models [70] [71] [72] [73] have been well researched, most of them are developed for mobile Ad-hoc networks and do not consider social relations among nodes, causing that they can not evaluate social-aware routing protocols."]} +{"8841451|2835258": ["The former algorithm is a DTN variation of existing location-based greedy algorithms [11, 12] where the packet is forwarded to the neighbour that is closest to the destination (if closer than the position of the current carrier).", "A number of existing geographic routing protocols are available [13, 12]."]} +{"25506650|207718858": ["Despite of these contributions, previous works do not adequately consider the following two limitations: \u2022 Due to an infrequent encounter in sparse VANETs [19] or VSNs, 1 the candidate node with a better quality might not be available."]} +{"18604551|825893": []} diff --git a/edge/graph_35107515.jsonl b/edge/graph_35107515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf8dd5b2cb9acf24c88706f3393e2f0c02340bc7 --- /dev/null +++ b/edge/graph_35107515.jsonl @@ -0,0 +1,5 @@ +{"33610711|18190006": ["\u2026information systems research of examining the research literature itself to better understand the \u201cstate of play\u201d of research in the field, and to discern patterns in the development of the field [Culnan and Swanson, 1986; Alavi and Carlson, 1992; Banker and Kauffman, 2004; Wareham et al., 2005].", "RESEARCH METHOD There is an established tradition in information systems research of examining the research literature itself to better understand the \u201cstate of play\u201d of research in the field, and to discern patterns in the development of the field [Culnan and Swanson, 1986; Alavi and Carlson, 1992; Banker and Kauffman, 2004; Wareham et al., 2005]."]} +{"59679717|7876633": ["Applications E-Science Nurmi et al., 2009; Pallickara et al., 2008; Llora et al., 2008; Hazelhurst, 2008."]} +{"206079889|8813834": ["Others Introduction/foundational [16,21,29,46,58,76,95,96,104,108,114,126,129,133,143,148,163,165,166,168,171,175, 176,178,187,195,209,223,229,237,238,247,257,274,277,289] General usage [33,43,54,60,106,110,134,142,149,174,186,191\u2013193,221,231,233,240,242,243,250,251, 256,262,279] E.", "The authors gratefully acknowledge the Editor and reviewers' constructive comments on an earlier Table 5 Classification of reviewed literature Reference Applications Interorganizational systems [30] [36] [45] [49] [51] [61] [68] [70] [78] [79] [102] [112] [113] [120] [136] [146] [147] [170] [197] [199] [202] [204] [208] [210] [216] [224] [225] [245] [249] [254] [255] [261] [270] Electronic payment systems [23] [41] [50] [64] [138] [184] [226] [276] Financial services [42] [63] [137] Retailing [24] [34] [116] [119] [121] [157] [203] [212] [234] [275] [278] Publishing [77] [82] [124] [172] [182] [280] Auctions [135] [258] [285] [288] Intraorganizational EC [37] [59] [99] [139] [162] [211] [236] [273] Education and training [55] [71] [103] [161] [206] [215] [259] Marketing and advertising [53] [93] [128] [131] [183] [185] [198] [230] Other applications [48] [69] [89] Technological issues Security [18,19,31,32,40,72,80,83,84,86,101,105,109,150\u2013153,180,181,190,219,222,235,252, 264,265,267,272,281\u2013283,286,287] Technological component [56] [74] [75] [92] [159] [160] [177] [179] [213] [227] [232] [241] [284] Network technology [57] [97] [100] Support systems [20] [26] [39] [85] [117] [118] [122] [125] [130] [140] [144] [154] [164] [173] [194] [248] [260] [266] Methodology/algorithm [65] [66] [98] [115] [132] [155] [214] [246] [263] [271] Other technological issues [38] [145] Support and implementation Public policy Taxation [167] Legal issues [15] [52] [188] Privacy [25] [35] [62] [67] [205] [269] Fraud [28] Trust [111] [200] [201] Corporate strategy [17] [22] [27] [73] [81] [87] [88] [90] [91] [94] [107] [123] [127] [141] [156] [158] [169] [189] [196] [207] [217] [218] [220] [228] [239] [244] [253] Other support and implementation [44] [47] [268] Others Introduction/foundational [16] [21] [29] [46] [58] [76] [95] [96] [104] [108] [114] [126] [129] [133] [143] [148] [163] [165] [166] [168] [171] [175] [176] [178] [187] [195] [209] [223] [229] [237] [238] [247] [257] [274] [277] [289] General usage [33,43,54,60,106,110,134,142,149,174,186,191\u2013193,221,231,233,240,242,243,250,251, 256,262,279] H.K. Bhargava, R. Krishnan, R. M\u00fcller, Electronic commerce in decision technologies: a business cycle analysis, H.K. Bhargava, R. Krishnan, R. M\u00fcller, Decision support on demand: emerging electronic markets for decision technologies , Decision Support Systems 19 (3), 1997, pp. 193\u2013 214."]} +{"23813874|15516254": ["An exponential averaging rate estimator can be deployed at the marker similar to the study in [32] and the mark can be easily manipulated according to the estimated rate and the preset random loss probability as follows.", "These responsive applications mainly employ the TCP protocol [32]."]} +{"23813874|16570307": ["A gateway should be designed at the entrance of the cloud computing system [31]."]} diff --git a/edge/graph_35109549.jsonl b/edge/graph_35109549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..838fca9e31a134ec6a35e0c51e4a13116798787a --- /dev/null +++ b/edge/graph_35109549.jsonl @@ -0,0 +1,3 @@ +{"111172126|12083425": []} +{"12103882|17774971": []} +{"12103882|192934": []} diff --git a/edge/graph_35155258.jsonl b/edge/graph_35155258.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..286fff56ab224bec209cf1168ca3c1281cdf3b78 --- /dev/null +++ b/edge/graph_35155258.jsonl @@ -0,0 +1,5 @@ +{"62159629|27317885": ["[22] MS 2."]} +{"45733158|33644565": ["Brown and Grant (2005) specify that such IT decision structures are one form of IT governance."]} +{"23067893|35897447": ["Several studies also attempt to discern the reasons behind these conflicting rate-ofreturn observations across this body of research (e.g., Kohli and Devaraj 2003; Melville et al. 2004; Piccoli and Ives 2005).", "A major role of IT in competence-based theories is to support the creation and capture of value through digitally enhancing a firm's existing resources and capabilities and/or enabling new capabilities (Drnevich and Kriauciunas 2011; Piccoli and Ives 2005; Ray et al. 2004, 2005 ).", "A significant body of research has attempted to link firms' investments in information technology (IT) with overall competitive advantage in the pursuit of superior performance (Kohli and Devaraj 2003; Melville et al. 2004; Piccoli and Ives 2005).", "From reviews of the MIS literature (e.g., Piccoli and Ives 2005) we also observe that articles grounded in the analysis of IT resources, or focused on the use of IT to create ordinary, noncomplementary capabilities (i.e., functional competence-based perspectives) are a dominant theoretical\u2026", "\u2026strategy , as we develop in this study, should help scholars in both the MIS and Strategy disciplines to improve the methodology and consistency of empirical support for continued research on the IT\u2013strategy relationship (Kohli and Devaraj 2003; Melville et al. 2004; Piccoli and Ives 2005).", "Work on this topic in the MIS area is quite prevalent, with several hundred studies on the \" business value of IT \" documented in review articles (Kohli and Devaraj 2003; Melville et al. 2004; Piccoli and Ives 2005)."]} +{"7351928|33644565": ["Since then, research has produced various definitions of ITG, leading to a lack of clarity concerning the meaning of the term (Brown and Grant, 2005; Peterson, 2004; Webb et al., 2006)."]} +{"37099824|33644565": ["IT governance structure IT governance structure deals with the decision-making structures (or, decision loci) adopted for IT-related decisions (Brown & Grant, 2005).", "Consistent with the results of prior research on IT governance (Sambamurthy & Zmud, 1999; Weill, 2004; Brown & Grant, 2005), the patterns we observed across the three case studies allowed us to draw an inference that centralized IT decision structures are likely to be most prevalent within SMEs.", "Research on IT governance can be traced back to the 1960s (Brown & Grant, 2005) with researchers examining, among other issues, the nature of IT governance (Weill, 2004), structural options for IT governance (Jenkins & Santos, 1982; Zmud et al ., 1986) and the drivers of IT governance structural\u2026"]} diff --git a/edge/graph_35167928.jsonl b/edge/graph_35167928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4ea8a2dac652246aa05712c431272be99af8295 --- /dev/null +++ b/edge/graph_35167928.jsonl @@ -0,0 +1,5 @@ +{"1977245|7360895": []} +{"7360895|7185733": ["Two excellent overviews of vision-based gesture recognition are [124,166].", "[124] V."]} +{"7360895|7788290": ["A broad survey of human tracking is presented in [ 66 ].", "Passive sensors, such as CCD cameras, are cheap, require minimal infrastructure, and can be used for a wide range of perception tasks [2,36, 66 ,118]."]} +{"9778265|7360895": []} +{"38194190|7360895": ["Fong, Nourbakhsh, and Dautenhahn [13] envision social robots as \u201cembodied agents\u201d belonging to a heterogeneous group."]} diff --git a/edge/graph_35193663.jsonl b/edge/graph_35193663.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..534ff896e7d9f1866442b110e857184b26c12c25 --- /dev/null +++ b/edge/graph_35193663.jsonl @@ -0,0 +1 @@ +{"2093873|562855": ["Research into MAS organizations includes basic organizational concepts such as groups, communities, roles, functions [31,33,46,54,56,70]; organizational modeling [25,26,31,42]; Human Organization Theory [6,34]; structural topologies [8, 41 ]; and normative research, which includes the internal representation of norms [49], deontic logics [15,24], norm negotiation [12], and institutional approaches [29]."]} diff --git a/graph_3519414.jsonl b/edge/graph_3519414.jsonl similarity index 100% rename from graph_3519414.jsonl rename to edge/graph_3519414.jsonl diff --git a/edge/graph_35217690.jsonl b/edge/graph_35217690.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23ac31074349842ccfb294159bb5cb1326d5d98c --- /dev/null +++ b/edge/graph_35217690.jsonl @@ -0,0 +1,2 @@ +{"14847046|17652653": ["A detailed survey of paraphrase generation techniques can be found in (Androutsopoulos and Malakasiotis, 2010) and (Madnani and Dorr, 2010)."]} +{"8330264|17652653": ["Synonym extraction (Wu and Zhou, 2003), lexical substitution (McCarthy and Navigli, 2007) and paraphrasing (Madnani and Dorr, 2010) are related to collocation correction in the sense that they try to \ufb01nd semantically equivalent words or phrases."]} diff --git a/graph_3524264.jsonl b/edge/graph_3524264.jsonl similarity index 100% rename from graph_3524264.jsonl rename to edge/graph_3524264.jsonl diff --git a/graph_352559.jsonl b/edge/graph_352559.jsonl similarity index 100% rename from graph_352559.jsonl rename to edge/graph_352559.jsonl diff --git a/edge/graph_35259012.jsonl b/edge/graph_35259012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35260120.jsonl b/edge/graph_35260120.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08a94b85a35cdc016c47a2adfbc2ed1d07480eec --- /dev/null +++ b/edge/graph_35260120.jsonl @@ -0,0 +1,42 @@ +{"25479674|35260120": [", [11], with detailed comparison of different BackCom systems including energy sources, operating range, bandwidths, multiple access schemes."]} +{"25479674|12060835": ["Thus, it is highly desirable to power IoT nodes by ambient energy harvesting [1, 2, 3] or wireless power transfer (PT) [4, 5]."]} +{"6415983|3055684": []} +{"6415983|12029139": []} +{"3550281|22221919": ["NOMA is one of the major candidates in the design of radio access techniques for 5G [122]."]} +{"3550281|3461906": ["interference management and some open research challenges have been discussed in [18]."]} +{"3550281|21418": ["million connections per square metre [4]."]} +{"3550281|4122595": ["[90]."]} +{"3550281|3055684": ["[14] have discussed a variety of topics including"]} +{"3550281|12029139": ["If the power of signal processing noise is denoted by \u03c3 2 sp, the maximum ID rate of receiver j decoded from the source [11] i can be written as", "in RF EH, but due to the inverse-square law, RF energy transfer is limited in terms of its coverage range [11].", "In [11], a survey is presented based on current research in radio frequency EH networks (RF-EHNs).", "has attracted significant attention in wireless communication networks [10], [11].", "These works [7], [11], [13] have provided valuable insights into foundational aspects of", "When the same receiver is changed to ID mode, ID rate can be calculated using the following equation [11], where W and \u03c3 2 represent the transmission bandwidth and noise power, respectively.", "Only a few survey and overview articles directly related to SWIPT and EH have been published [3], [7], [11], [13]\u2013[23].", "available spectrum while providing fair and efficient sharing of the available spectrum while protecting the primary user from collision [11]."]} +{"12565952|12029139": ["Other applications of ambient backscatter are envisioned to include smart RFID tags with enhanced communication capabilities, large-scale commercial and industrial wireless sensor networks, as well as wireless body area network for health monitoring and medical applications [11], [12]."]} +{"110440|1230643": ["Current state-of-theart WSNs have been seemingly integrated into many aspects of every-day life and are constantly deployed for a plethora of monitoring and/or control applications in some of the most diverse fields [1]."]} +{"34944561|3504276": []} +{"23067717|12060835": ["promising results for outdoor environments with a high degree of harvestable power [3], the power consumption of traditional sensor nodes is not well suited for the relatively small amounts of available power in our indoor environments [4]."]} +{"16207412|20905429": ["The tiny energy budget combined with the simplicity of the hardware components needed to design backscatter-based sensors opens up a range of possibilities including micro-powered on-body sensors [52], miniature implantable sensors [51], thin and flexible wearables [39], and others."]} +{"15501047|17905276": ["\u2026and have great potentials to be developed into permanent embedded sensors for ageing infrastructure and life extension: e.g., railway track [202], power plant [203], aircraft [204], oil & gas structures [205] and pipelines [206], where reliable and accurate defect assessment and continuous\u2026"]} +{"679116|20905429": ["Finally, flexible patch sensors can be used to monitor temperature, sweat, ECG and other vital signs in real time [25, 49]."]} +{"2522347|4395259": []} +{"2522347|2357830": []} +{"53235098|6305682": []} +{"44087309|3461906": ["[38] focus on investigating the interference impact in EH systems,"]} +{"44087309|8606364": []} +{"44087309|3504276": ["enabled communication networks, for its appealing feature of increasing both wireless power and information transfer efficiency [18], [19].", "while [19] introduces a full performance survey of WPCNs."]} +{"44087309|12029139": ["communication systems [37], [40], we focus on wireless multiantenna EH system and its applications in physical layer", "has appeared after [37], that we want to cover in order to demonstrate the recent progress in this field."]} +{"44087309|12060835": ["been considered, like solar, piezoelectric, wind, hydroelectric, and wireless radio frequency (RF) signals EH [7]."]} +{"21997862|3504276": []} +{"4713237|12029139": ["Recently backscatter wireless sensor networks (WSNs), where a massive number of distributed sensors simultaneously perform backscatter communications for information transmission and radio frequency (RF) energy harvesting, have been attracting the upsurge of interests [1], [2].", "P EHTH is a minimum harvested power for the backscatter WSN [2] and SINR TH is a minimum SINR to overcome the smart interferenIce [10] and enable reliable backscatter communications."]} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"30662316|12029139": ["The circuit power consumption for the HTT protocol, bistatic scatter and ambient backscatter communication is set to -10dBm [1], -27dBm [11] and -36dBm [8], respectively.", "Recently many proposals for wireless powered communication networks (WPCNs) have been reported in literatures, especially in [1] - [4]."]} +{"3791170|12029139": ["Such a dual nature of electromagnetic interference has stimulated the upsurge of interest for communication systems powered by ambient energy harvested (see [5], [24] and references therein).", "The recent advance in RF energy harvesting technologies has paved the way for two emerging green communication technologies, namely, wireless-powered communications [5], [11] and ambient backscatter communications [12], [13].", "Recently, radio frequency (RF) energy harvesting [5], [6] has evolved as a promising energy replenishment solution to empower D2D communications with self-sustainability [7]\u2013[10].", "Recently, wireless-powered communications [5] have attracted much attention and have been applied in D2D communications to improve energy efficiency."]} +{"3791170|7644489": ["2Similar to [29], we assume that the hybrid transmitter decides the transmit frequency and indicates to the hybrid receiver through broadcasting in the preamble."]} +{"16238576|2357830": ["\u2026ratio (SNR) at the reader as A. Backscatter Physical Layer Security One of the most challenging tasks in backscatter systems, such as RFIDs, is the ability to secure the transmission against eavesdropping [1], [12], [13] when con\ufb01dential information needs to be sent from the tag to the reader.", "\u2026challenges, securing backscatter communication systems constitutes a key design issue due to the fact that malicious attacks, such as eaves-dropping, can lead not only to data interception but also to serious privacy breaches such as owner tracking or identity modi\ufb01cation, among others [12]."]} +{"21592099|12029139": ["The receiver sensitivity for the HTT protocol, BS and AB transmissions is set to \u221210dBm [1], \u221227dBm [29] and \u221236dBm [9], respectively.", "Recently many proposals for wireless-powered communication networks (WPCN) have been reported in literatures, especially in [1]\u2013[5]."]} +{"6282911|12029139": ["To circumvent this problem, radio frequency (RF) based energy harvesting has recently emerged to prolong the lifetime [1]."]} +{"3921134|3504276": ["W IRELESS communication powered by ambient or dedicated radio-frequency (RF) sources has drawn significant attention recently [1], [2]."]} +{"4717556|4626744": ["It is well known that a generic bilevel programming problem is strongly NP-hard, even when checking the local optimality of a strategy with both levels\u2019 objective functions being quadratic [28].", "[28]), in what follows, we are able to implement a directional ascent-based method for the SE computation, which allows the follower sub-game NE to be solved as a nested problem in a distributed manner."]} +{"4717556|12029139": ["1) Resource Allocation in RF-Powered CR Networks: In the past few years, a great amount of effort has been put in the study of the techniques for RF-powered CR networks (see [6] and the references therein)."]} +{"4717556|8974063": ["INTRODUCTION Thanks to the development in Cognitive Radio (CR) technologies, recently Dynamic Spectrum Access (DSA) has seen tremendous advancements in improving the efficiency of Radio Frequency (RF) spectrum management [1].", "Meanwhile, with the proliferation of low-power networks such as Internet of Things (IoT), green powered CR networks with the capabilities of energy harvesting have also drawn the focus of research in addition to the studies on RF efficiency [1].", "In addition, the functionalities required by ambient backscatter such as carrier sensing and distributed Multiple Access Control (MAC) protocol [4] are ready-to-access in CR networks [1]."]} +{"8639012|3055684": ["Another recent survey in [10] provides an overview of self-sustaining wireless communications with different energy harvesting techniques, from the perspective of", "Unlike [10], this survey focuses on the wireless charging strategies in communication networks with wireless energy"]} +{"8639012|12029139": ["Survey Scope Main Contribution [9] Wireless network with RF energy harvesting Review of i) fundamentals and circuit design for RF energy harvesting, ii) resource allocation schemes and communication protocols for various types of RF-powered wireless network, and iii) practical challenges and future directions.", "5) Near-field SWIPT System: As afore-introduced, SWIPT (see [9] and references therein) has been broadly investigated in RF-based wireless communication systems.", "A more detailed review on the conversi on efficiency of RF energy harvester implementations can be found in [9], [14].", "The reader can r efer to [9] for more detailed information about recent advances in radiative charging system.", "This survey differs from [9] in the following aspects: this survey i) covers various major wireless charging techniques, namely, inductive coupl ing, magnetic resonance coupling and RF/microwave radiation, from fundamental principles to their applications, ii) rev iews the existing international standards, commercialization and implementations, and iii) emphasizes on the transmitter-s ide (i.", "Our prev ious work in [9] presented a review of research issues in RFpowered wireless networks with the focus on the receiver-si de (i."]} +{"8639012|12681089": ["The far-field RF propagation models are well known in literatures [230], [231]."]} +{"8639012|12060835": ["In [12], the authors gave an overview of the sensor nodes powered by", "Existing literatures [12]\u2013[14] also presented relevant reviews"]} diff --git a/graph_3527510.jsonl b/edge/graph_3527510.jsonl similarity index 100% rename from graph_3527510.jsonl rename to edge/graph_3527510.jsonl diff --git a/graph_3529917.jsonl b/edge/graph_3529917.jsonl similarity index 100% rename from graph_3529917.jsonl rename to edge/graph_3529917.jsonl diff --git a/edge/graph_35312411.jsonl b/edge/graph_35312411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0ce7993e78ab82f49b56dac8b2a5b4d56beff44 --- /dev/null +++ b/edge/graph_35312411.jsonl @@ -0,0 +1 @@ +{"7447615|9316331": []} diff --git a/edge/graph_35350001.jsonl b/edge/graph_35350001.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3535777.jsonl b/edge/graph_3535777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3536399.jsonl b/edge/graph_3536399.jsonl similarity index 100% rename from graph_3536399.jsonl rename to edge/graph_3536399.jsonl diff --git a/edge/graph_35376744.jsonl b/edge/graph_35376744.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0dc5f51da2f429155fb679d5afe2d5547b68d24f --- /dev/null +++ b/edge/graph_35376744.jsonl @@ -0,0 +1,2 @@ +{"8787458|60455": ["[10]\nEvolutionary Step Business Question Enabling Technologies Product Providers Characteristics\nData Collection (1960s)\n\u201cWhat was my total revenue\nComputer, Tapes, Disks\nIBM,CDC Retrospective, Static data delivery\n___________________________________ 978-1-4244 -8679-3/11/$26.00 \u00a92011 IEEE\nB.\u2026"]} +{"8787458|3102110": ["[1] [12] New approaches should be used which better fit the properties of Web data."]} diff --git a/edge/graph_353822.jsonl b/edge/graph_353822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3538708.jsonl b/edge/graph_3538708.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35396047.jsonl b/edge/graph_35396047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3540699.jsonl b/edge/graph_3540699.jsonl similarity index 100% rename from graph_3540699.jsonl rename to edge/graph_3540699.jsonl diff --git a/edge/graph_35411853.jsonl b/edge/graph_35411853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35426346.jsonl b/edge/graph_35426346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3543288.jsonl b/edge/graph_3543288.jsonl similarity index 100% rename from graph_3543288.jsonl rename to edge/graph_3543288.jsonl diff --git a/edge/graph_35443023.jsonl b/edge/graph_35443023.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3544458.jsonl b/edge/graph_3544458.jsonl similarity index 100% rename from graph_3544458.jsonl rename to edge/graph_3544458.jsonl diff --git a/edge/graph_35445699.jsonl b/edge/graph_35445699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61467aa40da03eb17b13e96a198603b0d8c174b4 --- /dev/null +++ b/edge/graph_35445699.jsonl @@ -0,0 +1,17 @@ +{"1665247|1230643": ["They have a wide range of applications, from military to civil, that may be realized by using different type of sensor devices with different capabilities for different kinds of environments [1]."]} +{"39780440|1236072": [", sensor\u2019s failure and battery depletion) [2, 3]."]} +{"61978026|1230643": []} +{"18749275|1236072": ["By organizing wireless sensor nodes into clusters, energy dissipation is reduced by decreasing the number of nodes involved in long distance transmission [1]."]} +{"5098464|1230643": []} +{"26607848|17818556": []} +{"26607848|1940388": []} +{"42629128|62453632": []} +{"18754510|17818556": ["In addition, the radius of the source-node\u2019s group will also strongly affect the performance of CL-MIP algorithm, the optimal value is not measured or analysed explicitly [5].", "Itinerary planning for multiple mobile agents in WSNs, should consider the following three questions in relation to SIP [5]:"]} +{"15576441|1230643": ["from the surrounding environment, (ii) processing (and possibly storing) the acquired data, and (iii) transfering them through wireless communications to a data collection point called a sink node or base station [Akyildiz et al. 2002].", "\u2026\n 7:2 M. Di Francesco et al. from the surrounding environment, (ii) processing (and possibly storing) \nthe acquired data, and (iii) transfering them through wireless communications to a data collection point \ncalled a sink node or base station [Akyildiz et al. 2002]."]} +{"15576441|1708582": ["Approaches to ME discovery based on reinforcement learning, a form of unsupervised learning in the field of artificial intelligence [Kaelbling et al. 1996], were considered in Dyo and Mascolo [2008] and Di Francesco et al.", "Approaches to ME discovery based on reinforcement \nlearning, a form of unsuper\u00advised learning in the .eld of arti.cial intelligence [Kaelbling et al. 1996], \nwere consid\u00adered in Dyo and Mascolo [2008] and Di Francesco et al. [2010] for sparse WSNs."]} +{"45277381|1230643": []} +{"5867043|12817488": ["18 the network as the performance of the routing protocols is dramatically affected by a more real physical layer [15].", "Varshney [15] have presented a comprehensive survey of data aggregation algorithms in wireless sensor networks."]} +{"30815117|206901977": ["[23] Along this line, data fusion techniques have been developed to enable energy and spectral savings through aggregating raw data at intermediate SNs and forwarding only higher-level information."]} +{"30815117|17818556": ["However, SIP algorithms do not scale on larger deployments (traveling MAs accumulate data from visited SNs; thus, the end-to-end delay and the overall energy expenditure grow rapidly as the network scale increases[8, 16])."]} +{"9354361|17818556": ["This is because both the MA\u2019s roundtrip delay and the energy consumption increase fast with network size, as the traveling MA accumulates data from visited sensors [26,27]."]} +{"10092023|12817488": ["At each round, one of the SNs on the chain acts as a leader and sends the data collected from all other SNs directly to the base station."]} diff --git a/graph_3545877.jsonl b/edge/graph_3545877.jsonl similarity index 100% rename from graph_3545877.jsonl rename to edge/graph_3545877.jsonl diff --git a/graph_3546180.jsonl b/edge/graph_3546180.jsonl similarity index 100% rename from graph_3546180.jsonl rename to edge/graph_3546180.jsonl diff --git a/edge/graph_35462776.jsonl b/edge/graph_35462776.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e26c1b94069e7d7f1060afe80d8d8d41ec8ffdb8 --- /dev/null +++ b/edge/graph_35462776.jsonl @@ -0,0 +1,6 @@ +{"85552391|1113420": ["aware systems with mobile devices has the potential to increase the usability of services to be delivered [ 8 ]."]} +{"427520|1113420": ["\u2014 Context-aware computing [Schilit et al. 1994; Chen and Kotz 2000; Smailagic et al. 2001; Baldauf et al. 2006] refers to computing that adapts to the environment.", "Context-aware computing [Schilit et al. 1994; \nChen and Kotz 2000; Smailagic et al. 2001; Baldauf et al. 2006] refers to computing that adapts to the \nenvironment."]} +{"427520|44944144": ["On the \ncontrary, in ad hoc computing [Sesay et al. 2004] a network is estab\u00adlished temporarily and on demand \namong the mobile devices, without relying on .xed computers connected to a wired network.", "On the contrary, in ad hoc computing [Sesay et al. 2004] a network is established temporarily and on-demand among the mobile devices, without relying on fixed computers connected to a wired network."]} +{"427520|2451860": ["Due to these factors, early work in the .eld of mobile computing \nemphasized that classical computing techniques are insuf.cient and must be adapted to the new environment \n[Imielinski and Nath 1993; Imielinski 1996a; Pitoura and Samaras 1998; Jing et al. 1999; Barbar\u00b4 a 1999].", "This type of mobility is located within the mobile \ncomputing frame\u00adwork, which \u00b7\u00b7\u00b7 no longer requires users to maintain a .xed and universally known position \nin the network and enables unrestricted mobility of the users [Barbar\u00b4 a 1999, p. 108].", "\u2026whether in the \nreceive, transmit, or idle state [Anastasi et al. 2003], it is still important to minimize transmissions \ndue to the asymmetric communication bandwidth [Barbar\u00b4 a 1999]: there is more band\u00adwidth available from \nthe server to the mobile clients than from the clients to the server.", "\u2026\ngreat economical bene.ts, it also opens up new research issues for data management, due to the need for \nadapting existing tech\u00adniques to the mobile environment [Imielinski and Nath 1993; Alonso and Korth 1993; \nForman and Zahorjan 1994; Imielinski 1996a; Pitoura and Samaras 1998; Barbara\u00b41999].", "Looking beyond the details of the specific wireless technology, the generally accepted mobile environment infrastructure [Dunham and Helal 1995; Pitoura and Samaras 1998; Barbar\u00e1 1999; Pitoura and Samaras 2001] is composed of mobile hosts (MHs) and base stations (BSs).", "Looking \nbeyond the details of the speci.c wireless technology, the generally accepted mobile environment infrastructure \n[Dunham and Helal 1995; Pitoura and Samaras 1998, 2001; Barbar\u00b4 a 1999] is composed of mobile hosts (MHs) \nand base stations (BSs).", "] no longer requires users to maintain a fixed and universally known position in the network and enables unrestricted mobility of the users\u201d [Barbar\u00e1 1999].", "2003], it is still important to minimize transmissions due to the asymmetric communication bandwidth [Barbar\u00e1 1999]: There is more bandwidth available from the server to the mobile clients than from the clients to the server.", "Due to these factors, early works in the field of mobile computing emphasize that classical computing techniques are insufficient and must be adapted to the new environment [Imielinski and Nath 1993; Imielinski 1996a; Pitoura and Samaras 1998; Jing et al. 1999; Barbar\u00e1 1999]."]} +{"9117305|35462776": []} +{"9117305|1113420": ["K \u2192 [1-9] [0-9]* Class-name \u2192 \u201c String \u201d /* Name of a class of objects */", "ticipate user\u2019s needs and to customize the user\u2019s experience [5,9,14]."]} diff --git a/edge/graph_35487019.jsonl b/edge/graph_35487019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e717264f1121995535c562f1f9dc171e8b4c2be --- /dev/null +++ b/edge/graph_35487019.jsonl @@ -0,0 +1 @@ +{"23677758|11112426": ["The hyperspectral literature features plenty of such algorithms [9]."]} diff --git a/graph_3549831.jsonl b/edge/graph_3549831.jsonl similarity index 100% rename from graph_3549831.jsonl rename to edge/graph_3549831.jsonl diff --git a/edge/graph_3551655.jsonl b/edge/graph_3551655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3552154.jsonl b/edge/graph_3552154.jsonl similarity index 100% rename from graph_3552154.jsonl rename to edge/graph_3552154.jsonl diff --git a/edge/graph_3552171.jsonl b/edge/graph_3552171.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3553112.jsonl b/edge/graph_3553112.jsonl similarity index 100% rename from graph_3553112.jsonl rename to edge/graph_3553112.jsonl diff --git a/edge/graph_35541036.jsonl b/edge/graph_35541036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3555631.jsonl b/edge/graph_3555631.jsonl similarity index 100% rename from graph_3555631.jsonl rename to edge/graph_3555631.jsonl diff --git a/graph_355736.jsonl b/edge/graph_355736.jsonl similarity index 100% rename from graph_355736.jsonl rename to edge/graph_355736.jsonl diff --git a/graph_3557411.jsonl b/edge/graph_3557411.jsonl similarity index 100% rename from graph_3557411.jsonl rename to edge/graph_3557411.jsonl diff --git a/graph_3558190.jsonl b/edge/graph_3558190.jsonl similarity index 100% rename from graph_3558190.jsonl rename to edge/graph_3558190.jsonl diff --git a/graph_3562222.jsonl b/edge/graph_3562222.jsonl similarity index 100% rename from graph_3562222.jsonl rename to edge/graph_3562222.jsonl diff --git a/edge/graph_35665670.jsonl b/edge/graph_35665670.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1456092ddd8d88b2d243d08be6f39d7712ade08 --- /dev/null +++ b/edge/graph_35665670.jsonl @@ -0,0 +1,5 @@ +{"12674830|14140377": ["There is a large body of work on temporal data management including relational databases (see, for example [10] and [12] for excellent surveys on the topic), RDF (e."]} +{"4626581|14140377": ["We won\u2019t attempt to present a exhaustive survey of that work, but instead refer the reader to several surveys and books on this topic [7, 31, 23, 34, 9, 32, 27]."]} +{"1951546|16449507": []} +{"6354728|14140377": ["There is a large body of work on temporal data management including relational databases (see, for example [14] and [16] for excellent surveys on the topic), RDF (e.g., [5]) and XML documents (e.g., [12], [2])."]} +{"17006401|14140377": ["A vast amount of work has been done on temporal data management including Temporal Relational Databases TRD [11][12][13]."]} diff --git a/edge/graph_3567579.jsonl b/edge/graph_3567579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35695099.jsonl b/edge/graph_35695099.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06be43ff0d8a28f6b37ede8b4d48d445019f7b74 --- /dev/null +++ b/edge/graph_35695099.jsonl @@ -0,0 +1,11 @@ +{"1241484|41035405": []} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"7346954|3054454": ["In order to make the simulation more realistic, we use Lee\u2019s channel model described in [27] to generate RTx and RRx."]} +{"5566995|2509135": ["Nowadays this enthusiasm still holds on and experts expect more than ever a rapid growth of CR, coming along with additional bandwidth, reliability and versatility for future wireless communication [6, 7]."]} +{"59993342|2509135": []} +{"59993342|7482876": []} +{"59993342|13367219": []} +{"59993342|1708582": []} diff --git a/edge/graph_35697345.jsonl b/edge/graph_35697345.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00f70c7792eab2d5c6c9c2589ff646d8320b38fc --- /dev/null +++ b/edge/graph_35697345.jsonl @@ -0,0 +1,2 @@ +{"29130415|64292": ["( 2006a , b ) presented a state-of-the-art survey on agent-based, distributed manufacturing process planning and scheduling."]} +{"111202779|27119055": []} diff --git a/edge/graph_357173.jsonl b/edge/graph_357173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35752597.jsonl b/edge/graph_35752597.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35768454.jsonl b/edge/graph_35768454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..236521b3ec3567fb862b4191a0c8cd028c6d96b6 --- /dev/null +++ b/edge/graph_35768454.jsonl @@ -0,0 +1,3 @@ +{"15555223|8363289": ["The terminal constraint set is typically used to guarantee both feasibility and convergence [50]."]} +{"16488380|4680026": []} +{"1851307|6336539": ["recently [8], [40] and [9] and the references therein."]} diff --git a/graph_3577500.jsonl b/edge/graph_3577500.jsonl similarity index 100% rename from graph_3577500.jsonl rename to edge/graph_3577500.jsonl diff --git a/graph_3578825.jsonl b/edge/graph_3578825.jsonl similarity index 100% rename from graph_3578825.jsonl rename to edge/graph_3578825.jsonl diff --git a/graph_3579945.jsonl b/edge/graph_3579945.jsonl similarity index 100% rename from graph_3579945.jsonl rename to edge/graph_3579945.jsonl diff --git a/graph_3579946.jsonl b/edge/graph_3579946.jsonl similarity index 100% rename from graph_3579946.jsonl rename to edge/graph_3579946.jsonl diff --git a/edge/graph_35824277.jsonl b/edge/graph_35824277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3583771.jsonl b/edge/graph_3583771.jsonl similarity index 100% rename from graph_3583771.jsonl rename to edge/graph_3583771.jsonl diff --git a/edge/graph_3583921.jsonl b/edge/graph_3583921.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35839210.jsonl b/edge/graph_35839210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35846681.jsonl b/edge/graph_35846681.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ca5395ab36ab037b1ad3992937f7e389e9c56e7 --- /dev/null +++ b/edge/graph_35846681.jsonl @@ -0,0 +1,3 @@ +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"1203550|17623572": ["malicious attacks such as black hole attacks (Tseng et al., 2011) increase."]} diff --git a/edge/graph_35867035.jsonl b/edge/graph_35867035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35877090.jsonl b/edge/graph_35877090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35897447.jsonl b/edge/graph_35897447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3590091.jsonl b/edge/graph_3590091.jsonl similarity index 100% rename from graph_3590091.jsonl rename to edge/graph_3590091.jsonl diff --git a/edge/graph_35906806.jsonl b/edge/graph_35906806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3590989.jsonl b/edge/graph_3590989.jsonl similarity index 100% rename from graph_3590989.jsonl rename to edge/graph_3590989.jsonl diff --git a/edge/graph_35937139.jsonl b/edge/graph_35937139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dddf0115f3008c171ae464142665d56841a5d960 --- /dev/null +++ b/edge/graph_35937139.jsonl @@ -0,0 +1,5 @@ +{"52245113|15683871": ["Heritage documentation naturally benefits from these developments, as it complements terrestrial techniques (Barsanti et al., 2014; Nex and Remondino, 2014)."]} +{"129762976|206051485": ["The term image correlation is often used for area-based feature-matching methods applying a moving window of a predefined size for the correspondence estimation (Zitov\u00e1 and\nFlusser 2003).", "Image correlation techniques are widely used in remote sensing, medical imaging, and computer vision (Zitov\u00e1 and Flusser 2003)."]} +{"39766406|8983048": ["The scans registration is generally done in two steps: (a) a pair-wise manual or automatic coarse alignment using targets or few homologues features and (b) final global alignment based on iterative closest points [112] or least squares method procedures [113]."]} +{"42085963|7624176": ["During the last two decades, different methods were developed to solve the visibility problem in the field of computer graphics for real-time rendering and compute games (Bittner and Wonka, 2003; Cohen-Or et al., 2003)."]} +{"1051825|3330313": ["Hodges and Austin [18] concluded: there is no single universally applicable or generic outlier detection approach.", "These also depend on application areas, which include information systems, network systems, news documentation, industrial machines, and video surveillance [17, 18, 20, 27, 36-39].", "Several survey papers [15, 18, 20, 43] have been published in the last decade that explored a variety of algorithms covering the full range of statistics, machine learning and data mining techniques.", "Despite recent progress in pattern recognition, statistics, computer vision, data mining and machine learning techniques for processing point data, the problem of outlier (specially clustered outliers) detection in unstructured point clouds is still a challenging task [7, 14, 17-20]."]} diff --git a/edge/graph_35981896.jsonl b/edge/graph_35981896.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35983555.jsonl b/edge/graph_35983555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_359842.jsonl b/edge/graph_359842.jsonl similarity index 100% rename from graph_359842.jsonl rename to edge/graph_359842.jsonl diff --git a/edge/graph_3598420.jsonl b/edge/graph_3598420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_35990525.jsonl b/edge/graph_35990525.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3603947.jsonl b/edge/graph_3603947.jsonl similarity index 100% rename from graph_3603947.jsonl rename to edge/graph_3603947.jsonl diff --git a/graph_3604741.jsonl b/edge/graph_3604741.jsonl similarity index 100% rename from graph_3604741.jsonl rename to edge/graph_3604741.jsonl diff --git a/graph_3605810.jsonl b/edge/graph_3605810.jsonl similarity index 100% rename from graph_3605810.jsonl rename to edge/graph_3605810.jsonl diff --git a/edge/graph_3608506.jsonl b/edge/graph_3608506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36106290.jsonl b/edge/graph_36106290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e9e0ae008c14592397ea49e50a6d0bcf1e48855 --- /dev/null +++ b/edge/graph_36106290.jsonl @@ -0,0 +1,4 @@ +{"206592484|456491": []} +{"17445560|14808716": []} +{"206767722|8601873": ["[89], [90], [91], but adapted to our weakly supervised scenario using a formulation (given by Equation (5)) similar to multiple instance learning [92], [93], [94]."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} diff --git a/edge/graph_3610740.jsonl b/edge/graph_3610740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36107807.jsonl b/edge/graph_36107807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36124856.jsonl b/edge/graph_36124856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3615017.jsonl b/edge/graph_3615017.jsonl similarity index 100% rename from graph_3615017.jsonl rename to edge/graph_3615017.jsonl diff --git a/graph_3615486.jsonl b/edge/graph_3615486.jsonl similarity index 100% rename from graph_3615486.jsonl rename to edge/graph_3615486.jsonl diff --git a/edge/graph_36155292.jsonl b/edge/graph_36155292.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f8ff1fff2ea7fd30abde50db6ca090dbd98d446f --- /dev/null +++ b/edge/graph_36155292.jsonl @@ -0,0 +1,2 @@ +{"62377425|17323154": []} +{"118090526|15744805": ["Fourthly, based on our studies presented in Chapters 2, 3 and 4, we propose in Chapter 5 a joint generative-discriminative modelling (JGD) approa ch to classification, by partitioning variables into two subsets based on statistical tests of the DGP. Our JGD approach adopts statistical tests, such as normality tests, of the assumed D GP for each variable to justify the use of generative approaches for the variables which satisf y the tests and of discriminative approaches for other variables. Such a partition of variabl es and a combination of generative and discriminative approaches are derived in a probabilist ic ra her than a heuristic way. We have concentrated on particular choices for the generative nd discriminative components of our models, but the overall principle is quite general and ca n accommodate many other special versions. Of course, we must ensure that the assumptions und erlyi g the resulting generative classifiers can be tested statistically. Numerical results from real UCI and gene-expression data and from simulated data demonstrate promising performance of this new approach for practical application to both low- and high-dimensional data. Fifthly, in Chapter 6, we study the assumption of \u201cmutual inf ormation independence\u201d, which is used by Zhou (2005) for deriving the so-called discr iminative hidden Markov model (D-HMM).", "Fourthly, based on our studies presented in Chapters 2, 3 and 4, we propose in Chapter 5 a joint generative-discriminative modelling (JGD) approa ch to classification, by partitioning variables into two subsets based on statistical tests of the DGP. Our JGD approach adopts statistical tests, such as normality tests, of the assumed D GP for each variable to justify the use of generative approaches for the variables which satisf y the tests and of discriminative approaches for other variables. Such a partition of variabl es and a combination of generative and discriminative approaches are derived in a probabilist ic ra her than a heuristic way. We have concentrated on particular choices for the generative nd discriminative components of our models, but the overall principle is quite general and ca n accommodate many other special versions. Of course, we must ensure that the assumptions und erlyi g the resulting generative classifiers can be tested statistically. Numerical results from real UCI and gene-expression data and from simulated data demonstrate promising performance of this new approach for practical application to both low- and high-dimensional data. Fifthly, in Chapter 6, we study the assumption of \u201cmutual inf ormation independence\u201d, which is used by Zhou (2005) for deriving the so-called discr iminative HMM (D-HMM)."]} diff --git a/edge/graph_36158642.jsonl b/edge/graph_36158642.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dca1ee0fff0854fc0864f49acef068fc2d8976c2 --- /dev/null +++ b/edge/graph_36158642.jsonl @@ -0,0 +1 @@ +{"26739416|9504064": []} diff --git a/graph_3616480.jsonl b/edge/graph_3616480.jsonl similarity index 100% rename from graph_3616480.jsonl rename to edge/graph_3616480.jsonl diff --git a/graph_3617237.jsonl b/edge/graph_3617237.jsonl similarity index 100% rename from graph_3617237.jsonl rename to edge/graph_3617237.jsonl diff --git a/edge/graph_36177835.jsonl b/edge/graph_36177835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77fa3f9070bed5219b4eb7ec2e58e963ed2d9a31 --- /dev/null +++ b/edge/graph_36177835.jsonl @@ -0,0 +1,22 @@ +{"16513379|10837932": ["Since then, numerous ETE schemes have been developed and summarized in the two surveys [3] and [4].", "In recent years, a number of Energy-aware Traffic Engineering (ETE) schemes have been developed in order to reduce the energy consumption of backbone networks [3][4][8][9][11][12].", "We evaluate the performance of GLA on top of different ETE schemes ([3][4][8][9]) by using the operational network topology, G\u00c9ANT and its published traffic matrices [28]."]} +{"16513379|3994942": ["On the other hand, load-balancing has been a common objective of plain traffic engineering in computer networks, and numerous schemes have been developed towards this objective [5]."]} +{"6632570|10837932": ["Starting from the seminal work [6], the problem of reducing power consumption in telecommunication networks has been widely studied in the last years (see [7] for an overview)."]} +{"154032|193574": []} +{"154032|10837932": []} +{"15297427|1580493": ["Furthermore, elastic optical networks offer transmission in finer granularity and flexibility in spectrum allocation [6]."]} +{"16809905|2623404": ["In this work, to avoid delay communication between routers and the centralized controller, we consider the default rule which is just to forward packets to a default port (without contacting the controller), and each switch has exactly one default port [28]."]} +{"16809905|10837932": ["Therefore the green networking has been attracting a growing attention during the last years (see the survey [2]).", "Starting from the pioneering work of Gupta [10], the idea of power proportionality has gained a growing attention in networking research area [2][6]."]} +{"18042732|3994942": ["Power saving mechanisms based on network and topology control are currently founded on the extension of traffic engineering and routing criteria to use (see [78] for a recent survey"]} +{"13150903|10686346": ["Some proposals have investigated how to limit the instabilities caused by the transition between old and new configurations in a network environment operated with the standard OSPF protocol: a great attention was devoted to design weights update policies to avoid routing loops and route instability (see [45] for a general survey and [46] or [47] for EANM related work)."]} +{"13150903|3994942": ["(MPLS), each traffic demand (identified by source and destination pair) is routed along one or multiple dedicated paths [35]."]} +{"6877130|10837932": []} +{"276122|10837932": ["It should be noted that network configurations based on one single traffic matrix are not sufficiently robust in dealing with traffic dynamics, as this has been indicated in conventional traffic engineering paradigms [30].", "The principle of ETE was first introduced in [29], and there has been a comprehensive introduction and analysis of existing ETE solutions in [30] and [31]."]} +{"276122|3994942": ["Furthermore, offline ETE solutions can make use of global optimization methods because of their long timescale and this will result in more predictable network behavior compared to the case where local optimization methods are used by online ETE solutions [33]."]} +{"18843804|2623404": ["The first aim is to describe the basic issues, the technical approaches, and the methodologies for the implementation of power management primitives in the context of the emerging Software Defined Networking (SDN) architectures [8], [9]."]} +{"6598702|10837932": ["Therefore, telecom operators and Internet service providers (ISP) have raised their interest in energy efficiency for backbone networks (see the surveys [5,6])."]} +{"15772363|582949": []} +{"18124887|10837932": []} +{"41341919|10837932": ["Many current green networking techniques have been committed to make the energy consumption figures proportional against their utilization level (Bianzino et al., 2012).", "\u2026Applications (2015), http://dx.doi.org/10.1016/j.jnca.2015.07.016i\ninfrastructure with the sole purpose of taking over the duty when another device fails, further adding to the overall energy consumption; however, these objectives are underutilized during normal operation (Bianzino et al., 2012).", "As a solution to this problem, green technologies are devoted to make the energy consumption nearly proportional to the traffic load through approaches, such as resource consolidation and selective connectedness (Bianzino et al., 2012).", "The issue of energy managing mechanisms exploiting network-specific features, such as in an ad hoc network, that must be added into wired network is referred to as green networking (Bianzino et al., 2012)Q3 .", "By Bianzino et al. (2012), Networking infrastructure involves high-performance and high-availability machines.", "Moreover, the redundancy of network equipment is neglected,\nwhich is a strong assumption as the redundant devices are not fully passive (Bianzino et al., 2012).", "Traditionally, networking systems are designed and dimensioned according to principles that are inherently in opposition with green networking objectives: namely, over-provisioning and redundancy, which cause overall energy consumption (Bianzino et al., 2012)."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"14735681|10837932": ["In the literature, different approaches have been proposed to reduce the gap between the capacity offered by the network and the resources consumed by users (see [4,6] for an overview)."]} +{"27251087|1580493": []} diff --git a/graph_3619135.jsonl b/edge/graph_3619135.jsonl similarity index 100% rename from graph_3619135.jsonl rename to edge/graph_3619135.jsonl diff --git a/graph_3619728.jsonl b/edge/graph_3619728.jsonl similarity index 100% rename from graph_3619728.jsonl rename to edge/graph_3619728.jsonl diff --git a/edge/graph_36225104.jsonl b/edge/graph_36225104.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36250251.jsonl b/edge/graph_36250251.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a49cbdf309526337fe42f1f5aea117d0568597a3 --- /dev/null +++ b/edge/graph_36250251.jsonl @@ -0,0 +1,15 @@ +{"58985719|3241708": ["At the end of the period, a subset of submissions is selected, and the corresponding workers are granted the reward by the requesters [12].", "The crowdsourcing site exhibits a list of available tasks, associating with reward and time period, that are presented by requesters; and during the period, workers compete to provide the best submission [12].", "10 and less, most of the tasks are usually also offered in chunks to multiple AMT workers [12,20]."]} +{"13809820|7774517": ["runs an outlier detection algorithm [28] to detect possibly altered data so that trustworthiness of the"]} +{"18514801|9060471": ["To tackle the challenge of discovering both true information and user reliability, truth discovery methods [26, 27, 28, 44, 47] have been proposed based on the principle that reliable users tend to report true information and truth should be reported by many reliable users."]} +{"25568949|3241708": ["The literature shows that incentivizing people to participate in crowdsourcing projects has always been a challenge [10, 11].", "As it is beyond the scope of this article to provide an in-depth discussion of crowdsourcing, we refer to recent surveys by [10, 11] as an outline and a list of applications."]} +{"8980445|18973396": []} +{"8980445|3241708": ["In areas distinct from information security literature studies on crowdsourcing have already been conducted, such as data mining [43], software engineering [23], collaborative software development platforms [29], and other areas [14], [27], [45], [45], [47], [48].", "getting a global picture of crowdsourcing systems on the Web [6], analyzing crowdsourcing methods [5], assessing the task complexity [25], focusing on the organizational perspective and on the available mechanism [12], or identifying the building blocks of crowdsourcing approaches [47]."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"38331500|1333339": ["Trust evaluation is the subject of research efforts in different computer science domains, such as commercial and on-line applications [7], mobile adhoc networks [4], and wireless communications [13]."]} +{"38331500|9240891": ["Trust is commonly defined as the belief in the competence of an entity to act reliably to perform her functionality [5].", "In those domains, systems compute the trust on an entity as the belief that the entity will act cooperatively and reliably to accomplish a collective objective [5]."]} +{"15266163|9060471": ["As a result, truth discovery [13] is an important technique for enabling reliable crowdsourcing applications."]} +{"5183920|7774517": ["Upon receiving each sensor reading, the cloud platform runs an outlier detection algorithm [14]."]} +{"11620079|9060471": ["Truth discovery methods [34] try to solve this problem by inferring both the source reliability and entity truths.", "These methods can be roughly divided into three categories [34]: iterative methods [12, 15, 40, 51], probabilistic model based methods [41,47,48,52,53], and optimizationbased methods [31, 32, 35, 46].", "To tackle this challenge, some truth discovery methods [32, 34, 51] have been proposed to simultaneously estimate true values and user reliability from crowdsourced data."]} +{"62285505|3241708": [", crowdsourcing voting [1]), the aggregation results are the summary statistics of all contributed data."]} +{"34080347|7774517": ["With data collection as the core mission, reliability issues of collected data in WSNs [12,13] have been well studied [14] ."]} +{"23250087|7774517": ["A non-positive (inaccurate) reading is detected by running an outlier detection algorithm [15] once all sensor readings are collected at the end of the auction."]} diff --git a/edge/graph_36254019.jsonl b/edge/graph_36254019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3625557.jsonl b/edge/graph_3625557.jsonl similarity index 100% rename from graph_3625557.jsonl rename to edge/graph_3625557.jsonl diff --git a/edge/graph_36256344.jsonl b/edge/graph_36256344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4919137c223bdcda3f40cea5d378061fce1bd6a9 --- /dev/null +++ b/edge/graph_36256344.jsonl @@ -0,0 +1,10 @@ +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"4271401|1708582": []} +{"2630642|1708582": []} +{"58320542|14441987": ["The dynamics of wireless ad hoc networks as a consequence of mobility and disconnection of mobile hosts pose a number of problems in designing proper routing schemes for effective communication between any source and destination [ 1 ]."]} +{"8558455|14441987": ["In this work we describeAntHocNet , a multipath routing algorithm for mobile ad hoc networks (MANETs) [31]."]} +{"1505361|14441987": ["In recent years there has been an increasing interest in Mobile Ad Hoc Networks (MANETs) [13]."]} +{"12681577|14441987": ["3Destination-Sequenced Distance-Vector 4Dynamic Source Routing 5Ad-hoc On-demand Distance Vector 6Temporally-Ordered Routing Algorithms 7Cluster Based Routing Protocol [3][11][17]."]} +{"6970737|14441987": ["Mobile Ad Hoc Networks (MANETs) [38] are networks in which all nodes are mobile and communicate with each other via wireless connections."]} +{"6970737|1762301": ["In recent years a large number of MANET routing algorithm have been proposed (see [1] for an overview)."]} +{"14074696|1708582": ["The process is then iterated."]} diff --git a/edge/graph_36280489.jsonl b/edge/graph_36280489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79bbdbbe4cbb578c3e6d006f797de44c9d8ffd9b --- /dev/null +++ b/edge/graph_36280489.jsonl @@ -0,0 +1,17 @@ +{"16139802|1236072": ["nodes are clustered relatively close together (location-b ased clustering) and have been selected by a long-term routing process [ 24 ], [25]."]} +{"28177835|12452682": ["Here by cheating we mean the behavior of re\u00adporting \nmisleading information to other users."]} +{"23531375|12187956": ["2424239 opportunistically use licensed bands when not occupied [5]."]} +{"16361096|141053": ["Several older solutions of the hidden node problem have already been described in [2] [3] [4], which included general overviews of MAC layer protocols and commented on different issues related to the area of ad-hoc networks.", "In MACA-BI a sender cannot transmit data before being polled, therefore, the destination needs to have a built-in traffic prediction algorithm so as to know when to ask the sender for its data [2]."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"4719045|141053": ["Let us consider a MAC protocol that implements virtual carrier sensing in CSMA/CA as defined in IEEE 802.11; i.e., CSMA/CA [26] reserves the channel in the vicinity of S and D using request-to-send (RTS) and clear-to-send (CTS) packets."]} +{"13988126|7414579": ["Dancing with music is a human nature to express meaning of music or to show people's emotion.", "We focus on extracting motion beats from videos, which play an essential role in constituting ROM."]} +{"13988126|3540699": []} +{"13988126|18148591": []} +{"13988126|16352922": ["Success of any health monitoring system heavily depends on the reliability of the employed sensors."]} +{"13988126|17718674": []} +{"8940094|763939": ["Several mobility models have been proposed for ad hoc networks [76]."]} +{"18062023|18148591": ["Recovering a vector of received information units from a vector of received samples is one of the key issues in MIMO [ 8 ]."]} +{"9923274|8618569": ["For readers interested in a comprehensive survey of MAC protocols for WSNs, we suggest [18, 19] for non-standardized protocols and [21] for standardized protocols.", "A detailed survey of protocols for industrial automation is presented in [21]."]} +{"1935784|14552902": []} +{"9612215|8280144": []} +{"1843456|12060835": ["2322972 energy-deficiency and have become increasingly attractive [2]."]} diff --git a/graph_3628110.jsonl b/edge/graph_3628110.jsonl similarity index 100% rename from graph_3628110.jsonl rename to edge/graph_3628110.jsonl diff --git a/edge/graph_36287201.jsonl b/edge/graph_36287201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..954a6b24b3618ebbf6d7fdd9a173d2540211a817 --- /dev/null +++ b/edge/graph_36287201.jsonl @@ -0,0 +1,3 @@ +{"2386168|62924": ["This work devises a complex cloud negotiation mechanism by using negotiation strategies and protocols in multiagent systems [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20] as the basic building blocks (Section 3)."]} +{"16934334|816774": []} +{"3043929|17474643": []} diff --git a/graph_3630870.jsonl b/edge/graph_3630870.jsonl similarity index 100% rename from graph_3630870.jsonl rename to edge/graph_3630870.jsonl diff --git a/edge/graph_36319928.jsonl b/edge/graph_36319928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3632923.jsonl b/edge/graph_3632923.jsonl similarity index 100% rename from graph_3632923.jsonl rename to edge/graph_3632923.jsonl diff --git a/graph_3632966.jsonl b/edge/graph_3632966.jsonl similarity index 100% rename from graph_3632966.jsonl rename to edge/graph_3632966.jsonl diff --git a/edge/graph_36332256.jsonl b/edge/graph_36332256.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..800d2bc4150ad137be7d4930f0d056a23c94c591 --- /dev/null +++ b/edge/graph_36332256.jsonl @@ -0,0 +1,2 @@ +{"6649158|8424228": ["[13, 37]), and inconsistency resolution protocols are often based on one form or another of majority voting, preferring the version of the data supported by the majority of the available copies."]} +{"1873404|8424228": []} diff --git a/edge/graph_3634303.jsonl b/edge/graph_3634303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_363532.jsonl b/edge/graph_363532.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36355857.jsonl b/edge/graph_36355857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f0b8c78926a056535d3c2ecbdc7d5259f73d150 --- /dev/null +++ b/edge/graph_36355857.jsonl @@ -0,0 +1,9 @@ +{"14848910|7696556": []} +{"14848910|627405": ["[36], one researcher extracted the data, while the other confirmed the extracted data.", "[36] recommend reviewing also the conclusions of the papers in addition to the titles and abstracts.", "Different search and data extraction facilities The search and data extraction facilities provided by the various digital publication databases are different and not necessarily developed with systematic literature reviews in mind [36,68]."]} +{"38315467|627405": ["The completeness of the search is dependent upon the search criteria used and the scope of the search, and is also influenced by the limitations of the search engines used [4]."]} +{"59679717|7876633": ["Applications E-Science Nurmi et al., 2009; Pallickara et al., 2008; Llora et al., 2008; Hazelhurst, 2008."]} +{"14990549|15164501": []} +{"14990549|35897447": []} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/edge/graph_36366678.jsonl b/edge/graph_36366678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..912ac728893752bc82386fa08aab7a7b19d4d22b --- /dev/null +++ b/edge/graph_36366678.jsonl @@ -0,0 +1,8 @@ +{"504418|386036": ["Record linkage has been studied for more than four decades [11].", "Private linkage is a challenging problem, and previous research [11] has shown that, in many situations, uniquely-identifying information may not be available, and linkage is performed based on matching of other information, such as age, occupation, etc."]} +{"12294536|16323798": ["[20] provides a comprehensive overview of NILM systems and methods to decompose the measured power consumption."]} +{"15047632|386036": ["Our main contribution is the use of a blocking phase that operates over sanitized data to filter out in a privacy-preserving manner pairs of records that do not satisfy the matching condition.", "Record matching has been studied for more than four decades [1]."]} +{"15061652|386036": ["Record linkage [22, 10] is the process of identifying records that refer to the same real world entity across different sources."]} +{"42494759|18090012": ["\u2026where explicit identifiers (e.g., Protected Health Information [PHI] elements) are extracted or replaced with \u201cpseudonyms\u201d and re-linkages may be possible while others are aimed at anonymization where links between an individual and the individual\u2019s information in the dataset are broken 12,13 ."]} +{"1593553|386036": ["Record linkage [18, 7] plays a central role in many data integration and data mining tasks that involve data from multiple sources."]} +{"15900245|60455": ["\u2022 finding the most popular web pages and how the trend changes over time [9, 19],"]} +{"5922107|2509135": ["A novel multichannel power-controlled directional MAC protocol (MPCD-MAC) [28] is proposed for nodes equipped with multiple network interfaces and directional antennas, which reduces interference by transmiting the RTS and CTS packets in all directions on a separate control channel, while the DATA and ACK packets are transmitted only directionally on an available data channel at the minimum required power."]} diff --git a/edge/graph_3637412.jsonl b/edge/graph_3637412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3638188.jsonl b/edge/graph_3638188.jsonl similarity index 100% rename from graph_3638188.jsonl rename to edge/graph_3638188.jsonl diff --git a/edge/graph_36383314.jsonl b/edge/graph_36383314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3638888.jsonl b/edge/graph_3638888.jsonl similarity index 100% rename from graph_3638888.jsonl rename to edge/graph_3638888.jsonl diff --git a/graph_3639306.jsonl b/edge/graph_3639306.jsonl similarity index 100% rename from graph_3639306.jsonl rename to edge/graph_3639306.jsonl diff --git a/edge/graph_36400013.jsonl b/edge/graph_36400013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c29d55618e28478ba46dc0375e75ee6c5d05c6c --- /dev/null +++ b/edge/graph_36400013.jsonl @@ -0,0 +1,13 @@ +{"23207276|1333339": ["There are many solutions proposed in the literature dealing with trust models for mobile ad hoc networks, as presented in [9]."]} +{"18722494|14745481": ["proposed and studied during the last decade [5]."]} +{"5457130|16844049": []} +{"6815249|1333339": ["The usual solution for establishing a trust metric between members of a network is a reputation model [3], where members are assigned a reputation within a numeric interval."]} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"35964555|11206792": ["The basic purpose of expanding mobile ad hoc networks (MANETs) into VANETs was to alleviate the risk while driving a car on the road [1]."]} +{"17170586|1333339": ["Trust establishment is tagged in many existing research works for peer to peer, sensors, and mobile ad hoc networks [1] [2].", "The trust and reputation models [1] are proposed as new approaches to circumvent with this constraint and to filter out inaccurate messages and malicious vehicles."]} +{"21373055|763939": []} +{"28812378|2835258": ["On the other hand, the communication system will depend on correct sensor data; for geographic based routing, as it will probably be employed in vehicular networks [4], this is the position of neighboring nodes."]} +{"207561019|2294541": ["In self-promoting attacks [25], attackers tend to unfairly augment their own reputation."]} +{"207561019|62617427": ["More complicated signature and certificate schemes for realizing pseudonyms are surveyed in [24]."]} +{"10305213|763939": []} +{"8657636|14441987": ["Most MANET protocols specify path-based routing mechanisms with an aim to establish a connection between a source node and one or more destination nodes [3].", "Over the past two decades under the auspices of MANET, there have been a large number of path-based end-to-end routing protocols [3], [4]."]} diff --git a/edge/graph_36404839.jsonl b/edge/graph_36404839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36421799.jsonl b/edge/graph_36421799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc9c2df1c4f03a6a41dd12c3215e3505bad21f96 --- /dev/null +++ b/edge/graph_36421799.jsonl @@ -0,0 +1,2 @@ +{"62185766|53680608": []} +{"17574321|192934": []} diff --git a/graph_3642586.jsonl b/edge/graph_3642586.jsonl similarity index 100% rename from graph_3642586.jsonl rename to edge/graph_3642586.jsonl diff --git a/edge/graph_36432451.jsonl b/edge/graph_36432451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86c9a35f6ebe7c4a4ec0c53cefb269bab708accc --- /dev/null +++ b/edge/graph_36432451.jsonl @@ -0,0 +1,46 @@ +{"6455466|1940388": ["Several surveys [19\u201321] have been conducted for security protocols in WSN in general."]} +{"108507443|16514036": ["Such applications include personal sensing [6], body area network [8, 9], military [10], smart building [11], camera and video surveillance [12] as well as robotics [13]."]} +{"108507443|17205659": ["Trusted Computing Platform Alliance (TCPA) was formed in late 90\u2019s with the mission to implement trust into client, server, networking, and communication platforms and it finally emerged as TCG in 2003 [42]."]} +{"5404353|16120075": ["For many applications, sensors are expected to be randomly deployed, since it is easier and less expensive for large wireless sensor networks [8].", "Viewing angle, lens quality and zoom capabilities, as well as the type of the camera used in source nodes (fixed or PTZ [8]), are major factors that influence the resulting FoV and the way visual data are retrieved from the environment.", "As deployed video-based sensors may have a unique view of a target or scene, even overlapping sensors may produce different visual information [8] (for example, viewing the front and back sides of a person).", "Most cameras installed at source nodes are not ominidirectional, resulting in a directional sensing capability usually referred as the cameras\u2019 Field of View (FoV) [8].", "The work presented in [29] exploits the overlapped area created by the field of view of source image sensors, when there are inter-sensor correlations [8]."]} +{"5404353|15947359": ["In such contexts, when multimedia data is collected exclusively by video-based sensors, the resulting networks are referred to as Visual Sensor Networks [7].", "Several papers can be found in the literature surveying general aspects of wireless sensor networks [1-3] and wireless multimedia sensor networks [5-7 , 10 ] ."]} +{"5404353|1230643": []} +{"5404353|387610": ["Energy saving is achieved through image compression using JPEG2000 codec [27,28], according to the acceptable quality of the transmitted images."]} +{"5808401|1230643": ["The major objectives behind the research and deployment of Wireless Sensor Networks (WSNs) [1] lie in the following two broad aspects: (i) event detection (sensing) and data communication through node coordination and (ii) conservation of energy to maximize the post-deployment, active lifetime of individual sensor"]} +{"16266843|14441987": ["Many different approaches to handle routing in ad hoc networks were proposed in recent years [54\u201356].", "In TORA there is a potential for oscillations to occur, especially when multiple sets of coordinating nodes are concurrently detecting partitions, erasing routes, and searching new paths based on each other [56]."]} +{"2662934|1236072": ["A comprehensive survey of routing protocols in WSN has been presented in [4]."]} +{"2662934|1230643": ["In this context, the vision of ubiquitous Wireless Multimedia Sensor Networks (WMSNs) [1][2][3] has become a reality."]} +{"46438095|3540699": ["H.264/AVC, is the state-of-the-art video coding technique to meet a wide range of applications providing compression ef\ufb01ciency of up to 50 % over a wide range of bit rates and video resolutions [23]."]} +{"46438095|1230643": ["Clustering has been proven to be energy-ef\ufb01cient in sensor networks by Akyildiz [3] since data routing and relaying are only operated by cluster heads."]} +{"7835074|2490136": []} +{"7835074|1236072": []} +{"7835074|1762301": []} +{"17613760|6430931": ["The level of improvement in detection rate shown in (Wu and Banzhaf, 2010) should be considered as a step in the right direction since it made the algorithm competitive to the rest of machine learning solutions.", "a Laboratory of Information and Communication Systems Security, University of the Aegean, Samos GR-83200, Greece bDepartment of Information and Communication Systems Engineering, University of the Aegean, Samos GR-83200, Greece\na r t i c l e i n f o\nArticle history: Received 9 January 2011 Received\u2026", "Although in the past, some works (Wu and Banzhaf, 2010) have touched upon a limited number of such systems, the current one is exhaustive and focuses solely on SI-inspired IDS."]} +{"205458526|3540699": []} +{"9199492|18643817": ["\u2026protocols, and techniques have been done in the last few years to deliver multimedia content over large-scale networks, such as single-hop wired LANs (e.g., [3], [4]), multi-hop wired LANs (e.g., [5]), ATM (e.g., [6], [7]), mobile adhoc networks(e.g., [8], [9]) and the Internet (e.g., [10]\u2013 [14])."]} +{"9199492|14088590": []} +{"9199492|12817488": []} +{"9199492|1236072": ["For example, some applications might require a diverse mixture of sensors for monitoring temperature, pressure, and humidity of the surrounding environment, detecting motion via acoustic signatures, and capturing images or video tracking of moving objects [24]."]} +{"9199492|1230643": ["Although plethora of works on surveying architecture, applications and communication protocols for wireless sensor networks are performed beforehand [1], [15]\u2013[20], this survey is distinguished from the previous efforts in that it pioneers to investigate those routing techniques which address application-specific QoS as well as energy efficiency for WMSNs.", "[15], [34], [35], [36], [39], [40], [41], [42] Hard Real-time Bounded"]} +{"670285|1230643": ["Recent advances in micro-electro-mechanical systems (MEMS) and low power and highly integrated digital electronics have led to the development of micro sensors [1,9,17,21,22,24,27].", "Each sensor node i will calculate its r-value ri by using d as follows: From [1],", "using the approaches presented in [1,3].", "Then d will be calculated as follows:\nd = Trequired\u2211 \u2200i\u2208Path ( pi + \u2211qi j=1 p j ) \u2217 \u03bbRT (4) Each sensor node i will calculate its r-value ri by using d as follows:\nFrom [1],\nd = 1 ri\u00b5 \u2212 \u03bbRT \u2217 ( pi + \u2211qi j=1 p j ) ri = 1\nd \u2217 \u00b5 + \u03bbRT \u00b5 \u2217\n( pi +\nqi\u2211 j=1 p j\n) (5)\nThen the problem will be to maximize the total throughput on each particular path:\nMax ( \u2211 \u2200i\u2208Path (1 \u2212 ri ) ) where 0 \u2264 ri < 1."]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"5172416|270804": ["However, these traditional transport protocols cannot be directly implemented over wireless sensor network [6, 49] because WSN in general and WMSN in particular have their distinctive features, which make them different than typical Internet network, and they have very wide range of applications that need special requirements."]} +{"5172416|1236072": ["The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"5172416|1230643": ["WSNs are becoming more low-cost, low-power, multi-functional, and viable due to the advances in micro-electro-mechanical systems (MEMS), low power and highly integrated digital electronics, and proliferation of wireless communications [1].", "The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"1940388|17205659": ["Besides implementing the security goal discussed above, the following metrics are also important to evaluate whether a security scheme is appropriate for WSNs [7], [8].", "A few existing surveys on security issues in WSNs can be found [7], [8]."]} +{"14457825|1230643": ["Generally paths in WSNs routing protocol are established based on min hops, max available power and low latency etc [ 1 ] [6] [7].", "The scalar data generated from simple scalar nodes does not require high bandwidth and low latency and is treated as best effort traffic [ 1 ]."]} +{"32442701|7774517": ["\ud835\udc53\ud835\udc61 1 and \ud835\udc53\ud835\udc61 2 take values in [0, 10] .", "Experiments have shown that we can obtain better detection accuracy by combining related features rather than individually [10]."]} +{"32442701|1230643": ["They include many types of networks such as mobile ad hoc networks (MANETs) [1], wireless sensor networks (WSNs) [2], and vehicular ad hoc networks (VANETs) [3]."]} +{"41350255|1230643": ["Wireless sensor networks (WSNs) [1] are de\ufb01ned as a large collection of tiny sensor nodes, which have scarce resources regarding energy, bandwidth, processing capacity and storage."]} +{"25324885|1940388": []} +{"25324885|1236072": ["These small and low cost sensor nodes became technically and economically feasible (Al-Karak and Kamal, 2004)."]} +{"33401232|1940388": []} +{"33401232|17205659": ["[41] propose a survey on the most important solutions, but they can be hardly applied to multimedia data.", "With respect to previous surveys on WSNs and WMSNs, such as [1, 7, 41, 60, 69, 72, 74], which are mainly devoted to the analysis of general security issues and DoS attacks, the attention here will be focused on scientific proposals for authentication, secure node localization, privacy policies, trust management, and data aggregation/compression, which have been explicitly conceived to face with security and privacy, or which can be easily extended to cope with them."]} +{"33401232|1230643": ["As a consequence, WMSNs require tools and methodologies different from the ones proposed for common WSNs [2].", "With respect to previous surveys on WSNs and WMSNs, such as [1, 7, 41, 60, 69, 72, 74], which are mainly devoted to the analysis of general security issues and DoS attacks, the attention here will be focused on scientific proposals for authentication, secure node localization, privacy policies, trust management, and data aggregation/compression, which have been explicitly conceived to face with security and privacy, or which can be easily extended to cope with them.", "Solutions to these problems are typically inherited from WSNs.", "978-0-7695-3834-1/09 $26.00 \u00a9 2009 IEEE DOI 10.1109/UBICOMM.2009.27\n194\nWith respect to classic Wireless Sensor Networks (WSNs), the constraints, imposed by the computational capacity, the memory and energy resources, become more critical."]} +{"627267|7889189": []} +{"627267|15947359": ["VSNs [Soro and Heinzelman 2009] share many properties, techniques, and protocols with wireless sensor networks (WSNs)."]} +{"627267|1940388": ["Security in the related field of WSNs has been studied by many researchers and various reviews [Wang et al. 2006; Zhou et al. 2008; Mpitziopoulos et al. 2009; Chen et al. 2009] have been published.", "Therefore, a number of dedicated and lightweight security techniques and protocols for WSNs have been proposed [Perrig et al. 2002; Karlof et al. 2004; Zhu et al. 2006; Chen et al. 2009] that are also suitable for VSNs.", "Attacks on the MAC and routing layers have been extensively studied in the context of WSNs [Perrig et al. 2002; Chan and Perrig 2003; Perrig\nACM Computing Surveys, Vol. 47, No. 1, Article 2, Publication date: April 2014.\net al. 2004; Wang et al. 2006; Chen et al. 2009; Sen 2010]."]} +{"627267|17205659": ["Security in the related field of WSNs has been studied by many researchers and various reviews [Wang et al. 2006; Zhou et al. 2008; Mpitziopoulos et al. 2009; Chen et al. 2009] have been published.", "Attacks on the MAC and routing layers have been extensively studied in the context of WSNs [Perrig et al. 2002; Chan and Perrig 2003; Perrig\nACM Computing Surveys, Vol. 47, No. 1, Article 2, Publication date: April 2014.\net al. 2004; Wang et al. 2006; Chen et al. 2009; Sen 2010]."]} +{"1161967|3826739": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|1236072": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|14441987": ["The requirements of routing protocols for WSNs are similar to those of routing protocols for mobile ad hoc networks (MANETs) [69].", ", see [19,69] for more extensive discussions and examples)."]} +{"16843952|8649087": ["\u2022 Encryption and watermarking are two groups of technologies used in developing technical solutions for the copy protection problem in DHNs [66,67, 63 ,64]."]} diff --git a/edge/graph_36438802.jsonl b/edge/graph_36438802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3644401.jsonl b/edge/graph_3644401.jsonl similarity index 100% rename from graph_3644401.jsonl rename to edge/graph_3644401.jsonl diff --git a/edge/graph_36450790.jsonl b/edge/graph_36450790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e0b666eaf49215e88772d29304c86a7a7c3212c --- /dev/null +++ b/edge/graph_36450790.jsonl @@ -0,0 +1 @@ +{"1564123|6392800": ["Our power model uses the transition density signal model to determine signal activities within the FPGA [ 12 ] [13]."]} diff --git a/graph_3645740.jsonl b/edge/graph_3645740.jsonl similarity index 100% rename from graph_3645740.jsonl rename to edge/graph_3645740.jsonl diff --git a/graph_3646491.jsonl b/edge/graph_3646491.jsonl similarity index 100% rename from graph_3646491.jsonl rename to edge/graph_3646491.jsonl diff --git a/edge/graph_36467809.jsonl b/edge/graph_36467809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6939f892102f26fd5d9fc26b93419ad30a4df1f1 --- /dev/null +++ b/edge/graph_36467809.jsonl @@ -0,0 +1,2 @@ +{"168114547|9743176": []} +{"147979107|9743176": []} diff --git a/edge/graph_36469113.jsonl b/edge/graph_36469113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d2f50efbb88c7623b5ec09a6a4855b319b571a8 --- /dev/null +++ b/edge/graph_36469113.jsonl @@ -0,0 +1,3 @@ +{"207166126|2685137": []} +{"207166126|1837720": ["\u2026these are: temporal db-models [Tansel et al. 1993; Chomicki 1994], spatial \ndb-models [Paredaens and Kuijpers 1998; Samet and Aref 1995], geographical information systems (GIS) \n[Shekhar et al. 1997; Aufaure-Portier and Tr\u00b4 epied 1976], and multidimensional db-models [Vassiliadis \nand Sellis 1999]."]} +{"7024398|17157304": []} diff --git a/edge/graph_36474414.jsonl b/edge/graph_36474414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36476936.jsonl b/edge/graph_36476936.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2a505146434a562ef6b9a3f42a4f987efae075e --- /dev/null +++ b/edge/graph_36476936.jsonl @@ -0,0 +1 @@ +{"15838845|207424188": ["Anonymization techniques can be classified into following four approaches [48]: 1) clustering, 2) clustering with constraints, 3) modification of graph, and 4) hybrid."]} diff --git a/graph_3648998.jsonl b/edge/graph_3648998.jsonl similarity index 100% rename from graph_3648998.jsonl rename to edge/graph_3648998.jsonl diff --git a/graph_3649200.jsonl b/edge/graph_3649200.jsonl similarity index 100% rename from graph_3649200.jsonl rename to edge/graph_3649200.jsonl diff --git a/edge/graph_3649647.jsonl b/edge/graph_3649647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3649936.jsonl b/edge/graph_3649936.jsonl similarity index 100% rename from graph_3649936.jsonl rename to edge/graph_3649936.jsonl diff --git a/edge/graph_36510460.jsonl b/edge/graph_36510460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44905e6633e6d7c29a409d28f23d3e53c2d15ffb --- /dev/null +++ b/edge/graph_36510460.jsonl @@ -0,0 +1,5 @@ +{"17407067|15231229": ["Available algorithms have been recently surveyed in three works [19, 14, 15 ]."]} +{"9849236|873842": []} +{"18315024|9162620": ["See [107, 108] for reviews on force fields and software packages that are widely used in the study of proteins."]} +{"18315024|15231229": ["Collision detection has been widely studied in the fields of robotics and computer graphics [89, 90] and several general-purpose collision detection packages are available (e."]} +{"8061430|4491892": ["This leads to a crucial property: SIS with resampling can produce reasonable statistics only for systems that \u201cexponentially forget\u2019\u2019 their past [8] (i."]} diff --git a/graph_36536.jsonl b/edge/graph_36536.jsonl similarity index 100% rename from graph_36536.jsonl rename to edge/graph_36536.jsonl diff --git a/graph_3654323.jsonl b/edge/graph_3654323.jsonl similarity index 100% rename from graph_3654323.jsonl rename to edge/graph_3654323.jsonl diff --git a/edge/graph_36563884.jsonl b/edge/graph_36563884.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8d32a96e7fde8c56176e5b90e344c09de8a62d0 --- /dev/null +++ b/edge/graph_36563884.jsonl @@ -0,0 +1,2 @@ +{"33381743|2357830": []} +{"2300532|2357830": ["An RFID tag has not a single read range, but in effect has multiple \u201cread ranges,\u201d depending on the operational scenario [20].", ", [20] for a survey and [6] for an up-to-date bibliography.", "Our scanning experiments have a bearing not just on cloning, but also on owner privacy: While the tags do not contain personally identifiable information, they do contain unique serial numbers that can support clandestine tracking [20]."]} diff --git a/graph_3656886.jsonl b/edge/graph_3656886.jsonl similarity index 100% rename from graph_3656886.jsonl rename to edge/graph_3656886.jsonl diff --git a/graph_365692.jsonl b/edge/graph_365692.jsonl similarity index 100% rename from graph_365692.jsonl rename to edge/graph_365692.jsonl diff --git a/edge/graph_36582512.jsonl b/edge/graph_36582512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..248fab8d354d5f85f9d2c130fa43f3ad8babea8f --- /dev/null +++ b/edge/graph_36582512.jsonl @@ -0,0 +1,32 @@ +{"1403877|18746083": ["[7] and our previous work on this problem [4, 8]."]} +{"120196444|26257441": ["As an effective (sometimes the unique) alternative, such surrogate or metamodel techniques as response surface method (RSM) have been exhaustively adopted in industrial designs (Simpson et al. 2001; Yang et al. 2005).", "For this reason, various modification techniques have been presented to achieve best possible tradeoff between the design accuracy and computing efficiency (Simpson et al. 2001)."]} +{"11003004|508912": ["General surveys of various adaptive systems in evolutionary computations and their influences can be found in [16] and [17]."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"2219488|1386147": []} +{"9141490|4474193": ["In the following we explain the working principles of these strategies, but for a detailed analysis and complete references, see (Jin and Branke 2005).", "The intuition behind implicit averaging is the following (Jin and Branke 2005, p. 305): because promising areas of the search space are sampled repeatedly by the EC algorithm, and there are usually many similar solutions in the population, when the population is large, the influence of noise in\u2026", "The reader interested in EC applied to optimization with noisy fitness or with time varying information may find references in the surveys by Jin and Branke (2005)."]} +{"9141490|12419623": ["A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; O \u00b4 lafsson and Kim 2002).", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002).", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002). The latest one by \u00d3lafsson and Kim (2002) emphasizes discrete problems and practical approaches, including some references to metaheuristics. Until a few years ago, the literature on Simulation Optimization was especially focussed on theoretical results of convergence of mathematically elegant algorithms. Interestingly, as noted by Fu (2002), the many new commercial software packages for simulation do not take advantage of the theoretical results of the literature.", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002). The latest one by \u00d3lafsson and Kim (2002) emphasizes discrete problems and practical approaches, including some references to metaheuristics."]} +{"361238|8530790": ["The same is true with Fonseca and Fleming\u2019s (1995) test problem FON."]} +{"36482639|8530790": ["nament selection make scaling information negligible (Fonseca and Fleming, 1994; Fonseca and Fleming, 1995d)."]} +{"59811674|8530790": ["[4], Fonseca & Fleming [5], Murata & Ishibuchi [6], and Zitzler & Thiele [7])."]} +{"60429433|9734434": [", 2006], [Shakya and Santana, 2012], and [Larranaga et al., 2012]."]} +{"60429433|16198650": ["Researchers have proposed many variations and hybrids of the AFSA [Neshat et al., 2012]."]} +{"60429433|4474193": ["We have not discussed robustness in this chapter, but it is an important issue in real-world problems, and [Jin and Branke, 2005] and [Branke, 2002, Chapter 8] give a good overview.", "However, [Jin and Branke, 2005] also discusses robustness, which is measure of EA solution quality in the presence of variations in either the decision vector or the problem parameters [Eiben and Smit, 2011].", "Surveys of EAs in uncertain environments are given in [Jin and Branke, 2005] and [Nguyen et al."]} +{"60429433|63137": ["ACO has already been shown to be equivalent to the stochastic gradient ascent (SGA) and cross entropy (CE) optimization algorithms under certain conditions [Meuleau02 and Dorigo, 2002], [Zlochin et al., 2004], [Dorigo and Stiitzle, 2004]."]} +{"60429433|8530790": ["The earliest technical survey on MOEAs is [Fonseca and Fleming, 1995], and additional surveys are provided in [Coello Coello, 1999], [Van Veldhuizen and Lamont, 2000], [Zitzler et al.", "Some approaches for increasing diversity include fitness sharing, grids, clustering, crowding, entropy, and mating restriction [Fonseca and Fleming, 1995]."]} +{"15534360|18746083": ["We generate 10 benchmark instances with n = 50 and m = 20 (50x20), and 10 instances with n = 100 and m = 20 (100x20), following the procedure described by Minella et al. [15]."]} +{"11656264|8530790": []} +{"37299236|8530790": []} +{"42977705|8530790": []} +{"44432351|8530790": ["Extensions of GAs to multi-objective optimization were proposed in several manners (for example, see Schaffer [3], Kursawe [4], Horn et al.[5], Fonseca & Fleming [ 6 ] and Murata & Ishibuchi [7])."]} +{"61001583|8530790": []} +{"11897480|17383371": []} +{"11897480|4474193": []} +{"11897480|8530790": []} +{"42937655|13867280": [", [105, 199, 230], where the memes, either directly encoded within the candidate solutions or evolving in parallel to them, take part in the evolution and undergo recombination and selection in order to select the most promising operators", "Populations of genes and memes evolve separately and simultaneously and their solutions are linked, see [196, 197, 198, 199]."]} +{"42937655|4474193": ["In the survey proposed in [81] the sources of uncertainties are categorized as 1) uncertainties due to approximation 2) uncertainties due to robustness 3) uncertainties due to noise 4) uncertainties due to time-variance."]} +{"42937655|8530790": []} +{"14265618|12957829": ["It can optimize the reactive power dispatch problem with multiple and competing objectives, real power loss and voltage deviation."]} +{"206837347|8530790": ["Fonseca and Fleming [17] have proposed a scheme in which the rank of a certain individual corresponds to the number of chromosomes in the current population by which it is dominated.", "It has been cited in the literature [87, 14] that the main weakness of MOGA is that it performs sharing on the objective value space, which implies that two di(cid:11)erent vectors with the same objective function values can not exist simultaneously in the population under this scheme.", "such as VEGA, because the pairwise comparisons of tournament selection will make scaling information neggligible [18, 21].", "Also, Chipper(cid:12)eld and Fleming 7] reported success in using MOGA for the design of a multivariable control system for a gas turbine engine.", "The main strenghts of MOGA is that is e(cid:14)cient and relatively easy to implement [12].", "Since Scha er used proportional tness assignment [27], these tness components were in turn proportional to the objectives themselves [18].", "{ Chen Tan and Li [93] reported success in the use of MOGA for the multi-objective optimization of ULTIC controllers that satisfy a number of time domain and frequency domain speci(cid:12)cations.", "{ Rodr(cid:19)(cid:16)guez V(cid:19)azquez et al. [78] extended MOGA to use it in genetic programming, introducing the so-called MOGP (Multiple Objective Genetic Programming).", "Fonseca and Fleming [23] proposed the de(cid:12)nition of certain (arbitrary) goals that we wish the GA to attain; then we can perform multiple runs and apply standard non-parametricstatistical proceduresto evaluate the quality of the solutions (i.e., the non-dominated fronts) produced by the technique under study, and/or compare it against other similar techniques.", "MOGP was used for the identi(cid:12)cation of non-linear model structures, as an alternative that the authors reported to work better (in terms of representation power) than the use of the conventional linear representation of MOGA that they had attempted before [22]. objectrecognitionschemecalled thePairwise GeometricHistogramparadigm { Todd and Sen [94] used a variant of MOGA for the preplanning of con-tainership layouts (a large scale combinatorial problem).", "Fonseca and Fleming 17] proposed the use of a utility function combined with MOGA [18, 21] to produce a method for the progressive articulation of preferences.", "Other authors[106, 105] reportthat the NSGA performedquite well in terms of \\coverage\" of the Pareto front (i.e., it spreads in a more uniform way the population over the Pareto front) when applied to the 0/1 knapsack problem, but in their experiments no comparisons with MOGA were provided. composites.", "To avoid that, Fonseca and Fleming used a niche-formation method to distribute the population over the Pareto-optimal region, but instead of performing sharing on the parametervalues, they have used sharing on the objective function values [87].", "However, it is important to add that Fonseca and Fleming [17] have developed a good methodology to compute such value for their approach.", "[91], which is a very short and quick review of some of the main approaches, and Fonseca and Fleming [18, 21] which is a remarkable account of the issues that make this problem interesting from the evolutionary computing perspective.", "Some researchers [12] have reported that its main weakness is that it is more ine(cid:14)cient (both computationally and in terms of quality of the Pareto fronts produced) than MOGA, and more sentitive to the value of the sharing factor (cid:27)share.", "Surprisingly, despite the considerable volume of research in evolutionary multiobjective optimization in the last 15 years, there have been only two surveys of this area published in the technical literature 2 : Tamaki et al. [91], which is a very short and quick review of some of the main approaches, and Fonseca and Fleming [18, 21] which is a remarkable account of the issues that make this problem interesting from the evolutionary computing perspective.", "Population sizes considerably larger than usual with other approaches were used so that the noise of the selection method could be tolerated by the emerging niches in the population [18].", "Fonseca and Fleming [17] proposed the use of a utility function combined with MOGA [18, 21] to produce a method for the progressive articulation of preferences."]} +{"13168458|8530790": ["[6], Fonseca and Fleming [7], [8], Murata and Ishibuchi [9], and Tamakiet al."]} +{"18228419|8530790": ["Clearly, majority of research in the field of multi-objective metaheuristics concentrates on genetic algorithms (see Fonseca and Fleming, 1995, for review).", " Fonseca and Fleming (1995) consider fitness landscapes induced by very large, uniformly distributed populations."]} +{"43984030|12407288": ["ANALOG CIRCUIT SIZING Analog integrated circuit design is a hard and tedious work due to the large number of parameters, constraints and performances that the designer has to handle [6]\u2013[8], [10]\u2013[13].", "Besides, the actual tendency is to apply evolutionary algorithms (EAs) [9]\u2013[13], combined with intelligent techniques [6]\u2013[8]."]} diff --git a/edge/graph_36608314.jsonl b/edge/graph_36608314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36610012.jsonl b/edge/graph_36610012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36620880.jsonl b/edge/graph_36620880.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b98d83d1c21e8131d92f1b730d1f4c7ca7b09dc7 --- /dev/null +++ b/edge/graph_36620880.jsonl @@ -0,0 +1,4 @@ +{"1461056|14108756": ["Privacy of wireless infrastructures is considered in So-In et al. (2012)."]} +{"109989687|206583375": []} +{"6035800|7120308": ["Since solving a planning problem is a computationally expensive task [15], we perform a set of tests to ensure that our proposed solution remains practically useful for larger environments.", "The next formal definitions follow the state-based HTN planning approach of [15]."]} +{"16763006|2670121": []} diff --git a/edge/graph_36631020.jsonl b/edge/graph_36631020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3667360.jsonl b/edge/graph_3667360.jsonl similarity index 100% rename from graph_3667360.jsonl rename to edge/graph_3667360.jsonl diff --git a/edge/graph_36688179.jsonl b/edge/graph_36688179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36698883.jsonl b/edge/graph_36698883.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72502ee1eb27baf8b11389f9ef7e3eddf3f2d7ac --- /dev/null +++ b/edge/graph_36698883.jsonl @@ -0,0 +1 @@ +{"2728167|6607209": ["Recently, many studies related to multi-robot coordination and cooperation have been conducted [9,10]."]} diff --git a/edge/graph_36702087.jsonl b/edge/graph_36702087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36dd202601eb52cd2ffe989e8e802d5312417369 --- /dev/null +++ b/edge/graph_36702087.jsonl @@ -0,0 +1 @@ +{"32025588|2357830": []} diff --git a/edge/graph_36705207.jsonl b/edge/graph_36705207.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec268b095486d0518ba1b3f676aa56bbdc008638 --- /dev/null +++ b/edge/graph_36705207.jsonl @@ -0,0 +1,2 @@ +{"6168092|16620699": ["Surveys on 3D face recognition approaches can be found in [8][9] and [50]."]} +{"6168092|6028805": ["from different persons are significantly different, while those temperature of the object and emissivity of the material[29].", "Those modalities include 3D face information [8] and face images in those spectra other than visible spectra, such as thermal infrared image [29] and near-infrared hyperspectral image [40].", "Various fusion schemes have been proposed [29] [15] [4] [60] and shown to lead to better performance than"]} diff --git a/edge/graph_36712644.jsonl b/edge/graph_36712644.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36730681.jsonl b/edge/graph_36730681.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36742506.jsonl b/edge/graph_36742506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_36743943.jsonl b/edge/graph_36743943.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3675640.jsonl b/edge/graph_3675640.jsonl similarity index 100% rename from graph_3675640.jsonl rename to edge/graph_3675640.jsonl diff --git a/edge/graph_36757509.jsonl b/edge/graph_36757509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36125a3f4e9db4f1c159f01faf80223e5d4ff6da --- /dev/null +++ b/edge/graph_36757509.jsonl @@ -0,0 +1,7 @@ +{"5396380|719577": ["Distributed objects technology and later components and frameworks technology created a need to reengineer or wrap existing legacy systems as objects or components [5,18]."]} +{"10846475|719577": []} +{"6663859|2018781": ["While Object Orientation reached mainstream adoption long ago, Service Orientation is still, in our opinion, in the slope of enlightenment [2]: the real benefits of SOA are now becoming more widely understood, and more and more companies are migrating their software assets to SOA technologies."]} +{"6912536|15105704": ["As per the interest of this research, extracting program quality metrics has been reported in [14], [15] and details of use of software visualization in reverse engineering & re-engineering has been reported in a survey by Koschke [16]."]} +{"16852311|6159806": ["So far, most studies and research were devoted to formally describe WS composition, using Automata, Petri Nets and Process algebras, such as CSP and \u03c0-calculus [9, 2, 20, 7, 1, 12]."]} +{"15184767|9504064": ["Note that companies tend to define their business processes using wellknown notations, such as BPMN [13] or similar [14]."]} +{"10500871|2018781": ["Those problems do often relate to the ways the new, post-merger IT assets are envisioned, compared to the ways the preexisting assets are already developed [1 \u2013 3]."]} diff --git a/edge/graph_36784649.jsonl b/edge/graph_36784649.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7010133274260a5c7b52d37dd3951fcddb5ca29f --- /dev/null +++ b/edge/graph_36784649.jsonl @@ -0,0 +1 @@ +{"11820970|9045232": [", Hidden Markov models [6, 22], Bayesian networks [11], na\u00efve Bayes classifier [14], PCA [18], and other methods described in [20], basically it\u2019s necessary to find quite a lot of apples, and to find enough non-apples, which is itself an ambiguous concept, to estimate the class distributions precisely."]} diff --git a/graph_3678588.jsonl b/edge/graph_3678588.jsonl similarity index 100% rename from graph_3678588.jsonl rename to edge/graph_3678588.jsonl diff --git a/edge/graph_36794534.jsonl b/edge/graph_36794534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e41d6f0e68c720f64631ee5dae3874346bbfcf8 --- /dev/null +++ b/edge/graph_36794534.jsonl @@ -0,0 +1,2 @@ +{"9803550|14776754": []} +{"1241484|41035405": []} diff --git a/edge/graph_36798251.jsonl b/edge/graph_36798251.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c1072b312a0a948b1114625488a8dbba63f1194b --- /dev/null +++ b/edge/graph_36798251.jsonl @@ -0,0 +1,5 @@ +{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]} +{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]} +{"9900656|3241708": ["They classify the four building blocks, also called \u201cgenes,\u201d by addressing the following four questions: What is being done? Who is doing it? Why are they doing it? and How is it being done? While there have been a number of valuable studies regarding (i) the definition of crowdsourcing [6], [7], (ii) the characterization of the crowdsourcing process [8], (iii) the development of a crowdsourcing taxonomy [9-13], and (iv) the introduction of a conceptual framework that supports the designing of CSSs [14], [15], little has been investigated to define a CSS and its technical design precisely.", "surveyed various crowdsourcing literatures and allocated them into four categories: the type of application (voting system, information sharing system, game, or creative system), the used algorithm, the performance (user participation, quality management and cheating detection) and the datasets available [12]."]} +{"9900656|627405": ["This approach has proved to be necessary for literature of information technology and software engineering, in which the abstracts are too poor to rely solely on them [19]."]} +{"7109286|3330313": ["Specifically, we applied a state-of-the-art clustering algorithm: K-medoid ( Hodge and Austin, 2004) ."]} diff --git a/graph_3680335.jsonl b/edge/graph_3680335.jsonl similarity index 100% rename from graph_3680335.jsonl rename to edge/graph_3680335.jsonl diff --git a/graph_368847.jsonl b/edge/graph_368847.jsonl similarity index 100% rename from graph_368847.jsonl rename to edge/graph_368847.jsonl diff --git a/graph_368853.jsonl b/edge/graph_368853.jsonl similarity index 100% rename from graph_368853.jsonl rename to edge/graph_368853.jsonl diff --git a/edge/graph_36930070.jsonl b/edge/graph_36930070.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3693305.jsonl b/edge/graph_3693305.jsonl similarity index 100% rename from graph_3693305.jsonl rename to edge/graph_3693305.jsonl diff --git a/graph_3695786.jsonl b/edge/graph_3695786.jsonl similarity index 100% rename from graph_3695786.jsonl rename to edge/graph_3695786.jsonl diff --git a/edge/graph_36974339.jsonl b/edge/graph_36974339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8807bf99d8dac4095fbb17a216008412149ac770 --- /dev/null +++ b/edge/graph_36974339.jsonl @@ -0,0 +1,12 @@ +{"110989415|2835258": []} +{"110989415|14441987": []} +{"206686005|14799853": ["Conventional routing protocols for wireless ad hoc networks can be generally classified into two groups [1][2]: proactive (table-driven) and reactive (on-demand) routing protocols."]} +{"206686005|14441987": ["Conventional routing protocols for wireless ad hoc networks can be generally classified into two groups [1][2]: proactive (table-driven) and reactive (on-demand) routing protocols."]} +{"7118147|12817488": ["Also spatial and temporal correlation of sensor readings can be exploited to improve energy efficiency [20, 4, 2].", "Therefore, aggregation techniques are used to combine and fuse data in order to reduce redundancy and number of transmissions, thereby extending battery lifetime of sensor nodes [20, 13]."]} +{"60793992|14441987": ["However, most protocols [12], [13], [20], [30], [ 21 ] assume that intermediate nodes can be found to setup an end-toend connection; otherwise, the packet will be dropped."]} +{"16926015|2835258": ["To alleviate this problem, quorum-based location services may be built into nodes, or fully-distributed location services may be utilized [4]."]} +{"8005052|870434": ["DTMSNs belongs to the general category of Delay Tolerant Networks (DTNs) [6-12], occasionally connected networks that may suffer from frequent partitions."]} +{"1166270|870434": ["monitoring [34], ocean sensor networks [22], [26], vehicular"]} +{"2465022|2835258": []} +{"5865973|2835258": ["Recent research has shown that position-based routing (PBR) [8] performs well in vehicular movement scenarios, especially in highway environments [9][10]."]} +{"1192551|12817488": ["In sensor networks, the main goal of data aggregation is to improve energy efficiency and network lifetime with minimum data latency [ 4 ].", "Indeed, data aggregation has been widely studied in sensor networks to minimize the bandwidth/storage/battery usage and manage high-level information [ 4 ]."]} diff --git a/edge/graph_36981447.jsonl b/edge/graph_36981447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f2acd3948295ebe2f6d55328413fea5c7a777a4 --- /dev/null +++ b/edge/graph_36981447.jsonl @@ -0,0 +1 @@ +{"17850070|14033856": ["Recent research about transparency enhancing tools (TETs) aims to investigate technical options for providing such information about facts and consequences of disclosure of personal data [11]."]} diff --git a/edge/graph_37014812.jsonl b/edge/graph_37014812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..265ab396efdf52d3297e12cf1d13cdf8d5968c0e --- /dev/null +++ b/edge/graph_37014812.jsonl @@ -0,0 +1,59 @@ +{"109319800|508912": []} +{"19406404|5342321": []} +{"110597744|12846121": []} +{"1041770|17929320": ["A number of existing approaches for solving VRPB, VRPMB and VRPSDP variants have already been published, and Parragh [20] provides an excellent survey of them."]} +{"106399553|14826946": ["According to many literatures [6 \u2013 9] and some important review papers [5, 10, 11], the IPPS methods can be classified into three categories, which are nonlinear process planning (NLPP), closed-loop process planning (CLPP) and distributed process planning (DPP).", "From the above review and the point of view of Li et al. [5], an effective IPPS method as well as the corresponding optimization algorithm is still necessary.", "Because the basic integration principle of DPP is a hierarchical approach, it cannot optimize the process plans and scheduling plan as a whole [5].", "From the point of view of Li et al. [5], an effective IPPS method as well as the corresponding optimization algorithm is still necessary to be developed, which is also the starting point of this paper."]} +{"109516982|62204132": ["Hence, the scheduling in group technology environment results in a new stream of research [36, 37]."]} +{"154006613|17929320": []} +{"42737195|1142274": []} +{"42737195|12846121": []} +{"154421165|2373140": []} +{"153877082|8530790": []} +{"19757104|12846121": ["[4] D. Ouelhadj, S. Petrovic, A survey of dynamic scheduling in manufacturing systems, J. Sched.", "The reader can refer to Ouelhadj and Petrovic [4] for the detailed survey on dynamic scheduling in manufacturing systems."]} +{"29455422|1142274": []} +{"27096863|12846121": []} +{"111079538|1142274": []} +{"5885455|1142274": []} +{"5885455|62204132": ["This family of scheduling problems was introduced by Potts and Van Wassenhove [9] to study batching and lot-sizing integrated with scheduling decisions in manufacturing."]} +{"5469567|15103060": ["[7], Ouelhadj and Petrovic [8] and Sabuncuoglu and Goren [9].", "Recently, rescheduling and the more general topic of scheduling under uncertainty has attracted the interest of many researchers, as reviewed by Mehta and Uzsoy [3], Davenport and Beck [4], Vieira et al. [5], Herroelen and Leus [6] (who include project scheduling as well), Aytug et al. [7], Ouelhadj and Petrovic [8] and Sabuncuoglu and Goren [9]."]} +{"5469567|14858505": ["Kanet and Sridharan [27] provide a comprehensive review of the key results up to the late 1990s for the problems 1 rj Lmax and 1 rj P Ej\u00feTj.", "Kanet and Sridharan [27] provide a comprehensive review of the key results up to the late 1990s for the problems 1 rj\nLmax and 1 rj P Ej\u00feTj."]} +{"5469567|12846121": ["[7], Ouelhadj and Petrovic [8] and Sabuncuoglu and Goren [9].", "Recently, rescheduling and the more general topic of scheduling under uncertainty has attracted the interest of many researchers, as reviewed by Mehta and Uzsoy [3], Davenport and Beck [4], Vieira et al. [5], Herroelen and Leus [6] (who include project scheduling as well), Aytug et al. [7], Ouelhadj and Petrovic [8] and Sabuncuoglu and Goren [9]."]} +{"44634649|191396": []} +{"41181149|1142274": []} +{"21340561|27488308": []} +{"2785091|12846121": ["Each approach has its own pros and cons (Ouelhadj & Petrovic, 2009)."]} +{"120608520|1142274": ["Allahverdi et al. (2008) presented a review of scheduling problems with set-up times."]} +{"44166606|62204132": ["Hence, the scheduling in group technology environment results in a new stream of research (Potts and Van Wassenhove [ 32 ])."]} +{"57320598|33829339": ["A recent literature review by Bergh et al. (2013) summarizes and categorizes existing literature on personnel scheduling."]} +{"9223423|11003991": []} +{"62128060|1850236": []} +{"35056473|1142274": []} +{"37521944|17929320": []} +{"61246089|11810221": []} +{"8615827|1142274": []} +{"43365245|13932708": []} +{"6214661|4719202": ["In most related literature, dedicated heuristics, such as S-Shape, largest gap, and some derivative algorithms of them are commonly applied for order picking primarily because of their simple implementation (De Koster et al., 2007 and Hall, 1993).", "ACO is also feasible for the picker routing problem since this problem is de\ufb01ned as Steiner-TSP (De Koster et al., 2007)."]} +{"16278616|32584958": ["1(c). object functions can be used to make the problem conform to Because scheduling is widely used in many problem domains, several studies [1], [4], [16], [24], [25] attempted to description of jobs (e.g., processing time, release date, due , and ), machines (e.g., single versus multiple), and\u2026"]} +{"16278616|1142274": ["Nowadays, scheduling is widely used in different applications, such as manufacturing of printed circuit boards, power system control, and scheduling of multimedia data objects on the World Wide Web (WWW) [3].", "Traditional Scheduling The so-called scheduling be considered as a problem the problem [3], [21], [22] can usually objective of which is to allocate a set of given tasks T = { T 1 , T 2 , . . . , T n } to a set of given machines M = M 1 , M 2 , . . . , M m subject to the constraints of optimizing\u2026"]} +{"13256325|2373140": []} +{"13256325|17929320": []} +{"41241404|2373140": []} +{"41241404|17929320": ["The VRPPD was divided into other subclasses in Parragh, Doerner, and Hartl (2008b).", "Four subtypes of the VRPB were considered and detailed in Parragh, Doerner, and Hartl (2008a).", "Recent solution methods and surveys on the DARP can be found in Berbeglia, Cordeau, Gribkovskaia, and Laporte (2007), Cordeau and Laporte (2007), Parragh et al. (2008b), Paquette, Cordeau, and Laporte (2009), Kirchler and Wolfer Calvo (2013), and Paquette, Cordeau, Laporte, and Pascoal (2013)."]} +{"120512705|1142274": []} +{"109506253|14826946": ["Process planning emphasizes the technological requirements of a job with no regard for the competition that exists between jobs for the resources, while scheduling involves the timing aspects and resource sharing of all jobs [8]."]} +{"109506253|64292": ["Shen et al. [24] presented a review paper on agent-based manufacturing process planning, scheduling, and their integration."]} +{"13056101|11003991": ["[3] and Hulshof et al."]} +{"30321759|2373140": ["[6]."]} +{"99130808|12846121": []} +{"109863431|15103060": ["Sabuncuoglu and Goren (2009) pointed out that developing a bi-criteria approach which considered both the stability and the robustness measures simultaneously was further research.", "Sabuncuoglu and Goren (2009) discussed the major issues involved in scheduling decisions and analysed the basic approaches to tackle these problems in manufacturing environments."]} +{"109863431|12846121": ["The complete rescheduling strategy may result in instability and lack of continuity in detailed plant schedules, leading to additional production costs attributable to what has been termed shop \ufb02 oor nervousness (Ouelhadj and Petrovic, 2009).", "Taking into account these real-time events, the JSP is termed as the dynamic JSP, which is very important and complicated for the successful implementation of real-world scheduling systems (Ouelhadj and Petrovic 2009).", "The schedule stability factor is measured by the starting time deviations for all jobs between the new schedule and the original schedule (Ouelhadj and Petrovic 2009).", "Vieira, Herrmann, and Lin (2003) and Ouelhadj and Petrovic (2009) presented de \ufb01 nitions appropriate for most applications of dynamic manufacturing systems.", "Recently, a great deal of effort has been spent on developing methods, such as how to reschedule, when to reschedule, to cope with the unexpected disruptions in the real manufacturing scheduling (Ouelhadj and Petrovic 2009; Aytug et al. 2005).", "Ouelhadj and Petrovic (2009) de \ufb01 ned the problem and provided a review of the state-of-the-art of currently developing research.", "Ouelhadj and Petrovic (2009) pointed out that few research works had addressed the use of meta-heuristics in dynamic scheduling."]} +{"205458182|10542845": ["A detailed overview of different EDA approach es in both discrete and continuo us domains can be found in [159] and a recent survey was published in [130]."]} +{"205458182|9141490": ["EAs have been widely applied with a good measure of success to combinatori al optimization problems [33,26], constrained optimization problems [55], Data Mining and Knowledge Discovery [97], etc."]} +{"205458182|14724015": ["Other forms of mutation include single-node mutations and various forms of code-editing to remove unnecessar y code from trees have been proposed in the literature [209,206]."]} +{"205458182|1437067": ["EAs have been widely applied with a good measure of success to combinatori al optimization problems [33,26], constrained optimization problems [55], Data Mining and Knowledge Discovery [97], etc.", "EAs have been widely applied with a good measure of success to combinatorial optimization problems [33, 26], constrained optimization problems [55], Data Mining and Knowledge Discovery [97], etc. MultiObjective Evolutionary Algorithms (MOEAs) are one of the current trends in developing EAs."]} +{"5892365|2373140": ["A recent review of applications and solution methods is given in [17]."]} +{"206725156|2373140": ["Given their importance in solving realistic VRPs, the further development of metaheuristic methods provides an opportunity for further research.", "\u2026periodic VRPs (Campbell & Wilson, 2014), the VRP with time windows (Br\u00e4ysy & Gendreau, 2005a, 2005b; Gendreau & Tarantilis, 2010), dynamic VRPs (Pillac, Gendreau, Gu\u00e9ret, & Medaglia, 2013), pickup and delivery problems (Berbeglia, Cordeau, Gribkovskaia, & Laporte, 2007), vehicle routing with\u2026", "A comprehensive review of the DVRP was recently presented by Pillac et al. (2013).", "Strikingly, no standard problem definitions or formulations are available for dynamic VRPs (Hong, 2012; Psaraftis, 1995).", "The evolution of real-time technologies, such as Intelligent Transformation Systems (ITS), Advanced Fleet Management Systems (AFMS) and Global Positioning Systems (GPS), has made dynamic VRPs a relatively hot topic in recent years (Psaraftis, 1995): 14 (4.28", "Most VRPs assume that the travel times between depots and customers are deterministic and constant (e.g., Kok et al., 2010) or equal to the distance between customers (e.g., Lei, Laporte, & Guo, 2011; X. Li et al., 2012).", "Furthermore, taxonomies on vehicle routing are rather scarce (Eksioglu et al., 2009; Lahyani, Khemakhem, & Semet, 2015), while surveys/reviews of existing literature often only focus on specific variants or aspects of the VRP, e.g. the capacitated VRP (Laporte, 2009), periodic VRPs (Campbell & Wilson, 2014), the VRP with time windows (Br\u00e4ysy & Gendreau, 2005a, 2005b; Gendreau & Tarantilis, 2010), dynamic VRPs (Pillac, Gendreau, Gu\u00e9ret, & Medaglia, 2013), pickup and delivery problems (Berbeglia, Cordeau, Gribkovskaia, & Laporte, 2007), vehicle routing with multiple depots (Montoya-Torres, Lopez France, Nieto Isaza, Felizzola Jimenez, & Herazo-Padilla, 2015), vehicle routing with split deliveries (Archetti & Speranza, 2012), green vehicle routing (C. Lin, Choy, Ho, Chung, & Lam, 2014) and synchronization aspects in vehicle routing (Drexl, 2012b)."]} +{"37941026|11810221": []} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"62225448|1142274": ["Analysing the research on solutions to flow shop production scheduling problems, including Allahverdi et al. (1999), Gupta and Stafford (2006) and Allahverdi et al.", "To the publication by Allahverdi et al. (2008), the increased interest in scheduling problems with setup times separated from processing times has led to over 40 articles published per year."]} diff --git a/edge/graph_37025094.jsonl b/edge/graph_37025094.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3705077.jsonl b/edge/graph_3705077.jsonl similarity index 100% rename from graph_3705077.jsonl rename to edge/graph_3705077.jsonl diff --git a/edge/graph_37051725.jsonl b/edge/graph_37051725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2361361a071915b25eb2d6aea13f1b3dd8e88d1b --- /dev/null +++ b/edge/graph_37051725.jsonl @@ -0,0 +1,47 @@ +{"13019489|8606364": ["The spectrum occupancy in 20MHz-to-3GHz was found to be 32% for indoor scenarios (in the case of outdoor, however, almost 100%, of this range is utilised), and very low in 3-to-6GHz [136], [62]."]} +{"13019489|4122595": ["Although the performance of other sensing techniques such as; feature detection, covariance, matched filter-based techniques may be superior, the implementation and computational complexity remain prohibitive [61], [95]."]} +{"13019489|42449870": ["For instance, in Cognitive Radio Networks (CRNs), many surveys on Opportunistic Spectrum Access (OSA) and Dynamic Spectrum Access (DSA) have been carried out.", "This type of spectrum sharing is similar to the interweave approach in CRNs, i.e., exclusive shared spectrum access where no interference is tolerable and almost always the actual owner of the spectrum (who is referred to as host operator) has the priority to access the band [57].", "Spectrum leasing policies have been applied to offer a more robust (in terms of access guarantees) form of OSA/DSA schemes in licensed bands in CRNs [66], where for example, the white spaces are leased to SUs subject to pre-negotiation with PUs.", "The authors also study the architectures of CRNs, as well as the cognitive-based spectrum sensing approaches, routing protocols, and interference mitigation schemes for smart grids.", "=> Spectrum assignment in CRNs is discussed.", "In CRNs, radios are capable of learning/monitoring theenvironment and change their transmission parameters adaptively based on the observations [42].", "A wide range of sensing techniques have been proposed and investigated in CRNs.", "In [38], a survey on resource allocation challenges in CRNs according to different design techniques such as, SINR-based, transmission power-based, centralised and distributed methods of decision making, is presented.", "It can be observed from the previous section that, there are extensive literature surveys that focus on spectrum sharing and access techniques in CRNs.", "The latter however, involves all OSA sharing types in CRNs incorporating distributed techniques (sensing technique in this work is mainly considered).", "Various schemes, which are defined under this authorisation regime, have been widely applied in CRNs under DSA/OSA contexts and based on prioritisation of the users into primary and secondary hierarchies.", "Spectrum sharing in future cellular systems (namely 5G), has a scope far beyond that addressed in previous studies of CRNs.", "These surveys mainly focus on the principals of CRNs and investigate the applicability of a wide range of available coordination protocols/methods, as well as the spectrum access/allocation/assignment techniques under various licensing regimes covering different spectrum ranges.", "Various enabling techniques that have been studied extensively in CRNs, comprise wide ranges of sensing techniques [61], Geo-location database, beacon signalling, etc. [37], in order to enable SUs to exploit the PUs\u2019 spectrum in an opportunistic manner.", "However, in contrast to the CRNs interweave approach, and based on the agreement among operators, access to the spectrum as well as QoS must be guaranteed for both sharing players.", "The term mapping is referred to the spectrum situational awareness with the aid of transmission observations which facilitates characterisation of CRNs, e.g., identification of how particular bands are being used and estimate spectrum occupancy and usage throughout the particular area [153].", "In [35] and [36], the authors provide a comprehensive survey of challenges related to the spectrum decision/assignment in CRNs, including spectrum characterisation process and primary-system activity modelling, spectrum selection, and reconfiguration.", "of OSA/DSA schemes in licensed bands in CRNs [66], where for example, the white spaces are leased to SUs subject to pre-negotiation with PUs.", "posed varieties of trading schemes for the pricing such as channel-quality based price, game-theoretic based (such as NE), and also demand-supply model in which the shared bands are assigned to the highest bidders [102], and spectrum leasing [66].", "Radio Networks: A Survey\u201d [35] => An overview of CRNs is presented."]} +{"13019489|8974063": ["In [35] and [36], the authors provide comprehensive survey on the challenges related to the spectrum decision/assignment in CRNs including; \u201cspectrum characterisation process\u201d, \u201cprimary-system activity modelling\u201d, \u201cspectrum selection\u201d, and \u201creconfiguration\u201d."]} +{"10808374|17787193": ["[8] summarized non-delayed and delayed strategies and also distinguished terminal-to-terminal techniques from AP-based offloading.", "Thus, our proposed work has a comprehensive classification of WiFi offloading that is different from [7] and [8].", "However, the incentives of the offloading techniques in [8] were not clear while we classify these incentives into five categories."]} +{"507972|8909218": []} +{"7858690|1236072": []} +{"22678385|875676": ["Some non-orthogonal FBMC schemes, such as generalized frequency division multiplexing (GFDM) and the faster-than-Nyquist approach, induce additional interference from neighboring subcarriers due to non-orthogonality [18], [19]."]} +{"22678385|8280144": ["16TC was introduced as a way to evaluate performance for specific communication strategies and different medium access control (MAC) protocols in ad hoc networks [85]."]} +{"12187956|141053": []} +{"14563665|8909218": ["The Femtocell BS communicates with the cellular networks through a broadband connection such as digital subscriber line (DSL), cable modem, or a separate radio frequency (RF) backhaul channel [1]."]} +{"3225335|25911553": []} +{"3225335|3799929": []} +{"3225335|34643772": []} +{"3225335|7525856": []} +{"3225335|8606364": ["CRN radio resource allocation has been discussed in [59]\u2013[61], and green energy-powered CRNs have been presented in [60] and [62]."]} +{"3225335|512561": ["CRNs, especially cognitive radio sensor networks (CRSNs) [246], can greatly benefit from energy harvesting approaches [247]."]} +{"3225335|1541773": ["Energy conservation is an important research domain in wireless communications [60], [62], [250]."]} +{"3225335|8650651": []} +{"3225335|4122595": ["2) Hardware Imperfections: Hardware imperfections in CRNs [107], such as non-linear distortions, phase noise, non-ideal frequency responses of circuits, power amplifier"]} +{"3225335|11414835": ["Network virtualization allows multiple virtual networks to operate over a given single physical network [267]\u2013[270]."]} +{"3225335|1686572": ["Surveys on MAC protocols for CRNs are provided in [50] and [51], while the security, privacy, and threats of CRNs have been surveyed in [52]\u2013[58].", "However, various CRNs related threats, such as primary user emulation (PUE) attacks [56] and others, as discussed in [58], have not been analyzed for FD-CRNs."]} +{"3225335|8974063": []} +{"3225335|8909218": ["2718618 This exceptional growth has motivated the development of next generation wireless technologies, such as femtocells [2], [3],"]} +{"2075465|2509135": ["The readers may refer to other publications in recent reviews [217], [218] and recent special issues, e."]} +{"2075465|12601073": []} +{"2469467|2509135": ["Detailed descriptions of the challenges and potential strategies may also be found in recent surveys [5], [6]."]} +{"24576435|30430657": ["0 [5], which is slated to be finalized in 2017."]} +{"2501228|8909218": []} +{"8462498|9321930": ["Thirdly, the format of relay: 1) amplify-relay, decode-relay or compress-relay, and 2) single relay or multiple relays [101]."]} +{"8462498|2926549": ["The false deduction from composite STA signals may propagate the error to following calculations [25]."]} +{"512561|6556803": ["These small motes can be deployed for large number of applications, for example, indoor sensing, industrial automation, forest fire detection, remote surveillance, and collecting weather information [57]\u2013 [64]."]} +{"512561|2443013": ["In [3], authors classified various spectrum aggregation schemes and revealed that channel aggregation is a powerful mechanism of improving throughput, however, the rate of throughput increase does not follow the same pattern in case of high traffic flow.", "Two of the relevant works in this context are [3] and [4], where both have focused on channel aggregation techniques.", "Strategies for optimum channel selection can help to satisfy QoS requirements for channel aggregation in high speed networks [3]."]} +{"512561|1503157": ["WSNs have recently been introduced in this process where the temperature of each container, along with its location, is regularly sensed and monitored from a remote location [150]."]} +{"512561|1230643": ["However, in the context of CRSNs, we need to investigate whether the same relationship between throughput and channel width exists considering the specific set of constraints faced by CRSNs.", "To make this investigation more meaningful, we discuss it through the following example scenarios where sensor nodes have been replaced with CRSNs.", "An important thing to note is that CRSNs lie at the center of these requirements as all these requirements are equally important for their successful implementation.", "The efficient radio resource allocation in CRSNs is important due to the dynamic channel selection of CR nodes.", "WSNs enriched with the additional capabilities of cognitive radio has led to the evolution of cognitive radio sensor networks (CRSNs) [20], [21].", "CB in CRSNs also face certain challenges which are needed to be optimized for its wide applicability in future applications.", "Although these schemes work quite well in traditional networks, the concept of self-organizing and self-healing nodes makes them inappropriate for CRSNs [14].", "The next section i.e Section II discusses the related work; Section III provides background on wireless networks and major requirements in their applications; CB is introduced in Section IV; CB schemes in the cellular networks, WLANs, WSNs, CRNs, and CRSNs are discussed in Sections V, VI, VII, VIII and IX respectively; Section X provides the guidelines on using CB for CRSNs, and Section XI concludes the paper.", "To our knowledge, there exists no protocol for CB in CRSNs.", "CRSNs having high bandwidth requirements, for instance, wireless multimedia sensor networks (WMSNs) can get benefit of CB approach to satisfy network requirements.", "By implementing CB in cellular networks, WLANs, WSNs, CRNs and CRSNs, one can satisfy the requirements of bandwidthhungry nodes.", "Wireless Body area networks (WBANs), emerging as promising approach for ubiquitous health monitoring systems [22]\u2013[24], are also an application area of CRSNs and CB plays an important role for providing high bandwidth to these systems.", "CB in CRSNs has to cope with twofold issues [147]; firstly, it has to use low transmit power due to life time of the powerconstrained sensor nodes; and secondly, it has to provide maximum capacity gain to CR nodes.", "Due to potential advantages of CRSNs, it can be deployed in many applications [16].", "Hence, it is interesting to investigate whether and how CB can help CRSNs.", "Therefore, energy constraints have been much investigated at all the layers of these networks [14], [65], [66].", "A comprehensive survey on radio resource allocation in CRSNs has been presented recently in [148].", "WSNs have attracted a lot of attention in industrial automation [13], defense applications [14], utility metering and home automation [15], just to name a few."]} +{"6713970|5621151": []} +{"11138393|8462498": ["11ac amendment [81], based on MU-MIMO [145].", "Also, novel MAC schemes for multiuser channel access should be developed for HEWs which employ PHY technologies such as OFDMA and MU-MIMO.", "The term \u2018multiuser channel access\u2019 refers to a technique by which multiple STAs, each with one or more antennas, either simultaneously transmit to a single STA or simultaneously receive from a single STA independent data streams over the same frequency channel.4 Multiuser channel access is supported by a PHY layer technology such as OFDMA or MU-MIMO (Sections II-A and II-B) for uplink or downlink communication, i.e., for the AP to transmit/receive data to/from multiple STAs simultaneously.", "MU-MIMO can be categorized into MIMO broadcast channels (MIMO-BC) and MIMO multiple access chandelles (MIMO-MAC).", "As mentioned in Section III-B, while downlink multiuser channel access is adopted in the IEEE 802.11ac based on MU-MIMO, realizing uplink multiuser channel access is a more challenging task.", "In order to maximize the throughput gain achieved in HEWs by applying an improved PHY layer, either based on IBFD communications, or via OFDMA and MU-MIMO techniques (Sections II-A and II-B), suitable MAC strategies should be developed for HEWs, as discussed in the following.", "Similarly, while there exist some uplink MU-MIMO MAC protocols proposed in [145], either with the AP coordinating", "PHY layer enhancements can be based on improving the current WLANs\u2019 OFDM and MU-MIMO techniques, and/or on employing other technologies such as OFDMA and IBFD communications.", "MU-MIMO leverages the spatially distributed user locations to achieve a spatial multiple access gain, which is useful when the number of STAs is large and the number of antennas at the AP is more than the number of antennas at each STA.", "However, the employment of OFDMA or MU-MIMO technologies at the PHY layer requires a suitable MAC scheme that can achieve the maximum benefit of multiuser channel access.", "The performance of MU-MIMO systems, including MIMO-BC and MIMO-MAC, has been extensively studied [61]\u2013[66].", "Also, a comparison between the downlink MU-MIMO and downlink OFDMA technologies is presented in [118] and [119], in terms of throughput gain and additional control overhead with respect to single-user channel access.", "The second direction focuses on new MAC schemes for simultaneous multiuser transmission, based on the OFDMA or MU-MIMO technologies, as discussed in Sections II-A and II-B respectively.", "In summary, this section discusses three potential PHY layer technologies for HEWs, which are OFDMA, MU-MIMO, and IBFD.", "Downlink multiuser transmission is recently introduced in the IEEE 802.11ac amendment [81], based on MU-MIMO [145].", "These enhancements include adopting orthogonal frequency division multiple access (OFDMA) and deploying technologies such as multiuser multiple-input multiple-output (MU-MIMO) and inband full-duplex (IBFD) communications.", "Also, the IEEE 802.11ac provides simultaneous data streams for up to four downlink MU-MIMO STAs (i.e., MIMO-BC).", "On the other hand, in a MU-MIMO system, the available antennas are spread over multiple independent transmitters and receivers.", "Similarly, while there exist some uplink MU-MIMO MAC protocols proposed in [145], either with the AP coordinating uplink transmission of sending STAs [124], [125] or without AP coordination [126]\u2013[128], it is still unclear which approach can be adopted for the IEEE 802.11ax standard to achieve efficient uplink multiuser transmission, while preserving backward compatibility with the IEEE 802.11 standard and its previous amendments.", "In addition, MU-MIMO is more immune to signal propagation issues that degrade the SU-MIMO performance, such as antenna correlations or channel rank loss."]} +{"11138393|9321930": ["11 MAC improvements Multiuser MAC IBFD MAC Cooperative MAC Development platforms Section III Subsection III-A Subsection III-B Subsection III-C [31], [32] [33], [34]"]} +{"11138393|1588237": ["ing cell-edge users and cell-center users, respectively [186]."]} +{"11138393|7892994": ["In general, a smaller frequency reuse factor (FRF)6 is allocated to cell-center users to improve the frequency reuse, while a larger FRF is allocated to cell-edge users, who are affected to a larger extent by inter-cell interference (ICI).", "However, static schemes may not work well for all network conditions in terms of cell load, ICI level, etc.", "Furthermore, in some SFR schemes, cell-center users are always allowed to access the minor band, provided that the transmit power level is sufficiently low, in order to prevent excessive ICI [169].", "10, PFR is sometimes referred to as FFR with full isolation, since the cell-edge users are fully isolated from ICI [187].", "For instance, information exchange among neighboring base stations can be used to minimize the ICI and guarantee a minimum data rate for the users in a cell [180], or to dynamically adjust the boundary between the cell center and cell edge in order to maximize the cell throughput [181].", "10, at the expense of allowing for additional ICI, as a result of a maximum of 1/3 B0 frequency band overlap between two neighboring celledge regions.", "In order to address the ICI and low spectral efficiency issues of SFR schemes, intelligent reuse schemes are developed, such as incremental frequency reuse (IFR) and enhanced fractional frequency reuse (EFFR) [174], [175].", "However, even by controlling the transmit power, SFR schemes cannot completely eliminate ICI.", "since the cell-edge users are fully isolated from ICI [187]."]} +{"1588237|7892994": ["extended their evaluation of static schemes by a comparative study of the performance of four ICIC schemes (reuse-1 Figure 3-(a), reuse-3 Figure 3-(b), SFR [9] Figure 6-(a), FFR-FI [8] Figure 4) in a realistic nonregular cellular layout giving special attention to the efficiency vs.", "In [55], three static ICIC schemes (PFR [11] Figure 6-(b), FFR with multiple user class [21] Figure 8 and FFR-FI [8] Figure 4) were compared in a regular cells layout.", "1) Partial Frequency Reuse (PFR): From the above discussion, it is clear that using the same FRF value for the entire cell is not bandwidth-efficient [8].", "In [56], Gonzalez et al. extended their evaluation of static schemes by a comparative study of the performance of four ICIC schemes (reuse-1 Figure 3-(a), reuse-3 Figure 3-(b), SFR [9] Figure 6-(a), FFR-FI [8] Figure 4) in a realistic nonregular cellular layout giving special attention to the efficiency vs. fairness tradeoff.", "The following are some examples that can create such confusions: \u2022 Some published work uses the notion of \u201cPartial Frequency\nReuse (PFR)\u201d [12] while others use \u201cFractional Frequency Reuse with full isolation (FFR-FI)\u201d [8] to refer to the same scheme.", "\u2022 Some published work uses the notion of \u201cPartial Frequency Reuse (PFR)\u201d [12] while others use \u201cFractional Frequency Reuse with full isolation (FFR-FI)\u201d [8] to refer to the same scheme.", "Restricting inter-class interference would mean using a reuse-n where n \u2265 3 for the edge bands as in FFR-FI scheme [8].", "B = {B1} R = {r1} Reuse-1 \u03b1 = {a1} Figure 3-(a) s1 = s2 = s3 = {B1(a1, r1)} B = {B1, B2, B3} R = {r1} Reuse-3 \u03b1 = {a1} (Hard frequency s1 = {B1(0, 0), B2(0, 0), B3(a1, r1)} reuse [57]) s2 = {B1(0, 0), B2(a1, r1), B3(0, 0)} Figure 3-(b) s3 = {B1(a1, r1), B2(0, 0), B3(0, 0)} B = {B1, B2, B3, B4} PFR [12] R = {r1, r2} (FFR-FI [8] \u03b1 = {a1, a2} ) (Hard frequency s1 = {B1(a1, r1), B2(0, 0), B3(0, 0), B4(a2, r2)} reuse [33]) s2 = {B1(a1, r1), B2(0, 0), B3(a2, r2), B4(0, 0)} Figure 4 s3 = {B1(a1, r1), B2(a2, r2), B3(0, 0), B4(0, 0)} PFR with B = {B1, B2, B3, B4} only one R = {r1, r2} interference \u03b1 = {a1, a2} in the worst s1 = {B1(a1, r1), B2(a2, r2), B3(0, 0), B4(a2, r2)} case [22] s2 = {B1(a1, r1), B2(0, 0), B3(a2, r2), B4(a2, r2)} Figure 5 s3 = {B1(a1, r1), B2(a2, r2), B3(a2, r2), B4(0, 0)} B = {B1, B2, B3} R = {r1, r2} SFR \u03b1 = {a1, a2} (Original) s1 = {B1(a1, r1), B2(a1, r1), B3(a1, r1) \u222a B3(a2, r2)} [9] s2 = {B1(a1, r1), B2(a1, r1) \u222a B2(a2, r2), B3(a1, r1)} Figure 6-(a) s3 = {B1(a1, r1) \u222a B1(a2, r2), B2(a1, r1), B3(a1, r1)} B = {B1, B2, B3} R = {r1} SFR \u03b1 = {a1, a2} (2 definition) s1 = {B1(a1, r1), B2(a1, r1), B3(a2, r2)} [11] s2 = {B1(a1, r1), B2(a2, r2), B3(a1, r1)} Figure 6-(b) s3 = {B1(a2, r2), B2(a1, r1), B3(a1, r1)} B = {B1, B2, B3, B4} R = {r1, r2}", "The PFR is also known as FFR with full isolation (FFRFI), as users at cell-edge are fully protected (isolated) from adjacent cells\u2019 interference [8]."]} +{"2583020|10837932": ["As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|17960632": ["In fact, for hard real time applications the problem is not only the added delay but also the nondeterministic way in which that delay occurs (for more information on Real-Time MACs for WSNs the reader is referred to [9]).", "medium access is ruled out because of its nondeterministic delays, and reservation-based MACs will be preferred [9].", "As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|1940388": ["Security issues in WSNs are discussed in [58]."]} +{"17787193|8909218": ["Interested readers should also refer to existing surveys on femtocells in the literature [144], [145]."]} +{"17787193|8280144": ["While classical studies show that the theoretical transport capacity of multi-hop ad hoc networks scales sublinearly as \u0398( \u221a n) [97], [98] with the number n of users, cooperation among nodes brings linear scaling law of \u0398(n) [99]."]} +{"15023432|8462498": ["A survey of MU-MIMO MAC protocols for WLANs is shown in [12], where both uplink and downlink MU-MIMO MAC proposals for WLANs are reviewed."]} diff --git a/edge/graph_37052879.jsonl b/edge/graph_37052879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d64dc1ff0d81909ab2fdc7bc527a06d89164f6c4 --- /dev/null +++ b/edge/graph_37052879.jsonl @@ -0,0 +1,3 @@ +{"14897482|11720829": ["Recent multiple-input, multiple-output (MIMO) techniques [143], [144] like the upcoming IEEE 802."]} +{"14897482|1387401": ["In realistic environments the wireless channel suffers from phenomena like path loss and shadowing, multipath propagation and thermal noise [132]\u2013[134]."]} +{"14897482|1230643": ["Wireless sensor networks (WSN) [55], [56], [30], [57], [58], [59], [60] consist of a large number of small, energy- and resource-constrained sensor nodes."]} diff --git a/edge/graph_37058910.jsonl b/edge/graph_37058910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16d26ae640d1b918eb74f7e924aea14e781ddda8 --- /dev/null +++ b/edge/graph_37058910.jsonl @@ -0,0 +1,16 @@ +{"2553026|7360895": ["The role as co-worker and assistant in human environments leads to new challenges in the design process of robot behaviors (Fong et al., 2003).", "Verbally communicating the results of its internal action simulation and monitoring processes greatly facilitates the interaction with naive users since it helps a human to quickly adjust his/her expectations about the capacities the robot might have (Fong et al., 2003)."]} +{"2981653|7983519": ["These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options [20].", "These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options (Krahmer and Deemter 2012).", "\u2026the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \" near \" or \" under \" which may not be directly computed from the robot's perceptual system (Krahmer and Deemter 2012).", "Hard-coded or template-based methods for generating requests do not take into account the ability of a person to understand the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \u201cnear\u201d or \u201cunder\u201d which may not be directly computed from the robot\u2019s perceptual system [20]."]} +{"6994739|7360895": ["To copyotherwise, to republish, to post on servers or to redistribute \nto lists, requires prior speci.c permission and/or a fee."]} +{"6994739|14997956": []} +{"14734113|7360895": ["Research into the issues involved with social robotics is important for the creation of robots that will operate alongside people and integrate themselves into human environments [10]."]} +{"15198166|1452734": ["We adopt a developmental robotics approach [18], [10] to tackle the language acquisition problem."]} +{"11970556|7185733": ["Vision-based gesture recognition has long been considered for a variety of tasks, and has proven to be a challenging problem examined for over 20 years with diverse wellestablished applications [12][13]."]} +{"8098601|206742377": []} +{"11533813|7360895": ["Fong, Nourbakhsh, & Dautenhahn (2003) developed a collaborative control system in which robots asked human partners questions via a PDA interface.", "However, there is not consensus that human-robot interfaces should be built around natural language due to the challenges in building dialog interfaces in changing social contexts (Fong, Nourbakhsh, & Dautenhahn, 2003; Severinson-Eklundh, Green, & H\u00a8uttenrauch, 2003)."]} +{"4297798|2080630": ["The sensor-based method, which means different types of sensors such as RFID sensors are used to collect surgical data automatically, is usually integrated with surgical systems such as surgical robots to record all the surgeries, with low time/labor costs [31][34-35].", "To reduce the time/labor cost, one strategy is the replacement of the observer-based data collection method with the sensor-based data collection method [31].", "limited targeted surgeries, with high time/labor costs [31-33]."]} +{"27191493|1634674": ["A sequence of the silhouettes for the human figure, Iij = \ued5b Iij[1], Iij[2], .", "A sequence of silhouette images Iij can be converted to a sequence of pose descriptors Fij = \ued5b fij[1], fij[2], .", "A performer\u2019s action is subsequently represented as a sequence of pose descriptors F = {f [1], f [2], .", "Action recognition has been the subject of a significant amount of research [1,2].", "Additionally, the node transition Qij = \ued5b qij[1], qij[2], .", "An action is encoded as a sequence of configurations; more specifically, in this study each action is assumed to be a sequence of positions of markers, \u0398i = (\u03b8i[1], \u03b8i[2], .", "A sequence of the silhouettes for the human figure, Iij = Iij[1], Iij[2], . . . , Iij[T ] , can be consequently obtained."]} +{"7529010|7360895": ["Having robots to assist people in human-centered environments is a goal that the robotics community has aspired to for many years (Fong et al. 2003)."]} +{"207079297|16770050": []} +{"207079297|14970359": []} +{"207079297|7185733": []} +{"977486|1452734": ["We adopt a developmental robotics approach [4], [5] to tackle the language acquisition problem."]} diff --git a/edge/graph_3706010.jsonl b/edge/graph_3706010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74764d52e7a59586316108c4e0be26c24137a5cc --- /dev/null +++ b/edge/graph_3706010.jsonl @@ -0,0 +1,4 @@ +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} diff --git a/edge/graph_37061063.jsonl b/edge/graph_37061063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4488f128acf86bde1502f572037416a86d16f22a --- /dev/null +++ b/edge/graph_37061063.jsonl @@ -0,0 +1,4 @@ +{"8917447|1230643": ["To provide support to existent sensors in environment we considered aspects of wireless sensor networks (WSN) [7] [8].", "Although we acknowledge that our solution is not a WSN per se, we re-used concepts from this field of research such as:\n\u2022 methods for resource management, including indexing, discovery and monitoring;\n\u2022 methods for ubiquitous communication between mobile computing and stationary computing devices;\n\u2022 methods for implementing security, including confidentiality of the transferred data, authentication, authorization, and;\n\u2022 programming interfaces for mobile computing and stationary computing devices."]} +{"17215718|2809360": ["It is difficult to obtain such information from free text [4], and"]} +{"2923178|11009327": []} +{"17432361|8914588": ["In an AC system the problems should be diagnosed and repairs attempted without human intervention and additional problem insertion [3]."]} diff --git a/edge/graph_37069150.jsonl b/edge/graph_37069150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4c34bd960d293fd10ca1419f6153cb53b3744f1 --- /dev/null +++ b/edge/graph_37069150.jsonl @@ -0,0 +1,8 @@ +{"15164721|8909218": ["This has motivated the recent surge of research on massive and dense deployment of base-station antennas both in the form of \u201cMassive MIMO\u201d solutions with hundreds of antennas at each cell site [1]\u2013[3] and multi-tier networks that include dense small-cell deployments [4], [5]."]} +{"2722298|15453366": []} +{"1412645|14889616": ["264 encoder [3]."]} +{"16290804|8909218": ["We believe that this architecture can provide a low-cost solution in parallel with other solutions like HSPA and femtocells [5].", "Femtocell technique was initially proposed to improve indoor voice and data services of cellular networks [5]."]} +{"8538839|8909218": ["Massive MIMO schemes, with hundreds of antennas at each cell site [3]\u2013[5], and in the form of multi-tier networks of densely deployed small-cells [6], [7]."]} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"14908254|8909218": ["Of\ufb02oading data is, in fact, viewed as the primary role of SCBSs, particularly those deployed by an operator in outdoor environments such as picocells [1], [2], [15].", "For reaping the bene\ufb01ts of small cell deployment, numerous technical challenges must be addressed such as resource management, interference avoidance, and user association [2], [4\u20139].", "These SCBSs are seen as a key approach for of\ufb02oading traf\ufb01c from the macro-cell network while providing high capacities by bringing the users and their access points closer to one another [2].", "We mainly focus on outdoor SCBSs such as picocells/microcells/metrocells that are used by the operator to of\ufb02oad data by serving any of the N macro-cell users when needed [1], [2]."]} +{"8411142|8280144": ["Note that this assumption, which does not consider the total aggregate power sensed on a channel, will lead to a tight lower bound on the probability that the channel is busy [16]."]} diff --git a/graph_3707913.jsonl b/edge/graph_3707913.jsonl similarity index 100% rename from graph_3707913.jsonl rename to edge/graph_3707913.jsonl diff --git a/edge/graph_3709199.jsonl b/edge/graph_3709199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3709452.jsonl b/edge/graph_3709452.jsonl similarity index 100% rename from graph_3709452.jsonl rename to edge/graph_3709452.jsonl diff --git a/edge/graph_37096795.jsonl b/edge/graph_37096795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37099732.jsonl b/edge/graph_37099732.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52e59ef6ce306d8503c557c914059d5c2ddf583e --- /dev/null +++ b/edge/graph_37099732.jsonl @@ -0,0 +1,9 @@ +{"206592484|456491": []} +{"3150599|3644401": []} +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"25310609|530484": []} +{"54526983|393948": ["Other methods known asDeep Learning deal with representation learning by automatically learning an hierarchy of increasingly complex features directly from data [24]."]} +{"247457|393948": []} +{"206594196|469744": ["Successful image segmentation techniques could facilitate a large group of applications such as image editing [17], augmented reality [3] and self-driving vehicles [22]."]} +{"3767412|43982203": []} +{"3767412|15033413": []} diff --git a/edge/graph_37107552.jsonl b/edge/graph_37107552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2891f2256a0e60c5f8401bdfd8c237673587112 --- /dev/null +++ b/edge/graph_37107552.jsonl @@ -0,0 +1 @@ +{"25495646|3330313": ["applications [32], [33]."]} diff --git a/edge/graph_37109390.jsonl b/edge/graph_37109390.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..343842a3022abc7a3669c93f2de8f1610308a10d --- /dev/null +++ b/edge/graph_37109390.jsonl @@ -0,0 +1,7 @@ +{"2193241|3540699": []} +{"26722661|14889616": ["More detail about SVC can be found in [6] and [36]."]} +{"6375309|25929315": ["A comprehensive performance evaluation of the energy efficiency of the random access mechanism of LTE and its role for M2M is provided [21].", "Similar to [21], [22], we study an energy-efficient design for M2M uplink where devices perform multi-hop transmissions."]} +{"33354449|7971188": ["The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|14697846": ["The interested reader is referred to [160,392,393,202] for more detailed surveys.", "and (iii) partially centralised (or hierarchical) [160].", "However, this form of overlays is usually still classified in the unstructured family [160,202].", "The interested reader is referred to [159,160] for extended surveys on P2P overlay networks."]} +{"33354449|10559330": []} +{"47348741|8909218": []} diff --git a/graph_3710963.jsonl b/edge/graph_3710963.jsonl similarity index 100% rename from graph_3710963.jsonl rename to edge/graph_3710963.jsonl diff --git a/edge/graph_371337.jsonl b/edge/graph_371337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37143287.jsonl b/edge/graph_37143287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4cf94dacad53ee672666fe0c6b6d038e66fd1b1 --- /dev/null +++ b/edge/graph_37143287.jsonl @@ -0,0 +1,20 @@ +{"2263446|6084038": []} +{"2263446|40304452": ["We refer the interested reader to the surveys of Calamoneri [6] and Yeh [24]."]} +{"17425083|6084038": []} +{"17425083|2459674": ["To conclude the proof of Theorem 2 it remains to note that it follows from Lemma 7 that T has O((n+m)5) vertices."]} +{"17425083|40304452": ["Especially L(p1, p2)-labelings are well studied, see the surveys of Calamoneri [2] and Yeh [33]."]} +{"42289619|40304452": ["The reader is referred to Yeh [17] for a recent survey of results and generalizations of L(2, 1)-labellings.", "Griggs and Yeh [6] initiated a systematic study into L(2, 1)-labellings of graphs that has been intensively developed ever since."]} +{"13413365|2459674": ["Here the colors (we prefer to call them labels) are nonnegative integers and requirements are posed on the difference of labels assigned to vertices that are close to each other [22, 7 ]."]} +{"13413365|40304452": ["Here the colors (we prefer to call them labels) are nonnegative integers and requirements are posed on the difference of labels assigned to vertices that are close to each other [28,8]."]} +{"13413365|17003768": ["All these variants of graph coloring are NP-hard in the general case [27,3] and it is natural to explore their F PT complexity under different parameterizations as well [5]."]} +{"47457376|5865117": []} +{"5865117|2459674": ["The present paper is an update of [29].", "The extent of the literature and the huge number of papers concerning the L(h, k)labelling problem have been the main motivation of the surveys [2, 29, 183], each one approaching the problem from a different point of view (operative research, graph algorithms and extremal combinatorial, respectively), but they are all published at least five years ago."]} +{"5865117|40304452": ["The extent of the literature and the huge number of papers concerning the L(h, k)labelling problem have been the main motivation of the surveys [2, 29, 183], each one approaching the problem from a different point of view (operative research, graph algorithms and extremal combinatorial, respectively), but they are all published at least five years ago.", "Some of these generalizations are considered in [183]."]} +{"27602934|2459674": ["We can find related results on L(p, q)-labelings in comprehensive surveys by Calamoneri [3] and by Yeh [14]."]} +{"27602934|40304452": ["We can find related results on L(p, q)-labelings in comprehensive surveys by Calamoneri [3] and by Yeh [14]."]} +{"2539737|40304452": ["Given two sets of vertices X and Y of G , the distance from X to Y denoted dist ( X, Y ) is the length of a shortest xy -path with x \u2208 X and y \u2208 Y ."]} +{"9801242|2459674": []} +{"9801242|40304452": []} +{"38844785|5865117": ["We can find various related results on L(2,1)labelings and L(p,q)-labelings for other parameters in comprehensive surveys by Calamoneri [2] and by Yeh [17].", "We can find a lot of related results onL(p, q)-labelings in comprehensive surveys by Calamoneri [2] and Yeh [13].", "Our Contributions Although there have been a few polynomial time algorithms for L(2,1)-labeling of trees, it has been open if it can be improved to linear time [2]."]} +{"38844785|2459674": []} +{"38844785|40304452": ["Griggs and Yeh [7] observed that any major vertex inG must be labeled 0 or\u2206 + 1 when\u03bb(G) = \u2206 + 1, and that if \u03bb(G) = \u2206 + 1, thenNG[v] contains at most two major vertices for anyv \u2208 V(G).", "We can find various related results on L(2,1)labelings and L(p,q)-labelings for other parameters in comprehensive surveys by Calamoneri [2] and by Yeh [17].", "As for trees, Griggs and Yeh [7] showed that\u03bb(T) is either\u2206 + 1 or\u2206 + 2 for any treeT, and also conjectured that determining\u03bb(T) is NP-hard, however, Chang and Kuo [3] disproved this by presenting a polynomial time algorithm for computing\u03bb(T).", "We can find a lot of related results onL(p, q)-labelings in comprehensive surveys by Calamoneri [2] and Yeh [13]."]} diff --git a/graph_3717912.jsonl b/edge/graph_3717912.jsonl similarity index 100% rename from graph_3717912.jsonl rename to edge/graph_3717912.jsonl diff --git a/edge/graph_37203392.jsonl b/edge/graph_37203392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63a2cf1464cd686479e7c61764495fdecbba00ad --- /dev/null +++ b/edge/graph_37203392.jsonl @@ -0,0 +1,8 @@ +{"4237986|15700537": ["Although there have been several important developments, these new technologies have not been widely accepted [ 1 ].", "If the volume of the self set Vs can be computed, the volume Vns that should be covered by the detector set can easily be calculated as Vns = 1 - Vs, since the self/nonself space corresponds to a unit hypercube [0, 1 ] n . Therefore, the closer the volume of the detector set represented in the"]} +{"55948814|14441987": []} +{"1333339|14745481": ["Applications of trust management is enormous in mobile networks [20].", "Apart from these, some application specific attack models are discussed in [20], [101], [102].", "The detailed survey on various trust computation mechanisms, trust dynamics and their inter operations are missing in [20].", "There is a recent survey on trust management for MANET in [20]."]} +{"1333339|10137283": []} +{"1333339|9240891": []} +{"1333339|10859599": ["Apart from these, some application specific attack models are discussed in [20], [101], [102]."]} +{"2531254|6430931": ["The Human Immune System (HIS) is one of the most powerful biological systems, which has attracted computer scientists to envision its utilization in Intrusion Detection Systems (IDSs) (Wu and Banzhaf, 2010)."]} +{"16028625|44944144": ["Mobile ad hoc networks (MANETs) [1] are self-created and self organized networks in which mobile nodes communicate with each other via wireless connections and without any pre-existing network infrastructure."]} diff --git a/edge/graph_37205859.jsonl b/edge/graph_37205859.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99e1d8a3a9897a243c1ddff2212a52897804404f --- /dev/null +++ b/edge/graph_37205859.jsonl @@ -0,0 +1 @@ +{"3263533|38476": []} diff --git a/edge/graph_3721039.jsonl b/edge/graph_3721039.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37213650.jsonl b/edge/graph_37213650.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3723052.jsonl b/edge/graph_3723052.jsonl similarity index 100% rename from graph_3723052.jsonl rename to edge/graph_3723052.jsonl diff --git a/edge/graph_37255462.jsonl b/edge/graph_37255462.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3730563.jsonl b/edge/graph_3730563.jsonl similarity index 100% rename from graph_3730563.jsonl rename to edge/graph_3730563.jsonl diff --git a/graph_3730832.jsonl b/edge/graph_3730832.jsonl similarity index 100% rename from graph_3730832.jsonl rename to edge/graph_3730832.jsonl diff --git a/edge/graph_37317404.jsonl b/edge/graph_37317404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3731816.jsonl b/edge/graph_3731816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37322451.jsonl b/edge/graph_37322451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c10de6b9e4f981c9b3ca6207fe517bd8903a89cb --- /dev/null +++ b/edge/graph_37322451.jsonl @@ -0,0 +1,8 @@ +{"43477623|17516538": ["The goal of object tracking is to determine the position of the object in images continuously and reliably against dynamic scenes [1]."]} +{"207320201|9045232": []} +{"8135434|7185733": ["Vision-based gesture recognition is an important technology for friendly human-computer interface, and has received more and more attention in recent years [1, 2]."]} +{"823678|7788290": ["Tracking people, which raises many challenges due to the presence of large 3D, nonrigid motion, was extensively analyzed in [36], [1], [ 30 ], [73]."]} +{"6837802|7788290": []} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"2749844|15767558": ["Refer to [9\u201311] for some good surveys."]} diff --git a/edge/graph_3732796.jsonl b/edge/graph_3732796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3734874.jsonl b/edge/graph_3734874.jsonl similarity index 100% rename from graph_3734874.jsonl rename to edge/graph_3734874.jsonl diff --git a/edge/graph_37354219.jsonl b/edge/graph_37354219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37372680.jsonl b/edge/graph_37372680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3738168.jsonl b/edge/graph_3738168.jsonl similarity index 100% rename from graph_3738168.jsonl rename to edge/graph_3738168.jsonl diff --git a/edge/graph_37405965.jsonl b/edge/graph_37405965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f12a839fa6de5c1cf131541d849e2323c5de41e --- /dev/null +++ b/edge/graph_37405965.jsonl @@ -0,0 +1,3 @@ +{"21057830|1983971": ["The navigation tasks can generally be classified into the following three categories (Bowman et al., 2002): exploration, search tasks and manoeuvring that enable users to place the viewpoint at a more advantageous location to perform a particular task.", "The navigation tasks can generally be classified into the following three\ncategories (Bowman et al., 2002): exploration, search tasks and manoeuvring that enable users to place the viewpoint at a more advantageous location to perform a particular task."]} +{"15905951|469744": ["From a technological point of view AR applications must fulfill the following three requirements [4]: combination of real and virtual worlds, real time interaction, and accurate 3D registration of virtual and real objects.", "An interesting definition of AR has been described by Azuma 1997 [4], as a variation of virtual reality (VR)."]} +{"15905951|17024419": []} diff --git a/edge/graph_37424351.jsonl b/edge/graph_37424351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cbe01f1722c403deebc07bf1bcb519f8bf36bc0 --- /dev/null +++ b/edge/graph_37424351.jsonl @@ -0,0 +1,3 @@ +{"16780531|2357830": ["1) Hash-Based Access Control: There is a simple\nsecurity schemes based on one-way hash function [17] for the low cost tags but, in practice a hardware optimized cryptographic hash would sufficient."]} +{"3500624|2906773": []} +{"3500624|18037424": []} diff --git a/graph_3746886.jsonl b/edge/graph_3746886.jsonl similarity index 100% rename from graph_3746886.jsonl rename to edge/graph_3746886.jsonl diff --git a/edge/graph_37473522.jsonl b/edge/graph_37473522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a68ab330e640014282301182880b0a3c2c6c562 --- /dev/null +++ b/edge/graph_37473522.jsonl @@ -0,0 +1,9 @@ +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"3254786|164835": []} +{"7513601|206583375": ["There are several existing wireless infrastructures deployed in indoor environments like ultrasonic, infrared, and artificial vision, that have been considered for indoor localization, but radiofrequency-based systems predominate today, due to their availability and low cost [2, 3]."]} +{"4093889|2835258": ["A number of location-aware protocols have been proposed for \u201cad hoc\u201d routing and networking [3]."]} +{"301363|6396569": ["There are several survey papers in the literature of indoor localization, e.g. [1,3,6].", "In addition, more and more attention has been paid to context-aware applications which can make our life easier and convenient [3].", "\u2026we can see that in order to obtain the physical position of the target-of-interest in indoor environments, two steps are usually needed [3,8]: first, some position-related signal parameters corresponding to wireless communications between the target and the sensor are measured; and\u2026", "The most common technique used here is based on ranging, whereby distance or angle approximations are obtained [3]."]} +{"301363|17325804": ["\u2026we can see that in order to obtain the physical position of the target-of-interest in indoor environments, two steps are usually needed [3,8]: first, some position-related signal parameters corresponding to wireless communications between the target and the sensor are measured; and then,\u2026", "With respect to AOA-based techniques [5,6,8,16], the reference nodes or the target node has the capability of measuring the angle of arrival based on information obtained."]} +{"301363|206583375": ["There are several survey papers in the literature of indoor localization, e.g. [1,3,6].", "They gradually play an important role in all aspects of people's daily lives [1], including e.g. living assistant, navigation, emergency detection, surveillance/tracking of target-of-interest, and many other location-based services.", "In Table I [1,5,6], we make a comparison between some major localization systems in various aspects, including accuracy, advantages and disadvantages, networking technologies and localization methods."]} +{"42865877|164835": []} diff --git a/edge/graph_37490434.jsonl b/edge/graph_37490434.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3da49ba77ed276b967a76b6020c821a762819228 --- /dev/null +++ b/edge/graph_37490434.jsonl @@ -0,0 +1 @@ +{"28131709|6537874": ["Neglecting NFRs has led to a series of software failures, such as a number of systemic failures discussed in the literature [ 6-9 ]."]} diff --git a/edge/graph_37497601.jsonl b/edge/graph_37497601.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..486c437961639c269936befc03a363713b22117f --- /dev/null +++ b/edge/graph_37497601.jsonl @@ -0,0 +1,2 @@ +{"6817433|8909218": ["Recently, deployment of picocells and femtocells for mobile wireless systems has been studied [11]."]} +{"11676698|1230643": ["In wireless sensor networks, the basic operation is data fusion , whereby data from each sensor is agglomerated to form a single meaningful result [17,44,71,74,76\u201378].", "Several open research issues\u2014includ-ing hardware design, modulation protocols, and strategies to overcome signal propagation ef-fects\u2014are discussed along with various MAC protocols."]} diff --git a/graph_3750204.jsonl b/edge/graph_3750204.jsonl similarity index 100% rename from graph_3750204.jsonl rename to edge/graph_3750204.jsonl diff --git a/edge/graph_37538456.jsonl b/edge/graph_37538456.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a08e567e2daad95b613c6b52b06b22dfca90da78 --- /dev/null +++ b/edge/graph_37538456.jsonl @@ -0,0 +1 @@ +{"36860468|206620697": ["digital artifacts [ 6 ], or concepts for cost-efficient distributed storage [5], to name just a few."]} diff --git a/graph_3755658.jsonl b/edge/graph_3755658.jsonl similarity index 100% rename from graph_3755658.jsonl rename to edge/graph_3755658.jsonl diff --git a/edge/graph_37564067.jsonl b/edge/graph_37564067.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccd608e8dcf50a771dcd6ab3288d4daa5ff9f7ad --- /dev/null +++ b/edge/graph_37564067.jsonl @@ -0,0 +1,24 @@ +{"5054763|2623404": []} +{"13803354|4395259": ["Physical-layer security provides cost-effective solutions to this problem through keyless secret communications that do not require a handshaking mechanism between the communicating parties [1], [2]."]} +{"39443922|1230643": ["Sensor networks can be used for variety of applications such as military, emergency sites, smart homes, health and commercial areas [1]."]} +{"13046665|3042864": ["By doing so, computing power and data storage overhead costs are eliminated at mobile devices [1][3] and [4].", "The advent of cloud computing and the benefits presented by smart mobile devices are leading to the wide adoption of the mobile cloud computing paradigm [3]."]} +{"19540320|1230643": []} +{"29904041|1230643": ["Although wireless sensor networks share similarities with ad hoc wireless networks, several important distinctions can be drawn between the two [3], [13]."]} +{"13319345|14745481": ["However, it computes TVs only based on direct observations and does not consider trust decay due to using recommendations from remote nodes [27]."]} +{"311662|12452682": []} +{"2517560|4395259": ["The interested readers may refer to [4] for a comprehensive survey.", "Other than the encryption techniques applied in the higher protocol layers [3], recent years have witnessed the quick development of physical layer security techniques [4]."]} +{"17623572|14441987": ["have been completed in recent decades [17,18]."]} +{"5385031|7320605": ["Moreover, the surveys on applications of game theory for wireless sensor network focus on general problems not specifically from economic and pricing aspects [12], [13].", "\u2022 Strategy: Player\u2019s strategy is a complete plan of actions/instructions that the player can choose [12], and the payoff depends on not only its own actions but also the actions of others."]} +{"5385031|1756215": [", the attacker and the WSN owners) which strengthen the network security [222]."]} +{"5385031|12817488": ["redundancy as well as saving the energy required for information transmission to the sink node [99], [100]."]} +{"5385031|17205659": ["Various WSN security protocols were classified and evaluated in [221]."]} +{"37925315|12681089": []} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"27958855|4395259": ["Alternatively, implementing wireless security at the physical layer attracts great interest [1]."]} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"155344168|9646739": []} +{"155344168|14441987": []} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} diff --git a/graph_3757239.jsonl b/edge/graph_3757239.jsonl similarity index 100% rename from graph_3757239.jsonl rename to edge/graph_3757239.jsonl diff --git a/edge/graph_37586007.jsonl b/edge/graph_37586007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed5ffc982d92108126be0fa401845d386107461d --- /dev/null +++ b/edge/graph_37586007.jsonl @@ -0,0 +1,2 @@ +{"2201076|16575201": ["(Kageura & Umino 1996) summarized five groups of weighting measure: (i) a word which appears in a document is likely to be an index term; (ii) a word which appears frequently in a document is likely to be an index term; (iii) a word which appears only in a limited number of documents is likely to\u2026"]} +{"23069127|16575201": ["Since ATR methods are mostly empirical, [19], we evaluate the results of the method in terms of precision and recall, [29]."]} diff --git a/graph_3758974.jsonl b/edge/graph_3758974.jsonl similarity index 100% rename from graph_3758974.jsonl rename to edge/graph_3758974.jsonl diff --git a/edge/graph_37590153.jsonl b/edge/graph_37590153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5b2f176fbbae042f8cadb3888e0eb47d194057c --- /dev/null +++ b/edge/graph_37590153.jsonl @@ -0,0 +1 @@ +{"10048279|239537": ["[4], these approaches tried to overcome the disadvantages of visualizing large hierarchies, such as reduced performance, viewability, and usability.", "Other problems occur with 3D visualizations, like object occlusion, difficult view adjustment [4], performance problems, as well as bad readability of 3D texts [8].", "The survey [4] lists detailed references to these approaches.", "Approaches such as tree maps [5] focus on the content information of nodes and criticize the text only approach of other node and link diagrams [4]."]} diff --git a/graph_3761015.jsonl b/edge/graph_3761015.jsonl similarity index 100% rename from graph_3761015.jsonl rename to edge/graph_3761015.jsonl diff --git a/graph_3764091.jsonl b/edge/graph_3764091.jsonl similarity index 100% rename from graph_3764091.jsonl rename to edge/graph_3764091.jsonl diff --git a/edge/graph_37664642.jsonl b/edge/graph_37664642.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5967d6610ed7e20bf177279eeb97be40e08edeeb --- /dev/null +++ b/edge/graph_37664642.jsonl @@ -0,0 +1,4 @@ +{"7815680|6746689": ["\u2026an adaptive thresholding algorithm [20] to compute the binary image from the input gray scale fingerprint image; (2) use a thinning algorithm [21] [22] to compute the fingerprint skeleton from the binary image; (3) use Rutovitz Crossing Number to extract minutiae from the skeleton of fingerprint\u2026"]} +{"1749238|5313655": ["More recent methods based on noninvertible transforms show some improvements, but, in general, the trade-off between accuracy and nonreversibility is still far from being satisfactory [23]."]} +{"11434731|192934": ["One can for instance think of K-nearest neighbor, neural networks, and so forth to find the optimal decision boundaries [6]."]} +{"26360235|6746689": []} diff --git a/graph_3766791.jsonl b/edge/graph_3766791.jsonl similarity index 100% rename from graph_3766791.jsonl rename to edge/graph_3766791.jsonl diff --git a/graph_3767252.jsonl b/edge/graph_3767252.jsonl similarity index 100% rename from graph_3767252.jsonl rename to edge/graph_3767252.jsonl diff --git a/edge/graph_37691331.jsonl b/edge/graph_37691331.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff7ec14da8a308c859fc2d6391ce62653b11ba79 --- /dev/null +++ b/edge/graph_37691331.jsonl @@ -0,0 +1,46 @@ +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"2713324|17683338": ["Because of these design trade-offs, TinyOS and Contiki are thus lacking several key developerfriendly features: standard C and C++ programability, standard multi-threading, and real-time support (see Table I).", "The programming models in Contiki and TinyOS are based on the event driven model, in a way that all tasks are executed\n978-1-4673-5946-7/13/$31.00 \u00a92013 IEEE\n3569\nwithin the same context, although they offer partial multithreading support.", "Contiki uses a subset of the C programing language, where some keywords cannot be used, while TinyOS is written in a C dialect called nesC.", "The scheduling in Contiki is purely event driven, similar to that in TinyOS, where a FIFO strategy is used.", "The dominant WSN OS, Contiki and TinyOS [3], follow an event driven design, which is useful for typical WSN scenarios, but exhibit drawbacks for efficient and functional networking implementations."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"16588711|141053": ["\u2026sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc. Relevant to our work, we present an overview of network layer transport for networks similar\u2026"]} +{"16588711|205286988": ["Research in wireless sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc."]} +{"16588711|1236072": ["Research in wireless sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc."]} +{"16588711|1230643": ["Research in wireless sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc.", "The use of sensors in IoT research builds on research of the embedded and wireless sensing community [2] and more recent efforts in sensing using general purpose mobile devices [5]."]} +{"20020882|1230643": ["), could seamlessly interoperate in globally integrated communications platforms [1]\u2013[3]."]} +{"26878695|25929315": ["are considered for M2M communications [1], [2], [3]."]} +{"6645760|1252121": ["Inter-domain routing is strongly affected by business relationships between the involved parties and is an area of active research even in the context of the current Internet architecture [79]."]} +{"16304096|3189715": ["In the general topic of in-network programmability, in the past, Active Networking (AN) research [3] envisioned users able to load programs [23, 19] in a network data path that supports programming primitives [7, 20], or programming language frameworks, eg."]} +{"801245|17336376": []} +{"801245|1230643": []} +{"801245|12060835": []} +{"6664074|16762549": ["The large variety of use cases [15]\u2013[19] led to the development of a large variety of hardware and communication technologies."]} +{"6664074|4631990": []} +{"3698150|17474643": ["when services depend on multiple providers in order to improve application performance and resilience or vendor lock-in [80]."]} +{"3698150|16335158": []} +{"3698150|17336376": ["One possible direction to address such issues involves the introduction of predictive storage and caching [66]."]} +{"3698150|1230643": ["Recent technological advances have made efficient, low-cost, and lowpowerminiaturized devices available for use in large-scale, remote sensing applications [89]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"10311979|206584087": ["Many papers classify DDoS attacks and their detection/prevention mechanisms [49], [50], [51]."]} +{"10311979|6670217": ["Additionally, many attacks that occur in other environments may also appear in ICN environments [19], [20], [21], [22], [23], [24]."]} +{"10311979|7971188": ["ICN has some similarities and differences with other related technologies like distributed database (DDB), data grids, peerto-peer networks (P2P), content distribution networks (CDN), and cloud computing [4], [5]."]} +{"10614697|3348390": ["Furthermore, by integrating the sensing, communication, and computation capabilities [8], [9], IoT can offer diverse intelligent services [10] to form smart home [11], smart grid [12]\u2013[14], smart community [15], and smart city [16], [17], as shown in Fig."]} +{"10614697|20905429": ["One of the most value-added functionalities of IoT is to sense the environments including the living environment [28] and human body [29]\u2013[31], enabling users to interact with the physical world [32]."]} +{"8507340|2906926": []} +{"8507340|2357830": ["Aside from scalability issues, privacy continues to be a challenge for data collection [40, 58\u201362, 69, 71, 78, 81, 82, 111]."]} +{"18761676|3348390": ["Context awareness may provide a great support to process and store the Big Data, and to make their interpretation easier [330]."]} +{"18761676|16209841": ["To ensure security of data, services and entire IoT system, a series of properties, such as confidentiality, integrity, authentication, authorization, non-repudiation, availability, and privacy, must be guaranteed [228,229]."]} +{"18761676|270804": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"18761676|205286988": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"8420169|763939": ["A survey is presented in chapter by Awwad, Yi, and Stojmenovic in [ ]. fsew other chapters in the same book survey ongoing research activities on experimental testbeds and simulation"]} +{"8420169|1940388": ["Indeed, while MANET represents an engineering approach to hide node mobility by constructing \u201cstable\u201d end-to-end paths as in opportunity to exploit ."]} +{"8420169|6275330": ["The need for real development produced orthogonal approach to MANET validation While initially simulation was largely used [27 it was quite soon replaced by large testbeds deployed at several universities, 3 which are open for access to the research community."]} +{"8420169|1230643": []} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} diff --git a/edge/graph_37700108.jsonl b/edge/graph_37700108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37709418.jsonl b/edge/graph_37709418.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37709881.jsonl b/edge/graph_37709881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37745102.jsonl b/edge/graph_37745102.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43d09858bab30b7e82b179b4ec8a66dea497b6cd --- /dev/null +++ b/edge/graph_37745102.jsonl @@ -0,0 +1,6 @@ +{"15264530|6159806": ["Several surveys[5][7][22][31][33] dealt with service composition.", "The process of developing a composite service is called service composition[7].", "Many surveys[5][7] [22][31][33] list service composition middleware according to predefined criteria or properties.", "Many of them[7][31] classified the middleware under exclusive criteria such as manual versus automated, static versus dynamic, and so on.", "As depicted Figure 1, the SCM interacts with the application layer by receiving functionality requests from users or applications[5][7]."]} +{"5741322|3202525": ["tous learning are explored in [23], [63], [64].", "Context-awareness research supporting adaptive learning is very active in the fields of m-learning and e-learning [21], [23]."]} +{"13948603|15264530": ["Another survey [25] focuses exclusively on middleware for service composition."]} +{"15194849|15264530": []} +{"61710325|1300682": ["collecting, accessing and handling the users\u2019 personal data [104\u2013107]."]} +{"15432451|14873104": ["Moreover, as pointed out by Hardian et al. (2006) and con\ufb01rmed through user experience tests by Vastenburg et al. (2007), involving users in application control is essential to ensure that users accept autonomous prototypes, especially those intended for home or o\ufb03ce automation domains."]} diff --git a/edge/graph_3775239.jsonl b/edge/graph_3775239.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37761115.jsonl b/edge/graph_37761115.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3782888.jsonl b/edge/graph_3782888.jsonl similarity index 100% rename from graph_3782888.jsonl rename to edge/graph_3782888.jsonl diff --git a/graph_3783650.jsonl b/edge/graph_3783650.jsonl similarity index 100% rename from graph_3783650.jsonl rename to edge/graph_3783650.jsonl diff --git a/graph_3785059.jsonl b/edge/graph_3785059.jsonl similarity index 100% rename from graph_3785059.jsonl rename to edge/graph_3785059.jsonl diff --git a/edge/graph_37852736.jsonl b/edge/graph_37852736.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f56b59d50f4a3dd10829d672e071128f4041fb4d --- /dev/null +++ b/edge/graph_37852736.jsonl @@ -0,0 +1,12 @@ +{"195603704|5722102": ["On the other hand, there are a high number of approaches without standard consensus, [9], 7], [3] a lack in the use of standards, and scarcity of both practical experience and tool support."]} +{"10794747|627405": ["These guidelines have been used and evaluated [3] [10] [11] [18] in many contexts."]} +{"60648008|627405": ["These guidelines have been used and evaluated in many contexts [14]-[17]."]} +{"21443776|2774711": []} +{"21443776|2018781": []} +{"21443776|11139156": []} +{"21443776|16125167": []} +{"21443776|8742997": []} +{"21443776|205435103": []} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"27929338|8742997": [", [12] reported an integrative review [32] instead of an SLR."]} +{"27929338|627405": ["SE researchers have also provided methodological support by developing guidelines for performing SLRs [20,3] and have reported lessons learned in order to share knowledge and experiences [4,10]."]} diff --git a/graph_3786171.jsonl b/edge/graph_3786171.jsonl similarity index 100% rename from graph_3786171.jsonl rename to edge/graph_3786171.jsonl diff --git a/edge/graph_37865386.jsonl b/edge/graph_37865386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ae44a55d734fa4067cc688ee9845e2bfc269728 --- /dev/null +++ b/edge/graph_37865386.jsonl @@ -0,0 +1,4 @@ +{"10602102|6923178": ["For an overview of assessing the accuracy of prediction algorithms for classification problems, the interested reader is directed to [55]."]} +{"16909402|10762348": []} +{"8883887|11894197": ["The large number of sequences lowers the in\ufb02uence r d j In total, we have three datasets, one with promoter sequences, one with r l s"]} +{"3540990|11894197": ["Feature selection methods can be classified into three categories, depending on their integration into the classification method [4, 5, 8].", "[5], this article focuses only on penalization methods.", "the same time being far less computationally intensive than wrapper methods\u2019 [5].", "[5] and the \u2018Introduction\u2019 section for related discussions."]} diff --git a/edge/graph_37868643.jsonl b/edge/graph_37868643.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3791647.jsonl b/edge/graph_3791647.jsonl similarity index 100% rename from graph_3791647.jsonl rename to edge/graph_3791647.jsonl diff --git a/edge/graph_37942029.jsonl b/edge/graph_37942029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3795825.jsonl b/edge/graph_3795825.jsonl similarity index 100% rename from graph_3795825.jsonl rename to edge/graph_3795825.jsonl diff --git a/edge/graph_37963226.jsonl b/edge/graph_37963226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b34bebd88c70087d219ef8d028eed3f019c57ce --- /dev/null +++ b/edge/graph_37963226.jsonl @@ -0,0 +1,9 @@ +{"17939217|17758458": []} +{"12103882|17774971": []} +{"12103882|192934": []} +{"12307933|9564961": ["Recently, development trends towards cross discipline simulations."]} +{"56152323|10086984": []} +{"9717936|6809492": []} +{"110225884|17683338": []} +{"110225884|5660618": []} +{"113320335|20178897": []} diff --git a/edge/graph_37966695.jsonl b/edge/graph_37966695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_37976266.jsonl b/edge/graph_37976266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85fc96b6fa5b25144f05111ad3733cbd6e84baf0 --- /dev/null +++ b/edge/graph_37976266.jsonl @@ -0,0 +1,18 @@ +{"3147582|63927538": ["The 4 A's serve to highlight these measures [20].", "1 Architecture layers of big data analytics [20]"]} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} +{"113548969|14849079": []} +{"16593034|1906759": ["For both sets a simple Round-Robin scheduler was implemented [33]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"1520906|3348390": ["Although some reviews about IoT have been conducted recently (e.g., Atzori et al., 2010; Zeng et al., 2011; An et al., 2013; Perera et al., 2013; Li et al., 2016; Yan et al., 2014), they focus on high level general issues and are mostly fragmented."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"58622305|8914588": ["IBM has also suggested a reference model for autonomic control loops of autonomic managers, called MAPE-K (Monitor Analyze Plan Execute\u2014Knowledge) [34, 35]."]} +{"114735598|37976266": []} +{"114735598|14849079": []} +{"585249|8835588": ["For a survey on using context as an organizing concept in problem solving in AI and other related disciplines, see, for example [20]."]} +{"14167003|57048228": []} +{"14167003|1113420": []} +{"17675973|10837932": []} diff --git a/edge/graph_37976646.jsonl b/edge/graph_37976646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3799929.jsonl b/edge/graph_3799929.jsonl similarity index 100% rename from graph_3799929.jsonl rename to edge/graph_3799929.jsonl diff --git a/graph_3800586.jsonl b/edge/graph_3800586.jsonl similarity index 100% rename from graph_3800586.jsonl rename to edge/graph_3800586.jsonl diff --git a/edge/graph_38017850.jsonl b/edge/graph_38017850.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3801894.jsonl b/edge/graph_3801894.jsonl similarity index 100% rename from graph_3801894.jsonl rename to edge/graph_3801894.jsonl diff --git a/edge/graph_38025936.jsonl b/edge/graph_38025936.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..795cf740256780228fe7c06986e14201cdb614f1 --- /dev/null +++ b/edge/graph_38025936.jsonl @@ -0,0 +1,2 @@ +{"6033936|11139156": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"6033936|205435103": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} diff --git a/graph_3804135.jsonl b/edge/graph_3804135.jsonl similarity index 100% rename from graph_3804135.jsonl rename to edge/graph_3804135.jsonl diff --git a/edge/graph_3807622.jsonl b/edge/graph_3807622.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38078985.jsonl b/edge/graph_38078985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75e151cdd64629c792eb048f94bb686b1056f6a1 --- /dev/null +++ b/edge/graph_38078985.jsonl @@ -0,0 +1,2 @@ +{"120296013|1142274": ["For recent results and trends in scheduling problems with setup times or costs, the reader may refer to the recent review paper of Allahverdi et al. [ 2 ]."]} +{"206721844|1142274": []} diff --git a/edge/graph_38079015.jsonl b/edge/graph_38079015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9847e2f29356a5e3205cf4a23b7dbe37866ba637 --- /dev/null +++ b/edge/graph_38079015.jsonl @@ -0,0 +1,20 @@ +{"8294155|11732290": ["Generally, the localization methods for a WCE can be categorized as based on use of low frequency magnetic fields or RF electromagnetic (EM) fields [2]."]} +{"13638081|7854020": []} +{"25165012|15453366": ["A reasonably good agreement among various national regulating bodies can be found only for the mmW-60 band [15]."]} +{"17312938|11732290": []} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"21188133|6332923": ["There are threats that are not covered by the security paradigm of the standard, such as denial-of-service or patient location tracking attacks [13].", "A lacking security architecture puts patients\u2019 privacy and safety at risk [13, 14]."]} +{"21188133|7854020": ["6 standard provides three different levels of security [12]."]} +{"21188133|16514036": ["Limb-mounted nodes represent the extremes of motion in BAN topology, and smart sensors produce a steady stream of low-data-rate information expected of continuous monitoring [15]."]} +{"33891659|16050394": ["Several civilian applications are met within the HF / VHF band, for which evaluations of current densities or SAR have been carried out (Magnetic Resonance Imaging [2], radio broadcasting [3,4], RFID [5], \u2026).", "Several civilian applications are met within the HF / VHF band, for which evaluations of current densities or SAR have been carried out (Magnetic Resonance Imaging [2], radio broadcasting [3,4], RFID [5], ."]} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"42333110|15453366": ["The progress in low-cost mm-wave circuit design and the wide available spectrum around 60 GHz will allow to develop new communication services such as HD streaming video, augmented reality, wireless gaming, Gigabit Ethernet,... [2].", "The progress in low-cost mm-wave circuit design and thewide available spectrum around 60 GHz will allow to develop new communication services such as HD streaming video, augmented reality, wireless gaming, Gigabit Ethernet [2]."]} diff --git a/edge/graph_38081441.jsonl b/edge/graph_38081441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70c1febb87716ee0b667c6503dbb080f9eb161b7 --- /dev/null +++ b/edge/graph_38081441.jsonl @@ -0,0 +1,2 @@ +{"9557805|14561955": ["Buffer management is an important online problem with applications in network communication [13].", "We briefly review the results most relevant to our work and refer the reader to surveys by Azar [5], Epstein and van Stee [12], and Goldwasser [13] for a more comprehensive coverage."]} +{"30550472|40304452": ["This problem has been intensively studied for various graph classes; for a survey, see the papers by Yeh [21] or Bodlaender et al. [2]."]} diff --git a/graph_3808289.jsonl b/edge/graph_3808289.jsonl similarity index 100% rename from graph_3808289.jsonl rename to edge/graph_3808289.jsonl diff --git a/edge/graph_38129422.jsonl b/edge/graph_38129422.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38156241.jsonl b/edge/graph_38156241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd16f0548df5826f2df677501191c17622da4651 --- /dev/null +++ b/edge/graph_38156241.jsonl @@ -0,0 +1,9 @@ +{"1665247|1230643": ["They have a wide range of applications, from military to civil, that may be realized by using different type of sensor devices with different capabilities for different kinds of environments [1]."]} +{"6822558|205286988": []} +{"5616462|1230643": ["Wireless sensor network (WSN) consists of tiny sensor nodes forming an ad hoc distributed data sensing and propagation network which collects the information on the surrounding environment."]} +{"17170460|1236072": ["On the basis of network structure, routing protocols in WSN have been divided into flat, hierarchical, and location-based routings [8].", "Energy conservation is one of the most discussed issues in WSN application and protocol development [1-9]."]} +{"23229257|205286988": []} +{"23229257|1230643": []} +{"13956612|1236072": []} +{"13956612|1230643": []} +{"13481156|1230643": ["2) based on the chains of nodes of which the idea of chains formation was proposed in PEGASIS (Power-Efficient Gathering in Sensor Information Systems) algorithm [3, 4, 5]; it was an improvement of protocol LEACH."]} diff --git a/edge/graph_3815882.jsonl b/edge/graph_3815882.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3815948.jsonl b/edge/graph_3815948.jsonl similarity index 100% rename from graph_3815948.jsonl rename to edge/graph_3815948.jsonl diff --git a/graph_3818445.jsonl b/edge/graph_3818445.jsonl similarity index 100% rename from graph_3818445.jsonl rename to edge/graph_3818445.jsonl diff --git a/graph_3818468.jsonl b/edge/graph_3818468.jsonl similarity index 100% rename from graph_3818468.jsonl rename to edge/graph_3818468.jsonl diff --git a/edge/graph_38185871.jsonl b/edge/graph_38185871.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddb3c851b0ada5921ff7fbee70e44d2535c64717 --- /dev/null +++ b/edge/graph_38185871.jsonl @@ -0,0 +1,5 @@ +{"207238769|393948": ["To address these limitations, researchers started exploring algorithms that are capable of obtaining learning representations of the data and these make it easier to extract useful information for building the classi\ufb01er [Bengio et al. 2013].", "Recently, researchers started exploring algorithms that are capable of learning representations of data to overcome these limitations [Bengio et al. 2013]."]} +{"14106275|14545307": []} +{"8601873|11608263": ["Some authors, notably Weidmann et al. (2003) and Scott et al.", "The method is referred to by Tsoumakas and Katakis (2007) as problem transformation method PT4 ."]} +{"34339594|1097238": ["From an ensemble point of view, we can make the most of this knowledge in order to introduce diversity into the weak models, a desirable property to boost its e\ufb03cacy [10, 11, 12, 13, 14]."]} +{"902407|5556391": ["[Tsymbal, 2004, Hoens et al., 2012, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Brzezin\u0301ski, 2010].", "To this end there has been much work on identifying types of concept drift [Widmer and Kubat, 1996, Gama and Rodrigues, 2009, Zliobaite, 2010, Hoens et al., 2012, Moreno-Torres et al., 2012, Gama et al., 2014].", "The concept of abrupt drift [Tsymbal, 2004, Hoens et al., 2012, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Brzezin\u0301ski, 2010, Brzezinski and Stefanowski, 2014a] illustrates this implicit assumption.", "As the name implies, Cyclical Drift is a form of recurring drift that occurs when two or more concepts recur in a specific order [Tsymbal, 2004, Hoens et al., 2012].", "\u2026of terms and descriptions relating to the manner in which a transition between two concepts unfolds [Brzezinski and Stefanowski, 2014a, Tsymbal, 2004, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Hoens et al., 2012, Brzezin\u0301ski, 2010].", "Abrupt drift, or sudden drift occurs when a stream with concept a suddenly changes to concept a+1 [Tsymbal, 2004, Hoens et al., 2012, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Brzezin\u0301ski, 2010, Brzezinski and Stefanowski, 2014a].", "\u2026drift [Minku et al., 2010] occurs when there are two alternating concepts such that one initially predominates and over time the other comes to predominate [Tsymbal, 2004, Zliobaite, 2010, Bose et al., 2011, Huang et al., 2013, Minku et al., 2010, Dongre and Malik, 2014, Hoens et al., 2012].", "Class drift, often called real concept drift or prior probability shift, occurs when the posterior class probabilities P (Y | X) change over time [Tsymbal, 2004, Hoens et al., 2012, Moreno-Torres et al., 2012, Gama et al., 2014].", "Covariate drift, or virtual concept drift as it is commonly called in the literature, occurs when the distribution of non-class attributes, P (X), changes over time [Tsymbal, 2004, Cieslak and Chawla, 2009, Hoens et al., 2012, MorenoTorres et al., 2012, Gama et al., 2014].", "There are a number of ways in which concepts can recur in a stream [Minku et al., 2010, Bose et al., 2011, Dongre and Malik, 2014, Brzezin\u0301ski, 2010, Zliobaite, 2010, Hoens et al., 2012, Gomes et al., 2011]."]} diff --git a/graph_3819460.jsonl b/edge/graph_3819460.jsonl similarity index 100% rename from graph_3819460.jsonl rename to edge/graph_3819460.jsonl diff --git a/edge/graph_38200299.jsonl b/edge/graph_38200299.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81984836dd73d5c34e8dbaa160c4b066ff93c3bd --- /dev/null +++ b/edge/graph_38200299.jsonl @@ -0,0 +1,10 @@ +{"34336402|912956": []} +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"2183290|10559330": ["Various IP-layer architectures have been proposed to maintain Internet QoS including IntServ [9] and DiffServ [8]."]} +{"6548473|14315321": []} +{"8101432|14140377": ["Ourwork is likely to benefit fromand contribute to the considerable research on temporal databases [22], main-memory databases [10], and real-time databases [16,22].", "There has been extensive research on scheduling tasks in real-time and multimedia systems and databases [21,22]."]} +{"29199939|3348390": ["It is therefore important to highlight, as also stated in [22], that the IoT cannot exist without sensor network (SN); SN indeed provides the majority of hardware infrastructure, through providing access to sensors and actuators."]} +{"16157619|18717047": ["The second architectural principle is the use of the REpresentational State Transfer (REST) paradigm [8] for the interactions between the PaaS and the Fog, as it is commonly used for PaaS-IaaS interactions nowadays."]} +{"28029619|3102110": ["Computing the data having higher-level weights can obtain approximate solutions [26]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} diff --git a/edge/graph_3821062.jsonl b/edge/graph_3821062.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3821646.jsonl b/edge/graph_3821646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3822774.jsonl b/edge/graph_3822774.jsonl similarity index 100% rename from graph_3822774.jsonl rename to edge/graph_3822774.jsonl diff --git a/edge/graph_38239166.jsonl b/edge/graph_38239166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d5b7ac5cab9e6da33e6e19e34572b2ff43ff3b9 --- /dev/null +++ b/edge/graph_38239166.jsonl @@ -0,0 +1,2 @@ +{"10911613|13034818": []} +{"2503573|13034818": ["An overview of these technologies appears as a companion paper [2] in this issue of the IBM Journal of Research and Development.", "[2] provide an overview of SCM candidate device technologies and then compare them in terms of their potential for scaling to ultrahigh areal density [2]."]} diff --git a/graph_3826344.jsonl b/edge/graph_3826344.jsonl similarity index 100% rename from graph_3826344.jsonl rename to edge/graph_3826344.jsonl diff --git a/graph_3826739.jsonl b/edge/graph_3826739.jsonl similarity index 100% rename from graph_3826739.jsonl rename to edge/graph_3826739.jsonl diff --git a/edge/graph_38273934.jsonl b/edge/graph_38273934.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3827930.jsonl b/edge/graph_3827930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3828051.jsonl b/edge/graph_3828051.jsonl similarity index 100% rename from graph_3828051.jsonl rename to edge/graph_3828051.jsonl diff --git a/edge/graph_38281503.jsonl b/edge/graph_38281503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54c5728f5ee1785229c311c4c87e5db665034dcb --- /dev/null +++ b/edge/graph_38281503.jsonl @@ -0,0 +1,2 @@ +{"14936873|11038925": []} +{"11883706|2992477": []} diff --git a/edge/graph_38286927.jsonl b/edge/graph_38286927.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38288552.jsonl b/edge/graph_38288552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddaf20bee200b5e633d082e3e1ef747d82e4cc49 --- /dev/null +++ b/edge/graph_38288552.jsonl @@ -0,0 +1,7 @@ +{"9972176|14140377": ["Since stream tuples have timestamps and therefore ordering, our semantics and query language are related to temporal [ 22 ] and sequence [23] query languages."]} +{"60637464|7530272": ["Particularly, for the task of classification, different techniques such as decision trees, neural networks and Bayesian classifiers have been used (Xing et al., 2010).", "symbolization or discretization methods, before extracting the features (Xing et al., 2010) while others work extracting representative sub-sequences.", "Examples of such modelbased classifiers include Naive Bayes, Markov Model and Hidden Markov Model (Xing et al., 2010)."]} +{"60637464|8365617": ["These techniques (PCA (Keogh et al., 2004), APCA (Chakrabarti et al.", "The window model has been applied not only for query processing, but also for other purposes such as time-series analysis and approximation of streaming data (Keogh et al., 2004).", "Algorithms such as (Keogh et al., 2004; Keogh and Smyth, 1997) have been devised for this purpose.", "Time series segmentation may follow four main approaches (Keogh et al., 2004):", "These representations have been widely used for tasks including similarity search, fuzzy queries, dynamic time warping, clustering and classification (Keogh et al., 2004)."]} +{"16608095|1230643": ["WSN usually consists of a set of wireless sensors nodes (from a few tens to a few hundreds), which acquire, store, transform and communicate data using wireless technologies [1]."]} +{"3181689|10500613": ["R2O can be used to express mappings generated by existing automatic mapping discovery tools like Cupid [7,10].", "Madhavan J, Bernstein P, Rahm E. Generic Schema Matching with Cupid."]} +{"12258648|8914588": ["A similar problem was faced in the 1920s with telephony [14], when increased telephone usage led to the introduction of the automatic branch exchanges which eventually substituted human operators.", "Two types of monitoring are usually identified in the literature [14]:", "IBM\u2019s MAPE-K reference model for autonomic control loops (modified from [14]).", "One of the fundamental components of IBM\u2019s vision of autonomic computing is a reference model for autonomic control loops [14], which is usually referred to as the MAPE-K (Monitor, Analyse, Plan, Execute, Knowledge) adaptation loop, and depicted in Figure 1."]} +{"9269363|1230643": ["Thus, issues of routing, transport, power management and data aggregation are dealt with in other work [1, 2, 3] and are beyond the scope of this paper.", "In our model, the WSN consists of a limited number of static or mobile BSs and RUs, but is otherwise unattended [1]."]} diff --git a/edge/graph_383108.jsonl b/edge/graph_383108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38337285.jsonl b/edge/graph_38337285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38339803.jsonl b/edge/graph_38339803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3834736.jsonl b/edge/graph_3834736.jsonl similarity index 100% rename from graph_3834736.jsonl rename to edge/graph_3834736.jsonl diff --git a/graph_3838794.jsonl b/edge/graph_3838794.jsonl similarity index 100% rename from graph_3838794.jsonl rename to edge/graph_3838794.jsonl diff --git a/edge/graph_38410996.jsonl b/edge/graph_38410996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a82c6a1c4ef29a56ea48d4fbd27b6c0879ba188 --- /dev/null +++ b/edge/graph_38410996.jsonl @@ -0,0 +1,22 @@ +{"23854769|17381415": ["In such grid-connected mode, the inverter is typically controlled as a current source [1] to inject certain amount of current into the grid.", "Grid synchronization methods [1] also have strong effects on the inverter output impedance, which have not been given much attention so far and will be studied in a future work."]} +{"15344629|17381415": ["For the reduction of line current ripple, LCL filters are often used as grid filters [ 2 ]."]} +{"31493016|12083425": ["and others [2], and renewable energy systems, especially in large penetration of renewable resources, such as solar and wind [3], [4]."]} +{"31493016|17774971": ["Type C topologies may not face such a problem because lots of work has been done for HVAC/HVDC conversion [62]."]} +{"20557548|17381415": ["2262378 in injecting high-quality power into the grid [1]."]} +{"6283900|17381415": []} +{"9240133|17381415": ["1 has been widely adopted [1]\u2013[3] in a large power range."]} +{"40439743|17381415": []} +{"632042|17381415": ["The power converters control issues are mainly related to the grid connection and to the grid codes compliance [3]."]} +{"632042|12083425": ["I. INTRODUCTION\nTHE PENETRATION of distributed power generation sys-tems is increasing steadily also due to power electronics, the enabling technology [1], [2]."]} +{"8926342|17381415": ["the grid reliably [1]."]} +{"10043477|12083425": ["generators (DFIG), or permanent magnet synchronous generators (PMSG) connected to the grid with a back-to-back converter [3]."]} +{"24050715|17381415": ["a group of wind generators are connected to an onshore point of common coupling (PCC) through VSI, step-up transformers, and HVac submarine cables [6]."]} +{"24050715|12083425": ["A POWER electronic converter plays an important role in distributed generation and in integration of renewable energy sources into an electrical grid [1], [2]."]} +{"6383595|17381415": ["Optimized Controller Design for LCL-Type Grid-Connected Inverter to Achieve High\nRobustness Against Grid-Impedance Variation Donghua Pan, Student Member, IEEE , Xinbo Ruan, Senior Member, IEEE , Chenlei Bao,\nWeiwei Li, Student Member, IEEE , and Xuehua Wang, Member, IEEE\nAbstract\u2014Capacitor-current-feedback active damping is an effective method to suppress the LCL-filter resonance in grid-connected inverters.", "\u2026Variation Donghua Pan, Student Member, IEEE , Xinbo Ruan, Senior Member, IEEE , Chenlei Bao,\nWeiwei Li, Student Member, IEEE , and Xuehua Wang, Member, IEEE\nAbstract\u2014Capacitor-current-feedback active damping is an effective method to suppress the LCL-filter resonance in grid-connected inverters."]} +{"21484249|17381415": ["D ISTRIBUTED generation systems, powered by clean energy sources such as solar and wind energy, are becoming popular in the industry [1], [2]."]} +{"40691149|17381415": ["working on a \u03b1\u03b2 stationary reference frame [33].", "where kP is the proportional gain, kR is the resonant gain at the grid frequency, kih is the resonant gain at the h-harmonic to be controlled, and \u03c9o is the detected fundamental frequency [33]."]} +{"36278090|17381415": ["Although the input-side converter and its controller differ according to energy sources and technologies, the grid-side converter, which is usually a dc/ac inverter, can be controlled in the same way [1]."]} +{"25769371|17381415": ["Generally, the phase angle of v\u2032 g is obtained through a phase-locked loop (PLL), and the current amplitude reference is generated by the outer voltage loop [1].", "As an interface between the DPGSs and power grid, a grid-connected inverter plays an important role in injecting high-quality power into the grid [1]."]} +{"1727610|17381415": ["GRID-CONNECTED converters have increasingly been used for power conversion in distributed power generators [1]\u2013[4], uninterruptible power supplies [5], [6] and active power filters [7]\u2013[9]."]} +{"2032262|17381415": []} +{"979163|12083425": ["These DG systems are typically connected to the grid through the power electronics interface with output filters [4], [5]."]} diff --git a/edge/graph_38411655.jsonl b/edge/graph_38411655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8ba8329f7ff2656beb3fa1019d468b4e787dff1 --- /dev/null +++ b/edge/graph_38411655.jsonl @@ -0,0 +1 @@ +{"16688282|38411655": []} diff --git a/graph_3841297.jsonl b/edge/graph_3841297.jsonl similarity index 100% rename from graph_3841297.jsonl rename to edge/graph_3841297.jsonl diff --git a/edge/graph_38419725.jsonl b/edge/graph_38419725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_384453.jsonl b/edge/graph_384453.jsonl similarity index 100% rename from graph_384453.jsonl rename to edge/graph_384453.jsonl diff --git a/edge/graph_38448443.jsonl b/edge/graph_38448443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d43cc3c83d17f874b1ec0d925451049f9970102b --- /dev/null +++ b/edge/graph_38448443.jsonl @@ -0,0 +1 @@ +{"89685|10390713": [", [12] , [25], [30], [35], [41] and references therein) assumed that a line or node failure leads with some probability to a failure of nearby nodes or lines.", "theory(see [5], [12], [23], [25], [26], [30], [35], [39], [41] and references therein).", "While building on the linearized model, we manage to obtain numerical results for a very large scale real network (results for large networks have be en derived in the past using mostly probabilistic models [12], [23], [30])."]} diff --git a/edge/graph_38448650.jsonl b/edge/graph_38448650.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38451236.jsonl b/edge/graph_38451236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38462674.jsonl b/edge/graph_38462674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38476.jsonl b/edge/graph_38476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38481569.jsonl b/edge/graph_38481569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbcc28c78c1150446c14cb575fe76e7cc90e0ec1 --- /dev/null +++ b/edge/graph_38481569.jsonl @@ -0,0 +1 @@ +{"1507287|38481569": ["e.g., simulation and linearization) can lead to wrong conclusions concerning the operability of the classical phase-locked loop. Similar examples for nonlinear Costas loop models can be found in [27]\u2013[31]. ACKNOWLEDGEMENTS Authors were supported by Saint-Petersburg State University and Russian Scienti\ufb01c Foundation. The authors would like to thank Roland E. Best (the founder of Best Engineering company"]} diff --git a/edge/graph_38505093.jsonl b/edge/graph_38505093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a67387af3d78cc2da76d09a1faabc13dfd2bc3b6 --- /dev/null +++ b/edge/graph_38505093.jsonl @@ -0,0 +1 @@ +{"55849529|1236072": ["Generally, routing protocol in WSN can be classified into three different categories; flat, hierarchical and location based routing ([6])."]} diff --git a/graph_3851511.jsonl b/edge/graph_3851511.jsonl similarity index 100% rename from graph_3851511.jsonl rename to edge/graph_3851511.jsonl diff --git a/edge/graph_385243.jsonl b/edge/graph_385243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_385339.jsonl b/edge/graph_385339.jsonl similarity index 100% rename from graph_385339.jsonl rename to edge/graph_385339.jsonl diff --git a/graph_3853498.jsonl b/edge/graph_3853498.jsonl similarity index 100% rename from graph_3853498.jsonl rename to edge/graph_3853498.jsonl diff --git a/edge/graph_38535896.jsonl b/edge/graph_38535896.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7e3daf128b309119541371a41387d94b423da6a --- /dev/null +++ b/edge/graph_38535896.jsonl @@ -0,0 +1 @@ +{"2434400|14205872": []} diff --git a/edge/graph_38546246.jsonl b/edge/graph_38546246.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3854912.jsonl b/edge/graph_3854912.jsonl similarity index 100% rename from graph_3854912.jsonl rename to edge/graph_3854912.jsonl diff --git a/graph_3860051.jsonl b/edge/graph_3860051.jsonl similarity index 100% rename from graph_3860051.jsonl rename to edge/graph_3860051.jsonl diff --git a/graph_386036.jsonl b/edge/graph_386036.jsonl similarity index 100% rename from graph_386036.jsonl rename to edge/graph_386036.jsonl diff --git a/graph_3860774.jsonl b/edge/graph_3860774.jsonl similarity index 100% rename from graph_3860774.jsonl rename to edge/graph_3860774.jsonl diff --git a/graph_3861165.jsonl b/edge/graph_3861165.jsonl similarity index 100% rename from graph_3861165.jsonl rename to edge/graph_3861165.jsonl diff --git a/graph_3862265.jsonl b/edge/graph_3862265.jsonl similarity index 100% rename from graph_3862265.jsonl rename to edge/graph_3862265.jsonl diff --git a/edge/graph_38659971.jsonl b/edge/graph_38659971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38661426.jsonl b/edge/graph_38661426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38672807.jsonl b/edge/graph_38672807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1466f6973619642fd6ece83dadd04f01c9243f68 --- /dev/null +++ b/edge/graph_38672807.jsonl @@ -0,0 +1,4 @@ +{"16643301|6159806": ["We refer to [20, 21, 22, 23] for a comprehensive overview on existing approaches on service composition, specially dynamic and automatic based service composition approaches."]} +{"28246577|913718": []} +{"11290304|6159806": []} +{"17964344|6159806": ["Although there are several proposals to classify the approaches that focus on this topic [2, 12], in this paper we distinguish two kinds of algorithms depending on the complexity of the problem they solve:"]} diff --git a/edge/graph_38689495.jsonl b/edge/graph_38689495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..374b3d41d8e8640ab39c88fba8031e81245857a0 --- /dev/null +++ b/edge/graph_38689495.jsonl @@ -0,0 +1,3 @@ +{"6012675|6952653": []} +{"11873874|9240891": ["Trust is essential to agent-mediated electronic commerce (Grandison and Sloman 2000)."]} +{"11873874|6952653": []} diff --git a/edge/graph_38705575.jsonl b/edge/graph_38705575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..070885bf0f29ae8e2dda2496df8ee0bc2809f5b8 --- /dev/null +++ b/edge/graph_38705575.jsonl @@ -0,0 +1,2 @@ +{"22103941|205007974": []} +{"16606697|25885415": ["These kinematic models assume geometric con\ufb01gurations such as constant-curvature or elliptical bending that can be inex-act [14]."]} diff --git a/graph_3874041.jsonl b/edge/graph_3874041.jsonl similarity index 100% rename from graph_3874041.jsonl rename to edge/graph_3874041.jsonl diff --git a/edge/graph_387610.jsonl b/edge/graph_387610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38763856.jsonl b/edge/graph_38763856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..933da5238493e9671a8823096c1930ecb8c9eabe --- /dev/null +++ b/edge/graph_38763856.jsonl @@ -0,0 +1,20 @@ +{"1000149|1118130": ["Social Signal Processing addresses all verbal and non-verbal communicative signalling during social interactions, be they of an affective nature or not [28]."]} +{"2397089|5401262": ["pervasive computing, ambient intelligence, human computing) will need to develop human-centred user interfaces that respond readily to naturally occurring, multi-modal, human communication [24]."]} +{"637994|2355696": ["F ACIAL expression recognition has attracted significant attention because of its various applications in psychology, medicine, security, and computing (human-computer interaction, interactive games, computer-based learning, entertainment, etc.) [1], [2]."]} +{"7620529|8777381": []} +{"1122482|2355696": ["The novel Challenge for INTERSPEECH 2013 broadens the scope and increases the number of tasks and new databases provided in response to the increased participation [8]: In line with the INTERSPEECH 2013\u2019s theme \u201cSpeech in Life Sciences and Human Societies\u201d, we address the novel tasks social signals [9] and conflict in communication [10] \u2013 extending to dyadic speech and speaker group analysis in realistic every-day conditions."]} +{"12663702|6857179": []} +{"12663702|2355696": []} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} +{"2685973|6857179": []} +{"11820063|16717715": ["Conventional acoustic speech models were trained with over 360 h of neutral speech, using the Sphinx-III speech recognition system (version 3.0.6) (Huang et al. 1993).", "Conventional acoustic speech models were trained with over 360 h of neutral speech, using the Sphinx-III speech recognition system (version 3.0.6) ( Huang et al. 1993 )."]} +{"31497638|8777381": ["Among these features, prosodic features have been found to represent the most significant characteristics of emotional content in verbal communication and were widely and successfully used for speech emotion recognition [9], [36]\u2013[42]."]} +{"1132247|27527196": ["In the future we are planning to optimize this by automatically performing optical character (OCR) and face recognition on the videos [42]."]} +{"1132247|8777381": ["In addition to work that considered individual audio or visual modalities [33], [34], [35], there is also a growing body of work concerned with audio-visual emotion analysis [36], [37], [38]."]} +{"18544245|14288295": []} +{"18544245|9045232": []} +{"9326202|5401262": [", psychology, computer science, linguistics, neuroscience) with a variety of motivations in emotion-related research [11] as well as human\u2013computer interaction [7], [8], [23], [24], [26].", "One of the most fundamental applications of affective computing would be in human\u2013computer interaction where the computer could detect and track a user\u2019s affective states and initiate communications based on this knowledge, rather than simply responding to a user\u2019s commands [7], [8], [23], [26]."]} +{"979943|5401262": []} +{"8107077|49273945": []} +{"8107077|17221751": []} +{"35602792|6857179": []} diff --git a/graph_3879639.jsonl b/edge/graph_3879639.jsonl similarity index 100% rename from graph_3879639.jsonl rename to edge/graph_3879639.jsonl diff --git a/edge/graph_38814000.jsonl b/edge/graph_38814000.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38845981.jsonl b/edge/graph_38845981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38851848.jsonl b/edge/graph_38851848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2809b3910d35e4aad93bfb97f09464b35c3f76ae --- /dev/null +++ b/edge/graph_38851848.jsonl @@ -0,0 +1,7 @@ +{"1896157|16534280": ["The biomedical domain is a specialised domain that presents challenges and opportunities that make it a very useful area for researchers, together with the potential of being very beneficial to the users (Zweigenbaum 2003, Zweigenbaum et al. 2007, Molla\u0301 & Vicedo 2007)."]} +{"205714398|5375832": ["Systems customised to the medical domain must take into account medical ontologies, thesauri, and/or lexica [27]."]} +{"27947621|53531425": []} +{"207228587|7053950": []} +{"2831005|16534280": []} +{"13787765|5375832": []} +{"13578700|16534280": ["[10] J.L. Vicedo, A. Ferr\u00e1ndez, A semantic approach to question answering systems, in: Proceedings of the Ninth Text REtrieval Conference (TREC-9), NIST, 2000, pp. 511\u2013516.", "As Moll\u00e1 nd Vicedo [6] point out in their recent overview of QA in estricted domains, there are important factors that distinuish restricted-domain QA from open-domain QA.", "(See Moll\u00e1 and Vicedo [6] for an overview of restricted-domain QA.", "Vicedo and Ferr\u00e1ndez [10] describe a QA system that uses the semantic representation of the context of the expected answer, generated using WordNet-based tools, in ranking and selecting answers.", "[6] D. Moll\u00e1, J.L. Vicedo, Question answering in restricted domains: an overview, Comput.", "(See Moll\u00e1 and Vicedo [6] for an overview of restricted-domain QA.)"]} diff --git a/graph_3885579.jsonl b/edge/graph_3885579.jsonl similarity index 100% rename from graph_3885579.jsonl rename to edge/graph_3885579.jsonl diff --git a/edge/graph_3886594.jsonl b/edge/graph_3886594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3886700.jsonl b/edge/graph_3886700.jsonl similarity index 100% rename from graph_3886700.jsonl rename to edge/graph_3886700.jsonl diff --git a/graph_3887061.jsonl b/edge/graph_3887061.jsonl similarity index 100% rename from graph_3887061.jsonl rename to edge/graph_3887061.jsonl diff --git a/edge/graph_38871899.jsonl b/edge/graph_38871899.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85c3e5b0216fcb5daa7bc2c7b4af3470a57fb600 --- /dev/null +++ b/edge/graph_38871899.jsonl @@ -0,0 +1 @@ +{"16654832|7287857": ["In [27], we study mobile augmentation techniques and devise a taxonomy including three main approaches, namely high-end resource production, native resource conservation, and resource requirement reduction .", "Examples of the augmentations strategies include; screen augmentation, energy augmentation, storage augmentation and application processing augmentation of SMD [27]."]} diff --git a/graph_388740.jsonl b/edge/graph_388740.jsonl similarity index 100% rename from graph_388740.jsonl rename to edge/graph_388740.jsonl diff --git a/edge/graph_38874429.jsonl b/edge/graph_38874429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3889154.jsonl b/edge/graph_3889154.jsonl similarity index 100% rename from graph_3889154.jsonl rename to edge/graph_3889154.jsonl diff --git a/edge/graph_38905000.jsonl b/edge/graph_38905000.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7967fe8600014eaf8c979027fb36a1bbbf11612b --- /dev/null +++ b/edge/graph_38905000.jsonl @@ -0,0 +1,2 @@ +{"6416521|206051485": []} +{"62044921|17069874": []} diff --git a/edge/graph_38911919.jsonl b/edge/graph_38911919.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc30fd89a1e7a3e130a4b3baa86c6a4d268cac2f --- /dev/null +++ b/edge/graph_38911919.jsonl @@ -0,0 +1,12 @@ +{"2416492|2835258": ["Another class of routing protocols uses position-based information for routing decisions [4]."]} +{"2416492|14441987": ["MANET routing protocols, which do not use nodal position data, can be classified as table- or source-driven [3]."]} +{"26603231|10562205": ["Many clustering solutions, including identifier neighbor-based clustering, topology-based clustering, mobility-based clustering, energy-based clustering, and weight-based clustering, have been proposed [14-21]."]} +{"26603231|945077": ["Many clustering solutions, including identifier neighbor-based clustering, topology-based clustering, mobility-based clustering, energy-based clustering, and weight-based clustering, have been proposed [14-21]."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"8940094|763939": ["Several mobility models have been proposed for ad hoc networks [76]."]} +{"13176062|2835258": ["DREAM is proactive in nature and may have issues relating to its scalability and may not, therefore, be appropriate for largescale networks [11].", "Lastly, GLS, although hierarchical, is also proactive and is thought not to be efficient in highly dynamic environments [11]."]} +{"13176062|14441987": []} +{"8657424|1230643": ["different events, wireless sensors have been widely deployed in various environments for data collection and monitoring purposes [76], [77]."]} +{"31528031|35867035": ["On the other hand, the LTE Advanced standard is characterized by very relevant and advanced system features, as compared with other systems that meets the requirements of the International Mobile Telecommunications Advanced project for fourth-generation (4G) cellular systems [4]."]} +{"62278095|1230643": ["The differences between sensor networks and ad hoc networks are summarized in [ 1 ]."]} +{"6438719|14441987": []} diff --git a/edge/graph_38916886.jsonl b/edge/graph_38916886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dfa4095d0051ccb8b7000ab82b019ca9ef7f89bd --- /dev/null +++ b/edge/graph_38916886.jsonl @@ -0,0 +1 @@ +{"10955093|6308019": []} diff --git a/edge/graph_3892110.jsonl b/edge/graph_3892110.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3892600.jsonl b/edge/graph_3892600.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3893583.jsonl b/edge/graph_3893583.jsonl similarity index 100% rename from graph_3893583.jsonl rename to edge/graph_3893583.jsonl diff --git a/edge/graph_3894151.jsonl b/edge/graph_3894151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91df8a5beae65ea466d2142a652b84ad7ed61a9a --- /dev/null +++ b/edge/graph_3894151.jsonl @@ -0,0 +1 @@ +{"5783729|20905429": ["In addition, the relative complexity of UWB transmitters and receivers must be overcome in a cost-effective way before UWB can compete with standards already established in the market, such as Bluetooth and ZigBee.", "6 Task Group is seeking to address these issues and indications are that the new standard will have the following characteristics [62]:", "The battery life for ZigBee is expected to be months, whereas battery life is limited to days for Bluetooth.", "Another wireless enabling technology is ZigBee, built on the IEEE 802.15.4 standard, used for low power and low data rate communication.", "There is, at present, no single \u2018ideal\u2019 standard available for physiological measurement systems based on wireless body sensor networks (WBSNs) [62].", "With its simple architecture and the low power requirements, ZigBee is more suited to medical applications, compared to Bluetooth.", "The target market for ZigBee is low data-rate, low energy applications.", "Data transmission security is protected by the use of the Advanced Encryption Standard (AES) in ZigBee [62]."]} diff --git a/graph_3894519.jsonl b/edge/graph_3894519.jsonl similarity index 100% rename from graph_3894519.jsonl rename to edge/graph_3894519.jsonl diff --git a/edge/graph_38962203.jsonl b/edge/graph_38962203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3898063.jsonl b/edge/graph_3898063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_38996116.jsonl b/edge/graph_38996116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2dba2a0ad248e5cc5422258b6bce9b92866d28f --- /dev/null +++ b/edge/graph_38996116.jsonl @@ -0,0 +1 @@ +{"207745100|913718": ["\u2026be briefly noted into three issues;\nincremental discovery of local knowledge (Jung, 2007-b). knowledge matching (including schema and ontology matching) (Shvaiko & Euzenat, 2005), and interoperability via third-party platforms, e.g., service-oriented architecture (SOA) (Vetere & Lenzerini, 2005)."]} diff --git a/edge/graph_3900204.jsonl b/edge/graph_3900204.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3904714.jsonl b/edge/graph_3904714.jsonl similarity index 100% rename from graph_3904714.jsonl rename to edge/graph_3904714.jsonl diff --git a/graph_3907100.jsonl b/edge/graph_3907100.jsonl similarity index 100% rename from graph_3907100.jsonl rename to edge/graph_3907100.jsonl diff --git a/graph_3908141.jsonl b/edge/graph_3908141.jsonl similarity index 100% rename from graph_3908141.jsonl rename to edge/graph_3908141.jsonl diff --git a/graph_3908281.jsonl b/edge/graph_3908281.jsonl similarity index 100% rename from graph_3908281.jsonl rename to edge/graph_3908281.jsonl diff --git a/edge/graph_39098787.jsonl b/edge/graph_39098787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3913780.jsonl b/edge/graph_3913780.jsonl similarity index 100% rename from graph_3913780.jsonl rename to edge/graph_3913780.jsonl diff --git a/edge/graph_39144111.jsonl b/edge/graph_39144111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..470437f998ba8eadd11372dad27f92f5f696c7c3 --- /dev/null +++ b/edge/graph_39144111.jsonl @@ -0,0 +1,2 @@ +{"10138236|17718674": []} +{"930443|7923260": []} diff --git a/edge/graph_39149821.jsonl b/edge/graph_39149821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39159291.jsonl b/edge/graph_39159291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33b7703cbb6ca495f11a26f8a5322173b035b6f1 --- /dev/null +++ b/edge/graph_39159291.jsonl @@ -0,0 +1 @@ +{"34653456|39159291": []} diff --git a/edge/graph_39172414.jsonl b/edge/graph_39172414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39174599.jsonl b/edge/graph_39174599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39181689.jsonl b/edge/graph_39181689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3918777.jsonl b/edge/graph_3918777.jsonl similarity index 100% rename from graph_3918777.jsonl rename to edge/graph_3918777.jsonl diff --git a/edge/graph_39190108.jsonl b/edge/graph_39190108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c930c595547abf1b9c731153bd65131111e16780 --- /dev/null +++ b/edge/graph_39190108.jsonl @@ -0,0 +1 @@ +{"5156422|35897447": ["According to the strategic IS literature, IT-dependent strategic initiatives consist of identifiable competitive moves that depend on the use of IT to be enacted, and are designed to lead to sustained improvements in a firm\u2019s competitive position (Piccoli and Ives, 2005)."]} diff --git a/graph_39207.jsonl b/edge/graph_39207.jsonl similarity index 100% rename from graph_39207.jsonl rename to edge/graph_39207.jsonl diff --git a/graph_3921071.jsonl b/edge/graph_3921071.jsonl similarity index 100% rename from graph_3921071.jsonl rename to edge/graph_3921071.jsonl diff --git a/edge/graph_39213981.jsonl b/edge/graph_39213981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..519d36c7d73778b9c774705c586135fcb61c2eb8 --- /dev/null +++ b/edge/graph_39213981.jsonl @@ -0,0 +1,3 @@ +{"9140319|192934": ["Can the classification be improved using feature subset selection methods? Selecting the optimal features is a problem of exponential time complexity and various suboptimal heuristics have been proposed [12], [13].", "tain number (thecurse of dimensionality[4], [12], [29])."]} +{"1560465|1099309": []} +{"19565078|1099309": ["The extraction process of EHD consists of the following stages.", "These normalized and quantized bins constitute the EHD.", "The similarity measure between images is defined as\nsim(q, C)= \u221a \u2211\nt\u2208{H,S,V }\n( \u03bc\u2032qt \u2212 \u03bc\u2032Ct )2+ \u2211 t\u2208{H,S,V } ( \u03c3\u2032qt \u2212 \u03c3\u2032Ct )2\n+ H(BMq, BMC) 3 \u00d7 m + |Eq \u2212 EC | + |EHDq \u2212 EHDC |\n5 \u00d7 80 (10)\nwhere \u03bc \u2032I t and \u03c3 \u2032I t represent the normalized mean value and standard deviation of the image I in t color space, respectively.", "We adopt the edge histogram descriptor (EHD) [27] to describe edge distribution with a histogram based on local edge distribution in an image.", "BM I means the image bitmap feature of the image I; meanwhile, EI and EHDI represent the entropy and the EHD of the image I , respectively."]} diff --git a/graph_3924121.jsonl b/edge/graph_3924121.jsonl similarity index 100% rename from graph_3924121.jsonl rename to edge/graph_3924121.jsonl diff --git a/graph_3924799.jsonl b/edge/graph_3924799.jsonl similarity index 100% rename from graph_3924799.jsonl rename to edge/graph_3924799.jsonl diff --git a/edge/graph_39249142.jsonl b/edge/graph_39249142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3925000.jsonl b/edge/graph_3925000.jsonl similarity index 100% rename from graph_3925000.jsonl rename to edge/graph_3925000.jsonl diff --git a/edge/graph_39252948.jsonl b/edge/graph_39252948.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39265969.jsonl b/edge/graph_39265969.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e692e6e0f5db2ecc3d848c49b3ed63613f53a9a --- /dev/null +++ b/edge/graph_39265969.jsonl @@ -0,0 +1,3 @@ +{"20670673|7482876": []} +{"41531811|17623572": []} +{"95145|14441987": ["While MANETs usually use topology-based table or source routing algorithms [2], these are not applicable for"]} diff --git a/edge/graph_392830.jsonl b/edge/graph_392830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3928659.jsonl b/edge/graph_3928659.jsonl similarity index 100% rename from graph_3928659.jsonl rename to edge/graph_3928659.jsonl diff --git a/edge/graph_39286806.jsonl b/edge/graph_39286806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39521db710227b895e2ac0180e89f32cc267aa56 --- /dev/null +++ b/edge/graph_39286806.jsonl @@ -0,0 +1,7 @@ +{"1009884|1230643": ["Due to the inextricable relation with the physical world, the proper deployment of sensors is very important for the successful completion of the sensing tasks issued [5], [6], [ 7 ]."]} +{"15128138|1230643": ["INTRODUCTION Wireless sensor networks (WSNs) have recently emerged as one of the hottest research fields [1, 2]."]} +{"16660038|1236072": ["Although there are some previous works on surveying the architecture, applications, and communications protocols for wireless sensor networks [3-10], this survey is distinguished from these efforts in that; it integrates the design factors and requirements of routing, power management and data dissemination protocols for WSNs with the applications that these protocols are designed to support."]} +{"15397183|1230643": []} +{"3010322|14441987": []} +{"10378855|1230643": ["Applications of WSNs include battlefield surveillance, environmental monitoring, biological detection, smart spaces, industrial diagnostics, and so on [1]."]} +{"6512637|1230643": []} diff --git a/graph_3929716.jsonl b/edge/graph_3929716.jsonl similarity index 100% rename from graph_3929716.jsonl rename to edge/graph_3929716.jsonl diff --git a/graph_3930401.jsonl b/edge/graph_3930401.jsonl similarity index 100% rename from graph_3930401.jsonl rename to edge/graph_3930401.jsonl diff --git a/graph_3931295.jsonl b/edge/graph_3931295.jsonl similarity index 100% rename from graph_3931295.jsonl rename to edge/graph_3931295.jsonl diff --git a/graph_3932089.jsonl b/edge/graph_3932089.jsonl similarity index 100% rename from graph_3932089.jsonl rename to edge/graph_3932089.jsonl diff --git a/graph_3932531.jsonl b/edge/graph_3932531.jsonl similarity index 100% rename from graph_3932531.jsonl rename to edge/graph_3932531.jsonl diff --git a/graph_3932882.jsonl b/edge/graph_3932882.jsonl similarity index 100% rename from graph_3932882.jsonl rename to edge/graph_3932882.jsonl diff --git a/edge/graph_39332514.jsonl b/edge/graph_39332514.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39332633.jsonl b/edge/graph_39332633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..664cf9d4005cb5f53746789224791d9239ff4e8a --- /dev/null +++ b/edge/graph_39332633.jsonl @@ -0,0 +1,2 @@ +{"44724298|8530790": []} +{"6205963|4474193": ["For an overview, the reader is referred to [12]\u2013[14], [25], and [32]."]} diff --git a/edge/graph_39341849.jsonl b/edge/graph_39341849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5522566850c22fd16f8e0534dfe9c17878786ed5 --- /dev/null +++ b/edge/graph_39341849.jsonl @@ -0,0 +1 @@ +{"109637694|192934": []} diff --git a/graph_3936425.jsonl b/edge/graph_3936425.jsonl similarity index 100% rename from graph_3936425.jsonl rename to edge/graph_3936425.jsonl diff --git a/edge/graph_39379206.jsonl b/edge/graph_39379206.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_393825.jsonl b/edge/graph_393825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39383827.jsonl b/edge/graph_39383827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_393948.jsonl b/edge/graph_393948.jsonl similarity index 100% rename from graph_393948.jsonl rename to edge/graph_393948.jsonl diff --git a/graph_3939683.jsonl b/edge/graph_3939683.jsonl similarity index 100% rename from graph_3939683.jsonl rename to edge/graph_3939683.jsonl diff --git a/edge/graph_3942371.jsonl b/edge/graph_3942371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39441550.jsonl b/edge/graph_39441550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8741aa64a8863418981b13556cff2696dee31d9 --- /dev/null +++ b/edge/graph_39441550.jsonl @@ -0,0 +1 @@ +{"20444567|206704676": []} diff --git a/edge/graph_39451646.jsonl b/edge/graph_39451646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3945698.jsonl b/edge/graph_3945698.jsonl similarity index 100% rename from graph_3945698.jsonl rename to edge/graph_3945698.jsonl diff --git a/graph_394767.jsonl b/edge/graph_394767.jsonl similarity index 100% rename from graph_394767.jsonl rename to edge/graph_394767.jsonl diff --git a/graph_3949242.jsonl b/edge/graph_3949242.jsonl similarity index 100% rename from graph_3949242.jsonl rename to edge/graph_3949242.jsonl diff --git a/edge/graph_39505692.jsonl b/edge/graph_39505692.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41b34cd8588d635b6566774e6ac69c0c5c31ae18 --- /dev/null +++ b/edge/graph_39505692.jsonl @@ -0,0 +1,4 @@ +{"41759581|16559155": ["The objective of the semantic Web is to increase therefore the efficiency of the information research [15]."]} +{"7291977|5184436": []} +{"7291977|2276717": ["SW technologies can be used for all three kinds, but their power is especially necessary to manage the more complex needs of semi- and unstructured data."]} +{"8717370|9180844": []} diff --git a/graph_3951790.jsonl b/edge/graph_3951790.jsonl similarity index 100% rename from graph_3951790.jsonl rename to edge/graph_3951790.jsonl diff --git a/graph_3952064.jsonl b/edge/graph_3952064.jsonl similarity index 100% rename from graph_3952064.jsonl rename to edge/graph_3952064.jsonl diff --git a/edge/graph_39530589.jsonl b/edge/graph_39530589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e438ff2b179956426011476205ebc6446464fde --- /dev/null +++ b/edge/graph_39530589.jsonl @@ -0,0 +1,2 @@ +{"11566780|3102110": []} +{"1381744|8125630": []} diff --git a/graph_3953553.jsonl b/edge/graph_3953553.jsonl similarity index 100% rename from graph_3953553.jsonl rename to edge/graph_3953553.jsonl diff --git a/graph_3955762.jsonl b/edge/graph_3955762.jsonl similarity index 100% rename from graph_3955762.jsonl rename to edge/graph_3955762.jsonl diff --git a/edge/graph_3957028.jsonl b/edge/graph_3957028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39595306.jsonl b/edge/graph_39595306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6f1bc9e0f07f7a92f8eab2f975a8c07cbe4569b --- /dev/null +++ b/edge/graph_39595306.jsonl @@ -0,0 +1,13 @@ +{"109409522|1230643": []} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} +{"28794125|1230643": ["\u2022 Secure Communication: The ability of a WSN to provide secure communication is ever more important when considering these networks for military applications [1].", "End User: The data in a sensor network can be used for a wide-range of applications [1]."]} +{"8684061|1230643": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"29024863|5972227": ["More target tracking protocols can be found in [25, 26]."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"9701786|205286988": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} +{"9701786|1236072": ["It is not easy to find the route and reserve it, because the limited amount of energy and sudden change in the position of the nodes creates unpredictable changes [1,2]."]} diff --git a/edge/graph_39597292.jsonl b/edge/graph_39597292.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3963000.jsonl b/edge/graph_3963000.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39635018.jsonl b/edge/graph_39635018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39636809.jsonl b/edge/graph_39636809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5845f96b1e1651fad58e1e0d62325760f904628f --- /dev/null +++ b/edge/graph_39636809.jsonl @@ -0,0 +1,10 @@ +{"17336160|14441987": []} +{"17495966|14441987": []} +{"21117149|1230643": ["IRELESS sensor networks (WSNs) use a large quantity of sensors in a target area for performing surveillance tasks such as environmental monitoring, military surveillance, animal tracking, and home applications [1]\u2013[ 6 ]."]} +{"2659463|1230643": [", it belongs to one branch of application layer protocols according to the categories in [9]) and does not address the data communication problem."]} +{"6970737|14441987": ["Mobile Ad Hoc Networks (MANETs) [38] are networks in which all nodes are mobile and communicate with each other via wireless connections."]} +{"6970737|1762301": ["In recent years a large number of MANET routing algorithm have been proposed (see [1] for an overview)."]} +{"62535974|14441987": ["As already discussed in Section 2, the traditional routing algorithms (e.g., DSDV, CGSR, GSR, FSR, HSR, WRP, etc. in [4, 5] and AODV, DSR, TORA, ABR, SSR, etc. in [4, 6]) lack power-aware routing.", "These algorithms can be classi\ufb01ed into two groups: table-driven routing (such as DSDV, CGSR, GSR, FSR, HSR, WRP, etc.) [4, 5], and source-initiated on-demand routing (such as AODV, DSR, TORA, ABR, SSR, etc.) [4, 6]."]} +{"62535974|1762301": ["Also, AODV has been found to be more scalable and the packet delivery ratio is better in case of AODV when compared to DSR [45]."]} +{"16030955|1230643": []} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} diff --git a/graph_396631.jsonl b/edge/graph_396631.jsonl similarity index 100% rename from graph_396631.jsonl rename to edge/graph_396631.jsonl diff --git a/edge/graph_3968122.jsonl b/edge/graph_3968122.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_3968293.jsonl b/edge/graph_3968293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_396979.jsonl b/edge/graph_396979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39706822.jsonl b/edge/graph_39706822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5993a8484f656a4a6738dcafb625fc64fc3245c3 --- /dev/null +++ b/edge/graph_39706822.jsonl @@ -0,0 +1 @@ +{"10881910|10500613": []} diff --git a/graph_397187.jsonl b/edge/graph_397187.jsonl similarity index 100% rename from graph_397187.jsonl rename to edge/graph_397187.jsonl diff --git a/graph_3973475.jsonl b/edge/graph_3973475.jsonl similarity index 100% rename from graph_3973475.jsonl rename to edge/graph_3973475.jsonl diff --git a/graph_3975105.jsonl b/edge/graph_3975105.jsonl similarity index 100% rename from graph_3975105.jsonl rename to edge/graph_3975105.jsonl diff --git a/edge/graph_39752839.jsonl b/edge/graph_39752839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_3976307.jsonl b/edge/graph_3976307.jsonl similarity index 100% rename from graph_3976307.jsonl rename to edge/graph_3976307.jsonl diff --git a/graph_3980364.jsonl b/edge/graph_3980364.jsonl similarity index 100% rename from graph_3980364.jsonl rename to edge/graph_3980364.jsonl diff --git a/edge/graph_39811202.jsonl b/edge/graph_39811202.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39811335.jsonl b/edge/graph_39811335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9756ad35a6a8e494b30806cb0ad2b23644d59c68 --- /dev/null +++ b/edge/graph_39811335.jsonl @@ -0,0 +1 @@ +{"11879070|192934": ["Data mining is one of the realm which uses statistical, machine learning, visualization, other data manipulation and extraction techniques to help simplify data complexity and detect hidden pattern data [4].", "In general, the prearranged labelled (usually called training set) images are used to do the machine learning of the class (group) description which in turn is used for unknown image [4].", "Thus, the percentage of misclassified test samples is taken as an estimate of the error rate [4]."]} diff --git a/edge/graph_39860496.jsonl b/edge/graph_39860496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74346fd335f5db9b2516742c391f488eb2938ba3 --- /dev/null +++ b/edge/graph_39860496.jsonl @@ -0,0 +1,4 @@ +{"8372620|11608263": []} +{"7996745|8372620": []} +{"29091446|7923260": ["Under the PAC setting, learning is guaranteed to find an approximately correct concept given enough independent samples [2,23,25]."]} +{"196200552|1452734": []} diff --git a/edge/graph_39898986.jsonl b/edge/graph_39898986.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e70d7681358a1397a55486a369a35aa86f63653 --- /dev/null +++ b/edge/graph_39898986.jsonl @@ -0,0 +1 @@ +{"704519|38476": ["Structured learning problems have been addressed by algorithms such as conditional random elds (Laert y et al., 2001), max-margin Markov networks (Taskar et al., 2003) and constrained perceptrons (Punyakanok & Roth, 2001); see ( Dietterich, 2002 ) for a review."]} diff --git a/edge/graph_3993284.jsonl b/edge/graph_3993284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_39936276.jsonl b/edge/graph_39936276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4be5372400ae0b8d4f6c5f59797a5671603255c8 --- /dev/null +++ b/edge/graph_39936276.jsonl @@ -0,0 +1,12 @@ +{"15291747|14745481": ["[7] surveys the state of the art in trust management systems for MANETs."]} +{"62276521|5551880": []} +{"207063673|14077778": ["Input A public key Q xQ yQ associated with valid domain parameters q FR a b G n h Output Acceptance or rejection of the validity of Q\nCheck that Q O Check that xQ and yQ are properly represented elements of Fq i e integers in the interval\np in the case q p and bit strings of length m bits in the case q m Check that Q lies on the elliptic curve de ned by a and b\nCheck that nQ O If any check fails then Q is invalid otherwise Q is valid\nProof of Possession of a Private Key\nIf an entity C is able to certify A s public key Q as its own public key then C can claim that A s signed messages originated from C To avoid this the CA should require all entities A to prove possession of the private keys corresponding to its public keys before the CA certi es the public key as belonging to A This proof of possession can be accomplished by a variety of means for example by requiring A to sign a message of the CA s choice or by using zero knowledge techniques see Chaum Evertse and van de Graaf Note that proof of possession of a private key provides di erent assurances from public key validation The former demonstrates possession of a private key even though it may correspond to an invalid public key while the latter demonstrates validity of a public key but not ownership of the corresponding private key Doing both provides a high level of assurance\nECDSA Signature Generation and Veri cation\nThis section describes the procedures for generating and verifying signatures using the ECDSA\nECDSA Signature Generation To sign a message m an entity A with domain parameters D q FR a b G n h and associated key pair d Q does the following\nSelect a random or pseudorandom integer k k n Compute kG x y and r x mod n If r then go to step\nCompute k mod n\nCompute e SHA m\nCompute s k e dr mod n If s then go to step\nA s signature for the message m is r s\nECDSA Signature Verification To verify A s signature r s on m B obtains an authen tic copy of A s domain parameters D q FR a b G n h and associated public key Q It is recommended that B also validates D and Q see x and x B then does the following Verify that r and s are integers in the interval n Compute e SHA m\nCompute w s mod n\nCompute u ew mod n and u rw mod n\nCompute X u G u Q If X O then reject the signature Otherwise compute v x mod n where X x y\nAccept the signature if and only if v r\nProof that Signature Verification Works If a signature r s on a message m was indeed generated by A then s k e dr mod n Rearranging gives\nk s e dr s e s rd we wrd u u d mod n\nThus u G u Q u u d G kG and so v r as required\nConversion Between Data Types ANSI X speci es a method for converting eld elements to integers This is used to convert the eld element x to an integer in step of signature generation and step of signature veri cation prior to computing x mod n ANSI X also speci es a method for converting bit strings to integers This is used to convert the output e of SHA to an integer prior to its use in the modular computation in step of signature generation and step of signature veri cation\nPublic Key Certificates Before verifying A s signature on a message B needs to obtain an authentic copy of A s domain parameters D and associated public key Q ANSI X does not specify a mechanism for achieving this In practice authentic public keys are most commonly distributed via certi cates A s public key certi cate should include a string of information that uniquely identi es A such as A s name and address her domain parameters D if these are not already known from context her public key Q and a certifying authority s CA s signature over this information B can then use his authentic copy of the CA s public key to verify A s certi cate thereby obtaining an authentic copy of A s static public key\nRationale for Checks on r and s in Signature Verification Step of signature veri cation checks that r and s are integers in the interval n These checks can be performed very e ciently and are prudent measures in light of known attacks on related ElGamal signature schemes which do not perform these checks for example of such attacks see Bleichenbacher The following is a plausible attack on ECDSA if the check r and more generally r mod n is not performed Suppose that A is using the elliptic curve y x ax b over Fp\nwhere b is a quadratic residue modulo p and suppose that A uses a base point G p b of prime order n It is plausible that all entities may select a base point with x coordinate in order\nto minimize the size of domain parameters An adversary can now forge A s signature on any message m of its choice by computing e SHA m It can easily be checked that r s e is a valid signature for m\nComparing DSA and ECDSA Conceptually the ECDSA is simply obtained from the DSA by replacing the subgroup of order q of Z p generated by g with the subgroup of points on an elliptic curve that are generated by G The only signi cant di erence between ECDSA and DSA is in the generation of r The DSA does this by taking the random element X gk mod p and reducing it modulo q thus obtaining an integer in the interval q The ECDSA generates r in the interval n by taking the x coordinate of the random point kG and reducing it modulo n\nSecurity Considerations\nThe security objective of ECDSA is to be existentially unforgeable against a chosen message attack The goal of an adversary who launches such an attack against a legitimate entity A is to obtain a valid signature on a single message m after having obtained A s signature on a collection of messages not including m of the adversary s choice\nECDSA has not been proven to be existentially unforgeable against chosen message attack\nHowever slight variants of DSA and hence also slight variants of ECDSA have been proven secure by Pointcheval and Stern under the assumptions that the discrete logarithm problem is hard and that the hash function employed is a random function\nThe possible attacks on ECDSA can be classi ed as follows\nAttacks on the elliptic curve discrete logarithm problem\nAttacks on the hash function employed\nOther attacks\nThis section summarizes the current knowledge of these attacks and how they can be avoided in practice\nThe Elliptic Curve Discrete Logarithm Problem\nOne way in which an adversary can succeed is to compute A s private key d from A s domain pa rameters q FR a b G n h and public key Q The adversary can subsequently forge A s signature on any message of its choice\nProblem Definition The elliptic curve discrete logarithm problem ECDLP is the following given an elliptic curve E de ned over a nite eld Fq a point P E Fq of order n and a point Q lP where l n determine l\nKnown Attacks\nThis subsection overviews the algorithms known for solving the ECDLP and discusses how they can be avoided in practice\nNaive Exhaustive Search In this method one simply computes successive multiples of P P P P P until Q is obtained This method can take up to n steps in the worst case\nPohlig Hellman Algorithm This algorithm due to Pohlig and Hellman exploits the factorization of n the order of the point P The algorithm reduces the problem of recovering l to the problem of recovering l modulo each of the prime factors of n the desired number l can then be recovered by using the Chinese Remainder Theorem\nThe implications of this algorithm are the following To construct the most di cult instance of the ECDLP one must select an elliptic curve whose order is divisible by a large prime n Preferably this order should be a prime or almost a prime i e a large prime n times a small integer h For the remainder of this section we shall assume that the order n of P is prime\nBaby Step Giant Step Algorithm This algorithm is a time memory trade o of the method of exhaustive search It requires storage for about p n points and its running time is roughly p n steps in the worst case\nPollard s Rho Algorithm This algorithm due to Pollard is a randomized version of the baby step giant step algorithm It has roughly the same expected running time p n steps as the baby step giant step algorithm but is superior in that it requires a negligible amount of storage\nGallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm can be sped up by a factor of p Thus the expected running time of Pollard s rho method with this speedup is p n steps\nParallelized Pollard s Rho Algorithm Van Oorschot and Wiener showed how Pollard s rho algorithm can be parallelized so that when the algorithm is run in parallel on r processors the expected running time of the algorithm is roughly p n r steps That is using r processors results in an r fold speed up\nPollard s lambda method This is another randomized algorithm due to Pollard Like Pollard s rho method the lambda method can also be parallelized with a linear speedup The parallelized lambda method is slightly slower than the parallelized rho method The lambda method is however faster in situations when the logarithm being sought is known to lie in a subinterval b of n where b n Multiple Logarithms R Silverman and Stapleton observed that if a single instance of the ECDLP for a given elliptic curve E and base point P is solved using parallelized Pollard s rho method then the work done in solving this instance can be used to speed up the solution of other instances of the ECDLP for the same curve E and base point P More precisely if the rst instance takes expected time t then the second instance takes expected time p t t Having solved these two instances the third instance takes expected time p p t Having solved these three instances the fourth instance takes expected time p p t And so on Thus subsequent instances of the ECDLP for a particular elliptic curve become progressively easier Another way of looking at this is that\nsolving k instances of the ECDLP for the same curve E and base point P takes only p k as much work as it does to solve one instance of the ECDLP This analysis does not take into account storage requirements\nConcerns that successive logarithms become easier can be addressed by ensuring that the elliptic parameters are chosen so that the rst instance is infeasible to solve\nSupersingular Elliptic Curves Menezes Okamoto and Vanstone and Frey and R uck showed how under mild assumptions the ECDLP in an elliptic curve E de ned over a nite eld Fq can be reduced to the ordinary DLP in the multiplicative group of some extension eld Fqk for some k where the number eld sieve algorithm applies The reduction algorithm is only practical if k is small this is not the case for most elliptic curves as shown by Balasubramanian and Koblitz To ensure that the reduction algorithm does not apply to a particular curve one only needs to check that n the order of the point P does not divide qk for all small k for which the DLP in Fqk is tractable in practice when n then k su ces An elliptic curve E over Fq is said to be supersingular if the trace t of E is divisible by the characteristic p of Fq For this very special class of elliptic curves it is known that k It follows that the reduction algorithm yields a subexponential time algorithm for the ECDLP in supersingular curves For this reason supersingular curves are explicitly excluded from use in the ECDSA by the above divisibility check\nMore generally the divisibility check rules out all elliptic curves for which the ECDLP can be e ciently reduced to the DLP in some small extension of Fq These include the supersingular elliptic curves and elliptic curves of trace elliptic curves E over Fq for which E Fq q Prime Field Anomalous Curves An elliptic curve E over Fp is said to be prime eld anomalous if E Fp p Semaev Smart and Satoh and Araki showed how to e ciently solve the ECDLP for these curves The attack does not extend to any other classes of elliptic curves Consequently by verifying that the number of points on an elliptic curve is not equal to the cardinality of the underlying eld one can easily ensure that the Semaev Smart Satoh Araki attack does not apply\nCurves Defined Over a Small Field Suppose that E is an elliptic curve de ned over the nite eld F e Gallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm for computing elliptic curve logarithms in E F ed can be\nfurther sped up by a factor of p d thus the expected running time of Pollard s rho method\nfor these curves is p n d steps For example if E is a Koblitz curve see x then Pollard s rho algorithm for computing elliptic curve logarithms in E F m can be sped up by a factor of p m This speedup should be considered when doing a security analysis of elliptic curves whose coe cients lie in a small sub eld\nCurves Defined Over F m m Composite Galbraith and Smart expanding on earlier work of Frey discuss how the Weil descent might be used to solve the ECDLP for elliptic curves de ned over F m where m is composite such elds are sometimes called composite elds More recently Gaudry Hess and Smart re ned these ideas to provide\nstrong evidence that when m has a small divisor l e g l the ECDLP for elliptic curves de ned over F m can be solved faster than with Pollard s rho algorithm In light of these results it seems prudent to not use elliptic curves over composite elds\nIt should be noted that some ECC standards including the draft ANSI X explicitly exclude the use of elliptic curves over composite elds The ANSI X F committee also agreed in January to exclude the use of such curves in a forthcoming revision of ANSI X\nNon Applicability of Index Calculus Methods Whether or not there exists a general subexponential time algorithm for the ECDLP is an important unsettled question and one of great relevance to the security of ECDSA It is extremely unlikely that anyone will ever be able to prove that no subexponential time algorithm exists for the ECDLP However much work has been done on the DLP over the past years and more speci cally on the ECDLP over the past years and no subexponential time algorithm has been discovered for the ECDLP Miller and J Silverman and Suzuki have given convincing arguments for why the most natural way in which the index calculus algorithms can be applied to the ECDLP is most likely to fail\nXedni Calculus Attacks A very interesting line of attack on the ECDLP called the xedni calculus attack was recently proposed by J Silverman One intriguing aspect of the xedni calculus is that it can be adapted to solve both the ordinary discrete logarithm and the integer factorization problems However it was subsequently shown by a team of researchers including J Silverman see Jacobson et al that the attack is virtually certain to fail in practice\nHyperelliptic Curves Hyperelliptic curves are a family of algebraic curves of arbitrary genus that includes elliptic curves Hence an elliptic curve can be viewed as a hyperelliptic curve of genus Adleman DeMarrais and Huang see also Stein M uller and Thiel presented a subexponential time algorithm for the discrete logarithm problem in the jacobian of a large genus hyperelliptic curve over a nite eld However in the case of elliptic curves the algorithm is worse than naive exhaustive search\nEquivalence to Other Discrete Logarithm Problems Stein and Zuccherato\nshowed that the discrete logarithm problem in real quadratic congruence function elds\nof genus is equivalent to the ECDLP Since no subexponential time algorithm is known for the former problem this may provide further evidence for the hardness of the ECDLP\nExperimental Results\nThe best general purpose algorithm known for the ECDLP is the parallelized version of Pollard s rho algorithm which has an expected running time of p n r steps where n is the prime order of the base point P and r is the number of processors utilized\nCerticom s ECC Challenge Certicom initiated an ECC challenge in November in order to encourage and stimulate research on the ECDLP Their challenges consist of instances of the ECDLP on a selection of elliptic curves The challenge curves are divided into three categories\nlisted below In the following ECCp k denotes a random curve over a eld Fp ECC k denotes a random curve over a eld F m and ECC K k denotes a Koblitz curve see x over F m k is the bitlength of n In all cases the bitsize of the order of the underlying nite eld is equal or slightly greater than k so curves have either prime order or almost prime order\nRandomly generated curves over Fp where p is prime ECCp ECCp ECCp ECCp\nECCp ECCp ECCp ECCp and ECCp\nRandomly generated curves over F m where m is prime ECC ECC ECC ECC ECC ECC ECC ECC and ECC\nKoblitz curves over F m where m is prime ECC K ECC ECC ECC ECC and ECC\nResults of the Challenge Escott et al report on their implementation of the parallelized Pollard s rho algorithm which incorporates some improvements of Teske The hardest instance of the ECDLP they solved was the Certicom ECCp challenge For this task they utilized over machines from at least countries and found the answer in days The total number of steps executed was about elliptic curve additions which is close to the expected time p n where n Escott et al conclude that the running time of Pollard s rho algorithm in practice ts well with the theoretical predictions They estimate that the ECCp challenge could be solved by a network of PentiumPro MHz machines in about months\nHardware Attacks\nVan Oorschot and Wiener examined the feasibility of implementing parallelized Pollard s rho algorithm using special purpose hardware They estimated that if n then a machine with r processors could be built for about US ! million that could compute a single elliptic curve discrete logarithm in about days Since ANSI X mandates that the parameter n should satisfy n such hardware attacks appear to be infeasible with today s technology\nAttacks on the Hash Function\nDefinition A cryptographic hash function H is a function that maps bit strings of arbitrary lengths to bit strings of a xed length t such that\nH can be computed e ciently\npreimage resistance For essentially all y f gt it is computationally infeasible to nd a bit string x such that H x y and\ncollision resistance It is computationally infeasible to nd distinct bit strings x and x such that H x H x\nSHA Security Requirements The following explains how attacks on ECDSA can be suc cessfully launched if SHA is not preimage resistant or not collision resistant\nIf SHA is not preimage resistant then an adversary E may be able to forge A s signatures as follows E selects an arbitrary integer l and computes r as the x coordinate of Q lG reduced modulo n E sets s r and computes e rl mod n If E can nd a message m such that e SHA m then r s is a valid signature for m\nIf SHA is not collision resistant then an entity A may be able to repudiate signatures as follows A rst generate two messages m and m such that SHA m SHA m such a pair of messages is called a collision for SHA She then signs m and later claims to have signed m note that every signature for m is also a signature for m\nIdeal Security A t bit hash function is said to be have ideal security if both i given a hash output producing a preimage requires approximately t operations and ii producing a collision requires approximately t operations SHA is a bit hash function and is believed to have ideal security The fastest method known for attacking ECDSA by exploiting properties of SHA is to nd collisions for SHA Since this is believed to take steps attacking ECDSA in this way is computationally infeasible Note however that this attack imposes an upper bound of\non the security level of ECDSA regardless of the size of the primary security parameter n Of course this is also the case with all present signature schemes with appendix since the only hash functions that are widely accepted as being both secure and practical are SHA and RIPEMD\nsee Dobbertin Bosselaers and Preneel both of which are bit hash functions\nVariable Output Length Hash Functions It is envisioned that SHA will eventually be replaced by a family of hash functions Hl where Hl is an l bit hash function having ideal security If one uses ECDSA with parameter n then one would use Hl where l blog nc as the hash function In this case attacking ECDSA by solving the ECDLP and attacking ECDSA by nding collisions for Hl both take approximately the same amount of time\nOther Attacks\nSecurity Requirements for Per Message Secrets The per message secrets k in ECDSA signature generation have the same security requirements as the private key d This is because if an adversary E learns a single per message secret k which was used by A to generate a signature\nr s on some message m then E can recover A s private key since d r ks e mod n where e SHA m see step of ECDSA signature generation Hence per message secrets must be securely generated securely stored and securely destroyed after they have been used\nRepeated Use of Per Message Secrets The per message secrets k used to sign two or more messages should be generated independently of each other In particular a di erent per message secret k should be generated for each di erent message signed otherwise the private key d can be recovered Note that if a secure random or pseudorandom number generator is used then the chance of generating a repeated k value is negligible To see how private keys can be recovered if per message secrets are repeated suppose that the same per message secret k was used to generate ECDSA signatures r s and r s on two di erent messagesm and m Then s k e dr\nmod n and s k e dr mod n where e SHA m and e SHA m Then ks e dr mod n and ks e dr mod n Subtraction gives k s s e e mod n If s s mod n which occurs with overwhelming probability then k s s e e mod n Thus an adversary can determine k and then use this to recover d\nVaudenay s Attacks Vaudenay demonstrated a theoretical weakness in DSA based on his insight that the actual hash function used in the DSA is SHA modulo q not just SHA where q is a bit prime Since SHA is a bit hash function some of its outputs when converted to integers are larger than q Hence in general SHA m SHA m mod q This weakness allows the selective forgery of one message if the adversary can select the domain parameters This weakness is not present in ECDSA because of the requirement that n the analogous quantity to q in the DSA be greater than\nDuplicate Signature Key Selection A signature scheme S is said to have the duplicate signature key selection DSKS property if given A s public key PA and given A s signature sA on a message M an adversary E is able to select a valid key pair PE SE for S such that sA is also E s signature on M Note that this de nition requires that SE is known to E Blake Wilson and Menezes showed how this property can be exploited to attack a key agreement protocol which employs signatures scheme They also demonstrated that if entities are permitted to select their own domain parameters then ECDSA possesses the DSKS property To see this suppose that A s domain parameters are DA q FR a b G n h A s key pair is QA dA and r s is A s signature on M The adversary E selects an arbitrary integer c c n such that t s e s rc mod n computes X s eG s rQ where e SHA M and G t mod n X E then forms DE q FR a b G n h and QE cG Then it is easily veri ed that DE and QE are valid and that r s is also E s signature on M\nIf one mandates that the generating point G be selected veri ably at random during domain parameter generation using a method akin to those in x for generating elliptic curves veri ably at random then it appears that ECDSA no longer possesses the DSKS property It must be emphasized that possession of the DSKS property does not constitute a weakness of the signature scheme the goal of a signature scheme is to be existentially unforgeable against an adaptive chosen message attack Rather it demonstrates the importance of auditing domain parameter and public key generation\nImplementation Attacks ANSI X does not address attacks that could be launched against implementations of ECDSA such as timing attacks Kocher di erential fault analysis Boneh DeMillo and Lipton di erential power analysis Kocher Ja e and Jun and attacks which exploit weak random or pseudorandom number generators Kelsey et al\nImplementation Considerations\nBefore implementing ECDSA several basic choices have to be made including\nType of underlying nite eld Fq Fp or F m\nField representation e g polynomial or normal basis for F m\nType of elliptic curve E over Fq e g random curve or Koblitz curve\nElliptic curve point representation e g a ne or projective coordinates\nThere are many factors that can in uence the choices made All of these must be considered simultaneously in order to arrive at the best solution for a particular application The factors include\nSecurity considerations Suitability of methods available for optimizing nite eld arithmetic addition multiplication squaring and inversion\nSuitability of methods available for optimizing elliptic curve arithmetic point addition point doubling and scalar multiplication\nApplication platform software hardware or rmware Constraints of a particular computing environment e g processor speed storage code size gate count power consumption\nConstraints of a particular communications environment e g bandwidth response time\nSelected References to the Literature The most detailed and comprehensive reference available on techniques for e cient nite eld and elliptic curve arithmetic is IEEE P See Gordon for a detailed survey of various methods for scalar multiplication For an implemen tation report of elliptic curve operations over Fp and F m see Schroeppel et al De Win et al\nand Hasegawa Nakajima and Matsui\nInteroperability Considerations\nThe goals of cryptographic standards are twofold\nTo facilitate the widespread use of cryptographically sound and well speci ed techniques\nTo promote interoperability between di erent implementations\nFactors Affecting Interoperability Interoperability is encouraged by completely specifying the steps of the cryptographic schemes and the formats for shared data such as domain parameters keys and exchanged messages and by limiting the number of options available to the implemen tor For elliptic curve cryptography and in particular the ECDSA the factors that can impact interoperability include\nThe number and types of allowable nite elds\nThe number of allowable representations for the elements of an allowable nite eld\nThe number of allowable elliptic curves over an allowable nite eld\nThe formats for specifying eld elements elliptic curve points domain parameters public keys and signatures\nECDSA Standards\nAmong the standards and draft standards which specify ECDSA the ones which have been o cially approved by their respective accredited organizations are ANSI X FIPS IEEE P and ISO The salient features of these standards are described rst and then the standards are compared with regards to their compatibility with each other This is followed by a brief overview of some other standards that specify or use ECDSA", "ANSI X Public Key Cryptography for the Financial Services Industry Elliptic Curve Key Agreement and Key Transport Protocols working draft August\nD Ash I Blake and S Vanstone Low complexity normal bases Discrete Applied Mathe matics\nR Balasubramanian and N Koblitz The improbability that an elliptic curve has subexpo nential discrete log problem under the Menezes#Okamoto#Vanstone algorithm Journal of Cryptology\nL Bassham D Johnson and T Polk Representation of Elliptic Curve Digital Signature Algo rithm ECDSA Keys and Signatures in Internet X Public Key Infrastructure Certi cates Internet Draft June Available at http www ietf org\nM Bellare R Canetti and H Krawczyk A modular approach to the design and analysis of authentication and key exchange protocols Proceedings of the th Annual ACM Symposium on the Theory of Computing\nS Blake Wilson and A Menezes Entity authentication and authenticated key transport protocols employing asymmetric techniques Proceedings of the th International Workshop on Security Protocols Lecture Notes in Computer Science\nS Blake Wilson and A Menezes Unknown key share attacks on the station to station STS protocol Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nD Bleichenbacher Generating ElGamal signatures without knowing the secret key Ad vances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nD Boneh R DeMillo and R Lipton On the importance of checking cryptographic protocols for faults Advances in Cryptology Eurocrypt Lecture Notes in Computer Science\nSpringer Verlag\nCerticom ECC Challenge November http www certicom com\nD Chaum J H Evertse and J van de Graaf An improved protocol for demonstrating pos session of discrete logarithms and some generalizations Advances in Cryptology Eurocrypt\nLecture Notes in Computer Science Springer Verlag\nT Dierks and B Anderson ECC Cipher Suites for TLS Internet Draft March Available at http www ietf org\nW Di e P van Oorschot and M Wiener Authentication and authenticated key exchanges Designs Codes and Cryptography\nH Dobbertin A Bosselaers and B Preneel RIPEMD A strengthened version of RIPEMD Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nT ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory\nA Escott J Sager A Selkirk and D Tsapakidis Attacking elliptic curve cryptosystems using the parallel Pollard rho method CryptoBytes The Technical Newsletter of RSA Laborato ries volume number Winter Also available at http www rsasecurity com\nG Frey How to disguise an elliptic curve Weil descent talk at ECC Slides available at http www cacr math uwaterloo ca\nG Frey and H R uck A remark concerning m divisibility and the discrete logarithm in the divisor class group of curves Mathematics of Computation\nS Galbraith and N Smart A cryptographic application of Weil descent Codes and Cryp tography Lecture Notes in Computer Science Springer Verlag\nR Gallant R Lambert and S Vanstone Improving the parallelized Pollard lambda search on binary anomalous curves to appear in Mathematics of Computation\nP Gaudry F Hess and N Smart Constructive and destructive facets of Weil descent on el liptic curves preprint January Available from http www hpl hp com techreports\nHPL html\nS Goldwasser S Micali and R Rivest A digital signature scheme secure against adaptive chosen message attacks SIAM Journal on Computing\nD Gordon Designing and detecting trapdoors for discrete log cryptosystems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nD Gordon Discrete logarithms in GF p using the number eld sieve SIAM Journal on Discrete Mathematics\nD Gordon A survey of fast exponentiation methods Journal of Algorithms\nT Hasegawa J Nakajima and M Matsui A practical implementation of elliptic curve cryp tosystems over GF p on a bit microcomputer Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nIEEE P Standard Speci cations for Public Key Cryptography ballot draft Drafts available at http grouper ieee org groups index html\nISO IEC Information Technology Security Techniques Entity Authentication Mech anisms Part Entity authentication Using a Public Key Algorithm rst edition\nISO IEC Information Technology Security Techniques Key Management Part\nMechanisms Using Asymmetric Techniques\nISO IEC Information Technology Security Techniques Digital Signatures with Appendix Part Certi cate Based Mechanisms\nISO IEC Information Technology Security Techniques Cryptographic Techniques Based on Elliptic Curves Committee Draft CD\nT Izu J Kogure M Noro and K Yokoyama E cient implementation of Schoof s algo rithm Advances in Cryptology Asiacrypt Lecture Notes in Computer Science\nSpringer Verlag\nM Jacobson N Koblitz J Silverman A Stein and E Teske Analysis of the xedni calculus attack Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nD Johnson Key validation Contribution to ANSI X F working group\nB Kaliski and Y Yin Storage e cient nite eld basis conversion Selected Areas in Cryp tography Lecture Notes in Computer Science Springer Verlag\nJ Kelsey B Schneier D Wagner and C Hall Cryptanalytic attacks on pseudorandom number generators Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nN Koblitz Elliptic curve cryptosystems Mathematics of Computation\nN Koblitz Constructing elliptic curve cryptosystems in characteristic Advances in Cryp tology Crypto Lecture Notes in Computer Science Springer Verlag\nN Koblitz CM curves with good cryptographic properties Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nN Koblitz A Course in Number Theory and Cryptography nd edition Springer Verlag\nP Kocher Timing attacks on implementations of Di e Hellman RSA DSS and other sys tems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nP Kocher J Ja e and B Jun Di erential power analysis Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nG Lay and H Zimmer Constructing elliptic curves with given group order over large nite\nelds Algorithmic Number Theory Lecture Notes in Computer Science Springer\nVerlag\nR Lercier Computing isogenies in F n in Henri Cohen editor Algorithmic Number Theory Proceedings Second Intern Symp ANTS II Lecture Notes in Computer Science Springer Verlag\nR Lercier Finding good random elliptic curves for cryptosystems de ned F n Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Lercier and F Morain Counting the number of points on elliptic curves over nite elds strategies and performances Advances in Cryptology Eurocrypt Lecture Notes in Com puter Science Springer Verlag\nR Lidl and H Niederreitter Introduction to Finite Fields and their Applications Cambridge University Press\nC Lim and P Lee A key recovery attack on discrete log based schemes using a prime order subgroup Advances in Cryptology Crypto Lecture Notes in Computer Science\nR McEliece Finite Fields for Computer Scientists and Engineers Kluwer Academic Publish ers Boston\nW Meier and O Sta elbach E cient multiplication on certain nonsupersingular elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nA Menezes Elliptic Curve Public Key Cryptosystems Kluwer Academic Publishers Boston\nA Menezes T Okamoto and S Vanstone Reducing elliptic curve logarithms to logarithms in a nite eld IEEE Transactions on Information Theory\nA Menezes P van Oorschot and S Vanstone Handbook of Applied Cryptography CRC Press\nV Miller Uses of elliptic curves in cryptography Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nF Morain Building cyclic elliptic curves modulo large primes Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Mullin I Onyszchuk S Vanstone and R Wilson Optimal normal bases in GF pn Discrete Applied Mathematics\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nAvailable at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nDecember Available at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nFebruary Available at http csrc nist gov fips\nNational Institute of Standards and Technology Secure Hash Standard SHS FIPS Publica tion April Available at http csrc nist gov fips\nNational Institute of Standards and Technology Entity Authentication using Public Key Cryp tography FIPS Publication Available at http csrc nist gov fips\nNational Institute of Standards and Technology Recommended Elliptic Curves for Federal Gov ernment Use May revised July Available at http csrc nist gov encryption\nNational Institute of Standards and Technology Advanced Encryption Standard work in progress Information available at http csrc nist gov encryption aes aes home htm\nNational Security Agency SKIPJACK and KEA algorithm speci cation Version May\nAlso available at http csrc nist gov encryption skipjack kea htm\nK Nyberg and R Rueppel A new signature scheme based on the DSA giving message recovery st ACM Conference on Computer and Communications Security\nK Nyberg and R Rueppel Message recovery for signature schemes based on the discrete logarithm problem Designs Codes and Cryptography\nP van Oorschot and M Wiener Parallel collision search with cryptanalytic applications Journal of Cryptology\nS Pohlig and M Hellman An improved algorithm for computing logarithms over GF p and its cryptographic signi cance IEEE Transactions on Information Theory\nD Pointcheval and J Stern Security proofs for signature schemes Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nJ Pollard Monte Carlo methods for index computation mod p Mathematics of Computa tion\nM Rabin Digitalized signatures and public key functions as intractable as factorization MIT LCS TR MIT Laboratory for Computer Science\nR Rivest A Shamir and L Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM\nR Rueppel A Lenstra M Smid K McCurley Y Desmedt A Odlyzko and P Landrock\nThe Eurocrypt controversial issue # Trapdoor primes and moduli Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nT Satoh and K Araki Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves Commentarii Mathematici Universitatis Sancti Pauli\nO Schirokauer Discrete logarithms and local units Philosophical Transactions of the Royal Society of London A\nC Schnorr E cient signature generation by smart cards Journal of Cryptology\nR Schoof Elliptic curves over nite elds and the computation of square roots mod p Mathematics of Computation\nR Schroeppel H Orman S O Malley and O Spatscheck Fast key exchange with elliptic curve systems Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nI Semaev Evaluation of discrete logarithms in a group of p torsion points of an elliptic curve in characteristic p Mathematics of Computation\nJ Silverman The xedni calculus and the elliptic curve discrete logarithm prob lem Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nJ Silverman and J Suzuki Elliptic curve discrete logarithms and the index calculus Ad vances in Cryptology Asiacrypt Lecture Notes in Computer Science Springer Verlag\nR Silverman and J Stapleton Contribution to ANSI X F working group\nN Smart The discrete logarithm problem on elliptic curves of trace one Journal of Cryp tology\nM Smid and D Branstad Response to Comments on the NIST Proposed Digital Signature Standard Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nJ Solinas An improved algorithm for arithmetic on a family of elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nJ Solinas Generalized Mersenne numbers Technical report CORR Dept of C$O Uni versity of Waterloo Available from http www cacr math uwaterloo ca\nJ Solinas Improved algorithms for arithmetic on anomalous binary curves Tech nical report CORR Dept of C$O University of Waterloo Available from\nhttp www cacr math uwaterloo ca\nA Stein Equivalences between elliptic curves and real quadratic congruence function elds Journal de Th eorie des Nombres de Bordeaux\nA Stein V M uller and C Thiel Computing discrete logarithms in real quadratic congruence function elds of large genus Mathematics of Computation\nE Teske Speeding up Pollard s rho method for computing discrete logarithms in J P Buh ler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nS Vanstone Responses to NIST s Proposal Communications of the ACM July\ncommunicated by John Anderson\nS Vaudenay Hidden collisions on DSS Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nWAP WTLS Wireless Application Protocol Wireless Transport Layer Security Spec i cation Wireless Application Protocol Forum February Drafts available at http www wapforum org\nM Wiener and R Zuccherato Faster attacks on elliptic curve cryptosystems Selected Areas in Cryptography Lecture Notes in Computer Science Springer Verlag\nE De Win S Mister B Preneel and M Wiener On the performance of signature schemes based on elliptic curves in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nR Zuccherato The equivalence between elliptic curve and quadratic function eld discrete logarithms in characteristic in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag", "Introduction\nDigital Signature Schemes\nBackground The Digital Signature Algorithm DSA\nFinite Fields\nThe Finite Field Fp The Finite Field F m\nPolynomial Basis Representations Normal Basis Representations\nElliptic Curves Over Finite Fields\nElliptic Curves Over Fp Elliptic Curves Over F m Basic Facts\nECDSA Domain Parameters\nDomain Parameters Generating an Elliptic Curve Veri ably at Random\nThe Case q p The Case q m\nDomain Parameter Generation Domain Parameter Validation\nECDSA Key Pairs\nKey Pair Generation Public Key Validation Proof of Possession of a Private Key\nECDSA Signature Generation and Veri cation\nSecurity Considerations\nThe Elliptic Curve Discrete Logarithm Problem\nKnown Attacks Experimental Results Hardware Attacks\nAttacks on the Hash Function Other Attacks\nImplementation Considerations\nInteroperability Considerations\nECDSA Standards NIST Recommended Curves\nRandom Elliptic Curves Over Fp Koblitz Elliptic Curves Over F m Random Elliptic Curves Over F m Converting Between Polynomial and Normal Basis Representations\nConclusions\nReferences\nIntroduction\nThe Digital Signature Algorithm DSA was speci ed in a U S Government Federal Information Processing Standard FIPS called the Digital Signature Standard DSS Its security is based on the computational intractability of the discrete logarithm problem DLP in prime order sub groups of Z p\nElliptic curve cryptosystems ECC were invented by Neal Koblitz and Victor Miller\nin They can be viewed as elliptic curve analogues of the older discrete logarithm DL cryptosystems in which the subgroup of Z p is replaced by the group of points on an elliptic curve over a nite eld The mathematical basis for the security of elliptic curve cryptosystems is the computational intractability of the elliptic curve discrete logarithm problem ECDLP\nSince the ECDLP appears to be signi cantly harder than the DLP the strength per key bit\nis substantially greater in elliptic curve systems than in conventional discrete logarithm systems Thus smaller parameters can be used in ECC than with DL systems but with equivalent levels of security The advantages that can be gained from smaller parameters include speed faster computa tions and smaller keys and certi cates These advantages are especially important in environments where processing power storage space bandwidth or power consumption is constrained\nThe Elliptic Curve Digital Signature Algorithm ECDSA is the elliptic curve analogue of the DSA ECDSA was rst proposed in by Scott Vanstone in response to NIST s National Institute of Standards and Technology request for public comments on their rst proposal for DSS It was accepted in as an ISO International Standards Organization standard ISO accepted in as an ANSI American National Standards Institute standard ANSI X and accepted in as an IEEE Institute of Electrical and Electronics Engineers standard IEEE P and a FIPS standard FIPS It is also under consideration for inclusion in some other ISO standards In this paper we describe the ANSI X ECDSA present rationale for some of the design decisions and discuss related security implementation and interoperability issues\nThe remainder of this paper is organized as follows In x we review digital signature schemes and the DSA A brief tutorial on nite elds and elliptic curves is provided in x and x respec tively In x methods for domain parameter generation and validation are considered while x discusses methods for key pair generation and public key validation The ECDSA signature and veri cation algorithms are presented in x The security of ECDSA is studied in x Finally some implementation and interoperability issues are considered in x and x\nDigital Signature Schemes\nBackground\nDigital signature schemes are designed to provide the digital counterpart to handwritten signatures\nand more A digital signature is a number dependent on some secret known only to the signer the signer s private key and additionally on the contents of the message being signed Signatures must be veri able if a dispute arises as to whether an entity signed a document an unbiased third party should be able to resolve the matter equitably without requiring access to the signer s\nprivate key Disputes may arise when a signer tries to repudiate a signature it did create or when a forger makes a fraudulent claim\nThis paper is concerned with asymmetric digital signatures schemes with appendix Asym\nmetric means that each entity selects a key pair consisting of a private key and a related public key The entity maintains the secrecy of the private key which it uses for signing messages and makes authentic copies of its public key available to other entities which use it to verify signatures\nAppendix means that a cryptographic hash function is used to create a message digest of the message and the signing transformation is applied to the message digest rather than to the message itself\nSecurity Ideally a digital signature scheme should be existentially unforgeable under chosen message attack This notion of security was introduced by Goldwasser Micali and Rivest Informally it asserts that an adversary who is able to obtain entity A s signatures for any messages of its choice is unable to successfully forge A s signature on a single other message\nApplications Digital signature schemes can be used to provide the following basic cryptographic services data integrity the assurance that data has not been altered by unauthorized or unknown means data origin authentication the assurance that the source of data is as claimed and non repudiation the assurance that an entity cannot deny previous actions or commitments Digital signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication e g FIPS ISO IEC and Blake Wilson and Menezes authenticated key transport e g Blake Wilson and Menezes ANSI X and ISO IEC and authenticated key agreement e g ISO IEC Di e van Oorschot and Wiener and Bellare Canetti and Krawczyk\nClassification The digital signature schemes in use today can be classi ed according to the hard underlying mathematical problem which provides the basis for their security\nInteger Factorization IF schemes which base their security on the intractability of the inte ger factorization problem Examples of these include the RSA and Rabin signature schemes\nDiscrete Logarithm DL schemes which base their security on the intractability of the or dinary discrete logarithm problem in a nite eld Examples of these include the ElGamal\nSchnorr DSA and Nyberg Rueppel signature schemes\nElliptic Curve EC schemes which base their security on the intractability of the elliptic curve discrete logarithm problem\nThe Digital Signature Algorithm DSA\nThe DSA was proposed in August by the U S National Institute of Standards and Technology\nNIST and was speci ed in a U S Government Federal Information Processing Standard FIPS\ncalled the Digital Signature Standard DSS The DSA can be viewed as a variant of the\nElGamal signature scheme Its security is based on the intractability of the discrete logarithm problem in prime order subgroups of Z p\nDSA Domain Parameter Generation Domain parameters are generated for each entity in a particular security domain See also the note below on secure generation of parameters\nSelect a bit prime q and a bit prime p with the property that q j p Select a generator g of the unique cyclic group of order q in Z p Select an element h Z p and compute g h p q mod p Repeat until g Domain parameters are p q and g\nDSA Key Pair Generation Each entity A in the domain with domain parameters p q g does the following\nSelect a random or pseudorandom integer x such that x q Compute y gx mod p\nA s public key is y A s private key is x\nDSA Signature Generation To sign a message m A does the following\nSelect a random or pseudorandom integer k k q Compute X gk mod p and r X mod q If r then go to step\nCompute k mod q\nCompute e SHA m Compute s k fe xrg mod q If s then go to step A s signature for the message m is r s\nDSA Signature Verification To verify A s signature r s on m B obtains authentic copies of A s domain parameters p q g and public key y and does the following\nVerify that r and s are integers in the interval q Compute e SHA m\nCompute w s mod q\nCompute u ew mod q and u rw mod q\nCompute X gu yu mod p and v X mod q\nAccept the signature if and only if v r\nSecurity Analysis Since r and s are each integers less than q DSA signatures are bits in size The security of the DSA relies on two distinct but related discrete logarithm problems One is the discrete logarithm problem in Z p where the number eld sieve algorithm see Gordon and Schirokauer applies this algorithm has a subexponential running time More precisely the expected running time of the algorithm is\nO exp c o lnp ln ln p\nwhere c and lnn denotes the natural logarithm function If p is a bit prime then the expression represents an infeasible amount of computation thus the DSA using a bit prime p is currently not vulnerable to this attack The second discrete logarithm problem works to the base g given p q g and y nd x such that y gx mod p For large p e g bits the best algorithm known for this problem is Pollard s rho method and takes aboutp\nq\nsteps If q then the expression represents an infeasible amount of computation thus the DSA is not vulnerable to this attack However note that there are two primary security parameters for DSA the size of p and the size of q Increasing one without a corresponding increase in the other will not result in an e ective increase in security Furthermore an advance in algorithms for either one of the two discrete logarithm problems could weaken DSA\nSecure Generation of Parameters In response to some criticisms received on the rst draft\nsee Rueppel et al and Smid and Branstad FIPS speci ed a method for generating primes p and q veri ably at random This feature prevents an entity e g a central authority generating domain parameters to be shared by a network of entities from intentionally constructing\nweak primes p and q for which the discrete logarithm problem is relatively easy For further discussion of this issue see Gordon FIPS also speci es two methods based on DES and SHA for pseudorandomly generating private keys x and per message secrets k FIPS mandates the use of these algorithms or any other FIPS approved security methods\nFinite Fields\nWe provide a brief introduction to nite elds For further information see Chapter of Koblitz\nor the books by McEliece and Lidl and Niederreitter\nA nite eld consists of a nite set of elements F together with two binary operations on F\ncalled addition and multiplication that satisfy certain arithmetic properties The order of a nite\neld is the number of elements in the eld There exists a nite eld of order q if and only if q is a prime power If q is a prime power then there is essentially only one nite eld of order q this\neld is denoted by Fq There are however many ways of representing the elements of Fq Some representations may lead to more e cient implementations of the eld arithmetic in hardware or in software\nIf q pm where p is a prime and m is a positive integer then p is called the characteristic of Fq and m is called the extension degree of Fq Most standards which specify the elliptic curve cryptographic techniques restrict the order of the underlying nite eld to be an odd prime q p or a power of q m In x we describe the elements and the operations of the nite eld Fp In x elements and the operations of the nite eld F m are described together with two methods for representing the eld elements polynomial basis representations and normal basis representations\nThe Finite Field Fp\nLet p be a prime number The nite eld Fp called a prime eld is comprised of the set of integers\nf p g\nwith the following arithmetic operations\nAddition If a b Fp then a b r where r is the remainder when a b is divided by p and r p This is known as addition modulo p\nMultiplication If a b Fp then a b s where s is the remainder when a b is divided by p and s p This is known as multiplication modulo p\nInversion If a is a non zero element in Fp the inverse of a modulo p denoted a is the unique integer c Fp for which a c\nExample The nite eld F The elements of F are f g Examples of the arith metic operations in F are\nThe Finite Field F m\nThe eld F m called a characteristic two nite eld or a binary nite eld can be viewed as a vector space of dimension m over the eld F which consists of the two elements and That is there exist m elements m in F m such that each element F m can be uniquely written in the form\na a am m where ai f g\nSuch a set f m g is called a basis of F m over F Given such a basis a eld element can be represented as the bit string a a am Addition of eld elements is performed by bitwise XOR ing the vector representations The multiplication rule depends on the basis selected\nThere are many di erent bases of F m over F Some bases lead to more e cient software or hardware implementations of the arithmetic in F m than other bases ANSI X permits two kinds of bases polynomial bases discussed in x and normal bases discussed in x\nPolynomial Basis Representations", "See Gordon [36] for a detailed survey of various methods for scalar multiplication."]} +{"59911893|3540699": ["In particular, without loss of generality, in every simulation round, each video content is mapped to a video stream compressed using H.264 [87] at a average coding rate randomly chosen in the range [250, 2000] kbps."]} +{"14815843|9104850": ["Similar cooperative caching techniques have been proposed in the web cache area whose characteristics are significantly different because they are based on an overlay environment [34]."]} +{"400217|7988320": []} +{"400217|16514036": []} +{"14086875|14697846": ["At the same time, a number of different peer-to-peer solutions [2], including the recently announced BitTorrent Sync service [3], represent another direction in the searching of efficient dataset synchronization solutions, which requires either the maintenance of a sophisticated peer-to-peer\u2026"]} +{"9747089|1230643": ["At roughly the same time, there was growing interest in wireless sensor networks (WSNs), a topic which itself has spawned numerous conferences, journals, theses, and some commercial activities [5]."]} +{"32439255|9104850": []} +{"59628192|3189715": []} +{"11588005|31670805": ["Ensuring reliability, performance, and efficiency are some of the other challenges associated with the IP-based systems [8]."]} diff --git a/graph_3994942.jsonl b/edge/graph_3994942.jsonl similarity index 100% rename from graph_3994942.jsonl rename to edge/graph_3994942.jsonl diff --git a/graph_399542.jsonl b/edge/graph_399542.jsonl similarity index 100% rename from graph_399542.jsonl rename to edge/graph_399542.jsonl diff --git a/graph_3995801.jsonl b/edge/graph_3995801.jsonl similarity index 100% rename from graph_3995801.jsonl rename to edge/graph_3995801.jsonl diff --git a/edge/graph_39994618.jsonl b/edge/graph_39994618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e64d8bf016bedce9fe07778abbeb6df9d69459e3 --- /dev/null +++ b/edge/graph_39994618.jsonl @@ -0,0 +1 @@ +{"2504864|1805048": []} diff --git a/graph_4000132.jsonl b/edge/graph_4000132.jsonl similarity index 100% rename from graph_4000132.jsonl rename to edge/graph_4000132.jsonl diff --git a/edge/graph_40003730.jsonl b/edge/graph_40003730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80393b5861de88d96151901c05b1c0553925023f --- /dev/null +++ b/edge/graph_40003730.jsonl @@ -0,0 +1 @@ +{"149260|10346685": []} diff --git a/edge/graph_40008157.jsonl b/edge/graph_40008157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4002053.jsonl b/edge/graph_4002053.jsonl similarity index 100% rename from graph_4002053.jsonl rename to edge/graph_4002053.jsonl diff --git a/edge/graph_40064091.jsonl b/edge/graph_40064091.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d56cb65c3d5cabc8ec83eb1c74418c6f97f1c6b4 --- /dev/null +++ b/edge/graph_40064091.jsonl @@ -0,0 +1,7 @@ +{"60827055|6265393": ["For example, Ramesh et al. (2001); Li and Liu (2003) , and Hua et al. (2004) and references therein discuss diverse delivery technologies for large-scale networks."]} +{"22799502|16050825": ["[2])."]} +{"30386329|15471820": []} +{"40332736|16467945": ["Although the combination of exact and approximate methods has been very active in recent years (see, for example, [16]), attempts to systematically combine column generation and metaheuristics are rare (exceptions are [17\u2013 19])."]} +{"123996668|6265393": []} +{"5240943|47147736": []} +{"22757398|6265393": ["Representative references include Ramesh et al (2001), Li and Liu (2003), Hua et al (2004), and references therein."]} diff --git a/edge/graph_4009814.jsonl b/edge/graph_4009814.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40137605.jsonl b/edge/graph_40137605.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40143629.jsonl b/edge/graph_40143629.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40144859.jsonl b/edge/graph_40144859.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40145772.jsonl b/edge/graph_40145772.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40162482.jsonl b/edge/graph_40162482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..950922ded62853ff7bc60da43a2b6361e3ae1e50 --- /dev/null +++ b/edge/graph_40162482.jsonl @@ -0,0 +1 @@ +{"60604897|11266709": ["In addition, students are able to do expensive and inconceivable activities virtually (Winn, 1993; Avgoustinov, 2000) and have an identity in the environment which provides them with rules, allusions and other concepts and objects that make them feel a part of the world ( Schuemie, van der Straaten, Krijn & van der Mast, 2004 )."]} diff --git a/edge/graph_40182534.jsonl b/edge/graph_40182534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4019175.jsonl b/edge/graph_4019175.jsonl similarity index 100% rename from graph_4019175.jsonl rename to edge/graph_4019175.jsonl diff --git a/edge/graph_40202226.jsonl b/edge/graph_40202226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9eb2652e712959a24ee23ebcededfdf406ea7def --- /dev/null +++ b/edge/graph_40202226.jsonl @@ -0,0 +1,13 @@ +{"2654767|15170341": ["no-reference video quality measurement methods, we refer to [30]\u2013[37]."]} +{"18220375|16748080": []} +{"18220375|15170341": []} +{"35240178|2261490": []} +{"399542|10559330": ["Different mechanisms and solutions can be used to form the QoS at the Network Layer, such as, Differentiated Services (DiffServ) [5], Integrated Services [6] and Multi-Protocol Label Switching (MPLS) [7]."]} +{"566971|16748080": ["The resulting distorted videos usually exhibit the following typical visual distortions [35]: \u2022 Blocking effect ."]} +{"566971|15170341": ["For example, [32], [69] mainly follow the psychophysical/engineering approach classi\ufb01cation method; [31], [70]\u2013[72] mainly adopt the reference-based clas-si\ufb01cation method, and [47] adopts a combination of the two.", "2) Psychophysical Approach: Objective quality models of the psychophysical approach are based on the features of the HVS, which is related to visual perception, for instance, contrast sensitivity, frequency selectivity, spatial and temporal features, masking effects, and color perception [72]."]} +{"566971|10099297": ["[ 11] and [12] consider both network and application QoS support."]} +{"566971|12130888": ["A survey of user behavior in P2P video system is recently given by [154]."]} +{"16039836|6581557": ["Due to the above reasons, we suggest commonly-used quality metrics for Internet video streaming [11] [12], where video start-up latency, buffering rate and playout buffer status are mainly considered to measure the video QoE."]} +{"10102660|2261490": []} +{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]} +{"31851714|15170341": []} diff --git a/edge/graph_40218027.jsonl b/edge/graph_40218027.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40249.jsonl b/edge/graph_40249.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40296618.jsonl b/edge/graph_40296618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a231d3e771295da0b5229aca80f726a3d102a47d --- /dev/null +++ b/edge/graph_40296618.jsonl @@ -0,0 +1,2 @@ +{"1090650|10257004": []} +{"3063694|10257004": ["More on small universal Turing machines, and related notions, can be found in [10,15,27]."]} diff --git a/edge/graph_4030148.jsonl b/edge/graph_4030148.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40304452.jsonl b/edge/graph_40304452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40315379.jsonl b/edge/graph_40315379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f8fa42716f40253227ddf756c8d754c0d2f14db --- /dev/null +++ b/edge/graph_40315379.jsonl @@ -0,0 +1,8 @@ +{"62592053|16544012": []} +{"120876516|16544012": []} +{"11843041|18977370": ["m domains. For example, methods for performing anomaly detection have been discussed as part of more generalreviewsinareasoffrauddetection (Bolton and Hand, 2002; Phua et al., 2010), networkintrusion(Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deploymentofwirelesssensornetworks(Zhang et al.,2010; Janakiram et al., 2006). While signi\ufb01cant overlap exists between the analysis of computer an"]} +{"11843041|18654252": [", 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor networks (Zhang et al.", "\u2026been discussed as part of more general reviews in areas of fraud detection (Bolton and Hand, 2002; Phua et al., 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor networks (Zhang et al., 2010; Janakiram et al., 2006).", "\u2026based anomaly detection has been investigated in a number of additional problem domains including intrusion detection (Garc\u00b4\u0131a-Teodoro et al., 2009; Gogoi et al., 2011; Jyothsna et al., 2011), tra\ufb03c modelling (Shekhar et al., 2001) and gene regulation (Kim and Gelenbe, 2009; Kim et al., 2012).", "Network based anomaly detection has been investigated in a number of additional problem domains including intrusion detection (Gar\u0107\u0131a-Teodoro et al., 2009; Gogoi et al., 2011; Jyothsna et al., 2011), traffic modelling (Shekhar et al."]} +{"11843041|7774517": ["In addition, anomaly detection in sensor networks generally requires algorithms that reduce network tra\ufb03c and have a low computational complexity (Zhang et al., 2010).", "in some SNA scenarios, it is not typically required. In addition, anomaly detection in sensor networks generally requires algorithms that reduce network tra\ufb03c and have a low computational complexity (Zhang et al., 2010). 3. Problem domains for the application of anomaly detection in social networks Anomalies in social networks are often representative of illegal and unwanted behaviour. The recent explosion of social", "\u2026been discussed as part of more general reviews in areas of fraud detection (Bolton and Hand, 2002; Phua et al., 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor networks (Zhang et al., 2010; Janakiram et al., 2006)."]} +{"11843041|3330313": ["on methods employed. For the detection of anomalies in social networks, we are concerned with the pattern of interactions between the individualsin the network. Thus, following(Chandola et al., 2009; Hodge and Austin, 2004) we de\ufb01ne network anomalies simply as patterns of interaction that signi\ufb01cantly differ from the norm. As is the case for general anomaly detection, this de\ufb01nition is highly imprecise, and for a given ", "\u2026previous reviews describe a number of challenges for anomaly detection, mainly associated with the problem of de\ufb01ning normal behaviour, particularly in the face of evolving systems, or systems where anomalies result from malicious activities (Chandola et al., 2009; Hodge and Austin, 2004).", " 2009). Another recent review de\ufb01nes anomalies as \u201can observation (or subset of observations) which appears to be inconsistent with the remainderofthat setofdata\u201d((Barnett and Lewis, 1994), cited in (Hodge and Austin, 2004)). We note two important aspects of these de\ufb01nitions. First, the de\ufb01nitions given above highlight the importance of de\ufb01ning expected behaviour, but are somewhat imprecise in terms of exactly how the a", "tion, mainly associated with the problem of de\ufb01ning normal behaviour, particularly in the face of evolving systems, or systems where anomalies result from malicious activities (Chandola et al., 2009; Hodge and Austin, 2004). In particular, Chandola et al. (2009) note that the development of general solutions to anomaly detection remains a signi\ufb01cant challenge and that novel methods are often developed to solve speci\ufb01c p", "\u2026non-network based problem, describing the use of various algorithms and the particular types of problems to which these algorithms are most suited (Hodge and Austin, 2004; Chandola et al., 2009; Markou and Singh, 2003b,a). cause harm A workshop on the detection of network based anomalies was also\u2026", "Another recent review de\ufb01nes anomalies as \u201can observation (or subset of observations) which appears to be inconsistent with the remainder of that set of data\u201d ((Barnett and Lewis, 1994), cited in (Hodge and Austin, 2004)).", "Thus, following (Chandola et al., 2009; Hodge and Austin, 2004) we de\ufb01ne network anomalies simply as patterns of interaction that signi\ufb01cantly differ from the norm."]} +{"11843041|50458504": ["\u2026Bichler (2011); Cheng and Dickinson (2013)), clandestine organisational structures (e.g. Shetty and Adibi (2005); Krebs (2002); Reid et al. (2005)), and fraudulent and predatory activity (e.g. Phua et al. (2010); Fire et al. (2012); Chau et al. (2006); Akoglu et al. (2013); Pandit et al. (2007)).", "\u2026methods for performing anomaly detection have been discussed as part of more general reviews in areas of fraud detection (Bolton and Hand, 2002; Phua et al., 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor\u2026", "For xample, methods for performing anomaly detection have been iscussed as part of more general reviews in areas of fraud detecion (Bolton and Hand, 2002; Phua et al., 2010), network intrusion Jyothsna et al."]} +{"116028796|16544012": ["Refer to Lowry and Montgomery (1995) and Bersimis et al. (2007) for thorough reviews of monitoring multivariate continuous processes."]} diff --git a/edge/graph_40348081.jsonl b/edge/graph_40348081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40354276.jsonl b/edge/graph_40354276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..474b0b98c115a2e6bbbcadd78cfbccacfdb9f574 --- /dev/null +++ b/edge/graph_40354276.jsonl @@ -0,0 +1,2 @@ +{"5156422|35897447": ["According to the strategic IS literature, IT-dependent strategic initiatives consist of identifiable competitive moves that depend on the use of IT to be enacted, and are designed to lead to sustained improvements in a firm\u2019s competitive position (Piccoli and Ives, 2005)."]} +{"11767121|35897447": ["\u2026and Pingry 2004; Setia et al. 2008; Shin 2006), extended the conceptualization of the IT value to include benefits such as competitive advantage (Piccoli and Ives 2005), agility (Sambamurthy et al. 2003; Setia et al. 2008), and has examined the processes and context in which IT creates value\u2026"]} diff --git a/edge/graph_4040035.jsonl b/edge/graph_4040035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40415658.jsonl b/edge/graph_40415658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..663dc6e66e600a060f77aeb0c05abe3fd206f7b3 --- /dev/null +++ b/edge/graph_40415658.jsonl @@ -0,0 +1,10 @@ +{"7921587|8909218": ["layout of micro-sites [48]\u2013[51], picocells and femtocells [52]\u2013[58], and CoMP technology [59] as well as the new", "Heterogeneous Networks [44-61] Network architecture design", "A detailed description of femtocellular networks from both the technical and business aspects can be found in [58], where the challenges of implementing these networks and some potential research opportunities are also introduced.", "The energy-efficient MIMO and OFDMA schemes in multi-cell scenarios need to be further investigated. only BS site Not introduced in this paper - Service Differentiation [42,43] both BS site and Terminal site - Heterogeneous Networks [44-61] Network architecture design Relay and Cooperative Communications [62-71] both BS site and Terminal site - MIMO [72,73,75] both BS site and Terminal site - - [28,29,74,76-78] only Terminal site OFDMA [81,82,84] both BS site and Terminal site - [32,79] only BS site [80,83] existing work only considers the single cell scenarios.", "It is indicated in [58] that femtocellular networks must deal with additional timing and synchronization, as well as interference management issues, which cause more signaling overhead and potentially more energy consumption."]} +{"7921587|16629628": []} +{"10350342|8909218": []} +{"124173586|17109970": []} +{"124173586|16629628": ["3Another popular category of resource allocation problems in OFDMA networks is rate adaptation (RA) that maximizes overall throughput under per-user QoS requirement and system resource constraints [27]."]} +{"19085649|7686677": ["Recently, studies have shown that the rapid development of Information and Communication Technology (ICT) is contributing to global warming and climate change due to the increase in energy consumption and CO2 emissions [1]."]} +{"40929937|8909218": []} +{"15067633|16629628": ["The inner-layer problem is actually equivalent to the conventional RA resource allocation problem [15]\u2013[18], which maximizes the (weighted) sum-rate while guaranteeing peruser QoS as follows,"]} +{"12910007|7686677": []} +{"42903169|7686677": ["As an important part of ICT, wireless communications are responsible for energy saving [3]."]} diff --git a/graph_4042622.jsonl b/edge/graph_4042622.jsonl similarity index 100% rename from graph_4042622.jsonl rename to edge/graph_4042622.jsonl diff --git a/edge/graph_40462024.jsonl b/edge/graph_40462024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a467dd69c3d15bbf465f5746d777d814adecca6 --- /dev/null +++ b/edge/graph_40462024.jsonl @@ -0,0 +1,26 @@ +{"21692554|8618569": ["The analysis of the measured parameters can allow the detection of abnormal operating conditions and aids therefore in preventing potential machine failure [6]."]} +{"21692554|1230643": ["A wireless sensor network (WSN) is a network containing such sensors which could be developed at a relatively low-cost and deployed in a variety of different settings to interact with the environment such as measuring a variety of physical properties, including temperature, acoustics, light, and pollution [1]."]} +{"782697|31355144": []} +{"28717563|28210515": ["Experimental results [17]\u2013[19] have demonstrated that Wi-Fi networks and WSNs may function together even if they operate in the same frequency band."]} +{"28717563|4631990": []} +{"14849884|1333339": ["Trust Predictions: Trust prediction is a method of predicting potentially unknown trust between nodes using the present and past behavior of nodes and also the recommendations received from other nodes [17].", "The core factor to be considered for trust propagation is cooperation in the network in transporting the trust information [17, 18].", "The chain of nodes that transmits the trust information about target node to the trust requesting node constitutes a trust path [17, 18]."]} +{"14849884|1462862": []} +{"14849884|10137283": []} +{"14849884|9240891": ["The contributions of this paper are: (1) to give a clear definition of trust in the communication and networking field, drawing upon definitions from different disciplines; (2) to extensively survey the existing trust management schemes developed for MANETs and investigate their general trends; and\u2026", "Also, confidence level is used as a weight to evaluate trust of other nodes based on a Bayesian approach."]} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"643390|9830350": ["Another reason for choosing these protocols is their energy-efficient nature in data transmission and communication [13]."]} +{"643390|12060835": ["In WSNs, each node has the ability to adjust its transmission power to reach a far distant node [35]."]} +{"28935470|42497499": ["Figure 7 shows the non-beacon mode with superframe boundaries [5], [22].", "In addition, the messages are not supplied with data authentication and integrity, or reply defence, privacy protection, and confidentiality [22].", "In MAC, CSMA/CA or slotted aloha could be used during RAP, EAP, and CAP [21], [22].", "Figure 8 shows the non-beacon mode without superframe boundaries [5], [21], [22].", "Allocation Interval and Access Methods in Non-Beacon Mode Without Superframe Boundaries [22]", ", integrity, reply defence, confidentiality, privacy protection, and message authentication) [22], [25].", "Layout of Access Phase in a Non-Beacon Mode with Superframe Boundaries [22]"]} +{"28935470|7854020": ["Figure 2 shows the complete summary of frequency bands used in WBANs [5].", "Figure 8 shows the non-beacon mode without superframe boundaries [5], [21], [22].", "Figure 7 shows the non-beacon mode with superframe boundaries [5], [22]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"132920127|134181373": []} +{"16326047|17205659": ["In [41], it is proposed to add forward and backward secrecy, as new sensors are being deployed and old sensors fail."]} +{"23435757|1230643": ["The battery power is consumed by all the sensors activities: sensing, processing, storing and communication; however the optimization of the energy spent in the communications is one of the most important problems in energy efficiency [6], in fact, the radio consumes a significant part of the energy budget of the sensors, furthermore the major energy savings are achieved by turning off the radio, which however means disconnecting the sensors from the rest of the WSN."]} +{"59851800|2383780": ["Observe-Orient-Decide-Act (OODA) [28], Omnibus [29], Waterfall [30] and the UK Intelligence Cycle [31]), and role-based models (e."]} +{"59851800|622308": ["Observe-Orient-Decide-Act (OODA) [28], Omnibus [29], Waterfall [30] and the UK Intelligence Cycle [31]), and role-based models (e."]} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} diff --git a/edge/graph_40471370.jsonl b/edge/graph_40471370.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08a600be4c26d370e323414bbcdf4a9c96b64520 --- /dev/null +++ b/edge/graph_40471370.jsonl @@ -0,0 +1,4 @@ +{"2020094|63137": ["In ACO, candidate solutions are generated by a set of stochastic procedures called artificial ants that use a parametrized probabilistic model which is updated using the previously seen solutions [13]."]} +{"4271401|1708582": []} +{"7847316|18782652": ["Rule pruning is a commonplace technique in data mining [3].", "tually, there are several classification-rule discovery algorithms that were explicitly designed to improve rule set simplicity, even at the expense of reducing the predictive accuracy [1], [3], [4]."]} +{"17042749|8953108": ["Research in image thresholding is abundant and a large number of algorithms already exist [1].", "Moreover, the study compares the proposed algorithm with the Otsu [10] and Kittler [11] techniques, which are well-established thresholding algorithms [1].", "The performance of each algorithm is determined using misclassification error [1]."]} diff --git a/graph_4048061.jsonl b/edge/graph_4048061.jsonl similarity index 100% rename from graph_4048061.jsonl rename to edge/graph_4048061.jsonl diff --git a/edge/graph_40518883.jsonl b/edge/graph_40518883.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb2c1bc52180e9d4cc23d31a42fbb640cb01cee9 --- /dev/null +++ b/edge/graph_40518883.jsonl @@ -0,0 +1,9 @@ +{"5745896|1230643": []} +{"16588075|6959212": ["Installation flexibility and easy configuration enable better usability and maintenance than traditional communication technologies [1].", "Traditionally, applications in industrial environments are based on wired communication solutions [1]."]} +{"22574558|270804": []} +{"15146541|7774517": ["[20] present an overview of existing outlier detection techniques for WSNs based on the characteristics such as data type, outlier type, outlier identity and outlier degree."]} +{"15146541|270804": ["We will provide a brief discussion of event-reliability protocols, which is by no means comprehensive; wider surveys of different reliability protocols for WSNs are available in [6] and [7]."]} +{"15146541|1230643": ["The nodes then performs innode processing and route the data towards sink [1][2]."]} +{"6142416|270804": []} +{"10559418|270804": ["The study of reliable data transport in WSNs has been the subject of extensive research [3, 6, 7, 8, 9, 11, 12, 14, 16]."]} +{"10559418|1230643": ["Typically a WSN comprises of a large number of sensor nodes possessing limited processing and power capabilities, often communicating over unreliable and low bandwidth radio links [3].", "The study of reliable data transport in WSNs has been the subject of extensive research [3, 6, 7, 8, 9, 11, 12, 14, 16]."]} diff --git a/edge/graph_40534005.jsonl b/edge/graph_40534005.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40537418.jsonl b/edge/graph_40537418.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4056929.jsonl b/edge/graph_4056929.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40571076.jsonl b/edge/graph_40571076.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01743e693ecdaf07303f8505e7cee7b56ccb3700 --- /dev/null +++ b/edge/graph_40571076.jsonl @@ -0,0 +1 @@ +{"62044921|17069874": []} diff --git a/edge/graph_40584663.jsonl b/edge/graph_40584663.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40596005.jsonl b/edge/graph_40596005.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f8d7eb0aaaebf460998fe5a563fbc73911e12c9 --- /dev/null +++ b/edge/graph_40596005.jsonl @@ -0,0 +1,4 @@ +{"14625413|25699143": ["There is a significant body of work on range image recovery using stereo (the most recent comprehensive survey is given in [2]).", "There is a significant body of work on range image recovery using stereo; good surveys can be found in (Barnard and Fischler, 1982; Dhond and Aggarwal, 1989)."]} +{"59677746|25699143": ["The details of several techniques which have been investigated for this purpose are reviewed in [12], [13]."]} +{"7767783|25699143": ["1 Introduction Stereo vision has been one of the earliest and most thoroughly investigated topics in the computer vision community [3]."]} +{"15648497|7439310": ["Technologies developed in video error concealment [25] can also be employed to render the unavailable slit by interpolating from the available neighborhood slits."]} diff --git a/graph_4060377.jsonl b/edge/graph_4060377.jsonl similarity index 100% rename from graph_4060377.jsonl rename to edge/graph_4060377.jsonl diff --git a/graph_4061876.jsonl b/edge/graph_4061876.jsonl similarity index 100% rename from graph_4061876.jsonl rename to edge/graph_4061876.jsonl diff --git a/edge/graph_40622027.jsonl b/edge/graph_40622027.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40670296.jsonl b/edge/graph_40670296.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6ba1c1bf62a88bf8d3719c37eda97c49ad940db --- /dev/null +++ b/edge/graph_40670296.jsonl @@ -0,0 +1,11 @@ +{"15494373|2357830": []} +{"14637054|2357830": ["models, existing PPA schemes have to employ ad hoc notions of security and privacy [9], and then heuristically analyze the"]} +{"8544424|15981390": []} +{"8544424|43033940": ["\u00c7"]} +{"8544424|17516538": ["In general, visionbased schemes collect much richer information, but they suffer from the line-of-sight problem [18], [36], [37], as lights can be easily blocked by objects."]} +{"2895901|2357830": ["Such concerns include the illicit tracking of RFID tags which in turn violate the privacy of the holders of the tags."]} +{"2332366|18740719": ["Research challenges faced by SCADA systems in risk assessment are outlined in [37] and [38]."]} +{"2332366|86629084": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"111230990|6628538": ["\u2026environment, more and more organisations focus on the storage/retrieval assignment for the benefits of reduced picking travel time, less congestion and enhanced space utilisation (Mansuri 1997, Tang and Chew 1997, Chew and Tang 1999, Dial 2006, Muppani and Adil 2008, Roodbergen and Vis 2009)."]} diff --git a/edge/graph_40709161.jsonl b/edge/graph_40709161.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1159abc450b82c9cdd051704eac4f60fce184de --- /dev/null +++ b/edge/graph_40709161.jsonl @@ -0,0 +1 @@ +{"13145787|431089": ["Understandably, the efforts to develop data mining tools to extract gene information from the biomedical literature have intensified recently (Shatkay and Feldman, 2003; Wilkinson and Huberman, 2004)."]} diff --git a/edge/graph_4071247.jsonl b/edge/graph_4071247.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40713311.jsonl b/edge/graph_40713311.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40718309.jsonl b/edge/graph_40718309.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40725508.jsonl b/edge/graph_40725508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cffbbc1065514442c725059896560cb7f4b53b49 --- /dev/null +++ b/edge/graph_40725508.jsonl @@ -0,0 +1,15 @@ +{"26441692|1708582": []} +{"21373055|763939": []} +{"29928963|763939": ["Although several authors have published surveys focused on different issues related to vehicular networks such as mobility models [13, 15], security attacks [16], revocation [17], or routing [18\u201320], none of these works specifically focused on the warning message dissemination process, nor on the broadcast schemes used when dangerous situations take place.", "[13] presented a procedure for the implementation of vehicular mobility models."]} +{"29928963|17934515": ["[14] presented a comprehensive study of platoon-based vehicular cyber-physical systems (VCPS)."]} +{"1309396|12765832": []} +{"10823280|164835": ["Cellular localization [27\u201330] takes advantage of the mobile cellular infrastructure present in most urban environments to estimate the position of an object."]} +{"23583551|763939": ["Interaction and integration between traffic generating simulator and network simulator can be divided into three classes modeling [10]:", "The mobility of the nodes is also usually limited to highways, roads, and small streets, so that the vehicle speed and the accuracy of the road map have to be perfectly predicted [10]."]} +{"19907396|1708582": ["Reinforced learning has also been applied to traffic lights management [21]."]} +{"15728005|7971188": []} +{"15728005|14697846": []} +{"15728005|2835258": []} +{"31115381|12765832": ["We assume that mobility management is handled by the proposed network mobility solutions in the literature Perera et al. (2004)."]} +{"5634281|1137487": ["The RSU deployment problem is understood as an optimization problem under different constraints, such as severe resource and assorted hostile environmental conditions [5]."]} +{"19243501|2335874": ["The periodic beaconing information includes location, velocity, direction, acceleration, and vehicle type [95]."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} diff --git a/edge/graph_40731302.jsonl b/edge/graph_40731302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40748822.jsonl b/edge/graph_40748822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40771831.jsonl b/edge/graph_40771831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_40853448.jsonl b/edge/graph_40853448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50c73a940b9c4f6c7d0b864971995b5416b5784c --- /dev/null +++ b/edge/graph_40853448.jsonl @@ -0,0 +1 @@ +{"62295514|16378248": ["As an example, Figure 4(a) shows a fragment of a feature model that characterizes a family of model transformation approaches [6]."]} diff --git a/edge/graph_40857498.jsonl b/edge/graph_40857498.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81d72164656202a6cfbeafd1bf658bd17df80cba --- /dev/null +++ b/edge/graph_40857498.jsonl @@ -0,0 +1,4 @@ +{"7139025|11650495": ["The large number of algorithms for rendering of shadows [17] indicates the importance of shadows for creating realistic-looking scenes."]} +{"40550|239537": ["If we want to gain more insight in the hierarchical organization of each of the examples mentioned above, we can visualize the hierarchical structure using one of the many tree visualization methods that have been proposed in the past [2] [7] [15] [18] [24] [27].", "In this layout, nodes are placed on concentric circles according to their depth in the tree [2] [7] [15].", "One of the most well-known tree visualizations is the rooted tree depicted in figure 1 [2] [15] [24].", "Issues with regard to computational complexity and layout stability have also been associated with force-directed methods [15]."]} +{"6373232|40857498": ["DTI records information about anisotropic physical\nstructures in that it reflects the self-diffusion properties of water in fibrous material such as the brain\u2019s white matter."]} +{"18523492|7624176": ["A pathway is commonly drawn as a streamline [23] or a streamtube ([21], among many) whose color and thickness are chosen according to the pathway metadata and the per-point attributes; the entire dataset is visualized by drawing each pathway in the collection using a graphics API such as OpenGL."]} diff --git a/edge/graph_40910013.jsonl b/edge/graph_40910013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99e2512c2b73caadc1832f5242f62a5827f1000a --- /dev/null +++ b/edge/graph_40910013.jsonl @@ -0,0 +1 @@ +{"353038|17779575": ["According to our study, this duplication results in up to 25x more data volume for the input feature maps in the CONV layer, and thus diminishes the gains of FPGA acceleration considering that FPGA platforms have extremely limited bandwidth (about 10 to 20 GB/s [26]) compared to CPU/GPU platforms (up to 700GB/s [27])."]} diff --git a/edge/graph_40932929.jsonl b/edge/graph_40932929.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3176e66ae14699237b4b01e36c55737737acb322 --- /dev/null +++ b/edge/graph_40932929.jsonl @@ -0,0 +1,7 @@ +{"38427818|28991300": ["In general, the development of any context-aware application consists of the following three main components [21, 28]:", "These applications, which are known as \"context-aware\", form the building blocks of pervasive computing [20, 21]."]} +{"38427818|1113420": ["context, which is provided by sensing the environment contextual information [27]."]} +{"27066321|1077083": ["We refer for an in-depth discussion on context-based adaptation for mobility scenarios to [34]; a broader overview can be found in [35], [36]."]} +{"27066321|2187403": ["The possible applications range from data tailoring [32] to the offloading of computational tasks [33]."]} +{"27066321|1113420": ["[38], the detection of context changes and the actual usage of this information should be separated in order to allow extensibility of a system.", "This is usually achieved by using logical sensors [38]."]} +{"10005326|4787452": ["is responsible for allocating TDMA slots to other cluster members [8], [10], [11]."]} +{"10005326|17934515": ["vehicles in either direction follow Poisson distribution with the mean value of \u03bbc and \u03bbd , respectively, and that safety messages generated from individual vehicles are subject to a Poisson distribution with average \u03bbs in the time domain [1].", "11p/ ITS-G5 protocol [1], the current defacto vehicular networking standard.", "Moreover, a group of vehicles with common interests can drive in a cooperative manner, namely cooperative driving, which can further improve transportation efficiency and traffic safety [1]\u2013[3].", "-sponsored SARTRE project demonstrated that a group of trucks can adopt cooperative driving and move with a speed of 90 km/h and only 6 meters between adjacent vehicles [1]."]} diff --git a/graph_4095407.jsonl b/edge/graph_4095407.jsonl similarity index 100% rename from graph_4095407.jsonl rename to edge/graph_4095407.jsonl diff --git a/graph_4096056.jsonl b/edge/graph_4096056.jsonl similarity index 100% rename from graph_4096056.jsonl rename to edge/graph_4096056.jsonl diff --git a/graph_4097106.jsonl b/edge/graph_4097106.jsonl similarity index 100% rename from graph_4097106.jsonl rename to edge/graph_4097106.jsonl diff --git a/edge/graph_40976508.jsonl b/edge/graph_40976508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dbc89ec5ef8d4130975de446b9366453a7e70af1 --- /dev/null +++ b/edge/graph_40976508.jsonl @@ -0,0 +1,2 @@ +{"2075465|2509135": ["The readers may refer to other publications in recent reviews [217], [218] and recent special issues, e."]} +{"2075465|12601073": []} diff --git a/graph_4102026.jsonl b/edge/graph_4102026.jsonl similarity index 100% rename from graph_4102026.jsonl rename to edge/graph_4102026.jsonl diff --git a/edge/graph_41035405.jsonl b/edge/graph_41035405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4106288.jsonl b/edge/graph_4106288.jsonl similarity index 100% rename from graph_4106288.jsonl rename to edge/graph_4106288.jsonl diff --git a/edge/graph_41102060.jsonl b/edge/graph_41102060.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d107dd1d7b965124cd8b8f88abe91e8a48ef7bd6 --- /dev/null +++ b/edge/graph_41102060.jsonl @@ -0,0 +1 @@ +{"26813944|7876633": ["The agents dynamically allocate resources by routing traffic demands in an optimal way, lowering cost and optimizing performance [28] [29]."]} diff --git a/graph_4110304.jsonl b/edge/graph_4110304.jsonl similarity index 100% rename from graph_4110304.jsonl rename to edge/graph_4110304.jsonl diff --git a/edge/graph_41104189.jsonl b/edge/graph_41104189.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..115d984c4d4d48dd21b62c8ad1664d5fdfc4081b --- /dev/null +++ b/edge/graph_41104189.jsonl @@ -0,0 +1,12 @@ +{"17233601|6280485": []} +{"15121082|6280485": ["Several approaches to lung segmentation have been described which are based both on boundary finding and regional grouping methods [ 5 ].", "To our knowledge, this is the only annotated image set publicly available [ 5 ].", "In view of this, the availability of efficient and effective computer-aided diagnosis (CAD) systems is highly desirable [ 5 ], as such systems are usually conceived to provide the physician with a second opinion [6] so as to focus his/her attention on suspicious image zones, playing the role of a \u201csecond reader.\u201d", "As also pointed out by van Ginneken et al. [ 5 ], the subtlety of nodular lesions in the adopted database has a strong influence on detection sensitivity and accuracy; a well-known fact to radiologists, as also confirmed by experiments performed on human observers [11]."]} +{"7509004|6280485": ["The presence of superimposed anatomical structures makes the discrimination of image features and the interpretation of a CXR extremely challenging even for clinical experts [14]."]} +{"12508411|33286487": []} +{"6371942|192934": ["However, in comparative studies [52] it has been shown that -NN classifiers often yield results comparable to or better than other classifiers, such as neural networks, and rarely show poor performance."]} +{"16222365|192934": ["The roots of SVMs are in linear machine learning theory, and it is primarily a two-class classifier [17]."]} +{"36342237|6280485": []} +{"36342237|192934": []} +{"705035|14808716": ["The goal is to find the optimal decision tree by minimizing the generalization error [26]."]} +{"13118104|192934": ["There are parallel, cascading and hierarchical types of classifier combinations [169]."]} +{"35534293|6280485": []} +{"36656897|192934": []} diff --git a/edge/graph_41104565.jsonl b/edge/graph_41104565.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4111957.jsonl b/edge/graph_4111957.jsonl similarity index 100% rename from graph_4111957.jsonl rename to edge/graph_4111957.jsonl diff --git a/edge/graph_41126007.jsonl b/edge/graph_41126007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de424c7b696eb9424ed7533c7e8a14d4a60a2f49 --- /dev/null +++ b/edge/graph_41126007.jsonl @@ -0,0 +1,11 @@ +{"15166744|9045232": ["Yang et al. [18] found that skin color, which is scale-independent and rotation-independent, can greatly reduce computational cost of face detection."]} +{"205398036|9045232": ["The more detailed face detection surveys can be found in [26\u201329]."]} +{"26239345|9045232": ["MB-LBP Fixed to 10 [0,23] [0 ,360 ] Fixed to 0 {4,8,16,24} [1,3]", "Early works (before year 2000) has been well surveyed in [1,2].", "GH [1,9] [0,35] [0 ,360 ] [1,24] Fixed to 0 Fixed to 0", "[1] grouped various methods into four categories: knowledge-based methods, feature invariant methods, template matching methods, and appearance-based methods.", "The population is initialized randomly such that the feature parameters (type, xs, ys, h, width, height, sampling_points, radius) of the particles are initialized with xs, ys 2 [0,23], h 2 [0 ,360 ], and width, height 2 [1,24], whereas type of the feature is set in the range of [1,4] and sampling_points, radius are set to zero, respectively."]} +{"6575064|14970359": []} +{"6575064|9045232": []} +{"15667304|9045232": ["Face detection methods can be grouped into two categories differing as to the processing of prior information [4, 5, 6]."]} +{"17179995|9045232": ["It serves an important role in widely various applications such as surveillance systems, video tracking applications and biometrics [9]."]} +{"16495461|206051485": ["In contrast to other multiview approaches that require many manually labeled images for training, the proposed face constellation requires only a single reference image of a face containing two manually indicated reference points for initialization."]} +{"32930952|359842": []} +{"32930952|16620699": []} +{"54083281|9045232": ["The concept illustrated above may seemed very simple but when we implement it, we may go through some difficulties [4, 5] like scale, rotation, pose, expression, presence or absence of some structural component, occlusion, illumination variation and image condition."]} diff --git a/graph_4114498.jsonl b/edge/graph_4114498.jsonl similarity index 100% rename from graph_4114498.jsonl rename to edge/graph_4114498.jsonl diff --git a/edge/graph_41170198.jsonl b/edge/graph_41170198.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4122595.jsonl b/edge/graph_4122595.jsonl similarity index 100% rename from graph_4122595.jsonl rename to edge/graph_4122595.jsonl diff --git a/edge/graph_41233660.jsonl b/edge/graph_41233660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c986d51ee3739298b9c9a37c82f5b69c5a7afc1 --- /dev/null +++ b/edge/graph_41233660.jsonl @@ -0,0 +1 @@ +{"3069530|192934": ["Although many heuristic search strategies (Jain et al., 2000) can be employed, these gene subset ranking methods are still too computationally expensive."]} diff --git a/edge/graph_41269213.jsonl b/edge/graph_41269213.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41291388.jsonl b/edge/graph_41291388.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b854df26ad99faf2cfb2874c92549c60fea7da90 --- /dev/null +++ b/edge/graph_41291388.jsonl @@ -0,0 +1,2 @@ +{"6498365|14597368": []} +{"10486098|30579357": []} diff --git a/graph_4141324.jsonl b/edge/graph_4141324.jsonl similarity index 100% rename from graph_4141324.jsonl rename to edge/graph_4141324.jsonl diff --git a/edge/graph_41452697.jsonl b/edge/graph_41452697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41456811.jsonl b/edge/graph_41456811.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..790c49de1a4fbc0b3eb674e1105fa3a1d37bcb59 --- /dev/null +++ b/edge/graph_41456811.jsonl @@ -0,0 +1 @@ +{"168687037|13916820": []} diff --git a/edge/graph_41470447.jsonl b/edge/graph_41470447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41479303.jsonl b/edge/graph_41479303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41500402.jsonl b/edge/graph_41500402.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ace75526327599ddcb419ba83f13089638b0d642 --- /dev/null +++ b/edge/graph_41500402.jsonl @@ -0,0 +1,11 @@ +{"4246649|13022232": []} +{"4246649|14205872": ["Katifori et al [15] present a survey of these techniques \nand categorize their character\u00adistics.", "Katifori et al [15] present a survey of these techniques and categorize their characteristics."]} +{"4246649|18986679": ["An information visualization technique requires certain data structures \nto be present."]} +{"15579620|13022232": ["The application is primarily meant for those users who are not pro\ufb01cient in semantic web technologies but are interested in learning, researching, or developing applications speci\ufb01cally on DBpedia.", "3 http://lodvisualization.appspot.com/"]} +{"47216781|29395800": ["A comprehensive survey on different approaches to Semantic Search is given in [23], while in [44] a formal model of ontology-based Information Retrieval in general is presented."]} +{"59628137|17323154": ["Carpineto et al. ( 2009 ) divided clustering algorithms according to their category description methods into three types, i.e. data-centric, description-aware, and description-centric."]} +{"31035729|17133230": ["For example, distortion techniques have been used to highlight a focused entity while preserving the context [14]."]} +{"15992154|386036": []} +{"3187990|191396": []} +{"826468|13022232": ["[6] Aba-Sah Dadzie and Matthew Rowe.", "Some of the tools discussed by Dadzie and Rowe [6] are also discussed in this section.", "Linked Data browsers and integrators \nDadzie and Rowe [6] performed a survey of tools for Linked Data consumption.", "Dadzie and Rowe [6] performed a survey of tools for Linked Data consumption."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} diff --git a/edge/graph_41502497.jsonl b/edge/graph_41502497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21af91ff56e026d14f68636cc7b54f11132b3c23 --- /dev/null +++ b/edge/graph_41502497.jsonl @@ -0,0 +1,34 @@ +{"3743416|1223851": ["Recent surveys on eye fixation prediction can be found in [33]\u2013[35], and salient object detection is surveyed in [36], [37]."]} +{"5274828|192934": ["Nevertheless, dimensionality reduction gives an effective way to avoid the curse of dimensionality [14]."]} +{"14932835|12127129": []} +{"6795574|5972227": ["Recently, a survey is presented for a wired-sensor network, focusing on the capability of methods to give a simple estimation for the position of the object [23]."]} +{"6795574|18546648": ["For instance, in shadow detection [48] pixel level evaluation is advised [49]."]} +{"13586000|10355303": ["Since our concern in this study is the analysis of decentralized strategies for tracking, we won\u2019t describe these approaches further and refer to other recent surveys [17, 5, 1].", "This model is commonly built using appearance (color, texture, gradient, spatio-temporal) or motion features [5]."]} +{"54602508|393948": ["Different from the traditional hand-crafted features [5], [6], [7], a multi-layer neural network architecture can ef\ufb01-ciently capture sophisticated hierarchies describing the raw H. Li is with the School of Computer and Information Engineering, Jiangxi Normal University, Jiangxi, China."]} +{"9177303|7788290": ["Gavrila [2] provides a survey of this work."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"206758376|10355303": []} +{"125624801|17221751": ["The main components of the facial expression recognition (FER) algorithm include the face registration, representation, dimensionality reduction and recognition [2]."]} +{"62054337|14970359": []} +{"62054337|7788290": ["Thorough reviews of human-specific trackers can be found in (Aggarwal & Cai, 1999; Gavrila, 1999; Moselund & Granum, 2001)."]} +{"37165158|10355303": ["Visual target tracking remains as an active research topic in computer vision field as it has been widely applied in numerous applications such as security monitoring, human-computer interaction, video surveillance [23, 34, 50].", "For a comprehensive study of visual target tracking, we refer readers to the survey papers [23, 31, 34, 52], Here, we only review works related to our work, i."]} +{"17411046|10355303": ["arise from changes in illumination, motion blur, deformation and occlusion from surrounding objects [22]."]} +{"17704601|10355303": ["I. INTRODUCTION\nV ISUAL tracking is a fundamental problem in computervision with a wide range of applications."]} +{"16402511|10355303": []} +{"16402511|393948": []} +{"30484317|7788290": [", videos captured by static cameras [1], [2]."]} +{"9510200|393948": ["Patch-based training is the most commonly used approach to learn the convolutional layers\u2019 parameters by means of unsupervised criteria [50].", "Sparsity is among the properties of a good feature representation [48], [50]\u2013[53]."]} +{"1762187|10355303": ["We in this section discuss the tracking methods that are most related to our work, and refer the readers to a thorough review on object tracking survey [33, 59] and benchmark evaluations [50, 58]."]} +{"31977789|4915696": ["The detailed surveys in [6,7] enlighten the progress on this topic in last decades."]} +{"6564374|10355303": []} +{"13028371|10355303": ["We refer the readers to a comprehensive review on visual tracking in [33, 22, 26]."]} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} +{"17651798|191396": ["Based on these observations, we use hierarchical agglomerative clustering [17] on D."]} +{"8046943|10355303": []} +{"19882248|12724190": []} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"28817124|1634674": []} +{"28817124|25699143": []} diff --git a/edge/graph_41505326.jsonl b/edge/graph_41505326.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a1486e50c40676cb8977f5aba6f794ec6b8531b --- /dev/null +++ b/edge/graph_41505326.jsonl @@ -0,0 +1,24 @@ +{"10270124|1634674": ["The long history of automatically recognising gestures from visual or kinematic measurements is reviewed in [23] [32] [31] [2].", "The problems of detecting and recognizing gestures from human body movements captured using videos or 3D skeletal data have been extensively studied in the computer vision and machine learning communities [2, 31, 32, 23]."]} +{"41384697|6387482": []} +{"18533219|1634674": ["It focuses on identifying a person's action or behavior from a single image."]} +{"18533219|7788290": ["A survey on still image based human action recognition\nGuodong Guo n, Alice Lai Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, United States\na r t i c l e i n f o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become an active research topic in computer vision and pattern recognition.", "\u2026o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become\u2026"]} +{"1262156|1634674": []} +{"10751352|16013270": ["Some compositional methods [33, 3] attempt to model activities by representing videos as sequences of \ufb01xed length temporal segments.", "An activity can be considered as a sequence of actions occurred over time [3]."]} +{"6533213|16013270": ["Two very recent examples include [3, 12] and [19]."]} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"18803401|16013270": []} +{"18803401|7185733": []} +{"28817124|1634674": []} +{"28817124|25699143": []} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"30073680|7788290": ["Other taxonomies are based on the distinction between 2D, 3D and recogniti on methods [14] and functional characteristics such as initializa tion, tracking, pose estimation and recognition."]} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} diff --git a/edge/graph_41555272.jsonl b/edge/graph_41555272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c795fe94f861095eb4eca0092a3751fabc03c06 --- /dev/null +++ b/edge/graph_41555272.jsonl @@ -0,0 +1,6 @@ +{"88639874|6104298": []} +{"88639874|16789883": []} +{"14080424|1805048": ["Gap filling\ntechniques, e.g. hierarchical Bayesian approaches or\nfiltering techniques (Shan & Banerjee, 2008; Su &\nKhoshgoftaar, 2009) offer a potential solution."]} +{"109072055|17561208": ["\u2026Turner et al. (2003) presented a review of sensors available for indirect biodiversity monitoring via the derivation of biophysical parameters, and Wang et al. (2010) reviewed spaceborne remote sensing for ecology, biodiversity, and conservation studies, mainly focusing on high-resolution,\u2026", "\u2026such as endogenic forcing (e.g. the birth of new volcanic islands in the oceans, or eruptive activity on land); local, regional, and even global natural hazards; and mass extinction events (e.g. meteorite impacts, forest fires, tsunamis, floods, etc.) (Kataoka et al. 2014; Twitchett 2013;\u2026"]} +{"55209149|16789883": ["Linking multiple platforms across different scales is an active area of research (Joshi et al., 2016) that needs further development before wide implementation by field ecologists and conservation practitioners."]} +{"55209149|6275330": ["WSN have already been successfully used in military, industry, commercial, civil, and healthcare applications (Arampatzis et al., 2005)."]} diff --git a/edge/graph_41559599.jsonl b/edge/graph_41559599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..594a89a9b2aed9fcedfd342375721795deb00caa --- /dev/null +++ b/edge/graph_41559599.jsonl @@ -0,0 +1,7 @@ +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"17607116|25699143": ["Stereo is a well known issue in Computer Vision, to which many articles have been devoted (see [4] for a survey)."]} +{"56853115|3540699": ["264 video coding [10]."]} +{"1716563|1634674": ["[22] reviewed methods to perform this more complex classification of actions and activities."]} +{"8688550|6972141": []} +{"6896735|25699143": ["The review by Dhond and Aggarwal [ 23 ] provides an account of much of this work.", "Feature Matching [8], [11], [ 23 ], [62], [72], [84] Match dependable features rather than intensities themselves.", "of research in the computer vision community through the eighties. Dhond and Aggarwal [ 23 ]"]} +{"124955755|25699143": ["For general yet slightly dated surveys of the stereo literature, see Dhond and Aggarwal [98], and Barnard and Fischler [99]."]} diff --git a/edge/graph_41590596.jsonl b/edge/graph_41590596.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41600841.jsonl b/edge/graph_41600841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2846b3bd9b4546efe2355a0da4b7c411590c20e9 --- /dev/null +++ b/edge/graph_41600841.jsonl @@ -0,0 +1,2 @@ +{"17728293|28178187": []} +{"17728293|239537": ["According to [5], there are three major methods for graph layouting: force-directed, hierarchical and topology-shape-metrics, where the force directed method introduced by [7] is most used today, despite its disadvantageous behavior in interactive systems [14]."]} diff --git a/edge/graph_41601035.jsonl b/edge/graph_41601035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..445ce6c764a7bf0e56135e518829992cff4ea760 --- /dev/null +++ b/edge/graph_41601035.jsonl @@ -0,0 +1,6 @@ +{"6193949|7686677": []} +{"14930776|17872696": ["are given in [56, 57]."]} +{"14930776|205286988": ["A thorough analysis and a discussion of energy-aware routing protocols for wireless sensor networks are given in [58, 59 ]."]} +{"62768650|1230643": []} +{"1840658|8909218": ["Third, we propose an RRM algorithm to improve the EE of a heterogeneous cellular network where macrocells and femtocells [8] share the same\nspectrum in a given geographical area."]} +{"1840658|10658846": []} diff --git a/edge/graph_4161061.jsonl b/edge/graph_4161061.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41641617.jsonl b/edge/graph_41641617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1c95c3d44b79b7af755821c9a9cf3c93b0c43ec --- /dev/null +++ b/edge/graph_41641617.jsonl @@ -0,0 +1 @@ +{"55929104|3054454": ["During the last decade, there have been many studies focusing on single-input-multiple-output (SIMO) radio channel models for evaluation of adaptive antennas at the base station [3]."]} diff --git a/edge/graph_41647588.jsonl b/edge/graph_41647588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c193e09ff389798d90e461eadf27bf0793fd454 --- /dev/null +++ b/edge/graph_41647588.jsonl @@ -0,0 +1,7 @@ +{"29819448|35897447": ["The IT capability literature recognizes that competence in mobilizing and deploying IT-based resources is a source of competitive advantage and differentiates firm performance (Bharadwaj, 2000; Piccoli and Ives, 2005; Wang et al., 2013)."]} +{"59747058|6952653": []} +{"862617|35897447": []} +{"37830588|35897447": []} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/graph_416565.jsonl b/edge/graph_416565.jsonl similarity index 100% rename from graph_416565.jsonl rename to edge/graph_416565.jsonl diff --git a/edge/graph_41690651.jsonl b/edge/graph_41690651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bc98e6f1737a4635089a4f25acafcd82d02225b --- /dev/null +++ b/edge/graph_41690651.jsonl @@ -0,0 +1,2 @@ +{"7220796|15164501": []} +{"42420244|7010908": ["However, the study was designed following guidelines to avoid CMV (King et al ., 2007)."]} diff --git a/edge/graph_41690837.jsonl b/edge/graph_41690837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0edfc2815cb06d706d669519e2e708cc6fd406b5 --- /dev/null +++ b/edge/graph_41690837.jsonl @@ -0,0 +1,3 @@ +{"17404707|6392800": ["Illustration of probability propagation pute signal probabilities in combinational circuits [8]."]} +{"5513952|8022584": ["Stochastic computation has such advantages as computational simplicity, fault tolerance and high speed [17], which, as will be shown, apply to our approach to reliability evaluation."]} +{"12068370|8022584": []} diff --git a/graph_417041.jsonl b/edge/graph_417041.jsonl similarity index 100% rename from graph_417041.jsonl rename to edge/graph_417041.jsonl diff --git a/edge/graph_41720056.jsonl b/edge/graph_41720056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb7111e9782ba4748552b18e066dd19044ca97e7 --- /dev/null +++ b/edge/graph_41720056.jsonl @@ -0,0 +1,15 @@ +{"6498365|14597368": []} +{"34667503|7000090": []} +{"34667503|17917862": []} +{"34667503|14962807": []} +{"34667503|14597368": []} +{"119907489|14597368": ["The maximum order of a DLG(n;a,b) for a given diameter D is 2D2 +2 D + 1 (see [ 4 ]).", "It is a vertex-transitive, double-Hamiltonian, 4-regular graph if either n is odd or n is even and a 4 ])."]} +{"42812791|14597368": []} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"54123103|17233734": []} +{"54123103|14597368": []} +{"17402535|14597368": ["\u2019 The survey paper of Bernard, Comellas, and Hsu [3] is an excellent guide to the literature in this area.", "Again it is hard to be historically accurate here, because different authors have presented results in quite different ways; see the Bermond-Comellas-Hsu survey [3] for more information and references.", "The survey paper of Bernard, Comellas, and Hsu [3] is an excellent guide to the literature in this area.", "Thanks also to Francesc Comellas, for pointing us to the existing literature on directed loop networks (in particular, the very useful survey paper of Bermond, Comellas, and Hsu [3]), and to Alexander Hulpke for discussions on automorphisms of Abelian groups.", "[23]; the Bermond-Comellas-Hsu survey [3] has many additional references."]} +{"17402535|10953815": [" The most extreme version of this would be to make all of the generators have order 2. This then becomes precisely the covering radius problem for binary linear codes; see the surveys by Cohen et al. [8,9] for more on this problem. The resulting graphs would be hypercubes with additional diagonal connections to reduce the diameter. Conclusions. We have shown that one can construct Cayley graphs of Abel"]} +{"118285220|14597368": ["For n = 3, the authors in [6] and Delorme (private communication in [ 2 ])) found a dense infinite family of circulant graphs with diameter smaller than or equal to d 2 3, where"]} +{"10486098|30579357": []} diff --git a/graph_417250.jsonl b/edge/graph_417250.jsonl similarity index 100% rename from graph_417250.jsonl rename to edge/graph_417250.jsonl diff --git a/edge/graph_41729130.jsonl b/edge/graph_41729130.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0ff3ba918d49bd13ae63efd6680d48b16a6c87f --- /dev/null +++ b/edge/graph_41729130.jsonl @@ -0,0 +1 @@ +{"20987030|17774971": ["Thus, the use of MCs has become increasingly popular recently in various industrial high power applications such as laminators, mills, conveyors, fans, and pumps [1] - [2].", "It comprises of multiple modified H \u2013 Bridge modules which are MCs themselves.", "Some converter topologies have been proposed to solve this issue with the development of three phase IPT systems [11] \u2013 [15] and MCs [3] \u2013 [6].", "Three well-known MC topologies are, neutral point \u2013 clamped (NPC), flying capacitor (FC) and cascaded MCs [1].", "Advantages of the proposed MCs can be summarized as follows,\nHigher power scalability."]} diff --git a/edge/graph_41762158.jsonl b/edge/graph_41762158.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41768464.jsonl b/edge/graph_41768464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77ac99e343e95fcf4e530b001926aa1823227c72 --- /dev/null +++ b/edge/graph_41768464.jsonl @@ -0,0 +1 @@ +{"15454576|8649087": ["Two groups of technologies have been identified with the purpose of discouraging unauthorized consumption and duplication: encryption and watermarking [ 1 ,2,3]."]} diff --git a/edge/graph_41797033.jsonl b/edge/graph_41797033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a8c9de3d0815e993ae8dfed0cb6eedd258b3275 --- /dev/null +++ b/edge/graph_41797033.jsonl @@ -0,0 +1,2 @@ +{"5732144|2294541": []} +{"6026913|954543": []} diff --git a/edge/graph_41801356.jsonl b/edge/graph_41801356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a80879e4663df6f5a9cc890ddc422116aa62f6b --- /dev/null +++ b/edge/graph_41801356.jsonl @@ -0,0 +1,5 @@ +{"14463006|10500613": ["Several approaches have been proposed to solve these issues without modifying existing services, e.g. approaches listed in [6][10][ 14 ]."]} +{"9139909|18795064": ["We have taken a role based approach to model social interactions as it has been evaluated as being very useful in modelling entities, their relationships, functions and interactions [17].", "Among many different approaches to the design of role-based software systems using agent paradigm (see [17] for a survey), ROAD brings a number of design principle that support flexible management and runtime adaptations, which has also been recognized and appreciated in [24]."]} +{"9139909|6742930": ["Roles, in different variations, have been applied in many fields such as computer supported collaborative works, role based access control, multi-agent systems, and object modelling [12]."]} +{"38732360|6159806": ["\u2026and industrial consortia have already proposed multiple solutions for web services composition and execution both in domain-independent contexts (Dustdar and Schreiner, 2005; Agarwal et al., 2004; Milanovic and Malek, 2004; Ko and Neches, 2003) and in the geospatial domain in particular\u2026"]} +{"16838984|9504064": []} diff --git a/graph_4182744.jsonl b/edge/graph_4182744.jsonl similarity index 100% rename from graph_4182744.jsonl rename to edge/graph_4182744.jsonl diff --git a/edge/graph_41878962.jsonl b/edge/graph_41878962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41883163.jsonl b/edge/graph_41883163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41901402.jsonl b/edge/graph_41901402.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fb37e4f0b4893c222c650edb040ee92c06b22f1 --- /dev/null +++ b/edge/graph_41901402.jsonl @@ -0,0 +1,3 @@ +{"17683419|1230643": ["Sensor networks, usually composed of a few sinks and a large quantity of inexpensive and small sensor nodes, have been deployed in a variety of applications [5] such as habitat monitoring [14], forest fire detection, etc."]} +{"8975301|1236072": ["Unfortunately, the\nlow-power multi-hop communications often employed in a WSAN are inherently unreliable; frequent sensor failures and excessive delays due to congestion or in-network data aggregation further aggravate the problem."]} +{"8975301|1230643": []} diff --git a/edge/graph_41907762.jsonl b/edge/graph_41907762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e5776dbee0f827160e8f0541d34a0cf9ebbb75a --- /dev/null +++ b/edge/graph_41907762.jsonl @@ -0,0 +1,63 @@ +{"13416245|15300368": []} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} +{"16076996|41998167": ["IN WMSN S This section presents relevant techniques for the support of Real-time Multimedia Monitoring apllications at the protocol stack level at the MAC layer and above.", "However, due to the limitations introduced by current visual sensor architectures, it is imperative to optimize every stage in the analysis process."]} +{"16076996|15947359": ["In the following, the distinctive characteristics of both application scenarios are commented, clearly highlighting the main reference application \ufb01elds and the consequent system\u2019s level requirements."]} +{"16076996|3540699": ["264/AVC ([2]), which provides very good ratedistortion performance due to the use of advanced techniques, such as spatial prediction for intra coding, multiple reference frames motion compensation, variable block-size intra/inter"]} +{"12554839|15947359": ["Image Prioritization, WSN, WMSN.\nI. INTRODUCTION\nIn WMSN, communication is limited by restrictive factors such as high bandwidth demand, severe energy constraints and application specific QoS requirements [1], [2], [17]."]} +{"8423295|6275330": ["Nowadays, WSNs support an ever growing variety of applications including environment and habitat monitoring, surveillance and reconnaissance, home automation, biomedical applications, object tracking, traffic control, fire detection, inventory control, agriculture, machine failure diagnosis and energy management [1\u20137]."]} +{"8423295|205286988": []} +{"8423295|1236072": []} +{"14480362|1230643": ["The main features of WSNs that impose some limitation on WSNs and make it different from other networks are [11, 12] resource constraints, traffic characteristics, small message size, sensor location and redundancy of data, network lifetime, time to partition, addressing schemes, density of nodes, maintainability, node deployment, energy consideration, miscellaneous applications, power consumption constrains for nodes using batteries, ability to cope with node failures, mobility of nodes, dynamic network topology, communication failures, heterogeneity of nodes, ability to withstand harsh environmental conditions, ease of use, and unattended operation.", "Generally a metric is defined as a measure for quantitatively assessing process, event, or institution, using different procedures to carry out measurements and the procedures for the interpretation of the assessment, leveraging previous assessments [12]."]} +{"1674310|2295142": ["Multipath route can make full use of the current network resources and provide sufficient bandwidth for multimedia as much as possible, so it becomes one of the hottest topics about WMSN to be researched [2]."]} +{"35871405|6275330": []} +{"35871405|205286988": []} +{"35871405|1236072": []} +{"35871405|3540699": []} +{"35871405|1230643": []} +{"17012697|17428811": ["The tools of the EvalVid framework are continuously extended to support other video codecs as H.263, H.26L and H.264 and to address additional codec functionalities like fine grained scalability (FGS) [ 13 ] and intra frame resy nchronisation."]} +{"11042750|18469839": ["[55] reviewed the most important hardware components, architecture and protocol stack in each WMSNs layer and its role in achieving the goals of these network."]} +{"8062254|16219347": []} +{"1605753|205286988": []} +{"1605753|1236072": ["Routing protocols [3] in WSNs can be classified according to the network structure, protocol operation, how routing information is acquired and maintained."]} +{"1605753|1230643": ["Introduction Wireless Sensor Networks [1] are composed of small devices, called sensor nodes, which cooperate to forward collected data to a sink node that either", "Wireless Sensor Networks [1] are composed of small devices, called sensor nodes, which cooperate to forward collected data to a sink node that either\n\u2217Corresponding author at: INESC-ID/Instituto Superior Te\u0301cnico, Universidade de Lisboa, Rua Alves Redol, no 9, 1000-029 Lisboa, Portugal."]} +{"18994532|205286988": ["A good survey of routing techniques in WSN is provided in [12]."]} +{"14051552|1230643": ["Commonly, WSNs routing protocol are established based on min hops, max available power and low latency, low traffic load, multipath establishment etc [3] [4] [5].", "A balanced factor among these two (Meta data and cost function) determines the route [3].", "Real time and Energy Aware QoS Routing Protocol for Multimedia Wireless Sensor Networks (REAR) [3] considers bandwidth and energy requirements as core metrics for discovering routes."]} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"9199492|18643817": ["\u2026protocols, and techniques have been done in the last few years to deliver multimedia content over large-scale networks, such as single-hop wired LANs (e.g., [3], [4]), multi-hop wired LANs (e.g., [5]), ATM (e.g., [6], [7]), mobile adhoc networks(e.g., [8], [9]) and the Internet (e.g., [10]\u2013 [14])."]} +{"9199492|14088590": []} +{"9199492|12817488": []} +{"9199492|1236072": ["For example, some applications might require a diverse mixture of sensors for monitoring temperature, pressure, and humidity of the surrounding environment, detecting motion via acoustic signatures, and capturing images or video tracking of moving objects [24]."]} +{"9199492|1230643": ["Although plethora of works on surveying architecture, applications and communication protocols for wireless sensor networks are performed beforehand [1], [15]\u2013[20], this survey is distinguished from the previous efforts in that it pioneers to investigate those routing techniques which address application-specific QoS as well as energy efficiency for WMSNs.", "[15], [34], [35], [36], [39], [40], [41], [42] Hard Real-time Bounded"]} +{"205458526|3540699": []} +{"2662934|1236072": ["A comprehensive survey of routing protocols in WSN has been presented in [4]."]} +{"2662934|1230643": ["In this context, the vision of ubiquitous Wireless Multimedia Sensor Networks (WMSNs) [1][2][3] has become a reality."]} +{"5516271|1236072": ["Each sensor node is supported by mandatory components\u2014sensing, processing, and transmission units\u2014and optional components [2, 3 ].", "This fashion is commonly used in most routing protocols at initial establishment of the path [ 3 ,15]."]} +{"670285|1230643": ["Recent advances in micro-electro-mechanical systems (MEMS) and low power and highly integrated digital electronics have led to the development of micro sensors [1,9,17,21,22,24,27].", "Each sensor node i will calculate its r-value ri by using d as follows: From [1],", "using the approaches presented in [1,3].", "Then d will be calculated as follows:\nd = Trequired\u2211 \u2200i\u2208Path ( pi + \u2211qi j=1 p j ) \u2217 \u03bbRT (4) Each sensor node i will calculate its r-value ri by using d as follows:\nFrom [1],\nd = 1 ri\u00b5 \u2212 \u03bbRT \u2217 ( pi + \u2211qi j=1 p j ) ri = 1\nd \u2217 \u00b5 + \u03bbRT \u00b5 \u2217\n( pi +\nqi\u2211 j=1 p j\n) (5)\nThen the problem will be to maximize the total throughput on each particular path:\nMax ( \u2211 \u2200i\u2208Path (1 \u2212 ri ) ) where 0 \u2264 ri < 1."]} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} +{"5172416|270804": ["However, these traditional transport protocols cannot be directly implemented over wireless sensor network [6, 49] because WSN in general and WMSN in particular have their distinctive features, which make them different than typical Internet network, and they have very wide range of applications that need special requirements."]} +{"5172416|1236072": ["The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"5172416|1230643": ["WSNs are becoming more low-cost, low-power, multi-functional, and viable due to the advances in micro-electro-mechanical systems (MEMS), low power and highly integrated digital electronics, and proliferation of wireless communications [1].", "The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"19860806|16219347": ["To reduce the data rate requirements, Distributed Video Coding (DVC), the low complexity image compression algorithm is highly advocated for resource constrained WMSN [5, 8]\u2013[10]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"6275330|1230643": ["Other applications of wireless sensors to healthcare that have been proposed include tracking and monitoring doctors and patients, or tracking drug usage inside hospitals [36]."]} +{"15154967|205286988": ["Some protocols provide required reliability in the network layer such as Sequential Assignment Routing (SAR) [ 16 ], AFS [17] and ReInforM [18]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"46505001|1236072": ["Data centric protocols are a major part in different routing protocols in wireless sensor networks [7]."]} +{"46505001|1230643": ["Many successful routing protocols are presented for WSNs and WMSNs hitherto.", "Depending on their application, the delay parameter has different importance for WMSNs [4].", "But with respect to the fact that WMSNs are a subset of WSNs, parameters are more commensurate with WMSN.\nDepending on their application, the delay parameter has different importance for WMSNs [4]."]} +{"36352732|1236072": ["[4] provides a good summary of some of them such as rumor routing [5], minimum cost forwarding algorithm (MCFA) [6], gradient based routing (GBR) [7], information-driven sensor querying (IDSQ) [8], constrained anisotropic diffusion routing (CADR), COUGAR, ACQUIRE, Energy Aware Routing and Routing protocol with random walks [9]."]} +{"36352732|1230643": []} +{"36432451|29997805": ["There are many surveys reported in the literature [2, 18, 20, 24\u201327], but almost all of them focus on routing and related issues or security."]} +{"36432451|5404353": ["Costa and Guedes [28] survey the studies on cross-layerbased techniques proposed for WMSNs and the benefits of using cross-layer designs in resource-constrained WMSNs.", "Costa and Guedes [28] survey the studies on cross-layerbased techniques proposed for WMSNs and the benefits of using cross-layer designs in resource-constrained WMSNs. Almalkawi et al. [29] present the status and current challenges of studies on multimedia communication in WSNs."]} +{"36432451|7889189": ["requirements [21\u201323]."]} +{"36432451|1940388": ["In [34], the current security mechanisms for WSNs and the various types of attacks are discussed along with their countermeasures."]} +{"36432451|17205659": ["Table 2: The possible attack types in the network layer [3]."]} diff --git a/edge/graph_41923574.jsonl b/edge/graph_41923574.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41931611.jsonl b/edge/graph_41931611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64b55e542d8fec66b8fe7e36e509bbfbb7a88cc4 --- /dev/null +++ b/edge/graph_41931611.jsonl @@ -0,0 +1,3 @@ +{"15199849|1940388": []} +{"15199849|17205659": ["Attacks in sensor networks do not just involve the alteration of packets; adversaries can also inject additional false packets [14]."]} +{"17724290|6670217": ["A Adaware 2 nonprofit) 22 nonprofit) [l0] Dutch Worm Geinimi Trojan 4 5EUl'o 18 Pm'acy.", "The smartphones starts gradually to replace the Personal Computers (PCs) [1].", "Moreover, the growing of the mal ware numbers is huge and is predicated to continue in growing [20] [28] [2] [29].", "Smartphones are able to facilitate lots of services to the user like those available in the traditional PCs [20].", "Ery (Yxe) Worm [20] 3 iSAM Multifarious I ZeuSMitMo"]} diff --git a/graph_4195173.jsonl b/edge/graph_4195173.jsonl similarity index 100% rename from graph_4195173.jsonl rename to edge/graph_4195173.jsonl diff --git a/edge/graph_41972779.jsonl b/edge/graph_41972779.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_41998167.jsonl b/edge/graph_41998167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7093ade287c449b3159645b333f185253cc70f54 --- /dev/null +++ b/edge/graph_41998167.jsonl @@ -0,0 +1,25 @@ +{"3260095|1230643": ["tiple sensor nodes observing a physical phenomenon [1]."]} +{"195707747|8070893": []} +{"195707747|17428811": []} +{"2568892|1230643": ["WSN have been envisioned to have a wide range of applications in both military as well as civilian domains [ 1 ][2] such as battlefield surveillance, machine failure diagnosis, and chemical detection."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"62528177|15040462": []} +{"8887289|1230643": []} +{"28207887|10559330": ["Medium access schemes that aim to provide hard QoS guarantees follow the paradigm of algorithms and scheduling techniques developed within the framework of integrated services (IntServ) [ 5 ]."]} +{"6820964|6959212": []} +{"13416245|15300368": []} +{"7179731|1230643": ["SAR: Sequential Assignment Routing (SAR) is the first protocol for sensor networks that includes a notion of QoS in its routing decisions [1][5].", "Recent technological breakthroughs in ultra-high integration and low-power electronics have enabled the development of tiny battery-operated sensors [1-4]."]} +{"1940380|1230643": []} +{"2619657|1230643": ["There exist exhaustive amount of research to enable efficient communication in wireless sensor networks (WSNs) [1]."]} +{"10492569|1230643": ["Sensor networks have been predicted to have a wide range of applications in both civilian and military domains [1]."]} +{"14198629|141053": ["There has been intensive research on MAC protocols for ad hoc [13] and wireless terrestrial sensor networks [14] in the last decade."]} +{"15165106|1236072": []} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"62745210|1230643": ["networks (WSNs) leads to numerous great challenges [1] offering a new environment to work on distributed systems."]} +{"16247004|1230643": ["In a WSN (Wireless Sensor Network) a group of nodes communicate environmental data to a central device, called sink [1]."]} +{"14811849|10287248": ["There are two categories of multipath routing [ 4 ]."]} diff --git a/edge/graph_42022308.jsonl b/edge/graph_42022308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f9fccf06d24a7bab22442efcc9afb0fd4ac6042 --- /dev/null +++ b/edge/graph_42022308.jsonl @@ -0,0 +1,7 @@ +{"5092943|9862516": []} +{"936799|1708582": ["Many standard reinforcement learning techniques can be used to solve the optimization problem discussed above [21], [22], [23]."]} +{"109505520|5660618": ["A comprehensive survey of the current results in networked control systems has been carried out in [21]."]} +{"109505520|6327434": ["A lot of literature deals with failure detectors in dynamic systems (Willsky (1976)).", "Several failure-detection schemes in dynamic systems are reviewed in [11]."]} +{"7086577|485843": ["However, from a communication perspective, existing power grid networks suffer from several drawbacks [2], such as: (i) fragemented architectures, (ii) a lack of adequate bandwidth for two-way communications, (iii) a lack of inter-operability between system components, and (iv) the inability to handle increasing amount of data from smart devices.", "In the context of such smart grid applications, some examples of communication requirements and performance metrics are [2], [4]:"]} +{"12579298|36784649": ["ONE-CLASS CLASSIFICATION In binary and multiclass classification problems, the decision boundary of the classifier is supported by the presence of samples from each class, and the associated algorithms are designed to classify any sample into one of the several predefined classes [26].", "In industrial systems, the majority of the available data designates the normal functional mode, and it is very difficult to acquire data related to malfunctioning or critical states [26]."]} +{"10832470|6076208": ["Alternatives for different mappings of ICT functionality can greatly improve the performance of a system, as demonstrated by the research activities for architecture deployment optimization [7], [8]."]} diff --git a/edge/graph_42026616.jsonl b/edge/graph_42026616.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42028955.jsonl b/edge/graph_42028955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42056992.jsonl b/edge/graph_42056992.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc3a3d92c07f3bb2f3bc707f7bfe39acb8ba31f1 --- /dev/null +++ b/edge/graph_42056992.jsonl @@ -0,0 +1,2 @@ +{"53666064|4962939": ["According to a literature study presented in [41], different AI techniques have been applied in the clinical DSSs such as 1) rule-based reasoning [3, 4 and 8], 2) bayesian theory [9], 3) bayesian belief networks [30], 4) heuristic, 5) semantic network, 6) neural networks [10], 7) genetic algorithms [35] 7) fuzzy logic [3, 9] and 8) case-based reasoning."]} +{"37151882|5342321": []} diff --git a/edge/graph_42064508.jsonl b/edge/graph_42064508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08b6548acc0e51a23d271b4c1dab934b3e27c059 --- /dev/null +++ b/edge/graph_42064508.jsonl @@ -0,0 +1,10 @@ +{"1222967|6952653": []} +{"6159806|116542": []} +{"907987|9123526": ["The work presented here is cast in terms of FOL, not in terms of one of the typical Semantic Web languages such as OWL [8] nor more specifically in terms of a semantic Web service ontology such as OWL-S [9], WSMO [10] or SWSO [11]."]} +{"2161139|1708582": ["Some methods (e.g., Moriarty et al., 1999) search through the space of the policies directly, whereas others (e.g., Kaelbling et al., 1996) estimate value functions for state-action pairs.", "Since a typical problem involves many objects and each state has many possible actions, search can be very expensive in this domain and manually coding the knowledge base is challenging."]} +{"40905653|17827658": ["A survey on CSP techniques used in the context of planning and scheduling is presented in [Bart\u00e1k et al., 2010]."]} +{"40905653|6159806": ["Planning approaches are discussed along with other approaches such as workflow management in [Srivastava and Koehler, 2003; Rao and Su, 2004; Dustdar and Schreiner, 2005; Alamri et al., 2006; Eid et al., 2008]."]} +{"15970697|9123526": []} +{"15970697|7839197": ["Suppose you want an automated software agent [60] to solve problems such as the following:"]} +{"7426414|6607209": ["For instance [10] has proposed a market-based approach where and/or trees of tasks are exchanged between agents."]} +{"6035800|7120308": ["Since solving a planning problem is a computationally expensive task [15], we perform a set of tests to ensure that our proposed solution remains practically useful for larger environments.", "The next formal definitions follow the state-based HTN planning approach of [15]."]} diff --git a/edge/graph_42091061.jsonl b/edge/graph_42091061.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42234300.jsonl b/edge/graph_42234300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..522fefe63153c12612200f339169ac0278c29c6b --- /dev/null +++ b/edge/graph_42234300.jsonl @@ -0,0 +1,7 @@ +{"3631487|627405": []} +{"6648528|70923": ["This decision took place because we are interested in enabling an agent oriented software engineering methodology to model security, rather than creating one more methodology on the (already) large amount of existing ones [13,17,20,21,42,44].", "In general, developers of agent oriented methodologies have neglected security and although the agent oriented software engineering is progressing rapidly and many agent oriented methodologies [13, 17, 20, 21, 42, 44] have developed during the last few years; agent oriented software engineering practices and methodologies do not meet the needs for resolving the security related problems, and fail to provide evidence of successfully integrating security concerns.", "AOSE introduces an alternative approach in analysing and designing complex distributed computerised systems [24, 43, 21], according to which a complex computerised system is viewed as a multiagent system [43], in which a collection of autonomous software agents (subsystems) interact with each other in order to satisfy their design objectives."]} +{"12693499|10824066": ["Haley and his colleagues suggest artifacts that are probably too complex for regular developers [33].", "The observation 1 is shown in Table 1, with different tasks from [33], to analyze each method, for definitions and objectives to Security Requirements."]} +{"11939318|10824066": ["In [35] and [ 36 ], the authors provide two short surveys of security requirements engineering methods, but the analysis in both articles is limited in scope and in detail."]} +{"15702904|627405": ["Our literature search must also be quality controlled using a systematic procedure, such as the ones suggested in [11,13]."]} +{"15702904|10824066": ["We propose to compare SRE initiatives based on the synthesis of the task types in [1,6,8]: security objectives; identification and modelling of assets, vulnerabilities and threats; elicitation and analysis of SRs; specification, documentation of SRs; verification and validation.", "identification and modelling as well as elicitation and analysis, based on the analysis in [1,6]) might be a good idea.", "surveyed techniques for eliciting security requirements in 2008, in [1].", "The papers [5, 1, 6] offer classifications of the tasks while [8] additionally to that identifies 23 activities of the SRE process.", "[1] aims at a lightweight approach in its suggestion thus it misses a task (the last) which is present in [6] with a more general view, though [6] also misses the first task of [1].", "focus on the tasks recommended in the requirements phase by the selected techniques [1]."]} +{"9948540|16378248": ["A classification of transformation approaches is reported in [12, 13], along with a high-level discussion on pros and cons of each type of transformation approaches.", "This is perhaps because in order to support traceability, a mechanism should be proposed to establish and maintain explicit 5 In [12, 13], patterns are considered as one type of transformation rules.", "For rulebased and pattern-based transformation approaches, as indicated in [12, 13], transformation rules(5) should clearly specify, for example, their application domains, parameters, application constraints, and directions.", "A quite exhaustive list of such tools and languages can be found in [13]."]} diff --git a/graph_422375.jsonl b/edge/graph_422375.jsonl similarity index 100% rename from graph_422375.jsonl rename to edge/graph_422375.jsonl diff --git a/edge/graph_42261339.jsonl b/edge/graph_42261339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42267553.jsonl b/edge/graph_42267553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42279552.jsonl b/edge/graph_42279552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42308615.jsonl b/edge/graph_42308615.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4231727.jsonl b/edge/graph_4231727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42320372.jsonl b/edge/graph_42320372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4232203.jsonl b/edge/graph_4232203.jsonl similarity index 100% rename from graph_4232203.jsonl rename to edge/graph_4232203.jsonl diff --git a/graph_423292.jsonl b/edge/graph_423292.jsonl similarity index 100% rename from graph_423292.jsonl rename to edge/graph_423292.jsonl diff --git a/edge/graph_423305.jsonl b/edge/graph_423305.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42347181.jsonl b/edge/graph_42347181.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d5be25915231c720dac9410619399f4e06a3cb0 --- /dev/null +++ b/edge/graph_42347181.jsonl @@ -0,0 +1,9 @@ +{"9585967|2835258": ["There is no need to transmit routing messages to update route states either [6].", "This undesirable phenomenon, called a communications void, is often also referred to as local maximum phenomenon [6] or local minimum phenomenon [13].", "Various greedy-forwarding algorithms [6] differ in the optimization criterion that is applied in the selection of a next-hop node.", "Geographic routing [6] usually consists of two main elements: a location service and a geographic forwarding strategy."]} +{"6658893|870434": []} +{"10283322|870434": []} +{"1726234|870434": ["Besides the unavailability of GPS, 3D localization becomes even more challenging due to the economically driven sparseness of USN deployments [12] and the unavailability of sufficient numbers of underwater beacons.", "We consider 3D USNs where relatively stationary nodes [12] are randomly distributed throughout an oceanic medium, with at least three anchor nodes included in the", "This is an important characteristic given the sparse nature of USN deployments [12].", "Practical issues such as economics suggest that the sensors will be sparsely deployed [12].", "All these ranging methods require a sensor to interrogate multiple surface buoys, an action that contributes to network throughput degradation because localization information and application communication share the same underwater channel [12]."]} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"25033620|870434": ["Recently, much research on underwater wireless sensor networks (UWSNs) has been performed to support practical applications such as underwater tactical surveillance, undersea exploration, underwater disaster prevention, seismic monitoring, etc [1][2][ 3 ]."]} +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"123310|870434": []} diff --git a/edge/graph_42362458.jsonl b/edge/graph_42362458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4236971.jsonl b/edge/graph_4236971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42377783.jsonl b/edge/graph_42377783.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44638ea706afadf726be061a92708209a071be70 --- /dev/null +++ b/edge/graph_42377783.jsonl @@ -0,0 +1,17 @@ +{"5620843|15174674": ["The load distribution problem in robotic manipulation tasks can be considered as a control allocation problem for an overactuated mechanical system [1]."]} +{"25441622|1708582": ["b) Action selection strategy: usually the next action selection in reinforcement learning is based on the Boltzmann action selection strategy [39] or the maximum Q-value [14], [38].", "In the second phase, the action selection is based on the maximum Q-value approach [14], [38]."]} +{"3649953|13526777": ["In contrast with conventional numerical methods, the efficiency of the recurrent neural network does not decrease when the size of the optimization problem increases [21]\u2013[23], [26]."]} +{"1581354|1797913": []} +{"468992|1708582": ["RL has been intensively studied in the single robot case where an elegant and unified mathematical framework has been developed (Kaelbling et al. 1996; Sutton and Barto 1998).", "We first introduce reinforcement learning (Kaelbling et al. 1996; Sutton and Barto 1998) and we identify the key challenges in the application of the methods developed for reinforcement learning to swarm robotics.", "For a more formal introduction and more details about RL, the interested reader can refer to Kaelbling et al. (1996)."]} +{"468992|8767649": ["In this review, we use these characteristics to discriminate between the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al., 2001).", "In this review, we use these characteristics to discriminate the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al. 2001).", "replicate the behavior observed in cockroaches by Jeanson et al. (2005). The robots are able to collectively aggregate in a circular arena using a PFSM approach."]} +{"20456726|468992": ["Communication can be generally split into two different categories, these being direct and indirect communication [13, 21].", "Formation control involves agents trying to hold a geometrical shape in their environment[8] by deploying the agents in a regular and repetitive manner[13]."]} +{"20456726|9588126": ["Formation tracking is generally considered the harder of the two to implement[8].", "Formation control involves agents trying to hold a geometrical shape in their environment[8] by deploying the agents in a regular and repetitive manner[13].", "When there is a directed path present between every agent, the directed graph is said to be strongly connected [7-10].", "information from the agent , but not necessarily the other way around [7-12].", "The standard equation to reach consensus using a continuous time model can be described by [7-9, 11, 12]: (1)"]} +{"17332078|8767649": []} +{"26375007|16280711": ["The necessity for more powerful intelligent agents that can interact with human operators in increasingly sophisticated ways will require that current capabilities be augmented with techniques and technologies that facilitate effective H-A team interactions [24], [47]."]} +{"26375007|192934": ["These reasons imply that many data mining classification algorithms lack efficiency or even fail in high-dimensional microarray data analysis [4].", "The intrinsic dimension of high-dimensional feature space showed that there is often a low-dimensional structure embedded in the feature space of high-dimensional data [4]."]} +{"10878315|6607209": ["In domains where fully centralized approaches are feasible, market-based approaches can bemore complex to implement, and can produce poorer solutions [45].", "Also, when fully distributed approaches suffice, market-approaches can be unnecessarily complex in design and can require excessive communication and computation [45]."]} +{"10878315|562855": ["The advantages of this type include the reduction of duplication of effort, resources, and increased savings of cost and time [29].", "Decentralization is the process of dispersing the administrative tasks and authorities between the agents of the multi-agent system [29]."]} +{"61299428|6607209": []} +{"1503576|9588126": []} +{"1503576|6607209": []} +{"10001032|6607209": []} diff --git a/edge/graph_42420797.jsonl b/edge/graph_42420797.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef2d6c6e961f8d0e307fa0c02bb1fbcfb0f2b80a --- /dev/null +++ b/edge/graph_42420797.jsonl @@ -0,0 +1,6 @@ +{"27525950|10859599": []} +{"4371834|12601073": ["Therefore, spectrum sensing is a crucial issue for CR [4], [5], and we consider the overlay mode in this paper."]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} diff --git a/edge/graph_42449870.jsonl b/edge/graph_42449870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddd4d04aeeba4e01a16a06f66051336380f92b0b --- /dev/null +++ b/edge/graph_42449870.jsonl @@ -0,0 +1,5 @@ +{"2057096|17109970": ["A recent summary on game theoretical approaches used for energy efficient resource allocation in wireless networks can be found in [ 9 ].", "Thus, these schemes are essentially similar to the power control schemes in traditional wireless networks [ 9 ]."]} +{"13825136|17062686": []} +{"29029622|12452682": ["Cooperation among SUs has been proved to be beneficial in solving such conflicting interests [23]."]} +{"11323150|2509135": []} +{"37563285|14441987": ["Because the size of the control packets are \ufb01xed, the communication complexity of AODV for postfailure is also O ( n ) [12].", "In the AODV protocol, using the worst case complexity approach, the time complexity for route discovery is O ( n ) and that for postfailure is O ( n ) as well [12]."]} diff --git a/edge/graph_42459080.jsonl b/edge/graph_42459080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9f8caa3387372a93d9cd8e552e9562c95fb16be --- /dev/null +++ b/edge/graph_42459080.jsonl @@ -0,0 +1,8 @@ +{"37129669|1097238": ["Static ensemble selection attempts to select the \u2018\u2018best\u2019\u2019 classifiers from the pool based on various diversity measures [40,41], prior to combining their results.", "Since diversity measures and the creation of diverse ensembles are not yet well defined in literature [41,56], one can simply combine the responses of HMMs trained using a wide range of states to have an upper bound on performance."]} +{"62602293|1097238": ["A theoretical account of why and when ensembles perform better than single individuals was presented in [12], [51].", "For example, using speciation to create and maintain diversity [15] had inspired the development of negative correlation learning for ANN ensembles [33], [34] and an in-depth study of diversity in ensembles [12], [51]."]} +{"62602293|6555395": ["However, other algorithms [7] can also be used."]} +{"14618918|1097238": ["The experiments are conducted on both synthetically generated data and sendmail data from the University of New Mexico (UNM) data sets1 [1].", "All rights reserved."]} +{"1632078|192934": ["In particular this holds if the feature spaces are different, but also combinations of classifiers trained in the same feature space by the same training set may show improved results [5,12]."]} +{"17560001|1097238": []} +{"2976898|1097238": []} +{"638368|5473785": ["Although some of these algorithms can give good results on some benchmark data sets, there are still several problems such as node ordering requirement, lack of efficiency and lack of publicly available learning tools (Neapolitan, 1990)."]} diff --git a/edge/graph_42497499.jsonl b/edge/graph_42497499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..caa4837faa5bcc2562806a345ed748ab146c82c5 --- /dev/null +++ b/edge/graph_42497499.jsonl @@ -0,0 +1,5 @@ +{"16666964|20905429": ["The authors in [5], [6] provide extensive WBAN-related literature reviews."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"15676223|7988320": ["We derive numerical approximations valid for all types of frequency bands and data rates, however, the parameters for each frequency band are different."]} +{"18329356|7988320": []} +{"7854020|7988320": []} diff --git a/edge/graph_42515031.jsonl b/edge/graph_42515031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42521924.jsonl b/edge/graph_42521924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42542330.jsonl b/edge/graph_42542330.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42558961.jsonl b/edge/graph_42558961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10672fa9342933fa28ecce160cbb33a65057701d --- /dev/null +++ b/edge/graph_42558961.jsonl @@ -0,0 +1 @@ +{"51769686|18418184": []} diff --git a/edge/graph_42580806.jsonl b/edge/graph_42580806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b70c3746805b0e2f72d0e8345333d4753527508 --- /dev/null +++ b/edge/graph_42580806.jsonl @@ -0,0 +1,8 @@ +{"545853|6604384": []} +{"545853|11894197": []} +{"37533815|1708582": []} +{"669378|14047190": ["A partial list includes Anthony and Bartlett [2], Breiman, Friedman, Olshen, and Stone [3], Devroye, Gy\u007f or, and Lugosi [4], Duda and Hart [5], Fukunaga [6], Kearns and Vazirani [7], Kulkarni, Lugosi, and Venkatesh [ 8 ], Lugosi [9], McLachlan [10], Mendelson [11], Natarajan [12], Vapnik [13, 14, 1], and Vapnik and Chervonenkis [15]."]} +{"15631423|3330313": ["A number of surveys, review articles and books especially Hodge and Austin [12], cover outlier detection techniques in machine learning and statistical domains."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} diff --git a/edge/graph_42588180.jsonl b/edge/graph_42588180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4261497.jsonl b/edge/graph_4261497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_42645.jsonl b/edge/graph_42645.jsonl similarity index 100% rename from graph_42645.jsonl rename to edge/graph_42645.jsonl diff --git a/edge/graph_42648222.jsonl b/edge/graph_42648222.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..712c9ec9db364dbb594684a4811c4b252330a63a --- /dev/null +++ b/edge/graph_42648222.jsonl @@ -0,0 +1,14 @@ +{"12705753|13726263": [", f\u0304m(I) are pruned if Equation 1 and Equation 2 hold [31]."]} +{"20385562|14970359": ["Traditional part-based representation of the human body divides into four forms: blob, silhouette, box and point (more details can be found in a recent survey (Moeslund and Granum 2001; Moeslund et al. 2006)."]} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"13251604|38476": ["In the sequential supervised learning problem [23], our task is to construct a hypothesis (or classifier) h from a training set that contains a set of labeled sequences."]} +{"15395523|1634674": ["More recently, Turaga et al. [9] and Aggarwal et al. [31] present surveys focusing on highlevel representation of complex activities and corresponding recognition techniques."]} +{"15395523|20905429": ["Over the past decade, sensor technologies, especially low-power, low-cost, high-capacity, and miniaturized sensors, wired and wireless communication networks [11]\u2013[13],"]} +{"15395523|7788290": ["HMMs have more recently been adopted as a model of choice in computer vision for modeling sequential (video) data (see [5] and [7] for surveys, and [94] and [102] for early examples).", "However, it is worth pointing out that while visual monitoring is intuitive and information-rich, vision-based activity recognition suffers from issues relating to privacy and ethics [4], [5], [8] as cameras are generally perceived as recording devices.", "Gavrila [5] and Poppe [6] present surveys mainly on tracking human movement via 2-D or 3-D models and the enabled action recognition techniques."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"9837903|14970359": []} +{"1283257|1634674": ["Interested readers may refer to [45] for a recent survey."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"9757651|20905429": ["Keywords: Smartphone, Body Sensor Networks, Health, Wellbeing."]} diff --git a/graph_4269723.jsonl b/edge/graph_4269723.jsonl similarity index 100% rename from graph_4269723.jsonl rename to edge/graph_4269723.jsonl diff --git a/edge/graph_42706356.jsonl b/edge/graph_42706356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0589d27e2629dd0b41dd8e20f7bc42d5aa090270 --- /dev/null +++ b/edge/graph_42706356.jsonl @@ -0,0 +1,13 @@ +{"29993515|984799": ["Further information on attentional systems can be found in [39]."]} +{"29993515|18374428": ["factor for interacting with the environment [6], [16], [17], [34].", "capacity to learn the body schema seems to be one of the core processes involved [4], [6]."]} +{"207172599|3330313": []} +{"447404|1452734": ["A number of robot control architectures have been created using this paradigm [2, 15, 11], many of which involve some form of reinforcement learning."]} +{"9122298|11038925": ["The work of Baraldi et al., known as FOSART [ 16 ,15] and the Incremental Topology Preserving Map of Millan et al. [17] are conceptually similar to the novelty filter described in this paper."]} +{"23697142|1708582": []} +{"7449640|1708582": ["[16] for a discussion of the different mathematical formalisms of RL problems."]} +{"984799|18487363": ["and speech recognition [133] in audition, impelled by the fact Fig."]} +{"984799|1452734": ["This is part of the epigenetic [20], [21] and developmental [22] perspectives to robot design and AI, which is easily identifiable in many of the publications that we will be reviewing in this text.", "In the human developmental timeline, this is the first fundamental skill for social interaction relating to attention [22], [29], [30], [33], [34]."]} +{"984799|7360895": ["In other words, robots with varying degrees of social skills [4], [9], such as the robot portrayed in \u201cRobot & Frank.", "The fuzzy distinction between this type of robots and all others implies that service robots can range from devices with very limited cognitive skills, such as iRobot\u2019s Roomba [8], to the so-called \u201csocially interactive robots\u201d [9]."]} +{"13534972|1452734": []} +{"6060380|1708582": ["A standard RL algorithm [114, 33, 109] was fed with curiosity reward signals proportional to the expected long-term predictor changes, and thus tried to maximize information gain [16, 31, 38, 51, 14] within the given limitations.", "Traditional RL algorithms [33], however, do not provide any theoretical guarantee of optimality for such situations.", "The initial software S of such a G\u00a8odel machine contains an initial problem solver, e.g., some typically sub-optimal method [33]."]} +{"6060380|1400872": ["More complex p such as adaptive recurrent neural networks (RNN) [115, 120, 55, 62, 47, 26, 93, 77, 78] will use a nonlinear mapping and possibly the entire history h ( \u2264 t ) as a basis for the predictions.", "Early work [57, 58, 61] described a predictor based on a recurrent neural network [115, 120, 55, 62, 47, 78] (in principle a rather powerful computational device, even by today\u2019s machine learning standards), predicting sensory inputs including reward signals from the entire history of previous\u2026"]} diff --git a/graph_4271578.jsonl b/edge/graph_4271578.jsonl similarity index 100% rename from graph_4271578.jsonl rename to edge/graph_4271578.jsonl diff --git a/edge/graph_42792383.jsonl b/edge/graph_42792383.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8759410bd2d2d1adc799ef7a207158b02cb30d07 --- /dev/null +++ b/edge/graph_42792383.jsonl @@ -0,0 +1,4 @@ +{"15084506|116294": []} +{"15084506|15199849": []} +{"13333409|12817488": []} +{"13333409|6275330": ["Lossy aggregation approach does not follow a perfect reconstruction but lossless aggregation ensures a complete recovery of all individual sensor data at base station (sink) [2]."]} diff --git a/graph_427994.jsonl b/edge/graph_427994.jsonl similarity index 100% rename from graph_427994.jsonl rename to edge/graph_427994.jsonl diff --git a/edge/graph_42812155.jsonl b/edge/graph_42812155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e43b96e33031ab496e69c302af4f1b9bd87b7d90 --- /dev/null +++ b/edge/graph_42812155.jsonl @@ -0,0 +1,3 @@ +{"20432133|21338552": ["For example, these are used in communicating with their customers and altering customers' expectation of their relationship with businesses (Abed et al. 2015ab; Dwivedi et al., 2015)."]} +{"32612778|15164501": ["Fourth, we employed Hofstede\u2019s [6] cultural dimensions for our analyses and disregarded other theories of culture (for an overview see, for example, [59])."]} +{"148302782|33644565": ["Information technology (IT) governance, as a sub-discipline of corporate governance, focuses on specifying which\nmarketing: A holistic framework, Journal of Business Research (2016),\nindividuals have the responsibility for making decisions on the use of IT (Brown & Grant, 2005)."]} diff --git a/graph_428328.jsonl b/edge/graph_428328.jsonl similarity index 100% rename from graph_428328.jsonl rename to edge/graph_428328.jsonl diff --git a/edge/graph_42848940.jsonl b/edge/graph_42848940.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a54e5e7cd9ee912c9954251c611b694678813da6 --- /dev/null +++ b/edge/graph_42848940.jsonl @@ -0,0 +1,5 @@ +{"10950502|1619901": ["For surveys of the literature, see Krishnan and Ulrich (2001) and Krishnan and Loch (2005)."]} +{"18895475|54194454": ["The whole process of a typical document classification can be found in [69] and [70]."]} +{"18895475|14774186": ["The performance of document classification can be boosted by reducing dimensionality [73].", "pre-processing or Dimensionality Reduction (DR) are used to obtain more efficient representation and to support their further processing by algorithms [73].", "The detailed review of those methods can be found in [73].", "Feature Extraction (FE) and Feature Selection (FS) are common methods of DR techniques [73].", "The TF-IDF (Term Frequency-Inverse Document Frequency) approach is commonly used to weigh each word in the text document and is more effective than simple word frequency counting [73,74].", "An FE process often includes tokenization, stop words removal, and stemming while FS aims to select subset of features by the measurement of the importance of the word [73]."]} +{"18895475|10137283": ["[115] summarized the definition of trust as \u2018\u2018the extent to which one party is willing to participate in a given action with a given partner, considering the risks and incentives involved\u2019\u2019."]} +{"5827093|5822166": []} diff --git a/edge/graph_42849217.jsonl b/edge/graph_42849217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c901e5f54fbd8dbb31cbb9ff9497c444cdb8ec1 --- /dev/null +++ b/edge/graph_42849217.jsonl @@ -0,0 +1,12 @@ +{"20549095|18782652": ["In [5], in order to avoid overfitting on noisy samples, the author proposed to perform the removal (filtering) process through the C4.", "and \u2211 1 = [ 1 0 0 1 ] for the first class, and \u03bc2 = [5, 5] and \u2211 2 = [ 1 0."]} +{"3126100|18503837": []} +{"3126100|393948": ["Representation learning aims to achieve that a reasonably sized learned representation can capture a huge number of possible input configurations, which can greatly facilitate improvements in both computational efficiency and statistical efficiency [25].", "Fortunately, representation learning [25, 26], a promising solution to learn the meaningful and useful representations of the data that make it easier to extract useful information when building classifiers or other predictors, has been presented and achieved impressive performance on many dimensionality reduction tasks [27]."]} +{"5740680|14970359": ["Examples are [14] [1] with 6 state parameters, or target specific models with even more parameters [15] [16] [17]."]} +{"5740680|7788290": []} +{"1780258|15305793": []} +{"9022135|1634674": ["The successful interpretations of higher-level human motions greatly rely on the precision of human detection [45][47]."]} +{"9022135|17516538": ["The camera could be fixed, pure translational or mobile in nature [63]."]} +{"18882244|4474193": ["Dynamic optimization problems are complex in that the optimal solution can change overtime in different ways [23]."]} +{"6054025|3241708": ["In addition, since collecting reliable labels is a time consuming and costly task, there is an increasing interest in using cheap, easy-to-get labels from nonexpert using frameworks like e.g. the Amazon Mechanical Turk 1 [49]\u2013[52]."]} +{"6054025|191396": ["First, a clustering of the instances [258] is performed using an unsupervised algorithm."]} +{"6054025|3330313": ["Similar to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38], several methods in label noise cleansing are based on ad hoc measures.", "Dealing with label noise is closely related to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38]."]} diff --git a/edge/graph_42891185.jsonl b/edge/graph_42891185.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9448b42a5dc67abf20284a7a2eb34f48f9eb8cef --- /dev/null +++ b/edge/graph_42891185.jsonl @@ -0,0 +1,17 @@ +{"110988692|9928823": []} +{"110988692|393948": []} +{"3892168|10739218": ["The applied FNN is built based on an EBF-NN and is functionally equivalent to a TSK FLS described by the following fuzzy rules (Mitra and Hayashi, 2000; Rong et al., 2009): where x i A R are input variables, ^ y A R is an output variable, A ij is the antecedent of the i th input in the j th fuzzy\u2026"]} +{"119987632|905827": []} +{"18316710|905827": []} +{"11962339|1097238": ["among its base learners tends to achieve better generalization performance [36].", "Many works [36]\u2013[39] have demonstrated that a single method can seldom perform consistently well across a variety of applications."]} +{"10698010|11608263": ["In classification, x is classified into a multilabel class [1]", "And \u201cBest\u201d shows the best value listed in [2] among 12 methods including the binary relevance method (the one-against-all SVM) [1], the classifier chaining method [8], the HOMER (hierarchy of multi-label classifiers) method [35], multi-label C4.", "Problem transformation methods convert multilabel classification into single-label classification [6, 1].", "Extensive work has been done to handle multilabel classification [1, 2].", "First we explain multilabel classification using an example [1] shown in Table 1."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"12498101|51852912": ["These features are extracted from the recorded acceleration waveforms."]} +{"11812696|1230643": ["A wireless sensor consists of sensing, data processing and communicating components, and its nature attributes include self-organization, mobility, rapid deployment, flexibility, scalability and inherent intelligent-processing capability [41]."]} +{"7428537|1230643": ["Although a saturated sensing can reduce the information loss, the redundant sensor network may be cursed with an extensive amount of irrelevant or even conflicting information, and an overload on data analysis and system cost [3], which is especially critical in wireless sensor networks [26]\u2013[29]."]} diff --git a/edge/graph_42894273.jsonl b/edge/graph_42894273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..359ae100eeb9bb3f5d724d52419fa360cf9a47e1 --- /dev/null +++ b/edge/graph_42894273.jsonl @@ -0,0 +1,2 @@ +{"110820734|17718674": ["A survey of these logics is given in Alur and Henzinger [66].", "A survey of these logics is given in Alur and Henzinger [69]."]} +{"17057457|18263901": ["1 Pharmacokinetic models describe the time course of observed drug concentrations within the body [6]."]} diff --git a/edge/graph_42895686.jsonl b/edge/graph_42895686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42920087.jsonl b/edge/graph_42920087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_42939535.jsonl b/edge/graph_42939535.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6fb57760a24a37a009fa8af01e9a6a1325e53463 --- /dev/null +++ b/edge/graph_42939535.jsonl @@ -0,0 +1,7 @@ +{"17810464|8310135": ["In the last two decades much research has been done on NE recognition and classification, and good progress has been made [1]."]} +{"33166832|18484924": ["NER is one task of an information extraction to classify proper names from raw texts into types of names [1].", "For example, \u064a\u0645\u0644\u0627\u0633\u0644\u0625\u0627/ The Islamic with (\u0625) can be written \u064a\u0645\u0644\u0627\u0633\u0644\u0627\u0627 with (\u0627), and \u062e\u064a\u062b\u0631\u0639\u0649\u0627/ the Arabia with (\u062d) can be written as \u0648\u064a\u062b\u0631\u0639\u0649\u0627 with (\u0647) [1].", "Named Entity Recognition (NER) was introduced in 1990 at the Message Understanding Conferences (MUC-6) 1 [1].", "For example, the word \u201e \u064b\u0627\u0631\u062c \u201f, jrAm1, \u201eGram\u201f, can also be written as \u064b\u0627\u0631\u063a\u201e \u201f, grAm, with the same meaning, also the word \u0648\u062c\u064c\u062c / Google can be written as \u0648\u063a\u064c\u063a, other example the word \u0628\u064a\u0631\u064c\u0633 / Syria can be written as \u062e\u064a\u0631\u064c\u0633 [1, 2, 22].", "NER task is important for many natural language processing applications such as Search results clustering, Machine Translation, Navigation Systems, enhancing Information Retrieval, and Improving results in Question Answering [1,4].", "The Arabic language has a rich vocabulary, morphology, and syntax; also, it has a complex morphology [1, 6].", "Three major tasks of NER were covered: (person, location, and organization) called ENAMEX, (temporal expressions) called TIMEX, and (some numerical expressions such as monetary amounts and other types of units) called NUMEX [1, 5].", "The word diacritization is important factor for word meaning, for example, (\u0631\u0637\u0642) which if it is diacritized as \u0631\u0637\u0642\u064e it means country Qatar but if it is diacritized \u0631\u0637\u0642\u064f it means Diameter or territory [1, 2, 22].", "However, any update or maintenance required for these systems is time-consuming and laborintensive; also, it requires full knowledge of the language [1].", "A more general example is the word \u201c\u0628\u064a\u0646\u064c\u0633\u0631\u062f\u064a\u0633\u064b\u201d (and-they-will-study-it) [1]."]} +{"12131313|18484924": []} +{"12131313|1271753": ["compounds, reagent, solvents) [21], and the identification of disorder named entities from electronic medical records [17]."]} +{"12131313|8310135": ["Recently, interest has been growing in NER research projects focusing on Arabic texts [32]."]} +{"18484924|15222577": ["Koulali, Meziane, and Abdelouafi (2012) developed an Arabic NER using a combined pattern extractor (a set of regular expressions) and SVM classifier that learns patterns from POS tagged text."]} +{"18484924|8310135": []} diff --git a/edge/graph_42973813.jsonl b/edge/graph_42973813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b338609f6b8c1cc02b26e5202e956667d0eb17d5 --- /dev/null +++ b/edge/graph_42973813.jsonl @@ -0,0 +1 @@ +{"123517368|4491892": []} diff --git a/edge/graph_42994372.jsonl b/edge/graph_42994372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e567634abbfeb3f2acffb2e87d0ec3bc8b1765c4 --- /dev/null +++ b/edge/graph_42994372.jsonl @@ -0,0 +1,5 @@ +{"9378046|641916": ["Failure to properly detect and locate events can have disastrous ramifications on simulation fidelity [Branicky 1995], and the ability to detect events accurately is a key attribute of quality simulators [Mosterman 1999]."]} +{"6901067|534755": ["The use of formal methods to study regulatory networks is currently subject to two major constraints (de Jong, 2002).", "In vector notation, the system of differential equations (1) is written as with f = ( f 1 , . . . , f n ) (cid:8) and g = diag ( g 1 , . . . , g n ) ."]} +{"119415562|534755": ["It was often used to define continuous homologues of the PL system (Glass and Pasternack 1978a, b, de Jong 2002).", "This system has been widely studied in the literature, mainly in the framework of genetic networks (cf. Thomas 1979, De Jong 2002)."]} +{"2893452|641916": []} +{"9454097|641916": ["Works detailing requirements for hybrid simulators list accurate event detection as a primary concern [Mosterman 1999].", "Works detailing requirements for \nhy\u00adbrid simulators list accurate event detection as a primary concern [Mosterman 1999]."]} diff --git a/graph_430210.jsonl b/edge/graph_430210.jsonl similarity index 100% rename from graph_430210.jsonl rename to edge/graph_430210.jsonl diff --git a/edge/graph_43033940.jsonl b/edge/graph_43033940.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30a133ae7290e10123395597252ff053313a848c --- /dev/null +++ b/edge/graph_43033940.jsonl @@ -0,0 +1,2 @@ +{"12547533|15744805": ["These metrics build on the existing knowledge on segmentation quality evaluation and also on some relevant aspects from the video quality evaluation field."]} +{"11311842|15744805": ["Although several measures have been developed for still image segmentation [1]\u2013[7], they are not directly applicable to video object segmentation and tracking."]} diff --git a/graph_4303963.jsonl b/edge/graph_4303963.jsonl similarity index 100% rename from graph_4303963.jsonl rename to edge/graph_4303963.jsonl diff --git a/edge/graph_43058707.jsonl b/edge/graph_43058707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ae034385683fa9880104baed564f7feb7e54aa6 --- /dev/null +++ b/edge/graph_43058707.jsonl @@ -0,0 +1,3 @@ +{"17221751|2301292": ["from naturalistic environments with spontaneous affective behaviour [118] as existing datasets [122], [138], [176] contain exaggeratedly posed affective behaviour.", "the recognition of expressions that might be hardly noticeable using only 2D appearance [118]."]} +{"2301292|1118130": ["prototypical expressions of emotions [5,4,6,7]."]} +{"5723977|14397159": ["In this contest, AAL aims to support life quality by information and communication technologies (ICT) to guarantee a safe environment, reducing welfare and supporting cost cutting strategies Cardinaux et al. (2011). Particularly, early diagnosis has emerged as a priority target: in fact, only one-third of dementia cases receive a diagnosis of their illness, and without it, addressing their needs and effective intervention is very hard.", "In this contest, AAL aims to support life quality by information and communication technologies (ICT) to guarantee a safe environment, reducing welfare and supporting cost cutting strategies Cardinaux et al. (2011). Particularly, early diagnosis has emerged as a priority target: in fact, only one-third of dementia cases receive a diagnosis of their illness, and without it, addressing their needs and effective intervention is very hard. Dementia is recognised when progressive cognitive decline occurs, having impacts upon abilities to carry out everyday activities. Nowadays clinician diagnosis are supported by careful neuropsychological testing, a history from the patient (subjective impairment in memory and cognitive functions) and from a key informant (objective signs of cognitive decline, and impacts on social and/or occupational functions). These instruments may be able to detect cognitive impairment relative to expected norms, or to that person\u2019s previous performance on the same test Prince et al. (2011). Different works about monitoring systems have been re-"]} diff --git a/graph_43059.jsonl b/edge/graph_43059.jsonl similarity index 100% rename from graph_43059.jsonl rename to edge/graph_43059.jsonl diff --git a/edge/graph_43098294.jsonl b/edge/graph_43098294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43105375.jsonl b/edge/graph_43105375.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_431089.jsonl b/edge/graph_431089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4311204.jsonl b/edge/graph_4311204.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43120813.jsonl b/edge/graph_43120813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db49ab1df41d1dd56829ef8467667867ffc4dc52 --- /dev/null +++ b/edge/graph_43120813.jsonl @@ -0,0 +1 @@ +{"9298269|1895753": ["asp?model=83319, and consists of the implementation of a number of benchmark neuronal network models in several different simulators, associated with a review article on spiking neuronal network simulators [2]."]} diff --git a/edge/graph_43130067.jsonl b/edge/graph_43130067.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33290f8a0dbccaa98f75a340e48e4e33effea70a --- /dev/null +++ b/edge/graph_43130067.jsonl @@ -0,0 +1,2 @@ +{"41494180|43130067": ["Berhan \u0e41\u0e25\u0e30\u0e04\u0e13\u0e30 [7] \u0e1e\u0e1a\u0e27\u0e32\u0e48 \u0e43\u0e19\u0e1b\u0e31\u0e0d\u0e2b\u0e32\u0e01\u0e32\u0e23\u0e08\u0e31\u0e14\u0e40\u0e2a\u0e49\u0e19\u0e17\u0e32\u0e07\u0e02\u0e19\u0e2a\u0e48\u0e07\u0e41\u0e1a\u0e1a\u0e21\u0e35\u0e1b\u0e31\u0e08\u0e08\u0e31\u0e22\u0e17\u0e48\u0e35\u0e44\u0e21\u0e48\u0e41\u0e19\u0e48\u0e19\u0e2d\u0e19 \u0e19\u0e31 \u0e49\u0e19 \u0e01\u0e32\u0e23\u0e28\u0e36\u0e01\u0e29\u0e32\u0e27\u0e08\u0e34\u0e22\u0e31\u0e1b\u0e31\u0e0d\u0e2b\u0e32\u0e01\u0e32\u0e23\u0e08\u0e14\u0e31\u0e40\u0e2a\u0e49\u0e19\u0e17\u0e32\u0e07\u0e02\u0e19\u0e2a\u0e48\u0e07\u0e20\u0e32\u0e22\u0e43\u0e15\u0e04\u0e49\u0e27\u0e32\u0e21 \u0e44\u0e21\u0e48\u0e41 \u0e19\u0e48\u0e19\u0e2d\u0e19\u0e02\u0e2d\u0e07\u0e2d\u0e38\u0e1b\u0e2a\u0e07\u0e04\u0e4c \u0e21\u0e35\u0e1b \u0e23\u0e34\u0e21\u0e32\u0e13\u0e21\u0e32\u0e01 \u0e17\u0e48\u0e35 \u0e2a\u0e38\u0e14 [8] [9] [10][11][12][13][14][15] \u0e2a\u0e48\u0e27\u0e19\u0e1b\u0e31\u0e0d\u0e2b\u0e32\u0e01\u0e32\u0e23\u0e08\u0e14\u0e31\u0e40\u0e2a\u0e49\u0e19\u0e17\u0e32\u0e07\u0e02\u0e19\u0e2a\u0e48\u0e07 \u0e20\u0e32\u0e22\u0e43\u0e15\u0e04\u0e49\u0e27\u0e32\u0e21\u0e44\u0e21\u0e48\u0e41\u0e19\u0e48\u0e19\u0e2d\u0e19\u0e14\u0e32\u0e49\u0e19\u0e08 \u0e32\u0e19\u0e27\u0e19\u0e1c\u0e39\u0e23\u0e31\u0e49\u0e1a\u0e1a\u0e23\u0e34\u0e01\u0e32\u0e23 \u0e41\u0e25\u0e30\u0e40\u0e27\u0e25\u0e32 \u0e43\u0e19\u0e01\u0e32\u0e23\u0e40\u0e14\u0e34\u0e19\u0e17\u0e32\u0e07\u0e41\u0e25\u0e30\u0e40\u0e27\u0e25\u0e32\u0e01\u0e32\u0e23\u0e43\u0e2b\u0e1a\u0e49\u0e23\u0e34\u0e01\u0e32\u0e23\u0e44\u0e14\u0e23\u0e31\u0e49\u0e1a\u0e01\u0e32\u0e23\u0e28\u0e36\u0e01\u0e29\u0e32\u0e27\u0e08\u0e34\u0e22\u0e31\u0e21\u0e35"]} +{"37920282|17929320": []} diff --git a/edge/graph_43136191.jsonl b/edge/graph_43136191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4314193.jsonl b/edge/graph_4314193.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43162780.jsonl b/edge/graph_43162780.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4320898.jsonl b/edge/graph_4320898.jsonl similarity index 100% rename from graph_4320898.jsonl rename to edge/graph_4320898.jsonl diff --git a/edge/graph_4332346.jsonl b/edge/graph_4332346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43331360.jsonl b/edge/graph_43331360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43342647.jsonl b/edge/graph_43342647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4341100.jsonl b/edge/graph_4341100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4344513.jsonl b/edge/graph_4344513.jsonl similarity index 100% rename from graph_4344513.jsonl rename to edge/graph_4344513.jsonl diff --git a/edge/graph_43447335.jsonl b/edge/graph_43447335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94f1c9f0c8dec6f2ab09ec1631833deecac2e73e --- /dev/null +++ b/edge/graph_43447335.jsonl @@ -0,0 +1,24 @@ +{"15490766|6952653": []} +{"7452651|468992": ["We study self-organized solutions to the best-of-n decision problem within the context of embodied agents, i.e., swarms of autonomous robots [1].", "To solve the best-of-n decision problem, we have devised a self-organized control algorithm following a behavior-based design approach [1].", "Agents in the swarm are driven by the four-state probabilistic \ufb01nite state machine [1] shown in Figure 1a."]} +{"7452651|118527236": ["We apply methods from opinion dynamics [4, 10] to de\ufb01ne mathematical models that reliably predict the system behavior as a function of a number of relevant parameters.", "Even though they rarely take the quality of alternatives into consideration [4, 10], the theoretical frameworks built by physicists can be adapted and the mathematical results can be exploited to guarantee performance.", "In addition, agents based on aggregation behaviors operate in continuous space [17] which de\ufb01nes a continuum of opinions (e.g., at which position to form a cluster) in contrast to the discrete number of alternatives in opinion dynamics [4, 10].", "Opinion dynamics is a branch of statistical physics that focuses on the dynamics of social systems [4, 10] (e.g., opinion dynamics, spread of disease, democratic voting).", "Di\ufb00erently from the weighted voter model, their control algorithm uses the majority rule [10] as the key feature to implement the collective decision making mechanism."]} +{"14626464|1975139": ["\u2022 Builds on existing work \u2013 there is a wealth of architecture description languages and notations which include some support for dynamic architectures and for formal architecture-based analysis and reasoning [12]."]} +{"13416245|15300368": []} +{"15699710|70923": [", 1999) which means despite the common characteristics between objects and agents they are not just simple objects but they present more capabilities (Iglesias et al., 1999).", "\u2026as a centralized one, thus they do not address the distri-buted or social aspects of the agents, or their reflective and goal-oriented attitudes (Iglesias et al., 1999). c) Agent-oriented methodologies versus service-oriented methodo-logies: Regarding service-oriented methodologies, it should\u2026", "\u20261999) which means despite the common characteristics between objects and agents they are not just simple objects but they present more capabilities (Iglesias et al., 1999). b) Agent-oriented methodologies versus knowledge engineering methodologies: Most of the problems subject to knowledge\u2026", "Furthermore, these methodologies conceive a knowledge-based system as a centralized one, thus they do not address the distri-buted or social aspects of the agents, or their reflective and goal- oriented attitudes (Iglesias et al., 1999).", "a) Agent-oriented methodologies versus objectoriented metho-dologies: As stated by Shoham (Shoham, 1993), agents can be considered as active objects with mental states (Iglesias et al., 1999) which means despite the common characteristics between objects and agents they are not just simple objects but they present more capabilities (Iglesias et al.", "\u2026versus objectoriented metho-dologies: As stated by Shoham (Shoham, 1993), agents can be considered as active objects with mental states (Iglesias et al., 1999) which means despite the common characteristics between objects and agents they are not just simple objects but they present\u2026"]} +{"118376889|9828770": []} +{"118376889|15604179": ["BC models have been recently reviewed in (Lorenz, 2007)."]} +{"6323003|205286988": ["Using naming methods, interest can be described in the form \"I am looking for all measures of temperature higher than 20 C in the area [10, 10 ,300,200]\".", "Employed mechanisms for routing and data dissemination must be able to identify changes of the environment and to tolerate mobility [ 10 ,11].", "Mobility management and energy control can be incorporated into global state algorithms, nevertheless the state maintenance is clearly too expensive [ 10 ].", "Most ad hoc routing algorithms as well as data centric data dissemination approaches are well-known examples [ 10 ,15].", "Using naming methods, interest can be described in the form \"I am looking for all measures of temperature higher than 20 C in the area [ 10 ,10,300,200]\"."]} +{"6323003|1230643": ["Ad hoc and sensor networks have become a major research domain [3,5].", "Sensor networks introduce special constraints that need to be addressed [5]."]} +{"6323003|2835258": ["For example, the explicit calculation of a route towards a destination can be prevented if the positions of all the nodes are known [30]."]} +{"10759394|17464562": []} +{"2735026|1236072": ["When the WSN is deployed, the routing protocol requires that the nodes determine a routing path to the sink (Al-Karaki and Kamal, 2004; Ilyas and Mahgoub, 2005)."]} +{"8944314|1230643": ["number of simple, expendable sensor nodes that are spread over a region to monitor some phenomenon within it [1]."]} +{"1708582|17464562": []} +{"6601540|17718674": []} +{"11960289|1230643": ["Most applications of wireless sensor networks, ranging from military applications to civilian applications, require that the network can detect intrusions in the interested region [45]."]} +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} +{"7010011|1708582": ["The survey [28] provides a nice discussion of these issues.", "The reader interested in additional details on RL is referred to [28] for a nice survey of the area.", "However, considerations of optimal exploration strategies and optimal learning have been explored, especially in relation to k-armed bandit problems [27, 28].", "In addition, reinforcement learning [28] can be viewed as a means of learning to act optimally, or incrementally constructing an optimal plan through repeated interaction with the environment.", "One possible manner in which to incorporate models in RL is called the certainty equivalence approach: one treats the current estimated model as if it were accurate, and constructs an optimal policy based on the current estimate [28].", "Furthermore, MDPs form the foundation of most work in reinforcement learning (RL), in which agents learn optimal policies through experience with the environment [27, 28]."]} +{"30156651|70923": ["the MAS resulting from some AOSE, Agent-Oriented Software Engineering) methodologies where the agent\u2019s code is generated from an organisational specification [27, 1])."]} +{"57510274|562855": ["A detailed description of these architectures, their formation and characteristics may be found in [34].", "d) Teams Team MAS architecture [34] is similar to coalition architecture in design except that the agents in a team work together to increase the overall performance of the group."]} +{"57510274|7839197": ["Researchers have used terms like softbots (software agents), knowbots (Knowledge agents), taskbots (task-based agents) based on the application domain where the agents were employed [12]."]} +{"28068793|205286988": ["Akkaya and Younis [2] surveyed and classified recent wireless sensor networks routing protocols."]} +{"28068793|1708582": ["[21]."]} diff --git a/edge/graph_43490812.jsonl b/edge/graph_43490812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a67c39c15f66ff1de97980e7d0cf2527acd720f1 --- /dev/null +++ b/edge/graph_43490812.jsonl @@ -0,0 +1 @@ +{"11519838|1230643": ["Keywords-WSN; broadcast authentication; DDoS; DBPMSP; safe routing\nI. INTRODUCTION A wireless sensor network(WSN) is composed of a large number of sensor nodes,which is randomly deployed either inside the phenomenon or very close to it[1]."]} diff --git a/graph_4351505.jsonl b/edge/graph_4351505.jsonl similarity index 100% rename from graph_4351505.jsonl rename to edge/graph_4351505.jsonl diff --git a/graph_435288.jsonl b/edge/graph_435288.jsonl similarity index 100% rename from graph_435288.jsonl rename to edge/graph_435288.jsonl diff --git a/edge/graph_43542882.jsonl b/edge/graph_43542882.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43550869.jsonl b/edge/graph_43550869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce986f2b1af30be0f7970e29ea93658fce79395f --- /dev/null +++ b/edge/graph_43550869.jsonl @@ -0,0 +1,6 @@ +{"10093355|2256372": ["Data replication in distributed file systems is a technique commonly used to improve data availability [11\u201314, 16] in the presence of failures.", "Current cluster computing systems use uniform data replication to (a) ensure data availability and fault tolerance in the event of failures [11\u201316], (b) improve data locality by placing a job at the same node as its data [1, 3, 17], and (c) achieve load balancing by distributing work across the replicas."]} +{"24621015|8363289": ["The receding horizon control [31] policy is to optimize the ReduceTask placement of the newly arrived job by assuming that in the future only one more job that requires the same number of ReduceTasks will be submitted to the system before any other running job finishes, as illustrated in Fig."]} +{"63270828|2701087": ["In cloud area, in order to support the coordinated distribution of different cloud workloads, there are some studies proposing some meta schedulers to manage these work-loads [36], [37].", "Meta Scheduler is a high-level abstract scheduler built atop of a set of speci\ufb01c schedulers like FIFO, Fair schedulers, which has been widely used in Grid, Cloud, HPC and other distributed environments [31], [32], [33], [34], [35], [36], [37], [38], [39]."]} +{"19163474|192934": ["We also perform two validations [34] to study the prediction accuracy of the model:"]} +{"145281|10150488": []} +{"1878208|1507400": ["The use of MapReduce for data intensive scientific analysis and bioinformatics are well studied in [41, 80]."]} diff --git a/graph_4361938.jsonl b/edge/graph_4361938.jsonl similarity index 100% rename from graph_4361938.jsonl rename to edge/graph_4361938.jsonl diff --git a/edge/graph_4362634.jsonl b/edge/graph_4362634.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4363729.jsonl b/edge/graph_4363729.jsonl similarity index 100% rename from graph_4363729.jsonl rename to edge/graph_4363729.jsonl diff --git a/edge/graph_43650377.jsonl b/edge/graph_43650377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec76b75f512f9b370f80615b69d67fc143cf6cb2 --- /dev/null +++ b/edge/graph_43650377.jsonl @@ -0,0 +1,19 @@ +{"9099178|6857179": ["Facial expression is one of the most studied methods [2].", "As a result, the prototypical basic emotions have been replaced by a continuous dimensional representation [2], such as valance, activation, and dominance."]} +{"11277003|393948": ["Representation learning is one of the most efficient methods for addressing this problem [7]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"1150114|8034133": ["Recognizing actions in videos is one of the most active research areas with numerous applications including visual surveillance, human-machine interfaces, video retrieval and various visual contents analysis [2]."]} +{"14602383|8034133": ["tems: mAP increases from 1.7% to 7.4% on MEXaction2 and increases from 15.0% to 19.0% on THUMOS 2014. 1. Introduction Impressive progress has been reported in recent literature for action recognition [42,28,2,3,39,40,24,18,31, 44,13,37]. Besides detecting action in manually trimmed short video, researchers start to develop techniques for detecting actions in untrimmed long videos in the wild. This trend motivates another challenging", " problem and adopt a temporal sliding window approach, where each window is considered as an action candidate subject to classi\ufb01cation [25]. Surveys about action classi\ufb01cation methods can be found in [42,28,2,3]. Recently, two directions lead the state-of-the-art: (1) Wang et al. [39] proposed extracting HOG, HOF, MBH features along dense trajectories, and later on they took camera motion into consideration "]} +{"9181746|18803401": ["ConGD consists of 47,933 gesture samples belonging to 249 gesture classes, making it the largest user-independent dataset [27] surpassing the ChaLearn 2014 Gesture Recognition Dataset [22] which has 13,858 samples and the DeviSign Chinese Sign Language Dataset which has 24,000 samples [28]."]} +{"12903970|1634674": ["A 2008 literature review [20] provides a"]} +{"12903970|38476": []} +{"7332452|393948": ["Recent progress on deep learning is reviewed in [3]."]} +{"23614118|2507429": []} +{"474078|1400872": []} +{"3604146|15315731": ["However, the complexity of human brains in thinking and cognition is considered as concepts with unknown levels thus it is difficult to be expressed formally [1-3]."]} +{"206594346|7788290": ["Second, dynamic hand gestures generally contain three temporally overlapping phases: preparation, nucleus, and retraction [8, 14], of which the nucleus is most discriminative."]} +{"17068353|41505326": [", Kinect) in 2010, many methods [2], [3], [4], [5], [6], [7], [8], [9] for action recognition have been proposed based on specific hand-crafted feature descriptors extracted from depth or skeleton data."]} +{"206597741|7185733": []} +{"767218|8197990": ["Textual features have proved to be more effective for this task than their visual counterpart, and systems based only on these features tend to significantly outperform systems based merely on visual features, which perform poorly [7, 4].", "ImageGoogle) have considered a single modality for indexing and searching for images [7, 14, 4].", "For this reason, research on multimedia image retrieval has become a very active and relevant research area [7, 14, 4]."]} +{"17265715|41505326": ["Since the first work of such a type [2] reported in 2010, many methods [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13] have been proposed based on specifical handcrafted feature descriptors extracted from depth/skeleton."]} +{"21819689|1262156": ["Kinect revolution makes inexpensive infrared cameras providing image depth information available, thus multimodalities (including RGB, Depth, Optical Flow, Skeleton) based gesture recognition methods emerge [4, 18] after that."]} +{"7777777|393948": ["For a recent review, see [6]."]} diff --git a/graph_437368.jsonl b/edge/graph_437368.jsonl similarity index 100% rename from graph_437368.jsonl rename to edge/graph_437368.jsonl diff --git a/edge/graph_43761823.jsonl b/edge/graph_43761823.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d8f25318fbe39df8b5cd1487fe62fcc7a79583a --- /dev/null +++ b/edge/graph_43761823.jsonl @@ -0,0 +1 @@ +{"33477326|19043514": ["The fluid and intangible nature of knowledge makes its measurement an enormously complex and daunting task (Kankanhalli and Tan, 2005)."]} diff --git a/edge/graph_43762046.jsonl b/edge/graph_43762046.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2098a453a3fc139eacc8ac86d5fb1b26fc7ec1b9 --- /dev/null +++ b/edge/graph_43762046.jsonl @@ -0,0 +1,4 @@ +{"15370058|175549": []} +{"30562966|7158350": []} +{"6852082|4474193": ["The dynamic nature of problems imposes great challenges to the current available optimization techniques [17]."]} +{"3761528|191396": ["On the other hand, partitional clustering creates the partition that will try to optimize the clustering criterion (Jain et al. 1999; Xu and Wunsch 2005)."]} diff --git a/edge/graph_4376791.jsonl b/edge/graph_4376791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43794595.jsonl b/edge/graph_43794595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f924d9a3fe2ad8698238f4e7ed055d8f1b21cb60 --- /dev/null +++ b/edge/graph_43794595.jsonl @@ -0,0 +1 @@ +{"120725502|17054454": ["Landsat imagery have proven to be useful in many vegetation monitoring applications at the regional scale.(1) A dense time series of Landsat imagery can, on a regional level, contribute to a better ecosystem understanding and an improved estimation of carbon fluxes for vegetation communities."]} diff --git a/edge/graph_43797685.jsonl b/edge/graph_43797685.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43806832.jsonl b/edge/graph_43806832.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c50c26d15cf21860ca4feac380b17b8c72fb32c8 --- /dev/null +++ b/edge/graph_43806832.jsonl @@ -0,0 +1,2 @@ +{"18441017|206583375": []} +{"20608441|206583375": ["The ultrasonic give an error of 3cm with 95% probability[23], although it has highly accurate and precision, but its high directional characteristics lead to a large number of devices deployed in the position environment."]} diff --git a/edge/graph_43813265.jsonl b/edge/graph_43813265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d523aa24cd4d334c9464cc3b1e386b8182ad19c2 --- /dev/null +++ b/edge/graph_43813265.jsonl @@ -0,0 +1 @@ +{"18687126|8530790": ["complex problems reinforces the potential effectiveness of EAs in multiobjective search and optimization [8]."]} diff --git a/graph_4381735.jsonl b/edge/graph_4381735.jsonl similarity index 100% rename from graph_4381735.jsonl rename to edge/graph_4381735.jsonl diff --git a/graph_4382139.jsonl b/edge/graph_4382139.jsonl similarity index 100% rename from graph_4382139.jsonl rename to edge/graph_4382139.jsonl diff --git a/edge/graph_43867747.jsonl b/edge/graph_43867747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9cdc4d8bc84afb457511456e0da0b9078db0d5ac --- /dev/null +++ b/edge/graph_43867747.jsonl @@ -0,0 +1 @@ +{"3671836|13074005": []} diff --git a/edge/graph_43884774.jsonl b/edge/graph_43884774.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5fb4c46e27e20ab1f584a054d7e0ae1b1bd66a5 --- /dev/null +++ b/edge/graph_43884774.jsonl @@ -0,0 +1,4 @@ +{"14911411|2357830": ["The literature contains a number of investigations of RFID security and privacy protocols [2,29] on the logical level; however, little attention has been dedicated to the security and privacy implications of the RFID physical communication layer.", "RFID technology has raised a number of privacy concerns in many different applications, especially when considering consumer privacy [29]."]} +{"2081546|2357830": ["Radio Frequency Identification (RFID) technology has been applied in a range of industries such as libraries [12], automatic payment [15], animal tracking [15], supply chains [8] and E-passport [16].", "Numerous of papers addressing RFID security and privacy have been published recently (please refer to [8] for a detailed literature survey)."]} +{"14035953|2357830": ["A fraudulent (e.g., cloned) tag can convince a reader that it is genuine by supplying fake information."]} +{"13253173|2357830": ["proposed so far involves some kind of tradeoff among the desired properties [9]."]} diff --git a/edge/graph_43888558.jsonl b/edge/graph_43888558.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6adc6ef2ebd17d342ac7d4cf4197b549e718e211 --- /dev/null +++ b/edge/graph_43888558.jsonl @@ -0,0 +1 @@ +{"60903807|17857669": ["This information can be used, for example, to describe and classify response behavior, to detect problematic survey questions or other survey design features (\u201cusability testing\u201d) (e.g., Couper, 2000; Jeavons, 1999), or to relate response behavior to data quality."]} diff --git a/graph_4389172.jsonl b/edge/graph_4389172.jsonl similarity index 100% rename from graph_4389172.jsonl rename to edge/graph_4389172.jsonl diff --git a/edge/graph_43895138.jsonl b/edge/graph_43895138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43927188.jsonl b/edge/graph_43927188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41c16ddea7f9ef2013dd2235d68e2762e2e434c3 --- /dev/null +++ b/edge/graph_43927188.jsonl @@ -0,0 +1,15 @@ +{"21937807|17474643": ["present basic taxonomies for inter-cloud architecture [6].", "Research on inter-cloud computing is still not mature enough, but its effectiveness cannot be denied by any means [6]."]} +{"16282311|960896": ["Additional added value is required for the brokers to exist [4]."]} +{"687822|17474643": ["According to [1], a Multi-Cloud denotes the usage of multiple and independent Clouds by a client or a service.", "Related work As identified in [1] the Multi-Cloud middleware can be library-based or service-based."]} +{"18603598|9123526": ["Ontologies for user requirements and virtual units of infrastructure resources are defined and represented by the Web Service Modelling Language (WSML) [60]."]} +{"750363|960896": []} +{"14964187|17474643": []} +{"7832053|1708582": []} +{"34668439|6430931": ["However, IDPS performance is hindered by the high false alarm rate it produces (Wu and Banzhaf, 2010)."]} +{"4712196|14046529": []} +{"30625897|17474643": ["Grozev and Buyya (2014) thoroughly surveyed and suggested taxonomy for the architecture and mechanisms for application brokering.", "Grozev and Buyya (2014) and Petcu (2013) classify multi-clouds into services and libraries.", "Grozev and Buyya (2014) states that \u201cMulti clouds refer to the usage of multiple independent clouds by a user when there is no prior agreement between cloud providers.\u201d", "Benefits from the customer\u2019s perspective include the following (Di Martino et al. 2015a; Grozev and Buyya 2014): \u2014 Vendor lock-in avoidance ."]} +{"30625897|13210924": ["\u2014Thomasetal."]} +{"30625897|2701087": ["\u2026also published a lot of research papers on their \u201cinter-cloud meta scheduling framework\u201d in Sotiriadis et al. (2015), Bessis et al. (2012), and Sotiriadis et al. (2011a, 2012, 2013b) It is the one among the aforementioned solutions based on CloudSim that targets the interoperability in\u2026", "Sotiriadis et al. (2012) is a state-of-the-art review paper describing various topologies of meta-schedulers, classifying them into centralized, hierarchical, and distributed meta-schedulers."]} +{"960896|14792235": []} +{"960896|17474643": ["VMs managed by RightScale have a number of pre-de\ufb01ned hooks, which send data back to the RightScale console, this allows an alert to trigger an associated action, e.g, a scaling policy [10]."]} +{"13025|627405": ["To-date, there has not been a systematic literature review (SLR) of research on cloud migration, making it difficult to assess the maturity in general and identifying trends, research gaps, and future dimensions of cloud migration in particular."]} diff --git a/graph_4392867.jsonl b/edge/graph_4392867.jsonl similarity index 100% rename from graph_4392867.jsonl rename to edge/graph_4392867.jsonl diff --git a/edge/graph_43937124.jsonl b/edge/graph_43937124.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43942153.jsonl b/edge/graph_43942153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d1d09bfede826c2f32e31d976048db08364d507 --- /dev/null +++ b/edge/graph_43942153.jsonl @@ -0,0 +1,5 @@ +{"17681719|14749415": ["Physiological measures (e.g., electrodermal and cardiovascular measures) are considered as a novel and promising instrument in the evaluation of serious games (Bellotti et al., 2013).", "In the design of the simulation, we were particularly careful not to promote any possible risky behavior, emphasizing the necessity\nfor users to pay attention and be careful, to avoid encouraging risk-positive cognitions and attitudes, as pointed out by Fischer et al. (2011)."]} +{"3517873|43942153": []} +{"51935760|43942153": ["In the second round, the full text of retained publications was assessed using the minimum acceptable criteria suggested by Feng, Gonzalez, Amor, Lovreglio, and Cabrera (2018): 1. a prototype of TT, VR, CGS, or SG should be developed; and 2. an experiment should be conducted to implement the\u2026"]} +{"51935760|17670369": ["Researchers are able to employ a range of techniques to give accurate representations of physical properties with CAT solutions (e.g., 3D Warehouse, Laser Scanner, BIM Toolkits, Autodesk Recap, and 360 Camera) (H\u00f6llerer, Feiner, Terauchi, Rashid, & Hallaway, 1999; Seth, Vance, & Oliver, 2011)."]} +{"36179280|1983971": ["According to Bowman et al. (2002) an exposure greater than 30 min would be considered lengthy (but this likely depends on the specific VE)."]} diff --git a/edge/graph_4394609.jsonl b/edge/graph_4394609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4395259.jsonl b/edge/graph_4395259.jsonl similarity index 100% rename from graph_4395259.jsonl rename to edge/graph_4395259.jsonl diff --git a/edge/graph_43959720.jsonl b/edge/graph_43959720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e69ce45d057f77d0369d6a63d146ccd4c3b5f61 --- /dev/null +++ b/edge/graph_43959720.jsonl @@ -0,0 +1,3 @@ +{"25077659|913718": ["Schema-based matching approaches have been classified and distinguished as follows: 1) between approximate and exact techniques; 2) between syntactic, external, and semantic techniques; and 3) between terminological, structural, and semantic techniques [21]."]} +{"61168671|8125630": []} +{"8643453|14205872": ["( 2007 ) categorise the characteristics and features of ontology visualisation methods."]} diff --git a/edge/graph_43982203.jsonl b/edge/graph_43982203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43985090.jsonl b/edge/graph_43985090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a25e2919c121784fa66295ed05d02c3692297507 --- /dev/null +++ b/edge/graph_43985090.jsonl @@ -0,0 +1,2 @@ +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} diff --git a/edge/graph_43994208.jsonl b/edge/graph_43994208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_43996751.jsonl b/edge/graph_43996751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d406a2ba8d2b1d60569dcb555bdd7f8819dc915 --- /dev/null +++ b/edge/graph_43996751.jsonl @@ -0,0 +1,120 @@ +{"18168518|3330461": ["Most of the existi ng works on SCNs and D2D enabled user association are focused on conventional physical layer metrics to optimize the netw ork performance [1]\u2013[4], [7], [8], [11]."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"8467994|7851743": []} +{"267019|12029139": ["Since information and power transfer operate with different power sensitivities at the receiver (e.g. \u2013 10 dBm and \u2013 60 dBm for energy and information receivers, respectively) [6], and the conventional receiver architecture is designed for information transfer only, practical SWIPT optimal circuits for harvesting energy are not available yet.", "In an RF-powered energy-harvesting network (RF-EHN), the UE can harvest energy from hybrid access point (HAP) using RF signals for their information processing and transmission [9].", "To implement SWIPT, one idea is to switch the receiver between two modes (e.g., information decoding and energy harvesting) based on instantaneous channel and interference condition.", "Since the amount of harvested RF energy depends on the distance from the RF source, the network nodes in the different locations can result in significantly different amounts of harvested RF energy [9].", "In the recent literature [9], the following receiver designs are available: time switching (e.", "FD communication also enables a wireless node such as a BS to perform RF energy transfer [9] (e.", "Since the operating power of the energy-harvesting component is much higher than that of the information-decoding component, the energy-harvesting zone is smaller than the information transmission zone [9].", ") consists of the following major components [9]: \u25d7 a low-power microcontroller to process data from the network application; \u25d7 a low-power RF transceiver for information transmission/reception; and \u25d7 an energy harvester (composed of an RF antenna module, an impedance matching, a voltage multiplier, and a capacitor) to collect and convert RF signals into electricity.", "This scheme is referred to as the simultaneous wireless information and power transfer (SWIPT) [9]."]} +{"991448|3330461": [", [22] among others, but only single operator D2D is taken into account.", "An intra-D2D overlay enjoys higher spectral efficiency than the case where D2D communication is not enabled, and less implementation complexity than the underlay case [22]."]} +{"15041001|8909218": ["1, we consider an OFDMA cognitive small cell network where K co-channel cognitive small base stations (CSBSs) are overlaid on a primary macrocell.", "In the simulations, spectrum-sharing CSBSs and primary users are randomly distributed in the range of MBS, and cognitive small cell users are uniformly distributed in the coverage area of their serving small cell; the carrier frequency is 2 GHz, B = 10 MHz, N = 50, M = 50, and \u03c3 2 = B N N 0 , where N 0 = \u2212174 dBm/Hz is the AWGN power spectral density.", "Note that in (1), co-channel interference between small cells is assumed as part of the thermal noise because of the severe wall penetration loss and low power of CSBSs [21]."]} +{"28061345|17787193": []} +{"28061345|3330461": []} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"10319033|12452682": []} +{"6953986|8909218": ["These small cell deployments are mainly in the form of home small cells, known as femtocells [10], [11], [27], but many operators have also already started to deploy outdoor small cell solutions to complement their macrocell coverage [28]."]} +{"8878880|17109970": []} +{"9801723|3042864": ["An efficient way to alleviate the resource scarcity of mobile devices is to offload their resource-demanded tasks to remote cloud [1]\u2013[4] through pay as you go."]} +{"11288384|8909218": ["Femtocells aim to enhance the poor indoor coverage, boost the overall spectral efficiency, and offload the overlay macrocell traffic [4]."]} +{"207172280|12452682": ["[6] provides a game theoretical overview of dynamic spectrum sharing from three aspects: analysis of network users\u2019 behaviors, efficient dynamic distributed design and optimality analysis."]} +{"1780737|2623404": []} +{"1780737|16335158": ["\u20267 (Duan, Yan and Vasilakos 2012) A comprehensive discussion on Service-Oriented Architectures towards the convergence of Networking and CC 8 (Alamri, et al. 2013) Focused on Sensor-Clouds 9 (Dinh, et al. 2013), (Fernando, Loke and Rahayu 2013) Discussions on mobile cloud computing 10\u2026"]} +{"1780737|17290408": ["that one tenant cannot access to components of other tenants. For this, there is a clear tradeoff between resource consumption and the isolation level to be offered. Further discussion on this is in (Rodero-Merino, et al. 2012). Common physical (computing, networking) resources are shared among the customers through virtualized instances, offering IaaS solutions. (Vaquero, et al. 2011) discussed security from the networking", "des, et al. 2014), (Subashini and Kavitha 2011) PaaS There is a tradeoff between the level of isolation among tenants and the efficiency level in how the resources are used (Fernandes, et al. 2014), (Rodero-Merino, et al. 2012) IaaS Common physical (computing, networking) resources are shared among the customers through virtualized instances (Fernandes, et al. 2014), (Perez-Botero, et al. 2013), (Vaquero, et al. 2011), (Pea"]} +{"1780737|16237860": []} +{"1780737|9732448": []} +{"1780737|12815020": ["Consequently, (Patel, et al. 2013) (Modi, et al. 2013) examine proposals that incorporate the joint use of IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems).", "\u2026Data congestion (Popa, et al. 2011) Data availability (MetaCDN 2014) (Akamai 2014) Intrusion detection and prevention systems (Patel, et al. 2013) (Modi, et al. 2013) Legal aspects alongside security and resilience (SECCRIT, 2014) Harmonize a large number of diverse security solutions; address\u2026", "There are also some available surveys concerning security issues in CC (Patel, et al. 2013) (Modi, et al. 2013) (Subashini and Kavitha 2011), namely the ones that can impair integrity, availability, and confidentiality.", "Consequently, non-authorized access should be prevented (Patel, et al. 2013) (Modi, et al. 2013).", "SDN can be also useful for enhancing the available security in cloud environments, e.g. data centers, by deploying new features such as IDPS (Patel, et al. 2013) (Modi, et al. 2013)."]} +{"1155540|3055684": ["A detailed review of recent advances in energy harvesting technologies applied to wireless communications is given in [16].", "We also compare the performance improvement brought by the proposed energy trading approach with that of existing optimal packet scheduling approaches [6], [16]."]} +{"1155540|12029139": ["experiments for energy transfer with the above three methods [6]\u2013[9]."]} +{"11553741|12452682": []} +{"8884763|2509135": []} +{"17070882|3330461": ["Device-to-device (D2D) communication over cellular networks has emerged as an innovative technology that can significantly improve the performance of cellular systems [1]."]} +{"17070882|7644489": ["eration partnership project (3GPP) [3], long-term evolution (LTE), and LTE-advanced (LTE-A) [4] projects consider to employ D2D as the potential solution for supporting growing communication demands.", "in the realm of D2D, most of them focuses on the single-cell scenarios [3]\u2013[12]."]} +{"24595524|17336376": ["The access of the service providers to the WSN-sensed data is implemented through the virtualization of the WSNs [5]."]} +{"1990757|2535224": []} +{"12390607|3330461": [", in-band underlaid D2D under the direct control of a cellular network, whereas WLAN operates in an unlicensed band and possesses high degree of uncertainty in the overall performance [4]."]} +{"12390607|7851743": ["Thus, self-organized resource management approaches have drawn attentions because they can help in providing range of benefits including reduced information exchange, low complexity, scalability, and etc [8]."]} +{"374344|870434": ["Therefore, the \u2018ability to resolve requests\u2019 ( A ) is de\ufb01ned as, De\ufb01nition 5.", "De\ufb01nition 1.", "However, UWSNs pose few unique challenges that differ from those of the terrestrial sensor networks in many respects [8], [9], [10].", "To start opportunistic localization, the unlocalized nodes \ufb01rst explore their maximum opportunities by following the procedure described in Algorithm According to Theorem 4.2.1 and De\ufb01nition 1, the OPR S of an unlocalized node S have higher number of localized nodes, which act as potential anchors for the unlocalized node to get localized.", "Therefore De\ufb01nition 4.", "Thus, the \u2018ability to serve demand\u2019 ( A ) is calculated as, De\ufb01nition 9.", "De\ufb01nition 8.", "De\ufb01nition 3.", "The additional number of reference nodes required for any unlocalized node i to get successfully localized is de\ufb01ned as the difference between the total number of reference nodes required and the number of localized neighbors present, De\ufb01nition 7.", "The number of localized neighbors of any node i for transmission power p i is de\ufb01ned as, De\ufb01nition 6."]} +{"10550494|8909218": ["Once a FAP has sensed the spectrum, it will send the information regarding the used and unused spectrum list to the database at the FGW. FAPs from other femtocells can access these information from the database, and share the spectrum information with neighboring FAPs.", "Subscribed femtocell customers can autonomously deploy FAPs to create cellular hotspots [1].", "network (CN) through an Internet protocol (IP) backhaul and femtocell gateway (FGW) [1].", "In the network, each FAP is connected to the core network (CN) through an Internet protocol (IP) backhaul and femtocell gateway (FGW) [1].", "The FGW serves as the coordinator of FAPs for a local area, such as FAPs in the same apartments building or nearby houses.", "The sensing coordination among multiple FAPs can be implemented by exchanging neighboring femtocell information through the FGW."]} +{"17804774|3555631": ["Under the premise of control-data separation architecure in WSDN, there will be two types of base stations, namely ontrol base stations (CBS) and data base stations (DBS) [115] ."]} +{"17804774|3330461": []} +{"17804774|7644489": []} +{"17804774|875676": []} +{"17804774|12452682": []} +{"17804774|12681089": ["This type of antenna array configuration has been proven to e inadequate [93,94] ."]} +{"7320605|1756215": ["[6] had proposed a taxonomy which divides current existing typical game theory approaches for WSN security into four categories: preventing DoS attacks, intrusion detection, strengthening security, and coexistence with malicious sensor nodes.", "A relatively smaller portion of the contributions in this area has been summarized in [5,6].", "[6] summarized 30 publications of the existing game theoretical approaches that are designed to strengthen WSN security."]} +{"15002700|9830350": ["Compared with flat protocols, hierarchical protocols offer a more feasible solution to handling large-scale networks with their enhancements to share limited wireless channel bandwidth, balance node energy consumption and reduce communication expense more optimally (Lung and Zhou, 2010; Liu, 2012)."]} +{"15002700|8326114": ["Meanwhile, adversaries may possess passive and active access to secret information, such as keys stored in a compromised node by eavesdropping (Schaffer et al., 2012) or Denial of Services (DoS) attacks."]} +{"15002700|9670348": ["Among the numerous proposed network routing protocols over the past years, hierarchical routing protocols significantly contribute to a system's scalability, lifetime, and energy efficiency (Akkaya and Younis, 2005; Anisi et al., 2012)."]} +{"15002700|1230643": ["In this research study, the Open System Interconnect (OSI) model is classified into five layers (Akyildiz et al., 2002): physical layer, link/MAC layer, network layer, transport layer, and application layer."]} +{"15002700|1331167": []} +{"30932961|3330461": ["The number of recent papers addressing D2D communications is wide [5], and the potential applications range increases, from mobile data offloading [6], to cell coverage extension [7],"]} +{"1299327|17062686": []} +{"23990039|8909218": ["As in [1], femtocells benefit not only home subscribers but also an operator.", "Femtocells communicate with the cellular network through a local broadband connection such as digital subscriber line, cable, Ethernet, Worldwide Interoperability for Microwave Access (WiMAX), or fiber [1]."]} +{"12325031|8974063": ["These problems include th e DSA-based MAC protocol design in CRNs [3], [4], [27], [28], routing protocol design in CRNs [14], [29] and cross-layer", "Network management DSA-based MAC protocol design [3], [4], [27], [28] Unsupervised learning (model-free learning) [25], [26], [33]\u2013[35] Single-agent-based reinforcement learning [25] Spectrum-aware routing [14], [29] Multi-agent-based reinforcement learning [26], [34] Self-organization [12], [30] Learning automata [35] Network security [20], [31] Repeated-game-based learning [33], [36], [37]"]} +{"12325031|7851743": [", CRNs and self-organized networks [12], [13]) emphasize more on autonomous, adaptive reconfigurability."]} +{"12325031|1185580": []} +{"12325031|2509135": ["Therefore, it is considered especially appropriate for the network management problems in the CRNs, device-to-device (D2D) networks, heteronomous networks (HETNETs) and ad-hoc networks, which consist of multiple independent decision-11 [55], [56], [59], [60], [82] Q-learning [55], [56], [82], SARSA [59], [60] Neural Network [56], State abstraction [59], [60], N/A [82] N/A Multirate transmission control MDP [57] Q-learning Neural network with feature extraction [57] N/A Call admission con-trol CMDP [68], [75] Q-learning [68], [75] State abstraction [68], [75] N/A Joint admission-bandwidth control CMDP [73], [83] Q-learning [83], Neural network [73] N/A N/A Single link", "A device in a CRN is expected to be aware of its surrounding environment and uses the methodology of understanding-by-building to reconfigure the operational parameters in real-time to achieve optimal network performance [2], [3].", "These problems include the DSA-based MAC protocol design in CRNs [3], [4], [27], [28], routing protocol design in CRNs [14], [29] and cross-layer network control problems in CRNs such as self-organization [12], [30] and network security problems [20], [31].", "This section provides a comprehensive survey on the applications of model-free learning in the cognitive wireless networks (following the broad-sense de\ufb01nition of CRNs), and will cover a wide spectrum of problems across different layers of the network-protocol stacks.", "Apart from [124], the direct applications of the standard L R \u2212 I learning scheme (with the convergence property of Theorem 4 and the pure-strategy NE existence condition) is also employed by a number of studies, which range from relay-selection in the cooperative network [125] to the CSMA-based DSA management [126] and the MIMO-based DSA management [127] in the CRNs.", "In recent years, Cognitive Radio Networks (CRNs) have been widely recognized from a high-level perspective as an intelligent wireless communication system .", "As we have discussed in Section III-B, for the Aloha-like spectrum access problem in CRNs [100], the near-NE policies of the stochastic access game can be obtained if all the SUs update their local polices with the Logit function (44) and the Q-value at state s is updated following (25).", "Although the detailed discussion on these topics is beyond the scope of this survey, it is believed that addressing these issues will bring great improvement to the existing learning mechanisms in the CRNs.", "It is worth noting that by emphasizing the network architecture of spectrum sharing between the licensed/primary networks and the unlicensed/secondary networks [4], \u201cDSA networks\u201d is frequently considered a terminology that is interchangeable with \u201cCR networks\u201d [3].", "One example of such exploitation can be found in [157], which models the distributed dynamic routing in multi-hop CRNs as an SG (Figure 16).", "In addition to L R \u2212 I learning, other learning schemes based on the general LA updating rule in (11) are also employed by research on resource allocation in the CRNs.", "The feature extraction method is further adopted in stochastic-game-based modeling for strategy learning in CRNs [61], [62].", "In the framework of CRNs, the following abilities are typically emphasized: Wenbo Wang and Andres Kwasinski are with the Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY 14623 USA (email: wxw4213@rit.edu, axkeec@rit.edu)."]} +{"12325031|3042022": ["Based on the MDP framework, various model-free learning methods such as Temporal Difference (TD) learning [44] and learning automata [35] can be adopted to define the behavior rules of an agent.", "In the literature, important surveys on these model-free learning methods from the perspective of control/game theory include [25], [26], [33]\u2013[35].", "Then an LA-based algorithm should be able to achieve the following goal [35]:", "Instead of updating the action according to the myopic optimal Q-value in discounted-reward MDP and bias-value in average-reward MDP, the LA directly updates the probabilities of actions based on the utility feedback [35]."]} +{"12325031|1708582": []} +{"12325031|12601073": ["As indicated by our discussion in Sections I-A and I-B, the problem domain of learning in cognitive wireless networks can be divided into two categories: the problems of wireless environment cognition (namely, spectrum sensing) [7]\u2013[9] and the problems of network management (namely, strategy learn-", "For an overview of the relevant techniques, the readers may refer to recent survey works in [7]\u2013[9]."]} +{"10299098|11370991": []} +{"10299098|3767252": ["In existing solutions, the certification authority can only distribute the credentials to all the elements located within its own trust domain [183], making it hard to guarantee the privacy and data integrity for communications among different trust domains.", "Authentication management provides a possible solution to ensure \u201ctrust\u201d [183]."]} +{"10299098|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [165], [166]."]} +{"10299098|3042864": ["\u2026signi\ufb01cant disparities between MEC and MCC systems in terms of computing server, distance to end users and typical latency, etc. Compared with MCC, MEC has the advantages of achieving lower latency, saving energy for mobile devices, supporting context-aware computing, and enhancing privacy and\u2026"]} +{"10299098|3348390": []} +{"10299098|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [165], [166]."]} +{"8295786|19938676": ["However, 3.9G long term evolution (LTE) includes capabilities that exceed those of 3G mobile communications [9,10].", "\u2026without encryption due to used analogue modulation, (ii) limited sub-scribers due to used FDMA technique, (iii) power radiation of base station being unsafe and lack of a handoff process, (iv) limited to voice service, and (v) incompatible systems that lack a uni\ufb01ed international standard [8\u201310].", "The EDGE has been added to enhanced the packet-switched services and enabled new high speed data applications such as multimedia applications [9,10].", "However, GSM suffers from a low data rate, which prompted for an improvement in the cellular system by general packet radio services (GPRS) technology [8\u201310]."]} +{"8295786|14765802": ["Data traffic will increase to 82 GB per subscriber per year [1] due to the unprecedented demand for data high bandwidth video streaming, which will represent more than half of global mobile data traffic [2]."]} +{"8295786|2443013": ["Although the joint implementation of these mechanisms may provide very high data rates that are theoretically more than 1 Gbps for stationary users, further increases are limited due to the smaller number of available frequencies [11,16]."]} +{"8295786|24491750": ["The BS accounts for 57 % of the total energy consumption in cellular networks, and the power ampli\ufb01er (PA) has the highest energy consumption of the BS [46]."]} +{"9431951|17109970": []} +{"51979814|17109970": ["To properly capture the tradeoff between obtaining a satisfactory throughput and saving transmit power\u2014similar to what is considered for the NFE and IC games\u2014we will adopt a \u201cgreen\u201d approach based on improving each player\u2019s energy efficiency [8].", "A good approximation for the effective throughput in a packet-oriented transmission is ( ) { ( )} s s exp t t 1 k k L c = - ^ h [8], whose behavior is depicted (red line, left axis) in Figure 3."]} +{"18668415|9040432": []} +{"18668415|11735843": ["the iii) development of new sophisticated control abstractions [152].", "Big data techniques have the ability to scalably and reliably process massive amounts of data using a cluster of commodity servers (Qadir et al. 2014).", "SDN is generally understood to entail (i) the separation of the control and data plane; (ii) the control of multiple data planes by a single controller; and the (iii) development of new sophisticated control abstractions (Qadir et al. 2014)."]} +{"36698537|14745481": []} +{"36698537|17205659": ["Although many stateof-the-art solutions have been proposed earlier in areas such as mobile ad hoc networks (Djenouri and Badache, 2005; Cho and Chen, 2011), and wireless sensor networks (Yong Wang and Ramamurthy, 2006), still M2M paradigm may require new approaches to security."]} +{"36698537|1236072": []} +{"18011174|202482": ["Cyber Physical Systems (CPSs) Cyber Physical Systems represent the new generation of complex sensor networks that combine physical subsystems and cyber components [25,138].", "In [138], several future directions for sensor networks have been studied that serve CPSs based on two baselines, namely, security and privacy."]} +{"18011174|7320605": []} +{"18011174|1756215": ["Therefore, the cooperating nodes are supposed to achieve the security targets in WSNs [32]."]} +{"18011174|17205659": ["In [33,34,76,78,79], WSN attacks are classi\ufb01ed based on the layer attacked and the countermeasures which can be summarized as follows."]} +{"24820984|8909218": []} +{"64428928|3330461": []} +{"7796069|141053": []} +{"15862888|7686677": ["For energy-efficient communications, it is desirable to the maximize transmission rate and take the electricity cost into account [5], [36]."]} +{"8833120|2871699": ["communication are often small, infrequent, diverse and mainly in the uplink [180]."]} +{"8833120|12029139": ["2) Wireless powered communication networks: The remarkable advancement of wireless energy harvesting and transfer technologies has created many new research directions recently [163], [164]."]} +{"8833120|1932843": ["5) Learning Algorithms: Reinforcement learning algorithms have been used commonly to address many problems in computer science such as robotics or optimization control [176]."]} +{"8833120|15694215": [", QoS, multicasting, security, as presented in [46] and [47] which are not well examined using repeated games.", "However, lack of infrastructure poses many issues such as interference, decentralization, limited-range, and insecurity [46], [47].", "Thus, there are many advantages and applications of wireless ad hoc networks in practice as discussed in [46], [47]."]} +{"8833120|44944144": [", QoS, multicasting, security, as presented in [46] and [47] which are not well examined using repeated games.", "However, lack of infrastructure poses many issues such as interference, decentralization, limited-range, and insecurity [46], [47].", "Thus, there are many advantages and applications of wireless ad hoc networks in practice as discussed in [46], [47]."]} +{"15524033|7320605": []} +{"1212871|17109970": ["Recently, there has been a number of researches that apply the non-cooperative game theoretical approach to EE design in ICs [31]\u2013[34] or the MAC [35].", "However, all these studies considered single-antenna ICs and they applies for multi-antenna case only if the transmit powers are optimized with fixed transmit directions as shown in [36].", "In this paper, we apply the non-cooperative game theoretical approach to deal with the EE maximization problem for MIMO ICs, where each link attempts to maximize its own EE by jointly optimizing transmit power and beamformers.", "A number of researches have applied game theory to design energy efficient communications for ICs [21]\u2013[24], multiple access channel (MAC) [25], or wireless data dissemination scenarios [26], [27].", "In [19], a decentralized beamforming EE (DBFEE) algorithm was devised for symmetric MIMO ICs, where the distance from one transmitter to its desired receiver is identical for all links, and each transmitter has the same distance to all its unintended receivers.", "To the best of our knowledge, only a few works have studied distributed algorithms concerning the overall performance for EE maximization problem for MIMO ICs [19], [20].", "Studies in this direction are plentiful in literature, e.g., [21] for the MIMO multiple access channel (MAC), [22]\u2013[29] for the MIMO ICs.", "The EE optimization problem in flat fading single-input single-output (SISO) ICs was considered in [32], where one distributed algorithm based on non-cooperative game was proposed.", "This paper focuses on the EE maximization problem for MIMO ICs with the per-link transmit power constraint.", "For the MIMO ICs, the authors in [22] first utilized the noncooperative game framework to deal with the SE maximization problem, where the iterative water-filling algorithm was proposed to find the NE of the game.", "However, in this paper we consider the EE maximization problem for MIMO ICs with multiplexing.", "The work that is most closely related to ours is [24], where the noncooperative game was formulated for the SE maximization problem of the MIMO ICs and one asynchronous distributed algorithm was proposed to reach the NE of the game."]} +{"11103675|16839827": ["Given that \u201cMusic\u201d and \u201cEntertainment\u201d are mostly viewed on YouTube [51], these categories are selected for analysis."]} +{"26018453|1708582": ["in [49] make use of the Boltzmann function [45] as an efficient strategy selection to strike a balance between exploration and exploitation."]} +{"24037236|3330461": ["in a centrally-controlled WMN, such as the LTE-controlled device-to-device network2 [27] and the centrally-controlled BS-to-BS network via wireless interfaces in the ultra-dense networks3 [28]."]} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"518308|10283694": ["protocols [15]\u2013[19], encouraging participation in vehicular networks [20], security [21], [22], and vehicular Delay-/"]} +{"518308|3330461": []} +{"518308|763939": ["Several related surveys and tutorials on vehicular networks have been published previously, related to requirements and architectures [8], inter-vehicle communications [9], [10] and information dissemination [11], mobility models [12], information management for safety applications [13], applications [14], routing"]} +{"518308|1230643": ["In-network data aggregation (or, simply, data aggregation) has been the focus of significant research in the field of Wireless Sensor Networks (WSNs) [278], which are energy-constrained; for example, see [279]."]} +{"27633972|12884178": []} +{"27633972|12452682": ["The NE, from which no selfish player would have the incentive to unilaterally change its action, provides a stable point in which the system resides [29].", "Unlike a game played once, a repeated game allows a strategy to be contingent on past moves, thus allowing reputation effects and retribution, which gives possibility for cooperation [29]."]} +{"15449163|18687271": ["[52] provided three distributed mobility management protocols, the first is based on the existing Proxy Mobile IPv6 (PMIPv6), the second is based on SDN, and the third is based on routing protocols.", "Proposed solutions: Inter-tier, intra-tier, and multi-RATs handoff mechanisms, and a mechanism for secure handoff [40, 93, 102, 52], which we will discuss in Section 5."]} +{"15449163|3330461": ["For a detailed review of D2D communication, interested readers may refer to [24]."]} +{"61108354|14988542": []} +{"61108354|2706428": []} +{"61108354|18717047": []} +{"61108354|1453418": []} +{"18201168|12029139": ["Since the information can also be transmitted using RF in wireless networks, the concept of simultaneous wireless information and power transfer (SWIPT) has become a promising approach for energy and information delivery in wireless networks [7], [8].", "In this paper, the relay is RFpowered [8]."]} +{"20264664|5660618": ["plant is remotely controlled over a wireless mesh network [20]."]} +{"205824238|8833120": []} +{"14908254|8909218": ["Of\ufb02oading data is, in fact, viewed as the primary role of SCBSs, particularly those deployed by an operator in outdoor environments such as picocells [1], [2], [15].", "For reaping the bene\ufb01ts of small cell deployment, numerous technical challenges must be addressed such as resource management, interference avoidance, and user association [2], [4\u20139].", "These SCBSs are seen as a key approach for of\ufb02oading traf\ufb01c from the macro-cell network while providing high capacities by bringing the users and their access points closer to one another [2].", "We mainly focus on outdoor SCBSs such as picocells/microcells/metrocells that are used by the operator to of\ufb02oad data by serving any of the N macro-cell users when needed [1], [2]."]} +{"22661441|12452682": ["A game theoretical overview of dynamic spectrum sharing is provided in [12].", "On the other hand, game theory has been widely investigated in wireless networks [12]\u2013[16]."]} +{"2374737|3330461": ["can share spectrum with at most one cellular subscriber [7], [25]\u2013[27]."]} +{"2374737|7644489": ["For example, in Release 12 of the LTE standard, an eNB (Evolved Node B) can keep track of the interference received at each of its cellular subscribers in each sub-band and can simply remove the D2D link from the sub-band once it observes a higher-than-tolerable interference level [28], [29]."]} +{"8639012|3055684": ["Another recent survey in [10] provides an overview of self-sustaining wireless communications with different energy harvesting techniques, from the perspective of", "Unlike [10], this survey focuses on the wireless charging strategies in communication networks with wireless energy"]} +{"8639012|12029139": ["Survey Scope Main Contribution [9] Wireless network with RF energy harvesting Review of i) fundamentals and circuit design for RF energy harvesting, ii) resource allocation schemes and communication protocols for various types of RF-powered wireless network, and iii) practical challenges and future directions.", "5) Near-field SWIPT System: As afore-introduced, SWIPT (see [9] and references therein) has been broadly investigated in RF-based wireless communication systems.", "A more detailed review on the conversi on efficiency of RF energy harvester implementations can be found in [9], [14].", "The reader can r efer to [9] for more detailed information about recent advances in radiative charging system.", "This survey differs from [9] in the following aspects: this survey i) covers various major wireless charging techniques, namely, inductive coupl ing, magnetic resonance coupling and RF/microwave radiation, from fundamental principles to their applications, ii) rev iews the existing international standards, commercialization and implementations, and iii) emphasizes on the transmitter-s ide (i.", "Our prev ious work in [9] presented a review of research issues in RFpowered wireless networks with the focus on the receiver-si de (i."]} +{"8639012|12681089": ["The far-field RF propagation models are well known in literatures [230], [231]."]} +{"8639012|12060835": ["In [12], the authors gave an overview of the sensor nodes powered by", "Existing literatures [12]\u2013[14] also presented relevant reviews"]} +{"20805124|16972183": []} diff --git a/edge/graph_44008245.jsonl b/edge/graph_44008245.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42ff58afbb0deed92967c64af888c461d835cad4 --- /dev/null +++ b/edge/graph_44008245.jsonl @@ -0,0 +1 @@ +{"27150628|44008245": []} diff --git a/edge/graph_44022918.jsonl b/edge/graph_44022918.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44045520.jsonl b/edge/graph_44045520.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1937609dff987849e3fe79c5f36c1a6212858b3 --- /dev/null +++ b/edge/graph_44045520.jsonl @@ -0,0 +1,2 @@ +{"10173409|12601073": ["Common spectrum sensing techniques include energy detection and feature detection [1]."]} +{"1016842|12601073": ["A number of test statistics for the problem of spectrum sensing have been proposed in the literature [33, 34, 35]."]} diff --git a/edge/graph_44053291.jsonl b/edge/graph_44053291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cea5132ebc6e3eedad69595f2f9826668240065 --- /dev/null +++ b/edge/graph_44053291.jsonl @@ -0,0 +1,10 @@ +{"11853661|4474193": ["Adjusting the frequency of evolution control according to the reliability of the approximate model seems logical [33]."]} +{"17006589|4474193": ["There are potentially many other rich memeinspired designs, operational models, and algorithm frameworks which form the cornerstones of memetic computation as tools for problem-solving [3], [18], [23], [47]\u2013[51].", "[3], [32], and multiobjective optimization [1], [33], [34]."]} +{"25391562|1805048": []} +{"17272850|62040085": ["The estimated figures of varied recommender systems developed in different application domains [20], are approximately 21 for recommending the Web, 13 for movies, 11 for news, 10 for Document and Information, 6 for music, 5 for information filtering and sharing etc ."]} +{"120188456|1805048": []} +{"11910893|1805048": ["The widely used collaborative filtering technique is the k Nearest Neighbors (kNN) recommendation algorithm [1, 38, 39]."]} +{"1914653|8125630": ["3.2 Aggregation \nCapabilities One of the key characteristics of multidimensional databases is the ability to store measurements \n(such as sales numbers) in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026in multidimensional cubes, sup\u00adport aggregation hierarchies for different dimensions \n(e.g., a hierarchical clas\u00adsi.cation of products or a time hierarchy), and provide capabilities to aggregate \nthe measurements at different levels of the hierarchy [Kimball 1996; Chaudhuri and Dayal 1997].", "Moreover, this method \ncombines some of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "When con\u00adsidering multiple dimensions, we will \nfollow the multidimensional data model used for data warehousing and OLAP applications in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "\u2026his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "However, there are certain idiosyncrasies \npertaining to our model that make it different from the classical OLAP models used in databases [Kimball \n1996; Chaudhuri and Dayal 1997].", "This multidimensional approach is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions.", "Then, as shown in Figure 2, we \ncan compute an overall rating of how John Doe likes action movies as a genre by aggregating his individual \naction movie ratings: R(John Doe, action):= AGGRx.genre=actionR(John Doe, x) (11) Most traditional OLAP \nsystems use similar aggregation operation (known as roll-up) that often is a simple summation of all \nthe underlying elements [Kimball 1996; Chaudhuri and Dayal 1997].", "\u2026of the multi-strategy and local machine learning methods [Atkeson et al. 1997; Fan and \nLi 2003; Hand et al. 2001, Sections 6.3.2-6.3.3] with On-Line Analytical Processing (OLAP) [Kimball 1996; \nChaudhuri and Dayal 1997] and marketing segmentation meth\u00adods [Kotler 2003] to predict unknown ratings.", "\u2026is based on \nthe multidimensional data model used for data warehousing and On-Line Analytical Processing (OLAP) applications \nin databases [Kimball 1996; Chaudhuri and Dayal 1997], on hierarchical aggregation capabilities, and \non user, item and other pro.les de.ned for each of these dimensions."]} +{"10027817|3202525": ["Numerous context recommender systems have been evolved using this algorithm in several application field [13]."]} +{"10027817|1113420": []} +{"61070392|3102110": ["Hence, combining several recommendation strategies can be expected to provide better results than either strategy alone [28,29]."]} diff --git a/graph_4405479.jsonl b/edge/graph_4405479.jsonl similarity index 100% rename from graph_4405479.jsonl rename to edge/graph_4405479.jsonl diff --git a/edge/graph_44061075.jsonl b/edge/graph_44061075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ba798c44400119ed28e205100ec25439fbcbe4a --- /dev/null +++ b/edge/graph_44061075.jsonl @@ -0,0 +1,4 @@ +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"36051782|207244886": ["We use the widely used metrics false positive rate ( FPR ), false negative rate ( FNR ), true positive rate or recall ( TPR ), precision ( P ), and F 1 - measure ( F 1 ) to evaluate vulnerability detection systems [39]."]} +{"7259091|14920988": ["For a detailed overview of symbolic execution techniques, we refer the reader to previously published surveys in the area, such as [11, 19, 32, 34]."]} +{"11784900|14920988": ["We refer the reader to a number of reviews for exploring search strategies further [60, 61, 25].", "Because it is impossible to do justice to all this work we refer the reader to symbolic execution survey papers [60, 61, 25].", "We refer the reader to the bibliography for more inforation on optimizing solving times [60, 61, 25]."]} diff --git a/edge/graph_44063566.jsonl b/edge/graph_44063566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0211edf9781840a8310cbe1c8a57883cc274f373 --- /dev/null +++ b/edge/graph_44063566.jsonl @@ -0,0 +1,26 @@ +{"2044250|5171123": ["Local Binary Pattern (LBP) has achieved state of the art face recognition highest performance in this scenario when only one sample per person is used for training [21]."]} +{"2044250|6028805": ["Recently, several comparative studies [5\u20137] of thermal face recognition approaches have been developed."]} +{"9612000|2323881": ["In future work, we will focus on extending our PSF estimation strategy to natural image deblurring and our recognition method to non-frontal face recognition problems [40]."]} +{"416565|34263386": []} +{"416565|18050848": []} +{"3484880|18543658": ["Recently, many LRFR approaches have been developed (more details in [1] and [2]), and these methods can be broadly classified into two categories:"]} +{"8299268|9045232": ["[28], the reported performance measures depend on the definition of a \u201ccorrect\u201d detection result.", "Moving forward from previous comparisons [28] of approaches that focus on limited head orientations, we intend to evaluate different approaches for the most general, i."]} +{"2323881|16010181": []} +{"2323881|18543658": ["Inspired by Ouyang et al. (2014), we unify the four categories of PIFR approaches in the following formulation.", "To name a few, good surveys exist for illumination-invariant face recognition Zou et al. (2007), 3D face recognition Bowyer et al. (2006), single image-based face recognition Tan et al. (2006), video-based face recognition Barr et al. (2012), and heterogeneous face recognition Ouyang et al. (2014)."]} +{"2323881|5171123": ["To name a few, good surveys exist for illumination-invariant face recognition [Zou et al. 2007], 3D face recognition [Bowyer et al. 2006], single image-based face recognition [Tan et al. 2006], video-based face recognition [Barr et al. 2012], and heterogeneous face recognition [Ouyang et al. 2014].", "Moreover, PIFR approaches that require more than two face images per subject for enrollment are not included in this article, as single-image-based face recognition [Tan et al. 2006] has dominated the research in the past decade.", "Another disadvantage is that the PCA-based texture modelling may hardly represent the fine textures that are particular to individual faces Vetter (1998). To reduce the computational complexity and relieve the non-convexity of 3DMM, multiple constraints are employed to regularize the fitting procedure in Eq."]} +{"2503790|5171123": ["changes, LBP has achieved the state-of-the-art face recognition performance in the scenario when only one sample per person is used for training [38]."]} +{"7326406|5171123": ["This problem is referred to as the one sample per person in face recognition literature [60]."]} +{"16118442|6028805": ["Facial component detection in thermal imagery is relevant for face registration, tracking initialization (e.g. in [2] and [11] the tracking is initialized manually), face recognition ([9],[5]), and expression recognition ([10], [4])."]} +{"59276672|20404279": ["The face super-resolution subnet is trained using a generative adversarial network (GAN) [12], [33] (see a comparison of different versions of GANs in the context of face super-resolution in [8])."]} +{"1688762|416565": ["Many face anti-spoofing methods have recently been proposed, a literature review of these methods can be found in [7]."]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"21129655|5171123": ["\u2026Chang et al, 2005, Chellappa et al, 1995, Daugman, 1997, Ersotelos and Dong, 2008, Kong et al, 2005, Prado et al, 2016, Samal and Iyengar, 1992, Tan et al, 2006, Wang et al, 2014b, Zhao et al, 2003, Zou et al, 2007) and books (Gong et al, 2000, Li and Jain, 2011, Wechsler, 2009, Wechsler et\u2026"]} +{"21129655|6028805": ["\u2026be found in other surveys (Abate et al, 2007, Adini et al, 1997, Chang et al, 2005, Chellappa et al, 1995, Daugman, 1997, Ersotelos and Dong, 2008, Kong et al, 2005, Prado et al, 2016, Samal and Iyengar, 1992, Tan et al, 2006, Wang et al, 2014b, Zhao et al, 2003, Zou et al, 2007) and books (Gong\u2026"]} +{"12090268|9045232": []} +{"24745305|393948": ["representation learning based models [1], [9] explore image priors more intuitively and efficiently, leading to their wide use in real applications."]} +{"71152701|20404279": ["The face super-resolution subnet is trained using a Generative Adversarial Network (GAN) [11]."]} +{"71152701|21559689": ["1For a literature review of face recognition, see for example [61][39], among others."]} +{"7876524|5171123": ["in [24], we further classify feature-based method into two"]} +{"7876524|9045232": []} +{"45549645|5171123": ["In addition to poor resolution, illumination and pose variation scenarios, realworld face recognition systems usually encounter only a single gallery image per person problem([25])."]} diff --git a/edge/graph_44064877.jsonl b/edge/graph_44064877.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4c00abaa37b8d3efa1d1c968657d6ec93efb717 --- /dev/null +++ b/edge/graph_44064877.jsonl @@ -0,0 +1 @@ +{"29500387|7216558": []} diff --git a/edge/graph_44067484.jsonl b/edge/graph_44067484.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ae10e78514c37a37ceb0424973a579c00bc5dee --- /dev/null +++ b/edge/graph_44067484.jsonl @@ -0,0 +1,2 @@ +{"60238484|18418184": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_44077188.jsonl b/edge/graph_44077188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44093698.jsonl b/edge/graph_44093698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..032d61886e0ac65b2e30dd06ab1d52ebb0bcb938 --- /dev/null +++ b/edge/graph_44093698.jsonl @@ -0,0 +1,6 @@ +{"125859648|16768404": ["These SAMs are mainly classi \ufb01 ed into three groups [31]: (cid:129) Lexicon-Dictionary Based Method (LD): This method relies on a sentiment dictionary which contains words denoting a sentiment."]} +{"5261517|431089": ["Background Due to the ever-increasing amount of scientific articles in the bio-medical domain, Text Mining (TM) has been recognized as one of the key technologies for future bio-medical research [1-8]."]} +{"825928|3176028": ["Despite the large amount of work on discourse-based anaphora resolution in the 1970s and 1980s (see Hirst (1981)), learning-based resolvers have only exploited shallow discourse-based features , which primarily involve characterizing the salience of a candidate antecedent by measuring its distance\u2026"]} +{"11380974|17652653": ["As a result, they have been the focus of a large amount of work in the past couple of decades (see the surveys by Androutsopoulos and Malakasiotis [2010], Madnani and Dorr [2010], Ng [2010], and Poesio and Versley [2009])."]} +{"46764901|207079655": ["Sentiment analysis has raised growing interest both within the scientific community, leading to many exciting open challenges, as well as in the business world, due to the remarkable benefits to be had from financial [29] and political [30] forecasting, e-health [31] and etourism [32], human communication comprehension [33] and dialogue systems [34], etc."]} +{"3397190|10137425": ["We also expect to see more research on multimodal learning [190] as, in the real world, language is often grounded on (or correlated with) other signals."]} diff --git a/edge/graph_44096871.jsonl b/edge/graph_44096871.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48cfe29cdf2aca5ad5fa998ee06ef170942aa8a1 --- /dev/null +++ b/edge/graph_44096871.jsonl @@ -0,0 +1,16 @@ +{"9268923|206764452": ["Reviews of established video-based pedestrian detectors comprising descriptors, classifiers and benchmarks are presented in [12], [13], [14]; let us further refer to [15] for a survey of state-of-the-art pedestrian detection."]} +{"9268923|1029120": ["Reviews of established video-based pedestrian detectors comprising descriptors, classifiers and benchmarks are presented in [12], [13], [14]; let us further refer to [15] for a survey of state-of-the-art pedestrian detection."]} +{"566572|7185733": ["Video-based hand-gesture recognition algorithms, for numerous applications, have been studied extensively [4], [5].", "Numerous video-based approaches for dynamic gesture recognition have been developed [4], [5], [6]."]} +{"21864364|206764452": ["Pedestrian detection has been an active research area and signi\ufb01cant progress has been reported over the last two decades [1]."]} +{"18083704|1029120": ["Understanding the pedestrian behavior is essential for designing, improving and utilizing modern vehicle safety systems and construct advanced intelligent vehicles [1]."]} +{"11569289|1029120": ["Pedestrians account for 65% of the fatalities out of the 1.17 million worldwide trafficrelated deaths [2]."]} +{"18356457|1634674": ["Human motion is usually caused by an individual\u2019s desire to achieve a particular goal or to perform an intended action, so the recognition of human actions or intentions has been a very active area of research [17], [18], [19]."]} +{"18125853|7185733": ["Current research in HRI has had a focus on identifying and learning how to distinguish different human gestures [1], [2], [3], [4], [5], [12]."]} +{"115644055|1029120": []} +{"3398550|13074005": []} +{"13441612|7257659": ["This is where predictive decision support ADASs can help [4]\u2013[6]."]} +{"13441612|1029120": ["There has been a wealth of good work done on pedestrian detection [2]."]} +{"15189881|206764452": ["Motion models are essential to tasks as tracking [3], anomaly detection [4], [5] and path prediction [2], [6], found in a variety of application domains, from intelligent vehicles [1], [2], [6], [7], [8], [9] to fixed-viewpoint surveillance [4], [5], [10], [11]."]} +{"4816620|984799": ["With a few exceptions [34], [35], almost all joint attention scenarios are implemented with stationary robots or robotic heads according to a recent comprehensive survey [36]."]} +{"32361747|1029120": ["problem and the inadequacy of current systems in ensuring it, we refer the reader to [4]."]} +{"42761895|12264500": []} diff --git a/edge/graph_44104746.jsonl b/edge/graph_44104746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6c9a5146d2cc29c110798f5832ed2a82a37776c --- /dev/null +++ b/edge/graph_44104746.jsonl @@ -0,0 +1,68 @@ +{"20576400|4528002": ["Each smart vehicle is embedded with a number of Electronic Control Units (ECUs), which are used to monitor and control the different subsystems of a vehicle, and these ECUs are organized as an internal network for a vehicle [13].", "Thus, vehicular networks cannot be considered as closed networks, and cyber attacks can be launched aiming to open vehicular network interfaces [13].", "Additionally, because the vehicular network organized by wireless communication devices deployed in vehicles may have open network interfaces [13], the adversary can possibly launch data integrity attacks against these communication devices."]} +{"3781161|4583883": ["Commonly used classifiers include sparse representation [4], [19]\u2013 [22], support vector machine (SVM) [6], [10], [11], [16], [17], random forest (RF) [7], Bayesian classifiers [8], [23], k-nearest neighbor (kNN) [18], linear discriminant classifier [14], standard Gaussian Mixture Model (GMM) [24], Boosted decision tree (BDT) [25]."]} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"13195599|3348390": ["Although IoT has great potential and many prototype IoT systems have been built [Perera et al. 2014; Panga et al. 2015; Xu et al. 2014], some fundamental issues have yet to be addressed."]} +{"51981043|9316331": ["where Cp is a constant greater than 0 [53]."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"44002741|206603045": ["Later on, many deep learning based methods have been developed [2]\u2013[9], see [10] for an overview."]} +{"10832046|16323798": ["A more comprehensive discussion about these can be found in recent reviews, such as [15]\u2013[17]."]} +{"2192015|393948": ["The Restricted Boltzmann Machine[29]-[30] is a generated stochastic network proposed by Hinton and Sejnowski in 1986, which is an energy-based probability graph model consisting of a visible layer and a hidden layer, as shown in Fig."]} +{"3869642|9928823": []} +{"6645229|8575576": ["st\u2019s workday [15,17,7]. Consequently, over the past several decades there has been increasing interest in developing computational methods to assist in the analysis of microscopic images in pathology [9,8]. From October 2015 to April 2016, the International Symposium on Biomedical Imaging (ISBI) held the Camelyon Grand Challenge 2016 (Camelyon16) to identify topperforming computational image analysis s", " machine learning methods, including: regression, support vector machines, and random forests. Typically, these algorithms take as input relatively small sets of image features (on the order of tens) [9,10]. Building on this framework, approaches have been developed for the automated extraction of moderately high dimensional sets of image features (on the order of thousands) from histopathological image"]} +{"31403034|13172512": ["There are several approaches to NTC: port-based, payload-based, and \ufb02ow statistics-based [3], [4].", "These methods usually rely on machine learning techniques to perform service prediction [3]."]} +{"5878150|393948": ["We show that the application of such pressures to a deep unsupervised generative model can be realised in the variational autoencoder (VAE) framework [19, 26]."]} +{"17322528|3348390": []} +{"24855581|25670768": ["Lately, deep learning has been applied widely to various research fields including image recognition, video classification, audiograms, language processing, video games, and robotics [14]\u2013[18]."]} +{"24855581|1932843": ["This unique feature has been confirmed to be an advanced approach to building a human-level agent [2]."]} +{"24855581|9316331": []} +{"44239235|5385031": ["2739340 interactions via sensor devices, mobile personal computing, and advanced communication technologies to provide transparent, smart, ubiquitous, green, and safe services for humans [1]\u2013[3]."]} +{"44239235|2473564": ["Other models concentrated on the feature learning of multimodal data can be found in [21] and [22]."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"6138957|8815923": ["known objects to models in the database [4, 5, 8, 23, 27].", "performance according to physical models such as the ability to resist external wrenches [45], and empirical (or data-driven) methods [4], which typically use human labels [2] or the ability to lift the object in physical trials [43]."]} +{"15289417|8760041": ["A comparative study of such algorithms on a real robotic is presented in [17] and a survey in [18]."]} +{"10050878|5724477": []} +{"8837213|7530272": ["Sequence analysis approaches can generally be divided into three categories [16], [17]: model-based, distance-based, and feature-based approaches."]} +{"16267209|8909218": ["3) Small-to-small Interference: Due to the large number of the small cells and the irregular deployment topology, the small-to-small interference mitigation schemes were preferably at SUE side or the small-cell BS side in a distributed manner [65], [10]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"52122893|44104746": ["Recent advances in machine learning have projected neural networks and deep learning systems into the public consciousness [8], [14].", "Neural networks, and more specifically, deep neural networks, have emerged in recent years as highly effective tools when approaching machine learning problems [8], [14]."]} +{"52122893|31245252": ["to edge computing platform [19] and Internet of Things applications [10]."]} +{"52122893|18567112": ["In addition, Android threats have emerged that exploit privilege escalation, aggressively target users via driveby downloads, implement native code execution and dynamic payloads, and utilize code obfuscation and the limitations of mobile device hardware to circumvent commercial detection systems [6]."]} +{"52122893|3818445": ["to edge computing platform [19] and Internet of Things applications [10]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"10800075|121289": []} +{"3645740|7851743": ["In contrast to other surveys in the area, such as [10], which", "In SON, the concept of self-optimization can be defined as a function that constantly monitors the network parameters and its environment and updates its parameters accordingly in order to guarantee that the network performs as efficiently as possible [10].", "The concept of SON in cellular networks was defined in [10]", "needs to reconfigure its parameters [10].", "feeding more data to the system, adding more features to the input data or adding more layers in a NN, without it limitlessly increasing its complexity [10].", "work that is also scalable, stable and agile enough to maintain its desired objectives [10].", "These categories are: self-configuration, self-optimization and self-healing and are commonly denoted jointly as self-x functions [10].", "Based on that, it is assumed that the reader already is familiar with SON concepts and its use cases, otherwise the reader can refer to [10].", "Self-healing in cellular systems can occur in terms of network troubleshooting (fault detection), fault classification, and cell outage management [10]\u2013[13]."]} +{"3645740|6105131": ["which focused on basic definitions and concepts of selforganizing systems and how could self-organization be applied in the context of wireless sensor networks, or even [21],"]} +{"3645740|1708582": ["For readers interested in Reinforcement Learning, please refer to: [184] and [185]."]} +{"13141636|41505326": []} +{"13141636|393948": []} +{"10934690|12395887": []} +{"18389147|1932843": ["Neural networks are powerful function approximators, but they have significantly more parameters than the simpler linear models that are often used in robotic learning [23], [8].", "However, practical real-world applications of RL typically require significant engineering beyond the learning algorithm itself: an appropriate representation for the policy or value function must be chosen so as to achieve training times that are practical for physical hardware [8], and example demonstrations must often be provided to initialize the policy and mitigate safety concerns during training [9]."]} +{"18389147|6988770": ["Accelerating robotic learning by pooling experience from multiple robots has long been recognized as a promising direction in the domain of cloud robotics, where it is typically referred to as collective robotic learning [31], [32], [33], [34]."]} +{"3065624|987239": ["Generally, there are two paradigms for 3D object retrieval [4]: 3D modelbased methods and 2D view-based ones."]} +{"4566470|24855581": []} +{"4566470|31245252": ["[79] D. Niyato, M. A. Alsheikh, P. Wang, D. I. Kim, and Z. Han, \u2018\u2018Market model and optimal pricing scheme of big data and Internet of Things (IoT),\u2019\u2019 in Proc.", "THE MAIN PURPOSE OF BIG DATA TRADING Since the volume of data is growing immensely, and IoT technology is progressing at a similar pace, massive datasets with comprehensive content and detail become increasingly valuable.", "Luong et al. [56] and Ya\u00efche et al. [64] designed a pricing model to evaluate IoT sensing data.", "Available: https://arxiv.org/abs/1702.02380 [56] N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, D. I. Kim, and Z. Han, \u2018\u2018Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey,\u2019\u2019 IEEE Commun.", "His research interests include cyber-physical systems, smart grid/IoT security and privacy, and incentive mechanisms design for smart grid/IoT.", "Many specific fields, such as government, manufacturing, health-care, education, Internet, social media, and IoT-driven smart-world systems all need big data applications tomine the value of their own collected datasets to better support applications.", "For instance, IoT provides themost important network infrastructure for data collection, as billions of devices run automatically and constantly collect data across various domains.", "INTRODUCTION With a number of new technologies integrated into our daily lives, such as mobile and social networking applications, and Internet of Thing (IoT)-based smart-world systems (smart grid, smart transportation, smart city, and others), massive amounts of data will be collected [1]\u2013[7].", "I. INTRODUCTION With a number of new technologies integrated into our daily lives, such as mobile and social networking applications, and Internet of Thing (IoT)-based smart-world systems (smart grid, smart transportation, smart city, and others), massive amounts of data will be collected [1]\u2013[7].", "\u2018\u2018Sensing as a service (S2aaS): Buying and selling IoT data.\u2019\u2019", "With the development of smart devices and IoT, it becomes easier to collect useful data everywhere.", "The data sources are diverse, especially as IoT is ever more involved in our daily lives, supporting numerous smart-world systems [1], [3], [20]\u2013[22].", "Some existing data pricing models consider only market structures, such as auction, cost-based pricing, and others, while others involve a distributed data storage structure (cloud computing, edge computing, etc.) and IoT for assistance.", "Thus, to quantify the cost for data collection, and handle diverse data sources, we need to understand how IoT works, and encourage all components to provide better performance in IoT [1], [53]\u2013[55].", "In addition, existing studies showed the use of the Stackelberg game model in spectrum trading and resource allocation [69], and could improve network performance and robustness in IoT systems [70].\nc: Bargaining game The last scheme is the Bargaining game.", "\u2022 Diverse Data Sources: Along with billions of smart personal devices and sensors, IoT-driven smart systems have become major infrastructures that contribute data to the collection process."]} +{"4566470|5385031": ["There are several different pricing strategies for evaluating cost according to the different scenarios [56]."]} +{"4566470|3818445": []} +{"207190974|15782139": []} +{"3147007|6337591": ["This dialogue literature thus widely applies reinforcement learning (Walker, 2000; Schatzmann et al., 2006; Gasic et al., 2013b; Singh et al., 1999; Singh et al., 2000; Singh et al., 2002) to train dialogue policies."]} +{"52264715|12894036": ["A classical example where the K-means algorithm fails (Filippone et al., 2008) is shown in Figure 2(a)."]} +{"3945114|31245252": ["Smart environment is another key area that aims at improving our living ecosystem from the perspective of efficient energy management [20], [29], water management to smart building, waste management and carbon emission reduction, and traffic management [22], [23].", "To deal with big data processed in smart city, the fog and edge computing can be leveraged so that data can be stored and processed locally before transmitting the massive data to the centralized data center [23]."]} +{"3945114|14849079": ["in [30] conducted survey on smart cities, and extensively reviewed existing"]} +{"168930493|4787452": []} +{"168930493|4528002": []} +{"15452424|7360895": ["In the not too distant future robots will be expected to have social skills, leaving the factory to interact with people in environments designed exclusively for use by humans (Fong et al., 2003)."]} diff --git a/graph_4411601.jsonl b/edge/graph_4411601.jsonl similarity index 100% rename from graph_4411601.jsonl rename to edge/graph_4411601.jsonl diff --git a/edge/graph_44118313.jsonl b/edge/graph_44118313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..671c505d189f8aba3f57a0a54cef64f3568ebf1b --- /dev/null +++ b/edge/graph_44118313.jsonl @@ -0,0 +1,9 @@ +{"4413438|118142": []} +{"468992|1708582": ["RL has been intensively studied in the single robot case where an elegant and unified mathematical framework has been developed (Kaelbling et al. 1996; Sutton and Barto 1998).", "We first introduce reinforcement learning (Kaelbling et al. 1996; Sutton and Barto 1998) and we identify the key challenges in the application of the methods developed for reinforcement learning to swarm robotics.", "For a more formal introduction and more details about RL, the interested reader can refer to Kaelbling et al. (1996)."]} +{"468992|8767649": ["In this review, we use these characteristics to discriminate between the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al., 2001).", "In this review, we use these characteristics to discriminate the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al. 2001).", "replicate the behavior observed in cockroaches by Jeanson et al. (2005). The robots are able to collectively aggregate in a circular arena using a PFSM approach."]} +{"17332078|8767649": []} +{"14863832|205286988": ["We use multi-hop communications [12] to exchange local information and local geometry in order to cooperate with other robots, avoiding the need for a shared global coordinate frame [13]."]} +{"8047905|6607209": []} +{"335909|468992": ["Detailed and comprehensive reviews of the state of the art in swarm robotics can be found in Brambilla et al. (2013); Bay\u0131nd\u0131r (2016)."]} +{"17408580|8767649": [", [35] presented a taxonomy of multi-robot systems and address some multi-robot system studies in their taxonomy."]} +{"3339330|12377645": ["The current draw of the robot is 120 mA when idle and 410 mA during typical use."]} diff --git a/edge/graph_44129379.jsonl b/edge/graph_44129379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e2d1419fd06f1541057b35c47ab4d23502f1e5f --- /dev/null +++ b/edge/graph_44129379.jsonl @@ -0,0 +1,57 @@ +{"17309844|5747564": ["2260942 control system to one employing open IP networks [3], a variety of threats has been identified in the SG context, e.", "The AMI will likely employ Internet Protocol version 6 (IPv6) technology in a mesh based topology [4].", "attention in Europe, in North America, wireless mesh networks (WMNs) are a more popular and dominant solution for the AMI [3].", "Gharavi et. al [7] proposed a mesh based architecture for the last mile SG, in which the Neighbourhood Area Network (NAN) supports communications between SMs and AMI headend via data aggregation points and mesh-relay-stations if required.", "This work is focussed on authentication and key management over the AMI.", "The Stauxnet worm is another example that can cause a significant impact even on national security [3].", "The customers side of an SG consists of Home Area Networks (HANs) in customer premises where smart appliances and controllers are connected to smart meters (SMs), which form the end-points of the Advanced Metering Infrastructure (AMI) that provides two-way data communications between SMs and the utilitys Meter Data Management Center.", ": Smart Grid Topology for AMI 2) Step II: SAS performs the following steps upon receiving the packet from SM in Step I: \u2022 SAS lookups values ver & salt associated with SN sm .", "Although power line communication (PLC) has gained much attention in Europe, in North America wireless mesh networks (WMN) is a more popular and dominant solution for the AMI [3].", "We concentrate on data communications over the AMI outside of the HAN domain, which includes an SAS that is charged with supporting the required authentication and key management mechanisms."]} +{"110356720|595093": []} +{"110356720|5747564": []} +{"110356720|121289": []} +{"15194417|595093": []} +{"110802640|485843": []} +{"110802640|5747564": []} +{"110802640|12083425": []} +{"110802640|6959212": []} +{"110802640|14240886": []} +{"12103882|17774971": []} +{"12103882|192934": []} +{"11761306|595093": ["From our recent survey on smart grid communication infrastructures and on cyber security for smart grid communications [6] [7], there are only a very few research work on AMI authentications, e.g., [8]\u2013[13], and no work exists on con\ufb01dentiality for user privacy and user behavior, from the best of\u2026", "Fig.1 shows a commonly used communication architecture for smart grid AMI, which is generalized from the literature [6] [7] [9] [11] [14]."]} +{"11761306|121289": ["From our recent survey on smart grid communication infrastructures and on cyber security for smart grid communications [6] [7], there are only a very few research work on AMI authentications, e.g., [8]\u2013[13], and no work exists on con\ufb01dentiality for user privacy and user behavior, from the best of\u2026", "Fig.1 shows a commonly used communication architecture for smart grid AMI, which is generalized from the literature [6] [7] [9] [11] [14]."]} +{"12852435|485843": ["It integrates advanced sensors, smart meters, monitoring systems, computer software/hardware and data management systems [6], and enables two-way communication between smart meters and utility systems."]} +{"12852435|595093": ["Compared with traditional communication network systems, smart grid has different goals, requirements, and assumptions [4].", "In order to achieve this, it has been stated in [4] that the communication latency requirement of AMI is about several seconds."]} +{"12852435|18037424": ["consumption efficiently and reliably is critical [3]."]} +{"52020405|2521001": ["profiling [7] and peak shaving [8] to gain better control over the power grid which will reduce power outages and blackouts.", "In addition, distributed generation and transmission networks are considered part of this layer [8]."]} +{"52020405|485843": []} +{"52020405|18037424": []} +{"14598583|595093": ["AMI communications to traditional cyber attacks such as resource depletion and masquerade attacks [10].", "The range of communication technologies is wide, a diverse mix of public and private, wired and wireless, standard and proprietary technologies [10] [11]."]} +{"14598583|5747564": ["An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid In the literature, there is limited research on AMI authentication and confidentiality of user data privacy and behavior [3] [4] [5] [6] [7] [8] [9].", "There is some recent work addressing authentication and confidentiality of AMI communications in smart grid [3]."]} +{"12424238|15199849": []} +{"110458116|10542290": []} +{"110458116|17737221": []} +{"110458116|7278743": ["Bluetooth [29,30] is another common wireless communications system used to exchange data over short distances."]} +{"110458116|121289": ["Such an integrated distribution system offers greater reliability and robustness as the backup is always available [52,43].", "Therefore like similar internetworking systems AMI is vulnerable to security threats [43] and there is need for end-toend encryption to provide confidentiality of metering data [44].", "However all DERs to be integrated into the smart grid would have an electronic power processor and switching power interface for controlling the exchange of power and currents with the grid [43]."]} +{"44257603|121289": ["Smart meter can measure real-time energy consumption of a consumer, control multiple appliances and devices at customer\u2019s premises, and support several other capabilities [1],[2]."]} +{"207881413|595093": ["(A more detailed discussion on Smart Grid domains can be found in [14] [15] [16].)"]} +{"207881413|6959212": ["Compared with legacy power systems, the Smart Grid is envisioned to fully integrate high-speed and two-way communication technologies [4] [5] [6] [7] [8] into millions of power equipments to establish a dynamic and interactive infrastructure with new energy management capabilities, such as advanced\u2026"]} +{"207881413|2457428": ["As key management for conventional computer networks has been well categorized and summarized in several survey papers [117,118], in the following, we focus on the new requirements of key management for the Smart Grid, and present an overview of existing key management schemes for power systems."]} +{"5747564|595093": ["Analyzing and implementing smart grid security is a challenging task, especially when considering the scale of the potential damages that could be caused by cyber attacks [46]."]} +{"113869893|16323798": []} +{"7871043|5747564": []} +{"7871043|121289": []} +{"46825011|121289": ["\u2026[2], refers to a modernization of electric grid that incorporates information, advanced two-way communication and computational intelligence to the electricity generation, distribution and management, in order to improve control, e\ufb03ciency, agility, economy, reliability, security and safety [2\u20134]."]} +{"10842075|7971188": ["To overcome the nonscalable problem of the client-server architecture, two popular distributed communication architectures emerged for different applications in Internet, namely, content distribution networks (CDNs) [14] and peer-to-peer networks (P2P) [15]."]} +{"117602867|2521001": []} +{"117602867|18037424": []} +{"14741413|485843": []} +{"14741413|17381415": ["Taking advantage of the V2G capability and technology, the batteries on PHEVs can be used to boost DERs by feeding electricity back to the grid when they are parked.", "The authors in [87] apply the PSO approach to solve the problem of cooperative scheduling of pervasive DERs, due to its easy implementation and manageable computational time duration.", "Integrating the uncertain and intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46].", "\u2026intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46]."]} +{"14741413|12083425": ["\u2026intermittent renewable generation (such as wind turbines and solar photovoltaic panels) into the bulk generation will be challenging , due to the reliability requirement that the generation and load should always remain balanced [43]\u2013[45], as well as the grid synchronization issue for DERs [46]."]} +{"14741413|8783262": ["As a popular existence of energy storage, PHEVs are emerging as a transportation alternative to reduce greenhouse gas emissions; however, the large electricity demand of widespread adoption of PHEVs will also pose significant challenges to the existing stable grid [60]\u2013 [64]."]} +{"39634994|5747564": []} +{"39634994|6959212": []} +{"39634994|18037424": []} +{"29060869|485843": []} +{"29060869|595093": ["The readers who are interested on a detailed survey on smart grid security are referred to [24], [25]."]} +{"29060869|5747564": []} +{"29060869|7686677": ["Interested readers can refer to [13]\u2013[16] for energy efficient wireless communications, [17], [18] for energy efficient optical commu-", "Furthermore, femtocells and picocells are energy efficient alternatives to macrocells, however when they are densely deployed, they may reduce the efficiency of the macrocell as the primary BS will operate under low traffic [16]."]} +{"29060869|8909218": []} +{"29060869|121289": ["been discussed in detail in [9], [10]."]} +{"29060869|2373572": ["In addition, the technique known as Power Line Communications (PLC) emerges as a strong candidate for the AMI [33], [34]."]} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"32466400|5747564": ["For further reading on the current state of standardization [19]\u2013[22] are suggested."]} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} diff --git a/edge/graph_44134307.jsonl b/edge/graph_44134307.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13488b4f2d300f80fdb3b62f38daaa8da1c03ddf --- /dev/null +++ b/edge/graph_44134307.jsonl @@ -0,0 +1,6 @@ +{"14083728|3054454": ["In principle, any channel model that accurately includes the spatial dimension could be used to investigate the correlation properties of two spatially separated antennas. For an excellent overview, see [ 2 ]."]} +{"4941832|13367219": ["In addition, the above models usually rely on the assumption of individual scatterer distribution and do not consider the cluster structure [28]\u2013[32], where clusters are usually defined as a group of multipath components (MPCs) showing similar"]} +{"6413291|18148591": ["All these effects should be considered when designing an antenna array for MIMO systems [2]."]} +{"25839645|5621151": ["The requirements with respect to isolation between antenna ports are notably exacerbated beyond those for conventional MIMO antenna systems when DSA over a large portion of the mobile spectrum is to be supported in a frequency-division duplex (FDD) system.", "Support for dynamic spectrum access (DSA) [1] and therefore operation over very large portions of the mobile radio spectrum are required.", "This feature is of high interest, not only for DSA, but also for noncontiguous intraband and interband carrier aggregation in connection with MIMO transmission."]} +{"13964836|18148591": []} +{"111246415|9141490": []} diff --git a/edge/graph_44143673.jsonl b/edge/graph_44143673.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..355293b966b79487a7efece7bc14e91c3f9fe8b1 --- /dev/null +++ b/edge/graph_44143673.jsonl @@ -0,0 +1,19 @@ +{"31024786|7704963": ["In applications like tracking a mobile object, the trajectory of the object can be predicted only with a degree of confidence [22].", "There have been many studies on probabilistic database systems [22]."]} +{"11667703|3102110": ["For the FIM (Agrawal et al., 1993; Chen et al., 1996; Han et al., 2004), it only concerns the frequencies of items or itemsets in the transactional databases.", "Many algorithms have been developed to efficiently mine the desired frequent itemsets or association rules in the binary databases (Agrawal et al., 1993; Agrawal and Srikant, 1994; Chen et al., 1996; Geng and Hamilton, 2006; Han et al., 2004).", "\u2026requirements in various domains and applications, the discovered knowledge can be generally classified as association rules (Agrawal et al., 1993; Chen et al., 1996), sequential patterns (Agrawal and Srikant, 1995; Srikant and Agrawal, 1996; Yun and Leggett, 2006),\ninteresting patterns (Geng and\u2026"]} +{"7915905|3102110": ["Depending on specific applications [2], [7], [22], [26], the discovered knowledge can be classified as association-rule mining [3], [11], [13], classification [17], clustering [6], and sequential pattern mining [5], [24], [29], among others [20], [21]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"14250542|551238": ["Motif extraction approaches are classi\ufb01ed into two categories: statistical and combinatorial [5]."]} +{"3147582|63927538": ["The 4 A's serve to highlight these measures [20].", "1 Architecture layers of big data analytics [20]"]} +{"60929349|1188683": []} +{"60929349|10739218": []} +{"3966240|7704963": ["Many traditional database and data mining techniques have been extended to be applied to uncertain databases [2].", "In an uncertain database, sequences are often assumed to be mutually independent, which is also known as the tuple-level independence [2,7]."]} +{"23354100|7704963": ["A lot of traditional database and data mining techniques have been extended to be applied to uncertain data [2].", "It is widely assumed that uncertain sequences in the sequence database are mutually independent, which is known as the tuplelevel independence [9, 2] in probabilistic databases."]} +{"16756597|9104850": ["The design of cooperative Web caching systems can be hierarchical (Harvest [11] and Squid [3]), hash [17], directory [13], and multicast [30]."]} +{"26254949|3102110": ["\u2026on the required knowledge in different applications, it can be classified in association rules (Agrawal et al., 1993; Agrawal and Srikant, 1994; Chen et al., 1996; Han et al., 2004; Nath et al., 2013), classification (Hastie et al., 2009; Kotsiantis, 2007; Wu et al., 2007), clustering\u2026", "Depending on the required knowledge in different applications, it can be classified in association rules (Agrawal et al., 1993; Agrawal and Srikant, 1994; Chen et al., 1996; Han et al., 2004; Nath et al., 2013), classification (Hastie et al."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"31305225|3102110": []} +{"16932235|3102110": ["rules, sequential patterns, classification, clustering, and time series [8,12]."]} +{"27215340|3102110": []} +{"17517987|3102110": ["When sequential patterns are generated, the newly arriving patterns may not be identified as frequent sequential patterns due to the existence of old data and sequences."]} diff --git a/edge/graph_44147498.jsonl b/edge/graph_44147498.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b06a8492385c89c4f3a6010c0671ca9af8519834 --- /dev/null +++ b/edge/graph_44147498.jsonl @@ -0,0 +1,13 @@ +{"16083601|9629338": ["Ropinski & Preim (2008) and Ropinski, Oeltze & Preim (2011) [11], [12] describe glyph-based visualization techniques in medical visualizations and give a glyph taxonomy together with guidelines for the usage of glyphs."]} +{"40990902|14970359": ["A general assembly of a functional taxonomy presented by Moeslund and Granum (2001) is shown in Figure 2.", "General assembly for functional taxonomy of markerless motion capturing according to Moeslund and Granum (2001). show potential for markerless sports movement analysis."]} +{"10226260|535786": []} +{"11801048|20905429": ["\u2026work has reported a global accuracy around 89% when classifying calm and distress condition, other works based on electrodermal activity as reported in very interesting reviews on wearable sensors for remote health monitoring [37\u201339], state stress detection rates ranging from 75% to 95% [40\u201343]."]} +{"16215183|20905429": ["Previous work has focused on the technical and engineering aspects of PPG-based wearable heart rate sensors, as well as discussion of their potential uses in health care settings [7,8,11].", "A number of different wearable sensors have been developed, which generate data that could potentially be useful in health care [7-9]."]} +{"113958660|20905429": []} +{"8130712|14866098": ["Among the previous studies above, reference [9] is most relevant to our work in terms of data type and activity recognition: it identifies teacher\u2019s physical actions, such as explanation and questioning, using multiple wearable sensors (eye-tracking, EEG, accelerometer, audio and video) during classroom enactment.", "For the human cognitive subsystem, it is still difficult to accurately define and differentiate its status, even using electroencephalography (EEG) [42] to record the brain\u2019s spontaneous electrical activity."]} +{"23079116|1691097": []} +{"23079116|10817088": []} +{"23079116|42648222": ["However, current solutions based on smartphones suffer from scalability, security and privacy issues, apart from providing only a snapshot of physiological conditions instead of a continuous and longitudinal view of the users\u2019 health status [169].", "Currently, approaches are being developed in order to avoid this information to be used for evil or non-ethical purposes [169,190,191]."]} +{"23079116|15219853": []} +{"115863887|20905429": []} +{"4443408|2511280": ["We also computed the correlation between obesity and activity inequality for specific age groups in our dataset \u2014 [10,20), [20,30), [30,40), [40,50) and [50,100), again using only subjects with a reported age."]} diff --git a/edge/graph_44148233.jsonl b/edge/graph_44148233.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c22a354b54d24f353ce865279d9ccdbe6c3ec2e --- /dev/null +++ b/edge/graph_44148233.jsonl @@ -0,0 +1,16 @@ +{"8729004|7788290": ["We will only mention a few of the more recent works on human detection here \u2013 see Gavrilla\u2019s survey [ 7 ] for older references."]} +{"15458100|393948": ["We plan to use CLEVR to study models with explicit short-term memory, facilitating comparisons between values [13, 18, 39, 42]; explore approaches that encourage learning disentangled representations [5]; and investigate methods that compile custom network architectures for different patterns of reasoning [2, 3]."]} +{"14106275|14545307": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"67856122|3693305": []} +{"123081582|14970359": [", [18], [19] provide a broad overview of over three hundred papers and numerous approaches for analyzing human motion in videos, including human motion capture, tracking, segmentation and recognition."]} +{"123081582|7788290": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"4542772|3693305": ["It can be applied in various practical applications, such as image and video retrieval [33, 44, 22], answering questions from images [21], and assisting people who suffer from vision disorders [43]."]} +{"11933981|1770055": ["As such, there is an urgent need to develop new automated evaluation metrics for this task [8,9]."]} +{"3728944|28465771": []} +{"51887402|1229096": ["The mediated perceptionbased approach depends on recognizing human-designated features, such as lane markings, traffic lights, pedestrians or cars, which generally require demanding parameter tuning for a balanced performance [19]."]} +{"4724792|16528630": ["Other methods use face detection and multi-microphone beamforming [40]."]} +{"11018317|1770055": ["Parallel to our work, Bernardi et al. (2016) summarised most of these datasets, among others, and reviewed different approaches to image description generation."]} +{"206592484|456491": []} +{"7462737|9045232": ["Various approaches to face detection have been proposed in literature [9\u201311, 14, 15, 25]."]} diff --git a/graph_4415243.jsonl b/edge/graph_4415243.jsonl similarity index 100% rename from graph_4415243.jsonl rename to edge/graph_4415243.jsonl diff --git a/edge/graph_44157493.jsonl b/edge/graph_44157493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5941c670a496c15f835650b24447b128504a2133 --- /dev/null +++ b/edge/graph_44157493.jsonl @@ -0,0 +1,2 @@ +{"86803377|16209841": []} +{"158942|27262729": ["Although transactions are secured by the mechanisms we mentioned so far, malicious users have found multiple ways to scam wallets and users (See an excellent survey on all scams in [14]).", "Some other aspects that we do not cover in this manuscript are privacy [14], and usage of digital currencies in Blockchain [47]."]} diff --git a/edge/graph_44157557.jsonl b/edge/graph_44157557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44157761.jsonl b/edge/graph_44157761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1774a80ecac58430b0f543a10cead51c9bd5e293 --- /dev/null +++ b/edge/graph_44157761.jsonl @@ -0,0 +1,4 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"15851544|16907530": ["The protocol was developed jointly by the first, third and forth authors."]} +{"15851544|11139156": ["The protocol was developed jointly by the first, third and forth authors."]} +{"29728533|55795400": ["Harleen K. Flora et al [3] from an online survey, enquired about the entire mobile application development process lifecycle."]} diff --git a/edge/graph_44157913.jsonl b/edge/graph_44157913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ea8b047009d94c2849580d5613c66e5a94607b1 --- /dev/null +++ b/edge/graph_44157913.jsonl @@ -0,0 +1,4 @@ +{"17964596|17485266": ["[89] provides a good overview of these various methods with equations and notes a few other concerns when performing stochastic optimization."]} +{"13841056|393948": []} +{"7559976|393948": ["As shown also in [13, 266], this suggests that deep neural networks learn more abstract and robust representations, encode category level information and remove, to a certain measure, the domain bias [65, 216, 51, 188]."]} +{"1033682|174797842": []} diff --git a/edge/graph_44163264.jsonl b/edge/graph_44163264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e246031f990208491642607dbcb48c8dea96efe --- /dev/null +++ b/edge/graph_44163264.jsonl @@ -0,0 +1 @@ +{"15082313|534755": ["Further reading There are a number of other reviews and method comparisons available: some focus on applications and biological interpretations [126-128], and some concentrate on methodology [129-137]."]} diff --git a/edge/graph_44171344.jsonl b/edge/graph_44171344.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44176811.jsonl b/edge/graph_44176811.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a5049b5247c366e4ba10a011cead6777673592d --- /dev/null +++ b/edge/graph_44176811.jsonl @@ -0,0 +1 @@ +{"37782697|18841702": ["\u2026because asymmetrically distributed random incident events might not follow a specific distribution (Miaou, Lu, & Lum, 1996), or interactions between contributing factors may cause the estimated model\u2019s coefficients to be sensitive to omission, misclassification, and time (Gorjian et al., 2009)."]} diff --git a/edge/graph_44187071.jsonl b/edge/graph_44187071.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4419555.jsonl b/edge/graph_4419555.jsonl similarity index 100% rename from graph_4419555.jsonl rename to edge/graph_4419555.jsonl diff --git a/graph_4419641.jsonl b/edge/graph_4419641.jsonl similarity index 100% rename from graph_4419641.jsonl rename to edge/graph_4419641.jsonl diff --git a/edge/graph_44196989.jsonl b/edge/graph_44196989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97c0134bfd2056f9645312fbbd9f12ed4dc50ec4 --- /dev/null +++ b/edge/graph_44196989.jsonl @@ -0,0 +1,2 @@ +{"110510|1708582": ["trial-and-error with an unknown dynamic environment, see (Kaelbling et al., 1996)."]} +{"62597678|49842767": []} diff --git a/edge/graph_44220217.jsonl b/edge/graph_44220217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44263259.jsonl b/edge/graph_44263259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44263717.jsonl b/edge/graph_44263717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6130253f9aef99ec03ec63fdb683521eff4ced4d --- /dev/null +++ b/edge/graph_44263717.jsonl @@ -0,0 +1,13 @@ +{"207554962|20905429": ["Wearable health-monitoring systems (WHMS) have drawn a lot of attention from the research community and the industry during the last decade as it is pointed out by the numerous and yearly increasing corresponding research and development efforts [1].", "Wearable systems for health monitoring may comprise various types of miniature sensors, wearable or even implantable [1].", "Application Identifier Type Next MMC Time Reserved WUSB Channel Time Stamp IE[0] IE[1] IE[n] .", "In addition to that, WHMS constitute a new means to address the issues of managing and monitoring chronic diseases, elderly people, postoperative rehabilitation patients, and persons with special abilities [1, 2]."]} +{"10815886|7988320": ["The primary concern of conventional WSN is power conservation rather than quality of service (QoS), such as data rate, latency and reliability, which, however, are essential in WBAN [10].", "However, this is not required in WBAN [10].", "The following discussions focus on healthcare monitoring, but they are applicable to other e-health applications."]} +{"10652697|20905429": ["List of products or prototypes based on these mechanism is given in [42], where score products and prototype are sorted by maturity score.", "Heart rate is the basic index for activity quantification, therefore WHRM (Wireless heart rate monitoring) is essential module in activity quantification system.", "Application Goal The sensor devices used The sensing and data processing technologies Fall detection IMU[33],[27],Accelerometers[10],[7],Gyroscope[6] Thresholding[33],[27],[10],[7], Gait analysis IMU[43], Pressure Sensor[44],Combination [38] Key spots extraction[43],[44], Parameter extraction[37], Pattern analysis [5] Activity Quantification WHRM [42], Accelerometers+WHRM[34],[47] Oxygen consumption analysis[45],Empirical function[47][34] Heart State Sensing Wireless ECG sensor[29]; measuring body sound at the neck[36]; wearable textile sensors [48]; Arduino-Nano board, nRF24AP1 and Xbee sensor [49]; ECG analysis [29], [30], [28]; wavelet transformation of sound signal to detect heart rate and respiratory rate[36]; Distributed computing based on ECG-based sensing[46]; vital heart signal detection by textile sensors [48]; real-time cardiovascular disease detection by detecting irregular rhythmic beating[11]; Sleep Sensing Polysomnography [1]; Actigraphy by mobile phone[24], [17]; alarm lock[23]; whist-weared devices [22], [25]; ultra-thin (0.", "As a result, WHRM is used as a basic sensing module, whose result is believable."]} +{"17008910|15126268": []} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"73213|1230643": ["In recent years, wireless sensor networks (WSNs) have been widely deployed for practical applications [1] because of their cost-effectiveness."]} +{"73213|12060835": ["In [11] and [12], future energy availability is predicted with weightedmoving-average-based methods using historical energy availability data stored for the past few days, augmented with weather conditions."]} +{"17679909|12060835": ["Recently, alternative methods for powering sensor nodes, which convert the ambient energy from environments into electricity to power sensor nodes, are being actively studied [ 1 ], [2]."]} diff --git a/graph_4427557.jsonl b/edge/graph_4427557.jsonl similarity index 100% rename from graph_4427557.jsonl rename to edge/graph_4427557.jsonl diff --git a/edge/graph_44286242.jsonl b/edge/graph_44286242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44307818.jsonl b/edge/graph_44307818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90e1d54d2fd7218eac4e349dcb37144d8b33e2b5 --- /dev/null +++ b/edge/graph_44307818.jsonl @@ -0,0 +1,8 @@ +{"60610459|11810221": []} +{"6849168|7773456": ["Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12.0). BrumeUe & Sidney [1982] show that Johnson's [1954] algorithm for F21 I C max also applies to the exponential case.", "Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12."]} +{"17842850|15813404": ["Keywords: analysis of algorithms \u2022 computational complexity \u2022 programming \u2022 nonlinear \u2022 production-scheduling: single machine \u2022 production-scheduling: multiple machines", "Fo r\npe rs\non al\nu se\no nl\ny, a\nll ri\ngh ts\nr es\ner ve\nd.\nbeen actively studied since the 1980s; see the surveys by Nowicki and Zdrza\u0142ka (1990), Shabtay and Steiner (2007)."]} +{"15157268|15813404": ["The surveys [12, 14] give good reviews of the research in this area."]} +{"42790612|15813404": [", surveys by Nowicki and Zdrza\u0142ka [16] and by Shabtay and Steiner [22].", "Scheduling problems with controllable processing times have received considerable attention since the 1980s, see, e.g., surveys by Nowicki and Zdrza\u0142ka [16] and by Shabtay and Steiner [22].", "This area of scheduling has been active since the 1980s, see surveys [16] and [22].", "Even the most recent survey by Shabtay and Steiner [22] makes no mention of the imprecise computation research."]} +{"17855640|15813404": ["It follows that Scheduling problems with controllable processing times have received considerable attention since the 1980s, see, e.g., surveys by Nowicki and Zdrza\u00f7ka [9] and by Shabtay and Steiner [13].", "Although the \u2026rst studies on the \u00a64 problems date as early as 1982 [21], positive results for these problems are still quite rare, as admitted in the survey [13]."]} +{"15813404|62204132": []} +{"8918082|15813404": ["Even the most recent survey by Shabtay and Steiner (2007) makes no mention of the imprecise computation research.", "This area of scheduling has been active since the 1980s, see surveys by Nowicki and Zdrza\u0142ka (1990) and Shabtay and Steiner (2007).", "The survey by Shabtay and Steiner (2007) reviews the body of research on both mentioned models with controllable times."]} diff --git a/edge/graph_44362775.jsonl b/edge/graph_44362775.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..578615c8305d2fe157dca737a0e500eec374ce6a --- /dev/null +++ b/edge/graph_44362775.jsonl @@ -0,0 +1,4 @@ +{"1333339|14745481": ["Applications of trust management is enormous in mobile networks [20].", "Apart from these, some application specific attack models are discussed in [20], [101], [102].", "The detailed survey on various trust computation mechanisms, trust dynamics and their inter operations are missing in [20].", "There is a recent survey on trust management for MANET in [20]."]} +{"1333339|10137283": []} +{"1333339|9240891": []} +{"1333339|10859599": ["Apart from these, some application specific attack models are discussed in [20], [101], [102]."]} diff --git a/edge/graph_44368837.jsonl b/edge/graph_44368837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44407278.jsonl b/edge/graph_44407278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9883661671495b038a4f607cac7ade2e9e5b839 --- /dev/null +++ b/edge/graph_44407278.jsonl @@ -0,0 +1,5 @@ +{"4554838|1236072": []} +{"8133548|1230643": ["These tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes [3]."]} +{"207171842|8914588": ["2006; Huebscher and McCann 2008].", "point out, trust is not necessarily based on self-adaptive services or its quality [McCann et al. 2006; Huebscher and McCann 2008]."]} +{"207171842|1975139": ["survey several ADLs based on graphs, process algebras, and other formalisms for dynamic software architectures [Bradbury et al. 2004]."]} +{"57127025|1236072": []} diff --git a/edge/graph_44414506.jsonl b/edge/graph_44414506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44415275.jsonl b/edge/graph_44415275.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a9717da944eac6ea7cb3d9a0faa484c4f129361 --- /dev/null +++ b/edge/graph_44415275.jsonl @@ -0,0 +1,7 @@ +{"46547247|7919236": []} +{"875571|1708582": []} +{"31411108|3202525": ["Here, the majority of context information moves from outside world to online environment, with the following groups of context elements, as stated in [14]: computing, location, physical conditions, time, activity, resource, user, social relations."]} +{"42132898|3202525": []} +{"12379669|1805048": []} +{"8174072|1805048": ["sive survey for CF techniques is presented in [9].", "These include, for example, the cold start, sparsity, scalability, and Gray Sheeps problems [9]."]} +{"206710454|1805048": ["Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.", "Su and Khoshgoftaar [212] presents a survey of CF techniques.", "The rest of this section deal is dealt with the concepts and research in the two lines considered previously: Filtering of social information and content filtering.", "The pure CBF has several shortcomings [16,176,212]:", "Breese et al. [43] evaluated the predictive accuracy of different algorithms for CF; later, the classical paper [94] describes the base for evaluating the Collaborative Filtering RS.", "Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.g. videos, songs, films, etc. in a CF based website) in such a way that when enough information is stored on the system, we can make recommendations to each user based on information provided by those users we consider to have the most in common with them.", "Collaborative Filtering (CF) methods play an important role in the recommendation, although they are often used along with other filterning techniques like content-based, knowledge-based or social ones."]} diff --git a/edge/graph_44461432.jsonl b/edge/graph_44461432.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6be5924a9ba3b5175c14db0556e2c3026c1743be --- /dev/null +++ b/edge/graph_44461432.jsonl @@ -0,0 +1,17 @@ +{"9385544|16362395": []} +{"9385544|8365617": []} +{"16002819|1236072": ["Wireless sensor networks (WSNs) [ 3 ] have attracted remarkable attention in the research community recently, driven by a wealth of theoretical and practical challenges and increasing number of practical civilian applications."]} +{"6489646|18890": ["Many approaches and techniques have been proposed in the past decade [1, 2, 4, 9, 10, 13, 14, 16, 18, 19, 21, 27, 31, 32] that address the problem of similarity in time series."]} +{"9678462|7089409": ["have been used to develop credit scoring models[4-6].", "ANN achieved better performance than these techniques, so it is considered to be the proper alternative to these conventional techniques in credit scoring [4, 26].", "LDA is still one of the most commonly used techniques in developing credit scoring models[4].", "Hence, loan granting decisions were inaccurate, more subjective and time consuming [4]."]} +{"60496670|11608263": ["More measures can be found in [130, 162, 101, 147]."]} +{"14534939|1898434": ["\uf0a0 In [5], a survey on sensor networks is conducted from multi-agent perspective."]} +{"14534939|62453632": ["\uf0a0 In [2], the MAs fall into three categories --- mobile software agents, mobile hardware agents and sensor nodes as agents."]} +{"4388126|3102110": ["Data mining, also known as knowledge discovery in databases, aims at the discovery of useful information from large collections of data [2], [8], [38]."]} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"14178481|11894197": ["Finally, an embedded approach selects features using the information obtained from training a classi\ufb01er and is thereby embedded (learning and feature selection tasks cannot be separated) in and speci\ufb01c to a model [Saeys et al. 2007]."]} +{"18654252|7774517": ["In [17], a detailed overview of the existing outlier detection techniques for the WSN is given.", "\u2022 We have found general surveys on outlier detection such as [13, 14, 15, 16, 17, 18] and surveys on network anomaly detection such as [19, 20, 21]."]} +{"18654252|3330313": ["Outlier detection approaches found in literature [13, 14, 15, 16] have varying scopes and abilities.", "\u2022 We have found general surveys on outlier detection such as [13, 14, 15, 16, 17, 18] and surveys on network anomaly detection such as [19, 20, 21]."]} +{"195649387|16403716": []} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"400217|7988320": []} +{"400217|16514036": []} diff --git a/graph_4449.jsonl b/edge/graph_4449.jsonl similarity index 100% rename from graph_4449.jsonl rename to edge/graph_4449.jsonl diff --git a/edge/graph_44500477.jsonl b/edge/graph_44500477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f795a38d9182e020d0a7d1f081beb630d762c7e2 --- /dev/null +++ b/edge/graph_44500477.jsonl @@ -0,0 +1,2 @@ +{"36155088|2319437": ["The dynamic load balancing approach has three most important policies: transfer policy, information policy and location policy [21,22,24]."]} +{"22705172|912956": ["Load balancing in distributed hash tables (DHTs) shares common challenges, and in some respect solutions, with other domains such as network load balancing, in which multiple interfaces are used for simultaneous data transmissions [3], or even multiprocessor scheduling problems [4] that must assign"]} diff --git a/graph_4450875.jsonl b/edge/graph_4450875.jsonl similarity index 100% rename from graph_4450875.jsonl rename to edge/graph_4450875.jsonl diff --git a/edge/graph_4451760.jsonl b/edge/graph_4451760.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44575906.jsonl b/edge/graph_44575906.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a18b2108fae75eb3abf88c3619f74a816a24619 --- /dev/null +++ b/edge/graph_44575906.jsonl @@ -0,0 +1 @@ +{"14385773|207584909": ["In industry sectors, such as manufacturing, aviation, and logistics, M&S techniques have led to major improvements in decision making, efficiency, and quality [2-5]."]} diff --git a/graph_4458746.jsonl b/edge/graph_4458746.jsonl similarity index 100% rename from graph_4458746.jsonl rename to edge/graph_4458746.jsonl diff --git a/edge/graph_44621519.jsonl b/edge/graph_44621519.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6918121822fa3be6696e0792358d4beb0edc1ac0 --- /dev/null +++ b/edge/graph_44621519.jsonl @@ -0,0 +1,3 @@ +{"14231594|2623404": ["Either GMPLS or SDN-based controllers can be deployed.", "As result, SDN controllers promise to assure the level of flexibility required by network operators to address dynamicity requirements demanded by telco clouds.", "However, cloud applications require data delivery services, i.e., end-to-end connections, at different grain and level of abstraction as regard the connectivity services traditionally available at the GMPLS UNI and at the northbound interface of SDN controller.", "On top of the GMPLS/SDN controllers, an orchestration platform is foreseen to provide straightforward interworking with DC/Cloud orchestrators, while fostering effective coordination of provisioning functions across cloud and network resource domains.", "Thanks to inherent network virtualization capabilities given by flow-based abstraction and to highprogrammability of network functionalities through the OpenFlow protocol, the SDN approach emerged as a more promising methodology to support agile QoS-aware virtual network provisioning and effective end-to-end network control capabilities for the benefit of the applications that use the network.", ", Software-Defining Networking (SDN) [5] promise to effectively address the agility and flexibility demanded by cloud services.", "Indeed, this work is built upon a couple of previous contributions where authors provided, firstly, an orchestrator for DCs able to coordinate the joint\n978-1-4673-7880-2/15/$31.00 \u00a92015 IEEE 1\nprovision of virtual machines and data delivery paths in an SDN-based intra-DC network [13] and, secondly, a management platform for inter-DC optical networks for latency-aware applications [14].", "More sophisticated solutions deploy a network-aware approach by leveraging intra-DC network controllers, e.g., SDN controllers.", "Moreover, advances in control plane technologies, i.e., Software-Defining Networking (SDN) [5] promise to effectively address the agility and flexibility demanded by cloud services."]} +{"14755515|7971188": ["monitor system components based on decentralized messaging and information indexing infrastructure, called Distributed Hash Tables (DHTs) [ 26 ]."]} +{"36227357|2623404": []} diff --git a/edge/graph_44695437.jsonl b/edge/graph_44695437.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..361da535a7aed5ce071b0dae4158e657a09bc6de --- /dev/null +++ b/edge/graph_44695437.jsonl @@ -0,0 +1,3 @@ +{"13601396|15033413": ["As pointed out in [34], at this time, there are no computers that can replace an experienced dermatologist\u2019s intuition: a blind trust of the judgement of any computerized system could lead the clinician to a failure in the diagnosis.", "to 75%, indicating a need for additional diagnostic tools [12, 36, 34].", "The acquisition of dermoscopic images has also stimulated the automatization of the diagnostic process: many rather successful computer programs have been implemented to automatically analyze melanocytic lesions, providing the dermatologist with a support in the diagnosis phase [4, 9, 34, 41, 44].", "Many different techniques such as decision trees, support vector machine, extreme learning machine, statistical methods, the k-nearest neighbor (k-NN) and many others have been developed to perform the classification step, with a very wide range of results in terms of sensitivity, specificity and diagnostic accuracy: see [34] for a summary of the results obtained by many different algorithms in the last two decades; see also [14] and [19] for a comparison between automatic and human performance.", "On the other hand, as stated in [34], the major difficulty of k-NN algorithms lies in the definition of a metric that measures the distance between data items."]} +{"17614465|18440098": ["In today\u2019s world, communication is predominantly expressed in the form of voice sounds, but for anyone with an inability to communicate using voice an alternative form of communication such as sign language is needed."]} +{"37400628|987239": ["The core of a content-based 3D retrieval system is given by 3D shape descriptors and comparison measures [ 47 ].", "through general purpose repositories and through domainspecific sources [ 47 ]."]} diff --git a/graph_4470456.jsonl b/edge/graph_4470456.jsonl similarity index 100% rename from graph_4470456.jsonl rename to edge/graph_4470456.jsonl diff --git a/edge/graph_44705580.jsonl b/edge/graph_44705580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4470874.jsonl b/edge/graph_4470874.jsonl similarity index 100% rename from graph_4470874.jsonl rename to edge/graph_4470874.jsonl diff --git a/edge/graph_4473963.jsonl b/edge/graph_4473963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4474193.jsonl b/edge/graph_4474193.jsonl similarity index 100% rename from graph_4474193.jsonl rename to edge/graph_4474193.jsonl diff --git a/edge/graph_44773229.jsonl b/edge/graph_44773229.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44823813.jsonl b/edge/graph_44823813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44824627.jsonl b/edge/graph_44824627.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c73b19f82e1e4c159414cf270e0ea4df15611a15 --- /dev/null +++ b/edge/graph_44824627.jsonl @@ -0,0 +1 @@ +{"10767706|192934": ["Also a linear Bayes Normal classifier [13] has been used as reference using the routines available in the well-known Matlab toolbox for pattern recognition PRTool [14].", "The evaluation of the system accuracy has been performed by N-fold cross-validation technique [13] where N was chosen equals to 10.", "The most relevant features have been found by applying a feature selection technique called forward selection based on nearest neighbor classifier evaluated with Leave One Out method [13]."]} diff --git a/edge/graph_44829342.jsonl b/edge/graph_44829342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8674bc90efd4403475d71911897b6d9899193792 --- /dev/null +++ b/edge/graph_44829342.jsonl @@ -0,0 +1,2 @@ +{"11327804|9869210": ["It also lets us transparently integrate recent pixel labeling CNNs (Thoma 2016), and leverage any advances in this \ufb01eld to apply them to image synthesis.", "If the semantic map and m l is zero, the original algorithm (2016) is intact.", "Unfortunately, while CNNs routinely extract semantic information during classi\ufb01cation, such information is poorly exploited by generative algorithms\u2014as evidenced by frequent glitches.", "The semantic map can also be a collection of layer mask per label as output by existing CNNs, or even some kind of \u201csemantic embedding\u201d that compactly describes image pixels (i.e. the representation for hair, beards, and eye-brows in portraits would be in close proximity).", "Thankfully, recent CNN architectures are capable of providing such semantic context, typically by performing pixel labeling and segmentation (Thoma 2016).", "Image processing algorithms have improved dramatically thanks to CNNs trained on image classi\ufb01cation problems to extract underlying patterns from large datasets (Simonyan and Zisserman 2014).", "The most commonly used CNNs for image synthesis is VGG (2014), which combines pooling and convolution layers l with 3 \u00d7 3 \ufb01lters (e.g. the \ufb01rst layer after third pool is named conv4 1 ).", "While CNNs used for classi\ufb01cation can be re-purposed to extract style features (e.g. textures, grain, strokes), they were not architected or trained for correct synthesis."]} +{"60242952|12068725": []} diff --git a/edge/graph_44843617.jsonl b/edge/graph_44843617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44857108.jsonl b/edge/graph_44857108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..797552a0b73b24ffd6512e21ba96b8aa493ced93 --- /dev/null +++ b/edge/graph_44857108.jsonl @@ -0,0 +1,5 @@ +{"29617882|15164501": ["We refer to an extensive literature review on culture in IS research in which Leidner and Keyworth (2006) differentiate the following relations between the concepts culture and IT: the impact of culture on IT, the impact of IT on culture, and IT culture.", "Therefore, we analyzed all papers mentioning or elaborating on culture with regard to the following two dimensions derived from extant research on culture and particularly from culture research in the IS discipline (Leidner and Keyworth, 2006).", "In their research on culture in IS, Leidner and Keyworth (2006) recognize the differences between a national, organizational, and subgroup level of culture and suggest a holistic understanding of culture based on its manifestation.", "As we had assumed based on existing research on culture in IS, there are papers that reference a BPM culture."]} +{"116320506|1076078": []} +{"116320506|14639861": []} +{"156860777|9948664": []} +{"156860777|54878689": []} diff --git a/edge/graph_4491892.jsonl b/edge/graph_4491892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_44922276.jsonl b/edge/graph_44922276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2105462fad9e050b73ebcfb58685181d7af18e7e --- /dev/null +++ b/edge/graph_44922276.jsonl @@ -0,0 +1,2 @@ +{"31218829|1142636": []} +{"8688887|1142636": []} diff --git a/edge/graph_44944144.jsonl b/edge/graph_44944144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11d31953e950f0f099b4a8d121f3d523ed588e02 --- /dev/null +++ b/edge/graph_44944144.jsonl @@ -0,0 +1,5 @@ +{"786700|10559330": ["IntServ [ 4 ] architecture allows sources to communicate their QoS requirements to routers and destinations on the data path by means of a signaling protocol such as RSVP [13] and dRSVP (for specifying a range of QoS requirements)[16]."]} +{"16419613|1110872": []} +{"6438719|14441987": []} +{"5842782|10287248": ["QoS routing has been receiving increasingly intensive attention in the wireline network domain [10].", "source node or by a distributed computation [10]."]} +{"6084040|14441987": ["This has led to the development of Mobile Ad-hoc Networks[ 1 ]."]} diff --git a/edge/graph_4495234.jsonl b/edge/graph_4495234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4495673.jsonl b/edge/graph_4495673.jsonl similarity index 100% rename from graph_4495673.jsonl rename to edge/graph_4495673.jsonl diff --git a/edge/graph_44956948.jsonl b/edge/graph_44956948.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eba0a7ae9f3694becafc538a78f59e87970dd2b9 --- /dev/null +++ b/edge/graph_44956948.jsonl @@ -0,0 +1 @@ +{"1719411|17442795": ["They can vary in severity between minor nuisance and death (Mur\ufb00 et al. 2003)."]} diff --git a/edge/graph_44964640.jsonl b/edge/graph_44964640.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd20489638b6eeb6eb582fc6c35e443492e4960a --- /dev/null +++ b/edge/graph_44964640.jsonl @@ -0,0 +1 @@ +{"7604132|6415369": ["\u2026related to key performance characteristics [4] [5], design structure matrix focusing on the decomposition and integration of design problems [6] [7], product architecture dealing with product platform and variety [8], decision making for modeling multiple trade-offs [5] [9] [10], and\u2026"]} diff --git a/edge/graph_45012744.jsonl b/edge/graph_45012744.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be06d7ca7a81ff8d38c825bcc5ee6365ce40dfdb --- /dev/null +++ b/edge/graph_45012744.jsonl @@ -0,0 +1 @@ +{"33320013|18148591": ["Multiple-input\u2013multiple-output technology promises significant improvements in terms of spectral efficiency and link reliability [1]."]} diff --git a/graph_4502294.jsonl b/edge/graph_4502294.jsonl similarity index 100% rename from graph_4502294.jsonl rename to edge/graph_4502294.jsonl diff --git a/edge/graph_45029322.jsonl b/edge/graph_45029322.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a52a512f92a79a0efd84024d7414eff791ca9727 --- /dev/null +++ b/edge/graph_45029322.jsonl @@ -0,0 +1,6 @@ +{"59794439|397187": []} +{"10051304|6863252": ["Maintz and Viergever [8], Brown [9], Zitova and Flusser [10], and Sotiras et al. [11] provide extensive reviews on various image registration methods."]} +{"206974949|16016699": []} +{"30842307|9020157": []} +{"361379|206051485": ["The framework and its applications were evaluated with a number of tests, which show that the proposed approaches achieve valuable results when compared with state-of-the-art techniques."]} +{"43211993|206051485": ["A wide variety of techniques are used for registration (Zitova and Flusser, 2003; Modersitzki, 2009), from tracking features to similarity measures based on pixel intensity, such as least squares (i.e. sum-of-squared differences) or mutual information."]} diff --git a/graph_4503761.jsonl b/edge/graph_4503761.jsonl similarity index 100% rename from graph_4503761.jsonl rename to edge/graph_4503761.jsonl diff --git a/edge/graph_45073059.jsonl b/edge/graph_45073059.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9120e561ed0f9f33749e2f2b99f5fa7d462d339 --- /dev/null +++ b/edge/graph_45073059.jsonl @@ -0,0 +1 @@ +{"86004897|45073059": []} diff --git a/edge/graph_45075194.jsonl b/edge/graph_45075194.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4511392.jsonl b/edge/graph_4511392.jsonl similarity index 100% rename from graph_4511392.jsonl rename to edge/graph_4511392.jsonl diff --git a/edge/graph_45117374.jsonl b/edge/graph_45117374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e3a39e3df4a9dfe1f268406a3adde7b7c08d05d --- /dev/null +++ b/edge/graph_45117374.jsonl @@ -0,0 +1 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/edge/graph_45124087.jsonl b/edge/graph_45124087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..856fb7a6d0fa3b7ea45c590a153c8fcc2456629c --- /dev/null +++ b/edge/graph_45124087.jsonl @@ -0,0 +1 @@ +{"9692026|3336775": ["REED is related to secure deletion (see detailed surveys [27], [45]), which ensures that securely deleted data is permanently inaccessible by anyone."]} diff --git a/edge/graph_45139696.jsonl b/edge/graph_45139696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45141284.jsonl b/edge/graph_45141284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b347bcdff0ae9cb537c3c20084412d33147a930 --- /dev/null +++ b/edge/graph_45141284.jsonl @@ -0,0 +1 @@ +{"37451448|6746689": []} diff --git a/edge/graph_45148195.jsonl b/edge/graph_45148195.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f2fe09b1ff5c7fac0333b15219aed0f074d695e --- /dev/null +++ b/edge/graph_45148195.jsonl @@ -0,0 +1,7 @@ +{"17774107|5338241": ["Asignal can be detected by checking the interference with the detector\u2019s signal[12], [17], [36]."]} +{"17774107|14513433": ["229 Multiple Access (CDMA), Orthogonal Frequency Division Multiple Access (OFDMA) [24], [26], [27].", "This device is available in various forms on single-chip custom Integrated Circuits (ICs), of which the most commonly used for software radio are Digital Signal Processors (DSPs), Field Programmable Gate Arrays (FPGAs), General-Purpose Processors (GPPs), Application Specific Integrated Circuits (ASICs), and System-on-Chip (SoC) with hardware accelerators [21], [24], [25]."]} +{"17774107|2509135": ["cognitive radio can change the radio frequency, transmission power,modulation scheme, communication protocol in order to reach the optimal working [9], [11], [12]."]} +{"159036|12452682": [", [9], [11], and [13])."]} +{"2509135|12452682": []} +{"2075465|2509135": ["The readers may refer to other publications in recent reviews [217], [218] and recent special issues, e."]} +{"2075465|12601073": []} diff --git a/edge/graph_4518464.jsonl b/edge/graph_4518464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_452098.jsonl b/edge/graph_452098.jsonl similarity index 100% rename from graph_452098.jsonl rename to edge/graph_452098.jsonl diff --git a/edge/graph_452134.jsonl b/edge/graph_452134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45220210.jsonl b/edge/graph_45220210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebb08e160ab2a1728fc42fe5147aae4f45f1b13b --- /dev/null +++ b/edge/graph_45220210.jsonl @@ -0,0 +1,3 @@ +{"26514971|45220210": []} +{"11400298|2294541": ["[10] attacker model, thus deviating from the designated honest-but-curious behavior examined here."]} +{"37128184|2294541": ["[10] attacker model, thus deviating from the designated honest-but-curious behavior examined here."]} diff --git a/edge/graph_45227140.jsonl b/edge/graph_45227140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..961ccfcbad739a4e3db5491074c3f416e8366962 --- /dev/null +++ b/edge/graph_45227140.jsonl @@ -0,0 +1 @@ +{"17355856|17567998": ["Opposed to this, architecture-based software reliability analysis ([2,3,4]) aims at improving reliability of componentbased software architectures already during early development stages.", "several architecture-based reliability analysis approaches have been proposed [2,3,4] treating systems as a composition of software components."]} diff --git a/edge/graph_45233739.jsonl b/edge/graph_45233739.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5580029a1eb181d838440352859198c6db727ceb --- /dev/null +++ b/edge/graph_45233739.jsonl @@ -0,0 +1,15 @@ +{"14985136|2355696": []} +{"6258457|9045232": ["From the plethora of face detection algorithms [40] we selected the Viola Jones algorithm, which is actually a cascade of boosted classifiers working with Haarlike features."]} +{"2629186|9045232": ["Automatic detectors exist for several broad classes of objects, such as faces [22] or signs [20]."]} +{"8909542|6857179": ["Recent works in HCI/HRI have investigated the use of a dimensional representation and further exploration of the utility of dimensional representations in HCI/HRI is advised [4], [7]."]} +{"8909542|2355696": []} +{"8909542|1118130": ["This is closely related to social signal processing in HCI/HRI [192], [193]."]} +{"464515|6857179": ["We therefore describe here a developmental robot system with the goal of: 1) advancing computational models of emotion in both developmental psychology and autonomous robotics; and 2) using infant development as a clue to develop a robot with a powerful emotion system."]} +{"753606|14866098": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"753606|16362395": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"9522643|5401262": ["Design and development of an automated system that can detect and interpret human affective behavior is an interesting and challenging problem [22], impacting important applications in many areas."]} +{"1921438|5401262": []} +{"1921438|9036392": ["(The details of this procedure were presented in [30]."]} +{"1921438|192934": ["As reported in [35], an acceptable rule of thumb for the size of the", "Feature selection was preferred to PCA in this case since the needed reduction was lower, permitting us to retain a large number of the original features, together with their physical interpretation [35]."]} +{"58267700|5664472": []} +{"58267700|8729078": []} diff --git a/edge/graph_45235845.jsonl b/edge/graph_45235845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddc191f5fdd53300d44e4962af370e5613f13530 --- /dev/null +++ b/edge/graph_45235845.jsonl @@ -0,0 +1,6 @@ +{"7209525|7971188": []} +{"423932|12765832": ["Extensive research has focused on how to maintain the global reachability of a device without interruption even when it is moving around [1]\u2013[3]."]} +{"4700370|14441987": []} +{"18000270|2835258": []} +{"18000270|14441987": []} +{"18000270|1762301": ["Hybrid protocols are a new generation of protocols, a combination of both proactive and reactive protocols.", "They could be Reactive (On-demand), Proactive (Table-driven) or Hybrid [6]-[15].", "Hybrid routing protocols such as the ZHLS may also perform well in large networks.", "Some examples of Hybrid Routing Protocols include CEDAR [37], ZRP [38] and SRP [39]."]} diff --git a/edge/graph_45245066.jsonl b/edge/graph_45245066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84635970d916cafbca09bfe3e9d11c687c2d6d7b --- /dev/null +++ b/edge/graph_45245066.jsonl @@ -0,0 +1 @@ +{"543929|54009499": ["A variety of taxonomies for classifying the general lot-sizing problem are proposed in Drexl and Kimms (1997), Karimi et al. (2003), Robinson and Lawrence (2004), Jans and Degraeve (2008) and Robinson et al. (2009)."]} diff --git a/edge/graph_4528002.jsonl b/edge/graph_4528002.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45345381.jsonl b/edge/graph_45345381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b20e9130f7373043f9d643bc6c78ab95a575392 --- /dev/null +++ b/edge/graph_45345381.jsonl @@ -0,0 +1,3 @@ +{"18655328|14068482": ["Thus, the Sensor Web is to sensor resources what the WWW is to general information sources\u2014an infrastructure allowing users to easily share their sensor resources in a well-defined way [15]."]} +{"18875973|14441987": ["MobiComp came into being when mobile clients appeared in 1990s such that building applications required the support of mobile networking [10] [11], mobile information access [12] and application adaptation [13]."]} +{"18875973|15640936": ["MobiComp came into being when mobile clients appeared in 1990s such that building applications required the support of mobile networking [10] [11], mobile information access [12] and application adaptation [13]."]} diff --git a/graph_453954.jsonl b/edge/graph_453954.jsonl similarity index 100% rename from graph_453954.jsonl rename to edge/graph_453954.jsonl diff --git a/graph_4539626.jsonl b/edge/graph_4539626.jsonl similarity index 100% rename from graph_4539626.jsonl rename to edge/graph_4539626.jsonl diff --git a/edge/graph_45431502.jsonl b/edge/graph_45431502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45443560.jsonl b/edge/graph_45443560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9106fe223806ffd6e4752ad7007bd8e257145ea5 --- /dev/null +++ b/edge/graph_45443560.jsonl @@ -0,0 +1,3 @@ +{"7613242|1230643": ["The concepts of micro\u2013sensing and wireless communication in WSNs promise a wide variety of applications such as military battlefield surveillance , biocomplexity mapping of the environment, telemonitoring of human physiological data, and seismic structure response [1]."]} +{"35066030|1230643": ["Excellent surveys include [95] and [22], and [2] for sensors networks specifically."]} +{"35066030|14441987": ["Excellent surveys include [95] and [22], and [2] for sensors networks specifically."]} diff --git a/edge/graph_45459360.jsonl b/edge/graph_45459360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45478730.jsonl b/edge/graph_45478730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4551015.jsonl b/edge/graph_4551015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4555914.jsonl b/edge/graph_4555914.jsonl similarity index 100% rename from graph_4555914.jsonl rename to edge/graph_4555914.jsonl diff --git a/edge/graph_45562002.jsonl b/edge/graph_45562002.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45607703.jsonl b/edge/graph_45607703.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45609748.jsonl b/edge/graph_45609748.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f811943aadf5030dd573961156df4af934c103b --- /dev/null +++ b/edge/graph_45609748.jsonl @@ -0,0 +1,3 @@ +{"15651086|44944144": []} +{"7389228|14441987": ["Most existing designs of ad hoc networks are based on the assumption of non-adversarial environments [1], i."]} +{"8003205|10859599": ["Such capacities and guarantees have been identified as survivability requirements in our previous work [17]."]} diff --git a/edge/graph_45638922.jsonl b/edge/graph_45638922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f41db287c03e3b1541fc8d4db63a801f1f7a532f --- /dev/null +++ b/edge/graph_45638922.jsonl @@ -0,0 +1,8 @@ +{"12017064|12815020": ["In [36], we discussed existing NIDS approaches to Cloud."]} +{"61656706|12815020": []} +{"11477596|3042864": ["The aforementioned limitations served as motivation for a new computing paradigm called MCC that enhances the abilities of mobile devices by moving the storage and compute intensive tasks of mobile to the cloud [56,82]."]} +{"11477596|13210924": ["The resources are provided to the users and released based on demands from the pool of shared resources [4].", "The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]."]} +{"11477596|13916820": []} +{"11477596|12017064": ["The security solutions have also been presented in [71].", "[71] reviewed the security issues at different levels of cloud computing."]} +{"3057478|14420517": ["There are several security standard specifications [79] such as Security Assertion Markup Language (SAML), WSSecurity, Extensible Access Control Markup (XACML), XML Digital Signature, XML Encryption, Key Management Specification (XKMS), WS-Federation, WS-Secure Conversation, WS-Security Policy and WS-Trust."]} +{"3057478|627405": ["We have carried out a systematic review [13-15] of the existing literature regarding security in Cloud Computing, not only in order to summarize the existing vulnerabilities and threats concerning this topic but also to identify and analyze the current state and the most important security issues for Cloud Computing."]} diff --git a/edge/graph_456491.jsonl b/edge/graph_456491.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4566470.jsonl b/edge/graph_4566470.jsonl similarity index 100% rename from graph_4566470.jsonl rename to edge/graph_4566470.jsonl diff --git a/graph_4566623.jsonl b/edge/graph_4566623.jsonl similarity index 100% rename from graph_4566623.jsonl rename to edge/graph_4566623.jsonl diff --git a/graph_4568419.jsonl b/edge/graph_4568419.jsonl similarity index 100% rename from graph_4568419.jsonl rename to edge/graph_4568419.jsonl diff --git a/graph_4570087.jsonl b/edge/graph_4570087.jsonl similarity index 100% rename from graph_4570087.jsonl rename to edge/graph_4570087.jsonl diff --git a/graph_4570697.jsonl b/edge/graph_4570697.jsonl similarity index 100% rename from graph_4570697.jsonl rename to edge/graph_4570697.jsonl diff --git a/graph_4572006.jsonl b/edge/graph_4572006.jsonl similarity index 100% rename from graph_4572006.jsonl rename to edge/graph_4572006.jsonl diff --git a/graph_4572654.jsonl b/edge/graph_4572654.jsonl similarity index 100% rename from graph_4572654.jsonl rename to edge/graph_4572654.jsonl diff --git a/edge/graph_45733211.jsonl b/edge/graph_45733211.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45739698.jsonl b/edge/graph_45739698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4c53431d0e54bdd0b234d620f2b50899ee52934 --- /dev/null +++ b/edge/graph_45739698.jsonl @@ -0,0 +1 @@ +{"5934298|13372227": ["Finally, the adversary may estimate the user location by using cellular positioning techniques [34], e."]} diff --git a/graph_4576140.jsonl b/edge/graph_4576140.jsonl similarity index 100% rename from graph_4576140.jsonl rename to edge/graph_4576140.jsonl diff --git a/graph_4577512.jsonl b/edge/graph_4577512.jsonl similarity index 100% rename from graph_4577512.jsonl rename to edge/graph_4577512.jsonl diff --git a/edge/graph_45775424.jsonl b/edge/graph_45775424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d46de4fddd49d6d4369f7b484cbcaeba9a0c4b90 --- /dev/null +++ b/edge/graph_45775424.jsonl @@ -0,0 +1,2 @@ +{"13499492|16709997": ["Chris Hand [ 5 ] presented a comprehensive survey were he discusses some of the design issues for freespace three-dimensional user interfaces."]} +{"14953052|469744": ["A well subscribed general definition demands that AR systems must: superimpose virtual information on the real world, be interactive in real time and be spatial, the virtual objects registered and interactive in the real world [4]."]} diff --git a/edge/graph_45790373.jsonl b/edge/graph_45790373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45796493.jsonl b/edge/graph_45796493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45803955.jsonl b/edge/graph_45803955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45806091.jsonl b/edge/graph_45806091.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_45808187.jsonl b/edge/graph_45808187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4581979.jsonl b/edge/graph_4581979.jsonl similarity index 100% rename from graph_4581979.jsonl rename to edge/graph_4581979.jsonl diff --git a/edge/graph_4582104.jsonl b/edge/graph_4582104.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4583335.jsonl b/edge/graph_4583335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4583883.jsonl b/edge/graph_4583883.jsonl similarity index 100% rename from graph_4583883.jsonl rename to edge/graph_4583883.jsonl diff --git a/edge/graph_45867808.jsonl b/edge/graph_45867808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e80062a73e82c574cc48888872c82bd3dd71108 --- /dev/null +++ b/edge/graph_45867808.jsonl @@ -0,0 +1,3 @@ +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} diff --git a/graph_4589744.jsonl b/edge/graph_4589744.jsonl similarity index 100% rename from graph_4589744.jsonl rename to edge/graph_4589744.jsonl diff --git a/graph_4595394.jsonl b/edge/graph_4595394.jsonl similarity index 100% rename from graph_4595394.jsonl rename to edge/graph_4595394.jsonl diff --git a/edge/graph_45991650.jsonl b/edge/graph_45991650.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bb1bed29c81b19c742c2df0fb2c9ba723156fd5 --- /dev/null +++ b/edge/graph_45991650.jsonl @@ -0,0 +1 @@ +{"6995074|1236072": []} diff --git a/edge/graph_4599995.jsonl b/edge/graph_4599995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4600888.jsonl b/edge/graph_4600888.jsonl similarity index 100% rename from graph_4600888.jsonl rename to edge/graph_4600888.jsonl diff --git a/graph_4602249.jsonl b/edge/graph_4602249.jsonl similarity index 100% rename from graph_4602249.jsonl rename to edge/graph_4602249.jsonl diff --git a/edge/graph_46050690.jsonl b/edge/graph_46050690.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..084794303244f4bcb73e44555b63610c49a4eae0 --- /dev/null +++ b/edge/graph_46050690.jsonl @@ -0,0 +1 @@ +{"37925258|14415030": []} diff --git a/edge/graph_4606157.jsonl b/edge/graph_4606157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4606224.jsonl b/edge/graph_4606224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4608889.jsonl b/edge/graph_4608889.jsonl similarity index 100% rename from graph_4608889.jsonl rename to edge/graph_4608889.jsonl diff --git a/edge/graph_46096687.jsonl b/edge/graph_46096687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a3cc4af2b7a6925a6bd7992a8e6dbce7de45aa3 --- /dev/null +++ b/edge/graph_46096687.jsonl @@ -0,0 +1 @@ +{"20048229|5338241": []} diff --git a/graph_4612349.jsonl b/edge/graph_4612349.jsonl similarity index 100% rename from graph_4612349.jsonl rename to edge/graph_4612349.jsonl diff --git a/edge/graph_46146607.jsonl b/edge/graph_46146607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc135b2b4dac1e45f552872ec71adc449d3313a1 --- /dev/null +++ b/edge/graph_46146607.jsonl @@ -0,0 +1,3 @@ +{"7847316|18782652": ["Rule pruning is a commonplace technique in data mining [3].", "tually, there are several classification-rule discovery algorithms that were explicitly designed to improve rule set simplicity, even at the expense of reducing the predictive accuracy [1], [3], [4]."]} +{"6597969|13215551": ["See also (Martens et al. 2011) for a recent survey of Ant-Miner and its variations.", "See also (Martens et al. 2011) for a recent survey of Ant-Miner and its variations ."]} +{"17456129|1437067": ["Experimental result shows that genetic algorithm proposed in this paper is suitable for classification rule mining and those rules discovered by the algorithm have higher classification performance to unknown data."]} diff --git a/edge/graph_46167154.jsonl b/edge/graph_46167154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4617110.jsonl b/edge/graph_4617110.jsonl similarity index 100% rename from graph_4617110.jsonl rename to edge/graph_4617110.jsonl diff --git a/edge/graph_4621813.jsonl b/edge/graph_4621813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4623753.jsonl b/edge/graph_4623753.jsonl similarity index 100% rename from graph_4623753.jsonl rename to edge/graph_4623753.jsonl diff --git a/graph_4624178.jsonl b/edge/graph_4624178.jsonl similarity index 100% rename from graph_4624178.jsonl rename to edge/graph_4624178.jsonl diff --git a/graph_4625011.jsonl b/edge/graph_4625011.jsonl similarity index 100% rename from graph_4625011.jsonl rename to edge/graph_4625011.jsonl diff --git a/edge/graph_46260034.jsonl b/edge/graph_46260034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e3a39e3df4a9dfe1f268406a3adde7b7c08d05d --- /dev/null +++ b/edge/graph_46260034.jsonl @@ -0,0 +1 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/graph_4626023.jsonl b/edge/graph_4626023.jsonl similarity index 100% rename from graph_4626023.jsonl rename to edge/graph_4626023.jsonl diff --git a/graph_4626310.jsonl b/edge/graph_4626310.jsonl similarity index 100% rename from graph_4626310.jsonl rename to edge/graph_4626310.jsonl diff --git a/graph_4626744.jsonl b/edge/graph_4626744.jsonl similarity index 100% rename from graph_4626744.jsonl rename to edge/graph_4626744.jsonl diff --git a/edge/graph_46319135.jsonl b/edge/graph_46319135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bd1ca7eeeee5aaa799162e3ad456d9e4bbe4e51 --- /dev/null +++ b/edge/graph_46319135.jsonl @@ -0,0 +1 @@ +{"41681451|46319135": []} diff --git a/graph_4631990.jsonl b/edge/graph_4631990.jsonl similarity index 100% rename from graph_4631990.jsonl rename to edge/graph_4631990.jsonl diff --git a/edge/graph_46321861.jsonl b/edge/graph_46321861.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75baf66bd06f368edd2e16722341468048114f11 --- /dev/null +++ b/edge/graph_46321861.jsonl @@ -0,0 +1,9 @@ +{"206575935|1230643": ["Therefore, a sensor node's lifetime, presents a unique dependence on battery lifetime [1].", "Sensor nodes deployed in a sensor field (redrawn from [1])."]} +{"206584313|41998167": ["A lot of MAC protocols for WSNs have been proposed in the literature, and numerous surveys on WSN MAC protocols can be found in [53], [52], and [51].", "Despite the long history of MAC/Routing protocols, Problems remain and others keep emerging with regard to the rapid growth of M2M applications [52], [53], [51], [54], [55], [56]."]} +{"206584313|1230643": ["services, as they are focused on energy efficiency, wireless networking, and protocols [14]."]} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} +{"5909595|1940388": []} +{"5909595|12817488": []} +{"5909595|1236072": [", one-to-one, one-to-all, all-toone) [60], [61]."]} +{"5909595|1230643": ["Recently, it has seen an explosive growth in both academia and industry [1], [2]."]} diff --git a/edge/graph_46332627.jsonl b/edge/graph_46332627.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4692298c16feaf39012b837c1bb8e208a92dbe3e --- /dev/null +++ b/edge/graph_46332627.jsonl @@ -0,0 +1,4 @@ +{"11333734|627405": ["SLR has three main phases: planning, conducting and reporting data analysis of the review, making \nthem different from ordinary literature surveys [Brereton et al. 2007]."]} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} diff --git a/edge/graph_46332962.jsonl b/edge/graph_46332962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5034095da86b3418c52a8ee9650682740b6f0a31 --- /dev/null +++ b/edge/graph_46332962.jsonl @@ -0,0 +1,6 @@ +{"18970373|15847221": ["Throughout the literature of sentiment analysis, mining methods can be divided into two categories: [16, 17] 1."]} +{"7492089|9928823": ["Deep learning algorithms are based on two building blocks: word embedding and the recursive neural network [12]."]} +{"13846810|16768404": ["A little study is also available on other languages like Chinese, Turkish, Flemmish, Arabic, Spanish etc. in the literature [1] [7]."]} +{"14172796|16768404": ["Walaa Medhat, Ahmed Hassan, Hoda Korashy [3] introduce Machine Learning Approach, Lexicon-based Approach, Transfer learning, Building resources, Emotion detection."]} +{"14172796|54934748": []} +{"1713103|9928823": ["However, simple feed forward neural network can not gain a profit by only adding layers because its training process is ineffective [6]."]} diff --git a/edge/graph_4634283.jsonl b/edge/graph_4634283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4635292.jsonl b/edge/graph_4635292.jsonl similarity index 100% rename from graph_4635292.jsonl rename to edge/graph_4635292.jsonl diff --git a/edge/graph_46353140.jsonl b/edge/graph_46353140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de6aba2fed9ac35d418a98530dc58b94a2703bce --- /dev/null +++ b/edge/graph_46353140.jsonl @@ -0,0 +1,7 @@ +{"168104398|1503157": []} +{"3388260|5822166": ["Literature review There are many MCDM approaches that have been suggested in the literature; however, supplier selection problem may be classified into two broad categories: individual approaches and integrated ones (Ho et al., 2010).", "MCDM approaches may be classified into two categories as individual approaches and integrated ones (Ho et al., 2010).", "There are many MCDM approaches that have been suggested in the literature; however, supplier selection problem may be classified into two broad categories: individual approaches and integrated ones (Ho et al., 2010)."]} +{"7366160|64292": ["Shen et al ."]} +{"154929850|14269689": []} +{"154929850|13489039": []} +{"114791947|13489039": []} +{"41248946|5822166": []} diff --git a/graph_4640616.jsonl b/edge/graph_4640616.jsonl similarity index 100% rename from graph_4640616.jsonl rename to edge/graph_4640616.jsonl diff --git a/edge/graph_46415448.jsonl b/edge/graph_46415448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3478c3bc7654a7495b5e608597eb7097be3dd80 --- /dev/null +++ b/edge/graph_46415448.jsonl @@ -0,0 +1,3 @@ +{"23036474|14441987": []} +{"14859410|14441987": []} +{"4700370|14441987": []} diff --git a/edge/graph_46425802.jsonl b/edge/graph_46425802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9684f378c2f096ac3431e10b64f65ce96f14942 --- /dev/null +++ b/edge/graph_46425802.jsonl @@ -0,0 +1,14 @@ +{"9394068|15947359": []} +{"18766453|15947359": ["Index Terms\u2014Local features, feature coding, binary descriptors, mode decision, visual sensor networks"]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"7595137|15947359": ["Different valuable surveys such as [2], [3] and [4] clearly highlight the state of the art and the main research challenges for the development of WMSNs."]} +{"11927872|64404": ["The temporal correlation of video sequences is traditionally used to decrease the image information to be stored or transmitted, by applying inter-frame coding [4]."]} +{"357202|15947359": ["However, due to energy efficiency restrictions, VSN platforms are usually designed with limited hardware capabilities [1], which restrict the usage of demanding vision computing algorithms, especially those requiring large databases or complex image analysis.", "A visual sensor network (VSN) is a network of low-power camera devices (nodes) that can capture, process and transmit images of a (visual) scene using a distributed and collaborative approach [1]."]} +{"18783359|15947359": []} +{"1445125|14889616": ["Related work includes scalable coding [5], where a low-resolution video is used to predict a high resolution version."]} +{"11049272|15947359": []} +{"14378743|64404": ["In [12], [13] intra- and inter-frame coding of descriptors is proposed to decrease the transmission requirements."]} +{"17709636|3540699": ["We propose performing canonical patch matching for efficient patch tracking."]} +{"2281192|3540699": []} +{"23466119|387610": ["properties: state-of-the-art compression performance, quality scalability, and strong error resilience [8], [9].", "represents an efficient compression of the original image at increased distortion [9]."]} +{"4988053|16219347": ["Finally, visual analysis is performed at a sink node [7]\u2013 [10]."]} diff --git a/graph_4643404.jsonl b/edge/graph_4643404.jsonl similarity index 100% rename from graph_4643404.jsonl rename to edge/graph_4643404.jsonl diff --git a/graph_4643514.jsonl b/edge/graph_4643514.jsonl similarity index 100% rename from graph_4643514.jsonl rename to edge/graph_4643514.jsonl diff --git a/graph_4646590.jsonl b/edge/graph_4646590.jsonl similarity index 100% rename from graph_4646590.jsonl rename to edge/graph_4646590.jsonl diff --git a/graph_4646632.jsonl b/edge/graph_4646632.jsonl similarity index 100% rename from graph_4646632.jsonl rename to edge/graph_4646632.jsonl diff --git a/edge/graph_46496470.jsonl b/edge/graph_46496470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4654785.jsonl b/edge/graph_4654785.jsonl similarity index 100% rename from graph_4654785.jsonl rename to edge/graph_4654785.jsonl diff --git a/edge/graph_46553724.jsonl b/edge/graph_46553724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0901ced73bab52b597e6b8f55562250681345539 --- /dev/null +++ b/edge/graph_46553724.jsonl @@ -0,0 +1,4 @@ +{"11606516|4631990": ["This mainstream idea has been pursued, testing more and more pervasive, noninvasive, and low-cost technologies [6], [32], capable of inferring the user behavior, while avoiding the installation of cameras or microphones."]} +{"11606516|1230643": ["Moreover, it has to be noticed that the most diffused wireless architecture is represented by the wireless sensor network (WSN) technology [42]\u2013[44]."]} +{"22602918|12127129": ["In the field of UWB sensors, the detection of a moving target is usually based on algorithms referred to as \u201cbackground subtraction\u201d [7], [8], [9].", "An overview of more or less sophisticated background subtraction methods that are known in video surveillance applications is given in [7]."]} +{"15912531|7365537": [", [4], [5] should be avoided in order to keep the system cost manageable.", "Recently, several inertial-based self-contained human localization systems have been proposed [3], [5]\u2013[9]."]} diff --git a/edge/graph_46580948.jsonl b/edge/graph_46580948.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd7b4f377642e85b5c2ae955c593d17b278f61e1 --- /dev/null +++ b/edge/graph_46580948.jsonl @@ -0,0 +1 @@ +{"53224375|5254998": ["The OSS movement is changing the way software is developed, maintained and updated [1-3]."]} diff --git a/graph_4658531.jsonl b/edge/graph_4658531.jsonl similarity index 100% rename from graph_4658531.jsonl rename to edge/graph_4658531.jsonl diff --git a/graph_466040.jsonl b/edge/graph_466040.jsonl similarity index 100% rename from graph_466040.jsonl rename to edge/graph_466040.jsonl diff --git a/edge/graph_46612287.jsonl b/edge/graph_46612287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..297cdf22304540afdfcfa818043b1d5e5859cb40 --- /dev/null +++ b/edge/graph_46612287.jsonl @@ -0,0 +1,2 @@ +{"61495831|11392986": ["\u2022 Some statements of the problem cannot be used to create a solution because of their form or language (Zowghi & Coulin, 2005).", "This can take several forms:\n\u2022 A client representative has interests that conflict with others in the project or with the aims of the project (Alvarez, 2002; Briggs & Gruenbacher, 2002; Davidson, 1996; Giorgini, Massacci, Mylopoulos & Zannone, 2006; Zowghi & Coulin, 2005).", "\u2022 People have different cultures (business or social) and backgrounds and so a common language does not always exist (Alvarez, 2002; Boehm, Grunbacher, & Briggs, 2001; Davidson, 1996; Harris, 2006; Jain et al., 2003; Saiedian & Dale, 2000; Urquhart, 1999; Zave, 1997; Zowghi & Coulin, 2005).", "\u2026Juristo, and Moreno (2006), Hickey and Davis (2004), Reichental (2006), Marakas and Elam (1998), Pan (2005), Finkelstein (1994), Davidson (1996), Majchrzak, Beath, Lim, and Chin (2005), Zowghi and Coulin (2005), Pitts and Browne (2007) and in a less formal way by Jain, Vitharana, and Zahedi (2003).", "For instance, technical people do not understand business concepts and business people do not understand IT concepts (Davidson, 1996; Boehm et al., 2001; Jain et al., 2003; Saiedian & Dale, 2000; Tsumaki & Tamai, 2006; Zowghi & Coulin, 2005).", "\u2022 Some consultants find the process difficult and rely upon their knowledge of previous solutions (Zowghi & Coulin, 2005).", "This can be seen as one of three types of change:\n\u2022 Clients learn what is possible during the project (Briggs & Gruenbacher, 2002; Jain et al., 2003; Majchrzak et al., 2005; Robertson, 2001; Saiedian & Dale, 2000; Zowghi & Coulin, 2005).", "This can take a few forms:\n\u2022 Incomplete requirements (Arthur & Groner, 2005; Browne & Ramesh, 2002; Browne & Rogich, 2001;Harris, 2006; Lee & Rine, 2004; Marakas & Elam, 1998; Tsumaki & Tamai, 2006; Zave, 1997; Zowghi & Coulin, 2005).", "\u2022 Clients see the new system as a part of power struggles in the organisation (Alvarez, 2002; Davidson, 1996; Zowghi & Coulin, 2005).", "\u2022 Some people will use resistance tactics to avoid a conclusion to RE (Saiedian & Dale, 2000; Tsumaki & Tamai, 2006; Zowghi & Coulin, 2005).", "That is, understood by the client, but not stated by them as it forms part of their tacit knowledge (Hudlicka, 1999; Robertson, 2001; Tsumaki & Tamai, 2006; Zowghi & Coulin, 2005)."]} +{"61495831|15778270": ["\u2026Harris (2006), Davis, Dieste, Hickey, Juristo, and Moreno (2006), Hickey and Davis (2004), Reichental (2006), Marakas and Elam (1998), Pan (2005), Finkelstein (1994), Davidson (1996), Majchrzak, Beath, Lim, and Chin (2005), Zowghi and Coulin (2005), Pitts and Browne (2007) and in a less formal\u2026"]} diff --git a/graph_4663919.jsonl b/edge/graph_4663919.jsonl similarity index 100% rename from graph_4663919.jsonl rename to edge/graph_4663919.jsonl diff --git a/edge/graph_46642131.jsonl b/edge/graph_46642131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25533fb1cfc484958da31aa59a63437a97b09240 --- /dev/null +++ b/edge/graph_46642131.jsonl @@ -0,0 +1,12 @@ +{"44666934|164835": [", see [7, 32]) to get the Linear LS (LLS) problem fl (q) = f (q0) +D (q \u2212 q0) , (14)", "Whenever the noise covariance matrix K is known, a variant of the LS problem is called WLS problem, which is posed as follows [32]: q\u0302 = argmin q [r \u2212 f(q)] K\u22121 [r \u2212 f (q)] .", "Define vector q as q = [x y], where (x, y) are the NOI coordinates; then given a set of N noisy observations r = f(q) + n, the least squares (LS) optimization problem is [7, 32] q\u0302 = argmin q [r \u2212 f(q)] [r \u2212 f (q)] .", "By expanding vector r and moving terms, we obtain the WLS estimator, [32], which is rewritten as"]} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"61441241|4491892": []} +{"31433448|206583375": ["Several techniques for the indoor localization have been proposed [4\u20136]."]} +{"17325804|164835": ["Although the form of the density function is unknown in the non-parametric case, there can still be some generic information about some of its parameters [42], such as its variance and symmetry properties, which can be used to design non-parametric estimation rules, such as the least median of squares technique in [43], the residual weighting algorithm in [44], and the variance weighted least squares technique in [45]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"111032533|206583375": ["\u2026indoor localization systems (ILSs) based on IR, Ultrasound, RFID, WLAN, Bluetooth, and UWB have been proposed, but these systems have limitations such as the necessity of additional infrastructure, low accuracy, noises, electromagnetic interference, multi-path effects, low security, and etc [5, 6]."]} +{"445680|206583375": []} +{"505582|4491892": ["Further, most convergence results as surveyed in [56] are restricted to bounded functions of the state g(x) such that|g(x)| < C for someC."]} +{"4093889|2835258": ["A number of location-aware protocols have been proposed for \u201cad hoc\u201d routing and networking [3]."]} +{"11559229|6972141": ["The criteria were as follows: (1) the system is easy to use, (2) the system is easy to learn, (3) the", "The results show no significant difference in the ease of learning between the two conditions, (1) (2) (3) (4)"]} diff --git a/edge/graph_46656923.jsonl b/edge/graph_46656923.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..656adeefbad551c5c71697c3759781da816f1dc7 --- /dev/null +++ b/edge/graph_46656923.jsonl @@ -0,0 +1 @@ +{"1261533|469744": ["It provides personalized Augmented Reality tours [1] and reconstructions of ruined cultural"]} diff --git a/edge/graph_4668524.jsonl b/edge/graph_4668524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4668902.jsonl b/edge/graph_4668902.jsonl similarity index 100% rename from graph_4668902.jsonl rename to edge/graph_4668902.jsonl diff --git a/edge/graph_46693681.jsonl b/edge/graph_46693681.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..463ece14a5f3b01f44fdf9b78bbdd2d7edac3152 --- /dev/null +++ b/edge/graph_46693681.jsonl @@ -0,0 +1 @@ +{"16481545|15543876": []} diff --git a/graph_4669501.jsonl b/edge/graph_4669501.jsonl similarity index 100% rename from graph_4669501.jsonl rename to edge/graph_4669501.jsonl diff --git a/edge/graph_46751642.jsonl b/edge/graph_46751642.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc227c02a7c3cce340df2382741e894deda77354 --- /dev/null +++ b/edge/graph_46751642.jsonl @@ -0,0 +1,5 @@ +{"10881910|10500613": []} +{"34867954|9123526": ["By combing Web services and semantic Web technologies, SWS is characterized by a number of conceptual models such as OWL-S, Web Service Modeling Language (WSML) [9], Web Service Modeling Ontology (MSMO), Web Services Description Language Semantic (WSDL-S) [10] and Semantic Annotations for Web Services Description Language (SAWSDL) [11]."]} +{"12594083|9123526": ["In this paper we use the Web Service Modeling Language (WSML) [3] as a certain style to express the semantic descriptions and also the language for capturing logical expressions.", "Web Service Modeling Ontology WSMO [15] is a topdown conceptual model for semantic description of Web services which is realized in Web Service Modeling Language (WSML, [3])."]} +{"13964527|38476": []} +{"28246577|913718": []} diff --git a/edge/graph_46754118.jsonl b/edge/graph_46754118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23c4a61915194f92069b6e621339c85b4a7b0ba8 --- /dev/null +++ b/edge/graph_46754118.jsonl @@ -0,0 +1,2 @@ +{"154630915|33644565": []} +{"49681097|33644565": []} diff --git a/edge/graph_46758157.jsonl b/edge/graph_46758157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8521fe18501f0f3c192f08a956d3f5289287290 --- /dev/null +++ b/edge/graph_46758157.jsonl @@ -0,0 +1,5 @@ +{"206745338|13372227": []} +{"58841085|16298606": []} +{"32369139|1077083": []} +{"19499430|6670217": ["With the increase of mobile devices and amount of security sensitive applications running on them, we can expect a growing number of mobile malware exploiting errors of the OS [15]."]} +{"8690332|2457428": ["The adversary will see the key but it is too late to forge the signature."]} diff --git a/edge/graph_46764901.jsonl b/edge/graph_46764901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebe6d2f21b2d58407916c0e1b26a877b09b4ef8d --- /dev/null +++ b/edge/graph_46764901.jsonl @@ -0,0 +1,6 @@ +{"17830599|6387482": ["The methods of combination can be usually divided into two types according to [1] namely classification based and rule based methods.", "There are various methods and different levels at which information from different media can be combined [1, 2, 3, 4].", "Although fusion in feature space requires only one learning stage on the integrated feature vector it suffers from the problem of time synchronization and the unified representation of the media streams [1].", "The correlation between modalities, calculated at feature level or semantic level, should be used to find helpful cues to effective patterns of collaboration [1].", "multi-modal fusion is gaining importance these days in the field of content analysis and retrieval as it benefits from diverse and complementary information from different media the content is represented with [1, 2].", "We borrow figure 1 from [1] to differentiate fusion strategies into early, late and hybrid of early and late methods."]} +{"29963227|2398835": []} +{"29963227|13726263": []} +{"18137952|393948": ["To approach this problem, many existing methods bound the target error by the source error plus a discrepancy metric between the source and the target [18].", "\u2026Description Ds,Dt source, target x, x\u0303 input: original, corrupted d, n #features, #samples z, z\u0303 activation: original, corrupted c corruption probability W,b deep network parameters \u03bb adaptation penalty f\u03b8, g\u03b8\u2032 encoder, decoder k,\u03b2 multi-kernel function f sup\u03b8 supervised classifier: softmax", "F", "Both pre-training and fine-tuning are vital for effective learning of deep models: pre-training mitigates the trap of local minima and fine-tuning exploits the supervised information.", "The frequent notations and their descriptions are summarized in Table 1.", "In such cases, effective domain adaptation methods are highly desirable to reduce domain discrepancy and labeling consumption."]} +{"886027|393948": ["With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al.", "With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al., 2013a), language modeling (Bengio et al., 2003; Mnih and Hinton, 2009) and NER\u2026"]} +{"207079655|12925459": ["numerical data, many studies have discussed online methods to reduce algorithm complexity, such as motif matching [80] and online portfolio selection [62]."]} diff --git a/edge/graph_46779843.jsonl b/edge/graph_46779843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ce31e885fee0dc0ac0dd7349d79df6d7c18b1eb --- /dev/null +++ b/edge/graph_46779843.jsonl @@ -0,0 +1 @@ +{"21976137|386036": ["[42] present a good survey on data matching, but they emphasize approaches that perform data value analysis rather than structure analysis."]} diff --git a/edge/graph_46790501.jsonl b/edge/graph_46790501.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b77b037109a658e9db2b88f75f7a83cea4ecdb8b --- /dev/null +++ b/edge/graph_46790501.jsonl @@ -0,0 +1,2 @@ +{"2765306|18992935": []} +{"27631927|29778392": []} diff --git a/graph_4680026.jsonl b/edge/graph_4680026.jsonl similarity index 100% rename from graph_4680026.jsonl rename to edge/graph_4680026.jsonl diff --git a/graph_4681954.jsonl b/edge/graph_4681954.jsonl similarity index 100% rename from graph_4681954.jsonl rename to edge/graph_4681954.jsonl diff --git a/edge/graph_46825815.jsonl b/edge/graph_46825815.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70d5ad0531635ef526a2217411743e78e396d084 --- /dev/null +++ b/edge/graph_46825815.jsonl @@ -0,0 +1,4 @@ +{"6585796|2656838": []} +{"13801437|11632848": []} +{"3196617|1507400": []} +{"1325652|1437067": []} diff --git a/edge/graph_46865980.jsonl b/edge/graph_46865980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afd88f6e44a92109c3997fbf6cf7b1e277d6206a --- /dev/null +++ b/edge/graph_46865980.jsonl @@ -0,0 +1 @@ +{"15275123|16631951": ["\u2026a descriptive overview of the reported research approaches in the IS shared services literature, as well as to build a point of reference for future research on the topic when authors seek examples and justifications for their selected approaches and their design\u201d (Fielt et al. 2014, p. 1023)."]} diff --git a/edge/graph_46889111.jsonl b/edge/graph_46889111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_46893321.jsonl b/edge/graph_46893321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f3c1fda576e3188144152d75c6cc354693e7b20 --- /dev/null +++ b/edge/graph_46893321.jsonl @@ -0,0 +1,8 @@ +{"32441310|13172512": ["Machine learning has been extensively used for network traffic classification [78]."]} +{"2340740|207232451": ["Social Engineering attacks [5] trick the users into revealing private or sensitive information by pretending to be genuine web pages."]} +{"2340740|206988459": ["licious URL detection, spam detection techniques largely qualify as techniques that use context-based features for detecting malicious URLs. Other recent learning based spam detection surveys include [20,46,74], many of which focus on spam appearing in online reviews. Another closely related area is Webpage Classification. [142] conducted a survey on the features and algorithms deployed for webpage classifi"]} +{"2340740|17157304": ["Other recent learning based spam detection surveys include [162]\u2013[164], many of which focus on spam appearing in online reviews."]} +{"221328|17157304": ["We think that parallel research on email spam fighting [19; 95; 113] and spam on social websites [58] might also be relevant."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} diff --git a/graph_468992.jsonl b/edge/graph_468992.jsonl similarity index 100% rename from graph_468992.jsonl rename to edge/graph_468992.jsonl diff --git a/edge/graph_46917032.jsonl b/edge/graph_46917032.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6877018a9ee9b0f93ed72ea146824e63fa252360 --- /dev/null +++ b/edge/graph_46917032.jsonl @@ -0,0 +1 @@ +{"3364037|7800459": []} diff --git a/edge/graph_46918724.jsonl b/edge/graph_46918724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b3ba8b56ea122a663ce3776f7aeafeb6f39c322 --- /dev/null +++ b/edge/graph_46918724.jsonl @@ -0,0 +1,7 @@ +{"1461852|2079802": []} +{"10197975|987239": ["While research on example-based retrieval \u2013 where users provide a full model as the query \u2013 has recently found a lot of interest in the community [Tangelder and Veltkamp 2008], its practical application is difficult, since a good example is often not at hand."]} +{"6541719|987239": ["In the last few years, a number of algorithms have been proposed for the retrieval of both rigid (see [3] for a survey on content-based 3D shape retrieval) and nonrigid 3D shapes [4].", "This has led to the development of 3D shape retrieval systems (see [3] for a survey) that, given a query object, retrieve similar 3D objects.", "According to [3], 3D shape retrieval systems are usually evaluated with respect to several requirements of content-based 3D retrieval, such as shape representations requirements, properties of dissimilarity measures, ef\ufb01ciency, discrimination abilities, ability to perform partial matching,\u2026"]} +{"641747|4361938": ["The interested reader is referred to [22], [23], [127] for eye movement studies and [24] for a breadth-first survey of eye tracking applications."]} +{"16394690|7624176": []} +{"17104325|987239": []} +{"435338|987239": ["Given a query object, 3D shape retrieval systems retrieve objects with similar shapes from large databases of models (see [Tangelder and Veltkamp 2004; Iyer et al. 2005] and the references therein)."]} diff --git a/edge/graph_46923041.jsonl b/edge/graph_46923041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd1cd24678d443314a81afd29ecfcd1b4d129e87 --- /dev/null +++ b/edge/graph_46923041.jsonl @@ -0,0 +1 @@ +{"16836589|10770351": ["The second order su cient condition given in the body of the paper as (21)."]} diff --git a/edge/graph_46924129.jsonl b/edge/graph_46924129.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..defa488ede016fc7a83efb6a25978259f921e8c5 --- /dev/null +++ b/edge/graph_46924129.jsonl @@ -0,0 +1,15 @@ +{"11392154|393948": []} +{"45851458|15380857": ["A review paper [61] pointed out that BCIs using LEDs for stimulation had higher ITR than those using graphic stimuli."]} +{"45851458|9270553": ["A brain computer interface (BCI) is a communication system that does not depend on the brain\u2019s normal output pathways of peripheral nerves and muscles [1]."]} +{"2958085|8575576": ["Most biomedical images used for clinical treatment of patients\u2014magnetic resonance imaging (MRI) [116, 117], radiographic imaging [118, 119], positron emission tomography (PET) [120] and histopathology imaging [121]\u2014have been used as input data for deep learning algorithms."]} +{"891853|6923178": ["The test results are expressed in terms of Accuracy (A), Se and Sp [135].", "tical online system, is selected based on the assessment results [135]."]} +{"1631622|393948": ["Feature learning (or representation learning) is becoming an important field in machine learning community in recent years [9]."]} +{"1631622|7530272": ["Other than sequence distance based methods, feature-based classification methods [8] follow the traditional classification framework."]} +{"54957533|18132552": []} +{"2989595|6280485": []} +{"58925714|6923178": ["The assessment helps us to select the most appropriate classification algorithm for online system [54]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"2740197|393948": ["Conventional techniques are composed of a single, often linear, transformation of the input space and are limited in their ability to process natural data in their raw form [21].", "AEs are mostly used for representation learning [21] and are often regularized by adding noise to the original data (i.", "Alternatively, representation learning methods allow to automatically discover the representations needed for prediction from the raw data [21, 22]."]} +{"2740197|15669036": ["work called \u2018differential privacy\u2019 [109, 110] to ensure the indistin-"]} +{"18599847|17772052": ["The traditional approach of analyzing e-nose data involves extracting information in the static and dynamic phases of the signals [44] for the use of static pattern analysis techniques (PCA, discriminant function analysis, cluster analysis and neural networks)."]} +{"18599847|38476": ["Analysis of 5 time-series data has been the subject of active research for decades (Keogh 6 and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu 7 (2006) as one of the top 10 challenging problems in data mining due to 8 its unique properties.", "Analysis of time-series data has been the subject of active research for decades (Keogh and Kasetty, 2002; Dietterich, 2002) and is considered by Yang and Wu (2006) as one of the top 10 challenging problems in data mining due to its unique properties."]} diff --git a/edge/graph_46926524.jsonl b/edge/graph_46926524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9966fb21f816973ae622ba0a27669838850a47c6 --- /dev/null +++ b/edge/graph_46926524.jsonl @@ -0,0 +1 @@ +{"136092073|189201": []} diff --git a/edge/graph_46927462.jsonl b/edge/graph_46927462.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b4e25edaac3a8b27ae64722eacbbc84cece1b1c --- /dev/null +++ b/edge/graph_46927462.jsonl @@ -0,0 +1,5 @@ +{"1260035|8777381": ["Whereas work on emotion classi\ufb01cation from the point of view of natural speech and human-computer dialogues is fairly extensive, e.g. (Scherer, 2003), (Litman and Forbes-Riley, 2004), this appears not to be the case for text-to-speech synthesis (TTS)."]} +{"23989947|17123336": []} +{"23989947|6857179": []} +{"886027|393948": ["With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al.", "With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al., 2013a), language modeling (Bengio et al., 2003; Mnih and Hinton, 2009) and NER\u2026"]} +{"11734950|11608263": ["A comprehensive overview of current research in multi-label classification can be found in [9,10]."]} diff --git a/edge/graph_46928493.jsonl b/edge/graph_46928493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..198369c81d3d3d7e8944f26b319bb83469e29dfa --- /dev/null +++ b/edge/graph_46928493.jsonl @@ -0,0 +1,2 @@ +{"8161011|9236463": ["The basic idea behind using static analysis for detecting information flow is to statically check that flow of information between variables in a program is consistent with the security labeling of variables [14]."]} +{"6521088|1896583": []} diff --git a/edge/graph_46928520.jsonl b/edge/graph_46928520.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d8bd49e50b43551168483796e093192a5c9ced1 --- /dev/null +++ b/edge/graph_46928520.jsonl @@ -0,0 +1,29 @@ +{"16564491|1230643": ["Recently, wireless sensor networks (WSNs) [1] are widely adopted to gather various environmental information and then reconstruct them in the cyber worlds [9]."]} +{"8647969|5766836": ["Consequently, very few of the widely popular open platforms do support mobility [11]."]} +{"18078738|905827": []} +{"18078738|6327434": ["A number of survey papers were written, for instance, [2]\u2013[38], which are presented in Table I, categorized", "of analytical redundancy for model-based fault detection and diagnosis in the early survey paper [2]."]} +{"9361342|7774517": ["\u2022 Target tracking, refers to sensors which are embedded in moving targets to track them in real-time [24]."]} +{"9361342|1230643": ["\u2022 Military applications, in which wireless sensor networks can be an integral part of military command, control, communications, computing, intelligence, surveillance, reconnaissance and targeting (C4ISRT) systems [18].", "can be deployed by dropping from a plane, throwing by a catapult, placing in a factory, and placing one by one either by a human or a robot [18].", "[18] have advocated that the destruction of some sensor nodes by hostile actions does not affect a military operation as much as it affects a traditional sensor network.", "Exchange of messages is the only means of fault diagnosis, and the energy consumed by the network is proportional to the amount of traffic generated in diagnosing the network [18]."]} +{"1513960|1230643": ["On the other hand, there already exists significant amount of research on the communication protocols for sensor networks in the literature [1]."]} +{"46721833|7889189": []} +{"874174|60506702": ["The attackers try to change the functionality of the protocol [9,10].", "Passive attacks [10,11] involve unauthorized reading of the data packets in the route."]} +{"14028778|6275330": []} +{"14028778|205286988": ["Many aspects concerning sensor networks have already been investigated [Akyildiz \net al. 2002a], for example routing and data dissemination schemes [Akkaya and Younis 2005], self-organization \nissues [Dressler 2008], the ef.cient deployment of sensor nodes [Bai et al. 2006], and the interaction \nof\u2026", "routing and data dissemination schemes [ 4 ], self-organization issues [5], the efficient deployment of sensor nodes [6], and the interaction of sensor/actuator networks [7], while others are still work in progress."]} +{"14028778|1230643": ["Application characteristics \u2022 distribution of sub-tasks \u2022 destination for data packets \u2022 node activity (sensing, processing, communication): by event, by request, regular intervals [68]", "Many aspects concerning sensor networks have already been investigated [Akyildiz \net al. 2002a], for example routing and data dissemination schemes [Akkaya and Younis 2005], self-organization \nissues [Dressler 2008], the ef.cient deployment of sensor nodes [Bai et al. 2006], and the interaction \nof\u2026", "\u2026et al. \n2006] distribution of subtasks destination for data packets node activity (sensing, processing, communication): \nby event, by request, regular intervals [Akyildiz et al. 2002b] general issues [Younis et al. 2004; Iyer \nand Kleinrock 2003] collective QoS parameters [Chen and Varshney\u2026", "[68], the predominant amount of energy is consumed by a sensor node during sensing, communication, and data processing activities."]} +{"34505498|1236072": ["Such constraints combined with a typical deployment of a large number of sensor nodes pose many challenges to the design and management of WSNs and necessitate energy-awareness at all layers of the networking protocol stack [25]."]} +{"34505498|1230643": ["Sensor network must have in built trade-off mechanisms that give the end user the option of prolonging network lifetime at the cost of lower throughput or higher transmission delay [14]."]} +{"1859069|6327434": ["Generalized Likelihood Ratio (GLR) testing and Sequential Probability Ratio Testing (SPRT) (Willsky, 1976; Basseville, 1988) can be used to examine the residual and, subsequently to diagnose faults.", ", 1975; Clark, 1979; Frank, 1987; Frank, 1990; Patton and Kangethe, 1989; Patton and Chen, 1997) or Kalman filter(s) in a stochastic setting (Mehra and Peschon, 1971; Willsky, 1976; Frank, 1987; Basseville, 1988; Tzafestas and Watanabe, 1990; Da and Lin, 1996; Zolghadri, 1996; Sohlberg, 1998).", "\u2022 Sequential probability ratio testing (SPRT) (Wald, 1947; Willsky, 1976; Tzafestas and Watanabe, 1990; Grainger, Holst, Isaksson and Ninness, 1995) and modified SPRT (Gai and Gurry, 1977; Speyer and White, 1984; Tzafestas and Watanabe, 1990).", "Many variants of the idea of hypothesis testing for FDI have been published since (Willsky, 1976; Basseville, 1988; Tzafestas and Watanabe, 1990; Nikoukhah, 1994; Chang and Chen, 1995; Zolghadri, 1996; Basseville, 1997; Sohlberg, 1998).", "10 Fault Diagnosis for Stochastic Systems For stochastic systems, the FDI is based on statistical testing of the residuals (Willsky, 1976; Basseville and Benveniste, 1986; Basseville, 1988; Tzafestas and Watanabe, 1990; Basseville and Nikiforov, 1993; Da and Lin, 1996; Zolghadri, 1996; Basseville, 1997; Sohlberg, 1998), for example:"]} +{"7038467|205286988": ["Proposed protocols can be classified into data-centric, hierarchical, location-based, network flow and QoS-aware routing [ 6 ]."]} +{"30899953|2295142": ["Multi-path routing has become popular in the past few years (for recent surveys on multipath routing in wireless sensor networks see [23, 5, 4]).", "Such multi-path routing has been shown to be both fault tolerant through the use of alternative paths and energy efficient through load balancing [4, 7].", "primarily due to energy, computational and storage limitations at sensor nodes [4, 5]."]} +{"14356571|6275330": []} +{"14356571|1230643": ["Ensuring energy efficient and reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems."]} +{"46964893|2769147": []} +{"46964893|2829149": ["Moreover, IoT is prone to different security issues as it uses the Internet infrastructure for exchange of information among various heterogeneous ends [16,17].", "DoS attacks can be generated on various layers of sensor networks staring from physical to applications layers [16]."]} +{"46964893|206584087": ["DDoS flooding attack is a massive, integrated and generally explicit in nature which attempts to exhaust victim\u2019s bandwidth or disrupt legitimate users\u2019 access to the system services [24,25].", "These are typically application-level flooding attacks [25]."]} +{"2920797|18078738": []} +{"2920797|6327434": []} +{"23847306|18078738": ["survey paper [1], model-based and signal-based diagnosis approaches were reviewed."]} +{"62034736|41998167": ["The contribution explores the QoS challenges and classi \ufb01 es the QoS-aware MAC protocols by discussing their strengths and weaknesses [5]."]} +{"62034736|17205659": ["Unfairness attack degrades the performance of network rather than preventing the complete access discussed in Wang [50]."]} +{"34100131|1230643": []} +{"19636899|14745481": ["Protocols like [40] add the trust management [41] feature to the secure protocols."]} diff --git a/edge/graph_46929472.jsonl b/edge/graph_46929472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e051a5fa8411b781d63e24963a651790e21b1d1 --- /dev/null +++ b/edge/graph_46929472.jsonl @@ -0,0 +1 @@ +{"3657624|17120461": []} diff --git a/edge/graph_46930276.jsonl b/edge/graph_46930276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_46933449.jsonl b/edge/graph_46933449.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a90f2818d4b58e2e30e8e18724204d78dcf8ff18 --- /dev/null +++ b/edge/graph_46933449.jsonl @@ -0,0 +1,4 @@ +{"8167102|12715779": ["Many different types of human computation systems have been explored in the past [21].", "While we have seen great success in human computation in everything from annotating images [17] to building global knowledge repositories [21], these systems are still confided to the platforms and data models they were built from.", "[21] Yuen, M."]} +{"62077179|1507400": []} +{"17588432|3750204": []} +{"17588432|62109142": []} diff --git a/edge/graph_46937427.jsonl b/edge/graph_46937427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d4b8d4c779deecef8896a684381ea99aea88f12 --- /dev/null +++ b/edge/graph_46937427.jsonl @@ -0,0 +1,32 @@ +{"1482463|8983048": ["Among all the existing surveys (Table 1), [11]\u2013[15] focus on rigid registration only."]} +{"1482463|7861381": ["We further discuss the problem of over-\ufb01tting and provides up-to-date references beyond those in existing surveys."]} +{"1747535|206051485": ["have been made in the community to enable a faster and more robust algorithm for detecting and registering features between multiple images [7]\u2013[10]."]} +{"35890362|8983048": ["This can frequently happen in case of objects acquired with different point densities or different points of view (Salvi et al., 2007).", "For the time being, the ICP method is still the state-of-the-art algorithm (Salvi et al., 2007)."]} +{"14118080|6681074": ["3D object representation and matching has been a fundamental part of computer vision research with applications in modeling, visualization, recognition, classification, and scene understanding [3][4][12]."]} +{"119453022|6681074": []} +{"2303138|6681074": ["\u2026representation for free-from surfaces and researchers have used a number of representations, including B-Splines (Bhanu and Ho, 1987), surface curvatures, superquadrics (Solina and Bajcsy, 1990) and deformable models to recognize free-form objects in range images (Campbell and Flynn, 2001)."]} +{"56380143|17054454": [", 2002), large area characterizations of vegetation structure based upon remotely sensed data often have sub-optimal precision for many applications (Xie et al., 2008).", "\u20262003); however, because the spatial extent and spatial resolution of a given sensor are inversely related (Franklin et al., 2002), large area characterizations of vegetation structure based upon remotely sensed data often have sub-optimal precision for many applications (Xie et al., 2008)."]} +{"10255588|1482463": ["\u2026et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013; Tam et al. 2013] that provide comparative studies, they are far from comprehensive and dif\ufb01cult to extend to all methods in the literature.", "\u2026some reviews and benchmarks that implemented and tested the most commonly used methods [Tangelder and Veltkamp 2004; Salvi et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011 ; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013; Tam et al. 2013]."]} +{"10255588|8983048": []} +{"10255588|987239": ["Although there are some benchmarks [Tangelder and Veltkamp 2004; Salvi et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013; Tam et al. 2013] that provide comparative studies, they are far from\u2026", "Then, a \ufb01tting plane to the translated points is computed. apply principal component analysis (PCA) to the set of points and choose the eigenvector with the lowest associated eigenvalue as the normal of the \ufb01tting plane.", "However, there are some reviews and benchmarks that implemented and tested the most commonly used methods [Tangelder and Veltkamp 2004; Salvi et al. 2007; Bronstein et al. 2010; Boyer et al. 2011; Van Kaick et al. 2011; Salti et al. 2011 ; Dutagaci et al. 2012; Yu et al. 2013; Kim and Hilton 2013;\u2026"]} +{"55438675|8983048": []} +{"122425243|987239": []} +{"8776863|8983048": ["[21] point out that normal sampling is better in the common case for two reasons: (1) the time required is small; (2) points from significant parts of the surfaces are more important compared to parts of uniform surfaces, specially in cases where the surfaces are not very shaped."]} +{"115399101|1482463": []} +{"3353517|6681074": ["Campbell and Flynn (2001) give a survey of 3D freeform object recognition techniques and classify them into appearance based recognition, recognition from 2D silhouettes and free-form object recognition in range data.", "Campbell and Flynn [5] give a survey of 3D freeform object recognition techniques and classify them into appearance based recognition, recognition from 2D silhouettes and free-form object recognition in range data.", "Campbell and Flynn [5] argue that the computational complexity of these techniques can become one of the prohibitive factors if brute force matching is used.", "Campbell and Flynn\n(2001) argue that the computational complexity of these techniques can become one of the prohibitive factors if brute force matching is used."]} +{"110394673|8983048": []} +{"10678976|6681074": ["All rights reserv doi:10.1016/S0167-8655(03)00157-0\ninvestigations on the refinement problem (Campbell and Flynn, 2001; Rusinkiewicz and Levoy, 2001).", "1016/S0167-8655(03)00157-0 investigations on the refinement problem (Campbell and Flynn, 2001; Rusinkiewicz and Levoy, 2001)."]} +{"20303249|8983048": []} +{"28012712|8983048": ["In the literature, several reviews on image registration methods can be found: overall image registration in Brown (1992), Salvi et al. (2007), Wyawahare et al. (2009), Zitova\u00b4 and Flusser (2003), medical image registration in general (Elsen et al. 1993; Maintz and Viergever 1998; Bronzino 2000;\u2026"]} +{"28012712|206051485": ["In the literature, several reviews on image registration methods can be found: overall image registration in (Brown, 1992; Salvi et al., 2007; Wyawahare et al., 2009; Zitov\u00e1 and Flusser, 2003), medical image registration in general (Bronzino, 2000; Elsen et al."]} +{"28012712|7861381": ["TPS is an interpolation function that minimises the bending energy (Holden 2008).", "(2004)andareviewinHolden(2008)."]} +{"123923044|1482463": []} +{"123923044|8983048": []} +{"16431093|206051485": ["3D city models are incorporated into many applications, e.g. urban planning, micro climate analysis, vizualisation, disaster management, indoor navigation, and many more (Rottensteiner et al., 2014; Bre\u0301dif et al., 2013).", "Zitova and Flusser (2003) compiled an extensive overview of registration methods, dividing them in feature- and area-based methods."]} +{"62605205|11894197": []} +{"8063966|8983048": ["Two reviews on 3D modeling and range image registration by [30] and [31] are also worth mentioning.", "Moreover, computing the intersection of a sphere with the surface is not easy, especially when the surface is represented as a point cloud or a mesh [30]."]} +{"8063966|6681074": []} +{"8075713|1877246": []} +{"129508814|1877246": ["Though 2D/3D building recognition, extraction and reconstruction are among one of the hottest topics, it was intentionally disregarded in this section, since there are numerous literatures that have already covered this area (Brenner, 2005; Dorninger and Pfeifer, 2008; Haala and Kada, 2010; Musialski et al., 2013; Wang, 2013)."]} +{"15537088|8983048": ["However, as noted in the literature [23] and as shown in the proposed experiments, this method fails when nearest points do not correspond to correct association (illustrated in Fig.", "Coarse alignment uses for instance Principal Component Analysis [15] or feature based matching with features such as the Spin Image [14] to compute an initial coarse registration."]} +{"123987181|8983048": []} diff --git a/edge/graph_46940087.jsonl b/edge/graph_46940087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cf7e7d5d3cbf447e8f95f9d0e2d2fcd55ab03c4 --- /dev/null +++ b/edge/graph_46940087.jsonl @@ -0,0 +1,2 @@ +{"24856744|2142482": ["Cyber-security has been an active research area over the last two decades as evident from the numerous papers and review articles published in this area [4]\u2013[6]."]} +{"24856744|207209718": ["One such classification is to categorize the works into ones which address the problem of external intrusion detection using algorithmic methods [7]\u2013 [20] and works which use hardware-enhanced security methods to identify and mitigate internal security threats [21]\u2013 [24]."]} diff --git a/edge/graph_46940456.jsonl b/edge/graph_46940456.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57953b117b3b4793f70560c1cb14f42a1adb8b89 --- /dev/null +++ b/edge/graph_46940456.jsonl @@ -0,0 +1,7 @@ +{"206592484|456491": []} +{"4668902|15411200": ["Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015].", "Conventional error-correction mechanisms such as redundant execution and use of ECC incur high overhead [Mittal and Vetter 2015]."]} +{"4668902|16780247": ["Different memory technologies have different limitations, for example, SRAM and (e)DRAM consume high leakage and refresh power, respectively, and NVMs have high write energy/latency and low write endurance [Vetter and Mittal 2015; Mittal et al. 2015].", "\u20262012a, 2012b; Liu et al. 2012; McAfee and Olukotun 2015; Misailovic et al. 2014; Moreau et al. 2015; Ringenburg et al. 2014; Sampson et al. 2011, 2015; Shi et al. 2015; Shoushtari et al. 2015; Vassiliadis et al. 2015; Yazdanbakhsh et al. 2015a, 2015b] Use of OpenMP-style pragma [Rahimi et al.\u2026", "Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015].", "\u2026[Grigorian et al. 2015; Grigorian and Reinman 2014; Hegde and Shanbhag 1999; Khudia et al. 2015; Mahajan et al. 2015; Ringenburg et al. 2014, 2015; Roy et al. 2014; Samadi and Mahlke 2014; Yeh et al. 2007; Zhang et al. 2014] Annotating [Amant et al. 2014; Ansel et al. 2011; Carbin et al.\u2026"]} +{"4668902|978927": ["In fact, the electricity consumption of just the US data centers is expected to increase from 61 billion kWh (kilowatt hour) in 2006 [Mittal 2014a] and 91 billion kWh in 2013 to 140 billion kWh in 2020 [NRDC 2013]."]} +{"4668902|13037420": ["In fact, the electricity consumption of just the US data centers is expected to increase from 61 billion kWh (kilowatt hour) in 2006 [Mittal 2014a] and 91 billion kWh in 2013 to 140 billion kWh in 2020 [NRDC 2013].", "For example, by intelligently reducing the eDRAM/DRAM refresh rate or SRAM supply voltage, the energy consumed in storage and memory access can be reduced with minor loss in precision [Mittal 2012, 2014b]."]} +{"4668902|12904520": ["For example, by intelligently reducing the eDRAM/DRAM refresh rate or SRAM supply voltage, the energy consumed in storage and memory access can be reduced with minor loss in precision [Mittal 2012, 2014b]."]} +{"4668902|14583671": ["Different memory technologies have different limitations, for example, SRAM and (e)DRAM consume high leakage and refresh power, respectively, and NVMs have high write energy/latency and low write endurance [Vetter and Mittal 2015; Mittal et al. 2015].", "Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015]."]} diff --git a/edge/graph_46943891.jsonl b/edge/graph_46943891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2dfc6cdd2097d9afb50de1bfb84b7e5cb261e678 --- /dev/null +++ b/edge/graph_46943891.jsonl @@ -0,0 +1,12 @@ +{"18683243|27650400": ["We still need to investigate and devise systematic approaches when designing feedback requests [20] and aid developers with proper tools."]} +{"14261438|3330313": ["Such a perspective provides us with a universal geometric description of the structure of paired comparison data, which may help understand various models, in particular the linear models with sparse outliers used in this paper."]} +{"21606045|11381680": [", [14])."]} +{"5266515|205435103": ["Motivation is a topic that has received considerable attention in the software engineering research field, given that it is reported to be a major factor in project success [6, 11]."]} +{"16408046|3241708": []} +{"156860777|9948664": []} +{"156860777|54878689": []} +{"10326260|14022070": ["2 For recent reviews on software testing techniques, see (Jia and Harman, 2011; Ali et al, 2010; da Mota Silveira Neto et al, 2011; Nie and Leung, 2011; Dias Neto et al, 2007).", "There are many possible reasons for the variation in\n2For recent reviews on software testing techniques, see Jia and Harman (2011), Ali et al. (2010), da Mota Silveira Neto et al. (2011), Nie and Leung (2011) and Dias Neto et al. (2007).\nthe results."]} +{"785838|8742997": ["of articles Experiment [6][7][8][9][10][11][12][13][14][15] 10 Industrial Case [16][17][18][19][20][21][22] 7 Experience [23][24][25][26][27][3][28][29] 8", "10 Industrial Case [16][17][18][19][20][21][22] 7 Experience [23][24][25][26][27][3][28][29] 8 Tables IV and V provide an overview of the benefits and limitations identified in the literature review."]} +{"19446858|627405": ["\u2026and developing guidelines are grounded in several other IS research publications (e.g., Bandara et al., 2011; Boell & Cecez-Kecmanovic, 2014; Brereton et al., 2007; Kitchenham, 2004; Levy & Ellis, 2006; Okoli & Schabram, 2010; Turner et al., 2008; Webster & Watson, 2002; Wolfswinkel et al.,\u2026", "Identifying the challenges and developing guidelines are grounded in several other IS research publications (e.g., Bandara et al., 2011; Boell & Cecez-Kecmanovic, 2014; Brereton et al., 2007; Kitchenham, 2004; Levy & Ellis, 2006; Okoli & Schabram, 2010; Turner et al., 2008; Webster & Watson, 2002; Wolfswinkel et al., 2013)."]} +{"19446858|15164501": ["\u2026while Ngai and Gunasekaran (2007) applied broader descriptors in their review of mobile commerce research (\u201cmobile commerce\u201d, \u201cm-commerce\u201d), as did Leidner and Kayworth (2006) (\u201cIT culture\u201d, \u201cinformation systems culture\u201d, \u201cIT values\u201d) and Wareham et al. (2005) (\u201ceCommerce\u201d, \u201celectronic\u2026", "For instance, Leidner and Kayworth (2006) grounded their review of culture in IS research in nonempirical manuscripts and leading books to broaden their understanding of the empirical studies in the field, Melville, Kraemer, and Gurbaxani (2004) collected studies on IT and organizational\u2026", "For instance, Leidner and Kayworth (2006) grounded their review of culture in IS research in nonempirical manuscripts and leading books to broaden their understanding of the empirical studies in the field, Melville, Kraemer, and Gurbaxani (2004) collected studies on IT and organizational performance based on keywords from a definition of IT business value they developed at the outset of their review, and"]} +{"19446858|35897447": ["\u2026(2004) used the citations of papers they identified in their keyword search as sources for their review on IT and organizational performance, and Piccoli and Ives (2005) collected\u2014as part of their review on IT-dependent strategic initiatives\u2014a large number of papers from journals other than\u2026"]} diff --git a/edge/graph_4694555.jsonl b/edge/graph_4694555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_46949501.jsonl b/edge/graph_46949501.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_46951415.jsonl b/edge/graph_46951415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f5b930be93ef9b91798cc68d5a001acc2b7e22b --- /dev/null +++ b/edge/graph_46951415.jsonl @@ -0,0 +1,7 @@ +{"7675379|11894197": ["Historically, this dilemma has led to two approaches: 1) the \u201cinterpretable\u201d models approach, common in scientific discovery/bioinformatics [15], and 2) the accuracy-focused approach, common in computer vision with methods like deep learning, k-NNs [2], and SVMs [16]."]} +{"2654767|15170341": ["no-reference video quality measurement methods, we refer to [30]\u2013[37]."]} +{"15663427|6581557": ["When switching to new digital video services, customers expect superior quality compared to the traditional TV services (such as analog TV), for which they are willing to pay [3]\u2013[5]."]} +{"37548259|64404": []} +{"10505917|64404": ["For example, using HEVC (High Efficiency Video Coding) [8] or H.", "For example, using HEVC (High Efficiency Video Coding) [8] or H.264/AVC in VBR mode allows to guarantee a constant quality level across different frames, thus minimizing quality fluctuation and the associated visual discomfort."]} +{"3909983|15170341": ["A broad survey of image and video quality methods, as well as a classification of the methods, was published during 2007 in [11].", "This includes both NR and RR methods, and our article focuses on a classification and review of NR methods of IQA and VQA published after [11]."]} +{"2261490|6581557": ["Traffic collection closer to the end user will provide input for a more accurate estimate of QoE, as discussed also in [85]."]} diff --git a/edge/graph_46956220.jsonl b/edge/graph_46956220.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4300f06b3921d9efebc47a80e7eccf62959cb26 --- /dev/null +++ b/edge/graph_46956220.jsonl @@ -0,0 +1,9 @@ +{"113078749|1387401": ["The previous studies have shown that wireless channels exhibit transient errors at much higher rates than those observed on wires or \ufb01ber cables [11]."]} +{"110584618|1230643": []} +{"15353402|18956392": ["Several papers [38], [52]\u2013[55] have surveyed the CMFD techniques for electric generators and motors used in various industries."]} +{"62764594|1230643": ["In Wireless Sensor Networks (WSNs), not only is analyzing the large amount of data a serious concern, communicating the data to the fusion center is also a major issue due to a limited communication bandwidth (Akyildiz et al ., 2002)."]} +{"7428537|1230643": ["Although a saturated sensing can reduce the information loss, the redundant sensor network may be cursed with an extensive amount of irrelevant or even conflicting information, and an overload on data analysis and system cost [3], which is especially critical in wireless sensor networks [26]\u2013[29]."]} +{"6955055|905827": ["References [67] and [68] provide a good review of MCSA-based techniques."]} +{"120707004|18319089": []} +{"18078738|905827": []} +{"18078738|6327434": ["A number of survey papers were written, for instance, [2]\u2013[38], which are presented in Table I, categorized", "of analytical redundancy for model-based fault detection and diagnosis in the early survey paper [2]."]} diff --git a/edge/graph_46958258.jsonl b/edge/graph_46958258.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_46966524.jsonl b/edge/graph_46966524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e689552d009514ab67ba62633e203d63e44d54ef --- /dev/null +++ b/edge/graph_46966524.jsonl @@ -0,0 +1,12 @@ +{"6909832|1230643": ["\u2026tremendous attention in recent years due to the advances in MEMS technology and their potential applications in both civilian and military environments, such as environmental monitoring, industrial sensing and diagnostics, and information collecting for battlefield awareness [2], [3], [5], [7]."]} +{"207649994|1230643": ["[ 1-4 ]. A wireless sensor network consists of tiny sensing devices, deployed in a region of interest.", "On the other hand, protocol designers are seeking an energy efficient communication architecture, which involves all levels from the physical layer to the application layer [ 4 ].", "Our work is dedicated to scheduling nodes by using application knowledge (i.e., it belongs to one branch of application layer protocols according to the categories in [ 4 ]) and does not address the data communication problem."]} +{"1009884|1230643": ["Due to the inextricable relation with the physical world, the proper deployment of sensors is very important for the successful completion of the sensing tasks issued [5], [6], [ 7 ]."]} +{"15284954|1230643": ["... wireless networking, and embedded processing, ad-hoc networks of sensors have become increasingly available for commercial and military applications such as environmental monitoring (e.g., trac, habitat, and security), industrial sensing and diagnostics (e.g., factory and appliances), monitoring critical infrastructures (e.g., power grids, water distribution and waste disposal), and information collecting for battleeld awareness [ 1 , 9, 13, ..."]} +{"10201381|1230643": ["Pervasive networks of such sensors and actuators open new vistas for many potential applications, such as battlefield surveillance, environment monitoring and biological detection [11], [15], [ 2 ], [20]."]} +{"26194053|1137487": ["The problem of coverage for static wireless sensor networks has been extensively studied [2], [3]."]} +{"20990528|902018": ["Underwater sensor deployment is a very crucial process as it decides the achievable sensing and communication coverage [46], [47]."]} +{"20990528|870434": ["In UWSN there is an unavoidable delay due to the propagation speed of the signals [89]."]} +{"784420|1230643": ["Therefore, they are being widely employed for military fields, national security, environmental monitoring, traffic control, health, industry, disaster prevention and recovery (Akyildiz et al. 2002)."]} +{"35719872|1230643": []} +{"6702101|14068482": ["Sensor networks are also referred to as Geosensor networks as they are intensively used to acquire spatial information [28]."]} +{"16068762|870434": ["Manuscript received June 4, 2009; revised February 8, 2010.\nsystems [1], human paropsia [2], constructing aerial defense system [3], and aerosphere pollution monitoring [4] etc. 3D underwater WSNs also have various important applications [5], [6]."]} diff --git a/edge/graph_46966787.jsonl b/edge/graph_46966787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a7558a5838554b493c82b8297fc9dfdf001b42c --- /dev/null +++ b/edge/graph_46966787.jsonl @@ -0,0 +1,11 @@ +{"14983111|38476": ["In addition, we incorporate sliding window [15] and crossvalidation [11,12] techniques in the training and prediction stages and consequently evaluate the validity of the learning algorithms for prediction accuracy using statisticalmetrics, as discussed in the following sections.", "The sliding window technique [15] maps an input sequence x of size k to an individual output y by using a prediction model; this approach is very effective in the data mining field e."]} +{"4388922|18125683": []} +{"39245183|1932843": []} +{"39245183|8914588": []} +{"39245183|1708582": []} +{"1562837|193574": ["1059 impact of their execution on environment and considering other QoS parameters like reliability, security, availability and scalability [117]."]} +{"1562837|2254944": ["[10] concentrated on allocation of resources in distributed environment."]} +{"1562837|5969994": ["[12] have done innovative literature reviews in the field of resource allocation.", "[12] focused on algorithms of scheduling of jobs and policies of allocation of resources in cloud."]} +{"1562837|8914588": []} +{"25314744|16335158": ["Thereafter, multiple WSN\u2019s can interoperate in order to attend single or multiple applications, and sensing activities can be provided as services for users, allowing them to acquire/purchase services on demand [2]."]} +{"51877804|17474643": []} diff --git a/edge/graph_46973566.jsonl b/edge/graph_46973566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1b860062c65a961f9629aa5087593d070237aed --- /dev/null +++ b/edge/graph_46973566.jsonl @@ -0,0 +1,49 @@ +{"2824524|20905429": []} +{"17407951|13991708": []} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"3579945|30518875": ["Satellites are used for both locating trains (aided by Global Navigation Satellite Systems (GNSS) systems [21], like GPS, the European GALILEO, the Russian GLONASS or the Chinese BEIDOU) and communicating with the wayside equipment."]} +{"3579945|13991708": ["\u2026advances in electronics, networking, and robotics, it is feasible to develop advanced sensor systems for different sectors and applications: energy ef\ufb01ciency [32], Industry 4.0 [33,34], home automation [35], public safety and defense [36,37], precision agriculture [38] or transportation [39].", "Furthermore, Wireless Sensor Networks (WSNs) have evolved into an integral part of the protection of mission-critical infrastructures [36]."]} +{"3579945|6878121": ["IEEE 802.11p [15] may be an option if high data rates are not required."]} +{"3579945|22833814": ["Furthermore, in the case of high-speed scenarios, Wang et al. [9] present a survey on channel measurements and models."]} +{"3579945|10744611": ["Two major families of technologies may be considered [19,20]: \u2022 Satellite solutions."]} +{"3579945|17905276": ["WSN-based condition monitoring for the rail industry is the object of the survey presented in [87]."]} +{"3579945|860072": []} +{"31216129|205007974": ["[30], [49]), can be considered equivalent to the concept of compliant actuator [50], [51].", "Further details on the absorption elastic systems discussed above as well as other similar approaches are discussed in [50], [51], and [55]."]} +{"39708070|17325804": ["Our survey complements the similar survey papers [1] [2] [3] [4] by presenting the stateof-the-art techniques and by looking into a wider range of problems in wireless-based indoor positioning."]} +{"2026699|13991708": [", homes [7] or buildings) and industrial sectors, like defense [8,9], where electrical power systems would work cooperatively with smart devices to increase the visibility of energy consumption and create safer, cleaner and more sustainable energy systems."]} +{"1262156|1634674": []} +{"3503216|3579945": ["Note that, although this improvement in the energy efficiency is especially useful for battery-operated gateways, the increase on the level of security may also benefit other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which can be the target of cyberwarfare attacks [20]."]} +{"3503216|13991708": ["\u2026gateways, the increase on the level of security may also bene\ufb01t other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which\u2026", "As explained in [16], the fog layer must provide horizontal integration between different layer protocols."]} +{"3300016|3579945": []} +{"3300016|13991708": ["Basic Requirements for IoT Devices IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [10,11], smart cities [12], defense [13,14] and high-security applications [15\u201317], precision agriculture [18], transportation [19\u201321] or Industry 4."]} +{"3300016|21386749": ["Basic Requirements for IoT Devices IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [10,11], smart cities [12], defense [13,14] and high-security applications [15\u201317], precision agriculture [18], transportation [19\u201321] or Industry 4."]} +{"6816078|206583375": []} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"44248229|13991708": ["Security, robustness, and interoperability challenges hinder the widespread adoption of new CPS and IoT applications in military and mission-critical infrastructures [4]."]} +{"7119799|15181537": ["B. Component-and Model-Based Systems An overview of architecture frameworks and modeling languages is introduced by Paredis et al. [4]."]} +{"7119799|13219647": []} +{"6654913|206583375": ["One or more techniques can be applied together to compensate for the limitations of a single positioning technique [9].", "The appropriate indoor positioning technology should be selected carefully in order to make the right trade-off between the performance and the complexity of IPSs [9, 14].", ", WiFi signal strengths) transmitted by APs (multiple Access Points) are collected at every position of an interesting area for a certain period of time and stored into the radio map [27, 13, 19, 9].", "provided different classifications of indoor positioning technologies in 2009, in which they classified them, based on their need for existence of networks, into two classes; network-based and non-networkbased technologies [9].", "Privacy is extremely important to individuals using IPSs, where a strong access control over how users personal information is collected and used is crucial [9].", "An indoor positioning system (IPS) is a system that continuously and in real-time determine the position of a person or an object in an indoor environment [9] which has various applications [21, 17, 2].", "Triangulation is divisible into the subcategories of lateration, and angulation [9, 11].", "Lateration, which is sometime called range measurement, computes the position of an object by measuring its distance from multiple reference points [9].", "This can be caused at different levels of the system: system installation and maintenance, infrastructure components, and positioning devices [19, 9].", "In other words, we locate an object by computing angles relative to multiple reference points [11, 9]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"25999079|9978124": ["To this extent a six Degree of Freedom (6DoF) pose consisting of the camera position and orientation in a reference coordinate system is estimated [11]."]} +{"25999079|469744": ["A couple of those AR Remote Live Support applications have already been implemented, but most of them do not make use of a proper tracking method, so the annotations made by the remote expert are not registered correctly in 3D according to Azumas initial definition of AR [7]."]} +{"13991708|21738890": ["Relevant projects that estimate the network location of objects to perform context-aware services are reviewed in [98]."]} +{"13991708|6556803": ["The survey [109] reviews applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs, like data exchange and topology formation, resource and power optimization, area coverage, event tracking solutions, and\u2026"]} +{"13991708|7774517": ["Approaches to ensure data quality often rely on oversampling and \ufb01ltering of outlier values [70], reputation schemes that provide trustworthy sensing for public safety [71], or trust network-based human intervention approaches."]} +{"13991708|10310014": ["Over the last years, some research papers focused on evolving PS organizations have been published [21\u201325]."]} +{"3805855|3579945": ["Today, sectors like transportation [14], Industry 4."]} +{"3805855|13991708": ["0 [15], or even defense [16], [17] are benefiting from such advances."]} +{"45148828|16709997": []} +{"4625011|3579945": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|13991708": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|4719202": ["Note that picking items represents from 55 % to 65 % of the total cost of warehousing operations [75], which are still mostly carried out through a pick-by-paper approach."]} +{"4625011|469744": ["This definition is broader than the one given by other researchers [3], who disregarded photo-based augmentations, which have proved to be effective in industrial environments."]} +{"8657480|7365537": ["Generally, acoustic localization systems have better accuracy than RF-based systems, because it is straightforward to make time of flight measurements on slowly propagating acoustic signals, while distance estimates using RF signals must typically be made via less accurate amplitude (RSSI) measurements.", "However, RFID localization systems based on Received Signal Strength (RSSI) [1] are strongly affected by RF multi-path effects; these effects limit accuracy to meters.", "However, due to the complexity of indoor environments, navigation systems that perform well outdoors often work poorly indoors [1].", "The design of ultrasound emitting interval \u2206tTx and the sleep intervals tsleep of WISP Rx during acoustic related events depends on the location of acoustic transmitters, and is explained below: If dTij indicates to the space between two transmitters i and j (i, j \u2208 [1, 2, 3] in Figure 5) and tTij is the ultrasound time of flight given distance dTij (see Equation (3)), from Figure 5, we can see that dTi refers to the distance between the WISP Rx and transmitter i, and we use t\u2206Tij to represent the time difference of ultrasound propagation between distance dTi and dTj (Equation (2)).", "Compared to other acoustic localization systems [1], [3], our system do not need to actively send timing information to either acoustic receiver or transmitter for synchronization, therefore reducing power consumption and error caused by synchronizing acoustic signal."]} +{"17634564|206583375": ["ing localization systems [1] such as WLAN, RFID, GSM, Bluetooth and hybrid combinations thereof."]} +{"35046154|3474164": ["Network management and security still require more attention [7]\u2013[10]."]} +{"35046154|24110634": ["However, WSN is associated with many inherited challenges due to the sensor nodes constraints such as energy capacity, computational capability, and communication bandwidth [5], [6]."]} +{"35046154|4427557": ["LPWANs are specifically targeting situations where extended coverage is most needed, with low cost of deployment, involving devices that are delay tolerant, do not need a high data rates and require low power consumption network [14]."]} diff --git a/edge/graph_46974387.jsonl b/edge/graph_46974387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55282e54c35d736804c2487a96ba3192b4e1ef37 --- /dev/null +++ b/edge/graph_46974387.jsonl @@ -0,0 +1 @@ +{"2693824|18397881": ["In the absence of delays, in sampled-data control of nonlinear systems semiglobal practical stability is generally guaranteed [6,27,28,29], with the desired region of attraction achieved by sufficiently fast sampling.", "For example, all sampled-data feedback designs proposed in [5,6,11,14,27,28,29,31] which guarantee global stabilization can be exploited for the stabilization of a delayed system with input/measurement delays, sampled measurements and input applied with zero order hold."]} diff --git a/graph_469744.jsonl b/edge/graph_469744.jsonl similarity index 100% rename from graph_469744.jsonl rename to edge/graph_469744.jsonl diff --git a/edge/graph_46975329.jsonl b/edge/graph_46975329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_46976480.jsonl b/edge/graph_46976480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..daadeff359186465686e6bfc682f08967f74349b --- /dev/null +++ b/edge/graph_46976480.jsonl @@ -0,0 +1,10 @@ +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"15098999|14757367": ["The EK is a 2048-bit RSA key pair that is bonded to the respective TPM, and it is certified by the TPME [1].", "However, if a TPM implements (optional) the \u201crevoke trust\u201d [1] functionality then the TPM can revoke the old EK and generate a new EK (if required).", "\u2022 Security: A DSP multi-core processor can be integrated in a SoC to perform the function of a security module that contains a cryptographic engine responsible for the logical protection of the voice, data and internetworking systems, as well as providing support for the defense against malicious software and firewall acceleration [1, 2, 48].", "He was originally employed by Gemplus (now called Gemalto after a merger with Axalto) to develop authentication algorithms for GSM SIM cards.", "In 1971 Intel released its first real microprocessor, the 4004 and with it, the era of microcomputers began [1].", "The public portion of the EK, which is termed as PUBEK by the TPM specification does not have any security or privacy issues associate with its exposure, assuming there is no association with other information [1].", "To change the AuthData, an entity can execute either AuthData change protocol (ADCP) or asymmetric authorisation change protocol (AACP) [1].", "2 Generic architecture of trusted platform module [1]", "He is coeditor of the NFC technical guidelines white paper published by the GSMA.", "\u2022 1991: The first GSM [1] mobile SIM [2] card was manufactured by Giesecke and Devrient.", "During the lifetime of a TPM, an entity can provide the proof of ownership to the TPM by either using the protocols: object-independent authorisation protocol (OIAP), objectspecific authorisation protocol (OSAP) and delegated-specific authorisation protocol (DSAP) [1].", "The root of trust in the TCG specifications [1, 2] is a collection of\u2014a root of trust for measurement (RTM), a root of trust for storage (RTS) and a root of trust for reporting (RTR).", "Before he joined Mobilkom Austria in 2003 he was working as Freelancer for Ascom (Solothurn), Philips Semiconductors (Zurich) and Hughes Network Systems (San Diego, CA) in the field of GSM and Data Protocols."]} +{"7993325|1775475": ["service provision in a mobile computing environment [30]."]} +{"1044435|2905017": []} +{"1044435|2187403": []} +{"1044435|1113420": []} +{"39731964|1113420": ["\u2026on dependability issues and have not included other important features like interoperability, adaptability, context-awareness, location transparency etc. Baldauf, et al. [7] presented a survey in which they have illustrated various design principles and context models for context-aware systems ."]} +{"6091051|15299188": ["On the other hand, SOAP message compression [29], [30] improves the bandwidth requirement of SOAP communication by compressing the XML text in binary data at the expense of CPU usage and latency."]} +{"367255|16352922": ["These activities require notable computational and communications efforts and typically end up with ad-hoc solutions \u2013 brittle, inflexible, and non-adaptable \u2013 for a contingent coordination problem.", "Computing is becoming intrinsically pervasive and mobile [15]."]} diff --git a/edge/graph_46978224.jsonl b/edge/graph_46978224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04e67fc727a986dd9282a0e86db6b5cddefda1e6 --- /dev/null +++ b/edge/graph_46978224.jsonl @@ -0,0 +1,5 @@ +{"110477034|365692": []} +{"19825066|10096622": ["Data mining techniques are effective ways to handle these data, and to obtain \u201cuseful\u201d information [28, 29]."]} +{"19825066|5646762": []} +{"19825066|13215551": ["Generally, there are two kinds of approaches that apply population-based algorithms as data science techniques [38]."]} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} diff --git a/graph_4697961.jsonl b/edge/graph_4697961.jsonl similarity index 100% rename from graph_4697961.jsonl rename to edge/graph_4697961.jsonl diff --git a/graph_4698297.jsonl b/edge/graph_4698297.jsonl similarity index 100% rename from graph_4698297.jsonl rename to edge/graph_4698297.jsonl diff --git a/edge/graph_46990242.jsonl b/edge/graph_46990242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e83f2dcca9724a49026679d689002c1ec54849b5 --- /dev/null +++ b/edge/graph_46990242.jsonl @@ -0,0 +1,9 @@ +{"13834892|3695786": ["In [13], authors conducted a systematic literature review on sentiment analysis."]} +{"11860231|586521": ["A | 1|/| | 1 | 2|/| | 2 [2]"]} +{"7603825|18599847": []} +{"76653997|12457965": ["Several domains nowadays are relying on time-series data such as financial, stock market, climate change and others [4]."]} +{"13739564|64573664": []} +{"13739564|3695786": ["The output result after processing is compared with the known class and performance is measured in terms of precision, recall and f measure [1], [20], [21], [24], [26]."]} +{"64573664|58901801": []} +{"1502610|16479005": ["[5] surveyed different techniques like MultiLayer Perceptron Neural Network (MLPNN), Back Propagation Algorithm (BPA), Radial Basis Function Network (RBFN), SOM (Self Organization Map) and SVM (Support Vector Machine).", "A neural network is a massively parallel distributed processor made up of simple processing units, which has a natural tendency for storing experiential knowledge and making it available for use [5]."]} +{"3695786|627405": ["For the selection of most relevant research articles with high quality measures, a detailed procedure is adopted in this study along with some specific structure and boundary lines as explained by [21] and [22]."]} diff --git a/edge/graph_46997227.jsonl b/edge/graph_46997227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc4a6360328090751b9ca31c56827e0290d8ceef --- /dev/null +++ b/edge/graph_46997227.jsonl @@ -0,0 +1,9 @@ +{"59401722|9431428": ["At the last years, advances on machine learning and pattern recognition methods have been used for predicting the diagnosis of individuals from morphological analysis of structural and functional MRI (Pereira et al. 2009)."]} +{"9271701|819377": ["In other words, foreground objects can be detected simply by subtracting the current frame from a video sequence [9], [10]."]} +{"5124344|205694962": ["This might arise as neuronal changes signaling damage which may precede the conversion to clinical disease (Alberdi et al., 2016).", "Given that PET imaging detected amyloid deposition in the brain well before the onset of clinical symptoms in AD (Pike et al., 2007; Rowe et al., 2007), retinal imaging of in vivo A\u03b2 accumulation is an exciting prospect."]} +{"641747|4361938": ["The interested reader is referred to [22], [23], [127] for eye movement studies and [24] for a breadth-first survey of eye tracking applications."]} +{"592204|5807554": ["Despite the presented approaches, hand segmentation is still far from being solved due to computational cost and variations in illumination [10].", "While they could be classified as \u201clow-level\u201d and \u201chigh-level\u201d, in this manuscript, the two categories proposed in [10] will be applied, i."]} +{"592204|15757638": ["A wider overview of hand gesture recognition systems can be found in [62]."]} +{"592204|27637541": ["According to this, human behaviour analysis tasks are classified [9] into motion, action, activity and behaviour (Figure 1).", "Human behaviour analysis tasks: classification (reprinted from [9])."]} +{"592204|14397159": ["Recently, cameras have begun to be employed in AAL systems to monitor ADLs [6,7], as they provide richer sensory information than the traditional sensors employed in those systems to monitor people, e."]} +{"18587424|4361938": ["While still not inexpensive, and so hardly ubiquitous, eyetracking is being used by many groups to perform experimental studies in visualization and user interface design as well as film, advertising and related fields [12, 3, 4]."]} diff --git a/edge/graph_47006279.jsonl b/edge/graph_47006279.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..965cf7c97d3dd60813e594bd7a02be8f543b6cfa --- /dev/null +++ b/edge/graph_47006279.jsonl @@ -0,0 +1,2 @@ +{"9888325|6430931": []} +{"58006624|18740719": ["A paper by Cherdantseva et al. (2016) systematically examines 24 risk assessment methods.", "A paper by Cherdantseva et al.(33) systematically examines 24 risk assessment methods."]} diff --git a/edge/graph_47016532.jsonl b/edge/graph_47016532.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57ba44943f550a4ba201efc36211b6d67e942039 --- /dev/null +++ b/edge/graph_47016532.jsonl @@ -0,0 +1 @@ +{"6716595|11009327": []} diff --git a/edge/graph_47017471.jsonl b/edge/graph_47017471.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..baec86275c8c7aca4122c6f3d4bbdc82304b0abd --- /dev/null +++ b/edge/graph_47017471.jsonl @@ -0,0 +1,40 @@ +{"8301633|4491892": []} +{"19738163|17084176": ["One of existing methods, such as removal of high-betweenness [26], mimicking human pair wise communication [27], analysing graph structures [28,29] and so on, can be adopted to detect the overlapping communities in the network."]} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"45382238|1940388": []} +{"45382238|17205659": ["The security issue has been raised by many researchers [13-23], and, due to the deployment of WSN nodes in hazardous and/or hostile areas in large numbers, such deployment forces the nodes to be of low cost and therefore less reliable or more prone to overtaking by an adversary force."]} +{"45382238|1230643": ["Due to impressive technological innovations in electronics and communications, small low-cost sensor nodes are available, which can collect and relay environmental data [3, 4].", "Originally motivated by surveillance in battlefields for the military, interest in WSNs spread over a wide range of applications, from scientific exploration and monitoring, for example, the deployment of a WSN on an active volcano [5, 6], to monitoring the microclimate throughout the volume of redwood trees [7], to building and bridge monitoring [8, 9], to health-care monitoring [10] and a number of other applications presented in [2, 3, 11, 12]."]} +{"5789756|9240891": []} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"18536832|14697846": ["Managing trust is regarded as a key for solve the problem of security in P2P computing [1]."]} +{"207230419|14745481": ["In Computing and Networking , the concept of trust is used in many different \ufb01elds ranging from arti\ufb01cial intelligence to human\u2013machine interaction to networking (e.g., telecommunication, social network analysis, communication networks, and cyber/network security) [Cho et al. 2011; Adal\u0131 2013].", "\u2026path, node density, reachability), fault tolerance (e.g., system lifetime), cooperative or sel\ufb01sh behaviors (e.g., forwarding or dropping packets), and network capacity (e.g., traf\ufb01c or congestion) [Daly and Haahr 2009; Desmedt et al. 2007; J\u00f8sang 1999; Lana and Westphall 2008; Cho et al. 2011].", "The agent can make a decision based on learning from past experience to maximize its interest (or utility) and/or minimize risk [Cho et al. 2011; Li et al. 2008].", "Various security applications using trust, including intrusion detection, secure routing, key management, and access control, have been studied extensively in the literature [Cho et al. 2011].", "Past surveys on trust research are often limited to a particular research domain, such as trust metrics in data fusion [Blasch et al. 2014], trust management in mobile ad hoc networks (MANETs) [Cho et al. 2011], and trust and reputation systems in online services [J\u00f8sang et al. 2007].", "\u2026goal in a situation where imperfect knowledge is given with uncertainty and vulnerability Lee et al. [2006] Computing & Networking Estimated subjective probability that an entity exhibits reliable behavior for particular operation(s) under a situation with potential risks Cho et al. [2011] \u2014", "\u2026concept, the term has been used in different disciplines to model different types of relationships: trust between individuals in social or e-commerce settings, trust between a person and an intelligent agent in automation, and trust between systems in communication networks [Cho et al. 2011]."]} +{"16653344|4491892": [",N ; 7 Let \u03c0\u0302k = 1 N \u2211N i=1 \u03c3xik ; It is shown that the empirical distribution\u0302 \u03c0k converges to the exact target distribution \u03c0k asN \u2192 \u221e [30, 31]."]} +{"28572081|9240891": []} +{"14287029|4491892": ["(19) As the operators for generating and weighting samples belon g t the routine PF framework, the results have theoretical guarantees as proved in the literature [23 , 24]."]} +{"1029937|10137283": ["Ruohomaa and Kutvonen [35] provides a detailed survey and discussion of alternative approaches for trust management.", "Ruohomaa and Kutvonen [35] provides a detailed survey and iscussion of alternative approaches for trust management."]} +{"1029937|9240891": ["\u20262004) [78] Software engineering (Viega et al., 2001) [82] Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O'Hara et al., 2004)\u2026", "Modeling research ranges from simple access control polices (which specify who to trust to access data or resources) to anal- Table 1 A categorization of major areas of trust research Policy-based trust Network security credentials (Kohl and Neuman, 1993) [9] Trust negotiation (Yu et al., 2001) [10] (Yu and Winslett, 2003) [11] (Winslett et al., 2002) [13] (Li et al., 2003) [14] (Nejdl et al., 2004) [15] (Bonatti and Olmedilla, 2005) [16] (Gandon and Sadeh, 2004) [17] (Winsborough et al., 2000) [12] (Seigneur and Jensen, 2004) [18] Security policies and trust languages (Tonti et al., 2003) [19] (Uszok et al., 2003) [20] (Kagal et al., 2003) [21] (Nielsen and Krukow, 2003) [22] (Carbone et al., 2003) [23] (EHR Policy, 2001) [24] (XACML, 2005) [26] (SAML, 2005) [27] (WS-Trust, 2005) [28] (Becker and Sewell, 2004) [25] (Leithead et al., 2004) [29] Distributed trust management (Blaze et al., 1996) [31] (Blaze et al., 1999) [32] (Chu et al., 1997) [33] (Kagal et al., 2002) [34] Effect of credential type (Zheng et al., 2002) [36] Reputation-based trust Decentralization and referral trust (Abdul-Rahman and Hailes, 1997a) [37] (Abdul-Rahman and Hailes, 1997b) [38] (Yu and Singh, 2000) [39] (Yu and Singh, 2002) [40] (Yu and Singh, 2003) [41] (Sabater and Sierra, 2002) [42] (Beth et al., 1994) [43] (Xiao and Benbasat, 2003) [44] (O'Donovan and Smyth, 2005) [45] Trust metrics in a web of trust (Goldbeck and Hendler, 2004a) [51] (Goldbeck and Hendler, 2004b) [52] (Stewart, 1999) [53] (Stewart and Zhang, 2003) [54] (Richardson et al., 2003) [55] (Masa and Avesani, 2005) [56] (Guha et al., 2004) [57] (Advogato, 2000) [58] (Chirita et al., 2004) [59] (Ding et al., 2004) [60] Trust in P2P networks and grids (Kamvar et al., 2003) [47] (Cornelli et al., 2002) [48] (Aberer and Despotovic, 2001) [49] (Damiani et al., 2002) [50] (Olmedilla et al., 2005) [7] Application-specific reputation (Pirzada and McDonald, 2004) [61] (Dash et al., 2004) [62] (Josang and Ismail, 2002) [63] ) [65] (Acrement, 2002) [66] (Mui et al., 2002) [5] (Staab et al., 2004) [67] Computational and online trust models (Marsh, 1994) [68] (Ziegler and Lausen, 2005) [69] (Resnick et al., 2000) [70] (Friedman et al., 2000) [71] (Falcone and Castelfranchi, 2004) [72] (Jonker et al., 2004) [73] Game theory and agents (Buskens, 1998) [74] (Brainov and Sandholm, 1999) [75] (Ashri et al., 2005) [76] (Ramchurn et al., 2003) [77] (Huynh et al., 2004) [78] Software engineering (Viega et al., 2001) [82] Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O'Hara et al., 2004) [85] Trust using hyperlinks (Gyongy et al., 2004) [86] (Massa and Hayes, 2005) [87] (Brin and Page, 1998) [46] (Kleinberg, 1999) [88] Filtering information based on trust (Ciolek, 1996) [89] (Clarke et al., 2001) [90] (Downey et al., 2005) [91] Filtering the Semantic Web (Bizer et al., 2005) [92] (Ding et al., 2003) [93] (Ding et al., 2005) [94] (Ziegler, 2004) [95] Subjectivity analysis (Riloff et al., 2005) [97] (Stoyanov et al., 2005) [98] (Cardie et al., 2004) [99] Provenance information (McGuinness, 2005) [100] (Golbeck, 2006) [101] (Zhao et al., 2004) [102] (Wong et al., 2005) [103] (Kim et al., 2007) [104] Content trust (Gil and Ratnakar, 2002) [107,108] (Chklovski et al., 2003) [109] (Castelfranchi et al., 2003) [110] (Gil and Artz, 2006) [111] Site design and human factors (Sillence et al., 2004) [112] (Stephens, 2004) [113] (Corritore et al., 2001) [114] yses of competence, beliefs, risk, importance, utility, etc.", "The next definition, from Grandison and Sloman [6], introuces context and is unique in referring to the \u201ccompetence\u201d to ct (instead of actions, themselves):", "Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O\u2019Hara et al.", "Focusing on trust n Internet applications, which exchange or display informaion, Grandison and Sloman [6] give a provisional definition nd discussion of trust across a wide set of literature, and explore olutions and applications of trust management (which in their ork essentially means the implementation of security policies).", "Focusing on trust in Internet applications, which exchange or display information , Grandison and Sloman [6] give a provisional definition and discussion of trust across a wide set of literature, and explore solutions and applications of trust management (which in their work essentially means the implementation of security policies).", "\" The next definition, from Grandison and Sloman [6], introduces context and is unique in referring to the \" competence \" to act (instead of actions, themselves): \" [Trust is] the firm belief in the competence of an entity to act dependably, securely, and reliably within a specified context."]} +{"11599349|4491892": ["The convergence properties of PF methods for nonlinear non-Gaussian state filtering problems have been proved [15\u201317]."]} +{"13150320|14368770": []} +{"13150320|35426346": []} +{"67868052|508178": ["A good overview of existing trust and reputation systems in various applications has been analyzed by Sheikh Mahbub Habib who characterized their pros and cons and emphasizes the crucial need of trust in cloud [2]."]} +{"17689312|6950376": []} +{"17689312|2294541": []} +{"17689312|18194234": []} +{"17689312|1462862": []} +{"17689312|10137283": []} +{"17689312|9240891": []} +{"460027|14745481": ["1), we consider two types of trust properties: QoS trust: QoS trust [10] is evaluated through the communication network by the capability of a node to deliver messages to the destination node.", "Social trust: Social trust [10] , [25] is based on honesty or integrity in social relationships and friendship in social ties."]} +{"6950376|17205659": ["The security issue has been raised by many researchers [14-24], and, due to the deployment of WSN nodes in hazardous and/or hostile areas in large numbers, such deployment forces the nodes to be of low cost and therefore less reliable or more prone to overtaking by an adversary force."]} +{"6950376|1230643": ["Originally motivated by surveillance in battlefields for the military, interest in WSNs spread over a wide range of applications, from scientific exploration and monitoring, for example, the deployment of a WSN on an active volcano [6, 7], to monitoring the microclimate throughout the volume of redwood trees [8], to building and bridge monitoring [9, 10], to health-care monitoring [11] and a number of other applications such as [3, 4, 12, 13] such as:", "Due to impressive technological innovations in electronics and communications, small low-cost sensor nodes are available, which can collect and relay environmental data [4, 5]."]} +{"17056617|1333339": []} +{"37354073|4491892": ["See theoretical proofs for the convergence result of the PF methods in [25]."]} +{"37354073|33286487": ["100639 the frequency is equal to the IF [4], however, it performs unsatisfactorily in noisy environments [5]."]} +{"29532810|1230643": ["While modern research on sensor networks started on the late seventies [6], this paradigm acquired an identity of its own at the beginning of the twenty-first century [21]."]} +{"28952352|2294541": ["Bad-mouthing and ballot-stuffing attacks are the most common forms of reputation attacks [30]."]} +{"99520|14441987": ["Reproduction for academic, not-for profit purposes permitted provided this text is included.\nby Royer and Toh (1999) as Reactive and Proactive.", "The model introduces the notion of belief and provides a dynamic measure of reliability and trustworthiness in an ad hoc network."]} +{"6824019|2294541": []} +{"6824019|1462862": []} +{"6824019|9240891": ["Some of them are based on online trust and reputation related systems (Jsang et al. 2007; Grandison and Sloman 2000; Artz and Gil 2007; Grabner-Kruter and Kaluscha 2003), others on trust and reputation in peer-to-peer systems (Koutrouli and Tsalgatidou 2006; Suryanarayana and Taylo 2004)."]} +{"11972743|14745481": ["At the SN level, each SN is responsible to report its peer-to-peer trust evaluation results towards other SNs in the same cluster to its CH which applies statistical analysis and", "The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"11972743|1940388": ["The trust value that node i evaluates towards node j at time t , (cid:1846) (cid:3036)(cid:3037) (cid:1872) , is represented as a real number in the range of [0 where 1 indicates 1 2 3 4"]} +{"37728354|1333339": []} diff --git a/edge/graph_47017778.jsonl b/edge/graph_47017778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..212d6b5156816da6750fbbbff1a925cf77aca4ca --- /dev/null +++ b/edge/graph_47017778.jsonl @@ -0,0 +1,2 @@ +{"57764123|7165993": ["mented as a program oracle [78], for instance as assertions embedded in a set of test cases [79]."]} +{"57764123|9436742": ["Software healing solutions detect software failures in-the-field and respond to them by making the necessary adjustments to restore the normal operation of a system [66], [67], [68].", "ware availability despite failure occurrences [66], [67], [68]."]} diff --git a/edge/graph_47017937.jsonl b/edge/graph_47017937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf226ca0b7af140807feb75b0ca56fe9517d282e --- /dev/null +++ b/edge/graph_47017937.jsonl @@ -0,0 +1,23 @@ +{"46775804|2065066": ["\u2026[24], graph cut [25], and random walker [26], which require predefined seeds, and fully automatic segmentation techniques such as edge-based [27], region-based [27], split and merge [28], and watershed techniques [29], However, in the case of DHM, these existing methods are not reliable\u2026", "\u2026cut [25], and random walker [26], which require predefined seeds, and fully automatic segmentation techniques such as edge-based [27], region-based [27], split and merge [28], and watershed techniques [29], However, in the case of DHM, these existing methods are not reliable because of the\u2026"]} +{"40569057|8575576": []} +{"52283533|2088679": []} +{"52283533|8575576": []} +{"25310609|530484": []} +{"21725595|1229096": ["Recently, robustness in deep learning has been actively studied (Fawzi et al., 2017) as deep neural networks are being applied to diverse tasks involving real-world applications such as autonomous driving (Paden et al., 2016) Laine & Aila (2017)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"90544405|47017937": []} +{"12259951|2088679": ["Deep learning networks for conventional [9] and biomedical [10] image classi\ufb01cation are now commonplace and much of this recent work relies on CNNs."]} +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"206771654|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"6645229|8575576": ["st\u2019s workday [15,17,7]. Consequently, over the past several decades there has been increasing interest in developing computational methods to assist in the analysis of microscopic images in pathology [9,8]. From October 2015 to April 2016, the International Symposium on Biomedical Imaging (ISBI) held the Camelyon Grand Challenge 2016 (Camelyon16) to identify topperforming computational image analysis s", " machine learning methods, including: regression, support vector machines, and random forests. Typically, these algorithms take as input relatively small sets of image features (on the order of tens) [9,10]. Building on this framework, approaches have been developed for the automated extraction of moderately high dimensional sets of image features (on the order of thousands) from histopathological image"]} +{"13697129|8575576": []} +{"125136300|4795312": []} +{"86717849|469744": []} +{"86717849|17024419": []} +{"1740355|1708582": []} +{"1740355|14843594": ["Bayesian optimization has also been used (Shahriari et al., 2016) for automatic selection of network architectures (Bergstra et al., 2013; Domhan et al., 2015) and hyperparameters (Snoek et al., 2012; Swersky et al., 2013)."]} +{"3548164|6863252": ["Multimodal registration is a very challenging problem in medical imaging commonly faced during image-guided interventions and data fusion [13].", "The minimization is commonly solved in a continuous or discrete optimization framework [13], depending on the nature of \u03b8."]} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"195346186|393948": ["The number of ConvBlock layers in each DB is L = [4, 5, 7, 10, 12, 10, 7, 5, 4, 4, 4] (marked", "In essence, CNN captures the invariants while filtering out the random fluctuations [5, 52]."]} diff --git a/edge/graph_47019063.jsonl b/edge/graph_47019063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4aaef7e708f25f2b9cc6f4839c174db0b473aa3b --- /dev/null +++ b/edge/graph_47019063.jsonl @@ -0,0 +1,3 @@ +{"16222956|15162390": ["We note here that the previous research performed spelling checking mainly by using dictionary-based matching [6], [30], [33]."]} +{"16222956|14176218": ["multiple studies in the recent years [8]."]} +{"9298083|393948": ["Recent developments in representation learning ( deep learning ) [6] have enabled the scalable learning of such models."]} diff --git a/edge/graph_47020167.jsonl b/edge/graph_47020167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c02669201af160d5ed257c01f3ac6da925cb13c --- /dev/null +++ b/edge/graph_47020167.jsonl @@ -0,0 +1,5 @@ +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"1914494|393948": ["In our model, an AST node is first represented as a distributed, real-valued vector so that the (anonymous) features of the symbols are captured.", "To capture explicit structures in data, it may be important and beneficial to integrate human priors to the networks (Bengio, Courville, and Vincent 2013).", "A generic criterion for representation learning is \u201csmoothness\u201d\u2014similar symbols have similar feature vectors (Bengio, Courville, and Vincent 2013)."]} +{"1754769|6670217": ["Finally, [12] surveys some security solutions for mobile devices."]} +{"4494113|2840997": ["There are many approaches [25] to doing quantifier elimination which is a key step in reachability analysis.", "A more comprehensive survey of SAT-based techniques can be found in [25]."]} +{"11930958|191396": ["The application of techniques like PCA, known in general as dimensionality reduction procedures [58], is recommended when dealing with feature vectors whose size is higher than 15 \u2014 as in our case.", "In case of MATLAB, the algorithms included in ML4PG are the two most popular methods for clustering: K-means and Gaussian [58]."]} diff --git a/edge/graph_47021390.jsonl b/edge/graph_47021390.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_47021799.jsonl b/edge/graph_47021799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb12e75ec0930233f2fba3a1c27910b2578462cb --- /dev/null +++ b/edge/graph_47021799.jsonl @@ -0,0 +1,19 @@ +{"63306915|12815020": ["Web services introduce challenges to security, for example, HTTP vulnerabilities that present threats while users access Cloud services [50].", "Some consider virtualization and its multi-tenancy feature to be a direct Cloud privacy and security threat [50, 76]."]} +{"11381530|207209718": ["These threats can be devastating, for example, Denial of service (DoS) denies or prevents legitimate users resource on a network by introducing unwanted traffic [5]."]} +{"11381530|9928823": ["[138] Li Deng, \u201cA tutorial survey of architectures, algorithms, and applications for deep learning,\u201d APSIPA Trans.", "To train RNN as a discriminative model, training data needs to be presegmented and a post-processing to transform the output to a labelled data [138].", "Other forms are stacked auto encoder and de noising auto encoder a [138].", "The joint statistical distribution of the variables can be written as products of the nodes and their associated variables [136], [138].", "Its structure is an offspring of a general Boltzmann machine (BM) which is a network of units based on stochastic decisions to determine their on and off states [138]."]} +{"11381530|11211443": ["The traffic activities gathered by the system application files and system [20] are called the audit trails [22]\u2013[24]."]} +{"11381530|18977370": ["a) Mean, standard deviation and any other form of correlations are known as moments in statistics [35], [45]."]} +{"11381530|12815020": ["One advantage is that it offers the ability to detect attacks which are new to the system [34]."]} +{"11381530|6430931": ["The model compares an input vector to a single neuron\u2019s weight (weight vector) [118], [126].", "The outcomes are True Negative (TN), True Positive (TP), False Positive (FP) and False Negative (FN) [118], [119].", "The supervised models are made up of ARTMAP, Fuzzy ARTMAP and Gaussian ARTMAP [118].", "Anomaly events can thus be identified by analysing the normal and abnormal events from the mapping [118], [126].", "It classifies by taking a measurement of the distance between the inputs and the centre of hidden neurons [118]."]} +{"11381530|192934": ["[78] developed a model of statistical pattern recognition as shown in Fig."]} +{"35066811|3423198": ["Multi-objective feature selection has been addressed in several fields, such as Quality of Service (QoS) constraints in multimedia content distribution [41], handwritten digit recognition [42], among others [43]; however, for intrusion detection purposes its use remains rare."]} +{"35066811|13172512": ["In studies in the literature, anomaly-based intrusion detection was in general treated as a pattern\u2013recognition problem [16] through machine learning techniques."]} +{"3306364|11381530": ["[25] have produced a comprehensive taxonomy and survey on notable NIDSs approaches that utilise deep and shallow learning."]} +{"3306364|18188725": ["[2] presented a state-of-the-art survey of deep learning applications within machine health monitoring.", "Not only is this a labour intensive and expensive process but it is also error prone [2].", "One of the most prominent techniques currently used within deep learning research is DBNs [1], [2], [7]."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"10934690|12395887": []} +{"24437481|207209718": ["the intrusion detection is fundamental to security protection of industrial process automation [12]."]} diff --git a/edge/graph_47022048.jsonl b/edge/graph_47022048.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f5cdd751acae506088ad3271afb244630223eb0 --- /dev/null +++ b/edge/graph_47022048.jsonl @@ -0,0 +1,24 @@ +{"35782884|7860973": []} +{"23682133|819377": ["In these scenarios, the classical algorithms frequently lead to misdetections that can be avoided by identifying the moving objects remaining temporarily static [7, 15]."]} +{"10051447|12127129": ["Numerous methods for background subtraction have been proposed over the past years (see [10, 11] for surveys)."]} +{"3206013|12127129": ["Traditionally, foreground/background detection has been approached by exploiting only color information through a large variety of mathematical algorithms [1] based on graph cut [2], mean-shift clustering [3], Gaussian mixture models [4], or non-parametric kernel density estimation [5], among the others."]} +{"14214585|6387482": []} +{"4351505|18889901": []} +{"18152430|18546648": ["Shadows Features: Colors, edges, textures [206][317][3][219][9][25][246] Strategies: Markov Random Fields (MRF) [246]", "Complete studies and surveys can be found in [206][317][3][219][9]."]} +{"18152430|819377": ["So, the previous surveys made by Bouwmans et al. focus only on some categories [38][34] or sub-categories [37][33][40] of background models as follows: is the most common approach ."]} +{"18152430|12127129": ["In 2004, Piccardi [201] provided a review on 7 methods and an original categorization based on speed, memory requirements and accuracy."]} +{"63932173|12127129": []} +{"7018628|819377": ["For the depth classifier, the Gaussians have a single dimension; for the color based classifier, Gaussians have three component s that are assumed to be independen t, thus reducing the computa tional cost of the algorithm as widely consid ered in the literature [6,26].", "5 (used for matched component identification in MoG models [26]) as the distance for which CLC is considered a very reliable classifier, reaching the maximum weight Wmax for d\u00f0x\u00de 1\u20444 2."]} +{"7212191|12127129": ["The Gaussian mixture background model (GMM) is regarded as a competitive background model due to its robustness to various background variations including multi-model, quasi-periodic and gradual illumination changes [21,30,36]."]} +{"15373695|819377": ["Each pixel has a corresponding mixture of K Gaussians.", "A survey about background modeling using mixture of Gaussians [11] introduced user parameter values in detail for implementing [10]."]} +{"13314843|819377": ["Moving object detection becomes more challenging when the video sequences include strong and mild illumination changes, foreground objects that are very close in color to the background, and foreground or background objects that are too close to/far from the sensor [8].", "Moving object segmentation from these videos is still a challenging problem [8,9,21,22]."]} +{"9797754|819377": []} +{"12549541|819377": ["\u2022 Bouwmans et al., 2008 [5] survey only GMMmethods and use the Wallflower dataset.", ", 2008 [5] survey only GMMmethods and use the Wallflower dataset."]} +{"26831328|819377": []} +{"26831328|12127129": []} +{"16467616|12127129": []} +{"2124800|8446711": []} +{"2124800|819377": ["A widely used approach for background modeling in this context is GMM, which assigns a mixture of gaussians per pixel with a fixed number of components (Bouwmans et al. 2008).", "A widely used approach for background modeling in this context is Gaussian Mixture Models (GMM), which assigns\nMulti-modal RGB-Depth-Thermal Human Body Segmentation 9\na mixture of gaussians per pixel with a fixed number of components (Bouwmans et al, 2008)."]} +{"2715695|819377": []} +{"2715695|12127129": []} +{"18913110|12127129": ["Due to its pervasiveness in various contexts, background subtraction has been afforded by several researchers (see surveys in [2, 5, 9, 10])."]} diff --git a/edge/graph_47023662.jsonl b/edge/graph_47023662.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1710c10fd780fbd18eb8b04c71a38155027a41ff --- /dev/null +++ b/edge/graph_47023662.jsonl @@ -0,0 +1 @@ +{"18019001|10739218": ["Some of methods lead to the extraction of rules that involve fuzzy grades of membership calculation (Hayashi, 1991; Mitra & Hayashi, 2000)."]} diff --git a/graph_4709516.jsonl b/edge/graph_4709516.jsonl similarity index 100% rename from graph_4709516.jsonl rename to edge/graph_4709516.jsonl diff --git a/graph_4710623.jsonl b/edge/graph_4710623.jsonl similarity index 100% rename from graph_4710623.jsonl rename to edge/graph_4710623.jsonl diff --git a/graph_4711681.jsonl b/edge/graph_4711681.jsonl similarity index 100% rename from graph_4711681.jsonl rename to edge/graph_4711681.jsonl diff --git a/edge/graph_47125.jsonl b/edge/graph_47125.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4715059.jsonl b/edge/graph_4715059.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_47156761.jsonl b/edge/graph_47156761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42cfa3d3ac81636efdd9169fef6a60fac7950a90 --- /dev/null +++ b/edge/graph_47156761.jsonl @@ -0,0 +1 @@ +{"11958702|7983519": ["Visual re-ferring expression generation systems (Krahmer and Van Deemter, 2012; Mitchell et al., 2013; FitzGerald et al., 2013) aim to identify speci\ufb01c objects, a sub-problem we deal with when describing images more generally."]} diff --git a/graph_4716814.jsonl b/edge/graph_4716814.jsonl similarity index 100% rename from graph_4716814.jsonl rename to edge/graph_4716814.jsonl diff --git a/edge/graph_4718876.jsonl b/edge/graph_4718876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4718973.jsonl b/edge/graph_4718973.jsonl similarity index 100% rename from graph_4718973.jsonl rename to edge/graph_4718973.jsonl diff --git a/graph_4719202.jsonl b/edge/graph_4719202.jsonl similarity index 100% rename from graph_4719202.jsonl rename to edge/graph_4719202.jsonl diff --git a/graph_4720599.jsonl b/edge/graph_4720599.jsonl similarity index 100% rename from graph_4720599.jsonl rename to edge/graph_4720599.jsonl diff --git a/graph_4730.jsonl b/edge/graph_4730.jsonl similarity index 100% rename from graph_4730.jsonl rename to edge/graph_4730.jsonl diff --git a/graph_4732427.jsonl b/edge/graph_4732427.jsonl similarity index 100% rename from graph_4732427.jsonl rename to edge/graph_4732427.jsonl diff --git a/graph_4735659.jsonl b/edge/graph_4735659.jsonl similarity index 100% rename from graph_4735659.jsonl rename to edge/graph_4735659.jsonl diff --git a/edge/graph_47461251.jsonl b/edge/graph_47461251.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4750991.jsonl b/edge/graph_4750991.jsonl similarity index 100% rename from graph_4750991.jsonl rename to edge/graph_4750991.jsonl diff --git a/graph_4754136.jsonl b/edge/graph_4754136.jsonl similarity index 100% rename from graph_4754136.jsonl rename to edge/graph_4754136.jsonl diff --git a/graph_475636.jsonl b/edge/graph_475636.jsonl similarity index 100% rename from graph_475636.jsonl rename to edge/graph_475636.jsonl diff --git a/graph_4765090.jsonl b/edge/graph_4765090.jsonl similarity index 100% rename from graph_4765090.jsonl rename to edge/graph_4765090.jsonl diff --git a/graph_4768927.jsonl b/edge/graph_4768927.jsonl similarity index 100% rename from graph_4768927.jsonl rename to edge/graph_4768927.jsonl diff --git a/graph_477342.jsonl b/edge/graph_477342.jsonl similarity index 100% rename from graph_477342.jsonl rename to edge/graph_477342.jsonl diff --git a/edge/graph_4776337.jsonl b/edge/graph_4776337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4780353.jsonl b/edge/graph_4780353.jsonl similarity index 100% rename from graph_4780353.jsonl rename to edge/graph_4780353.jsonl diff --git a/graph_478289.jsonl b/edge/graph_478289.jsonl similarity index 100% rename from graph_478289.jsonl rename to edge/graph_478289.jsonl diff --git a/graph_4787452.jsonl b/edge/graph_4787452.jsonl similarity index 100% rename from graph_4787452.jsonl rename to edge/graph_4787452.jsonl diff --git a/graph_4791166.jsonl b/edge/graph_4791166.jsonl similarity index 100% rename from graph_4791166.jsonl rename to edge/graph_4791166.jsonl diff --git a/graph_4795312.jsonl b/edge/graph_4795312.jsonl similarity index 100% rename from graph_4795312.jsonl rename to edge/graph_4795312.jsonl diff --git a/edge/graph_4796356.jsonl b/edge/graph_4796356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4797353.jsonl b/edge/graph_4797353.jsonl similarity index 100% rename from graph_4797353.jsonl rename to edge/graph_4797353.jsonl diff --git a/graph_4802310.jsonl b/edge/graph_4802310.jsonl similarity index 100% rename from graph_4802310.jsonl rename to edge/graph_4802310.jsonl diff --git a/graph_4802987.jsonl b/edge/graph_4802987.jsonl similarity index 100% rename from graph_4802987.jsonl rename to edge/graph_4802987.jsonl diff --git a/graph_4805253.jsonl b/edge/graph_4805253.jsonl similarity index 100% rename from graph_4805253.jsonl rename to edge/graph_4805253.jsonl diff --git a/graph_4807914.jsonl b/edge/graph_4807914.jsonl similarity index 100% rename from graph_4807914.jsonl rename to edge/graph_4807914.jsonl diff --git a/graph_4809836.jsonl b/edge/graph_4809836.jsonl similarity index 100% rename from graph_4809836.jsonl rename to edge/graph_4809836.jsonl diff --git a/graph_4811079.jsonl b/edge/graph_4811079.jsonl similarity index 100% rename from graph_4811079.jsonl rename to edge/graph_4811079.jsonl diff --git a/graph_4820875.jsonl b/edge/graph_4820875.jsonl similarity index 100% rename from graph_4820875.jsonl rename to edge/graph_4820875.jsonl diff --git a/graph_48272.jsonl b/edge/graph_48272.jsonl similarity index 100% rename from graph_48272.jsonl rename to edge/graph_48272.jsonl diff --git a/edge/graph_48357395.jsonl b/edge/graph_48357395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3abb0ed6e17da7555700964ff1908be333de2766 --- /dev/null +++ b/edge/graph_48357395.jsonl @@ -0,0 +1,27 @@ +{"5990651|7800459": ["Regenerating codes (see survey [9]) exploit the optimal trade-off between storage cost and repair traffic."]} +{"12317206|7800459": ["The functional-repair problem is well understood and constructions of such codes are available (see [3], [5], [6])."]} +{"14976187|7800459": ["an k nodes and each node transfers a linear combination of the packets it stores, which reduces bandwidths compared to classical MDS codes. See [34][35] for the construction of regenerating codes and [36] for a survey. Locally Decodable Codes (LDCs): These codes were introduced in [28]. See, e.g., [29][30][31], for the further developments and [32] for a survey. LRCs are very similar to LDCs. The main"]} +{"9194765|7800459": ["For further details, we refer the reader to [9] and [10]."]} +{"18174497|7800459": ["19 20 21 22 23 24 25 26 27 28 30 29 (e) Dodecahedron Figure 1: Graphs associated with the Platonic solids. Kadhe and Calderbank 9 Polyhedron and its Dual Associated Code Weight Enumerator Tetrahedron [6,3]code, (2,2)-availability 1+4z3 +3z4 Tetrahedron [6,3]code, (2,2)-availability 1+4z3 +3z4 Cube [12,5]code, (2,2)-availability 1+6z4 +16z6 +9z8 Octahedron [12,7]code, (3,2)-availability 1+8z3 +15z4 +24z", "rch attent ion: (a) repair bandwidth \u2013 the total number of symbols (or bits) communicated while repairing a failed node, and the corresponding family of codes is called regenerating codes (see, e.g., [5, 6, 7]); and (b) repair locality \u2013 the number of nodes participating in the repair process, and the corresponding family of codes is called locally repairable codes (see, e.g., [8, 9, 10, 11, 12]). We restr"]} +{"18174497|10953815": ["It is worth noting that for covering problems, direct sum constructions are known to give good codes [18].", "Since direct sum constructions are known to give good codes for conventional covering problems [18], we speculate that such a direct sum construction will be present in rate-optimal codes for other values of r and t."]} +{"17981281|7800459": []} +{"15238440|7800459": []} +{"3467078|7800459": ["Distributed storage systems (DSSs) are an essential infrastructure for the generation, analysis and archiving of tremendously growing data."]} +{"529160|7800459": []} +{"7461159|7800459": ["However, the sustained applicability of these codes in distributed storage systems depends on the availability of lowcost mechanisms to exactly regenerate parts of their codewords to be able to replenish the redundancy lost due to node failures [1]."]} +{"15586764|7800459": []} +{"1189355|18574754": []} +{"1189355|7800459": ["Building on the work in [2], a great volume of studies have developed MSR codes [3]\u2013[12].", "For more details on regenerating codes for other scenarios, we refer the reader to the surveys [19] [20] [3]."]} +{"786166|7800459": []} +{"7068622|7800459": ["A recent survey [26] details the various works on exact repairs.", ", random linear network codes), or deterministic [26]\u2013[30]."]} +{"3471631|7800459": ["In addition to repair efficiency, there are many other design features required by DSSs such as security [30,31,32,33,34,35], local-repairability [33,38,39,40], optimality of updating [23,28,29], etc.", "Distributed storage systems (DSSs) are an essential part of large scale data storage systems required for many new emerging distributed networking applications such as social networking, video sharing, peer to peer networking and large scale data centres.", "Our concern in this paper is on securing DSSs against eavesdroppers attempting to obtain any knowledge of the original data.", "In the literature, three repair models are considered: functional repair, exact repair, and exact repair of systematic nodes [8].", "Regenerating codes are a recent innovation of erasure codes that has efficient performance on repair of failed nodes in DSSs [8].", "Since the nodes of DSSs are widely spread across the network, individual nodes may be compromised and as a result the data stored is vulnerable to eavesdropping.", "The main approaches to introduce redundancy in DSSs are through replication, erasure codes, and more recently using regenerating codes [7]."]} +{"9269360|7800459": []} +{"14049156|7800459": ["These goals underpin the design of two families of codes for DSSs called regenerating codes (see [1]\u2013[8] and references therein) and locally repairable codes (see [9]\u2013[22]), respectively."]} +{"18109714|7800459": []} +{"18064150|18574754": ["2Recent literature has extended the study of locally recoverable codes to include security constraints [23], notions of repair bandwidth [12], [13], multiple local repair alternatives [22], and probabilistic erasure models [16] (See [5] for a survey)."]} +{"14450225|7800459": ["MAXIMUM Distance Separable (MDS) codes are ubiquitous in distributed storage systems [5] since they provide the maximum resilience to erasures for a given redundancy.", "A (4, 2, 2) MDS code over F2 ([5], [11]), where nodes 1 and 2 store the systematic data (in black) and nodes 3 and 4 store the parity data (in blue)."]} +{"16111524|7800459": []} +{"2302386|7800459": []} +{"14903347|7800459": ["Recent works on this problem are surveyed in [9]."]} +{"13525086|7800459": []} +{"15919908|7800459": ["The topic of exact repair of MDS codes has received attention in the recent literature [3]\u2013[8], [11]."]} diff --git a/edge/graph_48357542.jsonl b/edge/graph_48357542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d44628b3beb728ef568f22dce756e02c1cabc42 --- /dev/null +++ b/edge/graph_48357542.jsonl @@ -0,0 +1,2 @@ +{"8366376|3348390": ["As an ultimate goal, computers enabled by the Internet of Things technologies will be able to sense and react to the real world for humans.\u201d", "Although some surveys about IoT have been conducted recently (e.g., [Atzori et al. 2010; Zeng et al. 2011; Perera et al. 2013; Li et al. 2014]), they focus on high level general issues and are mostly fragmented."]} +{"206079889|8813834": ["Others Introduction/foundational [16,21,29,46,58,76,95,96,104,108,114,126,129,133,143,148,163,165,166,168,171,175, 176,178,187,195,209,223,229,237,238,247,257,274,277,289] General usage [33,43,54,60,106,110,134,142,149,174,186,191\u2013193,221,231,233,240,242,243,250,251, 256,262,279] E.", "The authors gratefully acknowledge the Editor and reviewers' constructive comments on an earlier Table 5 Classification of reviewed literature Reference Applications Interorganizational systems [30] [36] [45] [49] [51] [61] [68] [70] [78] [79] [102] [112] [113] [120] [136] [146] [147] [170] [197] [199] [202] [204] [208] [210] [216] [224] [225] [245] [249] [254] [255] [261] [270] Electronic payment systems [23] [41] [50] [64] [138] [184] [226] [276] Financial services [42] [63] [137] Retailing [24] [34] [116] [119] [121] [157] [203] [212] [234] [275] [278] Publishing [77] [82] [124] [172] [182] [280] Auctions [135] [258] [285] [288] Intraorganizational EC [37] [59] [99] [139] [162] [211] [236] [273] Education and training [55] [71] [103] [161] [206] [215] [259] Marketing and advertising [53] [93] [128] [131] [183] [185] [198] [230] Other applications [48] [69] [89] Technological issues Security [18,19,31,32,40,72,80,83,84,86,101,105,109,150\u2013153,180,181,190,219,222,235,252, 264,265,267,272,281\u2013283,286,287] Technological component [56] [74] [75] [92] [159] [160] [177] [179] [213] [227] [232] [241] [284] Network technology [57] [97] [100] Support systems [20] [26] [39] [85] [117] [118] [122] [125] [130] [140] [144] [154] [164] [173] [194] [248] [260] [266] Methodology/algorithm [65] [66] [98] [115] [132] [155] [214] [246] [263] [271] Other technological issues [38] [145] Support and implementation Public policy Taxation [167] Legal issues [15] [52] [188] Privacy [25] [35] [62] [67] [205] [269] Fraud [28] Trust [111] [200] [201] Corporate strategy [17] [22] [27] [73] [81] [87] [88] [90] [91] [94] [107] [123] [127] [141] [156] [158] [169] [189] [196] [207] [217] [218] [220] [228] [239] [244] [253] Other support and implementation [44] [47] [268] Others Introduction/foundational [16] [21] [29] [46] [58] [76] [95] [96] [104] [108] [114] [126] [129] [133] [143] [148] [163] [165] [166] [168] [171] [175] [176] [178] [187] [195] [209] [223] [229] [237] [238] [247] [257] [274] [277] [289] General usage [33,43,54,60,106,110,134,142,149,174,186,191\u2013193,221,231,233,240,242,243,250,251, 256,262,279] H.K. Bhargava, R. Krishnan, R. M\u00fcller, Electronic commerce in decision technologies: a business cycle analysis, H.K. Bhargava, R. Krishnan, R. M\u00fcller, Decision support on demand: emerging electronic markets for decision technologies , Decision Support Systems 19 (3), 1997, pp. 193\u2013 214."]} diff --git a/edge/graph_48359428.jsonl b/edge/graph_48359428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f6f3d68dbd7624c5dd9d8aac66223030a7ed4a3 --- /dev/null +++ b/edge/graph_48359428.jsonl @@ -0,0 +1,13 @@ +{"9385544|16362395": []} +{"9385544|8365617": []} +{"3372368|8953108": ["For image data, following [20, 15] we use the modi\ufb01ed Hausdor\ufb00 distance (MHD) [10] as our distance measure between images, since this distance has shown excellent performance in the literature [23, 12]."]} +{"31237616|7530272": []} +{"31577539|7530272": ["Model based classification methods try to build a model that represents a collection of time series [16].", "The studies in time series classification can be analyzed in three main categories with respect to the classification scheme: feature based, model based and distance based [16]."]} +{"15846663|7530272": ["\u2026that have been proposed for time series classification, the decades old dynamic time warping (DTW) in combination with one-nearest neighbor has not been easy to beat convincingly (Xi et al. 2006; Ding et al. 2008; Xing et al. 2010; Chen et al. 2013; Wang et al. 2013; Lines and Bagnall 2014).", "This simple classification technique, 1NN-DTW-R, has been well-acknowledged as exceptionally difficult to beat (Xi et al. 2006; Ding et al. 2008; Xing et al. 2010; Chen et al. 2013; Wang et al. 2013; Lines and Bagnall 2014).", "Interestingly, it has been found that in spite of numerous distance measures, feature representations, and specialized machine learning methods that have been proposed for time series classification, the decades old dynamic time warping (DTW) in combination with one-nearest neighbor has not been easy to beat convincingly (Xi et al. 2006; Ding et al. 2008; Xing et al. 2010; Chen et al. 2013; Wang et al. 2013; Lines and Bagnall 2014)."]} +{"23110153|18599847": ["[31], Kotsiantis [29], Wei and Keogh [54], Xing et al."]} +{"23110153|7530272": ["[55], Yuan and Liu [58], G\u00f3recki [14]."]} +{"23110153|7158350": ["Several classification methods have been used for modeling time series data such as Artificial Neural Networks (ANN), Bayesian Networks, Hidden Markov Models (HMM), Genetic Algorithms (GA), and support vector machine (SVM) [6,9,34,49,60]."]} +{"4883982|7530272": ["One of the main challenges in time series data stems from the fact that there are no explicit features in sequences [Xing et al., 2010].", "Although Euclidean distance is a widely used option and has been shown to be competitive with other more complex similarity measures [Wang et al., 2013], various elastic distance measures designed to address the temporal dynamics and time shifts are more appropriate [Xing et al., 2010, Kate, 2016]."]} +{"6693688|18599847": []} +{"19996370|8310135": []} +{"6239327|7530272": []} diff --git a/edge/graph_48365154.jsonl b/edge/graph_48365154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d820fda1d395a35f049bcd31b8f3fc0d4fc597cc --- /dev/null +++ b/edge/graph_48365154.jsonl @@ -0,0 +1,11 @@ +{"63920970|21386749": []} +{"63920970|12817488": []} +{"63920970|17205659": []} +{"36176167|6430931": ["For explicit review of current development, refer to the recent review (Tsai, Hsu, Lin, & Lin, 2009; Wu & Banzhaf, 2010)."]} +{"32588286|12815020": ["\u2026technique such as Fussy Logic (FL), Nave Bayse (NB) networks, K-Nearest Neighbor (KNN), Artificial Neural Network (ANN), Support Vector Machine (SVM), Logistic Regression (LR), etc. (Ahmed et al., 2016; Garcia-Teodoro et al., 2009; Ghorbani et al., 2009; Modi et al., 2013; Tsai et al., 2009).", "It is widely used in different fields and can be used in\nintrusion detection by selecting the appropriate network features to improve the IDS accuracy (Garcia-Teodoro et al., 2009; Modi et al., 2013).", "\u2026to cloud computing suffers from several types of attacks that can exploit systems vulnerabilities to reach a specific purpose, such as IP spoofing, Denial of Service (DoS), flooding, User to Root (U2R), Remote to Local (R2L), port scanning, probes, etc. (Ghorbani et al., 2009; Modi et al., 2013).", "To ameliorate the computational ability of ANNs and increase the intrusion detection accuracy, the number of hidden layers and neurons per layers should be increased (Modi et al., 2013)."]} +{"32588286|6430931": ["The evaluation criteria adopted by most of papers to assess the performance of their approaches are accuracy, detection rate (DR), and false positive rate (FPR) (Lin et al., 2015; Wu and Banzhaf, 2010)."]} +{"45694754|1805048": []} +{"36279912|393948": ["Deep CNNs can hierarchically extract features of inputs, which tend to be invariant and robust [9]."]} +{"638368|5473785": ["Although some of these algorithms can give good results on some benchmark data sets, there are still several problems such as node ordering requirement, lack of efficiency and lack of publicly available learning tools (Neapolitan, 1990)."]} +{"39527899|18189153": ["In [7], Nadeem and Howarth summarized the intrusion detectionmethods forMANET, which is one kind of network structure of the IoT."]} +{"39527899|12815020": []} diff --git a/edge/graph_484056.jsonl b/edge/graph_484056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_4850963.jsonl b/edge/graph_4850963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4852651.jsonl b/edge/graph_4852651.jsonl similarity index 100% rename from graph_4852651.jsonl rename to edge/graph_4852651.jsonl diff --git a/graph_4853233.jsonl b/edge/graph_4853233.jsonl similarity index 100% rename from graph_4853233.jsonl rename to edge/graph_4853233.jsonl diff --git a/edge/graph_4855722.jsonl b/edge/graph_4855722.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4855872.jsonl b/edge/graph_4855872.jsonl similarity index 100% rename from graph_4855872.jsonl rename to edge/graph_4855872.jsonl diff --git a/graph_485843.jsonl b/edge/graph_485843.jsonl similarity index 100% rename from graph_485843.jsonl rename to edge/graph_485843.jsonl diff --git a/graph_4859605.jsonl b/edge/graph_4859605.jsonl similarity index 100% rename from graph_4859605.jsonl rename to edge/graph_4859605.jsonl diff --git a/graph_4861446.jsonl b/edge/graph_4861446.jsonl similarity index 100% rename from graph_4861446.jsonl rename to edge/graph_4861446.jsonl diff --git a/graph_4864467.jsonl b/edge/graph_4864467.jsonl similarity index 100% rename from graph_4864467.jsonl rename to edge/graph_4864467.jsonl diff --git a/edge/graph_4867108.jsonl b/edge/graph_4867108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4869535.jsonl b/edge/graph_4869535.jsonl similarity index 100% rename from graph_4869535.jsonl rename to edge/graph_4869535.jsonl diff --git a/graph_4875951.jsonl b/edge/graph_4875951.jsonl similarity index 100% rename from graph_4875951.jsonl rename to edge/graph_4875951.jsonl diff --git a/graph_4876145.jsonl b/edge/graph_4876145.jsonl similarity index 100% rename from graph_4876145.jsonl rename to edge/graph_4876145.jsonl diff --git a/edge/graph_4878703.jsonl b/edge/graph_4878703.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4878985.jsonl b/edge/graph_4878985.jsonl similarity index 100% rename from graph_4878985.jsonl rename to edge/graph_4878985.jsonl diff --git a/graph_4880047.jsonl b/edge/graph_4880047.jsonl similarity index 100% rename from graph_4880047.jsonl rename to edge/graph_4880047.jsonl diff --git a/graph_4884302.jsonl b/edge/graph_4884302.jsonl similarity index 100% rename from graph_4884302.jsonl rename to edge/graph_4884302.jsonl diff --git a/edge/graph_4895282.jsonl b/edge/graph_4895282.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4895965.jsonl b/edge/graph_4895965.jsonl similarity index 100% rename from graph_4895965.jsonl rename to edge/graph_4895965.jsonl diff --git a/graph_4899141.jsonl b/edge/graph_4899141.jsonl similarity index 100% rename from graph_4899141.jsonl rename to edge/graph_4899141.jsonl diff --git a/graph_4901325.jsonl b/edge/graph_4901325.jsonl similarity index 100% rename from graph_4901325.jsonl rename to edge/graph_4901325.jsonl diff --git a/graph_4903005.jsonl b/edge/graph_4903005.jsonl similarity index 100% rename from graph_4903005.jsonl rename to edge/graph_4903005.jsonl diff --git a/edge/graph_4903316.jsonl b/edge/graph_4903316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49061886.jsonl b/edge/graph_49061886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4907086.jsonl b/edge/graph_4907086.jsonl similarity index 100% rename from graph_4907086.jsonl rename to edge/graph_4907086.jsonl diff --git a/edge/graph_4909423.jsonl b/edge/graph_4909423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49150427.jsonl b/edge/graph_49150427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13c322b3bfa1fb7952189e6276e120d968043472 --- /dev/null +++ b/edge/graph_49150427.jsonl @@ -0,0 +1 @@ +{"10698436|8914588": ["an autonomic system must have the ability to measure its environment and then adjust its behavior based on goals and the current context [14]."]} diff --git a/graph_4915696.jsonl b/edge/graph_4915696.jsonl similarity index 100% rename from graph_4915696.jsonl rename to edge/graph_4915696.jsonl diff --git a/edge/graph_49185093.jsonl b/edge/graph_49185093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4b5b1c669e3da4723cecf9f7bb9735a6419a562 --- /dev/null +++ b/edge/graph_49185093.jsonl @@ -0,0 +1,24 @@ +{"15748009|8659730": ["Our proposed trust evaluation approach identifies the correct label for all of the unlabeled agents in the network; this is the fundamental task of within-network classification techniques [36], [37].", "[37] and [43] for within-network classification techniques that have been used in social networks."]} +{"207654576|8326114": ["It may implicate sensor nodes through access to secret information such as keys stored in the compromised node in addition to the potential to eavesdrop and alter (e.g. replay, forge, modify and delete) exposed nodal behavior (Schaffer et al., 2012)."]} +{"207654576|1230643": ["The actuators help enhance the cooperative effort of sensor nodes to communicate while transmitting data in areas including health, warfare and environment monitoring (Akyildiz et al., 2002)."]} +{"207654576|6430931": ["Wu and Banzhaf (2010) classi \ufb01 ed anomaly based NIDSs according to their computational intelligence."]} +{"31871697|9588126": []} +{"33321549|14441987": []} +{"14945534|6952653": ["\u2022 Pro-activeness: agents do not simply act in response to their environment, they are able to exhibit goaldirected behavior by taking initiative [10]."]} +{"17378497|207584909": []} +{"2386168|62924": ["This work devises a complex cloud negotiation mechanism by using negotiation strategies and protocols in multiagent systems [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20] as the basic building blocks (Section 3)."]} +{"18342908|191396": ["Some recent surveys on it include (Murtagh and Contreras 2011), (M\u00fcllner 2011), and (Xu & Wunsch 2005)."]} +{"18342908|17772052": []} +{"110636907|53531425": []} +{"18547228|7839197": ["It has a degree of autonomy to operate without human intervention (goal directedness) from others (humans or other software processes and it should have control over its own actions and state [ 13 ]."]} +{"24875202|1708582": ["1) Adopting a Boltzmann exploration strategy [35]."]} +{"17421961|9240891": ["Unlike previous models, FIRE integrates a number of information sources in open systems to produce a comprehensive assessment of an agent\u2019s performance (Huynh et al. 2004, 2006a,b). It categorizes information sources into four types: interaction trust, role-based reputation, witness reputation, and certified reputation. Then, it integrates them to calculate a more precise value of trust and reputation. First, the interaction trust is built from direct interaction experience between two agents. Second, the role-based reputation is modeled by the role-based relationships between two agents. To assign the rolebased trust values, some rules need to be defined. Third, the witness reputation of target agent is built based on the observation of other agents about the target agent\u2019s behavior. To find some witnesses, FIRE adopts the referral system presented in Huynh et al. (2006b). Finally, the certified reputation of target agent consists of a number of certified references about the target\u2019s behavior on particular tasks provided by third-party agents (Huynh et al.", "Grandison and Sloman (2000) examine the various definitions of trust and then provide a working definition of trust for internet applications: \u201cTrust is the firm belief in the competence of an entity to act dependably, securely, and reliably within a specified context\u201d."]} +{"43447335|11238636": ["Most existing coalition formation studies enable each individual agent to join only one coalition (see [128] for a survey of existing coalition formation mechanisms).", "[128] introduced self-adaptation into coalition formation by allowing agents to dynamically adjust degrees of involvement in different coalitions and to join new coalitions.", "For example, for coalition formation, an existing study [128] uses self-organization for agents to self-adapt degrees of involvement in different coalitions, while future research could use self-organization for agents to autonomously and dynamically recruit/expel coalition members."]} +{"43447335|7851743": [", the survey of self-organization in cellular networks [30], the survey of self-organization in ad hoc and sensor networks [31], [32], the survey of self-organization for radio technologies [33], the survey of self-organization in communications [34], and the survey of self-organization in manufacturing control [35].", "Based on the summarization from [29] and [30], generally, there are three classification methods for self-organization mechanisms."]} +{"43447335|7601289": ["Currently, there is still no commonly accepted exact definition of a self-organizing system that holds across several scientific disciplines [20]."]} +{"43447335|70923": []} +{"43447335|1708582": ["There are also some outstanding survey papers of multiagent reinforcement learning (see [93], [95]).", "As stated in [93], there are two main strategies for solving reinforcement-learning problems.", "ment learning problems that is not available in optimization problems in general [93].", "Reinforcement learning is the problem faced by an agent that must learn behavior through trial-and-error interactions with a dynamic environment [92], [93]."]} +{"43447335|7839197": []} +{"23610554|10559330": []} +{"12790394|7839197": ["It is because they offer the high-level software abstractions needed to manage complex applications and because they were invented to cope with distribution and interoperability [2,9,12,19,24,36]."]} +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} diff --git a/edge/graph_49194981.jsonl b/edge/graph_49194981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d52fae6e2b1f88554bd557ef20f7ca01f819a021 --- /dev/null +++ b/edge/graph_49194981.jsonl @@ -0,0 +1,6 @@ +{"13140229|17787193": ["\u2026trend, the seam-less integration of cellular (e.g., 3G/LTE) and WiFi technologies has attracted signi\ufb01cant research interest in recent years (see [202] for a survey), a few solutions have already been standardised [203, 204], and roaming between cellular and WiFi is becoming increasingly\u2026"]} +{"13140229|8462498": ["How to optimally exploit the new DL-MU-MIMO capabilities provided by IEEE 802.11ac is still an open challenge.", "In [44], the authors compare di\ufb00erent strategies to assign the spatial streams between the available destinations at each transmission in a fully connected mesh network, showing in ideal channel conditions the theoretical bene\ufb01ts of MU-MIMO vs. SU-MIMO.", "An analytical model to evaluate the performance of the IEEE 802.11ac TXOP sharing mechanism in DL-MU-MIMO communications is developed in [38].", "Compared to IEEE 802.11n, IEEE 802.11ac supports larger channel widths (up to 160 MHz), introduced a new modulation scheme, i.e., a 256-QAM modulation, and downlink multiuser MIMO (DL-MU-MIMO).", "The performance bene\ufb01ts of uplink MU-MIMO have been already extensively studied, showing its bene\ufb01ts but also the requirements and challenges to implement such a solution [59].", "MIDAS (Multiple-Input Distributed Antenna Systems) [198] implementation using the WARP platform shows the bene\ufb01ts of distributing the antennas over the area to cover instead of co-locating them at the AP in terms of capacity when MU-MIMO is employed.", "It is worth mentioning that DL-MU-MIMO was not yet implemented in the equipment they were using, and that feature was therefore not considered.", "Since the IEEE 802.11ac amendment has recently been \ufb01-nalised, current research around it should cover two main aspects: a) understanding the performance bounds of IEEE 802.11ac, which entails the development of new models, simulation tools and experimental platforms of IEEE 802.11ac-based WLANs, and b) proposing speci\ufb01c solutions for those aspects that are not de\ufb01ned by the IEEE 802.11ac amendment on purpose, such as the mechanism for creating the groups of STAs for DL-MU-MIMO transmissions, smart packet schedullers able to decide when the use of DL-MU-MIMO outperforms SU-MIMO transmissions, and the implementation of the TXOP sharing feature between several ACs.", "The evaluation of a DL-MU-MIMO implementation for WLANs using the WARP platform is presented in [35], where a deep evaluation of the potential bene\ufb01ts of DL-MU-MIMO transmissions is done in terms of the location of the receivers, number of users, and user mobility, among other aspects.", "First, due to the need of frequent CSI exchanges between STAs and the AP, it is not yet clear in which conditions DL-MU-MIMO outperforms SU-MIMO [39, 40, 41, 42], or even whether MU-MIMO does or does not out-perform multi-user packet aggregation when the amount of data directed to each destination is not balanced [43].", "11ac by allowing multiple simultaneous transmissions in the plink, which is known as uplink (UL-) MU-MIMO [58].", "Similar to DL-MU-MIMO transmissions, an open challenge to enable uplink MU-MIMO is to design a mechanism able to e\ufb03ciently schedule the users that will transmit simultaneously.", "IEEE 802.11ax will further develop the MU-MIMO capabilities of IEEE 802.11ac by allowing multiple simultaneous transmissions in the uplink, which is known as up-link MU-MIMO.", "A solution that combines both packet aggregation and DL-MU-MIMO transmissions is presented in [36].", "The main novelty introduced by the IEEE 802.11ac amendment compared with the IEEE 802.11n one is the support of MU-MIMO transmissions in the downlink, hence allowing multiple simultaneous transmissions from the AP to di\ufb00erent STAs.", "The challenges in the design of the IEEE 802.11ax PHY layer are related with the extensions required to support multi-user MU-MIMO and OFDMA transmissions, and Dynamic CCA."]} +{"13140229|12187956": ["\u2026hando\ufb00 issues (e.g. in case PUs suddenly appear in a region) must be resolved in advance to minimise the latency of re-establishing a functional communication channel, e.g. by implementing a proactive alternative rendezvous channel selection in background to ongoing communication processes [161]."]} +{"13140229|5621151": ["This reorganisation has shown that there are many empty TV hannels, called TV white spaces, that can be used for data communiation, especially in rural regions [28]."]} +{"13140229|1230643": []} +{"36641231|18594141": []} diff --git a/edge/graph_49215220.jsonl b/edge/graph_49215220.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d0d8e707c98504f575c32e367ed3a8853c13884 --- /dev/null +++ b/edge/graph_49215220.jsonl @@ -0,0 +1 @@ +{"11125179|17652653": ["Hence, if we extract the verb form of attributes we would need to translate them into noun form, which would require us to solve the paraphrasing problem and introduce more sources of error (Madnani and Dorr, 2010)."]} diff --git a/edge/graph_49215621.jsonl b/edge/graph_49215621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49267479.jsonl b/edge/graph_49267479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9907226356373f6ad0911f60aa91676ecc054f78 --- /dev/null +++ b/edge/graph_49267479.jsonl @@ -0,0 +1,11 @@ +{"7110070|1230643": ["Hence, the BER measured at the input of the decoder is larger than the BER of the data transmitted without coding [ 2 ].", "The BER is shown to be directly proportional to the code rate and inversely proportional to energy per symbol noise ratio and transmitter power level [ 2 ]."]} +{"15975963|15468128": ["1) Computation of Max-Log LLRs: To avoid the evaluation of transcendental functions in VLSI, themax-log approximation to the forward state-metric recursion is applied [29]"]} +{"2020260|1230643": ["Several mechanisms to conserve energy in protocols and applications have been developed in the context of wireless (sensor) networks [28]\u2013[30]."]} +{"2020260|7278743": ["The computation of any upper bounds requires knowledge of the upper bounds for the medium access delay."]} +{"13939441|18801114": ["Index Terms\u2014Cooperative relay transmissions, physicallayer security (PLS), fountain codes (FCs), constellation rotation, quality-of-service (QoS) violating probability (QVP)."]} +{"13939441|4395259": ["In cooperative communication systems, neighboring users form a virtual antenna array and help each other to harvest both the spatial diversity and multiplexing gain."]} +{"6118065|617887": ["In order to facilitate the analysis and design of protograph LDPC codes, the protograph EXIT (PEXIT) algorithm and asymptotic weight enumerator have been proposed in [28], [58] and [50]\u2013[52], respectively.", "3) For i = 1 , 2 , . . . , M P and j = 1 , 2 , . . . , N P , measure the output extrinsic MI I Ec ( i , j ) sent by c i to v j if b i , j (cid:5)= 0 exploiting [28, eq.", "As a result, taking into consideration the different edge-connection properties, the PEXIT algorithm has been proposed by Liva et al. [28], [58], in which the mutual information (MI) [89] is calculated for each VN and CN rather than degree-distribution pair.", "2) For i = 1 , 2 , . . . , M P and j = 1 , 2 , . . . , N P , calculate the output extrinsic MI I E v ( i , j ) sent by v j to c i if b i , j (cid:5)= 0 using [28, eq."]} +{"6118065|15990130": ["Another attractive application of protograph code is in JCPNC. Physical-layer network coding (PNC) has been proposed in [151] to remarkably increase the throughput of the straightforward network coding [152]."]} +{"28555841|2664140": ["More specifically, while Figure 1 shows that the FPGA implementation of LDPC decoders has received a significant amount of attention over the past two decades [13], only [14]\u2013[16] have proposed FPGA implementations of turbo decoders.", "Furthermore, Figure 25 compares the turbo decoder implementations of Table 2 with many FPGA implementations of LDPC decoders which were characterized in [13].", "Furthermore, in order to be consistent with the comparisons of [13], the throughputs presented in Figure 25 are the unscaled ones of Table 2.", "Nonetheless, we adopt the concept of Equivalent Logic Blocks (ELBs) defined in [13] to offer a fair comparison between the resource usage of implementations using FPGA manufactured by different vendors."]} +{"28555841|15468128": ["In particular, state-of-the-art iterative channel codes such as Low-Density Parity-Check (LDPC) and turbo codes [1]\u2013[5] are capable of facilitating reliable communication at nearcapacity transmission throughputs, leading to widespread employment by state-of-the-art mobile telephony standards, such as WiMAX [6] and LTE [7]."]} +{"10046108|5660618": []} diff --git a/edge/graph_49272228.jsonl b/edge/graph_49272228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35aadbc8635c1a66306dce60de2432471f143da9 --- /dev/null +++ b/edge/graph_49272228.jsonl @@ -0,0 +1,11 @@ +{"3795596|3504276": ["It is due to the fact that the operating power of the energy harvesting component is generally much higher than that of the information decoding component [8], [9]."]} +{"3795596|12029139": ["It is due to the fact that the operating power of the energy harvesting component is generally much higher than that of the information decoding component [8], [9]."]} +{"43891587|36510460": []} +{"4567519|76603": ["Effective emergency and natu-ral disaster communication system depend on the ef\ufb01cient mission-critical voice and data communication between \ufb01rst responders and victims [1]."]} +{"4567519|12029139": ["Therefore, ambient energy radio signals can be viable new resource for wireless energy harvesting (WEH) where the radio frequency (RF) systems have the capability of converting the received signals into energy source [4]."]} +{"4567519|3330461": ["Fortunately, D2D communication effectively uses the radio resources with the goal of serving a large number of affected people to collect information from different nodes in the disaster zone [8]."]} +{"4567519|12060835": ["Therefore, the research in renewable energy drawn a great attention particularly in cellular communication [3]."]} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"29648590|3504276": ["Recently, there has been a lot of interest in SWIPT systems in wireless communications (see, [201], [202] and FIGURE 11."]} +{"4119124|61132": ["between Drone-to-User (D2U) links [6]."]} +{"21040658|2469117": []} diff --git a/edge/graph_49273945.jsonl b/edge/graph_49273945.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0d6359af3a857f783732b440e6ed9f51a10b66d --- /dev/null +++ b/edge/graph_49273945.jsonl @@ -0,0 +1,8 @@ +{"128040|17221751": ["As the LOSO protocol is broadly employed in other facial expression recognition studies [6], Le Ngo et al.", "tual framework [6]: facial registration, feature extraction, and classification, similar steps are utilised here for classifying EMM-magnified subtle expressions."]} +{"13699122|2323881": []} +{"18544245|14288295": []} +{"18544245|9045232": []} +{"10978263|207060556": ["As the faces are detected by the face detector [26], a shape of one face is then modeled by a point distribution."]} +{"54435303|17221751": ["version the Multi-PIE database [13]; and the Genki-4K database [14], have been developed (see Table 1) [6], [15]."]} +{"12678271|17221751": ["approach used for emotion recognition [7] .", "This is most likely the reason why the state-of-theart methods achieved the bottleneck in the recognition rate if using crisp classifier [4], [5], [7]."]} +{"10908202|1118130": []} diff --git a/graph_4929298.jsonl b/edge/graph_4929298.jsonl similarity index 100% rename from graph_4929298.jsonl rename to edge/graph_4929298.jsonl diff --git a/edge/graph_49293828.jsonl b/edge/graph_49293828.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea0908e290b28a97618b9ea70e53d73c5d0cc3f5 --- /dev/null +++ b/edge/graph_49293828.jsonl @@ -0,0 +1,13 @@ +{"14245228|17323154": ["Much research attention has been drawn into improving algorithms for clustering search results, as surveyed by Carpineto et al. [6].", "Apart from topically-coherent search result clusters, descriptive labels for clusters are critical for good user experience [6].", "Despite past e \ufb00 orts [6, 12, 17], purely algorithmic SRC techniques do not generally create production-quality document clusters due to the complexity of the unsupervised clustering problem."]} +{"20297379|990486": ["To avoid the search getting stuck, typically before the pheromone trails get reinforced, all pheromone trails are decreased by a factor [30,31]."]} +{"3892249|8365617": ["We therefore first approximate the gesture as a sequence of line segments using the bottom-up segmentation algorithm described by Keogh et al. [13]."]} +{"20189380|5755403": ["Methods of representation and clustering include polynomial fitting, multi-resolution quantization, Hidden Markov Models, kernel methods, neural networks, and k-means [ 23 ]."]} +{"20189380|12127129": []} +{"20189380|17516538": ["To our knowledge, all behavior-analysis systems assume the availability of motion tracking data, typically extracted with the uninformed techniques reviewed above [25, 26 ]."]} +{"40146081|7923260": ["Although query-based learning can be very powerful in theory (Angluin, 1992), arbitrary queries may be difficult to answer in practice (Baum and Lang, 1992)."]} +{"13635893|15782139": ["The study of handwriting has been a topic of research in many fields, including psychology, neuroscience, physics, computer science, anthropology, education, forensic documentation, and others [11].", "For more complete surveys of recognition techniques, see [11,14]."]} +{"11416936|16362395": ["State-of-the-art MI synchronous systems typically use LDA classification and Common Spatial Pattern (CSP) filters [Lotte et al. 2007].", "State-of-the-art MI synchronous systems typically typically use LDA classi\ufb01cation and Common Spatial Pattern (CSP) \ufb01lters [Lotte et al. 2007]."]} +{"14593140|3053192": []} +{"14593140|59943180": ["Miettinen [2014] presents a survey of visualization methods for multiobjective optimization."]} +{"15239969|11013798": ["Many automated systems have been developed for alarm triage (see [9, 17] for reviews).", "However, most of these approaches require extensive training periods and must be retrained whenever the network topology changes [17].", "Some researchers have explored automatically learning rules or models from data that can then be used for automated alarm correlation and filtering (e.g., [13, 17]).", "The advantage of learning the matrix A from data is that it does not require expert tuning, which can be difficult to obtain and does not evolve with the network [9, 17].", "Automated alarm correlation (also related to root cause analysis and fault localization) has long been an active area of research because of the complexity of the problem and the potential impact on the industry [9, 17].", "Such approaches require manual configuration of rules which can be difficult to obtain, are not robust to new situations, and require frequent maintenance [9, 17]."]} +{"6960803|1805048": ["Our prototype used a hybrid recommendation approach, as such approaches have been shown to out-perform more traditional types of recommenders [17] and provide more \u201cmoving parts\u201d to explain."]} diff --git a/edge/graph_49294126.jsonl b/edge/graph_49294126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89c5960d7e2e7e7d00d76cf50a812834cc4ddf73 --- /dev/null +++ b/edge/graph_49294126.jsonl @@ -0,0 +1,2 @@ +{"7724967|15767558": [", [2, 3, 14, 19, 24, 25, 39, 40, 41], but we do not cover them in any detail in this study."]} +{"206594196|469744": ["Successful image segmentation techniques could facilitate a large group of applications such as image editing [17], augmented reality [3] and self-driving vehicles [22]."]} diff --git a/edge/graph_49302669.jsonl b/edge/graph_49302669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a967e5d67c3af1ce1def3437678b8221f5427ffc --- /dev/null +++ b/edge/graph_49302669.jsonl @@ -0,0 +1 @@ +{"16110072|17516538": ["In computer vision, object classification applications have been found in many diverse areas like object segmentation, tracking of object in video sequences, surveillance system etc. [2] [3]."]} diff --git a/edge/graph_49306012.jsonl b/edge/graph_49306012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49312150.jsonl b/edge/graph_49312150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51862017c80313830cbecc60862670d54f8d76fa --- /dev/null +++ b/edge/graph_49312150.jsonl @@ -0,0 +1,5 @@ +{"2341332|1932843": ["Policy search methods can be divided into model-based algorithms, which use a model of the system dynamics, and model-free techniques, which rely only on real-world experience without learning a model [10]."]} +{"3226087|14997956": []} +{"87477|1708582": []} +{"6356521|1708582": ["In reinforcement learning [8, 18], no explicit model of the environment is assumed, and learning happens through trial and error."]} +{"8979634|5755403": []} diff --git a/graph_4931330.jsonl b/edge/graph_4931330.jsonl similarity index 100% rename from graph_4931330.jsonl rename to edge/graph_4931330.jsonl diff --git a/edge/graph_49313524.jsonl b/edge/graph_49313524.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18406235a7cd5a2386b9de01113d91c510dd519d --- /dev/null +++ b/edge/graph_49313524.jsonl @@ -0,0 +1,17 @@ +{"8776796|25206420": ["The former still requires management of large amounts of memory 33 and is not suitable for hospital environment."]} +{"1871572|35426346": [": failures, resources) [33, 41] Ensure modularity & encapsulation full [31, 52] Support contex awareness full [6, 33, 44, 52] Ensure flexibility full [31, 33, 44, 52] Increase systems integration full [4, 31, 44] Support fault-tolerance full [32, 33, 54] Enable high-level protocols and langs full [52] Ensure reconfigurability full [4, 31, 52]", "partial [6] Increase dependability partial [4, 31] Increase interoperability partial [4, 31] Optimize energy consumption partial [44] Enable repetability partial [31, 44] Facilitate development partial [33, 51, 52] (various systems\u2019 complexity) Reducing communication partial [6, 51] (Agent Migration) Facilitate understanding partial [32] system model Enable self-healing partial [41] Handling variability partial [6] and resources scarcity Enabling self-adaption partial [52] Simplify software partial [6] development/extension Ensure robustness partial [41] Facilitate components partial [6] evolution and reuse Face unpredictable scenarios partial [52] Support security partial [54] (cyber and physical layers) Maximization of partial [4] resources utilization Reduce redundancy partial [32] Proactiveness and full [44, 51, 52] intelligent behaviors [31, 33, 41] Ensure Scalability full [4, 31] Reactivity full [41, 44, 51] Social-able full [41, 44] Increase autonomy full [4, 44, 51] (e.", "[31], for example, developed a manufacturing control system"]} +{"3078938|9240891": ["While Yu and Singh\u2019s model demonstrates the power of referrals and the e \ufb00 ectiveness of Dempster Shafter\u2019s theory of evidence in modelling reputation , Schillo et al .", "The probability of a witness lying to the querying agent is actually learnt over multiple interactions in Schillo et al .", "(2002), Sen and Sajja (2002) and Schillo et al .", "Furthermore , Schillo et al .", "This normally entails that they can be authenticated by trusted third parties ( i . e . those that can be relied upon to be trustworthy and as such are authorities in the system ( Grandison & Sloman , 2000).", "In this respect , Schillo et al .", "This necessitates a better evaluation of risks present in the environment ( Yamagishi et al ., 1998; Molm et al ., 2000).", "The former supports a web of trust in that there is no centralised or hierarchical relationship between CAs , while the latter is a strictly hierarchical trust model for authentication ( Grandison & Sloman , 2000).", "These basic requirements can be implemented by a public key encryption and certi\ufb01cate infrastructure ( Grandison & Sloman , 2000).", "Strategic lying : while some reputation mechanisms and models try to deal with this problem ( such as Schillo et al ."]} +{"36587234|3113396": ["[15], there are still very few approaches exploiting feedbackbased learning techniques such as reinforcement learning, or recent deep-learning paradigms (both supervised and unsupervised).", "(see [15] for a rather comprehensive survey)."]} +{"36587234|6425690": ["2) Applications of negotiating agents to real world problems are effectively tackling several vertical domains [17], including security, smart-grid management, energy saving, traffic management, disaster handling, stock-market trading (e."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"10244346|17421961": []} +{"12955359|205435103": ["Two of the papers were published after 30th June 2008 (Beecham et al. 2008; G\u00f3mez et al. 2008) and were excluded from the SLR report but are included in this analysis."]} +{"12955359|7696556": []} +{"12955359|627405": ["These propositions were developed when we started scoping our overall research program (Brereton et al. 2007), but were revised when the specific case was identified.", "We have commented before on the problems of software engineering search engines (Brereton et al. 2007), but it is seems clear that we need better tools to support the overall systematic review process.", "We are currently undertaking a program of case study-based research that is aimed at better understanding the role of systematic literature reviews (SLRs) in software engineering (Brereton et al. 2007)."]} +{"12955359|27317885": ["J\u00f8rgensen and Shepperd (2007) report results from a broad manual search used for a mapping study of a specific software engineering topic (i."]} +{"2917377|12998110": []} +{"489770|22227042": ["The top-level conflict rollback resembles a Saga [6] transaction being an idea adopted from chained transactions [33] of including a compensation mechanism to roll back."]} +{"38650290|4232203": []} +{"38650290|562855": []} +{"6841982|468992": []} +{"6841982|23041951": ["and data origin authentication. In contrast to other \ufb01elds in which security-related research is being actively conducted, swarm robotic systems suffer a lack of practical solutions to these problems [18]. The security topic has been overlooked by state-of-the-art research mainly due to the complex and heterogeneous characteristics of robotic swarm systems \u2014 robot autonomy, decentralized control, a la", "rom academic institutions to the industry [3]. Previous works have emphasized the lack of general methods to tackle topics such as safety analysis, testing mechanisms [49], [40] or security protocols [18] for swarm robotic systems, which hinder the progress to more broader commercial applications. One of the main axioms in the swarm robotics \ufb01eld has been the absence of global knowledge or explicit co"]} diff --git a/edge/graph_49316045.jsonl b/edge/graph_49316045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5f25acd54769b07de5da8e0684d4c62a33c805e --- /dev/null +++ b/edge/graph_49316045.jsonl @@ -0,0 +1,8 @@ +{"21002937|11498812": ["This new technique is an efficient multiple access protocol especially for machine-to-machine (M2M) communications [2], where a large number of users with short packets need to be supported and coordinated techniques cannot be adopted due to various reasons [3]."]} +{"768235|22221919": [", single-carrier NOMA and multi-carrier NOMA [1].", "In the receiver, the standard MPA [1] acts as the multiuser detection to parallel eliminate the multiple access interference (MAI).", "Given \u03b8, we seek for the higher system throughput \u03b7 [1], which is indeed affected by each user\u2019s BLER.", "Recently, as a major candidate of multiple access technique in the 5G mobile communication networks, non-orthogonal multiple access (NOMA) [1]\u2013[3] has been proposed to increase the system throughput and accommodate massive communication connectivity.", "Additionally, SCMA and PDMA stand for the regular and irregular connections in the factor graph, respectively, which has been introduced in Section I-A [1].", "For PDMA, the number of edges connected to each VN may be different [1].", "However, in practical implementations, the effective channel coding and modulation schemes are crucial for NOMA, which ensure that the achievable rates predicted by theory can be realized [1].", "However, each VN\u2019s degree is different, i.e., dv equals 1 or 2, which is the main difference between PDMA and SCMA.", "This is the main difference between PDMA and SCMA [1].", "By comparison, the multi-carrier NOMA is more attractive, mainly due to the fact that it can be more efficiently combined with the orthogonal frequency division multiple access (OFDMA) subcarriers in the forthcoming 5G networks [1]."]} +{"20065907|21418": ["Recently, green radio design has become an important focus in both academia and industry due to the growing demands of energy consumption and the arising environmental concerns around the world [22]."]} +{"20065907|3270620": ["2709301 communication networks [2]\u2013[4].", "2In this paper, we focus on the power domain NOMA [4] for the considered downlink communication scenario."]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} +{"35295866|19938676": ["So far, some enhanced technologies have been proposed and studied to satisfy these requirements, such as massive multipleinput multiple-output (MIMO), ultra-dense network (UDN), device to device (D2D), new multiple access (NMA), etc [2]."]} +{"13916771|14247248": ["In order to efficiently support unprecedented requirements for system sum rate and access connectivity, researchers from both industry and academia are focusing on non-orthogonal multiple access (NOMA) and large-scale antenna array (LSA) technologies [1]\u2013[3]."]} +{"4952202|3270620": []} diff --git a/edge/graph_49318466.jsonl b/edge/graph_49318466.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64baa2cc2ab4f948ecd40754bb40b17ff8db508b --- /dev/null +++ b/edge/graph_49318466.jsonl @@ -0,0 +1,5 @@ +{"63408236|1805048": ["Collaborative Filtering (CF) leverages interest similarities between users to recommend relevant content [19]."]} +{"8610876|1805048": ["There exists a huge variety of model-based CF methods: dimensionality reduction methods (SVD, RSVD, Improved RSVD, NSVD2 and SVD++), linear regression methods [9], clustering methods [10], and Bayesian network models amongst others [6].", "Some of the most important limitations [6,13,14] are sparseness, scalability, cold start, shilling, synonymy, bribing, copy-profile attacks, and the lack of privacy.", "CF methods can be classified into three main categories according to the data they use to make the recommendation [6]: memory-based methods, which use the full matrix with all ratings; model-based methods, which use statistical models and functions of the data matrix but not the complete data matrix; and hybrid methods, which combine the two previous strategies with content-based recommendation methods."]} +{"31988495|207372751": []} +{"1381744|8125630": []} +{"15474450|207372751": ["Prior work in the link analysis literature has demonstrated the usefulness of structural similarity measures for predicting missing edges in social networks [20], and other graphs [22]; moreover, several measures have been shown to outperform collaborative filtering approaches for recommendation on certain data sets [13], making them appealing candidates for the social recommendation task.", "In the context of two arbitrary users u, v \u2208 U , the four measures are defined briefly below (see [20,22] for more details):", "Many existing structural similarity measures that can be plugged into this model (see [22] for a good survey)."]} diff --git a/edge/graph_49321218.jsonl b/edge/graph_49321218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b81888828a379ad700dbe441ccc89124cb1445ab --- /dev/null +++ b/edge/graph_49321218.jsonl @@ -0,0 +1 @@ +{"15943541|6425690": ["While significant attention has been paid at AAMAS in building agents for innovative applications, the topic of transitioning agents from an emerging phase in the lab, to a deployed application in the field, has not received significant attention [8]."]} diff --git a/edge/graph_49325121.jsonl b/edge/graph_49325121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec5da9131f433ae205d89cbebeebf3fa15e6b83c --- /dev/null +++ b/edge/graph_49325121.jsonl @@ -0,0 +1,41 @@ +{"206446574|1230643": []} +{"28361024|8909218": []} +{"21629724|16828740": ["An OSN can be described as a website that provides a venue for users to connect with other users, friends, and family members [28].", "Generally, a Sybil attacker is a user that creates many fake identities to increase the power and influence of the attacker in the network and thereby generate engage in malevolent activities, such as disseminating social spam, distributing malware, distorting online ratings, executing phishing attacks, and so on [28], [49], [50].", "SYBIL ATTACK DEFENSE: SOLUTIONS AND SCHEMES Recently, interest and efforts for defending against malicious attacks in social networks using reliable solutions and schemes have increased [28], [44], [49]\u2013[52]."]} +{"21629724|12574246": ["These techniques are commonly used in areas such as pattern recognition (speech and image processing) and financial algorithms (credit scoring and algorithmic trading) [77]."]} +{"21629724|6444031": ["Second, they assume that a legitimate region in a social graph is always fast mixing; however, this assumption cannot be confirmed as being true [50], [51], [53], [54] because real social graphs are randomly formed and dynamically grow.", "Generally, a Sybil attacker is a user that creates many fake identities to increase the power and influence of the attacker in the network and thereby generate engage in malevolent activities, such as disseminating social spam, distributing malware, distorting online ratings, executing phishing attacks, and so on [28], [49], [50].", "[50], [53] mentioned that the calculation of the property of mixing time in the social graphwas used without careful measurements in the respective studies."]} +{"21629724|36438802": ["Moreover, they are convenient because they enable users to create new connections with people who have similar affinities, such as a similar profession or similar interests [31]\u2013[33].", "\u2019\u2019 These ties can be manifold and assorted, and may include concepts, such as genealogy, age, ideas, gender, education, club membership, and political affiliations, among other characteristics that may influence relationships in the OSN, as described in [29], [32], [33], [35]."]} +{"21629724|2294541": ["Moreover, false reputation can be created based on Sybil accounts [48]."]} +{"5865347|50458504": ["Finally, due to the wide-range of application domains, fraud detection has attracted many surveys (Edge and Falcone Sampaio 2009; Flegel et al. 2010; Phua et al. 2010).", "For a general survey on various fraud detection techniques, we refer the reader to [Bolton and Hand, 2002] and [Phua et al., 2010].", "Finally, due to the wide-range of application domains, fraud detection has attracted many surveys [Edge and Sampaio, 2009, Flegel et al., 2010, Phua et al., 2010]."]} +{"29301335|1230643": ["Motes in sensor network are static devices that operate over the battery and provide highly sensitive applications in data acquisitions [5, 6]."]} +{"54382081|21629724": []} +{"13716320|15438029": ["It is assumed that social behaviors of network entities could be exploited to for a diverse range of applications [3,5,9].", "\u2026of communicating devices have attracted the research community to design protocols and standards for other communication networks such as Delay Tolerant Networks (DTNs) [29], Pocket Switched Networks (PSNs) [30], Opportunistic Networks (OppNets) [31], and Socially Aware networking (SAN) [3]."]} +{"13716320|763939": ["One of the important macroscopic aspects for a vehicular mobility model is Origin\u2013Destination model [50], however, being ignored by the majority of efforts made for mobility modeling [54].", "For more details about these models in details, we refer the readers to [50].", "Harri et al., in [50] presented an in-depth analysis of possible vehicular mobility modeling and available platforms."]} +{"17597996|3330313": []} +{"2756896|2294541": ["Therefore, most solutions to deal with Sybil attacks fall into centralized and decentralized approaches [109]."]} +{"24186069|12029139": ["A comprehensive review and recent development on RF energy harvesting schemes are given in [9]\u2013[13]."]} +{"3284231|2332366": ["Advanced persistent threats (APT) [58] Unauthorized person attempts to gain access to the system Stealing data Bypassing authentication", "DDoS [57, 58] Denial of services, service unavailable Unknown or new attack, exploiting vulnerabilities, overload resources UDP flood, ICMP/PING flood, SYN flood, Ping of Death, etc.", "Replay attack [58, 61, 62] Disguise valid entities or messages Bypassing integrity Valid message containing some valid data is repeated again and again"]} +{"3284231|12815020": []} +{"8095180|7971188": ["We firstly proposed a privacy-preserving community-based P2P OSNs using broadcast encryption (PCBE) scheme, which is mainly based on P2P structured overlay networks [9]."]} +{"17787453|1230643": ["These networks, if successfully deployed, can provide vast range of applications such as environment monitoring, telemetry, battle\ufb01eld surveillance, homeland security, and home automation, etc [2]."]} +{"3826344|207372751": ["Homophily Theory (McPherson et al. 2001) Nodal Proximity-based Method \u2013 Chen et al. (2009) \u2013 Crandall et al. (2010) \u2013 Schifanella et al. (2010) Classification-based Method \u2013 O\u2019Madadhain et al. (2005) \u2013 Hasan et al. (2006) \u2013 Wang et al. (2007) \u2013 Scellato et al. (2011) \u2013 Gong et al. (2014) Probabilistic Model-based Method \u2013 Hopcroft et al.", "(2010) Proximity-based Method Structural Proximity-based Method (Neighborhood) \u2013 Newman (2001) \u2013 Barab\u00e1si et al. (2002) \u2013 Jeh and Widom (2002) \u2013 Adamic and Adar (2003) \u2013 Liben-Nowell and Kleinberg (2007) Structural Proximity-based Method (Path) \u2013 Tong et al.", "Homophily Theory (McPherson et al. 2001) Nodal Proximity-based Method \u2013 Chen et al. (2009) \u2013 Crandall et al. (2010) \u2013 Schifanella et al. (2010) Classification-based Method \u2013 O\u2019Madadhain et al. (2005) \u2013 Hasan et al. (2006) \u2013 Wang et al. (2007) \u2013 Scellato et al. (2011) \u2013 Gong et al. (2014) Probabilistic Model-based Method \u2013 Hopcroft et al. (2011) \u2013 Yang et al. (2011) Relational Learning-based Method \u2013 Mihalkova et al.", "(2010) Proximity-based Method Structural Proximity-based Method (Neighborhood) \u2013 Newman (2001) \u2013 Barab\u00e1si et al.", "Homophily Theory (McPherson et al. 2001) Nodal Proximity-based Method \u2013 Chen et al. (2009) \u2013 Crandall et al. (2010) \u2013 Schifanella et al. (2010) Classification-based Method \u2013 O\u2019Madadhain et al. (2005) \u2013 Hasan et al. (2006) \u2013 Wang et al. (2007) \u2013 Scellato et al.", "Homophily Theory (McPherson et al. 2001) Nodal Proximity-based Method \u2013 Chen et al. (2009) \u2013 Crandall et al.", "Homophily Theory (McPherson et al. 2001) Nodal Proximity-based Method \u2013 Chen et al. (2009) \u2013 Crandall et al. (2010) \u2013 Schifanella et al. (2010) Classification-based Method \u2013 O\u2019Madadhain et al. (2005) \u2013 Hasan et al. (2006) \u2013 Wang et al. (2007) \u2013 Scellato et al. (2011) \u2013 Gong et al. (2014) Probabilistic Model-based Method \u2013 Hopcroft et al. (2011) \u2013 Yang et al. (2011) Relational Learning-based Method \u2013 Mihalkova et al. (2011) Social Interaction Theory (Becker 1974)", "Proximity-based methods surrogate the linkage likelihood between social entities using the proximity between them (Liben-Nowell and Kleinberg 2007, Chen et al. 2009, Crandall et al. 2010, L\u00fc and Zhou 2011).", "Homophily Theory (McPherson et al. 2001) Nodal Proximity-based Method \u2013 Chen et al. (2009) \u2013 Crandall et al. (2010) \u2013 Schifanella et al. (2010) Classification-based Method \u2013 O\u2019Madadhain et al.", "Social Decision Theory (Akerlof 1997) Probabilistic Model-based Method \u2013 Kashima and Abe (2006) Structural Proximity-based Method (Neighborhood) \u2013 Newman (2001) \u2013 Barab\u00e1si et al.", "\u2026in the following ways: (i) While prior surveys focus primarily on either learning-based link recommendation methods (Hasan and Zaki 2011) or proximity-based link recommendation methods (L\u00fc and Zhou 2011), this survey reviews representative methods in both categories and is more comprehensive.", "Our survey differs from prior surveys of link prediction for social networks (Hasan and Zaki 2011, L\u00fc and Zhou 2011) and contributes to the literature in the following ways: (i) While prior surveys focus primarily on either learning-based link recommendation methods (Hasan and Zaki 2011) or\u2026", "Homophily Theory (McPherson et al. 2001) Nodal Proximity-based Method \u2013 Chen et al. (2009) \u2013 Crandall et al. (2010) \u2013 Schifanella et al."]} +{"4791984|1805048": []} +{"61333248|14414383": []} +{"61333248|4621813": []} +{"4942414|76603": ["Recently, many organizations and academia have fixated on the development of broadband public safety networks predicated on LTE and 5G [13-15]."]} +{"3583771|206584087": ["detection and defense mechanisms [81] might be relevant for ICN DoS mitigation."]} +{"133054799|17221751": []} +{"133054799|1118130": []} +{"17689312|6950376": []} +{"17689312|2294541": []} +{"17689312|18194234": []} +{"17689312|1462862": []} +{"17689312|10137283": []} +{"17689312|9240891": []} +{"12715489|2294541": ["Additional sybil defense solutions have also been studied [20, 54]."]} +{"34933902|1143625": ["[41] in a survey under the subject of communication channels during mass convergence and emergency events, gave an overview of the challenges and existing computational methods to process social media messages that may lead to an effective response in mass emergency scenarios.", "[41] lack evaluation or are evaluated empirically."]} +{"3757382|18687271": []} +{"3321477|12029139": ["Currently, there are few survey articles on SWIPT available [8], [9], [11]."]} +{"207290938|207372751": []} +{"44162212|18687271": []} +{"33556914|6515732": []} +{"6059772|763939": ["An extended description of mobility models for vehicular networks is given in [78]."]} diff --git a/edge/graph_49336623.jsonl b/edge/graph_49336623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49343018.jsonl b/edge/graph_49343018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c603353e153b355db0dd0d743b0f84f42588e7b --- /dev/null +++ b/edge/graph_49343018.jsonl @@ -0,0 +1,16 @@ +{"11597706|12083425": ["E LECTRIC power systems and the power grid are currently undergoing a restructuring due to a number of factors such as increasing demand, additional uncertainty caused by the integration of intermittent renewable energy sources and further deregulation of the industry [2], [9], [11]."]} +{"5966834|17381415": ["The transfer functions of the non-ideal PR controller can be given by [26]:", "Both control loops are based on the stationary reference frame and make use of Proportional-Resonant (PR) controllers [26], [27]."]} +{"6804855|5188711": ["When batteries are in the process of charge or discharge, the power balance is managed by droop controllers [3]."]} +{"206701127|12083425": ["introduces some new issues on the operation of the power system, such as potential unbalancing between generation and demand [98]."]} +{"1509244|5188711": ["Recently, multiagent system becomes one of the most popular distributed control solutions, and it has been applied widely to the grid energy management [9]."]} +{"12657014|12083425": ["In order to connect the renewable energy sources and the loads, power electronics converters are usually employed as the interfaces [17]."]} +{"10680785|12083425": []} +{"5700756|16515889": ["SGs, six key functionalities are required [13], namely, 1) high dependability so that the system has to be repaired in", "vision of CPSs is more concentrated on connection between embedded systems and the physical world, while the European version highlights interaction with the cloud/cyberspace and human factors [13]."]} +{"153520|17381415": []} +{"153520|2769379": ["Besides information flow in layers, different agents in one layer may also be able to communicate with each other [57]."]} +{"37925315|12681089": []} +{"43423481|17381415": []} +{"7188252|17381415": ["microgrid, whereas inverter output controllers should control and regulate the output voltages and currents [19], [20], [32], [54], [55].", "common approach to the design of the control loops is the use of PI controllers, with additional feed-forward compensation to improve the performance of current regulators [54], [65], [66].", "The natural reference frame utilizes controllers realized in the form of Proportional-Integral (PI), PR, hysteresis, or dead-beat [54].", "A general overview of grid-side converter controllers is given in [54], [64], in which controllers are categorized based on their reference frame: synchronous ( ), stationary ( ), and natural ( )."]} +{"24591787|12083425": []} +{"23325882|17381415": ["Voltage and Current Controllers Due to the difficulties of using PI controllers to track non-dc variables, proportional-resonant (PR) controllers are usually preferred to control the voltage and current in the stationary reference frame [47]."]} +{"23325882|17758458": ["Compensation of voltage unbalance is usually done using series active power filter through injection of negative sequence voltage in series with the power distribution line [13]-[15]."]} diff --git a/edge/graph_49356915.jsonl b/edge/graph_49356915.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c35ba7f789af72ac314f5b8f65b4340038b40742 --- /dev/null +++ b/edge/graph_49356915.jsonl @@ -0,0 +1 @@ +{"54549147|1895753": ["\u2026of neural networks: clockdriven (or synchronous) algorithms, in which all state variables are updated simultaneously at every tick of a clock, and event-driven (or asynchronous) algorithms, in which state variables are updated only on reception or emission of a spike (Brette et al., 2007).", "There are essentially two families of algorithms for the simulation of neural networks: clock-driven (or synchronous) algorithms, in which all state variables are updated simultaneously at every tick of a clock, and event-driven (or asynchronous) algorithms, in which state variables are updated only on reception or emission of a spike (Brette et al, 2007 )."]} diff --git a/edge/graph_49361306.jsonl b/edge/graph_49361306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d9916ee454c8d933baa76792ba685a7f3beeee7 --- /dev/null +++ b/edge/graph_49361306.jsonl @@ -0,0 +1,7 @@ +{"18477857|562855": ["\u2026and Lesser, 2005; Ferber and Gutknecht, 1998; Dignum et al., 2005), Human Organization Theory (Argente et al., 2006), structural topologies (Horling and Lesser, 2004; Argente et al., 2007), to normative research, including internal representation of norms (Lopez et al., 2006), deontic\u2026"]} +{"9014387|207584909": ["\u2026used to analyse complex stochastic systems ranging from manufacturing (Smith, 2003), healthcare (Mielczarek and Uzialko-Mydlikowska, 2012), supply chain (Terzi and Cavalieri, 2004), business (Jahangirian et al , 2010), military (Naseer et al , 2009), and engineering (Crowder et al , 2012) systems."]} +{"3499061|207584909": ["In addition to agent based modeling and simulation, system dynamics, discrete event simulation, or hybrid models may be used (Jahangirian et al., 2010)."]} +{"5229480|35426346": []} +{"41595988|3717912": ["E-marketplaces\u2019 unique position in an industry usually allows them to collect and disseminate industry-wide information that can be utilized to manage various supply chain risks, such as demand and price risks ( Grey et al. 2005 )."]} +{"27232793|64292": []} +{"27232793|12846121": ["1), agents representing manufacturing entities such as resources and jobs have the ability to generate their local schedules, react locally to local changes, and interact directly with each other to generate global optimal and robust schedules (Ouelhadj & Petrovic, 2008).", "As highlighted by Ouelhadj and Petrovic (2008) multi-agent systems have found wide application to address complex and dynamic environments related to scheduling problems."]} diff --git a/edge/graph_49379696.jsonl b/edge/graph_49379696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2fdd0d35cf06d2a49d4c4a9d4852660cc3cbbfb1 --- /dev/null +++ b/edge/graph_49379696.jsonl @@ -0,0 +1 @@ +{"36488444|1507703": [", cross-site scripting, like SQL queries or xPath injections [30]).", "This security requirement could be implemented into input validation [30], input sanitisation [31], input filtration [30], or/and input canonicalization [32] security controls."]} diff --git a/edge/graph_49384278.jsonl b/edge/graph_49384278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b3ff199c89e82a4c6a968c07580ef67fc5af953 --- /dev/null +++ b/edge/graph_49384278.jsonl @@ -0,0 +1,14 @@ +{"9226899|10817088": ["As such, it can also assist elderly people to age in place while still having sufficient security standards in case of emergency [7]\u2013[9]."]} +{"9226899|1634674": ["A variety of HMM-based variants is presented in a comprehensive survey by Turage et al. [84]."]} +{"15085656|27637541": ["With the same kind of limits, the authors of [7] obtain ctivity models as a list of detectable actions analysing pe ople poses by cameras.", "This definition can be completed by the semantic classification presented in [7, 11] describing an activity as a set of actions that can be see as a set of elementary moves ."]} +{"9361342|7774517": ["\u2022 Target tracking, refers to sensors which are embedded in moving targets to track them in real-time [24]."]} +{"9361342|1230643": ["\u2022 Military applications, in which wireless sensor networks can be an integral part of military command, control, communications, computing, intelligence, surveillance, reconnaissance and targeting (C4ISRT) systems [18].", "can be deployed by dropping from a plane, throwing by a catapult, placing in a factory, and placing one by one either by a human or a robot [18].", "[18] have advocated that the destruction of some sensor nodes by hostile actions does not affect a military operation as much as it affects a traditional sensor network.", "Exchange of messages is the only means of fault diagnosis, and the energy consumed by the network is proportional to the amount of traffic generated in diagnosing the network [18]."]} +{"1711061|3330313": []} +{"28812346|7365537": ["It takes advantage of a dynamic and adaptative calibration by considering the RSS measurements also among fixed anchors.", "Focusing on RF-based methodologies, the main sampled quantities, observed to perform localization, are: Angle of Arrival,\nTime of Flight, Differences in Time of Arrival, Received Signal Strength (RSS) [26, 8, 11].", "Originally developed by Lim et al. [14], the localization method relies on the RSSI between a mobile node of the WSN and the other location-known fixed nodes (anchors).", "Time of Flight, Differences in Time of Arrival, Received Signal Strength (RSS) [26, 8, 11].", "[26] classify IHL systems based on the measured quantity: photonic energy, sonic waves, mechanical energy, magnetic fields, atmospheric pressure and radio frequency (RF) waves."]} +{"2367079|10817088": ["A number of medical studies [2\u20136] show that continuously monitoring Activities of Daily Living or ADLs such as Cooking , Eating , Showering , Taking Pills etc. is of prime importance in geriatric care as they allow for the early detection of the on-set of diseases such as Alzheimer\u2019s, Dementia,\u2026"]} +{"2367079|42648222": []} +{"9885909|3330313": ["There are many different outlier detection algorithms [17], and here we choose an unsupervised solution, a clustering-based outlier detection algorithm \u2013 FindCBLOF [13]."]} +{"11487346|6327434": ["Several state observers are designed for a definite fault signal and detected by a hypothesis test (Willsky, 1976).", "Process model-based fault-detection methods Different approaches for fault-detection using mathematical models have been developed in the last 20 years, see, e.g., (Chen & Patton, 1999; Frank, 1990; Gertler, 1998; Himmelblau, 1978; Isermann, 1984, 1997; Patton, Frank, & Clark, 2000; Willsky, 1976)."]} +{"42891025|7365537": []} +{"13504014|3330313": ["There are many different outlier detection algorithms [15], and here we choose an unsupervised solution, a clusteringbased outlier detection algorithm \u2013 FindCBLOF [11]."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} diff --git a/edge/graph_49391103.jsonl b/edge/graph_49391103.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4939643.jsonl b/edge/graph_4939643.jsonl similarity index 100% rename from graph_4939643.jsonl rename to edge/graph_4939643.jsonl diff --git a/edge/graph_49407186.jsonl b/edge/graph_49407186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81b49925bc3c8080444b48f5d10e8c92ace61a56 --- /dev/null +++ b/edge/graph_49407186.jsonl @@ -0,0 +1,19 @@ +{"8507735|14970359": []} +{"2215820|7788290": ["Traditionally, researchers used vision sensors for activity recognition[2][3]."]} +{"1187100|7834819": ["Research studies on sensor-based monitoring of subjects for these various applications have resulted in a large amount of literature including survey study reports [10\u201315]."]} +{"1187100|11894197": ["An overview of existing feature selection methods in the period from the 1970s to 1997 is presented in [90], identifying the strengths and weaknesses of different methods, while the authors in [91] presented a taxonomy of feature selection techniques and their uses."]} +{"15324087|1634674": ["Human action recognition ( Aggarwal and Ryoo, 2011; Turaga et al., 2008 ) has become an important area in computer vision research , whose aim is to automatically classify the action ongoing in a temporally segmented video."]} +{"10985974|1634674": []} +{"4613670|14970359": []} +{"356547|3348390": ["An entity is defined as \u201ca person, place or objects that is considered relevant to the interaction between a user and an application, including the user and applications themselves\u201d [79]."]} +{"206594947|12724190": []} +{"93384|12127129": []} +{"13167763|5401262": ["Therefore, selectivity in sensor data processing for semantic analysis is the core of health monitoring systems, which relies on the context [6]."]} +{"56626566|469744": []} +{"16900146|12127129": []} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"11252304|12127129": []} +{"11252304|17516538": []} +{"10817088|2670121": ["Generative probabilistic graphical models such as hidden Markov models [72], [70], [73], [74] and dynamic Bayesian networks [64], [48] have been used to model activity sequences and to smooth recognition results of an ensemble classifier [75]."]} +{"719907|7360895": []} +{"6960847|12127129": []} diff --git a/edge/graph_49408981.jsonl b/edge/graph_49408981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8c14071b0a64af5900a02c6ccd0f13319684d15 --- /dev/null +++ b/edge/graph_49408981.jsonl @@ -0,0 +1,5 @@ +{"6863252|7861381": ["The rest of the section is organized by following coarsely and extending the classi\ufb01cation of deformation models given by Holden [14]."]} +{"2474460|530484": ["Bias correction is often performed prior to image registration in order to remove global intensity inhomogeneity (Hou, 2006; Sled et al., 1998; Tustison et al., 2010), but this is often not sufficient to remove local changes in the bias field."]} +{"247457|393948": []} +{"8390504|2471981": ["DWI has low Signal-to-Noise Ratio (SNR) and resolution and is very susceptible to motion (Farrell et al., 2007; Choi et al., 2011; Polders et al., 2011).", "Several papers and books describing the main technical issues and pitfalls related to DTI studies have been published (Basser and Jones, 2002; Moritani et al., 2005; Le Bihan et al., 2006; Mukherjee et al., 2008b; Bammer et al., 2009; Jones, 2010a,b,c; Jones and Cercignani, 2010; Chung et al., 2011; Hasan et al., 2011) which are complemented by available neuroanatomical WM atlas (Jellison et al.", "Other characteristic parameters of DTI acquisitions are Field Of View (FOV) usually ranging from 240 to 256 mm, acquisition matrix 96 \u00d7 96\u2013128 \u00d7 128, Echo Time (TE) 50\u201370 ms and Repetition Time (TR) 8.5\u201312 s. Optimization of DTI protocols has been the focus of diverse studies that specify metrics for detailed protocol de\ufb01nition, including its relation with the DTI metrics and multi-center approaches (Xing et al., 1997; Jones et al., 1999a; Pfefferbaum et al., 2003; Hagmann et al., 2006; Farrell et al., 2007; Wakana et al., 2007; Mukherjee et al., 2008b; Abe et al., 2010; Jones, 2010c; Lagana et al., 2010; Choi et al., 2011; Hasan et al., 2011; Zhu et al., 2011; Lebel et al., 2012).", "Optimization of DTI protocols has been the focus of diverse studies that specify metrics for detailed protocol definition, including its relation with the DTI metrics and multi-center approaches (Xing et al., 1997; Jones et al., 1999a; Pfefferbaum et al., 2003; Hagmann et al., 2006; Farrell et al., 2007; Wakana et al., 2007; Mukherjee et al., 2008b; Abe et al., 2010; Jones, 2010c; Lagana et al., 2010; Choi et al., 2011; Hasan et al., 2011; Zhu et al., 2011; Lebel et al., 2012).", "\u2026approaches (Xing et al., 1997; Jones et al., 1999a; Pfefferbaum et al., 2003; Hagmann et al., 2006; Farrell et al., 2007; Wakana et al., 2007; Mukherjee et al., 2008b; Abe et al., 2010; Jones, 2010c; Lagana et al., 2010; Choi et al., 2011; Hasan et al., 2011; Zhu et al., 2011; Lebel et al., 2012).", "\u2026et al., 2005; Le Bihan et al., 2006; Mukherjee et al., 2008b; Bammer et al., 2009; Jones, 2010a,b,c; Jones and Cercignani, 2010; Chung et al., 2011; Hasan et al., 2011) which are complemented by available neuroanatomical WM atlas (Jellison et al., 2004; Wakana et al., 2004; Catani and Thiebaut De\u2026"]} +{"5797321|3644401": ["1) Graphical Model: The proposed generative model for Extended Modality Propagation builds upon the Bayesian modeling of local weighted voting for multi-atlas segmentation [35], which was then adapted for patch-based segmentation [36], [37]."]} diff --git a/edge/graph_49410639.jsonl b/edge/graph_49410639.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..369b1e7b47dd144798042cc063ab210c102153af --- /dev/null +++ b/edge/graph_49410639.jsonl @@ -0,0 +1,6 @@ +{"22556920|12098072": []} +{"123120652|8530790": []} +{"29665658|12098072": []} +{"23447573|12098072": ["This affects the overall efficiency of the drive and makes them slightly less favored candidates over the commonly used permanent-magnet synchronous machine and induction machine [17], [18]."]} +{"3040932|12098072": ["In our study, we will solve these problems considering the case of a high-speed permanent magnet synchronous machines (PMSM), thanks to their high energy efficiency and power density [22], [23]."]} +{"32594693|12098072": ["In the integrated EVT in Fig.", "3(b) shows the 1997 Toyota electric variable transmission (EVT) [5]].", "The brushes can be removed; and radial and axial flux examples of integrated brushless machines that could be utilized in the EVT are shown in Fig.", "In an HEV, the space for the drive train is more restricted due to the presence of the ICE and the EVT; EVs tend to be more straightforward, and thus, they are more amenable to IM use.", "(b) Toyota Prius power split device [5].", "Integration of two PM motors into the EVT [5], [6] (one brushless machine now has a rotating stator winding; thus, slip rings are required)."]} diff --git a/edge/graph_49411802.jsonl b/edge/graph_49411802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d0d6c6c37b220c7417f815b39b337d76891d54a --- /dev/null +++ b/edge/graph_49411802.jsonl @@ -0,0 +1,6 @@ +{"15869085|55883339": []} +{"17765430|55883339": []} +{"122773156|55883339": []} +{"117796081|17300331": []} +{"119757730|55883339": []} +{"119229153|17300331": []} diff --git a/edge/graph_49418707.jsonl b/edge/graph_49418707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d87b257ce10b5fb3be7bc599946a7642cbc8d76 --- /dev/null +++ b/edge/graph_49418707.jsonl @@ -0,0 +1,3 @@ +{"8752633|2381561": ["As new technologies cause Integrated Circuits to shrink more and more, new ways of packaging the devices have been developed, so that the integration level increased from a single planar chip to full three dimensional packages, as explained in [1]."]} +{"839354|2381561": []} +{"108720651|33286487": []} diff --git a/edge/graph_49418885.jsonl b/edge/graph_49418885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bf4175ed5f73072ea9c67f05e0c6e3aa3e173b6 --- /dev/null +++ b/edge/graph_49418885.jsonl @@ -0,0 +1,14 @@ +{"1552061|9316331": ["By expanding the more valuable branches of the tree and carrying out a random simulation at the leaf nodes, UCT is known to perform well in many different settings (Browne et al., 2012)."]} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} +{"1708582|17464562": []} +{"15176564|1932843": ["Similar hand-coded feature extraction pipelines underpin most successful applications of RL to robotics (we refer the interested reader to [21] for a recent review)."]} +{"15176564|1708582": ["Formally this minimizes the squared Bellman error [2, 19, 51], of function ~ Qh with parameters h, for all training samples fz; a; rgnt1\u204441:"]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"18451256|1708582": ["We use Advantage learning [3], [1], which is a variation of the most widely used value function-based RL algorithm, Q-learning [5].", "Most realistic robot tasks are POMDPs, and therefore the policy must use shortterm memory.", "We use eligibility traces, which have been shown to be beneficial in many RL tasks, especially in POMDPs [5], [1].", "In general, POMDPs require some sort of short-term memory of past observations and actions to determine the current state.", "If \u03ba = 1, (9) reduces to Q-learning.", "Reinforcement learning (RL) [5] is a promising alternative for robot controller development.", "In most realistic robot applications, however, the state is only partially observable (POMDPs)."]} diff --git a/edge/graph_49419707.jsonl b/edge/graph_49419707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b983c82ca64e25e3fc14fc81f753f203e2375bfe --- /dev/null +++ b/edge/graph_49419707.jsonl @@ -0,0 +1,10 @@ +{"23288279|9270553": []} +{"5174222|9270553": ["was the third meeting [35], [36], and the second international"]} +{"41912602|18599847": []} +{"2958817|14986695": ["In the present study, we hypothesized that appropriate three dictionaries of MCA specifically for EEG recording data were undecimated wavelet transform (UDWT), discrete sine transform (DST), and DIRAC (aka standard unit vector basis, or Kronecker basis) Fadili et al. [17].", "EEG signals decomposition indicates that traditional meth-ods are not simply applicable to nonlinear and nonstationary signals in the purpose of artifact removals [17]."]} +{"13945906|10290908": []} +{"64198809|14866098": ["The method such as fast fourier transform (FFT), adaptive auto regressive parameters (AAR), Genetic algorithms (GA), independent component analysis (ICA) and wavelet transformations (WT) are widely used for extracting the required features [1, 15].", "The advantage of using wavelet approach is it capable to disclose important information in EEG signal [15]."]} +{"64198809|9270553": ["The MATLAB commands for the DWT approach are: % To perform 7 level decomposition of a signal [C,L]=wavedec(signal,7,'db4'); [cD1,cD2,cD3,cD4,cD5,cD6,cD7]=detcoef(C,L,[1,2,3 ,4,5,6,7]);", "Hans Berger was the first person who recorded the human brain signal using EEG in 1929 [4]."]} +{"3652442|9270553": []} +{"3652442|192934": []} +{"7784032|16362395": []} diff --git a/edge/graph_49425548.jsonl b/edge/graph_49425548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4943134.jsonl b/edge/graph_4943134.jsonl similarity index 100% rename from graph_4943134.jsonl rename to edge/graph_4943134.jsonl diff --git a/graph_4945422.jsonl b/edge/graph_4945422.jsonl similarity index 100% rename from graph_4945422.jsonl rename to edge/graph_4945422.jsonl diff --git a/edge/graph_4946947.jsonl b/edge/graph_4946947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_4947258.jsonl b/edge/graph_4947258.jsonl similarity index 100% rename from graph_4947258.jsonl rename to edge/graph_4947258.jsonl diff --git a/edge/graph_49472839.jsonl b/edge/graph_49472839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23eb9f783a51c28e2f0d395a3a34cb2faa2244f5 --- /dev/null +++ b/edge/graph_49472839.jsonl @@ -0,0 +1,7 @@ +{"499750|700123": ["It is necessary to find a compromise between efficiency and bandwidth, well as to influences the geometric sizing of the antenna [125].", "Therefore, lowering the dielectric constant increases spatial waves and hence increases the impedance bandwidth of the antenna [125]."]} +{"499750|30383344": ["Fabric-based sensing has been a large field of research in the biomedical and safety communities [2]."]} +{"139726183|20905429": []} +{"6586888|7988320": ["Recently, the miniaturization of devices, the evolution of sensing and body area network technologies [15, 16] has triggered the increasing influence of wearable rehabilitation technology, offering advantages over traditional rehabilitation services [17, 18], such as: low cost, flexible application, remote monitoring, comfort."]} +{"6586888|7834819": ["Some studies focus on physical activity monitoring [25, 26] a technology domain that has had substantial growth and impact, but which is not specific to rehabilitation."]} +{"22997946|700123": []} +{"168512589|7988320": []} diff --git a/edge/graph_49478096.jsonl b/edge/graph_49478096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2026f34e93afe4e551e7e4b3dc4001f4c06cd69d --- /dev/null +++ b/edge/graph_49478096.jsonl @@ -0,0 +1 @@ +{"43762482|26257441": []} diff --git a/edge/graph_49480830.jsonl b/edge/graph_49480830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..532b91d09cb6aeb08f4f1830617635cab1e810ce --- /dev/null +++ b/edge/graph_49480830.jsonl @@ -0,0 +1,5 @@ +{"16091303|1708582": ["Good surveys on the use of Ant Colony Optimization technique can be found in [28, 29, 30, 31].", "Ant Colony Optimization (ACO) which is a special case of distributed reinforcement learning [43] has been studied in different network environments [25, 26, 27, 28, 29, 30, 31]."]} +{"206583549|3345066": ["Some of the relevant surveys are dedicated to specific design problem like multiple access protocols [69], specific techniques of improving spatial reuse [70], energy efficien y [71], [72], secure routing [73], multicast routing [74], dynamic spectrum access [75], [76], admission control [77] , power control in sensor networks [78] etc."]} +{"206583549|141053": ["Some of the relevant surveys are dedicated to specific design problem like multiple access protocols [69], specific techniques of improving spatial reuse [70], energy efficien y [71], [72], secure routing [73], multicast routing [74], dynamic spectrum access [75], [76], admission control [77] , power control in sensor networks [78] etc."]} +{"49295856|18189153": ["DoS attacks fall into several categories such as Wormhole, Blackhole, Grayhole and Flooding [3\u20135, 10, 11].", "Furthermore, a comprehensive study of routing attacks and countermeasures against these attacks in MANET can be found in [3\u20136, 10, 15, 16]."]} +{"49295856|206584087": []} diff --git a/edge/graph_49487116.jsonl b/edge/graph_49487116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccb9015c4ad4d6b0bd4c3cd65fa4aa2d2949d17a --- /dev/null +++ b/edge/graph_49487116.jsonl @@ -0,0 +1,3 @@ +{"418311|30443041": ["We note that the development of robust signal processors is of fundamental interest due to the occurrence of impulsive measurement environments and outliers in practical engineering systems [43]."]} +{"135168240|16364156": ["For high-resolution images of complex scenes such as urban areas, however, this approach is not suitable anymore [Touzi et al., 1996; Gao, 2010].", "In order to ensure that the Gaussian assumption that is a prerequisite for a correct application of PCA is met at least approximately, the decadic logarithm to the approximately Rayleigh distributed amplitude images is applied [Gao, 2010]."]} +{"2856058|16364156": ["approximately, we apply the decadic logarithm to the approximately Rayleigh-distributed amplitude images [31]."]} diff --git a/graph_4951598.jsonl b/edge/graph_4951598.jsonl similarity index 100% rename from graph_4951598.jsonl rename to edge/graph_4951598.jsonl diff --git a/edge/graph_4952154.jsonl b/edge/graph_4952154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49525074.jsonl b/edge/graph_49525074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5e9d634bdff7c990107f1b395bbe0b7ba4d10f8 --- /dev/null +++ b/edge/graph_49525074.jsonl @@ -0,0 +1,2 @@ +{"16761689|18717047": ["\u2026studies show that RESTful Web services outperforms their SOAPbased counterparts within resource-constrained environments In this regard, extensive performance analysis has been conducted to investigate the performance aspects of the two design frameworks [16], [17], [18], [19], [20], [21], [22]."]} +{"16761689|9732448": ["A comparison between current discovery mechanisms focusing on the autonomic capability of service discovery is presented in [61]."]} diff --git a/edge/graph_49527603.jsonl b/edge/graph_49527603.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bfd4995db3787409d1ecf637a360fdfb8010425 --- /dev/null +++ b/edge/graph_49527603.jsonl @@ -0,0 +1,10 @@ +{"56214567|6332923": ["The authors analysed some healthcare projects to highlight security and privacy issues in healthcare system [18]."]} +{"489770|22227042": ["The top-level conflict rollback resembles a Saga [6] transaction being an idea adopted from chained transactions [33] of including a compensation mechanism to roll back."]} +{"5747564|595093": ["Analyzing and implementing smart grid security is a challenging task, especially when considering the scale of the potential damages that could be caused by cyber attacks [46]."]} +{"207063673|14077778": ["Input A public key Q xQ yQ associated with valid domain parameters q FR a b G n h Output Acceptance or rejection of the validity of Q\nCheck that Q O Check that xQ and yQ are properly represented elements of Fq i e integers in the interval\np in the case q p and bit strings of length m bits in the case q m Check that Q lies on the elliptic curve de ned by a and b\nCheck that nQ O If any check fails then Q is invalid otherwise Q is valid\nProof of Possession of a Private Key\nIf an entity C is able to certify A s public key Q as its own public key then C can claim that A s signed messages originated from C To avoid this the CA should require all entities A to prove possession of the private keys corresponding to its public keys before the CA certi es the public key as belonging to A This proof of possession can be accomplished by a variety of means for example by requiring A to sign a message of the CA s choice or by using zero knowledge techniques see Chaum Evertse and van de Graaf Note that proof of possession of a private key provides di erent assurances from public key validation The former demonstrates possession of a private key even though it may correspond to an invalid public key while the latter demonstrates validity of a public key but not ownership of the corresponding private key Doing both provides a high level of assurance\nECDSA Signature Generation and Veri cation\nThis section describes the procedures for generating and verifying signatures using the ECDSA\nECDSA Signature Generation To sign a message m an entity A with domain parameters D q FR a b G n h and associated key pair d Q does the following\nSelect a random or pseudorandom integer k k n Compute kG x y and r x mod n If r then go to step\nCompute k mod n\nCompute e SHA m\nCompute s k e dr mod n If s then go to step\nA s signature for the message m is r s\nECDSA Signature Verification To verify A s signature r s on m B obtains an authen tic copy of A s domain parameters D q FR a b G n h and associated public key Q It is recommended that B also validates D and Q see x and x B then does the following Verify that r and s are integers in the interval n Compute e SHA m\nCompute w s mod n\nCompute u ew mod n and u rw mod n\nCompute X u G u Q If X O then reject the signature Otherwise compute v x mod n where X x y\nAccept the signature if and only if v r\nProof that Signature Verification Works If a signature r s on a message m was indeed generated by A then s k e dr mod n Rearranging gives\nk s e dr s e s rd we wrd u u d mod n\nThus u G u Q u u d G kG and so v r as required\nConversion Between Data Types ANSI X speci es a method for converting eld elements to integers This is used to convert the eld element x to an integer in step of signature generation and step of signature veri cation prior to computing x mod n ANSI X also speci es a method for converting bit strings to integers This is used to convert the output e of SHA to an integer prior to its use in the modular computation in step of signature generation and step of signature veri cation\nPublic Key Certificates Before verifying A s signature on a message B needs to obtain an authentic copy of A s domain parameters D and associated public key Q ANSI X does not specify a mechanism for achieving this In practice authentic public keys are most commonly distributed via certi cates A s public key certi cate should include a string of information that uniquely identi es A such as A s name and address her domain parameters D if these are not already known from context her public key Q and a certifying authority s CA s signature over this information B can then use his authentic copy of the CA s public key to verify A s certi cate thereby obtaining an authentic copy of A s static public key\nRationale for Checks on r and s in Signature Verification Step of signature veri cation checks that r and s are integers in the interval n These checks can be performed very e ciently and are prudent measures in light of known attacks on related ElGamal signature schemes which do not perform these checks for example of such attacks see Bleichenbacher The following is a plausible attack on ECDSA if the check r and more generally r mod n is not performed Suppose that A is using the elliptic curve y x ax b over Fp\nwhere b is a quadratic residue modulo p and suppose that A uses a base point G p b of prime order n It is plausible that all entities may select a base point with x coordinate in order\nto minimize the size of domain parameters An adversary can now forge A s signature on any message m of its choice by computing e SHA m It can easily be checked that r s e is a valid signature for m\nComparing DSA and ECDSA Conceptually the ECDSA is simply obtained from the DSA by replacing the subgroup of order q of Z p generated by g with the subgroup of points on an elliptic curve that are generated by G The only signi cant di erence between ECDSA and DSA is in the generation of r The DSA does this by taking the random element X gk mod p and reducing it modulo q thus obtaining an integer in the interval q The ECDSA generates r in the interval n by taking the x coordinate of the random point kG and reducing it modulo n\nSecurity Considerations\nThe security objective of ECDSA is to be existentially unforgeable against a chosen message attack The goal of an adversary who launches such an attack against a legitimate entity A is to obtain a valid signature on a single message m after having obtained A s signature on a collection of messages not including m of the adversary s choice\nECDSA has not been proven to be existentially unforgeable against chosen message attack\nHowever slight variants of DSA and hence also slight variants of ECDSA have been proven secure by Pointcheval and Stern under the assumptions that the discrete logarithm problem is hard and that the hash function employed is a random function\nThe possible attacks on ECDSA can be classi ed as follows\nAttacks on the elliptic curve discrete logarithm problem\nAttacks on the hash function employed\nOther attacks\nThis section summarizes the current knowledge of these attacks and how they can be avoided in practice\nThe Elliptic Curve Discrete Logarithm Problem\nOne way in which an adversary can succeed is to compute A s private key d from A s domain pa rameters q FR a b G n h and public key Q The adversary can subsequently forge A s signature on any message of its choice\nProblem Definition The elliptic curve discrete logarithm problem ECDLP is the following given an elliptic curve E de ned over a nite eld Fq a point P E Fq of order n and a point Q lP where l n determine l\nKnown Attacks\nThis subsection overviews the algorithms known for solving the ECDLP and discusses how they can be avoided in practice\nNaive Exhaustive Search In this method one simply computes successive multiples of P P P P P until Q is obtained This method can take up to n steps in the worst case\nPohlig Hellman Algorithm This algorithm due to Pohlig and Hellman exploits the factorization of n the order of the point P The algorithm reduces the problem of recovering l to the problem of recovering l modulo each of the prime factors of n the desired number l can then be recovered by using the Chinese Remainder Theorem\nThe implications of this algorithm are the following To construct the most di cult instance of the ECDLP one must select an elliptic curve whose order is divisible by a large prime n Preferably this order should be a prime or almost a prime i e a large prime n times a small integer h For the remainder of this section we shall assume that the order n of P is prime\nBaby Step Giant Step Algorithm This algorithm is a time memory trade o of the method of exhaustive search It requires storage for about p n points and its running time is roughly p n steps in the worst case\nPollard s Rho Algorithm This algorithm due to Pollard is a randomized version of the baby step giant step algorithm It has roughly the same expected running time p n steps as the baby step giant step algorithm but is superior in that it requires a negligible amount of storage\nGallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm can be sped up by a factor of p Thus the expected running time of Pollard s rho method with this speedup is p n steps\nParallelized Pollard s Rho Algorithm Van Oorschot and Wiener showed how Pollard s rho algorithm can be parallelized so that when the algorithm is run in parallel on r processors the expected running time of the algorithm is roughly p n r steps That is using r processors results in an r fold speed up\nPollard s lambda method This is another randomized algorithm due to Pollard Like Pollard s rho method the lambda method can also be parallelized with a linear speedup The parallelized lambda method is slightly slower than the parallelized rho method The lambda method is however faster in situations when the logarithm being sought is known to lie in a subinterval b of n where b n Multiple Logarithms R Silverman and Stapleton observed that if a single instance of the ECDLP for a given elliptic curve E and base point P is solved using parallelized Pollard s rho method then the work done in solving this instance can be used to speed up the solution of other instances of the ECDLP for the same curve E and base point P More precisely if the rst instance takes expected time t then the second instance takes expected time p t t Having solved these two instances the third instance takes expected time p p t Having solved these three instances the fourth instance takes expected time p p t And so on Thus subsequent instances of the ECDLP for a particular elliptic curve become progressively easier Another way of looking at this is that\nsolving k instances of the ECDLP for the same curve E and base point P takes only p k as much work as it does to solve one instance of the ECDLP This analysis does not take into account storage requirements\nConcerns that successive logarithms become easier can be addressed by ensuring that the elliptic parameters are chosen so that the rst instance is infeasible to solve\nSupersingular Elliptic Curves Menezes Okamoto and Vanstone and Frey and R uck showed how under mild assumptions the ECDLP in an elliptic curve E de ned over a nite eld Fq can be reduced to the ordinary DLP in the multiplicative group of some extension eld Fqk for some k where the number eld sieve algorithm applies The reduction algorithm is only practical if k is small this is not the case for most elliptic curves as shown by Balasubramanian and Koblitz To ensure that the reduction algorithm does not apply to a particular curve one only needs to check that n the order of the point P does not divide qk for all small k for which the DLP in Fqk is tractable in practice when n then k su ces An elliptic curve E over Fq is said to be supersingular if the trace t of E is divisible by the characteristic p of Fq For this very special class of elliptic curves it is known that k It follows that the reduction algorithm yields a subexponential time algorithm for the ECDLP in supersingular curves For this reason supersingular curves are explicitly excluded from use in the ECDSA by the above divisibility check\nMore generally the divisibility check rules out all elliptic curves for which the ECDLP can be e ciently reduced to the DLP in some small extension of Fq These include the supersingular elliptic curves and elliptic curves of trace elliptic curves E over Fq for which E Fq q Prime Field Anomalous Curves An elliptic curve E over Fp is said to be prime eld anomalous if E Fp p Semaev Smart and Satoh and Araki showed how to e ciently solve the ECDLP for these curves The attack does not extend to any other classes of elliptic curves Consequently by verifying that the number of points on an elliptic curve is not equal to the cardinality of the underlying eld one can easily ensure that the Semaev Smart Satoh Araki attack does not apply\nCurves Defined Over a Small Field Suppose that E is an elliptic curve de ned over the nite eld F e Gallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm for computing elliptic curve logarithms in E F ed can be\nfurther sped up by a factor of p d thus the expected running time of Pollard s rho method\nfor these curves is p n d steps For example if E is a Koblitz curve see x then Pollard s rho algorithm for computing elliptic curve logarithms in E F m can be sped up by a factor of p m This speedup should be considered when doing a security analysis of elliptic curves whose coe cients lie in a small sub eld\nCurves Defined Over F m m Composite Galbraith and Smart expanding on earlier work of Frey discuss how the Weil descent might be used to solve the ECDLP for elliptic curves de ned over F m where m is composite such elds are sometimes called composite elds More recently Gaudry Hess and Smart re ned these ideas to provide\nstrong evidence that when m has a small divisor l e g l the ECDLP for elliptic curves de ned over F m can be solved faster than with Pollard s rho algorithm In light of these results it seems prudent to not use elliptic curves over composite elds\nIt should be noted that some ECC standards including the draft ANSI X explicitly exclude the use of elliptic curves over composite elds The ANSI X F committee also agreed in January to exclude the use of such curves in a forthcoming revision of ANSI X\nNon Applicability of Index Calculus Methods Whether or not there exists a general subexponential time algorithm for the ECDLP is an important unsettled question and one of great relevance to the security of ECDSA It is extremely unlikely that anyone will ever be able to prove that no subexponential time algorithm exists for the ECDLP However much work has been done on the DLP over the past years and more speci cally on the ECDLP over the past years and no subexponential time algorithm has been discovered for the ECDLP Miller and J Silverman and Suzuki have given convincing arguments for why the most natural way in which the index calculus algorithms can be applied to the ECDLP is most likely to fail\nXedni Calculus Attacks A very interesting line of attack on the ECDLP called the xedni calculus attack was recently proposed by J Silverman One intriguing aspect of the xedni calculus is that it can be adapted to solve both the ordinary discrete logarithm and the integer factorization problems However it was subsequently shown by a team of researchers including J Silverman see Jacobson et al that the attack is virtually certain to fail in practice\nHyperelliptic Curves Hyperelliptic curves are a family of algebraic curves of arbitrary genus that includes elliptic curves Hence an elliptic curve can be viewed as a hyperelliptic curve of genus Adleman DeMarrais and Huang see also Stein M uller and Thiel presented a subexponential time algorithm for the discrete logarithm problem in the jacobian of a large genus hyperelliptic curve over a nite eld However in the case of elliptic curves the algorithm is worse than naive exhaustive search\nEquivalence to Other Discrete Logarithm Problems Stein and Zuccherato\nshowed that the discrete logarithm problem in real quadratic congruence function elds\nof genus is equivalent to the ECDLP Since no subexponential time algorithm is known for the former problem this may provide further evidence for the hardness of the ECDLP\nExperimental Results\nThe best general purpose algorithm known for the ECDLP is the parallelized version of Pollard s rho algorithm which has an expected running time of p n r steps where n is the prime order of the base point P and r is the number of processors utilized\nCerticom s ECC Challenge Certicom initiated an ECC challenge in November in order to encourage and stimulate research on the ECDLP Their challenges consist of instances of the ECDLP on a selection of elliptic curves The challenge curves are divided into three categories\nlisted below In the following ECCp k denotes a random curve over a eld Fp ECC k denotes a random curve over a eld F m and ECC K k denotes a Koblitz curve see x over F m k is the bitlength of n In all cases the bitsize of the order of the underlying nite eld is equal or slightly greater than k so curves have either prime order or almost prime order\nRandomly generated curves over Fp where p is prime ECCp ECCp ECCp ECCp\nECCp ECCp ECCp ECCp and ECCp\nRandomly generated curves over F m where m is prime ECC ECC ECC ECC ECC ECC ECC ECC and ECC\nKoblitz curves over F m where m is prime ECC K ECC ECC ECC ECC and ECC\nResults of the Challenge Escott et al report on their implementation of the parallelized Pollard s rho algorithm which incorporates some improvements of Teske The hardest instance of the ECDLP they solved was the Certicom ECCp challenge For this task they utilized over machines from at least countries and found the answer in days The total number of steps executed was about elliptic curve additions which is close to the expected time p n where n Escott et al conclude that the running time of Pollard s rho algorithm in practice ts well with the theoretical predictions They estimate that the ECCp challenge could be solved by a network of PentiumPro MHz machines in about months\nHardware Attacks\nVan Oorschot and Wiener examined the feasibility of implementing parallelized Pollard s rho algorithm using special purpose hardware They estimated that if n then a machine with r processors could be built for about US ! million that could compute a single elliptic curve discrete logarithm in about days Since ANSI X mandates that the parameter n should satisfy n such hardware attacks appear to be infeasible with today s technology\nAttacks on the Hash Function\nDefinition A cryptographic hash function H is a function that maps bit strings of arbitrary lengths to bit strings of a xed length t such that\nH can be computed e ciently\npreimage resistance For essentially all y f gt it is computationally infeasible to nd a bit string x such that H x y and\ncollision resistance It is computationally infeasible to nd distinct bit strings x and x such that H x H x\nSHA Security Requirements The following explains how attacks on ECDSA can be suc cessfully launched if SHA is not preimage resistant or not collision resistant\nIf SHA is not preimage resistant then an adversary E may be able to forge A s signatures as follows E selects an arbitrary integer l and computes r as the x coordinate of Q lG reduced modulo n E sets s r and computes e rl mod n If E can nd a message m such that e SHA m then r s is a valid signature for m\nIf SHA is not collision resistant then an entity A may be able to repudiate signatures as follows A rst generate two messages m and m such that SHA m SHA m such a pair of messages is called a collision for SHA She then signs m and later claims to have signed m note that every signature for m is also a signature for m\nIdeal Security A t bit hash function is said to be have ideal security if both i given a hash output producing a preimage requires approximately t operations and ii producing a collision requires approximately t operations SHA is a bit hash function and is believed to have ideal security The fastest method known for attacking ECDSA by exploiting properties of SHA is to nd collisions for SHA Since this is believed to take steps attacking ECDSA in this way is computationally infeasible Note however that this attack imposes an upper bound of\non the security level of ECDSA regardless of the size of the primary security parameter n Of course this is also the case with all present signature schemes with appendix since the only hash functions that are widely accepted as being both secure and practical are SHA and RIPEMD\nsee Dobbertin Bosselaers and Preneel both of which are bit hash functions\nVariable Output Length Hash Functions It is envisioned that SHA will eventually be replaced by a family of hash functions Hl where Hl is an l bit hash function having ideal security If one uses ECDSA with parameter n then one would use Hl where l blog nc as the hash function In this case attacking ECDSA by solving the ECDLP and attacking ECDSA by nding collisions for Hl both take approximately the same amount of time\nOther Attacks\nSecurity Requirements for Per Message Secrets The per message secrets k in ECDSA signature generation have the same security requirements as the private key d This is because if an adversary E learns a single per message secret k which was used by A to generate a signature\nr s on some message m then E can recover A s private key since d r ks e mod n where e SHA m see step of ECDSA signature generation Hence per message secrets must be securely generated securely stored and securely destroyed after they have been used\nRepeated Use of Per Message Secrets The per message secrets k used to sign two or more messages should be generated independently of each other In particular a di erent per message secret k should be generated for each di erent message signed otherwise the private key d can be recovered Note that if a secure random or pseudorandom number generator is used then the chance of generating a repeated k value is negligible To see how private keys can be recovered if per message secrets are repeated suppose that the same per message secret k was used to generate ECDSA signatures r s and r s on two di erent messagesm and m Then s k e dr\nmod n and s k e dr mod n where e SHA m and e SHA m Then ks e dr mod n and ks e dr mod n Subtraction gives k s s e e mod n If s s mod n which occurs with overwhelming probability then k s s e e mod n Thus an adversary can determine k and then use this to recover d\nVaudenay s Attacks Vaudenay demonstrated a theoretical weakness in DSA based on his insight that the actual hash function used in the DSA is SHA modulo q not just SHA where q is a bit prime Since SHA is a bit hash function some of its outputs when converted to integers are larger than q Hence in general SHA m SHA m mod q This weakness allows the selective forgery of one message if the adversary can select the domain parameters This weakness is not present in ECDSA because of the requirement that n the analogous quantity to q in the DSA be greater than\nDuplicate Signature Key Selection A signature scheme S is said to have the duplicate signature key selection DSKS property if given A s public key PA and given A s signature sA on a message M an adversary E is able to select a valid key pair PE SE for S such that sA is also E s signature on M Note that this de nition requires that SE is known to E Blake Wilson and Menezes showed how this property can be exploited to attack a key agreement protocol which employs signatures scheme They also demonstrated that if entities are permitted to select their own domain parameters then ECDSA possesses the DSKS property To see this suppose that A s domain parameters are DA q FR a b G n h A s key pair is QA dA and r s is A s signature on M The adversary E selects an arbitrary integer c c n such that t s e s rc mod n computes X s eG s rQ where e SHA M and G t mod n X E then forms DE q FR a b G n h and QE cG Then it is easily veri ed that DE and QE are valid and that r s is also E s signature on M\nIf one mandates that the generating point G be selected veri ably at random during domain parameter generation using a method akin to those in x for generating elliptic curves veri ably at random then it appears that ECDSA no longer possesses the DSKS property It must be emphasized that possession of the DSKS property does not constitute a weakness of the signature scheme the goal of a signature scheme is to be existentially unforgeable against an adaptive chosen message attack Rather it demonstrates the importance of auditing domain parameter and public key generation\nImplementation Attacks ANSI X does not address attacks that could be launched against implementations of ECDSA such as timing attacks Kocher di erential fault analysis Boneh DeMillo and Lipton di erential power analysis Kocher Ja e and Jun and attacks which exploit weak random or pseudorandom number generators Kelsey et al\nImplementation Considerations\nBefore implementing ECDSA several basic choices have to be made including\nType of underlying nite eld Fq Fp or F m\nField representation e g polynomial or normal basis for F m\nType of elliptic curve E over Fq e g random curve or Koblitz curve\nElliptic curve point representation e g a ne or projective coordinates\nThere are many factors that can in uence the choices made All of these must be considered simultaneously in order to arrive at the best solution for a particular application The factors include\nSecurity considerations Suitability of methods available for optimizing nite eld arithmetic addition multiplication squaring and inversion\nSuitability of methods available for optimizing elliptic curve arithmetic point addition point doubling and scalar multiplication\nApplication platform software hardware or rmware Constraints of a particular computing environment e g processor speed storage code size gate count power consumption\nConstraints of a particular communications environment e g bandwidth response time\nSelected References to the Literature The most detailed and comprehensive reference available on techniques for e cient nite eld and elliptic curve arithmetic is IEEE P See Gordon for a detailed survey of various methods for scalar multiplication For an implemen tation report of elliptic curve operations over Fp and F m see Schroeppel et al De Win et al\nand Hasegawa Nakajima and Matsui\nInteroperability Considerations\nThe goals of cryptographic standards are twofold\nTo facilitate the widespread use of cryptographically sound and well speci ed techniques\nTo promote interoperability between di erent implementations\nFactors Affecting Interoperability Interoperability is encouraged by completely specifying the steps of the cryptographic schemes and the formats for shared data such as domain parameters keys and exchanged messages and by limiting the number of options available to the implemen tor For elliptic curve cryptography and in particular the ECDSA the factors that can impact interoperability include\nThe number and types of allowable nite elds\nThe number of allowable representations for the elements of an allowable nite eld\nThe number of allowable elliptic curves over an allowable nite eld\nThe formats for specifying eld elements elliptic curve points domain parameters public keys and signatures\nECDSA Standards\nAmong the standards and draft standards which specify ECDSA the ones which have been o cially approved by their respective accredited organizations are ANSI X FIPS IEEE P and ISO The salient features of these standards are described rst and then the standards are compared with regards to their compatibility with each other This is followed by a brief overview of some other standards that specify or use ECDSA", "ANSI X Public Key Cryptography for the Financial Services Industry Elliptic Curve Key Agreement and Key Transport Protocols working draft August\nD Ash I Blake and S Vanstone Low complexity normal bases Discrete Applied Mathe matics\nR Balasubramanian and N Koblitz The improbability that an elliptic curve has subexpo nential discrete log problem under the Menezes#Okamoto#Vanstone algorithm Journal of Cryptology\nL Bassham D Johnson and T Polk Representation of Elliptic Curve Digital Signature Algo rithm ECDSA Keys and Signatures in Internet X Public Key Infrastructure Certi cates Internet Draft June Available at http www ietf org\nM Bellare R Canetti and H Krawczyk A modular approach to the design and analysis of authentication and key exchange protocols Proceedings of the th Annual ACM Symposium on the Theory of Computing\nS Blake Wilson and A Menezes Entity authentication and authenticated key transport protocols employing asymmetric techniques Proceedings of the th International Workshop on Security Protocols Lecture Notes in Computer Science\nS Blake Wilson and A Menezes Unknown key share attacks on the station to station STS protocol Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nD Bleichenbacher Generating ElGamal signatures without knowing the secret key Ad vances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nD Boneh R DeMillo and R Lipton On the importance of checking cryptographic protocols for faults Advances in Cryptology Eurocrypt Lecture Notes in Computer Science\nSpringer Verlag\nCerticom ECC Challenge November http www certicom com\nD Chaum J H Evertse and J van de Graaf An improved protocol for demonstrating pos session of discrete logarithms and some generalizations Advances in Cryptology Eurocrypt\nLecture Notes in Computer Science Springer Verlag\nT Dierks and B Anderson ECC Cipher Suites for TLS Internet Draft March Available at http www ietf org\nW Di e P van Oorschot and M Wiener Authentication and authenticated key exchanges Designs Codes and Cryptography\nH Dobbertin A Bosselaers and B Preneel RIPEMD A strengthened version of RIPEMD Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nT ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory\nA Escott J Sager A Selkirk and D Tsapakidis Attacking elliptic curve cryptosystems using the parallel Pollard rho method CryptoBytes The Technical Newsletter of RSA Laborato ries volume number Winter Also available at http www rsasecurity com\nG Frey How to disguise an elliptic curve Weil descent talk at ECC Slides available at http www cacr math uwaterloo ca\nG Frey and H R uck A remark concerning m divisibility and the discrete logarithm in the divisor class group of curves Mathematics of Computation\nS Galbraith and N Smart A cryptographic application of Weil descent Codes and Cryp tography Lecture Notes in Computer Science Springer Verlag\nR Gallant R Lambert and S Vanstone Improving the parallelized Pollard lambda search on binary anomalous curves to appear in Mathematics of Computation\nP Gaudry F Hess and N Smart Constructive and destructive facets of Weil descent on el liptic curves preprint January Available from http www hpl hp com techreports\nHPL html\nS Goldwasser S Micali and R Rivest A digital signature scheme secure against adaptive chosen message attacks SIAM Journal on Computing\nD Gordon Designing and detecting trapdoors for discrete log cryptosystems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nD Gordon Discrete logarithms in GF p using the number eld sieve SIAM Journal on Discrete Mathematics\nD Gordon A survey of fast exponentiation methods Journal of Algorithms\nT Hasegawa J Nakajima and M Matsui A practical implementation of elliptic curve cryp tosystems over GF p on a bit microcomputer Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nIEEE P Standard Speci cations for Public Key Cryptography ballot draft Drafts available at http grouper ieee org groups index html\nISO IEC Information Technology Security Techniques Entity Authentication Mech anisms Part Entity authentication Using a Public Key Algorithm rst edition\nISO IEC Information Technology Security Techniques Key Management Part\nMechanisms Using Asymmetric Techniques\nISO IEC Information Technology Security Techniques Digital Signatures with Appendix Part Certi cate Based Mechanisms\nISO IEC Information Technology Security Techniques Cryptographic Techniques Based on Elliptic Curves Committee Draft CD\nT Izu J Kogure M Noro and K Yokoyama E cient implementation of Schoof s algo rithm Advances in Cryptology Asiacrypt Lecture Notes in Computer Science\nSpringer Verlag\nM Jacobson N Koblitz J Silverman A Stein and E Teske Analysis of the xedni calculus attack Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nD Johnson Key validation Contribution to ANSI X F working group\nB Kaliski and Y Yin Storage e cient nite eld basis conversion Selected Areas in Cryp tography Lecture Notes in Computer Science Springer Verlag\nJ Kelsey B Schneier D Wagner and C Hall Cryptanalytic attacks on pseudorandom number generators Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nN Koblitz Elliptic curve cryptosystems Mathematics of Computation\nN Koblitz Constructing elliptic curve cryptosystems in characteristic Advances in Cryp tology Crypto Lecture Notes in Computer Science Springer Verlag\nN Koblitz CM curves with good cryptographic properties Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nN Koblitz A Course in Number Theory and Cryptography nd edition Springer Verlag\nP Kocher Timing attacks on implementations of Di e Hellman RSA DSS and other sys tems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nP Kocher J Ja e and B Jun Di erential power analysis Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nG Lay and H Zimmer Constructing elliptic curves with given group order over large nite\nelds Algorithmic Number Theory Lecture Notes in Computer Science Springer\nVerlag\nR Lercier Computing isogenies in F n in Henri Cohen editor Algorithmic Number Theory Proceedings Second Intern Symp ANTS II Lecture Notes in Computer Science Springer Verlag\nR Lercier Finding good random elliptic curves for cryptosystems de ned F n Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Lercier and F Morain Counting the number of points on elliptic curves over nite elds strategies and performances Advances in Cryptology Eurocrypt Lecture Notes in Com puter Science Springer Verlag\nR Lidl and H Niederreitter Introduction to Finite Fields and their Applications Cambridge University Press\nC Lim and P Lee A key recovery attack on discrete log based schemes using a prime order subgroup Advances in Cryptology Crypto Lecture Notes in Computer Science\nR McEliece Finite Fields for Computer Scientists and Engineers Kluwer Academic Publish ers Boston\nW Meier and O Sta elbach E cient multiplication on certain nonsupersingular elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nA Menezes Elliptic Curve Public Key Cryptosystems Kluwer Academic Publishers Boston\nA Menezes T Okamoto and S Vanstone Reducing elliptic curve logarithms to logarithms in a nite eld IEEE Transactions on Information Theory\nA Menezes P van Oorschot and S Vanstone Handbook of Applied Cryptography CRC Press\nV Miller Uses of elliptic curves in cryptography Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nF Morain Building cyclic elliptic curves modulo large primes Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Mullin I Onyszchuk S Vanstone and R Wilson Optimal normal bases in GF pn Discrete Applied Mathematics\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nAvailable at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nDecember Available at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nFebruary Available at http csrc nist gov fips\nNational Institute of Standards and Technology Secure Hash Standard SHS FIPS Publica tion April Available at http csrc nist gov fips\nNational Institute of Standards and Technology Entity Authentication using Public Key Cryp tography FIPS Publication Available at http csrc nist gov fips\nNational Institute of Standards and Technology Recommended Elliptic Curves for Federal Gov ernment Use May revised July Available at http csrc nist gov encryption\nNational Institute of Standards and Technology Advanced Encryption Standard work in progress Information available at http csrc nist gov encryption aes aes home htm\nNational Security Agency SKIPJACK and KEA algorithm speci cation Version May\nAlso available at http csrc nist gov encryption skipjack kea htm\nK Nyberg and R Rueppel A new signature scheme based on the DSA giving message recovery st ACM Conference on Computer and Communications Security\nK Nyberg and R Rueppel Message recovery for signature schemes based on the discrete logarithm problem Designs Codes and Cryptography\nP van Oorschot and M Wiener Parallel collision search with cryptanalytic applications Journal of Cryptology\nS Pohlig and M Hellman An improved algorithm for computing logarithms over GF p and its cryptographic signi cance IEEE Transactions on Information Theory\nD Pointcheval and J Stern Security proofs for signature schemes Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nJ Pollard Monte Carlo methods for index computation mod p Mathematics of Computa tion\nM Rabin Digitalized signatures and public key functions as intractable as factorization MIT LCS TR MIT Laboratory for Computer Science\nR Rivest A Shamir and L Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM\nR Rueppel A Lenstra M Smid K McCurley Y Desmedt A Odlyzko and P Landrock\nThe Eurocrypt controversial issue # Trapdoor primes and moduli Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nT Satoh and K Araki Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves Commentarii Mathematici Universitatis Sancti Pauli\nO Schirokauer Discrete logarithms and local units Philosophical Transactions of the Royal Society of London A\nC Schnorr E cient signature generation by smart cards Journal of Cryptology\nR Schoof Elliptic curves over nite elds and the computation of square roots mod p Mathematics of Computation\nR Schroeppel H Orman S O Malley and O Spatscheck Fast key exchange with elliptic curve systems Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nI Semaev Evaluation of discrete logarithms in a group of p torsion points of an elliptic curve in characteristic p Mathematics of Computation\nJ Silverman The xedni calculus and the elliptic curve discrete logarithm prob lem Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nJ Silverman and J Suzuki Elliptic curve discrete logarithms and the index calculus Ad vances in Cryptology Asiacrypt Lecture Notes in Computer Science Springer Verlag\nR Silverman and J Stapleton Contribution to ANSI X F working group\nN Smart The discrete logarithm problem on elliptic curves of trace one Journal of Cryp tology\nM Smid and D Branstad Response to Comments on the NIST Proposed Digital Signature Standard Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nJ Solinas An improved algorithm for arithmetic on a family of elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nJ Solinas Generalized Mersenne numbers Technical report CORR Dept of C$O Uni versity of Waterloo Available from http www cacr math uwaterloo ca\nJ Solinas Improved algorithms for arithmetic on anomalous binary curves Tech nical report CORR Dept of C$O University of Waterloo Available from\nhttp www cacr math uwaterloo ca\nA Stein Equivalences between elliptic curves and real quadratic congruence function elds Journal de Th eorie des Nombres de Bordeaux\nA Stein V M uller and C Thiel Computing discrete logarithms in real quadratic congruence function elds of large genus Mathematics of Computation\nE Teske Speeding up Pollard s rho method for computing discrete logarithms in J P Buh ler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nS Vanstone Responses to NIST s Proposal Communications of the ACM July\ncommunicated by John Anderson\nS Vaudenay Hidden collisions on DSS Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nWAP WTLS Wireless Application Protocol Wireless Transport Layer Security Spec i cation Wireless Application Protocol Forum February Drafts available at http www wapforum org\nM Wiener and R Zuccherato Faster attacks on elliptic curve cryptosystems Selected Areas in Cryptography Lecture Notes in Computer Science Springer Verlag\nE De Win S Mister B Preneel and M Wiener On the performance of signature schemes based on elliptic curves in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nR Zuccherato The equivalence between elliptic curve and quadratic function eld discrete logarithms in characteristic in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag", "Introduction\nDigital Signature Schemes\nBackground The Digital Signature Algorithm DSA\nFinite Fields\nThe Finite Field Fp The Finite Field F m\nPolynomial Basis Representations Normal Basis Representations\nElliptic Curves Over Finite Fields\nElliptic Curves Over Fp Elliptic Curves Over F m Basic Facts\nECDSA Domain Parameters\nDomain Parameters Generating an Elliptic Curve Veri ably at Random\nThe Case q p The Case q m\nDomain Parameter Generation Domain Parameter Validation\nECDSA Key Pairs\nKey Pair Generation Public Key Validation Proof of Possession of a Private Key\nECDSA Signature Generation and Veri cation\nSecurity Considerations\nThe Elliptic Curve Discrete Logarithm Problem\nKnown Attacks Experimental Results Hardware Attacks\nAttacks on the Hash Function Other Attacks\nImplementation Considerations\nInteroperability Considerations\nECDSA Standards NIST Recommended Curves\nRandom Elliptic Curves Over Fp Koblitz Elliptic Curves Over F m Random Elliptic Curves Over F m Converting Between Polynomial and Normal Basis Representations\nConclusions\nReferences\nIntroduction\nThe Digital Signature Algorithm DSA was speci ed in a U S Government Federal Information Processing Standard FIPS called the Digital Signature Standard DSS Its security is based on the computational intractability of the discrete logarithm problem DLP in prime order sub groups of Z p\nElliptic curve cryptosystems ECC were invented by Neal Koblitz and Victor Miller\nin They can be viewed as elliptic curve analogues of the older discrete logarithm DL cryptosystems in which the subgroup of Z p is replaced by the group of points on an elliptic curve over a nite eld The mathematical basis for the security of elliptic curve cryptosystems is the computational intractability of the elliptic curve discrete logarithm problem ECDLP\nSince the ECDLP appears to be signi cantly harder than the DLP the strength per key bit\nis substantially greater in elliptic curve systems than in conventional discrete logarithm systems Thus smaller parameters can be used in ECC than with DL systems but with equivalent levels of security The advantages that can be gained from smaller parameters include speed faster computa tions and smaller keys and certi cates These advantages are especially important in environments where processing power storage space bandwidth or power consumption is constrained\nThe Elliptic Curve Digital Signature Algorithm ECDSA is the elliptic curve analogue of the DSA ECDSA was rst proposed in by Scott Vanstone in response to NIST s National Institute of Standards and Technology request for public comments on their rst proposal for DSS It was accepted in as an ISO International Standards Organization standard ISO accepted in as an ANSI American National Standards Institute standard ANSI X and accepted in as an IEEE Institute of Electrical and Electronics Engineers standard IEEE P and a FIPS standard FIPS It is also under consideration for inclusion in some other ISO standards In this paper we describe the ANSI X ECDSA present rationale for some of the design decisions and discuss related security implementation and interoperability issues\nThe remainder of this paper is organized as follows In x we review digital signature schemes and the DSA A brief tutorial on nite elds and elliptic curves is provided in x and x respec tively In x methods for domain parameter generation and validation are considered while x discusses methods for key pair generation and public key validation The ECDSA signature and veri cation algorithms are presented in x The security of ECDSA is studied in x Finally some implementation and interoperability issues are considered in x and x\nDigital Signature Schemes\nBackground\nDigital signature schemes are designed to provide the digital counterpart to handwritten signatures\nand more A digital signature is a number dependent on some secret known only to the signer the signer s private key and additionally on the contents of the message being signed Signatures must be veri able if a dispute arises as to whether an entity signed a document an unbiased third party should be able to resolve the matter equitably without requiring access to the signer s\nprivate key Disputes may arise when a signer tries to repudiate a signature it did create or when a forger makes a fraudulent claim\nThis paper is concerned with asymmetric digital signatures schemes with appendix Asym\nmetric means that each entity selects a key pair consisting of a private key and a related public key The entity maintains the secrecy of the private key which it uses for signing messages and makes authentic copies of its public key available to other entities which use it to verify signatures\nAppendix means that a cryptographic hash function is used to create a message digest of the message and the signing transformation is applied to the message digest rather than to the message itself\nSecurity Ideally a digital signature scheme should be existentially unforgeable under chosen message attack This notion of security was introduced by Goldwasser Micali and Rivest Informally it asserts that an adversary who is able to obtain entity A s signatures for any messages of its choice is unable to successfully forge A s signature on a single other message\nApplications Digital signature schemes can be used to provide the following basic cryptographic services data integrity the assurance that data has not been altered by unauthorized or unknown means data origin authentication the assurance that the source of data is as claimed and non repudiation the assurance that an entity cannot deny previous actions or commitments Digital signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication e g FIPS ISO IEC and Blake Wilson and Menezes authenticated key transport e g Blake Wilson and Menezes ANSI X and ISO IEC and authenticated key agreement e g ISO IEC Di e van Oorschot and Wiener and Bellare Canetti and Krawczyk\nClassification The digital signature schemes in use today can be classi ed according to the hard underlying mathematical problem which provides the basis for their security\nInteger Factorization IF schemes which base their security on the intractability of the inte ger factorization problem Examples of these include the RSA and Rabin signature schemes\nDiscrete Logarithm DL schemes which base their security on the intractability of the or dinary discrete logarithm problem in a nite eld Examples of these include the ElGamal\nSchnorr DSA and Nyberg Rueppel signature schemes\nElliptic Curve EC schemes which base their security on the intractability of the elliptic curve discrete logarithm problem\nThe Digital Signature Algorithm DSA\nThe DSA was proposed in August by the U S National Institute of Standards and Technology\nNIST and was speci ed in a U S Government Federal Information Processing Standard FIPS\ncalled the Digital Signature Standard DSS The DSA can be viewed as a variant of the\nElGamal signature scheme Its security is based on the intractability of the discrete logarithm problem in prime order subgroups of Z p\nDSA Domain Parameter Generation Domain parameters are generated for each entity in a particular security domain See also the note below on secure generation of parameters\nSelect a bit prime q and a bit prime p with the property that q j p Select a generator g of the unique cyclic group of order q in Z p Select an element h Z p and compute g h p q mod p Repeat until g Domain parameters are p q and g\nDSA Key Pair Generation Each entity A in the domain with domain parameters p q g does the following\nSelect a random or pseudorandom integer x such that x q Compute y gx mod p\nA s public key is y A s private key is x\nDSA Signature Generation To sign a message m A does the following\nSelect a random or pseudorandom integer k k q Compute X gk mod p and r X mod q If r then go to step\nCompute k mod q\nCompute e SHA m Compute s k fe xrg mod q If s then go to step A s signature for the message m is r s\nDSA Signature Verification To verify A s signature r s on m B obtains authentic copies of A s domain parameters p q g and public key y and does the following\nVerify that r and s are integers in the interval q Compute e SHA m\nCompute w s mod q\nCompute u ew mod q and u rw mod q\nCompute X gu yu mod p and v X mod q\nAccept the signature if and only if v r\nSecurity Analysis Since r and s are each integers less than q DSA signatures are bits in size The security of the DSA relies on two distinct but related discrete logarithm problems One is the discrete logarithm problem in Z p where the number eld sieve algorithm see Gordon and Schirokauer applies this algorithm has a subexponential running time More precisely the expected running time of the algorithm is\nO exp c o lnp ln ln p\nwhere c and lnn denotes the natural logarithm function If p is a bit prime then the expression represents an infeasible amount of computation thus the DSA using a bit prime p is currently not vulnerable to this attack The second discrete logarithm problem works to the base g given p q g and y nd x such that y gx mod p For large p e g bits the best algorithm known for this problem is Pollard s rho method and takes aboutp\nq\nsteps If q then the expression represents an infeasible amount of computation thus the DSA is not vulnerable to this attack However note that there are two primary security parameters for DSA the size of p and the size of q Increasing one without a corresponding increase in the other will not result in an e ective increase in security Furthermore an advance in algorithms for either one of the two discrete logarithm problems could weaken DSA\nSecure Generation of Parameters In response to some criticisms received on the rst draft\nsee Rueppel et al and Smid and Branstad FIPS speci ed a method for generating primes p and q veri ably at random This feature prevents an entity e g a central authority generating domain parameters to be shared by a network of entities from intentionally constructing\nweak primes p and q for which the discrete logarithm problem is relatively easy For further discussion of this issue see Gordon FIPS also speci es two methods based on DES and SHA for pseudorandomly generating private keys x and per message secrets k FIPS mandates the use of these algorithms or any other FIPS approved security methods\nFinite Fields\nWe provide a brief introduction to nite elds For further information see Chapter of Koblitz\nor the books by McEliece and Lidl and Niederreitter\nA nite eld consists of a nite set of elements F together with two binary operations on F\ncalled addition and multiplication that satisfy certain arithmetic properties The order of a nite\neld is the number of elements in the eld There exists a nite eld of order q if and only if q is a prime power If q is a prime power then there is essentially only one nite eld of order q this\neld is denoted by Fq There are however many ways of representing the elements of Fq Some representations may lead to more e cient implementations of the eld arithmetic in hardware or in software\nIf q pm where p is a prime and m is a positive integer then p is called the characteristic of Fq and m is called the extension degree of Fq Most standards which specify the elliptic curve cryptographic techniques restrict the order of the underlying nite eld to be an odd prime q p or a power of q m In x we describe the elements and the operations of the nite eld Fp In x elements and the operations of the nite eld F m are described together with two methods for representing the eld elements polynomial basis representations and normal basis representations\nThe Finite Field Fp\nLet p be a prime number The nite eld Fp called a prime eld is comprised of the set of integers\nf p g\nwith the following arithmetic operations\nAddition If a b Fp then a b r where r is the remainder when a b is divided by p and r p This is known as addition modulo p\nMultiplication If a b Fp then a b s where s is the remainder when a b is divided by p and s p This is known as multiplication modulo p\nInversion If a is a non zero element in Fp the inverse of a modulo p denoted a is the unique integer c Fp for which a c\nExample The nite eld F The elements of F are f g Examples of the arith metic operations in F are\nThe Finite Field F m\nThe eld F m called a characteristic two nite eld or a binary nite eld can be viewed as a vector space of dimension m over the eld F which consists of the two elements and That is there exist m elements m in F m such that each element F m can be uniquely written in the form\na a am m where ai f g\nSuch a set f m g is called a basis of F m over F Given such a basis a eld element can be represented as the bit string a a am Addition of eld elements is performed by bitwise XOR ing the vector representations The multiplication rule depends on the basis selected\nThere are many di erent bases of F m over F Some bases lead to more e cient software or hardware implementations of the arithmetic in F m than other bases ANSI X permits two kinds of bases polynomial bases discussed in x and normal bases discussed in x\nPolynomial Basis Representations", "See Gordon [36] for a detailed survey of various methods for scalar multiplication."]} +{"18129749|6444031": ["The ability to prevent multiple identities from a single machine, is key in preventing a Sybil attack, this combined with the expensive cost of entrance [20] to our network, makes it unviable for all but the most powerful adversary to conduct a Sybil attack on the network."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} diff --git a/edge/graph_49537018.jsonl b/edge/graph_49537018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49539377.jsonl b/edge/graph_49539377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4c9692ed11102ea587cfeeaba416a318586b419 --- /dev/null +++ b/edge/graph_49539377.jsonl @@ -0,0 +1 @@ +{"113430381|49539377": ["Their design is governed by the response to dynamic actions such as wind or earthquakes due to their characteristic flexibility and low damping [1]."]} diff --git a/edge/graph_49539405.jsonl b/edge/graph_49539405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..103e5a2a007db33975b7b893925e61b8fa2fe1dc --- /dev/null +++ b/edge/graph_49539405.jsonl @@ -0,0 +1,10 @@ +{"123407913|1099309": ["The edge histogram descriptor (EHD) was proposed in the visual part of MPEG-7 standard [3][4]."]} +{"577837|15117557": []} +{"14580305|60779308": ["To copy otherwise, to republish, to post on \nservers or to redistribute to lists, requires prior speci.c permission and/or a fee."]} +{"207195962|60779308": ["Other shape feature extraction techniques [19] have been adapted or introduced to solve the plant retrieval problem."]} +{"18270500|60779308": ["Shape feature extraction techniques [15] have been adapted to the particular case of leaves, as for example, the Curvature Scale Space [4, 17] and Fourierbased descriptors [20, 26]."]} +{"15685158|11894197": []} +{"16365117|206051485": ["If necessary, alignment operations, superimposition methods, and image registration must be performed so that the wings follow positioning specifications in relation to the boundaries of the images or previous models of the bees (Bookstein, 1997; Gonzalez and Woods, 2002; Snyder and Qi, 2004; Zitova and Flusser, 2003).", "\u2026operations, superimposition methods, and image registration must be performed so that the wings follow positioning specifications in relation to the boundaries of the images or previous models of the bees (Bookstein, 1997; Gonzalez and Woods, 2002; Snyder and Qi, 2004; Zitova and Flusser, 2003)."]} +{"16659363|60779308": ["Shape feature extraction techniques [17] have been adapted to the particular case of leaves, as for example, the Curvature Scale Space [6, 19] and Fourier-based descriptors [22, 26]."]} +{"18992397|60779308": ["Combination of geometric features such as aspect ratio, compactness, and dispersion, or moments such as moment invariants were usually used toidentify plants.", "KEYWORDS\nMoment Invariant, Zernike Moments, PFT, Plants Identification, Shape Recognition"]} +{"2026284|205131192": []} diff --git a/edge/graph_49539896.jsonl b/edge/graph_49539896.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f0a1882ceae97142c6833ae78285a6cf693bcbe --- /dev/null +++ b/edge/graph_49539896.jsonl @@ -0,0 +1,2 @@ +{"108144027|18540390": ["The domain research provided numerous views of these stages of knowledge (Birkinshaw et al. 2002; Satyadas et al. 2001; Zack 1999b)."]} +{"1354964|8813834": []} diff --git a/edge/graph_49544416.jsonl b/edge/graph_49544416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..780d5dc3bd750cab2ca1aed926f5ea52945b5a38 --- /dev/null +++ b/edge/graph_49544416.jsonl @@ -0,0 +1,15 @@ +{"15993113|6857179": ["When it comes to associations between AUs and dimensional models of emotion, such as the valence-arousal model, little research is available [25]."]} +{"15993113|6387482": ["Some works have also attempted a combination of both methods in hybrid fusion [32].", "The most common modalities to be merged are combinations of audio, video and text modalities [32]."]} +{"15982451|6682153": ["presented a review on the computational methods for EEGbased emotion estimation [22]."]} +{"15982451|192934": ["What\u2019s more, the high dimensionality of features may make classi\ufb01ers suffer from the \u2018curse of dimensionality\u2019 [44]."]} +{"13690009|6387482": []} +{"4652830|6682153": ["This emotion model was originally proposed by Russell [13] and is still frequently used in affective computing research, as it has been found to be a simple but highly effective model [3, 5].", "The superior performance of SVM relative to other algorithms has also been shown in the previous studies [3].", "EEG and emotion correlation reported in numerous studies [1, 2] combined with computational modeling [3] enables possibility of automatically estimating emotional states.", "practice in the estimation of emotional states [3]."]} +{"33864734|16362395": ["Current BCI paradigms (Kronegg et al., 2007; Lotte et al., 2007; Vaughan et al., 2003) aim to detect brain activity that corresponds to complex tasks (mental calculus, imagination of finger taping, etc.) not related to the objective of the user (moving a mouse cursor, choosing a letter, etc.).", "Current BCI paradigms (Kronegg et al., 2007; Lotte et al., 2007; Vaughan et al., 2003) aim to detect brain activity that corresponds to complex tasks (mental calculus, imagination of finger taping, etc.", "The fusion of different EEG features is also known to improve results for EEG signals classification (Blankertz et al., 2003; Lotte et al., 2007)."]} +{"33864734|9270553": []} +{"621581|192934": ["For classification, various machine learning methods (supervised classification in our case) can be used [33]."]} +{"9969117|393948": ["Recently, it has been shown that unsupervised feature leaning is very helpful for ASR [43] and image understanding [2], [10]."]} +{"5458531|6682153": ["[4] in the last century and has received significant advancements in recent years [5], [6]."]} +{"18345464|192934": ["Finally, features were classified using various machine learning methods [73]."]} +{"1800351|10565363": []} +{"16577631|6682153": ["Within the research literature, a range of classification techniques have been used for affective computing and emotion recognition using EEG bio-signals as an input modality [26]."]} +{"8125331|192934": ["per class for an appropriate estimate of class decision boundaries and error estimates [74]."]} diff --git a/graph_495481.jsonl b/edge/graph_495481.jsonl similarity index 100% rename from graph_495481.jsonl rename to edge/graph_495481.jsonl diff --git a/edge/graph_49551723.jsonl b/edge/graph_49551723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..87c2e3f21cca81880cd8378482fbfac193194473 --- /dev/null +++ b/edge/graph_49551723.jsonl @@ -0,0 +1,39 @@ +{"17814249|1634674": ["A summary of recent and past literature on action and activity recognition is presented in [29]."]} +{"9469305|5755403": ["There are many options when clustering trajectories, ranging from the choice of clustering algorithm to the measure of similarity between tracks [24].", "A more detailed examination of techniques is presented in the review by Morris and Trivedi [24], which highlights a wide range of applications, challenges, and common approaches to trajectory learning and modeling."]} +{"9054863|7788290": ["Gavrila (1999) or Moeslund et al. (2006) for a survey of the field."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"52847824|987239": []} +{"28824442|17516538": []} +{"28824442|7185733": []} +{"28824442|7788290": ["We refer to [2, 9 , 5] for comprehensive surveys and here aim only at a brief literature overview."]} +{"4231589|5755403": ["Reviews and comparisons of different trajectory clustering methods can be found in [8, 20, 21]."]} +{"4231589|17516538": ["Reviews and comparisons of different trajectory clustering methods can be found in [8, 20, 21]."]} +{"9854676|5755403": []} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"6281138|1634674": []} +{"1982073|17516538": []} +{"1982073|7788290": []} +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"7117722|7788290": ["There is a wide range of related work for visual gesture recognition (see surveys [28] and [6])."]} +{"14036983|14970359": ["Mouslend et al. [17] [18] provide a functional taxonomy based review of the human motion capture and activity analysis."]} +{"8979634|5755403": []} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"25550079|1596835": ["Keywords Human action retrieval \u00b7 Human action recognition \u00b7 Big data \u00b7 Action representation \u00b7 Action search", "Managing these big data on the Internet, e.g. searching desired items, can be considered as an important challenge (Wang et al. 2015).", "In this section, we discuss the challenges that can affect the performance of retrieval systems."]} +{"1001575|16013270": ["Because there has been little work in the \ufb01eld of visual prediction, existing datasets are mostly inappropriate for our evaluation [43,44]."]} +{"1001575|5755403": ["Trajectory-based activity analysis is a traditional way of modeling human activities [38,24], which leverages motion statistics to recognize different activities."]} +{"9333559|1634674": ["Dynamic time warping (DTW) algorithms and hidden Markov models (HMMs) have been popularly used to recognize actions by analyzing sequential changes in features extracted per frame (e.g. joint angles) [15]."]} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"9689275|7788290": ["Interpretation of human actions is a well recognized problem in computer vision [2, 3, 1, 6, 9, 10, 16, 17, 19, 20, 22, 25, 26, 27]."]} +{"5925915|1634674": []} +{"11359025|1634674": ["We review related work on Hidden semi-Markov Models (HSMMs), Conditional Random Fields (CRFs), and discriminative temporal segments in the context of video, and refer the reader to a recent survey in the area by Turaga et al. [24] for a comprehensive review."]} +{"14779543|1634674": ["Here we overview a few related work but refer the reader to [1,2] for a more complete survey."]} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} diff --git a/edge/graph_49556319.jsonl b/edge/graph_49556319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4fd9b0a89df4fa524a4bf4a4cfb359c20b8382e1 --- /dev/null +++ b/edge/graph_49556319.jsonl @@ -0,0 +1,12 @@ +{"10673012|16557526": ["Relating to the Type 2 errors in particular, Brodlie et al. [7] point out uncertainties caused by the lower resolution of the visualisation in contrast to the resolution of the data.", "As stated by Brodlie et al. [7], these uncertainties have not been the focus of uncertainty visualisation research thus far."]} +{"1169515|17133230": ["A good introduction to trees is given in surveys on visualization of trees [39] and multitrees [16]."]} +{"19682056|9431428": ["Multivariate pattern classification is another method that can be used for analysis of RS-fMRI data.(49) This approach uses pat-"]} +{"1731910|6116761": ["Although several studies have reported the presence of dynamic functional connectivity (dFC), statistical assessment of the results is not always carried out in a sound way and, in some studies, is even omitted.", "\u2026the concept of functional connectivity (FC) is wide and includes any kind of statistical relationship between time series (Pereda et al., 2005; Friston, 2011), we focus on the (Pearson) correlation coefficient, which is the most widely used FC measure in resting-state fMRI research (Sakoglu\u2026"]} +{"204905981|4576140": ["Validations have instead mainly been performed using simulated data [5], but it is obviously very hard to simulate the complex spatiotemporal noise that arises from a living human subject in an MR scanner."]} +{"5185621|7761990": []} +{"11557297|6116761": []} +{"11557297|9431428": []} +{"11248146|8053403": ["Dimensionality reduction techniques, including MDS, have been widely studied and developed in recent decades, and are still an active research topic [30]."]} +{"4875801|4576140": ["Validations have instead mainly been performed using simulated data (3), but it is obviously very hard to simulate the complex spatiotemporal noise that arises from a living human subject in an MR scanner."]} +{"15783425|6116761": ["An important topic not extensively covered in this review concerns the role of network models for mapping causal dependencies among neural events, summarized as networks of \u2018effective connectivity\u2019 84 ."]} +{"17953126|239537": ["[44] described various techniques to visualize hierarchical modular structures."]} diff --git a/edge/graph_49556542.jsonl b/edge/graph_49556542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5dc1a945800fa0c965cd83ce9a06260c29381f42 --- /dev/null +++ b/edge/graph_49556542.jsonl @@ -0,0 +1,5 @@ +{"11793826|1174262": ["To the best of our knowledge, this approach of graph construction and weight definition from taxi trajectories has not been used in previous work."]} +{"122907607|7064380": []} +{"11054628|2616070": ["for image thresholding methods [24], medical image segmentation [25-26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on.", "Figure 2: Original images and the segmentation results by the MST based algorithm [27]."]} +{"11054628|14122909": ["The reviews of various segmentation techniques can be found for image thresholding methods [24], medical image segmentation [25,26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on."]} +{"11054628|8953108": ["The reviews of various segmentation techniques can be found for image thresholding methods [24], medical image segmentation [25,26], statistical level set segmentation [27], 3D image segmentation [28], edge detection techniques [29] and so on."]} diff --git a/edge/graph_49557518.jsonl b/edge/graph_49557518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..502ba29a429b0ac7c71de411d12f81282b7b02c8 --- /dev/null +++ b/edge/graph_49557518.jsonl @@ -0,0 +1,16 @@ +{"36240621|8589228": ["In [26] a semantics is given for a subset of UML-RT without considering time.", "The Whiley programming language has been developed to enable compile-time verification of programs and, furthermore, to make this accessible to everyday programmers [26,30].", "One issue faced by intermediate verification languages is the potential for an impedance mismatch [26].", "This system has been described in more detail previously [26].", "A variety of tools have blossomed in this space, including ESC/Java [14], Spec# [4], Dafny [18], Why3 [13], VeriFast [16], SPARK Ada [20], and Whiley [26,30]."]} +{"17693992|70923": ["There exists several software engineering approaches [28] which try to fill the gap between MAS analysis and development life-cycle."]} +{"7314955|12068725": ["generation techniques used in the domain of video games [11], which we believe is a promising direction of research."]} +{"6656306|778117": ["Runtime verification has been applied to robotics [42,43,44,45] where monitors are used to checking the status of path planner and tasks executions."]} +{"6656306|6988770": ["Recent advances in robotics have led to the adoption of autonomous mobile robots across a broad spectrum of applications like surveillance [1], precision agriculture [2], warehouse [3], and delivery systems [4]."]} +{"6019483|9597596": ["There are several types of VPLs, differing based on how they exploit visual expression, such as form-based [12], flow-based [19], or rule-based [16] VPLs.", "in this paper is a flow-based VPL [19], similar to popularly known flow diagrams or control flow graphs."]} +{"3623323|468992": ["The many potential applications of swarm robotic systems such as exploration, surveillance, and search and rescue have made them an attractive research area (see [1] for an excellent review of the literature).", "However, as observed in [1], the intuition"]} +{"12542850|8914588": ["The activities share knowledge that typically includes a model of the managed element(s) and \na description of goals [Huebscher and McCann 2008].", "The activities share knowledge that typically includes a model of the managed element(s) and a description of goals [Huebscher and McCann 2008]."]} +{"35365927|12998110": [") [22], a fact reflected by a large body of research applying formal V&V approaches to the deliberation functions [1, 16, 21, 29]."]} +{"128623|468992": ["Unlike many foraging scenarios (Brambilla et al. 2013), the objects to be carried are too heavy for a single robot, thus cooperation is necessary: the robots form teams of three to be able to carry an object.", "The analysis of large and complex swarm robotics systems (Sahin 2005; Brambilla et al. 2013) directly with robots is costly and time consuming.", "To overcome these limitations, other approaches are usually employed (Brambilla et al. 2013).", "Microscopic models are usually analysed via stochastic simulation (Brambilla et al. 2013; Lerman et al. 2005).", "This high level view allows one to analyse swarm robotics systems composed of thousands of robots in a computationally feasible way, making macroscopic models the most common modelling approach in swarm robotics (Brambilla et al. 2013)."]} +{"18760258|468992": ["These properties can be useful in several applications (Brambilla et al. 2013)."]} +{"1783181|8914588": ["Huebscher and McCann \n[11] elaborate on knowledge and make a distinction between: (1) architectural model of the managed element, \nincluding structural and behavioral data; (2) goal model (e.g. event-condition-action policies or utility \nfunctions); and (3) model of the operating environment in which the managed element is situated (e.g., \nhardware devices, network connections), which may also include other autonomic elements.", "Huebscher and McCann [11] elaborate on knowledge and make a distinction between: (1) architectural model of the managed element, including structural and behavioral data; (2) goal model (e.", "The activities share knowledge that typically includes a model of the managed element and a description of goals [11].", "[11] M. C. Huebscher and J. A. McCann."]} +{"5311026|12998110": []} +{"5311026|35167928": ["Among the large diversity of robotics applications and their associated ethical issues [14], safety is not a new concept."]} +{"5311026|13427574": []} +{"5311026|778117": ["Decisional layer Detecting plan execution errors is known in robotics as execution monitoring [120, 121, 122])."]} diff --git a/edge/graph_49557883.jsonl b/edge/graph_49557883.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33ee31144ccdac9f48b43b026b281bef52121192 --- /dev/null +++ b/edge/graph_49557883.jsonl @@ -0,0 +1,24 @@ +{"17465528|2357830": ["Both Juels [6] and Piramuthu [7] have written", "Juels deals about the threats to privacy when tag is combined with personal information and identity.", "Both Juels [6] and Piramuthu [7] have written evaluations and overviews on existing solutions."]} +{"15663508|2357830": ["Rapid RFID progress has already been made in retail sectors, such as Wal-Mart and Procter & Gamble, as well as in government sectors, such as U.S. DoD and Postal Service [14]."]} +{"18469836|2415608": ["To depth in all these matters we recommend the reading of [7, 10, 13] where surveys of the most important advances in RFID technology are presented."]} +{"18469836|2357830": ["To depth in all these matters we recommend the reading of [7, 10, 13] where surveys of the most important advances in RFID technology are presented."]} +{"6728892|9743176": []} +{"825171|2357830": ["An SA may be able to perform the following attacks, as well as the weak attacks described above [2, 12, 7].", "Two major privacy issues are as follows [2, 3, 14, 7, 15].", "We identify privacy, security and performance requirements for RFID protocols, as well as additional functional requirements such as tag ownership transfer.", "The proposed protocols possess the privacy, security and performance properties and meet the requirements for secure ownership transfer identified here."]} +{"3281831|2906926": []} +{"14328953|2357830": ["Therefore, RFID applications require a large number of security functionality including mutual authentication, transmission confidentiality and integrity, anonymity and availability [4]."]} +{"6951171|2357830": ["However, here, a hash function F will be our main building block as in many past works [3, 20, 22, 21, 23, 24].", "This, in turn, may lead to tracking and pro-\ufb01ling of individuals by the tags contained in the objects they carry [3, 4, 5]."]} +{"2906926|2357830": []} +{"15096767|2357830": []} +{"2221526|2357830": ["Two major privacy issues are as follows [1], [10], [13], [22].", "The following attacks are feasible for a WA [1], [10], [22].", "Radio Frequency Identification (RFID) tags have been widely studied by both academia and industry [1], [10], [21].", "Key features of RFID systems include a lack of physical contact between readers and tags, and tag scanning out of the line of sight [1], [10]."]} +{"20085746|2357830": []} +{"11629797|7329149": ["Thus, the ownership of an RFID tag requires it to be physically and digitally transferred over to different partners many times as the control on tagged items changes [6, 7].", "However, the business model of IoT dictates that objects in this global network may be owned by different parties at different points in time [2, 6, 7].", "To have an IoT ready ownership transfer protocol, it must be capable of protecting the required security properties of business entities while being universal (supporting all RFID tag ownership transfer scenarios) at the same time [6, 7]."]} +{"19991512|2415608": ["Using this fact along with ability to eavesdrop on the insecure channel between readers and tags, several attacks that threat the security and privacy of these systems have been published [6]."]} +{"19991512|2357830": ["The identification of items in RFID systems does not require a direct Line of Sight (LoS) and several items can be identified at the same time [2]."]} +{"7703611|180217": []} +{"107657689|2357830": ["Some information about the items that tag is attached to them can be broadcasting by the tag and allowing a clandestine reader and collecting intended information about a person or a company [19-22].", "[19] Juels, A."]} +{"9769124|2357830": ["Further interested readers may go through [8], [4] and [5]."]} +{"10249717|2906926": ["A great number of authentication/identification protocols for RFID systems have been proposed in the literature [9]."]} +{"26139216|2357830": ["\u2020 Location tracking There are two main concerns related to the privacy issue, tag location privacy and tag information inventory [14]."]} +{"6635822|2357830": ["Based on Juels and Weis (2009), we parameterize an encrypted message\u2019s length with k (bits); adversaries\u2019 maximum queries to a tag with t; maximum queries to a reader with r; maximum computation with s.", "In 2005, Wal-Mart introduced RFID for its logistics management operations to track its product data in the supply chain, speeding up replenishment, reducing inventory, and increasing profitability (Juels 2006)."]} +{"9093297|2357830": ["Swapping [3, 4] is an attack in whichA exchanges two valid SecretT .", "Unfortunately, when these passive RFID tags are introduced universally into consumer products which are different from manufactural environment, new security and privacy problems will arise, namely clandestine tracking and inventorying [3]."]} +{"16393589|2357830": ["RADIO frequency identification (RFID) systems aredeployed in numerous automated asset management applications."]} diff --git a/graph_4955901.jsonl b/edge/graph_4955901.jsonl similarity index 100% rename from graph_4955901.jsonl rename to edge/graph_4955901.jsonl diff --git a/edge/graph_49562075.jsonl b/edge/graph_49562075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4ec765285e32130b4757d91d7a8804a0130e968 --- /dev/null +++ b/edge/graph_49562075.jsonl @@ -0,0 +1,11 @@ +{"2641230|141053": ["A media access control (MAC) protocol [Kumar et al. 2006] allows for several nodes to be connected to the same medium and coordinates their accesses to the shared medium.", "A media access control (MAC) protocol [Kumar et al. 2006] \nallows for several nodes to be connected to the same medium and coordinates their accesses to the shared \nmedium."]} +{"7266963|5762556": ["In this context, [10] has proposed an overview of several case studies on using the GPU delegation principle for adapting MABS models to GPU programming.", "It is based on [13, 9] and extracted from the experiment conducted in [8, 10].", "All the experiments carried out within the scope of GPU delegation [10] allow to extract a design methodology based on the GPU delegation principle and divided into 5 distinct phases (illustrated in figure 1).", "C4 has never been implemented in a GPU module in contrary to C1 which consists in computing a diffusion in the environment and was performed several times before [10].", "This observation has already been made in our previous work [10]."]} +{"147903216|2951180": ["The area is fast growing and there are various survey papers on specific topics regarding agent-based systems and their use - agent-based modelling practices, [6], agent-based modelling approaches and associated tools [7] - or on the use of agent-based systems in electricity market modelling [8], manufacturing control [9], hospital environments [10] etc."]} +{"147903216|35426346": ["The area is fast growing and there are various survey papers on specific topics regarding agent-based systems and their use - agent-based modelling practices, [6], agent-based modelling approaches and associated tools [7] - or on the use of agent-based systems in electricity market modelling [8], manufacturing control [9], hospital environments [10] etc."]} +{"2185109|763939": ["We implement two mobility models: RandomWayPoint and RandomDirection [10] \nand three boundary policy models: Annulment of excess, Sliding on the boundaries and bouncing on the \nboundaries.", "four network size intervals: small networks [2-50], medium networks [50-200], large networks [200-2000] and the very large networks [2000-102000].", "We implement two mobility models: RandomWayPoint and RandomDirection [10] and three boundary policy models: Annulment of excess, Sliding on the boundaries and bouncing on the boundaries."]} +{"9436861|17779575": ["For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|165863": ["; Mittal and Vetter 2015].", "CPU versus GPU debate [Gregg and Hazelwood 2011; Lee et al. 2010; Mittal and Vetter 2015; Vuduc et al. 2010] toward a CPU and GPU paradigm where the best features of both can be intelligently combined to achieve even further computational gains."]} +{"9436861|13037420": ["However , mobile systems also impose very stringent cost and power budgets [Mittal 2014c].", "For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|12904520": []} +{"15948595|713082": ["A readable introduction to DIS is provided in DIS Steering Committee (1994). The August 1995 issue of the Proceedings of the IEEE includes several articles concerning DIS, and the March 1997 issue of IEEE Spectrum concerning distributed virtual environments."]} +{"57753870|49562075": ["A survey of techniques for general agent-based simulation on heterogeneous hardware is given in [13]."]} diff --git a/edge/graph_49563104.jsonl b/edge/graph_49563104.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43668e5d4201dcf05c08700e48fc342b0823e1b3 --- /dev/null +++ b/edge/graph_49563104.jsonl @@ -0,0 +1,35 @@ +{"51909943|8914588": []} +{"6862491|21738890": ["Posture detections schemes by using the sensor equipped smart devices will be widely used in health monitoring services [90, 91]."]} +{"14995944|10975328": ["Frank's taxonomy encompasses more features and, besides that, other taxonomies for characterizing time and visualization techniques for timeoriented data exist [5], [6], [7], [8]."]} +{"24038949|3102110": ["There are many challenges and requirements of data mining like controlling various types of data, time complexity of data mining algorithms, certainty of results obtained through data mining, expressions of data mining results, data security and privacy [11]."]} +{"24038949|17403085": ["There are many advantages of data mining like it is helpful in banking, finance, accounting, retail, marketing, manufacturing, governments and many more [7]."]} +{"39218031|5544758": []} +{"39218031|206743327": []} +{"39218031|3750204": []} +{"39218031|2398835": []} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"61531625|2256372": ["In 1989, Satyanarayanan [20] provides a taxonomy about the different issues a DFS can meet and must solve."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"12347519|7923075": ["Keywords: SPARQL federation, Web of Data, RDF", "[21] presents a survey of SPARQL endpoint federation systems, explaining the details of the query federation process and with a comparison of the query evaluation strategies used in these systems."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"16767807|4474193": []} +{"16767807|15273230": []} +{"27410217|3348390": ["hitecture, there are many software components with same or different functionalities that work on mobile and sensor networks in order to communicate and process data which collected from the sensors? [22]. This architecture is composed of streams and nodes. Nodes operate the data through streams with other nodes and it makes them suitable for mobile devices. E. Centralized In this architecture all the", "ellde\ufb01ned framework or architecture. Each architecture has unique attributes therefore, they can be categorized based on different parameters as oppose to make an explicit and \ufb01xed categorization. In [22], C. Perera et al, proposed a general TABLE I: Comparison of different possible architecture designs in middlewares Architecture Bene\ufb01ts Challenges Component-based Reusability, Abstraction support and", "from the other. Determining device\u2019s role is challenging because sometimes we encounter devices that can be considered as both. CaSP used this model to separate processing ad sensing from each other? [22]. This architecture can be classi\ufb01ed into two models based on the functionality of clients. Thin client model: The server is in charge of processing applications and managing data. Here clients just p"]} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"195649387|16403716": []} +{"17580315|8042572": ["IVS and IVA provide effective means of sensing in intelligent environments [113], which is much related with the recent concepts of CPS or Internet of Things (IoT)."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"3681659|21386749": []} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"6910931|1775475": ["erties listed below) after evaluating a number of research proposals carried out in the areas of quality of service domain related web services [20], mobile computing [21], and sensor ontologies [5], we extracted following context properties to"]} diff --git a/edge/graph_49563364.jsonl b/edge/graph_49563364.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49563917.jsonl b/edge/graph_49563917.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4a3cfb98ea55e661c94bebbfc8448db7e8038e8 --- /dev/null +++ b/edge/graph_49563917.jsonl @@ -0,0 +1,28 @@ +{"16578560|456491": ["For systems involving high amounts of coupled differential equations (A\u0301lvarez et al., 2009;\u0301Alvarez et al., 2011a; Honkela et al., 2010), the approach presented here is a reasonable way of obtaining approximate solutions and incorporating prior domain knowledge to the model."]} +{"46929193|456491": []} +{"46929193|14843594": ["\u2026& Williams, 2006) is a well-known statistical learning model extensively used in various scenarios, e.g., regression, classi\ufb01cation, optimization (Shahriari et al., 2016), visualization (Lawrence, 2005), active learning (Fu et al., 2013; Liu et al., 2017) and multi-task learning (Alvarez et\u2026"]} +{"57373791|44414506": ["There are two main resampling techniques: undersampling and oversampling [252]."]} +{"57373791|1651267": ["\u2026require that objects be recognized and localized at the same time, such as in cosaliency, i.e., discovering the common saliency of multiple images [53], simultaneously segmenting similar objects given multiple images in cosegmentation [54], or detecting and identifying objects in multiple images\u2026"]} +{"57373791|9232391": ["For instance, Zhang and Zhou [1] studied the emerging area of multi-label learning; Borchani et al. [5] summarized the increasing problems in multi-target regression; Vembu and G\u00e4rtner [4] presented a review on multi-label ranking.", "\u2026binary output values relate to multi-label classi\ufb01cation problems [1], [2]; nominal output values relate to multi-dimensional classi\ufb01cation problems [3]; ordinal output values are studied in label ranking problems [4]; and real-valued outputs are considered in multi-target regression problems [5].", "2) Multi-Target Regression: The aim of multi-target regression is to simultaneously predict multiple real-valued output variables for one instance [5], [57]."]} +{"57373791|18484924": []} +{"51759334|31194450": ["Some reviews and comparison studies regarding MFM can be found in (Toal 2015; Fern\u00e1ndez-Godino et al. 2016; Peherstorfer et al. 2016; Park et al. 2017).", "\u2026problem is usually referred as transfer learning (Pan and Yang 2010) in the machine learning community, while it is restricted to multi-fidelity modeling (MFM), variable-fidelity modeling (VFM), or data fusion in the engineering community (Fern\u00e1ndez-Godino et al. 2016; Peherstorfer et al. 2016)."]} +{"51759334|456491": ["\u2026through cross-covariance functions built using linear model of coregionalization or convolved process (Bonilla et al. 2007; Alvarez and Lawrence 2009; Alvarez et al. 2012), and the general stacked single-target framework and ensemble of regressor chains (Spyromitros-Xioufis et al. 2016).", "Some commonly used symmetric multi-response modeling approaches include, for example, the artificial neural networks (ANNs) that are extended to support multi-response by defining how inputs are shared across responses (Caruana 1995; Collobert and Weston 2008), the multi-response Gaussian process framework that captures the response correlations through cross-covariance functions built using linear model of coregionalization or convolved process (Bonilla et al. 2007; Alvarez and Lawrence 2009; Alvarez et al. 2012), and the general stacked single-target framework and ensemble of regressor chains (Spyromitros-Xioufis et al."]} +{"51759334|13985031": ["(Wang and Shan 2007; Kleijnen 2009; Razavi et al. 2012b; Viana et al. 2014)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"33933145|456491": ["A common way in which this is done in GP regression algorithms (Deisenroth and Rasmussen, 2011; \u00c1lvarez et al., 2012) is by assuming that, given a deterministic input x, all outputs f1(x), ."]} +{"15863266|2701596": ["(2005), Gramacy and Lee (2008), Tresp (2000) and Deisenroth and Ng (2015) that consist of considering independent GP experts on disjoint parts of the domain or handling disjoint subsets of the data.", "That being said, as noted by Foti and Williamson (2015), non-exchangeable normalized random measures may be regarded as Poisson point processes (with varying intensity functions) on some\naugmented spaces, which makes this choice of prior specification somewhat similar, but stronger (that is more\u2026", "(2005), Gramacy and Lee (2008), Tresp (2000), and Deisenroth and Ng (2015) also allow for fully-distributed inference on regression problems."]} +{"3691988|9232391": []} +{"3691988|15888893": ["The study of MOGP has a long history and is known as multivariate Kriging or Co-Kriging [16, 17, 18, 19] in the geostatistic community; it also overlaps with the broad field of multi-task learning [20, 21] and transfer learning [22, 23] of the machine learning community."]} +{"3691988|456491": []} +{"3691988|13985031": [", small- or largescale regression [4, 5, 6], dimensionality reduction [7], Bayesian optimization [8], uncertainty quantification [9] and time-series analysis [10]."]} +{"3691988|14843594": []} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"16362639|1400872": ["The (L8) generation task is a classical benchmark for pattern generation methodologies [34], [35]."]} +{"83458785|49563917": ["Here we highlight some notable variants of the basic approach, though it is by no means an exhaustive list \u2013 see [22] for a more thorough review."]} +{"57786072|393948": ["GPs exploit local generalization, where generalization is achieved by local interpolation between neighbors [5]."]} +{"88515314|14843594": ["Well-calibrated uncertainties would be very useful in areas such as Bayesian optimization [54] or active learning [53], as well as when using predictions from machine learning algorithms in the real world and noticing when models are in domains away from those upon which they were trained."]} +{"53219084|49563917": [" the era of big data, the scalability of HGP should be improved. Recently, there has been an increasing trend on studying scalable GPs, which have two core categories: global and local approximations [29]. As the representative of global approximation, sparse approximation considers m(m\u02ddn) global inducing pairs fX m;f mgto summarize the training data by approximating the prior [30] or the posterior [3"]} +{"53219084|14843594": ["The homoscedasticity offers tractable inference to enable extensive applications in regression and classification [1], visualization [2], Bayesian optimization [3], multi-task learning [4], active learning [5], etc."]} +{"9922492|38476": ["Such problems were discussed by Dietterich in [97]."]} diff --git a/edge/graph_49563935.jsonl b/edge/graph_49563935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50bc8c077ba9c1eb8828a9c317b6aa57279aaf4a --- /dev/null +++ b/edge/graph_49563935.jsonl @@ -0,0 +1,2 @@ +{"15692587|7696556": ["THE SELECTION ORDER OF PAPERS\nRound Selection of Papers\nAction Result\n0 Database search 1716\n1 Duplicates removed\n703 Papers and articles selected\n2 Titles and abstract read\n264 Context of AUOSAR checked\n3 Full text read briefly 88\n4 Full text read carefully\n22 Effects identified"]} +{"16627305|35167928": ["Besides the developments of well-known safety critical systems in aero-nautics or transportation, new systems are about to appear in our everyday life: robots at home, at work, or in the hospitals (Royakkers and van Est, 2015)."]} diff --git a/edge/graph_49564302.jsonl b/edge/graph_49564302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1274838ce5d309dbe17b80ff6fa35b398eae0e0 --- /dev/null +++ b/edge/graph_49564302.jsonl @@ -0,0 +1,13 @@ +{"39141587|10464056": ["[24] summarized various kinds of control engineering approaches used in designing selfadaptive systems with the publications between 2000 to 2010."]} +{"39141587|627405": ["To conduct the investigation and report analysis results, we adopt the research methodology of systematic literature review [8] [9] in the evidence-based software engineering paradigm [10]."]} +{"16283773|1775475": ["The solutions that have been suggested can be divided to many categories, depending on the type of the adaptation proposed."]} +{"207399351|10464056": ["The reader is referred to [162] for further information on designing SASs using control engineering."]} +{"207399351|17183431": ["Nature-inspired systems may bring certain benefits such as spatiality, self-adaptability, and openness [180]."]} +{"207399351|8914588": []} +{"207399351|1975139": ["A comparison of ADLs can be found in [105]."]} +{"21467564|6916267": []} +{"21467564|10091442": []} +{"21467564|10464056": []} +{"990202|8914588": []} +{"12911107|6916267": ["Whereas [36] does not report any study that combines MAPE-based adaptation with another adaptation mechanism, there are a signi\ufb01cant number of studies that combine different adaptation mechanisms to re-alise self-adaptation in CPS.", "Several of the data items that we studied in this survey were also studied in a recent survey on the application of self-adaptation [36]."]} +{"12911107|10464056": ["While secondary studies exist on architecture-based selfadaptation [6], engineering of control-based adaptation [7], and architecting CPS [8], to the best of our knowledge, no paper has invested the role of self-adaptation in architecting CPS."]} diff --git a/edge/graph_49564714.jsonl b/edge/graph_49564714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..097d342ff04f6241bed29a82e30d4049c337822b --- /dev/null +++ b/edge/graph_49564714.jsonl @@ -0,0 +1,3 @@ +{"9530012|14225710": []} +{"23943173|14225710": ["\u2026information from sources like the World Atlas of Language Structures (WALS) (Dryer and Haspelmath, 2013), has proven useful in many NLP tasks (O\u2019Horan et al., 2016), such as multilingual dependency parsing (Ammar et al., 2016), generative parsing in low-resource settings (Naseem et al.,\u2026", "World Atlas of Language Structures (WALS) (Dryer and Haspelmath, 2013), has proven useful in many NLP tasks (O\u2019Horan et al., 2016), such as multilingual dependency parsing (Ammar et al."]} +{"201720|38476": ["However, it is well-known that this approach fails to exploit a lot of significant information [5]."]} diff --git a/edge/graph_49564727.jsonl b/edge/graph_49564727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64e4573f224b61d68d3e02c3fe1fd7e88e0d7f96 --- /dev/null +++ b/edge/graph_49564727.jsonl @@ -0,0 +1,13 @@ +{"36285153|1722293": []} +{"7996866|1722293": ["This technique has gained revived interest due to recent development in measurement technology [2], [3] and a growing preference for \u201caging in place\u201d [4]."]} +{"30551140|1722293": []} +{"5727561|5791119": ["The Fabry\u2013Perot interferometer is based on the principle of interferometry [92,95]."]} +{"5727561|155150": ["This makes OFS-based device compatible with the medical environment where EMI is central to a range of diagnostic and treatment techniques, such as as MRI, computed tomography (CT) scan, RF/microwave thermal ablation and other imaging and invasive medical procedures [70,89]."]} +{"13187136|1722293": ["A BCG signal can be obtained using sensors placed on a chair, on a bed, on a weighing scale or directly on the subject [2]."]} +{"125870876|1734833": []} +{"22614963|155150": []} +{"14246952|1722293": ["Recently, a review of numerous studies on BCG has been presented in [4].", "These sensors do not require direct attachments, and therefore, they allow the measurement of physiological signals for long periods of time without perturbing the subject [4,13].", "These could become pervasive in our daily life without causing any discomfort through the use of wearable device (clothes and accessories) or commonly used objects (furniture and tools) [3,4]."]} +{"14246952|20905429": ["Now, unobtrusive measurement technologies provide the possibility of managing subjects\u2019 health status as they go about their day-to-day lives [2]."]} +{"10126030|191396": ["A modified version of the k-means clustering algorithm [35] is then performed to identify clusters of feature vectors."]} +{"12366974|1722293": []} +{"28350817|2220294": ["Mobile solutions for patient cardiac monitoring are viewed with growing interest [1-2].", "Improvements on current implementations are frequently reported, with wireless and wearable devices promising to achieve ubiquity [1]."]} diff --git a/edge/graph_49564729.jsonl b/edge/graph_49564729.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b30defe7c81a833576f343ad786aa3546ed89fad --- /dev/null +++ b/edge/graph_49564729.jsonl @@ -0,0 +1,35 @@ +{"52069221|3932089": ["\u2026change spiking neuron shows good neuromorphic properties, the memristor using CMOS-compatible materials is more promising and competitive for constructing spiking neuron because of its simple structure, excellent scalability, low cost, and good compatibility with standard CMOS processes 35,36 ."]} +{"1798273|7414579": ["The performance analysis of DRTLG and interconnect design was evaluated by comparing the performance of DRTL with 4-input LUT based CMOS FPGA [33], for some ISCAS-85 benchmarks.", "Modelling a neuron as a threshold logic gate (TLG) that fires when input reaches a threshold has been the basis of the research on neural networks (NNs) and their hardware implementation in standard CMOS logic [18].", "xn) = sgn(w1x1 + w2x2 + \u00b7 \u00b7 \u00b7 + wnxn) = sgn( n i=1wi xi \u2212 T ) (1) where the values of wi are the synaptic weights associated with the inputs xi , and T is the threshold that the gate needs to meet to fire, and n is the fan-in of the TLG [63].", "The first simplified mathematical model of the biological neuron was introduced by McCulloch and Pitts [17] in 1943 in the form of the threshold logic gate (TLG).", "The survey in [63] concludes with an interesting observation.", "The spin-torque switches based on magneto-metallic domain wall (DW) motion [91], [92] allows ultra-low voltage operation of mem-ristive TLGs leading to low energy dissipation at the gate level.", "[63] offer another insight: \u201cLastly, because nano (and reconfigurable) computing will probably get center-stage positions in the (near) future, TL will surely benefit from that.", "According to the analysis carried out in Matlab-Simulink/Cadence, the TLGs with Ag-Ch memristive devices had a fan-in of > 10, switched at > 1 GHz speed and dissipated lower static power than a corresponding CMOS implementation.", "The performance analysis done on common benchmarks show that the proposed hardware can achieve more than 100x improvement in energy and 1000x improvement in energy-delay product, as compared to the state of the art CMOS FPGA based TLG. Threshold logic computing using hybrid Memristive-CMOS cell architecture designed for Fast Fourier Transform and Vedic Multiplication have been proposed by James A.P. et al. in 2014 [93].", "The design exploration of reconfigurable Threshold Logic Gates (TLG) implemented using Silver-chalcogenide memristive Fig.", "The design was extended to the implementation of an image classifier which classifies a 3x5 image into a rectangle or a triangle using three 5-input TLG in the first level and a Goto pair based majority voter as shown in Fig.", "\u201d The fundamental reason, the authors point out, is that TLGs need full custom design and have been in direct competition with Boolean gates and a lot of research effort has been spent on improving boolean logic gates since the 1970s.", "The proposed re-programmable TLG shown in Fig.", "the literature, a comprehensive survey of which can be found in [63].", "The distinguishing feature of PTLA was the combination of Negative Differential Resistance (NDR) based molecular switch and a multi-level resistance memristor leading to the where w i are the synaptic weights associated to inputs x i and T the threshold that the gate needs to meet to fire, and n is the fan-in of the TLG [63]."]} +{"30121311|1895753": ["\u2022 LIF models are quite fast to simulate, and particularly attractive for large-scale network simulations [15]."]} +{"46895244|1798273": ["The matcher circuit is based on XNOR threshold logic gates [24] and the averaging operation to produce the output, which demonstrates the weighted value of how many bits from the testing image are similar to the bits of"]} +{"52143225|49564729": ["Three main brain inspired learning architectures that we consider in this work are neural networks [5], [16], [17], [20], HTM [18] and LSTM [19].", "rents, the most widely used architecture for the crossbar synapses is 1 transistor 1 memristor 1T1M [20], [59], [60]."]} +{"52143225|13687435": ["HTM is divided into two parts: (1) Spatial Pooler (SP) and (2) Temporal Memory (TM) [33], [34]."]} +{"1033682|174797842": []} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"52076444|8523192": []} +{"52076444|3767252": []} +{"51906041|13687435": ["The dot product multiplication operation is performed in the memristive crossbar array, which has been proven to be efficient for various neuromorhcic and neural network architectures [3,4,5,6,7,8,9,10]."]} +{"3290651|9928823": ["Previously, several generic deep learning reviews (Bengio, 2009; Schmidhuber, 2015; Deng, 2014; LeCun et al., 2015), reviews that deal with deep", "\u2026even more research focusing on image classification with DCNNs.\nPreviously, several generic deep learning reviews (Bengio, 2009; Schmidhuber, 2015; Deng, 2014; LeCun et al., 2015), reviews that deal with deep\nDownloaded from http://www.mitpressjournals.org/doi/pdf/10.1162/neco_a_00990 by guest on\u2026", "The most common algorithm used for this purpose is backpropagation (LeCun, 1989; LeCun et al., 1998; Bengio, 2009; Deng & Yu, 2014; Deng, 2014; Srinivas et al., 2016)."]} +{"3290651|393948": []} +{"12520365|13034818": []} +{"51909517|13687435": ["The current memristive technology allows the implementation of binary states [13], however the endurance issues, effects of switching probability of the accuracy [14] and other aspect of non-ideal behaviour of memristive devices should be studied."]} +{"5029377|1798273": ["The logic gates are setup to implement the XOR configuration illustrated in [32], which requires the control voltage Vc to correspond to the NOR output of the two input voltages.", "Several attempts have been made to build TLGs with memristors [32].", "The implementation of NAND, NOR, or XOR configurations of TLG proposed in [32] are shown in Fig.", "By utilizing the resistive switching mechanism in memristors, the TLG can be set in the NAND, NOR, or XOR configurations [18], [32].", "Threshold logic has found many fields of application, including digital gates, computing, and bio-inspired processing [32]."]} +{"6485472|38239166": ["The recently developed memristor, whose resistance can be programmed in a wide range [1], has been used as a silicon neuron to perform neuromorphic computing [2]."]} +{"13687435|1798273": ["The matching circuit is based on the XNOR threshold logic gates [29]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"4389085|1798273": ["Memristor devices due to its ability to memories and being able to mimic neurons \ufb01nd various applications [15,16,17]."]} +{"23657563|18960196": ["Substantial empirical evidence in neurology supports the existence of temporal coding [35]\u2013[38]."]} +{"4885356|206578224": ["A detailed survey of the enabling technologies is provided in [24]; we summarize the most", "An MEC platform can also be deployed as a gateway in indoor environments and provide services including augmented reality, building management and social network applications [24]."]} +{"4885356|6909107": ["and functionality [22]\u2013[24]."]} +{"4885356|206578365": []} +{"4885356|469744": ["and reliability constraints for immersive applications, such as virtual and augmented reality [41], [42]."]} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"14136632|206459491": ["Rogue elements in the foundry may insert malicious circuits (hardware Trojans) into the design unbeknownst to the designer [8], [9]."]} +{"4875543|1798273": ["Nanoscale resistive devices have been extensively studied as a leading candidate for non-volatile memory [26], recon-\ufb01gurable logic [27], and analog circuits [28]."]} +{"7673168|1798273": ["the proposed work utilizes memristive threshold logic gate [27], [28], owing to their efficiency."]} diff --git a/edge/graph_49564756.jsonl b/edge/graph_49564756.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fd7a9415c3843258ea4ced71dcb804332ef4dae --- /dev/null +++ b/edge/graph_49564756.jsonl @@ -0,0 +1,10 @@ +{"19956421|40596005": ["Many significant technical difficulties inspired by aesthetic requirements, such as enhancing realistic impressions and simplifying interactive manipulations, induce rapidly expanding researches [1], [2]."]} +{"10701661|192934": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"8468206|17516538": ["BJECT categorization plays an important role in many applications related to computer vision, e.g., video surveillance [4], [ 5 ], image and video retrieval [6]\u2013[8], web content analysis [9], human computer interactions [10], and biometrics [11], [12]."]} +{"8468206|60455": ["BJECT categorization plays an important role in many applications related to computer vision, e.g., video surveillance [4], [5], image and video retrieval [6]\u2013[8], web content analysis [ 9 ], human computer interactions [10], and biometrics [11], [12]."]} +{"8468206|7185733": ["BJECT categorization plays an important role in many applications related to computer vision, e.g., video surveillance [4], [5], image and video retrieval [6]\u2013[8], web content analysis [9], human computer interactions [ 10 ], and biometrics [11], [12]."]} +{"8468206|16766019": ["BJECT categorization plays an important role in many applications related to computer vision, e.g., video surveillance [4], [5], image and video retrieval [ 6 ]\u2013[8], web content analysis [9], human computer interactions [10], and biometrics [11], [12]."]} +{"17855966|14047190": ["Second, as described in [27], \u201cIn spite of the practical importance of this estimate [cross validation], relatively little is known about its theoretical properties\u201d."]} +{"2693328|1029120": ["5d of [1] and the solid line is ROC of GFB\u2013RBF SVM (C = 461095126710589.", "A recently published survey about pedestrian protection systems [1] showed that pedestrian safety is realized as an important problem of global dimension to which various approaches have been applied for a long time."]} +{"7684482|11608263": ["To name just a few, if the expected class label for \ud835\udc99 \u2032 is single, then the predicted label could be \ud835\udc66 \u2217 = argmax \ud835\udc66 \ud835\udc5d ( \ud835\udc66 \u2223 \ud835\udc99 \u2032 ) , together with a con\ufb01dence measure \ud835\udc5d ( \ud835\udc66 \u2217 \u2223 \ud835\udc99 \u2032 ) .", "For the problem of exact age estimation, the predicted age could be the one with the maximum description degree.", "After that, the experiments on facial age estimation are reported in Section 4."]} diff --git a/edge/graph_49564949.jsonl b/edge/graph_49564949.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7de63e6c9e23bcc015b1233e30561ff7b7ec302 --- /dev/null +++ b/edge/graph_49564949.jsonl @@ -0,0 +1,44 @@ +{"64890177|744441": []} +{"14612986|7839197": ["For example, research contributions in the domain of the actor model [35] and software agents [54] have not been emphasized enough, and still modern distributed systems have been in\ufb02uenced by these communities too."]} +{"206578486|206578224": ["Reference [45] provides a survey of MEC."]} +{"206578486|6909107": [" data centers, using technologies such as OpenStack and ONOS [34]. Let us also stress that a few surveys that discuss mobile edge computing at large have been published in the very recent past (e.g., [35]). A. Cyber Foraging Cyber foraging is among the first concepts for edge computing but has now been superseded by more recent concepts such a cloudlet, MEC, and fog. We discuss it here because of its "]} +{"206578486|26429034": ["Such a characterization can be achieved through the analysis of corresponding real-world traces, through machine learning techniques [151], [158]."]} +{"206578486|7329149": ["For instance, Industrial IoT solutions [159] usually require low-latency ingestion but immediate processing of data [160]."]} +{"7004949|17787193": ["In this paper, we target the content caching at the edge problem where nodes in an urban environment can subscribe to offer distributed caches to a service provider [2]."]} +{"3074702|8523192": ["Fog computing is a promising solution in this scenario by exploring lightweight and customisable supplementary computing resources closer to the IoT data source in Healthcare solutions [15]."]} +{"3074702|21386749": ["When applied in critical scenarios, the services are very latency-sensitive and demand faster processing of the generated data [18]."]} +{"42356197|3348390": ["In the survey of [7], the application is mainly divided into three categories: industry, environment and society."]} +{"5044715|8523192": []} +{"10550230|3119314": ["Among the users of fog and cloud computing [24]\u2013[29], there is a cooperative relationship [33].", "Extensive studies have been done on the topic of cloud and fog computing and inference [1], [5], [21], [24]\u2013[29].", "Smartphones [8], [18], [19] are developing into significant applications processors in cloud and fog computing networks [24]\u2013[29].", "Each user can sense the data in their surroundings in fog computing networks [1], [5], [21], [24]\u2013[29]."]} +{"10550230|5551880": []} +{"781941|508178": ["If a user stores all of his/her data in the cloud, his/her own computer is merely used to access the cloud.", "According to a survey, 84% of the consumers are concerned about their data storage location (Habib et al., 2012), demonstrating that data accessibility is an important issue to users."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"19552313|10299098": ["The choice of the right service model is application and environment-depending, and may also depend on the level of context-awareness of the involved devices [33].", "nodes is a still challenging research issue [33]\u2013[35].", "Under this perspective, the FC paradigm differs from the related Mobile Edge Computing (MEC) one [7], [8], [33], [34], in which only edge nodes are employed for the device augmentation."]} +{"19552313|32360363": ["The final goal is the \u2018\u2018smart\u2019\u2019 management of the overall city asset [98]."]} +{"19552313|3330461": ["However, due to the multi-hop nature of the Internet backbone and the short-range capability of the network technologies currently envisioned for the support of inter-device communication [25], [26], guaranteeing reliable network connections is a challenging task in the envisioned IoE realm [27], [28].", "However, these (positive) attributes are counterbalanced by the fact that: (i) FNs are small-size data centers with reduced fault-tolerance capability; and (ii) the Device-Fog communication typically relies on short-range WiFi/UWB/\nVOLUME 5, 2017 9887\nBluetooth-based connections that are intermittent, interferenceaffected and failure-prone [58]\u2013[60].", "11/15 transmission technologies, like WiFi, UWB and Bluetooth [25], [126].", "However, in this case, the resulting perconnection round-trip-time RTT becomes quite sensitive on the corresponding (generally, time-varying) inter-vehicle distance d (m) and tends to scale up/down proportionally to it, that is [25], [137], [135]:", "Since the IoE devices could be randomly distributed over the SG, it is expected that theNetwork layer relies on short/mediumrange wireless transmission technologies, like WiFi, UWB and/or Bluetooth [26];\n(iii) the Fog layer is responsible for the management of the massive volume of metered data.", "However, we note that [25]: (i) due to fading and path-loss, the energy consumption of D2D links increases with the inter-thing distance in an (at least) cubic way; (ii) due to thing mobility, D2D mobile links are intermittent, and their average failure rates typically increase with the average thing speeds [131]; and, (iii) under the D2D model, the initiator thing needs, at first, to discover proximate things, and, then, must perform task distribution, thing synchronization and task retrieval.", "For this purpose, the cooperating devices build up D2D links, that typically rely on short-range wireless communication technology, like UWB, WiFi or Bluetooth [25], [26].", "9 will rely on short/medium-range wireless networking technologies, like WiFi, UWB and/or Bluetooth [26]; (iii) thank to the virtualization of the underlying manufacturing things, it is expected that the Fog layer of Fig.", "It operates under the same vehicular scenario previously described for the V-FoE test-bed, but, according to [25], [137], it utilizes only \u201cad-hoc\u201d D2D IEEE802.", "For this purpose, the cooperating devices build up D2D links, that typically rely on shortrange wireless communication technology, like UWB, WiFi or Bluetooth [25], [26]."]} +{"19552313|18037424": ["The underlying networking infrastructure acts as glue: it allows the SG to perform remote metering by (possibly) exploiting the support of smart Energy Storage Devices [95], [96]."]} +{"12675271|14472531": []} +{"12675271|31860478": ["The data plane is responsible for transferring data from the originator to the destination based on the routing information provided by the control plane logic [Chiang 2015].", "Chiang [Chiang 2015] has highlighted main differences between Cloud and Fog.", "Fog networking constitutes two planes, namely, 1) control plane and 2) data plane [Chiang 2015].", "\u2026stored primarily in cloud data centers), communication (rather than routed over the internet backbone), and control, con\ufb01gu-ration, measurement and management (rather than controlled primarily by network gateways such as those in the LTE (telecommunication) core)\u201d [Chiang 2015; Aazam and Huh 2014]."]} +{"12675271|3007529": ["Predictive and opportunistic models will be useful in handling these challenges [Pozza et al. 2015; Higuchi et al. 2014]."]} +{"12675271|7329149": ["These sensors will have a wide range of sensing capabilities [Perera et al. 2015a].", "However, as these platforms receive more and more personal data and once these platforms start sharing data between different parties, privacy becomes a serious concern and a great challenge to address [Perera et al. 2015b].", "Smart home solutions have traditionally used fog computing approaches over the last decade [Perera et al. 2015a; 2014c].", "In order to reduce the burden to the volunteers, Michael only needs to collect data from a maximum of 30 sensors kits (i.e., volunteers) despite the actual number of volunteers visiting the park at weekends\u201d [Perera et al. 2015c].", "Some common cloud computing platforms are discussed in [Perera et al. 2015a].", "These generic use case scenarios were extracted, with minor alterations, from two of our previous publications [Perera et al. 2014b; Perera et al. 2015c].", "However, they still need to adhere to the \ufb01rst rule that says sense only when moving\u201d [Perera et al. 2015c]."]} +{"12675271|1598350": ["According to the literature comparison presented in Table III, context discovery and awareness [Perera et al. 2014a] and semantic annotation is fairly ignored.", "Direct communication can be done via technologies such as 3G, which makes this approach less dependent on third parties (as depicted in (3) in Figure 3)\u201d [Perera et al. 2014b].", "A detailed comparison is presented in Table VI in [Perera et al. 2014a].", "The cloud IoT platforms can use such information to develop energy and privacy aware data collection plans [Perera et al. 2014b].", "Each time a gateway moves, the discoverer including security procedure needs to be executed repeatedly to make sure ICOs are well maintained [Perera et al. 2014a].", "Context data can provide information about data quality which is also has a direct impact on the fused results [Perera et al. 2014a].", "A detailed comparison is presented in Table V in [Perera et al. 2014a].", "Smart home solutions have traditionally used fog computing approaches over the last decade [Perera et al. 2015a; 2014c].", "Ideally, fog gateway devices can be used in all three types of sensing approaches mentioned above to make the sensing process more ef\ufb01cient\u201d [Perera et al. 2014b].", "Finally, health and safety authorities can monitor and supervise the waste management process without spending a substantial amount of money for manual monitoring inspections\u201d [Perera et al. 2014b].", "The challenge is to \ufb01nd a common ground as soon as possible so hey can initiate thee communication [Perera et al. 2014b].", "Such intelligent (re-)con\ufb01guration can save energy by eliminating ineffectual sensing and network communication\u201d [Perera et al. 2014b].", "To do this, both parties need to negotiate and agree to a common protocol and message sequence [Perera et al. 2014a].", "Gateway Device Cloud Middleware fog gateways can use such information to con\ufb01gure themselves accordingly (e.g., prepare to accept data in a certain way) [Perera et al. 2014a].", "It is inef\ufb01cient and cumbersome to connect ICOs to IoT applications manually through hard wired coding [Perera et al. 2014a].", "Typical, each ICO may have support one protocol and message sequence that can be used for con\ufb01g-uration [Perera et al. 2014a].", "Smart cities investments are designed to focus of \ufb01nding ICT based sustainable solutions to address growing issues [Perera et al. 2014b].", "Further more, ICOs also need to con\ufb01gure their scheduling calendar, communication frequency, data acquisition methods and sampling rate [Perera et al. 2014a].", "Further, context information is [Perera et al. 2014a] typically useful in inferring knowledge about what is exactly happening in the \ufb01eld.", "These generic use case scenarios were extracted, with minor alterations, from two of our previous publications [Perera et al. 2014b; Perera et al. 2015c].", "We have discussed what context information is in [Perera et al. 2014a] in detail."]} +{"12675271|3750204": ["Data stream analytics are discussed in detail in [Liu et al. 2014; Singh et al. 2016; Singh and Reddy 2015]."]} +{"12675271|3348390": ["According to the literature comparison presented in Table III, context discovery and awareness [Perera et al. 2014a] and semantic annotation is fairly ignored.", "Direct communication can be done via technologies such as 3G, which makes this approach less dependent on third parties (as depicted in (3) in Figure 3)\u201d [Perera et al. 2014b].", "A detailed comparison is presented in Table VI in [Perera et al. 2014a].", "The cloud IoT platforms can use such information to develop energy and privacy aware data collection plans [Perera et al. 2014b].", "Each time a gateway moves, the discoverer including security procedure needs to be executed repeatedly to make sure ICOs are well maintained [Perera et al. 2014a].", "Context data can provide information about data quality which is also has a direct impact on the fused results [Perera et al. 2014a].", "A detailed comparison is presented in Table V in [Perera et al. 2014a].", "Smart home solutions have traditionally used fog computing approaches over the last decade [Perera et al. 2015a; 2014c].", "Ideally, fog gateway devices can be used in all three types of sensing approaches mentioned above to make the sensing process more ef\ufb01cient\u201d [Perera et al. 2014b].", "Finally, health and safety authorities can monitor and supervise the waste management process without spending a substantial amount of money for manual monitoring inspections\u201d [Perera et al. 2014b].", "The challenge is to \ufb01nd a common ground as soon as possible so hey can initiate thee communication [Perera et al. 2014b].", "Such intelligent (re-)con\ufb01guration can save energy by eliminating ineffectual sensing and network communication\u201d [Perera et al. 2014b].", "To do this, both parties need to negotiate and agree to a common protocol and message sequence [Perera et al. 2014a].", "Gateway Device Cloud Middleware fog gateways can use such information to con\ufb01gure themselves accordingly (e.g., prepare to accept data in a certain way) [Perera et al. 2014a].", "It is inef\ufb01cient and cumbersome to connect ICOs to IoT applications manually through hard wired coding [Perera et al. 2014a].", "Typical, each ICO may have support one protocol and message sequence that can be used for con\ufb01g-uration [Perera et al. 2014a].", "Smart cities investments are designed to focus of \ufb01nding ICT based sustainable solutions to address growing issues [Perera et al. 2014b].", "Further more, ICOs also need to con\ufb01gure their scheduling calendar, communication frequency, data acquisition methods and sampling rate [Perera et al. 2014a].", "Further, context information is [Perera et al. 2014a] typically useful in inferring knowledge about what is exactly happening in the \ufb01eld.", "These generic use case scenarios were extracted, with minor alterations, from two of our previous publications [Perera et al. 2014b; Perera et al. 2015c].", "We have discussed what context information is in [Perera et al. 2014a] in detail."]} +{"12675271|15300368": ["As a result, each node can transmit, receive, or do both to enable routing data between nodes within the network [Buratti et al. 2009].", "As a result, each node can transmit, receive or do both in order to enable routing data between nodes within the network [Buratti et al. 2009]."]} +{"33931319|13295171": []} +{"53007190|8591084": []} +{"45191920|9190423": []} +{"15931597|13295171": ["The recent studies [8], [9], [23] and data sets available [10], show that hardware (processors, hard disk drive, integrated circuit sockets, and memory) causes more than 50% of the failures on HPC systems."]} +{"527532|206742377": ["Information extraction is necessary to structuralize the raw data so that they can be easily digested by analysis algorithms [2, 3]."]} +{"6968084|8523192": ["Fog computing is hence expected to fruitfully extend the Cloud+IoT scenario, enabling Quality-ofService- (QoS) and context-aware application deployments [5].", "The need to provide processing power, storage and networking capabilities to run IoT applications closer to sensors and actuators has been highlighted by various authors, such as [4], [5].", "Indeed, contrarily to the Cloud, Fog nodes often feature limited resources, what makes single node deployments not always feasible [5].", "As highlighted in [5], the availability of tools to simulate Cloud+Fog+IoT scenarios, without implementing testbeds, is still too scarce.", "Metrics to estimate and compare the QoS-assurance and the consumption of Fog resources of alternative eligible deployments [5] can ease the selection of deployments that are more likely to meet all processing and QoS constraints while minimising the consumption of Fog resources when needed."]} +{"13514267|15545863": ["By distributing computing resources closer to users and things, the Fog computing model can be a better choice for building distributed applications [30] [11], especially for latency sensitive applications such as Smart Transportation applications [26] [8]."]} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"17135672|15880829": ["Due to working in virtual environment, expensive implementation costs are avoided [9]."]} +{"3352036|18056032": []} +{"14944287|11810221": ["Dynamic scheduling or reactive scheduling reschedules tasks when unexpected events occur [10].", "Research in robust and fault-tolerant scheduling encompasses numerous fields like job-shop scheduling [15], supply chain [10], and distributed systems [11], [18], [19]."]} +{"3696962|1520906": ["IoT is expected to generate large volumes of sensor data (Qin et al., 2016)."]} +{"3696962|7329149": ["\u2026the strengths of some related researches namely context-aware open mobile miner (CAROMM) (Sherchan et al., 2012), on-demand mobile distributed sensing platform (C-MOSDEN) (Perera et al., 2015a) and scalable energy-efficient distributed data analytics platform (CARDAP) (Jayaraman et al., 2015).", "Different IoT solutions have been proposed in the literature (Perera et al., 2015b).", "Note that the proposed platform leverages the strengths of some related researches namely context-aware open mobile miner (CAROMM) (Sherchan et al., 2012), on-demand mobile distributed sensing platform (C-MOSDEN) (Perera et al., 2015a) and scalable energy-efficient distributed data analytics platform (CARDAP) (Jayaraman et al., 2015).", "The most widely needed filtering conditions in the mobile crowd sensing applications are location awareness (i.e. spatial), activity awareness, time awareness (i.e. temporal), and energy awareness (Perera et al., 2015a)."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} diff --git a/graph_4956661.jsonl b/edge/graph_4956661.jsonl similarity index 100% rename from graph_4956661.jsonl rename to edge/graph_4956661.jsonl diff --git a/edge/graph_49569064.jsonl b/edge/graph_49569064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffffecd31252ac1472e17928e1c939ee57c57928 --- /dev/null +++ b/edge/graph_49569064.jsonl @@ -0,0 +1 @@ +{"13098882|206485791": []} diff --git a/edge/graph_49572518.jsonl b/edge/graph_49572518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49574823.jsonl b/edge/graph_49574823.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f16e3f330114975c036868f8046c15337eda915 --- /dev/null +++ b/edge/graph_49574823.jsonl @@ -0,0 +1,49 @@ +{"37965923|1236072": []} +{"31102928|925507": []} +{"38288405|31086789": []} +{"1756768|3348390": ["[30], intelligence should be a major characteristic of IoT systems."]} +{"17407951|13991708": []} +{"2847229|1230643": []} +{"3503216|3579945": ["Note that, although this improvement in the energy efficiency is especially useful for battery-operated gateways, the increase on the level of security may also benefit other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which can be the target of cyberwarfare attacks [20]."]} +{"3503216|13991708": ["\u2026gateways, the increase on the level of security may also bene\ufb01t other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which\u2026", "As explained in [16], the fog layer must provide horizontal integration between different layer protocols."]} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"3300016|3579945": []} +{"3300016|13991708": ["Basic Requirements for IoT Devices IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [10,11], smart cities [12], defense [13,14] and high-security applications [15\u201317], precision agriculture [18], transportation [19\u201321] or Industry 4."]} +{"3300016|21386749": ["Basic Requirements for IoT Devices IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [10,11], smart cities [12], defense [13,14] and high-security applications [15\u201317], precision agriculture [18], transportation [19\u201321] or Industry 4."]} +{"4625011|3579945": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|13991708": ["\u2026together with paradigms like IoT, enable the development of advanced applications for industrial systems [25], energy efficiency [26], [27], home automation [28], precision agriculture [29], high-security IoT applications [30]\u2013[34], transportation [35] or for defense and public safety [36], [37]."]} +{"4625011|4719202": ["Note that picking items represents from 55 % to 65 % of the total cost of warehousing operations [75], which are still mostly carried out through a pick-by-paper approach."]} +{"4625011|469744": ["This definition is broader than the one given by other researchers [3], who disregarded photo-based augmentations, which have proved to be effective in industrial environments."]} +{"13991708|21738890": ["Relevant projects that estimate the network location of objects to perform context-aware services are reviewed in [98]."]} +{"13991708|6556803": ["The survey [109] reviews applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs, like data exchange and topology formation, resource and power optimization, area coverage, event tracking solutions, and\u2026"]} +{"13991708|7774517": ["Approaches to ensure data quality often rely on oversampling and \ufb01ltering of outlier values [70], reputation schemes that provide trustworthy sensing for public safety [71], or trust network-based human intervention approaches."]} +{"13991708|10310014": ["Over the last years, some research papers focused on evolving PS organizations have been published [21\u201325]."]} +{"3805855|3579945": ["Today, sectors like transportation [14], Industry 4."]} +{"3805855|13991708": ["0 [15], or even defense [16], [17] are benefiting from such advances."]} +{"23556999|44461432": ["Na\u00efve, selective na\u00efve, semi-na\u00efve Bayes, and Bayes multi-nets are the proposed categories for classi\ufb01cation [48]."]} +{"23556999|3750204": ["Big data analytics processes consume considerable time to provide feedback and guidelines to users, whereas only a few tools [29] can process huge data sets within reasonable amount of processing time."]} +{"23556999|121289": ["The smart grid is a new generation of power grid in which managing and distributing electricity between suppliers and consumers is upgraded using two-way communication technologies and computing capabilities to improve reliability, safety, ef\ufb01ciency with real-time control, and monitoring [73], [74]."]} +{"3579945|30518875": ["Satellites are used for both locating trains (aided by Global Navigation Satellite Systems (GNSS) systems [21], like GPS, the European GALILEO, the Russian GLONASS or the Chinese BEIDOU) and communicating with the wayside equipment."]} +{"3579945|13991708": ["\u2026advances in electronics, networking, and robotics, it is feasible to develop advanced sensor systems for different sectors and applications: energy ef\ufb01ciency [32], Industry 4.0 [33,34], home automation [35], public safety and defense [36,37], precision agriculture [38] or transportation [39].", "Furthermore, Wireless Sensor Networks (WSNs) have evolved into an integral part of the protection of mission-critical infrastructures [36]."]} +{"3579945|6878121": ["IEEE 802.11p [15] may be an option if high data rates are not required."]} +{"3579945|22833814": ["Furthermore, in the case of high-speed scenarios, Wang et al. [9] present a survey on channel measurements and models."]} +{"3579945|10744611": ["Two major families of technologies may be considered [19,20]: \u2022 Satellite solutions."]} +{"3579945|17905276": ["WSN-based condition monitoring for the rail industry is the object of the survey presented in [87]."]} +{"3579945|860072": []} +{"2986694|4631990": ["Home automation systems are focused on improving the interaction with devices and appliances typically found indoors [3\u20135]."]} +{"18277805|2623404": ["Network Virtualization [9] goes beyond SDN by focussing on the virtualization of all elements resulting in the ability to define customized virtual networks.", "Software-defined Networking Softwaredefined networking (SDN) [6,7] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic)."]} +{"23424265|19938676": ["It is assumed that 5G networks should meet the following six requirements: larger system capacity, higher data rate, lower end-to-end latency, ubiquitous connectivity, reduced energy consumption, and consistent quality of experience [7]."]} +{"23424265|4395259": ["Fortunately, in recent years the concept of physical layer security (PLS) [15], which is agnostic to the system infrastructures and RATs, has shown great potential in providing information-theoretically unbreakable secrecy.", "Up to now, a great number of secure relay transmission strategies based on the concept of PLS have been\nproposed [23]\u2013[27].", "The core idea of PLS is utilizing the inherent randomness and difference of wireless channels to keep the confidential message secure from eavesdroppers, regardless of their computing capabilities.", "Based on the celebrated theoretical analyses of PLS [16], [17], a serial of transmission strategies have been proposed, such as cooperative relay transmission [18], artificial noise [19], secure beamforming [20], and noise aggregation [21]."]} +{"13369233|7774517": ["Data outliers are the sensor readings that do not follow the normal pattern of sensor data in IoT systems, namely, deviate dramatically from the ground truth [5]."]} +{"40931594|6275330": ["The latest evolution of sensor networks is Wireless Sensor Networks (WSNs), which have been thoroughly studied for their application in different fields [31], from wearable computing [32] to the management of the power grid [33], or even to musical activities [34]."]} +{"568013|1230643": ["In the field of Sensor Networks, there has been significant research in the last few years, focusing on power-aware routing protocols (for a survey on sensor networks, consult [2]).", "As pointed out in relevant literature ([2]), some of the main factors influencing the design and deployment of a sensor network, include fault-tolerance, scalability, hardware constraints, the network topology, the transmission media, and power consumption (as dictated by communication and data processing requirements)."]} +{"206717171|1598350": []} +{"44248229|13991708": ["Security, robustness, and interoperability challenges hinder the widespread adoption of new CPS and IoT applications in military and mission-critical infrastructures [4]."]} +{"16690431|16052126": []} +{"32461623|25202113": ["[17] interpret provenance as the information regarding the path data takes from source to destination in a sensor network and secure this using Bloom filters."]} +{"32461623|7988320": ["On a related note, some researchers have proposed generalized architectures for communication and body area networks [18] [19] to enable certain properties but they do not focus on security or contextual relationships between sensor data as we do."]} +{"6699720|18037424": ["Smart metering is also specific in that the communication protocols it involves do not exhibit strong quality of service requirements such as those mandated by supervisory control and data acquisition systems (SCADA) [7]."]} +{"17701994|5914350": []} +{"17701994|9436742": []} +{"20165855|860072": []} +{"3434731|1598350": []} diff --git a/edge/graph_49577610.jsonl b/edge/graph_49577610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49587276.jsonl b/edge/graph_49587276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61ea7db8bb944813a066cb6fa60e3c6c335eb13f --- /dev/null +++ b/edge/graph_49587276.jsonl @@ -0,0 +1,9 @@ +{"42939535|18484924": ["P(Ck|xn) (1) Each individual probability of a feature to be in a given class C (in the above equation) is calculated as shown in formula 2."]} +{"4635704|1271753": ["The rule-based techniques recognize biomedical entities using several rules manually defined based on the textual patterns of entities (Narayanaswamy et al., 2003; Eltyeb and Salim, 2014)."]} +{"27996|4626023": ["Over 36 corpora have been generated in the biomedical field [12] already.", "In addition to the MyMiner tool, the systems Brat and Knowtator were examined [12]."]} +{"27996|8310135": ["Also the ending or beginning of words (affixes) and the presence of particular terms found in a list (gazetteer) of precompiled names are often exploited by NER systems [10,11] and can help identify a word\u2019s morphology (inflections, gerund, pronouns, etc.", "units including names of persons, organizations or locations [10].", "Although early NER taggers typically relied on hand-crafted rules, the current trend increasingly points towards the use of supervised machine learning techniques for entity recognition [10]."]} +{"2816661|8310135": ["NeuroNER is based on a fully supervised learning algorithm, which is the most studied approach (Nadeau and Sekine, 2007)."]} +{"1271753|18111745": ["Thus, extracting information, such as extracting relationships between specific types of entities (as in [12-15], or inferring facts (such as in [16]) first requires that the mentions of the entities in the text be detected."]} +{"18484924|15222577": ["Koulali, Meziane, and Abdelouafi (2012) developed an Arabic NER using a combined pattern extractor (a set of regular expressions) and SVM classifier that learns patterns from POS tagged text."]} +{"18484924|8310135": []} +{"17989581|8310135": ["\u2022 Publicly available gazetteers, widely used in previous NERC systems [58,44].", "In the following years, research on NERC increased as it was considered to be a crucial source of information for other Natural Language Processing tasks such as Question Answering (QA) and Textual Entailment (RTE) [44].", "The Named Entity Recognition and Classification (NERC) task was first defined for the Sixth Message Understanding Conference (MUC 6) (Nadeau and Sekine, 2007).", "The Named Entity Recognition and Classification (NERC) task was first defined for the Sixth Message Understanding Conference (MUC 6) [44].", "In the following years, research on NERC increased as it was considered to be a crucial source of information for other Natural Language Processing tasks such as Question Answering (QA) and Textual Entailment130 (RTE) (Nadeau and Sekine, 2007).", "Thus, while in the MUC 6 competition 5 out of 8 systems were rule-based, in CoNLL 2003 16 teams participated in the English task all using statistical-based NERC [44]."]} diff --git a/edge/graph_49610653.jsonl b/edge/graph_49610653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49617224.jsonl b/edge/graph_49617224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..daf49847a153ea4ea0c84b1301dfb694f0617583 --- /dev/null +++ b/edge/graph_49617224.jsonl @@ -0,0 +1 @@ +{"94380674|2910221": []} diff --git a/graph_4962752.jsonl b/edge/graph_4962752.jsonl similarity index 100% rename from graph_4962752.jsonl rename to edge/graph_4962752.jsonl diff --git a/graph_4964243.jsonl b/edge/graph_4964243.jsonl similarity index 100% rename from graph_4964243.jsonl rename to edge/graph_4964243.jsonl diff --git a/edge/graph_49650704.jsonl b/edge/graph_49650704.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8022741ccf90e628e2d579b898c632c57a5bb386 --- /dev/null +++ b/edge/graph_49650704.jsonl @@ -0,0 +1,4 @@ +{"119060876|6777457": []} +{"54093721|32328964": []} +{"4779070|6302811": ["ion of the oracle. The details of the oracle are not explicitly shown in the Qiskit snippet, but for the required Ca mod 15 operations, one can simply used the circuits developed by Markov and Saeedi [87]. The code in Fig. 24 also assumes that a functionqft_inv()will return the gates for an inverse quantum Fourier transform, and that a classical continued fractions algorithm can be used to convert the", "ty does not mean that quantum gates are \u2018less powerful\u2019 than classical gates. Even classical gates can be made reversible with minimal overhead. Reversibility does not restrict their expressive power [87]. Quantum gates can then be seen as a generalization of classical reversible gates. The most common gates are described in Table 1. The X gate is the quantum version of the NOT gate. The CNOT or \u201ccont"]} +{"4779070|17300331": ["Additionally, quantum random walk algorithms can also be used to search and find graph properties [24, 34, 38, 59, 60, 69].", "Quantum random walk algorithms come in two forms, discrete time quantum walk and a continuous time quantum walk [59]."]} diff --git a/edge/graph_49650873.jsonl b/edge/graph_49650873.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f738190b474b3fb662cb0735b8e27209337b8f3e --- /dev/null +++ b/edge/graph_49650873.jsonl @@ -0,0 +1,7 @@ +{"17617505|12604503": ["Architecture of e-Healthcare system (Egbogah & Fapojuwo, 2011).\nsmart grid, and smart harvesting (Booysen, Gilmore, Zeadally, & Van Rooyen, 2012; Yan et al., 2011).", "Machine to Machine (M2M) direct and Internet-integrated communication (Granjal et al., 2013).\nhuman intervention and via wired or wireless network (Yan et al., 2011)."]} +{"28328612|14441987": []} +{"10726656|86629084": []} +{"17349852|86629084": []} +{"61267392|116294": ["\u2026When the attacker node manages to attract neighboring nodes, it becomes a sinkhole and can be used to launch other attacks. n y E Sinkhole attacks are a form of network layer attack where the compromised node sends fake routing information to its neighbors to attract network traffic to itself [10]."]} +{"61267392|7465328": ["In addition, most routing protocols used in WSNs do not consider security aspects due to resource constraints of the sensors including low computational power, limited memory, small power supplies and limited communication range [5, 6]."]} +{"61267392|7889189": ["O L This provides an opportunity for an intruder to attack a node physically and get access to all necessary information [13]. n s I vii."]} diff --git a/edge/graph_49651352.jsonl b/edge/graph_49651352.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2b623740bb09c6f221eab4cacd00bb7b9c70256 --- /dev/null +++ b/edge/graph_49651352.jsonl @@ -0,0 +1,2 @@ +{"595831|2186746": ["The two recent survey papers [Fabbri et al. 2008; Jones et al. 2006] compare and contrast many state-of-the-art sequential approaches to solving the problems in 2D and 3D, targeting mainly the exact EDT computation.", "The two recent \nsurveypapers [Fabbri et al. 2008; Jones et al. 2006] compare and contrast many state-of-the-art se\u00adquential \napproaches to solving the problems in 2D and 3D, target\u00ading mainly the exact EDT computation."]} +{"12824109|2186746": ["Section 8 describes the methodology for speed and exactness tests.", "For a recent account of general 3D distance transforms (not speci\ufb01c to the exact EDT), please refer to [Jones et al. 2006]."]} diff --git a/edge/graph_49652367.jsonl b/edge/graph_49652367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e382f4657f85e24eba3bd80403da61628592888b --- /dev/null +++ b/edge/graph_49652367.jsonl @@ -0,0 +1,4 @@ +{"18238681|41505326": []} +{"18238681|18889901": ["We are more comprehensive than earlier efforts, describing 101 datasets compared with the 14 in [9], 19 in [42]1 and the 44 action datasets in [115]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"110612657|16242553": []} diff --git a/edge/graph_49656278.jsonl b/edge/graph_49656278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27b6ac973fb80654afd32b0cbca85a6e09800e94 --- /dev/null +++ b/edge/graph_49656278.jsonl @@ -0,0 +1,57 @@ +{"4561214|6088977": ["Evolutionary techniques are a promising approach to overcome this problem [10].", "previous works with legged robots [10], [17], [45].", "ER has been widely used in robots with complex locomotor systems as a method for gait optimization [2], [10], which contrasts with the task-solving studies that have been conducted with simple differential-drive robots [2]."]} +{"3882732|14843594": ["The Intelligent Trial-and-Error (IT&E) algorithm [14] first uses an evolutionary algorithm called MAP-Elites [30], [31] off-line to create an archive of diverse and locally high-performing behaviors and then utilizes a modified version of Bayesian optimization (BO) [32] to quickly find a compensatory behavior."]} +{"1708582|17464562": []} +{"7159355|1932843": ["A common strategy [2] to solve this issue consists in assuming that the policy \u03c0 is parameterized by \u03b8 \u2208 R, i.", "In robotics and control applications, RL presents two main disadvantages [2]."]} +{"18063196|41883163": ["Alternatively, hierarchical approaches to task priorities can be implemented [15], [16]."]} +{"18063196|1932843": ["Given the task execution cost, the goal is to minimize this cost by adjusting the task parameters [7], [8]."]} +{"7242892|1932843": ["Several recent papers provide surveys of policy search in robotics [3, 14].", "Pioneering early work on neural network control used small, simple networks [10, 33], and has largely been supplanted by methods that use carefully designed policies that can be learned ef\ufb01ciently with reinforcement learning [14]."]} +{"2341332|1932843": ["Policy search methods can be divided into model-based algorithms, which use a model of the system dynamics, and model-free techniques, which rely only on real-world experience without learning a model [10]."]} +{"1136878|4474193": ["One can also observe that because CMA-ES samples several solutions around a mean mk, it performs many evaluations of similar parameters, which are then averaged: this implicit averaging [34], [36] has many similarities with re-evaluating noisy solutions to estimate their expectation.", "Overall, these steps are only marginally impacted by noise in the performance function, as confirmed by empirical experiments with noisy functions [34].", "To do so, we build on all the work about noisy function optimization [34], [35], and especially on CMA-ES, one of the most successful blackbox optimizer for noisy functions [15]."]} +{"1136878|14843594": ["Bayesian optimization [23] is a particular family of BBO that can be very data-efficient by building a surrogate model of the objective function (i."]} +{"16028707|1400872": ["Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al.", "Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al., 2002), and statistical learning algorithms (e.g. locally weighted regression ) for dynamical systems\u2026"]} +{"53670210|1932843": ["Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs. By computing the \u201cdistance\" between nearby data windows, Kohlmorgen and Lemm [2001] segments human motion data using unsupervised learning.", "Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs.", "To address this issue, reinforcement learning can be used to improve the learned policy [Kober et al., 2013, Mnih et al., 2015, Silver et al., 2016].", "Kohlmorgen and Lemm [2001] developed an online segmentation method based on HMMs. By computing the \u201cdistance\" between nearby data windows, Kohlmorgen and Lemm [2001] segments human motion data using unsupervised learning. Kuli\u0107 et al. [2008] proposed a method for segmenting and clustering whole body motions by using factorized HMMs.", "\u2026learning literature, methods that learn a forward model of the system and leverage it for learning a policy are often referred to as model-based, while methods that do not explicitly learn a forward model of the system are referred to as model-free [Kober et al., 2013, Deisenroth et al., 2013b]."]} +{"14915176|1932843": ["cases, reinforcement learning (RL) can help to efficiently learn a control policy from sampled data instead of manual design using expert knowledge [1], [4], [5]."]} +{"6304307|4474193": ["A broad literature overview of uncertainties addressed in evolutionary optimization is given in [33].", "A third approach addresses uncertainties in the objective function by using a large population, also referred to as implicit averaging [33]."]} +{"14440834|9107727": []} +{"3467239|1932843": ["The key insight is that, whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling\u2026", "\u2026whereas current learning algorithms either start with no knowledge of the search space 17 or with minimal knowledge from a few human demonstrations 17,18 , animals better understand the space of possible behaviors and their value from previous experience 19 , enabling injured animals to\u2026", "The results also indicate that Intelligent Trial and Error signi\ufb01cantly outperforms previous algorithms for both damage recovery 63,12,64,65,66 and gait learning 67,62,68,48,69,32,61,42,17,49 , and can therefore be considered the state of the art.", "However, state-of-the-art learning algorithms are impractical because of the \u201ccurse of dimensionality\u201d 17 : the fastest algorithms constrain the search to a few behaviors (e.g. tuning only 2 parameters, requiring 5-10 minutes) or require human demonstrations 17 .", "Algorithms without these limitations take several hours 17 .", "7d, maximum p-value over each time step 10 \u2212 16 ), which is the current state of the art technique for direct policy search in robotics 32,61,42,17 .", "42 \u2022 Variant 3 (MAP-Elites in 6 dimensions + policy gradient): evaluates the bene\ufb01t of Bayesian optimization compared to a more classic, local search algorithm 17,62 ; there is no obvious way to use priors in policy gradient algorithms.", "This approach is a classic reinforcement learning algorithm for locomotion 17 and it is a baseline in many papers 32 .", "These results are consistent with the previously published results 62,32,42,17 , which optimize in 4 to 10 dimensions in a few hundred trials."]} +{"3467239|15700537": ["\u2026are expensive, because self-monitoring sensors are expensive, and are dif\ufb01-cult to design, because robot engineers cannot foresee every possible situation: this approach often fails either because the diagnosis is incorrect 12,13 or because an appropriate contingency plan is not provided 14 .", "Current damage recovery in robots typically involves two phases: self-diagnosis, and then selecting the best, pre-designed contingency plan 11,12,13,14 ."]} +{"3521972|73497737": ["A plethora of continual learning techniques exist in the supervised learning setting (see [33] for a full review).", "However, as noted by Parisi et al. [33], more research is needed to tackle continual learning with autonomous agents in uncertain environments - a setting well-suited to Reinforcement Learning (RL)."]} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} +{"23453919|2204231": ["descriptor is calculated in behavior space, whereas the others in parameter space [23], [24].", "confirmed experimentally for several domains [23], [24]."]} +{"23453919|14843594": ["ation. CVT-MAP-Elites opens up the possibility to utilize such a high-dimensional descriptor and maintain diversity in trajectory space. 4Although an alternative would be to use Bayesian optimization [31] as in [17], our evaluation is independent of the parameterization of any intelligent search algorithm, and still provides a measure about the expected performance of the archives. CVT-MAP-Elites is a"]} +{"11691568|1708582": []} +{"7586242|1932843": ["Indeed RL has been successfully applied to a range of robotic tasks [10], [11], [12], [13], however dimensionality and sample complexity have presented major challenges [14], [15]."]} +{"16736592|2065587": []} +{"16736592|9107727": ["Many possible constraints can be considered, grouped in families such as parsimonious GMM [11, 61, 7], mixtures of factor analyzers (MFA) [60] or mixtures of probabilistic principal component analyzers (MPPCA) [93].", "Bouveyron and Brunet reviewed various ways of viewing the problem and coping with high-dimensional data in clustering problems [11]."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"4936001|7782275": ["Effectively implementing such a process remains an open grand challenge in machine learning.(59) Putting all these attractive features altogether, soft tensegrity robots combine simplicity, flexibility, performance, and resiliency, which makes this new class of robots a promising building block for future soft robots."]} +{"4936001|5415387": [", 2013), or high-amplitude, low-frequency oscillations could be generated by moving a pendulum inside the structure (Chase and Pandya, 2012)."]} +{"4936001|14843594": ["cost functions) whose gradient cannot be evaluated analytically (Ghahramani, 2015; Shahriari et al., 2016).", "because this is the most common kernel in Bayesian optimization and we did not see any reason to choose a different one (Brochu et al., 2010; Shahriari et al., 2016).", ", probability of improvement, the expected improvement, or the Upper Confidence Bound (UCB) (Brochu et al., 2010; Calandra et al., 2014; Shahriari et al., 2016)); we chose UCB because it provided the best results in several previous studies (Brochu et al.", "For instance, Bayesian optimization is the current method of choice for optimizing the hyper-parameters of neural networks (Shahriari et al., 2016; Snoek et al., 2012), because evaluating the learning abilities of a neural network is both noisy and time-intensive.", ", 1983)) might have been used, there are compelling reasons why our adaptation algorithm is based on Bayesian optimization, namely because (i) it is a principled approach to optimize an unknown cost/reward function when only a few dozen of samples are possible (Shahriari et al., 2016) (by contrast, the simulated annealing algorithm relies on the statistical properties of the search space, which are valid only with a large number of samples (Kirkpatrick et al.", "Numerous acquisition functions have been proposed (e.g., probability of improvement, the expected improvement, or the upper confidence bound (UCB)37,47,48); we chose UCB because it provided the best results in several previous studies47,48 and because of its simplicity.", "Here a Gaussian process models the objective function (Rasmussen and Williams, 2006), which is a common choice for Bayesian optimization (Brochu et al., 2010; Calandra et al., 2014; Ghahramani, 2015; Lizotte et al., 2007; Shahriari et al., 2016).", "Here, as a substantial improvement upon these earlier timeintensive methods, we employ a Bayesian optimization algorithm (Cully et al., 2015; Ghahramani, 2015; Shahriari et al., 2016), which is a mathematical optimizer designed to find the maximum of a performance function with as few trials as possible.", "The equation for UCB is\nvt\u00fe 1\u00bc arg max x (lt(x)\u00fe jrt(x)), (5)\nwhere j is a user-defined parameter that tunes the tradeoff between exploration and exploitation."]} +{"13108736|14843594": ["Bayesian Optimization is a framework for sample-ef\ufb01cient global search ([11] gives a recent overview)."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} +{"16787047|1932843": ["Classic RL approaches, however, are designed for discrete state and action spaces [11, 10], whereas robots almost always have to solve continuous tasks, for example balancing by controlling joint torques [25].", "A popular alternative is to view RL as an optimization of the parameters of a policy [16], which can be solved with gradient-based methods [26, 10], evolutionary algorithms [27] or other optimization methods like Bayesian optimization [7, 28, 29].", "Instead of learning a model, robots can use an RL algorithm to discover how to behave [10].", "In this case, damage recovery is a reinforcement learning (RL) problem in which the robot has to maximize its performance for the task at hand in spite of being damaged [10].", "In addition to scaling, another limitation of most of the current RL methods used in robotics is that after each trial, the robot needs to be reset to the same state [10, 19].", "These methods work well in discrete action spaces (and even better when combined with discrete state spaces), but robots are typically controlled with continuous inputs and outputs (see [13, 10] for detailed discussions on the issues of classic RL methods in robotics)."]} +{"16787047|9316331": ["It has already had a profound impact on Artificial Intelligence approaches for domains that can be represented as trees of sequential decisions, particularly games and planning problems [35, 20].", "Here we use Monte Carlo Tree Search (MCTS) [21], as it has already been successfully used to solve (Partially Observable)-MDPs with stochastic transition functions [56, 35], continuous state spaces, and high branching factors [35, 57].", "These rollouts are typically random or directed by a simple, domain-dependent heuristic [35].", ", we select the action that has the maximum average cumulative reward [35].", "Default Policy for evaluation Uniformly-distributed random actions from the repertoire [35].", "In this work, we chose to use MCTS for the planning phase of our approach, because it has been successfully used in the context of RL [56, 35, 23] and because it makes no assumptions about the dynamics/model of the system.", "Moreover, as the dimensionality of the action space increases, the performance of MCTS rapidly deteriorates [35], preventing the use of TEXPLORE in more complex robots.", "Choose the action with the best UCT value [35] 5: a = arg maxa\u2208Children(s) Q\u0302(s,a), with Q\u0302(s,a) = R(s,a) n(s,a) + c \u221a ln(n(s)) n(s,a) return a"]} +{"16787047|14843594": []} +{"10869483|1932843": ["In this paper, as for the original PILCO algorithm, we use empirical simulation and hardware results to verify the utility of the proposed algorithm.", "One of the many reasons RL is difficult to apply to real robots is the large number of samples needed to explore the often high-dimensional continuous state spaces common to many robot platforms [7]."]} +{"13072941|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment (Bohg et al., 2014)."]} +{"26616326|393948": ["Furthermore, we believe, as in [2], that incorporating strong and diverse priors into learning will bring the learning process closer to intelligence.", "Robotic Priors : The term of prior in Bayesian statistics refers to the prior probability distribution, but as in the articles from [2],[3], [4] and [1], we use this term as a reference to an a priori knowledge we have about the world and not to a probability distribution."]} +{"10106241|1932843": ["Robotic reinforcement learning (RL) sets out to tackle the very general question of how new behaviors can be learned automatically from only high-level cost or reward specifications [10], [2], [1], [11], [12]."]} +{"33086836|1932843": ["In robotics however, sample complexity is paramount as sample generation on physical systems cannot be sped up and can cause wear and damage to the robot when excessive (Kober et al., 2013)."]} +{"33086836|14843594": ["Bayesian optimization is best known as a black-box global optimizer (Brochu et al., 2010; Shahriari et al., 2016).", "However, as the dimensionality of the task increases, non-stationarity effects of the objective or the noise function (see Shahriari et al. (2016), Sec."]} +{"30994737|1932843": ["Naturally, the use of RL for robot control is gaining popularity over the last few years [1, 2] in a broad spectrum of robotics applications [3]."]} +{"11697090|14843594": ["It combines two ideas: (1) a Bayesian optimization (BO) algorithm [16] that optimizes a reward function, because it is a generic, dataefficient policy search algorithm [3], and (2) a behavior-performance map generated before the mission with a simulation of the intact robot, which acts both as a prior for the Bayesian optimization algorithm and as a dimension reduction algorithm."]} +{"5539001|1932843": ["An overview of recent reinforcement learning methods in robotics can be found in a recent survey paper [15]."]} +{"56171147|7559976": ["Visual domain adaptation [42, 13] is a process that allows a machine learning model trained with samples from a source domain to generalize to a target domain, by utilizing existing but (mostly) unlabeled target data."]} +{"56171147|8815923": ["Robotic grasping is a well studied problem [2]."]} +{"3695707|41883163": ["These controllers can be formulated using analytical null-space projection methods [20], or multicriterion convex optimization problems using"]} +{"3841474|14843594": ["BO was originally conceived as a black-box optimization algorithm for expensive functions [10], [11].", "A function that is often used for this is the Expected Improvement (EI) [34], [11]:", "Optimization (BO) directly models the reward function [24], [11]; it then leverages this model to predict the most promising set of parameters for the policy, that is, those that maximize the expected reward.", "becoming one of the most successful approaches to tune the hyper-parameters of machine learning algorithms [11]: like in robotics, evaluating the quality of each set of parameters takes a long time."]} +{"9614092|1517662": ["Some systems contain discontinuities (for example, the process model might be jump-linear [14], in which the parameters can change abruptly, or the sensor might return highly quantized sensor measurements [15]), others have singularities (for example, perspective projection equations [16]), and in others the states themselves are inherently discrete (e.g., a rule-based system for predicting the evasive behavior of a piloted aircraft [ 17 ])."]} +{"5980504|1932843": ["Many robotic tasks have been successfully solved us-ing reinforcement learning, from ball-in-a-cup to inverted helicopter \ufb02ight [16]."]} +{"5980504|393948": ["Following others in the field of representation learning (Bengio et al. 2013), we use the word prior more broadly in an analogous fashion."]} +{"21376952|1932843": ["As we aim to control more complex robotic systems autonomously, simulators are being more frequently used for training in model-based reinforcement learning [7].", "Most model-based reinforcement learning has both model learning (system identi\ufb01cation) and policy optimization components [7]."]} +{"37667496|1932843": ["Different from model-based methods, model-free methods search for a policy that best solves the task without explicitly learning the system\u2019s dynamics [Sutton and Barto, 1998; Kober et al. , 2013]."]} +{"4000225|456491": []} +{"10757431|1708582": ["Markov decision processes (MDPs) have been adopted as the model of choice for DTP problems in much recent work [12, 26, 28, 30, 61, 78], and have also provided the underlying foundations for most work in reinforcement learning [48, 76, 77, 84]."]} +{"16159680|14843594": ["Bayesian Optimization is a framework for sequential global search to find a parameter vector x\u2217 that minimizes a given objective function f(x), while executing as few evaluations of f as possible (see [19], [3] for recent overviews)."]} diff --git a/edge/graph_49656608.jsonl b/edge/graph_49656608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ba59706503d65ccfcb02ae9719d308f2fcf758c --- /dev/null +++ b/edge/graph_49656608.jsonl @@ -0,0 +1,3 @@ +{"18854969|206584087": []} +{"26798855|2867949": ["enial-of-service (DoS) attacks exploit internet to target critical Web services [1, 2, 3, 4, 5,6]."]} +{"26798855|825893": ["enial-of-service (DoS) attacks exploit internet to target critical Web services [1, 2, 3, 4, 5,6]."]} diff --git a/edge/graph_49668283.jsonl b/edge/graph_49668283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab2259822867b3cb5b96c30ce2ea3a994b28a105 --- /dev/null +++ b/edge/graph_49668283.jsonl @@ -0,0 +1,6 @@ +{"1748014|7530272": ["A variety of meth-ods that accomplish this task (Xing, Pei, and Keogh 2010; Wang et al. 2010) do so by transforming the raw time series into a more ef\ufb01cient representation that preserves its key traits but reduces its dimensionality.", "Many approaches to time series classi\ufb01cation have been proposed in the machine learning literature (Xing, Pei, and Keogh 2010) and choosing the right approach depends on the nature of the time series.", "Two key characteristics of physical activity data (such as the data in Figure 1) that we will leverage to improve classi\ufb01cation accuracy are its repetitive pattern lasting for the duration of the physical activity and the fact that discriminative features occur at different temporal scales."]} +{"15899700|2670121": ["In AR, many approaches have been proposed to transfer knowledge between settings with different space, time, people, sensor types or activities [6]."]} +{"12705753|13726263": [", f\u0304m(I) are pruned if Equation 1 and Equation 2 hold [31]."]} +{"15334151|7788290": ["Although originally most of the research in activity recognition was done using vision sensors [Gavrila, 1999; Pentland, 1996], it has increasingly become dominated by various types of wearable sensors, like accelerometers and audio."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_49669060.jsonl b/edge/graph_49669060.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65ed29c036512d95d0d5b86d05d82f1b32449423 --- /dev/null +++ b/edge/graph_49669060.jsonl @@ -0,0 +1,5 @@ +{"23099871|207743293": ["This is in contrast to the related problem of rumor detection [41], which considers that a piece of false information is spreading across social networks."]} +{"9164793|207743293": ["Prior work in the area has found the task dif\ufb01cult, compounded by the variety present in language use between different stories (Lukasik et al., 2015; Zubiaga et al., 2017)."]} +{"6153235|877056": ["On the other hand, the streaming environment restricts the complexity of patterns, as data stream has the one pass constraint, which makes it difficult to do the iterative calculation and limits the computing and storage capabilities [10]."]} +{"12701596|7064380": []} +{"207743293|1143625": []} diff --git a/edge/graph_49669224.jsonl b/edge/graph_49669224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97046ef51a26ffedc50920f9efa17bee9a71b296 --- /dev/null +++ b/edge/graph_49669224.jsonl @@ -0,0 +1,3 @@ +{"9031751|33286487": ["The Cohens class of distributions [27] is a generalization of the WVT, where most of the cross terms are eliminated using different kernels."]} +{"16146553|26179088": ["To classify these signals, we can either work on a subset of channels selected based on certain criteria or work on all channels [8]."]} +{"16146553|37213650": ["The multi-channel EEG signals that are acquired are used for medical applications, such as seizure detection and prediction [1\u20133], as well as non-medical such as games and safety [4, 5]."]} diff --git a/edge/graph_49671623.jsonl b/edge/graph_49671623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..05de48d17a0ca7f06cfcd4fa105c10ab7456b654 --- /dev/null +++ b/edge/graph_49671623.jsonl @@ -0,0 +1,7 @@ +{"16960751|1517662": ["The typical trajectory contains the information of the flight plan and also other factors, such as flight plan changes, pilot preference, weather conditions and airspace structure which might cause changes in flight trajectories.", "Under TBO, how to predict the future trajectory accurately is one of the key technologies to enlarge the capacity of the airspace while ensure safety and efficiency."]} +{"19845501|1517662": ["The worst-case approach predicts the future trajectory under the assumption that the aircraft will move under worst-case maneuver defined by applications [6].", "Trajectory prediction can be classified into nominal, worst-case, probabilistic approaches [6]."]} +{"124842574|1517662": []} +{"121810937|1517662": []} +{"18585254|14814753": []} +{"18585254|16156203": ["Some relevant but nonrelational methods for forecasting have been developed within the field of temporal mining (for a relatively old review, see Laxman and Sastry [47], and for some more recent attempts at event forecasting, see Fahed et al [28], Laxman et al."]} +{"10131077|1517662": ["Terminal-area aircraft intent inference (T-AII) consists in predicting the future intended route for aircraft flying in the terminal airspace and can hence support conflict detection and resolution (CD&R) operations [1]."]} diff --git a/edge/graph_4967411.jsonl b/edge/graph_4967411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49674787.jsonl b/edge/graph_49674787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fc9a931dd42833f181263719bdef98909216d39 --- /dev/null +++ b/edge/graph_49674787.jsonl @@ -0,0 +1,2 @@ +{"1053741|469744": [", [94]), others hold a view of augmented reality much closer to our discussion of tangible interfaces (e.", "The areas of augmented reality [93,94,95], mixed reality [96], wearable computing [97], and ubiquitous computing [98] hold the closest relation to tangible interfaces among existing major research streams."]} +{"43279215|18284918": ["Techniques such as hidden Markov models (HMMs), par ticle filtering and condensation, finite-state machine (FSM) and artifi cial neural networks (ANNs) have been adopted for recognising hand and arm gestures [41, 42]."]} diff --git a/edge/graph_49679551.jsonl b/edge/graph_49679551.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d153c6abc07d2991be0d09a78a57ea9e82e047ef --- /dev/null +++ b/edge/graph_49679551.jsonl @@ -0,0 +1,9 @@ +{"3824369|3053192": []} +{"2490602|3053192": ["HH can be categorised as a method that selects heuristics or generates new heuristics from components of existing heuristics (Burke et al , 2010b).", "The use of many neighbourhoods allows VNS to more effectively explore the search space (Abdullah et al , 2005; Burke et al , 2010a).", "Genetic Algorithms (Burke and Kendall, 2005) are a population-based search that uses the principle of biological evolution (ie selection, mutation, crossover) to generate better solutions from one generation to another (Ross and Corne, 1995; Burke et al , 2010a).", "Hyper-Heuristics (HH; Burke et al , 2010b) are methods that attempt to raise the level of generality at which search methodologies operate."]} +{"5248433|1708582": ["Choice function and L schemes are based on reinforcement learning (Kaelbling et al. 1996)."]} +{"206982504|12846121": ["A recent review of the work done in this area is\nuelhadj and Petrovic (2009) ."]} +{"14435188|1708582": ["The competition rules are inspired from the principles of reinforcement learning ( Kaelbling et al. 1996; Sutton and Barto 1998 ).", "For example, variable neighbourhood search is based on the systematic change of the neighbourhood structure during the search ( Hansen and Mladenovic 2001 )."]} +{"2397967|3053192": ["A survey of the state of the art in hyper-heuristics has been recently published (Burke et al., 2013)."]} +{"31085133|53492103": []} +{"14052670|3053192": ["The domain barrier is a filter which prevents any problem specific information to be passed to the hyper-heuristic level (Burke et al., 2013), thus it allows the reusability of the selection hyper-heuristic components.", "Hyper-heuristics are general purpose solution methodologies which perform search over the space of heuristics rather than the solutions to solve hard computational problems (Burke et al., 2013).", "More on hyper-heuristics can be found in (Burke et al., 2013, 2003; Chakhlevitch and Cowling, 2008; Ross, 2005; O\u0308zcan et al., 2008).", "There is a large number of studies on heuristic selection and move acceptance methods used within selection hyper-heuristics (Burke et al., 2013).", "Cowling et al. (2001) initially defined hyper-heuristics as \u201cheuristics to choose heuristics\u201d."]} +{"116371295|11003991": []} diff --git a/graph_4968126.jsonl b/edge/graph_4968126.jsonl similarity index 100% rename from graph_4968126.jsonl rename to edge/graph_4968126.jsonl diff --git a/graph_4968608.jsonl b/edge/graph_4968608.jsonl similarity index 100% rename from graph_4968608.jsonl rename to edge/graph_4968608.jsonl diff --git a/edge/graph_49688800.jsonl b/edge/graph_49688800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49726523.jsonl b/edge/graph_49726523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4118d2412b02f7bf83253cfa3b3a3bded15ebade --- /dev/null +++ b/edge/graph_49726523.jsonl @@ -0,0 +1,62 @@ +{"5492686|393948": []} +{"1325931|2509135": ["IEEE Wireless Communications \u2022 December 2015 35 ed to other underutilized white space [7]."]} +{"9931536|2623404": ["The Software-Defined Network (SDN) technology [77] is one important enabler for the evolution of current networks towards the intelligent 5G HetNets [78]."]} +{"9931536|7851743": ["From the aspect of reducing the operational and capital expenditure (O/CAPEX) of MNOs, AI-based techniques can substantially diminish human involvement in operational tasks, and optimize network capacity, coverage, and Quality of Service (QoS) in HetNets, according to the advanced features discussed in Self-Organizing Networks (SONs) along following directions [3], [4], [6]: 1) self-configuration, where newly deployed high variety of cells are automatically configured and updated before entering operation tasks, 2) self-healing, where cells and networks can automatically detect and recover from failure and even execute compensation mechanisms whenever failures occur, and 3) self-optimization, where cellular systems can measure the network conditions and optimize the settings to improve the performance in terms of coverage, bandwidth, interference avoidance, and QoS, while the corresponding issues of system scalability and energy conservation are also considered.", "They have relatively lower complexity enabled by recursive feedback-based learning and local interactions, and hence faster speed of finding sub-optimal solutions compared to conventional techniques [3], [4]."]} +{"9931536|9072047": ["A fuzzy system is a control system based on fuzzy logic, which mathematically analyzes analog input values in terms of logical variables that take on continuous values between 0 and 1 [59]."]} +{"9931536|7158350": ["Artificial neural networks (ANNs) are one type of statistical learning models inspired from the biological neural networks of human brains [57]."]} +{"9931536|1708582": ["Among many ML techniques, the reinforcement learning (RL) is one particular learning algorithm inspired by behaviorist psychology, concerned with how software agents ought to take actions in an environment so as to maximize some notion of cumulative rewards [27]."]} +{"9931536|13215551": []} +{"204899989|9923206": ["Various works have been proposed for protocol veri\ufb01cation including rigorous speci\ufb01cation and conformance testing techniques for network protocols [212], rigorous treatment of the TCP protocol [165] [196], veri\ufb01cation of ad-hoc routing protocols for wireless sensor networks: [213]."]} +{"204899989|8974063": ["For furt her details, interested readers are referred to the survey pape rs [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occu pancy are reviewed in detail."]} +{"204899989|6507312": []} +{"204899989|12401050": ["It has been posited that for practical purposes of analyzing DSA/ CRNs, a simple two-state semi-Markov ON-OFF model is adequate for modeling spectrum usage [155] (table IV may be referred to see the popularity of this model).", "For further details, interested readers are referred to the survey papers [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occupancy are reviewed in detail."]} +{"204899989|6400766": ["In addition, RL can work with very large number of states when used along with function approximation [67].", "In RL, instead of explicit specification of the tr ansition probabilities, the transition probabilities can be en visioned to be accessed through a simulator that typically is restart ed from a uniformly random initial state many times [67]."]} +{"204899989|17062686": ["Indeed, there has been a lot of work in applying various economics-based approaches to wireless networkin g [40].", "Cooperative spectrum selection : [43]; Game Theory Resource allocation : see references in [40] [41]; Routing games[44] [45] [46]; Spectrum Sharing : [47] [48]; Mitigating selfish routing[49] [50] [51]; Medium Access Control (MAC) : [52]; Modeling routing: see references in [29]."]} +{"204899989|8589228": ["The key insight is to use hypothesis testing with a simulation based approach to deduce from some sample executions if the system under test satisfies the specification [132]."]} +{"204899989|15929566": ["We note here that reinforcement learning is also known by alternate monikers such as neuro-dynamic programming (NDP) [64] and adaptive (or approximate) dynamic programming (ADP) [65] [25].", "Therefore, classical DP techniques are rather ineffective at solving large-scale complex MDPs [25].", "We also discussed in section III-A that classical DP techniques are ineffective at solving large-s cale complex MDPs [25] [66]."]} +{"204899989|17109970": []} +{"204899989|2840997": ["With the preclusion of approximation techniques, this method then becomes unwieldy for large-scale problems complex problems."]} +{"204899989|1708582": []} +{"19008847|7851743": ["[9] [10].", "The reader is referred to [9] for further details on operation timescales of SON.", "While these projections promise that capacity targets of 5G are theoretically achievable, it is alarming to note that the complexity of operation, OPEX, CAPEX, and shrinking profit margins are already major challenges for operators of state-of-the-art cellular networks [9].", "A detailed review of the state-of-the-art SON functions for legacy cellular networks can be found in [9]."]} +{"28174507|206576720": ["[4] K. Zheng et al., \u201cSurvey of Large-Scale MIMO Systems,\u201d IEEE Commun.", "There have been various techniques proposed for increasing system capacity in 5G networks, such as millimeter-wave (mmWave) [2], device-to-device (D2D) communications [3], massive multiple-input multiple-output (MIMO) [4], coordinated multipoint (CoMP), three-dimensional MIMO (3D MIMO), and filter-band multicarrier (FBMC) modulation, [5, 6]."]} +{"206189574|2623404": []} +{"206189574|7851743": []} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"21053653|3330461": ["dealing with out-band D2D communication both managed by the network and autonomously controlled are surveyed in [11].", "In [11], the authors give an overview of papers addressing inband D2D in terms of spectral efficiency, energy efficiency, cellular coverage and other performance targets.", "To be more precise, with respect to [11], [12] our survey:"]} +{"21053653|7644489": ["An overview of standardization activities in 3GPP focusing specifically on ProSe enabled communication is also described in [134]."]} +{"23273785|3330461": ["Recent studies show that if nearby devices are allowed to bypass the cellular infrastructure and directly communicate in a peer-to-peer fashion, which is referred to as device-to-device (D2D) communication, many performance metrics can be improved [6].", "Recent studies [6] suggest that D2D communication can improve cellular system throughput by 374 percent, power efficiency by 100 percent, and cell edge users\u2019 performance by 300 percent, when compared to conventional startopology."]} +{"5054763|2623404": []} +{"109205070|2509135": []} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"4735659|9651858": ["Reference [28] outlined the spectrum sharing mechanism for the next generation cellular networks to overcome the"]} +{"4735659|13019489": ["Reference [25] studied the concept of dynamic spectrum sharing, and investigated various existing spectrum sharing scenarios with different network topologies, features, challenges, and probable use cases."]} +{"4735659|19938676": ["With the rapid development of broadband wireless access and mobile terminal technology, people are eager to obtain information and services from the Internet at anytime, anywhere and even in the process of moving, and the mobile Internet has been developed rapidly in such a background [2]."]} +{"4735659|12029139": ["Electromagnetic waves energy harvested by CR focused by many scholars, and there have been a number of representative studies [106], [129], [130], including hardware design and efficient energy sensing algorithms, etc."]} +{"4735659|3348390": ["As it can be seen, by the year 2020, when 33 billion devices like machine to machine (M2M), smart objects, smart grid, smart home, smartphones, PCs, tablets and wearable devices will be in use [10], [11]."]} +{"4735659|15116409": ["In order to satisfy the needs of cognitive users to detect spectrum opportunities reliably in a wide frequency range in the future, [20] summarized various wideband spectrum sensing algorithms and discusses the advantages and disadvantages of each algorithm and their challenging problems.", "In spite of the extensive literature on CR, there are few papers to discuss the available spectrum exploration issues toward 5G, while several studies separate overview the spectrum sensing [20] and spectrum access [26] in CR networks.", "Based on the compressed sensing theory, compressive spectrum sensing algorithm was presented in [20], [76], and [77], which can extract and detect the wideband signal directly to achieve efficient wideband"]} +{"4735659|8974063": ["Reference [23] presented an up-to-date survey of spectrum decision in CRNs based on spectrum characterization, spectrum selection, and CR reconfiguration."]} +{"4735659|2509135": ["In order to improve the utilization of licensed spectrum as much as possible, various multiplexing technologies such as Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Multiple-Input Multiple-Output (MIMO) techniques are used to support more users on the limited spectrum resources [32], but they cannot fundamentally solve the problem of spectrum resources scarcity caused by fixed allocation policy."]} +{"4735659|31662905": ["energy crisis, and the spectrum sharing between satellite telecommunication networks and terrestrial has been surveyed in [29], which focuses on the investigation of the feasibility of spectrum sharing between geostationary orbit and non-geostationary orbit satellite systems."]} +{"4735659|15453366": ["Many countries, including the United States and Europe, have divided 60GHz band into 5GHz \u223c 7GHz unlicensed continuous spectrum resources for general use [38]."]} +{"3584376|3555631": ["A comprehensive literature survey of this architecture can be found in our paper [8]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"19705440|7851743": ["In [6] Aliu et al."]} +{"19705440|1708582": ["RL represents the problem faced by an autonomous agent that learns a behavior through trial-error interactions with a dynamic environment [18]."]} +{"7187377|7644489": []} +{"10957762|19938676": ["This method supports user mobility and identifies the potential of mobile clouds to perform collective sensing [14].", "According to [14], massive MIMO technology would: \u2022 Improve energy efficiency by 100 times and capacity on the order of 10 and more \u2022 Be put together with the help of low-power and less costly components \u2022 Decrease latency on the air interface \u2022 Encompass a simple multiple access layer \u2022 Increase the signal strength against interference The proposed cognitive radio access server (Fig.", "IEEE Communications Magazine \u2022 November 2017 150 crnc for 5g heterogeneous networks In general, massive MIMO is an evolving technology of next generation networks, which is energy-efficient, robust, secure, and spectrum-efficient [14].", "[14] A.", "Besides the centralized and distributed spectrum sharing considerations, cognitive radio with dynamic spectrum management will enhance the network and application performance in 5G [14]."]} +{"8351022|3330461": ["For D2D communication, [118] and [119] provide comprehensive survey and tutorial on the subject."]} +{"8351022|10837932": ["The green attribute of the cellular communication refers to reduction of unnecessary power consumption and its subsequent impact on the environment in the form of CO2 emissions [6]\u2013[11]."]} +{"8351022|15694215": ["For example, in ad-hoc networks, wireless nodes spontaneously and dynamically self-organize into an arbitrary and temporary infrastructure [94] without relying on central"]} +{"13404172|14889616": ["1) PSNR: Modeling of PSNR or distortion is done in different ways such as: modeling of distortion as a continuous function of the content rate [31] and discreet values based on the number of received layers [33], and modeling PSNR as a linear/piece-wise linear nondecreasing utility function [34]."]} diff --git a/edge/graph_49728621.jsonl b/edge/graph_49728621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f031d373dbd68fd9e98aee55dcf464da8e7a49f9 --- /dev/null +++ b/edge/graph_49728621.jsonl @@ -0,0 +1,7 @@ +{"60385584|3330313": []} +{"60385584|1097238": []} +{"60385584|15273230": []} +{"60385584|192934": ["Jain, Duin and Mao (2000) include a section on classi\ufb01er combination.", "Jain, Duin and Mao (2000) list eighteen classi\ufb01er combination schemes; Witten and Frank (2000) detail four methods of combining multiple models: bagging, boosting, stacking and error-correcting output codes whilst Alpaydin (2004) covers seven methods of combining multiple learners: voting,\u2026"]} +{"5146283|18492041": ["In contrast to other categories of CQA approaches, question routing has been already described in a survey by Furlan et al. [2013]. Authors introduced a presentation paradigm that provides a detailed view on implementation of several selected approaches."]} +{"2891477|1805048": ["Categories and Subject Descriptors H.3.3 [Information Search and Retrieval]: Retrieval models\nGeneral Terms Theory, Algorithms\nKeywords Probabilistic Modelling, Group Recommendation", "Collaborative filtering (CF) [12, 28] is the mainstream approach to building web recommender systems: it is based on the assumption that, as users give ratings for items on a web site, their discovery of new items can be aided by learning from the ratings that other users have given."]} +{"16403420|15273230": ["Since the number of users in top-K(%) is much smaller than the community\u2019s general population, we use a sampling method to create a balanced data set [3].", "Since the majority of users in CQA are very inactive, we applied a sampling technique to make class balanced [3]."]} diff --git a/edge/graph_49743080.jsonl b/edge/graph_49743080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e13c3245a280c51ba52e0ef3e7d96df59d6db618 --- /dev/null +++ b/edge/graph_49743080.jsonl @@ -0,0 +1,21 @@ +{"7483204|7748652": ["For a review on verbal human-robot communication please refer to (Mavridis, 2015)."]} +{"7483204|7360895": ["According to Fong et al. (2003), one of the required characteristics of a socially interactive robot should be to perceive, learn, and recognize models of the other agents it is interacting with."]} +{"21716873|8815923": []} +{"21716873|118142": []} +{"1016835|195346070": ["Both ReID [37, 43] and tracking [23] come with a vast amount of previous work, for which we refer the interested reader to the cited surveys for a full overview."]} +{"6988770|8815923": ["For grasping [37], grasp stability of finger contacts can be learned from previous grasps on an object [45]."]} +{"3206055|17929320": ["The PDPTW and Dial-a-Ride Problem have been approached with a multitude of heuristics and metaheuristics [2, 8]."]} +{"113586479|1177069": []} +{"12998110|1932843": ["However, most of the e ort has been devoted to two areas: , as in [47, 121, 120, 164], most of the work with [ An entity satisfying the conditions can be hypothesized to be a car, a hypothesis which is subject to being withdrawn if the entity ceases to display the normative characteristics, thereby\u2026"]} +{"12998110|7813891": ["It is attracting a growing interest in AI, as revealed in the two surveys of [99, 213]."]} +{"12998110|15929566": ["Most approaches rely on learning an MDP policy, progressively improved with respect to a reward criterion [112, 205, 93]."]} +{"12998110|778117": ["Several monitoring systems, along that line, are surveyed in [169], most of which are mainly concerned with a robot sensory-motor level.", ", planning [91], monitoring [169], goal reasoning [213], recognition of actions and plans [129], architectures [127], or human\u2013aware navigation [130].", "The relationship between monitoring and planning was not a major concern for the work discussed in [169]."]} +{"12998110|1708582": ["Most approaches rely on learning an MDP policy, progressively improved with respect to a reward criterion [112, 205, 93]."]} +{"12998110|14526964": []} +{"5028978|34506027": ["Experimental results from this deployment demonstrate the effectiveness and applicability of the system."]} +{"34646215|16481413": ["The DSLrob workshop [11] puts a focus onto domain specific languages in robotics for which a survey is provided in [20]."]} +{"18212369|393948": []} +{"26612458|12998110": ["[1] provides an overview of deliberation in AI and Robotics, a key piece of enablement to demonstrate embodied machine intelligence."]} +{"8957353|6988770": ["L. M\u00f6senlechner is with the Technical University of Munich, 85748 Munich, Germany (e-mail: moesenle@cs.tum.edu)."]} +{"35558117|7360895": []} +{"8819508|16481413": []} diff --git a/graph_4975452.jsonl b/edge/graph_4975452.jsonl similarity index 100% rename from graph_4975452.jsonl rename to edge/graph_4975452.jsonl diff --git a/edge/graph_49842767.jsonl b/edge/graph_49842767.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49862415.jsonl b/edge/graph_49862415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c5baba8f144875eae8610a8c9a48d21d0b41a9a --- /dev/null +++ b/edge/graph_49862415.jsonl @@ -0,0 +1,29 @@ +{"1033682|174797842": []} +{"11581211|206764452": ["A diverse set of ideas has been explored for this problem [14, 19, 13, 5] and established benchmark datasets are available [13, 18]."]} +{"17561765|15744805": ["Zhang [26] published a survey on these methods in 1996."]} +{"1948756|393948": []} +{"31793010|17252389": ["Salient object detection methods commonly serve as the first step for a variety of computer vision applications including image and video compression [15, 20], image segmentation [10], content-aware image editing [9], object recognition [44, 48], visual tracking [2], non-photo-realist rendering [43, 16], photo synthesis [6, 14, 19], information discovery [35, 53, 8], image retrieval [18, 12, 8], etc."]} +{"879235|9045232": ["An early face detection survey [38] provides an extensive coverage on relevant methods."]} +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"19690742|1223851": ["[5] for more details on unsupervised meth-ods.", "A salient object is often de\ufb01ned as a region whose visual features differ from the rest of the image and whose shape follows some a priori criteria [5]."]} +{"19690742|393948": ["CNNs were \ufb01rst developed to perform image classi\ufb01cation [22, 4, 24, 23]."]} +{"8299268|9045232": ["[28], the reported performance measures depend on the definition of a \u201ccorrect\u201d detection result.", "Moving forward from previous comparisons [28] of approaches that focus on limited head orientations, we intend to evaluate different approaches for the most general, i."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"14710847|393948": []} +{"3408127|7271501": ["While a number of reviews on related topics have been published [21], [23]\u2013[32], to the best of our knowledge, this paper is the first overview on multirobot systems, where the robots as well as the targets move in a given environment.", "This review fills this gap and narrows the scope of [32].", "A recent and closely related review [32] covers the broad topic of target detection and tracking."]} +{"3408127|36510460": []} +{"3408127|902018": ["The use of UUVs is more difficult due to the additional challenges, including underwater transmission of signals (GPS, radio, and acoustic) and water currents affecting mobility [16]\u2013[18]."]} +{"3408127|1797913": []} +{"3408127|6607209": []} +{"3408127|6988770": ["This will enhance the maintenance, operations, and updates of mobile robot systems [24].", "Only coordination aspects of multirobot systems were covered in [23] and [24], whereas the use and benefits of a cloud infrastructure to support the operations of coordinating robots (cloud robotics) were discussed in [24]."]} +{"1078871|393948": []} +{"26517743|13151033": ["Numerous research and commercial efforts have been spent to construct large-scale knowledge graphs [Paulheim, 2017], which often require continuous expansion and refinement.", "For a thorough discussion on this matter, we refer the reader to a survey paper [Paulheim, 2017] and the citations therein.", "While such background knowledge appears random and difficult to organize, there have been extensive research and commercial efforts to encode it into machine readable forms often known as knowledge graphs [Paulheim, 2017]."]} +{"4474165|207060556": ["It has been a long history that computer vision researchers study how to learn a better representation for unconstrained faces [40,12,34].", "We refer to [40] for a more thorough survey on face detection."]} +{"206592484|456491": []} +{"2236218|15880277": []} +{"3404967|1223851": ["salient and non-salient objects [9]\u2013[11]."]} +{"206594120|207060556": ["In this part, we briefly review the three kinds of methods and refer more detailed survey to [33, 37, 35]."]} +{"206594120|9045232": ["In this part, we briefly review the three kinds of methods and refer more detailed survey to [33, 37, 35]."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"12791374|206764452": []} diff --git a/edge/graph_49863647.jsonl b/edge/graph_49863647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..801c2999931ce5b5abcf5c267a81a199c7fdbab5 --- /dev/null +++ b/edge/graph_49863647.jsonl @@ -0,0 +1,26 @@ +{"205163|11608263": ["First tutorials about MLL were published in its earlier stages [33], [208].", "3 381 Multi-label classification: An overview [208] Tsoumakas and Katakis International Journal of Data Warehousing and Mining 2007"]} +{"2073877|393948": ["Recently, deep learning based attribute models have started to gain attraction [21, 33, 10, 9], due to deep model\u2019s capacity for learning more expressive representations when large scale data is available [17, 2, 39]."]} +{"4385295|3403798": ["For instance, seeing the handle of a cup, our motor schema that is related to grasping such category of handles will be activated subconsciously even before we recognize the cup\u2019s name [13].", "The focus of [13] is to offer a structured and comprehensive affordance work report from these different fields without giving a critical analysis of existing affordance work in robotics or presenting the open issues and future directions in detail.", "\u2019s [13] survey reports on the most significant evidence of affordances from psychology and neuroscience, and reviews the related work on affordances in robotics."]} +{"4385295|1932843": ["Thus, there is no ambiguity about the action choices and environment uncertainty [108]."]} +{"4385295|7660436": ["A multirobot system is necessary in tasks such as rescue and exploration, where the robots could cooperate both passively and actively [150]."]} +{"4385295|1452734": ["Introducing biology-inspired principles is a good way to endow a robot with developmental capabilities [2].", "A truly autonomous infant robot is believed to be a key criterion in the construction of developmental robots [2]."]} +{"13856501|11608263": []} +{"3403798|8815923": ["[204] divide data-driven approaches into three groups: grasping known, familiar and unknown objects.", "Data-driven approaches [204], on the other hand, use self-generated or existing databases of grasp experiences in order to assess grasp affordances of target objects."]} +{"28503408|32001173": ["The agent needs a decision mechanism that would decide when to use a plan from the library (possibly with adaptation) or generate a new plan from scratch, similar to the techniques surveyed by Meneguzzi and DeSilva [34]."]} +{"15138051|8815923": ["Modeling and predicting grasping interactions received special attention in robotics [Bohg et al. 2013]."]} +{"4157069|206764452": ["There is a huge literature [8] on this topic."]} +{"17648373|7788290": []} +{"35022559|3403798": ["A recent survey shows that most affordance work has not addressed tool use [22]."]} +{"35022559|393948": ["Unfortunately this seems to be a problem in deep learning, which still \ufb01nds it challenging to \u2018disentangle\u2019 [7] the factors that explain the data (i.e. the tool features and their relationships in this case)."]} +{"16277140|1452734": ["[7] treats affordances as a higher level concept, which a developing cognitive agent learns about by interacting with the objects in its environment [8]."]} +{"16046725|1452734": ["The introduction of affordances to robotics follows the developmental framework, which proposes to acquire new skills on top of previous ones by experimentation and interaction with the environment [15]."]} +{"7122928|987239": ["In object retrieval and computer graphics, a number of 3D shape descriptors have been proposed [23]."]} +{"8815923|118142": ["[1], the authors divide the methodologies into analytic and empirical.", "[1] divide the data-driven methods that are based on whether they employ object features or observation of humans during grasping."]} +{"15121560|1452734": ["TABLE I LEARNING PHASES OF THE DEVELOPMENTAL APPROACH We adopt a developmental approach [18], [19], where the robot acquires skills of increasing difficulty on top of previous ones."]} +{"12916145|987239": ["Within the fields of robotics and computer vision, 3D features are mainly applied for object retrieval or recognition/classification [29], [30], [31], [32], [33]."]} +{"43648144|9316331": ["Despite its simplicity, a similar strategy has been used in Monte Carlo Tree Search with the name \u201cFlat Monte Carlo\u201d (Browne et al. 2012) with good results in computer games."]} +{"43648144|1452734": ["The concept of affordances follows the developmental robotics framework, which proposes acquiring new skills on top of old ones by experimentation and interaction with the environment (Lungarella et al. 2003)."]} +{"1618650|8815923": ["For example, it is still hard to automatically generate agent behaviors in 3D environments since the agent lacks knowledge of object and region functionalities.", "\u2026pose estimation, object recognition, action classification, and other related problem in different communities [Fritz et al. 2006; Montesano et al. 2008; Stark et al. 2008; Sun et al. 2010; Hermans et al. 2011; Goldfeder and Allen 2011; Bohg et al. 2013; Koppula and Saxena 2013; Zheng et al. 2014]."]} +{"23922825|8815923": ["One of the most popular is robotic grasping [12] [13]."]} +{"17506133|1452734": ["They follow the robotics developmental framework, which proposes acquiring new skills on top of old ones by experimentation in the environment [13]."]} +{"2352309|1805048": []} diff --git a/edge/graph_49866549.jsonl b/edge/graph_49866549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8055949825fc26db94e50fc60bf7a8693e8bda6 --- /dev/null +++ b/edge/graph_49866549.jsonl @@ -0,0 +1,8 @@ +{"29749978|9588126": ["A more detailed review of the recent results and open challenges in this topic can be found in the work of [3]."]} +{"30857404|5660618": ["tages of NCSs come from their low cost, their flexibility and easy reconfigurability, their natural reliability and robustness to failure, and their adaptation capability [1]\u2013[3]."]} +{"30857404|9072047": ["approach based on Takagi\u2013Sugeno (T\u2013S) model is well suited to model-based nonlinear systems control design [21]\u2013[25]."]} +{"30857404|9005398": ["have been reported in the existing literature [17]\u2013[20]."]} +{"63171068|5660618": ["One can refer to Lemma 1 in [17], and [16], for further details.", "Remark 5 As already said, the domination redisign formula [31] has also been extended for time-delay systems usingCLRF in [16] andCLKF in [18].", "See for instance [4, 10, 11, 16, 18, 25, 33, 41] and the references therein for Lyapunov-based approaches, [34] for a frequency approach, or [45] for a functional approach.", "in robust stabilization of nonlinear systems, these methods have also been extended in the form of control Lyapunov\u2013Razumikhin functions (CLRF) [16] and control Lyapunov\u2013Krasovskii functionals (CLKF) [17].", "Among others we mention the lacunary polynomials [16].", "When the transfer function is unknown, finite difference methods can be used to evaluate the derivative of the transfer function [16].", "ASF Average Sampling Frequency CLF Control Lyapunov Function CLKF Control Lyapunov\u2013Krasovskii Functional CLRF Control Lyapunov\u2013Razumikhin Function GUES Globally Uniformly Exponentially Stable IQC Integral Quadratic Constraints ISS Input-to-State Stability LDI Linear Difference Inclusion LKF Lyapunov\u2013Krasovskii Functional LMI Linear Matrix Inequality LQR Linear Quadratic Regulator LTI Linear-Time-Invariant (system) LUF Lower Upper Factorization MASP Maximum Allowable Sampling Period MATI Maximum Allowable Transmission Interval MPC Model Predictive Control MSI Minimum Inter-sampling Interval NCS Network Control Systems PD Proportional Derivative (controller) PDE Partial Differential Equation RR Round Robin (protocol) SISO Single Input\u2013Single Output (systems) TDS Time-Delay Systems TF-IRKA Iterative Rational Krylov Algorithm using Transfer Function Evaluation TOD Try-Once-Discard (protocol) UAV Unmanned Areal Vehicles VTOL Vertical TakeOff and Landing WN Wireless Network\nxiii", "5) is \u03c8(0, z) = \u03c80(z) for z \u2208 (0, ), and the boundary conditions are of the form [16] [ \u03c8+(t, 0) \u03c8\u2212(t, ) ] = [ \u039300 \u039301 \u0141\u039310 \u039311 ] [ \u03c8+(t, ) \u03c8\u2212(t, 0) ] + [ B+ B\u2212 ] u(t), (2.", "For instance, Sontag\u2019s [33] andFreeman\u2019s [10] formulas apply for CLKF [17], whereas the domination redesign formula [31] applies for CLRF [16]."]} +{"112904546|5660618": ["Some of these communication networks used now a days are Ethernet, FireWire, and DeviceNet [27]."]} +{"46707495|41998167": []} +{"46707495|15947359": []} diff --git a/edge/graph_49867084.jsonl b/edge/graph_49867084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bebd31b032202de210fb99a0035f818d897ab1bc --- /dev/null +++ b/edge/graph_49867084.jsonl @@ -0,0 +1,2 @@ +{"13599403|4570087": ["Person re-ID lies inbetween image classi\ufb01cation [14] and instance retrieval [19] in terms of the relationship between training and testing classes (Table 1).", "For basic knowledge and state-of-the-art advances of the inverted index in instance retrieval, we refer readers to a recent survey [19]."]} +{"13599403|3693305": ["On the other hand, when it comes to retrieval, ef\ufb01cient indexing structures [22] and hashing techniques [23] can be bene\ufb01cial for re-ID in a large gallery.", "Hashing has been an extensively studied solution to approximate nearest neighbor search, which aims to reduce the cost of \ufb01nding exact nearest neighbors when the gallery is large or distance computation is costly [23]."]} diff --git a/edge/graph_49867601.jsonl b/edge/graph_49867601.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_49868720.jsonl b/edge/graph_49868720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a89ac612db76e6c6108fd2d99ceb04180c1a471 --- /dev/null +++ b/edge/graph_49868720.jsonl @@ -0,0 +1,8 @@ +{"38617586|13985031": []} +{"11061144|191396": ["Clustering methods [9] can be grouped into different categories based on the clustering criterion."]} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"16780330|423305": []} +{"52206377|10739218": []} +{"41549364|192934": []} +{"9020564|12027976": ["For short-term FX prediction, however, the forecasting methods used so far, be they technical analysis [25], statistics or neural nets [12,17], base their predictions on quantifiable information [2,5,6,9,10, 13 ,14,23,24]."]} diff --git a/edge/graph_49869020.jsonl b/edge/graph_49869020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..def3c2d30557557b886bc0451d9dbb4a071da63b --- /dev/null +++ b/edge/graph_49869020.jsonl @@ -0,0 +1,4 @@ +{"1831618|2623404": ["[11]"]} +{"2924626|10559330": ["Many approaches to achieve some of these goals have been previously proposed including active networking [45], IntServ networking [7], and distributed reservation protocols such as RSVP [8] and NSIS [33]."]} +{"3493586|2623404": ["Although all these solutions adequately and automatically reconfigure the edge network, the static and manually configured core of the network remains the same [15].", "In SDN, research is gaining momentum to secure both the control and data plane [15]."]} +{"1326816|2387055": ["SDNs enable this intelligence to be written in software, as network applications, us\u00ading \nopen APIs that better facilitate agile development and perhaps faster network innovations.", "Several recent studies have investigated security issues in SDNs [19, \n33, 32].", "Several recent studies have investigated security issues in SDNs [19, 33, 32].", "[32] survey possible SDN security issues."]} diff --git a/graph_4987113.jsonl b/edge/graph_4987113.jsonl similarity index 100% rename from graph_4987113.jsonl rename to edge/graph_4987113.jsonl diff --git a/graph_4990463.jsonl b/edge/graph_4990463.jsonl similarity index 100% rename from graph_4990463.jsonl rename to edge/graph_4990463.jsonl diff --git a/edge/graph_49908818.jsonl b/edge/graph_49908818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d68ddfd29fff3ad840d49e6a0c71f0486144c8d2 --- /dev/null +++ b/edge/graph_49908818.jsonl @@ -0,0 +1,22 @@ +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"3879949|41505326": ["Applying CNNs on videos is challenging because traditional CNNs are designed to represent two dimensional pure spatial signals but in videos a new temporal axis is added which is essentially different from the spatial variations in images [256, 264]."]} +{"3879949|16082889": []} +{"3879949|6627566": ["Building a hierarchy of classifiers is a common strategy for image classification with a large number of classes [93]."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"1033682|174797842": []} +{"5240721|8815923": ["This makes the problem of grasping significantly more challenging (Bohg et al., 2014), as the algorithm must use more limited and potentially noisier information to detect a good grasp."]} +{"5240721|118142": ["[53], Bicchi and Kumar [2] and Shimoga [58]."]} +{"3397190|10137425": ["We also expect to see more research on multimodal learning [190] as, in the real world, language is often grounded on (or correlated with) other signals."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"206592484|456491": []} diff --git a/graph_4992423.jsonl b/edge/graph_4992423.jsonl similarity index 100% rename from graph_4992423.jsonl rename to edge/graph_4992423.jsonl diff --git a/graph_499315.jsonl b/edge/graph_499315.jsonl similarity index 100% rename from graph_499315.jsonl rename to edge/graph_499315.jsonl diff --git a/graph_4999235.jsonl b/edge/graph_4999235.jsonl similarity index 100% rename from graph_4999235.jsonl rename to edge/graph_4999235.jsonl diff --git a/graph_5002530.jsonl b/edge/graph_5002530.jsonl similarity index 100% rename from graph_5002530.jsonl rename to edge/graph_5002530.jsonl diff --git a/graph_50041.jsonl b/edge/graph_50041.jsonl similarity index 100% rename from graph_50041.jsonl rename to edge/graph_50041.jsonl diff --git a/edge/graph_5006064.jsonl b/edge/graph_5006064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_50127559.jsonl b/edge/graph_50127559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_50134395.jsonl b/edge/graph_50134395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6364a511f85bb249795aa1010bd72cac6eca3306 --- /dev/null +++ b/edge/graph_50134395.jsonl @@ -0,0 +1,12 @@ +{"1168653|1708582": ["Compared to Markov decision process (MDP) and more sophisticated partially observable Markov decision process (POMDP) in the area of reinforcement learning, Q-learning is simpler [9], [10].", "Q-learning [9], [10] is one of the algorithms in the reinforcement learning family of machine learning."]} +{"1168653|12601073": ["Moreover, cooperative spectrum sensing among secondary users have been put forward and introduced in [3], [4], [2], [5] to solve the hidden terminal problem [6], [7] and to improve the performance of spectrum sensing."]} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"61986233|12452682": ["Dynamic spectrum access is proposed to resolve the challenge of insufficient spectrum utilization [2]\u2013[5]."]} +{"15102667|562855": ["Brief descriptions of organizational paradigms other than coalition of agents are presented in [9].", "Many organizational paradigms have been distinguished in the context of MAS (see [9])."]} +{"6101|7839197": []} +{"12187956|141053": []} +{"207641390|141053": ["Aside from local bargaining and game-theoretical approaches, some authors suggest that the spectrum sharing problems are similar to MAC issues [23], where several users try to access the same channel and their access should be coordinated with the neighboring users to avoid interferences."]} +{"8034286|8909218": []} diff --git a/graph_5014509.jsonl b/edge/graph_5014509.jsonl similarity index 100% rename from graph_5014509.jsonl rename to edge/graph_5014509.jsonl diff --git a/graph_5014732.jsonl b/edge/graph_5014732.jsonl similarity index 100% rename from graph_5014732.jsonl rename to edge/graph_5014732.jsonl diff --git a/graph_5019792.jsonl b/edge/graph_5019792.jsonl similarity index 100% rename from graph_5019792.jsonl rename to edge/graph_5019792.jsonl diff --git a/graph_5022650.jsonl b/edge/graph_5022650.jsonl similarity index 100% rename from graph_5022650.jsonl rename to edge/graph_5022650.jsonl diff --git a/graph_5026162.jsonl b/edge/graph_5026162.jsonl similarity index 100% rename from graph_5026162.jsonl rename to edge/graph_5026162.jsonl diff --git a/graph_5032773.jsonl b/edge/graph_5032773.jsonl similarity index 100% rename from graph_5032773.jsonl rename to edge/graph_5032773.jsonl diff --git a/graph_5035162.jsonl b/edge/graph_5035162.jsonl similarity index 100% rename from graph_5035162.jsonl rename to edge/graph_5035162.jsonl diff --git a/graph_5039465.jsonl b/edge/graph_5039465.jsonl similarity index 100% rename from graph_5039465.jsonl rename to edge/graph_5039465.jsonl diff --git a/graph_5039874.jsonl b/edge/graph_5039874.jsonl similarity index 100% rename from graph_5039874.jsonl rename to edge/graph_5039874.jsonl diff --git a/graph_5040728.jsonl b/edge/graph_5040728.jsonl similarity index 100% rename from graph_5040728.jsonl rename to edge/graph_5040728.jsonl diff --git a/edge/graph_50458504.jsonl b/edge/graph_50458504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bbbac001c66dc348acf398ebeb9441d86f80045 --- /dev/null +++ b/edge/graph_50458504.jsonl @@ -0,0 +1,4 @@ +{"13552398|7439310": []} +{"17030953|18782652": []} +{"15100363|3102110": []} +{"758376|3102110": ["Data mining has been recently extended from the traditional structured data mining to the unstructured one, including time-series, text, and Web."]} diff --git a/graph_505040.jsonl b/edge/graph_505040.jsonl similarity index 100% rename from graph_505040.jsonl rename to edge/graph_505040.jsonl diff --git a/graph_5054489.jsonl b/edge/graph_5054489.jsonl similarity index 100% rename from graph_5054489.jsonl rename to edge/graph_5054489.jsonl diff --git a/graph_5058720.jsonl b/edge/graph_5058720.jsonl similarity index 100% rename from graph_5058720.jsonl rename to edge/graph_5058720.jsonl diff --git a/graph_5058972.jsonl b/edge/graph_5058972.jsonl similarity index 100% rename from graph_5058972.jsonl rename to edge/graph_5058972.jsonl diff --git a/graph_5062487.jsonl b/edge/graph_5062487.jsonl similarity index 100% rename from graph_5062487.jsonl rename to edge/graph_5062487.jsonl diff --git a/graph_5066145.jsonl b/edge/graph_5066145.jsonl similarity index 100% rename from graph_5066145.jsonl rename to edge/graph_5066145.jsonl diff --git a/graph_5071698.jsonl b/edge/graph_5071698.jsonl similarity index 100% rename from graph_5071698.jsonl rename to edge/graph_5071698.jsonl diff --git a/graph_5071932.jsonl b/edge/graph_5071932.jsonl similarity index 100% rename from graph_5071932.jsonl rename to edge/graph_5071932.jsonl diff --git a/graph_507307.jsonl b/edge/graph_507307.jsonl similarity index 100% rename from graph_507307.jsonl rename to edge/graph_507307.jsonl diff --git a/edge/graph_50769150.jsonl b/edge/graph_50769150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13dfc2f2657aa7e81a6665de55367e1a3970402d --- /dev/null +++ b/edge/graph_50769150.jsonl @@ -0,0 +1,9 @@ +{"15358274|289357": ["As we all know, BPP and QAP both are NP-hard problem [14, 15], so we attempt to minimize network communication traffic, the less traffic in the network, the fewer the number of the active network elements."]} +{"16809905|2623404": ["In this work, to avoid delay communication between routers and the centralized controller, we consider the default rule which is just to forward packets to a default port (without contacting the controller), and each switch has exactly one default port [28]."]} +{"16809905|10837932": ["Therefore the green networking has been attracting a growing attention during the last years (see the survey [2]).", "Starting from the pioneering work of Gupta [10], the idea of power proportionality has gained a growing attention in networking research area [2][6]."]} +{"381326|8450611": ["One method \nfor coping with these limi\u00adtations is to use compression schemes to reduce the number of TCAM rules required \nto represent a classi.er."]} +{"13739988|10837932": ["Comprehensive surveys of a number activities for minimizing energy consumption in networks are recently published in [11] and [35]."]} +{"18141241|15209496": ["A detailed list of the 172 resulting articles can be found in [48].", "As identified in [48], there is no existing testbed problem instances for the VMP that can today be used as a world accepted benchmark.", "A detailed list of the 84 resulting articles can be found in [48]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} diff --git a/graph_5077013.jsonl b/edge/graph_5077013.jsonl similarity index 100% rename from graph_5077013.jsonl rename to edge/graph_5077013.jsonl diff --git a/edge/graph_50776107.jsonl b/edge/graph_50776107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0df65d683d266507bb113badaeefacbbfe2ea4f --- /dev/null +++ b/edge/graph_50776107.jsonl @@ -0,0 +1,35 @@ +{"43459596|1040047": []} +{"43459596|41104565": []} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"15270438|86629084": []} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"46402349|20905429": ["In health care, sensory data from wearable as well as smartphone sensors is used to generate recommendations, monitor physical health activities, generate real-time alerts, and motivate the users for a quick and on time preparation[5]."]} +{"32169740|21386749": ["1, the survey on the medical applications of IoT is classified into two categories such as services and applications[5]."]} +{"205823407|11762115": []} +{"3419623|4427557": ["In [11], the LPWA standards and proprietary LPWA technologies, as well as the challenges and", ", LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "For LPWA networks, most\nof the existing solutions, e.g., LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "The Table also lists the applications (provided in [11] and [89]) that can be supported by each technology."]} +{"3419623|19636511": ["The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14].", "Weightless-N, Weightless-P, and Amber Wireless as mentioned in [14]."]} +{"3419623|25929315": ["M2M communication RA is limited, and the large number of simultaneous network access attempts may result in high collision rate [13].", "The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14]."]} +{"21697461|16762549": ["Smart Home/City Real-time crowd control [69] [70], realtime irregularity detection of senior citizens [71] [72] Number of smartphones and surveillance cameras."]} +{"21697461|6664074": []} +{"21697461|5385031": ["[27] surveyed a wide range of economic and pric-"]} +{"21697461|21386749": ["[24] provided the state-of-the-art network architecture, applications, and industrial trends in IoT-based healthcare services."]} +{"21697461|7329149": []} +{"12318240|7988320": []} +{"2275283|16214623": ["The main challenge in designing standards for WBANs is the balance of QoS demands with the low power constraints of limited battery powered nodes [30]."]} +{"2275283|7988320": []} +{"2275283|2295142": ["Results shows that the proposed scheme has a higher node energy efficiency, lower average delay and control overhead than other similar protocols as explained in [78].", "Furthermore, the authors in [78] gave a more detailed survey of multipath efficient routing in wireless sensor networks."]} +{"2275283|7854020": ["Similarly [69] presented a brief overview of the new IEEE 802."]} +{"26985018|16514036": ["Chen et al.(2) presented the difference between a wireless sensor network and BAN in terms of mobility, data rate, latency, node density, power supply, network topology, node replacement, security level, etc."]} +{"207016868|191396": []} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"29859741|86629084": ["Previous reviews have addressed the thematic of healthcare related to wireless sensor networks [10] and body area networks [11], the Internet of Things [12], ubiquitous and pervasive computing [13] and mobile computing [14]."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} diff --git a/graph_508178.jsonl b/edge/graph_508178.jsonl similarity index 100% rename from graph_508178.jsonl rename to edge/graph_508178.jsonl diff --git a/graph_5084674.jsonl b/edge/graph_5084674.jsonl similarity index 100% rename from graph_5084674.jsonl rename to edge/graph_5084674.jsonl diff --git a/graph_5087831.jsonl b/edge/graph_5087831.jsonl similarity index 100% rename from graph_5087831.jsonl rename to edge/graph_5087831.jsonl diff --git a/edge/graph_508912.jsonl b/edge/graph_508912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5108469.jsonl b/edge/graph_5108469.jsonl similarity index 100% rename from graph_5108469.jsonl rename to edge/graph_5108469.jsonl diff --git a/graph_5122855.jsonl b/edge/graph_5122855.jsonl similarity index 100% rename from graph_5122855.jsonl rename to edge/graph_5122855.jsonl diff --git a/graph_512386.jsonl b/edge/graph_512386.jsonl similarity index 100% rename from graph_512386.jsonl rename to edge/graph_512386.jsonl diff --git a/graph_512561.jsonl b/edge/graph_512561.jsonl similarity index 100% rename from graph_512561.jsonl rename to edge/graph_512561.jsonl diff --git a/edge/graph_513106.jsonl b/edge/graph_513106.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_51338.jsonl b/edge/graph_51338.jsonl similarity index 100% rename from graph_51338.jsonl rename to edge/graph_51338.jsonl diff --git a/edge/graph_51603924.jsonl b/edge/graph_51603924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51605426.jsonl b/edge/graph_51605426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f01d26849ed4847a9794008b368d7d205eaec7c5 --- /dev/null +++ b/edge/graph_51605426.jsonl @@ -0,0 +1,4 @@ +{"17644562|469744": ["Keywords: Augmented Reality, Maintenance operations"]} +{"3329660|6746689": ["Second, we obtain the skeleton of the road networks by performing a thinning operation based on the algorithm proposed in [9], as depicted in Figure 3(c)."]} +{"33902671|469744": []} +{"14910557|206986719": ["It is augmented reality (AR) [1] that is a preferential option because of its particular attributes including real-time interaction, fusion of virtual model and real image, and 3D registration."]} diff --git a/edge/graph_51608728.jsonl b/edge/graph_51608728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfefd632946a0a49dabcb8b0fd2de6190c6c88d5 --- /dev/null +++ b/edge/graph_51608728.jsonl @@ -0,0 +1,14 @@ +{"52829064|18440098": ["Vision-based Arabic sign language (ArSL) recognition [1]"]} +{"27003849|18440098": ["Vision-based approaches allow for up to 95% correct recognition of sign language gestures [1], [10]."]} +{"18933313|18440098": ["Ong and Ranganath [2] discussed some of the important issues related to automatic recognition of SL, rendered with both manual and NMS.", "These are important signs (called classifiers) used in, for example, telling a story or to refer to a person, object or place which is available or absent from signing space [2].", "1 [7, 8], which feeds 978-1-4244-4698-8/09/$25.00 \u00a92009 IEEE 24th International Conference Image and Vision Computing New Zealand (IVCNZ 2009) these measurements in real time to a processing unit [2, 5].", "Although many researchers work on the recognition of facial expressions and head movement classification, very few have focussed on the integration of NMS with existing sign language interpreting systems [2]."]} +{"1806892|7185733": []} +{"31278518|192934": ["In the classification mode, the trained classifier assigns the input pattern to one of the pattern classes under consideration based on the measured features [8]."]} +{"25607567|7185733": []} +{"12424700|18440098": []} +{"15520188|207060556": ["There have been several advances in the past few years in terms of face detection [4] and tracking [5], feature extraction mechanisms, and the techniques used for expression classification."]} +{"15520188|2301292": ["There are methods working with either 2-D images or depth images captured with devices like Kinect [8].", "D images or depth images captured with devices like Kinect [8].", "Kinect-enabled homebased rehabilitation system using dynamic time warping and fuzzy logic.", "Hand gestures can be recorded with devices as different as depth cameras [9] (e.g., Kinect) or special gloves [10], equipped with sensors of different\n1551-3203 \u00a9 2016 IEEE."]} +{"15099054|7185733": ["Sign language is the primary communication way for hearing-impaired people."]} +{"24212764|18440098": []} +{"3080437|18440098": ["The reader is referred to [89], [90] for a detailed description of methods for data clas-", "ferred to [89] and [90] for a detailed comparison."]} +{"7021758|7185733": []} +{"63919136|15757638": []} diff --git a/edge/graph_51613885.jsonl b/edge/graph_51613885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7e6641dee8de5d197ea519fd7257c4fad292668 --- /dev/null +++ b/edge/graph_51613885.jsonl @@ -0,0 +1,43 @@ +{"12058719|14441987": []} +{"14681173|206584087": ["While there have been plenty of detection and mitigation mechanisms for DDoS [4], they become obsolete due to the recent shift of the attacked targets, from directly attacking a specific target to indirect attack (e.g., [5] [6])."]} +{"26844665|17205659": []} +{"28952352|2294541": ["Bad-mouthing and ballot-stuffing attacks are the most common forms of reputation attacks [30]."]} +{"13871210|21386749": ["Related Works As mentioned in the introduction, IoT is revolutionizing the overall medical system by introducing novel instruments and methodologies for deploying innovative and healthcare services [7]-[11],[33]."]} +{"15937801|8006086": ["\u2026concepts and measures that are not dealt by other standard routing protocols in wireless networks, such as AODV, OLSR, DYMO, DSR, etc. Studies [15][17] showed that they are not well suited for LoWPAN networks as they consume more energy, they do not handle failure cases to establish a connection\u2026"]} +{"11264897|595093": []} +{"11264897|121289": ["cooperation, and two-way communications among the many interconnected elements of the smart grid [17]."]} +{"5933709|5660618": ["Several extensions to this formulation have been proposed by various researchers [15].", "Such problems are studied in robust networked control systems [28, 15]."]} +{"14177017|1230643": ["In a typical application scenario, nodes are provided with a local power source which is usually limited and non-replaceable; thus, power consumption requirements represent the utmost constraint for most WSN nodes (Akyildiz et al., 2002)."]} +{"16389300|2623404": []} +{"42796271|2457428": ["An action of this type may be carried out at regular intervals to safeguard key secrecy, and to maintain resilience to attacks and failures, for instance [25,26]."]} +{"32946782|3348390": []} +{"32946782|1113420": []} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"1845983|16209841": []} +{"15659301|2387055": []} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"20100319|16153186": []} +{"20100319|8690743": []} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} +{"35973705|1230643": []} +{"12591542|7329149": ["2510504 energy generated by individuals; and 4) building the framework necessary for the use of electrical vehicles [4]\u2013[6]."]} +{"12591542|1598350": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"27932986|206584087": ["If there is no ACK packet sent within a specific period of time, the connection will timeout and therefore releasing the allocated resources [5, 8, 9].", "This will prevent new requests, including legitimate client requests, from being further processed by the server [5, 8, 9]."]} +{"3500624|2906773": []} +{"3500624|18037424": []} +{"10563322|2357830": []} +{"10563322|1230643": []} +{"8871801|2387055": []} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"11668209|6327434": ["For more details on the choice of window size, please refer to [8].", "In [8], the author reviews several failure detection algorithm in dynamic systems."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"45011365|1230643": []} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"37874408|1207973": []} diff --git a/edge/graph_51615396.jsonl b/edge/graph_51615396.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bda0fe3d20d45c5ed0309cd66a8b5bc52cd0d1e8 --- /dev/null +++ b/edge/graph_51615396.jsonl @@ -0,0 +1,7 @@ +{"49275471|10235514": ["The key technical requirements and performance indicators for the uses cases have been defined and approved [1].", "Following the 2020 deployment timeframe, 3GPP\u2019s 5G standards are expected to be finalized with Release 15 (Phase 1) and Release 16 (Phase 2) by September 2018 and late 2019, respectively [1, 2].", "The 5G networks (also known as IMT-2020) are anticipated to support three broad categories of use cases: enhanced mobile broadband (eMBB), ultra-reliable and low-latency communications (URLLC), and massive machine type communications (mMTC) [1]."]} +{"30427741|40725508": []} +{"12668824|270804": []} +{"12668824|1236072": ["Recently IEEE 802.11a was selected by American Society for Testing and Material (ASTM) to be the fundamental for its standards of Dedicated Short Range Communication and IEEE 1609 group proposed DSRC [16] as IEEE 802.11p standard [12]."]} +{"4805607|2835258": ["Each OBU attempts to forward its packets to the nearest RSU adopting a greedy forwarding (GF) routing algorithm [39,41]."]} +{"206897318|2835258": ["Each SV attempts to forward its packets to the nearst RSU adopting the well known greedy forwarding (GF) routing lgorithm [47,57] ."]} +{"23555100|2758659": ["For a complete review of the current status of the art in this area please refer to [4], [5];"]} diff --git a/edge/graph_51620723.jsonl b/edge/graph_51620723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..580fd65f3c1c8fa8a2a9867fb0346eab6505ab23 --- /dev/null +++ b/edge/graph_51620723.jsonl @@ -0,0 +1,4 @@ +{"1243387|9431428": []} +{"1243387|14866098": []} +{"1243387|16362395": []} +{"10817088|2670121": ["Generative probabilistic graphical models such as hidden Markov models [72], [70], [73], [74] and dynamic Bayesian networks [64], [48] have been used to model activity sequences and to smooth recognition results of an ensemble classifier [75]."]} diff --git a/edge/graph_51624255.jsonl b/edge/graph_51624255.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51625971.jsonl b/edge/graph_51625971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51681559.jsonl b/edge/graph_51681559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25885c52667980c794b92ad0f5c699b84af509bc --- /dev/null +++ b/edge/graph_51681559.jsonl @@ -0,0 +1,6 @@ +{"20464903|875676": ["Even at these early stages work has started to appear aiming to define or possibly start the debate about defining 5G possible structure and services [1][2][3][4][5].", "In 5G standard explorations [1][2][3][4][5], non-orthogonal concepts are commonly mentioned as potential candidates for the air interface."]} +{"51695743|51681559": ["A survey of SEFDM work and research is reported in CSNDSP 2018 conference [4]."]} +{"50789313|206488441": []} +{"124483127|17966235": ["Most of the current publications consider the 28, 38 and 60 GHz bands as well as the E-band (71-76 GHz and 81-86GHz) [2-4]."]} +{"14188265|11720829": ["In addition, stimulated by relevant research results in Multiple-Input Multiple-Output (MIMO) systems area [5], [6], and [7], we introduce and evaluate a combined MMSE ML scheme."]} +{"13823471|3494096": ["was first supported in 3GPP release 13 and it is foreseen in [11] that NB-IoT will be one of the technologies in 5G"]} diff --git a/edge/graph_51688862.jsonl b/edge/graph_51688862.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51f07765b0e57696d6b9ebd4271ff0904d43e6cd --- /dev/null +++ b/edge/graph_51688862.jsonl @@ -0,0 +1 @@ +{"18501544|14382980": []} diff --git a/edge/graph_51691454.jsonl b/edge/graph_51691454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1ce4d04239f12503ec500a6e207a8fb00aefd54 --- /dev/null +++ b/edge/graph_51691454.jsonl @@ -0,0 +1,7 @@ +{"16352445|60455": ["Other research communities such as database, machine learning and information retrieval, are also addressing the above mentioned difficulties."]} +{"62050274|60455": []} +{"20600175|17612458": ["The nature of the environment itself imposes some disadvantages: Internet is a network of worldwide level, constantly changing and non-structured [1]."]} +{"16372095|18526204": []} +{"16372095|60455": []} +{"46493936|60455": ["Web Mining is divided into three categories: Web Content mining, Web Structure Mining and Web Usage Mining [2].", "Web mining is categorized into three areas of interest: Web Content Mining, Web Structure Mining and Web Usage Mining [2]."]} +{"515712|60455": ["Experimentation results are provided in Section 3 and some conclusions are provided towards the end.", "Based on several reserch studies we can broadly classify Web mining into three domains: content , structure and usage mining [8][9]."]} diff --git a/edge/graph_51699252.jsonl b/edge/graph_51699252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a4abff3c7d2e887ea6f0d1e12182013842e96b2 --- /dev/null +++ b/edge/graph_51699252.jsonl @@ -0,0 +1,8 @@ +{"10361983|17772052": ["An excellent overview of the E-nose and techniques for processing the sensor responses can be referred to as [32], [33]."]} +{"43364508|14933256": []} +{"20967726|17772052": ["Correlation coefficients between the PCR predictions and the original human panel evaluations are summarized in Table I.", "3) PCR and PLS With Combined Lonestar FAIMS and ppbRAE Data: In a final step, we analyzed the relationship between total VOC measurements from the ppbRAE and human odor assessments.", "PCR can avoid collinearity problem, but its performance may be limited if odor quality does not correlate with the directions of largest variance.", "In an effort to improve the accuracy of the predictive models, we combined the Lonestar\u2019s best performing datasets (best PCR case and best PLS case in Table I) and the ppbRAE dataset.", "1) PCR With Lonestar FAIMS Data: Fig.", "1) Preprocessing: A number of preprocessing methods were explored, including drift compensation, Gaussian filter, gradient filter, and normalization [28].", "After eliminating 17 out of 20 PCs, three versions of the PCR regression model were generated using three different sets of independent variables: (1) the first three PCs (PC 1, 2, 3); (2) the two highest correlated PCs (PC 1, 2); and (3) the highest correlated PC (PC 1).", "3) Regression Models: We evaluate two linear regression techniques to predict odor quality (intensity, irritation, and pleasantness) from sensor responses: principal components regression (PCR) [28] and partial least squares (PLS) regression [30].", "We took PC1, PC2 and ppbRAE, applied K -fold cross-validation, built the PCR models on training data and used them on test data.", "More importantly, the PLS models outperform the PCR models \u2013see Table I, which indicates that information is lost by only considering the three largest directions of variance in the data.", "PCR uses the principal components of the data as regression independent variables."]} +{"2016155|14933256": []} +{"2016155|189201": []} +{"138968674|13187484": []} +{"138968674|15589021": []} +{"138968674|11407374": []} diff --git a/edge/graph_51708845.jsonl b/edge/graph_51708845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5171123.jsonl b/edge/graph_5171123.jsonl similarity index 100% rename from graph_5171123.jsonl rename to edge/graph_5171123.jsonl diff --git a/edge/graph_51716069.jsonl b/edge/graph_51716069.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51718078.jsonl b/edge/graph_51718078.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51720427.jsonl b/edge/graph_51720427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c099d6b336efdda1949a679340e6f5bab625116 --- /dev/null +++ b/edge/graph_51720427.jsonl @@ -0,0 +1,3 @@ +{"3568397|4269723": ["At first, it enables the management capabilities and the dynamic network resource allocation required by a fifth-generation (5G) vehicular communication framework [10].", "As discussed in Section 2, this approach is largely adopted in the research domain on SDN, where decoupling the network functionalities from the RAT in use enables high system programmability, and abstracts the network infrastructure from services [10]."]} +{"52166347|17934515": ["made a detailed survey on platoon-based vehicular CPS and summarized issues about vehicular networking, traffic dynamics, and coupled mode, but vehicular formulations with high dimensions are not included [16]."]} +{"52126821|4787452": ["DSRC-related MAC protocols are covered in great detail in [34] and [35], covering both weaknesses of current standards and potential alternative schemes.", "For example, the use of TDMA-based MAC protocols shows significant improvement over the relatively low performance of contention-based CSMA/CA conditions [35]."]} diff --git a/edge/graph_51720727.jsonl b/edge/graph_51720727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2f434697e5f2939493f4ddf180dec3a691a897e --- /dev/null +++ b/edge/graph_51720727.jsonl @@ -0,0 +1,10 @@ +{"31634947|6777457": ["Note that the trace of a partial density operator denotes the probability that the corresponding (normalised) quantum state is reached [28]."]} +{"18913620|6777457": ["Several techniques for verifying quantum programs have already been developed in the last 10 years [15, 22]."]} +{"60351710|6777457": []} +{"29389873|6777457": ["For a detailed survey, see [Gay 2006; Seinger 2004a; Ying 2016]."]} +{"6591232|17300331": []} +{"15579595|6777457": ["Introduction Quantum Programming: Research on quantum programming has already been conducted for two decades, as surveyed in [18, 42, 50]."]} +{"44673744|466040": []} +{"44673744|6777457": ["CQP is based on the \u03c0-calculus [Milner 1999; Milner et al. 1992] with primitives for quantum information inspired by Selinger\u2019s QPL [Selinger 2004a]."]} +{"416960|6777457": ["The notion of partial density operator allows us to \nfollow Selinger s normalization convention ([Selinger 2004b], Convention 3.3), which is very convenient \nin the presentation of the semantics of quantum programs.", "Thus, the denotational semantics given in this section is consistent with Selinger \ns idea [Selinger 2004b] of modeling quantum programs as super-operators.", "\u2026treating an observation (quan\u00adtum measurement) procedure as a probabilistic \nchoice; a denotational semantics was de.ned for Selinger s language, QPL [Selinger 2004b] by interpreting \nquantum pro\u00adgrams as super-operators; and the denotational semantics of Altenkirch and Grattage s language, \nQML\u2026", "2007]; [Selinger 2004b]; [Ying et al. 2010].", "(Sm,.m) However, \nwe adopt Selinger s suggestion [Selinger 2004b] of encoding both probability pm and density operator \n.m into the partial density operator Mm."]} +{"44073181|17300331": []} diff --git a/edge/graph_51724589.jsonl b/edge/graph_51724589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27b51ff6e6df268cfb9fab1153f568ad7f954245 --- /dev/null +++ b/edge/graph_51724589.jsonl @@ -0,0 +1,10 @@ +{"207319038|8310135": []} +{"1503157|2762484": ["In the next years, the lowering cost of WST will provide the opportunity to track and trace not only large and expensive products, but small and cheap ones, creating a new generation of intelligence products [92]."]} +{"1503157|6275330": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "strain-gage, and various piezo and capacitive transducers for proximity, position, velocity, acceleration and vibration measurements [20]; and according to several research works, connecting wires to these devices can be more problematic than doing it by means of wireless designs [21,22]."]} +{"1503157|1230643": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "A WSN is a system comprised of radio frequency (RF) transceivers, sensors, microcontrollers and power sources [10].", "A general WSN protocol consists of the application layer, transport layer, network layer, data link layer, physical layer, power management plane, mobility management plane and the task management plane [10].", "Normally, these sensor nodes consist of three components: sensing, processing and communicating [10].", "Sensor networks are used for a variety of applications, including wireless data acquisition, machine monitoring and maintenance, smart buildings and highways, environmental monitoring, site security, automated on-site tracking of expensive materials, safety management, and in many other areas [10].", "02 dB/km for a rain rate of 150 mm/hr [10]."]} +{"8053067|7842253": ["Zhan et al. (2015) proposed several research directions for cloud resource scheduling, including real-time, adaptive dynamic, large-scale, multi-objective, and distributed and parallel scheduling.", "\u2026for resources in different aspects of adaptive dynamic, large-scale, multi-objective and distributed and parallel capabilities for optimized activation and cost saving, especially for disruptive stream data and applications (Tang et al. 2015; Zhang, Chen, and Yang 2015; Zhan et al. 2015); and ."]} +{"8053067|2398835": ["Finally, ensuring data consistency and integrity is challenging with Big Data especially when the data change frequently and are shared with multiple collaborators (Khan et al. 2014).", "These privacy issues expose a gap between the convention policies/regulations and Big Data and call for new policies to address comprehensively privacy concerns (Khan et al. 2014; Eisenstein 2015).", "However, analyzing Big Data challenges the complexity and scalability of the underlying algorithms (Khan et al. 2014)."]} +{"11559726|1077083": []} +{"11559726|1113420": []} +{"206720062|562065": ["flow is continuously monitored [34]\u2013[36]."]} +{"204984597|8186802": ["Brown and Sreenan [37] studied the different techniques for software updating in WSNs, and the possible problems affecting the reliability of code transfer mechanism."]} diff --git a/edge/graph_51732913.jsonl b/edge/graph_51732913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51733821.jsonl b/edge/graph_51733821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51740777.jsonl b/edge/graph_51740777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5174283.jsonl b/edge/graph_5174283.jsonl similarity index 100% rename from graph_5174283.jsonl rename to edge/graph_5174283.jsonl diff --git a/edge/graph_51743013.jsonl b/edge/graph_51743013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51762817.jsonl b/edge/graph_51762817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd13ddbc04159b9cbfb39fa1b513d561f5b2c071 --- /dev/null +++ b/edge/graph_51762817.jsonl @@ -0,0 +1,2 @@ +{"41558348|16866891": []} +{"14376593|6430931": ["Other commonly used combinations include precision and recall, or sensitivity and specificity[ 23 ]."]} diff --git a/edge/graph_51768512.jsonl b/edge/graph_51768512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..113f6ae41311557527bc3c153ee61f6a929f8e5b --- /dev/null +++ b/edge/graph_51768512.jsonl @@ -0,0 +1,16 @@ +{"90251508|427994": ["Furthermore, Lausch et al. (2016, 2017) have presented comprehensive reviews of remote sensing methods used to assess forest health that cover various types of damage, including insect damage, drought, invasive species, air pollution, and land-use changes."]} +{"15135212|25699143": ["In this \ufb01 eld, stereomatching was investigated as early as the mid-1970s (Marr and Poggio, 1976) and developments continued in the 1980s mainly for terrestrial applications (Baker and Binford, 1981; Marr, 1982; Ohta and Kanade, 1985; Dhond and Aggarwal, 1989)."]} +{"6371610|28771682": ["A whiskbroom sensor collects a single column of the datacube at one time [11].", "slice of the datacube each time it is used [11].", "A snapshot sensor collects an entire datacube at one time without scanning [11].", "current snapshot sensors is the limited number of pixels available in detector arrays [11]."]} +{"8665024|11112426": ["According to Bioucas-Dias [54] spectral unmixing (see, for example, [74,75]) purpose is to restore the ability of ascertain materials, i."]} +{"117764485|28771682": ["If all bands are simultaneously captured, i.e. within the same exposure and thus, the full image cube is recorded without a scanning process, the cameras are referred to as snapshot cameras (Hagen, 2012)."]} +{"8985853|206051485": ["Most of these are culminated and used in by Mohr [37], Brown [4], and Flusser and Zitova [5]."]} +{"130486327|25699143": ["In the vision community, two-frame stereo-correspondence algorithms are predominantly used (Dhond and Aggarwal, 1989; Brown, 1992; Scharstein and Szeliski, 2002), producing a dense disparity map consisting of a parallax estimate at each pixel."]} +{"23410368|28771682": ["moving platform and collects a vertical slice of the data cube at one time [10].", "A snapshot imager collects an entire data cube at one time without scanning [10].", "There are three challenges in lightweight whiskbroom hyperspectral imagers: 1) shorter exposure time is needed for high spatial resolution because a whiskbroom sensor collects only a single column of the data cube at one time [10]; 2) a high-speed attitude and position sensor is needed for geographical registration, especially when the attitude of the platform is unstable; and 3) in general, whiskbroom sensors are large and heavy due to the complicated mechanical equipment for scanning."]} +{"9291626|206051485": ["In that case, more sophisticated methods like automatic feature detection based image-to-image registration algorithms should be considered [46,47]."]} +{"123741288|8985853": []} +{"123741288|206051485": []} +{"19313599|8569776": ["For instance, reflectance in the optical domain has been used to retrieve plants biochemical and biophysical properties, with high potential for the assessment of leaf pigments, like chlorophylls, and leaf area index, amongst other traits of great importance in the evaluation of plant health and of its response to stress conditions [4,5]."]} +{"19313599|1055296": ["In some cases, even simple linear transfer functions could be used to combine outputs of different sensors, like proposed eventually to integrate data from different satellite systems [13,15], provided that the function itself (i."]} +{"126051042|8985853": ["Image registration is a technique to transform a target image into a reference image frame or a certain map projection (Dawn et al., 2010).", "Generally, image registration contains four main steps: (1) feature extraction, (2) feature matching, (3) image transformation, and (4) image interpolation or resampling (Dawn et al., 2010; Zitov\u00e1 and Flusser, 2003)."]} +{"126051042|206051485": ["Generally, image registration contains four main steps: (1) feature extraction, (2) feature matching, (3) image transformation, and (4) image interpolation or resampling (Dawn et al., 2010; Zitov\u00e1 and Flusser, 2003)."]} +{"126423259|6444295": []} diff --git a/edge/graph_51776194.jsonl b/edge/graph_51776194.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8121626bcb1e7a3cfc7980075cc82ce85d65fabc --- /dev/null +++ b/edge/graph_51776194.jsonl @@ -0,0 +1,6 @@ +{"58277948|519014": []} +{"17964344|6159806": ["Although there are several proposals to classify the approaches that focus on this topic [2, 12], in this paper we distinguish two kinds of algorithms depending on the complexity of the problem they solve:"]} +{"17729418|6159806": ["While reviewing different semantic web services composition surveys and approaches [1], [2], [22], [23], [24], [25], [26], [27], [38], we have identified six different kinds of requirements (dynamic aspect, adaptability, domain independence, correctness, scalability and non-determinism), which is\u2026", "Since the last decade, considerable work has been done on semantic web services composition [2], [22], [23], [24], [25], [26], [27], [38] but more research is required to address the issue of heterogeneity in automatic (minimal user intervention) web services composition as web services provided by\u2026"]} +{"17729418|519014": ["642 product, making it an emerging field of research [3]."]} +{"28246577|913718": []} +{"84352009|6159806": []} diff --git a/edge/graph_5177848.jsonl b/edge/graph_5177848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51779654.jsonl b/edge/graph_51779654.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ece804d2a9695a91008e7ff551148a91b3945de --- /dev/null +++ b/edge/graph_51779654.jsonl @@ -0,0 +1,2 @@ +{"4378525|32856349": ["Costa et al. [8] have identi\ufb01ed models and tools for supporting the GSD through a systematic literature review and found that since 2000 the number of studies on GSD has signi\ufb01cantly increased."]} +{"4378525|11139156": ["Hossain et al. [14] have conducted a systematic literature review that reports the use of Scrum practices in GSD projects.", "However, like other researchers of SLR this is not a systematic omission [14]."]} diff --git a/edge/graph_51785321.jsonl b/edge/graph_51785321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51805585.jsonl b/edge/graph_51805585.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d9a2c482a11f8ee83badfd6d4e676cfb49a2570 --- /dev/null +++ b/edge/graph_51805585.jsonl @@ -0,0 +1 @@ +{"17868024|45775424": ["According to Dunser in [12], although AR has been in studied for over forty years, it has only been recently that researchers have begun to formally evaluate AR applications.", "There is also seems to be a lack of understanding on the need of doing studies or sometimes, the incorrect motivation for doing them [12].", "in [12], stated that one reason for the lack of user evaluations in AR could be a lack of education on how to evaluate AR experiences, how to properly design experiments, choose the appropriate methods, apply empirical methods, and analyse the results."]} diff --git a/edge/graph_51807310.jsonl b/edge/graph_51807310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51809623.jsonl b/edge/graph_51809623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5184436.jsonl b/edge/graph_5184436.jsonl similarity index 100% rename from graph_5184436.jsonl rename to edge/graph_5184436.jsonl diff --git a/edge/graph_51845217.jsonl b/edge/graph_51845217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a402ee1a45016316b61d11929e6a6aa5175f224 --- /dev/null +++ b/edge/graph_51845217.jsonl @@ -0,0 +1,12 @@ +{"30705681|677242": []} +{"13577057|8125630": ["The user can save computation time on queries by building an OLAP (Online Analytical Processing) cube [1]."]} +{"353336|677242": ["A-tSNE is computationally steerable [21], in the sense that the user can define the level of approximation to specific,", "The level of approximation can be refined by the analyst in interesting regions of the embedding, making A-tSNE a computational steerable algorithm [21].", "To overcome this problem, we propose to compute an approximation of tSNE\u2019s initialization stage, followed by a user steerable [21] refinement of the level of approximation."]} +{"7341582|4071247": ["[2]), rather than all possible interactions in visual analytics.", "In general, knowledge learned in visual analytics can be defined as \u201cjustified belief\u201d [2]."]} +{"9737052|8125630": ["For instance, some commercial DBMSs support the creation of online analytical processing (OLAP) cubes [21], where the data is"]} +{"15685090|677242": ["Algorithm steering is de\ufb01ned as \u201cinteractive control over a computational process during execution\u201d by Mulder et al. [26]."]} +{"13924292|677242": []} +{"5943739|2593345": []} +{"14483787|2593345": ["As Elmqvist and Fekete point out [14], aggregate visualizations can resolve both rendering and occlusion problems by limiting the number of items that must be shown on screen."]} +{"6618748|2593345": ["The present work does not seek to contribute novel aggregation methods; for further reading please refer to general concepts [8,15] and data structure specific guidelines [9]."]} +{"6827185|2593345": ["While Elmqvist and Fekete propose variations of visualization techniques that include aggregation as a first-class citizen [11], in this paper we show how to issue queries such that at the screen resolution in which the application is operating, the result is indistinguishable (or close to) from a complete scan through the dataset."]} +{"20034790|9597596": []} diff --git a/edge/graph_51845363.jsonl b/edge/graph_51845363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8b7263ad8baf5b2abcec287052cc954b9c025c5 --- /dev/null +++ b/edge/graph_51845363.jsonl @@ -0,0 +1,5 @@ +{"17329145|10500613": []} +{"73232|2905017": ["We also give an overview of controlled-flooding techniques for MANETs."]} +{"9896215|15849973": ["In large scale cloud storage system, data nodes are heterogeneous, with different types of disks, network bandwidth, CPU speed, etc., so the maximal number of sessions that a data node can support is different.", "Too much replicas may not significantly improve availability, but bring unnecessary spending instead."]} +{"10219287|3102110": []} +{"2807044|8424228": []} diff --git a/edge/graph_51848460.jsonl b/edge/graph_51848460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51852912.jsonl b/edge/graph_51852912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26418e5cb86d3a76431bade5a0ed71d955677255 --- /dev/null +++ b/edge/graph_51852912.jsonl @@ -0,0 +1,7 @@ +{"110311547|33286487": ["Moreover, it has broad implications in signal processing [27]."]} +{"122014678|33286487": []} +{"27356306|905827": ["FFT is the simplest frequency domain analysis method [5].", "Although vibration analysis has been used for mechanical fault detection for many decades, more recent studies on induction motors concentrate on monitoring electrical signals such as stator current [5].", "However, frequency and time\u2013frequency domain analyses are often used to analyze stator current signals [5,6]."]} +{"121734822|905827": []} +{"119818081|192934": []} +{"111297294|905827": []} +{"110320313|905827": []} diff --git a/edge/graph_51858916.jsonl b/edge/graph_51858916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a6ca81de2be5a6d0641a3d5a8d60b8e929613614 --- /dev/null +++ b/edge/graph_51858916.jsonl @@ -0,0 +1,13 @@ +{"33132710|22833814": ["Reference [9] mainly studies the moving scatter fading and Doppler spectrum, and puts forward elliptic distribution model.", "Reference [10] and [11] use semi-markov model to describe a three-state channel model.", "Reference [5] describes the channel of the approach process of civil aircraft,\n978-1-5386-0365-9/17/$31.00 \u00a92017 IEEE\nbut only gives a fixed model instead of the changing process.", "For UAV, Reference [2], [3] and [4] measure the channel in the scenario of over-water, suburban and hilly mountain.", "Reference [7] points out that the Doppler frequency shift would cause the fluctuation of K factor and fast fading, deteriorating the bit error rate of broadband air-ground communication.", "For measurement campaign of dynamic nodes, Reference [1] summarizes the work that have been done on the channel measurement and modeling of highspeed train.", "Reference [6], [7] and [8] all give a three-dimensional high-altitude platform (HAP) Multiple-Input-Multiple-Output channel."]} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"505889|61132": ["It was shown in [4] that the power consumed in the BS can limit the flying time of the UAV-BS by 16%.", "UAVs often use batteries to power their rotors and onboard electronics [4]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"12373458|13367219": ["As with terrestrial cellular channels, classification of the various types of AG channels presents ambiguities and overlaps [21].", "One desirable attribute of these models is that they can be employable in computer simulations, and for this, we could use the several model types [21], including stored CIRs"]} +{"25822604|7482876": ["For this channel, 50 references appear in the review of [44], and more than 20 additional references appear in [45], for a total of at least 77 references on this channel."]} +{"13111229|33286487": ["Other approaches to describing time\u2013frequency distributions include the Cohen class, such as the Wigner\u2013Ville spectrum described in [22] and [23], for deterministic signals."]} +{"6534396|61132": ["In this system, UAVs are often powered by batteries [1], and hence the life-time of UAV-BS system is limited by the energy-ef\ufb01ciency."]} diff --git a/edge/graph_51863245.jsonl b/edge/graph_51863245.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af83125fa8088bf9b58ccb59b7711c6983822685 --- /dev/null +++ b/edge/graph_51863245.jsonl @@ -0,0 +1 @@ +{"10607510|3540699": ["In the long literature of standard video compression [4], a variety of methods have been proposed to exploit these redundancies."]} diff --git a/edge/graph_51870144.jsonl b/edge/graph_51870144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6088175f0abc1ba09b25b75466938532fab8ec7a --- /dev/null +++ b/edge/graph_51870144.jsonl @@ -0,0 +1,13 @@ +{"3458164|16815953": ["Following the SOA architectural model for composite services it enables, even dynamically, the creation of distributed software intensive systems built from a combination of diverse independently developed services [4].", "One open challenge for Web services is to increment their reliability [4] a particular feature of dependability which considers many more aspects like: reliability, availability, security, maintainability among others [10]."]} +{"44168539|207462643": []} +{"10117659|1184288": ["Particularly for implementing the atomicity property, we suppose that non-composite services verify the following transactional properties, based on the transaction model of multi-database systems proposed in [32]."]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"2165494|1805048": ["There are many methods including Bayesian networks, clustering models [40], latent semantic models [41], probabilistic latent semantic analysis [42], multiple multiplicative factor, latent dirichlet allocation and Markov decision process used for finding user interest pattern [43]."]} +{"12169149|17787193": []} +{"16420963|9240891": ["Index Terms\u2014Business activity, Byzantine fault tolerance, distributed transaction, service-oriented computing, trustworthy computing, web services\n\u00c7", "The trustworthiness of Internet and web applications has become increasingly important in recent years [16], [17], [29], particularly with the advent of WS-BA that involve interactions between multiple enterprises."]} +{"9289765|18194234": ["Wang and Vassileva [7] discussed trust QoS as applied to web service selection and presented further research directions."]} +{"3423077|16815953": ["In service-oriented software reliability researches [21] , there are four possible approaches for improving reliability, which are fault prevention [36] , fault removal [45] , fault prediction [40] , and fault tolerance [12] ."]} +{"67399678|16815953": ["Certain uncovered challenges related to the reliability achievement [6, 10, 24, 26].", "A reliable service-composition is one, which can work in presence of faulty services [6].", "The process takes into account runtime-preferences of the user [6].", "Further, the presented approach relies on the reliability achievement, which is the key requirement of the composition process [6, 10, 24, 26].", "The studies de\ufb01ne major requirements according to the different researchers [6, 13, 20] that a fault tolerance approach should satisfy.", "Designing and developing a dynamic composition has reliability issue [6, 10, 24, 26].", "Previous approaches [1, 3, 5, 7, 10\u201312, 14\u201317, 23\u201326] resolve most of the recovery requirements [6, 13, 20]."]} +{"9073223|14088590": []} +{"16815953|15264530": ["Recently, the idea of composite services has been increasingly applied also in the context of ambient intelligence (AmI) environments [18\u201320], which obeys the guidelines of pervasive and ubiquitous computing."]} +{"16815953|6159806": ["The common interest inWeb services is also revealed by the number of literature surveys of the approaches considering Web service selection and composition [12,14\u201317]."]} diff --git a/edge/graph_51870530.jsonl b/edge/graph_51870530.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea0faaded88925912bc5736e7477e3b14b72c4bc --- /dev/null +++ b/edge/graph_51870530.jsonl @@ -0,0 +1,10 @@ +{"24961224|21386749": ["Rapidly advancing machine-to-machine communication enables healthcare service providers to remotely monitor patient vital parameters and generate vast amounts of data that needs to be managed and stored for analysis and future use [9]."]} +{"13871210|21386749": ["Related Works As mentioned in the introduction, IoT is revolutionizing the overall medical system by introducing novel instruments and methodologies for deploying innovative and healthcare services [7]-[11],[33]."]} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"13719498|3055684": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"15152008|16209841": ["\u2026of state-of-the-art security mechanisms in the IoT (including symmetric/asymmetric cryptographic algorithms, hashing functions, security protocols at network/transport/application layers), aiming at providing features such as confidentiality, integrity, and authentication, is provided in [9]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_51870856.jsonl b/edge/graph_51870856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b651c0870fd4f852defb13931cc27a4821367916 --- /dev/null +++ b/edge/graph_51870856.jsonl @@ -0,0 +1,7 @@ +{"540388|6746689": ["Thinning algorithms are typically used due to their effectiveness and reliability The thinning algorithm is applied by removing all the points of the image contour except points that belong to the skeleton, which are left [32\u201334].", "The thinning algorithm is applied by removing all the points of the image contour except points that belong to the skeleton, which are left [32\u201334]."]} +{"18107348|44132017": []} +{"27451768|206051485": ["These methods use image intensities for direct matching, without the need to detect prominent objects or any structural analysis.(26,27) Some previous work on the registration of AO images of the retina has been published."]} +{"7399363|15369615": []} +{"119223390|17639662": []} +{"1949059|8953108": ["We have applied also other dynamic thresholding methods, such as Otsu\u2019s approach (Sezgin and Sankur, 2004) and fuzzy c-means (Osareh, 2004), in order to compare the benefits of applying a dynamic threshold to the fitted mixture model over simply applying to the image pixel values.", "The results obtained using the Otsu\u2019s method (Sezgin and Sankur, 2004) and the fuzzy c-means approach (Osareh, 2004) are summarized in Table 2.", "As the point of discontinuity on the curve represents the intersection of two overlapping distributions (Sezgin and Sankur, 2004), we analyse the concavities of frobust to set the threshold.", "In order to get only the bright foreground elements, we set the threshold in the deepest concavity point that is found on the right tail of frobust, as follows (Sezgin and Sankur, 2004):"]} +{"14496964|6746689": ["A step, required for the characterization of the morphological structure of the blood vessel's network, is the skeletonization of the segmented image, as in [25]."]} diff --git a/edge/graph_51871047.jsonl b/edge/graph_51871047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..020a12cf59f754d23837c70e1eed0cd70e4e11dc --- /dev/null +++ b/edge/graph_51871047.jsonl @@ -0,0 +1 @@ +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} diff --git a/edge/graph_51871361.jsonl b/edge/graph_51871361.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd4072a7b984814c179831efbd38aecbd6adddc7 --- /dev/null +++ b/edge/graph_51871361.jsonl @@ -0,0 +1,22 @@ +{"799455|12029139": ["Generally, in the context of IoT, wireless sensor networks (WSNs) and radio-frequency identification (RFID) tags, wireless energy sources can be classified into two categories [6]: 1) Dedicated source : Dedicated RF sources are deployed to provide a predictable energy supply to the device.", "Relay techniques utilized by 5G can benefit wireless/RF energy harvesting [6]."]} +{"799455|12060835": ["Thus, energy harvesting is a promising approach for the emerging IoT [4]."]} +{"18166727|12060835": ["Every energy source has distinctive characteristics in terms of controllability, predictability and magnitude [3]: all these three factors are relevant for the choice of the most suited source for a certain application [4].", "The devices used more often in energy harvesting applications are supercapacitors and rechargeable batteries [3]."]} +{"121226812|1230643": ["For this purpose, photovoltaic cells are typically used [24-31]."]} +{"121226812|12060835": ["For this purpose, photovoltaic cells are typically used [24-31]."]} +{"14531950|12060835": ["In this work, a harvest-store-use system architecture as defined in [4] is assumed.", "Ambient energy harvesting, particularly in the form of solar energy harvesting [3, 4], has thus attracted much attention as a promising solution for enabling perpetual system operation."]} +{"32568899|240747": ["A plethora of energy buffering solutions are studied in the literature [54]; batteries and supercapacitors are commonly used, either individually or in combination."]} +{"44371551|9494512": []} +{"9681924|1230643": []} +{"113972584|12083425": ["Supercapacitors (SCs) also known as electrochemical capacitors (ECs), ultra-capacitors or electric double layer capacitors [42, 45] were attracting less attention until very recently [ 46] when faster energy storage systems were needed in a number of applications to replace Li-ion batteries which suffer from sluggish charge/discharge with a limited lifetime.", "Hydrogen is storable, transportable, highly versatile, efficient, and clean energy carrier [42]."]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"110896183|1230643": []} +{"110896183|12060835": []} +{"3055684|12060835": []} +{"40243289|33867211": ["Energy sources can be photonics, kinetics, vibration, magnetic, temperature difference or pressure [1] [2] [3] [4] [5] [6]."]} +{"42856206|15300368": ["The first application of Wireless Sensor Networks has been in the cold war in the 1950s in which one of the prototypes of modern sensor networks called Sound Surveillance System (SOSUS) was developed by the United States Military to detect and track Soviet submarine, and monitor several radar networks for air defense[3][4]."]} +{"42856206|12060835": ["In order to tackle the fundamental problem of the energy in WSN, the use of energy harvesting technique need to be employed to harvest the energy from surroundings [8] to ensure continuous operation of WSN device."]} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"14887125|1230643": ["INTRODUCTION Micro-scale energy harvesting has emerged as a promising and viable option for powering embedded systems in a variety of emerging application domains such as wearable electronics and wireless sensor networks [1][16]."]} diff --git a/edge/graph_51872115.jsonl b/edge/graph_51872115.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70b5aafbd5fa9c5c80ae450f085ee00446243bfc --- /dev/null +++ b/edge/graph_51872115.jsonl @@ -0,0 +1,2 @@ +{"207022595|206459491": ["KEYWORDS | Hardware intellectual property (IP) trust; hardware obfuscation; hardware Trojan attacks; self-referencing;\nside-channel analysis; Trojan detection; Trojan taxonomy;\nTrojan tolerance"]} +{"5171267|14077778": ["3 use the square-andmultiply exponentiation algorithm [28]."]} diff --git a/edge/graph_51872504.jsonl b/edge/graph_51872504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e3576b575eb512b79e3cf759905791527d375b1 --- /dev/null +++ b/edge/graph_51872504.jsonl @@ -0,0 +1,10 @@ +{"19096101|8310135": ["The pipeline method treats this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) [14\u201317] and relation classification (RC) [2,9,10,18,19] .", "Joint learnng framework is an effective approach to correlate NER and RC,\nhich can also avoid cascading of errors [3] .", "We firstly use the NER module to detect the entities in sentence, then uses the right entity recognition results of step 1 to test the RC module.", "Our model not only considers the relevance of NER module nd RC module when comparing with classical pipeline methods, ut also considers the long distance relationships between entity ags and without complicated feature engineering, when comparng with existing joint learning methods.", "Most existing NER models are traditional linear statistical models, such as Hidden Markov Models (HMM) and Conditional Random Fields (CRF) [14,20] .", "Analysis of named entity recognition module\nThe NER module contains a bidirectional LSTM encoding layer nd a LSTM decoding layer.", "Recently, several neural network architectures have been successfully applied to NER, which is regarded as a sequential token tagging task.", "The objective function of NER module can be dened as: ner = max | D | \u2211\nj=1\nL j \u2211 t=1 log(p ( j) t = y ( j) t | x j , ner ) , (16)\nhere | D | is the size of dataset, L j is the length of sentence x j , y ( j)t s the label of word t in sentence x j and p ( j) t is the normalized ntity tag probabilities which defined in Formula 10 .", "There are wo \u201cchannels\u201d after encoding layer, one links to the NER modle which is a LSTM decoding layer, the other feeds into a CNN ayer to extract the relations.", "NER and RC share a same bidirectional LSTM encoding ayer, which is used to encode each input word by taking into ccount the context on both sides of the word.", "Traditional systems treat this task as a pipeline of two sepaated tasks, i.e., named entity recognition (NER) [1] and relation lassification (RC) [2] .", "We firstly train NER module to recognize the entities and obain the encoding information of entities, then further train the RC\nodule to classify relations based on the encoding information and\nhe entities combinations.", "We use BiLSTM-ED to represent the tructure of NER module.", "AC CE PT ED M AN US CR IP T named entity recognition (NER) [1] and relation classification (RC) [2].", "Please cite this article as: S. Zheng et al., Joint entity and relation extra\nhttp://dx.doi.org/10.1016/j.neucom.2016.12.075\nity recognition (NER) module and a relation classification (RC)\nodule.", "The rst layer of hybrid neural network is a bidirectional LSTM enoding layer, which is shared by both named entity recognition NER) module and relation classification (RC) module.", "Named entity recognition (NER) module\nEach word will be assigned an entity tag.", "On the entity detection task, our\n1 http://www.itl.nist.gov/iad/mig//tests/ace/\nction based on a hybrid neural network, Neurocomputing (2017),\nm N 2 m r\np l o n r w N N o m b a t F t c f\n2\ns t b t m e t t i e r p c e\n2\nm T s I N t T r r g w N t\nj l e m m b\nNER module achieves 2% improvements when comparing with different kinds of LSTM structures, which verifies the effectiveness of NER module."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} diff --git a/edge/graph_51874109.jsonl b/edge/graph_51874109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbea6c114a1fd208aa3ee40eecff50c90e100e3d --- /dev/null +++ b/edge/graph_51874109.jsonl @@ -0,0 +1,7 @@ +{"17135144|14140377": ["Our insistence on using only current standards is inspired by the lessons learned from the very history of temporal databases, where past proposals failed to gain much acceptance in the commercial arena, in spite of great depth, breadth [1, 2] and technical elegance [3, 4]."]} +{"14786371|14140377": ["Consequently, efforts to incorporate the temporal domain into database management systems (DBMSs) have been ongoing for more than a decade [39,55]."]} +{"14609547|8125630": []} +{"2031694|8125630": ["The parallel processing technology becomes even more attractive as the size of data-intensive applications grows as evidenced in OLAP and data warehousing environments [5]."]} +{"5558433|14140377": ["\u2026many extensions to the standard relational model have been proposed and more than 2,000 papers on temporal databases (TDBs) have been published over the last two decades (cf., a cumulative bibliography [48], four surveys [27], [38], [28], [24], and several workshop proceedings [20], [29], [39])."]} +{"16120099|14140377": ["Various temporal join predicates have been proposed [20]."]} +{"8775280|14140377": []} diff --git a/edge/graph_51874853.jsonl b/edge/graph_51874853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77d89aa6196dba990d01388a3775cacdabe7ddf7 --- /dev/null +++ b/edge/graph_51874853.jsonl @@ -0,0 +1,3 @@ +{"8698222|33208891": ["\u2026referred to as information literacy or\u2014when information and communication technologies also play a key role\u2014digital literacy activities/skills (Bawden, 2001; BrandGruwel & Gerjets, 2008; Brand-Gruwel, Wopereis, & Walraven, 2009; Eisenberg & Berkowitz, 1990; Jones-Kavalier & Flannigan, 2006;\u2026", "The set of activities and/or skills needed to adequately deal with this information generation and dissemination is frequently referred to as information literacy or\u2014when information and communication technologies also play a key role\u2014digital literacy activities/skills (Bawden, 2001; BrandGruwel & Gerjets, 2008; Brand-Gruwel, Wopereis, & Walraven, 2009; Eisenberg & Berkowitz, 1990; Jones-Kavalier & Flannigan, 2006; Moore, 1995; Wolf, Brush, & Saye, 2003). This is often seen as one of the core 21st-century skills propagated in much school policy (Anderman, Sinatra, & Gray, 2012; Dede, 2010; European Commission, 2002; Voogt & Pareja Roblin, 2010). Although students are often thought of as being competent or even expert in information problem solving (i.e., that they are information and digitally literate) because they are seen searching the web daily, research reveals that solving information problems is for most students a major if not insurmountable cognitive endeavor. Searching, finding, and processing information is a complex cognitive process that requires identifying information needs, locating corresponding information sources, extracting and organizing relevant information from each source, and synthesizing information from a variety of sources. According to Miller and Bartlett (2012), effective Internet use requires distinguishing good information from bad. They noted, however, that learners are not astute Internet users. Learners not only have problems finding the information that they are seeking but also often trust the first thing they see, making them prone to \u201cthe pitfalls of ignorance, falsehoods, cons and scams\u201d (p. 35). Many researchers (e.g., Bilal, 2000; Large & Beheshti, 2000; MaKinster, Beghetto, & Plucker, 2002; Wallace, Kupperman, Krajcik, & Soloway, 2000) have demonstrated that young children, teenagers, and adults are not capable of effectively choosing proper search terms, selecting the most relevant websites, and questioning the validity of sources. Furthermore, research of Brand-Gruwel, Wopereis, and Vermetten (2005); Branch (2001); Gross and Latham (2007); and Lazonder (2000) revealed that students lack regulatory skills and have difficulties defining the information problem;", "The set of activities and/or skills needed to adequately deal with this information generation and dissemination is frequently referred to as information literacy or\u2014when information and communication technologies also play a key role\u2014digital literacy activities/skills (Bawden, 2001; BrandGruwel & Gerjets, 2008; Brand-Gruwel, Wopereis, & Walraven, 2009; Eisenberg & Berkowitz, 1990; Jones-Kavalier & Flannigan, 2006; Moore, 1995; Wolf, Brush, & Saye, 2003).", "The set of activities and/or skills needed to adequately deal with this information generation and dissemination is frequently referred to as information literacy or\u2014when information and communication technologies also play a key role\u2014digital literacy activities/skills (Bawden, 2001; BrandGruwel & Gerjets, 2008; Brand-Gruwel, Wopereis, & Walraven, 2009; Eisenberg & Berkowitz, 1990; Jones-Kavalier & Flannigan, 2006; Moore, 1995; Wolf, Brush, & Saye, 2003). This is often seen as one of the core 21st-century skills propagated in much school policy (Anderman, Sinatra, & Gray, 2012; Dede, 2010; European Commission, 2002; Voogt & Pareja Roblin, 2010). Although students are often thought of as being competent or even expert in information problem solving (i.e., that they are information and digitally literate) because they are seen searching the web daily, research reveals that solving information problems is for most students a major if not insurmountable cognitive endeavor. Searching, finding, and processing information is a complex cognitive process that requires identifying information needs, locating corresponding information sources, extracting and organizing relevant information from each source, and synthesizing information from a variety of sources. According to Miller and Bartlett (2012), effective Internet use requires distinguishing good information from bad."]} +{"29615270|12886544": ["\u2026techniques aim to model the major aspects of the collaborative activity (such as peer interactions, collaboration activity structure, problem-solving tasks, student/group profile, domain knowledge, etc.) and activate learner/group support interventions when needed and in the form it is needed [5].", "\u2026can be classified into 2 main categories: 1) peer interaction support (i.e. help peers to \u201clearn to collaborate\u201d by encompassing interaction rules in the medium), 2) domain knowledge support (i.e. help peers to deepen their domain understanding by monitoring and regulating the interactions) [5]."]} +{"20646766|469744": []} diff --git a/edge/graph_51874980.jsonl b/edge/graph_51874980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d451969c466d05ba7181f35ff2bd69f6c90410e0 --- /dev/null +++ b/edge/graph_51874980.jsonl @@ -0,0 +1,17 @@ +{"13556461|5605271": ["Since smart energy data are characterized by volume, velocity, variety, and value, which are the key elements of big data, the concept of energy big data is introduced [5].", "[5] first gave a comprehensive overview on energy big data covering energy big data\u2019s infrastructure, applications, algorithms, and security analysis."]} +{"206634147|1230643": ["The pending data frame is then sent using slotted CSMA-CA or, if possible, immediately after the acknowledgement [3][6] [7][8].", "For example, a temperature sensor and accelerometer could be combined within a single device used for industrial plant monitoring applications[6][7]."]} +{"11078379|6327434": ["The first major survey was written by Willsky (1976).", "The first major survey was written by Willsky (1976) ."]} +{"38288405|31086789": []} +{"27021293|5605271": ["[32] introduced a two-person zero-sum game to deal with DDoS traffic injection."]} +{"6502096|18078738": ["It is clear that in a healthy system all characteristic features and parameters are in an acceptable ordinary and standard form [5-7].", "Model-based FDD methods can be divided into four categories depending on the class of models they are developed for [6]: Deterministic Model-Based FDD Methods, Stochastic Model-Based FDD Methods, Model-Based FDD methods for Discrete-events and Hybrid systems, Model-Based FDD methods for Discrete-events and Hybrid systems, Networked and Distributed Systems."]} +{"4884672|5605271": ["The EI system consists of some regional control centers, which include data acquisition control, power system operations, power market operations, data management operations and metering systems [9], [91], [154]."]} +{"4884672|8440916": ["[68] proposed to enhance EI communication using device-to-device (D2D) communications that establish direct transmission links between end-devices in cellular networks.", "[68] Propose a novel cellular technology called D2D communications in LTE standard."]} +{"4884672|512561": ["The idea of using CR in different application scenarios has been appeared for many years, such as WSN [152], D2D communications [153], and smart grid [156]."]} +{"4884672|29060869": ["[31] explored an energy-efficient communication architecture for smart grid, which includes Home Area Networks (HAN), Neighborhood Area Networks (NAN) and Wide Area Networks (WAN), based on wireless, wired and optical technologies."]} +{"4884672|2521001": ["[24] [25] [26] [146] [147] [27] [28] [29] [148] [159]", "There are several articles [24], [25], [26], [146], [147], [148] that survey the recent work about smart grid, but the achievements in EI communication are seldom summarized."]} +{"4884672|5747564": ["[24] [25] [26] [146] [147] [27] [28] [29] [148] [159]", "There are several articles [24], [25], [26], [146], [147], [148] that survey the recent work about smart grid, but the achievements in EI communication are seldom summarized.", "Many issues should be carefully considered, including security management, security policy and security technology [26]."]} +{"4884672|121289": ["[24] [25] [26] [146] [147] [27] [28] [29] [148] [159]", "There are several articles [24], [25], [26], [146], [147], [148] that survey the recent work about smart grid, but the achievements in EI communication are seldom summarized.", "Categories Internet communication [27] WSN communication [149] SG communication [24] EI communication [29]"]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"15749479|2357830": ["\u2026of a number of new versions of platforms and technologies including device and process identi\ufb01cation and tracking, sensing and actuation, communication, computational sensing, semantic knowledge processing, coordinated and distributed control, and behavioral, traf\ufb01c, and user modeling [3]."]} +{"110268297|1230643": []} diff --git a/edge/graph_51876190.jsonl b/edge/graph_51876190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1164a7b7ffde321ee637c3fc1ca1f5008e0fb8a7 --- /dev/null +++ b/edge/graph_51876190.jsonl @@ -0,0 +1,10 @@ +{"2942688|17774971": []} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} diff --git a/edge/graph_51877788.jsonl b/edge/graph_51877788.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..068dd5881f13761f224789519efe28a3c22dcc2e --- /dev/null +++ b/edge/graph_51877788.jsonl @@ -0,0 +1,167 @@ +{"49866160|2340740": ["[8] present the formal formulation of Malicious URL Detection as a machine-learning task and"]} +{"49866160|12815020": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"1033682|174797842": []} +{"13223117|20905429": ["They are equipped with medical sensors that are capable of measuring different parameters such as the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels [35]."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"10934690|12395887": []} +{"29974861|44461432": ["In [80] the data mining techniques are divided in five categories: classification, clustering, association analysis, time series analysis and outlier 895", "the problem type, a large amount of techniques can be chosen in [81], [80].", "involves discovering of useful patterns from large amounts of data and applying algorithms for extracting useful and hidden information [80]."]} +{"29974861|3348390": ["Context-aware computing allows us to store context information linked to sensor data allowing an easy and meaningful interpretation [93]."]} +{"3642817|9928823": []} +{"24897627|17474643": ["A big challenge in Cloud Computing and IoT integration is related to the wide heterogeneity of devices, operating systems, platforms, and services available and possibly used for new or improved applications [62]."]} +{"51613885|207209718": ["Some surveys [25, 89] have discussed intrusion detection systems (IDS) in wireless sensor networks and Internet of Things and have provided analysis and comparison of the main existing IDSs."]} +{"207111281|12894036": []} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"4870856|1599458": ["izes machine-to-machine communication with the actual world [1], [2]."]} +{"4870856|18011174": ["modeled in IoT security problems [21]\u2013[28], with which we realize the target of maximizing the suppression of malware diffusion in IoT networks and minimizing privacy leakage of"]} +{"4870856|207231270": ["malware can corrupt and damage IoT networks in many ways, such as compromising smart objects, inserting deceitful data leading to fallacious measurements, wastefully spending smart objects\u2019 energy, and obstructing regular communications among smart objects [4]\u2013[10]."]} +{"4870856|5551880": ["it furnishes various computation, storage, and security services through infrastructure as a service, platform as a service, and software as a service (SaaS) models [14], [15]."]} +{"192638384|15199849": ["Such exposure raises the possibility that an attacker might capture the device, extract cryptographic secrets, modify their programming, or replace them with malicious device under the control of the attacker [33]."]} +{"3269862|18188725": []} +{"3269862|393948": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"17440175|7774517": ["Surprisingly, most anomaly detection methods available in the literature are based on an offline, centralized data processing paradigm, as evidenced in the recent surveys [10, 45, 46]."]} +{"17440175|12815020": ["It has also been used in several other domains, as summarized next."]} +{"17440175|50458504": ["It has also been used in several other domains, as summarized next."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"18567112|6670217": ["art considering the popular mobile OS platforms [31], [32]."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"1990579|21386749": ["On one hand, the nature of the exchange information makes IMDs critically vulnerable to a wide range of threats that may affect the patient\u2019s life [10], [24], [25], and thus the necessity for controlling their access using authentication protocols is absolute."]} +{"1990579|485843": ["These systems include smart power grids [29] which are dynamic and interactive infrastructures that combine high speed communication and monitoring technologies with millions of power equipments to provide efficient energy management such as advanced metering [29], and demand and response capabilities [29], [30].", "For example, during the process of efficient power distribution in smart grids, an analysis of the power consumption among residential and industrial areas is performed [29].", "Though it does not affect the functionality of the infrastructure, such information can be used to determine the valuable contents of a specific property, and to even predict the timings at which it is empty and thus, vulnerable for property theft [29]."]} +{"1990579|17516538": ["The captured footage can be considered as surveillance material which can be leaked and used against the will of the individuals appearing in this footage [34]."]} +{"16279144|2509135": ["Recent surveys on CRs can be found in [41], [54], [55].", "In distributed cooperative spectrum sensing [55], [172], on the other hand, secondary users within a CRN exchange their local sensing results among themselves without requiring a backbone or centralized infrastructure."]} +{"16279144|12452682": []} +{"16279144|2340253": []} +{"31057653|31245252": ["[10] mainly discussed and analyzed cur-"]} +{"31057653|2829149": ["[14] summarized the main point of previous sur-"]} +{"1613994|7399829": []} +{"77177|9240891": ["Subjective factors, risk, confidence, and security are used in the definition of trust in social sciences, where trust shows the expected behavior of an entity (Hoven, 1997; Deutsch, 1958; Misztal, 1996; Grandison and Sloman, 2000)."]} +{"77177|2162062": ["For example, trust is defined as the judgment expressed by one user about another user, often directly and explicitly, sometimes indirectly through an evaluation of the artifacts produced by that user or her activity on the system in Massa (2007).", "On the other hand, trust has been investigated in various fields of science, such as philosophy and computer science (Massa, 2007; Hussain et al., 2006) however there is no agreement about the definition and properties of trust.", "On the other hand, there is no agreement about the definition of trust (Massa, 2007; Raya et al., 2008; Gollmann, 2006; Bertino et al., 2006)."]} +{"61771446|5401262": []} +{"61771446|2186746": []} +{"61771446|192934": []} +{"61771446|7788290": []} +{"61771446|53680608": ["Other surveys about earlier methods can be found in the works of Aggarwal and Nandhakumar (1988), Otte and Nagel (1994), and Stiller and Konrad (1999)."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"38352604|9928823": ["Surveys of deep-learning architectures, algorithms, and applications can be found in [5, 16]."]} +{"23556999|44461432": ["Na\u00efve, selective na\u00efve, semi-na\u00efve Bayes, and Bayes multi-nets are the proposed categories for classi\ufb01cation [48]."]} +{"23556999|3750204": ["Big data analytics processes consume considerable time to provide feedback and guidelines to users, whereas only a few tools [29] can process huge data sets within reasonable amount of processing time."]} +{"23556999|121289": ["The smart grid is a new generation of power grid in which managing and distributing electricity between suppliers and consumers is upgraded using two-way communication technologies and computing capabilities to improve reliability, safety, ef\ufb01ciency with real-time control, and monitoring [73], [74]."]} +{"44175270|26690303": ["Existing intrusion detection and prevention models generally use statistical approaches [15] such as Hidden Markov Model (HMM) [15], Bayes theory [16], cluster analysis [17], signal processing [18] and distance measuring [19] to detect anomalous activities."]} +{"1599458|1520906": []} +{"1599458|3348390": ["[22,32\u201342,66] Surveys oriented to data mining Relationships between data mining, KDD and big data for IoT."]} +{"1599458|191396": ["[22,32\u201342,66] Surveys oriented to data mining Relationships between data mining, KDD and big data for IoT.", "New framework is presented in [32] to understand data mining algorithms [38\u201342]."]} +{"15528648|3348390": [", [4] and [44]), it is established that one of the most appropriate formats to manage context is ontology."]} +{"27689479|3767252": ["IoT offloading has to address the attacks launched from the PHY- or MAC- layer attacks, such as jamming, rogue edge devices, rogue IoT devices, eavesdropping, man-in-the-middle attacks, and smart attacks [29]."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"4111957|14258620": []} +{"13860726|2535224": []} +{"13860726|2623404": []} +{"13860726|10693567": ["Furthermore, the OF SDN session is subject to different actions specified in the flow table (Lara et al., 2014; Banjar et al., 2014).", "In reality, OpenFlow represents a part of the entire SDN architecture (Lara et al., 2014).", "Such distinguishing features make SDNs flexible, vendor agnostic, programmable, and cost effective, and create an innovative network environment (Lara et al., 2014; Macedo et al., 2015).", "However, the current OF specification recommends the use of TLS, which provides encrypted secure channels (Lara et al., 2014).", "The data plane, which consists of switches and routers, is responsible only for forwarding traffic, whereas control logic and functionality are moved to an external entity known as the SDN controller (Nunes et al., 2014; Lara et al., 2014)."]} +{"13860726|2387055": ["APIs can be a potential target for attackers (Kreutz et al., 2015; Scott-Hayward et al., 2013).", "Although two survey papers (Scott-Hayward et al., 2013; Ali et al., 2014) were presented in the past, these works lack comprehensive thematic classifications and focus more on utilizing SDNs to secure different networks.", "The communication channel between each layer must be well protected (Scott-Hayward et al., 2013); security measures include secure coding, deployment of integrity checks, and digital signing of the code.", "The integrity and security of the SDN remain untested in the logical centralization of network intelligence (Jarraya et al., 2014; Scott-Hayward et al., 2013).", "The architecture of SDN poses new external and internal threats (Kreutz et al., 2015; Hakiri et al., 2014; Scott-Hayward et al., 2013).", "For example, an input buffer can be used to identify flow rules, and analyzing the packet processing time may determine the forwarding policy (Scott-Hayward et al., 2013).", "The south-bound interface can be targeted by communication flooding attacks, which specifically affect the control layer, the control data interface, and the data layer (Scott-Hayward et al., 2013; Benton et al., 2013)."]} +{"11392154|393948": []} +{"3887658|53116003": ["[60] A survey of big data application in cyber-physical systems."]} +{"3887658|53018231": ["[71] A survey of deep reinforcement learning for networking."]} +{"3887658|9461213": ["Therefore, the trade-off between model complexity and accuracy should be carefully considered [66].", "survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "[66] A survey of deep learning in IoT data analytics."]} +{"3887658|4884302": ["[26] present several architectures and core algorithms for deep reinforcement learning, including", "Due to powerful function approximation mechanism, deep learning has made remarkable breakthroughs in improving traditional reinforcement learning [26] and imitation learning [492]."]} +{"3887658|22163846": ["existing deep learning architectures [414], such that the inference process does not violate latency or energy constraints [415], [416]."]} +{"3887658|39860496": [", [107]\u2013[109])."]} +{"3887658|3645740": ["A number of important applications emerge in the computer network domain [57], such as Web mining [449], caching [450] and base station sleep strategies [184].", "present several successful ML practices in Self-Organizing Networks (SONs), discuss the pros and cons of different algorithms, and identify future research directions in this area [57].", "[57] A survey of machine learning applications in SON."]} +{"3887658|207330385": ["Activity recognition is another interesting area that relies on data collected by mobile motion sensors [384], [386].", "[98], [224], [227], [233], [234], [383], [384]) based on patterns observed in the output of the mobile camera or other sensors."]} +{"3887658|206578224": []} +{"3887658|206456479": ["[44] A survey and insights on network slicing in 5G."]} +{"3887658|48272": ["mobile AR, GPS) demand precise individual positioning technology [389]."]} +{"3887658|3273340": ["Hardware: There exist several efforts that attempt to shift deep learning computing from the cloud side to mobile devices [154]."]} +{"3887658|6909107": []} +{"3887658|206578365": ["[47] A survey on mobile edge computing."]} +{"3887658|17485266": ["Adaptive Learning Rate SGD Algorithms: Kingma and Ba propose an adaptive learning rate optimizer named Adam, which incorporates momentum by the first-order moment of the gradient [127].", "SGD [125] Computes the gradient of mini-batches iteratively and updates the parameters \u2022 Easy to implement \u2022 Setting a global learning rate required \u2022 Algorithm may get stuck on saddle points or local minima \u2022 Slow in terms of convergence \u2022 Unstable", "Fixed Learning Rate SGD Algorithms: Suskever et al. introduce a variant of the SGD optimizer with Nesterov\u2019s momentum, which evaluates gradients after the current velocity is applied [125].", "RMSprop [125] Employs root mean square as a constraint of the learning rate \u2022 Learning rate tailored to each parameter \u2022 Learning rate do not decrease dramatically at late training \u2022 Works well in RNN training \u2022 Still requires a global learning rate \u2022 Not good at handling sparse gradients", "This is suitable for handling sparse data and significantly outperforms SGD in terms of robustness [126].", "RMSprop is a popular SGD based method introduced by G. Hinton.", "To overcome this problem and stabilize the optimization process, many algorithms evolve the traditional SGD, allowing NN models to be trained faster for mobile applications.", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [140] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems.", "RMSprop divides the learning rate by an exponential smoothing the average of gradients and does not require one to set the learning rate for each training step [125].", "In this case, conventional Stochastic Gradient Descent (SGD) algorithms [125] are slow in terms of convergence, which will restrict their applicability to latency constrained mobile systems."]} +{"3887658|12187684": ["Intelligent mobile networking is becoming a popular research area and related work has been reviewed in [7], [34], [37], [54], and [56]\u2013[59]."]} +{"3887658|10979806": ["[41] A survey of 5G energy-efficient techniques."]} +{"3887658|26429034": ["Network-level data usually exhibit significant spatio-temporal variations resulting from users\u2019 behaviors [374], which can be utilized for network diagnosis and management, user", "These traffic sensing images enclose information associated with the movements of individuals [374]."]} +{"3887658|15449163": ["[39] A survey of 5G networks features, research progress and open issues."]} +{"3887658|19938676": ["They overview comprehensively existing efforts that incorporate deep learning into the IoT domain and shed light on current research challenges and future directions.", "[5] A survey of 5G architecture and technologies.", "The authors suggest that DBNs can effectively analyze network load and process structural configuration, thereby achieving efficient load balancing in IoT.", "In the long run, however, Internet Service Providers (ISPs) must develop intelligent heterogeneous architectures and tools that can spawn the 5th generation of mobile systems (5G) and gradually meet more stringent end-user application requirements [4], [5].", "also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5].", "Zhang et al. introduce a deep Q learning-powered hybrid dynamic voltage and frequency scaling scheduling mechanism, to reduce the energy consumption in real-time systems (e.g. Wi-Fi, IoT, video applications) [367].", "Advanced deep learning practices provide a powerful solution for app-level data mining, as they demonstrate better precision and higher robustness in IoT applications [473].", "Kim and Kim link deep learning with the load balancing problem in IoT [384].", "Triggered by the increasing popularity of Internet of Things (IoT), current mobile devices bundle increasing numbers of applications and sensors that can collect massive amounts of app-level mobile data [470].", "Mohammadi et al. survey recent deep learning techniques for Internet of Things (IoT) data analytics [66].", "Gupta et al. also review existing work on 5G cellular network architectures, subsequently proposing a framework that incorporates networking ingredients such as Device-to-Device (D2D) communication, small cells, cloud computing, and the IoT [5]."]} +{"3887658|14765802": ["infrastructure\u2019s energy footprint [410]."]} +{"3887658|18687271": ["and tackle mobility management distributively [3].", "[3] An overview of 5G distributed mobility management."]} +{"3887658|9928823": [", [23] and [24])."]} +{"20880112|2623404": ["In particular, it centralizes the network control and provides dynamic, flexible and automated reconfiguration of the networks [61, 62, 63]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"15828198|512561": ["To take benefits of underutilized spectrum, Cognitive radio (CR) technology paradigm is becoming popular and has been used in different application areas such as cognitive radio based smart grid [4]\u2013[6], and cognitive radio sensor networks [7], [8]."]} +{"15828198|3348390": ["The IoT has different technologies, such as semantic, cloud services, sensor hardware/firmware, data modeling, storing, reasoning, processing, and communication technologies in cooperative mode to build its vision [9].", "time, Anyplace, with Anything and Anyone, ideally using Any path/network and Any service [9]\u201d."]} +{"125097346|6430931": []} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"49419089|3126100": []} +{"49419089|627405": []} +{"49419089|7158350": []} +{"49419089|41233660": []} +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"44819618|1520906": []} +{"44819618|2142482": []} +{"46823051|9495329": ["Bizanis and Kuipers [91] surveyed SDN and NV solutions for the IoT devices."]} +{"46823051|1599458": ["5) Survey of data mining [27], [31], [32].", "According to the Gartner Research report, the number of IoT devices will reach 25 billion in a few years [27], [43].", "An alphabetically sorted short list follows below [3], [27], [44], [45].", "Some of the context-aware studies in IoT are summarized in [27]."]} +{"46823051|1520906": []} +{"46823051|10213552": ["Available: http://thinkaurelius.github.io/titan/ and H 2 O (parallel processing engine that contains math and machine learning libraries) [37], [38], [209].", "\u2026engine) [207], All-Pairs (used for biometrics, bio-informatics data mining) [37], Pregel (processes large sized graphs) [208], Spark (works faster than Hadoop because of memory caching) [38], Storm (processes streaming data in real-time) [38], Flink (batch and stream processing) [38], 20 [Online].", "Dynamo (Amazon) [192], Voldemort (LinkedIn) [193], Azure [37], [38].", "OrientDB, 20 Neo4J, 21 and Titan 22 represent some examples of graph-based databases [38].", "7) Survey of big data analytics [37], [38].", "These include: Mahout [210], Spark MLlib 26 [211], H 2 O [38], SAMOA (Scalable Advanced Massive Online Analysis) [212], Flink-ML [38], Weka [213], Oryx, 27 and Vowpal Wabbit [38]."]} +{"46823051|1349348": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "There are also different approaches for context modeling, such as multidisciplinary, domain focused, user-centric, and chemistry inspired [26]."]} +{"46823051|7329149": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|1598350": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|5310274": []} +{"46823051|3348390": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "There are three main steps of context reasoning: 1) context preprocessing; 2) sensor fusion; and 3) context inference [21], [107].", "Context reasoning can be classi\ufb01ed as different categories [21]: fuzzy logic, ontology-based, probabilistic logic, rules, supervised learning, and unsupervised learning.", "These \ufb01ve factors are explained in [21].", "[21].", "Perara et al. [21] mentioned that there were different context life cycles.", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "3) Survey of context awareness [21], [23]\u2013[29].", "According to [21], there are seven main characteristics: 1) architecture; 2) complex system; 3) everything as a service; 4) intelligence; 5) size considerations; 6) space considerations; and 7) time considerations.", "Perera et al. [21] de\ufb01ned the features of context awareness related with IoT, according to [10], [94], and [97]."]} +{"46823051|9429730": ["4) Survey of machine learning on speci\ufb01c topics (human activity recognition, mobile phones sensing, body sensor networks, and WSN) [24], [30], [31]."]} +{"67264312|1599458": ["Finally, we cite the survey \u201c Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services \u201d [15], which presented the current IoT technologies, approaches, and models to \ufb01 nd out new data-related challenges."]} +{"67264312|16153186": ["In [152], the authors survey access control models in WSNs.", "Hence, other network entities, with limited authorizations, become unable to know the actual users \u2019 ID [152].", "11, we classify research activities in access control systems in a two-dimensional diagram as described in [152]."]} +{"67264312|3348390": ["In \u201c Context Aware Computing for The Internet of Things: A Survey \u201d [10], the authors proposed a context awareness for the IoT framework and gave a deep provided an in-depth analysis of the context life cycle (techniques, methods, models, functionalities, systems, applications, and middleware\u2026", "In recent years, many surveys were published to emphasize the advancement of research activities in the IoT framework [1,6 \u2013 10]."]} +{"67264312|14745481": ["In [91], Cho et al. surveyed trust management systems for Mobile Ad Hoc Networks.", "Cho et al. [91] detailed the concept of trust in many disciplines such as sociology, economics, philosophy, psychology, organizational management, autonomic computing, and communications and networking."]} +{"67264312|2906926": []} +{"67264312|9554464": ["Regarding aggregation of data collected by sensors, an important work can be found in [88], where Sang et al. proposed a method for securing data aggregation to extend the network lifetime, guaranteeing reliable data collection from sensors, and addressing a solution for node failure and healing."]} +{"65340678|11381530": ["However, the experimental work is in progress to determine the efficiency and reliability of these learning algorithms to detect attacks [195]."]} +{"65340678|18567112": ["A detailed survey of various types of machine learning based IDS for mobile devices particularly mobile phones can be found here [36]."]} +{"65340678|15707": ["[40] provided a survey on the application of"]} +{"1353379|9667820": []} +{"1353379|44461432": []} +{"1353379|9928823": []} +{"1353379|18388986": []} +{"1353379|3127198": []} +{"39067026|8125630": ["offer visualization and navigation mechanisms of multidimensional data views, commonly called data cubes [7].", "Hierarchies can be included in a flat table forming the so-called STAR schema [7].", "Recently, DataWarehouses (DW) andOn Line Analytical Processing (OLAP) technologies have gained a widespread acceptance as a support for decision making [7]."]} +{"35431421|2992477": []} +{"35431421|5246835": []} +{"44130250|18599847": []} +{"44130250|9928823": []} +{"44130250|1634674": []} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} diff --git a/edge/graph_51878096.jsonl b/edge/graph_51878096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d1c4580804b7b85fd0e8a9717820cca52534a89 --- /dev/null +++ b/edge/graph_51878096.jsonl @@ -0,0 +1,7 @@ +{"7674372|30443041": ["The spectrum sensing problem may be most effectively solved from a pattern recognition perspective; alternatively, the theory of robust detection [8] may prove to be another useful tool."]} +{"3429549|5621151": ["The drawback of this method is that it requires the infrastructure of beacons to be implemented and maintained [8]."]} +{"2509135|12452682": []} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"16744912|8974063": ["Without loss of generality,\n2We note that, although the transmitting SU should be concerned with the interference levels present at the receiver side, it is likely that both the transmitter and the receiver suffer similar interference, due to the excellent propagation conditions of TVWS [30]."]} +{"17198948|3348390": ["The IoT paradigm is a huge step in the evolution of the internet applications [10]."]} diff --git a/edge/graph_51878581.jsonl b/edge/graph_51878581.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..217cd48b43f0740a5ceb28ff4f286ce45fb54157 --- /dev/null +++ b/edge/graph_51878581.jsonl @@ -0,0 +1,10 @@ +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"12597455|14889616": ["We anticipate that further gains in performance can be achieved if the content is represented in a scalable coding format, e.g., SVC [27,28], as further trade-offs between caching space and user video quality can be explored thereby."]} +{"12571736|1420935": ["interesting opportunity for deploying evolved energy trading mechanisms [41], [57]\u2013[63]."]} +{"28910225|16770050": ["With this goal in mind, gesture based interfaces [20], [21], as demonstrated in [15], or voice interfaces [22], [23], are inferior"]} +{"28910225|7360895": ["The presence of personal robotics in our homes should lead to important societal changes in the years to come [1], with personal robots assisting our aging societies in health care, therapy, and rehabilitation but also serving as entertainers and household staff [2]."]} +{"28910225|17024419": ["Augmented reality interfaces which are not screen-based, like projective augmented reality interfaces, should provide the same advantages [24], but the technology is not mature or flexible enough to be considered for use and is expensive."]} +{"14008517|469744": ["Multimodal/multisensor interfaces provide multiple control modes or use integrated display techniques such as augmented reality (Azuma 1997) or virtual reality (Barfield and Furness 1999)."]} +{"26375007|16280711": ["The necessity for more powerful intelligent agents that can interact with human operators in increasingly sophisticated ways will require that current capabilities be augmented with techniques and technologies that facilitate effective H-A team interactions [24], [47]."]} +{"26375007|192934": ["These reasons imply that many data mining classification algorithms lack efficiency or even fail in high-dimensional microarray data analysis [4].", "The intrinsic dimension of high-dimensional feature space showed that there is often a low-dimensional structure embedded in the feature space of high-dimensional data [4]."]} +{"2371010|1708582": ["MINERVA was equipped with a face, used a finite state machine to emulate \u201cmoods,\u201d and employed reinforcement learning [75,142] to learn how to best attract people.", "State-based representations, such as the one used here, are commonly used in the literature on partially observable Markov decision processes (POMDPs) [73,75,97]."]} diff --git a/edge/graph_51880828.jsonl b/edge/graph_51880828.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5269d795776b48a77b2f59ce8efa6e62f6770b80 --- /dev/null +++ b/edge/graph_51880828.jsonl @@ -0,0 +1,10 @@ +{"14462777|36510460": ["Hence to solve the higher dimensional planning problems, the sampling-based algorithms were introduced [5]; the main advantage of sampling-based algorithms as compared to other state-of-the-art algorithms is avoidance of explicit construction of obstacle con\ufb01g-uration space.", "\u2026search space makes the algorithm computationally expensive for higher dimensional spaces, that is why the application of such algorithms like Cell Decomposition methods [19] [1], Delaunay Triangulations [10] and Dynamic Graph Search methods [4] [25] are limited to low dimensional spaces only [5]."]} +{"10878315|6607209": ["In domains where fully centralized approaches are feasible, market-based approaches can bemore complex to implement, and can produce poorer solutions [45].", "Also, when fully distributed approaches suffice, market-approaches can be unnecessarily complex in design and can require excessive communication and computation [45]."]} +{"10878315|562855": ["The advantages of this type include the reduction of duplication of effort, resources, and increased savings of cost and time [29].", "Decentralization is the process of dispersing the administrative tasks and authorities between the agents of the multi-agent system [29]."]} +{"18535749|6607209": ["Different kinds of control strategies and planning approaches have been proposed to the multi-robot/agent formation problem, with various applications, such as exploration[1], search[2], large object transportation[3] and hunting[4] [5]."]} +{"11966212|8363289": ["It is well known that the RHC strategy (also named model predictive control, and finding many applications [4], [9]\u2013[12]) possesses three advantages over other control strategies [13]: 1) the RHC can achieve (sub)optimal control performance in an iterative and practical way; 2) can handle system constraints very effectively; and 3) can deal with nonlinear dynamics."]} +{"2894203|18357056": ["[120, 121], and geometric maps are described to a greater extent in ref."]} +{"2894203|7360895": []} +{"36510460|18315024": ["Both surveys [66], [67] focus on RRT and PRM for computational biology and physics-based simulation and modeling.", "In computational biology, molecules and proteins are modeled as articulated bodies and sampling based planners are used to simulate protein folding and protein-ligand interactions [66], [67]."]} +{"37816115|9568259": [", 2004); 2) sensors and equipment can be distributed to different robots, reducing payload requirements (Parker, 2008); and 3) if one robot", "\u2026equipment can be distributed to different robots, reducing payload requirements (Parker, 2008); and 3) if one robot is lost or damaged, its function can be easily replaced by the other team members, while the loss of a single\u2026", "Multirobot cooperation requires determining which robot team members should perform certain tasks and how to coordinate these tasks properly among the team members in order to maximize the team\u2019s overall ef\ufb01ciency in successfully completing their mission (Parker, 2008).", "Multirobot cooperation requires determining which robot team members should perform certain tasks and how to coordinate these tasks properly among the team members in order to maximize the team\u2019s overall efficiency in successfully completing their mission (Parker, 2008)."]} +{"61299428|6607209": []} diff --git a/edge/graph_51880837.jsonl b/edge/graph_51880837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9ecfec5be8cffa3fc275951067ef660eafb471d --- /dev/null +++ b/edge/graph_51880837.jsonl @@ -0,0 +1,13 @@ +{"3969030|7644489": ["Furthermore, device-to-device (D2D) communication is a promising technology, which provides the efficient utilization of available radio resources to improve the connectivity of devices [4]."]} +{"45689080|1236072": ["There are many energy aware algorithms that we can use them in WSNs; but all of them aren\u2019t optimum solution [3]."]} +{"550361|11498812": ["Ironically, while mobility models have been routinely used in the evaluation of human-centric communications technologies, such as mobile ad-hoc and legacy cellular networks, the effects of mobility in mobile 5G systems that are targeting the mcMTC market are much less understood [3]."]} +{"13346735|61132": ["In contrast to the inconvenient deployment of dynamic infrastructure on land, flexible aerial relay (FAR) nodes could be effective even in remote and unreachable areas [8]."]} +{"13346735|7644489": ["However, the range of the D2D-enabled devices is not always enough to guarantee reliable communication [7]."]} +{"8326114|1940388": []} +{"8326114|17205659": []} +{"40919045|1236072": ["Wireless sensor networks enable the reliable surveillance of a variety of environment for health, military, home and civil applications [7,8].", "Clustering scheme enabling the efficient utilization of the limited energy resources of the deployed sensor nodes can effectively prolong lifetime of wireless sensor networks [7,12]."]} +{"399636|1230643": []} +{"18721617|1230643": ["We will calculate the quadratic sum of the distances from each cluster head to its member nodes in the optimal solution."]} +{"30284563|12060835": []} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} diff --git a/edge/graph_51880898.jsonl b/edge/graph_51880898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79cf11fa85888f6f09707704515cf5636b7d1b57 --- /dev/null +++ b/edge/graph_51880898.jsonl @@ -0,0 +1,10 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1001575|16013270": ["Because there has been little work in the \ufb01eld of visual prediction, existing datasets are mostly inappropriate for our evaluation [43,44]."]} +{"1001575|5755403": ["Trajectory-based activity analysis is a traditional way of modeling human activities [38,24], which leverages motion statistics to recognize different activities."]} +{"9854676|5755403": []} +{"8979634|5755403": []} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"16751130|206764452": ["This paper is not concerned with establishing the best absolute performance given various stateof-the-art discriminative models [7, 9, 11, 14 , 17, 33, 35, 36, 37, 39].", "There is extensive literature on image-based classification of pedestrians. See [11, 14 ] for recent surveys."]} +{"16751130|192934": ["The lack of explicit models has spawned the use of implicit representations, based on pattern classification techniques [18].", "Other popular classifiers include neural networks [13, 18, 36] and AdaBoost cascades [23, 33, 35, 37, 38, 39].", "neural networks or support vector machines, can be converted to an estimate of posterior probabilities [18, 28]."]} +{"15410404|38476": ["(1) Modelling long term relationships in between sequences can be considered one of the most challenging problems within the machine learning community [4, 5]."]} diff --git a/edge/graph_51881458.jsonl b/edge/graph_51881458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..423a4c8afc89ac97073e0be5b4dc63c65028a080 --- /dev/null +++ b/edge/graph_51881458.jsonl @@ -0,0 +1,19 @@ +{"110272720|15093118": []} +{"110272720|5755403": []} +{"5120196|16403716": []} +{"245832|1619901": []} +{"15275673|15527933": []} +{"26345613|4719202": ["A storage assignment (or product allocation) policy consists of a set of rules used to assign products to storage locations (Koster et al .", "A storage assignment (or product allocation) policy consists of a set of rules used to assign products to storage locations in a warehouse (Koster et al .", "The literature related to storage assignment policies can be classi\ufb01ed into three categories: rule-of-thumb policy, class-based policy and family grouping policy (Koster et al .", "Among these activities, order picking is the most labour-intensive operation in warehouses with manual systems (Koster et al ."]} +{"38767953|14038195": ["[65, 53])."]} +{"114755796|17403085": []} +{"41831637|2762484": []} +{"14763832|5822166": []} +{"62170181|4361938": []} +{"35434729|4719202": ["One storage assignment method is to create a set of rules to assign products to storage locations (Koster et al., 2007).", "In previous studies, assignment policies were mainly divided into three categories: rule-of-thumb policy, class-based policy, and family grouping policy (Koster et al., 2007).", "Among warehousing activities, order picking is the most time-consuming and labourintensive (Koster et al., 2007), and it generally accounts for 55% of warehouse operating expenses (Tompkins et al., 1996)."]} +{"18286325|206403759": ["only predictions), without integral approach which comprises other crucial elements of the successful BI solution, such as data extraction, transformation, and loading, performance, dimensional modeling, collaboration, and information delivery [19]."]} +{"12969851|4909423": ["Monitoring: The performance of learning models and produced knowledge patterns is monitored continuously through business intelligence (BI) dashboards and reporting tools (Larson & Chang, 2016)."]} +{"12969851|365692": []} +{"62258196|4719202": ["To resolve these challenges, order picking, as the most time-consuming and laborintensive activity [4], has attracted substantial attention from both researchers and practitioners."]} +{"62258196|1289787": ["The efficiency and capability of DCs depend highly on the storage allocation and order picking decisions [2, 3]."]} +{"55574832|17403085": []} +{"154060525|3102110": []} diff --git a/edge/graph_51882377.jsonl b/edge/graph_51882377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71cc5ce9a83464bf95a1e7f93e260e3e8192f8b4 --- /dev/null +++ b/edge/graph_51882377.jsonl @@ -0,0 +1,2 @@ +{"146326417|5062487": ["As an institutional entity, Facebook\u2019s existence depends on users providing and updating personal information and responding to others\u2019 materials by \u201cliking,\u201d \u201cfollowing,\u201d or posting a response comment (Caers et al. 2013).", "\u2026more ownership or investment in the community because they are not assumed to be the primary author; Facebook can therefore provide infrastructure for a community-owned space for a larger group of people more so than a blog because of its multifaceted organizational identity (Caers et al. 2013)."]} +{"147213079|206727594": ["The internet has been conceptualized as a \u2018third space\u2019 for discussing the meaning of Black identity (Brock, 2009, p. 17) and as a medium for \u2018political struggle over racial meaning, knowledge and values\u2019 (Daniels, 2012, p. 10)."]} diff --git a/edge/graph_51884397.jsonl b/edge/graph_51884397.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51885940.jsonl b/edge/graph_51885940.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5188711.jsonl b/edge/graph_5188711.jsonl similarity index 100% rename from graph_5188711.jsonl rename to edge/graph_5188711.jsonl diff --git a/edge/graph_51890377.jsonl b/edge/graph_51890377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51891449.jsonl b/edge/graph_51891449.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c092c1cfde8e006a5d91b642aa8514544950c4f --- /dev/null +++ b/edge/graph_51891449.jsonl @@ -0,0 +1,6 @@ +{"27431983|6308019": []} +{"153796951|6308019": ["Simulation Oliveira (2003), Anjos et al."]} +{"157764578|6308019": ["Our work differs from other survey papers such as Weatherford and Bodily [83] or McGill and van Ryzin [56] since we do not attempt to provide a taxonomy or an exhaustive enumeration of all the publications in the field.", "Readers are referred to the survey papers by Belobaba [7] and McGill and van Ryzin [56] for a more systematic review of the inventory (seat) control literature."]} +{"14239171|6308019": ["(2009), Liu and van Ryzin (2008), Meissner and Strauss (2009), or Zhang and Adelman (2007).", "Miranda Bront et al. (2009), Liu and van Ryzin (2008), Meissner and Strauss (2009), or Zhang and Adelman (2007)."]} +{"38708856|6308019": ["Petruzzi and Dada (1999) give a comprehensive review of this problem."]} +{"18168429|6308019": ["Our formulation essentially follows Cooper and Homemde-Mello (2003), and similar models have appeared in the literature (McGill and van Ryzin 1999).", "Published online in Articles in Advance July 20, 2007.", "The latter two references, the book (Talluri and van Ryzin 2004) and the review article (McGill and van Ryzin 1999), provide excellent, detailed reviews of the literature on other approaches to, and aspects of, the revenue management problem."]} diff --git a/edge/graph_51892887.jsonl b/edge/graph_51892887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d34c3580da7b10899a71c426b8480003dab8e3c0 --- /dev/null +++ b/edge/graph_51892887.jsonl @@ -0,0 +1,14 @@ +{"206043|1230643": ["Index Terms\u2014 Species recognition, wild animal monitor, image classification, deep convolutional neural networks, large scale learning"]} +{"3632078|8569776": []} +{"34837088|624120": []} +{"34837088|12974382": ["These tools are used together with remote sensing (Mucherino, et al., 2009) and are often combined, e.g. to use the image processing output as input to a machine learning model (Vibhute & Bodhe, 2012)."]} +{"7793417|7360895": []} +{"65126673|17485266": []} +{"65126673|3110415": []} +{"65126673|10213552": []} +{"65126673|9667820": []} +{"65126673|18599847": []} +{"65126673|9928823": []} +{"65126673|8584223": []} +{"65126673|17561208": []} +{"65126673|1626075": []} diff --git a/edge/graph_51893518.jsonl b/edge/graph_51893518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b57c2888ca5e369c9e1386704c25615b5ba05112 --- /dev/null +++ b/edge/graph_51893518.jsonl @@ -0,0 +1,5 @@ +{"28682111|35981896": []} +{"10888987|35981896": ["Over the past ten years, PAT has been evolving rapidly, and applications of PAT have been established in vascular biology [13\u201316], oncology [17\u201324], neurology [25\u201329], ophthalmology [30\u201334], dermatology [35\u201339], gastroenterology [40\u201344], and cardiology [37, 45\u201347]."]} +{"33501108|35981896": []} +{"33501108|6604384": []} +{"14431984|35981896": []} diff --git a/edge/graph_51893910.jsonl b/edge/graph_51893910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1cd2191ded3fcfbc366b405e56c0cd3d28cc1a1 --- /dev/null +++ b/edge/graph_51893910.jsonl @@ -0,0 +1,32 @@ +{"5540604|2355696": []} +{"2668908|1634674": ["A number of surveys have been published in activity recognition over the past decade [2, 27, 35]."]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"13663664|8034133": []} +{"9854676|5755403": []} +{"1644785|1634674": ["There are several existing surveys within the area of high-level human activity recognition [22, 15, 4, 1]."]} +{"20821695|1634674": ["Although considerable research has been devoted to the recognition of singleperson [36, 28, 37, 21] and two-person [31, 32] activities, less attention has been paid to group activities."]} +{"9820303|2355696": ["As per cognitive and social signaling studies, a person is considered as interacting with another person when they are close enough and at least one of them is looking at the other (Farenzena et al., 2009b; Vinciarelli et al., 2008)."]} +{"8034133|1634674": []} +{"206771654|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"15928602|4351505": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|41505326": ["It is worth mentioning, there are more than 40 datasets speci\ufb01cally for 3D human action recognition [47].", "For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|12724190": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|1262156": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"5256870|1634674": ["Human activity recognition is an important yet difficult problem that has attracted the attention of many researchers in the field of computer vision (see [17] for a recent review)."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"206592484|456491": []} +{"38140703|1634674": []} +{"29473256|23774449": ["Some related review articles have been presented [19, 23, 37]; however, these papers have not investigated specifically different action recognition approaches in temporal dimension modelling.", "Furthermore, they were particularly investigated in the area of time-series data [19] and human action recognition [23].", "[23] introduced recent human action recognition datasets and reviewed important works that applied deep learning methods to these datasets."]} +{"29473256|18599847": ["Some related review articles have been presented [19, 23, 37]; however, these papers have not investigated specifically different action recognition approaches in temporal dimension modelling.", "Furthermore, they were particularly investigated in the area of time-series data [19] and human action recognition [23].", "They obtain impressive results in learning powerful models with high capabilities of representation [19]."]} +{"29473256|9928823": ["\u2026\u2022 learning unrelated factors to the discriminating task \u2022 BMs, while having very simple learning algorithm, are very slow to compute in learning [31] \u2022 fine-tuning phase of a stochastic gradient descent learning algorithm, which makes it difficult to parallelise across-machines and deploys at\u2026", "Its hierarchical architecture makes it possible to create high-level concepts from related low-level ones where many models of this group are based on unsupervised learning [12, 31, 32]."]} +{"29473256|393948": []} +{"4333408|1634674": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8].", "In the past decade, research has mainly focused on leaning and recognizing actions from video sequences captured from a single camera and rich literature can be found in a wide range of \ufb01elds including computer vision, pattern recognition, machine leaning and signal processing [14]."]} +{"4333408|14970359": ["Review on other types of visual features, such as STIPs and skeletons, can be found in [12, 11, 14, 8]."]} +{"6726756|14116122": ["Among these ones, action and activity recognition displays a crucial role in human-robot interaction, autonomous driving vehicles and video-surveillance [2]."]} diff --git a/edge/graph_519014.jsonl b/edge/graph_519014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51908395.jsonl b/edge/graph_51908395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4d8f1efe0975a83485fc5764032bdac871542ea --- /dev/null +++ b/edge/graph_51908395.jsonl @@ -0,0 +1,5 @@ +{"2975466|10859599": ["Results show the survivability achieved on the routing service under different conditions and attacks."]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} diff --git a/edge/graph_51909308.jsonl b/edge/graph_51909308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d8e8982661e36dc60a1a6f205adfc0c8e8fbff5 --- /dev/null +++ b/edge/graph_51909308.jsonl @@ -0,0 +1,63 @@ +{"2534840|15300368": []} +{"2534840|17205659": []} +{"6460187|7774517": ["Even the anomaly detection techniques for distributed sensor systems, as surveyed in [3], [13], [14], are mostly centralized, or trained offline."]} +{"6460187|50458504": ["Anomaly detection, also known as fault detection or outlier detection, is of increasing interest to researchers and developers of a wide range of applications, from fraud detection for credit cards [9], intrusion detection in security [10] or military applications [11], to (sensor) fault detection in safety critical systems [12]."]} +{"24674820|1940388": ["These monitoring mechanisms are especially challenged by malicious data modification attacks, such as the so-called data tampering, environmental tampering, or tampering attack [4, 5]."]} +{"24674820|1236072": []} +{"42864739|1230643": ["In general, a WSN consists of a large number of low cost and densely deployed battery-powered sensor nodeswithwireless communication, sensing, processing, and storage capabilities [6].", "The latest developments in distributed computing andmicroelectromechanical systems have enabled in the past years the emergence of various wireless sensor networks (WSNs) applications comprising military [1], home automation [2], smart building [3], healthy and medical application [4], vehicle and target tracking [5], and industry domains [6, 7]."]} +{"6820964|6959212": []} +{"12180419|3474164": ["However, there has been research into using software-defined networking (SDN) as a solution to the inherent problems of WSNs [6]."]} +{"12180419|24110634": ["On the application layer, authentication and authorization is the main concern therefore most of the solutions to application layer security include validation and verification models [5].", "This is a consideration that has been subject to research within the SDN and WSN paradigms individually; however, in terms of SDWSN this has not received much attention due to the focus on the SDWSN architecture itself [5].", "Using a SDN approach to WSN results in a new paradigm called software-defined wireless sensor networking (SDWSN) [5].", "Examples of active attacks include DoS, wormhole, hello flood, Sybil, blackhole/sinkhole, data modification and spoofing [5], [27], [28], [32], [33].", "When expanding WSNs, inherent problems due to resource constraints such as limited processing and storage, communication bandwidth and energy [3], [4] become increasingly significant due to the lack suitable network management and incapability of heterogeneous-node network realization [5].", "One of the most important features that SDN brings to WSN is the fact that the sensor node can only accept control commands due to the separation of control logic [5].", "The centralization of control results in the centralization of security management and coupled with the fact that the SDN approach partially frees up WSN resources, this allows for the implementation of more resource intense security measures in WSNs [5].", "Using an SDN approach to WSNs results in the decoupling of the data and control plane, thus solving most of the inherent problems with WSNs [5], [12].", "While symmetric cryptography solutions are preferred due to low implementation cost and efficiency [5], they present many problems when managing large networks and attempts to improve this cryptography for WSNs [11] have resulted in the cost of resources.", "1, the security measures could still be implemented on the control or application plane [5]."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"17455861|7774517": ["This approach increases the accuracy and robustness of outlier detection technique (Zhang et al. 2010).", "The main differences between event detection and outlier detection are summarized in Table 1 (Zhang et al. 2010).", "This is the concept of multi-level outlier detection (Zhang et al. 2010)."]} +{"17455861|3330313": ["It processes the data as a static distribution, and flags the most remote points as potential outliers, without the need of a pre-defined normality/abnormality model (Hodge and Austin 2004).", "A certain measure criteria, for example distance based approaches, is used to measure the outlier (Hodge and Austin 2004).", "This work is different from other survey papers (Chandola et al. 2009; Hodge and Austin 2004; Rajasegarar et al. 2008a), in that, it summarizes the analysis criteria of outlier detection techniques into a single discussion, specifically in the context of harsh environments.", "In contrast, non-robust classifier methods produce representations which are skewed (Hodge and Austin 2004).", "Based on the type of data available from sensors, the techniques are classified as Hodge and Austin (2004):", "This boundary may be hard, where a point lies wholly within or wholly outside the boundary, or soft, where the boundary is graduated depending on the underlying detection algorithm (Hodge and Austin 2004).", "The normal points could be classified into a single class or subdivided into distinct classes according to the requirements of system to provide a simple normal/abnormal classification (Hodge and Austin 2004).", "This approach models only normality or abnormality (Hodge and Austin 2004; Rousseeuw and Leroy 1996)."]} +{"17455861|1230643": ["\u2026health monitoring, battlefield observation, industrial safety and control, etc. (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d; George 2010).", "Extensive work has been dedicated for various applications of WSNs (Zhang et al. 2007a; Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; George 2010).", "Some of the formal and earlier methods of outlier detection such as Grubbs test and tietjen moore test (Akyildiz et al. 2002) require the specification of fixed number of \u2018outliers to be detected\u2019, whereas Ramaswamy et al.", "Some of the formal and earlier methods of outlier detection such as Grubbs test and tietjen moore test (Akyildiz et al. 2002) require the specification of fixed number of \u2018outliers to be detected\u2019, whereas Ramaswamy et al. (2000) requires the specification of an upper bound on the suspected number\u2026", "1.1 Harsh environments\nVarious applications of WSNs have been studied extensively in literature (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d).", "Various applications of WSNs have been studied extensively in literature (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d)."]} +{"17455861|50458504": ["The sensor nodes are equipped with a magnitude of capabilities like sensing, processing and wireless communication.", "1.1 Harsh environments\nVarious applications of WSNs have been studied extensively in literature (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d).", "\u2026health monitoring, battlefield observation, industrial safety and control, etc. (Garca-Hernndez et al. 2004; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010c,b; Phua et al. 2010d; George 2010)."]} +{"207172599|3330313": []} +{"5992166|1230643": ["Existing anomaly detection techniques in WSNs tend to make a decision instantly for each test data point, based on\nManuscript received October 5, 2015; revised January 24, 2016; accepted August 16, 2016.", "In this paper, we propose a segment-based anomaly detection algorithm which combines the KDE and KL divergence to tackle global long-term anomalies that impact on a collection of nodes in a WSN. Based on the global PDF tracked by an innovative distributed segment-based recursive KDE, a decision is made by analysing any variations occurring\nin the sequence of the KL divergence between every two temporally successive PDFs while the communication cost is greatly reduced by using the approximated KL divergences.", "Obviously, centralised information collection and processing is the key point to simultaneously exploit temporal and spatial correlations which, however, may incur a high communication cost that WSNs can hardly afford.", ", hierarchical or flat [19], can be achieved differently.", "In addition, anomaly detection itself can also be an application of WSNs, for example target detection [2].", "In a flat WSN, each node collects information from its neighbouring nodes and, then, makes an initial decision about suspicious neighbours after spatially and temporally analysing the collected information.", "In WSNs, anomaly detection is essential in dealing with cyber- attacks and random faults [1].", "Particularly, this paper aims to produce a general algorithm for detecting the existence of global long-term anomalies and, in order to meet the resource constraints of WSNs, in-network processing and distributed computing are preferred to minimise the communication costs.", "In this context, distributed computing, relying on the key idea of transmitting summarised information among nodes, is an effective way to reduce communication cost for WSNs.", "In a hierarchical WSN that comprises many clusters, each cluster head (CH) integrates the local information collected from its member nodes (MNs) to produce a cluster-wide global normal profile.", "This has been demonstrated by the observation that the communication cost can be up to several orders of magnitude higher than the computational cost in a WSN [19].", "I. INTRODUCTION\nWSNs have found many applications in military andcivilian fields, ranging from battlefield surveillance and industrial control to drug administration in hospitals and connections of white goods in \u2018smart-homes\u2019."]} +{"3494096|3474164": []} +{"3494096|24110634": []} +{"3494096|4427557": []} +{"3494096|2871699": ["M2M communications have been extensively reviewed in the literature [1], [31]\u2013[36].", "Pereira and Aguiar [31] discussed on European Telecommunication Standard Institute (ETSI) standard and application protocols while considering mobile devices such as smartphones to be used as mobile gateways for other connected devices with constrained capabilities and the process of aggregating data from embedded sensors in M2M network architecture."]} +{"3494096|2521001": ["Smart homes are expected to communicate regularly with their environments (internal and external) [17]."]} +{"3494096|121289": []} +{"2262661|393948": ["DNN has deep architectures\u2014including multiple hidden layers\u2014and each hidden layer alone conducts a non-linear transformation from the previous layer to the next [29,30]."]} +{"3491029|14132386": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|17872696": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|3117516": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|1236072": []} +{"3491029|1708582": []} +{"16698502|1940388": ["Index Terms\u2014missing data imputation, anomaly detection, Multivariate analysis, response/tolerance schemes, survivability, wireless sensor networks\nI. INTRODUCTION\nSensor networks are composed of a number of sensing elements deployed to monitor some physical variables for a given area [1]."]} +{"16698502|1236072": ["This work has been partially supported by Spanish MICINN through project TEC2011-22579 and by the FPU P6A grants program of the University of Granada.", "This paper introduces a tolerance approach to fight against data modification attacks in WSNs, which is based on a missing data imputation scheme."]} +{"16698502|10859599": ["The loadings in PCA capture the relationships among the data variables.", "For that, it is important to be aware of the existence of several inherent threats in WSNs [3]: packet dropping, route poisoning, identity spoofing, etc."]} +{"13957935|18801114": ["Manuscript received April 16, 2015; revised November 18, 2015 and April 17, 2016; accepted May 15, 2016."]} +{"32548209|24110634": []} +{"32548209|4427557": ["The LPWAN [75]"]} +{"32548209|485843": ["effectiveness [26]\u2013[31]."]} +{"32548209|41998167": ["The issue of resource constraint has been highlighted in [1]\u2013[4]."]} +{"32548209|18037424": ["The SG communication architecture presented by the work in [20] utilizes the NIST Framework, though not in the context of the CRSN approach for the SG.", "Also, [20] conducted a review of communication and networking technologies in SGs."]} +{"17133399|822353": ["[11] provided a perspective on the current state of image mosaicking parallelization for large scale applications."]} +{"1862492|6332923": ["With the continual growth in expected duration of the average human lifetime (Kumar & Lee, 2012), the rise in population and number of elderly persons has led to inflated healthcare costs and shortage of professionals able to provide the care and treatment necessary to satisfy this increase in\u2026"]} +{"1862492|7774517": []} +{"17440175|7774517": ["Surprisingly, most anomaly detection methods available in the literature are based on an offline, centralized data processing paradigm, as evidenced in the recent surveys [10, 45, 46]."]} +{"17440175|12815020": ["It has also been used in several other domains, as summarized next."]} +{"17440175|50458504": ["It has also been used in several other domains, as summarized next."]} +{"9308964|9436742": ["To address aspects associated with fault-tolerance, topics related to redundancy, coordination and self-stabilization should then be addressed as well [68]."]} +{"15335544|905827": []} +{"2763987|5860048": ["The authors in [4], not only classify the methods according to the underlying techniques, but also categorise them in terms of data dimension, model structure, operation mode, adaptability to changes and types of correlations exploited."]} +{"2763987|7774517": ["These anomalies are generically referred to as outliers, and in the context of WSNs they can be regarded as measurements that significantly deviate from the normal pattern of sensed data [2].", "For example in [2], the authors categorise those techniques as statistical-based, nearest neighbour-based, clustering-based, classification-based and spectral decomposition-based, with some of these being further categorized, while [3] classifies the methods as statistical, data mining/computational intelligence, rule based, hybrid, game theory and graph based approaches."]} +{"2763987|1230643": ["This kind of infrastructure is becoming increasingly used in many fields, such as in environmental contexts, habitat monitoring, health monitoring or military surveillance, just to name a few [1]."]} +{"6556803|14132386": ["Moreover, routing protocols are responsible for discovering the optimized routes in multi-hop transmissions [48]."]} +{"6556803|28670512": ["can be transformed to an MDP with belief state [34], [35]."]} +{"6556803|9494512": ["In many locations, solar energy is considered the most practical source for WSN recharging [88]."]} +{"6556803|12060835": [", thermal and radiant energy, for a sensor node\u2019s battery [85]."]} +{"5874340|7774517": []} +{"30840048|6430931": ["T-cells follow the same procedure for defense as B-cells but they also scan fragments of antigens that are present at the surface [15].", "The Human Immune System (HIS) has efficiently saved our bodies from harmful attacks of pathogens like bacteria, parasites, and viruses [15]."]} +{"18223203|17205659": ["With high resource constraint and vulnerability of wireless sensor node, security is a very important problem [1], [2]."]} +{"14021333|7774517": ["Branch et al. [24] attempted to reduce the communication overhead in WSNs through broadcasting a reduced set of data to neighborhood nodes.", "The paradigm related to the normalization of training data in a distributed manner in WSNs has already been well reported in the literature, such as [13].", "Consequently, the hyper-grid kNN-based AD is in particular suitable for monitoring WSNs. Taking into account the specific requirements, in this work we will make the following improvements on the standard hyper-grid kNN-based AD.", "The parametric AD schemes require lower computational overhead by utilizing some priorknowledge , which is not suitable for monitoring WSNs.", "Wing to resource constraints, cryptography based security mechanisms are not adequate to handle sophisticated adversaries in WSNs [1].", "Most of the existing AD techniques, which analyze data in an offline manner, fail to handle streaming data of sensor nodes [4].", "In the context of WSNs monitoring, AD is required to be simple in computation, being able to operate online in a distributed manner in real-time, and work independently without the prior-knowledge.", "The operation in a distributed manner makes sense to improve AD performance in WSNs [4], and prolongs the lifetime of the networks.", "As a branch of ID, AD [2][3] is very well suited for WSNs due to the following reasons: 1) it requires a smaller memory than misuse/signature ID; 2) it needs little or no prior-knowledge; and 3) it is highly efficient against unknown types of cyber-attacks.", "A novel scalable kNN-based AD scheme is proposed for monitoring WSNs based on a hyper-grid, which can operate online in a distributed manner.", "However, this kind of recursive optimization procedures, such as GA and CV, are not suitable to WSNs due to their prohibitively high resource consumption.", "With the help of some other techniques, online kNN-based AD may be applied to WSNs, such as the KDE-based schemes [16][17].", "Intrusion detection (ID) often serves as the second line of defense to protect WSNs from cyber-attacks.", "Thus, neither of them is suited for monitoring WSNs.", "As a result, the hyper-grid distance-based AD schemes are well suited for monitoring WSNs.", "Working in unattended and noisy environments, WSNs face many random faults.", "Hence, this type of AD technique is not suitable for WSNs.", "Hyper-grid kNN-based AD seems to be a suitable solution for WSNs."]} +{"14021333|3330313": ["Assume J(y) is comprised of C1, \u00b7 \u00b7 \u00b7 ,Cw, w \u2208 [2,3] and the overlaid regions are z1, \u00b7 \u00b7 \u00b7 , zw, respectively.", "As a branch of ID, AD [2][3] is very well suited for WSNs due to the following reasons: 1) it requires a smaller memory than misuse/signature ID; 2) it needs little or no prior-knowledge; and 3) it is highly efficient against unknown types of cyber-attacks.", "Usually, anomaly may be defined with a variety of equivocal measures, such as \u201dan observation that appears to be inconsistent with the remainder of the data set\u201d [3], and \u201da pattern in a data set that does not conform to a well-defined notion of normal behavior\u201d [2]."]} +{"14021333|1230643": ["As a result, the centralized data collection in AD is impractical for any sensor node alone [7]."]} diff --git a/edge/graph_51917353.jsonl b/edge/graph_51917353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51918509.jsonl b/edge/graph_51918509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f7a7343400ab4e09035697214dbbca42ed1b22a --- /dev/null +++ b/edge/graph_51918509.jsonl @@ -0,0 +1,13 @@ +{"11454671|27533715": ["Assuming that the final agreement generalises [19], half of the remaining statements was then coded by the first, the other half by the second rater."]} +{"1919851|17221751": ["A full review of work in facial landmark detection, head pose, eye gaze, and action unit estimation is outside the scope of this paper, we refer the reader to recent reviews of the field [17, 18, 30, 46, 51, 61].", "Over the past few years, there has been an increased interest in machine understanding and recognition of affective and cognitive mental states and interpretation of social signals especially based on facial expression and more broadly facial behavior [18, 51, 39].", "portant building block in nonverbal behavior and emotion recognition systems [18, 51].", "Over the past years there has been a huge amount of progress in facial behavior understanding [18, 51, 39]."]} +{"1919851|16010181": ["A full review of work in facial landmark detection, head pose, eye gaze, and action unit estimation is outside the scope of this paper, we refer the reader to recent reviews of the field [17, 18, 30, 46, 51, 61]."]} +{"34070386|9823584": ["[5] [17] and [21] present more detailed reviews to the development of gaze tracking techniques."]} +{"15991884|4361938": ["As advances in recent years (shown in Figure 1) continue to improve the cost, accuracy, and portability of eye tracking systems, eye trackers are becoming an ever more integral part of the daily routine of many [3]."]} +{"11124788|2906926": []} +{"11124788|2532914": []} +{"3769380|6387482": ["This strategy offers the possibility of analyzing each modality separately and in the most convenient way for each one [11]."]} +{"3769380|16540884": ["There are three levels of fusion: data level, feature level and decision level [10].", "The major inconvenient of this fusion is to not able to resist noise because the pre-processing phase is absent [10]."]} +{"61081749|4361938": ["(4) Passive eye monitoring is useful for diagnostic applications in which the user\u2019s visual behavior is only recorded and stored for later of\ufb02ine processing and analysis with no immediate reaction or effect on the user\u2019s interaction with the world (Duchowski 2002)."]} +{"10921627|7761990": ["A variety of methods, such as independent component analysis (ICA) (Calhoun et al., 2009), has also been proposed to facilitate the combination of pupillometry with fMRI, EEG, genetic, or other data.", "A variety of methods, such as independent component analsis (ICA) (Calhoun et al., 2009), has also been proposed to facilitate he combination of pupillometry with fMRI, EEG, genetic, or other ata.", "A review of group ICA for fMRI data and ICA for joint inference of imaging, genetic, and ERP data."]} +{"12770077|4361938": ["Presentation Modalities of Workload Tasks In many studies where eye-tracking data were used as indices of mental workload, the task used to induce workload was often a visually-based stimulus [7]."]} +{"5064642|4361938": ["Duchowski [15, 16] performed a literature survey about current eye tracking applications and technologies."]} diff --git a/edge/graph_51922170.jsonl b/edge/graph_51922170.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68e7364924461672933aa38f7f3a41ef050fc541 --- /dev/null +++ b/edge/graph_51922170.jsonl @@ -0,0 +1,7 @@ +{"9260098|10996225": ["Its seven steps are shown in the Figure 2."]} +{"9260098|54746333": []} +{"2422590|7158350": ["In our case, we focus on the most widely used neural networks: feedforward multilayer networks, also known as multilayer perceptrons (MLP\u2019s) [47]."]} +{"960776|192934": ["This seems underconstrained, especially when rules of thumb suggest that one needs ten times more examples than features [18]."]} +{"44175270|26690303": ["Existing intrusion detection and prevention models generally use statistical approaches [15] such as Hidden Markov Model (HMM) [15], Bayes theory [16], cluster analysis [17], signal processing [18] and distance measuring [19] to detect anomalous activities."]} +{"207288887|192934": ["Feature selection is important for many pattern classification systems [13,16,17]."]} +{"37935010|10996225": []} diff --git a/edge/graph_51922885.jsonl b/edge/graph_51922885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..595e50436f60a578ffe0bbe6cbc7b1a39b416bbb --- /dev/null +++ b/edge/graph_51922885.jsonl @@ -0,0 +1,35 @@ +{"29863164|2623404": []} +{"15880558|2623404": ["At the same time, Software-Defined Networking (SDN) [6] [7] allows decoupling the data plane (traffic forwarding) from the control plane (routing decision) in the network."]} +{"212826|2535224": ["Initially designed for wired networks, Software De\ufb01ned Networking (SDN) has been recognized as an attractive and promising approach for wireless and mobile networks too [7]."]} +{"32582628|2623404": ["[7] presented an overview of previous works focusing on programmable networking which are the origin of the current SDN paradigm.", "The Software-Defined Networking (SDN) [7], [8] is a paradigm for network architectures assuring the development of new routing and forwarding approaches.", "are studied in different surveys [7], [8], [30]."]} +{"52119194|7971188": [", Mobile IP (MIP) [4], peer-to-peer (P2P) networks [5] and content delivery networks (CDNs) [6], which can patch the existing Internet architecture but only superficially bridge the gap between the limited network service capabilities and increasing user needs [1], [7]\u2013[9]."]} +{"42348870|11414835": []} +{"42348870|2623404": ["[20], [21] provide a general overview of SDN, while other papers are focused on more specific topics like security [22]\u2013 [24], programmability [25], network virtualisation [26], the controller plane [27], or its application to other network types such as optical networks [28] or mobile networks [29]."]} +{"42348870|10693567": ["tions [30]\u2013[32], some of which deal briefly with TE [33], [34]."]} +{"42348870|525062": ["As explained in [54], packet-level multipath routing can entail TCP seg-"]} +{"42348870|16332018": ["For further information regarding network virtualisation with OpenFlow (see [26], [89], [90])."]} +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"24937434|7971188": ["fic they serve, including files, movies, songs, etc, but they are limited in the sense that they use specific protocols for their operation [8], [9]."]} +{"24937434|14697846": []} +{"24937434|9104850": ["Due to this similarity, only a small number of off-path caching mechanisms have been proposed, such as [27], [28], and [40]\u2013[42], complementing the existing literature on optimized distributed caching [43]\u2013[46]."]} +{"10311979|206584087": ["Many papers classify DDoS attacks and their detection/prevention mechanisms [49], [50], [51]."]} +{"10311979|6670217": ["Additionally, many attacks that occur in other environments may also appear in ICN environments [19], [20], [21], [22], [23], [24]."]} +{"10311979|7971188": ["ICN has some similarities and differences with other related technologies like distributed database (DDB), data grids, peerto-peer networks (P2P), content distribution networks (CDN), and cloud computing [4], [5]."]} +{"7049202|3583771": []} +{"3448138|6583734": ["We can also find that the MA of [50] is 0.", "In SD-NFV, the underlying SDN infrastructure is abstracted to realize virtualized network paths that provide connectivity to support the inter-connection between Virtual Network Functions (VNF) and with the end-points.", "In our DLCPP, the simulation results confirm that it is sufficiently accurate to set r \u2032s value to 1.", "Thus, considering the overhead of SDN incurred by DLCPP, [50] is selected as the default configuration of the hidden layer in this paper.", "Function Virtualization (SD-NFV) [50] to perform this function when DLCPP is deployed on the real network.", "As shown as Figure 14, we can employ Software-Defined Network\nVOLUME 6, 2018 5087\nFunction Virtualization (SD-NFV) [50] to perform this function when DLCPP is deployed on the real network.", "We also find that the AR model gradually becomes closer to NN when slot times rise, and the AR model exceeds NN when slot time increases to 80(k = 16).\nc: EFFECT OF NODE NUMBER AT INPUT LAYER (SPATIAL DIMENSION n) For DLCPP, it is easy to understand that a larger n (input layer\u2019s node number) can collect more information; thus, DLCPP\u2019s prediction is better. n is a spatial dimension of input for DLCPP.", "We select some nodes within it to build the DLCPP,\nVOLUME 6, 2018 5081\nand the DLCPP\u2019s prediction output is sent to the controller.", "However, as shown in Section IV, benefiting from the greater prediction accuracy of DLCPP, CPC obtains a satisfactory performance gain even with this simple method.", "For DLCPP, there are two types of overhead: communication and computation.", "NN is also inferior to DLCPP, which could possibly be because the structure of NN is so simple that NN cannot capture rich features among network nodes; more importantly, NN cannot handle and utilize spatial information among nodes."]} +{"2788178|39936276": ["Therefore, performing name-based routing in each node in the path between nodes could be extremely costly, which results in an increased delay and bandwidth [9]."]} +{"37106027|12527758": ["It adds a strategy layer and a security layer to accomplish the tasks of data packet forwarding and encryption [3]."]} +{"3661612|193574": [", componentlevel, link-level and network-level) have been proposed to address the energy efficiency issue in ICN, such as hardware optimizations [39]\u2013[41], shutdown techniques (also known as on/off and sleeping solutions) [4], [42]\u2013[44], adapting the rate of network operation to the current offered workload [45], and energy-efficient cache strategies [46]\u2013[48].", "suggested to put routers and switches to sleep [97], and then conducted a seminal work dealing with on/off approaches where they proposed two solutions to reduce energy wastage [39]:", ", power on/off button, low power mode, port auto power down) [39]."]} +{"3661612|7686677": ["Generally speaking, energy efficiency metrics used in traditional telecommunication systems can be classified into three main categories: facility-level, equipment-level and networklevel metrics [71]."]} +{"3661612|7971188": [", Mobile IP (MIP) [4], peer-to-peer (P2P) networks [5] and content delivery networks (CDNs) [6], which can patch the existing Internet architecture but only superficially bridge the gap between the limited network service capabilities and increasing user needs [1], [7]\u2013[9]."]} +{"31344042|2623404": []} +{"31344042|10693567": []} +{"206904221|4718973": ["Proxy [34] Flow, session Mapping, rewrite and routing Similarity detect, caching, proxy rule", "Firstly, due to the fact that middle-boxes are standalone and closed, they naturally introduce new failures when they crash, and the diagnosis for these failures and some mis-configurations would be rather complex [34] ."]} +{"206904221|20991784": []} +{"206904221|9495329": []} +{"206904221|11414835": []} +{"206904221|4269723": []} +{"206902728|17248887": []} +{"206902728|2623404": []} +{"206902728|10693567": ["Furthermore, OpenFlow has proven to be ideal for the development of prototype network applications [21]; based on this success, research in this field has increased [22]."]} +{"206902728|2387055": []} diff --git a/edge/graph_51922975.jsonl b/edge/graph_51922975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..308346cb36160ba9a877b25739fa57694c0dbcd1 --- /dev/null +++ b/edge/graph_51922975.jsonl @@ -0,0 +1,16 @@ +{"206454765|8909218": []} +{"18474215|11210789": ["Moreover, if the destination node moves to a new location, its information which embedded in the packet header will never be updated [2].", "\u2026ad hoc networks; the most important characteristics are: high mobility, self-organization, distributed communication, road pattern restrictions, and no restrictions of network size [2]-[4], all these characteristics made VANETs environment a challenging for developing efficient routing protocols.", "However, the control packet overhead is increased as well as data delivery delay; due to the increased number of retransmission packets [2].", "This scheme can provide a good scalability for large networks; however it may increase network overhead and delays in highly dynamic network [2], [14].", "However, they have degraded performance in highly mobility and density network that when compare them with the reactive routing protocols, moreover unused routes consume the available bandwidth and increase the network overhead [2].", "Some publications remark geocast routing is actually a multicast position-based routing [2], [7]."]} +{"18474215|1762301": ["Moreover, it is not appropriate for highly dynamic topologies [17].", "However, it causes large delays in a route discovery, also route failure may require a new route discovery which produces additional delays that decrease the data transmission rate and increase the network overhead [17].", "The weakness of ZRP protocol is that it performs like a pure proactive protocol particularly for large size zones; however for small zones it performs similar to a reactive protocol [17].", "Generally, the hybrid routing protocols have a higher scalability than pure proactive and pure reactive protocols; because of reducing the number of rebroadcast messages which achieved by allowing network nodes to work together and the most appropriate nodes are used to setup a route [17].", "After the message reaches the destination node (or to the node which has a route to the destination), this node will send a route reply message back to the source node using unicast communication [17]."]} +{"114628552|4395259": []} +{"18165463|1314237": []} +{"18165463|15093118": ["Smartphone cameras can for example be used to aid an inertial navigation system [102], to detect or track surrounding vehicles [103], to estimate the gaze direction of drivers [104], to detect traf\ufb01c signals [105], or to detect traf\ufb01c signs [106]."]} +{"654549|3348390": ["With the advent of Internet of Things (IoT), providing context-aware computing on large volumes of sensor data becomes crucial [14]."]} +{"27353195|2835258": []} +{"14356939|3348390": []} +{"21130333|3330461": ["Interference needs to be adequately mitigated through proper resource allocation algorithms [10] that, unlike traditional LTE scheduling, can enforce spatial reuse [11], which allows different transmissions to be allocated in the same RBs by improving the spectrum utilization."]} +{"21130333|17934515": ["This strategy suffers from larger spacing errors between vehicles as the platoon size grows [1].", "Different control strategies (the type of information required by the control algorithm and the consequently provided stability features) may be considered when designing the CAM dissemination policy [1].", "It is a complex system that integrates computing, communication, and control technologies [1].", "c o m / t r a m in o Vehicles in a platoon follow the same path, driving close to each other and keeping a fixed distance between vehicles in the order of 10 m [1]."]} +{"44737024|12743696": ["Cloud-based tools such as OnStar have enabled real time access to OEM diagnostic data and heuristics [5]."]} +{"35205982|17594297": ["[121] provide detailed background discussion on IBC and give an overview of IBC applications in mobile ad-hoc networks."]} +{"18459774|3348390": ["Therefore, there are not any standard definitions for this research other than a few survey articles [15, 91]. technologies have enabled computers and similar devices to observe, identify and understand the world without the limitations of human-entered data.", "In fact, one of the most essential elements in the IoT is wireless sensor networks (WSN) [91]."]} +{"9803490|8363289": []} +{"16758368|164835": ["The idea of using radio-range techniques for measuring the distance (radiolocation) between a sender and a receiver is mainly discussed in [7]."]} diff --git a/edge/graph_51923343.jsonl b/edge/graph_51923343.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24cc7be0d12ab24cb807d6517731731671c82aec --- /dev/null +++ b/edge/graph_51923343.jsonl @@ -0,0 +1,2 @@ +{"61769337|1142274": ["Allahverdi et al. [ 1 ] surveyed more than 300 papers published in recent years that consider setup."]} +{"2068649|12846121": ["In the literature on dynamic scheduling problems, predictivereactive scheduling strategies have been widely used in manufacturing systems, where schedules are revised in response to dynamic factors [16]."]} diff --git a/edge/graph_51923615.jsonl b/edge/graph_51923615.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fff16036f80cda0b68afc61daa979c65ae288fac --- /dev/null +++ b/edge/graph_51923615.jsonl @@ -0,0 +1,8 @@ +{"117119697|9072047": []} +{"110433896|15485264": []} +{"52078601|3053192": []} +{"73612841|31086789": ["Meanwhile, with the construction of smart grid, the advanced measurement, communication, and computation techniques are available for implementation of online stability prediction [2]."]} +{"610178|8363289": []} +{"117322393|11567103": []} +{"116181313|15485264": []} +{"116360601|31086789": []} diff --git a/edge/graph_51927215.jsonl b/edge/graph_51927215.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3140de51233c3ed9bae821814c5e6666f9ed0aaa --- /dev/null +++ b/edge/graph_51927215.jsonl @@ -0,0 +1,8 @@ +{"31451365|14821955": ["However, there are different hippocampal segmentation protocols which produce different shapes of the hippocampus [17]."]} +{"2822008|7761990": ["There are a wide variety of group ICA approaches for multi-subject fMRI data [18].", "Their approach may not work well if the temporal dynamics are different across subjects, such as in a resting state study [18]."]} +{"21249120|6116761": ["It therefore represents an empirical characterization of the temporal relationship between regions, without indicating how the temporal covariation is mediated (Friston, 2011; Friston and Buchel, 2007).", "A further consideration, which is relevant for both static and dynamic analyses, is how best to model fMRI data so as to reveal the relationships among a network of regions (Friston, 2011; Smith et al., 2011; Varoquaux and Craddock, 2013).", "FC is quantified with metrics such as correlation, covariance, and mutual information between the time series of different regions, wherein the temporal and spatial scales examined are determined by the question of interest (Bressler and Menon, 2010; Bullmore and Sporns, 2009; Friston, 2011)."]} +{"8057200|18093722": ["examined specifically how atlas choice can affect resulting structural and functional connectomes [196].", "However, it should be noted that changing parameter settings or using different methods at each pipeline stage has been shown to have a significant impact on results [196, 109, 203, 140, 27]."]} +{"8057200|5835640": ["Of the papers covered in this review, the median number of basic edge features in each connectome was M = 2850, giving rise to the cannonical problem of N M [120], known as the high dimensional small sample size (HDSSS) problem.", "\u2019s review (2014) examined papers across all neuroimaging modalities but focused only on feature selection and dimensionality reduction techniques [120]."]} +{"52277745|207203830": ["However, a fundamental limitation of the above methods and works reviewed in [14] consists in either identifying correlational features or discriminative features for stratifying dementia states."]} +{"37651172|5835640": ["For this reason, reducing the feature dimensionality, by which we can mitigate the over\ufb01tting problem and improve a model\u2019s generalizability, has been considered as a prevalent step in building a computer-aided AD diagnosis system as well as neuroimaging analysis [6]."]} +{"3954193|393948": ["To do this, we adapt the so-called deep learning architectures that have been shown to yield state-of-the-art performance in several computer vision and machine learning applications [17,18,20,21].", "This new disease marker (which we refer to as randomized denoising autoencoder marker, rDAm) is a machine learning module based on certain extensions of recent ideas in \u201cdeep learning\u201d that yield state-of-the-art results in computer vision, natural language processing, and machine learning [17,18]."]} diff --git a/edge/graph_51928030.jsonl b/edge/graph_51928030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51929263.jsonl b/edge/graph_51929263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f9575891112c57f6c15d2962e87631530edc514 --- /dev/null +++ b/edge/graph_51929263.jsonl @@ -0,0 +1,9 @@ +{"1033682|174797842": []} +{"12757870|393948": ["Recent studies reveal that deep networks (Bengio et al., 2013) can learn more transferable representations than traditional hand-crafted features (Oquab et al.", "Deep networks learn abstract representations that disentangle the explanatory factors of variations behind data (Bengio et al., 2013) and extract transferable factors underlying different populations (Glorot et al."]} +{"195345762|393948": ["Deep networks [4] can learn more transferable representations than traditional hand-crafted features [27, 40].", "Deep networks learn abstract representations that disentangle the explanatory factors of variations behind data [4] and extract transferable factors underlying different populations [10, 27], which can only reduce, but not remove, the cross-domain discrepancy [40]."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"745350|393948": []} +{"1726265|7559976": ["Domain adaptation seeks to learn from related source domains a well performing model on target data distribution [4]."]} +{"11321040|5671282": ["Since discrete optimization of Equation (1) with binary constraints hi \u2208 {\u22121, 1}K is very challenging, for ease of optimization, continuous relaxation is applied to the binary constraints, as widely adopted by existing hashing methods (Wang et al. 2014).", "An advantageous solution is hashing methods (Wang et al. 2014), which transform highdimensional data into compact binary codes and generate similar binary codes for similar data items.", "The continuous relaxation (Wang et al. 2014), i.e. solving the discrete optimization of hash codes by more viable continuous optimization, may give rise to two important issues widely ignored by previous learning to hash work: (1) uncontrollable quantization error by binarizing continuous\u2026", "Refer to (Wang et al. 2014) for a comprehensive survey.", "Since discrete optimization of Equation (1) with binary constraints h i \u2208 {\u22121, 1} K is very challenging, for ease of optimization, continuous relaxation is applied to the binary constraints, as widely adopted by existing hashing methods (Wang et al. 2014)."]} +{"11321040|393948": ["\u2026revolution in deep learning shows that deep convolutional neural network (CNN) (Krizhevsky, Sutskever, and Hinton 2012; Lin, Chen, and Yan 2014; Bengio, Courville, and Vincent 2013) can automatically learn effective image representations that yield breakthrough performance on general computer\u2026"]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} diff --git a/edge/graph_51930417.jsonl b/edge/graph_51930417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eaaf45d08be66eb100c45d8423712971fed8fb2a --- /dev/null +++ b/edge/graph_51930417.jsonl @@ -0,0 +1,2 @@ +{"7759006|393948": [", DBN [63], Stacked CAE [63], Deep GSN [62], and GAN [19] in Table 2, where both descriptor and generator network outperform other baseline models.", "[19], [62], [63] for evaluating generative models with nontractable likelihoods."]} +{"37925315|12681089": []} diff --git a/edge/graph_51935081.jsonl b/edge/graph_51935081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..335f4e1550760c19a677d24e023ed80842fa597b --- /dev/null +++ b/edge/graph_51935081.jsonl @@ -0,0 +1,9 @@ +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"64540876|5747564": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"23893250|925507": ["As mentioned in Section I, one of the main barriers to enable a decentralized private-by-design IoT supported by the blockchain is scarce scalability of the present blockchain system (see our literature review [5] for more detailed information).", "However, before adopting P2P and blockchain technologies in the IoT, some important technical issues have still to be addressed, as we observed in previous work [5]."]} +{"51613885|207209718": ["Some surveys [25, 89] have discussed intrusion detection systems (IDS) in wireless sensor networks and Internet of Things and have provided analysis and comparison of the main existing IDSs."]} +{"31840250|925507": ["In addition to bugs and vulnerabilities due to poor design and technological choices, smart meters have limited computational power, like most IoT devices.", "The integration of the IoT with smart grids has opened new opportunity in the energy market, by relying on the interoperability and interconnection of devices.", "This work has been supported by the EPSRC grant PETRAS Research Hub under the project Blockchain-empowered Infrastructure for IoT (BlockIT).", "Keywords: IoT security, blockchain, smart meter, smart contract, transactive energy", "IoT is pushing the bar opening to new interesting business opportunities and smart meters are the key driver of this digital revolution.", "Indeed, nowadays smart grid developments are heavily driven by IoT, and smart meters are advancing by featuring higher connectivity and stronger sensing capabilities.", "While the topic of transactive energy has been investigated in several papers (see, e.g., [9] for a survey), as well as many authors have explored the possibilities of using blockchain and smart contract technologies for IoT [4], very few academic works exist on integrating these technologies within smart grids.", "The compelling evolution of Internet-of-Things (IoT) is expected to disrupt several key technological areas, including Smart Energy.", ", [9] for a survey), as well as many authors have explored the possibilities of using blockchain and smart contract technologies for IoT [4], very few academic works exist on integrating these technologies within smart grids."]} diff --git a/edge/graph_51936930.jsonl b/edge/graph_51936930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6cb103fa21dd7ea9a28dc9f498e3dca466a678cf --- /dev/null +++ b/edge/graph_51936930.jsonl @@ -0,0 +1,24 @@ +{"3464419|9830350": ["In distributed clustering technique, the sensor nodes self-organize and are themselves responsible to form clusters, elect CH and form the network and thereby improves efficiency of network in terms of scalability [8]."]} +{"3464419|1236072": ["WSN acts as the dominant infrastructure for sensing, networking and routing [4\u20136]."]} +{"42856206|15300368": ["The first application of Wireless Sensor Networks has been in the cold war in the 1950s in which one of the prototypes of modern sensor networks called Sound Surveillance System (SOSUS) was developed by the United States Military to detect and track Soviet submarine, and monitor several radar networks for air defense[3][4]."]} +{"42856206|12060835": ["In order to tackle the fundamental problem of the energy in WSN, the use of energy harvesting technique need to be employed to harvest the energy from surroundings [8] to ensure continuous operation of WSN device."]} +{"53435560|84832337": ["meet [63]."]} +{"2392021|2497115": ["a set of closest RPs are selected, the method is known as K-Nearest Neighborhood (KNN) [14], [69], [75], [78]."]} +{"2392021|3330313": ["focus on outlier detection and improve the localization performance of conventional methods [66], [145], [146].", "Also, it is possible that the wireless network coverage degrades due to AP failures [66], [67]."]} +{"52118784|6779551": ["efforts have been exploring novel techniques that can minimize interference in order to enable secure and reliable D2D communication [191]."]} +{"52118784|12206204": ["However, owing to lack of standardization, the wide spread implementation of IoT and subsequently D2D integration with IoT is still a far cry [293], [294]."]} +{"52118784|3330461": ["In [18] the existing literature on D2D is categorized under inband and outband D2D communication."]} +{"52118784|7644489": ["[51] proposed the resource selection scheme namely sensing based selection"]} +{"31495851|15300368": ["controlled area via a wireless channel [5]."]} +{"4363919|2742199": ["In the MWSN system, vehicles need to be customized to provide energy for sensor nodes, which increase the cost.", "Some air parameters [1] have many effects on human health and human activities, which can be found in Table 1.", "In this paper, we combine the SWSN system and MWSN system reasonably.", "Another is the Mobile Wireless Sensor Network (MWSN) [1] system, in which the sensor nodes are fitted on the buses, taxis or bikes and monitor air quality while moving.", "MWSN system This paper is organized as follows.", "In addition, the monitoring method is improved by combining the Static Wireless Sensor Network (SWSN) and Mobile Wireless Sensor Network (MWSN), in which the mobile node collects information along a specific route, which solves the problem that some sensors could be broken out of doors.", "After we analyzed the advantages and disadvantages of SWSN system and MWSN system respectively, we graded the characteristics of the two systems according to the following standard: \u20180\u2019\uff0d \u2018None\u2019; \u20181\u2019\uff0d \u2018Low/Short/Inconvenient\u2019; \u20182\u2019\uff0d \u2018High/Long/Convenient\u2019.", "One is the Static Wireless Sensor Network (SWSN) [1] system, in which, researchers mount the sensors on the fixed places like traffic lights, streetlights, walls and so on.", ") Another is the Mobile Wireless Sensor Network (MWSN) [1] system, in which the sensor nodes are fitted on the buses, taxis or bikes and monitor air quality while moving."]} +{"6396569|1236072": ["Traditional WSN routing protocols [21], which describe how to pass messages through the network so they will most likely reach their destination, typically rely on routing tables or recent route histories."]} +{"6396569|1762301": ["Fortunately, there is an active area of research dedicated to routing in mobile ad hoc networks (MANETs), and MWSNs can borrow from this work [22]."]} +{"17957409|16335158": []} +{"8616644|7644489": ["For network assisted discovery, MTs register their position in a central server or the network tracks the MTs [15], [16]."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"9936447|17325804": ["For a review of these techniques, see High-tower and Borriello (2004) and Gezici (2008)."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"27360477|3330461": []} +{"13272387|20905429": ["TABLE I: COMPARISON OF VARIOUS WIRELESS STANDARDS [2], [3]", "Data transmission can be done through wired medium in which the movement and comfort of the user are hindered or else it can be done through wireless medium [2].", "[2] Alexandros Pantelopoulos and Nikolaos G.", "The aim is then to provide feedback in real time about the health condition of an individual either to the individual himself or to hospital or directly to the doctor with the ability of giving alert in case of health threating conditions [2]."]} +{"6562030|14435082": ["Finally, since VGI, UGC and crowdsourced data are collected and shared by individuals, there are arguments about the quality and fitness for use of such data in projects [63]."]} diff --git a/edge/graph_51939753.jsonl b/edge/graph_51939753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f186b3e31caeea9cf55a4d85f3fb8e72e14ae139 --- /dev/null +++ b/edge/graph_51939753.jsonl @@ -0,0 +1,3 @@ +{"3652650|14044589": ["Generalized connectivity of graphs has become an established area in graph theory, see a recent monograph [15] by Li and Mao on generalized connectivity of undirected graphs, see also a survey paper [14] of the", "Li [11] remains open [14]: for a fixed integer k \u2265 3, given a graph G and an integer ` \u2265 2, it is NP-complete to decide whether \u03bak(G) \u2265 `.", "Strong subgraph k-connectivity allows us to extend applications of generalized k-connectivity described in [14,15] from undirected to directed graphs."]} +{"3653302|14044589": ["Interestingly, for undirected graphs G, \u03bak(G) \u2264 \u03ba(G) holds only for k \u2264 6 [4, 6]."]} +{"3474053|18976841": ["Odense, Denmark J\u00f8rgen Bang-Jensen London, UK Gregory Gutin August 2000", "the surveys [61, 66] by Bang-Jensen and Gutin, [126] by Bondy, [368] by Gutin and [728, 729] by Volkmann.", "Some sufficient conditions for the existence of a hamiltonian cycle in a bipartite tournament are described in the survey paper [368] by Gutin.", "Adrian Bondy, Thomas Bo\u0308hme, Samvel Darbinyan, Reinhard Diestel, Odile Favaron, Herbert Fleischner, Andra\u0301s Frank, Vladimir Gurvich, Fre\u0301de\u0301ric\nPreface xiii\nHavet, Bill Jackson, Hao Li, Martin Loebl, Wolfgang Mader, Crispin NashWilliams, Jarik Nes\u030cetr\u030cil, Gert Sabidussi, Paul Seymour, Alexander Schrijver, Ste\u0301phan Thomasse\u0301, Carsten Thomassen, Bjarne Toft and Ke-Min Zhang.", "The reader can find more information on the topic in the survey papers [65, 66] by Bang-Jensen and Gutin [368] by Gutin and [728] by Volkmann, the theses [345, 362, 692, 745], by Guo, Gutin, Tewes and Yeo respectively and the papers cited there.", "Budapest\nWe dedicate this book to our parents, especially to our fathers, B\u00f8rge Bang-Jensen and the late Mikhail Gutin, who, through their very broad\nknowledge, stimulated our interest in science enormously."]} diff --git a/edge/graph_51953198.jsonl b/edge/graph_51953198.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e18436eb77bc3a8d71466553235567001270d51 --- /dev/null +++ b/edge/graph_51953198.jsonl @@ -0,0 +1,12 @@ +{"15751455|9045232": []} +{"17350305|11591301": ["Wiegand et al. (2010) surveyed the effects of NSD on SA, concluding it to be \u201chighly relevant\u201d."]} +{"4033865|393948": []} +{"4033865|11894197": ["and also they ignore interaction with the classifier [69]."]} +{"12642158|7360895": ["In the HRI literature, it is clear that people engage with social robots in many social ways [9] [10] [11] [12], and also can attribute intentions and decision-making to robots [13]."]} +{"886027|393948": ["With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al.", "With the revival of interest in deep learning (Bengio et al., 2013), incorporating the continuous representation of a word as features has been proving effective in a variety of NLP tasks, such as parsing (Socher et al., 2013a), language modeling (Bengio et al., 2003; Mnih and Hinton, 2009) and NER\u2026"]} +{"2493033|11591301": ["One concept that the LSTM layers likely learn is negation, which is known to be important for sentiment analysis (Wiegand et al., 2010)."]} +{"43943649|11591301": ["Negation: Negation is a well-studied phenomenon in sentiment analysis (Pang et al., 2002; Wiegand et al., 2010; Zhu et al., 2014; Reitan et al., 2015)."]} +{"753606|14866098": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"753606|16362395": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"8107077|49273945": []} +{"8107077|17221751": []} diff --git a/edge/graph_51958678.jsonl b/edge/graph_51958678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51965358.jsonl b/edge/graph_51965358.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51965584.jsonl b/edge/graph_51965584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d90d759fa90d587ae5e648c8b9aac7b59e1a2108 --- /dev/null +++ b/edge/graph_51965584.jsonl @@ -0,0 +1,3 @@ +{"9377686|16789883": ["Since the launch of Landsat in 1972 [6], multispectral imagery has been the principle data type for land cover classification studies."]} +{"2607051|7487572": ["However, thes r views fo us just on one type of wetland [20\u201322], on one place [23,24], on o e type of s nsor [25,26], or on one meth d [27].", "However, these reviews focus just on one type of wetland [20\u201322], on one place [23,24], on one type of sensor [25,26], or on one method [27]."]} +{"2607051|43794595": ["However, thes r views fo us just on one type of wetland [20\u201322], on one place [23,24], on o e type of s nsor [25,26], or on one meth d [27].", "However, these reviews focus just on one type of wetland [20\u201322], on one place [23,24], on one type of sensor [25,26], or on one method [27]."]} diff --git a/edge/graph_51965847.jsonl b/edge/graph_51965847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3dca29bb694f06b7de87887856d7ce29fca034c1 --- /dev/null +++ b/edge/graph_51965847.jsonl @@ -0,0 +1,4 @@ +{"2351470|192934": []} +{"6054025|3241708": ["In addition, since collecting reliable labels is a time consuming and costly task, there is an increasing interest in using cheap, easy-to-get labels from nonexpert using frameworks like e.g. the Amazon Mechanical Turk 1 [49]\u2013[52]."]} +{"6054025|191396": ["First, a clustering of the instances [258] is performed using an unsupervised algorithm."]} +{"6054025|3330313": ["Similar to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38], several methods in label noise cleansing are based on ad hoc measures.", "Dealing with label noise is closely related to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38]."]} diff --git a/edge/graph_51967217.jsonl b/edge/graph_51967217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19ee2a76af1e721c9d1865ac3514cc0d1e9ae9f8 --- /dev/null +++ b/edge/graph_51967217.jsonl @@ -0,0 +1,21 @@ +{"14946100|2357830": ["Due to the inherent weaknesses of underlying wireless radio communication, NFC systems are plagued with a wide variety of security and privacy threats similar to the RFID systems [12]."]} +{"2148236|2357830": ["However, due to their computational complexity and high bandwidth requirements, many of these protocols were still unworkable even on high-end tags as of 2006 [18].", "Due to the inherent weaknesses of underlying wireless radio communication, RFID systems are plagued with a wide variety of security and privacy threats [18]."]} +{"3216944|2357830": ["However, due to their computational complexity and high bandwidth requirements, many of these protocols are still unworkable even on high-end tags [10].", "Interested users are referred to [10] for general security and privacy issues and basic countermeasures in RFID systems."]} +{"15009759|18418184": []} +{"39958892|2357830": []} +{"14589189|2357830": []} +{"8740494|2357830": []} +{"6395754|2357830": ["In each attack case there are different scenarios, resulting in different attack distances [16]."]} +{"326491|2357830": ["However, due to their computational complexity and high bandwidth requirements, many of these protocols are still unworkable even on high-end tags [20].", "Information (might simply be a plain identifier) gleaned from a RFID tag can be used to track the owner of the tag, or be utilized to clone the tag so that an adversary can impersonate the tag\u2019s owner [20].", "Due to the inherent weaknesses of underlying wireless radio communication, RFID systems are plagued with a wide variety of security and privacy threats [20]."]} +{"14078866|2357830": ["[3, 4], but at the same time there are several examples, including comprehensive industrial and government guidelines, of"]} +{"2646191|3348390": ["[3] proposed a context lifecycle and explained how acquisition, modelling, reasoning, and distribution should occur.", "A context-aware system uses context to provide relevant information/services to the user, where relevancy depends on the user\u2019s task [3].", "Context-aware computing has played an important role in tackling this challenge in previous paradigms, such as pervasive computing, which lead us to believe that it would continue to be successful in the IoT paradigm as well [3].", "Moreover, only few systems provided details of their architecture and none of the studied systems have addressed real-time processing of the context, which has been considered a gap in the area [3]."]} +{"46823051|9495329": ["Bizanis and Kuipers [91] surveyed SDN and NV solutions for the IoT devices."]} +{"46823051|1599458": ["5) Survey of data mining [27], [31], [32].", "According to the Gartner Research report, the number of IoT devices will reach 25 billion in a few years [27], [43].", "An alphabetically sorted short list follows below [3], [27], [44], [45].", "Some of the context-aware studies in IoT are summarized in [27]."]} +{"46823051|1520906": []} +{"46823051|10213552": ["Available: http://thinkaurelius.github.io/titan/ and H 2 O (parallel processing engine that contains math and machine learning libraries) [37], [38], [209].", "\u2026engine) [207], All-Pairs (used for biometrics, bio-informatics data mining) [37], Pregel (processes large sized graphs) [208], Spark (works faster than Hadoop because of memory caching) [38], Storm (processes streaming data in real-time) [38], Flink (batch and stream processing) [38], 20 [Online].", "Dynamo (Amazon) [192], Voldemort (LinkedIn) [193], Azure [37], [38].", "OrientDB, 20 Neo4J, 21 and Titan 22 represent some examples of graph-based databases [38].", "7) Survey of big data analytics [37], [38].", "These include: Mahout [210], Spark MLlib 26 [211], H 2 O [38], SAMOA (Scalable Advanced Massive Online Analysis) [212], Flink-ML [38], Weka [213], Oryx, 27 and Vowpal Wabbit [38]."]} +{"46823051|1349348": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "There are also different approaches for context modeling, such as multidisciplinary, domain focused, user-centric, and chemistry inspired [26]."]} +{"46823051|7329149": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|1598350": ["References [19], [20], and [65] surveyed existing IoT platforms, frameworks, systems, prototypes, middleware, and different approaches."]} +{"46823051|5310274": []} +{"46823051|3348390": ["The most popular classi\ufb01cation of context modeling is de\ufb01ned as key-value, markup scheme, graphical, object oriented, logic-based, ontology-based, spatial, uncertainty, and hybrid context modeling [21], [23], [26], [98], [99].", "There are three main steps of context reasoning: 1) context preprocessing; 2) sensor fusion; and 3) context inference [21], [107].", "Context reasoning can be classi\ufb01ed as different categories [21]: fuzzy logic, ontology-based, probabilistic logic, rules, supervised learning, and unsupervised learning.", "These \ufb01ve factors are explained in [21].", "[21].", "Perara et al. [21] mentioned that there were different context life cycles.", "Common characteristics of these life cycles are categorized into four main parts: context acquisition, context modeling, context reasoning, and context distribution [21], [26].", "3) Survey of context awareness [21], [23]\u2013[29].", "According to [21], there are seven main characteristics: 1) architecture; 2) complex system; 3) everything as a service; 4) intelligence; 5) size considerations; 6) space considerations; and 7) time considerations.", "Perera et al. [21] de\ufb01ned the features of context awareness related with IoT, according to [10], [94], and [97]."]} +{"46823051|9429730": ["4) Survey of machine learning on speci\ufb01c topics (human activity recognition, mobile phones sensing, body sensor networks, and WSN) [24], [30], [31]."]} diff --git a/edge/graph_51967329.jsonl b/edge/graph_51967329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a8d817176959a2e362122c1ed40bd49b9d1a216 --- /dev/null +++ b/edge/graph_51967329.jsonl @@ -0,0 +1,2 @@ +{"469222|17323154": ["A few searches with Carrot2, Yippee, or WebClust quickly demonstrate that consistently learning meaningful topic facets is a difficult task [5]."]} +{"33660748|51967329": []} diff --git a/edge/graph_51981782.jsonl b/edge/graph_51981782.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51984975.jsonl b/edge/graph_51984975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2c5ac6663af05a2fbb443a6b9b21bb8e160e708 --- /dev/null +++ b/edge/graph_51984975.jsonl @@ -0,0 +1 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} diff --git a/edge/graph_51987067.jsonl b/edge/graph_51987067.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_51987740.jsonl b/edge/graph_51987740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..034eb96f80ad62b6100ec5b55da927da8c83a1da --- /dev/null +++ b/edge/graph_51987740.jsonl @@ -0,0 +1,30 @@ +{"14361076|8296351": []} +{"15713389|8296351": ["and compact representation of the possible products of an SPL [19], [20].", "Approaches for the automated analysis of FMs have proliferated these last 20 years [19]."]} +{"11613185|8296351": ["We chose this formalism because it can be easily implemented and applied to any kind of variability model [7]."]} +{"986963|8296351": ["Many useful analyses such as consistency checks, element liveness, configuration completion, and reasoning on model edits can be reduced to instance finding by combinatorial solvers [7, 9, 12]; thus, we use instance finding and element liveness as representatives of such analyses."]} +{"1592326|8296351": ["Below is a table that includes each of the constraints described by Benavides et al. and maps SPL constraints to multi-step constraints.", "To produce these configurations, we used the CSP technique developed by Benavides et al. (2005) to derive valid configurations of the feature model.", "Internal Validity The time required to analyze a feature model depends on the number of features and percentage of cross-tree constraint and deriving SPL configurations has been proven to be an NP problem in previous research [30, 5].", "Feature model constraint semantics are described by Benavides et al. (Benavides et al., 2010) both in terms of propositional logic and CSP semantics.", "For example,\nsome techniques model the feature selection problem as a constraint satisfaction problem (which is a set of variables and a set of constraints over the variables) and use a general-purpose constraint solver (which is an automated tool for finding solutions to these problems) to derive a suitable configuration (Benavides et al., 2013; White et al., 2007).", "Internal validity: The time required to analyze a feature model depends on the number of features and percentage of cross-tree constraint and deriving SPL configurations has been proven to be an NP problem in previous research (Benavides et al., 2010; Kang et al., 1998).", "In this paper we do not focus on this problem but it can e easily addressed by using the error checking techniques listed y Benavides et al. (2010), and the parsers from FaMa (FaMa, 2013), VL (Classen et al., 2011) or SPLOT (SPLOT, 2013) for lexer errors.", "Catalog of feature model constraints over multiple steps\nIn this section, we show that any of the feature model constraints described in the previously discussed semantics by Benavides et al. (Schobbens et al., 2007; Benavides et al., 2010) can be converted into a multi-step constraint using MUSCLES.", "[29, 30] can be converted into a multi-step constraint using MUSCLES.", "Prior work on automated feature model configuration (Benavides et al., 2005; White et al., 2007, 2008a) has yielded a framework for representing feature models and configuration problems as CSPs.", "Prior research has laid out the formal semantics of feature models, variability, and configuration [29, 30].", "\u2026of feature model constraints over multiple steps\nIn this section, we show that any of the feature model constraints described in the previously discussed semantics by Benavides et al. (Schobbens et al., 2007; Benavides et al., 2010) can be converted into a multi-step constraint using MUSCLES.", "[30] both in terms of propositional logic and CSP semantics.", "Feature model semantics\nPrior research has laid out the formal semantics of feature models, variability, and configuration (Schobbens et al., 2007; Benavides et al., 2010).", "In this paper we do not focus on this problem but it can be easily addressed by using the error checking techniques listed by Benavides et al.[30], and the parsers from FaMa[32], TVL[33] or SPLOT[34] for lexer errors.", "Automated single-step configuration\nSeveral single-step feature model configuration and validation echniques have been proposed (Benavides et al., 2013; Mannion, 002; Batory, 2005; Beuche, 2004; Buhrdorf et al., 2004; White t al., 2007)."]} +{"414045|8296351": ["Much of the focus of research regarding feature models has been on automated techniques that analyze a feature model [Benavides et al. 2010].", "In this article, we address the so-called optimization analysis operation [Benavides et al. 2010].", "Catalogs with up to 30 analysis operations on feature models have been published [Benavides et al. 2010]."]} +{"18309397|627405": ["Systematic Literature Review process [Brereton et al. 2007]."]} +{"206778541|10091442": ["As recommended in [54], relevance is scored binary; that is, evidence level 4 or 5 are scored 1 for relevance, whereas evidence levels 1 to 3 are scored 0 [55]."]} +{"206778541|8296351": ["Benavides et al. [27] reviewed the automated analysis of feature models in product line engineering."]} +{"206778541|627405": ["\u2026reviews, best practices and lessons learnt (e.g., Staples and Niazi [6], Biolchini et al. [7], Riaz et al. [8], Zhang and Babar [9], Brereton et al. [10]) as well as on meta-studies of systematic reviews (Kitchenham et al. [11], [12]) when designing and conducting our review and when developing\u2026", "1 (adapted from [10] ).", "Systematic literature review process (adapted from [10]).", "Moreover, we used reports on practical experiences with systematic literature reviews, best practices and lessons learnt (e.g., Staples and Niazi [6], Biolchini et al. [7], Riaz et al. [8], Zhang and Babar [9], Brereton et al. [10]) as well as on meta-studies of systematic reviews (Kitchenham et al. [11], [12]) when designing and conducting our review and when developing our search strategy."]} +{"7771880|8296351": ["Feature model for mobile phone product line [2]", "Figure 2, adapted from [2], depicts a simplified feature model inspired by the mobile phone industry."]} +{"14307425|8296351": []} +{"18471299|17474643": [", the deployment of an application over several cloud providers [14], e."]} +{"5223375|3939683": []} +{"5223375|206778272": ["31% [12], [S202], [S203], [S205], [S206], [S207], [S208], [S209] MATLAB 0.", "[12] provided an overview of existing research in the field of software refactoring."]} +{"10091442|2018781": ["The study concluded that challenges can be classi\ufb01ed along two dimensions: (a) based on themes (or topics) that they cover (e.g., service composition), and (b) based on characteristics (or types) that they reveal (e.g., technique challenges [9]).", "\u2026in the product line domain [2], service-based systems [7], variability-intensive SOA systems [8], and service-oriented system engineering [9]). b. Reviews of research results (e.g., papers published at the Software Product Line Conference (SPLC), or the Workshop on Variability Modeling\u2026", "Taking the quality attributes that are considered most important for service-based systems in each of these three sources [9,17,26] we aggregated the following list of quality attributes that we focused on when conducting our systematic review (de\ufb01nitions are taken from [17]): 1.", "In 2009, Gu and Lago presented a systematic literature review on service-oriented systems engineering [9].", "This is because the \ufb01rst papers on service-based systems appeared around ten years ago [9].", "Gu and Lago found more than 50 quality-related challenges in service-based systems, including security, reusability, \ufb02exibility, interpretability, and performance, which are the most emphasized quality-related issues due to the dynamic nature of service-based systems [9].", "\u2026in similar \ufb01elds, such as variability management in the product line domain [2], service-based systems [7], variability-intensive SOA systems [8], and service-oriented system engineering [9], the problem of handling variability in quality attributes has not been solved in generic problems."]} +{"10091442|9149125": ["SOA(1) supports adaptive systems in heterogeneous and changing environments [6].", "As there is no universal definition for service, service-oriented architecture or service-oriented development [17], we utilize a broad definition: We consider service-oriented development as the development of a system which is assembled from individual services that are invoked using standardized communication models [6,18]."]} +{"10091442|627405": ["As abstracts might be too poor to rely on when selecting primary studies [12] we also decided based on the conclusions of studies."]} +{"16852033|627405": ["003 since they are considered the world leading publishers for high quality publications [11]."]} +{"2404494|8296351": ["To our knowledge, the most up extensive collection of analysis operations on feature models is the one presented in (Benavides et al. 2010)."]} +{"36176448|417250": []} +{"12285462|8296351": ["A feature con\ufb01guration derived from a feature model F can be represented as a 2-tuple of the form ( S , R ) where S is the set of features to be included and R is the set of features to be removed ( S \\ R = [ ) (Benavides et al. 2010).", "The customers\u2019 functional requirements can be validated by checking whether the functional features selected based on the functional requirements satisfy the feature constraints speci\ufb01ed in the feature model (Benavides et al. 2005, 2010; Elfaki et al. 2009)."]} +{"16101716|8296351": ["Figure 1, adapted from [2], depicts a simplified feature model inspired by the mobile phone industry."]} +{"37235986|35426346": ["Distribution and decentralisation permit the system to be \ufb02exi-ble (Ferber 1998; Trentesaux et al. 2000; Sun et al. 2001; Wooldridge 2002; Leit\u00e3o 2008)."]} +{"16328895|627405": ["Such reviews have started to make their way into software engineering research [12,15] but are still not widely used."]} +{"34200954|627405": ["Like other researchers, [25], we also found that tabulating the data is a useful mean of aggregation."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"33944708|8296351": ["\u2026=\u21d2 HSPA \u2228 LTE \u2228 WiFi (1) Thanks to the extensive use of FMs, it is possible to take advanage of their wide support (Acher et al., 2010; Benavides et al., 2010;\natinlassi, 2004; White et al., 2009a) and the existing tools (e.g., AMA,2 Hydra,3 SPLOT,4 FeatureIDE; Kastner et al.,\u2026", "In this sense, several algorithms have been defined which are able to obtain an optimal configuration of an FM according to a given optimization criteria (Benavides et al., 2010; Guo et al., 2011; Li et al., 2012; Sayyad et al., 2013; Soltani et al., 2012; White et al., 2009a, 2009b).", "Thanks to the extensive use of FMs, it is possible to take advanage of their wide support (Acher et al., 2010; Benavides et al., 2010; atinlassi, 2004; White et al., 2009a) and the existing tools (e."]} +{"16215278|8296351": ["Various extensions of feature models exist [3]."]} +{"11421382|8296351": ["Most of these approaches are described by Benavides et al. (2010), which nicely summarizes those scenarios where feature models must be checked if modified (e.g., valid product, valid partial configuration, anomaly detection like redundancies in the feature model, optimization, etc.).", "Moreover , DSPL solutions can exploit off-the-shelf logical solvers (e.g., SPLOT \u2013 http://www.splot-research.org/ \u2013 and FAMA) are AAFM solutions that can manage the dynamic checking and diagnosis of variability models.", "Also, the validity of the feature model must be checked to avoid unfeasible products when, for instance, a new set of features is selected (Benavides et al., 2010).", "Today, feature models provide a comprehensive set of analysis operations to achieve what is known as Automated Analysis of Feature Models (AAFM) (Benavides et al., 2010).", "This solution complements the solution suggested in the previous section for changing the structural variability, as AAFM approaches will ensure the validity of the changes made on the feature model.", "Reconfiguration process assisted by AAFM tools. with \" Ambient \" measures but also with \" Health \" , as this super-type can be used to incorporate new functions related with the health of users and can use this to connect to, for instance, a medical service.", "In order to incorporate runtime variability management facilities to the DSPL, we advocate the use of AAFMs that can be supported by well-known declarative paradigms such as SAT 3 or constraint programming problems 4 (Benavides et al., 2010)."]} diff --git a/edge/graph_51988843.jsonl b/edge/graph_51988843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..128e75374cfd8cd441a5e880c9cb36082e15bbe4 --- /dev/null +++ b/edge/graph_51988843.jsonl @@ -0,0 +1,9 @@ +{"3548474|875676": ["There are two types of typical pulses: the pulse based on the isotropic orthogonal transform algorithm (IOTA) [20] and the pulse adopted in the PHYDYAS project [21]."]} +{"52287824|3270620": ["Although several NOMA techniques have been actively investigated over the last few years, majority of the efforts have focused on power-domain NOMA [6], [7], which exploits signal power diversity for each NOMA user at each NOMA receiver end."]} +{"11504280|11720829": ["Index Terms\u2014Decision feedback equalizer, minimum bit error rate, minimum mean square error, multiple antennas, multipleinput multiple-output, multiuser detection, space-division multiple access, space-time processing."]} +{"12476407|3270620": ["\u2026Friedrich-Alexander Universit\u00a8at Erlangen-N\u00a8urnberg (e-mails: moham-mad.sedaghat@fau.de, ralf.r.mueller@fau.de). tradeoff between total throughput and fairness makes NOMA very attractive for 5G and a serious competitor for well-known Orthogonal Frquency Division Multiple-Access (OFDMA) [1], [8]."]} +{"13253852|3270620": ["This intuitively restricts the effective number of user pairs, which in turn reduces the sum-rate gain of NOMA; 4) Each user needs to send back its channel gain information to the BS, and NOMA is inherently sensitive to the uncertainty in the measurement of this gain [3].", "\u2026lower latency; 4) NOMA can maintain user-fairness and diverse quality of service by flexible power control between the strong and weak users [3]; particularly, as more power is allocated to a weak user, NOMA offers higher cell-edge throughput and thus enhances the cell-edge user experience."]} +{"1142029|30430657": ["0 system, to provide higher data capacity, more robust performance, better spectrum efficiency, and to enable new services [1]."]} +{"9464019|3270620": ["Therefore, NOMA is considered as a key technology for the \ufb01fth generation mobile communication networks [3]\u2013[5]."]} +{"9464019|7686677": ["Therefore, the rapidly increasing energy consumption, causing increasing amount of CO 2 emission levels, has become an important issue for the next green cellular network, driven by the overwhelming increase of the traf\ufb01c data and mobile devices [11]\u2013[14]."]} +{"23805463|12206204": ["Not only the mobile Internet devices, from smartphones to tablets, will keep the explosive growth of data traffic over the cellular network, but more things, from industrial machines to vehicles, appliances, lights, buildings, or even places and other intangible real world representations are getting connected [2], [3]."]} diff --git a/edge/graph_51995206.jsonl b/edge/graph_51995206.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f3816e2e51f82563ceb75f13fbfb8ac8cbc3139 --- /dev/null +++ b/edge/graph_51995206.jsonl @@ -0,0 +1,10 @@ +{"14110539|239537": ["Most mentions of clustering in graph visualization are purely structure-based [16], using only the graph structure to perform clustering."]} +{"17207678|11795007": ["Sensor technologies, such as electromagnetic or optical fibre-based trackers, face challenging integration into cost effective sterile instruments, and meanwhile robotic tendon actuators have inherent absolute positioning limitations [5], [6]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"5037178|397187": []} diff --git a/edge/graph_52002373.jsonl b/edge/graph_52002373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef79252f15d3287253117510a405cad5514b7a72 --- /dev/null +++ b/edge/graph_52002373.jsonl @@ -0,0 +1,17 @@ +{"205459363|8530790": ["Although there are available, at this moment, several Evolutionary Multi-objective Optimization (EMO) techniques that aim to provide representative samplings of the Pareto-sets in multi-objective optimization problems [4,8,1,15], their application to the actual design of real systems still requires a further step in which, given a set of possible solution alternatives, a specific alternative should be chosen to be implemented."]} +{"11897480|17383371": []} +{"11897480|4474193": []} +{"11897480|8530790": []} +{"62582177|8530790": []} +{"12957829|13867280": []} +{"45947614|8530790": []} +{"8875868|59943180": ["On the other hand, widely used PCPs scale quite well for high dimensions and their usage for visualizing high dimensional data has been encouraged e.g. in [38], [35], [40]."]} +{"63701407|59943180": []} +{"205430214|16467945": ["Regarding the rest of the families and considering the fact that most are employed in combinatorial problems in a hybrid form with local search techniques (Hertz and Widmer 2003; Puchinger and Raidl 2005), ESs and AISs are given a slight advantage due to their increased use (SCOPUS 2012)."]} +{"205430214|4474193": ["\u2026search for a suitable technique, thus serving as a complement to existing works (Zlochin, Birattari, Meuleau, and Dorigo 2004; Dorigo and Blum 2005; Jin and Branke 2005; Reyes-Sierra and Coello 2006; Tapia and Coello 2007; AlRashidi and El-Hawary 2009; Das and Suganthan 2010; Liu et al. 2011; Zhou\u2026", "The purpose of this work is to provide a general overview of the most prominent population-based multiobjective optimisation methodologies, serving as a map or a starting point in the search for a suitable technique, thus serving as a complement to existing works (Zlochin, Birattari, Meuleau, and Dorigo 2004; Dorigo and Blum 2005; Jin and Branke 2005; Reyes-Sierra and Coello 2006; Tapia and Coello 2007; AlRashidi and El-Hawary 2009; Das and Suganthan 2010; Liu et al. 2011; Zhou et al. 2011)."]} +{"205430214|63137": []} +{"12904127|59943180": ["optimization problems with three or more objective functions, we use a value path [14] representation to shown the solutions obtained, as can be see in Figure 2."]} +{"5110551|8530790": ["MOEA literature has been reviewed by [9]\u2013[13]."]} +{"15623518|8530790": ["designed for single fitness criteria (see [211] for an"]} +{"14593140|3053192": []} +{"14593140|59943180": ["Miettinen [2014] presents a survey of visualization methods for multiobjective optimization."]} diff --git a/edge/graph_52002758.jsonl b/edge/graph_52002758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fca464531476d03a9333ef3e2de44d9fa7c2a43 --- /dev/null +++ b/edge/graph_52002758.jsonl @@ -0,0 +1,9 @@ +{"111074844|8530790": ["Several excellent surveys of multiobjective evolutionary algorithm (MOEA) activity can be found, namely Veldhuizen and Lamont (2000), Coello (1999), Deb (1999, Chapter 8), Fonseca and Fleming (1995)."]} +{"8084098|2387055": ["These are concerns about scaling \ufb01ne-grain \ufb02ows in OpenFlow networks [3,9] and these scaling features car be used by adversaries to create network denial-of-service conditions [12]."]} +{"8784924|5336645": []} +{"8784924|6670217": []} +{"12434235|260343": [", [5], [9], [27], [33], [34]); (ii) Interacting Particle Systems [22], which study the collective behaviors and phenomena that can be exhibited by interacting components; (iii) Microfoundation in Economics [13], which aims to connect macroeconomic theories to the underlying microeconomic behaviors of agents.", "This assumption is widely made in the literature (see [27], [42] and the references therein).", ", [27], [42] and the extensive references therein), and calls for future investigations on how to obtain these parameters in realworld environments.", "Research in epidemics has a rich history and literature, for which we refer to a recent survey [27]."]} +{"51922754|51922170": ["In particular, there is an increasing trend in the usage of Machine Learning (ML) and data mining techniques due to their proved e\ufb03ciency in malware analysis (in both static and dynamic analysis), as well as network anomaly detection [1,2,10].", "\u2026the emerging cyber attacks is the fact that cybercriminals use advanced anti-forensics and evasion methods in their malicious code, which makes the usual security assessment techniques, e.g., CVSS (Common Vulnerability Scoring System), or static malware and tra\ufb03c analysis less e\ufb03cient [8,10]."]} +{"15885226|2387055": ["These limitations can cause performance bottlenecks and denial-of-service conditions even with benign tra\ufb03c; further, adversaries can induce switch thrashing to create network outages [16]."]} +{"3600498|2387055": ["See [19] for a broad survey of SDN security issues.", "Much research has addressed security issues in the SDN data plane [1, 2, 12, 14, 19].", "Research in SDN has been increasingly applied to various applications including those in cloud computing and virtualization technologies across multiple backbone networks [19].", "Much work has focused on security of the controlling unit of the control plane, and the OpenFlow specifying switches for data transmission be-tween the control plane and the data plane [2, 4, 5, 14, 19].", "Cyber security of SDN has been studied along different parts of the SDN architecture [19]."]} +{"31347150|18740719": []} diff --git a/edge/graph_52003655.jsonl b/edge/graph_52003655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba2b13b7ffe72d61b67a2b6a6b48a5d22b8d1e66 --- /dev/null +++ b/edge/graph_52003655.jsonl @@ -0,0 +1,18 @@ +{"2567695|6857179": ["audio cues are known to perform better [56], [57], while this has also been confirmed by other works on interest recognition (c."]} +{"2567695|6387482": ["The correlation amongst the low-level features extracted from two different modalities provide useful information for tasks such as feature fusion [8], [9], multiview learning [10], multi-label prediction [11], and multimodal behaviour analysis [6], [7], [12]."]} +{"3743416|1223851": ["Recent surveys on eye fixation prediction can be found in [33]\u2013[35], and salient object detection is surveyed in [36], [37]."]} +{"2420442|2355696": ["Moving object segmentation from an image sequence or a video stream is a fundamental problem in various applications of computer vision such as visual surveillance [20], traffic monitoring [5], object-based video encoding and social signal processing [22] where the accuracy of segmentation can significantly affect the overall performance of the application."]} +{"17366312|206051485": []} +{"18120440|11608263": ["Over the last decade, a number of multi-label algorithms have been proposed (Boutell et al. 2004; Tsoumakas and Katakis 2007; Hariharan et al. 2010)."]} +{"3550343|393948": ["THE performance of visual learning algorithms is heavily dependent on the quality of data representation [1]."]} +{"15018742|12419623": [", in simulation-based optimization [1,2,9,19]."]} +{"10420698|52260786": ["Furthermore, the different robust problem formulations based on the decomposition into lowrank plus additive matrices often outperform state-of-the-art methods in several computer vision applications [46][229]."]} +{"10420698|819377": ["Moreover, we believe that we are living in a key transition in the field of background subtraction as we are progressively migrating from the conventional statistical models as MOG [357][33], KDE [95][30] and naive subspace learning models [29] to models based on robust decomposition into low-rank plus additive matrices (RPCA, RNMF, RMC, RSR, RST, LRM) which can achieve at least the same performance in terms of precision than the conventional statistical models [36].", "Many foreground detection methods have been developed [33][29][30][31][34][321], and several implementations are available in the BGS Library [346]."]} +{"8932623|2323881": ["Modern approaches to pose-invariant face recognition include pose-robust feature extraction [64], multi-view subspace learning [65], face frontalisation by synthesis [51], etc [66]."]} +{"206758439|393948": ["In this way, it is reasonable to consider that the multiple view-specific projections should share a lot of consistent information [29].", "is capable of disentangling different explanatory factors of variation behind data [29], which has been applied", "projections, which are independent of view variance [29]."]} +{"4925189|9232391": []} +{"4925189|456491": ["[22], [23] were extended from single task learning to multi-task learn-", "In order to handle nonlinear input-output relationship, the recent output kernel learning (OKL) algorithm [22], [36], which learns a semi-definite similarity matrix, i."]} +{"120952|15305793": ["BUS is commonly used to distinguish between benign and malignant tumors that can be characterized by the shape or contour features of segmented breast lesions [19] [4] [8]."]} +{"10434588|206485791": ["where U V T is the singular value decomposition (SVD) of (Zt \u2212 (C t 2/\u03bc )), and S(1/\u03bct )(\u00b7) is the soft-thresholding operator [2], [27], which is defined as", "A favorable data representation can greatly uncover the underlying information of observed data and intensely facilitate the machine learning methods [2].", "A recent survey [2] comprehensively reviews most representative sparse", "2712801 representation has earned its high reputation in both theoretical research and practical applications [2]\u2013[4]."]} +{"10434588|393948": ["D ISCRIMINATIVE and effective data representations play an indispensable role in computer vision and machine learning, because they tremendously influence the performance of various learning systems [1]."]} +{"2959433|12127129": ["Alternatively , background subtraction [7] compares images with a background model and detects the changes as obj ects.", "It is popularly used for multimodal background modeling and has proven to be very competitive compared with other more sophisticated techniques for background subtra ction [7], [65].", "Moreover, it usually assumes that the video is captured by a static camera [7]."]} diff --git a/edge/graph_52005096.jsonl b/edge/graph_52005096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9db6be44adb75cf96e973d8315bdebbc832a3e03 --- /dev/null +++ b/edge/graph_52005096.jsonl @@ -0,0 +1,2 @@ +{"3603886|3273340": []} +{"206592484|456491": []} diff --git a/edge/graph_52005442.jsonl b/edge/graph_52005442.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef7d214339f0dffe67384c1c51865b189d7fb3af --- /dev/null +++ b/edge/graph_52005442.jsonl @@ -0,0 +1,12 @@ +{"6325955|17774971": ["date the wide input voltage variation [25], [30], [32]."]} +{"28332758|1047013": ["1 [14], [15]."]} +{"17906026|15891636": ["However, for a balanced network with N nodes, this problem requires O(N2) optimization variables; consequently, this approach may become computationally expensive as the distribution-system size grows [8], even when parallel decomposition arguments for SDP programs are advocated [9]."]} +{"110878688|4474193": []} +{"8154829|7020971": []} +{"41700073|17774971": ["Therefore, there is only one conversion stage from ES to grid, which leads to higher efficiency [18], [19], lower cost, and lighter weight."]} +{"41683340|1876323": []} +{"21618210|17381415": []} +{"111199410|1876323": []} +{"36640897|12083425": []} +{"64235543|12083425": ["2005 [4] Carrasco, J."]} +{"45837150|17758458": ["This paper presents a review on the state-of the- art of several control techniques of active filters for harmonic current mitigation and reactive power compensation in terms of their advantages, disadvantages and some limitations [1-8]."]} diff --git a/edge/graph_52008698.jsonl b/edge/graph_52008698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55ed9a75160513df783867b49917a0341ef7f9b6 --- /dev/null +++ b/edge/graph_52008698.jsonl @@ -0,0 +1,9 @@ +{"7113060|17205659": ["WSNs are vulnerable to various attacks in hostile environments [1,2]."]} +{"18729612|206459491": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"6691611|52008698": ["[12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], in particular, are attractive options due to the ubiquitous presence of memory in embedded systems (Fig.", "Note that other approaches to realizing SRAM PUFs [10], [12], [22] and DRAM PUFs [14], [15], [18] have also been developed."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_52008841.jsonl b/edge/graph_52008841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3398db363092bd57f5dd5767e119305f84b896c --- /dev/null +++ b/edge/graph_52008841.jsonl @@ -0,0 +1,57 @@ +{"23192358|4395259": ["Physical-layer security techniques exploit channel characteristics in securing information from eavesdroppers without the help of upper layers [9]."]} +{"1689864|6430339": ["In this study, the period of interest T is set to be 500 ms [26], and the channels and the data rate requirements of users are assumed to be fixed in this duration."]} +{"8114548|289357": ["In [11], the problem of assigning users to base stations for 3G networks considering proportional fairness is shown to be an NP-hard problem, which means there is no algorithm that can find the optimum solution in polynomial time [34]."]} +{"25114811|8909218": ["Among these techniques, cell densi\ufb01cation has been shown to be the most effective approach, which can potentially achieve over 1000-fold area spectral ef\ufb01ciency (ASE) gains [3].", "In contrast, a femtocell has a relatively larger cell size ( R femto \u2208 [10 , 40] m) and a limited downlink bandwidth of about 10 MHz [3].", "An optical attocell network achieves a high communication performance due to its extremely dense spatial reuse ( R atto \u2208 [1 , 3] m).", "The results of the femtocell are extrapolated from [3], [5], [48], [49].", "[3]."]} +{"12297908|8909218": ["In contrast, femtocells typically have an order of magnitude larger cell radius [43].", "The results of the femtocell network are taken from [43], [45]\u2013[47]."]} +{"31048368|6779551": []} +{"31048368|3453202": ["In particular, multiple-antenna relaying [24], [25], multipleantenna jamming [26], [27], multiuser downlink or multiple access [28], [29], massive MIMO [30], [31], and multipleantenna directional modulation [32]\u2013[35], are exploited to improve the secrecy performance."]} +{"31048368|12029139": ["Generally speaking, a power receiver is usually closer to the source than the information receiver, since the energy harvesting circuitry is less sensitive than the information decoding circuitry [238], [239]."]} +{"31048368|13178381": []} +{"31048368|4395259": ["[61] gave a primary investigation on multi-antenna techniques in multiuser wireless secrecy net-"]} +{"3550281|22221919": ["NOMA is one of the major candidates in the design of radio access techniques for 5G [122]."]} +{"3550281|3461906": ["interference management and some open research challenges have been discussed in [18]."]} +{"3550281|21418": ["million connections per square metre [4]."]} +{"3550281|4122595": ["[90]."]} +{"3550281|3055684": ["[14] have discussed a variety of topics including"]} +{"3550281|12029139": ["If the power of signal processing noise is denoted by \u03c3 2 sp, the maximum ID rate of receiver j decoded from the source [11] i can be written as", "in RF EH, but due to the inverse-square law, RF energy transfer is limited in terms of its coverage range [11].", "In [11], a survey is presented based on current research in radio frequency EH networks (RF-EHNs).", "has attracted significant attention in wireless communication networks [10], [11].", "These works [7], [11], [13] have provided valuable insights into foundational aspects of", "When the same receiver is changed to ID mode, ID rate can be calculated using the following equation [11], where W and \u03c3 2 represent the transmission bandwidth and noise power, respectively.", "Only a few survey and overview articles directly related to SWIPT and EH have been published [3], [7], [11], [13]\u2013[23].", "available spectrum while providing fair and efficient sharing of the available spectrum while protecting the primary user from collision [11]."]} +{"808134|16050825": ["In [3]- [4]- [5], the authors presented a review of VLC, whereas the authors of [6] discussed the potential of VLC for indoor communications."]} +{"13719954|16050825": []} +{"11997454|16050825": ["In [3], the authors present a review of communication oriented VLC whereas the authors in [4] present the potential of the VLC for indoor communication."]} +{"11970435|4395259": ["A key performance metric of the wiretap channel is the secrecy capacity defined as the maximum communication rate at which Bob can reliably decode the transmitted message, while Eve cannot infer information at any positive rate [2]\u2013[4]."]} +{"16641821|64404": ["Furthermore, we employ the appealing SHVC technique [24], [25], where the video sequence is encoded into multiple layers."]} +{"49188033|10235514": ["Furthermore, the growing number of devices imposes a big challenge of providing seamless and lowdelay communication [1], [2]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"4719573|12060835": ["Energy harvesting is regarded as a disruptive technological paradigm to prolong the lifetime of energy-constrained wireless networks, which apart from offering a promising solution for energy-sustainability of wireless nodes [7], [8], it also reduces the operational expenses (OPEX) [6].", "Due to the strong dependence of the IoT on wireless access, their applications are constrained by the finite battery capacity of the involved devices [6]."]} +{"25851440|12029139": ["Therefore, taking into account the fact that IPTSs are designed to operate at short distances of a few cm [14] or m [10], the developed OW link with two sources has an acceptable value of \u03b7m and the link distance can be further extended.", "Tesla\u2019s pioneering work has attracted research interest mostly in the RF and more specifically in the microwave (\u03bcw) region of the EM spectrum [13], [14]."]} +{"19694764|8909218": ["Radio femtocells [1] are an excellent solution to increase the capacity and coverage in indoor environments, especially in areas with high user density."]} +{"3930401|10235514": []} +{"3930401|4502294": []} +{"3930401|12206204": ["prise ultra-dense heterogeneous networks for which mobile data volume per area will be 1000 times and the number of connected wireless devices will be 100 times higher compared to those in existing wireless networks [1].", "It will offer new services with ultra-high system capacity, massive device connectivity, ultra-low latency, ultra-high security, ultra-low energy consumption, and extremely high quality of experience [1]\u2013[6].", "Therefore, upcoming networks must have the capability to support high user data rates, low power consumption, and negligible endto-end delays [1]\u2013[6]."]} +{"3930401|16050825": ["There exist few literature reviews [14]\u2013[16], [18], [20], [44]\u2013[48] in different aspects of OWC."]} +{"41271742|6414421": ["Feature The Proposed protocol Common cryptographic encryption protocols [30] The works in [21]-[29]", "The works in [21-[29] propose methods to generate encryption keys by exploiting the wireless radio channels properties.", "Table 1 compares some features between the proposed protocol, the common cryptographic encryption protocols [30], and the works in [21]\u2013[29].", "Various works [21]\u2013[28] reviewed in [29] capitalize on the properties of the wireless channels to produce secret keys from the envelope of the signal to provide a security for wireless radio connections."]} +{"41271742|6779551": ["Security is a critical issue in any fully networked (multiuser access) wireless systems for protecting users\u2019 information [12]."]} +{"16012932|4395259": ["Physical-layer security refers to the techniques which exploit the channel characteristics in order to hide information from unauthorized receivers, without reliance on upper-layer encryption [3]\u2013[9]."]} +{"52129083|17165859": ["Explicitly, Do and Yoo [19] provided an\nin-depth survey of VLC-based positioning systems, while Ca\u030cilean and Dimian [17] summarized the existing solutions designed for integrating VLC into vehicular communications.", "Explicitly, Do and Yoo [19] provided an"]} +{"52129083|64404": []} +{"52129083|14889616": ["According to [172], if a carefully constructed subsets of the original video sequence may lead to video reconstruction either at a reduced picture size or at a reduced frame rate compared to the original one, then this video scheme is deemed to exhibit either spatial or temporal scalability, respectively."]} +{"52129083|7439310": ["become a popular research topic, including efficient compression standards [156]\u2013[158], error-concealment/error-resilient streaming techniques [154], [159], [160], as well as reliable"]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"5918010|4395259": ["Recently, physical layer security, which achieves secure transmissions by exploiting the dynamics in the physical layer, has drawn considerable attention [6], [7]."]} +{"50775107|8909218": ["Cellular networks can achieve a higher area spectral efficiency (ASE) by efficient frequency reuse [6]."]} +{"24275631|6414421": ["Several works reviewed in [7] exploit the wireless channels properties to generate encryption keys from the signal envelop to secure wireless radio links."]} +{"10371772|4395259": ["For the conventional RF wiretap channel with complex channels and an average transmit power constraint, the optimal secret-key beamformer is known to be the generalized eigenvector (GEV) \u03c6max , which corresponds to the largest generalized eigenvalue of the pair ( hH b hb + hH e he,h e he ) [2], [11].", "The upper bound in (6) is obtained by relaxing the amplitude constraint on the input to an average power constraint, which leads to the RF secret key rate for Gaussian channels [2].", "While beamforming strategies are optimal for secret key establishment under an average power constraint [2], their optimality given amplitude and non-negativity constraints on the channel input remains an open problem.", "The two main categories of physical layer security techniques are, (1) those based on intelligent design of transmit coding strategies that do not need a secret key, and (2) those that exploit the wireless communication medium to develop secret keys over public channels [2]."]} +{"19888241|16050825": ["short-range wireless transmission [33], [34]."]} +{"19888241|13074005": ["Generalised Space Shift Keying (GSSK): GSSK is a subset of spatial modulation [146], [147], where spatial domain is exploited to modulate information [148]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"51880852|10979806": ["However, with the advent of 5G of wireless networks and the tremendous number of access points (APs) and billions of connected devices, the demand for designing energy-efficient system is becoming even more compelling [6]."]} +{"69955126|10979806": ["The EE function is defined as the ratio of benifit provided by the system over the total consumed power [3].", "In addition, with the advent of 5G of wireless networks, the tremendous number of access points (APs) and billions of connected devices, the demand for designing energy-efficient systems is becoming even more compelling for seeking to have green communication systems [3].", "VLC networks has been considered as an energy-efficient technology [3], as the LEDs, which are used as transmitters, are energy-efficient devices [4], and because the consumed power used for communication is also used for illumination."]} +{"52122660|10663005": ["It seems there is a good chance to extend 3D channel models that done in RF, such as [129], [130], [190]."]} +{"52122660|16587383": ["This limits the range of communication systems, but it makes OWCs attractive for a variety of short-range wireless communication applications [28]."]} +{"52122660|19938676": ["(MIMO) [2], cell densification, cognitive radio networks, and millimeter wave (mmWave) communications [3], [4]."]} +{"4784926|12187684": ["In order to fully exploit the location- and delay-awareness, we conceive a novel anticipatory design principle by taking into account the anticipated users\u2019 mobility and wireless traffic dynamics when designing indoor VLC solutions [15]."]} +{"4784926|191396": ["Sophisticated technical modelling methods, such as time-series analysis [20], classification [21], regression [22] as well as Bayesian inference solutions [23] have also been investigated, along with various mathematical optimisation methods [24]\u2013[26]."]} diff --git a/edge/graph_52010467.jsonl b/edge/graph_52010467.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52010796.jsonl b/edge/graph_52010796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a0744cad389ea840e6d4c1efed64ae72d5ce5eb --- /dev/null +++ b/edge/graph_52010796.jsonl @@ -0,0 +1,5 @@ +{"4445142|1097238": []} +{"934236|15167343": []} +{"109491165|6746689": []} +{"27853998|12974382": ["Our scope of detection of weeds in grassland is a particular sub-field of 120 automated weed detection in general, which has developed a wider range of methods applicable 121 to simpler cases of crops and weeds growing in flat, row-crop settings, which can typically 122 simplify the task by initial segmentation into green and brown discrete plant and soil regions, 123 unlike the grassland case where everything is green [7, 14,21,32,36,36]."]} +{"24988876|7158350": []} diff --git a/edge/graph_52012210.jsonl b/edge/graph_52012210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52014912.jsonl b/edge/graph_52014912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9456ba45a4892c97d913342b733837fa35b8cb77 --- /dev/null +++ b/edge/graph_52014912.jsonl @@ -0,0 +1,17 @@ +{"5825131|4680026": ["A recent survey paper [20] compares a number of existing collision avoidance algorithms based on model predictive control, boundary following algorithms, artificial potential fields, etc."]} +{"2218490|8363289": []} +{"13420502|8363289": []} +{"1708582|17464562": []} +{"12776676|468992": ["Numerous path planning algorithms within the Lagrangian framework are discussed in the survey papers on swarm robotics [18], [19]."]} +{"468992|1708582": ["RL has been intensively studied in the single robot case where an elegant and unified mathematical framework has been developed (Kaelbling et al. 1996; Sutton and Barto 1998).", "We first introduce reinforcement learning (Kaelbling et al. 1996; Sutton and Barto 1998) and we identify the key challenges in the application of the methods developed for reinforcement learning to swarm robotics.", "For a more formal introduction and more details about RL, the interested reader can refer to Kaelbling et al. (1996)."]} +{"468992|8767649": ["In this review, we use these characteristics to discriminate between the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al., 2001).", "In this review, we use these characteristics to discriminate the works that belong to swarm robotics from those that belong to other multi-robot approaches (Iocchi et al. 2001).", "replicate the behavior observed in cockroaches by Jeanson et al. (2005). The robots are able to collectively aggregate in a circular arena using a PFSM approach."]} +{"14499088|8363289": []} +{"32963138|1932843": [", 1999) that has been very successful in aiding representation and solutions in single robot domains (Kober et al., 2013; Lim et al., 2011).", "The options framework is a formal model of MAs (Sutton et al., 1999) that has been very successful in aiding representation and solutions in single robot domains (Kober et al., 2013; Lim et al., 2011)."]} +{"6368985|10770351": ["While there has been prior research on the optimal control of queuing systems [37, 38], the application of these techniques to airport operations has remained a challenge."]} +{"6762034|1708582": ["Dyna requires an order of magnitude fewer real experiences than model-free RL to arrive to an optimal policy, but consumes about six times more computational resources [ 21 ].", "Dyna requires an order of magnitude fewer real experiences than model-free RL to arrive to an optimal policy, but consumes about six times more computational resources (Kaelbling et al., 1996)."]} +{"3691682|1177069": ["Path planning for such a problem is described as Coverage Path Planning (CPP) [29], where for a given area the CPP provides a path from which the entire workplace can be scanned with an onboard camera.", "Path planning for such a problem is described as Coverage Path Planning (CPP) [29], where for a given area the CPP provides a path from which"]} +{"3610130|7271501": []} +{"11037221|7271501": ["oposed a local\u00b4 algorithm to solve MPCP using max-min/min-max Linear Programming (LPs) in a distributed manner. We show how to leverage this algorithm to solve SATA. There have been many studies [6], [7] on cooperative target tracking in both control and robotics communities. Yu et al. [8] presented an auction-based decentralized algorithm for cooperative tracking of a mobile target. Capitan et al. ["]} +{"11037221|6588866": ["In [2] a local algorithm is a constant-time distributed algorithm that is independent of the size of a network.", "This problem can be viewed as a set cover and its dual maximum cover [2] where every target is covered by a FoV of at least one motion primitive of a robot.", "This implies that the relationship between a robot and the corresponding motion primitives turns out to be a packing problem [2] where only one motion primitive can be \u201cpacked\u201d per robot."]} +{"14144602|10813427": ["Broadly speaking, multi-scale representations are largely adopted in di\ufb00erent research \ufb01elds such as Computer Graphics (see (Pa-jarola and Gobbetti, 2007) for a particular application example) and Computational Geometry (see (de Berg et al., 2000) for an extensive treatment of the subject)."]} +{"15024807|6607209": []} diff --git a/edge/graph_52015330.jsonl b/edge/graph_52015330.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cec8322dc992ae150fb1c18e1d438b721ac688b --- /dev/null +++ b/edge/graph_52015330.jsonl @@ -0,0 +1,117 @@ +{"2949800|2623404": ["The concept of SDN [15], [12] has emerged as a popular tool for the management of network services through abstraction of low-level functionality on a large cluster of network devices."]} +{"53038608|3757239": ["However, based on the growing demand on mobile data traffic, recent studies try to bring content one step closer to the user and deploy caching server at the edge of the radio access network (RAN) (e.g., base stations) to enhance mobile network performance and maintain QoE [2, 6, 24, 29, 30]."]} +{"3126237|3330461": []} +{"2315057|31860478": ["applications, the computing resources are brought closer to users by a new computing paradigm, edge computing [19], [53], also known as fog computing [9], [11].", "This gives rise to edge computing [19], [53] (also known as fog computing [9], [11]), a new computing paradigm that addresses the concerns by shifting data processing and computation to the edge of the network."]} +{"206578486|206578224": ["Reference [45] provides a survey of MEC."]} +{"206578486|6909107": [" data centers, using technologies such as OpenStack and ONOS [34]. Let us also stress that a few surveys that discuss mobile edge computing at large have been published in the very recent past (e.g., [35]). A. Cyber Foraging Cyber foraging is among the first concepts for edge computing but has now been superseded by more recent concepts such a cloudlet, MEC, and fog. We discuss it here because of its "]} +{"206578486|26429034": ["Such a characterization can be achieved through the analysis of corresponding real-world traces, through machine learning techniques [151], [158]."]} +{"206578486|7329149": ["For instance, Industrial IoT solutions [159] usually require low-latency ingestion but immediate processing of data [160]."]} +{"3835691|2623404": ["Meanwhile, Software Defined Network (SDN) [6] has been envisioned as a new approach to enable network programmability to test out new protocols."]} +{"5843471|26368310": ["The service replication approaches have been highly studied in the literature for VMs to support high availability (HA) [14]."]} +{"9681222|19938676": ["Number of task requests per ICP 3 Sensing units per task request [1-10] Computation capacity per device [1-10] MFLOPS Storage resource units per device [10-100] MBs Sensing resource units per device [0-1] Computation capacity of Cloud Unlimited Storage resource units of Cloud Unlimited Computation capacity of Edge node 10 MFLOPS Storage resource units of Edge node 100 MBs Number of ICPs [4-24] Number of devices per ICP 3 Mobility pattern ICP Levy Flights (\u03b1 = 1) Round Trip Time Remote Cloud 80 ms Round Trip Time X2 inter-edge link 10 ms Edge coverage radius 100 m LTE Bandwidth [1.", "The efforts of academic, industrial, and standardization bodies are pushing towards the fulfillment of IoT requirements through the next-to-come fifth generation (5G) wireless systems [14], [15], [16]."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"496783|6909107": ["An alternative approach is path selection [1], where a more suitable path is found for delivery of computed data from a data center to a mobile terminal.", ", fog nodes), it provides low-latency and ubiquitously available computation services [1, 2]."]} +{"496783|10299098": ["During a handover, important procedures such as disconnection from the old fog conducted additional latency caused by handover is minimized."]} +{"18665051|485843": []} +{"206713287|15545863": []} +{"25018208|4502294": ["Besides, the network capacity of backhaul edges and the data rate requirement of applications are referred from the Cisco documents [14], [15]."]} +{"17535274|2294541": ["However, this scheme is vulnerable to sybil attack [33], where a malicious supernode forges multiple identities and gains advantage by receiving high ratings from these identities."]} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"37451636|3007529": ["To name a few application scenarios include intelligent transportation systems (ITS) [11], volunteer information networks [12], Internet of Things (IoT) [13]\u2013[15], smart grids [16], [17] and much more."]} +{"37451636|3348390": []} +{"37451636|9104850": []} +{"4722469|9104850": ["Web caching is an established technique of reducing userperceived latency experienced when retrieving information from across the World Wide Web [38].", "It has already been established that document retrieval systems over the Internet, i.e. the World Wide Web (WWW), can reap extensive benefits with caches at the edge [15]."]} +{"3465792|38911919": ["Regarding coordination, the usual focus of clustering algorithms is on completely distributed algorithms [3, 6, 10, 13].", "Cooper et al. [6] outline the basic scheme of a cluster creation algorithm as follows: \u2022 Gather control data: To calculate the clusters, control information has to be exchanged.", "The general clustering steps given in [6] can be nicely mapped onto our concept of virtual edge servers (shown in Figure 2): (1) Gather control data: Control data required is information about the cars\u2019 geographical position as well as their ID.", "Unfortunately, such dynamic clustering solutions failed in general due to the very dynamic nature of Vehicular Ad Hoc Networks (VANETs) [3, 6]."]} +{"5680434|2623404": ["A flow entity consists of match fields, counters, and a set of instructions to match to the incoming packets, collect statistics regarding the current flow, and handle a matched packet.", "\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"5680434|10693567": ["\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"27060711|10693567": []} +{"20603166|6909107": ["This helps operators to increase the service quality through the effective mobility management in addition to the benefits of utilizing cloud-like resources at the edge [101]."]} +{"20603166|9436049": ["Although there are studies focus on this area [231], [232], server placement in the Metropolitan area need to be studied in detail and analyzed"]} +{"20603166|3767252": ["Because of the major differences with respect to the implementation and deployment of the mentioned proposals, the security mechanisms and underlying protocols will also vary [77].", "Therefore, MEC developments should intrinsically enable security and privacy for protecting the applications and user data at the edge server and provide an authentication system for the vehicles [25], [77], [99].", "On the other hand, any casual user such as a public place owner can deploy a Cloudlet or Fog server within a private environment [77]."]} +{"20603166|8650651": ["In the case of SDON, standardization of this interface may improve the operations to a greater level since an optical network may cover a large area consisting multiple domains [221].", "The role of the northbound interface in SDONs is still raw for the time being and research in this area is more challenging since there are multitude of interfaces that should be managed in physical and transport layers [221]."]} +{"20603166|11414835": ["virtualization are feasible for abstraction and isolation, it is observed that there is a lack of complete performance evaluation [219]."]} +{"20603166|2535224": ["ization in wireless and mobile networks is more challenging and complicated [224]."]} +{"20603166|2623404": ["Moreover, there are surveys on SDN [26]\u2013[30], Software Defined Wireless Networks (SDWN) [31], [32] and Network Functions Virtualization (NFV) [33], [34] which are the complementary technologies for improving the operations of edge servers."]} +{"20603166|10693567": ["[138], OpenFlow was firstly used for a campus network which is an inspiration to support campus-based scenarios for Edge Computing."]} +{"20603166|3042864": ["There are recent surveys on cloud computing [18], [19] and MCC [8], [20]\u2013[22].", "In [20], the mobile cloud is defined in two different ways: \u2022 Infrastructure based \u2022 Ad-hoc mobile cloud According to this classification, the infrastructure based model specifies the hardware infrastructure of cloud datacenters serving to mobile users."]} +{"20603166|10532321": ["to the data plane [135]."]} +{"6666380|3348390": ["Context awareness is also a crucial aspect of the IoT, characterizing entities and related events [5]."]} +{"19425576|14002306": ["Many applications such as traffic engineering and urban planning need to understand humanmobility [10]."]} +{"206779368|10355303": ["5In practical object tracking systems, this synchronization step is typically automated [19]."]} +{"25088296|31860478": ["There are several dimensions in fog architecture in term of the current standard practice [35]."]} +{"6185899|8183369": []} +{"2320924|12675271": [", Raspberry Pi, Cubie boards etc) are drawing significant attention for several reasons: these devices are cheap, consume low energy and (if optimised) have enough resources to support applications of practical interest such as those used in smart cities [1]."]} +{"6428110|206743327": []} +{"22272821|18750590": ["Here, dynamic pricing leads to cheaper resources for the buyer and better utilization for the seller [16], but there is a need to deal with the following challenges: \u2022 Uncertainty about pricing: Due to a lack of ground truth, it is difficult to validate resource valuations."]} +{"44185627|256317": ["For example, many IoT devices cannot implement strong cryptographic functions and thus vulnerable to spoofing and replay attacks [5,6]."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"9496996|12815020": []} +{"12675271|14472531": []} +{"12675271|31860478": ["The data plane is responsible for transferring data from the originator to the destination based on the routing information provided by the control plane logic [Chiang 2015].", "Chiang [Chiang 2015] has highlighted main differences between Cloud and Fog.", "Fog networking constitutes two planes, namely, 1) control plane and 2) data plane [Chiang 2015].", "\u2026stored primarily in cloud data centers), communication (rather than routed over the internet backbone), and control, con\ufb01gu-ration, measurement and management (rather than controlled primarily by network gateways such as those in the LTE (telecommunication) core)\u201d [Chiang 2015; Aazam and Huh 2014]."]} +{"12675271|3007529": ["Predictive and opportunistic models will be useful in handling these challenges [Pozza et al. 2015; Higuchi et al. 2014]."]} +{"12675271|7329149": ["These sensors will have a wide range of sensing capabilities [Perera et al. 2015a].", "However, as these platforms receive more and more personal data and once these platforms start sharing data between different parties, privacy becomes a serious concern and a great challenge to address [Perera et al. 2015b].", "Smart home solutions have traditionally used fog computing approaches over the last decade [Perera et al. 2015a; 2014c].", "In order to reduce the burden to the volunteers, Michael only needs to collect data from a maximum of 30 sensors kits (i.e., volunteers) despite the actual number of volunteers visiting the park at weekends\u201d [Perera et al. 2015c].", "Some common cloud computing platforms are discussed in [Perera et al. 2015a].", "These generic use case scenarios were extracted, with minor alterations, from two of our previous publications [Perera et al. 2014b; Perera et al. 2015c].", "However, they still need to adhere to the \ufb01rst rule that says sense only when moving\u201d [Perera et al. 2015c]."]} +{"12675271|1598350": ["According to the literature comparison presented in Table III, context discovery and awareness [Perera et al. 2014a] and semantic annotation is fairly ignored.", "Direct communication can be done via technologies such as 3G, which makes this approach less dependent on third parties (as depicted in (3) in Figure 3)\u201d [Perera et al. 2014b].", "A detailed comparison is presented in Table VI in [Perera et al. 2014a].", "The cloud IoT platforms can use such information to develop energy and privacy aware data collection plans [Perera et al. 2014b].", "Each time a gateway moves, the discoverer including security procedure needs to be executed repeatedly to make sure ICOs are well maintained [Perera et al. 2014a].", "Context data can provide information about data quality which is also has a direct impact on the fused results [Perera et al. 2014a].", "A detailed comparison is presented in Table V in [Perera et al. 2014a].", "Smart home solutions have traditionally used fog computing approaches over the last decade [Perera et al. 2015a; 2014c].", "Ideally, fog gateway devices can be used in all three types of sensing approaches mentioned above to make the sensing process more ef\ufb01cient\u201d [Perera et al. 2014b].", "Finally, health and safety authorities can monitor and supervise the waste management process without spending a substantial amount of money for manual monitoring inspections\u201d [Perera et al. 2014b].", "The challenge is to \ufb01nd a common ground as soon as possible so hey can initiate thee communication [Perera et al. 2014b].", "Such intelligent (re-)con\ufb01guration can save energy by eliminating ineffectual sensing and network communication\u201d [Perera et al. 2014b].", "To do this, both parties need to negotiate and agree to a common protocol and message sequence [Perera et al. 2014a].", "Gateway Device Cloud Middleware fog gateways can use such information to con\ufb01gure themselves accordingly (e.g., prepare to accept data in a certain way) [Perera et al. 2014a].", "It is inef\ufb01cient and cumbersome to connect ICOs to IoT applications manually through hard wired coding [Perera et al. 2014a].", "Typical, each ICO may have support one protocol and message sequence that can be used for con\ufb01g-uration [Perera et al. 2014a].", "Smart cities investments are designed to focus of \ufb01nding ICT based sustainable solutions to address growing issues [Perera et al. 2014b].", "Further more, ICOs also need to con\ufb01gure their scheduling calendar, communication frequency, data acquisition methods and sampling rate [Perera et al. 2014a].", "Further, context information is [Perera et al. 2014a] typically useful in inferring knowledge about what is exactly happening in the \ufb01eld.", "These generic use case scenarios were extracted, with minor alterations, from two of our previous publications [Perera et al. 2014b; Perera et al. 2015c].", "We have discussed what context information is in [Perera et al. 2014a] in detail."]} +{"12675271|3750204": ["Data stream analytics are discussed in detail in [Liu et al. 2014; Singh et al. 2016; Singh and Reddy 2015]."]} +{"12675271|3348390": ["According to the literature comparison presented in Table III, context discovery and awareness [Perera et al. 2014a] and semantic annotation is fairly ignored.", "Direct communication can be done via technologies such as 3G, which makes this approach less dependent on third parties (as depicted in (3) in Figure 3)\u201d [Perera et al. 2014b].", "A detailed comparison is presented in Table VI in [Perera et al. 2014a].", "The cloud IoT platforms can use such information to develop energy and privacy aware data collection plans [Perera et al. 2014b].", "Each time a gateway moves, the discoverer including security procedure needs to be executed repeatedly to make sure ICOs are well maintained [Perera et al. 2014a].", "Context data can provide information about data quality which is also has a direct impact on the fused results [Perera et al. 2014a].", "A detailed comparison is presented in Table V in [Perera et al. 2014a].", "Smart home solutions have traditionally used fog computing approaches over the last decade [Perera et al. 2015a; 2014c].", "Ideally, fog gateway devices can be used in all three types of sensing approaches mentioned above to make the sensing process more ef\ufb01cient\u201d [Perera et al. 2014b].", "Finally, health and safety authorities can monitor and supervise the waste management process without spending a substantial amount of money for manual monitoring inspections\u201d [Perera et al. 2014b].", "The challenge is to \ufb01nd a common ground as soon as possible so hey can initiate thee communication [Perera et al. 2014b].", "Such intelligent (re-)con\ufb01guration can save energy by eliminating ineffectual sensing and network communication\u201d [Perera et al. 2014b].", "To do this, both parties need to negotiate and agree to a common protocol and message sequence [Perera et al. 2014a].", "Gateway Device Cloud Middleware fog gateways can use such information to con\ufb01gure themselves accordingly (e.g., prepare to accept data in a certain way) [Perera et al. 2014a].", "It is inef\ufb01cient and cumbersome to connect ICOs to IoT applications manually through hard wired coding [Perera et al. 2014a].", "Typical, each ICO may have support one protocol and message sequence that can be used for con\ufb01g-uration [Perera et al. 2014a].", "Smart cities investments are designed to focus of \ufb01nding ICT based sustainable solutions to address growing issues [Perera et al. 2014b].", "Further more, ICOs also need to con\ufb01gure their scheduling calendar, communication frequency, data acquisition methods and sampling rate [Perera et al. 2014a].", "Further, context information is [Perera et al. 2014a] typically useful in inferring knowledge about what is exactly happening in the \ufb01eld.", "These generic use case scenarios were extracted, with minor alterations, from two of our previous publications [Perera et al. 2014b; Perera et al. 2015c].", "We have discussed what context information is in [Perera et al. 2014a] in detail."]} +{"12675271|15300368": ["As a result, each node can transmit, receive, or do both to enable routing data between nodes within the network [Buratti et al. 2009].", "As a result, each node can transmit, receive or do both in order to enable routing data between nodes within the network [Buratti et al. 2009]."]} +{"11431849|10536678": []} +{"11431849|7842253": ["Apart from fog-specific resource provisioning solutions, resource provisioning and service placement are major research challenges in the general field of cloud computing [7,23,40]."]} +{"6669015|10299098": ["Although cloud computing enables convenient access to a centralized pool of con gurable and powerful computing resources, it often cannot meet the stringent requirements of latency-sensitive applications due to the often unpredictable network latency and expensive bandwidth [14, 25].", "The computation energy consumption for each task processed at SBS i is proportional to the square of the CPU speed (fi ) 2, presented as e i = \u03ba(fi ) 2, where \u03ba is a constant depending on the CPU architecture [14]."]} +{"6669015|206578365": []} +{"31245453|31860478": ["Fog node j can choose to serve its received workload using the following three ways: 1) No Offloading: Fog node j can directly forward all the received workload to cloud data centers through the backbone IP network [1]."]} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"52126871|206578486": ["Moreover, cloudlets use only VM for virtualization, however, both fog and MEC can use other technologies other than VMs for virtualization [32].", "However, compared to [32], our survey is different in the organization of resource sharing and research issues in F-RAN architecture.", "A more detail analysis is presented in [32] covering on the two different applications domain namely IoT and content delivery networks (CDN) as the basis of driving force to the emergence of fog computing.", "Another main difference is that cloudlet mainly focuses on mobile offloading, and MEC aims to handle the applications that are better suited in either mobile or non-mobile edge networks, however, fog computing overlaps between edge and cloud while satisfying a large number of latency-sensitive applications for resource-constraint end devices [32].", "The resource-rich computers with high computation power are placed in a strategic location with EU\u2019s vicinity [32]."]} +{"52126871|12675271": ["There are related survey papers [20], [37]\u2013[40] that", "While the aforementioned surveys [20], [37], [39], [40], [42]", "com/news/onq/2017/02/01/vr-and-ar-are-pushinglimits-connectivity-5g-our-rescue management [170] are suggested in [40] as a case study in fogenabled smart cities.", "Recently, another survey is focused on how cloud and fog computing paradigm handle the research challenges such as knowledge discovery using data analytics with limited computational resources of edge devices to build a sustainable IoT infrastructure for smart cities [40].", "potential to fulfill the diverse requirements in various applications ranging from smart cities [40], [151]\u2013[156], transportation [157]\u2013[159], surveillance (e.", "Some case studies are presented with the characteristics of fog computing in smart cities [40].", "However, algorithmic aspects are not considered in [40]."]} +{"52126871|6909107": ["Moreover, cloudlets use only VM for virtualization, however, both fog and MEC can use other technologies other than VMs for virtualization [32].", "In March 2017, the ETSI has expanded the scope of MEC and after that replaced the term \u201cMobile\u201d by \u201cMulti-access\u201d.", "This consortium was founded by ARM, Cisco, Dell, Intel, Microsoft Corp., and the Princeton University Edge Laboratory on November 19, 2015.", "Table II summarizes the basic differences between fog, cloudlets, and MEC.", "The edges of non-mobile networks are also being considered in multi-access edge computing (MEC) [36].", "Another main difference is that cloudlet mainly focuses on mobile offloading, and MEC aims to handle the applications that are better suited in either mobile or non-mobile edge networks, however, fog computing overlaps between edge and cloud while satisfying a large number of latency-sensitive applications for resource-constraint end devices [32].", "This standardization effort is driven by several leading mobile operators such as DOCOMO, Vodafone, and TELECOM Italia and manufacturers such as IBM, Nokia, Huawei, and Intel [34].", "However, as cloudlets are not an integral part of a mobile network, sometimes it becomes hard to fulfill the Quality-of-Service of the mobile devices [34].", "Fog computing is being promoted by several companies such as intelligent edge by Intel [19].", "Finally, until today, MEC works only in standalone mode while cloudlets can function in standalone and can connect to the cloud, although there is a lack of detail discussion in literature how to interact between cloud and cloudlets, fog computing needs the support of the cloud for the tasks that might not be performed in the resource-constraint fog layer.", "Note that the ETSI is the main driving force for MEC [34], [36], however, fog and cloudlets are driven by", "Note that the ETSI is the main driving force for MEC [34], [36], however, fog and cloudlets are driven by research and development, although OpenFog consortium aims at the development of fog architecture and standardization details.", "From the above discussion, it is observed that cloudlets, MEC, and fog computing focus on edge computing, however, there is a significant difference between these technologies."]} +{"52126871|8523192": ["There are related survey papers [20], [37]\u2013[40] that", "While the aforementioned surveys [20], [37], [39], [40], [42]", "[37] detailed a taxonomy of fog computing according to challenges and features of fog computing.", "2) Virtual Cluster: The EU nodes form a virtual cluster, also termed as mini-cloud [37], that corresponds to the logical boundary of these EU nodes.", "ing a local \u2018mini-cloud\u2019 [37] is one of the main research challenges."]} +{"52126871|3348390": ["In such cases, location-awareness [156], [170] and almost real-time response", "[159] discuss the requirements such as reusable, scalable, context-aware [156], [174], and high-level abstraction in applications model and programming abstractions.", "potential to fulfill the diverse requirements in various applications ranging from smart cities [40], [151]\u2013[156], transportation [157]\u2013[159], surveillance (e."]} +{"44203315|12675271": ["For these reasons, Fog/Edge computing can be exploited in many IoT scenarios, ranging from smart agriculture to smart cities [8]."]} +{"10344967|4427557": []} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"7174352|3757239": ["By offloading different components of mobile applications to the cloud server, the performance of mobile applications can be greatly improved and the energy consumption of the MDs can be significantly reduced [4]."]} +{"3412534|2088679": []} +{"3412534|6909107": []} +{"11409177|3348390": ["The recently defined Internet of Things (IoT) paradigm is mainly founded by the concept of a massive heterogeneous set of devices demanding anywhere, anytime, anyhow connectivity [1] to support a large set of enriched services and applications, strongly impacting on the society."]} +{"21557419|3119314": ["[8] together with security and privacy issues and available services and resources."]} +{"19112937|3767252": ["The security of edge computing has previously been reviewed [5], and the author suggested that FC/MEC is a paradigm of edge computing.", "However, their network model and many features are similar [5].", "There are some studies related to intrusion detection in FC/MEC [5, 15, 16].", "Threats may come from various aspects for a network with such characteristics, such as denial of service (DoS), man in the middle (MIM), rogue gateway, privacy leakage, and service manipulation [5]."]} +{"2162002|3767252": []} +{"77437|31860478": ["To cope with this trend, fog radio access network (Fog-RAN) is emerging as a promising network architecture, in which the storage, computation, and communication functionalities are moved to the edge of wireless networks, i.e., to the near-user edge devices and end-user terminals [2]\u2013[4].", "With the explosive growth of consumer-oriented multimedia applications, a large scale of end devices, such as smart phones, wearable devices and vehicles, need to be connected via wireless networking [2]."]} +{"5049901|3119314": ["Recently, Osanaiye et al. (2017) discussed the security and privacy issue of fog computing in a virtualized environment."]} +{"5049901|3757239": ["Recently, Wang et al. (2017) proposed a graph-partition-based functional cell distribution scheme between the sensor node and data aggregator.", "Wang et al. (2017) gave a detailed survey on mobile edge computing, with an emphasis on wireless communication and edge networking."]} +{"5049901|8523192": ["Mahmud and Buyya (2016) proposed a taxonomy of fog computing and gave a broad review on component types, general metrics, and design objectives."]} +{"5049901|10979806": []} +{"5049901|3767252": []} +{"5049901|193574": ["There have been prior surveys that summarize the architecture design and resource management of distributed systems (Orgerie et al. 2014) and mobile systems (Bellavista 2012)."]} +{"5049901|14697846": []} +{"24875288|3757239": []} +{"11941316|3042864": ["However, the WAN round trip time between mobile users and remote cloud is a fatal limitation to the time critical applications [5]."]} +{"7770630|33492114": ["For the VM placement issue in a cloud data center, a comprehensive study of the VM placement and consolidation techniques used in cloud was presented in [12]."]} +{"20262285|10299098": ["More details about the MEC paradigm can be found in [2, 3] and the references therein."]} +{"20262285|3767252": ["[9, 10] and the references therein)."]} +{"16157619|18717047": ["The second architectural principle is the use of the REpresentational State Transfer (REST) paradigm [8] for the interactions between the PaaS and the Fog, as it is commonly used for PaaS-IaaS interactions nowadays."]} +{"10237768|206578224": ["To tackle these issues, nextgeneration network architectures are increasingly considering the multi-access Edge computing paradigm [8], [20] as a means to extend Cloud computing processing capabilities at the edge of the network, by introducing the concept of Cloudlets.", "Indeed, accounting for the momentum shown by multiaccess Edge computing [8] and Fog computing [9] paradigms, which move intelligence toward the edge of the network, we"]} +{"36905338|64404": []} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"29701473|29464310": []} diff --git a/edge/graph_52016139.jsonl b/edge/graph_52016139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fedf5c194c5673ad013aacad02266fc998797b7 --- /dev/null +++ b/edge/graph_52016139.jsonl @@ -0,0 +1,9 @@ +{"24352132|14843594": ["The earliest meta-modeling approaches were based on genetic algorithms [9, 11, 13] or Bayesian optimization [2, 10]."]} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} +{"1740355|1708582": []} +{"1740355|14843594": ["Bayesian optimization has also been used (Shahriari et al., 2016) for automatic selection of network architectures (Bergstra et al., 2013; Domhan et al., 2015) and hyperparameters (Snoek et al., 2012; Swersky et al., 2013)."]} +{"14216084|14843594": ["differentiable model, which is preferable to the Gaussian kernel popular elsewhere, because it makes less restrictive 1Comprehensive tutorials are presented by Brochu et al. [17] and Shahriari et al. [18]. 2 smoothness assumptions, which can be helpful in the optimization setting [5]: k 5=2 (x;x 0) = 1 + p 5d (x;x0) + 5=3d2 (x;x0) e p 5d (x;x0): (1) Here, and are free parameters\u2014hyperparam"]} +{"7044373|9316331": ["MCTS uses two policies: a tree policy , which determines the path to be traversed from the root to the frontier of the already expanded tree; and a rollout policy , which determines the path to be traversed from the frontier of the already expanded tree until a leaf is reached.", "We think that this is because there are too many possible values for the \ufb01rst few hyperparameters in the tree, so MCTS will not be able to identify and focus on high-performance regions of the search space within the number of evaluations available.", "The restructuring operation allows MCTS to effectively consider hyperparameters with a large number of possible values .", "When MCTS visits a node in the expanded part of the tree, it has to expand all children of that node before expanding any children of its currently expanded children.", "MCTS maintains a search tree that is expanded incrementally one node at a time.", "We also described more complex model search algorithms, such as MCTS, MCTS with tree restructuring, and SMBO.", "MCTS applied to this tree results in more sharing when compared to the original tree.", "We experiment with different search algorithms, such as Monte Carlo tree search [7] and Sequential Model Based Optimization [12].", "Surprisingly, MCTS without restructuring does not out-perform random search.", "MCTS with bisection and SMBO do not suffer from these problems, and therefore can identify and focus on high performance regions of the search space earlier.", "Monte Carlo tree search (MCTS) [7, 16] is an approximate planning technique that has been used effectively in many domains [22].", "In addition to achieving a higher top accuracy, MCTS with bisection and SMBO evaluate a larger fraction of high-performance models when compared to random search, which can be seen in Figure 6.", "We present experiments on CIFAR-10 comparing different model search algorithms and show that MCTS with tree restructuring and SMBO outperform random search.", "On the rightmost plot in Figure 5, we see that both SMBO and MCTS with bi-section eventually outperform random search; MCTS with bisection starts outperforming random search around 32 evaluations, while for SMBO, it happens around 16 evaluations.", "Contrary to random search, MCTS uses the information gathered so far to steer its policy towards better performing parts of the search space.", "MCTS is tabular in the sense that it keeps statistics for each node in the tree."]} +{"49868221|14843594": ["To e\ufb03ciently optimize in the joint space of architectures and hyperparameters, we use BOHB (Falkner et al., 2018), a recent combination of Bayesian optimization (Shahriari et al., 2016) and Hyperband (Li et al., 2017).", "Speci\ufb01cally, our contributions are as follows: \u2022 We show how to use a recent combination (Falkner et al., 2018) of Bayesian optimization (Shahriari et al., 2016) and Hyperband (Li et al., 2017) to perform e\ufb03cient joint neural architecture and hyperparameter search."]} +{"4750571|10175374": ["at each task has an underlying feature hierarchy, and tasks are related through an a priori alignment of their respective hierarchies. These methods have been reviewed in more detail in previous work [29, 37]. Another existing approach adapts network structure by learning task hierarchies, though it still assumes this strong hierarchical feature alignment [26]. Soft ordering is a recent approach that avoi"]} +{"32444133|4884302": ["Deep learning methods are very successful in various applications such as machine translation [1], image and speech recognition [2]\u2013[4] or reinforcement learning in general [5]."]} diff --git a/edge/graph_52018100.jsonl b/edge/graph_52018100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e99c2a144ecd9bdf2f0a129e53f16a5e9ebfe930 --- /dev/null +++ b/edge/graph_52018100.jsonl @@ -0,0 +1,5 @@ +{"17916053|15485264": ["Algorithms which appeared in the last five years include bat algorithm [17], cuckoo search [3], flower pollination algorithm [18], and others, which are in addition to the popular and well-accepted algorithms such as particle swarm optimization, ant colony optimization, firefly algorithm,\u2026", "Detailed list of applications can be found in recent review articles [3, 17] or books [2]."]} +{"122255|4621813": ["Although there have been studies surveying different approaches mostly on the detection of nonoverlapping [43, 69, 116] and overlapping [57, 136] communities separately, no attempts have been initiated to understand thoroughly the metrics used to design the algorithms and to evaluate the goodness of a community structure.", "\u2026different approaches mostly on the detection of non-overlapping [Lancichinetti and Fortunato 2009; Fortunato 2010] and overlapping [Xie et al. 2013; Harenberg et al. 2014] communities separately, no attempts have been initiated to understand thoroughly the metrics used to design the algorithms and\u2026"]} +{"3688981|12574246": []} +{"49648277|9659809": []} +{"6649158|8424228": ["[13, 37]), and inconsistency resolution protocols are often based on one form or another of majority voting, preferring the version of the data supported by the majority of the available copies."]} diff --git a/edge/graph_52020372.jsonl b/edge/graph_52020372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..788b501da1a5e5653e9e11c989c5104b14dd5700 --- /dev/null +++ b/edge/graph_52020372.jsonl @@ -0,0 +1 @@ +{"31617513|4967411": ["For instance, in Example 1, given the act a1, we have \u03c9 M1(7) 1 = (1)3 , \u03c91((12)) 1 = (2)3 , \u03c92((5)) 2 = 0, and \u03c92((7)) 3 = (1)5 .", "By Formula 18, we have \u03b2 = m(B1) |M1| M1(7) + m(B3) |M3| M3(7) 2((m(B1) + m(B3)) \u2212 q1) = 0.", "\u03c9 M1(7) 1 = f ( 2 3 ) \u2212 f ( 1 3 ) = 0, \u03c9 M3(7) 3 = f ( 3 5 ) \u2212 f ( 2 5 ) = 0.", "\u03c9 M1(7) 1 = \u03c91((12)) 1 = \u03c91((6)) 1 = 1 3 ,", "In this case, \u03c91((7)) 1 and \u03c9 M3(7) 3 do not satisfy Equation 24.", "For example, if Mk = {7, 12, 6}, then Mk(7) = 2, Mk(12) = 1, and Mk(6) = 3."]} diff --git a/edge/graph_52020756.jsonl b/edge/graph_52020756.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..156fc4df41a01ab6a05cd64d8607263a8875d70f --- /dev/null +++ b/edge/graph_52020756.jsonl @@ -0,0 +1,2 @@ +{"123815368|5701967": []} +{"5701967|6801870": ["In sociology, entropy is the natural decay of structures [3]."]} diff --git a/edge/graph_52024669.jsonl b/edge/graph_52024669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00dc23945559f5dbfa2e8294f249eee37a3c5d72 --- /dev/null +++ b/edge/graph_52024669.jsonl @@ -0,0 +1,8 @@ +{"16952027|2509135": ["Recent work mainly focuses on further sophistication of these basic techniques with an aim to make sensing results more robust and accurate at the same time [16,18]."]} +{"16952027|10908575": ["Local spectrum sensing at CR [15],[16]."]} +{"16952027|12601073": ["Covariance based detection exploits the inherent correlation in received PU signal samples resulting from the time dispersive nature of wireless channel and oversampling of received signal [50]."]} +{"9781809|5660618": []} +{"59829341|15116409": []} +{"59829341|12601073": []} +{"3759709|2509135": [", [137-140], which may cover these topics."]} +{"3759709|12452682": ["In the CR networks, the SUs compete for spectrum resources to maximize their own utilities where game theory models can be used [99]."]} diff --git a/edge/graph_52033756.jsonl b/edge/graph_52033756.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d1a345c63c36231145f42263588a1a543b43148 --- /dev/null +++ b/edge/graph_52033756.jsonl @@ -0,0 +1,8 @@ +{"7751269|7360895": ["In human-robot interactions, people tend to consciously treat robots as non-living mechanics but unconsciously, they engage robots in fundamentally social ways [1, 2]."]} +{"6056829|18948342": ["A recent survey by Ruhland et al. [14] gives in a broad overview of eye gaze research in HCI and social robotics."]} +{"207178553|7360895": ["In the Human-Robot Interaction (HRI) community it is still under debate what characteristics de\ufb01ne a social robot [9, 12]."]} +{"3744970|65041751": ["While human-robot gaze has been studied extensively (see Admoni & Scassellati [1] for a review), none of this work speci\ufb01cally has targetted infants."]} +{"18752719|14424486": ["However, so far, these systems generally incorporate simple rule-based extensions to deal with students' affective states, and are based on virtual tutors, not physically embodied robots Nye, Graesser, and Hu (2014).", "(2010) or in one-on-one tutoring sessions Saerbeck et al. (2010); Kory, Jeong, and Breazeal; Fridin (2014)."]} +{"56069288|16280711": ["This study forecasts that AR can enhance human-robot collaboration, particularly in learning and teaching because AR technology has many benefits that may help create a more ideal environment and communication channels such as an ego-centric view and ex-centric view mentioned by Green et al. (2008)."]} +{"14598906|7147372": ["Since basic technology integration within classrooms has historically suffered from logistics, time, and financial constraints [25], it is reasonable to think that these issues hold, or may even increase when integrating more advanced technologies in the classroom."]} +{"956928|7360895": ["starting to be addressed in a coordinated manner [35, 10, 48, 9, 17, 20, 33, 38, 23, 34, 32]."]} diff --git a/edge/graph_52035877.jsonl b/edge/graph_52035877.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52036404.jsonl b/edge/graph_52036404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d02f1b046ebe150855abbab5e665caf0dce577bf --- /dev/null +++ b/edge/graph_52036404.jsonl @@ -0,0 +1,10 @@ +{"195428750|1230643": []} +{"17062330|10096622": []} +{"10034050|1236072": []} +{"14487867|3894519": ["[18] gives a detailed comparison analysis on different variants of LEACH as A-LEACH, S-LEACH and M-LEACH in terms of energy"]} +{"1382310|3894519": ["The technological advancements in the field of hardware design and system on chip has enabled the designers to create minute wireless sensors which performs many DSP operations[1] [10]."]} +{"18721617|1230643": ["We will calculate the quadratic sum of the distances from each cluster head to its member nodes in the optimal solution."]} +{"2658554|1230643": []} +{"3527628|205286988": []} +{"16281674|10096622": ["However, the simulation results for the method (PSO-Clustering or PSO-C) have shown outperforming results in comparison with LEACH [10] and LEACH-C [11] protocols respectively.", "Finally, energy computation is performed to evaluate the energy savings performed by our proposed technique as compared with the LEACH-C [8] and PSO-C [6] protocols."]} +{"16281674|1230643": ["The demand for these networks is spurred by various civilian and military applications [1,2]."]} diff --git a/edge/graph_52043210.jsonl b/edge/graph_52043210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3858a7b7ff4672beea6911823c4bffa935aae28d --- /dev/null +++ b/edge/graph_52043210.jsonl @@ -0,0 +1,35 @@ +{"4681367|14808716": []} +{"63900366|8516210": ["However,\nrequired to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al. [2], existing methods roughly be divided into four main categories: statistical, structu filter based, and model based.", "However, required to ensure stable and reliable defect detection results described by Xie [1] and Neogi et al.", "References\n[1] Xie X (2008) A Review of Recent Advances in Surface Defect Detection Using Texture Analysis Techniques."]} +{"268486|15888893": []} +{"21169013|18078738": ["In model-based methods, fault diagnosis algorithms are developed to monitor the consistency between the measured outputs of the practical systems and the model-predicted outputs [2]."]} +{"3721696|18078738": ["Gao et al. [5,6] systematically reviewed the fault diagnosis with model-based, signal-based, knowledge-based, and hybrid/active approaches."]} +{"34170710|393948": ["Deep learning has the ability to yield useful and important features from data that can ultimately be useful for improving predictive power [20]."]} +{"110988692|9928823": []} +{"110988692|393948": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"11962339|1097238": ["among its base learners tends to achieve better generalization performance [36].", "Many works [36]\u2013[39] have demonstrated that a single method can seldom perform consistently well across a variety of applications."]} +{"15257375|393948": ["Here we adopt Deep Boltzmann Machines (DBM) to learn high-level feature because it has been demonstrated to have the potential of learning useful distributed feature representations and become a promising way in solving object and speech recognition problems [11-13].", "DBM is one type of neural networks with deep architecture that learns feature representation in an unsupervised manner and has been demonstrated to be promising for building high-level feature descriptors [11, 12]."]} +{"111838731|905827": []} +{"474078|1400872": []} +{"18188725|393948": ["It is shown that the representation de\ufb01nes the upper-bound performances of machine learning algorithms [19]."]} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"5522822|15888893": ["Many examples in knowledge engineering areas have been found where domain adaptation can be truly beneficial and promising, including image classification, natural language processing, object recognition, and feature learning [2], [3]."]} +{"5522822|18078738": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"114470829|9928823": []} +{"29291215|7782275": []} +{"29291215|191396": []} +{"29291215|3330313": []} +{"3518070|7350786": ["Recent developments demonstrate an increasing ef\ufb01ciency, availability and affordability of sensors, data acquisition systems and computer networks [1]."]} +{"6414987|23566570": ["Recent research shows an increasing interest in use of machi ne learning algorithms for modeling surgical skills, workflow , and environment and integration of this knowledge into control and automation of surgical robots [13]."]} +{"9776971|9928823": ["A more detailed survey of the latest deep learning studies can be found in [22]."]} +{"1326074|393948": ["Our architecture uses hidden variables that jointly represent features in\ngenomic sequences and tissue types when making predictions."]} +{"11393480|9928823": ["When these operators with the same parameters are applied on local signals (or their mapping) at different time segments, a form of translation invariance is obtained [2,7,8].", "Recently, a family of learning models has emerged called as deep learning that aim to learn higher level abstractions from the raw data [2,7], deep learning models doesn\u2019t require any hand crafted features by people, instead they will automatically learn a hierarchical feature representation from raw data."]} +{"11393480|393948": ["In this paper we treat RUL estimation problem as multivariate time series regression and solve it by adapting one particular deep learning model, namely Convolutional Neural Network (CNN) adapted from deep learning model for image classification [1,12,13], which is the first attempt to leverage deep learning to estimate RUL in prognostics."]} +{"53141267|33286487": []} diff --git a/edge/graph_52043586.jsonl b/edge/graph_52043586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55d98a2fdf4058d9a7cfbe2bec5ae0fd92a3c769 --- /dev/null +++ b/edge/graph_52043586.jsonl @@ -0,0 +1,24 @@ +{"5120196|16403716": []} +{"17765186|1940388": ["Wonderful survey papers have been published on this topic [18, 19, 20] covering all aspects from authentication techniques to confidentiality and integrity solutions and also"]} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"15553087|191396": ["There are many other works; more details can be found in [10], [43], [44].", "D S ] 25 N ov 2015 clustering [10] is a classic bottom-up approach in which data points are gradually agglomerated together to form clusters."]} +{"15553087|11038925": ["There are many other works; more details can be found in [10], [43], [44]."]} +{"15553087|12894036": ["In recent years, several kernel methods have been developed for clustering [36]."]} +{"12594700|1230643": ["We refer readers interested in studies on software and network architectures to any of the many excellent surveys that have recently been published on these topics [26,27]."]} +{"207016868|191396": []} +{"35986198|21386749": []} +{"1608588|16335158": ["sensor-cloud [4]) as integral part of MCPS."]} +{"9919586|11894197": [", prediction of unknown gene function [2], [3], analysis of gene regulatory network [4], discovery of pathogeny relevant to major diseases [5], and identification of drug efficacy [6], [7]."]} +{"2703985|1230643": ["Despite being similar to micro- and macroscale sensors [2], it should be taken into account that (i) the solutions in the nanoscale are limited not just in terms of existing manufacturing"]} +{"8503329|18967271": []} +{"8503329|3420321": []} +{"5947607|3330313": ["Indeed, most traditional data cleaning techniques belong to the data collection stage."]} +{"1353379|9667820": []} +{"1353379|44461432": []} +{"1353379|9928823": []} +{"1353379|18388986": []} +{"1353379|3127198": []} +{"25861850|239537": []} +{"15704131|20905429": ["This has also been made possible due to tremendous development in wearable body sensors capable of reading various health parameters directly from patients\u2019 body with acceptable levels of accuracy [2]."]} +{"3634130|16514036": ["For example, although studies are focused on the interconnection between body area networks (BANs) [16]"]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} diff --git a/edge/graph_5204591.jsonl b/edge/graph_5204591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52049191.jsonl b/edge/graph_52049191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..908dad80ab85c76a06022d3573ce606ee8fcc6d0 --- /dev/null +++ b/edge/graph_52049191.jsonl @@ -0,0 +1,3 @@ +{"44285136|14427591": []} +{"32934147|14427591": ["\u2026applications, by combining various types of OGD, and possibly other private data, or scientists, journalists, and active citizens who want to understand better various public problems and policies through advanced data processing and production of analytics (Zuiderwijk et al. 2014a; Janssen 2011a).", "\u2026we identified four previous research papers that propose categorizations of OGD research in areas and themes (Davies, Perini, and Alonso 2013; Zuiderwijk et al. 2014a; Lindman, Rossi, and Tuunainen 2014; Harrison, Pardo, and Cook 2012), which were reviewed because they include elements that\u2026", "\u2026concerning \u201c Open and Transparent Information Management, \u201d \u201c Linked Data, \u201d and \u201c Visual The main objective of this OGD research is to identify and analyze innovations driven by OGD, both in the private sector (e.g., e-services innovations), and in the public sector (Zuiderwijk et al. 2014a)."]} +{"37200652|14427591": ["Nonetheless, some initial attempts (Zuiderwijk et al. 2014a, 2014b) have already been made to review research on this topic.", "These two initial review attempts (Zuiderwijk et al. 2014a, 2014b) have already provided important understanding of the development of this topic, although they both focused on specific aspects of the open data concept.", "\u2026such demand: citizens \u2019 sense of ownership in governance and politicians \u2019 disposition to decentralize civic services (Cerrillo-i-Mart\u00ednez 2012; Zuiderwijk et al. 2014a); recent technological developments that have facilitated peoples \u2019 computing skills in terms of accessing, storing,\u2026", "The research also showed that although open data policies are increasingly being developed, they are barely able to guide the publication and use of open data (Zuiderwijk et al. 2014a).", "The authors also found that limited attention has been given for theory development (Zuiderwijk et al. 2014b)."]} diff --git a/edge/graph_52050423.jsonl b/edge/graph_52050423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3721d10822f75fbcc89d12f0ca7e2249cd4ef57 --- /dev/null +++ b/edge/graph_52050423.jsonl @@ -0,0 +1,6 @@ +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"13392608|8601873": []} +{"4611744|49539405": ["Extensive overviews of the utilized characteristics, as well as of the methods used for capturing them in a formal description, are given by Wa\u0308ldchen and Ma\u0308der [16] and Cope et al. [17].", "Solutions and algorithms for such identification problems are manifold and were comprehensively surveyed by Wa\u0308ldchen and Ma\u0308der [16] and Cope et al. [17].", "An extensive overview of studied methods is given by W\u00e4ldchen and M\u00e4der [16] and is briefly summarized below.", "A plethora of methods for its description can be found in previous work [16, 17].", "An extensive overview of studied methods is given by Wa\u0308ldchen and Ma\u0308der [16] and is briefly summarized below.", "Although texture is often overshadowed by shape as the dominant or more discriminative feature for leaf classification, it has been demonstrated to be of high discriminative power and complementary to shape information [16, 43].", "A majority of previous studies solely utilized the leaf for discrimination [16].", "Therefore, various studies do not only consider one type of character but use a combination of characteristics for describing leaves and flowers [16].", "Despite the variation of organisms, a more experienced eye soon discerns that organisms can be grouped into\nPLOS Computational Biology | https://doi.org/10.1371/journal.pcbi.1005993 April 5, 2018 1 / 19\na1111111111 a1111111111 a1111111111\nOPENACCESS\nCitation: Wa\u0308ldchen J, Rzanny M, Seeland M, Ma\u0308der P (2018) Automated plant species identification\u2014Trends and future directions.", "Later, more sophisticated descriptions, such as center contour distance, Fourier descriptors, and invariant moments, were intensively studied [16, 17].", "Extensive overviews of the utilized characteristics, as well as of the methods used for capturing them in a formal description, are given by W\u00e4ldchen and M\u00e4der [16] and Cope et al.", "For automated identification, color has been mostly described by color moments and color histograms [16].", "In contrast, previous studies on automated identification rarely used flowers for discrimination [16].", "Solutions and algorithms for such identification problems are manifold and were comprehensively surveyed by W\u00e4ldchen and M\u00e4der [16] and Cope et al."]} +{"3907113|2828886": ["[1] organized a Bird audio detection challenge."]} +{"3907113|8601873": ["It follows the standard MI assumption [5]: a recording is labeled positively if and only if at least one of its excerpts is positive."]} +{"51941083|52050423": ["In this paper, we report an evaluation study of three main kinds of SDM in the context of the GeoLifeCLEF challenge [1, 4]:"]} diff --git a/edge/graph_52056521.jsonl b/edge/graph_52056521.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be491a08bf5646d8e3775674bced52f2a205c10d --- /dev/null +++ b/edge/graph_52056521.jsonl @@ -0,0 +1,6 @@ +{"13749542|5755403": ["Classical forecasting approaches [38] adopted Kalman \ufb01lters [29], linear [37] or Gaussian regression models [44, 45, 57, 58], autoregressive models [2] and time-series analysis [43]."]} +{"2879370|17324444": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"9854676|5755403": []} +{"6600800|393948": ["Many unsupervised learning algorithms can be viewed as various parameterizations (implicit or explicit) of the data manifold [1]."]} +{"1053146|38476": ["State-space models attempt to capture the variation in spatial sequences through sequence models such as generative Hidden Markov Models (HMMs) [17], discriminative Conditional Random Fields (CRFs) [21, 19], or extensions of these two well-known approaches [4, 15].", "Dietterich, or Nguyen and Guo, have provided good surveys in the area [15, 4]."]} diff --git a/edge/graph_52059869.jsonl b/edge/graph_52059869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50c27e13969e526f79fcd56cccffd7ea3aeab624 --- /dev/null +++ b/edge/graph_52059869.jsonl @@ -0,0 +1,27 @@ +{"4269723|2535224": ["At the present, wireless and wired networks uphold diversity and heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional networks.", "\u2026heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional\u2026"]} +{"12017064|12815020": ["In [36], we discussed existing NIDS approaches to Cloud."]} +{"24822119|8909218": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"24822119|18148591": ["data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5].", "To meet the anticipated capacity demand in the existing model of fixed resources including static-licensed spectrum, mobile network operators, in the context of 4G Long Term Evolution (LTE) [3], are exploring many techniques such as higher data rate broadband air interface technologies with MIMO [2] and femto/small cells [4] [5]."]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"205824141|2623404": ["Alternatively, the inter-provider NFVO may configure directly the connectivity data plane along the principles of ONF SDN for OpenFlow controlled administrative domains.", "Network resources may be of any type, including fix and mobile access networks, IP/MPLS and/or optical transport networks with or without SDN control, OpenFlow controlled SDN networks and also mobile core networks.", "To achieve this, 5GEx aims to extend the current SDN functionality beyond the scope of controlling simple connectivity resources to computation and storage, by creating and demonstrating new abstractions and associated interfaces.", "5GMF [4] claims that network management in 5G will leverage on SDN/NFV and virtualisation technologies to provide scalable and flexible network management.", "The NGSON standard [16] and SDN initiative\u00b6 are working to include SDN and NFV technologies in order to achieve a more powerful multi-domain service composition and orchestration functions, including both application and virtualised network services while dynamically establishing data delivery paths across services [17].", "Rather, it will be realised as a collection of modular functions that integrates advances made in different domains like NFV or SDN [7].", "In both these dimensions, 5GEx has the ambition to manage multi-domain heterogeneity according to SDN and NFV paradigms where network compute and storage slicing and suitable virtualisation must enable new service models (E2E service level).", "The platform will host future experimental 5G network service architectures based on technologies such as network function virtualisation (NFV) and software-defined networking (SDN)."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"19196380|26368310": ["34 This feature requires the ability to perform continuous failure detection, clone the state of a VM, and recover by switching to an existing replica."]} +{"19196380|8909218": ["For instance, assuming a femtocell radius ranging from 20 to 50 meters [56] and the linear crossing of the user over the maximum cell extension, the initialization time in case of DV size of 50 MBs implies a user mobility below 26 and 67 km/h respectively, to guarantee the effective deployment of the replica."]} +{"21318805|31193955": ["Although mechanisms to ensure isolation are well established in multi-tenant data centers or wired network domains [10], isolation is currently one of the main open research challenges in wireless network virtualization [11].", "[10] V."]} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"16988055|8650651": ["The flexible transport network can, for instance, be implemented through a Software Defined Elastic Optical Network (SD-EON) [41], [42].\nb) Sm-GW virtualization: The SM-GW can support a variety of virtualization strategies, e.g., to provide independent virtual networks for different operators.", "The flexible transport network can, for instance, be implemented through a Software Defined Elastic Optical Network (SD-EON) [41], [42]."]} +{"16988055|11414835": ["Sm-GWs could then be abstracted by a hypervisor [43]\u2013[46] that intercepts the SBI, as illustrated in Fig."]} +{"14081529|2854761": ["Scheduler design in wireless networks, especially inWiMAX networks [47], is a hot topic and very relevant to .", "1We point the interested reader to a detailed survey [47] on WiMAX network resource management."]} +{"10342730|2535224": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "In contrast to previous surveys on wireless virtualization [2]\u2013[4], our interest focuses on the problems derived from wireless slicing and on the existing techniques that deal with these speci\ufb01c problems."]} +{"10342730|11735843": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "For instance, approaches for network programmability [11] such as Software-De\ufb01ned Radio (SDR) [56]\u2013[58] or programmable MAC protocols [59]\u2013[61] may be used to circumvent this challenge."]} +{"2757390|207262843": []} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} diff --git a/edge/graph_52066980.jsonl b/edge/graph_52066980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb819ac8ad293163b030fcc4c92d7fcc14f44738 --- /dev/null +++ b/edge/graph_52066980.jsonl @@ -0,0 +1,8 @@ +{"9196354|17292349": ["The underlying technology leverages test input generation techniques (Anand et al. 2013) to generate\nproblems that explore various paths in the procedure that the student is expected to learn."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"11767561|7983519": ["Our method is inspired by classic NLG guidelines [Krahmer and Van Deemter, 2012], and is based on type attributes."]} diff --git a/edge/graph_52068701.jsonl b/edge/graph_52068701.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..135b143b6fa3e377536c68262bc3c0d6584e37fb --- /dev/null +++ b/edge/graph_52068701.jsonl @@ -0,0 +1,12 @@ +{"27104001|3540699": ["264/AVC [3], will drive the development of new products and services in areas such as video conferencing, broadcasting, home and mobile"]} +{"38478081|64404": []} +{"4307837|64404": []} +{"10505917|64404": ["For example, using HEVC (High Efficiency Video Coding) [8] or H.", "For example, using HEVC (High Efficiency Video Coding) [8] or H.264/AVC in VBR mode allows to guarantee a constant quality level across different frames, thus minimizing quality fluctuation and the associated visual discomfort."]} +{"24519781|6581557": ["Other objective techniques use measurements taken at the network level, (delay, packet loss, deep packet inspection [35]), as input for QoE evaluation in audio, video and online games or more generally internet applications [36], [37], [34].", "Multimedia quality prediction techniques can also be performed [35]."]} +{"23627391|399542": ["These QoS\u2013QoE models were mainly built for voice and video services, which means that they are lacking universal applicability for other services [6].", "Research has shown that raw QoS measurements and the associated KPIs are not necessarily a reliable predictor of QoE [6, 13], which is why modern QoE models focusing on perceptual characteristics of the monitored systems can help at providing a user perspective, based on measurements from the network."]} +{"23627391|2261490": ["In the recent years, a shift from traditional technology-centric QoS models to more holistic user-centric QoE models could be observed [8], although QoS\u2013QoE mapping models", "Since probes may just forward captured information, with the quality calculation happening at a central location, we identify two distinct points [8]: 1) the monitoring point, at which information is collected, and 2) the quality estimation point, at which the information is used to calculate a quality indicator."]} +{"32048841|14889616": []} +{"32048841|10559330": []} +{"32048841|6265393": []} +{"4561022|14889616": ["Scalable video coding (SVC) [3] was developed as Annex."]} +{"46884253|399542": []} diff --git a/edge/graph_52069634.jsonl b/edge/graph_52069634.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7007459fe177434e4480a8a3f655d515522ccebe --- /dev/null +++ b/edge/graph_52069634.jsonl @@ -0,0 +1,9 @@ +{"7491875|1734833": ["Finally, data from wearable sensors was found to be valuable for tackling the activity recognition [Lara and Labrador 2013] and health monitoring [Banaee et al. 2013] problems, which shows its potential toward individual wellness pro\ufb01le learning."]} +{"31085540|3913780": ["It is usually formulated as an estimation problem relating to the number of content views [16]."]} +{"6915923|17464562": ["These networks were unable to learn, but this capacity was introduced only a few years later, initially with the introduction of unsupervised learning [46] and subsequently with the first supervised training algorithms [75, 84, 85, 103]."]} +{"6655663|393948": ["Due to the power of representation learning [31], Restricted Boltzmann Machine (RBM) has been successfully applied to various tasks, such as image classification [7], information recommendation [32] and retrieval [33], especially multimodal learning [34]\u2013[37]."]} +{"4810485|16242553": []} +{"206593396|6627566": ["In the past few years, extensive research has been devoted to learning a hierarchical structure over classes (see [51] for a survey)."]} +{"206592484|456491": []} +{"8679438|36784649": ["We consider the one-class classification paradigm (OCC) for food vs non-food classification problem [20, 21].", "Differently than previous works, in this paper we investigate one-class classification (OCC)[20] to recognize when an image is belonging to the food class.", "We consider the one-class classification paradigm (OCC) for food vs non-food classification problem [20] [21]."]} +{"14762449|9667820": ["Joutou et al. [10] created a private Japanese food dataset with 50 classes."]} diff --git a/edge/graph_52069652.jsonl b/edge/graph_52069652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52071270.jsonl b/edge/graph_52071270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..848e8841efdb94e30d9c6e58ef41fff261b5d699 --- /dev/null +++ b/edge/graph_52071270.jsonl @@ -0,0 +1,29 @@ +{"35917581|6280485": ["in the diagnosis of lung ailments [ 5 , 6, 7]. In Malaysia,"]} +{"67954232|6280485": []} +{"27011223|191396": ["There has been an increasing interest in using the fuzzy C-means clustering algorithm (FCM) [10] for medical image segmentation in recent years [1] [11][14]."]} +{"27011223|6280485": ["Lung segmentation is the first and mandatory step of an automatic system for lung nodule detection in chest radiographs [1].", "There has been an increasing interest in using the fuzzy C-means clustering algorithm (FCM) [10] for medical image segmentation in recent years [1] [11][14]."]} +{"37149|6280485": ["In 2015/16 year over 22.5 million X-ray images were requested in UK\u2019s public medical sector, constituting over 55% of the total number of medical images and dominating all other imaging modalities such as computed tomography (CT) scan (4.5M) and MRI (3.1M) [8]."]} +{"72644754|192934": ["For more on these kind of fusion rules and an overview of related topics in the standard statistical pattern recognition setting, the reader is referred to References 8\u201310 and the relevant references in Jain et al.(7) Our approach brings together the median, minimum, and maximum approach, allowing to tune between these special instances.", "Within this category, the well-known combination rules are the average, the median, the maximum, the minimum, the product and the voting rule.7\u20139 For more on these kind of fusion rules and an overview of related topics in the standard statistical pattern recognition setting, the reader is referred to References 8\u201310 and the relevant references in Jain et al.7 Our approach brings together the median, minimum, and maximum approach, allowing to tune between these special instances."]} +{"2016190|6280485": ["8,9 Therefore, a computer-aided diagnostic (cid:1) CADe (cid:2) scheme 10,11 for nodule detection in CXRs has been investigated for assisting radiologists in improving their sensitivity in the detection of lung nodules."]} +{"39139165|2088679": ["A detailed survey of deep learning in medical image analysis can be found in [15]."]} +{"7509004|6280485": ["The presence of superimposed anatomical structures makes the discrimination of image features and the interpretation of a CXR extremely challenging even for clinical experts [14]."]} +{"9686627|1315930": []} +{"9686627|2088679": []} +{"12221391|6280485": []} +{"13755384|6280485": ["reviewed the CAD technological development in 2001 [1] and 2009 [2].", "Gradient Computation: The gradient of each pixel in the window is calculated using two filter kernels: [-1, 0, 1] and [-1, 0, 1] T .", "12 \uf07b \uf07d [1, 1],1 k y k M \uf0ce \uf02d \uf0a3 \uf0a3 , the optimal hyperplane coefficients vector w is generated as follows:"]} +{"15601404|6280485": ["Since then chest radiography was actively researched in the 70s of that century in the view to fully automate chest exam by computer [6]."]} +{"17961280|6280485": []} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"19833376|6280485": []} +{"5232411|6280485": []} +{"27141031|6280485": ["As CAD in chest radiography becomes the focus of many investigators, different methods have been developed to obtain automatic lung segmentation [14]."]} +{"14939174|6280485": ["The quantitative results of early segmentation algorithms are reported in (33) on internal data sets, and in (40) on the publicly available JSRT dataset (32).", "org/qims categories: rule-based methods, pixel classification methods, deformable models, and hybrid methods (33)."]} +{"14249388|6280485": ["This way, unlike current approaches [3]-[13],[15]-[18], the proposed one does not exclude the overlapping region of the heart from the lung fields, where abnormalities can also be present [1].", "Many of them have focused on the segmentation of the lung fields, whereas fewer have focused on the segmentation of the rib cage or other anatomic structures of the chest [3]."]} +{"30298694|1315930": ["Recent surveys [29], [30], [31], [32] have demonstrated that deep learning technologies have been extensively applied to the \ufb01eld of chest X-ray image annotation [33], classi\ufb01cation [6], [34], [8], [9], and detection (localization) [35], [36]."]} +{"30298694|2088679": ["Recent surveys [29], [30], [31], [32] have demonstrated that deep learning technologies have been extensively applied to the \ufb01eld of chest X-ray image annotation [33], classi\ufb01cation [6], [34], [8], [9], and detection (localization) [35], [36]."]} +{"7761510|6280485": []} +{"14311931|6280485": []} +{"14311931|205131192": []} +{"195705894|6280485": []} diff --git a/edge/graph_52075024.jsonl b/edge/graph_52075024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52076139.jsonl b/edge/graph_52076139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f5603699bea134f5cfe34977b2115e2a85ffbfc --- /dev/null +++ b/edge/graph_52076139.jsonl @@ -0,0 +1,16 @@ +{"144564631|62688333": []} +{"144564631|17857669": []} +{"5120196|16403716": []} +{"145256098|62688333": []} +{"13825257|10213552": ["In this section, several popular big data mining tools are discussed (Bifet 2013; Chen et al. 2014; Landset et al. 2015)."]} +{"13825257|2398835": ["Such a high volume of big data poses great challenges in capture, storage, sharing, analysis, and visualization (Khan et al. 2014).", "Specifically, the data include individual collections of photos and videos; social media data from YouTube, Face-book, Twitter, Instagram, and so on; and e-mails, sensor data, medical records, genomic datasets, geospatial maps, and so on (Khan et al. 2014).", "On the other hand, big data surveys mainly concentrate on big data challenges, techniques, and general applications (Siddiqa et al. 2016; Khan et al. 2014; Tsai et al. 2015).", "\u2026et al. 2007; Bhatt and Kankanhalli 2011; Hu et al. 2011) and big data analysis (Song et al. 2017; Siddiqa et al. 2016; Hashem et al. 2016; Agrawal et al. 2011; Che et al. 2013; Chen et al. 2014; Chen and Zhang 2014; Gandomi and Haider 2015; Hashem et al. 2015; Khan et al. 2014; Tsai et al. 2015).", "It is defined as all forms of structured/unstructured \u201chuman information\u201d (including text, image, audio, video, sensor, and social data) (Khan et al. 2014)."]} +{"13825257|16403716": ["For instance, content-based image/video retrieval, one of the most significant topics in current multimedia research, is studied in Hu et al. (2011), Bhatt and Kankanhalli (2011) review the challenges and opportunities in multimedia data mining, and multimedia wireless sensor networks are also\u2026", "\u2026into two main areas: multimedia analysis (Gao et al. 2017; Wang et al. 2017; Rawat et al. 2014; Akyildiz et al. 2007; Bhatt and Kankanhalli 2011; Hu et al. 2011) and big data analysis (Song et al. 2017; Siddiqa et al. 2016; Hashem et al. 2016; Agrawal et al. 2011; Che et al. 2013; Chen et al.\u2026", "Related work can be divided into two main areas: multimedia analysis (Gao et al. 2017; Wang et al. 2017; Rawat et al. 2014; Akyildiz et al. 2007; Bhatt and Kankanhalli 2011; Hu et al. 2011) and big data analysis (Song et al.", "(Hu et al. 2011) - Video retrieval An overview on content-based video indexing and retrieval - Discussing a single multimedia data type - Lack of big data background and its technical challenges"]} +{"13825257|6387482": ["To tackle such multi-modalities and obtain beneficial insight about the multimedia data, numerous fusion approaches have been developed in the literature (Atrey et al. 2010; Benmokhtar and Huet 2014).", "In general, multi-modal features can be categorized into visual (e.g., image and video), audio, and textual features as described in Atrey et al. (2010), Yang (2015), and Chen et al. (2006)."]} +{"13825257|1230643": []} +{"168284508|3348390": []} +{"168284508|1503157": []} +{"148628036|62688333": []} +{"148628036|17857669": []} +{"1520906|3348390": ["Although some reviews about IoT have been conducted recently (e.g., Atzori et al., 2010; Zeng et al., 2011; An et al., 2013; Perera et al., 2013; Li et al., 2016; Yan et al., 2014), they focus on high level general issues and are mostly fragmented."]} +{"88566223|15358225": ["Sports tracking applications employ regular sampling of movement data i.e. location fixes are acquired at even time intervals (approximately every second) (Long & Nelson, 2013; Oksanen et al., 2015; Sainio, Westerholm, & Oksanen, 2015) collecting a large point dataset."]} +{"151890035|62298337": []} diff --git a/edge/graph_52076848.jsonl b/edge/graph_52076848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a336242b376e653c119cb250a3417afebb11a8b --- /dev/null +++ b/edge/graph_52076848.jsonl @@ -0,0 +1,19 @@ +{"9031324|2623404": []} +{"9031324|10693567": ["Further, De Gante et al. [14] discussed some important issues to be handled in the future, including the synchronization of the network states, the necessity of the distributed controller, the security of the central controller and the applicability of Openflow [15].", "Considering the issues of load balance and energy consumption, Han and Ren [19] proposed a WSN optimization method based on the Openflow, as shown in Fig.", "[14] discussed some important issues to be handled in the future, including the synchronization of the network states, the necessity of the distributed controller, the security of the central controller and the applicability of Openflow [15]."]} +{"35638190|2623404": []} +{"27999524|6583734": ["software virtualization technology [22], [23]."]} +{"27999524|44461432": []} +{"27999524|10693567": ["Therefore, the technology standardization for IIoT is a very complex task, the main problems of which include [28]: a) coordination between the various standardization organizations is not sufficient, and there are different versions of standards, which are incompatible with each other; b) the progress of standardization is insufficient to keep up with market changes and the requirements of industry; and c) no unified standardization can be accepted widely, especially accepted and practiced by small and medium-sized enterprises."]} +{"17719004|2623404": ["In this context, SoftwareDefined Networking (SDN) [1] has emerged as a new architecture to deliver dramatic improvements in network agility and flexibility."]} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} +{"25387336|2387055": []} +{"3493586|2623404": ["Although all these solutions adequately and automatically reconfigure the edge network, the static and manually configured core of the network remains the same [15].", "In SDN, research is gaining momentum to secure both the control and data plane [15]."]} +{"17088097|6305682": []} +{"17088097|17683338": []} +{"9494512|12060835": ["Similarly, the harvested energy also varies from di\u21b5erent sources, of which, typical examples are solar, wind energy, thermal power, etc [29, 30]."]} +{"25062322|9494512": ["Data traf\ufb01c from devices can be controlled to balance energy in the network which is possible by techniques such as duty cycling, scheduling sleep and wake-up modes of devices studied in [13]."]} +{"1168612|2623404": ["On the academic side, the OpenFlow Network Research Center [22] has been created."]} +{"31582685|2623404": ["SDN technologies facilitate building network services [16] [17]."]} +{"206925480|11735843": ["The above problem can be overcome by making WSNs programmable and thus, there has been significant research effort devoted to design programmable WSNs [9]\u2013[11]."]} +{"106659955|2623404": ["cation requirements may force us to tailor every single WSN deployment individually and this can only be achieved by a high degree of reconfiguration capabilities, something that can be realised by using concepts and ideas from software-defined networking (SDN) [1]."]} +{"15659301|2387055": []} diff --git a/edge/graph_52077656.jsonl b/edge/graph_52077656.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fc402f227096f9a438ef94d1e5109bb91032444 --- /dev/null +++ b/edge/graph_52077656.jsonl @@ -0,0 +1,16 @@ +{"60319785|4071247": ["\u2022 Betini [12] suggests that data mining and data visualization need to be better coordinated."]} +{"207172599|3330313": []} +{"127197|1708582": []} +{"127197|1805048": []} +{"8809923|5755403": [", [14]) which finds the minimum Euclidean distance when"]} +{"8606391|18986679": []} +{"56537326|5755403": ["In contrast, algorithms for online or sequential anomaly detection allow detection in incomplete trajectories (Morris and Trivedi, 2008a), e.g., real-time detection of anomalous trajectories as they evolve."]} +{"56526043|5755403": ["[22]), but it requires that the preprocessed trajectories are of equal length and ED performs poorly if they are not properly aligned (see [19]).", "Other similarity measures and modifications of ED have been proposed in the literature for relaxing alignment and length constraints, such as Dynamic Time Warping (DTW) [19]."]} +{"16032584|5755403": ["Several methods have been proposed to derive motion patterns from a collection of trajectories as applied in video surveillance and image processing, where the traffic flows are constrained to stay in specific areas (see [13], [14], [15], [16]).", ", [15]) and enables on-line anomaly detection."]} +{"62188656|18986679": []} +{"55428554|12595430": ["Ref [7] proposes an interesting application of this approach to the detection of cyber-intrusions, which is not dissimilar to our own preoccupation."]} +{"127386002|3330313": []} +{"120190796|18986679": []} +{"6499627|18986679": []} +{"18367756|5755403": ["A wide overview about different tasks and algorithms is given, e.g., by Chandola et al. [2] or for vision-based algorithms by Morris and Trivedi [3]."]} +{"15898124|5755403": ["\u00a4\uf0a4 Moving clusters from DBSCANSD are represented using \u00a4\uf0a4 Gravity Vector (GV) \u2013 centroid and envelope [5] \u00a4\uf0a4 A GV is a vector of five features: average COG, average SOG, average Latitude, average Longitude and Median Distance."]} diff --git a/edge/graph_52077682.jsonl b/edge/graph_52077682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..599fd765ff1a16df36bbd7c61d93fdaa9f1d03bc --- /dev/null +++ b/edge/graph_52077682.jsonl @@ -0,0 +1,61 @@ +{"22069515|12060835": ["marks represent the required packet rate of each region, \u03bb, to be uniform randomly chosen from [0, 5], [5, 10], [10, 15], [15, 20] per minute, respectively.", "Energy harvesting is one possible way to provide energy to sensor nodes [10], since there are various kinds of energy source in our ambient environment [4], [6]."]} +{"2170114|12817488": ["For more information about the aggregation function and routing scheme components, readers may refer to the following surveys [5] and [7].", "Rajagopalan et al. in [7] evaluated the routing scheme of a data aggregation protocol.", "For further information about the use of SPT in the aggregation protocol, the reader may refer to the survey cited in [7].", "\u2026et al. [5] Routing scheme and aggregation functions Akkaya et al. [6] Routing scheme and unslotted data aggregation scheduling Rajagopalan et al [7] Routing scheme Cheng et al. [8] Routing scheme and aggregation functions In event-driven applications, it is very critical to deliver alarms about\u2026", "Some surveys on data aggregation in WSN have been published in the literature [5], [6], [7], [8]."]} +{"7038467|205286988": ["Proposed protocols can be classified into data-centric, hierarchical, location-based, network flow and QoS-aware routing [ 6 ]."]} +{"5656146|1230643": ["Since WSNs usually are deployed for long-term environmental sensing, target tracking, and structural health monitoring [1], [14], [19], [39], the monitoring area of a WSN can be very large (e."]} +{"5656146|12060835": ["vibration energy, wind energy, etc [11], [13], [26]."]} +{"10416337|17769444": [", very low, low [93])."]} +{"10416337|1230643": ["Wireless sensor networks (WSNs) are critically resource constrained by limited power supply, memory, processing performance and communication bandwidth [1]."]} +{"16894806|12060835": []} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"12412620|1230643": []} +{"58404112|12060835": ["Although in some application it is possible to directly power the sensor node using the harvested energy, with no energy storage (harvest-use architecture [117]), in general this is not a viable solution."]} +{"17203548|580211": ["2003], and residential water management [Carboni et al. 2016].", "\u2026for marine environment monitoring (MEM) and sensing [Albaladejo et al. 2010; Xu et al. 2014], water-level sensing [Loizou and Koutroulis 2016], water pipeline monitoring [BenSaleh et al. 2013], fish farming monitoring [Carroll et al. 2003], and residential water management [Carboni et al. 2016]."]} +{"17203548|13475127": ["There have been a few literature reviews on the use of WSNs for marine environment monitoring (MEM) and sensing [Albaladejo et al. 2010; Xu et al. 2014], water-level sensing [Loizou and Koutroulis 2016], water pipeline monitoring [BenSaleh et al.", "There have been a few literature reviews on the use of WSNs for marine environment monitoring (MEM) and sensing [Albaladejo et al. 2010; Xu et al. 2014], water-level sensing [Loizou and Koutroulis 2016], water pipeline monitoring [BenSaleh et al. 2013], fish farming monitoring [Carroll et al.\u2026", "However, only a few references present details about the energy management schemes [Xu et al. 2014], and as described earlier for WQM systems, most of the existing works have used duty cycling, wake-up radios, and data fusion approaches to reduce the energy drain."]} +{"17203548|6396569": []} +{"17203548|1940388": ["A security breach and compromised node(s) may exhaust the batteries of the sensor nodes, rendering the network inoperable [Wang et al. 2006; Chen et al. 2009].", "Malicious code can also be injected into the database, which can result in data loss or data inconsistency [Wang et al. 2006; Chen et al. 2009]."]} +{"17203548|17205659": ["A security breach and compromised node(s) may exhaust the batteries of the sensor nodes, rendering the network inoperable [Wang et al. 2006; Chen et al. 2009].", "Malicious code can also be injected into the database, which can result in data loss or data inconsistency [Wang et al. 2006; Chen et al. 2009]."]} +{"32451128|12029139": []} +{"32451128|6275330": ["Wireless Sensor Networks and Wake Up Radios A relatively recent application for RF power harvesting is the enhancement and control of Wireless Sensor Networks, or WSNs [17].", "WSNs tend to consist of large and efficient antenna/impedance matching networks, followed by many rectifier stages to improve sensitivity, and very few buffering and computing elements in the back end.", "A relatively recent application for RF power harvesting is the enhancement and control of Wireless Sensor Networks, or WSNs [17]."]} +{"46926867|12029139": ["A survey on wireless networks using RF energy harvesting was provided in Lu et al. (2015), where the authors discussed the state-of-the-art in RF circuit design and implementations as well as describing resource allocation design issues in RF-EHWSNs, and presenting future research directions and\u2026"]} +{"46926867|33867211": ["Deploying thermal energy harvesters in WSNs depends on the efficiency of the thermoelectric materials (Zhou et al. 2014).", "\u2026frequency and sunlight has been explored extensively in an attempt to utilize this source of energy to power wireless sensor networks for environmental monitoring applications (Morais et al. 2008; Bhuvaneswari et al. 2009; Tabbakh et al. 2010; Alippi et al. 2011; Lim et al. 2013; Zhou et al. 2014).", "Publication date: April 2018.\nstructure, low cost, and absence of electromagnetic interference (Wang 2012b; Zhou et al. 2014; Shaikh and Zeadally 2016b).", "On the other hand, piezoelectric devices require energy-harvesting circuits to regulate the output power leading to energy losses, thereby affecting the overall efficiency of the energy-harvesting system (Zhou et al. 2014).", "Solar energy-harvesting approaches are non-emissive, harmless to the environment, and their current and voltage levels meet the power requirements of wireless sensor nodes (Akbari 2014; Zhou et al. 2014; Shaikh and Zeadally 2016b).", "For instance, piezoelectric ceramic PZT is known for its high energy conversion rate, while polyvinylidene fluoride (PVDF) is known for its high mechanical strength (Zhou et al. 2014)."]} +{"46926867|14132386": ["To achieve this, energy is often considered as the metric to optimize, for example, in selecting next hop neighbors in routing (Singh et al. 2010; Nack 2010)."]} +{"46926867|1483907": ["Over the years, researchers have focused on designing energy saving techniques to minimize the energy consumption of the sensor nodes at the physical (PHY), medium access (MAC), and routing layers (Muthukarpagam et al. 2010; Khajuria and Gupta 2015).", "Thus, energy management is key, requiring protocols that reduce energy dissipation in the physical, MAC and routing layers, as well as energy efficient topology control protocols that simultaneously support the application Quality of Service (QoS) (Kawahara et al. 2009; Muthukarpagam et al. 2010; Swati and Priyanka 2010; Basagni et al. 2013; Gupta and Sikka 2015).", "When running on batteries, the limited lifetime of the sensor nodes is one of the main challenges in implementing WSNs for environmental monitoring applications (Potnuru and Ganti 2003; Muthukarpagam et al. 2010)."]} +{"46926867|6396569": ["\u2026monitoring (Khedo et al. 2010; Bhattacharya et al. 2012; Postolache et al. 2014; Adamo et al. 2015), animal tracking (Szewczyk et al. 2004; Pereira et al. 2008; Amundson and Koutsoukos 2009;\nThis work was funded in part by the National Science Foundation under research grant CNS-1239423."]} +{"46926867|1230643": ["Radoi et al. 2015), monitoring for disasters such as earthquakes, hurricanes, and floods (Estrin et al. 2002; Akyildiz et al. 2002; Devasena and Sowmya 2015), and health monitoring of civil structures such as bridges and buildings (Lee et al. 2007; Kim et al. 2007; Hu et al. 2013).", "In traditional wireless sensor networks, the most important metrics contributing to the design and performance evaluation are quality of service (QoS) and network lifetime (Akyildiz et al. 2002; Yahaya et al. 2009).", "2015), monitoring for disasters such as earthquakes, hurricanes, and floods (Estrin et al. 2002; Akyildiz et al. 2002; Devasena and Sowmya 2015), and health monitoring of civil structures such as bridges and buildings (Lee et al."]} +{"46926867|12060835": ["\u2026out the various energy sources, storage technologies, communication network operations, and specific implementation areas where sensor networks are applicable and deployable (Paradiso and Starner 2005; Gilbert and Balouchi 2008; Wan et al. 2011; Sudevalayam and Kulkarni 2011; Ku et al. 2016).", "Different communication protocol parameters that must be adapted for EH-WSNs are presented in Sudevalayam and Kulkarni (2011).", "Of particular interest is the work presented in Sudevalayam and Kulkarni (2011), which describes the design implications of powering WSNs via energy harvesting.", "The main idea behind the first two categories of protocols were discussed in the Sudevalayam and Kulkarni (2011) survey; nevertheless, we provide the latest advances in these protocols categories and, in addition, we discuss polling-based techniques, which were not included in the aforementioned\u2026", "Sudevalayam and Kulkarni (2011) provided a discussion on how to adjust the node\u2019s transmission power based on its current and predicted effective energy in addition to the node\u2019s energy consumption to achieve ENO.", "This article extends the work done by Sudevalayam and Kulkarni (2011), presenting recent developments and techniques in communication protocol design in WSN applications with energy-harvesting capabilities.", "Some of these design considerations are provided in the work done by Sudevalayam and Kulkarni (2011), in which a detailed discussion was provided on solar energy-harvesting systems, their energy storage technologies and whether they apply MPPT or not."]} +{"46926867|20905429": ["\u2026to keep track of their body parameters, sensor nodes can also be integrated into a wireless body area network (WBAN) to enable a proactive personal health management system that has the potential to transform the future of healthcare (Pantelopoulos and Bourbakis 2010; Omer and Al-Salihi 2017)."]} +{"15576441|1230643": ["from the surrounding environment, (ii) processing (and possibly storing) the acquired data, and (iii) transfering them through wireless communications to a data collection point called a sink node or base station [Akyildiz et al. 2002].", "\u2026\n 7:2 M. Di Francesco et al. from the surrounding environment, (ii) processing (and possibly storing) \nthe acquired data, and (iii) transfering them through wireless communications to a data collection point \ncalled a sink node or base station [Akyildiz et al. 2002]."]} +{"15576441|1708582": ["Approaches to ME discovery based on reinforcement learning, a form of unsupervised learning in the field of artificial intelligence [Kaelbling et al. 1996], were considered in Dyo and Mascolo [2008] and Di Francesco et al.", "Approaches to ME discovery based on reinforcement \nlearning, a form of unsuper\u00advised learning in the .eld of arti.cial intelligence [Kaelbling et al. 1996], \nwere consid\u00adered in Dyo and Mascolo [2008] and Di Francesco et al. [2010] for sparse WSNs."]} +{"13165868|1230643": ["Dynamic power management ensures that these components are usually in sleep mode and activated only when required, as the power consumption is of the same order of magnitude in the active and idle modes, and it is much less in the sleep mode [18]."]} +{"18679327|7774517": []} +{"32245977|206901977": ["[12] designed a top down survey to achieve the tradeoffs between wireless sensor networks to achieve multi objective optimization."]} +{"12304408|12060835": ["1, we assume a harvest-store-use architecture [20], which is enforced by the employed charge controller.", "To improve the system\u2019s achievable performance level and extend the lifetime, ambient energy harvesting, particularly in the form of solar energy harvesting, has been established as a feasible alternative to purely battery powered devices in outdoor WSN applications [20].", "In this work we assume a harvest-store-use architecture, as described in [20], in which the energy to operate the system is always supplied by the battery."]} +{"17460394|205286988": ["PROLONGING network lifetime is one of the most important design goals for Wireless Sensor Networks (WSNs) [1], [2]."]} +{"110981460|1230643": []} +{"18479344|1230643": ["D ISTRIBUTED environmental monitoring with wireless sensor networks (WSNs) is one of the most challenging research activities faced by the embedded system community in the last decade [1], [2], and [3]."]} +{"8310972|1230643": []} +{"114809619|17872696": []} +{"114809619|9494512": []} +{"1129832|28210515": ["Previous empirical studies in WSNs focused on complex, non-ideal behavior of low-power wireless links [2], [3], concurrent data transmissions [4], and the coexistence between WSNs and WiFi [5], [6], microwave ovens [7] and the smart grid [8]."]} +{"110896183|1230643": []} +{"110896183|12060835": []} +{"9210399|12060835": ["With the emergence of energy harvesting techniques [6], wireless sensors can be equipped energy harvesting devices (such as the solar panel), to gain access to additional energy resource harvested from the ambient environment."]} +{"6580447|12060835": []} +{"110756152|7988320": []} +{"110756152|16514036": []} +{"110756152|1230643": []} +{"110756152|12060835": []} +{"14142206|12060835": ["At the same time, recently, harvesting systems have been considered by the research community as a novel means to recharge the devices autonomously and without human intervention [4]."]} +{"6218667|206901977": ["Nonetheless, a recent survey presented in [Rault et al. 2014] listed several efforts to manage the energy consumption of WSNs at different levels.", "to [Rault et al. 2014], wireless power charging facilitates the design of scalable methods to refill network elements\u2019 batteries, allowing the sensor nodes\u2019 energy constraint to be overcome.", "More recently, in [Rault et al. 2014], several techniques to reduce the energy consumption in WSNs were compared according to the requirements of WSN applications.", "According to [Rault et al. 2014], wireless power charging facilitates the design of scalable meth-ods to re\ufb01ll network elements\u2019 batteries, allowing the sensor nodes\u2019 energy constraint to be overcome."]} +{"6218667|1489715": ["The works surveyed in [Mahmood et al. 2013] take into account the WSNs\u2019 constraints to adopt data mining techniques aiming to \ufb01nd patterns in the sensor data to improve its collection and delivery."]} +{"6218667|1230643": ["Wireless sensor nodes (sensor nodes, for brevity) are small computer devices with low production costs, equipped with a radio antenna and sensors that are capable of sensing one or more environmental parameters [Akyildiz et al. 2002].", "For example, the survey presented in Anastasi et al. [2009] described several methods and architectures used to reduce the energy consumption and extend the WSNs\u2019 lifetime."]} +{"6218667|12060835": ["In some cases, this knowledge is already owned by the user before the deployment of the WSN and can be applied to statistical methods, such as linear regressions (see Timm [2002] for further details)."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"2583020|10837932": ["As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|17960632": ["In fact, for hard real time applications the problem is not only the added delay but also the nondeterministic way in which that delay occurs (for more information on Real-Time MACs for WSNs the reader is referred to [9]).", "medium access is ruled out because of its nondeterministic delays, and reservation-based MACs will be preferred [9].", "As a survey, this work differs from others already published in that it is neither concerned with the whole spectrum of techniques for energy conservation (as [6], [3] and [7]), nor is it focused solely on some specific category of duty cycling (as [8]) or application scenario (as [9])."]} +{"2583020|1940388": ["Security issues in WSNs are discussed in [58]."]} diff --git a/edge/graph_52085489.jsonl b/edge/graph_52085489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..310435ae1b1daeb35ccde48cbeed8581944baffe --- /dev/null +++ b/edge/graph_52085489.jsonl @@ -0,0 +1,4 @@ +{"11690957|239537": []} +{"16397013|15233735": ["[8] This paper proposes a new and flexible Divide and Conquer (D&C) enclosure partitioning method, called D&C Treemaps , that making possible for combining of various enclosure approaches."]} +{"14206074|14171067": ["Bille [3] surveyed the problem of comparing labeled trees based on simple local operations of deleting, inserting, and relabeling nodes."]} +{"33347369|239537": ["For hierarchical information, their approach applies the radial layout method [1, 3] with the mobile devices\u2019 restrictions [2, 11]."]} diff --git a/edge/graph_52091219.jsonl b/edge/graph_52091219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd21df923e84f03e2fd2c91804bf437f2d12223f --- /dev/null +++ b/edge/graph_52091219.jsonl @@ -0,0 +1,11 @@ +{"10640265|16662325": []} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} +{"14990549|15164501": []} +{"14990549|35897447": []} +{"31136679|4643514": ["[18] present an SLR conducted with the aim to determine the aspects of process modeling quality that had been addressed in the literature and gaps remained to be covered."]} +{"4643514|627405": ["Therefore, for the construction of the search string we identified alternative spellings, synonyms and related terms as suggested in [30]."]} +{"18310509|2774711": ["Mohagheghi, Dehlen, and Neple (2009) reviewed 40 primary studies (including books, a PhD thesis, journals, workshops, proceedings, and published online) published between 2000 and 2007 and focused on model quality within the domain of model-driven and model-based software development.", "The review of Mohagheghi, Dehlen, and Neple (2009) used fewer digital resources, had only 40 primary studies, and the review process was not strictly systematic."]} +{"18310509|627405": []} +{"18310509|9145937": ["The reviews presented in Genero, Piattini, and Calero (2005a) and Moody (2005) do not describe a systematic selection process, nor do they state clear criteria for inclusion or exclusion.", "Genero, Piattini, and Calero (2005a) performed an exploratory review of measures for UML class diagrams."]} +{"106786610|2774711": []} diff --git a/edge/graph_52094967.jsonl b/edge/graph_52094967.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e92938a405ffff1d713962fd48d0f6d1e3b019d --- /dev/null +++ b/edge/graph_52094967.jsonl @@ -0,0 +1,43 @@ +{"8283897|2415608": ["This paper will conclude in Section V by analysing current efforts and future roadmaps to resolve these outstanding issues."]} +{"8283897|2357830": ["to protect privacy and ensure integrity in RFID technology[22][23][24][25]."]} +{"26864222|17336376": ["A business model of the virtualization of sensor networks was proposed in [13] where two types of providers collaborate to offer services to the application level users (ALU)."]} +{"18086636|2357830": []} +{"29818682|2142482": ["message [21] [20].", "Misuse Detection is very successful to detect known attacks but it\u2019s drawback is straining for new unknown attacks [21] ."]} +{"3766608|14745481": ["In such networks, the decentralization of trust, which is essential in a distributed IoT context, has been extensively studied [54]."]} +{"13223117|20905429": ["They are equipped with medical sensors that are capable of measuring different parameters such as the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels [35]."]} +{"3494096|3474164": []} +{"3494096|24110634": []} +{"3494096|4427557": []} +{"3494096|2871699": ["M2M communications have been extensively reviewed in the literature [1], [31]\u2013[36].", "Pereira and Aguiar [31] discussed on European Telecommunication Standard Institute (ETSI) standard and application protocols while considering mobile devices such as smartphones to be used as mobile gateways for other connected devices with constrained capabilities and the process of aggregating data from embedded sensors in M2M network architecture."]} +{"3494096|2521001": ["Smart homes are expected to communicate regularly with their environments (internal and external) [17]."]} +{"3494096|121289": []} +{"31850245|29060869": []} +{"31850245|485843": []} +{"31850245|5747564": []} +{"31850245|6959212": ["\u2022 Security: Wireless nature of WSN also makes the system vulnerable to various external denial of service (DoS) attacks [47,48], physical and cyber threats."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"2829149|116294": ["Attacks on network availability: The denial of service (DoS) ([16], [17]) attack falls under this category."]} +{"2829149|15199849": []} +{"2829149|7889189": ["This prevention of accessibility of information to legitimate users by unknown third party intruders can take place on different layers of a network [8],[14],[15]:", "Some additional DoS attacks are as follows [7], [14], [15], [36] According to [26], the threats looming over WSN can further be classified as follows: i. External versus internal attacks ii."]} +{"2829149|1940388": ["According to [12], the attacks on WSN can be classified as: i."]} +{"8739242|206583375": ["There are many research on the tracking system inside a building [5] [6] [7] [8] [9] [10] [11] but has not been used in smart phone technology."]} +{"588124|7465328": ["A kind of energy extortion attack is sleep deprivation torture attack that is common for wireless sensor networks [27, 32]."]} +{"69961211|15199849": ["When the packets contain control information, eavesdropping becomes very effective to the adversary than getting the information through the location\nPage 24\nserver (Padmavathi & Shanmugapriya, 2009)."]} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"39204906|17005826": ["Some methods attempt to neutralize the jammer signals by cancellation (Shoreh et al., 2014) and by switching the usage in other portions of the spectrum (Kang et al.,\n2013), whereas some merely attempt to localize the jammer for further action (Cai et al., 2013; Habaebi and Ashraf, 2014)."]} +{"39204906|8326114": ["Spoofing is an attack primarily on authentication, and impersonation of nodes defeats the principles of privacy as well (Schaffer et al., 2012)."]} +{"39204906|8914588": ["A privacy protecting scheme by Juels et al. (2003) proposes IoT devices to be either private or public based in an attempt to prevent unwanted scanning of nodes. Another interesting idea by Ohkubo et al. (2004) is regarding identification of devices, in which each device will be given a temporary ID to be used in communication, so that an adversary cannot know the real ID of the node and thus privacy is protected.", "A privacy protecting scheme by Juels et al. (2003) proposes IoT devices to be either private or public based in an attempt to prevent unwanted scanning of nodes."]} +{"779908|12815020": ["Therefore, the most deployed signature based detection systems are ineffective to detect unknown attacks or variation of known attacks [11]."]} +{"114220587|206901977": []} +{"44182431|3474164": ["managing the state information of massive number of IoT devices is also an issue that needs to be considered [62, 63]."]} +{"44182431|2871699": ["M2M communicaiton has been extensively reviewed in [54, 55, 56, 57, 58].", "The ETSI standard and applications has been discussed in [54] and [55], in which mobile devices are used as mobile gateways for resource constrained IoT devices."]} +{"44182431|3494096": ["The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time [1, 20, 21].", ", have been used in IoT applications, in which billion of devices will be connected by wireless communication technologies [20].", "The 3G and 4G are widely used for IoT but not fully optimized for IoT applications [20].", "Existing communication technologies are diverse and it is challenge for the fifth generation (5G) mobile network to meet the requirements of applicaitons in IoT [20].", "To ensure that M2M applications, the three generation partnership project (3GPP) proposed Enhanced Machine-Type Communication (eMTC), Extended Coverage-Global System for Mobile Communications for the IoT (EC GSM-IoT) and Narrowband-IoT (NB-IoT) as cellular-based LPWA technologies for the IoT [20].", "by inferences, such as WiFi signals, buildings, microwaves, etc [20]."]} +{"5731070|16209841": []} +{"32903333|9554464": ["A secure data aggregation method is required for ensuring that reliable data is being collected from sensor nodes across the network [5]."]} +{"32903333|1230643": ["This has allowed for the implementation of wireless sensor network by deploying multitude of intelligent sensor nodes, thus enabling the acquisition, processing, analysis and dissemination of useful information, collected across the network [4]."]} +{"7910349|7278743": ["The a im of the IEEE 802.11 standard [ 4 ][5][6][7] is to p rovide wireless connectivity to devices that require a quick installation, such as portable c omputers, PDAs, o r generally mobile devices inside a WLAN (Wireless Local Area Network)."]} diff --git a/edge/graph_52096797.jsonl b/edge/graph_52096797.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56992ccb2aafe91ffc21c21423a7a1e95d886d71 --- /dev/null +++ b/edge/graph_52096797.jsonl @@ -0,0 +1,35 @@ +{"10670704|1708582": ["While a) and b) are ex-post concepts, the latter two allow for ex-ante analysis."]} +{"113534415|9107727": []} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"12771794|16614482": ["Some reviews [49, 76] of agent development platforms suggest that the GUI of ZEUS, along with tools like report generation, statistical analysis and debugging make it a user friendly development environment for rapidly building scalable and distributable MAS, especially for beginners unfamiliar with the agent design paradigm.", "Comprehensive reviews of several agent development platforms are available in [50, 49, 51, 52].", "[49] Pierre-Michel Ricordel and Yves Demazeau.", "A complete description of a conceptual design process for creating MAS is beyond the scope of this paper, but Ricordel and Demazeau [49] describe a generic four stage development process:\n1.", "A complete description of a conceptual design process for creating MAS is beyond the scope of this paper, but Ricordel and Demazeau [49] describe a generic four stage development process:"]} +{"113328510|14240886": []} +{"156768503|543643": ["The restructuring turned electricity markets into an attractive domain for developers of software tools [3-9]."]} +{"31086789|485843": ["the most promising solutions to use the existing power grid infrastructure extended with proper ICT methods in a more efficient way, allowing higher penetration levels of DER [12]\u2013[19]."]} +{"31086789|17774971": ["clamped or flying capacitor, and cascaded MLCs [29]\u2013[31].", "Typical topologies of MLC are diode clamped or neutral point clamped (NPC), active NPC, capacitor clamped or flying capacitor, and cascaded MLCs [29]\u2013[31].", "Due to their intrinsic characteristics, MLCs operate at low frequency and at medium voltage; moreover, they eliminate common-mode currents."]} +{"12083425|17774971": ["Moreover, the multilevel converters have the lowest demands for the input filters or alternatively reduced number of commutations [19]."]} +{"113320335|20178897": []} +{"23436632|202540003": []} +{"23436632|3113396": ["stationary game with incomplete information, where the agents initially do not know their opponents preferences and where strategies can change over time (for a survey on learning in negotiation, see Baarslag et al., 2016). As a result, they need to derive information from the exchange of oers with each other. Although rarely framed in the context of non-stationary learning, many automated negotiation strategies have ", "As with human negotiations, automated negotiation between agents is a non-stationary game with incomplete information, where the agents initially do not know their opponents preferences and where strategies can change over time (for a survey on learning in negotiation, see Baarslag et al., 2016)."]} +{"23436632|6759870": ["Recent examples include the setting of e-commerce (He et al., 2003; Kowalczyk et al., 2003), virtual agents (DeVault et al., 2015; Gratch et al., 2015) and games such as diplomacy (Fabregues et al., 2010) and coloured trails (Gal et al., 2005; Lin and Kraus, 2010).", "Recent examples include the setting of e-commerce (He et al., 2003; Kowalczyk et al., 2003), virtual agents (DeVault et al."]} +{"23436632|13171013": ["Finally, a recent survey analysed methods from evolutionary game theory and its relation with multiagent learning (Bloembergen et al., 2015).", "\u2026(Panait and Luke, 2005; Shoham et al., 2007; Busoniu et al., 2010), others have divided them by the type of learning (Tuyls and Weiss, 2012; Bloembergen et al., 2015) and another group have proposed properties that MAS algorithms should have (Bowling and Veloso, 2002; Powers et al., 2007;\u2026", "This has inspired a stream of follow-up work that links stochastic multi-agent reinforcement learning algorithms to varieties of deterministic dynamical systems, as summarized in a related survey (Bloembergen et al., 2015).", "There are also some previous categories for the type of learning used: multiplied, divided and interactive (Tuyls and Weiss, 2012); and independent, joint-action and gradient ascent (Bloembergen et al., 2015).", ", 2010), others have divided them by the type of learning (Tuyls and Weiss, 2012; Bloembergen et al., 2015) and another group have proposed properties that MAS algorithms should have (Bowling and Veloso, 2002; Powers et al."]} +{"22402185|595093": ["[9] investigated the communication interface of SG with ns-2 and OMNET++, these network simulators are open-source and widely respected in the research community."]} +{"114404841|62635091": []} +{"64713842|17381415": []} +{"8438713|31711300": ["In [4,5], the authors discussed the necessities of using computational intelligence in the DEMSs and a review of energy management systems based on multi-agent systems, respectively."]} +{"110802640|485843": []} +{"110802640|5747564": []} +{"110802640|12083425": []} +{"110802640|6959212": []} +{"110802640|14240886": []} +{"114231850|35109549": ["Note that, one of the key challenges of designing DSM models includes the need for modeling customer behavior; because, in the smart grid, demands are expected to be an integral part of system [195]."]} +{"117592344|31086789": ["related to RERs integration and need of storage devices for reliable operation of power system have been discussed in [152]."]} +{"117592344|12083425": []} +{"117592344|18037424": ["Smart grid technology is considered the best solution for the various problems of the power grids [13,14]."]} +{"5904227|5747564": []} +{"109077100|5747564": []} +{"15640160|543643": []} +{"6986747|5747564": ["In the literature, there are a few surveys and tutorials on smart grid architecture [5,6], smart grid communications [7\u201311], smart grid information management [12] and middleware architectures for the smart grid [13]."]} +{"6986747|121289": []} +{"6986747|18037424": []} diff --git a/edge/graph_52099368.jsonl b/edge/graph_52099368.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1138a0028447e85c60406a3fa63575eff5290e14 --- /dev/null +++ b/edge/graph_52099368.jsonl @@ -0,0 +1,9 @@ +{"10715058|1691571": []} +{"10715058|18722099": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"18675437|8125630": ["We assume that it consists of a unique relation scheme that corresponds to a flat fact table as defined in OLAP analysis \u2013 we recall that an OLAP system is characterized by multidimensional data cubes that enable manipulation and analysis of data stored in a source database from multiple perspectives (see for instance [6])."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} diff --git a/edge/graph_52100243.jsonl b/edge/graph_52100243.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52102247.jsonl b/edge/graph_52102247.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52104962.jsonl b/edge/graph_52104962.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4fe98195afd58482ae7ef9743725b75ffea81bf --- /dev/null +++ b/edge/graph_52104962.jsonl @@ -0,0 +1,9 @@ +{"25017677|8909218": ["Some studies [3] [4] expected that the smallcell network architecture will play an important role in supporting such 5G network access, especially for low velocity or stationary users.", "The researches [2] [3] have shown that around 80% of the mobile transmission occurs in the indoor environment.", "The key features and a number of open issues for smallcell network are summarized in [3] [5] [6]."]} +{"25017677|4269723": ["The studies [11] [12] survey several kinds of challenges and issues in SDN networks."]} +{"34318302|8909218": ["In order to solve these problems, the femtocell network has become a promising solution since femtocells improve both the system capacity and coverage with low cost and low energy consumption [3-6]."]} +{"42100362|18750590": ["for traffic offloading and resource allocation by standardized interfaces such as OpenFlow-enable switches [7], [15], which need some corresponding modifications for the requested and released information mentioned above.", "analyzed through economics theory [15]."]} +{"41996067|7686677": ["In order to meet the ever-increasing data rate demands of wireless systems, new enabling technologies are desired for future wireless communications with high power and energy efficiencies [1]-[3]."]} +{"49274573|8909218": ["In addition, the FGW works as the coordinator of FAPs and\northogonal frequency division multiple access (OFDMA) scheme is used in this paper.", "To reduce the amount of information transmitted overhead, the distance matrix is stored both in the FGW and in the local so that it can be obtained quickly and easily when it is needed in the coalition formation and subchannel allocation processes.", "Therefore, information exchange between users and the FGW through FAPs is inevitable.", "Each FAP collects the estimated distance information from users associated with it and transmits the collected distance information to the FGW, which works as the coordinator of FAPs, through a backhaul.", "In the network, each FAP is connected to the core network (CN) through an Internet Protocol (IP) backhaul and femtocell gateway (FGW) [23].", "Then, the FGW gathers these information into a distance matrix of the whole network and broadcasts it to each user through FAPs.", "The FGW, the coordinator of the network, needs to collect the throughput of each user and calculate the aggregate throughput which is used in deciding whether the net-\nAlgorithm 3: Supplementary Allocation Algorithm (SAA)."]} +{"5140671|8909218": ["F FAPs are randomly distributed, configured to operate in closed-access mode [1], and coexist with cellular tier over the licensed spectrum.", "The concept of cellular networks overlaid with Femtocell Access Points (FAPs) has recently emerged as a promising architecture that is potentially able to provide the required rates and ubiquitous coverage for both indoor and outdoor users [1]."]} +{"8663977|8909218": []} +{"14887600|8909218": ["120959 range, low-power, and low-cost base stations underlaying the macro-cellular network [1], [4]\u2013[6]."]} diff --git a/edge/graph_52111218.jsonl b/edge/graph_52111218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52113920.jsonl b/edge/graph_52113920.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..72d119a309d555a54a152a3469f3937798f026c9 --- /dev/null +++ b/edge/graph_52113920.jsonl @@ -0,0 +1,6 @@ +{"353038|17779575": ["According to our study, this duplication results in up to 25x more data volume for the input feature maps in the CONV layer, and thus diminishes the gains of FPGA acceleration considering that FPGA platforms have extremely limited bandwidth (about 10 to 20 GB/s [26]) compared to CPU/GPU platforms (up to 700GB/s [27])."]} +{"3487488|34460949": ["FPGA accelerators have shown to be promising candidates to improve system performance and power efficiency for more than two decades [20, 33, 39]."]} +{"3487488|7097444": ["FPGA accelerators have shown to be promising candidates to improve system performance and power efficiency for more than two decades [20, 33, 39]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"206592484|456491": []} +{"44014988|12161567": ["Large scale embeddings [55] are used as a portable encoding."]} diff --git a/edge/graph_52116541.jsonl b/edge/graph_52116541.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..747177eb84c70782cad9d3704d5bdb5afe439fa6 --- /dev/null +++ b/edge/graph_52116541.jsonl @@ -0,0 +1,13 @@ +{"12195226|10310014": []} +{"27122789|2509135": ["However, thanks to the recent introduction of Software Defined Radio (SDR) and Cognitive Radio (CR) systems [1,2], which foster the possibility to design highly reconfigurable wireless devices also at the lowest layers of the protocol stack (i.", "In the first case, emergency wireless networks are deployed through multi-stack Cognitive Radio (CR) devices [1,2] which are able to adjust their transmitting parameters at the MAC/PHY layers and to interconnect heterogeneous devices [28,29]."]} +{"108296571|9104850": []} +{"14549420|2623404": []} +{"114926311|10310014": []} +{"61508332|18148591": ["It is based on re-configurable Orthogonal Frequency Division Multiple-Access (OFDMA) with multi-antenna capability (Multiple-Input Multiple-Output MIMO [ 13 ]).", "WIDENS takes advantage of the technology of Mobile Ad hoc NETworks (MANETs) [ 13 ]."]} +{"61508332|10559330": []} +{"27525950|10859599": []} +{"16450671|2535224": []} +{"2695288|5547019": ["Each thread runs on a separate CPU core attached to one of the Non-Uniform Memory Access (NUMA) [45] nodes on the machine."]} +{"1336704|14745481": ["EXPERIENCE tells us that when natural disasters wipe out orseverely overload the existing telecommunication infrastructures, the possible means of communication are few and expensive, thereby creating a role for hastily formed networks (HFN) [1]."]} +{"11435373|10310014": ["In [13], authors survey the status of wireless technologies in PSN, current regulatory standards, and the research activities that address the challenges in PSC."]} +{"11851582|164835": ["This calculation is performed using a trilateration technique as described in [42]."]} diff --git a/edge/graph_52123079.jsonl b/edge/graph_52123079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54fe0cb9b14a07612da59693ab6cc8186534ac5a --- /dev/null +++ b/edge/graph_52123079.jsonl @@ -0,0 +1,7 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"2793715|2762290": ["Starting from a point in the image [4]: (1) find the next character, (2) extract features of the character image, and (3) find the symbol that best matches those features and output its identity."]} +{"2793715|932651": ["Most published character segmentation methods rely upon heuristically derived rules and the use of classification techniques in segmentation is largely an unexplored area [5] [6]."]} +{"1044293|393948": ["An even more radically different solution to the problem of avoiding explicit latent variables was recently introduced in Bengio et al. (2013c) and Bengio and Thibodeau-Laufer (2013).", "They are hurt by the problem of mode mixing, discussed at greater length in Bengio et al. (2013b), and summarized here.", "The hypothesis proposed (Bengio et al., 2013b) to explain this observation is that unsupervised representation learning procedures (such as for the RBM and contractive or denoising auto-encoders) tend to discover a representation whose distribution has more entropy (the distribution of vectors in\u2026", "Instead, they are based on the construction of a direct parametrization of an encoding function which immediately maps an input x to its representation f(x), and they are motivated by geometrical considerations in the spirit of manifold learning algorithms (Bengio et al., 2013d).", "An interesting observation (Bengio et al., 2013b) which could turn out to be helpful is that after we train a deep model such as a DBN or a stack of regularized auto-encoders, we can observe that mixing between modes is much easier at higher levels of the hierarchy (e.g. in the top-level RBM or\u2026", "\u2026result was only valid for asymptotically small Gaussian corruption noise, squared reconstruction error, and continuous inputs, the result from Bengio et al. (2013c) is applicable for any type of input, any form of reconstruction loss (so long as it is a negative log-likelihood), any form of\u2026", "Although the result from Alain and Bengio (2013) suggests that when the amount of injected noise is small, a unimodal distribution is sufficient, it is convenient to accomodate large amounts of injected noise to make training more efficient, as discussed by Bengio et al. (2013c).", "As explained in Bengio et al. (2013d), the tug-of-war between minimization of reconstruction error and the regularizer means that the intermediate representation must mostly capture the variations necessary to distinguish training examples, i.e., the directions of variations on the manifold (a\u2026", "Furthermore many pieces of evidence in the results of experiments on deep learning suggest that training deep networks (including recurrent networks) involves a difficult optimization (Bengio, 2013b; Gulcehre and Bengio, 2013; Bengio et al., 2013a).", "See (Bengio, 2009; Bengio et al., 2013d) for reviews and Bengio (2013c) and the other chapters of the book by Montavon and Muller (2012) for practical guidelines.", "See section 3 of Bengio et al. (2013d) for a review of representation learning procedures based on directed or undirected graphical models.4 Section 2.5 describes sparse coding in more detail.", "A general strategy was outlined in Bengio et al. (2013d) to enhance the discovery of representations which disentangle the underlying and unknown factors of variation: it relies on exploiting priors about these factors.", "Another encouraging observation (already mentioned in the section on mixing) is that deeper representations were empirically found to be more amenable to quickly mixing between modes (Bengio et al., 2013b).", "See Bengio et al. (2013d) for a brief overview in the context of deep learning, along with connections to other unsupervised representation learning algorithms."]} +{"13470099|393948": ["In order to make the vision models less dependent on feature engineer, representation learning [1, 37], which facilitates useful information extraction from raw data for building predictors, has attracted much attention in the past decade."]} +{"206592484|456491": []} +{"15158546|16013270": ["To improve the discriminative performance, some compositional methods [46, 5] model complex activities by segmenting the videos into temporal segments of \ufb01xed length.", "An activity can be considered as a sequence of actions (i.e. sub-activities) occurred over time [5]."]} diff --git a/edge/graph_52125636.jsonl b/edge/graph_52125636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..664fad6d226fcbdbe428515725c10aefaa531c15 --- /dev/null +++ b/edge/graph_52125636.jsonl @@ -0,0 +1,24 @@ +{"124055484|206583375": ["A lot of positioning techniques using GPS, RFID, Bluetooth, WiFi [1, 2] have been investigated.", "tioning techniques using GPS, RFID, Bluetooth, WiFi [1, 2] have been investigated."]} +{"31781029|206583375": []} +{"42886751|13372227": ["To use the triangulation technique, it is required to measure the angle or distance between a reference point and a mobile terminal, and there are several methods to measure for this purpose such as, angle of arrival (AOA), time of arrival (TOA), time difference of arrival (TDOA), and received signal strength intensity (RSSI) [11], [12]."]} +{"12297908|8909218": ["In contrast, femtocells typically have an order of magnitude larger cell radius [43].", "The results of the femtocell network are taken from [43], [45]\u2013[47]."]} +{"3141460|16050825": ["the emergence of visible light communication (VLC) products [17]\u2013[23], the market has begun to show future promise [24],"]} +{"3141460|13074005": ["optical spatial modulation (OSM) where only one \u201con\u201d slot is transmitted from the multiple beams at a given channel-use in order to avoid inter-channel interference [301], [302]."]} +{"3141460|11720829": ["data rate and to reduce the fading effect on the quality of signal transmission [284]."]} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"2443662|206583375": ["Although accurate dedicated localization systems have been proposed [1], they are expensive, require customized hardware and calibration and thus are unsuitable for widespread implementation."]} +{"9118309|17165859": ["Earlier reports used a relatively small number of LED emitters and provide positioning through time difference of arrival ranging [3], [7], [8], allocation to fingerprinted luminaires, often combined with signal strength evaluation [9]\u2013[11], probabilistic methods [4], or a range of different triangulation methods [3], [4], [12], [13]."]} +{"122725027|4491892": []} +{"2403411|206583375": ["A lot of positioning techniques using GPS, IR, RFID, Ultrasound, Bluetooth, Wifi [1,2] have been researched but there is no standard method for indoor positioning like using GPS in outdoor positioning systems."]} +{"109397421|7365537": []} +{"109775045|206583375": []} +{"12413127|17966235": ["However, beyond the licensed sub-5 GHz frequency spectrum, huge bandwidth available at millimeter wave (mmWave) frequencies makes them attractive for the potential fifth generation (5G) cellular networks [1], [2]."]} +{"17165859|6972141": ["When a camera is used as the receiver, VLC based positioning might look similar to the vision based positioning [15\u201318] which has been developed in robot vision or augmented reality applications, for quite long time."]} +{"17165859|206583375": []} +{"34564324|5476476": ["A lot of surveys of IPS can be found [27]\u2013[30]."]} +{"34564324|17165859": []} +{"34564324|8650651": ["Due to the high transmission capacities, optical wireless networks play an important role in our modern information technology [12]."]} +{"34564324|206583375": ["According to a recent survey [5], there are various indoor positioning technologies proposed such as Radio-Frequency Identification (RFID) [6], [7], Ultra-Wideband (UWB) [8], Wi-Fi [9], [10], and fingerprint [11]."]} +{"19888241|16050825": ["short-range wireless transmission [33], [34]."]} +{"19888241|13074005": ["Generalised Space Shift Keying (GSSK): GSSK is a subset of spatial modulation [146], [147], where spatial domain is exploited to modulate information [148]."]} +{"39898897|2515019": ["These reference tags serve as reference points in the system and make the system more cost efficient as RFID readers are rather costly.", "Another configuration called reverse RFID [14] was developed, in which the objects being tracked wear the RFID reader and the tags are fixed (landmark roof-mounted RFID Tags).", "In track-and-trace applications for the mining industry, RFID tags are usually attached to the units that will be tracked.", "For instance, Mobile Miners have wearable RFID tags to be uniquely identifiable by RFID readers distributed throughout the tunnels.", "- Radio Frequency Identification (RFID) systems: this solution is another common technology employed to revealing the location of mineworkers, without offering any other communication services.", "Nonetheless, RFID can also help in mine management and control, where automatic identification of devices and materials (e.g. explosives and detonators) is especially beneficial.", "This concept was firstly proposed to locate people inside a building using RFID technology [13].", "A recent overview of RFID in undergroundmining service applications is given in [11]."]} diff --git a/edge/graph_52125926.jsonl b/edge/graph_52125926.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23da19feca5fc1dc18c7edadae96cff1a6f37ba2 --- /dev/null +++ b/edge/graph_52125926.jsonl @@ -0,0 +1,3 @@ +{"111114900|11720829": ["Its use in wide area networks (WAN) and wireless local area networks (WLAN) has been extensively studied [2]."]} +{"36293072|7854020": ["References [1]\u2013[6] report notable achievements of the TG 6."]} +{"25165012|15453366": ["A reasonably good agreement among various national regulating bodies can be found only for the mmW-60 band [15]."]} diff --git a/edge/graph_52130209.jsonl b/edge/graph_52130209.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84593d9f667afa5b0b23fffdaa3689e0398e78e5 --- /dev/null +++ b/edge/graph_52130209.jsonl @@ -0,0 +1,10 @@ +{"1242934|1299833": ["The \ufb02exible design of our approach allows to incorporate performance enhancements developed for TCP in ad hoc networks such as adaptive slow start and enhanced congestion control [9, 11].", "Congestion in ad hoc networks is an important issue not yet solved by means of Internet congestion control mechanisms and novel approaches are work in progress [2, 5, 9, 11].", "Several surveys of TCP performance in ad hoc and mobile ad hoc networks are available, which summarize these approaches [2, 9, 11]."]} +{"1242934|1230643": ["For example, the research \ufb01elds of sensor networks and body area networks require mechanisms and technologies for achieving optimum data rates while addressing issues such as power-consumption and reorganization during the data transfer [1, 3, 10]."]} +{"124184093|17062686": []} +{"19712986|8606364": ["The basis to find optimal spectrum sensing interval in CRN is that PU activities usually follow some activity models [7], [14], [22].", "It is proven by many spectrum measurement campaigns around the world that the spectrum occupancy of PU channels shows noticeable statistic features, which can be described by some statistical models [7]."]} +{"206934796|8974063": ["Studies have shown that the radio spectrum is not utilized constantly by the users this resource has been allocated to; 25 spectrum usage is estimated to be between 5% and 85% on a block of licensed radiofrequency (RF) bands at 26 different geographical locations and at different times [1-4]."]} +{"206934796|12601073": ["Cyclostationary Detection 65 takes advantage of the fact that statistical parameters of practical communication signals vary periodically [19].", "Several spectrum sensing techniques have been 59 proposed over the last decade [2-20]."]} +{"17626098|1230643": ["Some typical applications include surveillance systems, environmental monitoring and healthcare monitoring [1, 7]."]} +{"19970301|6959212": ["Recently, WSN has been widely recognized as a promising technology that can enhance various aspects of today\u2019s electric power systems, including generation, delivery, and utilization, making them a vital component of the next generation electric power system, the smart grid [6,22\u201328]."]} +{"19970301|270804": ["Recently, WSN has been widely recognized as a promising technology that can enhance various aspects of today\u2019s electric power systems, including generation, delivery, and utilization, making them a vital component of the next generation electric power system, the smart grid [6, 22\u201328].", "Even though its algorithm incorporates spectrum sensing and handoff functionalities, it occupies TCP\u2019s window-based congestion control mechanism, which has clearly been shown to have very poor performance in sensor networks [5].", "Energy-efficiency has been the main focus of transport layer solutions proposed for sensor networks thus far [5].", "The existing transport protocols and algorithms devised for cognitive radio ad hoc networks and WSN are explored from the perspective of CRSN paradigm.", "The collaborative and low-cost nature of wireless sensor networks (WSN) brings signi\ufb01cant advantages over traditional communication technologies used in today\u2019s electric power systems.", "Recently, there has been many research e\ufb00orts, which have yielded many promising transport protocols for wireless sensor networks (WSN) [5].", "In this section, we investigate the speci\ufb01c CRSN challenges for multimedia and delay-sensitive data delivery and explore the existing transport solutions developed for WSN and cognitive radio networks together.", "The common feature of these protocols is that they mainly address the energy-e\ufb03cient and reliable data communication requirements of WSN.", "Recently, there has been many research efforts, which have yielded many promising transport protocols for wireless sensor networks (WSN) [5].", "However, realization of these currently designed and envisioned applications directly depends on real-time transport capabilities of the deployed CRSN. Recently, there has been considerable amount of research e\ufb00orts, which have yielded many promising transport layer protocols for wireless sensor networks (WSN) [4, 5].", "Recently, there has been considerable amount of research efforts, which have yielded many promising transport layer protocols for wireless sensor networks (WSN) [4,5]."]} +{"16320047|12187956": ["The hybrid MAC protocol is usually based on ON/OFF Model, [9]."]} diff --git a/edge/graph_52142843.jsonl b/edge/graph_52142843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..884e637ae98312eb96090f615aaf7cb5af8ae9a7 --- /dev/null +++ b/edge/graph_52142843.jsonl @@ -0,0 +1,20 @@ +{"8283897|2415608": ["This paper will conclude in Section V by analysing current efforts and future roadmaps to resolve these outstanding issues."]} +{"8283897|2357830": ["to protect privacy and ensure integrity in RFID technology[22][23][24][25]."]} +{"1208330|17756238": ["GPS stalking [81], disclosure of private information such as an illness [82], or generally the uneasy feeling of being watched [83].", "Examples where profiling is leads to a violation of privacy violation are price discrimination [87, 88], unsolicited advertisements [83], social engineering [89], or erroneous automatic decisions [48], e."]} +{"1208330|2906926": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"1208330|2357830": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"26844665|17205659": []} +{"15632034|14745481": ["As a result, a number of trust-based routing protocols have been proposed [19\u201322]."]} +{"15632034|17205659": ["SAR is a secure routing protocol in WSNs that can discover the shortest path with desired security attributes [26].", "With the growing trend in the field of security, there has been an increased effort in the research on routing protocols in recent years [24\u201326]."]} +{"17343287|1940388": ["Less obvious but just as important security dependent applications [2, 3, 4] include:\n\u2022 Disasters: In many disaster scenarios, especially those induced by terrorist activities, it may be necessary to protect the location of casualties from unauthorized disclosure \u2022 Public Safety: In applications\u2026"]} +{"17343287|17205659": ["Less obvious but just as important security dependent applications [2, 3, 4] include:\n\u2022 Disasters: In many disaster scenarios, especially those induced by terrorist activities, it may be necessary to protect the location of casualties from unauthorized disclosure \u2022 Public Safety: In applications\u2026"]} +{"14398863|14441987": []} +{"8150091|1598350": ["Moreover, IoT marketplaces have emerged and will continue to emerge [2]."]} +{"26349072|7465328": ["\u2026exploit known and unknown vulnerabilities of the underlying protocols, software and hardware, and threaten the security, integrity, and availability of data that resides in these networked expert systems (Karlof & Wagner, 2003; Xing, Srinivasan, Rivera, Li, & Cheng, 2010; Martins & Guyennet, 2010)."]} +{"26349072|1230643": []} +{"26349072|1331167": []} +{"41350255|1230643": ["Wireless sensor networks (WSNs) [1] are de\ufb01ned as a large collection of tiny sensor nodes, which have scarce resources regarding energy, bandwidth, processing capacity and storage."]} +{"25062322|9494512": ["Data traf\ufb01c from devices can be controlled to balance energy in the network which is possible by techniques such as duty cycling, scheduling sleep and wake-up modes of devices studied in [13]."]} +{"15908424|1230643": ["Internet of things (IoTs) refers to uniquely identifiable objects (things) and their virtual representations in an Internetlike structure [1], [2]."]} +{"55117544|7774517": ["And faults are application and sensor type dependent [4\u20136]."]} diff --git a/edge/graph_521509.jsonl b/edge/graph_521509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52152458.jsonl b/edge/graph_52152458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..012dd1b760662449714e72ff499706935a93feec --- /dev/null +++ b/edge/graph_52152458.jsonl @@ -0,0 +1,5 @@ +{"16422041|7199412": ["\u2026of\n\u2217Corresponding author Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the\u2026"]} +{"35442644|7199412": ["The local deformation is a particular problem in watermarking, since it break the synchronization of watermarking [20].", "To cope with that, the robust synchronization method which is invariant to changing of the local information is essential [20].", "Anti-cropping is one of the most difficult problems in the mesh watermarking field that is unsolved [20]."]} +{"3353517|6681074": ["Campbell and Flynn (2001) give a survey of 3D freeform object recognition techniques and classify them into appearance based recognition, recognition from 2D silhouettes and free-form object recognition in range data.", "Campbell and Flynn [5] give a survey of 3D freeform object recognition techniques and classify them into appearance based recognition, recognition from 2D silhouettes and free-form object recognition in range data.", "Campbell and Flynn [5] argue that the computational complexity of these techniques can become one of the prohibitive factors if brute force matching is used.", "Campbell and Flynn\n(2001) argue that the computational complexity of these techniques can become one of the prohibitive factors if brute force matching is used."]} +{"3787590|7199412": ["The 3D mesh watermarking being used is a technique to protect the copyright of 3D mesh and it can be classified into non-blind and blind approaches [32]."]} +{"7688090|7199412": ["Given that there exist very few blind watermarking schemes resilient to cropping attack [5], [30], [31], the noteworthy point is that our algorithm achieved robustness against a small amount of cropping attack."]} diff --git a/edge/graph_52155121.jsonl b/edge/graph_52155121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b109f4d6aef0ddb0ce9337421bd4454858347552 --- /dev/null +++ b/edge/graph_52155121.jsonl @@ -0,0 +1,46 @@ +{"14220437|13458486": []} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"7485839|2535224": ["\u2026discussed for wired networks [4]\u2013 [7] and WiFi network virtualization may be considered as its extension [8], [9], the distinct properties of the wireless media such as time-varying channel capacity, interference, and broadcast make WiFi network virtualization more challenging [10]\u2013 [12].", "\u2026WiFi network infrastructure resources and physical radio resources can be abstracted and shared by multiple independent and customizable logical (virtual) WiFi networks through isolating each other, and can be considered as an example of wireless network virtualization [8], [10]\u2013[12], [22]."]} +{"10342730|2535224": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "In contrast to previous surveys on wireless virtualization [2]\u2013[4], our interest focuses on the problems derived from wireless slicing and on the existing techniques that deal with these speci\ufb01c problems."]} +{"10342730|11735843": ["Applying SDN to the wireless domain, some works have proposed different designs, frameworks and tools [4], [11].", "For instance, approaches for network programmability [11] such as Software-De\ufb01ned Radio (SDR) [56]\u2013[58] or programmable MAC protocols [59]\u2013[61] may be used to circumvent this challenge."]} +{"13140229|17787193": ["\u2026trend, the seam-less integration of cellular (e.g., 3G/LTE) and WiFi technologies has attracted signi\ufb01cant research interest in recent years (see [202] for a survey), a few solutions have already been standardised [203, 204], and roaming between cellular and WiFi is becoming increasingly\u2026"]} +{"13140229|8462498": ["How to optimally exploit the new DL-MU-MIMO capabilities provided by IEEE 802.11ac is still an open challenge.", "In [44], the authors compare di\ufb00erent strategies to assign the spatial streams between the available destinations at each transmission in a fully connected mesh network, showing in ideal channel conditions the theoretical bene\ufb01ts of MU-MIMO vs. SU-MIMO.", "An analytical model to evaluate the performance of the IEEE 802.11ac TXOP sharing mechanism in DL-MU-MIMO communications is developed in [38].", "Compared to IEEE 802.11n, IEEE 802.11ac supports larger channel widths (up to 160 MHz), introduced a new modulation scheme, i.e., a 256-QAM modulation, and downlink multiuser MIMO (DL-MU-MIMO).", "The performance bene\ufb01ts of uplink MU-MIMO have been already extensively studied, showing its bene\ufb01ts but also the requirements and challenges to implement such a solution [59].", "MIDAS (Multiple-Input Distributed Antenna Systems) [198] implementation using the WARP platform shows the bene\ufb01ts of distributing the antennas over the area to cover instead of co-locating them at the AP in terms of capacity when MU-MIMO is employed.", "It is worth mentioning that DL-MU-MIMO was not yet implemented in the equipment they were using, and that feature was therefore not considered.", "Since the IEEE 802.11ac amendment has recently been \ufb01-nalised, current research around it should cover two main aspects: a) understanding the performance bounds of IEEE 802.11ac, which entails the development of new models, simulation tools and experimental platforms of IEEE 802.11ac-based WLANs, and b) proposing speci\ufb01c solutions for those aspects that are not de\ufb01ned by the IEEE 802.11ac amendment on purpose, such as the mechanism for creating the groups of STAs for DL-MU-MIMO transmissions, smart packet schedullers able to decide when the use of DL-MU-MIMO outperforms SU-MIMO transmissions, and the implementation of the TXOP sharing feature between several ACs.", "The evaluation of a DL-MU-MIMO implementation for WLANs using the WARP platform is presented in [35], where a deep evaluation of the potential bene\ufb01ts of DL-MU-MIMO transmissions is done in terms of the location of the receivers, number of users, and user mobility, among other aspects.", "First, due to the need of frequent CSI exchanges between STAs and the AP, it is not yet clear in which conditions DL-MU-MIMO outperforms SU-MIMO [39, 40, 41, 42], or even whether MU-MIMO does or does not out-perform multi-user packet aggregation when the amount of data directed to each destination is not balanced [43].", "11ac by allowing multiple simultaneous transmissions in the plink, which is known as uplink (UL-) MU-MIMO [58].", "Similar to DL-MU-MIMO transmissions, an open challenge to enable uplink MU-MIMO is to design a mechanism able to e\ufb03ciently schedule the users that will transmit simultaneously.", "IEEE 802.11ax will further develop the MU-MIMO capabilities of IEEE 802.11ac by allowing multiple simultaneous transmissions in the uplink, which is known as up-link MU-MIMO.", "A solution that combines both packet aggregation and DL-MU-MIMO transmissions is presented in [36].", "The main novelty introduced by the IEEE 802.11ac amendment compared with the IEEE 802.11n one is the support of MU-MIMO transmissions in the downlink, hence allowing multiple simultaneous transmissions from the AP to di\ufb00erent STAs.", "The challenges in the design of the IEEE 802.11ax PHY layer are related with the extensions required to support multi-user MU-MIMO and OFDMA transmissions, and Dynamic CCA."]} +{"13140229|12187956": ["\u2026hando\ufb00 issues (e.g. in case PUs suddenly appear in a region) must be resolved in advance to minimise the latency of re-establishing a functional communication channel, e.g. by implementing a proactive alternative rendezvous channel selection in background to ongoing communication processes [161]."]} +{"13140229|5621151": ["This reorganisation has shown that there are many empty TV hannels, called TV white spaces, that can be used for data communiation, especially in rural regions [28]."]} +{"13140229|1230643": []} +{"10807928|2623404": ["presented a survey on Software-Defined Networking, focusing on OpenFlow [9].", "In SDNs [9], the programmable data plane stops at the switching elements.", "Several manufacturers sell today programmable switches and routers [9], and there are many commercial and educational SDR platforms on the market [10], spanning several frequency bands.", "Authors in [9] also did not discuss the importance of network virtualization or data plane programmability.", "Currently, OpenFlow is also implemented in hardware on several commercial switches and routers [9]."]} +{"10807928|3189715": []} +{"15289072|17336376": ["Readers are referred to [81] for a detailed survey on virtualization of wireless sensor networks."]} +{"263015|2623404": ["[38] present programable networks in the context of SDN."]} +{"263015|1230643": ["Wireless Sensor Networks (WSNs) [57], [58] differ substantially from WCNs with respect to network and node"]} +{"22182648|5630105": ["This is in particular an important improvement because most of the existing work on real-time wireless networking consider such relationship between flow periods [12; 46; 33; 58; 59; 60; 4]."]} +{"10808374|17787193": ["[8] summarized non-delayed and delayed strategies and also distinguished terminal-to-terminal techniques from AP-based offloading.", "Thus, our proposed work has a comprehensive classification of WiFi offloading that is different from [7] and [8].", "However, the incentives of the offloading techniques in [8] were not clear while we classify these incentives into five categories."]} +{"206577567|54836648": ["the transmission medium [18]\u2013[22], traffic engineering [23], multicasting [24], controllers [25], and network (function) virtualization [26]."]} +{"206577567|11414835": ["There are also papers focusing on specific areas such as virtualization [11], [12], security [13]\u2013[17], optimizations for"]} +{"206577567|2535224": ["[11], [12], security [13], [14], [15], [16], [17], optimizations for the transmission medium [18], [19], [20], [21], [22], traffic engineering [23], multicasting [24], controllers [25], and network (function) virtualization [26]."]} +{"206577567|2623404": ["There exist publications surveying overall aspects of SDN [3], [4], [5], [6], [7], [8], [9], [10]."]} +{"206577567|4608889": ["The existing research can mostly be classified into two main categories: network access control and attack detection and defense [7]."]} +{"206577567|10693567": ["tions surveying overall aspects of SDN [3]\u2013[10]."]} +{"206577567|2387055": ["There are also papers focusing on specific areas such as virtualization [11], [12], security [13]\u2013[17], optimizations for"]} +{"206577567|2818055": ["If a value of a cell changes then, the formulas are automatically recalculated [91]."]} +{"206577567|3994942": [", finding efficient routes to achieve the desired network performance [131]."]} +{"206577567|7453720": []} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"206578131|1598350": ["The concept of smart manufacturing is based on the integration of both CPS and IIoT concepts [134]."]} +{"206578131|7278743": []} +{"9413775|8606364": ["There are articles on the methodological aspects [19], [28], guidelines [26], [27], and time-domain modeling [29], [30] of spectrum measurements.", "The use of equipment that is not matched to the signals present in the environment has led to dubious findings and conclusions, such as the claim in [29], where several papers report that the satellite bands below 3 GHz are unutilized.", "The data is processed to estimate the spectrum occupancy and models are developed [29], [79] to characterize the use of the spectrum being studied.", "Furthermore, a useful survey on spectrum occupancy modeling [29] provided good insight especially on time-"]} +{"9413775|2398835": [", graphical processing units (GPU) [98] in conjunction with distributed database storage, processing and access [99] are becoming mainstream in the development", "To overcome the scaling problem for large scale datasets, sparse approximation methods [73] and parallel computing approaches [99] can be applied."]} +{"9413775|5621151": ["Our work extends the previous research reported in [19] and [26]\u2013[35]."]} +{"23013831|4730": ["Deployment guidelines [38] Survey of Experimental Evaluation Studies for Wireless Mesh Network Deployments in Urban Areas Towards Ubiquitous Internet 2013 13 13"]} +{"23013831|3345066": ["50 [32] Admission Control Schemes for 802."]} +{"23013831|12681089": ["MIMO propagation [6] is among the five most cited papers, its citation rate is not that high; on the other hand, despite the survey on energy efficiency [7] is very recent, it is already among the papers with the highest citation rate.", "1) Propagation: One of the \ufb01rst works to challenge the usual wireless (simulation) assumptions is [100].", "Models Propagation [6] Survey of Channel and Radio Propagation Models for Wireless MIMO Systems 2007 341 44."]} +{"23013831|1299833": ["[12] A Survey of TCP over Ad Hoc Networks 2005 172 19."]} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} +{"11343032|10099297": []} +{"8707777|8450611": ["Most previous research in this area (see Taylor [24] for a survey) focuses on static compilation.", "Most previous research in this area (seeTay\u00adlor [24] for a \nsurvey) focuses on static compilation.", "[24] D.Taylor."]} +{"31247895|1956433": []} +{"14620719|7439310": ["UDP performance is further improved by employing EC techniques to reduce the impact of data loss [8], [9]."]} +{"15023432|8462498": ["A survey of MU-MIMO MAC protocols for WLANs is shown in [12], where both uplink and downlink MU-MIMO MAC proposals for WLANs are reviewed."]} +{"37608238|1230643": []} diff --git a/edge/graph_52156554.jsonl b/edge/graph_52156554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..744a2793f1b1c86608c26aa8db4523c11bf90d11 --- /dev/null +++ b/edge/graph_52156554.jsonl @@ -0,0 +1,39 @@ +{"17160926|2000518": ["A survey of these technologies can be found in [11]."]} +{"393273|9907884": ["Since then, many successful visualization tools using this radial layout have been produced to visualize everything from file systems to social network data to genomics data [16, 18, 20, 29, 33, 38, 41, 51]."]} +{"393273|239537": ["Network & Tree Diagrams There has been extensive work in the network visualization community on effective techniques for generating and drawing large complex networks [1, 3, 4, 5, 21, 27, 44, 54]."]} +{"7619527|239537": []} +{"17723927|4361938": ["Eye-tracking can be helpful in this endeavor since gaze patterns are correlated with task intention [9]."]} +{"4560326|1174262": ["\u2026taxonomies, conceptual models, and design spaces for temporal visualizations mainly categorize visualizations based on analytical tasks or data types (e.g., object movement data [AAH11, AAB \u2217 11, AA12], video data [BCD \u2217 12], or datasets with different temporal and spatial structures [AMM \u2217 07])."]} +{"59108113|239537": []} +{"1280336|239537": ["In contrast, nodelink diagrams of abstract graphs typically follow aesthetic criteria for graph drawing [7, 13]."]} +{"4951728|239537": ["A full review is beyond the scope of this article; various surveys are available.(11,12) A common representation of such node/link data sets is to represent nodes as circles and links as a line connecting two nodes that are related in some way."]} +{"13578913|18722099": ["Several studies [23, 24, 36, 81, 86] provide a comprehensive review of these layout methods.", "Many graph visualization methods have been introduced [36, 43, 86], with the most popular and intuitive method being the node-link diagram.", "For this evaluation, we used eight representative layout methods of five families based on groupings found in [36, 86].", "Because the layout of a graph significantly influences the user\u2019s understanding of the graph [36, 46, 56, 57], it is important to find a \u201cgood\u201d layout that can effectively depict the structure of the graph.", "The main idea is to find the \u201cbest\u201d way to lay out given graphs [36]."]} +{"13578913|239537": ["Many graph visualization methods have been introduced [36, 43, 86], with the most popular and intuitive method being the node-link diagram."]} +{"2593345|18986679": ["However, overview is becoming increasingly difficult to effectively achieve with the ever-increasing size of real-world datasets."]} +{"3549011|239537": []} +{"8464489|239537": []} +{"448854|6415369": []} +{"358467|239537": ["Graph drawing and visualization has been a very active area of research [10], [21], [22]."]} +{"734418|239537": []} +{"6477275|2338214": ["In this section, we present the definitions used in this paper and introduce the sampling strategies and data used in our study."]} +{"6477275|239537": ["Graph visualization is an active research area [25, 39, 49]."]} +{"9428201|18722099": ["Furthermore, there exist several surveys of general layout algorithms for node-link diagrams [BETT98, DPS02, GFV13]."]} +{"9428201|2593345": []} +{"9428201|191396": ["\u2026numeric ones\u2014should be aggregated, vertices can be grouped based on these multivariate c (cid:2) 2016 The Authors Computer Graphics Forum c (cid:2) 2016 The Eurographics Association and John Wiley & Sons Ltd. attributes using standard feature-based clustering and classi\ufb01cation algorithms [XW05]."]} +{"9428201|239537": ["Existing reports of state of the art focus on other aspects of graph visualization or subproblems: Herman et al. [HMM00] describe several approaches that use the hierarchical group structure for navigation and abstraction with a focus on the application to graphs."]} +{"6831450|239537": ["1077-2626/06/$20.00 2006 IEEE Published by the IEEE Computer Society\nDi Battista et al. [7] suggest that, as early as the 1960s, computer scientists had already applied graph drawing techniques to assist software development."]} +{"1855498|239537": []} +{"17729142|62388549": []} +{"1849996|239537": ["2 RELATED WORK Node-link diagrams [1, 11, 15] (Figure 1(a)) are widely used and are easy to read when graphs are simple."]} +{"6613540|2593345": []} +{"6613540|4071247": []} +{"6613540|239537": []} +{"1900194|8053403": []} +{"1900194|16125167": []} +{"1900194|239537": ["Bundling goals largely follow those of early methods for simplifying graph drawings [HMM00].", "For small(er) path sets, classical graph drawing methods suf\ufb01ce [GN00,HMM00,LKS \u2217 11], as there are too few edges to create the infamous visual clutter discussed above."]} +{"9917397|239537": ["As pointed out by many authors (see, for example, [14], [15], [16]), the following goals should be taken into account in the design of a graph visualization paradigm: ."]} +{"18876779|239537": []} +{"1310402|14205872": ["We witness increased acceptance and enthusiasm in the entertainment industry and an interconnected lowering of hardware costs."]} +{"14722858|239537": []} +{"17942306|4361938": []} +{"14746298|239537": ["Thus, social network analysis is closely related to network visualization [18] and graph drawing [8], and is affected by graph readability issues."]} diff --git a/edge/graph_52156728.jsonl b/edge/graph_52156728.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3474d63f73b25e271cda29ceb5aa9555c322717c --- /dev/null +++ b/edge/graph_52156728.jsonl @@ -0,0 +1,7 @@ +{"3620111|9850103": ["The methods for how to detect non-technical loss (NTL) in power grids based on smart meter data were reviewed in [19], while the NTL challenges were discussed in [20]."]} +{"3620111|485843": ["A power outage is defined as an electricity supply failure, which may be caused by short circuits, station failure, and distribution line damage [169]."]} +{"3620111|595093": ["However, several basic issues about smart meter data should be but have not been addressed: Who owns the smart meter data? How much private information can be mined from these data? Is it possible to disguise data to protect privacy and to not influence the decision making of retailers? 2) Data Security: For data security, the works on cyber physical security (CPS) in the smart grid such as phasor measurement units (PMU) and supervisory control and data acquisition (SCADA) data attack have been widely studied [214]."]} +{"3620111|3330313": ["be divided into probabilistic, statistical, and machine learning methods [73]."]} +{"3620111|14182694": ["It can realize highly efficient parallel computation [192]."]} +{"22276720|18388986": ["Cloud-based IoT platform [106], CIM [107] and data fusion techniques [108] are valuable for effective measurement data processing and monitoring active system situations."]} +{"31479079|9932808": []} diff --git a/edge/graph_52156829.jsonl b/edge/graph_52156829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddff9039c1ec7de05b820fdba674fd62883fd995 --- /dev/null +++ b/edge/graph_52156829.jsonl @@ -0,0 +1,12 @@ +{"37517783|9361209": []} +{"1557857|18992935": []} +{"1557857|206051485": ["Goshtaby [146], and Zitov and Flusser [147]."]} +{"2697857|9932808": ["Noticing that there is measurement error in both variables, an orthogonal linear regression [9] is more appropriate than ordinary least squares regression to estimate aij and bij ."]} +{"19586782|9835525": ["A large number of studies performing such analysis of the spatiotemporal characteristics of video sequences concentrate on detecting shot transitions and grouping frames into scenes [19]\u2013[22]."]} +{"9889091|192934": []} +{"10443312|16403716": ["As outlined in [6,7], temporal video segmentation is a key step in most existing video management tools."]} +{"10941842|206051485": ["Bilinear interpolation was applied during the image transformation process because it has been found to provide the best trade-off between accuracy and computational complexity (Zitova and Flusser 2003)."]} +{"9125382|9835525": ["Shot boundaries are obtained by simple thresholding of the sum of absolute differences between normalized color histograms of consecutive frames of video [ 21 ]."]} +{"206592484|456491": []} +{"5988278|2088679": ["Histopathological microscopic images and brain MRI scans were the first two areas where deep learning has been explored in medical imaging [9].", "Convolutional neural networks (CNNs), a subcategory of deep learning methods, have proven useful in visual imagery analysis from numerous fields, including medical images [9].", "[9], exam and object classification together make up the number one task of interest in medical image analysis followed by object detection and organ segmentation (exam classification alone is the third task of interest)."]} +{"2228025|8920058": ["In such a case we get a true interpolation [9]."]} diff --git a/edge/graph_52157803.jsonl b/edge/graph_52157803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e30f61673fad54a5522720a7df38e95b0272a7e --- /dev/null +++ b/edge/graph_52157803.jsonl @@ -0,0 +1 @@ +{"15157738|54059277": ["The quality of citizen derived data can be viewed from a variety of ways [57]."]} diff --git a/edge/graph_52165461.jsonl b/edge/graph_52165461.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03cefc7ba3f0c0bccd96c768a3cefcbd6ee1e552 --- /dev/null +++ b/edge/graph_52165461.jsonl @@ -0,0 +1,12 @@ +{"16829871|3055684": []} +{"16829871|12029139": []} +{"32176831|12029139": ["2623627 many situations such as disasters, extreme environments or sensor networks embedded in human bodies for a biomedical purpose [1]."]} +{"32176831|4395259": ["In the meantime, physical-layer security issues in communications have also been brought up for the last decades [14]."]} +{"830803|12029139": ["The energy harvesting circuit (consisting of diode(s) and a passive lo wpass filter [19], [23]) is very simple and cost effective."]} +{"830803|4395259": []} +{"830803|12060835": []} +{"1843456|12060835": ["2322972 energy-deficiency and have become increasingly attractive [2]."]} +{"6992941|3504276": ["Apart from the natural energy sources such as solar and wind that is intermittent due to the environmental change, radio frequency (RF) signal has recently been exploited as a new viable source for wireless power transfer (WPT) (see [5] and references therein)."]} +{"12594936|13178381": ["To tackle this issue, state-of-art schemes have been developed ([24] and the references therein), among which the worst-case secrecy rate is commonly employed to formulate the robust secrecy rate maximization problem [8], [19], [25]\u2013[27]."]} +{"3987086|3504276": []} +{"3987086|12029139": ["Recently, a novel radiofrequency (RF) energy transfer and harvesting technique ha s been proposed as a new viable and promising solution to prolong the lifetime of energy con strained wireless networks [1]."]} diff --git a/edge/graph_52169284.jsonl b/edge/graph_52169284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43137e2d52f371016f61165ddff54f5ea5f323f9 --- /dev/null +++ b/edge/graph_52169284.jsonl @@ -0,0 +1,23 @@ +{"21689411|52169284": []} +{"67865189|1083483": ["The metrics have been discussed extensively [18], with probability and entropy as the most frequently used mathematical measures."]} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"3783069|61132": []} +{"52931680|61132": []} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"2390123|7644489": ["It is of interest to explore whether LTE module onboard UAV can be reused for sensing and detection by exploiting the LTE features such as device-to-device communication and vehicle-to-vehicle communication [14]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"2471950|10310014": ["Up until recently, PSC has been handled through narrowband communication technologies such as the land mobile radio (LMR), which can deliver reliable voice communications, but do not support broadband data [1], and are also often limited in terms of coverage and interoperability [2]."]} +{"52187231|19938676": ["F IFTH-GENERATION (5G) wireless communication systems are expected to support a 1000x increase in capacity compared to existing networks [2]."]} +{"52187231|3054454": ["(ULA) for the mMIMO-BS with equally spaced antennas and Jakes correlation model between antenna pairs [30]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"27516893|205286988": ["based, energy-aware, directed diffusion, energy-aware, and rumor routing [81]."]} +{"27516893|13348951": ["More information about L-DACS1 and L-DACS2 including their benefits with the current aeronautical system and their physical and medium access layers can be found in [54]."]} +{"61810401|1932843": ["This motivates us to design a reinforcement learning [32] based iterative algorithm, by simulating the exact content requested by an MU (action), and then observing the resultant reward or penalty."]} +{"206828353|7686677": ["from those in the existing literature on terrestrial communication systems [15], [16]."]} +{"31700283|1177069": []} diff --git a/edge/graph_52169887.jsonl b/edge/graph_52169887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c80bc877a31920c52140a9873544f4eaf2f3a62 --- /dev/null +++ b/edge/graph_52169887.jsonl @@ -0,0 +1,2 @@ +{"15744955|3348390": ["The Semantic Sensor Web (SSW) [27] is an approach in which semantic metadata is registered along with sensor data to provide context awareness [28]."]} +{"15744955|1230643": ["The authors\u2019 research group has quite a lot of experience in wireless sensor networks [3], one of the essential components of the Internet of Things (IoT) [4]."]} diff --git a/edge/graph_52170039.jsonl b/edge/graph_52170039.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52170676.jsonl b/edge/graph_52170676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79f68d2c67a9af9d369586c9e91b6b9c33f9fddb --- /dev/null +++ b/edge/graph_52170676.jsonl @@ -0,0 +1,2 @@ +{"44067466|13370607": ["Notice that services (1) to (3) when exposed via an API, as is standard, is enough to make data findable and accessible as usually defined,(19) whereas (5) is enough to make data interoperable.", "Additional services that are sometimes supported include (5) using a common data dictionary and integrating data with respect to a common data model, (6) processing the integrated data with respect to a common set of bioinformatics pipelines, and (7) exposing the integrated and harmonized data using an application programming interface (API).", "(1) authentication (AuthN) and authorization (AuthZ) services, (2) metadata validation using the NCI Thesaurus(41) and related services, (3) an extensible data model based on the GDC data model,(34) (4) APIs for containers and workflows based on the Global Alliance for Genomics and Health WES and TES standards, and (5) services to set up and access collaborative workspaces."]} +{"196639206|3900204": ["Extensive reviews of workflow systems currently in use for bioinformatics have already been published[32-35] and we are not recommending any one over the others."]} diff --git a/edge/graph_52181356.jsonl b/edge/graph_52181356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1df0dca645b50634fa9cf1549f1d1837e11f73be --- /dev/null +++ b/edge/graph_52181356.jsonl @@ -0,0 +1,39 @@ +{"14993044|207209718": []} +{"1572204|6327434": []} +{"8184681|5660618": ["A comprehensive survey of the current results in networked control systems has been carried out in [21]."]} +{"8184681|6327434": ["A lot of literature deals with failure detectors in dynamic systems (Willsky (1976)).", "Several failure-detection schemes in dynamic systems are reviewed in [11]."]} +{"19892329|6327434": ["In [2], the author provides a survey of detection schemes for the class of stochastic linear discrete time systems."]} +{"14315949|9415965": ["To deal with this attacker we can leverage image and video forensics tools [8, 17, 23, 48]."]} +{"14315949|8953108": ["There are several methods for automatic threshold selection [38] including the popular Otsu\u2019s method [27], Kapur, Sa-hoo, and Wong\u2019s Maximum Entropy method [18], and Li\u2019s Minimum Cross Entropy method [21]."]} +{"10855350|20905429": ["Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer.", "A typical MCPS architecture consists of four different layers: i) data acquisition layer, ii) data pre-processing layer,\nO. Kocabas and T. Soyata are with the Department of Electrical and Computer Engineering, University of Rochester, Rochester, NY 14627."]} +{"1990579|21386749": ["On one hand, the nature of the exchange information makes IMDs critically vulnerable to a wide range of threats that may affect the patient\u2019s life [10], [24], [25], and thus the necessity for controlling their access using authentication protocols is absolute."]} +{"1990579|485843": ["These systems include smart power grids [29] which are dynamic and interactive infrastructures that combine high speed communication and monitoring technologies with millions of power equipments to provide efficient energy management such as advanced metering [29], and demand and response capabilities [29], [30].", "For example, during the process of efficient power distribution in smart grids, an analysis of the power consumption among residential and industrial areas is performed [29].", "Though it does not affect the functionality of the infrastructure, such information can be used to determine the valuable contents of a specific property, and to even predict the timings at which it is empty and thus, vulnerable for property theft [29]."]} +{"1990579|17516538": ["The captured footage can be considered as surveillance material which can be leaked and used against the will of the individuals appearing in this footage [34]."]} +{"21694240|207209718": []} +{"11472225|7988320": ["Access to medical devices is a common problem that limits researchers\u2019 ability to validate prior results; food-grade meat as a phantom also complicates reproducibility due to its inaccurate approximation of a human body [8], [21]."]} +{"11472225|6332923": ["The system should also satisfy data origin authentication; the source of any received data should be verifiable."]} +{"8687401|6327434": ["An application of the SPRT to the health monitoring of a satellite system has been reported in [87] and [117].", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12],", "The development of the change detection problem was stimulated by Wald in 1947 when \u201cSequential Analysis\u201d was published and a Sequential Probability Ratio Test (SPRT) was introduced.", "something has gone wrong or that everything is fine, and of determining the location as well as nature of the fault [12].", "Page also pointed out that this rule is equivalent to performing a SPRT.", "Given a sequence of observations , the Sequential Probability Ratio Test (SPRT) computes the cumulative sum of the log-likelihood ratio recursively as follows:\n(36)\nwhere\n(37)\nNote that denote the conditional PDF of the observation , which depends on the parameter .", "To overcome this, a multiple-hypothesis test based on the Shiryayev SPRT is used to enhance the robustness of the FDI scheme.", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12], [25], [26].", "The SPRT has been used to develop a dynamics sensor validation system for a reusable launch vehicle [116].", "Various survey papers on the change detection methods can be found in [12], [23], [25], and [113].", "It has been shown that for a certain criterion of optimality, this generalized Shiryayev SPRT detects and isolates a change in hypothesis in the conditionally independent measurement sequence in minimum time.", "In the rest of this section, we describe the details of the following hypothesis test techniques: the SPRT, the CUMSUM algorithm, the generalized likelihood ratio test, and the local approach.", "The CUSUM algorithm is equivalent to a repeated SPRT in which the test is restarted as long as the decision is taken in\nfavor of .", "The SPRT is used with a multivariate state estimation technique as core elements of a commercial dynamics sensor validation system, which is designed to improve launch vehicle mission safety and system dependability by enabling rapid development and cost effective maintenance of embeddable real-time software to reliably detect process-critical sensor failures.", "The well-known examples of these statistical test techniques are as follows:\na) sequential probability ratio test (SPRT); b) cumulative sum (CUSUM) algorithm; c) generalized likelihood ratio test; d) local approach.", "Malladi and Speyer [114] have derived an online multiple hypothesis Shiryayev SPRT [115] by adopting a dynamic programming approach."]} +{"207229852|2357830": ["RFID protective shields and blockers [27, 15] are commonly used as countermeasure to the first form of cloning attacks discussed above."]} +{"207229852|6327434": []} +{"3587043|10198276": ["Anti-Forensic Attack: Our previous experiments in image forensics [49] and those of others [22, 36] can attempt to minimize this threat by detecting so called copy-and-paste (or copy and move) image forgery attacks [1]."]} +{"8854215|595093": []} +{"8854215|121289": []} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} +{"16509274|595093": ["Network intrusion detection systems (NIDS) are common mechanisms used for real-time monitoring and analysis of\n978-1-4799-2233-8/14 $31.00 \u00a9 2014 IEEE DOI 10.1109/DSN.2014.81\n774\nnetwork traffic."]} +{"10772555|5660618": [", robust networked control systems [21], [22], fault-tolerant control [23], and distributed estimation [24]."]} +{"10772555|3330313": ["in a given dataset is defined as the observation that appears to be inconsistent with the remainder of the dataset [32]."]} +{"3500624|2906773": []} +{"3500624|18037424": []} +{"2009224|6327434": []} +{"8834875|6327434": ["The sequential likelihood ratio test has been applied to Kalman filter innovations by Chien and Adams (1976), Willsky and Jones (1976), Bonivento and Tonielli (1984), and Uosaki (1985), and to residuals from inputoutput parity equations by Deckert et al. ( 1977).", "This is either a preset nominal value (Chien and Adams, 1976) or is obtained by maximum likelihood estimation from the innovations (Willsky and Jones, 1976)."]} +{"11668209|6327434": ["For more details on the choice of window size, please refer to [8].", "In [8], the author reviews several failure detection algorithm in dynamic systems."]} +{"17615861|206459491": []} +{"30102381|2521001": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|485843": []} +{"30102381|595093": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|5747564": ["Moreover, the advent of smart grid with extensive communication capabilities [11]\u2013[14] yield new security vulnerabilities due to a high dependency on cyber information."]} +{"30102381|121289": []} +{"23893450|2521001": ["[8] present a survey of smart grid security issues with a strong emphasis on the smart home environment and its interactions with the smart grid environment."]} +{"23893450|595093": ["[4] further suggest the cyber security requirements, vulnerabilities and solutions for Smart Grid communication networks."]} +{"23893450|18411031": ["The work in [92] has surveyed existing works for following data storage security objectives within cloud-based platform: data integrity, data confidentiality, and data availability."]} +{"19295133|207209718": []} diff --git a/edge/graph_52181997.jsonl b/edge/graph_52181997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da06946b2f968da2d1f81ea9f2aba6766da2b9da --- /dev/null +++ b/edge/graph_52181997.jsonl @@ -0,0 +1 @@ +{"21855609|52181997": []} diff --git a/edge/graph_52182050.jsonl b/edge/graph_52182050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fc74f1879dcfb3dae61a94a7fb9f007f8cbf7f0 --- /dev/null +++ b/edge/graph_52182050.jsonl @@ -0,0 +1,9 @@ +{"2427564|1188683": []} +{"2539255|4122595": ["CRs are designed to transmit dynamically in unused spectral regions without causing harmful interference to primary users (PUs) or incumbent users (IUs) [2]."]} +{"521235|1188683": ["Reconfigurable computing [4], [5] has been proposed in a large range of signal processing applications in order to improve high performance, flexibility and adaptability."]} +{"2170562|1188683": ["FPGAs are often used as powerful hardware for applications that require high-speed computation [ Compton02 ]."]} +{"14860071|3540699": ["INTRODUCTION\nhe H.264/AVC is the latest video coding standard developed by the cooperation between ITU-T and ISO/IEC standardization organizations in 2003 [1], [2]."]} +{"2840399|1188683": ["functions: As devices are migrated to more advanced technologies, the number of transistors that can be devoted to the reconfigurable logic fabric increases.", "At the same time, the power consumption targets, the acceptable packaging and manufacturing costs, and the time-to-market requirements of these computation units are all decreasing rapidly, especially in the embedded hand-held devices market."]} +{"16670128|1188683": ["Systems using such technology can save cost by time-multiplexing hardware resources and improve performance by adapting to changing execution requirements [1]."]} +{"17037074|1188683": ["runtime or dynamic reconfiguration [3], and recent research has demonstrated that there is a great deal of interest in it [4],"]} +{"6163322|1188683": ["Research efforts have shown the advantages of FPGA accelerators in a wide range of application domains [1]."]} diff --git a/edge/graph_52185213.jsonl b/edge/graph_52185213.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e02078d77bf128c8da786e74355886bf049020a6 --- /dev/null +++ b/edge/graph_52185213.jsonl @@ -0,0 +1,8 @@ +{"41590113|15222577": []} +{"10392576|16768404": []} +{"5245646|16768404": []} +{"17048722|15222577": ["The authors of [1] and [2] provide surveys of the relatively few references detailing the different methods for building Arabic subjectivity and SA systems from the years 2010-2013 and 2004-2012 respectively, at a time when research on Arabic SA was so limited."]} +{"15718491|15222577": ["That is, it could give low accuracy when is applied on such a different domain from what it was learned from [4].", "This new technology results in a massive amount of raw data for which creative data mining techniques are needed in order to extract valuable knowledge."]} +{"34119395|15222577": ["(2) Morphological complexities and dialectal varieties of the Arabic language which require advanced pre-processing and lexicon-building steps beyond what is applicable for the English language domain [7][8].", "As described in the foregoing, the relative importance of the Arabic language in global communications demands a proportional amount of interest and research for naturallanguage processing of large amounts of Arabic language text and documents to facilitate sentiment extraction for industrial use [6][7][8]."]} +{"18144663|17896770": ["SentiWordNet is a publicly available lexical resource for research purposes providing a semi-supervised form of sentiment classification [7] based on the annotation of all the synsets of WordNet according to the notions of \u201cpositivity\u201d, \u201cnegativity\u201d, and \u201cneutrality\u201d.", "Pre-Processing\nStop Word\nStemming\nPOS Tagging\nScoring\nClassification\nEvaluation\nData Acquisition\nWeb\nReviews\nFig."]} +{"12195840|15222577": ["This text can be characterized as objective, i.e. containing facts, or subjective i.e. containing opinions and/or sentiments about entities."]} diff --git a/edge/graph_52186026.jsonl b/edge/graph_52186026.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9c2a751d83b464b39d84f53ac8b3d5bf23db175 --- /dev/null +++ b/edge/graph_52186026.jsonl @@ -0,0 +1,13 @@ +{"113557076|9588126": []} +{"21225142|5660618": [", the time instant when information is sent out) [40], [41]."]} +{"30189749|16049411": ["There is a solid body of research now available for optimizing vehicle system efficiency both for conventional [12] and hybrid powertrain systems [13]."]} +{"56421235|17934515": []} +{"34894462|17934515": []} +{"13420502|8363289": []} +{"19026701|6327434": []} +{"14849693|5660618": ["Note that, although the string of vehicles is always in a leader\u2013follower configuration, different topologies may arise depending on the communication technology and its specific transmission ranges [26]."]} +{"7880448|8363289": ["Traditionally, MPC is used for a single-agent system, where the control input is obtained by numerically optimizing a finite horizon optimal control problem, where both nonlinearity and constraints can be explicitly handled [23]."]} +{"19099305|9588126": ["The spectral decomposition of symmetric matrices, as well as its variants, has been exploited in the consensus of multi-agent systems [25], [30], [31].", "the consensus of multi-agent systems [26], [30], [31], which have recently been applied to study the influence of different"]} +{"17934515|7085121": ["As an important complement to vehicular networking, wireless sensor networks (WSNs) also have been deployed along the roadside to enhance traffic safety and efficiency [41]\u2013[43]."]} +{"17934515|763939": ["Some other reviews were stated from the special aspects: such as communication protocols for green environment [24], mobility models in VANET [18], and simulators develop-"]} +{"18231244|8363289": ["A treatment of sufficient stability conditions goes beyond the scope of this work and can be found in the surveys [7, 18, 19].", "The main idea of RHC is to use the model of the plant to predict the future evolution of the system [19].", "Stability follows from the fact that J N (x) and J N (x) can be lower and upper bounded by functions \u03b1(\u2016x\u0303\u2016) and \u03b2(\u2016x\u0303\u2016), where \u03b1, \u03b2 : R \u2192 R are of class K [19].", "In this case, the terminal set has to be control invariant and the terminal cost is chosen as a control Lyapunov function [19]."]} diff --git a/edge/graph_52187456.jsonl b/edge/graph_52187456.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52193508.jsonl b/edge/graph_52193508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5219659.jsonl b/edge/graph_5219659.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52208151.jsonl b/edge/graph_52208151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52212425.jsonl b/edge/graph_52212425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56c0390edb52393250c56153232a783525186c46 --- /dev/null +++ b/edge/graph_52212425.jsonl @@ -0,0 +1,19 @@ +{"10393627|17323154": ["A recent review of this relatively large body of literature is given in [Carpineto et al. 2009]."]} +{"10931446|14586568": ["Different CNLs have strong trade-offs in expressiveness, precision, simplicity, and naturalness [14]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"52209835|11777996": ["Recent overviews of various state-of-the art methods for keyphrase extraction (Hasan & Ng, 2014; Kim, Medelyan, Kan, & Baldwin, (2013) show that the methods for identifying potential keyphrases rely mostly on text and natural language processing techniques, for example n-grams or part-of-speech\u2026"]} +{"7048624|1113420": ["Bazire and Br\u00e9zillon (2005) provides a formal specification of context, Abowd and Mynatt (2000) discusses context modeling issues and perspectives in ubiquitous systems and Baldauf et al. (2007) presents a survey on context-aware systems."]} +{"9704070|2509135": ["Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)", "spaces via cognitive radio techniques [157], e) dynamic"]} +{"9704070|12884178": ["expressive power of context representations [25], d) relay and mesh-enabled networks development with cooperative communication features in OFDMA-based wireless network technologies [126] [156] and exploitation of spectrum white", "Always-on and on-demand available wireless connectivity with scalable link bandwidth is required [100] [156] [157] Exchange & Evaluation (sections VI, VII)"]} +{"9704070|14745481": []} +{"6724742|16717715": ["One can view the context as being represented as a set of parameters that need to be instantiated before the system action can be taken (for example, Seneff and Polifroni [2000]).", "The speech recognizer in TRIPS uses the SPHINX-II system (Huang et al. 1993), which outputs a set of word hypotheses to the parser."]} +{"54344931|289357": ["Despite the approximation guarantees offered by this greedy formulation, an improved effectiveness could be attained by exploring fast exact solutions for the problem [Woeginger, 2003]."]} +{"16117366|1113420": ["The ontology-based approach has been advocated as being the most promising mainly because of its dynamicity, expressiveness, and extensibility (Strang and Linnhoff-Popien 2004; Baldauf, Dustdar, and Rosenberg 2007)."]} +{"13392386|16298606": ["Speci \u0304cally Riboni et al.(103) claimed that a deeper integration is needed and proposed an architecture for A Survey of Context-Aware Mobile Recommendations 161", "Speci\u00afcally Riboni et al.103 claimed that a deeper integration is needed and proposed an architecture for\nIn t.\nJ.", "Hence, the success of context-aware services is conditioned to the availability of e\u00aeective privacy protection mechanisms.(103) Recently, many privacy protection techniques have been speci \u0304cally developed for location-based services (LBS), which are mainly in the form of online compared to the traditional o\u00aeline privacy protection in microdata release due to the dynamic nature of spatio-temporal information.", "Riboni et al.103 provided a classi\u00afcation of these privacy protection techniques applied in the LBS \u00afeld and focused on describing available approaches and solutions on those for more complex context-aware services.", "Riboni et al.(103) provided a classi \u0304cation of these privacy protection techniques applied in the LBS \u0304eld and focused on describing available approaches and solutions on those for more complex context-aware services."]} +{"3265045|7839197": ["Similar problems are seen in the agent domain where, as Nwana [16] argues, it has yet to be conclusively demonstrated if people really benefit from such information systems."]} +{"2187403|1113420": ["Although interesting comparisons of context models already exist [5,30, 39,45], we felt the need to establish a framework to systematically evaluate them, by defining a set of relevant, objective and rather general categories.", "Interesting surveys on context-aware systems and models have already been presented in [5, 14, 39, 45]; we contribute with a review on recent evolutions and new systems for context modeling, and challenge each model with respect to the problem of context-aware data tailoring."]} +{"11986833|17323154": ["They are characterized by highly descriptive phrases as cluster labels, and are known to perform well on browsing retrieval tasks (Carpineto et al., 2009b).", "More details on AMBIENT are provided in (Carpineto et al., 2009a).", "To tackle these issues Carpineto et al. (2009b) and Carpineto and Romano (2010) introduced two new test collections, termed AMBIENT and ODP-239.", "Following Viv\u0131\u0301simo\u2019s1 \u2018description comes first\u2019 motto, in the last few years many new search results clustering algorithms optimized for usability have been proposed and several research and commercial web clustering engines have been deployed, surveyed by Carpineto et al. (2009b).", "Earlier work has compared either clustering methods e.g., (Ferragina and Gulli, 2005), (Carpineto et al., 2009a), or diversification methods, e.g., Zuccon and Azzopardi (2010), Santos et al. (2010).", "Keywords: subtopic retrieval, clustering, search results re-ranking, diversification", "Intent aware measures (Agrawal et al., 2009) generalize classical information retrieval metrics such as average precision or reciprocal rank by applying them to the single subtopics of a given query and then aggregating the results weighted by the subtopic probabilities."]} +{"25301348|2532914": ["However, evaluation remains challenging because of the main additional (regarding personalized IR evaluation) following reasons [17,61,64]: 1. environmental data should be available and several usage scenario should be speci\ufb01ed and evaluated across them; 2. evaluation, if present, concerns a\u2026"]} +{"5171829|29231240": []} +{"5171829|17323154": ["Our research on topic extraction also shares insights and motivations with proposals aimed at clustering search results [Zamir and Etzioni 1999; Ferragina and Gulli 2008; Carpineto et al. 2009; Song et al. 2014]."]} diff --git a/edge/graph_5221730.jsonl b/edge/graph_5221730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52218841.jsonl b/edge/graph_52218841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ac56a8f0a57756d68190455d9aff1b3cbc8bfd2 --- /dev/null +++ b/edge/graph_52218841.jsonl @@ -0,0 +1 @@ +{"61739751|16213681": []} diff --git a/edge/graph_52226045.jsonl b/edge/graph_52226045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11a1ec52a95c894b19ec86f44cee42b616a30ff9 --- /dev/null +++ b/edge/graph_52226045.jsonl @@ -0,0 +1,12 @@ +{"9017765|7889189": ["The Sybil attack targets[4,6] fault tolerant schemes such as distributed storage, dispersity, multipath routing and topology maintenance.", "Wormholes often convince distant nodes that they are neighbours, leading to quick exhaustion of their energy resources[7,4,6]."]} +{"7327669|1230643": ["Indeed, in traditional WSNs, the sensor nodes can be densely deployed with no need to predetermine their positions , and thus, node admission is unnecessary [2]."]} +{"15614965|1230643": ["For the attackers, this means to encounter much fewer obstacles when attacking a sensor network [21]."]} +{"16733772|1940388": ["They are often deployed in hostile environments in both military and civil applications [ 1 ]."]} +{"14289852|14745481": ["\u2026than traditional networks can be summed up as follows: a mobile wireless sensor network consists of wireless mobile nodes forming a temporary network without the help of centralized infrastructure, which makes the attacks on the network can come from all directions and target any node [3][4]."]} +{"28938947|870434": ["[1] note, the non-propulsion power (sensors, communication, electronics) is typically 30W, with propulsion power ranging from 15W to 110W.", "Fabricating a rugged pressure housing costs $3k, whereas a simple underwater connector costs $100 [1].", "Another problem is that standard acoustic transducers cannot simultaneously transmit and receive [1].", "The trend is also due to the fact that oceans, while covering the vast areas of Earth (70% of the Earth\u2019s surface with an average depth of 4km [1]), are still considered largely unexplored and insufficiently known."]} +{"23435757|1230643": ["The battery power is consumed by all the sensors activities: sensing, processing, storing and communication; however the optimization of the energy spent in the communications is one of the most important problems in energy efficiency [6], in fact, the radio consumes a significant part of the energy budget of the sensors, furthermore the major energy savings are achieved by turning off the radio, which however means disconnecting the sensors from the rest of the WSN."]} +{"14849884|1333339": ["Trust Predictions: Trust prediction is a method of predicting potentially unknown trust between nodes using the present and past behavior of nodes and also the recommendations received from other nodes [17].", "The core factor to be considered for trust propagation is cooperation in the network in transporting the trust information [17, 18].", "The chain of nodes that transmits the trust information about target node to the trust requesting node constitutes a trust path [17, 18]."]} +{"14849884|1462862": []} +{"14849884|10137283": []} +{"14849884|9240891": ["The contributions of this paper are: (1) to give a clear definition of trust in the communication and networking field, drawing upon definitions from different disciplines; (2) to extensively survey the existing trust management schemes developed for MANETs and investigate their general trends; and\u2026", "Also, confidence level is used as a weight to evaluate trust of other nodes based on a Bayesian approach."]} +{"14051552|1230643": ["Commonly, WSNs routing protocol are established based on min hops, max available power and low latency, low traffic load, multipath establishment etc [3] [4] [5].", "A balanced factor among these two (Meta data and cost function) determines the route [3].", "Real time and Energy Aware QoS Routing Protocol for Multimedia Wireless Sensor Networks (REAR) [3] considers bandwidth and energy requirements as core metrics for discovering routes."]} diff --git a/edge/graph_52226318.jsonl b/edge/graph_52226318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48000b24f0a942f880a9b6ac57853e4a5f16234a --- /dev/null +++ b/edge/graph_52226318.jsonl @@ -0,0 +1,4 @@ +{"59707360|469744": []} +{"132218967|206583375": ["A survey was performed (Liu et al. 2007; Gu et al. 2009)of systems and solutions for the indoor positioning."]} +{"63444896|14849079": ["\u201dA smart city is a system integration of technological infrastructure that relies on advanced data processing with the goals of making city governance more ef\ufb01cient, citizens happier, businesses more prosperous and the environment more sustainable\u201d (Yin et al., 2015)."]} +{"14342296|8125630": []} diff --git a/edge/graph_52229388.jsonl b/edge/graph_52229388.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad61fc8ac1b25695f60e6786340512da4eac1c8f --- /dev/null +++ b/edge/graph_52229388.jsonl @@ -0,0 +1,19 @@ +{"24167070|393948": ["The input is reconstructed from the representation c(x); therefore, the target output of the AE is its input [20], [25].", "Therefore, AEs were proposed to extract nonlinear features of the data and construct deep neural networks [25]."]} +{"5650534|16323798": ["ods are frequently reported: 1) steady state; and 2) transient analysis [13], [14].", "The load detection focuses on the recognition of load cycles and patterns in the aggregated load signature using a wide variety of methods [13] including machine learning [17], expert"]} +{"24902735|393948": ["including image processing and language recognition, in recent years [22]."]} +{"21847549|20178897": ["cept of grid, the smart grid (SG), renovates the traditional grid by integrating the latest communication technologies [3]."]} +{"21847549|121289": ["At the same time, the smart industrial utilities have the ability to efficiently manage their resources [5], [6]."]} +{"117628479|191396": []} +{"47575972|18841702": ["Although some literatures have studied power cable and transformer based on CoxPHM [14]\u2013[17], most of them still have several weaknesses as follows."]} +{"67291731|485843": ["To carry out data dependent tasks (e.g., DSM, DLC and SP), a huge amount of (smart grid) data need to be collected in real-time and analyzed at multiple spatiotemporal levels (or hierarchies ) [8], [9], [10]."]} +{"67291731|5747564": ["As information gathering is a challenging task because it involves data collection from heterogeneous devices at different locations; therefore, a number of communication architectures have been proposed, which can be found in some recent surveys [27]."]} +{"2003802|36784649": ["This particular scenario covers several interesting real-world situations [13, 15, 18, 22, 24, 33, 44].", "Khan and Madden [24] provided a recent survey on the subject of one-class classification."]} +{"16894314|10213552": ["To achieve big data streaming in smart grid, Spark Streaming, Storm, Flink frameworks can be used in this ecosystem [19]."]} +{"16894314|30134048": ["The 5V\u2019s model (Volume, Velocity, Variety, Veracity, and Value) is generally used to describe big data and its challenges [10, 11] as shown in Figure 4."]} +{"3440255|2992477": ["Conversely, it is known that data mining techniques [1] are"]} +{"3440255|5246835": []} +{"5340748|485843": []} +{"57362815|393948": ["A varying number of layers can provide a different level of abstraction to improve the learning ability and task performance [1]."]} +{"14922643|4631990": ["A brief summary and overview on building automation and smart homes are presented in [17]."]} +{"114197479|14258620": ["An alternative way is distributed computation and it has been applied in many \ufb01 elds such as Geo, climate and environment analysis, Human Genome Project, Dark Energy Survey (DES) project etc. [96]."]} +{"114197479|12161567": ["Statistical Relational Learning (SRL) Knowledge Graphs [112,113]"]} diff --git a/edge/graph_522297.jsonl b/edge/graph_522297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52230889.jsonl b/edge/graph_52230889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1039b2f3973cb24017cbe236beefd3cb488e6385 --- /dev/null +++ b/edge/graph_52230889.jsonl @@ -0,0 +1,2 @@ +{"55985311|2186746": []} +{"43599417|17858209": []} diff --git a/edge/graph_52236994.jsonl b/edge/graph_52236994.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52243686.jsonl b/edge/graph_52243686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2186f845ff18cd20f20ea174e625af5f5d21a82b --- /dev/null +++ b/edge/graph_52243686.jsonl @@ -0,0 +1,21 @@ +{"247457|393948": []} +{"4960282|17485266": ["AdaGrad, on the other hand, adapts the learning rate to the parameters, which means it performs larger updates for infrequent and smaller updates for frequent parameters [40]."]} +{"22040860|1902238": []} +{"52012855|393948": []} +{"207614217|6863252": ["Noticeably, it is very difficult to learn meaningful features given such inaccurate correspondences derived from imperfect image registration, as suffered by many supervised learning methods (79, 80, 81)."]} +{"18121764|8604408": ["Bayesian networks [38], [39] are a particular case of network"]} +{"23668684|9928823": ["By combining the generative and discriminative deep architectures, a hybrid model may be constructed, particularly to carry out discrimination tasks, which are aided by the optimized outputs obtained from the generative architecture [20].", "Other deep learning architectures also exist in [20]."]} +{"23668684|7851743": ["Also, in future wireless networks, self-organization has been identi\ufb01ed as a critical issue by a number of researchers [250]."]} +{"23668684|393948": ["This idea of knowledge sharing was demonstrated in [27].", "The state-of-the-art deep learning algorithms, on the other hand, still hinge upon multi-layer architectures according to the work conducted by Bengio et al. [27]."]} +{"23668684|13172512": ["to the networking community [163]\u2013[171]."]} +{"2088679|393948": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"206685945|6078908": []} +{"206592484|456491": []} +{"4108581|8507227": ["A survey of studies on ML in computer-aided diagnosis has been reported [8], and a collection of studies on ML in computer-aided diagnosis and medical image analysis can be found in books [6, 20]."]} diff --git a/edge/graph_52248423.jsonl b/edge/graph_52248423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d927fbc02a57e8d6040ce0a477064c8cf94ab40e --- /dev/null +++ b/edge/graph_52248423.jsonl @@ -0,0 +1,5 @@ +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"5731070|16209841": []} diff --git a/edge/graph_52252043.jsonl b/edge/graph_52252043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e62cc4bd7411a41e8d837e03e5a0b6e031b0f82c --- /dev/null +++ b/edge/graph_52252043.jsonl @@ -0,0 +1,2 @@ +{"52831165|52252043": ["For the matrix approach, the routine by Garrappa is used (https://www.dm.uniba.it/Members/ garrappa/ml matrix), while for PI rules, we follow the codes as described in [21].", "Indeed, as a result of the possibility of rewriting any linear FDE as a weakly singular Volterra integral equation of second-type, a generalization of PI rules has been applied to FDEs [12,19,21,34\u201336].", "We brie\ufb02y recall here the main features of these methods, while we refer to the related references listed in the introduction and to [21] for a complete treatise on their use for the numerical solution of MTFDEs."]} +{"3425770|42994372": ["For instance, the PI and FLMM generalizations of the implicit Euler 24 method behave in a different way when applied to problems with discon25 tinuous right\u2013hand side [10, 11, 12] and only the method devised in the 26 framework of FLMMs succeeds in stabilizing the solution on the switch27 ing surface, as expected from theoretical considerations, without generating 28 unwanted spurious oscillations [24]."]} diff --git a/edge/graph_52260417.jsonl b/edge/graph_52260417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52260786.jsonl b/edge/graph_52260786.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52268304.jsonl b/edge/graph_52268304.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94711d82a21023a186b78025ee380caee2b8e335 --- /dev/null +++ b/edge/graph_52268304.jsonl @@ -0,0 +1 @@ +{"19565078|1099309": ["The extraction process of EHD consists of the following stages.", "These normalized and quantized bins constitute the EHD.", "The similarity measure between images is defined as\nsim(q, C)= \u221a \u2211\nt\u2208{H,S,V }\n( \u03bc\u2032qt \u2212 \u03bc\u2032Ct )2+ \u2211 t\u2208{H,S,V } ( \u03c3\u2032qt \u2212 \u03c3\u2032Ct )2\n+ H(BMq, BMC) 3 \u00d7 m + |Eq \u2212 EC | + |EHDq \u2212 EHDC |\n5 \u00d7 80 (10)\nwhere \u03bc \u2032I t and \u03c3 \u2032I t represent the normalized mean value and standard deviation of the image I in t color space, respectively.", "We adopt the edge histogram descriptor (EHD) [27] to describe edge distribution with a histogram based on local edge distribution in an image.", "BM I means the image bitmap feature of the image I; meanwhile, EI and EHDI represent the entropy and the EHD of the image I , respectively."]} diff --git a/edge/graph_52273437.jsonl b/edge/graph_52273437.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e91353a2e463a1996d9fe7f802d87d868e5353a --- /dev/null +++ b/edge/graph_52273437.jsonl @@ -0,0 +1,2 @@ +{"10393627|17323154": ["A recent review of this relatively large body of literature is given in [Carpineto et al. 2009]."]} +{"18508050|9180844": []} diff --git a/edge/graph_52275230.jsonl b/edge/graph_52275230.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5446ede30af8f1e0ead8c3044a312933c9a3b982 --- /dev/null +++ b/edge/graph_52275230.jsonl @@ -0,0 +1,14 @@ +{"12843243|8914588": []} +{"14386199|16449507": ["An OPM provenance graph is a record of a particular execution, depicting the processes that actually occurred to generate a given data product [16]."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} +{"19792368|16449507": ["Provenance graph transformation\nRequire: g: OPM graph to access. removedNodes: set of nodes to be removed Ensure: g\u2032: graph equivalent to g in which all minimal subgraphs associated to the nodes in removedNodes have been transformed.", "This vision being outside the capabilities of simple text logs, a series of Provenance Challenges investigated the suitability of different approaches, in the process giving rise to the Open Provenance Model (OPM) [3], currently being reworked into PROV, a W3C standard.", "Access policy evaluation\nRequire: g: OPM graph to access. targets: Applicable targets filtered by user and validity."]} +{"7545215|14171067": ["In the literature, there are several well-known algorithms for computing the edit distance for different types of entities, for example strings, ordered and unordered trees [6] and graphs [15]."]} +{"8085527|60455": ["As a general data structure, graphs have become increasingly important in modeling sophisticated structures and their interactions, with broad applications including chemical informatics, bioinformatics, computer vision, video indexing, text retrieval, and Web analysis.", "and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "Web usage mining is focused on the analysis of users\u2019 activities when they browse and navigate through the Web.", "Web content mining is a knowledge discovery task of \ufb01nding information within web pages, while web structure mining aims to discover knowledge hidden in the structures linking web pages.", "Web mining is the application of data mining techniques to discover patterns and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "There are many applications involving sequence data, such as customer shopping sequences, Web clickstreams, and biological sequences.", "Web access patterns via association rule mining in web logs were proposed by (Chen et al. 1996; Pei et al. 2000; Srivastava et al. 2000; Punin and Krishnamoorthy 2001)."]} +{"13880862|16449507": []} +{"7219632|16449507": []} +{"3335703|16449507": []} +{"1615788|14553382": []} +{"9298269|1895753": ["asp?model=83319, and consists of the implementation of a number of benchmark neuronal network models in several different simulators, associated with a review article on spiking neuronal network simulators [2]."]} +{"10799183|16449507": ["Provenance is registered on-the-\ufb02y in an OPM-compliant RDF repository (Open Provenance Model [45]) tracking simulation component invocations, and the related consumed and produced data.", "Provenance is registered on-the-fly in an OPM-compliant RDF repository (Open Provenance Model [45]) tracking sim-"]} +{"1746329|16449507": ["[23] L. Moreau et al. The Open Provenance Model: An overview.", "In contrast, if one were to use traditional coarse-grained provenance [23], each sale would depend on 100% of the state tuples (20,000 tuples in this example) and on all user inputs (10,000 in our experiment).", "We also mention in this context the work of [21] that shows how to map provenance for NRC queries to the Open Provenance Model (although it does not consider workflow provenance per-se; their input is simply an NRC query).", "Mapping the NRC dataflow model to the Open Provenance Model.", "the standard one for workflows [23], but enriched with some dedicated structures that will be useful in the sequel.", "These systems keep coarse-grained representation of the provenance, and many conform to OPM [23].", "Third, since fine-grained workflow provenance yields a much richer graph model than the standard used for workflows (the Open Provenance Model [23]) or what is used for databases in [16], a richer set of queries can be asked."]} +{"20900219|3102110": ["On the other hand, Knowledge Discovery in Databases (KDD) is a process that encompasses a mining step to learn models from data [7]."]} diff --git a/edge/graph_52278595.jsonl b/edge/graph_52278595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52278845.jsonl b/edge/graph_52278845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30a3f91d980820dca7327b94bce88c332c6125ad --- /dev/null +++ b/edge/graph_52278845.jsonl @@ -0,0 +1,18 @@ +{"2473564|17221751": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12].", "For a more processing oriented review of the literature the reader is mainly referred to [10], [12]."]} +{"2473564|16010181": ["This work introduces them briefly, referring the reader to more specific surveys for each topic [176], [180], [181]."]} +{"2473564|1482463": ["For RGB images , Viola&Jones [60] still is one of the most used algorithms [10], [61], [177]."]} +{"2473564|2301292": ["In the last years excellent surveys on automatic facial expression analysis have been published [9], [10], [11], [12]."]} +{"2473564|2355696": []} +{"2473564|14303607": ["FE recognition techniques are grouped into categorical and continuous depending on the target expressions [184]."]} +{"7565574|6028805": ["Because of the success of Infra-Red images in other facial analysis problems [1,2,20], its applicability to FER is now gaining interest as we will explain next.", "[20] provide a comprehensive and recent review of various facial analysis techniques."]} +{"49186584|2473564": ["A comprehensive review of expression recognition from visible images can be found in [9]\u2013[11].", "Facial expression recognition in the thermal spectrum has received relatively little attention compared to facial expression recognition in the visible spectrum [11]."]} +{"49186584|2301292": ["A comprehensive review of expression recognition from visible images can be found in [9]\u2013[11]."]} +{"10572365|2113024": ["Surveys of pedestrian detection research are presented in [27], [36]."]} +{"16766282|9045232": ["Face detection and pose estimation has been a very active research field in computer vision, and a comprehensive number of methods have been developed [17]."]} +{"207032796|20905429": []} +{"24986224|8497912": ["However, during the monitoring of the vital signs of a human being or an animal using a Doppler radar, any slight movement of the body produces large-magnitude artifacts that overwhelm the vital sign signals [4], [5]."]} +{"13698894|1722293": ["Using a BCG approach, we hypothesize that a vehicle seat sensor can detect RR and HR, offering a non-invasive approach to monitor occupants after a crash and to better predict injury severity.", "The mechanical aspects of heart activity through blood movement can be measured through a technique referred to as ballistocardiography (BCG) [7,8].", "As shown in a previous study, an engaged engine and/or driving may lead to a low signal to noise ratio in a BCG signal from a seat sensor [6].", "Approaches using electromechanical film sensors and accelerometers have been tested for displacement and acceleration derived BCG, respectively, in moving systems such as a wheelchair [9].", "Wearable BCG systems have also been explored and may benefit from a multi-sensor system to separate useful information from the noise of normal ambulation [12].", "For example, weight may shift between the feet, arms, back, and behind while sitting, which would affect the BCG signal.", "However, adaptive cancellation of vibrations may help improve BCG signals [10]."]} +{"10526833|28609200": ["[20] Showed that blood circulation is related to the heart (cardio) and the network of arteries and veins (vascular)."]} +{"3569386|28609200": []} +{"5881466|7360895": ["As number of manufacturers who perform \u201cuser satisfaction tests\u201d for satisfaction assessment and product quality audits is reportedly increasing, manufacturing sector is anticipated to greatly benefit from the\navailability of real-time AFEC and AAR systems."]} +{"10126030|191396": ["A modified version of the k-means clustering algorithm [35] is then performed to identify clusters of feature vectors."]} diff --git a/edge/graph_52285522.jsonl b/edge/graph_52285522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c55221d7da4a8930801f15ff97d709c6402b5289 --- /dev/null +++ b/edge/graph_52285522.jsonl @@ -0,0 +1 @@ +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} diff --git a/edge/graph_52285536.jsonl b/edge/graph_52285536.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f8852516da12f5df10ec369bb5c43fbcad613dc --- /dev/null +++ b/edge/graph_52285536.jsonl @@ -0,0 +1,15 @@ +{"16095941|3540699": ["264 [39] apply motion estimation to predict the current video frame, and the difference frame between the original and its prediction is encoded with an image codec, which has the a similar structure to JPEG, JPEG XR, or PTC."]} +{"4668902|15411200": ["Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015].", "Conventional error-correction mechanisms such as redundant execution and use of ECC incur high overhead [Mittal and Vetter 2015]."]} +{"4668902|16780247": ["Different memory technologies have different limitations, for example, SRAM and (e)DRAM consume high leakage and refresh power, respectively, and NVMs have high write energy/latency and low write endurance [Vetter and Mittal 2015; Mittal et al. 2015].", "\u20262012a, 2012b; Liu et al. 2012; McAfee and Olukotun 2015; Misailovic et al. 2014; Moreau et al. 2015; Ringenburg et al. 2014; Sampson et al. 2011, 2015; Shi et al. 2015; Shoushtari et al. 2015; Vassiliadis et al. 2015; Yazdanbakhsh et al. 2015a, 2015b] Use of OpenMP-style pragma [Rahimi et al.\u2026", "Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015].", "\u2026[Grigorian et al. 2015; Grigorian and Reinman 2014; Hegde and Shanbhag 1999; Khudia et al. 2015; Mahajan et al. 2015; Ringenburg et al. 2014, 2015; Roy et al. 2014; Samadi and Mahlke 2014; Yeh et al. 2007; Zhang et al. 2014] Annotating [Amant et al. 2014; Ansel et al. 2011; Carbin et al.\u2026"]} +{"4668902|978927": ["In fact, the electricity consumption of just the US data centers is expected to increase from 61 billion kWh (kilowatt hour) in 2006 [Mittal 2014a] and 91 billion kWh in 2013 to 140 billion kWh in 2020 [NRDC 2013]."]} +{"4668902|13037420": ["In fact, the electricity consumption of just the US data centers is expected to increase from 61 billion kWh (kilowatt hour) in 2006 [Mittal 2014a] and 91 billion kWh in 2013 to 140 billion kWh in 2020 [NRDC 2013].", "For example, by intelligently reducing the eDRAM/DRAM refresh rate or SRAM supply voltage, the energy consumed in storage and memory access can be reduced with minor loss in precision [Mittal 2012, 2014b]."]} +{"4668902|12904520": ["For example, by intelligently reducing the eDRAM/DRAM refresh rate or SRAM supply voltage, the energy consumed in storage and memory access can be reduced with minor loss in precision [Mittal 2012, 2014b]."]} +{"4668902|14583671": ["Different memory technologies have different limitations, for example, SRAM and (e)DRAM consume high leakage and refresh power, respectively, and NVMs have high write energy/latency and low write endurance [Vetter and Mittal 2015; Mittal et al. 2015].", "Voltage scaling reduces energy consumption of circuits at the cost of possible errors [Mittal 2015; Mittal and Vetter 2015]."]} +{"13772057|4668902": ["published reviews on AC techniques [23], [24], [25], the main contribution of this work is the review of these approaches from the fault tolerant perspective.", "The AC paradigm aims to increase the efficiency of a computer system at the expense of accuracy in the results [23]."]} +{"2723173|393948": ["Depth is a fundamental aspect of representation learning, since it encourages the re-use of features, and leads to more abstract and invariant representations at higher layers (Bengio et al., 2013)."]} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"15218120|15261053": []} +{"9916170|8589228": ["Probabilistic model checking is an automatic procedure for establishing whether a desired property holds in a probabilistic system (see Legay and Delahaye_s survey [32])."]} +{"19207383|4668902": ["\u2026have been demonstrated for error resilient applications such as multimedia digital signal processing, search engines and scientific computing [13, 27]. major approximation techniques include loop/code perforation [5, 11], pattern reduction [21], thread fusion [22], approximate memoiza-tion\u2026"]} +{"6279653|1666690": []} +{"7530474|4668902": ["there are known trade-offs between error rates and result quality [3]."]} diff --git a/edge/graph_52289413.jsonl b/edge/graph_52289413.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17ffcb9d2070333a5d4f84b569014cc20feb764e --- /dev/null +++ b/edge/graph_52289413.jsonl @@ -0,0 +1 @@ +{"9839798|13407049": []} diff --git a/edge/graph_52293503.jsonl b/edge/graph_52293503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..659c150c0506858da22bf1a6ea3986e0d36cb6d1 --- /dev/null +++ b/edge/graph_52293503.jsonl @@ -0,0 +1,5 @@ +{"15271080|9025758": ["Although other biclustering approaches seize contributions from these previous works [34,35], we do not refer to them as PM-based appproaches if the core mining task does not rely on FIM.", "If we want to find constant values across rows or on both dimensions, we usually benefit from using searches over horizontal data formats [35]."]} +{"12023687|1259855": []} +{"59960553|191396": ["in [57].", "Clustering is a method to classify the objects into different groups, so that the objects in each group share some common traits [15,31,57].", "For K biclusters, Dhillon [17] used k-means algorithm [31, 57] after obtaining the indicator vector y, and another direct approach is from [23] by defining an indicator matrix."]} +{"15086079|18896106": []} +{"15086079|9025758": []} diff --git a/graph_5229503.jsonl b/edge/graph_5229503.jsonl similarity index 100% rename from graph_5229503.jsonl rename to edge/graph_5229503.jsonl diff --git a/edge/graph_52296938.jsonl b/edge/graph_52296938.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..539570b491aaebd5132abaf7377d43fbeeeacf49 --- /dev/null +++ b/edge/graph_52296938.jsonl @@ -0,0 +1,12 @@ +{"37429193|14749415": ["The purpose of serious games is twofold: (i) to entertain, and (ii) to have an educational impact [5]."]} +{"20191476|1099309": ["The sensorial metadata is represented using well known standards like MPEG-V [19] and MPEG-7 [71].", "It includes a Sending Buffer, a Packet Scheduler, an Encoder (such as an MPEG-7 encoder for instance) and a Packet Delivery component on the Server side and a counterpart Decoder (e.g. MPEG-7) and Content Presentation unit at the Client side.", "In terms of content, whilst the debate around mulsemedia storage is still ongoing, there seems to be agreement in the literature that, as regards (meta-) description, the two standards that should be employed are MPEG-V and/or MPEG-7.", "The sensorial metadata is represented using well-known standards like MPEG-V [19] and MPEG-7 [69].", "For this delivery, typically the mulsemedia packets are created using the mulsemedia data packet header and then they are encapsulated into an existing codec (e.g. MPEG-7).", "49, 50, 51, 66, 68] [37, 43, 69, 51, 55, 57] [36, 40, 41, 44, 45, 46, 47, 48, 49,"]} +{"21889608|11960624": ["Augmented reality \u2014 that is, superposition of visualizations on the real environment \u2014 is a very popular technology in medicine for enhancing pre-and intraoperative procedures (Sielhorst, Feuerstein, & Navab, 2008)."]} +{"16752994|9318802": ["\u2026models for speech, audio, image, graphics, and video; interested readers can refer to \nthe recent surveys in such modeling and applica\u00adtions (e.g., [Campbell et al. 2009; Lin and Kuo 2011; \nM \u00a8 oller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010]).", "Since the emphasis of this article is on mulsemedia, we will not discuss in detail \nperception-based models for speech, audio, image, graphics, and video; interested readers can refer to \nthe recent surveys in such modeling and applica\u00adtions (e.g., [Campbell et al. 2009; Lin and Kuo 2011; \nM \u00a8 oller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010]).", ", [Campbell et al. 2009; Lin and Kuo 2011; M\u00f6ller et al. 2011; Reinhard et al. 2013; Richard et al. 2013; Wu et al. 2013; You et al. 2010])."]} +{"11415824|17516538": ["Some specific algorithms are dedicated to the detection of specific features such as faces [40] or motion [41]."]} +{"11415824|13365762": ["This format respects the MPEG-7 standard, which yields standardized tools to structure and organize descriptions of multimedia content [48].", "The MPEG-7 standard focuses on the description of multimedia content and can contain a description of movement within a scene [48], opening many possibilities for the generation of haptic effects."]} +{"11415824|11266709": ["reports (see [69] for a survey on \u201cpresence\u201d)."]} +{"29005198|19938676": ["In a nutshell, 5G wireless access will consist of an evolution of LTE complemented with new radio technologies and architecture designs [10]."]} +{"29005198|2623404": ["The recent trends of network function virtualization (NFV) (providing abstraction [31]) and software defined networking (SDN) (providing flexibility [32]) are critical in shaping such an envisioned architecture."]} +{"9122404|2623404": ["Interested readers are referred to [12], [13] and the refere nc s therein."]} +{"9122404|7971188": ["From a networking perspective, CMuHC will inevitably require the formation of a peer-to-peer overlay in order to orchestrate the participation of multiple users in additio n the facilitation of a number of other necessary functions perta ining to the tasks of overlay maintenance and operation [9]."]} +{"17048461|1099309": []} diff --git a/edge/graph_52299058.jsonl b/edge/graph_52299058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea6fb20ab22ef71d2b6dc211beab3e7999e6f8b5 --- /dev/null +++ b/edge/graph_52299058.jsonl @@ -0,0 +1,2 @@ +{"9752801|13367219": ["To extend the algorithm to cover different polarizations, a polarimetric matrix needs to be applied to the power term as in [18], and all the formulations of the KPD algorithm need to be extended to incorporate this matrix.", "Over the past 20 years, the clustering of MPCs have been widely observed in many environments [15]\u2013[17] and cluster based channel modeling has been widely adopted in many channel models, such as COST 259 [18], COST 2100 [10], 3GPP Spatial Channel Model [19], and WINNER [20] ."]} +{"9752801|191396": ["Even though clustering analysis is a hot research topic in the \ufb01eld of machine learning [22], considerable effort has to be made to adapt the results to clustering of MPCs in wireless channels.", "The Calinski-Harabasz and Davies-Bouldin indices [22] are used to determine the optimal cluster number."]} diff --git a/edge/graph_52301066.jsonl b/edge/graph_52301066.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..129936e5bdcb4c2378217cfe95be29a189820365 --- /dev/null +++ b/edge/graph_52301066.jsonl @@ -0,0 +1,12 @@ +{"13556461|5605271": ["Since smart energy data are characterized by volume, velocity, variety, and value, which are the key elements of big data, the concept of energy big data is introduced [5].", "[5] first gave a comprehensive overview on energy big data covering energy big data\u2019s infrastructure, applications, algorithms, and security analysis."]} +{"123578024|26257441": ["Approaches such as linear response surfaces using design of experiments, krieging, multivariate adaptive regression splines, and other more advanced interpolation approaches offer approximations to generate a surrogate model of the system response in terms of the design variables ( Simpson et al. , 2001"]} +{"6758639|978927": ["Mittal et al. presented a survey on GPU energy efficiency [43].", "[48], Mittal [49] Data center power management 2014 Gu et al.", "Mittal\u2019s survey on techniques for improving energy efficiency in embedded computing systems [42] is in the same line as Venkatachalam et al. work.", "Another similar survey on power management techniques for data centers was presented by Mittal [49]."]} +{"6758639|165863": ["presented a survey on GPU energy efficiency [43].", "[43] GPU Energy Efficiency 2014 Hammadi et al."]} +{"6758639|193574": ["[41] Energy efficiency of computing and network resources 2014 Mittal [42] Energy efficiency in embedded computing systems 2014 Mittal et al.", "Another metric used in data center energy efficiency measurement is Data Center Infrastructure Efficiency (DCiE) which is expressed as follows [41][305],", "[41] surveyed techniques to improve the energy efficiency of computing and network resources, but did not focus on modeling and prediction."]} +{"6758639|15136738": []} +{"111594046|10658846": []} +{"4774976|10658846": ["Dynamic power management (DPM), de\ufb01ned as the selective shut-off or slow-down of system components that are idle or underutilized, has proven to be an effective technique for reducing power dissipation at system level [9].", "The design of such DPM policies has been an active research area, while a variety of adaptive power management techniques including machine learning have been applied [9\u201311]."]} +{"27600918|29060869": ["grid pricing scheme [141]."]} +{"27600918|16515612": ["One needs to characterize and predict the workload based on the history from data measurement [74]."]} +{"4661141|5605271": ["The key device to compromise EI is an energy router (ER) [7]."]} +{"12337968|10837932": []} diff --git a/edge/graph_52301814.jsonl b/edge/graph_52301814.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f44757165a69186f783a8ca0d4a90db52faddda --- /dev/null +++ b/edge/graph_52301814.jsonl @@ -0,0 +1 @@ +{"5672134|15790998": []} diff --git a/edge/graph_52303398.jsonl b/edge/graph_52303398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52304629.jsonl b/edge/graph_52304629.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa0c4f2629366b74c2a8e68dfd0d7e7e857768bb --- /dev/null +++ b/edge/graph_52304629.jsonl @@ -0,0 +1,18 @@ +{"24446711|10559330": ["This includes Differentiated Services (Token Bucket), Integrated Service with RSVP (Flow Spec, Traffic Spec and Reservation Spec) and the Multiprotocol Label Switching (FEC, Label, LSP, LSR).", "This is implemented by using Quality of Service (QoS) solutions such as DiffServ (Differentiated Services) [3], IntServ (Integrated Services) [4] in conjunction with RSVP (Resource Reservation Protocol) [5] and MPLS (Multiprotocol Label Switching) [6]."]} +{"15016885|3348390": ["Watson and Sasse [8] presented the importance of context-awareness in the IoT and introduced QoC as a quality metric.", "and Sasse [8] presented the importance of context-awareness in the IoT and introduced QoC as a quality metric.", "Note that the metaphysical metrics in the information layer can also be interpreted as the QoC and QoI proposed in previous studies [8], [10].", "[8], acquiring context information from sensor data is a key in IoT applications."]} +{"2654767|15170341": ["no-reference video quality measurement methods, we refer to [30]\u2013[37]."]} +{"38395734|10559330": ["The first one is the Integrated Service model (IntServ) described in [3] and the second one is the Differentiated Service model (DiffServ) described in [4]."]} +{"399542|10559330": ["Different mechanisms and solutions can be used to form the QoS at the Network Layer, such as, Differentiated Services (DiffServ) [5], Integrated Services [6] and Multi-Protocol Label Switching (MPLS) [7]."]} +{"566971|16748080": ["The resulting distorted videos usually exhibit the following typical visual distortions [35]: \u2022 Blocking effect ."]} +{"566971|15170341": ["For example, [32], [69] mainly follow the psychophysical/engineering approach classi\ufb01cation method; [31], [70]\u2013[72] mainly adopt the reference-based clas-si\ufb01cation method, and [47] adopts a combination of the two.", "2) Psychophysical Approach: Objective quality models of the psychophysical approach are based on the features of the HVS, which is related to visual perception, for instance, contrast sensitivity, frequency selectivity, spatial and temporal features, masking effects, and color perception [72]."]} +{"566971|10099297": ["[ 11] and [12] consider both network and application QoS support."]} +{"566971|12130888": ["A survey of user behavior in P2P video system is recently given by [154]."]} +{"7961546|10559330": []} +{"25575499|5122855": ["[11] summarized the ongoing research topics on QoE-aware HTTP Adaptive Streaming (HAS) where they con-"]} +{"25575499|2261490": ["Barakovi\u0107 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors.", "Barakovic\u0301 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors."]} +{"25575499|64404": [", I, P and B frames [53]) on QoE were studied in [54] with different video contents."]} +{"32048841|14889616": []} +{"32048841|10559330": []} +{"32048841|6265393": []} +{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]} +{"31851714|15170341": []} diff --git a/edge/graph_52305483.jsonl b/edge/graph_52305483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81b2367ea97a5485baa67561fe33ced3e4d0f29f --- /dev/null +++ b/edge/graph_52305483.jsonl @@ -0,0 +1,18 @@ +{"1033682|174797842": []} +{"49322589|2088679": ["Acquiring a large annotated medical imaging dataset can be rather challenging for classi\ufb01cation problems (e.g. discriminating healthy and diseased subjects), as one training example then corresponds to one subject [2]."]} +{"49878576|6863252": ["Its main application is fusion of the information acquired by the different modalities to facilitate diagnosis and treatment planning [1].", "Deformable Image Registration (DIR) is a challenging task and active field of research in medical image analysis [1]."]} +{"3686035|2088679": []} +{"5022170|4097106": ["Variational Auto-Encoder (VAE) model [7] and models related to it, such as Adversarial Auto-Encoders (AAE) [8] have been successfully used for approximating high-dimensional data distributions of images and outlier detection [9].", "Both encoded latent representation, assuming outliers lie separate from normal data samples, and the reconstruction are studied for outlier detection [9] in different computer vision tasks.", "Both GAN-based and VAE-based methods have been applied to abnormality detection, see [9] for a recent review."]} +{"3847983|20404279": ["Also, there is a recent review paper on GAN [15] which reviews several GAN architectures and training techniques, and introduces some applications of GAN."]} +{"3847983|4875951": ["This problem is related to style transfer [68] [69], which takes a content image and a style image and output an image with the content of the content image and the style of the style image."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"20025294|5835640": ["The most common approach is to use regression analysis or machine learning tools to generate population average maps, which highlights features that are salient across the population [3, 32, 61, 16, 39, 45, 14]."]} +{"3668673|8575576": ["In fact, texture features such as grayscale co-occurrence matrices, local binary patterns, wavelet transforms, among others, have been widely adopted in histopathology image analysis [18], [19].", "Among the most popular ones, color deconvolution [18] decomposes an RGB image into its staining components by estimating a \u201cstaining matrix\u201d that represents the RGB colors of each stain present in the tissue image."]} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"17427022|18353243": ["Approaches for anomaly detection exist in various domains, ranging from video analysis [1] to remote sensing [2]."]} +{"4535622|8575576": ["H ISTOPATHOLOGY images are considered to be the gold standard in the diagnosis of many diseases [1]."]} +{"4713447|17172098": ["The signi\ufb01cance of automated image analysis and recognition for identi\ufb01cation of melanoma has been highlighted in recent publications [23, 57, 40, 3]."]} +{"3662996|2088679": []} +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} +{"2088679|393948": []} diff --git a/edge/graph_52307944.jsonl b/edge/graph_52307944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ecb415b7101cc62834b826e72a76ba0a9a5304e7 --- /dev/null +++ b/edge/graph_52307944.jsonl @@ -0,0 +1,3 @@ +{"2097814|207743293": ["To address these problems, numerous approaches have been designed to study and mitigate the effects of misinformation spread (see Zubiaga et al. [2])."]} +{"2097814|12161567": ["How can we automatically assess the truthfulness of a triple, given prior knowledge in a KG? We find some related problems and approaches in the literature [5].", "Other approaches have been proposed too, such as those designed for learning from multi-relational data (e.g., RESCAL [9], TransE [10] and their extensions), or those performing link prediction in social and collaboration networks [11].", "On the other, there are statistical learning models (e.g., RESCAL [24], TransE [10], TransH [25], TransR [26], and ProjE [27]) that create vector embeddings for entities and relations, which can be used to assign similarity scores.", ", RESCAL [5], TransE [6]), which can be hard to interpret and suffer from scalability."]} +{"2097814|207372751": ["Link prediction algorithms can also be applied to fact checking [10]\u2013[12]."]} diff --git a/graph_5231296.jsonl b/edge/graph_5231296.jsonl similarity index 100% rename from graph_5231296.jsonl rename to edge/graph_5231296.jsonl diff --git a/edge/graph_52336302.jsonl b/edge/graph_52336302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a02880353d8538124fab07f28d6cf0d29321a05 --- /dev/null +++ b/edge/graph_52336302.jsonl @@ -0,0 +1,3 @@ +{"1381744|8125630": []} +{"14106275|14545307": []} +{"20651182|18037424": []} diff --git a/graph_523675.jsonl b/edge/graph_523675.jsonl similarity index 100% rename from graph_523675.jsonl rename to edge/graph_523675.jsonl diff --git a/graph_5238287.jsonl b/edge/graph_5238287.jsonl similarity index 100% rename from graph_5238287.jsonl rename to edge/graph_5238287.jsonl diff --git a/graph_5238559.jsonl b/edge/graph_5238559.jsonl similarity index 100% rename from graph_5238559.jsonl rename to edge/graph_5238559.jsonl diff --git a/graph_5243419.jsonl b/edge/graph_5243419.jsonl similarity index 100% rename from graph_5243419.jsonl rename to edge/graph_5243419.jsonl diff --git a/edge/graph_5244140.jsonl b/edge/graph_5244140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5246835.jsonl b/edge/graph_5246835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52490343.jsonl b/edge/graph_52490343.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f04c0ead239a125eec076b24e50bfef1038ebcab --- /dev/null +++ b/edge/graph_52490343.jsonl @@ -0,0 +1,6 @@ +{"769632|7097444": ["FPGAs are being investigated for a variety of applications in the cloud and datacenter as they can speed up the execution of a range of common cloud workloads by up to 32x with 9x to 36x better energy efficiency [19]."]} +{"769632|3330313": ["\u2022 Outlier Detector (Outl), a common kernel in machine learning applications [16], counts the number of outliers"]} +{"17643953|1188683": ["While the performance benefits of reconfigurable computing over processor based systems have been well established [9], such platforms have not seen wide use beyond specialist application domains such as digital signal processing and communications."]} +{"12577281|1188683": []} +{"3830665|206459491": ["These setups include Intel Xeon and other CPUs with integrated FPGAs, which bring FPGAs closer to a traditional server model, as well as FPGAs in cloud environments which are becoming increasingly available.", "FPGAs are often used in high-bandwidth, low-latency applications, providing replacements for network cards in some instances, and massively parallelizing machine learning and other algorithms.", "FPGAs can thus be used to represent all computable functions, including emulating sophisticated circuits such as entire CPUs.", "Research on side-and covert-channels on FPGAs and other embedded devices has primarily focused on communications between the device and the outside world.", "After relevant background information on FPGAs in Section II, we cover the system and adversary model in Section III and provide an overview of the experiments needed to verify the ef\ufb01cacy of the covert channel in Section IV.", "Field-Programmable Gate Arrays (FPGAs) are integrated circuits that implement recon\ufb01gurable hardware.", "It should be noted that, due to the FPGA\u2019s routing topology, additional shorter wires are often needed to connect certain elements via long wires.", "Our receiver also consists of a structure that is commonly found in FPGAs from simple thermal and device health monitors [6], [31] to Hardware Trojan detectors [11], [30].", "Users of FPGAs cannot alter the electrical behavior of the device, but can only in\ufb02uence how circuits are mapped onto the FPGA.", "Although these are currently allocated on a per-user basis, we can expect that they will eventually become sharable commodity resources, especially since FPGAs already allow for partial recon\ufb01guration.", "With increased outsourcing, Hardware Trojans (HTs) have become a common-place security threat for FPGAs [7, 32].", "The ever-increasing size and sophistication of FPGAs make them an ideal platform for high-scale System-on-Chip integration.", "Such setups are increasingly common as FPGAs and CPUs become integrated, and as FPGAs become available on public cloud infrastructures.", "Routing algorithms will need to be modi\ufb01ed to account for this information leakage, and the tools for existing FPGAs must be retro\ufb01tted, even if architectural changes are introduced in future devices to reduce the leakage.", "Alternatively, the adversary can also attempt to achieve the same through external means such as subverting the compilation tools (which is a common threat model for FPGAs [9], [12]), or by recommending compiler directives to users of his design.", "The Xilinx FPGAs used in our experiments internally have a grid layout, whose fundamental building block is called a Con\ufb01gurable Logic Block (CLB).", "We showed that the phenomenon is present in FPGAs of three different generations, and that the covert channel can be implemented in a variety of arrangements, including different locations, different orientations of the transmitter and receiver, and with multiple transmitting circuits present.", "The dif\ufb01culty in determining the cause of crosstalk on FPGAs due to a \u201clack of electrical detail\u201d is well known and has been identi\ufb01ed by multiple authors [1], [1], [19], [25], [2], [28]."]} +{"15894221|13295171": ["The notion of checkpointing is classically used in fault-tolerant applications [Elnozahy et al. 2002; Egwutuoha et al. 2013]."]} diff --git a/graph_525062.jsonl b/edge/graph_525062.jsonl similarity index 100% rename from graph_525062.jsonl rename to edge/graph_525062.jsonl diff --git a/graph_525192.jsonl b/edge/graph_525192.jsonl similarity index 100% rename from graph_525192.jsonl rename to edge/graph_525192.jsonl diff --git a/edge/graph_52519651.jsonl b/edge/graph_52519651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5252693.jsonl b/edge/graph_5252693.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52580201.jsonl b/edge/graph_52580201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f15b1bad1739bd2386a0da118a3fd3efe36b478 --- /dev/null +++ b/edge/graph_52580201.jsonl @@ -0,0 +1 @@ +{"32444905|7839197": ["Nwana views agents as \"software components and/or hardware that are capable of acting exactingly to accomplish tasks on behalf of its user and learn as they react and/or interact with their external environment\" [10]."]} diff --git a/graph_5258936.jsonl b/edge/graph_5258936.jsonl similarity index 100% rename from graph_5258936.jsonl rename to edge/graph_5258936.jsonl diff --git a/edge/graph_5275998.jsonl b/edge/graph_5275998.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52800614.jsonl b/edge/graph_52800614.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ea96635f118e1fcc6710f4a0d58f79e1fd85224 --- /dev/null +++ b/edge/graph_52800614.jsonl @@ -0,0 +1,2 @@ +{"587972|52800614": []} +{"587972|2840997": ["Although model checking has been reasonably successful for digital circuits [41, 93, 131], there has been very little work on model checking for AMS circuits until recently."]} diff --git a/edge/graph_52801236.jsonl b/edge/graph_52801236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52810953.jsonl b/edge/graph_52810953.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b324592144a77f82a47396751bfdb161e151a2b6 --- /dev/null +++ b/edge/graph_52810953.jsonl @@ -0,0 +1,75 @@ +{"7790555|7971188": ["The second requirement is the ability of sensor nodes to dynamically form groups to execute isolated and transparent application tasks concurrently (i.e. support for WSN network-level virtualization)."]} +{"7790555|1230643": ["These WSNs are composed of small-scale nodes that have the ability to sense, compute and communicate [1]."]} +{"43704823|13361214": ["A couple of mechanisms, such as Time Slotted Channel Hopping (TSCH) [3], and Deterministic and Synchronous Multi-channel Extension (DSME) [3], are provided to support a Wireless Mesh Sensor Network (WMSN) [5].", "TSCH allows in principle to mitigate interferences of devices belonging to the WMSN transmitting in the same coverage area and the effect of path loss fading, thus facilitating simultaneous proximity transmissions."]} +{"206446574|1230643": []} +{"23929415|1236072": ["Typically, a sensor node is a tiny device that includes three basic components: a sensing subsystem for data acquisition from the physical surrounding environment, a processing subsystem for local data processing and storage, and a wireless communication subsystem for data transmission [2, 5]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"14061869|1230643": []} +{"16208027|3348390": ["Digital Object Identifier 10.1109/JIOT.2014.2359538\nare able to recognize and locate by themselves."]} +{"32548209|24110634": []} +{"32548209|4427557": ["The LPWAN [75]"]} +{"32548209|485843": ["effectiveness [26]\u2013[31]."]} +{"32548209|41998167": ["The issue of resource constraint has been highlighted in [1]\u2013[4]."]} +{"32548209|18037424": ["The SG communication architecture presented by the work in [20] utilizes the NIST Framework, though not in the context of the CRSN approach for the SG.", "Also, [20] conducted a review of communication and networking technologies in SGs."]} +{"33593553|17336376": ["Existing surveys [27] and [28] lacked the technical depth and critical review of existing works."]} +{"33593553|7971188": ["Overlays have several advantages like, they are distributed, lack central control and allow resource sharing [17]."]} +{"33593553|1230643": []} +{"8025832|14639620": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|17336376": ["The node virtualization manager and the network virtualization manager are the key modules that interact with the other components such as energy manager, resource manager, service manager to manage all the activities of the virtual sensor network [2,44].", "Due to the owner\u2019s strict control over the WSN domains, conflicting goals, different sensor node and vendors, with no standard in place it is difficult to introduce a large scale federated WSN [2].", "according to the best of our knowledge, there is only one survey paper on virtualization of sensor networks [2] that only covers few of the projects and prominences on the business model and applications supported by virtualization of sensor networks."]} +{"8025832|7889189": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|1077083": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|1819274": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|6275330": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|1230643": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"38152747|1230643": ["A large number of challenging applications ranging from creating smart environments to embedded agile systems are being contemplated that involve a massive random deployment of sensors, numbering in the tens of thousands or even millions [2,9,13,19,25,28,37].", "These protocols are typically used to organize the network into several clusters [2,3,6,7,21,32,33] or to construct a spanning tree [12,16,18,21,42] infrastructure for data collection and delivery."]} +{"10572035|12817488": ["For example, video sensors deployed at airports, borders, and harbors provide a level of continuous and accurate monitoring and protection that is otherwise unattainable."]} +{"10572035|1230643": ["Index Terms\u2014Wireless sensor networks, multi-core, embedded systems, symmetric multiprocessors, tiled many-core architecture, near-threshold computing, heterogeneous, compressive sensing\n\u00c7"]} +{"2083223|801245": []} +{"36120651|205286988": ["A sensor network consists of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [1-5].", "In the recent past the research community mostly paid attention to issues of sensor networks, such as energy efficient routing issues, security and reliable transmission and data aggregation[1-2]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"1254721|206583375": ["RADIO-FREQUENCY (RF)-based localization has recently become a \u201chot\u201d topic and the focus of research for a wide number of applications [1]."]} +{"40938260|1230643": []} +{"801245|17336376": []} +{"801245|1230643": []} +{"801245|12060835": []} +{"6664074|16762549": ["The large variety of use cases [15]\u2013[19] led to the development of a large variety of hardware and communication technologies."]} +{"6664074|4631990": []} +{"10407789|17336376": ["The emergence of shared sensor networks has stimulated research efforts in the field of novel programming abstractions at the node level and management framework at the network level to support multiple applications over a shared physical infrastructure [8],[9], [10], [11]."]} +{"10407789|1230643": ["Typically, energy consumption due to wireless communication (i.e., transmitting and receiving) has been considered the dominant factor in power consumption for WSNs [29]."]} +{"11578312|30815820": ["In particular, gaining reputation among likeminded people has been shown to motivate sharing in online communities and open-source projects (Parameswaran & Whinston, 2007; Raymond, 1999)."]} +{"16333684|1230643": ["We improve system predictability by two-phase interrupt servicing and predictable thread synchronization; we achieve system flexibility by providing a hybrid model for both event-driven programming and multithreaded programming; we retain system efficiency by employing stack sharing and modular\u2026"]} +{"3178691|18956392": ["[10]."]} +{"3178691|6959212": ["In general, sensor nodes have limited battery energy supply [11].", "monitoring and diagnostic systems [1], [4], [9], [11], [19], [30].", "reliable communication capabilities of the deployed WSNs [11], [13].", "system reliability and efficiency by optimizing the management of electric power systems [11], [13].", "online energy consumption of the customers [20] and for asset protection through advanced remote monitoring [11], [23].", ", accidents in the electric power systems, it is important to receive the data at the controller node in a timely manner [11].", "become essential to maintain safety, reliability, efficiency, and uptime of the smart grid [11], [13], [19], [30].", "in a remote and online manner [11], [12], [18], [24], [27].", "These harsh environmental conditions and dynamic network topologies may cause a portion of sensor nodes to malfunction or render the information they gather obsolete [11]."]} +{"3178691|1230643": ["monitoring and diagnostic systems [1], [4], [9], [11], [19], [30]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"13957935|18801114": ["Manuscript received April 16, 2015; revised November 18, 2015 and April 17, 2016; accepted May 15, 2016."]} +{"34680629|7971188": ["While peer-to-peer (P2P) overlay networks (surveyed in [23]) build logical networks on top of the Internet, they differ considerably from the structured overlay networks we describe."]} +{"670285|1230643": ["Recent advances in micro-electro-mechanical systems (MEMS) and low power and highly integrated digital electronics have led to the development of micro sensors [1,9,17,21,22,24,27].", "Each sensor node i will calculate its r-value ri by using d as follows: From [1],", "using the approaches presented in [1,3].", "Then d will be calculated as follows:\nd = Trequired\u2211 \u2200i\u2208Path ( pi + \u2211qi j=1 p j ) \u2217 \u03bbRT (4) Each sensor node i will calculate its r-value ri by using d as follows:\nFrom [1],\nd = 1 ri\u00b5 \u2212 \u03bbRT \u2217 ( pi + \u2211qi j=1 p j ) ri = 1\nd \u2217 \u00b5 + \u03bbRT \u00b5 \u2217\n( pi +\nqi\u2211 j=1 p j\n) (5)\nThen the problem will be to maximize the total throughput on each particular path:\nMax ( \u2211 \u2200i\u2208Path (1 \u2212 ri ) ) where 0 \u2264 ri < 1."]} +{"2534840|15300368": []} +{"2534840|17205659": []} +{"3494096|3474164": []} +{"3494096|24110634": []} +{"3494096|4427557": []} +{"3494096|2871699": ["M2M communications have been extensively reviewed in the literature [1], [31]\u2013[36].", "Pereira and Aguiar [31] discussed on European Telecommunication Standard Institute (ETSI) standard and application protocols while considering mobile devices such as smartphones to be used as mobile gateways for other connected devices with constrained capabilities and the process of aggregating data from embedded sensors in M2M network architecture."]} +{"3494096|2521001": ["Smart homes are expected to communicate regularly with their environments (internal and external) [17]."]} +{"3494096|121289": []} +{"6473245|7971188": ["Overlays have several advantages: they are distributed, lack central control and allow resource sharing [15]."]} +{"6473245|1230643": []} +{"3474164|24110634": []} +{"3474164|13991708": ["Recently Fraga-Lamas et al. [70] reviewed the possibility of applying IoT to warfare to increase ef\ufb01ciency."]} +{"3474164|17683338": ["Dynamic memory management on the other hand is \ufb02exible as it provides for allocation and de-allocation of memory at run-time [132].", "Other available operating systems include MultimodAl system for NeTworks of In situ wireless Sensors (MANTIS), Nano-RK and LiteOS [132] however there is little or no implementation of these operating systems in SDN-based management of WSNs but rather for ordinary WSNs. Table 4 compares the\u2026", "Contiki supports dynamic memory management and memory block functions but does not provide a management mechanism for memory protection between function executions [132]."]} +{"3474164|1230643": ["Multi-hop techniques based on short range radio communication such Meshlogic and ZigBee [46] have been proposed [108] for dense WSNs enabling consumption of less energy compared to direct communication.", "A network with high security features should be developed to meet these requirements however, the challenge here is the limited resource in bandwidth and energy inherent to WSNs [46,47]."]} +{"3474164|10532321": ["OpenFlow [20,21,58] is standard commonly used as a southbound interface [27] and most vendors are producing more OpenFlow capable network infrastructure.", "These rules are then used to enforce policies on the network hardware using OpenFlow [20,21,58,63]."]} +{"3474164|9494512": ["Other energy management schemes such as energy provisioning using batteries and energy harvesting have been been presented in the past years [43]."]} +{"192965|1230643": ["idle listening) for long periods of time can lead to significant energy consumption and thus impact the longevity of the network [4].", "idle listening) for long periods will be the major factor that impacts the longevity of the network [4]."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"16554560|1230643": []} +{"63077748|1230643": []} +{"63077748|1708582": ["On the other hand, Reinforcement learning [3], [4] is biologically inspired and differs from supervised learning in how it acquires its experience and knowledge."]} diff --git a/graph_5281246.jsonl b/edge/graph_5281246.jsonl similarity index 100% rename from graph_5281246.jsonl rename to edge/graph_5281246.jsonl diff --git a/edge/graph_52813717.jsonl b/edge/graph_52813717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..76860bc0cb8508e63df1d1a57e9da8f24b1eee4f --- /dev/null +++ b/edge/graph_52813717.jsonl @@ -0,0 +1,26 @@ +{"33022450|8909218": ["Recent work in [2] controls link discovery in the second tier by adding femtocell infrastructure using a centralized approach similar to the primary cellular network."]} +{"23418402|10979806": ["However, the noncooperative approach may cause severe interference, increase in the power consumption, and degradation in QoS of the macro users and the secondary users due to the lack of the environment awareness [7]."]} +{"23418402|15929566": ["Second, the paper contributes to the general literature of online learning [8] as the traditional online learning relies on full information from all agents in the environment, which is difficult to achieve in such dynamic environment."]} +{"52147317|15449163": ["5G is envisioned as the potential solution to handle this extraordinary data rate demand [1], [2]."]} +{"21053653|3330461": ["dealing with out-band D2D communication both managed by the network and autonomously controlled are surveyed in [11].", "In [11], the authors give an overview of papers addressing inband D2D in terms of spectral efficiency, energy efficiency, cellular coverage and other performance targets.", "To be more precise, with respect to [11], [12] our survey:"]} +{"21053653|7644489": ["An overview of standardization activities in 3GPP focusing specifically on ProSe enabled communication is also described in [134]."]} +{"111347825|3330461": []} +{"111347825|8909218": ["Generally, as a secondary underlay which reuses the spectrum resources of the primary system, resource allocation of D2Dpairs is an important but challenging task to improve the performance of heterogeneousmacrocell-femtocell networks [16, 17], since the receivers in this system suffer from threetier interference, that is, macro-to-device, femto-to-device, and device-to-device interference [18]."]} +{"10985814|3330461": ["Depending on the type of spectrum used, we distinguish inband and outband D2D, which utilize licensed and unlicensed spectrum, respectively [2].", "Hence, a [0-1] scale implies that interference is present or not, while a [1-100] scale is able to describe 100 distinct levels of interference."]} +{"9931536|2623404": ["The Software-Defined Network (SDN) technology [77] is one important enabler for the evolution of current networks towards the intelligent 5G HetNets [78]."]} +{"9931536|7851743": ["From the aspect of reducing the operational and capital expenditure (O/CAPEX) of MNOs, AI-based techniques can substantially diminish human involvement in operational tasks, and optimize network capacity, coverage, and Quality of Service (QoS) in HetNets, according to the advanced features discussed in Self-Organizing Networks (SONs) along following directions [3], [4], [6]: 1) self-configuration, where newly deployed high variety of cells are automatically configured and updated before entering operation tasks, 2) self-healing, where cells and networks can automatically detect and recover from failure and even execute compensation mechanisms whenever failures occur, and 3) self-optimization, where cellular systems can measure the network conditions and optimize the settings to improve the performance in terms of coverage, bandwidth, interference avoidance, and QoS, while the corresponding issues of system scalability and energy conservation are also considered.", "They have relatively lower complexity enabled by recursive feedback-based learning and local interactions, and hence faster speed of finding sub-optimal solutions compared to conventional techniques [3], [4]."]} +{"9931536|9072047": ["A fuzzy system is a control system based on fuzzy logic, which mathematically analyzes analog input values in terms of logical variables that take on continuous values between 0 and 1 [59]."]} +{"9931536|7158350": ["Artificial neural networks (ANNs) are one type of statistical learning models inspired from the biological neural networks of human brains [57]."]} +{"9931536|1708582": ["Among many ML techniques, the reinforcement learning (RL) is one particular learning algorithm inspired by behaviorist psychology, concerned with how software agents ought to take actions in an environment so as to maximize some notion of cumulative rewards [27]."]} +{"9931536|13215551": []} +{"37710820|3330461": ["The two-fold challenge of D2D communication is interference mitigation (between the users operating on the same frequency bands) and efficient spectrum management (so that the allocated spectrum resources be not wasted) [1]."]} +{"5806910|7644489": ["An overview on 3GPP D2D ProSe was given in [96], from the design aspects of ProSe management, synchronization, device discovery and direct communication."]} +{"5806910|8909218": ["\u2026geometry can be a helpful mathematical tool for modeling the spatial distributions of macro eNBs, pico eNBs, femto eNBs, and mobile UEs [108], [109], and analyzing the transmission rate [110], [111], outage probability [112], etc. D2D With Network Coding: As a revolutionary technique, network\u2026"]} +{"27147230|1708582": ["Each agent in RL has the following components [25]:"]} +{"21391909|29060869": ["The authors in [153], distinguish their work from previous surveys", "In [153], a comprehensive survey on the smart grid-driven approaches in energy-efficient communications and data cen-", "like in smart grid in order to ensure energy efficiency and reliability [153]."]} +{"21391909|12029139": ["[12] present an extensive literature review on RF energy harvesting networks", "These include much greater spectrum allocations at untapped mmWave frequency spectrum bands [13], [22], highly directional massive beamforming antennae at both the mobile devices and BSs [18], [22], longer battery life sustained by energy harvesting techniques [12], full-duplexing communications (FDCs) [21], lower outage probability, much", "energy is predictable and relatively stable over time due to fixed distance [12].", "Authors in [12] have also discussed an RF-powered CR network whereby the RF energy harvesting capability allows secondary users to harvest and store energy from nearby trans-", "The authors in [12], also add that multi-hop RF-EHNs via cooperative relaying techniques can help to overcome fading and attenuation by using intermediate relay nodes, resulting in improved network performance in terms of efficiency and reliability.", "There are several advantages of the RF energy-harvesting techniques for the 5G RAN systems that has been identified in literature [12].", "energy within the 5G RAN systems [12], [13].", "The authors in [12], assert that one of the key concerns for RF information and energy transfer is the decay in energy transfer efficiency with the increase of transmission distance due to propagation path loss.", ", through innovative energy harvesting), will be a crucial component of the design [2], [12].", "Typically, the macrocells are served by high power base stations (MeNBs) with transmit powers close to 43 dBm and antennae gains close to 12 \u2212 15 dBi [12]."]} +{"21391909|2443013": ["(CCs) dispersed within and across different bands (intra/interband) thereby boosting the user throughput in LTE-Advanced (LTE-A) as well as the future 5G RAN systems [75].", "heavy computational burden and a huge amount of the CSI feedback [75]."]} +{"21391909|8974063": ["[108] and Tsiropoulos et al."]} +{"21391909|5338241": []} +{"21391909|7686677": ["generation wireless networks is a growing concern for operators not only for profitability maintenance but also for the overall adverse environmental effects reduction [124], [142].", "2) Dynamic Power Saving (DPS) Techniques: Several researchers have presented research trends, exposed some research issues and challenges and suggested some techniques for the green cellular networks [124], [143]."]} +{"3051661|3330461": ["The main idea in D2D-enabled cellular networks is to permit transmitterreceiver pairs coexisting in close proximity to establish direct peer-to-peer connections between each other.", "Through comprehensive numerical analysis, we investigate the expected performance gains and provide guidelines for selecting the network parameters."]} diff --git a/edge/graph_52822969.jsonl b/edge/graph_52822969.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8ebf85d79006ee8a50e44a2cca664dd4bcfa4ab --- /dev/null +++ b/edge/graph_52822969.jsonl @@ -0,0 +1,9 @@ +{"207238980|393948": []} +{"207238980|11608263": ["In a typical node classification task, we are interested in predicting the most probable labels of nodes in a network [33]."]} +{"7913446|10087812": ["Common approaches try to\nexploit various types of domain expertise and transfer knowledge that is invariant across the source and target domains [Konidaris and Barto, 2007; Liu and Stone, 2006] (for a survey, see [Lazaric, 2012; Taylor and Stone, 2009]).", "Common approaches try to exploit various types of domain expertise and transfer knowledge that is invariant across the source and target domains [Konidaris and Barto, 2007; Liu and Stone, 2006] (for a survey, see [Lazaric, 2012; Taylor and Stone, 2009])."]} +{"88523535|2511280": ["In this paper, we focus on subclassification as it generalizes the other two methods: matching is point subclassification (Stuart, 2010), and an IPW estimator is a limit of subclassification estimators (Rubin, 2001).", "\u2026uses matching units with similar propensity scores (Cochran and Rubin, 1973; Rubin, 1978; Raynor Jr, 1983; Rosenbaum, 2002; Dehejia and Wahba, 2002; Stuart, 2010), and reweighing unit outcomes based on the propensity score (Hirano and Imbens, 2001; Rubin, 2001; Lunceford and Davidian, 2004), such\u2026", "One approach uses matching units with similar propensity scores (Cochran and Rubin, 1973; Rubin, 1978; Raynor Jr, 1983; Rosenbaum, 2002; Dehejia and Wahba, 2002; Stuart, 2010), and reweighing unit outcomes based on the propensity score (Hirano and Imbens, 2001; Rubin, 2001; Lunceford and Davidian, 2004), such as the inverse propensity weight estimator (IPW)."]} +{"207172599|3330313": []} +{"5865347|50458504": ["Finally, due to the wide-range of application domains, fraud detection has attracted many surveys (Edge and Falcone Sampaio 2009; Flegel et al. 2010; Phua et al. 2010).", "For a general survey on various fraud detection techniques, we refer the reader to [Bolton and Hand, 2002] and [Phua et al., 2010].", "Finally, due to the wide-range of application domains, fraud detection has attracted many surveys [Edge and Sampaio, 2009, Flegel et al., 2010, Phua et al., 2010]."]} +{"320456|393948": ["The bound we derive points the way to a family of algorithms based on the idea of representation learning (Bengio et al., 2013): Jointly learn hypotheses for both treated and control on top of a representation which minimizes a weighted sum of the factual loss (the standard supervised machine learning objective), and the IPM distance between the control and treated distributions induced by the representation.", "The bound we derive points the way to a family of algorithms based on the idea of representation learning (Bengio et al., 2013): Jointly learn a hypothesis and a representation which minimize a weighted sum of the factual loss (the standard supervised machine learning objective), and the IPM\u2026", "The bound leads naturally to a new family of representation-learning based algorithms (Bengio et al., 2013), which we show to match or outperform state-of-the-art methods on several causal effect inference tasks."]} +{"8558103|393948": ["Deep neural networks have been shown to successfully learn good representations of high-dimensional data in many tasks (Bengio et al., 2013).", "Second, we derive new families of representation algorithms for counterfactual inference: one is based on linear models and variable selection, and the other is based on deep learning of representations (Bengio et al., 2013)."]} +{"49541448|3330313": []} diff --git a/edge/graph_52823425.jsonl b/edge/graph_52823425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52831633.jsonl b/edge/graph_52831633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c5def7a6fe035c4665d8b1099c30a513f29fea4 --- /dev/null +++ b/edge/graph_52831633.jsonl @@ -0,0 +1,19 @@ +{"206751868|396631": ["Due to the continuous progress of image-based rendering and view interpolation technologies, these applications have received a steadily increasing attention over the past years both from the academic and industrial communities [1], [2]."]} +{"23538521|3540699": ["264/AVC [22] and Kimata\u2019s inter-view prediction structure"]} +{"396631|14889616": ["D video, while the video\n632 Proceedings of the IEEE | Vol. 99, No. 4, April 2011\ndata associated with the additional views are encapsulated in an extension NAL unit type that is used for both scalable video coding (SVC) [45] and multiview video.", "The best approach for this may involve some\ncombination of MVC with another set of recent extensions of H.264/MPEG-4 AVCVnamely, the SVC extension [45]Vperhaps along with additional new technology.", "In February 2002, hewas appointed as the Editor of the H.264/MPEG-4 AVC video coding standard and its extensions (FRExt and SVC).", "A flag is specified to distinguish whether the NAL unit is associated with an SVC bitstream or an MVC bitstream.", "264/MPEG-4 AVCVnamely, the SVC extension [45]Vperhaps along with additional new technology.", "data associated with the additional views are encapsulated in an extension NAL unit type that is used for both scalable video coding (SVC) [45] and multiview video."]} +{"396631|3540699": ["For more detailed information about H.264/MPEG-4 AVC, thereaderisreferredtothestandard itself [1] and the various overview papers that have discussed it (e.g., [ 41 ]\u2013[43]).", "Although its basic design is very similar to that of prior video coding standards such as H.261, MPEG-1, H.262/MPEG-2, H.263, or MPEG-4 Visual, H.264/MPEG-4 AVC includes new features that enable it to achieve a significant improvement in compression efficiency relative to any prior video coding standard [ 41 ]\u2013[43]."]} +{"14416914|396631": []} +{"14587476|17252389": ["Hu et al.([7]) presented a survey on Internet visual media processing, which provides recent progress of image/video analysis and editing."]} +{"101674|3540699": ["Then we discuss the related work on collaborative streaming of singleview video, as well as game-theoretic analysis of collaborative video streaming."]} +{"19015034|3540699": ["Being the lasted video coding standard, H.264 owns many highlighted features, as described by Wiegand [14].", "264 owns many highlighted features, as described by Wiegand [14]."]} +{"14335835|17252389": ["interesting 3D versions of applications of visual media [22]."]} +{"15715678|17252389": []} +{"1020148|40596005": ["D representation of the human face and body merit special attention in different scene representation technologies for 3DTV."]} +{"1020148|7788290": ["The authors are grateful to Mrs. K. Ward for her proofreading and suggestions."]} +{"8151674|14970359": []} +{"8151674|7788290": []} +{"2344903|3540699": ["A straightforward method for compression is simulcast coding, which means that each camera view is coded independently using an existing video codec, e. g., based on the H.264/AVC video coding standard [ 8 ]."]} +{"8191230|3540699": ["fact that they are sparsely sampled and thus lack accuracy [18]."]} +{"3826331|3540699": []} +{"206961343|17252389": ["Furthermore, we could also extend some interesting applications of visual media [18], such as interactive editing and composition, to stereoscopic cases."]} +{"7371942|10397481": ["Many techniques for summarization have been proposed [Ponto et al. 2012; Lee et al. 2012; Kumar et al. 2010; Money and Agius 2008; Truong and Venkatesh 2007; Taskiran and Delp 2005;\n1http://www.vyclone.com 2http://make.switchcam.com\nACM Transactions on Graphics, Vol. 33, No. 4, Article 81,\u2026"]} diff --git a/edge/graph_52831894.jsonl b/edge/graph_52831894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52833531.jsonl b/edge/graph_52833531.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..231cf111ffeb9bd32b0fcfd7eac4a526884a5842 --- /dev/null +++ b/edge/graph_52833531.jsonl @@ -0,0 +1,4 @@ +{"13177837|12957829": []} +{"12707446|52833531": ["MATHEMATICAL MODELLING OF ED PROBLEM The ED problem has been formulated in a very comprehensive way in part I [17] of the paper."]} +{"122038234|62635091": ["The global optimization techniques known as genetic algorithms (GA), simulated annealing (SA), tabu search (TS), and evolutionary programming (EP), which are the forms of probabilistic heuristic algorithm have been successfully used to overcome the non-convexity problems of the constrained ED [1].", "The literature on the application of the global optimization in the OPF problem is vast and [1] represents the major contributions in this area."]} +{"2223478|12957829": []} diff --git a/edge/graph_52841885.jsonl b/edge/graph_52841885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad32f99158b709d1f0db9064996f9bb0ebeda726 --- /dev/null +++ b/edge/graph_52841885.jsonl @@ -0,0 +1,4 @@ +{"17216162|8914588": ["Contributions on autonomic computing such as [9], [15] classifies systems with respect to the different ways of exerting control from an observer/controller pattern, and it provides a quantitative measure of the degree of autonomy, later transformed into the degree of selforganization."]} +{"10542545|10559330": ["The more specific objective of this exploration is identify solutions for the integration of QoS IP services [5][25] (resource reservation services), QoS negotiation [1] in the component container architecture, and study the container architecture to make it adaptable to other types of QoS supports\u2026"]} +{"21678018|8914588": ["v (on(n, s, v, f)\u00ac \u2022 (on(n, s, v, f))) \u21d2 t service = 0 \u239e\u239f\u239f\u23a0 (11)"]} +{"32505238|8914588": ["As acknowledged by some authors [8], the architectural model-driven approach is one of the most comprehensive and widely accepted strategies to develop complex systems such as CPS that change over time."]} diff --git a/edge/graph_52844161.jsonl b/edge/graph_52844161.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ddfdfad88bd1f6b112a83440ece730816a95ff13 --- /dev/null +++ b/edge/graph_52844161.jsonl @@ -0,0 +1,4 @@ +{"140540|13756844": ["One potential alternative is the K-Framework [22].", "When the code is not empty,\n2 The Coq users\u2019 mailing list has 1,404 subscribers while the K-Framework\u2019s has 127 at the time of writing.\nthe code controls the account; such an account is called a contract.", "The K-Framework is a tool specifically engineered for defining programming languages."]} +{"10513157|13756844": ["Copyright c\u00a9 2014 ACM 978-1-4503-2873-9 /14/09. . . $15.00. http://dx.doi.org/10.1145/2628136.2628143"]} +{"6856727|15126268": []} +{"46936025|13756844": []} diff --git a/edge/graph_52844287.jsonl b/edge/graph_52844287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0371a569f924bbf9b55a0c302b54f6a37e9f6365 --- /dev/null +++ b/edge/graph_52844287.jsonl @@ -0,0 +1,4 @@ +{"13752671|17514014": []} +{"13752671|9629338": []} +{"13752671|6116234": []} +{"53622653|7792508": ["(2007) Cox (2007) discusses the main phases of applied statistics with a focus on technical considerations.", "Con\ufb01rm, update, or reject the hypothesized model (and its associated schema) This model parallels the descriptions of data analysis offered by Chat\ufb01eld (1995), Wild and Pfannkuch (1999), MacKay and Oldford (2000), Cox (2007), and Huber (2011) ."]} diff --git a/edge/graph_52846746.jsonl b/edge/graph_52846746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78827b48f56cdc9fb543a299b61852b0ebbd671d --- /dev/null +++ b/edge/graph_52846746.jsonl @@ -0,0 +1,3 @@ +{"1520154|393948": []} +{"7047283|17574321": ["In spite of a great number of previous efforts [4, 11, 18, 35] to explore discriminative features, there is no investigation on GFCC feature and fusion of MFCC and GFCC for sound-event detection.", "The performance of the sound detector under various configurations, signal-to-noise ratios, and parameter settings was compared based on the minimum detection cost functions (minDCF) [18, 26], detection error tradeoff curves [26] and equal error rates (EER).", "Unlike most existing work in sound detection [4, 11, 18, 35], the main goal of the proposed system is to detect short sound events (some of them could be less than 1 s) in very noisy environments and severe mismatches between training and testing conditions.", "Research has demonstrated that time-frequency representation is very useful for the classification of sound and speech signals [4, 11, 18, 35]."]} +{"14159721|17516538": ["Both [5] and [6] argue that the integration of video technology with sensors and other media streams will constitute the fundamental infrastructure for new generations of multimedia surveillance systems."]} diff --git a/edge/graph_52846819.jsonl b/edge/graph_52846819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52846844.jsonl b/edge/graph_52846844.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..369d3b8865f704461d6199980f92227b71cbf078 --- /dev/null +++ b/edge/graph_52846844.jsonl @@ -0,0 +1,16 @@ +{"16819764|15485264": ["More recent progress for bat algorithm can refer to Ref.[12].", "More recent progress for bat algorithm can refer to Ref."]} +{"16200314|15485264": []} +{"11056949|15485264": []} +{"1406570|16866891": ["Swarm intelligence algorithms were applied on continuous as well as combinatorial optimization problems [25]."]} +{"18391661|19502816": ["BFP is employed to optimize unconstrained benchmark problems [33, 34]."]} +{"18391661|15485264": ["The review for all the said applications is given in [25]."]} +{"6687561|15485264": ["It has been applied to a wide range of optimization applications (Yang, 2013), including image processing (Du & Liu, 2012), classifications (Mishra, Shaw, & Mishra, 2012), scheduling (Musikapun & Pongcharoen, 2012), electricity market (Niknam, Sharifinia, & Abaraghooee, 2013), Energy systems\u2026", "It has been applied to a wide range of optimization applications (Yang, 2013), including image processing (Du & Liu, 2012), classifications (Mishra, Shaw, & Mishra, 2012), scheduling (Musikapun & Pongcharoen, 2012), electricity market (Niknam, Sharifinia, & Abaraghooee, 2013), Energy systems (Sambariya & Prasad, 2014) and various other problems."]} +{"19016302|15485264": ["Many variants of BA were proposed to improve the algorithm\u2019s efficiency by means of finding the tradeoff of population\u2019s diversity and algorithm\u2019s convergence speed[2].", "of DLBA were assigned based on reference[6]: lower bounds of frequency Fmin=0, upper bounds of frequency Fmax=1, initial frequency F=0, initial velocity v=0, initial loudness A drawn from [1,2], initial plus emission r drawn from [0,0."]} +{"14846304|16866891": ["Inspired by the behavior of bats with varying pulse rates of emission and loudness, BA has been proved to possess a better performance compared with other algorithms like genetic algorithm (GA) and particle swarm optimization (PSO) algorithm [12]-[14]."]} +{"17613760|6430931": ["The level of improvement in detection rate shown in (Wu and Banzhaf, 2010) should be considered as a step in the right direction since it made the algorithm competitive to the rest of machine learning solutions.", "a Laboratory of Information and Communication Systems Security, University of the Aegean, Samos GR-83200, Greece bDepartment of Information and Communication Systems Engineering, University of the Aegean, Samos GR-83200, Greece\na r t i c l e i n f o\nArticle history: Received 9 January 2011 Received\u2026", "Although in the past, some works (Wu and Banzhaf, 2010) have touched upon a limited number of such systems, the current one is exhaustive and focuses solely on SI-inspired IDS."]} +{"1507469|63137": ["The work presented in [7] relates ACO to the fields of optimal control and reinforcement learning, whereas [183] describes the common aspects of ACO algorithms and probabilistic learning algorithms such as stochastic gradient ascent (SGA) and the"]} +{"15485264|16866891": ["Case studies include pressure vessel design, car side design, spring and beam design, truss systems, tower and tall building design and others."]} +{"16885038|19502816": ["where =15 and m=5 M [-20,20] -1", "A set of thirty benchmark optimisation functions [18] [19] [20] with diverse properties have been employed to test the efficiency of proposed algorithm."]} +{"1841046|19502816": ["The reader is invited to check deeper details about test functions in the state-of-the-art reviews [26\u201328]."]} +{"664244|15485264": ["More recent progress for BA can refer to Yang and He (2013b).", "Up to now, many optimisation algorithms have been developed, such as genetic algorithm, firefly algorithm (Yang and He, 2013a), artificial plant optimisation algorithm (Yu et al., 2013), biogeography-based optimisation (Laseetha and Sukanesh, 2012), artificial physics optimisation (Xie et al.,\u2026"]} +{"16623853|16866891": []} diff --git a/edge/graph_52847025.jsonl b/edge/graph_52847025.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f778aa36e694567dcfc77b3ae10c64c24abe3b9c --- /dev/null +++ b/edge/graph_52847025.jsonl @@ -0,0 +1 @@ +{"20988993|11675147": ["large amount of works were ongoing to represent users with proper features [36]."]} diff --git a/edge/graph_52847219.jsonl b/edge/graph_52847219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf5938e16c983ccd389d1ec1f36889e3a20bc132 --- /dev/null +++ b/edge/graph_52847219.jsonl @@ -0,0 +1,4 @@ +{"20913098|13172512": ["Three categories of methods exist for traffic classification: port-based, payload-based and machine learning-based [5]."]} +{"52032322|13172512": []} +{"14389273|13172512": ["current traffic to quickly respond to support diverse business goals [29]."]} +{"29145577|13172512": []} diff --git a/edge/graph_52860135.jsonl b/edge/graph_52860135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..efd24588230c50fbd6f7e70fce0becaec102c543 --- /dev/null +++ b/edge/graph_52860135.jsonl @@ -0,0 +1,5 @@ +{"8556422|11112426": ["S PECTRAL unmixing [1] and classification [2] are two active areas of research in hyperspectral data interpretation.", "The most traditional approach in the literature to describe the phenomenon of the mixture at subpixel levels is the linear mixture model [1].", "In order to mitigate the impact of mixed pixels, several endmember extraction [1], [5], [6] and abundance estimation algorithms [3], [7] have been developed in the literature under the assumption that a single pixel vector may comprise the response of multiple underlying materials."]} +{"44511966|11112426": ["2) VCA: VCA has been widely used in endmember extraction and hyperspectral unmixing [36], [38]."]} +{"24309481|393948": ["Unlike the binary RBM, as introduced in Section II-B, we replace it with real-valued units [30], [44], [50] that add Gaussian noise to model the input data.", "Deep architectures with more layers, however, can potentially extract abstract and invariant features for better image or signal classification [30].", "Especially, deep learning-based techniques have been developed to solve this challenging problem [30]."]} +{"3965319|11112426": ["According to [48], it has a high probability that pixels/spectra in a superpixel lie in the same subspace.", "In light of such linear spectral mixture model, the clean HSI X could be decomposed as follows [48]."]} +{"17399198|393948": ["A hierarchical feature representation is considered to be richer in a sense that more properties can be represented in a multilevel structure[3], [2], [8], [13]."]} diff --git a/edge/graph_52860448.jsonl b/edge/graph_52860448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52876332.jsonl b/edge/graph_52876332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80453d036955e3f037cabeff15c33086fb8bd0c3 --- /dev/null +++ b/edge/graph_52876332.jsonl @@ -0,0 +1,8 @@ +{"43917385|13359913": ["NoCs have enhanced parallelism with high throughput and low latency [1]."]} +{"45819392|16016699": ["In this section, we will present the vision toward coordinated sensing and dark silicon management approach employed in the invasive computing systems [88].", "This work was supported in part by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre Invasive Computing [88], [89] (SFB/TR 89 \u2013 http:// invasic.de) and as part of the priority program Dependable Embedded Systems [93] (SPP 1500 \u2013 http://spp1500.itec.kit.edu, GetSURE Project [94]).", "Acknowledgment This work was supported in part by the German Research Foundation (DFG) as part of the Transregional Collaborative Research Centre Invasive Computing [88], [89] (SFB/TR 89 \u2013 http:// invasic."]} +{"15816834|16016699": []} +{"25000540|16261067": ["Allocating system resources to the tasks of multiple applications on on-chip many-core system has been an emerging research direction [29], [35], [36]."]} +{"52385817|13037420": []} +{"13770758|14583671": ["TABLE I MEMORY TECHNOLOGY COMPARISON [15]", "Unfortunately, NVM technologies suffer from low write endurance (RRAM (10 \u03bb(11)), PCM (10 \u03bb(8)), STT-RAM (10 \u03bb(15))) and incur high energy during write operations which degrades their performance and use, due data being stored in the form of change in physical state [15]."]} +{"31706493|11266367": ["For instance, Welch [36] addressed the question of which techniques could be employed in computer operating systems to reduce the energy consumption of today\u2019s mobile computing devices.", "For instance, Welch [36] addressed the question of which techniques could be employed in computer operating systems to reduce the energy con-"]} +{"29427918|13037420": ["TABLE I: Power consumed by on-chip caches [5], [6]", "A number of performance cognizant low power on-chip cache design techniques have been surveyed in [5], [6] along with their pros and cons."]} diff --git a/edge/graph_52877341.jsonl b/edge/graph_52877341.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3604b9c0bad1e7cd27f059486cbc0b0833aaa4e0 --- /dev/null +++ b/edge/graph_52877341.jsonl @@ -0,0 +1,6 @@ +{"5120196|16403716": []} +{"1917371|14258620": []} +{"153930390|5822166": []} +{"56422471|13640443": ["As a result of channel integration, firms can provide more personalized information and differentiated services as well as a greater range of products (Agatz et al., 2008; Barnes et al., 2004)."]} +{"155511477|5822166": []} +{"155511477|14038195": ["Each sub-problem is a single objective decision making problem that can be solved quite easily (Vaidya and Kumar, 2006; Ho, 2008; Ho et al., 2012; Subramanian and Ramanathan, 2012; Rajesha and Malligab, 2013)."]} diff --git a/edge/graph_52879114.jsonl b/edge/graph_52879114.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d571f769bad23c6b904831cc8a71ce1abc7988f --- /dev/null +++ b/edge/graph_52879114.jsonl @@ -0,0 +1,11 @@ +{"61089567|16540884": []} +{"38545243|1113420": ["The context-aware framework chosen for the development of our ambient home care system is the Context Toolkit [14], a system deeply described in A. Dey\u2019s PhD dissertation [ 15 ]."]} +{"135258914|10817088": ["Ambient Intelligence (AmI) is a new paradigm in information technology aimed at empowering people\u2019s capabilities by the means of digital environments that are sensitive, adaptive, and responsive to human needs, habits, gestures, and emotions [7]."]} +{"7902075|7360895": ["Investigating the design space of robots is a challenging task that needs to consider various factors [12]."]} +{"42033209|16335158": []} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"45410942|14397159": ["universal definition of AAL has been adopted [18].", "AAL technologies have been identified as \u201cinformation and communication technology-based products, services, and systems to provide older and vulnerable people with a secure environment, improve their quality of life, and reduce the costs of health and social care\u201d [18]."]} +{"18631498|1113420": []} +{"14397159|1634674": ["1) and uses various computer vision approaches [2, 23, 39, 64, 65].", "Background subtraction is popularly used to separate moving objects (human shape here) in the scene by segmenting into background and foreground [64] and many methods are proposed in the literature [9, 14, 27, 54]."]} +{"17487902|386036": ["User linkage is also in one way or another related to problems from other research communities including co-reference resolution in natural language processing [4], inter-media data retrieval [26], entity matching [28], record linkage in database [8, 11, 24], and name disambiguation in information retrieval [20, 14], which can be generalized as entity resolution across different records.", "Compared with the record linkage problem long studied in database community [8, 11, 24], our technical breakthrough comes from taking advantage of two important features unique to social data: (I) user behavior trajectory along temporal dimension: both empirical and social behavior studies (e."]} +{"15696763|1987550": ["Relevant health educational resources can be automatically linked to key terms or phrases in the patient\u2019s record [20] to help the patient understand unknown medical vocabulary [41].", "The Federal Health Insurance Portability and Accountability Act of 1996 (HIPAA) stipulates that patients have a right \u201cto see and get copies of their records, and request amendments\u201d [41], although it does not specify the exact manner in which the access is to be given.", "More than half the patients have difficulties understanding vocabulary and meaning of their records [41], hence:", "Patients prefer more information to less [51] and they are interested in reading their medical records when offered such chance [40, 41], therefore:"]} diff --git a/edge/graph_52881015.jsonl b/edge/graph_52881015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19b6c65c761831242525ce64f162cc6916adeab5 --- /dev/null +++ b/edge/graph_52881015.jsonl @@ -0,0 +1,49 @@ +{"3087549|2623404": ["In [3], the following potential advantages of SDN were pointed out: centralised control, control logic is not distributed as in traditional IP network but centralised in an additional network element (i."]} +{"6163761|525062": []} +{"6163761|1252121": []} +{"49333257|4269723": ["Although multiple technologies claim to follow SDN principles, the most notable one is the OpenFlow protocol [1]."]} +{"15903354|2623404": ["\u2026c\u00a92017 IEEE\n132978-1-5090-5124-3/17/$31.00 \u00a92017 IEEE ICOIN 2017\nAs indicated by [8], the elements of SDN data plane represent basic forwarding hardware that have to offload the logic to a controller (element on control plane) through an open interface, such as OpenFlow."]} +{"10532321|2623404": ["\u2026opens a plethora of research questions such as how to design network programming languages, obtain robust systems with centralized management, control traf\ufb01c at the packet level, perform network virtualization, or even co-exist with traditional network protocols [2], [3], [4], [5], [6], [7], [8].", "1, is the most popular implementation of the southbound interface of SDN [5], [6], [7], [11], [12]."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"11784536|206584087": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"23668684|9928823": ["By combining the generative and discriminative deep architectures, a hybrid model may be constructed, particularly to carry out discrimination tasks, which are aided by the optimized outputs obtained from the generative architecture [20].", "Other deep learning architectures also exist in [20]."]} +{"23668684|7851743": ["Also, in future wireless networks, self-organization has been identi\ufb01ed as a critical issue by a number of researchers [250]."]} +{"23668684|393948": ["This idea of knowledge sharing was demonstrated in [27].", "The state-of-the-art deep learning algorithms, on the other hand, still hinge upon multi-layer architectures according to the work conducted by Bengio et al. [27]."]} +{"23668684|13172512": ["to the networking community [163]\u2013[171]."]} +{"20603166|6909107": ["This helps operators to increase the service quality through the effective mobility management in addition to the benefits of utilizing cloud-like resources at the edge [101]."]} +{"20603166|9436049": ["Although there are studies focus on this area [231], [232], server placement in the Metropolitan area need to be studied in detail and analyzed"]} +{"20603166|3767252": ["Because of the major differences with respect to the implementation and deployment of the mentioned proposals, the security mechanisms and underlying protocols will also vary [77].", "Therefore, MEC developments should intrinsically enable security and privacy for protecting the applications and user data at the edge server and provide an authentication system for the vehicles [25], [77], [99].", "On the other hand, any casual user such as a public place owner can deploy a Cloudlet or Fog server within a private environment [77]."]} +{"20603166|8650651": ["In the case of SDON, standardization of this interface may improve the operations to a greater level since an optical network may cover a large area consisting multiple domains [221].", "The role of the northbound interface in SDONs is still raw for the time being and research in this area is more challenging since there are multitude of interfaces that should be managed in physical and transport layers [221]."]} +{"20603166|11414835": ["virtualization are feasible for abstraction and isolation, it is observed that there is a lack of complete performance evaluation [219]."]} +{"20603166|2535224": ["ization in wireless and mobile networks is more challenging and complicated [224]."]} +{"20603166|2623404": ["Moreover, there are surveys on SDN [26]\u2013[30], Software Defined Wireless Networks (SDWN) [31], [32] and Network Functions Virtualization (NFV) [33], [34] which are the complementary technologies for improving the operations of edge servers."]} +{"20603166|10693567": ["[138], OpenFlow was firstly used for a campus network which is an inspiration to support campus-based scenarios for Edge Computing."]} +{"20603166|3042864": ["There are recent surveys on cloud computing [18], [19] and MCC [8], [20]\u2013[22].", "In [20], the mobile cloud is defined in two different ways: \u2022 Infrastructure based \u2022 Ad-hoc mobile cloud According to this classification, the infrastructure based model specifies the hardware infrastructure of cloud datacenters serving to mobile users."]} +{"20603166|10532321": ["to the data plane [135]."]} +{"206576808|206584087": ["1) Detection Approaches: In this section, we discuss four deployment points for DDoS defense mechanisms, viz., source-end, victim-end, intermediate and distributed [56]."]} +{"206576808|6670217": ["Due to the constraints as stated above, mobile environments are typically less secure and their specific characteristics pose several challenges to mobile botnet and malware detection [47]."]} +{"206576808|8364569": ["2) Detection Methods: Literature survey shows a significant number of publications on anomaly detection systems [59], [60], [61],[62], [63], [64], [65], [66]."]} +{"206576808|13172512": ["Many machine learning algorithms have been used to detect anomalies present in network traf\ufb01c [88]."]} +{"206576808|2906773": ["A large number of hardware-based network infrastructure security mechanisms are presented in [70]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"23265283|11414835": ["SDN hypervisors have been surveyed in [38], which categorizes and sub-classi\ufb01es SDN hypervisors, and does some valuable comparisons and evaluations.", "As many surveys [38], [40] have put forward, these slicing strategies have their characteristics and defects.", "More details on network hypervisors can be found in [38], which provides numerous comprehensive and deep insights."]} +{"23265283|2535224": ["Software-Defined Wireless Networks (SDWNs) have been studied in [37], [42]\u2013[44]."]} +{"23265283|16332018": ["As many surveys [38], [40] have put forward, these slicing strategies have their characteristics and defects.", "Rygielski and Kounev [40] have surveyed existing network virtualization methods brie\ufb02y, and speci\ufb01cally characterized them according to QoS management and performance isolation."]} +{"206577741|5991584": ["There are many surveys of BGP security (such as [7] and [8]) and anomaly detection in a broad range of disciplines (such as [25]).", "Consequently, BGP did not provide any authentication measures for advertising routes [6]\u2013[8].", "None of these approaches, however, offer a combination of suitable performance, adequate security, and deployable support infrastructure [8]."]} +{"2013729|1252121": ["Previous research has thoroughly analyzed the various problems of BGP [4]."]} +{"17776298|1252121": ["This is mainly caused by the increasing number of stub ASes that become multihomed in order to improve their connectivity, resilience, and load balance [21].", "Conflicts may occur because of the freedom each AS has to create and deploy its own routing policies without a global coordination involving the related domains [21].", "The BGP convergence time is slow, in the range of tens of seconds [21].", "The optimal MRAI value actually depends on the topology and the type of experiment executed on the network [21]."]} +{"10071444|1252121": ["Proposals exist for balancing these criteria [9] and", "Distinguishing policy language from the routing mechanisms is now considered good practice and there has been more interest in writing expressive high-level policy languages while abstracting routing to low level protocols [4, 3, 9].", "This limits new sorely needed technologies, such as interdomain Quality of Service (QoS), rich traffic engineering capabilities, and multi-path performance advantages [3, 9]."]} +{"15069738|5991584": ["Multiple proposals have emerged to secure the Internet [48]."]} +{"741064|15971774": ["[154] investigated multipath transmission on the transport layer, despite their main focus on networklayer multipath routing.", "There are only a few surveys [7, 45, 67, 153, 154, 163, 183] that touch on the same topic as ours.", "Survey Year Application Transport IP Link Physical Cross-layer Network Environment [163] 2012 \u221a \u221a Scheduling, tunneling \u221a Wireless [67] 2013 \u221a \u221a Scheduling, tunneling \u221a General [7] 2013 \u221a Tunneling General [45] 2015 \u221a Routing \u221a Wired [183] 2015 \u221a \u221a Routing \u221a \u221a \u221a Wired [154] 2015 \u221a Routing \u221a General This survey 2015 \u221a \u221a Scheduling, tunneling \u221a \u221a General", "For example, [86, 108, 154, 174, 193] mainly focused on the control plane problem (i.", "We refer the readers to articles and recent surveys that cover such work [86, 108, 154, 174, 193]."]} +{"741064|14077349": []} +{"741064|2295142": ["For surveys on multipath transmission in sensor networks, we refer the readers to [156]."]} +{"3552149|18392886": ["to adapt it to large-scale networks with different ASes such as the Internet [79].", "This classification has been recently adopted by [79].", "Moreover, Espresso achieves higher availability (reliability) when compared to existing router-centric Internet protocols.", "Digital Object Identifier 10.1109/COMST.2017.2782482\nthe recent emergence of the Internet of Things (IoT) has allowed for the creation of new advanced services with more stringent communication requirements in order to support its innovative use cases.", "Another different class of solutions has been recently introduced by DISCO which promoted a logically distributed control plane based on existing ASs within the Internet.", "The main advantage of the DISCO solution is the possibility to adapt it to large-scale networks with different ASes such as the Internet [79].", "However, that main feature of logically-centralized control which has been leveraged by most SDN solutions to improve\nnetwork management at the intra-domain level, cannot be fully exploited for controlling heterogeneous networks involving multiple Autonomous Systems (ASes) under different administrative authorities (e.g., the Internet).", "Considered as a large-scale SDN deployment for the public Internet, Espresso, which has been in production for more than two years, routes over 22% of Google\u2019s total\ntraffic to the Internet.", "I. INTRODUCTION\nTHE UNPRECEDENTED growth in demands and datatraffic, the emergence of network virtualization along with the ever-expanding use of mobile equipment in the modern network environment have highlighted major problems that are basically inherent to the Internet\u2019s conventional architecture.", "Finally, another important feature of Espresso is that it provides full interoperability with the rest of the Internet and the traditional heterogeneous peers.", "2) SDX-Based Controllers: Different from DISCO which proposes per-domain SDN controllers with inter-domain functions for allowing autonomous end-to-end flow management across SDN domains, recent trends have considered deploying SDN at Internet eXchange Points (IXPs) thus, giving rise to the concept of Software-Defined eXchanges (SDXes).", "In the same spirit, INRIA\u2019s D-SDN [92] enables a logical distribution of the SDN control plane based on a hierarchy of Main Controllers and Secondary Controllers, matching the organizational and administrative structure of current and future Internet."]} +{"3552149|11414835": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-", "In the case of an underlying physical SDN network, this could be implemented using an SDN network hypervisor that creates multiple logically-isolated virtual network slices (called vSDNs), each is managed by its own vSDN controller [14]."]} +{"3552149|2623404": ["In particular, surveys published in IEEE CST over the last few years elaborated on various topics within the SDN scope such as the concept, benefits and historical roots [9, 10], the architecture elements and", "the design challenges [9, 10, 11, 12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management challenge in SDN [16] and the application of SDN in wireless networks [17]."]} +{"3552149|4269723": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-"]} +{"12421274|2623404": ["in devices, enables programmability and centralizes network management tasks [7]."]} diff --git a/edge/graph_52883988.jsonl b/edge/graph_52883988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fcfa9e664092a6d9500e7e3364c1486820b4326 --- /dev/null +++ b/edge/graph_52883988.jsonl @@ -0,0 +1,16 @@ +{"33517328|11139156": ["[11] presented a systematic review on the use of Scrum in the global software development, where they reported a growing interest in the subject and concluded that literature demands a more empirical study to understand the use of Scrum practices in globally distributed projects.", "Scrum Practices [7], [11], [28]"]} +{"33517328|15412731": ["[17] conducted a survey on the state of practice in DSD in which they investigated the criteria that influence task allocation decisions."]} +{"18337450|15412731": ["[12] conducted a survey on the state of practice in DSD in which they investigated the criteria that influence task allocation decisions."]} +{"33964920|15412731": ["[13] conducted a survey on the state of practice in DDS in which they investigated the criteria that influence task allocation decisions."]} +{"46853394|15412731": []} +{"16098902|16907530": ["Consequently, companies must adopt or adapt new practices in order to improve their results during the execution of a project [17].", "Many published SLRs present the existing problems in the area and their possible solutions [15], [17], [31], [34], [38].", "DSD researchers have been applying evidence based Software Engineering, in order to suggest appropriate solutions for practitioners working within this scenario [9], [17], [19].", "[17] investigated, through the execution of SLR6, the challenges of DSD and their mitigation strategies."]} +{"16098902|1750279": ["[2], [3] investigated concepts, practices, tools and challenges from the DSD architectural knowledge."]} +{"16098902|32856349": ["[8], [9] 2010 Engineering Management RQ1.", "[8], [9] conducted SLR5 to collect and systematize information regarding the difficulties in managing DSD projects and how to overcome them."]} +{"16098902|15412731": []} +{"16098902|11139156": ["Many published SLRs present the existing problems in the area and their possible solutions [15], [17], [31], [34], [38].", "[15], [16] 2009 Engineering Process RQ.", "[15], [16] investigated through SLR1 the use of Scrum practices in DSD projects."]} +{"207452672|15412731": ["The following section describes the results of a study on the practice of task allocation in GSD [23] and derives a set of requirements for a task distribution approach.", "We conducted a qualitative interview study with practitioners from various companies in order to identify the practice of task allocation and the applied criteria [23].", "The complete study can be found in the respective publication [23]; here, we will focus only on a brief summary of the \ufb01ndings related to task allocation."]} +{"4378525|32856349": ["Costa et al. [8] have identi\ufb01ed models and tools for supporting the GSD through a systematic literature review and found that since 2000 the number of studies on GSD has signi\ufb01cantly increased."]} +{"4378525|11139156": ["Hossain et al. [14] have conducted a systematic literature review that reports the use of Scrum practices in GSD projects.", "However, like other researchers of SLR this is not a systematic omission [14]."]} +{"1241729|15412731": ["According to a preliminary study, the work of Lamersdorf, M\u00fcnch and Rombach [17] identifies almost all factors that should appear in task or work-package allocation within GSD projects."]} +{"7211651|15412731": []} +{"7211651|205435103": ["For a fair comparison across studies, the data was normalized as performed in [1] (TABLE I).", "In this work, the guidelines provided by [5] the structure of the presentation of [1] are followed."]} diff --git a/edge/graph_52890526.jsonl b/edge/graph_52890526.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27a9137c536853f98ba47a1298873dd3d89f9db1 --- /dev/null +++ b/edge/graph_52890526.jsonl @@ -0,0 +1,16 @@ +{"208046901|17953874": ["Bioinformatics and biostatistics play important roles in such practices in establishing gene expression signatures or prognostic markers and in building up effi cient classifi ers (Asyali et al. 2006)."]} +{"3540990|11894197": ["Feature selection methods can be classified into three categories, depending on their integration into the classification method [4, 5, 8].", "[5], this article focuses only on penalization methods.", "the same time being far less computationally intensive than wrapper methods\u2019 [5].", "[5] and the \u2018Introduction\u2019 section for related discussions."]} +{"27328618|10542845": ["Hauschild and Pelikan 56 give a good introduction and review of developments in EDA, including the algorithm pseudo code."]} +{"27328618|1437067": []} +{"43257371|8281388": []} +{"43257371|11894197": []} +{"40595840|6923178": ["We then considered the Matthews correlation coefficient (MCC), which is generally regarded as a balanced measure between sensitivity and specificity [20]."]} +{"62215057|2746910": []} +{"2671553|1097238": []} +{"8580088|2746910": ["The second approach to maximize the robustness of feature selection is to create an ensemble of feature rankers [27], [37], [1], [23], [38].", "In order to improve the stability of feature selection techniques, researchers have proposed new frameworks such as ensemble feature selection methods [27], [37], [1], [23], [40], [38], [16], which require performing feature selection multiple times and aggregating the results produced."]} +{"8580088|11894197": ["Feature ranking (Figure 1) [28], [36], sometimes known as univariate feature selection, take each feature separately and tests it for its ability to distinguish between the classes.", "As one can see, when the number of features are large (tens of thousands in the case of DNA microarrays) this can become computationally expensive so as to be completely inappropriate for the problem at hand [28].", "Subset evaluation [28] looks at the possible subsets of features and tests them for their ability to differentiate between the classes."]} +{"11498334|11894197": ["In embedded approaches, the step of selecting an optimal feature subset is built into the classifier construction and the selecting can be seen in the combined space of feature subsets and hypotheses (Saeys et al., 2007).", "In the last decade, feature selection technique has become an important tool for lots of bioinformatics applications by microarray data, such as cancer classification, biologic network inference, expression correlation analysis and disease biomarker identification (Saeys et al., 2007).", "In general, most feature selection methods can be divided into three categories: filter methods, wrapper methods, and embedded methods (Saeys et al., 2007)."]} +{"30891966|36784649": ["Learning from single class data, also known as One-Class Classification (OCC), involves inducing a predictive model that distinguishes examples that belong to a given class from examples that do not belong to it [20]."]} +{"10175940|11894197": []} +{"25632931|11894197": []} +{"21783173|16049649": ["Many high-dimensional variable selection methods within the context of likelihood-based estimation have been developed, including penalized regression approaches, such as lasso (Tibshirani, 1996) and elastic net (Zou and Hastie, 2005); an overview is provided by Fan and Lv (2010)."]} diff --git a/edge/graph_52892854.jsonl b/edge/graph_52892854.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52894928.jsonl b/edge/graph_52894928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa2a54ae72ca495772519316bc3cec09515d304a --- /dev/null +++ b/edge/graph_52894928.jsonl @@ -0,0 +1,2 @@ +{"7922804|7788290": ["The rapid technological advancements in sensing and computing has resulted in large amounts of data warranting the development of new methods for their analysis."]} +{"9259040|1137487": ["See Ahmed et al. (2005), Fan and Jin (2010), Ghosh and Das (2008), and Wang (2011) for surveys of coverage problems, and see de Silva and Ghrist (2006, 2007) for topological approaches."]} diff --git a/edge/graph_52895823.jsonl b/edge/graph_52895823.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64cb19942b5e3eacf451da686301595d49c39042 --- /dev/null +++ b/edge/graph_52895823.jsonl @@ -0,0 +1,48 @@ +{"1413545|11414835": ["The SDN based schemes can be further divided into: hypervisor based [14] and pure SDN controller based [9], as shown in Fig.", "Enabling Schemes To perform network-wide resource allocation for multiple virtual networks, the enabling schemes can be mainly classified into two categories: scheduling based [6], [13] and software defined paradigm based [9] [14]."]} +{"3835691|2623404": ["Meanwhile, Software Defined Network (SDN) [6] has been envisioned as a new approach to enable network programmability to test out new protocols."]} +{"21723803|3119314": []} +{"17032900|17474643": []} +{"17046469|17474643": ["Opportunity 1 - Standards, Benchmarks and Marketplace\nEdge computing can be realised in practice and be made accessible publicly if responsibilities, relationships and risks of all parties involved are identified."]} +{"10506820|960896": ["This becomes complex in a multi-cloud environment [111,112] and in distributed cloud environments (given that nodes closer to the user could also be made accessible through a marketplace)."]} +{"10506820|17474643": ["However, alternate models of using cloud infrastructure instead of using data centers from a single provider have been proposed in recent years [2]."]} +{"10506820|2623404": []} +{"21318805|31193955": ["Although mechanisms to ensure isolation are well established in multi-tenant data centers or wired network domains [10], isolation is currently one of the main open research challenges in wireless network virtualization [11].", "[10] V."]} +{"16334756|122575": ["System administrators can use this capacity to consolidate many underutilized \nservers into only one machine, thus ensuring isolation and ef.cient performance [Whitaker et al. 2005] \nby expanding these capacities to clustering environments [Kiyanclar 2005]."]} +{"13694725|16654832": ["Resource-intensive workloads are intelligently offloaded to benefit from cloud resources (Shiraz et al., 2013a, Shiraz and Gani, 2012).", "The rich mobile application features demand adequate system resources due to computationally expensive operations involved in application execution (Shiraz et al., 2013a).", "\u2026practice exploits live or non-live patterns to move a complete virtual server across physical machines to successfully attain load balancing (Shiraz et al., 2013b, Yao et al., 2014), power efficiency (Dong et al., 2013; Mishra et al., 2012; Shrivastava et al., 2011), fault tolerance\u2026"]} +{"18253298|12817488": ["Many applications emerge to use WSNs especially for environmental monitoring, health monitoring, and vehicle tracking system, military surveillance and earthquake observation [1]."]} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"207250096|165863": []} +{"1130783|8909218": ["The wireless access base-station s can be either a WiFi access point, or a Femtocell network access point [23], or a macrocell base-station in cellular networks that manages the uplink/downlink communications of mobile device users."]} +{"42586153|12817488": ["WSN based solutions have been designed and applied not only in the monitoring and control applications, but also in diverse areas, including building automation, disaster and waste management, and moving targets [2, 3]."]} +{"20032492|3042864": ["One potential solution is for the mobile device to offload these computationally intensive tasks to a remote server [4], [5], either by setting up relay points throughout the area of interest or using satellite communication [6]."]} +{"23430031|10299098": ["There is another similar paradigm called Mobile Edge Computing, which was proposed by ETSI as a platform that pushes cloud computing capabilities closer to mobile devices in radio access networks (RAN) [18].", "Cooperative computing can also help in resolving this issue of unbalanced computation distribution [18]."]} +{"23430031|1599458": ["Many terms such as Context-awareness [3], autonomous control, ambient intelligence, cognitive IoT [4], semantic reasoning [5] etc.", "Many terms such as Context-awareness [3], autonomous control, ambient intelligence, cognitive IoT [4], semantic reasoning [5] etc. are associated with intelligence in IoT but each term only covers part of the whole picture."]} +{"23430031|1520906": ["These types of questions have motivated researchers to study about topics such as data-centric IoT [1], data mining in IoT [2], the interaction of arti\ufb01cial intelligence with IoT etc."]} +{"23430031|10329355": ["A survey of traffic management systems using wireless sensor networks has been done in [41]."]} +{"23430031|21386749": ["IoT offers the potential for many healthcare applications such as glucose level sensing, blood pressure monitoring, body temperature monitoring, medication management, rehabilitation system, wheelchair management, etc. [44]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"206779368|10355303": ["5In practical object tracking systems, this synchronization step is typically automated [19]."]} +{"62632124|1230643": []} +{"46587231|1442447": ["Indeed, as explained in [52], data interoperability is still one of the main concerns regarding IoT solutions, because di\ufb00erent architectures make frequently use of distinct semantic languages for data management and dissimilar protocols for data exchange."]} +{"3892521|8523192": ["In Computational Component, resources are virtualized amongMicro Computing Instances, (MCI), where the applications are assigned for execution [27].", "Hence, it reduces network load and ensures in-time service delivery [27]."]} +{"10295476|13794961": ["Recent literature provides some evidence whereby different data reduction methods enable big reduction in clouds [5].", "The literature review reveals that existing big data reduction methods work as cloud-centric approaches [5]."]} +{"12096080|57048228": ["User-centric context [41], [42] information helps"]} +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"24875288|3757239": []} +{"1203113|206578486": ["Recent technological developments in IoT, data analytics and latency-sensitive applications have pointed out the limitations of the centralized cloud model [16]."]} +{"5536800|12817488": ["Many applications have been emerged to use WSNs especially for the environmental, health monitoring, vehicle tracking system, military surveillance, and earthquake observation [1]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"44159318|3119314": []} diff --git a/edge/graph_52897226.jsonl b/edge/graph_52897226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71d38888c625ec8732a3c56bdce3ebcc835e1b8f --- /dev/null +++ b/edge/graph_52897226.jsonl @@ -0,0 +1,12 @@ +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"700267|8125630": []} +{"28895752|1520906": ["The authors of [40], [101] and [80] take a more things-centric perspective and argue for the analysis and compression of data before its transmission to a cloud.", "In all of the aforementioned cases, data must be directly analysed on the generating devices themselves and be reduced before transmission (see also [8, 26, 40, 80]).", "The design fits ideas mentioned in [40, 80, 101], whose authors\u2019 propose to reduce data locally before sending it to the cloud for analysis.", "Whenever the rate of data generation is higher than available bandwidth, data must be analysed on the generating devices themselves or at least be reduced before transmission into the cloud [40,80,101]."]} +{"28895752|44461432": ["This is in principle what cloud-based data processing proposes [19,23,31,43,76]: While the coordinator may consist itself of distributed components and solve the analyis problem in parallel, from the perspective of local nodes it looks like a single machine where all data is getting centralized.", "Some surveys [1, 12, 23, 31] mention the problem of big data analysis and propose centralized cloud-based solutions, following the paradigm of parallel high performance computing.", "The current focus is on the centralization of data in the cloud and its analysis by high performance computing [19, 23, 31, 43, 76]."]} +{"28895752|3918777": ["Also the underlying data distribution may change which is known as concept drift [117]."]} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} +{"5665800|303976": []} +{"125046646|4859605": ["For example, tag recommenders construct a graph with users, resources and tags, and recommend 43 a set of tags for a given user based on previously used and assigned tags [13,14]."]} +{"125046646|1805048": ["27 In contrast to the CB filtering, CF does not rely on items representations and its content [9]."]} diff --git a/edge/graph_52898429.jsonl b/edge/graph_52898429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52898497.jsonl b/edge/graph_52898497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa1f95344cee77ec7faac2ab26498ff6f39422d7 --- /dev/null +++ b/edge/graph_52898497.jsonl @@ -0,0 +1 @@ +{"12853768|14697846": ["This is an important feature not only to increase the accuracy of indoor localization (as neighboring light bulbs do not interfere with each other\u2019s transmissions) but also to realize visible light networking through neighbor and route discovery [27]."]} diff --git a/edge/graph_52898926.jsonl b/edge/graph_52898926.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d3684f071f4c78bc62e1d64b6e6320b5ba4bd1c --- /dev/null +++ b/edge/graph_52898926.jsonl @@ -0,0 +1,7 @@ +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"30444761|13093354": ["Most of these are surveys describing available methods and some domains of applications [13, 14]."]} +{"40373772|3348390": ["The wide usages of emerging mobile Internet and Internet of Things (IoT) in industries have changed the way that information is acquired, stored, accessed, and delivered (He and Xu 2015; Xu, He, and Li 2014; Perera et al. 2014)."]} +{"45016115|12904520": []} +{"35008509|16387640": []} +{"3518070|7350786": ["Recent developments demonstrate an increasing ef\ufb01ciency, availability and affordability of sensors, data acquisition systems and computer networks [1]."]} +{"3346652|12260867": ["From this stand\u00adpoint, and provided that \nrandom access is prohibitively expensive [Guha et al. 2003], performing linear scans of the data is the \nonly acceptable access method in terms of computational ef.ciency.", "Extracting potentially useful knowledge \nfrom data streams is a challenge per se."]} diff --git a/edge/graph_52899942.jsonl b/edge/graph_52899942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8704e26a882bfcb75f18257ec33a5c87b64a72a6 --- /dev/null +++ b/edge/graph_52899942.jsonl @@ -0,0 +1,24 @@ +{"30668315|393948": ["Reasons to learn features from raw data include that doing so often substantially improves performance (13, 25, 31); because such features can be transferred to other domains with small datasets (32, 33); because it is time-consuming to manually design features; and because a general algorithm that learns features automatically can improve performance on very different types of data [e.", ") are common across very different types of images (32, 33, 58).", "Deep learning can still benefit such projects through transfer learning (32, 33, 58), wherein a network can first be trained on images available in other large datasets (e."]} +{"30668315|11608263": ["Because these attributes are not mutually exclusive (especially for images containing multiple individuals), this task is a multilabel classification (55, 56) problem.", "A traditional approach for multilabel classification is to transform the task into a set of binary classification tasks (55, 57)."]} +{"7813115|513106": ["However, 90% or more of them are primarily self-taught [1,2], and therefore lack exposure to basic software development practices such as writing maintainable code, using version control and issue trackers, code reviews, unit testing, and task automation.", "30% or more of their time developing software [1,2]."]} +{"15793362|10500613": ["The technical needs regarding data curation are similar for all sciences (Freeman et al. 2005, Lord & MacDonald 2003, Raven et al. 1998)."]} +{"5394308|10500613": ["Note that this setup is not unrelated to that of relational schema matching [31], where mappings between attributes and relations are established."]} +{"24038949|3102110": ["There are many challenges and requirements of data mining like controlling various types of data, time complexity of data mining algorithms, certainty of results obtained through data mining, expressions of data mining results, data security and privacy [11]."]} +{"24038949|17403085": ["There are many advantages of data mining like it is helpful in banking, finance, accounting, retail, marketing, manufacturing, governments and many more [7]."]} +{"756704|49539405": ["Deep learning model We focused our experiments on the use of Convolution Neural Networks [29], which have been shown to considerably improve the accuracy of automated plant species identification compared to previous methods [20, 30, 31]."]} +{"1615788|14553382": []} +{"38522620|16449507": ["This kind of query is related to the relationships among data objects such as specified in the OPM model (Moreau et al., 2008)."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"34424801|16827727": ["The third distinguishing feature is its capability to support the creation and operation of Virtual Research Environments (VREs) [39], [40], i."]} +{"33283822|816774": ["the Grid consists of a set of resources upon which a pre-installed service middleware acts as a Resource Management System (RMS) to control the execution of Grid applications [12]."]} +{"206043|1230643": ["Index Terms\u2014 Species recognition, wild animal monitor, image classification, deep convolutional neural networks, large scale learning"]} +{"19118432|28368285": ["Globus Auth support for the OAuth 2 and OpenID protocols allows for the validation of credentials from any one of a number of identity providers deemed acceptable by the portal: for example, institutional credentials via InCommon (Barnett et al., 2011), ORCID, or Google identities."]} +{"4674847|5730706": []} +{"8103755|3900204": ["While using such approaches requires more technical expertise, they undoubtedly o\ufb00er versatility and scalability in the tuning of large-scale experiments [24]."]} +{"45203952|10859746": ["Boyd and Foody [42] survey recent developments in GIS and remote sensing and their impact on species distribution modeling."]} diff --git a/edge/graph_52902589.jsonl b/edge/graph_52902589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..272653831b5adad9a2c8899443f6690f38240b8b --- /dev/null +++ b/edge/graph_52902589.jsonl @@ -0,0 +1,2 @@ +{"3542909|579475": ["Industrial software agents [4] could be applied at device level to provide self-management features such as self-configuration, self-recovery and self-protection for iCPS."]} +{"3590834|35426346": ["Agent based concepts often tout self-adaptation [11] and self-organization [12] as major benefits and have been investigated for reconfigurable manufacturing [13-15]."]} diff --git a/edge/graph_52903603.jsonl b/edge/graph_52903603.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78fcbda9a3cead3572768064c1745651ecd5663c --- /dev/null +++ b/edge/graph_52903603.jsonl @@ -0,0 +1,2 @@ +{"6841982|468992": []} +{"6841982|23041951": ["and data origin authentication. In contrast to other \ufb01elds in which security-related research is being actively conducted, swarm robotic systems suffer a lack of practical solutions to these problems [18]. The security topic has been overlooked by state-of-the-art research mainly due to the complex and heterogeneous characteristics of robotic swarm systems \u2014 robot autonomy, decentralized control, a la", "rom academic institutions to the industry [3]. Previous works have emphasized the lack of general methods to tackle topics such as safety analysis, testing mechanisms [49], [40] or security protocols [18] for swarm robotic systems, which hinder the progress to more broader commercial applications. One of the main axioms in the swarm robotics \ufb01eld has been the absence of global knowledge or explicit co"]} diff --git a/edge/graph_52904093.jsonl b/edge/graph_52904093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e448fb01ebee98ade63b251f30d9c9f16745a529 --- /dev/null +++ b/edge/graph_52904093.jsonl @@ -0,0 +1,14 @@ +{"27847088|16362395": []} +{"60473076|6923178": []} +{"60473076|192934": []} +{"7763084|192934": ["An excellent review of all these methods and the future perspective on this topic refer to [24] and references therein.", "Pattern recognition algorithms typically involve three stages: (1) data acquisition, (2) data representation and (3) decision making [24]."]} +{"15243039|12663580": ["This approach builds the classification models having excellent generalization capability and thus is used in a very wide range of pattern recognition applications [40] ."]} +{"53285581|6414421": ["In fact, chaotic maps are used ordinarily in generating the encryption keys for the cipher structure [12], or for key generation from wireless channels [13]."]} +{"10882119|6682153": []} +{"10882119|11894197": ["Feature Selection methods can generally be divided into filter and wrapper methods (for reviews refer to [47], [48], [49]).", "Several test statistics have been proposed for feature selection [49]."]} +{"18899420|7399829": ["Fuzzy c-means clustering [35, 36] was applied to each of the feature to generate cluster center for two classes: \u201cnormal\u201d and \u201cseizure.", "Assigning membership function to the fuzzy input variables which are the features are extremely important and critical [35].", "We utilized fuzzy clustering to adaptively estimate the parameters for membership functions [35, 36]."]} +{"6860967|9247098": ["In the next decade, the revolution of developing new algorithms and artificial intelligent (AI) system and so many techniques such as higher order statistics (HOS), fuzzy logic (FL), artificial neural network (ANN), genetic algorithm (GA), computer-aided diagnosis (CAD) and many other [2] [3], will help clinicians to improve diagnosis efficiency and treatment that given to the patients."]} +{"45313126|14755547": []} +{"13945906|10290908": []} +{"14900571|10290908": []} +{"13692664|6332923": ["Therefore, it is necessary to develop an efficient model to ensure the security and integrity of the patient\u2019s diagnostic data transmitted and received from IoT environment [2]\u2013[8]."]} diff --git a/edge/graph_52914601.jsonl b/edge/graph_52914601.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6cfe0aa1c382e4300089e96078a3996b4631fd8e --- /dev/null +++ b/edge/graph_52914601.jsonl @@ -0,0 +1,9 @@ +{"10420934|15082313": ["These advances have prompted the development of a plethora of models of GRNs and algorithms to reverse-engineer them from expression data [2\u20135]."]} +{"13038008|3420321": ["A detailed explanation of these techniques is beyond the scope of this review, but can be found in [23,26-30]."]} +{"4233090|1188683": []} +{"7324039|3420321": ["2.1.3 Alignment detection and scoring The algorithmic approach used for technical sequence alignments is somewhat unusual, avoiding the precalculated indexes often used in NGS alignments (Li and Homer, 2010).", "The standard \u2018seed and extend\u2019 approach (Li and Homer, 2010) is used to find initial matches between the technical sequences and the reads."]} +{"13328114|3420321": ["Li and Homer (2010) showed that gapped alignment increases the percentage of reads mapped but that it did not reduce the percentage of reads incorrectly aligned.", "It has been shown (Li and Homer, 2010) that using accurate quality scores can reduce alignment errors by giving a lower penalty for a mismatch in a position with a low quality score.", "It complements previous studies that focused mainly on a reduced subset of mappers and/or empirically compared the performance of a small number of mappers (Flicek and Birney, 2009; Li and Homer, 2010; Trapnell and Salzberg, 2009).", "Despite some recent evaluation studies (Bock et al., 2010; Chatterjee et al., 2012; Li and Homer, 2010), determining the most accurate and fastest mappers for a particular application is still difficult.", "Sequencing platforms can produce reads in pairs, which can help to detect alignment errors and to improve sensitivity and specificity compared with using single-end reads (Li and Homer, 2010)."]} +{"205420407|3420321": []} +{"6576244|3420321": ["\u2022 Algorithmic features Gapped alignment: is important for variant discovery due to the ability to detect indel polymorphism [30].", "Similar to Li and Homer, Fronseca et al. [34] provided another classification study.", "There are many techniques used to build the index [30].", "For instance, Li and Homer [30] classified the tools into groups according to the used indexing technique and the features the tools support such as gapped alignment, long read alignment, and bisulfite-treated reads alignment."]} +{"14260647|534755": ["Motivated by this fundamental problem, there exists a number of NI approaches, which are compared in outstanding review articles (de Jong, 2002; van Someren et al., 2002; Gardner and Faith, 2005; Bansal et al., 2007, Ay and Arnosti, 2011; Wu and Chan, 2012; Emmert-Streib et al., 2014)."]} +{"2004416|3420321": []} diff --git a/edge/graph_52917851.jsonl b/edge/graph_52917851.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52927129.jsonl b/edge/graph_52927129.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..311b2f5ede96ccfdf0ff6d155a3ac2f9484f30c8 --- /dev/null +++ b/edge/graph_52927129.jsonl @@ -0,0 +1,5 @@ +{"61594575|885218": ["Information Extraction (OBIE) approach [14] and Semantic Annotation [15]."]} +{"67054161|7735275": []} +{"60315388|885218": []} +{"60315388|1142636": []} +{"23069127|16575201": ["Since ATR methods are mostly empirical, [19], we evaluate the results of the method in terms of precision and recall, [29]."]} diff --git a/edge/graph_52927750.jsonl b/edge/graph_52927750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c2a24d5efcb77ecbab2d0725c2fbdbd4fddef77 --- /dev/null +++ b/edge/graph_52927750.jsonl @@ -0,0 +1,4 @@ +{"55352479|12098072": ["Very\nrecently, a high performance coaxial magnetic gearing (CMG) device has been proposed [Atallah and Howe, 2001; Chau et al., 2008; Jian and Chau, 2009a].", "Very recently, a high performance coaxial magnetic gearing (CMG) device has been proposed [Atallah and Howe, 2001; Chau et al., 2008; Jian and Chau, 2009a].", "Recently, several types of concentrically arranged double-rotor electric machine for E-CVT propulsion have also been proposed [Hoeijmakers and Ferreira, 2006; Chau et al., 2008]."]} +{"17918063|12098072": ["In a conventional automotive electrical system, because most of the electric machines cannot offer high starting torque and wide speed range simultaneously, the starter motor and the generator have to be separately employed for engine cranking and battery charging, respectively [7], [8]."]} +{"7978698|17774971": ["826 Proceedings of the IEEE |V ol. 95, No. 4, April 2007 high-frequency pulsewidth-modulation (PWM) multilevel inverters, and the fundamental-frequency multilevel inverters [ 51 ], [52]."]} +{"12098072|8783262": ["The basic characteristics of an electric drive for EVs are the following [4]\u2013[6]:"]} diff --git a/edge/graph_52929809.jsonl b/edge/graph_52929809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17b150abe12d87f8a9e9f70b9de2c129a5f1dac8 --- /dev/null +++ b/edge/graph_52929809.jsonl @@ -0,0 +1,9 @@ +{"7176957|6116761": []} +{"215520737|7761990": ["Multimodality approaches Exploit joint information in several\nimaging modalities or other biomarkers at the same time\nMultimodal data fusion using ICA (Calhoun et al. 2009) Seemingly Unrelated Regression to pool information across simultaneous models (SUR; Jahanshad et al. 2013c) More work required to analyse multiple data modalities at once (e.g., anatomical MRI and DTI)\nnot replicate in subsequent analysis.", "By 2009, meta-analyses of GWAS from multiple elderly cohorts had implicated a trio of new AD risk genes\u2014CLU , CR1 and PICALM (Harold et al. 2009).", "Multimodality approaches Exploit joint information in several imaging modalities or other biomarkers at the same time Multimodal data fusion using ICA (Calhoun et al. 2009) Seemingly Unrelated Regression to pool information across simultaneous models (SUR; Jahanshad et al.", "Based on using multivariate statistics Use multiple predictors in the genome or image or both (reviewed inHibar et al. 2011a; Thompson et al. 2013; Meda et al. 2012);\nSparse regression (Vounou et al. 2010, 2012; Ge et al. 2012; Silver et al. 2012), compressive sensing, parallel ICA, machine learning methods\nCan search both the image and the genome simultaneously Difficult to apply to distributed remote datasets for meta-\nanalysis andmay be difficult to interpret the biological relevance of the signal\n3."]} +{"7470460|6116761": []} +{"4915926|2916525": ["Yet, imaging studies have also reported activations in the right-hemisphere (RH) homologs of the left-hemisphere language regions for a variety of language tasks, suggesting that the right hemisphere also plays some role in language processing (Binder et al. 1997; Fedorenko et al. 2010; Price 2012)."]} +{"775793|10725980": ["For wind instruments , researchers designed artificial mouths to play the trumpet [1], the trombone [2] or the clarinet [3]."]} +{"33609451|6116761": ["In contrast, functional networks are assembled from estimates of statistical dependencies between neuronal or regional time series data (Friston 2011)."]} +{"8458240|6116761": []} +{"26389483|6116761": []} +{"119290926|6875365": ["synchronization of phase oscillators applied to technological networks [35].", "Noteworthy, recently D\u00f6rfler and Bullo provided a comprehensive survey focused on the control of\n6\nsynchronization of phase oscillators applied to technological networks [35].", "For an overview of modern achievements and current open problems on the interdisciplinary research on power-grid dynamics we refer the reader to two recently published open issues [372, 373] and to the survey by D\u00f6rfler and Bullo [35], which offers an comprehensive review on applications of networks of phase oscillators to technological systems."]} diff --git a/edge/graph_52930201.jsonl b/edge/graph_52930201.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..728a4573e9cea1376a3890ec3983024cd63ec2fe --- /dev/null +++ b/edge/graph_52930201.jsonl @@ -0,0 +1,13 @@ +{"40035418|11608263": ["[1], the existing methods for multi-label classification are grouped in two main categories: algorithm adaptation and problem transformation.", "Multi-label classification [1] is a classification paradigm where examples are simultaneously associated with a set of labels Y \u2286 L.", "Table 7 shows the macro and micro averaged F-Measures [1]."]} +{"3129447|11608263": ["Recently, there has been a lot of efforts in addressing the multi-label problem [26].", "Multi-label classification studies the problem in which a data instance can have multiple labels [26]."]} +{"12782613|11608263": ["The simplest of all transformations is the Binary Relevance (BR) method (Tsoumakas and Katakis, 2007), to which the Classifier Chains (CC) method (Read et al., 2009) is closely related.", "The simplest of all transformations is the Binary Relevance (BR) method (Tsoumakas and Katakis, 2007), to which the Classifier Chains (CC) method (Read et al."]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} +{"3964893|11608263": []} +{"7679549|11608263": ["The binary context as used in ECC usually entails considerable redundancy in the learning space, as also noticed in the case of the multi-label binary approach in Yan et al. (2007). Some other methods have also been used in the literature for reducing the complexity of binary relevance problems by taking advantage of label sparsity using compressive sensing techniques (Tai and Lin 2010; Hsu et al.", "The most common problem transformation method is the binary relevance method (BR) (Tsoumakas and Katakis 2007; Godbole and Sarawagi 2004; Zhang and Zhou 2005).", "Here, Label Cardinality (LCARD) is a standard measure of \u201cmulti-labelled-ness\u201d, introduced in Tsoumakas and Katakis (2007). It is simply the average number of labels associated with each example; defined for N examples as:"]} +{"13856501|11608263": []} +{"16897832|1929234": ["ture selection can be seen in [7], [8], [12], and [13], which focus mainly on non-EC-based methods.", "Although there are some existing fast evaluation measures, such as mutual information [12], [32], [34], [240], they evaluate features individually rather than a group of features."]} +{"16916712|11608263": ["The multi-label learning algorithms are roughly divided into two types: transformation methods and adaption methods [24, 25].", "To the best of our knowledge, several metrics were designed for multi-learning classification [24], i.e. Hamming loss, one-error, coverage, ranking loss and average precision."]} +{"7537097|11608263": ["Then, we elaborate the algorithm difference phenomenon in Section II-C.", "It would then output the prediction result which is a set of labels (Step 5)."]} +{"4538136|812303": ["Music genre classi\ufb01cation is a widely studied problem in the Music Information Research (MIR) community [40].", "Most published music genre classi\ufb01cation approaches rely on audio sources [2, 40]."]} +{"4538136|11608263": ["Multi-label classification is a widely studied problem [14, 43]."]} +{"3104861|11608263": ["\u2026classification, rather than multi-label classification as in this work. proposed EA was tested in three datasets extracted from the Mulan Repository [33], and compared to two efficient MLC algorithms (as recommended by Madjarov et al. [14]): Binary Rel-evance [31, 32] and Classifier Chain [24].", "Given a query instance, this bipartition separates the labels into relevant and irrelevant ones. majority of works in the literature follow the taxonomy proposed by Tsoumakas et al. [31], which divides MLC methods into problem transformation (PT) and algorithm adaptation (AA)."]} diff --git a/edge/graph_52930812.jsonl b/edge/graph_52930812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9cdf5df1f4e2163ece45df45d311522936c262fc --- /dev/null +++ b/edge/graph_52930812.jsonl @@ -0,0 +1,2 @@ +{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]} +{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]} diff --git a/graph_5293125.jsonl b/edge/graph_5293125.jsonl similarity index 100% rename from graph_5293125.jsonl rename to edge/graph_5293125.jsonl diff --git a/edge/graph_52931356.jsonl b/edge/graph_52931356.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b6b8be4fa65ef54ee1887b70758323848e0ac91 --- /dev/null +++ b/edge/graph_52931356.jsonl @@ -0,0 +1,24 @@ +{"14081058|6923178": []} +{"13805036|192934": ["Numerous approaches have been introduced in the literature aiming to provide effective and efficient classification systems [19]."]} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} +{"206712901|14745481": ["Some surveys only considered attacks in specific applications or environments, such as [32], [33], [45] and [47].", "[45] combines social trust and quality-ofservice trust for Mobile Ad Hoc Networks (MANETs)."]} +{"206712901|2294541": ["Although there are several survey papers about computational trust [29] [30] [31] and global trust/reputation related attacks [32], [33] [34], the main contribution of this paper includes:", "classified attacks in reputation systems into self-promoting, whitewashing, slandering, orchestrated and denial of service [34].", "[34] provides a survey about potential attacks and defense techniques in reputation (global trust) systems.", "It is very easy for attackers to get into the systems in many open environment applications [34], which include online social communities.", "According to [34], attackers can be classified into insiders and outsiders.", "Selfish attackers launch attacks for their own benefits, while malicious attackers aim to degrade others\u2019 trust and then affect the system\u2019s performance [34] [126]."]} +{"206712901|10137283": ["[32] discusses the concept of trust in the field of computer security.", "Some surveys only considered attacks in specific applications or environments, such as [32], [33], [45] and [47].", "Although there are several survey papers about computational trust [29] [30] [31] and global trust/reputation related attacks [32], [33] [34], the main contribution of this paper includes:", "Similar to [32], [33] also discusses the potential usage of trust in E-commerce to counter attacks."]} +{"206712901|2162062": ["Massa reviewed some challenges in trust management systems in [44]."]} +{"15585869|9240891": []} +{"8503200|2609569": ["All rights reserved."]} +{"45694754|1805048": []} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"45705641|9240891": ["It may be periodically refreshed or revoked, and must be able to adapt to the changing conditions of the environment in which the trust decision was made [10].", "\u2013 Trust should be subjective: Trust is inherently a personal opinion which is based on various factors or evidence, and that some of those may carry more weight than others [10].", "\u2013 Trust can be a composite property: Trust is really a composition of many different attributes: reliability, dependability, honesty, truthfulness, security, competence, and timeliness, which may have to be considered depending on the environment in which trust has been specified [10]."]} +{"207230419|14745481": ["In Computing and Networking , the concept of trust is used in many different \ufb01elds ranging from arti\ufb01cial intelligence to human\u2013machine interaction to networking (e.g., telecommunication, social network analysis, communication networks, and cyber/network security) [Cho et al. 2011; Adal\u0131 2013].", "\u2026path, node density, reachability), fault tolerance (e.g., system lifetime), cooperative or sel\ufb01sh behaviors (e.g., forwarding or dropping packets), and network capacity (e.g., traf\ufb01c or congestion) [Daly and Haahr 2009; Desmedt et al. 2007; J\u00f8sang 1999; Lana and Westphall 2008; Cho et al. 2011].", "The agent can make a decision based on learning from past experience to maximize its interest (or utility) and/or minimize risk [Cho et al. 2011; Li et al. 2008].", "Various security applications using trust, including intrusion detection, secure routing, key management, and access control, have been studied extensively in the literature [Cho et al. 2011].", "Past surveys on trust research are often limited to a particular research domain, such as trust metrics in data fusion [Blasch et al. 2014], trust management in mobile ad hoc networks (MANETs) [Cho et al. 2011], and trust and reputation systems in online services [J\u00f8sang et al. 2007].", "\u2026goal in a situation where imperfect knowledge is given with uncertainty and vulnerability Lee et al. [2006] Computing & Networking Estimated subjective probability that an entity exhibits reliable behavior for particular operation(s) under a situation with potential risks Cho et al. [2011] \u2014", "\u2026concept, the term has been used in different disciplines to model different types of relationships: trust between individuals in social or e-commerce settings, trust between a person and an intelligent agent in automation, and trust between systems in communication networks [Cho et al. 2011]."]} +{"53231033|8760041": ["Many modern incremental learers rely on a local partitioning of the input space, and a separate classification/regression model for each partition [160, 121, 148, 18, 21]."]} +{"17689312|6950376": []} +{"17689312|2294541": []} +{"17689312|18194234": []} +{"17689312|1462862": []} +{"17689312|10137283": []} +{"17689312|9240891": []} +{"43327535|1333339": []} diff --git a/edge/graph_52932642.jsonl b/edge/graph_52932642.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..069fbf23da3f9a77a696f919b7b8ebe6d5f3e300 --- /dev/null +++ b/edge/graph_52932642.jsonl @@ -0,0 +1,35 @@ +{"14056601|42449870": ["As an intelligent spectrum-sharing technology, the CR has the ability to sense the conditions of the wireless communication networks and learn from the environment to adjust the transmission parameters such as frequency band, modulation mode, and transmission power [15]."]} +{"13753893|20612430": ["In earlier works of the authors, a comprehensive survey of various approaches that have been investigated and employed in achieving optimal (or nearoptimal) solutions for RA in CRN has been carried out, with their pros and cons highlighted and discussed [5]."]} +{"13753893|12601073": ["In its design, CRN enables an allotted spectrum space to be used by two different networks, a primary and a secondary one, under certain preconditions agreed upon by both networks [1]."]} +{"14628743|12452682": []} +{"56532193|15040462": []} +{"18439755|2509135": []} +{"22121314|3055684": ["In addition, it provides untethered mobility and improves the ability to deploy sensor nodes in hard-to-reach places [4]."]} +{"22121314|12060835": ["EH enables WSNs to address the conflicting design goals of lifetime and performance [3]."]} +{"126353737|2509135": []} +{"25315262|8974063": ["which should consist of spectrum sensing, spectrum decision, spectrum sharing and spectrum mobility [2], [3]."]} +{"45001963|15116409": ["In the literature, a number of spectrum sensing algorithms have been proposed (see [3, 26, 27] for an overview)."]} +{"17661425|2509135": []} +{"19760877|2509135": []} +{"19760877|1236072": []} +{"19760877|12060835": []} +{"59993342|2509135": []} +{"59993342|7482876": []} +{"59993342|13367219": []} +{"59993342|1708582": []} +{"19353103|7525856": ["Several surveys have specifically focused on spectrum sensing [39], [40], spectrum access techniques [41], spectrum decision [42], and spectrum assignment techniques [43], [44]."]} +{"19353103|8606364": ["Survey papers which focused on spectrum occupancy measurement campaigns in cognitive radio networks are discussed in [45] and [46].", "There has been handsome amount of research on PU activity modelling and spectrum occupancy measurements [45], [46], [211]\u2013[214]."]} +{"19353103|512561": ["Such applications include medical services [77], vehicular communication [78], cognitive radio sensor networks [79], [80], wireless sensor networks [81], emergency and public safety applications [82], military applications [83], unmanned aerial vehicles [84], smart grid [85], [86], Internet of Things (IoT) [87], cognitive cellular networks [88], cognitive radio enabled femtocells [89], green powered cognitive radio networks [90], [91], and broadband access [92]."]} +{"19353103|1686572": ["their intrinsic characteristics, such as dynamic spectrum access and intelligence functionality [27]\u2013[32], [175].", "Reliability, security threats, and detection in cognitive radio networks have been widely surveyed in [27]\u2013[32]."]} +{"19353103|8974063": ["Several surveys have specifically focused on spectrum sensing [39], [40], spectrum access techniques [41], spectrum decision [42], and spectrum assignment techniques [43], [44]."]} +{"19353103|7800459": []} +{"19353103|14552902": ["Bruno and Nurchis [51] provide a detailed survey of network coding in wireless mesh networks."]} +{"19353103|5428176": []} +{"16011840|31973880": ["However, the SU will impose challenges for preserving the desired quality of service (QoS) of the PU, mainly including four aspects: spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility [3\u20135]."]} +{"8931739|15116409": ["The TPS detects the PU activities by various existing spectrum-sensing technologies, such as energy detection [25].", ", Sk(t), and the accuracy of the spectrum-sensing techniques [25]."]} +{"8931739|12060835": []} +{"32436897|2443013": ["Moreover, the real-time packets can be transmitted over all RBs, whereas the non-real-time packets can only be put in some RBs during transmission [14]."]} +{"8470766|3042022": []} +{"2502726|8909218": ["Most importantly, a femtocell-based deployment can work with existing mobiles but only requires installation of a new transceiver device or an access point that uses licensed spectrum [30]\u2013[32]."]} +{"13655066|15116409": []} +{"13655066|8974063": []} diff --git a/edge/graph_52934309.jsonl b/edge/graph_52934309.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52935365.jsonl b/edge/graph_52935365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..497a99f1c602d1af999f05a98f866633a08cb9a2 --- /dev/null +++ b/edge/graph_52935365.jsonl @@ -0,0 +1,2 @@ +{"107726186|905827": ["There has been a substantial amount of research on the development of various condition monitoring techniques over the past 15 years [1,2,3,4,5,6].", "A research towards different techniques in combination with advanced computerized data acquisition and processing gives the new direction in the field of induction motor online condition monitoring [2,3]."]} +{"37866783|905827": ["These stator spectral components can include voltage, current, and power and are used to detect turn faults, broken rotor bars, bearing failures, air gap eccentricities [17-18].", "This technique overcomes problems of the bispectrum that is not convenient for detection purposes [18]."]} diff --git a/edge/graph_52935423.jsonl b/edge/graph_52935423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a109e896dff16bee53c2f7dc5eb95d1a2436e0fe --- /dev/null +++ b/edge/graph_52935423.jsonl @@ -0,0 +1,82 @@ +{"7220735|2623404": []} +{"20815533|2623404": ["First adopted in datacenters, SDN is now considered for WAN, mobile networks and wireless networks [8], [9]."]} +{"14173470|14276831": ["See [33] for an overview of protection algorithms."]} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"15971774|11735843": ["SDNs allow networks to be programmable through the separation of the control plane and the data plane, as well as through the support of high-level control abstractions [147], [148]."]} +{"15971774|2295142": ["While there exist quite a few survey papers on multipathing protocols, these papers are typically confined to particular networking configurations (such as wireless sensor networks [40]\u2013[42], mobile ad hoc networks [43]\u2013[45], etc."]} +{"26199576|10837932": []} +{"3431971|2623404": ["[7] and NFV [8] based integrated space-terrestrial satellite"]} +{"3431971|10693567": ["We define the time between the generation of OpenFlow packet and corresponding bundle packet as the tunnel processing delay.", "To the best of our knowledge, we are the first ones to deploy OpenFlow over DTN.", "That is, OpenFlow data is transmitted in a bundle tunnel when the controller (GEO satellite) sets up connection to switches (MEO satellites) and when controllers send instructions to switches.", "The four OpenFlow enabled switches are divided into two layers, the aggregation layer and the access layer.", "space networks and deploy OpenFlow [14] in both space", "We adopt DTN [13] in the space networks and deploy OpenFlow [14] in both space networks and terrestrial networks.", "WedeployOpenFlow (v1.", "We implement SERvICE in a real and large prototype, which has more than 40 nodes with the help of DTN and OpenFlow.", "Then, we give a description of the implementation of the prototype with the help of the Delay Tolerant Network (DTN) and OpenFlow.", "The scheme is a spaceground integrative network and is deployed by OpenFlow and network virtualization.", "POX is a popular lightweight controller for OpenFlow networks and we use POX for the reason that it is written in python and is convenient to add functions in it.", "We use OpenFlow as the southbound interface protocol because it is widely used in the SDN-related\ncontroller and switch.", "The small data center network contains four OpenFlow enabled switches and four servers.", "The signaling data of the OpenFlow signaling packets between controller and switches are taken out and then encapsulated in payload data."]} +{"3144446|61132": ["Also, UAVs are widely employed in military applications as border surveillance and reconnaissance missions [1]."]} +{"17445732|18392886": ["But in the existing networks, automatic reconfiguration is virtually nonAthmiya N S, Department of Telecommunication, MSRIT, Bangalore, India (nsathmiya@gmail.com)\nShobha K R, Department of Telecommunication, MSRIT, Bangalore, India (shobha_shankar@gmail.com) ValluriSarimela, Central Research Laboratory, BEL, Bangalore, India (vallurisarimela@bel.co.in)\nexistent, resulting in poornetwork management.", "But in the existing networks, automatic reconfiguration is virtually nonAthmiya N S, Department of Telecommunication, MSRIT, Bangalore, India (nsathmiya@gmail.com)\nShobha K R, Department of Telecommunication, MSRIT, Bangalore, India (shobha_shankar@gmail.com) ValluriSarimela, Central Research\u2026"]} +{"35014689|8974063": ["In cognitive radio, one can use SDR to improve the quality of service for secondary users by analyzing the characteristics of each band and choosing the one that improves user QoS [18].", "Most of the previous work has been focused on leveraging the SDR programmability to improve radio spectrum usage and efficiency [18, 24, 29, 30]."]} +{"49421410|14132386": []} +{"49421410|1230643": ["2 In WSNs, sensor nodes can be randomly deployed, in essence allowing opportunities for applications even in inaccessible areas [1]."]} +{"18089827|2623404": ["More recently, network research has been associated with SDNs that decouple the control plane and data plane from each other [15]."]} +{"6903769|2623404": ["In [2], the authors present the results of their survey on implementation, testing and applications of SDN."]} +{"3653694|2535224": ["Sensor node status is included in the status/topology updates recived by the SDN Controller [6]."]} +{"3653694|1230643": ["Most of these applications involve the monitoring of health care, sound, climate or temperature, observing smart environments, applicable in military sensor networks, and in personal usages [1]."]} +{"18516571|10693567": ["Software defined network (SDN) is a novel network architecture proposed by Cleanslate research group [24]."]} +{"9031324|2623404": []} +{"9031324|10693567": ["Further, De Gante et al. [14] discussed some important issues to be handled in the future, including the synchronization of the network states, the necessity of the distributed controller, the security of the central controller and the applicability of Openflow [15].", "Considering the issues of load balance and energy consumption, Han and Ren [19] proposed a WSN optimization method based on the Openflow, as shown in Fig.", "[14] discussed some important issues to be handled in the future, including the synchronization of the network states, the necessity of the distributed controller, the security of the central controller and the applicability of Openflow [15]."]} +{"522228|61132": ["In [12], the authors have discussed the possibility of using SDN for managing the network layer for UAV based networks, but the discussion does not explore the dependencies between radio and network layers in networks using line-of-sight radios."]} +{"522228|10686346": ["OSPF was chosen for the performance baseline as it is widely used, including for aerial networks [10], and has been studied in detail for its convergence, scalability, and performance in wireless networks [14]."]} +{"16450671|2535224": []} +{"7225479|2623404": ["The network and storage level mechanism combines ideas from SDN [1] and Software Defined Storage (SDS) [3], while the network, storage and compute levels build upon the concept of Software Defined Environments (SDE) [4].", "Software Defined Networking (SDN) [1] is a new and promising approach for creating flexible networks, whose functions can be programmed, defined, and controlled by means of software."]} +{"3225335|25911553": []} +{"3225335|3799929": []} +{"3225335|34643772": []} +{"3225335|7525856": []} +{"3225335|8606364": ["CRN radio resource allocation has been discussed in [59]\u2013[61], and green energy-powered CRNs have been presented in [60] and [62]."]} +{"3225335|512561": ["CRNs, especially cognitive radio sensor networks (CRSNs) [246], can greatly benefit from energy harvesting approaches [247]."]} +{"3225335|1541773": ["Energy conservation is an important research domain in wireless communications [60], [62], [250]."]} +{"3225335|8650651": []} +{"3225335|4122595": ["2) Hardware Imperfections: Hardware imperfections in CRNs [107], such as non-linear distortions, phase noise, non-ideal frequency responses of circuits, power amplifier"]} +{"3225335|11414835": ["Network virtualization allows multiple virtual networks to operate over a given single physical network [267]\u2013[270]."]} +{"3225335|1686572": ["Surveys on MAC protocols for CRNs are provided in [50] and [51], while the security, privacy, and threats of CRNs have been surveyed in [52]\u2013[58].", "However, various CRNs related threats, such as primary user emulation (PUE) attacks [56] and others, as discussed in [58], have not been analyzed for FD-CRNs."]} +{"3225335|8974063": []} +{"3225335|8909218": ["2718618 This exceptional growth has motivated the development of next generation wireless technologies, such as femtocells [2], [3],"]} +{"10807928|2623404": ["presented a survey on Software-Defined Networking, focusing on OpenFlow [9].", "In SDNs [9], the programmable data plane stops at the switching elements.", "Several manufacturers sell today programmable switches and routers [9], and there are many commercial and educational SDR platforms on the market [10], spanning several frequency bands.", "Authors in [9] also did not discuss the importance of network virtualization or data plane programmability.", "Currently, OpenFlow is also implemented in hardware on several commercial switches and routers [9]."]} +{"10807928|3189715": []} +{"1212816|61132": ["Performance of the cooperation between a swarm of UAVs depends on reliability of communication and networking schemes [5] [6]."]} +{"14543932|18685876": ["The majority of cubesat programs utilize the Ultra High Frequency/Very High Frequency (UHF/VHF) transceivers for downlink communication with no inter-satellite links [51].", "These two systems support numerous S-Band frequencies (2-4 GHz) and work with a variety of communication protocols and encryption schemes [51]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"14246903|2623404": []} +{"14246903|10693567": ["inspects the packet, decides what the appropriate action is and instructs the switch to execute this action for all packets of this particular flow [6]."]} +{"17088097|6305682": []} +{"17088097|17683338": []} +{"27442330|10693567": ["SDN-based approaches, while very successful in wired network environments [26] [27], have received a limited attention for IoT/M2M applications."]} +{"27442330|3330461": ["Despite D2D communications representing an interesting opportunity to mitigate the risks of encountering performance bottlenecks at the evolved NodeB (eNB) base stations [7] [8], the projected large volume of generated data will still put a significant burden on the network."]} +{"27442330|7644489": ["Despite D2D communications representing an interesting opportunity to mitigate the risks of encountering performance bottlenecks at the evolved NodeB (eNB) base stations [7] [8], the projected large volume of generated data will still put a significant burden on the network."]} +{"27442330|2003896": ["In particular, networks will have to accommodate larger quantities of data as they pave the way to mobile crowdsensing [9] and even anticipatory mobile computing [10] scenarios."]} +{"341121|2623404": ["Various open interfaces [3] have been defined to communicate between the control plane and data plane (south bound interface), and OpenFlow [4] is a de-facto standard."]} +{"15556933|10859599": ["For a broad overview of MANET security architectures, the reader is referred to the comprehensive surveys [13], [14] and [15]."]} +{"7544466|2623404": ["INTRODUCTION The recent advances in the development of software defined networking (SDN) make the programmable control plane in the wired network a reality by separating the control and data plane[1], [2], [3], [4]."]} +{"12644300|61132": ["The backbone mesh network, whose nodes are the backbone node drones (BND), is a flying ad-hoc network (FANET), an ad-hoc network that is a particular class of Mobile Ad-hoc NETworks (MANET), also classifiable as a subset of Vehicular Ad-hoc NETworks (VANET) [34].", "(MANET), also classi\ufb01able as a subset of Vehicular Ad-hoc NETworks (VANET) [34]."]} +{"12644300|2623404": ["SDNs and NFV, on the other hand, are two paradigms for network softwarization, the \ufb01rst aimed at decoupling the control plane from the data plane [26,27], and the second enabling the network infrastructure to be virtualized as building block classes and functions managed by a centralized\u2026"]} +{"30494956|7644489": ["It is straightforward to argue that there will be situations and circumstances where proper LTE service does not exist [9]."]} +{"8871801|2387055": []} +{"63820645|17248887": []} +{"63820645|2623404": []} +{"63820645|10693567": []} +{"63820645|2387055": []} +{"15859714|1230643": ["Major platforms are ZigBee, MeshLogic [2, 3] (Table II)."]} +{"77367|13785718": []} +{"33564714|2623404": ["As noted in [1], the idea of programmable networks has been explored for more than 20 years, but it has gained awareness and momentum through the creation of the Open Network Foundation, which is developing open standards for SDN [3].", "Network control is held within software-based controllers, which are, at least logically, centralized [1]."]} +{"22582078|9495329": ["However, an interesting argument of the works covered in [213] is that IoT urban deployments should allow for the same set of sensor nodes to support multiple applications from multiple developers across the same shared physical infrastructure via software only.", "Moreover, substantial research on interconnecting Wireless Sensor Networks (WSNs) into wider IoT frameworks by leveraging SDN and virtualization has already been completed [213], [218].", "We mention this work to provide another aspect of emerging technologies with regard to SDN-IoT infrastructure, and refer the reader to [213], [221], for a more complete overview.", "As a result, anywhere from 20 billion to 50 billion devices are projected to connect to the Internet by 2020 [213], and many network operators are also trying to adapt their networks for what is now being dubbed the Internet of Things (IoT).", "However, work to optimize \ufb02ow scheduling for the backbone network is still not fully developed [213].", "\u2026of application requirements as they relate to QoS and geographical sensor location, inner sensor node con\ufb01gurations, sharing of sensors amongst competing applications, transmitting optimized and QoS-aware data \ufb02ows towards end-servers, and ef\ufb01cient distribution of data for cloud processing [213].", "Additionally, fully centralized SDN controller architectures do not adequately address the different access networks expected to comprise the urban-scale IoT mobile multi-networks, such as LTE, WiFi, or ZigBee [213].", "For instance, the concept of Information-Centric Network (ICN) is combined with virtualization in [213] and [226] to provide network slicing and node caching within a wireless network.", "While we provide a brief description below, we refer the reader to [213] and [221] for further details.", "For instance, a natural application to address the heterogeneous QoS requirements of IoT is to include network slicing [213]."]} +{"22582078|6583734": ["A greater variety of network functions considered for NFV can be found in [2] and [114]."]} +{"22582078|2623404": ["Network operators are also challenged to address new routing protocols aimed at improving efficiency of content delivery and content availability for their clients [2], [58].", "One such architecture is Information-Centric Networking (ICN) or Content-Centric Networking (CCN) where packets are routed based on desired content instead of traditional, location-based, addressing [58]."]} +{"19132048|10693567": ["OpenFlow [2] have attracted a lot of attention from both the industry and research institutes."]} +{"3474164|24110634": []} +{"3474164|13991708": ["Recently Fraga-Lamas et al. [70] reviewed the possibility of applying IoT to warfare to increase ef\ufb01ciency."]} +{"3474164|17683338": ["Dynamic memory management on the other hand is \ufb02exible as it provides for allocation and de-allocation of memory at run-time [132].", "Other available operating systems include MultimodAl system for NeTworks of In situ wireless Sensors (MANTIS), Nano-RK and LiteOS [132] however there is little or no implementation of these operating systems in SDN-based management of WSNs but rather for ordinary WSNs. Table 4 compares the\u2026", "Contiki supports dynamic memory management and memory block functions but does not provide a management mechanism for memory protection between function executions [132]."]} +{"3474164|1230643": ["Multi-hop techniques based on short range radio communication such Meshlogic and ZigBee [46] have been proposed [108] for dense WSNs enabling consumption of less energy compared to direct communication.", "A network with high security features should be developed to meet these requirements however, the challenge here is the limited resource in bandwidth and energy inherent to WSNs [46,47]."]} +{"3474164|10532321": ["OpenFlow [20,21,58] is standard commonly used as a southbound interface [27] and most vendors are producing more OpenFlow capable network infrastructure.", "These rules are then used to enforce policies on the network hardware using OpenFlow [20,21,58,63]."]} +{"3474164|9494512": ["Other energy management schemes such as energy provisioning using batteries and energy harvesting have been been presented in the past years [43]."]} diff --git a/edge/graph_52937033.jsonl b/edge/graph_52937033.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..223a8c18f957b232dc2cdc50e43bb4552a39d8c2 --- /dev/null +++ b/edge/graph_52937033.jsonl @@ -0,0 +1 @@ +{"8163493|6444031": ["There is a large body of literature on mitigating Sybil attacks (for example, see surveys [41, 59, 65])."]} diff --git a/edge/graph_52938010.jsonl b/edge/graph_52938010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2973e02296cc2c777abc8cae4cafe36acf70fa58 --- /dev/null +++ b/edge/graph_52938010.jsonl @@ -0,0 +1,16 @@ +{"14004362|763939": ["One list of criteria comes from a survey of vehicular simulation techniques for mobile ad hoc networks [5]."]} +{"26465309|207179384": []} +{"3799929|31973880": ["Most of the above mentioned techniques are based on a set of measurements sampled at the Nyquist rate and can sense only one band at a time because of the hardware limitations [31].", "In addition, sensing a wideband spectrum requires dividing it into narrow bands and making SU sense each band using multiple RF frontends simultaneously [31].", "can be recovered from far fewer measurements and at a lower rate (below Nyquist rate) compared to that of traditional methods [31], [33]."]} +{"3799929|7525856": ["can be recovered from far fewer measurements and at a lower rate (below Nyquist rate) compared to that of traditional methods [31], [33]."]} +{"3799929|8606364": ["Many of these works consider only simple but important statistics of the spectrum occupancy, such as the maximum or the minimum and the average of power levels, the spectrum occupancy, and the duty cycle [80].", "to quantify and study the PU spectrum utilization and assess the current status of the spectrum [80]\u2013[82]."]} +{"3799929|512561": []} +{"3799929|8974063": ["\u2026requires the monitoring and observation of the RF environment, as well as the monitoring and awareness of PU s activities in these channels [75]. a) RF environment characterization This process estimates some of the following key parameters to characterize the different spectrum bands.", "There are also approaches that try to predict future PU activities and thus locate future spectrum opportunities by using learning techniques and by exploiting the history of spectrum band usage [75], [81].", "This rate may vary depending on the modulation scheme and the interference level of the channel [75]. b) PU activity modeling As spectrum availability depends not only on the RF environment characteristics but also on the activities of PU s, it is crucial that PU activities are taken into account\u2026"]} +{"3799929|17062686": ["trading process to obtain the highest profit [153], [159], [160].", "Spectrum trading can be done between PUs and SUs or among SUs only [153].", "3) Spectrum Trading: Spectrum trading could be seen as the economic aspect of spectrum sharing [153].", "there are multiple firms that provide the same service, making it necessary for firms to consider each other\u2019s strategy [153]."]} +{"15454609|16298606": ["We expect that SpotME users may be willing to contribute to this common pool as they now have the possibility to obfuscate their whereabouts directly on their mobile phones."]} +{"5934298|13372227": ["Finally, the adversary may estimate the user location by using cellular positioning techniques [34], e."]} +{"20906400|26429034": ["Additionally, the relevance of massive movement data from mobile subscribers is critical in research disciplines such as physics, sociology or epidemiology [5]."]} +{"33795167|14745481": []} +{"33795167|2294541": []} +{"1585853|2294541": []} +{"1083483|7216886": ["[141] (privacy-preserving data publishing), Bertino et al."]} +{"9772641|26429034": ["1 reports, for each mobile subscriber, an identi\ufb01er , 1 The actual precision (e.g., in space and time) of the information recorded varies signi\ufb01cantly with the nature of the probes used for data collection [4].", "They have become an important instrument for large-scale analyses in sociology, demography, epidemiology, and computer science: recent surveys are available in [3, 4]."]} diff --git a/edge/graph_52938664.jsonl b/edge/graph_52938664.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dfd11e76ab0652f434e93d885e4c157165984862 --- /dev/null +++ b/edge/graph_52938664.jsonl @@ -0,0 +1,29 @@ +{"4697208|14843594": ["Bayesian optimization (BO) is a well-established methodology to optimize expensive black-box functions [20]."]} +{"59159135|14843594": ["This distribution is then used to construct a surrogate utility function called acquisition function, which is cheap to evaluate and finally optimised to recommend the next function evaluation point while keeping a trade-off between exploitation and exploration [9,22]."]} +{"7277001|10542845": ["We used an EDA with a Gaussian copula function (GCEDA) [10].", "Three meta-heuristics for parameter optimization were investigated in the experiments: Genetic Algorithm (GA) [8], Particle Swarm Optimization (PSO) [9] and Estimation of Distribution Algorithms (EDA) [10]."]} +{"19120340|19502816": ["We use a modi\ufb01cation of the Alpine 1 function [Jamil and Yang, 2013] as a synthetic test case for warm-starting: where s is a shift parameter that is used for generating similar datasets.", "2]. Kernel hyperparameters were set to their posterior means, inferred via MCMC with the NUTS sampler [Hoffman and Gelman, 2014]. 5.1 Synthetic Function We use a modi\ufb01cation of the Alpine 1 function [Jamil and Yang, 2013] as a synthetic test case for warm-starting: f(x;s) = xsin(x+ \u02c7+ s) + x 10 ; where sis a shift parameter that is used for generating similar datasets. We used s = 0 as the target function, and then c"]} +{"19120340|14843594": ["A thorough introduction to Bayesian optimization is given by Shahriari et al. [2016]."]} +{"209878392|16532505": []} +{"209878392|16925069": ["In contrast, nonnegative matrix factorization (NMF) produces sparse positive feature vectors and is thus widely used for clustering and interpretability [23, 39, 44]."]} +{"209878392|7782275": ["Meta-learning is the process of learning across individual datasets or problems, which are subsystems on which standard learning is performed [26]."]} +{"2472445|14659766": [", 2014b] basis [Rice, 1976; Smith-Miles, 2009; Kotthoff, 2014] has been successfully addressed by using EPMs to predict the performance of all candidate algorithms and selecting the one predicted to perform best [Brewer, 1995; Lobjois and Lema\u0131\u0302tre, 1998; Fink, 1998; Howe et al."]} +{"2472445|2840997": ["SAT is the prototypical NP-hard decision problem and is thus interesting from a theory perspective; modern SAT solvers are also one of the most prominent approaches in hardware and software verification [92]."]} +{"88505641|9316331": ["The node evaluation in ML-Plan is based on random path completion as also used in Monte Carlo Tree Search (Browne et al., 2012)."]} +{"51870469|14843594": []} +{"19971112|14843594": ["KEYWORDS Black-Box Optimization, Bayesian Optimization, Gaussian Processes, Hyperparameters, Transfer Learning, Automated Stopping", "In the case of Bayesian Optimization, previous work either assigns them a particularly bad objective value, attempts to incorporate a probability of infeasibility into the acquisition function to penalize points that are likely to be infeasible [3], or tries to explicitly model the shape of the infeasible region [11, 12].", "These approaches are fundamentally Bayesian in nature, hence this literature goes under the name Bayesian Optimization.", "Black\u2013box optimization makes minimal assumptions about the problem under consideration, and thus is broadly applicable across many domains and has been studied in multiple scholarly fields under names including Bayesian Optimization [2, 25, 26], Derivative\u2013 free optimization [7, 24], Sequential Experimental Design [5], and assorted variants of the multiarmed bandit problem [13, 20, 29].", "While some authors have claimed that 2\u00d7Random Search is highly competitive with Bayesian Optimization methods [20], our data suggests this is only true when the dimensionality of the problem is sufficiently high (e.g., over 16)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"39582432|14659766": ["The advances of algorithm selection in SAT and CP in the last decade rely on two facts (Kottho\ufb00, 2014).", "In this domain, extensive algorithm portfolios have been proposed following Gomes and Selman (2001) and signi\ufb01cant advances regarding algorithm selection have been made in the last decade (see Kottho\ufb00 (2014) for a survey; section 2).", "\u20262007; Xu et al., 2008; O\u00b4Ma-hony et al., 2008; Hutter et al., 2009; Kottho\ufb00, 2012), SATzilla is considered to be the most prominent one after Kottho\ufb00 (2014), as it has dominated the SAT competition for years, continuously extending its approach and improving its performances (Xu et al.,\u2026"]} +{"39582432|1805048": ["Collaborative \ufb01ltering (Su and Khoshgoftaar (2009); Bobadilla et al. (2013); section 3), popularized by the Net\ufb02ix challenge (Bennett and Lanning, 2007), exploits the user data (the items she liked/disliked in the past) and the community data (recording which user liked which items), to recommend\u2026", "Referring the interested reader to Su and Khoshgoftaar (2009); Agarwal et al. (2013) for a comprehensive survey, let us describe recommender systems, focusing on the collaborative \ufb01ltering (CF) approach popularized by the Net\ufb02ix challenge (Bennett and Lanning, 2007), before introducing some\u2026"]} +{"22057273|7782275": ["According to Lemke et al. (2015), a meta-learning system must fulfill two properties:\n1.", "Plenty of work has been done in that area and can be found in some recently published books and surveys: Brazdil et al. (2009), Vilalta and Drissi (2002), Lemke et al. (2015).", "Plenty of work has been done in that area and can be found in some recently published books and surveys: [4, 38,65].", "[38], a metalearning system must fulfill two properties: 1."]} +{"45426075|7782275": ["In this paper, we propose to view recommendations from a meta-learning perspective [28, 18]."]} +{"61555154|5281246": ["Independently, algorithm selection has also been intensively investigated in the \ufb01eld of supervised machine learning (ML) under the name of meta-learning (see e.g. [KH03, Kal02, BGCSV09, SVKB13]).", "An on-going work concerns the use of ARS to handle algorithm selection on top of the Weka [HFH + 09] and RapidMiner [HK13, SVKB13] platforms; in particular, the results should give some insights into the quality of the initial descriptive features, pioneered in [Kal02, KH03]."]} +{"61555154|1805048": []} +{"14285169|5281246": ["A full literature review about IDAs (including these approaches) can be found in our survey [13]."]} +{"44616828|5281246": []} +{"261945|5281246": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|14659766": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|2840997": ["applications including formal verification [81], scheduling [20], planning [59] and graph coloring [110]."]} +{"54012359|14843594": ["See (Shahriari et al., 2016) for a review."]} +{"20025704|5281246": ["Therefore, there is a need for systems that automate this process and guide the data analyst in the search for a learning algorithm that better suits a given dataset [1]."]} +{"52133902|7782275": ["The use of a feature-selection algorithm can be an alternative to deal with this problem (Lemke et al., 2015; Pinto et al., 2016)."]} +{"196200552|1452734": []} diff --git a/edge/graph_52942144.jsonl b/edge/graph_52942144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52943736.jsonl b/edge/graph_52943736.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f2ab1e6275de24d3a47158023339b7b9895c235 --- /dev/null +++ b/edge/graph_52943736.jsonl @@ -0,0 +1,18 @@ +{"1243598|595093": []} +{"45482943|191396": []} +{"5709977|5646762": ["have been proposed, for instance, prototype-based methods [9]\u2013[12], evolutionary clustering [13]\u2013[17], graph-based methods [18], [19], density-based clustering [20], [21], kernel"]} +{"5709977|191396": ["ATA clustering plays an indispensable role in various fields, such as computer science, medical science, social science, and economics [1]\u2013[8]."]} +{"3761528|191396": ["On the other hand, partitional clustering creates the partition that will try to optimize the clustering criterion (Jain et al. 1999; Xu and Wunsch 2005)."]} +{"10715058|1691571": []} +{"10715058|18722099": []} +{"19757338|192934": ["Clustering learning and classification learning are two major tasks in the domain of pattern recognition [1]."]} +{"38141526|191396": []} +{"11619972|191396": ["As one of the most fundamental unsupervised learning tasks in machine learning and computational intelligence, clustering has been widely studied and applied in various domains (Punj & Stewart, 1983; Steinbach, Karypis, & Kumar, 2000; Xu & Wunsch, 2005)."]} +{"27548747|239537": ["Node-link diagrams and adjacency matrices are the preferred visualization method for network and graph data [14].", "Most network analysis studies still use relatively common visualization layout algorithms, such as circular or force-directed, to represent complex networks [14]."]} +{"35912405|393948": []} +{"13013889|191396": ["Cluster analysis is a popular and powerful data analysis tool in diverse fields as science, engineering and business (1-3).", "1 ( ) || ( ) || t t t t x x f x f x \uf06c \uf02b \uf03d \uf02b \uf0d7\uf0d1 \uf0d1 , (2)"]} +{"12681677|54134680": []} +{"205465496|3330313": ["This process distinguishes and removes anomalous samples from datasets [14]."]} +{"206550568|191396": []} +{"39206997|191396": []} +{"39206997|12894036": []} diff --git a/edge/graph_52945502.jsonl b/edge/graph_52945502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4371271e847ac18a585c8113e2990b6e40f23409 --- /dev/null +++ b/edge/graph_52945502.jsonl @@ -0,0 +1,36 @@ +{"49269667|6909107": ["The second is a Mobile Edge Cloud (MEC) scenario [10], in which the server is located inside the core network and close to the base stations."]} +{"25942523|11452661": []} +{"18305749|525062": []} +{"18305749|1299833": []} +{"18305749|15516254": []} +{"18305749|15040462": []} +{"16154628|1708582": ["one new message every 1 to 100 seconds [1-100, 1-200, 1-300, 1-400, 1-500] seconds", "Smart-DTN-CC is based on reinforcement learning [16], a machine learning technique which, given the current environment, takes"]} +{"206812902|1299833": ["Currently, many other existing protocols [8] also depend on the use of explicit notification messages, such as route-failure and route-reestablishment notification messages.", "One possibility is for the intermediate node to send an explicit route-failure notification message [8] to the source so as to reobtain a new BaseRTT.", "Also, in many related proposals, a node detecting a route breakage will send an explicit route-failure notification message to the sender [8].", "Accordingly, there are several proposals using routerelated notification messages to improve the TCP performance over MANETs (refer to survey paper [8])."]} +{"41487437|525062": ["Also, an \u201cout-of-sequence delivery\u201d incurs packet reordering in the upper layers more, but packet reordering is not a rare event in current high-speed networks, and there are some mechanisms to alleviate the reordering problem [13]."]} +{"3850485|3540699": ["Hence, if a multimedia packet is not received at the destination before its delay deadline, all the packets that depend on that packet should be purged from the transmission buffer to avoid unnecessary congestion, since these packets are not usable at the decoder side."]} +{"10045759|14098594": []} +{"741064|15971774": ["[154] investigated multipath transmission on the transport layer, despite their main focus on networklayer multipath routing.", "There are only a few surveys [7, 45, 67, 153, 154, 163, 183] that touch on the same topic as ours.", "Survey Year Application Transport IP Link Physical Cross-layer Network Environment [163] 2012 \u221a \u221a Scheduling, tunneling \u221a Wireless [67] 2013 \u221a \u221a Scheduling, tunneling \u221a General [7] 2013 \u221a Tunneling General [45] 2015 \u221a Routing \u221a Wired [183] 2015 \u221a \u221a Routing \u221a \u221a \u221a Wired [154] 2015 \u221a Routing \u221a General This survey 2015 \u221a \u221a Scheduling, tunneling \u221a \u221a General", "For example, [86, 108, 154, 174, 193] mainly focused on the control plane problem (i.", "We refer the readers to articles and recent surveys that cover such work [86, 108, 154, 174, 193]."]} +{"741064|14077349": []} +{"741064|2295142": ["For surveys on multipath transmission in sensor networks, we refer the readers to [156]."]} +{"23636858|1846371": []} +{"11526412|8650651": ["[20] provide an overview that includes: monolithic control plane architectures for single domain transport networks (SDON) and the second evolutionary steps of T-SDN based on hierarchical control plane architectures for multi-domain transport networks.", "Reference [20] focused on SDN research activities for optical access, metro and core networks, with a special focus on passive optical access."]} +{"11526412|11414835": ["A survey and categorization of hypervisors for SDN is provided by [12]."]} +{"11526412|17248887": ["Up to 2014, most of the research efforts shared a common target: to enable the optical data plane to be directly controlled by an SDN/OpenFlow controller [15], [58]."]} +{"11526412|2623404": ["we refer the interested reader to [7] and [23]\u2013[25]."]} +{"11526412|10693567": ["Multiple survey papers on SDN have been recently published [6], [7], [10], [11].", "datacenters and enterprises (which mostly use networks based on packet switching) have experienced a fast development of SDN solutions and worldwide SDN deployments [6], [7]."]} +{"11526412|2387055": ["SDN architecture introduces both threads and solution capabilities on security due to the centralized control plane [7], [245]."]} +{"11526412|1580493": ["implement SDN concepts into single domain optical networks for a unified control of optical and IP layers [13]\u2013[17]."]} +{"53873796|5895133": ["In other words, current scavenging protocols can successfully realize a lower-than-best-effort priority only if the bottleneck buffer operates according a DropTail discipline."]} +{"16630086|15947359": ["audio and video) along with scalar data from the environment and transmit them to a base station (sink node) [3]."]} +{"28143006|2623404": ["A comprehensive survey of SDN architecture and applications can be found in [203]."]} +{"28143006|14961769": ["[33] provide a short survey of low latency datacenter networking by reviewing approaches taken to achieve low latency, namely reducing queuing delay, accelerating retransmissions, prioritizing mice flows and utilizing multi-path."]} +{"163275|10559330": []} +{"9122404|2623404": ["Interested readers are referred to [12], [13] and the refere nc s therein."]} +{"9122404|7971188": ["From a networking perspective, CMuHC will inevitably require the formation of a peer-to-peer overlay in order to orchestrate the participation of multiple users in additio n the facilitation of a number of other necessary functions perta ining to the tasks of overlay maintenance and operation [9]."]} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"62841414|52945502": [", Stream Control Transmission Protocol (SCTP), Quick UDP Internet Connections (QUIC), and Multi-path TCP (MPTCP) [14].", ", by explicitly signaling the delay between the reception of a packet and its ACK) and more efficient loss detection and recovery [14].", "In particular, the research community has recently shown a renewed interest in topics related to the transport layer, with novel transport protocols and extensions to TCP such as, e.g., Stream Control Transmission Protocol (SCTP), Quick UDP Internet Connections (QUIC), and Multi-path TCP (MPTCP) [14]."]} +{"62841414|1846371": ["First of all, it is designed to be deployed on top of UDP to avoid any issue with middleboxes in the network that do not forward packets from protocols other than TCP and/or UDP [13]."]} +{"56951449|15040462": []} +{"39349665|2623404": ["OpenFlow [115] emerges as a paradigm for future network architecture [116] and motivates related research [117]."]} +{"15688399|1110872": []} +{"18788088|14077349": ["The previous intelligent scheduling mechanisms to keep in-order delivery all ignored packet losses and became fragile in lossy networks."]} diff --git a/edge/graph_52947558.jsonl b/edge/graph_52947558.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03b6e3ec133034fdfcade4bf8568ff3c8c2dc253 --- /dev/null +++ b/edge/graph_52947558.jsonl @@ -0,0 +1,5 @@ +{"10267890|4528002": ["In [1], the authors provide an overview of all the different approaches used to investigate these security issues and list the solution that have been proposed to increase their safety."]} +{"31567351|206739910": ["Therefore, we used the LISA dataset [14], a U."]} +{"29198319|4528002": ["Modern cars contain 30\u2013100 ECUs, which are embedded computers that communicate with each other, creating the in-vehicle network [10].", "The implementation of OBD systems has been mandatory in vehicles sold in the United States since 1996, in gasoline-powered vehicles in the European Union (EU) since 2001, and in diesel-powered vehicles in the EU since 2004 [10]."]} +{"21671170|206739910": ["Machine learning approaches[12] were unable to handle different aspect ratio and variable size images and features have to be manually hand engineered which is very time consuming and error prone process."]} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} diff --git a/edge/graph_52947736.jsonl b/edge/graph_52947736.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0baed0e598fcdd88e18ef688291e221a3c6cfba4 --- /dev/null +++ b/edge/graph_52947736.jsonl @@ -0,0 +1,13 @@ +{"6034383|7983519": ["In contrast to most algorithms for the generation of referring expressions, which have aimed to produce distinguishing descriptions when these exist (Krahmer and van Deemter, 2012), the core idea behind this algorithm is to generate what is likely for a speaker in a visual domain."]} +{"1033682|174797842": []} +{"51878778|1770055": ["Automatic image captioning requires the understanding of the visual aspects of images to generate human-like descriptions (Bernardi et al., 2016)."]} +{"3873857|1770055": ["There are many ways to perform this task (see [5] for a recent review)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"6308361|7983519": ["A good survey of work in this area is provided in Krahmer and van Deemter (2012).", "Previous work on REG has made significant progress toward understanding how people generate expressions to refer to objects (a recent survey of techniques is provided in Krahmer and van Deemter (2012))."]} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} +{"9682853|7983519": ["Krahmer and van Deemter (2012) and van Deemter et al. (2012a) survey recent literature on REG."]} +{"11933981|1770055": ["As such, there is an urgent need to develop new automated evaluation metrics for this task [8,9]."]} +{"8745888|7983519": ["Referring expression generation is a classic NLP problem (see e.g., [54, 31]).", "Specifically, our model is based upon recently developed methods that combine convolutional neural networks (CNNs) with recurrent neural networks (RNNs)."]} +{"19158922|1770055": ["In-depth study of these different models is beyond the scope of this article and falls within the surveys such as [5]."]} +{"206592484|456491": []} +{"1921738|1634674": ["Body-worn sensors have been extensively used to recognise activities in mobile and daily life situations [16, 18]."]} diff --git a/edge/graph_52948845.jsonl b/edge/graph_52948845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33db26cddc7b09dbc555b3e17416dba3b3c7d312 --- /dev/null +++ b/edge/graph_52948845.jsonl @@ -0,0 +1,31 @@ +{"31022395|2623404": ["However, it suffers from scalability and latency issues [4].", "Nevertheless, the advent of the OpenFlow interface has given a new lease on life to SDN [4].", "[4] B."]} +{"18319131|2623404": ["SDN: Network control in SDR is decoupled from forwarding and directly programmable, which enables the underlying infrastructure to be abstracted for applications and network services and treats the network as a logical or virtual entity [8]."]} +{"9347297|207262843": []} +{"32911245|2623404": ["Since wireless networks bring more latency and packet loss than the traditional SDNs, some previous works focus on control plane problems in wireless networks [14]."]} +{"2305273|1932843": ["Previous work on Reinforcement Learning typically do not consider highdimensional perceptual inputs [48]."]} +{"30654518|18392886": []} +{"30654518|15035771": ["Furthermore, trade-offs concerning some concepts such as perormance, resiliency, availability, reliability and flexibility have to e taken into account by network designers and managers while esigning a network architecture [29] ."]} +{"52120577|7942157": []} +{"52120577|4572654": ["An extensive survey of LAA and Wi-Fi coexistence has been carried out in [3].", "the overview provided in [3] by considering different unlicensed LTE versions (including LTE-LAA and others) under development and their impact on the performance of Wi-Fi", "Different countries have their own requirements for unlicensed operations in 5 GHz [3].", "Interested readers can refer to [3] and the references therein for more details on LAA Wi-Fi coexistence and corresponding deployment scenarios."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"64794439|206578197": ["In current literature, authors proposed that an SP expresses its demand as the aggregated demands of its user equipments (UEs) [2]\u2013[6].", ", time, frequency and capacity region) [2]."]} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"13755264|61132": ["While there are various studies on e2e routing for ad hoc and vehicular networks, UAV networks are still in a nascent stage with many open challenges [4].", "IEEE Communications Magazine \u2022 January 2018 21 [4] L."]} +{"206935716|18392886": []} +{"6839111|6583734": ["These applications can also be assisted by software-defined network function virtualization (VFN) which decouples the network functions from the hardware [46]."]} +{"6839111|2623404": ["Softw aredefined networking (SDN) has shown its important role in the wired networks by decoupling the control plane and data plan e [17], [18]."]} +{"107137336|2623404": []} diff --git a/edge/graph_52954708.jsonl b/edge/graph_52954708.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f353621f27200735603565beb42c0b57552a51f2 --- /dev/null +++ b/edge/graph_52954708.jsonl @@ -0,0 +1 @@ +{"3921134|3504276": ["W IRELESS communication powered by ambient or dedicated radio-frequency (RF) sources has drawn significant attention recently [1], [2]."]} diff --git a/edge/graph_52956660.jsonl b/edge/graph_52956660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52961407.jsonl b/edge/graph_52961407.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b147ad13d510bf1e4802fca9c9c7a40e5f6b1c4c --- /dev/null +++ b/edge/graph_52961407.jsonl @@ -0,0 +1,10 @@ +{"49319682|14889616": []} +{"67865667|31245252": ["Furthermore, billions of new devices, mobiles, and smart sensors are connected to the Internet under the concept of Internet of Things (IoT) [4]."]} +{"67865667|3297262": ["Besides, there is no standardized protocol for CDN where different companies may develop it based on their demands, regardless of the implementation and deployment cost.", "Hence, Content Delivery Networks (CDNs) have been introduced, that consist of deploying an overlay web-caching at the application layer on top of the current Internet architecture.", "However, deploying addons solutions such as CDN on top of IP model, that has many other security and mobility patches, makes it more complex [1].", "Hence, Content Delivery Networks (CDN) [1] has been introduced that consists of deploying an overlay web-caching at the application layer on top of the current Internet architecture."]} +{"33627357|763939": []} +{"33627357|207424517": []} +{"49863277|36400013": []} +{"3583771|206584087": ["detection and defense mechanisms [81] might be relevant for ICN DoS mitigation."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"17632086|16844049": []} diff --git a/edge/graph_52963392.jsonl b/edge/graph_52963392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_52964983.jsonl b/edge/graph_52964983.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55f315d18a937b324f4051150ed4c56af11fa9a3 --- /dev/null +++ b/edge/graph_52964983.jsonl @@ -0,0 +1 @@ +{"3384796|8450611": ["Extensive overviews of state-of-the-art traffic classification can also be found in [20], [28], [17], [24] Taxonomy of internet traffic classification as analyzed and proposed by Zhang et al. [32] Encryption is an effective way of protecting the traffic from unauthorized observation."]} diff --git a/edge/graph_52965836.jsonl b/edge/graph_52965836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0cdd0c3d2ec02c2abcb42360423eab72f70081a --- /dev/null +++ b/edge/graph_52965836.jsonl @@ -0,0 +1,19 @@ +{"6960803|1805048": ["Our prototype used a hybrid recommendation approach, as such approaches have been shown to out-perform more traditional types of recommenders [17] and provide more \u201cmoving parts\u201d to explain."]} +{"4733166|18986679": ["This has been an important topic in visual analytics over the last few decades (De Oliveira & Levkowitz, 2003)."]} +{"49560076|22753124": []} +{"49560076|1386147": []} +{"34971290|3886594": ["Other relevant literatures where information is transfered between two or more entities can be witnessed in multi-agent coordination [8] and machine teaching [55]."]} +{"34971290|9588126": ["Other relevant literatures where information is transfered between two or more entities can be witnessed in multi-agent coordination [8] and machine teaching [55]."]} +{"2567332|7360895": ["These works, however, apply only to behaviors in specific domains."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"5063596|7306130": []} +{"5063596|17779926": ["Other works explored how to design for implicit interaction with sensing-based systems [14, 75, 86, 175], and help people predict what will happen through feedforward [12, 176].", "Furthermore, while rule extraction is an old research area, and quite separated from the recent developments in iML and FAT, there have been new papers within the past few years, such as methods for rule extraction from deep neural networks [187, 75]."]} +{"44063479|3342225": ["Recently, the research of methods for explaining black box decision systems has caught much attention [17].", "First, we assume that an explanation is interesting for a user if it clarifies why a specific decision pertaining that user has been made, i.e., we aim for local explanations, not general, global , descriptions of how the overall system works [17].", "In the cases in which the training set is available, classification rules are also widely used to avoid building black boxes by directly designing a transparent classifier [17] which is locally or globally interpretable on its own [23, 25, 39].", "Other approaches, more related to the one we propose, address the problem of explaining the local behavior of a black box [17]."]} +{"1913691|393948": ["Ultimately, to reach a level of usable intelligence, we need (1) to learn from prior data, (2) to extract knowledge, (3) to generalize, (4) to \ufb01ght the curse of dimensionality, and (5) to disentangle the underlying explanatory factors of the data (Bengio et al., 2013)."]} +{"1913691|14843594": []} +{"16332034|393948": ["Although DNNs offer tremendous bene\ufb01ts to various applications, they are often treated as \u201cblack box\u201d models because of their highly nonlinear functions and unclear working mechanism [3]."]} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} +{"13722414|13991708": []} +{"13722414|8604408": ["Recent work aiming to integrate deep learning and Bayesian models within a uniform probabilistic framework appears promising in this context (Wang and Yeung, 2016).", "It is unclear at present what is the best approach for capturing such linkages, though the work on Bayesian deep learning appears to be a promising direction (Wang and Yeung, 2016)."]} diff --git a/edge/graph_52965917.jsonl b/edge/graph_52965917.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa6325eb0d433df8afe3a14bfff2852f30546ff5 --- /dev/null +++ b/edge/graph_52965917.jsonl @@ -0,0 +1,7 @@ +{"8049057|393948": ["(Bengio et al., 2013)."]} +{"52156796|191396": []} +{"2088679|393948": []} +{"2973030|17069874": []} +{"67129075|206485791": ["However, the diversity of performance of na\u00efve sparse representation and na\u00efve collaborative representation for image classification has the following points [7,8].", "First, na\u00efve sparse representation method has higher computational cost than na\u00efve collaborative representation method for image classification [7,8].", "The test sample will be classified into one class, which makes residual of this class be least [8].", "Sparse representation is effective for image processing [7,8].", "Second, na\u00efve sparse representation performs more robust sparsity than collaborative representation method for image classification [7,8]."]} +{"31793010|17252389": ["Salient object detection methods commonly serve as the first step for a variety of computer vision applications including image and video compression [15, 20], image segmentation [10], content-aware image editing [9], object recognition [44, 48], visual tracking [2], non-photo-realist rendering [43, 16], photo synthesis [6, 14, 19], information discovery [35, 53, 8], image retrieval [18, 12, 8], etc."]} +{"206592484|456491": []} diff --git a/edge/graph_52978586.jsonl b/edge/graph_52978586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97ccc24b2c849729eca95ccabee6538a9856758e --- /dev/null +++ b/edge/graph_52978586.jsonl @@ -0,0 +1,11 @@ +{"6276737|7971188": ["A comparison of DHT algorithms can be found in [33]."]} +{"6276737|14697846": ["A P2P system is a distributed system in which a transient population of peers self-organize into an overlay network on top of the substrate Internet to share computing power, storage, and communication bandwidth [2].", "Peer arrivals and departures, collectively called peer churn , differentiates P2P systems from other types of distributed systems [2]."]} +{"6276737|713082": ["A survey of IP multicast can be found in [10]."]} +{"8363089|14889616": ["Scalable video codec can be scalable in temporal, spatial, and quality or combination of these aspects [25]."]} +{"8363089|7971188": ["A more elaborated comparison between these topologies can be found in [15, 16]."]} +{"15264793|973730": ["Many multimedia applications, such as NetTV and news broadcast, involve live media streaming from a source to a large population of users [18].", "There have been significant studies on video over IP multicast in the past decade; see a survey in [18]."]} +{"16401231|14889616": ["Figure 1 shows a simple P2P network, where six peers v1 \u223c v6 participate in the SVC streaming distribution.", "Under the prioritized context of source, the content priority of SVC is imposed on the underlying sequential bandwidth auction in order to improve the overall video quality at all peers.", "Moreover, in the context of SVC, a higher layer can be decoded only if all its lower layers are successfully received.", "A SVC streaming generally consist of a base layer which alone provides an acceptable basic quality, and multiple enhancement layers with a flexible multidimension layer structure to progressively refine the video quality.", "The incorporation of SVC into P2P streaming exhibits a promising approach for scalable video delivery to a large number of heterogeneous receivers [7, 18, 24].", "Layered source coding, such as JVT/MPEG scalable video coding (SVC) [25, 30], provides a convenient way to perform source-based rate adaptation to the changing network conditions.", "Suppose that the SVC stream is encoded into M video layers at the source node, with layer 1 representing the base layer and layer 2 \u223c M representing the progressive enhancement layers."]} +{"53463219|3200945": []} +{"6746361|14889616": []} +{"214976|14889616": []} +{"214976|973730": ["To address this, various streaming systems have proposed using scalable coding techniques such as layered coding [12], [25]."]} diff --git a/edge/graph_52981002.jsonl b/edge/graph_52981002.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..212a137f04ca1348971f9831d5ad494d6f30f387 --- /dev/null +++ b/edge/graph_52981002.jsonl @@ -0,0 +1,55 @@ +{"4715758|3212631": ["Modeling and exploiting other agents\u2019 behaviors in a multi-agent system (MAS) have received much attention in the past decade [4, 12, 16, 23, 24]."]} +{"4715758|13171013": ["The literature contains numerous studies of MAS modeling [7, 10, 27] and investigations of non-stationarity issues [16]."]} +{"51609030|1708582": ["However, this is rare: it is much more likely that the agent will be handed an incomplete or inaccurate model, in which case we end up in a reinforcement learning (RL) setting [Kaelbling et al. , 1996] in which the agent needs to adapt or even needs to learn from scratch."]} +{"53246844|10725980": []} +{"1708582|17464562": []} +{"19706|1708582": ["For more information on reinforcement learning techniques, [230, 14, 118] are good starting points."]} +{"3508403|13171013": ["This has been empirically proved to be efficient at increasing the likelihood of discovering the optimal joint policy in stochastic environments and avoiding agents gravitating towards a sub-optimal joint policy [Bloembergen et al., 2015; Palmer et al., 2018; Panait et al., 2006; Wei and Luke, 2016]."]} +{"3263887|1708582": ["A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al. [2015]. We also assume that the reader has a basic background in game theory and gametheoretic notations like Nash equilibrium and Pareto efficiency.", "The Dec-POMDP model is an generalization of the (single-agent) MDP [Bellman, 1957] and POMDP [A\u030astro\u0308m, 1965] models which were developed in OR, and later became popular in AI as a framework for planning for agents [Kaelbling et al., 1996, 1998].", "For more details we refer the reader to the texts by Russell and Norvig [2009], Puterman [1994], Sutton and Barto [1998], Kaelbling et al. [1998] and Spaan [2012].", "A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al.", "A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al. [2015]. We also assume that the reader has a basic background in game theory and gametheoretic notations like Nash equilibrium and Pareto efficiency. Even though these concepts are not central to our exposition, we do place the Dec-POMDP model in the more general context they offer. For an explanation of these concepts, the reader could refer to any introduction on game theory, such as those by Binmore [1992], Osborne and Rubinstein [1994] and Leyton-Brown and Shoham [2008]. This book heavily builds upon earlier texts by the authors.", "A good first introduction to these concepts can be found in the textbook by Russell and Norvig, with additional details in texts by Sutton and Barto [1998], Kaelbling et al. [1998], Spaan [2012] and Kochenderfer et al. [2015]. We also assume that the reader has a basic background in game theory and gametheoretic notations like Nash equilibrium and Pareto efficiency. Even though these concepts are not central to our exposition, we do place the Dec-POMDP model in the more general context they offer. For an explanation of these concepts, the reader could refer to any introduction on game theory, such as those by Binmore [1992], Osborne and Rubinstein [1994] and Leyton-Brown and Shoham [2008]."]} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} +{"3577937|1708582": ["However, Wei and Luke [35] note that the choice of temperature moderation factor for the Boltzmann selection method is a non-trivial task, as Boltzmann selection is known to struggle to distinguish between Q-Values that are close together [13, 35]."]} +{"3577937|13171013": ["Multiagent reinforcement learning (MA-RL) is known for being challenging even in environments with only two implicit learning agents, lacking the convergence guarantees present in most single-agent learning algorithms [3, 18]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"9316331|10725980": ["Coquelin and Munos [68] demonstrate that \ufb02at UCB retains the adaptivity of standard UCT while improving its regret bounds in certain worst cases where UCT is overly optimistic.", "Nijssen and Winands [155] also describe a multi-player version of their MCTS-Solver (4.5)."]} +{"580203|13171013": [", [13, 15], rather than on designing new learning algorithms.", ", direct reciprocity [4, 5, 6, 7], indirect reciprocity [8], norm enforcement [9, 10], simple reinforcement learning variants [3], multiagent reinforcement learning [11, 12, 13, 14, 15], spatial structure [16], emotions [17], and social network effects [18, 19]."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"8532635|1708582": ["This \u201coptimism in the face of uncertainty\u201d (Kaelbling et al., 1996) technique is widely used in many RL algorithms.", "One of the difficulties with Boltzmann Selection is that when Q-values are close (and importantly, when they are all small), Boltzmann Selection does not distinguish among them well (Kaelbling et al., 1996).", "LMRL2 begins using a modified version of Boltzmann Selection (Kaelbling et al., 1996), but when the temperature drops below some minimum value, it suddenly jumps to a fully greedy strategy (that is, = 0)."]} +{"19141434|9588126": []} +{"9072400|13171013": ["For a more elaborate introduction to replicator dynamics, and their relationship with RL, we refer to [7].", "[7] Daan Bloembergen, Karl Tuyls, Daniel Hennes, and Michael Kaisers."]} +{"275406|9316331": ["MCTS methods have become very popular in games, a type of multiagent setting, but no action factorization has been exploited so far (Browne et al., 2012).", "MCTS methods have become very popular in games, a type of multiagent setting, but no action factorization has been exploited so far (Browne et al. 2012)."]} +{"13171013|3042022": ["Cross learning is closely related to finite action-set learning automata (Narendra & Thathachar, 1974; Thathachar & Sastry, 2002)."]} +{"13171013|1708582": ["Neither of the two is sufficient on its own, and the dilemma is to find the right balance (Kaelbling et al., 1996; Sutton & Barto, 1998).", "Should the agent exploit actions that yielded high reward in the past, or should it explore in order to achieve potentially better results in the future, thereby risking a low reward now? Neither of the two is sufficient on its own, and the dilemma is to find the right balance (Kaelbling et al., 1996; Sutton & Barto, 1998)."]} +{"13171013|17464562": ["Traditional single-agent reinforcement learning algorithms, such as Q-learning (Watkins & Dayan, 1992) and (networks of) learning automata (Narendra & Thathachar, 1974; Wheeler Jr & Narendra, 1986; Vrancx, Verbeeck, & Now\u00e9, 2008b), can be directly applied in this setting.", "Cross learning is closely related to finite action-set learning automata (Narendra & Thathachar, 1974; Thathachar & Sastry, 2002)."]} +{"47082037|5014732": ["This is the case in Minecraft (Project Malmo; Johnson et al., 2016), Starcraft (Ontan\u0303o\u0301n et al., 2013), and robotic RL platforms (Sutton et al., 2011).", ", 2016), Starcraft (Onta\u00f1\u00f3n et al., 2013), and robotic RL platforms (Sutton et al."]} +{"2661363|1708582": []} +{"28808621|115456": ["[21] and Robertson & Watson [25] for an overview.", "We recommend the surveys by Ontanon et al. [22] and Robertson & Watson [26] for an overview."]} +{"28808621|5014732": ["[21] and Robertson & Watson [25] for an overview."]} +{"15973607|9316331": ["We refer the reader to the surveys presented in [22] and [5] for more details."]} +{"15973607|18357056": ["We refer the reader to the surveys presented in [22] and [5] for more details."]} +{"52194786|3212631": ["ToM is a kind of recursive reasoning technique (Hernandez-Leal et al. 2017a; Albrecht and Stone 2018) describing a higher cognitive mechanism of explicitly attributing unobservable mental contents such as beliefs, desires, and intentions to other players.", "Hence, it is critical for an agent to quickly predict or recognize the behaviors of other agents, and make a best response accordingly (Boutilier 1999; Powers and Shoham 2005; Gmytrasiewicz and Doshi 2005; Banerjee and Peng 2005; Fern\u00e1ndez and Veloso 2006; Chakraborty and Stone 2010; Fern\u00e1ndez, Garc\u0131\u0301a, and Veloso 2010; Wunder et al. 2012; Bard et al. 2013; Elidrisi et al. 2014; Hernandez-Leal and Kaisers 2017; Albrecht and Stone 2018; Hernandez-Leal et al. 2017a).", "\u2026and Doshi 2005; Banerjee and Peng 2005; Fern \u00b4 andez and Veloso 2006; Chakraborty and Stone 2010; Fern \u00b4 andez, Garc \u00b4 \u0131a, and Veloso 2010; Wunder et al. 2012; Bard et al. 2013; Elidrisi et al. 2014; Hernandez-Leal and Kaisers 2017; Albrecht and Stone 2018; Hernandez-Leal et al. 2017a).", "Previous works (Hernandez-Leal et al. 2016; Hernandez-Leal and Kaisers 2017; Hernandez-Leal et al. 2017b; Yan et al. 2018) assume that an opponent randomly switches its policies among a number of stationary policies.", "Hence, it is critical for an agent to quickly predict or recognize the behaviors of other agents, and make a best response accordingly (Boutilier 1999; Powers and Shoham 2005; Gmytrasiewicz and Doshi 2005; Banerjee and Peng 2005; Fern \u00b4 andez and Veloso 2006; Chakraborty and Stone 2010; Fern \u00b4 andez, Garc \u00b4 \u0131a, and Veloso 2010; Wunder et al. 2012; Bard et al. 2013; Elidrisi et al. 2014; Hernandez-Leal and Kaisers 2017; Albrecht and Stone 2018; Hernandez-Leal et al. 2017a).", "Later, Bayes-Pepper is proposed \u2217 corresponding author (Hernandez-Leal and Kaisers 2017) for stochastic games by combing BPR and Pepper framework (Crandall 2012)."]} +{"23436632|202540003": []} +{"23436632|3113396": ["stationary game with incomplete information, where the agents initially do not know their opponents preferences and where strategies can change over time (for a survey on learning in negotiation, see Baarslag et al., 2016). As a result, they need to derive information from the exchange of oers with each other. Although rarely framed in the context of non-stationary learning, many automated negotiation strategies have ", "As with human negotiations, automated negotiation between agents is a non-stationary game with incomplete information, where the agents initially do not know their opponents preferences and where strategies can change over time (for a survey on learning in negotiation, see Baarslag et al., 2016)."]} +{"23436632|6759870": ["Recent examples include the setting of e-commerce (He et al., 2003; Kowalczyk et al., 2003), virtual agents (DeVault et al., 2015; Gratch et al., 2015) and games such as diplomacy (Fabregues et al., 2010) and coloured trails (Gal et al., 2005; Lin and Kraus, 2010).", "Recent examples include the setting of e-commerce (He et al., 2003; Kowalczyk et al., 2003), virtual agents (DeVault et al."]} +{"23436632|13171013": ["Finally, a recent survey analysed methods from evolutionary game theory and its relation with multiagent learning (Bloembergen et al., 2015).", "\u2026(Panait and Luke, 2005; Shoham et al., 2007; Busoniu et al., 2010), others have divided them by the type of learning (Tuyls and Weiss, 2012; Bloembergen et al., 2015) and another group have proposed properties that MAS algorithms should have (Bowling and Veloso, 2002; Powers et al., 2007;\u2026", "This has inspired a stream of follow-up work that links stochastic multi-agent reinforcement learning algorithms to varieties of deterministic dynamical systems, as summarized in a related survey (Bloembergen et al., 2015).", "There are also some previous categories for the type of learning used: multiplied, divided and interactive (Tuyls and Weiss, 2012); and independent, joint-action and gradient ascent (Bloembergen et al., 2015).", ", 2010), others have divided them by the type of learning (Tuyls and Weiss, 2012; Bloembergen et al., 2015) and another group have proposed properties that MAS algorithms should have (Bowling and Veloso, 2002; Powers et al."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"71716713|9316331": []} +{"71716713|6607209": []} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"12936702|9316331": []} +{"12936702|10725980": []} +{"33870153|13171013": ["Interactions among several agents are usually modelled as a normal-form or stochastic game, and a wide variety of learning algorithms targets this setting [7, 9, 13]."]} +{"8771967|9316331": ["Considering this, the original UCT variant complies with RL theory, whereas the standard UCT variant (Browne et al., 2012) does not (Section 2.4); however, since UCT is often used on tasks with terminal rewards only (e.g., like many classic games), the issue is mitigated.", ", the sum of all rewards in a simulation), updating all visited states with the same value (Browne et al., 2012).", "Monte Carlo tree search (MCTS, Coulom, 2006; Browne et al., 2012) was introduced as a search and planning framework for finding optimal decisions by sampling a given model.", "In general, Monte Carlo tree search (MCTS) algorithms employ strong (heuristic) search methods to identify the best available action in a given situation (Browne et al., 2012).", "On the other hand, the standard UCT (Browne et al., 2012) also equals to the same RL algorithm, but when the latter is modified to perform na\u0131\u0308ve offline updates (i.e., to backup only the final sum of rewards in an episode, ignoring the information of when were individual rewards received), to not\u2026", ", policies that incorporate a-priori knowledge), which greatly increase the performance of the algorithm (Browne et al., 2012).", "On the other hand, the standard UCT (Browne et al., 2012) also equals to the same RL algorithm, but when the latter is modified to perform na\u0131\u0308ve offline updates (i.", ", 2012) the representation policy keeps a fixed size and shape of the feature-approximated state space, whereas in the standard UCT algorithm (Browne et al., 2012), it increments the lookup table (tree or graph) by one entry in each MCTS iteration and discards it after each batch of iterations.", "The most basic and popular one is discarding the tree (partially or completely) after each search (Browne et al., 2012).", "Considering this, the original UCT variant complies with RL theory, whereas the standard UCT variant (Browne et al., 2012) does not (Section 2.", "The second approach is typical for search methods, especially for MCTS methods (Browne et al., 2012).", "\u2026and builds a tree instead of a graph; disregards discounting of rewards; and does not distinguish between terminal and nonterminal rewards \u2013 it backs up only the final outcome (i.e., the sum of all rewards in a simulation), updating all visited states with the same value (Browne et al., 2012).", "Although basic UCT variants use a uniform-random default policy, strong MCTS algorithms are most often equipped with informed playout policies (i.e., policies that incorporate a-priori knowledge), which greatly increase the performance of the algorithm (Browne et al., 2012).", "Following a showcase of strong results, the algorithm achieved widespread adoption across diverse domains (Browne et al., 2012)."]} +{"3212631|3113396": ["Baarslag et al. (2016) provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e.g. cost, size, and colour of a car) in an exchange.", "\u2026research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot\u2026", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "[21] for a detailed description of many domain-specific methods).", "Learning the utility function, or preferences, of other agents is also a major line of research in automated negotiation agents (see Baarslag et al. (2016) for a detailed description of many domain-speci\ufb01c methods).", "[21] provide a survey of opponent modelling in bilateral negotiation settings, in which two agents negotiate the values of one or more \u201cissues\u201d (e."]} +{"3212631|7681233": ["This question has been addressed extensively by researchers in behavioural game theory and experimental psychology (Camerer et al., 2015; Goodie et al., 2012; Wright and Leyton-Brown, 2010; Yoshida et al., 2008; Camerer et al., 2004; Hedden and Zhang, 2002)."]} +{"3212631|9316331": []} +{"3212631|10725980": ["\u2026other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman\u2026", "For example, Southey et al. (2005) maintain Gaussian beliefs over the continuous parameters of a speci\ufb01ed player function for Poker (cf. Table 1 in their paper).", "Implicit modelling based on expert algorithms has been shown to be e \ufb00 ective in variants of Poker (Bard et al., 2013; Hoehn et al., 2005).", "However, as can be seen in Table 2, relatively little work exists on the problem of learning models of agent behaviours (i.e. policy reconstruction) under partial observability conditions, with most e \ufb00 orts focusing on extensive form games with incomplete information (e.g. Poker).", "The idea of monitoring conditional action frequencies of the modelled agents has also been used in the context of extensive form games with imperfect information, such as Poker (Mealing and Shapiro, 2017; Ganzfried and Sandholm, 2011; Southey et al., 2005; Billings et al., 2004).", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing [106], computer Poker [232], automated negotiation [21], simulated robot soccer [173], human user modelling [289,194], human-robot interaction [181], commercial video games [25], trust and reputation [222], and multiagent learning [257].", "Rubin and Watson [232] survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "The domain of Poker added the problem of partial observability of environment states, since no player can see the private cards of other players.", "Rubin and Watson (2011) survey research in Poker playing agents and dedicate a section to opponent modelling methods.", "Since these early works in game theory and AI, the problem of modelling other agents has been an active area of research in many sub-communities, including classic game playing (F\u00a8urnkranz, 2001), computer Poker (Rubin and Watson, 2011), automated negotiation (Baarslag et al., 2016), simulated robot soccer (Kitano et al., 1997), human user modelling (Zukerman and Albrecht, 2001; McTear, 1993), human-robot interaction (Lasota et al., 2014), commercial video games (Bakkes et al., 2012), trust and reputation (Ramchurn et al., 2004), and multiagent learning (Stone and Veloso, 2000)."]} +{"3212631|14441987": ["Many important applications are characterised by such openness, such as ad-hoc wireless networks [231] and web-based systems for collaborative computing [198].", "Many important applications are characterised by such openness, such as ad-hoc wireless networks (Royer and Toh, 1999) and web-based systems for collaborative computing (Miorandi et al., 2014)."]} +{"3212631|13171013": ["In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning (Hernandez-Leal et al., 2017; Bloembergen et al., 2015; Tuyls and Weiss, 2012; Busoniu et al., 2008; Panait and Luke, 2005; Alonso et al., 2001; Stone and Veloso, 2000; Sen and Weiss, 1999).", "In addition to the above surveys, there are also a number of surveys on the topic of multiagent learning [138,41,269, 55,213,15,257,241]."]} +{"196200552|1452734": []} +{"49293891|10725980": ["In competitive domains such as Poker and Go, such tasks are often integrated with domain-speci\ufb01c heuristics to model opponents and learn superior policies (Rubin & Watson, 2011; Mnih et al., 2015)."]} +{"4533648|9588126": ["Reinforcement learning (RL) holds considerable promise to help address a variety of cooperative multi-agent problems, such as coordination of robot swarms (Hu\u0308ttenrauch et al., 2017) and autonomous cars (Cao et al., 2012)."]} +{"5528008|1708582": []} +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} diff --git a/edge/graph_52984558.jsonl b/edge/graph_52984558.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a94d9f565acce29267fe3d5b6dc3a2dd25b53339 --- /dev/null +++ b/edge/graph_52984558.jsonl @@ -0,0 +1,3 @@ +{"207022940|12904520": ["[16] S.", "also [16]."]} +{"18481880|1188683": ["This allows the CGRA to act as \u201cvirtual hardware\u201d [25]."]} +{"206743327|13034818": ["mance on the same order of magnitude as DRAM, but with persistent writes [202]."]} diff --git a/edge/graph_52985084.jsonl b/edge/graph_52985084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9c59804dd34fa0c09fe485a8806d9b36dbb7097 --- /dev/null +++ b/edge/graph_52985084.jsonl @@ -0,0 +1,6 @@ +{"3565192|9978124": []} +{"206767722|8601873": ["[89], [90], [91], but adapted to our weakly supervised scenario using a formulation (given by Equation (5)) similar to multiple instance learning [92], [93], [94]."]} +{"32167228|393948": ["Readers can also \ufb01nd a more detailed introduction about SDA in (Bengio et al. 2013; Vincent et al. 2010).", "But restricting h seems to be more common (Bengio et al. 2013).", "The recent development of the deep learning technology (Bengio et al. 2013) have provided an alternative method for understanding the loop closure detection problem."]} +{"206987417|9978124": ["Precise estimation of the camera\u2019s six Degree of Freedom pose (6DoF) consisting of camera position and orientation allows realistic rendering of virtual objects in the observed scene [2]."]} +{"116985609|206051485": []} +{"8061430|4491892": ["This leads to a crucial property: SIS with resampling can produce reasonable statistics only for systems that \u201cexponentially forget\u2019\u2019 their past [8] (i."]} diff --git a/edge/graph_52986472.jsonl b/edge/graph_52986472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..411fce02f216bbce4762663eea32b007df04f97e --- /dev/null +++ b/edge/graph_52986472.jsonl @@ -0,0 +1,37 @@ +{"51979761|3348390": ["In [19], context-aware computing for the IoT was comprehensively surveyed, while in [20] the design of a context-aware system for application in an industrial assembly environment was presented; this paper focused on the cognitive model for robot group controls."]} +{"3841767|3350723": []} +{"3841767|6988770": []} +{"1458697|6988770": ["concept is gaining a lot of attention since it could be applied in many domains ranging from smart city management to rescue operations in remote areas [28] but it comes with a large sets of new challenges [13], [16], [18].", "emerged with its sets of challenges [13], [16], [19]."]} +{"7459297|1230643": ["A classic protocol for mobile robotic network is shown in Figure 4 [28]."]} +{"7459297|6988770": ["[13] presented a survey that introduced the most relevant work and organized it around the potential benefits of introducing cloud technologies for robotics and automation."]} +{"62099173|6607209": ["The reasons are two-fold: multi-agent systems are typical complex and distributed, and agents are combined together as an overarching framework for integrated tasks [19]."]} +{"6988770|8815923": ["For grasping [37], grasp stability of finger contacts can be learned from previous grasps on an object [45]."]} +{"110544003|8953108": []} +{"14462167|6988770": ["Our solution is based on the concept of Cloud Robotics [14], [15], that is a novel paradigm in robotics which aims at moving computational and storage resources from the robot to the cloud, in order to develop simpler and cheaper robots."]} +{"7429049|6988770": ["The ability of robotic systems to learn more quickly and effectively by pooling their collective experience has long been recognized in the domain of cloud robotics, where it is typically referred to as collective robotic learning [11, 12, 13, 14]."]} +{"20297943|7360895": ["Robotic service that support human daily activities have recently become an emerging topic in the area of robotics research [1]."]} +{"682361|6988770": ["More broadly, the field of cloud robotics research focuses on systems that rely on any form of data or computation from a network to support their operation [15]."]} +{"28673203|6988770": ["The paper [8] presents the emergence of this concept, and some of its projects such as RoboEarth [9], Cloud-based robot grasping [10], Rapyuta [11], and MyRobots project."]} +{"6138957|8815923": ["known objects to models in the database [4, 5, 8, 23, 27].", "performance according to physical models such as the ability to resist external wrenches [45], and empirical (or data-driven) methods [4], which typically use human labels [2] or the ability to lift the object in physical trials [43]."]} +{"18602911|6988770": ["As mentioned earlier, a concept called cloud robotics, which is based on \u201crobots + cloud\u201d architecture has been proposed [2].", "A similar concept, called cloud robotics [2], was proposed.", "Cloud robotics is a relatively new research field; it was initially proposed in 2010 [2]."]} +{"3695838|6988770": ["On the basis of above discussion Cloud Robotics [1] is defined as \u201cany robot or automation system that relies on either data or code from a network to support its operation, where not all sensing, computation, and memory is integrated into a single standalone system\u201d.", "165 ECE Programme, Karunya University\nTOWARDS SECURED CLOUD-BASED ROBOTIC SERVICES\nAbstract--Cloud Robotics is one of the most promising applications in the robotics world where cloud serves as an ondemand resource provider for the resource constrained robots.", "Cloud Robotics allows the robots to use the cloud for massive storage, offloading heavy computational tasks, data sharing among multiple robots, and allows parallel processing of high voluminous data."]} +{"15264780|6607209": ["We choose Weibull distribution because it is a versatile distribution that can represent different kinds of statistical distribution and therefore can take on various characteristics based on the following function:\n(20)\nwhere is the scale parameter, and is the shape parameter."]} +{"15264780|6988770": ["Instead, robots can be relieved from hardware limitations while benefiting from vastly available resources and centralized high computing capability provided by the cloud platform [8]."]} +{"15054467|10741988": ["Other techniques include low-pass filtering [42], Finite Element Re-meshing [33], and feature suppression [10].", "We will also explore alternate methods to preserve privacy, for example adding small deformations to the geometry [42].", "The methods were chosen to completely obscure the private region, motivated by techniques from prior research on 3D model privacy [10], [21], [42]."]} +{"15054467|6988770": ["Cloud-based Robotics and Automation systems utilize remote computation and memory, planning actions based on shared libraries of product data, prior sensor readings, and maps [18]."]} +{"18664918|6988770": ["Keywords \u2014 cloud computing; robotics; domain specific languages; control software; distributed systems\nI. INTRODUCTION After introduction of cloud computing concept, it was rapidly adopted in the field of robotics.", "CLOUD ROBOTICS IN 2015 As we mentioned before, the cloud concepts are very popular in robotics nowadays, for example, in April 2015 special issue of IEEE Transactions on Automation Science and Engineering was published with the main topic for cloud robotics [4]."]} +{"42628306|8815923": ["A complete survey of grasping is outside the scope of this work, and we refer the reader to standard surveys on the subject for a more complete treatment [Bohg et al., 2014], while in this section we primarily discuss data-driven prior grasping methods, which are the most related to the present work.", "\u2026complete survey of grasping is outside the scope of this work, and we refer the reader to standard surveys on the subject for a more complete treatment [Bohg et al., 2014], while in this section we primarily discuss data-driven prior grasping methods, which are the most related to the present work."]} +{"37915950|6988770": []} +{"36050726|8815923": ["The SaaS model has also been extended to robotic mappping [22], grasping [23] [24], and cooperative and collective robot learning [15] [25], with distributed partially observed sensor data [26]."]} +{"36050726|6988770": ["In earlier work [1], we proposed the concept of Robotics and Automation as a Service (RAaaS), the roboticsequivalent of Software as a Service (SaaS) \u2013 a model in which software components are hosted on central cloud servers and made available to end users and robots over the internet.", "Since then, a wide variety of models for connecting robots to the cloud have been developed, implemented, and tested [1]."]} +{"14236715|8815923": ["Another line of research has focused on synthesizing grasps using statistical models [5] learned from a database of images [27] or point clouds [9], [15], [46] of objects annotated with grasps from human demonstrators [15], [27] or physical execution [15].", "As computing quality metrics can be time consuming, a common grasp planning method is to store a database of 3D objects labelled with grasps and their quality and to transfer the stored grasps to similar objects at runtime [5], [41]."]} +{"14236715|6988770": ["Potential advantages to using the Cloud include Big Data: access to updated libraries of images, maps, and object/product data; and Parallel Computation: access to grid computing for statistical analysis, machine learning, and planning [22]."]} +{"3380261|6988770": ["In Reference [24], the cloud robotics approach is used to provide a robot with abilities for human\u2013robot interaction and environmental sensing since it uses text-to-speech and speech recognition services.", "In References.", "In Reference [20], the extensive resources of a cloud infrastructure are studied with a survey of cloud robotics and automation based on four of its features, namely, big data, cloud computing, collective robot learning and human computation."]} +{"8957353|6988770": ["L. M\u00f6senlechner is with the Technical University of Munich, 85748 Munich, Germany (e-mail: moesenle@cs.tum.edu)."]} +{"4659501|15093118": ["Several sensing technologies have been employed in the obstacle detection field [1], such as computer vision [2], [3], radar [4]\u2013[6] and lidar [7]\u2013 [9]."]} +{"4659501|18388986": []} +{"18389147|1932843": ["Neural networks are powerful function approximators, but they have significantly more parameters than the simpler linear models that are often used in robotic learning [23], [8].", "However, practical real-world applications of RL typically require significant engineering beyond the learning algorithm itself: an appropriate representation for the policy or value function must be chosen so as to achieve training times that are practical for physical hardware [8], and example demonstrations must often be provided to initialize the policy and mitigate safety concerns during training [9]."]} +{"18389147|6988770": ["Accelerating robotic learning by pooling experience from multiple robots has long been recognized as a promising direction in the domain of cloud robotics, where it is typically referred to as collective robotic learning [31], [32], [33], [34]."]} +{"10270405|7360895": ["Providing robotic services to support intelligent artificial activities through socially conscious interactive behaviors is an emerging topic in robotics research for instance to support daily human activities [2] and IBM Smarter Cities [3]."]} +{"5096034|6988770": ["data, cloud computing, collective robot learning, and human computation are four potential benefits of cloud robotics [9]."]} +{"6963486|6988770": ["Such collaboration will be enabled by a cloud robotics platform [1] [2] which will allow the robots to communicate with other robots and humans over network, including Internet."]} diff --git a/edge/graph_52986761.jsonl b/edge/graph_52986761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fab6da55a9097f6bcc443f90a8acc9b1429aa5e8 --- /dev/null +++ b/edge/graph_52986761.jsonl @@ -0,0 +1 @@ +{"14215456|14485408": ["Harvesters can be employed as battery rechargers in various environments, such as industries, houses [1,2], the military (as for unmanned aerial vehicles [3]) and handheld or wearable devices [4\u20139]."]} diff --git a/edge/graph_52999735.jsonl b/edge/graph_52999735.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53001288.jsonl b/edge/graph_53001288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53012393.jsonl b/edge/graph_53012393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5437ad10fde5c17d7b2fceda3b674626e268354 --- /dev/null +++ b/edge/graph_53012393.jsonl @@ -0,0 +1,4 @@ +{"26833874|14287498": ["323 [5], Peer-to-Peer SIP (P2PSIP) [6] can also be exploited for interception purposes [7]."]} +{"14056692|1877442": ["From an organizational aspect, \u201cit involves interactions among cloud actors for the purpose of facilitating both internal and external investigations\u201d (Farina et al. 2015)."]} +{"14056692|6879093": ["Kechadi et al. (2015) conducted a survey on forensic investigations in the cloud computing ecosystem."]} +{"14056692|3042864": ["They offer \u201cvirtually unlimited dynamic resources for computation, storage and service provision\u201d (Khan et al. 2014)."]} diff --git a/edge/graph_53013545.jsonl b/edge/graph_53013545.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f381739482900c1b5318a8fb1759dcde1edf6685 --- /dev/null +++ b/edge/graph_53013545.jsonl @@ -0,0 +1,16 @@ +{"17355859|885218": ["As a way to promote the adoption of OBIE, Wimalasuriya and Dou [76] proposed the Ontology-based Components for Information Extraction (OBCIE) architecture.", "gies to guide the extraction process [40], [77].", "Wimalasuriya and Dou [77] claimed that ontology is a valid form to represent the OBIE results in a semantic rich format.", "Ontology Based Information Extraction (OBIE) [77] has extensively used this representation.", "OBIE systems can extract information with higher recall and accuracy compared with traditional IE systems.", "Ontology-based information extraction (OBIE) is a subfield of information extraction, which uses formal ontologies to guide the extraction process [40], [77].", "Specifically, in ontology-based information extraction (OBIE) [55], [77], the extracted information are a set of annotated terms from the document with", "Early work of OBIE includes knowledge extraction from web documents [5] and data-rich unstructured documents [19].", "For example, OBIE is able to extract the information with similar or close semantics that does not directly appear in the data source [39].", "Because of this guidance in the extraction process, OBIE systems have mostly implemented following a supervised approach [76].", "Encoding OBIE results in the formal structure of ontology could streamline the data mining process of other data mining tasks that need to make use of the current result.", "Therefore those semi-supervised systems can also be considered as OBIE systems.", "Nebhi [56] proposed an OBIE system for disambiguating Twitter messages.", "Specifically, in ontology-based information extraction (OBIE) [55], [77], the extracted information are a set of annotated terms from the document with the relations defined in the ontology.", "With OBIE, the information extracted is not only well structured but also represented by predicates in the ontology which are easy for sharing and reuse.", "The ontology in OBIE provides the function as a conceptual framework and consistency checking."]} +{"2774074|2809360": ["In addition, clinical texts often contain non-standard shorthand phrases, laboratory results and notes on patients\u2019 vital signs, which are often filled with periods and thus can complicate typically straightforward text processing tasks such as sentence splitting [16]."]} +{"2184309|1507400": ["Thus, Hadoop meets the needs of bioinformatics and several studies have successfully used Hadoop in bioinformatics [9-11], accordingly leading to cloud-based bioinformatics resources.", "Currently, the cloud-based programming paradigm adopted in the bioinformatics community is Hadoop [11,16,17,20,27], in which computation-consuming and data-intensive analyses are primarily solved by distributing tasks over multiple nodes (see tutorials at http://wiki.apache.org/hadoop)."]} +{"14611982|14171067": ["For example, the cost matrix used by edit distance (Bille 2005) has to be based on domain knowledge and thus, varies from", "For example, the cost matrix used by edit distance (Bille 2005) has to be based on domain knowledge and thus, varies from application to application.", "For example, weighted Euclidian distance is very popular to tune distance-based data mining algorithms, and edit distance (Bille 2005) is rather popular for comparing trees, sequences and graphs."]} +{"14063984|954543": ["It has the generic benefits of neural networks\u2014like massive parallelism and robustness\u2014and, at the same time, uses fuzzy logic to model vague or qualitative knowledge and convey uncertainty [15]."]} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"63730223|386036": ["Though these techniques are not able to represent the level of expressiveness completely, they can at least be integrated into other research domains such as record matching, entity resolution, and duplicate detection [8]."]} +{"14543078|60455": ["Hence, such a framework can also facilitate tasks, such as data mining [20; 13] and web mining [54; 32 ]."]} +{"4638255|10500613": ["algorithms that try to find correspondences between two different database schemas [64, 65]."]} +{"15413754|8022785": []} +{"207016868|191396": []} +{"18534787|15273230": []} +{"34509332|9828770": []} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"24751587|11009327": []} +{"28675195|586521": ["Different techniques for dengue fever classification can be used such as NB classifier; decision tree, KNN Technique, multilayered Technique and SVM [1,4,5].", "SMO: SMO is abbreviation of Sequential minimal optimization, which is a technique for answering the QP problem that rises during the training of SVM. SMO is widely used for the training of SVM [15]."]} diff --git a/edge/graph_53016938.jsonl b/edge/graph_53016938.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e0e7d584ca1f98af21b52a5786da6aec0548b8c --- /dev/null +++ b/edge/graph_53016938.jsonl @@ -0,0 +1,12 @@ +{"24944315|13172512": ["Clearly, at some point labels have to be attached to be able to compare the mechanisms, but the actual learning is independent of pre-labeled flows that are hard to obtain in good quality and/or high numbers [2], [9].", "Currently, Internet traffic classification is used to improve Quality-of-Service (QoS) or Quality-of-Experience (QoE) [2], [3].", "The survey of Nguyen and Armitage [2] compares the results of various machine learning approaches applied to network traffic classification."]} +{"32277598|44414506": ["Overall, the results in this section show that using ACGAN to generate synthesized data for network traffic classification problem helps improving the performance of supervised learning algorithms in solving compared to using synthesized data and some recent techniques for handling imbalanced data such as SMOTE-SVM [17],BalanceCascade [15].", "The second augmented dataset is synthesized by the ensemble BalanceCascade technique which is the best method to handle imbalanced dataset that is created from 10000 random samples with two classes [15]."]} +{"36992736|13172512": ["We compare our method with other 4 popular classifiers including Support Vector Machine (SVM), MultiLayer Perception (MLP), Na\u0131\u0308ve Bayes Classifier (NB) and Decision Tree (DT) which has been widely used for IP traffic classification in literature [13].", "Accurate IP traffic classification is the key step towards Quality of Service, pricing, network intrusion detection, malware detection etc, and thus attain persistent attention from the networking and machine learning communities over the decades [1], [3], [4], [12], [13]."]} +{"206755159|13172512": ["There are three categories of traffic classification methods: port-based, payload-based, and flow statistics-based [2].", "Current research on network traffic classification focuses on the application of machine learning techniques to flow statistics-based methods [2]."]} +{"3441568|11246470": ["Anomalybased IDS also have a high false alarm rate (FAR), which seriously restricts its practical application [3].", "The second serious problem of the anomaly-based intrusion detection method is its high FAR, which is a major obstacle to its practical application [3]."]} +{"3441568|393948": ["The representation learning approach [4] is a promising method for solving both these problems."]} +{"3720713|29145577": ["According to the difference of ISO/OSI layer, traffic encryption techniques can be divided into application layer encryption, presentation layer encryption and network layer encryption [2].", "[2] on 26 papers about encrypted traffic classification in the 2005-2015 period, 12 papers use flow features, while 5 papers use packet features, 7 papers use the combination of flow and packet features and 2 papers use other features.", "There are two main types of features which are most frequently used by those researches [2]: flow features (e.", "[2] on 26 papers about encrypted traffic classification in the 2005-2015 period, only 6 papers used public dataset."]} +{"9014064|13172512": []} +{"9014064|17113548": ["VBR varies the amount of output data per time segment and does not attempt to control the output bit rate of the encoder, so that the distortion will not vary significantly [6]."]} +{"35187639|3536399": []} +{"35187639|29145577": ["First, the increasing demand for user\u2019s privacy and data encryption has tremendously raised the amount of encrypted traffic in today\u2019s Internet (Velan et al. 2015).", "Finally, many of the Internet service providers (ISPs) block P2P \ufb01le sharing applications because of their high bandwidth consumption and copyright issues [7].", "According to [5, 6] only 30% to 70% of the current Internet tra\ufb03c can be classi\ufb01ed using port-based classi\ufb01cation methods.", "Furthermore, the increasing demand for user\u2019s privacy and data encryption has tremendously raised the amount of encrypted tra\ufb03c in today\u2019s Internet [4].", "Their scheme was able to identify a broader range of protocols including \ufb01le transfer protocol (FTP), Internet Message Access Protocol (IMAP), SSH, and TELNET with accuracy up to 87%.", "A VPN is a private overlay network among distributed sites which operates by tunneling tra\ufb03c over public communication networks (e.g., the Internet).", "Emergence of new applications as well as interactions between various components on the Internet, have dramatically increased the complexity and diversity of this network which makes the tra\ufb03c classi\ufb01cation a di\ufb03cult problem per se.", "VoipBuster is an application which o\ufb00ers voice communications over Internet infrastructure.", "Traffic classification has attracted a lot of interests in both academia and industrial activities related to network management (e.g., see Dainotti et al. 2012; Finsterbusch et al. 2014; Velan et al. 2015) and the references therein).", "Tor was proposed to protect users against Internet surveillance known as \u201ctra\ufb03c analysis.\u201d"]} +{"31403034|13172512": ["There are several approaches to NTC: port-based, payload-based, and \ufb02ow statistics-based [3], [4].", "These methods usually rely on machine learning techniques to perform service prediction [3]."]} diff --git a/edge/graph_53018231.jsonl b/edge/graph_53018231.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f9039341fd396e4dddb6f327aae2942ffddc7b3 --- /dev/null +++ b/edge/graph_53018231.jsonl @@ -0,0 +1,104 @@ +{"50781799|14478191": ["[23] have proposed a solution based on reinforcement learning (RL) [24], [25], and Ferreira et al."]} +{"5265172|8909218": []} +{"49183164|6909107": ["Therefore, the computation offloading and computational resource allocation themes have attracted great interests as a key point in the MEC system [3]."]} +{"26581065|21386749": []} +{"4738885|17485266": []} +{"4738885|14258620": ["\u2022 To solve this problem, we propose a deep learning [17] algorithm that combines liquid state machine (LSM) [18] spiking neural networks with echo state networks (ESNs) [19] to determine the transmission and caching strategies by predicting the VR users\u2019 reliability."]} +{"49866160|2340740": ["[8] present the formal formulation of Malicious URL Detection as a machine-learning task and"]} +{"49866160|12815020": []} +{"53776110|11381530": ["it is an ideal choice to use DL approaches to detect network intrusions by learning traffic features [105]."]} +{"20634644|206578365": ["With limited computation, energy and memory resources, Internet of Things (IoT) devices such as sensors, cameras and wearable devices have a computation bottleneck to limit the support for advanced applications such as interactive online gaming and facial recognition applications [1], [2]."]} +{"20634644|3055684": ["r the computation intensive IoT applications [2]. Energy harvesting (EH) is another promising technique to prolong the battery lifetime and provide satisfactory quality of experiences for IoT devices [3]. Equipped with EH modules, an IoT device can capture the ambient renewable energy, such as the solar radiation, wind and human motion, and other resources, such as the ambient radio-frequency (RF) si"]} +{"20634644|12029139": ["Simulations are performed for IoT devices with wireless power transfer to capture the ambient RF signals from a dedicated RF energy transmitter to charge the IoT battery [21], [22]."]} +{"20634644|12060835": ["Energy harvesting (EH) is another promising technique that prolongs battery lifetime and provides a satisfactory quality of experiences for IoT devices [6]\u2013[9]."]} +{"19103253|6327434": ["ller. One popular method of attack detection is the \u02dc2 fault detector: the detector examines the energy of the Kalman \ufb01lter innovations process and reports an attack if the energy exceeds a threshold [7]. Our work in this paper is to design an attack sequence that balances the energy of the attacker\u2019s control objective error and the impact of the attack on the CPS\u2019 attack detection statistic. We form", "and feedback controller are designed assuming nominal operating conditions, the system is equipped with a \u02dc2 failure detector for detecting operating conditions that are not nominal (i.e., e t 6= 0 ) [7], [18], [21]. The \u02dc2 detector examines the innovations sequence of the Kalman \ufb01lter, t, de\ufb01ned as t= y t Cbx tjt 1; (10) where bx tjt 1, given by equation (5), is, under the condition that e t = 0", "ic g t= T t 1 t; (12) and reports that an attack has occurred if g t exceeds a threshold \u02dd. The threshold \u02ddis chosen a` priori based on the desired false alarm and missed detection probabilities [7]. C. Attacker Model We provide assumptions and details on the attacker model. Assumption 2. The attack begins at time t= 0. That is, e t0 for all t<0. Assumption 2 is made without loss of generali"]} +{"2098713|206583375": ["There has been considerable literature on indoor localization 802 [18]."]} +{"31512446|21386749": ["The IoT will have applications in multiple areas including health care [2], smart cities [3], smart grids [4], drones [5], and industrial monitoring [6]."]} +{"20384442|4735659": [", [96]\u2013[98] and [99]."]} +{"20384442|37564067": ["This is an important property because any resource allocation scheme without holding this property may be vulnerable to market manipulation and reduce the revenue for the seller due to the low valuations [24].", "One common method for proving the existence and uniqueness of the Nash equilibrium is to check if the strategies of the players are non-empty, compact, and convex, and if their utility functions are concave or quasiconcave [24].", "with low computational complexity [24].", "A number of auctions and their descriptions can be found in [24] and [30]."]} +{"20384442|18750590": [" e.g., picocells/femtocells, and user devices, the edge/fog computing pushes the frontier of cloud resources and services away from the remote data 32 centers to the periphery or edges of the network [26]. As a result, the edge/fog computing (i) signi\ufb01cantly reduces the data traf\ufb01c, cost, and latency, (ii) alleviates the major bottleneck and the risk of a potential point of failure, and (iii) provides", "ve to misreport their true demands which can lead to higher utility. 4) Forward, reverse auction, and double auction: Considering the sides of sellers and buyers, auctions can be classi\ufb01ed as follows [26]: Forward and reverse auctions: In the forward auction, multiple buyers compete for commodities by submitting their bids, i.e., bidding prices, to one seller. On the contrary, in the reserve auction", "imal strategies is challenging. C. Auction Auction is an ef\ufb01cient way of allocating resources to buyers which value the resources the most. A number of auctions and their descriptions can be found in [26] and [19]. The following brie\ufb02y presents the major auctions used in this survey. Note that an auction typically consists of three entities: buyers, i.e., bidders, sellers, and an auctioneer. The aucti", "between the utility associated with its resource allocation and the cost that the user pays the MNO for using the resources. To solve the NUM problem, price update schemes can be used as presented in [26]. Brie\ufb02y, by applying the dual decomposition and gradient methods, the MNO iteratively updates resource prices. Also, the users iteratively select their amounts of resources to maximize their own net ", "ned Networking (SDN) NFV and SDN allow 5G to ef\ufb01ciently accommodate a wide range of services over a common network infrastructure. While the SDN decouples the network control and forwarding functions [26], the NFV decomposes network functions from the physical network equipments. Such software-based solutions can provide the programmability, \ufb02exibility, and modularity that are required to create multi"]} +{"20384442|19938676": ["For example, the survey of emerging technologies of 5G was given in [7], the survey of resource management toward 5G was presented in [8], and the survey of user association in 5G was given in [9]."]} +{"20384442|8833120": ["The repeated game allows players to repeat a so-called stage game over multiple periods to achieve their objectives [64]."]} +{"20384442|17062686": []} +{"51981043|9316331": ["where Cp is a constant greater than 0 [53]."]} +{"3499123|10744611": ["The authors of [17] summarize the major opportunities and challenges in train-ground communication system."]} +{"6208256|1708582": ["Furthermore, it is known that sometimes it is good to be optimistic: optimism in the face of uncertainty is a well-known exploration technique (Kaelbling et al., 1996).", "The overestimations should not be confused with optimism in the face of uncertainty (Sutton, 1990; Agrawal, 1995; Kaelbling et al., 1996; Auer et al., 2002; Brafman and Tennenholtz, 2003; Szita and L \u02dd orincz, 2008; Strehl et al., 2009), where an exploration bonus is given to states or actions with\u2026", "exploration technique (Kaelbling et al. 1996). If, however, the overestimations are not uniform and not concentrated at states about which we wish to learn more, then they might negatively affect the quality of the resulting policy. Thrun and Schwartz (1993) give specific examples in which this leads to suboptimal policies, even asymptotically."]} +{"52115481|10979806": ["This means that the bitper-Joule energy efficiency of future wireless networks will have to increase by a factor 2000x [1, 2]."]} +{"21659631|3055684": ["that may significantly increase the network lifetime and help reduce the greenhouse gas emissions in general wireless applications [3]\u2013[5]."]} +{"19121365|4528002": ["ower grids or cellular communication systems that provide service to the ITSs [6], [7]. Recently, a number of security solutions have been proposed for addressing intra-vehicle security problems [8]\u2013 [11]. In [8], the authors identi\ufb01ed the key vulnerabilities of a vehicle\u2019s controller and proposed a number of intrusion detection algorithms to secure this controller. Moreover in [9], the authors show t", "s of plug-in electric vehicles, while accounting for their impact on the power system. Moreover, a survey on security threats and protection mechanisms in embedded automotive networks is presented in [11]. Furthermore, vehicular communication security challenges and solutions have also been studied recently in [12]\u2013 [16]. In [12], the security vulnerabilities of current vehicular communication archite"]} +{"24434774|4884302": []} +{"24434774|3994942": ["A wide range of solutions exist, , , 2017. generally based on analytical optimization or on local-search heuristic methods [8]."]} +{"21728234|6909107": ["In contrast to cloud/fog computing [3], [4], mobile-edge computing (MEC) is envisioned as a promising paradigm, which provides computing capabilities within the radio access networks (RANs) in close proximity to mobile users (MUs) [5], [6]."]} +{"21728234|206578365": ["In contrast to cloud/fog computing [3], [4], mobile-edge computing (MEC) is envisioned as a promising paradigm, which provides computing capabilities within the radio access networks (RANs) in close proximity to mobile users (MUs) [5], [6]."]} +{"17012697|17428811": ["The tools of the EvalVid framework are continuously extended to support other video codecs as H.263, H.26L and H.264 and to address additional codec functionalities like fine grained scalability (FGS) [ 13 ] and intra frame resy nchronisation."]} +{"3413458|11608263": ["Multi-label linear classifier (a \u201cshallow\u201d learning)based offloading scheme [18] by removing all the hidden layers of our deep model.", "We formulate the fine-grained offloading problem as a multi-label classification [18] framework."]} +{"5155799|1708582": ["We note an important difference between the well known heuristic exploration technique of optimism in the face of uncertainty [21, 22] and the overestimation bias."]} +{"4251721|12925459": ["Traditional portfolio management methods can be classified into four classes: \u201cFollow-the-Winner\u201d, \u201cFollow-theLoser\u201d, \u201cPattern-Matching\u201d and \u201cMeta-Learning\u201d [3].", "The performance of our back-test is compared that of three recent portfolio selection algorithms, summarised and implemented by Hoi [3], in the same cryptocurrency exchange.", "The \u201dMeta-Learning\u201d method Online Newton Step , \u201dFollow-the-Loser\u201d method Passive Aggressive Mean Reversion (PAMR) and our CNN Agent performs well, gaining \ufb01nal portfolio value larger than the best single asset of all.", "The last class, \u201dMeta-Learning\u201d method, tries to combine multiple classes of methods to achieve better performance [7] [8].", "Traditional portfolio management methods can be classi\ufb01ed into four classes, \u201dFollow-the-Winner\u201d, \u201dFollow-the-Loser\u201d, \u201dPattern-Matching\u201d and \u201dMeta-Learning\u201d [3]."]} +{"23956785|6909107": ["To address these issues, fog computing [20] and mobile edge computing (MEC) [21] have been studied to deploy computing resources closer to end users, which can significantly improve energy efficiency and quality of service (QoS) for applications that require intensive computations and low latency [21].", "can significantly improve energy efficiency and quality of service (QoS) for applications that require intensive computations and low latency [21].", "In the system, the agent has to decide which SBSs are assigned to the user, whether or not the computation task should be performed by the MEC server or the mobile device, and which SBS is scheduled to deliver the data from the MBS as a relay.", "Proposed scheme without (w.o.) MEC offloading.", "\u2219 Case 3: The file version doesn\u2019t match with that of the cache\u2019s file, then two options are provided: first, the file can be transcoded at MBS\u2019s MEC server or at the user\u2019s mobile device.", "The system state depends on the channel states \ud835\udc5f\ud835\udc60\ud835\udc58\ud835\udc5a(\ud835\udc61) of the available SBSs \ud835\udc5a \u2208 {1, 2, . . . ,\ud835\udc40}, the computation capability states \ud835\udc52MBS\ud835\udc50 of the MEC server and \ud835\udc53\ud835\udc59, \ud835\udc59 \u2208 {1, 2, . . . , \ud835\udc5d\ud835\udc62\ud835\udc58} of mobile device, the available cache sates \ud835\udc50\ud835\udc57 for user \ud835\udc62\ud835\udc60 and the label \ud835\udc66\ud835\udc39\ud835\udc57 that indicates whether or not the file version is matched for time slot \ud835\udc61 \u2208 {0, 1, . . . , \ud835\udc47 \u2212 1}.", "Otherwise, transcoding can be executed at the MBS\u2019s MEC server.", "To address these issues, fog computing [20] and mobile edge computing (MEC) [21] have been studied to deploy computing resources closer to end users, which"]} +{"24604419|206578365": ["Being closer to customers than cloud, mobile edge computing can support the Internet of Things (IoT), cyber-physical systems, vehicular networks, smart grids and embedded AI with lower latency, location awareness and mobility support [1]."]} +{"24604419|3767252": ["Man-in-the-middle attacks: A man-in-the-middle attacker sends jamming and spoofing signals to fake an edge node [5] with the goal of hijacking the private communication of the victim edge nodes or mobile devices and even control them.", "Therefore, MEC systems are more vulnerable to security threats such as wireless jamming, distributed denial of service (DoS) attacks, spoofing attacks including rogue edge and rogue mobile devices, man-in-the-middle attacks, and smart attacks [5]."]} +{"17540505|4110304": []} +{"17540505|3212631": []} +{"17540505|10175374": []} +{"17540505|3273340": [", 2015; Schmidhuber, 2015; Bengio, 2009; Wang and Raj, 2017) \u2022 efficient processing of deep neural networks (Sze et al., 2017) \u2022 machine learning (Jordan and Mitchell, 2015) \u2022 practical machine learning advices (Domingos, 2012; Smith, 2017; Zinkevich, 2017) \u2022 natural language processing (NLP) (Hirschberg and Manning, 2015; Cho, 2015) \u2022 spoken dialogue systems (Deng and Li, 2013; Hinton et al."]} +{"17540505|8454235": []} +{"17540505|5014732": []} +{"17540505|14478191": []} +{"17540505|1932843": ["\u2026deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and\u2026", "\u2026learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg,\u2026"]} +{"17540505|1185580": ["3 SURVEYS AND REPORTS \u2022 reinforcement learning (Littman, 2015; Kaelbling et al., 1996; Geramifard et al., 2013; Grondman et al., 2012); deep reinforcement learning (Arulkumaran et al."]} +{"17540505|9316331": ["AlphaGo was built with techniques of deep CNN, supervised learning, reinforcement learning, and Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012).", "\u2026et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008),\u2026", "1 We refer readers to materials for further study: reinforcement learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and Mitchell, 2015; Hastie et al., 2009; Bishop, 2011; Murphy, 2012; James et al., 2013); practical machine learning advices (Domingos, 2012; Zinkevich, 2017); arti\ufb01cial intelligence (Russell and Norvig, 2009), deep learning in neural networks (Schmidhuber, 2015); natural language processing (NLP) (Hirschberg and Manning, 2015; Deng and Liu, 2017); robotics (Kober et al., 2013); transfer learning (Taylor and Stone, 2009; Pan and Yang, 2010; Weiss et al., 2016); semi-supervised learning (Zhu and Goldberg, 2009); Bayesian RL (Ghavamzadeh et al., 2015); spoken dialogue systems (Hinton et al., 2012; He and Deng, 2013; Young et al., 2013); AI safety (Amodei et al., 2016; Garc`\u0131a and Fern`andez, 2015), Monte Carlo tree search (MCTS) (Browne et al., 2012; Gelly et al., 2012); multi-agent RL (Shoham et al., 2003; Busoniu et al., 2008); game theory (Leyton-Brown and Shoham, 2008), etc.", "In MCTS phase, AlphaGo selects moves by lookahead search.", "However, the RL policy network and RL value network are not strong/accurate enough, so that the RL value network, together with the SL policy network and the rollout network, assist MCTS to search for the move.", "New deep neural network architectures are called for, for the sophistication to represent complex scenarios in Go and the elegance for learning in a reasonable time, so that an optimal policy and/or an optimal value function can be directly approximated to make decisions without the help of MCTS to choose moves.", "AlphaGo is composed of two phases: neural network training pipeline and MCTS.", "Such a room for improvements would inspire intellectual inquisition for better computer Go programs, potentially with deep RL only, without MCTS, like TD-Gammon (Sutton and Barto, 2017)."]} +{"17540505|1708582": ["\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan\u2026", "\u2026learning (Sutton and Barto, 2017; Szepesv\u00b4ari, 2010; Bertsekas, 2012; Powell, 2011; Bertsekas and Tsitsiklis, 1996; Puterman, 2005; Littman, 2015; Kaelbling et al., 1996); deep learning (LeCun et al., 2015; Goodfellow et al., 2016; Bengio, 2009; Deng and Dong, 2014); machine learning (Jordan and\u2026"]} +{"17540505|50458504": ["FinTech employs machine learning techniques to deal with issues like fraud detection (Phua et al., 2010), consumer credit risk (Khandani et al."]} +{"12325031|8974063": ["These problems include th e DSA-based MAC protocol design in CRNs [3], [4], [27], [28], routing protocol design in CRNs [14], [29] and cross-layer", "Network management DSA-based MAC protocol design [3], [4], [27], [28] Unsupervised learning (model-free learning) [25], [26], [33]\u2013[35] Single-agent-based reinforcement learning [25] Spectrum-aware routing [14], [29] Multi-agent-based reinforcement learning [26], [34] Self-organization [12], [30] Learning automata [35] Network security [20], [31] Repeated-game-based learning [33], [36], [37]"]} +{"12325031|7851743": [", CRNs and self-organized networks [12], [13]) emphasize more on autonomous, adaptive reconfigurability."]} +{"12325031|1185580": []} +{"12325031|2509135": ["Therefore, it is considered especially appropriate for the network management problems in the CRNs, device-to-device (D2D) networks, heteronomous networks (HETNETs) and ad-hoc networks, which consist of multiple independent decision-11 [55], [56], [59], [60], [82] Q-learning [55], [56], [82], SARSA [59], [60] Neural Network [56], State abstraction [59], [60], N/A [82] N/A Multirate transmission control MDP [57] Q-learning Neural network with feature extraction [57] N/A Call admission con-trol CMDP [68], [75] Q-learning [68], [75] State abstraction [68], [75] N/A Joint admission-bandwidth control CMDP [73], [83] Q-learning [83], Neural network [73] N/A N/A Single link", "A device in a CRN is expected to be aware of its surrounding environment and uses the methodology of understanding-by-building to reconfigure the operational parameters in real-time to achieve optimal network performance [2], [3].", "These problems include the DSA-based MAC protocol design in CRNs [3], [4], [27], [28], routing protocol design in CRNs [14], [29] and cross-layer network control problems in CRNs such as self-organization [12], [30] and network security problems [20], [31].", "This section provides a comprehensive survey on the applications of model-free learning in the cognitive wireless networks (following the broad-sense de\ufb01nition of CRNs), and will cover a wide spectrum of problems across different layers of the network-protocol stacks.", "Apart from [124], the direct applications of the standard L R \u2212 I learning scheme (with the convergence property of Theorem 4 and the pure-strategy NE existence condition) is also employed by a number of studies, which range from relay-selection in the cooperative network [125] to the CSMA-based DSA management [126] and the MIMO-based DSA management [127] in the CRNs.", "In recent years, Cognitive Radio Networks (CRNs) have been widely recognized from a high-level perspective as an intelligent wireless communication system .", "As we have discussed in Section III-B, for the Aloha-like spectrum access problem in CRNs [100], the near-NE policies of the stochastic access game can be obtained if all the SUs update their local polices with the Logit function (44) and the Q-value at state s is updated following (25).", "Although the detailed discussion on these topics is beyond the scope of this survey, it is believed that addressing these issues will bring great improvement to the existing learning mechanisms in the CRNs.", "It is worth noting that by emphasizing the network architecture of spectrum sharing between the licensed/primary networks and the unlicensed/secondary networks [4], \u201cDSA networks\u201d is frequently considered a terminology that is interchangeable with \u201cCR networks\u201d [3].", "One example of such exploitation can be found in [157], which models the distributed dynamic routing in multi-hop CRNs as an SG (Figure 16).", "In addition to L R \u2212 I learning, other learning schemes based on the general LA updating rule in (11) are also employed by research on resource allocation in the CRNs.", "The feature extraction method is further adopted in stochastic-game-based modeling for strategy learning in CRNs [61], [62].", "In the framework of CRNs, the following abilities are typically emphasized: Wenbo Wang and Andres Kwasinski are with the Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY 14623 USA (email: wxw4213@rit.edu, axkeec@rit.edu)."]} +{"12325031|3042022": ["Based on the MDP framework, various model-free learning methods such as Temporal Difference (TD) learning [44] and learning automata [35] can be adopted to define the behavior rules of an agent.", "In the literature, important surveys on these model-free learning methods from the perspective of control/game theory include [25], [26], [33]\u2013[35].", "Then an LA-based algorithm should be able to achieve the following goal [35]:", "Instead of updating the action according to the myopic optimal Q-value in discounted-reward MDP and bias-value in average-reward MDP, the LA directly updates the probabilities of actions based on the utility feedback [35]."]} +{"12325031|1708582": []} +{"12325031|12601073": ["As indicated by our discussion in Sections I-A and I-B, the problem domain of learning in cognitive wireless networks can be divided into two categories: the problems of wireless environment cognition (namely, spectrum sensing) [7]\u2013[9] and the problems of network management (namely, strategy learn-", "For an overview of the relevant techniques, the readers may refer to recent survey works in [7]\u2013[9]."]} +{"3710106|1932843": []} +{"5385031|7320605": ["Moreover, the surveys on applications of game theory for wireless sensor network focus on general problems not specifically from economic and pricing aspects [12], [13].", "\u2022 Strategy: Player\u2019s strategy is a complete plan of actions/instructions that the player can choose [12], and the payoff depends on not only its own actions but also the actions of others."]} +{"5385031|1756215": [", the attacker and the WSN owners) which strengthen the network security [222]."]} +{"5385031|12817488": ["redundancy as well as saving the energy required for information transmission to the sink node [99], [100]."]} +{"5385031|17205659": ["Various WSN security protocols were classified and evaluated in [221]."]} +{"54442710|10235514": ["\u2026diversify, the customer\u2019s demand for quality, not only quantity, of data traf-fi generation (5G) cellular heterogeneous networks HetNets) [1, 2] and ultra dense networks (UDNs) , 4], is expected to be a critical issue due to the signifi cant stress infl icted on wireless communication\u2026"]} +{"34071905|3913780": ["In [25], the authors survey on the existing methods for predicting the popularity of different types of web content.", ", [\u2212\u221e, 5], [5, 10], [10, 15], [15, 20], [20, 25], [25, 30], [30, 35], [35, 40], [40, 45] and [45, +\u221e]."]} +{"4682677|6909107": ["This can be well captured by Equation (12) (ie, IQX).", "According to Bellman Optimality Equation, the optimal policy \ud835\udf0b \u2217 is the one that holds the following: We model the Q2-SFC orchestration as an MDP in that: \u2022 \ud835\udc46 : Every state \ud835\udc60 \u2208 \ud835\udc46 represents the system environment including network topology, VNF instances\u2019 QoS/QoE status, functional and QoS requirements of the SFC request being processed, etc. \u2022 \ud835\udc34 : Every action \ud835\udc4e \u2208 \ud835\udc34 represents the selection of a certain direct successive VNF instance from the current VNF instance.", "For positive QoS metrics (the bigger value, the better), the corresponding QoE can be derived in Equation (11) according to WFL, whereas for negative QoS metrics (the smaller value the better), the corresponding QoE can be derived in Equation (12) according to IQX, where qosc is the tth QoS metric of service function chain c, whose value can be calculated using algorithms in Table 1."]} +{"12936702|9316331": []} +{"12936702|10725980": []} +{"195347494|17485266": ["We use the RMSProp algorithm [29] with an adaptive learning rate \u03b1 ( t ) ."]} +{"195347494|1708582": ["A reinforcement learning agent learns its best policy from observing the rewards of trial-and-error interactions with its environment over time [19], [20]."]} +{"128194197|3757239": ["MEC can bring various bene\ufb01ts, where minimizing energy consumption and minimizing latency are two major optimization objectives [11].", "When caching technology is integrated into mobile networks, where to cache, what to cache, and how to cache are the major factors that make a signi\ufb01cant in\ufb02uence on the system performance [11]."]} +{"128194197|3330461": ["As a promising approach to of\ufb02oad traf\ufb01c from BSs, D2D communications can enable the sharing of radio connectivity and direct information delivery between two close users [29], [30]."]} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"4655501|1708582": ["RL [28] is not deep learning, but we can consider it as a kind of machine learning techniques."]} +{"26853250|53018231": ["SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions Section II: Artificial Neural Networ", "se works are limited in a number of ways. First,a majority of the existing worksfocuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks. Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radi"]} +{"26853250|9461213": ["e Learning Tools Key Applications FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in ", "ss application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing sur"]} +{"26853250|3645740": ["FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions ", "3], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing surveys and tutorials, such as [3], [51]\u2013[53"]} +{"26853250|206578365": ["In addition to caching, the wireless network\u2019s edge devices can be used for performing effective, low-latency computations, using the emerging paradigm of mobile edge computing [189]."]} +{"26853250|17485266": ["The mini batch gradient descent is an algorithm that strikes a balance between stochastic gradient descent and batch gradient descent [78].", "To solve these challenges, several algorithms have been proposed, such as momentum SGD, RMSProp [78], nesterov accelerated gradient [80], Adagrad [81], and AdaDelta [82].", "To overcome these drawbacks of SGD, the mini batch gradient descent [78] can be used."]} +{"26853250|5385031": ["More recently, ANNs have started to attract significant attention in the context of wireless communications and networking [2], [4], [5], [31] and [32], since the development of smart devices and mobile applications has significantly increased the level at which human users interact with the wireless communication system.", "Finally, the introductory literature on machine learning for wireless networks such as in [2], [4], [32], and", "Third, a large number of the existing surveys, such as [2], [4], and [52]\u2013[57], are highly qualitative and do not provide an in-depth technical and quantitative description on the variety of existing machine learning tools that are suitable for wireless communications.", "Meanwhile, a number of surveys on machine learning and neural network applications in wireless networking have emerged, such as in [2], [4], [32], and [51]\u2013[64]."]} +{"26853250|7774517": []} +{"26853250|1708582": ["RL algorithms are used for robotics, gaming, and navigation [67]."]} +{"18389147|1932843": ["Neural networks are powerful function approximators, but they have significantly more parameters than the simpler linear models that are often used in robotic learning [23], [8].", "However, practical real-world applications of RL typically require significant engineering beyond the learning algorithm itself: an appropriate representation for the policy or value function must be chosen so as to achieve training times that are practical for physical hardware [8], and example demonstrations must often be provided to initialize the policy and mitigate safety concerns during training [9]."]} +{"18389147|6988770": ["Accelerating robotic learning by pooling experience from multiple robots has long been recognized as a promising direction in the domain of cloud robotics, where it is typically referred to as collective robotic learning [31], [32], [33], [34]."]} +{"19706620|3273340": []} +{"49655086|6909107": ["In general, an offloading algorithm can enable the user to make three types of offloading decisions which are local execution, full offloading and partial offloading [3].", "The problem of computation offloading in a general mobile cloud computing system has been extensively studied in the literature [1], [3]."]} +{"49655086|3330461": ["For communication between the user and cloudlets, we consider a Device-to-Device (D2D) communication-enabled cellular network [12], which includes cellular and D2D communication modes.", "In addition, since the user can utilize direct communication technologies such as Bluetooth and Wi-Fi Direct to communicate with the cloudlet, the offloading latency is lower compared to the case of accessing the traditional centralized resource clouds (e.g., Amazon EC2 and Microsoft Azure) through the backbone network via 3G/4G cellular networks or Wi-Fi access points.", "Also, it is assumed that the D2D mode uses the out-of-band D2D communication with Wi-Fi Direct [12].", "More specifically, for offloading the tasks, the user first starts the D2D mode using a direct link (e.g., Wi-Fi Direct or Bluetooth links) to transmit the task-related data to the cloudlet."]} +{"207244918|1932843": ["RL has been used for a variety of learning tasks, ranging from robotics [25, 24] to industrial manufacturing [26] and computer game playing [34]."]} +{"207244918|1708582": ["RL has been used for a variety of learning tasks, ranging from robotics [25, 24] to industrial manufacturing [26] and computer game playing [34]."]} +{"3666582|21386749": []} +{"3482957|3913780": ["In [27], the authors survey on the existing methods for predicting the popularity of different types of web content."]} +{"5528008|1708582": []} +{"58672266|12325031": ["problems in addition to node sleeping operations [29]\u2013[31]."]} +{"3468741|3913780": []} +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} +{"23456404|3504276": [", wireless powered communication network (WPCN), was presented [4], where some wireless nodes harvest energy and use the harvested RF energy to transmit/decode information to/for other nodes."]} +{"23456404|3055684": []} +{"23456404|12029139": ["RECENTLY, radio-frequency (RF) energy harvesting (EH) has attracted much interest due to its capability of providing reliable and perpetual energy sources for energy-constrained wireless networks, including Internet of Things (IoT) and wireless sensor networks (WSNs) [1]\u2013[7]."]} +{"11866341|1708582": ["MDPs are the focus of much of the reinforcement learning (RL) work [17,29]."]} diff --git a/edge/graph_53024487.jsonl b/edge/graph_53024487.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8319cf756a48285ae29f9b90dae6b6a66679cf67 --- /dev/null +++ b/edge/graph_53024487.jsonl @@ -0,0 +1,13 @@ +{"120807361|8530790": []} +{"44432351|8530790": ["Extensions of GAs to multi-objective optimization were proposed in several manners (for example, see Schaffer [3], Kursawe [4], Horn et al.[5], Fonseca & Fleming [ 6 ] and Murata & Ishibuchi [7])."]} +{"27954239|8530790": []} +{"18228419|8530790": ["Clearly, majority of research in the field of multi-objective metaheuristics concentrates on genetic algorithms (see Fonseca and Fleming, 1995, for review).", " Fonseca and Fleming (1995) consider fitness landscapes induced by very large, uniformly distributed populations."]} +{"2518096|1142274": ["Most research on job scheduling problems assumes that setup times are independent of the sequence of jobs [1].", "For each job j, the processing time pj and the tardiness penalty \u03b2j were uniformly generated in [1, 100] and [20, 100], respectively."]} +{"1308101|18746083": ["In the following, we consider the bi-objective PFSP, minimising both the makespan and the \u0083owtime of the schedule, two objectives widely investigated in the literature [18], where makespan is the total completion time of the schedule, and \u0083owtime is the sum of the individual completion times of the N jobs."]} +{"15630455|8530790": ["A more thorough comparative analysis is the topic of future work, where we intend to make use of the multiobjective assessment techniques put forward by Fonseca and Fleming [ 3 ]."]} +{"121448294|8530790": []} +{"12280636|14478191": ["MOEAs are general-purpose multi-objective optimization methods, and have been applied to a large variety of optimization problems [1], from reinforcement learning [15] to design space exploration [12]."]} +{"31589765|18746083": ["[8] as an extension of the well-known random generated instances of Taillard [9], in which due dates have been added."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"15123521|17438822": []} +{"1502876|18746083": ["[11], focus only on the non-weighted variant.", "In order to perform a fair evaluation of the quality of the resulting hybrid algorithm, we reimplemented MOSA [12] and MOGLS [13], two state-of-the-art algorithms for bi-objective PFSPs [11].", "[11] identified MOSA as the best algorithm among 23 algorithms for the three bi-objective PFSPs arising from the combinations of the objectives makespan, sum of flowtimes and total tardiness.", "[11] summarizes the current state-of-the-art for three bi-objective PFSPs, those arising from the pairwise combinations of the objectives makespan, sum of completion times, and total tardiness.", "[11] are small, we believe that the comparison indicates that our implementation of MOSA and MOGLS is at least as efficient as the original ones.", "[11] give a comprehensive overview of the literature on the three most commonly tackled problems and present the results of a sound and extensive experimental analysis of 23 algorithms.", "[11]\u2014uses the version of non-dominated sorting proposed by Deb et al.", "Given the good quality of TP+PLS suggested by the comparison with reference sets, we next compare the results of TP+PLS with multi-objective simulated annealing [12] and multi-objective genetic local search [13], two algorithms that have recently been shown to be state-of-the-art for various bi-objective PFSPs [11]."]} diff --git a/edge/graph_53026557.jsonl b/edge/graph_53026557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e11c4ef5248f747fe493f607abaed75daba2f17 --- /dev/null +++ b/edge/graph_53026557.jsonl @@ -0,0 +1,4 @@ +{"3504690|15589021": []} +{"3504690|41104565": ["The propagation characteristics of different modes of the acoustic waves are well known and their applications have been realized in many disciplines [14,39].", "All these surface waves are distinct from the bulk acoustic waves (BAWs) which propagate across the body of a material [38,39]."]} +{"3504690|189201": ["Alternatively, sensors based on other surface waves such as SH-SAW and Love waves have been successfully employed in fluidic media [21,24].", "For example, Rayleigh waves are excited in Y-Z LiNbO3 (where Y-Z stands for Y-cut, Z-propagating) and 128\u25e6 Y-X LiNbO3 substrates whereas SH-SAW are shown to excite and propagate in 64\u25e6 Y-X LiNbO3 and 36\u25e6 Y-X LiTaO3 [24,30,46]."]} +{"99517446|2087828": []} diff --git a/edge/graph_53029538.jsonl b/edge/graph_53029538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2fb0d55ca1932ef0a1bfc3867e73c6bf636f66bf --- /dev/null +++ b/edge/graph_53029538.jsonl @@ -0,0 +1 @@ +{"9859539|8310135": ["Generally, NER systems can be structured in terms of representation, induction, dependency modelling and integration of real-world knowledge [27, 33]."]} diff --git a/edge/graph_53030229.jsonl b/edge/graph_53030229.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..834d8b24a1db548d1db4144c9120faff1a9f70f1 --- /dev/null +++ b/edge/graph_53030229.jsonl @@ -0,0 +1,11 @@ +{"123656773|5822166": []} +{"123656773|14038195": []} +{"31844002|14060561": []} +{"2901579|14060561": []} +{"22523035|5822166": []} +{"22523035|14038195": ["\u2026such as education, engineering, management, manufacturing, and marketing to mention just a few (see, e.g., the overviews by Vaidya and Kumar 2006; Ho 2008; Ho et al.\nW. Gaul (B) \u00b7 D. Gastes Institute of Decision Theory and Operations Research (Karlsruhe Institute of Technology), Kaiserstrasse\u2026"]} +{"120513049|191396": []} +{"38316858|53030229": ["Brunelli (2018) offers a comprehensive overview of inconsistency indices and their ramifications."]} +{"64392227|14038195": []} +{"7745551|14038195": ["These vectors will reflect the weight, or relative importance, of each alternative for each criterion [8].", "AHP has been applied in several areas, such as logistics, manufacturing, government, and education [8]."]} +{"1506773|14038195": ["The utility of the method has been confirmed by numerous examples [29,12,20,27]."]} diff --git a/edge/graph_53035396.jsonl b/edge/graph_53035396.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77fe9b0c1c8982764f0f958a1d44ab34256ea3f0 --- /dev/null +++ b/edge/graph_53035396.jsonl @@ -0,0 +1,3 @@ +{"3093453|16049649": ["Fan and Lv (2010) give a comprehensive overview of SIS and a modification called \u201citerative sure independence screening\u201d (ISIS), their applications to feature selection for classification, and penalized likelihood methods for variable selection in sparse linear and generalized linear models."]} +{"4034894|192934": ["The adjective \\unsupervised\" is justi ed by two properties of the algorithm: (i) it is capable of selectingthe number of components, and, (ii) unlike the standard expectation-maximization (EM) algorithm, itdoes not require careful initialization of the parameters."]} +{"269058|2511280": []} diff --git a/edge/graph_53035780.jsonl b/edge/graph_53035780.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50331824b598db2ca1214ce26a7a4eef26b7b0f2 --- /dev/null +++ b/edge/graph_53035780.jsonl @@ -0,0 +1,90 @@ +{"40855145|16335158": ["A comprehensive review on sensor-cloud can be found in [7]."]} +{"474410|15947359": []} +{"9373992|17516538": ["\u008cese images can then be further processed, through the Fine Grain Context Detector, by di\u0082erent context extraction algorithms [27]."]} +{"53432777|8011310": ["Cortes [225] observe that, similar to platooning for conventional trucks [27, 31], flying in a formation enables the drones that are following the lead drone to consume less energy."]} +{"53432777|61132": ["[105] on communication protocols, Nex and Remondino [190] on drone platforms for 3D mapping, and Jawhar et al."]} +{"53432777|15517134": []} +{"53432777|7271501": ["[114], and Robin and Lacroix [228] for general surveys of the literature on the search problem.", "Other articles elaborate on adaptations of specific optimization problems to robotic applications in general, such as Galceran and Carreras [87] on coverage path planning and Robin and Lacroix [228] on target tracking."]} +{"53432777|1177069": ["Coverage path planning with drones refers to finding paths of drones such that all points of some area P are covered at least once (see general surveys by Choset [49] and Galceran and Carreras [87] on coverage path planning for robotics).", "Other articles elaborate on adaptations of specific optimization problems to robotic applications in general, such as Galceran and Carreras [87] on coverage path planning and Robin and Lacroix [228] on target tracking."]} +{"53432777|1230643": []} +{"8971278|16280711": ["Some virtual reality applications provide users with additional information about the real world, which is not accessible by human perception and named augmented reality ([6])."]} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"50732781|37025094": ["The running costs of RFID tags are impacting the business case just as much as with fixed RFID installations, hence there is a preference to high-value items and/or case/consignment identification for open systems (McFarlane & Sheffi 2003; Smith & Offodile 2002)."]} +{"4740226|52169284": ["Moreover, the surveys in [14], [15], [31], [33], and [48]\u2013[54] remain restricted to isolated UAV topics and use cases in wireless networking.", "In Table V, we provide some examples for the battery lifetime of various types of UAVs [31].", "In general, five main criteria are often considered when developing UAV regulations [31], [32]: 1) Applicability: pertains to determining the scope (considering type, weight, and role of UAVs) where UAV regulations are applied, 2) Operational limitations: related to restrictions on the locations of UAVs, 3) Administrative procedures: specific legal procedures could be needed to operate a UAV, 4) Technical requirements: includes communications, control, and mechanical capabilities of drones, 5) Implementation of ethical constraints: related to privacy protection.", "deployment of UAVs in various countries [31].", "These works also include a number of interesting surveys such as in [14], [15], [31], [33], and [44]\u2013[55].", "In general, the total energy consumption of a UAV is composed of two main components [31], [161], [169]: 1) Communication related energy, and 2) Propulsion energy.", "In [31] a survey on UAV-enabled cellular"]} +{"4740226|61132": ["[53] conducted a survey on the key challenges in UAV-based wireless communication networks.", "In particular, the work in [53] investigated issues pertaining to routing"]} +{"4740226|10310014": ["The potential broad-band wireless technologies for public safety scenarios include 4G long term evolution (LTE), WiFi, satellite communications, and dedicated public safety systems such as TETRA and APCO25 [65].", "nications, and dedicated public safety systems such as TETRA and APCO25 [64]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"52114222|2958701": ["auxiliary functions for the actual path planning, see [14] for a review."]} +{"52114222|61132": ["[8] and [9] provide summaries of the general challenges and opportunities."]} +{"6935592|16120075": ["Therefore, it has been simplified in many forms in the field of robotics and sensor networks [7]."]} +{"12229638|1517662": ["[4, 5] conducted detail surveys of conflict resolution methods."]} +{"16120075|3117516": ["Halawani and Kahn [80] also presented a survey on techniques, algorithms and protocols for network lifetime enhancement.", "and the energy preservation in sleep mode have to be also properly considered [80]."]} +{"16120075|15947359": ["Several papers can be found in the literature surveying wireless sensor networks [2,3,14] and visual sensor networks [6,15] as their main research areas.", "For the resulting Video-based Wireless Sensor Networks (VWSNs), or simply Visual Sensor Networks (VSNs), new researches had to be conducted, since many traditional WSN algorithms, architectures and computational solutions are not feasible or even efficient for that specific communication scenario [5,6].", "In fact, video-based wireless sensor networks may expect more energy consumption in local processing than in data transmission, contrary to traditional wireless sensor networks [6]."]} +{"16120075|1236072": ["A survey on the routing techniques and protocols for wireless sensor networks, including energy aware routing, can be found in [79]."]} +{"16120075|1230643": []} +{"51858916|61132": ["For instance, reference [58] identified key issues related to the formation of multi\u2013UAV network, but this survey focuses more on the communications and especially the control of UAV.", "Both [58] and [59] have very light touch on the channel modeling."]} +{"2958701|4716814": ["An evidence of the suitability of deep learning for many kinds of autonomous robotic applications is the increasing trend in deep learning robot related scientific publications over the past decades, which is expected to continue growing [8]."]} +{"2958701|1932843": ["These types of problems are suitable to be solved by means of a reinforcement learning framework [28]."]} +{"2958701|393948": ["These deep models show great performance not only in Computer Vision tasks but also in other tasks such as speech recognition, signal processing, and natural language processing [5]."]} +{"53767775|16120075": ["Therefore, it has been simplified in many forms in the field of robotics and sensor networks [6]\u2013[8].", "As for the second category, maximizing target coverage has been proven to be NP-complete for most of its variant formulations [6], [16].", "However, the problem of optimal camera location to maximize coverage has been shown to be NP-complete in many variations for both area and target coverage in both isotropic [5] and anisotropic sensors [6]."]} +{"49731727|15675156": []} +{"49731727|5660618": []} +{"58502909|2373140": []} +{"111151465|4680026": ["Many automated collision avoidance approaches using a variety of sensors have been derived for a range of robotic systems including small Micro Aerial Vehicles (MAV) [113], Au-tonomous Underwater vehicles (AUV), Unmanned Ground Ve-685 hicles (UGV) or humanoid robots [114]."]} +{"111151465|1517662": ["In manned aviation, resolution sometimes refers to the actual avoidance maneuver [87].", "Many aircraft systems, including the certified Traffic Alert and Collision Avoidance System (TCAS), use discrete logic to make avoidance decisions [87].", "Aircraft Avoidance Systems Many automated collision avoidance approaches have been derived for manned aircraft [87] an since suggested for unmanned aircraft [88], including the well known Traffic Alert and Collision Avoidance System (TCAS) [89]."]} +{"111151465|8363289": []} +{"11553913|17561208": ["Many survey papers have been published recently, providing overviews of the history, developments, and the current state of the art of remote sensing data processing in the imagebased application fields [2-4], but the major limitations in remote sensing fields has not been discussed in detail as well as image fusion methods."]} +{"659942|469744": ["Augmented reality (AR) is an interface that overlays digital information onto the user\u2019s view, spatially aligned to the current physical environment [1]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"12608150|2373140": []} +{"12092512|1990579": ["In the case of civilian drones, functional safety [AlTawy and Youssef 2016] needs cyber-physical security."]} +{"12092512|206459491": ["Also, regular side-channel analysis, including timing and power analysis, may be used for the detection of the activation of hardware trojans [Tehranipoor and Koushanfar 2010] because such trojans usually alter the system\u2019s parametric characteristics such as its expected performance and power\u2026"]} +{"110410925|14441987": []} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"33023048|1230643": ["In a conventional WSN, the data processing at the sensor node is very simple in most application scenarios [4]."]} +{"206828353|7686677": ["from those in the existing literature on terrestrial communication systems [15], [16]."]} +{"11315065|4680026": []} +{"11315065|1517662": ["If accurate relative position and velocity estimates could be acquired from image sequences, a large number of existing decision strategies used in robotics [15] and aviation could be considered [16]."]} +{"6841982|468992": []} +{"6841982|23041951": ["and data origin authentication. In contrast to other \ufb01elds in which security-related research is being actively conducted, swarm robotic systems suffer a lack of practical solutions to these problems [18]. The security topic has been overlooked by state-of-the-art research mainly due to the complex and heterogeneous characteristics of robotic swarm systems \u2014 robot autonomy, decentralized control, a la", "rom academic institutions to the industry [3]. Previous works have emphasized the lack of general methods to tackle topics such as safety analysis, testing mechanisms [49], [40] or security protocols [18] for swarm robotic systems, which hinder the progress to more broader commercial applications. One of the main axioms in the swarm robotics \ufb01eld has been the absence of global knowledge or explicit co"]} +{"6320876|1517662": ["[4749] However, the problem for a single UAV with static or dynamic obstacles has been mainly studied.[50-52] Especially, there are few results on collision avoidance for multipleUAV formation with a specified geometry."]} +{"207649994|1230643": ["[ 1-4 ]. A wireless sensor network consists of tiny sensing devices, deployed in a region of interest.", "On the other hand, protocol designers are seeking an energy efficient communication architecture, which involves all levels from the physical layer to the application layer [ 4 ].", "Our work is dedicated to scheduling nodes by using application knowledge (i.e., it belongs to one branch of application layer protocols according to the categories in [ 4 ]) and does not address the data communication problem."]} +{"13751888|51858916": ["In [6], the authors provide a survey on the measurement campaigns launched for UAV channel modeling using low altitude platforms and discuss various channel characterization efforts."]} +{"13751888|2958701": ["learning solutions in support of SAR operations using UAVs [58].", "economically less expensive [58]; 2) Real-world problems with high number of states can turn the problem intractable with current techniques, severely limiting the development of real applications.", "classification which has been proven very effective [58].", "16: Illustration of How CNNs Work [58].", "Some of challenges are: 1) The design of computing devices with low-power consumption, particularly GPUs, is a challenge and active working field for embedded hardware developers [58]; 2) While a few UAVs can already travel without a UAV operators directing their routes, this technology is still emerging.", "on-board powerful processor devices with low power consumption is an active area for future researches [58].", "An efficient method for coping with these types of problems remains as an unsolved challenge [58].", "In [58], a review of deep learning methods and applications for UAVs were presented."]} +{"13751888|11701828": ["The researchers used UAVs for conducting environmental sampling and ocean surface temperature studies in the Arctic [69].", "The UAV also took a vertical sounding in the eye of the typhoon and measured the strongest winds during the whole flight mission [69]."]} +{"13751888|61132": ["\u2022 There is a need for a seamless mechanism to transfer the users during the handoff process between UAVs, when out of service UAVs are replaced by active ones [2].", "SDN also can help to address the complexity of network management [2].", "\u2022 We need more studies about the topology of UAV wireless networks where this topology remains fluid during: a) Changing the number of UAVs; b) Changing the number of channels; c) The relative placements of the UAVs altering [2].", "it is difficult to construct a simple implementation for proactive or reactive schemes [2].", "FANET communication bands to mitigate this problem [2].", "It only constitutes 10%-20% of the UAV energy capacity [2].", "to the power limitations of UAVs, a decision must be taken on whether UAVs should perform data and image analysis onboard in real-time, or data should be stored for later analysis to reduce the consumed power [2], [50].", "is distributed over all UAV nodes), or hybrid in which the processing control of the forwarded packets can be performed locally on each UAV node and control traffic also exists between the centralized SDN controller and all other SDN elements [2].", "In [2], the authors attempt to focus on research in the areas of routing, seamless handover and energy efficiency.", "Fluid topology and rapid changes of links among UAVs are the main characteristics of multi-UAV networks or FANET [2]."]} +{"13751888|76603": ["\u2022 Utilizing UAVs in public safety communications needs further research, where topology formation, cooperation between UAVs in a multi-UAV network, energy constraints, and mobility model are the challenges that are facing UAVs in public safety communications [9].", "The authors of [9] present an overview of legacy and emerging public safety communications technologies along with the"]} +{"13751888|15517134": ["The authors in [60] presented major categories of collision avoidance methods.", "Therefore, the development of UAV collision avoidance techniques has gained research interest [60], [300].", "These algorithms include: flight route determination, path planning, collision avoidance and swarm coordination [59], [60]."]} +{"13751888|3330461": ["the capacity in ground communications systems [269]."]} +{"13751888|4269723": ["in FANET with high reliability, reachability and fast mobility of UAV nodes [349] \u2022 More research is needed to develope specific security protocols for FANETs based on the SDN paradigm.", "in which the control plane is completely decoupled from data plane and the routing protocols can be executed onboard from SDN switching devices [349]."]} +{"4933337|205286236": []} +{"4933337|3110415": ["Step 5: We solve the feature matching problem through SCR [12].", "It is generally known that in the field of UAV application, relevant target recognition research studies mainly include the following aspects [12].", "[12] G."]} +{"1629802|17516538": []} +{"1629802|11761017": []} +{"1629802|6028805": []} +{"51877788|51613885": ["For example, Surveys [11]\u2013[17] reviewed extant research and classified the challenges in encryption, authentication, access control, network security and application security in IoT systems."]} +{"51877788|4111957": ["avoids detection, thereby reducing the performance of the system remarkably [281].", "Examples of the potential threats that can be utilised by attackers include poisoning, evasion, impersonation and inversion attacks [281]."]} +{"51877788|9461213": ["A survey was similarly conducted on recent state-of-the-art DL approaches used in different applications for data analytics in IoT [38]."]} +{"51877788|3645740": ["Numerous effective ML practices were also used in selforganizing networks [34]."]} +{"51877788|1353379": ["To obtain insights from these data, researchers [39-44] have discussed different methods of integrating big data analytical methods with IoT design."]} +{"51877788|1599458": ["To obtain insights from these data, researchers [39-44] have discussed different methods of integrating big data analytical methods with IoT design."]} +{"51877788|3126100": ["Several classical ML methods were studied [30] along with advanced methods containing DL for handling common big data."]} +{"51877788|1990579": ["50 for credit card information and $3 for a social security number [75].", "sidered in the design phase [60], [75].", "Currently, collecting valuable personal information, particularly personal health data, has become rampant on the black market [75].", "However, their operation must meet a comprehensive security requirement in cyber and physical states [73], [75]."]} +{"51877788|21386749": ["On the other hand, the continuous use of traditional Internet protocol (TCP/IP) to connect billions of objects and devices worldwide is highly vulnerable to numerous security and privacy threats, such as viruses, intrusion and hacking, replay attack and identity theft [13], [61], [99].", "IoT has prodigious opportunities to potentially advance healthcare systems and a wide range of applications [61]."]} +{"51877788|18567112": ["without thorough security checks [112], [114].", "should be recognisee to develop practical security methods for mobile devices [112].", "a huge increase in Android malware [112]."]} +{"51877788|2521001": ["The internal environment involves all home IoT devices that are managed internally, and the external environment involves objects that are not managed by the smart home but play important roles in the construction of the smart home, such as smart grids [41], [71].", "Intelligent homes should consistently collaborate with their internal and external environments [71]."]} +{"51877788|11632848": []} +{"51877788|3348390": ["For instance, k-means clustering was used for securing WSNs by detecting intrusions [174].", "Moreover, IoT systems face new security threats that are inherited from wired and wireless SNs.", "The direct integration of a wireless SN into an IoT network poses several issues because traditional networks are no longer secure within IoT environments; for example, the resilience of WSNs (the sensors within a WSN openly provide its information to external parties) makes this network completely vulnerable to attacks in IoT environments [38, 80].", "Sensor networks (SNs) are significant resources for realising IoT systems.", "Understanding the sensor data delivered by these objects is a key step in achieving a context-aware IoT system [26], [45].", "In a study on Sybil detection in industrial WSNs [175], a kernel-oriented scheme was proposed to differentiate Sybil attackers from normal sensors by clustering the channel vectors.", "Sensor data can be utilised to obtain the context, and the obtained context can be used to provide smart services to users [26].", "Various classes of artificial intelligence approaches were studied [26] in the perspective of a context-aware framework,", "The concept of transfer learning can be useful for securing IoT systems, which comprise different elements, such as devices, WSNs and cloud computing.", "An IoT system consists of SNs and a wired network, thus creating a large-scale network surface.", "However, an IoT system cannot be constructed without SNs [26], [94].", "within a WSN openly provide its information to external parties) makes this network completely vulnerable to attacks in IoT environments [26], [94].", "However, an IoT system cannot be constructed without SNs [38, 80].", "SNs can be constructed without an IoT system."]} +{"51877788|121289": ["in which the electricity between suppliers and consumers is handled smartly to improve efficiency, safety and real-time monitoring [66]\u2013[68]."]} +{"51877788|12815020": ["Such attacks can be called insider attacks [96], which can introduce a critical trust issue when the cloud is integrated with IoT."]} +{"9612347|12127129": []} +{"15655454|16120075": ["While target coverage maximization has been shown to be NP-complete for most variants [8,37], many studies address this intractability by adding simplifying assumptions.", "It has therefore been simplified in different ways both in the robotics and sensor networks fields [8,15,36]."]} +{"1660289|10355303": ["Object representation is one of major components in any visual tracker and numerous schemes have been presented [35]."]} +{"18069189|3540699": ["264/AVC is the current most widely used ITU and MPEG video coding standard [6,7]."]} diff --git a/edge/graph_53036262.jsonl b/edge/graph_53036262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e026cd3c8ed2aafd75051322fd3f508b5db0bd2d --- /dev/null +++ b/edge/graph_53036262.jsonl @@ -0,0 +1,2 @@ +{"26493629|8983048": []} +{"108702376|14290416": []} diff --git a/edge/graph_53036589.jsonl b/edge/graph_53036589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53038989.jsonl b/edge/graph_53038989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53042493.jsonl b/edge/graph_53042493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..694683c34ada026c3aec8fd80e1effdf679c5801 --- /dev/null +++ b/edge/graph_53042493.jsonl @@ -0,0 +1,6 @@ +{"55615196|53042493": []} +{"16862771|16332566": ["Keywords: quantum control, quantum measurement, quantum open systems"]} +{"18773594|55883339": []} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"8430022|1803317": []} diff --git a/edge/graph_53042988.jsonl b/edge/graph_53042988.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..05c9e879a9cfb9e0ffff5bce707986d1a033a9ad --- /dev/null +++ b/edge/graph_53042988.jsonl @@ -0,0 +1,11 @@ +{"5546925|15273230": []} +{"40736193|18567112": ["An overview of the current malware trend is provided in the studies of (34; 33)."]} +{"14455772|6430931": []} +{"36176167|6430931": ["For explicit review of current development, refer to the recent review (Tsai, Hsu, Lin, & Lin, 2009; Wu & Banzhaf, 2010)."]} +{"9446238|12894036": ["The choice of representation can have a significant impact on learning algorithms [6]."]} +{"15087039|14077778": []} +{"21445320|6430931": []} +{"17887894|206584087": []} +{"17887894|7988320": []} +{"17887894|18650997": []} +{"17887894|12815020": []} diff --git a/edge/graph_53045113.jsonl b/edge/graph_53045113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0dfc4d0fed30f07827cc3d712cf7de86d9951fec --- /dev/null +++ b/edge/graph_53045113.jsonl @@ -0,0 +1 @@ +{"44607362|12083425": []} diff --git a/edge/graph_53045480.jsonl b/edge/graph_53045480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd3d71068b5915dfa39adcbf2148d693adee543b --- /dev/null +++ b/edge/graph_53045480.jsonl @@ -0,0 +1,13 @@ +{"44521796|585863": []} +{"17611538|12127129": ["There are many approaches used for background modeling, such as median filtering, Hidden Markov Model (HMM), frame averaging, non-parametric Kernel Density Estimation (KDE), Mixture of Gaussian, and Kalman filter [3][4].", "Recent research works for moving object detection in complex conditions outdoors are mostly inclined to adopt background subtracting method [3]."]} +{"1932266|53680608": []} +{"14882274|13365762": ["I. INTRODUCTION\nGLOBAL motion estimation (GME) is a useful tool forvideo processing, segmentation, and coding."]} +{"206591471|819377": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness.", "We refer to the work of Bouwmans et al. [4] for a comprehensive list.", "This originates from the quick weight up-date of the Gaussian mode, while the Gaussian distribution itself is adapted very slowly (cf. [4])."]} +{"206591471|12127129": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness."]} +{"14444412|12127129": ["In [2,5,6,18], the authors review several approaches: nowadays the most common are based on"]} +{"7514147|206051485": ["Simple temporal and/or spatial smoothing is often used in the early stage of pre-processing to reduce camera noise and to remove transient environmental noise such as rain and snow captured in outdoor applications."]} +{"7514147|8953108": []} +{"17503917|206051485": []} +{"10097220|64149568": []} +{"16128320|819377": []} +{"2288255|17252389": ["In this paper, we propose a novel framework for interactive image segmentation that builds upon graph-based manifold ranking model, a graph-based semi-supervised learning technique which can learn very smooth functions with respect to the intrinsic structure revealed by the input data.", "And in Section 3.2.2, we present our three-stage interactive image segmentation procedure."]} diff --git a/edge/graph_53046328.jsonl b/edge/graph_53046328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e72079376691bee65f002f07149e65505e2685a --- /dev/null +++ b/edge/graph_53046328.jsonl @@ -0,0 +1,4 @@ +{"10709483|1708582": ["Generally, planning with capability models occurs in the belief space, as with POMDPs [10]."]} +{"16177233|7360895": []} +{"17041392|1708582": ["In machine learning, related approaches include those algorithms that are supervised learning (SL), unsupervised learning (UL) or based on reinforcement (RL) [5]."]} +{"2368710|1708582": ["RL agents interact with the environment to collect experience which, by means of appropriate algorithms, is processed to generate an optimal policy (Kaelbling et al. , 1996).", "RL agents interact with the environment to collect experience which, by means of appropriate algorithms, is processed to generate an optimal policy (Kaelbling et al. 1996).", "Action model learning requires dealing with e\ufb00ectively exploring the environment while learning in an incremental and online manner, similarly to Reinforcement Learning (RL) (Kaelbling et al. , 1996)."]} diff --git a/edge/graph_53046901.jsonl b/edge/graph_53046901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c176460efde90450c94f2ee3364be643a858e01 --- /dev/null +++ b/edge/graph_53046901.jsonl @@ -0,0 +1,7 @@ +{"2206177|16153186": []} +{"2206177|17205659": []} +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} +{"3364037|7800459": []} +{"46192657|1708582": ["The third category, also known as the online learning, refers to process of handling the problems that an agent opposes when he must learn behavior via trial-and-error exchanges with an active environment [9]."]} +{"8808232|16449507": ["Open Provenance Model (OPM) [14] is a model that has been designed as a standard."]} +{"10829220|14792235": ["A number of studies investigate the desirable properties that a cloud monitoring tool should possess [26], [27], [28]."]} diff --git a/edge/graph_53047084.jsonl b/edge/graph_53047084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6cd4c2ac52129119c5c7e0abd89249e582b12e2 --- /dev/null +++ b/edge/graph_53047084.jsonl @@ -0,0 +1,2 @@ +{"46512600|2762484": []} +{"8553239|35426346": []} diff --git a/edge/graph_530484.jsonl b/edge/graph_530484.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53065110.jsonl b/edge/graph_53065110.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53067489.jsonl b/edge/graph_53067489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94231af3c94c636a5c113fcfdb51e0d7bc76cb61 --- /dev/null +++ b/edge/graph_53067489.jsonl @@ -0,0 +1,9 @@ +{"18369241|1230643": ["The interest in Wireless Sensor Networks (WSNs) is mainly fueled by the many applications that can be leveraged by WSNs [1].", "Since WSNs are deployed in remote regions and operates autonomously, the recovery should be a self-healing process.", "978-1-4244-8077-7/10/$26.00 2010 IEEE\nI. INTRODUCTION The interest in Wireless Sensor Networks (WSNs) is mainly fueled by the many applications that can be leveraged by WSNs [1].", "Therefore, provisioned solutions suit WSNs with stationary and inexpensive nodes.", "VI. CONCLUSION This paper has proposed an effective and efficient recovery scheme for restoring connectivity and limiting the coverage degradation that the failure of a critical node may inflict in WSNs."]} +{"10209796|1230643": ["THE growing interest in the applications of wireless sensor networks (WSNs) has motivated lots of research work during recent years [1], [2]."]} +{"49296637|1230643": ["Wireless sensor networks (WSNs) provide deployment of low cost wireless nodes which are useful to collect and measure data about a certain environment [1].", "Wireless sensor networks are widely used in many application areas such as rescue operations, habitat monitoring, structural monitoring, and wild fire detection [1]."]} +{"8137143|1230643": ["A wireless sensor-actuator network (WSAN) [1, 2 ,7] is composed of sensor nodes and actuator nodes interconnected in a wireless network."]} +{"3473576|1230643": []} +{"3447432|15357269": ["Cluster-based node failure algorithms were proposed by [43,44] that are based on 1-hop node failure recovery process."]} +{"1445215|12817488": ["The main goal of data-aggregation algorithms in sensor networks is to gather and aggregate data in an energy efficient manner to prolong the network lifetime [32].", "Energy harvesting [30], power management and control [31], and data aggregation [32] are some examples."]} +{"1445215|12060835": ["Energy-harvesting with the aim of converting ambient energy to electrical energy has emerged as an alternative to power sensor nodes [30].", "Energy harvesting [30], power management and control [31], and data aggregation [32] are some examples."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} diff --git a/edge/graph_53068095.jsonl b/edge/graph_53068095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53074338.jsonl b/edge/graph_53074338.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7df010332ee68b4744a11e8f9696d4dc5d3003ed --- /dev/null +++ b/edge/graph_53074338.jsonl @@ -0,0 +1,3 @@ +{"122188865|5660618": []} +{"120148878|5660618": ["On the other hand, networked control systems (NCSs) have become very popular in recent years [11\u201319]."]} +{"52236368|5660618": ["Some compensating mechanisms for dropped data are provided to get achievable control performances in [11]."]} diff --git a/edge/graph_53076520.jsonl b/edge/graph_53076520.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93181b37b8ad9284bad3258edf636365cb58077b --- /dev/null +++ b/edge/graph_53076520.jsonl @@ -0,0 +1,7 @@ +{"42639724|10464056": []} +{"23490096|2937482": ["In this section, an FBS protocol is designed to solve the clock-synchronization problem in WSNs.", "FTSP [11] works in a way similar to DMTS. Based on an assumption that the delays obey Gaussian distributions, the method in NTP [17] that estimates the round-trip transmission time is employed in WSNs for offset compensation purposes [10], [13], [14].", "It is clear that FBS consumes far fewer resources than FTSP, since L should be made relatively large, making it very difficult to use FTSP in resourceconstrained WSNs.", "Index Terms\u2014Clock synchronization, closed-loop control, proportional\u2013integral (PI) controller, sleep clock, wireless sensor networks (WSNs).", "Digital Object Identifier 10.1109/TVT.2010.2049869\nA common time reference for all sensor nodes is essential to ensure the WSN applications working properly, and it plays a pivotal role in sensor activation [6], medium-access control [7], etc.\nAchieving time synchronization in WSNs is a challenging issue.", "In this paper, a lightweight synchronization protocol, namely, FBS, has been proposed to solve the problems associated with clock model perturbation and external disturbances, which widely exist in most low-frequency sleep clocks in WSNs.", "In recent years, numerous synchronization protocols have been proposed, focusing on different aspects of the synchronization problem in WSNs [15].", "WSNs can be used for monitoring [2], [3], object localization and tracking [4], [5], etc.\nManuscript received November 9, 2009; revised February 27, 2010; accepted April 23, 2010.", "Due to all aforementioned challenges, several timesynchronization schemes for WSNs have been proposed since Elson and Romer first discussed this problem in 2002 [8], including the reference broadcast synchronization (RBS) protocol [9], time synchronization protocol for sensor networks (TPSN) [10], the delay measurement time synchronization protocol (DMTS) [1], the flooding time synchronization protocol (FTSP) [11], tiny synchronization/mini synchronization (TS/MS) [12], etc."]} +{"27968401|5660618": []} +{"6305296|2937482": []} +{"10813650|10464056": ["Control theory tackles since decades the challenge of adapting (physical) plants in a variety of engineering domains, and in the last few years it has started to be applied to build adaptable software [2\u20135]."]} +{"10464056|8914588": ["Analyzing the characteristics and trends of a large body of literature is a challenging task, consequently results of the exiting surveys [2], [4], [6]\u2013[8], [11], [15], [20] are often significantly limited to application domains or solution domains."]} +{"10464056|2109857": ["In [7], a comprehensive survey has been conducted on different types of control engineering approaches applied to middleware (e.g., web and application servers)."]} diff --git a/edge/graph_53078094.jsonl b/edge/graph_53078094.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..776c9cff80d53284198d1032d0d81493f3e1ef27 --- /dev/null +++ b/edge/graph_53078094.jsonl @@ -0,0 +1,9 @@ +{"7946699|2609569": ["Also, all the indexes were based on H-index which is primarily used for ranking academic scholars and have its own limitations [14]."]} +{"63257756|11792588": []} +{"32550904|1097238": ["Inducing diversity through some random process, for example, training networks with different weight initialization is a correct procedure [14] but has a limited effectiveness [16].", "A higher diversity can be accomplished through a guided design of the ensemble [17][18] or inducing additional differentiation in the training process [16], for example modifying the input space."]} +{"63342841|2790013": []} +{"14784985|16030979": ["\u2026as a black-box in which each possible set of features is evaluated by performing the classification; 2) Filters \u2013 that usually evaluate the sets of features based on some statistical measure and not on the classifier; and 3) Embedded \u2013 in which the feature selection is a part of the classifier [9].", "These meta-heuristics are able to find good sets of features without the need to exhaustively explore the entire search space.", "FEATURE SELECTION IN HANDWRITTEN DIGIT RECOGNITION\nHandwriting is an individual mark and its interpretation has become a human ability.", "One of the main difficulties relies on a high intra-class variance due to the different forms associated to the same pattern.", "978-1-4673-8418-6/15/$31.00 \u00a92015 IEEE\nThe HCR process consists of three stages [13]: (1) Preprocessing \u2013 corrects and simplifies the data in order to improve its quality without losing relevant information; (2) Feature extraction \u2013 finds the set of features that represent the data, aiming for\u2026"]} +{"14784985|15782139": ["These meta-heuristics are able to find good sets of features without the need to exhaustively explore the entire search space."]} +{"207152384|2762290": []} +{"51685808|11792588": []} +{"51685808|15782139": []} diff --git a/edge/graph_53078211.jsonl b/edge/graph_53078211.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53078683.jsonl b/edge/graph_53078683.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b15a8cfd2e24126e554e1d8cbd2f13f49ab3b958 --- /dev/null +++ b/edge/graph_53078683.jsonl @@ -0,0 +1 @@ +{"70939544|14307102": []} diff --git a/edge/graph_53079557.jsonl b/edge/graph_53079557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..986d7912e8d6c32e8df800f8ab28da427658dcf2 --- /dev/null +++ b/edge/graph_53079557.jsonl @@ -0,0 +1,2 @@ +{"1209750|2623404": []} +{"195649387|16403716": []} diff --git a/edge/graph_53080750.jsonl b/edge/graph_53080750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49cc2d6f860350f6bb2b542ca6077a8f3f8d6532 --- /dev/null +++ b/edge/graph_53080750.jsonl @@ -0,0 +1,13 @@ +{"3461846|19938676": ["availability of cloud platforms, and consequent extreme data rate and reliability requirements [1], [4]; traditional procedures are not only prohibitive from a cost viewpoint, but also from"]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"28222603|1708582": ["Three methods namely, DP, Gittins indices and learning automata exist in the literature to solve the MABP optimally [14].", "The bandit problem described above is equivalent to an MDP with a single state, multiple actions and an action resulting in self transition [14]."]} +{"207793502|4943134": ["Note that another recently published survey [27] proposes a very similar categorization of existing applications of artificial intelligence in optical networks."]} +{"207793502|1580493": ["increased complexity of the underlying transmission systems is re\ufb02ected in a series of advancements in both data plane and control plane. At data plane, the Elastic Optical Network (EON) concept [12]\u2013[15] has emerged as a novel optical network architecture able to respond to the increased need of elasticity in allocating optical network resources. In contrast to traditional \ufb01xed-grid Wavelength Divisi"]} +{"207793502|13172512": ["as intrusion detection [2], traffic classification [3], cognitive"]} +{"207223470|12894036": ["Spectral clustering [58] has recently started receiving attention [7] due to its success over other types of data [21].", "For example, spectral clustering [21] or certain variants of hierarchical clustering [40] are more appropriate to identify density-based clusters (i."]} +{"4943134|1708582": ["Finally, in reinforcement learning [43] an agent learns an optimal (or nearly optimal) policy from a series of reinforcements (rewards) or punishments received from its interaction with the environment."]} +{"4943134|4269723": ["The software defined networking (SDN) paradigm [125], which decouples control and data planes, and enables programmability on the former plane, has aroused the interest of both industry and research communities by allowing networks managers to manage, configure, automate and optimize network resources via software."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} diff --git a/edge/graph_53081896.jsonl b/edge/graph_53081896.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ab0ae6e840a91afd8095a0d54b5ab09e34f0d7c --- /dev/null +++ b/edge/graph_53081896.jsonl @@ -0,0 +1,17 @@ +{"44184445|21386749": ["With a wide range of supported applications, IoT is integrating more mobile nodes/devices in different domains (e.g. agriculture [51, 52], connected vehicle [27], healthcare [21], smart city [55])."]} +{"44184445|763939": ["Many studies focused on handling mobility in Wireless Sensor Networks (WSNs) [38, 2, 23, 54, 32, 11] (more can be found in survey [10, 12]) and ad hoc network [5, 18]."]} +{"7349641|8909218": ["Keywords\nTV white spaces, clustering algorithms, sensor placement"]} +{"7349641|206583375": ["See [17] for a recent survey."]} +{"4305391|2527194": []} +{"4305391|4427557": ["Today, LPWANs are not equipped to handle this imminent challenge that will make the spectrum overly crowded [52]."]} +{"4305391|21386749": ["Examples of IoT applications for healthcare include remote health monitoring, elderly care, chronic disease [41], etc."]} +{"4305391|28210515": ["Coexistence handling for WiFi, existing WSN, Blue-tooth [57, 66, 67] will not work well for LPWANs."]} +{"17056436|8909218": []} +{"8200443|1503157": ["Wireless Sensor Networks: Past work has used multihop networks [5, 19, 23, 26, 39, 45, 57, 60] to gather data from sensors in the farm."]} +{"207183151|1708582": ["in terms of reinforcement learning [14], and suggest a control strategy that adjusts node duty cycles based on animal arrival patterns [9]."]} +{"1540748|8909218": ["Since 70% of traffic demand comes from indoor environments [17] and there are significantly more TVWS in indoors than those in outdoors [10], it is important to investigate the indoor white space networking issues."]} +{"207881413|595093": ["(A more detailed discussion on Smart Grid domains can be found in [14] [15] [16].)"]} +{"207881413|6959212": ["Compared with legacy power systems, the Smart Grid is envisioned to fully integrate high-speed and two-way communication technologies [4] [5] [6] [7] [8] into millions of power equipments to establish a dynamic and interactive infrastructure with new energy management capabilities, such as advanced\u2026"]} +{"207881413|2457428": ["As key management for conventional computer networks has been well categorized and summarized in several survey papers [117,118], in the following, we focus on the new requirements of key management for the Smart Grid, and present an overview of existing key management schemes for power systems."]} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"14056580|1775475": ["Packet loss is a quality-of-service metric that indicates the effective end-to-end application throughput [8]."]} diff --git a/edge/graph_53087935.jsonl b/edge/graph_53087935.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73aab31820e9913549db0283f9311593e225adf5 --- /dev/null +++ b/edge/graph_53087935.jsonl @@ -0,0 +1,17 @@ +{"14382463|8250043": []} +{"205437295|4602249": ["SMs Search-based testing for non-functional system properties 2008 [41] Product lines testing 2011 [42] Graphical user interface (GUI) testing 2013 [43] Test-case prioritization 2013 [44] Software test-code engineering 2014 [45] SLRs Model-based testing 2007 [46] Automated acceptance testing 2008 [47] Mutation testing for Aspect-J programs 2013 [48] Web application testing 2014 [49] Testing scientific software 2014 [50] Regular surveys Testing finite state machines 1996 [51] Regression testing minimization, selection and prioritization: a survey 2012 [52] Testing in SOA 2013 [53] Test-case generation from UML behavioral models 2013 [54] Test oracles 2014 [55]"]} +{"205437295|8742997": ["SMs Search-based testing for non-functional system properties 2008 [41] Product lines testing 2011 [42] Graphical user interface (GUI) testing 2013 [43] Test-case prioritization 2013 [44] Software test-code engineering 2014 [45] SLRs Model-based testing 2007 [46] Automated acceptance testing 2008 [47] Mutation testing for Aspect-J programs 2013 [48] Web application testing 2014 [49] Testing scientific software 2014 [50] Regular surveys Testing finite state machines 1996 [51] Regression testing minimization, selection and prioritization: a survey 2012 [52] Testing in SOA 2013 [53] Test-case generation from UML behavioral models 2013 [54] Test oracles 2014 [55]"]} +{"34839317|14920988": []} +{"43413418|8742997": ["They were: (1) a SLR on fault-based mutation testing techniques and tools for Aspect-J [63], and (2) a SLR on automated acceptance testing [64]."]} +{"6880727|14920988": []} +{"6880727|8250043": []} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"34563682|16186842": ["Fa ha d an d N ad ee m [3] 20 08 S ur ve y \u2014"]} +{"2025859|14920988": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|8250043": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|16125167": ["To conduct a systematic mapping, a classification scheme (also called systematic map or attribute framework [18]) needs to be derived by a careful analysis of the primary studies [47]."]} +{"29635678|205435103": []} +{"31118704|14920988": ["10 Combinatorial testing 30 2005 [102] SOA testing 64 2008 [103] Symbolic execution 70 2009 [104] Testing web services 86 2010 [105] Mutation testing 264 2011 [106] Product lines testing 16 2011 [107] Taxonomy Model-based GUI testing 33 2010 [108] Literature review TDD of user interfaces 6 2010 [109]", "4 SECONDARY STUDIES IN SOFTWARE TESTING We were able to find 25 secondary studies [88-111], [125] reported, as of this writing, in different areas of software testing."]} +{"31118704|8250043": ["10 Combinatorial testing 30 2005 [102] SOA testing 64 2008 [103] Symbolic execution 70 2009 [104] Testing web services 86 2010 [105] Mutation testing 264 2011 [106] Product lines testing 16 2011 [107] Taxonomy Model-based GUI testing 33 2010 [108] Literature review TDD of user interfaces 6 2010 [109]", "4 SECONDARY STUDIES IN SOFTWARE TESTING We were able to find 25 secondary studies [88-111], [125] reported, as of this writing, in different areas of software testing."]} +{"42535396|17292349": ["[16] perform an orchestrated survey of methodologies for automated software test case generation."]} +{"42535396|627405": ["These libraries were chosen because they cover the most relevant sources in software and security engineering [35]."]} diff --git a/edge/graph_53088430.jsonl b/edge/graph_53088430.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6c77f98f69f9d958f48937cd67e898fa222ac54 --- /dev/null +++ b/edge/graph_53088430.jsonl @@ -0,0 +1,7 @@ +{"7046577|15114906": []} +{"2512852|8042219": ["Some obfuscate data flow [4], [5] or control flow [3], [4], [6], [7], [8], [9], [10], [11]."]} +{"12898606|8042219": ["The goal of software protection through code obfuscation is to transform the source code of an application to the point that it becomes unintelligible to automated program comprehension tools or becomes unanalysable to a human adversary interpreting the output of program analyses run on the obfuscated application [19]."]} +{"18996333|17683961": ["Various aspects of software like the logic of the algorithm, the watermarking code [4], and the procedures may require protection."]} +{"18398565|17292349": ["For example, consider the program from Listing 3, which computes a value (hash) based on its first argument (argv[1]) and outputs \u201cwin\u201don the standard output if this value is equal to 809267.", "[1] are: symbolic/concolic execution, model-based test case generation, combinatorial testing, fuzzing, (adaptive) random testing and search-based testing.", "It has an execution tree with 2 \u00d7 strlen(argv[1]) paths.", "5 argv [1][4] == \u20195\u2019) printf(\"win\\n\");", "The resulting program has 2 paths, because the predicate is executed \u03c4 = strlen(argv[1]) times.", "Each program from the second data set computes a different function fi(argv[1]) and outputs some integer number.", "[1] indicate 3 fundamental issues of symbolic execution: (1) path explosion, (2) path divergence and (3) complex constraints."]} +{"17634104|206778272": ["Refactoring is defined as \u201cthe process of changing a object-oriented software system in such a way that it does not alter the external behavior of the code, yet improves its internal structure\u201d [7, 13]."]} +{"15969942|8042219": ["A software pirate will make every effort to steal or change the logic contained in commercially distributed code by reverse engineering; and, the software developer would want to prevent the pirate from stealing those code secrets."]} diff --git a/edge/graph_53092925.jsonl b/edge/graph_53092925.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aeaa7d5e022317f36efd9868f8ff4c6102a6d205 --- /dev/null +++ b/edge/graph_53092925.jsonl @@ -0,0 +1,10 @@ +{"12150337|913718": ["When mirroring this problem to current state of the art approaches, we found several interesting works that have attempt to: (i) generate mappings between category hierarchies [6, 9, 11], (ii) generate mappings from tag information spaces to category hierarchies [1, 12] and (iii) classify textual documents under category hierarchies [2, 5]."]} +{"12906290|14261802": ["Therefore, the discovery of educational materials should go beyond finding a few specific documents [8], rather the user could require assistance to find relevant material."]} +{"220756|12886544": ["\u2026primarily aimed at software engineering, although it can be applied in a wider\nset of contexts, e.g. adaptive and intelligent systems for collaborative learning [Magnisalis et al., 2011]; indeed, this methodology is based on existing guidelines for systematic reviews in medical and social sciences."]} +{"31550713|13022232": []} +{"52125248|7389705": ["net/) cloud[25] and other LOD sources such as DBpedia"]} +{"60850541|14088200": ["We can consider semantic information representation as an important step towards a wide efficient manipulation and discovery of information (Freyne & Smyth, 2004; Calic et al., 2005; Carbonaro, 2006)."]} +{"10108789|191396": ["Details about these methods can be found in (Xu and Wunsch, 2005)."]} +{"10108789|10500613": ["In this manner, the great effort of the database community and others should also be applied to the TEL community in order to facilitate the integration of heterogeneous data, see (Doan and Halevy, 2005; Kalfoglou and Schorlemmer, 2003; Rahm and Bernstein, 2001; Shvaiko and Euzanat, 2005) for traditional surveys.", "\u2026the great effort of the database community and others should also be applied to the TEL community in order to facilitate the integration of heterogeneous data, see (Doan and Halevy, 2005; Kalfoglou and Schorlemmer, 2003; Rahm and Bernstein, 2001; Shvaiko and Euzanat, 2005 ) for traditional surveys."]} +{"10108789|913718": ["In this manner, the great effort of the database community and others should also be applied to the TEL community in order to facilitate the integration of heterogeneous data, see (Doan and Halevy, 2005; Kalfoglou and Schorlemmer, 2003; Rahm and Bernstein, 2001; Shvaiko and Euzanat, 2005) for traditional surveys.", "\u2026the great effort of the database community and others should also be applied to the TEL community in order to facilitate the integration of heterogeneous data, see (Doan and Halevy, 2005; Kalfoglou and Schorlemmer, 2003; Rahm and Bernstein, 2001; Shvaiko and Euzanat, 2005 ) for traditional surveys."]} +{"52901104|13022232": ["Consumption of LD is discussed by Dadzie and Rowe [77], who address the approaches and challenges involved in data visualization."]} diff --git a/edge/graph_53096672.jsonl b/edge/graph_53096672.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f87c3f213f00ba6e2136dea3432da9c5721cd96a --- /dev/null +++ b/edge/graph_53096672.jsonl @@ -0,0 +1,14 @@ +{"1045112|1400872": ["Methods for controllingthe dynamics of recurrent neural networks through adaptive mechanisms are reviewed in Pearlmutter (1995)."]} +{"14194878|1400872": ["for supervised learning, the back-propagation algorithm for feedforward [32, 22, 30] or recurrent [28] NNs), that would favour such approach.", "variants of gradient methods for accelerated convergence, modification of the method for supervised learning of recurrent networks [28])."]} +{"30183742|16467945": ["The consolidated interest around hybrid metaheuristics is also demonstrated by publications on classifications, taxonomies and overviews on the subject [86, 85 , 104, 72].", "In general, hybrid metaheuristic approaches can be classified as either collaborative combinations or integrative combinations (see [ 85 , 86])."]} +{"30183742|175549": ["Among those are the ones by B\u00a8 ack [4], by Fogel et al. [36], by Kobler and Hertz [54], by Spears et al. [ 99 ], and by Michalewicz and Michalewicz [71]."]} +{"1212232|7215096": []} +{"12980|12957829": ["A comprehensive review and taxonomy of the plethora of PSO and DE hybrids can be found in [212]."]} +{"46930250|393948": ["Sometimes, original data representations [8] may not provide the most expressive data for a well-determined task."]} +{"15230364|13215551": ["Data mining is one of the contemporary areas of application, where these techniques have been found ef \ufb01 cient for clustering, classi \ufb01 cation, feature selection and outlier detection [21,22]."]} +{"8888128|18599847": ["\u2026as MLPs (Multi-Layer Perceptrons) [1], RBF (Radial Basis Function) neural network [2], Extreme Learning Machine [3][4], deep learning autoencoders [5], FIR (Finite Impulse Response) neural network [6], SVR (Support Vector Regression) [7], SOM (Self-Organization Map) [8], GP (Gaussian Process)\u2026"]} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"15679080|1400872": ["Secondly, for other kinds of RNNs, their learning methods are based on gradient descent on error surfaces [12, 13 ]."]} +{"207148349|1400872": ["In this way, it is possible to use standard linear regression routines for solving the overall optimization problem, without the need of complex backpropagation of the errors over the dynamic portion of the network (Pearlmutter, 1995)."]} +{"44016540|1097238": []} +{"9448547|1400872": []} diff --git a/edge/graph_53098515.jsonl b/edge/graph_53098515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34a017fac696d00a5d1eeac67e18339821a43a85 --- /dev/null +++ b/edge/graph_53098515.jsonl @@ -0,0 +1,3 @@ +{"110490213|6415369": ["A DSM is helpful for visualizing relationships within a project, and shaded cells indicate information dependencies between pairs of activities (Browning, 2001; Eppinger, 2001)."]} +{"112807635|14295689": []} +{"112807635|11810221": []} diff --git a/edge/graph_53099056.jsonl b/edge/graph_53099056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d5b2b3f8efbbe5aff7ff22f9136cc4367ebcfa7 --- /dev/null +++ b/edge/graph_53099056.jsonl @@ -0,0 +1,16 @@ +{"52183270|2906926": []} +{"62305441|180217": ["Irfan et al.(10) proposed an authentication scheme based on cryptographic hash chain.", "Irfan et al.10 proposed an authentication scheme based on cryptographic hash chain."]} +{"11105012|2415608": []} +{"16393589|2357830": ["RADIO frequency identification (RFID) systems aredeployed in numerous automated asset management applications."]} +{"31364791|14650419": []} +{"31364791|2357830": ["Algorithm 1 depicts the protocol of authenticating the tags with the symmetrickey encryption [45]."]} +{"14360915|1842882": ["The efficiency of both classes of stateless protocols have remained largely within the same range since their introduction (Yousuf & Potdar 2008), thus they should be sufficient as a baseline comparison."]} +{"14328953|2357830": ["Therefore, RFID applications require a large number of security functionality including mutual authentication, transmission confidentiality and integrity, anonymity and availability [4]."]} +{"13913278|2357830": ["For more information, readers may refer to [8], [9])."]} +{"29283448|2906926": []} +{"29283448|2415608": []} +{"29283448|2357830": []} +{"13894796|2357830": []} +{"11001805|2357830": []} +{"11001805|17205659": []} +{"2850239|2357830": ["Juels [9] summarized many previously proposed tag\u2013reader authentication schemes."]} diff --git a/graph_5310274.jsonl b/edge/graph_5310274.jsonl similarity index 100% rename from graph_5310274.jsonl rename to edge/graph_5310274.jsonl diff --git a/edge/graph_53106966.jsonl b/edge/graph_53106966.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ac53496f3f27169b88599949b93eb046fc3db98 --- /dev/null +++ b/edge/graph_53106966.jsonl @@ -0,0 +1,3 @@ +{"98819857|15589021": []} +{"103814557|11407374": []} +{"15770872|31246274": []} diff --git a/edge/graph_53108259.jsonl b/edge/graph_53108259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b7223fc06ebec3680c728ba54431b7d6c6ea9d8 --- /dev/null +++ b/edge/graph_53108259.jsonl @@ -0,0 +1,6 @@ +{"18760793|18432258": ["Though operations research techniques and data mining algorithms are applied in sports activities, but the use of ARM techniques to draw patterns is very limited [15] [7]."]} +{"49674787|627405": []} +{"64522539|627405": ["Esta pesquisa teve como referenciais os trabalhos de Brereton[5], Conforto[10], Kitchenham[27] e Sampaio[44].", "As buscas iniciais retornaram a quantidade de 3418 trabalhos, conforma a Tabela I. V. RESULTADOS DA REVIS\u00c3O Nesta etapa foi retratado os resultados, informando as evid\u00eancias analisadas e apresentando as respostas das quest\u00f5es levantadas no in\u00edcio da pesquisa [5][10][27][44].", "\u2026da revis\u00e3o, foi realizado a identifica\u00e7\u00e3o da pesquisa nas bases de dados escolhidas, a compara\u00e7\u00e3o das buscas e aplica\u00e7\u00e3o dos crit\u00e9rios de inclus\u00e3o, exclus\u00e3o e qualidade, an\u00e1lise cr\u00edtica e avalia\u00e7\u00e3o de todos os estudos inclu\u00eddos na revis\u00e3o inicial de artigos e s\u00edntese dos dados [5][10][27][44].", "M\u00c9TODOS DA REVIS\u00c3O SISTEM\u00c1TICA Para Brereton et al.[5] uma revis\u00e3o sistem\u00e1tica permite ao pesquisador uma avalia\u00e7\u00e3o rigorosa e confi\u00e1vel das pesquisas realizadas dentro de um tema espec\u00edfico.", "A etapa do planejamento abordou a defini\u00e7\u00e3o da pergunta cient\u00edfica, especificando a interven\u00e7\u00e3o de interesse, a identifica\u00e7\u00e3o das bases de dados a serem consultadas; a defini\u00e7\u00e3o das palavras-chave, estrat\u00e9gias de busca e crit\u00e9rios para inclus\u00e3o, exclus\u00e3o e qualidade dos artigos [5][10][27][44]."]} +{"44761686|1708582": []} +{"1223085|15485264": ["The complete survey regarding bat algorithm can be found in [12]."]} +{"26139090|7834819": []} diff --git a/edge/graph_53109768.jsonl b/edge/graph_53109768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1e1641cd9b700ce4de528ae23c401b054d3441b --- /dev/null +++ b/edge/graph_53109768.jsonl @@ -0,0 +1,29 @@ +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} +{"2472445|14659766": [", 2014b] basis [Rice, 1976; Smith-Miles, 2009; Kotthoff, 2014] has been successfully addressed by using EPMs to predict the performance of all candidate algorithms and selecting the one predicted to perform best [Brewer, 1995; Lobjois and Lema\u0131\u0302tre, 1998; Fink, 1998; Howe et al."]} +{"2472445|2840997": ["SAT is the prototypical NP-hard decision problem and is thus interesting from a theory perspective; modern SAT solvers are also one of the most prominent approaches in hardware and software verification [92]."]} +{"19971112|14843594": ["KEYWORDS Black-Box Optimization, Bayesian Optimization, Gaussian Processes, Hyperparameters, Transfer Learning, Automated Stopping", "In the case of Bayesian Optimization, previous work either assigns them a particularly bad objective value, attempts to incorporate a probability of infeasibility into the acquisition function to penalize points that are likely to be infeasible [3], or tries to explicitly model the shape of the infeasible region [11, 12].", "These approaches are fundamentally Bayesian in nature, hence this literature goes under the name Bayesian Optimization.", "Black\u2013box optimization makes minimal assumptions about the problem under consideration, and thus is broadly applicable across many domains and has been studied in multiple scholarly fields under names including Bayesian Optimization [2, 25, 26], Derivative\u2013 free optimization [7, 24], Sequential Experimental Design [5], and assorted variants of the multiarmed bandit problem [13, 20, 29].", "While some authors have claimed that 2\u00d7Random Search is highly competitive with Bayesian Optimization methods [20], our data suggests this is only true when the dimensionality of the problem is sufficiently high (e.g., over 16)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"22057273|7782275": ["According to Lemke et al. (2015), a meta-learning system must fulfill two properties:\n1.", "Plenty of work has been done in that area and can be found in some recently published books and surveys: Brazdil et al. (2009), Vilalta and Drissi (2002), Lemke et al. (2015).", "Plenty of work has been done in that area and can be found in some recently published books and surveys: [4, 38,65].", "[38], a metalearning system must fulfill two properties: 1."]} +{"24352132|14843594": ["The earliest meta-modeling approaches were based on genetic algorithms [9, 11, 13] or Bayesian optimization [2, 10]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1740355|1708582": []} +{"1740355|14843594": ["Bayesian optimization has also been used (Shahriari et al., 2016) for automatic selection of network architectures (Bergstra et al., 2013; Domhan et al., 2015) and hyperparameters (Snoek et al., 2012; Swersky et al., 2013)."]} +{"4708677|14843594": ["Bayesian optimization [34, 7] and kernelbased bandits [9] construct an explicit surrogate function to minimize; often, one assumes it is possible to perfectly model the function f ."]} +{"7044373|9316331": ["MCTS uses two policies: a tree policy , which determines the path to be traversed from the root to the frontier of the already expanded tree; and a rollout policy , which determines the path to be traversed from the frontier of the already expanded tree until a leaf is reached.", "We think that this is because there are too many possible values for the \ufb01rst few hyperparameters in the tree, so MCTS will not be able to identify and focus on high-performance regions of the search space within the number of evaluations available.", "The restructuring operation allows MCTS to effectively consider hyperparameters with a large number of possible values .", "When MCTS visits a node in the expanded part of the tree, it has to expand all children of that node before expanding any children of its currently expanded children.", "MCTS maintains a search tree that is expanded incrementally one node at a time.", "We also described more complex model search algorithms, such as MCTS, MCTS with tree restructuring, and SMBO.", "MCTS applied to this tree results in more sharing when compared to the original tree.", "We experiment with different search algorithms, such as Monte Carlo tree search [7] and Sequential Model Based Optimization [12].", "Surprisingly, MCTS without restructuring does not out-perform random search.", "MCTS with bisection and SMBO do not suffer from these problems, and therefore can identify and focus on high performance regions of the search space earlier.", "Monte Carlo tree search (MCTS) [7, 16] is an approximate planning technique that has been used effectively in many domains [22].", "In addition to achieving a higher top accuracy, MCTS with bisection and SMBO evaluate a larger fraction of high-performance models when compared to random search, which can be seen in Figure 6.", "We present experiments on CIFAR-10 comparing different model search algorithms and show that MCTS with tree restructuring and SMBO outperform random search.", "On the rightmost plot in Figure 5, we see that both SMBO and MCTS with bi-section eventually outperform random search; MCTS with bisection starts outperforming random search around 32 evaluations, while for SMBO, it happens around 16 evaluations.", "Contrary to random search, MCTS uses the information gathered so far to steer its policy towards better performing parts of the search space.", "MCTS is tabular in the sense that it keeps statistics for each node in the tree."]} +{"40430109|14843594": [", (Snoek et al., 2012; Shahriari et al., 2016)) in which we use an acquisition function, such as expected improvement or upper confidence bound, to rank the candidate models; this takes into account uncertainty in the prediction of a model\u2019s performance, which encourages us to try models for which our predictor may be unreliable."]} +{"54598079|14843594": ["Popular derivative-free optimization methods such as Bayesian optimization (Shahriari et al. 2015), evolutionary optimization (Hansen, M\u00fcller, and Koumoutsakos 2003), classification-based optimization (Yu, Qian, and Hu 2016; Hu, Qian, and Yu 2017), etc.", "Some derivative-free optimization methods (Liu et al. 2006; Bergstra and Bengio 2012; Shahriari et al. 2015; Hansen, M\u00fcller, and Koumoutsakos 2003; Hutter, Hoos, and Leyton-Brown 2011; Munos 2011; Bergstra et al. 2011; Yu, Qian, and Hu 2016) have been applied to solve this problem successfully.", "Popular derivative-free optimization methods such as Bayesian optimization (Shahriari et al. 2015), evolutionary optimization (Hansen, M \u00a8 uller, and Koumoutsakos 2003), classi\ufb01cation-based optimization (Yu, Qian, and Hu 2016; Hu, Qian, and Yu 2017), etc. are model-based.", "Some derivative-free optimization methods (Liu et al. 2006; Bergstra and Bengio 2012; Shahriari et al. 2015; Hansen, M\u00a8uller, and Koumoutsakos 2003; Hutter, Hoos, and Leyton-Brown 2011; Munos 2011; Bergstra et al. 2011; Yu, Qian, and Hu 2016) have been applied to solve this problem successfully."]} +{"53692686|7782275": ["\u2026the high computational cost and derive a more accurate solution, AUTO - SKLEARN (Feurer et al. 2015) improves AUTO - WEKA and uses meta-learning (Lemke, Budka, and Gabrys 2015) step to warmstart the bayesian optimization procedure, and \ufb01nally includes an automated ensemble construction for\u2026", "AUTO - SKLEARN (Feurer et al. 2015) improves AUTO - WEKA and uses meta-learning (Lemke, Budka, and Gabrys 2015) to warmstart the bayesian optimization procedure, and \ufb01nally includes an automated ensemble construction step."]} +{"1596043|16897832": ["This mixture of learning and evolutionary-like algorithms has also been explored successfully in other domains (Zhang et al., 2011) such as neural architecture search (Real et al., 2017; Liu et al., 2017), feature selection (Xue et al., 2016), and parameter learning (Fernando et al., 2016)."]} +{"14216084|14843594": ["differentiable model, which is preferable to the Gaussian kernel popular elsewhere, because it makes less restrictive 1Comprehensive tutorials are presented by Brochu et al. [17] and Shahriari et al. [18]. 2 smoothness assumptions, which can be helpful in the optimization setting [5]: k 5=2 (x;x 0) = 1 + p 5d (x;x0) + 5=3d2 (x;x0) e p 5d (x;x0): (1) Here, and are free parameters\u2014hyperparam"]} +{"3508234|3766791": ["Our initial conceptualization of the learning rate adaptation problem was one of automatic differentiation (Baydin et al., 2015)."]} +{"261945|5281246": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|14659766": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|2840997": ["applications including formal verification [81], scheduling [20], planning [59] and graph coloring [110]."]} +{"19165886|393948": ["Moreover, although deep neural networks (DNN) allow for useful meta-features to be learned automatically [Bengio et al., 2013], the learned features are not always interpretable and DNNs are not effective learners in various application domains.", "Deep neural networks learn useful features automatically [Bengio et al. , 2013] and have shown remarkable successes on video, image and speech data.", "Neural networks have been successful in learning representations for image and speech data [Bengio et al., 2013].", "Deep neural networks learn useful features automatically [Bengio et al., 2013] and have shown remarkable successes on video, image and speech data.", "Neural networks have been successful in learning representations for image and speech data [Bengio et al. , 2013].", "Moreover, although deep neural networks (DNN) allow for useful meta-features to be learned automatically [Bengio et al. , 2013], the learned features are not always interpretable and DNNs are not effective learners in various application domains."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"206592484|456491": []} +{"8026824|3766791": ["Then the following facts hold true (Griewank & Walther, 2008) (see also Baydin et al. (2015) for a shorter account): (i) For any vector r \u2208 R n , the product J F r can be evaluated in time O ( c ( n, p )) and requires space O ( s ( n, p )) using forward-mode AD."]} +{"8026824|1400872": []} +{"52938664|7782275": ["There exists a rich body of earlier work (Brazdil et al., 2009; Lemke et al., 2015; Giraud-Carrier, 2008; Luo, 2016) on building meta-models for algorithm selection (Bensusan and Giraud-Carrier, 2000; Pfahringer et al."]} +{"52938664|5281246": []} +{"3766791|393948": ["meaning that a mapping from raw input data to corresponding outputs is learned, automatically discovering the representations needed for feature detection in a process called representation learning (Bengio et al., 2013). Besides deep learning, an interesting area where AD can be applied to computer vision problems is inverse graphics (Horn, 1977; Hinton and Ghahramani, 1997)\u2014or analysis-bysynthesis (Yildirim et al.,"]} diff --git a/edge/graph_53112128.jsonl b/edge/graph_53112128.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb3a809bf27cbb1c92e4cb2f8b8c877cff4ac1e9 --- /dev/null +++ b/edge/graph_53112128.jsonl @@ -0,0 +1,6 @@ +{"28507177|2623404": ["With the development of cloud computing [2] and Software-Defined Networking [3], this problem is becoming more and more serious [4]."]} +{"4782871|4395259": ["That is why there is an increasing interest recently in physical layer security, behind which the fundamental idea is to exploit the inherent physical characteristics of communication channels to provide information-theoretic security to the legitimate transmissions without the assistance of a secret key [11], [12]."]} +{"6237672|38505093": []} +{"13143320|206584087": []} +{"2567879|9104850": ["The World Wide Web (WWW) is one of the most popular applica\u00adtions currently \nrunning on the Internet and has driven the rapid growth of the Internet [Wang 1999]."]} +{"41457622|206584087": []} diff --git a/edge/graph_53112273.jsonl b/edge/graph_53112273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f13004751107296bcbd77f67be7c0dac565a23b --- /dev/null +++ b/edge/graph_53112273.jsonl @@ -0,0 +1,19 @@ +{"37278988|18090012": []} +{"1483259|18090012": ["Meystre et al. [3] selected 18 automated de-identification systems for different types of clinical documents for detailed analysis."]} +{"25938925|18090012": []} +{"205713480|18090012": []} +{"5742734|2809360": []} +{"1839478|18090012": []} +{"1839478|2809360": ["The specific aims were (1) to evaluate a state-of-the-art NLP-based approach to automatically de-identify a large set of diverse clinical notes for all HIPAA (Health Insurance Portability and Accountability Act)-defined protected health information (PHI) elements and (2) to measure the impact of de-identification on the performance of information extraction (IE) algorithms executed on the de-identified documents.", "Step (1) was necessary because of the rare frequency of EMAILs, which made it difficult for the system to learn their patterns.", "10 Some of them we de \ufb01 ned NAME DATE (eg, \u201c 12/29/2005 \u201d , \u201c September AGE (any EMAIL IP: internet provider addresses and URLs LOCATION: geographic locations PHONE: phone and fax numbers SSN: social security number ID: any identi \ufb01 cation number (medical record numbers, etc) OTHER: all remaining identi \ufb01 ers.", "60 F value We did not evaluate MIST on those corpora because (1) the two systems are very similar and (2) MIST was already evaluated on the i2b2 corpus (its F value ranked first in the i2b2 challenge).", "ABSTRACT Objective (1) To evaluate a state-of-the-art natural", "Some of the limitations of our results are the de-identi \ufb01 cation performance for the LOCATION and OTHER categories, which should be improved; for proper performance evaluation, a larger sample size is necessary for EMAIL, IP, SSN, INITIALS; the corpus was obtained from only one institution, though it did include over 22 different note types selected from more than ve million notes; we should experiment with at least one more \ufb01 to adequately estimate the cost of", "We also added three postprocessing rules to the machinelearning algorithms, consisting of regular expressions to (1) identify EMAIL; (2) match strings to the entries of our name lexicon, with a match resulting in the assignment of a NAME label; and (3) label any string as a NAME if the algorithm tagged a matching string NAME in the document but missed the particular string somewhere else in the same document.", "However, the 1996 HIPAA privacy rule requires that before clinical text can be used for research, either (1) all PHI should be removed through a process of de-identification, (2) a patient\u2019s consent must be obtained, or (3) the institutional review board should grant a waiver of consent.", "Not shown in the figures are categories with extremely low frequencies: EMAIL (frequency: 14), INITIALS (16), IP (10), and SSN (1).", "We extracted medication names from clinical notes (1) before removing PHI (system trained and tested on original corpus), (2) after removing and replacing PHI with asterisks (system trained and tested on the corpus with asterisks), and (3) after removing and replacing PHI with synthetically generated PHI surrogates (system trained and tested on corpus with synthetic PHI)."]} +{"3764197|18090012": ["For a thorough review of existing systems, see (Meystre et al., 2010; Stubbs et al., 2015).", "For a thorough review of existing systems, see Meystre et al.(28) and Stubbs et al."]} +{"46368116|3761015": []} +{"46368116|12204996": []} +{"20991827|18090012": ["[3] S.", "Several methods exist for automated de-identification of freetext records [3], including procedures reports and discharge letters."]} +{"17768150|18090012": ["])[0-9]{3})|([0-9]{8}))\u2019", "[8].", "(AU): ((([+]?([0-9]{2})([\\\\.", "b) [0-9]{2}(\\\\ ))))|((\\\\ b))) Time: (\\\\ b)(([0]?[0-9]|[1][1-2])(([\\\\.", "\\\\ -]?)[0-9])|((\\\\ ()(\\\\", "We restrict our experiments only to the subset [0-5][0-9])?)([\\\\.", "])([0-9]{4}))|([0-9]{2}([\\\\ - \\\\ .", ":])[0-5] [0-9]){1,2})([\\\\.", "Phone (AU): \u2019((([0-9]{4})([\\\\ -\\\\ .", "Date: (?< !([\\\\ \\\\ \\\\ / \\\\ -]([0-9]{1,})?))((([01]?[0-9]|[2][1-4]) (([\\\\."]} +{"17768150|8310135": []} +{"1264789|18090012": ["\u2026amount of effort has been devoted to de-identification including a challenge, i.e., the i2b2 (Center of Informatics for Integrating Biology and Bedside) clinical natural language processing (NLP) challenge in 2006, and various kinds of systems have been developed for de-identification[2, 3, 4, 5]."]} +{"205714105|18090012": []} +{"18090012|2809360": ["The most common types of clinical text targeted by these systems-discharge summaries and surgical pathology reports-are often dictated and are composed deliberately for clear communication, while other texts like progress notes are written mainly for documentation purposes [6]."]} +{"16308144|18090012": ["More details about the 18 works proposed in 1995-2010 and the 10 works with the highest results in the 2014 i2b2 shared task can be found in [9] and [13], respectively.", "As discussed in [9], a machine learning-based method or a rule-based method or a hybrid method can be considered for this PHI identifying phase."]} +{"4737322|393948": ["In recent years, the rise of representation learning [13] methods has brought new vitality to NER tasks."]} +{"4737322|38476": ["The CRF is the most commonly used model in general NER tasks because of its theoretical advantage and experimental e\ufb03ciency [11]."]} diff --git a/edge/graph_53115327.jsonl b/edge/graph_53115327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c19486dfa661f19c28ebae55f855e7e4e7c3024e --- /dev/null +++ b/edge/graph_53115327.jsonl @@ -0,0 +1,3 @@ +{"15309976|2507429": ["Nevertheless, reproducibility is a complex concept and the IR community has started only recently to discuss some novel aspects, such as for example infrastructures for managing experimental data [2], off-the-shelf open source IR systems [26], use of private data in evaluation [5], evaluation as a service [14, 17], reproducible baselines [3], as well as considering it as part of the review process of major conferences and in dedicated tracks, such as the new ECIR Reproducibility Track [9, 11]."]} +{"20550730|1805048": []} +{"34529647|15062298": []} diff --git a/edge/graph_53115377.jsonl b/edge/graph_53115377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c0d87e7a598c039ea22b884240ed5ef5e97d5add --- /dev/null +++ b/edge/graph_53115377.jsonl @@ -0,0 +1 @@ +{"46889349|39379206": ["As explained above, learning design research has contributed with a myriad of representations and computer tools (Persico et al., 2013; Prieto et al., 2013a; Dalziel, 2015; Celik and Magoulas, 2016) that enable making the planning of learning tasks explicit so they can be shared, reused and implemented with students (for example, through its instantiation in VLEs).", "Learning design research has contributed with a profuse set of representations and computer tools (Persico et al., 2013; Prieto et al., 2013b; Celik and Magoulas, 2016) to help practitioners1 make their learning designs explicit and, thus, eventually sharable and reusable [see e.", "\u2026design research has contributed with a myriad of representations and computer tools (Persico et al., 2013; Prieto et al., 2013a; Dalziel, 2015; Celik and Magoulas, 2016) that enable making the planning of learning tasks explicit so they can be shared, reused and implemented with students (for\u2026", "Learning design research has contributed with a profuse set of representations and computer tools (Persico et al., 2013; Prieto et al., 2013b; Celik and Magoulas, 2016) to help practitioners1 make their learning designs explicit and, thus, eventually sharable and reusable [see e.g., \u201cThe Larnaca\u2026"]} diff --git a/edge/graph_53115644.jsonl b/edge/graph_53115644.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1fab846729d47208a82cb0362113efbb65a683a --- /dev/null +++ b/edge/graph_53115644.jsonl @@ -0,0 +1,16 @@ +{"15454609|16298606": ["We expect that SpotME users may be willing to contribute to this common pool as they now have the possibility to obfuscate their whereabouts directly on their mobile phones."]} +{"14004362|763939": ["One list of criteria comes from a survey of vehicular simulation techniques for mobile ad hoc networks [5]."]} +{"26465309|207179384": []} +{"3799929|31973880": ["Most of the above mentioned techniques are based on a set of measurements sampled at the Nyquist rate and can sense only one band at a time because of the hardware limitations [31].", "In addition, sensing a wideband spectrum requires dividing it into narrow bands and making SU sense each band using multiple RF frontends simultaneously [31].", "can be recovered from far fewer measurements and at a lower rate (below Nyquist rate) compared to that of traditional methods [31], [33]."]} +{"3799929|7525856": ["can be recovered from far fewer measurements and at a lower rate (below Nyquist rate) compared to that of traditional methods [31], [33]."]} +{"3799929|8606364": ["Many of these works consider only simple but important statistics of the spectrum occupancy, such as the maximum or the minimum and the average of power levels, the spectrum occupancy, and the duty cycle [80].", "to quantify and study the PU spectrum utilization and assess the current status of the spectrum [80]\u2013[82]."]} +{"3799929|512561": []} +{"3799929|8974063": ["\u2026requires the monitoring and observation of the RF environment, as well as the monitoring and awareness of PU s activities in these channels [75]. a) RF environment characterization This process estimates some of the following key parameters to characterize the different spectrum bands.", "There are also approaches that try to predict future PU activities and thus locate future spectrum opportunities by using learning techniques and by exploiting the history of spectrum band usage [75], [81].", "This rate may vary depending on the modulation scheme and the interference level of the channel [75]. b) PU activity modeling As spectrum availability depends not only on the RF environment characteristics but also on the activities of PU s, it is crucial that PU activities are taken into account\u2026"]} +{"3799929|17062686": ["trading process to obtain the highest profit [153], [159], [160].", "Spectrum trading can be done between PUs and SUs or among SUs only [153].", "3) Spectrum Trading: Spectrum trading could be seen as the economic aspect of spectrum sharing [153].", "there are multiple firms that provide the same service, making it necessary for firms to consider each other\u2019s strategy [153]."]} +{"5934298|13372227": ["Finally, the adversary may estimate the user location by using cellular positioning techniques [34], e."]} +{"20906400|26429034": ["Additionally, the relevance of massive movement data from mobile subscribers is critical in research disciplines such as physics, sociology or epidemiology [5]."]} +{"33795167|14745481": []} +{"33795167|2294541": []} +{"1585853|2294541": []} +{"1083483|7216886": ["[141] (privacy-preserving data publishing), Bertino et al."]} +{"9772641|26429034": ["1 reports, for each mobile subscriber, an identi\ufb01er , 1 The actual precision (e.g., in space and time) of the information recorded varies signi\ufb01cantly with the nature of the probes used for data collection [4].", "They have become an important instrument for large-scale analyses in sociology, demography, epidemiology, and computer science: recent surveys are available in [3, 4]."]} diff --git a/edge/graph_53116003.jsonl b/edge/graph_53116003.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4970fe3ce33a99ec2bddcb52144ab1e01b813f61 --- /dev/null +++ b/edge/graph_53116003.jsonl @@ -0,0 +1,80 @@ +{"5470697|595093": []} +{"5929770|10658846": []} +{"3330769|7458485": ["As stated in [21], reliability, security and privacy should be taken into considerations when designing a deduplication system."]} +{"14382445|8363289": []} +{"31655587|1236072": []} +{"9951196|154032": ["In [56], the EE of the networking components in cloud-based environments was provided."]} +{"9951196|8215225": ["Interesting readers may also refer to [49] for distributed data aggregation algorithms."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"15917201|14889616": []} +{"23781891|624120": ["In addition, remote sensing data analysis can be used to global insurance markets, such as crop damage and flood and fire risk assessment [46]."]} +{"19258692|3488022": ["With regard to this, Fingasa and Brownb [7] collected a variety of airborne big data in different seas where oil spills occurred previously.", "[7] M. Fingasa and C. Brownb, \u201cReview of oil spill remote sensing,\u201d Marine Pollution Bull., vol. 83, no. 1, pp. 9\u201323, Jun. 2014."]} +{"9006167|3348390": ["For example, an activity recognition application [3] [5] uses embedded accelerometers of mobile devices to collect proper acceleration data about daily human activities.", "Context awareness [3] [5] has high impact on understanding MBD by describing the circumstances in which the data was collected to provide personalized mobile experience to end users (e.g., targeted advertising, healthcare, and social services )."]} +{"56850862|14792235": ["The survey papers [1,10] of cloud monitoring abstract the process of cloud monitoring in three main steps: the collection of relevant state, the analysis of the aggregated state, and decision making as a result of the analysis."]} +{"46954174|3330461": ["In device-to-device (D2D) communications, data are directly transmitted between user equipments (UEs) without the traverse of BSs and the transmission distance is usually short [7], [8], which will improve the resource ef\ufb01ciency."]} +{"14003161|485843": []} +{"17872529|20905429": ["With the development of computer science, sensor technology and medical apparatus, using micro sensors to get user's physiological parameters and then transferring medical data to a remote data center are becoming an interesting topic in the field of medical instruments research [1] [5] [6]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"13261658|5605271": []} +{"14983111|38476": ["In addition, we incorporate sliding window [15] and crossvalidation [11,12] techniques in the training and prediction stages and consequently evaluate the validity of the learning algorithms for prediction accuracy using statisticalmetrics, as discussed in the following sections.", "The sliding window technique [15] maps an input sequence x of size k to an individual output y by using a prediction model; this approach is very effective in the data mining field e."]} +{"3546145|21386749": ["[44] reviewed the advances in health care which relies on Internet of Things (IoT) technologies.", "In particular, the work [44] also included security related taxonomies in the context of healthcare."]} +{"8916872|30815820": ["\u2026possible to apply virtual models in the computer world, social computing is originally considered as creating or recreating social conventions, social behaviors, and social contexts through software and technologies such as microblogs and emails, which could be interpreted as social software [5]."]} +{"8096709|5401262": []} +{"18075001|5660618": ["There has also been a lot of research work that studied the impact of noise on the stability/safety/usability of the system [2]\u2013[9].", "In this section we present a unifying framework to model CPS with mobile nodes in the presence of adversaries."]} +{"16515889|2523102": []} +{"16368420|14644374": []} +{"44091851|3348390": []} +{"44091851|25929315": []} +{"626891|393948": ["A great deal of research is focused on feature detectors used for defining clusters [2]."]} +{"20787536|16335158": ["Sensor-Cloud [21], [22], [41] is a unique sensing data storage, visualization and remote management platform that leverages powerful cloud computing technologies to provide excellent data scalability, fast visualization, and user programmable analysis.", "Under the theme of those complex network systems, it may be difficult to develop time-efficient detecting or trouble-shooting methods for big data processing in complex network systems in real time [21], [22], [23], [27]."]} +{"10966088|17934515": []} +{"32505238|8914588": ["As acknowledged by some authors [8], the architectural model-driven approach is one of the most comprehensive and widely accepted strategies to develop complex systems such as CPS that change over time."]} +{"11885150|912956": ["Thereis a large body of work on real-time scheduling for multi-core [4], but most of the results rely on models with independent tasks."]} +{"14231576|207228303": ["In recent years, several algorithms have been proposed for this important problem [25]."]} +{"14377289|2398835": []} +{"3119203|29060869": ["In the emerging smart grid, the AMI is an important system component to enable two-way communication between power utilities and users [72]."]} +{"3119203|15438029": ["This emerging SAN paradigm is applicable to several networks [20,21], including opportunistic networks, mobile social networks, delaytolerant networks, and ad hoc networks."]} +{"3119203|3348390": ["A typical context management system refers to four phases in a context life cycle [39], including context acquisition, context modeling, context reasoning, and context distribution."]} +{"3119203|3202525": ["Recently, context-aware recommender systems (CARS) [57] become attractive for technology enhanced learning, in which the contexts mainly include physical context (e.", "Recently, context-aware recommender systems (CARS) [57] become attractive for technology enhanced learning, in which the contexts mainly include physical context (e.g., temperature, and traffic flow), computing context (e.g., bandwidth, and spectrum), and user context (e.g., profile, location, and social situation)."]} +{"62280900|1113420": ["While in other cases, the focus is on entire systems and exploring what is possible within the constraints of current research[44, 45]."]} +{"62280900|7971188": ["An overlay network is a logical network on top of a physical network that provide a wide variety of functions usable to an application [20]."]} +{"6022667|18212759": ["The experimental results and the conclusions are represented in Section V and Section VI."]} +{"9496996|12815020": []} +{"488963|3330461": [", D2D communication exploiting unlicensed spectrum) [10]."]} +{"67693197|5022650": []} +{"67693197|25929315": ["Second, current networks are already dealing with scarcity of spectrum resources, which means there might not be enough resources to support CPS communications and packet scheduling problems will quickly result leading to a significant decrease in network capacity and spectral efficiency [13, 15]."]} +{"19820055|23893450": ["[28] present a survey of the recent data driven approaches in smart grid security."]} +{"31187650|3330461": ["Device-to-Device (D2D) communications refer to a type of technology that enables devices to communicate directly with each other without the involvement of fixed networking infrastructures such as Access Points (APs), Base Stations (BSs), Bluetooth and WiFi-Direct [1]."]} +{"18202275|25929315": ["Some of the most relevant contributions are summarized in Table I and a comprehensive survey can be found in [16]."]} +{"207881413|595093": ["(A more detailed discussion on Smart Grid domains can be found in [14] [15] [16].)"]} +{"207881413|6959212": ["Compared with legacy power systems, the Smart Grid is envisioned to fully integrate high-speed and two-way communication technologies [4] [5] [6] [7] [8] into millions of power equipments to establish a dynamic and interactive infrastructure with new energy management capabilities, such as advanced\u2026"]} +{"207881413|2457428": ["As key management for conventional computer networks has been well categorized and summarized in several survey papers [117,118], in the following, we focus on the new requirements of key management for the Smart Grid, and present an overview of existing key management schemes for power systems."]} +{"3470437|12595430": ["For example, for cyber security [50]\u2013[54], there are many different heterogeneous sources, such as \u2018\u2018numerous distributed packet sniffers, system log files, SNMP traps and queries, user profile databases, system messages, and operator commands."]} +{"61529460|5755403": []} +{"1044435|2905017": []} +{"1044435|2187403": []} +{"1044435|1113420": []} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"16074598|7644489": ["However, this work does not consider selfinterested users who require incentive to cooperate."]} +{"16074598|1708582": ["We have chosen to use an infinite-horizon discounted formulation because it is guaranteed to have a stationary optimal policy regardless of the structure of the MDP, and it is less computationally complex than the finite-horizon case for long time horizons (corresponding to discount factors close to 1).\nactually lead to worse long run performance.", "In this section, we formulate the problem of determining a UE\u2019s optimal cooperation policy with respect to its beliefs as an MDP [37].", "\u2022 We formulate the decision problem faced by each UE, namely, the problem of deciding whether or not\nto relay, as a Markov decision process (MDP).", "8 We do not use a more conventional reinforcement learning based approach, such as a Q-learning [31], because our problem does not satisfy the required convergence conditions.", "We do not use a more conventional reinforcement learning based approach, such as a Q-learning [37], because our problem does not satisfy the required convergence conditions.", "where V j 0 \u00f0kj; pj\u00de 1\u20444 0 for all s 1\u20444 \u00f0kj; pj\u00de 2 S and V j n \u00f0kj; pj\u00de converges to the optimal state-value function V j\u00f0kj; pj\u00de as n!1 [37].", "For example, a finite horizon undiscounted utility objective [37], i.", "This is due to the fact that there is an absorbing state in the MDP.", "As another example, an infinite horizon undiscounted utility objective [37], i.", "\u2022 We formulate the MDP such that a UE\u2019s optimal cooperation policy not only depends on its current\ngeographic location, its distance from the nearest base station, and the channel conditions, but also on the other UEs\u2019 locations and cooperation strategies.", "OPTIMAL COOPERATION POLICY FOR A SINGLE UE\nA. Problem Formulation\nIn this section, we formulate the problem of determining a UE\u2019s optimal cooperation policy as an MDP [31].", "Specifically, Q-learning requires that all state-action pairs are visited \u201cinfinitely often\u201d: that is, in the limit as t \u2192 \u221e , every action must be taken in every state an infinite number of times."]} +{"206851751|25929315": ["To solve the massive access problem of MTC, many approaches have been proposed and a comprehensive survey can be found in [3]."]} +{"10800075|121289": []} +{"15146551|16052126": ["Keywords-Long-Term Resource Fairness, Multi-Resource Fairness, Pay-as-you-go, Cloud Computing, YARN, LTYARN, Spark.", "The experimental results show that LTYARN achieves a better resource fairness than existing Hadoop Fair Scheduler.", "B. Implementation and Evaluation Given the proposed LTRF policy, we have implemented it in YARN by developing a prototype system named LTYARN, by generalizing the default memoryless max-min fairness to longterm max-min fairness."]} +{"18820334|207209718": ["Robert Mitchell and Ing-Ray Chen provide an overview of this field, noting that there are many parallels with information and communication technologies that may be useful for further development of this field [6]."]} +{"10310014|206583375": ["A survey of the potential technologies for indoor navigation for personal applications is provided in [81], where the authors describe techniques based on wireless communication, infrared, sound positioning and others and they compare their performance."]} +{"9446845|8533795": ["A survey of the differential privacy in machine learning was given in [28]."]} +{"8578666|3330461": ["In general, D2D communications can be classified into two types [4]: in-band D2D, where D2D links utilize cellular spectrum and out-of-band D2D, where D2D links exploit unlicensed spectrum (e.", "To date, majority of the literature is dedicated to in-band underlay D2D systems [4] due to the fact that it has advantages such as improved spectral-efficiency/energyefficiency, and reduced end-to-end delay."]} +{"8578666|7644489": ["One of the main challenges in D2D cellular network is how to allocate resource (time, frequency and space) for D2D users [8], [9].", "Both dynamic resource allocation (based on current D2D transmission demand) and static (certain resources are periodically reserved for D2D communication) resource allocation are discussed in [8]."]} +{"14876640|10817088": []} +{"14876640|42648222": []} +{"14876640|14356173": []} +{"14876640|1507400": []} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"206485523|10150488": ["Please refer to [276] and [277] for more details on this topic."]} +{"206485523|16403716": ["Multimedia indexing and retrieval concerns the description, storage, and organization of multimedia information to help people find multimedia resources conveniently and quickly [218]."]} +{"796674|825893": []} diff --git a/edge/graph_53116619.jsonl b/edge/graph_53116619.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3cd954d4569c3fd0d6b22e420b1e376a4b791fe --- /dev/null +++ b/edge/graph_53116619.jsonl @@ -0,0 +1 @@ +{"6960593|17329705": ["More practically, while in real life, the noise could be highly nonstationary, we may want to combine the notion of a signal quality index (SQI) to help guide us in selecting the \u201cgood\u201d signal for analysis [13, 66, 67]."]} diff --git a/edge/graph_53120108.jsonl b/edge/graph_53120108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53128654.jsonl b/edge/graph_53128654.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8ca2982c59c5e7f33a2c8ca4e57569e7328326c --- /dev/null +++ b/edge/graph_53128654.jsonl @@ -0,0 +1,8 @@ +{"8364163|627405": []} +{"33275555|206778272": []} +{"4715248|11607029": ["A comprehensive survey of merge approaches was done by Mens [51]."]} +{"18439205|206778272": ["In spite of that, we found some studies [47][86][94] that can be considered related to our research."]} +{"7701585|206778480": ["Our previous study [Hall et al. 2010] comparing three approaches to fault data collection suggests that the precision and recall of the Zimmermann et al. [2007] approach to identifying software faults from open-source projects is not as competitive as a manual approach.", "In \nour review of 208 previous fault prediction studies [Hall et al. 2012], we found that several other research \ngroups have used negative binomial regression in their studies of software faults (e.g., [Ostrand et \nal.", "In our review of 208 previous fault prediction studies [Hall et al. 2012], we found that several other research groups have used negative binomial regression in their studies of software faults (e."]} +{"7701585|206778272": []} +{"38260067|206778272": ["Beck and Fowler presented guidelines that realize the need of refactoring, but human opinion remains important to decide where a refactoring is worth applying [11].", "literature that regularly performing refactoring returns tangible benefits [10, 11]."]} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} diff --git a/edge/graph_53132119.jsonl b/edge/graph_53132119.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2f29d638d36c8b26bae9266dc031ebd8cdb2088 --- /dev/null +++ b/edge/graph_53132119.jsonl @@ -0,0 +1 @@ +{"19004850|6387482": []} diff --git a/edge/graph_53136136.jsonl b/edge/graph_53136136.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5313655.jsonl b/edge/graph_5313655.jsonl similarity index 100% rename from graph_5313655.jsonl rename to edge/graph_5313655.jsonl diff --git a/edge/graph_53138498.jsonl b/edge/graph_53138498.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53164212.jsonl b/edge/graph_53164212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6180b98a5c669424d6549e423343423782c59043 --- /dev/null +++ b/edge/graph_53164212.jsonl @@ -0,0 +1,17 @@ +{"15686737|13215551": ["In this paper, for the multivariable optimization, especially the hybrid multivariable, the best method is swarm intelligence technique [12]."]} +{"16154154|1097238": ["There are many taxonomies for ensemble techniques [4],[17],[22], [24], and there is a recognized group so called data resampling, which generates different training sets to obtain unique learner."]} +{"52204358|2488484": []} +{"4078001|206778480": []} +{"16429427|5246835": ["Most of the work on preventing and detecting credit card fraud has been carried out with neural networks [36]."]} +{"16429427|50458504": []} +{"16429427|15273230": ["As the online banking transaction data is extremely imbalanced, sampling is necessary before applying any data mining models [16]."]} +{"6526065|15273230": ["The pseudo code of the SMOTE algorithm and detail can be found in [45].", "samples [45].", "5 and Ripper algorithms, outperformed as compared to Ripper\u2019s Loss Ratio and Na\u00efve Bayes [6], [45].", "Therefore, learning from imbalanced class data has received a tremendous amount of attention from the machine learning and data mining research community [45].", "To overcome the issue of over-fitting and extend the decision area of the minority class samples, a novel technique SMOTE \u2018\u2018Synthetic Minority Oversampling TEchnique\u2019\u2019 was introduced by Chawla [45], This technique produces artificial samples by using the feature space rather than data space."]} +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} +{"7359568|18503837": []} +{"26644563|11894197": []} +{"26644563|1097238": ["The review from [105] also pointed out that understanding the classifier error diversity is not an effortless task and its grounded framework is formally incomplete, and the complexity issue grow higher with the use of more classifiers [13]."]} +{"26644563|15273230": ["Choosing accuracy as the performing criterion in class imbalance classification may gives inaccurate and misleading information about a classifier performance [13][14][15][16][17][18][19]."]} +{"51923557|2488484": ["Like many businesses today, healthcare produces a vast panoply of information ranging from patient records to provider payment and claims data [37], [25]."]} +{"51923557|15273230": []} +{"62784769|11894197": ["\u21d1 Corresponding author at: VIB Inflammation Research Center, Ghent University, 9052 Zwijnaarde, Belgium.", "\u2026Herrera c a Department of Respiratory Medicine, Ghent University, 9000 Gent, Belgium b VIB Inflammation Research Center, 9052 Zwijnaarde, Belgium c Department of Computer Science and Artificial Intelligence, CITIC-UGR (Research Center on Information and Communications Technology), University of\u2026", "Isaac Triguero a,b,\u21d1, Sara del R\u00edo c, Victoria L\u00f3pez c, Jaume Bacardit d, Jos\u00e9 M. Ben\u00edtez c, Francisco Herrera c a Department of Respiratory Medicine, Ghent University, 9000 Gent, Belgium b VIB Inflammation Research Center, 9052 Zwijnaarde, Belgium c Department of Computer Science and Artificial Intelligence, CITIC-UGR (Research Center on Information and Communications Technology), University of Granada, 18071 Granada, Spain d Interdisciplinary Computing and Complex BioSystems (ICOS) Research Group, School of Computing Science, Newcastle University, Newcastle upon Tyne NE1 7RU, United Kingdom\na r t i c l e i n f o a b s t r a c t\nArticle history: Received 9 November 2014 Received in revised form 23 February 2015 Accepted 28 May 2015 Available online 1 June 2015\nKeywords: Bioinformatics Big data Hadoop MapReduce Imbalance classification Evolutionary feature selection\nThe application of data mining and machine learning techniques to biological and biomedicine data continues to be an ubiquitous research theme in current bioinformatics."]} +{"5206264|3330313": ["Outlier analysis has been reviewed in [1], [2], [3]."]} diff --git a/edge/graph_53179604.jsonl b/edge/graph_53179604.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3df016cda9c0e0e972a3dc4c26b70b6df61074cc --- /dev/null +++ b/edge/graph_53179604.jsonl @@ -0,0 +1,2 @@ +{"17746199|9180844": ["An ELI-concept is an ALCI-concept that does not use negation \u00acC, and thus also disallows the abbreviations \u22a5, C t D, C \u2192 D, and \u2200r.C. Finally, an EL-concept is an ELI-concept that does not use inverse roles."]} +{"8305278|10096898": ["To compute them, one can use efficient hypergraph transversal algorithms (see [25])."]} diff --git a/edge/graph_53209415.jsonl b/edge/graph_53209415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..95c7ac5df9ccffd7d685d5262709df9d12849fc0 --- /dev/null +++ b/edge/graph_53209415.jsonl @@ -0,0 +1,16 @@ +{"64567054|2509135": []} +{"920609|1230643": ["Recently, wireless sensor networks (WSNs) [9] are gaining a lot of attention for electric power network [10], [11]."]} +{"6611238|12060835": ["Various energy sources, such as light, vibration or heat are available to be harvested [5]."]} +{"32863154|12187956": ["Hence, the design of the MAC protocol for DCRNs is crucial, yet challenging, to increase the spectrum efficiency in wireless networks, given the dynamic nature of spectrum usage [10].", "Generally, MAC protocols in DCRNs are divided into three categories: random access, time-slotted, and hybrid [9][10].", "These MAC protocols are mostly categorized as spectrum overlay dynamic spectrum access (DSA) [10].", "The MAC protocols for DCRNs introduced so far can be categorized into random access (contention-based), time-slotted (contention-free), and hybrid protocols [9][10]."]} +{"32863154|41998167": ["The influence of upper layer protocols is also an important design consideration for MAC protocols [11]."]} +{"32863154|1230643": ["With advancements in micro-electromechanical system (MEMS) technology [26], it is sufficiently possible to equip multiple transceivers in a wireless sensor node."]} +{"35931468|12601073": ["Please refer to [18, 19] for detailed sensing techniques."]} +{"14428964|1230643": ["which can be used for different types of applications [2]."]} +{"16634217|12601073": []} +{"16616754|8974063": ["Some issues in CRNs have been addressed well [18\u201333]."]} +{"16616754|2509135": ["Some issues in CRNs have been addressed well [18\u201333]."]} +{"16616754|28210515": ["WSN devices are not only a victim but are also an interferer sometimes [2]."]} +{"16616754|12060835": ["Such limitations are well studied in [59\u201361]."]} +{"22121314|3055684": ["In addition, it provides untethered mobility and improves the ability to deploy sensor nodes in hard-to-reach places [4]."]} +{"22121314|12060835": ["EH enables WSNs to address the conflicting design goals of lifetime and performance [3]."]} +{"206826386|1236072": []} diff --git a/edge/graph_53210964.jsonl b/edge/graph_53210964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a286ff08cb2e5b1245188c43e3b8608375f498cb --- /dev/null +++ b/edge/graph_53210964.jsonl @@ -0,0 +1,3 @@ +{"207209834|191396": []} +{"2769856|3184786": []} +{"26617387|1805048": ["As previously mentioned, CF, which only relies on past users \u2019 preferences, is one of the most widely used recommendation methods in recommender systems (Su and Khoshgoftaar 2009)."]} diff --git a/edge/graph_53211000.jsonl b/edge/graph_53211000.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c47007b35e02c4d7b34f9632e8a0bb9b7bfb884 --- /dev/null +++ b/edge/graph_53211000.jsonl @@ -0,0 +1,30 @@ +{"1033682|174797842": []} +{"207178870|386036": ["Entity Resolution, or deduplication [78] refers to the problem of identifying if two textual records refer to the same entity."]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"15642206|10500613": ["used a synonym-set from a hand-made thesaurus [17, 24].", "We do not know of any work on automated attributesynonym finding, apart from simple distance metrics used as part of schema matching systems [9, 16, 17, 24]."]} +{"10184410|1805048": []} +{"10092092|3761015": []} +{"10092092|10213552": []} +{"21930731|10213552": ["Data and model parallelism require distributed systems and orchestration that exceed capabilities of many single-machine solutions [12, 16].", "In isolation, these components implement high-level functionality that is typical in machine-learning platforms, e.g., data sampling, feature generation, training, and evaluation [12, 14, 16].", "One factor in choosing (or dismissing) a machine learning platform is its coverage of existing algorithms [12]."]} +{"198190157|9060471": []} +{"198190157|3241708": ["Other forms include crowdsourced labels [41,63], rules and heuristics for labeling data [47,65], and others [33,34,34,55,64]."]} +{"1097450|7458485": ["We refer the reader to a recent survey [30] for a more comprehensive coverage of this line of work."]} +{"1097450|14140377": ["There is much prior work in the temporal databases literature [14, 31, 26, 34] on managing a linear chain of versions, and retrieving"]} +{"18822446|1546662": []} +{"18822446|206742377": ["Wrapper induction for extracting data from web pages has been subject of many researches for more than fifteen years [6,13]."]} +{"4956100|17652653": ["Paraphrase generation (Androutsopoulos and Malakasiotis, 2010; Madnani and Dorr, 2010) has been tackled using many different methods, including those based on hand-crafted rules (McKeown, 1983), synonym substitution (Bolshakov and Gelbukh, 2004), machine translation (Quirk et al."]} +{"7219108|7020971": ["Convergence Conditions and Properties The convergence rates of SGD are also well analyzed [7,10,37]."]} +{"16176428|1097238": ["presented in [4] an exhaustive survey of the various techniques used for creating diverse ensembles, and categorise them, forming a preliminary taxonomy of diversity creation methods.", "An ensemble of classifiers is often more accurate than its members if their errors are uncorrelated [4]."]} +{"11125179|17652653": ["Hence, if we extract the verb form of attributes we would need to translate them into noun form, which would require us to solve the paraphrasing problem and introduce more sources of error (Madnani and Dorr, 2010)."]} +{"56174500|393948": ["Some promising techniques include autoencoders and restricted Boltzmann Machines [12]."]} +{"17300055|2082499": ["Figure 2(a) shows the remaining ten pairs 1 In practice, we can adopt some indexing techniques such as blocking and Q-gram based indexing [7] to avoid all-pairs comparison.", "There are also some studies on blocking which consider partitioning of a table of records to maximize matching record pairs co-occurring in given partitions [7]."]} +{"17300055|386036": ["It has been studied extensively for several decades (see [11] for a survey).", "There has been signi\ufb01cant work in developing automated algorithms for entity resolution (see [11] for a recent survey)."]} +{"6168059|10500613": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]} +{"6168059|386036": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]} +{"9492731|10500613": ["First, it must solve a schema matching problem [15] to verify that new data added by Extend actually focus on the topic k , even if the terminology from the candidate page or table is di\ufb00erent ( e.g. , it may be that k = publications while an extracted table says papers )."]} +{"13926968|10175374": ["Current state-of-the-art MTL models are painstakingly configured by hand for each new configuration of tasks [5, 15, 16].", "A body of recent work has explored multi-task learning for modern deep learning models [15]."]} +{"6054025|3241708": ["In addition, since collecting reliable labels is a time consuming and costly task, there is an increasing interest in using cheap, easy-to-get labels from nonexpert using frameworks like e.g. the Amazon Mechanical Turk 1 [49]\u2013[52]."]} +{"6054025|191396": ["First, a clustering of the instances [258] is performed using an unsupervised algorithm."]} +{"6054025|3330313": ["Similar to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38], several methods in label noise cleansing are based on ad hoc measures.", "Dealing with label noise is closely related to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38]."]} +{"62120742|10500613": ["Existing works [98] develop automatic algorithms to generate a set of possible matchings, by considering linguistic and structural information."]} +{"16206075|10500613": ["One way to address the coverage issue is to use synonyms of the augmenting attribute [18, 16].", "Our work on building the SMW graph is related to the vast body of work on schema matching [18, 3, 2].", "\u2026, T C \u27e9 and \u27e8 T \u2032 ( K \u2032 , B \u2032 ) , T \u2032 U , T \u2032 C \u27e9 , determine whether T matches with T \u2032 and compute the score of the mapping T In schema matching [18, 2], the problem of matching two schemas S and S \u2032 is normally framed as follows: Given the two schemas, for each attribute A of S , \ufb01nd the best\u2026"]} diff --git a/edge/graph_53213623.jsonl b/edge/graph_53213623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..715591c92e82caf7d55150a328abf21ebd608292 --- /dev/null +++ b/edge/graph_53213623.jsonl @@ -0,0 +1 @@ +{"5531986|206583375": ["According to [5], the evaluation is to be performed according to the following criteria:", "Positioning systems enable the appropriate device to determine its position, and make the location information available for position-based services [5].", "Thus Bluetooth-based indoor positioning systems may suffer in complex and changing indoor environments [5].", "Comparison with other technologies: As discussed in [5], none of the existing technologies\u2014other than NFC Internal\u2014can satisfy the system requirements of performance and accuracy.", "comparison of existing solutions has already been performed in previous studies [2,5,9].", "(3) Performance: With respect to the performance evaluation, accuracy and precision are the two main parameters for indoor navigation systems [5].", "UWB positioning systems use Radio Frequency (RF) signals for indoor positioning and provide high accuracy [2,5].", "As mentioned by [5], indoor environments such as buildings, university campuses and hospitals include various obstacles (i.", "We evaluate the performance of NFC Internal based on the criteria defined in [5] which presents considerable system performance and deployment criteria to evaluate and compare indoor navigation systems from the user\u2019s point of view.", "In the case of ultrasound technologies, a large number of receivers and the sensitive placement of these receivers across the ceiling are strictly required [5], so in practice these systems have disadvantages in terms of scalability, ease of deployment and implementation costs [2]."]} diff --git a/edge/graph_53214392.jsonl b/edge/graph_53214392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f230d6023a65e1b8ddbf7ea499a9d6bf5a9b7295 --- /dev/null +++ b/edge/graph_53214392.jsonl @@ -0,0 +1,10 @@ +{"17722496|431089": []} +{"3324107|15746017": ["Based on properties of h-index as well as limitations of h-index various other indices has been discussed in literature (Rousseau 2006; Bornmann et al. 2008; Rousseau and Leuven 2008; Alonso et al. 2009; Rosenberg 2014; Wildgaard et al. 2014)."]} +{"3324107|2609569": ["But this index suffers with several limitation which is discussed in literature (Bornmann and Daniel 2007a, b; Costas and Bordons 2007; Jin et al. 2007; Alonso et al. 2009; Maabreh and Alsmadi 2012; Rosenberg 2014; Todeschini and Baccini 2016).", "Based on properties of h-index as well as limitations of h-index various other indices has been discussed in literature (Rousseau 2006; Bornmann et al. 2008; Rousseau and Leuven 2008; Alonso et al. 2009; Rosenberg 2014; Wildgaard et al. 2014)."]} +{"20391798|2609569": ["To overcome the limitation of h-index several indices were proposed by the eminent researchers.", "(Bornmann and Daniel 2007a, b; Costas and Bordons 2007; Jin et al. 2007; Alonso et al. 2009; Maabreh and Alsmadi 2012; Rosenberg 2014)."]} +{"6807709|2609569": []} +{"39427154|2609569": []} +{"46529412|2609569": ["More details can be found in existing review articles (Alonso et al., 2009a)."]} +{"36789797|2609569": ["Many variants of the h-index soon proliferated, intending to correct the perceived weaknesses (Bornmann and Daniel 2005); see also the comprehensive review by Alonso et al. (2009)."]} +{"10692590|2609569": ["Furthermore, Egghe (2009) and Alonso et al. (2009a) have developed two review papers about the h-index, and a comprehensive list of hindex related publications and additional descriptions on the topic can be found at the web page: http://sci2s.ugr.es/hindex.", "Furthermore, Egghe (2009) and Alonso et al. (2009a) have developed two review papers about the h-index, and a comprehensive list of hindex related publications and additional descriptions on the topic can be found at the web page: http://sci2s.", "For example, the h-index (Hirsch (2005)), g-index (Egghe (2006)), hg-index (Alonso et al. (2009b)) and h((2))-index (Kosmulski (2006)).", "We use the geometric mean because, among its properties, it is easy to compute, it is easily understandable in geometric terms (see Alonso et al. (2009b)), it is not influenced by extremely higher values, and thus, it obtains a value which fuses the information provided by the aggregated values in a more balanced way than other aggregation operators.", "For example, the h-index (Hirsch (2005)), g-index (Egghe (2006)), hg-index (Alonso et al. (2009b)) and h (2) -index (Kosmulski (2006)).", "Furthermore, Egghe (2009) and Alonso et al. (2009a) have developed two review papers about the h-index, and a comprehensive list of hindex related publications and additional descriptions on the topic can be found at the web page: http://sci2s.ugr.es/hindex. Burrell (2007) points out that the h-index identifies the most productive core of an author\u2019s output in terms of the most cited papers.", "Furthermore, Egghe (2009) and Alonso et al. (2009a) have developed two review papers about the h-index, and a comprehensive list of hindex related publications and additional descriptions on the topic can be found at the web page: http://sci2s.ugr.es/hindex. Burrell (2007) points out that the h-index identifies the most productive core of an author\u2019s output in terms of the most cited papers. For this core, consisting of the first h papers, Rousseau (2006) introduced the term Hirsch core (h-core), which can be considered as a group of high-performance publications with respect to the scientist\u2019s career (Jin et al. (2007)). Taking into account the h-core and according to the results of the analysis developed by Bornmann et al. (2008), two types of indices can be assumed:", "Furthermore, Egghe (2009) and Alonso et al. (2009a) have developed two review papers about the h-index, and a comprehensive list of hindex related publications and additional descriptions on the topic can be found at the web page: http://sci2s.ugr.es/hindex. Burrell (2007) points out that the h-index identifies the most productive core of an author\u2019s output in terms of the most cited papers. For this core, consisting of the first h papers, Rousseau (2006) introduced the term Hirsch core (h-core), which can be considered as a group of high-performance publications with respect to the scientist\u2019s career (Jin et al.", "We use the geometric mean because, among its properties, it is easy to compute , it is easily understandable in geometric terms (see Alonso et al. (2009b)), it is not influenced by extremely higher values, and thus, it obtains a value which fuses the information provided by the aggregated values in\u2026"]} +{"12698916|2609569": ["37 08\nv2 [\nph ys\nic s.\nKeywords: h-Index - multiple authorship - gh-Index - fractional allocations\n\u2217serge.galam@polytechnique.edu"]} diff --git a/edge/graph_53214845.jsonl b/edge/graph_53214845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..731166f78e626844dd3054e41cc0d48e57ed2e56 --- /dev/null +++ b/edge/graph_53214845.jsonl @@ -0,0 +1,8 @@ +{"3686035|2088679": []} +{"2088679|393948": []} +{"123036742|14415030": []} +{"123036742|15744805": ["The empirical discrepancy method, or called as supervised evaluation method, evaluates segmentation quality by comparing segmentation results with ground truth (Zhang, 1996; Neubert et al., 2008; Clinton et al., 2010)."]} +{"7399363|15369615": []} +{"4359165|393948": ["The DL architectures are formed by the composition of multiple linear and nonlinear transformations of the data, with the goal of yielding more abstract and ultimately more useful representations [15].", "These strategies include spatial invariance, hierarchical feature learning and scalability [15].", "ing architectures, are recently been employed successfully for image segmentation and classification tasks [18][15][9]."]} +{"8650317|8953108": ["When segmenting by thresholding, in a majority of cases a single fixed, global threshold [30] is used for all pixels."]} +{"22132754|393948": ["As proved many times in the literature [18], [19], the complex relation between the input and output usually cannot be modeled by shallow networks.", "The feature learnt by the autoencoder [19] or RBM [18] in layer-wise training is how to recover the input rather than how to transform the input into another space.", "However, it must be noted that the pre-training used here is very different to unsupervised lay-wise pre-training [18], [19].", "The traditional layer-wise training mechanism [19] is also unsuitable to train the network.", "The method proposed in this paper benefits from the recent development of deep learning technology [18], [19]."]} diff --git a/edge/graph_53221131.jsonl b/edge/graph_53221131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8beea509cbeea4e6e2bbec369f9824aa28d7066f --- /dev/null +++ b/edge/graph_53221131.jsonl @@ -0,0 +1,4 @@ +{"58027769|15619069": ["Besides, the time and space complexity of the function composition can be estimated through the proiling techniques [9]."]} +{"18398565|17292349": ["For example, consider the program from Listing 3, which computes a value (hash) based on its first argument (argv[1]) and outputs \u201cwin\u201don the standard output if this value is equal to 809267.", "[1] are: symbolic/concolic execution, model-based test case generation, combinatorial testing, fuzzing, (adaptive) random testing and search-based testing.", "It has an execution tree with 2 \u00d7 strlen(argv[1]) paths.", "5 argv [1][4] == \u20195\u2019) printf(\"win\\n\");", "The resulting program has 2 paths, because the predicate is executed \u03c4 = strlen(argv[1]) times.", "Each program from the second data set computes a different function fi(argv[1]) and outputs some integer number.", "[1] indicate 3 fundamental issues of symbolic execution: (1) path explosion, (2) path divergence and (3) complex constraints."]} +{"15483514|2363064": ["\u2019s [55]"]} +{"30567993|2363064": []} diff --git a/edge/graph_53236024.jsonl b/edge/graph_53236024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f583bcad5f6b7312c6964cfc11eee210c848847 --- /dev/null +++ b/edge/graph_53236024.jsonl @@ -0,0 +1,7 @@ +{"17379833|1142636": ["Web ontology language (OWL) 1 is a well-known standard that originated from the semantic web and it is a W3C recommendation.", "Improving the users\u2019 interpretation of discovered patterns has been mainly focused in the literature on the semantic annotation for the Web [41,48]."]} +{"14117837|5755403": ["A large amount of research related to anomaly detection in trajectories has been published in the video surveillance domain [19].", "A large number of algorithms based on learning of normal trajectory patterns have been proposed for this problem [19].", "This process typically consists of three steps, which are sometimes mixed: preprocessing of raw trajectories, clustering of preprocessed trajectories and modelling of trajectory clusters [19]."]} +{"157452656|11453858": []} +{"168894255|1174262": []} +{"1811633|17516538": ["[2] in the field of video surveillance."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"21666363|763939": ["[22] are the first to put forward the guidelines of ve-"]} diff --git a/graph_5323762.jsonl b/edge/graph_5323762.jsonl similarity index 100% rename from graph_5323762.jsonl rename to edge/graph_5323762.jsonl diff --git a/edge/graph_53241792.jsonl b/edge/graph_53241792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c77fbc32f67a7fcb5c325ee1123bde0ff35c5b14 --- /dev/null +++ b/edge/graph_53241792.jsonl @@ -0,0 +1 @@ +{"53239342|53241792": ["In Part II [22], we give a survey of the literature on GPU based methods in discrete optimization, with focus on routing problems.", "In Part II [22], we give a literature survey focusing on the use of GPUs for routing problems."]} diff --git a/edge/graph_53249268.jsonl b/edge/graph_53249268.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ca59c0993717a2ff636bdd9b3e81f9ce1da6722 --- /dev/null +++ b/edge/graph_53249268.jsonl @@ -0,0 +1,30 @@ +{"27304778|2398835": ["Thus, it is necessary to redesign the network functions to build a network highway for efficient data sharing [12], [14], [25], [26].", "Billions of people with mobile devices and small things, such as sensors, actuators, and robots, are generating tremendous amounts of data [6], [14]."]} +{"27304778|7971188": ["AMNs generate the key identifier of the information by key=hash(InfPf) using hash function [18], [23].", "The flat name is generated by hashing its hierarchical name according to DHT overlay technology [18], [23].", "Meanwhile, the number of logic hops with Chord overlay is proportional to the logarithm of the number of nodes [18], [23]."]} +{"27360477|3330461": []} +{"3329660|6746689": ["Second, we obtain the skeleton of the road networks by performing a thinning operation based on the algorithm proposed in [9], as depicted in Figure 3(c)."]} +{"31835212|18657007": ["broadcasting protocols/schemes [24].", "The solutions can be mainly categorized as Mobile Ad Hoc Networks (MANETs) [23], [24], [27], Delay Tolerance Networks (DTNs) [28], [29], and Movable Base Stations (MBSs) [1], [30]\u2013[32].", "proven to be the most efficient routing protocol in several studies [35]\u2013[37], [24], compared to others, e."]} +{"31835212|2830636": ["(3) Spatial Co-location Discovery: Spatial co-location pattern discovery is the process of finding the subsets of features that are frequently located together in the same geographic area [110]."]} +{"29963227|2398835": []} +{"29963227|13726263": []} +{"67871745|16052126": []} +{"15837097|206051485": ["Under various assumptions, scenarios, and objectives, many plausible algorithms can be found (see [17] and [ 24 ], and reference therein) in the computer vision area.", "This method of evaluating the alignment accuracy is known as the test point error method [ 24 ]; for alternatives to this method, a consistency check with multiple cues and mean square error in control points could be considered (see also [24]).", "This method of evaluating the alignment accuracy is known as the test point error method [24]; for alternatives to this method, a consistency check with multiple cues and mean square error in control points could be considered (see also [ 24 ])."]} +{"12095710|2623404": ["networking paradigm in which the forwarding hardware is decoupled from control plane [55]."]} +{"12095710|393948": ["entangle and hide more or less the different explanatory factors of variation behind the data [57]."]} +{"67108089|14435082": ["On Data Capture: Quality Assessment of Unstructured Spatial UGC and Misregistered Spatial Footprints Quality assessments of collaborative maps have been extensively researched, and relevant studies were comprehensively reviewed by Senaratne et al. (2017)."]} +{"67108089|11453858": ["Most of the other characteristics of SBD, however, are also linked to uncertainties in SBD (Li et al. 2016) and eventually its analytical results."]} +{"61333248|14414383": []} +{"61333248|4621813": []} +{"4544334|2398835": ["Detailed investigations on these tools are discussed in [47], [48]."]} +{"4544334|15529291": ["Hence, the appropriate linkage of articles with the right author\u2019s pro\ufb01le requires to solve the problem of author name ambiguity [9].", "The feature of veracity is added because data veracity is certainly important in scholarly data for issues such as author disam-biguation and deduplication [9]."]} +{"16074598|7644489": ["However, this work does not consider selfinterested users who require incentive to cooperate."]} +{"16074598|1708582": ["We have chosen to use an infinite-horizon discounted formulation because it is guaranteed to have a stationary optimal policy regardless of the structure of the MDP, and it is less computationally complex than the finite-horizon case for long time horizons (corresponding to discount factors close to 1).\nactually lead to worse long run performance.", "In this section, we formulate the problem of determining a UE\u2019s optimal cooperation policy with respect to its beliefs as an MDP [37].", "\u2022 We formulate the decision problem faced by each UE, namely, the problem of deciding whether or not\nto relay, as a Markov decision process (MDP).", "8 We do not use a more conventional reinforcement learning based approach, such as a Q-learning [31], because our problem does not satisfy the required convergence conditions.", "We do not use a more conventional reinforcement learning based approach, such as a Q-learning [37], because our problem does not satisfy the required convergence conditions.", "where V j 0 \u00f0kj; pj\u00de 1\u20444 0 for all s 1\u20444 \u00f0kj; pj\u00de 2 S and V j n \u00f0kj; pj\u00de converges to the optimal state-value function V j\u00f0kj; pj\u00de as n!1 [37].", "For example, a finite horizon undiscounted utility objective [37], i.", "This is due to the fact that there is an absorbing state in the MDP.", "As another example, an infinite horizon undiscounted utility objective [37], i.", "\u2022 We formulate the MDP such that a UE\u2019s optimal cooperation policy not only depends on its current\ngeographic location, its distance from the nearest base station, and the channel conditions, but also on the other UEs\u2019 locations and cooperation strategies.", "OPTIMAL COOPERATION POLICY FOR A SINGLE UE\nA. Problem Formulation\nIn this section, we formulate the problem of determining a UE\u2019s optimal cooperation policy as an MDP [31].", "Specifically, Q-learning requires that all state-action pairs are visited \u201cinfinitely often\u201d: that is, in the limit as t \u2192 \u221e , every action must be taken in every state an infinite number of times."]} +{"21563297|15449163": ["According to a recent study [31], security and"]} +{"21563297|207231270": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197]."]} +{"21563297|76603": ["4) Legal and Regulation Concerns: The ethical and legal requirements are non-negligible factors in D2D security and privacy research, due to the connection with national security and public safety [209], [210]."]} +{"21563297|3330461": ["According to [5], [10], [19], and [20], M2M communication can be defined as:", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D", "Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "without the interaction of access points or base stations [5].", "Other communication paradigms similar to D2D include the Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "and technology-independent, whereas D2D is technologydependent and focuses on proximity services, which assumes opportunistic connectivity [5].", "According to [5] and [10], the standalone D2D can be defined as:", "Typical D2D applications and services include cellular data offloading, relaying, gaming, content distribution, and group communication [5], [10], [17]."]} +{"21563297|7644489": ["D2D switches from infrastructure path to direct path for offloading cellular traffic [9], [21]\u2013[23].", "4) Solution Compatibility and Deployability: Cellular operators are the main driving force for D2D communication [21], [190], which have identified a set of use cases and"]} +{"21563297|6670217": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In the following, we highlight key characteristics of mobile security and privacy [135]."]} +{"21563297|12970117": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D"]} +{"21563297|14745481": ["2016 in order to reflect the latest advancements on top of the security research in mobile ad hoc networks [24], [174], [175].", "Aside from physical layer considerations in conventional MANET security [24], [174], [175], physical layer security in D2D communication also deserves our attention."]} +{"21563297|18411031": ["to perform operations on encrypted cipertext without knowing the original data [120].", "The tokens can only be generated with a secret key [120]."]} +{"206608308|1230643": ["In sensor networks the stationary nodes can be placed deterministically [3] or in bulk at random positions [4]."]} diff --git a/edge/graph_53249501.jsonl b/edge/graph_53249501.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b227543a168a7c256b0928b3e3e6c806046a5f3 --- /dev/null +++ b/edge/graph_53249501.jsonl @@ -0,0 +1,9 @@ +{"16517731|15529291": ["In this paper we used an author grouping method (compare [3]) to cluster the publications of a set of random authors with the same name in the DBLP database.", "The author assignment and author grouping methods [3] are the two main types of method for author name disambiguation."]} +{"15563159|2368628": ["Nivre and McDonald (2008), Zhang and Clark (2008) and Chen and Ji (2010) show methods to improve the graph-based parsing by including additional features, possibly produced by alternative parsing models.", "Edges between authors could correspond to co-authorship/collaboration, citation , edges between authors and their papers represent authorship , and links between two papers could represent citation/reference relations.", "Chen and Ji (2010) present a survey of clustering approaches useful for tasks in computational linguistics."]} +{"39093644|15529291": ["According to Ferreira et al. (2012b), AND methods may be broadly classified into two categories according to the type of approach they perform: author grouping methods (e.g., Bhattacharya & Getoor, 2007; Cota, Ferreira, Nasci-mento, Gonc\u00b8alves, & Laender, 2010; Fan, Wang, Pu, Zhou, & Lv, 2011; Han,\u2026", "Ideally, the AND task should be performed incrementally as new citations are incorporated into a DL because it is not reasonable to assume that the whole DL should be disambig-uated at each new load (Ferreira et al., 2012b).", "These are standard metrics that have been largely used by the community (Ferreira et al., 2012b).", "Although many solutions have been proposed (see, for instance, Ferreira, Gonc\u00b8alves, & Laender, 2012b), the vast majority of them have been designed and evaluated using a static snapshot collection extracted from a DL.", "The main input of SyGAR is a collection of previously disambiguated citation records (Ferreira et al., 2012a), referred to as the input collection.", "Each record in such a collection comprises the three attributes most commonly exploited by AND methods, namely, author names, publication titles, and venue titles (Ferreira et al., 2012b)."]} +{"14606712|17323154": [", [13]); see [7] for an overview on web search results clustering."]} +{"16166397|8310135": []} +{"11796123|15529291": ["These approaches have some drawbacks [5, 16], namely they assume that authors generally write similar papers (e.g. in terms of subject areas and publication venues), and an author.", "This problem is known as author name disambiguation and is the hardest challenge faced Author name disambiguation approaches are categorized in two groups: author grouping and author assignment [5].", "The exorbitant number of new publications, along with their metadata heterogeneity, utterly increased the di\ufb03culty of creating and maintaining reliable bibliographic databases [5]."]} +{"406098|8773720": ["See [36] by Lingras and Jensen for the clarification of the conflict of"]} +{"61890402|17323154": [", [106]); see [43] for an overview on web search results clustering."]} +{"27774326|191396": []} diff --git a/edge/graph_53250133.jsonl b/edge/graph_53250133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3721241d4b1ed5ad4346badd4a192335515ad9d2 --- /dev/null +++ b/edge/graph_53250133.jsonl @@ -0,0 +1,13 @@ +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"24465182|10157083": ["This method employs features of Hindi text summarization system suggested by CDAC Noida as well as Punjabi text summarization system (Gupta and Lehal 2010)."]} +{"4562004|4110304": ["Our previous paper [39] provides a comprehensive survey of recent studies in exploring visual interpretability of neural networks, including 1) the visualization and diagnosis of CNN representations, 2) approaches for disentangling CNN representations into graphs or trees, 3) the learning of CNNs with disentangled and interpretable representations, and 4) middle-to-end learning based on model interpretability."]} +{"207172599|3330313": []} +{"5766545|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [4], as past experience shows that an emergent concept will often align", "factorization of the underlying problem structure [4], or units that have a semantic interpretation (a face, wheel, green"]} +{"304226|5871627": ["Other examples include news websites which produce condensed descriptions of news topics usually as headlines to facilitate browsing or knowledge extractive approaches [8, 61, 72]."]} +{"304226|10157083": ["Since then, many works have been published to address the problem of automatic text summarization (see [24, 26] for more information about more advanced techniques until 2000s)."]} +{"5575638|2473564": ["A total of 17 papers were published withiin this Special Issue at IEEE TPAMI [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47]."]} +{"5575638|14303607": ["Topic at Journal of Machine Learning Research [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30] 2016 TPAMI HuPBA: We organized a Special Issue on Multi-modal Human Pose Recovery and Behavior Analysis (HuPBA) at IEEE Transactions on Pattern Analysis and Machine Intelligence Journal."]} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} +{"11149239|14808716": ["9 represents any top-down decision tree induction algorithm (Rokach and Maimon 2005a) with the following modification: the decision tree is not pruned and at each node, rather than choosing the best split among all attributes, the inducer randomly samples N of the attributes and choose the best\u2026"]} +{"11149239|1097238": ["These techniques alter the way the induction algorithm traverses the hypothesis space (Brown et al. 2005).", "However, in the classification context, there is no complete and agreed upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005).", "Brown et al. (2005) suggested a taxonomy of methods for creating diversity in ensembles of classifiers: varying the starting points within the hypothesis space; varying the set of hypotheses that are accessible by the ensemble members (for instance by manipulating the training set); and varying the\u2026", "While it is very simple way to gain diversity, it is now generally accepted that it is not sufficient for achieving good diversity (Brown et al. 2005).", "upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005)."]} +{"7395123|3102110": ["Data mining [Chen et al. 1996] is the process of extracting interesting (non-trivial, implicit, previously unknown and potentially useful) information or patterns from large information repositories such as: relational database, data warehouses, XML repository, etc."]} diff --git a/edge/graph_53250185.jsonl b/edge/graph_53250185.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..254ecfafab4600dbbad665feae2ee3cb71fcd034 --- /dev/null +++ b/edge/graph_53250185.jsonl @@ -0,0 +1,69 @@ +{"17459774|12187956": ["COGNITIVE RADIO (CR), which allows secondary users (SU) to share the spectrum licensed to primary users (PU), is an promising approach to alleviate the spectrum underutilization problem [1], [2]."]} +{"22944368|8909218": ["In [3], the authors introduced a distributed utility-based signal to interference-plus-noise ratio (SINR) adaptation algorithm to mitigate cross-tier interference of macrocell base stations (MBS) and FBSs."]} +{"2145473|6779551": ["For more details regarding the advances in this rich field of physicallayer security in wireless communications, we refer to surveys and overviews provided in [24]\u2013[30]."]} +{"2468071|12957829": ["To use the PSO algorithm in problem (31), its validation should be evaluated.", "In this regard, it is sufficient to compare a sample of PSO results with the results of another way to solve a single optimization problem.", "In Section V, a cross-layer fixed PA in multirelay networks by the use of a population-based PSO algorithm is provided.", "Best relay selection (BRS), cross-layer power allocation, distributed space\u2013time coding (DSTC), effective capacity (EC), particle swarm optimization (PSO), quality of service (QoS), wireless multirelay networks.", "Due to the following advantages of PSO compared with the others, we apply it for solving the problem: 1) a simple search process and simple implementation retrieved from the use of a single simple operator, i.e., velocity calculation, instead of three operators, i.e., selection, crossover, and mutation, in comparison with GA; 2) easy manipulation of the numerical parameters such as the number of particles, inertial weights, and acceleration factors c1 and c2; 3) low computational cost attained from small number of agents; and 4) speed of convergence.", "In contrast, stochastic algorithms have the ability of finding a global solution whatever the initial guess, with no dependence on the differentiability and convexity of objective functions [25], [27].", "In the last part of this paper, we propose a cross-layer fixed PA algorithm for a multirelay network by the use of a PSO algorithm.", "Therefore, the problem should be solved by the use of optimization techniques that can be generally categorized into deterministic and stochastic methods [25].", "Therefore, it can be concluded that the performance of the applied PSO algorithm is reliable and correct.", "Evolutionary algorithms, such as genetic algorithms (GAs) [28], differential evolution [29], particle swarm optimization (PSO) [25], [30]\u2013[32] and ant colony optimization [33], are good choices for this end.", "In this regard, we utilize the obtained closed-form equations for EC and the intelligent PSO algorithm.", "Therefore, we apply the PSO algorithm to solve the fixed PA problem in [17, Eq.", "The PSO algorithm was proposed by Kennedy and Eberhart in 1995 [30].", "9 shows the convergence behavior of the applied PSO algorithm for different amounts of source\u2013relay distance and \u03b8 = 0.0001.", "7, the solution surface of the PSO algorithm is exactly equal to the solution surface of the numerical method provided in [17].", "The general PSO algorithm is summarized as follows: [30]\nPseudocode of the PSO algorithm\n1.initialize pBest and gBest for each particle xp do: 1. initialize xp(0) and the velocity of particles vp(0) end for t = 1 : NIteration do: for each particle xp do: calculate the fitness value fit(\u00b7) from (31) or (32) if fit(xp) < fit(pBest) then pBestp = xp end if fit(pBestp) < fit(gBestp) then gBestp = pBestp end end for each particle xp do: update the velocity using (34) update the position of particles using (33) end end\nAfter finishing the iterations, the optimum solution will be found.", "[32] V. Pappala and I. Erlich, \u201cPower system optimization under uncertainties: A PSO approach,\u201d in Proc."]} +{"16086599|8909218": ["\u2026of a collocated femtocell highly overlaps with that of other collocated femtocells. by such a users deployed BS with merits of enhancing the indoor received signal quality, reducing the burden of the Macrocell, and enabling various user-specific applications [1]\u2013 [4] is known as the femtocell."]} +{"31758293|12187956": []} +{"34611353|7525856": []} +{"34611353|8606364": ["schemes including the radio resource allocation are surveyed in [84] and [85]."]} +{"34611353|512561": ["Moreover, network coding in conjunction with channel bonding schemes for multimedia communications in CRNs is also a good direction of future research [337]."]} +{"34611353|1686572": ["Different standards related to CRNs and the TVWS are discussed in [74]\u2013[77], while the authors in [78]\u2013[83] have studied various security approaches related to CRNs."]} +{"34611353|14988542": ["[14] and Pudlewski and Melodia [37] explore the various compression techniques related to multimedia applications.", "The existing surveys on the energyefficient multimedia communications in the wireless networks are [14]\u2013[16], while QoS in the various wireless networks is discussed in [17]\u2013[27]."]} +{"34611353|8974063": []} +{"34611353|14088590": []} +{"34611353|2282515": ["The existing surveys on the energyefficient multimedia communications in the wireless networks are [14]\u2013[16], while QoS in the various wireless networks is discussed in [17]\u2013[27]."]} +{"34611353|1775475": ["The existing surveys on the energyefficient multimedia communications in the wireless networks are [14]\u2013[16], while QoS in the various wireless networks is discussed in [17]\u2013[27]."]} +{"15309527|8909218": ["As a result, a radio resource management scheme that can effectively mitigate interference [1], achieve a fully radio resource utilization and provide QoS guarantee had been identified as the major challenges and are urgently needed to realize the concept of the femto-networks.", "RECENTLY a new class of user haphazardly deployed indoor base stations enhancing the indoor received signal quality and coverage, reducing the burden of the Macrocell network (Macro-network) and enabling variety of user-specific applications has received considerable attentions [1]\u2013[4]."]} +{"29921474|8909218": ["Explosive demand for data traffic cause that traditional macrocell base stations (MBS) can not cover users and guarantee sufficient quality of service (QoS) especially for cell edge and indoor users [1]."]} +{"116133062|18451845": []} +{"7787129|8909218": ["Femtocell is consumer installed wireless data access point providing broadband coverage to indoor users, and potentially promises energy savings, since it reduces the required transmission power by shorten the propagation distance between nodes [7]."]} +{"7787129|17109970": ["A gametheoretic model is proposed to study the cross-layer problem of joint power and rate control with QoS support, and then derived a Nash equilibrium solution for the proposed noncooperative game [5]."]} +{"86520206|51988843": ["In downlink, transmission to multiple users can be enabled within the same time-frequency resources [2]\u2013[4] by applying superposition transmission and power control at the transmitter and succes-", "Hence, it decodes its own signals by treating the signals for the strong user p as an additive noise [2], [3]."]} +{"86520206|22221919": ["Hence, it decodes its own signals by treating the signals for the strong user p as an additive noise [2], [3].", "Successful SIC is achievable, sinceB log2(1 + \u03c1 \u03b2 2 q |g p ( t ) |2 \u03c1 \u03b2 2 p |g p ( t ) |2 + \u03c3 2 ) \u2265 B log2(1 + \u03c1 \u03b2 2 q \u03be ( t ) \u03c1 \u03b2 2 p \u03be ( t )+ \u03c3 2 ) [3].", "According to the NOMA principles [3], the transmit power allocated for the weak user is no lower than that for the strong user."]} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"3225335|25911553": []} +{"3225335|3799929": []} +{"3225335|34643772": []} +{"3225335|7525856": []} +{"3225335|8606364": ["CRN radio resource allocation has been discussed in [59]\u2013[61], and green energy-powered CRNs have been presented in [60] and [62]."]} +{"3225335|512561": ["CRNs, especially cognitive radio sensor networks (CRSNs) [246], can greatly benefit from energy harvesting approaches [247]."]} +{"3225335|1541773": ["Energy conservation is an important research domain in wireless communications [60], [62], [250]."]} +{"3225335|8650651": []} +{"3225335|4122595": ["2) Hardware Imperfections: Hardware imperfections in CRNs [107], such as non-linear distortions, phase noise, non-ideal frequency responses of circuits, power amplifier"]} +{"3225335|11414835": ["Network virtualization allows multiple virtual networks to operate over a given single physical network [267]\u2013[270]."]} +{"3225335|1686572": ["Surveys on MAC protocols for CRNs are provided in [50] and [51], while the security, privacy, and threats of CRNs have been surveyed in [52]\u2013[58].", "However, various CRNs related threats, such as primary user emulation (PUE) attacks [56] and others, as discussed in [58], have not been analyzed for FD-CRNs."]} +{"3225335|8974063": []} +{"3225335|8909218": ["2718618 This exceptional growth has motivated the development of next generation wireless technologies, such as femtocells [2], [3],"]} +{"84186573|3330461": ["Resource management in traditional cellular-assisted D2D communications has been widely investigated towards low-mobility applications in [7]\u2013[9], where instantaneous channel state information can be available at the transmitter."]} +{"9260093|8909218": []} +{"2505600|8909218": ["Business case for small cells depends on and the intended purpose, but in general they a make [16], [17]."]} +{"31288750|8909218": ["As a result, femtocell base station (FBS) has gained wide attention in wireless industry [1], [2]."]} +{"16136156|485843": ["Although its definition and architecture may vary, it has been widely agreed that the effective, reliable and secure communication network is the most critical component of smart grid [1]."]} +{"15380555|2509135": ["This problem becomes even more complicated in the cognitive radio networks, where secondary users can only access the authorized spectrum opportunistically under the condition of not causing harmful interference to primary users [2]-[3]."]} +{"31417645|8974063": []} +{"14991195|17325804": ["Location based routing for ad hoc networks becomes possible and practical with the availability of advanced localization techniques that do not depend on the global positioning system (GPS) [3] [29] and with the emerging of ultra wideband (UWB) technology that offers low power and precise location determination methods [30]."]} +{"14991195|14088590": []} +{"14991195|2835258": ["are characterized by their scalability and efficient bandwidth utilization as they do not flood the network to find the path for a destination [ 5 ]."]} +{"6091520|3330461": ["D2D communications underlaying cellular networks, where D2D users and cellular users share the same radio resources, can benefit from both the resource reuse gain and the assistance from the infrastructure, thus having attracted considerable attention recently [2]."]} +{"6091520|7644489": ["Uplink resource sharing is considered since it shows advantages in terms of spectrum utilization and practical implementation, compared with downlink resource sharing [10]."]} +{"110896183|1230643": []} +{"110896183|12060835": []} +{"16965906|7505270": ["Modern advances in micro-electro-mechanical system (MEMS) technology has made it possible to deploy the hundred and thousands of sensing nodes to sense the data [1]."]} +{"16965906|7988320": ["In [11] various WBASNs routing protocols have been surveyed."]} +{"63535144|10559330": []} +{"1598612|14889616": ["for every frame in a similar fashio refer [9] for more details."]} +{"1598612|3540699": []} diff --git a/graph_5325544.jsonl b/edge/graph_5325544.jsonl similarity index 100% rename from graph_5325544.jsonl rename to edge/graph_5325544.jsonl diff --git a/edge/graph_53277970.jsonl b/edge/graph_53277970.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..586a747e8c250415c046684593076204e4ef596e --- /dev/null +++ b/edge/graph_53277970.jsonl @@ -0,0 +1 @@ +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} diff --git a/edge/graph_53278547.jsonl b/edge/graph_53278547.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cdb900525e4371bb722f6e264768f6439346e8b7 --- /dev/null +++ b/edge/graph_53278547.jsonl @@ -0,0 +1,52 @@ +{"1841699|3330461": []} +{"1503981|6486398": ["Eigenvector [19] and PageRank [20] are common centrality measures to calculate the importance of nodes in a graph.", "More details on the computation of these centrality measures can be found in [19] and [20] for Eigenvector and PageRank respectively."]} +{"1663341|3330461": ["Among the candidate 5G technologies, direct device-to-device (D2D) communications is attracting increased research attention [1] as it promises to deliver improved throughput, provide more efficient spatial reuse, lead to extended network coverage, and enhance user energy efficiency."]} +{"5946348|2142482": ["Public Key Infrastructure (PKI) can be used to uniquely identify each node and can be useful to defend against identity or Sybil attackers [24]."]} +{"957125|207372751": []} +{"12297908|8909218": ["In contrast, femtocells typically have an order of magnitude larger cell radius [43].", "The results of the femtocell network are taken from [43], [45]\u2013[47]."]} +{"16951234|207372751": ["\u2026based on temporal similarity metrics using continuous action set learning automata Behnaz Moradabadi \u2217, Mohammad Reza Meybodi Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran\na r t i c l e i n f o\nArticle history: Received 30 March 2015 Received in revised\u2026", "Contents lists available at ScienceDirect\nPhysica A\njournal homepage: www.elsevier.com/locate/physa\nLink prediction based on temporal similarity metrics using continuous action set learning automata Behnaz Moradabadi \u2217, Mohammad Reza Meybodi Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran\na r t i c l e i n f o\nArticle history: Received 30 March 2015 Received in revised form 1 February 2016 Available online 13 April 2016\nKeywords: Social network Link prediction Similarity metric Temporal data Learning automata\na b s t r a c t\nLink prediction is a social network research area that tries to predict future links using network structure.", "(2) Precision [1]: If we predict L links to be connected and Lr links from L links are right, the Precision is defined as:\nPrecision = Lr L .", "For the experiments developed in this work, we consider the following two groups of networks:\n(1) Co-authorshipNetworks: A type of social networkwhere the nodes represent the authors and two authors are connected if they have collaborated in a paper.", "All rights reserved.", "The main approaches in this area are based on predicting future links using network structure at a specific period, without considering the links behavior through different periods.", "2 http://arxiv.org/archive/hep-th.\nin the high energy physics3 (hep-ph) and the third one is sampled from collaboration in the Astro Physics4 (Astro-ph)."]} +{"16951234|3042022": ["The LA based on its possible actions can be partitioned into two main classes: FALA and CALA [35].", "Learning automata (LA) are a type of decision making units that try to learn the optimal action from the set of possible actions by interaction with an unknown stochastic environment [35] [36]."]} +{"18168518|3330461": ["Most of the existi ng works on SCNs and D2D enabled user association are focused on conventional physical layer metrics to optimize the netw ork performance [1]\u2013[4], [7], [8], [11]."]} +{"3668455|6906699": []} +{"3668455|13287576": ["Multiple intrusion detection approaches can be simultaneously deployed based on the security demands [71,74,79,80].", "Finally, a machine learning-based technique [70,71] is a procedure of constructing new behavior models based on the observations of activities, events, and behaviors."]} +{"3668455|18269383": []} +{"3668455|16654832": []} +{"3668455|10780757": ["Three common techniques [67] supporting comparisons include statistical-based [68], knowledge-based, and machine learning-based techniques [69,70].", "Next, the knowledge-based technique is applicable for those systems that consist of speci\ufb01c knowledge structures or attached to a set of rules [67], such as symbolic representations.", "Statistical-based technique tracks all networking traf\ufb01cs and generates a pro\ufb01le examining whether there are any improper traf\ufb01c by a statistical analysis [67].", "The obstacle of adopting this technique is the extensive requirement of computing resources [67], which imply that the examination is highly dependent on the stored secure behavior assumptions."]} +{"3668455|18212759": ["The technologies supporting cloud computing are very similar regardless of service types or deployments [25,26]."]} +{"3668455|12815020": ["In a networking context, attackers can only gain controls on VMs by attacking the lower layer hyper-visor [40]."]} +{"2623388|6076208": []} +{"42677084|3348390": ["For instance, providing context-aware services in smart spaces as proposed by Byun et al. [19] and similarly Leong et al. [20]."]} +{"9986936|207372751": ["2006; Murata and Moriyasu 2007) or precision on the top K predictions (Lu and Zhou 2011; Wang et al. 2007), both approaches have some drawbacks.", "Although there are some studies that evaluate link prediction performance by prediction accuracy (Hasan et al. 2006; Murata and Moriyasu 2007) or precision on the top K predictions (Lu and Zhou 2011; Wang et al. 2007), both approaches have some drawbacks."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"148364937|207372751": []} +{"49641651|1333339": []} +{"38357847|19938676": []} +{"41764732|12817488": []} +{"825803|4395259": ["Despite various secure transmission strategies [13], challenges remain when applying physical-layer security to practical systems [14]."]} +{"11236454|20473693": ["I. INTRODUCTION\nIn the context of the Internet of Things (IoT) [1, 2] everything and anything could be part of the global physical and virtual network called the Internet of Things."]} +{"11236454|1333339": ["In general, nearly all trust models [5] focused on the description of the associations and interactions amid nodes."]} +{"26684128|20905429": ["There are several related work that show the use of ICT and especially the use of sensors to monitor and take care of ill people such as [18], [19] and [20]."]} +{"16012932|4395259": ["Physical-layer security refers to the techniques which exploit the channel characteristics in order to hide information from unauthorized receivers, without reliance on upper-layer encryption [3]\u2013[9]."]} +{"15506355|12817488": ["In a flat network, Directed Diffusion data aggregation is an efficient method in terms of energy consumption and delay compared with other algorithms [1].", "Data latency is important in many applications such as environmental monitoring, where the freshness of data is also an important factor [1]."]} +{"9082268|8909218": ["A literature review about the technical details and challenges of femtocells can be found in Chandrasekhar et al. [13]."]} +{"206584117|763939": ["Although mobility models [70] [71] [72] [73] have been well researched, most of them are developed for mobile Ad-hoc networks and do not consider social relations among nodes, causing that they can not evaluate social-aware routing protocols."]} +{"19839707|6779551": ["Spectrum sharing in D2D can produce signi\ufb01cant amount of interference of CUEs, therefore, extensive efforts are made to minimize interference in order to enable secure and reliable communication [18]."]} +{"18808549|15528470": []} +{"11343778|14441987": ["These characteristics make the classical ad hoc routing protocols [4]\u2013[6] not being applicable for DTNs, since these protocols rely on establishment of a complete end-to-end"]} +{"124329028|28210495": []} +{"207558130|207372751": ["\u2026obtained from Pajek datasets (2006), we compare the prediction performances of LPEOWAs with individual link prediction algorithms, where the prediction performance is measured by the area under the receiver operating characteristic curve (AUC) (Bradley, 1997; L\u00fc & Zhou, 2011; Zhao et al., 2012).", "Performance measure index-AUC\nAUC (Bradley, 1997; L\u00fc & Zhou, 2011; Zhao et al., 2012) is the prevalently used index to measure the performance of link prediction algorithm, which is defined as\nAUC \u00bc n1 \u00fe 0:5n2 n ; \u00f010\u00de\nwhere n is the number of independent comparisons including n1 times the missing\u2026", "For more detailed information, the audience can refer to L\u00fc and Zhou\u2019s work (L\u00fc & Zhou, 2011) which is a very good and valuable review to the link prediction in complex networks.", "3, the scores of link existence likelihoods between nodes x and y computed with HDI are sHDIxaya \u00bc 2 4 > s HDI xbyb \u00bc 26.", "Ensemble with some of 9 individual algorithms\nOur experiments also test the performances of three different kinds of ensemble algorithms: the ensemble of snCNxy ; sn HPI xy ;\nsnSaltonxy ; sn S\u00f8rensen xy ; sn HDI xy ; sn Jaccard xy and snLHN Ixy , the ensemble of\nsnAAxy ; sn HPI xy ; sn Salton xy ; sn S\u00f8rensen xy ; sn HDI xy ; sn Jaccard xy and snLHN Ixy , and the\nensemble of snRAxy ; sn HPI xy ; sn Salton xy ; sn S\u00f8rensen xy ; sn HDI xy ; sn Jaccard xy and snLHN Ixy .", "For the kx; ky > 2 and kx \u2013 ky, we can derive\n1 < min kx; ky < ffiffiffiffiffiffiffiffiffi kxky q <\nkx \u00fe ky 2 < max kx;ky\n< C x\u00f0 \u00de [ C y\u00f0 \u00dek k < kxky: \u00f023\u00de\nFurthermore, we can get the following derivations:\nsCNxy > s HPI xy > s Salton xy > s S\u00f8rensen xy > s HDI xy > s Jaccard xy > s LHN I xy \u00f024\u00de\nand\nsnCNxy > sn HPI xy > sn Salton xy > sn S\u00f8rensen xy > sn HDI xy > sn Jaccard xy\n> snLHN Ixy : \u00f025\u00de\nFor any node z 2 C x\u00f0 \u00de \\ C y\u00f0 \u00dek k, when kz > 2, we can obtain\n1 > 1\nlog2kz > 1 kz : \u00f026\u00de\nBecause sCNxy \u00bc C x\u00f0 \u00de \\ C y\u00f0 \u00dek k \u00bc P z2C x\u00f0 \u00de\\C y\u00f0 \u00de1, we can derive\nsCNxy > s AA xy > s RA xy \u00f027\u00de\nand\nsnCNxy > sn AA xy > sn RA xy : \u00f028\u00de\nFrom Eqs.", "We denote this score as sOWAxy between nodes x and y, which is calculated as:\nsOWAxy \u00bc X9 i\u00bc1 wi s i\u00f0 \u00dexyP9 j\u00bc1s j\u00f0 \u00de xy\n\" #\" # ; \u00f022\u00de\nwhere s i\u00f0 \u00dexy is the ith largest value of snCNxy ; sn Salton xy ; sn Jaccard xy ; snS\u00f8rensenxy ; sn HPI xy ; sn HDI xy ; sn LHN I xy ; sn AA xy and sn RA xy , the term s\u00f0i\u00dexyP9 j\u00bc1 s\u00f0j\u00dexy is supposed to be bi in Eq.", "Among all existing link prediction algorithms, similarity-based algorithm (L\u00fc et al., 2009; L\u00fc & Zhou, 2011) is a kind of simplest framework for the prediction of non-existent link.", "Inspired by the outlook in L\u00fc and Zhao\u2019s work (L\u00fc & Zhou, 2011), i.e., \u2018\u2018we can implement many individual prediction algorithms and then try to select and organize them in a proper way.", "Fold 1 Fold 2 Fold 3 Fold 4 Fold 5 Fold 6 Fold 7 Fold 8 Fold 9 Fold 10 Average\nCN [19232 3378 1771 0.8581] [17312 4318 2751 0.7986] [17147 4372 2862 0.7930] [17597 4200 2584 0.8079] [17754 3789 1935 0.8369] [16973 4151 2354 0.8113] [17304 3961 2213 0.8214] [17866 3482 2130 0.8351] [16617 4140 2721 0.7959] [16190 4631 2657 0.7882] [17399 4042 2398 0.8146 0.0005] Salton [17989 610 5782 0.7503] [17122 329 6930 0.7090] [16694 590 7097 0.6968] [16575 612 7194 0.6924] [17803 212 5463 0.7628] [15560 265 7653 0.6684] [16895 161 6422 0.7230] [16434 577 6467 0.7123] [15095 955 7428 0.6633] [15839 367 7272 0.6824] [16601 468 6771 0.7061 0.0011] Jaccard [16913 715 6753 0.7084] [16710 514 7157 0.6959] [16249 833 7299 0.6835] [15836 686 7859 0.6636] [17464 481 5533 0.7541] [14657 300 8521 0.6307] [16081 319 7078 0.6917] [16120 770 6588 0.7030] [14395 1206 7877 0.6388] [15163 574 7741 0.6581] [15959 640 7241 0.6828 0.0013] S\u00f8rensen [16913 715 6753 0.7084] [16710 514 7157 0.6959] [16249 833 7299 0.6835] [15836 686 7859 0.6636] [17464 481 5533 0.7541] [14657 300 8521 0.6307] [16081 319 7078 0.6917] [16120 770 6588 0.7030] [14395 1206 7877 0.6388] [15163 574 7741 0.6581] [15959 640 7241 0.6828 0.0013] HPI [19350 1878 3153 0.8322] [17551 2410 4420 0.7693] [17574 2138 4669 0.7647] [18052 2104 4225 0.7836] [17499 2270 3709 0.7937] [17253 2261 3964 0.7830] [17849 1812 3817 0.7988] [16418 1820 5240 0.7381] [16088 2635 4755 0.7414] [16780 2416 4282 0.7662] [17441 2174 4223 0.7771 0.0008] HDI [16215 798 7368 0.6814] [16333 527 7521 0.6807] [15854 894 7633 0.6686] [14978 1034 8369 0.6355] [16984 487 6007 0.7338] [13937 447 9094 0.6031] [15088 713 7677 0.6578] [16143 711 6624 0.7027] [14087 1140 8251 0.6243] [14947 607 7924 0.6496] [15457 736 7647 0.6638 0.0015] LHN-I [15403 604 8374 0.6441] [15306 428 8647 0.6366] [14875 631 8875 0.6230] [14428 704 9249 0.6062] [15788 232 7458 0.6774] [13568 298 9612 0.5842] [14439 389 8650 0.6233] [14049 597 8832 0.6111] [13380 1004 9094 0.5913] [14726 389 8363 0.6355] [14596 528 8715 0.6233 0.0007] AA [21451 640 2290 0.8929] [20514 330 3537 0.8482] [19608 882 3891 0.8223] [20133 798 3450 0.8421] [20364 334 2780 0.8745] [20024 288 3166 0.8590] [20393 341 2744 0.8759] [20239 587 2652 0.8745] [18418 1284 3776 0.8118] [18832 596 4050 0.8148] [19998 608 3234 0.8516 0.0008] RA [21386 639 2356 0.8903] [21125 330 2926 0.8732] [19915 882 3584 0.8349] [20254 797 3330 0.8471] [20461 334 2683 0.8786] [20459 288 2731 0.8775] [20750 341 2387 0.8911] [20607 587 2284 0.8902] [18277 1284 3917 0.8058] [18996 596 3886 0.8218] [20223 608 3008 0.8611 0.0010]\n- O\u2019Hagan\u2019s maximum entropy method (MEM) (O\u2019Hagan, 1988) is to solve the constrained nonlinear optimization model as follows: Xn\nMaximize Disp w\u00f0 \u00de \u00bc i\u00bc1 wiIn wi\u00f0 \u00de s:t: orness w\u00f0 \u00de \u00bc a \u00bc 1n 1 Xn i\u00bc1 n i\u00f0 \u00dewi;\nXn i\u00bc1 wi \u00bc 1; wi 2 0;1\u00bd ; i \u00bc 1;2; . . . ;n:\n\u00f019\u00de\n- Fuller and Majlender\u2019s minimum variance method (MVM) (Full\u00e9r & Majlender, 2003) is to solve the following mathematical programming model:\nMinimize Disp w\u00f0 \u00de \u00bc 1n Xn i\u00bc1 wi 1n 2 s:t: orness w\u00f0 \u00de \u00bc a \u00bc 1n 1 Xn i\u00bc1 n i\u00f0 \u00dewi;\nXn i\u00bc1 wi \u00bc 1; wi 2 0;1\u00bd ; i \u00bc 1;2; . . . ;n:\n\u00f020\u00de\n- Wang, Luo and Liu\u2019s chi-square method (CSM) (Wang et al., 2007) is to solve the following nonlinear programming model:\nMinimize Disp w\u00f0 \u00de \u00bc Xn 1 i\u00bc1 wi wi\u00fe1 \u00fe wi\u00fe1wi 2 s:t: orness w\u00f0 \u00de \u00bc a \u00bc 1n 1 Xn i\u00bc1 n i\u00f0 \u00dewi;\nXn i\u00bc1 wi \u00bc 1; wi 2 0;1\u00bd ; i \u00bc 1;2; . . . ;n:\n\u00f021\u00de\nwhere a in Eqs.", "- Hub promoted index (HPI) (Ravasz et al., 2002) and Hub depressed index (HDI) (L\u00fc & Zhou, 2011; Zhou et al., 2009) are two similarity measures which are proposed to quantify the topological overlap of substrate pairs in metabolic network.", "Fold 1 Fold 2 Fold 3 Fold 4 Fold 5 Fold 6 Fold 7 Fold 8 Fold 9 Fold 10 Average\nCN [6310 660 1513 0.7827] [4900 877 2706 0.6293] [6045 939 1499 0.7679] [5277 840 2366 0.6716] [5911 708 1864 0.7385] [5482 943 2058 0.7018] [5442 1003 2038 0.7006] [5311 1007 1666 0.7283] [4980 833 2171 0.6759] [4581 853 2550 0.6272] [5424 866 2043 0.7024 0.0028] Salton [4591 30 3862 0.5430] [3858 55 4570 0.4580] [4549 23 3911 0.5376] [3944 50 4489 0.4679] [4286 56 4141 0.5085] [3692 13 4778 0.4360] [3522 21 4940 0.4164] [4382 40 3562 0.5514] [3837 27 4120 0.4823] [3383 23 4578 0.4252] [4004 34 4295 0.4826 0.0025] Jaccard [4626 227 3630 0.5587] [3971 154 4358 0.4772] [4441 166 3876 0.5333] [3622 178 4683 0.4375] [4334 110 4039 0.5174] [3486 129 4868 0.4185] [3292 142 5049 0.3964] [4357 131 3496 0.5539] [3785 105 4094 0.4806] [3278 81 4625 0.4156] [3919 142 4272 0.4789 0.0036] S\u00f8rensen [4626 227 3630 0.5587] [3971 154 4358 0.4772] [4441 166 3876 0.5333] [3622 178 4683 0.4375] [4334 110 4039 0.5174] [3486 129 4868 0.4185] [3292 142 5049 0.3964] [4357 131 3496 0.5539] [3785 105 4094 0.4806] [3278 81 4625 0.4156] [3919 142 4272 0.4789 0.0036] HPI [3745 550 4188 0.4739] [2884 370 5229 0.3618] [4438 620 3425 0.5597] [4501 482 3500 0.5590] [3570 771 4142 0.4663] [3614 403 4466 0.4498] [4036 536 3911 0.5074] [4087 670 3227 0.5539] [3451 503 4030 0.4637] [3272 404 4308 0.4351] [3760 531 4043 0.4831 0.0040] HDI [4743 214 3526 0.5717] [4254 204 4025 0.5135] [4383 174 3926 0.5269] [3400 115 4968 0.4076] [4431 145 3907 0.5309] [3557 55 4871 0.4226] [3187 207 5089 0.3879] [4238 163 3583 0.5410] [3738 122 4124 0.4758] [3286 83 4615 0.4168] [3922 148 4263 0.4795 0.0043] LHN-I [1601 89 6793 0.1940] [2083 82 6318 0.2504] [1980 103 6400 0.2395] [1557 121 6805 0.1907] [1943 89 6451 0.2343] [1368 61 7054 0.1649] [1324 95 7064 0.1617] [1908 139 5937 0.2477] [1548 68 6368 0.1981] [1133 31 6820 0.1439] [1645 88 6601 0.2025 0.0015] AA [6855 5 1623 0.8084] [5589 40 2854 0.6612] [6478 247 1758 0.7782] [5896 153 2434 0.7041] [6491 31 1961 0.7670] [6222 52 2209 0.7365] [6238 81 2164 0.7401] [5986 98 1900 0.7559] [5499 112 2373 0.6958] [5130 100 2754 0.6488] [6038 92 2203 0.7296 0.0026] RA [6992 5 1486 0.8245] [5643 40 2800 0.6676] [6676 247 1560 0.8015] [6001 153 2329 0.7164] [6482 31 1970 0.7659] [6241 52 2190 0.7388] [6243 81 2159 0.7407] [6041 98 1845 0.7628] [5528 112 2344 0.6994] [5220 100 2664 0.6601] [6107 92 2135 0.7378 0.0029]\nn-dimensional OWA operator is a mapping F : Rn !", "- Hub promoted index (HPI) (Ravasz et al., 2002) is said to assign\na higher score for link connecting to the nodes with high degrees (Zhao et al., 2012; Zhou et al., 2009) and defined as\nsHPIxy \u00bc C x\u00f0 \u00de \\ C y\u00f0 \u00dek k min kx; ky 2 0; Vk k 2\u00bd : \u00f05\u00de\n- Hub depressed index (HDI) (L\u00fc & Zhou, 2011; Zhou et al., 2009)\nis opposite to HPI and assigns a lower score for link connecting to the nodes with high degrees.", "\u2026the identification of local/global patterns, location of social units, and modeling of dynamic network, etc., where the link prediction (Hasan & Zaki, 2011; L\u00fc & Zhou, 2011) as a branch of network pattern recognition is the most fundamental and essential problem for the social network analysis.", "Let snCNxy ; snSaltonxy ; snJaccardxy ; snS\u00f8rensenxy ; sn HPI xy ; sn HDI xy ; sn LHN I xy ; sn AA xy and sn RA xy be the\nnormalizations of sCNxy ; s Salton xy ; s Jaccard xy ; sS\u00f8rensenxy ; s HPI xy ; s HDI xy ; s LHN I xy ; s AA xy and sRAxy .", "The definition of HDI is\nsHDIxy \u00bc C x\u00f0 \u00de \\ C y\u00f0 \u00dek k\nmax kx;ky 2 0; Vk k 2\u00bd : \u00f06\u00de\nNow, we give some different understandings to the roles of HPI and HDI by analyzing the subgraphs in Figs.", "Fold 1 Fold 2 Fold 3 Fold 4 Fold 5 Fold 6 Fold 7 Fold 8 Fold 9 Fold 10 Average\nCN [3129 1018 1577 0.6356] [2733 1155 1836 0.5784] [3449 862 1413 0.6778] [4151 656 917 0.7825] [4229 629 866 0.7938] [3351 921 1452 0.6659] [3184 990 1550 0.6427] [3763 779 1182 0.7255] [3067 827 1353 0.6633] [2397 1078 1772 0.5596] [3345 892 1392 0.6725 0.0060] Salton [2626 346 2752 0.4890] [2217 513 2994 0.4321] [2959 509 2256 0.5614] [3586 199 1939 0.6439] [4096 17 1611 0.7171] [2718 548 2458 0.5227] [2856 381 2487 0.5322] [3511 368 1845 0.6455] [2550 525 2172 0.5360] [2088 693 2466 0.4640] [2921 410 2298 0.5544 0.0080] Jaccard [2694 356 2674 0.5017] [2299 577 2848 0.4520] [2988 520 2216 0.5674] [3737 255 1732 0.6751] [4179 53 1492 0.7347] [2761 557 2406 0.5310] [2997 438 2289 0.5618] [3532 400 1792 0.6520] [2552 560 2135 0.5397] [2057 728 2462 0.4614] [2980 444 2205 0.5677 0.0086] S\u00f8rensen [2694 356 2674 0.5017] [2299 577 2848 0.4520] [2988 520 2216 0.5674] [3737 255 1732 0.6751] [4179 53 1492 0.7347] [2761 557 2406 0.5310] [2997 438 2289 0.5618] [3532 400 1792 0.6520] [2552 560 2135 0.5397] [2057 728 2462 0.4614] [2980 444 2205 0.5677 0.0086] HPI [2586 657 2481 0.5092] [2181 739 2804 0.4456] [2803 571 2350 0.5396] [3182 468 2074 0.5968] [3537 351 1836 0.6486] [2528 815 2381 0.5128] [2703 682 2339 0.5318] [3238 571 1915 0.6156] [2477 736 2034 0.5422] [2150 937 2160 0.4990] [2739 653 2237 0.5441 0.0037] HDI [2624 391 2709 0.4926] [2345 606 2773 0.4626] [2887 556 2281 0.5529] [3765 322 1637 0.6859] [4187 123 1414 0.7422] [2768 643 2313 0.5397] [2969 529 2226 0.5649] [3492 469 1763 0.6510] [2517 539 2191 0.5311] [1975 723 2549 0.4453] [2953 490 2186 0.5668 0.0095] LHN-I [1937 361 3426 0.3699] [1768 527 3429 0.3549] [1853 523 3348 0.3694] [2661 242 2821 0.4860] [3305 80 2339 0.5844] [1847 546 3331 0.3704] [2221 408 3095 0.4237] [2627 396 2701 0.4935] [1703 523 3021 0.3744] [1606 721 2920 0.3748] [2153 433 3043 0.4201 0.0059] AA [3359 402 1963 0.6219] [3182 522 2020 0.6015] [3555 573 1596 0.6711] [4344 248 1132 0.7806] [4507 81 1136 0.7945] [3664 517 1543 0.6853] [3543 393 1788 0.6533] [3951 366 1407 0.7222] [3287 515 1445 0.6755] [2596 729 1922 0.5642] [3599 435 1595 0.6770 0.0054] RA [3224 402 2098 0.5984] [3218 522 1984 0.6078] [3538 573 1613 0.6682] [4254 248 1222 0.7648] [4425 81 1218 0.7801] [3706 518 1500 0.6927] [3510 393 1821 0.6475] [3870 367 1487 0.7082] [3303 516 1428 0.6787] [2594 729 1924 0.5638] [3564 435 1630 0.6710 0.0049]\nNote: The quadruple denotes [n1 n2 n3 AUC].", "\u2026network attempts to estimate the existence likelihood sxy of a link between two nodes x and y in\na score for the non-existent link in social network (L\u00fc, Jin, & Zhou, 2009; L\u00fc & Zhou, 2011; Zhou, L\u00fc, & Zhang, 2009), where the score quantifies the existence likelihood of this non-existent link.", "\u2026nodes with high degrees (Zhao et al., 2012; Zhou et al., 2009) and defined as\nsHPIxy \u00bc C x\u00f0 \u00de \\ C y\u00f0 \u00dek k min kx; ky 2 0; Vk k 2\u00bd : \u00f05\u00de\n- Hub depressed index (HDI) (L\u00fc & Zhou, 2011; Zhou et al., 2009)\nis opposite to HPI and assigns a lower score for link connecting to the nodes with high degrees.", "(25) and (28), we can find that the normalized link prediction algorithm based on local information entitled the number of common neighbors of nodes x and y (snCNxy ) can obtain a higher probability value in comparison with other link prediction algorithms based on the other two kinds of local information, i.e., the degrees of nodes x and y (snHPIxy ; sn Salton xy ; sn S\u00f8rensen xy ; sn HDI xy ; sn Jaccard xy and snLHN Ixy ) and the degrees of common neighbors of nodes x and y (snAAxy and sn RA xy ).", "By observing these results, we can find that HPI and HDI are all inclined to assign a low score for the link adjacent to the nodes with high degrees."]} +{"33795533|4395259": ["These encryption methods rely on assumptions that the physical layer can provide a reliable link as well as eavesdroppers cannot crack the secret key [3], [4].", "Among these existing methods, cooperative jamming in wireless secure communication was drawn considerable attention [3], [12]\u2013[16].", "As a supplemental technology, PLS aims to stop eavesdroppers from correctly receiving any private signal [3], [5]."]} +{"13179477|13178381": ["We consider the practical case with no instantaneous channel state information (CSI) of the eavesdropper, and use the secrecy outage probability as performance metric [10]."]} +{"15309519|207372751": []} +{"19935558|2294541": ["[20], is perhaps the most straightforward attack to reputation systems."]} +{"206397679|1599458": []} +{"22347729|3330461": ["Thus, it is not surprising that contact probing is rather energy-consuming, which is substantiated by experimental results [15], [16].", "In addition, the devices communicate under outband D2D mode to avoid interference with a cellular network [16], [17]."]} +{"22347729|7644489": ["and alleviated congestion [10], [12].", "[10], [13].", "by first responders [10]."]} +{"22347729|17325804": ["Compared with the location-based discovery [14], the devices do not frequently communicate with BSs and avoid inefficient use of radio resources."]} +{"14128123|1230643": []} +{"40946210|15438029": ["For example, with the help of tie strength, centrality, and similarity which are introduced in [16], effective routing algorithms can also be proposed.", "There are two types of selfishness, individual and social selfishness [16].", "The performance of most existing social aware routing protocols depends on stable and accurate social characteristics [16].", "\u2022 Centrality: In human society people possess heterogeneous popularity [16].", "to share contents with others and can spend credit to access contents from other users; c) Tit-for-TAT : this idea is based on providing and caching equal amount of contents for each other; d) social-trust based : users place and share contents among friends while not for others [16], [18]."]} +{"40946210|3330461": ["Due to the limited duration of each D2D link and stringent battery budget, throughput for D2D links and energy efficiency for users should be considered to ensure successful content transmission and power saving [19]."]} +{"40946210|8909218": ["Building ultra dense network with the concept of small cell is widely accepted as a key to address the explosive data volume [4], [5]."]} diff --git a/edge/graph_53279470.jsonl b/edge/graph_53279470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c9fab973ac2d3e09504d49eeb3ef0c0023338be --- /dev/null +++ b/edge/graph_53279470.jsonl @@ -0,0 +1,2 @@ +{"153507217|6415369": ["Drawing on the research using the design structure matrix (Browning, 2001; Mac Cormack and Rusnak, 2006), product structure diagrams with fewer connections e."]} +{"153756034|17120461": ["For a detailed reference on critical success factors for ERP implementations, refer to Moon\u2019s article (Moon 2007)."]} diff --git a/edge/graph_53280180.jsonl b/edge/graph_53280180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4b64a00ea39150b4ea3b629ee78ed5b4cbfccf78 --- /dev/null +++ b/edge/graph_53280180.jsonl @@ -0,0 +1,22 @@ +{"14585844|11139156": ["Confirming the findings of the previous works [22][12], the existing research in the area is exploratory in nature and mostly reports the cases in which some challenges were faced and some strategies were applied."]} +{"4378525|32856349": ["Costa et al. [8] have identi\ufb01ed models and tools for supporting the GSD through a systematic literature review and found that since 2000 the number of studies on GSD has signi\ufb01cantly increased."]} +{"4378525|11139156": ["Hossain et al. [14] have conducted a systematic literature review that reports the use of Scrum practices in GSD projects.", "However, like other researchers of SLR this is not a systematic omission [14]."]} +{"5708169|15022665": ["Gandomani et al. (2013) conducted a systematic literature review on the relationship between agile methods and open source software development.", "\u2026issues (Hasnain, 2010) in agile methods and ways to resolve them (Silva da Silva, Martin, Maurer, & Silveira, 2011); agile methods in GSD (Hossain, Babar, & Paik, 2009; Jalali & Wohlin, 2011; Rizvi, 2013), and in open source software development (Gandomani, Zulzalil, Ghani, & Sultan, 2013)."]} +{"5708169|6520684": ["Barlow et al. (2011) examined the effect of the usage of agile development practices in large organisations."]} +{"5708169|11139156": ["Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007. The review revealed that agile RE practices had only been discussed in the literature from the overall perspective of agile methods and not in the context of any particular methods such as Scrum, test-driven development, etc. Hasnain\u2019s findings suggest that more empirical results are required on agile methods, in particular XP (Extreme Programming) (Beck, 1999) and Scrum (Schwaber & Beedle, 2001), in order to discuss the details from the practitioner\u2019s point of view. Silva da Silva et al. (2011) conducted a systematic literature review on the topic of the integration of agile methods and usercentred design approaches. The review focused on usability issues in agile methods with respect to design. The findings show that usability issues in agile methods can be addressed by incorporating a user centred design specialist (UCDS) role in agile teams. The authors also defined practices to resolve usability issues in agile methods such as Little Design Up Front, Big Design Up Front, low fidelity prototypes, user testing, interaction models, and close collaboration. Barlow et al. (2011) examined the effect of the usage of agile development practices in large organisations.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007. The review revealed that agile RE practices had only been discussed in the literature from the overall perspective of agile methods and not in the context of any particular methods such as Scrum, test-driven development, etc. Hasnain\u2019s findings suggest that more empirical results are required on agile methods, in particular XP (Extreme Programming) (Beck, 1999) and Scrum (Schwaber & Beedle, 2001), in order to discuss the details from the practitioner\u2019s point of view. Silva da Silva et al. (2011) conducted a systematic literature review on the topic of the integration of agile methods and usercentred design approaches.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007.", "Hossain et al. (2009) conducted a systematic literature review to focus on the practices used in the GSD projects using Scrum methods, the challenges that restrict the use of Scrum methodology and the solution to prevent them. The findings help researchers and practitioners to understand the challenges involved in using Scrum for GSD projects and the strategies available to deal with them. Hasnain (2010) conducted a systematic literature review to identify the agile practices as well as the human and technical factors pointed out in agile studies, published within 2003\u20132007. The review revealed that agile RE practices had only been discussed in the literature from the overall perspective of agile methods and not in the context of any particular methods such as Scrum, test-driven development, etc. Hasnain\u2019s findings suggest that more empirical results are required on agile methods, in particular XP (Extreme Programming) (Beck, 1999) and Scrum (Schwaber & Beedle, 2001), in order to discuss the details from the practitioner\u2019s point of view. Silva da Silva et al. (2011) conducted a systematic literature review on the topic of the integration of agile methods and usercentred design approaches. The review focused on usability issues in agile methods with respect to design. The findings show that usability issues in agile methods can be addressed by incorporating a user centred design specialist (UCDS) role in agile teams. The authors also defined practices to resolve usability issues in agile methods such as Little Design Up Front, Big Design Up Front, low fidelity prototypes, user testing, interaction models, and close collaboration. Barlow et al. (2011) examined the effect of the usage of agile development practices in large organisations. The literature review contributed towards the formulation of a framework that provides guidelines to large organisations adopting agile methods. The findings of this review assist the practitioners to adopt software development methods in their organisations. Jalali and Wohlin (2011) conducted a systematic literature review on studies comprising the combination of agile methods with global software engineering from 1999 to 2009."]} +{"10359697|11139156": []} +{"10359697|15412731": []} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"45579747|627405": ["To perform our mapping study, we used a well-known methodology for systematic literature reviews (Bereton et al., 2007; Petticrew and Roberts, 2006).", "Mapping study methodology\nTo perform our mapping study, we used a well-known methodology for systematic literature reviews (Bereton et al., 2007; Petticrew and Roberts, 2006).", "In line with (Bereton et al., 2007), the search process was handled by one of the three authors."]} +{"111344238|11139156": ["For this purpose a data extraction form will be develop (Hossain et al ., 2009; Smite et al ., 2010)."]} +{"1094963|627405": ["Eight digital libraries were selected based on experiences shared by other groups [9,20,23,24] and on the subject under review."]} +{"15641792|16907530": ["The same argument is shared by Kotlarsky and Oshri (Kotlarsky and Oshri, 2005) and Nurdiani et al. (Nurdiani et al, 2011)."]} +{"15641792|11139156": ["Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge exchange is found to be one of the critical success factors for o \u21b5 shore software development by Khan et al. (Khan et al, 2009).", "Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge\u2026"]} +{"5683970|6520684": ["Our literature review revealed that in the area of agile RE, relatively few empirical studies address the project realities of large and distributed projects (Barlow et al., 2011; Sarker and Sarker, 2009).", "We also looked at the papers included in the 2010 and 2011 systematic literature reviews that dealt with agile topics in global software engineering (Jalali and Wohlin, 2010), in distributed software development (Prikladnicki and Audy, 2010) and in large projects in general (Barlow et al., 2011).", "A CMM-5 organization cannot really make allowances for alternatives (Barlow et al., 2011).", "This in turn, forces the organizations to adopt standardization and planning as a less expensive form of coordination (Barlow et al., 2011).", "The fact that not much has been published beyond the four highvisibility research papers (Barlow et al., 2011; Sarker and Sarker, 2009; Hanssen et al., 2011; Prikladnicki and Audy, 2010) and anecdotal evidence, motivated us to provide insight into actual agile RE in the large."]} +{"46923508|9530487": []} +{"15628238|17137472": []} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"2354553|16907530": []} +{"2354553|1750279": []} +{"2354553|32856349": []} +{"2354553|11139156": []} diff --git a/edge/graph_53280367.jsonl b/edge/graph_53280367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7a7c49133d014b7d78c62ff045fc78b0f04eb4c --- /dev/null +++ b/edge/graph_53280367.jsonl @@ -0,0 +1,3 @@ +{"28042904|14866098": ["PCA is a technique for dimensionality reduction of data sets, which is widely used in the processing of neuronal activity [35, 36]."]} +{"28042904|10290908": []} +{"21229533|10290908": []} diff --git a/edge/graph_53280687.jsonl b/edge/graph_53280687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..819bdc5ffb51918b3ad6b2bdb71945c6482b127f --- /dev/null +++ b/edge/graph_53280687.jsonl @@ -0,0 +1,15 @@ +{"2126111|3330313": ["For this reason, outlier detection has been studied thoroughly in statistics, machine learning, and data mining communities for decades [7]."]} +{"44088254|1676762": []} +{"51936274|53280687": ["\u2022 Observed probabilistic gap \u2206 \u02dc P ( X ) has the same ordering of probabilistic gap \u2206 P ( X ) ; i.e., for any X 1 and X 2 , we have that The proof is given by [4]."]} +{"18015396|987239": ["The interested reader can refer to [ Tangelder and Veltkamp, 2008] for a survey.", "The interested reader can refer to [Tangelder and Veltkamp, 2008] for a survey."]} +{"10370934|36784649": ["Consequently, a lot of research has focused on developing one-class classification (OCC) methods (Khan and Madden 2009) that directly learn using examples from only one class", "Consequently, a lot of research has focused on developing one-class classification (OCC) methods (Khan and Madden 2009) that directly learn using examples from only one class\nCopyright c\u00a9 2014, Association for the Advancement of Artificial Intelligence (www.aaai.org)."]} +{"52180339|53280687": ["7 Related Work PU learning is an active area and for a broad overview see [2]."]} +{"11218910|1097238": ["varies greatly between small resamples as shown by the CIs. essential problem in combining classiers is growing a suitably diverse ensemble of base classiers" which can be done in various ways [12]. In bagging, the ensemble models use majority voting to aggregate decisions of base models which are trained on bootstrap resamples of the training set. From a Bayesian point of view, bagging can be "]} +{"10324936|7704963": []} +{"10108738|534755": []} +{"11944146|7704963": ["Current algorithms for PU learning are all dedicated to handle certain data [2, 3, 11, 12, 13, 14, 26]."]} +{"6054025|3241708": ["In addition, since collecting reliable labels is a time consuming and costly task, there is an increasing interest in using cheap, easy-to-get labels from nonexpert using frameworks like e.g. the Amazon Mechanical Turk 1 [49]\u2013[52]."]} +{"6054025|191396": ["First, a clustering of the instances [258] is performed using an unsupervised algorithm."]} +{"6054025|3330313": ["Similar to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38], several methods in label noise cleansing are based on ad hoc measures.", "Dealing with label noise is closely related to outlier detection [30]\u2013[33] and anomaly detection [34]\u2013[38]."]} +{"15814355|36784649": ["In such imbalanced data set scenarios, several other performance metrics can also be useful, such as f-score, geometric mean, etc. (Nguyen et al., 2009).", "Khan and Madden (2009) present a short survey of the recent trends in the field of OCC, wherein they present a taxonomy for the study of OCC methods.", "This publication is an extension of the work of Khan and Madden (2009), and is more comprehensive, in-depth and detailed."]} +{"10921257|8601873": ["In order to exploit the information from concept instances more effectively, numerous new assumptions have been proposed for MIL [15]."]} diff --git a/edge/graph_53286437.jsonl b/edge/graph_53286437.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7420deda2401db4ecec38986d1624d1ee19a6ed0 --- /dev/null +++ b/edge/graph_53286437.jsonl @@ -0,0 +1,7 @@ +{"4929233|12547296": []} +{"4270461|3110415": ["They are two standard and widely used measures in many object detection works [23].", "A recent review on object detection in remote sensing images can be found in [23]."]} +{"23267374|6198785": ["Complementary to our survey, Zhu et al. (2017) provide an overview of environment perception for intelligent vehicles, focusing on lane detection, traffic sign/light recognition as well as vehicle tracking."]} +{"23267374|1877246": ["There is a variety of methods for dealing with this problem such as voxel hashing (Nie\u00dfner et al. (2013)) or a data adaptive discretization of the space in the form of a Delaunay triangulation (Labatut et al.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for urban reconstruction.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-\nmantics, facades and images, and finally blocks and cities."]} +{"23267374|206764452": []} +{"137332757|12547296": ["A turbidimeter investigates the optical characteristic of the light to be scattered and absorbed rather than transmitted in the straight line [9]."]} +{"101851505|12547296": []} diff --git a/edge/graph_53287311.jsonl b/edge/graph_53287311.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d3e9dcd4e1bc345d8e415b8e582647a61c408f31 --- /dev/null +++ b/edge/graph_53287311.jsonl @@ -0,0 +1,5 @@ +{"37497601|121289": []} +{"21997761|7972041": ["In this V2V Communication architecture each vehicle is manufactured with On Board Unit (OBU), which is capable of sending and receiving the messages among vehicles [40\u201342]."]} +{"21997761|2535224": []} +{"17820026|13372227": []} +{"11676698|1230643": ["In wireless sensor networks, the basic operation is data fusion , whereby data from each sensor is agglomerated to form a single meaningful result [17,44,71,74,76\u201378].", "Several open research issues\u2014includ-ing hardware design, modulation protocols, and strategies to overcome signal propagation ef-fects\u2014are discussed along with various MAC protocols."]} diff --git a/edge/graph_53287480.jsonl b/edge/graph_53287480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..96ccd312c232d01f0b1533ef5c137ce265475392 --- /dev/null +++ b/edge/graph_53287480.jsonl @@ -0,0 +1,5 @@ +{"15962439|5671282": ["Sketches can power a wide range of applications, including enumerating different kinds of frequency statistics of data streams [Cormode and Muthukrishnan, 2005], or approximating the similarity of high dimensional data (e.g., documents and images) [Wang et al., 2014]."]} +{"18457138|9188816": ["These so called alignment-free methods [24] are based on gene sequence word counts and have become increasingly popular since the computationally expensive sequence alignment method is avoided.", "Over the past twenty years, numerous methods utilizing words for gene sequence comparison and classification have been presented [24].", "Words are extracted from individual gene sequences and used for similarity estimations between two or more gene sequences [24]."]} +{"40737517|5671282": ["To solve this problem, similarity-preserving data sketching (hashing) techniques [10] have been intensively studied in stream data processing [11], [12].", "Similarity-preserving sketching [10] has been extensively studied to efficiently approximate the similarity of high dimensional data, such as documents, images and graph [26], [27]."]} +{"2987139|2795037": []} +{"4561453|5671282": ["Actually, hashing has been one of the most effective solutions for approximately nearest neighbor search and similarity search, and in turn contributes to the kernel designs in [49]."]} diff --git a/graph_5328812.jsonl b/edge/graph_5328812.jsonl similarity index 100% rename from graph_5328812.jsonl rename to edge/graph_5328812.jsonl diff --git a/edge/graph_53288891.jsonl b/edge/graph_53288891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28b18f927953c30b316e4f7e26c80162fd7b0f88 --- /dev/null +++ b/edge/graph_53288891.jsonl @@ -0,0 +1,4 @@ +{"17450489|8520489": ["A comprehensive review of visual importance is presented in [16]."]} +{"39241006|8520489": ["Marschner 2012; Hanika et al. 2015] often fail to converge to the desired result in acceptable time [Vorba et al. 2014]. Equalizing Image Error in MLT. Veach and Guibas [1997] use a TF given by the luminance value of the pixel contribution of a full transport path. A well-known problem of this TF is a low number of paths contributing to dim image regions, resulting in their large relative error. Veach [1997] addressed this issue with his two-stage MLT, where a low-resolution image is rendered first and the inverse of the pixel luminance values is then used to rescale the original TF for the actual rendering.", "Zheng and Zheng [2015] additionally modulate the visibility by a quantity representing visual importance [Christensen 2003] so that salient areas receive more photons.", "Marschner 2012; Hanika et al. 2015] often fail to converge to the desired result in acceptable time [Vorba et al. 2014]. Equalizing Image Error in MLT. Veach and Guibas [1997] use a TF given by the luminance value of the pixel contribution of a full transport path. A well-known problem of this TF is a low number of paths contributing to dim image regions, resulting in their large relative error. Veach [1997] addressed this issue with his two-stage MLT, where a low-resolution image is rendered first and the inverse of the pixel luminance values is then used to rescale the original TF for the actual rendering. The idea is that if all pixels receive the same expected number of samples, relative error will be equalized. The results of our derivation in the context of photon tracing are in line with the preceding Veach observation. Hoberock and Hart [2010] pointed out some important deficiencies of two-stage MLT that may deteriorate the image quality compared to plain MLT.", "Marschner 2012; Hanika et al. 2015] often fail to converge to the desired result in acceptable time [Vorba et al. 2014]. Equalizing Image Error in MLT. Veach and Guibas [1997] use a TF given by the luminance value of the pixel contribution of a full transport path."]} +{"18963837|8520489": []} +{"640233|8520489": ["Many rendering algorithms have been developed to exploit visual importance; see Christensen [ Chr03 ] for a survey."]} diff --git a/edge/graph_53291312.jsonl b/edge/graph_53291312.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7af4223113e617fb2a24b25ae9bad1df95e020a --- /dev/null +++ b/edge/graph_53291312.jsonl @@ -0,0 +1,4 @@ +{"88516429|53291312": []} +{"9593520|3766791": []} +{"1251969|423305": []} +{"3766791|393948": ["meaning that a mapping from raw input data to corresponding outputs is learned, automatically discovering the representations needed for feature detection in a process called representation learning (Bengio et al., 2013). Besides deep learning, an interesting area where AD can be applied to computer vision problems is inverse graphics (Horn, 1977; Hinton and Ghahramani, 1997)\u2014or analysis-bysynthesis (Yildirim et al.,"]} diff --git a/edge/graph_53294084.jsonl b/edge/graph_53294084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b577c6679cbf6a2a8876b09b6807b3f79857296 --- /dev/null +++ b/edge/graph_53294084.jsonl @@ -0,0 +1,51 @@ +{"12169149|17787193": []} +{"34234905|6909107": []} +{"34234905|10299098": ["Since then, MEC has attracted a lot of attention from academic areas [8], [9]."]} +{"91180614|3457064": ["2 k the number of surrogate nodes available 0 to 5 P0 The computation capacity of the client node 5 MIPS Pi, i = 1\u2192 k the computation capability of node i U([5, 10, 15, 20]) MIPS Bi, i = 1\u2192 k the bandwidth of the link between nodes i and 0 U([2, 4, 6, 8, 10]) data units per second MB/s Li, i = 1\u2192 k the round-trip latency between nodes 0 and i U([0."]} +{"91180614|206578365": ["In recent years, with the rapid development of mobile computing and wireless communications, mobile edge computing (MEC) was proposed to provide cloud-like services at the edge of the mobile network in close proximity to mobile users [5,6].", "2 k the number of surrogate nodes available 0 to 5 P0 The computation capacity of the client node 5 MIPS Pi, i = 1\u2192 k the computation capability of node i U([5, 10, 15, 20]) MIPS Bi, i = 1\u2192 k the bandwidth of the link between nodes i and 0 U([2, 4, 6, 8, 10]) data units per second MB/s Li, i = 1\u2192 k the round-trip latency between nodes 0 and i U([0."]} +{"4105704|10299098": ["task offloading models [17]: binary offloading [18], [19] and partial offloading [20]\u2013[22]."]} +{"3450996|17787193": ["According to the initiator diversity of the data of\ufb02oad-ing, we classify the data of\ufb02oading techniques into four categories, i.e., data of\ufb02oading through small cell networks (SCNs), WiFi networks, opportunistic mobile networks or heterogeneous networks (HetNets), respectively [4]."]} +{"4625285|3119314": []} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"3965097|3450996": []} +{"27060711|10693567": []} +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"25435563|10299098": ["Recently, several works have focused on exploiting the benefits of computation offloading in MEC network [18]."]} +{"25435563|206578365": ["Recently, several works have focused on exploiting the benefits of computation offloading in MEC network [24]."]} +{"3413458|11608263": ["Multi-label linear classifier (a \u201cshallow\u201d learning)based offloading scheme [18] by removing all the hidden layers of our deep model.", "We formulate the fine-grained offloading problem as a multi-label classification [18] framework."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"43746540|3042864": []} +{"757664|2445817": []} +{"34707759|61132": ["Correspondingly, the performance of both the schemes in Case I is better than that in Case II, due to the fact that the interference will become stronger when the users served by UAV and BSs become closer, no matter which optimization is taken.", "In the proposed scheme, three adjacent cells were considered, and the trajectory was optimized to maximize the sum rate of edge users by avoiding the interference between BSs and UAV, with the rate requirements of all the mobile users satisfied.", "However, the traditional cellular networks are deployed typically with static base stations (BSs), which have several challenges.", "Assume that there is no interference between the users served by different BSs, due to the long distance.", "Nevertheless, no ground BSs were considered in [18], but the interference between BSs and UAV will affect the QoS of mobile users severely, which should be properly avoided by optimizing the UAV trajectory.", "The average rate of the kth edge user served by the UAV over N time slots can be expressed as\nR[k] = 1\nN N\u2211 n=1 \u03b1k[n] log2 ( 1 + puhuk I [k] u + \u03c32 ) ,\u2200k \u2208 K, (8)\nwhere\nI [k]u = 3\u2211\nm=1\nP\u03c10\n\u2225Gm\u2212Wk\u22252 (\u2211 i\u2208Im \u2223\u2223\u2223h[k]muv[i]m\u2223\u2223\u22232 )\n(9)\nis the interference to the kth edge user served by UAV from the BSs. h[k]mu accounts for small-scale channel fading from the mth BS to the kth edge user served by the UAV.", "Consider a cellular network with three adjacent BSs1 and a single UAV jointly serving the ground users, as shown in Fig.", "As a result, there has been growing interest in hybrid cellular networks assisted by unmanned aerial vehicle (UAV) as mobile BSs [3], due to their mobility and flexibility.", "Moreover, edge users often suffer from poor quality of service (QoS) due to long distances from BSs.", "First, the pressure on BSs is becoming more and more serious with increasing data traffic.", "Motivated by this, in this paper, we study a hybrid cellular network with UAV-aided offloading at the edges of multiple cells, by accounting for the interference between ground BSs and UAV.", "UAVs can not only help ground BSs to offload data traffic, but also enhance the channel conditions of edge users by flying close to them to provide line-of-sight (LOS) links [4].", "Finally,\n2\nsimulation results are presented to show the effectiveness of the proposed UAV trajectory scheme with the existence of multiple BSs.\nNotation: Italic letter a or A denotes that it is a scalar, and bold-face lower-case letter a and bold-face upper-case letter A denote a vector and a matrix, respectively. aT represents its transpose and \u2225a\u2225 denotes its Euclidean norm."]} +{"21685661|3119314": ["[27] also mathematically approved that its VM live migration system with a linear regression approach from cloud to near fog structure also has been discussed in previous section (see Figure 5).", "[27, 85] to diverse and circulate designed systems.", "[27, 92], respectively, referred to fog computing as a substitute of cloud that can deliver location and requirement based services at mobile devices or end users (e.", "One of migration approaches is VM live migration, in which VM processes migrate from one physical node to another physical node [27].", "It becomes very important in many use cases such as VM migrations, resource allocation, programmable interfaces, application aware control, and traffic monitoring [27].", "However, a theoretical smart live migration approach is offered for VM migration [27]."]} +{"21685661|3767252": ["A common uniqueness associated with fog computing is its hierarchical parallel processing operations at the edge of the core network [22, 23].", "A security model [22] also has been presented with reviewing possibility and nature of attacks.", "Until that time, Denial of Service (DoS) and rogue gateway attacks were known as possible attacks on network transmission, while service data centers can expose to whole privilege escalation, physical damage, privacy leakages, and interruptions for QoS manipulation that has been identified as probable threats belonging to security [22]."]} +{"67257831|10693567": ["All the control functions are extracted from OpenFlow switches and centralized in the OpenFlow controller, which controls all the OpenFlow switches based on the OpenFlow protocol [18]."]} +{"14910649|10299098": ["Therefore, it can be accessed by the mobile devices through wireless channels, and will execute the computation tasks on behalf of the mobile devices [5], [6], [12].", "Mobile-edge computing (MEC) is such a promising technology to release the tension between the computation-intensive applications and the resource-limited mobile devices [3]\u2013[5]."]} +{"14910649|206578365": []} +{"29205531|9959859": ["14 In the paper of Liu et al, 15 a survey of MCC from the perspective of its intended usages was presented."]} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"44159211|205430214": ["[18] However, solutions obtained by the evolutionary algorithms are easy to fall into local optimum."]} +{"13410477|3042864": []} +{"21557419|3119314": ["[8] together with security and privacy issues and available services and resources."]} +{"26801650|18388986": ["Following many studies on data fusion [39], [40], [41], we introduce an approach on how to mix QoS data and edge server data in this section."]} +{"21951229|206578365": []} +{"19143541|12815020": ["Fortunately, Intrusion Detection Systems (IDS) can also be applied in fog environment [11].", "However, Intrusion Detection Systems (IDS) can be used for fog environment [11]."]} +{"3824458|6909107": ["The Mobile Edge Computing (MEC) concept [8] is essentially bringing the computing and storage capability from remote data centers to the mobile edge in order to reduce the network delay between end devices and computing resources."]} +{"3824458|17962754": ["One of the most common Access Control (AC) models that has been applied in the IoT system is the AC list [34], [35], where access rights/policies are listed in IoT devices."]} +{"11157468|10299098": []} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"2172141|10299098": ["In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless access points (APs) and base stations (BSs) [3], [4].", "By applying dynamic voltage and frequency scaling techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where (3)Note that to avoid the issue of dividing by zero, we define \u03b2( li ti ) = 0 when either li = 0 or ti = 0 holds.", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} +{"2172141|206578365": ["To resolve this issue, mobile-edge computing (MEC) has emerged as a promising technique by providing cloud-like computing at the edge of mobile networks via integrated MEC servers at wireless APs and base stations (BSs) [3], [4].", "In general, the computation offloading can be implemented in two ways, namely binary and partial offloading [3].", "By applying dynamic voltage and frequency scaling (DVFS) techniques [3], [4], user i can control the energy consumption for local task execution by adjusting the CPU frequency fi,n for each cycle n, where fi,n \u2208 (0, f max i ], n \u2208 {1, .", "The MEC technique facilitates the real-time implementation of computation-extensive tasks at massive low-power devices, and thus has attracted growing research interests in both academia and industry [3]\u2013[7]."]} diff --git a/edge/graph_53296658.jsonl b/edge/graph_53296658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..453706e27edcbfadbadaa071ec4a840039ba683e --- /dev/null +++ b/edge/graph_53296658.jsonl @@ -0,0 +1,3 @@ +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} +{"49320819|207743293": ["While these are important factors to consider, a sentence can be true or false regardless of whether it is a rumor (Zubiaga et al., 2018)."]} diff --git a/edge/graph_53302358.jsonl b/edge/graph_53302358.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..260dc296ed2af9690bef0c9835a5e3095c25d75a --- /dev/null +++ b/edge/graph_53302358.jsonl @@ -0,0 +1,16 @@ +{"2004416|3420321": []} +{"4641273|3908281": []} +{"4641273|2088679": ["Deep learning has been used to classify lesions and nodules; localize organs, regions, landmarks and lesions; segment organs, organ substructures and lesions; retrieve images based on content; generate and enhance images; and combine images with clinical reports [40,41]."]} +{"4641273|3953553": []} +{"4641273|13370607": []} +{"31460578|3420321": [", [200], [201], [202], and notably [47]).", "In practice, seeds often find their use in short-read mapping in mappers based on the seed-and-extend paradigm (for more details on read mapping, see for example [200])."]} +{"31460578|206051485": [", for image registration [390] (image registration can be viewed as a certain analogy of read mapping)."]} +{"31460578|9188816": []} +{"867063|3420321": []} +{"47390966|3420321": ["\u2026(for example, Fasta [21], BLAST (Basic Local Alignment Search Tool) [22], BLAT (BLAST-like Alignment Tool) [23], MAQ [24], and Novoa-lign [25]) or suffix arrays with the Burrows-Wheeler transform (for example, STAR (Spliced Transcripts Alignment to a Reference) [26], BWA (Burrows-Wheeler\u2026", "BWA and Bowtie further optimize by only searching for exact matches to a seed [25].", "As long-read technologies continue to improve, there will be an ever greater need to develop new algorithms capable of delivering speed improvements similar to those obtained for short-read alignment [25].", "There are many other factors, such as accuracy and sensitivity, which are not discussed here, but which are covered elsewhere [25]."]} +{"196067734|3420321": ["Most successful approaches use k-mer-based or Burrows\u2013Wheelertransform-based indexes, as reviewed in [124]."]} +{"196067734|551238": ["Computational tasks related to understanding gene regulation therefore include detecting a given motif or to find all its occurrences in certain genomic context, or in a discovery mode, to extract or infer such over-represented motifs from positive and negative examples; refer to [116, 29] for reviews."]} +{"205420407|3420321": []} +{"196620014|9188816": ["Similar \u2018alignment-free\u2019 methods have a long history in bioinformatics [12, 13]."]} +{"14042132|3420321": ["Mapping reads generated by high-throughput DNA sequencers to reference genomes is a fundamental and widely studied problem [16, 24]."]} +{"3940850|3420321": ["This motivation resulted in a very large number of read mapping algorithms and associated software programs, we refer to [13] for a survey."]} diff --git a/edge/graph_53305352.jsonl b/edge/graph_53305352.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53306042.jsonl b/edge/graph_53306042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34c30e71f362659e8cafba607457ccdb46e73bfb --- /dev/null +++ b/edge/graph_53306042.jsonl @@ -0,0 +1,4 @@ +{"9936447|17325804": ["For a review of these techniques, see High-tower and Borriello (2004) and Gezici (2008)."]} +{"3794030|7482876": ["An excellent review of research that attempts to characterize the V2V channel through channel-sounding experiments can be found in [3]."]} +{"129508814|1877246": ["Though 2D/3D building recognition, extraction and reconstruction are among one of the hottest topics, it was intentionally disregarded in this section, since there are numerous literatures that have already covered this area (Brenner, 2005; Dorninger and Pfeifer, 2008; Haala and Kada, 2010; Musialski et al., 2013; Wang, 2013)."]} +{"51615396|763939": ["A survey on mobility models in VSNs is proposed in [13], also providing methodologies for the cooperation between mobility models and network simulators."]} diff --git a/edge/graph_53311410.jsonl b/edge/graph_53311410.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53327636.jsonl b/edge/graph_53327636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..012d842f5d6a46918270ddb34be1afa0458224c7 --- /dev/null +++ b/edge/graph_53327636.jsonl @@ -0,0 +1,4 @@ +{"3706389|7185733": ["Aiming at developing more natural and non-invasive human computer interfaces and recognizing human actions visually, tremendous research efforts have been devoted to visual tracking and analysis of human movements (Gavrila, 1999; Pavlovi\u0107 et al., 1997; Wu and Huang, 2001a)."]} +{"3706389|7788290": ["Aiming at developing more natural and non-invasive human computer interfaces and recognizing human actions visually, tremendous research efforts have been devoted to visual tracking and analysis of human movements (Gavrila, 1999; Pavlovi\u0107 et al., 1997; Wu and Huang, 2001a)."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"8530796|206051485": ["This estimation problem has been well studied, and several excellent surveys [27]\u2013[30], and software implementations (e.g., the Insight toolkit [31]) are available, so we do not detail registration algorithms here."]} diff --git a/edge/graph_53329808.jsonl b/edge/graph_53329808.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e922d81372a5bdb8424c32f1f55db2cee3154f79 --- /dev/null +++ b/edge/graph_53329808.jsonl @@ -0,0 +1,6 @@ +{"49421762|4915696": ["In [18] (table 1, page 7), the authors discuss di\ufb00erent experimental settings used in crowd behaviour modelling techniques."]} +{"16392439|10213552": ["are too heavyweight for graph processing and iterative algorithms [34].", "Machine learning algorithms are iterative in nature [34].", "In this case frameworks like Flink and Spark may be good candidates [34]."]} +{"16392439|14849079": ["Smart city is a broad concept that encompasses economy, governance, mobility, people, environment and living [60]."]} +{"16392439|206743327": ["The work presented in [63] deals with in-memory Big Data management and processing frameworks."]} +{"16392439|3750204": ["Some other works like [49] [14] [13] [37] tried to highlight Big Data fundamentals.", "Extensive surveys have been conducted to discuss Big Data Frameworks [49] [33] [37]."]} +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} diff --git a/edge/graph_53330282.jsonl b/edge/graph_53330282.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5333379.jsonl b/edge/graph_5333379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53340803.jsonl b/edge/graph_53340803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7c12dbb725ecd5d7ca374cca45bd8b6e85b5842 --- /dev/null +++ b/edge/graph_53340803.jsonl @@ -0,0 +1 @@ +{"6218105|191396": []} diff --git a/edge/graph_53362461.jsonl b/edge/graph_53362461.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16d53aead0ebe137f0f6ad41323444f77b28bd3a --- /dev/null +++ b/edge/graph_53362461.jsonl @@ -0,0 +1 @@ +{"15538672|192934": []} diff --git a/edge/graph_53362605.jsonl b/edge/graph_53362605.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5336645.jsonl b/edge/graph_5336645.jsonl similarity index 100% rename from graph_5336645.jsonl rename to edge/graph_5336645.jsonl diff --git a/graph_5338241.jsonl b/edge/graph_5338241.jsonl similarity index 100% rename from graph_5338241.jsonl rename to edge/graph_5338241.jsonl diff --git a/edge/graph_53384754.jsonl b/edge/graph_53384754.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_533943.jsonl b/edge/graph_533943.jsonl similarity index 100% rename from graph_533943.jsonl rename to edge/graph_533943.jsonl diff --git a/edge/graph_53402925.jsonl b/edge/graph_53402925.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c87806b072f7047581e282820840641025f22b63 --- /dev/null +++ b/edge/graph_53402925.jsonl @@ -0,0 +1,3 @@ +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"32505547|13277694": []} +{"32505547|8953108": []} diff --git a/edge/graph_53412184.jsonl b/edge/graph_53412184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62d59b3ce505fb175bcc33a33d97c46cb876f58c --- /dev/null +++ b/edge/graph_53412184.jsonl @@ -0,0 +1,9 @@ +{"207322966|11038925": ["In literatures, most of the clustering algorithms can be roughly classified into two types [5,6]: hard and fuzzy clustering methods."]} +{"123529780|15305793": []} +{"123529780|14415030": []} +{"123529780|14122909": []} +{"3707798|8953108": ["Furthermore, it is easy to be implemented and usually be run fast [3,4]."]} +{"22241340|15305793": []} +{"22241340|14122909": []} +{"10959665|14415030": []} +{"1408812|9153064": []} diff --git a/edge/graph_53422777.jsonl b/edge/graph_53422777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91308335ff9a299cc16ec2348e4de9a6fcc9af2d --- /dev/null +++ b/edge/graph_53422777.jsonl @@ -0,0 +1,8 @@ +{"10919692|17774971": ["[1][2] Multilevel inverters also have interest in the field of high-voltage high-power applications such as laminators, mills, conveyors, compressors, UPS systems."]} +{"55076806|17774971": ["The pi controller processes its available data, compares it with the preset reference value and calculates the deviation from the ideal working condition [14],[15].", "[15] The most desirable topology is a multilevel inverter with only one dc source and no split capacitors but unfortunately this type of inverter has yet to be discovered ."]} +{"39003086|17774971": []} +{"14577499|17774971": []} +{"110811142|17381415": []} +{"206700185|17774971": ["MULTILEVEL voltage-source inverters provide a costeffective solution in the medium-voltage energy management market [1]."]} +{"30722327|12083425": ["This has motivated research and development in multilevel converter technology for grid connection of renewable energy sources [32].", "Several works using CHB connected to the grid have been reported for PV power conversion [32].", "Therefore, multilevel topologies have been proposed, mainly NPC back-to-back configurations [32], [138], [139], such as the one in Fig."]} +{"30722327|17774971": []} diff --git a/edge/graph_5342321.jsonl b/edge/graph_5342321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53433580.jsonl b/edge/graph_53433580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae4cbaaa483533c6b9bed862221fc4deeb7bda15 --- /dev/null +++ b/edge/graph_53433580.jsonl @@ -0,0 +1,23 @@ +{"113924061|24110634": []} +{"113924061|2623404": []} +{"37127196|3330313": []} +{"59873079|365692": ["Decision trees models are commonly used in data mining to examine the data and induce the tree and its rules that will be used to make predictions [26]."]} +{"9772777|1805048": ["To better utilize the correlations in the data for addressing missing data, recently a new family of machine-learning methods has been developed, known as collaborative filtering (CF) [18], [19]."]} +{"3351246|192934": ["In general, a pattern classification system is operated in two modes [5]: training (learning) and classification (testing)."]} +{"365692|14808716": ["It is important to stress that comprehensive surveys on decision trees have been previously published, such as the papers by Safavian and Landgrebe [24], Murthy [25], and Rokach and Maimon [26]."]} +{"24110634|9495329": ["The surveys in [22] and [27] review SDN application in IoT, furthermore Bizanis and Kuipers [28] review the conjunction of SDN and NFV for IoT."]} +{"24110634|6583734": ["Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|11414835": ["The virtualizer ensures that all information collected is collated to form a virtualisation of the network state to the controller [29], [141]."]} +{"24110634|801245": ["WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization."]} +{"24110634|9040432": ["The survey study below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in\u2026"]} +{"24110634|2535224": ["\u2026below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in IoT [22], [27].", "Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|2623404": ["Large networks also become heterogeneous due to the use of different proprietary protocols, which fundamentally means they consist of different network islands that only cooperate at lower levels of communication [13], [33], [36].", "If no match is found, then appropriate rules are actioned, i.e. drop the packet, pass it to the next \ufb02ow table or send it to the controller for new rules to be made [13].", "The LFB has a speci\ufb01c function (such as routing) to process the packets [43], and enables the CE to control the FE [13].", "Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "If they match, appropriate actions are applied and if more than one entry match is found, prioritization, based on the highest degree of match, applies [13], [40].", "The instruction \ufb01eld determines what action should be taken upon a packet match [13].", "Recent research has focused on the development of both the southbound and northbound API standard-isation, with more focus on the southbound API [13].", "They both conform to the principle of decoupling the control and the data plane, but are fundamentally different [13].", "SDN introduces bene\ufb01ts such as vendor independence, heterogeneous network management, reliability and security not possible in traditional networks [12], [13], [16], [34], [35].", "Traditional networks are also mostly hierarchical, tree based and static, which leads to what most have termed \u2018\u2018ossi\ufb01cation\u2019\u2019 [13]."]} +{"24110634|10693567": ["The two most popular southbound interface speci\ufb01ca-tions are Forwarding and Control element separation (ForCes) [38], [39] and OpenFlow [40]\u2013[42]."]} +{"24110634|11735843": ["Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "The issue of virtualisation and cloud computing services has also necessitated a shift from conventional data storage towards SDN-oriented data storage and management [14].", "Another area which is the crux of this paper, is wireless sensor networks [14], [32], [56], [58]."]} +{"24110634|1230643": ["As Akyildiz et al. [8] and Qin et al. [106] allude, there has been less focus on the NB interface, whereas much attention has been dedicated to SB interfaces.", "WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization.", "Radio communication also consumes a huge chunk of power [8], it involves data transmission and reception."]} +{"24110634|10532321": ["The memory management techniques explored in [180] could be investigated from the SDWSN perspective.", "The rules placement problem is expounded with a comprehensive review of different solutions in [180]."]} +{"16522754|6413523": ["of scientific hypotheses from large experimental data sets and from biomedical literature [4, 5]."]} +{"7743521|3102110": ["It is a problem which occurs in many contexts [ 11 , 25], it is also an important problem in software project eort prediction."]} +{"40570214|1230643": []} +{"49421410|14132386": []} +{"49421410|1230643": ["2 In WSNs, sensor nodes can be randomly deployed, in essence allowing opportunities for applications even in inaccessible areas [1]."]} diff --git a/edge/graph_53439628.jsonl b/edge/graph_53439628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53443354.jsonl b/edge/graph_53443354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53455555.jsonl b/edge/graph_53455555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53462302.jsonl b/edge/graph_53462302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..98148af6a2ad2d386ec4738e869994ab35947ea7 --- /dev/null +++ b/edge/graph_53462302.jsonl @@ -0,0 +1,22 @@ +{"6058763|16125167": ["However, dynamic analysis critically hinges on the availability of test cases that can ensure good coverage, i.e., drive program execution through a signi\ufb01cant set of representative program states [36, 37].", "Hence we believe that researchers and practitioners can use A 3 E as a basis for dynamic analyses [36] (e.g., monitoring, pro\ufb01ling, information \ufb02ow tracking), testing, debugging, etc."]} +{"6954542|14022070": ["The most common type of t-way testing is pairwise testing, where t = 2 [33].", "A more practical alternative is t-way combinatorial testing [33], where all combinations for only a subset of GUI widgets (i.e., t ) are considered [20]."]} +{"15304555|1708582": ["We do not have enough samples under the naive method to compare it against the other two under a similar test, but it can be seen from Figure 5 that this method often signi\ufb01cantly underperforms compared to the other two."]} +{"48354726|53462302": ["Automated app testing has been widely adopted for exploring apps at runtime [37]."]} +{"8181915|206977741": ["Our initial informal literature searches found very little evidence on mobile applications testing; this also provided motivation for conducting a rigorous systematic mapping study e.g. (Muccini et al., 2012), (Harrison et al., 2013).", "Another study by (Harrison et al., 2013) conducted a small and informal literature review in the specific area of mobile usability models.", "We also found a wide variety of studies reporting mobile testing tools and methods (e.g. (Looije et al., 2007), (Harrison et al., 2013), (Muccini et al., 2012)), but few that apply a rigorous empirical approach.", "According to (Harrison et al., 2013), in the context of mobile applications, usability is represented in terms of three attributes; effectiveness, efficiency, satisfaction and cognitive load."]} +{"422184|10657013": ["For further study on the similarities between traditional and mobile malware construction (e.g., in terms of features, methods, threats) refer to Felt et al. [2011], Branco et al. [2012], Bayer et al. [2009], and Rudd et al. [2016]."]} +{"422184|18567112": []} +{"422184|6670217": ["Built-in support for background SMS to premium numbers was also found in 45\u201350% [La Polla et al. 2013; Felt et al. 2011] of the samples, and user information harvesting, a top security issue in 2011 [Felt et al. 2011], is still a current issue with 51% of malware samples exhibiting this behavior\u2026", "Studies such as La Polla et al. [2013] and Felt et al. [2011] re\ufb02ected this shift by including emerging OSs such as Android and iOS, and by 2012 Android began to clearly dominate."]} +{"207237250|18567112": []} +{"207237250|11585698": []} +{"10087056|17202214": ["Our work covers all the limitations of [62] and provides much more extensive SLR on the topic.", "However, [62] presents several drawbacks and differences from our paper.", "[62] could be closer to 30 our work, but has several limitations in terms of scope and methodology."]} +{"8446053|17381201": ["Evolutionary algorithms [14,127] have been used to test programs [102]."]} +{"15311673|627405": ["We have discussed previously some of the problems we encountered undertaking this systematic literature review [1].", "In addition, our previous suggestion of using an extractor and a checker [1] is definitely unsound for SLRs where the data extraction process is particularly complex."]} +{"59774259|10398826": ["Reviews and classifications of testing cloud services include solutions for web systems and mobile development [13, 14]."]} +{"49870715|8323376": ["API evolution is an important aspect of software maintenance [24, 25].", "setDuration [12,25] 11 ViewPropertyAnimator.", "setDuration [12,25] 14 ViewPropertyAnimator."]} +{"1983609|7165993": ["It uses a standard, simple-but-e\ufb00ective, default test oracle [22] that regards any input that reveals a crash to be a fault-revealing test sequence."]} +{"19213788|8323376": ["[4] in their recent survey on app store analysis, literature works have tackled seven aspects related to mining Android apps, which are API, Feature, Release, Reviews, Security, Store Ecosystem, and Prediction."]} +{"8323376|18973396": ["[119] argued that app store reviews can be used for \u201ccrowdsourcing\u201d [150]."]} +{"4844372|8323376": []} +{"4835788|6670217": []} +{"7041640|18567112": ["Each of these surveys overview speci\ufb01c domains (e.g., inter-app vulnerabilities [3] or families of Android malware [26], [27]), or certain types of approaches (e.g., techniques relying on dynamic analysis [28], static analysis [29], or machine learning [30] as well as mechanisms targeting the\u2026"]} +{"7041640|627405": ["The \ufb01rst row shows the size of the initial set of papers, selected by keyword-based search over the full paper for each database."]} diff --git a/edge/graph_53466665.jsonl b/edge/graph_53466665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_534755.jsonl b/edge/graph_534755.jsonl similarity index 100% rename from graph_534755.jsonl rename to edge/graph_534755.jsonl diff --git a/edge/graph_53488498.jsonl b/edge/graph_53488498.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e65e142040a7c206670025645510965bd4c4370d --- /dev/null +++ b/edge/graph_53488498.jsonl @@ -0,0 +1,6 @@ +{"16620474|3053192": ["Finally, section VI concludes our work."]} +{"45546611|16467945": ["In general, such hybrid systems have drawn much attention over the recent years since they often significantly outperform the individual \u201cpure\u201d approaches; see e.g. Puchinger and Raidl (2005) for an overview.", "Key words: multidimensional knapsack problem; integer linear programming; heuristics; History: Submitted March 2007."]} +{"45881224|10542845": []} +{"45881224|15929566": []} +{"45881224|1708582": []} +{"7594860|10542845": ["These algorithms build multivariate probabilistic models to describe statistical dependences among variables and use those dependencies as linkage information to sample new solutions and guide the search [9]."]} diff --git a/edge/graph_53492103.jsonl b/edge/graph_53492103.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53511500.jsonl b/edge/graph_53511500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26252fe2e7cfd25badd1b594dc16cb90e267bde6 --- /dev/null +++ b/edge/graph_53511500.jsonl @@ -0,0 +1,3 @@ +{"2744138|12083425": ["This decline has been driven by the following factors: 1) an increasing efficiency of solar cells; 2) manufacturingtechnology improvements; and 3) economies of scale [1]."]} +{"2744138|17774971": []} +{"26822245|12083425": ["multistring structure is a further development of the string structure, where several strings of PV panels are interfaced with their own dc\u2013dc converter and then connected to a common central dc\u2013ac inverter [7], [ 8 ]."]} diff --git a/edge/graph_53531807.jsonl b/edge/graph_53531807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25d13484a36400704ec404da97dd98a8099e591d --- /dev/null +++ b/edge/graph_53531807.jsonl @@ -0,0 +1 @@ +{"7688451|1708582": ["Optimal experimental design is also closely related to problems in optimal control (Movellan, 2005; Todorov, 2006) and reinforcement learning (Kaelbling et al., 1996; Boutilier, Dean, & Hanks, 1999)."]} diff --git a/edge/graph_53542705.jsonl b/edge/graph_53542705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53542757.jsonl b/edge/graph_53542757.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53551604.jsonl b/edge/graph_53551604.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3afad0fd1bfedf4a376d8ac67f21a12b38ed2979 --- /dev/null +++ b/edge/graph_53551604.jsonl @@ -0,0 +1,5 @@ +{"2632820|12060835": ["However, there remains many open research problems in EH-WSNs [2] including the highly variable and often unpredictable energy harvested from the environment as well as the limited transmission range of each node."]} +{"44318973|13295407": ["On the other hand, the ERI-MAC protocol is actually an inheritance of our previous work [10], which originally follows the approach of balancing energy efficiency and other QoS parameters in the MAC protocol design [32, 33]."]} +{"44318973|41998167": ["On the other hand, the ERI-MAC protocol is actually an inheritance of our previous work [10], which originally follows the approach of balancing energy efficiency and other QoS parameters in the MAC protocol design [32, 33]."]} +{"13702877|12060835": []} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} diff --git a/edge/graph_53562613.jsonl b/edge/graph_53562613.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30aa99101ff2c950513919334dd6a4f8f368769c --- /dev/null +++ b/edge/graph_53562613.jsonl @@ -0,0 +1,12 @@ +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} +{"2652383|7023859": []} +{"1498573|365692": ["In other branches of machine learning, using EC to design algorithms has been shown to be very effective as an alternative to hand-crafting them, for instance, for inducing decision-trees 35 ."]} +{"31848510|2204231": ["\u2026the evolutionary process triggered a signi\ufb01cant body of work and added a new dimension not only to ER (Cully et al., 2015; Cully and Mouret, 2015; Doncieux and Mouret, 2014; Mouret and Doncieux, 2012; Mouret and Clune, 2015; Pugh et al., 2015) but to evolutionary computation in general (Goldsby\u2026", "Thus, one important question in ER is to what extent such measures can be made generic and to what extent the amount of human input necessary can be minimized (Doncieux and Mouret, 2014).", "Given the critical importance of how the search is guided (Doncieux and Mouret, 2014), multiobjective approaches are proving to be an effective way to combine behavioral diversity\u2013based search and \ufb01tness-based search because of their ability to automatically direct evolution toward increasing\u2026", "In addition, if the behavior space is vast, novelty search may not scale well (Doncieux and Mouret, 2014)."]} +{"2894203|18357056": ["[120, 121], and geometric maps are described to a greater extent in ref."]} +{"2894203|7360895": []} +{"8996607|175549": ["A significant factor in modern EP is that the representation structure is designed for the specific problem domain, for instance real-valued vectors, graphs, ordered lists and trees may all be used in different domains (Spears et al., 1993)."]} +{"13363604|1452734": []} +{"29281006|1452734": ["2 Shaping A common technique in AI, robot shaping [18, 26, 34, 37, 38, 40, 47], was originally adapted from the concept of scaffolding in developmental psychology (e."]} +{"15416390|1452734": ["This broader area of inquiry includes developmental robotics [108,109], artificial life, and a variety of other non-evolutionary computation-based machine learning specialties applied to fully autonomous systems.", "Developmental robotics [108,109] addresses the problem of environmental-based learning by attempting to endow robotswith environmentally stimulated self-organizing abilities or environmentally stimulated novelty-seeking."]} +{"25777668|18374428": []} +{"25777668|1452734": []} diff --git a/edge/graph_53567611.jsonl b/edge/graph_53567611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46d23595cfb4811a61ba4206d66c4d81b37e16dc --- /dev/null +++ b/edge/graph_53567611.jsonl @@ -0,0 +1,3 @@ +{"205501867|1708582": ["Reinforcement learning (RL) refers to a class of unsupervised algorithms that emphasizes the learning process of an agent based on its interaction with the environment [14,15]."]} +{"229853|873842": ["Zelinsky [15] increases efficiency by using a quad-tree [ 131 to represent free and obstacle space, thus reducing the number of states to search in the planning space."]} +{"63894008|12957829": ["Motivated by this idea, some research such as [11, 16, 17, 24, 33, 34] has been devoted to hybridizing PSO and DE in order to improve the performance of hybrid algorithms."]} diff --git a/edge/graph_53568836.jsonl b/edge/graph_53568836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..505665379f156d8366177d6d6144c6223a82971d --- /dev/null +++ b/edge/graph_53568836.jsonl @@ -0,0 +1,59 @@ +{"1033682|174797842": []} +{"2857532|53680608": []} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"8729004|7788290": ["We will only mention a few of the more recent works on human detection here \u2013 see Gavrilla\u2019s survey [ 7 ] for older references."]} +{"46817082|8034133": []} +{"46817082|7788290": []} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"17181034|14970359": ["Using a less invasive approach free of markers, computer vision research into tracking and recognizing full-body human motion has so far been mainly limited to gait or frontal posing [27]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"52847824|987239": []} +{"3467933|17516538": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"3467933|7185733": ["F R\n+ E\nN G\nVision, Perception and Multimedia Understanding"]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"14178806|7788290": ["Many attempts to do action recognition have therefore involved some kind of 3D modelling of the motion over time [7, 13, 16, 19, 20]."]} +{"1162172|2301292": []} +{"18375490|5755403": []} +{"18375490|16525678": ["Valera 05 Intelligent distributed surveillance [187]"]} +{"18375490|17516538": ["Weiming 04 Motion and tracking for surveillance [59]"]} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"52051015|20905429": ["Activity recognition with wearables has various potential applications in the healthcare domain in the form of medical state monitoring, memory enhancement, medical data access, and emergency communications [4,5]."]} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"6056896|8928686": []} +{"6056896|16013270": ["[14] , are examples of datasets including samples from cameras, while the works by Wang et al."]} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"54878584|1634674": ["[37] and Aggarwal and Ryoo [6] detail the recent human activity research."]} +{"54878584|7788290": ["The earlier reviews by Cedras and Shah [10], Aggarwal and Cai [3] and Gavrila [ 16 ] document the research prior to 2000."]} +{"206592484|456491": []} +{"27637541|1634674": ["[118] distinguish between actions and activities by defining that", "Inside 2D-template-based approaches described in [118], temporal templates are estimated for each action class.", "methods shown in [118]); or based on the extraction of features from each silhouette and model the dynamics of the action explicitly (again, similarly to the aforementioned \u2018holistic\u2019 approaches).", "\u2019s [118] action modelling classification.", "[118], approaches for modelling actions can be categorised into three major classes: nonparametric, volumetric, and parametric time-series approaches (see Fig.", "In volumetric approaches, in contrast, features are not extracted on a frame-by-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case [118]."]} +{"27637541|12127129": []} +{"27637541|17516538": ["[41]; this paper is highly comprehensive, as it starts with motion detection and object classification and tracking, but also deals with HBU; it divides the approaches to this task", "There are handfuls of previous surveys which analyse and describe \u201chuman motion\u201d or \u201chuman behaviour understanding\u201d [41, 88, 43, 87, 121]; earlier works, as is logic, review lower level techniques (e.", "At the motion level, tasks such as movement detection, and background extraction and segmentation are faced [41, 72, 89]."]} +{"27637541|14970359": ["Moeslund et al. [72] defined an action taxonomy which has been adopted in later works and subsequent surveys.", "The work by Moeslund et al. [72], from 2006, can be divided into two major parts: pose and motion capture, and action recognition.", "In the work by Moeslund [71], bigger emphasis is given to the recognition of motion and actions, whereas activities and behaviours are treated to a minor extent.", "Pose estimation techniques are introduced next, and they are classified into three groups as in [71], according to the presence and use of an explicit model: model-free, indirect model use, direct model use.", "An evolution of the works presented under this section of Moeslund\u2019s work, can be seen in the papers by Bandouch, Beetz, et al. [7, 9]; which are commented later on.", "Nevertheless, the techniques revealed in [71] allow a greater understanding of current methods, and thus, both this and [34] can be used to introduce the"]} +{"27637541|7788290": []} +{"52812796|53568836": []} +{"52812796|535786": ["A recent survey [33] of data mining systems using wearable devices reveals that privacy and security-related concerns are arising."]} +{"52812796|1734833": ["A recent review [32] of the latest methods used to analyze data from wearable sensors reveals that the data mining technique is dependent on the mining task to be performed."]} +{"52812796|20905429": []} +{"7757210|14970359": ["We givea brief overview here and refer the reader to [ 13 ] for a more comprehensive survey."]} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} +{"9689275|7788290": ["Interpretation of human actions is a well recognized problem in computer vision [2, 3, 1, 6, 9, 10, 16, 17, 19, 20, 22, 25, 26, 27]."]} +{"10087484|7788290": ["While these approaches have been successful for the recognition of actions from articulated objects such as humans (see [9] for a review), they are not expected to be useful in the case of less articulated objects such as rodents [5]."]} +{"29498806|10355303": []} diff --git a/edge/graph_53569365.jsonl b/edge/graph_53569365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1b96895943422cad5ae68279ecf0498c7d25618 --- /dev/null +++ b/edge/graph_53569365.jsonl @@ -0,0 +1,34 @@ +{"114628552|4395259": []} +{"6645760|1252121": ["Inter-domain routing is strongly affected by business relationships between the involved parties and is an area of active research even in the context of the current Internet architecture [79]."]} +{"52119194|7971188": [", Mobile IP (MIP) [4], peer-to-peer (P2P) networks [5] and content delivery networks (CDNs) [6], which can patch the existing Internet architecture but only superficially bridge the gap between the limited network service capabilities and increasing user needs [1], [7]\u2013[9]."]} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"8438778|2335874": ["\u2026et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility management [Zhu et al. 2011] Beaconing approaches [Ghafoor et al. 2013] Vehicular cloud [Whaiduzzaman et al. 2014] Note : More than 50% of the surveys are on routing protocols and communication\u2026", "\u2026[Al-Sultan et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility management [Zhu et al. 2011] Beaconing approaches [Ghafoor et al. 2013] Vehicular cloud [Whaiduzzaman et al. 2014] Note : More than 50% of the surveys are on routing protocols and communication\u2026"]} +{"8438778|16844049": ["\u2026et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014], [Al-Sultan et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility\u2026", "\u2026[Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014], [Al-Sultan et al. 2014], [Mejri et al. 2014], [Chaqfeh et al. 2014], [Sharef et al. 2014] Mobility\u2026"]} +{"8438778|940632": ["\u2026et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012], [Dhamgaye and Chavhan 2013], [Araniti et al. 2013], [Javadi et al. 2013], [Al-Sultan et al. 2014], [Ajmal et al. 2014], [Mejri\u2026"]} +{"8438778|2758659": ["\u2026Manivannan 2009], [Lee et al. 2010], [Willke et al. 2009], [Lin et al. 2010], [Karagiannis et al. 2011], [Spaho et al. 2011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012],\u2026", "\u2026[Lee et al. 2010], [Willke et al. 2009], [Lin et al. 2010], [Karagiannis et al. 2011], [Spaho et al. 2011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012], [Jayachandran et al. 2012],\u2026", "\u2026[Sichitiu and Kihl 2008], [Zeadally et al. 2012], [Jarupan and Ekici 2011], [Karagiannis et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012], [Dhamgaye and Chavhan 2013], [Araniti et\u2026", "\u20262008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014], [Al-Sultan et al.\u2026", "\u2026Laberteaux 2008], [Sichitiu and Kihl 2008], [Zeadally et al. 2012], [Jarupan and Ekici 2011], [Karagiannis et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012], [Dhamgaye and Chavhan\u2026", "\u2026and Kihl 2008], [Krishnamurthy 2008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012], [Javadi et al. 2013], [Royer et al. 2013], [Whaiduzzaman et al. 2014],\u2026"]} +{"8438778|2736673": ["\u20262009], [Lin et al. 2010], [Karagiannis et al. 2011], [Spaho et al. 2011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012], [Jayachandran et al. 2012], [Nagaraj and Dhamal 2012],\u2026"]} +{"8438778|1874975": []} +{"8438778|53605608": ["\u20262006], [Hartenstein and Laberteaux 2008], [Sichitiu and Kihl 2008], [Zeadally et al. 2012], [Jarupan and Ekici 2011], [Karagiannis et al. 2011], [Mosqueda et al. 2011], [Suthaputchakun and Sun 2011], [Booysen et al. 2011], [Mohammad et al. 2011], [Faezipour et al. 2012], [Bibhu and Singh 2012],\u2026"]} +{"8438778|1885014": ["\u20262008], [Schoch et al. 2008], [Hartenstein and Laberteaux 2008], [Sichitiu and Kihl 2008], [Krishnamurthy 2008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012],\u2026", "\u2026[Schoch et al. 2008], [Hartenstein and Laberteaux 2008], [Sichitiu and Kihl 2008], [Krishnamurthy 2008], [Willke et al. 2009], [Caveney 2010], [Dubey et al. 2010], [Karagiannis et al. 2011], [Zeadally et al. 2012], [Suthaputchakun and Sun 2011], [Faezipour et al. 2012], [Kumar et al. 2012],\u2026"]} +{"8438778|763939": ["\u2026al. 2014], [Liu et al. 2015] Simulators and mobility models [Youse\ufb01 et al. 2006], [Luo and Hubaux 2006], [Li and Wang 2007], [Martinez et al. 2009], [Harri et al. 2009], [Spaho et al. 2011], [Bajare and Alvi 2013], [Al-Sultan et al. 2014], [Li and Li 2014] Propagation models [Hartenstein and\u2026", "\u20262014], [Liu et al. 2015] Simulators and mobility models [Youse\ufb01 et al. 2006], [Luo and Hubaux 2006], [Li and Wang 2007], [Martinez et al. 2009], [Harri et al. 2009], [Spaho et al. 2011], [Bajare and Alvi 2013], [Al-Sultan et al. 2014], [Li and Li 2014] Propagation models [Hartenstein and\u2026"]} +{"8438778|11210789": ["VANET routing protocols can be classi\ufb01ed as topology-based and position-based [Paul and Islam 2012; Allal and Boudjit 2013; Kumar and Dave 2011].", "\u20262011], [Chen et al. 2011], [Suthaputchakun and Sun 2011], [Kumar et al. 2011], [Kakarla et al. 2011], [Kumar and Dave 2011], [Cho and Ryu 2012], [Paul and Islam 2012], [Jayachandran et al. 2012], [Nagaraj and Dhamal 2012], [Vinayakray-Jani and Sanyal 2012], [Panichpapiboon and Pattara-Atikom\u2026"]} +{"212826|2535224": ["Initially designed for wired networks, Software De\ufb01ned Networking (SDN) has been recognized as an attractive and promising approach for wireless and mobile networks too [7]."]} +{"10311979|206584087": ["Many papers classify DDoS attacks and their detection/prevention mechanisms [49], [50], [51]."]} +{"10311979|6670217": ["Additionally, many attacks that occur in other environments may also appear in ICN environments [19], [20], [21], [22], [23], [24]."]} +{"10311979|7971188": ["ICN has some similarities and differences with other related technologies like distributed database (DDB), data grids, peerto-peer networks (P2P), content distribution networks (CDN), and cloud computing [4], [5]."]} +{"52121507|25911553": []} +{"52121507|18750590": ["and there have been efforts to move toward SDI driven by economic and pricing theories for cloud resource provisioning, cloud management, and cloud networking [56], [57] in"]} +{"52121507|21930333": []} +{"52121507|33492114": [", resource level, chassis level, rack level, and DC level), it is important to keep in mind the open question: How to use and best propagate the information throughout the system? 2) Scheduling and Placement: Scheduling of workloads in a DC has received some attention in the literature in recent years, with surveys looking at energy aspects [134], load balancing techniques [135], and VM allocation in the DC [136]."]} +{"52121507|8650651": ["A thorough survey regarding existing SDON architectures and technologies is presented in [130]."]} +{"52121507|207228303": [", resource level, chassis level, rack level, and DC level), it is important to keep in mind the open question: How to use and best propagate the information throughout the system? 2) Scheduling and Placement: Scheduling of workloads in a DC has received some attention in the literature in recent years, with surveys looking at energy aspects [134], load balancing techniques [135], and VM allocation in the DC [136]."]} +{"52121507|11414835": ["SDI can be realized by different building blocks including Software-Defined Computing (SDC) and virtualization, Software-Defined Networking (SDN) and virtual network function (VNF), and Software-Defined Storage (SDS) (see Table II).", "Although this communication benefits from dynamic network resource provisioning capability, the dynamicity of this communication is limited by capabilities of network\ncontrol approaches (e.g., SDN [17]) with respect to how rapidly it can reconfigure the network.", "APPENDIX LIST OF ACRONYMS\nAMB Ambient Memory Buffer API application programming interface BSS Business Support Systems CAPEX capital expenditures CCIX Cache Coherent Interconnect for Accelerators CPU Central Processing Unit DAS Direct-attached Storage DC data center DCB DC Bridging DCs data centers DDR Double Data Rate\nDIABLO Datacenter-In-A-Box at Low Cost DIMM Dual Inline Memory Module DMA Direct Memory Access DMI Direct Media Interface DMTF Distributed Management Task Force DRAM Dynamic Random-Access Memory ENI Elastic Network Interface FB-DIMM Fully Buffered DIMM FC Fiber Channel FPGA Field Programmable Gate Array GPGPU General-purpose GPU GPU Graphics Processing Unit HA High Availability HDI Hardware-Defined Infrastructures HDS Hyperscale Data System HPC high-performance computing HRDMA Hardware based RDMA HW hardware IaaS Infrastructure as a Service IoT Internet of Things IP Internet Protocol IPMI Intelligent Platform Management Interface iSCSI Internet SCSI IT information technology iWARP Internet Wide Area RDMA Protocol KSM kernel same page merge MaaS Metal as a Service MR-IOV Multi-Root I/O Virtualization NAS Network Attached Storage NIC Network Interface Card NTB Non-Transparent Bridged NUMA Non-uniform memory access NVM Non-Volatile Memory NVMe NVM Express OCDIMM Optically Connected DIMM OCP Open Compute Project OpenCAPI Open Coherent Accelerator Processor Interface OPEX operational expenditures OS operating system OSS Operations Support Systems PaaS Platform as a Service PCIe Peripheral Component Interconnect Express PODM Pod Manager PSME Pooled System Management Engine QPI Quick Path Interconnect RAM Random-Access Memory RDD Resilient Distributed Datasets RDMA Remote Direct Memory Access RMM Rack Management Module RoCE RDMA over Converged Ethernet RSA Rack Scale Architecture RSD Rack Scale Design SaaS Software as a Service SAN Storage Area Network SATA SerialAT Attachment SCM storage class memories SCSI Small Computer System Interface SDCloud Software-Defined Cloud\nSDC Software-Defined Computing SDDC Software-Defined DC SDE Software-Defined Environment SDHI Software-Defined \u201cHardware\u201d Infrastructures SDI Software-Defined Infrastructures SDN Software-Defined Networking SDON software-defined optical network SDS Software-Defined Storage SoC System on Chip SPMF Scalable Platforms Management Forum SR-IOV Single-Root I/O Virtualization SSD Solid-State Drive TCO Total Cost of Ownership TCP Transmission Control Protocol TIP Telecom Infra Project TLB translation lookaside buffer ToR Top of Rack UPI Ultra Path Interconnect VM Virtual Machine VNF virtual network function XaaS \u201cX\u201d as a Service.", "This aspect of DC networking and how to improve the SDN has been well studied [121]\u2013[128].", "However, there are technology surveys available that look, individually, into technologies that relate to SDHI, such as virtualization technologies [16] or SDN [17].", "Virtualization technologies besides SDN and SDS have been a way to realize SDI (see Section II), not in its pure sense (i.e., at the HW level) but at a software level that allows emulation, to a certain\nextent, of SDI.", "Consequently, separation of control and data plane for a DC\u2019s interconnection fabric could be highly beneficial, thus SDN-based optical networking is a potential solution for managing such a network fabric.", "SDON leverages the flexibility of SDN control to support network applications via an underlying optical network infrastructure.", "ent contexts in the literature: network virtualization [17], [139] and server virtualization [16] (see Fig.", ", SDN [17]) with respect to how rapidly it can reconfigure the network.", "Combining optical overlay and SDN results in a software-defined optical network (SDON).", "This controller could be based on distributed control software, a logically centralized controller as network OS (i.e., in-line with SDN philosophy [125]), or a combination of both approaches (see [126])."]} +{"52121507|9872316": ["ent contexts in the literature: network virtualization [17], [139] and server virtualization [16] (see Fig.", "However, there are technology surveys available that look, individually, into technologies that relate to SDHI, such as virtualization technologies [16] or SDN [17]."]} +{"7049202|3583771": []} +{"52858480|7971188": []} diff --git a/graph_535695.jsonl b/edge/graph_535695.jsonl similarity index 100% rename from graph_535695.jsonl rename to edge/graph_535695.jsonl diff --git a/graph_535786.jsonl b/edge/graph_535786.jsonl similarity index 100% rename from graph_535786.jsonl rename to edge/graph_535786.jsonl diff --git a/edge/graph_53578654.jsonl b/edge/graph_53578654.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..efe558c9f6e5a2e2bb35291116f02b74915f62fc --- /dev/null +++ b/edge/graph_53578654.jsonl @@ -0,0 +1,9 @@ +{"6094904|14038195": ["The effectiveness of AHP in evaluating problems involving multiple and diverse criteria and the measurement of trade-offs\u2014sometimes using limited available data\u2014has led to its recognition across different fields of application [20]."]} +{"14926530|8584223": []} +{"14926530|5835346": ["Different classifiers are viewed as individual learners and their outputs are combined by some specific combination rules [14,46]."]} +{"17422880|62701834": []} +{"43868125|18744521": []} +{"36704794|393948": ["These features are found to be far superior to conventional handcrafted features, which are described in the later section (Bengio et al., 2013).", "Recent research revealed that supervised feature learning methods such as Convolutional Neural Networks (CNN) could learn the data-specific features and their representation directly from the image pixel values (Bengio et al., 2013)."]} +{"125371943|3110415": []} +{"125371943|393948": []} +{"52949543|1877246": []} diff --git a/graph_5358365.jsonl b/edge/graph_5358365.jsonl similarity index 100% rename from graph_5358365.jsonl rename to edge/graph_5358365.jsonl diff --git a/edge/graph_53591037.jsonl b/edge/graph_53591037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53594273.jsonl b/edge/graph_53594273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed7c76223d7e2cc490a8b8d004f06278e85283e0 --- /dev/null +++ b/edge/graph_53594273.jsonl @@ -0,0 +1 @@ +{"64488137|16243328": []} diff --git a/edge/graph_53595073.jsonl b/edge/graph_53595073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e05206b7e8cf8b2d929f481c8c8323aa993ebbcc --- /dev/null +++ b/edge/graph_53595073.jsonl @@ -0,0 +1 @@ +{"12098072|8783262": ["The basic characteristics of an electric drive for EVs are the following [4]\u2013[6]:"]} diff --git a/edge/graph_53597885.jsonl b/edge/graph_53597885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53605608.jsonl b/edge/graph_53605608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d58f1d6f5e97afae7bb7bd22a031cf67f74f615 --- /dev/null +++ b/edge/graph_53605608.jsonl @@ -0,0 +1,2 @@ +{"26700265|2835258": ["The above algorithms are also called\nposition-based routing algorithm (Mauve et al., 2001).", "The above algorithms are also called position-based routing algorithm (Mauve et al., 2001)."]} +{"5832003|14441987": ["Novel studies have examined medium access control [19, 11, 20] and routing [3, 18, 4] in the context of mobile ad hoc networks."]} diff --git a/edge/graph_53606965.jsonl b/edge/graph_53606965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a5bf2acb5f6c69537d8d78a1c4ff018206223c1 --- /dev/null +++ b/edge/graph_53606965.jsonl @@ -0,0 +1,7 @@ +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"4351505|18889901": []} +{"8609717|1113420": ["In any case, the protection of sensitive context data must be guaranteed [62]."]} +{"10985974|1634674": []} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"2543083|12127129": []} +{"16870133|14540337": ["For the matters of applications other than online games, it can be applied for sport training simulation on different events as mentioned in [35], risk accident simulation as a prevention measure in [36][37], training simulation in [38] and so on."]} diff --git a/edge/graph_53617362.jsonl b/edge/graph_53617362.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53617562.jsonl b/edge/graph_53617562.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3394373a0f4d4350eebcd9b739d7d21ecb83365f --- /dev/null +++ b/edge/graph_53617562.jsonl @@ -0,0 +1,2 @@ +{"14025532|6988077": ["They can also be used for rapid screening of multiple toxins in a high throughput manner [92,95]."]} +{"22448314|8953108": ["Methods 70, 65\u201374 (1984).", "Methods 98, 50\u201358 (2014).", "SUPPLEMENTARY MATERIALS\nwww.sciencetranslationalmedicine.org/cgi/content/full/6/267/267ra174/DC1 Materials and Methods Fig.", "S7 and S8, table S7, and Supplementary Materials and Methods (34, 35).", "M. A. Wikler, F. R. Cockerill, K. Bush, M. N. Dudley, G. M. Elipoulos, D. J. Hardy, D. W. Hecht, J. F. Hindler, J. B. Patel, M. Powell, J. D. Turnidge, M. P. Weinstein, B. L. Zimmer, M. J. Ferraro, J. M. Swenson, Methods for Dilution Antimicrobial Susceptibility Tests for Bacteria That Grow Aerobically: Approved Standard (Clinical and Laboratory Standards Institute, Wayne, PA, 2009)."]} diff --git a/edge/graph_53619263.jsonl b/edge/graph_53619263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53623913.jsonl b/edge/graph_53623913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef943510231c79ddfb604922c41b5bdc784578d4 --- /dev/null +++ b/edge/graph_53623913.jsonl @@ -0,0 +1 @@ +{"14221366|30815820": ["This dual nature of user participation, in content creation as well as opinion formation, is in contrast to earlier online communities that did not enable such rich features of social interaction (Parameswaran and Whinston 2007)."]} diff --git a/edge/graph_53626679.jsonl b/edge/graph_53626679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2036a581aaa62c4e2db101c212adfc39ec869b8d --- /dev/null +++ b/edge/graph_53626679.jsonl @@ -0,0 +1,14 @@ +{"8163170|8363289": ["It is shown in [14] that the stability of MPC can be guaranteed by properly choosing a final state constraint and a final cost."]} +{"1935761|4680026": ["carried out much fruitful work, such as [1]\u2013[3], [5], [9], [10], [12], [14]\u2013[17], [21]\u2013[23], [25], [27], [28], [32], [33], [35], and [37], and the references therein.", "For the first scenario, by planning/replanning the motion paths of robots, each robot can deviate from its prescribed path so as to circumvent obstacles and other robots [1], [3], [8], [9], [12], [14]\u2013[17], [21], [27], [32], [33]."]} +{"37701759|23041951": ["There has been significant research on groups of autonomous mobile robots which can be used for applications including tasks such as surveillance [1], exploration [2], search and rescue [3], hazardous waste cleanup [4], security [5], agriculture, and warehouse management."]} +{"1503576|9588126": []} +{"1503576|6607209": []} +{"113557076|9588126": []} +{"115193744|17934515": ["More studies can be found in recent surveys in (Dey et al. 2016; Jia et al. 2016) and references therein.", "Control/model schemes for vehicle platooning have been extensively investigated in the recent years (Jia et al. 2016)."]} +{"14849693|5660618": ["Note that, although the string of vehicles is always in a leader\u2013follower configuration, different topologies may arise depending on the communication technology and its specific transmission ranges [26]."]} +{"516517|1932843": ["last step the agent decided to take [9]."]} +{"111660759|17934515": ["One typical application is the so-called platoon-based cooperative driving (Fernandes, 2012, Jia et al., 2016, Jia and Ngoduy, 2015, Ngoduy, 2013b).", "The issues of CDS have been extensively studied in recent years (see Jia et al. (2016) and references there-in)."]} +{"56421235|17934515": []} +{"51610229|205430214": ["Similar to the research of neural-dynamic optimization, as a branch of population metaheuristic approach, the population-based evolutionary computation methods are developed for global optimization in the recent years [27], [28]."]} +{"15771635|5660618": ["Most works on NCS focus on the stability analysis of closed-loop NCS consisting of a plant and controller interconnected by a wireless network [4], [7], [8], [9], [10], [11], [12].", "In this paper, we approach the problem of regulating intervehicle distances in a CACC system from a Networked Control Systems (NCS) perspective [3], [4]."]} +{"3270204|28595459": ["In military applications, robots may cooperate as a working group to complete surveillance tasks [3] or do spying work in adversarial areas based on techniques in [4, 5]."]} diff --git a/edge/graph_53633874.jsonl b/edge/graph_53633874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bb7297c3e300bd8f4d9365830b3daf253ff9bec --- /dev/null +++ b/edge/graph_53633874.jsonl @@ -0,0 +1,11 @@ +{"1520906|3348390": ["Although some reviews about IoT have been conducted recently (e.g., Atzori et al., 2010; Zeng et al., 2011; An et al., 2013; Perera et al., 2013; Li et al., 2016; Yan et al., 2014), they focus on high level general issues and are mostly fragmented."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"207155964|10500613": ["Hence, the task of finding mappings (semi-) automatically has been an active area of research in both database and ontology communities [22, 15].", "Heuristic-based approaches to ontology mapping are similar to heuristic-based approach to matching database schemas and XML structures ([22, 17]) and use lexical and structural components of definitions to find correspondences."]} diff --git a/edge/graph_53638569.jsonl b/edge/graph_53638569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28f366e2dec8faa8a8f606e03aaac701f138fa2b --- /dev/null +++ b/edge/graph_53638569.jsonl @@ -0,0 +1,65 @@ +{"14797747|18717047": ["A software solution that combines REST-like Web services [10] and a Java application was constructed and deployed in the gateway."]} +{"14797747|562065": ["Nowadays, there is a tendency to embed small devices with computational and communication capabilities in quotidian objects in order to collect and process information from different sources to both control physical processes and interact with human users [1]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"2295142|1236072": ["These surveys describe and analyze the general routing strategies proposed for sensor networks [4,5].", "[4] presented routing challenges and design issues in wireless sensor networks.", "[4] classified the existing routing protocols in wireless sensor networks from two different perspectives: (1) network structure and (2) protocol operation.", "In this context, researchers have proposed numerous routing protocols to improve performance demands of different applications through the network layer of wireless sensor networks protocol stack [4,5].", "Due to the intrinsic features of low-power wireless sensor networks, routing in these networks is much more challenging compared to the traditional wireless networks such as ad hoc networks [4,5]."]} +{"1817751|512561": ["level and network lifetime [151]."]} +{"1817751|85585": ["increases the accuracy of various tracking in a variety of civilian and military applications [71].", "due to bottleneck link/node failure for non-disjoint paths which negatively impacts the performance of multipath routing [71].", "Reliability has emerged as a factor to classify multipath routing protocols, since a reliable monitoring of the environment is very important in a variety of multimedia applications [71]."]} +{"1817751|36432451": ["The design of the routing protocol is highly influenced by the data delivery model, especially when the design involves minimization of energy consumption and route stability [45].", "Multimedia applications encompass monitoring of reallife events which necessitates that efficient multipath routing mechanism should be developed for the transmission of information while meeting QoS requirements [45].", "tion, cooperative and distributed algorithms [14], [43]\u2013[45].", "Some routing protocols adhere to some requirements and resource-constraints nature of WMSNs to meet QoS in order to handle various types of multimedia and mixed traffic [45]."]} +{"1817751|6556803": ["This means that each sensor node shall be modified distinctively according to the application scenarios [6]."]} +{"1817751|13454399": ["The benefits of various multipath routing protocols for WSNs and their benefits were presented in [33] and [34].", "are two relevant aspects of an allocation strategy: granularity and scheduling [16], [34]."]} +{"1817751|29997805": ["dant traffic reduction based on similarity of multimedia data sources from nearby locations were studied in [7].", "A plethora of research on taxonomies for Mobile Ad-hoc NETwoks (MANETs) and WSNs have reported the baseline model of routing protocols [7], [69].", "[7] classified the WMSNs routing protocols", "constraints, multimedia source coding techniques, crosslayer coupling of functionality, and multimedia in-network processing [7].", "Designing multipath routing protocols for WMSNs requires additional research that extends the protocols proposed for WSNs [7]."]} +{"1817751|2295142": ["selection for each multipath routing protocol is independently determined and should be selected to meet the performance demands of WMSNs applications [1], [13].", "The third approach is more interesting than the others since it represents a trade-off between energy expenses and the likelihood of total multipath failure [13], [76].", "The demands of multipath routing strategy combined with various performance demands dictated by different applications have led to the proposal of a number of new routing protocols to efficiently utilize the limited available resources in addition to the features of multimedia data [13].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "[13] classified a multipath routing taxonomy for WSNs into three categories with emphasis on their advantages and disadvantages.", "vides fault tolerance by increasing the probability of a data packet sent by a source node, via alternatives of selected paths, arriving at the destination sink with minimum packet loss [13].", "However, our survey and the survey presented in [13] have several major differences.", "requirements along with their respective routing strategies [8], [13], [14], [16].", "In [13], multipath routing protocols were classified based on three main criteria: alternative path routing, reliable data transmission, and efficient resource"]} +{"1817751|41998167": ["diately to the changes in the sensed attribute, or a query is generated by the base station [52]."]} +{"1817751|3755658": ["ability [29], and cross-layer approaches [21]."]} +{"1817751|14132386": ["Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "cols for traffic load balancing and repartition [62], [96]\u2013[98].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62]."]} +{"1817751|3826739": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "In [28], position-based routing protocols were surveyed"]} +{"1817751|1236072": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "Early surveys focused on general architectural issues and open research problems in the field of WSNs [8], [19]\u2013[27].", "These characteristics are handled either by modifying existing protocols in WSNs or by proposing new methodologies such as multi-radio multi-channel systems, switching between multiple channels, multipath routing, or mixtures of these methods [8].", "Therefore, the prime role of a routing protocol is to establish a path between the sources and sink node while keeping track of the path availability and facilitating successful transmission of data along the selected paths [8].", "constrained routing protocols were studied in [30], where the taxonomy presented in [8] was expanded to consider energy efficiency.", "Routing strategy is defined in terms of the process of discovering and selecting paths in wireless networks from the target area that sends network traffic towards the sink node [8].", "requirements along with their respective routing strategies [8], [13], [14], [16].", "multiple performance metrics to meet the additional QoS requirements [8], [68].", "In [8], routing protocols for WSNs were discussed and classified into", "Several techniques have been proposed to understand how different routing approaches respond when handling various requests in different network environments [8], [57]\u2013[64]."]} +{"1817751|44944144": ["better than proactive routing protocols during inactivity [144]."]} +{"1817751|1230643": []} +{"1817751|14441987": ["the network with up-to-date routing information [142].", "The proactive approach responds to changes in the network topology or another metric such as bandwidth and interference by propagating updates throughout the network to maintain a consistent network [142]."]} +{"1817751|41907762": ["It should be noted that, they are difficult to measure and generally can generate high overhead in networks [60], since resource availability information are periodically exchanged among nodes [35].", "Actually, the discovery, selection and maintenance of paths depend on some node-specific and/or network-wide metrics such as QoS requirements, residual-energy budget along the selected path, and more [60].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "have been proposed to solve routing problems in traditional WSNs [60]\u2013[64].", "Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62]."]} +{"1817751|13458486": ["In addition, cross-layer design between MAC layer and routing allow packet-level service differentiation or priority-based scheduling, and more power efficient routing mechanisms [17].", "The multipath routing protocol taxonomy in [17] used path selection techniques and traffic distribution mechanisms to classify the surveyed protocols.", "Consequently, the objective is to assign more loads to under-utilized multiple paths and less load to over-committed paths so that uniform resource utilization of all available paths can be ensured to distribute network traffic [16], [17]."]} +{"1817751|1762301": ["Otherwise, reactive routing protocols may result in a large volume of messaging overhead [133].", "final destination route are discovered [133]."]} +{"3920516|485843": ["Within the communication network associated with the power grid, the Neighbor Area Network (NAN) and Home Area Network (HAN), are faced with substantial communication challenges because of their size and traffic variation [1 \u2013 3]."]} +{"3920516|17336376": []} +{"2713324|17683338": ["Because of these design trade-offs, TinyOS and Contiki are thus lacking several key developerfriendly features: standard C and C++ programability, standard multi-threading, and real-time support (see Table I).", "The programming models in Contiki and TinyOS are based on the event driven model, in a way that all tasks are executed\n978-1-4673-5946-7/13/$31.00 \u00a92013 IEEE\n3569\nwithin the same context, although they offer partial multithreading support.", "Contiki uses a subset of the C programing language, where some keywords cannot be used, while TinyOS is written in a C dialect called nesC.", "The scheduling in Contiki is purely event driven, similar to that in TinyOS, where a FIFO strategy is used.", "The dominant WSN OS, Contiki and TinyOS [3], follow an event driven design, which is useful for typical WSN scenarios, but exhibit drawbacks for efficient and functional networking implementations."]} +{"205288793|2295142": []} +{"205288793|1230643": ["Moreover, the devices composing them are very limited in terms of memory, processing power and battery [1]."]} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"15685653|2295142": ["Multipath routing has been widely used in the literature to improve the fault-tolerance (reliability), to balance the load (congestion avoidance), or for QoS improvement [4].", "In this paper, we use existing concepts like multipath communication [4], load balancing, and energy-aware path selection, to present a complete and pragmatic solution."]} +{"3566615|31245252": []} +{"3566615|30575518": []} +{"3566615|34643772": []} +{"3566615|206576469": [", control signals for large automated production facilities, which have to be delivered with tight deterministic real-time quality of service (QoS) [109], [155]\u2013[157]."]} +{"3566615|8650651": []} +{"3566615|11414835": []} +{"3566615|2623404": []} +{"3566615|10693567": [", OpenFlow [166], to provide deterministic real-time QoS guarantees.", "SDN enables packet switches with a centralized control interface, e.g., OpenFlow [166], to provide deterministic real-time QoS guarantees."]} +{"3566615|485843": ["For instance, multimedia network applications require QoS from the network service, as do many network applications in industrial networks [1] and the smart grid [2] as well as networked control systems [3]."]} +{"3566615|13295407": []} +{"3566615|2295142": []} +{"3566615|14132386": []} +{"3566615|18643817": []} +{"3566615|14088590": []} +{"3566615|7857223": []} +{"3566615|10287248": ["surveys have covered the QoS routing algorithms that have been developed up to around the years 2002-2003 [98]\u2013[103]."]} +{"3566615|10559330": ["paradigms for the Internet, see [17]\u2013[22], led to a renewed interest in examining routing and spurred the development of"]} +{"3566615|4269723": ["the framework [133] has been based on Software-Defined Networking (SDN) [158]\u2013[165]."]} +{"3566615|38911919": []} +{"3566615|121289": ["The framework [133] is designed to provide strict delay QoS, which is typically required for industrial communication systems [143]\u2013[147], automotive networks [148], as well as some types of smart grid communication [149], [150] and Internet of Things communication [151]\u2013[154]."]} +{"3566615|3994942": ["and load balancing in the Internet [92], [93], content-based publish/subscribe systems [94], and green routing protocols with sleep scheduling [95]."]} +{"3566615|991041": []} +{"2399244|121289": ["I. INTRODUCTION\nThe need for energy conservation and environmental compliance has driven governments and utility industry over the world to transform their existing electrical grid into smart electrical grid or shortly \u201dsmart grid\u201d [1]."]} +{"29456483|13454399": ["Considerable research efforts [10, 11] are carried out on non-RPL based reactive routing protocols especially for WSNs."]} +{"29456483|2295142": ["Considerable research efforts [10, 11] are carried out on non-RPL based reactive routing protocols especially for WSNs."]} +{"6163761|525062": []} +{"6163761|1252121": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"61489225|1230643": ["IRELESS sensor networks (WSNs) comprise a large number of sensor nodes, which are small in size, battery-powered and functioning autonomously (see e.g., [ 1 ])."]} +{"1175879|14441987": ["The routing schemes for ad hoc networks usually employ single-path routing [ 1 ,2]."]} +{"38237500|713082": []} +{"39634994|5747564": []} +{"39634994|6959212": []} +{"39634994|18037424": []} diff --git a/edge/graph_53640661.jsonl b/edge/graph_53640661.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f84b8c45405d87aba140788620a926c0274be0db --- /dev/null +++ b/edge/graph_53640661.jsonl @@ -0,0 +1 @@ +{"885218|1142636": []} diff --git a/edge/graph_53658586.jsonl b/edge/graph_53658586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53664898.jsonl b/edge/graph_53664898.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..644157e71d470f2c1ea4a1d45c7ec8db7a0c82f7 --- /dev/null +++ b/edge/graph_53664898.jsonl @@ -0,0 +1,4 @@ +{"2879974|912956": ["The survey paper by Davis and Burns (2011) covers research into hard real-time scheduling for homogeneous multiprocessor systems."]} +{"38023976|16362395": ["The main concern in BCI research has been the high dimensionality of the features and the selection of relevant features, such that they have the highest discriminability[9-11]."]} +{"38023976|9270553": ["Their functions are to decode the bio-potential signals obtained from the different region of the brain for various applications, like in robotics, communication, and gaming [2, 3]."]} +{"478048|13867280": []} diff --git a/edge/graph_53665870.jsonl b/edge/graph_53665870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53666881.jsonl b/edge/graph_53666881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d90a624e4f65e34dc089e4e3e14750adca722b8 --- /dev/null +++ b/edge/graph_53666881.jsonl @@ -0,0 +1,5 @@ +{"207322664|10148683": ["This task is challenging since the degree of eye closeness may be different for each face and there are many ambient factors that may significantly change the appearance of the eyes, such as lighting, pose, scales and imaging conditions [2] (as shown in Fig."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"688047|9045232": ["The resulting system is very slow."]} +{"15331060|393948": ["[5] provide a comprehensive review of this field of research."]} +{"12236690|2323881": ["Face landmark detection is a technique developed by researchers in computer vision to automatically detect some particular landmarks in human faces using machine learning algorithms [2]."]} diff --git a/edge/graph_5366837.jsonl b/edge/graph_5366837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53680608.jsonl b/edge/graph_53680608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53688887.jsonl b/edge/graph_53688887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7a15b38e5040d01b9fbf48834c8ce8d2f2cca437 --- /dev/null +++ b/edge/graph_53688887.jsonl @@ -0,0 +1,15 @@ +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} diff --git a/edge/graph_53690888.jsonl b/edge/graph_53690888.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53692127.jsonl b/edge/graph_53692127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea39ef04e582e73b6116de36ae64f46adffe0760 --- /dev/null +++ b/edge/graph_53692127.jsonl @@ -0,0 +1 @@ +{"120755488|53692127": []} diff --git a/edge/graph_53692913.jsonl b/edge/graph_53692913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afcb60c63cab21665e98631b6dd6fcb58031123b --- /dev/null +++ b/edge/graph_53692913.jsonl @@ -0,0 +1 @@ +{"36295320|905827": []} diff --git a/edge/graph_53693712.jsonl b/edge/graph_53693712.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5356f1df4fb9f9ca5fbf48e93aac4a7915d3de78 --- /dev/null +++ b/edge/graph_53693712.jsonl @@ -0,0 +1,10 @@ +{"33156476|10213552": ["Flume [22] collects, aggregates, and moves a large amount of streaming data (i.", "Based on Hadoop Distributed File System (HDFS) and MapReduce high-performance parallel data processing paradigm [22], R-Connector and Mahout [22] provide powerful statistics and machine learning capability.", "Inspired by big-table techniques (including row-key, column-key,\nand time-stamp), HBase [22] efficiently accesses large-scale heterogeneous real-time or historical data.", "Inspired by big-table techniques (including row-key, column-key, and time-stamp), HBase [22] efficiently accesses large-scale heterogeneous real-time or historical data.", "Sqoop [22] supports the ingestion of log data, which is related to bridge design and operation such as the bridge configuration (e.", "Hive [22] provides a data warehouse infrastructure to manage all the data corresponding to bridge serviceability; Pig [22] offers MapReduce-enabled query and processing."]} +{"3789520|13370607": ["where d is the iteration step size set to \u00f0m\u00fe n\u00de= ffiffiffiffiffiffi jXj p as suggested by Li and Yu (2017) and the SVT operator Ds\u00f0 \u00de is a soft thresholding operator such that", "Recently, the usage of computational drug repositioning in drug discovery has become a common practice, where an increasing number of machine learning, network analysis, text mining and semantic inference methods have been proposed (Li et al. , 2016)."]} +{"2377549|7020971": ["afeguards on step sizes we propose are quite important in practice: without these checks, we observe divergence when the initial step sizes are chosen too large. Motivated by the convergence proof in [Ber11], for each row, we seek a step size on the order of 1=kg ik 2, where g i is the gradient of the objective function with respect to x i. We start by choosing an initial step size scale i for each row o", "size rule t = 1=tguarantees convergence to the globally optimal Xif Y is xed, while using a xed, but suciently small, step size guarantees convergence to a small O() neighborhood around the optimum [Ber11]. The technical condition required on the step size is that t <1=L, where Lis the Lipshitz constant of the gradient of the objective function. Bolte et al. have shown that the iterates xt i and yt "]} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"10892045|3202525": ["Verbert et al. (2012) discussed the importance of the contextual information in the recommendation process."]} +{"206710454|1805048": ["Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.", "Su and Khoshgoftaar [212] presents a survey of CF techniques.", "The rest of this section deal is dealt with the concepts and research in the two lines considered previously: Filtering of social information and content filtering.", "The pure CBF has several shortcomings [16,176,212]:", "Breese et al. [43] evaluated the predictive accuracy of different algorithms for CF; later, the classical paper [94] describes the base for evaluating the Collaborative Filtering RS.", "Collaborative Filtering [3,94,92,51,212] allows users to give ratings about a set of elements (e.g. videos, songs, films, etc. in a CF based website) in such a way that when enough information is stored on the system, we can make recommendations to each user based on information provided by those users we consider to have the most in common with them.", "Collaborative Filtering (CF) methods play an important role in the recommendation, although they are often used along with other filterning techniques like content-based, knowledge-based or social ones."]} +{"7259012|1805048": ["Following the classification of traditional CF-based RSs [2,3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches.", "CF approaches can be further grouped into model-based CF and neighborhood-based CF [2,3].", "Following the classification of traditional CF-based RSs [2] [3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches."]} +{"6765290|3202525": []} +{"6765290|1805048": []} +{"1389820|16049649": ["Another notorious difficulty is that the collinearity among a large number of predictors can cause issues of over-fitting and model misidentification (Fan and Lv, 2010).", "The high R2 and low prediction error of BLASSO and G-SMuRFS in the high dimension cases may be caused by over-fitting and model misidentification (Fan and Lv, 2010).", "Another notorious difficulty is that the collinearity among a large number of predictors can cause issues of overfitting and model misidentification (Fan and Lv 2010).", "The high R2 and low prediction error of BLASSO and G-SMuRFS in the high dimension cases may be caused by overfitting and model misidentification (Fan and Lv 2010)."]} diff --git a/edge/graph_53697777.jsonl b/edge/graph_53697777.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53699360.jsonl b/edge/graph_53699360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14882a6699e19a3864c418ac3545299a8679ff2d --- /dev/null +++ b/edge/graph_53699360.jsonl @@ -0,0 +1,2 @@ +{"18253683|1805048": ["Most of the service recommendation techniques are based on individual intelligence or the local knowledge of users (Su & Khoshgoftaar, 2009) rather than the common knowledge among the user community."]} +{"15601545|6742930": ["In contrast to the previous meta-analysis and review articles a higher number of publications are referenced in ([Zhu and Zhou 2008]).", "Examples for those areas are agent systems or modeling roles as investigated in [Zhu and Zhou 2008]."]} diff --git a/edge/graph_53703591.jsonl b/edge/graph_53703591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53707723.jsonl b/edge/graph_53707723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53711788.jsonl b/edge/graph_53711788.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a0ddf6d7e89e1c3c7a3f677f379d34dc45b6e61 --- /dev/null +++ b/edge/graph_53711788.jsonl @@ -0,0 +1,9 @@ +{"107688356|206584087": ["The attacker sends an ICMP echo packet with the victims IP address, all the hosts accept the ICMP echo packet and reply to the victim computer [37]."]} +{"107688356|595093": ["Data is usually reported to the Phasor Data Collector (PDC) via TCP/IP and stored for analysis [35]."]} +{"15092805|485843": ["issues exist in the SCADA [8,9], home SG environment [10], security management and the SG operation [11], message delivery in the SG [12], and vehicle-to-grid (V2G) systems [13]."]} +{"18670653|5660618": ["Networked control systems (NCSs) [13] combine communication and information technologies with control system designs to model CPSs such as the SG."]} +{"28684022|206584087": ["DoS attack on communication network rendering computational resources ineffective [21]."]} +{"28684022|595093": ["There are three high-level security objectives of synchrophasor system, i.e., availability, integrity, and confidentiality [12].", "To ensure secure and reliable WAMS operation, it is essential to understand what are the security objectives and requirements before providing a comprehensive treatment of cyber security in the context of data delivery and time bound actions [12]."]} +{"18176255|2521001": ["[23]."]} +{"22239235|206584087": []} +{"22239235|595093": []} diff --git a/edge/graph_53711791.jsonl b/edge/graph_53711791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e48d112fe06830bf2e94651e4781d8bfb0d559a4 --- /dev/null +++ b/edge/graph_53711791.jsonl @@ -0,0 +1,44 @@ +{"51720953|4427557": []} +{"9928191|21386749": []} +{"9928191|7329149": [", consider the recent Gartner Symposium/ITxpo 2016, just to mention one) and scientific world [1]."]} +{"51873999|4427557": ["Nonetheless, given the huge geographical span of a city, the LPWAN technologies [5], [6], [7], aiming at providing connectivity for massive deployments of resourcelimited machines, outstand from the mass and draw very serious attention as of today."]} +{"16344|4427557": ["These types of requirements are hard to ful\ufb01ll using traditional Machine to Machine technologies such as cellular or WPAN [2].", "2768498 technologies such as cellular or WPAN [2]."]} +{"1527872|4427557": ["Given the inadequacies of legacy communication solutions (expensive hardware and communication costs and short battery life), a new breed of connectivity solutions have emerged popularly referred to as Low Power Wide Area (LPWA) networking technologies [6]."]} +{"4731415|20905429": ["Furthermore, flexible and wearable sensors are more widely used [11]; it is forecasted that there will be more than three billion wearable sensors by 2050 [12]."]} +{"29108654|21386749": ["Moreover, the interaction between the real world and its digital counterpart using secure and real-time technologies may lead to the solution of many issues related to smart cities, pollution monitoring, transportation, remote health care and more [1]-[3]."]} +{"49652443|4427557": ["Most of these technologies work in frequencies below 1 GHz and employ modulation techniques that enable link budgets of 150\u00b1 10 dB, resulting in robust communication channels with low energy consumption reaching distances in the order of kilometers [27], [28]."]} +{"19133221|3767252": ["This architecture was the one proposed in its inception and, nowadays, it has been extended so any equipment within the system with processing and storage capabilities can be considered as a fog node [3]."]} +{"7612760|562065": ["Wireless sensor networks (WSNs) are largely used to monitor rural environments [1], [2] and urban environments [3]."]} +{"13720514|206583943": ["Indeed, it is commonly recognized that the core network will be based on IPv6 [2] for the next-generation Internet."]} +{"3738864|4427557": ["given in the following section, while more general details about LoRa can be found at [7], [18] and references therein.", "We analyze here a LoRa scenario following the system setting from [13], which is based on the technology specification and several deployment trials (refer to [7] and references therein).", ", robot arms in fully autonomous industrial plants) [7].", "Low-power wireless technologies covering wide areas are becoming trendy nowadays, as indicated by the survey [7].", "2) The theoretical model developed in [8] is modified to incorporate realistic LoRa setups from [13], which is supported by actual deployments as discussed in [7].", "Among other options discussed in [7], LoRa\u2014a proprietary technology proposed by Semtech and promoted by the LoRa"]} +{"52073397|4427557": []} +{"51925882|4427557": ["To this end, low-power wide-area networks (LPWAN) are recently taking the research spotlight [4]."]} +{"51925882|485843": ["In urban cities, as the massive number of metering devices are to be connected, the choice of the communication technology depends on the number of supported devices and its scalability [9]."]} +{"51925882|3494096": ["At the moment, IoT applications are supported by available technologies such as Zigbee, Bluetooth and WiFi for short-range communication; and cellular networks (e.g., 3G, LTE, 5G) for long-reach scenarios [2], [3]."]} +{"206499530|4427557": ["been proposed for Low-Power Wide Area Networks (LPWANs) [1, 2]."]} +{"53280373|4427557": ["Facing the critical interplay between latency, battery lifetime, and the requirements of Industry 4.0 applications requires a novel design methodology that accounts for all the costs and benefits entailed by LP-WAN deployments in smart industrial environments.", "Without lack of generality, this contribution will focus on the Long Range Wide Area Network (LoRaWAN) architecture, but the methodology developed hereby can be applied, with some customizations, to any LP-WAN technology.", "Despite being extremely energy efficient, most of the enddevices belonging to LP-WAN are still battery-powered.", "In this context, Low Power-Wide Area Network (LP-WAN) [2] are quickly gaining momentum because of their inherent capabilities to match coverage, scalability, and energy efficiency requirements of Industrial Internet of Things (IIoT) deployments.", "Many different LPWAN technologies are available nowadays including, but not limited to, LoRaWAN, Sigfox, NB-IoT, LTE-M1, Weightless, DASH7, and Ingenu [2]."]} +{"53280373|12029139": ["This potential for harvesting energy is commonly available in most of the industrial environments and has already been exploited by industrial monitoring applications reported in [9], [10]."]} +{"8222030|4427557": ["Recently, a new breed of communication technologies named low-power wide-area (LPWA) networks has recently been proposed to specifically address the needs of long-range and low-power IoT applications [2]."]} +{"44085007|4427557": ["The trade-off is with regards to the volume of data that can be relayed back to base [63-65]."]} +{"44085007|21386749": ["These, as well as cross-application with supporting technologies [15-17] helps to generate a range of novel medical applications [18] including imaging [19-21] and object detection [22] that address growing societal needs for early cancer detection and developing world healthcare solutions."]} +{"9736282|4427557": ["Some of the most well accepted LPWANs are SigFox, LoRaWAN and Ingenu [7]."]} +{"3470128|4427557": ["Industry, academia and standards development organizations have devoted significant efforts to LPWAN in the last years [1,2]."]} +{"77390144|4427557": ["The technology deserving the widest acceptance from both the academic and the industrial world is probably the longrange wide area network (LoRaWAN) [9], [10]."]} +{"31680326|4427557": ["The LPWA state-of-the-art [1] is split into two separate sub-categories."]} +{"4930405|9410318": ["D\u2019souza and Jose [26], Benamar et al. [27], Abdelkader et al. [25], and Sobin et al. [28] presented some of those studies about the overall evolution of the several DTN routing/forwarding strategy approaches."]} +{"49570616|4427557": ["In the meanwhile, Low Power Wide Area Network (LPWAN, [3][4]) technologies have been proposed as an alternative solution for implementing private cellular-like networks with infrastructure costs as low as possible."]} +{"49570616|21386749": ["smart cities, pollution monitoring, transportation, remote health care and more [1][2]) but the common prerequisites are: autonomous operation, long lifetime, and relatively long update time."]} +{"14025821|4427557": ["Raza et al summarize a few \ufb02aws of NB-IoT [2].", "In general, a trade-off between these measures and data rate has to be made [2]. device has to be obtained with minimal location error."]} +{"52110588|4427557": ["The Low Power Wide Area (LPWA) networking technologies [1] are recent outcomes of breakthroughs in communication technologies, as well as miniaturization and decreasing costs of the Internet of Things (IoT) devices."]} +{"21683864|18167210": [", monitoring of farms, and irrigation processes are the main domains of IoT for cultivation [142].", "Tracking of Tracking of animals, monitoring of farms, and irrigation processes are the main domains of IoT for cultivation [142]."]} +{"21683864|4427557": ["Consequently, the cost [179] and the complexity of the agriculture WSN will be reduced and the lifetime will be increased."]} +{"21683864|206901977": ["BLE outperforms ZigBee in terms of power consumption, but this wireless protocol is limited in agricultural applications because of its short communication distance of 10 m, as reported in [48].", "Communication range [48,66] 100 m 10\u201350 m 10 m 100 m 1\u201310 km 5 km 10 km"]} +{"21683864|12060835": ["Numerous techniques have been developed to allow sensor nodes to harvest different types of energy, such as solar, wireless power transfer (WPT), mechanical vibration, kinetic, and wind energy, from different environments [110] (Figure 2)."]} +{"42787668|4427557": ["low power consumption levels, long range communications and low bit-rate, LPWA technologies have been adopted by several academic and industrial research communities and standards [9]."]} +{"207153562|303976": ["are of significant importance, also for the smart healthcare and wellbeing applications [4, 5]."]} +{"207153562|7988320": ["are of significant importance, also for the smart healthcare and wellbeing applications [4, 5]."]} +{"34603564|17708892": []} +{"59526639|2527194": []} +{"59526639|4427557": ["11ah standard, and are often referred to as Low-Power Wide-Area Networks (LPWANs or LPWA networks) [1]."]} +{"59526639|2535224": ["\u2026research works on managing and using heterogeneous networks, we end up in the Wi-Fi/LTE world, where efforts have taken place to virtualize these networks, including slicing of the network by sharing and isolating infrastructural resources and simplifying the con\ufb01guration and management [7] [8]."]} +{"27087640|4427557": ["In this context, various LPWAN technologies such as SigFox, Weightless, LoRa and Ingenu have been proposed [1]."]} diff --git a/edge/graph_53711911.jsonl b/edge/graph_53711911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a9c4e8cf7897c9ac27269c83597e24cd1624f95a --- /dev/null +++ b/edge/graph_53711911.jsonl @@ -0,0 +1,31 @@ +{"3848604|1262156": ["EMC [9] has defined big data as any attribute that challenges constraints of a system capability or business need."]} +{"16852480|822353": ["Several studies have attempted to apply parallel computing, distributed computing and cloud computing to speed up the calculation process [32,36, 34,35]."]} +{"2906474|16013270": ["With aim to fill this gap, several datasets have been proposed, which are thoroughly reviewed in [12]."]} +{"2505356|1805048": ["The lack of robustness to gross corruption or outliers limits the performance and applicability of PCA; even a small portion of large errors can corrupt the estimation of low-rank structures for biological data [45].", "In this regard, Lin et al [47] used the augmented Lagrange multipliers (ALM) and proposed exact ALM and inexact ALM, which are two algorithms with high accuracy and converge Q-linearly to the optimal solution."]} +{"7813115|513106": ["However, 90% or more of them are primarily self-taught [1,2], and therefore lack exposure to basic software development practices such as writing maintainable code, using version control and issue trackers, code reviews, unit testing, and task automation.", "30% or more of their time developing software [1,2]."]} +{"1015738|206743327": []} +{"1015738|8424228": ["However, similar to consistency, serializability can also not be achieved under network partitions [15]."]} +{"21722744|38200299": ["[13] reviewedmultiple generations of data stream processing frameworks that providemechanisms for resource elasticity to match the demands of stream processing services."]} +{"21722744|16392439": ["Figure 3: Spark architecture, source: [15]."]} +{"21722744|10213552": ["[10] focused on machine learning libraries and their evaluation based on ease of use, scalability, and extensibility."]} +{"21722744|3750204": ["Singh and Reddy [9] provided a thorough analysis of big data analytic platforms that included peer-to-peer networks, field programmable gate arrays (FPGA), Apache Hadoop ecosystem, high-performance computing (HPC)\nclusters, multicore CPU, and graphics processing unit (GPU).", "Singh and Reddy [9] provided a thorough analysis of big data analytic platforms that included peer-to-peer networks, field programmable gate arrays (FPGA), Apache Hadoop ecosystem, high-performance computing (HPC) clusters, multicore CPU, and graphics processing unit (GPU)."]} +{"7505529|7020971": ["In general, the performance of gradient-based methods is highly influenced by the choice of the step size [46], [47].", "The latter ensures an effective (but not necessarily optimal) reduction at each iteration [46], [47], and was found to be satisfactory in terms of both processing time and convergence.", "It is also considered a subcase of the forward\u2013backward splitting algorithm [45], where a forward step is applied by a single progress of the ordinary gradient descent, and a backward step is applied by projecting the result onto the feasible region (see [46] for a survey and detailed discussion on these methods)."]} +{"7505529|11112426": ["A comprehensive overview of unmixing methods with an emphasis on fraction estimation can be found in [29] and [30]."]} +{"18165068|14659095": ["The various numbering scheme of order position of XML tree is discussed in [19,22].", "However, queries that find large number of parameters within non-key attribute in multi-variant data are covered neither by extensive search strategies(XPath, XQuery [15,19]) nor by organizing SSD in conceptual or logical models.", "The matching of both special values as well as sub-tree structure against the parameters are the limitations of the existing techniques, especially when special values are scattered in the hierarchical tree [16,19,20]."]} +{"27073920|5358365": ["In order to support program comprehension, most of the existing approaches [10, 41] are based on static analysis and thus do not provide a complete picture.", "These properties make the object-oriented programs more understandable; nevertheless, cause program behavior to be more complex [10]."]} +{"27073920|16125167": ["There exists large amount of work related to dynamic analysis and program comprehension [15].", "Treemaps are used to visualize hierarchical data in many domains including business [34], news [17][13], and software visualization [15][33].", "After its first inception, different variations of the original treemap have been proposed [15].", "Related work The task of dynamic analysis and visualization focuses on different facets of a program [15].", "Treemap is a popular visualization technique commonly used for information visualization [15, 16][35, 39][6]."]} +{"14593143|365692": ["A survey on the use of evolutionary methods for decision trees induction, including multi-objective approaches, can be found in [3]."]} +{"291288|1895753": []} +{"8091457|16449507": ["This provenance model is based on the proposed Open Provenance Model (OPM) recommendation [55]."]} +{"22282880|393948": []} +{"41454764|11632848": []} +{"41454764|7704963": []} +{"41454764|12894036": []} +{"113621222|5544758": []} +{"113621222|206743327": []} +{"8314969|1704452": [", which reviews a number of rule-based modeling techniques of multicellular biological systems using, among others, agent-based models [10].", "(known as agents) interact locally in order to create a higher level, group behavior [10]."]} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} +{"17239981|14644374": []} +{"23632774|21632806": ["Many software engineering approaches that address the resulting challenges of computational science employ DSLs (Fowler 2010; Stahl and Vo\u0308lter 2006; da Silva 2015; Mernik et al. 2005; Kosar et al. 2008)."]} +{"23632774|513106": ["We selected C++ because it is prevalent in the HPC branch of computational science (Prabhu et al. 2011; Basili et al. 2008; Faulk et al. 2009) and because we could use the code generated by the Ecosystem DSL as a starting point for the API design to keep them as comparable as possible (cf.", "First, C++ is prevalent in the HPC branch of computational science and it is often employed for implementing modern high-performance simulation (libraries) (Prabhu et al. 2011; Basili et al. 2008; Faulk et al. 2009).", "However, Prabhu et al. (2011) in their survey of 114 researchers at Princeton University involved in computational science find that \u201cDSL programmers report higher productivity and satisfaction\u201d when compared with their colleagues who primarily use GPL.", "We selected C++ because it is prevalent in the HPC branch of computational science (Prabhu et al. 2011; Basili et al. 2008; Faulk et al. 2009) and because we could use the code generated by the Ecosystem DSL as a starting point for the API design to keep them as comparable as possible (cf. Section\u2026"]} +{"33941808|239537": []} diff --git a/edge/graph_53715730.jsonl b/edge/graph_53715730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2424062cdb0f2852a7d84ce7ce3e2d77789588a6 --- /dev/null +++ b/edge/graph_53715730.jsonl @@ -0,0 +1,2 @@ +{"21010139|14545307": []} +{"24416856|15744805": ["A survey on this topic has been provided (36)."]} diff --git a/edge/graph_53716504.jsonl b/edge/graph_53716504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11c33b2ff432322b6315c4b1b4d3faebee68f5a2 --- /dev/null +++ b/edge/graph_53716504.jsonl @@ -0,0 +1,15 @@ +{"3352036|18056032": []} +{"10004789|14970359": ["; collecting biometric information such as face [26] and gait signatures [13, 25]; and understanding human motion and activities [9, 4, 16]."]} +{"10004789|7788290": ["; collecting biometric information such as face [19] and gait signatures [20]; and understanding human motion and activities [21], [22]."]} +{"3696962|1520906": ["IoT is expected to generate large volumes of sensor data (Qin et al., 2016)."]} +{"3696962|7329149": ["\u2026the strengths of some related researches namely context-aware open mobile miner (CAROMM) (Sherchan et al., 2012), on-demand mobile distributed sensing platform (C-MOSDEN) (Perera et al., 2015a) and scalable energy-efficient distributed data analytics platform (CARDAP) (Jayaraman et al., 2015).", "Different IoT solutions have been proposed in the literature (Perera et al., 2015b).", "Note that the proposed platform leverages the strengths of some related researches namely context-aware open mobile miner (CAROMM) (Sherchan et al., 2012), on-demand mobile distributed sensing platform (C-MOSDEN) (Perera et al., 2015a) and scalable energy-efficient distributed data analytics platform (CARDAP) (Jayaraman et al., 2015).", "The most widely needed filtering conditions in the mobile crowd sensing applications are location awareness (i.e. spatial), activity awareness, time awareness (i.e. temporal), and energy awareness (Perera et al., 2015a)."]} +{"19552313|10299098": ["The choice of the right service model is application and environment-depending, and may also depend on the level of context-awareness of the involved devices [33].", "nodes is a still challenging research issue [33]\u2013[35].", "Under this perspective, the FC paradigm differs from the related Mobile Edge Computing (MEC) one [7], [8], [33], [34], in which only edge nodes are employed for the device augmentation."]} +{"19552313|32360363": ["The final goal is the \u2018\u2018smart\u2019\u2019 management of the overall city asset [98]."]} +{"19552313|3330461": ["However, due to the multi-hop nature of the Internet backbone and the short-range capability of the network technologies currently envisioned for the support of inter-device communication [25], [26], guaranteeing reliable network connections is a challenging task in the envisioned IoE realm [27], [28].", "However, these (positive) attributes are counterbalanced by the fact that: (i) FNs are small-size data centers with reduced fault-tolerance capability; and (ii) the Device-Fog communication typically relies on short-range WiFi/UWB/\nVOLUME 5, 2017 9887\nBluetooth-based connections that are intermittent, interferenceaffected and failure-prone [58]\u2013[60].", "11/15 transmission technologies, like WiFi, UWB and Bluetooth [25], [126].", "However, in this case, the resulting perconnection round-trip-time RTT becomes quite sensitive on the corresponding (generally, time-varying) inter-vehicle distance d (m) and tends to scale up/down proportionally to it, that is [25], [137], [135]:", "Since the IoE devices could be randomly distributed over the SG, it is expected that theNetwork layer relies on short/mediumrange wireless transmission technologies, like WiFi, UWB and/or Bluetooth [26];\n(iii) the Fog layer is responsible for the management of the massive volume of metered data.", "However, we note that [25]: (i) due to fading and path-loss, the energy consumption of D2D links increases with the inter-thing distance in an (at least) cubic way; (ii) due to thing mobility, D2D mobile links are intermittent, and their average failure rates typically increase with the average thing speeds [131]; and, (iii) under the D2D model, the initiator thing needs, at first, to discover proximate things, and, then, must perform task distribution, thing synchronization and task retrieval.", "For this purpose, the cooperating devices build up D2D links, that typically rely on short-range wireless communication technology, like UWB, WiFi or Bluetooth [25], [26].", "9 will rely on short/medium-range wireless networking technologies, like WiFi, UWB and/or Bluetooth [26]; (iii) thank to the virtualization of the underlying manufacturing things, it is expected that the Fog layer of Fig.", "It operates under the same vehicular scenario previously described for the V-FoE test-bed, but, according to [25], [137], it utilizes only \u201cad-hoc\u201d D2D IEEE802.", "For this purpose, the cooperating devices build up D2D links, that typically rely on shortrange wireless communication technology, like UWB, WiFi or Bluetooth [25], [26]."]} +{"19552313|18037424": ["The underlying networking infrastructure acts as glue: it allows the SG to perform remote metering by (possibly) exploiting the support of smart Energy Storage Devices [95], [96]."]} +{"49564949|206578486": ["Several reviews [7]\u2013[13] have been done on Fog computing.", "Mouradian et al. [13] reviewed Fog architecture and algorithms based on six different evaluation criteria, namely heterogeneity, QoS management, scalability, mobility, federation, and interoperability."]} +{"49564949|12675271": ["[11] reviewed the Fog computing domain from the platform perspectives of developers and end users towards building a sustainable sensing infrastructure for smart city applications."]} +{"49564949|8523192": []} +{"49564949|3767252": ["[141] addressed security and privacy for all edge-level computing."]} +{"67148643|12675271": ["privacy issues of cloud are inherited in fog computing [18]."]} +{"67148643|3767252": ["By keeping this on mind, it has been proposed a three tier security framework for sharing of health data across the web [19] [20][21]."]} diff --git a/edge/graph_53716816.jsonl b/edge/graph_53716816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18c9df1fed652aaebdd49a296d9bc7f41ea69c0d --- /dev/null +++ b/edge/graph_53716816.jsonl @@ -0,0 +1,28 @@ +{"4304429|16557526": ["Visualization of information uncertainty in general and specific to the domain of Geographic Information Science (GIScience) has been studied extensively, cf. e.g. [10], [32], [25]."]} +{"25827396|5476476": []} +{"2901517|206583375": []} +{"51614021|48272": ["An Indoor Positioning System (IPS) is a framework consisting of a network of devices (both customized or off-the-shelf) that are used to wirelessly locate objects or people carrying handheld devices inside a building where outdoor positioning techniques face serious problems to operate properly [3]."]} +{"51614021|9498511": ["In [4], a study of how different environments, structures, equipment, people and even climates affect each and every technique differently is reported."]} +{"5415500|1113420": ["[29] suggest the structure of a context-aware application based on layers."]} +{"16251944|206583375": []} +{"46642131|17325804": ["(AoA,ToA,TDoA, andRSS), coverage, and cost [12, 13]."]} +{"46642131|7278743": [", in the use of wireless headphones), and to facilitate data synchronization between personal devices [58]."]} +{"46642131|206583375": ["[14] omitted inertial navigation, ambient magnetic fingerprinting, the use of encoded patterns in artificial light (fluorescent or LED), ambient light analysis, the use of audible sound transmitted by the infrastructure (some with encoded patterns), RFID where the tags are fixed and the reader is mobile, ZigBee, vision analysis with portable cameras, floor tiles, and the indoor use of outdoor technologies (GPS, cellular, TV, and FM signals)."]} +{"5476476|206583375": ["Thus, the survey in \u200e[12] is somewhat outdated, whereas the authors of \u200e[8] focus only on ultrasonic positioning systems.", "WLAN is the most known solution for indoor positioning \u200e[11]\u200e[12].", "The security and privacy factors are considered important to discuss with Indoor Positioning Systems (IPSs) within Personal Network \u200e[12], where users position people and objects in their home.", "For instance, position system architecture dealing with self-localization can guarantee high degree of privacy and security for users when the estimation of the position is done at the target device \u200e[12].", "The reader may refer to \u200e[8]-\u200e[12] for more information."]} +{"17516613|7365537": ["A review of literature [2], [3], [4], shows various technology options for the design of an ILS which may be ultrasonic(US), infrared (IR), radio-frequency (RF) based systems which may be radio-frequency identification (RFID), received signal strength (RSS) of RF signals, Bluetooth, wireless local area network (WLAN), ultra-wideband (UWB), camera based vision analysis etc."]} +{"17516613|206583375": []} +{"16731713|35462776": ["The graph model can be categorized into five different kinds [35]: place graphs, visibility graphs, generalized Voronoi graph (GVG), fine-grained graphs, and sensor-based graphs.", "An indoor spatial model [35, 122] typically represents the static and mobile real-world objects and their properties such as locations and spatial relationships in indoor moving environment.", "A typical spatial model contains more fine-grained and rich geometric, topological, and semantic information, which can be used to further improve the location estimation and further realize richer and more reliable location services [35, 122, 123].", "Besides, there are other higher level spatial contexts [34] such as indoor maps, landmarks [21], and spatial model [35].", "Combining the geometry, topology, and semantics of indoor spatial models with Kalman filters or particle filters has been one of research hotspots [10, 22, 34, 35]."]} +{"14352318|206583375": []} +{"54918877|6972141": ["In [10], an analysis of primary vision-based localization techniques for mobile robots up to the late 1990\u2019s is proposed, and vision-based techniques are classified into two main categories: Indoor Localization and Outdoor Localization.", "Progresses made in vision-based localization for mobile robots up to 2008 were widely surveyed by [10] and [11]."]} +{"76306|1634674": ["Inspired from the language modelling, grammar-based approaches like (stochastic) context free grammars are applied in representing the complex structural semantics of processes in hierarchical situations [37\u201339].", "Learning the rule of the grammar from training data is a promising alternative, but it has proved to be extremely difficult in the general case [39]."]} +{"13753006|17325804": ["In UTDOA, LMUs measure the time of arrival (TOA) of bursts ordinarily generated by the MS while in dedicated mode (circular multilateration [29, 34] is not viable in this scenario, as the instant when the MS transmitted its burst cannot be known; there is no synchronization between LMUs and MSs) [35].", "As the LMUs share the same clock reference, it is possible to calculate the TDOA between pairs of LMUs, each one yielding a hyperbolic LOPwhose focuses are located at the LMUs coordinates (which are known).", "OTD24, measured by theMS, and RTD24, measured by the LMU, are then reported back to the SMLC.\nFigure 9(a) shows the geometry of an OTDOA-PE positioning, with one single-cell Node B and three PEs (as a minimum of four reference points is needed to provide three hyperbolic LOPs), all placed at known coordinates.", "There is a TDOA measurement for each pair of reference nodes, yielding a hyperbolic line-of-position (LOP) (a LOP is the loci of all points (coordinates) where theMS can be located; i.e., the LOP is the set of all candidate solutions for the MS positioning problem), with the two reference stations as focuses.", "At the SMLC, a system of at least three hyperbolic LOPs is obtained.", "Each pair of reference BTSs yields a hyperbolic LOP [29].", "As two hyperbolas might intercept at two points, at least three hyperbolic LOPs\u2014and therefore four reference nodes\u2014are required to yield an unambiguous position fix."]} +{"13753006|13372227": ["The Federal Communications Commission (FCC) issued the first regulation concerning the availability and accuracy of the localization of such calls in the USA, as far back as 1996 [1, 2]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"17165859|6972141": ["When a camera is used as the receiver, VLC based positioning might look similar to the vision based positioning [15\u201318] which has been developed in robot vision or augmented reality applications, for quite long time."]} +{"17165859|206583375": []} +{"12162546|206583375": ["At a minimum, these algorithms must permit for accurate step counting, although many systems also require accurate step segmentation."]} +{"46940114|3450189": ["Speci\ufb01cally, although broadcasting avoids the need to create and maintain routes, it may be less ef\ufb01cient from the perspective of the total number of consumed messages to ful\ufb01ll an end-to-end communication between two devices [37]."]} +{"5051169|16557526": ["For example, Brodlie et al. [3] outline that uncertainty is a complex topic itself and that many different visualizations can be used to communicate uncertainty."]} +{"4093889|2835258": ["A number of location-aware protocols have been proposed for \u201cad hoc\u201d routing and networking [3]."]} +{"62284990|164835": []} diff --git a/edge/graph_53719054.jsonl b/edge/graph_53719054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe838eb63035e4fb8254492f9a400e0922a134de --- /dev/null +++ b/edge/graph_53719054.jsonl @@ -0,0 +1,2 @@ +{"51889142|791880": []} +{"51889142|12053320": []} diff --git a/edge/graph_53722355.jsonl b/edge/graph_53722355.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3cf8105d7c98e64ea9239c74a25d9e1c1c32e9e2 --- /dev/null +++ b/edge/graph_53722355.jsonl @@ -0,0 +1,16 @@ +{"39419252|3102110": []} +{"22138975|3102110": ["An important topic in KDD is association rule mining (ARM), and the core task in ARM is frequent itemset mining (FIM) [8,13].", "An important extension of traditional ARM and FIM, named quantitative association rule mining (QARM) [14,15,28], was proposed to discover patterns in quantitative databases, where the purchase quantities of items in transactions are considered.", "Algorithms for traditional frequent pattern mining tasks such as frequent itemset mining (FIM) [8,13] and association rules mining (ARM) [3] discover frequent itemsets or association rules by using the support (frequency) of patterns as a constraint to prune the search space.", "This information is not considered by traditional FIM, ARM, or QARM algorithms."]} +{"22355017|7704963": []} +{"22355017|3102110": []} +{"21762679|3102110": []} +{"12507824|3102110": []} +{"657888|14297493": ["Three representative multiplicative perturbation methods like rotation perturbation, projection perturbation and geometric perturbation were proposed by Chen and Liu (2008)."]} +{"3845966|3102110": ["Many algorithms have been proposed to efficiently mine association rules, generally based either on level-wise or pattern-growth approaches (Agrawal et al., 1993; Chen et al., 1996).", "Two fundamental tasks for revealing interesting relationships between items in transactional databases are frequent itemset mining (FIM) and association rule mining (ARM) (Agrawal, Imielinski, & Swami, 1993; Chen, Han, & Yu, 1996; Fournier-Viger et al., 2017)."]} +{"35114339|3102110": []} +{"44105041|53722355": ["ture and Tables (FPUTT) for hiding SHUIs [154]. Then, other faster and more ecient algorithms were developed for PPUM, such as [155], [156]. A recent overview of PPUM has been reported by Gan at al. [157]. 5 Open-Source Software and Datasets 5.1 Open-Source Software Although the problem of UPM has been studied for more than 15 years, and the advanced topic of utility pattern mining also has been exten"]} +{"44105041|44143673": [", frequent pattern mining (FPM) [7], [8], association rule mining (ARM) [9], [10], frequent episode mining (FEM) [11], [12], [13], [14], and sequential pattern mining (SPM) [5], [15], [16], [17]] has been extensively studied.", "Different from FIM, sequential pattern mining (SPM) [5], [15], [16], [17], which discovers frequent subsequences as patterns in a sequence database that contains the embedded timestamp information of an event, is more complex and challenging."]} +{"44105041|11853471": ["sequences, privacy preserving for high-utility pattern mining (PPUM) is more realistic and critical than privacypreserving data mining (PPDM) [148], [149], [150], [151]."]} +{"44105041|3646491": ["episodes [11], and frequent subgraphs [51]."]} +{"44105041|3102110": ["ated using a uniform distribution in [1, 10].", "DATA mining [1], [2] focuses on extraction of information from a large set of data and transforms it into an easily interpretable structure for further use.", "These are important and fundamental data mining techniques [1] that satisfy the requirements of real-world applications in numerous domains.", "Mining interesting patterns from different types of data is quite important in many real-life applications [1], [3], [4], [5], [6].", ") mining but can also serve as inspiration for other data mining tasks [1], [2], including episodemining [11], [12], [13], [14], distributed data mining [45], and incremental/dynamic data mining [46], [47]."]} +{"15053774|3102110": ["[1, 34\u201337] is progressively developed to extract useful and meaningful information or rules from a very large database."]} +{"27215340|3102110": []} diff --git a/edge/graph_53729921.jsonl b/edge/graph_53729921.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec19d3cb97d06bb863037941abbb879be1ea5590 --- /dev/null +++ b/edge/graph_53729921.jsonl @@ -0,0 +1,56 @@ +{"33496259|8323234": ["In mm-wave communication, closed-loop beam training-based methods are proposed for CSI estimation [3], [4], [9]\u2013[11]."]} +{"28831181|15453366": ["To solve the problem, many communications techniques are being developed by researchers [1], [2].", "Millimeter wave (mmWave) technology is one of the leading candidates for the future wireless communications system technology thanks to the following two merits [2]."]} +{"13333529|10979806": ["The use of switches at mmWave and massive MIMO has been motivated by the work in [29]\u2013[31]."]} +{"13333529|8323234": ["HYBRID analog/digital architectures are efficient transceivers for millimeter wave (mmWave) systems [1]\u2013[6].", "As mmWave systems will employ large antenna arrays [5], [6], and mmWave channels are expected to be sparse [14], [26], the number of channel paths will likely be less than the number of antennas, i."]} +{"13347245|8323234": ["In addition, practical issues such as finite-resolution phase-shifters and the effects of partial CSI have been considered in [20] and [21] respectively for designing hybrid precoders."]} +{"13347245|18148591": ["Beamforming and other MIMO techniques are traditionally implemented in the digital domain [5], [6]."]} +{"8633715|8323234": []} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"4502294|3555631": ["System information is broadcast over the anchor cell which also manages most of the radio resource control and signalling, while the small cells play an assistant role, having data offload as a main task [48]."]} +{"206576720|7686677": ["Meanwhile, with excessive power consumption in wireless communications networks, both carbon emissions and operator expenditure increase year by year [2], [3]."]} +{"19306021|8323234": ["A general approach for hybrid precoders design is to maximize the spectral efficiency by minimizing the Frobenius norm of the difference between the digital precoder and the proposed hybrid precoder using basis pursuit [15], [16].", "Due to the higher cost and the power consumption in massive MIMOmmWave communication systems (because of large number of RF chains, containing digital to analog converter (DAC), data converter, mixer etc [16]), DB is not feasible for practical implementations."]} +{"8295786|19938676": ["However, 3.9G long term evolution (LTE) includes capabilities that exceed those of 3G mobile communications [9,10].", "\u2026without encryption due to used analogue modulation, (ii) limited sub-scribers due to used FDMA technique, (iii) power radiation of base station being unsafe and lack of a handoff process, (iv) limited to voice service, and (v) incompatible systems that lack a uni\ufb01ed international standard [8\u201310].", "The EDGE has been added to enhanced the packet-switched services and enabled new high speed data applications such as multimedia applications [9,10].", "However, GSM suffers from a low data rate, which prompted for an improvement in the cellular system by general packet radio services (GPRS) technology [8\u201310]."]} +{"8295786|14765802": ["Data traffic will increase to 82 GB per subscriber per year [1] due to the unprecedented demand for data high bandwidth video streaming, which will represent more than half of global mobile data traffic [2]."]} +{"8295786|2443013": ["Although the joint implementation of these mechanisms may provide very high data rates that are theoretically more than 1 Gbps for stationary users, further increases are limited due to the smaller number of available frequencies [11,16]."]} +{"8295786|24491750": ["The BS accounts for 57 % of the total energy consumption in cellular networks, and the power ampli\ufb01er (PA) has the highest energy consumption of the BS [46]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"9693849|12681089": ["Generally, MIMO channel models fall into two categories: (i) physical models, and (ii) analytical models [14]."]} +{"17484964|8323234": []} +{"4684785|8323234": ["Further, this makes a successive reduction in the dimensions of the precoding matrices, which eases implementing them using hybrid analog/digital architectures [4], [16], [17], [26] with small number of RF chains.", "This may lead to high cost and power consumption in massive MIMO systems [4].", "Another challenge with the large number of antennas lies in the hardware implementation [4], [9].", "This allows the multi-layer precoding matrices to be implemented using hybrid analog/digital architectures [4], [16], [17], [26], which reduces the required number of RF chains.", "Another challenge lies in the entire baseband implementation of these precoding matrices, which may yield high cost and power consumption in massive MIMO systems [4]."]} +{"12886058|15453366": ["Because of the small wavelength of mmWave radio, two dimensional (2D) planar antenna array is a good solution for enhancing the spatial efficiency of the antenna deployment and increasing the transmission diversity and capacity of MIMO systems."]} +{"31909163|8323234": ["This motivates the design of hybrid beamforming that shifts part of operation into the analog domain and implemented using a low-complexity phase array, reducing the number of RF chains and the implementation cost [2]\u2013[4]."]} +{"14288281|15453366": ["11ad, have been proposed to enable multi-gigabit transmission rate to be achieved in short-distance applications [1]."]} +{"21381783|15453366": ["The millimeter wave channel characteristics, to a large extent, dictate the choice of physical (PHY) layer and medium access control (MAC) layer schemes as well as the hardware implementation [11], [12]."]} +{"1699681|8323234": ["in the angular domain is exploited by making use of the extended virtual channel model [2].", "2720856 beamforming/combining stage to avoid the power consumption of the typical all-digital solution used at lower frequencies [2]\u2013[4].", "\u23a2 \u23a2 \u23a2 \u23a3 sm [1] 0 \u00b7 \u00b7 \u00b7 0 sm[2] sm [1] \u00b7 \u00b7 \u00b7 .", "Further, operating at mmWave frequencies complicates the estimation of the channel because the signalto-noise-ratio (SNR) before beamforming is low and the dimensions of the channel matrices associated with mmWave arrays [2], [5] are large."]} +{"42482031|8909218": ["Heterogeneous networking has gained considerable attention from academia and industry [135\u2013138]."]} +{"24818681|8323234": ["aperture [10]."]} +{"24818681|15453366": ["MmWave solutions promise to deliver high data rates by exploiting the large bandwidth available at carrier frequencies from 30 GHz to 300 GHz for both indoor [2] and outdoor [3] wireless systems."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"802697|15453366": ["Based on measurement results of millimeter wave channels in [28], [40], [41], the Rayleigh fading model can be adopted to describe the considered millimeter wave wireless channels."]} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"19919524|15453366": ["Using large bandwidths (up to 1 GHz) available at the millimeter wave (mmWave) frequencies for communication systems is one proposed solution to combat the exponential rise in the demand for data traffic [1-4]."]} +{"9749319|8323234": []} +{"3021451|15453366": ["2520912 challenge of bandwidth shortage [1]\u2013[3]."]} +{"6314925|15453366": ["These range from the deployment of highly directional antennas [12], [14]\u2013[16] to the application of multi-beam directional arrays that radiate in multiple directions [17], [18]."]} +{"15449163|18687271": ["[52] provided three distributed mobility management protocols, the first is based on the existing Proxy Mobile IPv6 (PMIPv6), the second is based on SDN, and the third is based on routing protocols.", "Proposed solutions: Inter-tier, intra-tier, and multi-RATs handoff mechanisms, and a mechanism for secure handoff [40, 93, 102, 52], which we will discuss in Section 5."]} +{"15449163|3330461": ["For a detailed review of D2D communication, interested readers may refer to [24]."]} +{"4682791|18148591": ["The aim is to achieve reliable communication close to theoretical limits [2]."]} +{"26667032|8909218": ["FBSs are typically installed impromptu in the residential domain or small office/home Office (SOHO) and provide wireless cellular access to a closed or open group of subscribers as configured by the subscriber and/or the service provider [5].", "They are seen as an alternative to traditional MBSs for increasing coverage, quality of service (QoS), capacity and energy efficiency (EE) [5], [6]."]} +{"17976129|595093": ["With the increasing demand for high-speed communication and flexible network architecture, the academia has paid much attention to new technologies for the next generation network [1] [2]."]} +{"111600724|12206204": ["In his survey, Pirinen briefly mentioned quite a few of them and their contributions [15]."]} +{"10251731|8323234": ["Compared to architecture A1, the maximum gain of each transceiver is reduced by a factor 1 /L r ."]} +{"62769313|25929315": ["The risk is then a collapse of current wireless cellular systems under the weight of the signaling traf \ufb01 c generated by MTDs [10].", "For this reason, the PRACH overload problem has been attracting the attention of the scienti \ufb01 c community, and many possible methods to improve the RACH procedure have been proposed [10].", "The interested reader is also referred to [10] for a different classi \ufb01 cation of (most of) these schemes."]} +{"8508945|17966235": []} diff --git a/edge/graph_53730401.jsonl b/edge/graph_53730401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9478ec61bb86ee800560fec1e4478bdcccc7cf9 --- /dev/null +++ b/edge/graph_53730401.jsonl @@ -0,0 +1,18 @@ +{"5021660|3757239": []} +{"5021660|6909107": ["Additionally, many researchers have studied different aspects of MEC [11]\u2013[13], and many the current study is for proposing architectures and/or derivation and analyzing the computation offloading from mobile nodes to MEC servers."]} +{"6380723|35867035": ["The cellular infrastructure is composed of eNodeBs connected to the LTE Evolved Packet Core (EPC) [7]."]} +{"53102302|3450996": ["The aforementioned scenario in fact is just like data offloading through opportunistic mobile networks [12]."]} +{"53102302|38911919": [", it tries to prolong the lifetime of a cluster to keep a stable topology [13]\u2013[15].", "Then it claims itself as the cluster head [13]."]} +{"21404231|4427557": ["15 km in open area with strong penetrability [8], [9]."]} +{"44083468|3450996": ["To improve the performance of data forwarding in MSNs, a significant problem in the research of MSNs is to measure the centrality (importance) of nodes in the network [9]\u2013[11]."]} +{"53231681|3450996": ["For instance, the surveys in [1]\u2013[3] discussed the potentials of deploying the technique of content caching in mobile networks."]} +{"5798522|763939": []} +{"51955132|3450996": []} +{"22902456|19938676": ["In addition, promising technologies, such as small cell [5], [6], cognitive radio [7], massive multiple-input multiple-output [8], [9] and network function virtualization [10], contribute significantly to improving the resource utilization efficiency."]} +{"22902456|3453202": ["In addition, promising technologies, such as small cell [5], [6], cognitive radio [7], massive multiple-input multiple-output [8], [9] and network function virtualization [10], contribute significantly to improving the resource utilization efficiency."]} +{"22902456|26398795": ["An in-depth analysis of the different proposals for vehicular DTNs is provided, and the DTN proposals are classified according to the type of knowledge needed to route messages in [21]."]} +{"22902456|763939": ["The Manhattan grid model is adopted as the vehicle mobility model in this paper [33], [34]."]} +{"5112113|1229096": ["Different approaches to motion planning for self-driving cars and their computational complexity is discussed in [6]."]} +{"7440396|35867035": ["Performances evaluation and conclusions are presented in Sections IV and V."]} +{"14169333|19938676": ["and circuit switching in its design [8] as shown in Fig."]} +{"11357584|4787452": []} diff --git a/edge/graph_53734319.jsonl b/edge/graph_53734319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53734567.jsonl b/edge/graph_53734567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b58c745b8df9d6b3a8f98616943413e0864d691e --- /dev/null +++ b/edge/graph_53734567.jsonl @@ -0,0 +1,20 @@ +{"20591383|36784649": []} +{"3439578|3330313": ["outlier detection [13], [14] are well established areas in their own right, but much less research has been conducted on how to treat unknown samples in an incremental context, which is the focus of this work."]} +{"3630237|10657013": ["[21] outline ways to extend existing closed set intrusion detection approaches for open set scenarios."]} +{"8739786|192934": ["In traditional pattern recognition area, two main tasks are clustering and classification [11]."]} +{"10657013|12595430": [", [5]\u2013[7], some specifically discussing machine learning intrusion detection techniques [1], [8]\u2013[10]."]} +{"10657013|18567112": ["This can be seen by comparing our survey to parts of [20], in which Faruki et al."]} +{"31330156|10657013": ["In a recent survey, Rudd et al. [11] demonstrated that NIDSs cannot rely on the fact that it knows all types of possible attacks."]} +{"17686631|18977370": ["card or mobile phone fraud detection [6,7], video surveillance [8,9], mobile robotics [10,11], sensor networks [12], astronomy catalogues [13,14] and text mining [15].", "Other surveys have focused on novelty detection methods used in specific applications such as cyber-intrusion detection [6,42,7] and wireless sensor networks [12]."]} +{"17686631|36784649": ["A number of surveys have been published since then [26\u201332,24], but none of these attempts to be as wideranging as we are in our review.", "Some novelty detection methods have been the topic of a number of other very brief overviews that have recently been published [31,38\u201341,32]."]} +{"17686631|3330313": ["Hodge and Austin [29], Agyemang et al. [30], and Chandola et al. [36] provide comprehensive surveys of outlier detection methodologies developed in machine learning and statistical domains.", "According to Hodge and Austin [29], this approach is analogous to a semi-supervised recognition approach, which they term novelty detection or novelty recognition.", "Three fundamental approaches to the problem of outlier detection are addressed in [29].", "detection methods are grouped into \u201cstatistical models\u201d and \u201cneural networks\u201d in [29,30].", "According to Hodge and Austin [29], most \u201cstatistical\u201d and \u201cneural network\u201d approaches require cardinal or ordinal data to allow distances to be computed between data points.", "The surveys [29,30,24] agree that approaches to anomaly detection can be supervised, unsupervised, or semi-supervised.", "This survey builds upon the three previous methods discussed in [29,30,36] by expanding"]} +{"21277286|3330313": ["Outlier detection techniques [ Hodge and Austin, 2004 ] could be employed if we treat unseen class instances as outliers.", "The outlier detection problem [ Hodge and Austin, 2004 ] requires the identi\ufb01cation of anomaly instances from a given data set."]} +{"14383042|36784649": []} +{"16386489|192934": ["T RADITIONAL pattern recognition involves two tasks [14]: clustering learning and classi\ufb01cation learning."]} +{"8071648|9045232": ["Based on a survey [21] on face detection, existing face detection approaches are grouped into four categories: knowledge-based methods, template-based methods, feature invariant methods, and appearance-based methods."]} +{"784912|359842": ["Different Types of Attributes Papers User-defined attributes [32], [9][11][42], [43][18], [33], [34], [35], [36], [37][40][18][38], [39][44] Relative attributes [21][48][24][46], [47][22][45] Data-driven attributes [50][51][12], [17][11], [13][17][52] Video attributes [53][54][53][55][56], [57][58][59]", ", age and gender) [38], [39], product attributes (e."]} +{"24089567|3330313": ["As mentioned by Hodge and Austin (2004), a Type-3 method \u201caims to de\ufb01ne a boundary of normality\u201d.", "As presented by Hodge and Austin (2004), there are three fundamental approaches for the problem of outlier detection: Type 1 \u201cDetermine the outliers with no prior knowledge of the data."]} +{"3641676|11608263": ["Note that although multi-label classification (Huang et al., 2013; Zhang and Zhou, 2006; Tsoumakas and Katakis, 2006) may also leverage multiple sigmoid functions, Eq."]} +{"6207817|10657013": ["Something to take into account as well are the \ufb01ndings from [3].", "Several techniques can be employed to perform signature matching, including exact/partial matching, formal grammars, and machine learning [3]."]} +{"6207817|12815020": []} +{"2988131|36784649": ["One-class classification or novelty-detection handles data where only positive examples are available and has been applied to several domains[13]."]} diff --git a/edge/graph_53737784.jsonl b/edge/graph_53737784.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..896e43bffafa31b4d5fc9298ba4676989ffd7a5f --- /dev/null +++ b/edge/graph_53737784.jsonl @@ -0,0 +1,28 @@ +{"39571923|1805048": []} +{"39320639|7919236": ["It is also recognized that displayed recommendations can improve the reputation of items, even if the predicted rating is low [23]."]} +{"119858802|1805048": ["Memory-based methods use a given similarity metric to act directly on the user-item rating matrix, which contains the ratings of all of the users who have expressed their preferences on the items [1, 9, 10, 16-19].", "These methods include probabilistic models [19, 21, 22], clustering models [8, 13, 23, 24], dimensionality reduction techniques [25, 26], pattern mining approach[14], latent semantic models [20], and Markov decision process-based CF systems [22, 27]."]} +{"2980873|1805048": ["To solve this problem, matrix factorization algorithms are the workhorse methods of choice [20, 32]."]} +{"32242397|4859605": []} +{"32242397|1805048": ["Clustering methods and CF\nCF is one of the methods widely used in recommender systems sing two different techniques, memory-based and model-based Breese, Heckerman, & Kadie, 1998; Su & Khoshgoftaar, 2009 )."]} +{"46428079|4411601": []} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"30477244|18540015": []} +{"7259012|1805048": ["Following the classification of traditional CF-based RSs [2,3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches.", "CF approaches can be further grouped into model-based CF and neighborhood-based CF [2,3].", "Following the classification of traditional CF-based RSs [2] [3], we classify CF-based social RSs into two main categories: Matrix Factorization (MF) based social recommendation approaches and Neighborhood based social recommendation approaches."]} +{"34645985|1805048": ["\u2026approaches in the recommender systems (Javari & Jalili, 2014a; Bojnordi & Moradi, 2013; Adomavicius & Tuzhilin, 2005; Gharibshah & Jalili, 2014; Herlocker, Konstan, Terveen, & Riedl, 2004; Ramezani, Moradi, & Akhlaghian, 2014; Yu, Schwaighofer, Tresp, Xu, & Kriegel, 2004; Su & Khoshgoftaar, 2009).", "Several model-based methods have been proposed in the literature including: Bayesian belief nets (Miyahara & Pazzani, 2000; Su & Khoshgoftaar, 2009), dimensionality reduction techniques (Goldberg, Roeder, Gupta, & Perkins, 2001), clustering models (Javari & Jalili, 2014a; Birtolo & Ronca, 2013;\u2026"]} +{"6689600|1766884": ["It initializes the highest density point as the first centroid and automatically computes minimum distance that separates the centroids based on highest density point, which is close to maximum number of other points in the data set [33]."]} +{"8641477|1805048": ["A few excellent surveys that provide more detailed descriptions of the prominent collaborative filtering algorithms are also available [1,21]."]} +{"4876217|14148655": ["\u2026users tend to visit very popular items and select similar items, while old users usuallyhavemorespecificinterests[53,54],andusersbehavemuchdifferentlybetweenlow-risk(e.g.,collectingbookmarks, downloading music, etc.) and high-risk (e.g., buying a computer, renting a house, etc.) activities [55,56]."]} +{"4876217|4859605": ["The tripartite network representation has found its application in collaborative tagging systems (also called folksonomies in the literature) [79, 80, 81, 82], where users assign tags to online resources, such as photographs in flickr.", "In [82], the present tag-aware algorithms are"]} +{"4876217|207372751": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices.", "Some challenges can also be partially solved by hybridization, for example, the link prediction algorithm can be used to generate artifical links that could eventually improve the recommendation in very sparse data [123, 319]."]} +{"4876217|18540015": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices."]} +{"4876217|1805048": ["For additional information see the recent review articles [123,124], and [125] is a nice survey that contains a number of similarity indices.", "[15,123]), many hybrid algorithms are proposed to avoid certain weaknesses in each approach and thereby improve the recommendation performance."]} +{"22475926|1805048": ["[139] presented a comprehensive review on collaborative filtering techniques; Burke et al."]} +{"690561|1805048": ["We implement and use collaborative filtering as a more compound target in a nonparametric model distinct from the usual objectives like classification [3]."]} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"3663177|7919236": []} +{"157130781|207372751": []} +{"3982621|8047599": ["In fact, the two desired matrices need to meet the requirement that the dot product between pu and qi is close to the known value ru,i in the rating matrix [39]."]} +{"3982621|17641462": ["In recent years, an increasing number of individuals prefer to watch movies or TV plays using mobile applications [50]."]} +{"3982621|1805048": [", the Bayesian network, random walk, deep learning, etc [20], [51], [52].", "Themetrics of recommender systems are divided into three categories [20], i."]} +{"36001119|1805048": ["RSs have to evaluate very large user and item sets, where the user-item (U-I) matrix is extremely sparse\u2013 such data sparsity has always been the chief challenge of RS [27]."]} +{"434235|9659809": ["In addition, while users interact with each other, they establish new relationships and adapt existing ones [2, 27]. means that users\u2019 trust and distrust relationships evolve too.", "In Slashdot 2 users post news and comments, and they can tag other users as friends or foes. analyses in relevant studies point out that users might accept recommendations from their trusted users, but will certainly not rely on their distrusted foes [27, 29]."]} diff --git a/graph_5374007.jsonl b/edge/graph_5374007.jsonl similarity index 100% rename from graph_5374007.jsonl rename to edge/graph_5374007.jsonl diff --git a/edge/graph_53743386.jsonl b/edge/graph_53743386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7246834fcb7eefa36c8de14dbd9bf82828affd42 --- /dev/null +++ b/edge/graph_53743386.jsonl @@ -0,0 +1,3 @@ +{"7844020|10124745": ["In general, drawmetric concepts are based on the recall of a previously memorized shape, sketch or gesture [12]."]} +{"17112605|9913343": ["For a larger review of the graphical password landscape, we refer to the reader to two surveys [8, 23]."]} +{"651758|9913343": ["One might notice that our categorization of graphical passwords differs from most literature [7, 28, 35, 36], where a boundary line was drawn between recognition and recall."]} diff --git a/edge/graph_53745664.jsonl b/edge/graph_53745664.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bd638a356a5690f012f7bb68ffc3f04641066a3 --- /dev/null +++ b/edge/graph_53745664.jsonl @@ -0,0 +1,6 @@ +{"207172599|3330313": []} +{"13856501|11608263": []} +{"12962550|206990190": ["The aforementioned approach is quite effective in helping operators identify valuable knowledge [Potharaju et al. 2013] and can also be extended to build more powerful models such as Fault Tree Analysis [Ruijters and Stoelinga 2015] (FTA) and Event Relationship Network [Thoenen et al. 2001] (ERN).", "FTA is one of the most prominent techniques used by a wide range of industrial applications, in which Fault Tree (FT) is encoded as a graph that models how failures propagate through the system (i.e., how component failures lead to system failures) [Ruijters and Stoelinga 2015]."]} +{"12962550|14976110": []} +{"1800785|16156203": ["One fundamental problem in temporal data mining is to discover hidden temporal dependencies in the sequential data [23] [11] [13] [8] [29]."]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} diff --git a/edge/graph_53749112.jsonl b/edge/graph_53749112.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2d88050d6b75834d766834095f4657157755645 --- /dev/null +++ b/edge/graph_53749112.jsonl @@ -0,0 +1,30 @@ +{"27985304|4680026": []} +{"45179467|6972141": []} +{"30212945|61132": ["The UAVs can be integrated also into communication systems [2] for provisioning of wireless connectivity in sparsely populated areas, or where building entirely new mobile network infrastructure is complicated or commercially ineffective (e."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"46933660|61132": ["For an instance, the battery capacity of a small-type UAV with a payload of 300 g is only around 5200 mAh, which is equivalent to eight alkaline batteries [10]."]} +{"51982364|4680026": []} +{"51982364|1940388": ["lot of previous works in a computer network research (such as [25], [26])."]} +{"24757017|1230643": ["During the last decade, wireless sensor networks (WSNs) have attracted intensive attention due to its easy deployment and enormous application potential in battlefield surveillance, environmental monitoring, biomedical observation and other fields [1]\u2013[4].", "For the other parameters, data rates of sensors are randomly generated within [1, 10]kb/s."]} +{"53743305|61132": ["The third category considers using the UAVs as BSs to serve the mobile UEs, where UAVs are usually all connected to and controlled by control stations [19]."]} +{"59621977|9171235": []} +{"59621977|4680026": []} +{"505889|61132": ["It was shown in [4] that the power consumed in the BS can limit the flying time of the UAV-BS by 16%.", "UAVs often use batteries to power their rotors and onboard electronics [4]."]} +{"58676003|21386749": ["AS SMART services like metering, city or building lights management, environment monitoring, and vehicle traffic control, become pervasive in urban areas, the Internet of Things (IoT) technology emerges with the expectation to implement the inter-networking of a huge number of devices [1]."]} +{"13349749|61132": ["The work in [14] reported that the energy consumption during data transmission and reception is much smaller than the energy consumption during the UAV hovering, i.e., it only constitutes 10 % -20 % of the UAV energy capacity.", "Actually, the power consumed by the UAV during data transmission and reception is much smaller than the power consumed during the UAV hovering or traveling [14]."]} +{"52931489|4680026": []} +{"15500497|14441987": ["S. Jha is with the School of Computer Science and Engineering, University of New South Wales, Sydney 2052, Australia (e-mail: sjha@cse.unsw.edu.au).", "A. V. Savkin is with the School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney 2052, Australia (e-mail: a.savkin@unsw.edu.au)."]} +{"52934391|4680026": ["Generally, approaches used for mobile robot navigation can be classified into two categories: global path planning techniques and sensor-based techniques [1].", "A survey of available navigation techniques for mobile robots can be found in [1]."]} +{"77391350|4680026": ["Instead of extensively studying the collision avoidance problem like [14-18], we consider a simple model here."]} +{"20029755|4680026": ["[9\u201316]."]} +{"4680026|6972141": ["[33, 63], employs the capability of the visual sensor"]} +{"4680026|1517662": []} +{"64643926|5909964": []} +{"11511362|10813427": ["Although many techniques have been developed for interactive rendering of terrain models [22], [23] we have found that even simple structures and rendering are suf\ufb01cient given the relatively modest search areas coverable by mini-UAVs."]} +{"52017618|61132": ["operations on the battery consumption, with a comprehensive survey available in [15].", "Solutions for terrestrial technology such as cross-layer energy-efficient communication, when mapped to UAVs, are unlikely to make a significant impact [15].", "of energy drained by the communication module can represent only a small fraction of the energy drained by the rotors [15],"]} +{"20548183|4680026": []} diff --git a/edge/graph_53750327.jsonl b/edge/graph_53750327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9239c231d2a42eeae6340c22d6136b27351be2f --- /dev/null +++ b/edge/graph_53750327.jsonl @@ -0,0 +1,28 @@ +{"12450423|8530790": []} +{"2472445|14659766": [", 2014b] basis [Rice, 1976; Smith-Miles, 2009; Kotthoff, 2014] has been successfully addressed by using EPMs to predict the performance of all candidate algorithms and selecting the one predicted to perform best [Brewer, 1995; Lobjois and Lema\u0131\u0302tre, 1998; Fink, 1998; Howe et al."]} +{"2472445|2840997": ["SAT is the prototypical NP-hard decision problem and is thus interesting from a theory perspective; modern SAT solvers are also one of the most prominent approaches in hardware and software verification [92]."]} +{"13217134|33583074": ["A common way of better understanding unconstrained optimisation problems is to use one of the many proposed fitness landscape analysis techniques [8].", "For problems above two dimensions, a fitness landscape can no longer be visualised as easily, but can be approximately characterised using fitness landscape analysis techniques [8] to better understand the nature of the objective space."]} +{"44263178|14659766": ["To exploit this complementarity of algorithms, algorithm selection systems [11, 6, 8] are used to select a well-performing algorithm for a new given instance."]} +{"21738792|33583074": ["We can find other landscape features and landscape analysis techniques in recent surveys (Malan and Engelbrecht 2013; Mu\u00f1oz et al. 2015), especially the reference Mu\u00f1oz et al.", "A number of landscape features are summarized in the recent surveys (Malan and Engelbrecht 2013; Mu\u00f1oz et al. 2015).", "We can \ufb01nd other landscape features and landscape analysis techniques in recent surveys (Malan and Engelbrecht 2013; Mu\u00f1oz et al. 2015), especially the reference Mu\u00f1oz et al. (2015) summarizes the landscape analysis techniques from the viewpoint of the algorithm selection for black-box continuous\u2026"]} +{"7369630|3053192": ["It has been suggested independently in a number of \ufb01elds under different names, such as memetic computation [9], algorithm selection [10], algo-rithm portfolio [11], ensemble learning [12] and hyper-heuristics [13].", "The \ufb01rst proposal of a multiple algorithm approach dates back as early as 1963, according to the survey by Burke et al. [13]."]} +{"52073053|14659766": []} +{"261945|5281246": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|14659766": ["A full coverage of the wide literature on algorithm selection is beyond the scope of this article, but we refer the interested reader to recent survey articles on the topic [63,91,93,108]."]} +{"261945|2840997": ["applications including formal verification [81], scheduling [20], planning [59] and graph coloring [110]."]} +{"2499746|14659766": ["The interested reader is referred to a recent survey [8] for additional information on algorithm selection."]} +{"2964947|33583074": ["Once characteristics are identified, they can be used to predict the problem difficulty [8], [9] or to select an appropriate algorithm to use when solving the optimization problem [10]\u2013[12]."]} +{"2964947|14683003": ["is a difficult problem, especially for continuous variables [48] (see [49] for a review of methods)."]} +{"2711775|59943180": []} +{"18097325|11608263": ["\u2022 Method 1: Decomposition of multi-label instances into several single-label instances [26]."]} +{"644234|14659766": []} +{"34183812|9315938": ["The idea of linkage-based problem solving has been realized in various branches of evolutionary algorithms, such as estimation-of-distribution algorithms (EDAs) (Larra\u02dcnaga and Lozano, 2002; Pelikan et al., 2002) and topological linkage-based ge-netic algorithms (TLBGAs) (Seo and Moon, 2003)."]} +{"49666684|14659766": ["Per-instance automatic algorithm selection (AS) [12] aims for selecting an algorithm from a so-called portfolio of algorithms on a per-instance basis, which most likely will perform best on the instance at hand (see [10] for a survey).", "\u2026has been conducted, mainly focussing on generating machine-learning-based algorithm selection models, which make use of instance features \u2013 see [10] for a general overview and [8] for the most recent study on per-instance-based automated algorithm selection on the Euclidean Traveling\u2026"]} +{"15286452|8530790": []} +{"6082790|8530790": ["\u2022 A survey and discussion of evolutionary algorithms in multiobjective op-\ntimization (Fonseca and Fleming, 1995d).", "85\n4.5.1 Simple GA with Pareto-ranking . . . . . . . . . . . . . . . 86 4.5.2 Simple GA with Pareto-ranking and sharing . . . . . . . . 89 4.5.3 Simple GA with Pareto-ranking, sharing and mating re-\nstriction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89\n4.5.4 Progressive articulation of preferences . . . . . . . . . . .", "\u2022 A unified, scale-independent preference articulation framework for multiob-\njective and constrained optimization (Fonseca and Fleming, 1995b).", "\u2022 The application of multiobjective GAs to gas turbine controller optimization (Fonseca and Fleming, 1995c), with emphasis on the characterization\nof the cost surfaces involved, and on the ability for a human decision maker to interact with the genetic algorithm as it runs.", "\u2022 A technique for the visualization of the cost surfaces induced by non-\naggregating multiobjective cost assignment strategies such as Pareto-ranking (Fonseca and Fleming, 1995b; Fonseca and Fleming, 1995d)."]} +{"15641703|2373140": ["Many real-world vehicle routing problems are of dynamic nature [20]."]} +{"11149239|14808716": ["9 represents any top-down decision tree induction algorithm (Rokach and Maimon 2005a) with the following modification: the decision tree is not pruned and at each node, rather than choosing the best split among all attributes, the inducer randomly samples N of the attributes and choose the best\u2026"]} +{"11149239|1097238": ["These techniques alter the way the induction algorithm traverses the hypothesis space (Brown et al. 2005).", "However, in the classification context, there is no complete and agreed upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005).", "Brown et al. (2005) suggested a taxonomy of methods for creating diversity in ensembles of classifiers: varying the starting points within the hypothesis space; varying the set of hypotheses that are accessible by the ensemble members (for instance by manipulating the training set); and varying the\u2026", "While it is very simple way to gain diversity, it is now generally accepted that it is not sufficient for achieving good diversity (Brown et al. 2005).", "upon theory to explain why and how diversity between individual models contribute toward overall ensemble accuracy (Brown et al. 2005)."]} +{"36482639|8530790": ["nament selection make scaling information negligible (Fonseca and Fleming, 1994; Fonseca and Fleming, 1995d)."]} +{"361238|8530790": ["The same is true with Fonseca and Fleming\u2019s (1995) test problem FON."]} +{"16558215|14659766": ["For more information we refer the reader to the following surveys [11], [12]."]} +{"16885033|33583074": ["In the last twenty years, a number of FLA metrics have been proposed (see survey papers in FLA [4] [5] [6])."]} diff --git a/edge/graph_53752448.jsonl b/edge/graph_53752448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..843d5ba8bed78d21d378f54c859329902caccdb1 --- /dev/null +++ b/edge/graph_53752448.jsonl @@ -0,0 +1,5 @@ +{"12767870|192934": ["This seems underconstrained, especially when rules of thumb suggest that one needs ten times more examples than features (Jain et al., 2000)."]} +{"2045132|6670217": ["[23]."]} +{"12900876|6670217": []} +{"33555847|17623572": ["Security [3,18] is one of most important issues in various computing environments."]} +{"8506216|11894197": ["To discover the optimal set of features that drives better results, we applied the sequential forward selection (SFS) algorithm [14]."]} diff --git a/edge/graph_53753063.jsonl b/edge/graph_53753063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3456f5c8140737e91844316e2bd5d5f16c097f3e --- /dev/null +++ b/edge/graph_53753063.jsonl @@ -0,0 +1,101 @@ +{"4585049|393948": []} +{"4234660|205694962": ["Multi-modality images includingMRI and PETare providing powerful imaging modalities to help understand the anatomical and neural changes related to AD (Alberdi et al. 2016;\nLi et al. 2014; Liu et al. 2015; Zhang et al. 2011)."]} +{"1946654|9928823": ["Compared with the conventional machine learning techniques, deep learning has shown some advantages [5, 6].", "The deep architectures and algorithms have been summarized [5, 6]."]} +{"1946654|393948": ["CNN with deeper architecture might outperform other approaches by increasing the training data and applying the training strategy of transfer learning and fine-tuning [13].", "Deep neural networks (DNN) were found effective for task-specific high-level feature learning [13] and thus were used to detect MRI brain-pathology-specific features by integrating information frommultimodal MRI."]} +{"206917357|37099732": []} +{"206917357|3519414": []} +{"206917357|23774449": []} +{"206917357|2088679": []} +{"206917357|4820875": []} +{"206917357|5835640": []} +{"3742901|3519414": []} +{"3742901|2088679": ["7 [8], including those in image analysis [33, 34], genomics [7, 27] and drug discovery and repurposing [30, 31]."]} +{"52137950|2088679": []} +{"4820875|6863252": ["Four developments stand out:\n\u2022 Registration research has focused largely on nonlinear registra-\ntion (or \u2018curved\u2019 registration, as it was called in the original article); see ( Sotiras et al., 2013 ) for a record of recent advances\non this topic.", "There is a multitude of publications on nonlinear registration, witness the > 400 references on such methods in the survey article of Sotiras et al. (2013) ."]} +{"51985429|4820875": []} +{"51985429|3644401": []} +{"6373134|393948": ["in machine learning [23], computer vision [25], and many other", "[23], [24] are developed to extract latent information, which can"]} +{"52004495|5835640": ["These methods tend to suffer from the curse-of-dimensionality when the number of predictor variables is large, which can render K-means and Gaussian mixtures models cumbersome to use for high dimensional medical images (Mwangi et al 2014)."]} +{"4574018|6863252": ["registration methods [18] classifying methods on the basis of the core registration components: (i) deformation models, (ii) matching criteria, and (iii) optimization."]} +{"4574018|206051485": ["They are also referred to as area-based methods [37] or iconic methods [38]."]} +{"4574018|7861381": ["Holden has reviewed non-rigid geometric transformation models [19]."]} +{"20143867|393948": ["Typical gradient-based backpropagation algorithm can be used for training single AE [34], [35].", "Speci\ufb01cally, we introduce a stacked autoencoder (SAE) [34], [37], [38], [42] with convolutional network architecture [41], [43] into our un-supervised learning framework.", "However, since the learned features are found using only a single layer, or a shallow model [34], the selected features may lack high-level perception knowledge (e.g., shape and context information) and may not be suitable for correspondence detection.", "Recently, unsupervised deep learning feature selection techniques have been successfully applied to solve many dif\ufb01cult computer vision problems [30], [34]\u2013[42]."]} +{"20143867|206051485": ["2496253 individual subjects to the reference space [1]\u2013[5]."]} +{"4108581|8507227": ["A survey of studies on ML in computer-aided diagnosis has been reported [8], and a collection of studies on ML in computer-aided diagnosis and medical image analysis can be found in books [6, 20]."]} +{"53240811|2088679": ["Database Training Validation Test Resolution CVC-Colon [5] [1-76], [98-148], [221-273].", "CVC-Clinic [114] [26-50], [104-126], [178-227], [253-317], [384-503], [529-612].", "This shift is especially true for image analysis, where recent years have seen over 300 contributions to the field [39]."]} +{"22432448|14434529": []} +{"22432448|2809360": []} +{"30207814|2088679": []} +{"49434640|4570087": ["Each of them is further arranged based on the implementation details [22].", "Specifically, we first calculate the semantic distance between two samples via high-level layers of a CNN model [22], together with the Hamming distance using a local descriptor."]} +{"18121764|8604408": ["Bayesian networks [38], [39] are a particular case of network"]} +{"4641273|3908281": []} +{"4641273|2088679": ["Deep learning has been used to classify lesions and nodules; localize organs, regions, landmarks and lesions; segment organs, organ substructures and lesions; retrieve images based on content; generate and enhance images; and combine images with clinical reports [40,41]."]} +{"4641273|3953553": []} +{"4641273|13370607": []} +{"48361766|2088679": []} +{"3847983|20404279": ["Also, there is a recent review paper on GAN [15] which reviews several GAN architectures and training techniques, and introduces some applications of GAN."]} +{"3847983|4875951": ["This problem is related to style transfer [68] [69], which takes a content image and a style image and output an image with the content of the content image and the style of the style image."]} +{"8732271|7559976": ["EQ-TARGET;temp:intralink-;e009;326;457 1\u20442\u03a6A\u00f0I\u00de \u2248 R1\u20442\u03a6\u00f0Is\u00de \u2248 GT: (9)"]} +{"3797027|18599847": ["The original BMs have not been demonstrated to be useful for practical problems, while RBMs are commonly used in deep learning.", "For instance, deep belief networks (DBNs) and stacks of restricted Boltzmann machines (RBMs) [3,48,49] have been applied in speech and image recognition [3,45,50] and natural language processing [51].", "Similar to AEs, RBMs can also pre-train parameters for a complex network.", "For instance, sequenced-based predictor of protein disorder using boosted ensembles of deep networks (DNdisor-der), a deep neural network with multi-layers of RBMs [184], achieved an average balanced accuracy of 0.82 and an AUC of 0.90.", "This restriction ensures the conditional independency of hidden units and visible units [91], i.e. , P \u00f0 h j v \u00de \u00bc P i p \u00f0 h i j v \u00de P \u00f0 v j h \u00de \u00bc P j p \u00f0 v j j h \u00de \u00f0 10 \u00de Furthermore, most RBMs rely on the assumption that all units in the network take only one of the two possible values 0 or 1, i.e. , m j ; h i 2 \u00f0 0 ; 1 \u00de .", "To predict splice junction at the DNA level, Yoon and his collaborators developed a novel DBN-based method that was trained on the RBMs by boosting contrastive divergence with categorical gradients [156].", "SAEs and RBMs can extract patterns from unlabeled data [186] as well as labeled data when stacked with a classi\ufb01er [156].", "A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101].", "Inaddition to feature extraction, RBMs can also learn distributions of unlabeled data as generative models, and classify labeled data as discriminative models (regard the hidden units as labels).", "RBMs restrict the BMs to a bipartite graph, i.e. , there are no connections within visible units m \u00bc x or hidden units (cid:2) h .", "RBMs are generative graphical models that aim to learn the distribution of training data.", "Similar to RBMs, DBNs can learn the distribution of the samples, or learn to classify the inputs given class labels [3].", "Overall, given the network architectures and optimized parameters, the distribution of the visible units could be computed as: A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101]."]} +{"13972466|2088679": ["\u2026machine learning tasks, such as image classi\ufb01cation [Esteva et al., 2017, Gulshan et al., 2016], image segmentation [Havaei et al., 2017, Guo et al., 2017], or content-based image retrieval (CBMIR) [Litjens et al., 2017, Sun et al., 2017, Anavi et al., 2016, Liu et al., 2016, Shah et al., 2016].", "However, the previous works of CBMIR focused more on using shallow learning algorithms, or combining single pre-trained CNN structure with other techniques [Litjens et al., 2017, Sun et al., Figure 1: Overview of content-based medical image retrieval.", "Recently, deep neural networks have been adopted in medical image learning tasks and yield the state-of-the-art performance in many medical imaging problems [Litjens et al., 2017]."]} +{"13972466|2875192": ["CBMIR requires expressive data representations for knowledge discovery and similar image identi\ufb01cation in massive medical image databases, and has been explored by different algorithmic approaches [Kumar et al., 2013, M\u00fcller et al., 2004]."]} +{"13972466|393948": ["Using deep neural networks allows automatic feature extraction and general, expressive representation learning for different computer vision tasks [Bengio et al., 2013], including machine learning tasks of medical imaging."]} +{"51616189|4820875": ["Comprehensive summaries of registration methods can be found in [12]\u2013[19]."]} +{"51616189|6863252": []} +{"51616189|206051485": []} +{"51616189|7861381": []} +{"4173387|393948": []} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"6863252|7861381": ["The rest of the section is organized by following coarsely and extending the classi\ufb01cation of deformation models given by Holden [14]."]} +{"50774745|6736412": ["This paradigm has been successfully employed in many areas [1], [2], [3]."]} +{"3403745|1902238": []} +{"46926453|2088679": ["vision [8] and medical imaging [9], [10]."]} +{"46926453|14395478": ["IMAGE registration is one of the most fundamental tools in biomedical image processing, with applications that range from image-based navigation in imaging and image-guided interventions to longitudinal and group analyses [1]\u2013[7]."]} +{"46926453|6863252": ["The most widely used transformations in biomedical image registration range from rigid and affine to high-dimensional small or large deformations based on biophysical/biomechanical, elastic, or viscous fluid models [6]."]} +{"14140372|6863252": ["x). Here, ddenotes the spatial dimension and xis the spatial coordinate of the xed target image T.Due to the importance of image registration, a large number of dierent approaches have been proposed [1,37,38,39]. Typically, these approaches are formulated as optimization problems, where one seeks to minimize an energy of the form E() = Reg[] + 1 \u02d92 Sim[I 0 1;I 1]; (1) where \u02d9>0 is a balancing constant, "]} +{"206093726|2088679": ["A recent article from Litjens et al (2017) provides an excellent review of the current trends in the application of deep learning techniques to medical image analysis."]} +{"206749009|1184328": ["[51], digital straight lines [52], digital compactness and circularity [53], etc."]} +{"206749009|6746689": ["optimal paths [50], skeletonization [37], [51], digital straight", "The literature on 2-D skeletonization using iterative digital erosion had matured in the early 1990s [51]; however, the same was not true in 3-D."]} +{"49904929|9431428": ["\u2026hidden pathological functional connectome (FC) patterns to assist early diagnosis and prediction of brain disorders (Cox and Savoy, 2003; Mour\u00e3o-Miranda et al., 2005; Fan et al., 2007; Pereira et al., 2009; Anderson et al., 2011; Zhang et al., 2012; Uddin et al., 2013; Plitt et al., 2015)."]} +{"7587941|4583883": ["track contours and surface [3], [15]\u2013[23].", "accuracy as compared to other methods [3].", "Moreover, homogeneity criteria for multiple brain lesions are still to be assessed [3], [48]\u2014[50]."]} +{"7587941|8953108": ["[62]\u2013 [66]."]} +{"3644317|2088679": []} +{"3644317|14122909": []} +{"49434116|393948": []} +{"26058808|2088679": ["Biomedical image analysis is a particular area benefiting from latest advancements in computer vision methodology, but it only recently adapted deep learning techniques on a wider scale [9]."]} +{"46756091|530484": []} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"4373529|17485266": []} +{"3519414|2809360": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"3519414|11009327": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"4960441|2088679": []} +{"29723448|2875192": ["Some modules of CBMIR architecture are also present in most of CAD definitions [27, 17]."]} +{"4546146|1223851": ["As mentioned by the previous studies [7], [43], and [44], in the branch of bottom-up SOD, approaches are to detect saliency under free viewing, which is automatically determined by the physical characteristics of the scene, while approaches in the other branch are to detect the task-driven saliency determined by the current goals of the observer."]} +{"6850881|206051485": ["In contrast to conventional images, the information obtained is not abundant in medical images [52], and the internal similarities of an image can lead to a lack of clarity in feature points."]} +{"6850881|7861381": ["Linear elasticity transformation is predominantly based on stress and strain theory, in which a contact force is applied to a given position in an orthogonal plane, and stress is used to confirm deformation in the image [23]."]} +{"21314538|2277438": ["Surface rendering (SR) is a common method of displaying 3D images, which can be divided into two categories: direct surface rendering (DSR) and indirect surface rendering (ISR) (128,129)."]} +{"21314538|14122909": ["The comprehensive reviews of this LSA and their associated numerical techniques were documented in the medical imaging literatures (29,30,33).", "In August 2006, Noble and Boukerroui presented a survey paper on ultrasound image segmentation by clinical applications, where the corresponding segmentation techniques were further classified in terms of use of prior information (33)."]} +{"21314538|8953108": ["Local and global threshold methods, based on target image intensity distribution, have also been widely used in image segmentation (37)."]} +{"21063964|2088679": ["Consequently, the learning-based methods have not been widely used to solve medical image registration problems [17].", "There have been few works to use CNNs for medical image registration [17]."]} +{"21063964|14395478": ["For such tasks, ROI segmentation is a prerequisite for successful image registration as shown in [48], [50], [51], as it can focus the registration process on specific regions of interest (ROI) and avoid the undesired alignment of artifacts."]} +{"247457|393948": []} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"28012712|8983048": ["In the literature, several reviews on image registration methods can be found: overall image registration in Brown (1992), Salvi et al. (2007), Wyawahare et al. (2009), Zitova\u00b4 and Flusser (2003), medical image registration in general (Elsen et al. 1993; Maintz and Viergever 1998; Bronzino 2000;\u2026"]} +{"28012712|206051485": ["In the literature, several reviews on image registration methods can be found: overall image registration in (Brown, 1992; Salvi et al., 2007; Wyawahare et al., 2009; Zitov\u00e1 and Flusser, 2003), medical image registration in general (Bronzino, 2000; Elsen et al."]} +{"28012712|7861381": ["TPS is an interpolation function that minimises the bending energy (Holden 2008).", "(2004)andareviewinHolden(2008)."]} +{"54461890|54448042": ["A greatly detailed survey comparing various software libraries for homomorphic encryption is provided in [115]."]} +{"54461890|3519414": []} +{"54461890|2088679": []} +{"52290500|4820875": []} +{"52290500|6863252": ["Commonly used image registration approaches include intensity-based methods, and featurebased methods that use handcrafted image features (Sotiras et al., 2013; Viergever et al., 2016).", "Third, borrowed from conventional image registration where regularization often is an integral part in transformation models (Sotiras et al., 2013), we include a bending energy penalty term that encourages smooth displacements."]} +{"2088679|393948": []} +{"54439509|3519414": ["Deep learning methods in general have found a pervasive suite of applications in biology, clinical medicine, genomics and public health as surveyed in [24, 23, 25, 29, 30, 31]."]} +{"54439509|2088679": ["Deep learning methods in general have found a pervasive suite of applications in biology, clinical medicine, genomics and public health as surveyed in [24, 23, 25, 29, 30, 31]."]} +{"89932203|4795312": []} +{"37099732|2088679": []} +{"37099732|393948": ["Deep learning methods have been extensively reviewed in recent years [36, 37, 38, 39, 40] and discussed for particular applications [41, 42, 43, 44]."]} +{"3558190|2088679": []} +{"3558190|17485266": ["Various modifications of the stochastic gradient descent algorithm have been developed.(21) In principle, this iterative process consists of calculations of error between the"]} diff --git a/edge/graph_53755107.jsonl b/edge/graph_53755107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88da10e5280dfe2e197955911d195c0fdd5dce45 --- /dev/null +++ b/edge/graph_53755107.jsonl @@ -0,0 +1,34 @@ +{"63867869|17905276": []} +{"25228272|240747": []} +{"18306152|7988320": []} +{"18306152|7085121": []} +{"18306152|562065": []} +{"18306152|15300368": []} +{"18306152|1503157": ["This issue can be addressed by integrating RFID with WSN as WSN provides longer reading range as well as other benefits like different network topologies and flexibility, variety of sensors that are already implemented and low power consumption [31]."]} +{"18306152|1236072": ["techniques [7, 13, 14], MAC protocols [15\u201317], congestion control [18, 19], data col-"]} +{"113534415|9107727": []} +{"26914117|12029139": ["We adopt an architecture of a sensor node with RF-based energy harvesting capability as described in [8]."]} +{"3235277|3450189": ["In most research, it is the mesh topology that is considered, because it allows for the reduction of the transmission distance that helps to lessen the energy due to communication between different nodes [15,19]."]} +{"3235277|12060835": ["In an effort to increase the energy autonomy of sensor nodes, energy harvesting techniques have recently been proposed as a battery replenishment solution [8].", "This energy harvesting approach is known as the harvest-use (HU) architecture [8]."]} +{"114479075|9800396": []} +{"64891902|17905276": []} +{"114408765|33867211": []} +{"10067743|7988320": ["\u2026data such as electrocardiogram (ECG), electroencephalography (EEG), respiratory rate, body temperature and movement and transmits the collected data either as raw samples or low-level post-processed information to a base station wirelessly in order to be further analyzed and processed [20]."]} +{"10067743|20178897": ["The main disadvantage of this scenario is the requirement for cable installation which adds repetition complexity and cost to the system [35].", "Table 1 lists some of the existing wired home networking technologies that can potentially be used to transfer the data over the cables [35,36].", "The \ufb01nal scenario is based on existing wireless communication protocols such as Wi-Fi or ZigBee in order to transfer the collected data from rooms to black box [35]."]} +{"10067743|7854020": ["Furthermore, IEEE 802 has recently introduced the \ufb01rst international WBAN standard called IEEE 802.15.6 [60]."]} +{"10067743|6959212": ["PLC is a reliable technology and in terms of cost, it is less expensive than a dedicated cabling scenario [38].", "However, this communication method is considered less reliable when it is compared to dedicated cabling and PLC technology [38].", "Another important disadvantage of PLC technology is that data may be lost due to an unexpected power outage [38].", "In order to achieve optimal reliability and network ef\ufb01ciency, appropriate MAC layer protocols are required to be designed to ful\ufb01ll the particular needs of speci\ufb01c applications [37,38].", "The main advantage of this scenario is the use of existing electrical wiring infrastructure and electrical outlets [38]."]} +{"51907403|53551604": []} +{"51907403|41998167": ["Note that QoS was already taken into account in the last generation of MAC protocols for battery-powered sensor networks (see, for instance, [6,7]), but subject to rigid energy budget constraints."]} +{"115275134|12060835": []} +{"51985647|21386749": []} +{"51871361|4427557": []} +{"51871361|3055684": ["Current research focuses on dynamic control and online energy management strategies [93]."]} +{"51871361|33867211": ["The maximum power point tracking (MPPT) controllers ensure that solar cells always operate around the maximum power point P max under diverse irradiance and temperature conditions, and variable load characteristics [12,16\u201319]."]} +{"51871361|12060835": ["Energy obtained from solar panels is usually stored in (rechargeable) batteries or supercapacitors [5,14]."]} +{"49185744|1734833": []} +{"2190572|17905276": []} +{"3507547|3504276": ["Various techniques have been proposed to mitigate the doubly near-far problems, such as via user cooperation [205] or separating the energy and information access points [45]."]} +{"3507547|3055684": ["The viable energy sources that could be harvested include solar, wind, vibration, ambient radio frequency (RF) signals, etc [61]\u2013[65]."]} +{"3507547|12029139": ["Numerous research efforts have been recently devoted to maximizing the achievable rate-energy region under various setups of SWIPT systems [106]\u2013[109].", "There are mainly two lines of research under this paradigm, namely SWIPT (see [106]\u2013[109] and the references therein), where information and power are transmitted concurrently using the same RF waveform, and wireless powered communications (see [41]\u2013[46] and the references therein), where the energy"]} +{"3507547|12060835": []} +{"23431701|12029139": []} diff --git a/graph_5375832.jsonl b/edge/graph_5375832.jsonl similarity index 100% rename from graph_5375832.jsonl rename to edge/graph_5375832.jsonl diff --git a/edge/graph_53760697.jsonl b/edge/graph_53760697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80e560aef9b15321135d6f20d0b11a1b079c2666 --- /dev/null +++ b/edge/graph_53760697.jsonl @@ -0,0 +1,3 @@ +{"38932250|1284183": ["proaches could achieve such low-power phase shifting [154], [155], though this remains speculative."]} +{"4458968|6302811": []} +{"15772363|582949": []} diff --git a/edge/graph_53761233.jsonl b/edge/graph_53761233.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28f7d46ef144f0e53bcb45809a071b2a78717107 --- /dev/null +++ b/edge/graph_53761233.jsonl @@ -0,0 +1,23 @@ +{"3418158|2473564": ["Further details can be found in survey papers [3][5][25]."]} +{"3329621|2355696": ["It involves computer vision, machine learning and behavioral sciences, and can be used for many applications such as security [20], human-computer-interaction [ 23 ], driver safety [24], and health-care [17]."]} +{"7566628|5401262": ["Lastly, we describe the used regularizers and the inference procedure.", "Index Terms\u2014FACS, action unit intensity, spontaneous facial behavior, facial expression analysis, ordinal regression, conditional random fields, context modeling\n\u00c7"]} +{"121199517|2301292": ["A number of 2D facial expression databases have become available (e.g., [1] [2] [7] [8] [16]), as well as some with 3D imaging data (e.g., [9] [14] [15] [24] [25] [45])."]} +{"28667319|5401262": ["In the past several years, significant progress has been made in machine learning to automatically recognize facial expressions related to emotion [20,21]."]} +{"2397089|5401262": ["pervasive computing, ambient intelligence, human computing) will need to develop human-centred user interfaces that respond readily to naturally occurring, multi-modal, human communication [24]."]} +{"16696072|2301292": []} +{"16696072|14303607": ["\u2026Received in revised form 28 August 2015 Accepted 22 March 2016 Available online 31 March 2016\nKeywords: Automated facial expression analysis Action unit detection FACS\nA B S T R A C T\nAutomatic facial action unit (AU) detection from video is a long-standing problem in facial expression analysis."]} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"6320104|9045232": []} +{"18544245|14288295": []} +{"18544245|9045232": []} +{"14577248|11608263": ["The prediction from an example x to its complete label vector, z, is the main task of multi-label learning [3]."]} +{"4591291|19815778": ["For a general overview of the field of expression recognition we refer the reader to excellent recent surveys [5], [19]."]} +{"4591291|2473564": []} +{"127227|17221751": ["Inter-ested readers may refer to [20], [46], [49], [56] for comprehensive reviews.", "Several studies merged into this direction could be found in [55], [78]\u2013[80]."]} +{"127227|14303607": ["Inter-ested readers may refer to [20], [46], [49], [56] for comprehensive reviews.", "Several studies merged into this direction could be found in [55], [78]\u2013[80]."]} +{"8275347|2301292": ["Automatic facial expression recognition has attracted considerable attention in the past few years [6, 18, 20, 23] due to their potential application in the \ufb01eld of psychology, mental health, human-computer interaction, etc."]} +{"14170176|13277694": ["erations (e.g., image or signal enhancement, noise reduction, region of interest detection, facial landmark detection, etc.) since they are beyond the paper\u2019s scope. We refer the interested reader to [76], [77] for a review of image enhancement methods, to [78] for signal denoising methods, to [79], [80] for region of interest detection, and to [81], [82] for facial landmark detection. In addition, we"]} +{"16748301|5401262": ["In the past several years, significant progress has been made in the machine learning to automatically recognize facial expressions related to emotion [6, 7]."]} +{"15694978|8777381": ["2 Voice Vocal features related to affect recognition [35-37] and depression severity [38-40] have been identified."]} +{"15318804|5401262": ["Recent advances \nin automated facial expression measurement open up the possibility of automatically differentiating posed \nfrom real pain using computer vision systems (e.g. Bartlett et al., 2006; Littlewort et al., 2006; Cohn \n& Schmidt, 2004; Pantic et al., 2006).", "Subcortically initiated facial \nexpressions (the spontaneous group) are characterized by synchronized, smooth, symmetrical, consistent, \nand reflex-like facial muscle movements whereas cortically initiated facial expressions (posed expressions) \nare subject to volitional real-time control and tend to be less smooth, with more variable dynamics (Rinn, \n1984; Frank, Ekman, & Friesen, 1993; Schmidt, Cohn & Tian, 2003; Cohn & Schmidt, 2004).", "(1), mouth open and jaw drop (25 and 26), cheek raise (6), lip raise (10), fear brow (1+2+4), nose wrinkle (9), mouth stretch (20), and lower lid raise (7).", "[2] \nCohn, J.F. & Schmidt, K.L. (2004)."]} +{"2301292|1118130": ["prototypical expressions of emotions [5,4,6,7]."]} diff --git a/edge/graph_53764762.jsonl b/edge/graph_53764762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e0c4d06c2b0bae02ee2007dfb116378999460d0 --- /dev/null +++ b/edge/graph_53764762.jsonl @@ -0,0 +1,8 @@ +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"40248125|3119314": []} +{"40248125|12815020": []} +{"4379138|29395800": ["Much of the work into searching semantically has been done in the context of searching the web [1], [13], [20]."]} +{"36047425|18212759": []} +{"3434338|7800459": ["Due to node failures and erasures that arise naturally in any storage system, redundancy should be introduced [12]."]} +{"3434338|10346685": ["Note that we do not solve for the individual x[2] 7 or x [3] 7 but we align them in the same subspace, and solve for their sum.", "In this case the interference from the rows x[2] 7 + x[3] 7 is decoded.", "As an example, we download hT 1 (x [2] 7 + x[3] 7 ), hT 2 (x[2] 7 + x[3] 7 )", ", x[2] 7 +x[3] 7 , to download extra N (M\u22121 2 ) K M\u22123(N\u2212K )2 = 3 desired coded bits in the form of sum of three terms, e."]} +{"52346352|29395800": []} diff --git a/edge/graph_53765684.jsonl b/edge/graph_53765684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c94af7b1fdaf2292124ed7d58601546e06b8144c --- /dev/null +++ b/edge/graph_53765684.jsonl @@ -0,0 +1,4 @@ +{"31742301|2390193": []} +{"4240681|6988077": ["Several microfluidic platforms have been reported for this purpose using various techniques (Duarte et al., 2013; Lei, 2012; Mairhofer et al., 2009; Tasoglu et al., 2013).", "platforms, based on different principles, have been reported to cope with the complexity of sample preparation and enrichment (Foudeh et al., 2012; Mairhofer et al., 2009; Velusamy et al., 2010; Zaytseva et al., 2005)."]} +{"46847764|9770908": ["[176] Electrochemical sensing was successfully used for the detection of biomolecules such as glucose, uric acid, lactate and cholesterol,[80,173,177-185] neurotransmitters and drugs,[186194] DNA and nucleosides,[195,196], metals,[197-200] and ions,[201-204] gaseous"]} +{"3707130|2390193": []} diff --git a/edge/graph_53766725.jsonl b/edge/graph_53766725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..baafd52391b8e73ae0c994b5bac4612a84bc4c16 --- /dev/null +++ b/edge/graph_53766725.jsonl @@ -0,0 +1,8 @@ +{"1800351|10565363": []} +{"207713272|2511280": ["Then, the average treatment effect (ATE) is estimated as follows: Note that several approaches for finding optimal pairs of units have been proposed [50]."]} +{"1605434|9928823": []} +{"2610287|2532914": ["Rather than exhaustively reviewing this literature (see Kjeldskov & Graham, 2003; Mehl & Conner, 2011), I outline four existing types of studies that give a context for future developments in smartphone research."]} +{"11820063|16717715": ["Conventional acoustic speech models were trained with over 360 h of neutral speech, using the Sphinx-III speech recognition system (version 3.0.6) (Huang et al. 1993).", "Conventional acoustic speech models were trained with over 360 h of neutral speech, using the Sphinx-III speech recognition system (version 3.0.6) ( Huang et al. 1993 )."]} +{"39888164|14688441": ["Conversely, social psychology studies have examined personality mainly via non-verbal social behavioral cues (see [6] for a review), but few works have modeled personality traits based on emotional behavior.", "A comprehensive survey of personality computing approaches is presented in [6]."]} +{"3302908|8777381": ["research community that certain acoustic and prosodic features play an important role in recognizing the affective state [47]."]} +{"53234823|2355696": ["Existing work in affect recognition focuses primarily on the recognition of emotions [13, 14], and does so largely by leveraging the visual [15-17] and acoustic [18, 19] signals found in the speech, actions, and faces of people."]} diff --git a/edge/graph_53768542.jsonl b/edge/graph_53768542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53779029.jsonl b/edge/graph_53779029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7dcb7fbdf75ae7581a18277260ddac0989b23576 --- /dev/null +++ b/edge/graph_53779029.jsonl @@ -0,0 +1,59 @@ +{"6517451|15959145": []} +{"6517451|6430931": []} +{"45081771|6430931": []} +{"32070687|18037424": []} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"26853250|53018231": ["SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions Section II: Artificial Neural Networ", "se works are limited in a number of ways. First,a majority of the existing worksfocuses on a single ML technique (often the basics of deep learning [32], [50], and [56]\u2013[58] or reinforcement learning [61]) and, as such, they do not capture the rich spectrum of available ML frameworks. Second, they mostly restrict their scope to a single wireless application such as sensor networks [53], cognitive radi"]} +{"26853250|9461213": ["e Learning Tools Key Applications FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in ", "ss application such as sensor networks [53], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing sur"]} +{"26853250|3645740": ["FNN RNN DNN ESN SNN DA RL UAV VR CC SON Multi-RAT IoT PL CR DT [3] p p p [32] p p [50] p [51] p p p p [52] p p p [53] p p p p [54] p p p [63] p [55] p p [56] p p p p [57] p p p p p p [58] p p p p p p [59] p p p p p [60] p p p p p p p p [61] p p p p p p p p p [62] p p p p p p p Our tutorial p p p p p p p p p p p p Section I: Introduction A. Role of Machine Learning in Wireless NetworksC. Contributions ", "3], cognitive radio networks [52], machine-to-machine (M2M) communication [3], physical layer design [32], software de\ufb01ned networking [55], Internet of Things [57], or self-organizing networks (SONs) [59], and, hence, they do not comprehensively cover the broad range of applications that can adopt ML in future networks. Third, a large number of the existing surveys and tutorials, such as [3], [51]\u2013[53"]} +{"26853250|206578365": ["In addition to caching, the wireless network\u2019s edge devices can be used for performing effective, low-latency computations, using the emerging paradigm of mobile edge computing [189]."]} +{"26853250|17485266": ["The mini batch gradient descent is an algorithm that strikes a balance between stochastic gradient descent and batch gradient descent [78].", "To solve these challenges, several algorithms have been proposed, such as momentum SGD, RMSProp [78], nesterov accelerated gradient [80], Adagrad [81], and AdaDelta [82].", "To overcome these drawbacks of SGD, the mini batch gradient descent [78] can be used."]} +{"26853250|5385031": ["More recently, ANNs have started to attract significant attention in the context of wireless communications and networking [2], [4], [5], [31] and [32], since the development of smart devices and mobile applications has significantly increased the level at which human users interact with the wireless communication system.", "Finally, the introductory literature on machine learning for wireless networks such as in [2], [4], [32], and", "Third, a large number of the existing surveys, such as [2], [4], and [52]\u2013[57], are highly qualitative and do not provide an in-depth technical and quantitative description on the variety of existing machine learning tools that are suitable for wireless communications.", "Meanwhile, a number of surveys on machine learning and neural network applications in wireless networking have emerged, such as in [2], [4], [32], and [51]\u2013[64]."]} +{"26853250|7774517": []} +{"26853250|1708582": ["RL algorithms are used for robotics, gaming, and navigation [67]."]} +{"207172599|3330313": []} +{"44519809|15485264": []} +{"44519809|12815020": []} +{"44519809|6430931": []} +{"6628916|6430931": []} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"2142482|14745481": ["We recognize that many reputation and trust management systems actually take into consideration of both multitrust and unitrust in trust composition [49, 50, 51, 52, 53, 54, 55, 56, 57]."]} +{"37499143|8364569": ["As the data volume of network flows is only 0.1 per cent compared to the packet payload, real-time detection is practical and implementing the NIDS in a high-speed network will be feasible (Sperotto et al. 2010).", "Having fewer false alarms and an increased detection rate of zero-day and complex attacks, especially in imbalanced network traffic, has become an important challenge in the design of detection techniques for IDS (Sperotto et al. 2010, Engen 2010)."]} +{"37499143|13172512": ["Due to the learning and decision making capability, many researchers applied machine learning techniques in IDS to improve the performance of attack detection (Nguyen & Armitage 2008)."]} +{"7434486|13172512": ["Clustering algorithms have been used for unsupervised IDS to classify the behavior of the network [8]\u2013[10]."]} +{"31543034|18037424": []} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"30548534|8364569": ["Most of the different techniques used in the NIDS field are summarized in [5, 6]."]} +{"16774809|2867949": []} +{"16774809|18654252": ["A review of anomaly identification using outlier detection is available in [7]."]} +{"16774809|8364569": []} +{"28991223|2867949": []} +{"18434328|12815020": []} +{"207223163|15247126": ["A covert channel tries to hide the very existence of any communication [Lampson 1973; Zander et al. 2007] by using a channel that is usually not intended for communication (e.g., timing information in between packets or unused bits in the IP header).", "Afterward, adversary could use covert channels [Zander et al. 2007] to send sensitive data outside the protected network."]} +{"207223163|14697846": []} +{"1949199|8364569": ["as throughput, payload size, and the number of flows or established connections in the network traffic, as well as their states [3]."]} +{"26217158|192934": ["[13], k-NN can be conveniently used as a benchmark for all the other classifiers since it is likely to provide a reasonable classification performance in most applications."]} +{"37564067|18750590": ["As presented in [26], the payoff of the leader in the Stackelberg solution is guaranteed to be no less than that in the Nash solution.", "Note that there may exist several different pricing models depending on how to set the price as presented in [25] and [26].", "As discussed in [26], to efficiently solve the modified NUM problem, the pricing-based iterative solutions can be adopted."]} +{"37564067|5385031": ["cost while protecting the users\u2019 privacy [25].", "Definitions of common terminologies in auctions such as bidder, seller, auctioneer, ask, and bid can be found in [25].", "Note that there may exist several different pricing models depending on how to set the price as presented in [25] and [26]."]} +{"37564067|206584087": ["A survey of techniques against DDoS attacks in Mobile Ad-hoc Network (MANETs) is presented in [6].", "For the DDoS attack [6], an external attacker controls a large number of compromised users inside the network to transmit radio jamming signals with high power to a target system, and makes the system unavailable to respond to any service requests from the legitimate users.", ", bots, inside the network to encumber the legitimate accesses to the resources at a receiver [6]."]} +{"37564067|17623572": ["A black hole problem is actually a misbehavior routing problem [90] in which one malicious node uses the same routing protocol as the regular nodes, but it drops the routed packets and does not forward the packets to its neighbors."]} +{"37564067|4395259": ["anti-jamming techniques [9], and physical layer security [10]."]} +{"37564067|17205659": ["For example, surveys of security issues in Wireless Sensor Networks (WSNs) are given in [7] and [8]."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} diff --git a/edge/graph_53785844.jsonl b/edge/graph_53785844.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6d70a6762ed984a8e7dd79807794e368362a210 --- /dev/null +++ b/edge/graph_53785844.jsonl @@ -0,0 +1,20 @@ +{"36123666|7973425": []} +{"36123666|191396": []} +{"36123666|3102110": []} +{"4869249|393948": []} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} +{"60385584|3330313": []} +{"60385584|1097238": []} +{"60385584|15273230": []} +{"60385584|192934": ["Jain, Duin and Mao (2000) include a section on classi\ufb01er combination.", "Jain, Duin and Mao (2000) list eighteen classi\ufb01er combination schemes; Witten and Frank (2000) detail four methods of combining multiple models: bagging, boosting, stacking and error-correcting output codes whilst Alpaydin (2004) covers seven methods of combining multiple learners: voting,\u2026"]} +{"11208120|1507400": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"435475|3304959": ["If Big Data is managed well, it can be used to unlock new sources of economic value, provide fresh insights into science and scientific discoveries, and assist government policy making [4-6]."]} +{"435475|2488484": []} +{"9656129|1507400": ["There are several applications already available (Langmead et al., 2010; Schumacher et al., 2014; Taylor, 2010)."]} diff --git a/edge/graph_53787214.jsonl b/edge/graph_53787214.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53788055.jsonl b/edge/graph_53788055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea7cbe95fb1cd990743ad383644eb5a89e2494c7 --- /dev/null +++ b/edge/graph_53788055.jsonl @@ -0,0 +1,2 @@ +{"25707541|206743327": []} +{"9656129|1507400": ["There are several applications already available (Langmead et al., 2010; Schumacher et al., 2014; Taylor, 2010)."]} diff --git a/edge/graph_53800586.jsonl b/edge/graph_53800586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de6e1f31b20e070196aa57cdf560c4888acf8573 --- /dev/null +++ b/edge/graph_53800586.jsonl @@ -0,0 +1,37 @@ +{"6257133|10355303": ["There are many metrics based on pixel-wise similarity [18], histogram similarity [19], HoGs, feature points, lines, neural network encoders [20], and so on (we refer to [21], [22] for details).", "Traffic light state transitions are a big challenge for other appearancebased methods [22] as they change the appearance of the tracked object entirely."]} +{"12889437|1229096": ["Although preliminary successes have been achieved with AVs, there are still many intractable issues from both a technical and a societal perspective [2,6]."]} +{"1033682|174797842": []} +{"637699|12127373": ["Some car companies such as Nissan and Renault are using SWM, but it works for limited cases [76]."]} +{"637699|192934": ["Another disadvantage of the template matching technique is that it would fail if the templates were distorted due to the image processing [43]."]} +{"10405949|15093118": ["Since such driving behaviors as lane changing and overtaking have been studied in [7], [60], Fig.", "There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections.", "Radar technology usually is mounted on poles or embedded in vehicles to detect surrounding vehicles [7] and pedestrians [4]."]} +{"10405949|206764452": ["There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections."]} +{"10405949|5755403": ["This includes measuring and learning vehicle kinematics, dynamics , and making predictions [50]."]} +{"10405949|1029120": ["There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections.", "A variety of sensors have been used for vehicle and pedestrian detection at intersections [4], including global positioning systems (GPS), light detection and ranging (LIDAR), radar and cameras.", "Radar technology usually is mounted on poles or embedded in vehicles to detect surrounding vehicles [7] and pedestrians [4]."]} +{"206764452|1029120": ["Unlike [11], this paper focuses on the techniques used in PPSs, rather than on general pedestrian safety.", "The same authors recently presented a survey that reviews infrastructure developments, sensors, and pedestrian detection approaches in a general transport safety context, rather than focusing especially on on-board detection [11]."]} +{"206764452|2113024": ["Recently, Krotosky and Trivedi proposed the use of multimodal stereo analysis to generate candidates, i.e., combining two different sensor types, like VS and TIR to perform stereo [60] or a VS stereo pair matched with TIR imaging [57].", "Krotosky and Trivedi [57] evaluate tetra and tri-sensor systems that utilize both the VS and TIR.", "In 2006, Gandhi and Trivedi [10] followed the same approach, but focused on the aspects of collision prediction and pedestrian behavior analysis."]} +{"206764452|9045232": ["Nevertheless , unlike other fields, such as face or vehicle detection, in which in-depth reviews analyzing the algorithms and successful systems have been presented (e.g., [12], [13]), pedestrian detection for ADAS lacks an exhaustive review."]} +{"23267374|6198785": ["Complementary to our survey, Zhu et al. (2017) provide an overview of environment perception for intelligent vehicles, focusing on lane detection, traffic sign/light recognition as well as vehicle tracking."]} +{"23267374|1877246": ["There is a variety of methods for dealing with this problem such as voxel hashing (Nie\u00dfner et al. (2013)) or a data adaptive discretization of the space in the form of a Delaunay triangulation (Labatut et al.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for", "Input Data: Musialski et al. (2013) point out that ground, aerial and satellite imagery, as well as Light Detection and Ranging (LiDAR) scans are the most commonly used sensors for urban reconstruction.", "Musialski et al. (2013) provide a survey of urban reconstruction approaches by following an output-based ordering, namely buildings and se-\nmantics, facades and images, and finally blocks and cities."]} +{"23267374|206764452": []} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"2222063|206764452": ["It is worth mentioning also that, although for stereo-based systems it is possible to use a scene-based generation of candidate windows to be classified [1,2], in this paper, the visible and FIR modalities are treated as monocular systems regarding candidate generation."]} +{"3654978|14814753": ["The amount of work done in this field is apparent from a long list of survey papers published throughout the past decades, such as surveys on hand gesture recognition [552], general vision-based action recognition [553, 554], video surveillance [555], action recognition using 3D data [556], action recognition in still images [557], semantic action recognition [558], action recognition using deep networks [559] or hand-crafted feature learning [560]."]} +{"3654978|15093118": ["For instance, Sivaraman and Trivedi [443], instead of generating HOG descriptors for vehicles as a whole, learn the back and front parts of the vehicles separately.", "In addition, there are a number of survey papers that give a good overview of early [449] and more recent [443] vehicle detection algorithms.", "Some popular examples are Haar features [440], Gabor filters [441], HOG features [442, 443] and color [444]."]} +{"3654978|16013270": ["For a comprehensive list of activity recognition datasets including non-vision-based ones refer to [501]."]} +{"3654978|206739910": ["Frames Ground Truth UAH [348] 2007 Col 200+ MASTIF [349] 2009-2011 28 Col 10k BB, S,CL STSD [350] 2011 Col 20k+ BB,V,CL GTSRB [346] 2011 43 Col 50k+ BB, S,CL Lisa [351] 2012 47 Col 6.", "survey of sign recognition algorithms can be found in [351]."]} +{"3654978|206764452": ["In addition, there are a number of survey papers that provide a comprehensive overview of pedestrian detection algorithms, for example [324], a survey of monocular camera-based pedestrian detection algorithms, and [430], which summarizes models that use different types of sensors."]} +{"3654978|7360895": ["A more comprehensive list of socially interactive systems that employ the joint attention mechanism can be found in [215, 216]."]} +{"4055261|17292349": ["[27], McMinn et al."]} +{"4055261|14920988": []} +{"14751371|12127373": []} +{"2736341|6972141": ["An extended survey on vision-based approaches for navigation of mobile robots is provided in DeSouza and Avinash (2002)."]} +{"3655059|16426065": []} +{"1401922|206764452": ["As for pedestrian detection vision sensors are preferred, due to the possibility to capture a high-resolution perspective view of the scene with useful color and texture information, compared to active sensors like radar or lidar [2].", "Vision-based pedestrian detection has been extensively investigated over the last decade, the readers are referred to some general surveys, such as [2], [10] and [12]."]} +{"125740501|6198785": ["Zhu et al. [10] studied the latest progresses on lane detection, tra\ufb03c sign/light recognition in the perception of intelligent vehicles."]} +{"20999239|1932843": ["Recently, paradigms such as reinforcement learning [12], learning-by-demonstration [2] and transfer learning [25] are proving a natural means to train various robotics systems."]} +{"4816620|984799": ["With a few exceptions [34], [35], almost all joint attention scenarios are implemented with stationary robots or robotic heads according to a recent comprehensive survey [36]."]} +{"6907139|13427574": ["for manipulators and mobile platforms [36, 37]."]} +{"6907139|36510460": ["RRT [25, 98], or heuristic search, e."]} +{"6547812|15093118": []} +{"74510|7257659": ["Understanding, modeling, and evaluation of situational awareness tasks, in particular the understanding of the behavior and intent of agents surrounding a vehicle, is an essential component in the development of such systems [3, 4, 5, 6]."]} +{"74510|1029120": []} diff --git a/edge/graph_53809508.jsonl b/edge/graph_53809508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3683f1eed10a430e3b0d1e14c9e86c59a12637df --- /dev/null +++ b/edge/graph_53809508.jsonl @@ -0,0 +1,19 @@ +{"54163147|192934": []} +{"1154872|192934": []} +{"30838056|2301292": []} +{"17424196|18889901": ["A survey on the existing RGB-D datasets can also be found in [3]."]} +{"17424196|8983048": ["A review on automatic correspondence is given in [20], a survey and evaluation on range image registration methods in presented in [25]."]} +{"17424196|16620699": []} +{"17424196|987239": ["Two surveys on 3D model retrieval methods can be found in [27] and [6].", "A 3D model retrieval system usually consists of a database with an index structure and an online query engine [27].", "A large number of algorithms have been proposed to address different technological aspects of these applications [1], [16], [5], [27], [7]."]} +{"17424196|6681074": ["A large number of algorithms have been proposed to address different technological aspects of these applications [1], [16], [5], [27], [7].", "methods can be found in [7], [19], [21], [9]."]} +{"11045785|11179184": ["Face recognition is one of the most researched topics in Computer Vision and many detailed surveys exist [10, 43, 51, 60]."]} +{"122425243|987239": []} +{"1196614|987239": ["With the development of 3D information acquisition technology, it is likely and convenient to acquire the 3D data of an object, and there are also many related work for 3D data application [2,3]."]} +{"1545317|16620699": ["Since excellent surveys exist summarising the extensive work in 3D face recognition [6,7], we will only review the work on expression-invariant face recognition and on face recognition not requiring overlap."]} +{"62185766|53680608": []} +{"14087242|16620699": ["D face recognition systems can be found in [1], [9], [35] and detailed fundamental analysis of concepts are given in [2], [21], [28]."]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"18128105|5171123": ["As holistic face recognition approaches, both FDA and PCA are very sensitive to pose variations [21], because in-depth rotations of 3D human faces almost always cause misalignment of image pixels which are the only classification clues for these holistic approaches.", "Although several survey papers [1, 3, 20, 21, 56, 89] and books [52, 78, 90] on face recognit io have been published which gave very good reviews on face recognition in general, there is no review specific on this challenging problem of face recognition across pose.", "In recent surveys of face recognition techniques [21, 89], po se variation was identified as one of the prominent unsolved problems in the research of face re ognition and it gains great interest in the computer vision and pattern recognition research co mmunity.", "Due to the observation that most of the general fac e re ognition approaches are sensitive to pose variations [21], a number of approaches have b een proposed to explicitly handle pose variations.", "For the recognition of faces from a single gallery per face , interested readers are redirected to a recent survey specifically on face recognition from a sing le allery image per person [21], though it"]} +{"18128105|16620699": ["We redirect the interested readers to the excellent reviews specifically on 3D face recognition [15,65]."]} +{"1495165|16620699": ["Along with the development in 3D imaging systems, 2.5D or 3D scans have emerged as a major solution to deal with unsolved issues in 2D face recognition, such as variations of illumination and pose [3][6]."]} diff --git a/graph_538438.jsonl b/edge/graph_538438.jsonl similarity index 100% rename from graph_538438.jsonl rename to edge/graph_538438.jsonl diff --git a/graph_5385031.jsonl b/edge/graph_5385031.jsonl similarity index 100% rename from graph_5385031.jsonl rename to edge/graph_5385031.jsonl diff --git a/edge/graph_53858126.jsonl b/edge/graph_53858126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..426c4313f5b5e730f5b31e3a7391df4e5932d827 --- /dev/null +++ b/edge/graph_53858126.jsonl @@ -0,0 +1,3 @@ +{"65150490|1229096": []} +{"65150490|15093118": []} +{"1033682|174797842": []} diff --git a/edge/graph_53869443.jsonl b/edge/graph_53869443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53933619.jsonl b/edge/graph_53933619.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..629ea369c4bff7b45dea0028f136878390627cc6 --- /dev/null +++ b/edge/graph_53933619.jsonl @@ -0,0 +1 @@ +{"120249537|4796356": []} diff --git a/graph_5394499.jsonl b/edge/graph_5394499.jsonl similarity index 100% rename from graph_5394499.jsonl rename to edge/graph_5394499.jsonl diff --git a/edge/graph_53950453.jsonl b/edge/graph_53950453.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c7dfdccc1d79396cea4e02f2f89dab82bf4297b4 --- /dev/null +++ b/edge/graph_53950453.jsonl @@ -0,0 +1,5 @@ +{"14745060|11139156": ["The meta-study suggests the most researched agile practices are (1) continuous integration, (2) stand-up meetings, (3) pair programming, (4) retrospectives, (5) scrum of scrums, and (6) test-driven development [24]."]} +{"33331350|417250": ["A Feature is indeed, according to our semantics, a broader aspect of the system requiring to fulfill the 3 conditions set up in [5].", "[5] defines a feature as a unit of functionality of a software system that satisfies a requirement, represents a design decision, and provides a potential configuration option."]} +{"14585844|11139156": ["Confirming the findings of the previous works [22][12], the existing research in the area is exploratory in nature and mostly reports the cases in which some challenges were faced and some strategies were applied."]} +{"206538702|627405": []} +{"12848424|21632806": ["As an initial US set is used to build a graphical model that is then transformed into a MAS design and implementation, it can be characterized as model-driven (see [14]).", "First of all, in line with [14, 10], our work can be said to be model-driven because the MAS implementation is partially built and deduced from a high"]} diff --git a/edge/graph_5395271.jsonl b/edge/graph_5395271.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53954378.jsonl b/edge/graph_53954378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53955609.jsonl b/edge/graph_53955609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53958589.jsonl b/edge/graph_53958589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..105dd6312aca804c3f2d64ec13d6f11521e6f7ba --- /dev/null +++ b/edge/graph_53958589.jsonl @@ -0,0 +1,17 @@ +{"27902065|1680300": ["Techniques for MFR have been well explored for wireless communications [9], and became widely used, e."]} +{"18233639|1680300": []} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"12790334|13172512": []} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"4943134|1708582": ["Finally, in reinforcement learning [43] an agent learns an optimal (or nearly optimal) policy from a series of reinforcements (rewards) or punishments received from its interaction with the environment."]} +{"4943134|4269723": ["The software defined networking (SDN) paradigm [125], which decouples control and data planes, and enables programmability on the former plane, has aroused the interest of both industry and research communities by allowing networks managers to manage, configure, automate and optimize network resources via software."]} +{"15469911|11013798": ["Fault diagnosis is a central aspect of network fault management [27]."]} +{"41064946|192934": ["Furthermore, neural network training is usually carried out using a randomly selected training subset [7], [8] that enhances the robustness of the networks rather than using the prede\ufb01ned approach."]} +{"28222603|1708582": ["Three methods namely, DP, Gittins indices and learning automata exist in the literature to solve the MABP optimally [14].", "The bandit problem described above is equivalent to an MDP with a single state, multiple actions and an action resulting in self transition [14]."]} +{"25542616|1588237": [", traffic load and UE distributions) are more suitable in such instances [1], [3].", "as fractional frequency reuse with full isolation [1], or as strict frequency reuse."]} +{"1580493|11720829": ["Depending on the relationship between the signals transmitted from different antennas, MIMO schemes can be used to either increase the overall capacity of the system, or to reduce the probability of outage [59][61]."]} +{"18887294|13172512": ["3, the algorithm that we use for flow classification consists of three key parts: (1) the Hash-Based Classifier, which checks whether packets belong to a classified flow (this part runs at a high speed with low latency); (2) the Feature Vector Storage, which\nstores flow features using packets from\u2026"]} +{"2824965|11013798": []} diff --git a/edge/graph_53962306.jsonl b/edge/graph_53962306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2aac07455a657ed0e7e4560dae9d5d3d1c17e36b --- /dev/null +++ b/edge/graph_53962306.jsonl @@ -0,0 +1 @@ +{"155167775|55039831": []} diff --git a/edge/graph_53965813.jsonl b/edge/graph_53965813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..efb17f2cebf03add72286303e7c5a521908c29ac --- /dev/null +++ b/edge/graph_53965813.jsonl @@ -0,0 +1,14 @@ +{"15612841|912956": ["for real-time multiprocessor scheduling [11], many previous results do not consider the interference caused by shared physical resources like caches, buses, memory."]} +{"17304370|912956": ["We refer the reader to [34], a survey of preemptive multiprocessor scheduling including both partitioned and global approaches."]} +{"2784072|912956": ["Prior research has proposed several solutions for real-time multiprocessor scheduling (Davis and Burns 2010), but most previous works do not consider the interference caused by shared physical resources, like caches, buses, memory."]} +{"221731|912956": []} +{"27018520|912956": ["In terms of performance, the embedded real-time systems equipped with multiprocessors are capable to schedule a larger volume of concurrent tasks, while guaranteeing all responses (e.g., task completion) on time [11]."]} +{"11217858|13709071": ["However, as observed by a recent survey [6], there is no existing technique to account for the effects of coherence protocols in static timing analysis in real-time systems.", "A recent survey [6] observed that there is no existing technique to include the effects of data coherence on timing analysis for A:30 Shared memory"]} +{"18778238|912956": ["The proposed algorithm \nis then evaluated with 82 realistic benchmarks from MRTC, Medi\u00adaBench, UTDSP, NetBench and DSPstone, \nand extensive simula\u00adtions are further conducted to analyze the proposed algorithm."]} +{"13709071|912956": ["In general, the capability of a real-time system to meet its deadline is veri\ufb01ed through a schedulability analysis [Davis and Burns 2011]."]} +{"11688413|912956": ["We refer the reader to [10], a survey of preemptive multiprocessor scheduling including both partitioned and global approaches."]} +{"12213633|912956": ["tion and thermal problems [15], system engineers now face serious challenges in developing effective memory architecture [14], [21], [23], [36] for systems with a rapidly increasing number of cores.", "refer readers to a comprehensive survey in [15]."]} +{"1847068|912956": ["There are two main strands of research in multiprocessor scheduling [25], reflecting the ways in which tasks are allocated to cores."]} +{"11908825|912956": ["We refer interested readers to [11] for a comprehensive survey of multiprocessor scheduling."]} +{"52283695|912956": ["Workload Model: we consider a partitioned system in which each task in a set of tasks is statically assigned to one of the m cores [8]."]} +{"346428|1517662": ["For example, see [20] for the general estimation problem, and [ 21 ] for approaches in the collision avoidance problem."]} diff --git a/edge/graph_53972950.jsonl b/edge/graph_53972950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b701498f3a011bddea9e014190b7e96800027dd5 --- /dev/null +++ b/edge/graph_53972950.jsonl @@ -0,0 +1,6 @@ +{"206357333|17516538": ["[87] advocated that featurebased tracking algorithms consist of three groups, based on the nature of selected features: global feature-based [41,122,137,156], local feature-based [35,128], and dependence-graph-based algorithms [51,62,63,57]."]} +{"206357333|7788290": ["In fact, these approaches attempt to recover 3-D articulated poses over time [60]."]} +{"5085953|7788290": []} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"732213|469744": ["Copyright \u00a9 2014 MECS I.J. Image, Graphics and Signal Processing, 2014, 11, 10-16\nemployed using the integration of a 3D object with a real actor."]} diff --git a/edge/graph_53975111.jsonl b/edge/graph_53975111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53982271.jsonl b/edge/graph_53982271.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53984205.jsonl b/edge/graph_53984205.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2bc4c6739fae4204c54581b4b16cc620a8c5599 --- /dev/null +++ b/edge/graph_53984205.jsonl @@ -0,0 +1,10 @@ +{"111152554|26257441": [", [2,7]), and computational frameworks to integrate analyses from multiple disciplines (e.", "Likewise, for case (ii), a variety of metamodeling techniques exist that can be used to construct inexpensive surrogates of any computationally expensive analyses [2], and these could be queried directly by the Exploration Engine when executing any of these samplers.", ", a crash simulation of a full passenger car takes 36-160 hours to compute, according to engineers at Ford Motor Company [1]), metamodeling techniques such as response surface models and kriging [2] can be used to construct computationally efficient approximations of such simulations and then used as a surrogate to generate hundreds, or thousands, of design alternatives quickly and cost-effectively.", "The design variable, H, defines the powertrain and can take one of six options: [1,2,3,4,5,6]."]} +{"13068209|14843594": ["Therefore, Gaussian process based ef\ufb01cient global optimization 1 (Jones et al., 1998; Shahriari et al., 2015), as a sample-ef\ufb01cient method to solve black-box optimization problems (Xu et al., 2022a), has recently been becoming more and more popular."]} +{"35118863|26257441": []} +{"57208679|26257441": ["Another implication from this study is that design analyses that require more than 1.5 s to complete need to be replaced with less computationally expensive analyses [e.g., metamodels such as response surface or kriging models (Osio and Amon 1996; Simpson et al. 2001 )]."]} +{"62171511|26257441": ["polynomial response surfaces, kriging models, radial basis functions, neural networks, multivariate adaptive regression splines), and recent reviews and comparisons of many of these approximation model types can be found in ( Simpson et al. 2001b, c; Jin et al. 2001; Sobieszczanski-Sobieski and Haftka 1997; Haftka et al. 1998; Barthelemy and Haftka 1993; Barton 1998)."]} +{"29993723|26257441": []} +{"124909991|53984205": []} +{"111922194|26257441": []} +{"25776894|26257441": ["As such, many metamodeling approaches have their roots in approximation theory and statistical learning theory, such as: (1) radial basis functions (RBF) [4, 12\u201314], (2) neural networks [4, 15, 16], (3) kriging [8, 17\u201319], and (4) support vector machines [20].", "Recent publications [4, 12] maintain that the choice of the most appropriate metamodeling approach depends on the type of problem under consideration.", "However, the limitations of using second-order polynomials for approximating moderate to highly nonlinear functions over a large region are well-known [4, 12]."]} +{"122500416|26257441": []} diff --git a/edge/graph_53985441.jsonl b/edge/graph_53985441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_53990263.jsonl b/edge/graph_53990263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08bfc9a7ad87e61d10b67f9566a096b8775beea7 --- /dev/null +++ b/edge/graph_53990263.jsonl @@ -0,0 +1,7 @@ +{"553891|6832132": ["Information entropy [18,22] and ambiguity [29,34], which respectively reflect the impurity of classes and the uncertainty of the split, are the two most widely used heuristics for splitting nodes during the tree growth."]} +{"14220380|5556391": ["Recently, class imbalance problem in drifting data streams has received attention for chunk-bychunk learning [14\u201319].", "Moreover, most of the existing methods assume that a full chunk of data is always available for training [14].", "Compared to single classifier methods, ensemble methods tend to better cope with concept drift problem, particularly with gradual drifts [14]."]} +{"14170474|192934": ["Following [19], we divide the existing work into three major categories: template matching, statistical classification and neural networks."]} +{"11310799|7158350": []} +{"1494246|11894197": []} +{"54011721|192934": ["[24] wrote a concise yet informative introduction to the classifier combination."]} +{"44007545|53990263": []} diff --git a/edge/graph_54001363.jsonl b/edge/graph_54001363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54003547.jsonl b/edge/graph_54003547.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54009499.jsonl b/edge/graph_54009499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0385ffe1c57afd78e9af4ed2afaef41e84281f0 --- /dev/null +++ b/edge/graph_54009499.jsonl @@ -0,0 +1,4 @@ +{"10638307|54009499": ["The PLSP is based on the assumption that at most one setup may occur within a period.", "Recently, another new type of model has been published which is called the proportional lot sizing and scheduling problem (PLSP) [5].", "For a review of lot-sizing and scheduling models we refer to [5].", "Hence, the DLSP and PLSP are called small-bucket problems and the CLSD is a large-bucket problem.", "But in contrast to the DLSP and PLSP many items are producible per period.", "As in the PLSP, the setup state can be preserved over idle time."]} +{"123826139|62204132": []} +{"122804138|7773456": []} +{"122510861|62204132": []} diff --git a/graph_5401262.jsonl b/edge/graph_5401262.jsonl similarity index 100% rename from graph_5401262.jsonl rename to edge/graph_5401262.jsonl diff --git a/edge/graph_54016377.jsonl b/edge/graph_54016377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54025176.jsonl b/edge/graph_54025176.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54026749.jsonl b/edge/graph_54026749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b42ad87facf1eb98329e540aaa6bc6c8c54228de --- /dev/null +++ b/edge/graph_54026749.jsonl @@ -0,0 +1,5 @@ +{"12954872|5660618": ["Data loss The state of the art on design control systems that take into account the effects of packet loss and packet delay in networked control systems have been surveyed by Hespanha (2007) and Hespanha et al. (2007)."]} +{"18109670|8363289": ["Currently, there are two approaches of MPC, using either online implementation [1] for slow processes or offline implementation [2] for fast processes.", "In addition, the decay rate of that Lyapunov function must be larger than the stage cost [1]."]} +{"55434844|9030703": ["Nevertheless, in the engineering environment, such as industrial automation, unmanned vehicles, real-time distributed decision-making and multiplexed data communication networks [5], and an asynchronous time-division-multiplexed network [6], the sensor delays often occur in a random way and satisfy a time-varying probability distribution."]} +{"119965276|4796356": []} +{"34409824|6327434": []} diff --git a/edge/graph_54035421.jsonl b/edge/graph_54035421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54038126.jsonl b/edge/graph_54038126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42240a7444cf19f09acf3312fe1cade1eb1d2181 --- /dev/null +++ b/edge/graph_54038126.jsonl @@ -0,0 +1 @@ +{"61731468|10565822": ["One of the explanations that was suggested for these difficulties is the high degree of abstraction and complexity required when dealing with the programming paradigm concepts [19], [20]."]} diff --git a/edge/graph_54041463.jsonl b/edge/graph_54041463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5404353.jsonl b/edge/graph_5404353.jsonl similarity index 100% rename from graph_5404353.jsonl rename to edge/graph_5404353.jsonl diff --git a/edge/graph_54050864.jsonl b/edge/graph_54050864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9126e1c4914b1844625faf7bbf8905d94512dad2 --- /dev/null +++ b/edge/graph_54050864.jsonl @@ -0,0 +1,2 @@ +{"7259091|14920988": ["For a detailed overview of symbolic execution techniques, we refer the reader to previously published surveys in the area, such as [11, 19, 32, 34]."]} +{"14636549|14920988": []} diff --git a/edge/graph_54059277.jsonl b/edge/graph_54059277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54060494.jsonl b/edge/graph_54060494.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..335737ad2005742736e8996a86cde7903921bb0b --- /dev/null +++ b/edge/graph_54060494.jsonl @@ -0,0 +1,19 @@ +{"16718621|469744": ["Email: { imarik, ysato, ki } @iis.u-tokyo.ac.jp. 1 For a good survey of augmented reality technologies, see [1]. age of a real scene."]} +{"8368483|469744": ["In a video see-through AR system [Azuma95], video images of the user\u2019s view are always available.", "Synthetic objects enhance the user\u2019s interaction with, or his perception of, the real world [Azuma95]."]} +{"328697|11650495": ["random vertical position, in which case the constant factors for the expected error are and respectively. classic survey is [ 13 ])."]} +{"11005264|11650495": ["The literature on shadow generation in computer graphics is vast, and far beyond the scope of this paper (see [17] for an old, but nice survey)."]} +{"15525516|469744": ["In the field of augmented reality, many researchers have focussed on the first of these problems, namely camera calibration and registration (for example, see [27, 1 ])."]} +{"126593776|2426922": []} +{"126593776|11960624": []} +{"126593776|206986719": []} +{"126593776|16280711": []} +{"126593776|469744": ["In general, realistic augmented reality has been a critical point in computer graphics before the turn of 21 century (Azuma, 1997).", "In general, realistic augmented reality has been a critical point in computer\ngraphics before the turn of 21st century (Azuma, 1997).", "Shadows are one of the significant factors enhancing the realism of augmented reality outdoor rendering which have been examined for more than fifteen years (Azuma, 1997; Naemura et al., 2002; Debevec, 2004).", "Over the last two decades, Augmented Reality (AR) or in general, Mixed Reality (MR) has been one of the most attractive topics in computer graphics making researchers interested in achieving good results in this field (Azuma, 1997; Jacobs et al., 2005; Madsen and Nielsen, 2008).", "Over the last two decades, Augmented Reality (AR) or in general, Mixed\nReality (MR) has been one of the most attractive topics in computer graphics making researchers interested in achieving good results in this field (Azuma, 1997; Jacobs et al., 2005; Madsen and Nielsen, 2008)."]} +{"126593776|11650495": ["is a crucial problem of shadow maps (Williams, 1978; Reeves et al., 1987; Woo et al., 1990; Lokovic and Veach, 2000; Lauritzen and McCool, 2008; Eisemann et al., 2009, 2011; Scherzer et al., 2011).", "Aliasing\n9 is a crucial problem of shadow maps (Williams, 1978; Reeves et al., 1987; Woo et al., 1990; Lokovic and Veach, 2000; Lauritzen and McCool, 2008; Eisemann et al., 2009, 2011; Scherzer et al., 2011).", "Shadow maps require an improvement in aliasing which is their critical problem (Williams, 1978; Reeves et al., 1987; Woo et al., 1990; Lokovic and Veach, 2000; Lauritzen and McCool, 2008; Eisemann et al., 2009; Scherzer et al., 2011)."]} +{"126593776|17024419": ["\u2026AR systems (Madsen and Laursen, 2007), generating realistic virtual objects in augmented reality environments that are indistinguishable from real ones is still an open issue (Yan, 2008; Liu et al., 2009; Sheng et al., 2010; Krevelen and Poelman, 2010; Xing et al., 2012; Madsen and Lal, 2013).", "However, registration and tracking are two of the main issues in building effective AR systems (Madsen and Laursen, 2007), generating realistic virtual objects in augmented reality environments that are indistinguishable from real ones is still an open issue (Yan, 2008; Liu et al., 2009; Sheng et al., 2010; Krevelen and Poelman, 2010; Xing et al., 2012; Madsen and Lal, 2013)."]} +{"27411014|11650495": []} +{"107981328|469744": ["According to Azuma et al. [Azuma97] [Azuma01], an augmented reality system has the following characteristics:\n\u2022 Combines real and virtual objects in a real environment \u2022 Runs interactively in real time \u2022 Registers (aligns) real and virtual objects with each other\nThe definition is not restricted to\u2026"]} +{"1532631|15166896": ["A variety of real-time soft shadowing techniques have been proposed over the past decade [Hasenfratz et al. 2003]."]} +{"1532631|11650495": ["Soft Shadows A complete review of existing shadow algorithms is beyond the scope of this article and we refer the reader to Woo et al. [Woo et al. 1990].", "Real\u2013Time, All\u2013Frequency Shadows in Dynamic Scenes."]} +{"19020033|469744": [", synthesize an Augmented Reality image [1]), we need to simulate accurately the interactions of the virtual object with the illumination of the scene.", "A domain of computer graphics research that has recently attracted increased interest, Augmented Reality (AR) is a variation of Virtual Environments (VE) with the following three characteristics: (1) combines real and virtual, (2) interactive in real time, (3) real and virtual objects are registered in 3-D [1]."]} +{"5330837|11650495": []} +{"2999505|11650495": ["A complete review of existing shadow algorithms is beyond the scope of this article and we refer the reader to Woo et al. [WPF90], Hasenfratz et al. [HLHS03], and to a recent course [EASW09] for a detailed overview."]} diff --git a/edge/graph_54061843.jsonl b/edge/graph_54061843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54062008.jsonl b/edge/graph_54062008.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d654c8ef055d94c1263550e209910d548d4292dc --- /dev/null +++ b/edge/graph_54062008.jsonl @@ -0,0 +1 @@ +{"29536036|5473785": []} diff --git a/edge/graph_54069692.jsonl b/edge/graph_54069692.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54075113.jsonl b/edge/graph_54075113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21efcbaefbab6b8d3284062099d38da0a8d22763 --- /dev/null +++ b/edge/graph_54075113.jsonl @@ -0,0 +1,9 @@ +{"24043486|912956": []} +{"27200357|3348390": []} +{"27200357|1113420": []} +{"46933334|912956": ["The real-time application can be soft or hard [18].", "The scheduling can be either static or dynamic and preemptive or nonpreemptive [18]."]} +{"13339907|28577245": []} +{"6602159|10658846": ["[5, 8] for excellent reviews), applying them to mixedcriticality systems might not be straightforward."]} +{"10574426|240747": ["Some studies try to circumvent these non-deterministic properties through scavenging energy from multiple resources or through improving efficiency via techniques like Maximum-Power-Point Tracking, diminishing the need to have a large energy storage [Weddell et al. 2013].", "2009], diminishing the need to have a large energy storage [Weddell et al. 2013]."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_54075547.jsonl b/edge/graph_54075547.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54077297.jsonl b/edge/graph_54077297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bad2c02d014c5c08b7dafafbd37b5633a3be604 --- /dev/null +++ b/edge/graph_54077297.jsonl @@ -0,0 +1,14 @@ +{"12301195|1074202": ["Although the problem that we are trying to solve is categorized in a combinatorial optimization, there are alternative approaches to over come this problem using common privacy approaches [22], [23], [24], [25] such as differential privacy [26], [27], [28], [29], data encryption [30], or anonymization [19] in cloud environments to preserve the privacy."]} +{"6558483|8281388": ["MapReduce [5], characterized by its remarkable simplicity, fault tolerance, and scalability, is becoming a popular programming framework to automatically parallelize large scale data processing as in web indexing, data mining [6], and bioinformatics [7]."]} +{"6558483|10150488": ["We are also aware of some recent research tackling the scheduling problem of MapReduce as well as the heterogeneity in clouds [12], [20], [21], [22], [23], [24], [25]."]} +{"21721195|9141490": ["CTransfer\u2212t 1\u20444 \u2211t:output Bw *CostPerTransfer; (9)"]} +{"382379|10658846": ["This section introduces the main ones that its use brings about."]} +{"46933334|912956": ["The real-time application can be soft or hard [18].", "The scheduling can be either static or dynamic and preemptive or nonpreemptive [18]."]} +{"4015644|3420321": ["Similar to a typical scientific application, BWA is also computing/data intensive, time consuming, and divisible to some degree [14]\u2013[16]."]} +{"14231576|207228303": ["In recent years, several algorithms have been proposed for this important problem [25]."]} +{"8260270|7842253": ["Second, we brie\ufb02y introduce the related work of applying transfer learning methods in cross-project defect prediction (CPDP) scenario since no study has proposed such methods for CPDI scenario."]} +{"8260270|14792235": ["Regarding this, we identify two major causes:"]} +{"8260270|2623404": []} +{"8260270|1222880": ["Regarding this, we identify two major causes:"]} +{"8260270|13210924": ["Regarding this, we identify two major causes:", "In this section, we present our SIT approach for testing self-adaptive apps suffering uncertainty."]} +{"8260270|3348390": ["In this case, str1 is considered as the IP variable while pos and str2 are considered as other variables, and then seven PVC features based on the path analysis will be extracted from the motivation code."]} diff --git a/edge/graph_54086660.jsonl b/edge/graph_54086660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5408762.jsonl b/edge/graph_5408762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54087635.jsonl b/edge/graph_54087635.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91b47e4d38da101163d1c53a5b07f746eaf7bffc --- /dev/null +++ b/edge/graph_54087635.jsonl @@ -0,0 +1,9 @@ +{"6960803|1805048": ["Our prototype used a hybrid recommendation approach, as such approaches have been shown to out-perform more traditional types of recommenders [17] and provide more \u201cmoving parts\u201d to explain."]} +{"3772504|5014732": ["StarCraft II is a popular RTS game [29] that has been used for AI research [40].", "The RTS domain is challenging for AI due to real-time adversarial planning requirements within sequential, dynamic, and partially observable environments [29].", "However, in the domain of intelligent agents in RTS games, although there is research into AI approaches [29], there is only a little research investigating what humans need or want explained.", ", initially building up economy, some scouting, transitioning to increasing combat [29]."]} +{"127197|1708582": []} +{"127197|1805048": []} +{"2244423|393948": ["This need is consistent with the findings of previous research [5, 20].", "However, a deep CNN is often treated as a \u201cblack box\u201d model because of its incomprehensible functions and unclear working mechanism [5].", "Without a clear understanding of how and why these networks work, the development of high-performance models typically relies on a time-consuming trial-and-error procedure [4, 5, 58].", "Second, CNNs consist of many functional components whose values and roles are not well understood either as individuals or as a whole [5]."]} +{"2244423|2593345": ["Possible solutions are to employ the range traversal technique [16] or provide additional visual hint(s)."]} +{"5063596|7306130": []} +{"5063596|17779926": ["Other works explored how to design for implicit interaction with sensing-based systems [14, 75, 86, 175], and help people predict what will happen through feedforward [12, 176].", "Furthermore, while rule extraction is an old research area, and quite separated from the recent developments in iML and FAT, there have been new papers within the past few years, such as methods for rule extraction from deep neural networks [187, 75]."]} +{"10227936|562855": ["Different paradigms of multi-agent organization should be explored (Horling and Lesser, 2004)."]} diff --git a/edge/graph_54093082.jsonl b/edge/graph_54093082.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ad888a387b42b8e89c13625fd139cc8c0315ac5 --- /dev/null +++ b/edge/graph_54093082.jsonl @@ -0,0 +1 @@ +{"16477177|239537": ["The survey paper by Herman et al. [11] represents the most complete literature review up to 2000."]} diff --git a/edge/graph_54093554.jsonl b/edge/graph_54093554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54134680.jsonl b/edge/graph_54134680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad0e7e96014157552c5fb1766d96e5edd9f8c640 --- /dev/null +++ b/edge/graph_54134680.jsonl @@ -0,0 +1,22 @@ +{"8197138|3540699": ["264/AVC can save approximately 50% of bit rate with equivalent visual quality [7] and thus is practical for bandwidth-limited mobile applications."]} +{"6674407|192934": []} +{"1386764|5646762": []} +{"1386764|191396": []} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"33178238|3102110": []} +{"691081|192934": []} +{"10665814|192934": ["Pattern recognition is a study on distinguishing interest patterns from their background under supervised or unsupervised manner [2]."]} +{"10141593|11608263": ["An overview on this topic is provided in [60]."]} +{"20801508|63137": ["Specifically, the univariate marginal distribution algorithm (UMDA) (M\u00fchlenbein 1998) and population-based incremental learning (PBIL) (Baluja and Caruana 1995) are closely related to ACO (Cord\u00f3n et al. 2002; Monmarch\u00e9 et al. 2000; Zlochin et al. 2004)."]} +{"4643842|191396": []} +{"459764|191396": ["A comprehensive review of the state-of-the-art clustering methods can be found in (Xu and Wunsch, 2005) and (Rokach and Maimon, 2005)."]} +{"459764|954543": ["The process of knowledge discovery from databases necessitates fast and automatic clustering of very large datasets with several attributes of different types (Mitra et al., 2002)."]} +{"20185733|6923178": []} +{"3346652|12260867": ["From this stand\u00adpoint, and provided that \nrandom access is prohibitively expensive [Guha et al. 2003], performing linear scans of the data is the \nonly acceptable access method in terms of computational ef.ciency.", "Extracting potentially useful knowledge \nfrom data streams is a challenge per se."]} +{"12894036|191396": ["Clustering methods [1] [2] have been addressed in many contexts and disciplines such as data mining, document retrieval, image segmentation and pattern classification."]} +{"37023143|191396": []} +{"11917170|191396": ["Besides, we propose a new similarity measure between partitions proving that it is a kernel function.", "\u2026Havana University, Cuba\na r t i c l e i n f o\nArticle history: Received 4 May 2009 Received in revised form 1 March 2010 Accepted 3 March 2010\nKeywords: Cluster ensemble Kernel function Similarity measure Clustering validity index Consensus partition\n03/$ - see front matter & 2010 Elsevier Ltd."]} +{"5646161|49842767": []} +{"385307|3102110": []} +{"206550568|191396": []} diff --git a/graph_5415387.jsonl b/edge/graph_5415387.jsonl similarity index 100% rename from graph_5415387.jsonl rename to edge/graph_5415387.jsonl diff --git a/edge/graph_54170745.jsonl b/edge/graph_54170745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f34509786bded21d6a9282855fceda39bc6047e --- /dev/null +++ b/edge/graph_54170745.jsonl @@ -0,0 +1,5 @@ +{"14104658|1177069": ["A large body of research has investigated coverage path planning in 2D environments and applications have been reported in domains such as aerial robotics, agricultural robotics, mine countermeasures (MCM) operations and marine robotics (see [1] for a survey)."]} +{"20417750|8983048": ["However, the registration algorithms have their limitations; with high positioning error or not enough overlap they cannot fuse the surfaces [11] [9]."]} +{"15607663|468992": ["Swarm-intelligence approaches seek to provide simple rules which result in an emergent global behavior [13], [14]."]} +{"31281042|11761017": ["In-depth surveys can be found at Newman and Jain (inspection) [28], Roy et al. (recognition) [ 36 ], Scott et al. (reconstruction, inspection) [43] and Tarabanis et al. (inspection, recognition, reconstruction) [49]."]} +{"874160|1177069": ["A comprehensive survey of the existing coverage path planning methods may be found in [8]."]} diff --git a/edge/graph_54178463.jsonl b/edge/graph_54178463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54181011.jsonl b/edge/graph_54181011.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54188518.jsonl b/edge/graph_54188518.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f639f09b35114cc87431c0037ae1e9408a81b2e0 --- /dev/null +++ b/edge/graph_54188518.jsonl @@ -0,0 +1,2 @@ +{"47176821|14441987": ["In proactive scheme [1], all nodes maintain their routing tables for all possible destinations irrespective of the need of routes."]} +{"16270489|15640936": ["For instance, [13, 9, 20] discuss several aspects of routing in a mobile environment and compare different solutions including Mobile-IP."]} diff --git a/edge/graph_54194454.jsonl b/edge/graph_54194454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54194562.jsonl b/edge/graph_54194562.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7d0efa9d9ad89092858a0b32ef4a1fa79cb9ecb --- /dev/null +++ b/edge/graph_54194562.jsonl @@ -0,0 +1,4 @@ +{"8834875|6327434": ["The sequential likelihood ratio test has been applied to Kalman filter innovations by Chien and Adams (1976), Willsky and Jones (1976), Bonivento and Tonielli (1984), and Uosaki (1985), and to residuals from inputoutput parity equations by Deckert et al. ( 1977).", "This is either a preset nominal value (Chien and Adams, 1976) or is obtained by maximum likelihood estimation from the innovations (Willsky and Jones, 1976)."]} +{"11962339|1097238": ["among its base learners tends to achieve better generalization performance [36].", "Many works [36]\u2013[39] have demonstrated that a single method can seldom perform consistently well across a variety of applications."]} +{"18188725|393948": ["It is shown that the representation de\ufb01nes the upper-bound performances of machine learning algorithms [19]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_54196955.jsonl b/edge/graph_54196955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30fce5c0b4ae2f655c00d2025c8b93726b4972a6 --- /dev/null +++ b/edge/graph_54196955.jsonl @@ -0,0 +1,9 @@ +{"27890308|8909218": ["The deployment of small cells, such as femtocells, has emerged as a promising technology to extend service coverage and increase network throughput [225]."]} +{"15506108|1230643": [", [2], and they form a natural platform for effective, lowcost BSS."]} +{"1363497|1680300": []} +{"56146757|3054454": ["In wireless communications, the intersymbol interference (ISI) due to multipath channels and the cochannel interference (CCI) due to multiple channels often cause severe signal distortion and limit system performance (Proakis 1995; Ertel et al. 1998)."]} +{"12920221|11720829": ["This is greatly due the advances on signal processing strategies which are employed to perform information recovery from different sources (users) into the system."]} +{"28269477|1680300": ["In the last decades, two general classes of automatic modulation classification (AMC) algorithms are likelihoodbased (LB) and feature-based (FB) methods, respectively [1]."]} +{"4545672|4122595": ["As a key component of cognitive radio [6]\u2013[9], it is a prerequisite for the wireless operation of a device to adapt to its environment and maximize the utility of the available spectrum resources.", "This has led to research on cognitive radio technology [6]\u2013[9] and machine learning [10]\u2013[13], both of which form the pillars to support the intelligent processing requirements of wireless communication systems.", "As a key component of cognitive radio [6]\u2013[9], it allows the wireless operation of a device to adapt to its environment and maximize the utility of the available spectrum resources."]} +{"4545672|8909218": ["The deployment of small cells, such as femtocells, has emerged as a promising technology to extend service coverage and increase network throughput [179]."]} +{"41750828|1680300": ["This method is denoted as hybrid likelihood ratio test [14].", "Several meth-ods of modulation classi\ufb01cation have been reported for SISO systems [12\u201314]."]} diff --git a/edge/graph_54198441.jsonl b/edge/graph_54198441.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74e8b8c0e07c465ce4bbd09c52d15d021b0f7b24 --- /dev/null +++ b/edge/graph_54198441.jsonl @@ -0,0 +1,4 @@ +{"12934051|13916820": ["Some issues in cloud computing security are surveyed and studied [6-13]."]} +{"3057478|14420517": ["There are several security standard specifications [79] such as Security Assertion Markup Language (SAML), WSSecurity, Extensible Access Control Markup (XACML), XML Digital Signature, XML Encryption, Key Management Specification (XKMS), WS-Federation, WS-Secure Conversation, WS-Security Policy and WS-Trust."]} +{"3057478|627405": ["We have carried out a systematic review [13-15] of the existing literature regarding security in Cloud Computing, not only in order to summarize the existing vulnerabilities and threats concerning this topic but also to identify and analyze the current state and the most important security issues for Cloud Computing."]} +{"34668439|6430931": ["However, IDPS performance is hindered by the high false alarm rate it produces (Wu and Banzhaf, 2010)."]} diff --git a/graph_5419878.jsonl b/edge/graph_5419878.jsonl similarity index 100% rename from graph_5419878.jsonl rename to edge/graph_5419878.jsonl diff --git a/edge/graph_54204439.jsonl b/edge/graph_54204439.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54207952.jsonl b/edge/graph_54207952.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..369be61211234a698529db9bf510eeaf74c5c92a --- /dev/null +++ b/edge/graph_54207952.jsonl @@ -0,0 +1,3 @@ +{"51877031|206584087": ["Malicious activities can be manifested as Denial of Service (DoS) attacks [156,208,214], False Data Injection (FDI) attacks (e."]} +{"51877031|13985031": []} +{"51877031|26257441": ["This is why simulation has long been advocated as a way to explore and understand system behavior for knowledge retrieval [171,175], and has been used for safety assessment since the 1970s\u201380s."]} diff --git a/edge/graph_54211848.jsonl b/edge/graph_54211848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da1901f28f3e816438e7732c78290a85e44d485b --- /dev/null +++ b/edge/graph_54211848.jsonl @@ -0,0 +1,6 @@ +{"124430579|6946183": []} +{"40787244|6946183": []} +{"32728316|6946183": ["Moreover, if G is a complete bipartite graph Km,n withm \u2265 2 and n \u2265 6m, then trc(G) = 7 > rc(G)+ rvc(G) = 4+1 [9,11,12].", "For details about themwe refer the readers to the book [10] and the survey paper [9]."]} +{"41366615|6946183": []} +{"4570434|54211848": []} +{"4570434|6946183": []} diff --git a/edge/graph_54212916.jsonl b/edge/graph_54212916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54217342.jsonl b/edge/graph_54217342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_542269.jsonl b/edge/graph_542269.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53e77f17d9e059a8d96170ee54c09676594f92ff --- /dev/null +++ b/edge/graph_542269.jsonl @@ -0,0 +1 @@ +{"12320930|431089": ["In the simple case of binary classification, an SVM works by embedding data in a highdimensional space and attempting to find the hyperplane that best separates the two classes [25]."]} diff --git a/graph_5428176.jsonl b/edge/graph_5428176.jsonl similarity index 100% rename from graph_5428176.jsonl rename to edge/graph_5428176.jsonl diff --git a/edge/graph_5429500.jsonl b/edge/graph_5429500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_543643.jsonl b/edge/graph_543643.jsonl similarity index 100% rename from graph_543643.jsonl rename to edge/graph_543643.jsonl diff --git a/edge/graph_54435050.jsonl b/edge/graph_54435050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54437297.jsonl b/edge/graph_54437297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55b1023655ee3194439531ef02728c61c853e9c9 --- /dev/null +++ b/edge/graph_54437297.jsonl @@ -0,0 +1,14 @@ +{"8465797|8310135": ["NER is an important sub-problem in IE; see [91, 81] for surveys of techniques for NER."]} +{"14785033|386036": ["Entity resolution has been studied under various names including record linkage, merge/purge, deduplication, reference reconciliation, object identification, and others (see [15], [14] for recent surveys)."]} +{"16004059|12161567": []} +{"49901898|12161567": ["We borrow notations from (Nickel et al., 2016a) and describe the parameter complexity of our model in terms of the number of each component and corresponding embedding dimension requirements.", "All knowledge graphs share common drawback of incompleteness and sparsity and hence most existing relational learning techniques focus on using observed triplets in an incomplete graph to infer unobserved triplets for that graph (Nickel et al., 2016a).", "Later, many sophisticated models (Neural Association Model (Liu et al., 2016), HoLE (Nickel et al., 2016b)) have been proposed.", "For a comprehensive survey of relational learning methods and empirical comparisons, we refer the readers to (Nickel et al., 2016a), (Kadlec et al., 2017), (Toutanova and Chen, 2015) and (Yang et al., 2015)."]} +{"32740691|17485266": ["We used the Adam optimiser [13] to train the parameters in the self-attentive network, which had the best overall performances on sparse training data, according to [25]."]} +{"221328|17157304": ["We think that parallel research on email spam fighting [19; 95; 113] and spam on social websites [58] might also be relevant."]} +{"195346137|207743293": ["Specific systems have been proposed to detect rumors [66]."]} +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} +{"16151360|12161567": ["\u2026work focuses on determining the validity of factual assertions from simple, well-formed statements; the related problems of information extraction [22], claim identi\ufb01cation [23], answering compound assertions [24], and others [25] are generally built in-support-of or on-top-of this central task."]} +{"4247496|386036": ["One of the major challenges whenlinkinglargedatabasesis \nthe e.cient and accurate classi.cation of record pairs into matches and non-matches."]} +{"32730475|195881905": []} +{"32730475|181631491": []} +{"52154496|207743293": ["To tackle this problem, different fact-checking tools and frameworks have been proposed (Zubiaga et al., 2017), mainly divided into two categories: fact-checking over natural language claims (Thorne and Vlachos, 2018) and fact-checking over knowledge bases, i.e., triple-based approaches (Esteves et\u2026"]} diff --git a/edge/graph_54438455.jsonl b/edge/graph_54438455.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3654a7f8b37a3b317f69856498d9d9c54b5b9d21 --- /dev/null +++ b/edge/graph_54438455.jsonl @@ -0,0 +1,5 @@ +{"2003896|2355696": []} +{"2003896|20905429": []} +{"2003896|1118130": ["This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the anticipated stress level is within healthy boundaries.", "This proactive stress management application unobtrusively monitors social signals [Vinciarelli et al. 2012], such as the voice of a busy user, infers current stress levels from voice features, predicts future ones based on the user\u2019s calendar and then intelligently reschedules meetings so that the\u2026"]} +{"23592603|1850236": []} +{"7079460|6078328": ["The concept of location has been treated as the key feature to characterize mobility in most theoretical models of mobile agents [30], such as distributed join calculus [6] and !dist [31]."]} diff --git a/edge/graph_54439535.jsonl b/edge/graph_54439535.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b013d1f159533a124daac807e1977214fc28f191 --- /dev/null +++ b/edge/graph_54439535.jsonl @@ -0,0 +1,40 @@ +{"2596985|17516538": ["The analysis of crowd movements and behaviour is of particular interest in the surveillance domain [ 7 ]."]} +{"4863545|1029120": []} +{"5540604|2355696": []} +{"15240258|12127129": []} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"8730295|5755403": ["There is a pressing need in public monitoring [10, 11, 17, 22, 23], safety management [4, 9, 15, 18, 25] and crowd Multimed Tools Appl (2016) 75:11945\u201311960 DOI 10."]} +{"11592349|1634674": ["We build liberally upon theoretical thrusts from several different disciplines, including Analytical Hamiltonian Mechanics and human activity recognition [1], especially for multiple activities [2]."]} +{"12410940|17516538": ["However, in recent years computer vision systems are trying to model and interpret different sorts of human activities [ 7 ] including the behaviour of crowds [8]."]} +{"13709403|4915696": ["Researchers have attempted to provide a comprehensive survey and evaluation of existing techniques for various aspects of crowd analysis [105, 30, 44, 55, 117].", "Li et al. [55] surveyed di \ufb00 erent methods for crowded scene analysis tasks such as crowd motion pattern learning, crowd behavior, activity analysis and anomaly detection in crowds."]} +{"363733|17516538": []} +{"61507129|16525678": []} +{"61507129|17516538": []} +{"1303485|4915696": ["A more comprehensive review of physics-inspired crowd models covering the 3 main aspects of crowd motion pattern segmentation, crowd behavior recognition and anomaly detection can be found in [17].", "This is as opposed to previous surveys, especially computer vision related reviews such as in [17], that focuses on computer vision techniques (e.", "Most existing survey papers [13, 14, 15, 16, 12, 17] focuses on the computer vision techniques and review the essential features required for application specific crowd analysis."]} +{"1303485|61238909": ["[23] briefly highlighted the difference between physics-based and physics-inspired methods."]} +{"19981134|1303485": ["Moreover, the interest in the field of video surveillance technology [3], [4], is increasing with the availability of lowcost sensors and processors; especially in order to understand human behavior.", "A substantial analysis of the existing reviews in [3] and [5] reveals a wider perspective on the potential application of computer vision and artificial intelligence in the efficient representation of human behavior in crowded scenes."]} +{"8034133|1634674": []} +{"1417739|17516538": ["Visual surveillance methods have been devloped to estimate motion of objects and people in the scene, in isolation or in groups; a review can be found in [38]."]} +{"6212462|4915696": [", abnormal event detection, crowd scene classification and crowd behavior recognition) (Zhan et al. 2008; Cezar et al. 2010; Li et al. 2015).", "A comprehensive survey on crowdmotion segmentation can be found in (Zhan et al. 2008; Cezar et al. 2010; Li et al. 2015).", "\u2026communities with applications ranging from profiling crowd attributes (e.g., crowd density, collectiveness and stability) to behavior understanding (e.g., abnormal event detection, crowd scene classification and crowd behavior recognition) (Zhan et al. 2008; Cezar et al. 2010; Li et al. 2015)."]} +{"5417454|14970359": ["\u2026movements of the body [Fujiyoshi and Lipton 1998; Parameswaran and Chellappa 2006], simple action recognition such as walking and kicking [Moeslund and Granum 2001; Fathi and Mori 2008], and the recognition of complex actions that combine a series of singular actions, such as ballet\u2026"]} +{"3391653|4915696": ["This paper focuses on abnormality detection in crowded scenes, which is more challenging due to frequent occlusions at various degrees [9]\u2013[13]."]} +{"3391653|15178364": ["One concomitant problem is the booming video data, which is time-consuming for humans to cope with [1] and [2]."]} +{"27637541|1634674": ["[118] distinguish between actions and activities by defining that", "Inside 2D-template-based approaches described in [118], temporal templates are estimated for each action class.", "methods shown in [118]); or based on the extraction of features from each silhouette and model the dynamics of the action explicitly (again, similarly to the aforementioned \u2018holistic\u2019 approaches).", "\u2019s [118] action modelling classification.", "[118], approaches for modelling actions can be categorised into three major classes: nonparametric, volumetric, and parametric time-series approaches (see Fig.", "In volumetric approaches, in contrast, features are not extracted on a frame-by-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case [118]."]} +{"27637541|12127129": []} +{"27637541|17516538": ["[41]; this paper is highly comprehensive, as it starts with motion detection and object classification and tracking, but also deals with HBU; it divides the approaches to this task", "There are handfuls of previous surveys which analyse and describe \u201chuman motion\u201d or \u201chuman behaviour understanding\u201d [41, 88, 43, 87, 121]; earlier works, as is logic, review lower level techniques (e.", "At the motion level, tasks such as movement detection, and background extraction and segmentation are faced [41, 72, 89]."]} +{"27637541|14970359": ["Moeslund et al. [72] defined an action taxonomy which has been adopted in later works and subsequent surveys.", "The work by Moeslund et al. [72], from 2006, can be divided into two major parts: pose and motion capture, and action recognition.", "In the work by Moeslund [71], bigger emphasis is given to the recognition of motion and actions, whereas activities and behaviours are treated to a minor extent.", "Pose estimation techniques are introduced next, and they are classified into three groups as in [71], according to the presence and use of an explicit model: model-free, indirect model use, direct model use.", "An evolution of the works presented under this section of Moeslund\u2019s work, can be seen in the papers by Bandouch, Beetz, et al. [7, 9]; which are commented later on.", "Nevertheless, the techniques revealed in [71] allow a greater understanding of current methods, and thus, both this and [34] can be used to introduce the"]} +{"27637541|7788290": []} +{"64430186|1303485": []} +{"64430186|4915696": []} +{"64430186|61238909": []} +{"64430186|27637541": []} +{"64430186|17516538": []} +{"13164291|17516538": []} +{"29408519|4915696": []} +{"61238909|1634674": ["The dynamic nature of video makes activity search and recognition from video databases a very difficult problem [28, 1, 2, 18, 26, 27]."]} +{"15466712|50041": ["The related topic of categorizing the genre of produced video was covered in a review by Brezeale and Cook [2]"]} +{"15466712|17516538": ["Citing [5], Ko noted that \u201crelatively little research has been reported on reliable classi\ufb01cation and understanding of human activities from video image sequences\u201d [6].", "Hu et al. [5] produced a 2004 survey of automated visual surveillance which focuses on the two areas of motion detection and object tracking, offering only a short overview of behavior understanding.", "However, Dee and Hogg refer their readers to the earlier reviews [4], [5] for further treat-ment."]} diff --git a/edge/graph_54440351.jsonl b/edge/graph_54440351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74cb3b32e58e32960e1c62aff10d4d172dddf1a0 --- /dev/null +++ b/edge/graph_54440351.jsonl @@ -0,0 +1,8 @@ +{"18828955|14755547": ["Although PE is conceptually simple and computationally fast [2], the method does not consider the mean value of amplitudes and differences between amplitude values [6].", "Nevertheless, other time-delay values for DE, like PE [2], [6] , might provide additional information, related to the intrinsic time scales of the time series."]} +{"425440|7076154": ["EEG irregularity and complexity analyses have been successfully and widely employed and provide a new view to understand physiological processes in both healthy and pathological conditions in AD [1,11,13,26\u201328]."]} +{"125852633|14755547": []} +{"45313126|14755547": []} +{"119391599|33286487": []} +{"126324955|207372751": []} +{"53141267|33286487": []} +{"125845685|13543356": []} diff --git a/edge/graph_54441222.jsonl b/edge/graph_54441222.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f740cc2386d9f8d39f1070f07cf615012efc84c7 --- /dev/null +++ b/edge/graph_54441222.jsonl @@ -0,0 +1 @@ +{"6643894|206584087": ["We describe some major accountability and DDoS defense schemes; comprehensive surveys about DDoS defense can be found in Zargar et al. [56] and in Mirkovic et al. [57]."]} diff --git a/edge/graph_54441245.jsonl b/edge/graph_54441245.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78cf2b8e94228ac27db82c6cba6b04a42ab06b86 --- /dev/null +++ b/edge/graph_54441245.jsonl @@ -0,0 +1,13 @@ +{"15850185|239537": ["Studies on graph visualization are surveyed in [3, 10].", "Graph drawing techniques [3, 10] can help one better visualize graphs, but visualizing large graphs quickly becomes overwhelming."]} +{"36277406|14022133": ["Despite the great amount of work done in ontology-based data integration, an important problem that most of the systems tend to ignore is that ontologies are living artifacts and subject to change [3].", "When using ontologies to integrate data, one is required to produce mappings [3], to link similar concepts or relationships from the ontology/ies to the sources by way of an equivalence."]} +{"14489920|239537": ["To overcome the problems raised by the large graph sizes, navigation, interaction and, summarization techniques are often incorporated into graph visualization tools [ 13 ]."]} +{"38535896|304226": ["\u2026of an ontology can facilitate and reduce the cost of the next task(s) in various applications such as querying a complex data source [3], [4], integrating di \ufb00 erent data sources [5], entity summarization [6], labeling [7], knowledge based summarization [8] and schema matching process [9]."]} +{"2434400|14205872": []} +{"6356910|14022133": ["Despite the great amount of work done in ontology-based data integration, an important problem that most of the systems tend to ignore is that ontologies are living artifacts and subject to change [4].", "This is the mapping definition process [4] and the output of this task is the mapping, i."]} +{"6497230|14022133": []} +{"2227285|6128186": []} +{"17825742|8125630": []} +{"17825742|239537": []} +{"8489918|5671282": ["in [30]."]} +{"28002538|2685137": ["We use hierarchical BLs, similar to dimension hierarchies common to most OLAP data models [28]."]} +{"6483011|4566623": ["\u2026is an active area of research with a wide variety of applications, a limited effort has been devoted to survey the research developed [9,24,26,29,48], and this effort has often targeted speci\ufb01c subproblems (e.g., interactive [11, 48] and mining-based [9] graph summarization), or speci\ufb01c\u2026"]} diff --git a/edge/graph_54442366.jsonl b/edge/graph_54442366.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54444393.jsonl b/edge/graph_54444393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91d940c943b0edfd451b3d168a0e32fc6fe983e4 --- /dev/null +++ b/edge/graph_54444393.jsonl @@ -0,0 +1,3 @@ +{"22545613|44286242": ["A detailed survey on periocular biometrics can be found in [8]."]} +{"62909282|2323881": ["Extracting accurate face pose information in terms of these angles has always been a very challenging problem in FR literature [17, 18].", "There are also a few papers that review FR across pose variations [17, 18], illumination variations [31, 32], aging [33] and forensic applications [34]."]} +{"62909282|11179184": ["A recent 2014 survey on single and multimodal FR can be found in [30]."]} diff --git a/edge/graph_54444519.jsonl b/edge/graph_54444519.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28588b53d242980e4031090e5c20b9c575507fad --- /dev/null +++ b/edge/graph_54444519.jsonl @@ -0,0 +1,60 @@ +{"32654078|1442447": ["Another trend to enhance IoT systems is the introduction of an abstract middleware layer to enable object virtualization, such as FI-WARE [26] and ETSI oneM2M [27]."]} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"12559974|6430931": []} +{"6448299|16748080": ["services depends on the following network factors [23], [24]:"]} +{"6448299|1775475": ["QoS is defined as the extent of discrepancy between the desires of a customer and their perceptions depending on the underlying concepts of bandwidth, throughput, timeliness, reliability, perceived quality and cost [22]."]} +{"52812299|9495329": []} +{"52812299|4427557": []} +{"52812299|4502294": []} +{"52812299|2769147": []} +{"52812299|19938676": []} +{"52812299|2871699": []} +{"52812299|3348390": []} +{"52812299|25929315": []} +{"2837864|13172512": ["In this subsection, we summarize the surveys [29]\u2013[31], [40], [53], [54], [77], [78] on deep packet inspection in recent years, and state clearly the motivations of our survey.", "The first three surveys [29], [40], [53] mainly focus on deep packet inspection technologies for Internet traffic classification, not mainly on pattern matching technologies.", "Nguyen and Armitage [40] reviewed related works prior to 2008, interested reader may refer to Finsterbusch\u2019s survey [29] for recent machine learning approaches.", "Nguyen and Armitage [40] reviewed related works prior to 2008, interested reader may refer", "Nguyen and Armitage\u2019s survey [40] focuses solely on statistical analysis for traffic classification, which belongs to the generalized payload-independent DPI method, thus is on a different topic compared to our survey."]} +{"7765934|141053": ["Link layer: the authors in [18] present a broad overview of the MAC protocols conducted in the field of wireless sensor and ad hoc networks."]} +{"7765934|1236072": ["In addition, in [21], the authors study the design trade-offs between energy and communication overhead savings for the existing routing protocols."]} +{"15393244|2906773": ["Despite the improvement in complexity, effective Bloom filter implementations may not be possible on resource constrained embedded devices [9]."]} +{"51977326|206584087": ["This attack is very critical to IIoT networks 23 as they are made up of constrained devices with very limited 24 resources [30]."]} +{"16593034|1906759": ["For both sets a simple Round-Robin scheduler was implemented [33]."]} +{"14828106|2142482": ["Though, these are suited for WSN, they didn't consider loT environment and few have postulated IDS for loT with Shazid Raza et al. [6] comprehensive work being the initial attempt.", "There are slews of works for detecting sinkhole attacks on WSN [7][8).", "Wireless Sensor Network (WSN) is an integral part of loT and can be subjected to various attacks with routing layer attacks being the most prominent one."]} +{"14828106|28628245": []} +{"18782182|12594004": ["Machine learning based techniques can be divided into Genetic Algorithms, Fuzzy Logic, Neural Networks and Bayesian networks (Kaur et al. 2013)."]} +{"49865065|2134031": ["A survey reported in [52] offers an overview of the available solutions for global navigation satellite system (GNSS) and non-GNSS localization threats."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"14169163|16209841": ["However, it is dif\ufb01cult to operate a conventional pattern-matching engine on smart objects, because most of them are resource constrained in terms of power, processing and memory space [10\u201312].", "Security is one of the most important features to be taken into account in designing the IoT, because of the connectivity and sensitivity of the data collected [6,10,13]."]} +{"7835372|1230643": ["WSNs have specific challenges due to low transmission bandwidth, constrained power supplies, tiny memory sizes and, finally, limited power [3,4]."]} +{"22207206|21386749": ["The different phases of patient data transfer are shown in Figure 1 (see [13])."]} +{"2142482|14745481": ["We recognize that many reputation and trust management systems actually take into consideration of both multitrust and unitrust in trust composition [49, 50, 51, 52, 53, 54, 55, 56, 57]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"7170677|2181694": ["In fact, in spite of the presence of some partial works like [15], [79], [81], [85], till this date there have not been any survey paper that collects all the significant IDSs and gives overviews of those works in terms of the underlying techniques they use along with important observations and obtained results."]} +{"7170677|7774517": ["In fact, in spite of the presence of some partial works like [15], [79], [81], [85], till this date there have not been any survey paper that collects all the significant IDSs and gives overviews of those works in terms of the underlying techniques they use along with important observations and obtained results."]} +{"7170677|17205659": ["The node replication [30], [31], [88] Add extra node to the network with the same cryptographic secrets Neglect and greed [70] Deny transmission of legitimate packets and give higher priority to own packets", "HELLO flood [32] Flood with HELLO packets Unfairness [70] Unfair resource allocation on MAC protocols", "most vulnerable to this type of attack [70].", "5) Unfairness: This attack is a weaker form of DoS attack located in the link layer.", "Note that providing fairness in WSNs is often viewed as a separate research issue [70]."]} +{"8601916|13172512": []} +{"4087845|3348390": ["In a broader scope, third-party applications or the end-user can subscribe to a particular node of the tree."]} +{"69233915|6664074": []} +{"69233915|9495329": []} +{"69233915|3348390": []} +{"44819618|1520906": []} +{"44819618|2142482": []} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"14801365|28628245": ["The C/C++ code can then be compiled for the simulation environment or directly for the target hardware platform."]} +{"1517537|2398835": []} +{"1517537|18189153": ["Routing Attacks [65] Spoo\ufb01ng attacks (IP and URL spoo\ufb01ng), rushing, gray hole, black hole, Cybil, man-in-the-middle attacks, and sleep deprivation."]} +{"1517537|16654832": ["Meanwhile, different communication networks are available, such as Wi-Fi, LTE 3G/4G, and wireless networks, which connect end users to network resource [45]."]} +{"1517537|12815020": ["Port Scanning Scan the free and less secure port for attempting attacks.", "Port Scanning [63] TCP scanning, UDP Scanning, SYN scanning, FIN scanning, ACK scanning, and Window scanning."]} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"39527899|18189153": ["In [7], Nadeem and Howarth summarized the intrusion detectionmethods forMANET, which is one kind of network structure of the IoT."]} +{"39527899|12815020": []} +{"5731070|16209841": []} diff --git a/edge/graph_54444608.jsonl b/edge/graph_54444608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..848921c429aa1ec74c227fa285624674e754baaa --- /dev/null +++ b/edge/graph_54444608.jsonl @@ -0,0 +1,21 @@ +{"7591686|13902036": ["There are three methods in machine learning for profiling, namely content-based [1] [18], collaborative methods [19] [20], and hybrid between these two [21], [22],[23]"]} +{"4019766|86629084": []} +{"4019766|5724477": ["Additionally, machine learning algorithms can be used to map the vector of features onto activity labels [24], [25]."]} +{"4019766|10817088": ["In the past few years, continuously collected data in ambient intelligent environments (a-health) have been used to look for changes in health status and design in-thehome health interventions [16]."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"27360477|3330461": []} +{"206739717|206764452": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43]."]} +{"206739717|1029120": ["For a more comprehensive review of research on pedestrian detection and protection, see [38], [42], and [43].", "easy task to separate pedestrians from background in an image or video sequences in the computer vision domain [38], and"]} diff --git a/edge/graph_54445451.jsonl b/edge/graph_54445451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d734f2c36a4d795a8bfa50f6fa7ef9179aa7b7b --- /dev/null +++ b/edge/graph_54445451.jsonl @@ -0,0 +1,3 @@ +{"34777397|26429034": ["In the past decades, the proliferation of personal mobile devices makes Call Detail Records (CDRs) a very promising source of location information [1]."]} +{"63395329|26429034": ["As a consequence, the literature on the study of cellular network traffic has grown dramatically [1].", ", a user\u2019s whereabouts or data traffic) has recently emerged as a central question in multi-disciplinary research [1, 2, 3, 4, 5, 6, 7, 8, 9]."]} +{"12704706|26429034": []} diff --git a/edge/graph_54446694.jsonl b/edge/graph_54446694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0a174dae016677264a87cd9b866e849e5fd6b7b --- /dev/null +++ b/edge/graph_54446694.jsonl @@ -0,0 +1,159 @@ +{"22828043|1420935": ["Firstly, the inherent local usage of energy in such a system results in better power quality, i.e. less voltage \ufb02uctuations, and even more directly in less line loss [10].", "Moreover, they contribute to an overall improvement of chain ef\ufb01ciency and smoothing of frequency and voltage \ufb02uctuations [10].", "Since then, an array of literature has adopted this new de\ufb01nition (cf. [6]\u2013[9] and [10] for a comprehensive review of energy trading in the smart grid).", "In all cases considered, higher loads result in higher prices (in agreement with the costs for power generation [10])."]} +{"16900836|15669036": []} +{"3070125|30102381": ["[17], review several smart grid testbeds and they highlight the importance of being able to evaluate the coupled interaction between the physical and cyber components."]} +{"3070125|15895606": ["According to [36], it is possible to divide all elements in a CPS in three categories: i) Cyber: Elements that do not have direct contact with the physical world, ii) Physical, all the elements that are merely physical and do not have a direct relation with the cyber-elements, and iii) cyber-physical, all the devices that link the physical and the cyber world (e."]} +{"3070125|8854215": ["[12] summarize possible cyber-attacks at all the stages of grid."]} +{"3070125|1990579": ["Altawy and Youssef [33] survey various possible attacks that may affect privacy, and also discuss how several attacks like falsifying GPS information, or manipulating control commands can make the drones to malfunction.", "AlTawy and Youssef [20] consider the trade-offs in CPS, with a case study on implantable medical devices."]} +{"3070125|2521001": ["[15] focuses on electricity consumption at homes and buildings."]} +{"3070125|207209718": ["[41] propose a different classification of IDS, with two main groups: detection technique and audit material.", "[41] focus exclusively on the topic of intrusion detection systems for CPS."]} +{"3070125|23893450": ["[16] focuses on a taxonomy of the life cycle of smart grid data, which can be decomposed into four sequential stages: generation of data, acquisition, storage, and processing."]} +{"50776107|31245252": ["[8] and Al-Fuquha et al."]} +{"50776107|4427557": ["[76] From a data rate perspective, LoRa provides better data rates than Sigfox and is ideal for data transfer rates between 300 bps and 5000 bps.", "To improve the robustness of the communication, LoRa includes a variable cyclic error correcting scheme as well [76].", "On the other hand, due to the limited bandwidth and absence of direct path, it is really hard to get error free localization in LPWA technologies [76]."]} +{"50776107|21386749": ["[6] covers the IoT-based healthcare technologies."]} +{"50776107|2829149": []} +{"4809588|17397315": ["Based on the survey of privacy aspects in big data [5], few of the privacy preserving mechanisms can be listed down as in Table 1."]} +{"4809588|36366678": ["And yet again, design of an optimal privacy budgeting strategy is a great challenge [16].", "As in [16], the data release mechanisms fulfilling differential privacy needs to be evaluated according to the dataset, its purpose in providing privacy and the phase of big data in which it is to be implemented.", "The larger noise added to the output is, the larger b is and, in the meanwhile, the smaller \u03b5 becomes [16]."]} +{"9498710|1503157": ["This is a challenging work due to the scattered pattern of existing research on IoT technologies and devices (WHO 2011, Ruiz-Garcia et al. 2009, 2011, Lee et al. 2010, Alemdar and Ersoy 2010).", "But many reviews (WHO 2011, Ruiz-Garcia et al. 2009, 2011, Lee et al. 2010, Alemdar and Ersoy 2010), as well as our investigation, have indicated the scattered pattern of the existing research."]} +{"9498710|1230643": ["Akyildiz et al. (2002) and Yick et al. (2008) have thoroughly reviewed the architectures, applications, protocols and challenges.", "Akyildiz et al. (2002) and Yick et al."]} +{"30166091|5660618": ["framework, in [86] on wireless control network where the entire network itself acts as the controller, in [87], [88] on decentralized control problems, the references in [72] and in [89], [90] for a survey of this field."]} +{"30166091|1236072": ["The protocol itself may be flat, hierarchical or even location-based [202]."]} +{"41726504|2521001": ["A number of recent articles survey dsecurity issues in smart grids [12]\u2013[20]."]} +{"41726504|5747564": []} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"4931940|8650651": ["Software Defined Optical Networks (SDONs) [53] are another future research direction where optical networks are used for reliable communication in the SG system.", "Possibly, the development of the standard VPP interface can take lessons from the recent development of the OpenFlow interface [53] between controllers and switches in the context of the SDN paradigm for communication networks."]} +{"4931940|11414835": [", the flexible aggregation and slicing of network resources [55]\u2013[57]."]} +{"4931940|14765802": ["BSs based on RERs may also be a good choice for remote (off-grid) areas where traditional energy resources are not available, or for developing countries with missing or unreliable traditional energy resources [50]."]} +{"4931940|29060869": ["A detailed discussion on energy-efficient communications and their interaction with the grid is given in [51]."]} +{"52124556|6664074": ["resources and processing cycles, code space, and energy and network optimization [25], [26].", "system is configured, resulting less size of kernel and less program storage [25].", "The typical IoTs devices OS domain has multiple programming models support [25].", "an extensive survey literature on OS for IoTs [25]."]} +{"52124556|14056879": ["A limited number of threads are supported because MantisOS allocates memory statistically [218], [219]."]} +{"52124556|8650651": ["cation layer studies have been developed to achieve QoS, access control, security, and energy efficiency [175]."]} +{"52124556|1349348": ["Context-aware communication and networking (CACN) have been developed to be performed at all layers of networking and communications [171]\u2013[174]."]} +{"52124556|20473693": ["The IoTs has grown enormously since it was first introduced in the late 1990s [2]\u2013[4] and it is expected to grow still more in the future."]} +{"52124556|1598350": ["The IoTs has grown enormously since it was first introduced in the late 1990s [2]\u2013[4] and it is expected to grow still more in the future.", "The Growth of Interconnected Devices by the Year 2020 (adapted from [2]).", "According to [2] Figure 1 shows the anticipated growth of IoTs devices relative to the population by the year 2020."]} +{"52124556|206901977": []} +{"52124556|3348390": []} +{"52124556|17683338": ["Energy efficiency and protocols have been discussed in [27]."]} +{"52124556|17872696": ["Heavy research area is based on energy efficient protocols [160], [224]\u2013[233] or other techniques to propose any adequate method for the future Internet."]} +{"52124556|1236072": []} +{"14169333|19938676": ["and circuit switching in its design [8] as shown in Fig."]} +{"2134031|4427557": ["More recently, standards specifically dedicated to IoT communications, such as LoRa [107], NB-IoT [108], eMTC or other Low Power Wide Area Network (LPWAN) standards [109], support positioning of the nodes to a certain extent."]} +{"2134031|3348390": ["Within all the context sensing information, the location information plays important roles [5]."]} +{"32466400|5747564": ["For further reading on the current state of standardization [19]\u2013[22] are suggested."]} +{"34951841|4395259": ["Based on the previous theoretical studies of PLS, a series of transmission schemes have been proposed to improve transmission secrecy [26]\u2013[32].", "multiple-input multiple-output case [32]."]} +{"67215667|31245252": ["THE DEVELOPMENT of the Internet of Things (IoT) [1]\u2013[7] has led to enormous IoT applications, such as intelligent transportation systems [8]\u2013[10], smart shopping systems [4], and smart home systems (SHSs) [2], [11]."]} +{"67215667|9175918": ["A chaotic system is characterized by its extreme sensitivity to the initial conditions and its topologically mixing property, both of which can guarantee the two principles of confusion and diffusion, when it comes to designing a crypto-system [43].", "Chaos-based cryptography has been widely adopted in various applications in recent years [38]\u2013[43]."]} +{"25591172|16323798": []} +{"4872985|7919236": ["For example, an evaluation of recommender system for e-commerce (Pu et al., 2012) focuses other aspects relevant for acceptance."]} +{"11787406|485843": []} +{"51971887|10390713": ["The authors in [7], additionally, justify why other models are not applicable for power grids, such as the small-world distributions.", ", the number of edges incident on the node) connected to nodes with lower degree; similar characteristics to the power-law distributions as stated in [6] and [7]."]} +{"51872590|11853471": []} +{"59843025|21386749": ["Therefore, developing privacy-preserving cluster analysis techniques and increasing the computational speed of cluster analysis are the two important and urgent tasks in IoMT [14]."]} +{"10440280|485843": ["grid, the adoption of standards across the communication infrastructure is essential [65].", "On the other hand, bandwidth requirements of DR programs are in the range of a few kilobits per second per consumer, and depend on the communication frequency between utilities and consumers [64], [65]."]} +{"10440280|595093": ["block or even corrupt information transmission, and provide authentication, authorization, auditability and trust components to the communication infrastructure [72]."]} +{"10440280|5747564": ["reader may refer to [6], [62], [63], [71]-[73].", "Other advantages of DSM include the blackouts elimination, the reduction of operational costs and decreased CO2 emissions [6].", "It should be noted that some researchers and practitioners assume that DSM and DR are interchangeable [4], [6]."]} +{"10440280|121289": ["of the grid, which are necessary for the implementation of a DR program [62]: Quality of Service\u2014(QoS): The provision of QoS guarantees for the communication technologies used in the smart grid is essential for the smooth implementation of a DR program.", "For a more comprehensive study on the communication requirements, challenges and solutions for DR, the interested reader may refer to [6], [62], [63], [71]\u2013[73]."]} +{"10440280|18037424": ["reliability, and safety of the system [2]."]} +{"195346885|27262729": ["This consensus mechanism guarantees the security and dependability of blockchain systems [4], [5].", "The core point to guarantee transaction integrity and validity in blockchain is a computational process defined as mining [4], [5]."]} +{"52180320|36366678": ["For more information on the interactive setting, non-interactive setting, and recent works on di\ufb00erentially-private data publishing, we refer the reader to [16][32][46], respectively."]} +{"52180320|15669036": ["For more information on the interactive setting, non-interactive setting, and recent works on differentially-private data publishing, we refer the reader to [16][32][46], respectively."]} +{"3558507|16621677": ["on computer system [4], [5] and take advantage of the collaborative nature of the VANETs and design a system architecture of a distributed machine-learning based CIDS over a VANET."]} +{"67867298|31245252": ["[14] conducted a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and presented the integration of fog/edge computing and IoT, and applications such as smart grid, smart transportation, and smart cities."]} +{"67867298|16323798": ["A well-known method, non-intrusive load monitoring (NILM) [6], which was originally designed to support smart homes [108] by learning"]} +{"67867298|121289": ["data networks [136]."]} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"18451845|33247252": [", hence the tolerable latencies are commonly in the scale of seconds or even milliseconds [81].", "Note that the communications between aggregators and the smart grid are in the order of typically 15 minutes [81], hence the communication latency in case of when price information is exchanged, is less critical."]} +{"31728720|55039831": []} +{"148573870|31245252": ["AS AN important part of a new generation of information technology, the Internet of Things (IoT) [1] aims to enable the exchange of information among objects, and is widely used in the integration of networks through", "In this section, we introduce and present a three-layer system model [1] as shown in Fig."]} +{"7062175|595093": []} +{"7062175|5747564": ["technologies, development aspects, and experimental studies have been discussed in [14]\u2013[18].", "\u2022 Overview of the smart grid [11] [12]; \u2022 Smart grid information system architecture [13]; \u2022 Smart grid communication networks [14]\u2013[18]; \u2022 Smart grid cyber security and privacy support [19]\u2013[22]."]} +{"7062175|121289": []} +{"7062175|18037424": []} +{"12186076|1805048": ["As one can understand, a trusted server can collect all users' data and therefore perform classic recommender system algorithms such as Collaborative Filtering [33], which require multiple users' data.", "We consider one of the most widely used algorithms in recommender systems, Collaborative Filtering [32], which relies on the classic technique, matrix factorization ."]} +{"57366618|16323798": ["Furthermore, a more detailed overview on various such recent NILM methods have been presented in [21] and [39]\u2013[41].", "Even compared to the few that have used these houses [5], [51], the accuracy level of the method proposed in this paper is significantly higher [41], [42]."]} +{"16095238|5660618": []} +{"52126821|4787452": ["DSRC-related MAC protocols are covered in great detail in [34] and [35], covering both weaknesses of current standards and potential alternative schemes.", "For example, the use of TDMA-based MAC protocols shows significant improvement over the relatively low performance of contention-based CSMA/CA conditions [35]."]} +{"125996885|44104746": ["With the help of data mining, deep learning [9], and other techniques to facilitate data processing, massive amounts of data are already being collected and processed, generating valuable information to users and affecting our daily lives."]} +{"125996885|4566470": ["In addition to auction schemes, different data pricing strategies (free-data strategy, usage-based pricing strategy, package pricing strategy, \ufb02at-pricing strategy, two-tart tariff strategy, etc.) should be considered as well [6].", "The big data life-cycle consists of data collection, data analysis, data pricing, data trading, and data protection [6].", "Privacy protection concepts and methods can be found in [6], [19], [22], [39], [52]\u2013[58].", "In such smart-world systems, massive amounts of data will be generated, giving rise to truly unprecedented CPS/IoT-based big data [6]\u2013[8].", "For example, Liang et al. [6] reviewed existing research in big data, identi\ufb01ed the lifecycle of big data trading, discussed existing research focused on data pricing, data trading, and data protection, and considered future research needs.", "The advance of CPS and IoT technologies have led to a number of smart-world systems (smart grid, smart cities, smart manufacturing, etc.) [1]\u2013[5] and data trading and sharing has become an active research topic in recent years [6], [13], [25], [36]\u2013[43]."]} +{"125996885|9461213": ["In such smart-world systems, massive amounts of data will be generated, giving rise to truly unprecedented CPS/IoT-based big data [6]\u2013[8]."]} +{"125996885|31245252": ["The advance of CPS and IoT technologies have led to a number of smart-world systems (smart grid, smart cities, smart manufacturing, etc.) [1]\u2013[5] and data trading and sharing has become an active research topic in recent years [6], [13], [25], [36]\u2013[43].", "\u2026Things (IoT) technologies, immense quantities of sensors and actuators will be developed and deployed to support the monitoring and control of a number of smart-world Cyber-Physical Systems (CPS), including the smart grid, smart transportation, smart cities, smart manufacturing, and others [1]\u2013[5]."]} +{"53580052|8125630": [", drill-down, slice and dice queries [18]."]} +{"13400148|1074202": ["Other metrics were also analyzed for privacy, such as mutual information [21], mean square error and signal-to-noise ratio [19].", "With noise addition, the measurement of how similar the original data and the perturbed data are is crucial [19]."]} +{"1677216|15093118": ["Meanwhile, Sivaraman and Trivedi [29] present a survey of vision-based vehicle detection, tracking, and behavior analysis.", "tracking has been extensively studied [29]."]} +{"1677216|64404": []} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"3519414|2809360": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"3519414|11009327": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"52126871|206578486": ["Moreover, cloudlets use only VM for virtualization, however, both fog and MEC can use other technologies other than VMs for virtualization [32].", "However, compared to [32], our survey is different in the organization of resource sharing and research issues in F-RAN architecture.", "A more detail analysis is presented in [32] covering on the two different applications domain namely IoT and content delivery networks (CDN) as the basis of driving force to the emergence of fog computing.", "Another main difference is that cloudlet mainly focuses on mobile offloading, and MEC aims to handle the applications that are better suited in either mobile or non-mobile edge networks, however, fog computing overlaps between edge and cloud while satisfying a large number of latency-sensitive applications for resource-constraint end devices [32].", "The resource-rich computers with high computation power are placed in a strategic location with EU\u2019s vicinity [32]."]} +{"52126871|12675271": ["There are related survey papers [20], [37]\u2013[40] that", "While the aforementioned surveys [20], [37], [39], [40], [42]", "com/news/onq/2017/02/01/vr-and-ar-are-pushinglimits-connectivity-5g-our-rescue management [170] are suggested in [40] as a case study in fogenabled smart cities.", "Recently, another survey is focused on how cloud and fog computing paradigm handle the research challenges such as knowledge discovery using data analytics with limited computational resources of edge devices to build a sustainable IoT infrastructure for smart cities [40].", "potential to fulfill the diverse requirements in various applications ranging from smart cities [40], [151]\u2013[156], transportation [157]\u2013[159], surveillance (e.", "Some case studies are presented with the characteristics of fog computing in smart cities [40].", "However, algorithmic aspects are not considered in [40]."]} +{"52126871|6909107": ["Moreover, cloudlets use only VM for virtualization, however, both fog and MEC can use other technologies other than VMs for virtualization [32].", "In March 2017, the ETSI has expanded the scope of MEC and after that replaced the term \u201cMobile\u201d by \u201cMulti-access\u201d.", "This consortium was founded by ARM, Cisco, Dell, Intel, Microsoft Corp., and the Princeton University Edge Laboratory on November 19, 2015.", "Table II summarizes the basic differences between fog, cloudlets, and MEC.", "The edges of non-mobile networks are also being considered in multi-access edge computing (MEC) [36].", "Another main difference is that cloudlet mainly focuses on mobile offloading, and MEC aims to handle the applications that are better suited in either mobile or non-mobile edge networks, however, fog computing overlaps between edge and cloud while satisfying a large number of latency-sensitive applications for resource-constraint end devices [32].", "This standardization effort is driven by several leading mobile operators such as DOCOMO, Vodafone, and TELECOM Italia and manufacturers such as IBM, Nokia, Huawei, and Intel [34].", "However, as cloudlets are not an integral part of a mobile network, sometimes it becomes hard to fulfill the Quality-of-Service of the mobile devices [34].", "Fog computing is being promoted by several companies such as intelligent edge by Intel [19].", "Finally, until today, MEC works only in standalone mode while cloudlets can function in standalone and can connect to the cloud, although there is a lack of detail discussion in literature how to interact between cloud and cloudlets, fog computing needs the support of the cloud for the tasks that might not be performed in the resource-constraint fog layer.", "Note that the ETSI is the main driving force for MEC [34], [36], however, fog and cloudlets are driven by", "Note that the ETSI is the main driving force for MEC [34], [36], however, fog and cloudlets are driven by research and development, although OpenFog consortium aims at the development of fog architecture and standardization details.", "From the above discussion, it is observed that cloudlets, MEC, and fog computing focus on edge computing, however, there is a significant difference between these technologies."]} +{"52126871|8523192": ["There are related survey papers [20], [37]\u2013[40] that", "While the aforementioned surveys [20], [37], [39], [40], [42]", "[37] detailed a taxonomy of fog computing according to challenges and features of fog computing.", "2) Virtual Cluster: The EU nodes form a virtual cluster, also termed as mini-cloud [37], that corresponds to the logical boundary of these EU nodes.", "ing a local \u2018mini-cloud\u2019 [37] is one of the main research challenges."]} +{"52126871|3348390": ["In such cases, location-awareness [156], [170] and almost real-time response", "[159] discuss the requirements such as reusable, scalable, context-aware [156], [174], and high-level abstraction in applications model and programming abstractions.", "potential to fulfill the diverse requirements in various applications ranging from smart cities [40], [151]\u2013[156], transportation [157]\u2013[159], surveillance (e."]} +{"51886915|15895606": []} +{"51886915|2663804": ["smart grid security [9, 16, 44, 48, 60, 80, 106, 115, 130, 134, 138] only a few of them address the privacy issues and concerns in depth.", "[123] proposed a pseudonym-based privacy-preserving scheme reassuring privacy, integrity, and authenticity in AMI [44]."]} +{"51886915|9554464": ["In Table 4, we have highlighted two common privacy preserving data aggregation methods namely: Hop-By-Hop [99] and End-to-End Encryption [104].", "mon privacy preserving data aggregation methods namely: Hop-By-Hop [99] and End-to-End Encryption [104]."]} +{"51886915|23893450": []} +{"51886915|121289": []} +{"51973666|1230643": ["Body sensor networks (BSNs), as a special application of wireless sensor networks [1], are deployed on the surface of bodies for periodically monitoring physical conditions."]} +{"46960221|51881458": ["This could be referred to the reason that the term \u201cBig Data\u201d emerged back in 2007 (Nguyen et al., 2017) after which it started to become a widespread phenomenon to hit a peak in 2010.", "With respect to BDA, this methodology has been adopted for big data analytics in supply chain management by Nguyen et al. (2017)."]} +{"46960221|17905276": ["For instance, in Hodge et al. (2015), a survey of wireless sensors network technology for monitoring and analyzing railway systems, structures, vehicles, and machinery was conducted.", "Some other survey articles on the application of data analytics in a specific aspect of RTS can be found in Soleimanmeigouni, et al. (2016), Singh et al. (2015), Hodge et al. (2015), Thaduri et al. (2015), Griffin et al. (2014), Summit (2014), Figueres-Esteban et al. (2015)."]} +{"46960221|14258620": ["\u2026of information technology in collecting, storing, processing, analyzing and visualizing large amounts of data as well as new methods coming from machine learning, artificial intelligence, and computational intelligence to recognize patterns and retrieve useful information (Al-Jarrah et al., 2015)."]} +{"69843752|25374274": ["Fog nodes also are more attractive for attackers because of collecting huge volume of sensitive data from different resources [159]."]} +{"69843752|12675271": ["sors and GPS devices can be analyzed by using fog gateways [156]."]} +{"69843752|24110634": ["short-range communication [89]."]} +{"69843752|5385031": [", [150]\u2013[152]) for different networks and sensing devices, it is commonly impossible to use a combination of such schemes for smart cities."]} +{"69843752|3348390": ["This is because the endto-end communication suffers from the connection that frequently requires gateways or proxies [88]."]} +{"33922249|8022785": ["HIPAA rules, adoption and attitudes of healthcare providers, 105 patients\u2019 opinions about EHS) of existing systems [4, 7].", "On the other hand, while [7] considers business approach of EHS, our survey addresses cryptographic approaches of EHS."]} +{"17787573|3348390": ["The ultimate aim of IoT is to make an enhanced world for human beings, in such a way that the objects or things around us will come to know their needs, likes, dislikes and act accordingly, with minimum human intervention and without explicit instructions [2]."]} +{"46844559|31245252": ["The smart grid is a typical energy-based cyber-physical system that integrates both cyber and physical components [1], [2]."]} +{"174798139|207757789": ["Another recent survey focuses on the release of histograms and synthetic data with DP [131]."]} +{"174798139|49318466": []} +{"174798139|207179384": ["In [123], authors highlight privacy concerns in this context and list mechanisms with formal provable privacy guarantees, while in [23], authors analyze different kinds of privacy breaches and compare metrics that have been proposed to protect location data.", "should be to provide users of a local DP mechanism with meaningful privacy protection [23]."]} +{"174798139|1083483": ["In [159], the authors classify 80+ privacy metrics into 8 categories based on the output of the privacy mechanism."]} +{"38370705|469744": []} +{"12059287|1805048": []} +{"14243395|5660618": ["In order to summarize in time the results on NCSs, see, some survey papers such as [1], [4], [5].", "Among most results on NCSs, network-induced delays are usually considered as a source of system performance degradation or even instability, which means that network-induced delays have the negative effects on NCSs [4].", "Since network-induced delays depend heavily on variable network conditions [4], they are usually time-varying, random, and unknown but upperbounded."]} +{"15900245|60455": ["\u2022 finding the most popular web pages and how the trend changes over time [9, 19],"]} +{"12103882|17774971": []} +{"12103882|192934": []} +{"65256705|3932531": []} +{"65256705|11853471": []} +{"65256705|2134031": []} +{"110765525|16323798": []} +{"3608741|2521001": ["For example, if attackers can compromise smart home devices, they can spy on the inhabitants or even gain physical access to the home (see [169] for a sur-"]} +{"3608741|6670217": ["This is naturally the case for mobile phones that, when compromised, can lead to a complete violation of user privacy (see [64] and [170] for surveys"]} +{"3608741|15669036": ["expanded to cover data publication and data streams [230]."]} +{"3608741|206764452": ["The applications in this area cover both private and public transport: Intelligent vehicles are envisioned to introduce advanced driver assistance systems or even autonomous driving by the use of sophisticated sensors [16] and communication systems [17]."]} +{"64548909|6332923": []} +{"196187121|8215225": ["cial to integrate the health data from these multiple sources to solve the problems about information islands, for efficient data publishing, utilization and analysis [4]\u2013[6]."]} +{"99528|17756238": []} +{"30102381|2521001": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|485843": []} +{"30102381|595093": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|5747564": ["Moreover, the advent of smart grid with extensive communication capabilities [11]\u2013[14] yield new security vulnerabilities due to a high dependency on cyber information."]} +{"30102381|121289": []} +{"21052213|64292": ["More recently, there has been considerable interest in extending this research from the upper, planning, and scheduling level of control [6], [7] to the physical device level."]} +{"18031596|15669036": ["For a more complete overview of differential privacy and, in particular, of a variety of methods used to attain it, see [7,8,12]."]} +{"41685384|7350786": []} +{"49415141|9928823": []} diff --git a/edge/graph_54446786.jsonl b/edge/graph_54446786.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d748689ab5ce1f67eeb964281f787368cf01db4 --- /dev/null +++ b/edge/graph_54446786.jsonl @@ -0,0 +1,17 @@ +{"11511556|16186842": ["Remarkable results have been achieved in the field of regression testing of functional requirements [4,8\u201313].", "Fahad and Nadeem [10] provided a survey of regression test selection techniques based on UML models.", "Most work on regression testing has been done on the code level [10] for arbitrary programming languages like C [24], C++ [25], C# [26], or Java [27].", "It has been reported that most classical regression (functional) testing approaches are code-based [10]."]} +{"11511556|627405": ["These libraries were chosen because they cover the most relevant sources in software and security engineering [51].", "3), which all take respective guidelines and best practices [51,52] into account."]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"205437295|4602249": ["SMs Search-based testing for non-functional system properties 2008 [41] Product lines testing 2011 [42] Graphical user interface (GUI) testing 2013 [43] Test-case prioritization 2013 [44] Software test-code engineering 2014 [45] SLRs Model-based testing 2007 [46] Automated acceptance testing 2008 [47] Mutation testing for Aspect-J programs 2013 [48] Web application testing 2014 [49] Testing scientific software 2014 [50] Regular surveys Testing finite state machines 1996 [51] Regression testing minimization, selection and prioritization: a survey 2012 [52] Testing in SOA 2013 [53] Test-case generation from UML behavioral models 2013 [54] Test oracles 2014 [55]"]} +{"205437295|8742997": ["SMs Search-based testing for non-functional system properties 2008 [41] Product lines testing 2011 [42] Graphical user interface (GUI) testing 2013 [43] Test-case prioritization 2013 [44] Software test-code engineering 2014 [45] SLRs Model-based testing 2007 [46] Automated acceptance testing 2008 [47] Mutation testing for Aspect-J programs 2013 [48] Web application testing 2014 [49] Testing scientific software 2014 [50] Regular surveys Testing finite state machines 1996 [51] Regression testing minimization, selection and prioritization: a survey 2012 [52] Testing in SOA 2013 [53] Test-case generation from UML behavioral models 2013 [54] Test oracles 2014 [55]"]} +{"29635678|205435103": []} +{"31118704|14920988": ["10 Combinatorial testing 30 2005 [102] SOA testing 64 2008 [103] Symbolic execution 70 2009 [104] Testing web services 86 2010 [105] Mutation testing 264 2011 [106] Product lines testing 16 2011 [107] Taxonomy Model-based GUI testing 33 2010 [108] Literature review TDD of user interfaces 6 2010 [109]", "4 SECONDARY STUDIES IN SOFTWARE TESTING We were able to find 25 secondary studies [88-111], [125] reported, as of this writing, in different areas of software testing."]} +{"31118704|8250043": ["10 Combinatorial testing 30 2005 [102] SOA testing 64 2008 [103] Symbolic execution 70 2009 [104] Testing web services 86 2010 [105] Mutation testing 264 2011 [106] Product lines testing 16 2011 [107] Taxonomy Model-based GUI testing 33 2010 [108] Literature review TDD of user interfaces 6 2010 [109]", "4 SECONDARY STUDIES IN SOFTWARE TESTING We were able to find 25 secondary studies [88-111], [125] reported, as of this writing, in different areas of software testing."]} +{"42535396|17292349": ["[16] perform an orchestrated survey of methodologies for automated software test case generation."]} +{"42535396|627405": ["These libraries were chosen because they cover the most relevant sources in software and security engineering [35]."]} +{"34839317|14920988": []} +{"14382463|8250043": []} +{"6880727|14920988": []} +{"6880727|8250043": []} +{"2025859|14920988": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|8250043": ["The remaining 11 studies are \u201csurveys\u201d, \u201ctaxonomies\u201d, \u201cliterature reviews\u201d, and \u201canalysis and survey\u201d, terms used by the authors themselves to describe their secondary studies [13, 35, 42, 31, 17, 46, 14, 33, 19, 43, 32].", "Survey / Object oriented testing 140 1996 [13] Analysis Testing techniques experiments 36 2004 [35] Search-based test data generation 73 2004 [42] Combinatorial testing 30 2005 [31] SOA testing 64 2008 [17] Symbolic execution 70 2009 [46] Testing web services 86 2010 [14] Mutation testing 264 2011 [33] Product lines testing 16 2011 [19] Taxonomy Model-based GUI testing 33 2010 [43] Lit."]} +{"2025859|16125167": ["To conduct a systematic mapping, a classification scheme (also called systematic map or attribute framework [18]) needs to be derived by a careful analysis of the primary studies [47]."]} diff --git a/edge/graph_54446884.jsonl b/edge/graph_54446884.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54446993.jsonl b/edge/graph_54446993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f132ba2caace7fba955fe05018523d08154367e --- /dev/null +++ b/edge/graph_54446993.jsonl @@ -0,0 +1,23 @@ +{"16780531|2357830": ["1) Hash-Based Access Control: There is a simple\nsecurity schemes based on one-way hash function [17] for the low cost tags but, in practice a hardware optimized cryptographic hash would sufficient."]} +{"1208330|17756238": ["GPS stalking [81], disclosure of private information such as an illness [82], or generally the uneasy feeling of being watched [83].", "Examples where profiling is leads to a violation of privacy violation are price discrimination [87, 88], unsolicited advertisements [83], social engineering [89], or erroneous automatic decisions [48], e."]} +{"1208330|2906926": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"1208330|2357830": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"21920577|359842": ["Jafri and Arabnia [14] provide a comprehensive survey of this evolution, identifying landmark systems such as Eigenfaces (1991) [34] and Fisherfaces (1997) [4]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"2039896|7185733": []} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"2713324|17683338": ["Because of these design trade-offs, TinyOS and Contiki are thus lacking several key developerfriendly features: standard C and C++ programability, standard multi-threading, and real-time support (see Table I).", "The programming models in Contiki and TinyOS are based on the event driven model, in a way that all tasks are executed\n978-1-4673-5946-7/13/$31.00 \u00a92013 IEEE\n3569\nwithin the same context, although they offer partial multithreading support.", "Contiki uses a subset of the C programing language, where some keywords cannot be used, while TinyOS is written in a C dialect called nesC.", "The scheduling in Contiki is purely event driven, similar to that in TinyOS, where a FIFO strategy is used.", "The dominant WSN OS, Contiki and TinyOS [3], follow an event driven design, which is useful for typical WSN scenarios, but exhibit drawbacks for efficient and functional networking implementations."]} +{"1919851|17221751": ["A full review of work in facial landmark detection, head pose, eye gaze, and action unit estimation is outside the scope of this paper, we refer the reader to recent reviews of the field [17, 18, 30, 46, 51, 61].", "Over the past few years, there has been an increased interest in machine understanding and recognition of affective and cognitive mental states and interpretation of social signals especially based on facial expression and more broadly facial behavior [18, 51, 39].", "portant building block in nonverbal behavior and emotion recognition systems [18, 51].", "Over the past years there has been a huge amount of progress in facial behavior understanding [18, 51, 39]."]} +{"1919851|16010181": ["A full review of work in facial landmark detection, head pose, eye gaze, and action unit estimation is outside the scope of this paper, we refer the reader to recent reviews of the field [17, 18, 30, 46, 51, 61]."]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} diff --git a/edge/graph_54448042.jsonl b/edge/graph_54448042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54450144.jsonl b/edge/graph_54450144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54450691.jsonl b/edge/graph_54450691.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb62bdb25a328061353038de027588f77278a9d6 --- /dev/null +++ b/edge/graph_54450691.jsonl @@ -0,0 +1,13 @@ +{"14744395|6809492": ["Moreover, most of the FPGAs in the market are reprogrammable, which allows updating the implemented circuit with bug fixes and new enhancements [46], [47]."]} +{"14744395|12083425": ["Recent industrial applications of multilevel inverters include induction high-power motor drives [17]\u2013 [19], hybrid electric vehicles [20], regenerative rectifiers [21], power conversion for renewable energy sources [ 22 ], [23], static synchronous compensators [24], [25], and fault-tolerant systems [26]."]} +{"14744395|17774971": ["Multilevel converters have been extensively studied because they can manage high output voltages with voltage-limited devices, and they combine high efficiency with low harmonic distortion [16]."]} +{"24701919|17774971": ["voltage capability [2], [3]."]} +{"14886452|17774971": []} +{"49728854|12083425": ["ESS can be applied for energy arbitrage [29], peak shaving [30], load flowing [31], spinning reserve [32], voltage support [33], black start [33], [34], frequency regulation [24], power quality [35], [36], power reliability [37], renewable FIGURE 2."]} +{"40003441|17774971": ["Therefore, the switching states are [\u22121, \u22121, \u22122], [0, 0, \u22121], [1, 1, 0], and [2, 2, 1].", "Among various modulation techniques [1] for a multilevel inverter, space vector pulsewidth modulation (SVPWM) is an attractive candidate due to the following merits.", "MULTILEVEL inverters [1] are increasingly being used in high-power medium voltage applications due to their superior performance compared to two-level inverters, such as lower common-mode voltage, lower dv/dt, lower harmonics in output voltage and current, and reduced voltage on the power switches [2]."]} +{"29401366|4643404": ["In these cases, an electrolytic capacitor is typically used, but it is more prone to failure and the whole system\u2019s reliability is degraded [10], [11]."]} +{"23994545|7686677": ["Until now, mobile operators have relied on diesel generators to run such BSs for most of these cases, which is not only expensive due to its price and transportation [11], but also one of the most polluting sources of energy."]} +{"23994545|12060835": ["The main challenge in using renewable energy sources is that they are not controllable [37]."]} +{"23994545|18037424": ["in [31]."]} +{"15061962|17774971": ["A Simple Space Vector PWM Scheme to Operate a Three-Level NPC Inverter at High Modulation\nIndex Including Overmodulation Region, With Neutral Point Balancing\nAmit Kumar Gupta, Student Member, IEEE, and Ashwin M. Khambadkone, Senior Member, IEEE\nAbstract\u2014Three-level neutral point clamped (NPC)\u2026", "A Simple Space Vector PWM Scheme to Operate a Three-Level NPC Inverter at High Modulation\nIndex Including Overmodulation Region, With Neutral Point Balancing\nAmit Kumar Gupta, Student Member, IEEE, and Ashwin M. Khambadkone, Senior Member, IEEE\nAbstract\u2014Three-level neutral point clamped (NPC) inverter is a widely used topology of multilevel inverters."]} +{"1281052|17774971": ["MULTILEVEL converters are widely adopted in highpower applications due to their superior performance compared to two-level converters, with advantages such as reduced voltage stress on the power devices, lower harmonics, and lower instantaneous rate of voltage change (dv/dt) [1]."]} diff --git a/edge/graph_54451416.jsonl b/edge/graph_54451416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1757e806cd85429842f9a9434a412df9dc568cff --- /dev/null +++ b/edge/graph_54451416.jsonl @@ -0,0 +1,18 @@ +{"15895606|31245252": ["[95] comprehensively surveyed security and privacy, among other issues, in the Internet of Things (IoT)."]} +{"15895606|2521001": ["Not only should consumers\u2019 data be encrypted, but anonymization techniques are also desired to prevent inference and other attacks from deducing patterns from the encrypted data to reveal private information [79], [114]."]} +{"15895606|207209718": ["For example, Intrusion Detection Systems (IDS) should be time-critical so that long delays are intolerable [112].", "They also provide a comprehensive survey on IDS solutions in CPS applications [112].", "For further analysis of the current ICS-speci\ufb01c IDS solutions, we refer you to [5], [7], [19], [81], [82], [112], [171]."]} +{"15895606|4528002": ["However, it is more costly and less likely to widespread in the near future [149].", "Steer-, Drive, Brake-, Shift-, and Throttle-by-wire are all examples of this trend [149]."]} +{"15895606|595093": []} +{"42110261|595093": []} +{"14993044|207209718": []} +{"30166091|5660618": ["framework, in [86] on wireless control network where the entire network itself acts as the controller, in [87], [88] on decentralized control problems, the references in [72] and in [89], [90] for a survey of this field."]} +{"30166091|1236072": ["The protocol itself may be flat, hierarchical or even location-based [202]."]} +{"19017497|18037424": []} +{"207023775|15895606": []} +{"207023775|6779551": ["less communication [104] that cross-layer and hybrid secu-"]} +{"207023775|2357830": [", RFID/NFC privacy [81] or privacy of general embedded sensors [82]."]} +{"45937982|485843": ["Recent literature (Ancillotti et al., 2013; Lu et al., 2013; Yan et al., 2013; Gungor et al., 2013) shows that evolving smart grids are revolutionising the energy industry and enabling the electricity network to be more reliable and economical."]} +{"45937982|121289": ["Recent literature (Ancillotti et al., 2013; Lu et al., 2013; Yan et al., 2013; Gungor et al., 2013) shows that evolving smart grids are revolutionising the energy industry and enabling the electricity network to be more reliable and economical."]} +{"345663|121289": []} +{"2299741|595093": ["Specifically, by exploiting the potential vulnerability of protection schemes, attackers can gain access to the critical system components [11], [12], [14], [15]."]} +{"2299741|10390713": ["It has been shown that many power grids [30], [31] (such as the western US electrical power grid) are small world networks."]} diff --git a/edge/graph_54454008.jsonl b/edge/graph_54454008.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f86773f6cbc078ec6d25ccd75fb44567861438e --- /dev/null +++ b/edge/graph_54454008.jsonl @@ -0,0 +1,2 @@ +{"114108313|14745481": ["Research on composite trust models using multiple dimensions of trust has recently received considerable attention [10].", "Decision makers may not have access to suf\ufb01cient information to handle challenges due to lack of resources [6], [7] or physical constraints such as network unavailability [10].", "The impact of trust on the effectiveness of teams or organizations has been studied in many different domains: organizational management [5], psychology, network science [6], [7], team studies [8], human automation interaction [9], and networking and telecommunication [10]."]} +{"110365869|13978846": ["2) uses results from the theory of group testing [42,43,57,67,102,138] to design the client-resource mapping to achieve a good trade-", "Live baiting requires low state overhead, enabled by a novel leverage of the group-testing theory [42, 43, 57, 67, 102, 138], which aims at detecting \u201cdefective\u201d members in a population using the minimum number of tests.", "Non-adaptive group testing uses a nt \u00d7 nc matrix to specify tests [102], where nc is the total number of members and nt the number of tests.", "There are two classes of group-testing mechanisms [102]: Nonadaptive, or single-stage, techniques conduct all tests simultaneously with no feedback from previous test results, whereas adaptive (multi-stage) techniques use previous test results to determine subsequent tests.", "For simplicity, this work employs a randomized construction method [52, 102], in which each bit in the matrix is set to 1 with a fixed probability p.", "Many matrix construction algorithms have been proposed, such as the deterministic construction by Hwang and So\u0301s and the randomized construction by Dyachkov and Sebo [102, 43].", "Many matrix construction algorithms have been proposed, such as the deterministic construction by Hwang and S\u00f3s and the randomized construction by Dyachkov and Sebo [102, 43]."]} diff --git a/edge/graph_54455839.jsonl b/edge/graph_54455839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..660a21c97627bbd3546faf6fb83ae7c84ec0b665 --- /dev/null +++ b/edge/graph_54455839.jsonl @@ -0,0 +1,12 @@ +{"3637066|14242212": ["This survey article is complementary to the nice overview article on low-rank matrix recovery by Davenport and Romberg [12], with different focuses."]} +{"7053542|7020971": ["\u2026constraints, and remain constant during the execution\n3The reason for this may be that ADSpLRU manipulates the whole cost function at each step, whereas IPSpLRU splits the cost function in a number of convex terms and treats each term individually at every step of the algorithm.\nof the algorithms.", "To proceed, we utilize the auxiliary matrix variables \u03a91, \u03a92, \u03a93, and \u03a94 of proper dimensions (similar to [11] and [24]) and reformulate the original problem (P2) into its equivalent ADMM form [13], i.e.,\n(P3) : min \u03a91,\u03a92,\u03a93,\u03a94\n{ 1\n2 \u2016\u03a91 \u2212Y\u20162F + \u03b3\u2016A \u03a92\u20161\n+ \u03c4\u2016\u03a93\u2016b,\u2217 + IR+(\u03a94) }\ns.t. \u03a91 \u2212\u03a6W = 0, \u03a92\u2026"]} +{"16506659|6923178": ["The higher its value the preferable the estimator, see [54] for more details."]} +{"52824379|118649017": ["We have also left out several important nonconvex problems and methods in order to stay focused, including but not limited to (1) blind calibration and finding sparse vectors in a subspace [203]\u2013[205]; (2) tensor completion, decomposition and mixture models [140], [206]\u2013[209]; (3) parameter recovery and inverse problems in shallow and deep neural networks [167], [210]\u2013[214]; (4) analysis of Burer-Monteiro factorization to semidefinite programs [54], [215]\u2013[217]."]} +{"52824379|14242212": ["amongst others, dropping or replacing the low-rank constraint (1b) by a nuclear norm constraint [1\u20133, 11\u201313], and solving the convexified problem in the full matrix space (i.", "Examples include low-rank matrix completion [1\u20133], phase retrieval [4], blind deconvolution and self-calibration [5, 6], robust principal component analysis [7, 8], synchronization and alignment [9, 10], to name just a few."]} +{"52824379|17690746": ["How can we reconstruct x \u2208 R \u2014 or equivalently, M = x x \u2014 from this collection of quadratic equations about x ? This problem, often dubbed as phase retrieval, arises for example in X-ray crystallography, where one needs to recover a specimen based on intensities of the diffracted waves scattered by the object [4], [44]\u2013[46]."]} +{"52824379|6555395": ["This problem stems from interpreting principal component analysis (PCA) from an optimization perspective, which has a long history in the literature of (linear) neural networks and unsupervised learning; see for example [36\u201342]."]} +{"18486983|16049649": []} +{"37925315|12681089": []} +{"25808460|11112426": ["The LMM fits well in several cases [1]\u2013[3] and due to its simplicity, it is commonly adopted in hyperspectral unmixing.", "IN RECENT years, hyperspectral images have been extensively used for earth observation and other remote sensing applications (see [1]\u2013[4] and references therein)."]} +{"51952422|54455839": ["It has been demonstrated in the sparse recovery researches that, the `0 or `q (0 < q < 1) norm can usually yield a sparser solution than the `1 norm [12]."]} +{"31472339|9932808": ["Another approach to robustness which also takes a min-min form like LTS is the classical technique known as total least squares [38,54]."]} diff --git a/edge/graph_54457459.jsonl b/edge/graph_54457459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebd2aae49819f0c5fbc6ab1c0598c0c6248d8b1c --- /dev/null +++ b/edge/graph_54457459.jsonl @@ -0,0 +1,19 @@ +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"164284114|1708582": []} +{"15470737|19632381": []} +{"9316331|10725980": ["Coquelin and Munos [68] demonstrate that \ufb02at UCB retains the adaptivity of standard UCT while improving its regret bounds in certain worst cases where UCT is overly optimistic.", "Nijssen and Winands [155] also describe a multi-player version of their MCTS-Solver (4.5)."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"62582177|8530790": []} +{"16227449|9316331": ["This is especially the case in the early phase of the game; later in the game, when the internal tree reaches final states, end-game databases have been proven to be more efficient [Browne et al., 2012].", "Our results are consistent with past findings [Auer et al., 2002; Browne et al., 2012] with respect to the effectiveness of a well-tuned -greedy policy.", "Flat Monte Carlo does not gradually build a tree but rather performs simulations starting from the root until the computational budget is depleted, at which point the best encountered solution is returned [Browne et al., 2012].", "Many papers have studied MCTS and applied its modifications and variants to different domains with great success; for an excellent overview see [Browne et al., 2012]."]} +{"112757041|1708582": []} +{"115675276|8008208": []} +{"115675276|63137": []} diff --git a/edge/graph_54457483.jsonl b/edge/graph_54457483.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e50a7c90fb967d4991c27dc3208b5232c7051f17 --- /dev/null +++ b/edge/graph_54457483.jsonl @@ -0,0 +1 @@ +{"1033682|174797842": []} diff --git a/edge/graph_54457529.jsonl b/edge/graph_54457529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb6b6126eba52496ca5df9500c6a09f0f01776c7 --- /dev/null +++ b/edge/graph_54457529.jsonl @@ -0,0 +1,2 @@ +{"118298991|15219853": ["Well-de ned methodology exists for keystroke, mouse, gait, mobile, and others.(2) Performance generally decreases as one moves up in Newell's Time Scale of Human Action."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} diff --git a/edge/graph_54457658.jsonl b/edge/graph_54457658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47ceca388263d3bdce5222f6655c24be2e4082ad --- /dev/null +++ b/edge/graph_54457658.jsonl @@ -0,0 +1,15 @@ +{"207178870|386036": ["Entity Resolution, or deduplication [78] refers to the problem of identifying if two textual records refer to the same entity."]} +{"5266515|205435103": ["Motivation is a topic that has received considerable attention in the software engineering research field, given that it is reported to be a major factor in project success [6, 11]."]} +{"16830291|3241708": []} +{"23142740|9060471": ["However, training a classi\ufb01er in traditional supervised machine learning problems needs partial ground-truth labels, but label aggregation is totally unsupervised [Li et al. , 2016].", "Aggregating crowd wisdoms is also known as label aggregation for crowdsourcing or truth discovery [Li et al. , 2016]."]} +{"11603837|4491892": ["To account for this, we can apply a particle \ufb01ltering method to track the changes in worker quality (Crisan and Doucet 2002, Donmez et al. 2010) and choose the size of window for aggregation appropriately (Aperjis and Johari 2010)."]} +{"18973396|7165993": ["5) Oracle Problem: An oracle is typically needed to de- 1200 termine the required output of a program for a given input (Weyuker, 1982; Barr et al., 2015).", "5) Oracle Problem: An oracle is typically needed to determine the required output of a program for a given input [232], [233]."]} +{"18973396|3241708": ["The use of such an undefined workforce inherently1690 raises quality questions for crowdsourcing in general (Ipeirotis et al., 2010; Yuen et al., 2011; Allahbakhsh et al., 2013) as well as Crowdsourced Software Engineering (Stol and Fitzgerald, 2014c; Li et al., 2013; LaToza et al., 2013a;\u2026", "raises quality questions for crowdsourcing in general (Ipeirotis et al., 2010; Yuen et al., 2011; Allahbakhsh et al., 2013) as well as Crowdsourced Software Engineering (Stol and Fitzgerald, 2014c; Li et al."]} +{"18973396|205435103": ["Motivation is viewed as a critical factor for the success of a software project (Sharp et al., 2009; Beecham et al., 2008; 1650 Boehm et al., 1981)."]} +{"15266163|9060471": ["As a result, truth discovery [13] is an important technique for enabling reliable crowdsourcing applications."]} +{"45604505|1805048": []} +{"16116742|359842": []} +{"3045769|10777439": ["Moreover, accurate labels can also benefit other applications, e.g., activity recommendation to users [25]."]} +{"9256947|1805048": ["Lastly, collaborative \ufb01ltering has looked extensively at completing sparse matrices of ratings [13]."]} +{"31941233|4491892": []} +{"6916259|9060471": ["To solve this problem, techniques for multi-source aggregation, which consider the estimation of source reliability, have been proposed to derive true answers from a collection of sources [2, 3, 4, 5, 6, 10, 11, 12, 14, 17, 18, 19, 22, 26, 28]."]} diff --git a/edge/graph_54458990.jsonl b/edge/graph_54458990.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c505305d2850bdb82a9ecb1f7402739a6928bec --- /dev/null +++ b/edge/graph_54458990.jsonl @@ -0,0 +1,52 @@ +{"49566505|206670318": ["This is reflected in the control of power systems [14], [15], mechanical systems [16], [17], and so on."]} +{"49866160|2340740": ["[8] present the formal formulation of Malicious URL Detection as a machine-learning task and"]} +{"49866160|12815020": []} +{"49333709|3645740": ["Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different."]} +{"49333709|13172512": ["For instance, Nguyen and Armitage [339], though impactful, is now dated and only addresses traffic classification in networking.", "Though there are various surveys on ML in networking [18, 61, 82, 142, 246, 339], this survey is purposefully different."]} +{"49333709|17464562": ["Depending on the nature of the action set, the learning automata is classified as Finite Action-set Learning Automata (FALA) or Continuous Action-set Learning Automata (CALA) [330]."]} +{"4458746|9845476": []} +{"4458746|9928823": []} +{"123933156|22203221": []} +{"11732370|14578535": ["2497142 of modular neural network [2], [3], which typically structure solutions as a decision tree whose leaves are subnetworks, each"]} +{"206501104|18454590": []} +{"5788154|6430931": ["Therefore, it can be applied to anomaly detection and pattern discovery [30].", "978-1-4799-1959-8/15/$31.00 @2015 IEEE network traffic in a constantly changing environment [30]."]} +{"10392610|1097238": []} +{"206670318|3126100": ["2712188 intelligence techniques such as machine learning [1], [2] and deep learning [3]\u2013[5] are extremely helpful for the study of big data [6], [7].", "Particularly, deep reinforcement learning is able to output control signal directly based on input images, which incorporates both advantages of the perception of deep learning and the decision making of reinforcement learning [1], [3], [4], [6], [12]."]} +{"3797027|18599847": ["The original BMs have not been demonstrated to be useful for practical problems, while RBMs are commonly used in deep learning.", "For instance, deep belief networks (DBNs) and stacks of restricted Boltzmann machines (RBMs) [3,48,49] have been applied in speech and image recognition [3,45,50] and natural language processing [51].", "Similar to AEs, RBMs can also pre-train parameters for a complex network.", "For instance, sequenced-based predictor of protein disorder using boosted ensembles of deep networks (DNdisor-der), a deep neural network with multi-layers of RBMs [184], achieved an average balanced accuracy of 0.82 and an AUC of 0.90.", "This restriction ensures the conditional independency of hidden units and visible units [91], i.e. , P \u00f0 h j v \u00de \u00bc P i p \u00f0 h i j v \u00de P \u00f0 v j h \u00de \u00bc P j p \u00f0 v j j h \u00de \u00f0 10 \u00de Furthermore, most RBMs rely on the assumption that all units in the network take only one of the two possible values 0 or 1, i.e. , m j ; h i 2 \u00f0 0 ; 1 \u00de .", "To predict splice junction at the DNA level, Yoon and his collaborators developed a novel DBN-based method that was trained on the RBMs by boosting contrastive divergence with categorical gradients [156].", "SAEs and RBMs can extract patterns from unlabeled data [186] as well as labeled data when stacked with a classi\ufb01er [156].", "A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101].", "Inaddition to feature extraction, RBMs can also learn distributions of unlabeled data as generative models, and classify labeled data as discriminative models (regard the hidden units as labels).", "RBMs restrict the BMs to a bipartite graph, i.e. , there are no connections within visible units m \u00bc x or hidden units (cid:2) h .", "RBMs are generative graphical models that aim to learn the distribution of training data.", "Similar to RBMs, DBNs can learn the distribution of the samples, or learn to classify the inputs given class labels [3].", "Overall, given the network architectures and optimized parameters, the distribution of the visible units could be computed as: A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101]."]} +{"44104746|4566470": ["I. INTRODUCTION Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason.", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|24855581": ["Deep learning has shown significant potential in approximating and reducing large, complex datasets into highly accurate predictive and transformational output, greatly facilitating human-centered smart systems [25], [98].", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|4884302": ["An alternative to the quality function, the advantage function represents relative state-action values, as opposed to absolute state-action values [19].", "The state-action value function, otherwise known as the quality function, is the source of Q-learning [19], [21].", "The model was tested both in simulated and in real environments, and experiments were conducted to evaluate appropriate model horizons and bootstrapping efficacy, sample efficiency of classification and regression for value versus collision probability predictions, and performance against various double Q-learning approaches.", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "This type of deep learning has been heavily applied to the field of robotics and computer vision [19].", "[169] J. Zhu, Y. Song, D. Jiang, and H. Song, \u2018\u2018A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things,\u2019\u2019 IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2759728.", "The two primary means of reinforcement can be divided between policy search and value function approximation, though hybrids of both have been introduced [19].", "As a seminal work on the application of Q-learning and Deep Q-Networks (DQN), Mnih et al. [93] implemented a DQN to play 49 different Atari 2600 videogames, observing four frames as environment data, extracting the game score as reward, with controller and button combinations encoded as actions.", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning.", "These typically output parameters for a probability distribution, either for continuous or discreet actions, resulting in a stochastic policy [19].", "[21] A. Bonarini, A. Lazaric, F. Montrone, and M. Restelli, \u2018\u2018Reinforcement distribution in fuzzy Q-learning,\u2019\u2019 Fuzzy Sets Syst., vol. 160, no. 10, pp. 1420\u20131443, 2009.", "For example, Zhu et al. [169] implemented stacked auto-encoders (SAEs) to realize Q-learning for transmission scheduling in cognitive IoT relays."]} +{"44104746|3645740": ["Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|31245252": [", network congestion and latency are only going to increase without a diverse array of complementary solutions [80], [82], [125], [127], [143], [147], [148], [161].", "With the unceasing growth of IoT and smart-world systems driven by the advance of CPS, in which all devices are network connected and able to communicate sensed data and monitor physical objects, larger and larger datasets are becoming available for the application of deep learning, poised to materially impact our daily lives [36], [81], [82], [89], [91], [143], [144], [161].", "Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151].", "[58], [80], [82], [94], [125], [127], [143], [145], [147], [148], [161], [165].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|2829149": ["Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151]."]} +{"44104746|3818445": ["Securing the data, operation, and mechanisms of deep learning are all the more relevant in considering edge computing, which can be a viable computing infrastructure to provision deep learning schemes [155], supporting a variety of smart-world systems (smart cities, smart manufacturing, smart grid, smart transportation, and many others).", ") are also forthcoming [13], [155], [157].", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"2323799|206670318": ["To address this problem, some ADP based methods have been proposed.", "In the recent research work (Wei et al. 2017), the convergence proof of the iterative ADP algorithm for DT zero-sum games was derived.", "With the development of ADP, zero-sum game theoretic formulation of nonlinear systems was provided in Mehraeen et al. (2013), where the requirement of internal dynamics was relaxed by constructing an extra identifier NN.", "ADP can be classified into two main methods: online learning algorithm (Vamvoudakis and Lewis 2010; Zhu and Zhao 2017) and offline learning algorithm (Luo et al. 2015; AlTamimi et al. 2008).", "Since the proposed ADP methods have powerful learning ability and adaptivity, it is expected that they can be applied to other decision support systems.", "Different from DP, ADP is a forward-in-time approach and obtains the optimal action through the responses from the environment.", "To overcome this difficulty, several significant online and offline ADP schemes have been reported.", "Inspired by the idea of reinforcement learning (RL) (Liu et al. 2015; Zhao and Zhu 2015; Wei et al. 2015), adaptive dynamic programming (ADP) (Wang et al. 2009, 2017; Wei et al. 2014) proposed by Werbos (1977) has become an effective tool to handle various nonlinear optimal control issues, such as\u2026", "Only in Zhang et al. (2016), dual network structure ADP methods were employed to solve the DT nonzero-sum games.", "In this paper, we first review the state-of-the-art ADP works for both multi-player zero-sum game and non-zero-sum game.", "Inspired by the previousworks (Mehraeen et al. 2013; Liu et al. 2013;Wang et al. 2017a, b) and simultaneous policy update algorithms in Luo et al. (2015) and Jiang et al. (2017), we propose the following iterative learning method for the DT zero-sum games.", "However, this is nearly an impossible task before the existence of ADP.", "Based on the theoretical framework of Vamvoudakis and\nLewis (2011), Kamalapurkar et al. (2014) and Zhang et al. (2013), NN-based identification technique was combined with ADP methods to solve the CT non-zero-sum games with unknown dynamics in Liu et al. (2014), Johnson et al. (2015), Zhao et al. (2016) and Jiang et al. (2017).", "Inspired by the idea of reinforcement learning (RL) (Liu et al. 2015; Zhao and Zhu 2015; Wei et al. 2015), adaptive dynamic programming (ADP) (Wang et al. 2009, 2017; Wei et al. 2014) proposed by Werbos (1977) has become an effective tool to handle various nonlinear optimal control issues, such as optimal tracking control (Zhu et al. 2016; Zhang et al. 2017; Yang et al. 2016), constrained optimal control (Yang et al. 2016; Luo et al. 2015; Zhu et al. 2017), robust optimal control (Wang et al. 2014, 2016a, b) and model-free optimal control (Luo et al. 2016; Song et al. 2015; Zhao et al. 2015)."]} +{"114409654|4987113": []} +{"3981158|54458990": []} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"11866222|3330313": ["Anomaly detection techniques division can be done in multiple ways [3, 4]."]} +{"11866222|6430931": []} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"9823884|15929566": ["With respect to applications in solving dynamic optimization problems, Gosavi surveys Q-learning, temporal differences, semi-Markov decision problems, stochastic games, policy gradients, and hierarchical RL with detailed underlying mathematics [38]."]} +{"9823884|1708582": ["discussed RL from the perspective of the trade-off between exploitation and exploration, RL\u2019s foundation via Markov decision theory, the learning mechanism using delayed reinforcement, construction of empirical learning models, use of generalization and hierarchy, and reported some exemplifying RL systems implementations [36]."]} +{"51615694|206670318": []} +{"3775743|393948": ["For a comprehensive overview of the \ufb01eld, refer to [21], [22]."]} +{"154229219|5333379": ["In the recent past, NN modelling for time series forecasting has been applied by both practitioners and academics across various disciplines (Aiken, 1999; Huang et al., 2004; Zou et al., 2007; Li et al., 2010)."]} +{"15802694|7158350": []} +{"18127852|3348390": []} +{"61357533|33286487": []} +{"39321854|192934": []} +{"3510546|206670318": []} +{"29061441|7439310": ["To cope with the errors during the multimedia transmission, lots of approaches are proposed[3]."]} +{"20257699|4987113": []} +{"207079655|12925459": ["numerical data, many studies have discussed online methods to reduce algorithm complexity, such as motif matching [80] and online portfolio selection [62]."]} +{"3671406|2088679": ["[20], who provided a survey on deep learning in medical image analysis that included studies on image classification, object detection, segmentation, registration, and so on."]} +{"3671406|393948": ["Among the unsupervised feature learning and deep learning methods [28], the stacked autoencoder [29] is a compact but powerful technique that can be used to encode high-dimensional data into a compact representation space [30], [31]."]} +{"8001944|14545307": ["Instead of output levels, vector quantization (VQ) employs a set of representation vectors (for the one-dimensional case) or matrices (for the two-dimensional case) [17], [18], [19], [20], [12]."]} +{"1522994|17464562": []} diff --git a/edge/graph_54459013.jsonl b/edge/graph_54459013.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..764042333f0f6a1993aa8401a3e62c743f22ae3e --- /dev/null +++ b/edge/graph_54459013.jsonl @@ -0,0 +1,7 @@ +{"19251322|16766019": []} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"53742570|206932295": []} +{"14515851|17516538": ["This information is used in a second stage for the detection of more complex and abstract behavior patterns [15]."]} +{"18186632|17516538": []} +{"5163155|6972141": ["Many robot navigation systems, especially those used indoors, employ model-based vision in a welldefined and/or highly constrained environment [1]."]} +{"53099653|393948": []} diff --git a/edge/graph_54461694.jsonl b/edge/graph_54461694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54461890.jsonl b/edge/graph_54461890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..889a4c58d70e9945ce386abc7f35fdb6f204f3d2 --- /dev/null +++ b/edge/graph_54461890.jsonl @@ -0,0 +1,3 @@ +{"9328854|3273340": ["As an illustration, consider the convolutional layers of Alexnet, which account for only 4% of the parameters but 91% of the computation [68].", "As an illustration, consider the convolutional layers of Alexnet, which account for only 4% of the parameters but 91% of the computation [Sze et al., 2017]."]} +{"54439509|3519414": ["Deep learning methods in general have found a pervasive suite of applications in biology, clinical medicine, genomics and public health as surveyed in [24, 23, 25, 29, 30, 31]."]} +{"54439509|2088679": ["Deep learning methods in general have found a pervasive suite of applications in biology, clinical medicine, genomics and public health as surveyed in [24, 23, 25, 29, 30, 31]."]} diff --git a/edge/graph_54462270.jsonl b/edge/graph_54462270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8338a590af1ed4658105baf615feb18244f8738 --- /dev/null +++ b/edge/graph_54462270.jsonl @@ -0,0 +1,94 @@ +{"35459099|31245252": ["\u2026use of the frequency spectrum to support a variety of services and applications (wireless broadband, public safety, health care, Internet-of-Things smart systems [16, 26, 15], etc.) is growing, due to the increased use of unlicensed devices and resulting excessive use of unlicensed frequency bands.", "Cell phone subscriptions are set to dramatically increase by 2020 driven by numerous mobile applications and next generation wireless infrastructures [27, 16, 25, 24]."]} +{"8397526|18977370": []} +{"7261954|7150007": ["For example, Herberg et al. [15] evaluated the performance of SNMP in an Optimized Link State Routing Protocol (OLSRv2)-routed MANET environment.", "Many research efforts, for that reason, have investigated MANET in the following areas [7]: (i) Routing [8], (ii) Energy conservation [9], (iii) Quality of Service [10], (iv) Security [11], and (v) Network Management."]} +{"206753047|5385031": ["Therefore, according to the basic principles of microeconomics [41], the users for video ax in next time slot can be estimated by"]} +{"3668455|6906699": []} +{"3668455|13287576": ["Multiple intrusion detection approaches can be simultaneously deployed based on the security demands [71,74,79,80].", "Finally, a machine learning-based technique [70,71] is a procedure of constructing new behavior models based on the observations of activities, events, and behaviors."]} +{"3668455|18269383": []} +{"3668455|16654832": []} +{"3668455|10780757": ["Three common techniques [67] supporting comparisons include statistical-based [68], knowledge-based, and machine learning-based techniques [69,70].", "Next, the knowledge-based technique is applicable for those systems that consist of speci\ufb01c knowledge structures or attached to a set of rules [67], such as symbolic representations.", "Statistical-based technique tracks all networking traf\ufb01cs and generates a pro\ufb01le examining whether there are any improper traf\ufb01c by a statistical analysis [67].", "The obstacle of adopting this technique is the extensive requirement of computing resources [67], which imply that the examination is highly dependent on the stored secure behavior assumptions."]} +{"3668455|18212759": ["The technologies supporting cloud computing are very similar regardless of service types or deployments [25,26]."]} +{"3668455|12815020": ["In a networking context, attackers can only gain controls on VMs by attacking the lower layer hyper-visor [40]."]} +{"49339221|31245252": ["The Internet of Things (IoT) will utilize next-generation information communication technologies to connect a massive number of objects (up to 50 billion by 2020 [3]) [6], [11], [7], [8], [13], [4]."]} +{"25596362|7644489": ["Two functions are instrumental for direct proximity-based traffic exchange: D2D discovery and D2D communication [1].", "Although D2D communication has been primarily motivated by applications such as social networking and public safety communications [1], it can also be used to offload the cellular access network, or even to establish bidirectional links for carrying out local measurement/control data [2]."]} +{"25596362|121289": ["Although D2D communication has been primarily motivated by applications such as social networking and public safety communications [1], it can also be used to offload the cellular access network, or even to establish bidirectional links for carrying out local measurement/control data [2]."]} +{"33490965|18735034": ["There is also non-inter-cell coordinated schemes in which each base station uses orthogonal channel [5]."]} +{"6953986|8909218": ["These small cell deployments are mainly in the form of home small cells, known as femtocells [10], [11], [27], but many operators have also already started to deploy outdoor small cell solutions to complement their macrocell coverage [28]."]} +{"13195599|3348390": ["Although IoT has great potential and many prototype IoT systems have been built [Perera et al. 2014; Panga et al. 2015; Xu et al. 2014], some fundamental issues have yet to be addressed."]} +{"2470254|16525678": ["The current research of 2GSS rests in real-time robust computer vision algorithms, automatic learning of scene variability and patterns of behavior, and eliminating the differences between the statistical analyses of a scene and establishing natural language interpretations [2].", "examine the usage of digital information against analogue, review digital video recording, and CCTV video compression [2].", "centrate on distributed and centralized intelligence, data fusion, probabilistic reasoning frameworks, and multicamera surveillance techniques [2].", "Valera and Velastin [2] state that the demand for remote surveillance relative to safety and security has received significant attention, especially in the public places, remote surveillance of human activities, surveillance in forensic applications, and remote surveillance in military applications.", "To tolerate this growing demand, research and development has been subsequently executed in commercial and academic environments to discover improvements or new solutions in signal processing, communications, system engineering and computer vision [2].", "The difficulty in the 2GSS is that it does not support robust detection and tracking algorithms, which are needed for behavioral analysis [2].", "Valera and Velastin [2] indicate that a future challenge is to develop a wide-area distributed multisensor surveillance system, which has robust, real-time computer algorithms, which are executable with minimal manual reconfiguration for different applications [2].", "Illustration of a typical processing flow in video surveillance systems [2].", "The main challenge in the 1GSS is that it uses analogue techniques for image distribution and storage [2]."]} +{"2470254|17516538": ["as camera installation, camera calibration, object matching, automated camera switching, and data fusion [20].", "to achieve the exhaustive surveillance task as automatically as possible [20]."]} +{"2390123|7644489": ["It is of interest to explore whether LTE module onboard UAV can be reused for sensing and detection by exploiting the LTE features such as device-to-device communication and vehicle-to-vehicle communication [14]."]} +{"1860749|7644489": ["D EVICE-TO-DEVICE (D2D) communication underlaid with cellular networks allows direct communication between mobile users [1]\u2013[4]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"44240852|7644489": ["The concept of device-todevice (D2D) communication was introduced to tackle such issues by transferring the load to User Equipments (UEs), smartphones in our case, from the cellular infrastructure [9], [11], [12], [13].", "We have assumed that the cellular (LTE) transmission between the GOs and the eNodeB, along with background processes of each of the devices in the network follow the Power Model for Data transfer as described in [12]."]} +{"44239106|76603": ["Although the legacy LMR technology can provide better cell coverage and range compared to LTE for PSC applications, LTE technology can offer substantially higher data rates, which are critical for services such as real-time situational awareness [3]."]} +{"44239106|10310014": ["Until recently, PSCs have been handled through narrowband communication technologies [such as the land mobile radio (LMR)], which can deliver reliable voice communications but do not support broadband data [1] and are also often limited in terms of coverage and interoperability [2]."]} +{"12390607|3330461": [", in-band underlaid D2D under the direct control of a cellular network, whereas WLAN operates in an unlicensed band and possesses high degree of uncertainty in the overall performance [4]."]} +{"12390607|7851743": ["Thus, self-organized resource management approaches have drawn attentions because they can help in providing range of benefits including reduced information exchange, low complexity, scalability, and etc [8]."]} +{"207249455|206584087": ["A DoS attack explicitly prevents the service providers from continuously providing their service to the user, and a distributed DoS (DDoS) attack organizes many attacking agents to achieve this [Zargar et al. 2013].", "Recently, Zargar et al. [2013] surveyed DoS attacks, but there is no game-theoretic approach in almost all of the DoS surveys."]} +{"207249455|1940388": ["There are several methods for packet scheduling attacks, such as putting malicious code into one of the packets in the path between the destination and source, or performing unfairness attacks [Chen et al. 2009]."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"28645338|61132": ["116 ||| IEEE VEHICULAR TECHNOLOGY MAGAZINE | SEPTEMBER 2019 connectivity support from backbone communication networks for command and control as well as for payload communications [2]."]} +{"2514903|16972183": ["The performance of this simple ICI model can be investigated and verified by comparing the outcome of system level simulations to the results as obtained with the Vienna LTE-A link level simulator [39].", "The results are compared with run times as obtained with the Vienna LTE-A Downlink Link Level simulator [39]."]} +{"26216054|10096622": []} +{"26216054|1230643": []} +{"3051661|3330461": ["The main idea in D2D-enabled cellular networks is to permit transmitterreceiver pairs coexisting in close proximity to establish direct peer-to-peer connections between each other.", "Through comprehensive numerical analysis, we investigate the expected performance gains and provide guidelines for selecting the network parameters."]} +{"16525390|3330461": []} +{"2471950|10310014": ["Up until recently, PSC has been handled through narrowband communication technologies such as the land mobile radio (LMR), which can deliver reliable voice communications, but do not support broadband data [1], and are also often limited in terms of coverage and interoperability [2]."]} +{"42455857|1940388": ["The 2003 Eastern blackout was caused by the fact that programs for key areas were abnormal and failed to provide the system operators the correct state information [2]."]} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"16267209|8909218": ["3) Small-to-small Interference: Due to the large number of the small cells and the irregular deployment topology, the small-to-small interference mitigation schemes were preferably at SUE side or the small-cell BS side in a distributed manner [65], [10]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"12744510|7644489": ["Due to the proximity, D2D user equipment (UE) may enjoy very high data rates, low delays and improved energy efficiency [4]\u2013[7].", "Note that when cellular network coverage is available, D2D transmissions are under relatively tight network control [4].", ", USA, LTE is supposed to support direct D2D connectivity [4]."]} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"3501073|31245252": []} +{"3501073|14290416": ["Indoor Navigation: Most existing indoor navigation systems should first localize the users [25], while in some approaches, users\u2019 absolute locations are not necessary."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"28588833|3330461": ["Device-to-device (D2D) communication, as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage, can enormously reduce the cost and burden on the base station (BS) [4]\u2013[6]."]} +{"28588833|7644489": []} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"3421394|76603": ["However, for more accurate analysis of the signal reliability requirements in PSC networks, we also implement the free space suburban Okumura-Hata path loss model (OHPLM) with LTE band class 14 frequency [1], [27].", "In this paper, for a suburban environment, we study the performance of inter-cell interference coordination (ICIC) and cell range expansion (CRE) techniques for an LTE band class 14 PSC network [1] as shown in Fig.", "To further enhance the capabilities of next generation PSC networks, countries such as the United States, the United Kingdom, and Canada are building a 4G Long Term Evolution (LTE) based broadband public safety network [1]\u2013[3].", "However, given the limited spectrum allocation for LTE-based PSC, the usage of such services would need improved channel capacity quality, and spectral efficiency (SE) [1], [4]."]} +{"644671|17109970": ["In [14], a number of noncooperative power control games for resource allocation in code-division multiple-access networks with emphasis on EE were presented, where the users can choose their uplink receivers, transmission rates, and carrier-allocation strategies, in addition to choosing their transmit powers."]} +{"21962344|17397315": ["A survey on security and privacy in the standard MapReduce may be found in [100]."]} +{"37564067|18750590": ["As presented in [26], the payoff of the leader in the Stackelberg solution is guaranteed to be no less than that in the Nash solution.", "Note that there may exist several different pricing models depending on how to set the price as presented in [25] and [26].", "As discussed in [26], to efficiently solve the modified NUM problem, the pricing-based iterative solutions can be adopted."]} +{"37564067|5385031": ["cost while protecting the users\u2019 privacy [25].", "Definitions of common terminologies in auctions such as bidder, seller, auctioneer, ask, and bid can be found in [25].", "Note that there may exist several different pricing models depending on how to set the price as presented in [25] and [26]."]} +{"37564067|206584087": ["A survey of techniques against DDoS attacks in Mobile Ad-hoc Network (MANETs) is presented in [6].", "For the DDoS attack [6], an external attacker controls a large number of compromised users inside the network to transmit radio jamming signals with high power to a target system, and makes the system unavailable to respond to any service requests from the legitimate users.", ", bots, inside the network to encumber the legitimate accesses to the resources at a receiver [6]."]} +{"37564067|17623572": ["A black hole problem is actually a misbehavior routing problem [90] in which one malicious node uses the same routing protocol as the regular nodes, but it drops the routed packets and does not forward the packets to its neighbors."]} +{"37564067|4395259": ["anti-jamming techniques [9], and physical layer security [10]."]} +{"37564067|17205659": ["For example, surveys of security issues in Wireless Sensor Networks (WSNs) are given in [7] and [8]."]} +{"9377841|8909218": ["Two distributed solutions are enabled through RADION and their performance is studied to highlight their quick self-organization into efficient resource allocations."]} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"1333339|14745481": ["Applications of trust management is enormous in mobile networks [20].", "Apart from these, some application specific attack models are discussed in [20], [101], [102].", "The detailed survey on various trust computation mechanisms, trust dynamics and their inter operations are missing in [20].", "There is a recent survey on trust management for MANET in [20]."]} +{"1333339|10137283": []} +{"1333339|9240891": []} +{"1333339|10859599": ["Apart from these, some application specific attack models are discussed in [20], [101], [102]."]} +{"3097798|8909218": ["Also, WCDMA, LTE, and WiMAX femtocells are being standardized by 3GPP, 3GPP2, and WiMAX Forum (IEEE 802.16), respectively [11], [12]."]} +{"4852956|7686677": ["Here, the energy efficiency of each user is defined as the ratio of the throughput to the total power consumption, which is one of the most common forms to quantify energy efficiency [23]."]} +{"6551617|7644489": ["In this paper, we assume the uncorrelated shadowing model for direct links between D2D deivces by employing log-nomral distributions with 7 dB deviation, which aligns with the current 3GPP working assuption [14].", "It is noted that there have been the on-going 3GPP Rel-12 standardization activities studying the resource allocation for D2D discovery in the proximity service (ProSe) where the focus is on device-centric resource allocation [14].", "The D2D path-loss model employs ITU-1411-6 model [14] with probablity of line of sight (LOS) and non-line-of-sight (NLOS) determined by ITU-R IMT UMi model [14].", "In this section, we compare the performance of the networkcentric and device-centric schemes through system-level simulations based on 3GPP option 3 scenario [14]."]} +{"10025382|3504276": ["Wireless powered communication network (WPCN) is considered as an emerging solution to energy-constrained wireless network [1]."]} +{"10025382|3330461": ["In recent years, Device-to-Device (D2D) communication has received more and more attentions and been standardized into the 3GPP release 12 [12], [13]."]} +{"10025382|7644489": ["In recent years, Device-to-Device (D2D) communication has received more and more attentions and been standardized into the 3GPP release 12 [12], [13]."]} +{"638024|7644489": []} +{"5806910|7644489": ["An overview on 3GPP D2D ProSe was given in [96], from the design aspects of ProSe management, synchronization, device discovery and direct communication."]} +{"5806910|8909218": ["\u2026geometry can be a helpful mathematical tool for modeling the spatial distributions of macro eNBs, pico eNBs, femto eNBs, and mobile UEs [108], [109], and analyzing the transmission rate [110], [111], outage probability [112], etc. D2D With Network Coding: As a revolutionary technique, network\u2026"]} diff --git a/edge/graph_54462512.jsonl b/edge/graph_54462512.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cc4fa67f8b7491db757638c8af75e42506ce38d --- /dev/null +++ b/edge/graph_54462512.jsonl @@ -0,0 +1,23 @@ +{"14556216|7788290": ["The study of human gait has been increased extensive interests in various fields such as clinical analysis, computer animation, athletic performance analysis, visual surveillance, robotics, and biometrics [6].", "It is well-known that biometrics are a powerful tool for reliable automated person identification [6][12]."]} +{"4536769|17516538": ["From the aforementioned examples, we can understand that the correlations between the different gait factors/components are very signi\ufb01cant for human recognition and gender recognition."]} +{"4536769|14970359": ["Some important surveys along with detailed comparisons of different algorithms can be found in [1], [13], [16], and [27]."]} +{"4536769|7788290": ["Some important surveys along with detailed comparisons of different algorithms can be found in [1], [ 13 ], [16], and [27]."]} +{"1149244|205131192": ["Here, S is either a centralised Cartesian polynomial [10], or a Zernike polynomial [4]."]} +{"2857532|53680608": []} +{"15669657|2814871": ["The application discussed here is devoted to the use of MS Kinect as an alternative to treadmill walking in evaluating walking parameters and recognizing gait disorders [19, 20]."]} +{"15669657|11074234": ["Background Systems that enable human\u2013machine interactions [1, 2] and spatial modelling have a wide range of applications in modern engineering, robotics, and biomedical devices [3, 4]."]} +{"15590808|11042075": []} +{"4646924|11042075": []} +{"8519378|17516538": ["Recent comprehensive reviews by Wang et al. [25] and Hu et al. [ 43 ] have emphasized the role of gait as a biometrics in behavior analysis."]} +{"8519378|7788290": ["Gavrila and Davis [ 10 ] classified methods for the analysis of human movement into 2-D approaches that do not use explicit models, 2-D approaches that use explicit models, and 3-D approaches."]} +{"14543002|11042075": ["The advantages of the video sensor-based Class Energy Image approach can be summarized as follows: (a) It is well suitable for real time systems because it is easy to extract the feature and computational complexity is low [21,60]; (b) It is insensitive to the quality of silhouettes comparing to model-based approaches; (c) It holds several key features of human gait including motion frequency, temporal and spatial changes of human body, and global body shape statistic [3]; (d) It is robust to silhouette errors and image noise [61].", "The general framework of the video sensor-based gait recognition system includes four modules [21], which are preprocessing module [26\u201330] (i."]} +{"26581563|7834819": []} +{"1049642|7788290": []} +{"14689963|14970359": ["However, many markerless motion capture systems have been studied for tracking and extracting objects, though not for biomechanical or recognition purposes [19]."]} +{"15252216|14970359": ["A user interested in more human motion capture algorithms can find a profound survey in (Moeslund and Granum, 2001) with special focus on tracking, pose estimation and recognition."]} +{"7693282|14970359": ["A more recent, extensive survey [10] looks at more than 130 publications in computer vision-based human motion analysis and classifies them based on the issues addressed: Initialization (eight publications), tracking (48 publications), pose estimation (64 publications), and recognition (16\u2026"]} +{"7693282|7788290": []} +{"1863679|7788290": ["Although there is a rich body of work describing vision systems to deal with human detection, tracking, and action recognition [ 23 ], [51], computer vision researchers have only recently begun to investigate gait as a biometric feature.", "There is a great deal of related studies on gait, including physical medical studies [33]\u2013[35], psychology [29], [42], and approaches aiming to model human body and to track human motion [21], [ 23 ], [39], [51]."]} +{"207322066|17516538": []} +{"8617062|11042075": []} +{"62451656|7788290": ["A survey of literature in human motion analysis can be found in [8]."]} diff --git a/edge/graph_54463118.jsonl b/edge/graph_54463118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c04d553e22dc65b0d406be3850e89c5a48f1d341 --- /dev/null +++ b/edge/graph_54463118.jsonl @@ -0,0 +1,22 @@ +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"6664074|16762549": ["The large variety of use cases [15]\u2013[19] led to the development of a large variety of hardware and communication technologies."]} +{"6664074|4631990": []} +{"3503216|3579945": ["Note that, although this improvement in the energy efficiency is especially useful for battery-operated gateways, the increase on the level of security may also benefit other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which can be the target of cyberwarfare attacks [20]."]} +{"3503216|13991708": ["\u2026gateways, the increase on the level of security may also bene\ufb01t other IoT applications like home automation [13\u201315], defense and public safety [16], transportation and connected vehicles [17], or healthcare, where security issues can pose risks for human safety and privacy [18,19] and which\u2026", "As explained in [16], the fog layer must provide horizontal integration between different layer protocols."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"191577|1230643": ["An Operating System Abstraction Layer for Portable Applications in Wireless Sensor Networks Ramon Serna \nOliver Ivan Shcherbakov Gerhard Fohler Chair of Real-Time Systems Chair of Real-Time Systems Chair of \nReal-Time Systems TU Kaiserslautern TU Kaiserslautern TU Kaiserslautern Germany Germany Germany serna_oliver@eit.uni-kl.de \nshcherbakov@eit.uni-kl.de fohler@eit.uni-kl.de ABSTRACT Portability of software modules is a major concern \nin appli\u00adcation development for Wireless Sensor Networks (WSN), stressed by the typical lack of resources \nin embedded sys\u00adtems.", "An Operating System Abstraction Layer for Portable Applications in Wireless Sensor Networks Ramon Serna \nOliver Ivan Shcherbakov Gerhard Fohler Chair of Real-Time Systems Chair of Real-Time Systems Chair of \nReal-Time Systems TU Kaiserslautern TU Kaiserslautern TU Kaiserslautern Germany Germany\u2026"]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"206491434|6664074": ["Similarly, a number of operating systems (OSs) have gradually been developed to run these tiny sensors [7].", "provided a detailed analysis of various requirements to satisfy low-end IoT devices [7].", ", high-end IoT devices and low-end IoT devices [7]."]} +{"206491434|17713112": ["surveyed wireless sensor network (WSN) deployments and analyzed the collected data to study the design rules for a WSN OS using 40 deployment scenarios [48]."]} +{"206491434|17683338": ["[100] P. Gonizzi, P. Medagliani, G. Ferrari, and J. Leguay, \u2018\u2018RAWMAC: A routing aware wave-based MAC protocol for WSNs,\u2019\u2019 in Proc.", "Another OS called LiveOS was introduced to conserve memory and energy for a WSN [53].", "Available: https://github.com/iot-lab/iot-lab/wiki/Libraries [131] A. Schoofs, M. Aoun, P. van der Stok, J. Catalano, R. S. Oliver, and G. Fohler, \u2018\u2018A framework for time-controlled and portable WSN applications,\u2019\u2019 in Sensor Applications, Experimentation, and Logistics (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).", "Over the years, various OSs have emerged in the WSN community.", "TinyOSOpportunistic Routing Protocol (TORP) forWSNs is designed to conserve energy by implementing an efficient forwarding mechanism [118].", "Dariz et al. compared Contiki and TinyOS with a real-time OS named ChibiOS to study the safety-relevant application in a WSN [52].", "Farooq and Kunz highlighted major challenges for an OS design, and identified the advantages and limitations in an OS for a WSN [51].", "Strazdins et al. surveyed wireless sensor network (WSN) deployments and analyzed the collected data to study the design rules for a WSN OS using 40 deployment scenarios [48].", "Deployments from 2002 to 2011 are reviewed to study different WSN applications, including environmental monitoring, animal monitoring, human-centric applications, infrastructure monitoring, smart buildings, and military applications.", "(EWSN), Trento, Italy, Feb. 2012, pp. 1\u20132."]} +{"25676967|11293874": ["In other researches for fall detection, they used an accelerometer wearable sensor [12]\u2013[16]."]} +{"3924613|6664074": ["Prior work [28], [29] has surveyed the space of OSs for lowend IoT devices.", "As resource limitations on low-end IoT devices are expected to last [37], [39], a variety of more compact OSs were recently designed [29]."]} +{"4249275|3007529": ["Alternate work considers the validity of the combination of wake-up radios and energy harvesting [12]\u2013[14]."]} +{"4249275|2295142": ["Over the last several decades, a plethora of routing strategies have been proposed for WSNs [25]\u2013[28].", "Routing has been studied in general for WSNs in isolation [25]\u2013[28], or in cross-layer"]} +{"4249275|1236072": []} +{"49558643|3945698": ["The RHM should be continuous, real-time, enabling decision support and prediction, and improve quality of life through smart environments, controlled medication and wellbeing services [1]."]} diff --git a/edge/graph_54464833.jsonl b/edge/graph_54464833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..134b22bba4ebb7d480b33e19350204de32e995dc --- /dev/null +++ b/edge/graph_54464833.jsonl @@ -0,0 +1,2 @@ +{"1766258|14038195": ["Recently, Ho proposed that the combination of AHP and QFD is one of the most commonly used techniques (Ho, 2008)."]} +{"23358713|11139156": ["[61])."]} diff --git a/edge/graph_54465031.jsonl b/edge/graph_54465031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ffa284ae210b7099515ccff9a5f6e3ab5fc272c --- /dev/null +++ b/edge/graph_54465031.jsonl @@ -0,0 +1,3 @@ +{"4341852|12526628": ["Sentiment Analysis (SA) is defined as a process of identification and classification of the viewpoint or opinion expressed in the text span; usually using information retrieval and computational linguistics [1]."]} +{"3341993|17574321": ["This uniqueness enables us to identify speakers based on their voice [9]."]} +{"4090501|16768404": ["Although several studies investigating SA in widespread languages such as English have been published so far [12]\u2013[15], the purpose of this section is not to review SA in English studies."]} diff --git a/edge/graph_54465219.jsonl b/edge/graph_54465219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebcb6228bb0fd4c0af88384701dbad51fde2a79e --- /dev/null +++ b/edge/graph_54465219.jsonl @@ -0,0 +1,4 @@ +{"42451045|35897447": ["\u2026of technology deployment\u2019s long-term success rest within the organization\u2019s internal context in the form of knowledge and skills of managers and employees (Bharadwaj, 2000; Gregor, Martin, Fernandez, Stern, & Vitale, 2006; Peppard & Ward, 2004; Piccoli & Ives, 2005; Ray, Muhanna, & Barney, 2005)."]} +{"6179358|46332627": ["El-Gazzar (2014) systematic literature review, calls the need for (1) more empirical studies; (2) cloud computing adoption is multifaceted which requires usage of multi-theoretical perspectives; (3) exploration of theories that explain how organisations react differently to same internal and external factors."]} +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} diff --git a/edge/graph_544688.jsonl b/edge/graph_544688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54481295.jsonl b/edge/graph_54481295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..efbefe48b01090c0d63ba087c588a773df4537a2 --- /dev/null +++ b/edge/graph_54481295.jsonl @@ -0,0 +1 @@ +{"26304576|11720829": ["Depending on the relationship between the signals transmitted from different antennas MIMO schemes can be used to either increase the overall capacity of the system, or to reduce the probability of outage [48], [49]."]} diff --git a/edge/graph_54498056.jsonl b/edge/graph_54498056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c2637c265b4ae21ff698b502860d2e12c06b97f --- /dev/null +++ b/edge/graph_54498056.jsonl @@ -0,0 +1,2 @@ +{"205437295|4602249": ["SMs Search-based testing for non-functional system properties 2008 [41] Product lines testing 2011 [42] Graphical user interface (GUI) testing 2013 [43] Test-case prioritization 2013 [44] Software test-code engineering 2014 [45] SLRs Model-based testing 2007 [46] Automated acceptance testing 2008 [47] Mutation testing for Aspect-J programs 2013 [48] Web application testing 2014 [49] Testing scientific software 2014 [50] Regular surveys Testing finite state machines 1996 [51] Regression testing minimization, selection and prioritization: a survey 2012 [52] Testing in SOA 2013 [53] Test-case generation from UML behavioral models 2013 [54] Test oracles 2014 [55]"]} +{"205437295|8742997": ["SMs Search-based testing for non-functional system properties 2008 [41] Product lines testing 2011 [42] Graphical user interface (GUI) testing 2013 [43] Test-case prioritization 2013 [44] Software test-code engineering 2014 [45] SLRs Model-based testing 2007 [46] Automated acceptance testing 2008 [47] Mutation testing for Aspect-J programs 2013 [48] Web application testing 2014 [49] Testing scientific software 2014 [50] Regular surveys Testing finite state machines 1996 [51] Regression testing minimization, selection and prioritization: a survey 2012 [52] Testing in SOA 2013 [53] Test-case generation from UML behavioral models 2013 [54] Test oracles 2014 [55]"]} diff --git a/edge/graph_54502009.jsonl b/edge/graph_54502009.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54507182.jsonl b/edge/graph_54507182.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54512492.jsonl b/edge/graph_54512492.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e58cb92b1e69f718d0e3233eae56fe4663011f0 --- /dev/null +++ b/edge/graph_54512492.jsonl @@ -0,0 +1,4 @@ +{"40150313|5313655": []} +{"25794508|2257431": ["The number of trie accesses is 32 for IPv4 in the worst-case [4].", "The classless inter-domain routing (CIDR) scheme [2] allows prefixes to have arbitrary lengths, and the IP address lookup performs the task of finding the longest matching prefix [1], [3], [4], [5], [6]."]} +{"44747671|5313655": []} +{"9151652|7842253": ["[22] proposed various research directions for real time, distributed, dynamic, adaptive and multi-objective scheduling of big data applications."]} diff --git a/edge/graph_54512847.jsonl b/edge/graph_54512847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54515682.jsonl b/edge/graph_54515682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3732ec4e2351cd5c587139a13794447a57d98c9 --- /dev/null +++ b/edge/graph_54515682.jsonl @@ -0,0 +1,4 @@ +{"5966558|9176080": ["These two broad categories are the spatial domain and the transform domain based techniques [1,2]."]} +{"17461038|9176080": ["Steganography is the science and art of hiding secret data in a host media (e.g. text, image, audio, video, etc.) (Cheddad et al., 2010).", "In steganography, there are three major goals including increasing hiding capacity, robustness to certain attacks and increasing security level (Cheddad et al., 2010)."]} +{"13610500|9176080": []} +{"17770800|9176080": []} diff --git a/edge/graph_54519269.jsonl b/edge/graph_54519269.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa9ac84fc0190d58addb3e46fd6760cda5fa7aa9 --- /dev/null +++ b/edge/graph_54519269.jsonl @@ -0,0 +1,9 @@ +{"63446751|205286988": []} +{"63446751|1230643": []} +{"15248509|206901977": ["Consequently, there is a wide range of WSN applications such as [25]: health-care, environment, agriculture, public safety, military, transportation systems, and industry applications."]} +{"107838764|205286988": ["A typical Wireless Sensor Network (WSN)[1],[2] is an adhoc network composed of small sensor nodes which cooperatively monitor some physical environment."]} +{"107838764|1230643": ["Each sensor node has a sensing range or sensing coverage range[3],[4],[5] which is the region or area that a node can observe or monitor."]} +{"49296637|1230643": ["Wireless sensor networks (WSNs) provide deployment of low cost wireless nodes which are useful to collect and measure data about a certain environment [1].", "Wireless sensor networks are widely used in many application areas such as rescue operations, habitat monitoring, structural monitoring, and wild fire detection [1]."]} +{"8173334|1230643": ["One of the most important functions of the sensor node is to collect pertinent information such as earthquake intensity, light, or temperature measurement in environmental monitoring applications or enemy or chemical gas detection in military detection applications [2]\u2013[4]."]} +{"10201381|1230643": ["Pervasive networks of such sensors and actuators open new vistas for many potential applications, such as battlefield surveillance, environment monitoring and biological detection [11], [15], [ 2 ], [20]."]} +{"2276755|1230643": ["As mentioned previously, sensors can be placed exactly on carefully engineered positions, or thrown in bulk on random positions [3].", "Nodes may be dispersed by a moving vehicle or artillery shell [3].", "These sensors can observe and respond to phenomena in the physical environment [3]."]} diff --git a/edge/graph_54525699.jsonl b/edge/graph_54525699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..becf04082fc30e592c2c8e966462c51569e020a1 --- /dev/null +++ b/edge/graph_54525699.jsonl @@ -0,0 +1,10 @@ +{"13419036|1734833": []} +{"13419036|20905429": ["4-capable nodes interfaced with electrocardiogram (ECG) and blood pressure sensors, as well as a basic cell phone device for data display and signal feature extraction [6]; (3) the Human++ project in the Netherlands which developed a body area network consisting of three sensor nodes and a base station [7]; (4) the CodeBlue project developed by researchers at Harvard University [8]; (5) research from the Media Laboratory of the Massachusetts Institute of Technology (MIT) which involved designing LiveNet [9]; (6) the development of the SmartVest, a wearable physiological monitoring system that consists of a vest and a variety of sensors integrated into the garment\u2019s fabric to collect several biosignals [10]; (7\u20139) and three European IST FP6 programs (the MERMOTH, MyHeart and HeartCycle projects), which are recent examples of WPM systems [11\u201314]."]} +{"48359104|21386749": []} +{"205231876|6242153": []} +{"23079116|1691097": []} +{"23079116|10817088": []} +{"23079116|42648222": ["However, current solutions based on smartphones suffer from scalability, security and privacy issues, apart from providing only a snapshot of physiological conditions instead of a continuous and longitudinal view of the users\u2019 health status [169].", "Currently, approaches are being developed in order to avoid this information to be used for evil or non-ethical purposes [169,190,191]."]} +{"23079116|15219853": []} +{"15096698|7988320": []} +{"15096698|20905429": []} diff --git a/edge/graph_54542379.jsonl b/edge/graph_54542379.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54543796.jsonl b/edge/graph_54543796.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..beda6fa82f778cd4073ecc56e79fd1c960c7177c --- /dev/null +++ b/edge/graph_54543796.jsonl @@ -0,0 +1 @@ +{"6623226|17290408": ["Access control on available XML documents by the use of various cryptographic keys on different level of XML tree is presented in [17]."]} diff --git a/edge/graph_54544061.jsonl b/edge/graph_54544061.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54547807.jsonl b/edge/graph_54547807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce77f7c81fa710c967041fd685e9f104d1fc336d --- /dev/null +++ b/edge/graph_54547807.jsonl @@ -0,0 +1,3 @@ +{"11803429|14826104": ["\u2026high representative power and the fact that they lend themselves to an intuitive graphical representation, as well as the fact that they offer a well defined formalism that lends itself to sound probability computations of unobserved nodes from evidence of observed nodes (Desmarais & Baker, 2012)."]} +{"42450140|11608263": []} +{"13157332|5473785": ["As aforementioned, each node must represent a propositional variable [140], which is defined to be as a variable that takes an exhaustive and mutually exclusive number of values.", "For more information about what the conditional independence assumptions mean, see [140] or [153]."]} diff --git a/edge/graph_54549768.jsonl b/edge/graph_54549768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65fb6862e80fe5bca7ab6a5c8176a5b9565b404b --- /dev/null +++ b/edge/graph_54549768.jsonl @@ -0,0 +1,2 @@ +{"109132295|8783262": []} +{"108177845|121289": []} diff --git a/edge/graph_54552710.jsonl b/edge/graph_54552710.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9dedab07172aa8b718a634235adb61e5dbdb26e4 --- /dev/null +++ b/edge/graph_54552710.jsonl @@ -0,0 +1,16 @@ +{"13035027|9554464": ["[15] classified secure data aggregation schemes into hopby-hop encrypted data aggregation and end-to-end encrypted data aggregation."]} +{"13035027|1230643": ["Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring [1], [2], [17]."]} +{"18924791|1230643": ["Keywords\u2014Wireless sensor networks, data aggregation, homomorphic encryption, elliptic curve, confidentiality, integrity\nI. INTRODUCTION\nWireless sensor networks [1] are special ad-hoc networks that are characterized by energy constraints and limited power."]} +{"1504416|1940388": ["Data aggregation is an important primitive that aims to process/combine/summarize data packets, which come from several sensor nodes then forwarding these packets to upper nodes [4,5]."]} +{"1504416|17205659": ["Fortunately, previous researches [35,36] proposed mechanisms to defend against this attack.", "This kind of attack, which is called selective forwarding attack was first described in [35]."]} +{"22586760|16084499": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"18979563|5747564": ["Today, smart grid (SG), which embeds bi-directional information and communication technology (ICT) with power grids, has emerged to effectively address this issue [2]."]} +{"1208330|17756238": ["GPS stalking [81], disclosure of private information such as an illness [82], or generally the uneasy feeling of being watched [83].", "Examples where profiling is leads to a violation of privacy violation are price discrimination [87, 88], unsolicited advertisements [83], social engineering [89], or erroneous automatic decisions [48], e."]} +{"1208330|2906926": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"1208330|2357830": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} diff --git a/edge/graph_54557477.jsonl b/edge/graph_54557477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bfdd03bca5ee10b5ab2661ca760ccb64c586f8e --- /dev/null +++ b/edge/graph_54557477.jsonl @@ -0,0 +1,9 @@ +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"1898852|16209841": ["For instance, [11] provides a sound review of network security and identity management, but does not consider privacy, trust, and resilience; [53] emphasizes privacy and trust, but hardly tackles network security, identity management, and resilience."]} +{"3337741|14077778": []} +{"1862633|14650419": []} +{"1862633|2357830": ["Objects in an IoT must be able to communicate and exchange data with each other autonomously (Juels 2006; Mitrokotsa et al. 2013).", "For example, Juels proposed the method of \u201cblock tag\u2019 to prevent the unauthorized tracing (Juels 2006)."]} +{"46192657|1708582": ["The third category, also known as the online learning, refers to process of handling the problems that an agent opposes when he must learn behavior via trial-and-error exchanges with an active environment [9]."]} diff --git a/edge/graph_54557522.jsonl b/edge/graph_54557522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f7eea42f48dadbc80f61ce7d46de77f686b41a9 --- /dev/null +++ b/edge/graph_54557522.jsonl @@ -0,0 +1,4 @@ +{"21020278|17516538": ["\u2022 On the pig: a visual system is developed for analyzing the growth of pigs [ 18 ]; by using visual image analysis, pig growth is described [29], [30]; A real-time computer vision is used to assess and control thermal comfort for grouphoused pig [31], [32], etc.", "And most of the algorithms like background subtraction, adjacent frame difference and optical flow method etc. aim to a kind of specific issues [ 18 ]."]} +{"56380143|17054454": [", 2002), large area characterizations of vegetation structure based upon remotely sensed data often have sub-optimal precision for many applications (Xie et al., 2008).", "\u20262003); however, because the spatial extent and spatial resolution of a given sensor are inversely related (Franklin et al., 2002), large area characterizations of vegetation structure based upon remotely sensed data often have sub-optimal precision for many applications (Xie et al., 2008)."]} +{"29853598|6570872": ["Second, obstacles may have similar colors to the model classification features, and the most serious is that a color property changes dramatically when the illumination condition changes this is known as; the color constancy problem (Sridharan and Stone, 2009)."]} +{"15035776|12127129": ["We acquired silhouettes and silhouette probability maps through background subtraction (reviews and evaluations are given in [1] and [18])."]} diff --git a/edge/graph_54559476.jsonl b/edge/graph_54559476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3278ad6e157487a4ef6aa9d4f39d30562596889a --- /dev/null +++ b/edge/graph_54559476.jsonl @@ -0,0 +1,24 @@ +{"3495200|207591052": ["Our work builds upon the recent \ufb01eld of using machine learning for source code artifacts (Allamanis et al., 2017).", "The advent of large repositories of source code as well as scalable machine learning methods naturally leads to the idea of \u201cbig code\u201d, i.e. , largely unsupervised methods that support software engineers by generalizing from existing source code (Allamanis et al., 2017)."]} +{"50778825|3951790": []} +{"2701448|393948": ["By stacking these non-linear single layers together, deep learning are believed to yield better representations (Part 4 in (Bengio, Courville, and Vincent 2013))."]} +{"52049859|9659809": ["With the prevalence of online social media, signed network analysis has become ubiquitous and thus attracted an increased attention [26]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"3951790|207372751": ["Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention (Liben-Nowell and Kleinberg 2007; Lu\u0308 and Zhou 2011).", "Link prediction, as one of the most fundamental problems on network analysis, has received a considerable amount of attention [7], [82]."]} +{"3951790|239537": ["\u2026and analysis tasks such as node classi\ufb01cation (Sen et al. 2008; Perozzi, Al-Rfou, and Skiena 2014), node clustering (Wang et al. 2017b), network visualization (Herman, Melanc\u00b8on, and Marshall 2000; Wang, Cui, and Zhu 2016) and link prediction (Liben-Nowell and K-leinberg 2007; Ou et al. 2016).", "Network embedding, as a promising way of network representation, is capable of supporting subsequent network processing and analysis tasks such as node classification [2], [3], node clustering [4], network visualization [5], [6] and link prediction [7], [8]."]} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} +{"1033682|174797842": []} +{"4899764|17485266": ["A recent survey [22] discusses the different gradient decent methods in detail."]} +{"4899764|12161567": ["Moreover, modern companies often wish to store information in the form of a corporate knowledge graph and apply a variety of machine learning and data mining techniques (e.g., graph mining [8], relational learning [19], security [25], knowledge embedding [27]) for different applications."]} +{"51608273|1479507": ["This merit has motivated a number of studies in this area [Cai et al., 2017; Zhang et al., 2017a].", "The key idea is to preserve the topological structure, vertex content, and other side information [Zhang et al. , 2017a].", "UPP-SNE employs an approximated kernel mapping scheme to exploit user pro\ufb01le features to enhance the embedding learning of users in social networks [ Zhang et al. , 2017b ] ."]} +{"51608273|3951790": ["However, the high computational complexity, low parallelizability, and inapplicability of machine learning methods to graph data have made these graph analytic tasks profoundly challenging [Cui et al., 2017].", "However, the high computational complexity, low parallelizability, and inapplicability of machine learning methods to graph data have made these graph analytic tasks profoundly challenging [ Cui et al. , 2017 ] ."]} +{"50776812|3951790": []} +{"3215337|12161567": ["\u2026work, which we do not review in detail here\u2014including latent space models of social networks [32], embedding methods for statistical relational learning [42], manifold learning algorithms [37], and geometric deep learning [7]\u2014all of which involve representation learning with graph-structured data.", "We refer the reader to [32], [42], [37], and [7] for comprehensive overviews of these areas.", "Indeed, the literature on knowledge-graph completion\u2014where the goal is predict missing relations in knowledge graphs\u2014contains many related techniques for decoding a large number of edge types ( i.e. , relations) [42].", "A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12] and (ii) extend pairwise decoders with type-speci\ufb01c parameters [42, 52].", "More generally, link prediction is closely related to statistical relational learning [24], where a common task is to predict missing relations between entities in a knowledge graph [42].", "Adapted from [60]. edge types, the standard inner-product edge decoder ( i.e. , z i z j \u2248 A i,j ) can be replaced with a bilinear form [12, 42, 52]: where \u03c4 indexes a particular edge type and A \u03c4 is a learned parameter speci\ufb01c to edges of type \u03c4 ."]} +{"3215337|18986679": []} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"50767861|3951790": ["Network embedding [6, 11, 14], also known as network representation learning, gains momentum after the recent success of Deep-Walk [23].", "One basic requirement of network embedding is that the learned vertex representations should preserve the inter-vertex similarity reflected by the network structure [6, 11, 14]."]} +{"685369|393948": ["Auto-encoders provide an unsupervised way to directly learn a mapping from the original data [2]."]} +{"207238964|393948": ["Representation learning has long been an important problem of machine learning and many works aim at learning representations for samples [3, 35]."]} +{"50778801|3951790": ["We briefly review some network embedding methods, and readers can referred to [13] for a comprehensive survey."]} +{"2906154|393948": ["NTRODUCTION Deep neural networks (DNN) have led to a revolution in the areas of machine learning, audio analysis, and computer vision, achieving state-of-the-art results in numerous applications [1], [2], [3]. In this work we formally study the properties of deep network architectures with random weights applied to data residing in a low dimensional manifold. Our results provide insights into the out"]} diff --git a/edge/graph_54572423.jsonl b/edge/graph_54572423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54580753.jsonl b/edge/graph_54580753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c82115581a08eb5ad188d3ded7510608bb515d6f --- /dev/null +++ b/edge/graph_54580753.jsonl @@ -0,0 +1,4 @@ +{"17570058|3330313": []} +{"14182303|14736029": ["\u2026the Kambil & van Heck (1998) model to include a socio-political context (government support and environmental factors like the political and cultural scenario, infrastructural adequacy, technical sophistication of e-market providers) and strategic processes (financial backing, support services\u2026"]} +{"37099824|33644565": ["IT governance structure IT governance structure deals with the decision-making structures (or, decision loci) adopted for IT-related decisions (Brown & Grant, 2005).", "Consistent with the results of prior research on IT governance (Sambamurthy & Zmud, 1999; Weill, 2004; Brown & Grant, 2005), the patterns we observed across the three case studies allowed us to draw an inference that centralized IT decision structures are likely to be most prevalent within SMEs.", "Research on IT governance can be traced back to the 1960s (Brown & Grant, 2005) with researchers examining, among other issues, the nature of IT governance (Weill, 2004), structural options for IT governance (Jenkins & Santos, 1982; Zmud et al ., 1986) and the drivers of IT governance structural\u2026"]} +{"44699915|15164501": []} diff --git a/edge/graph_54584874.jsonl b/edge/graph_54584874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6023ed08f5fc91ca171a0f364b1f38c858cf90ae --- /dev/null +++ b/edge/graph_54584874.jsonl @@ -0,0 +1,7 @@ +{"3700344|17652653": ["Bilingual corpora and machine translation have been used to generate paraphrases by pivoting through a second language[Madnani and Dorr, 2010].", "Bilingual corpora and machine translation have long been used to generate paraphrases[Madnani and Dorr, 2010]."]} +{"12737290|17652653": ["Some old methods use data-driven methods and hard coded rules such as (Madnani and Dorr 2010), (McKeown 1983b)."]} +{"1033682|174797842": []} +{"4956100|17652653": ["Paraphrase generation (Androutsopoulos and Malakasiotis, 2010; Madnani and Dorr, 2010) has been tackled using many different methods, including those based on hand-crafted rules (McKeown, 1983), synonym substitution (Bolshakov and Gelbukh, 2004), machine translation (Quirk et al."]} +{"5876372|17652653": ["The ability to identify paraphrase, in which a sentences express the same meaning of another one but with different words, has proven useful for a wide variety of natural language processing applications (Madnani and Dorr, 2010)."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"9385494|17652653": ["Knowledge-driven methods for paraphrase generation (Madnani and Dorr, 2010) utilize hand-crafted rules (McKeown, 1983) or automatically learned complex paraphrase patterns (Zhao et al.", "This dataset contains relatively short paraphrases (86% of the data is less than four words), which makes it suitable for synonym generation and phrase substitution to address lexical and phrasal paraphrasing (Madnani and Dorr, 2010).", "This dataset contains relatively short paraphrases ( 86% of the data is less than four words), which makes it suitable for synonym generation and phrase substitution to address lexical and phrasal paraphrasing (Madnani and Dorr, 2010).", "Knowledge-driven methods for paraphrase generation (Madnani and Dorr, 2010) utilize hand-crafted rules (McKeown, 1983) or automatically learned complex paraphrase patterns (Zhao et al., 2009).", "to generate a reference paraphrase given a source text) (Madnani and Dorr, 2010).", "Paraphrase generation has been used to gain performance improvements in several NLP applications, for example, by generating query variants or pattern alternatives for information retrieval, information extraction or question answering systems, by creating reference paraphrases for automatic evaluation of machine translation and document summarization systems, and by generating concise or simplified information for sentence compression or sentence simplification systems (Madnani and Dorr, 2010).", "\u2026extraction or question answering systems, by creating reference paraphrases for automatic evaluation of machine translation and document summarization systems, and by generating concise or simpli\ufb01ed information for sentence compression or sentence simpli\ufb01cation systems (Madnani and Dorr, 2010).", "\u2026related problems: (1) recognition (i.e. to identify if two textual units are paraphrases of each other), (2) extraction (i.e. to extract paraphrase instances from a thesaurus or a corpus), and (3) generation (i.e. to generate a reference paraphrase given a source text) (Madnani and Dorr, 2010)."]} diff --git a/edge/graph_54590742.jsonl b/edge/graph_54590742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54593434.jsonl b/edge/graph_54593434.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69d067383f1940440caa940eab4b3be5197ee5dc --- /dev/null +++ b/edge/graph_54593434.jsonl @@ -0,0 +1,3 @@ +{"22345699|13916820": []} +{"22345699|5551880": []} +{"22345699|207424517": ["As discussed in [1][2] have different security issues in cloud computing, deals with data security in this paper."]} diff --git a/edge/graph_54599825.jsonl b/edge/graph_54599825.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6a0d901725f3036df0afd1e76890134802277f7 --- /dev/null +++ b/edge/graph_54599825.jsonl @@ -0,0 +1,2 @@ +{"14480269|1230643": ["Keywords-wireless sensor networks; connectivity; nearest neighbor nodes; critical transmitting range; contact distribution function\nI. INTRODUCTION\nThe research in wireless sensor networks (WSNs) has attracted a lot of attention in recent years."]} +{"57127025|1236072": []} diff --git a/edge/graph_54609696.jsonl b/edge/graph_54609696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..761745e4d6fc743eca0c490914ffa96c62377f04 --- /dev/null +++ b/edge/graph_54609696.jsonl @@ -0,0 +1 @@ +{"36344184|62204132": []} diff --git a/edge/graph_54614224.jsonl b/edge/graph_54614224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8a3c8e10ff9a15141a817ad43ccddc4939ff730 --- /dev/null +++ b/edge/graph_54614224.jsonl @@ -0,0 +1,11 @@ +{"195428750|1230643": []} +{"16185925|1236072": []} +{"3988061|205286988": ["The energy-efficient routing protocols in WSN can be classified into three categories: data-centric protocols [5][7], location-based protocols [7][10] and hierarchical", "The idea proposed in LEACH has been an inspiration for many hierarchical routing protocols [2] [3][7][8][9].", "The main idea of hierarchical routing is to efficiently main\u00ad tain the energy consumption of sensor nodes by aggregating data and reducing transmissions[7].", "Using Power Efficient Gathering in Sensor Information Systems (PEGASIS) [7], the nodes are organized into a chain using the greedy algorithm so that each node transmits and re\u00ad ceives data from the nearest neighbor."]} +{"30086349|1230643": ["Most known applications are target tracking, habitat monitoring, surveillance and security [1][3]."]} +{"22632531|205286988": ["As mentioned in [3] and [4], nodes have typically low mobility and are limited in capabilities, energy supply and bandwidth."]} +{"7038467|205286988": ["Proposed protocols can be classified into data-centric, hierarchical, location-based, network flow and QoS-aware routing [ 6 ]."]} +{"16560511|12817488": ["Cluster based data aggregation [2, 3] is addressed by many researchers."]} +{"16759498|1236072": ["Routing or forwarding of data packets in WSNs can be divided into three categories [28]: flat-based routing, hierarchical-based routing, and location-based routing."]} +{"16759498|1230643": ["Recent development in Micro-Electro-Mechanical Systems (MEMS) has made the deployment of small size sensor nodes possible and inexpensive [1-2]."]} +{"16554947|1236072": ["Various network architectures and protocols have been developed for organizing the energy to function efficiently [2,3,4,5]."]} +{"16554947|1230643": []} diff --git a/edge/graph_54617183.jsonl b/edge/graph_54617183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee63fa8ed1c16fa8ddca53a422b0bc75b3a476fb --- /dev/null +++ b/edge/graph_54617183.jsonl @@ -0,0 +1,5 @@ +{"9896215|15849973": ["In large scale cloud storage system, data nodes are heterogeneous, with different types of disks, network bandwidth, CPU speed, etc., so the maximal number of sessions that a data node can support is different.", "Too much replicas may not significantly improve availability, but bring unnecessary spending instead."]} +{"15154594|9104850": ["The performance objective is to minimize the total access cost by considering both transmission cost and transcoding cost."]} +{"40979173|2254944": ["It offers computing as a utility, sharing resources of scalable data centers [1,2]."]} +{"27306371|10559330": []} +{"17994448|7800459": ["A code minimizing the repair bandwidth when a chunk gets erased is called a minimum-bandwidth regenerating (MBR) code [22]."]} diff --git a/edge/graph_54623860.jsonl b/edge/graph_54623860.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54627922.jsonl b/edge/graph_54627922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54636584.jsonl b/edge/graph_54636584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54642904.jsonl b/edge/graph_54642904.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdb7d33ceca9c01bcd7f8be501ea4a715c3384f6 --- /dev/null +++ b/edge/graph_54642904.jsonl @@ -0,0 +1,2 @@ +{"771112|530484": ["Recently, Michailovich et al. [20] proposed an active contour model using the Bhattacharyya difference between the intensity distributions inside and outside a contour."]} +{"1882133|192934": ["Amongst them, Gaussian mixture model (GMM) [11], [12] is a well-known method that has been widely used as a tool for image segmentation."]} diff --git a/edge/graph_54644916.jsonl b/edge/graph_54644916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54646014.jsonl b/edge/graph_54646014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..05668a0222abc655c199fd97e8ad4d491466a560 --- /dev/null +++ b/edge/graph_54646014.jsonl @@ -0,0 +1 @@ +{"24845412|4621813": ["[24] carried out an empirical comparison of community detection algorithms for undirected graphs while [25] compared algorithms to discover overlapping communities, i."]} diff --git a/edge/graph_54648873.jsonl b/edge/graph_54648873.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54655022.jsonl b/edge/graph_54655022.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..524d32b4410683b6d226db7ac55cf69d1bc4e255 --- /dev/null +++ b/edge/graph_54655022.jsonl @@ -0,0 +1,2 @@ +{"55859660|14789709": []} +{"12721857|7147372": ["There are also in-depth examples of innovatory use in technology-rich environments but little research concerning integration with established practice in mainstream schools (see the extensive review by Mumtaz 2000).", "Change is likely to be limited without guidance of this kind, and without taking account of teachers\u2019 own theories about teaching and learning which are central to integration (Mumtaz 2000)."]} diff --git a/edge/graph_54656716.jsonl b/edge/graph_54656716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a847f01b56dab56ee1f255cbf5699caebfd09894 --- /dev/null +++ b/edge/graph_54656716.jsonl @@ -0,0 +1,2 @@ +{"44909930|60455": []} +{"16507253|60455": ["In the recent years, there has been much research on Web usage mining [3,4,5,6,7,8,9,10,11,12,13,14,15,16]."]} diff --git a/edge/graph_54665219.jsonl b/edge/graph_54665219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d9d3e0bb14449e166c6cd6a57941afc2a062c98b --- /dev/null +++ b/edge/graph_54665219.jsonl @@ -0,0 +1 @@ +{"116718988|12083425": ["The new developments in power electronics are producing photovoltaic inverters that are smaller and more efficient [3]."]} diff --git a/edge/graph_54686277.jsonl b/edge/graph_54686277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54702007.jsonl b/edge/graph_54702007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54710101.jsonl b/edge/graph_54710101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62c2e1506611f898259d8629bf5e9f636f716f97 --- /dev/null +++ b/edge/graph_54710101.jsonl @@ -0,0 +1,9 @@ +{"6033936|11139156": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"6033936|205435103": ["The process and outcome associated with each step parallel those of primary research and are exemplified with the eight systematic reviews that were categorized as thematic synthesis in a tertiary study [15] of synthesis in SE [2][4][30][31][32][41] [43][44]."]} +{"6198785|15093118": ["The optical flow was also proposed to analyze road scenes [9], [118].", "The framework of vehicle tracking and behavior analysis [9].", "sure dynamics and motion characteristics and to predict and estimate the upcoming position of vehicles [9].", "Key developments on vehicle detection were summarized in [9] and [101].", "Haar features are sensitive to vertical, horizontal, and symmetric structures [9].", "Compared with Radar and LiDAR, the raw measurement of vision sensor is the light intensity [9].", "The vehicle detection methods can be categorized into appearance-based and motionbased [9]."]} +{"6198785|206739910": ["As the detection step is coupled with the feature extraction step, the choice of detection method depends on the features from the previous stage [63].", "Results for detection with these data sets and tracking are presented in [63] and [64]."]} +{"37762230|39174599": []} +{"10244629|3330313": []} +{"206592484|456491": []} +{"4055261|17292349": ["[27], McMinn et al."]} +{"4055261|14920988": []} diff --git a/edge/graph_54715522.jsonl b/edge/graph_54715522.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54725813.jsonl b/edge/graph_54725813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54732044.jsonl b/edge/graph_54732044.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5473785.jsonl b/edge/graph_5473785.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54746333.jsonl b/edge/graph_54746333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5476476.jsonl b/edge/graph_5476476.jsonl similarity index 100% rename from graph_5476476.jsonl rename to edge/graph_5476476.jsonl diff --git a/edge/graph_54765335.jsonl b/edge/graph_54765335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54768332.jsonl b/edge/graph_54768332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..514077725be1d9068faed862ef60b3fc15b6b893 --- /dev/null +++ b/edge/graph_54768332.jsonl @@ -0,0 +1,2 @@ +{"110667124|10741988": ["Numerical topological optimization is a disruptive technology which allows the modeling of really innovative shapes, based on trade knowledge [25]."]} +{"138686315|35426346": []} diff --git a/edge/graph_54775665.jsonl b/edge/graph_54775665.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54776223.jsonl b/edge/graph_54776223.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5477683.jsonl b/edge/graph_5477683.jsonl similarity index 100% rename from graph_5477683.jsonl rename to edge/graph_5477683.jsonl diff --git a/edge/graph_54778014.jsonl b/edge/graph_54778014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ece456e121222121627dfa8d533a358431d32329 --- /dev/null +++ b/edge/graph_54778014.jsonl @@ -0,0 +1 @@ +{"55654613|54778014": []} diff --git a/edge/graph_54794456.jsonl b/edge/graph_54794456.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54807440.jsonl b/edge/graph_54807440.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d79e4728d963b1c9fc04d2dfb22bc61c9afedd1 --- /dev/null +++ b/edge/graph_54807440.jsonl @@ -0,0 +1,2 @@ +{"31197496|8363289": []} +{"229853|873842": ["Zelinsky [15] increases efficiency by using a quad-tree [ 131 to represent free and obstacle space, thus reducing the number of states to search in the planning space."]} diff --git a/edge/graph_54809810.jsonl b/edge/graph_54809810.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f72095d1ed6b37dbd170fdb0beb61e2b5ce7cbc1 --- /dev/null +++ b/edge/graph_54809810.jsonl @@ -0,0 +1 @@ +{"8841451|2835258": ["The former algorithm is a DTN variation of existing location-based greedy algorithms [11, 12] where the packet is forwarded to the neighbour that is closest to the destination (if closer than the position of the current carrier).", "A number of existing geographic routing protocols are available [13, 12]."]} diff --git a/edge/graph_54816547.jsonl b/edge/graph_54816547.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54821821.jsonl b/edge/graph_54821821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5482493.jsonl b/edge/graph_5482493.jsonl similarity index 100% rename from graph_5482493.jsonl rename to edge/graph_5482493.jsonl diff --git a/edge/graph_54826015.jsonl b/edge/graph_54826015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2c5ac6663af05a2fbb443a6b9b21bb8e160e708 --- /dev/null +++ b/edge/graph_54826015.jsonl @@ -0,0 +1 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} diff --git a/edge/graph_54836648.jsonl b/edge/graph_54836648.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54848009.jsonl b/edge/graph_54848009.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54853072.jsonl b/edge/graph_54853072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b85e026a3796118d8b6fc20b5a9758b428584e80 --- /dev/null +++ b/edge/graph_54853072.jsonl @@ -0,0 +1,5 @@ +{"6674407|192934": []} +{"17472379|61451747": ["Machine learning has contributed tremendously to the development of these technologies, especially for deriving semantic level indices, and it is accelerating the progress in content-based image and video retrieval research ( Smeulders, Worring, Santini, Gupta, & Jain, 2000 ), ( Flickner et al, 1995 ), ( Greetha & Narayanan, 2008 )."]} +{"17472379|14088200": ["This is known as a multi-modal approach (Babaguchi, Ishida, & Morisawa, 2004), (Calic, Campbell, Dasiopoulou, & Kompatsiaris, 2005), (Bruno, Moenne-Loccoz, Marchand-Maillet, 2008), (Sudha, Shalabh, Basavaraja, Sridhar, 2008) and is necessary for overcoming the limitation when we use only one type\u2026", "Multimodal approaches have been presented by several researchers including (Babaguchi, Ishida, & Morisawa, 2004), (Calic, Campbell, Dasiopoulou, & Kompatsiaris, 2005), (Bruno, Moenne-Loccoz, Marchand-Maillet, 2008) and (Sudha, Shalabh, Basavaraja, Sridhar, 2008)."]} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"14088200|16766019": ["A rough categorization of data-driven approaches in the literature yields two main classes [42]."]} diff --git a/edge/graph_54857887.jsonl b/edge/graph_54857887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54864942.jsonl b/edge/graph_54864942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aef92acb27860e0bc0c3593b3e419ce0463417d0 --- /dev/null +++ b/edge/graph_54864942.jsonl @@ -0,0 +1,2 @@ +{"7191442|10287248": ["An extensive survey on QoSR can be found in [2], [21]."]} +{"15626170|1252121": ["First, it overcomes some of the most important limitations imposed by BGP [9].", "To derive a practical estimation of the size of this AR, let us compare this latter against the number of active entries in the BGP Forwarding Information Base (FIB) of the border routers in a Tier-1 ISP.", "First, it overcomes some of the mos t important limitations imposed by BGP [10] 4.", "In the current IGP/BGP routing context, a major issue is that the PCE in the source domain has to compute inter-domain LSPs based on a very limited visibility of the topology and state of the network, yielding solutions that are far from optimal.", "For example, it allows to advertise multiple routes per destination prefix, and to convey path state information in the routing advertisements, which cannot be done at present with BGP-4.", "In addition, the availability of inter-domain paths is inferred directly from the BGP routing information.", "In this paper we study a PCE-based architecture that is completely decoupled from the BGP protocol.", "At present, these border routers have around 2x10 5 active entries in their BGP FIB [14], and this scale does not represent an issue for the routers.", "First, solving problem 2DP restricted to the AS-path selected by BGP will frequently return paths that are far from optimal.", "Second, this approach can be incrementally deployed since it can coexist with the legacy IP IGP/BGP routed traffic.", "This is because BGP does not offer any guarantee about the quality of the chosen AS-path.", "On the other hand, the aggregated topology, reachability, and path state information needed to compute the routing paths are decoupled from BGP and advertised directly between the PCEs [8].", "They assume that the AS-level path was previously computed by BGP at the source domain and that both disjoint paths belong to the same \" chain \" of domains ."]} diff --git a/edge/graph_54878689.jsonl b/edge/graph_54878689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ccaa137a60ebf4fbaf12aa537d867ade07fad0e --- /dev/null +++ b/edge/graph_54878689.jsonl @@ -0,0 +1 @@ +{"13358011|35897447": ["\u2026early contributions mostly adopted a Market Based View (Porter and Millar, 1985; Bakos and Treacy, 1986), more current work recognises a Resource Based View as a more substantiate way to explain sustainable competitive advantage (Mata et al., 1995; Wade and Hulland, 2004; Piccoli and Ives, 2005).", "While early contributions mostly adopted a Market Based View (Porter and Millar, 1985; Bakos and Treacy, 1986), more current work recognises a Resource Based View as a more substantiate way to explain sustainable competitive advantage (Mata et al., 1995; Wade and Hulland, 2004; Piccoli and Ives, 2005 )."]} diff --git a/edge/graph_54889374.jsonl b/edge/graph_54889374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54895426.jsonl b/edge/graph_54895426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54897292.jsonl b/edge/graph_54897292.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3c5b73f3cd10ba36837fae1575a5d5e700497ca --- /dev/null +++ b/edge/graph_54897292.jsonl @@ -0,0 +1,2 @@ +{"62145540|3102110": ["There is some agreement in the literature on what quali es as a \\pattern\" (association rules and correlations [1, 7, 14] as well as clustering of the data points [8], are some common classes of patterns sought), but only disjointed discussion of what \\interesting\" means."]} +{"62145540|2762290": ["\u2026get M clusters in a training image and corresponding pixels in image (cid:1840) (cid:3043) , which M is determined by number of clusters, at the same time, we will get the number of pixels in every cluster and we can obtain the prototype frequency: Where (cid:1862) is the (cid:1862) -th image in ."]} diff --git a/edge/graph_54901211.jsonl b/edge/graph_54901211.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20e4dca1e8b88ed8e1197029997eb5387b2da0b1 --- /dev/null +++ b/edge/graph_54901211.jsonl @@ -0,0 +1 @@ +{"10349324|8253022": []} diff --git a/edge/graph_54907418.jsonl b/edge/graph_54907418.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54908630.jsonl b/edge/graph_54908630.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54917424.jsonl b/edge/graph_54917424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54926787.jsonl b/edge/graph_54926787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27fba6695e5029d2751b5a33fd48c2dd446c4fab --- /dev/null +++ b/edge/graph_54926787.jsonl @@ -0,0 +1,10 @@ +{"15207030|14889616": ["However, the SVC extension of H.264 allows efficient temporal, spatial and quality scalabilities [3]."]} +{"15207030|3540699": ["This is achievable using advanced coding techniques, such as multiple reference frames and generalized B-pictures that exploit redundancies over longer time horizons as well as Intra picture prediction of macro blocks that exploits spatial redundancies in a given video frame [2]."]} +{"26558448|14889616": ["For a more indepth overview of the SVC specification, we refer the reader to [17]."]} +{"40742569|2457428": []} +{"9898110|14889616": ["264/ MPEG4-AVC [4], [5] offers a significantly improved bit rate, distortion and complexity trade-off as described in this paper.", "264/MPEG4-AVC specifies three profiles for scalable video coding [4], [5]: Scalable Baseline, Scalable High, and Scalable High Intra profile."]} +{"9898110|3540699": ["264/MPEG4-AVC [6] provides a significantly increased flexibility for temporal scalability because of its reference picture memory control."]} +{"14889616|3540699": ["For more detailed information about H.264/AVC, the reader is referred to the standard [6] or corresponding overview papers [23]\u2013[26] While the VCL creates a coded representation of the source content, the NAL formats these data and provides header information in a way that enables simple and\u2026"]} +{"1227881|14889616": []} +{"5706284|7439310": ["Due to the best effort nature of the Internet, packet loss is inevitable, thereby having a signi\ufb01cant impact on the perceptual quality of video streams Error control [Wang and Zhu 1998] was proposed to ensure a smooth video streaming experience to the users, even with the presence of packet losses."]} +{"19577067|14889616": ["264/AVC with temporal, resolution, and quality scalability [15]."]} diff --git a/edge/graph_54934748.jsonl b/edge/graph_54934748.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54936568.jsonl b/edge/graph_54936568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33b9369a09d3a434c98f51866d766ab4d48af18d --- /dev/null +++ b/edge/graph_54936568.jsonl @@ -0,0 +1,6 @@ +{"1050958|9913343": ["[1] Xiaoyuan Suo, Ying Zhu G.", "They also tried to answer two important questions: \u201cAre graphical passwords as secure as text-based passwords?\u201d; \u201cWhat are the major design and implementation issues for graphical passwords?\u201d This survey will be useful for information security researchers and practitioners who are interested in finding an alternative to text-based authentication methods [1].", "On the other hand, if a password is hard to guess, then it is often hard to remember [1].", "Much more research and user studies are needed for graphical password techniques to achieve higher levels of maturity and usefulness [1]."]} +{"16060193|9913343": ["Here we briefly exam some of the possible techniques for breaking graphical passwords and try to do a comparison with text-based passwords [ 1 , 3, 5]. 1) Brute force search: The brute force search attempts to test all possible passwords until finding the correct key.", "The estimate criterions of graphical password authentication scheme include its security, usability, reliability and availability [ 1 , 2, 5]. 1) Security: The security is the most important and basic request for authentication scheme.", "Graphical password schemes have been proposed as a possible alternative to text-based schemes, partially because of the fact that humans can remember pictures better than texts [ 1 ]."]} +{"17930331|9913343": ["The motivation for graphical authentication is that people remember images better than text [5], [6].", "In this paper we give a brief description and classification of different graphical password schemes followed by information about vulnerabilities in the various schemes and recommendations for future development.", "Keywords: graphical user authentication, graphical password"]} +{"2880794|16527482": []} +{"2880794|1669837": []} +{"2880794|9913343": ["Another limitation of this system is that it cannot be used by those people who are face-blind [6].", "In addition a user chosen password might be easily guessable [6].", "Many researchers have attempted to solve this problem by providing different techniques [6].", "Another common problem with graphical passwords is that it takes longer to input graphical passwords than textual passwords [6].", "Another problem with these schemes is that it is difficult to input a password through a keyboard, the most common input device; if the mouse doesn\u2019t function well or a light pen is not available, the system cannot work properly [6]."]} diff --git a/edge/graph_54937186.jsonl b/edge/graph_54937186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54940806.jsonl b/edge/graph_54940806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54941190.jsonl b/edge/graph_54941190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fc32530c4ee7683cedb83e48cc45d8e3cb4855b --- /dev/null +++ b/edge/graph_54941190.jsonl @@ -0,0 +1,13 @@ +{"60922562|5660618": []} +{"5726087|18986679": []} +{"5726087|3102110": []} +{"206892965|1708582": ["Many algorithms have been proposed that select actions in order to explore the environment, and gradually build a strategy that tends to obtain a maximum reward [14,15]."]} +{"41021084|10739218": []} +{"37717750|6415369": []} +{"15473593|14047190": ["ANN\u2019s have a proven track record in pattern recognition (Kulkarni et al., 1998), and there ability to learn offers an approach to aid both feature recognition and process planning task."]} +{"62638669|6952653": ["Wooldridge and Jennings (1995) contend that an agent system should be composed of social ability and reactivity."]} +{"9172085|3102110": []} +{"42192915|10739218": []} +{"22554416|3102110": ["; and bF: A large number of efficient algorithms for mining association rules have been proposed [27].", "Data mining has been well recognized for decision support by efficient knowledge discovery of previously unknown and potentially useful patterns of information from past data [27].", "Association rule mining is one of the major forms of data mining and is perhaps the most common form of knowledge discovery in unsupervised learning systems [27]."]} +{"39049045|8530790": []} +{"205293455|8530790": []} diff --git a/edge/graph_54949635.jsonl b/edge/graph_54949635.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..02f8d2e9c69682ed3a03750c511aef8cc1eba75c --- /dev/null +++ b/edge/graph_54949635.jsonl @@ -0,0 +1,2 @@ +{"10955890|12904520": ["However, this trend has also led to increased power consumption and demands on electricity supply [1]."]} +{"206486845|206459491": ["1 shows the modern IC production life-cycle phases: specification, design, fabrication (including interfacing, masking, wafer fabrication and assembly, and packaging), testing and deployment [3]\u2013[6]."]} diff --git a/edge/graph_54949759.jsonl b/edge/graph_54949759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54962714.jsonl b/edge/graph_54962714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54974489.jsonl b/edge/graph_54974489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60d9e9c1aeffeedf4fa7c4202299d730ecd172dc --- /dev/null +++ b/edge/graph_54974489.jsonl @@ -0,0 +1,7 @@ +{"39956841|44461432": []} +{"13088434|14074802": ["[33] investigate ten resource description framework (RDF)-based matching frameworks and compared their functionalities based on a common set of criteria."]} +{"13088434|1520906": []} +{"57042342|35697345": []} +{"57042342|17670369": []} +{"57042342|39635018": []} +{"57042342|17403085": []} diff --git a/edge/graph_54989443.jsonl b/edge/graph_54989443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54991791.jsonl b/edge/graph_54991791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_54997534.jsonl b/edge/graph_54997534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5499953.jsonl b/edge/graph_5499953.jsonl similarity index 100% rename from graph_5499953.jsonl rename to edge/graph_5499953.jsonl diff --git a/edge/graph_55000262.jsonl b/edge/graph_55000262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55013203.jsonl b/edge/graph_55013203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55027565.jsonl b/edge/graph_55027565.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adee0e9f720b4b824becc0774cd73fcb7eeaa09f --- /dev/null +++ b/edge/graph_55027565.jsonl @@ -0,0 +1,2 @@ +{"51684684|55027565": ["Problems in finance that make use of machine learning may benefit from quantum machine learning.(10) A quantum computer may also be used to optimize the risk-return of portfolios and sample from the optimal portfolio."]} +{"64536201|14617477": ["As will be seen throughout the review, there are quantum algorithms for machine learning that exhibit quantum speedups [4, 5, 6, 7]."]} diff --git a/graph_5503545.jsonl b/edge/graph_5503545.jsonl similarity index 100% rename from graph_5503545.jsonl rename to edge/graph_5503545.jsonl diff --git a/edge/graph_55037157.jsonl b/edge/graph_55037157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55039831.jsonl b/edge/graph_55039831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d8d59e74b92a7028c8d76b0894fa8f152392f11 --- /dev/null +++ b/edge/graph_55039831.jsonl @@ -0,0 +1,2 @@ +{"154208271|55039831": []} +{"31728720|55039831": []} diff --git a/edge/graph_55041325.jsonl b/edge/graph_55041325.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55050212.jsonl b/edge/graph_55050212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55052548.jsonl b/edge/graph_55052548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..991960d3e1502d49bb90c1fe1a44048688cca6ce --- /dev/null +++ b/edge/graph_55052548.jsonl @@ -0,0 +1,4 @@ +{"205128360|53531807": []} +{"88523583|55052548": [", Wallin and Bolin, 2015). Lindgren et al. (2011) showed that, if 2\u03b2 \u2208 N, one can construct accurate approximations of the form (1.", "Due to the implementation in the R-INLA software, this approach has become widely used, see (Bakka et al., 2018) for a comprehensive list of recent applications. However, the restriction 2\u03b2 \u2208 N implies a significant limitation for the flexibility of the method. In particular, it is therefore not directly applicable to the important special case of exponential covariance (\u03bd = 1/2) on R(2), where \u03b2 = 3/4. In addition, restricting the value of \u03b2 complicates estimating the smoothness of the process from data. In fact, \u03b2 typically is fixed when the method is used in practice, since identifying the value of 2\u03b2 \u2208 N with the highest likelihood requires a separate estimation of all the other parameters in the model for each value of \u03b2. A common justification for fixing \u03b2 is to argue that it is not practicable to estimate the smoothness of a random field from data. However, there are certainly applications for which it is feasible to estimate the smoothness. We provide an example of this in \u00a77. Furthermore, having the correct smoothness of the model is particularly important for interpolation, and the fact that the Mat\u00e9rn model allows for estimating the smoothness from data was the main reason for why Stein (1999) recommended the model. The rational SPDE approach presented in this work facilitates an estimation of \u03b2 from data by providing an approximation of u which is computable for all fractional powers \u03b2 > d/4 (i.e., \u03bd > 0), where d \u2208 N is the dimension of the spatial domain D \u2282 R. It thus enables to include this parameter in likelihoodbased (or Bayesian) parameter estimation for both stationary and non-stationary models. Although the SPDE approach has been considered in the non-fractional case also for non-stationary models, Lindgren et al. (2011) showed convergence of the approximation only for the stationary model (1.", "(2015), and the barrier models by Bakka et al. (2019). Thus, Proposition 3.", "Due to the implementation in the R-INLA software, this approach has become widely used, see (Bakka et al., 2018) for a comprehensive list of recent applications. However, the restriction 2\u03b2 \u2208 N implies a significant limitation for the flexibility of the method. In particular, it is therefore not directly applicable to the important special case of exponential covariance (\u03bd = 1/2) on R(2), where \u03b2 = 3/4. In addition, restricting the value of \u03b2 complicates estimating the smoothness of the process from data. In fact, \u03b2 typically is fixed when the method is used in practice, since identifying the value of 2\u03b2 \u2208 N with the highest likelihood requires a separate estimation of all the other parameters in the model for each value of \u03b2. A common justification for fixing \u03b2 is to argue that it is not practicable to estimate the smoothness of a random field from data. However, there are certainly applications for which it is feasible to estimate the smoothness. We provide an example of this in \u00a77. Furthermore, having the correct smoothness of the model is particularly important for interpolation, and the fact that the Mat\u00e9rn model allows for estimating the smoothness from data was the main reason for why Stein (1999) recommended the model.", "Due to the implementation in the R-INLA software, this approach has become widely used, see (Bakka et al., 2018) for a comprehensive list of recent applications."]} +{"199086902|55052548": []} +{"88522802|55052548": []} diff --git a/edge/graph_55065887.jsonl b/edge/graph_55065887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c14c09064a53c6bcf555e8a2d67e2b13b7d53681 --- /dev/null +++ b/edge/graph_55065887.jsonl @@ -0,0 +1 @@ +{"12949316|1236072": []} diff --git a/edge/graph_55068416.jsonl b/edge/graph_55068416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdc33682e932f3cc063d2296b1eebf79b4cced02 --- /dev/null +++ b/edge/graph_55068416.jsonl @@ -0,0 +1,2 @@ +{"18296737|4269723": []} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} diff --git a/edge/graph_55084490.jsonl b/edge/graph_55084490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d4e7f12f0318fadfc45fe47a74e1c91410ca615 --- /dev/null +++ b/edge/graph_55084490.jsonl @@ -0,0 +1,2 @@ +{"8189220|11089739": ["Notable cases are DBpedia, GeoWordNet and GeoNames25 [7,17,41].", "Notable cases are DBpedia, GeoWordNet, and GeoNames25 [7, 41, 17]."]} +{"2591229|1113420": ["An entity is a person, place, or object that is considered relevant to the interaction between the user and the application, including the user and the applications itself [ 19 ]."]} diff --git a/edge/graph_55088738.jsonl b/edge/graph_55088738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55090820.jsonl b/edge/graph_55090820.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67a4f0854390f842a7cace60c2f2b61241ecce0a --- /dev/null +++ b/edge/graph_55090820.jsonl @@ -0,0 +1,2 @@ +{"5757900|33583074": ["The reader is referred to Malan and Engelbrecht [1], [3] for a more detailed explanation."]} +{"24917082|15485264": []} diff --git a/edge/graph_55097177.jsonl b/edge/graph_55097177.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55100646.jsonl b/edge/graph_55100646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b14ab1fed3e59c9901552c955f218ee36d5a7be0 --- /dev/null +++ b/edge/graph_55100646.jsonl @@ -0,0 +1,3 @@ +{"7690873|12860838": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down."]} +{"7690873|10500613": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down."]} +{"7690873|913718": ["As evaluations of the recent years indicate, the \ufb01eld of ontology matching has made a measurable improvement, the speed of which is albeit slowing down.", "There have been different formalizations of the matching operation and its result [11, 14, 19\u201321]."]} diff --git a/edge/graph_55101710.jsonl b/edge/graph_55101710.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f17b67e7b7953261d0b1c8fb5424792282a89dc --- /dev/null +++ b/edge/graph_55101710.jsonl @@ -0,0 +1,12 @@ +{"35810751|18540015": []} +{"32075574|1805048": []} +{"34645985|1805048": ["\u2026approaches in the recommender systems (Javari & Jalili, 2014a; Bojnordi & Moradi, 2013; Adomavicius & Tuzhilin, 2005; Gharibshah & Jalili, 2014; Herlocker, Konstan, Terveen, & Riedl, 2004; Ramezani, Moradi, & Akhlaghian, 2014; Yu, Schwaighofer, Tresp, Xu, & Kriegel, 2004; Su & Khoshgoftaar, 2009).", "Several model-based methods have been proposed in the literature including: Bayesian belief nets (Miyahara & Pazzani, 2000; Su & Khoshgoftaar, 2009), dimensionality reduction techniques (Goldberg, Roeder, Gupta, & Perkins, 2001), clustering models (Javari & Jalili, 2014a; Birtolo & Ronca, 2013;\u2026"]} +{"196070511|3202525": ["A survey of context-aware recommender systems, which use technology-enhanced learning technologies, may be found in [612]."]} +{"196070511|14148655": ["Surveys of preference elicitation methods and critiquing may be found in [148, 149]."]} +{"196070511|4859605": ["A survey of tagging recommender systems is provided in [671], although most of the works discussed in this survey do not use a ratings matrix for the recommendation process."]} +{"196070511|8125630": ["A nice way of viewing this generalization is as an online analytical processing (OLAP) data cube [145], which is traditionally used in data warehousing."]} +{"196070511|1805048": ["Detailed surveys and books on the topic may be found in [5, 46, 88, 275, 291, 307, 364, 378, 505, 529, 570].", "More recent surveys may be found in [88, 378, 570]."]} +{"7041031|1805048": ["Though many studies provide rich evidence on the successful performance of collaborative filtering algorithms, there are still some shortcomings such as data sparsity and cold-start problems [9]."]} +{"700267|8125630": []} +{"51734399|1805048": ["There has been a good deal of research over the last 20 years on how to automatically recommend things to people and a wide variety of methods have been proposed [1, 140]."]} +{"22151625|6462262": ["Several approaches have been proposed in literature for topic hierarchies construction, such as algorithms based on term-clustering [18], [19] and clustering labeling [17]."]} diff --git a/graph_5510374.jsonl b/edge/graph_5510374.jsonl similarity index 100% rename from graph_5510374.jsonl rename to edge/graph_5510374.jsonl diff --git a/edge/graph_55108021.jsonl b/edge/graph_55108021.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0fdf6e16f2c53ce36acb0492bf88a29f98e3dd2d --- /dev/null +++ b/edge/graph_55108021.jsonl @@ -0,0 +1 @@ +{"2816626|17718674": []} diff --git a/edge/graph_55110821.jsonl b/edge/graph_55110821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57ecbe527da111ce9da26c194ed2f580f9c25c3b --- /dev/null +++ b/edge/graph_55110821.jsonl @@ -0,0 +1,3 @@ +{"10310014|206583375": ["A survey of the potential technologies for indoor navigation for personal applications is provided in [81], where the authors describe techniques based on wireless communication, infrared, sound positioning and others and they compare their performance."]} +{"35527659|1503157": []} +{"166704982|35426346": []} diff --git a/edge/graph_55111989.jsonl b/edge/graph_55111989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b7db2981207e1cd35f97d15e6e15b6b0640e148 --- /dev/null +++ b/edge/graph_55111989.jsonl @@ -0,0 +1,3 @@ +{"23020122|386036": ["It relies on the assumption that duplicated vectors will be close in the sorted list and have the same offset, therefore will be compared during the detection steps[7]."]} +{"113987206|55111989": []} +{"6911460|3732796": []} diff --git a/edge/graph_551238.jsonl b/edge/graph_551238.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55130357.jsonl b/edge/graph_55130357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55135976.jsonl b/edge/graph_55135976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8a85bb7aac3fdd9cd945c4a523d6198fe76654d --- /dev/null +++ b/edge/graph_55135976.jsonl @@ -0,0 +1 @@ +{"111149246|5342321": []} diff --git a/edge/graph_55142036.jsonl b/edge/graph_55142036.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9c14adc711afeb9a5b279be20eb1ce93534ff4e --- /dev/null +++ b/edge/graph_55142036.jsonl @@ -0,0 +1,12 @@ +{"6228422|14441987": ["Zhao Jindong, Liang Zhenjun, Zhao Yaopei T 978-1-4244-3608-8/09/$25.00 \u00a9 2009 IEEE. working in such network that the nodes are moving [9]."]} +{"29096373|1230643": ["The deployment of large numbers of these sensors and actuators resulted in the development of wireless sensor networks (WSNs) [7]."]} +{"29096373|905827": ["faults, winding thermal protection, and other related faults [1], [2], [11], [12].", "To develop advanced methods that can monitor motor failures at an early stage, advanced modeling and intelligent data processing techniques are commonly used, including motor modeling and analysis, system identification and optimization, pattern recognition, stochastic and statistical process, and digital signal processing methods [12]."]} +{"13212331|8618569": ["Recent developments in the field of Micro Electro Mechanical Systems (MEMS) and WSNs made low cost embedded IAS feasible [2] [3] [15]."]} +{"13212331|205286988": ["Recent developments in the field of Micro Electro Mechanical Systems (MEMS) and WSNs made low cost embedded IAS feasible [2] [3] [15].", "The reliability of the routing protocol has a direct influence on factors such as network dynamics, coverage, prolonging of the network life time, Packet Reception Rate (PRR), Quality of Service (QoS), fault tolerance and fairness [1][5][15].", "Today\u2019s fast growing competitive industries face growing demand to upgrade their processes for industry automation with improved productivity, efficiency and Quality at low cost [1][15]."]} +{"13212331|1230643": ["Recent developments in the field of Micro Electro Mechanical Systems (MEMS) and WSNs made low cost embedded IAS feasible [2] [3] [15]."]} +{"13212331|14441987": ["Proactive routing protocol is also known as table driven routing protocol [7]."]} +{"12694865|2509135": ["The spectrum sharing techniques described in [3], [4]."]} +{"41998167|15947359": ["technology, have enabled the use of video sensors and this resulted in a new class of WSNs, called visual or multimedia sensor networks [5,6], that can be used for various potential applications, such as telepresence and surveillance.", "Besides these, the availability of low-cost hardware and rapid development of tiny cameras and microphones have enabled a new class of WSNs: multimedia or visual wireless sensor networks [5,6] and this new class has contributed to new potential WSN applications, such as surveillance.", "It is certain that, these networks also have tighter QoS requirements, such as low data delay and maximum reliability, compared to traditional WSNs [6]."]} +{"41998167|270804": ["The reader can refer to [24\u201329] for QoS support at the network layer, and to [30\u201333] at the transport layer and to [34] for different layers."]} +{"41998167|10559330": ["In this context, reservationbased approaches, such as Integrated Services or IntServ [8], are widely used in providing QoS guarantees.", "IntServ model maintains service on a per-flow basis and can be considered as a reservation-based approach.", "1 shows the concepts of IntServ and DiffServ models discussed in this section.", "However, IntServ model has a number of disadvantages which makes it inappropriate for WSNs. Firstly, it is hard to provide guaranteed service quality due to time varying channel capacity on the wireless medium.", "Third, IntServ model requires a reliable in-band or out-of-band QoS signaling within the sensor network for resource reservation which is very hard to assure in WSNs.\nDiffServ model maintains service on a per-packet basis and can be considered as a reservation-less approach.", "There are two service differentiation models proposed for conventional computer networks, Integrated services (IntServ) [8] and differentiated services (DiffServ) [16]."]} +{"10304038|1230643": ["The wireless sensor network (WSN) has emerged as a promising new communication network technology in the last ten years [3] [4]."]} diff --git a/edge/graph_55145799.jsonl b/edge/graph_55145799.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afecea33cf6d7ac88d5e6d2f1bebf20e401ed2a0 --- /dev/null +++ b/edge/graph_55145799.jsonl @@ -0,0 +1,5 @@ +{"117248575|18188725": []} +{"117248575|8516210": []} +{"117248575|17403085": []} +{"1033682|174797842": []} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} diff --git a/edge/graph_55155849.jsonl b/edge/graph_55155849.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc127d3b7bba19630eb133ef52d09f284e936c6e --- /dev/null +++ b/edge/graph_55155849.jsonl @@ -0,0 +1 @@ +{"41334950|14173838": ["From the binary image, we will calculate minutiae points [22], [16], [15], [14], [21], [23].", "The major problem is that, sometime a cryptographic key may not be generated properly because of different biometric fingerprint sensors [11], different orientation of captured biometric, different scaling or noisy sensor data [15]."]} diff --git a/edge/graph_55158584.jsonl b/edge/graph_55158584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4337b771852fa4b0fc90dfa8fe23e7ef58a2e2d3 --- /dev/null +++ b/edge/graph_55158584.jsonl @@ -0,0 +1 @@ +{"1715921|18148591": ["Especially, the multiple input multiple output (MIMO) technology, which relies on the use of adaptive digital beamforming at both ends of the communication link, provides extremely high spectral ef\ufb01ciencies [65] [66]."]} diff --git a/edge/graph_55162008.jsonl b/edge/graph_55162008.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aae20bbff16ca1292e2cef9605012ab82baa01b3 --- /dev/null +++ b/edge/graph_55162008.jsonl @@ -0,0 +1,6 @@ +{"62514453|3102110": []} +{"12767870|192934": ["This seems underconstrained, especially when rules of thumb suggest that one needs ten times more examples than features (Jain et al., 2000)."]} +{"32967418|10996225": ["Malicious code is one of the serious threats on the internet platform that is called malware [1].", "In the other research [1, 34], the authors proposed a data mining approach to analyze the students careers."]} +{"12691872|1176034": ["An excellent survey of temporal data mining can be found in (Roddick and Spiliopoulou 2002)."]} +{"776035|15986963": ["Recently, many postprocessing techniques [26], including rule pruning, rule ranking, and rule selection have been developed", "The reasons are 1) our proposed insignificant rule pruning approach actually includes redundant rule pruning; and 2) the lazy pruning method may lead to very large classifier [26], which would not fit for the malware detection system since it is time sensitive.", "However, there is often a huge number of rules generated in a classification association rule mining practice [26], [28]."]} +{"207288887|192934": ["Feature selection is important for many pattern classification systems [13,16,17]."]} diff --git a/edge/graph_55168801.jsonl b/edge/graph_55168801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e3d77a4a2a64347fbee7789faf4eafa3d405d10 --- /dev/null +++ b/edge/graph_55168801.jsonl @@ -0,0 +1,2 @@ +{"18056931|14441987": ["Ondemand routing protocols [ 22 ] construct and maintain routes only if they are needed."]} +{"6438719|14441987": []} diff --git a/edge/graph_55171053.jsonl b/edge/graph_55171053.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fd173fd86c3e8c724a0051cdc69200ae321d31d --- /dev/null +++ b/edge/graph_55171053.jsonl @@ -0,0 +1,4 @@ +{"17516613|7365537": ["A review of literature [2], [3], [4], shows various technology options for the design of an ILS which may be ultrasonic(US), infrared (IR), radio-frequency (RF) based systems which may be radio-frequency identification (RFID), received signal strength (RSS) of RF signals, Bluetooth, wireless local area network (WLAN), ultra-wideband (UWB), camera based vision analysis etc."]} +{"17516613|206583375": []} +{"9417644|6972141": ["A comprehensive survey of older works can be found in DeSouza and Kak [2]."]} +{"12162546|206583375": ["At a minimum, these algorithms must permit for accurate step counting, although many systems also require accurate step segmentation."]} diff --git a/edge/graph_55176020.jsonl b/edge/graph_55176020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa7c1366f01f56988393cf77e840075767d755ab --- /dev/null +++ b/edge/graph_55176020.jsonl @@ -0,0 +1,7 @@ +{"25310609|530484": []} +{"2002674|530484": ["Detailed reviews of recent developments in retrospective non-uniformity correction can be found in (Belaroussi et al., 2006; Hou, 2006; Styner and Leemput, 2005; Vovk et al., 2007)."]} +{"43348301|530484": ["Two different studies have recently reviewed different ways to overcome this preprocessing step problem [52,105].", "However, as pointed out by Hou [52], none of the methods has been shown to be superior to the others and exclusively applicable."]} +{"4767901|3644401": []} +{"986734|1262076": []} +{"20210437|530484": []} +{"10950711|206051485": ["Index Terms\u2014 Continuous model, image registration, interpolation artifacts, multimodality, mutual information, rigid.", "We will describe the model in one dimension here and extend the model to higher dimensions in Sections IV-B and IV-C."]} diff --git a/graph_5520398.jsonl b/edge/graph_5520398.jsonl similarity index 100% rename from graph_5520398.jsonl rename to edge/graph_5520398.jsonl diff --git a/edge/graph_55211828.jsonl b/edge/graph_55211828.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55222405.jsonl b/edge/graph_55222405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2aa7e1a934b538b05018bccec250b2560a3effa0 --- /dev/null +++ b/edge/graph_55222405.jsonl @@ -0,0 +1,2 @@ +{"52159731|9588126": []} +{"39646233|9588126": []} diff --git a/graph_5523008.jsonl b/edge/graph_5523008.jsonl similarity index 100% rename from graph_5523008.jsonl rename to edge/graph_5523008.jsonl diff --git a/edge/graph_55233555.jsonl b/edge/graph_55233555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9859b541778ee3099a51da1449b86172ef34cdd8 --- /dev/null +++ b/edge/graph_55233555.jsonl @@ -0,0 +1 @@ +{"109796994|1230643": []} diff --git a/edge/graph_55237332.jsonl b/edge/graph_55237332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e928809d2297b7b3d66fecc4339a922b3f8c0ac --- /dev/null +++ b/edge/graph_55237332.jsonl @@ -0,0 +1,10 @@ +{"18741728|6598584": ["\u2026set of approaches reference the concept of pattern classification, seeking to characterize the combination of activities among multiple voxels/regions to differentiate between experimental conditions (see (O'Toole et al. 2007; Pereira et al. 2009; Haxby 2012; Mahmoudi et al. 2012) for reviews)."]} +{"18741728|6116761": ["The most common approaches include dynamic causal modeling (DCM) (Friston 2011b; Friston et al. 2003, 2011, 2014; Penny et al. 2004, 2010; Lee et al. 2006; Stephan et al. 2007, 2008, 2010; Marreiros et al. 2008; Schuyler et al. 2010; Seghier et al. 2010; Daunizeau et al. 2011; Li et al. 2011; Lohmann et al. 2012), Granger causality analysis (Granger 1969; Goebel et al. 2003; Harrison et al. 2003; Roebroeck et al. 2005; Deshpande et al. 2009), structural equation modeling (SEM) (McIntosh and Gonzales-Lima 1994; Buchel and Friston 1997; Horwitz et al. 1999; Bullmore et al. 2000), psychophysiological interaction (Friston et al. 1997), graphical causal modeling (Pearl 2000; Spirtes et al. 2000), dynamic Bayesian networks (Rajapakse and Zhou 2007), and switching linear dynamic system (Smith et al. 2010); and have been actively employed in clinical studies to identify abnormal interactions in patients (e.g., Alzheimer's disease (Agosta et al. 2010; Rytsar et al. 2011; Liu et al. 2012; Neufang et al. 2014; Zhong et al. 2014), depression (Schlosser et al. 2008; Almeida et al. 2009; Goulden et al. 2010; Moses-Kolko et al. 2010; Hamilton et al. 2011; Iwabuchi et al. 2014; Liu et al. 2015), and schizophrenia (Schlosser et al. 2003; Kim et al. 2008; Benetti et al. 2009; Crossley et al. 2009; Dima et al. 2009; Allen et al. 2010; Diaconescu et al. 2011; Deserno et al. 2012; Guller et al. 2012; Mukherjee et al. 2012; Birnbaum and Weinberger 2013; Zhang et al. 2013; de la Iglesia-Vaya et al. 2014; Hutcheson et al. 2015)).", "Therefore, there have been growing efforts exploiting effective connectivity, the directed causal influence that one neuronal system exerts on another (see (Friston 2009; Friston 2011a; Poldrack et al. 2011; Valdes-Sosa et al. 2011; Stephan and Roebroeck 2012) for reviews).", "The most common approaches include dynamic causal modeling (DCM) (Friston 2011b; Friston et al. 2003, 2011, 2014; Penny et al. 2004, 2010; Lee et al. 2006; Stephan et al. 2007, 2008, 2010; Marreiros et al. 2008; Schuyler et al. 2010; Seghier et al. 2010; Daunizeau et al. 2011; Li et al. 2011;\u2026"]} +{"18741728|9431428": ["Briefly, this set of approaches reference the concept of pattern classification, seeking to characterize the combination of activities among multiple voxels/regions to differentiate between experimental conditions (see (O\u2019Toole et al. 2007; Pereira et al. 2009; Haxby 2012; Mahmoudi et al. 2012) for reviews).", "\u2026set of approaches reference the concept of pattern classification, seeking to characterize the combination of activities among multiple voxels/regions to differentiate between experimental conditions (see (O'Toole et al. 2007; Pereira et al. 2009; Haxby 2012; Mahmoudi et al. 2012) for reviews)."]} +{"5303478|6116761": ["The following section will not review these methods in detail due to limited space, and recent excellent reviews are available [12] [13] ."]} +{"122907607|7064380": []} +{"52011698|6116761": []} +{"5255094|9045705": []} +{"5255094|6116761": ["\u2026choices facing the researcher are the spatial scale most relevant for the analysis (single voxels versus voxel aggregates), and in the case of voxel aggregates the choice of howto combine voxels (parcellation based on prior anatomical knowledge, a data-driven approach, or a hybrid technique [20]).", "Notably, connectivity-based methods have had a prominent role in characterizing normal brain organization [1] as well as alterations due to various brain disorders [2]."]} +{"15783425|6116761": ["An important topic not extensively covered in this review concerns the role of network models for mapping causal dependencies among neural events, summarized as networks of \u2018effective connectivity\u2019 84 ."]} +{"12037841|6116761": []} diff --git a/edge/graph_55254760.jsonl b/edge/graph_55254760.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55256939.jsonl b/edge/graph_55256939.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4f535d57c969610b6d299bec93e4c10c76e06d1 --- /dev/null +++ b/edge/graph_55256939.jsonl @@ -0,0 +1 @@ +{"1479889|1708582": ["Our framework for MDPs is standard [8, 9]."]} diff --git a/edge/graph_55267683.jsonl b/edge/graph_55267683.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55278713.jsonl b/edge/graph_55278713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ff66650e44d09f9863fd6005f8ca974ae4f2f88 --- /dev/null +++ b/edge/graph_55278713.jsonl @@ -0,0 +1 @@ +{"28102891|192934": ["These methods provide suboptimal solution with a low computational cost and computational complexity [13]."]} diff --git a/edge/graph_55279959.jsonl b/edge/graph_55279959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55282560.jsonl b/edge/graph_55282560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91d8569a07795fe8ecf68e84bf8c2ce683414070 --- /dev/null +++ b/edge/graph_55282560.jsonl @@ -0,0 +1,7 @@ +{"41805224|11266709": []} +{"195933894|12572872": []} +{"195933894|11266709": []} +{"12572872|11266709": ["Nevertheless, head tracking is important as it is seen as a component of immersion [Bowman and McMahan 2007; Narayan et al. 2005] and as enhancing presence [Hendrix and Bar\ufb01eld 1995; Schuemie et al. 2001].", "Because despite a great amount of research there is still much unknown about presence [e.g., Cummings et al. 2012; Schuemie et al. 2001]."]} +{"13512836|12572872": ["The verbal estimates were generally overestimated by participants, which conflicts with previous similar experiments [42].", "Based on Renner et al\u2019s [42] review of distance perception experiments, the distances in the verbal estimation task are expected to be underestimated by approximately 26%.", "See the review by Renner et al [42] for an overview."]} +{"4530488|11266709": []} +{"6296092|2000518": ["edu input data: real-time command and control situation rooms displaying GPS tracked devices [27], utilizing Head-Mounted Displays (HMDs) for untethered large space exploration with real walking [15], and finally various augmented reality (AR) applications that may take place over a large physical space [29, 13]."]} diff --git a/edge/graph_55285189.jsonl b/edge/graph_55285189.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55299099.jsonl b/edge/graph_55299099.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55299227.jsonl b/edge/graph_55299227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55300654.jsonl b/edge/graph_55300654.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55302051.jsonl b/edge/graph_55302051.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e83e8626e36a92500c9b19b911f601991edce656 --- /dev/null +++ b/edge/graph_55302051.jsonl @@ -0,0 +1,3 @@ +{"17042877|118527236": []} +{"9155953|29068935": []} +{"18844490|14441987": ["Mobile Ad Hoc Networks (MANETs) [ 1 ] are networks in which all nodes are mobile and communicate with each other via wireless connections.", "For instance, if the pheromone is expressed using the number of hops as a measure of goodness, at each hop the backward ant increments an internal hop counter and uses the inverse of this value to locally assign the value i d which is used to update the pheromone variable T i nd as follows: T i nd = T i nd +(1 ) i d; 2 [0; 1 ]:"]} diff --git a/edge/graph_55306956.jsonl b/edge/graph_55306956.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55310624.jsonl b/edge/graph_55310624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..933e29d0f69ca0e2c370ea3ef557b455cdc6ff51 --- /dev/null +++ b/edge/graph_55310624.jsonl @@ -0,0 +1 @@ +{"10825052|816774": ["Krauter et al. surveyed a few existing Grid resource management systems in [ 14 ].", "Facing varying situations intelligent Grid environments need different scheduling policies and algorithms to handle different kinds of tasks [ 14 ].", "One interesting implementation method is to build job scheduling services on top of Grid middleware to meet the requirements of specific applications [ 14 ]."]} diff --git a/edge/graph_55315486.jsonl b/edge/graph_55315486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55316842.jsonl b/edge/graph_55316842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92bcf3e6a19444b5c88a42f9bb0900587000068f --- /dev/null +++ b/edge/graph_55316842.jsonl @@ -0,0 +1,3 @@ +{"14635907|16082889": ["Despite more than 30 years of handwriting recognition research [2], [3], [ 4 ], [5], developing a reliable, general-purpose system for unconstrained text line recognition remains an open problem."]} +{"14635907|15782139": []} +{"206592484|456491": []} diff --git a/edge/graph_55321026.jsonl b/edge/graph_55321026.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55329264.jsonl b/edge/graph_55329264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55331303.jsonl b/edge/graph_55331303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55331411.jsonl b/edge/graph_55331411.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5e07b8697874b03257b048ef5ece0d2f4c74dc2 --- /dev/null +++ b/edge/graph_55331411.jsonl @@ -0,0 +1 @@ +{"60950889|20528549": []} diff --git a/edge/graph_55333971.jsonl b/edge/graph_55333971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..091b4490fdb5b7e7ea2b81d6997b19141ec93a11 --- /dev/null +++ b/edge/graph_55333971.jsonl @@ -0,0 +1,10 @@ +{"15994653|9176080": []} +{"33238478|9176080": ["1 Overview of a data security system [12] Digital Watermarking System Applications Watermarking algorithms are application dependent."]} +{"33238478|55130357": []} +{"3336834|9176080": []} +{"36260358|14545307": []} +{"62697375|9176080": ["algorithm efficiency [19].", ", sphere) or extremely small-size models are not suitable for selection as cover models because the hidden data might be easily observed after even a very small modification by any embedding method [19].", "in to the fact that a malicious user cannot alter the embedded data without knowledge of the customization parameters but this is not true in case of every application because high robustness is basic parameter for good steganography and this weakness is inherited by the ABCDE algorithm also since its underlying framework is based on BPCS [19].", "They apply genetic algorithm based methodology by adjusting gray values of a cover-image while creating the desired statistic features to generate the stego images that can break the inspection of steganalytic systems Again authors in [19] mentioned that time", "This behavior makes adaptive steganography seek images with existing or deliberately added noise and images that demonstrate color complexity [19].", "In DWT based algorithms it should be noted that extracted payload may not be totally identical to the embedded version [19].", "The authors in [19] pointed out that some questions remain unanswered in [50] such as what happens when we have two peak points instead of one? On which", "also an excellent means of hiding data while maintaining a good perceptibility [19].", "both are always exactly identical [19] .", "correction algorithm, whilst interesting, still needs proof of generalization [19]."]} +{"15454576|8649087": ["Two groups of technologies have been identified with the purpose of discouraging unauthorized consumption and duplication: encryption and watermarking [ 1 ,2,3]."]} +{"18004599|9176080": []} +{"13343602|41768464": ["As watermarking is identified as a major technology to achieve copyright protection, the relevant literature [1-6] includes several distinct approaches for embedding data into a multimedia element."]} +{"13343602|18144244": []} diff --git a/edge/graph_55337890.jsonl b/edge/graph_55337890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec8ec3457c8033bbea348677a7814ef7005e77ff --- /dev/null +++ b/edge/graph_55337890.jsonl @@ -0,0 +1,9 @@ +{"206650877|205286988": []} +{"24563205|819377": ["Different criteria are used when choosing the background subtraction method [20, 21]."]} +{"24563205|3540699": []} +{"40898351|870434": ["Apart from the limited bandwidth, these constrains can be mitigated to some extent by using Delay/Disruption Tolerant Networking [2] [3].", "In Section III we present the Delay/Disruption Tolerant Networking reference implementation (DTN2) [7] [8]."]} +{"12566043|2469117": ["With the regular static mooring sensing system, it is difficult to observe these dynamic ocean phenomena (Zhang\net al., 2012).", "For more detailed techniques, please refer to more comprehensive surveys (Erol-Kantarciz et al., 2011; Tan et al., 2011; Han et al., 2012).", "Since energy for communications is usually plentiful in AUVs compared with ordinary sensors, they can play more important roles than ordinary ocean sensors in collecting, processing, and managing the desired data."]} +{"206486556|870434": ["Though there is little work carried out with different modulation or multiple access techniques [215], [228], [229], however, it has been shown that UOWC are capable of providing high speed optical links for short range applications."]} +{"18958361|8363289": ["Model Predictive Control (MPC) is an optimization-based method for control that can handle state and input constraints [42]."]} +{"11420741|12127129": ["The change in illumination of the ocean waters and temporal background as the AUV transits requires the image processing unit to learn background change continuously [44]."]} +{"206925480|11735843": ["The above problem can be overcome by making WSNs programmable and thus, there has been significant research effort devoted to design programmable WSNs [9]\u2013[11]."]} diff --git a/edge/graph_55338271.jsonl b/edge/graph_55338271.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55345511.jsonl b/edge/graph_55345511.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c3652235c76e6c583d60905132fc3a6d36c313a --- /dev/null +++ b/edge/graph_55345511.jsonl @@ -0,0 +1,8 @@ +{"2574917|12817488": ["\u2026node because the number of sensor nodes is very huge This leads to data-centric routing approach which is query-based protocol in which Base station sends query to a collection of particular nodes in a area and waits\nKirola, Rawat, Bhatt and Bhatt 134\nfor response of data from the sensors placed\u2026"]} +{"2574917|1236072": ["\u2026every node because the number of sensor nodes is very huge This leads to data-centric routing approach which is query-based protocol in which Base station sends query to a collection of particular nodes in a area and waits e t for response of data from the sensors placed in the certain area[4-6]."]} +{"2574917|1230643": ["projects in the last few years have explored hierarchical clustering in WSN from different perspectives [2].", "sensor network (WSN) is a network consist various spatially circulated devices which uses sensors to supervise the environment at different locations, such as temperature, sound, vibration, pressure, motion or pollutants [1-3].", "In a accommodating network collection of sensor node are organized in homogenous or heterogeneous sensor nodes to form a wireless sensor network is [2]."]} +{"20815538|1236072": []} +{"20815538|1230643": ["In spite of these similarities, sensor networks differ from traditional embedded wireless networks in many ways [4], some of them being:"]} +{"15308646|1230643": ["Therefore, the consumed of power is limited."]} +{"15199849|1940388": []} +{"15199849|17205659": ["Attacks in sensor networks do not just involve the alteration of packets; adversaries can also inject additional false packets [14]."]} diff --git a/edge/graph_55369097.jsonl b/edge/graph_55369097.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01a63c88c3d74c626f0f11601f5688326b76e9b1 --- /dev/null +++ b/edge/graph_55369097.jsonl @@ -0,0 +1 @@ +{"55228792|10500613": ["Rahm and Bernstein (2001) reviewed the approaches for automatic schema mapping and concluded that linguistic methods were common approaches in the schema-level mapping.", "1 Classification of schema matching approaches (Rahm and Bernstein, 2001) (Bold rounded rectangles show the methods used in this paper)"]} diff --git a/edge/graph_55372820.jsonl b/edge/graph_55372820.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aee9eed2ea4df4825d8369002fb2d18c0f621285 --- /dev/null +++ b/edge/graph_55372820.jsonl @@ -0,0 +1,2 @@ +{"12601073|30443041": ["It is noted that there are also researches on the robust matched filtering detection when the signal has other types of uncertainty [78].", "Moreover, if the noise has uncertainties, that is, R\u03b7 is not known exactly, or both noise and signal have uncertainties, the optimal robust matched-filtering detector was also found for some specific uncertainty models in [78].", "and c0, c1 are nonnegative numbers related to 0, 1, f 0 0 , and f 0 1 [75, 78].", "In the following, we will give a brief overview on them, while for other robust detection techniques, the interested readers may refer to the excellent survey paper [78] and references therein.", "After this seminal work, there have been quite a few researches in this area [78].", "For example, similar minmax solutions are found for some other uncertainty models [78]."]} +{"35925516|12601073": ["In addition, crosstalk, shadowing, and path loss are also factors that impact the integrity of signals [3].", "Examples of sources of noise include: non-linearity present in the RF front end, time-varying thermal noise within the receiver radio system, and noise from adjacent network nodes or RF environment [1-3]."]} diff --git a/edge/graph_55379500.jsonl b/edge/graph_55379500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55383097.jsonl b/edge/graph_55383097.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..108d2f51cf2227b6e1b82dd83670def932a93c91 --- /dev/null +++ b/edge/graph_55383097.jsonl @@ -0,0 +1 @@ +{"37092129|239537": []} diff --git a/edge/graph_55383619.jsonl b/edge/graph_55383619.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55388144.jsonl b/edge/graph_55388144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5538934.jsonl b/edge/graph_5538934.jsonl similarity index 100% rename from graph_5538934.jsonl rename to edge/graph_5538934.jsonl diff --git a/edge/graph_5540088.jsonl b/edge/graph_5540088.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55405290.jsonl b/edge/graph_55405290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5540781.jsonl b/edge/graph_5540781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55420525.jsonl b/edge/graph_55420525.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55432747.jsonl b/edge/graph_55432747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55437426.jsonl b/edge/graph_55437426.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46730a6251a9f2f6224f1c2bb5fb6a36a4e3b559 --- /dev/null +++ b/edge/graph_55437426.jsonl @@ -0,0 +1,4 @@ +{"16118442|6028805": ["Facial component detection in thermal imagery is relevant for face registration, tracking initialization (e.g. in [2] and [11] the tracking is initialized manually), face recognition ([9],[5]), and expression recognition ([10], [4])."]} +{"5804191|6028805": []} +{"10253440|8953108": ["The region of interest (ROI) is defined as the 100\u00d7 100 image patch extracted from the center of the palm region (Figure 4)."]} +{"12967034|6028805": ["Recently, several successful attempts have been made to fuse the visual and thermal infrared modalities to increase the performance of face recognition [44] [45] [21] [46] [47] [22] [41] [42] [48] [49].", "Appearance-based face recognition algorithms applied to thermal infrared imaging consistently performed better than when applied to visible imagery under variable lighting conditions [22] [23] [19] [24]."]} diff --git a/graph_5544758.jsonl b/edge/graph_5544758.jsonl similarity index 100% rename from graph_5544758.jsonl rename to edge/graph_5544758.jsonl diff --git a/graph_554505.jsonl b/edge/graph_554505.jsonl similarity index 100% rename from graph_554505.jsonl rename to edge/graph_554505.jsonl diff --git a/graph_5546112.jsonl b/edge/graph_5546112.jsonl similarity index 100% rename from graph_5546112.jsonl rename to edge/graph_5546112.jsonl diff --git a/edge/graph_55471850.jsonl b/edge/graph_55471850.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55473187.jsonl b/edge/graph_55473187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da5749a837d2d3cfeeb843dbd863db31fdebc761 --- /dev/null +++ b/edge/graph_55473187.jsonl @@ -0,0 +1,3 @@ +{"2007137|387610": []} +{"11417094|2358732": ["They concluded that the existing conventional image compression technology can be developed by combining high performance coding algorithms in appropriate ways, such that the advantages of both techniques are fully exploited [13]."]} +{"11683862|15026905": ["Main application is Medical imagery (Masood et al., 2012)."]} diff --git a/edge/graph_55473278.jsonl b/edge/graph_55473278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..538803507e30e99138236d418258929bf664dd4c --- /dev/null +++ b/edge/graph_55473278.jsonl @@ -0,0 +1,2 @@ +{"38767953|14038195": ["[65, 53])."]} +{"168141708|14038195": ["AHP has been extensively applied in the literature to analyse and compare alternative decision scenarios (Sarkis, 1998; Handfield et al., 2002; Ho, 2008; Lin and Juang, 2008; Wang, 2011; Opasanon and Lertsanti, 2013)."]} diff --git a/edge/graph_55488609.jsonl b/edge/graph_55488609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55498579.jsonl b/edge/graph_55498579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..120237d4c791492af1f57ca04ce9708d0acc325e --- /dev/null +++ b/edge/graph_55498579.jsonl @@ -0,0 +1,3 @@ +{"11495876|14441987": []} +{"1817474|14441987": ["[13], [14] So, memory requirement is reduced."]} +{"1817474|1762301": []} diff --git a/graph_5550723.jsonl b/edge/graph_5550723.jsonl similarity index 100% rename from graph_5550723.jsonl rename to edge/graph_5550723.jsonl diff --git a/graph_5551238.jsonl b/edge/graph_5551238.jsonl similarity index 100% rename from graph_5551238.jsonl rename to edge/graph_5551238.jsonl diff --git a/edge/graph_55515322.jsonl b/edge/graph_55515322.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5551880.jsonl b/edge/graph_5551880.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55524073.jsonl b/edge/graph_55524073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7da5c0baff12ace722afaad7ecdc2e63109020c8 --- /dev/null +++ b/edge/graph_55524073.jsonl @@ -0,0 +1 @@ +{"13554495|7971188": ["1In a traditional peer-to-peer file sharing system, all hosts behave both as clients and servers and are called \u201cservents\u201d [22]."]} diff --git a/edge/graph_55525333.jsonl b/edge/graph_55525333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..830225978cc53e258fc6e5164e0ccf70e6a13b92 --- /dev/null +++ b/edge/graph_55525333.jsonl @@ -0,0 +1,2 @@ +{"38865286|33286487": []} +{"22859639|33286487": []} diff --git a/edge/graph_55527321.jsonl b/edge/graph_55527321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6e34a64a1b6aa388ef40dbf65d8321bbd2bf644 --- /dev/null +++ b/edge/graph_55527321.jsonl @@ -0,0 +1 @@ +{"16571851|5313655": ["Cancelable biometrics, which offer solution to biometric template protection [1], consist of intentional, repeatable distortions of biometric signals based on transforms which provide a comparison of biometric templates in the transformed domain [2].", "alignment can not be performed properly during comparisons [1]."]} diff --git a/edge/graph_55532607.jsonl b/edge/graph_55532607.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7421ebb743f615624b475320c7b67d95b2bba9a --- /dev/null +++ b/edge/graph_55532607.jsonl @@ -0,0 +1,2 @@ +{"2280594|12278223": ["In particular, evolutionary algorithms has obtained promising results in IR [9]."]} +{"17196242|60455": []} diff --git a/edge/graph_55545831.jsonl b/edge/graph_55545831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55562801.jsonl b/edge/graph_55562801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5556391.jsonl b/edge/graph_5556391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55569363.jsonl b/edge/graph_55569363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc2c92bf9adb070b3050dcb0f5a676ab68595a79 --- /dev/null +++ b/edge/graph_55569363.jsonl @@ -0,0 +1,2 @@ +{"1754970|7861381": []} +{"15729548|206051485": []} diff --git a/edge/graph_5557385.jsonl b/edge/graph_5557385.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55578265.jsonl b/edge/graph_55578265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55581792.jsonl b/edge/graph_55581792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5558830.jsonl b/edge/graph_5558830.jsonl similarity index 100% rename from graph_5558830.jsonl rename to edge/graph_5558830.jsonl diff --git a/edge/graph_55600506.jsonl b/edge/graph_55600506.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55619142.jsonl b/edge/graph_55619142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b18b171f93802c5f0b26330a2e38a9811833498f --- /dev/null +++ b/edge/graph_55619142.jsonl @@ -0,0 +1,2 @@ +{"119521073|41768464": []} +{"3453203|1099309": ["In literature there are several works which propose[8] and evaluate[9,10] texture descriptors, for many different applications.", "[8] T. Sikora, 2001, The MPEG-7 visual standard for content description an overview, IEEE \nTrans."]} diff --git a/edge/graph_55620284.jsonl b/edge/graph_55620284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..489d26c67003e99219afd00276d659569b03ef09 --- /dev/null +++ b/edge/graph_55620284.jsonl @@ -0,0 +1,6 @@ +{"9854676|5755403": []} +{"505582|4491892": ["Further, most convergence results as surveyed in [56] are restricted to bounded functions of the state g(x) such that|g(x)| < C for someC."]} +{"1142256|10777439": ["It is worth noting that our way of exploring the user preference is fundamentally di\u21b5erent from that in location-based recommendation systems [30, 31, 34].", ", geographical distance [34, 31, 16, 14], popularity [33, 32], correlation of check-ins [37], and temporal dependency [5, 35, 36]."]} +{"207214926|3330313": []} +{"12126750|17024419": ["cation tracking is increasingly important for transport, ecology, and wearable computing. In particular, long-term tracking of spatially spread assets, such as wildlife [2], augmented reality glasses [3], or bicycles [4] provides high resolution trajectory information for better management and services. For smaller moving entities, such as \ufb02ying foxes [5] or pigeons [6], the size and weight of tracki"]} +{"9501154|13088291": ["We predict the entire traffic of the city first and then allocate the entire traffic to each cluster based on the check-out proportion across clusters, which is predicted by KNN prediction [3]."]} diff --git a/edge/graph_55628687.jsonl b/edge/graph_55628687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab12efd885c8fd92801fdf9dbfc46cd1290f2d42 --- /dev/null +++ b/edge/graph_55628687.jsonl @@ -0,0 +1,55 @@ +{"5054763|2623404": []} +{"13411709|10693567": ["The H-CRAN based 5G systems have capabilities to provide anytime, anywhere gigabit data rate service to the desired user equipments (UEs), where an \u201cedgeless\u201d experience to UEs is provided under the help of heterogeneous MBSs and ultra dense RRHs. Based on cloud computing technologies, the\u2026", "In addition, Node C has a powerful computing capabilities to execute the large-scale cooperative signal processing in the physical layer and large-scale cooperative networking in the upper layers."]} +{"206454765|8909218": []} +{"4502294|3555631": ["System information is broadcast over the anchor cell which also manages most of the radio resource control and signalling, while the small cells play an assistant role, having data offload as a main task [48]."]} +{"4883076|14776754": []} +{"18056158|8909218": ["Gbps/Km 2 will henceforth be the reference metric of choice for BuNGee and 1 Gbps/Km 2 its target."]} +{"3555631|7851743": ["Furthermore, we provide an overview of SON implementation in the CDSA.", "As far as the CDSA is concerned, the self-optimisation capability can be considered as the most important aspect of SON.", "This con\ufb01guration can be considered as a SON-based CDSA, and the results reported in [107] show that this architecture maximises the throughput whilst balancing the network load.", "CDSA as a candidate RAN for future cellular systems is tightly coupled to the emerging concept of SON [90].", "In 3GPP parlance, such automatic operations are usually referred to as SON, which cover three areas [102]: \u2022 self-con\ufb01guration: concerns with pre-operational procedures such as automatic con\ufb01guration and integration of newly installed BSs in a plug-and-play mode.", "In addition, the promotion of the CDSA as a candidate RAN for future cellular systems is tightly coupled to the emerging concept of SON [90].", "In addition, better EE in the CDSA mainly comes from low power DBSs, ability to switch off DBSs, lower propagation losses due to smaller distance between DBS and UE, and opportunity for centralized self-organising EE functions to switch off and on suboptimal used DBSs in conjunction with load balancing self-organising networks (SONs).", "Such SON-based mechanisms allow recognition of short term energy saving opportunities and they enable proper recon\ufb01guration of long term EE improvement strategies [103]."]} +{"3555631|7686677": ["Achieving a breakthrough in energy saving requires a paradigm shift towards on-demand systems by switching off a subset of the BSs during off-peak periods [35]."]} +{"10979806|3055684": ["Comprehensive surveys on this approach are [112] and [113]."]} +{"10979806|12029139": ["Surveys on this approach are [114] and [115]."]} +{"11316061|7851743": ["Considering the self-organizing framework, a self-organizing ICIC has to be scalable, stable and agile [104].", "Other popular decentralized algorithms can be found in [104], i."]} +{"11316061|3936425": ["Enhanced Coordination (HetNets) Enhanced coordination is the interference coordination within different cell-size cellular networks where in some cases there is no direct communication interface among eNBs [109]."]} +{"11316061|7686677": ["the total network energy consumption [121]."]} +{"11316061|12884178": ["For a wider view on radio resource management (RRM), readers may also refer to these surveys & tutorials [12], [14], [15] based on multi-user scheduling in OFDMA-based systems."]} +{"11316061|8909218": ["Interference avoidance by self-organizing channel reuse for femtocells Femtocells are supplementary low-power eNBs that aim to extend the indoor radio coverage in a licensed band through a fixed broadband backhaul where the coverage from the main cellular network is insufficient [72]."]} +{"11316061|17109970": ["Some popular non-cooperative framework can be adopted from game theory [95]."]} +{"11316061|7892994": ["Compared with other surveys existing in the literature regarding interference mitigation and coordination [7], [9]\u2013[11], we formulate a linear optimization problem for any typical multi-cellular environment based on OFDMA technology using binary/integer programming.", "OVERVIEW OF SELECTIVE INTERFERENCE AVOIDANCE TECHNIQUES FOR OFDMA-BASED SYSTEMS Selective interference avoidance has received a lot of attention not only from the scientific community but also from standardization institutions and organizations [9]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"1750395|19938676": ["The cognitive idea has also been extended to 5G networks, where we refer readers to [212] for more discussion."]} +{"1750395|14765802": ["More recently, the literature surveys for EE improvement have nailed down to several speci\ufb01c technical areas in cellular networks, including radio resource management [29], dynamic resource provisioning [30], base station sleeping [31] as well as low power hardware techniques [32]."]} +{"1750395|16412228": ["More recently, the literature surveys for EE improvement have nailed down to several speci\ufb01c technical areas in cellular networks, including radio resource management [29], dynamic resource provisioning [30], base station sleeping [31] as well as low power hardware techniques [32]."]} +{"1750395|7686677": ["However, [43] emphasizes cognitive radio and cooperative techniques while we focus on the main 4G technologies and the promising 5G technologies, which are fundamentally different."]} +{"1750395|10837932": ["In [27], a complete overview for both wired and wireless networks has been conducted."]} +{"1750395|17109970": []} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"3649200|3555631": ["Centralised RME can also aim to distribute network load evenly between the SCs [17].", "Both papers [17] and [18] lack a wider review of all CoMP clustering solutions available in literature.", "Reader is referred to [17] and [18] for two recent extensive surveys for further reading on CDSA.", "New architectures like CDSA [17] and C-RAN [22]\u2013[24] have been envisioned to enable energy ef\ufb01ciency and reduce OPEX and CAPEX costs in future wireless networks, mainly by providing small cell coverage only when it\u2019s required.", "Centralised scheduling in emerging technologies like C-RAN [22]\u2013[24] and CDSA [17] can also be utilised for load balancing.", "An extensive survey is provided on con-trol and data plane separation architecture (CDSA) for future networks in [17], however this survey lacks a review on CoMP within the CDSA architecture."]} +{"3649200|7851743": ["An extensive survey on SON has been presented in [19].", "In [19], an extensive review for self organising networks (SON) is provided, however CoMP clustering is not discussed in relation to SON framework."]} +{"22524049|2623404": ["In essence, SDN recognizes the network as an operating system and abstracts the applications from the hardware [8].", "In this article we consider an intelligent management framework based on the concept of software defined networks (SDN), which features the decoupling of the control plane from the data plane [8]."]} +{"12265807|8909218": ["1: Traffic demand for North America [2] One of most interesting trends to emerge from this cellular (r)evolution are femtocells [3], [4]."]} +{"26697205|2623404": ["More information regarding the technical challenges and open issues with respect to the NVF/SDN concept can be found in [99] and the references therein."]} +{"26697205|875676": ["FBMC can provide improved spectral efficiency compared to OFDM, while still being implemented through FFT/IFFT blocks or polyphase filter structures [49],[50] that are common for OFDM implementation."]} +{"26697205|8909218": ["Although open access reduces the macrocell load, the higher numbers of users communicating with each small cell will strain the backhaul to provide suf\ufb01cient capacity and raise privacy concerns for home users [69].", "This access is the most ef\ufb01cient and provides the best performances in terms of areal reuse and overall system capacity [69\u201373]."]} +{"26667032|8909218": ["FBSs are typically installed impromptu in the residential domain or small office/home Office (SOHO) and provide wireless cellular access to a closed or open group of subscribers as configured by the subscriber and/or the service provider [5].", "They are seen as an alternative to traditional MBSs for increasing coverage, quality of service (QoS), capacity and energy efficiency (EE) [5], [6]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"10289379|2623404": ["And the OpenFlow is a representative protocol of SDN currently [27] .", "Its type coincides with OpenFlow that is why SDN controller suitable to place to cloud platform.", "Any OpenFlow switches handle the own area and report to the controller.", "Open Networking Foundation (ONF) proposed a new communications protocol called OpenFlow [26] that any forwarding switches adds the flow table for traffic forwarding.", "In short, the concept of OpenFlow controller is a centralization me approach."]} +{"8351022|3330461": ["For D2D communication, [118] and [119] provide comprehensive survey and tutorial on the subject."]} +{"8351022|10837932": ["The green attribute of the cellular communication refers to reduction of unnecessary power consumption and its subsequent impact on the environment in the form of CO2 emissions [6]\u2013[11]."]} +{"8351022|15694215": ["For example, in ad-hoc networks, wireless nodes spontaneously and dynamically self-organize into an arbitrary and temporary infrastructure [94] without relying on central"]} diff --git a/graph_5563132.jsonl b/edge/graph_5563132.jsonl similarity index 100% rename from graph_5563132.jsonl rename to edge/graph_5563132.jsonl diff --git a/edge/graph_55634485.jsonl b/edge/graph_55634485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3151b1a7cda0df6b9e1e38e4503c94af53b9e956 --- /dev/null +++ b/edge/graph_55634485.jsonl @@ -0,0 +1,3 @@ +{"286350|1400872": []} +{"17122025|1400872": ["On the other hand, highly nonlinear and computationally expensive gradient inversion methods, such as backpropagation, are used in connectionist applications of neural networks, e.g., in order to solve the XOR problem [5, 7, 19, 25, 27, 28, 36, 38].", "This is usually achieved by means of backpropagation algorithms [5, 7, 19, 25, 27, 28, 36, 38]."]} +{"119426736|1676762": []} diff --git a/edge/graph_55636078.jsonl b/edge/graph_55636078.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55655880.jsonl b/edge/graph_55655880.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55667050.jsonl b/edge/graph_55667050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94c75ab13c453f3272550967afefced7a333f505 --- /dev/null +++ b/edge/graph_55667050.jsonl @@ -0,0 +1 @@ +{"63680885|2253457": []} diff --git a/edge/graph_55668239.jsonl b/edge/graph_55668239.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55686575.jsonl b/edge/graph_55686575.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cb4e531796e6e9ba32ad3a16b711c73367baeba --- /dev/null +++ b/edge/graph_55686575.jsonl @@ -0,0 +1,12 @@ +{"15819223|1236072": []} +{"17912032|2295142": []} +{"17912032|1236072": ["In link disjoint paths; there is no common lin k among the discovered paths [2] [3] [4]."]} +{"17912032|1230643": ["In link disjoint paths; there is no common lin k among the discovered paths [2] [3] [4]."]} +{"55404697|15199849": []} +{"3339518|7357277": []} +{"3339518|15798159": ["Moreover, some good survey on WSN security, attacks and countermeasure have been studied in [16-19]."]} +{"3339518|2295142": []} +{"43768553|15199849": []} +{"6637862|2295142": []} +{"15197361|1236072": ["There were many attempts made to route the data in the resource constrained scenarios [1]."]} +{"6982773|1230643": []} diff --git a/edge/graph_55692180.jsonl b/edge/graph_55692180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fd4fadd04c3f109a64ccb8a70aae81dfae0a4c8 --- /dev/null +++ b/edge/graph_55692180.jsonl @@ -0,0 +1,3 @@ +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} diff --git a/edge/graph_55694311.jsonl b/edge/graph_55694311.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55697421.jsonl b/edge/graph_55697421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55701377.jsonl b/edge/graph_55701377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55702266.jsonl b/edge/graph_55702266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6654912ace5e17bce9441d9d339435599d2563f0 --- /dev/null +++ b/edge/graph_55702266.jsonl @@ -0,0 +1,2 @@ +{"53945635|55697421": ["A survey on graph coloring for its types, methods and applications are given in [13]."]} +{"34866771|13030259": ["1 As reported in Kramer, Kramer [131], some authors announced in their papers that recently C. Thomassen had solved this conjecture for \u2206 = 3, but C. Thomassen confirmed to the authors of [131] in private communication that the problem must still be considered as an open problem.", "1 As reported in Kramer, Kramer [131], some authors announced in their papers that recently C.", "Thomassen confirmed to the authors of [131] in private communication that the problem must still be considered as an open problem."]} diff --git a/edge/graph_55703778.jsonl b/edge/graph_55703778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9adc17fe64819ecd05a38c91536a9d7210978e42 --- /dev/null +++ b/edge/graph_55703778.jsonl @@ -0,0 +1,8 @@ +{"4595620|1902238": ["A complete review of recent literature describing cardiac segmentation techniques is given in [4]."]} +{"14532963|1902238": []} +{"15104523|1902238": []} +{"458328|206051485": ["The inverse compositional algorithm There is a wealth of literature on image alignment algorithms and the reader is referred to Baker et al. (2004), Baker and Matthews (2001), Maintz and Viergever (1998), Zitova and Flusser (2003) and the references therein for an overview."]} +{"21458057|3644401": ["\u2026current interest in methods based on the multi-atlas segmentation framework (Rohlfing et al., 2004; Klein et al., 2005; Heckemann et al., 2006), which is becoming one of the most widely used and successful image segmentation techniques in medical imaging applications (Iglesias and Sabuncu, 2015)."]} +{"21458057|1902238": ["\u2026some of the above technical difficulties to achieve incremental progress on automated ventricle segmentation from short-axis cine MRI, the resulting automated segmentation contours still need to be significantly improved in order to be useable in the clinical setting (Petitjean and Dacher, 2011).", "There are a number of open technical challenges in automated LV and RV segmentation (Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Queir\u00f3s et al., 2014): \u2022 The overlap of pixel intensity distributions between cardiac objects and surrounding background structures; \u2022 The shape variability of\u2026", "Manual delineation is a time-consuming and tedious task that is also prone to high intra-and inter-observer variability (Petitjean and Dacher, 2011; Miller et al., 2013; Tavakoli and Amini, 2013; Suinesiaputra et al., 2014).", "Petitjean and Dacher (2011) provide a comprehensive survey of previous methods for LV segmentation that include multi-level Otsu thresholding, deformable models and level sets, graph cuts, knowledge-based approaches such as active and appearance shape models, and atlas-based methods.", "In addition, previously proposed methods require some a priori knowledge about the cardiac ventricles in order to increase their accuracy and robustness (Petitjean and Dacher, 2011)."]} +{"3776155|393948": ["\u20262013; Sermanet et al., 2014; Krizhevsky et al., 2012) trained to locate the LV; (ii) the shape of the LV is inferred using stacked autoencoders (Bengio et al., 2013; Bengio, 2009; Vincent et al., 2008; Baldi, 2012; Deng and Yu, 2014; Vincent et al., 2010) trained to delineate the LV; (iii) the\u2026", "complex problem of LV segmentation utilizing a combined deep-learning (LeCun et al., 2015; Hinton and Salakhutdinov, 2006; Bengio, 2009; Bengio et al., 2013; Ng, accessed July., 2015; Deng and Yu, 2014; Baldi, 2012) and deformablemodels approach.", "\u2026is the ground truth in cardiac MRI, we tackle the complex problem of LV segmentation utilizing a combined deep-learning (LeCun et al., 2015; Hinton and Salakhutdinov, 2006; Bengio, 2009; Bengio et al., 2013; Ng, accessed July., 2015; Deng and Yu, 2014; Baldi, 2012) and deformable-models approach.", ", 2012) trained to locate the LV; (ii) the shape of the LV is inferred using stacked autoencoders (Bengio et al., 2013; Bengio, 2009; Vincent et al., 2008; Baldi, 2012; Deng and Yu, 2014; Vincent et al., 2010) trained to delineate the LV; (iii) the inferred shape is used for initialization and also is incorporated into deformable models for segmentation."]} +{"3776155|1902238": ["\u2026imaging (MRI) is now routinely being used for the evaluation of the function and structure of the cardiovascular system (Yuan et al., 2002; Lima and Desai, 2004; Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "However, it is very difficult to build a model that is general enough to cover all possible shapes and dynamics of the heart chambers (Petitjean and Dacher, 2011; Jolly et al., 2009).", "First, the gap between slices (vertical dimension) in most routine acquisitions is relatively large (around 7-8 mm) and the pixel intensities between the slices cannot be reliably estimated (Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Petitjean et al., 2015; Queiros et al., 2014).", "However, manual segmentation is tedious, time consuming and prone to intra- and inter-observer variability (Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "Due to these technical barriers the task of automatic segmentation of the heart chambers from cardiac MR images is still a challenging problem (Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Suinesiaputra et al., 2014).", "Pixel classi\ufb01cation, image-based and deformable methods su\ufb00er from a low robustness and accuracy and require extensive user interaction (Petitjean and Dacher, 2011).", "A review of these methods can be found in (Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "To summarize, there are several challenges in the automated segmentation of the LV in cardiac MRI datasets: heterogeneities in the brightness of LV cavity due to blood flow; presence of papillary muscles with signal intensities similar to that of the myocardium; complexity in segmenting the apical and basal slice images; partial volume effects in apical slices due to the limited resolution of cardiac MRI; inherent noise associated with cine cardiac MRI; dynamic motion of the heart and inhomogeneity of intensity; considerable variability in shape and intensity of the heart chambers across patients, notably in pathological cases, etc (Tavakoli and Amini, 2013; Petitjean and Dacher, 2011; Queiros et al., 2014).", "\u2026noise associated with cine cardiac MRI; dynamic motion of the heart and inhomogeneity of intensity; considerable variability in shape and intensity of the heart chambers across patients, notably in pathological cases, etc (Tavakoli and Amini, 2013; Petitjean and Dacher, 2011; Queiros et al., 2014).", "However, it is very di\ufb03cult to build a model that is general enough to cover all possible shapes and dynamics of the heart chambers (Petitjean and Dacher, 2011; Jolly et al., 2009).", "Pixel classification, image-based and deformable methods suffer from a low robustness and accuracy and require extensive user interaction (Petitjean and Dacher, 2011).", "Cardiac magnetic resonance imaging (MRI) is now routinely being used for the evaluation of the function and structure of the cardiovascular system (Yuan et al., 2002; Lima and Desai, 2004; Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014).", "First, the gap between slices (vertical dimension) in most routine acquisitions is relatively large (around 7-8 mm) and the pixel intensities be-tween the slices cannot be reliably estimated (Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Petitjean et al., 2015; Queiros et al., 2014).", "However, manual segmentation is tedious, time consuming and prone to intra-and inter-observer variability (Frangi et al., 2001; Petitjean and Dacher, 2011; Tavakoli and Amini, 2013; Heimann and Meinzer, 2009; Suinesiaputra et al., 2014)."]} diff --git a/edge/graph_55714086.jsonl b/edge/graph_55714086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5571651.jsonl b/edge/graph_5571651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55718382.jsonl b/edge/graph_55718382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55720886.jsonl b/edge/graph_55720886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55725908.jsonl b/edge/graph_55725908.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84984726b6e44877a48d0d86ce8d95a7d02b575e --- /dev/null +++ b/edge/graph_55725908.jsonl @@ -0,0 +1,4 @@ +{"7972581|2181694": ["In this paper, an effort has been made to propose a collaborative hierarchical model capable of detecting insomnia of sensor nodes [1,10].", "In one of our earlier works, we have presented a survey of recent IDS in sensor networks [1]."]} +{"16563615|2181694": []} +{"17504212|1230643": ["Wireless Sensor Networks (WSNs) are designed to ful\ufb01l a variety of tasks; law enforcement, disaster recovery, search-and-rescue, to cite a few [1]."]} +{"17053348|1230643": ["The applications of WSNs include military sensing, disaster response, health care, and intelligent house control [3]; can be configured to suit a wide variety of personal requirements."]} diff --git a/edge/graph_55729907.jsonl b/edge/graph_55729907.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..092274456fb9d9055b925f2943d147c8d29e8f1d --- /dev/null +++ b/edge/graph_55729907.jsonl @@ -0,0 +1,39 @@ +{"15730249|7854020": ["Figure 1 demonstrates a typical medical application scenario of WBANs [2]."]} +{"17931918|55729907": []} +{"17931918|86629084": []} +{"17931918|8690743": []} +{"17931918|7988320": ["Major applications under the umbrella of WBAN are [15]:Treatment of cardiovascular abnormalities, cancer detection, asthma monitoring, developing telemedicine systems, artificial retina, fitness monitoring in sports and battle field etc."]} +{"17931918|6332923": ["Few Important but Unique features who characterize WBAN can be defined as [4]:", "As per the survey done on healthcare some applications/projects using WBANs are listed as[4],[12],[13]:"]} +{"17931918|7854020": ["Other trust based schemes and anomaly detection systems [2] are also being developed to make E-healthcare observatory systems more reliable."]} +{"769186|9830350": []} +{"769186|1230643": []} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"11860109|16514036": []} +{"7988320|6539555": []} +{"15932698|7988320": []} +{"42497499|7988320": []} +{"42497499|7854020": ["We analysed the performance of an IEEE 802.15.6-based CSMA/CA for NB PHYs in terms of the theoretical throughput, delay and bandwidth efficiency, as presented in Table 2 [19\u201321]."]} +{"42497499|16514036": []} +{"8690743|6332923": ["\u2026recent projects are presented below:\nSatire project [3], [4] (software architecture for smart attire) is a non-obtrusive wearable personal monitoring platform for data sensing, storage and upload allowing to maintain a record of patient\u2019s daily activities calculated by location and motion sensors.", "This scheme gives remedy and enhances the quality of life (Fig 1).", "This network consists of wearable computing devices which are under advancement."]} +{"8690743|16514036": ["This scheme gives remedy and enhances the quality of life (Fig 1)."]} +{"1862492|6332923": ["With the continual growth in expected duration of the average human lifetime (Kumar & Lee, 2012), the rise in population and number of elderly persons has led to inflated healthcare costs and shortage of professionals able to provide the care and treatment necessary to satisfy this increase in\u2026"]} +{"1862492|7774517": []} +{"107497498|16514036": ["Generally, the WBANs communications architecture is divided into three levels [6] as shown in Figure 2: level1-intra-BAN communications, which includes communications between body sensors and communications between body sensors and the PS."]} +{"28987262|15300368": ["Thus, it is clear that WSNs have privacy issues [1, 8, 9].", "Some works [8, 9] have focused on providing the core security services such as confidentiality, integrity, and availability."]} +{"13063285|3826739": []} +{"6109808|7988320": []} +{"6109808|17205659": ["A brief summary of these attacks is given in Table 1 [8]."]} +{"6109808|1230643": []} +{"8821056|1940388": ["Open research issues include the following [9],[30] and [32]: 1.", "Other security issues include [32] security-energy assessment, data assurance, survivability, Trust, end to end security, Security and Privacy Support for data centric sensor networks (DCS) and node compromise distribution.", "Secure location algorithms for mobile WSNs in different environments need to be investigated [32].", "There are a lot of approaches to ease routing security [32],[38] and [42].", "Open research issues range from cryptography algorithms to hardware design [6],[9] and [29] and the design of key management protocol\u2019s open research [3],[16],[9],[10] and [32] issues are described below: 1."]} +{"8821056|17205659": ["To illustrate this point, the differences between sensor networks and ad hoc networks are given below [9]: 1.", "In [9],[23], following metrics are suggested to evaluate whether a security scheme is appropriate for WSNs .", "To overcome this, Multi path routing can be used in combination with random selection of paths to destination, or braided paths can be used which represent paths which have no common link or which do not have two consecutive common nodes, or use implicit acknowledgments, which ensure that packets are forwarded as they were sent [16],[9] and [7].", "1 Outsider versus insider (Node Compromise) attacks Outside attacks [6], [9] are defined as attacks from nodes, which do not belong to a WSN; insider attacks occur when legitimate nodes of a WSN behave in unintended or unauthorized ways.", "[16],[9] and [7] (d) Selective Forwarding/ Black Hole Attack (Neglect And Greed): WSNs are usually multi-hop networks and hence based on the assumption that the participating nodes will forward the messages faithfully.", "defensive measure against such attacks is the usage of small frames, so that any individual node seizes the channel for a smaller duration only [16], [9].", "(c) Tampering or destruction: Given physical access to a node, an attacker can extract sensitive information such as cryptographic keys or other data on the node [9].", "The lifetime of a sensor node depends to a large extent on the battery lifetime; hence it is extremely important to adopt energy-efficient strategies for information processing [9],[ 7].", "The attacks are [9],[7]: Kavitha and Sridharan 036", "[3],[9],[7] and [23] (c) Node Capture: It is observed and analyzed that even a single node capture is sufficient for an attacker to take over the entire network."]} +{"8821056|1236072": []} +{"8821056|1230643": []} +{"17887894|206584087": []} +{"17887894|7988320": []} +{"17887894|18650997": []} +{"17887894|12815020": []} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} diff --git a/edge/graph_55738086.jsonl b/edge/graph_55738086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55741754.jsonl b/edge/graph_55741754.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5574189.jsonl b/edge/graph_5574189.jsonl similarity index 100% rename from graph_5574189.jsonl rename to edge/graph_5574189.jsonl diff --git a/edge/graph_55749006.jsonl b/edge/graph_55749006.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55754010.jsonl b/edge/graph_55754010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f97bedd718029576c2c53b8e567ca7944559a6b6 --- /dev/null +++ b/edge/graph_55754010.jsonl @@ -0,0 +1,6 @@ +{"37527276|206778272": ["This is mainly due to: 1) the conceptual gap between the abstract elements that define a style and the concrete source code constructs that implements the system [5]; 2) violations of the style constraints due to their misinterpretation; and 3) the continuous and cumulative changes undergone by the system, which increases its complexity and leads to a deviation from its initial design [1, 6]."]} +{"6621949|206778272": ["To cope with the complexity of legacy systems, there is an urgent need for techniques that reduce software complexity by incrementally improving the internal software quality [1]."]} +{"9869292|14920988": []} +{"9869292|16125167": []} +{"9869292|2481856": []} +{"700447|206778480": ["In addition, a recent extensive literature review, in the context of fault prediction [33], reports that supposedly better learners are not giving us better defect models."]} diff --git a/edge/graph_55754093.jsonl b/edge/graph_55754093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e164db63b44ab22ba8baa507c99a3f60b485efb --- /dev/null +++ b/edge/graph_55754093.jsonl @@ -0,0 +1,4 @@ +{"12405543|6681074": ["There have been many investigations on the refinement problem [7, 17]."]} +{"11007193|8983048": ["made a deep study on the accuracy of the IR results in [5] tackling range IR problem instances."]} +{"11007193|206051485": ["In addition, we will follow a feature-based IR approach [3].", "In particular, two search approaches for optimization have been considered in the IR literature [3]:", "There is not a universal design for a hypothetical IR method that could be applicable to every real-world application [3].", "As said in Section 2, a feature-based IR approach is considered [1,3]."]} +{"11007193|6681074": ["2) and it is based on applying IR techniques to achieve the integration of the range images [5,29\u201331].", "Thus, in order to provide a more specific description of the problem, we focused our attention on the particular application we consider in our experiments: the IR of range images for 3D modeling [5,29\u201331]."]} diff --git a/graph_5575638.jsonl b/edge/graph_5575638.jsonl similarity index 100% rename from graph_5575638.jsonl rename to edge/graph_5575638.jsonl diff --git a/edge/graph_55757167.jsonl b/edge/graph_55757167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55757745.jsonl b/edge/graph_55757745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5577146.jsonl b/edge/graph_5577146.jsonl similarity index 100% rename from graph_5577146.jsonl rename to edge/graph_5577146.jsonl diff --git a/edge/graph_55781463.jsonl b/edge/graph_55781463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55789749.jsonl b/edge/graph_55789749.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55795400.jsonl b/edge/graph_55795400.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86489fc26c91726bfa208d8406aa6ddf6ad23ba8 --- /dev/null +++ b/edge/graph_55795400.jsonl @@ -0,0 +1 @@ +{"12259456|8296351": []} diff --git a/edge/graph_55803760.jsonl b/edge/graph_55803760.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55803946.jsonl b/edge/graph_55803946.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71db202ab30567073d3586fd8d7abc0bc5aa8242 --- /dev/null +++ b/edge/graph_55803946.jsonl @@ -0,0 +1,2 @@ +{"62133403|11262595": ["Tikk et al. (2003) studied the approximation behavior of soft computing techniques."]} +{"6241802|5822166": []} diff --git a/edge/graph_55809527.jsonl b/edge/graph_55809527.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4716e57a457a19cfa02d9176808cd71659255aed --- /dev/null +++ b/edge/graph_55809527.jsonl @@ -0,0 +1,38 @@ +{"123571841|26257441": []} +{"13068209|14843594": ["Therefore, Gaussian process based ef\ufb01cient global optimization 1 (Jones et al., 1998; Shahriari et al., 2015), as a sample-ef\ufb01cient method to solve black-box optimization problems (Xu et al., 2022a), has recently been becoming more and more popular."]} +{"3428759|27488308": ["The existing hyper-heuristics for generating scheduling rules and heuristics can be classified based on their: 1) learning methods and 2) representations [1].", "Recently, different automated design approaches have been proposed to generate dispatching rules [1].", "For a comprehensive review of automated design methods for designing production scheduling heuristics can be found in [1].", "3) Processing times (PTs) follow discrete uniform distribution U[1, 99]."]} +{"52262922|14843594": ["The computational complexity of training GP modeling is O(n3) [22], and the computational complexity of nondominated sorting is O(2m2).", "models [14]\u2013[16], which are also known as Gaussian process (GPs) [17]\u2013[21] or Bayesian optimization [22], artificial neu-", "for surrogate-assisted optimization [10], [22], [56].", "The benefits of using GP model have been shown empirically in many papers, readers can refer to [14], [22], and [32]\u2013[34]."]} +{"1634180|4474193": ["It is very likely that the data are ill-distributed, imbalanced [57], incomplete [58], [59], and contaminated by noise [60], [61]."]} +{"51616087|1929234": ["approaches [45]."]} +{"51616087|1386147": ["Heterogeneous ensembles have the natural advantages in structural diversity by using different architectures or different learning types of models [42], [55], [59]."]} +{"51616087|1097238": ["These techniques are categorized into explicit and implicit methods depending on whether optimization of a diversity metric is applied in ensemble construction [53]."]} +{"51616087|14843594": [", Kriging or design and analysis of computer experiments [21] in geostatistics, or efficient global optimization [18] or Bayesian optimization [22] in global optimization."]} +{"111074844|8530790": ["Several excellent surveys of multiobjective evolutionary algorithm (MOEA) activity can be found, namely Veldhuizen and Lamont (2000), Coello (1999), Deb (1999, Chapter 8), Fonseca and Fleming (1995)."]} +{"10835347|4474193": ["For a general survey on the treatment of uncertainties in evolutionary algorithms (EA), the reader should refer to [ 1 ]."]} +{"7967358|508912": ["In the context of evolutionary optimization, it is possible to categorize existing evolutionary algorithms [13] that employ variable fidelity computational models into 1) non-adaptive, i."]} +{"60385584|3330313": []} +{"60385584|1097238": []} +{"60385584|15273230": []} +{"60385584|192934": ["Jain, Duin and Mao (2000) include a section on classi\ufb01er combination.", "Jain, Duin and Mao (2000) list eighteen classi\ufb01er combination schemes; Witten and Frank (2000) detail four methods of combining multiple models: bagging, boosting, stacking and error-correcting output codes whilst Alpaydin (2004) covers seven methods of combining multiple learners: voting,\u2026"]} +{"18702854|1386147": []} +{"18702854|4474193": ["If an expensive optimization is time-varying, evolutionary algorithms for solving dynamic optimization problems must be adopted to track the moving optima or moving Pareto front [97]."]} +{"206324668|19502816": []} +{"7821776|4474193": ["Another related research topic is dynamic optimization [21], specifically when the constraint functions change over time [22]."]} +{"16767807|4474193": []} +{"16767807|15273230": []} +{"67311565|8530790": ["2014) and for constraints, probability of feasibility (POF) (Forrester and Keane 2009) is used. After this, \u03b3 = POIhv \u00d7POF is obtained and a fixed number of individuals with highest \u03b3 values is selected for re-evaluation in step 9. These individuals are then added to the archive in step 10. The size of the archive is not fixed in this algorithm. The proposed algorithm was tested on two real-world problems with two objectives, 2\u20133 decision variables and 5\u20137 constraints. This algorithm used the surrogate modeling MATLAB toolbox (SUMO) from Gorissen et al. 2010 and was not compared with any other algorithm. Mlakar et al. (2015) used Kriging models with a differential evolution based EA to approximate the objective functions. After building the metamodels in step 5, individuals were generated using differential evolution operator in step 6 and metamodels were then used for approximation in step 7. For each offspring in step 7, uncertainties of the approximated values were compared to its corresponding parent. In other words, if the uncertainty value of offspring was less than that of parent, it would selected and kept in the population. On the other hand, if the uncertainties of both offspring and parent are comparable, both are kept in the population. All the offspring thus selected were re-evaluated with the original function to update the metamodels in step 9 and added the training archive in step 10. The algorithmwas tested on 12 benchmark problem out of which three had constraints. However, it was not mentioned in the article how the constraints were handled. All these 12 problems had two objectives and the number of decision variables for all problems was not mentioned. The algorithmwas also tested on a continuous steel casting and an electrocardiography problem with four variables and 2\u20133 objectives. The algorithm was compared with differential-based EA Robic and Filipic (2005) and an algorithm based onNSGA-II-ANN Deb and Nain (2007).", "To update the metamodel in step 9, for objectives, selection is performed using hypervolume-based probability of improvement (POIhv) (Couckuyt et al. 2014) and for constraints, probability of feasibility (POF) (Forrester and Keane 2009) is used.", "2014) and for constraints, probability of feasibility (POF) (Forrester and Keane 2009) is used. After this, \u03b3 = POIhv \u00d7POF is obtained and a fixed number of individuals with highest \u03b3 values is selected for re-evaluation in step 9. These individuals are then added to the archive in step 10. The size of the archive is not fixed in this algorithm. The proposed algorithm was tested on two real-world problems with two objectives, 2\u20133 decision variables and 5\u20137 constraints. This algorithm used the surrogate modeling MATLAB toolbox (SUMO) from Gorissen et al. 2010 and was not compared with any other algorithm. Mlakar et al. (2015) used Kriging models with a differential evolution based EA to approximate the objective functions.", "2014) and for constraints, probability of feasibility (POF) (Forrester and Keane 2009) is used. After this, \u03b3 = POIhv \u00d7POF is obtained and a fixed number of individuals with highest \u03b3 values is selected for re-evaluation in step 9. These individuals are then added to the archive in step 10. The size of the archive is not fixed in this algorithm. The proposed algorithm was tested on two real-world problems with two objectives, 2\u20133 decision variables and 5\u20137 constraints. This algorithm used the surrogate modeling MATLAB toolbox (SUMO) from Gorissen et al. 2010 and was not compared with any other algorithm. Mlakar et al. (2015) used Kriging models with a differential evolution based EA to approximate the objective functions. After building the metamodels in step 5, individuals were generated using differential evolution operator in step 6 and metamodels were then used for approximation in step 7. For each offspring in step 7, uncertainties of the approximated values were compared to its corresponding parent. In other words, if the uncertainty value of offspring was less than that of parent, it would selected and kept in the population. On the other hand, if the uncertainties of both offspring and parent are comparable, both are kept in the population. All the offspring thus selected were re-evaluated with the original function to update the metamodels in step 9 and added the training archive in step 10. The algorithmwas tested on 12 benchmark problem out of which three had constraints. However, it was not mentioned in the article how the constraints were handled. All these 12 problems had two objectives and the number of decision variables for all problems was not mentioned. The algorithmwas also tested on a continuous steel casting and an electrocardiography problem with four variables and 2\u20133 objectives. The algorithm was compared with differential-based EA Robic and Filipic (2005) and an algorithm based onNSGA-II-ANN Deb and Nain (2007). The algorithm obtained better performance when measured with hypervolume in 10000 function evaluations. An algorithm called K-RVEA was proposed in Chugh et al. (2016a) to solve computationally expensive problems with more than three objectives.", "After this, \u03b3 = POIhv \u00d7POF is obtained and a fixed number of individuals with highest \u03b3 values is selected for re-evaluation in step 9.", "2014) and for constraints, probability of feasibility (POF) (Forrester and Keane 2009) is used. After this, \u03b3 = POIhv \u00d7POF is obtained and a fixed number of individuals with highest \u03b3 values is selected for re-evaluation in step 9. These individuals are then added to the archive in step 10. The size of the archive is not fixed in this algorithm. The proposed algorithm was tested on two real-world problems with two objectives, 2\u20133 decision variables and 5\u20137 constraints. This algorithm used the surrogate modeling MATLAB toolbox (SUMO) from Gorissen et al. 2010 and was not compared with any other algorithm. Mlakar et al. (2015) used Kriging models with a differential evolution based EA to approximate the objective functions. After building the metamodels in step 5, individuals were generated using differential evolution operator in step 6 and metamodels were then used for approximation in step 7. For each offspring in step 7, uncertainties of the approximated values were compared to its corresponding parent. In other words, if the uncertainty value of offspring was less than that of parent, it would selected and kept in the population. On the other hand, if the uncertainties of both offspring and parent are comparable, both are kept in the population. All the offspring thus selected were re-evaluated with the original function to update the metamodels in step 9 and added the training archive in step 10. The algorithmwas tested on 12 benchmark problem out of which three had constraints. However, it was not mentioned in the article how the constraints were handled. All these 12 problems had two objectives and the number of decision variables for all problems was not mentioned. The algorithmwas also tested on a continuous steel casting and an electrocardiography problem with four variables and 2\u20133 objectives. The algorithm was compared with differential-based EA Robic and Filipic (2005) and an algorithm based onNSGA-II-ANN Deb and Nain (2007). The algorithm obtained better performance when measured with hypervolume in 10000 function evaluations."]} +{"7037022|4474193": ["In evolutionary computation, LLO is also known as dynamic optimization [76], [66].", "In evolutionary optimization, four methods can be employed for achieving robust solutions [66]."]} +{"11510470|15888893": []} +{"11510470|14843594": ["For any task T, the technique iterates through the following steps: (a) learn a probabilistic model p(f) \u2013 typically a Gaussian process \u2013 describing the objective function f , (b) use p(f) to define a low cost acquisition function that provides a trade-off between exploration and exploitation while quantifying how promising it is to evaluate a particular point in the search space, and (c) optimize the acquisition function to determine the next point to evaluate using the expensive objective function [39], [40]."]} +{"189933024|63086559": []} +{"4654091|26257441": []} +{"62549980|53984205": ["1 INTRODUCTION Surrogate based analysis and optimization has become a major tool in engineering design of complex systems [1]-[4]."]} +{"46893483|28457848": []} +{"34346647|21632806": []} +{"34346647|16793463": []} +{"34346647|10542845": ["Examples of combinatorial optimization algorithms employing such models are variants of EDA or ACO [6, 15].", "The reader is referred to Hauschild and Pelikan [15], who discuss advantages and outline many of the different types 135", "Applications of ACO for (expensive) combinatorial problems, e.g., include the works by Ca\u0301ceres et al. [81] and Teixeira et al. [69].", "The reader is referred to Hauschild and Pelikan [15], who discuss advantages and outline many of the different types135\nof EDAs."]} +{"34346647|53984205": ["[2] present an interesting history of development in the field.", "We will concentrate on surrogate modelbased approaches, which have their origin in statistical design and analysis of experiments, especially in response surface methodology [2].", "An additional benefit can seen in the smoothening property of the cheap model, because it uses an approximation of the possibly noisy data [2].", "ally, surrogate models are assessed and chosen according to their estimated true error [54, 55, 2].", "[2] list some recent approaches to tackle this \u201ccurse of dimensionality\u201d and problems related to generate adequate surrogates in high-dimensional 730"]} +{"34346647|13985031": ["regression models such as polynomial regression or response surface methodology [18], support vector machines (SVM) [19], artificial neural networks [20], radial basis functions [21], or Gaussian process (GP) models, which are sometimes also referred to as DACE or Kriging [22, 23, 24, 25, 26] are the most prominent modeling approaches."]} +{"34346647|63137": []} +{"24038979|14843594": ["A recent review on the topic can be found in [26]."]} +{"13767012|8530790": []} diff --git a/edge/graph_55815085.jsonl b/edge/graph_55815085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55816727.jsonl b/edge/graph_55816727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55819362.jsonl b/edge/graph_55819362.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55823329.jsonl b/edge/graph_55823329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55826205.jsonl b/edge/graph_55826205.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55826784.jsonl b/edge/graph_55826784.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5583050.jsonl b/edge/graph_5583050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55846037.jsonl b/edge/graph_55846037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e95d4242e878f7b3135a133bdc553a58df21704e --- /dev/null +++ b/edge/graph_55846037.jsonl @@ -0,0 +1,2 @@ +{"6326397|16125167": ["For each feature location technique, there are 45 data points for Eclipse and 241 for Rhino, one for each feature."]} +{"7630279|16125167": ["Another systematic survey of feature location approaches utilizing execution information can be found in a comprehensive survey of approaches to program comprehension via dynamic analysis [31].", "Dynamic analysis has a rich research history in the area of program comprehension [31], and feature location Table II."]} diff --git a/edge/graph_55850333.jsonl b/edge/graph_55850333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55854025.jsonl b/edge/graph_55854025.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55859332.jsonl b/edge/graph_55859332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55870353.jsonl b/edge/graph_55870353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55874432.jsonl b/edge/graph_55874432.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55876678.jsonl b/edge/graph_55876678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc2211df6f6e70b6d96bd0ec3db779221e3470f5 --- /dev/null +++ b/edge/graph_55876678.jsonl @@ -0,0 +1,2 @@ +{"38806570|38505093": []} +{"17516170|8364569": ["Anomaly-based detection schemes are more easily deployable than other complicated tools that are derived from machine learning as it simply looks at deviations from normal flows statistics [30], [4] while providing good detection rates [9]."]} diff --git a/edge/graph_55883339.jsonl b/edge/graph_55883339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55906055.jsonl b/edge/graph_55906055.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77e1fa4783b9a173435ae1b03520ea73858e7b98 --- /dev/null +++ b/edge/graph_55906055.jsonl @@ -0,0 +1,19 @@ +{"29171762|1236072": ["In hierarchical-based routing, however, nodes will play different roles in the network [ 8 ]."]} +{"14487867|3894519": ["[18] gives a detailed comparison analysis on different variants of LEACH as A-LEACH, S-LEACH and M-LEACH in terms of energy"]} +{"5745896|1230643": []} +{"16072785|205286988": ["LEACH achieves over a factor of 7 reduction in energy dissipation compared to direct communication and a factor of 4\u20138 compared to the minimum transmission energy routing protocol[7].", "Lots of studies on WSNs have been carried out showing that this technology is continuously finding new application in various areas[5,6,7], like remote and hostile regions as seen in the military for battle field surveillance, monitoring the enemy territory, detection of attacks and security etiquette."]} +{"16072785|1230643": ["Lots of studies on WSNs have been carried out showing that this technology is continuously finding new application in various areas[5,6,7], like remote and hostile regions as seen in the military for battle field surveillance, monitoring the enemy territory, detection of attacks and security etiquette."]} +{"8114005|1230643": []} +{"14803342|205286988": ["Routing in WSNs is a tricky task because of data source from multiple paths to single source, data redundancy and also because of energy and computation factors of the network [9]."]} +{"14803342|1230643": []} +{"36606936|14441987": ["The traditional routing protocols for wireless ad hoc networks [2] are not well suited for sensors networks."]} +{"7103952|6275330": []} +{"1382310|3894519": ["The technological advancements in the field of hardware design and system on chip has enabled the designers to create minute wireless sensors which performs many DSP operations[1] [10]."]} +{"11292810|1230643": []} +{"15639477|1236072": []} +{"15639477|1230643": []} +{"2658554|1230643": []} +{"18082568|1236072": ["Data reporting method, Fault Tolerance, scalability, quality of service, connectivity, data aggregation, coverage, network dynamics, transmission media and energy consumption are other major concerns in designing WSNs.[5]", "Interfacing these sensors can assist rescue operations by tracing survivors, recognizing dangerous areas, and making the rescue team more conscious of the overall condition in the disaster area [5].", "Conceptual advantages of PEAGSIS [6] and I-LEACH can be combined together to make a new better performing protocol for WSNs. Concept of Chain formation from PEAGSIS protocol and concept of residual energy and certainty of CHs formation of I-LEACH protocol if can be implemented together will perform far better and can be implemented in WSNs and instead of first order radio model different Propagation models can also be tested on these protocols to evaluate the performance of these protocols in urban and semi-urban environment."]} +{"9016926|12817488": ["CH sends several copies of aggregated data directly to sink which increases energy consumption in communication and limits the network life of WSN. Data aggregation reduces the redundant data and minimizes the transmission cost.", "A survey of different cluster based protocol used to aggregate the data and improve the energy consumption along with network life time [2, 3].", "It is difficult to recover the original data due to in network processing as compression, filtering and combination which looses the precision [2].", "In hierarchical WSN, when large numbers of nodes distributes to monitor the temperature in different areas then data from individual sensor may differ or create correlated data.", "Also, the change in network topology and the way of aggregating the data influences WSN [1-2].", "The additive and divisible data aggregation function (min, max, Avg, sum, count, median etc) at CH results in the cutback of packets to be communicated to sink which in turn saves the energy improves the network lifetime and bandwidth utilization [2].", "It helps to reduce the communication cost by improving energy consumption and network lifetime of WSN.", "Keywords \u2013 Data Aggregation; Wireless Sensor network (WSN); Clustering; Energy consumption; Grouping.", "[9] Chuan-Yu Cho, Chun-Lung Lin, Yu-Hung Hsiao, Jia-Shung Wang, KaiChao Yang, \"Data Aggregation with Spatially Correlated Grouping Technique on Cluster-Based WSNs,\" Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on , vol., no., pp.584-589, 18-25 July 2010."]} +{"53341028|1230643": []} +{"14867463|1230643": ["Many aggregation algorithms for WSNs are designed to work with cluster-based routing algorithms [12\u201314]. while some others are based on other ways of routing [15] such as direct connection between sensors and the base station [16]."]} diff --git a/edge/graph_55908651.jsonl b/edge/graph_55908651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55924989.jsonl b/edge/graph_55924989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5592896.jsonl b/edge/graph_5592896.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55929640.jsonl b/edge/graph_55929640.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55944414.jsonl b/edge/graph_55944414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55946494.jsonl b/edge/graph_55946494.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55948054.jsonl b/edge/graph_55948054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55955160.jsonl b/edge/graph_55955160.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5c97b586ee4705c68e26b0a292d805c3df7e88d --- /dev/null +++ b/edge/graph_55955160.jsonl @@ -0,0 +1 @@ +{"10464205|20528549": ["The majority of the existing research can be categorized as a part of the first category (Zhao, 2003)."]} diff --git a/edge/graph_55983091.jsonl b/edge/graph_55983091.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_55999689.jsonl b/edge/graph_55999689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56001289.jsonl b/edge/graph_56001289.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..edabfffbf16636297d4c0e38e54883e61887c972 --- /dev/null +++ b/edge/graph_56001289.jsonl @@ -0,0 +1,3 @@ +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} +{"13843514|2795037": []} +{"13843514|8125630": []} diff --git a/edge/graph_56002888.jsonl b/edge/graph_56002888.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56002943.jsonl b/edge/graph_56002943.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56003001.jsonl b/edge/graph_56003001.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56017319.jsonl b/edge/graph_56017319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a7e63220c03421e67ff9e043c259a8883d64ed9 --- /dev/null +++ b/edge/graph_56017319.jsonl @@ -0,0 +1,5 @@ +{"163275|10559330": []} +{"8638824|525062": ["[7] (congestion control for networks with high levels of packet reordering), Low et al. [8] (current up to 2002 TCP variants and their analytical models), Hasegawa and Murata [9] (fairness issues in congestion control), and others researchers."]} +{"8638824|1299833": ["Several groups of these proposals have been studied by Hanbali et al. [4] (congestion control in ad hoc networks), Lochert et al. [2] (congestion control for mobile ad hoc networks), Widmer et al. [5] (congestion control for non-TCP protocols), Balakrishnan et al. [6] (congestion control for wireless networks), Leung at al.", "Several groups of these proposals have been studied by Hanbali et al. [4] (congestion control in ad hoc networks), Lochert et al. [2] (congestion control for mobile ad hoc networks), Widmer et al. [5] (congestion control for non-TCP protocols), Balakrishnan et al. [6] (congestion control for\u2026"]} +{"8638824|15516254": ["Several groups of these proposals have been studied by Hanbali et al. [4] (congestion control in ad hoc networks), Lochert et al. [2] (congestion control for mobile ad hoc networks), Widmer et al. [5] (congestion control for non-TCP protocols), Balakrishnan et al. [6] (congestion control for wireless networks), Leung at al.", "\u2026have been studied by Hanbali et al. [4] (congestion control in ad hoc networks), Lochert et al. [2] (congestion control for mobile ad hoc networks), Widmer et al. [5] (congestion control for non-TCP protocols), Balakrishnan et al. [6] (congestion control for wireless networks), Leung at al."]} +{"8638824|15040462": ["It is commonly known in the flow-control world that if the offered load in an uncontrolled distributed sharing system (e.g., road traffic) exceeds the total system capacity, the effective load will go to zero (collapses) as load increases [10] (Figure 3)."]} diff --git a/edge/graph_56019037.jsonl b/edge/graph_56019037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56019781.jsonl b/edge/graph_56019781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56020468.jsonl b/edge/graph_56020468.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56030085.jsonl b/edge/graph_56030085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56031063.jsonl b/edge/graph_56031063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b124f7f03fa7a514c2e8e4469c536dc9f099e823 --- /dev/null +++ b/edge/graph_56031063.jsonl @@ -0,0 +1,9 @@ +{"61347624|62198990": ["First, note that our goal is to measure visual line of gaze, that is, the absolute position in space at which the user\u2019s eyes are pointed, rather than, for example, the position of the eye in space or the relative motion of the eye within the head; not all eye tracking techniques do this [ 16 ].", "In our laboratory, we use an Applied Science Laboratories (Waltham, Mass.) Model 3250R eye tracker [10, 16 ]."]} +{"123176417|62198990": []} +{"24009262|62198990": ["Such systems, in order to reduce the influence of head movement, use a working variable that has a relative value that combines pupil center and glint position in the image [ 28 ]."]} +{"35498686|4361938": []} +{"35498686|62198990": []} +{"11611523|62198990": ["A good survey of earlier eye-gaze (eye-movement) tracking techniques, most of them being active methods, is provided in [21]."]} +{"45259130|62198990": []} +{"206611506|4361938": ["According to Duchowski [4], eye-gaze tracking applications can be", "According to Duchowski [4], eye-gaze tracking applications can be categorized as diagnostic or interactive."]} +{"2617513|62198990": []} diff --git a/edge/graph_56031966.jsonl b/edge/graph_56031966.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56035937.jsonl b/edge/graph_56035937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56044687.jsonl b/edge/graph_56044687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2fe7c01d7237a5614357e2c55f188117e217221 --- /dev/null +++ b/edge/graph_56044687.jsonl @@ -0,0 +1,4 @@ +{"53858421|18327676": []} +{"45998271|10863733": []} +{"15883539|387610": []} +{"25579316|3540699": ["264/AVC video coding standard provides a significant compression gain over previous standards [1].", "Normalization is performed by shifting so that \u2019s value is always in [1, 2)."]} diff --git a/edge/graph_56046093.jsonl b/edge/graph_56046093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd5a0646e327dc8a8e742defae84fb3989ffc3ca --- /dev/null +++ b/edge/graph_56046093.jsonl @@ -0,0 +1 @@ +{"41061557|15126268": []} diff --git a/edge/graph_56046579.jsonl b/edge/graph_56046579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56046781.jsonl b/edge/graph_56046781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e665b2e451464116e7fab833596e6912b9e3d04 --- /dev/null +++ b/edge/graph_56046781.jsonl @@ -0,0 +1,7 @@ +{"23288279|9270553": []} +{"8639012|3055684": ["Another recent survey in [10] provides an overview of self-sustaining wireless communications with different energy harvesting techniques, from the perspective of", "Unlike [10], this survey focuses on the wireless charging strategies in communication networks with wireless energy"]} +{"8639012|12029139": ["Survey Scope Main Contribution [9] Wireless network with RF energy harvesting Review of i) fundamentals and circuit design for RF energy harvesting, ii) resource allocation schemes and communication protocols for various types of RF-powered wireless network, and iii) practical challenges and future directions.", "5) Near-field SWIPT System: As afore-introduced, SWIPT (see [9] and references therein) has been broadly investigated in RF-based wireless communication systems.", "A more detailed review on the conversi on efficiency of RF energy harvester implementations can be found in [9], [14].", "The reader can r efer to [9] for more detailed information about recent advances in radiative charging system.", "This survey differs from [9] in the following aspects: this survey i) covers various major wireless charging techniques, namely, inductive coupl ing, magnetic resonance coupling and RF/microwave radiation, from fundamental principles to their applications, ii) rev iews the existing international standards, commercialization and implementations, and iii) emphasizes on the transmitter-s ide (i.", "Our prev ious work in [9] presented a review of research issues in RFpowered wireless networks with the focus on the receiver-si de (i."]} +{"8639012|12681089": ["The far-field RF propagation models are well known in literatures [230], [231]."]} +{"8639012|12060835": ["In [12], the authors gave an overview of the sensor nodes powered by", "Existing literatures [12]\u2013[14] also presented relevant reviews"]} +{"4341158|16527268": ["Biometrics leverage physiological or behavioral characteristics of a person to accomplish identification [5]."]} +{"4341158|17950466": ["A microphone can capture a person\u2019s voice, a malicious application could learn one\u2019s typing rhythm [2], or smartphone-usage data can create a user profile [36]."]} diff --git a/graph_5605271.jsonl b/edge/graph_5605271.jsonl similarity index 100% rename from graph_5605271.jsonl rename to edge/graph_5605271.jsonl diff --git a/edge/graph_56058698.jsonl b/edge/graph_56058698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..314fd8ffc249fe6d94365637e1d3a12e7851073a --- /dev/null +++ b/edge/graph_56058698.jsonl @@ -0,0 +1,4 @@ +{"17411046|10355303": ["arise from changes in illumination, motion blur, deformation and occlusion from surrounding objects [22]."]} +{"10355303|206764452": ["Table I. Summary of Related Literature Surveys\nAuthors Topic Journal/conference title\n[Gero\u0301nimo et al. 2010] Pedestrian Detection IEEE Trans.", "In the recent literature, several related surveys (e.g., [Gero\u0301nimo et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to\u2026"]} +{"10355303|17516538": ["\u2026including (i) low-quality camera sensors (e.g., low frame rate, low resolution, low bit-depth, and color distortion); (ii) challenging factors (e.g., nonrigid object tracking, small-size object tracking, tracking a varying number of objects, and complicated pose estimation); (iii)\u2026", "[Hu et al. 2004] Object Motion and Behaviors IEEE Trans.", "\u2026et al. 2010; Candamo et al. 2010; Cannons 2008; Zhan et al. 2008; Kang and Deng 2007; Yilmaz et al. 2006; Forsyth et al. 2006; Sun et al. 2006; Hu et al. 2004; Arulampalam et al. 2002]) of visual object tracking have been made to investigate the state-of-the-art tracking algorithms and their\u2026"]} +{"10355303|7185733": []} diff --git a/edge/graph_56063288.jsonl b/edge/graph_56063288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..360174c1b64efc1cd1251ba033d6fed50a967abc --- /dev/null +++ b/edge/graph_56063288.jsonl @@ -0,0 +1,4 @@ +{"18859116|15782139": []} +{"14652625|17516538": ["The literature on trajectory-based motion understanding and pattern discovery is less mature but advances using learning Vector Quantization (LVQ) [14], Self-Organising Maps (SOMs) [15,16], hidden Markov Models (HMMs) [17], and fuzzy neural networks [18] have all been proposed."]} +{"2596985|17516538": ["The analysis of crowd movements and behaviour is of particular interest in the surveillance domain [ 7 ]."]} +{"15106673|17516538": ["different environment modeling approaches applicable to visual surveillance applications can be found in [3]."]} diff --git a/edge/graph_56068964.jsonl b/edge/graph_56068964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_560790.jsonl b/edge/graph_560790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56083616.jsonl b/edge/graph_56083616.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a167b82ede7a4009553b52a6ff93717bf7df3ed --- /dev/null +++ b/edge/graph_56083616.jsonl @@ -0,0 +1,2 @@ +{"64359593|3750204": ["\u2026an applications refers to the processing of large amount of data and produce the results strictly within certain time constrains whereas, real-time responses are usually generated within milliseconds and sometimes even within microseconds depending on the application and the user requirements [8]."]} +{"6981637|10559330": ["Generally, these components work together to achieve specific goals that are specified by a QoS service model [18\u201320]."]} diff --git a/edge/graph_56095465.jsonl b/edge/graph_56095465.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56118019.jsonl b/edge/graph_56118019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7afcb1e2300ea17780d57e7baa2432c62461476 --- /dev/null +++ b/edge/graph_56118019.jsonl @@ -0,0 +1 @@ +{"167525259|16575201": ["This principle has been used by linguists for a long time (Howes and Solomon, 1951; Kageura and Umino, 1996; Murphy, 1992, Blair et al., 2002).", "This principle has been used by linguists for a long time (Howes and Solomon, 1951; Kageura and Umino, 1996; Murphy, 1992, Blair et al., 2002). The relative usage of each definition can be obtained by comparing frequency counts from an internet search engine. The internet is particularly suited for this purpose, because, as Blair et al. (2002) sum up, it is a \u2018comprehensive, representative, contemporary, and easily searched\u2019 linguistic database."]} diff --git a/edge/graph_5612073.jsonl b/edge/graph_5612073.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5612847.jsonl b/edge/graph_5612847.jsonl similarity index 100% rename from graph_5612847.jsonl rename to edge/graph_5612847.jsonl diff --git a/edge/graph_56144874.jsonl b/edge/graph_56144874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56146580.jsonl b/edge/graph_56146580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56150131.jsonl b/edge/graph_56150131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b605bd36c2c42ee58aec3fd5e61b7025b698a23a --- /dev/null +++ b/edge/graph_56150131.jsonl @@ -0,0 +1 @@ +{"22587952|50458504": ["Fraud detection generally is an important area of application for artificial intelligence techniques [5]."]} diff --git a/edge/graph_56153883.jsonl b/edge/graph_56153883.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56153972.jsonl b/edge/graph_56153972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0dd598f40dd7cc5e0362d23bd5b5d5ac3dc496d2 --- /dev/null +++ b/edge/graph_56153972.jsonl @@ -0,0 +1,3 @@ +{"27305435|7988320": ["WBAN has some limitations such as low energy, short communication range, irregular traffic etc.", "So WBAN makes life easy.", "In WBAN nodes are capable of sampling, processing vital signs of the body such as blood pressure, temperature, sugar level, location, oxygen level etc. Elderly and handicapped people can be easily monitored by using WBAN.", "As nodes of WBAN are miniaturized and battery-\npowered, energy consumption is a major fact in WBAN.", "But recently several protocols have been proposed for WBAN [6] [7] considering the limitations of WBAN and how to deal with it.", "Index Terms\u2014 WBAN, BAN, Routing, Multihop, Prim\u2019s Algorithm, Kruskal\u2019s Algorithm, Fuzzy Logic\nI. Introduction\nWireless Body Area Network (WBAN) is composed of miniature sensor nodes that are capable of taking\nvital signs from human body and sending to a central node.", "Other applications of WBAN ranged from video games to military application.", "But this star architecture is not enough for WBAN, especially if WBAN is in time varying condition [3].", "Though WBAN is specialized from of WSN but these protocols cannot be used in WBAN due to special properties of WBAN.", "If we assume that v is the Set of vertices which represents the nodes in the network and E is the set of edges which represent network communication topology then WBAN can be modeled as G= (V, E), here G is undirected graph ."]} +{"27305435|1236072": ["WSN has several protocols [4]."]} +{"3174636|1230643": ["As the energy is spent mostly on operating the radio [1], minimizing the energy consumption translates into minimizing the communication cost."]} diff --git a/edge/graph_56166139.jsonl b/edge/graph_56166139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56168778.jsonl b/edge/graph_56168778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56172133.jsonl b/edge/graph_56172133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fff34086dff0076e78af10cc441288a2b21dade7 --- /dev/null +++ b/edge/graph_56172133.jsonl @@ -0,0 +1,14 @@ +{"12193349|393948": []} +{"2612052|393948": ["Recently, significant progress has been made in learning image representations from pixel (or low) level image features to capture high level shape and edge interactions between different objects in images [35]."]} +{"2612052|8575576": ["W ITH the recent advent of cost-effective whole-slide digital scanners, tissue slides can now be digitized and stored in digital image form [1]."]} +{"51629280|2088679": []} +{"3654323|10092092": []} +{"3654323|2899523": [" sharply decreases in higher layers. Therefore, recent work has addressed this problem by deep DA, which combines deep learning and DA. There have been other surveys on TL and DA over the pastfewyears[67, 80,14,68, 109, 13]. Panetal. [67]categorizedTL underthreesubsettings,includinginductiveTL, transductiveTL,andunsupervisedTL,buttheyonlystudied homogeneous feature spaces. Shao et al. [80] categorized TL techniques into", "forth. In this section, we present different application examples using various visual deep DA methods. Because the information of commonly used datasets for evaluating the performance is provided in [109] in detail, we do not introduceit in this paper. 6.1. Image Classi\ufb01cation Because image classi\ufb01cation is a basic task of computervisionapplications,mostof the algorithmsmentioned above were originally", "e transfer. The surveywritten byPatel [68] onlyfocusedon DA, a subtopicof TL. [14] discussed 38 methods for heterogeneous TL that operate under various settings, requirements, and domains. Zhangetal. [109] werethe\ufb01rst to summarizeseveraltransferring criteria in detail from the concept level. These \ufb01ve surveys mentioned above only cover the methodologies on shallow TL or DA. The work presented by Csurka"]} +{"3654323|7559976": ["In one-step DA, the deep approaches can be summarized into three cases, which refers to [23] .", "[23] briefly analyzed the state-of-the-art shallow DA methods and categorized the deep DA methods into three subsettings based on training loss: classification loss, discrepancy loss and adver-", "hose from the survey papers by [18,23] to maintain consistency cross surveys."]} +{"20134427|393948": []} +{"13634649|30270627": ["The method can also provide a high resolution and three-dimensional (3D) view of the living tissues for us.[22-30] The light wavelength of OCT device used in imaging of the anterior eye segments is 1."]} +{"4578729|2088679": []} +{"35981588|393948": ["Deep learning overcomes shallow methods\u2019 inability to generalize across datasets through the random generation and selection of a series of increasingly dimensional feature abstractions from combinations of multiple non-linear transformations on a dataset [13]."]} +{"6135895|393948": ["Deep learning methods are powerful supervised and unsupervised techniques that generate abstractions from the combination of multiple non-linear transformations on a dataset.(8) Applications of these techniques for object"]} +{"52114884|393948": ["Deep learning-based methods have recently drawn attention since they can automatically learn an increasingly complex hierarchy of features directly from the input data (Bengio et al., 2013)."]} +{"4359165|393948": ["The DL architectures are formed by the composition of multiple linear and nonlinear transformations of the data, with the goal of yielding more abstract and ultimately more useful representations [15].", "These strategies include spatial invariance, hierarchical feature learning and scalability [15].", "ing architectures, are recently been employed successfully for image segmentation and classification tasks [18][15][9]."]} diff --git a/edge/graph_56174156.jsonl b/edge/graph_56174156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10f711875a5fec6566143f128a4095e6d00c1234 --- /dev/null +++ b/edge/graph_56174156.jsonl @@ -0,0 +1,10 @@ +{"2780425|8569776": []} +{"2780425|2910221": []} +{"38280822|14808716": ["Decision tree algorithms were selected for use as they are an effective method of modelling in resource-constrained systems, as discussed by Rokach and Maimon (2005) and Zia et al., (2015)."]} +{"44162448|14356173": ["through deeply digging Big Data using various data mining techniques [11]."]} +{"33828314|11139156": ["\u2026be used by other components, including semantic speci\ufb01cations; Development of Collaborative Tools \u2013 required for collaborative software development (e.g. communication, project management, issue tracking, bug tracking, globally accessible backlog, burn down chart tools etc.) (Hossain et al., 2009)."]} +{"31381421|16335158": ["Sensor-cloud computing: sensor-cloud computing refers to the on-field WSN applications empowered with cloud computing (Ojha et al., 2014; Alamri et al., 2013; Zhu et al., 2014)."]} +{"31381421|1503157": ["Among all these technologies, the agriculture domain is mostly explored concerning the application of WSNs in improving the traditional methods of farming (ur Rehman et al., 2014; Zhao et al., 2013; Wang et al., 2006; Akyildiz et al., 2002a,b; Akyildiz and Kasimoglu, 2004; Yick et al., 2008; Ruiz-Garcia et al., 2009)."]} +{"31381421|1230643": []} +{"28240852|16335158": ["Over the recent years, the concept of sensor-cloud and its architecture has matured (Alamri et al., 2013)."]} +{"30904888|8569776": []} diff --git a/edge/graph_56176795.jsonl b/edge/graph_56176795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f917e49f63a7a1556efcc685222e2a5a9f1e836 --- /dev/null +++ b/edge/graph_56176795.jsonl @@ -0,0 +1 @@ +{"64517182|5791119": []} diff --git a/edge/graph_56177109.jsonl b/edge/graph_56177109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56178614.jsonl b/edge/graph_56178614.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b49e82f22db1e0aaee98d935d3c334f3c01ba3b4 --- /dev/null +++ b/edge/graph_56178614.jsonl @@ -0,0 +1,2 @@ +{"8306743|8125630": []} +{"51881814|56178614": ["k for most today\u2019s KV stores that target workloads with high volumes of inserts or updates. Many studies extend the LSM-tree design for improved compaction performance; we refer readers to the survey [29] on state-of-the-art LSMtree-based KV stores. To name a few, bLSM [42] proposes a new merge scheduler to prevent the compaction operations from blocking write requests, and uses Bloom \ufb01lters for ef\ufb01ci"]} diff --git a/edge/graph_56178838.jsonl b/edge/graph_56178838.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..539f752159dfc35addcadfd4386c44a1ddcf4cbb --- /dev/null +++ b/edge/graph_56178838.jsonl @@ -0,0 +1,8 @@ +{"46747154|16514036": []} +{"49192539|9040432": []} +{"4040150|33077286": []} +{"16091346|14077778": ["The reader is referred to [30,42,33] for details about precomputation and fixed point scalar multiplication.", "A survey about methods for the scalar multiplication can be found in [30]."]} +{"725596|2357830": ["The radio frequency identification (RFID) is a technology that enables the non-contact, automatic and unique identification of objects using radio waves so that it is considered as a best replacement of the traditional barcode technology [1]."]} +{"52300326|37664642": ["The authors of Mastali and Agbinya (2010), Peralta et al. (2015) and Limbasiya and Doshi (2017), summarize a good representative part of them."]} +{"52300326|9040432": ["The supervision process could be realized through a wireless body area network (Bradai et al. 2011; Aqsa et al. 2015), where sensors are deployed on or around the patient\u2019s body."]} +{"4335687|21386749": ["At study [7], they analyst the benefits, threat models, security needs of security and privacy in IoT-based health field."]} diff --git a/edge/graph_56204848.jsonl b/edge/graph_56204848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_562065.jsonl b/edge/graph_562065.jsonl similarity index 100% rename from graph_562065.jsonl rename to edge/graph_562065.jsonl diff --git a/edge/graph_56207260.jsonl b/edge/graph_56207260.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56208985.jsonl b/edge/graph_56208985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c73d3f56984ed80e6f1455c0965aa423e0f63b2e --- /dev/null +++ b/edge/graph_56208985.jsonl @@ -0,0 +1,15 @@ +{"1238411|6923178": ["First, the\n1Note if we were evaluating classifiers we would base our statistics on the confusion matrix rather than residuals (Baldi et al. 2000).\ncardinality of P is quite high so a complete ordering implies many, many relations (P \u00d7 P).", "1Note if we were evaluating classifiers we would base our statistics on the confusion matrix rather than residuals (Baldi et al. 2000)."]} +{"6898330|63137": ["including tabu search [69], ant algorithms [70], and particle swarm optimization [71]."]} +{"7359372|206778480": ["To perform defect prediction studies [21, 58], researchers have explored the use of various classification techniques to train defect prediction models [12, 34]."]} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} +{"3267041|206778480": []} +{"1421803|206778480": ["[7] found more than a quarter of relevant defect prediction studies, that is, 58 out of 208, made use of the NASA datasets)."]} +{"16339266|206778480": ["Nevertheless, we find that the optimal #boosting iterations parameter is 40, suggesting that the default parameter settings of the research toolkits are suboptimal for defect prediction datasets, which agrees with the suspicion of prior studies [15, 22, 51, 58].", "[15] show that unstable classification techniques may underperform due to the use of default parameter settings."]} +{"18607796|206778480": ["Rumelhart first proposed the backpropagating Artificial Neural Networks[10] in 1988."]} +{"1240096|206778480": ["Software Defect Prediction (SDP) is among the most studied and challenging problems in the \ufb01eld of software engineering [8]."]} +{"60955586|206778480": []} +{"60955586|1097238": []} +{"2739931|15273230": []} +{"12921267|206778480": ["We previously found (Hall et al. 2012) that Precision and Recall were the most commonly reported predictive performance measures used with binary2 fault prediction models (e.g. Arisholm et al. 2007; Catal et al. 2007; Denaro and Pezz\u00e8 2002; Koru and Liu 2005).", "These measures cover most of those reported by the 208 fault prediction studies we previously reviewed (Hall et al. 2012).", "Our previous work (Hall et al. 2012) showed that 208 software fault prediction studies were published between January 2000 and December 2010.", "We previously found (Hall et al. 2012) that Precision and Recall were the most commonly reported predictive performance measures used with binary2 fault prediction models (e.", "These were chosen for their simplicity, speed and varying performance (Hall et al. 2012)."]} +{"12921267|6923178": ["Matthews Correlation Coefficient (MCC) is a measure rarely used in software fault prediction (Baldi et al. 2000).", "MCC is more commonly used in medical research and bioinformatics e.g. Baldi et al. (2000), Sun et al. (2009).", "Matthews Correlation Coefficient (MCC) is a measure rarely used in software fault prediction (Baldi et al. 2000). MCC is more commonly used in medical research and bioinformatics e.g. Baldi et al. (2000), Sun et al."]} diff --git a/graph_5621151.jsonl b/edge/graph_5621151.jsonl similarity index 100% rename from graph_5621151.jsonl rename to edge/graph_5621151.jsonl diff --git a/edge/graph_56213914.jsonl b/edge/graph_56213914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56215831.jsonl b/edge/graph_56215831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5622647.jsonl b/edge/graph_5622647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56230679.jsonl b/edge/graph_56230679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e6957bb1be6b8632e088fd3a7d4b72272ce4d31 --- /dev/null +++ b/edge/graph_56230679.jsonl @@ -0,0 +1,2 @@ +{"17596069|763939": ["Since then, vehicular mobility simulators have been growing their complexity and features [7], allowing to accurately simulate the individual movement of vehicles over realistic road topologies."]} +{"15715088|2736673": []} diff --git a/edge/graph_56234151.jsonl b/edge/graph_56234151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbdc9cc73958aa7761b0d35e22f737d37f49c0c7 --- /dev/null +++ b/edge/graph_56234151.jsonl @@ -0,0 +1 @@ +{"6189414|3102110": ["We use the association analysis [7], [ 8 ] and temporal rules to enhance the performance of semantic concept detection for video data."]} diff --git a/edge/graph_56241705.jsonl b/edge/graph_56241705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b055719f3fe2e1806725f04a3e810f42747b51a9 --- /dev/null +++ b/edge/graph_56241705.jsonl @@ -0,0 +1,2 @@ +{"357788|7788290": ["For example, silhouette features are commonly used in human motion recognition (Cristian et al., 2005; Gavrila, 1999}."]} +{"18678873|53680608": ["KEYWORDS: Biometrics Technology, Live Face Detection, Fourier Spectra"]} diff --git a/edge/graph_5626535.jsonl b/edge/graph_5626535.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56275477.jsonl b/edge/graph_56275477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d153dd532599e7cb3b0469075d488de7bf9d1928 --- /dev/null +++ b/edge/graph_56275477.jsonl @@ -0,0 +1,7 @@ +{"62187146|3102110": []} +{"1327761|8197990": ["Detailed surveys on CBIR systems can be referred to (Del Bimbo, 1999; Aigrain et al., 1996; Chang et al., 1997; Gupta and Jain, 1997; Idris and Panchanathan, 1997; Rui et al., 1999; Smeulders et al., 2000; Goodrum, 2000; Shapiro and Stockman, 2001)."]} +{"18172995|15305793": ["The features of breast ultrasound images can be classified into four categories: texture, morphology, descriptor, and modelbased features [94].", "Model-based feature is a specific form of ultrasound features that emphasizes on the backscattered echo from breast tissue [94].", "Descriptor features are types of features that are based on the empirical classification criteria of the radiologist [94]."]} +{"53909728|1708582": []} +{"206592484|456491": []} +{"8643962|14415030": []} +{"5560810|393948": []} diff --git a/edge/graph_56276184.jsonl b/edge/graph_56276184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56279118.jsonl b/edge/graph_56279118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56281480.jsonl b/edge/graph_56281480.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_562855.jsonl b/edge/graph_562855.jsonl similarity index 100% rename from graph_562855.jsonl rename to edge/graph_562855.jsonl diff --git a/edge/graph_56293848.jsonl b/edge/graph_56293848.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5630105.jsonl b/edge/graph_5630105.jsonl similarity index 100% rename from graph_5630105.jsonl rename to edge/graph_5630105.jsonl diff --git a/edge/graph_56308297.jsonl b/edge/graph_56308297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..196a12c438f083ad6c322875e542e4e5a1e38e48 --- /dev/null +++ b/edge/graph_56308297.jsonl @@ -0,0 +1 @@ +{"195718377|33452313": ["Details including extensive Monte Carlo experiments, a case study concerning a logistic system in China, and the validation of the MSB assumptions are given in Kleijnen (2015, pp. 159(cid:150)172) and Shi and Kleijnen (2017).", "We base this tutorial on Kleijnen (2017), which is a recent review based on Kleijnen (2015)."]} diff --git a/edge/graph_56310912.jsonl b/edge/graph_56310912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56315668.jsonl b/edge/graph_56315668.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27d549ab63e0d607d2629aa8ed7986a37aee74c4 --- /dev/null +++ b/edge/graph_56315668.jsonl @@ -0,0 +1,3 @@ +{"2198139|5171123": ["Unfortunately, in real-world applications a face usually has only a very small number of training samples, which cannot convey many variations of the face [6\u201310]."]} +{"18128105|5171123": ["As holistic face recognition approaches, both FDA and PCA are very sensitive to pose variations [21], because in-depth rotations of 3D human faces almost always cause misalignment of image pixels which are the only classification clues for these holistic approaches.", "Although several survey papers [1, 3, 20, 21, 56, 89] and books [52, 78, 90] on face recognit io have been published which gave very good reviews on face recognition in general, there is no review specific on this challenging problem of face recognition across pose.", "In recent surveys of face recognition techniques [21, 89], po se variation was identified as one of the prominent unsolved problems in the research of face re ognition and it gains great interest in the computer vision and pattern recognition research co mmunity.", "Due to the observation that most of the general fac e re ognition approaches are sensitive to pose variations [21], a number of approaches have b een proposed to explicitly handle pose variations.", "For the recognition of faces from a single gallery per face , interested readers are redirected to a recent survey specifically on face recognition from a sing le allery image per person [21], though it"]} +{"18128105|16620699": ["We redirect the interested readers to the excellent reviews specifically on 3D face recognition [15,65]."]} diff --git a/edge/graph_56320671.jsonl b/edge/graph_56320671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56323527.jsonl b/edge/graph_56323527.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a3dec12932cad22c9a5c158f9f9a9155d944850 --- /dev/null +++ b/edge/graph_56323527.jsonl @@ -0,0 +1 @@ +{"33616517|207591146": []} diff --git a/edge/graph_56338028.jsonl b/edge/graph_56338028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56339487.jsonl b/edge/graph_56339487.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56343610.jsonl b/edge/graph_56343610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34e9bb8833f717006657a75a763282a02f694612 --- /dev/null +++ b/edge/graph_56343610.jsonl @@ -0,0 +1,3 @@ +{"207256461|12452682": ["In fact, CR should not be thought as being similar to generic MAC problems in existing wireless networks and limited to wireless resource allocation issues [34]."]} +{"207256461|8836911": ["According to Hamdaoui and Shin [28] and to Wang et al. [29], dedicating a piece of the spectrum as a \u2018\u2018common good\u2019\u2019 (the control channel) is an absolute necessity to achieve ef\ufb01cient spectrum access."]} +{"8034286|8909218": []} diff --git a/edge/graph_56346996.jsonl b/edge/graph_56346996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56363010.jsonl b/edge/graph_56363010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae9ec9cea9c5f29d49e2fade224a143644c3b031 --- /dev/null +++ b/edge/graph_56363010.jsonl @@ -0,0 +1,23 @@ +{"3815546|9576764": ["For instance, according to the survey result reported in [15], the iris and voice biometric traits were ranked highest in terms of perceived security protection, but lowest in terms of usability mainly due to high requirement of user cooperation."]} +{"17652082|2357830": ["This information may also be used to impersonate an NFC device via cloning [1]."]} +{"15782139|2762290": []} +{"15782139|6746689": []} +{"8947804|15782139": ["Thus, the FAR evaluation is difficult and generally imprecise [259], [377].", "Thus, automatic signature verification is particularly useful in all applications in which the authentication of both transaction and user is required [259], [326].", "The aim of these efforts is to facilitate the integration of signature verification technologies into other standard equipment to form complete solutions for a wide range of commercial applications such as banking, insurance, health care, ID security, document management, e-commerce, and retail point-of-sale (POS) [78], [259], [320].", "remains an interesting research area that encompasses not only those features produced by people with normal abilities but also those generated by people who suffer from disabilities and diseases that may lead to handwriting constraints [259].", "Moreover, verification by signature analysis requires no invasive measurements and people are familiar with the use of signatures in their daily life [259]."]} +{"8918672|6670217": ["and the recent surveys regarding mobile security [125], malware propagation modeling [166] and evolution [204], [242]."]} +{"8918672|15219853": []} +{"206489374|5313655": ["For an exhaustive review of works dealing with with cancelable biometrics and cryptobiometrics template protection for biometric characteristics other than signature, the reader is referred to [30], [31]."]} +{"62145023|15782139": ["Within biometrics, automatic signature verification has been an intense research area because of the social and legal acceptance and widespread use of the written signature as a personal authentication method [12]."]} +{"2739084|5313655": []} +{"8443300|15219853": ["Yampolskiy and Govindaraju [10], 2008 X x x x x x x x"]} +{"8443300|9913343": ["These methods are also deficient in dealing with various non-conventional attacks such as smudge attack [21], which picks up oils from users\u2019 skin to detect patterns or PINs, or a make conventional one such as the shoulder surfing attack, which uses direct observation techniques like glancing over the shoulder of a user to gain information [19].", "smudge attacks [21] and shoulder surfing attacks [19]), overcome evasions, and also be practical.", "weaknesses of the current security mechanisms are that they are easy to evade, weak against shoulder surfing and other attacks and cumbersome to use [19]."]} +{"8443300|17950466": ["example, FAR is defined as the percentage of impersonators who were incorrectly identified by security systems as genuine users [26].", "the shape and flow of one\u2019s handwriting, timing of keystrokes, unique patterns inherent in one\u2019s gait, speech and usage of styluses, and other features of one\u2019s general behavior [26].", "of biometrics, generally, is divided into two groups based on the type of application: identification and authentication [26]."]} +{"8000723|15782139": []} +{"7020176|9913343": ["login authentication methods, including textual and graphical passwords [5], public key infrastructure (PKI), and biometric authentication [6], have been utilized."]} +{"30274596|416565": ["For this reason, in the following sections we will follow the naming convention that is becoming standard in the field of biometric presentation attack detection (PAD) [1], as we think that a unified nomenclature and evaluation approach for presentation attacks on both physical and behavioural characteristics (i.e., mimicry) can be beneficial for the two areas.", "Following this main objective, the present article discusses different possibilities to report accuracy results in handwritten signature verification, which have been inspired by recent works and research carried out in the active field of biometric presentation attack detection (PAD) [8, 3, 6].", "While, in contrast, in biometric applications based on physical characteristics (e.g., fingerprint, iris, face), a specific PAD module is usually added to enhance the protection capabilities of the overall system.", "\u2022 On the other hand, the artifact used in a physical PA can be potentially detected at the sensor level or at the feature level by means of some of the many automatic PAD techniques that have been proposed in the literature [6] (also referred to as anti-spoofing or liveness detection methods).", "Given the peculiarities of mimicry, where no physical artefact is needed, only feature level PAD methods are feasible (see Fig.", "The output of this PAD module is used, on its own or in combination with the comparison score, to take a decision on the authenticity of the input sample.", "Over the last decade, plenty of attention has been given to the analysis of threats to biometric systems and the ways in which the resulting vulnerabilities should be evaluated [6]."]} +{"30274596|15782139": ["Among the various biometric modalities that have been considered so far for automatic personal recognition, handwritten signature has been given a significant amount of attention, with an expansive literature extending from the pioneering studies over 30 years ago to date [10, 12, 15, 16]."]} +{"17558010|15219853": []} +{"17983531|15782139": ["The present research work is related to a number of different areas within signature biometrics such as on-line and off-line monomodal signature verification [4,5] or synthetic handwritten signature generation [10,12,13].", "All these research efforts have been compiled in a number of comprehensive surveys that give a clear overview of the state of the art evolution from the first pioneering works in the 80 s to date [1\u20136]."]} +{"12892174|416565": ["This has been done with other modalities, such as fingerprint [11] or face [12]."]} +{"12892174|15782139": ["Different studies have shown that, using dynamic signature, a better performance is obtained than using static signature, even one order of magnitude better [1].", "These results are in the same order of magnitude of those reported in [1] and [17]."]} +{"3970974|15219853": ["The biometric measures are grouped into two main categories [5]: physiological biometrics and behavior biometrics."]} +{"86671410|15782139": ["A review can be seen in [2,4]\u2022 This paper proposes a new method for handwritten signature verification based on direction sequence string matching."]} diff --git a/edge/graph_56365822.jsonl b/edge/graph_56365822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56378467.jsonl b/edge/graph_56378467.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56387306.jsonl b/edge/graph_56387306.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56388359.jsonl b/edge/graph_56388359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56395997.jsonl b/edge/graph_56395997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a4469ff3c4ada4d176c12a3b6b3e3240f14d980 --- /dev/null +++ b/edge/graph_56395997.jsonl @@ -0,0 +1,11 @@ +{"119181148|15604179": []} +{"16254160|118527236": []} +{"16254160|15604179": []} +{"119573852|15604179": []} +{"14491758|118527236": []} +{"14491758|15604179": []} +{"121651181|15604179": ["Among others are game theory [1,16], multiagent models [12,17,23,24,28], measure theory [7,11], spin systems [9,15,26], and kinetic theory [5,6,10,14,21,27]."]} +{"122218031|15604179": []} +{"5853992|15604179": ["magnitude than a given threshold, that is, discussion under bounded confidence [6,8]."]} +{"98509975|9588126": ["The study of opinion dynamics aims to understand how collective opinion patterns change and individual opinion develops[10, 11, 12, 13, 14]."]} +{"98509975|15604179": ["The study of opinion dynamics aims to understand how collective opinion patterns change and individual opinion develops[10, 11, 12, 13, 14]."]} diff --git a/edge/graph_56398052.jsonl b/edge/graph_56398052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56398870.jsonl b/edge/graph_56398870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26a980d10787157c4cf46c55dfd56d6d57828fcb --- /dev/null +++ b/edge/graph_56398870.jsonl @@ -0,0 +1,2 @@ +{"2122433|192934": []} +{"16019647|192934": ["The reader may refer to [58,34] for excellent reviews on dimensionality reduction techniques."]} diff --git a/edge/graph_56421601.jsonl b/edge/graph_56421601.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56423389.jsonl b/edge/graph_56423389.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..844858199ce028eb64f933d97e688a2ca9a6d25b --- /dev/null +++ b/edge/graph_56423389.jsonl @@ -0,0 +1 @@ +{"1058297|41035405": []} diff --git a/edge/graph_56436651.jsonl b/edge/graph_56436651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f865d3f4c7fa7bb007fabf6f31d480b59b2365e7 --- /dev/null +++ b/edge/graph_56436651.jsonl @@ -0,0 +1,2 @@ +{"11672020|8253022": ["Currently, M2C lacks proper security standards or suffer compliance risks in cases where security standards are defined due to lack of governess for audits [9].", "Threats against secure interactions of this model can be classified into the following [9]:", "Due to high dependence of M2C on HTTP and REST architecture, the attacker can flood the web servers with HTTP requests [9].", "These threats include insecure API\u2019s which Clients use to access some of the services [9]."]} +{"4923474|3042864": ["Recent work shows that cloud-computing technology [3]\u2013[7] provides a promising opportunity to save the energy of mobile devices [8]\u2013[10]."]} diff --git a/edge/graph_56437369.jsonl b/edge/graph_56437369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56443231.jsonl b/edge/graph_56443231.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1461e1573784081a3f368338b8b807978a965177 --- /dev/null +++ b/edge/graph_56443231.jsonl @@ -0,0 +1 @@ +{"18559882|8125630": []} diff --git a/edge/graph_56448584.jsonl b/edge/graph_56448584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56449398.jsonl b/edge/graph_56449398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3357091ac0fadab683a4444b59396c8a462bb1ac --- /dev/null +++ b/edge/graph_56449398.jsonl @@ -0,0 +1,2 @@ +{"13750365|386036": []} +{"12527150|913718": ["Major research efforts have also been directed towards tackling some of the barriers to realising the semantic web mentioned in Section 1, and considerable progress has been made in areas such as ontology alignment (reconciling ontologies that describe overlapping domains) [18], ontology extraction (extracting ontologies from, e.", "One such problem is the tradeoff between conflicting requirements for expressive power in the language used for semantic annotations and scalability of the systems used to process them [7]; another is that integrating different ontologies may prove to be at least as hard as integrating the resources that they describe [18]."]} diff --git a/edge/graph_56450495.jsonl b/edge/graph_56450495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56453945.jsonl b/edge/graph_56453945.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56455744.jsonl b/edge/graph_56455744.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56465168.jsonl b/edge/graph_56465168.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5646762.jsonl b/edge/graph_5646762.jsonl similarity index 100% rename from graph_5646762.jsonl rename to edge/graph_5646762.jsonl diff --git a/edge/graph_56475910.jsonl b/edge/graph_56475910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..568fa7bf10aa2adb28567551e12cd3a9481c66d7 --- /dev/null +++ b/edge/graph_56475910.jsonl @@ -0,0 +1,13 @@ +{"24352132|14843594": ["The earliest meta-modeling approaches were based on genetic algorithms [9, 11, 13] or Bayesian optimization [2, 10]."]} +{"31959281|393948": []} +{"31959281|1708582": []} +{"14216084|14843594": ["differentiable model, which is preferable to the Gaussian kernel popular elsewhere, because it makes less restrictive 1Comprehensive tutorials are presented by Brochu et al. [17] and Shahriari et al. [18]. 2 smoothness assumptions, which can be helpful in the optimization setting [5]: k 5=2 (x;x 0) = 1 + p 5d (x;x0) + 5=3d2 (x;x0) e p 5d (x;x0): (1) Here, and are free parameters\u2014hyperparam"]} +{"1740355|1708582": []} +{"1740355|14843594": ["Bayesian optimization has also been used (Shahriari et al., 2016) for automatic selection of network architectures (Bergstra et al., 2013; Domhan et al., 2015) and hyperparameters (Snoek et al., 2012; Swersky et al., 2013)."]} +{"49884298|14843594": []} +{"4884302|393948": ["Through crafting inductive biases into neural network architectures, particularly that of hierarchical representations, machine-learning practitioners have made effective progress in addressing the curse of dimensionality [7].", "By means of representation learning, DRL can deal efficiently with the curse of dimensionality, unlike tabular and traditional nonparametric methods [7]."]} +{"4884302|1995121": []} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} +{"40430109|14843594": [", (Snoek et al., 2012; Shahriari et al., 2016)) in which we use an acquisition function, such as expected improvement or upper confidence bound, to rank the candidate models; this takes into account uncertainty in the prediction of a model\u2019s performance, which encourages us to try models for which our predictor may be unreliable."]} +{"206592484|456491": []} +{"4750571|10175374": ["at each task has an underlying feature hierarchy, and tasks are related through an a priori alignment of their respective hierarchies. These methods have been reviewed in more detail in previous work [29, 37]. Another existing approach adapts network structure by learning task hierarchies, though it still assumes this strong hierarchical feature alignment [26]. Soft ordering is a recent approach that avoi"]} diff --git a/edge/graph_56477769.jsonl b/edge/graph_56477769.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..555379bed7615ec38b0f463f488db112e32361bc --- /dev/null +++ b/edge/graph_56477769.jsonl @@ -0,0 +1,3 @@ +{"12376987|6863252": ["[32] a.", "Moreover, as a widely used similarity measure [30], the correlation coefficient is the optimal criterion for two images obtained with the same modality, when a linear relation is assumed between the signal intensities [32]."]} +{"12376987|206051485": ["In fact, the intensity-based similarity metrics merge the feature detection step and the matching step of the image registration [31], and can hence be operated in an automatic way [30]."]} +{"39306746|14866098": ["In the last few years, many classifiers have been proposed in the literature, some of which report excellent performance in classifying different motor and cognitive tasks for BCI applications [2]."]} diff --git a/edge/graph_56482343.jsonl b/edge/graph_56482343.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4133afa6532f3897bf6881ffe2549894d72b1f16 --- /dev/null +++ b/edge/graph_56482343.jsonl @@ -0,0 +1,9 @@ +{"10542545|10559330": ["The more specific objective of this exploration is identify solutions for the integration of QoS IP services [5][25] (resource reservation services), QoS negotiation [1] in the component container architecture, and study the container architecture to make it adaptable to other types of QoS supports\u2026"]} +{"17216162|8914588": ["Contributions on autonomic computing such as [9], [15] classifies systems with respect to the different ways of exerting control from an observer/controller pattern, and it provides a quantitative measure of the degree of autonomy, later transformed into the degree of selforganization."]} +{"6764542|8914588": ["As acknowledged by some authors [10], among the more"]} +{"945086|28577245": []} +{"53279786|206578365": ["A comprehensive overview of MEC is found in [107] that gives an introduction to features of MEC along with its paradigm shift from MCC."]} +{"53279786|3042864": ["The literature gives different definitions for MCC as explained in [80]."]} +{"21678018|8914588": ["v (on(n, s, v, f)\u00ac \u2022 (on(n, s, v, f))) \u21d2 t service = 0 \u239e\u239f\u239f\u23a0 (11)"]} +{"304534|14697846": ["According to [1], a peer-to-peer system is defined as a distributed system where the interconnected nodes are able to self-organize in an overlaynetwork (see Figure 4) for sharing resources such as CPU cycles, storage and bandwidth."]} +{"32505238|8914588": ["As acknowledged by some authors [8], the architectural model-driven approach is one of the most comprehensive and widely accepted strategies to develop complex systems such as CPS that change over time."]} diff --git a/edge/graph_56482358.jsonl b/edge/graph_56482358.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1900fc75c8b545db6d0b6e0181b289cf90dc170 --- /dev/null +++ b/edge/graph_56482358.jsonl @@ -0,0 +1,96 @@ +{"11577845|1708582": ["(13) The value iteration method requires (|A| |S|(2)) computations per iteration [11]."]} +{"52110745|15562587": ["The better performance of DNN over SVR observed in our numerical examples may be partly explained by the universal approximation property of DNN [15], which (roughly) says any function with reasonable regularity can be approximated with controlled errors by DNN with appropriate parameters."]} +{"52110745|17485266": ["Our implementation of SVR is based on the scikit-learn [21] package, and DNN regression on the TensorFlow [22] package.", "We test three variants: the plain SGD (GradientDescentOptimizer in TensorFlow), the momentum variant (MomentumOptimizer in TensorFlow), and the RMSProp variant (RMSPropOptimizer in TensorFlow) [23]."]} +{"52110745|9232391": ["1Other than the higher accuracy, DNN regression is more natural than SVR in handling the multi-output situation [13], in which the eye height and width can be predicted simultaneously through the same neural network without any additional change in the algorithm framework."]} +{"3317923|61132": ["Compared with single UAV sys\u00ad tems, \u201cMultiple UAVs can collaboratively complete mis\u00ad sions more efficiently and economically\u201d [2]."]} +{"4863692|5972227": ["Energy-efficiency in target tracking applications has been extensively studied in the WSN area; see [38] for an up-todate survey on the topic."]} +{"4863692|12817488": ["The communication-related approach aims at optimizing routing and aggregation techniques [42] as well as network self-organization [43]\u2013[45] to extend the network lifetime."]} +{"19340521|8363289": []} +{"51979761|3348390": ["In [19], context-aware computing for the IoT was comprehensively surveyed, while in [20] the design of a context-aware system for application in an industrial assembly environment was presented; this paper focused on the cognitive model for robot group controls."]} +{"3070125|30102381": ["[17], review several smart grid testbeds and they highlight the importance of being able to evaluate the coupled interaction between the physical and cyber components."]} +{"3070125|15895606": ["According to [36], it is possible to divide all elements in a CPS in three categories: i) Cyber: Elements that do not have direct contact with the physical world, ii) Physical, all the elements that are merely physical and do not have a direct relation with the cyber-elements, and iii) cyber-physical, all the devices that link the physical and the cyber world (e."]} +{"3070125|8854215": ["[12] summarize possible cyber-attacks at all the stages of grid."]} +{"3070125|1990579": ["Altawy and Youssef [33] survey various possible attacks that may affect privacy, and also discuss how several attacks like falsifying GPS information, or manipulating control commands can make the drones to malfunction.", "AlTawy and Youssef [20] consider the trade-offs in CPS, with a case study on implantable medical devices."]} +{"3070125|2521001": ["[15] focuses on electricity consumption at homes and buildings."]} +{"3070125|207209718": ["[41] propose a different classification of IDS, with two main groups: detection technique and audit material.", "[41] focus exclusively on the topic of intrusion detection systems for CPS."]} +{"3070125|23893450": ["[16] focuses on a taxonomy of the life cycle of smart grid data, which can be decomposed into four sequential stages: generation of data, acquisition, storage, and processing."]} +{"206578486|206578224": ["Reference [45] provides a survey of MEC."]} +{"206578486|6909107": [" data centers, using technologies such as OpenStack and ONOS [34]. Let us also stress that a few surveys that discuss mobile edge computing at large have been published in the very recent past (e.g., [35]). A. Cyber Foraging Cyber foraging is among the first concepts for edge computing but has now been superseded by more recent concepts such a cloudlet, MEC, and fog. We discuss it here because of its "]} +{"206578486|26429034": ["Such a characterization can be achieved through the analysis of corresponding real-world traces, through machine learning techniques [151], [158]."]} +{"206578486|7329149": ["For instance, Industrial IoT solutions [159] usually require low-latency ingestion but immediate processing of data [160]."]} +{"15895606|31245252": ["[95] comprehensively surveyed security and privacy, among other issues, in the Internet of Things (IoT)."]} +{"15895606|2521001": ["Not only should consumers\u2019 data be encrypted, but anonymization techniques are also desired to prevent inference and other attacks from deducing patterns from the encrypted data to reveal private information [79], [114]."]} +{"15895606|207209718": ["For example, Intrusion Detection Systems (IDS) should be time-critical so that long delays are intolerable [112].", "They also provide a comprehensive survey on IDS solutions in CPS applications [112].", "For further analysis of the current ICS-speci\ufb01c IDS solutions, we refer you to [5], [7], [19], [81], [82], [112], [171]."]} +{"15895606|4528002": ["However, it is more costly and less likely to widespread in the near future [149].", "Steer-, Drive, Brake-, Shift-, and Throttle-by-wire are all examples of this trend [149]."]} +{"15895606|595093": []} +{"2630642|1708582": []} +{"14995991|1230643": []} +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"17934515|7085121": ["As an important complement to vehicular networking, wireless sensor networks (WSNs) also have been deployed along the roadside to enhance traffic safety and efficiency [41]\u2013[43]."]} +{"17934515|763939": ["Some other reviews were stated from the special aspects: such as communication protocols for green environment [24], mobility models in VANET [18], and simulators develop-"]} +{"26790826|1708582": []} +{"3384941|15675156": ["In recent years, many control methods have been successfully applied to quadrotor UAVs, such as PID/PD controllers [2], [3], [10], [18], linear quadratic optimal control algorithms [4], [5], backstepping and sliding-mode techniques [6], [7], [14]."]} +{"30575113|61132": []} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"13819558|61132": []} +{"3868376|206578365": ["With MEC, cloud-like computing functionalities are provided at the edge of wireless networks such as cellular base stations (BSs) [4].", "We assume that the computation tasks can be arbitrarily partitioned into smaller-size subtasks that can be of\ufb02oaded to different GBSs and executed in parallel [4]."]} +{"1990579|21386749": ["On one hand, the nature of the exchange information makes IMDs critically vulnerable to a wide range of threats that may affect the patient\u2019s life [10], [24], [25], and thus the necessity for controlling their access using authentication protocols is absolute."]} +{"1990579|485843": ["These systems include smart power grids [29] which are dynamic and interactive infrastructures that combine high speed communication and monitoring technologies with millions of power equipments to provide efficient energy management such as advanced metering [29], and demand and response capabilities [29], [30].", "For example, during the process of efficient power distribution in smart grids, an analysis of the power consumption among residential and industrial areas is performed [29].", "Though it does not affect the functionality of the infrastructure, such information can be used to determine the valuable contents of a specific property, and to even predict the timings at which it is empty and thus, vulnerable for property theft [29]."]} +{"1990579|17516538": ["The captured footage can be considered as surveillance material which can be leaked and used against the will of the individuals appearing in this footage [34]."]} +{"16419875|121289": ["the backbone of bandwidth, reliability, and interconnection of smart grids [87]."]} +{"16419875|14240886": ["In South Korea, a $65 million program is held to fully integrate a smart grid for 6000 homes with series of wind farms and distribution lines [70]."]} +{"53743305|61132": ["The third category considers using the UAVs as BSs to serve the mobile UEs, where UAVs are usually all connected to and controlled by control stations [19]."]} +{"23313210|18148591": ["Use of antenna arrays with multiple-input-multiple-output (MIMO) signal processing techniques has been known to give tremendous improvements in the performance of point-to-point communication links [3]."]} +{"505889|61132": ["It was shown in [4] that the power consumed in the BS can limit the flying time of the UAV-BS by 16%.", "UAVs often use batteries to power their rotors and onboard electronics [4]."]} +{"5073845|1708582": ["Reinforcement learning ( rl ) [10], [17] presents a natural framework for the development of such policies by trial and error in the process of interaction with the environment.", "We assume standard Markov decision process mdp setup [10]."]} +{"16095238|5660618": []} +{"49731727|15675156": []} +{"49731727|5660618": []} +{"25235935|61132": ["Given their low cost, flexible maneuvering capability, and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including aerial mapping, disaster rescue, agricultural irrigation, and military surveillance and attack [1]."]} +{"8854215|595093": []} +{"8854215|121289": []} +{"61132|29398427": []} +{"61132|14536942": ["It must, however be mentioned that it is not just at the physical layer that the devices can be designed to save energy but also at the data link and network layers [78].", "SOFA manages to reduce such energy wastage by maximizing the total sleep time of all clients [78], [96]."]} +{"61132|1762301": ["Some protocols that introduce the concept of cluster heads introduce performance issues and single point of failure [32].", "side is that it relies on periodic routing table updates and generates more traffic than protocols that send updates when the network topology changes [32].", "neighbors through the use of beaconing messages [8], [32]."]} +{"48364286|206578365": ["Thus, MEC has the potential to provide low-latency services, to save energy for mobile users, and to achieve high security [2].", "These services normally require a massive number of size-constrained and low-power mobile devices to perform computation-intensive and latency-sensitive tasks [2].", "Recently, MEC has received an ever-increasing level of attention from industry and academia since it can significantly improve the computation capability of mobile devices in a cost-effective and energy-saving manner [2].", "Mobile edge computing (MEC) and wireless power transfer (WPT) have been deemed two promising technologies to tackle the above mentioned challenges [2]\u2013[4]."]} +{"48364286|22833814": ["Furthermore, UAV-assisted architectures can provide flexible deployment and low operational costs, and are particularly helpful in the situations that the conventional communication systems are destroyed by natural disasters [26]\u2013[32].", "Similar to [27]\u2013[32], it is assumed that the wireless channel between the UAV and each user is dominated by LOS."]} +{"48364286|12029139": ["On the other hand, WPT can provide low-power mobile devices with sustainable and cost-effective energy supply by using radio-frequency (RF) signals [3]."]} +{"49866625|16362395": ["[67].", "ever, in pursuit of increasing degrees of freedom, the majority of developers used multiclass classifiers to map complex MI tasks11 into several output control commands for the aircraft [65], [67].", "classifiers, neural networks, nearest neighbor classifiers, and any combination of these classifiers [67]."]} +{"49866625|5503545": []} +{"12595993|35426346": []} +{"12595993|10500613": []} +{"53035780|51877788": ["Moreover the introduction of Internet of Things (IoT) will enhance the applications of UAV systems [46]; on the other hand, the integration into IoT systems can enlarge the vulnerability surfaces of UAVs systems, because the IoT systems have several attack surfaces [225]."]} +{"53035780|51858916": ["In [45], a recent survey studies only the channel modeling of UAV communications."]} +{"53035780|2958701": [", turn left, turn right, rotate left, and rotate right) [247]\u2013[249].", "For the flight control of UAVs, the inputs of the learning can be images, light imaging detection and ranging sensor data, or both [247]."]} +{"53035780|61132": ["In this way, facilitating the detection of complex events such as border intrusions [8], pipeline failures, public security, and vegetation analysis [9].", "An elaborate discussion of issues related to UAV communication have been presented in previous work [8], [14].", "such as quality of service and data requirements, we refer the reader to [8], [14] and the references therein.", "Moreover, the implementation of routing protocol cannot be straightforward in such networks [8], [14].", "Similar to [8], [14] focuses on the networking side of UAV by comparing UAV networks, mobile ad-hoc networks, and vehicular ad hoc networks.", "Topics such as routing protocols and handovers are thoroughly investigated in [8].", "Another main design challenge is to provide the users\u2019 sessions seamlessly and to consider delay tolerance, energy limitations, communication range, and controlling and coordination requirements [8], [14]."]} +{"53035780|15517134": ["ize an operational collision avoidance scheme, the following design challenges should be considered [136].", "The functionality of collision avoidance in UAVs systems is to guarantee that no collisions occur with other UAVs and/or the targets [136]."]} +{"53035780|15675156": ["Both methodologies delivered average results, but the PID was operated for a quadrotor with simplified dynamics, whereas the LQR was operated for a complete quadrotor model [236].", "The main drawback of this approach is related to robustness deficiencies [236], [238].", "2) Linear Quadratic Regulator (LQR): LQR is a control algorithm that works in a dynamic system to decrease a suitable cost function [236].", "A previous research [237] compared the performance of LQR and PID for a quadrotor UAV (as presented in [237] and [236], respectively).", "1) Sliding Mode Control (SMC): SMC, which is based on Lyapunov stability principles, is a nonlinear control method that forces a system to slide along a recommended path by using a discontinuous control signal [236]."]} +{"53035780|16120075": ["Within the paradigm of WSNs, [39] presents a study on the coverage problem when the sensors are equipped with cameras for video surveillance applications but up to 2010 only.", "Since the general coverage problem with most of its variants are proven to be NP-Hard [39] , [57], all work in this area is based on developing heuristic algorithms that require low complexity, especially if target tracking is part of the objective.", "Similarly, [39, 40] provide a review of the coverage problem in WSNs but up to 2008 only.", "Target coverage maximization is generally NP-complete for most variations, e.g., [39] and [57]."]} +{"53035780|6959212": ["system [39]\u2013[41]."]} +{"53035780|1517662": ["Collision estimation techniques include distance-based, actas-seen [125], probabilistic estimation [126] and worst case estimation [127].", "For further details on collision avoidance techniques, we refer the readers to [127], [133]\u2013[138] and the references therein."]} +{"1966145|61132": ["[8] reviewed some of the research efforts aiming at turning multi-UAV systems into robust context-specific networks.", "For example, UAVs are projected to provide an infrastructure for, among other things, delivering goods that will be so pervasive to a point that virtually, every smart device can be the target of UAV-supplied value-added services [8]."]} +{"53046224|206578365": ["Especially, SIoV also significantly benefits from MEC applications by deploying high-performance computation and geo-distributed servers at roadside RSUs [14]\u2013[16].", "To alleviate the workloads at roadside RSUs and reduce the costs of deployed RSUs, unmanned aerial vehicles (UAV) assisted MEC as flying RSUs has been proposed to improve computation performance owing to their low cost and flexible deployment [16]\u2013[20].", "To resolve this issue, mobile edge computing (MEC) has been recognized as a cost-effective method to enhance the computation capability in proximity to mobile devices [16]."]} +{"5177929|1230643": []} +{"5177929|1708582": []} +{"12092512|1990579": ["In the case of civilian drones, functional safety [AlTawy and Youssef 2016] needs cyber-physical security."]} +{"12092512|206459491": ["Also, regular side-channel analysis, including timing and power analysis, may be used for the detection of the activation of hardware trojans [Tehranipoor and Koushanfar 2010] because such trojans usually alter the system\u2019s parametric characteristics such as its expected performance and power\u2026"]} +{"516517|1932843": ["last step the agent decided to take [9]."]} +{"30102381|2521001": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|485843": []} +{"30102381|595093": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|5747564": ["Moreover, the advent of smart grid with extensive communication capabilities [11]\u2013[14] yield new security vulnerabilities due to a high dependency on cyber information."]} +{"30102381|121289": []} +{"421621|1708582": ["In order to get the compromise between route exploitationexploration and following a common approach in RL methods [6], the actual forwarding node is selected at random among TABLE 3: COST METRIC OF Ni\u2019S NEIGHBOR NODES.", "The \u201cQ\u201d term stems from the Q-learning strategy in RL [6]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"57035509|1708582": ["Most work in reinforcement learning adopts a Markov decision process view of the problem [57], [32]."]} +{"3727688|1230643": ["(3) Another important factor is communication failures, which are very common in wireless sensor networks [1]."]} diff --git a/edge/graph_56482393.jsonl b/edge/graph_56482393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2cd8c6718710a72b53f270b0839eae295f48fca6 --- /dev/null +++ b/edge/graph_56482393.jsonl @@ -0,0 +1,10 @@ +{"38672737|7360895": ["In this new generation of robots the focus is on the ability of interacting with humans in a socially natural way [1, 2]."]} +{"14656073|7360895": ["In a 2004 CHI workshop [1], it was proposed that robotic pets represent part of a new genre for human-computer interaction \u2013 that of \u201csocial robots.\u201d According to Dautenhahn [4, 5 ], Breazeal [3], and others, social robots are computational artifacts that, to varying degrees, have some constellation of the following characteristics: they are personified, embodied, adaptive, and autonomous; and they can learn, communicate, use natural cues, ..."]} +{"26587504|7360895": []} +{"17599779|11704555": []} +{"2812885|7360895": []} +{"5973860|7360895": []} +{"51889869|7360895": []} +{"9936032|7360895": ["The combination of a caricatured and zoomorphic [14] representation of a elephant-like animal is more useful and effective to accomplish our goals, rather than using more complex, realistic representations."]} +{"195986862|15552414": []} +{"11466503|7665100": ["Robots are predicted to be an integral part of the human workforce [6, 10], working side-by-side with human employees in a variety of jobs, such as manufacturing, construction, health care, retail, service, and office work."]} diff --git a/edge/graph_56482400.jsonl b/edge/graph_56482400.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56482844.jsonl b/edge/graph_56482844.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67a2ec9c81c832f3df89d2036c237403a78e8b04 --- /dev/null +++ b/edge/graph_56482844.jsonl @@ -0,0 +1,7 @@ +{"17632086|16844049": []} +{"10724558|14889616": ["Instead of SVC-encoded multimedia content, we use AVC-encoded multimedia content since it is the most used video coding standard in conjunction with DASH.", "We further assume that the server provides SVC-encoded multimedia content with the following three layers/bitrates: {L0 = 640 kbps, L0+L1 = 995 kbps, L0+L1+L2 = 1400 kbps}.", "SVC offers the possibility to encode video content into a base layer and several enhancement layers.", "We adopt the adaptation logic described in [18] which uses a deadline-based approach for selecting the appropriate representation and is optimized for SVC content.", "For our experiments we use MPEG-DASH-compliant multimedia content that is encoded using Scalable Video Coding (SVC) [15].", "As test content we use MPEG-DASH-compliant SVC-encoded multimedia content with a segment size of two seconds.", "Lederer et al. [9], [10] investigated the performance of pull-based DAS using multiple links and the benefits of SVC in CCN/NDN (CCN is a concrete implementation of ICN).", "The multimedia content is taken from the SVC dataset [27]."]} +{"7482876|12681089": ["A complete description of the channel is therefore given by the time-variant channel impulse response [2]."]} +{"6645760|1252121": ["Inter-domain routing is strongly affected by business relationships between the involved parties and is an area of active research even in the context of the current Internet architecture [79]."]} +{"8207496|5991584": ["Prefix attestation has also been proposed to prevent IP prefix hijacking in inter-domain [9, 19, 20, 28, 31] and intra-domain [25, 29] IP routing.", "We compare our approach with a signature based mechanism adopted in most of the prefix attestation proposals [9, 19, 20, 28, 31, 34]."]} +{"6438719|14441987": []} +{"22370964|3583771": ["However, user feedback has the potential of excluding valid content, as explained in [11]."]} diff --git a/edge/graph_56486927.jsonl b/edge/graph_56486927.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0be775ea013c8a90bda76c07812900dbcf244e0c --- /dev/null +++ b/edge/graph_56486927.jsonl @@ -0,0 +1 @@ +{"28704715|14776754": ["1, the shaping filter in the transmitter can be treated as a process of an original continuous-time signal being windowed by an up-sampled finite impulse response filter (FIR).", "Similarly, the corresponding matching filter in the receiver can be treated as a process of recovering the original signal symbol by a down-sampled FIR [9]."]} diff --git a/edge/graph_56486934.jsonl b/edge/graph_56486934.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a005a4690468588d5f81fbb8385cd3bffdf10ef --- /dev/null +++ b/edge/graph_56486934.jsonl @@ -0,0 +1 @@ +{"114929654|56486934": []} diff --git a/edge/graph_56487653.jsonl b/edge/graph_56487653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9daace4792db63342eccbde01ac1dd9e315192f8 --- /dev/null +++ b/edge/graph_56487653.jsonl @@ -0,0 +1,10 @@ +{"16859955|15199849": ["They are also application dependent and primarily designed for real-time collection and analysis of low level data in hostile environments [3]."]} +{"22586760|16084499": []} +{"18823937|2357830": ["Side channel attacks can be broadly classified as invasive and non-invasive attacks [1]."]} +{"62295139|3734874": []} +{"11472225|7988320": ["Access to medical devices is a common problem that limits researchers\u2019 ability to validate prior results; food-grade meat as a phantom also complicates reproducibility due to its inaccurate approximation of a human body [8], [21]."]} +{"11472225|6332923": ["The system should also satisfy data origin authentication; the source of any received data should be verifiable."]} +{"51889596|31245252": []} +{"2043801|14678574": []} +{"2043801|3815882": []} +{"46984694|5476476": ["11 WiFi [6], [7], [8]."]} diff --git a/edge/graph_56493614.jsonl b/edge/graph_56493614.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5650180.jsonl b/edge/graph_5650180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56517255.jsonl b/edge/graph_56517255.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..254426a1d8d4b9267c0879673f1fb98dd6e36a4d --- /dev/null +++ b/edge/graph_56517255.jsonl @@ -0,0 +1 @@ +{"13978238|1734833": ["Finally, data from wearable sensors was found to be valuable for user activity recognition and health monitoring (Banaee, Ahmed, and Loutfi 2013); this shows its potential towards individual wellness profile learning."]} diff --git a/edge/graph_56517517.jsonl b/edge/graph_56517517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..98cefb412d525d22f785367b8ad5913215bf5c58 --- /dev/null +++ b/edge/graph_56517517.jsonl @@ -0,0 +1,12 @@ +{"207238980|393948": []} +{"207238980|11608263": ["In a typical node classification task, we are interested in predicting the most probable labels of nodes in a network [33]."]} +{"3495200|207591052": ["Our work builds upon the recent \ufb01eld of using machine learning for source code artifacts (Allamanis et al., 2017).", "The advent of large repositories of source code as well as scalable machine learning methods naturally leads to the idea of \u201cbig code\u201d, i.e. , largely unsupervised methods that support software engineers by generalizing from existing source code (Allamanis et al., 2017)."]} +{"2476229|8310135": ["Recently, Huang et al. (2015) showed that building a conditional random \ufb01eld (CRF) layer on top of bidirectional LSTM-RNNs performs comparably to the state-of-the-art methods in the part-of-speech (POS) tagging, chunking, and NER.", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and\u2026", "Traditional systems treat this task as a pipeline of two separated tasks, i.e., named entity recognition (NER) (Nadeau and Sekine, 2007; Ratinov and Roth, 2009) and relation extraction (Zelenko et al., 2003; Zhou et al., 2005), but recent studies show that end-to-end (joint) modeling of entity and relation is important for high performance (Li and Ji, 2014; Miwa and Sasaki, 2014) since relations interact closely with entity information.", "LSTM-RNNs have been widely used for sequential labeling, such as clause identi\ufb01cation (Ham-merton, 2001), phonetic labeling (Graves and Schmidhuber, 2005), and NER (Hammerton, 2003)."]} +{"6925519|9588126": ["Th re i a rich liter ture on ulti-agent reinforc ent learning (MARL) [1], particularly in the robotics domain [18, 25, 5, 21, 2]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"196648763|13370607": []} +{"27180836|12161567": ["Although a knowledge base contains millions of such triplets, it is known to suffer from incompleteness [Nickel et al., 2016]."]} +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"206595534|11746788": ["The task of Visual Question Answering has received growing interest in the recent years (see [17, 4, 25] for example)."]} +{"207238964|393948": ["Representation learning has long been an important problem of machine learning and many works aim at learning representations for samples [3, 35]."]} +{"8168187|11608263": ["Among image classification tasks, multi-label classification aims at predicting multiple labels for an input image, whcih can be achieved by the technique of binary relevance [44] using neural networks.", "In general, binary relevance [44] is the simplest solution to multi-label classification problems, which coverts the original task to multiple disjoint binary classification problems."]} diff --git a/edge/graph_56523767.jsonl b/edge/graph_56523767.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56541930.jsonl b/edge/graph_56541930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a441bb7dc2cca62b8480b7c38298a41c14ad89a --- /dev/null +++ b/edge/graph_56541930.jsonl @@ -0,0 +1,7 @@ +{"13763533|13034818": ["A promising solution to this problem is Nonvolatile Memory (NVM) [Burr et al. 2008]."]} +{"24786243|14043655": []} +{"24786243|3932089": ["Thanks to its characteristics, ReRAM is supposed to integrate many application domains such as consumer electronics, personal computers, medical applications, space, and automotive applications (Meena et al. 2014)."]} +{"24786243|13034818": ["\u2026of the strongest early candidates (Burr et al. 2008) for the NVM of the future, namely, low latency (as low as that of DRAM), reported to be 20ns (Burr et al. 2008), low power consumption, an erase-less write operation, and the possibility of a straightforward CMOS integration (Kato et al. 2005).", "FeRAM exhibits some very attractive properties that made it one of the strongest early candidates (Burr et al. 2008) for the NVM of the future, namely, low latency (as low as that of DRAM), reported to be 20ns (Burr et al. 2008), low power consumption, an erase-less write operation, and the\u2026"]} +{"24786243|14583671": ["These are summarized in Mittal et al. (2015b):\n4.3.1 Relaxing Non-volatility.", "Some other very interesting surveys such as that by Mittal et al. (2015b) are more about a specific level of the memory hierarchy (in this case, about cache), or about the software optimizations that were employed (Mittal and Vetter 2016).", "Pub. date: November 2017.\nfor instance, for an integration in the first levels of the processor cache as the write traffic is very heavy (Mittal et al. 2015b).", "NVMs integrated in CPU caches are intended more for use in the last-level cache than in other levels of cache (Mittal et al. 2015b).", "However, in some other studies the best endurance test yielded a value of less than 4 \u00d7 1012 (Mittal et al. 2015b; Huai 2008)."]} +{"8972421|206743327": ["Now there are many software packages providing storage management and compute engines [17]."]} +{"61531625|2256372": ["In 1989, Satyanarayanan [20] provides a taxonomy about the different issues a DFS can meet and must solve."]} diff --git a/edge/graph_5655753.jsonl b/edge/graph_5655753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56594500.jsonl b/edge/graph_56594500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63fb73f8ab2f5077e95df661b92448f9530c85a4 --- /dev/null +++ b/edge/graph_56594500.jsonl @@ -0,0 +1,7 @@ +{"5278368|37664642": ["In order to establish a fair comparison between the 945 algorithms and to detect significant differences, statistical tests can be applied (Peralta et al., 2015).", "The optimum value for R100 and ZeroR is 1 (Peralta et al., 2015).", "Email addresses: khodadoust.j@gmail.com (Javad\nKhodadoust), khodadoust.a.m@gmail.com (Ali Mohammad Khodadoust)\n2009; Peralta et al., 2015)."]} +{"5278368|191396": ["There are several methods to measure of proximity, similarity or dissim-\nilarity, of quantitative feature vectors (Xu & Wunsch, 2005)."]} +{"30208305|1596835": ["Fortunately, several new approaches [6, 7, 8] incorporating data-driven learning methods in development of ad-"]} +{"18600985|14674468": ["[55] which provides a comprehensive study on human and automated analysis of race classification."]} +{"18600985|2301292": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"18600985|5238287": ["To reduce dimensionality (a critical step for obtaining better gender estimation accuracy [177]), often, the human silhouette is extracted and a statistical feature - namely an average silhouette - is computed."]} +{"18600985|14303607": ["Interesting work can be found in related survey papers [212], [273], [274]."]} diff --git a/edge/graph_56596238.jsonl b/edge/graph_56596238.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c0d6dc15050d4bc17d9c871b2e9cbd2e50314c6 --- /dev/null +++ b/edge/graph_56596238.jsonl @@ -0,0 +1,70 @@ +{"22094540|25929315": []} +{"12339795|25929315": ["In such cases, the LTE random access channel (RACH) becomes overloaded by thousands of simultaneous access attempts [3]."]} +{"19650302|25929315": []} +{"6375309|25929315": ["A comprehensive performance evaluation of the energy efficiency of the random access mechanism of LTE and its role for M2M is provided [21].", "Similar to [21], [22], we study an energy-efficient design for M2M uplink where devices perform multi-hop transmissions."]} +{"13959048|25929315": ["It causes failures of the RA because of heavy contention among a massive number of IoT devices [3], [4]."]} +{"34653334|17262196": []} +{"34653334|29060869": []} +{"34653334|2871699": []} +{"29095814|25929315": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"4801436|25929315": ["Moreover, out of the four steps of the random access process of LTE standard [29], the success of contention is mainly determined by the \ufb01rst step [3], [5].", "For LTE networks, the random access process is designed based on Aloha [5], the simplest and one of the most representative random-access schemes."]} +{"35443637|25929315": []} +{"32619279|25929315": [", tree algorithms [2], [5], [14], and extensions of our framework for assessing other burst arrival patterns (Beta or uniform [3]) are necessary.", "For many M2M scenarios, connection establishment dominates the end-to-end delays, hence, creating a bottleneck in the Random Access CHannel (RACH) even before the actual data transmission begins [2].", "developed [2], for instance, by means of back-off or barring, e."]} +{"5953482|2871699": ["Recently, comprehensive studies have been launched over the last few years to explore the RAN overload issue for M2M communications [19]."]} +{"5953482|25929315": []} +{"10529520|25929315": ["Additional solutions have been proposed in the literature to overcome access congestions, some of these solutions has been compared in [16]."]} +{"11961832|9862516": ["well as other characteristics of cellular, wireless local area network, and RFID technologies are much different from each other [20]."]} +{"22617994|25929315": ["In fact, signi cant amount of research effort has been spent on the random access protocol to achieve high spectral ef ciency when a massive number of M2M devices attempt to deliver their data to BS [3].", "Among many random access protocols presented in [3], Framed ALOHA has been one of the most representative protocols to manage the access from autonomous devices thanks to its simplicity."]} +{"31341016|2871699": []} +{"31341016|3330461": []} +{"15910685|25929315": ["In the estimation phase the number of arrivals is estimated and this information is used to tune the amount of resources allocated in the serving phase."]} +{"10002283|25929315": ["However, most of recent literatures work toward the capacity evaluation based on which congestion control measures can be derived [5], [9]."]} +{"53046331|50776107": []} +{"53046331|21705502": []} +{"53046331|51988843": []} +{"53046331|25891793": []} +{"53046331|206578224": []} +{"53046331|3461906": []} +{"53046331|15895606": []} +{"53046331|5385031": []} +{"53046331|4427557": []} +{"53046331|16313703": []} +{"53046331|19636511": []} +{"53046331|15449163": []} +{"53046331|2871699": []} +{"53046331|3330461": []} +{"53046331|3818445": []} +{"53046331|17934515": []} +{"53046331|25929315": []} +{"39316327|25929315": ["INTRODUCTION As the development of Internet of Things (IoT) [1], machine-to-machine (M2M) communication is expected to be one of the major drivers of cellular networks [2] [3], which has been concerned in 3rd Generation Partnership Project (3GPP) [4], [5].", "The Random Access Procedure The devices apply for the preambles will attempt the contention-based random access (RA) procedure consists of a four-message handshake with the eNB [3]."]} +{"21668528|25929315": []} +{"42237334|25929315": []} +{"30505590|25929315": []} +{"3466653|25929315": ["When two or more nodes select identical preambles and send them at the same time, there could be a collision."]} +{"36698537|14745481": []} +{"36698537|17205659": ["Although many stateof-the-art solutions have been proposed earlier in areas such as mobile ad hoc networks (Djenouri and Badache, 2005; Cho and Chen, 2011), and wireless sensor networks (Yong Wang and Ramamurthy, 2006), still M2M paradigm may require new approaches to security."]} +{"36698537|1236072": []} +{"7361973|25929315": []} +{"3398158|25929315": ["In such case, the MTD is said to be \u2018\u2018blocked\u2019\u2019 from accessing the network [5].", "On the contrary, the CRQ protocol can theoretically support an unlimited number of devices [5].", "Recent studies have pointed out that in such scenario, the LTE RACH may experience heavy congestion, leading to very low access success probability [5]."]} +{"34009193|25929315": ["We assume that the RA slots is equal to \u03c41 = 1 (msec) [10], and that the eNodeB is able to recognize the success of a certain RAP transmission \u03c41 + \u03c42 + \u03c43 = 7 slots after receiving the RAP.", "In eNodeB, RACH appears every x (msec) for 1 \u2264 x \u2264 20 [10], which depends on the serving area of the eNodeB and its traffic load."]} +{"18003899|25929315": ["Index Terms\u2014M2M communications, Random access, Preamble collision, PRACH\nI. INTRODUCTION\nRandom access (RA) is identified as a key issue in M2M communications[1]."]} +{"7860535|3330461": []} +{"7860535|25929315": []} +{"18876270|1588237": ["1) Enhancing Cell-Edge M2M Devices: Delgado-Luque et al. in [74] investigate two intercell interference techniques, namely partial frequency reuse (PFR), and nonprecoded joint transmission (nonprecoded JT), [84], for cell-edged M2M devices."]} +{"10370250|25929315": ["Specifically, the SystemInformationBlockType2 (SIB2) includes, among other parameters, the periodicity of the time/frequency resources in which preamble transmissions are allowed (random access opportunities, RAOs) [4], [10], [26], [30].", "While the data packets sent by these UEs are small in size, the large number of access requests may exceed the signaling capabilities of the eNBs, which leads to severe network congestion and to the loss of potentially critical information [9], [10]."]} +{"15650114|25929315": []} +{"7634310|25929315": ["Various works have been proposed to improve the performance of LTE networks serving MTC devices [10]."]} +{"3166491|2509135": []} +{"20986009|12029139": ["Cooperative relaying techniques can improve network coverage and are fully compatible with the SWIPT protocol.", "Since wireless signal can transport information as well as energy, simultaneously wireless information and power transfer (SWIPT) [5] strategies enable relays to perform energy harvesting and information gathering from the same signal radiated by the source.", "SWIPT in an orthogonal frequency division multiplexing (OFDM) relaying system is considered in [11], where a source transmits energy and information simultaneously to a relay and a relay retransmits the information to the destination with a power splitting based relaying protocol.", "The devices conduct energy harvesting via the SWIPT strategy which dually utilizes RF signal for information reception.", "Since the receiver cannot share the same portion of signal energy for both harvesting energy and extracting information, a more practical SWIPT protocol named on-off power splitting protocol for a point-to-point link is proposed in [9], which splits the received signal for energy harvesting and information processing with an adjustable power level.", "The idea of SWIPT is first proposed by Varshney in [8], and the tradeoff between energy harvesting and information transmission over one single noisy channel is characterized.", "[5] proposed a social-aware cooperative device-to-device (D2D) protocol that promotes the use of friendly users as relay and they also proved that exploiting social awareness can reduce the energy consumption of cooperative communication.", "SWIPT for large\nscale networks with multiple source-destination pairs is more complex and practical as the interference among devices needs to be considered.", "However, the aforementioned literatures only consider SWIPT for a single source-destination pair."]} +{"20986009|12060835": ["As for energy supply, energy harvesting through wireless radio frequency (RF) is promising in generating small amount of convenient electrical power for wireless devices [3], [4].", "In this paper, two representative performance metrics including outage probability and network throughput are characterized [3], which are defined as follows."]} +{"28346840|25929315": []} +{"12017702|1230643": ["Under this paradigm, a huge amount of devices [3] are trying to transmit small size packets."]} +{"12017702|25929315": []} +{"20684702|25929315": []} +{"9476753|25929315": ["Up to six different configuration indexes provided by the LTE standards are described in [14] having various number of RA-slots per frame ranging from a minimum of 1 RA-slots every other frame to the maximum of 1 RA-slots every 1ms (i.", "This paper considers the contention based RA which is used by the UE in an idle state to establish connection with the eNB using the following four steps [14], as shown in figure 1.", "In LTE standards the Random Access (RA) procedure [13] is performed by the UE due to the following reasons [14]: for the initial access of an idle UE, for UE to re-establish failed radio links, for handover, for out of time synchronisation DL data transmission and out of time synchronisation UL data transmission."]} +{"24334533|8909218": ["In LTE-A, stations can be configured as evolved universal terrestrial radio access (E-UTRA) NodeBs (eNBs) in macrocells or picocells, home eNBs (HeNBs) in femtocells [5]\u2013[7], and relay nodes (RNs) in relay networks to provide comprehensive wireless access in both outdoor and indoor environments."]} +{"24334533|25929315": ["To support M2M communications in LTE/LTE-A, the following solutions have been proposed for controlling PRACH overload [46], [47]."]} diff --git a/edge/graph_56596540.jsonl b/edge/graph_56596540.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e3a39e3df4a9dfe1f268406a3adde7b7c08d05d --- /dev/null +++ b/edge/graph_56596540.jsonl @@ -0,0 +1 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/edge/graph_56597218.jsonl b/edge/graph_56597218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93dd31c0b4bf56ed6a9fb4494b4de78e2fb8b14d --- /dev/null +++ b/edge/graph_56597218.jsonl @@ -0,0 +1,24 @@ +{"118298991|15219853": ["Well-de ned methodology exists for keystroke, mouse, gait, mobile, and others.(2) Performance generally decreases as one moves up in Newell's Time Scale of Human Action."]} +{"44105340|27262729": []} +{"195351760|21459580": ["Thus new bottom-up concepts have to be investigated [2] and there is a need for new flexibility options [39]."]} +{"206490821|2663804": ["Several aggregation schemes for meter readings have been recently proposed (a comprehensive survey can be found in [25]\u2013[27]), mostly relying on multiparty computation mechanisms (which allow for the collaborative computation of an aggregation function without disclosing the individual inputs of the participants) by virtue of the homomorphic properties of cryptographic schemes such as"]} +{"44156617|49527603": []} +{"55299669|595093": ["However, blockchains with confidential transactions have recently appeared [6] and provide a solution to such privacy concerns.", "Cyber security in smart grids is analyzed in detail in [6]; however, this section only considers the relevant information of that analysis."]} +{"46973701|15459551": ["The bidirectional power flow of EV charging/discharging in the smart grid system is envisaged to reduce the subsidiary (reserved) power generation cost and increase the grid system robustness [1]."]} +{"14990549|15164501": []} +{"14990549|35897447": []} +{"2206177|16153186": []} +{"2206177|17205659": []} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"21208223|38911919": ["For an overview of clustering techniques, we refer interested readers to a recent survey by Cooper et al. [3]."]} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"4893239|627405": []} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"46904635|6444031": ["The ability to prevent multiple identities from a single machine is key in preventing a Sybil attack, this combined with the expensive cost of entrance [25] to our network, makes it unviable for all but the most powerful adversary to conduct a Sybil attack on"]} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"29562574|925507": []} +{"3404334|925507": ["Even in the emerging field of the Internet of Things (IoT), blockchain technology can be used in different scenarios and forms [15], [17], [24]\u2013[28]."]} diff --git a/edge/graph_56598579.jsonl b/edge/graph_56598579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5907793b540325630d0d764d9124f8142d7ff2d1 --- /dev/null +++ b/edge/graph_56598579.jsonl @@ -0,0 +1,3 @@ +{"8838556|11608263": []} +{"12447321|3474164": []} +{"12447321|205286988": ["A comprehensive review of these schemes may be found in [131]\u2013[133].", "These include energy harvesting strategies [128]\u2013[130], energy conservation and routing protocol schemes [131], [132]."]} diff --git a/edge/graph_5660618.jsonl b/edge/graph_5660618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5660947.jsonl b/edge/graph_5660947.jsonl similarity index 100% rename from graph_5660947.jsonl rename to edge/graph_5660947.jsonl diff --git a/graph_5664472.jsonl b/edge/graph_5664472.jsonl similarity index 100% rename from graph_5664472.jsonl rename to edge/graph_5664472.jsonl diff --git a/graph_5664981.jsonl b/edge/graph_5664981.jsonl similarity index 100% rename from graph_5664981.jsonl rename to edge/graph_5664981.jsonl diff --git a/graph_5665449.jsonl b/edge/graph_5665449.jsonl similarity index 100% rename from graph_5665449.jsonl rename to edge/graph_5665449.jsonl diff --git a/edge/graph_56657817.jsonl b/edge/graph_56657817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc5a03e6badbdd6b90a44f0c83a90e106da52306 --- /dev/null +++ b/edge/graph_56657817.jsonl @@ -0,0 +1,3 @@ +{"9397697|393948": [", 2011), text classification (Yogatama and Smith, 2014), and representation learning (Bengio et al., 2013; Yogatama et al., 2015)."]} +{"49214673|2088679": ["Consequently, their use has been limited in fields such as medicine (e.g. medical image classification (Litjens et al., 2017)), policy-making (e.g. classification aiding public policy makers (Brennan & Oliver, 2013)), and science (e.g. interpreting the contribution of a stimulus to a biological\u2026", "medical image classification [1]), policy-making (e."]} +{"7228830|17652653": []} diff --git a/edge/graph_56657839.jsonl b/edge/graph_56657839.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc2816bf3015bed1c77c7da6223dd0c88c4a0c17 --- /dev/null +++ b/edge/graph_56657839.jsonl @@ -0,0 +1,5 @@ +{"10845127|13916820": []} +{"14084374|5551880": ["Due to this open accessibility factor, the files or data of an individual can be used by other users of the Cloud as a result attacking treat on data or files become more vulnerable [6,15]."]} +{"63234784|18137319": ["The cloud service users should also ensure the quality, reliability and performance of the cloud service providers through Service Level Agreements (SLAs) negotiated between providers and users [12]."]} +{"3057478|14420517": ["There are several security standard specifications [79] such as Security Assertion Markup Language (SAML), WSSecurity, Extensible Access Control Markup (XACML), XML Digital Signature, XML Encryption, Key Management Specification (XKMS), WS-Federation, WS-Secure Conversation, WS-Security Policy and WS-Trust."]} +{"3057478|627405": ["We have carried out a systematic review [13-15] of the existing literature regarding security in Cloud Computing, not only in order to summarize the existing vulnerabilities and threats concerning this topic but also to identify and analyze the current state and the most important security issues for Cloud Computing."]} diff --git a/edge/graph_56657868.jsonl b/edge/graph_56657868.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa1bfda46f4067ff46e6fae97e43ccb13c4fec00 --- /dev/null +++ b/edge/graph_56657868.jsonl @@ -0,0 +1,25 @@ +{"11024200|16621677": ["This paper deals with the idea to maintain the security and stability of Networked critical Infrastructures (NCI).", "[19] Jaipal Singh Parihar, Jitendra Singh Rathore, Kzvita Burse, \u201cAgent Based intrusion Detection Sytem to find Layers Attack, \u201cin IEEE International conference on Communication Systems and Network Technologies, 2014,pp.685-689.", "[10] J.Sathya priya, M.Ramkrishnan, S.P. Rajagopalan, \u201cDetection of DDoS attacks using IP Traceback and Network Coding Technique, \u201c in journal of theoritical and applied Information Technology,chennai,2014,pp.99-106.", "[25] Michael Riecker, Daniel Thies and Matthias Hollick, \u201cMeasuring the Impact of Denial of Service attack in wireless Sensor nodes, \u201cin 39th annual IEEE conference on Local Computer Networks,2014,pp.296-304.", "[3] Jisa David,Ciza Thomas, \u201dDDoS Detection using Fast Entropy Approach on Flow Based Network Traffic, \u201c 2nd International Symposium on Big Data and cloud computing(ISBCC\u2019 15), vol.50,2015,pp.30-36.", "REFERENCES [1] Ashish Patil,Rahul Gaikwad, \u201dComparative analysis of the\nPrevention Techniques of Denial of Service attacks in Wireless Mesh Network, \u201cin ICCC, vol.48,Bhubaneswar,2015,pp.387-393.", "[11] Michael riecker, Daniel Thies, Matthias Hollick, \u201cMeasuring the Impact of Denial of Service attack on Wireless Sensor Networks, \u201cin IEEE conference,Germany,2014,pp.296-304.", "[21] Munish Dhar, Rajeshwar Singh, \u201cA Review of Security Issues and Denial of Service Attacks in Wireless Sensor Networks, \u201cin International Journal of Computer Science and Information Technology Reasearch,vol.3,2015,pp.27-33.", "[18] Omar Al-Jarrah, Ahmad Arafat, \u201cNetwork intrusion Detection System using attack Behaviour classification, \u201c in IEEE International Conference on Information and Communication Systems,2014."]} +{"33149275|2142482": []} +{"33149275|18189153": []} +{"33149275|17623572": []} +{"33149275|17009788": []} +{"33149275|12815020": []} +{"33149275|6430931": []} +{"15393244|2906773": ["Despite the improvement in complexity, effective Bloom filter implementations may not be possible on resource constrained embedded devices [9]."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"25180326|5551880": ["Attacks and countermeasures in cloud computing are described in [3]."]} +{"7170677|2181694": ["In fact, in spite of the presence of some partial works like [15], [79], [81], [85], till this date there have not been any survey paper that collects all the significant IDSs and gives overviews of those works in terms of the underlying techniques they use along with important observations and obtained results."]} +{"7170677|7774517": ["In fact, in spite of the presence of some partial works like [15], [79], [81], [85], till this date there have not been any survey paper that collects all the significant IDSs and gives overviews of those works in terms of the underlying techniques they use along with important observations and obtained results."]} +{"7170677|17205659": ["The node replication [30], [31], [88] Add extra node to the network with the same cryptographic secrets Neglect and greed [70] Deny transmission of legitimate packets and give higher priority to own packets", "HELLO flood [32] Flood with HELLO packets Unfairness [70] Unfair resource allocation on MAC protocols", "most vulnerable to this type of attack [70].", "5) Unfairness: This attack is a weaker form of DoS attack located in the link layer.", "Note that providing fairness in WSNs is often viewed as a separate research issue [70]."]} +{"4762961|28628245": ["First, while traditional wireless sensor networks (WSNs) are composed of devices homogeneous with respect to hardware and software, the IoT landscape is heterogeneous, fragmented, and not supportive of interoperability.", "Several IDSes have been developed for WSNs [2], [4], [9], [38], [41]; however, they suffer from one or more limitations with respect to IoT: inability to adapt, applicability only to a single platform and protocol, small and specific range of detection techniques, complete dependency on collaboration, reliance on the existence of a central control point.", "Second, unlike WSNs, IoT devices are susceptible not only to attacks from other devices in the network, but also from more powerful attackers from the untrusted Internet.", "Simply adapting existing IDSes, designed for traditional computing networks or WSNs, is not viable."]} +{"26546513|15199849": []} +{"28791242|12595430": ["We refer the reader to [29] in which a large study of the drawbacks of available datasets for intrusion detection benchmarking has been carried out.", "Recent surveys [28], [29] describe tens of Intrusion Detection Systems (IDS) approaches developed so far."]} +{"28791242|18295771": ["However, dealing with such personal information raises many security and privacy issues [3], [4], [5], [6] and (Taylor Wessing6), particularly when big data analysis techniques are employed [7], [8], [9], [10], [11]."]} +{"13878913|6959212": ["These capabilities enable the application of the renewable energy like wind and solar power, and will achieve the rapidly increasing energy needs around the world such as the application of power efficient devices like plug-in electric vehicles [5], [6]."]} +{"13878913|6430931": ["The instance of the unsupervised learning of the ANN is self-organizing maps (SOM) are single-layer feed forward networks, their outputs can be compressed into a low dimensional grid and they are the most widely used NN for anomaly detection tasks [55].", "AIS are computational algorithms that emulate the mechanisms of human immune systems [55]."]} +{"14970386|1940388": ["The data secrecy must be ensured while it is stored on devices, when it is transmitted and also when it reaches the destination [1].", "Several types of transducers can be connected to these devices, turning them suitable to be used on monitoring and physical phenomena control in large-scale environments [1].", "\u2022 Freshness: to prevent old messages from being replayed without being detected [1].", "The self-organization, fault-tolerance and selfoptimization are the main characteristics of these networks [1].", "\u2022 Non-repudiation: to ensure that a node cannot deny in the future the authorship of a message previously sent [1].", "Since wireless sensor node replacements is a common situation, it is also important to guarantee the following [1]:"]} diff --git a/edge/graph_56671641.jsonl b/edge/graph_56671641.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_56702657.jsonl b/edge/graph_56702657.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c59f1779273e4db4469bcb21a47242f7b3ed1096 --- /dev/null +++ b/edge/graph_56702657.jsonl @@ -0,0 +1,3 @@ +{"16440939|3732796": ["[46] for this purpose four groups of techniques can be established depending on their base: lens system aberrations, Color Filter Array (CFA) interpolation, image characteristics, and sensor imperfections.", "[46] the results for pictures with different sizes were unsatisfactory.", "[46] describe in detail the digital camera pipeline."]} +{"61682066|3732796": []} +{"648671|3732796": []} diff --git a/edge/graph_567127.jsonl b/edge/graph_567127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5671282.jsonl b/edge/graph_5671282.jsonl similarity index 100% rename from graph_5671282.jsonl rename to edge/graph_5671282.jsonl diff --git a/edge/graph_56718800.jsonl b/edge/graph_56718800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f83e5f92f9a3146421012cb03dd6d9738d93834d --- /dev/null +++ b/edge/graph_56718800.jsonl @@ -0,0 +1,84 @@ +{"108612462|35426346": ["Leitao [8] surveyed the literature in manufacturing control systems using distributed AI techniques."]} +{"113078749|1387401": ["The previous studies have shown that wireless channels exhibit transient errors at much higher rates than those observed on wires or \ufb01ber cables [11]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"52118989|512561": ["A detailed study on CB is discussed in [81] for CR sensor networks [82]."]} +{"52118989|3637412": []} +{"52118989|2443013": ["Middleware Requirements: Some of the requirements for middleware in industrial applications do not particularly relate to traditional WSNs, but they may apply to a high-level distributed computing system.", "2) Task-Sharing: Unlike typical single-application-oriented WSNs, a middleware service should not allow nodes to be used for more than one application.", "With the advantages of easy deployment and with the mobile connectivity of WSNs and low-price multifunctional sensors, humans-as-sensors [113] can sense, upload, and share data to contribute to industrial sensing systems.", "Unlike typical single-application-oriented IWSNs, a middleware system should be able to meet evolving industrial requirements including adaptability, task sharing, real-time update, and location awareness.", "Therefore industrial wireless sensor networks (IWSNs) are good solutions to overcome these drawbacks of wired industrial communications due to the ease of deployment, low cost, flexibility, instant, and precise cyber-physical decisions to achieve Industry 4.0 [22], energy power supported by (rechargeable) battery or wireless charging.", "Nevertheless, the integration of RFIDs in WSNs as a part of machine identification, equipment monitoring, and fault diagnosis has not yet been fully investigated in large-scale petrochemical plants.", "This article explains the substantial role of the IoT in harnessing the power of tight and seamless integration of heterogeneous WSNs with advancements in crowdsensing based services.", "The IWSNs serve as a link between data collected on-site from heterogeneous sources [29] and the business backend.", "[29] Z. Zhou, C. Du, L. Shu, G. Hancke, J. Niu, and H. Ning, \u201cAn energybalanced heuristic for mobile sink scheduling in hybrid WSNs,\u201d IEEE Trans.", "The middleware system for IWSNs [15]\n5U.S. National Institute for Occupational Safety and Health, certify workplace standards in terms of maximum working hours under high levels of factory noise, e.g., it is advisable to work less than 8 h and less than 4 h under noise levels of 90 dB and 95 dB, respectively.", "In addition, the transmission medium is generally under-utilized [74] in multihop topologybased WSNs [75].", "However, due to the transition from typical WSN applications to industrial applications with the IoT paradigm, IWSNs, it has become imperative to design a cross-platform method for sophisticated routing and energy-saving strategies.", "1) This article aims at providing a comprehensive survey on\ndata management in the IoT for large-scale petrochemical industry that addresses the integration of heterogeneous1\n1Heterogeneity in WSNs is generally caused is caused by differences in hardware and software components with different functionalities and capabilities.", "WSNs with the advancements in crowdsensing based services, including a brief outline of the research activities in recent years.", "The research activities on WSNs have focused on data gathering and forwarding dedicated to a single application for the entire network to detect or monitor physical changes and activities.", "[107] T. Fronimos, S. Lalis, M. Koutsoubelias, and T. Bartzanas, \u201cUnified service-oriented access for WSNs and dynamically deployed application tasks,\u201d in Proc.", "Within the IoT paradigm, IWSNs are evolving to become the global interconnection between management and factory products in large-scale industries [26]\u2013[32].", "The proposed architecture follows global sensor networks, assuming a rapid deployment and integration of heterogeneous WSNs.", "Due to their advantages of low cost, ease of deployment, energy efficiency, and mobility compared to the traditional field bus, IWSNs have become a promising approach for manufacturers as well as plant designers."]} +{"125619263|31245252": ["\u2026(LTE-A) [34], [37], M2M communication has become the backbone of the Internet of Things (IoT) communication, supporting a diverse array of applications, including smart health, smart grid, smart manufacturing, smart transportation, public safety, etc. [16], [27], [38], [39], [56], [57], [58], [60]."]} +{"125619263|3330461": ["D2D communication in cellular networks has been standardized as the direct communication between mobile users without traveling through infrastructure-based eNodeBs [3], [9], [23], [53]."]} +{"125619263|3818445": ["\u2026(LTE-A) [34], [37], M2M communication has become the backbone of the Internet of Things (IoT) communication, supporting a diverse array of applications, including smart health, smart grid, smart manufacturing, smart transportation, public safety, etc. [16], [27], [38], [39], [56], [57], [58], [60]."]} +{"125619263|25929315": ["With the developments of the 3rd Generation Partnership Project (3GPP) Long-Term Evolution (LTE) and Long-Term Evolution Advanced (LTE-A) [34], [37], M2M communication has become the backbone of the Internet of Things (IoT) communication, supporting a diverse array of applications, including smart\u2026"]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"58673837|1598350": ["RECENTLY, there has been much attention paid to industrial Internet of Things (IIoT) technologies due to their scalability for various applications such as facility automation, facility monitoring, and failure diagnosis in smart manufacturing system [1], [2]."]} +{"49182591|6909107": ["for mobile IoT, and in [40], a comprehensively survey on existing concepts integrating mobile EC (MEC) functionalities was presented and current advancement of the MEC was"]} +{"49182591|17818556": ["Moreover, the current research developments, such as clustered or grouped IWNs [13]\u2013[15], software defined network (SDN) [16], [17], [42], cloud and edge computing (EC) [18], [19], and multipath transmission protocol [20], [21], have provided a preliminary basis and enabled the design of high-performance and adaptive system for IIoT."]} +{"4566470|24855581": []} +{"4566470|31245252": ["[79] D. Niyato, M. A. Alsheikh, P. Wang, D. I. Kim, and Z. Han, \u2018\u2018Market model and optimal pricing scheme of big data and Internet of Things (IoT),\u2019\u2019 in Proc.", "THE MAIN PURPOSE OF BIG DATA TRADING Since the volume of data is growing immensely, and IoT technology is progressing at a similar pace, massive datasets with comprehensive content and detail become increasingly valuable.", "Luong et al. [56] and Ya\u00efche et al. [64] designed a pricing model to evaluate IoT sensing data.", "Available: https://arxiv.org/abs/1702.02380 [56] N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, D. I. Kim, and Z. Han, \u2018\u2018Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey,\u2019\u2019 IEEE Commun.", "His research interests include cyber-physical systems, smart grid/IoT security and privacy, and incentive mechanisms design for smart grid/IoT.", "Many specific fields, such as government, manufacturing, health-care, education, Internet, social media, and IoT-driven smart-world systems all need big data applications tomine the value of their own collected datasets to better support applications.", "For instance, IoT provides themost important network infrastructure for data collection, as billions of devices run automatically and constantly collect data across various domains.", "INTRODUCTION With a number of new technologies integrated into our daily lives, such as mobile and social networking applications, and Internet of Thing (IoT)-based smart-world systems (smart grid, smart transportation, smart city, and others), massive amounts of data will be collected [1]\u2013[7].", "I. INTRODUCTION With a number of new technologies integrated into our daily lives, such as mobile and social networking applications, and Internet of Thing (IoT)-based smart-world systems (smart grid, smart transportation, smart city, and others), massive amounts of data will be collected [1]\u2013[7].", "\u2018\u2018Sensing as a service (S2aaS): Buying and selling IoT data.\u2019\u2019", "With the development of smart devices and IoT, it becomes easier to collect useful data everywhere.", "The data sources are diverse, especially as IoT is ever more involved in our daily lives, supporting numerous smart-world systems [1], [3], [20]\u2013[22].", "Some existing data pricing models consider only market structures, such as auction, cost-based pricing, and others, while others involve a distributed data storage structure (cloud computing, edge computing, etc.) and IoT for assistance.", "Thus, to quantify the cost for data collection, and handle diverse data sources, we need to understand how IoT works, and encourage all components to provide better performance in IoT [1], [53]\u2013[55].", "In addition, existing studies showed the use of the Stackelberg game model in spectrum trading and resource allocation [69], and could improve network performance and robustness in IoT systems [70].\nc: Bargaining game The last scheme is the Bargaining game.", "\u2022 Diverse Data Sources: Along with billions of smart personal devices and sensors, IoT-driven smart systems have become major infrastructures that contribute data to the collection process."]} +{"4566470|5385031": ["There are several different pricing strategies for evaluating cost according to the different scenarios [56]."]} +{"4566470|3818445": []} +{"51981043|9316331": ["where Cp is a constant greater than 0 [53]."]} +{"49577512|393948": ["Furthermore, most of such huge-scale models are based on traditional deep learning models, so they are only suitable to learn the features for the singe type of data such as text, image, and audio [14]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"10832046|16323798": ["A more comprehensive discussion about these can be found in recent reviews, such as [15]\u2013[17]."]} +{"3662822|6909107": ["The achievable advantages of MCC include extension of the battery life time, provision of a high storage pool for mobile users, and the ability to deploy new sophisticated applications in mobile devices [3].", "In [3], the authors first reviewed different MEC concepts for the integration of cloud functionalities at the edge of the mobile networks, e.", "Different aspects of MEC systems have been thoroughly reviewed in surveys [3], [4], [5]."]} +{"3662822|206578365": ["Each mobile user n has a computation task I n = { \u03b1 n , \u03b2 n , \u03c9 n } [4], [12], where \u03b1 n is the computation input data size (in bits), \u03b2 n is the number of CPU cycles required to complete the task I n , i.e., computation workload or computation intensity, and \u03c9 n is the computational result, i.e.,\u2026", "Different aspects of MEC systems have been thoroughly reviewed in surveys [3], [4], [5].", "To compute the energy consumption E ln (in Joules) of the mobile user when the task is executed locally, we adopt the model in [4], [19], [25].", "In the meanwhile, in partial of\ufb02oading a task can be arbitrarily divided into sub-tasks, which can be executed at multiple MEC servers [4]. we ignore the energy consumption for remote execution of the computation task.", "With this track, the authors in [4] presented a survey of MEC systems from the perspective of wireless communications."]} +{"3662822|8909218": ["\u2026following constraint must be satis\ufb01ed: In addition, since each MEC server is collocated with a SeNB, which often has limited hardware capability [24], the number of mobile users of\ufb02oading to an MEC server should be constrained by where q m is called a quota , which represents the maximum number\u2026"]} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"31403034|13172512": ["There are several approaches to NTC: port-based, payload-based, and \ufb02ow statistics-based [3], [4].", "These methods usually rely on machine learning techniques to perform service prediction [3]."]} +{"2332366|18740719": ["Research challenges faced by SCADA systems in risk assessment are outlined in [37] and [38]."]} +{"2332366|86629084": []} +{"44104746|4566470": ["I. INTRODUCTION Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason.", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|24855581": ["Deep learning has shown significant potential in approximating and reducing large, complex datasets into highly accurate predictive and transformational output, greatly facilitating human-centered smart systems [25], [98].", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|4884302": ["An alternative to the quality function, the advantage function represents relative state-action values, as opposed to absolute state-action values [19].", "The state-action value function, otherwise known as the quality function, is the source of Q-learning [19], [21].", "The model was tested both in simulated and in real environments, and experiments were conducted to evaluate appropriate model horizons and bootstrapping efficacy, sample efficiency of classification and regression for value versus collision probability predictions, and performance against various double Q-learning approaches.", "Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "This type of deep learning has been heavily applied to the field of robotics and computer vision [19].", "[169] J. Zhu, Y. Song, D. Jiang, and H. Song, \u2018\u2018A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things,\u2019\u2019 IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2759728.", "The two primary means of reinforcement can be divided between policy search and value function approximation, though hybrids of both have been introduced [19].", "As a seminal work on the application of Q-learning and Deep Q-Networks (DQN), Mnih et al. [93] implemented a DQN to play 49 different Atari 2600 videogames, observing four frames as environment data, extracting the game score as reward, with controller and button combinations encoded as actions.", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning.", "These typically output parameters for a probability distribution, either for continuous or discreet actions, resulting in a stochastic policy [19].", "[21] A. Bonarini, A. Lazaric, F. Montrone, and M. Restelli, \u2018\u2018Reinforcement distribution in fuzzy Q-learning,\u2019\u2019 Fuzzy Sets Syst., vol. 160, no. 10, pp. 1420\u20131443, 2009.", "For example, Zhu et al. [169] implemented stacked auto-encoders (SAEs) to realize Q-learning for transmission scheduling in cognitive IoT relays."]} +{"44104746|3645740": ["Particularly, other works focus primarily on the advances and needs of a single learning mechanism or modality [19], [109], or towards improvements in a single application [38], [67], [68], [98].", "In addition, compared to other survey works on the topic of deep learning [19], [38], [67], [68], [98], [109], our work takes a broad view of all fields/applications to which deep learning has been applied, and their contributions to the study and improvement of deep learning."]} +{"44104746|31245252": [", network congestion and latency are only going to increase without a diverse array of complementary solutions [80], [82], [125], [127], [143], [147], [148], [161].", "With the unceasing growth of IoT and smart-world systems driven by the advance of CPS, in which all devices are network connected and able to communicate sensed data and monitor physical objects, larger and larger datasets are becoming available for the application of deep learning, poised to materially impact our daily lives [36], [81], [82], [89], [91], [143], [144], [161].", "Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151].", "[58], [80], [82], [94], [125], [127], [143], [145], [147], [148], [161], [165].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44104746|2829149": ["Given the increasing number of devices, operating systems, and communication protocols that abound in IoT, security is an ever-ballooning problem [82], [151]."]} +{"44104746|3818445": ["Securing the data, operation, and mechanisms of deep learning are all the more relevant in considering edge computing, which can be a viable computing infrastructure to provision deep learning schemes [155], supporting a variety of smart-world systems (smart cities, smart manufacturing, smart grid, smart transportation, and many others).", ") are also forthcoming [13], [155], [157].", "In addition, advances in big data and cloud computing have created the potential for machine learning to flourish, enabling the requisite data collection and dissemination, as well as the computational capacity to execute deep models [26], [79], [120], [155], [156].", "Along with Big Data and Analytics [79], [149], Cloud/Edge Computing-based Big Computing [120], [155], and the Internet of Things (IoT)/Cyber-Physical Systems (CPS) [80], [82], [125], [127], [143], [147], [148], [161], the topic of Deep Learning has come to dominate industry and research spheres for the development of a variety of smart-world systems, and for good reason."]} +{"44239235|5385031": ["2739340 interactions via sensor devices, mobile personal computing, and advanced communication technologies to provide transparent, smart, ubiquitous, green, and safe services for humans [1]\u2013[3]."]} +{"44239235|2473564": ["Other models concentrated on the feature learning of multimodal data can be found in [21] and [22]."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"37145840|121289": ["The provision of communication factor to perform the required functions based on this standard is important to create suitable smart grid communication infrastructure [7]."]} +{"46934230|10937383": ["The third generation partnership project (3GPP) standards body has been actively discussing the inclusion of massive MIMO in 3GPP specifications from release 13 onward [9]."]} +{"46934230|12029139": ["Simultaneous wireless information and power transfer has also been proposed for delivering RF energy and wireless information concurrently, which offers a low-cost option for sustainable operations of wireless systems without hardware modification on the TX side [24], [26].", "Wireless power transmission basically requires a receiving RF power of at least \u221220 dBm [24], so it is necessary to design a mechanism to perform RF energy transmission by bringing a monitoring drone or a mobile robot close to sensors.", "2) RF Energy Transfer and Harvesting: RF energy transfer and harvesting techniques have recently become amazing technologies for distributed wireless sensor networks [24]."]} +{"125996885|44104746": ["With the help of data mining, deep learning [9], and other techniques to facilitate data processing, massive amounts of data are already being collected and processed, generating valuable information to users and affecting our daily lives."]} +{"125996885|4566470": ["In addition to auction schemes, different data pricing strategies (free-data strategy, usage-based pricing strategy, package pricing strategy, \ufb02at-pricing strategy, two-tart tariff strategy, etc.) should be considered as well [6].", "The big data life-cycle consists of data collection, data analysis, data pricing, data trading, and data protection [6].", "Privacy protection concepts and methods can be found in [6], [19], [22], [39], [52]\u2013[58].", "In such smart-world systems, massive amounts of data will be generated, giving rise to truly unprecedented CPS/IoT-based big data [6]\u2013[8].", "For example, Liang et al. [6] reviewed existing research in big data, identi\ufb01ed the lifecycle of big data trading, discussed existing research focused on data pricing, data trading, and data protection, and considered future research needs.", "The advance of CPS and IoT technologies have led to a number of smart-world systems (smart grid, smart cities, smart manufacturing, etc.) [1]\u2013[5] and data trading and sharing has become an active research topic in recent years [6], [13], [25], [36]\u2013[43]."]} +{"125996885|9461213": ["In such smart-world systems, massive amounts of data will be generated, giving rise to truly unprecedented CPS/IoT-based big data [6]\u2013[8]."]} +{"125996885|31245252": ["The advance of CPS and IoT technologies have led to a number of smart-world systems (smart grid, smart cities, smart manufacturing, etc.) [1]\u2013[5] and data trading and sharing has become an active research topic in recent years [6], [13], [25], [36]\u2013[43].", "\u2026Things (IoT) technologies, immense quantities of sensors and actuators will be developed and deployed to support the monitoring and control of a number of smart-world Cyber-Physical Systems (CPS), including the smart grid, smart transportation, smart cities, smart manufacturing, and others [1]\u2013[5]."]} +{"12170080|8618991": []} +{"206941062|35426346": ["An agent can be defined as \u2018\u2018an autonomous component, that represents physical or logical objects in the system, capable to act in order to achieve its goals, and being able to interact with other agents, when it doesn\u2019t possess knowledge and skills to reach alone its objectives\u2019\u2019 [18].", "interacting to achieve their individual goals when they have not enough knowledge and/or skills to achieve individually their objectives\u2019\u2019 [18]."]} +{"16267209|8909218": ["3) Small-to-small Interference: Due to the large number of the small cells and the irregular deployment topology, the small-to-small interference mitigation schemes were preferably at SUE side or the small-cell BS side in a distributed manner [65], [10]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"52081969|4884302": []} +{"52081969|31245252": []} +{"52081969|3818445": []} +{"39095218|8363289": ["The story of centralized MPC has shown that efficient and reliable algorithms have been developed well before than a solid theory was established, see the fundamental paper [62].", "For this reason, the analysis of the closed-loop system with MPC is difficult and the main stability results are obtained by using the optimal cost as a Lyapunov function, see [62].", "Stability is achieved with a zero terminal constraint, as usual in MPC, see [62].", "For an in depth presentation of MPC, the reader is referred to the textbooks [58,12] and the survey papers [30,62]."]} +{"4320831|7074478": ["The fact that the 5G technology promises to provide a widespread coverage, more mobility support, a lower latency, a prolonged battery life span, and a platform for a large number of devices makes 5G technology the key enabler for successful M2M communications [11], [12], [13], [14]."]} +{"52121685|31245252": ["[3], [10], [16]\u2013[18], [20]."]} +{"52121685|3818445": [") to exploit diverse Internet of Things applications supported by massive M2M devices through some Application Programming Interface (API) provided by the network operator [19]."]} +{"52928434|206578365": ["Similarly, edge servers sell their computing resource with ask prices set between [3, 10].", "The bids from buyers are set between [0, 14], and the asks from sellers are between [3, 10]."]} +{"13680533|18750590": ["Indeed, there is a rich literature on cloud resource allocation and pricing [34]."]} +{"43245788|37052879": ["Based on the features of industrial WSNs, industrial standards, such as WirelessHART [1], [2], ISA100 [3] and WIA [4], are used extensively.", "1 shows a model of an auto production line that is based on the WIA-FA standard.", "Without a loss of generality, our model has the same salient features as WirelessHART [1] and WIA [4], which indicates that the model is particularly suitable for process industries."]} +{"3681659|21386749": []} +{"9003374|6959212": []} +{"115195731|44104746": ["There is a significant amount of research dedicated to using deep learning in stateof-the-art implementations across different domains [15], [16], [17]."]} +{"115195731|4566470": ["When it is used together with information technology and analytical methods, some value of the data can be provided [18], [19]."]} +{"115195731|31245252": ["For example, in the smart grid [1], [2], power generation and consumption prediction depends on the weather forecast information."]} +{"115195731|3818445": ["process can be improved [20], [21]."]} +{"41685384|7350786": []} +{"46927618|121289": ["Hence, a scalable and pervasive communication infrastructure is crucial in both data analytics and management of SG systems [5]."]} diff --git a/edge/graph_56718822.jsonl b/edge/graph_56718822.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d577c60e4090d079271c84c8d9007a64aded1db9 --- /dev/null +++ b/edge/graph_56718822.jsonl @@ -0,0 +1,42 @@ +{"56018165|4427557": ["As identified in (Raza et al., 2017), interoperability between different LPWAN technologies is also likely to become a challenge in the future, which represents another aspect that is difficult to tackle without freely available implementations and testbeds.", "Typical LPWANs are star-topology networks with cell radii often beyond 10 km, serving thousands of low-complexity sensors that are strictly constrained in size and power consumption (Raza et al., 2017)."]} +{"31341016|2871699": []} +{"31341016|3330461": []} +{"4910305|4427557": ["In such environments, pure ALOHA systems are a cost-effective choice for the wide-area asynchronous random access systems (LoRaWAN) [1], [3], where no time synchronization may reduce hardware cost, substantially.", ", low power wide area networks (LPWANs) [1], [2]."]} +{"33720954|2742199": ["However, air quality information data of both high spatial and temporal resolution in both the spatial and temporal dimensions is highly desired, which is the focal point of this paper [3]."]} +{"33630320|16515889": []} +{"633073|4427557": []} +{"633073|17708892": ["4 GHz frequency band allowing higher throughput than common LPWANs in the sub-1GHz band [10].", "Table 1: Overview of some of the major alternatives for LPWAN deployments (based on [10, 11])."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"16313703|6779551": ["Since most of the M2M communications are wireless, eavesdropping becomes extremely simple [44]."]} +{"16313703|121289": ["Generally, M2M systems can be heterogeneous, unstructured , and loosely-knit by using standardized communication technologies, such as IEEE 802.11 (WiFi), IEEE 801.15.4 (ZigBee, 6LowPAN), long term evolution (LTE), IEEE 802.16 (WiMAX), Ethernet, power line communications, and IEC 61850 [5]."]} +{"3249290|53116003": ["While we discuss the type of services that localization can provide by leveraging the IoT framework [87] in Section VII, below we present and"]} +{"3249290|4427557": ["Low Power Wide Area Networks (LPWANs) such as LoRA and Sigfox in its current shape cannot provide high localization accuracy and must be combined with other localization techniques and technologies for higher localization accuracy [156]."]} +{"3249290|6396569": ["Amundson and Koutsoukos [11] presents a survey on different localization methods for wireless sensors."]} +{"3249290|206583375": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"206491297|6909107": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|21386749": ["An extensive survey is presented in [10], with focus placed on commercially available solutions, possible applications, and remaining problems.", "work of devices interacting with each other via machine to machine (M2M) communications, enabling collection and exchange of data [7], [10], [11]."]} +{"206491297|3042864": ["The aforementioned surveys in [116] and [117] present comprehensive overviews of the works in this field, and demonstrate that energy efficiency and higher processing capabilities can be readily achieved when utilized computational offloading to the cloud.", "phones [116], [117], where complex computations are offloaded from low-resource mobile devices to the highpower environment of the cloud, before the result is returned to the mobile device."]} +{"206491297|23893450": ["crash-avoiding cars [19], and smart grids [20]."]} +{"3350771|6583734": ["high-data-rate services (such as video service) and low-datarate services (such as meter reading service) [4]."]} +{"3350771|25929315": ["Researches generally set service arrival process as a homogeneous/compound Poisson process or an independent Bernoulli process [41] with identical distribution [40] and retransmission user number and packet retransmission number at queue head or channel state (busy/idle) in a certain time slot as state variables to obtain a stabilized design scheme [42] on the premise of completing the multi-channel S-ALOHA steady-state performance analysis [43], [44].", "In order to solve the overload of LTE access network when a large number of MTC terminals enter network simultaneously, researchers focused analyses on the load pressure of LTE RACH and its overload control mechanisms, such as classified controlled access, exclusive RACH resources, dynamic RACH resources allocation, exclusive backoff mechanism, time division access and active paging mechanism [19], [40]."]} +{"206325147|16515889": ["Thus, Wireless Sensor Network (WSN) technologies are exploited to collect information from objects in IoT [1-7]."]} +{"3656886|4427557": ["This research differs from other LPWA-focused surveys [6, 7, 8, 9, 10, 11, 12, 13, 14] in that the scope of LPWA has been broadened to include incoming cellular-based technologies, namely NB-IoT and EC-GSM-IoT, as well as proprietary solutions, and in that a more detailed direct comparison of the\u2026", "However, for more time-critical monitoring and metering applications such as wireless industrial control, LPWA technologies cannot guarantee the availability and latency required for the necessary performance [9].", "However, it also decreases the data rate [9].", "LPWA technologies are characterised by their focus on energy ef\ufb01ciency, scalability, and coverage [9]."]} +{"3656886|19636511": []} +{"3419623|4427557": ["In [11], the LPWA standards and proprietary LPWA technologies, as well as the challenges and", ", LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "For LPWA networks, most\nof the existing solutions, e.g., LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "The Table also lists the applications (provided in [11] and [89]) that can be supported by each technology."]} +{"3419623|19636511": ["The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14].", "Weightless-N, Weightless-P, and Amber Wireless as mentioned in [14]."]} +{"3419623|25929315": ["M2M communication RA is limited, and the large number of simultaneous network access attempts may result in high collision rate [13].", "The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14]."]} +{"11335940|3007529": ["As many devices embed more than one radio module, exploiting radio diversity was previously proposed to reduce energy consumption and latency for opportunistic networking [23]."]} +{"7132356|25929315": ["Although di \ufb00 erent subtleties have been suggested to share optimally the RACH channel [4], the most e \ufb03 cient way relies on providing MTDs and UEs (User Equipment) with separate access channels."]} +{"169663059|4427557": ["10+ years of battery lifetime [3]) and inexpensive, with the cost of a radio chipset being less than 2e and an operating cost of 1e per device per year [4].", "220 MHz is divided into 400 orthogonal 100 Hz channels (among them 40 channels are reserved and not used) [4]."]} +{"18740420|4427557": []} +{"18740420|17708892": ["Some of the most pronounced LPWA candidates are SigFox, LoRa, Weightless, and Ingenu [1].", "In fact, most of these studies are either review articles [1], [3], [4], or measurement reports [5], [6].", "2647247 Despite this success, LoRa has not yet attracted similar levels of attention from the academic and research community with only very few peer-reviewed studies published to date [1], [3]\u2013[7].", "b) Coverage probabilities \u2118[X ] for X = {H1, Q1, H1Q1} using the same colouring and markers as in a) for different mean values of end-devices N\u0304 \u2208 [1, 2000]."]} +{"19636511|2871699": ["[58] relay, except that M2M gateway cost of M2M gateway for MTC device.", "Pereira and Aguiar [58] consider the use of smartphones as M2M gateway between the BS and MTC devices."]} +{"19636511|2535224": ["[21] make a survey about software-defined wireless network (SDWN) and wireless network virtualization (WNV) for the future mobile wireless networks, which helps define the future mobile wireless network architecture to tackle with heterogeneous traffic."]} +{"19636511|1236072": ["4 Classification according to data reporting mode According to data reporting mode, M2M applications are classified into five categories [9, 26, 27]: timedriven, query-driven, event-driven, continuous-based, and hybrid-driven."]} +{"19636511|25929315": ["In addition, a detailed random access related proposals are summarized in [15], which can be a complement of our categorization.", "typically tens of UEs per base station [15]", "[15] make a survey of proposals improving the operation of random access channel of LTE/LTE-A and evaluate the energy consumption of LTE random-access procedure.", "[15] claim that ALOHA-based RACH procedure is not suitable for MTC.", "Energy efficient New random access protocol [15] ALOHA-based random It may be difficult to find a specified"]} +{"51975669|6583734": [") are mostly nonstandard and realized as user-defined, and technologies that work in authorized frequency band, including GSM, code division multiple access (CDMA), WCDMA and other relatively mature 2G/3G cellular communication technologies, as well as the Long Term Evolution (LTE) and its evolution technologies, are gradually deployed and applied at present and support different categories of devices, also these technologies have almost made standard definition of 3GPP (mainly formulating the relevant standards for GSM, WCDMA, LTE and its evolution technologies) and 3GPP2 (mainly formulating the relevant standards for CDMA) and other international standard organizations [8]."]} +{"51975669|25929315": ["The commercial launching of NB-IoT produces and services is expected to be completed in 2017 [25]."]} diff --git a/edge/graph_56719359.jsonl b/edge/graph_56719359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8819a54a44fb12c94ec3b1754e58f220ac3f2f1b --- /dev/null +++ b/edge/graph_56719359.jsonl @@ -0,0 +1 @@ +{"2722298|15453366": []} diff --git a/edge/graph_56723145.jsonl b/edge/graph_56723145.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5686212.jsonl b/edge/graph_5686212.jsonl similarity index 100% rename from graph_5686212.jsonl rename to edge/graph_5686212.jsonl diff --git a/graph_5688620.jsonl b/edge/graph_5688620.jsonl similarity index 100% rename from graph_5688620.jsonl rename to edge/graph_5688620.jsonl diff --git a/edge/graph_56895303.jsonl b/edge/graph_56895303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb8346a1b65ae21df5f0e6e5390fc2a8b4407a6e --- /dev/null +++ b/edge/graph_56895303.jsonl @@ -0,0 +1,11 @@ +{"52167157|393948": ["With the goal of understanding and describing underlying explanatory factors across distinct data domains, cross-domain representation disentanglement aims to derive a joint latent feature space, where selected feature dimensions would represent particular semantic information [1]."]} +{"19059130|5575638": []} +{"12608331|5671282": ["This naturally leads to the second issue, i.e., how to select the optimal set of ordinal features."]} +{"12608331|393948": ["e features, we couple SOM with deeply learned features from convolutional neural networks (CNN) [9] to improve coding stability. Bene\ufb01ting from CNN\u2019s deep architecture and supervised learning approach[2], CNN\u2019s can ef\ufb01ciently deal with large amounts of data and generate a hierarchical and discriminative feature representation. The use of deeply learned features makes the learned ordinal features cont"]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"3640742|393948": ["These classical imbalanced learning models rely typically on hand-crafted features, without deep learning\u2019s capacity for exploiting a very large pool of imagery data from diverse sources to learn more expressive representations [41, 39, 27, 3]."]} +{"19489008|5238287": ["The problems of recognizing gender and age from face images have been studied for many years, and are still considered difficult problems [6][20]."]} +{"16797853|9045232": []} +{"5755372|5807554": []} +{"3741344|3273340": []} +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} diff --git a/edge/graph_56895323.jsonl b/edge/graph_56895323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2092b2ea111cab17a9d3c6e0cd838e2d0d0942b7 --- /dev/null +++ b/edge/graph_56895323.jsonl @@ -0,0 +1,31 @@ +{"6634488|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [93], [94], [95]."]} +{"19258692|3488022": ["With regard to this, Fingasa and Brownb [7] collected a variety of airborne big data in different seas where oil spills occurred previously.", "[7] M. Fingasa and C. Brownb, \u201cReview of oil spill remote sensing,\u201d Marine Pollution Bull., vol. 83, no. 1, pp. 9\u201323, Jun. 2014."]} +{"9461213|3645740": ["[223] have provided a survey of traditional machine learning approaches for self-organizing cellular networks."]} +{"9461213|1353379": ["[16] presented a survey paper in which data fusion techniques for IoT environments are reviewed followed by several opportunities and challenges."]} +{"9461213|4716814": ["There are many research efforts that have benefited from DL to develop an intelligent control software for mobile robots [228], [229]."]} +{"9461213|3126100": ["[15] reviewed several traditional machine learning techniques along with several advanced techniques including DL for processing general big data."]} +{"9461213|9928823": []} +{"9461213|3348390": ["Therefore, IoT data needs to be fused with other sources of data, namely context information that complement the understanding of the environment [12].", "[12] have reviewed different classes of machine learning approaches (supervised and unsupervised, rules, fuzzy logic, etc."]} +{"10184200|14171067": ["In computational science, the matrix dimension n can grow up to Billions [57], [36], [7], [28], and thus a petaflops machine may take several months to solve the matrix product, which may serve as an PoX for cryptocurrencies.", "The choice behind matrixbased problems is two-fold: (1) matrices have interesting composability properties that help in tuning difficulty, collaborative verification, and pool-mining (see later); and (2) matrix-based problems span a wide range of useful real world problems, being a principle abstraction for most scientific computation problems, among them: DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15],", ") as in DNA and RNA sequencing and data comparison [1], [7], protein structure analysis, image comparison, object superposition, surface matching [15], [2], collaborative-filtering recommendation, data mining [28], computational geometry [19],"]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"51908762|37109390": ["Unfortunately, these proposals have not seen significant adoption in practice, primarily due to a lack of sufficient peer participation [4, 37]."]} +{"46936025|13756844": []} +{"3546145|21386749": ["[44] reviewed the advances in health care which relies on Internet of Things (IoT) technologies.", "In particular, the work [44] also included security related taxonomies in the context of healthcare."]} +{"53019600|4880047": ["Therefore, it requires the UDN to ensure that all APs that interact with UE must also be secure [14]."]} +{"13746346|27262729": ["Since permissionless blockchain networks admit no identity con-trol, they can be vulnerable to a series of insider attacks by malicious consensus nodes [6].", "Among different types of attacks, double spending [7] is the most fundamental one and can be executed through various attacks such as gold\ufb01nger attacks, netsplit attacks and brute-force attacks [6]."]} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"26619090|18973396": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"26619090|3241708": ["We refer readers to a comprehensive survey on crowdsourcing for more information [16], [17], [18], [19], [20]."]} +{"4610350|18125683": ["These costs can be expressed as a function of the needed resources and the network overhead or follow monetary policies [19]."]} +{"52136125|13688847": ["To overcome the flaws and vulnerability caused by centralization at the data processing stage, we resort to the emerging technology of permissionless blockchains [5].", "Blockchains use the public key infrastructure (PKI) mechanism and the data structure of hash linked list to ensure that the time order and the content of a data record (also known as a transaction) cannot be tampered without being noticed once it is confirmed on the chain [5].", "The blockchain network adapts the scheme of Proof-of-Work (PoW) [6] for Sybil attack prevention [5].", "However, since most of the popular Bitcoin-like blockchains rely on the Nakamoto protocol [6] for achieving probabilistic consensus, they are severely limited by their throughput bottleneck1 [5].", "To ensure that the blockchain\u2019s data processing capability matches the volume of data traffic from the sensor cloud, we adopt the scalable consensus protocol based on sharding [5] in the considered sensing system."]} +{"206456796|27262729": ["This consensus mechanism guarantees the security and dependability of blockchain systems [4], [5].", "The core point to guarantee transaction integrity and validity in blockchain is a computational process defined as mining [4], [5]."]} +{"69787562|3767252": ["edge computing are extensively discussed in [46]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"49863956|206578486": ["1, which includes edge, fog, and cloud stratum [21]."]} +{"49863956|8523192": ["models enable real-time surveillance leveraging the fog computing paradigm [20]."]} +{"64681061|3205677": ["In contrast to the so called \u201ccrash recovery\u201d fault which does not impact the rest of the system, \u201cByzantine\u201d fault means that even when a node fails with an arbitrary and inconsistent behavior, it may continue interacting with the rest of the system, or collude in order to devise more malicious output [32]."]} +{"52902867|3757239": ["There are many different derivations of edge computing, including MEC, fog computing and cloudlet [11]."]} +{"52296722|56895323": []} +{"52296722|13688847": ["BLOCKCHAIN networks were first designed to be the backbone of a distributed, permissionless/public database for recording the transactional data of cryptocurrencies in a tamper-proof and totally ordered manner [2], [3]."]} +{"52296722|27262729": []} +{"3434731|1598350": []} diff --git a/edge/graph_56895374.jsonl b/edge/graph_56895374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6cab1d3089c1c2003a4a028f63fbbfc4d2a0d61d --- /dev/null +++ b/edge/graph_56895374.jsonl @@ -0,0 +1,9 @@ +{"14424486|7839197": ["AutoTutor emerged during a wave of research on animated interface agents (Dehn and Van Mulken 2000; Johnson et al. 2000; Nwana 1996), a trend that continued within educational technology and ITS specifically."]} +{"786570|12243484": ["Intelligent tutoring systems, knowledge components, learning events, tutoring", "Although ITS tutorials (Beck, Stern, & Haugsjaa, 1996; Corbett, Koedinger, & Anderson, 1997; Rickel, 1989; Shute & Psotka, 1996; Woolf, 1992) emphasized their structure (i.e., the software modules and knowledge sources), this description emphasizes their behavior."]} +{"11471168|17996903": ["The first paper (Nye 2014) nicely frames the problem of culture by providing an overview of the challenges and successes of Intelligent Tutoring Systems by and for the developing world."]} +{"7998069|16717715": []} +{"23560521|5473785": []} +{"11803429|14826104": ["\u2026high representative power and the fact that they lend themselves to an intuitive graphical representation, as well as the fact that they offer a well defined formalism that lends itself to sound probability computations of unobserved nodes from evidence of observed nodes (Desmarais & Baker, 2012)."]} +{"60806958|1708582": []} +{"16410544|14826104": ["Please see (Desmarais and Baker 2012) in this issue for an excellent overview of research in this area."]} +{"35707175|12243484": ["Rickel (1989) presents excellent analysis of researches related to ICAI systems based on following system component: learning scenario, domain knowledge representation, student modeling, pedagogical knowledge, user interface."]} diff --git a/edge/graph_56895382.jsonl b/edge/graph_56895382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ff59909d226aba8383346fc4e5ce5fc2e1a6a3a --- /dev/null +++ b/edge/graph_56895382.jsonl @@ -0,0 +1,27 @@ +{"3770767|2809360": ["Therefore, clinical natural language processing (NLP) technologies, which can extract important patient information from narrative clinical text, have been introduced to the medical domain and have demonstrated great utility in many applications [1]."]} +{"1033682|174797842": []} +{"1708582|17464562": []} +{"52884516|8310135": []} +{"52128218|1805048": []} +{"3619626|73497737": ["Continual Learning, also called \u201cLifelong Learning\u201d (Ruvolo and Eaton, 2013; Silver et al., 2013; Parisi et al., 2018) is a field of machine learning inspired by human ability to learn new tasks throughout their lifespan.", "8 Continual Learning Continual Learning, also called \u201cLifelong Learning\u201d (Ruvolo and Eaton, 2013; Silver et al., 2013; Parisi et al., 2018) is a field of machine learning inspired by human ability to learn new tasks throughout their lifespan.", "While older methods used linear models for lifelong learning (Ruvolo and Eaton, 2013), recent efforts have been focused on continual learning with neural networks (Parisi et al., 2018), in which one of key challenges is to address the catastrophic forgetting, a problem which traditional machine learning including neural networks is often susceptible to, but humans are immune to."]} +{"3619626|69194991": []} +{"3619626|12925459": ["Besides the traditional benchmarking approaches, the approaches for online portoflio selection can be categorized into Follow-the-winner, Follow-the-loser, Pattern Matching, and Meta-Learning approaches [217].", "Besides the traditional benchmarking approaches, the approaches for OLPS can be categorized into Follow-the-winner, Follow-the-loser, Pattern Matching, and Meta-Learning approaches (Li and Hoi, 2014).", "On-line Portfolio Selection (OLPS) is a natural application of online learning for sequential decisions of selecting a portfolio of stocks for optimizing certain metrics, e.g. cumulative wealth, risk adjusted returns, etc. (Cesa-Bianchi and Lugosi, 2006; Li and Hoi, 2014, 2015; Li et al., 2016a)."]} +{"3619626|38476": ["Sequential learning is mainly concerned with learning from sequential training data (Dietterich, 2002), formulated as follows: a learner trains a model from a collection of N training data pairs {(x(i),y(i)), i = 1, . . . , N} where x(i) = (xi1, xi2, . . . , xiNi) is an Ni-dimensional instance\u2026", "Sequential learning is mainly concerned with learning from sequential training data [298], formulated as follows: a learner trains a model from a collection of N training data pairs {(x(i), y(i)), i = 1, ."]} +{"3619626|1708582": ["Reinforcement Learning (RL) [308, 309] is a branch of machine learning inspired by behaviorist psychology, which is often concerned with how software agents should take actions in an environment for the goal of maximizing some cumulative rewards.", "Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998) is a branch of machine learning inspired by behaviorist psychology, which is often concerned with how software agents should take actions in an environment to maximize cumulative rewards."]} +{"3619626|1805048": ["Several survey paper provides detailed introduction to the regular CF techniques [180, 181].", "Several survey papers in (Shi et al., 2014; Su and Khoshgoftaar, 2009) gave detailed reviews of regular CF techniques."]} +{"51605731|8310135": []} +{"1954216|8310135": []} +{"10238949|15529291": []} +{"44095800|8310135": ["As baselines, we used a simple model which memorizes the word-tag assignments on the training data (Nadeau and Sekine, 2007) and a featurebased CRF (Lafferty et al., 2001), as it is a common model for Indonesian NER."]} +{"14731529|8310135": []} +{"2816661|8310135": ["NeuroNER is based on a fully supervised learning algorithm, which is the most studied approach (Nadeau and Sekine, 2007)."]} +{"2635684|1142636": ["But then again, when applied on large collections, the automation is especially important in order to provide the scalability needed to annotate existing documents and reduce the burden of annotating new documents [6]."]} +{"2635684|8310135": ["They claimed that \" named aims to restrict the task to only those entities for which one or many rigid designators, as defined by Kripke, stand for the referent \" [20][21]."]} +{"37583914|8310135": ["For more literatures on both tasks, we refer readers to the two extensive surveys [5], [6]."]} +{"207319017|8627028": ["In a recent survey of annotation projects for natural language processing tasks (Tomanek and Olsson, 2009), only 20% of the respondents said they had ever decided to use active learning, which is evidence of the community\u2019s skepticism about its usefulness in practice1."]} +{"417913|8310135": ["Named Entities Recognition (NER) is generally understood as the task of identifying mentions of rigid designators from text belonging to named-entity types such as persons, organizations and locations (Nadeau and Sekine, 2007)."]} +{"49587276|18484924": ["They also achieved 78.72 on Arabic, 72.19 on Czech and 91.30 on Turkish.", "There have also been surveys focused on NER systems for speci\ufb01c domains and languages, including biomedical NER, (Leaman and Gonzalez, 2008), Chinese clinical NER (Lei et al., 2013), Arabic NER (Shaalan, 2014; Etaiwi et al., 2017), and NER for Indian languages (Patil et al., 2016).", "NER shared tasks have also been organized for a variety of other languages, including Indian languages (Rajeev Sangal and Singh, 2008), Arabic (Shaalan, 2014), German (Benikova et al., 2014), and slavic languages (Piskorski et al., 2017).", "(2016) implemented word level feed forward NN, bi-directional LSTM (bi-LSTM) and window bi-LSTM for NER of English, German and Arabic."]} +{"49587276|1271753": ["Eltyeb and Salim (2014) presented an survey of various NER systems developed for such NER datasets with a focus on chemical NER."]} +{"49587276|42939535": ["There have also been surveys focused on NER systems for speci\ufb01c domains and languages, including biomedical NER, (Leaman and Gonzalez, 2008), Chinese clinical NER (Lei et al., 2013), Arabic NER (Shaalan, 2014; Etaiwi et al., 2017), and NER for Indian languages (Patil et al., 2016)."]} +{"49587276|8310135": ["These systems were followed by NER systems based on feature-engineering and machine learning (Nadeau and Sekine, 2007).", "The \ufb01rst comprehensive NER survey was Nadeau and Sekine (2007), which covered a variety of supervised, semi-supervised and unsupervised NER systems, highlighted common features used by NER systems during that time, and explained NER evaluation metrics that are still in use today."]} +{"14952688|8310135": []} diff --git a/edge/graph_56895486.jsonl b/edge/graph_56895486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71a63f3e3890e727d0204d06e792e38919b95948 --- /dev/null +++ b/edge/graph_56895486.jsonl @@ -0,0 +1,17 @@ +{"14645500|987239": ["The type and categorization of the models in a database are crucial when testing a retrieval method, and it is difficult to separate out the influence of the dataset in the performance [2]."]} +{"7111565|987239": ["For more details, we refer the reader to the recent surveys of the topic (Lew et al., 2006; Tangelder & Veltkamp, 2004; Iyer et al., 2005). www.intechopen.com"]} +{"1414576|205131192": ["The simplest approach of this type is to evaluate distances between feature vectors [Duda et al. 2001] \nin a multidimensional space where the axes encode global geometric properties, such as circularity, eccentricity, \nor algebraic moments [Prokop and Reeves 1992; Taubin and Cooper 1992].", "The differences are more signi.cant for more stringent classi.cation criteria \n(i.e., First-Tier) and for higher-order moments, which are known to be sensitive to noise [Prokop and \nReeves 1992].", "The simplest approach of this type is to evaluate distances between feature vectors [26] in a multidimensional space where the axes encode global geometric properties, such as circularity, eccentricity, or algebraic moments [52, 64].", ", First-Tier) and for higher-order moments, which are known to be sensitive to noise [52]."]} +{"9117881|987239": []} +{"1482463|8983048": ["Among all the existing surveys (Table 1), [11]\u2013[15] focus on rigid registration only."]} +{"1482463|7861381": ["We further discuss the problem of over-\ufb01tting and provides up-to-date references beyond those in existing surveys."]} +{"26362097|987239": []} +{"19926476|987239": []} +{"18823574|987239": []} +{"490930|6681074": ["3-D object recognition has long been a mainstay of the object recognition community, with excellent surveys found in [4,11,10]."]} +{"15002864|1482463": []} +{"5793282|6681074": ["3D surface registration is an important problem in computer vision with broad applications, such as 3D shape retrieval , face morphing, and object recognition [9]."]} +{"8063966|8983048": ["Two reviews on 3D modeling and range image registration by [30] and [31] are also worth mentioning.", "Moreover, computing the intersection of a sphere with the surface is not easy, especially when the surface is represented as a point cloud or a mesh [30]."]} +{"8063966|6681074": []} +{"16322757|987239": ["Survey papers to the related literature have been provided by Tangelder et. al[20] and Iyer et. al[9]."]} +{"207109683|6863252": ["There are many approaches to generate synthetic data for validation of medical image processing methods [5,6]."]} +{"14872260|987239": []} diff --git a/edge/graph_56895595.jsonl b/edge/graph_56895595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75ac012ce6aad510dd2eb1e6c8aec391d602887f --- /dev/null +++ b/edge/graph_56895595.jsonl @@ -0,0 +1,22 @@ +{"4562054|18567112": ["Malicious applications often target Android due to its high market share, and malware has grown dramatically between 2010 and 2014 [4].", "Bouncer does not provide complete protection and developers can often exploit vulnerabilities in Google\u2019s Bouncer [4]."]} +{"17980328|18567112": ["The BaseBridge [18] and Anserverbot [18] malware families employ this technique, and some malware families download the embed malicious payload from the remote server and successfully evade detection; the DroidKungFuUpdate [18] is a notable example[14].", "For instance, Geinimi conceals URLs by encrypting them with DES; RootSmart and Fjcon use AES to hide URLs and domain names [6].", "The Repackage technique replaces the original APP with a malware APP by disassembling/decompiling the original APP and attaching additional malicious code in it [14].", "Malicious applications between 2004-2007 are mostly designed for Symbian OS, and few of them are designed for iPhone and Android OS[6]."]} +{"18567112|6670217": ["art considering the popular mobile OS platforms [31], [32]."]} +{"4111957|14258620": []} +{"207237250|18567112": []} +{"207237250|11585698": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"13130982|3628110": ["There are many vulnerabilities in the Ethereum smart contract, including \"Call Stack Attack 8\", \"Time Dependance9\" and various other known vulnerabilities [32]."]} +{"3797027|18599847": ["The original BMs have not been demonstrated to be useful for practical problems, while RBMs are commonly used in deep learning.", "For instance, deep belief networks (DBNs) and stacks of restricted Boltzmann machines (RBMs) [3,48,49] have been applied in speech and image recognition [3,45,50] and natural language processing [51].", "Similar to AEs, RBMs can also pre-train parameters for a complex network.", "For instance, sequenced-based predictor of protein disorder using boosted ensembles of deep networks (DNdisor-der), a deep neural network with multi-layers of RBMs [184], achieved an average balanced accuracy of 0.82 and an AUC of 0.90.", "This restriction ensures the conditional independency of hidden units and visible units [91], i.e. , P \u00f0 h j v \u00de \u00bc P i p \u00f0 h i j v \u00de P \u00f0 v j h \u00de \u00bc P j p \u00f0 v j j h \u00de \u00f0 10 \u00de Furthermore, most RBMs rely on the assumption that all units in the network take only one of the two possible values 0 or 1, i.e. , m j ; h i 2 \u00f0 0 ; 1 \u00de .", "To predict splice junction at the DNA level, Yoon and his collaborators developed a novel DBN-based method that was trained on the RBMs by boosting contrastive divergence with categorical gradients [156].", "SAEs and RBMs can extract patterns from unlabeled data [186] as well as labeled data when stacked with a classi\ufb01er [156].", "A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101].", "Inaddition to feature extraction, RBMs can also learn distributions of unlabeled data as generative models, and classify labeled data as discriminative models (regard the hidden units as labels).", "RBMs restrict the BMs to a bipartite graph, i.e. , there are no connections within visible units m \u00bc x or hidden units (cid:2) h .", "RBMs are generative graphical models that aim to learn the distribution of training data.", "Similar to RBMs, DBNs can learn the distribution of the samples, or learn to classify the inputs given class labels [3].", "Overall, given the network architectures and optimized parameters, the distribution of the visible units could be computed as: A DBN can be viewed as a stack of RBMs [6,24,100] or AEs [66,101]."]} +{"422184|10657013": ["For further study on the similarities between traditional and mobile malware construction (e.g., in terms of features, methods, threats) refer to Felt et al. [2011], Branco et al. [2012], Bayer et al. [2009], and Rudd et al. [2016]."]} +{"422184|18567112": []} +{"422184|6670217": ["Built-in support for background SMS to premium numbers was also found in 45\u201350% [La Polla et al. 2013; Felt et al. 2011] of the samples, and user information harvesting, a top security issue in 2011 [Felt et al. 2011], is still a current issue with 51% of malware samples exhibiting this behavior\u2026", "Studies such as La Polla et al. [2013] and Felt et al. [2011] re\ufb02ected this shift by including emerging OSs such as Android and iOS, and by 2012 Android began to clearly dominate."]} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"53304118|9928823": []} +{"53304118|393948": []} diff --git a/edge/graph_56916529.jsonl b/edge/graph_56916529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2e5bbe2194b2477bc05e247ee06b013a154aeda --- /dev/null +++ b/edge/graph_56916529.jsonl @@ -0,0 +1,3 @@ +{"22537783|12377645": []} +{"22537783|627405": ["Thirdly, due to the known limitations of the search engines [6], we also noticed and confirmed that the automated search missed important studies."]} +{"18450777|816774": []} diff --git a/edge/graph_56978018.jsonl b/edge/graph_56978018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69d0ce024d300e09b9397c1f275f0735086a2d7d --- /dev/null +++ b/edge/graph_56978018.jsonl @@ -0,0 +1,2 @@ +{"7603310|5750732": ["Data mining is a process of discovering hidden patterns and information from the existing data (PhridviRaj & GuruRao, 2014)."]} +{"33477326|19043514": ["The fluid and intangible nature of knowledge makes its measurement an enormously complex and daunting task (Kankanhalli and Tan, 2005)."]} diff --git a/edge/graph_56979789.jsonl b/edge/graph_56979789.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_5699240.jsonl b/edge/graph_5699240.jsonl similarity index 100% rename from graph_5699240.jsonl rename to edge/graph_5699240.jsonl diff --git a/edge/graph_57001151.jsonl b/edge/graph_57001151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3059feceb0dc169649c86a3a1aa3e340e698a0af --- /dev/null +++ b/edge/graph_57001151.jsonl @@ -0,0 +1,7 @@ +{"16083956|205286988": ["Wireless Sensor Network (WSN) [ 1 ] [2] consists of large number of sensor nodes which are small in size, low cost and have limited memory size with sensing, computation and wireless communication capabilities."]} +{"16083956|1236072": ["SPIN nodes use three types of messages for communication [3] [ 4 ]:", "These are SPIN [3] [ 4 ] family of negotiation protocol and Directed Diffusion [4].", "These are SPIN [3] [4] family of negotiation protocol and Directed Diffusion [ 4 ]."]} +{"111555286|205286988": []} +{"15126513|13310760": ["\uf0b7 On the basis of Route Selection or path establishment [4, 5, 6, 7,24] 1."]} +{"15126513|1236072": ["\uf0b7 On the basis of Route Selection or path establishment [4, 5, 6, 7,24] 1.", "\uf0b7 On the basis of Number of path [4] 1.", "Hybrid protocols\n On the basis of protocol Operation [4, 6,24] 1.", "\uf0b7 On the basis of protocol Operation [4, 6,24] 1."]} +{"15126513|1230643": []} +{"14580084|270804": ["An exhaustive list and analysis of transport protocols for WSNs can be found in [3] and [4]."]} diff --git a/edge/graph_57012803.jsonl b/edge/graph_57012803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5701967.jsonl b/edge/graph_5701967.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57048228.jsonl b/edge/graph_57048228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8fae65005114aea79c0e8beaa3b880761e40de5 --- /dev/null +++ b/edge/graph_57048228.jsonl @@ -0,0 +1,2 @@ +{"9885120|1077083": []} +{"9885120|1113420": []} diff --git a/edge/graph_5707431.jsonl b/edge/graph_5707431.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57079027.jsonl b/edge/graph_57079027.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e47721f3c83983d485eb3ca0fc4420265401f99 --- /dev/null +++ b/edge/graph_57079027.jsonl @@ -0,0 +1,3 @@ +{"14383028|57079027": []} +{"14383028|17542426": []} +{"5731287|28340539": ["\u2022 Gossart [30] provides a review of the literature on rebound effects counter-acting ICT-induced progress in energy ef\ufb01ciency."]} diff --git a/graph_5708639.jsonl b/edge/graph_5708639.jsonl similarity index 100% rename from graph_5708639.jsonl rename to edge/graph_5708639.jsonl diff --git a/edge/graph_57097399.jsonl b/edge/graph_57097399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..443e7ec8346f9c6f6439fffd705564a86f7c4ed9 --- /dev/null +++ b/edge/graph_57097399.jsonl @@ -0,0 +1 @@ +{"16276975|5969994": []} diff --git a/edge/graph_57120041.jsonl b/edge/graph_57120041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57129027.jsonl b/edge/graph_57129027.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68465a4f9abadbde0f7b2f64747b21f7037575eb --- /dev/null +++ b/edge/graph_57129027.jsonl @@ -0,0 +1 @@ +{"9203705|13210924": ["R(Send_d) = \u2200x1 \u2208 X1, \u2200x2 \u2208 X2|x2[1] := x1[1] \u2227 x2[2] := x1[2] \u2227X \u2032 2 = X2 \u222a {x2}.", "R(Decr_R) = \u2200x12 \u2208 X12, \u2200x13 \u2208 X13|x13[2] :=x12[2] \u2227 x13[3] = x12[4] \u2227 x13[6] :=x12[3] \u2227 x13[7] = x12[5] \u2227X \u2032 13", "Organizations with a low budget can now utilize high computing and storage services without heavily investing in infrastructure and maintenance [2],", "R(download) = \u2200x10 \u2208 X10, \u2200x11 \u2208 X11|x11[5] = x10[1] \u2227x11[6] := x10[2] \u2227X \u2032 11 = X11 \u222a {x11}.", "R(Upload) = \u2200x8 \u2208 X8, \u2200x9 \u2208 X9|x9[1] = x8[7] \u2227 x9[2] := x8[8] \u2227X \u2032 9 = X9 \u222a {x9}."]} diff --git a/edge/graph_57133621.jsonl b/edge/graph_57133621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cae6e60222f279c538ccaf877c95d65a3818147f --- /dev/null +++ b/edge/graph_57133621.jsonl @@ -0,0 +1,5 @@ +{"1284934|14441987": ["Most previous research on ad-hoc network routing [17, 13, 23, 24, 26, 30, 19, 18] focused on the protocol design and performance evaluation in terms of the message overhead and loss rate."]} +{"17958035|14441987": ["network so that messages can be delivered in a timely manner during mobility and changing topology [4]."]} +{"788177|1230643": ["We assume that the requirements (ri) are given.", "The problem is formulated as an anycast routing problem in which the objective is to maximize the time until the first battery drains-out."]} +{"13403320|14441987": ["Basically, there are two approaches in providing ad hoc network connectivity: \u2022 Flat-routed network architecture \u2022 Hierarchical network architectures [1] In the flat-routed network architecture, all the nodes are equal and packet routing is done based on peer-to-peer connections.", "In general, existing routing protocols can be classified as either: \u2022 Table-driven \u2022 On-demand \u2022 Hybrid [1, 2] Table-driven protocols attempt to continuously update the routes within the network so that when a packet needs to be forwarded, the route is already known and can immediately be used."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} diff --git a/edge/graph_57167037.jsonl b/edge/graph_57167037.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57181866.jsonl b/edge/graph_57181866.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86566cbbaf3563d8bf27ad82689aaec8e564d667 --- /dev/null +++ b/edge/graph_57181866.jsonl @@ -0,0 +1,10 @@ +{"154989280|54941190": []} +{"8350719|15248553": ["[26] review a significant number of such SC-based applications."]} +{"8350719|26257441": ["[21] investigated the potential of soft computing techniques by comparing them to the statistical techniques in meta-modeling and they provided some recommendations about their appropriate use."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} diff --git a/edge/graph_57189241.jsonl b/edge/graph_57189241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..351b9e11dfd6e04d6d128245842947de7939f311 --- /dev/null +++ b/edge/graph_57189241.jsonl @@ -0,0 +1,6 @@ +{"9866208|17485266": ["There are several optimizers such as RMSprop and Adam [16].", "In this work, we use an improved version of Adam called Nesterov Adam (Nadam) which is a RMSprop with Nesterov momentum."]} +{"3051291|393948": ["In this paper we introduce deep learning (unsupervised feature learning) [2] techniques, which have proven successful in natural language processing, into network analysis for the first time."]} +{"19002372|393948": ["The composition of linear operations yields another linear operation [61].", ", the depth of the representation) has shown promising results in tackling data complexity and the curse of dimensionality issues [61,17]."]} +{"2740197|393948": ["Conventional techniques are composed of a single, often linear, transformation of the input space and are limited in their ability to process natural data in their raw form [21].", "AEs are mostly used for representation learning [21] and are often regularized by adding noise to the original data (i.", "Alternatively, representation learning methods allow to automatically discover the representations needed for prediction from the raw data [21, 22]."]} +{"2740197|15669036": ["work called \u2018differential privacy\u2019 [109, 110] to ensure the indistin-"]} +{"2088679|393948": []} diff --git a/edge/graph_57189463.jsonl b/edge/graph_57189463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f2a19b6b26fc000db5eaf718c5ac8d9b9e751d4 --- /dev/null +++ b/edge/graph_57189463.jsonl @@ -0,0 +1,6 @@ +{"3508081|3330461": ["D2D communication is an effective technique for capacity improvement in terrestrial communication systems [15]."]} +{"36951678|353822": []} +{"53726738|21557844": ["The use of the mmWave spectrum, however, is challenging because it is sensitive to blockage and requires the LoS propagation between the transmitter and the receiver [79]."]} +{"53726738|61132": ["Furthermore, in military applications, such as reconnaissance, surveillance, attack, and patrol, the usage of the single-UAV networks is almost thirty years old [6].", "\u2026node may trigger the recon\ufb01guration of the whole UAV network [46]. b) Decentralized self-organization: Under the decentralized self-organization model, each entity makes self-decisions and takes actions according to nearby/local information, i.e., the direct interaction with neighbor UAV nodes [6].", "Depending on applications, the speed of a UAV may be in the range of 0-460 km/h [6], [13].", "For more information on transmission mechanisms of UAV networks, please refer to [6], [13] and references therein.", "Multi-UAV networks present a star/mesh topology structure [6].", "The procedure of the self-organization network model is as follows [6]: when a UAV node fails or new UAV node joins, its neighbor(s) monitors the incoming and outgoing links.", "Moreover, the network self-organization generates computational overhead and requires high bandwidth [6].", "On the other hand, owing to frequent changes of the network con\ufb01guration, UAV networks should be self-healing/self-organized to be more fault tolerant [6].", "To improve the reliability of the end-to-end data transmission in highly dynamic networks, delay/disruption-tolerant network (DTN) routing protocols may be required [6]."]} +{"53726738|19938676": ["Moreover, UAV communication networks have been regarded as promising proposals for the 5G system where the gigabits per second (Gb/s) data transfer rate is considered as one of the key performance indicators [51]."]} +{"53726738|26398795": ["\u2026three groups: deterministic, stochastic, and enhanced routing protocols. a) Deterministic routing protocol: In the deterministic routing protocol, a node carrying packets may select a next hop node according to deterministic/known information (e.g., contact, queue, and traf\ufb01c demand) [66], [67].", "The disadvantages of the broadcast-based routing protocol are [66]: \u2022 Contention: It may create contention for buffer space and transmission time (or the channel resource)."]} diff --git a/edge/graph_57189491.jsonl b/edge/graph_57189491.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..553697201d676cd8a62b6e56d6ba69beceb0fa73 --- /dev/null +++ b/edge/graph_57189491.jsonl @@ -0,0 +1,7 @@ +{"43205110|206977741": []} +{"43205110|10398826": ["In order to classify researchers\u2019 contribution areas [20] we also categorized the research issues.", "4 Classification Schema We grouped 123 studies, which we had after filtering process, with a view of software testing as test levels [19] and test types [20]."]} +{"15093265|7696556": []} +{"15093265|27317885": ["5 2005 No No Workshop 119 N Evidence produced by empirical software engineers [40] RT 2 2005 No Yes Conference 13 N Classifying context in SE experiments [41] SERT 2.", "5 [40] SLR P Y N P 2 [41] MS Y Y N P 2.", "System and application specialties 42 [41] 1 [15] 1 2 1 Total 233 12 8 6 4 11 8 29 17"]} +{"36536|14920988": ["Prior to this survey, other authors have contributed technical overviews of the field, such as References [79] and [22]."]} +{"205437809|14022070": ["Combinatorial-based methods for event sequence testing manage this complexity by systematically examining combinations for only a subset of events [4,7,8]."]} +{"8181915|206977741": ["Our initial informal literature searches found very little evidence on mobile applications testing; this also provided motivation for conducting a rigorous systematic mapping study e.g. (Muccini et al., 2012), (Harrison et al., 2013).", "Another study by (Harrison et al., 2013) conducted a small and informal literature review in the specific area of mobile usability models.", "We also found a wide variety of studies reporting mobile testing tools and methods (e.g. (Looije et al., 2007), (Harrison et al., 2013), (Muccini et al., 2012)), but few that apply a rigorous empirical approach.", "According to (Harrison et al., 2013), in the context of mobile applications, usability is represented in terms of three attributes; effectiveness, efficiency, satisfaction and cognitive load."]} diff --git a/edge/graph_57190310.jsonl b/edge/graph_57190310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a221b698a4eff589e498ef0f795f864a18c12db8 --- /dev/null +++ b/edge/graph_57190310.jsonl @@ -0,0 +1,8 @@ +{"36664062|13022232": []} +{"207155964|10500613": ["Hence, the task of finding mappings (semi-) automatically has been an active area of research in both database and ontology communities [22, 15].", "Heuristic-based approaches to ontology mapping are similar to heuristic-based approach to matching database schemas and XML structures ([22, 17]) and use lexical and structural components of definitions to find correspondences."]} +{"8434895|13022232": ["WoD browsershave been the first systems developed for WoD utilization and analysis [35, 4].", "Distribution of this paper is permitted under the terms of the Creative Commons license CCby-nc-nd 4.0 LWDM \u201816 March 15, 2016, Bordeaux, France .", "0 LWDM \u201816 March 15, 2016, Bordeaux, France [35].", "A large number of works studying issues relat ed to WoD visual exploration and analysis have been proposed in the literature [35, 101, 4].", "Published in the Workshop Proceedings of the EDBT/ICDT 2016 Joint Conference (March 15, 2016, Bordeaux, France) on CEUR-WS.org (ISSN 1613-0073)."]} +{"8434895|2593345": ["\u2026systems (Section 3.1), (2) Generic visualization systems (Section 3.2), (3) Domain, vocabulary & device-speci\ufb01c visualization systems (Section 3.3), (4) Graph-based visualization systems (Section 3.4), (5) Ontology visualization systems (Section 3.5), and (6) Visualization libraries (Section 3.6)."]} +{"8434895|14205872": ["In what follows we focus on graph-based ontology visualization systems that have been developed in the WoD context [47, 40, 51, 91, 80]."]} +{"26128007|14205872": ["A number of ontology visualization techniques have been proposed in the last couple of years [8, 17, 18]."]} +{"18877254|239537": ["However, such graphs are often difficult to comprehend and analyse due to their sheer size, but can be useful for abstract overviews of whole networked structures [8].", "[14] and [8] stressed the importance of reducing the visualised graphs into smaller sized sub graphs that users can browse to visualise other parts of the network.", "[8] surveyed a wide range of visualisation techniques and concluded that all existing algorithms have a size limit after which they cannot cope.", "Pan & Zoom [8] describe two useful types of zooming, Geometric, and Semantic.", "Such characteristics have been shown to be vital for visualising large information networks [8] [20].", "how the graph changes each time it is drawn [14][8].", "Unpredictability may cause high interaction difficulties, but dealing with small or sparse graphs may ease this problem [8]."]} +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} diff --git a/edge/graph_57191020.jsonl b/edge/graph_57191020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa4759276bd2208b80e95281878e8c6069fbca45 --- /dev/null +++ b/edge/graph_57191020.jsonl @@ -0,0 +1,11 @@ +{"17146219|18418184": ["printing should handle noise and other modifications well, while limiting the amount of false positives and processing time [5]."]} +{"17738312|18418184": ["On the other hand, audio fingerprinting [7] is an example of a task with a highly specific match.", "[ 74 ,7 6] P C P O T Is D P D P M at ch le ng th"]} +{"8992267|18418184": [", [10,39], as well as cross-modal search, see, e."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"3353459|18418184": []} diff --git a/edge/graph_57191022.jsonl b/edge/graph_57191022.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c36d500a59b317b3000861c70ab57ab5815f0f5 --- /dev/null +++ b/edge/graph_57191022.jsonl @@ -0,0 +1,3 @@ +{"207178741|14287707": ["Music Information Retrieval:\nRecent Developments and Applications\nMarkus Schedl Johannes Kepler University Linz, Austria\nmarkus.schedl@jku.at\nEmilia G\u00f3mez Universitat Pompeu Fabra, Barcelona, Spain\nemilia.gomez@upf.edu\nJuli\u00e1n Urbano Universitat Pompeu Fabra, Barcelona, Spain\njulian.urbano@upf.edu\nBoston \u2014 Delft", "ISBN: 978-1-60198-807-2 c\u00a9 2014 M. Schedl , E. G\u00f3mez and J. Urbano\nAll rights reserved.", "Knees and Schedl [127], give a survey of music similarity and recommendation methods that exploit contextual data sources.", "+31-6-51115274\nThe preferred citation for this publication is\nM. Schedl , E. G\u00f3mez and J. Urbano."]} +{"9545434|206602044": ["However, it finds good parallels with the task of speaker diarization [21], [22], which is an active area of research.", "They have also been used prominently in unsupervised speaker clustering for speaker diarization [21]."]} +{"9545434|17574321": ["For monophonic source identification, a variety of source-specific timbre features can be extracted from the complete signal directly [11], [12]."]} diff --git a/edge/graph_57192094.jsonl b/edge/graph_57192094.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57194320.jsonl b/edge/graph_57194320.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a45eece3f6178ef7f2a7733ed62e84caf9a99771 --- /dev/null +++ b/edge/graph_57194320.jsonl @@ -0,0 +1,18 @@ +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"2366893|1762301": ["There has been an intensive study in routing protocols for terrestrial wireless ad hoc [9] and sensor networks [10] in the last few years."]} +{"11188425|870434": ["As a promising solution to aquatic environmental monitoring and exploration, Underwater Sensor Network (UWSN) has attracted significant attention recently from both academia and industry [1], [2], [3], [4], [5]."]} +{"17166573|870434": [", building underwater sensor networks) to enable/enhance applications such as oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications [9], [8], [2], [4], [3], [7]."]} +{"31799015|870434": ["On the other hand, optical modems have been shown to achieve data rates reaching to Mbit/s with ranges up to 100m, only in very clear water conditions [2].", "In underwater, radio signals attenuate rapidly, hence they can only travel to short distances while optical signals scatter and cannot travel far in adverse conditions, as well [2]."]} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"14708935|870434": ["BACKGROUND AND RELATED WORK Recent advances in communications and electronics have enabled the development of economical, low-power, multifunctional underwater sensor nodes that are small in size and can communicate for short distances via wireless links [2].", "The underwater acoustic propagation speed is five orders of magnitude slower than the speed in a terrestrial radio channel."]} +{"46417765|17205659": ["One of major concerns in the sensor network applications is how the confidentiality of the sensed data and the control message exchanged among sensor nodes can be guaranteed [1\u20134]."]} +{"37848865|9410318": []} +{"37848865|870434": []} +{"6105131|8914588": ["In conclusion, though the early solutions for coping \nwith the dynamic nature of WSONs was initiated by DARPA in 1997 [Huebscher and McCann 2008], the research \non adaptive networking services is still increasingly interesting and popular."]} +{"6105131|1762301": ["inspired many variations for different purposes) [Hong et al. 2002; Abolhasan et al. 2004].", "\u2026we discuss the main adaptive approaches to mobile routing 23:18 C. \nSengul et al. protocols as well as the main concepts behind them, presenting representative pro\u00adposals \nfor each approach (which have inspired many variations for different purposes) [Hong et al. 2002; Abolhasan \net al. 2004]."]} +{"5574189|1230643": ["These characteristics include the limited energy, low computation capability, small storage, narrow bandwidth, short communication range [1] and the intermittent connectivity that end-to-end paths do not always exist in networks [2].", "A WSN can consist of one to several types of sensor nodes such as visual, thermal, acoustic, infrared, radar, low sampling rate magnetic, and seismic [1]."]} +{"16326047|17205659": ["In [41], it is proposed to add forward and backward secrecy, as new sensors are being deployed and old sensors fail."]} +{"35260963|870434": ["signals would be rapidly absorbed by water [11]\u2013[12]."]} diff --git a/graph_5722102.jsonl b/edge/graph_5722102.jsonl similarity index 100% rename from graph_5722102.jsonl rename to edge/graph_5722102.jsonl diff --git a/edge/graph_57235284.jsonl b/edge/graph_57235284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5724477.jsonl b/edge/graph_5724477.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58e0365a9eff3aa2332ee63e15793d70542f160e --- /dev/null +++ b/edge/graph_5724477.jsonl @@ -0,0 +1,5 @@ +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"10985974|1634674": []} +{"15395523|1634674": ["More recently, Turaga et al. [9] and Aggarwal et al. [31] present surveys focusing on highlevel representation of complex activities and corresponding recognition techniques."]} +{"15395523|20905429": ["Over the past decade, sensor technologies, especially low-power, low-cost, high-capacity, and miniaturized sensors, wired and wireless communication networks [11]\u2013[13],"]} +{"15395523|7788290": ["HMMs have more recently been adopted as a model of choice in computer vision for modeling sequential (video) data (see [5] and [7] for surveys, and [94] and [102] for early examples).", "However, it is worth pointing out that while visual monitoring is intuitive and information-rich, vision-based activity recognition suffers from issues relating to privacy and ethics [4], [5], [8] as cameras are generally perceived as recording devices.", "Gavrila [5] and Poppe [6] present surveys mainly on tracking human movement via 2-D or 3-D models and the enabled action recognition techniques."]} diff --git a/edge/graph_57253620.jsonl b/edge/graph_57253620.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb0dad9706510be22840e5a0d2f540f37657b2b1 --- /dev/null +++ b/edge/graph_57253620.jsonl @@ -0,0 +1,4 @@ +{"37097438|8364569": ["For example, in Ping of Death attack, an echo request message is sent to the host with a size larger than the normal packet size (Sperotto et al., 2010)."]} +{"37097438|15247126": ["As an example, IP spoofing attack is based on a spoofed IP address in the IP header to enable an intruder to appear as a trusted node and establish connection with a victim node (Zander et al., 2007)."]} +{"51996639|18740719": ["Due to the escalating cyber threats on SCADA, Cherdantseva et al. (2016) reviewed and compared effective risk assessment methods for SCADA systems where the authors explored the ideas of what can go wrong, likelihood that it would go wrong, and the consequences."]} +{"65321327|6952653": ["According to Wooldridge and Jennings [46], an agent can be de\ufb01ned as a computer system that is situated in some environment, and that is capable of autonomous action in this environment in order to meet its design objectives."]} diff --git a/edge/graph_57260062.jsonl b/edge/graph_57260062.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29e44ed2440fcfda57165e59a3e386a783997755 --- /dev/null +++ b/edge/graph_57260062.jsonl @@ -0,0 +1,4 @@ +{"16087532|50458504": ["The cost of misclassification (false positive and false negative errors) differs, with a false negative error (misclassifying a fraudulent activity as a normal activity) usually being more costly than a false positive error (misclassifying a normal activity as a fraudulent activity) [3].", "\u2016 In academic literature fraud is defined as leading to the abuse of a profit organization's system without necessarily leading to direct legal consequences [3].", "1 consists of two layers, the first comprising the six data mining application classes of classification, clustering, prediction, outlier detection, regression, and visualization [3,16,18,22,23], supported by a set of algorithmic approaches to extract the relevant relationships in the data [14].", "In a study [3], Na\u00efve Bayes classifier outperformed the conventional classifier.", "1, is based on a literature review of existing knowledge on the nature of data mining research [19,20], fraud detection research [1,3,16,17,18].", "A survey of data mining-based fraud detection research is presented in [3], including credit transaction fraud, telecoms subscription fraud, automobile insurance fraud, terrorist detection, financial crime detection, intrusion and spam detection.", "Concerning this reality, the most optimal and cost effective option is to find out enough evidences of fraud from the available data using specialized mathematical and data processing algorithms [3].", "This area has become one of the key applications of data mining techniques in established industry or government organizations [3]."]} +{"16087532|954543": ["1, is based on a literature review of existing knowledge on the nature of data mining research [19,20], fraud detection research [1,3,16,17,18]."]} +{"18986914|3102110": []} +{"10198239|954543": ["(v) Regression: Regression is a kind of statistical estimation technique used to map each data object to a real value provide prediction value (Carrier & Povel, 2003; Mitra et al., 2002).", "In addition, Ahmed, 2004; Carrier and Povel, 2003; Mitra et al., 2002; Shaw et al., 2001 described the types of data mining model as Association, Classification, Clustering, Forecasting, Regression, Sequence Discovery and Visualization.", "It aims at building a model to predict future customer behaviours through classifying database records into a number of predefined classes based on certain criteria (Ahmed, 2004; Berson et al., 2000; Chen, Hsu, & Chou, 2003; Mitra et al., 2002).", "(iii) Clustering: Clustering is the task of segmenting a heterogeneous population into a number of more homogenous clusters (Ahmed, 2004; Berry & Linoff, 2004; Carrier & Povel, 2003; Mitra et al., 2002).", "(i) Association: Association aims to establishing relationships between items which exist together in a given record (Ahmed, 2004; Jiao, Zhang, & Helander, 2006; Mitra et al., 2002).", "Its goal is to model the states of the process generating the sequence or to extract and report deviation and trends over time (Mitra et al., 2002).", "(vi) Sequence discovery: Sequence discovery is the identification of associations or patterns over time (Berson et al., 2000; Carrier & Povel, 2003; Mitra et al., 2002)."]} diff --git a/edge/graph_57275108.jsonl b/edge/graph_57275108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5729190.jsonl b/edge/graph_5729190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bc9b48d0fe0c11d054d61d97f4252ca442e4212 --- /dev/null +++ b/edge/graph_5729190.jsonl @@ -0,0 +1,12 @@ +{"14911813|2762290": ["The survey of [8] identifies incorrect segmentation as one of the major contributors to errors in using conventional OCR on scanned documents."]} +{"42476557|2762290": ["The strategy of exploiting linguistic knowledge and the implementation of segmentation and classification, however, depend on specific application [10], [11]."]} +{"14583712|6423795": ["[15], that covers some advances in this area."]} +{"15304978|6972141": ["Effective text detection and recognition systems have been very useful in a variety of applications such as robot navigation [1], image search [2], and human computer interaction [3]."]} +{"16985|6137971": ["For more details about bandlets the reader is referred to [16].", "(a) (b) (c) (d) (e) Figure 1: Bandlet transform [16, 24].", "Bandlet transform [16] exploits such anisotropic regularity."]} +{"60791531|2762290": []} +{"13205478|17639662": [", superimposing) and elastic matching [6], were employed for evaluating the shape similarity used in the recognition procedure of Section 3."]} +{"16963812|2762290": ["Casey and Lecolinet [4] provided a comprehensive literature survey of character segmentation methods for document images."]} +{"7486022|2762290": ["However, character segmentation is not an easy problem [24] and there are examples where this approach may fail (See Fig."]} +{"5053740|16082889": []} +{"5053740|15782139": []} +{"17658558|15782139": ["The language model has been widely adopted in speech recognition [7] and handwritten recognition [8]."]} diff --git a/edge/graph_57295580.jsonl b/edge/graph_57295580.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5730706.jsonl b/edge/graph_5730706.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dea5f4a98cd2feafb7a5103ade43f1ff116cd807 --- /dev/null +++ b/edge/graph_5730706.jsonl @@ -0,0 +1,10 @@ +{"39078143|14697846": []} +{"39078143|9104850": ["Given the explosive growth of the Internet, web-servers suffer congestion and bottleneck, which substantially decreases their quality of service [Wang, 1999]."]} +{"5558556|16449507": ["Since this provenance schema is based on the OPM recommendation [26], the classes Activity and Task are mapped as Processes."]} +{"5558556|6923178": []} +{"13880862|16449507": []} +{"23315734|1497912": []} +{"38522620|16449507": ["This kind of query is related to the relationships among data objects such as specified in the OPM model (Moreau et al., 2008)."]} +{"108803|16449507": []} +{"62551221|16908400": ["Inferring node topology in CornetClustering (Section 5.3) is similar in spirit to inferring network coordinates [17]."]} +{"62551221|713082": ["Diot et al. provide a comprehensive survey and taxonomy of relevant protocols and mechanisms of distributed multi-point communication in [16]."]} diff --git a/edge/graph_5734834.jsonl b/edge/graph_5734834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a87429018ffb47ddc0f2772d736ed0f04dc7954a --- /dev/null +++ b/edge/graph_5734834.jsonl @@ -0,0 +1,10 @@ +{"57603956|11792588": ["The statistical, global transformation and series expansion, and geometrical and topological techniques are the commonly used feature extraction methods in handwritten character or document representation [6, 7]."]} +{"57603956|192934": ["It extracts a set of descriptors, various characteristic attributes, the relevant information associated to form a representation of input pattern [1-4]."]} +{"27854945|192934": []} +{"53304778|192934": ["Some attempts were made to recognize documents as phoneme sequences and then to match them with the query words, but the performances were much lower than in the alternative approach [3]."]} +{"12531971|11792588": []} +{"12531971|15782139": ["Related surveys are found in [12], [13], [ 14 ], [15]."]} +{"2258370|16082889": []} +{"2258370|11792588": []} +{"2258370|14580698": []} +{"2258370|15782139": ["Hidden Markov Models (HMMs) have been widely applied to offline handwriting recognition [8], [ 2 ], [4], [5], [6], [9], [10], [11] after their success in automatic speech recognition.", "High recognition rates are achieved in character recognition and isolated word recognition, but we are still far from achieving high-performance recognition systems for unconstrained offline handwritten texts [1], [ 2 ], [3], [4], [5], [6], [7]."]} diff --git a/edge/graph_57348589.jsonl b/edge/graph_57348589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4dc724d3579e11df255b1a7d4c7b5a7a3d102b6 --- /dev/null +++ b/edge/graph_57348589.jsonl @@ -0,0 +1,3 @@ +{"36621999|9040432": ["9 implementations already have been presented [24-28] ."]} +{"3464044|13392386": []} +{"3464044|16654832": ["Its main function is to migrate the compute-intensive tasks from a mobile device to cloud, in order to overcome the limitation of mobile device computing power, storage capacity, and battery life [11]."]} diff --git a/edge/graph_57362346.jsonl b/edge/graph_57362346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed6006b1a8c0bab86378a9ec08d758f2a8ee2f55 --- /dev/null +++ b/edge/graph_57362346.jsonl @@ -0,0 +1 @@ +{"18759896|11810221": ["The purpose is to obtain proactive schedules that hedge for variation (Herroelen and Leus 2005)."]} diff --git a/edge/graph_57373791.jsonl b/edge/graph_57373791.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e67d448c75a1c9bcb628afa87bd0bd4e4a6420d --- /dev/null +++ b/edge/graph_57373791.jsonl @@ -0,0 +1,30 @@ +{"8840764|9232391": []} +{"7684482|11608263": ["To name just a few, if the expected class label for \ud835\udc99 \u2032 is single, then the predicted label could be \ud835\udc66 \u2217 = argmax \ud835\udc66 \ud835\udc5d ( \ud835\udc66 \u2223 \ud835\udc99 \u2032 ) , together with a con\ufb01dence measure \ud835\udc5d ( \ud835\udc66 \u2217 \u2223 \ud835\udc99 \u2032 ) .", "For the problem of exact age estimation, the predicted age could be the one with the maximum description degree.", "After that, the experiments on facial age estimation are reported in Section 4."]} +{"14676146|11608263": ["\u2026j=1 min(log-loss(y\u0302(i)j , y (i) j ), ln(N))\nwhere:\nlog-loss(y\u0302, y) = \u2212(ln(y\u0302)y + ln(1 \u2212 y\u0302)(1 \u2212 y)) All measures have been reviewed in Read (2010) and are commonly used in the literature (e.g. Tsoumakas and Katakis 2007; Tsoumakas and Vlahavas 2007; Read et al. 2009; Cheng et al. 2010).", "We use the version of this dataset specified in Tsoumakas and Vlahavas (2007). IMDB comes from the Internet Movie DataBase; data, where movie plot text summaries are labelled with relevant genres.", "The methods which we outline\nhere have been previously discussed and cited in many works, for example, Tsoumakas and Katakis (2007), Read (2010) both give detailed overviews.", "Table 2 displays the performance of the binary relevance BR and label combination LC problem transformation methods on both synthetic datasets, as well as a selection of real datasets (Scene, Yeast, Enron, and Medical; see e.g. Tsoumakas and Katakis 2007;\nRead 2010 for details), for comparison."]} +{"18484924|15222577": ["Koulali, Meziane, and Abdelouafi (2012) developed an Arabic NER using a combined pattern extractor (a set of regular expressions) and SVM classifier that learns patterns from POS tagged text."]} +{"18484924|8310135": []} +{"6418797|11608263": ["\u2026apart from the fact that complexity is not our main concern here, one may argue that several other methods suffer from the same problem, including the label power-set approach (Tsoumakas & Katakis, 2007), as also graphical models estimating the joint distribution (Ghamrawi & McCallum, 2005)."]} +{"51615599|1596835": ["The complete survey of hashing can be referred to [23].", "Inspired by the success of binary code for approximate nearest neighbor (ANN) search [23], the binary constraint is imposed on the continuous embeddings in the common subspace."]} +{"5539628|11608263": ["Binary relevance (BR) (Tsoumakas and Katakis 2007): It serves as a baseline that trains each label independently."]} +{"10081660|1386147": ["In the second variant, random noise is added to the training dataset to form the second objective."]} +{"10081660|1097238": ["There is always a trade-off between these two characteristics [37] and this is summarized by the error-ambiguity decomposition presented by Krogh and Vedelsby [15].", "There may be one model in the Pareto set that is able to perform better than an ensemble, however, there is no clear way of selecting this individual model [37].", "Different data samples, network parameters and initialization methods, as well as using different 110 learning algorithms have all been used to implicitly create diverse ensemble members [36, 37]."]} +{"10081660|1400872": []} +{"3691988|9232391": []} +{"3691988|15888893": ["The study of MOGP has a long history and is known as multivariate Kriging or Co-Kriging [16, 17, 18, 19] in the geostatistic community; it also overlaps with the broad field of multi-task learning [20, 21] and transfer learning [22, 23] of the machine learning community."]} +{"3691988|456491": []} +{"3691988|13985031": [", small- or largescale regression [4, 5, 6], dimensionality reduction [7], Bayesian optimization [8], uncertainty quantification [9] and time-series analysis [10]."]} +{"3691988|14843594": []} +{"15099537|11608263": ["\u2022 BINARY RELEVANCE [12]: BR is a popular baseline for multi-label classification.", "Binary Relevance (BR) [12] is a standard baseline for multi-label learning, which treats each label as an independent binary classification.", "Binary relevance (BR) [12] is a popular baseline for multi-label classification, which simply treats each class as a separate binary classification and makes use of feature-label correlations to solve the problem.", "Most existing works focus on exploiting the correlations between features and labels (featurelabel correlations) [12], the correlations between labels (label-label correlations) and the correlations between instances (instance-instance correlations) [1,3,13,9]."]} +{"52843253|11608263": ["dataset is, Label Cardinality and Label Density are used. Label Cardinality is the average number of relevant labels of the instances in D; Label Density is the Label Cardinality per number of labels [30], indicating the percentage of labels that are relevant on average. LC(D)= 1 N \u00d5N i=1 |yi| LD(D)= LC(D) L = 1 LN \u00d5N i=1 |yi| Our experiments are conducted on 7 datasets1 that are from diverse applicat"]} +{"5776631|11608263": []} +{"9232391|456491": ["\u00b4Alvarez et al. 47 reviewed at length kernel methods for vector-valued functions, focusing especially on regularization and Bayesian prospective, connecting the two points of view.", "2005 Micchelli and Pontil(9) 2005 \u00c1lvarez at al.(47) 2012 De\u2019ath(49) 2002 Appice and D\u017eeroski(2) 2007 Kocev et al.", "\u00c1lvarez et al.(47) reviewed at length kernel methods for vector-valued functions, focusing especially on regularization and Bayesian prospective, connecting the two points of view."]} +{"9232391|11608263": []} +{"201720|38476": ["However, it is well-known that this approach fails to exploit a lot of significant information [5]."]} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"8168187|11608263": ["Among image classification tasks, multi-label classification aims at predicting multiple labels for an input image, whcih can be achieved by the technique of binary relevance [44] using neural networks.", "In general, binary relevance [44] is the simplest solution to multi-label classification problems, which coverts the original task to multiple disjoint binary classification problems."]} +{"195665589|11632848": ["(3) Hybrid: Combined data-level and algorithm-level rebalancing [55,56,57]."]} +{"195665589|393948": ["feature representations [20], [21], [22], [23]."]} +{"53722003|11608263": ["The binary context as used in ECC usually entails considerable redundancy in the learning space, as also noticed in the case of the multi-label binary approach in Yan et al. (2007). Some other methods have also been used in the literature for reducing the complexity of binary relevance problems by taking advantage of label sparsity using compressive sensing techniques (Tai and Lin 2010; Hsu et al.", "The most common problem transformation method is the binary relevance method (BR) (Tsoumakas and Katakis 2007; Godbole and Sarawagi 2004; Zhang and Zhou 2005).", "Here, Label Cardinality (LCARD) is a standard measure of \u201cmulti-labelled-ness\u201d, introduced in Tsoumakas and Katakis (2007). It is simply the average number of labels associated with each example; defined for N examples as:"]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} +{"12415435|11608263": ["Multilabel classification methods can be categorized into two different groups [11]: i) problem transformation methods, and ii) algorithm adaptation methods.", "html Table 1 shows certain standard statistics of these datasets, such as the number of examples in the train and test sets, the number of numeric and discrete attributes and the number of labels, along with multilabel data statistics, such as the number of distinct label subsets, the label cardinality and the label density [11].", "We selected the support vector machine (SVM) [21] for the experiments, based on its strong performance in a past study [11]."]} +{"2013706|11608263": ["Most of the existing multilabel methods learn a decision function or weight vector per label and then combine the decision functions in a certain manner to predict labels for an unseen point [3, 4, 2, 5, 6]."]} diff --git a/edge/graph_57373837.jsonl b/edge/graph_57373837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e9e5fd363d31e06d86f21ed5e95f5035d050689 --- /dev/null +++ b/edge/graph_57373837.jsonl @@ -0,0 +1,12 @@ +{"51929689|3273340": ["and hardware design, the results of the present work focus on the frame rate and power consumption of the algorithm, which are hardware dependent [13], [45].", "The energy consumption of CNNs is dominated by data movement instead of the computation itself [13].", "Despite the rapid development of deep learning methods, and CNNs for computer vision purposes particularly, the gap between software and hardware implementations is already considerable [13]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"206592484|456491": []} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"353038|17779575": ["According to our study, this duplication results in up to 25x more data volume for the input feature maps in the CONV layer, and thus diminishes the gains of FPGA acceleration considering that FPGA platforms have extremely limited bandwidth (about 10 to 20 GB/s [26]) compared to CPU/GPU platforms (up to 700GB/s [27])."]} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} diff --git a/edge/graph_57375717.jsonl b/edge/graph_57375717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d31411f4ac06b15cd30d2bd4e7bdcaf11748207a --- /dev/null +++ b/edge/graph_57375717.jsonl @@ -0,0 +1,24 @@ +{"1031237|9045232": ["The development of algorithms for finding a face in an image has been an active research area in its own right [6]."]} +{"57765097|1235863": ["Previous studies primarily focus on innovative technical and functional features of CST such as camera, microphone, localization, and detection technologies [12, 13]."]} +{"37434382|5171123": ["The single sample per person (SSPP) problem is one of the challenges [11, 12], especially in the situation that the probe samples contain large appearance variations caused by illumination, expression, partly occlusions, and so on."]} +{"23279769|2088679": []} +{"23279769|20905429": ["health status outside of the hospital [1]."]} +{"2323881|16010181": []} +{"2323881|18543658": ["Inspired by Ouyang et al. (2014), we unify the four categories of PIFR approaches in the following formulation.", "To name a few, good surveys exist for illumination-invariant face recognition Zou et al. (2007), 3D face recognition Bowyer et al. (2006), single image-based face recognition Tan et al. (2006), video-based face recognition Barr et al. (2012), and heterogeneous face recognition Ouyang et al. (2014)."]} +{"2323881|5171123": ["To name a few, good surveys exist for illumination-invariant face recognition [Zou et al. 2007], 3D face recognition [Bowyer et al. 2006], single image-based face recognition [Tan et al. 2006], video-based face recognition [Barr et al. 2012], and heterogeneous face recognition [Ouyang et al. 2014].", "Moreover, PIFR approaches that require more than two face images per subject for enrollment are not included in this article, as single-image-based face recognition [Tan et al. 2006] has dominated the research in the past decade.", "Another disadvantage is that the PCA-based texture modelling may hardly represent the fine textures that are particular to individual faces Vetter (1998). To reduce the computational complexity and relieve the non-convexity of 3DMM, multiple constraints are employed to regularize the fitting procedure in Eq."]} +{"4951598|3654323": ["Re-collecting massive labeled data to train a new model from scratch or re-collecting some unlabeled data to perform domain adaptation [166] or others are effective methods.", "Deep domain adaptation [166] has inherent advantages here and is worthy of attention.", "Transfer learning [113], [166] has recently been introduced for deep FR, which utilizes data in relevant source domains (training data) to execute FR in a target domain (testing data)."]} +{"4951598|18038464": ["l nowadays. This survey focuses only on recognition problem, and one can refer to Ranjan et al. [32] for a brief review of a full deep FR pipeline with detection and alignment, or refer to Jin et al. [33] for a survey of face alignment. Speci\ufb01cally, the major contributions of this survey are as follows: A systematic review on the evolution of the network architectures and loss functions for deep FR "]} +{"4951598|2323881": ["There have been several surveys on FR [268], [20], [3], [96], [175] and its subdomains, and they mostly summarized and compared a diverse set of techniques related to a specific FR scene, such as illumination-invariant FR [284], 3D FR [175], pose-invariant FR [262][50]."]} +{"4951598|18543658": ["12, such as cross-pose FR, video FR, cross-age FR, lowshot FR, set/template-based FR, 3D FR, makeup FR, FR for mobile devices, face anti-spoofing and heterogeneous FR [110] (including NIR-VIS FR, photo-sketch FR and low-resolution FR)."]} +{"4951598|359842": ["Over the past few years, there have been several surveys on FR [222], [18], [3], [78], [136] and its subdomains, including illumination-invariant FR [234], 3D FR [136], pose-invariant FR [216] and so on."]} +{"4951598|16620699": ["the evaluation protocols. Therefore, it is of great signi\ufb01cance to review the breakthrough and rapid development process in recent years. There have been several surveys on FR [268], [20], [3], [96], [175] and its subdomains, and they mostly summarized and compared a diverse set of techniques related to a speci\ufb01c FR scene, such as illumination-invariant FR [284], 3D FR [175], pose-invariant FR [262][50"]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"359842|16620699": ["Comprehensive recent surveys of literature on 3D face recognition can be found in [251] and [252]."]} +{"359842|6028805": ["A comprehensive review of recent advances in face recognition from infra-red imagery may be found in [268]."]} +{"359842|9045232": ["\u2026one or more of the following: low quality images (though image quality may be enhanced by exploiting super-resolution techniques [220-223]); cluttered backgrounds (which complicate face detection [224]); the presence of more than one face in the picture; and a large amount of data to process [71]."]} +{"359842|192934": ["A couple of classifiers described in [211] are then applied to identify the individual in the frame and, finally, a super-classifier based on a voting scheme [212] performs the final classification for the entire video sequence (Figs."]} +{"5171123|9045232": ["013 [6], Pantic and Rothkrantz [7] surveyed the automatic facial expression analysis, Daugman [3] pointed out several critical issues involved in an effective face recognition system, while the most recent and comprehensive survey is possibly from that of Zhao et al."]} +{"5171123|192934": []} +{"5586436|6681074": []} +{"63776120|36705207": []} diff --git a/edge/graph_57375730.jsonl b/edge/graph_57375730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0aaff1325290bc630dafc3e03cf400bc3ebf7f37 --- /dev/null +++ b/edge/graph_57375730.jsonl @@ -0,0 +1,20 @@ +{"3739253|14429013": ["Likewise, in imaging\u2013genetics, meaningful genotype\u2013 phenotype interactions (13) are captured by simultaneously"]} +{"1605434|9928823": []} +{"205264340|9316331": ["[29] Each edge ( s, a ) in the search tree stores the action value Q ( s, a ) , the visit count N ( s, a ) and a prior probability P ( s, a ) received from the expansion policy network."]} +{"7591278|7158350": []} +{"34560852|5664472": []} +{"13791763|4654785": ["Over the past decades, neuroimaging techniques, such as magnetic resonance imaging (MRI), functional MRI (fMRI) and positron emission tomography (PET), have profoundly advanced neuroscience research and clinical application [3], [4].", "Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18].", "In recent years, the neuroimaging based computer-aided diagnosis (CAD) for AD has attracted considerable attention [4], [8]\u2013[10]."]} +{"13791763|4646590": ["Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18]."]} +{"13791763|11540239": ["Moreover, since different neuroimaging modalities, such as MRI and PET, can provide different and complementary information to improve diagnostic performance for AD [4], [11], [12], the multimodal neuroimaging based AD classification has attracted considerable attention [4], [13]\u2013[18]."]} +{"13791763|5835640": ["The performance of machine learning algorithms in CAD generally depends on data representation (or feature), and therefore feature extraction becomes a critical step in the classification framework [10], [19].", "Since the neuroimaging dataset generally has small labeled samples [10], as an appropriate feature representation algorithm for the small dataset, the supervised DPN will potentially learn", "In recent years, the neuroimaging based computer-aided diagnosis (CAD) for AD has attracted considerable attention [4], [8]\u2013[10]."]} +{"13791763|393948": ["The performance of machine learning algorithms in CAD generally depends on data representation (or feature), and therefore feature extraction becomes a critical step in the classification framework [10], [19].", "tectures, DL develops a layered, hierarchical architecture to yield high-level and more effective data representation [19], [27], [28].", "On the other hand, the layer-wise stacking of feature extraction often yields better representations in DL [19],", "Each basic DPN is trained in a supervised, block-wise fashion, without the need for back propagation, which is different from other popular deep architectures [19]."]} +{"52193031|1708582": ["Having the same motivation as active learning, reinforcement learning [310], [311] adopts an agent-based approach based on which learning input-output relations are modeled as an interaction between an agent and its environment with the goal of selecting actions to maximize some notion of cumulative reward."]} +{"10985974|1634674": []} +{"10050878|5724477": []} +{"17020980|8365617": []} +{"17461302|513106": ["Approximately 90 % of scientists are self-taught in developing software and one may lack basic practices such as task automation, code review, unit testing, version control and issue tracking [42, 43]."]} +{"7551351|17747015": ["Activity recognition methods are classified into three main types of vision-based [1], radio-based [2], and sensor-based [3] methods."]} +{"5412207|8575576": []} +{"12828320|13370607": ["37,38 Figure 3 illustrates three common big data approaches that use different features to discover new drug indications, and basic experimental approaches to validate them."]} +{"4838819|7834819": []} +{"8699156|13370607": []} diff --git a/edge/graph_57375795.jsonl b/edge/graph_57375795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e22b433b274bc1d21d5f999f4e0606f720815a72 --- /dev/null +++ b/edge/graph_57375795.jsonl @@ -0,0 +1,32 @@ +{"15642206|10500613": ["used a synonym-set from a hand-made thesaurus [17, 24].", "We do not know of any work on automated attributesynonym finding, apart from simple distance metrics used as part of schema matching systems [9, 16, 17, 24]."]} +{"9300347|2839618": []} +{"3529435|15062298": ["Tuning with context maps to the contextual MAB problem [3, 17, 43].", "We pose tuning in Cuttlefish as a stochastic multi-armed bandit problem (MAB problem) [10, 15, 17].", "Specifically, each tuner solves a separate stochastic multi-armed bandit problem (MAB problem) [10, 15, 17].", "MAB solvers use adaptive learning techniques related to reinforcement learning [10, 15, 17] that work by balancing the exploration and exploitation of different alternatives."]} +{"3529435|206742377": []} +{"3529435|2795037": ["Traditional database management systems (DBMSes) manage to automatically pick operator implementations for users, by allowing users to write queries using high-level languages, then using rule-based and cost-based query optimizers [21] to generate efficient physical query plans."]} +{"3835273|16449507": ["This design allows the engine to be agnostic as regards the provenance standard used by the server, whether that be PROV, the Open Provenance Model (OPM) or any other.", "There, ent1\n2Indeed, the original TRANSFoRm implementation was based on Open Provenance\nModel [37], a precursor to PROV.\nand act1 are fixed nodes representing respectively a concrete entity and activity, whereas var:x, y and var:z are respectively an entity, an activity and an agent whose identifiers have been replaced by variables. vvar:a is a value variable taking the place of a value for the attr attribute annotated upon the entity var:x.", "Indeed, the original TRANSFoRm implementation was based on Open Provenance Model [37], a precursor to PROV."]} +{"15793869|2281773": ["One of the most promising research areas in question answering in the past years is the conversion of natural language to SPARQL queries [28,18,27], which allows a direct deployment of such systems on top of a triple store.", "There is a range of approaches to QA over structured data, for an overview see [18]."]} +{"15793869|16534280": ["In contrast, previous approaches have been limited either with respect to their access to deep web data behind scripted forms [21] by targeting only common-sense, surface web data, or by requiring user action for form navigation (Morpheus, [11])."]} +{"15793869|206742377": ["To extract the relevant data from the real estate agencies, we can resort essentially to three alternatives in web data information extraction [7], namely traditional information extraction, unsupervised data extraction, or supervised data extraction, with OXPath falling into the last category."]} +{"40622795|13151033": ["[67] for an excellent survey on such methods."]} +{"40622795|2685137": ["CWM \u2013 but also other interfaces and 43 http://www.ddialliance.org/ 44 http://www.omg.org/spec/CWM/ protocols to share multidimensional datasets such as XML for Analysis and OLE DB \u2013 lack a formal de\ufb01nition making it more dif\ufb01cult to use such formalism as a basis for integration [41]."]} +{"5851271|29395800": ["Within the SW community there are various approaches relevant to the entity finding task [18]."]} +{"6385551|10500613": ["For simplicity, we assume that within a particular data sharing community (such as molecular biology), the datasets share a common core schema, and each dataset schema is mapped to the core schema [26]."]} +{"52180052|7389705": ["A survey article by \u00d6zsu (2016) provided an overview of centralized RDF systems while another survey article (Kaoudi and Manolescu 2015) has mainly focused on cloud-based RDF systems."]} +{"52180052|206275366": ["\u2026we refer the reader to the surveys strictly focused on the federated RDF queries (Haase et al. 2010; Rakhmawati et al. 2013; Haase et al. 2014; Oguz et al. 2015; Saleem et al. 2016) Figure 17 illustrates the query processing model of the FedX federated RDF query engine (Schwarte et al. 2011)."]} +{"52180052|7923075": ["\u2026more information and comprehensive comparisons, we refer the reader to the surveys strictly focused on the federated RDF queries (Haase et al. 2010; Rakhmawati et al. 2013; Haase et al. 2014; Oguz et al. 2015; Saleem et al. 2016) Figure 17 illustrates the query processing model of the FedX\u2026"]} +{"70256068|13916820": []} +{"11787406|485843": []} +{"853538|10500613": ["According to the clas-\nsification of Rahm and Bernstein [26], these matchers belong to the two major categories of schema-only matchers and instance-based matchers.", "With our hybrid matcher, we also incorporate holistic correspondence refinement, which belongs to the category of collective matching approaches according to Bernstein et al. [3].", "According to the classification of Rahm and Bernstein [26], these matchers belong to the two major categories of schema-only matchers and instance-based matchers.", "[3] P. A. Bernstein, J. Madhavan, and E. Rahm.", "[26] E. Rahm and P. A. Bernstein."]} +{"94328|10500613": []} +{"26644079|386036": []} +{"15992154|386036": []} +{"206275366|7923075": ["However, Rakhmawati et al. (2013) remarked that 68.14% of data sources provide linked data through their SPARQL endpoints.", "There are two surveys (Rakhmawati et al. , 2013; Saleem et al. , 2015) on this approach that discuss some of the systems in query federation.", "According to the data source location, linked data querying infrastructure can be categorized as central repository and distributed repository (Rakhmawati et al ., 2013)."]} +{"3857905|8125630": ["Data cubes, which store data aggregated across all possible combinations of dimensions, are widely used in data warehouses [16, 51]."]} +{"13750365|386036": []} +{"57779922|13151033": []} +{"53211000|51929263": ["nagement, we only summarize the high-level ideas based on surveys [172], [173]. There are studies of transfer learning techniques in the context of NLP [176], Computer Vision [177], and deep learning [184] as well. An early survey of transfer learning [172] identi\ufb01es three main research issues in transfer learning: what to transfer, how to transfer, and when to transfer. That is, we need to decide what"]} +{"53211000|10092092": ["More recent surveys [173], [178] classify most of the traditional transfer learning techniques as homogeneous transfer learning where the feature spaces of the source and target tasks are the same.", "Improve Model Robust Against Noise [167], [168], [169], [170], [171] Transfer Learning [172], [173], [174], [175], [176], [177], [178] 1340 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL."]} +{"53211000|1546662": []} +{"53112604|42645": ["summarising natural language text (Gkatzia, 2016).", "Recognised subtasks in this space include: content selection (selecting what data gets used in the summary) and surface realisation (how to generate natural language text about the selected content) (Gkatzia, 2016)."]} +{"16381332|10500613": ["Schema matching [16, 8] has traditionally been applied for integrating two databases, each of which contains a consistent and clean set of tables and the main challenge is in managing the complex alignment between the large number of schema elements on each side."]} +{"16206075|10500613": ["One way to address the coverage issue is to use synonyms of the augmenting attribute [18, 16].", "Our work on building the SMW graph is related to the vast body of work on schema matching [18, 3, 2].", "\u2026, T C \u27e9 and \u27e8 T \u2032 ( K \u2032 , B \u2032 ) , T \u2032 U , T \u2032 C \u27e9 , determine whether T matches with T \u2032 and compute the score of the mapping T In schema matching [18, 2], the problem of matching two schemas S and S \u2032 is normally framed as follows: Given the two schemas, for each attribute A of S , \ufb01nd the best\u2026"]} diff --git a/edge/graph_57375928.jsonl b/edge/graph_57375928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29201c8a35362fcd8895746a27690790b5ce8666 --- /dev/null +++ b/edge/graph_57375928.jsonl @@ -0,0 +1,12 @@ +{"27391290|8575576": ["[1] These digitized slides afford the possibility of applying image analysis techniques to DP for applications in detection, segmentation, and classification."]} +{"7640369|8575576": []} +{"6538247|8575576": ["The preprocessing techniques including color normalization and image denoising, which are presented in [15], [21], and [22], and extraction of regions of interest, which", "The review in [15] summarizes the CAD system technologies for histopathology image analysis, which covers preprocessing (color and illumination normalization), nucleus and gland segmentation, feature extraction, and classification."]} +{"6538247|2616070": ["[228] have combined a region energy [229] and an edge energy [222] into a level set model to segment and track cells in phase-"]} +{"6538247|8953108": ["point in its neighboring region [53], [170]."]} +{"22757548|40646708": ["This improved somewhat when standards such as DICOM [5] and Health Level Seven [6] were introduced [7]."]} +{"53369654|393948": []} +{"2991432|8575576": ["In addition, quantitative characterization is important, not only for clinical usage (e.g., to increase the diagnostic reliability), but also for research applications (e.g., drug discovery [4] and biological mechanisms of disease [5])."]} +{"207655640|8575576": ["The toolbar (1) provides access to controls for image navigation and allows the display layout (stacked, vertical, and horizontal)"]} +{"1645469|393948": ["Convolutional Neural Networks (CNNs) are currently the state-of-the-art image classifiers [30, 29, 7, 23]."]} +{"1645469|8601873": ["Moreover, this method can be thought of as a Count-based Multiple Instance (CMI) learning method with two-level learning [49] which is a more general MIL assumption [20] than the Standard Multiple Instance (SMI) assumption."]} +{"205170608|8575576": ["Digitization also allows for the manipulation of the image and or its data to derive information of diagnostic, prognostic or therapeutic benefit, which would otherwise not normally be readily available.(1,2) Although it is widely used in research and teaching, this technology has only relatively recently become applicable to routine diagnostic work, Address for correspondence: Dr D Snead, Pathology Department, UHCW NHS Trust, Coventry CV2 2DX, UK."]} diff --git a/edge/graph_57377508.jsonl b/edge/graph_57377508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa7fe47ee78a47e03be74d595265a438fd1473d6 --- /dev/null +++ b/edge/graph_57377508.jsonl @@ -0,0 +1 @@ +{"6213844|5646762": []} diff --git a/edge/graph_57378291.jsonl b/edge/graph_57378291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46c77aa4128ccf41e637603ec57551b385e08494 --- /dev/null +++ b/edge/graph_57378291.jsonl @@ -0,0 +1,57 @@ +{"13912088|2497115": []} +{"21445521|5188711": ["fields [39]\u2013[46], including transportation, which is why it was selected for this research."]} +{"442109|206576720": ["Consequently, this gives rise to the consideration of 3D-MIMO [39] which might be used as a backhauling alternative in vertically densified net-"]} +{"442109|12206204": ["THE EVOLUTION of mobile devices and applications in the current decade have drawn a new picture for wireless networks [1]."]} +{"442109|12029139": ["ent scopes, specifically Heterogeneous Networks (HetNets), massive multiple-input multiple-output (massive-MIMO) networks, millimeter waves (mmWaves) networks, and energy harvesting networks [9]."]} +{"442109|1588237": ["In the frequency domain, interference mitigation is done through the use of orthogonal frequency channels, either by the static allocation of these orthogonal channels to different cells or by dynamic allocation [164]."]} +{"442109|7851743": ["Also, the transmission power of each node is small and the OAM functions are automated via self organizing network functionality (SON) [178]."]} +{"20244862|13019489": ["spectrum sharing schemes for licensed spectrum, we refer the reader to [23]."]} +{"20244862|8606364": ["Several different spectrum occupancy models are surveyed in [64] and [65]."]} +{"20244862|3555631": ["A survey of existing literature on the control-/data-plane separation for cellular radio access networks is provided in [159]."]} +{"20244862|19938676": []} +{"20244862|11414835": ["Reference [30] provides a survey of virtualization hypervisors for SDN networks."]} +{"20244862|12206204": ["This paper is not a general survey of 5G: such works already exist in [4]\u2013[7]."]} +{"20244862|2623404": ["In the OpenFlow architecture, flow-entries in the flow table generally consist of three components [26]: \u2022 Matching rules to associate incoming packets with flows.", "A more comprehensive overview of SDN and its implications in terms of programmable networks is provided in [26], in which the authors also provide a comparison between two of the most popular SDN architectures/standards; OpenFlow and ForCES."]} +{"20244862|13074005": ["For more information on SM, we refer the reader to the following articles, [13], [14], [83], [84].", "[13], [14] Spatial modulation Focuses specifically on the area of spa-"]} +{"7911791|18687271": ["On the other hand, the impact of user mobility on 5G small cell networks is enlarged with the decrease of the cell coverage radius [4]\u2013[6]."]} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} +{"23428505|8909218": ["\u2026Increasing the spectrum efficiency of the air interface (bits per second per Hertz) modulation and channel coding Adding more spectrum bandwidth Spectrum reuse by reducing the cell size In [5], it is observed that by 2008, the wireless communication capacity had increased 1 million times from 1957."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"14689888|9976790": ["Surveys on handover literature can be found in [32] and [33], with a survey specifically on the used algorithms in [114\u2013116]."]} +{"38928430|8909218": ["LTE femtocell is introduced due to high demand of voice call and data traffic from the indoor environment [1]."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"53779959|3834736": ["In this case, some protocols that require accurate position information increase the frequency of periodic messages (beacons) as a naive solution for this problem [15], [16]."]} +{"53779959|2335874": ["In this case, some protocols that require accurate position information increase the frequency of periodic messages (beacons) as a naive solution for this problem [15], [16]."]} +{"10715893|118649017": ["We refer the interested reader to the overview paper [16], which may serve as a good starting point for a more comprehensive study of recent advances in this direction."]} +{"10715893|15562587": ["The other methods also highlight \u201cnegatively\u201d relevant features speaking against the decision (shown in blue): Layer-wise Relevance Propagation [23], Guided Backprop [24], LIME [25], and SHAP [26]. when approximating complicated functions, e.g., see [14] [15] and the references therein."]} +{"10823280|164835": ["Cellular localization [27\u201330] takes advantage of the mobile cellular infrastructure present in most urban environments to estimate the position of an object."]} +{"33543855|3555631": ["SYSTEM MODEL Consider a two-tier heterogeneous network (HetNet) consisting of macro cell BSs (MBSs) and SBSs that use different frequency bands, as in the phantom cell architecture [8], [9]."]} +{"15500497|14441987": ["S. Jha is with the School of Computer Science and Engineering, University of New South Wales, Sydney 2052, Australia (e-mail: sjha@cse.unsw.edu.au).", "A. V. Savkin is with the School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney 2052, Australia (e-mail: a.savkin@unsw.edu.au)."]} +{"10196327|11061482": []} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"3252585|19938676": ["Researchers are always ready for new studies and they are already working on a new standard called 5G [25], [43].", "Thus, as for 4G networks, many works in literature agree to organize RRM on the basis of traffic, channel, and interference conditions [43], [44]."]} +{"3252585|12884178": ["Many solutions have been proposed [38], [39] in order to improve the spectral efficiency in the entire coverage area."]} +{"3252585|2282515": []} +{"19028815|763939": ["On the other hand, the capability of predicting the vehicular mobility can play a significant role in various communication and networking functions from bandwidth reservation to service provisioning [4], [10]\u2013[12].", "As previously mentioned, the existing mobility models can be classified into three different classes: synthetic models, survey models, and trace-based models [12].", "Although vehicular mobility can be described by a variety of different models [12], this simple approach appropriately characterizes its temporal and spatial parameters,"]} +{"3645740|7851743": ["In contrast to other surveys in the area, such as [10], which", "In SON, the concept of self-optimization can be defined as a function that constantly monitors the network parameters and its environment and updates its parameters accordingly in order to guarantee that the network performs as efficiently as possible [10].", "The concept of SON in cellular networks was defined in [10]", "needs to reconfigure its parameters [10].", "feeding more data to the system, adding more features to the input data or adding more layers in a NN, without it limitlessly increasing its complexity [10].", "work that is also scalable, stable and agile enough to maintain its desired objectives [10].", "These categories are: self-configuration, self-optimization and self-healing and are commonly denoted jointly as self-x functions [10].", "Based on that, it is assumed that the reader already is familiar with SON concepts and its use cases, otherwise the reader can refer to [10].", "Self-healing in cellular systems can occur in terms of network troubleshooting (fault detection), fault classification, and cell outage management [10]\u2013[13]."]} +{"3645740|6105131": ["which focused on basic definitions and concepts of selforganizing systems and how could self-organization be applied in the context of wireless sensor networks, or even [21],"]} +{"3645740|1708582": ["For readers interested in Reinforcement Learning, please refer to: [184] and [185]."]} +{"15604079|8909218": []} +{"10247246|1805048": ["Finally, the problem of overcoming data sparsity (or cold starts) is prominent in collaborative filtering [17]."]} +{"34564324|5476476": ["A lot of surveys of IPS can be found [27]\u2013[30]."]} +{"34564324|17165859": []} +{"34564324|8650651": ["Due to the high transmission capacities, optical wireless networks play an important role in our modern information technology [12]."]} +{"34564324|206583375": ["According to a recent survey [5], there are various indoor positioning technologies proposed such as Radio-Frequency Identification (RFID) [6], [7], Ultra-Wideband (UWB) [8], Wi-Fi [9], [10], and fingerprint [11]."]} +{"3606870|3555631": ["The control/data separation architecture (CDSA) requires the active UE to maintain a dual connection with both the CBS and the DBS, while idle UE (and detached UE accessing the network) maintains a single connection with the CBS only [4], [6], [7].", "We consider the dual connectivity RAN architecture with control/data plane separation [4] as it has been identified by the third generation partnership project (3GPP) as one of the candidate 5G RAN features [5]."]} +{"13653933|12187684": ["According to [20], the mobility patterns can be extracted from geographic contexts, which include locations of the UEs, often enriched with speed information as well as past trajectories."]} +{"6816078|206583375": []} +{"3109306|8212328": []} +{"44068413|17325804": ["[19] 2008 Wireless Survey of positioning algorithms and theoretical limits for wireless networks."]} +{"44068413|164835": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "For instance, the use of registration update messages in the IS-95A standard was proposed in [7] for time-based localization, called reverse link."]} +{"44068413|13372227": ["The challenges of these accuracy requirements are discussed in [6], and specifically reviewed for CDMA networks in [7] and for GSM networks in [8].", "As an example, several survey articles [6]\u2013[10] reviewed the challenges and performance of cellular positioning in April 1998.", "way system (IVHS) applications [5] or to support emergency services based on proprietary location solutions [6], such as Grayson Wireless with a joint TDoA and AoA solution or"]} +{"44068413|206583375": ["On the one hand, fingerprinting techniques are typically implemented in WLAN systems [15], [18], [20], [26], to take advantage of"]} diff --git a/edge/graph_57378339.jsonl b/edge/graph_57378339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e17bf40dabc11bbb66f793ba46f72c61ce3a662 --- /dev/null +++ b/edge/graph_57378339.jsonl @@ -0,0 +1,10 @@ +{"13088241|393948": ["One way to overcome the absence of ground truth targets is to utilize unsupervised learning, such as restricted Boltzmann machines and autoencoders [23]."]} +{"49885649|206487032": []} +{"6532039|20705668": ["Recently, studies on visual attention analysis on stereoscopic images have been issued figure out the human visual behavior and to find salient regions autonomously by developing saliency detection algorithms for various 3D contents applications such as 3D entertainment, 3D-cinema, 3DTV, 3D virtual reality and 3D visual communications and networking [1][5]."]} +{"9188366|1020148": ["Stereoscopic imaging consists of two images (left and right views) captured by two cameras [2]."]} +{"16013449|396631": ["The DIML database consists of four original and 96 asymmetrically compressed stereo videos using MVC [81].", "Especially, for asymmetric MVC compressed videos, the compared methods show poor performance except for the 3DM3 and the proposed metric because they did not consider property of binocular quality perception in asymmetric stereo image pair.", "That is, eight down/up scaled, 67 Gaussian blurred, 110 JPEG2000 compressed, 110 JPEG compressed, 80 white noised, 80 fastfaded stereo images, and 32 symmetric MVC compressed, 64 asymmetric MVC compressed stereo videos are used for the performance evaluations."]} +{"7885416|18263962": ["T. Wiegand is with the Fraunhofer Heinrich Hertz Institute (Fraunhofer HHI), 10587 Berlin, Germany and with the Image Communication Laboratory, Berlin Institute of Technology, 10587 Berlin, Germany (e-mail: twiegand@ieee.org).\nfor evaluation is expensive, slow and cumbersome."]} +{"11654786|393948": ["First, making the network deeper will raise the learning capacity significantly [1]."]} +{"4310605|4570087": ["CBIR involves searching for images that are similar to an input query image in an image database, in terms of content [19, 47].", "Please refer to [19, 47] for surveys on CBIR approaches and challenges.", "CBIR retrieves images whose content is most similar to that of the input image in the dataset [19, 47].", "The mAP is commonly and widely used in CBIR [2, 12, 41, 42, 47]."]} +{"4310605|17252389": ["Many saliency detection algorithms [1, 6, 7, 13, 18, 24, 38, 44, 45, 48] have been proposed and applied in different fields, including object recognition [20, 39], object tracking [40], image retrieval [2, 5, 12, 15, 17, 37, 41, 43, 46], and image compression [8].", "Many state-of-the-art works [2, 5, 12, 15, 17, 37, 41, 43, 46] on CBIR using saliency detection algorithm have been proposed."]} +{"4310605|387610": ["Many saliency detection algorithms [1, 6, 7, 13, 18, 24, 38, 44, 45, 48] have been proposed and applied in different fields, including object recognition [20, 39], object tracking [40], image retrieval [2, 5, 12, 15, 17, 37, 41, 43, 46], and image compression [8]."]} diff --git a/edge/graph_57378792.jsonl b/edge/graph_57378792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d54adbbac836ed8ec3050c1a6fd5491fc553e373 --- /dev/null +++ b/edge/graph_57378792.jsonl @@ -0,0 +1,21 @@ +{"21430504|28763840": ["to determine the location of a mobile phone [20]."]} +{"4801698|36798251": []} +{"13223117|20905429": ["They are equipped with medical sensors that are capable of measuring different parameters such as the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels [35]."]} +{"4624104|1442447": ["\u2026Sensitive Networks (TSN) Working Group (WG), the main challenges that need to be faced before the Industry 4.0 vision becomes a reality are [7,44,45]: \u2022 reduce latencies and ensure accuracy independently from the physical medium: the majority of industrial applications require real-time and\u2026"]} +{"3450996|17787193": ["According to the initiator diversity of the data of\ufb02oad-ing, we classify the data of\ufb02oading techniques into four categories, i.e., data of\ufb02oading through small cell networks (SCNs), WiFi networks, opportunistic mobile networks or heterogeneous networks (HetNets), respectively [4]."]} +{"37638911|3241708": ["[13, 14, 15, 16, 17]), and (iv) the introduction of a conceptual framework that supports the designing of crowdsourcing systems (e."]} +{"43941501|194321": []} +{"16830291|3241708": []} +{"9900656|3241708": ["They classify the four building blocks, also called \u201cgenes,\u201d by addressing the following four questions: What is being done? Who is doing it? Why are they doing it? and How is it being done? While there have been a number of valuable studies regarding (i) the definition of crowdsourcing [6], [7], (ii) the characterization of the crowdsourcing process [8], (iii) the development of a crowdsourcing taxonomy [9-13], and (iv) the introduction of a conceptual framework that supports the designing of CSSs [14], [15], little has been investigated to define a CSS and its technical design precisely.", "surveyed various crowdsourcing literatures and allocated them into four categories: the type of application (voting system, information sharing system, game, or creative system), the used algorithm, the performance (user participation, quality management and cheating detection) and the datasets available [12]."]} +{"9900656|627405": ["This approach has proved to be necessary for literature of information technology and software engineering, in which the abstracts are too poor to rely solely on them [19]."]} +{"31141814|16422199": ["As pointed out in [98], data collection methods need to leverage Big Data techniques and distributed intelligence to be able to facilitate cooperative sensing and transparent access to data processing mechanisms."]} +{"13742318|9514634": ["Significant research efforts have been dedicated to investigate the incentivization issue in the broader area of crowdsourcing, which is defined as the process of obtaining needed services, ideas, or content by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers [23], [24]."]} +{"3814877|14435082": ["Several research studies have been conducted to understand and evaluate the quality of OSM data based on different data quality elements and for different application purposes [4]."]} +{"57048228|1113420": []} +{"19261577|9514634": ["At the same time, the DCFs have to gather a sufficient amount of data to ensure quality of sensed information [15], [16]."]} +{"644776|3241708": ["med even when the most sophisticated algorithms and computing architectures are used [1,2]. Examples of such tasks are those related to natural language processing, image understanding and creativity [3,4]. A common factor in these kinds of tasks is their suitability to human abilities; human beings can solve them with high ef\ufb01ciency and accuracy [1,2]. In the last years, there has emerged a new comput", "ences and similarities to related concepts, such as collective intelligence and crowdsourcing. Yuen et al., in turn, focus on distinguishing different types of human computation systems and platforms [3,4]. More recently, Kittur et al. built a theoretical framework to analyze future perspectives in developing online labor markets that are attractive and fair to workers [13]. Differently from previous e"]} +{"644776|12715779": ["In general, they focus mainly on proposing a taxonomy for the area [1,3,5,17] and discussing platform issues [18,19].", ", in turn, focus on distinguishing different types of human computation systems and platforms [3,4].", ", competition and marketplace platforms), or algorithms [3,17].", "Examples of such tasks are those related to natural language processing, image understanding and creativity [3,4]."]} +{"15080470|2762484": ["Then, Section IV discusses the overall observations during this study and identifies open issues in this research domain, and finally Section V concludes the paper."]} +{"34080347|7774517": ["With data collection as the core mission, reliability issues of collected data in WSNs [12,13] have been well studied [14] ."]} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} diff --git a/edge/graph_57379363.jsonl b/edge/graph_57379363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50f6a4993843d8cb77b6e37007add92a42205a27 --- /dev/null +++ b/edge/graph_57379363.jsonl @@ -0,0 +1,19 @@ +{"2471950|10310014": ["Up until recently, PSC has been handled through narrowband communication technologies such as the land mobile radio (LMR), which can deliver reliable voice communications, but do not support broadband data [1], and are also often limited in terms of coverage and interoperability [2]."]} +{"7056671|10562205": ["These nodes are often have energy constrained that is, battery power and devices are free to join or leave the network [1-2].", "Routing can be either flat structured or hierarchical structure [1-2]."]} +{"67868423|61132": []} +{"21672824|61132": ["This communication overhead reduces network throughput, introduces additional delays and wastes the limited battery energy of UAVs [3].", "This small battery can sustain a flight time of about 30 min [3,4]."]} +{"21672824|38911919": ["It helps to make the network more scalable, reduce routing overhead and maximize the throughput [6].", "Regardless of the potential benefits of node clustering in FANETs, the cluster formation and maintenance demand explicit exchange of control messages [6,7]."]} +{"27516893|205286988": ["based, energy-aware, directed diffusion, energy-aware, and rumor routing [81]."]} +{"27516893|13348951": ["More information about L-DACS1 and L-DACS2 including their benefits with the current aeronautical system and their physical and medium access layers can be found in [54]."]} +{"25235935|61132": ["Given their low cost, flexible maneuvering capability, and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including aerial mapping, disaster rescue, agricultural irrigation, and military surveillance and attack [1]."]} +{"424353|61132": ["Surveys addressing communication demands of aerial networks have pointed out many open issues that may be of interest to the research community interested in aerial network design [13], [24], [29], which are summarized in Section II.", "Reference [29] has looked into the implementation of pre-existing technologies to the design of aerial network, and discussed the pros and cons of using each of these technologies.", "However, it is hard to analyze the pre-existing technologies for their suitability of implementation to any and all of the application domains, and the authors in [29] mention technology implementation in relation to specific applications."]} +{"424353|29398427": ["Similarly, while considering the design requirements and challenges in 3D networks, [30] specify that mission objectives play an important role for such considerations."]} +{"424353|8462498": []} +{"22610817|61132": ["The comparison of peer-to-peer ad hoc networks MANET (Mobile Ad Hoc Network), VANET (Vehicular Ad Hoc Network) and FANET is given in Table 1 [15]."]} +{"46495322|44461432": ["WSNs have many Challenges and open issues yet, such as topology [1\u20133], protocols [4, 5], security [6, 7], routing [8\u2013 11] data [12, 13] and etc. [14\u201317] Energy Ef\ufb01ciency is the most important Problem in WSNs, that is considered as yet [1, 4, 8, 12, 18\u201320]."]} +{"39444322|205286988": []} +{"29177417|61132": []} +{"29177417|11206792": []} +{"29177417|763939": []} +{"17791330|61132": ["Addressing the aforementioned challenges, Gupta et al. [103] compared the characteristics of MANETs, VANETs and UAV networks."]} +{"8566011|205286988": []} diff --git a/edge/graph_57379443.jsonl b/edge/graph_57379443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d12cadc400eb2f576da3c3cfe0853babe798e31 --- /dev/null +++ b/edge/graph_57379443.jsonl @@ -0,0 +1,4 @@ +{"29917902|359842": []} +{"29917902|14303607": []} +{"25114023|9045232": []} +{"34364980|9045232": []} diff --git a/edge/graph_57380265.jsonl b/edge/graph_57380265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..470d46af61a793317eff39c358d84764359db2f3 --- /dev/null +++ b/edge/graph_57380265.jsonl @@ -0,0 +1,27 @@ +{"205692867|10329355": []} +{"45336780|6670217": ["[10] have made a thorough survey on mobile malware."]} +{"24595524|17336376": ["The access of the service providers to the WSN-sensed data is implemented through the virtualization of the WSNs [5]."]} +{"26236123|29060869": ["In smart grids, energy can be traded in utility markets [13]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"9071751|3330461": ["Device-toDevice (D2D) communication is an emerging technology that is expected to significantly improve performance of mobile communications [2], [3], [4]."]} +{"8557115|18507919": ["This model must be able to balance network availability with information accuracy in delivering data [4\u20138].", "A fundamental challenge of QoS management is that relatively scarce network resources must be selected and allocated in a prudent manner to maximize system performance [7, 8]."]} +{"27283709|2535224": ["\u2026the network lifespan, such as Duty-cycling and Medium Access Control (MAC) protocols [11\u201316], topology control [15, 17\u201319], energy ef\ufb01cient routing protocols [20\u201336], energy-ef\ufb01cient data aggregation schemes [37\u201341], cross-layer optimization techniques [42\u201346], others means [47\u201351], and so on."]} +{"25868210|26728811": ["Several comprehensive surveys review current methodologies to design incentive mechanisms in MCS systems [3], [5], [17]."]} +{"907223|9240891": ["IoT trust management is concerned with: collecting the information required to make a trust relationship decision; evaluating the criteria related to the trust relationship; monitoring and reevaluating existing trust relationships; as well as ensuring the dynamically changed trust relationships and automating the process in the IoT system [6, 7]."]} +{"2042515|2357830": []} +{"10324258|17253721": ["As discussed in [11], each of the three areas focus on particular aspects of HMNs: STS on business systems design, providing a body of theory that covers complex interactions between people and technology; ANT on social systems as networks comprising a range of heterogeneous elements, both human\u2026"]} +{"6534470|3330461": ["D2D communication sharing cellular spectrum raises a great challenge to the co-existing of D2D and cellular communication due to mutual interference."]} +{"6534470|7644489": ["This is commonly referred to intracell interference."]} +{"18723282|16237860": []} +{"46587231|1442447": ["Indeed, as explained in [52], data interoperability is still one of the main concerns regarding IoT solutions, because di\ufb00erent architectures make frequently use of distinct semantic languages for data management and dissimilar protocols for data exchange."]} +{"24177967|7320605": ["However, according to our best knowledge, none of the proposed algorithms in congestion control literature for WSNs and 6LoWPAN networks: 1) uses game theory for traffic control (rate adaptation) [10], [11] to solve the congestion problem [the work in [12] and [13] (the content of these two papers overlaps) use game theory for parent selection (routing)] and 2) supports and is aware of both node priorities and application priorities."]} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"26927952|3330461": []} +{"40032818|3330461": []} +{"17253721|14261802": ["To personalize search results and improve their relevance, WSEs can also analyze individual behavior [Steichen et al. 2012]."]} +{"17253721|8914588": ["of their own volition: they have no agency in that sense [Jia et al. 2012; Rose et al. 2005]. With autonomic computing, however, there may be a promise of some level of self-regulation and \u2018healing\u2019 [Huebscher and McCann 2008; Kephart and Chess 2003; White et al. 2004]. Moreover, machines are increasingly capable of solving complex data analysis problems which humans would struggle to tackle not least at such speed, thoug", "With autonomic computing, however, there may be a promise of some level of self-regulation and \u2018healing\u2019 [Huebscher and McCann 2008; Kephart and Chess 2003; White et al. 2004]."]} +{"17253721|1118130": ["\u2026that they may take more than one role in a network \u2014 for example, a mobile phone may be a communication device, a display device, or a sensor under different circumstances or at different stages of an evolving network situation [Arminen 2006; Raento et al. 2009; Vinciarelli et al. 2012].", "Machines are, as ever, more predictable than humans, but it is still conceivable that they may take more than one role in a network \u2014 for example, a mobile phone may be a communication device, a display device, or a sensor under different circumstances or at different stages of an evolving network situation [Arminen 2006; Raento et al. 2009; Vinciarelli et al. 2012]."]} +{"2692982|17253721": []} +{"36395427|18507919": []} diff --git a/edge/graph_57388931.jsonl b/edge/graph_57388931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5739199.jsonl b/edge/graph_5739199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57428186.jsonl b/edge/graph_57428186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85fd069d408a869d0699c0db75799653e1b0dcb8 --- /dev/null +++ b/edge/graph_57428186.jsonl @@ -0,0 +1,10 @@ +{"6452456|12127373": []} +{"127227|17221751": ["Inter-ested readers may refer to [20], [46], [49], [56] for comprehensive reviews.", "Several studies merged into this direction could be found in [55], [78]\u2013[80]."]} +{"127227|14303607": ["Inter-ested readers may refer to [20], [46], [49], [56] for comprehensive reviews.", "Several studies merged into this direction could be found in [55], [78]\u2013[80]."]} +{"19815778|2473564": ["More recent surveys include [154] and [43].", "However, a more in-depth coverage of this topic can be found in [43].", "Similarly, [43] includes different data modalities, different affect models and historical considerations on"]} +{"19815778|207060556": []} +{"19815778|17221751": ["More recent surveys include [154] and [43].", "These techniques have been well covered in a recent survey on facial AU analysis, and we refer the reviewer to it for further discussion [154].", "We refer the interested reader to [154] for further details, as it already provides a complete and adequate coverage of this topic.", "[154] focus mostly on face representation methodologies, and touch only lightly on the inference problems and methodologies."]} +{"19815778|2301292": ["However, we limit the scope of this survey to 2D, and refer the reader to [151], [185] for an overview"]} +{"52289449|12127373": []} +{"32399654|8777381": ["\u2026to be a viable channel for affect detection (Banse and Scherer 1996; Fernandez and Picard 2005; Johnstone and Scherer 2000; Lee and Narayanan 2005; Scherer 2003; Scherer and Ellgring 2007; Scherer et al. 2003), so there is the question of whether their inclusion will yield superadditive effects."]} +{"4873905|2473564": []} diff --git a/edge/graph_5747564.jsonl b/edge/graph_5747564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec23d1229989081d799dad041316912d43aecd79 --- /dev/null +++ b/edge/graph_5747564.jsonl @@ -0,0 +1,9 @@ +{"12103882|17774971": []} +{"12103882|192934": []} +{"497003|2509135": ["the world\u2019s most valuable resources) is mostly underutilized [123]."]} +{"497003|1940388": []} +{"497003|15981390": ["control (MAC) [81], [82], routing and fault-tolerance [83],"]} +{"11292558|1940388": ["\u2022 Security is a serious concern in both, meters and sensors [58]."]} +{"20264807|1940388": ["A detailed elaboration of these threats and attacks is beyond the scope of this document; however, the interested reader is referred to [78], [79]."]} +{"20264807|1236072": ["Numerous variants to this protocol have been developed to improve on the energy efficiency which have either been discussed in [9], [17] or will be discussed subsequently in Section II.", "[17], has commenced with a taxonomy which is truly suitable to WSNs and which breaks with the traditional one advocated by the IETF, but which is simply out of date."]} +{"20264807|1230643": ["BECAUSE of the unprecedented opportunities they offer, wireless sensor networks (WSNs) [1] have witnessed a"]} diff --git a/edge/graph_57496146.jsonl b/edge/graph_57496146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5750732.jsonl b/edge/graph_5750732.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_575176.jsonl b/edge/graph_575176.jsonl similarity index 100% rename from graph_575176.jsonl rename to edge/graph_575176.jsonl diff --git a/edge/graph_57532376.jsonl b/edge/graph_57532376.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28bf099f665397ab9ec8990b0cd856d2037eeba7 --- /dev/null +++ b/edge/graph_57532376.jsonl @@ -0,0 +1,9 @@ +{"13042243|4474193": ["As practical examples consider decision making in uncertain environments [1], demanding alternative policies to be selected in real-time; multimodal and multiobjective optimization [2], requiring escaping from poor local optima and populating the true Pareto front, respectively; dynamic optimization [3], requesting an exploratory behavior capable of fostering a prompt reaction to sudden displacement of the optimal solution; and a broad range of machine learning problems [4], characterized by the necessity of designing highperformance and robust mathematical models from noisy and partial information."]} +{"16865554|32584958": ["JSSP Potts & Strusevich [117] 2009 Journal of the Operational Research Society."]} +{"44761686|1708582": []} +{"33895868|508912": []} +{"33895868|8530790": []} +{"13398589|16319937": ["Surveys papers in VRPTW can be founded in Kumar and Panneerselvam (2012), Br\u00e4ysy and Gendreau (2005a, b), Ioannou et al. (2001), Toth and Vigo (2001), Toth and Vigo (2014) and Solomon and Desrosiers (1988)."]} +{"9246066|54962714": [", the physical realization of quantum computers [80,153,162], investigations into quantum error correction and fault tolerance [47,111,258], the design of quantum programming languages [115,250], the development of novel quantum algorithms [51,259], and investigations into the power of quantum computing [139,168,204]."]} +{"9246066|6777457": [", the physical realization of quantum computers [80,153,162], investigations into quantum error correction and fault tolerance [47,111,258], the design of quantum programming languages [115,250], the development of novel quantum algorithms [51,259], and investigations into the power of quantum computing [139,168,204]."]} +{"9246066|13558235": ["However, fractals have several other approaches and applications, among which the main current trends are the use of fractals as function approximators [19,46,200], their applications in economics and finance [163,184,185,189], several technological applications, such as antenna design, data mining and image processing [18,53,179,257,279,282], applications in biology and medical sciences [16,58,130,133,145,290], applications in forecasting, such as weather forecasting [172, 202], and applications in arts and games [164,251]."]} diff --git a/edge/graph_57539327.jsonl b/edge/graph_57539327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8da51ef345d754f31cf72339e8af365d1ae6b82e --- /dev/null +++ b/edge/graph_57539327.jsonl @@ -0,0 +1 @@ +{"8736998|17024419": ["There has been an improvement in Augmented Reality right from its invention in 1960s until 2010 [4]."]} diff --git a/edge/graph_5755403.jsonl b/edge/graph_5755403.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41833196a9a2ebc23e6896fa785a4aacbe03fdd1 --- /dev/null +++ b/edge/graph_5755403.jsonl @@ -0,0 +1,19 @@ +{"5389712|2451860": ["Moreover, the recent advances in mobile computing, sensor and GPS technology have made it possible to collect large amounts of spatiotemporal data and there is increasing interest to perform data analysis tasks over this data [4]."]} +{"14652625|17516538": ["The literature on trajectory-based motion understanding and pattern discovery is less mature but advances using learning Vector Quantization (LVQ) [14], Self-Organising Maps (SOMs) [15,16], hidden Markov Models (HMMs) [17], and fuzzy neural networks [18] have all been proposed."]} +{"7839639|17516538": ["In this section, the state of the art in behavior understanding [15], [17] is reviewed."]} +{"7839639|11038925": ["Then, the fuzzy K-means algorithm [1], [7], [13], [36] is applied to cluster merged foreground pixels."]} +{"15106673|17516538": ["different environment modeling approaches applicable to visual surveillance applications can be found in [3]."]} +{"8589590|16525678": ["be found in [26]."]} +{"8589590|14970359": ["Reviews of general research on human motion understanding can be found in [1,5, 13 ]."]} +{"8589590|7788290": ["Reviews of general research on human motion understanding can be found in [1, 5 ,13]."]} +{"8973749|1176034": ["[65]."]} +{"8973749|8365617": ["In this regard, most efforts have been devoted to data representation using so called segmentation algorithms[64]."]} +{"30151956|17516538": []} +{"18859116|15782139": []} +{"3352323|17516538": ["This work presupposes the existence of some low-level visual tracking scheme for reliably extracting object-based trajectories [17,37]."]} +{"195908819|14970359": [") , ( 2 )] 1 ))( , ( ( ) )( , ( [ )) ( ( \u03b8 , (12)"]} +{"195908819|7788290": []} +{"1029120|2113024": ["The survey paper [32] covers not only the recent research on pedestrian detection but also describes the research on collision prediction using pedestrian"]} +{"1029120|206051485": ["A survey of registration methods is presented in [107]."]} +{"11962297|14970359": []} +{"11962297|7788290": []} diff --git a/edge/graph_5755816.jsonl b/edge/graph_5755816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b8f903c06931fafec6505cb4d0283ee3aa67c24 --- /dev/null +++ b/edge/graph_5755816.jsonl @@ -0,0 +1,36 @@ +{"220773|16362395": []} +{"7966563|14866098": ["Variance."]} +{"7966563|16362395": ["The result of the proposed algorithm on the cross-validation data showed that the linear SVM and LDA classi\ufb01ers (Lotte et al., 2007) had better accuracy than other clas-si\ufb01ers, such as quadratic and Mahalanobis classi\ufb01ers."]} +{"1541289|9270553": []} +{"9690803|14866098": []} +{"62237969|16362395": ["Each of these modalities has advantages, such as high temporal resolution (EEG, ECoG, and NIRS) and the\nability to perform imaging of the deep brain areas (fMRI).", "These modalities can be categorized as invasive (ECoG) and non-invasive (EEG, fMRI and NIRS) methods.", "Several modalities have been tested for potential BCI applications, including electroencephalography (EEG) [9], electrocorticography (ECoG) [10], functional magnetic resonance imaging (fMRI) [11, 12] and NIRS [13-15].", "Also, since optical signals do not interfere with electrical signals, it can be easily combined with other systems such as EEG [16].", "However, these cannot be easily applied to BCI due to shortcomings, such as low spatial resolution (EEG), invasiveness (ECoG), and large size and low temporal resolution (fMRI)."]} +{"62237969|9270553": ["Brain-computer interfaces (BCIs) stem from communication and control technology with which a user can facilitate interactions with the outside world using specific signals originating from the brain [7, 8]."]} +{"24642052|9270553": ["Brain-computer interfaces (BCIs) constitute one approach to establish unconventional channels of communication and interaction for individuals with severe motor impairments [1]."]} +{"32887955|9045705": []} +{"8114815|9270553": []} +{"15250694|16362395": ["Because of their simplicity and low computational requirements, these two classifiers are highly suitable for online BcI systems (lotte et al. 2007 ).", "\u2026classes' means and minimizes the interclass variances. lDa assumes normal distribution of the data, with equal covariance matrix for both classes (lotte et al. 2007). the goal of lDa is to seek a vector v in the feature space such that two projected clusters of yes-decision (Y) and no-decision\u2026"]} +{"62554343|16362395": ["In [2-4], the authors review a variety of classification algorithms, such as independent component analysis, support vector machines, and so on."]} +{"22354374|16362395": []} +{"1648953|9270553": ["Current generation BCIs generally rely on the brain\u2019s electrical activity measured using surface EEG but implanted electrodes are also used (Wolpaw et al 2000).", "Since this technique was first reported in 1977 (Jobsis 1977), various studies have examined brain activity due to motor, cognitive, visual and auditory functions (Okada et al 1997, Benaron et al 2000, Wolf et al 2002, Izzetoglu et al 2003, Syr\u00b4 e et al 2000, Keenan et al 2002) using this modality.", "It has been termed the Event Related Optical Signal (Gratton et al 2001, Wolf et al 2002 ).", "While our current system is limited by the nature of the slow vascular response, recent studies have revealed a fast optical signal (Gratton and Fabiani 2001, Wolf et al 2002 ), showing that there is continuing development of NIR imaging technology.", "Currently no BCI performs well in all these aspects (Wolpaw et al 2000)."]} +{"18723855|9270553": []} +{"10391069|16362395": []} +{"9839629|9045705": []} +{"15471179|9270553": []} +{"17637097|16362395": ["12,22,23 Recently, there has been growing interest in the NIRS-based BCI systems because NIRS is generally less susceptible to gross electrophysiological artifacts caused by eye blinks, eye-ball movements, and muscle activity."]} +{"17571592|16362395": ["In their review of the literature on BCI classifiers, Lotte et al. 16 concluded that SVMs are particularly efficient, attributing the efficiency to their regularization property and immunity to the curse of dimensionality.", "While many early BCI studies satisfied this requirement, 24,38 later studies were often based on offline analyses of pre-recorded data 1 ; for example, the Lotte et al. 16 review of studies evaluating BCI signal-classification algorithms found most used offline analyses."]} +{"17571592|9270553": []} +{"17571592|192934": []} +{"45565564|14866098": ["\u201d(34) To prevent this phenomenon, principal component analysis (PCA) and linear discriminant analysis (LDA) were used to reduce the dimension of each channel data.(35) PCA converts a set of the correlated data into a set of the uncorrelated components."]} +{"22574253|16362395": ["This maximizes the distance between the means of the two classes while also minimizing the variance within one class (Lotte et al., 2007)."]} +{"34479498|3387861": ["been researched and developed for a wide range of applications, including allowing their users to communicate (K\u00fcbler and Birbaumer 2008), controlling wheelchairs (Leeb et al 2007), and providing entertainment (Nijholt and Desney 2009)."]} +{"20572073|16362395": []} +{"19373706|9270553": ["To this end, brain\u2013computer interfaces (BCI) have been investigated as alternative access solutions and have shown promising results in controlled environments [4], [5]."]} +{"16362395|9270553": ["Indeed, BCI systems enable a subject to send commands to an electronic device only by means of brain activity [ 2 ]."]} +{"16362395|192934": []} +{"5918971|16362395": []} +{"7835037|9270553": ["Such individuals may include those with late-stage amyotrophic lateral sclerosis (ALS), brainstem stroke, or severe cerebral palsy [2]."]} +{"37757076|15380857": ["\u2026Cincotti, & Schalk, 2011; Gerven et al., 2009; Grosse-Wentrup, Mattia, & Oweiss, 2011; Krusienski et al., 2011; Leuthardt et al., 2009; C. T. Lin, Ko, et al., 2010; Lotte, Congedo, L\u00e9cuyer, Lamarche, & Arnaldi, 2007; Mak et al., 2011; Millan et al., 2008; Zander & Kothe, 2011; Zhu et al., 2010).", "Literature reviews of BCI research have also been published to provide BCI researchers with well-organized information on critical BCI research issues as well as useful guidelines for the successful design of BCI systems (Bashashati, Fatourechi, Ward, & Birch, 2007; Besserve et al., 2007; Brunner, Bianchi, Guger, Cincotti, & Schalk, 2011; Gerven et al., 2009; Grosse-Wentrup, Mattia, & Oweiss, 2011; Krusienski et al., 2011; Leuthardt et al., 2009; C. T. Lin, Ko, et al., 2010; Lotte, Congedo, L\u00e9cuyer, Lamarche, & Arnaldi, 2007; Mak et al., 2011; Millan et al., 2008; Zander & Kothe, 2011; Zhu et al., 2010).", "Their increase in popularity could be explained by the fact that the visual P300 and SSVEP paradigms each need little training time and show a relatively high information transfer rate compared to the motor imagery paradigm (Vialatte, Maurice, Dauwels, & Cichocki, 2010; Zhu et al., 2010)."]} +{"37757076|14866098": ["\u2026researchers with well-organized information on critical BCI research issues as well as useful guidelines for the successful design of BCI systems (Bashashati, Fatourechi, Ward, & Birch, 2007; Besserve et al., 2007; Brunner, Bianchi, Guger, Cincotti, & Schalk, 2011; Gerven et al., 2009;\u2026"]} +{"37757076|16362395": []} +{"369146|14866098": []} +{"369146|16362395": []} diff --git a/edge/graph_57572910.jsonl b/edge/graph_57572910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42ba66b3818d562392a9bcce07aac20dc35a1be4 --- /dev/null +++ b/edge/graph_57572910.jsonl @@ -0,0 +1,3 @@ +{"14862572|18454590": ["A variety of different architectures and training algorithms have been proposed in the literature (see the comprehensive survey in [37])."]} +{"12982389|16717715": ["Skipping models (Rosenfeld, 1994; Huang et al., 1993; Ney et al., 1994; Martin et al., 1999; Siu and Ostendorf, 2000) make use of this observation.", "Another simple extension to n-gram models is skipping models (Rosenfeld, 1994; Huang et al., 1993; Ney et al., 1994), in which we condition on a different context than the previous two words."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_57572961.jsonl b/edge/graph_57572961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89683b9c0ab6c9161b33fa82e5287cf044c6d343 --- /dev/null +++ b/edge/graph_57572961.jsonl @@ -0,0 +1,26 @@ +{"11379256|6950376": ["is not realistic for insider or node misbehavior attacks [3]."]} +{"23207276|1333339": ["There are many solutions proposed in the literature dealing with trust models for mobile ad hoc networks, as presented in [9]."]} +{"21563297|15449163": ["According to a recent study [31], security and"]} +{"21563297|207231270": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197]."]} +{"21563297|76603": ["4) Legal and Regulation Concerns: The ethical and legal requirements are non-negligible factors in D2D security and privacy research, due to the connection with national security and public safety [209], [210]."]} +{"21563297|3330461": ["According to [5], [10], [19], and [20], M2M communication can be defined as:", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D", "Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "without the interaction of access points or base stations [5].", "Other communication paradigms similar to D2D include the Machine-to-Machine Communication (M2M), also known as Machine Type Communication (MTC) [5], and Mobile Ad Hoc Networks (MANETs).", "and technology-independent, whereas D2D is technologydependent and focuses on proximity services, which assumes opportunistic connectivity [5].", "According to [5] and [10], the standalone D2D can be defined as:", "Typical D2D applications and services include cellular data offloading, relaying, gaming, content distribution, and group communication [5], [10], [17]."]} +{"21563297|7644489": ["D2D switches from infrastructure path to direct path for offloading cellular traffic [9], [21]\u2013[23].", "4) Solution Compatibility and Deployability: Cellular operators are the main driving force for D2D communication [21], [190], which have identified a set of use cases and"]} +{"21563297|6670217": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In the following, we highlight key characteristics of mobile security and privacy [135]."]} +{"21563297|12970117": ["Security and privacy in wireless communications are not newly emerged problems and have been broadly studied [32], [34], [125], [135], [176], [177], [196], [197].", "In difference to the conventional reviews that treat privacy as a branch of security aspects [5], [32], [38], [53], [176], [177], we aim to provide a comprehensive selection of privacy schemes (from 2003 till 2015) that can be applied to D2D"]} +{"21563297|14745481": ["2016 in order to reflect the latest advancements on top of the security research in mobile ad hoc networks [24], [174], [175].", "Aside from physical layer considerations in conventional MANET security [24], [174], [175], physical layer security in D2D communication also deserves our attention."]} +{"21563297|18411031": ["to perform operations on encrypted cipertext without knowing the original data [120].", "The tokens can only be generated with a secret key [120]."]} +{"21373055|763939": []} +{"33621679|3757239": ["As a result, vehicular edge networks is emerged with the development of VEC [2]."]} +{"33621679|36400013": ["Reputation query should be processed promptly to facilitate regular interactions [3]."]} +{"6815249|1333339": ["The usual solution for establishing a trust metric between members of a network is a reputation model [3], where members are assigned a reputation within a numeric interval."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} +{"3616707|3330461": ["devices without direct involvement of fixed network infrastructures, like Access Points (APs), Base Stations (BSs), WiFi-Direct [1] and Bluetooth, and may operate in a purely autonomous way.", "E-mail addresses: zyan@xidian.edu.cn (Z. Yan), Birch_forest@163.com (H.M. Xie), pengzhangzhang@gmail.com (P. Zhang), bbgupta@nitkkr.ac.in (B.B. Gupta).\ndevices without direct involvement of fixed network infrastructures, like Access Points (APs), Base Stations (BSs), WiFi-Direct [1] and Bluetooth, and may operate in a purely autonomous way."]} +{"10056402|13292799": []} +{"17170586|1333339": ["Trust establishment is tagged in many existing research works for peer to peer, sensors, and mobile ad hoc networks [1] [2].", "The trust and reputation models [1] are proposed as new approaches to circumvent with this constraint and to filter out inaccurate messages and malicious vehicles."]} +{"36400013|10137283": ["Trust can be defined as a subjective belief of a peer about other peers belonging to the same society or geographical zone [9]."]} +{"25117615|21841235": ["Most of the existing wireless intra-vehicle communication systems are based on Wi-Fi systems [1] [2] [3] [5].", "In [2], authors conducted a survey on wireless techniques which are used in the railway industry."]} +{"15472512|14745481": []} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"18722494|14745481": ["proposed and studied during the last decade [5]."]} diff --git a/edge/graph_57573685.jsonl b/edge/graph_57573685.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1b43f1d391ca6d7710cff1ac812e8ae4649e730 --- /dev/null +++ b/edge/graph_57573685.jsonl @@ -0,0 +1,5 @@ +{"34314796|627405": []} +{"7357487|14166294": []} +{"14095576|11139156": []} +{"14095576|205435103": []} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} diff --git a/edge/graph_57573789.jsonl b/edge/graph_57573789.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4eae1e6f7fbc562dc4c0e60d0babcceb4f02c00d --- /dev/null +++ b/edge/graph_57573789.jsonl @@ -0,0 +1,7 @@ +{"27395503|60779308": []} +{"27395503|987239": []} +{"27395503|206051485": []} +{"27395503|8953108": []} +{"5764828|14047190": []} +{"5764828|192934": []} +{"53099653|393948": []} diff --git a/edge/graph_57573792.jsonl b/edge/graph_57573792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ac516556e387e2ec98c13959a82b5c73441db63 --- /dev/null +++ b/edge/graph_57573792.jsonl @@ -0,0 +1 @@ +{"930443|7923260": []} diff --git a/edge/graph_57573832.jsonl b/edge/graph_57573832.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57574323.jsonl b/edge/graph_57574323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75679e107ff0905d4d2387f953e209ebff4c636f --- /dev/null +++ b/edge/graph_57574323.jsonl @@ -0,0 +1,3 @@ +{"5743037|207584909": ["Based on this basic data and the available customer orders, the production planning and control system calculates a rough schedule (L3 to L4 system level)."]} +{"112183405|3330313": ["There are a number of approaches for outlier detection such as parametric, non-parametric, semiparametric, neural networks and machine learning methods (Hodge and Austin 2004; Hu and Sung 2004; Rousseeuw and Leroy 1996)."]} +{"8897683|28577245": ["Such a merger between these two technologies has already been proposed and explored for time-critical applications in the automotive, mobile communications, industrial, and other domains (Gu and Zhao, 2012; Bregenzer and Ad\u00e4mmer, 2010)."]} diff --git a/edge/graph_5762556.jsonl b/edge/graph_5762556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd498abaa9d3e4d0c2fd10ff4f5e4d99246b35fe --- /dev/null +++ b/edge/graph_5762556.jsonl @@ -0,0 +1,2 @@ +{"386342|70923": ["AGENTMODEL SPECIFICATION Object Orientated Programming (OOP) is widely adopted as the most common paradigm for ABM frameworks [7, 8, 29, 30].", "AGENTBEHAVIOUR AND SIMULATION Function specification in common OO frameworks and APIs [7, 8, 29, 30] is achieved through the use of functions or actions within an agent object."]} +{"9922541|2798946": ["Outside the context of MAS programming, most of the research works related the environment in MAS engineering concerns the definition of environment-based mechanisms (see [35] for a survey) useful to solve specific class of problems\u2014such as agent communication and coordination."]} diff --git a/edge/graph_5763343.jsonl b/edge/graph_5763343.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6dd470d08d9eba700c7c12d276a44a8e8a9995f5 --- /dev/null +++ b/edge/graph_5763343.jsonl @@ -0,0 +1,9 @@ +{"16850059|6746689": ["In writer identi.cation the features are aimed at dis\u00adtinguishing \nbetween writers and thus need to emphasize the di.erences in shapes of the same characters written by \ndif\u00adferent writers."]} +{"40993297|14580698": []} +{"18700799|6746689": ["First, a thinning algorithm is applied to the handwriting image [14]."]} +{"6791372|15782139": []} +{"43276594|15782139": []} +{"15581957|16082889": ["Writer identification is rooted in the older and broader domain of automatic handwriting recognition [1], [2]."]} +{"15581957|15782139": ["Writer identification is rooted in the older and broader domain of automatic handwriting recognition [1], [2]."]} +{"8934189|15782139": ["Subsequent works up to 2000 are summarized in [21]."]} +{"30693316|6746689": []} diff --git a/edge/graph_5765707.jsonl b/edge/graph_5765707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_576581.jsonl b/edge/graph_576581.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57659423.jsonl b/edge/graph_57659423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa2b6dcd8736eff5b300a8c44f6bf79625421709 --- /dev/null +++ b/edge/graph_57659423.jsonl @@ -0,0 +1,2 @@ +{"54079671|192934": []} +{"14933256|2128503": ["various noble metals (Ni, Pd, Pt, and Os) for each sensor [91,92]."]} diff --git a/edge/graph_57663081.jsonl b/edge/graph_57663081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c7b54aca6b0337c1fd9102cf334f6c5f7b25b591 --- /dev/null +++ b/edge/graph_57663081.jsonl @@ -0,0 +1,6 @@ +{"5709015|7624176": []} +{"6564205|5801277": ["In addition, we give an overview of prior work that used closed-form ray curves."]} +{"53306154|7624176": []} +{"53306154|14156424": ["FDTD has been an active area of research for more than a decade [4], [5] and was first proposed for electromagnetic simulations [46]."]} +{"11974879|1896164": ["Hamidi and Kapralos [81] as well as Tsingos and Jiang [82] provide an extended overview of the use of GPUs for spatial sound in virtual environments and games."]} +{"11974879|7624176": ["Cohen et al. [70] provide a review of the fundamental issues in visibility and conduct an overview of the latest visibility culling techniques developed."]} diff --git a/edge/graph_57663468.jsonl b/edge/graph_57663468.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..344bed8cb8de7ec3a7dcc8890eecdae121fd00c0 --- /dev/null +++ b/edge/graph_57663468.jsonl @@ -0,0 +1,70 @@ +{"206454765|8909218": []} +{"7876508|8909218": ["For instance, it is well-known that many large companies have confronted DoS attacks [6], [3].", "other hand, close access FAPs filter subscribers using Closed Subscriber Groups (CSG), though it may reduce the overall performance of the system [3]."]} +{"67445331|4929298": ["footprint [10], [11]."]} +{"67445331|4502294": ["Recent evidence suggests that 56 percent of providers consider backhauling to be the major challenge for future 5G HetNets [25], as the energy consumption of the backhaul network is expected to grow by 50 percent [32].", "Most of the existing work in the literature assumes that mmWave backhaul channels maintain strong LOS communications [32], [42], [44], [68] and require no-transmission."]} +{"4502294|3555631": ["System information is broadcast over the anchor cell which also manages most of the radio resource control and signalling, while the small cells play an assistant role, having data offload as a main task [48]."]} +{"46838253|11735843": []} +{"28361024|8909218": []} +{"51881223|4502294": ["This may result in bottlenecks that affect network scalability and reliability [1].", "[1] introduced the concept of Backhaul-as-a-Service (BHaaS) as a consolidated vision for self-optimized 5G backhaul.", "2855148 coming years including femtocells as highlighted by [1])."]} +{"51881223|19938676": [", microwave, copper and optical fiber) or to evolve into new introduced software-based technologies that may drop costs of network deployment [5], [6]."]} +{"4871690|12187684": []} +{"4871690|7851743": ["The SON approach is one of the most promising candidates to address these complex issues [28], using tools, such as software-defined networking [29]."]} +{"206583520|14028362": ["These home base stations operate on low transmit power (100 mW or even 10 mW) and provide shortrange coverage (20 - 30 m) (87).", "A less significant interference issue arises also due to interference among femtocells themselves when placed in close proximities (87)."]} +{"206583520|8909218": ["Femtocells, also called home base stations, are low-cost base stations installed by the users for better indoor signal reception (86)."]} +{"8295786|19938676": ["However, 3.9G long term evolution (LTE) includes capabilities that exceed those of 3G mobile communications [9,10].", "\u2026without encryption due to used analogue modulation, (ii) limited sub-scribers due to used FDMA technique, (iii) power radiation of base station being unsafe and lack of a handoff process, (iv) limited to voice service, and (v) incompatible systems that lack a uni\ufb01ed international standard [8\u201310].", "The EDGE has been added to enhanced the packet-switched services and enabled new high speed data applications such as multimedia applications [9,10].", "However, GSM suffers from a low data rate, which prompted for an improvement in the cellular system by general packet radio services (GPRS) technology [8\u201310]."]} +{"8295786|14765802": ["Data traffic will increase to 82 GB per subscriber per year [1] due to the unprecedented demand for data high bandwidth video streaming, which will represent more than half of global mobile data traffic [2]."]} +{"8295786|2443013": ["Although the joint implementation of these mechanisms may provide very high data rates that are theoretically more than 1 Gbps for stationary users, further increases are limited due to the smaller number of available frequencies [11,16]."]} +{"8295786|24491750": ["The BS accounts for 57 % of the total energy consumption in cellular networks, and the power ampli\ufb01er (PA) has the highest energy consumption of the BS [46]."]} +{"4880047|3767252": []} +{"13725521|4502294": ["Various efforts toward bridging the BH performance gap have been recently recorded as reported in [2]."]} +{"206189574|2623404": []} +{"206189574|7851743": []} +{"44182431|3474164": ["managing the state information of massive number of IoT devices is also an issue that needs to be considered [62, 63]."]} +{"44182431|2871699": ["M2M communicaiton has been extensively reviewed in [54, 55, 56, 57, 58].", "The ETSI standard and applications has been discussed in [54] and [55], in which mobile devices are used as mobile gateways for resource constrained IoT devices."]} +{"44182431|3494096": ["The 5G networks can provide users with faster speed than 4G up to 10 Gbps, meanwhile the 5G can provides reliable connection up to thousands device at the same time [1, 20, 21].", ", have been used in IoT applications, in which billion of devices will be connected by wireless communication technologies [20].", "The 3G and 4G are widely used for IoT but not fully optimized for IoT applications [20].", "Existing communication technologies are diverse and it is challenge for the fifth generation (5G) mobile network to meet the requirements of applicaitons in IoT [20].", "To ensure that M2M applications, the three generation partnership project (3GPP) proposed Enhanced Machine-Type Communication (eMTC), Extended Coverage-Global System for Mobile Communications for the IoT (EC GSM-IoT) and Narrowband-IoT (NB-IoT) as cellular-based LPWA technologies for the IoT [20].", "by inferences, such as WiFi signals, buildings, microwaves, etc [20]."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"69488572|2521001": ["Generally, in the Home Area Network (HAN), smart device communication exists in the forms of human-to-device and device-to-device communication within a controlled network [9 \u2013 12]."]} +{"24688754|2535224": ["In contrast to the physical control devices in legacy mobile networks, beyond 5G mobile networks will have virtualized control devices [1], [2].", "Future 5G mobile network will be designed as Software Defined Mobile Networks (SDMN) by integrating Software Defined Networking (SDN) and Network Function Virtualization (NFV) concepts [1], [2]."]} +{"24688754|2623404": ["In [18], several of such approaches were analyzed, most of which are"]} +{"24688754|10693567": ["architecture map to the three-layer mobile SDN architecture proposed by Open Network Foundation (ONF) [10].", "Figure 2 shows how the components of the proposed architecture map to the three-layer mobile SDN architecture proposed by Open Network Foundation (ONF) [10]."]} +{"67867427|52059869": []} +{"67867427|10235514": ["[4], [5], [12], [19], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52]"]} +{"67867427|29464310": ["\u2026and the option of compressing [4], [5], [12], [19], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52] Simulations: [53], [54], [55], [56], [57], [58], [59], [60], [61],\u2026"]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"5803973|9104850": ["The goal of this approach is to balance the load over the servers, reduce the bandwidth requirements, and, thus, reduce the users\u2019 service time [19]."]} +{"52067136|15449163": []} +{"6197039|6779551": []} +{"6197039|4395259": ["tutorial papers for physical layer security research [11]\u2013[14]."]} +{"8141341|1686572": ["Considering the spectrum utilization method, the convergence of SDF program is vulnerable to be simulated by the primary user, Byzantine or spectrum sensing data operation/forgery and several DoS attacks [64\u2013 66]."]} +{"8141341|2535224": ["The STRIDE method makes logical separations within the complex system security, as shown in [19, 95]."]} +{"8141341|2623404": ["With the expected drastic increase in mobile traffic demand [1, 2], and the compelling needs for provisioning of elastic service, collaborative working capability [3, 4], transmission speed, and quality of service (QoS) [5, 6], as well as, the requirement for costly network upgrades [7, 8], Software Defined Mobile Network (SDMN) has been recognized as a solution to meet these challenges."]} +{"7942157|1049844": []} +{"7942157|206578224": ["The new core network includes some new entities such as SDN, MEC, and NFV as well as new backhaul techniques [11], [12], [176].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [11], [12], caching [13], [14], backhaul [15], resource management [16] and data centric network [17], [18] are available."]} +{"7942157|25911553": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available."]} +{"7942157|3757239": ["system performance and high latency which can not meet the 5G vision [179].", "BS level caching [179]."]} +{"7942157|4502294": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "5G back-haul requires higher capacity, lower latency, synchronization, security, and resiliency [13]."]} +{"7942157|206576469": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"7942157|3555631": ["Split of control plane (C-plane) and data plane (D-plane) in the architecture and the carrier frequency could be performed in order to have separate provision of capacity and coverage [21]."]} +{"7942157|8650651": []} +{"7942157|76603": ["In mission critical communication (MCC), both the latency and reliability issues need to be addressed [6]."]} +{"7942157|19938676": ["Fifth generation (5G) cellular network is the wireless access solution to ful\ufb01ll the wireless broadband communication speci\ufb01cations of 2020 and beyond [3], [4].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "With an ambition of signi\ufb01cant enhancements over 4G cellular networks, we need drastic changes in the architecture for meeting 5G visions such as 1000 times capacity enhancement, 100 billions connections and close to zero latency [3], [4]."]} +{"7942157|875676": ["The overall comparison among IDMA, SCMA and GFDM is presented in Table V. Filter bank multi carrier (FBMC) has been a strong candidate waveform for 5G [3], [85]."]} +{"7942157|35906806": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"3757382|18687271": []} +{"10130172|17966235": ["For example, the use of MmWaves suffers from attenuation, free space large propagation, bad penetration and poor indoor propagations [2]."]} +{"57467825|19938676": []} +{"57467825|12206204": []} +{"4661452|19938676": []} +{"44162212|18687271": []} +{"10844102|2535224": ["Especially for mobile and wireless networks [4] several relevant challenges emerge for future architecture supporting 5G, with SDN standing as one of the key technologies capable of facing those challenges, bringing new technical and business opportunities for those future systems."]} +{"12123442|2623404": ["SDN is a new networking paradigm in which the control and data planes of the network are decoupled [9]."]} +{"12123442|3994942": []} diff --git a/edge/graph_57666310.jsonl b/edge/graph_57666310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5766836.jsonl b/edge/graph_5766836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5768126.jsonl b/edge/graph_5768126.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5769040.jsonl b/edge/graph_5769040.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5771653.jsonl b/edge/graph_5771653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afb31f80c73af20f8d3fb0a062cffb2f540ed213 --- /dev/null +++ b/edge/graph_5771653.jsonl @@ -0,0 +1,26 @@ +{"30511466|1230643": ["WSN is widely used in many fields, including habitat monitoring, environmental data gathering, medical diagnosis, and disaster rescue [1\u20134]."]} +{"14957812|1230643": ["Recent advances in micro-electromechanical (MEMS) technology have led to the development of small, low-cost, and low-power sensors, which are capable of wireless communication and data processing [1]."]} +{"15379285|164835": ["Several radio-location methods are proposed for locating the Mobile Stations (MSs) in cellular systems [ 4 ]: the Signal Strength method, the Angle of Arrival (AOA) method, the Time of Arrival (TOA) and Time Difference of Arrival (TDOA) methods."]} +{"34655591|6396569": ["Considering this fact, in this approach, a small number of moving anchors are deployed in order to localize a set of static sensors [13, 16]."]} +{"31546817|1230643": ["Wireless sensor networks (WSNs) [ 1 , 2] are composed of a large number of sensor nodes that cooperate among themselves to monitor an area of interest."]} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"12225864|13372227": []} +{"6654913|206583375": ["One or more techniques can be applied together to compensate for the limitations of a single positioning technique [9].", "The appropriate indoor positioning technology should be selected carefully in order to make the right trade-off between the performance and the complexity of IPSs [9, 14].", ", WiFi signal strengths) transmitted by APs (multiple Access Points) are collected at every position of an interesting area for a certain period of time and stored into the radio map [27, 13, 19, 9].", "provided different classifications of indoor positioning technologies in 2009, in which they classified them, based on their need for existence of networks, into two classes; network-based and non-networkbased technologies [9].", "Privacy is extremely important to individuals using IPSs, where a strong access control over how users personal information is collected and used is crucial [9].", "An indoor positioning system (IPS) is a system that continuously and in real-time determine the position of a person or an object in an indoor environment [9] which has various applications [21, 17, 2].", "Triangulation is divisible into the subcategories of lateration, and angulation [9, 11].", "Lateration, which is sometime called range measurement, computes the position of an object by measuring its distance from multiple reference points [9].", "This can be caused at different levels of the system: system installation and maintenance, infrastructure components, and positioning devices [19, 9].", "In other words, we locate an object by computing angles relative to multiple reference points [11, 9]."]} +{"34707727|1230643": ["Due to its low cost, small size, and low power consumption, it is an idle choice to deploy large number of sensors into a sensing field [1]."]} +{"38774171|6939676": ["[Mesmoudi 2013] [31] Localization Extensive Limited Nice details of the algorithms with distinctive classification", "have surveyed localization algorithms in [31], where the algorithms are primarily classified into range free and range based algorithms, each of which are further classified into full schemes and hybrid schemes."]} +{"38774171|6396569": ["have surveyed localization algorithms for mobile wireless sensor networks (MWSN) in [25].", "[Amundson 2009] [25] Localization No Not Extensive Details on MWSNs with limited algoritumic details", "network topology, which is not applicable for mobile wireless sensor networks [25]."]} +{"38774171|17374870": ["Intelligent transport system (ITS) adopts sensor technology for traffic management and safety as well as to build an ideal city with astute traffic control mechanisms [180]."]} +{"7033471|2835258": ["Theoretical analysis shows that these two parameters determine the upper bound of the estimation error when the traverse route of the beacon is a straight line."]} +{"17516613|7365537": ["A review of literature [2], [3], [4], shows various technology options for the design of an ILS which may be ultrasonic(US), infrared (IR), radio-frequency (RF) based systems which may be radio-frequency identification (RFID), received signal strength (RSS) of RF signals, Bluetooth, wireless local area network (WLAN), ultra-wideband (UWB), camera based vision analysis etc."]} +{"17516613|206583375": []} +{"16190591|206583375": ["However the price to deploy such a system is high, about $16.875 for the research package [21] Ekahau is a commercial positioning system that uses WLANs and tracks electronic devices such as tags, personal digital assistants (PDAs), PCs, handsets equipped with wireless network cards."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"111163614|164835": []} +{"1927258|164835": ["Owing to the harsh multipath environment in indoor areas, techniques that use triangulation or direction are not very attractive and often can yield highly erroneous results [2-4]."]} +{"1094755|14441987": ["Communication in the sensor network is based on the wireless ad hoc networking technology [2]."]} +{"37877086|16219347": ["Availability of low-cost Complementary Metal Oxide Semiconductor (CMOS) cameras has created the opportunity to build low-cost WSNs with multimedia functions to capture, process, and disseminate visual data collectively [11\u201313]."]} +{"1291796|16120075": ["This method, due to the low price of digital compasses, is particularly suitable for video- or multimedia-based wireless sensor networks [13\u201317] where the nodes already equipped with digital compasses (due to the necessity to estimate the cameras\u2019 fields of view) may simply become anchor nodes or anytime the GPS receiver is not considered to be an appropriate solution."]} +{"1291796|3212818": ["The next step of localization algorithm is based on the well-known triangulation method [21,22]."]} +{"1291796|6681074": ["To increase the efficiency of our proposed method, the reference objects have to be easily identifiable in the landscape when using automated object recognition algorithms [19,20];"]} +{"1756036|1236072": []} +{"5476476|206583375": ["Thus, the survey in \u200e[12] is somewhat outdated, whereas the authors of \u200e[8] focus only on ultrasonic positioning systems.", "WLAN is the most known solution for indoor positioning \u200e[11]\u200e[12].", "The security and privacy factors are considered important to discuss with Indoor Positioning Systems (IPSs) within Personal Network \u200e[12], where users position people and objects in their home.", "For instance, position system architecture dealing with self-localization can guarantee high degree of privacy and security for users when the estimation of the position is done at the target device \u200e[12].", "The reader may refer to \u200e[8]-\u200e[12] for more information."]} diff --git a/edge/graph_57719949.jsonl b/edge/graph_57719949.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57753577.jsonl b/edge/graph_57753577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0fba13215f3d1135f606f06479839f4c569e482a --- /dev/null +++ b/edge/graph_57753577.jsonl @@ -0,0 +1,31 @@ +{"49409554|17325804": []} +{"7015840|1230643": []} +{"3540300|3423198": ["Commonly, the nodes are low-cost, low-power, limited in terms of memory, and programmable [1,2]."]} +{"21317736|10096622": ["During the search process, the velocity and position of each swarm can be updated according to Equations 8 and 9 [40]."]} +{"21317736|34657644": ["Although the TDoA method has high ranging accuracy, it needs additional hardware and consumes more energy [6]."]} +{"6939676|17683338": []} +{"6939676|15300368": []} +{"6939676|3212818": ["In particular, positioning accuracy decreases moving away from the node which started algorithm and in real network the complete graph realization is not always guaranteed."]} +{"6939676|12817488": []} +{"6939676|270804": []} +{"6939676|6275330": []} +{"6939676|1230643": []} +{"17711499|2469117": ["The main drawback of SLMP is its high computational complexity [11]."]} +{"33116088|1230643": ["WSNs applications attracted great interest of researchers in recent years [1]."]} +{"12801335|12347712": ["WSNs (wireless sensor networks) are composed of hundreds of sensor nodes which are distributed in a wide area.", "So WSNs can be used in military, health care, smart home, environmental monitoring, emergency rescue and disaster relief, etc. [1] [2].", "In order to improve the localization accuracy in WSNs, this paper discusses the localization method based on improved particle swarm optimization algorithm and Quasi-Newton algorithm, which obtains the approximate solutions through PSO, and then makes local search and gets the final results by BFGS.", "According to localization mechanism of WSNs, the node localization methods can be divided into range-based and range-free approaches [2].", "optimization algorithm and Quasi-Newton algorithm for WSNs node localization in order to improve localization accuracy.", "Therefore, the node localization technology is a key technology for WSNs and also it is an important research topic in WSNs [3].", "Assume that there are m anchor nodes and n unknown nodes in WSNs.", "Most applications of WSNs need know the location of nodes beforehand so as to adjust the route, manage network and track target, etc.", "These nodes communicate with each other either directly or through other nodes and WSNs can obtain relevant environmental data."]} +{"311312|1230643": ["1 Basic location estimation techniques [14] [2], biomedical health monitoring [3], environment modeling [1] and military operations [4] require precise knowledge of the positions of each sensor node.", "A wireless sensor network (WSN) framework is nowadays widely used due to advances in micro-electro-mechanical systems (MEMS) [1]."]} +{"65189754|5476476": ["i jjX ANijj d mes i 2 (4) Zhang et al."]} +{"46642131|17325804": ["(AoA,ToA,TDoA, andRSS), coverage, and cost [12, 13]."]} +{"46642131|7278743": [", in the use of wireless headphones), and to facilitate data synchronization between personal devices [58]."]} +{"46642131|206583375": ["[14] omitted inertial navigation, ambient magnetic fingerprinting, the use of encoded patterns in artificial light (fluorescent or LED), ambient light analysis, the use of audible sound transmitted by the infrastructure (some with encoded patterns), RFID where the tags are fixed and the reader is mobile, ZigBee, vision analysis with portable cameras, floor tiles, and the indoor use of outdoor technologies (GPS, cellular, TV, and FM signals)."]} +{"16636211|1230643": ["Examples of this approach are the centroid localization technique [21], weighted centroid localization technique [22], hop-count-based localization [23], and the pattern matching method [24].", "Examples of this approach are the centroid localization technique [21], weighted centroid localization technique [22],hop-count-based localization [23], and the pattern matching method [24]."]} +{"16636211|34657644": ["Examples of this approach are the centroid localization technique [21], weighted centroid localization technique [22], hop-count-based localization [23], and the pattern matching method [24].", "Examples of this approach are the centroid localization technique [21], weighted centroid localization technique [22],hop-count-based localization [23], and the pattern matching method [24]."]} +{"16636211|206583375": ["Given the various constraints in WSN networks, accuracy is the main challenge in WSN localization techniques [11]."]} +{"214751898|6396569": ["[4] Amundson, I., & Koutsoukos, X. (2009).", "6 Various algorithms for the localization of wireless sensor networks have been proposed and this is currently a hot area of research with many recent publications such as by Amundson & Koutsoukos [4], Mao & Fidan [15], Pal [17], Wang & Xu [31], Zhang, Foh, Seet & Fory [35] and Kim & Kim [14].", "Various algorithms for the localization of wireless sensor networks have been proposed and this is currently a hot area of research with many recent publications such as by Amundson & Koutsoukos [4], Mao & Fidan [15], Pal [17], Wang & Xu [31], Zhang, Foh, Seet & Fory [35] and Kim & Kim [14]."]} +{"214751898|1236072": ["It should be noted that these algorithms describe only the basic principles and techniques which may be used for localization of sensor nodes."]} +{"214751898|2835258": [" and hence consume lesser amount of energy. Another recent algorithm [21] combines two approaches i.e. iterative and collaborative multilateration using Maximum Likelihood Estimation [25] and MAX-MIN [29] localization algorithms. For small errors in distance measurement, the Maximum Likelihood Estimation (MLE) algorithm provides location estimation with reduced error. However, a drawback of the MLE al"]} +{"9916829|3212818": []} +{"125879931|14323396": ["Local search [1], [3], [11], is a version of exhaustive search", "Dynamic programming [1], [3], is an exhaustive search", "with a probability Pa [0,1].", "Some heuristics are only marginally quicker than classic methods [1], [2].", "Branch-and-bound [1], [3], technique is a critical enu-", "org Divide and conquer [1], [3], algorithms try to split a problem into smaller problems that are easier to solve."]} +{"5771653|5476476": ["These methods provide satisfactory level of accuracy with a small proportion of anchor nodes in WSNs [8,9].", "Although literature survey on localization techniques are available in [8,43\u201348], only a few papers exist that focus on range free localization techniques [49] without focusing on recent advanced techniques and applications.", "Positioning and navigation for mobile devices is a booming market with expected size of 4 billion dollar in 2018 [8].", "Thus, AOA technique is of limited interest in localization unless it is used with large antenna arrays [8].", "The work in [8] describes relatively recent localization techniques but focuses only on the indoor localization techniques and brie\ufb02y discusses about range free localization.", "This leads to the development of another category known as hybrid data fusion [8].", "This is due to the prediction of most of the \ufb01fth generation cellular user terminals in their mobility patterns knowing that these terminals will be either associated with \ufb01xed or controllable units or people [8].", "For example, cooperation between robot teams enhances the mission outcomes in applications such as surveillance, unknown zone explorations, guiding or connectivity maintenance [8]."]} +{"5771653|1236072": ["Moreover, the location information is also indispensable in geographic routing protocols and clustering [3,4]."]} +{"5771653|206583375": []} diff --git a/edge/graph_57753578.jsonl b/edge/graph_57753578.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25f591112999c02d184b008ebf4570a4d8592b00 --- /dev/null +++ b/edge/graph_57753578.jsonl @@ -0,0 +1,17 @@ +{"12574246|14774186": []} +{"21629724|16828740": ["An OSN can be described as a website that provides a venue for users to connect with other users, friends, and family members [28].", "Generally, a Sybil attacker is a user that creates many fake identities to increase the power and influence of the attacker in the network and thereby generate engage in malevolent activities, such as disseminating social spam, distributing malware, distorting online ratings, executing phishing attacks, and so on [28], [49], [50].", "SYBIL ATTACK DEFENSE: SOLUTIONS AND SCHEMES Recently, interest and efforts for defending against malicious attacks in social networks using reliable solutions and schemes have increased [28], [44], [49]\u2013[52]."]} +{"21629724|12574246": ["These techniques are commonly used in areas such as pattern recognition (speech and image processing) and financial algorithms (credit scoring and algorithmic trading) [77]."]} +{"21629724|6444031": ["Second, they assume that a legitimate region in a social graph is always fast mixing; however, this assumption cannot be confirmed as being true [50], [51], [53], [54] because real social graphs are randomly formed and dynamically grow.", "Generally, a Sybil attacker is a user that creates many fake identities to increase the power and influence of the attacker in the network and thereby generate engage in malevolent activities, such as disseminating social spam, distributing malware, distorting online ratings, executing phishing attacks, and so on [28], [49], [50].", "[50], [53] mentioned that the calculation of the property of mixing time in the social graphwas used without careful measurements in the respective studies."]} +{"21629724|36438802": ["Moreover, they are convenient because they enable users to create new connections with people who have similar affinities, such as a similar profession or similar interests [31]\u2013[33].", "\u2019\u2019 These ties can be manifold and assorted, and may include concepts, such as genealogy, age, ideas, gender, education, club membership, and political affiliations, among other characteristics that may influence relationships in the OSN, as described in [29], [32], [33], [35]."]} +{"21629724|2294541": ["Moreover, false reputation can be created based on Sybil accounts [48]."]} +{"1029937|10137283": ["Ruohomaa and Kutvonen [35] provides a detailed survey and discussion of alternative approaches for trust management.", "Ruohomaa and Kutvonen [35] provides a detailed survey and iscussion of alternative approaches for trust management."]} +{"1029937|9240891": ["\u20262004) [78] Software engineering (Viega et al., 2001) [82] Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O'Hara et al., 2004)\u2026", "Modeling research ranges from simple access control polices (which specify who to trust to access data or resources) to anal- Table 1 A categorization of major areas of trust research Policy-based trust Network security credentials (Kohl and Neuman, 1993) [9] Trust negotiation (Yu et al., 2001) [10] (Yu and Winslett, 2003) [11] (Winslett et al., 2002) [13] (Li et al., 2003) [14] (Nejdl et al., 2004) [15] (Bonatti and Olmedilla, 2005) [16] (Gandon and Sadeh, 2004) [17] (Winsborough et al., 2000) [12] (Seigneur and Jensen, 2004) [18] Security policies and trust languages (Tonti et al., 2003) [19] (Uszok et al., 2003) [20] (Kagal et al., 2003) [21] (Nielsen and Krukow, 2003) [22] (Carbone et al., 2003) [23] (EHR Policy, 2001) [24] (XACML, 2005) [26] (SAML, 2005) [27] (WS-Trust, 2005) [28] (Becker and Sewell, 2004) [25] (Leithead et al., 2004) [29] Distributed trust management (Blaze et al., 1996) [31] (Blaze et al., 1999) [32] (Chu et al., 1997) [33] (Kagal et al., 2002) [34] Effect of credential type (Zheng et al., 2002) [36] Reputation-based trust Decentralization and referral trust (Abdul-Rahman and Hailes, 1997a) [37] (Abdul-Rahman and Hailes, 1997b) [38] (Yu and Singh, 2000) [39] (Yu and Singh, 2002) [40] (Yu and Singh, 2003) [41] (Sabater and Sierra, 2002) [42] (Beth et al., 1994) [43] (Xiao and Benbasat, 2003) [44] (O'Donovan and Smyth, 2005) [45] Trust metrics in a web of trust (Goldbeck and Hendler, 2004a) [51] (Goldbeck and Hendler, 2004b) [52] (Stewart, 1999) [53] (Stewart and Zhang, 2003) [54] (Richardson et al., 2003) [55] (Masa and Avesani, 2005) [56] (Guha et al., 2004) [57] (Advogato, 2000) [58] (Chirita et al., 2004) [59] (Ding et al., 2004) [60] Trust in P2P networks and grids (Kamvar et al., 2003) [47] (Cornelli et al., 2002) [48] (Aberer and Despotovic, 2001) [49] (Damiani et al., 2002) [50] (Olmedilla et al., 2005) [7] Application-specific reputation (Pirzada and McDonald, 2004) [61] (Dash et al., 2004) [62] (Josang and Ismail, 2002) [63] ) [65] (Acrement, 2002) [66] (Mui et al., 2002) [5] (Staab et al., 2004) [67] Computational and online trust models (Marsh, 1994) [68] (Ziegler and Lausen, 2005) [69] (Resnick et al., 2000) [70] (Friedman et al., 2000) [71] (Falcone and Castelfranchi, 2004) [72] (Jonker et al., 2004) [73] Game theory and agents (Buskens, 1998) [74] (Brainov and Sandholm, 1999) [75] (Ashri et al., 2005) [76] (Ramchurn et al., 2003) [77] (Huynh et al., 2004) [78] Software engineering (Viega et al., 2001) [82] Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O'Hara et al., 2004) [85] Trust using hyperlinks (Gyongy et al., 2004) [86] (Massa and Hayes, 2005) [87] (Brin and Page, 1998) [46] (Kleinberg, 1999) [88] Filtering information based on trust (Ciolek, 1996) [89] (Clarke et al., 2001) [90] (Downey et al., 2005) [91] Filtering the Semantic Web (Bizer et al., 2005) [92] (Ding et al., 2003) [93] (Ding et al., 2005) [94] (Ziegler, 2004) [95] Subjectivity analysis (Riloff et al., 2005) [97] (Stoyanov et al., 2005) [98] (Cardie et al., 2004) [99] Provenance information (McGuinness, 2005) [100] (Golbeck, 2006) [101] (Zhao et al., 2004) [102] (Wong et al., 2005) [103] (Kim et al., 2007) [104] Content trust (Gil and Ratnakar, 2002) [107,108] (Chklovski et al., 2003) [109] (Castelfranchi et al., 2003) [110] (Gil and Artz, 2006) [111] Site design and human factors (Sillence et al., 2004) [112] (Stephens, 2004) [113] (Corritore et al., 2001) [114] yses of competence, beliefs, risk, importance, utility, etc.", "The next definition, from Grandison and Sloman [6], introuces context and is unique in referring to the \u201ccompetence\u201d to ct (instead of actions, themselves):", "Trust in information resources Trust concerns in the Web (Khare and Rifkin, 1997) [83] (Grandison and Sloman, 2000) [6] Trust concerns in the Semantic Web (Bizer and Oldakowski, 2004) [84] (Berners-Lee, 1999) [1] (O\u2019Hara et al.", "Focusing on trust n Internet applications, which exchange or display informaion, Grandison and Sloman [6] give a provisional definition nd discussion of trust across a wide set of literature, and explore olutions and applications of trust management (which in their ork essentially means the implementation of security policies).", "Focusing on trust in Internet applications, which exchange or display information , Grandison and Sloman [6] give a provisional definition and discussion of trust across a wide set of literature, and explore solutions and applications of trust management (which in their work essentially means the implementation of security policies).", "\" The next definition, from Grandison and Sloman [6], introduces context and is unique in referring to the \" competence \" to act (instead of actions, themselves): \" [Trust is] the firm belief in the competence of an entity to act dependably, securely, and reliably within a specified context."]} +{"45061869|36438802": []} +{"17689312|6950376": []} +{"17689312|2294541": []} +{"17689312|18194234": []} +{"17689312|1462862": []} +{"17689312|10137283": []} +{"17689312|9240891": []} +{"13084605|1805048": []} +{"207230419|14745481": ["In Computing and Networking , the concept of trust is used in many different \ufb01elds ranging from arti\ufb01cial intelligence to human\u2013machine interaction to networking (e.g., telecommunication, social network analysis, communication networks, and cyber/network security) [Cho et al. 2011; Adal\u0131 2013].", "\u2026path, node density, reachability), fault tolerance (e.g., system lifetime), cooperative or sel\ufb01sh behaviors (e.g., forwarding or dropping packets), and network capacity (e.g., traf\ufb01c or congestion) [Daly and Haahr 2009; Desmedt et al. 2007; J\u00f8sang 1999; Lana and Westphall 2008; Cho et al. 2011].", "The agent can make a decision based on learning from past experience to maximize its interest (or utility) and/or minimize risk [Cho et al. 2011; Li et al. 2008].", "Various security applications using trust, including intrusion detection, secure routing, key management, and access control, have been studied extensively in the literature [Cho et al. 2011].", "Past surveys on trust research are often limited to a particular research domain, such as trust metrics in data fusion [Blasch et al. 2014], trust management in mobile ad hoc networks (MANETs) [Cho et al. 2011], and trust and reputation systems in online services [J\u00f8sang et al. 2007].", "\u2026goal in a situation where imperfect knowledge is given with uncertainty and vulnerability Lee et al. [2006] Computing & Networking Estimated subjective probability that an entity exhibits reliable behavior for particular operation(s) under a situation with potential risks Cho et al. [2011] \u2014", "\u2026concept, the term has been used in different disciplines to model different types of relationships: trust between individuals in social or e-commerce settings, trust between a person and an intelligent agent in automation, and trust between systems in communication networks [Cho et al. 2011]."]} diff --git a/edge/graph_57753588.jsonl b/edge/graph_57753588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad5049eb0cc971fb9394a00da85511abe04f1e88 --- /dev/null +++ b/edge/graph_57753588.jsonl @@ -0,0 +1,25 @@ +{"18565081|31973880": ["The authors in [28] provided a survey on compressive sensing techniques for cognitive radio."]} +{"18565081|15116409": ["Next generation communication systems are expected to be smart and fast in sensing the wideband spectrum and identifying the free channels to use [1-2]."]} +{"7525856|4122595": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"7525856|15116409": ["lenges involved in building sampling hardware that operate s at a sufficiently high rate [104].", "cause unnecessarily high acquisition costs [104]."]} +{"7525856|8974063": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"7525856|2509135": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"5493866|1230643": ["Wireless sensor networks (WSNs) are critically resource constrained by limited power supply, memory, processing performance and communication bandwidth [23]."]} +{"3493361|206485791": ["BACKGROUND Compressive sensing (CS) [1]\u2013[4] of sparse signals in achieving simultaneous data acquisition and compression has been studied extensively over the past few years."]} +{"14699145|1230643": []} +{"13039460|15116409": ["In the above context, Compressive Sensing (CS) has emerged as an important technique which can significantly reduce the acquisition cost at the CR node [10, 11].", "However, in compressive wideband systems, the required number of measurements to achieve a successful recovery rate proportionally varies with the sparsity order of wideband signals [11, 23]."]} +{"16610735|14889616": []} +{"8227817|4122595": ["Therefore, similar to [16], the conventional approaches are briefly reviewed in this survey in order to prepare for introducing the recent research to tackle the original issues.", "As far as recent surveys are concerned, in [16], the authors provided a comprehensive review of the existing CR approaches considering practical imperfections including noise uncertainty, channel/interference uncertainty, CR transceiver imperfections, noise/channel correlation, signal uncertainty, .", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|15116409": ["The problem of wideband (WB) spectrum sensing [6] consists of observing a wideband and identifying the portions of such band which are occupied by a signal and those which are free.", "The first approach to realize wideband sensing assumes that it is feasible to sample the desired spectrum by the ordinary Nyquist rate [6].", "On the contrary, wideband spectrum sensing [6][35] is based", "Compressive sensing [6] becomes a promising candidate to realize this sub-Nyquist approach.", "In other words, spectrum sensing is the task of obtaining awareness about the spectrum usage [6][14].", "However, it should be emphasized that all results presented by previous research work including [6][181], consider relatively small band (order of 300MHz) which is somehow in the order of a medium-sized band when compared to the practical wideband in the order of GHz.", "On the other hand, an overview for the wideband sensing approaches and challenges have been presented in [6].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|8974063": ["The DSMF proposed in [19] is adopted due to its clear functionality, well-defined interfaces among various blocks, and relevance to our discussion.", "Due to dynamically changing topologies and varying propagation characteristics, spectrum selection techniques [19] can be closely coupled with routing protocols.", "Dynamic Spectrum Management Framework for interweave network model [19], [23].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|2509135": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|12601073": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"31973880|7525856": []} +{"31973880|206485791": ["472 Regarding sparsity, compressive sensing requires signals to be sparse; however, signals can only be 473 approximately sparse in practical scenarios [37, 82, 113, 114].", "follows 109 \u2217 (1) 110 where s is the signal\u2019s projection on the sparse basis \u03c6 N \u2217 N , and \u2016s\u2016 \u226a [36, 37]."]} +{"31973880|15116409": ["Over the last decade, a number of spectrum sensing techniques have been proposed to detect and locate 25 dynamically unused spectrum channels in a band of interest [1-6]."]} +{"31973880|12601073": ["Over the last decade, a number of spectrum sensing techniques have been proposed to detect and locate 25 dynamically unused spectrum channels in a band of interest [1-6]."]} +{"28787941|206485791": ["The solution of underdetermined system of equations in (7) using `0-normminimization is difficult to implement because minimization of `0-norm is NP hard [5], [22], [36]."]} +{"13282659|7525856": ["as sensors or actuators for the IoT, wake-up radio, spectrum sensing, and radar applications [7], [23]\u2013[25].", "As a consequence, CS is commonly believed to be a panacea for wideband radio-frequency (RF) spectrum awareness applications [7]\u2013[9]."]} +{"13282659|15116409": ["RF features to be acquired for these tasks are mainly related to wideband spectrum sensing [8] and include the estimation of frequency occupancy, signal energy, energy variation,", "We start by introducing the basics of CS and then review the most prominent A2I converter architectures for RF signal acquisition, namely non-uniform sampling (NUS) [15], [16], [26]\u2013[29], variable rate sub-Nyquist sampling [8], [30]\u2013[32], and random modulation [33], [34], which includes the modulated wideband converter and Xampling [11], [35]\u2013[37].", "spectrum sensing tasks [8], [11], [15], [16], [18], the generallypoor noise sensitivity of traditional CS methods [19], [20] and the excessive complexity of the recovery stage [16], [21] prevents their straightforward use in low-power, cost-sensitive,", "A promising solution for such wideband spectrum sensing applications is to use CS-based analog-to-information (A2I) converters that leverage spectrum sparsity [8], [15]\u2013[17].", "rate sampling (MRS) that uses a fixed set of sampling frequencies for each branch [8], [31], [32] and the Nyquist-folding"]} +{"27304706|3443381": ["This is the core idea in [17][18][19][20][21]."]} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} diff --git a/edge/graph_57753717.jsonl b/edge/graph_57753717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57754369.jsonl b/edge/graph_57754369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2d565ec3656f9ac3a765356ec49961a0306c26a --- /dev/null +++ b/edge/graph_57754369.jsonl @@ -0,0 +1,8 @@ +{"42468255|3918777": []} +{"42468255|5556391": []} +{"19277476|13726263": ["All data mining problems comprise an interesting challenge in a streaming environment [6\u20138] mainly because of the one-pass requirement and strict memory limitations.", "For kmeans with k = 2 we observe that vectors 0 to 5 (representing period [0\u2013300]), 12\u201317 ([600\u2013900]) and 24\u201329 ([1,200\u20131,500]) are assigned to the same cluster (Cluster 0)."]} +{"8255138|16156203": ["Temporal data mining [96] incorporates time dimension into data mining process."]} +{"8255138|1176034": ["Spatio - temporal data mining deals with database models to accommodate temporal aspects [121, 130]."]} +{"1676584|1708582": ["Since both of these methods are widely known by the machine learning community, we simply refer the interested reader to (Kaelbling et al., 1996).", "For more details on these methods please refer to (Kaelbling et al., 1996)."]} +{"14220380|5556391": ["Recently, class imbalance problem in drifting data streams has received attention for chunk-bychunk learning [14\u201319].", "Moreover, most of the existing methods assume that a full chunk of data is always available for training [14].", "Compared to single classifier methods, ensemble methods tend to better cope with concept drift problem, particularly with gradual drifts [14]."]} +{"16645380|5556391": ["It is worth underlining that, in several concept drift surveys [1, 13, 15, 40], the Class Prior Concept Drift was not considered as a drift type apart."]} diff --git a/edge/graph_57754502.jsonl b/edge/graph_57754502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84809fb60953c748adaca8bced347188e1618cfe --- /dev/null +++ b/edge/graph_57754502.jsonl @@ -0,0 +1,3 @@ +{"55211508|394767": []} +{"55211508|2357830": ["Again, in a nuclear plant where the physical access is prohibited or in modern composite materials (carbon-fiber epoxy) that are used in military or aircrafts or packaging of food or beverage, for these casesAET is more appropriate due to its nonelectromagnetic features [37\u201340]."]} +{"17008910|15126268": []} diff --git a/edge/graph_57756528.jsonl b/edge/graph_57756528.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..514584e971021d746b38912ab0512c04587f7b6c --- /dev/null +++ b/edge/graph_57756528.jsonl @@ -0,0 +1,14 @@ +{"1489375|9060471": ["Recent work focus on estimating reliability of reported sensing data, which can found in both recent machine learning data mining literature [11], [12], [22], crowd sourcing literature [8], [9], [14] and sensor network literature [16], [18], [19], [21]."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"6916259|9060471": ["To solve this problem, techniques for multi-source aggregation, which consider the estimation of source reliability, have been proposed to derive true answers from a collection of sources [2, 3, 4, 5, 6, 10, 11, 12, 14, 17, 18, 19, 22, 26, 28]."]} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} +{"21013952|7774517": ["Note that in the statistical reputation, positive and negative readings are identified after running an outlier detection procedure [78], by marking the outliers as negative readings."]} +{"22212318|29654897": ["[38] investigate the effect of gamification on crowdsourcing and report positive effects (e."]} +{"18514801|9060471": ["To tackle the challenge of discovering both true information and user reliability, truth discovery methods [26, 27, 28, 44, 47] have been proposed based on the principle that reliable users tend to report true information and truth should be reported by many reliable users."]} +{"32793970|10089999": ["Several work [27], [28] has considered the use of MCS to collect location-dependent fingerprints."]} +{"9514634|9060471": ["The field of truth discovery has recently attracted enormous attention from the data mining and crowdsourcing communities [102, 175]."]} +{"9514634|3330313": ["Outlier detection can be broadly classified as either model-based or consensus-based techniques [73]."]} +{"1080095|17756238": ["Survey participants answer the questions with their own ideas independently, and the responses are often private [44]."]} +{"3045769|10777439": ["Moreover, accurate labels can also benefit other applications, e.g., activity recommendation to users [25]."]} +{"11620079|9060471": ["Truth discovery methods [34] try to solve this problem by inferring both the source reliability and entity truths.", "These methods can be roughly divided into three categories [34]: iterative methods [12, 15, 40, 51], probabilistic model based methods [41,47,48,52,53], and optimizationbased methods [31, 32, 35, 46].", "To tackle this challenge, some truth discovery methods [32, 34, 51] have been proposed to simultaneously estimate true values and user reliability from crowdsourced data."]} diff --git a/edge/graph_57759312.jsonl b/edge/graph_57759312.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e009414353a3da29eb0543cc52c8fc77e0f437d0 --- /dev/null +++ b/edge/graph_57759312.jsonl @@ -0,0 +1,2 @@ +{"195603497|60455": ["Web data mining [50] concerns the use of data mining techniques to discover, extract and analyse Web data."]} +{"55853157|14659095": []} diff --git a/edge/graph_57760262.jsonl b/edge/graph_57760262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eeb86518e34b787c33b3f212e692397a7232c884 --- /dev/null +++ b/edge/graph_57760262.jsonl @@ -0,0 +1,20 @@ +{"11737359|1230643": ["But for better communication and data sending from one node to another, acoustics waves are used as it can provide high speed communication among the nodes[11] and can carry digital data through the channel."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"55997083|870434": []} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"123310|870434": []} +{"2473728|31355144": []} +{"2473728|16490750": ["Most of the localization protocols work on flooding phenomenon and are considered to have fast packet delivery ratio and low end to end delay [10], [11].", "WSN is used in Military purposes, security monitoring, flood monitoring, Health monitoring, border monitoring and many more [11]."]} +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"5178260|141053": ["There has been intensive recent research on MAC protocols fo r ad hoc [17] and wireless terrestrial sensor networks [16]."]} +{"5178260|1762301": ["In recent years there has been a great interest to develop new routing protocols for terrestrial ad hoc [1] and wireless se nsor networks [2]."]} +{"2897528|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [5], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"2897528|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [11].", "divided into three categories, namely proactive, reactiveand geographicalrouting protocols [11]:"]} +{"11188425|870434": ["As a promising solution to aquatic environmental monitoring and exploration, Underwater Sensor Network (UWSN) has attracted significant attention recently from both academia and industry [1], [2], [3], [4], [5]."]} +{"35260963|870434": ["signals would be rapidly absorbed by water [11]\u2013[12]."]} +{"20712925|870434": ["Unlike in terrestrial adhoc networks, the underwater scenario poses challenges of high propagation delay, uncontrollable variations in node locations, varying network topology and frequent loss of connectivity due to underwater currents [3]."]} +{"9538414|870434": ["LocationAware Routing Protocol for Underwater Acoustic Networks.", "Incorporating Realistic Acoustic Propagation Models in Simulation of Underwater Acoustic Networks: A Statistical Approach.", "[8] E. M. Sozer, M. Stojanovic, and J. G. Proakis, \"Underwater Acoustic Networks,\" IEEE Journal of Oceanic Engineering, vol. 25, pp. 72-83, Jan 2000.", "Cost is an important issue for Acoustic Networks [3].", "[24] Josep Miquel Jornet, Milica Stojanovic and Michele Zorzi, \u201cFocused Beam Routing Protocol for Underwater Acoustic Networks\u201d, WUWNet\u2019 08, September 15, 2008, California, USA."]} +{"31355144|13475127": []} +{"657283|870434": []} diff --git a/edge/graph_57762290.jsonl b/edge/graph_57762290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c556dc0b371e3302d67cdf46af62ac150c98b51 --- /dev/null +++ b/edge/graph_57762290.jsonl @@ -0,0 +1,4 @@ +{"53719628|2814871": ["A recent review by Muro-de-la-Herran and colleagues [5] provided an overview of the advantages and disadvantages of wearable versus non-wearable technologies to measure mobility.", "Force plates, accelerometers and camera systems have been widely used to quantify gait [5].", "Each technique has its advantages and disadvantages, and the authors concluded that the choice of technology really depends on the research question and applications [5]."]} +{"960125|20905429": ["BASN is defined as a wireless network, which is formed by sensors located on, and/or biosensors transplanted into, the human body [1, 2] and a data collector (Sink) used for medical data collection in real time."]} +{"3804097|21386749": ["Among IoT application domains, health care is one of the most attractive, giving rise to many health-related devices [18]."]} +{"3804097|7494281": ["In the case of a relative profile, some authors distinguish these profiles in terms of accessing the PHR with some limitations or full access with the permission of the patient [5,23,65].", "Journal BioMedd Castillo et al, 2010 [5] A08", "The EHR evolved from a number of electronic methods of storing patients\u2019 health data that became a structured and interoperable approach [5,6]."]} diff --git a/edge/graph_57762585.jsonl b/edge/graph_57762585.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbce398c53cdbbc49ef51bad18e02498257500bc --- /dev/null +++ b/edge/graph_57762585.jsonl @@ -0,0 +1,12 @@ +{"64890177|744441": []} +{"46321861|1230643": ["A typical wireless sensor network (WSN) consists of a large number of small-sized, battery-powered nodes with wireless communications and various sensing capabilities [1]."]} +{"4625285|3119314": []} +{"18306152|7988320": []} +{"18306152|7085121": []} +{"18306152|562065": []} +{"18306152|15300368": []} +{"18306152|1503157": ["This issue can be addressed by integrating RFID with WSN as WSN provides longer reading range as well as other benefits like different network topologies and flexibility, variety of sensors that are already implemented and low power consumption [31]."]} +{"18306152|1236072": ["techniques [7, 13, 14], MAC protocols [15\u201317], congestion control [18, 19], data col-"]} +{"16463739|5972227": []} +{"16463739|1230643": ["Wireless sensor networks (WSNs) generally consist of numerous inexpensive sensors that are powered by portable energy supplies and can sense physical events to collect environmental information [Akyildiz et al. 2002].", "First, sensors in networks are powered by low-cost batteries and should work for a long time in an unattended manner, so their energy is extremely limited and cannot be recharged [Akyildiz et al. 2002]."]} +{"65086984|16335158": ["SCS is an effective combination of Wireless Sensor Networks (WSNs) and Cloud Computing, which bonds physical sensor nodes, applications and users together [1]."]} diff --git a/edge/graph_57764303.jsonl b/edge/graph_57764303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65deef0a88d0ab38b3cc497a7b0a541f73a38d26 --- /dev/null +++ b/edge/graph_57764303.jsonl @@ -0,0 +1,29 @@ +{"21013952|7774517": ["Note that in the statistical reputation, positive and negative readings are identified after running an outlier detection procedure [78], by marking the outliers as negative readings."]} +{"791261|7876249": ["A study of effective routing protocols in WBSNs is given in [14], where issues and challenges in terms of network topology, topological partitioning, body postural movements, short range transmissions, energy efficiency, and the overall network lifetime are addressed."]} +{"791261|16084499": []} +{"11259953|10206347": ["As noted in [4], the widespread use of mobile phones and tablets, which are getting more and more popular in daily life, has contributed to the fact that mHealth technology has become the most representative application of WBANs in the medical field in recent years.", "According to the authors of [4], the adoption of smartphones, which are characterized by the integration of all the necessary technologies in an mHealth system, avoids the development of specific additional devices, reducing system costs,"]} +{"8094527|33211520": ["The most common technologies are Radio Frequency IDentification (RFID) [3,18], ZigBee [19,20], WiFi [21,22], Bluetooth [23], Ultra-wideband [24], etc. , In addition to technology, there are different algorithms that can be applied such as trilateration [25], signpost, fingerprint [21]."]} +{"17984227|1230643": ["Wireless sensor networks (WSNs) are finding applications in many areas, such as medical monitoring, emergency response, security, industrial automation, environment and agriculture, seismic detection, infrastructure protection and optimization, automotive and aeronautic applications, building automation, and military applications [1,4,5]."]} +{"25088296|31860478": ["There are several dimensions in fog architecture in term of the current standard practice [35]."]} +{"25235935|61132": ["Given their low cost, flexible maneuvering capability, and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including aerial mapping, disaster rescue, agricultural irrigation, and military surveillance and attack [1]."]} +{"14356939|3348390": []} +{"6682726|11608263": []} +{"9514634|9060471": ["The field of truth discovery has recently attracted enormous attention from the data mining and crowdsourcing communities [102, 175]."]} +{"9514634|3330313": ["Outlier detection can be broadly classified as either model-based or consensus-based techniques [73]."]} +{"1353379|9667820": []} +{"1353379|44461432": []} +{"1353379|9928823": []} +{"1353379|18388986": []} +{"1353379|3127198": []} +{"7370425|6539555": ["\u2026(monitoring amount of oxygen that is being \u201ccarried\u201d in a patient\u2019s blood) \u2022 Blood glucose level sensor in the patient\u2019s \u2022 Body temperature sensor (Ullah et al ., 2009) To better observe a human\u2019s vitals signals, a wide range of commercial sensor technologies are used to capture physical data\u2026"]} +{"7370425|20905429": []} +{"44091851|3348390": []} +{"44091851|25929315": []} +{"3786171|19938676": ["5G Network [40] is the \ufb01fth generation cellular network architecture, designed to support great amounts of data, high speed, con\ufb01gurability, etc. from new emerging technologies such as Internet of Things."]} +{"3786171|15589021": ["Nowadays, we can \ufb01nd a wide variety of sensing technologies (see Figure 18) for gas detection (Metal oxide semiconductor, polymer, carbon nanotubes, moisture absorbing materials, Optics, Acoustics, etc.) as shown in [80]."]} +{"3786171|1230643": ["Normally, the sensing process is made through a Wireless Sensor Network (WSN) [64,65], which is composed by a set of nodes or sensors that collect data and send it towards a central sink or gateway."]} +{"3197929|1230643": ["Offering high ef\ufb01ciency and accuracy in tracking different events, wireless sensors have already been deployed widely in various environments for the purposes of data collection and monitoring [21\u201325]."]} +{"3197929|289357": ["We argue that the discussed problem is that of the NP-hard nature [83] and the mentioned solution principle cannot be applied."]} +{"9951196|154032": ["In [56], the EE of the networking components in cloud-based environments was provided."]} +{"9951196|8215225": ["Interesting readers may also refer to [49] for distributed data aggregation algorithms."]} +{"6414103|6939676": ["Localization has been categorized into di\ufb00erent techniques as Range based-Range free, Centralized localization and Distributed local-165 ization [17] and [3]."]} diff --git a/edge/graph_57764313.jsonl b/edge/graph_57764313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb8aa73a1616e5fcc6ed21fae0873cdb60880367 --- /dev/null +++ b/edge/graph_57764313.jsonl @@ -0,0 +1 @@ +{"35402964|16944441": []} diff --git a/edge/graph_57764341.jsonl b/edge/graph_57764341.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57764934.jsonl b/edge/graph_57764934.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebb731daf4bfa0b2de0565f41f7c21c8d91fbd12 --- /dev/null +++ b/edge/graph_57764934.jsonl @@ -0,0 +1 @@ +{"52148954|385243": ["Many studies on this topic and on how to thwart such attacks are still being conducted by researchers to evaluate security weaknesses in the face of such threats [3]."]} diff --git a/edge/graph_5776809.jsonl b/edge/graph_5776809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afb3a9351b0e38e212082bebd2390cde6ca2b99b --- /dev/null +++ b/edge/graph_5776809.jsonl @@ -0,0 +1,4 @@ +{"14913791|1230643": ["Introduction Networking unattended wireless sensors is expected to have significant impact on the efficiency of many civil applications, such as disaster management, environment monitoring and security [1][2][3]."]} +{"3547952|1230643": ["\u2026networks, base station, genetic algorithm\nI. INTRODUCTION Networking unattended wireless sensors is expected to have significant impact on the efficiency of many civil and military applications, such as disaster management, environment monitoring, combat field surveillance and security [2][3][4]."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"9133308|1230643": ["Networking unattended wireless sensors is expected to have significant impact on the efficiency of many civil and military applications, such as disaster management, environment monitoring, combat field surveillance and security [1][2][3][4][5][6]."]} diff --git a/graph_57770.jsonl b/edge/graph_57770.jsonl similarity index 100% rename from graph_57770.jsonl rename to edge/graph_57770.jsonl diff --git a/edge/graph_5781914.jsonl b/edge/graph_5781914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57825713.jsonl b/edge/graph_57825713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7449daecaed181d24e4883cfa5700b338a91e1b5 --- /dev/null +++ b/edge/graph_57825713.jsonl @@ -0,0 +1,30 @@ +{"20219458|4915696": ["Video analysis for group activities usually involves object detection, tracking, and behavior recognition [1].", "Human crowds exhibit complex temporal dynamics and psychological characteristics [1].", "In addition, psychophysical research suggests that human ability to monitor simultaneous signals deteriorates after a certain long-term duration [1].", "Group activity recognition has attracted more and more attention in the field of computer vision and artificial intelligence as it has many practical applications such as abnormal group detection, group affective computing, video surveillance, and public security [1], [2]."]} +{"4757123|14415030": ["An extensive evaluation of unsupervised evaluation metrics was presented in the survey of Zhang et al.(24) Based on the results of their experiments examining the performance of metrics on segmentation produced by the same algorithm with varying numbers of segments, the best performing metric Q(25) is selected for our algorithm.", "An extensive evaluation of unsupervised evaluation metrics was presented in the survey of Zhang et al. 24 Based on the results of their experiments examining the performance of metrics on segmentation produced by the same algorithm with varying numbers of segments, the best performing metric Q 25 is selected for our algorithm.", "A systematic review of the state-of-the-art DL-based methods used in remote sensing image analysis was made by Zhang et al. 11 Motivated by the success of DL on various tasks in remote sensing, this study is the first to our knowledge to apply DL techniques for residential roof condition assessment.", "However, the quantitative score Q is known to be biased toward undersegmentation.(24) For some relatively simple roof images, Q would select the final step of region merging processing, where there is no segmentation at all."]} +{"15321278|50458504": ["The most common and well-accepted categorization that is used by machine learning experts divides data mining methods into 'supervised' and 'unsupervised' methods (Phua, Lee, Smith, & Gayler, 2010; Li et al., 2008; Bolton & Hand, 2002)."]} +{"70169038|5523008": []} +{"14251600|11632848": []} +{"14251600|8365617": ["However, the quality of the approximating line, in terms of Euclidean distance, is generally better in the regression approach [29].", "In particular, we compare bottom-up [27], top-down [42], adaptive top-down [26] and sliding window and bottom-up algorithms [29]."]} +{"51921054|3630870": ["Generally, the timescale of network traf\ufb01c in traditional ISP network is 10-min or 15-min [13]\u2013[17]."]} +{"51921054|14669932": ["Nevertheless, the ISP network traf\ufb01c shows large-range dependence, multifractal feature and a small number of \ufb02uctuations [17].", "Generally, the timescale of network traf\ufb01c in traditional ISP network is 10-min or 15-min [13]\u2013[17]."]} +{"3562477|3330313": []} +{"3562477|50458504": []} +{"65809|3330313": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"4857572|4097106": ["[15] compare DGMs with different convolution architectures for video anomaly detection applications."]} +{"4857572|17195518": ["[32] further reviews GAD techniques where group structures are not previously known however clusters are inferred based on additional information of pairwise relationships between data instances."]} +{"4857572|3330313": []} +{"11843041|18977370": ["m domains. For example, methods for performing anomaly detection have been discussed as part of more generalreviewsinareasoffrauddetection (Bolton and Hand, 2002; Phua et al., 2010), networkintrusion(Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deploymentofwirelesssensornetworks(Zhang et al.,2010; Janakiram et al., 2006). While signi\ufb01cant overlap exists between the analysis of computer an"]} +{"11843041|18654252": [", 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor networks (Zhang et al.", "\u2026been discussed as part of more general reviews in areas of fraud detection (Bolton and Hand, 2002; Phua et al., 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor networks (Zhang et al., 2010; Janakiram et al., 2006).", "\u2026based anomaly detection has been investigated in a number of additional problem domains including intrusion detection (Garc\u00b4\u0131a-Teodoro et al., 2009; Gogoi et al., 2011; Jyothsna et al., 2011), tra\ufb03c modelling (Shekhar et al., 2001) and gene regulation (Kim and Gelenbe, 2009; Kim et al., 2012).", "Network based anomaly detection has been investigated in a number of additional problem domains including intrusion detection (Gar\u0107\u0131a-Teodoro et al., 2009; Gogoi et al., 2011; Jyothsna et al., 2011), traffic modelling (Shekhar et al."]} +{"11843041|7774517": ["In addition, anomaly detection in sensor networks generally requires algorithms that reduce network tra\ufb03c and have a low computational complexity (Zhang et al., 2010).", "in some SNA scenarios, it is not typically required. In addition, anomaly detection in sensor networks generally requires algorithms that reduce network tra\ufb03c and have a low computational complexity (Zhang et al., 2010). 3. Problem domains for the application of anomaly detection in social networks Anomalies in social networks are often representative of illegal and unwanted behaviour. The recent explosion of social", "\u2026been discussed as part of more general reviews in areas of fraud detection (Bolton and Hand, 2002; Phua et al., 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor networks (Zhang et al., 2010; Janakiram et al., 2006)."]} +{"11843041|3330313": ["on methods employed. For the detection of anomalies in social networks, we are concerned with the pattern of interactions between the individualsin the network. Thus, following(Chandola et al., 2009; Hodge and Austin, 2004) we de\ufb01ne network anomalies simply as patterns of interaction that signi\ufb01cantly differ from the norm. As is the case for general anomaly detection, this de\ufb01nition is highly imprecise, and for a given ", "\u2026previous reviews describe a number of challenges for anomaly detection, mainly associated with the problem of de\ufb01ning normal behaviour, particularly in the face of evolving systems, or systems where anomalies result from malicious activities (Chandola et al., 2009; Hodge and Austin, 2004).", " 2009). Another recent review de\ufb01nes anomalies as \u201can observation (or subset of observations) which appears to be inconsistent with the remainderofthat setofdata\u201d((Barnett and Lewis, 1994), cited in (Hodge and Austin, 2004)). We note two important aspects of these de\ufb01nitions. First, the de\ufb01nitions given above highlight the importance of de\ufb01ning expected behaviour, but are somewhat imprecise in terms of exactly how the a", "tion, mainly associated with the problem of de\ufb01ning normal behaviour, particularly in the face of evolving systems, or systems where anomalies result from malicious activities (Chandola et al., 2009; Hodge and Austin, 2004). In particular, Chandola et al. (2009) note that the development of general solutions to anomaly detection remains a signi\ufb01cant challenge and that novel methods are often developed to solve speci\ufb01c p", "\u2026non-network based problem, describing the use of various algorithms and the particular types of problems to which these algorithms are most suited (Hodge and Austin, 2004; Chandola et al., 2009; Markou and Singh, 2003b,a). cause harm A workshop on the detection of network based anomalies was also\u2026", "Another recent review de\ufb01nes anomalies as \u201can observation (or subset of observations) which appears to be inconsistent with the remainder of that set of data\u201d ((Barnett and Lewis, 1994), cited in (Hodge and Austin, 2004)).", "Thus, following (Chandola et al., 2009; Hodge and Austin, 2004) we de\ufb01ne network anomalies simply as patterns of interaction that signi\ufb01cantly differ from the norm."]} +{"11843041|50458504": ["\u2026Bichler (2011); Cheng and Dickinson (2013)), clandestine organisational structures (e.g. Shetty and Adibi (2005); Krebs (2002); Reid et al. (2005)), and fraudulent and predatory activity (e.g. Phua et al. (2010); Fire et al. (2012); Chau et al. (2006); Akoglu et al. (2013); Pandit et al. (2007)).", "\u2026methods for performing anomaly detection have been discussed as part of more general reviews in areas of fraud detection (Bolton and Hand, 2002; Phua et al., 2010), network intrusion (Jyothsna et al., 2011; Gogoi et al., 2011; Patcha and Park, 2007), and the deployment of wireless sensor\u2026", "For xample, methods for performing anomaly detection have been iscussed as part of more general reviews in areas of fraud detecion (Bolton and Hand, 2002; Phua et al., 2010), network intrusion Jyothsna et al."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"13189204|17195518": ["We also have a survey paper on social media anomaly detection [12], in which the audience can find more details of the algorithms discussed in the tutorial."]} +{"49669060|207743293": ["Zubiaga et al. propose an overview of how to develop a rumor detection system, which consists of four steps: rumor detection, rumor tracking, rumor stance classi\ufb01cation, and rumor veracity classi\ufb01-cation [24]."]} +{"125678096|5755403": ["This means re-deployable trained model cannot be applied readily across cross-domains [7, 8]."]} diff --git a/edge/graph_57825745.jsonl b/edge/graph_57825745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fdcebfbc1c625046e906581c9047c37be42fe19 --- /dev/null +++ b/edge/graph_57825745.jsonl @@ -0,0 +1,3 @@ +{"8980558|3348390": []} +{"53432671|3273340": [", for medical applications, robotics, or tactile devices, their physical realization needs to be extremely energy efficient to meet requirements on durability, size, and heat emission (K\u00f6nig et al., 2002; Sze et al., 2017).", "To achieve high throughput and energy-efficiency, hardware architectures have an optimized data flow that reuses data (weights, feature maps) as much as possible and avoids accessing off-chip memory (Sze et al., 2017)."]} +{"53432671|1895753": ["It dominates the required chip area (Benjamin et al., 2014; Schmitt et al., 2017) and power consumption (Schemmel et al., 2008; Akopyan et al., 2015) in special purpose hardware and the required memory and computation time ( Brette et al., 2007) in software simulations."]} diff --git a/edge/graph_57825759.jsonl b/edge/graph_57825759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0114507c75626bf0a2d8ef92cbb0b0c50803c66 --- /dev/null +++ b/edge/graph_57825759.jsonl @@ -0,0 +1,11 @@ +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} +{"21831796|12127129": ["For example, by assuming a static camera, it was possible to \ufb01nd all moving objects by applying background sub-traction [18]."]} +{"85872|6396569": ["For a general overview, we refer to [12] for a more comprehensive survey."]} +{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]} +{"207229534|6396569": ["For a more detailed general overview, we refer to [17]."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"7637646|6396569": ["Comprehensive surveys of related work in this field can be found in [20, 21, 22]."]} +{"7637646|206583375": ["Comprehensive surveys of related work in this field can be found in [20, 21, 22]."]} +{"22843207|17574321": ["We used GMM (Gaussian Mixtures Model) as a classifier as it has been shown to perform better than DTW (Dynamic Time Warping) or supervised learning methods such as SVM for speech recognition classification tasks [33, 51]."]} diff --git a/edge/graph_57846582.jsonl b/edge/graph_57846582.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c49a2da64eb8f72dff8583b2e7efe2045e00ef1b --- /dev/null +++ b/edge/graph_57846582.jsonl @@ -0,0 +1,9 @@ +{"51929467|15333444": []} +{"51929467|8008208": []} +{"51929467|1932843": []} +{"11971675|36510460": ["The development of intelligent planning algorithms is one of the key issues when designing robotic architectures [20], [21].", "In [21] and [95] descriptions, applications and improvements of these algorithms are reviewed.", "The approach consists on randomly sampling the configuration space or state space, looking for connectivity inside it [21]."]} +{"11971675|1029120": []} +{"55112206|36510460": ["From [31], we know that the sampling strategies have much effect on the efficiency of sampling-based algorithms.", "And it certainly reduces the probability that samples are generated in the case of narrow passages [31]."]} +{"9781821|8363289": []} +{"14104658|1177069": ["A large body of research has investigated coverage path planning in 2D environments and applications have been reported in domains such as aerial robotics, agricultural robotics, mine countermeasures (MCM) operations and marine robotics (see [1] for a survey)."]} +{"36510460|18315024": ["Both surveys [66], [67] focus on RRT and PRM for computational biology and physics-based simulation and modeling.", "In computational biology, molecules and proteins are modeled as articulated bodies and sampling based planners are used to simulate protein folding and protein-ligand interactions [66], [67]."]} diff --git a/edge/graph_57849887.jsonl b/edge/graph_57849887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57877819.jsonl b/edge/graph_57877819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57898931.jsonl b/edge/graph_57898931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65cc07791ef77c13bb0635be1e1b45f7fdbc5d33 --- /dev/null +++ b/edge/graph_57898931.jsonl @@ -0,0 +1 @@ +{"9278142|2669421": []} diff --git a/edge/graph_5791119.jsonl b/edge/graph_5791119.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_57925362.jsonl b/edge/graph_57925362.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_579475.jsonl b/edge/graph_579475.jsonl similarity index 100% rename from graph_579475.jsonl rename to edge/graph_579475.jsonl diff --git a/edge/graph_5797907.jsonl b/edge/graph_5797907.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5798514.jsonl b/edge/graph_5798514.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c45841b7c4247224289cda131a07c8e3878e75e --- /dev/null +++ b/edge/graph_5798514.jsonl @@ -0,0 +1,8 @@ +{"200115|14441987": ["Furthermore, some applications only require relative positions of nodes, such as in some direction-based routing algorithms [4], [5]."]} +{"18493934|562855": []} +{"19706|1708582": ["For more information on reinforcement learning techniques, [230, 14, 118] are good starting points."]} +{"13416245|15300368": []} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"17300694|1230643": ["This paper describes the biologically-inspired mechanisms in BiSNET, and evaluates their impacts on the autonomy, scalability, adaptability, self-healing and simplicity of MWSNs. Simulation results show that BiSNET allows sensor nodes (agents and platforms) to be scalable with respect to network\u2026"]} +{"2098687|205286988": []} +{"2098687|1230643": ["With minimal intervention to / from human operators, WSN applications are required to adapt their operations to dynamic changes in physical operational environments (e.g., sensor readings) and network environments (e.g., network tra \ufb03 c and node / link failures)."]} diff --git a/graph_57992.jsonl b/edge/graph_57992.jsonl similarity index 100% rename from graph_57992.jsonl rename to edge/graph_57992.jsonl diff --git a/edge/graph_58004287.jsonl b/edge/graph_58004287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99dcdc02ec3993affada1f435809eb718c4db446 --- /dev/null +++ b/edge/graph_58004287.jsonl @@ -0,0 +1,19 @@ +{"12754736|6127042": ["Schneider et al. [24] have listed 82 prototypes of sensors that can be applied for learning."]} +{"27623143|10565822": ["It may be interesting to compare our results with the results found by Robins et al. who reported that the difference between effective and ineffective novices relate to learning strategies rather than knowledge [16].", "\u2026Robins et al. speculate that the distinction between an effective and ineffective novice is more important than the one between a novice and expert programmer [16], and that the significant difference be-tween effective and ineffective novices relate to learning strategies rather than knowledge."]} +{"115872190|627405": ["In contrast, systematic reviews aim to address problems by identifying, critically evaluating and integrating the findings of all relevant, high-quality individual studies addressing one or more research questions [6].", "[6] Uses regression combined with classification to predict students\u2019 grades for both subjects."]} +{"17861426|162600": ["Recent availability of educational technology such as clickers and instrumented programming IDEs means that we have a wealth of process data at our disposal [7]."]} +{"31019479|9107727": ["\u2026& Clustering [41], [115], [116], [117] Learning style & Clustering [118], [80], [119], [120], [121], [122], [123], [124], [125], [126], [127], [128], [129] Self-Organizing Map (SOM) & Clustering [130], [131], [132] Semantic web in education & Clustering [44], [58] Student modeling &\u2026"]} +{"31019479|62665936": ["\u2026[47], [80], [81], [82], [46], [83], [11], [84], [85], [86], [87], [50], [56], [88], [89], [90], [26], [91], [68], [56], [92], [93], [48], [94], [95], [96], [97], [98], [99] E-Learning & Clustering [100], [47], [77], [101], [30], [31], [32], [44], [33], [102], [103], [104], [105], [84], [106],\u2026"]} +{"31019479|6707996": ["In statistical notation, \u201cclustering is the most important unsupervised learning algorithm\u201d [22]."]} +{"31019479|14826104": ["\u2026& Clustering [130], [131], [132] Semantic web in education & Clustering [44], [58] Student modeling & Clustering [18], [130], [133], [21], [101], [85], [134] Student motivation & Clustering [135] Student profiling & Clustering [55], [56], [136], [137], [138], [139] We will now provide a detailed\u2026", "\u2026Mining (EDM)- Review & Survey [79], [6], [1], [11] Educational Data Mining (EDM) & Clustering [79], [47], [80], [81], [82], [46], [83], [11], [84], [85], [86], [87], [50], [56], [88], [89], [90], [26], [91], [68], [56], [92], [93], [48], [94], [95], [96], [97], [98], [99] E-Learning & Clustering\u2026"]} +{"31019479|191396": ["\u2026[50], [56], [88], [89], [90], [26], [91], [68], [56], [92], [93], [48], [94], [95], [96], [97], [98], [99] E-Learning & Clustering [100], [47], [77], [101], [30], [31], [32], [44], [33], [102], [103], [104], [105], [84], [106], [107], [34], [35], [36], [37], [38], [91], [39], [108], [109],\u2026", "\u2026[66], [49] Collaborative learning [42], [67], [43], [60], [68] Data clustering \u2013 Review & Survey [69], [70], [71], [72], [73], [74], [75], [76], [77] Education affordability [78] Educational Data Mining (EDM)- Review & Survey [79], [6], [1], [11] Educational Data Mining (EDM) & Clustering [79],\u2026"]} +{"11051277|62665936": []} +{"18241611|15273230": []} +{"3329018|15683881": [") and learning behavior in order to automate the construction of student models [89]."]} +{"16371646|17446703": ["Salleh et al. performed a meta-review on the literature and found that the most important factor in forming pairs is to match students\u2019 skill levels [17], a result recently con\ufb01rmed by Ta\ufb02iovich et al. [19] Peer Instruction (PI) has emerged as an e\ufb00ective way to engage students in class [8, 12]."]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"6693044|14644374": ["Chanchal Yadav et al. [5] have done a survey on various algorithms (1994-2013) necessary for handling large data set."]} +{"14520344|14229975": ["It takes into account the lessons learned from the previous study [4] by defining more robust research questions, using an adapted search string, and including a number of publication channels (journals, conferences and workshops) on the topic that have either been just recently established or were not indexed yet in the earlier study.", "This first review [4] is now extended and analyzed in more depth and detail, as the first study did not differentiate research facets and knowledge areas.", "The first step was our previous work with an earlier study on the available research [4], and now a related effort is made after only two years because the field has substantially evolved since then."]} +{"44154456|2511280": ["The stratification approach accounts for the natural imbalance in the eligible students in the treatment and comparison groups (Stuart, 2010; see Results section for a description of the final sample retained using this approach)."]} +{"3202548|162600": ["In programming classes and blended classrooms, students leave a far greater digital footprint we can leverage to improve their experience and help to identify those in need [4]."]} +{"44087975|10565822": ["[4] teachers must focus on balancing concepts and there application while teaching programming."]} diff --git a/edge/graph_58004701.jsonl b/edge/graph_58004701.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97f79c6f782b10e9e8156e0351dbdfc0b5ab40f0 --- /dev/null +++ b/edge/graph_58004701.jsonl @@ -0,0 +1,14 @@ +{"10917946|13365762": ["Most notable global ones are CEDD [6] as well as the related features JCD [7] and FCTH [5], PHOG [3], the Auto Color Correlogram [11], Local Binary Patterns [18], CENTRIST [23], and the MPEG-7 features [4] Edge Histogram, Color Layout and Scalable Color."]} +{"1033682|174797842": []} +{"16203615|1143625": []} +{"36213689|1143625": ["For a complete survey, mainly on the text processing systems, we refer the reader to Imran et al. (2015).", "People post a variety of content such as textual messages, images, and videos (Chen, Lu, Kan, & Cui, 2013; Imran, Castillo, Diaz, & Vieweg, 2015)."]} +{"925123|1143625": ["Many studies have shown that this online information is useful for rapid crisis response and management [1], [3].", "People use social networks to post situational updates in a variety of forms such as textual messages, images, and videos [1], [2]."]} +{"16198736|1143625": ["Academia showed great interest for such an issue [14], setting up studies and developing experimental solutions along several research directions, such as emergency event detection [19,2], situational awareness [6] and crisis mapping [5,18]."]} +{"11952894|1230643": []} +{"11952894|60455": ["Harvesting information from social media feeds is in essence a web-mining process (Kosala and Blockeel 2000, Sakaki et al. 2010, Russell 2011)."]} +{"13747866|1143625": ["The use of social media such as Twitter, Facebook, and Youtube, has been explored in numerous studies (Imran et al. 2014; Vieweg et al. 2010; Imran et al. 2015; Terpstra et al. 2012; Tsou et al. 2017) for curating, analyzing and summarizing crisis-related information in order to make some decisions\u2026", "The use of social media such as Twitter, Facebook, and Youtube, has been explored in numerous studies (Imran et al. 2014; Vieweg et al. 2010; Imran et al. 2015; Terpstra et al. 2012; Tsou et al. 2017) for curating, analyzing and summarizing crisis-related information in order to make some decisions and responses.", "\u2026humanitarian organizations in preparedness, response, and recovery of an emergency Pre-print involves solving multiple challenges including handling information overload, information classi\ufb01cation and determining its credibility, prioritizing certain types of information, etc. (Imran et al. 2015)."]} +{"13747866|36798251": ["Information shared on social media has a wide variety of applications (Imran et al. 2014; Ashktorab et al. 2014; Reuter et al. 2015; Poblet, Garc\u00b4\u0131a-Cuesta, and Casanovas 2014; Kishi et al. 2017; Laudy 2017; Meissen et al. 2017)."]} +{"14544742|13093354": []} +{"6793120|1143625": ["Other approaches focus instead on high-level aggregate characteristics of the messages shared, such as the overall number and frequency of those messages [21]."]} +{"11033867|1143625": ["Tweets sent during catastrophic events have been known to contain information that contributes to situational awareness [34], and a recent survey of studies for analyzing social media in disaster response can be found in [13]."]} +{"206592484|456491": []} diff --git a/edge/graph_58004724.jsonl b/edge/graph_58004724.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e251884c2fc85619881b6e03f472957a6a68e8d --- /dev/null +++ b/edge/graph_58004724.jsonl @@ -0,0 +1,16 @@ +{"11971675|36510460": ["The development of intelligent planning algorithms is one of the key issues when designing robotic architectures [20], [21].", "In [21] and [95] descriptions, applications and improvements of these algorithms are reviewed.", "The approach consists on randomly sampling the configuration space or state space, looking for connectivity inside it [21]."]} +{"11971675|1029120": []} +{"17203508|6972141": ["The development of autonomous vehicles is a topic of research relatively large and complex, allowing a large number of approaches that can be seen in several surveys as [6, 5, 14, 15]."]} +{"17203508|3731816": ["These services required the adoption of a Hybrid Control System Architecture for robotic applications [38], and also, a Distributed System and Service Oriented Architecture [43] allowing the communication among different modules and also among different agents."]} +{"15102801|1029120": ["Gandhi and Trivedi (2007) contains a survey of active and passive pedestrian protection systems."]} +{"15102801|191396": ["Reviews of clustering algorithms can be found in Jain et al. (1999) and Xu and Wunsch (2005)."]} +{"16213007|10355303": []} +{"17450578|1229096": ["in , is interactively used for computing each state, . During each planning cycle, the model starts with and 0 \u2044 , and it is run from t = 0 to . Figure 4: Bicycle kinematic model (figure adapted from [11]) B. Minimization Problem At a rate of 20 Hz, our model-predictive planner computes a trajectory, , that starts at the current car state, and finishes at a state, , whose pose and velocity, , is as cl"]} +{"16377896|15093118": ["Vision-based vehicle detection and tracking have been topics of great interest to researchers over the past decade [8] and a variety of PF-based tracking methods have been developed [9], [10], [11], [12], [13], [14], [15]."]} +{"8922428|206739910": ["No other dataset surveyed in [5] has a comparable size or number of classes.", "A recent survey of such methods and existing datasets is given in [5]."]} +{"700906|206739910": ["[17] provides detailed analysis on the most recent developments ."]} +{"7190174|7811809": ["The machine learning-based approaches train a model based on training samples, which requires large amount of data with large variation in order to obtain robustness."]} +{"7190174|206739910": ["Figure 1 shows an illustration of a road scene with some of the many TCDs.\nTCDs are especially important in complex settings such as intersections, where a lot of information must be com-\nManuscript received May 6, 2015; revised September 9, 2015 and November 26, 2015; accepted December 10, 2015;\u2026", "A recent paper on lane detection is [23], where a context aware framework for lane detection is introduced, this can significantly reduce the required computational demand by scaling the detection algorithm based of the state of the ego-vehicle and the road context."]} +{"3485350|6972141": ["In [45,46] the lane markings are detected by a camera and a computer vision algorithm.", "Now, in [48], image based localization scheme was presented based on Virtual Generalizing Random Access Memory (VG-RAM) [45]."]} +{"1229096|206764452": ["CONTENTS\nI Introduction 2"]} +{"1229096|8363289": []} diff --git a/edge/graph_58006497.jsonl b/edge/graph_58006497.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58006559.jsonl b/edge/graph_58006559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b664e507b3f344d65bb83f6930b9b1148edff2c1 --- /dev/null +++ b/edge/graph_58006559.jsonl @@ -0,0 +1,6 @@ +{"30403414|11972113": ["Agent-based modelling and simulation (ABMS) is now a fairly well-established technique for studying such complex systems [16] but it has only recently begun to be seriously adopted in Systems Biology e."]} +{"15640339|11972113": ["The motivation for our work comes primarily from the growing use of agent-based modelling and simulation in studying complex systems [25]."]} +{"51603874|14275189": []} +{"11557616|11972113": ["\u2013 Information theoretic interpretations (see [13] for a review), which formalise the fact that subsets of a system\u2019s states can be statistically significantly related to one another due to the system\u2019s internal dynamics."]} +{"1229065|11972113": []} +{"1417187|2798946": []} diff --git a/edge/graph_58006703.jsonl b/edge/graph_58006703.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58007100.jsonl b/edge/graph_58007100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf12040ba1469686558861d14f1398a150b3b75d --- /dev/null +++ b/edge/graph_58007100.jsonl @@ -0,0 +1,24 @@ +{"6480652|207330385": ["Transfer learning has been widely applied to activity recognition [8], incremental learning [9], and online learning [10], [11]."]} +{"3306376|2088679": ["Deep neural networks have been extensively used in medical image analysis and have outperformed the conventional methods for specific tasks such as segmentation, classification and detection [1]."]} +{"16409793|17574321": ["Similar to that of N, the matrix \u03a3 in (4) is constructed by having its diagonal blocks made up by the covariance matrices of the UBM.", "\u2026GMM supervector m i of an utterance [1] is modeled as m i = m 0 + Tw (1) Here, assuming C mixture components and an F dimensional feature space, m 0 is the CF \u00d7 1 speaker-independent supervector obtained by concatenating the mean vectors from the Universal Background Model (UBM) [20].", "The features used for training the 512-Gaussian UBMs were 57-dimensional MFCCs (including the first and second derivatives).", "The total variability model assumes that a speaker-and channel-dependent GMM supervector m i of an utterance [1] is modeled as m i = m 0 + Tw (1) Here, assuming C mixture components and an F dimensional feature space, m 0 is the CF \u00d7 1 speaker-independent supervector obtained by concatenating the mean vectors from the Universal Background Model (UBM) [20]."]} +{"15545776|3330313": ["Outlier Detection: The outlier detection task addressed here is to identify irregular samples in a validation data set based on a model data set that only contains regular samples (Sch\u0308olkopf et al., 2001; Tax and Duin, 2004; Hodge and Austin, 2004; Hido et al., 2008).", "\u2026= b\n\u2211 \u2113=1 \u03b1\u2113\u03d5\u2113(x), (1)\nwhere\u03b1 = (\u03b11,\u03b12, . . . ,\u03b1b)\u22a4 are parameters to be learned from data samples,\u22a4 denotes the transpose of a matrix or a vector, and{\u03d5\u2113(x)}b\u2113=1 are basis functions such that\n\u03d5\u2113(x)\u2265 0 for all x\u2208D and for\u2113 = 1,2, . . . ,b.\nNote thatb and{\u03d5\u2113(x)}b\u2113=1 could be dependent\u2026"]} +{"3654323|10092092": []} +{"3654323|2899523": [" sharply decreases in higher layers. Therefore, recent work has addressed this problem by deep DA, which combines deep learning and DA. There have been other surveys on TL and DA over the pastfewyears[67, 80,14,68, 109, 13]. Panetal. [67]categorizedTL underthreesubsettings,includinginductiveTL, transductiveTL,andunsupervisedTL,buttheyonlystudied homogeneous feature spaces. Shao et al. [80] categorized TL techniques into", "forth. In this section, we present different application examples using various visual deep DA methods. Because the information of commonly used datasets for evaluating the performance is provided in [109] in detail, we do not introduceit in this paper. 6.1. Image Classi\ufb01cation Because image classi\ufb01cation is a basic task of computervisionapplications,mostof the algorithmsmentioned above were originally", "e transfer. The surveywritten byPatel [68] onlyfocusedon DA, a subtopicof TL. [14] discussed 38 methods for heterogeneous TL that operate under various settings, requirements, and domains. Zhangetal. [109] werethe\ufb01rst to summarizeseveraltransferring criteria in detail from the concept level. These \ufb01ve surveys mentioned above only cover the methodologies on shallow TL or DA. The work presented by Csurka"]} +{"3654323|7559976": ["In one-step DA, the deep approaches can be summarized into three cases, which refers to [23] .", "[23] briefly analyzed the state-of-the-art shallow DA methods and categorized the deep DA methods into three subsettings based on training loss: classification loss, discrepancy loss and adver-", "hose from the survey papers by [18,23] to maintain consistency cross surveys."]} +{"18956419|1118130": ["There are also some studies that focused on social aspect more but most of them used different modalities in less crowded scenarios [7].", "With the recent advances in social signal processing, it is clear that speaking turns are a vital unit of social behaviour to analyse social relations between people [7]."]} +{"13917994|7559976": ["For a comprehensive overview on domain adaptation, please refer to Csurka\u2019s survey paper [11]."]} +{"13917994|3761015": ["In this section, we shall first define the domain adaptation problem [40, 49], and then formulate the proposed correspondence-and-mapping method for the unsupervised domain adaptation problem."]} +{"18635500|393948": []} +{"6781584|7559976": ["There has recently been a signi\ufb01cant amount of work on domain adaptation, particularly for computer vision [16], [17]."]} +{"6781584|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment [2].", "However, the complexity of unstructured realworld scenes has a tendency to confound these assumptions, and learning-based methods have emerged as a powerful complement [2], [3], [4], [5], [6].", "neural networks into the grasp selection process [2], [5], [4], [7]."]} +{"7559976|393948": ["As shown also in [13, 266], this suggests that deep neural networks learn more abstract and robust representations, encode category level information and remove, to a certain measure, the domain bias [65, 216, 51, 188]."]} +{"11555904|393948": ["source error and feature representations that overcome the domain difference [3], [14], [15]. While much research has been devoted to the question of how to supervised minimize the source error [16], [17], relatively little is known about objectives that ensure domaininvariant feature representations. In this contribution we focus on the latter question. In particular, we deal with the task of unsuper"]} +{"767957|2670121": ["[6] grouped existing transfer learning studies with respect to the modalities used: video sequences [34], wearable [11, 37] and ambient sensors [16]."]} +{"767957|1118130": ["We have chosen speech as the focus of our study since it is a vital unit of behaviour to analyse social behaviour between people at the conversation level [32]."]} +{"24936482|192934": ["This behavior is what is often referred to as the curse of dimensionality [5, 32, 51, 61]."]} +{"4406253|14303607": ["Frame-level methods to detect AU occurrence and facial expressions (e.g. happiness, sadness, fear) analyze individual frames [15, 23].", "On the other hand, this large variability of behaviors is one of the reasons for which common emotion recognition classi\ufb01ers usually drop their performance when tested with subjects not belonging to the training set [23, 15]."]} +{"8811996|18454590": ["Besides the Gaussian mixture model\u2013hidden Markov model (GMM\u2013HMM) architecture that dominates the acoustic modeling in speech recognition for many years, arti\ufb01cial neural networks have been historically used as an alternative model but with limited success [3] ."]} +{"312886|14171067": []} +{"52983907|393948": ["The proposed network learns a representation [1], in which for example gray matter patches acquired with a 1."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"745350|393948": []} diff --git a/edge/graph_58008340.jsonl b/edge/graph_58008340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2abb661160c688108abf660ce7c33d88242e7223 --- /dev/null +++ b/edge/graph_58008340.jsonl @@ -0,0 +1 @@ +{"7399363|15369615": []} diff --git a/edge/graph_5801277.jsonl b/edge/graph_5801277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d68e3c1ec1a72d3a340fa7e8d41a51e8df0c382 --- /dev/null +++ b/edge/graph_5801277.jsonl @@ -0,0 +1 @@ +{"9567855|15029070": []} diff --git a/edge/graph_58014109.jsonl b/edge/graph_58014109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53a2e963487fca5e77d80488bdb34835e57ae578 --- /dev/null +++ b/edge/graph_58014109.jsonl @@ -0,0 +1,23 @@ +{"15022158|15540889": []} +{"15022158|15247126": []} +{"11573280|7774517": ["Finally, it can detect malicious sensors and potential network attacks by adversaries, and further ensure the security of the wireless sensor networks [7].", "We refer the reader to a more comprehensive survey on anomaly detection schemes of wireless sensor networks [7]."]} +{"6969858|8364569": ["There is a wide spectrum of \ufb02ow based anomaly detection methods targeted to IP networks [11]."]} +{"25819713|1230643": ["Sensor networks can be used in a variety of applications, such as military sensing and tracking, environmental monitoring, patient monitoring and tracking, smart environments, disaster management, and so on [4], [5], [24]."]} +{"6824019|2294541": []} +{"6824019|1462862": []} +{"6824019|9240891": ["Some of them are based on online trust and reputation related systems (Jsang et al. 2007; Grandison and Sloman 2000; Artz and Gil 2007; Grabner-Kruter and Kaluscha 2003), others on trust and reputation in peer-to-peer systems (Koutrouli and Tsalgatidou 2006; Suryanarayana and Taylo 2004)."]} +{"27351356|20178897": ["Wireless communication such as Infrared, ZWave, Zigbee and INSTEON are also used in building automation[3-4]."]} +{"9411321|15540889": []} +{"9411321|15247126": []} +{"16588711|141053": ["\u2026sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc. Relevant to our work, we present an overview of network layer transport for networks similar\u2026"]} +{"16588711|205286988": ["Research in wireless sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc."]} +{"16588711|1236072": ["Research in wireless sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc."]} +{"16588711|1230643": ["Research in wireless sensor networks (WSN) is broad and extensive, covering application case studies [2], [27]energy efficient link-layer protocols [2], [22], routing protocols [1], [3], key establishment [6], [26], etc.", "The use of sensors in IoT research builds on research of the embedded and wireless sensing community [2] and more recent efforts in sensing using general purpose mobile devices [5]."]} +{"42629128|62453632": []} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} +{"15631846|5747564": ["Due to the sensitive information exchanged via the wide-area network [22], [6], the proactive demand participation scheme may be exposed to malicious cyber attacks."]} +{"15643070|7465328": ["In this paper, we synthesized the previous studies [22, 23, 31, 51, 70] and roughly classified these network attacks in WSNs by the following criteria: passive or active, internal or external, different protocol layer, stealthy or non-stealthy, cryptography or non-cryptography related."]} +{"15643070|6539555": ["\u2026many application areas such as tactical surveillance [32], camera and video surveillance [35, 61], body sensor networks for health monitoring [1, 2, 7-11], homeland security monitoring [12], intelligent transportation [5, 6] and smart building [33, 34, 38, 39], etc. Information and data\u2026"]} +{"15643070|1331167": ["As a rule, a more costly encryption can yield higher strength, but it also consumes more valuable resource such as energy, memory, etc. of the network [31].", "In this paper, we synthesized the previous studies [22, 23, 31, 51, 70] and roughly classified these network attacks in WSNs by the following criteria: passive or active, internal or external, different protocol layer, stealthy or non-stealthy, cryptography or non-cryptography related.", "It is responsible for signal detection, modulation, encoding, frequency selection and so on, and is hence the basis of network operations [31]."]} diff --git a/edge/graph_58014134.jsonl b/edge/graph_58014134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3006cd9aba6cf86a6fd8a0103161e829863ae16 --- /dev/null +++ b/edge/graph_58014134.jsonl @@ -0,0 +1,40 @@ +{"788282|10709221": ["In addition, the medical applications of MC in diagnosis and treatment are discussed in [5]."]} +{"51870214|6111895": ["MC has been studied from the perspective of communication which focused on the design of efficient receivers, modulation schemes, etc [2]."]} +{"49184331|6111895": ["Since we employ OOK signaling and NTx is assumed to be fixed, without loss of generality, we refer to the vector c\u0304 = [c\u0304s, c\u0304n]T (instead of [ps, c\u0304n]T ) as the CSI of the considered MC system in the remainder of this paper.", "The theorem demonstrates that, for optimal MS detection, we may first sort all elements of r in a decreasing manner to obtain a new vector denoted by r\u0303 = [r\u0303 [1], r\u0303[2], \u00b7 \u00b7 \u00b7 , r\u0303 [K ]]T , i.", "At the beginning of each symbol interval, the transmitter releases either NTX or zero molecules corresponding to the binary bits 1 and 0, respectively, i.e., the modulation format used is ON-OFF keying (OOK) [2].", ", the modulation format used is ON-OFF keying (OOK) [2]."]} +{"9192515|6111895": ["In recent years, molecular communication, which utilizes molecules as information carriers, has been considered a promising scheme for communication at nanoscale [1]."]} +{"43083581|9553820": []} +{"1985564|6111895": ["Recent breakthroughs in bio-nano technology have motivated molecular communicati on [1, 2] to be a biologically-inspired technique for nanonetw orks, where devices with functional components on the scale of 1\u2013 100 nanometers (i."]} +{"166994626|1230643": []} +{"5463512|6111895": ["2525538 ratio of the antenna size to the wavelength of the electromagnetic signal [1]\u2013[3]."]} +{"53447078|9770908": []} +{"53447078|10861421": []} +{"52967047|6111895": ["In this direction, the recent field of Molecular Communication (MC) has emerged from the communication engineering community to study information exchange at the nanoscale through the transmission, propagation, and reception of molecules [1,12]."]} +{"14980069|6111895": ["INTRODUCTION In molecular communication (MC), chemical signals are used to transfer information at various length scales from micro and nano meters to a few meters [1], [2].", "Information particles can be transported from the transmitter to the receiver using diffusion, active transport, bacteria, and flow (see [2] and the references therein)."]} +{"32036143|6111895": ["To embed information in these particles one may use the particle\u2019s type, concentration, or the time of release, as described in [2] and references therein."]} +{"52231213|6111895": ["The possibility of mimicking or even directly exploiting and reengineering these biochemical communication functionalities is opening the road for the development of systems that will further expand the Internet of Things concept to cover domains, the biological and nanoscale, where classical communication solutions show limitations [2], [14]."]} +{"4983376|15468128": ["\u2026of some linear block codes (e.g., BCH codes) [9], the Viterbi decoding of convolutional codes [9], the iterative decoding of Turbo codes [10], [11] and graph-based codes (e.g., low-density parity-check (LDPC) codes) [12], [13], and the Berlekamp-Massey algorithm [9] and the list decoding [14]\u2026", "When the number of 1\u2019s lies in the closed intervals [0 , 1] , [2 , 4] , [5 , 7] , [8 , 10] and [11 , 12] , the coded-modulation in effect will decode the information bits as \u201c00\u201d, \u201c01\u201d, \u201c10\u201d, \u201c11\u201d, and \u201c00\u201d, respectively."]} +{"8313235|6111895": ["PSfrag replacements\nPeak Filter [2]\nCIR Correlator Filter [6]\nSum Filter [6]\nProposed Matched Filter\nB E\nR\nNumber of Released Molecules, N tx\n103 104 105 106 10\u22124\n10\u22123\n10\u22122\n10\u22121\n100\nFig.", "Peak Filter [2] CIR Correlator Filter [6] Sum Filter [6] Proposed Matched Filter B E R", "4\nPSfrag replacements\nPeak Filter [2]\nCIR Correlator Filter [6]\nSum Filter [6]\nProposed Matched Filter\nT sym = 3\nT sym = 1.5\nS IN\nR (d\nB )\nNumber of Released Molecules, N tx\n103 104 105 106 \u221210\n\u22125\n0\n5\n10\n15\n20\nFig.", "We employ on-off keying (OOK) modulation where the transmitter releases zero or N tx molecules at the beginning of the k-th symbol interval to send symbol s[k] = 0 and s[k] = 1, respectively [2].", "Hence, assuming linear processing, the decision variable at the output of the linear filter, y[k], is obtained as y[k] = fr[k] = f (s[k]c\u0304s + n[k] + I[k]) , (4) where f = [f [1], f [2], .", "As benchmark schemes, we consider the sum filter, f = 1M , and the CIR correlator, f = c\u0304s, from [6], and a peak detector, which employs only one sample at T ref after the start of the symbol interval [2].", "Peak Filter [2] CIR Correlator Filter [6] Sum Filter [6] Proposed Matched Filter T sym = 3", "Motivated by this observation, diffusive MC has been recently considered as a bio-inspired approach for communication between small-scale nodes where conventional wireless communications may be inefficient or even infeasible [2].", "The reason for this behavior is that the first samples in each symbol interval experience the most severe ISI and since the matched filter exploits the statistics of the ISI via C\u0304i, it attempts to reduce the ISI by assigning negative values to f[1] and f[2]."]} +{"43543200|6111895": ["For example, molecular communication system can be used for analyzing and designing the drug delivery systems in the human body [6], [7]; the bionanosensor networks can be included in advanced materials to get new functionalities [3], [8]; macroscale molecular communication can be used as a tool for studying animal behaviors [1].", "Fourth, it is energy efficient and has low heat dispersion [1].", "INTRODUCTION B IONANOSENSOR networks are a promising research field, which attract the attentions of the researchers with the background of nanotechnology, biology and electrical engineering [1].", "It should be noted that the inverse Gaussian distribution is suitable for the molecular channel with a directional flow [1]."]} +{"52195627|6111895": ["[1]."]} +{"29171751|6111895": ["Molecular communications (MC) is a new communication paradigm in which nano-scale devices communicate with each other using chemical signaling, based on exchanging small information particles [2,3]."]} +{"12552872|6111895": ["We study a model for molecular timing channels where information is modulated through the time of release of information particles (see [14] for a detailed discussion regarding applications of molecular communications)."]} +{"65002299|12060835": ["EM EH includes collecting radio frequency (RF) signals emitted from base stations, network routers, smartphones, and any other sources by using large aperture power receiving antennae, and converting the attained waves into utilizable dc power [6], [7].", "Hence, energy harvesting (EH) methods come into prominence to alleviate the problems of energy-constrained wireless networks by exploiting a stray source or converting energy from one form to another [6], [7].", "Wind turbines, anemometers, and piezoelectric materials are being developed to attain energy from highly random and unpredictable motion variations driven by external factors [6], [7].", "\u2026can be broadly divided into four groups as: 1) light; 2) heat; 3) motion; and 4) electromagnetic (EM) radiation, in which availability, controllability, and predictability of these sources determine the models and speci\ufb01cations of the harvesting procedures that are going to be employed [6], [7].", "EH from light sources is a well-established method of power provisioning that gathers energy from ambient lights, either from sun or arti\ufb01cial light sources, with respect to a phenomena called photo-voltaic (PV) effect [6], [7]."]} +{"52144900|6111895": ["We can see from [8] that most demodulators assume digital computation.", "For a recent survey on molecular communication, see [8]."]} +{"9052915|6111895": ["thus no extra energy for propagation is needed [35].", "To prevent molecules from denaturation and to guarantee that molecules can arrive at the receiver within lifetime, in [35] it is proposed to encapsulate the information molecules inside liposomes [36], which act like a protective shield against the environmental influence.", "In addition the receptors have mechanisms that guarantees that each molecule is only detected once [35]."]} +{"6972709|6111895": ["We study a model for molecular timing channels where information is modulated through the time of release of information particles (see [19] for a detailed discussion regarding applications of molecular communications)."]} +{"29142197|3392135": []} +{"29142197|10709221": []} +{"3507984|3055684": ["This model is comparable with an Energy Harvesting (EH) system in the classical communications, in which the transmitter harvests energy and wishes to send its message such that its transmitted signal is amplitudeconstrained to the amount of harvested and stored energy at the transmitter [2]\u2013[7]."]} +{"3507984|6111895": ["We refer the reader to [1] and references therein for more details on molecule generation mechanisms such as modifying metabolic pathways of cells.", "In particular, we adopt the macro-scale mode of MC and the molecular Poisson model for our study (see [1], [9] and references therein for a review of different models and the related results)."]} +{"3595766|10709221": []} +{"8648545|6111895": [", concentration shift keying (CSK) is performed [2].", "CIR Estimation Problem Let s = [s[1], s[2], .", "r [L] = Poiss (c\u03041s[L]) + Poiss (c\u03042s[L \u2212 1]) + \u00b7 \u00b7 \u00b7 +Poiss (c\u0304Ls[1]) + Poiss (c\u0304n) (5a) r [L + 1] = Poiss (c\u03041s[L + 1]) + Poiss (c\u03042s[L]) + \u00b7 \u00b7 \u00b7 + Poiss (c\u0304Ls[2]) + Poiss (c\u0304n) (5b)"]} +{"6111895|6518885": ["In [11] a survey of molecular communication based on microtubules and physical contact was presented, and in [12] a very brief survey of microscale molecular communication was presented."]} +{"39665282|10709221": ["reviewed the challenges and prospects of molecular communication in nanomedicine, showing a variety of ideas for both diagnosis and treatment [74]."]} +{"3986782|6111895": []} +{"7743408|6111895": ["degradation, interaction, and to guarantee that molecules arrive at Rx within lifetime [23].", "Such can be regarded as a simplified form of ISI equalization, and can also be extended to non-binary transmission such as AM keying [23].", "Thus, molecules utilize thermal energy form the environment [23], i.", "transmitter emission noise and interference from other multiple transmitters [23]."]} +{"52008998|6111895": ["9We note that, in general, ISI is an important issue in MC [3].", "However, apart from the challenges that need to be overcome for realizing synthetic biological MC systems at nanoscale [3], there are also severe inherent limitations.", "To illustrate the principal benefits of using MNPs, we focus on the following basic MC model [3].", "and are capable of performing simple computation, sensing, or actuation tasks [3].", "However, it is noteworthy that MC research is still in its infancy and focused mostly on theoretical aspects with only a few experimental systems available at macroscale [3], [6]\u2013[8]."]} +{"43920326|6111895": []} +{"1613337|6111895": [", ON-OFF keying modulation is performed [2]1.", "Furthermore, we assume that molecules of types A and B have idential diffusion coefficients denoted by D [2]."]} +{"21707885|6111895": ["Various modulation techniques have been proposed so far for MC systems, see [2] for a comprehesive overview.", "2796612 Therefore, diffusive MC has been considered as a bio-inspired approach for communication between small-scale nodes for applications where conventional wireless communication may be inefficient or even infeasible [2], [6].", "\u2013 s = [1, 1, 0, 0, 0, 0]T, s\u2032 = [0, 1, 0, 0, 0, 1]T, and s\u2032\u2032 = [0, 0, 1, 1, 0, 0]T are example codewords of the CC code Scc ([4, 2]T) or equivalently the CW code Scw(6, 2).", "5, 1]T are example codewords of the CC code Scc ([3, 2, 1]T) or equivalently the CW code Scw(6, 2).", ", the design of codes that enable CSI-free detection, can be seen as a modulation design or a coded modulation design problem [2], [15], [16].", "IN CONTRAST to conventional wireless communication systems that encode data into electromagnetic waves, synthetic molecular communication (MC) systems are envisioned to embed data into the characteristics of signaling molecules such as their concentration, type, and time of release [2], [3].", "5, 1]T are example codewords of the balanced CC code Scc ([2, 2, 2]T) or equivalently the CW code Scw(6, 3).", "We employ CSK modulation where the transmitter releases s[k]N tx molecules at the beginning of the k-th symbol interval to convey symbol s[k] \u2208 S [2]."]} +{"4134702|10709221": ["MC [3], [13], [14]."]} +{"11791875|6111895": ["Particles can be transported from the transmitter to the receiver via diffusion, active transport, bacteria, and \ufb02ow, as described in [3, Sec.", "M OLECULAR communication (MC) is an emerging \ufb01eld in which nano-scale devices communicate with each other via chemical signaling, based on exchanging small information particles [2], [3]."]} diff --git a/edge/graph_58020292.jsonl b/edge/graph_58020292.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa551aa7e1549d34490717d1ecf6e5095b14afb6 --- /dev/null +++ b/edge/graph_58020292.jsonl @@ -0,0 +1,28 @@ +{"17427022|18353243": ["Approaches for anomaly detection exist in various domains, ranging from video analysis [1] to remote sensing [2]."]} +{"91574824|8575576": ["Visual inspection of tissue samples is currently the standard method to diagnose a considerable number of diseases and to grade/stage most types of cancer.[1,2] In recent years, various pathology departments have started a digitization of patient data and stored samples."]} +{"3248075|987239": ["In the past decades, researchers have made impressive progress on 3D object modeling and synthesis [Van Kaick et al., 2011, Tangelder and Veltkamp, 2008, Carlson, 1982], mostly based on meshes or skeletons.", "\u2026understanding and generation is an important problem in the graphics and vision community, and the relevant literature is very rich [Carlson, 1982, Tangelder and Veltkamp, 2008, Van Kaick et al., 2011, Blanz and Vetter, 1999, Kalogerakis et al., 2012, Chaudhuri et al., 2011, Xue et al., 2012, Kar\u2026"]} +{"52195012|46924129": ["Finally, a recent review of deep learning for physiological signals classification revealed that CNNs were the most popular architecture (Faust et al., 2018) for the considered task."]} +{"52195012|5934317": ["Given the aforementioned limitations, a relatively recent type of recurrent architecture was proposed for time series: Echo State Networks (ESNs) (Gallicchio and Micheli 2017).", "Given the aforementioned limitations, a relatively recent type of recurrent architecture was proposed for time series: Echo State Networks (ESNs) (Gallicchio and Micheli, 2017)."]} +{"52195012|207330385": ["More recently in Wang et al. (2018), the architectures proposed in Wang et al. (2017b) were modified to leverage a filter initialization technique based on the Daubechies 4 Wavelet values (Rowe and Abbott, 1995).", "Time series are encountered in many real-world applications ranging from electronic health records (Rajkomar et al., 2018) and human activity recognition (Nweke et al., 2018; Wang et al., 2018) to acoustic scene classification (Nwe et al., 2017) and cyber-security (Susto et al., 2018)."]} +{"52195012|15562587": ["\u2026benefit of deep learning models, which is the ability to handle the curse of dimensionality (Bellman, 2010; Keogh and Mueen, 2017) by leveraging different degrees of smoothness in compositional function (Poggio et al., 2017) as well as the parallel computations of the GPUs (Lu et al., 2015).", "The multivariate evaluation shows another benefit of deep learning models, which is the ability to handle the curse of dimensionality (Bellman 2010; Keogh and Mueen 2017) by leveraging different degrees of smoothness in compositional function (Poggio et al. 2017) as well as the parallel computations of the GPUs (Lu et al."]} +{"52195012|18599847": []} +{"51904604|393948": []} +{"52159572|10175374": ["In theory, sharing intermediate variables across different tasks during learning, in a procedure called multi-task learning 16 (see \u201cDeep learning supports highly flexible architectures\u201d), can elucidate intermediate variables that are more mechanistically relevant and increase the effective amount\u2026"]} +{"52159572|3761015": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"3923538|4361938": []} +{"26309781|3750204": ["The surge of large volumes of information to be processed by machine learning and data mining algorithms in the context of the big data era demand new transformative parallel and distributed computing solutions capable to scale computation effectively and efficiently.(1,2) Graphic processing units (GPUs) have become widespread tools for speeding up general purpose computation in the last decade."]} +{"26309781|15428874": ["Langdon 59 focused on the implementation of the genetic programming interpreter on a GPU."]} +{"30747077|3654323": ["We would like to caution that all deep learning methods are very sensitive to the input noise, thus networks trained on either noiseless or even on simulated, idealized, noise are likely to perform poorly in the inference regime on the real data without a complex and domain-dependent preparation for such task (Wang and Deng 2018)."]} +{"3397190|10137425": ["We also expect to see more research on multimodal learning [190] as, in the real world, language is often grounded on (or correlated with) other signals."]} +{"27304739|15305793": ["Although there has been an extensive development of detection and segmentation algorithms for medical ultrasound (US) images [3],[4],[5], it is still an open problem especially for regional anesthesia."]} +{"27304739|393948": ["Recently, the deep learning approach has emerged as a powerful approach to address many problems in machine learning and computer vision \ufb01elds [10],[11] [12], [13]."]} +{"27304739|14122909": ["Although there has been an extensive development of detection and segmentation algorithms for medical ultrasound (US) images [3],[4],[5], it is still an open problem especially for regional anesthesia."]} +{"126278178|393948": ["Inspired by the recent remarkable success of deep learning, which generally depends on learning hierarchical data representation with increasing level of abstraction (Krizhevsky et al., 2012; LeCun et al., 2015; Bengio et al., 2013).", "The performance of machine learning methods is heavily depend on data representation, also known as features (Bengio et al., 2013)."]} +{"3273340|1708582": ["y Recently, many of the grand AI challenges involving game play have been overcome using DNNs. These successes also required innovations in training techniques and many rely on reinforcement learning [30]. DNNs have surpassed human level accuracy in playing Atari [31] as well as Go [6], where an exhaustive search of all possibilities is not feasible due to the unimaginably huge number of possible move"]} diff --git a/edge/graph_580211.jsonl b/edge/graph_580211.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0763a7fc339266005d214ea4eac869fe7f6d0e7 --- /dev/null +++ b/edge/graph_580211.jsonl @@ -0,0 +1 @@ +{"61167697|33286487": []} diff --git a/edge/graph_58021113.jsonl b/edge/graph_58021113.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58021736.jsonl b/edge/graph_58021736.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74a4b2021e30cb5f91517a6bfb2d05dd5bcd869c --- /dev/null +++ b/edge/graph_58021736.jsonl @@ -0,0 +1,29 @@ +{"3832501|18047585": ["A comprehensive review on the challenges and solutions on the robotic manipulation of deformable objects is provided by Khalil and Payeur (2010)."]} +{"4106288|15231229": ["Collision detection strategies based on hierarchies of bounding volumes belong to the most popular ones, for their proven efficiency [44]."]} +{"35015991|4106288": ["In contrast, robotics researchers have explored manipulation of deformable objects extensively, with an emphasis on folding clothes [OSK07, BC10, VDBMGA11, CTSM \u2217 11, BPK11, MVDBF \u2217 12,Jim12].", "A more comprehensive review can be found in the survey written by Jim\u00e9nez [Jim12]."]} +{"972759|4019175": []} +{"972759|4106288": ["In [5], an overview of different techniques to model and control deformations is presented, and classified according to both the objects\u2019 shapes (planar, linear or volumetric), and the manipulation task."]} +{"10261495|18047585": ["Dexterous manipulation of deformable objects has recently been reviewed in [5], in which the discussion of the major challenges in this area was presented and a set of references which try to solve them was provided."]} +{"52121642|18047585": ["It also has various applications in the electric, garment and food industries as summarized in [2], and [4].", "However, most of the previous studies either assumed homogeneous physical properties and ignored the existence of any disturbances or considered some prior knowledge about the manipulation environment [2], [3].", "A complete literature review regarding 1-D and 2-D CO manipulation, mostly model-based approaches, can be found in [2].", "beams, cables, wires, tubes, ropes, and belts) and 2-D (fabric, sheet metal, and leather) objects for specific industrial applications [2], [4].", "D ESPITE a substantial body of research in autonomous uni-manual and bi-manual manipulation of rigid objects, manipulation of 3D Compliant Objects (COs) in unknown environments is still a challenging and open area of research [1], [2]."]} +{"5654459|18047585": ["Besides multi-robot navigation, manipulation of flexible objects by multiple fixed robots has also been explored [14], as well as motion planning for elastic objects within the context of medical applications [15]."]} +{"113868158|18047585": []} +{"2415120|18047585": []} +{"7320560|4106288": ["The joint error value of the physical model and camera data is constructed by combining the color error ec, the depth error ed (see [12] for more details) as well as a physical error er."]} +{"67093382|18047585": []} +{"28333315|18047585": []} +{"14527947|118142": ["Previous survey to quantify the grasp quality was developed and can be found in [14]-[15]-[16]-[17]-[18].", "Optimal force-closure grasp is based on selecting the contact point\u2019s locations and the loading direction [14]."]} +{"14527947|1919905": []} +{"12277563|4019175": ["The dual-arm configuration [4], with one arm for soldering and another assistive arm for deforming, is similar to the manual soldering operation with both hands and thus provides a solution to robotic soldering of flexible PCBs."]} +{"27647830|4019175": ["As robots are increasingly expected to replace manual labor, It is better to use anthropomorphic arm as it will be easier to replace human hand without major alteration in workspace [7]."]} +{"51874767|4106288": ["More recently, Jimenez (2012) presented a survey that focused on object modeling and on manipulation planning of deformable objects.", "These, and older works focusing on manipulation planning of deformable objects, have been covered in more depth in (Jimenez 2012).", "Previous surveys have covered topics such as manipulation of deformable objects in industrial applications (Henrich and W\u00f6rn, 2000; Saadat and Nan, 2002) or planning the manipulation of deformable objects (Jimenez, 2012).", "More recently, Jimenez (2012) presented a survey that focused on object modeling and on manipulation planning of deformable objects. Khalil and Payeur (2010) presented a very comprehensive survey, where most of the surveyed papers focus on modeling and simulation, and approaches that have been applied to industrial tasks such as assembly and food handling.", "Previous surveys have covered topics such as manipulation of deformable objects in industrial applications (Henrich and W\u00a8orn 2000; Saadat and Nan 2002), or planning the manipulation of deformable objects (Jimenez 2012).", "More recently, Jimenez (2012) presented a survey that focuses on object modeling and on manipulation planning of deformable objects.", "More recently, Jimenez (2012) presented a survey that focused on object modeling and on manipulation planning of deformable objects. Khalil and Payeur (2010) presented a very comprehensive survey, where most of the surveyed papers focus on modeling and simulation, and approaches that have been applied to industrial tasks such as assembly and food handling. However, following these surveys, the field of deformable object manipulation has seen significant contributions. Our survey focuses on recent advances in the robotics community to address the sensing and manipulation of deformable objects, particularly in domestic and industrial applications. We propose a new classification of deformable objects that not only considers their geometric shape (as has been previously suggested by Jimenez (2012) and Saadat and Nan (2002)), but also their physical properties.", "We propose a new classi\ufb01cation of deformable objects that not only considers their geometric shape (as it has been previously suggested in (Jimenez 2012; Saadat and Nan 2002)), but also their physical properties."]} +{"51874767|18047585": ["Khalil and Payeur (2010) present a very comprehensive survey, where most of the surveyed papers focus on modeling and simulation, and approaches that have been applied to industrial tasks such as assembly and food handling."]} +{"14219751|18047585": []} +{"117328910|4106288": []} +{"23174803|18047585": [", string, hair, metallic sheet, and textile), but there is little research about predicting the deformation of 3-D deformable objects [24]."]} +{"3007076|18047585": ["D deformable objects [2].", "The addition of visual data allows the extraction of relevant information over the entire visible surface of the object and enables the robot to strategically position the hand while adjusting the effort applied on the contact points to ensure the stability and the integrity of the object [2]."]} +{"532002|4106288": ["in manipulation of deformable objects, both elastic and inelastic [10], [11]."]} +{"532002|18047585": ["in manipulation of deformable objects, both elastic and inelastic [10], [11]."]} +{"71138401|18047585": []} +{"7715934|4019175": []} +{"67696371|18047585": []} +{"16720611|18047585": ["Some works use the information provided by a visual system to compare it with deformable object\u2019s models to validate the deformation (Khalil-Curtis, 2010).", "Most of this works use both visual and tactile data (Khalil, 2010) (Luo, 2001) (Bimbo, 2013)."]} diff --git a/edge/graph_58027819.jsonl b/edge/graph_58027819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..886d511ef9b49fbc30dc50cb949f3175ce2bd0a2 --- /dev/null +++ b/edge/graph_58027819.jsonl @@ -0,0 +1,32 @@ +{"64727807|10817088": []} +{"59600541|42497499": ["6 standard defines one MAC layer and that supports three PHY layers: narrowband (NB), human body communications (HBC) and ultra wideband (UWB) layers [8, 9]."]} +{"59600541|16084499": ["It is anticipated that wearable and implant sensors used in WBAN facilitates innovative way for human wellness and health condition monitoring [6]."]} +{"59600541|7988320": ["The transmission distance between devices cover only a short range of few meters [1-5].", "Firstly, power consumptions on implant and wearable sensors should be ultra-low to enhance network\u2019s life, as these devices are battery operated and battery replacement is a complex medical procedure for a certain conditions [1, 4]."]} +{"59600541|6539555": ["The transmission distance between devices cover only a short range of few meters [1-5]."]} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"53290527|15300368": ["The system parameters used for the simulation are summarized in Table 1 [11, 19, 22]."]} +{"15069384|7988320": ["The result shown that, the throughput of RS code was higher than LT code, when the error bits less than correctable bits."]} +{"15069384|7854020": ["The PPDU composes of three main components: the PLCP preamble, the PLCP header, and the PSDU."]} +{"7988320|6539555": []} +{"35741240|791261": []} +{"35741240|7505270": ["Ciuti et al.34 surveyed MEMS technologies developed by Italian research centers for human-centered applications, with applications including Parkinson\u2019s disease assessment, measurement of infant actions, management of remote patient-rehabilitation, and applications involving medical ultrasound.", "Ciuti et al.(34) surveyed MEMS technologies developed by Italian research centers for human-centered applications, with applications including Parkinson\u2019s disease assessment, measurement of infant actions, management of remote patient-rehabilitation, and applications involving medical ultrasound.", "Other authors have surveyed literature or developed prototypes using WBAN and complementary technology to more efficiently acquire ECG and other patient vitals, as well as integrate data with smart sensing systems, telemedicine hubs, and fourth-generation (4G) telecardiology.(5,12,33,34,38) Yilmaz et al.", "MEMS are mechanical and electromechanical elements developed through microfabrication techniques.(34) The physical dimensions of MEMS devices range from less than 1 \u03bcm to several millimeters, making them ideal for use as body sensors in conjunction with WBANs."]} +{"35741240|6127042": []} +{"35741240|11293874": []} +{"35741240|303976": ["Kartsakli et al.30 define mHealth as the use of mobile and wireless communication technologies to facilitate and improve healthcare and medical services.", "Kartsakli et al.(30) define mHealth as the use of mobile and wireless communication technologies to facilitate and improve healthcare and medical services."]} +{"35741240|8928686": ["Pannurat et al.47 define \u201cfall\u201d as \u201can event which results in a person coming to rest inadvertently on the ground or other lower level.\u201d", "Pannurat et al.(47) define \u201cfall\u201d as \u201can event which results in a person coming to rest inadvertently on the ground or other lower level."]} +{"35741240|10817088": ["Ambient intelligence is the paradigm of empowering people\u2019s capabilities by means of digital environments that are sensitive, adaptive, and responsive to human needs, habits, gestures, and emotions.(32) Acampora et al.", "Ambient intelligence is the paradigm of empowering people\u2019s capabilities by means of digital environments that are sensitive, adaptive, and responsive to human needs, habits, gestures, and emotions.32 Acampora et al.32 surveyed the emergence of ambient intelligence in the healthcare domain, along with the technology required to achieve this goal.", "Acampora et al.(32) cited increasing adoption in various sensors, including accelerometers, CO 2 gas sensors, and ECGs.", "Acampora et al.32 cited increasing adoption in various sensors, including accelerometers, CO\n2 gas sensors, and ECGs.", "Acampora et al.(32) surveyed the emergence of ambient intelligence in the healthcare domain, along with the technology required to achieve this goal."]} +{"35741240|10206347": []} +{"35741240|16214623": []} +{"35741240|30383344": []} +{"35741240|6332923": ["When transmitted through a wireless channel such as WBANs linked to external networks, such data are susceptible to eavesdropping, identity threats, medical information misuse, medical fraud, and leakage.(67) In addition to implementing advanced technological solutions to mitigate this scenario, it becomes critical to have strict laws and regulations to safeguard patient privacy in this context.", "Worse yet, the attacker could masquerade the vulnerable node as the body coordinator, sending false messages to remote healthcare monitoring sites to the extent that the larger network becomes susceptible to denial-of-service attacks.(67) To effectively address these challenges, Al Ameen et al.", "For instance, in a Sybil attack, the compromised node assumes multiple identities when presenting itself to is neighbors, thereby collecting more data than it would otherwise.(67) These data then could be manipulated prior to transit with an intent to \u00a9 Copyright AAMI 2016."]} +{"35741240|2220294": ["Other authors have surveyed literature or developed prototypes using WBAN and complementary technology to more efficiently acquire ECG and other patient vitals, as well as integrate data with smart sensing systems, telemedicine hubs, and fourth-generation (4G) telecardiology.(5,12,33,34,38) Yilmaz et al."]} +{"2076754|7988320": ["Three PHY layer options are de\ufb01ned for WBANs in [11]: a narrowband; ultra-wideband; and human body communications (HBC).", "The purpose of the CRA margin is to take care that there will not be unnecessary code rate changes due to channel \ufb02uctuations because the fact is that in WBANs, the channel condition can change rapidly due to human body movements.", "munication is very important in wireless sensor networks [3,4,7] and the same applies to WBANs [23] which use sim-", ", in the field of sports, healthcare, entertainment and military [23].", "In this work, the IR-UWB with OOK modulation and ED receiver will be studied because it enables low cost and low power implementations [23].", "Energy ef\ufb01ciency of the wireless communication is very important in wireless sensor networks [3,4,7] and the same applies to WBANs [23] which use similar type low-power nodes with radio transceivers."]} +{"42497499|7988320": []} +{"42497499|7854020": ["We analysed the performance of an IEEE 802.15.6-based CSMA/CA for NB PHYs in terms of the theoretical throughput, delay and bandwidth efficiency, as presented in Table 2 [19\u201321]."]} +{"42497499|16514036": []} +{"24527984|10817088": []} +{"24527984|16514036": []} diff --git a/edge/graph_5803350.jsonl b/edge/graph_5803350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5806353.jsonl b/edge/graph_5806353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15e7eaf88410cf424fb7bc7bc6ce06e976dd18b1 --- /dev/null +++ b/edge/graph_5806353.jsonl @@ -0,0 +1,3 @@ +{"7876794|13932708": ["Reverting to the main theme of this paper, the concept of transshipment appears in the work of [21, 22, 23] but has not yet been formally integrated within the context of inventory-routing."]} +{"14045981|16467945": ["Puchinger and Raidl [23] for a survey of hybrid methods and De Franceschi et al."]} +{"17294232|5806353": ["A survey is presented by Ball [8] for combinatorial optimization problems in general while, more recently, in [6] a survey focused on routing problems can be found."]} diff --git a/edge/graph_5807554.jsonl b/edge/graph_5807554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f243aa9740e786e97b2155143c85973fe71690e --- /dev/null +++ b/edge/graph_5807554.jsonl @@ -0,0 +1,6 @@ +{"2904170|1634674": ["There is a rich history of activity recognition in the vision community; we refer the reader to the recent surveys of [11, 40] for a detailed summary."]} +{"33060600|4361938": []} +{"33060600|62198990": []} +{"378809|1634674": ["Action and activity recognition have been the subject of a vast amount of research in computer vision literature [22, 32].", "Understanding human activities from video is a fundamental problem in computer vision which has spawned a rich literature [22, 32]."]} +{"2230619|7185733": ["Vision-based hand gesture recognition [ 2 ], enabling computers to understand hand gestures as humans do, is an important", "Therefore, visual analysis of hand gestures has attracted much attention in the last decade, and much progress has been made [ 2 ]."]} +{"6566960|7185733": ["Inside-out activity recognition, in particular the visual interpretation of everyday manipulation tasks using head-\nmounted gaze directed cameras, is an essential tool for understanding vision-guided action."]} diff --git a/edge/graph_58098281.jsonl b/edge/graph_58098281.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5810468.jsonl b/edge/graph_5810468.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78ddc72ffb34c52bc3998ad61b52768517714ac8 --- /dev/null +++ b/edge/graph_5810468.jsonl @@ -0,0 +1,3 @@ +{"14944096|8953108": ["Other commonly used tradeoffs include likelihood versus prior in Bayesian methods [1], loss versus penalty in pattern recognition [47] and image thresholding algorithms [39]."]} +{"21372336|8520489": ["Christensen [Chr03] has written an overview for using importance in speeding up rendering."]} +{"12387071|2593345": []} diff --git a/edge/graph_58126212.jsonl b/edge/graph_58126212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cfe86f498d09baf3d150d6f438882961722a372a --- /dev/null +++ b/edge/graph_58126212.jsonl @@ -0,0 +1 @@ +{"14074696|1708582": ["The process is then iterated."]} diff --git a/edge/graph_58187287.jsonl b/edge/graph_58187287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7178954b1f990e53f80ce9d29b3134921db4ef3a --- /dev/null +++ b/edge/graph_58187287.jsonl @@ -0,0 +1 @@ +{"56778588|544688": []} diff --git a/edge/graph_5818865.jsonl b/edge/graph_5818865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5822166.jsonl b/edge/graph_5822166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58251776.jsonl b/edge/graph_58251776.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe6a626e7adbbb01e2ed764de7ed624d8ab0a8af --- /dev/null +++ b/edge/graph_58251776.jsonl @@ -0,0 +1,6 @@ +{"14104542|11608263": ["Specifically we can treat KPI selection as a multi-label classification problem [15] where the most relevant n KPIs for a given instance are labels."]} +{"44169693|954543": []} +{"16691767|18986679": []} +{"10198239|954543": ["(v) Regression: Regression is a kind of statistical estimation technique used to map each data object to a real value provide prediction value (Carrier & Povel, 2003; Mitra et al., 2002).", "In addition, Ahmed, 2004; Carrier and Povel, 2003; Mitra et al., 2002; Shaw et al., 2001 described the types of data mining model as Association, Classification, Clustering, Forecasting, Regression, Sequence Discovery and Visualization.", "It aims at building a model to predict future customer behaviours through classifying database records into a number of predefined classes based on certain criteria (Ahmed, 2004; Berson et al., 2000; Chen, Hsu, & Chou, 2003; Mitra et al., 2002).", "(iii) Clustering: Clustering is the task of segmenting a heterogeneous population into a number of more homogenous clusters (Ahmed, 2004; Berry & Linoff, 2004; Carrier & Povel, 2003; Mitra et al., 2002).", "(i) Association: Association aims to establishing relationships between items which exist together in a given record (Ahmed, 2004; Jiao, Zhang, & Helander, 2006; Mitra et al., 2002).", "Its goal is to model the states of the process generating the sequence or to extract and report deviation and trends over time (Mitra et al., 2002).", "(vi) Sequence discovery: Sequence discovery is the identification of associations or patterns over time (Berson et al., 2000; Carrier & Povel, 2003; Mitra et al., 2002)."]} +{"52877381|3330313": []} +{"16608208|18986679": [", [11-17])."]} diff --git a/edge/graph_58260549.jsonl b/edge/graph_58260549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58263753.jsonl b/edge/graph_58263753.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2df8fe32fededc47d60e440188b63098103a31a7 --- /dev/null +++ b/edge/graph_58263753.jsonl @@ -0,0 +1,2 @@ +{"1924791|14561706": []} +{"1924791|206051485": ["Similarly, a \u201csuper\u2013resolution\u201d algorithm [151], used in digital image processing to enhance the resolution of images, can be adopted to improve on the tactile sensing resolution, in case of insufficient resolution from the available tactile sensor hardware."]} diff --git a/edge/graph_58291196.jsonl b/edge/graph_58291196.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7259d93c93c658b22947689db17b31bb32893ced --- /dev/null +++ b/edge/graph_58291196.jsonl @@ -0,0 +1,32 @@ +{"56163149|16866891": ["\u2026of natural selection for modelling stochastic systems (Whitley, 2001) and approaches such as genetic algorithms, genetic programming and swarm intelligence optimisation algorithms (Dreier, 2002) (Poi, 2008) (Parpinelli, 2011) can be used for optimising complex real-world systems and processes."]} +{"1272814|16052126": ["MapReduce [47] is based on Hadoop, which is a type of distributed parallel programming model developed by Google Inc.", "Big data is usually composed of datasets with sizes beyond the ability of commonly used software tools, which are unable to capture, curate, manage, or process such data within a reasonable elapsed time [47]."]} +{"1272814|8281388": ["[39] applied the MapReduce framework to bioinformatics and used it to conduct next-generation sequencing."]} +{"1272814|39297241": []} +{"26695461|1097238": ["A recent review on diversity creation techniques can be found in Brown et al. (2005)."]} +{"12417736|12957829": ["According to the classification on hybrid DE and PSO [54], CSM-DE-PSO is the"]} +{"3269862|18188725": []} +{"3269862|393948": []} +{"4470905|14258620": []} +{"4470905|393948": ["After the unsupervised initialization, the entire network is trained by back propagation, and all the layers are hard coded together [38].", "SELM were later improved to cope with problems intractable by shallow architectures [38] by proposing various Deep ELM (DELM) built upon a deep architecture [36,39], so to make possible to extract features by a multilayer feature representation framework."]} +{"15832447|31044354": ["attractive and switchings that occur correspond to the crossings of the manifolds [21]."]} +{"15832447|9005398": ["An earlier survey [35] already outlined some of the major developments.", "It is recognized that NNs and EC are processes that enable learning and optimization while the fuzzy systems are a representation tool [35]."]} +{"15832447|1876323": [", the eigenvalue assignment approach [2], the Fillipov approach [5], etc.", "Since its inception in late 1950s, a huge body of research has been devoted to SMC, as depicted by, for example, the papers such as [2] and [5] which surveyed the historic trends of research in this field in different periods."]} +{"7723009|14203403": ["FRFT [28], [29] is only a signal processing method which is used to convert a time-domain signal into the frequency-"]} +{"49650530|393948": []} +{"3634179|207060556": []} +{"65375395|22352825": []} +{"65375395|6736412": []} +{"65375395|3126100": []} +{"65375395|10213552": []} +{"65375395|5544758": []} +{"65375395|2398835": []} +{"882974|5871627": [", SVM, na\u0131\u0308ve Bayes, Decision Tree, Logistic Regression) [4], [6], [7], [8], [9], [5]."]} +{"882974|8310135": ["Text classification has been around for several years in medical and health informatics [1], [2], [3], [4], [5], and one of the most commonly used solutions for this type of problem has been supervised machine learning approach which is defined by identification of categories of new text data records, based"]} +{"41817831|7158350": []} +{"14258620|9928823": []} +{"14258620|393948": ["Representation learning) has emerged as new area of ML research [43\u201345] that exploits multiple layers of information-processing in a hierarchical architecture for pattern classification and or representation learning (e."]} +{"14258620|2746910": ["Recent data-modeling research has shown that ensemble methods have gained much popularity as they often perform better than individual models [28][29]."]} +{"16767807|4474193": []} +{"16767807|15273230": []} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"819257|1400872": []} diff --git a/edge/graph_582949.jsonl b/edge/graph_582949.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58311097.jsonl b/edge/graph_58311097.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58313800.jsonl b/edge/graph_58313800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5833810.jsonl b/edge/graph_5833810.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5835346.jsonl b/edge/graph_5835346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..970cd3c0b0768fb0aa5b0042e4f83a619506d19f --- /dev/null +++ b/edge/graph_5835346.jsonl @@ -0,0 +1 @@ +{"1632078|192934": ["In particular this holds if the feature spaces are different, but also combinations of classifiers trained in the same feature space by the same training set may show improved results [5,12]."]} diff --git a/edge/graph_5835640.jsonl b/edge/graph_5835640.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45a6c3867e4a786d48e9a18fc39be44df2ca6186 --- /dev/null +++ b/edge/graph_5835640.jsonl @@ -0,0 +1,21 @@ +{"14888968|9431428": ["Na\u00efve Bayes\u2014", "Na\u00efve Bayes produced comparable results to AdaBoost, when a large number of components were considered.", "In our observations, high performance with few features was achieved with both AdaBoost and Na\u00efve Bayes.", "In all but one of the classifiers, the number of components needed to achieve specified classification accuracy would be reduced using the rise time criterion, as illustrated for AdaBoost and Na\u00efve Bayes (Fig.", "Na\u00efve Bayes produced correct classification rates comparable to AdaBoost, but required more ICs to achieve this accuracy, and had several classification rates below 80%.", "Classification accuracy was assessed as the percentage of data instances that were labeled correctly after repeating this process ten times (Pereira et al., 2009).", "Maximum a posteriori thresholding P(C i |x) was then applied: As individual features are assumed to be statistically independent in the IC computation, we extend this to assume independent conditional probabilities, as is the case in the Na\u00efve Bayes classifier, computed for each (j = 1, \u2026N) IC time course: Support vector classifier\u2014 Support vector machine (SVM) (Vapnik, 2000; Burges, 1998) were assessed for their belief/disbelief discrimination capability, since SVM algorithms are computationally stable, generalize well, and have been applied successfully to microarray (Golub et al., 1999) and fMRI (LaConte et al., 2005) data.", "Neural networks (Hanson et al., 2004), Na\u00efve Bayes (Pereira et al., 2009), and support vector machine classifiers (LaConte et al., 2005) each have yielded varying levels of predictive capability.", "We applied Na\u00efve Bayes' classification to our belief, disbelief discrimination task as follows."]} +{"25460451|9431428": ["\u2026neuroimaging-based biomarkers to differentiate patients\nfrom healthy controls at the individual subject level and potentially\ndetect exciting spatially distributed information to further highlight\nthe neural mechanisms underlying the behavioural symptoms of\nmajor depression (Pereira et al., 2009).", "The abnormal resting-state functional connectivity patterns in depression are principally represented by the highly discriminating functional connections, and initially reducing the number of features accelerates computation and diminishes noise (Pereira et al., 2009; Dosenbach et al., 2010; Shen et al., 2010).", "\u2026resting-state functional connectivity patterns in depression are principally represented by the highly discriminating functional connections, and initially reducing the number of features accelerates computation and diminishes noise (Pereira et al., 2009; Dosenbach et al., 2010; Shen et al., 2010)."]} +{"15574914|9431428": ["A detailed description of these algorithms is available elsewhere (Pereira et al., 2009; Smola and Sch\u00f6lkopf, 2004; Sch\u00f6lkopf and Smola, 2002).", "Here we use novel analysis methods based on machine learning algorithms that can examine imaging datasets in new ways (Pereira et al., 2009)."]} +{"18364228|11894197": []} +{"29035966|7761990": []} +{"2189262|7761990": ["A two-sample t -test is used to test for group differences in the task modulation (Calhoun et al., 2009b).", "Two of the more widely used methods include seed-based approaches (Greicius et al., 2004) and investigations based on independent component analysis (ICA; Calhoun et al., 2004, 2009a).", "\u2026given the many studies showing important cognitive processes which appear to be localized to these networks such as prediction of errors (Eichele et al., 2008) and studies showing dysfunction in INs in various mental illness (Greicius et al., 2004; Calhoun et al., 2008b, 2009a; Broyd et al., 2009)."]} +{"207180194|9431428": ["This problem can be addressed with a generative approach, which typically requires more parameters to be determined leading to reduced performances in high dimension.", "In cognitive neurosciences, such methods can process fMRI intra-subject scans to decode subject\u2019s mental states (Thirion et al. (2006); Pereira et al. (2009))."]} +{"13424477|192934": []} +{"20859544|9431428": ["Multivariate pattern recognition (MPR) methods are rapidly becoming a popular tool for analyzing fMRI data (Cox and Savoy, 2003; De Martino et al., 2008; Haynes et al., 2007; Kriegeskorte et al., 2006; Mourao-Miranda et al., 2005; Pereira et al., 2009)."]} +{"1522722|9431428": []} +{"9552167|9431428": []} +{"42248383|9431428": []} +{"10301598|9431428": ["More recently, these mass univariate analyses have been complemented by the use of multivariate pattern analyses (MVPA), in particular using machine learning based predictive models (Pereira et al. 2009).", "\u2026a brief overview of pattern recognition analysis and introduce some basic concepts that will be used in the next sections, however a more complete introduction to machine learning classifiers in the context of neuroimaging can be found elsewhere (e.g. Pereira et al. 2009 and Lemm et al. 2010)."]} +{"21221784|9431428": []} +{"15220943|9431428": []} +{"15330193|9431428": ["In the neuroimaging literature, permutation testing is often used to assess significance of classification accuracy [72-74].", "Very often non-linear classifiers in high dimensional problems do not produce improvements while being at the same time more difficult to interpret because the linear classifiers generate weights for each predictor that can be used as a measure of their importance within the estimated model [72, 75]."]} +{"2125207|9431428": []} +{"2125207|7761990": ["\u2026(which captures brain function presumably reflecting both genetic and environmental influences) with genetic information, is potentially a useful way to help classify schizophrenia (Hariri and Weinberger, 2003; Pearlson and Folley, 2008; Calhoun et al., 2009; Liu et al., 2009; Potkin et al., 2009)."]} +{"6733322|9431428": ["The linear SVM has been shown to deal well with large feature sets, and is consistently one of the best performing methods in imaging comparison studies (Laconte et al., 2005; Mour\u00e3o Miranda et al., 2005; Pereira et al., 2009).", "\u2026analysis\u201d (MVPA) refers to a variety of methods that use multivariate techniques to reveal subtle but reliable relationships between spatially distributed patterns of brain activity and cognitive states or external variables (Haynes and Rees, 2006; Norman et al., 2006; Pereira et al., 2009)."]} +{"7328589|9431428": ["Several studies have suggested that correctly reducing the number of features can not only speed up computation but also improve the performance of the classifier (De Martino et al., 2008; Pereira et al., 2009).", "Further, a leave-one out cross-validationwas used to evaluate the generalization of our method for new individuals, which reduced the artifact of over-training (Pereira et al., 2009)."]} +{"6811906|9431428": ["Permutation testing can be used to determine whether the classifi cation accuracy is statistically signifi cant (signifi cantly better than chance) (e.g., see Golland and Fischl, 2003; Pereira et al., 2009).", "Several excellent reviews have discussed the application of multivariate pattern classifi cation to fMRI data, with a focus on decoding of subjective states (Haynes and Rees, 2006; O\u2019Toole et al., 2007; Pereira et al., 2009).", "This suggests that analysis techniques designed to learn distributed spatial patterns that best distinguish one condition from another (Kriegeskorte et al., 2006; De Martino et al., 2008; Pereira et al., 2009) may be more sensitive than univariate techniques.", "Permutation testing can be used to determine whether the classifi - cation accuracy is statistically signifi cant (signifi cantly better than chance) (e.g., see Golland and Fischl, 2003; Pereira et al., 2009).", "LR and SVM are reported to have comparable performance (Pereira et al., 2009), though SVMs can more effi ciently handle high-dimensional feature spaces (Vapnik, 1996)."]} diff --git a/edge/graph_5835695.jsonl b/edge/graph_5835695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84f015dfb218501ee857537805c4e7a66488d6e4 --- /dev/null +++ b/edge/graph_5835695.jsonl @@ -0,0 +1,4 @@ +{"10990988|6972141": ["Specially, incorporating machine vision in mobile robots can improve their navigation capabilities [2]."]} +{"315947|53680608": ["In tracking research, the type of motion allowed is often constrained [1]."]} +{"9565283|16169670": ["Within these methods self-calibration systems have been proposed [4]."]} +{"8163601|6972141": ["INTRODUCTION Visual control or visual servoing is an extensive field of research, and two interesting surveys on this topic are [14] and [9]."]} diff --git a/edge/graph_5837884.jsonl b/edge/graph_5837884.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58387666.jsonl b/edge/graph_58387666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c87e0e630b308f71a2ca9cb8e64ca6598c1deaf --- /dev/null +++ b/edge/graph_58387666.jsonl @@ -0,0 +1 @@ +{"22509476|58387666": []} diff --git a/edge/graph_58403225.jsonl b/edge/graph_58403225.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58448375.jsonl b/edge/graph_58448375.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58454153.jsonl b/edge/graph_58454153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4bb67d378112b197173af9008ecefd015dc9c27 --- /dev/null +++ b/edge/graph_58454153.jsonl @@ -0,0 +1 @@ +{"14711107|8124666": []} diff --git a/edge/graph_5846177.jsonl b/edge/graph_5846177.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9f28a6fb13b24c4a641bad7a129260b05247e30 --- /dev/null +++ b/edge/graph_5846177.jsonl @@ -0,0 +1,13 @@ +{"3045491|4796356": ["Controllers are synthesized for two numerical examples, and the performance of the algorithm on the di erential, di erence and shift operator versions of the problems is compared.", "In addition, the fundamental problem of determining the existence or uniqueness of stabilizing controllers of a given order or structure is still open (Syrmos et al. 1997)."]} +{"1652546|4796356": ["A comprehensive survey on static output feedback is given in (Syrmos et al. [11])."]} +{"9681791|4796356": ["Referring the reader to [21] for a survey through the relatively old literature, we cite below only some selected recent works that are relevant for our discussion."]} +{"117354510|6336539": ["stability conditions into new conditions that can be numerically tested [6,11,13].", "The interest of SOS polynomials is that the problem of testing if a polynomial is SOS can be recast as an LMI problem [10,11,14,15].", "In the case where q.x, \u2022/, h.x, \u2022/ are scalar functions and there are no uncertain parameters, an important result known as the Artin\u2019s Theorem [11, 33] can be used.", "See for instance [11] for more details and references.", "x, \u2022/ are scalar functions and there are no uncertain parameters, an important result known as the Artin\u2019s Theorem [11, 33] can be used.", "Finally, it should be noted that the S -Procedure is largely used in SOS polynomial methods [11].", "See for instance [11] for details and references and how the problem of checking the condition x0P."]} +{"34023094|4796356": ["One of the most challenging open problems in control theory is the synthesis of static output-feedback (sof) controllers that meet desired performances and/or robustness specifications [31]."]} +{"775552|4796356": ["One of the most challenging open problems in control theory is the synthesis of fixed-order or static output-feedback (SOF) controllers that meet desired performances and robustness specifications [3], [31]."]} +{"120249537|4796356": []} +{"2537995|6336539": ["\u2026consists of formulating the stability conditions algebraically (e.g., via the Routh-Hurwitz stability criterion or its symmetric version by Hermite) and using converging hierarchies of LMI relaxations to solve the resulting nonconvex polynomial optimization problem, see, e.g., [10] [8]."]} +{"7630367|4796356": []} +{"205769577|4796356": []} +{"43524564|4796356": []} +{"19777026|4796356": []} +{"36569261|4796356": ["Given a Linear Time-Invariant, (LTI), system, the problem of finding a stabilising static output feedback is still open, [19]."]} diff --git a/edge/graph_5847318.jsonl b/edge/graph_5847318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..558a46171190e2142b8c431bed22d61f217a06b9 --- /dev/null +++ b/edge/graph_5847318.jsonl @@ -0,0 +1 @@ +{"11252699|11990480": ["These methods are very well described in [32]."]} diff --git a/edge/graph_58501030.jsonl b/edge/graph_58501030.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5852989.jsonl b/edge/graph_5852989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0771bdea94a248dfb31189e234610c6ee335e8c2 --- /dev/null +++ b/edge/graph_5852989.jsonl @@ -0,0 +1,2 @@ +{"15841397|14441987": ["Route construction should be done with a minimum of overhead and bandwidth consumption [1]."]} +{"15841397|1762301": ["Ad hoc Routing Protocols Various Ad Hoc routing protocols have been previously studied and their performance has been compared [4]."]} diff --git a/edge/graph_585363.jsonl b/edge/graph_585363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58546696.jsonl b/edge/graph_58546696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..992bd1d1ea953b45fbf68c661b663304a336776a --- /dev/null +++ b/edge/graph_58546696.jsonl @@ -0,0 +1,11 @@ +{"24083957|1029120": ["The most important sensorbased non-cooperative VRU safety systems have been categorized and surveyed in [11]."]} +{"49557767|206764452": []} +{"49557767|1029120": ["Active systems are provided in two forms: cooperative systems [5]\u2013[16] and non-cooperative systems [17]\u2013[28]."]} +{"9365262|1029120": ["Automakers have developed camera, RADAR, infrared, and LIDAR based sensors to detect pedestrians in a vehicle\u2019s path [13]."]} +{"8032163|2335874": []} +{"8032163|206764452": ["Results show that road-safety system imposes a small mean overhead on smartphone battery\u2018s state-of-charge."]} +{"8032163|1029120": ["However, constant pedestrian-to-cloud (P2C) beaconing can quickly drain smartphone battery and make the system impractical.", "This paper seeks developing such wireless-based vehicle-to-pedestrian (V2P) collision avoidance using energyefficient methods and non-dedicated existing technologies namely smartphones (widespread among pedestrians and drivers), cellular network and cloud."]} +{"36856032|1029120": ["An overview over the use of these technologies is given in Gandhi and Trivedi (2007)."]} +{"9647051|1029120": ["Solutions based on vehicle embedded sensors (e.g. camera, laser, and radar) and computer vision technologies have been proposed [3], [8].", "Much attention has been put in detecting pedestrians and predicting the possibility of collisions using sensors and computer vision techniques [3].", "An important lesson provided by [5] and [6] is that without denying the possibilities of using both the systems in a combined way, Wi-Fi seems to be the primary choice especially for low-latency direct V2P communications."]} +{"117529|206764452": ["need for new methods in order to tackle more complex cases such as pedestrians not visible from the vehicles [4], [5], i.", "[4] highlight that the number of false alarms is still too high in the current sensor based pedestrian detection systems to allow their deployment in commercial vehicles and propose to explore multi-class classification, 3D sensing, multi-model training as well as pedestrian tracking to improve their reliability.", "On the other hand, video cameras are natural sensors to recognize VRUs surrounding a vehicle both in illuminated scenes [4], [16]\u2013[18] and night conditions [19], [20], but are weak to estimate precisely the relative position of a detected obstacle."]} +{"117529|1029120": ["In 2007, Gandhi and Trivedi [3] proposed a large review of perception based systems for protection of VRUs.", "Relying on embedded sensors data has been a first solution at very close range and low speed [3] to ensure the safety of VRUs who are visible from the vehicles, i.", "2) Classification: Classification with the perception system is done by comparing models of road obstacles to features extracted from the sensors data [3]."]} diff --git a/edge/graph_58549028.jsonl b/edge/graph_58549028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ebcf08b443fa7754de8bc3871c8ac126c9764a0 --- /dev/null +++ b/edge/graph_58549028.jsonl @@ -0,0 +1,46 @@ +{"16794242|4122595": ["Several SS techniques such as Energy Detection (ED), matched filter based detection, autocorrelation based detection, cyclostationary feature detection, and eigenvalue based detection have been studied in the literature [2]\u2013[4]."]} +{"52196738|2509135": ["Thus, CR based communication systems are proposed to enable efficient utilization of available spectrum by using dynamic spectrum allocation [1], [2].", "In order to detect the PU\u2019s signal, the binary hypothesis detection model [2] can be cast as:"]} +{"7525856|4122595": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"7525856|15116409": ["lenges involved in building sampling hardware that operate s at a sufficiently high rate [104].", "cause unnecessarily high acquisition costs [104]."]} +{"7525856|8974063": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"7525856|2509135": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"18565081|31973880": ["The authors in [28] provided a survey on compressive sensing techniques for cognitive radio."]} +{"18565081|15116409": ["Next generation communication systems are expected to be smart and fast in sensing the wideband spectrum and identifying the free channels to use [1-2]."]} +{"55582581|2509135": ["However, a large portion of the assigned spectrum remains underutilized [1]."]} +{"15796425|2509135": ["So, SU can share this frequency band when PU does not use [7].", "However, ED scheme gives a low accuracy of PU estimation and it is noise sensitivity [4-7, 911]."]} +{"15796425|10908575": ["INTRODUCTION Cognitive radio (CR) system is one of techniques for solving the scarcely bandwidth problem [1-6]."]} +{"206934796|8974063": ["Studies have shown that the radio spectrum is not utilized constantly by the users this resource has been allocated to; 25 spectrum usage is estimated to be between 5% and 85% on a block of licensed radiofrequency (RF) bands at 26 different geographical locations and at different times [1-4]."]} +{"206934796|12601073": ["Cyclostationary Detection 65 takes advantage of the fact that statistical parameters of practical communication signals vary periodically [19].", "Several spectrum sensing techniques have been 59 proposed over the last decade [2-20]."]} +{"14243464|15116409": ["Ideally, a cognitive radio should not rely on any prior knowledge of the primary user [3], [4]."]} +{"17332695|15116409": ["However, radio spectrum is a finite resource [1].", "Thus, it is assumed that the PU transmitter sends a pilot stream simultaneously with the data and the SU receiver has a perfect knowledge of the pilot stream to verify its transmission at the frequency band [1]."]} +{"11185848|15116409": ["Due to the low spectrum utilization, wideband spectrum is inherently sparse, so compressive sensing can be a promising candidate to realize wideband spectrum sensing by using sub-Nyquist sampling rates [5]-[12]."]} +{"3708246|31973880": ["The secondary users (SU) which represent the cognitive nodes sense the channels to detect any white space for transmission opportunity while avoiding interference to the Primary user signal transmission [1-2]."]} +{"62135497|12601073": []} +{"15945966|2509135": ["CR has the capability of sensing its electromagnetic environment autonomously and dynamically to tune its radio operating parameters [1]."]} +{"133897|1686572": []} +{"26898016|15116409": ["Wideband spectrum sensing involves finding the frequency location of each sub-band of the sensed RF spectrum regardless the shape of the power spectral density (PSD), and then classifying the identified sub-bands as occupied or unoccupied [4]-[6].", "The first task of the cognitive cycle is spectrum sensing to identify the location of spectrum white spaces reliably [3, 4]."]} +{"15048099|12601073": ["Federal Communications Commission (FCC) has reported the temporal and geographic variations in spectrum utilization is range from 15% to 85% [1]."]} +{"8238539|365692": ["After repeating until the leaf in each leaf by in that leaf [15]."]} +{"5813597|15116409": ["A crucial requirement of cognitive radios (CRs) is that they must be able to rapidly find and make good use of spectral opportunities without causing harmful interfere nc to the primary user (PU) [1], [2]."]} +{"45084217|44461432": []} +{"45084217|3055684": []} +{"45084217|7851743": []} +{"45084217|2509135": []} +{"45084217|5621151": []} +{"45084217|121289": []} +{"51933250|15116409": ["Many sophisticated spectrum sensing schemes have been developed to locate the TVWS by monitoring PU\u2019s transmissions [11], [12]."]} +{"13654661|1686572": ["Here a general attack model proposed in [1] is considered, which can be formulated as follows: \u23a7\u23a8 \u23a9 P (", "In view of this problem, cooperative spectrum sensing (CSS) is proposed [1]."]} +{"46850375|3799929": []} +{"46850375|1686572": []} +{"60525490|2509135": []} +{"3710244|12601073": ["To enable dynamic spectrum access, these systems perform spectrum sensing to decide on the presence or absence of the primary user[2,3]."]} +{"5100384|4122595": ["uncertainty, dynamic spectrum occupancy, and transceiver hardware imperfections such as ADC errors, synchronization errors etc [24]."]} +{"34227781|1686572": ["Usually, the case of malicious falsification in the literature is well known as the spectrum sensing data falsification attack, or Byzantine attack [4]\u2013[6]."]} +{"164060|2509135": []} +{"85716|31973880": ["In the last process, the signal is reconstructed from the few M measurements [6-9]."]} +{"85716|7525856": ["In the last process, the signal is reconstructed from the few M measurements [6-9]."]} +{"11453217|15116409": ["cause missed opportunities or interferences [4], [22].", "such as geolocation database and cognitive radio [4], [5]."]} +{"14171678|6507312": []} +{"14171678|10908575": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} diff --git a/graph_585863.jsonl b/edge/graph_585863.jsonl similarity index 100% rename from graph_585863.jsonl rename to edge/graph_585863.jsonl diff --git a/edge/graph_58587365.jsonl b/edge/graph_58587365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..346584b80d51ef40f25330d7f2d6e99f44f20953 --- /dev/null +++ b/edge/graph_58587365.jsonl @@ -0,0 +1,75 @@ +{"41687262|15947359": ["Visual sensor networks (VSNs) have recently emerged as one of the most active research areas in computer vision with numerous applications both in public and private environments, such as intelligent surveillance, environmental monitoring, virtual reality and smart homes [1,2]."]} +{"14729547|3540699": ["However, the resource constraints of the sensor nodes bring new challenges when applying source coding globally in the entire network.", "As a result, the visual information retrieved from adjacent camera nodes usually exhibits high levels of correlation, which gives rise to considerable data redundancy in the network."]} +{"24835079|7704963": ["Aggarwal and Philip [13] studied models for uncertain data representation."]} +{"14356571|6275330": []} +{"14356571|1230643": ["Ensuring energy efficient and reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems."]} +{"16169670|469744": ["A key use of such a system is as a solution to the registration problem of augmented reality; the estimation of the alignment between the real and virtual world [3]."]} +{"14831601|1236072": ["Recently, numerous researchers have proposed energy efficient routing solutions for WSN [10], [15]."]} +{"14831601|3540699": ["264/AVC [42] provide very good rate-distortion performance due to advanced techniques [84] it incorporates to exploit the signal statistics, e."]} +{"14831601|1230643": ["Recently, considerable amount of research efforts have yielded many promising communication protocols to address the challenges posed by the WSN paradigm [11], [12].", "It is envisioned that the WSN paradigm will inevitably be an integral part of our surroundings and daily lives [11].", "These factors are addressed by many researchers as comprehensively surveyed in [11], [12].", "Power consumption due to communication in WSN has been widely investigated [11], [12].", "While there exist significant amount of research results on communication problems of WSN [11], [12], multimedia communication in WSN is vastly unexplored.", "physical phenomenon features from the collective information provided by sensor nodes [11].", "problem, WSN poses more stringent limitations due to scarce power and computational capacities and inability to use global identification (ID) due to extra overhead introduced by large number of nodes [11].", "Design of a sensor network for a certain application is influenced by several factors such as fault tolerance; scalability; production costs; operating environment; sensor network topology; hardware constraints; transmission media; and power consumption [11]."]} +{"27874608|13454399": ["EE [10] Restricted High High Tree Disjoint Query-based x x x", "[10] M.", "IEEE Wireless Communications \u2022 October 2017 127 DYNAMIC SPECTRUM MANAGEMENT FOR 5G were discussed in [10].", "Proactive routing protocols This survey investigates Robust Multipath Routing (RM-DSR) and Multipath Dynamic Source Routing (MDSR) as examples of DSR, Tiny Optimal Node-Disjoint Multipath Routing (TinyONDMR) protocol as an example of proactive AODV, and SHRP as a reactive protocol [10].", "SHRP [10] Energy efficiency and", "MMSPEED [10]", "emergencies Hazard detection EE [10] Security, QoS, and data", "For instance, the Multipath Multi-SPEED (MMSPEED) routing protocol has many improvements and modifications in order to guarantee specific QoS parameters in WSNs spanning over the network and MAC layers [10]."]} +{"27874608|2295142": ["Alternative path routing, reliable data transmission, and efficient resource utilization were the three major criteria in which multipath routing protocols were classified in [11], whereas a different classification based on selection techniques and traffic distribution mechanisms was presented in [12].", "[11] M."]} +{"27874608|3826739": ["Position-based routing algorithms and metrics like energy consumption, negotiation overheads, complexity, reliability, scalability, and multipath strategies were considered in [7].", "[7] Z."]} +{"27874608|1236072": ["[4] N.", "The authors of [4] discussed constraints and solutions related to each layer of the WSN stack."]} +{"24927236|1230643": ["Recent advances in miniaturization have led to the development of microsensors that are generally equipped with sensing, monitoring and processing capabilities [11]."]} +{"7179731|1230643": ["SAR: Sequential Assignment Routing (SAR) is the first protocol for sensor networks that includes a notion of QoS in its routing decisions [1][5].", "Recent technological breakthroughs in ultra-high integration and low-power electronics have enabled the development of tiny battery-operated sensors [1-4]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"18257478|15947359": ["More recently, there is a growing interest for the applications which require image sensing in order to achieve object detection, localization, tracking, and counting [2,5].", "Considering that the radio transceiver is one of the most power greedy components of sensor nodes, image compression at the source node seems a natural solution tomake significant energy savings at the camera node as well as at the nodes forwarding packets towards the sink, and hence to extend the network lifetime [1,2,5]."]} +{"1856779|205286988": ["With the recent advances in wireless sensor networks (WSNs), it is foreseeable that video sensors will be supported in such networks, for applications such as battlefield intelligence, security monitoring, emergency response, and environmental tracking [1, 2 ]."]} +{"1856779|1236072": ["With the recent advances in wireless sensor networks (WSNs), it is foreseeable that video sensors will be supported in such networks, for applications such as battle\ufb01eld intelligence, security monitoring, emergency response, and environmental tracking [1,2]."]} +{"15693805|10397481": []} +{"15693805|16525678": []} +{"1817751|512561": ["level and network lifetime [151]."]} +{"1817751|85585": ["increases the accuracy of various tracking in a variety of civilian and military applications [71].", "due to bottleneck link/node failure for non-disjoint paths which negatively impacts the performance of multipath routing [71].", "Reliability has emerged as a factor to classify multipath routing protocols, since a reliable monitoring of the environment is very important in a variety of multimedia applications [71]."]} +{"1817751|36432451": ["The design of the routing protocol is highly influenced by the data delivery model, especially when the design involves minimization of energy consumption and route stability [45].", "Multimedia applications encompass monitoring of reallife events which necessitates that efficient multipath routing mechanism should be developed for the transmission of information while meeting QoS requirements [45].", "tion, cooperative and distributed algorithms [14], [43]\u2013[45].", "Some routing protocols adhere to some requirements and resource-constraints nature of WMSNs to meet QoS in order to handle various types of multimedia and mixed traffic [45]."]} +{"1817751|6556803": ["This means that each sensor node shall be modified distinctively according to the application scenarios [6]."]} +{"1817751|13454399": ["The benefits of various multipath routing protocols for WSNs and their benefits were presented in [33] and [34].", "are two relevant aspects of an allocation strategy: granularity and scheduling [16], [34]."]} +{"1817751|29997805": ["dant traffic reduction based on similarity of multimedia data sources from nearby locations were studied in [7].", "A plethora of research on taxonomies for Mobile Ad-hoc NETwoks (MANETs) and WSNs have reported the baseline model of routing protocols [7], [69].", "[7] classified the WMSNs routing protocols", "constraints, multimedia source coding techniques, crosslayer coupling of functionality, and multimedia in-network processing [7].", "Designing multipath routing protocols for WMSNs requires additional research that extends the protocols proposed for WSNs [7]."]} +{"1817751|2295142": ["selection for each multipath routing protocol is independently determined and should be selected to meet the performance demands of WMSNs applications [1], [13].", "The third approach is more interesting than the others since it represents a trade-off between energy expenses and the likelihood of total multipath failure [13], [76].", "The demands of multipath routing strategy combined with various performance demands dictated by different applications have led to the proposal of a number of new routing protocols to efficiently utilize the limited available resources in addition to the features of multimedia data [13].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "[13] classified a multipath routing taxonomy for WSNs into three categories with emphasis on their advantages and disadvantages.", "vides fault tolerance by increasing the probability of a data packet sent by a source node, via alternatives of selected paths, arriving at the destination sink with minimum packet loss [13].", "However, our survey and the survey presented in [13] have several major differences.", "requirements along with their respective routing strategies [8], [13], [14], [16].", "In [13], multipath routing protocols were classified based on three main criteria: alternative path routing, reliable data transmission, and efficient resource"]} +{"1817751|41998167": ["diately to the changes in the sensed attribute, or a query is generated by the base station [52]."]} +{"1817751|3755658": ["ability [29], and cross-layer approaches [21]."]} +{"1817751|14132386": ["Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "cols for traffic load balancing and repartition [62], [96]\u2013[98].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62]."]} +{"1817751|3826739": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "In [28], position-based routing protocols were surveyed"]} +{"1817751|1236072": ["Subsequent surveys considered additional issues such as energy efficiency [8], geographic location [28], network scal-", "Early surveys focused on general architectural issues and open research problems in the field of WSNs [8], [19]\u2013[27].", "These characteristics are handled either by modifying existing protocols in WSNs or by proposing new methodologies such as multi-radio multi-channel systems, switching between multiple channels, multipath routing, or mixtures of these methods [8].", "Therefore, the prime role of a routing protocol is to establish a path between the sources and sink node while keeping track of the path availability and facilitating successful transmission of data along the selected paths [8].", "constrained routing protocols were studied in [30], where the taxonomy presented in [8] was expanded to consider energy efficiency.", "Routing strategy is defined in terms of the process of discovering and selecting paths in wireless networks from the target area that sends network traffic towards the sink node [8].", "requirements along with their respective routing strategies [8], [13], [14], [16].", "multiple performance metrics to meet the additional QoS requirements [8], [68].", "In [8], routing protocols for WSNs were discussed and classified into", "Several techniques have been proposed to understand how different routing approaches respond when handling various requests in different network environments [8], [57]\u2013[64]."]} +{"1817751|44944144": ["better than proactive routing protocols during inactivity [144]."]} +{"1817751|1230643": []} +{"1817751|14441987": ["the network with up-to-date routing information [142].", "The proactive approach responds to changes in the network topology or another metric such as bandwidth and interference by propagating updates throughout the network to maintain a consistent network [142]."]} +{"1817751|41907762": ["It should be noted that, they are difficult to measure and generally can generate high overhead in networks [60], since resource availability information are periodically exchanged among nodes [35].", "Actually, the discovery, selection and maintenance of paths depend on some node-specific and/or network-wide metrics such as QoS requirements, residual-energy budget along the selected path, and more [60].", "in turn depends on the amount of path disjointedness and is considered the main criterion used to utilize existing routing multipaths [13], [60]\u2013[62].", "Many multipath constructing strategies have been proposed in the literature [60]\u2013[62] to describe the performance of multipath routing protocol by the number and quality of selected paths.", "have been proposed to solve routing problems in traditional WSNs [60]\u2013[64].", "Thus, different multimedia applications have different QoS requirements and multipath routing protocols in WSNs or WMSNs have their own unique advantages and disadvantages [60]\u2013[62]."]} +{"1817751|13458486": ["In addition, cross-layer design between MAC layer and routing allow packet-level service differentiation or priority-based scheduling, and more power efficient routing mechanisms [17].", "The multipath routing protocol taxonomy in [17] used path selection techniques and traffic distribution mechanisms to classify the surveyed protocols.", "Consequently, the objective is to assign more loads to under-utilized multiple paths and less load to over-committed paths so that uniform resource utilization of all available paths can be ensured to distribute network traffic [16], [17]."]} +{"1817751|1762301": ["Otherwise, reactive routing protocols may result in a large volume of messaging overhead [133].", "final destination route are discovered [133]."]} +{"278875|40596005": []} +{"278875|3540699": []} +{"109486916|1230643": []} +{"2234891|41998167": ["However, there are a few QoS-aware MAC protocols, i.e., protocols which aim to accommodate different types of QoS-constrained traffic and to adapt to varying traffic loads [9]."]} +{"2234891|17960632": ["There are many application-specific MAC protocols in the literature (e.g., delay-sensitive applications, bandwidth-hungry, missioncritical , etc.) as shown by the surveys in [6] [7] [8]."]} +{"2234891|1230643": ["Due to the unique resource constraints and application requirements of sensor networks, standard MAC protocols developed for wireless networks could not be used, as discussed in [1].", "This new instrument was envisioned for a broad range of monitoring applications (continuous sensing, event detection, etc.) in several areas such as military, environment, industry and home [1]."]} +{"6438719|14441987": []} +{"205458526|3540699": []} +{"5808401|1230643": ["The major objectives behind the research and deployment of Wireless Sensor Networks (WSNs) [1] lie in the following two broad aspects: (i) event detection (sensing) and data communication through node coordination and (ii) conservation of energy to maximize the post-deployment, active lifetime of individual sensor"]} +{"2898007|41998167": ["QoS-aware MAC protocols for WSNs, the reader can refer to our previous study [15].", "Further details about service differentiation at MAC layer for WSNs can be found in our previous study [15]."]} +{"2898007|15947359": ["The availability of low-cost hardware and rapid development of tiny cameras and microphones have enabled a new class of Wireless Sensor Networks (WSNs): multimedia or visual wireless sensor networks [1,2] and this new class has contributed to new potential WSN applications, such as surveillance, target tracking and telepresence."]} +{"2898007|10559330": ["There are two service differentiation models proposed for conventional computer networks, Integrated services (IntServ) [12] and Differentiated Services (Diff-Serv) [13]."]} +{"33688264|16939966": ["In [7,8], various issues concerning channel modeling, coexistence, energy consumption, MAC layer issues, and design features are analyzed and summarized."]} +{"33688264|10997547": ["More recently, MAC protocols for cognitive radio body area networks have been developed [9]."]} +{"33688264|303976": ["In [6], different design approaches for the PHY and MAC layers, for efficient and reliable mobile healthcare services in WBANs, are discussed."]} +{"18637174|396631": ["For spatially correlated frames, differential coding could be achieved through inter-frame prediction such as motion estimation or disparity compensation [25] in H."]} +{"18637174|15947359": []} +{"11661590|16525678": []} +{"5440113|10817088": ["Passive Infrared (PIR) Motion Sensors offer a cheap and popular solution, but they have some disadvantages: they can only detect objects if they are moving suf\ufb01ciently quickly and are located within the frustum of the PIR system [5]."]} +{"5440113|14397159": ["Besides, Cardinaux et al. [6] state that many PIR sensors are required to track people in a complete room."]} +{"18570875|15947359": ["The existingdistributedapproachresults \nin signi.cantly less coverage, compared to the optimal."]} +{"16120075|3117516": ["Halawani and Kahn [80] also presented a survey on techniques, algorithms and protocols for network lifetime enhancement.", "and the energy preservation in sleep mode have to be also properly considered [80]."]} +{"16120075|15947359": ["Several papers can be found in the literature surveying wireless sensor networks [2,3,14] and visual sensor networks [6,15] as their main research areas.", "For the resulting Video-based Wireless Sensor Networks (VWSNs), or simply Visual Sensor Networks (VSNs), new researches had to be conducted, since many traditional WSN algorithms, architectures and computational solutions are not feasible or even efficient for that specific communication scenario [5,6].", "In fact, video-based wireless sensor networks may expect more energy consumption in local processing than in data transmission, contrary to traditional wireless sensor networks [6]."]} +{"16120075|1236072": ["A survey on the routing techniques and protocols for wireless sensor networks, including energy aware routing, can be found in [79]."]} +{"16120075|1230643": []} +{"3667158|27806871": ["265 encoded videos was conducted in [37]."]} +{"474410|15947359": []} +{"2210228|1230643": []} +{"16466935|3755658": ["The acquisitional query processing [20] permits to reducing the numenergy consumption in the network by sensor nodes participating in the reduction is done by expressing in the query when or what sensors to sample."]} +{"16466935|562065": ["The goal of this work is not only to present how data and query management techniques have advanced nowadays, but also show their benefits and drawbacks, and to identify open issues providing guidelines for further contributions in this type of distributed architectures."]} +{"16466935|7889189": ["Moreover like in traditional computer networks, sensor networks are particularly vulnerable to several key types of attacks that can be performed in a variety of ways [62], [63], [64], [65], as Sybil attack [66], trafic analysis attacks [67], node replication attacks [68],"]} +{"16466935|1236072": ["The acquisitional query processing [20] permits to reducing the numenergy consumption in the network by sensor nodes participating in the reduction is done by expressing in the query when or what sensors to sample."]} +{"16466935|1230643": ["Index Terms\u2014Distributed database management; wireless se networks; distributed storage; query techniques, data\nduction techniques; query optimization."]} diff --git a/edge/graph_58598634.jsonl b/edge/graph_58598634.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70639d2c7a7447ae9ce875cb1b91ac8299b4057b --- /dev/null +++ b/edge/graph_58598634.jsonl @@ -0,0 +1,10 @@ +{"8606418|1762301": []} +{"1514400|2581766": []} +{"1514400|508178": ["Thus, many potential consumers are not sure whether they can trust the cloud providers in offering dependable services [41]."]} +{"1514400|5551880": []} +{"26467946|8833120": []} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"49325841|6779551": []} +{"31895002|10283694": ["For more detailed descriptions, the article [8] gives a comprehensive vision of different authentication approaches in VANETs."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} diff --git a/edge/graph_5860048.jsonl b/edge/graph_5860048.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f060eef22cc5636f560890fe86fc8cd53f1b3859 --- /dev/null +++ b/edge/graph_5860048.jsonl @@ -0,0 +1,59 @@ +{"8574498|7774517": []} +{"8574498|1230643": ["I. INTRODUCTION\nWireless sensor networks (WSNs) have been widely used in various applications including those related to personal, industrial, business and military domains [1]."]} +{"609383|7774517": ["Generally speaking, outlier detection techniques can be categorised into statistical-based, nearest neighbour-based, clustering-based, classification-based and spectral decomposition-based approaches (Chandola et al., 2007; Zhang et al., 2008)."]} +{"609383|3330313": ["A Wireless Sensor Network (WSN) consists of a large number of these nodes distributed over a large geographical area to cooperatively monitor a phenomenon.", "Compared to the other three data mining tasks, i.e. predictive modelling, cluster analysis and association analysis, outlier detection is the closest task to the initial motivation behind data mining (Hodge and Austin, 2003)."]} +{"9812026|7774517": ["Sensor data of adjacent nodes in a densely deployed WSN tend to be spatially and temporally correlated [10].", "Outlier detection techniques can be categorized into statistical-based, nearest neighborbased, clustering-based, classification-based, and spectral decomposition-based approaches [1], [10]."]} +{"56584735|1230643": []} +{"12252982|7774517": []} +{"12252982|6275330": ["\u2026form 3 October 2012 Accepted 7 November 2012 Available online xxxx\nKeywords: Outlier detection Ellipsoidal support vector machine Spatial correlation Temporal correlation Wireless sensor networks\n1570-8705/$ - see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.adhoc.2012.11.001\n\u21d1\u2026"]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"207172599|3330313": []} +{"28305595|8618569": []} +{"28305595|1940388": ["Many surveys have been proposed for the security in WSN in general (Yun et al ., 2008; Chen et al ., 2009; Christin et al ., 2010; Walters et al ., 2007); however, all of them discussed only the prevention based schemes as well as the secure routing protocols."]} +{"28305595|7774517": []} +{"28305595|17205659": []} +{"28305595|1236072": ["Table 1: Taxonomy of attacks according to WSN layer s (Al-Karaki and Kamal, 2004)", "Other two surveys about the routing in WSN have been proposed (Al-Karaki and Kamal, 2004; Akkaya and Younis, 2005) however, they did not discuss the security issues."]} +{"28305595|1230643": []} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"206256778|3330313": ["Moreover, an anomaly in a dataset is defined as an observation that appears to be inconsistent with the remainder of the dataset (Hodge and Justin, 2004)."]} +{"14560938|1230643": ["Several applications for WSNs have been proposed [1] and implemented ranging from habitat monitoring [2] [3] and animal tracking [4] to possible military applications [5]."]} +{"7774517|3330313": ["The term outlier, also known as anomaly, originally stems from the field of statistics [5].", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.", "Hodge and Austin [5] address outlier detection methodologies from perspective of three fields of computing, i.e., statistics, neural networks and machine learning."]} +{"7774517|1230643": ["For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [20]."]} +{"16218187|7774517": ["Wireless sensor networks (WSN) have been used for a variety of applications [1].", "based techniques, which learn a classification model in the training phase and then classify the data instance to one of the training classes are categorized into Support Vector Machine (SVM) based and Bayesian Network based approaches [1].", "An efficient outlier detection technique, thus, should incorporate attribute correlations in addition to the spatio-temporal correlations [1].", "Since in WSNs, a majority of energy is consumed in radio communication rather than in computation [1].", "A comparison of various types of outlier detection techniques for WSNs has been carried out in [1]."]} +{"13143428|7774517": ["Anomaly as defined in [2] is, \u201can observation that appears to be inconsistent with the reminder of a dataset\u201d."]} +{"13143428|3330313": ["However, the resource constraints of sensors in terms of storage, processing, bandwidth, and energy make WSNs more vulnerable to different types of misbehaviors or anomalies."]} +{"13143428|1230643": ["I. INTRODUCTION Wireless sensor networks (WSNs) are formed by a number of small, cheap, battery-powered, and multifunctional devices called sensors which are densely or sparsely deployed to collect information from a phenomenon [1]."]} +{"15075319|3330313": ["Several alternative \nde.nitions of anoma\u00adlies have been proposed in the literature, as well as a variety of detection algo\u00adrithms \n[Barnett and Lewis 1994; Hodge and Austin 2004; Markos and Sameer 2003; Petrovskiy 2003]."]} +{"15075319|1230643": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"14792172|1236072": ["By the network architecture, it usually divides WSNs into flat and hierarchical [12]."]} +{"14473975|1230643": []} +{"205703524|6275330": []} +{"205703524|1236072": ["In flat-based WSN, ll nodes have the same functionality and resources whereas, in ierarchical WSNs, sensor nodes are grouped into clusters in which ach cluster has cluster head (CH) and normal sensor nodes (SN) [4].", "and assigning special tasks to cluster heads improves the system scalability, network lifetime and energy efficiency [4].", "This hierarchical structure aims at makng the design of WSNs more scalable and may contain different evels of hierarchy [4]."]} +{"205703524|1230643": ["Wireless sensor networks (WSNs) are networks of tiny, low cost, ow energy, and multifunctional sensors that are densely deployed or monitoring environments, tracking objects or controlling indusrial operations [1]."]} +{"16687267|1230643": ["Wireless sensor networks (WSNs) consist of a set of light-weight devices called sensor nodes with minimal energy resources available in hand for all their operations, namely, sensing their environments, information processing, and communication [2] [3]."]} +{"1993574|3330313": ["\u2026Laboratories Department of Computer Science and Software Engineering, The University of Melbourne, Australia\n\u2020Department of Computer Science and Software Engineering The University of Melbourne, Australia\n\u2021Department of Electrical and Electronic Engineering The University of Melbourne, Australia"]} +{"13583842|3330313": ["This can be accomplished via anomaly detection, which is the process of identifying data that deviate markedly from historical patterns (Hodge & Austin 2004).", "Thus, anomaly detection has many practical applications, such as data quality assurance and control (QA/QC), where anomalous data are treated as data errors; focused data collection, where anomalous data indicate segments of data that are of interest to researchers; and event detection, where\u2026"]} +{"26724768|7774517": ["A wide variety of outlier detection approaches have been discussed and compared in [1].", "A wireless sensor network consists of a hierarchical or nonhierarchical structure of low-cost and low-power sensor nodes which are capable of sensing various attributes of an environment under observation [1], [2].", "The inherent constraints on network, of which the prime being the power constraints, demand a network to require minimal communication overhead, as most of the power is consumed in communication [1], [3].", "Assuming that the probability of all sensors being faulty at the same time instant is very low and based on the fact that sensor readings show spatial correlation but temporal deviations in case of an event [1], we quote that an outlier on atleast half of the sensor nodes points to an event."]} +{"26724768|3330313": ["A wireless sensor network consists of a hierarchical or nonhierarchical structure of low-cost and low-power sensor nodes which are capable of sensing various attributes of an environment under observation [1], [2]."]} +{"1940388|17205659": ["Besides implementing the security goal discussed above, the following metrics are also important to evaluate whether a security scheme is appropriate for WSNs [7], [8].", "A few existing surveys on security issues in WSNs can be found [7], [8]."]} +{"6275330|1230643": ["Other applications of wireless sensors to healthcare that have been proposed include tracking and monitoring doctors and patients, or tracking drug usage inside hospitals [36]."]} +{"16190208|1236072": ["Each sensor node is powered by a battery, so it always suffers from limited energy resource [1-3]."]} +{"1428759|1230643": ["Wireless sensor networks (WSNs), comprising of tiny, radio-enabled sensing devices open up new opportunities to observe and interact with the physical world, and have been applied in domains ranging from patient health monitoring through the use of biomedical sensors to military applications such as battlefield surveillance [1].", "Wireless sensor networks have been a very active area of research in recent years (see [1] for a survey)."]} +{"17253856|7774517": ["\u2026and event detection techniques for WSNs in harsh environments The purpose of an outlier and event detection technique for WSNs deployed in harsh environments should be three-fold: outlier detection, event detection and event identification (Shahid et al. 2012; Zhang et al. 2010; Zhang 2010).", "Based on the learned graphical model, these techniques can determine the probability of a newly arrived data sample belonging to a particular class (Zhang et al. 2010).", "A detailed analysis of state-of-the-art outlier and event detection techniques for WSNs has been presented in Zhang et al. (2010).", "The purpose of an outlier and event detection technique for WSNs deployed in harsh environments should be three-fold: outlier detection, event detection and event identification (Shahid et al. 2012; Zhang et al. 2010; Zhang 2010)."]} +{"17253856|1230643": ["\u2026, business and military domains (Madden et al. 2002; Zhang et al. 2007; Garc\u00eda-Hern\u00e1ndez et al. 2007; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010, a; Phua et al. 2010; George et al. 2010).", "Wireless sensor networks (WSNs), due to their ability to perform online and distributed processing, have received considerable attention of research community for personal, industrial, business and military domains (Madden et al. 2002; Zhang et al. 2007; Garc\u00eda-Hern\u00e1ndez et al. 2007; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010, a; Phua et al. 2010; George et al. 2010)."]} +{"17253856|50458504": ["\u2026, business and military domains (Madden et al. 2002; Zhang et al. 2007; Garc\u00eda-Hern\u00e1ndez et al. 2007; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010, a; Phua et al. 2010; George et al. 2010).", "Wireless sensor networks (WSNs), due to their ability to perform online and distributed processing, have received considerable attention of research community for personal, industrial, business and military domains (Madden et al. 2002; Zhang et al. 2007; Garc\u00eda-Hern\u00e1ndez et al. 2007; Mainwaring et al. 2002; Cardell-Olivera et al. 2005; Ni et al. 2003; Akyildiz et al. 2002; Dereszynski and Dietterich 2011; Bahrepour et al. 2010, a; Phua et al. 2010; George et al. 2010).", "Outlier and Event Detection has been the focus of research community in recent years (Dereszynski and Dietterich 2011; Bahrepour et al. 2010, a; Phua et al. 2010; George et al. 2010; Shahid et al. 2012; Ding et al. 2012; Ozdemir and Xiao 2012; O\u2019Reilly et al. 2012; Zhang et al. 2012, a; Xie et al. 2012, a; Suthaharan 2012; Saada and Meng 2012; Shahid et al. 2012, a; Pham and Pagh 2012; McDonald et al. 2012; Ma et al. 2013; Moshtaghi et al. 2012; Stankovic et al. 2012; Trinidad et al. 2012; Shahid and Naqvi 2011; Giatrakos et al. 2010; Ozdemir and Xiao 2011; Liu 2011; Bezdek et al. 2011; Xue et al. 2006; Sheng et al. 2007; Katdare 2011; Hassan et al. 2011; Moshtaghi et al. 2011, a, b; Bahrepour et al. 2010; Bezdek et al. 2010; Suthaharan et al. 2010, a; Sharma et al. 2010; Rajasegarar et al. 2010, a; Paschalidis and Chen 2010; Keally et al. 2010; Giatrakos et al. 2010).", "has been the focus of research community in recent years (Dereszynski and Dietterich 2011; Bahrepour et al. 2010, a; Phua et al. 2010; George et al. 2010; Shahid et al. 2012; Ding et al. 2012; Ozdemir and Xiao 2012; O'Reilly et al. 2012; Zhang et al. 2012, a; Xie et al. 2012, a; Suthaharan\u2026"]} +{"1711061|3330313": []} +{"37374502|5860048": []} +{"65809|3330313": []} +{"14090386|1236072": ["Data are propagated from sensors to a sink through a minimum hop-count path [3].", "The sensing series are routed as before to the sink, using a hop-count based routing algorithm [3]."]} +{"14090386|3330313": ["Hodge and Austin classi\ufb01ed a variety of outlier detection methods into three categories in their survey paper [16]: Unsuper-vised clustering based on distance and density, which determines the outliers with no prior knowledge of the data [17]; supervised classi\ufb01cation that required pre-labelled\u2026"]} +{"389775|1230643": ["Wireless sensor networks are formed using large numbers of cheap, tiny and compact sensors which have inbuilt wireless radios for communication [1]."]} +{"36109614|7774517": ["Wireless sensor networks (WSNs) have been used for a variety of applications [1] in harsh environments.", "This amount of reduction will significantly enhance the life time of energy constrained WSNs.", "Since communication is much more expensive in WSNs as compared to computational costs [1], therefore STA-QS-SVM may not be suitable for energy constrained WSNs in its original form.", "This broadcast of radii at each time instant makes the communication very expensive for energy constrained WSNs.", "Thus, these techniques are suitable for real-time outlier and event detection for energy constrained WSNs deployed in harsh environments, underground mines, for instance.", "Of all the most widely used geometric figures, quarter-sphere based outlier detection schemes (QSSVM)[3] determine the radius of quarter-sphere in which to enclose the normal data by solving a simple linear optimization problem and are computationally less expensive, hence widely used in energy constrained WSNs.\n1This work was carried out under the project \u201cSafety Assurance in High Stress Environments\u201d, funded by ICT R&D Pakistan\nIn order to identify global outliers in a network, the outlier detection algorithm should exploit spatio-temporal & attribute correlations of data belonging to all nodes in a region.", "I. INTRODUCTION 1\nWireless sensor networks (WSNs) have been used for a variety of applications [1] in harsh environments.", "Since, communication is much more expensive than computation in WSNs [1], therefore, a technique which requires minimum communication should be selected.", "Anomaly and especially event detection in WSNs find its applications in disaster event detection and identification, for instance, in underground oil, gas, coal, salt mines and volcanic sights [2]."]} +{"18692825|7774517": ["In that case, in-network computation is activated to prolong the lifetime of the network; on the other hand, the detection accuracy benefits from taking into account the spatial correlations existed in the data coming from the sensor nodes geographically close to each other [11]."]} +{"18692825|1236072": ["The network is hierarchical [21], composed of many clusters."]} +{"18605290|1230643": ["Literature in the area of WSN includes wide range of applications ranging from smart home to battle-field applications, protocols, programming languages and the middleware architectures [1] [6].", "They are developed to be used in a wide variety of applications ranging from smart home systems to battlefield applications [1]."]} +{"16199748|7774517": ["Outlier detection has attracted much attention in the field of WSNs , and in recent years many outlier detection techniques specifically developed for WSNs have emerged ( Zhang et al ."]} +{"16199748|6275330": ["A recent development in data acquisition concerns the use of wireless sensors, consisting of nodes that measure environmental variables such as temperature, humidity, sound, pressure, light, vibration or motion (Arampatzis et al. 2005)."]} +{"20703436|3330313": ["Communication overhead in global approaches is prohibitive, so BG models are mainly useful as a baseline for comparing different algorithms, but see [8, 9] for good introductions to outlier detection with BG models."]} diff --git a/edge/graph_58624361.jsonl b/edge/graph_58624361.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e02933373e5276687b9ba9fdd65688e252f807c --- /dev/null +++ b/edge/graph_58624361.jsonl @@ -0,0 +1,10 @@ +{"28776081|11498812": ["Briefly speaking, high mobility communications will introduce more challenges on the physical layer design, the link/MAC layer design, the network layer design as well as the application layer design to guarantee the QoS provisioning and other application requirements [8]."]} +{"4375599|26259297": ["Motivated by [25] and [34], in this paper, we design a new frequency synchronization scheme for multiuser OFDM uplink with a massive uniform linear array (ULA) at BS by exploiting the angle information of users.", "We consider that the incident signals at BS from each user can be restricted within a certain angular spread, since the massive BS is usually elevated at a very high altitude with few surrounding scatterers [5]\u2013[7], [25], [34].", "2Note that the DOA of each user may vary slowly in practice [34], and the DOA estimation may not need frequent updates.", "Similar to [5]\u2013[7], [25], and [34], we consider that the incident rays of each user can be constrained within a certain angular spread \u03b8as; Namely, the incident angles of the kth user is limited in the DOA region (\u03b8k \u2212 \u03b8as, \u03b8k + \u03b8as) with uniform distribution, where \u03b8k represents the mean DOA of the kth user.", ", the sufficient spatial dimension, the steering vectors pointing to distinct DOAs would become nearly orthogonal to each other, which implies that we can simply employ the steering vector pointing to the DOA of the kth user as the beamforming vector to substantially suppress the interference from the other users in angle domain [25], [34].", "An interesting array signal processing aided massive MIMO transmission scheme was proposed in [25] and [34], where the angle information of the user is exploited to separate users and simplify the subsequent signal processing.", "Generally, this assumption has been supported in the following typical scenario [34]: BS equipped with a large number of antennas is always elevated at a very high altitude, say on the top of a high building, a dedicated tower, or an unmanned aerial vehicle platform, such that there are few surrounding scatterers."]} +{"4866919|206576720": ["Specifically, if Ch denotes the temporal covariance matrix of the instances of one of the channel entries at times 1 through (T \u2212 1), the (T \u2212 1) \u00d7 (T \u2212 1) covariance Rz of an entry of the innovation vector sequence is given by Rz = D\u22121(Ch \u2212 \u03c1 \u03c1T )D\u22121, where \u03c1 [\u03c1[1], \u03c1[2], ."]} +{"53760072|4344513": []} +{"53760072|10979806": ["Recently, several survey papers related to massive MIMO systems have been published [1], [5], [19]\u2013[22].", "survey papers [1], [5], and [19]\u2013[22], the unique contributions of this paper are as follows."]} +{"53760072|19938676": ["Meanwhile, a large antenna array at the BS also brings the benefit of huge capacity gain [6]."]} +{"834673|219028": ["For instance, in band-limited ISI channels requiring equalization, the inputs refer to a sequence of symbols interfering with each other, and the outputs are the signals received within a given observation window in the time/frequency domain [178]."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} +{"206576720|7686677": ["Meanwhile, with excessive power consumption in wireless communications networks, both carbon emissions and operator expenditure increase year by year [2], [3]."]} diff --git a/graph_586323.jsonl b/edge/graph_586323.jsonl similarity index 100% rename from graph_586323.jsonl rename to edge/graph_586323.jsonl diff --git a/edge/graph_5865117.jsonl b/edge/graph_5865117.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3d891380f3368bb52dc50884da535d2013639e8 --- /dev/null +++ b/edge/graph_5865117.jsonl @@ -0,0 +1,19 @@ +{"14534153|2459674": ["In the survey paper [2], it is suggested that the problem is NP-complete for all k \u2265 8 due to [6]."]} +{"14534153|40304452": ["This model was introduced by Roberts [11] and since then the concept has been intensively studied (see the survey of Yeh [13])."]} +{"207132888|2459674": ["For more information, see the surveys [1, 2 , 13]."]} +{"207132888|40304452": ["For more information, see the surveys [1,2,13]."]} +{"3228555|2459674": ["From then on, a large number of articles have been published devoted to the study of the frequency assignment problem and its connections to graph labelings, in particular, to the class of L(2;1)-labelings and its generalizations: Over 100 references on the subject are provided in a very comprehensive survey [ 3 ]."]} +{"38844785|5865117": ["We can find various related results on L(2,1)labelings and L(p,q)-labelings for other parameters in comprehensive surveys by Calamoneri [2] and by Yeh [17].", "We can find a lot of related results onL(p, q)-labelings in comprehensive surveys by Calamoneri [2] and Yeh [13].", "Our Contributions Although there have been a few polynomial time algorithms for L(2,1)-labeling of trees, it has been open if it can be improved to linear time [2]."]} +{"38844785|2459674": []} +{"38844785|40304452": ["Griggs and Yeh [7] observed that any major vertex inG must be labeled 0 or\u2206 + 1 when\u03bb(G) = \u2206 + 1, and that if \u03bb(G) = \u2206 + 1, thenNG[v] contains at most two major vertices for anyv \u2208 V(G).", "We can find various related results on L(2,1)labelings and L(p,q)-labelings for other parameters in comprehensive surveys by Calamoneri [2] and by Yeh [17].", "As for trees, Griggs and Yeh [7] showed that\u03bb(T) is either\u2206 + 1 or\u2206 + 2 for any treeT, and also conjectured that determining\u03bb(T) is NP-hard, however, Chang and Kuo [3] disproved this by presenting a polynomial time algorithm for computing\u03bb(T).", "We can find a lot of related results onL(p, q)-labelings in comprehensive surveys by Calamoneri [2] and Yeh [13]."]} +{"28134|2459674": ["Therefore, since the seminal work of Griggs and Yeh, researchers have produced a wide literature studying the problem for special values of h and k on special classes of graphs[12\u221221], for a survey see [22]."]} +{"18261329|6084038": []} +{"18261329|2459674": ["This variant of graph coloring is recently receiving considerable attention (see [4, 10, 14, 29] for some surveys on the problem and its generalizations)."]} +{"18261329|40304452": ["This variant of graph coloring is recently receiving considerable attention (see [4, 10, 14, 29] for some surveys on the problem and its generalizations)."]} +{"32597046|2459674": []} +{"32597046|40304452": []} +{"9564333|2459674": ["For a survey of recent results we refer the interested reader to [9]."]} +{"2486778|2459674": ["If the reader is interested in this field, please see excellent surveys [6,21]."]} +{"2486778|40304452": ["If the reader is interested in this field, please see excellent surveys [6,21]."]} +{"5834978|2459674": ["A vast array of references on L(2,1)-labelings is provided in two recently published surveys [2,20]."]} +{"5834978|40304452": ["A vast array of references on L(2,1)-labelings is provided in two recently published surveys [2,20]."]} diff --git a/edge/graph_5865757.jsonl b/edge/graph_5865757.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58664309.jsonl b/edge/graph_58664309.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c41b763273fca73504d52481a2aed00426e729e1 --- /dev/null +++ b/edge/graph_58664309.jsonl @@ -0,0 +1,9 @@ +{"14027826|11960624": ["However, the movement of the observation viewpoint or multipleviewpointsthatformdepthperceptionmakesthedifference betweentheIVautostereoscopicimageoverlaysystemandother AR systems, because such movement is the natural way that the humaneyesviewobjects.AlthoughtheIVimageoverlaysystem is free from the issues regarding object positioning and depth cues that arise in case of augmented reality system [ 25 ], [26], one issue concerning IV image ..."]} +{"205712461|15231229": []} +{"1463435|17024419": []} +{"6582408|11960624": ["[7]."]} +{"2543083|12127129": []} +{"79822590|6189942": []} +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} +{"205715546|86629084": []} +{"14081229|7834819": []} diff --git a/edge/graph_58664326.jsonl b/edge/graph_58664326.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..701f7f3ff6cea28868cd8f70139e9555c5634271 --- /dev/null +++ b/edge/graph_58664326.jsonl @@ -0,0 +1,67 @@ +{"7720224|1230643": []} +{"36189524|205286988": ["Due to such differences, many new algorithms have been proosed for the routing problem inWSNs [6,7]."]} +{"36189524|1236072": ["For example, at the network layer, it is highly desirable to find methods for energy-efficient route discovery and relaying of data from the sensor nodes to an external sink or base-station (BS) so that the lifetime of the network is maximized [5]."]} +{"58902165|7686677": []} +{"30324518|1236072": []} +{"30324518|1230643": []} +{"13544858|1230643": ["The key applications of WSN are habitat monitoring, target tracking, surveillance, and security management [1] [2]."]} +{"3024881|10096622": ["For example, ease of implementation on hardware or software, high-quality solutions because of its ability to escape from local optima and quick convergence [4] [5]."]} +{"13754100|12256243": ["A survey of the location-based routing protocols that support the sink mobility is presented in [12]."]} +{"13754100|10206347": []} +{"13754100|9830350": ["The cluster properties and the sensor capabilities are the two main issues in the clustering attributes [21, 22]."]} +{"23337701|12601073": ["As the nature of the wireless channel entails undesired phenomena such as shadowing fading, hidden or exposed terminal problems, reliable and efficient spectrum sensing becomes a critical issue [3]."]} +{"15164973|1230643": []} +{"37965923|1236072": []} +{"32131892|205286988": ["However, SNs have limited battery life; therefore random deployment of large number of SNs may bring challenges to manage resources for efficient delivery of events in WSNs [3].", "Simultaneously a Search Table (ST) will be maintained and updated on real time basis as shown in Fig.[3].", "The selection of ZHs is an optimization problem and is evaluated by aggregate cost function fc [3], which is the aggregate sum of residual energy of each node fe, distance between current node to BS fd, and distance between current node to current Zonal Head f \u2032 d."]} +{"32131892|1236072": ["The frame formant of J-ADV will contain following fields of 1 byte each as shown in Fig.[2] :", "A WSN may contain hundreds of thousands of such SNs, which can communicate and share data among themselves using radio signals [2].", "The Pseudo-code of the Zonal Head Selection is defined as (Algorithm [2]):"]} +{"16114475|17683338": []} +{"16114475|15300368": ["Selection of a given type of sensor depends of desired application [29].", "In the field of WSNs, routing data from a source to a destination is a task that requires a build of fault tolerant, secure and fairness protocol [29]."]} +{"16114475|6275330": ["So, it appears some problems in networks architectures, QoS (Quality of Service), coverage, security, fault tolerance, etc. [3]."]} +{"16114475|1230643": ["A comparison of presented sensors technologies against their addressable range, computational capability and storage capacity is provided in [4].", "It's only possible to deploy a few nodes, these nodes are more expensive than terrestrial sensors, wireless communication is acoustic, the bandwidth is limited, the loss of signal is recurrent, propagation delays and synchronization problems are high [4, 19].", "Interested readers may refer to the survey proposed in [4], in order to have information about some commercial and research sensors prototypes based on the above parameters."]} +{"11369731|1236072": []} +{"11369731|1230643": ["In order to maximize the lifetime of the network, the protocols need to be designed from the beginning with the objective of efficient management of the energy resources [3].", "Some prior work discussing the various sensor network routing protocols have been [3, 7, 8, 9].", "In addition to these, several other factors such as the large number of nodes in sensor networks, the high failure rates of the sensor nodes, and the frequent use of broadcasting in sensor networks as opposed to the typically unicast communication in ad hoc networks [3] require new types of MAC [4, 5] and routing protocols, specifically targetted towards the requirements of WSNs."]} +{"10723238|1230643": []} +{"44725495|13310760": []} +{"44725495|13295407": []} +{"44725495|2295142": ["a) Node-Disjoint Paths b) Link-Disjoint Paths c)Partially \u2013Disjoint Paths Figure 4: Various types of paths disjointness [10]", "SPIN, Directed diffusion, Rumor Routing, LEACH, GAF, GEAR, GBR, CADR, MCFA, PEGASIS,\nTTDD, ACQUIRE, TEEN, APTEEN, and SPEED these protocols used the same energy level in their transmission of data [13], [15].", "[10] Sequence Assignment Routing (SAR) protocol[19], Minimum Energy Metric (MEM) [19], SPEED, Multipath Multi-SPEED (MMSPEED), Energy-aware QoS Routing Protocol and Delay-minimum Energyaware Routing Protocol (DERP) [10], Multi onstrained QoS Multi-Path routing Protocol (MCMP), MessageInitiated Constrained-Based Routing (MCBR),Energy Constrained Multi-Path routing Protocol (ECMP),EQSR, QuEst can be considered as the QoS-aware routing protocols[20].", "Examples: Directed diffusion, SMECN, MECN, ACQUIRE, GEAR, Rumor Routing [13][15].", "[10] Presents the comprehensive taxonomy on the existing multipath routing protocols for WSN along with explaining the operation of different protocols in detail.", "SPIN, Directed diffusion, Rumor Routing, GBR, CADR, ACQUIRE, MCFA[7], EAR[10] and\nCOUGAR,EAD, STCP[27][8] protocols are DC because they determine the next-hop on the route purely based on the query content which sent to certain region [7].", "MECN, SMECN [3], GAF, GEAR, Geographic Routing in Lossy WSNs [27] SAR, and SPEED are\nexamples of Location-Based.", "SPIN, Directed diffusion, Rumor Routing, GBR, CADR, ACQUIRE, MCFA[7], EAR[10] and COUGAR,EAD, STCP[27][8] protocols are DC because they determine the next-hop on the route purely based on the query content which sent to certain region [7].", "Examples: Rumor Routing, Directed Diffusion [10], ACQUIRE, GEAR (demand driven), SPIN [18]."]} +{"44725495|205286988": []} +{"44725495|1236072": ["Examples: MCFA, SPEED, LEACH, GAF, TEEN, PEGASIS, CADR, SAR, MECN, SMECN [13],\n[18].", "SPIN, Directed diffusion, Rumor Routing, LEACH, GAF, GEAR, GBR, CADR, MCFA, PEGASIS,\nTTDD, ACQUIRE, TEEN, APTEEN, and SPEED these protocols used the same energy level in their transmission of data [13], [15].", "SPIN, Directed Diffusion, LEACH, SPEED, SAR, TTDD, and GBR protocols classified into this category due to keep track of routes to all destinations in routing tables [15][24].", "MECN, SMECN, SAR, and HPAR protocols use different energy level in their transmission of data [13], [15].", "Examples: Rumor Routing, MCFA, SAR, LEACH, PEGASIS, GAF, GBR, ACQUIRE, GEAR, SPEED, MECN, SMECN, HPAR, CADR, TEEN, APTEEN [13], [15], [22], ECRA, Energy Aware Routing Protocol [3]", "Examples of this category are TEEN, GEAR, ACQUIRE, MCFA, PEGASIS, CADR, MECN, and SMECN protocols which acquire routes on demand and avoid saving information about the network topology [24],[15],[7],[25],[26].", "In these protocols the location information is needed in order to calculate the distance between two particular nodes so there is no addressing scheme in this category [7][12][15].", "Examples: Directed diffusion, SMECN, MECN, ACQUIRE, GEAR, Rumor Routing [13][15].", "Examples: GBR, GAF, CADR, TTDD, PEGASIS, SPIN, LEACH, HPAR, TEEN, APTEEN, MCFA [15], [13].", "Rumor Routing, HPAR, GAF, and APTEEN protocols are an example of hybrid routing because their selection route based on a combination of proactive and reactive approaches [24], [15], [25].", "SPIN, Directed diffusion, Rumor Routing, GBR, CADR, ACQUIRE, MCFA[7], EAR[10] and\nCOUGAR,EAD, STCP[27][8] protocols are DC because they determine the next-hop on the route purely based on the query content which sent to certain region [7].", "SPIN, Directed diffusion, Rumor Routing, LEACH, GAF, GEAR, GBR, CADR, MCFA, PEGASIS, TTDD, ACQUIRE, TEEN, APTEEN, and SPEED these protocols used the same energy level in their transmission of data [13], [15].", "Examples: GBR, GAF, CADR, TTDD, PEGASIS, SPIN, LEACH, HPAR, TEEN, APTEEN, MCFA\n[15], [13].", "LEACH, TEEN, APTEEN, PEGASIS, Hierarchical-PEGASIS[27] HPAR, , and TTDD are hierarchical protocols because all nodes in network forward a message for a node that is in a higher hierarchy level than the sender [7][15]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"41804858|10096622": ["Therefore, we propose the light-weight PSO due to its simplicity, fast convergence, and not heavy computational burden [18].", "Comparing with the ABC, the PSO needs fewer parameters to adjust, and has been applied in the routing protocols of WSNs [16,18] more frequently."]} +{"8310972|1230643": []} +{"16667767|1236072": []} +{"44962334|63137": ["The results presented in this section were obtained in [25,52,67].", "This is done by studying these algorithms under a common algorithmic framework called model-based search (MBS) [67].", "Zlochin et al. [67] have proposed a unifying framework for so-called model-based search (MBS) algorithms.", "The SGA parameter value update that we describe in the following is a generalization of the one that was presented in [67] (which was itself a generalization of the one that was given in [52])."]} +{"3826739|1236072": ["The simple description of WSN [4].", "The survey in [3,4,11] emphasized on the general routing algorithms.", "Although there are some previous efforts on surveying WSN [1, 3, 4, 5, 10, 11], the scope of the survey presented in this article is distinguished from these surveys.", "In Table 3, the characteristics are summarized and compared according to some popular metrics [4].", "Considering these unique characteristics, Designing suitable routing protocols in WSN is very challenging due to the inherent characteristics [4]."]} +{"3826739|1230643": ["The sensor nodes will collaborate with each other to perform distributed sensing and overcome obstacles, such as trees and rocks [1].", "The surveys in [1,5,10] addressed the general issues and techniques, such as the physical constraints on sensor nodes, applications, and architectural attributes.", "Recent advances of sensor technology have led to the development of micro-sensors with low power and highly integrated functions [1-3].", "Although there are some previous efforts on surveying WSN [1, 3, 4, 5, 10, 11], the scope of the survey presented in this article is distinguished from these surveys.", "Based on WSN, there are many exciting applications including military applications, environmental applications, health applications, home applications, other commercial applications [1, 5]."]} +{"34334662|13299749": ["Many clustering algorithms are in the literature [24\u201329]."]} +{"34334662|1230643": ["WSNs are utilized as a part of various applications, for example, environmental monitoring, medical monitoring, and so forth [1, 2]."]} +{"8076081|1236072": ["Last but not least they have to be scalable, robust and performance efficient [1] with an ability to keep the network operational for an extended period of time.", "A number of energy efficient variants of directed diffusion are surveyed in [1].", "But each node itself has limited hardware resources [1][8].", "The spectrum of applications includes target field imaging, intrusion detection, weather monitoring, security and tactical surveillance and disaster management [1][8]."]} +{"27859738|10096622": ["PSO advantages include ease of implementation on hardware or software, high-quality solutions because of its ability to escape from local optima and quick convergence (Kulkarni and Venayagamoorthy, 2011; del Valle et al., 2008)."]} +{"27859738|205286988": ["WSN nodes also can sense the environment, communicate with neighboring nodes, and in many cases perform basic computations on the data being collected (Zungeru et al., 2012; Akkaya and Younis, 2005)."]} +{"20764069|1236072": ["Designing the WSNs is very difficult because the sensor nodes have limited computation capability, limited power and small memory size[5][7]."]} +{"20764069|1230643": ["Designing the WSNs is very difficult because the sensor nodes have limited computation capability, limited power and small memory size[5][7]."]} +{"8153647|10096622": ["Analysis of the results are discussed in details in [49],[48]."]} +{"8153647|15300368": []} +{"40492333|41998167": []} +{"40492333|10096622": []} +{"40492333|205286988": []} +{"40492333|1230643": []} +{"29149382|205286988": []} +{"29149382|1230643": []} +{"15289844|205286988": ["978-1-4244-1688-2/08/$25.00 c 2008 IEEE dissipation by a factor of 7 when compared to direct communication and by a factor between 4 and 8 when compared to the minimum transmission energy routing protocol [ 7 ]."]} +{"1851475|1230643": []} +{"3574108|9830350": ["\u2026with the development of wireless communication and the low power RF (Radio Frequency) designs widely used in sensor nodes, wireless sensor networks (WSNs) have received great attention due to their wide usage in environmental monitoring, transportation, disaster rescue and homeland security [1,2]."]} +{"1161967|3826739": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|1236072": ["For more comprehensive surveys, the interested reader is referred to [1,2,4,10,46] and the references therein.", "General overviews can be found for instance in [2,4,10,46]."]} +{"1161967|14441987": ["The requirements of routing protocols for WSNs are similar to those of routing protocols for mobile ad hoc networks (MANETs) [69].", ", see [19,69] for more extensive discussions and examples)."]} +{"57090148|9830350": []} +{"57090148|1236072": []} +{"12999542|1230643": ["I. INTRODUCTION\nA sensor network is an interconnection of tiny, low-cost, low-powered and multi-functional sensor nodes [1], [2], [3]."]} +{"6342690|1940388": ["A review of security threats to WSNs and a survey of defense mechanisms is presented in [26]."]} +{"6342690|12817488": ["A survey of data aggregation algorithms used in WSNs is presented in [22]."]} +{"6342690|1230643": ["This scenario is used in most monitoring applications in agriculture [7], [8], microclimate [4], [5], [9] and habitat surveillance [10]\u2013[12], military operations [13], and disaster relief [14]."]} +{"6342690|1708582": ["RL [41], [42] is a sub-area of machine learning concerned with how an agent should take actions in an environment so as to maximize some notion of a long-term reward."]} +{"6342690|6555395": ["A survey of NN learning methods, their properties and applications is presented in [32]."]} +{"31544550|1230643": []} +{"60071381|5875539": []} +{"60071381|3894519": []} diff --git a/edge/graph_58670217.jsonl b/edge/graph_58670217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bb480b8693569e38658bb0abc10498497ecee25 --- /dev/null +++ b/edge/graph_58670217.jsonl @@ -0,0 +1,6 @@ +{"97776876|11407374": []} +{"34704358|8150108": ["So far, a variety of techniques has been reported for fabrication of microfiber gratings [35\u201344], which has been reviewed elsewhere [3,8].", "Like optical fiber gratings [2,34], microfiber gratings have been attracting increasing interest for optical sensing in recent years [8]."]} +{"138155396|15589021": []} +{"99215713|11407374": []} +{"85259493|10065043": []} +{"102936224|15589021": []} diff --git a/edge/graph_58672045.jsonl b/edge/graph_58672045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d66d8c6e56a97e56fcaaeb58797385542ac94d7 --- /dev/null +++ b/edge/graph_58672045.jsonl @@ -0,0 +1,23 @@ +{"30024429|206051485": ["Since, in most application cases, geometric distortions found in remotely sensed images can be modeled by \u201cshape-preserving mapping\u201d [1] (translation, rotation, and scaling only) without large errors, we adopt this simple model to estimate the transformation parameters between the two keypoint sets for better computational performance.", "1) Methods based on pixel intensities: The most representative similarity measures used in these methods are cross correlation (CC) [1] and mutual information [2] (MI).", "Among the four algorithms, CC is implemented according to [1], and the other three are implemented based on the publicly available code with the authors\u2019 help.", "Since remote image pairs often have no local distortions, the \u201cshape-preserving mapping\u201d model [1] is introduced into the registration algorithm in this letter.", "R(\u03c6) = { \u03c6, \u03c6 \u2208 [1, 180] 360 \u2212 \u03c6, \u03c6 \u2208 (180, 360) (1)", "The proposed algorithm is compared to methods including CC [1], ARRSI [12], SIFT [7], and SR-SIFT [11].", "IMAGE registration [1] is a vital step in tasks of remote image analysis, such as remote image fusion, environmental surveillance, change detection, map updating, and so on."]} +{"11460732|206051485": ["2514521 istration, and it has a wide range of applications in remote sensing, including environment monitoring, change detection, image fusion, image mosaic, and map updating [1]\u2013[3]."]} +{"17695308|206051485": ["The second approach for image registration is based on the extraction of salient structures \u2013 features \u2013 in the images, which can be represented as compact geometrical entities at different levels, such as points, line segments, curves, and surfaces [5,2].", "These methods can be broadly classified into three types: correlation-like methods, Fourier methods, and mutual information (MI) methods [2].", "Most registration methods assume global statistical dependence of the images to be aligned [5,2], and hence appearance features such as graylevels/colors, textures (e.", "There are in general two types of approaches for image registration: area-based methods and feature-based methods, as discussed in recent survey papers [2,15]."]} +{"30202852|8985853": ["IMAGE registration is frequently used in remote sensing for a variety of tasks such as change detection, image fusion, and image overlay [1]."]} +{"49434640|4570087": ["Each of them is further arranged based on the implementation details [22].", "Specifically, we first calculate the semantic distance between two samples via high-level layers of a CNN model [22], together with the Hamming distance using a local descriptor."]} +{"5024194|393948": ["Deep learning methods, especially convolutional neural networks (CNNs), have recently led to breakthroughs in many computer vision tasks such as object detection and recognition, and image segmentation and captioning [22]\u2013[24].", "Deep learning has completely transformed the performance of many computer vision tasks [23], [24]."]} +{"7549084|987239": []} +{"20143867|393948": ["Typical gradient-based backpropagation algorithm can be used for training single AE [34], [35].", "Speci\ufb01cally, we introduce a stacked autoencoder (SAE) [34], [37], [38], [42] with convolutional network architecture [41], [43] into our un-supervised learning framework.", "However, since the learned features are found using only a single layer, or a shallow model [34], the selected features may lack high-level perception knowledge (e.g., shape and context information) and may not be suitable for correspondence detection.", "Recently, unsupervised deep learning feature selection techniques have been successfully applied to solve many dif\ufb01cult computer vision problems [30], [34]\u2013[42]."]} +{"20143867|206051485": ["2496253 individual subjects to the reference space [1]\u2013[5]."]} +{"6920687|206051485": []} +{"13986129|393948": ["Deep learning [29]\u2013[32] is utilized to find high order dependency of the feature, which has been successfully Fig."]} +{"4570087|3693305": ["We refer readers to [67] for a survey of ANN approaches.", "For learning to hash, a recent survey [67] categorizes it into quantization and pairwise similarity preserving."]} +{"15994073|206051485": ["MLFFT is a necessary addition to the pseudopolar FFT for the following reasons: It has lower interpolation errors in both polar and log-polar Fourier transforms, it reaches better accuracy with the nearly same computing complexity as the pseudopolar FFT, and provides a mechanism to increase the\u2026"]} +{"119373275|8985853": []} +{"119373275|206051485": []} +{"3708885|2323881": ["Extracting high-quality face representations has always been a core task in face recognition [27]."]} +{"123033615|206051485": []} +{"5949069|4716814": ["drone navigation to go through forest trails [18], and many other tasks from perception to control [19]."]} +{"12303944|10355303": []} +{"38814373|3110415": ["A recent review on object detection in optical remote sensing images can be found in [26]."]} +{"17607100|7861381": []} +{"206592484|456491": []} +{"820399|3540699": ["264 video coding standard [22] to interpolate the pixels at subpel"]} diff --git a/edge/graph_58672147.jsonl b/edge/graph_58672147.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a49af8273f62a24eb0e680d08522d59e2b54ad4 --- /dev/null +++ b/edge/graph_58672147.jsonl @@ -0,0 +1,17 @@ +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"13006733|2457428": ["A detailed survey along with comparisons among various group key management protocols is described in [27]."]} +{"11295261|2457428": ["To show how this hierarchy can be supported, we propose extensions to one suitable key distribution protocol, Multimedia Internet KEYing (MIKEY) [1], to enable efficient rekeying through the application of the Logical Key Hierarchy (LKH) [2], [3] protocol.", "We propose four different methods to support hierarchical location information dissemination to provide flexible location privacy control.", "\u00c7"]} +{"15031785|4528002": ["4) As discussed previously and demonstrated repeatedly by many researchers [4]\u2013[6], [32], [33], any successful malware attack to a vehicle can cause significantlymore severe consequences than compromising consumer electronics.", "Once on a vehicle, malware can cause a wide range of disruptions and damages [4]\u2013[6], [32], [33].", "Themost damaging security threats, however, are only emerging as vehicles connect to the Internet, provide onboard Wi-Fi hotspot services, communicate with other vehicles and Intelligent Transportation System (ITS) infrastructures, and support advanced applications such as over-the-air (OTA)ECUfirmware update [4], [6], [32], [33].", "Knownvulnerabilities in thedesignand implementation of onboard communication systems, hardware, software, and applications [6], [33], [37] can be exploited by malware to infect a vehicle."]} +{"15031785|12815020": []} +{"13898149|13372227": []} +{"1083483|7216886": ["[141] (privacy-preserving data publishing), Bertino et al."]} +{"35205982|17594297": ["[121] provide detailed background discussion on IBC and give an overview of IBC applications in mobile ad-hoc networks."]} +{"6413228|10346685": ["Although this technique does not rely on any third party, the LBS provider can restrict the user in a small sub space of the total domain, leading to weak privacy."]} +{"2134031|4427557": ["More recently, standards specifically dedicated to IoT communications, such as LoRa [107], NB-IoT [108], eMTC or other Low Power Wide Area Network (LPWAN) standards [109], support positioning of the nodes to a certain extent."]} +{"2134031|3348390": ["Within all the context sensing information, the location information plays important roles [5]."]} +{"11421219|17934515": []} +{"206745338|13372227": []} +{"15039314|10346685": ["Private Information Retrieval [18]: This technique allows a user to retrieve a record from a database server without revealing which record he is retrieving."]} +{"206755277|35462776": []} +{"19243501|2335874": ["The periodic beaconing information includes location, velocity, direction, acceleration, and vehicle type [95]."]} +{"5934298|13372227": ["Finally, the adversary may estimate the user location by using cellular positioning techniques [34], e."]} diff --git a/edge/graph_58673472.jsonl b/edge/graph_58673472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9295842b2f2d3546c669f4cfd4ce71807588701c --- /dev/null +++ b/edge/graph_58673472.jsonl @@ -0,0 +1,16 @@ +{"3360245|5860048": ["Temporal dependency and spatial dependency are mostly used contextual information in the literature [14, 17]."]} +{"3360245|7774517": ["levels or time-bands [23], such as spikes caused by a bus idling near a sensor (the minutes time band), York race days (the day time band), and roadworks (the week time band).", "The authors in [23] suggests that data that is difficult to be separated in one feature space may be easier to be separated in another feature space.", "Therefore, our data processing is mainly focused on compensating sensor issues, such as sensors calibration and anomaly detection [3, 23]."]} +{"29532810|1230643": ["While modern research on sensor networks started on the late seventies [6], this paradigm acquired an identity of its own at the beginning of the twenty-first century [21]."]} +{"15171166|9932808": ["\u2026methods, such as Theil-Sen estimator [20], which chooses the median slope among all lines through pairs of points, total least squares regression [32], which optimizes the sum of squared orthogonal residuals to the regression line, and Deming regression [13], which is the maximum likelihood\u2026"]} +{"2879480|7774517": ["techniques in general [29] and for wireless sensor networks in particular [30]."]} +{"2879480|3330313": ["techniques in general [29] and for wireless sensor networks in particular [30]."]} +{"64856897|18599847": []} +{"64856897|393948": []} +{"114911121|2742199": []} +{"114911121|15589021": []} +{"206763869|2742199": []} +{"39829664|6950376": ["Trust management schemes have been proposed in routing and communications [13]."]} +{"39829664|1940388": ["In general, an attacker can launch a number of attacks against a sensor network as shown in the literature [11]."]} +{"15770872|31246274": []} +{"96079378|15589021": []} +{"96079378|11407374": []} diff --git a/edge/graph_58674579.jsonl b/edge/graph_58674579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dfc089c86652414ccb58751e6901a4710fc2794b --- /dev/null +++ b/edge/graph_58674579.jsonl @@ -0,0 +1,9 @@ +{"99528|17756238": []} +{"2252698|17950466": ["Keystroke dynamics is a strong behavioral biometric [2012] [27] that deals with the unique characteristics present in an individual's typing rhythm i.e. when each key was pressed and when it was released as a person types at computer keyboard."]} +{"2273948|17574321": ["[12], Kinnunen and Li [13], and Campbell [14].", "There are two basic approaches to this issue, like signal preprocessing discussed in [13], direct session mismatch modeling as presented in [35] or score normalization discussed extensively in [36]."]} +{"8918672|6670217": ["and the recent surveys regarding mobile security [125], malware propagation modeling [166] and evolution [204], [242]."]} +{"8918672|15219853": []} +{"8934693|18609918": []} +{"16527268|5313655": []} +{"16527268|359842": []} +{"6198703|192934": ["However for feature selection using SFFS, the best performance is obtained with 32 face granules.", "3 Further, to evaluate the effectiveness of the proposed multiobjective genetic approach for feature selection and assimilation, the performance is compared with other feature selection methods, namely, definitive feature selection (referred to as \u201cEUCLBP+SIFT+PCA\u201d), SFS [19], and SFFS [19].", "3 Further, to evaluate the effectiveness of the proposed multiobjective genetic approach for feature selection and assimilation , the performance is compared with other feature selection methods, namely, definitive feature selection (referred to as \" EUCLBP+SIFT+PCA \" ), SFS [19], and SFFS [19].", "As shown in Table I, the proposed algorithm outperforms SFS by at least 6.66% and SFFS by at least 5.74% in rank-1 identification accuracy on both the databases.", "\u2022 While comparing with existing feature selection approaches , SFS and SFFS algorithms are used to select either EUCLBP or SIFT features for each face granule based on the identification accuracy (optimization function ).", "In SFS, the best performance is achieved with all 40 face granules.", "Sequential feature selection (SFS) [19] and sequential floating forward selection (SFFS) [19] are widely used feature selection methods that evaluate the growing feature set by sequentially adding (or removing) the features one-at-a-time.", "Unlike SFS and SFFS algorithms, the proposed multiobjective evolutionary granular algorithm allows for simultaneous optimization of feature selection and weights for each face granule."]} diff --git a/edge/graph_5868840.jsonl b/edge/graph_5868840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4941940366540c8381c60f6cdc3c910112db826a --- /dev/null +++ b/edge/graph_5868840.jsonl @@ -0,0 +1,2 @@ +{"122684233|10907226": ["2, and we mention it only in order to show that we can go further than the original threshold, a fact that is interesting due to its implication for the reconstruction problem [20] as mentioned in the Introduction.", "Second, because of an intimate connection between the free boundary case and so-called \u201creconstruction problems\u201d on trees [20] (in which the edges are noisy channels and the goal is to reconstruct a value transmitted from the root), we obtain an alternative proof of the best known value of the noise parameter under which reconstruction is impossible [21]."]} +{"9541318|5868840": ["More recently, various further improvements have been made (see [11] for a survey)."]} diff --git a/edge/graph_5871627.jsonl b/edge/graph_5871627.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fe0aa9ae8155dd9bf82066947d590c3aecb4436 --- /dev/null +++ b/edge/graph_5871627.jsonl @@ -0,0 +1,10 @@ +{"11473206|38476": ["Sequential labeling tasks are also known as sequential supervised learning problems [43] and can be formulated as follows:"]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"6413523|431089": []} +{"17855958|9240891": ["Many different versions of definition of trust are proposed in the literature (Deutsch [13], Sztompka [54], Mui et al. [44], Olmedilla et al. [47], Grandison and Sloman [20], Artz and Gil [6]).", "[47], Grandison and Sloman [20], Artz and Gil [6])."]} +{"564263|2809360": ["Each discovered named entity belongs to one of the dictionary semantic types and has attributes for (1) the text span associated with the named entity (\u2018span\u2019 attribute), (2) the terminology/ontology code the named entity maps to (\u2018concept\u2019 attribute), (3) whether the named entity is negated (\u2018negation\u2019 attribute), and (4) the status associated with the named entity with a value of current, history of, family history of, possible (\u2018status\u2019 attribute).", "There are several major sources of errors: (1) sentences starting with titles, especially \u2018Dr \u2019 and \u2018Mr \u2019; (2) sentences", "One set was additionally split into three subsets: (1) for developing the guidelines (150 sentences), (2) for training (400 sentences), and (3) for measuring IAA (200 sentences).", "We did not separately evaluate the off-the-shelf normalizer, which is used to improve the recall defined in equation (2) of the NER annotator.", "Global evaluation and applications We have conducted global evaluations of cTAKES for two largescale phenotype-extraction studies: (1) ascertaining cardiovascular risk factors for a case-control study of peripheral arterial disease using the EMR within the eMERGE(66) and (2) treatment classification for a pharmacogenomics breast cancer treatment study within the PGRN.", "recall 1\u20444 TruePositives TruePositives \u00fe FalseNegatives (2)"]} +{"304226|5871627": ["Other examples include news websites which produce condensed descriptions of news topics usually as headlines to facilitate browsing or knowledge extractive approaches [8, 61, 72]."]} +{"304226|10157083": ["Since then, many works have been published to address the problem of automatic text summarization (see [24, 26] for more information about more advanced techniques until 2000s)."]} +{"7120895|3102110": ["An overview of data mining from the database perspective can be found in [CHY96]."]} +{"2055349|8310135": ["Nadeau and Sekine (2007) reported that a strong trend exists recently in applying machine learning (ML) techniques such as Support Vector Machine (SVM) (Kazama et al., 2002; Isozaki and Kazawa, 2002) and Conditional Random Field (CRF) (Set-tles, 2004) to NER, which can address these issues."]} diff --git a/edge/graph_5874909.jsonl b/edge/graph_5874909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5875539.jsonl b/edge/graph_5875539.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e608f23b3266e9d8f92d5a739de1ff711f3f7d0e --- /dev/null +++ b/edge/graph_5875539.jsonl @@ -0,0 +1 @@ +{"7038467|205286988": ["Proposed protocols can be classified into data-centric, hierarchical, location-based, network flow and QoS-aware routing [ 6 ]."]} diff --git a/edge/graph_58783012.jsonl b/edge/graph_58783012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed316ef9f7f029e46c98ff687767bf08574315c8 --- /dev/null +++ b/edge/graph_58783012.jsonl @@ -0,0 +1,11 @@ +{"9132272|8914588": ["Although OSGi enables on-the-fly deployment of bundles, gives an ability to manage their configuration and enables management of services properties exposed by these bundles, all these management operations have to be done manually by the administrator."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"10352747|10693567": ["[16] present an OpenFlow-oriented survey and concentrate on a two-layer architecture of SDN:"]} +{"10352747|3029414": ["The three proposed control plane abstractions in [18], [74] are as follows:"]} +{"10352747|3189715": ["The survey on programmable networks presented in [1] is a more comprehensive but less recent.", "infrastructure and supporting logical network topologies that differ from the physical network are two common concepts to programmable networks and network virtualization [1], [152].", "programmability exist in the literature [1].", "Thus, proposals for a new networking paradigm, namely programmable networks [1], have emerged"]} +{"15193700|14552902": []} +{"15193700|763939": []} +{"15193700|205286988": []} +{"15193700|1230643": []} +{"22204217|13372398": []} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} diff --git a/edge/graph_58797913.jsonl b/edge/graph_58797913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_588036.jsonl b/edge/graph_588036.jsonl similarity index 100% rename from graph_588036.jsonl rename to edge/graph_588036.jsonl diff --git a/edge/graph_5882203.jsonl b/edge/graph_5882203.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fb3bdac5657d9460208cd838cd483d4afd63781 --- /dev/null +++ b/edge/graph_5882203.jsonl @@ -0,0 +1 @@ +{"14668250|5660618": ["\u2026a Department of Civil and Environmental Engineering, MIT, USA b Department of Electrical Engineering and Computer Sciences, UC Berkeley, USA\na r t i c l e i n f o\nArticle history: Received 17 July 2010 Received in revised form 21 June 2012 Accepted 20 July 2012 Available online 29 October\u2026"]} diff --git a/edge/graph_58828847.jsonl b/edge/graph_58828847.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb8e64a37e9d1a680660ca8a4f1057a04f7557ca --- /dev/null +++ b/edge/graph_58828847.jsonl @@ -0,0 +1,27 @@ +{"4505261|3273340": []} +{"4505261|19034128": ["supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "There are three main types of learning, i.e. supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "One of the representative learning methodologies is Machine Learning, that is related to changes in the systems that perform tasks associated with artificial intelligence such as recognition, diagnosis, prediction, etc. [23]."]} +{"7119260|207209718": ["Type Comms Location Attack Types Input Features Detection approach\nMitchell, Chen [13], [14], [15] Mobile CPS Wireless Host Based, Network Based Bad Command Injection, Node Hijack\nPosition, Battery Exhaustion Rate\nNodes Compromised\nDynamic IDS Voting, Positional Discontinuity,\nEnviroconsistency\nFagiolini et al. [16], [17] Multi-Robot System Wireless Host Based, Decentralized Misbehaviour\nNode Reputation, Behaviour score,\nDistance Estimation\nClustered Monitoring, Voting\nBonaci et al. [18] Robotic Surgery System Wired Host Based, Network Based\nIntent Modification, Control Hijack\nMotor Performance, Network Performance Recommendations for Network Monitoring\nShetty et al. [19]\nMulti-Robot System Wireless Host Based, Network Based Decentralized\nDenial Of Service\nLack of Connectivity Network Monitoring\nVuong et al. [7]\nRemotecontrolled\nRobot Wired Host Based Denial OfService\nMotor Performance, Network Peformance Rule-based\nZeng et al. [20]\nFagiolini et al. [21]\nBicchi et al. [22]\nMulti-Robot System Wireless\nHost Based, Role Based\nNetwork Based Decentralized\nNode Failure, Node Misbehaviour\nNetwork Performance, Behaviour Score, Node Reputation, Neighbour State,\nNeighbour Actions, System Configuration,\nAgent Position\nReputation Based, Consensus Based,\nSet-Valued Consensus\nMulti-agent approaches focus on coordination between different agents (e.g, between different driverless vehicles or robots [19]) in their effort to detect one agent\u2019s suspicious actions, reports, configuration or location.", "Following the terminology proposed by Mitchell and Chen [10] for intrusion detection of cyber-physical systems, we evaluate the combined use of cyber and physical input features", "Following the terminology proposed by Mitchell and Chen [10] for intrusion detection of cyber-physical systems, we evaluate the combined use of cyber and physical input features on a knowledge-based machine learning algorithm."]} +{"7119260|825893": ["Here, we focus on denial of service attacks [6] that can affect robotic vehicles by delaying or preventing commands from reaching their movement control system, as well as command injection attacks that provide the robot with conflicting control com-"]} +{"65181069|7188493": []} +{"65181069|4528002": []} +{"65181069|62617427": []} +{"24856744|2142482": ["Cyber-security has been an active research area over the last two decades as evident from the numerous papers and review articles published in this area [4]\u2013[6]."]} +{"24856744|207209718": ["One such classification is to categorize the works into ones which address the problem of external intrusion detection using algorithmic methods [7]\u2013 [20] and works which use hardware-enhanced security methods to identify and mitigate internal security threats [21]\u2013 [24]."]} +{"18468106|207209718": ["Intrusion detection in cyber-physical systems is a relatively new area of research [8], which tends to focus on industrial control systems, such as programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems."]} +{"18468106|2523102": ["As real-world and experimental cyber-physical attacks are becoming more prevalent, onboard intrusion detection systems are expected to become particularly important, especially for standalone robotic vehicles, whether manned or unmanned [25] ."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"2142482|14745481": ["We recognize that many reputation and trust management systems actually take into consideration of both multitrust and unitrust in trust composition [49, 50, 51, 52, 53, 54, 55, 56, 57]."]} +{"11010663|4528002": ["14 counter 8 start value=151 const 3 constant value=4 const 12 constant value=1717 mv 7 set of values=[51,113,90,37,20,22,53,115,35,32,18,93,40,78,59,88,38,78,86,84] sensor 14 wave length=30, DC=9000, amplitude=1047, phase=3."]} +{"3631928|10283694": []} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} +{"15863168|2523102": ["A comprehensive review of cyber threats related to communication, sensing, information management and vehicular technologies used in emergency management is given in [1], while a taxonomy providing a global view of the respective attack types and defense mechanisms is presented in [2]."]} +{"207249940|4528002": ["[2, 9, 10] CAN bus signals are indexed by a process ID (PID), specified in the packet header, and are generally associated with a fixed function (running lights, sensors, door locks, etc.) The specific PID-to-function mapping of signals is dependent on the make and model; e.g., signals with PID 3A1\u2026"]} +{"52163583|5538934": []} +{"52163583|1932843": ["RL is a type of ML where an agent learns an optimal behavior (or policy) through interactions with its environment and observing performance feedback in the form of positive and negative rewards [25]."]} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} diff --git a/edge/graph_5884549.jsonl b/edge/graph_5884549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8765b92bf8f5c276b5a5695e18e243995da6f534 --- /dev/null +++ b/edge/graph_5884549.jsonl @@ -0,0 +1,3 @@ +{"1044133|192934": ["Although asymptotically \nef.cient approximation algorithms exist, these algorithms are not practical due to the extremely high \ncon\u00adstant factors involved."]} +{"11762786|191396": ["For an overview of applications of various dissimilarity measures and clustering algorithms we refer to [17, 23]."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} diff --git a/edge/graph_58885087.jsonl b/edge/graph_58885087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5888685.jsonl b/edge/graph_5888685.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c64c1239f3ca3a68c1df09ce7b77eed9e858ea29 --- /dev/null +++ b/edge/graph_5888685.jsonl @@ -0,0 +1,4 @@ +{"4979708|2187403": ["The \ufb01ltered client query is shown in Figure 5b."]} +{"15992154|386036": []} +{"15881827|60455": ["Herbert, JingTaoYao Department of \nComputer Science University of Regina, Regina, Canada, S4S 0A2 {herbertj, jtyao}@cs.uregina.ca Abstract \nMany information retrieval and machine learning methods have not evolved in order to be applied to the \nWeb."]} +{"15273056|1113420": ["Linked Data, Ubiquitous Web, Access Control"]} diff --git a/edge/graph_58892996.jsonl b/edge/graph_58892996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58901801.jsonl b/edge/graph_58901801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d2440e6fb920ba191ac3b7417a5c583719d2d12 --- /dev/null +++ b/edge/graph_58901801.jsonl @@ -0,0 +1,2 @@ +{"45746|2795037": ["A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al. (1995). Madigan et al. (in press) discuss various extensions of the the original squashing approach. Provost and Kolluri (1999) provide an overview of different techniques for scaling up data mining algorithms to handle very large data sets. Provost, Jensen, and Oates (1999), and Domingos and Hulten (2000) give examples of sampling problems with very large databases in data mining.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al.", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997).", "A recent survey of query optimization is Chaudhuri (1998). The data cube is presented in Gray et al. (1996) and Gray et al. (1997). A good introduction to OLAP is Chaudhuri and Dayal (1997). Implementation of database management systems is described in detail in Garcia-Molina et al. (1999). A nice discussion of OLAP and statistical databases is given by Shoshani (1997). Issues in using database management systems to implement mining algorithms are considered in Sarawagi et al. (2000) and Holsheimer et al."]} +{"45746|8125630": []} diff --git a/edge/graph_58903212.jsonl b/edge/graph_58903212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58906038.jsonl b/edge/graph_58906038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58907064.jsonl b/edge/graph_58907064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58915460.jsonl b/edge/graph_58915460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..116a887c5a8e300959396c68183696684e5c8bfb --- /dev/null +++ b/edge/graph_58915460.jsonl @@ -0,0 +1 @@ +{"26546513|15199849": []} diff --git a/edge/graph_58927166.jsonl b/edge/graph_58927166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f0a1882ceae97142c6833ae78285a6cf693bcbe --- /dev/null +++ b/edge/graph_58927166.jsonl @@ -0,0 +1,2 @@ +{"108144027|18540390": ["The domain research provided numerous views of these stages of knowledge (Birkinshaw et al. 2002; Satyadas et al. 2001; Zack 1999b)."]} +{"1354964|8813834": []} diff --git a/edge/graph_58934632.jsonl b/edge/graph_58934632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58938769.jsonl b/edge/graph_58938769.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5894085.jsonl b/edge/graph_5894085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58948922.jsonl b/edge/graph_58948922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..560faab5a92f8b5a3da844d7936e6fc1ec05d5a2 --- /dev/null +++ b/edge/graph_58948922.jsonl @@ -0,0 +1,12 @@ +{"33424493|7971188": ["31 Mathematical models of small worlds\u2014originally built with human networks in mind\u2014can provide insights into the design of efficient solutions for this distributed search problem as well."]} +{"4903061|15449163": []} +{"32305630|3330461": ["As a paradigm of short-distance communication, D2D communication which transmits data through devices over a direct link, shows us a brand newway to increase spectrum efficiency and energy efficiency [4], [5]."]} +{"1841699|3330461": []} +{"57754904|3330461": ["As an example of short-distance communication, device-to-device (D2D) communication allows users to communicate directly by multiplexing cellular spectrum resources, which can improve the spectral efficiency and enlarge the system capacity [3], [4]."]} +{"22923383|19938676": ["namely Device\u2013to\u2013Device (D2D) communication, emerges as a promising solution for cellular network offloading [2]."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"17622766|1898434": ["We use DSA because, with respect to other similar algorithms, it is proved to come to a solution quicker [17]."]} +{"17622766|1236072": ["CHs reach the GW using a Cluster Based routing protocol [12]."]} +{"13380373|19938676": ["IoT requirements through the next-to-come fifth generation (5G) wireless systems [11]."]} +{"20074869|1442447": []} +{"20074869|3330461": ["The Devices to Devices (D2D) communication is emerging as a key technology enabling a direct communication among devices, bypassing the network infrastructure [25]."]} diff --git a/edge/graph_5895133.jsonl b/edge/graph_5895133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11b02aa389a14ee80aa5176cc1a0e4a1ed79d9fb --- /dev/null +++ b/edge/graph_5895133.jsonl @@ -0,0 +1 @@ +{"163275|10559330": []} diff --git a/edge/graph_5897684.jsonl b/edge/graph_5897684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_58981448.jsonl b/edge/graph_58981448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..818a7e94af5c02eba95f9ac1d85f0792806dcb1e --- /dev/null +++ b/edge/graph_58981448.jsonl @@ -0,0 +1,20 @@ +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} +{"1033682|174797842": []} +{"955516|393948": []} +{"49476505|10355303": ["We discuss the tracking methods that are most related to our work in this section, and refer the readers to a thorough review on object tracking survey [47] [24] and benchmark evaluations [38] [45]."]} +{"9764556|8446711": ["Recently, grayscale-thermal tracking has drawn much attention with the popularity of thermal infrared sensors [8]."]} +{"13691047|10175374": ["For an overview of deep multi-task learning techniques the interested reader is encouraged to refer to the work of Ruder [49]."]} +{"16636683|393948": ["By abstraction we mean that the feature is invariant to the variants of the same concept [2].", "Second, multilayer perceptron can be a deep model itself, which is consistent with the spirit of feature re-use [2]."]} +{"4725956|10175374": ["For an overview of deep multi-task learning techniques the interested reader is encouraged to refer to the work of Ruder [22]."]} +{"4796796|15361180": ["The models for crossmodality retrieval can be classified into real-value representation and binary representation learning [43]."]} +{"10902413|14674468": ["Work on classifying age and race from faces can also be found in the literature, with in-depth surveys available [14, 13]."]} +{"12588302|393948": ["the work in [3] shows that the performance will drop slightly when removing the fully-connected layers.", "CNN Between Single and Multi-Labels: Using CNN for single label prediction is intensively studied [3], [24].", "It has also been shown that CNN is able to generate robust and generic features [3], [40].", "CNN for Feature Learning: CNN was born in the Deep Learning (DL) era [3], [6], [24]; its goal is to model high-level abstractions of visual data by using multiple non-linear transformation architectures."]} +{"12588302|11608263": ["If the problem is adapted as is, a challenge arises when the number of labels increases and the potential output label combinations become intractable [54].", "Attributes and Multi-Labeling: Image multi-labeling is simply learning to assign multiple labels to an image [37], [54].", "It is also more likely to appear in real word scenarios, at which point, an image would need to be tagged with a set of labels from a predefined pool [41], [54]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} +{"207690211|359842": ["As an umbrella term, person attributes refer to the attributes of people, such as facial and clothing attributes [21], and biological traits [9] (e."]} +{"43942930|8446711": [". Integrating visible and thermal (called RGB-T in this paper) spectrum data has been proven to be effective in boosting tracking performance, and also allows tracking target objects in day and night [1]. Visible and thermal information complement each other and contribute to visual tracking in different aspects. On one hand, thermal infrared camera can capture infrared radiation (0.75-13m) emitted "]} +{"207211581|11608263": ["In a survey on multilabel classification, Tsoumakas and Katakis (2007) distinguish between two categories of approaches, namely, those which employ a transformation into a set of binary classification problems and approaches adapting existing methods to handle multilabeled data directly.", "In a survey on multilabel classification, Tsoumakas and Katakis (2007) distinguish between two categories of approaches, namely, those which employ a transformation into a set of binary classification problems and approaches adapting existing methods to handle multilabeled data directly."]} +{"206592484|456491": []} +{"2073877|393948": ["Recently, deep learning based attribute models have started to gain attraction [21, 33, 10, 9], due to deep model\u2019s capacity for learning more expressive representations when large scale data is available [17, 2, 39]."]} +{"53722003|11608263": ["The binary context as used in ECC usually entails considerable redundancy in the learning space, as also noticed in the case of the multi-label binary approach in Yan et al. (2007). Some other methods have also been used in the literature for reducing the complexity of binary relevance problems by taking advantage of label sparsity using compressive sensing techniques (Tai and Lin 2010; Hsu et al.", "The most common problem transformation method is the binary relevance method (BR) (Tsoumakas and Katakis 2007; Godbole and Sarawagi 2004; Zhang and Zhou 2005).", "Here, Label Cardinality (LCARD) is a standard measure of \u201cmulti-labelled-ness\u201d, introduced in Tsoumakas and Katakis (2007). It is simply the average number of labels associated with each example; defined for N examples as:"]} diff --git a/edge/graph_58981453.jsonl b/edge/graph_58981453.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4dc3590d9d7e7355305a6a20b36633a029fb558b --- /dev/null +++ b/edge/graph_58981453.jsonl @@ -0,0 +1,18 @@ +{"13516887|6746689": ["thinning the features to skeletons [20];"]} +{"31158091|17516538": ["There are a large number of motion detection methods available of which most are based on manually designed algorithms such as temporal difference and background modelling techniques (Hu, Tan, Wang, and Maybank 2004)."]} +{"23480264|16897832": ["All these approaches have been successfully applied to a wide range of problem domains: optimization [72], parameters\u2019 estimation [73], classification [74], feature selection [75], and in image processing and computer vision applications [76]\u2013[78]."]} +{"23480264|12127129": ["Starting from approaches based on a simple difference of pixels, many video change detection algorithms have been proposed in [2]\u2013[5]."]} +{"38925191|3330313": []} +{"38925191|206051485": []} +{"21861428|15369615": []} +{"21861428|6746689": []} +{"30523419|16897832": ["Interestingly for the scope of this manuscript meta-heuristically empowered feature selection schemes have lately come into scene in a diversity of scenarios [6]\u2013[13] with particular emphasis in Energy applications [14, 15] and Bioinformatics [16, 17]."]} +{"9857537|17516538": ["Another early work is from Howard et al., who generated vehicle detectors based on GP to locate targets on Infrared\nLine Scan images taken from industrial, urban and rural environments [17].", "For example Stauffer et al. proposed a background model based on \u201cN\u201d mixture of Gaussians."]} +{"13045284|15369615": []} +{"19026376|6387482": ["The work in [3] presents a state-of-the-art overview of fusion strategies with the analysis properly organized on the topics of levels of fusion, how, when, and what to fuse."]} +{"21852873|15369615": ["It has developed over many years [2], and there are many different approaches to detecting edges [1][3].", "Differentiation-based approaches have been popularly applied to edge detection [3].", "In edge detection, differentiation-based approaches have been popularly used to extract edge features [1][3]."]} +{"13353896|15369615": ["Canny detectors [11] are derived from an optimal edge detector which turns out to be well approximated by the derivative of a Gaussian function [12]."]} +{"13353896|19004624": ["GP [15] has been applied to various fields [16][17][18][19]."]} +{"33728604|17516538": ["In many real world vision applications, such as security surveillance systems, traffic control systems, and robotics navigation systems, segmenting targets from background based on motion is a crucial step before performing tasks like classification and tracking [7]."]} +{"23465777|15369615": []} +{"31971618|7158350": ["In addition, neural networks can get trapped into following after local minima [3].", "Among the neural network types, the back propagation feedforward neural network has widely been used for classification [3], [12]."]} diff --git a/edge/graph_58981557.jsonl b/edge/graph_58981557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..153463f4458b2bf199088fe8e7e42234fe714f75 --- /dev/null +++ b/edge/graph_58981557.jsonl @@ -0,0 +1,9 @@ +{"207743293|1143625": []} +{"32730475|195881905": []} +{"32730475|181631491": []} +{"47018172|207743293": ["As the bene\ufb01ts of using a sequential approach were suggested by previous studies of rumour stance classi\ufb01cation and rumour detection tasks (discussed in Section 2), we are following the branchLSTM approach described in Zubiaga et al. (Zubiaga et al., 2018b).", "We use two publicly available datasets of rumours: PHEME (Zubiaga et al., 2016; Zubiaga et al., 2017) and RumourEval (Derczynski et al., 2017) that contain different levels of annotation for the tasks of rumour detection, rumour stance and veracity classi\ufb01cation.", "The rumour resolution process has been de\ufb01ned as a pipeline involving four sub-tasks (Zubiaga et al., 2018a) (see Figure 1): (1) rumour detection, determining whether a claim is worth verifying rather than the expression of an opinion; (2) rumour tracking, collecting sources and opinions on a rumour as it unfolds; (3) stance classi\ufb01cation, determining the attitude of the sources or users towards the truthfulness of the rumour, and (4) rumour veri\ufb01cation, as the ultimate step where the veracity value of the rumour is predicted.", "Rumours in this dataset were labeled as true, false and unveri\ufb01ed by professional journalists (Zubiaga et al., 2016).", "While there are different possibilities for structuring this pipeline, here we adopt the architecture of a rumour classi-\ufb01cation system proposed in Zubiaga et al. (2018a) (see Figure 1).", "Previous work on stance classi\ufb01cation (Lukasik et al., 2016; Kochkina et al., 2017; Zubiaga et al., 2017; Zubiaga et al., 2018b) has explored the use of sequential classi\ufb01ers, treating the task as one that evolves over time; it has been shown that these sequential classi\ufb01ers substantially\u2026", "Previous work on stance classi\ufb01cation (Lukasik et al., 2016; Kochkina et al., 2017; Zubiaga et al., 2017; Zubiaga et al., 2018b) has explored the use of sequential classi\ufb01ers, treating the task as one that evolves over time; it has been shown that these sequential classi\ufb01ers substantially outperform standard, non-sequential classi\ufb01ers.", "A recent survey (Zubiaga et al., 2018a) de\ufb01nes rumour detection as the task which distinguishes ru-mours (unveri\ufb01ed pieces of information) from non-rumours (all other circulating information).", "The rumour resolution process has been de\ufb01ned as a pipeline involving four sub-tasks (Zubiaga et al., 2018a) (see Figure 1): (1) rumour detection, determining whether a claim is worth verifying rather than the expression of an opinion; (2) rumour tracking, collecting sources and opinions on a\u2026"]} +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} +{"1731192|207743293": ["Several authors have also faced detection of misinformation (Hamidian & Diab, 2016; Wu et al., 2017; Shu et al., 2017; Zubiaga et al., 2018; Ko et al., 2019; Yang et al., 2019), whose discussion is out of the scope of this work."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"17931639|6923178": ["\u2022 Matthew Correlation Coefficient (MCC from now on) [37]: the estimator of the correlation between the predicted class and the real class of the samples, defined as:"]} diff --git a/edge/graph_58981568.jsonl b/edge/graph_58981568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4d53118e472a30ab8e6ae9a49d2bbf249c3bed7 --- /dev/null +++ b/edge/graph_58981568.jsonl @@ -0,0 +1,4 @@ +{"983224|1708582": ["Reinforcement learning (RL) is a form of machine learning used to solve problems of interaction (Bertsekas & Tsitsiklis, 1996; Kaelbling, Littman & Moore, 1996; Sutton & Barto, 1998)."]} +{"16872689|1708582": []} +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} +{"5928833|1708582": ["have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996).", "\u2026is a self-contained and yet relatively short summary that can help newcomers to the field to develop a good sense of the state of the art, as well as existing researchers to broaden their overview of the field, an article, similar to that of Kaelbling et al. (1996), but with an updated contents.", "In 1996, Kaelbling et al. have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996)."]} diff --git a/edge/graph_58981713.jsonl b/edge/graph_58981713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec416079fe5938333a7b75f32d64c6e6c2c8611c --- /dev/null +++ b/edge/graph_58981713.jsonl @@ -0,0 +1,16 @@ +{"10048734|38476": ["Our approach allows us to efficiently incorporate domain and task specific constraints at decision time, resulting in significant improvements in the accuracy and the \u201chuman-like\u201d quality of the inferences."]} +{"4956100|17652653": ["Paraphrase generation (Androutsopoulos and Malakasiotis, 2010; Madnani and Dorr, 2010) has been tackled using many different methods, including those based on hand-crafted rules (McKeown, 1983), synonym substitution (Bolshakov and Gelbukh, 2004), machine translation (Quirk et al."]} +{"8379583|393948": ["\u2026achieved in recent years using machine learning \u2217 The \ufb01rst two authors contributed equally. methods, more speci\ufb01cally with neural architectures [1]; however, it is worth noting that many of the most successful approaches, in particular convolutional and recurrent neural networks, were known for\u2026"]} +{"3946090|8310135": ["This can be approached as a relation extraction task by a pipeline of separate subtasks, comprising (i) named entity recognition (NER) [4] and (ii) relation extraction [5]."]} +{"1033682|174797842": []} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"195346133|14341962": ["An up-to-date review of the work done in those domains can be found in [21]."]} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"52056726|8310135": []} +{"7228830|17652653": []} +{"4111957|14258620": []} +{"3274404|3519414": ["ication domains, such as computer vision, natural language processing, and speech recognition. Those modern machine learning techniques have also demonstrated great potentials in clinical informatics [36]. For example, deep learning has been used to learn effective representations for patient records [14, 26] to support disease phenotyping [8] and conduct predictive modeling [9, 30, 33]. A recent stud"]} +{"3147007|6337591": ["This dialogue literature thus widely applies reinforcement learning (Walker, 2000; Schatzmann et al., 2006; Gasic et al., 2013b; Singh et al., 1999; Singh et al., 2000; Singh et al., 2002) to train dialogue policies."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"3397190|10137425": ["We also expect to see more research on multimodal learning [190] as, in the real world, language is often grounded on (or correlated with) other signals."]} +{"15718491|15222577": ["That is, it could give low accuracy when is applied on such a different domain from what it was learned from [4].", "This new technology results in a massive amount of raw data for which creative data mining techniques are needed in order to extract valuable knowledge."]} diff --git a/edge/graph_58981813.jsonl b/edge/graph_58981813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33580f3fafea6fd69168da490da0773dc154d36e --- /dev/null +++ b/edge/graph_58981813.jsonl @@ -0,0 +1,7 @@ +{"16763290|2521001": ["many of them are already solved and the smart home system using IoT is developed [6] [15-17] [20].", "In Smart home user can easily monitor and control all home devices/home appliances through internet [1] [3] [4] [6] [12]"]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"8283897|2415608": ["This paper will conclude in Section V by analysing current efforts and future roadmaps to resolve these outstanding issues."]} +{"8283897|2357830": ["to protect privacy and ensure integrity in RFID technology[22][23][24][25]."]} diff --git a/edge/graph_58988543.jsonl b/edge/graph_58988543.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26ab42e5ad459e0256e0ac5737737c02501e35be --- /dev/null +++ b/edge/graph_58988543.jsonl @@ -0,0 +1,11 @@ +{"6380292|1230643": ["As a natural extension to the well-established wireless sensor network (WSN) paradigm [1], WUSNs are envisioned to provide underground monitoring capabilities in the fields of intelligent irrigation, environment monitoring, border patrol, and assisted navigation."]} +{"13830865|1230643": ["The SNs are typically small wireless devices with limited computational power, radio transmission range, storage size and battery power that cooperatively perform the task of collecting relevant data and monitor its surrounding for some change or event to occur [2]."]} +{"14609323|1230643": []} +{"14987990|1230643": ["WSNs are distributed systems of sensor nodes which are interconnected over wireless links [1], [2]."]} +{"824318|1230643": []} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"1402112|205286988": ["There is a significant interest in developing new routing protocols for terrestrial WSN [39]."]} +{"1402112|1230643": ["Thus, wireless sensor networks are suitable for deployment in many fields [8]."]} +{"35754564|1230643": []} +{"5954368|6275330": []} diff --git a/edge/graph_5902443.jsonl b/edge/graph_5902443.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5902682.jsonl b/edge/graph_5902682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bcc40a05efe9c5ba29d0bff7ec9b2e06e807d95 --- /dev/null +++ b/edge/graph_5902682.jsonl @@ -0,0 +1,3 @@ +{"21188199|1877246": ["For urban or indoor reconstruction in particular, primitive shape detection is commonly performed as \ufb01rst step [MWA \u2217 13]."]} +{"1671408|1877246": []} +{"12971705|6681074": []} diff --git a/edge/graph_59033532.jsonl b/edge/graph_59033532.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59038737.jsonl b/edge/graph_59038737.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59039106.jsonl b/edge/graph_59039106.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59042393.jsonl b/edge/graph_59042393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59042400.jsonl b/edge/graph_59042400.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59065267.jsonl b/edge/graph_59065267.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28325734af2a30c8353b3947aca4f8e2f3c8bfab --- /dev/null +++ b/edge/graph_59065267.jsonl @@ -0,0 +1 @@ +{"7344182|627405": ["To have a clear understanding of what defect causal analysis represents in the scope of this paper it is important to understand what we mean by the term defect."]} diff --git a/edge/graph_59067516.jsonl b/edge/graph_59067516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58c6e1f2d95afb5652eee1d9682a5a8822c8d082 --- /dev/null +++ b/edge/graph_59067516.jsonl @@ -0,0 +1,2 @@ +{"3538708|26257441": ["The simulation model may be a SD model; a famous example is the beer game, which illustrates the bullwhip effect (see Simchi-Levi et al. 2003, Sodhi 2001, and again Sterman 2000)."]} +{"15627261|6521940": ["Investiga\u00adtion of appropriateness of multi-method M&S to represent social phenomena can \nhelp the growing trend of trying to incorporate social phenomena into more descriptive simulations (Bhavnani \nand Choi 2012; Djanatliev et al. 2012; Hoad and Watts 2012; Lieberman 2012; Onggo 2012; Viana et al. \n2012; Zulkepli, Eldabi, and Mustafee 2012).", "Investigation of appropriateness of multi-method M&S to represent social phenomena can help the growing trend of trying to incorporate social phenomena into more descriptive simulations (Bhavnani and Choi 2012; Djanatliev et al. 2012; Hoad and Watts 2012; Lieberman 2012; Onggo 2012; Viana et al. 2012; Zulkepli, Eldabi, and Mustafee 2012).", "\u2026M&S to represent social phenomena can \nhelp the growing trend of trying to incorporate social phenomena into more descriptive simulations (Bhavnani \nand Choi 2012; Djanatliev et al. 2012; Hoad and Watts 2012; Lieberman 2012; Onggo 2012; Viana et al. \n2012; Zulkepli, Eldabi, and Mustafee 2012).", "Bayesian Based Methods (BBM) offer a unique probabilis\u00adtic view, which can be used to represent \ndecision-making processes and beliefs of agents (Hoad and Watts 2012, Lieberman 2012, Lee and Son 2008).", "Lieberman (2012) used mixed methods to enhance representativeness of an agent.", "Lieberman, S. 2012."]} diff --git a/edge/graph_5906801.jsonl b/edge/graph_5906801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d749fe0da2211f0319cd30b3e317312aa5dd580 --- /dev/null +++ b/edge/graph_5906801.jsonl @@ -0,0 +1,7 @@ +{"32364085|627405": []} +{"107370827|627405": ["\u201d[29] Human factors related to each of these phases, human roles and level of focus are analyzed and extracted from the selected research papers resulting in a suggestion for human factor research framework.", "al[29] to increase the efficiency, reliability and validity of these phases while considering the time/scheduling limitations."]} +{"14940719|17446703": []} +{"14940719|62667623": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114].", "5.1.1 The search string was generated by combining synonyms for system engineers (defined by Cruz et al. [113]) and synonyms for systematic review (defined by Biolchini et al. [37]) with a logical AND operator.", "5.4.1 The research sting was generated by combining synonyms for software engineers (defined by Cruz et al [113] and Beecham et al. [110]) and the BSE concept with the logical AND operator."]} +{"14940719|205435103": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114].", "5.4.1 The research sting was generated by combining synonyms for software engineers (defined by Cruz et al [113] and Beecham et al. [110]) and the BSE concept with the logical AND operator.", "For example, Beecham et al. [110] stated that software engineers are likely to be motivated according to individual concepts, i.e. their characteristics (e.g. their need for variety) and their internal controls (e.g. their personality).", "In these studies three human factors literature reviews were found, all of which related to motivation [110] [112] [111]."]} +{"14940719|627405": ["In order to verify the reliability of the extraction process a pilot extraction was conducted, where three researchers classified 12 randomly selected publications [41]."]} +{"14940719|15164501": ["We and others have argued [109] [7] that psychometric measurements should be taken into account in any SE research and there has been systematic literature reviews on other related aspects such as motivation [110] [111] [112], personality [113] and organizational culture [114]."]} diff --git a/edge/graph_59125475.jsonl b/edge/graph_59125475.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59126147.jsonl b/edge/graph_59126147.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59134249.jsonl b/edge/graph_59134249.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9f4872c25154822bbc8de7619f15409179fa6ec --- /dev/null +++ b/edge/graph_59134249.jsonl @@ -0,0 +1,2 @@ +{"6604203|17157304": []} +{"15289661|15430879": ["The growth of the volume of harmful material on the Web has resulted in increased research for its automatic detection [8]."]} diff --git a/edge/graph_5914079.jsonl b/edge/graph_5914079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d471a5f8d085006f183d9d09d7de9f5a808589a --- /dev/null +++ b/edge/graph_5914079.jsonl @@ -0,0 +1 @@ +{"17115626|2840997": ["A significant amount of research has been spent recently on extending this technique to more expressive temporal logics [6], obtaining better propositional encodings [7], and proposing termination checks to regain completeness [10]."]} diff --git a/edge/graph_5914149.jsonl b/edge/graph_5914149.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bedd75e34d81261d3d5e60fb890af52a8871580 --- /dev/null +++ b/edge/graph_5914149.jsonl @@ -0,0 +1,12 @@ +{"4516510|10290908": ["Neural events are sorted into individual neuron units based on principle components (PC) of action potential waveforms (Lewicki, 1998)."]} +{"131320|5914149": ["This review is complemented by three companion papers with emphases on electrodes [103], integrated circuit amplifiers [92], and stimulators [89]."]} +{"35008340|1895753": ["As the number of simultaneously recorded neurons grows, models that have traditionally only been tested using large-scale neural simulations will be able to access large, comparable dataset"]} +{"35008340|10290908": []} +{"9163513|10290908": []} +{"14198872|10290908": ["Spike sorting [16] can be used to classify each neuron according to its spike shape."]} +{"9561055|5914149": []} +{"7707364|5914149": []} +{"4492692|10290908": ["This method described below is a modified version of the template matching reviewed in Lewicki, 1998."]} +{"5869440|10290908": [", longer than bursting periods ), [15] suggests that array movement, or more specifically changes i the neuron-electrode distance, might play a role in wavefor m shape change.", "We address three aspects of recording stability identified in [15]: the change in mean waveform shape over time, changes in the background noise process and changes in the waveform shape due to electrode movement.", "In particular we addres sed three aspects of recording stability identified in [15] and listed earlier: the change in mean waveform shape over time, changes in the background noise process and changes in waveform shape due to electrode array movement.", "At longer time scales, the variation in spike waveform is not as systematic, potentially arising from a number of mechanisms such as neural plasticity, physical movement of the electrode relative to nearby neuro ns, chemical degradation of the electrode tip, or immunologica l reactions to the implant [11], [15]."]} +{"61053492|10290908": []} +{"18538341|10290908": []} diff --git a/edge/graph_5914350.jsonl b/edge/graph_5914350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ed77a6838fd53d2ebbf0c32a62ad6d87aaac056 --- /dev/null +++ b/edge/graph_5914350.jsonl @@ -0,0 +1,2 @@ +{"76306|1634674": ["Learning the rule of the grammar from training data is a promising alternative, but it has proved to be extremely difficult in the general case [39]."]} +{"76306|1400872": ["have discussed well known learning algorithms, including a gradient descent optimisation method [116,117] and resilient backprogagation algorithms [118]."]} diff --git a/edge/graph_59158755.jsonl b/edge/graph_59158755.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..472f54dd28e416731f6b154f5996089db0cf5adb --- /dev/null +++ b/edge/graph_59158755.jsonl @@ -0,0 +1 @@ +{"1244562|59158755": []} diff --git a/edge/graph_59158900.jsonl b/edge/graph_59158900.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bc468654a9b5b4daedbaba88f271692189ec661 --- /dev/null +++ b/edge/graph_59158900.jsonl @@ -0,0 +1,63 @@ +{"10329790|4395259": ["During the past decades, Wyner\u2019s DWTC model has been generalized to various wiretap channel models, and a mass of secrecy transmission schemes have been put forward for wireless transmissions (see [2] and its references)."]} +{"8302655|13074005": []} +{"8034476|12029139": ["from the received signal by switching its working mode from the EH mode to ID mode [38]."]} +{"37925315|12681089": []} +{"34984316|3504276": ["A large portion of these wireless devices, some of which may be inaccessible for frequent battery replacement, could be powered wirelessly by dedicated power stations via RF-based WPT technology to facilitate their information transmissions [4]\u2013[6].", "In this paper, we adopt the practical non-linear RF-based EH model proposed in [26] to characterize the end-to-end WPT at the AP.", "Besides, the authors of [21] studied the impact of residual HWIs on the performance of a two-way WPT-based cognitive relay network, where the relay is powered by harvesting energy from the signals transmitted by the source in the RF.", "However, the authors of [21], [22] assumed an overly simpli\ufb01ed linear energy harvesting (EH) model for the end-to-end WPT characteristic.", "In [22], the authors analyzed the impact of phase noise on downlink WPT in secure multiple antennas systems.", "However, most of the existing works on secure WPT systems were based on the assumption of ideal hardware [16]\u2013[19] and are not applicable to practical systems with HWIs.", "Wireless charging of battery-powered devices in wireless communication networks via wireless power transfer (WPT) technology could prolong the lifetime of the networks.", "More importantly, RF-based WPT exploits the broadcast nature of the wireless medium which enables one-to-many simultaneous long-range wireless charging.", "In fact, the concept of wireless-powered communication networks (WPCNs), where wireless devices are powered via radio frequency (RF) electromagnetic waves, has gained considerable attention recently in the context of enabling sustainability via WPT [2].", "In [17], beamforming design was studied for secrecy provisioning in distributed antenna systems with WPT.", "In this context, the authors of [16] designed a resource allocation algorithm that jointly optimizes the transmit power, the duration of WPT, and the direction of spatial beams to facilitate security in WPCNs.", "Yet, measurements of practical RF-based EH circuits demonstrate a highly non-linear end-to-end WPT characteristic [23], which implies that transmission schemes and algorithms designed based on the conventional linear EH model may cause performance degradation in practical implementations.", "Speci\ufb01cally, RF-based WPT offers a more stable and controllable source of energy compared to natural energy sources, such as solar, wind, and tidal, etc., which are usually climate and location dependent [7]\u2013[9]."]} +{"12010666|4395259": ["Recently, the physical layer security has received much attention in wireless communication systems [1]\u2013[8], and the issue of security is particularly important in multi-user communication systems.", "There are several different approaches for the secure transmission in multiuser broadcast scenarios (see [1] and the references therein), which might be classified as follows: (secrecy) precoding, precoding with artificial noise, independent precoding and cooperative jamming, and joint precoding and cooperative jamming.", "Specifically, when the Eve is a legitimate user who is currently unscheduled in the downlink [2], [4]\u2013[6], or the power leakage from the Eve\u2019s local oscillator can be sensed [1], [3], it is possible to acquire the accurate channel information of the Eve."]} +{"11856404|1123458": []} +{"7612308|4395259": ["For more details about MIMO based security methods, we refer the interested readers to [28]."]} +{"26090902|6779551": ["[159] gave a survey, which summarized the security requirements and security attacks of wireless networks, followed by security protocols and algorithms in existing wireless network standards."]} +{"26090902|3453202": ["This attack was investigated in [163] and [168], which wants to send jamming signals to minimize secrecy capacities.", "It is worth mentioning that [163] made a con-"]} +{"26090902|4395259": ["The survey in [158] divided PHY-security issues into two categories: i.", "Finally and most importantly, different from the survey in [158], we discuss the newest precoding techniques in signal processing areas, such as transmit precoding and cooperation schemes in MIMO and relay systems, which are emerging technologies in next generation wireless communications.", "Third, the organization on PHY-security in this paper is different with the survey in [158]."]} +{"26090902|18148591": ["The advancement in wireless technologies has improved communication service quality significantly, by exploring spatial diversities and multiplexing gains with the help of multiantennas technologies [152] or using cooperative strategies with the help of relays [153].", "To further enhance the transmission rates with the constraints of PHY-security, many investigators developed multi-antenna technologies [152], [190] to increase secrecy"]} +{"260331|2835258": []} +{"260331|41035405": []} +{"23864416|9036148": []} +{"23864416|6779551": []} +{"23864416|4395259": []} +{"8995348|4395259": ["The objective of physical layer security schemes is to enable secure communications by exploiting the physical characteristic of the wireless channel itself and measure the amount of information that can be securely transmitted to the intended receiver [1], [2]."]} +{"1122570|4395259": ["2314664 security has become a very active area of research, and has witnessed significant growth [2]\u2013[5]."]} +{"1978585|4395259": ["The work of T.-X. Zheng and H.-M. Wang was partially supported by the NSFC under Grant No. 61102081 and Grant No. 61221063, the Foundation for the Author of National Excellent Doctoral Dissertation of China under Grant 201340, the National High-Tech Research and Development Program of China under Grant No. 2015AA011306, the New Century Excellent Talents Support Fund of China under Grant NCET-13-0458, the Fok Ying Tong Education Foundation under Grant 141063, and the Fundamental Research Funds for the Central University under Grant No. 2013jdgz11.", "M. H. Lee is with the Division of Electronics Engineering, Chonbuk National University, Jeonju 561-756, Korea (e-mail: moonho@jbnu.ac.kr).", "\u2026T.-X. Zheng and H.-M. Wang was partially supported by the NSFC under Grant No. 61102081 and Grant No. 61221063, the Foundation for the Author of National Excellent Doctoral Dissertation of China under Grant 201340, the National High-Tech Research and Development Program of China under Grant No.\u2026"]} +{"14301768|4395259": []} +{"32176831|12029139": ["2623627 many situations such as disasters, extreme environments or sensor networks embedded in human bodies for a biomedical purpose [1]."]} +{"32176831|4395259": ["In the meantime, physical-layer security issues in communications have also been brought up for the last decades [14]."]} +{"15057576|12029139": ["Thus, an increasing amount of attention has been paid to the RF energy harvesting in wireless communications, e.g., [1] and references therein."]} +{"18839007|4395259": ["According to [15], the available SR of the CRN is given by"]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"206644484|4395259": ["There has been also an effort to generalize physical layer security to the multiuser context (see [13] for a survey)."]} +{"27342442|11720829": ["MULTIPLE-INPUT multiple-output (MIMO) systems have great potential for improving system capacity without any increase in bandwidth or transmit power [1]-[4]."]} +{"8885064|4395259": [", [6], [25]), and cognitive radio networks (e."]} +{"21482398|4395259": ["order to ensure the ability of the intended user to perform successful data decoding, while preventing eavesdroppers from doing so [2], [4].", "The secrecy outage probability can be further defined as [2]", "To cope with this, key-less physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches [2], [3]."]} +{"969650|12029139": ["IN RECENT years, radio frequency (RF) energyharvesting (EH) technology has emerged as a promising solution to power the nodes of a wireless communication network [1]."]} +{"969650|1236072": ["An appropriate clustering algorithm that organizes the relay nodes based on average SNR can ensure this assumption in practice [41]\u2013[43]."]} +{"10628993|4395259": []} +{"18185228|12029139": ["I. INTRODUCTION\nW IRELESS energy transfer (WET) has been widely rec-ognized as a promising technology to solve the energy scarcity problem in energy-constrained wireless networks by integrating the radio frequency (RF) energy harvesting capability into wireless devices [1], [2]."]} +{"8592894|13178381": []} +{"14270103|4395259": ["The vulnerability is due to a reliance on the limited resources of the eavesdropper and on the unproven computational complexity of inverting the encryption algorithms [1]."]} +{"12359475|13178381": ["However, this idealized simplifying assumption is not realistic, since practical channel estimation imposes CSI imperfections, which are aggravated by the feedback delay, limited-rate feedback, and channel estimation errors (CEEs) [17]."]} +{"10146419|6779551": ["Hence, according to [29]\u2013[31], the achievable secrecy-rate r sec i A from MU i to the sAP is given by", "Building upon the concept of physical-layer security throughput [29]\u2013[31], we derive the secrecyoutage probability (as a function of the MU\u2019s offloaded data rate and transmit-power to sAP) for traffic offloading."]} +{"10146419|4395259": ["For each MU i \u2208 I , we set R i uniformly random within [10, 30]Mbps, its security-outage limit i = 0."]} +{"40549627|4395259": ["In addition, we also mention a second approach for CSI acquisition that has been recently introduced in [39], [46], and [47], and which applies when Eve is a hidden node without any ongoing communication with Alice."]} +{"9219235|12029139": ["promising technology to solve the energy scarcity problem in energy-constrained wireless networks by integrating the radio frequency (RF) energy harvesting capability into wireless devices [1], [2]."]} +{"3719923|3270620": ["Although it has been clearly discussed that the capacity-achieving decodi ng order for conventional NOMA schemes without the secrecy consideration is in the descending order of channel gains normalized by noise [29, 34], i."]} +{"16189770|4395259": []} +{"33903239|4395259": ["With decades of development and progress, there have been considerable research efforts in this area [4].", "Therefore, there have been increasing research efforts in this field, for which a comprehensive survey can be found in [4]."]} +{"5918010|4395259": ["Recently, physical layer security, which achieves secure transmissions by exploiting the dynamics in the physical layer, has drawn considerable attention [6], [7]."]} +{"10840378|8909218": ["2416984 Aiming to effectively enhance the spectral and/or energy efficiency of wireless networks, it has been suggested that the deployment density of various network-nodes should increase [2], [3], and smart access-point activation and resource management are essential to utilize the dense network-nodes [4]."]} +{"8332734|12029139": ["The EH is considered to be useful in many situations such as disasters, extreme environments or sensor networks embedded in human bodies for a biomedical purpose [1]."]} +{"8332734|4395259": ["In the meantime, physical layer security issues in communications have also been brought up for the last decades [13]."]} +{"1541773|24491750": ["In [40], authors have presented an overview of the energy consumption problems of wireless communication networks and described different techniques in general that have been used to improve the energy efficiency of these networks."]} +{"1541773|7686677": ["Survey in [42] presented a brief survey of current efforts for the standardization of the green metrics, the challenges that lay ahead and also considered the energy consumption issue in heterogeneous cognitive networks.", "The important aspects of a green communications include defining green metrics, bringing architectural changes in base stations, network planning, and efficient system design [42]."]} +{"1541773|10837932": ["Authors in [39] provide a survey on green networking research from a system design perspective."]} +{"24577329|10837932": []} +{"24577329|8280144": ["By Slivnyaks theorem [40] and the stationarity [40] of the HPPP, the statistics observed at a random point of a HPPP \u03a6 is the same as those observed at the origin in the process \u03a6 \u222a { o } [41], [42]."]} +{"23999990|4395259": ["In recent years, we have seen rapidly growing interest in physical-layer secrecy, especially, that in various multi-input multi-output (MIMO) Gaussian wiretap channels; see a recent overview [4] and the references therein.", "Instead, recent research seems to suggest that problem (1) is a hard problem [4], and that, as a compromise, suboptimal design solutions should be sought [5], [7], [8]."]} +{"16758805|2509135": ["According to [11], [12], the access technology of the SUs can be divided in two categories: spectrum underlay and spectrum overlay."]} +{"5589248|14776754": ["On the other hand, in a multicarrier system, the entire frequency band is divided intomany narrow frequency subbands, and parallel low data rate symbols are transmitted instead of serial high data rate symbols."]} +{"3437683|4395259": ["Physical layer security technology has attracted intensive attentions due to its capability of realizing secure information transmission by exploiting complex and variable characteristics of wireless channels in space and time domains [1]\u2013[5]."]} +{"3049679|7686677": [" to be ful\ufb01lled to maintain the quality of experience (QoE) of the application. At the same time, system energy ef\ufb01ciency has emerged as one of the key performance indicators for the wireless network [2]\u2013[4]. For the system design, QoS parameters can be treated as degrees of freedom (DoF) to achieve high system level energy ef\ufb01ciency. If the applicat ion is loss and delay tolerant, the DoFs can be ex"]} +{"19724296|4395259": ["Finally, unlike most of the related work [1]\u2013[11], we consider a multi-cell setting where not only the data signals cause inter-cell interference but also the AN, which has to be carefully taken into account for system design.", "However, several new issues arise for physical layer security provisioning in multi-cell massive MIMO systems that are not present for conventional MIMO systems [1]\u2013[11].", "This approach is based on certain assumptions regarding computational complexity, and is thereby potentially vulnerable [1].", "(6) reveals that the achievable ergodic secrecy rate of the kth MT in the local cell has the subtractive form typical for many wiretap channels [1]\u2013[11], i."]} +{"20124020|4395259": ["To address such a security issue and achieve a higher level of secrecy, physical layer security designs have garnered a lot of interests [1]."]} diff --git a/edge/graph_59158905.jsonl b/edge/graph_59158905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53f09578c09b3b45c0a59602d087f0a50002434e --- /dev/null +++ b/edge/graph_59158905.jsonl @@ -0,0 +1,23 @@ +{"126364422|191396": ["However, detailed surveys on traditional clustering algorithms can be found in [19\u201322]."]} +{"126364422|3102110": []} +{"126364422|192934": []} +{"15521864|191396": []} +{"15521864|11038925": ["Soft competitive learning in clustering has the same function as fuzzy clustering (Baraldi & Blonda, 1999).", "\u2026clustering and fuzzy clustering algorithms including the SOM (Kohonen, 1989), the FLVQ (Bezdek & Pal, 1995), the fuzzy ART (Carpenter et al., 1991a), the growing neural gas (GNG) (Fritzke, 1995a), and the FOSART (Baraldi & Parmiggiani, 1997) are surveyed and compared in Baraldi and Blonda (1999)."]} +{"55413665|11038925": ["Thus each interval can be assigned a categorical value c[1], c[2], .", "Clustering is one of themost commonly encountered data mining techniques that are implemented to extract knowledge arising from many areas, some of which are community detection [1], pattern recognition [2, 3], bioinformatics [4], and spatial database applications, for example, GIS or astronomical data [5, 6]."]} +{"15077618|191396": ["For example, a detailed review of clustering algorithms and their applications can be found in [2] [3] [4]; clustering algorithms for high dimensional data are investigated in [5] [6]; time series data clustering is reviewed in [7]; the clustering problem in the data stream domain is studied in [8]\u2026"]} +{"4643842|191396": []} +{"49292804|945077": ["Next, based on this co-association similarity, three agglomerative clustering methods, namely single-link (SL), complete-link (AL), and average-link (CL) [3] are used to generate the final partition."]} +{"18568224|12894036": ["Hence, x_i can be denoted as \u00bdxci T ,xui T T with xci \u00bc \u00f0x c i1,x c i2, . . . ,x c idc \u00deT and xui \u00bc \u00f0x u i1,x u i2, . . . ,x u idu \u00deT ."]} +{"206550568|191396": []} +{"53920619|191396": ["We \ufb01rst apply the min_max normalization (Rokach 2010) to cosine similarity coef\ufb01cient to de\ufb01ne the similarity value on the scale [ 0 , 1 ] and then subtract this similarity coef\ufb01cient value from the constant value \u20181\u2019 to make it as a dissimilarity coef\ufb01cient and it is given as follows, denoting it\u2026", "We have computed the clustering results accuracy, generated by the frameworks, using external cluster validity index (Rokach 2010).", "In Chi et al. (2007, 2010), a framework for evolutionary spectral clustering has been discussed, which is based on the assumption that the short-term variations in clustering results are very often due to noise and hence the cluster results should not deviate dramatically from the recent history of\u2026"]} +{"908193|18090012": ["De-identification normally allows researchers to circumvent costly consent regimes 94 , but the lack of identifiers makes certain types of population-wide research impossible, as other information cannot be linked to data subjects."]} +{"908193|2809360": ["22 and the September 2011 special issue of the Journal of the American Medical Informatics Association (JAMIA) 32 .", "It is highly heterogeneous, does not always conform to normal grammar and is rich in author-and domain-specific idiosyncrasies, acronyms and abbreviations, as well as spelling and typing errors 22 ."]} +{"40618768|18351608": ["For a clustering, if there exists k = t, such that (1) Co (Ck) \u2229 Co (Ct) = \u03c6, or"]} +{"10189068|5646762": ["Basically, the clustering task is treated based on the optimization of some objective functions (i.e., the so-called fitness function) that guides the evolutionary search[ 6 ].", "Evolutionary algorithms are metaheuristics widely believed to be effective on NP-hard problems, being able to provide near-optimal solutions to such problems in reasonable time[ 6 ]."]} +{"10189068|191396": ["In both scientific research and daily life, people try to figure out features that can describe a new object, and then compare it with other known objects, based on the similarity or dissimilarity, generalized as proximity, according to some certain standards or rules[ 1 ]."]} +{"3032303|11293874": ["Delahoz and Labrador [19] present a review of the state-of-the-art in fall detection and fall prevention systems along with qualitative comparisons among various studies."]} +{"3032303|8928686": ["Pannurat et al. [22] present another review for automatic fall detection by categorizing the existing platforms based on either wearable and ambient devices, and the classi\ufb01cation methods are divided into rule-based and machine learning techniques."]} +{"3032303|5664472": ["Research in activity recognition has led to the successful realization of intelligent pervasive environments that can provide context, assistance, monitoring and analysis of a subject\u2019s activities that are usually backed up by advanced machine learning and vision algorithms [1, 2, 3]."]} +{"15121522|5646762": ["The use of genetic algorithms with K-Means can also help to avoid local minima issue of K-Means [13,14,16,17].", "The best chromosome obtained is generally a rough clustering solution [16] which is very close to the global minima.", "Since GA is less likely to get stuck at local minima it is more likely to find a rough set of clusters (close to global minima) which can then be fine tuned by K-Means [16].", "Moreover, the combination of GA and K-Means can also overcome the local minima issue of K-Means [13,14,16,17].", "A pair of the chromosomes of the 1st generation then participates in a crossover operation where the chromosomes exchange genes and thereby form a pair of new chromosomes [16,19,28].", "Another drawback of K-Means is that it does not record the quality of clusters obtained in the previous iterations and therefore, does not take advantage of good quality clusters of the previous iterations [16].", "Typically, a genetic algorithm based clustering technique does not require a user input on the number of clusters [16].", "Generally, a genetic algorithm (GA) uses a random number (k) of clusters (not user defined) ranging between 2 to ffiffiffi n p (n is the number of records) and thereby forms an initial clustering solution (called chromosome) having k seeds (called genes) [12,16,18].", "Therefore, using the genes of the best chromosome as the initial seeds of KMeans can produce a better clustering solution since K-Means can further fine tune the rough solution obtained by GA and get closer to the global solution [13,15,16,19].", "Generally the use of genetic algorithms in K-Means improves the quality of the clusters [16]."]} +{"15121522|191396": []} +{"205702735|6430931": []} diff --git a/graph_592204.jsonl b/edge/graph_592204.jsonl similarity index 100% rename from graph_592204.jsonl rename to edge/graph_592204.jsonl diff --git a/edge/graph_59222093.jsonl b/edge/graph_59222093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff78afc7e3f7182a583411343780f3a21964349a --- /dev/null +++ b/edge/graph_59222093.jsonl @@ -0,0 +1 @@ +{"12971705|6681074": []} diff --git a/edge/graph_59222833.jsonl b/edge/graph_59222833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f14d70dbef4f95decd9621fe9258b06dc25f134 --- /dev/null +++ b/edge/graph_59222833.jsonl @@ -0,0 +1,91 @@ +{"21536042|16403716": []} +{"1033682|174797842": []} +{"207172599|3330313": []} +{"15808663|4631990": ["BEMSs are highly complex information gathering and control systems and implement advanced control strategies to improve energy efficiency while maintaining occupant comfort [12]."]} +{"17569926|15093118": []} +{"17569926|18546648": ["detection and removal [78]\u2013[80]."]} +{"17569926|819377": ["Gaussian [89]."]} +{"17569926|5755403": ["As an example, the project ADVISOR [4] was successfully carried out in the early 2000s with the goal to develop a monitoring system for public transportation, in order to detect abnormal behaviors of users [5], [6].", "Reliable vehicle tracking is crucial, as it will allow posterior trajectory analysis and behavior recognition [5]."]} +{"17569926|17516538": ["ing significant changes between successive frames [16].", "In the literature, several papers have reported good performance for such tasks [16], [17]."]} +{"17569926|6644671": ["However, deploying a network required to take into account critical points such as: mobility, power consumption, and compulsory spatial and temporal calibration [49]."]} +{"52880512|3330313": []} +{"24717838|17516538": ["One of them is behavior-pattern-based methods, and the other is probability reasoning and prior rules-based methods [47]."]} +{"10628417|5058720": ["Currently, there are various abnormal detection algorithms proposed in crowded scenes, such as abnormal crowd behavior detection [9, 46, 53], human abnormal action detection [38], traffic incident detection [50], etc."]} +{"3860535|393948": ["An Auto-Encoder is a special neural network whose input and output are the same[16]."]} +{"17798449|50041": ["In a review [3], Brezeale and Cook expatiated the relevant topic of categorizing the genre of produced video in 2008, while Lavee et al. [4] in 2009 addressed a more concrete topic of understanding particular events in video data."]} +{"17798449|17516538": ["In a review [3], Brezeale and Cook expatiated the relevant topic of categorizing the genre of produced video in 2008, while Lavee et al. [4] in 2009 addressed a more concrete topic of understanding particular events in video data."]} +{"10405949|15093118": ["Since such driving behaviors as lane changing and overtaking have been studied in [7], [60], Fig.", "There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections.", "Radar technology usually is mounted on poles or embedded in vehicles to detect surrounding vehicles [7] and pedestrians [4]."]} +{"10405949|206764452": ["There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections."]} +{"10405949|5755403": ["This includes measuring and learning vehicle kinematics, dynamics , and making predictions [50]."]} +{"10405949|1029120": ["There are numerous methods for tracking, e.g., [4], [7], and [39] which have been discussed extensively in other survey papers such as [5], [7].", "3) While pedestrians [4], [5] and vehicles [7], [11] behaviors have been extensively studied, there is no existing comprehensive survey that considers the unique properties of intersections.", "A variety of sensors have been used for vehicle and pedestrian detection at intersections [4], including global positioning systems (GPS), light detection and ranging (LIDAR), radar and cameras.", "Radar technology usually is mounted on poles or embedded in vehicles to detect surrounding vehicles [7] and pedestrians [4]."]} +{"37368500|4915696": ["Two approaches, parametric and non-parametric are used to identify abnormal behaviors on road [3]-[6].", "The detection of abnormal events in parametric method is performed on the basis of feature extraction from the observed data [3]."]} +{"37368500|5755403": ["symbolizes Co-variance of the ith object [18]."]} +{"3362888|7271501": ["Some cooperative tracking algorithms which planed the trajectory of several UAVs were researched in the papers [11, 15, 23, 24, 31]."]} +{"3362888|15929566": []} +{"69890121|4915696": []} +{"69890121|12358655": []} +{"69890121|8968641": ["Multi Object Tracking [48]."]} +{"69890121|15093118": []} +{"69890121|5755403": ["The main contributions are as follows: 1) majority of the existing review papers barring [9] listed in Table I use varying features such as knowledge on segments, object\u2019s"]} +{"16610881|8968641": ["The local binary pattern (LBP) texture is one of the famous pattern analysis for gray-scale images [16]."]} +{"16784027|16525678": ["A review of general surveillance systems is provided in [79] and [139], with a particular focus on distributed surveillance systems."]} +{"2743814|12127129": []} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"123919735|17516538": ["As discussed in different review papers [4, 7, 8], many such methods implement a general pipeline-based framework; moving objects are first detected in a motion detection step, then they are classified and tracked over a certain number of frames and finally, the resulting paths are used to distinguish \u201cnormal\u201d objects from \u201cabnormal\u201d ones [11, 12, 18, 9].", "usually detected first followed by object extraction and object tracking [8]."]} +{"7361943|1634674": ["Mid-level computer vision (the terms \u201c event \u201d 142 and \u201c action \u201d 143 are used) that includes analysis of trajectory dynamics or patterns such as a human walking."]} +{"7361943|5755403": []} +{"7361943|17516538": [", have been applied for behavior understanding.(145) Thus, advances in the high-level vision tasks for traffic surveillance are promising."]} +{"4863545|1029120": []} +{"5058720|1634674": ["Human activities recognition [16] 2009 G."]} +{"5058720|5755403": ["T Trajectory analysis for visual surveillance [14] 2008 Teddy Ko Behavior analysis in automated video surveillance [15] 2008 Turaga et al."]} +{"5058720|5401262": ["Behavior understanding [13] 2008 Morris B."]} +{"5058720|2113024": ["T Pedestrian detection based on various cases [7] 2007 Pantic et al."]} +{"5058720|17516538": ["Detection of anomalous behavior in dynamic scenes [11] 2006 Thomas B."]} +{"16993015|5755403": ["\u2026Chen and Y. Yu are with the college of Mathematics and Computer Science, Fuzhou University, Fuzhou, 350116 China. yu chen17@163.com, yu.yuanlong@fzu.edu.cn Ting Li, Fujian Provincial Power Co. Ltd., State GRIP, China. which is a bridge between low-level features and high-level representations [2]."]} +{"5755403|1029120": ["This type of analysis would be quite popular in the intelligent transportation field, specifically for pedestrian safety [91]."]} +{"5755403|17516538": ["The label of the prototype with minimal distance indicates the best matching path [28], [49], [67].", "Two simple techniques for length normalization are zero padding [36] and track extension [13], [49].", "The threshold can be tuned for each path individually based on its unique characteristics chosen, for neural network implementations, as half the maximum distance between training samples and a winning neuron (path prototype) [9], [49].", "a trajectory while track extension uses the dynamics at the last tracking time to estimate extra trajectory points as if it had been tracked until time [49].", "For further discussion, the interested reader is directed to recent surveys that categorize existing tracking techniques and identifies new trends [48] and the succinct review of tracking techniques specifically for visual surveillance [49]."]} +{"6471474|5755403": ["\u2026al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an object is then treated as\u2026"]} +{"6471474|16525678": ["While some existing reviews Valera and Velastin (2004) and Aghajan and Cavallaro (2009) tried to cover all the aspects of 0167-8655/$ -see front matter \u00d3 2012 Elsevier B.V.", "Many intelligent multi-camera video surveillance systems have been developed (Collins et al., 2001; Aghajan and Cavallaro, 2009; Valera and Velastin, 2004)."]} +{"6471474|12127129": ["Background subtraction (Piccardi, 2004) is widely used for detecting moving objects in video surveillance with static cameras."]} +{"6471474|17516538": ["\u2026and Grimson, 2000; Oliver et al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an\u2026"]} +{"51987766|3330313": []} +{"14783163|5755403": ["Object trajectories provide rich spatiotemporal information about an object activity and represent an effective feature for detecting abnormal activities [3], [6]."]} +{"6351916|64404": []} +{"6351916|5755403": []} +{"6351916|3540699": ["Moreover, comparing to previous video coding standard H.264 [20], the latest standard High Efficiency Video Coding (HEVC) [21], which came out in early 2013, have even greater potential for compressed-domain event detection."]} +{"15178364|206764452": ["Recent reviews on human behavior understanding focused on specific aspects of the overall problem, such as monocular pedestrian detection [11], human detection for driver-assistance systems [12], and pedestrian detection benchmarks [13], [14].", "Algorithms based on appearance features are specialized detectors trained on large pedestrian databases [11], [12]."]} +{"15178364|1634674": ["[20], [128], [129], which represent the human body in terms", "Note that this definition differs from that of [20], which made no distinctions between activities and interactions.", "From these atomic elements, it is possible to compose actions, namely, temporal concatenations of gestures [20]."]} +{"15178364|5755403": ["Morris and Trivedi [15] surveyed features and model motion trajectories focusing on trajectory analysis."]} +{"15178364|5401262": ["The interest in behavior understanding has dramatically increased in recent years, motivated by societal needs that include security [1], natural interfaces [2], gaming [3], affective computing [4], and assisted living [5]."]} +{"14932835|12127129": []} +{"71152819|4915696": ["thus can be easily detected by applying anomaly [31], [38]"]} +{"5547497|12127129": ["This is a common characteristic of framebased tracking approaches [41], [47], [48]."]} +{"5547497|17516538": []} +{"9771910|393948": []} +{"41496104|4915696": []} +{"41496104|5664472": []} +{"41496104|5401262": []} +{"41496104|16525678": []} +{"41496104|8729078": []} +{"9092168|5755403": []} +{"16989629|5401262": ["Such systems are found in applications such as intelligent environments [1], [3], human machine interaction [2], surveillance [4], and sports analysis [11]."]} +{"16989629|17516538": ["Such systems are found in applications such as intelligent environments [1], [3], human machine interaction [2], surveillance [4], and sports analysis [11].", "A standard example is video surveillance [4], [5], where the typical goal is to monitor people in indoor or outdoor environments and detect abnormal events, such fighting or moving in forbidden directions or into prohibited areas.", "Excellent surveys of this type of work can be found in [4], [6]\u2013[8]."]} +{"16989629|7788290": ["Some systems use articulated human body models, taking into account geometric/motion restrictions [7], [8], [18]."]} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"9898445|819377": ["Foreground detection alone cannot be used as it generates noise at some places and is not very effective to take up alone [21]."]} +{"13266485|4915696": ["This can be noticed by the number of papers that addressed the problem in the last ten years [1], [2].", "In this paper, we focus on trajectory-based and pixel-based approaches for unsupervised abnormal behavior detection [2]."]} +{"46891369|15093118": []} +{"5293125|16770050": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"6260305|1634674": []} +{"6260305|17516538": []} +{"6260305|7788290": []} +{"17580315|8042572": ["IVS and IVA provide effective means of sensing in intelligent environments [113], which is much related with the recent concepts of CPS or Internet of Things (IoT)."]} +{"1828831|5664472": ["We would not discuss the methods in detail since there exists many detailed reviews on these methods [6, 7, 10, 12, 24, 29]."]} +{"1828831|5755403": ["For further discussion, the interested reader is directed to an extensive analysis on trajectories [21]."]} +{"1828831|17516538": ["We would not discuss the methods in detail since there exists many detailed reviews on these methods [6, 7, 10, 12, 24, 29]."]} +{"9676536|17516538": ["Recent research on learning behavior models for understanding video has broadly fallen into object-centric detection and tracking approaches (Hu et al. 2004), and non-object-centric approaches."]} +{"15466712|50041": ["The related topic of categorizing the genre of produced video was covered in a review by Brezeale and Cook [2]"]} +{"15466712|17516538": ["Citing [5], Ko noted that \u201crelatively little research has been reported on reliable classi\ufb01cation and understanding of human activities from video image sequences\u201d [6].", "Hu et al. [5] produced a 2004 survey of automated visual surveillance which focuses on the two areas of motion detection and object tracking, offering only a short overview of behavior understanding.", "However, Dee and Hogg refer their readers to the earlier reviews [4], [5] for further treat-ment."]} +{"9469305|5755403": ["There are many options when clustering trajectories, ranging from the choice of clustering algorithm to the measure of similarity between tracks [24].", "A more detailed examination of techniques is presented in the review by Morris and Trivedi [24], which highlights a wide range of applications, challenges, and common approaches to trajectory learning and modeling."]} diff --git a/edge/graph_59231340.jsonl b/edge/graph_59231340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d82fcdc31dad701908a6e26b4c5baee2e393c73 --- /dev/null +++ b/edge/graph_59231340.jsonl @@ -0,0 +1,2 @@ +{"109408013|266462": []} +{"107194321|17381415": []} diff --git a/edge/graph_59231422.jsonl b/edge/graph_59231422.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81e22002ab8ce95b2dee59fdb89bcba897af28ef --- /dev/null +++ b/edge/graph_59231422.jsonl @@ -0,0 +1,29 @@ +{"32385634|44956948": []} +{"63098742|3750204": []} +{"63098742|19502816": []} +{"63098742|15485264": []} +{"168755958|14258620": []} +{"13471990|121289": ["Communication infrastructure manages in general three types of networks: Home Area Networks (HANs), Business Area Networks (BANs) and Neighborhood Area Networks (NANs) [5].", "This system manages and maintains electrical networks, because it has the ability to collect data from any system in order to control it, using several devices for example sensors, SCADA master and SCADA Remote Terminal Unit (RTU) [5]."]} +{"13471990|14240886": ["efficient power quality management, based on intelligent transmission and distribution, policies and pricing mechanisms for real-time power markets [3, 4]."]} +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"195649387|16403716": []} +{"24320910|21386749": ["The paper clearly highlights the effectiveness and importance of following standard healthcare conventions and international standard bodies like Health Insurance Portability and Accountability Act (HIPAA) [30] and World Health Organization (WHO) [7,31].", "Previous surveys and reviews that have been done were limited in scope as they focused on algorithms [10\u201320] or a framework [7,8,21\u201328] but did not touch both aspects of healthcare technology.", "The last has revolutionized the healthcare [36] taking people out from isolation to the interconnected world of technology [7,8] and cellular network where healthcare is easily reachable for people.", "IoT[7]isatermgiventoconnectednodes\u2014whetherthesenodesrepresentpeo-ple,places,machines,oranythingelse.", "IoThealthcarenetwork[7]hasbecomethesedayssuchthathumanbodyiscon-nectedtovarioussensorssuchasbio-patch,biochipandIMedPackthosearerecording each symptom and body condition which is being read through WBAN devices, Fig.", "IoThealthcarenetworkconsistsoftopology,architecture,and platformbeingdiscussedhere[7].", "ManyIoTandeHealthpoliciesandregu-lationsareunderreviewto\ufb01ndhowtheinnovationsinbigdata,ambientintelligence, andwearablesareleveraginghealthcarebyproposedintelligentcollaborativesecu-ritymodel[7]andwouldfacilitatetheeconomyandsocietiestoachievesustainable development.", "2 Health IoT cloud architecture [7] recorded and deployed [28] in data center of Health IoT cloud (Fig.", "This effort is demonstrated in [7] as IoT healthcare network (IoThNet).", "Data are coming from many platforms [7] that are mainly social media [8,36], real-time imaging, high throughput sequencing platforms, the point of care devices, mobile health technologies and wearable computing [39]."]} +{"4566470|24855581": []} +{"4566470|31245252": ["[79] D. Niyato, M. A. Alsheikh, P. Wang, D. I. Kim, and Z. Han, \u2018\u2018Market model and optimal pricing scheme of big data and Internet of Things (IoT),\u2019\u2019 in Proc.", "THE MAIN PURPOSE OF BIG DATA TRADING Since the volume of data is growing immensely, and IoT technology is progressing at a similar pace, massive datasets with comprehensive content and detail become increasingly valuable.", "Luong et al. [56] and Ya\u00efche et al. [64] designed a pricing model to evaluate IoT sensing data.", "Available: https://arxiv.org/abs/1702.02380 [56] N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, D. I. Kim, and Z. Han, \u2018\u2018Data collection and wireless communication in Internet of Things (IoT) using economic analysis and pricing models: A survey,\u2019\u2019 IEEE Commun.", "His research interests include cyber-physical systems, smart grid/IoT security and privacy, and incentive mechanisms design for smart grid/IoT.", "Many specific fields, such as government, manufacturing, health-care, education, Internet, social media, and IoT-driven smart-world systems all need big data applications tomine the value of their own collected datasets to better support applications.", "For instance, IoT provides themost important network infrastructure for data collection, as billions of devices run automatically and constantly collect data across various domains.", "INTRODUCTION With a number of new technologies integrated into our daily lives, such as mobile and social networking applications, and Internet of Thing (IoT)-based smart-world systems (smart grid, smart transportation, smart city, and others), massive amounts of data will be collected [1]\u2013[7].", "I. INTRODUCTION With a number of new technologies integrated into our daily lives, such as mobile and social networking applications, and Internet of Thing (IoT)-based smart-world systems (smart grid, smart transportation, smart city, and others), massive amounts of data will be collected [1]\u2013[7].", "\u2018\u2018Sensing as a service (S2aaS): Buying and selling IoT data.\u2019\u2019", "With the development of smart devices and IoT, it becomes easier to collect useful data everywhere.", "The data sources are diverse, especially as IoT is ever more involved in our daily lives, supporting numerous smart-world systems [1], [3], [20]\u2013[22].", "Some existing data pricing models consider only market structures, such as auction, cost-based pricing, and others, while others involve a distributed data storage structure (cloud computing, edge computing, etc.) and IoT for assistance.", "Thus, to quantify the cost for data collection, and handle diverse data sources, we need to understand how IoT works, and encourage all components to provide better performance in IoT [1], [53]\u2013[55].", "In addition, existing studies showed the use of the Stackelberg game model in spectrum trading and resource allocation [69], and could improve network performance and robustness in IoT systems [70].\nc: Bargaining game The last scheme is the Bargaining game.", "\u2022 Diverse Data Sources: Along with billions of smart personal devices and sensors, IoT-driven smart systems have become major infrastructures that contribute data to the collection process."]} +{"4566470|5385031": ["There are several different pricing strategies for evaluating cost according to the different scenarios [56]."]} +{"4566470|3818445": []} +{"65375395|22352825": []} +{"65375395|6736412": []} +{"65375395|3126100": []} +{"65375395|10213552": []} +{"65375395|5544758": []} +{"65375395|2398835": []} +{"53188247|63927538": ["Role of big data for vulnerable youth in schools: Student engagement Information available to school administrators has traditionally been limited to variables such as conduct history and academic achievement, but novel sources of big data offer expanded possibilities relevant to the bullying and safety concerns faced by vulnerable students [11]."]} +{"34837088|624120": []} +{"34837088|12974382": ["These tools are used together with remote sensing (Mucherino, et al., 2009) and are often combined, e.g. to use the image processing output as input to a machine learning model (Vibhute & Bodhe, 2012)."]} +{"207016868|191396": []} +{"3289921|52877341": []} +{"3289921|58311097": ["However, hardware and software advancement, as well as the algorithm architecture are the main challenges (Hassani & Silva, 2015)."]} +{"55186354|52877341": ["Alterna-tively, meta-based-approaches can be used to conducting a literature review and include the work of Mishra, Gunasekaran, Papadopoulos, and Childe (2016), which adopt a bibliometric and network analysis approach to obtain and compare in \ufb02 uential work in a speci \ufb01 c domain (in this example,\u2026"]} +{"55186354|2652752": ["\u2026and Teuteberg (2014) \u2013 BD logistics; Eembi, Ishak, Sidi, Affendey, and Mamat (2015) \u2013 on data veracity research for pro \ufb01 ling digital news portal, and Abdellatif, Capretz, and Ho (2015) \u2013 on software analytics (a distinct branch of BDA), this paper attempts to broaden the scope of their\u2026"]} +{"5120196|16403716": []} diff --git a/edge/graph_59231967.jsonl b/edge/graph_59231967.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..83d4f89e2359f000c783116a32c5cf468b60ffcc --- /dev/null +++ b/edge/graph_59231967.jsonl @@ -0,0 +1,23 @@ +{"11970435|4395259": ["A key performance metric of the wiretap channel is the secrecy capacity defined as the maximum communication rate at which Bob can reliably decode the transmitted message, while Eve cannot infer information at any positive rate [2]\u2013[4]."]} +{"16012932|4395259": ["Physical-layer security refers to the techniques which exploit the channel characteristics in order to hide information from unauthorized receivers, without reliance on upper-layer encryption [3]\u2013[9]."]} +{"52008841|52125636": ["Some review articles focused on specific aspects of VLC such as VLC channel modeling methods [28], noise optical sources and noise mitigation mechanisms [29], VLC-based positioning techniques for indoor and outdoor applications [30], and the pertinent issues associated with the outdoor usage of VLC in vehicular communication [31]."]} +{"52008841|3930401": ["In [27], authors explored the differences among optical wireless communications (OWC) technologies such as infrared communications, VLC, lightfidelity (LiFi), free space optical (FSO) communications, etc."]} +{"52008841|22221919": ["More details on NOMA in traditional RF networks are provided in [143], [144]."]} +{"52008841|10235514": []} +{"52008841|10979806": ["The EE can be improved by efficient resources optimization, power allocation, energy transfer and harvesting, and hardware solutions [87]."]} +{"52008841|12206204": ["95 exabyte-per-month in 2021 [1]), there is an urgent need to develop a fifth-generation (5G) of networks with a higher system-level spectral efficiency that will offer higher data rates, massive device connectivity, higher energy efficiency (EE), lower traffic fees, a more robust security, and ultralow latency [2]\u2013[4]."]} +{"52008841|12029139": ["Extensive work has been done to design, evaluate, and optimize simultaneous wireless information and power transfer in RF networks [160], [161]."]} +{"52008841|4395259": ["For the PLS in RF networks, readers can refer to [177] and [178]."]} +{"31048368|6779551": []} +{"31048368|3453202": ["In particular, multiple-antenna relaying [24], [25], multipleantenna jamming [26], [27], multiuser downlink or multiple access [28], [29], massive MIMO [30], [31], and multipleantenna directional modulation [32]\u2013[35], are exploited to improve the secrecy performance."]} +{"31048368|12029139": ["Generally speaking, a power receiver is usually closer to the source than the information receiver, since the energy harvesting circuitry is less sensitive than the information decoding circuitry [238], [239]."]} +{"31048368|13178381": []} +{"31048368|4395259": ["[61] gave a primary investigation on multi-antenna techniques in multiuser wireless secrecy net-"]} +{"49188033|10235514": ["Furthermore, the growing number of devices imposes a big challenge of providing seamless and lowdelay communication [1], [2]."]} +{"46948419|3461906": []} +{"46948419|6779551": ["It has been verified that physical layer security (PLS) technology can prevent illegitimate receivers from eavesdropping due to the time-varying nature of the wireless medium [4]\u2013[8]."]} +{"3141460|16050825": ["the emergence of visible light communication (VLC) products [17]\u2013[23], the market has begun to show future promise [24],"]} +{"3141460|13074005": ["optical spatial modulation (OSM) where only one \u201con\u201d slot is transmitted from the multiple beams at a given channel-use in order to avoid inter-channel interference [301], [302]."]} +{"3141460|11720829": ["data rate and to reduce the fading effect on the quality of signal transmission [284]."]} +{"52164676|9036148": ["As introduced in [12], [13], it is impossible to obtain the perfect CSI for wireless links in practical systems because of channels estimation errors, feedback errors, and delay."]} +{"23192358|4395259": ["Physical-layer security techniques exploit channel characteristics in securing information from eavesdroppers without the help of upper layers [9]."]} diff --git a/edge/graph_59232352.jsonl b/edge/graph_59232352.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59232541.jsonl b/edge/graph_59232541.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..369eb96402b1680dfda1871df50abafa88a10034 --- /dev/null +++ b/edge/graph_59232541.jsonl @@ -0,0 +1,15 @@ +{"43130052|9283615": []} +{"53303988|10116146": ["As a classical pattern recognition problem, texture classification primarily consists of two critical subproblems: feature extraction and classifier designation [1], [2].", "applications of computer vision and image analysis [1], [2].", "A large number of LBP variants [2] have been developed"]} +{"17271901|8575576": ["Another 96 nucleus features (not derived from the chromatin segmentation) from the literature were also considered: 92 conventional features described in [3] plus four more Hessianbased features described in [10]."]} +{"51893286|8516210": []} +{"30574837|2616070": []} +{"14222490|15305793": ["When the number of negative samples and positive samples are obviously unbalanced, the MCC gives a better evaluation than the accuracy [6].", "\u2026the positive predictive value (PPV), the negative predictive value (NPV) and the Matthew \u2019 s correlation coefficient (MCC), which are defined as [6]: where TP and FN refer to the number of correctly and incorrectly classified malignant tumors, while TN and FP indicate the number of correctly\u2026", "Finally, the SVM is employed to differentiate benign tumors from malignant ones because of its reliable, rapid and excellent classification capability [6,8,20,33].", "Generally, an ultrasound CAD system for breast cancer is performed in four stages, including image preprocessing, lesion segmentation, feature extraction, and classification [6].", "Texture features depict the tissue scattering properties caused by pathological changes of the mass [6].", "Among these, the SVM is widely used due to its fast and high generalization performance [6,8]."]} +{"14222490|6923178": ["Note that the MCC [42,43] is a powerful criterion for accuracy evaluation, which takes value in [ \u2212 1, +1] with +1 representing a perfect prediction."]} +{"11808069|7076154": ["This can be observed by listing the new entropy-based algorithms that have recently been proposed to improve and extend one of the most well-known irregularity measures, sample entropy (SampEn 1D ) [1]: see, e.g., [2]\u2013[6]."]} +{"38114314|393948": []} +{"38114314|192934": ["Later, a general definition of texture was given as a measure of the variation in intensity, measuring properties such as smoothness, coarseness and regularity [37]."]} +{"49712898|7076154": []} +{"3835525|7076154": []} +{"11312275|393948": []} +{"21098510|3496250": []} +{"60491978|33286487": []} diff --git a/edge/graph_59233814.jsonl b/edge/graph_59233814.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2907f19967975ec17de25e62259c6e6d28362cb0 --- /dev/null +++ b/edge/graph_59233814.jsonl @@ -0,0 +1,3 @@ +{"4793950|925507": ["Developing IoT applications that use an existing and stable Blockchain is one of the proposals [37, 52], in which PoW and a large number of honest miners would guarantee integrity and privacy.", "According to [37], extra care is needed to mitigate these problems.", "To deanonymize transactions there are some specific techniques, according to [37]which can be divided into four types:"]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} diff --git a/edge/graph_59234742.jsonl b/edge/graph_59234742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab1c6be75f26100be7f2a57927faec2f8f58ef26 --- /dev/null +++ b/edge/graph_59234742.jsonl @@ -0,0 +1,17 @@ +{"20014062|20705668": []} +{"20014062|40596005": []} +{"3779246|20705668": ["Moreover, because human eyes are the final receivers of scene, human perception plays a major part in designing high-efficiency coding algorithms for 3D video [4]."]} +{"3779246|396631": ["The H.264/AVC video coding standard is widely applied by its high coding efficiency, but its computational complexity is also extensively increased [3]."]} +{"2527030|396631": ["Before MDVC, Multiview Video Coding (MVC) [2] has been developed based on the state-of-the-art H.", "264/MVC [2] and the traditional MVC algorithms could be extended to depth encoding."]} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} +{"15175215|396631": ["Introduction\nThree-dimensional (3D) videos, including stereo video multiview video and, have currently been coming to the home through various approaches, such as Blu-Ray disc, cable and satellite transmission, terrestrial broadcast, and streaming and download through Internet [1].", "Three-dimensional (3D) videos, including stereo video multiview video and, have currently been coming to the home through various approaches, such as Blu-Ray disc, cable and satellite transmission, terrestrial broadcast, and streaming and download through Internet [1]."]} +{"3579967|1020148": ["Compared to traditional single view video, stereoscopic video contains more perceptual details with the same spatial resolution, which has created a widespread interest in designing and standardizing technologies for production, coding, and display of 3DTV [2]."]} +{"704007|20705668": []} +{"14116959|40596005": ["Owing to the advances in camera sensor and stereo matching technologies, the quality of a captured or an estimated depth image has improved and thus many depth-based applications are receiving considerable attention [1]\u2013[3]."]} +{"63000601|387610": []} +{"18831093|396631": ["264/AVC [28], with different QP values (QP = 22, 27, 32, 37)."]} +{"28386639|64404": ["Prediction and transform are two well-known and frequently applied methods for data decorrelation in visual signal coding and compression applications [14], [111]."]} +{"28386639|396631": []} +{"28386639|14889616": ["Finally, perceptual video coding has been applied to new video applications, including layered/scalable coding [134]\u2013[136] for heterogeneous and dynamic transmission and consumption [62], full HD 3-D video [137]\u2013[140], and high-quality digital cinematic materials or motion picture coding applications [141]."]} +{"28386639|7439310": ["Buffering strategies are common to minimize the variations in the time-varying bandwidths and jitter; error concealment can minimize the visual impact of a lost packet [164]; and retransmission and forward error correction (FEC) can reduce the number and frequency of packet loss."]} +{"14397922|3540699": ["As the scalable extension of H.264/AVC incorporates superior H.264/AVC video coding algorithms [16], this configuration has high potential to achieve good stereo quality at reduced bitrates."]} diff --git a/edge/graph_59235678.jsonl b/edge/graph_59235678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec0fd06bede7b3ddd3698f2aaf2aee23eaa23029 --- /dev/null +++ b/edge/graph_59235678.jsonl @@ -0,0 +1,164 @@ +{"40374576|205286988": []} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"9514770|205286988": ["It includes topology control mechanism, power management mechanism, and energy saving router mechanism etc[ 5-8 ]."]} +{"9514770|1230643": []} +{"8587389|1113420": ["Accordingly, a number of solutions for context gathering and modeling have been suggested [1, 3] or already found their ways into practice.", "CoBrA (Context Broker Architecture) [4] and DAIDALOS [16] are two powerful approaches that \u2013 similar to our concept \u2013 comply to the Blackboard model using a central component for storage, management and provision of context data [1]."]} +{"18761676|3348390": ["Context awareness may provide a great support to process and store the Big Data, and to make their interpretation easier [330]."]} +{"18761676|16209841": ["To ensure security of data, services and entire IoT system, a series of properties, such as confidentiality, integrity, authentication, authorization, non-repudiation, availability, and privacy, must be guaranteed [228,229]."]} +{"18761676|270804": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"18761676|205286988": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"3219636|207372751": []} +{"3219636|1230643": ["Examples include the World Wide Web [119, 120], and distributed wireless sensor systems [121, 122]."]} +{"3219636|9270553": []} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"206578345|12675271": ["[14] discuss the role of Fog computing in smart city applications."]} +{"206578345|5385031": ["[9] survey the economic and pricing theory and their applications in data collection and communication for"]} +{"206578345|37424351": ["After a thorough review of the smart city literature [3], [4], [8], [10]\u2013[12], [18],", "Technological, socio-economical and governmental factors all affect security and privacy [12].", "[12] survey security aspects of a smart city."]} +{"206578345|15093994": ["[15] provide a survey for a specific smart city application called"]} +{"206578345|2489034": ["Wang and Sng [16] survey the different deep learning algorithms, with video analytics as a target smart city application.", "Wang and Sng [16] survey the\ndifferent deep learning algorithms, with video analytics as a target smart city application."]} +{"206578345|14849079": ["c) Real-time analytics and smart cities: Integration of real-time analytics in smart cities has only been viewed as a building block of a system architecture in [254]\u2013[256].", "To this end, the smart city architectures proposed by [254] and [263] are based on data presentation core func-"]} +{"206578345|207209718": ["sion detection systems have been proposed [302], [304]\u2013[306].", "Additionally, some of the legacy devices used in power grids does not support cryptographic solutions and are virtually impossible to patch or update [304] which introduces a new set of challenges to security and"]} +{"206578345|8253022": ["issues [353], [376], [415]\u2013[417]."]} +{"206578345|10817088": ["These challenges are also aggravated by the increasing elderly population, which translates into a horde of chronic diseases and higher demand for healthcare services [52]."]} +{"206578345|7644489": ["Furthermore, D2D promises to provide peer-to-peer (P2P) and location-based services [142]."]} +{"206578345|7076261": ["Although security threats and challenges are an inherent part of any ICT system [289]\u2013[292], its impact level amplifies many folds in case of smart cities where symbiosis of physical infrastructure and ICT becomes a reality."]} +{"206578345|393948": ["a) Deep learning algorithms: Deep learning is a set of algorithms in machine learning with the goal of modelling high-level data abstractions using linear and non-linear transformations [221], [222]."]} +{"206578345|1708582": ["learning algorithms can be found in [150]\u2013[152]."]} +{"206578345|239537": ["It is a way to represent the data and services for end users in a friendly and easy manner [258]\u2013[260]."]} +{"9199492|18643817": ["\u2026protocols, and techniques have been done in the last few years to deliver multimedia content over large-scale networks, such as single-hop wired LANs (e.g., [3], [4]), multi-hop wired LANs (e.g., [5]), ATM (e.g., [6], [7]), mobile adhoc networks(e.g., [8], [9]) and the Internet (e.g., [10]\u2013 [14])."]} +{"9199492|14088590": []} +{"9199492|12817488": []} +{"9199492|1236072": ["For example, some applications might require a diverse mixture of sensors for monitoring temperature, pressure, and humidity of the surrounding environment, detecting motion via acoustic signatures, and capturing images or video tracking of moving objects [24]."]} +{"9199492|1230643": ["Although plethora of works on surveying architecture, applications and communication protocols for wireless sensor networks are performed beforehand [1], [15]\u2013[20], this survey is distinguished from the previous efforts in that it pioneers to investigate those routing techniques which address application-specific QoS as well as energy efficiency for WMSNs.", "[15], [34], [35], [36], [39], [40], [41], [42] Hard Real-time Bounded"]} +{"17838102|1230643": []} +{"43031330|44461432": ["Security: security, privacy, and standard are very important to protect the data from illegal access.[18]", "[18] A data mining model was proposed by some researchers using an algorithm of the ER model which can complete database schema and SQL queries to build and conversion, such as sequence databases."]} +{"6161031|17514014": []} +{"6161031|20905429": ["\u2026the niche recreational fitness arena catered to by current devices, researchers have also considered applications of such technologies in clinical applications in remote health monitoring systems for long term recording, management and clinical access to patient\u2019s physiological information [4]\u2013[8].", "Most proposed frameworks for remote health monitoring leverage a three tier architecture: a Wireless Body Area Network (WBAN) consisting of wearable sensors as the data acquisition unit, communication and networking and the service layer [4], [7]\u2013[10]."]} +{"53569365|3757239": ["With the help of Edge nodes and network connections, processing overhead is largely decreased and bandwidth restrictions are surmounted for consolidated services [19]."]} +{"45561163|2535224": []} +{"8507340|2906926": []} +{"8507340|2357830": ["Aside from scalability issues, privacy continues to be a challenge for data collection [40, 58\u201362, 69, 71, 78, 81, 82, 111]."]} +{"18382285|2383780": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"17385869|2220294": ["Development of new generation 4 G [89] and 5 G infrastructure for a mobile devices is also proposed [90].", "Specific Medical Condition DOA* [128], cardiac [38, 69, 89, 132], diabetes [133], [37], facial changes [18], fall [19, 58, 61], hypovolaemia [134, 135], hyperpyrexia [136] Dementia [10, 11], Alzheimers [12], [13], Parkinsons [14\u201316], obstructive sleep apnoea [54]"]} +{"17385869|20905429": ["Like any other technological advancement, smart health monitoring systems have both benefits and limitations and currently, there is on-going research to improve these systems [84, 92]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"15395523|1634674": ["More recently, Turaga et al. [9] and Aggarwal et al. [31] present surveys focusing on highlevel representation of complex activities and corresponding recognition techniques."]} +{"15395523|20905429": ["Over the past decade, sensor technologies, especially low-power, low-cost, high-capacity, and miniaturized sensors, wired and wireless communication networks [11]\u2013[13],"]} +{"15395523|7788290": ["HMMs have more recently been adopted as a model of choice in computer vision for modeling sequential (video) data (see [5] and [7] for surveys, and [94] and [102] for early examples).", "However, it is worth pointing out that while visual monitoring is intuitive and information-rich, vision-based activity recognition suffers from issues relating to privacy and ethics [4], [5], [8] as cameras are generally perceived as recording devices.", "Gavrila [5] and Poppe [6] present surveys mainly on tracking human movement via 2-D or 3-D models and the enabled action recognition techniques."]} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"21036352|1236072": ["Some problems as the design of Media Access Control WSN protocols (Abbasi and Younis 2007) and of routing techniques (Al-Karaki and Kamal 2004) have been widely studied in the literature."]} +{"8085527|60455": ["As a general data structure, graphs have become increasingly important in modeling sophisticated structures and their interactions, with broad applications including chemical informatics, bioinformatics, computer vision, video indexing, text retrieval, and Web analysis.", "and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "Web usage mining is focused on the analysis of users\u2019 activities when they browse and navigate through the Web.", "Web content mining is a knowledge discovery task of \ufb01nding information within web pages, while web structure mining aims to discover knowledge hidden in the structures linking web pages.", "Web mining is the application of data mining techniques to discover patterns and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "There are many applications involving sequence data, such as customer shopping sequences, Web clickstreams, and biological sequences.", "Web access patterns via association rule mining in web logs were proposed by (Chen et al. 1996; Pei et al. 2000; Srivastava et al. 2000; Punin and Krishnamoorthy 2001)."]} +{"11961832|9862516": ["well as other characteristics of cellular, wireless local area network, and RFID technologies are much different from each other [20]."]} +{"19553309|4427557": ["other hand, Low Power Wide Area (LPWA) networks present a good candidate to support the aforementioned diverse requirements of the IoT framework [12]\u2013[14]."]} +{"19553309|25929315": ["The reader is encouraged to refer to [48]\u2013[51] for more details about the higher layer challenges and solution for M2M devices from 3GPP perspective."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"21697461|16762549": ["Smart Home/City Real-time crowd control [69] [70], realtime irregularity detection of senior citizens [71] [72] Number of smartphones and surveillance cameras."]} +{"21697461|6664074": []} +{"21697461|5385031": ["[27] surveyed a wide range of economic and pric-"]} +{"21697461|21386749": ["[24] provided the state-of-the-art network architecture, applications, and industrial trends in IoT-based healthcare services."]} +{"21697461|7329149": []} +{"45911264|10817088": ["The accelerating demand on healthcare services and the exponential cost associated with medical interventions call for innovative solutions for remote health monitoring such as WBANs [7, 22, 39, 51]."]} +{"45911264|10206347": []} +{"45911264|30383344": ["able sensors), on-body (wearable sensors [22]), or surrounding the body for behavioral recognition [60]."]} +{"45911264|7988320": ["Similar to [100] the authors surveyed the \ufb01rst three layers of the protocol stack, discussed cross layer, QoS, and security issues.", "Due to its importance and complication, security in WBAN must be addressed at different layers and levels [100], i.e. MAC, physical, and network layers.", "Ullah et al. [100] reviewed WBAN architecture, topology, and studied the proposed technologies for WBANs at physical, MAC, and network layers and analyzed the behavior of these layers.", "These nodes are distributed either on the human body (i.e. wearable sensor nodes) or implanted inside the body and they are under the control of a coordinator node [100].", "There is a consensus among researchers that there are differences between wireless sensor network (WSNs) and WBANs [18, 55, 60, 61, 100].", "This section brie\ufb02y reviews WBANs architecture and applications, other detailed review on the matter are available in the literature [18, 55, 60, 61, 100].", "Therefore, researchers agreed that 2.4 GHz band is the most attractive spectrum to be used in medical applications in addition to their ability to protect adjacent channel interference [100].", "However, some of the bands are not suitable for WBANs applications as they cannot support video or voice transmission (e.g., HBC) or are only eligible to be used by authorized users (e.g., UWB) [100].", "Security and military applications [80, 100] are also covered by WBAN, especially for battle\ufb01eld surveillance where sensors are deployed in the soldiers uniform to track their ambulation, monitor their health, and detect the presence of toxic materials.", "The Wireless Body Area Networks (WBANs) come to provide an ef\ufb01cient paradigm for e-health and telemedicine applications and requirements [54, 61, 100]."]} +{"45911264|28210515": ["Further, [113] surveyed the studies of coexistence between IEEE 802.11 and IEEE 802.15.4-based networks."]} +{"45911264|7854020": ["This is due to the fact that the low-power WiFi have not modi\ufb01ed the parameters used in the original operation of CSMA/CA mechanism.", "6 WBAN is formed by customizing the node\u2019s module in OPNET according to the specifications described in [59].", "The third mode is non-beacon mode, without superframe boundaries, where the network employs the ordinary CSMA/CA mechanism for medium access, which is the one considered in this analysis.", "This is due to the fact that offset yields time spacing while using the opportunistic contention-based access technique, i.e. CSMA/CA, at the same time.", "Accordingly, only the unslotted CSMA/CA MAC mechanism is considered in the analysis.", "AIIA introduced a new superframe structure which contains two periods: contention-based period during which CSMA/CA is used, and scheduled period during which TDMA is used.", "This is expected since the WBAN nodes are using CSMA/CA [59] in their MAC layer.", "For the medium access we consider the Distributed Coordination Function (DCF) MAC operation that uses CSMA/CA mechanism.", "AIIA tries to reduce mutual interference between WBANs using a hybrid MAC approach that utilizes both Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanism and TDMA.", "On the other hand, the WBAN may be surrounded with other wireless technologies that operate at the same band, using higher transmission energy, different MAC protocols (possibly withoutCSMA/CA),andcoexistwithintheinterferencerange of the WBAN.", "In the unslotted CSMA/CA protocol each node maintains two variables: a backoff exponent (BE) and a counter of the number of occurred backoffs (NB).", "For the MAC layer, IEEE 802.15.6 divides the operation time into superframes which is similar to the slotted CSMA/CA operation in Zigbee."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"1273108|7971188": ["A multitude of overlay designs have been proposed in recent years to address diverse issues, which include: ensuring performance [25] and availability [26] of Internet routing, enabling multicasting [27\u201329], providing QoS guarantees [30], protecting from denial of service attacks [31,32], and for content distribution [33], file sharing [34] and even in storage systems [35].", "In addition, highly popular and widely used peer-to-peer [34] networks are also overlays in the application layer."]} +{"1273108|3189715": ["Two separate schools of thought emerged on how to actually implement such concepts: one from telecommunications community and the other from IP networks community [21].", "Open signaling takes a telecommunication approach to the problem with a clear distinction between transport, control, and management planes that constitute programmable networks and emphasize QoS guarantees for created services [21]."]} +{"1273108|10559330": ["The main objective of the AGAVE [49\u201351] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of QoS forwarding mechanisms such as IntServ [52] and DiffServ [53,54].", "The main objective of the AGAVE [3, 43, 63] project is to provide end-to-end QoS-aware service provisioning over IP networks following the theme of previously de\ufb01ned, but never implemented, QoS forwarding mechanisms such as IntServ [64] and Di\ufb00Serv [65]."]} +{"12724959|485843": ["THE communications requirements of a wide range of potential smart grid applications have been recently quantified in terms of latency, bandwidth, reliability, and security [1].", "In Table III, the upper bound for all permutations of [1, 2, 3, 4] STAs/ONU and [1, 2, 3, 4] sensors/ONU is computed to study their impact on the theoretical upper bound."]} +{"31781530|10693567": ["Being widely supported by various device manufacturers, service providers, and operators, OpenFlow (defined by the Open Networking Foundation, ONF) is broadly considered as the dominating solution for implementing the southbound interface; more details on OpenFlow are given by [4]."]} +{"3546145|21386749": ["[44] reviewed the advances in health care which relies on Internet of Things (IoT) technologies.", "In particular, the work [44] also included security related taxonomies in the context of healthcare."]} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"5385031|7320605": ["Moreover, the surveys on applications of game theory for wireless sensor network focus on general problems not specifically from economic and pricing aspects [12], [13].", "\u2022 Strategy: Player\u2019s strategy is a complete plan of actions/instructions that the player can choose [12], and the payoff depends on not only its own actions but also the actions of others."]} +{"5385031|1756215": [", the attacker and the WSN owners) which strengthen the network security [222]."]} +{"5385031|12817488": ["redundancy as well as saving the energy required for information transmission to the sink node [99], [100]."]} +{"5385031|17205659": ["Various WSN security protocols were classified and evaluated in [221]."]} +{"19994141|2871699": ["In [14], the authors review the standardization efforts and the application protocols."]} +{"19994141|3330461": ["D2D communications pose many challenges and research issues that are described in [86] and [137] along with the state-of-the-art approaches to address these challenges."]} +{"19258692|3488022": ["With regard to this, Fingasa and Brownb [7] collected a variety of airborne big data in different seas where oil spills occurred previously.", "[7] M. Fingasa and C. Brownb, \u201cReview of oil spill remote sensing,\u201d Marine Pollution Bull., vol. 83, no. 1, pp. 9\u201323, Jun. 2014."]} +{"20563936|3767252": ["Besides, in [38], the authors also analyze the relation between fog-computing and other related areas, e."]} +{"22143952|3330313": []} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"7958632|1230643": []} +{"55727570|5246835": []} +{"27060711|10693567": []} +{"1756215|1940388": []} +{"1756215|17205659": []} +{"3498781|289357": ["When K and Rn become larger, it is an NP-hard problem [25], and advanced search algorithms, such as ant colony optimization and discrete stochastic optimization, can be applied to obtain the optimal solution with lower computational complexity [26], [27], [28]."]} +{"3166491|2509135": []} +{"67693197|5022650": []} +{"67693197|25929315": ["Second, current networks are already dealing with scarcity of spectrum resources, which means there might not be enough resources to support CPS communications and packet scheduling problems will quickly result leading to a significant decrease in network capacity and spectral efficiency [13, 15]."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"16390931|33644565": []} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"19820055|23893450": ["[28] present a survey of the recent data driven approaches in smart grid security."]} +{"20151743|7971188": ["Well-known examples are Virtual Private Networks (VPN) [16] or peer-to-peer applications [17]."]} +{"1599458|1520906": []} +{"1599458|3348390": ["[22,32\u201342,66] Surveys oriented to data mining Relationships between data mining, KDD and big data for IoT."]} +{"1599458|191396": ["[22,32\u201342,66] Surveys oriented to data mining Relationships between data mining, KDD and big data for IoT.", "New framework is presented in [32] to understand data mining algorithms [38\u201342]."]} +{"52116125|13991708": []} +{"52116125|206986475": ["Most survey papers focus on WSN [25]\u2013[27], software platforms and hardware items [37]\u2013[39], architectures [47]\u2013[49], and applications of IoT [50]\u2013[52]."]} +{"52116125|1599458": ["Besides, researchers investigate the new technology and issues about IoT that are data fusion and service-oriented framework [40], [41], context awareness techniques [45], [46], cloud computing [43], [44], industrial applications [29], [30], etc."]} +{"52116125|8650651": ["Defined Networks (SDN) [124], [125] have been proposed to implement different data transfer between HNEs."]} +{"52116125|17262196": []} +{"52116125|1082096": []} +{"52116125|20473693": []} +{"52116125|3348390": ["Besides, researchers investigate the new technology and issues about IoT that are data fusion and service-oriented framework [40], [41], context awareness techniques [45], [46], cloud computing [43], [44], industrial applications [29], [30], etc."]} +{"206578486|206578224": ["Reference [45] provides a survey of MEC."]} +{"206578486|6909107": [" data centers, using technologies such as OpenStack and ONOS [34]. Let us also stress that a few surveys that discuss mobile edge computing at large have been published in the very recent past (e.g., [35]). A. Cyber Foraging Cyber foraging is among the first concepts for edge computing but has now been superseded by more recent concepts such a cloudlet, MEC, and fog. We discuss it here because of its "]} +{"206578486|26429034": ["Such a characterization can be achieved through the analysis of corresponding real-world traces, through machine learning techniques [151], [158]."]} +{"206578486|7329149": ["For instance, Industrial IoT solutions [159] usually require low-latency ingestion but immediate processing of data [160]."]} +{"24334533|8909218": ["In LTE-A, stations can be configured as evolved universal terrestrial radio access (E-UTRA) NodeBs (eNBs) in macrocells or picocells, home eNBs (HeNBs) in femtocells [5]\u2013[7], and relay nodes (RNs) in relay networks to provide comprehensive wireless access in both outdoor and indoor environments."]} +{"24334533|25929315": ["To support M2M communications in LTE/LTE-A, the following solutions have been proposed for controlling PRACH overload [46], [47]."]} +{"12711115|7834819": ["Risk of falling [81], freezing of gait [84]\u2013[89], physical activity [33], and sleep disorders [90] are among the most relevant issues to tackle using"]} +{"44091851|3348390": []} +{"44091851|25929315": []} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"28390777|16654832": []} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"14894961|7923463": []} +{"30480668|17206258": []} +{"17863034|12817488": ["In addition, since data are required to be delivered to the base station without any information loss, the data aggregation/fusion operations [12] are hard to be applied, which calls for novel solutions for enhancing the network performance."]} +{"10817088|2670121": ["Generative probabilistic graphical models such as hidden Markov models [72], [70], [73], [74] and dynamic Bayesian networks [64], [48] have been used to model activity sequences and to smooth recognition results of an ensemble classifier [75]."]} +{"5680434|2623404": ["A flow entity consists of match fields, counters, and a set of instructions to match to the incoming packets, collect statistics regarding the current flow, and handle a matched packet.", "\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"5680434|10693567": ["\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"2666574|1520906": ["To integrate the sensory data collected from heterogeneous sources is challenging [14,38].", "The most recent advances made in IoT began when RFID tags were put into use more frequently, lower cost sensors became more available, web technology developed, and communication protocols changed [14,15]."]} +{"2666574|44461432": ["[11] introduced a systematic method for reviewing data mining knowledge and techniques in most common applications."]} +{"2666574|3330313": []} +{"2666574|38476": ["In these cases, data points consist of sequences of \u00f0 x ; y \u00de pairs rather than being drawn in an i.i.d. manner from a joint distribution p \u00f0 x ; y \u00de ; and such the sequences exhibit signi \ufb01 cant sequential correlations [55,127].", "It is worth noting that there is another closely-related task, called sequence classi \ufb01 cation , in which the goal is to predict the desired single categorical output y given an input sequence x [127]."]} +{"2666574|17374870": []} +{"1442447|3348390": ["\u2026quick deployment of new network elements and architectures [51]; (cid:129) co-existence of heterogeneous network architectures over a common infrastructure [52]; (cid:129) all the time reachability [53]; (cid:129) self-management of network objects, achieved through context awareness [54]."]} +{"206450227|10817088": []} +{"9951196|154032": ["In [56], the EE of the networking components in cloud-based environments was provided."]} +{"9951196|8215225": ["Interesting readers may also refer to [49] for distributed data aggregation algorithms."]} +{"19540320|1230643": []} diff --git a/edge/graph_59248503.jsonl b/edge/graph_59248503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7b7e1d1e0ca773f5e8fe11413297c891f943f63 --- /dev/null +++ b/edge/graph_59248503.jsonl @@ -0,0 +1,9 @@ +{"7586217|534755": ["The dynamics of GRN can be modeled using different approaches (De Jong, 2002; Smolen et al., 2000; Mason et al., 2004).", "Robustness and evolvability are two central properties of biological systems (Srtelling et al., 2004; de Visser et al., 2003; Kirschner and Gerhart, 1998; Nehaniv, 2003; Poole et al., 2003; Wagner, 2005a)."]} +{"11732370|14578535": ["2497142 of modular neural network [2], [3], which typically structure solutions as a decision tree whose leaves are subnetworks, each"]} +{"14513260|534755": []} +{"1522994|17464562": []} +{"22423688|1708582": ["This approach to solving complex control problems is an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al. 1996; Sutton and Barto 1998)."]} +{"2261995|534755": []} +{"16170503|534755": ["\u2026networks (Weaver et al., 1999; Vohradsky, 2001), differential equations (Chen et al., 1999; Mestl et al., 1995), and models including stochastic components on the molecular level (McAdams and Arkin, 1997) (see (Smolen et al., 2000; Hasty et al., 2001; de Jong, 2002) for reviews of general models).", "... including linear models (D\u2019Haeseleer et al., 1999) Bayesian networks (Murphy & Main, 1999; Friedman et al., 2000; Hartemink et al., 2001), neural networks (Weaver, Workman, & Stormo, 1999; Vohradsky, 2001), differential equations (Chen, He, & Church, 1999; Mestl, Plahte, & Omholt, 1995), and models including stochastic components on the molecular level (McAdams & Arkin, 1997) (see Smolen, Baxter, & Byrne, 2000; Hasty et ..."]} +{"16749189|534755": ["While the study of the sole topology of the network provides some knowledge on the involved biological components, the dynamical modelling aims at understanding the dynamical properties of the system (see [1] for a review on the modelling of regulatory networks and [2] for a recent survey of computational techniques applied to model signalling networks)."]} +{"15771398|206268920": ["For the same reason, the controllers cannot be directly applied to control of non-reconfigurable snake robots either (see [23] for an overview)."]} diff --git a/edge/graph_59249287.jsonl b/edge/graph_59249287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a928b3ce740703934c962523152aa1749657797 --- /dev/null +++ b/edge/graph_59249287.jsonl @@ -0,0 +1 @@ +{"113239261|5791119": []} diff --git a/edge/graph_5925573.jsonl b/edge/graph_5925573.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59263817.jsonl b/edge/graph_59263817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab37917362aa61dd1d8a83e3760e7a349e2fc33e --- /dev/null +++ b/edge/graph_59263817.jsonl @@ -0,0 +1,5 @@ +{"2807044|8424228": []} +{"9935548|6611633": ["RDOs can be viewed as simple Agents [49] or as a light-weight formofprocess migration[14,46,51,56]."]} +{"846192|8424228": ["RELATED WORK The tradeoff between consistency and performance/availability is \nwell under\u00adstood [Coan et al. 1986; Davidson et al. 1985]."]} +{"7834967|8424228": ["serializablhty [ 6 ], such as reqturing clients to access a quorum of", "tributed database systems [4, 6 ]. For example, a Write operation that installs a new program binary file might only include a depen-"]} +{"6051694|2451860": ["Some systems [ 8 , 65] allow clients to obtain an exclusive copy of the section of the database it is accessing.", "For a complete survey of previous work on IRs and the mobile databases described above in Section 7.1, we refer the reader to Barbar\u00b4 a [ 8 ]."]} diff --git a/edge/graph_59270886.jsonl b/edge/graph_59270886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59277289.jsonl b/edge/graph_59277289.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6b04a126096e02e3b31a35bb9eb7fd7224a7469 --- /dev/null +++ b/edge/graph_59277289.jsonl @@ -0,0 +1,2 @@ +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"24167070|393948": ["The input is reconstructed from the representation c(x); therefore, the target output of the AE is its input [20], [25].", "Therefore, AEs were proposed to extract nonlinear features of the data and construct deep neural networks [25]."]} diff --git a/edge/graph_59278765.jsonl b/edge/graph_59278765.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59288781.jsonl b/edge/graph_59288781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..634336c5af9c5b4fd1e18e5249265bbdec29e045 --- /dev/null +++ b/edge/graph_59288781.jsonl @@ -0,0 +1,5 @@ +{"56130793|17234703": []} +{"16941372|17234703": []} +{"11798159|9176080": []} +{"9188844|9176080": []} +{"5254274|9176080": []} diff --git a/edge/graph_59314746.jsonl b/edge/graph_59314746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62f7fcd352791ea83d4d11cedbf82f172cfecdac --- /dev/null +++ b/edge/graph_59314746.jsonl @@ -0,0 +1,30 @@ +{"31102928|925507": []} +{"207019055|31245252": ["Even though significant developments have taken place over the past few years in the area of VCS, security issues, especially key management schemes are still an open topic for research [5], [6]."]} +{"18129749|6444031": ["The ability to prevent multiple identities from a single machine, is key in preventing a Sybil attack, this combined with the expensive cost of entrance [20] to our network, makes it unviable for all but the most powerful adversary to conduct a Sybil attack on the network."]} +{"3639079|3628110": ["Despite providing robust approaches for securing IoT, the blockchain systems are also vulnerable [136]."]} +{"3639079|3767252": []} +{"3639079|2142482": ["Similarly, the authors in [12, 13, 14] target a comparative evaluation of intrusion detection systems."]} +{"3639079|16209841": ["The security analyses presented in [9, 10, 11] discuss and compare different key management systems and cyrptographic algorithms."]} +{"3639079|2181694": ["The energy constrained devices in IoT are vulnerable to \u201dsleep deprivation\u201d attacks by causing the sensor nodes to stay awake [36].", "5 Sleep deprivation attack Energy consumption Link layer Low-level Multi-layer based intrusion detection system [36]", "A framework for mitigating sleep deprivation attacks in wireless sensor networks is described in [36]."]} +{"3639079|9646739": []} +{"3639079|925507": ["The authors in [126] have categorized 18 use cases of blockchain, out of which four cases are for IoT."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"97325|16426674": []} +{"6699720|18037424": ["Smart metering is also specific in that the communication protocols it involves do not exhibit strong quality of service requirements such as those mandated by supervisory control and data acquisition systems (SCADA) [7]."]} +{"1756768|3348390": ["[30], intelligence should be a major characteristic of IoT systems."]} +{"64540876|5747564": []} +{"3404334|925507": ["Even in the emerging field of the Internet of Things (IoT), blockchain technology can be used in different scenarios and forms [15], [17], [24]\u2013[28]."]} +{"2206177|16153186": []} +{"2206177|17205659": []} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"206260623|3336775": []} +{"57719533|12325560": []} +{"57719533|1230643": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"2685460|2623404": ["Software-Defined IoT Components Software-defined networking (SDN) [12, 13] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic).", "Network Virtualization [15] goes beyond SDN by focussing on the virtualization of all components resulting in the ability to define customized virtual networks.", "Software-defined networking (SDN) [12] [13] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic)."]} +{"4700293|49527603": ["Blockchain can be used as a peer-to-peer (P2P) decentralized system to store the pseudonymous transaction records in a trustless environment [5], [6]."]} +{"11512803|7128700": ["Therefore, in choreography-oriented BPM, many unique situations have to be foreseen by a verification approach [3, 17, 36].", "In a choreography, each involved participant receives information about the negotiated terms and requirements of a designated part of the choreography and then acts independently [3].", "This design removes single points of failure as well as messaging bottlenecks [3].", "Choreographies, which are executed in a highly decentralized manner, help to mitigate this scalability issue [3]."]} +{"9991173|17474643": ["However, cloud service providers (CSP) struggle with a lack of collaboration for sharing data due to the adverse risks posed on exposing the contents on their data [13]."]} +{"3663005|4261497": []} +{"2634617|2387055": ["A survey on these issues is provided in [17]."]} +{"18277805|2623404": ["Network Virtualization [9] goes beyond SDN by focussing on the virtualization of all elements resulting in the ability to define customized virtual networks.", "Software-defined Networking Softwaredefined networking (SDN) [6,7] is a management concept that centers on using abstraction to enable the decoupling the control plane (determine destinations of traffic) and data plane (forwarding traffic)."]} diff --git a/edge/graph_59316429.jsonl b/edge/graph_59316429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d331ce9802e08ad95d7e50333fc51e4ad9f572d7 --- /dev/null +++ b/edge/graph_59316429.jsonl @@ -0,0 +1,6 @@ +{"18582143|10150488": ["[2] reviews common scheduling strategies for data-parallel systems.", "Rao and Reddy [2] give an overview over several scheduling strategies within the Hadoop MapReduce framework such as FiFo, fair, capacity, delay, deadline, and resource-aware schedulers."]} +{"6407934|14140377": ["Temporal query languages [35] are based on a rich model of history, and with their many special-purpose language constructs they dramatically subsume CQL in terms of expressiveness."]} +{"40119576|8914588": []} +{"6548473|14315321": []} +{"8101432|14140377": ["Ourwork is likely to benefit fromand contribute to the considerable research on temporal databases [22], main-memory databases [10], and real-time databases [16,22].", "There has been extensive research on scheduling tasks in real-time and multimedia systems and databases [21,22]."]} +{"7243312|8914588": ["The paradigm enabling this behavior is known as Autonomic Computing [5]."]} diff --git a/edge/graph_59316552.jsonl b/edge/graph_59316552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f3394ba48f465dd9427cd947038bf7acc8b55b8 --- /dev/null +++ b/edge/graph_59316552.jsonl @@ -0,0 +1,2 @@ +{"2426701|9145937": []} +{"57521884|627405": ["[26], which incorporate the procedures for performing a systematic literature review in the context of software engineering."]} diff --git a/edge/graph_59316590.jsonl b/edge/graph_59316590.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e440ba1fc3a3a0e67fa126dddbe2959991c9534c --- /dev/null +++ b/edge/graph_59316590.jsonl @@ -0,0 +1,11 @@ +{"7724967|15767558": [", [2, 3, 14, 19, 24, 25, 39, 40, 41], but we do not cover them in any detail in this study."]} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"3243570|14814753": ["Traditionally, the community has focused on activity recognition in the domain of RGB videos [34, 13]."]} +{"3243570|12724190": ["Even without the context information and visual cues, early work [17] in biological perception and more recent methods [9, 10, 31] provide strong evidence that encoding humans as a 3D skeleton yields both a discriminative and a robust representation for activity analysis.", "Naturally, computer vision methods leveraging on the 3D structure provided by such 3D sensors, namely RGB+D methods, have been an active area of research [9]."]} +{"3243570|1634674": ["Traditionally, the community has focused on activity recognition in the domain of RGB videos [34, 13]."]} +{"2654595|12724190": []} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"15928602|4351505": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|41505326": ["It is worth mentioning, there are more than 40 datasets speci\ufb01cally for 3D human action recognition [47].", "For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|12724190": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|1262156": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} diff --git a/edge/graph_59316639.jsonl b/edge/graph_59316639.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59316694.jsonl b/edge/graph_59316694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a9c1c4af92679c6d482d3adcc1a2b88797c5387 --- /dev/null +++ b/edge/graph_59316694.jsonl @@ -0,0 +1 @@ +{"2377549|7020971": ["afeguards on step sizes we propose are quite important in practice: without these checks, we observe divergence when the initial step sizes are chosen too large. Motivated by the convergence proof in [Ber11], for each row, we seek a step size on the order of 1=kg ik 2, where g i is the gradient of the objective function with respect to x i. We start by choosing an initial step size scale i for each row o", "size rule t = 1=tguarantees convergence to the globally optimal Xif Y is xed, while using a xed, but suciently small, step size guarantees convergence to a small O() neighborhood around the optimum [Ber11]. The technical condition required on the step size is that t <1=L, where Lis the Lipshitz constant of the gradient of the objective function. Bolte et al. have shown that the iterates xt i and yt "]} diff --git a/edge/graph_59316790.jsonl b/edge/graph_59316790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59316955.jsonl b/edge/graph_59316955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59328300.jsonl b/edge/graph_59328300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d1a00a4967b614a2f91d58688abf8be6447f082 --- /dev/null +++ b/edge/graph_59328300.jsonl @@ -0,0 +1 @@ +{"1360344|17402408": []} diff --git a/edge/graph_59333092.jsonl b/edge/graph_59333092.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59334826.jsonl b/edge/graph_59334826.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd7b02b66ed95dec8c52c4705612719a97636ffa --- /dev/null +++ b/edge/graph_59334826.jsonl @@ -0,0 +1,7 @@ +{"14455772|6430931": []} +{"2008810|12595430": ["Intrusion detection includes analysis of Big Data problems [2, 3], which is defined as one of the challenging research topics where conventional computing technologies cannot deal with the huge volume of data."]} +{"1928156|17205659": ["The comparison of attacks in WSN is shown in TABLE I [5,10,11]."]} +{"17208673|28628245": []} +{"17208673|15199849": []} +{"17208673|17205659": ["Subsequently, the security aspect is the most challenging issue that deserves more attention in the wireless sensor networks [1]."]} +{"9760925|5660618": ["Attacks: d C2P (t) = A sin(\u03c9at) (A = 6, \u03c9a = 2\u03c040 rad/s) is added to the commands on the intervals [5] [10] and [15] [30] s; d P2C (t) = A square(t/P ) (A = 5, period P = 5 s, duty cycle 50", "In literature, various techniques have been proposed to address these problems [15]."]} diff --git a/edge/graph_59336096.jsonl b/edge/graph_59336096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86a931fb784365213051f0d84130fe8ba4d639d4 --- /dev/null +++ b/edge/graph_59336096.jsonl @@ -0,0 +1,6 @@ +{"18013544|1876323": []} +{"18013544|8363289": []} +{"125644013|18013544": []} +{"125644013|9072047": []} +{"125644013|1876323": []} +{"22724244|1876323": ["The advantages of SMC are, for example, good transient performance, robustness of stability, insensitivity to matched uncertainties and external disturbances [24, 25]."]} diff --git a/edge/graph_59336124.jsonl b/edge/graph_59336124.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ad426a6e1582adbc14d19104184b7c92275232c --- /dev/null +++ b/edge/graph_59336124.jsonl @@ -0,0 +1,7 @@ +{"16584429|12894036": ["\u2026clustering algorithms are based on Euclidean geometry and consequently place limitations on the shape of the clusters, spectral clustering can adapt to a wider range of geometries and detect non-convex patterns and linearly non-separable clusters (Ng, Jordan, and Weiss 2001; Filippone et al. 2008).", "While many clustering algorithms are based on Euclidean geometry and consequently place limitations on the shape of the clusters, spectral clustering can adapt to a wider range of geometries and detect non-convex patterns and linearly non-separable clusters (Ng, Jordan, and Weiss 2001; Filippone et al. 2008)."]} +{"57189462|59336124": ["A plethora of such specialized algorithms are known (Tremblay and Loukas, 2019)\u2014arguing about the pros and cons of each extends beyond the scope of this work."]} +{"125829157|207023804": ["In the past half-decade, the theory of analyzing and processing data on the vertices of a graph as well as underlying graph topologies, namely, signal processing on graphs, has been developed rapidly [1]\u2013[4]."]} +{"32132435|191396": ["To summarize, just as discussed in [ 1 ], there is no clustering algorithm that can be universally used to solve all problems.", "As an exploratory data analysis tool, clustering aims to group objects of a similar kind into their respective categories (see [ 1 ] for a comprehensive survey)."]} +{"2664242|191396": ["According to [21], k-means has complexity O(\u03b7N) where \u03b7 is the dimension of the N considered vectors."]} +{"11352995|12894036": ["The kernel is computed so that kernel k-means and SC share the same objective function (Filippone et al., 2008).", "The kernel is computed so that kernel k -means and SC share the same objec-tive function (Filippone et al., 2008)."]} +{"12003435|192934": ["For further information on clustering and clustering algorithms, see [34], [11], [28], [30], [29]."]} diff --git a/edge/graph_59336156.jsonl b/edge/graph_59336156.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d68c7d52895d89d6d59f7e317e8a7e65dbdf381 --- /dev/null +++ b/edge/graph_59336156.jsonl @@ -0,0 +1,4 @@ +{"3219636|207372751": []} +{"3219636|1230643": ["Examples include the World Wide Web [119, 120], and distributed wireless sensor systems [121, 122]."]} +{"3219636|9270553": []} +{"52970470|9316331": []} diff --git a/edge/graph_59336584.jsonl b/edge/graph_59336584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eee4adfbeb301598ae40947135e5ef43c1175148 --- /dev/null +++ b/edge/graph_59336584.jsonl @@ -0,0 +1,3 @@ +{"69802043|16333689": ["The Apriori-based algorithms have considerable overhead when two size-k frequent substructures are joined to generate a size (k+1) graph candidates [57, 58]."]} +{"3646491|60455": []} +{"3646491|3102110": ["The primary goal of data mining is to extract statistically significant and useful knowledge from data (Chen et al., 1996; Han & Kamber, 2006).", "The primary goal of data mining is to extract statistically signi\ufb01cant and useful knowledge from data (Chen et al. 1996; Han & Kamer 2006)."]} diff --git a/edge/graph_59336633.jsonl b/edge/graph_59336633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e24412bd097d341bfc6dcf9b59517161a3f01c05 --- /dev/null +++ b/edge/graph_59336633.jsonl @@ -0,0 +1,5 @@ +{"10737591|1805048": []} +{"3265045|7839197": ["Similar problems are seen in the agent domain where, as Nwana [16] argues, it has yet to be conclusively demonstrated if people really benefit from such information systems."]} +{"49648969|393948": ["the Skip-gram architecture [2, 18, 20], which is originally developed for natural language processing and word embedding."]} +{"49648969|1805048": ["Item-based Collaborative Filtering [23]: Recommended English citations using Item-based Collaborative Filtering based on (monolingual + cross-language) citation relations, denoted as CFI .", "Popularity-based Collaborative Filtering [25]: Recommended English citations using Popularity-based Collaborative Filtering based on (monolingual + cross-language) citation relations, denoted as CFP .", "Machine Translation by Google Translation API + Language Model (with Dirichlet smoothing) [30]: We translated the testing Chinese paper\u2019s abstract into English, and then used language model to recommend English citations, denoted asMT+LM.\nCollaborative Filtering Based Method."]} +{"39114571|393948": ["Other notorious issues in using local representations like TF-IDF can be found in (Bengio et al. 2013).", "In addition, given the local nature of TF-IDF representations (Bengio et al. 2013),which normally results in storing big size dictionaries, their usage usually leads to a huge amount of disk usage."]} diff --git a/edge/graph_59337125.jsonl b/edge/graph_59337125.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a92ea51af94dcf4c08bb23d744241a1848c66d6 --- /dev/null +++ b/edge/graph_59337125.jsonl @@ -0,0 +1,7 @@ +{"5960721|2357830": ["RFID tags support more functionality than barcodes, and the accuracy in the identification process is increased [9].", "However, the massive adoption of this technology is being delayed due its associated security threats [9, 12]."]} +{"1323413|2357830": ["For a more general overview of RFID security issues see [30]."]} +{"56104841|2835258": []} +{"1898055|2357830": ["Yet wide scale usage of this technology is being delayed because of associated security risks [13], [24], [29]."]} +{"62533162|11720829": ["Since the pioneering work of Foschini and Telatar [1,2], multiple transmit and receive antennas have been used to drastically improve the performance of wireless communication systems [3\u20136]."]} +{"62533162|18148591": ["This is a NP-hard problem and optimal algorithms to solve it, such as sphere decoding, can be computationally expensive [4,21\u201323].", "Since the pioneering work of Foschini and Telatar [1,2], multiple transmit and receive antennas have been used to drastically improve the performance of wireless communication systems [3\u20136]."]} +{"2148236|2357830": ["However, due to their computational complexity and high bandwidth requirements, many of these protocols were still unworkable even on high-end tags as of 2006 [18].", "Due to the inherent weaknesses of underlying wireless radio communication, RFID systems are plagued with a wide variety of security and privacy threats [18]."]} diff --git a/edge/graph_59337596.jsonl b/edge/graph_59337596.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74c37101c8b09c695aee3803506c4ad7d9387d06 --- /dev/null +++ b/edge/graph_59337596.jsonl @@ -0,0 +1,6 @@ +{"52010775|46693681": []} +{"5020642|7612918": []} +{"5020642|24766563": []} +{"17673205|16735221": ["\u00a9 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [name organizer] Keywords: Mobile; Multiplatform; PhoneGap; Android; Performance; Execution Time"]} +{"7030133|16735221": []} +{"14773994|17658947": ["We will also apply the techniques in ontology alignment (Shvaiko and Euzenat, 2013; Granitzer et al., 2010) in entity alignment."]} diff --git a/edge/graph_59337606.jsonl b/edge/graph_59337606.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eedb272b3e945efa98f9f2630fec364d34de71b5 --- /dev/null +++ b/edge/graph_59337606.jsonl @@ -0,0 +1,10 @@ +{"9629438|634975": ["To understand the formation, evolution and function of complex networks, it is crucial to explore their internal structures (also called structural regularities), including assortative structure, disassortative structure[18] and mixture structure[19], which have been widely applied in various practical systems such as recommendation systems based on social networks[20,21] and evolutionary games based on interdependent networks[22,23,24,25,26]."]} +{"5032367|2701596": ["The idea of dependent nonparametric processes was first proposed by MacEachern [41], and seven different classes of dependence are summarized [42]."]} +{"1636177|2701596": []} +{"205261034|1932843": ["However, very similar algorithms have subsequently proven highly effective in video games 6\u20138,10 , robotics 60 , industrial control 61\u201363 and online recommendation systems 64,65 ."]} +{"205261034|9316331": ["Once trained, these networks were combined with a Monte Carlo tree search (MCTS) 13\u201315 to provide a lookahead search, using the policy network to narrow down the search to high\u00adprobability moves, and using the value network (in conjunction with Monte Carlo rollouts using a fast rollout policy) to\u2026"]} +{"205261034|14843594": ["MCTS search parameters were selected by Gaussian process optimization 68 , so as to optimize self\u00adplay performance of AlphaGo Zero using a neural network trained in a preliminary run."]} +{"207179119|1932843": ["Approximate value function methods [Bertsekas and Tsitsiklis, 1996] have proved successful for solving certain large scale problems [Powell, 2011], and policy search has been successfully applied to many robotics tasks [Kober et al., 2013]."]} +{"56290785|11112426": ["Then one usually considers (Bioucas-Dias et al 2012) that the number of materials present in the scene is R = K + 1."]} +{"2110811|1400872": ["The aforementioned joint angle data were collected using a fully threaded NAO-Matlab communication protocol developed by the authors in Python."]} +{"42581601|192934": ["Feature extraction is a crucial step in classification systems [48]."]} diff --git a/edge/graph_5934317.jsonl b/edge/graph_5934317.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..270b517e03246a07be8f36229aea12646c4448ef --- /dev/null +++ b/edge/graph_5934317.jsonl @@ -0,0 +1,3 @@ +{"8888128|18599847": ["\u2026as MLPs (Multi-Layer Perceptrons) [1], RBF (Radial Basis Function) neural network [2], Extreme Learning Machine [3][4], deep learning autoencoders [5], FIR (Finite Impulse Response) neural network [6], SVR (Support Vector Regression) [7], SOM (Self-Organization Map) [8], GP (Gaussian Process)\u2026"]} +{"1045112|1400872": ["Methods for controllingthe dynamics of recurrent neural networks through adaptive mechanisms are reviewed in Pearlmutter (1995)."]} +{"52987841|5934317": ["This point is investigated and discussed in depth for the case of recurrent architectures in [34] (to which the reader is referred for more details on this topic)."]} diff --git a/edge/graph_59344768.jsonl b/edge/graph_59344768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5935762.jsonl b/edge/graph_5935762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..927dbe994746225e7553fd040816ef111a77e7bc --- /dev/null +++ b/edge/graph_5935762.jsonl @@ -0,0 +1,3 @@ +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"11074070|60455": ["Applications of IE techniques to extract content knowledge from semi-structured and structured documents are discussed in [36]."]} diff --git a/edge/graph_59359354.jsonl b/edge/graph_59359354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59366867.jsonl b/edge/graph_59366867.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d692a18778a48b9b980f11c51a9463befb45009 --- /dev/null +++ b/edge/graph_59366867.jsonl @@ -0,0 +1 @@ +{"121015664|33286487": []} diff --git a/edge/graph_59397830.jsonl b/edge/graph_59397830.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59398274.jsonl b/edge/graph_59398274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5940452.jsonl b/edge/graph_5940452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4df6b0ba7a19b6ab7196691b6fd8319950cacd02 --- /dev/null +++ b/edge/graph_5940452.jsonl @@ -0,0 +1 @@ +{"15036265|627405": []} diff --git a/edge/graph_59413793.jsonl b/edge/graph_59413793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f235c71b1c652ec2ee012465635bfafd78a4201b --- /dev/null +++ b/edge/graph_59413793.jsonl @@ -0,0 +1,16 @@ +{"9702327|16401366": ["Formalisms based on process calcus have been used for the modeling of interactive music systems [5, 28, 32, 15, 23, 20, 22, 24, 6, 27, 21, 25, 26, 31] and the modeling and analysis ecological systems [16, 30, 17, 29]."]} +{"15293073|16401366": []} +{"1723551|534755": ["In the literature, different modeling techniques are used, see De Jong [14] for a survey.", "Computational Systems Biology is an extremely fertile field, where many different modeling techniques are used [8, 14, 27, 40] in order to capture the intrinsic dynamics of biological systems."]} +{"52958926|16401366": ["Process calculi has been applied to the modeling of interactive music systems [104, 111, 99, 110, 10, 106, 100, 59, 97, 93, 95, 98, 11, 103, 94, 101, 102, 92] and ecological systems [107, 64, 109, 65, 108]."]} +{"18264477|8397295": ["Timed extensions of some process algebras have been proposed [9, 10, 11, 12] but these make a distinction between time progressing and computation progressing."]} +{"9068473|16401366": ["Process calculi has been applied to the modeling of interactive music systems [6, 31, 26, 12, 24, 21, 22, 25, 7, 29, 34, 27, 28, 20] and ecological systems [15, 33, 16, 32]."]} +{"12081961|8397295": ["Various suggestions for incorporating time into these formalisms have been investigated (see [19] for an overview)."]} +{"12199848|17283639": ["We formally define the semantics of APP systems as a transition relation in the style of [6]."]} +{"35395247|17283639": ["Formal semantics of P Systems have been defined in [5\u20137]."]} +{"54093666|16401366": []} +{"20448130|16401366": []} +{"51880543|8589228": ["To estimate the probability that a given SSTL property \u03c6 is satisfied, we perform statistical model checking [1].", "In many cases, performing statistical model checking [1] is the only feasible approach to estimate these values, using a finite set of simulation trajectories."]} +{"1547849|16401366": []} +{"47112861|16401366": ["Process calculi has been also applied to the modeling of interactive music systems [55, 61, 50, 60, 2, 56, 51, 30, 48, 45, 47, 49, 4, 54, 46, 52, 53, 44] and ecological systems [57, 36, 59, 37, 58]."]} +{"6919682|16401366": ["fomi may produce a sharp difference in the relative loudness between what a musician plays and what the improviser plays. Process calculi has been applied to the modeling of interactive music systems [3, 58, 54, 26, 52, 49, 51, 53, 4, 57, 50, 55, 56, 48] and ecological systems [30, 60, 31, 59]. Our main objective is extending Ccfomi to model probabilistic choice of musical sequences. We also want to show that a ntcc model can interact with a human pl"]} +{"62076889|16401366": ["Process calculi has been applied to the modeling of ecological systems [16, 39, 17, 38] and interactive music systems [ 12, 4, 29, 27]."]} diff --git a/edge/graph_59414295.jsonl b/edge/graph_59414295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5943294.jsonl b/edge/graph_5943294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bdb7e843aac965bc32b4039e02f32e270806f75a --- /dev/null +++ b/edge/graph_5943294.jsonl @@ -0,0 +1,7 @@ +{"7993657|10397481": ["Money and Agius [10] categorise video summaries based on three dimensions: content type (feature based, object", "[9]A.Moneyand H.Agius.", "Money and Agius [10] provide a taxonomy of video summaries and their generation techniques based on an extensive literature survey.", "While unobtrusive methods are generally preferred, they tend to be noisy and limited in the level of details [10].", "[10] A. Money and H. Agius.", "AFFECTIVE VIDEO SUMMARISATION Money and Agius [10] provide a taxonomy of video sum\u00admariesandtheirgenerationtechniquesbased \nonan extensive literature survey.", "For example, \nin Money and Agius [9], subjects were wrapped by a sensor belt around theirchest,awatch-typedevicewasput \naround awrist, and other signals were captured from several .nger tips, and .", "Money andAgius[10] categorise video summariesbased on three \ndimensions: content type (feature based, object Permission to make digital or hard copies of all or part \nof this work for personal or classroom use is granted without fee provided that copies are not made or \ndistributed for pro.t or commercial advantage and that copies bear this notice and the full citation \non the .rst page."]} +{"52806562|2355696": ["Also, detection of various gestures like facial gestures, head gestures, and hand gestures have been extensively researched in recent years (see [12][ 13 ] for survey papers in the field).", "Nonverbal behavior typically occurs in human-human communication and conveys information about whatever cannot be said with words (e.g. emotions, feelings, attitudes, etc.) [ 13 ].", "The most interesting aspects of this research, from an IHCT point of view, is the analysis of affective states (affective computing [12]) and social signals (Social Signal Processing [ 13 ])."]} +{"52806562|8777381": ["Proposed approaches rely mainly on recognition of facial expressions (see [12] for the most recent survey) and vocal behavior [19], but recent works suggest that also body gestures and combinations of different nonverbal cues should be taken into account as well [20]."]} +{"10243098|10397481": ["Directly relevant to our present work, Money and Agius [21] provide a taxonomy of video summaries and their generation techniques based on an extensive literature survey.", "For example, in Money and Agius [20], subjects were wrapped by a sensor belt around their chest, a watch-type device was put around a wrist, and other signals were captured from several finger tips, and finally, their arm was rested on a cushion on the table.", "Money and Agius [21] categorise video summaries based on three dimensions: content type (feature based, object based, event based, and perception based), personalisation (personalised, generic), and interactivity (interactive, static).", "Through this interface, the user can easily log into the system, search MV based on their affective states (for example, anger, happy, sad/blue, or peaceful) and also provide his/her feedback on each MV.\nDirectly relevant to our present work, Money and Agius [21] provide a taxonomy of video summaries and their generation techniques based on an extensive literature survey."]} +{"10187543|2355696": ["However, in recent years the research work on recommender systems has started to follow the affective computing (Picard 2000) and social signal processing (Vinciarelli et al. 2009) paradigms."]} +{"24461758|2355696": []} +{"24461758|10397481": ["In spite of this huge advantage over the internal summarization techniques, implementations of such techniques are rarer [46, 47].", "In the current literature, two categories of video abstract methods are reported [46, 47] as well as the combination of these two categories.", "[46], three key external techniques are re-"]} diff --git a/edge/graph_594415.jsonl b/edge/graph_594415.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59453312.jsonl b/edge/graph_59453312.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ac042fa44666b6f1382f1f5536e6eab8c07f8bd --- /dev/null +++ b/edge/graph_59453312.jsonl @@ -0,0 +1,11 @@ +{"15601204|10500613": []} +{"15601204|913718": ["In the \ufb01eld of ontology mapping, [8] and [9] present a broad overview of the various approaches on automated ontology matching."]} +{"14132295|13407049": []} +{"16141866|12860838": []} +{"16141866|10500613": []} +{"37649101|10500613": []} +{"37649101|913718": []} +{"40364318|885218": []} +{"10578467|2281773": ["Over the past years, there is a growing amount of research on interaction paradigms that allow end users to profit from the expressive power of Semantic Web standards while at the same time hiding their complexity behind an intuitive and easy-to-use interface; for an overview see [11]."]} +{"17058611|29231240": []} +{"17058611|14205872": ["Ontology development tools that are designed and implemented as interactive web based tools need to provide facilities for: ontology development; ontology visualization [6] [18]; the design of multi-user interactive interfaces; concurrency control; mechanisms for data storage and alignment."]} diff --git a/edge/graph_59455341.jsonl b/edge/graph_59455341.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59456088.jsonl b/edge/graph_59456088.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59459303.jsonl b/edge/graph_59459303.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59462550.jsonl b/edge/graph_59462550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5946674.jsonl b/edge/graph_5946674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a13d1985a1be0ae4e0bffd2a113832a9eed90007 --- /dev/null +++ b/edge/graph_5946674.jsonl @@ -0,0 +1,12 @@ +{"6529370|2357830": []} +{"16208027|3348390": ["Digital Object Identifier 10.1109/JIOT.2014.2359538\nare able to recognize and locate by themselves."]} +{"17420939|4528002": []} +{"8742419|3348390": ["A recent publication conducted a depth survey on contextaware systems oriented to the IoT, where a large number of solutions are analyzed by considering different topics [3].", "related work in this context, which is not included in the survey presented in [3], is CoCA [10].", "In such a context, \u201csemantic-oriented\u201d IoT visions are available in the literature to provide modeling solutions for things description, reasoning over data generated by the IoT, semantic execution environments, and architectures that accommodate IoT requirements [3], [4].", "This fact has been recently identified in [3]."]} +{"17776808|14441987": []} +{"1208330|17756238": ["GPS stalking [81], disclosure of private information such as an illness [82], or generally the uneasy feeling of being watched [83].", "Examples where profiling is leads to a violation of privacy violation are price discrimination [87, 88], unsolicited advertisements [83], social engineering [89], or erroneous automatic decisions [48], e."]} +{"1208330|2906926": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"1208330|2357830": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"61331722|1113420": []} +{"11215071|2906926": []} +{"9937240|1230643": ["However, this causes a lot of data redundancy and consumes too much energy of the network."]} +{"32548782|17202214": ["Related to thiswork, extensivework on securitymodeling has been done [67] which primarily focuses on role based access control [68,69]."]} diff --git a/edge/graph_59477584.jsonl b/edge/graph_59477584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59480470.jsonl b/edge/graph_59480470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59488001.jsonl b/edge/graph_59488001.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f2de91b92e3babe5a5c281903e203c0d3367f05 --- /dev/null +++ b/edge/graph_59488001.jsonl @@ -0,0 +1,17 @@ +{"29421355|62204132": []} +{"61530958|62204132": []} +{"19483696|62204132": []} +{"110750250|14098594": []} +{"120446817|62204132": []} +{"56290016|62204132": []} +{"121268176|62204132": []} +{"109526780|62204132": ["For the case of two machines, Potts and Van Wassenhove ( 1992 ) showed that the optimal sublot sizes are in geometric progression, i."]} +{"206076762|62204132": []} +{"120224648|62204132": []} +{"54797856|1142274": ["Setup times can be broadly classified in two categories (Allahverdi, Gupta and Aldowaisan (1999), Allahverdi et al. (2008))."]} +{"62193616|62204132": []} +{"69901084|62204132": ["Summaries of literature on lot streaming are given by Baker [2,3], Potts and van Wassenhove [ 4 ], Trietsch and Baker [5], and Vickson [6]."]} +{"62710860|62204132": []} +{"118895040|62204132": []} +{"12951405|62204132": []} +{"110997747|62204132": []} diff --git a/edge/graph_59491535.jsonl b/edge/graph_59491535.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59493846.jsonl b/edge/graph_59493846.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66e3a074d28c3302946f7dde1e4552ed699f2731 --- /dev/null +++ b/edge/graph_59493846.jsonl @@ -0,0 +1 @@ +{"62185766|53680608": []} diff --git a/graph_595093.jsonl b/edge/graph_595093.jsonl similarity index 100% rename from graph_595093.jsonl rename to edge/graph_595093.jsonl diff --git a/edge/graph_59518763.jsonl b/edge/graph_59518763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59523784.jsonl b/edge/graph_59523784.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5cafe7259afa2949c66426a53a1414bdc59b644 --- /dev/null +++ b/edge/graph_59523784.jsonl @@ -0,0 +1 @@ +{"28579627|42994372": []} diff --git a/edge/graph_59523928.jsonl b/edge/graph_59523928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59535224.jsonl b/edge/graph_59535224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ac95940cedc4d60f1fb8c27e418aa55f2250d25 --- /dev/null +++ b/edge/graph_59535224.jsonl @@ -0,0 +1,21 @@ +{"11929591|3202525": ["Recommender systems for learning environments such as e-learning try to address the challenges of finding relevant resources and people for learning by attempting to filter contents for different learning settings [1]."]} +{"13925572|13392386": ["Some of these works focus on constructing context-aware recommender systems on the platform of mobile device, which contains rich context-aware information (e.g., location, social network, and activity) [Zheng et al. 2010; Karatzoglou et al. 2012; Zhu et al. 2012; Liu et al. 2013]."]} +{"207035184|4411601": ["just a fraction of the articles, or focus on selected aspects, such as recommender-system evaluation [190]."]} +{"207035184|7919236": ["For instance, users might become dissatisfied with accurate recommendations when they have no trust in the recommender system\u2019s operator [342], their privacy is not ensured [300], they need to wait too long for recommendations [300], or they find the user interfaces unappealing [343]."]} +{"11544368|17641462": ["Recommender systems that consider groups of users [56] are starting to expand and are applicable in areas such as tourism [10], travel [9], TV [23], e-commerce [29], web services [8] and multimedia in smart communities [49]."]} +{"11544368|3202525": ["The incorporation of social information enhances the social relations context [45] for effective recommendation generations and outputs.", "Recommender systems for learning environments such as mobile social learning aim to address the challenges of \ufb01nding relevant resources and people by \ufb01ltering contents for different learning settings [45]."]} +{"4544334|2398835": ["Detailed investigations on these tools are discussed in [47], [48]."]} +{"4544334|15529291": ["Hence, the appropriate linkage of articles with the right author\u2019s pro\ufb01le requires to solve the problem of author name ambiguity [9].", "The feature of veracity is added because data veracity is certainly important in scholarly data for issues such as author disam-biguation and deduplication [9]."]} +{"588477|11777996": ["Despite the fact that keyphrase extraction has been widely re-searched in the natural language processing community, its performance is still far from being satisfactory (Hasan and Ng, 2014)."]} +{"37198789|1805048": ["Collaborative filtering [Su and Khoshgoftaar, 2009] is a method for predicting user preferences and interests based on the collective data of a user community\u2019s past usage behaviour.", "In particular, it is known that user-based collaborative filtering does not produce useful recommendations if the usage data is sparse [Su and Khoshgoftaar, 2009], a particularly acute problem for items in digital libraries."]} +{"207204594|1805048": ["always leads to coverage problems, which is the percentage of items in the system that recommendations can be made for [68]"]} +{"16418643|1805048": []} +{"8202591|4411601": ["about research paper recommender systems, and in 2013 alone, an estimated 30 new articles are expected to appear in this field (Figure 1) [8].", "Research indicates that offline evaluations and user studies sometimes contradict each other [7,8,13].", "Initial comparisons of user studies and offline evaluations, in the field of research paper recommender systems, were mostly not very sound because user studies contained relatively few participants [8].", "However, we found that most approaches are only evaluated with offline evaluations [8], rendering the results one-sided.", "Alternatively, a user study can collect qualitative feedback, but because this approach is rarely used for recommender system evaluations [8], we will not", "Figure 1: Published papers per year about research paper recommender systems [8]"]} +{"3700013|4411601": ["majority of researchers in the field of research paper recommender systems have no access to real-life recommender systems [4].", "CiteSeer\u2019s dataset has been frequently used by researchers for evaluating research paper recommender systems [4]."]} +{"41235929|3126100": ["[58]) to improve predictive capabilities and identification accuracy of tourism demand forecasting."]} +{"41235929|2398835": []} +{"51613774|1805048": ["The similarity Fsim(i, k) can be measured by Pearson correlation or vector cosine similarity [2].", "In the study of recommendation systems, the recommendation quality is often evaluated by mean absolute error or root mean squared error (RMSE) [2].", "The predominant approach to building recommendation systems is collaborative filtering (CF) [2], where the key idea is to utilize the ratings collected from users to identify users with similar interests and to predict which items the users may be interested in."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"28524197|17641462": []} +{"28524197|3202525": ["Recommender Systems (RSs), which aim to suggest items of potential interest for solving information overload, have attracted growing amounts of attention [1], [2]."]} +{"1576291|207372751": ["Cross-domain recommendation is usually based on the link prediction [3] [18] and the relation between users and items in the social network."]} diff --git a/edge/graph_59538102.jsonl b/edge/graph_59538102.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..accae8bfc38dd0d4eee3e563817364c2ae85a9ea --- /dev/null +++ b/edge/graph_59538102.jsonl @@ -0,0 +1,56 @@ +{"31102248|12029139": ["6 for practical energy harvesting circuits [5]."]} +{"2494137|3054454": ["For an overview of the numerous scattering models, see [10]."]} +{"8034476|12029139": ["from the received signal by switching its working mode from the EH mode to ID mode [38]."]} +{"36121630|15453366": ["W ITH the unrelenting increment of wireless data demands, increasingly more novel concepts and techniques have been introduced into wireless communication techniques to realize ubiquitous flexible wireless access with high power efficiency and spectrum efficiency [1]\u2013[5].", "E (4) where \u03c9e is the unit-norm analog receive beamforming of eavesdropper E, and n([1]) E is the additive noise at E.", "y([1]) e = \u03c9 H e HS1Eu1 \u221a p1s1 + \u03c9 H e HS2Eu2 \u221a p2s2 + \u03c9 H e n [1]"]} +{"26090902|6779551": ["[159] gave a survey, which summarized the security requirements and security attacks of wireless networks, followed by security protocols and algorithms in existing wireless network standards."]} +{"26090902|3453202": ["This attack was investigated in [163] and [168], which wants to send jamming signals to minimize secrecy capacities.", "It is worth mentioning that [163] made a con-"]} +{"26090902|4395259": ["The survey in [158] divided PHY-security issues into two categories: i.", "Finally and most importantly, different from the survey in [158], we discuss the newest precoding techniques in signal processing areas, such as transmit precoding and cooperation schemes in MIMO and relay systems, which are emerging technologies in next generation wireless communications.", "Third, the organization on PHY-security in this paper is different with the survey in [158]."]} +{"26090902|18148591": ["The advancement in wireless technologies has improved communication service quality significantly, by exploring spatial diversities and multiplexing gains with the help of multiantennas technologies [152] or using cooperative strategies with the help of relays [153].", "To further enhance the transmission rates with the constraints of PHY-security, many investigators developed multi-antenna technologies [152], [190] to increase secrecy"]} +{"25205526|8909218": ["Femtocell [1] and machine-to-machine communication systems [2] are typical examples of distributed communication systems."]} +{"25205526|8280144": ["Transmission capacity (TC) was introduced in [13] and [14] as a way to evaluate the performance of specific communication strategies and different medium access control (MAC) protocols."]} +{"818554|12029139": ["INTRODUCTION ONE promising way to prolong the lifetime of the wireless devices is to leverage the energy harvesting technologies, especially the radio frequency energy harvesting (RF-EH) technology [1]."]} +{"18494334|3453202": [", [2], [3]) that massive MIMO is particularly vulnerable to attacks during the pilot transmission phase making the channel estimation highly degraded.", "Indeed, a promising analysis of jamming and eavesdropping attacks was conducted in [2], [3]."]} +{"29225811|3453202": ["A sequence of papers [3, 4, 5, 6] have highlighted the susceptibility of MaMIMO to jamming attacks that specifically target the uplink training phase, effectively creat ing artificial pilot contamination which destroys the channel estimates and thereby, potentially, severely degrades per formance in closed-loop operation."]} +{"12946301|8280144": ["The network is a square of unit area where both the legitimate nodes and eavesdroppers are placed, according to Poisson Point Processes (PPP) with intensities \u03bbl and \u03bbe, respectively, which is a suitable assumption when nodes are independently and uniformly distributed in the network area or there is a substantial mobility [41]."]} +{"13178381|4395259": []} +{"42075055|10147053": ["Therefore, many contributions have been recently accomplished to escalate the secrecy capacity by associating advanced techniques in wireless communications, such as multiple antenna schemes, game theory techniques, beamforming and power allocation methods [2]."]} +{"3740390|12029139": ["RADIO-FREQUENCY (RF) energy transfer and harvesting techniques have been recognized as sustainable solutions for self-powering in the next-generation wireless networks [1]."]} +{"3480987|2509135": []} +{"32176831|12029139": ["2623627 many situations such as disasters, extreme environments or sensor networks embedded in human bodies for a biomedical purpose [1]."]} +{"32176831|4395259": ["In the meantime, physical-layer security issues in communications have also been brought up for the last decades [14]."]} +{"6050009|4395259": ["For a complete review of the most lately approaches, see [19], [20]."]} +{"1021558|6779551": ["DUE to the broadcast nature of wireless medium, the confidentiality of wireless communications is vulnerable to an eavesdropping attack [1]."]} +{"855286|12029139": ["Wireless Energy Harvesting and Cooperative Relaying ENERGY harvesting is a popular source of energy to power wireless devices [1]\u2013[3].", "7; energy harvesting circuitry activation threshold, \u03b8H = \u221230 dBm [3], [51]; and noise power, N0 = 10.", "To activate the energy harvesting circuitry a t the relay, the received power must exceed the minimum threshold power \u03b8H [3], [51], [52]."]} +{"25235935|61132": ["Given their low cost, flexible maneuvering capability, and unmanned operation, UAVs have been widely used in both civilian operations and military missions, including aerial mapping, disaster rescue, agricultural irrigation, and military surveillance and attack [1]."]} +{"7004445|12029139": ["INTRODUCTION Radio frequency (RF) energy-harvesting (EH) schemes have gained increased interest recently as a promising solution to energize the battery-based wireless communication nodes in a wireless communication network [1]."]} +{"7004445|1236072": ["As discussed in [37]\u2013[39], an efficient clustering scheme can be used to organize the relay nodes in a cluster based on average signal-to-noise ratio (SNR)."]} +{"11823873|4395259": ["Furthermore, the existing cryptographic 68 approaches are not perfectly secure and can still be decrypted 69 by an eavesdropper (E), provided that it has the capacity to carry 70 out exhaustive key search with the aid of brute-force attack [15]."]} +{"12359475|13178381": ["However, this idealized simplifying assumption is not realistic, since practical channel estimation imposes CSI imperfections, which are aggravated by the feedback delay, limited-rate feedback, and channel estimation errors (CEEs) [17]."]} +{"10146419|6779551": ["Hence, according to [29]\u2013[31], the achievable secrecy-rate r sec i A from MU i to the sAP is given by", "Building upon the concept of physical-layer security throughput [29]\u2013[31], we derive the secrecyoutage probability (as a function of the MU\u2019s offloaded data rate and transmit-power to sAP) for traffic offloading."]} +{"10146419|4395259": ["For each MU i \u2208 I , we set R i uniformly random within [10, 30]Mbps, its security-outage limit i = 0."]} +{"3043488|3330461": ["Acomprehensive survey onD2D communication can be found in [1].", "As of today there are not only several proposals for cellular relaying, cellular offloading, and content distribution leveraging D2D [1], but also entire system architectures based on D2D to complement cellular-based services in a scalable way, with new types of applications to be supported in future networks, e."]} +{"12100284|3453202": ["However, as shown in [2] and [3], the spatial dimensions that massive MIMO systems exploit bring new challenges and opportunities to the physical layer security, which are fundamentally different from conventional MIMO systems.", "Although jamming exists and has been identified as a critical problem for reliable communications [5]\u2013[9], there are only a few works focusing on the jamming aspects in massive MIMO [2], [3], [10]\u2013[13].", "While massive MIMO is robust against passive eavesdropping [2] thanks to the array gain and ability to operate", "In order to detect pilot contamination attacks in massive MIMO, several jamming detection techniques are introduced in [2] and [10]."]} +{"19021147|3504276": ["Thanks to recent advances in wireless powered communication network (WPCN) (see [3] and references therein), potential helpers are provided with incentives to assist in secrecy communications [4, 5]."]} +{"1457251|3453202": ["Moreover, in [32]\u2013[34], active eavesdropping in massive MIMO systems was considered, whereas the eavesdropper in this paper is assumed to be passive in order to hide its presence."]} +{"1457251|4395259": ["Since secrecy and privacy are critical concerns for the desi gn of future communication systems [5], it is of interest to investigate how the large number of s patial degrees of freedom in massive MIMO systems can be exploited for secrecy enhanceme nt [6], [7]."]} +{"21473687|2833151": []} +{"21473687|12452682": []} +{"14232575|41035405": []} +{"52118784|6779551": ["efforts have been exploring novel techniques that can minimize interference in order to enable secure and reliable D2D communication [191]."]} +{"52118784|12206204": ["However, owing to lack of standardization, the wide spread implementation of IoT and subsequently D2D integration with IoT is still a far cry [293], [294]."]} +{"52118784|3330461": ["In [18] the existing literature on D2D is categorized under inband and outband D2D communication."]} +{"52118784|7644489": ["[51] proposed the resource selection scheme namely sensing based selection"]} +{"23747085|10147053": ["Against this background, some promising techniques, such as multiple antennas, cooperative jamming/relay [2]\u2013[6], are exploited to degrade the capability of either active attacker or passive eavesdroppers so as to ease the information leakage."]} +{"19006079|12029139": ["Meanwhile, simultaneous wireless information and power transfer (SWIPT) has been proposed as a promising wireless energy harvesting (EH) technique in energy constrained networks [14], [24]\u2013[26], such as those for which PLS may be most appropriate."]} +{"19006079|4395259": []} +{"12594936|13178381": ["To tackle this issue, state-of-art schemes have been developed ([24] and the references therein), among which the worst-case secrecy rate is commonly employed to formulate the robust secrecy rate maximization problem [8], [19], [25]\u2013[27]."]} +{"22678385|875676": ["Some non-orthogonal FBMC schemes, such as generalized frequency division multiplexing (GFDM) and the faster-than-Nyquist approach, induce additional interference from neighboring subcarriers due to non-orthogonality [18], [19]."]} +{"22678385|8280144": ["16TC was introduced as a way to evaluate performance for specific communication strategies and different medium access control (MAC) protocols in ad hoc networks [85]."]} +{"28307247|16888186": []} +{"28307247|4395259": ["The choice of action depends on where its instantaneous channel fading gain to the LFC falls between a set of publicly known thresholds f 1; 2; 3g, with (2)More rigorous definitions and examples can be found in [79]\u2013[81] and the extensive references within."]} +{"19839707|6779551": ["Spectrum sharing in D2D can produce signi\ufb01cant amount of interference of CUEs, therefore, extensive efforts are made to minimize interference in order to enable secure and reliable communication [18]."]} +{"19724296|4395259": ["Finally, unlike most of the related work [1]\u2013[11], we consider a multi-cell setting where not only the data signals cause inter-cell interference but also the AN, which has to be carefully taken into account for system design.", "However, several new issues arise for physical layer security provisioning in multi-cell massive MIMO systems that are not present for conventional MIMO systems [1]\u2013[11].", "This approach is based on certain assumptions regarding computational complexity, and is thereby potentially vulnerable [1].", "(6) reveals that the achievable ergodic secrecy rate of the kth MT in the local cell has the subtractive form typical for many wiretap channels [1]\u2013[11], i."]} +{"14557310|4395259": ["Moreover, they become expensive and difficult to achieve as the network scales [9], [11].", "For example, the design of a physical-layer secured network assumes some information about eavesdroppers as in [9], [11].", "In this context, physical-layer security comes as a promising alternative to complement cryptographic solutions, by adding not only security at the physical-layer with strategies that guarantee reliability, but also confidentiality regardless of eavesdroppers computational power [9], [11]."]} +{"14557310|8280144": ["As pointed in [20], the inclusion of the noise power leads to a more complex analysis without providing any significant qualitative difference."]} +{"21590971|4395259": ["To solve the issues of information security threats and attacks in wireless networks, the traditional technologies mainly focus on encryption/decryption [4], trust management [5, 6], authentication [7], and so forth."]} +{"6339354|3453202": ["As an additional benefit, massive MIMO is inherently more secure than conventional MIMO systems, as the large-scale antenna array equipped at the transmitter (Alice) can accurately focus a narrow and directional information beam on the intended terminal (Bob), such that the received signal power at Bob is several orders of magnitude higher than that at any incoherent passive eavesdropper (Eve) [6].", "In particular, several techniques for detection of the pilot contamination attack were proposed in [6]."]} diff --git a/edge/graph_59541371.jsonl b/edge/graph_59541371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59553882.jsonl b/edge/graph_59553882.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ebd32877a891907357e2f1da93899b28c274acdc --- /dev/null +++ b/edge/graph_59553882.jsonl @@ -0,0 +1,4 @@ +{"10548742|6746689": []} +{"18671260|11792588": ["\u2026used methods are statistical approaches which include hidden Markov models (HMMs), Bayesian classifiers, support vector machines, fuzzy set reasoning, polynomial discriminate classifier, etc. (Arica and Yarman-Vural, 2001; El-Yacoubi et al., 1999; Jain et al., 2000; Liu and Fujisawa, 2008).", "For example, offline recognition of Latin, Chinese, Japanese, Indian, and Arabic handwritten text has long been an area of active research and development (Arica and Yarman-Vural, 2001; Bunke, 2003; Lorigo and Govindaraju, 2006; Suen et al., 2003)."]} +{"18671260|15782139": ["Inspired by the success in such fields, they have also attracted a growing interest more recently in various computer vision applications including offline handwriting recognition (Plamondon and Srihari, 2000; Rabiner, 1989)."]} +{"18671260|192934": ["\u2026used methods are statistical approaches which include hidden Markov models (HMMs), Bayesian classifiers, support vector machines, fuzzy set reasoning, polynomial discriminate classifier, etc. (Arica and Yarman-Vural, 2001; El-Yacoubi et al., 1999; Jain et al., 2000; Liu and Fujisawa, 2008).", "B = {bj(k)}, the observation symbol probability distribution in state j, where bj(k) = P(vk at tjqt = Sj), 1 6 j 6 N, 1 6 k 6M. p = {pi}, the initial state distribution, where pi = P(q1 = Si), 1 6 i 6 N."]} diff --git a/edge/graph_59553911.jsonl b/edge/graph_59553911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8542a078ef20a148890a7d2618c40279e4bee834 --- /dev/null +++ b/edge/graph_59553911.jsonl @@ -0,0 +1,32 @@ +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"17804774|3555631": ["Under the premise of control-data separation architecure in WSDN, there will be two types of base stations, namely ontrol base stations (CBS) and data base stations (DBS) [115] ."]} +{"17804774|3330461": []} +{"17804774|7644489": []} +{"17804774|875676": []} +{"17804774|12452682": []} +{"17804774|12681089": ["This type of antenna array configuration has been proven to e inadequate [93,94] ."]} +{"2871788|206578224": ["Emerging technique discussed in [30] (like, Fog computing, edge computing, computational offloading, distributed content delivery etc."]} +{"2871788|21930333": ["methods to achieve power saving requirements is to dynamically switch off the BSs when there is lower traffic load and only few BSs can meet the requirements [123].", "Thus, power consumption is popular optimization objective that requires investigating of switch-off strategies for cloudified BSs in H-CRANs, for greener 5G networks [123]."]} +{"2871788|875676": ["However, OFDM suffers from high spectral leakage, high peak to average power ratio and strict orthogonality requirements [80].", "It yields better gains than existing techniques at a reasonable increase in complexity [80] and is further elaborated in the next section.", "A comprehensive survey on multicarrier communications with emphasis on \ufb01lter design, lattice structures, and evaluation based on practical implementation aspects is presented in [80]."]} +{"5851613|8974063": ["2013 [34] Vertical Licensed CR secondary networks CR technology: spectrum characterization/selection and CR"]} +{"5851613|2509135": ["2011 [25] Vertical Licensed CR secondary networks CR technology: spectrum sensing and dynamic spectrum allocation"]} +{"5851613|12452682": ["In particular, the Nash bargaining solution is widely used in solving cooperative games, which is a unique Pareto optimal solution games modeling bargaining interactions [99] ."]} +{"8042775|3270620": ["types of non-orthogonal multiple access (NOMA) schemes are proposed, while [4]\u2013[6] make good overviews on NOMA."]} +{"710107|26259297": ["Uplink channel estimation using compressive sensing for millimeter wave, multiuser MIMO systems is considered in [24] [25]."]} +{"16694427|14776754": ["Note that the IAM schemes using non-real pilots can offer a gain of up to 2 dB compared to CP-OFDM [68].", "For CP-OFDM, the classical con\ufb01g-uration is assumed [86].", "This can then be used to construct the complex pseudo-pilots c p , q and subsequently use them to get a channel estimate in exactly the same way as in CP-OFDM (see (8)).", "In this way, the CFR can be estimated at the even-(odd-)indexed subcarriers just like in CP-OFDM.", "Training in CP-OFDM was based on a single-symbol complex QPSK pseudo-random preamble.", "Such a \ufb01ltering of the CFR estimates can be easily applied in other preamble-based methods as well, including the IAM schemes (and CP-OFDM channel estimation) evaluated in Section 5, with signi\ufb01cant gains in performance (not shown here).", "Note that this problem is not present in CP-OFDM and is due to the long tails of the OFDM/OQAM prototype \ufb01lter impulse response.", "At higher SNRs, CP-OFDM takes over while the NMSE curves of the OFDM/ OQAM schemes reach an error \ufb02oor.", "More-over, all the OFDM/OQAM methods perform better than CP-OFDM at low to moderate SNR values.", "This implies that, for each subcarrier, (at least) 1.5 complex symbols are required for training, representing an increased (though not signi\ufb01cantly) overhead compared to CP-OFDM.", "FBMC enjoys enhanced \ufb02exibility, higher spectral ef\ufb01ciency, and better spectral containment compared to CP-OFDM [2,54].", "An alternative to CP-OFDM, that can mitigate these drawbacks, is given by \ufb01lter bank-based multicarrier (FBMC) systems, which have recently attracted increased interest [79] for both wired (e.g., power line comms (PLC) [10,15,1]) and wireless (e.g., cognitive radio [30,92,57] and DVB-T [4]) applications.", "Moreover, all the IAM methods perform better than CP-OFDM at low to moderate SNR values.", "It should also be pointed out here that the SFB output signal due to the (SISO) 3-symbol OFDM/OQAM IAM preamble is of length \u00f0 K \u00fe 1 \u00de M , which is approximately K \u00fe 1 times as long as that of CP-OFDM.", "For the sake of completeness, CP-OFDM is also included, with the minimum possible CP length (equal to the channel order).", "It should also be noticed that the OFDM/OQAM methods are less well performing with channels of higher frequency selectivity and the crossing point with the CP-OFDM curve appears earlier in that case (see Fig.", "The CP-OFDM preamble was similarly chosen, namely A N t x with x being a pseudorandom M -vector of complex QPSK pilots.", "FBMC enjoys enhanced flexibility, higher spectral efficiency, and better spectral containment compared to CP-OFDM [2, 51].", "The signal to noise ratio (SNR) loss in CP-OFDM due to the CP redundancy in data transmission was taken into account when calculating BER."]} +{"41331732|14776754": []} +{"1564680|14776754": ["1 SPECIFICATION AND DESIGN OF A PROTOTYPE FILTER FOR FILTER BANK BASED MULTICARRIER TRANSMISSION\nThe specifications of filter banks for multicarrier transmission systems with a large number of subchannels are discussed, with application to xDSL and power line communication in mind."]} +{"16039749|14776754": ["In this paper, our approach is different and more directly connected to filterbank formalism, as presented, for instance, in transmultiplexer theory [9]."]} +{"3103263|18148591": []} +{"13615884|2509135": ["seeking for new spectra and, at the same time, strongly encouraging the industry and academia to develop technologies that support efficient spectrum sharing [4\u20136]."]} +{"14069583|875676": ["Filter Design of Each Subband To reduce the OOBE of the SS-OFDM system, suitable filters need to be designed [11]."]} +{"206986602|875676": []} +{"86052|14776754": []} +{"60595118|875676": ["Extra tolerance to time-frequency misalignment [4, 5].", "To this end, the air interface, especially the underlying waveform, should be revisited [4, 5].", "Among all the 5G waveform candidates [4, 5], to the authors at least, f-OFDM appears as the most promising one, in terms of the overall performance, the associated complexity, and the cost and smoothness on the evolution path from 4G LTE."]} +{"42430536|14776754": []} +{"1072341|25929315": ["the 3-dB one-side bandwidth of the PN \u03b3 depends on the receiver hardware quality and, here, we assume it varies from \u03b3 = [0, 10, 20, 50, 100] Hz, and the corresponding variance is \u03b2 = [0, 4, 8, 20, 40]\u00d710\u22124."]} +{"61497053|875676": []} +{"7537942|875676": []} diff --git a/edge/graph_59554089.jsonl b/edge/graph_59554089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46ef9b52da803174639a6a1c6e42c6a8811175ee --- /dev/null +++ b/edge/graph_59554089.jsonl @@ -0,0 +1,2 @@ +{"157456263|10903568": []} +{"1655539|10565822": ["We also recommend that instructors and course designers use Bloom\u2019s taxonomy of the affective domain to achieve constructive alignment between their desire to produce"]} diff --git a/edge/graph_59554361.jsonl b/edge/graph_59554361.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89d382d7419e5fae25273c568d7ff2209defb9bc --- /dev/null +++ b/edge/graph_59554361.jsonl @@ -0,0 +1 @@ +{"44721187|206988459": ["31,32 Aim of this section is to describe, among the approaches that have been well presented and summarized in the above surveys, the ones that have demonstrated to be the more effective.", "\u2026proposed in the literature for fake review detection consider the \ufb01 rst category of reviews (i.e., untruthful reviews), for two main reasons 32 : (1) they undermine the integrity of the online review system or site in exam; (2) it is almost impossible to distinguish between fake and\u2026"]} diff --git a/edge/graph_59554672.jsonl b/edge/graph_59554672.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8600640a507790ca3747bf17c24a66dd76a5210 --- /dev/null +++ b/edge/graph_59554672.jsonl @@ -0,0 +1,28 @@ +{"51921054|3630870": ["Generally, the timescale of network traf\ufb01c in traditional ISP network is 10-min or 15-min [13]\u2013[17]."]} +{"51921054|14669932": ["Nevertheless, the ISP network traf\ufb01c shows large-range dependence, multifractal feature and a small number of \ufb02uctuations [17].", "Generally, the timescale of network traf\ufb01c in traditional ISP network is 10-min or 15-min [13]\u2013[17]."]} +{"11564347|1708582": ["This gives rise to a credit assignment problem typical of the reinforcement learning (cid:12)eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996).", "This gives rise to a credit assignment problem typical of the reinforcement learning eld (Bertsekas & Tsitsiklis, 1996; Kaelbling et al., 1996)."]} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} +{"53033313|1799176": ["SAFERACO is based on the Security Aware Fuzzy Enhanced Ant Colony Optimization (SAFEACO) routing protocol first proposed by Zhang et al. [19], but includes additional protection against flooding attacks and has been evaluated especially for the use in VANETs.", "A comprehensive overview of ACO based routing approaches is presented by Zhang et al.[20] in 2017."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"15308690|10287248": []} +{"2245808|15093118": ["Video cameras [18] are becoming more common as sensor devices at inter-sections and vehicles with wireless communication capabilities (i.e., Connected Vehicles [19]) are expected to be deployed in the near future."]} +{"51877353|35098173": ["Moreover, PySNS3, supports transformation between network-coordinates and geo-coordinates, and vice versa especially in the case of Geographic Routing Protocols as described in [21] for VANET."]} +{"16983215|121289": []} +{"15105928|7482876": ["The parameters of the model, such as average packet loss rate and average packet loss burst length, can be adjusted to reflect realistic VANET environments [5] and simulate different possible quality conditions of a wireless channel."]} +{"206741247|2335874": ["In addition, the MObility model generator for VEhicular network (MOVE) was used to convert the mobility model generated by SUMO to an acceptable scenario for NS2 [65]."]} +{"53022538|1708582": ["When combined with reinforcement learning [3], deep reinforcement learning showed its power on tackling complex decision making and planning problems."]} +{"49323167|468992": []} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"13357690|8323234": [", vulnerability to blockage, extra atmospheric absorption, and sparse scattering [95], [103].", "The high cost of mmWave hardware and the large number of antenna elements preclude the possibility to support each antenna element with a dedicated radio frequency (RF) chain in mmWave systems [95]\u2013[97]."]} +{"13357690|7972041": ["Vehicular channels exhibit rapid temporal variability and inherent nonstationarity of channel statistics due to their unique physical environment dynamics [17], [18].", "It is thus necessary to extend such measurement and modeling efforts to many other environments that are also vital for vehicular communications, especially when safety-critical applications are to be supported, including tunnels, bridges, parking lots, to name a few [17]."]} +{"13357690|3330461": ["The D2D communications enable direct transmission between devices in proximity without routing through the base station and have been the subject of much recent research [13], [85]."]} +{"13357690|7482876": ["2) Geometry-based Stochastic Models: The geometrybased stochastic modeling approach is based on randomly generating the geometry (scatters) of the propagation environment according to certain stochastic distributions together with simplified ray tracing [39].", "For more detailed analyses, comparison of these approaches, and their validation against measurement data, please refer to [39], [40] and the references therein."]} +{"13357690|15255963": ["Finally, a finite-state Markov chain (FSMC) is sometimes used to simplify fading channel characterization to ease theoretical performance analysis [23]."]} +{"125704902|17485266": ["updated by the Adam back propagation [31].", "The Adam is evaluated and compared with other back propagation optimization algorithms in [31], which concludes that the Adam attains satisfactory overall performance with a fast convergence and adaptive learning rate."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} diff --git a/graph_595813.jsonl b/edge/graph_595813.jsonl similarity index 100% rename from graph_595813.jsonl rename to edge/graph_595813.jsonl diff --git a/edge/graph_59591384.jsonl b/edge/graph_59591384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d3926efe679715759c2c7141ee39361e9fe40774 --- /dev/null +++ b/edge/graph_59591384.jsonl @@ -0,0 +1,11 @@ +{"29893259|1177069": ["states in [4] that this problem can be solved by, locally or globally, increasing the resolution of the grid, creating smaller cells.", "In grid based methods, which are also referred as \u201cresolution complete methods\u201d [4], the area partitioning is performed by applying a grid overlay on top of the area.", "Comparison with other methods: The same shape that was used for the simulated experiments has been segmented by using a simple square grid decomposition strategy as in the works that have been presented in [4]."]} +{"6308899|1177069": ["A recent review of coverage path planning in general can be found in [14]."]} +{"19005677|1177069": ["Many algorithms have been developed to solve the coverage path planning problem [5].", "A recent review of coverage path planning in general can be found in [5]."]} +{"31375771|1177069": ["In [1] the authors provide a survey on the recently developed algorithms and provide an extensive categorization for them.", "Coverage with aerial vehicles is a relevant topic and the aforementioned survey [1] include several related papers."]} +{"3487588|1177069": ["In the first approach, we have a wavefront pattern from a single triangular cell, whereas in the second, the exchange progresses as a kind of width sweep Morse function [2].", "In an extensive survey for online and offline decomposition and coverage path planning algorithms, the authors in [2] provide a categorization of the techniques in the literature, showing that grid decomposition strategies and algorithms are mostly used in coverage tasks."]} +{"15573800|1177069": ["Because of the non predictability constraint, articles giving the optimized solution of a coverage problem [5] have not been considered."]} +{"24141745|1177069": ["The authors in [1] provide an comprehensive survey regarding the coverage path planning problem for both continuous and discrete approaches.", "On coverage path planning and coverage patterns, one of the most used motion pattern in literature is the boustrophedon movements, also known as lawnmower or zig zag pattern [1] [7] [8]."]} +{"26665671|1177069": ["A lot of work has been done in the literature to determine the scan direction that minimizes the number of turns [6, 12].", "Galceran and Carreras [6] reviewed and evaluated several (CPP) algorithms based on different methods, such as cellular networks, grids, graphs, neural networks, with online and off-line computation, and for known or unknown areas."]} +{"13363604|1452734": []} +{"26303556|468992": ["The above discussion motivates the present study to exploit a swarm robotics approach [6], [7], using groups of miniaturised low-cost UAVs that can"]} +{"31700283|1177069": []} diff --git a/edge/graph_59595615.jsonl b/edge/graph_59595615.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..762a8eed6257bed235b6375c7cf45e3f2f38dfbc --- /dev/null +++ b/edge/graph_59595615.jsonl @@ -0,0 +1,16 @@ +{"43352992|1236072": ["Power units may be supported by a power scavenging unit such as solar cells [17].", "The sink may communicate with the task manager node via Internet or Satellite [17]."]} +{"195428750|1230643": []} +{"36475762|1236072": ["Each sensor node delivers the sensing data to a head node in the cluster and the head node delivers an aggregated data to the base station which is located outside of the sensor networks [2].", "* Flat-based routing protocol Sensor nodes in flat-based routing protocols have the same role and collaborate together to perform the sensing task and perform multi-hop communication [2].", "In general, routing protocols for the wireless sensor networks can be divided into flat-based, hierarchical-based, and location-based routing protocol on the basis of the underlying network structure [2].", "It assumes that each node would know its own location and a neighbor sensor node's location before sensor nodes sensing and collect the peripheral information [2].", "The current PEGASIS protocol may have several problems as follows [2] [6] [7]:", "The head node is selected by turns to consume the energy evenly in the wireless sensor networks [2] [4].", "A wireless sensor networks is a type ofthe wireless ad-hoc networks and uses small sensor nodes with sensing, computation, and wireless communications capabilities to collect and deliver sensed data in response to user's specific requests [1][2].", "than the flat-based routing protocols since the flat-based routing protocols are required the data aggregation to save the wasteful energy caused by the delivery of overlapping data between neighbor sensor nodes [2]."]} +{"15187780|14441987": ["The traditional routing protocols defined for wireless ad hoc networks [1] [9] are not well suited due to the following reasons: 1."]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"17812502|12817488": ["In [5], the authors detail the di \ufb00 erent data aggregation techniques and highlight the tradeo \ufb00 s between energy e \ufb03 ciency, data accuracy, and latency."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"8652282|57194320": []} +{"8652282|7876249": []} +{"8652282|3755658": [", [2], [12]\u2013[14], are available in the literature.", "iii) LEACH (Low Energy Adaptive Clustering Hierarchy) [22] is cited and studied by almost all the survey papers [1], [2], [7], [12]\u2013[16], [20], [21].", "From Table 1, we have: i) The 2004 survey [14] presents a comprehensive survey of earlier routing protocols, but not all described are energyefficient; [7] addresses various aspects of energy harvesting sensor systems; [12] exploits routing protocols designed for large-scale WSNs; [2] describes energy-efficient routing protocols; [15] classifies routing protocols based on different design criteria, and discusses the mobility including mobile sinks only, few mobile nodes act as mobile relays, all nodes mobile and few nodes are stationary; [1] gives an overview of WSNs from an industrial perspective; [12] discusses routing protocols based on intelligent algorithms; [16] considers only the routing protocols with mobile sinks; [20] focuses on hierarchical routing protocols for heterogeneous WSNs; and [21] categorizes various heterogeneous routing protocols for WSNs based upon various predefined parameters.", "All the sensor nodes in homogeneous WSNs in [2], [12], and [13] are assumed to be of the same type, especially in their power supply, communication bandwidth, computation and storage capacity.", "However, in [2], [12], and [13], most routing protocols assume their sensors to be static.", "The work [12] presents a survey with its focus on the scalability of routing protocols.", "In addition, this work gives application scopes of each protocol which were missing in the earlier surveys [2], [12], [14], [15], [17], [20]."]} +{"8652282|1236072": [", [2], [12]\u2013[14], are available in the literature.", "Furthermore, each protocol involved in [14] also considers only one base station.", "This is because cluster-based routing is more energy-efficient, more scalable, and more secure as compared with traditional flat routing [14].", "From Table 1, we have: i) The 2004 survey [14] presents a comprehensive survey of earlier routing protocols, but not all described are energyefficient; [7] addresses various aspects of energy harvesting sensor systems; [12] exploits routing protocols designed for large-scale WSNs; [2] describes energy-efficient routing protocols; [15] classifies routing protocols based on different design criteria, and discusses the mobility including mobile sinks only, few mobile nodes act as mobile relays, all nodes mobile and few nodes are stationary; [1] gives an overview of WSNs from an industrial perspective; [12] discusses routing protocols based on intelligent algorithms; [16] considers only the routing protocols with mobile sinks; [20] focuses on hierarchical routing protocols for heterogeneous WSNs; and [21] categorizes various heterogeneous routing protocols for WSNs based upon various predefined parameters.", "In addition, this work gives application scopes of each protocol which were missing in the earlier surveys [2], [12], [14], [15], [17], [20].", "Their classification in [2] is extended in [14] which is comprehensive but not all the protocols described are energy-aware."]} +{"8652282|12060835": ["From Table 1, we have: i) The 2004 survey [14] presents a comprehensive survey of earlier routing protocols, but not all described are energyefficient; [7] addresses various aspects of energy harvesting sensor systems; [12] exploits routing protocols designed for large-scale WSNs; [2] describes energy-efficient routing protocols; [15] classifies routing protocols based on different design criteria, and discusses the mobility including mobile sinks only, few mobile nodes act as mobile relays, all nodes mobile and few nodes are stationary; [1] gives an overview of WSNs from an industrial perspective; [12] discusses routing protocols based on intelligent algorithms; [16] considers only the routing protocols with mobile sinks; [20] focuses on hierarchical routing protocols for heterogeneous WSNs; and [21] categorizes various heterogeneous routing protocols for WSNs based upon various predefined parameters.", "The energy of a WSN can be saved by applying different techniques, such as dutycycle scheduling [3], energy-efficient MAC (Medium Access Control) [4], energy-efficient routing [5], node replacement [6], energy harvesting [7], energy replenishment [8], and energy balance [9].", "iii) LEACH (Low Energy Adaptive Clustering Hierarchy) [22] is cited and studied by almost all the survey papers [1], [2], [7], [12]\u2013[16], [20], [21]."]} +{"57090148|9830350": []} +{"57090148|1236072": []} +{"14930230|1230643": ["These units should be small so that power consumption will be less [5]."]} +{"1097523|12817488": ["In the synchronous case, the sensor readings are sent to the base stations in real-time using multi-hop wireless communications, where the sensor nodes cooperatively forward data packets on behalf of other sensor nodes towards the base stations."]} diff --git a/edge/graph_59600021.jsonl b/edge/graph_59600021.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea34ce2a240801d0393012993ca1e8080a1c06f6 --- /dev/null +++ b/edge/graph_59600021.jsonl @@ -0,0 +1,4 @@ +{"52183914|2795037": ["In fact, much of the work that goes into developing a scalable linear algebra system from the ground up [7] requires implementing functionality that looks a lot like a database query optimizer [8]."]} +{"3766791|393948": ["meaning that a mapping from raw input data to corresponding outputs is learned, automatically discovering the representations needed for feature detection in a process called representation learning (Bengio et al., 2013). Besides deep learning, an interesting area where AD can be applied to computer vision problems is inverse graphics (Horn, 1977; Hinton and Ghahramani, 1997)\u2014or analysis-bysynthesis (Yildirim et al.,"]} +{"207247990|12323589": ["Array databases that do support such structures (see [40] for a survey) generally lack support for declarative speci\ufb01cation of complex, recursive computations.", "For a survey, see Rusu and Cheng [40]."]} +{"827905|12323589": ["Array-oriented databases implement their own storage managers and, thus, they can arguably serve as the storage layer for other scientific applications built on top (see [24] for a survey of these systems)."]} diff --git a/edge/graph_59600034.jsonl b/edge/graph_59600034.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22e662980d7e2932fcda4da27022f2de6d2567de --- /dev/null +++ b/edge/graph_59600034.jsonl @@ -0,0 +1,8 @@ +{"206771654|393948": ["A number of previous works have asserted that deeper representations in a CNN capture higher-level visual constructs [5, 31]."]} +{"46798026|393948": ["It has been suggested that learning a disentangled representation of the data generative factors can be useful for a large variety of tasks and domains (Bengio et al., 2013).", "A disentangled representation can be de\ufb01ned as one where single latent units are sensitive to changes in single generative factors, while being relatively invariant to changes in other factors (Bengio et al., 2013).", "Having a representation that is well suited to the particular task and data domain can signi\ufb01cantly improve the learning success and robustness of the chosen model (Bengio et al., 2013).", "Learning a disentangled posterior distribution of the generative factors of the observed unsupervised sensory input is a major challenge in AI research (Bengio et al., 2013; Lake et al., 2016)."]} +{"7228830|17652653": []} +{"4562004|4110304": ["Our previous paper [39] provides a comprehensive survey of recent studies in exploring visual interpretability of neural networks, including 1) the visualization and diagnosis of CNN representations, 2) approaches for disentangling CNN representations into graphs or trees, 3) the learning of CNNs with disentangled and interpretable representations, and 4) middle-to-end learning based on model interpretability."]} +{"5063596|7306130": []} +{"5063596|17779926": ["Other works explored how to design for implicit interaction with sensing-based systems [14, 75, 86, 175], and help people predict what will happen through feedforward [12, 176].", "Furthermore, while rule extraction is an old research area, and quite separated from the recent developments in iML and FAT, there have been new papers within the past few years, such as methods for rule extraction from deep neural networks [187, 75]."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} diff --git a/edge/graph_59601455.jsonl b/edge/graph_59601455.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ada447b27aca5c6ec035673e02c2c3e16a5924c --- /dev/null +++ b/edge/graph_59601455.jsonl @@ -0,0 +1,24 @@ +{"56594672|3418537": ["We need more and more work on standardization for maturing this new emerging technology [33]."]} +{"158091354|1353379": []} +{"206989761|207209718": []} +{"115426725|10435791": []} +{"207023775|15895606": []} +{"207023775|6779551": ["less communication [104] that cross-layer and hybrid secu-"]} +{"207023775|2357830": [", RFID/NFC privacy [81] or privacy of general embedded sensors [82]."]} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"3418537|16515889": []} +{"3418537|7350786": ["2 depicts the ISO/IEC standards, DIN and corresponding Chinese standards (GB) [12].", "Many of DIN\u2019s standards become ISO standards that are internationally recognized [12].", "This study focuses on CPS standards which considers industry technical specifications officially issued by the international standards holders such as IEC and ISO [12]."]} diff --git a/edge/graph_59601792.jsonl b/edge/graph_59601792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c13a8843550fdcfb86aefacc62eb0e15caec03f1 --- /dev/null +++ b/edge/graph_59601792.jsonl @@ -0,0 +1,4 @@ +{"11974267|6028805": []} +{"7743521|3102110": ["It is a problem which occurs in many contexts [ 11 , 25], it is also an important problem in software project eort prediction."]} +{"3351246|192934": ["In general, a pattern classification system is operated in two modes [5]: training (learning) and classification (testing)."]} +{"18534787|15273230": []} diff --git a/edge/graph_59602219.jsonl b/edge/graph_59602219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18d31dd4dc4ceeb58214281b9d67aa035d43a43d --- /dev/null +++ b/edge/graph_59602219.jsonl @@ -0,0 +1,11 @@ +{"7564193|1230643": []} +{"145049010|59602219": ["Appropriate selection of parameters plays a vital role in affecting the network performance [1], because their improper configuration may result in compromized operation, something that has been proven repeatedly during the performance evaluation of networks [2]."]} +{"2418751|562065": ["include pollution prevention, waste management, structural health monitoring, smart buildings, surveillance, intelligent transportation, traffic light control, parking optimization, environmental monitoring, and energy management [3], [4].", "In traditional applications it is done by a small number of expensive, high-precision sensors; while WSNs offer a promising alternative by using a large number of low-cost, average-precision units instead [3]."]} +{"3342256|8909218": ["The statistics on wireless usage indicate that on average, more than 70% of the data traffic is generated indoors [11]."]} +{"53711175|1236072": ["Index Terms\u2014Mobile sinks, distributed routing, data dissemination, energy efficiency, mobility, wireless sensor networks\n\u00c7"]} +{"34463662|13454399": ["Therefore, several number of schemes for data aggregation in WSNs have been proposed by researchers based on multi-hop communication between sensor nodes and sink (Masdari and Tanabi 2013)."]} +{"54462874|18657007": []} +{"54462874|9040432": ["[96], [97]."]} +{"54462874|10310014": []} +{"54462874|20905429": ["There do exist, however, some survey studies in the literature [13], [22], [30], [31] that have focused on e-emergency healthcare, but these studies do not cover other aspects of disaster recovery and management."]} +{"12114861|1230643": ["A wireless sensor network is composed of plenty of sensor nodes enabled with sensing and actuating capabilities (Akyildiz et al. 2002)."]} diff --git a/edge/graph_59604266.jsonl b/edge/graph_59604266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e501836c306a297ef99ea94089d3220a9229c033 --- /dev/null +++ b/edge/graph_59604266.jsonl @@ -0,0 +1,5 @@ +{"13688847|49527603": ["In [20], a brief summary of the emerging blockchain-based applications ranging from finance to IoTs is provided."]} +{"13688847|9461213": ["With more and more demands for big-data processing in various fields [226], [227], the question arises regarding whether it is also possible to provide on- or off-blockchain support for secured Multi-Party Computation (MPC)."]} +{"13688847|27262729": [", Sybil attacks [47] and double-spending attacks [21]), node mistakes (e.", "Further, a systematic survey is provided in [21] with respect to the security issues in Bitcoin networks including the identified attacks on the consensus mechanisms and the privacy/anonymity issues of the Bitcoin clients.", ", fork, in the local views of the blockchain state [3], [21] (see Figure 4)."]} +{"13688847|2457428": ["Usually, this can be addressed through secure group communication, therefore, secure key management scheme is considered as an important technique for network security [181]."]} +{"13688847|3434731": ["In [6], [15], two brief surveys on consensus protocols in blockchain networks are provided.", "backbone of the emerging open-access, distributed Virtual Machines (VMs) [5] for decentralized, token-driven resource management in communication networks and distributed autonomous systems [6], [7]."]} diff --git a/edge/graph_59604444.jsonl b/edge/graph_59604444.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59604496.jsonl b/edge/graph_59604496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb1d1aa98d35d18184de0140a895f31a9fe82c96 --- /dev/null +++ b/edge/graph_59604496.jsonl @@ -0,0 +1 @@ +{"53139510|13558235": []} diff --git a/edge/graph_59608677.jsonl b/edge/graph_59608677.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1ab579a25df4a3f8ca23c4254a77f14f77b791d --- /dev/null +++ b/edge/graph_59608677.jsonl @@ -0,0 +1,43 @@ +{"23614118|2507429": []} +{"39164174|14688441": ["In the field of Computer Science, Personality Computing studies how machines could automatically recognize or synthesize human personality [10].", "The key-assumption of personality psychology is that stable individual characteristics result into stable behavioral patterns that people tend to display independently of the situation [10]."]} +{"2681279|14688441": ["There are two dimensions to automatic personality prediction [30]: a) personality recognition, which deals with predicting personality of users which they externalize through distal cues, i.", "A comprehensive review of these concepts is presented by [30].", "To get the ground truth on others-assessed personality of users, eight research assistants from the Department of Psychology viewed each user\u2019s selfie and rated their impression of the selfie subjects personality using the same BFI questionnaire (See [30] for more details on formats).", ", to model users\u2019 personality (see [30] for a thorough review)."]} +{"12693562|14688441": ["Most of the previous work on apparent personality modeling and prediction have been in the domain of paralanguage, i.e. speech, text, prosody, other vocalizations and \ufb01llers [34].", "Studies of personality prediction generally either deal with correctly recognizing the actual personality traits of people, which can be measured as self-a or acquaintance-reports or apparent personality traits, which are the impressions about the personality of an unfamiliar individual [34]."]} +{"22530140|5575638": ["the winning solutions for some recent challenges, [18], [19], [20], [21], [22], [23], [24], [25], [26]).", "[25]), including the first impressions challenge [18], [19]."]} +{"22530140|14688441": ["Automatic methods for personality trait recognition have been studied for a while in natural language processing [32], [33], [34], [35], [36], [37]."]} +{"52161197|14688441": ["sions about the personality of an unfamiliar individual [8]."]} +{"3614155|5071932": ["For a comprehensive review on this topic, we refer the reader to [45].", "For a comprehensive review on apparent personality analysis, from a computer vision point of view, we refer the reader to [45]."]} +{"3614155|5575638": ["This is in contrast with previous challenges in most aspects of computer vision (see e.g. [28]), including the \ufb01rst impressions challenge [72,25].", "Looking at People (LaP) \u2013 the \ufb01eld of research focused on the visual analysis of human behavior \u2013 has been a very active research \ufb01eld within computer vision in the last decade [28,29,62]."]} +{"14688441|2355696": []} +{"14688441|1118130": ["The third is the attempt of endowing machines with social and affective intelligence, the ability of interacting with humans like humans do [10]."]} +{"6030672|8777381": ["In contrast with these pragmatic phenomena, which may be relatively contextualised or short-lived, personality is usually considered to be a longer term, more stable, aspect of individuals (Scherer, 2003).", "The model has also been useful in identifying observable cues that mediate convergences between judgments of latent attributes and more direct measures of those attributes (Scherer, 2003; Heinrich & Borkenau, 1998)."]} +{"8163169|6576361": []} +{"207243476|2473564": ["Recent survey studies [3] [20] present details of the challenges and the state-of-the-art in affect analysis."]} +{"207243476|17221751": ["Recent survey studies [3] [20] present details of the challenges and the state-of-the-art in affect analysis."]} +{"24961043|43650377": []} +{"24961043|2473564": ["sions or speech is encouraged to consult dedicated surveys [1], [13], [14]."]} +{"24961043|17221751": ["The difference between words people pronounce and our understanding of their content comes from nonverbal communication also commonly called body language [1].", "sions or speech is encouraged to consult dedicated surveys [1], [13], [14]."]} +{"838348|14688441": ["The recent review [26] covers most of literature dealing with personality computing."]} +{"14718700|2355696": []} +{"45209703|14405917": ["Also interpersonal synchrony is able to describe the dynamics of interaction and its quality [22]."]} +{"45209703|2355696": ["In particular, many works in the field of Affective Computing [56] and of Social Signal Processing [69] focused on this issue.", "In particular, many works in the \ufb01eld of A\ufb00ective Computing [55] and of Social Signal Processing [69] focused on this issue."]} +{"45209703|5401262": []} +{"45209703|7360895": ["Previous studies showed that social robots can benefit from the exhibition of compelling personalities through their behaviors [26]."]} +{"45209703|1118130": ["Social robots endowed with such capability would bridge the gap between social animals and unsocial machines [70], inducing on humans the illusion of life [65]."]} +{"8238366|14688441": ["I. INTRODUCTION In recent years the interest in personality computing [1] has grown exponentially due its potential impact in a number of applications including novel interfaces for humancomputer interaction."]} +{"6221769|14405917": ["Interpersonal synchrony is acknowledged as very relevant in early communication between humans [5], and it provides information about the quality of interaction traits of the peers."]} +{"6221769|14688441": ["Research on personality computing focuses on the following three major issues: (i) Automatic Personality Recognition (APR); (ii)Automatic Personality Perception (APP); and (iii) Automatic Personality Synthesis (APS ) \u2013 see [21] for a review.", "In particular, APR is aimed at \u201cinferring self-assessed personalities from machine detectable distal cues\u201d [21]."]} +{"96514734|393948": ["\u2026training data and powerful deep learning architectures are available, machine learning procedures can be employed for representation learning (Bengio et al. 2013), directly learning relevant feature representations from x, without a human expert indicating what information in x should be\u2026", "As an alternative, provided that sufficient training data and powerful deep learning architectures are available, machine learning procedures can be employed for representation learning (Bengio et al. 2013), directly learning relevant feature representations from x, without a human expert indicating what information in x should be filtered or focused on."]} +{"7436472|5807554": ["Due to the abovementioned importance of personality in human-human and human-robot interactions, this paper focuses on nonverbal cues conveyed through gaze, attention and head movement in a multiparty human-robot interaction scenario as shown in Fig.", "A recent survey [11] provided a comprehensive review of the state-of-the-art techniques in firstperson vision by grouping them under three main application domains: video summarization, object recognition and activity detection/recognition.", "For the analysis of these behaviours, first-person vision provides the most relevant information and reduces the need for complex camera systems [11]."]} +{"7436472|14688441": ["Most of the existing automatic personality recognition methods have been reviewed in a recent survey paper [2].", "These findings have motivated a significant body of work for automatic personality analysis from verbal and nonverbal behavioural cues [2], [3]."]} +{"6204124|14688441": ["Hence, as pointed out by Vinciarelli and Mohammadi [2] personality is relevant to any computing area involving understanding, prediction or synthesis of human behavior.", "[20] G. Mohammadi and A. Vinciarelli, \u201cAutomatic personality perception: Prediction of trait attribution based on prosodic features,\u201d IEEE Trans.", "[53] G. Mohammadi, A. Vinciarelli, and M. Mortillaro, \u201cThe voice of personality: Mapping nonverbal vocal behavior into trait attributions,\u201d in Proc.", "[2] A. Vinciarelli and G. Mohammadi, \u201cA survey of personality computing,\u201d IEEE Trans.", "Mohammadi et al. [53] showed how prosodic features can be used to predict the personality assessments issued by human experts on a collection of 640 speech samples."]} +{"207243089|1118130": ["Social Signal Processing addresses all verbal and non-verbal communicative signalling during social interactions, be they of an a\ufb00ective nature or not [53]."]} +{"2089820|14688441": ["The reason behind the use of several assessors is that the goal of APP is to predict what is common across the traits attributed by different observers [12] and not to predict how one person in particular perceives others.", "Therefore, a large body of previous research work has aimed at automatically predicting the traits people attribute to unacquainted others they observe in multimedia material [12].", "This latter tends to be the best predicted trait in most of the APP experiments presented in the literature [12].", "The problem of automatically mapping facial appearance into personality traits has been largely neglected in the computing literature (see [12] for the few works that consider the problem)."]} +{"18586075|14688441": ["tionnaire that aims to gather a self-assesssment of personality along the widely known Big Five personality traits [27]."]} +{"13492318|17221751": ["For visual cues, we are motivated by approaches for recognising face/head gestures [44] and for predicting affective states [45] in video sequences."]} +{"13492318|14688441": ["Youyou et al. [8] showed that computers\u2019 judgements of people\u2019s personalities based on their Facebook profiles are more accurate and valid than judgements made by their close friends or families.", "Index Terms\u2014Interpersonal perception, personality, attractiveness, likeability, time-continuous prediction\nF", "The Big Five Model is currently the dominant paradigm in personality research which defines traits along five broad dimensions: extroversion (assertive, outgoing, energetic, friendly, socially active), neuroticism (having tendency to negative emotions such as anxiety, depression or anger), openness\u2026"]} +{"14172712|9270762": ["\u2022 MPEG-7: This provides a framework for describing audio signals using signal-based criteria that can be automatically extracted at any desired temporal (or spectral) resolution [40]."]} +{"14172712|20905429": []} +{"14172712|14688441": ["Even though the interactions are based on a first time meeting with a short duration, they have been found to contain enough information to accurately judge and make accurate first impressions of the individual under investigation with respect to their personality [48]."]} +{"38771683|6387482": ["However, decision-level fusion fails to utilise the feature-level correlations among the modalities [46]."]} +{"38771683|14688441": [", how an individual sees herself in the way she approaches problems, likes to work, deals with feelings and emotions, and manages relationships with others, along the widely known Big Five personality traits [4].", "Differently from the existing approaches in personality computing[4], we also provide acquaintance-assessments with respect to the Big Five personality traits.", "quality of relationships with others [4]."]} +{"627342|14688441": []} diff --git a/edge/graph_5961567.jsonl b/edge/graph_5961567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59616592.jsonl b/edge/graph_59616592.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38329181bd279ecabaa784268b7a9002ec6c8ebe --- /dev/null +++ b/edge/graph_59616592.jsonl @@ -0,0 +1,21 @@ +{"17461097|11028590": []} +{"12339860|6280485": []} +{"5561023|6280485": ["In recent years, due to the complexity of developing fullfledged CAD systems for x-ray analysis, research has concentrated on developing solutions for specific subproblems [21], [14]."]} +{"1033682|174797842": []} +{"2088679|393948": []} +{"37940993|6280485": []} +{"7780423|6280485": ["After the early years of research, which focused on rule-based reasoning and hand-crafted shape models [4], more recent approaches are focusing on statistically learning the shape (and appearance when applicable) of an object from a set of training examples, and use the learned model to constrain the search."]} +{"5702910|6280485": []} +{"54036137|2088679": []} +{"2104871|6280485": ["Although encouraging results are obtained from using comuted tomography (CT) and positron emission tomography (PET) to iagnose respiratory diseases, particularly lung cancer [1,2], chest adiography still remains the most commonly used procedure makng up more than one-third of all examinations in a typical radiology epartment [3] for several reasons."]} +{"2104871|41104189": ["C om p ar is on of en er gy te rm s be tw ee n LS SP in [4 1, 42 ].", "Although encouraging results are obtained from using comuted tomography (CT) and positron emission tomography (PET) to iagnose respiratory diseases, particularly lung cancer [1,2], chest adiography still remains the most commonly used procedure makng up more than one-third of all examinations in a typical radiology epartment [3] for several reasons.", "LS SP [4 1] LS SP [4 2]"]} +{"195705894|6280485": []} +{"18121764|8604408": ["Bayesian networks [38], [39] are a particular case of network"]} +{"21408311|6280485": ["Arguably the greatest challenge in textural analysis of the lungs is the presence of superimposed anatomical structures [5].", "Automatic segmentation of lung fields is considered a required procedure before computerized analysis of a chest radiograph can occur [5]."]} +{"22359778|6280485": ["The relevance of quantitative analysis in digital radiography is enlightened by the recent advances of Computer Aided Diagnosis (CAD) systems in different tasks [6]. descriptors of the shape of the lung silhouette able to the alterations associated with emphysema."]} +{"9728685|6280485": []} +{"9728685|205131192": ["The centre of mass is estimated by the two first-order geometric moments of the binary image [24]."]} +{"17233601|6280485": []} +{"5232411|6280485": []} +{"18778949|6280485": ["The application of image segmentation for the CXR images normally involved two common anatomies that are the lung and rib cage [5]."]} +{"121069511|6280485": []} diff --git a/edge/graph_59618880.jsonl b/edge/graph_59618880.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b35ca2a364ad100db94c079051145458b6683324 --- /dev/null +++ b/edge/graph_59618880.jsonl @@ -0,0 +1,10 @@ +{"19036098|10397481": ["\u2026community analyzing video sequences is interested in a lot of different questions like, e.g., key-frame extraction and storyboard display (Money and Agius 2008; Kim and Kim 2010), shot or scene change detection (Hong et al. 2003; Lee et al. 2004), or detection of continuity errors\u2026", ", key-frame extraction and storyboard display (Money and Agius 2008; Kim and Kim 2010), shot or scene change detection (Hong et al."]} +{"19036098|3330313": ["Although several survey papers have been published over the last decade (e.g. Hodge and Austin 2004; Agyemang et al. 2006; Hadi et al. 2009; Chandola et al. 2009, 2012; Su and Tsai 2011; Zimek et al. 2012), covering a broad selection of algorithmic approaches to outlier detection and quite\u2026"]} +{"35074898|27527196": []} +{"8642370|7774517": ["[4] provide an extensive overview of out-lier detection techniques.", "[4] provide a detailed survey for outlier detection techniques on wireless sensor networks."]} +{"8642370|3330313": ["[3] and Zhang et al ."]} +{"18479183|3330313": []} +{"32296488|5755403": []} +{"44153103|1229096": []} +{"207214926|3330313": []} +{"51987766|3330313": []} diff --git a/edge/graph_59618973.jsonl b/edge/graph_59618973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..365cda097c7c97cf6b81d583991aa4a6472b9a7c --- /dev/null +++ b/edge/graph_59618973.jsonl @@ -0,0 +1,5 @@ +{"46514721|10739218": []} +{"46514721|954543": []} +{"113553627|18078738": ["Additionally, via fault identification, the size and type of fault will be determined, Finally, feeding all of this information, to a controller, either a nominal controller or a new one which is switched into the control procedure, the effect of the fault will be removed from the final system [7].", "These methods can also help the system to avoid vulnerability in dangerous wind situations [7,8]."]} +{"115018779|18078738": []} +{"39409227|9072047": []} diff --git a/edge/graph_59619463.jsonl b/edge/graph_59619463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cba51139d2b89462d9e804ed4f907534cdaec9ef --- /dev/null +++ b/edge/graph_59619463.jsonl @@ -0,0 +1,5 @@ +{"53911132|239537": ["It should be noted that the enhanced ability to visually detect patterns is not arbitrary, but is attained by virtue of visualization algorithms from the field of graph drawing [Di Battista et al. 1994; Herman et al. 2000]."]} +{"7861078|15916359": []} +{"17752137|16125167": []} +{"30359940|16768404": []} +{"196083240|11159330": []} diff --git a/edge/graph_59621142.jsonl b/edge/graph_59621142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ed1b69d44448ff5238e857351377f56ced24cd1 --- /dev/null +++ b/edge/graph_59621142.jsonl @@ -0,0 +1,3 @@ +{"44587140|8310135": ["Since the latter tasks can be achieved with an accuracy varying from 80 to 90% [ 2 ], obtaining precision/recall figures oscillating around 60% for event extraction (usually involving several entities and relations) is considered to be a good result."]} +{"8723181|1143625": ["Many Natural-Language-Processing (NLP) techniques such as automatic summarization, information classi\ufb01cation, named-entity recognition, information extraction can be used to process such social media messages (Bontcheva et al., 2013; Imran et al., 2015).", "Twitter has been extensively used as an active communication channel, especially during mass convergence events such as natural disasters like earthquakes, \ufb02oods, ty-phoons (Imran et al., 2015; Hughes and Palen, 2009).", "Thousands of crisis-related messages that are posted online contain important information that can also be useful to humanitarian organizations for disaster response efforts, if processed timely and effectively (Hughes and Palen, 2009; Imran et al., 2015)."]} +{"16781120|1143625": [") or by people who donate or offer services[2, 11, 4].", "For this reason, social media information processing has emerged as a hot topic during the last few years and many approaches have been developed, ranging from crisis event detection leveraging burst detection algorithms to classification of messages using supervised and unsupervised techniques (for a detailed survey refer to [4])."]} diff --git a/edge/graph_5965458.jsonl b/edge/graph_5965458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59673468.jsonl b/edge/graph_59673468.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5969994.jsonl b/edge/graph_5969994.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5972227.jsonl b/edge/graph_5972227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7f4074d38b2e9cdb24c79face74aa1cab2e320c --- /dev/null +++ b/edge/graph_5972227.jsonl @@ -0,0 +1,12 @@ +{"11241387|1230643": ["The convergence of recent developments in micro electro-mechanical systems (MEMS), microprocessors, and ad hoc networking protocols have made such sensor networks a not-so-far reality [1]."]} +{"2504822|1230643": ["Wireless sensor networks (WSNs) [1], [2] consist of a set of sensor nodes, each of which is a self-contained unit with a low-speed processor, one or multiple sensors, a radio module, and a battery module."]} +{"5123715|1230643": ["The most prominent architectural model in the literature involves a small-scale on-demand deployment of specialized sensors that organize in a permanent network association(s) by establishing permanent network identifiers [9,23,34].", "013 unattended sensor nodes is expected to have significant impact on the efficiency of many military and civil applications such as combat field surveillance, border protection and control, secure installations and disaster management [9,18]."]} +{"206894740|1230643": ["The sensor nodes we deal with are limited in resources due to the scarce power batteries they feature and the difficult access to individual nodes once deployed [1,2]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"25213993|1230643": ["ADVANCES in microelectromechanical systems, embedded microprocessors, wireless communications, and networking technologies have made wireless sensor networks (WSNs) of large scale applicable to a wide range of applications, such as navigation and control of moving vehicles, environmental monitoring, machine condition monitoring and maintenance, disaster recovery, and healthcare [1]."]} +{"17380208|1230643": ["WIRELESS sensor network (WSN) consists of devices equipped with radio transceivers that cooperate to form and maintain a fully connected network of sensor nodes [3]."]} +{"206575935|1230643": ["Therefore, a sensor node's lifetime, presents a unique dependence on battery lifetime [1].", "Sensor nodes deployed in a sensor field (redrawn from [1])."]} +{"14211813|17205659": ["In spite of the diverse applications, WSNs face a number of unique technical challenges due to their inherent energy and bandwidth limitations, ad hoc deployment , and unattended operation, etc., [3], [4]."]} +{"954531|1230643": ["In general, a WSN consists of a large number of low cost and densely deployed battery powered sensor nodes endowed with wireless communication, sensing, processing and storage capabilities [1]."]} +{"35719872|1230643": []} +{"17540565|1230643": ["The issue of tracking moving targets in wireless sensor networks (WSNs) [1] has received significant attention in recent years [2\u20134]."]} diff --git a/edge/graph_59810394.jsonl b/edge/graph_59810394.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5981335.jsonl b/edge/graph_5981335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59843071.jsonl b/edge/graph_59843071.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..872654647f7f650f3c4fa8bd4ea7d1a0f6d08dc8 --- /dev/null +++ b/edge/graph_59843071.jsonl @@ -0,0 +1,33 @@ +{"38605171|5313655": ["alignment can not be performed properly at the time of comparison [5].", "Biometric template protection schemes [5] which are categorized as biometric cryptosystems [6] and cancelable biometrics [7] offer solutions to privacy preserving biometric authentication.", "Biometric template protection schemes [5] are commonly classified as biometric cryptosystems and cancelable biometrics."]} +{"6884490|34263386": ["dicate how good the image quality is [4, 18], (b) spoof detector yielding liveness measure to indicate how likely the fingerprint is from a live finger [8, 16], and (c) an effective fusion framework capable of incorporating quality measures and liveness measures with the fingerprint match scores to make an optimal accept/reject decision."]} +{"416565|34263386": []} +{"416565|18050848": []} +{"44171827|44286242": ["A detail survey of periocular biometrics research is presented in [39]."]} +{"51890585|3536399": ["Inspired by the notion of adversarial examples [43, 6] and the study of robustness of facial attribute classifiers to adversarial examples [39], Mirjalili and Ross [32] investigated the possibility of utilizing adversarial images for imparting gender privacy."]} +{"85448080|3536399": []} +{"36465362|9576764": ["Patel et al. [20] and Teh et al. [71] provide good reviews of extant research and identify promising avenues in this \ufb01led."]} +{"36465362|6670217": ["A widely-adopted mechanism for addressing this problem is smartphone authentication [5], such as PIN-based passcodes, pattern-based passcodes, \ufb01ngerprints and faces, which have been integrated into smartphone operating systems."]} +{"4624169|34263386": ["Considering the results reported in LivDet2009 [1], LivDet2011 [2], LivDet2013 [3] and LivDet2015 [4], liveness detection is still an open problem and performance of the existing approaches does not satisfy requirements of many practical applications [5].", "All these methods suffer from significant performance variation when encountering different spoofs especially when encountering novel spoofs that have not been seen during training [5]."]} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} +{"3753681|359842": []} +{"18600985|14674468": ["[55] which provides a comprehensive study on human and automated analysis of race classification."]} +{"18600985|2301292": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"18600985|5238287": ["To reduce dimensionality (a critical step for obtaining better gender estimation accuracy [177]), often, the human silhouette is extracted and a statistical feature - namely an average silhouette - is computed."]} +{"18600985|14303607": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"1573162|9045232": ["As a result, efficient and robust face detection algorithms [6, 8] have become available."]} +{"3219812|18050848": []} +{"34646340|14674468": []} +{"53906822|15219853": ["biometric cues to establish a precise identity [3].", "The behavioral biometric domain is rapidly evolving because of the technological advancements in human\u2013machine interfaces [3], [22]."]} +{"17234678|416565": []} +{"11926057|6028805": ["To address the challenges posed by visible spectrum images, researchers have used infrared images for face recognition [2] [3] [4] [5]."]} +{"58422226|5313655": ["As previously mentioned, a fusion of multiple biometric indicators have been shown to improved the accuracy and reliability of biometric systems."]} +{"10531341|416565": ["As summarized in [39], studies on face spoofing detection date back over 15 years.", "Significant progress has been made in biometric spoof detection technologies of individual modalities [38], [39]."]} +{"7020176|9913343": ["login authentication methods, including textual and graphical passwords [5], public key infrastructure (PKI), and biometric authentication [6], have been utilized."]} +{"17558010|15219853": []} +{"10568573|5313655": ["This security analysis is based on metrics commonly used in the cancelable biometrics literature [14], [15]."]} +{"6765007|15219853": []} +{"15057556|14866098": ["Following the success of SVM [36] in signal processing [37], pattern recognition and classification applications [38], [39], we choose to use SVM via the LibSVM Library [40]."]} +{"3858499|36784649": ["Various studies have advised that even if impostor samples were available, the authentication systems preferably be built by using only genuine samples [9, 13]."]} +{"7683602|206602044": ["Therefore, in order to implement speech-driven HCI that recognizes voice commnands as accurately as humans, the task of automatic speech recognition (ASR) must be incorporated to the system [3].", "Most of them primarily sacrifice latency for diarization accuracy, explaining why off-line systems, in general, present better results than on-line ones [3], [5].", "Additionally, SD comprises a broader range of applications, such as in audio/video information retrieval for automatic annotation of meetings/lectures, broadcast news, and videoconferences [3], [5].", "Existing works aiming towards such applications generally categorize as the so called Bottom-up approaches [3]."]} +{"207060530|5238287": ["[16, 17, 18, 19, 20, 9, 21, 22] Most of the works are supervised and use human labeled images as training data to predict the soft biometrics of a large number of unlabeled data."]} +{"15240764|416565": ["The third type of static approach includes hybrid schemes that combine more than one attribute [Galbally et al. 2014b; Wen et al. 2015], the use of client identity information [Chingovska and Anjos 2015], the characterization of the defocus property of the captured face image [Kim et al. 2015b;\u2026", "\u2026insight into both the vulnerability of data capture subsystems and presentation attack detection methods in face recognition systems [Hadid 2014; Galbally et al. 2014a], publicly available databases [Tan et al. 2010; Anjos and Marcel 2011; Chingovska et al. 2012; Zhang et al. 2012], dedicated\u2026"]} diff --git a/edge/graph_5989931.jsonl b/edge/graph_5989931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5991584.jsonl b/edge/graph_5991584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c96200a1eab4cf113fec0a0d9f116f41c476208 --- /dev/null +++ b/edge/graph_5991584.jsonl @@ -0,0 +1 @@ +{"11372438|1252121": []} diff --git a/edge/graph_5991846.jsonl b/edge/graph_5991846.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59942901.jsonl b/edge/graph_59942901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59943180.jsonl b/edge/graph_59943180.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_59945405.jsonl b/edge/graph_59945405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea2f30adf5ff59c9ec26027c1dc2f754888ecb80 --- /dev/null +++ b/edge/graph_59945405.jsonl @@ -0,0 +1,14 @@ +{"1968206|16768404": []} +{"3784844|18526204": ["For example, \u201cmodeling\u201d and \u201cmodelling\u201d would be grouped together [31-34]."]} +{"3372356|10175374": ["Multi-task Learning: Use of multi-task learning models has become ubiquitous for many machine learning applications in areas ranging from natural language processing, speech recognition to computer vision [30]."]} +{"3372356|7530272": ["It tries to learn a function that maps a sequence x to a class label l \u2208 RL where L is the total number of classes [38] and L = 2."]} +{"1565528|15279105": ["Reviews on data mining algorithms that have been used to extract adverse side-effects of drugs from such structured data sources are discussed in [3, 4, 5, 6, 7, 8, 9, 10]."]} +{"1565528|2809360": ["Meystre et al. [16] provide reviews of such methods."]} +{"21743146|26071662": []} +{"1486682|1546662": []} +{"1673682|8281388": []} +{"15332088|8125630": ["The OLAP engine allows users to perform multi-dimensional explorations of multidimensional data in a data warehouse (Chaudhuri & Dayal 1997)."]} +{"14031868|1546662": ["\u20262007; Moncrieff et al., 2009; Leaman et al., 2010; Butt et al., 2012; Mao et al., 2013; Wu et al., 2013; Yates et al., 2013; Abou Taam et al., 2014; Ferrara et al., 2014; Pages et al., 2014; Sampathkumar et al., 2014; Vaughan Sarrazin et al., 2014;\nFrontiers in Pharmacology | www.frontiersin.org 6\u2026"]} +{"46821407|2488484": []} +{"3284064|14186660": []} +{"3284064|15279105": ["One specific area of focus has been the use of text mining for the interpretation of molecular biology and genomic data, including genes, proteins, cells, tissues and whole organisms, with a range of applications to gene expression data [37], genome-wide association studies [38, 39], pharmacogenomics [40], interpretation of genetic variants such as singular nucleotide polymorphisms (SNPs) [41, 42], and systems biology network modeling [43]."]} diff --git a/edge/graph_59945420.jsonl b/edge/graph_59945420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4b8ae6bfd2df149c7e582e8ebc2e61dcfb6d365a --- /dev/null +++ b/edge/graph_59945420.jsonl @@ -0,0 +1,19 @@ +{"65375395|22352825": []} +{"65375395|6736412": []} +{"65375395|3126100": []} +{"65375395|10213552": []} +{"65375395|5544758": []} +{"65375395|2398835": []} +{"5054652|7971188": ["For more information on existing DHT-based routing protocols, see Abid et al. (2015) and Lua et al. (2005)."]} +{"166497986|18325863": ["dynamic bandwidth provisioning in opt cal networks [4] offers the ability for the carrier to do such provisi ning in an automated manner."]} +{"11392154|393948": []} +{"1015738|206743327": []} +{"1015738|8424228": ["However, similar to consistency, serializability can also not be achieved under network partitions [15]."]} +{"206743327|13034818": ["mance on the same order of magnitude as DRAM, but with persistent writes [202]."]} +{"509913|1599458": ["\u2026Internet of Things (IoT) services, sensor network monitoring, bioinformatics, healthcare, real time surveillance systems, social network communications, \ufb01nancial market strategies, educational learning environment, smart cities and homes, and cyber-physical interactions, just to name a few [1\u20133]."]} +{"207218223|16403716": ["Generally, multimedia indexing and retrieval include five procedures: structural analysis, feature extraction, data mining, classification and annotation, query and retrieval [131]."]} +{"16459995|9104850": ["Hierarchical caching in proxy servers has been extensively analyzed [35, 37]."]} +{"17748105|8424228": []} +{"11293092|206743327": ["For more information about in-memory big data storage and data analytics see the survey by Zhang et al. [80]. developed by Gupta et al. [59] is a distributed open-source TSMS designed for being embedded into applications to simplify the development of applications for IoT."]} +{"11293092|12323589": ["For additional information about DBMSs based on arrays see the survey by Rusu et al. [79]."]} +{"2210271|2256372": ["To overcome this limitation DFS uses caches at various points [7] and these caches can be positioned at either the file server or at the client [6]."]} diff --git a/edge/graph_59946517.jsonl b/edge/graph_59946517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_5995503.jsonl b/edge/graph_5995503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..760548508b8bf801a104ed7fc34163a11d940ca3 --- /dev/null +++ b/edge/graph_5995503.jsonl @@ -0,0 +1 @@ +{"247457|393948": []} diff --git a/edge/graph_599958.jsonl b/edge/graph_599958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6001064.jsonl b/edge/graph_6001064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c13b7c928525677c477add004a1a6e74fe4006fb --- /dev/null +++ b/edge/graph_6001064.jsonl @@ -0,0 +1,12 @@ +{"15746290|191396": ["There are different types of clustering analysis, such as partitioning methods and hierarchical methods [9]."]} +{"10238339|1230643": ["A wireless sensor network (WSN) is a network of a large number of densely deployed sensor nodes [1]."]} +{"16634217|12601073": []} +{"43728714|840009": ["In fact, WSNs have been widely used in various practical applications, such as gathering of information on environment and monitoring of civilian, military, and community health status [8\u201310]."]} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"16616754|8974063": ["Some issues in CRNs have been addressed well [18\u201333]."]} +{"16616754|2509135": ["Some issues in CRNs have been addressed well [18\u201333]."]} +{"16616754|28210515": ["WSN devices are not only a victim but are also an interferer sometimes [2]."]} +{"16616754|12060835": ["Such limitations are well studied in [59\u201361]."]} +{"164060|2509135": []} +{"36633672|12187956": []} +{"6745457|12817488": []} diff --git a/edge/graph_60107890.jsonl b/edge/graph_60107890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6012227.jsonl b/edge/graph_6012227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6014979.jsonl b/edge/graph_6014979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79912034435458ea27793ab03c944193c94aae15 --- /dev/null +++ b/edge/graph_6014979.jsonl @@ -0,0 +1,2 @@ +{"197802|14077778": []} +{"14924064|7839197": []} diff --git a/edge/graph_6017357.jsonl b/edge/graph_6017357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..900bdeb771bda65aebdb2f1e65dc133268f0c56c --- /dev/null +++ b/edge/graph_6017357.jsonl @@ -0,0 +1,2 @@ +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} +{"14101037|15170341": ["in [19] and the references therein."]} diff --git a/edge/graph_60204629.jsonl b/edge/graph_60204629.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6021680.jsonl b/edge/graph_6021680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2e6175fbdbed3afc99afdb7b951f750ec0b4d95 --- /dev/null +++ b/edge/graph_6021680.jsonl @@ -0,0 +1,11 @@ +{"63824938|8530790": ["Fonseca and Fleming (1995) survey the early research work in multi-objective evolutionary optimization."]} +{"12534535|8530790": ["Subsequent innovations in EMO have resulted in a rapidly growing field with a variety of solution methods that have been used successfully in a wide range of applications (as reviewed by [13,29\u201331])."]} +{"16413058|1097238": []} +{"11897480|17383371": []} +{"11897480|4474193": []} +{"11897480|8530790": []} +{"5949802|8530790": ["The use of objective ranks has been discussed already in [14] but in a bit different context."]} +{"2522644|8530790": ["Di erent non-dominated individuals are, in both cases, generally assigned di erent tness values, but the performance of the algorithms on problems with concave trade-o surfaces can be qualitatively di erent [18]."]} +{"6678877|8530790": ["This approach of ranking solutions is the core of many EA tools for Multi-Objective Optimisation (MOO) [SD95, FF95 ,ZT99]."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"60826382|8530790": []} diff --git a/edge/graph_60218666.jsonl b/edge/graph_60218666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6024173.jsonl b/edge/graph_6024173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8910f246ebfadbaaa1d543ab9ca3b25eed5f4b99 --- /dev/null +++ b/edge/graph_6024173.jsonl @@ -0,0 +1 @@ +{"207022752|11732290": ["At the submillimeter scale, other significant milestone studies in untethered microrobotics include a study on bacteria-inspired swimming propulsion [54], bacteriapropelled beads [23], [55], steerable electrostatic crawling microrobots [30], catalytic self-propelled microtubular swimmers [24], laser-powered microwalkers [31], magnetic resonance imaging (MRI) device-driven magnetic beads [29], and magnetically driven millimeter-scale nickel robots [56].", "Through off-board actuation approach, many groups used remote magnetic actuation to stop, propel, or navigate capsule millirobots in the GI tract [77].", "For the localization of millirobots inside the GI tract, as the first approach, medical imaging devices such as fluoroscopy, which uses low-dose X-rays to image the capsule region at 1\u20132 frames per second [77] ultrasonic imaging [77]\u2013[80], positron emission tomography (PET) [77], [81] and magnetic resonance imaging (MRI) [77].", "[195] B. Huang, M. W. M. Law, and P. L. Khong, \u2018\u2018Whole-body PET/CT scanning: Estimation of radiation dose and cancer risk 1,\u2019\u2019 Radiology, vol. 251, pp. 166\u2013174, 2009.", "Using MRI to localize the medical microrobot has the same considerations as those above for actuating the microrobot.", "However, the fringing fields at the end of an MRI device or solenoid can lead to large spatial magnetic gradients.", "[179] H. F. Wehrl et al., \u2018\u2018Preclinical and translational PET/MR imaging,\u2019\u2019 J. Nucl.", "[95] P. Pouponneau, J. C. Leroux, G. Soulez, L. Gaboury, and S. Martel, \u2018\u2018Co-encapsulation of magnetic nanoparticles and doxorubicin into biodegradable microcarriers for deep tissue targeting by vascular MRI navigation,\u2019\u2019 Biomaterials, vol. 32, pp. 3481\u20133486, May 2011.", "[71] S. Martel et al., \u2018\u2018MRI-based medical nanorobotic platform for the control of magnetic nanoparticles and flagellated bacteria for target interventions in human capillaries,\u2019\u2019 Int.", "[137] S. Martel, M. Mohammadi, O. Felfoul, Z. Lu, and P. Pouponneau, \u2018\u2018Flagellated magnetotactic bacteria as controlled MRI-trackable propulsion and steering systems for medical nanorobots operating in the human microvasculature,\u2019\u2019 Int.", "[180] M. S. Judenhofer et al., \u2018\u2018Simultaneous PET-MRI: A new approach for functional and morphological imaging,\u2019\u2019 Nat.", "[178] F. Chen et al., \u2018\u2018In vivo tumor vasculature targeted PET/NIRF imaging with TRC105(Fab)-conjugated, dual-labeled mesoporous silica nanoparticles,\u2019\u2019 Mol.", "Many successful localization methods are available for millirobots [77], [78], [81]\u2013[85], while localization of micron scale medical robots is a great challenge due to their much smaller size [94].", "Medical imaging systems such as MRI [71], [137], fluoroscopy [177], PET [178], NIR [179], and ultrasound [178] are possible candidates for microrobot localization.", "Spatial gradients are reported for the patient accessible volume of MRI machines to reach several Tesla per meter, but are typically found outside the central bore and the procedures to measure the maximum possible spatial gradient are not well defined [194].", "Moreover, by placing a small magnet inside the millirobot, hall-effect sensor arrays outside the patient have been used to localize the device [77], [82].", "an alternative approach, a radio transmitter has been placed on the commercial passive capsule endoscopes, and by placing multiple receiver antennas around the patient, an average position error of approximately 38 mm has been realized [77].", "Limitations on PET are already set for staff preparing the tracer nucleotide as well as during patient care.", "[191] I. C. Atkinson, L. Renteria, H. Burd, N. H. Pliskin, and K. R. Thulborn, \u2018\u2018Safety of human MRI at static fields above the FDA 8 T guideline: Sodium imaging at 9.4 T does not affect vital signs or cognitive ability,\u2019\u2019 J. Magnet."]} diff --git a/edge/graph_60244973.jsonl b/edge/graph_60244973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6028805.jsonl b/edge/graph_6028805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e0119c339c133798a603d79943f3e8fe08547c0 --- /dev/null +++ b/edge/graph_6028805.jsonl @@ -0,0 +1,5 @@ +{"5185854|9045232": ["Face detection is an\nimportant preprocessing stage of a face recognition system."]} +{"5393704|9045232": ["Section 3 describes the detection algorithm and the way pose is represented."]} +{"62185766|53680608": []} +{"6674407|192934": []} +{"15399583|9045232": []} diff --git a/edge/graph_60441309.jsonl b/edge/graph_60441309.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..764873baaad011c170f120c7bb0dc5eef90da932 --- /dev/null +++ b/edge/graph_60441309.jsonl @@ -0,0 +1,12 @@ +{"19008939|6670217": ["The effect of mobile malware is lethal, it can steal credential information from the device, sniffing user activity and location, overbilling user by sending random SMS and MMS to contact, launching denial of services attack from user devices and overloading device resources such as memory, battery and storage [3]."]} +{"207190974|15782139": []} +{"1355676|14678574": []} +{"1355676|3815882": ["vent helper data manipulation attacks [38]."]} +{"14757739|13172512": [", [27, 54, 49, 23, 25]) and machine learning algorithms pervade several contexts of information technology.", "For example, classification and regression models are employed to analyze current and historical trends to make predictions in financial markets [24, 33, 8], to study biological problems [54], to support medical diagnosis [30, 42, 57], to classify network traffic or detect anomalies [22, 28, 39, 12, 49].", "SVM for network traffic classification As shown by the extensive literature on this topic [28, 27, 49, 15], network traffic classification is commonly realized by means of Machine Learning algorithms, like K-Means, HMM, decision trees, and SVM."]} +{"107073726|2867949": ["Various kinds of port scans and tools to launch them are discussed in detail in [45].", ", by scanning the network in various modes [45],[211]."]} +{"107073726|18654252": ["Several other applications of RST in network anomaly detection [58, 75, 67, 139] are discussed in Chapter 6.", "There are many approaches to outlier detection [35, 139].", "A good amount of research on outlier detection in statistics is found in several books [317, 35, 163] as well as survey articles [39, 29, 139].", "A detailed discussion on mixed-type proximity measures can be found in [139].", "Outlier detection methods can be classified as [139] distance-based, density-based and soft computing approaches.", "Detailed discussions on various numeric proximity measures are available in [61, 141, 139].", "One can also handle mixed-type data by directly finding proximity [139] between a pair of categorical values using an exact matching approach.", "The mathematical framework of rough set theory enables modeling of relationships with a minimum number of rules [139].", "A detailed discussion on categorical proximity measures is available in [48, 139].", "Our literature survey [139] shows that the existing anomaly classification methods work basically in four modes, as given below."]} +{"107073726|16908400": ["Discussion of network coordinate systems, design and security is found in [102]."]} +{"107073726|8364569": ["[350], who explain the concepts of flows and classified attacks, and"]} +{"107073726|5646762": ["In an ensemble approach, the outputs generated by different clustering techniques are combined in order to provide a consensus output value [176]."]} +{"107073726|3330313": ["An extensive survey of anomaly detection techniques developed in machine learning and statistics has been provided by Hodge and Austin [169]."]} +{"107073726|6430931": ["Wu and Banzhaf [386] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} diff --git a/edge/graph_60441331.jsonl b/edge/graph_60441331.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5427c0a9f512c59cdfbb6deebd20a98d39e3e568 --- /dev/null +++ b/edge/graph_60441331.jsonl @@ -0,0 +1,53 @@ +{"4491667|206578224": ["Other emerging technology that enables IT and cloud Computing capabilities at the Radio Access Network (RAN) edge in a close proximity to the end users is the Multi-Access Edge Computing (MEC) [10].", "Then, SDN can complement the use of MEC offering programmability capabilities to authorized tenants at the same time, which allows a flexible and efficient service management.", "Nevertheless, a complete cellular system that offers MEC services is supported by Network Function Virtualization (NFV) and SDN, and network slicing attributes that allow flexibility and multi-tenancy support.", "Abbreviations\nThe following abbreviations are used in this manuscript:\nAPI Application Programming Interface CN Core Network CSMA/CA Carrier Sense Multiple Access/Collision Avoidance DASN Demand-Addressable Sensor Network DoS Denial of Service DDoS Distributed Denial of Service GPP General Purpose Processor IP Internet Protocol IoT Internet of Things MAC Medium Access Control MEC Multi-Access Edge Computing NFP Network Flow Processor NFV Network Function Virtualization NETCONF Network Configuration Protocol NOS Network Operative System ONF Open Networking Foundation ONOS Open Network Operating System OS Operative System QoE Quality of Experience QoS Quality of Service RAN Radio Access Network SCS Sensor Control Server SDN Software Defined Network SDR Software Defined Radio SDSN Software Defined Sensor Network SDWCN Software Defined Wireless Cellular Network SNMP Simple Network Management Protocol TLS Transport Layer Security VLAN Virtual Local Area Networks WCN Wireless Cellular Network WSN Wireless Sensor Network", "MEC is a key enabler for supporting Machine-to-Machine (M2M) and IoT services due to the ubiquitous coverage of cellular networks.", "Then, the use of MEC offers contextual information and specific content, proximity and location awareness, providing a customized mobile broadband experience.", "From the business point of view, MEC enables a secure cloud platform architecture and Application Programming Interfaces (APIs) to allow third players to share and use it dynamically, easily installing and modifying new services.", "As mentioned before, MEC relies on cloud computing and virtualization technologies including Virtual Machines (VMs) and containers."]} +{"4491667|3474164": []} +{"4491667|24110634": []} +{"4491667|2387055": ["SDN security [43] is focused on which component is the target of the attack."]} +{"4491667|1230643": ["Wireless Sensor Networks (WSN) [11,45] are typically a set of distributed autonomous sensors that are used to monitor physical or environmental conditions such as temperature, sound, and humidity, among others.", "We start with the Wireless Sensor Networks (WSN) [11], which is a technology that has become very important in recent years because of the quick and cheap development of smart sensors."]} +{"86712025|3738168": ["In [14] and [15] classification of localization techniques for terrestrial and marine wireless networks is presented respectively where the localization schemes are categorized based on the type of computation (centralized/distributed), ranging technique (rangebased/range-free), and space (2D/3D)."]} +{"86712025|5771653": ["In [14] and [15] classification of localization techniques for terrestrial and marine wireless networks is presented respectively where the localization schemes are categorized based on the type of computation (centralized/distributed), ranging technique (rangebased/range-free), and space (2D/3D)."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"53525923|11795007": []} +{"1883496|1230643": ["An important issue in sensor networks is the battery lifetime [2]."]} +{"990870|1230643": ["Typical applications for such networks include soil condition monitoring, earthquake prediction, border patrol, etc. [1], [2]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"5771653|5476476": ["These methods provide satisfactory level of accuracy with a small proportion of anchor nodes in WSNs [8,9].", "Although literature survey on localization techniques are available in [8,43\u201348], only a few papers exist that focus on range free localization techniques [49] without focusing on recent advanced techniques and applications.", "Positioning and navigation for mobile devices is a booming market with expected size of 4 billion dollar in 2018 [8].", "Thus, AOA technique is of limited interest in localization unless it is used with large antenna arrays [8].", "The work in [8] describes relatively recent localization techniques but focuses only on the indoor localization techniques and brie\ufb02y discusses about range free localization.", "This leads to the development of another category known as hybrid data fusion [8].", "This is due to the prediction of most of the \ufb01fth generation cellular user terminals in their mobility patterns knowing that these terminals will be either associated with \ufb01xed or controllable units or people [8].", "For example, cooperation between robot teams enhances the mission outcomes in applications such as surveillance, unknown zone explorations, guiding or connectivity maintenance [8]."]} +{"5771653|1236072": ["Moreover, the location information is also indispensable in geographic routing protocols and clustering [3,4]."]} +{"5771653|206583375": []} +{"44095894|2473728": []} +{"44095894|3474164": []} +{"44095894|31355144": []} +{"44095894|207694246": []} +{"8887289|1230643": []} +{"10776232|1230643": ["This is a valid assumption for robotic, mobile nodes, where the energy cost of movement is over 10, 000 times larger than the cost of wireless communication [1].", "Wireless sensor networks (WSNs) seek to monitor an environment and report events in a cheap, reliable manner [1]."]} +{"29280374|1230643": ["The emerging wireless sensor networks provide a more efficient and economical way to collect information in complex environments [26]."]} +{"18042498|1230643": ["Typical applications for such networks include soil condition monitoring, earthquake prediction, communication in mines and tunnels, etc. [1], [2]."]} +{"3738168|73678081": []} +{"3738168|4502294": ["However, FSO communication focuses more on long-range and high data rate outdoor terrestrial optical wireless communication (TOWC) applications such as wireless X-hauling [117]."]} +{"3738168|8316096": []} +{"3738168|8650651": []} +{"3738168|31355144": ["where the transmission between the surface station and optical sensor nodes is single hop [58].", "The architecture of static one-dimensional UOWNs also follows star topology, where the transmission between the surface station and optical sensor nodes is single hop [58]."]} +{"3738168|13475127": ["A detailed survey on marine life research using underwater sensor networks is presented in [298]."]} +{"3738168|902018": ["\u2022 Stationary two-Dimensional UOWNs: In the stationary two-dimensional architecture of UOWNs, a group of static optical sensor nodes is deployed in underwater environment [59]."]} +{"3738168|870434": ["- Fig. 4: Comparison of acouistic, RF, and optical waves under different performance metrics which are highlighted with green and red colors if they favor for high and low values, respectively. bulky [70]. The cost per acoustic node makes creating a large scale underwater acoustic network economically demanding, energy inef\ufb01cient which may necessitate battery replacement burden that can be quite a pro"]} +{"3738168|12060835": ["As surveyed in [390], ongoing research efforts on terrestrial communications have shown that energy harvesting plays a significant role in enhancing the performance."]} +{"53841923|3738168": []} +{"146049451|60441331": []} +{"2134031|4427557": ["More recently, standards specifically dedicated to IoT communications, such as LoRa [107], NB-IoT [108], eMTC or other Low Power Wide Area Network (LPWAN) standards [109], support positioning of the nodes to a certain extent."]} +{"2134031|3348390": ["Within all the context sensing information, the location information plays important roles [5]."]} +{"61155849|15300368": ["Another precision agriculture testbed has been developed for eal-time sensing in the field [79] ."]} +{"155105666|4427557": ["Sigfox and LoRa [33], [34] are two examples of non-standard wireless technologies in the unlicensed bands.", "The uplink uses differential binary phase shift keying (DBPSK) while the downlink uses Gaussian frequency shift keying (GFSK) [34], [35].", "shift keying (DBPSK) while the downlink uses Gaussian frequency shift keying (GFSK) [34], [35]."]} +{"9782003|1230643": ["W IRELESS underground sensor networks (WUSNs) enable a wide variety of novel applications [1], [2], including soil condition monitoring, earthquake and landslide prediction, underground infrastructure monitoring, sports-field turf management, landscape management, border patrol and security, and etc."]} +{"19132750|763939": ["In [37] and [38], mobility models for vehicles are classified into two major categories macroscopic and microscopic."]} +{"17365285|1230643": ["Typical applications for such networks include soil condition monitoring, earthquake prediction, border patrol, etc. [1], [2]."]} +{"2506601|1230643": ["Typical applications for such networks include soil condition monitoring, earthquake prediction, border patrol, etc. [1], [2]."]} +{"7615670|3504276": ["Unlike prior works [15], [16], [23]\u2013[29], in this paper, we consider a different setup where all sensors are buried underground to transmit geological data to the AH-AP.", "Moreover, the performance of conventional battery-powered wireless communication networks can be improved in many aspects, such as the higher data throughput and the lower network operating cost [15], [16]."]} +{"57925362|42714048": []} +{"40095452|1230643": ["Wireless underground sensor network (WUSN) is different from the conventional wireless sensor networks, which communicates in the soil [1, 2]."]} +{"58674248|1230643": ["An important issue in sensor networks is the battery lifetime [1].", "On the other hand, a collaborative effort of multiple sensors organized in sensor networks can be exploited in order to reduce the energy consumption or increase the reliability of measurements [1].", "This technique has some beneficial properties, as discussed in [1] and [3]."]} +{"16801229|1230643": ["Typical applications for such networks include soil condition monitoring, earthquake prediction, border patrol, etc. [2], [3]."]} +{"3748817|12537501": []} +{"3748817|3348390": []} +{"3748817|627405": []} +{"3748817|1230643": []} diff --git a/edge/graph_60442746.jsonl b/edge/graph_60442746.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b143a8ecc64b133f2c34028b4f5e7832683c0cc8 --- /dev/null +++ b/edge/graph_60442746.jsonl @@ -0,0 +1,24 @@ +{"12520775|28210515": ["5 it is noted that the general theory that Wi-Fi channels 1, 6, and 11 are the most used ones [6], [9] is confirmed in real life measurements - this is because they are non-overlapping.", "Some authors also propose techniques to tolerate external interferences [6]."]} +{"7854020|7988320": []} +{"562065|6275330": []} +{"562065|1236072": []} +{"562065|1230643": ["Self-organizing, self-optimizing and fault-tolerant are the main characteristics of this type of network [2].", "Research efforts have been done to address the above constrains by introducing new design methodologies and creating or improve existing protocols and applications [1,2].", "Sensor no WSN and th [1-2,7]: i) s different sen data; iii) data for diagnosis monitoring execution of the sensor no and forwardi management To provid illustrated in or more sens digital conve unit (CPU), power supp environment hardware ag with an appro"]} +{"7132356|25929315": ["Although di \ufb00 erent subtleties have been suggested to share optimally the RACH channel [4], the most e \ufb03 cient way relies on providing MTDs and UEs (User Equipment) with separate access channels."]} +{"5002530|1230643": ["Index Terms\u2014 Security; Mobile Wireless Sensor Network; Wireless Sensor Network\nI. INTRODUCTION\nIn recent years, Wireless Sensor Networks (WSNs) have been an extremely popular research area [1]."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"18876270|1588237": ["1) Enhancing Cell-Edge M2M Devices: Delgado-Luque et al. in [74] investigate two intercell interference techniques, namely partial frequency reuse (PFR), and nonprecoded joint transmission (nonprecoded JT), [84], for cell-edged M2M devices."]} +{"5630105|7876249": ["According to [30,31], routing algorithms for WBSNs need to address some specific issues, such as: frequent topology partition due to body postural movements; devices with very limited resources in order to be attached to a human body; new nodes must be able to enter the network quickly and easily; integrity of the data and patient privacy issues are critical; and the networks are often linked to external healthcare systems through the Internet.", "The survey presented by [30] focuses on the routing protocols developed for wireless body sensor networks (WBSNs), a subset of the WSNs responsible for monitoring the vital signs of patients and accordingly routing these data towards a sink."]} +{"5630105|2295142": ["The surveys presented in [24\u201326] do not focus on specific characteristics, providing a broader overview of the present state-of-the-art."]} +{"5630105|37052879": ["11a in [13]."]} +{"5630105|3755658": ["The work in [32] presents a survey in order to provide insight into routing protocols designed specifically for large-scale generic WSNs."]} +{"5630105|16120075": ["Wireless networks are a current trend, with varied applications, including biomedicine, residential automation, environmental surveillance and video security monitoring [1]."]} +{"5630105|1236072": ["The surveys presented in [24\u201326] do not focus on specific characteristics, providing a broader overview of the present state-of-the-art."]} +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"20435865|20905429": ["be monitored using a BAN device, such as heart rate, blood glucose level, blood pressure, body posture, electroencephalography (EEG), electrocardiography (ECG), electromyography (EMG), among others [2]."]} +{"3166491|2509135": []} +{"45734587|2635807": ["The authors adopt a best performance solution based on a min\u2013max approach [19]."]} +{"2275283|16214623": ["The main challenge in designing standards for WBANs is the balance of QoS demands with the low power constraints of limited battery powered nodes [30]."]} +{"2275283|7988320": []} +{"2275283|2295142": ["Results shows that the proposed scheme has a higher node energy efficiency, lower average delay and control overhead than other similar protocols as explained in [78].", "Furthermore, the authors in [78] gave a more detailed survey of multipath efficient routing in wireless sensor networks."]} +{"2275283|7854020": ["Similarly [69] presented a brief overview of the new IEEE 802."]} diff --git a/edge/graph_60442806.jsonl b/edge/graph_60442806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd53eb67fbcdd200642b77d15e53efb9874ff88a --- /dev/null +++ b/edge/graph_60442806.jsonl @@ -0,0 +1,19 @@ +{"14894961|7923463": []} +{"24202622|1400872": ["Some remedies have been provided by Hannan and Bishop (1997) and Pearlmutter (1995)\nfor accelerating the convergence and for achieving optimal solutions."]} +{"5404868|1634674": []} +{"5404868|17718674": []} +{"5854062|1634674": ["We discuss implementation, testing and evaluation in Section 6 and conclude the paper in Section 7."]} +{"15395523|1634674": ["More recently, Turaga et al. [9] and Aggarwal et al. [31] present surveys focusing on highlevel representation of complex activities and corresponding recognition techniques."]} +{"15395523|20905429": ["Over the past decade, sensor technologies, especially low-power, low-cost, high-capacity, and miniaturized sensors, wired and wireless communication networks [11]\u2013[13],"]} +{"15395523|7788290": ["HMMs have more recently been adopted as a model of choice in computer vision for modeling sequential (video) data (see [5] and [7] for surveys, and [94] and [102] for early examples).", "However, it is worth pointing out that while visual monitoring is intuitive and information-rich, vision-based activity recognition suffers from issues relating to privacy and ethics [4], [5], [8] as cameras are generally perceived as recording devices.", "Gavrila [5] and Poppe [6] present surveys mainly on tracking human movement via 2-D or 3-D models and the enabled action recognition techniques."]} +{"10817088|2670121": ["Generative probabilistic graphical models such as hidden Markov models [72], [70], [73], [74] and dynamic Bayesian networks [64], [48] have been used to model activity sequences and to smooth recognition results of an ensemble classifier [75]."]} +{"35920562|1230643": []} +{"11675664|5401262": ["On the other, while some surveys on different AmI topics have been published (Cook and Das 2007; Pantic et al. 2006; Jiang et al. 2004), a survey relating learning skills to AmI environments is not available."]} +{"76306|1634674": ["Learning the rule of the grammar from training data is a promising alternative, but it has proved to be extremely difficult in the general case [39]."]} +{"76306|1400872": ["have discussed well known learning algorithms, including a gradient descent optimisation method [116,117] and resilient backprogagation algorithms [118]."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"41639864|10817088": []} +{"41639864|2357830": []} +{"41639864|7278743": []} +{"6874718|2670121": ["Hence, the portability of activity datasets in different environments is an open issue [8].", "On the other side, activity execution patterns are strongly coupled to the individual\u2019s characteristics and home environment, and the portability of activity datasets is an open issue [8]."]} diff --git a/edge/graph_60449758.jsonl b/edge/graph_60449758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_60455.jsonl b/edge/graph_60455.jsonl similarity index 100% rename from graph_60455.jsonl rename to edge/graph_60455.jsonl diff --git a/edge/graph_60469108.jsonl b/edge/graph_60469108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bf813221866977952ee69978299ec1f189d1a5a --- /dev/null +++ b/edge/graph_60469108.jsonl @@ -0,0 +1,3 @@ +{"10116070|239537": ["State-of-theart browser-based interfaces [33] and existing navigational helps, such as site maps and visual cues [ 26 ], alleviate this load for only sighted users and are generally not applicable to dynamically growing content.", "State-of-the-art browser-based interfaces [33] and navigational helps [ 26 ] mostly rely on visual guidance, which is not useful for users who are blind."]} +{"10393627|17323154": ["A recent review of this relatively large body of literature is given in [Carpineto et al. 2009]."]} +{"38037333|386036": ["This is more similar to near-duplicate detection in database records which was recently summarized by [6]."]} diff --git a/edge/graph_60469167.jsonl b/edge/graph_60469167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9797f9e082bf5ff25f6d413886ebbfa72e3d909a --- /dev/null +++ b/edge/graph_60469167.jsonl @@ -0,0 +1 @@ +{"32653998|62183611": ["[26,27] and Papaioannou and Wilson [56]."]} diff --git a/edge/graph_60482599.jsonl b/edge/graph_60482599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23fb403326bc8b4e5ab88e32c3d1b96ec8b43f7d --- /dev/null +++ b/edge/graph_60482599.jsonl @@ -0,0 +1,4 @@ +{"42339879|18440098": ["More detailed information about previous work in hand gesture recognition can be found in the references [10,11]."]} +{"42339879|7185733": ["More detailed information about previous work in hand gesture recognition can be found in the references [10,11]."]} +{"37777845|16540884": ["of inputs [35], mainly involving speech and gesture signals in our scope."]} +{"37777845|18454590": ["Recently others proposed hybrid ANN/HMM approaches [28]."]} diff --git a/edge/graph_60491028.jsonl b/edge/graph_60491028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60506702.jsonl b/edge/graph_60506702.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..050d42516ba4bba13bc89828f388092307416fa1 --- /dev/null +++ b/edge/graph_60506702.jsonl @@ -0,0 +1 @@ +{"1027180|14441987": []} diff --git a/edge/graph_60515.jsonl b/edge/graph_60515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60544116.jsonl b/edge/graph_60544116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60552564.jsonl b/edge/graph_60552564.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60552667.jsonl b/edge/graph_60552667.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60569322.jsonl b/edge/graph_60569322.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6056945.jsonl b/edge/graph_6056945.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf77a802d82dbc274bbf1c9a9e0ab369ab072f18 --- /dev/null +++ b/edge/graph_6056945.jsonl @@ -0,0 +1,4 @@ +{"17855958|9240891": ["Many different versions of definition of trust are proposed in the literature (Deutsch [13], Sztompka [54], Mui et al. [44], Olmedilla et al. [47], Grandison and Sloman [20], Artz and Gil [6]).", "[47], Grandison and Sloman [20], Artz and Gil [6])."]} +{"8996665|7919236": ["Pu et al. (2012) provides a more detailed review of preference elicitation and refinement research to improve recommender system user experience.", "Pu et al. (2012) provides a more detailed review of preference elicitation and refinement research to"]} +{"8996665|17756238": []} +{"8996665|14148655": ["The FindMe systems spawned a wide range of more interactive, exploratory recommender systems, including many of the systems now known as critiquing-based systems (Chen and Pu 2012).", "recommender systems, including many of the systems now known as critiquing-based systems (Chen and Pu 2012)."]} diff --git a/edge/graph_60572600.jsonl b/edge/graph_60572600.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..393982150726b369e20520a81ef60ca0a6171c57 --- /dev/null +++ b/edge/graph_60572600.jsonl @@ -0,0 +1,16 @@ +{"24382165|25699143": ["Within this general family, a number of methods have been proposed including stereo vision [13, 26], laser scanning [4, 17, 12, 11], and coded structured light [3, 15, ?, 14]."]} +{"21800785|396631": []} +{"21800785|8730885": []} +{"21800785|14889616": []} +{"207021040|18347962": ["D displays; 3DTV"]} +{"207021040|15090212": ["Indeed, the usage of the term may even be further broadened to include all kinds of physical duplication of light, and therefore, may also cover integral imaging, in a sense [1]."]} +{"396631|14889616": ["D video, while the video\n632 Proceedings of the IEEE | Vol. 99, No. 4, April 2011\ndata associated with the additional views are encapsulated in an extension NAL unit type that is used for both scalable video coding (SVC) [45] and multiview video.", "The best approach for this may involve some\ncombination of MVC with another set of recent extensions of H.264/MPEG-4 AVCVnamely, the SVC extension [45]Vperhaps along with additional new technology.", "In February 2002, hewas appointed as the Editor of the H.264/MPEG-4 AVC video coding standard and its extensions (FRExt and SVC).", "A flag is specified to distinguish whether the NAL unit is associated with an SVC bitstream or an MVC bitstream.", "264/MPEG-4 AVCVnamely, the SVC extension [45]Vperhaps along with additional new technology.", "data associated with the additional views are encapsulated in an extension NAL unit type that is used for both scalable video coding (SVC) [45] and multiview video."]} +{"396631|3540699": ["For more detailed information about H.264/MPEG-4 AVC, thereaderisreferredtothestandard itself [1] and the various overview papers that have discussed it (e.g., [ 41 ]\u2013[43]).", "Although its basic design is very similar to that of prior video coding standards such as H.261, MPEG-1, H.262/MPEG-2, H.263, or MPEG-4 Visual, H.264/MPEG-4 AVC includes new features that enable it to achieve a significant improvement in compression efficiency relative to any prior video coding standard [ 41 ]\u2013[43]."]} +{"18279489|396631": []} +{"18279489|3540699": ["MVC is based on the single-view video compression standard H.264/AVC [14], [ 48 ]."]} +{"6896735|25699143": ["The review by Dhond and Aggarwal [ 23 ] provides an account of much of this work.", "Feature Matching [8], [11], [ 23 ], [62], [72], [84] Match dependable features rather than intensities themselves.", "of research in the computer vision community through the eighties. Dhond and Aggarwal [ 23 ]"]} +{"15154116|17516538": []} +{"195885949|25699143": ["Within this general family, a number of methods have been proposed including stereo vision [13, 26], laser scanning [4, 17, 12, 11], and coded structured light [3, 15, ?, 14]."]} +{"44844159|8909218": ["Another approach that follows an analogous rationale is the use of femtocells [66]."]} +{"44844159|1020148": ["Thus, the combination of geometry-based and image-based representation is proposed to render the 3D scene for free-viewpoint TV [33].", "This technique is often denoted as view-dependent texturing because it gives objects the ability to include the environmental effects as they appear in the original camera view [33]."]} +{"207745496|25699143": ["However, it is sometimes hard to gauge progress in the field, as most researchers only report qualitative results on the performance of their algorithms, and the last exhaustive stereo surveys date back about a decade [24, 19]."]} diff --git a/edge/graph_60574853.jsonl b/edge/graph_60574853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73c1428f59a62e2d7dda707d40a2b545df86cf02 --- /dev/null +++ b/edge/graph_60574853.jsonl @@ -0,0 +1,2 @@ +{"8973749|1176034": ["[65]."]} +{"8973749|8365617": ["In this regard, most efforts have been devoted to data representation using so called segmentation algorithms[64]."]} diff --git a/edge/graph_60616514.jsonl b/edge/graph_60616514.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6062185.jsonl b/edge/graph_6062185.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dbcb2a3f8b24b48ccf719601e8ac4a8450a348d2 --- /dev/null +++ b/edge/graph_6062185.jsonl @@ -0,0 +1,2 @@ +{"15499154|9104850": ["Key words: Transparent data replication, caching architecture, object caching, cache placement."]} +{"44746854|9104850": ["In [ 12 ] Wang provided a good survey of Web caching schemes."]} diff --git a/edge/graph_6062923.jsonl b/edge/graph_6062923.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73bccf110ca36de13d114db7ea86f0613f5c9fca --- /dev/null +++ b/edge/graph_6062923.jsonl @@ -0,0 +1,3 @@ +{"7249453|1940388": ["When dealing with security in WSNs, we mainly focus on the problem of achieving some of all of the following security contributes or services [6]:", "Security challenges in sensor networks can be summarized as follows [6]:", "Various classification of these attacks are [29, 4, 7, 6]:"]} +{"7249453|2357830": ["The ignition keys of many millions of automobiles, moreover, include RFID tags as a theftdeterrent [15]."]} +{"27494574|2357830": ["Many privacy-preserving RFID technology [23], like EPC re-encryption and killing tags [16], have Query Engine", "killing tags, sleeping tags, and EPC re-encryption [16]."]} diff --git a/edge/graph_60639592.jsonl b/edge/graph_60639592.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60642628.jsonl b/edge/graph_60642628.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60646544.jsonl b/edge/graph_60646544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60668029.jsonl b/edge/graph_60668029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32c51eb789587d946f4019d81a3ab971cf6c8702 --- /dev/null +++ b/edge/graph_60668029.jsonl @@ -0,0 +1 @@ +{"8953108|15744805": []} diff --git a/edge/graph_60682789.jsonl b/edge/graph_60682789.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6068649.jsonl b/edge/graph_6068649.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e30ed68c4a721c5907f32d899b3af5f3e7193829 --- /dev/null +++ b/edge/graph_6068649.jsonl @@ -0,0 +1 @@ +{"39306297|16534280": ["cations, such as the identification of entities in molecular biology [16], text classificational [2] and question answering [21]."]} diff --git a/edge/graph_60700287.jsonl b/edge/graph_60700287.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60706941.jsonl b/edge/graph_60706941.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6076208.jsonl b/edge/graph_6076208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..346ae74a2a90be9fca1a86ceacdd940524552b30 --- /dev/null +++ b/edge/graph_6076208.jsonl @@ -0,0 +1,18 @@ +{"1317601|6974127": ["Web service brokers must support adaptivity to implement autonomous load balancing (Nami and Bertels, 2007; Kephart and Chess, 2003; Sterritta et al., 2005) in order to handle dynamic request loads without a priori over-dimensioning the service provider\u2019s resources."]} +{"15619069|17567998": ["For component-based systems for example researchers have proposed many reliability prediction approaches [29]."]} +{"14100535|17567998": ["In the recent years, to overcome the drawbacks of the black-box techniques, architecture-based reliability analysis of software applications [2, 3] has gained prominence.", "The former comprise of the transition probabilities among the components, whereas, the latter include the reliabilities of the components [3]."]} +{"8749978|8530790": []} +{"17846882|10658846": ["Energy consumption is typically put in connection with performance [ 2 ,3].", "Energy-efficient runtime adaptation of embedded systems has also been a primary approach, which can be broadly categorized as predictive, adaptive and stochastic control [ 2 ]."]} +{"31780357|6076208": []} +{"31780357|15619069": ["\u2026Ansa\u0308tze um quantifizierbare Qualita\u0308tseigenschaften basierend auf einem annotierten Modell einer Software-Architektur vorherzusagen vorgeschlagen ((Balsamo et al., 2004) und (H. Koziolek, 2010) geben einen U\u0308berblick u\u0308ber Ansa\u0308tze fu\u0308r Performanz, (Gokhale, 2007) fu\u0308r Zuverla\u0308ssigkeit).", "\u2026(Berntsson Svensson et al., 2011, p.5), so that a number of approaches evaluate architecture models for performance (Balsamo et al., 2004), (H. Koziolek, 2010) in terms of expected response times, throughputs and resource utilizations; or for reliability (Goseva-Popstojanova and Trivedi,\u2026"]} +{"31780357|4474193": []} +{"31780357|17567998": ["Influences on Optimization Performance . . . . . . . . . . . . . . . .", "Automated Improvement of Software Architecture Models\nfor Performance and Other Quality Attributes\nZur Erlangung des akademischen Grades eines\nDoktors der Ingenieurwissenschaften\nvon der Fakult\u00e4t f\u00fcr Informatik des Karlsruher Instituts f\u00fcr Technologie (KIT)\ngenehmigte\nDissertation\nvon\nAnne Koziolek geb.", "Performance Improvement Methods . . . . . . . . . . . . . . . . . . 66 4.1.4.", "Reliability prediction on the software architecture level has been studied since the mid 1990s (Gokhale, 2007).", "Weiterhin werden allgemeine Freiheitsgrade von komponentenbasierten SoftwareArchitekturen, die Performanz, Zuverla\u0308ssigkeit und Kosten beeinflussen, metamodellunabha\u0308ngig beschrieben.", ", 2004) for performance, (Gokhale, 2007) for an overview regarding reliability, or (Boehm et al.", "Thus, only some reliability prediction approaches have been validated empirically (Gokhale, 2007; Immonen and Niemel\u00e4, 2008).", "Performance and reliability are considered important quality attributes in practice (Berntsson Svensson et al., 2011, p.5), so that a number of approaches evaluate architecture models for performance (Balsamo et al., 2004), (H. Koziolek, 2010) in terms of expected response times, throughputs and resource utilizations; or for reliability (Goseva-Popstojanova and Trivedi, 2001; Immonen and Niemela\u0308, 2008) in terms of probability of failure on demand.", "\u2026Ansa\u0308tze um quantifizierbare Qualita\u0308tseigenschaften basierend auf einem annotierten Modell einer Software-Architektur vorherzusagen vorgeschlagen ((Balsamo et al., 2004) und (H. Koziolek, 2010) geben einen U\u0308berblick u\u0308ber Ansa\u0308tze fu\u0308r Performanz, (Gokhale, 2007) fu\u0308r Zuverla\u0308ssigkeit).", "Schlie\u00dflich entha\u0308lt die Arbeit Performanz- und Kostentaktiken fu\u0308r die gezielte Verbesserung von PCM-Modellen.", "Sie kapseln Doma\u0308nenwissen aus dem Bereich der Performanzvorhersageverfahren als ausfu\u0308hrbare Regeln, die angewendet werden ko\u0308nnen um die Performanzeigenschaften (z.B. den zu erwartenden Durchsatz und die Antwortzeit) von Software-Architekturen zu verbessern.", "Performance Tactics: We codify a number of performance tactics as tactics operators for the Palladio Component Model, which make use of well-known performance domain knowledge and principles, focussing on bottleneck removal.", "Rule-based approaches (Performance Booster (Xu, 2010), PANDA (Trubiani, 2011)) codify knowledge from the performance domain into processable rules, to detect causes for performance problems in software models and suggest or automatically apply mitigation rules.", "Regelbasierte Ansa\u0308tze ((Xu, 2010; Trubiani, 2011)) wurden fu\u0308r Performanzverbesserungen vor-\nxiii\nxiv Zusammenfassung\ngeschlagen.", "Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .", "Additional, our extension of standard evolutionary algorithms with tactics was able to find solutions 50% to 90% faster on average.\nxii\nZusammenfassung\nDie quantitative Vorhersage von Qualita\u0308tseigenschaften (wie beispielsweise Performanz i.S.v. Zeitverhalten und Ressourceneffizienz, sowie Zuverla\u0308ssigkeit) fu\u0308r komponentenbasierte Software-Architekturen unterstu\u0308tzt den systematischen, zielorientierten SoftwareEntwurf nach Ingenieurprinzipien, indem die Eigenschaften des zu entwickelnden Artefakts schon vor der eigentlichen Erstellung abgescha\u0308tzt werden ko\u0308nnen.", "Martens aus Oldenburg\nTag der m\u00fcndlichen Pr\u00fcfung: 14.07.2011 Erster Gutachter: Prof. Dr. Ralf Reussner Zweiter Gutachter: Prof. Dr. Andreas Oberweis\nKIT \u2013 Universit\u00e4t des Landes Baden-W\u00fcrttemberg und nationales Forschungszentrum der Helmholtz-Gemeinschaft www.kit.edu\nAutomated Improvement of Software Architecture Models\nfor Performance and Other Quality Attributes\nPhD thesis to gain the degree\n\u201cDoktor der Ingenieurwissenschaften\u201d\nat the Department of Informatics of the Karlsruhe Institute of Technology (KIT)\nDissertation\nby\nAnne Koziolek ne\u00e9 Martens Oldenburg\nDay of defence: 14.07.2011 Referees: Prof. Dr. Ralf Reussner\nProf. Dr. Andreas Oberweis\nKIT \u2013 University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz Association www.kit.edu\nContents\nAbstract xi\nZusammenfassung xiii\nDanksagungen xvii", "Forscher haben verschiedene Ansa\u0308tze um quantifizierbare Qualita\u0308tseigenschaften basierend auf einem annotierten Modell einer Software-Architektur vorherzusagen vorgeschlagen ((Balsamo et al., 2004) und (H. Koziolek, 2010) geben einen U\u0308berblick u\u0308ber Ansa\u0308tze fu\u0308r Performanz, (Gokhale, 2007) fu\u0308r Zuverla\u0308ssigkeit).", "Performance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . ."]} +{"43594351|17567998": ["As an example Gokahale [54] has identified several weaknesses of current reliability evaluation models."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"32317136|8530790": []} +{"7069388|17567998": ["Three recent surveys [5,10,11] directly corroborate our observation that existing approaches may be unreasonable in assuming the availability of individual components\u2019 reliabilities.", "Three recent surveys [5,10,11] support this observation."]} +{"14699754|206778272": ["The benefits of hypergraphs are the ability to describe hierarchical structures [11], which is especially important for architecture specifications and improves the approach of Mens, Janssens and Demeyer [19]."]} +{"5565469|17567998": []} +{"14348504|17567998": ["Consistent with other architecture-based reliability approaches [8][9][10][11] we assume that the occurrence of a failure is stochastic and that components failure model is fail-stop.", "Three recent surveys [8][10][11] corroborate these observations.", "Despite this however, as identified by recent surveys [8][10][11], majority of existing architecture-based reliability modeling approaches largely focus on analysis at the system level."]} +{"11709119|8530790": ["To provide the user with a set of possible mapping solutions, each with different balance for use of resources and reliability, a multiobjective version of Differential Evolution (DE) [12] based on the Pareto method [13] is here proposed."]} diff --git a/edge/graph_60765831.jsonl b/edge/graph_60765831.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a52602962aaad3feb55b3d747e9304333b72722 --- /dev/null +++ b/edge/graph_60765831.jsonl @@ -0,0 +1,8 @@ +{"13014008|6415369": []} +{"55498413|6415369": ["A DSM is used to develop relationships between subsystems, components, or requirements [53,54,55].", "Modelling change through higher order DSMs\nA higher order DSM, derived from a DSM, is used to develop relationships between subsystems, components, or requirements (Warfield 1973, Steward 1981, Browning 2001)."]} +{"2085749|6415369": []} +{"110687234|6415369": ["A general overview of the DSM approach is provided in Browning (2001) .", "Depending on the type of system analysed, the appropriate tool for reordering the DSM (clustering for component-based and team-based DSMs or partitioning for activity-based and parameter-based DSMs) is used (Browning 2001).", "A general overview of the DSM approach is provided in Browning (2001)."]} +{"54173424|6415369": ["In the field of project organization, DSM applications concern either the scheduling of design tasks and the identification of iteration in design (Eppinger et al. 1994; Browning, 2001; Whitfield et al. 2005) or the decomposition and integration of large design projects into different teams (Mc Cord and Eppinger, 1993; Sosa et al.", "Browning (2001) reviews four types of DSM that split up into two static DSM (component-based or architecture DSM; team-based or organization DSM) and two timebased DSM (Activity-based or schedule DSM; parameter-based or low-level schedule DSM).", "\u2026organization, DSM applications concern either the scheduling of design tasks and the identification of iteration in design (Eppinger et al. 1994; Browning, 2001; Whitfield et al. 2005) or the decomposition and integration of large design projects into different teams (Mc Cord and Eppinger,\u2026", "DSM have been successfully applied in various fields, for instance: automotive (Pimmler and Eppinger, 1994; Browning, 2001), aerospace (Sosa, 2000, 2003; Sharman and Yassine, 2004) and electronics (Carrascosa et al., 1998).", "Product architecture and organization structure (McCord and Eppinger, 1993; Sanchez and Mahoney, 1996; Browning, 2001; Eppinger et Salminen, 2001; Cho, 2001; Oosterman, 2001; Sosa et al., 2003; Danilovic and Browning, 2007; Robin el al., 2007);", "Product architecture and organization structure (McCord and Eppinger, 1993; Sanchez and Mahoney, 1996; Browning, 2001; Eppinger et Salminen, 2001; Cho, 2001; Oosterman, 2001; Sosa et al., 2003; Danilovic and Browning, 2007; Robin el al., 2007);\n5.", "DSM have been successfully applied in various fields, for instance: automotive (Pimmler and Eppinger, 1994; Browning, 2001), aerospace (Sosa, 2000, 2003; Sharman and Yassine, 2004) and electronics (Carrascosa et al."]} +{"55429358|6415369": ["Component Design Structure Matrices (C-DSMs) [16] are matrices in which rows and columns represent design components, and the cells in the matrix record connections between the corresponding elements."]} +{"61686919|6415369": ["The Schemebuilder project [17] developed a tool to assist a designer in the incremental construction of a functional and physical model of a design (parts 1, 2 and to some degree 3 of Ulrich\u2019s definition) using a function-means tree approach."]} +{"109516178|6415369": ["DSM can be applied on various levels of abstraction to study interactions between functions, between sub-systems or components, between design parameters and between the life-cycle processes (Browning, 2001; Pimmler and Eppinger, 1994).", "A key feature of product architecture is the degree to which it is modular or integrative (Browning, 2001)."]} diff --git a/edge/graph_60769750.jsonl b/edge/graph_60769750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23797b3c4c9193680429c487790e26af3e7d406d --- /dev/null +++ b/edge/graph_60769750.jsonl @@ -0,0 +1 @@ +{"32065683|1113420": []} diff --git a/edge/graph_6078328.jsonl b/edge/graph_6078328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6078908.jsonl b/edge/graph_6078908.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6147d14eb17b870b9bd5c173fb9e3eb67e152e6 --- /dev/null +++ b/edge/graph_6078908.jsonl @@ -0,0 +1,3 @@ +{"2286996|6923178": ["For instance, in applying UDC to the feature sets, RFA methods have the best prediction performance evaluated using testing accuracy and MCC values; however, with respect to performance evaluated using AUC errors RFA is not the best.", "For instance, Figure 7 demonstrates the average training performance of MAQC-II breast cancer dataset over twenty times, with the measurements of training accuracy, MCC values, and AUC errors, for the classification of pCR endpoint status.", "Since disease status is not simply related to the number of these cancer related genes, we obtain the prediction performance by running multiple experiments, and compare the average prediction performance using the following measurements: testing accuracy, Matthews Correlation Coefficients (MCC) [26,27] that has been used in MAQC-II consortium [28], and area under the receiver operating curve (AUC) errors with classifiers NMSC, NBC, SVM and UDC (uncorrelated normal based quadratic Bayes classifier) [29].", "All the best prediction results, evaluated by using AUC, MCC and testing accuracy, are obtained by using RFA methods.", "MEASURE-MENTS GENE SELECTION METHOD MEAN(HS_HR)6STD(HS_HR), % MEAN(MS_HR)6STD(MS_HR), %\nNMSC SVM NBC UDC NMSC SVM NBC UDC\nTesting Accuracy NBC-MSC 88.762.3 88.960 90.961.0 88.660.8 87.561.9 83.160.3 86.660.6 87.761.6\nNMSC-MSC 90.462.1 86.760.0 85.362.2 79.667.7 88.662.7 79.860.7 82.962.0 78.967.4\nGLGS 81.264.1 81.960.8 79.461.0 77.065.2 80.864.3 76.260.6 79.161.0 76.565.2\nLOOCSFS 77.061.1 82.160.5 72.161.7 74.163.1 76.661.2 78.162.5 71.461.8 73.262.7\nSVMRFE 81.962.9 88.960 79.162.6 80.761.9 80.962.7 85.360.2 77.962.3 80.361.8\nMCC values NBC-MSC 62.566.7 63.960 69.763.4 60.762.8 61.365.9 48.860.6 54.762.1 59.265.0\nNMSC-MSC 68.466.5 55.260 47.767.4 43.9616.0 63.367.9 37.861.9 40.965.0 42.2614.9\nGLGS 36.269.5 43.063.5 29.363.5 30.3610.2 35.469.8 29.261.2 28.462.8 30.0610.3\nLOOCSFS 23.464.9 38.563.5 18.764.7 21.6611.0 23.065.1 26.365.1 18.265.0 21.1610.7\nSVMRFE 40.967.9 62.560.0 32.666.9 41.164.7 39.467.4 49.160.7 30.565.5 40.764.9\nAUC errors NBC-MSC 17.262.2 23.261.1 40.065.6 34.866.3 17.262.2 27.560.3 40.065.6 34.866.3\nNMSC-MSC 14.463.0 19.160 47.963.7 46.065.1 14.463.0 28.261.1 47.963.7 46.065.1\nGLGS 22.661.3 29.360 37.461.8 36.761.8 22.661.3 33.560.3 37.461.8 36.761.8\nLOOCSFS 27.561.3 22.861.4 45.863.8 41.663.1 27.561.3 27.162.2 45.863.8 41.663.1\nSVMRFE 20.064.4 18.865.7 38.763.4 38.462.0 20.064.3 25.660.2 38.763.4 38.462.0\ndoi:10.1371/journal.pone.0008250.t012\nPLoS ONE | www.plosone.org 18 December 2009 | Volume 4 | Issue 12 | e8250\ninformation, there are 84 positives and 256 negatives in original training set, 34 positives and 180 negatives in original validation set [28].", "Regarding the prediction performance evaluated using testing accuracy and MCC values (left column and middle column, Fig.", "PLoS ONE | www.plosone.org 15 December 2009 | Volume 4 | Issue 12 | e8250\nNMSC, the best model is obtained by using gene selection method of NMSC-MSC, evaluated by training accuracy and MCC values, the best model is associated with SVMRFE, evaluated by AUC errors.", "In all results of the five gene selection methods with the four learning classifiers, on average, the combination of gene selections of NMSC-MSC and NBC-MSC with the learning classifier of NMSC has performed the best, regarding the comprehensive evaluation criteria of testing accuracy, MCC values, and AUC errors.", "Additionally, learning classifiers also play important roles in the classification of microarray data and our experimental results indicate that the Nearest Mean Scale Classifier (NMSC) is a good choice due to its prediction reliability and its stability across the three performance measurements: Testing accuracy, MCC values, and AUC errors.", "We notice that the performance evaluation using testing accuracy (left column) and MCC (middle column) is consistent, but the performance evaluation using AUC measurement is not\nalways consistent with the evaluation using testing accuracy and MCC.", "The average testing performances, evaluated in terms of testing accuracy, MCC values, and AUC errors, were compared.", "Figure 1 lists the testing accuracy, MCC values, and AUC errors on prediction of erpos by using two RFA methods: NBCMSC and NMSC-MSC, as well as GLGS, LOOCSFS, and SVMRFE with the four learning classifiers.", "MEASURE-MENTS GENE SELECTION METHOD MEAN(HS_HR)6STD(HS_HR), % MEAN(MS_HR)6STD(MS_HR), %\nNMSC SVM NBC UDC NMSC SVM NBC UDC\nTesting Accuracy NBC-MSC 89.562.2 79.362.2 82.961.1 91.661.7 88.561.4 76.560.5 81.760.3 91.061.6\nNMSC-MSC 90.662.8 73.360 85.462.8 93.060.8 86.961.5 68.361.6 83.761.9 91.661.1\nGLGS 89.762.1 83.862.1 86.861.8 90.561.4 89.261.7 80.360.9 85.761.7 90.261.3\nLOOCSFS 86.460.8 66.761.9 86.961.4 86.361.6 86.160.8 65.160.9 86.261.0 85.861.4\nSVMRFE 77.367.2 84.460 77.666.6 77.568.9 75.666.7 78.460.1 76.766.1 75.867.6\nMCC values NBC-MSC 76.764.5 56.164.7 63.162.3 81.963.7 75.363.3 50.561.0 60.460.7 81.063.4\nNMSC-MSC 79.165.8 44.860 66.665.6 84.562.4 72.264.1 34.463.5 64.464.2 82.762.5\nGLGS 77.463.6 67.164.9 71.363.9 79.563.2 76.963.4 59.262.3 69.763.8 79.162.7\nLOOCSFS 70.861.7 27.065.6 70.963.3 69.763.3 70.561.8 24.463.0 70.262.9 69.663.3\nSVMRFE 51.9614.5 66.660 53.9611.9 53.8616.6 51.0613.9 53.860.3 53.5611.5 52.3615.0\nAUC errors NBC-MSC 8.560.4 19.562.2 22.260.5 25.764.4 8.560.3 22.260.7 22.260.5 25.764.4\nNMSC-MSC 8.460.7 23.560.4 23.161.3 17.163.6 8.460.7 28.262.3 23.161.3 17.163.6\nGLGS 8.060.4 10.361.8 16.761.0 15.161.5 8.060.4 13.461.1 16.761.0 15.161.5\nLOOCSFS 11.162.2 32.362.7 15.560.5 17.562.6 11.162.2 32.961.8 15.560.5 17.562.6\nSVMRFE 17.366.1 14.160 15.360.6 17.362.9 17.366.1 19.160.1 15.360.6 17.362.9\ndoi:10.1371/journal.pone.0008250.t011\nTable 12."]} +{"14932521|11894197": ["For Gaussian RBF kernels [29] which take the form of", "An extensive review of major feature selection techniques has been carried out [29]."]} +{"12933558|11894197": ["Feature selection is often used in areas such as sequence, microarray, and mass-spectra analysis [5].", "The research on microarray feature selection can be divided into three main categories: \ufb01lter, wrapper, and embedded [5]."]} diff --git a/edge/graph_60790459.jsonl b/edge/graph_60790459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60793064.jsonl b/edge/graph_60793064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60831994.jsonl b/edge/graph_60831994.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49695c4ebd17bbb782362c0c0434c810917542f2 --- /dev/null +++ b/edge/graph_60831994.jsonl @@ -0,0 +1,4 @@ +{"17880277|16362395": []} +{"18942707|9270553": ["The disabled people with the above mentioned problems are forced to accept a reduced quality of life, resulting in dependence on caretakers and escalating social costs [ 3 ]."]} +{"206608942|9270553": ["Current systems can reach no more than 25 bits/min,1 even under optimal conditions [13]."]} +{"17754551|14866098": ["In 2006, Bashashati published a survey of signal processing algorithms in BCI based on EEG [22]."]} diff --git a/edge/graph_6084038.jsonl b/edge/graph_6084038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ecf8a3460a6117c5385f18f89937bfeddd121d3b --- /dev/null +++ b/edge/graph_6084038.jsonl @@ -0,0 +1,2 @@ +{"17857706|6084038": ["For an overview of the recent progress and state of the theory, refer to the recent survey [ 20 ].", "For an overview of the recent progress and state of the general theory, refer to the recent survey [ 20 ]."]} +{"6203443|6084038": []} diff --git a/edge/graph_60844751.jsonl b/edge/graph_60844751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60845553.jsonl b/edge/graph_60845553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60849603.jsonl b/edge/graph_60849603.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bf63d382b9cf3afceda3f4b468dcbf11b69f480 --- /dev/null +++ b/edge/graph_60849603.jsonl @@ -0,0 +1 @@ +{"14964317|14441987": []} diff --git a/edge/graph_60864944.jsonl b/edge/graph_60864944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..742f83354521ab67998888619f439bb575b3788a --- /dev/null +++ b/edge/graph_60864944.jsonl @@ -0,0 +1 @@ +{"19892398|192934": []} diff --git a/edge/graph_6087085.jsonl b/edge/graph_6087085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ce88675cd19cd563bcd51b9c577dd59272dd806 --- /dev/null +++ b/edge/graph_6087085.jsonl @@ -0,0 +1 @@ +{"6956241|6392800": []} diff --git a/edge/graph_60876554.jsonl b/edge/graph_60876554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60883938.jsonl b/edge/graph_60883938.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fccc5d337455b6cb56e260fc77b414c294b8d994 --- /dev/null +++ b/edge/graph_60883938.jsonl @@ -0,0 +1 @@ +{"9460050|582949": ["an optimistic view that might neglect all additional capacitances in a real gate and assume that the peak current flows at all voltages, and a more pessimistic heuristic that gives about four times the gate delay metric [3]."]} diff --git a/edge/graph_6088977.jsonl b/edge/graph_6088977.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60936035.jsonl b/edge/graph_60936035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60939833.jsonl b/edge/graph_60939833.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed70db93865b53f361cf775a8d58294e74d467c5 --- /dev/null +++ b/edge/graph_60939833.jsonl @@ -0,0 +1 @@ +{"111178692|17718674": []} diff --git a/edge/graph_60941390.jsonl b/edge/graph_60941390.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b439ac9fe0727f649e07b07421a41d7fc6f50b96 --- /dev/null +++ b/edge/graph_60941390.jsonl @@ -0,0 +1 @@ +{"119172087|4491892": ["In filtering theory, the generic name for such methods is that of a particle filter (see [4], [5], [6], [9], etc."]} diff --git a/edge/graph_60951798.jsonl b/edge/graph_60951798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_60999675.jsonl b/edge/graph_60999675.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6101305.jsonl b/edge/graph_6101305.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6104298.jsonl b/edge/graph_6104298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99009567452b3edfa8b7224a663f83cf0b5e1434 --- /dev/null +++ b/edge/graph_6104298.jsonl @@ -0,0 +1,6 @@ +{"32572376|9223669": ["According to Malenovsk\u00fd et al. (2007) and Wu (2009), there are still no truly suitable methods available at present to derive land surface variables from remote sensing data from different spatial and spectral resolutions and therefore from scaling.", "Wu (2009) states the reasons for this: The research on scale, the effect of different scales, scale transition and methods of scaling in remote sensing are still at the very beginning."]} +{"14581240|17054454": ["RS data are effectively used in various mapping applications, ranging from mixed land cover (LC) (Hansen and Loveland 2012; Xie et al. 2008) and habitat (McDermid et al.", "Lack of high quality in-situ data, or data collected in inconsistent manner under different sources, periods, or methods, may severely limit the quality of RS products (Gillespie et al. 2008; Xie et al. 2008)."]} +{"31381421|16335158": ["Sensor-cloud computing: sensor-cloud computing refers to the on-field WSN applications empowered with cloud computing (Ojha et al., 2014; Alamri et al., 2013; Zhu et al., 2014)."]} +{"31381421|1503157": ["Among all these technologies, the agriculture domain is mostly explored concerning the application of WSNs in improving the traditional methods of farming (ur Rehman et al., 2014; Zhao et al., 2013; Wang et al., 2006; Akyildiz et al., 2002a,b; Akyildiz and Kasimoglu, 2004; Yick et al., 2008; Ruiz-Garcia et al., 2009)."]} +{"31381421|1230643": []} +{"109072055|17561208": ["\u2026Turner et al. (2003) presented a review of sensors available for indirect biodiversity monitoring via the derivation of biophysical parameters, and Wang et al. (2010) reviewed spaceborne remote sensing for ecology, biodiversity, and conservation studies, mainly focusing on high-resolution,\u2026", "\u2026such as endogenic forcing (e.g. the birth of new volcanic islands in the oceans, or eruptive activity on land); local, regional, and even global natural hazards; and mass extinction events (e.g. meteorite impacts, forest fires, tsunamis, floods, etc.) (Kataoka et al. 2014; Twitchett 2013;\u2026"]} diff --git a/edge/graph_6105131.jsonl b/edge/graph_6105131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffb02521d96138906a1b213d3d7a966f253d3669 --- /dev/null +++ b/edge/graph_6105131.jsonl @@ -0,0 +1,28 @@ +{"7105745|2835258": ["Refer to [7] for a comprehensive survey on such algorithms.", "Although simple, this approach is considered unfair in the ad hoc concept because some nodes have more responsibilities than others [7]."]} +{"60468427|870434": ["Applications of DTNs include large-scale disaster recovery networks, sensor networks for ecological monitoring [36], ocean sensor networks [28, 24], vehicular networks [26, 6], and projects such as TIER [2], Digital Study Hall [15], and One Laptop Per Child [1] to benefit developing nations."]} +{"14125078|14441987": ["Developing routing protocols for MANETs has been an extensive research area during the past few years, and various proactive and reactive routing protocols have been proposed [2]."]} +{"15308690|10287248": []} +{"14473800|1230643": []} +{"13169081|205286988": ["Autonomous adaptability is a key challenge in wireless sensor networks (WSNs) [ 1 , 3, 2, 21]."]} +{"13169081|1230643": ["Autonomous adaptability is a key challenge in wireless sensor networks (WSNs) [1, 3, 2, 21]."]} +{"16324015|1230643": []} +{"13403320|14441987": ["Basically, there are two approaches in providing ad hoc network connectivity: \u2022 Flat-routed network architecture \u2022 Hierarchical network architectures [1] In the flat-routed network architecture, all the nodes are equal and packet routing is done based on peer-to-peer connections.", "In general, existing routing protocols can be classified as either: \u2022 Table-driven \u2022 On-demand \u2022 Hybrid [1, 2] Table-driven protocols attempt to continuously update the routes within the network so that when a packet needs to be forwarded, the route is already known and can immediately be used."]} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"18124979|14441987": ["Many schemes have been suggested (see [5] for survey), most of which are route-based."]} +{"6554474|1230643": ["In a usual scenario, these networks are largely deployed in areas of interest for ne grained monitoring in dierent classes of applications [ 1 ]."]} +{"18361204|7278743": []} +{"168281|2835258": ["Ef.cient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case Thrasyvoulos Spyropoulos, \nStudent Member, IEEE, Konstantinos Psounis, Member, IEEE, and Cauligi S. Raghavendra, Fellow, IEEE Abstract \nIntermittently connected mobile networks are wire\u00adless networks where most of\u2026"]} +{"5659949|14697846": []} +{"4700370|14441987": []} +{"45634698|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"16487844|14441987": ["The first generation of routing protocols for MANETs [13] are essentially MHRPs that do not consider power efficiency as the main goal.", "The problem with SIMPLE, however, is when a min-hop routing protocol (MHRP) (which is the de facto routing approach in MANETs) is used at the network layer.", "Power control for CDMA-based MANETs is another interesting topic that has not received enough attention.", "It is, therefore, natural to consider the use of CDMA in MANETs.", "IEEE Network \u2022 September/October 20048 0890-8044/04/$20.00 \u00a9 2004 IEEE\nobile ad hoc networks (MANETs) have recently been the topic of extensive research.", "The first generation of routing protocols for MANETs [1] are essentially MHRPs that do not consider power efficiency as the main goal.", "The interaction between the network and MAC layers is fundamental to power control in MANETs.", "While wide-scale deployment of MANETs is yet to be realized, several efforts are currently underway to standardize protocols for the operation and management of such networks.", "Furthermore, MANETs can conserve battery energy by delivering a packet over a multihop path that consists of short hopby-hop links.", "Furthermore, since route discovery in MANETs is often reactive (i.e., the path is acquired on demand), power control can be used to influence the decisions made at the routing layer by controlling the power of the route-request (RREQ) packets (discussed in more detail in a later section).", "The use of TPC in MANETs with directional antennas can provide significant energy saving.", "PowerAware Routing Optimization (PARO) [3] also utilizes power consumption as the route metric, but it is an on-demand protocol and, therefore, does not have the problems associated with proactive routing in MANETs.", "Due to their inherently distributed nature, MANETs are more robust than their cellular counterparts against single-point failures, and have the flexibility to reroute around congested nodes."]} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} +{"3334831|2835258": ["However, the authors in [Mauve et al., 2001] concluded that the flat hashing-based location services that use the concept of home zone have two main drawbacks.", "However, the authors in Mauve et al. (2001) concluded that the flat hashing-based location services that use the concept of home zone have two main drawbacks."]} +{"552304|2835258": ["flooding), well understood and offers localized information [11]."]} +{"552304|14441987": ["the network. This information can be supplied as follows, for details see [ RT99 , BMJ+98]:"]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"15385767|1230643": ["The convergence of micro-eletro-mechanical system technology, wireless communication and digital electronics leads to the emergence of wireless networks of sensor devices [1], which are capable of sensing, data processing, and communicating."]} +{"9269363|1230643": ["Thus, issues of routing, transport, power management and data aggregation are dealt with in other work [1, 2, 3] and are beyond the scope of this paper.", "In our model, the WSN consists of a limited number of static or mobile BSs and RUs, but is otherwise unattended [1]."]} diff --git a/edge/graph_61057307.jsonl b/edge/graph_61057307.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6110339.jsonl b/edge/graph_6110339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6111895.jsonl b/edge/graph_6111895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df088e0f0691d672178a8740eadf6220cbafc478 --- /dev/null +++ b/edge/graph_6111895.jsonl @@ -0,0 +1,4 @@ +{"59994907|1596610": []} +{"4983376|15468128": ["\u2026of some linear block codes (e.g., BCH codes) [9], the Viterbi decoding of convolutional codes [9], the iterative decoding of Turbo codes [10], [11] and graph-based codes (e.g., low-density parity-check (LDPC) codes) [12], [13], and the Berlekamp-Massey algorithm [9] and the list decoding [14]\u2026", "When the number of 1\u2019s lies in the closed intervals [0 , 1] , [2 , 4] , [5 , 7] , [8 , 10] and [11 , 12] , the coded-modulation in effect will decode the information bits as \u201c00\u201d, \u201c01\u201d, \u201c10\u201d, \u201c11\u201d, and \u201c00\u201d, respectively."]} +{"16042503|12060835": ["The issue of resource harvesting has been widely studied in the electromagnetic communication domain [9, 31].", "A broad study for energy harvesting in electromagnetic communications is given in[31]."]} +{"6331206|17772052": []} diff --git a/edge/graph_61120932.jsonl b/edge/graph_61120932.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33a4002a0d4ca908398714a0304665da549da002 --- /dev/null +++ b/edge/graph_61120932.jsonl @@ -0,0 +1,2 @@ +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} diff --git a/edge/graph_6112915.jsonl b/edge/graph_6112915.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_61132.jsonl b/edge/graph_61132.jsonl similarity index 100% rename from graph_61132.jsonl rename to edge/graph_61132.jsonl diff --git a/edge/graph_61141004.jsonl b/edge/graph_61141004.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61144266.jsonl b/edge/graph_61144266.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..020a12cf59f754d23837c70e1eed0cd70e4e11dc --- /dev/null +++ b/edge/graph_61144266.jsonl @@ -0,0 +1 @@ +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} diff --git a/edge/graph_61153370.jsonl b/edge/graph_61153370.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c3bb93457b1cfb4eaf6d58369d455abf60315aa --- /dev/null +++ b/edge/graph_61153370.jsonl @@ -0,0 +1,17 @@ +{"12688539|5943294": ["\u2026signals, spontaneous visual behavior is more convenient and unobtrusive to measure, although it is susceptible to environmental noise, such as lighting conditions, occlusion, etc. Recently, Soleymani and Pantic [5] have reviewed human-centered implicit tagging on images, videos, and search results.", "Unlike their survey, which lists all work together [5], we categorize current research into three groups based on adopted modalities: physiological signals, spontaneous visual behavior, and both.", "Previous reviews of this topic include the recent work by Soleymani and Pantic [5]."]} +{"12688539|6857179": ["Since emotions are complex and subjective, a small number of discrete categories may not re\ufb02ect the subtlety and complexity of the affective states [37]."]} +{"10137425|1770055": ["More recently, multimodal translation has seen renewed interest due to combined efforts of the computer vision and natural language processing (NLP) communities [20] and recent availability of large multimodal datasets [40], [214]."]} +{"10137425|5671282": ["Structured coordinated spaces are commonly used in cross-modal hashing \u2014 compression of high dimensional data into compact binary codes with similar binary codes for similar objects [226]."]} +{"10137425|15315731": ["Multimodal fusion has a very broad range of applications, including audio-visual speech recognition (AVSR) [170], multimodal emotion recognition [200], medical image analysis [93], and multimedia event detection [122]."]} +{"10137425|393948": ["Due to the multilayer nature of deep neural networks each successive layer is hypothesized to represent the data in a more abstract way [18], hence it is common to use the final or penultimate neural layers as a form of data representation.", "Neural networks have become a very popular method for unimodal data representation [18].", "[18] we use the term feature and representation interchangeably, with each referring to a vector or tensor representation of an entity, be it an image, audio sample, individual word, or a sentence.", "Probabilistic graphical models are another popular way to construct representations through the use of latent random variables [18].", "[18] identify a number of properties for good representations: smoothness, temporal and spatial coherence, sparsity, and natural"]} +{"10137425|6387482": ["A second important category of multimodal applications comes from the field of multimedia content indexing and retrieval [11], [188]."]} +{"19166688|8777381": []} +{"57191020|18418184": ["Originally, audio fingerprinting referred to a procedure that allows for a robust identification of exact replicas of audio recordings [4]."]} +{"57263987|812303": ["Most published music genre classification approaches rely on audio sources (for an extensive review on the topic, please refer to Sturm (2012); Bogdanov et al. (2016)).", "However, almost all related work is concentrated in the classification of music items into broad genres (e.g., Pop, Rock) using handcrafted audio features and assigning a single label per item (Sturm, 2012).", "Automatic music genre classification thus is a widely explored topic (Sturm, 2012; Bogdanov et al., 2016)."]} +{"57263987|393948": ["By contrast, representation learning approaches have demonstrated their superiority in multiple domains (Bengio et al., 2013)."]} +{"57263987|11608263": ["Multi-label classification is a widely studied problem in other domains (Tsoumakas and Katakis, 2006; Jain et al., 2016)."]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"11299122|6387482": ["This spurs interest in research efforts addressing different information fusion models [3].", "Multimodal information fusion can be introduced at four different stages: data level, feature level, score level and decision level [3].", "Identification of dissimilar characteristics between different modalities and optimal selection of fusion algorithms can present challenges in information fusion [3].", "Non-linear feature correlation is obtained through kernel PCA, kernel CCA and kernel CFA [10].", "Finally, the decision level fusion refers to the combination of decisions from multiple classifiers which allows for flexible choice of classifier for each modality [3].", "Integration of multiple modalities at the feature level has been studied in the literature using linear methods such as linear discriminant analysis (LDA) [15], canonical correlation analysis (CCA) [13], principal component analysis (PCA) [3] and factor analysis [18].", "Multimodal information fusion is becoming an important research area in the HCI [8] and retrieval communities [3]."]} +{"17759638|9318802": ["[31]), such the ones related to temporal or frequency-based domains (e.", "[31]), or CASA (as in the works by Peltonen et al."]} +{"17759638|17574321": ["[5]), speaker recognition and identification (Kinnunen and Li [6]), and speech recognition (Pieraccini [7]), to name a few."]} +{"207178741|14287707": ["Music Information Retrieval:\nRecent Developments and Applications\nMarkus Schedl Johannes Kepler University Linz, Austria\nmarkus.schedl@jku.at\nEmilia G\u00f3mez Universitat Pompeu Fabra, Barcelona, Spain\nemilia.gomez@upf.edu\nJuli\u00e1n Urbano Universitat Pompeu Fabra, Barcelona, Spain\njulian.urbano@upf.edu\nBoston \u2014 Delft", "ISBN: 978-1-60198-807-2 c\u00a9 2014 M. Schedl , E. G\u00f3mez and J. Urbano\nAll rights reserved.", "Knees and Schedl [127], give a survey of music similarity and recommendation methods that exploit contextual data sources.", "+31-6-51115274\nThe preferred citation for this publication is\nM. Schedl , E. G\u00f3mez and J. Urbano."]} diff --git a/edge/graph_61153482.jsonl b/edge/graph_61153482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b481aa4cc801cdf6388e30f2c6253e97bc4bbff --- /dev/null +++ b/edge/graph_61153482.jsonl @@ -0,0 +1,17 @@ +{"14495955|206459491": ["In pursuit of detecting any hardware trojan embedded in a split fabricated logic block, we attempt to efficiently test every single gate in the IC for its at-speed function and performance, not possible with modern trojan detection methods [9]."]} +{"69456925|29756857": []} +{"69456925|206459491": []} +{"69517181|206459491": ["However, many emerging security vulnerabilities have come along as well, including hardware Trojans [1]\u2013[4], reverse engineering [5], [6], and"]} +{"22730712|12489337": ["Several design-for-trust countermeasures, including logic locking [7], IC camou\ufb02aging [8], and split manufacturing [9] have been developed to prevent IP piracy and reverse engineering attacks [10], [11].", "Logic locking is a gate-level technique; a design is locked by inserting additional locking circuitry post logic synthesis [11], [20], [21] as illustrated in Figure 1."]} +{"9605814|206459491": []} +{"58027689|206459491": ["at an untrusted foundry while the back-end-of-line (BEOL) is fabricated at a trusted foundry, attackers in the untrusted foundry do not have complete information to perform attacks such as Trojan insertion, piracy, and overproduction [2, 14, 21]."]} +{"14136632|206459491": ["Rogue elements in the foundry may insert malicious circuits (hardware Trojans) into the design unbeknownst to the designer [8], [9]."]} +{"1522401|206459491": ["An attacker anywhere in the IC supply chain can perform the following attacking techniques: reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property (IP) piracy [2, 4\u20137]."]} +{"214623470|61153482": ["Besides, a comprehensive overview of camou\ufb02aging is given in [24], and IP protection in general is reviewed in [25], [26]."]} +{"2130144|12489337": ["Colombier and Bossuet [35] provide a detailed discussion on protection of design data and IP with exhaustive survey of previous research into hardware protection.", "Colombier and Bossuet [35] provide a detailed discussion on"]} +{"2130144|206459491": ["Finally, the requirement of being stealthy is often more crucial in the case of obfuscation, as the adversary speci\ufb01cally tries to overcome the stealthiness, something that is not always the case for hardware Trojans.", "Second, Trojans and obfuscation have vastly different reliability requirements.", "This type of dopant manipulation has been used to create stuck-at faults and create Trojans [37].", "An attacker may want to learn the details of a security module with the goal of subsequently weakening it or inserting carefully crafted Trojans.", "While physical design obfuscation aims at protecting a design through various low level manipulations as discussed above, hardware Trojans can potentially exploit the same techniques to insert malicious functionality into a target circuit [37].", "First, Trojans have malicious intent and are therefore inserted by adversaries in the design \ufb02ow, while obfuscation is introduced by designers aiming to protect a circuit.", "More concretely, what are sometimes called parametric Trojans [64] are quite similar to the mechanisms discussed in Secs.", "Below, we brie\ufb02y discuss two related concepts, hardware Trojans and tamper protection techniques.", "There are, however, several important differences between Trojans and obfuscation."]} +{"4905071|206459491": ["It is also an attractive option for small companies that are interested to use a highend fabrication facility but do not want to give away their \u201csecret sauce\u201d, in case of concern that the untrusted foundry may attempt to steal the Intellectual Property [2, 8, 10, 13]."]} +{"5065334|15343401": []} +{"47492355|206459491": ["An attacker anywhere in the IC supply chain can perform the following attacks: reverse engineering, malicious circuit insertion, counterfeiting, and intellectual property (IP) piracy [2], [4]\u2013[8]."]} +{"1731177|206459491": ["We conclude this section with Section 4.3 with some practical considerations, specifically, scalability and layout-anonymization."]} +{"16157693|206459491": ["With this knowledge, an attacker can more efficiently mount various attacks (e.g., fault injection, sidechannel), clone/counterfeit the design possibly with hardware Trojans inserted, and discover trade secrets (e.g., proprietary algorithms, hard-coded keys and instruction sequences) [1]\u2013 [5]."]} diff --git a/edge/graph_61153541.jsonl b/edge/graph_61153541.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bc18ca0d7c0edf367fecce5af3bb97342d3e792 --- /dev/null +++ b/edge/graph_61153541.jsonl @@ -0,0 +1,26 @@ +{"17605386|3202525": ["Since latent context is unsupervised and often consists of sensor data (such as location, accelerometer data, light, etc.) which is relatively correlated, we apply autoencoding in order to discover correlations between the different features and extract them in low-dimensional representation."]} +{"4002880|1805048": ["The key idea is collaborative filtering (CF) which can be further categorized into memorybased CF and model-based CF [1, 26]."]} +{"15692622|60455": ["Web usage mining [1], also known as web log mining, aims to discover interesting and frequent user access patterns from the data derived from the interactions of users while surfing the Web."]} +{"5241136|1805048": ["CF has been shown to work well across various domains [8], and many successful web-services such as Netflix, Amazon and YouTube use CF to deliver highly personalized recommendations to their users."]} +{"700267|8125630": []} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"44944162|3102110": ["The clustering techniques used to segment markets [8,30] try to maximize the variance between groups, while minimizing the variance within groups."]} +{"3221714|1805048": ["For modeling user preferences, classical approaches either use item metadata (content based filtering, CBF; [1]), or user\u2013 item interactions (collaborative filtering, CF; [2]).", "For evaluating the preference modeling, we selected 13 models descendant of the basic CF; organized in a hierarchy (figure 1)."]} +{"58792962|8125630": []} +{"45164012|3102110": ["The development of data mining techniques has been centralized on discovering hidden data in an efficient way that is beneficial for corporate decision-makers [1, 2 ]. Sequential pattern mining is an important subject of data mining which is extensively applied in several areas [3]."]} +{"207754828|1805048": ["Traditional recommender systems mainly rely on the long-term user behavior history for recommendation, which follow the idea of collaborative filtering [8]."]} +{"44845062|1805048": []} +{"21066930|1805048": []} +{"875571|1708582": []} +{"31646335|393948": ["In general, a good representation should effectively capture the intrinsic data characteristics [Bengio et al., 2013]."]} +{"51734399|1805048": ["There has been a good deal of research over the last 20 years on how to automatically recommend things to people and a wide variety of methods have been proposed [1, 140]."]} +{"17592006|14148655": ["In conversational and critiquing based systems [6] usually only short-term goals are relevant and the item filtering process is based on explicit user constraints."]} +{"29513459|1805048": ["Recommendation is a fundamental task to enable personalized information filtering, thus to mitigate the information overload problem [34]."]} +{"3338950|1805048": ["The reader is referred to the survey papers [1,26] for a comprehensive summary of collaborative \ufb01ltering algorithms."]} +{"39108197|393948": ["In any statistical learning setting, it is known that the representation of the data has a considerable impact on performance, and that different representations can entangle different explanatory factors [3]."]} +{"21688058|14287707": ["The environment-related contexts include time (Dias and Fonseca 2013), location (Schedl et al. 2014; Cheng and Shen 2016), weather (Park et al. 2006), and hybrid contexts (Knees and Schedl 2013).", "Observation 2: Each user has different contextual preferences for music under different contexts (Knees and Schedl 2013)."]} +{"21688058|393948": ["The proposed algorithm for learning the effective embeddings of music pieces in this paper can be seen as part of the literature on dimension reduction or representation learning in general (Bengio et al. 2013)."]} +{"3332579|1805048": []} +{"5493334|14148655": ["Collaborative Filtering beyond the User-Item Matrix 3:31 by allowing them to adjust the recommendations for this user [Chen and Pu 2012]."]} +{"56098214|1805048": ["pled matrix factorization (CMF) against two CF methods: userbased CF (UBCF, which first computes user similarity by Pearson correlation on the rating matrix, then recommends relevant items to a given user according to those users who have strong relationships) [16] and item-based CF (IBCF, which first considers item similarity by Pearson correlation on the rating matrix, then recommends relevant items that have strong relationships with a given user\u2019s items of interest) [19].", "A CF algorithm [16] predicts the ratings based on a user\u2019s own and/or other users\u2019 ratings."]} +{"13540908|1805048": ["Metrics: We use two frequently used metrics, recall and AUC [21; 26], to evaluate the quality of ranking for recommendation over TSu, i.", "Metrics: we used the most widely used evaluation metric for CF problem, namely Mean Absolute Error (MAE) [26], to measure the rating prediction quality.", "In general, CF methods can be sub-divided into neighborhood-based and model-based approaches [5; 22; 26].", "Thus most CF methods, including MF, suffer from the data sparsity [26] and cold-start [9; 23] issues.", "N-CDCF: Neighborhood based CF compute similarity between users or items, which can be sub-divided into two types: user-based nearest neighbor and item-based nearest neighbor [26]."]} diff --git a/edge/graph_61153726.jsonl b/edge/graph_61153726.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..884de1822b818651603b513e2d8d34dc5607468c --- /dev/null +++ b/edge/graph_61153726.jsonl @@ -0,0 +1,7 @@ +{"698949|1607655": ["This is a common practise when, at a certain stage of safety case development, some elements remain uninstantiated or undeveloped [24]."]} +{"14134073|6327434": []} +{"111178692|17718674": []} +{"30722614|6076208": ["The automatic architectural optimization of fault-tolerant systems (also called design space exploration or exploration problem ) generally relies on component substitution i.e substituting a component by a safer version [2,3] to generate new architectures (called candidates ).", "The authors of [2,3] classify the selection and generation techniques in two main families: evolutionary-based approaches, e.g. [13,15] and constraint-based approaches, e.g. [16\u201318]."]} +{"9711111|7665100": []} +{"5154031|8575589": ["The \u201cPattern Application\u201d questions in this section are based on [13] and [14] which both survey methods and tools for pattern search and selection."]} +{"3335492|627405": ["This is because not all papers have sufficient information in title, keywords, and abstracts to conduct a proper and finegrained classification (Brereton et al. 2007), and if the purpose of the study is to capture an entire domain, developing a precise classification is close to impossible, as many publications address multiple topics, which makes a unique classification hard or even impossible.", "Automated data search, however, needs careful preparation and potentially extra test runs, as every data source has a slightly different format of the query strings, or constraints regarding the queries\u2019 length and complexity (see also the discussion in Ali and Petersen 2014, Badampudi et al. 2015; Brereton et al. 2007; Kitchenham et al. 2015)."]} diff --git a/edge/graph_6115592.jsonl b/edge/graph_6115592.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af69d5fc233a211504850c428f68bd5006b837fd --- /dev/null +++ b/edge/graph_6115592.jsonl @@ -0,0 +1,9 @@ +{"9889011|1631222": ["Moreover, the improvement achieved when going through linguistic information becomes evident [Costa-juss\u00e0 et al. 2013]."]} +{"196105552|8310135": []} +{"3475168|14074802": ["This kind of phenomena is likely to decrease the quality of an automatic linking process, because current link discovery frameworks (Nentwig et al., 2015) only support syntax-based string similarities."]} +{"35288341|12161567": ["in knowledge graphs [19], as shown in [15, 17]."]} +{"2149684|8310135": ["Nowadays, hand-crafted rules for recognizing NEs are usually implemented when no training examples are available for the domain or language to process [21]."]} +{"7725121|7983519": ["said entity as well as its type and indexes them.5 Additional SFs can be collected from different sources [2, 44]. Personnames- This index accounts for the variations in names for referencing persons [21] across languages and domains. Persons are referred to by different portions of their names. For example, the artist Beyonc\u00e9 Giselle Knowles-Carter is often referred to as Beyonc\u00e9 or Beyonc\u00e9 Knowles. "]} +{"14301767|8310135": ["AGDISTIS is related to the research area of Information Extraction [19] in general and to NED in particular."]} +{"205441326|9889011": ["Finally, most recent works on hybridization tend to involve statistical systems with linguistic knowledge (Costa-juss\u00e0 & Farr\u00fas, 2014), which seems to suggest that modern statistical MT may have a high in\ufb02uence on rule-based MT."]} +{"10955873|9889011": ["For a survey on this specific topic see Costa-juss\u00e0 and Farr\u00fas (2014)."]} diff --git a/edge/graph_6116234.jsonl b/edge/graph_6116234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85d1405e85fe09141d9db8211c56cea7f7884dc5 --- /dev/null +++ b/edge/graph_6116234.jsonl @@ -0,0 +1 @@ +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} diff --git a/edge/graph_61165811.jsonl b/edge/graph_61165811.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6116761.jsonl b/edge/graph_6116761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45cc327af84f18865a7444a1351a47de2281a5a2 --- /dev/null +++ b/edge/graph_6116761.jsonl @@ -0,0 +1,2 @@ +{"775793|10725980": ["For wind instruments , researchers designed artificial mouths to play the trumpet [1], the trombone [2] or the clarinet [3]."]} +{"1305310|9431428": ["This means that training the classifier would no longer be independent of the test data, which violates the independence assumption underlying cross-validation, a situation referred to as peeking [10].", "For conventional fMRI classification procedures, good-practice guidelines have been suggested for avoiding an optimistic bias in assessing classification performance [8,10].", "Unlike mass-univariate encoding models, these methods predict an experimental variable (e.g., a trial-specific condition or subject-specific disease state) from the activity pattern across voxels (see [6\u201310] for reviews).", "Specifically, voxels were selected on the basis of the same \u2018all auditory events\u2019 contrast as above, which is a common approach to defining a voxel-based feature space in subject-by-subject classification [11,12,10]."]} diff --git a/edge/graph_61177286.jsonl b/edge/graph_61177286.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61198061.jsonl b/edge/graph_61198061.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61201576.jsonl b/edge/graph_61201576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af5d53ac08d972c2303ac8f749987f287b5f4e49 --- /dev/null +++ b/edge/graph_61201576.jsonl @@ -0,0 +1 @@ +{"15606900|3102110": ["In recent years, data mining has become an important \ufb01eld of research [13].", "Association rule mining [2,3] is widely used to solve data mining problems in numerous applications, including \ufb01nancial analysis, the retail industry, and business decision-making [13]."]} diff --git a/edge/graph_61203442.jsonl b/edge/graph_61203442.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e03bc25eac9577de4be1ca037cd722014b0ce6f3 --- /dev/null +++ b/edge/graph_61203442.jsonl @@ -0,0 +1,3 @@ +{"16890733|9045232": ["Face detection in a single image is a challenging task because the overall appearance of faces ranges widely in scale, location, orientation and pose, as well as in facial expressions and lighting conditions [10] and [11]."]} +{"16890733|387610": []} +{"684692|9045232": ["We choose this domain because a great many pictures of interest show human faces, and also because face detection methods have begun to achieve high accuracy and efficiency [22].", "[22] surveys the numerous methods proposed for face detection."]} diff --git a/edge/graph_61203509.jsonl b/edge/graph_61203509.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fd6fe5aa78a271e758bbd98940c1d16db46b06d --- /dev/null +++ b/edge/graph_61203509.jsonl @@ -0,0 +1 @@ +{"15436006|10334828": []} diff --git a/edge/graph_61203603.jsonl b/edge/graph_61203603.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61231876.jsonl b/edge/graph_61231876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd18466c3c3b4fac059f7b51b343a6177753366a --- /dev/null +++ b/edge/graph_61231876.jsonl @@ -0,0 +1,2 @@ +{"8569003|33208891": ["He rather sees the value of the concept of information literacy as a strategic concept (Mutch, 1996; 1997; Bawden, 2001).", "However, despite of the continuous concern about the term since 1990s, information literacy is still the most commonly used phrase to describe the concept (Bawden, 2001).", "hyper-literacy); digital literacy (digital information literacy); informacy (Bawden, 2001).", "A paper from Bawden (2001) entitled", "It must subsume all the skill-based literacies, but cannot be restricted to them, nor can it be restricted to any particular technology or set of technologies, and understanding, meaning and context must be central to it (Bawden, 2001; Bawden & Robinson, 2001)."]} +{"29191786|33208891": ["Alternative terms with similar scope used more recently include information competence and information skills, as well as other forms of literacy, such as digital literacy and media literacy (Bawden, 2001; Clay et al., 2000; Webb and Powis, 2004; Williams, 2006)."]} diff --git a/edge/graph_61238909.jsonl b/edge/graph_61238909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c64df6bdb532474b01e698ad0380ba7d6ec91b9 --- /dev/null +++ b/edge/graph_61238909.jsonl @@ -0,0 +1,8 @@ +{"11592349|1634674": ["We build liberally upon theoretical thrusts from several different disciplines, including Analytical Hamiltonian Mechanics and human activity recognition [1], especially for multiple activities [2]."]} +{"14315214|1634674": ["In terms of human activity recognition [26], some of the cutting edge research uses the fusion of multiple features (e."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"5719732|1634674": ["Most work in activity recognition [11] deals with actions of individuals (walking, running, waving, hugging, shaking hands, etc."]} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"2857532|53680608": []} +{"1318877|7788290": ["Predominately, the recognition of individual actions [29], or interaction involving few people [25, 11] has been investigated using visual features [ 12 , 11, 25, 29, 32], although some work on the speech community can also be categorized as interaction recognition [10, 31]."]} diff --git a/edge/graph_61239939.jsonl b/edge/graph_61239939.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67b62c1b5deeff8a6f194a478b2a227a9a7d60d7 --- /dev/null +++ b/edge/graph_61239939.jsonl @@ -0,0 +1 @@ +{"17027118|15219853": ["The main purpose and major contributions of this paper are summarized as follows: \u2022 We address the problem of unintended side-effects of inconsistent experimental conditions and environmental variables by restricting users\u2019 mouse operations to a tightly-controlled environment."]} diff --git a/edge/graph_61242386.jsonl b/edge/graph_61242386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61248451.jsonl b/edge/graph_61248451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61257707.jsonl b/edge/graph_61257707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61259387.jsonl b/edge/graph_61259387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6127042.jsonl b/edge/graph_6127042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f488b02e9338ef2a7d4293b633a549a6a90b48e --- /dev/null +++ b/edge/graph_6127042.jsonl @@ -0,0 +1,6 @@ +{"4325516|206986719": []} +{"335699|8914588": []} +{"11675664|5401262": ["On the other, while some surveys on different AmI topics have been published (Cook and Das 2007; Pantic et al. 2006; Jiang et al. 2004), a survey relating learning skills to AmI environments is not available."]} +{"10748412|7834819": ["The waist was selected as it has been found to be a suitable position for accelerometer-based fall detection [26]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} diff --git a/edge/graph_61277674.jsonl b/edge/graph_61277674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6128186.jsonl b/edge/graph_6128186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61281996.jsonl b/edge/graph_61281996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c10de598d562dea5f57b59f500bfc2c87958896 --- /dev/null +++ b/edge/graph_61281996.jsonl @@ -0,0 +1 @@ +{"15296264|3102110": []} diff --git a/edge/graph_6128350.jsonl b/edge/graph_6128350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61287006.jsonl b/edge/graph_61287006.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61287544.jsonl b/edge/graph_61287544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..061d412a63bed9278ab468b4c83dc1ea27f6eb72 --- /dev/null +++ b/edge/graph_61287544.jsonl @@ -0,0 +1 @@ +{"206724958|11739876": []} diff --git a/edge/graph_61325403.jsonl b/edge/graph_61325403.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73aeb97637146f8cdf098888103332e8e6cf859a --- /dev/null +++ b/edge/graph_61325403.jsonl @@ -0,0 +1 @@ +{"5316537|8125630": []} diff --git a/edge/graph_61333416.jsonl b/edge/graph_61333416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61360624.jsonl b/edge/graph_61360624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61373297.jsonl b/edge/graph_61373297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adee8708f7c445abaa1cf77b544bf69d63b0225c --- /dev/null +++ b/edge/graph_61373297.jsonl @@ -0,0 +1 @@ +{"109080689|8953108": []} diff --git a/edge/graph_6137971.jsonl b/edge/graph_6137971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..547c4fb69eccf10f5d3b09b3dc156d9e37b5dbba --- /dev/null +++ b/edge/graph_6137971.jsonl @@ -0,0 +1 @@ +{"122523543|33286487": []} diff --git a/edge/graph_61395864.jsonl b/edge/graph_61395864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61406577.jsonl b/edge/graph_61406577.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61430119.jsonl b/edge/graph_61430119.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61451747.jsonl b/edge/graph_61451747.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ba13000f4a7a10d4dfd1653a0c941c9407e770f --- /dev/null +++ b/edge/graph_61451747.jsonl @@ -0,0 +1,4 @@ +{"195707933|192934": ["Furthermore, we are interesting in developing computable features for mid-level and high-level information, as an inter-dependent multi-level analysis is envisaged."]} +{"346195|11239740": ["However, it is widely recognized that histogram based [3], [4], [6] and feature based approaches offer some of the best results.", "Intensity histograms or color histograms have been used for shot boundary detection in [3], [4], [5], [6]."]} +{"911392|11239740": ["The method is proven to detect both fades and abrupt cuts very effectively."]} +{"36581971|11239740": ["Ahanger et al. [ 20 ] surveyed the field of video indexing without evaluating or characterizing particular algorithms."]} diff --git a/edge/graph_614770.jsonl b/edge/graph_614770.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61487445.jsonl b/edge/graph_61487445.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..157fedecebe6b1b223c78079bda4b491e6f52457 --- /dev/null +++ b/edge/graph_61487445.jsonl @@ -0,0 +1,2 @@ +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} diff --git a/edge/graph_61492705.jsonl b/edge/graph_61492705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2acd572f47a738519ea901b122beb7192e48e60 --- /dev/null +++ b/edge/graph_61492705.jsonl @@ -0,0 +1 @@ +{"14532650|206742377": ["The latter studies computational processing of natural languages such as the translation theory (Weaver, 1949; Crystal, 1987) and information retrieval techniques (Chang et al., 2006; Zhao & Sui, 2008; Reisinger & Pasca, 2009; Hu et al., 2010)."]} diff --git a/edge/graph_61506792.jsonl b/edge/graph_61506792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61508000.jsonl b/edge/graph_61508000.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b440b5690aac1dd5da2b7f057776f88dee877c28 --- /dev/null +++ b/edge/graph_61508000.jsonl @@ -0,0 +1,2 @@ +{"18411530|6430931": []} +{"5917935|17623572": ["A number of solutions to handle the black hole attack have been proposed in [3]."]} diff --git a/edge/graph_6151382.jsonl b/edge/graph_6151382.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae43a3a71698445c48187633180c43693a8012b4 --- /dev/null +++ b/edge/graph_6151382.jsonl @@ -0,0 +1 @@ +{"15234282|534755": ["(see e.g. De Jong, 2002)."]} diff --git a/edge/graph_61520978.jsonl b/edge/graph_61520978.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61524250.jsonl b/edge/graph_61524250.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..050d42516ba4bba13bc89828f388092307416fa1 --- /dev/null +++ b/edge/graph_61524250.jsonl @@ -0,0 +1 @@ +{"1027180|14441987": []} diff --git a/edge/graph_61526720.jsonl b/edge/graph_61526720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61527373.jsonl b/edge/graph_61527373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6153516.jsonl b/edge/graph_6153516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69da2f44a7b09b67476e80ab8d838c468954849c --- /dev/null +++ b/edge/graph_6153516.jsonl @@ -0,0 +1 @@ +{"9614092|1517662": ["Some systems contain discontinuities (for example, the process model might be jump-linear [14], in which the parameters can change abruptly, or the sensor might return highly quantized sensor measurements [15]), others have singularities (for example, perspective projection equations [16]), and in others the states themselves are inherently discrete (e.g., a rule-based system for predicting the evasive behavior of a piloted aircraft [ 17 ])."]} diff --git a/edge/graph_6154906.jsonl b/edge/graph_6154906.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6155039.jsonl b/edge/graph_6155039.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c5a16ab2c11bbb1e96d4b270efb76393b662158 --- /dev/null +++ b/edge/graph_6155039.jsonl @@ -0,0 +1,3 @@ +{"7577068|8364569": []} +{"1487533|7971188": ["Peer-to-peer networks are broadly categorized as structured and unstructured [51], where both categories are used by botnets, and are studied in previous work [31], [30], [52]."]} +{"6203284|7360895": ["\u2026and independent business, (4) the security of socially-aware systems that use or integrate OSN platforms can be at risk, given the infiltration capability of an adversary in OSNs, and (5) defending against malicious socialbots raises a set of challenges that relate to web automation,\u2026"]} diff --git a/edge/graph_61564322.jsonl b/edge/graph_61564322.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61587620.jsonl b/edge/graph_61587620.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6159806.jsonl b/edge/graph_6159806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f588e656f5a862fb010c6743341b1be0ff40bc3f --- /dev/null +++ b/edge/graph_6159806.jsonl @@ -0,0 +1 @@ +{"26809188|116542": ["Those Web services may be provided by different provider and may be developed seperately, and they may be not consistent in data type presentation, security policy, content, etc [5][ 6 ]."]} diff --git a/edge/graph_61605250.jsonl b/edge/graph_61605250.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61605320.jsonl b/edge/graph_61605320.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61607881.jsonl b/edge/graph_61607881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6160886.jsonl b/edge/graph_6160886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af6d688407dbbb16c0315508af8b156cf1797dc4 --- /dev/null +++ b/edge/graph_6160886.jsonl @@ -0,0 +1,20 @@ +{"26511368|24847": []} +{"26511368|17183431": []} +{"981595|2798946": ["In the area of multi-agent systems, such phenomena of self-organization have been extensively studied and pioneered [41]."]} +{"17573078|14697846": [", along the lines promoted in P2P computing by content-addressable networks [13])."]} +{"6474983|16815953": []} +{"6474983|2018781": ["Despite the research results made in the context of service-oriented models and techniques, there is still a need for new techniques and approaches for RE activities [2,4]."]} +{"207399351|10464056": ["The reader is referred to [162] for further information on designing SASs using control engineering."]} +{"207399351|17183431": ["Nature-inspired systems may bring certain benefits such as spatiality, self-adaptability, and openness [180]."]} +{"207399351|8914588": []} +{"207399351|1975139": ["A comparison of ADLs can be found in [105]."]} +{"1639892|12715779": ["That is, they do not account for the fact that users, other than simply consumers or producers of services, are integral components of the overall infrastructure, and contribute to it via human sensing, actuating, and computing capabilities [15]."]} +{"13953806|17183431": [", the fields within) according to a set of coordination rules [Zambonelli and Viroli 2011] (see below).", "Among the others, some recent proposals absorb concepts from selforganizing and self-adaptive natural systems [Omicini 2012; Zambonelli and Viroli 2011]."]} +{"13953806|206583375": ["The system is assumed to be able to localize users within the museum [Gu et al. 2009]."]} +{"17183431|12715779": ["\u2026sense to better interact with the surrounding world (Langlotz et al., 2011), and, in it, to act, exchange information, socialize, or be involved in participatory coordinated activities (e.g. for contributing with sensing, computing, and physical capabilities (Yuen et al., 2009; Zambonelli, 2011)."]} +{"17183431|14697846": ["In this context, the algorithmic tools to achieve such dynamic spatial relations can be effectively inspired by recent works in the area of spatially structured overlay networks (Androutsellis-Theotokis and Spinellis, 2004)."]} +{"35770354|6974127": ["A review of autonomic system architectures, characteristics and challenges has been provided in [31].", "problems and challenges in achieving autonomicity in systems [31], [34], [42]."]} +{"113042569|15619069": []} +{"14126766|1113420": ["Baldauf, Dustdar, and Rosenberg (2007) suggested the abstract layer architecture for context-aware systems and introduced various existent middleware and serverbased approaches to ease the development of context-aware applications , where each layer is explained based on various research."]} +{"14626464|1975139": ["\u2022 Builds on existing work \u2013 there is a wealth of architecture description languages and notations which include some support for dynamic architectures and for formal architecture-based analysis and reasoning [12]."]} +{"61985512|562855": []} diff --git a/edge/graph_61609486.jsonl b/edge/graph_61609486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_616187.jsonl b/edge/graph_616187.jsonl similarity index 100% rename from graph_616187.jsonl rename to edge/graph_616187.jsonl diff --git a/edge/graph_61647869.jsonl b/edge/graph_61647869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6167160.jsonl b/edge/graph_6167160.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ad70206c14d5ece8d76e77a91043b56b72809558 --- /dev/null +++ b/edge/graph_6167160.jsonl @@ -0,0 +1 @@ +{"22240551|11988348": ["A number of studies have been commissioned by the United Nations and these studies present a rich ground for mining data (Lee and Siau, 2001)."]} diff --git a/edge/graph_61680006.jsonl b/edge/graph_61680006.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34f200c339a0695bd9d71d84d5b19fb6fc78bbe3 --- /dev/null +++ b/edge/graph_61680006.jsonl @@ -0,0 +1 @@ +{"67142715|1805048": []} diff --git a/edge/graph_61685865.jsonl b/edge/graph_61685865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61690198.jsonl b/edge/graph_61690198.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d504656900dae9f4ab4e652aec58712c76dbf7f9 --- /dev/null +++ b/edge/graph_61690198.jsonl @@ -0,0 +1 @@ +{"45576500|1230643": ["ANY applications for wireless sensor networks (WSN) have been introduced in recent years and extensive research on its effective exploitation is currently going on. Such applications include monitoring environmental conditions like temperatureandhumidity,vehicularmovements,pressure,presence or absence of certain objects, intrusion detection, biomedical monitoring, etc., [ 1 ], [2]."]} diff --git a/edge/graph_61700470.jsonl b/edge/graph_61700470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9559c85ccb6a36d14c7b8bc3742008e4804211db --- /dev/null +++ b/edge/graph_61700470.jsonl @@ -0,0 +1 @@ +{"145068426|33208891": ["David Bawden [30], in his review of definitions of digital literacies, notes that definitions of IL are variable and multifaceted.", "We can summarize the gist of the IL debate with Bawden\u2019s [30, p. 251] notion that skill-based lists and definitions of IL are useful for limited purposes but too restrictive overall."]} diff --git a/edge/graph_61714879.jsonl b/edge/graph_61714879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61723885.jsonl b/edge/graph_61723885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3bd21352d5e3d372d2f70c1577958d08eef32ea --- /dev/null +++ b/edge/graph_61723885.jsonl @@ -0,0 +1 @@ +{"24114019|206051485": ["The existing automatic image registration techniques fall into two categories: the intensity-based and the feature-based methods [24]."]} diff --git a/edge/graph_61725840.jsonl b/edge/graph_61725840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61727809.jsonl b/edge/graph_61727809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61756263.jsonl b/edge/graph_61756263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61759998.jsonl b/edge/graph_61759998.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61765330.jsonl b/edge/graph_61765330.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61767550.jsonl b/edge/graph_61767550.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61770335.jsonl b/edge/graph_61770335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61771092.jsonl b/edge/graph_61771092.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca2635af5a5e1da40bc4d7d65c8ab969a1110561 --- /dev/null +++ b/edge/graph_61771092.jsonl @@ -0,0 +1,2 @@ +{"12173798|61771092": ["INTRODUCTION Blur estimation is a technique that can be used for many practical applications, such as super resolution [10], image restoration, turbulence mitigation [8][9], quantification [3], deblurring and autofocus [16]."]} +{"55090331|61771092": ["REFERENCES\n[1] Roggeman, M. and Welsh, B., \u201cImaging through turbulence,\u201d CRC Press, Boca Raton, USA (1996).", "According to Roggeman and Welsh [1, 2] there are the different approaches to compensate for turbulence effects in images: 1) adaptive optics techniques, 2) post-processing techniques and 3) a combination of both techniques.", "According to Roggeman and Welsh [1, 2] there are th e different approaches to compensate for turbulen ce effects in images: 1) adaptive optics techniques, 2) post-proc essing techniques and 3) a combination of both tech niques."]} diff --git a/edge/graph_6177735.jsonl b/edge/graph_6177735.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_617887.jsonl b/edge/graph_617887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61792398.jsonl b/edge/graph_61792398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61796894.jsonl b/edge/graph_61796894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18e1e334a37e0898d1cd37501ae86991e5157b88 --- /dev/null +++ b/edge/graph_61796894.jsonl @@ -0,0 +1,2 @@ +{"12875896|6555395": ["The first one concerns the implementation of standard PCA for crisp data using a neural network [2], [3], [8].", "Although such a general solution may have some advantages in terms of robustness from the information compression viewpoint [3], the internal representations produced are not directly usable in data analysis because the scaling of the hidden layer activities is completely arbitrary.", "Further results were obtained by Baldi and Hornik [2], [3], who provided a complete description of the error surfaces of multilayer linear networks (of which autoassociative networks with one hidden layer are a special case)."]} +{"59451133|1850236": ["Studies of AGV design and control [22, 23] point out that a new generation of AGV will be necessary to handle tasks in various industrial applications in years to come."]} diff --git a/edge/graph_61798996.jsonl b/edge/graph_61798996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6180052.jsonl b/edge/graph_6180052.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61805911.jsonl b/edge/graph_61805911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..329fb6aefa5c972a1b4c00053fe613addae139db --- /dev/null +++ b/edge/graph_61805911.jsonl @@ -0,0 +1,4 @@ +{"388276|44956948": ["Source: Adapted from [Raghupathi & Raghupathi, [9]]."]} +{"3632860|55729907": []} +{"3632860|6332923": []} +{"3632860|20905429": []} diff --git a/edge/graph_61806265.jsonl b/edge/graph_61806265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8efe90172b197196e295e8aab19e6a7cad8dbcd9 --- /dev/null +++ b/edge/graph_61806265.jsonl @@ -0,0 +1,64 @@ +{"27408709|3348390": []} +{"21433060|14247248": ["[9] D.", "In this regard, many wireless communications technologies can be leveraged in IoT, such as Bluetooth, Zigbee, LTE, infrared, massive multiple-input multiple-output (MIMO), WiFi, general packet radio service (GPRS), and narrowband IoT communications [8, 9]."]} +{"2220499|7329149": []} +{"2220499|1598350": ["T HE INTERNET of Things (IoT) [1] has become popular over the past decade."]} +{"3656886|4427557": ["This research differs from other LPWA-focused surveys [6, 7, 8, 9, 10, 11, 12, 13, 14] in that the scope of LPWA has been broadened to include incoming cellular-based technologies, namely NB-IoT and EC-GSM-IoT, as well as proprietary solutions, and in that a more detailed direct comparison of the\u2026", "However, for more time-critical monitoring and metering applications such as wireless industrial control, LPWA technologies cannot guarantee the availability and latency required for the necessary performance [9].", "However, it also decreases the data rate [9].", "LPWA technologies are characterised by their focus on energy ef\ufb01ciency, scalability, and coverage [9]."]} +{"3656886|19636511": []} +{"6502061|7329149": []} +{"6502061|1598350": []} +{"6502061|206901977": ["Regarding greenWSN, the following techniques should be adopted [7], [9], [29], [30]: 1) Make sensor nodes only work when necessary, while spending the rest of their lifetime in a sleep mode to save energy consumption; 2) Energy depletion (e."]} +{"6502061|16335158": ["OVERVIEW OF SENSOR-CLOUD Defined by IntelliSys,1 sensor-cloud is \u2018\u2018an infrastructure that allows truly pervasive computation using sensors as an interface between physical and cyber worlds, the datacompute clusters as the cyber backbone and the internet as the communication medium\u2019\u2019 [13], [14].", "Attracting increasing interest from both academic and industrial communities, sensor-cloud [13], [14], [53] is actually a new paradigm, motivated by complementing 1) the ubiquitous data sensing and data gathering capabilities of WSNs as well as 2) the powerful data storage and data processing abilities of CC.", "With sensor-cloud integration, there are many favorable advantages [13], [14], benefiting the users and the WSN as well as the cloud.", "With that, towards green IoT, we review the latest developments in sensor-cloud [13], [14] which is a novel paradigm in green IoT, and further envision the future sensor-cloud.", "com/system-overview powerful cloud computing technologies to provide excellent data scalability, rapid visualization, and user programmable analysis\u2019\u2019 [13], [14]."]} +{"6502061|14650419": []} +{"6502061|2357830": ["\u2022 RFID (radio-frequency identification) [16]: a small electronic device that consists of a small chip and an antenna, automatically identifying and tracking tags attached to objects."]} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} +{"3350771|6583734": ["high-data-rate services (such as video service) and low-datarate services (such as meter reading service) [4]."]} +{"3350771|25929315": ["Researches generally set service arrival process as a homogeneous/compound Poisson process or an independent Bernoulli process [41] with identical distribution [40] and retransmission user number and packet retransmission number at queue head or channel state (busy/idle) in a certain time slot as state variables to obtain a stabilized design scheme [42] on the premise of completing the multi-channel S-ALOHA steady-state performance analysis [43], [44].", "In order to solve the overload of LTE access network when a large number of MTC terminals enter network simultaneously, researchers focused analyses on the load pressure of LTE RACH and its overload control mechanisms, such as classified controlled access, exclusive RACH resources, dynamic RACH resources allocation, exclusive backoff mechanism, time division access and active paging mechanism [19], [40]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"9921528|1230643": ["Currently, researches on the basic theories and system models of WSN (Wireless Sensor Networks) are not perfect, especially due to lack of a set of WSN models that can accurately reveal WSN characteristics [1]."]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"45326077|15449163": []} +{"30111820|1230643": ["The purpose of all these nodes is to monitor the required data and send them to a base station which is in a remote place [1]."]} +{"19553309|4427557": ["other hand, Low Power Wide Area (LPWA) networks present a good candidate to support the aforementioned diverse requirements of the IoT framework [12]\u2013[14]."]} +{"19553309|25929315": ["The reader is encouraged to refer to [48]\u2013[51] for more details about the higher layer challenges and solution for M2M devices from 3GPP perspective."]} +{"8237520|7644489": ["thus alleviating congestion, and consequently benefiting other non-D2D users as well [5].", "Second, it is more resourceefficient for proximal devices to communicate directly than routing through an involved BS and possibly core network [5].", "Stimulated by the emerging IoT market, the cellular providers are introducing IoT functionalities into their networks [4], [5]."]} +{"16986437|18594141": []} +{"16986437|1230643": ["The IEEE 802.11ac is an improved version of the IEEE 802.11n, and it provides high throughput wireless local area networks (WLANs) in the 5 GHz band with more spatial streams and higher modulation with MIMO yielding data rates up to 433.33 Mbps [12]."]} +{"110253264|1236072": ["Some of them deal with saving energy at MAC (Media Access Control) level [7], [8], [9], others at routing protocols [10], [11], [12], third with dissemination data aggregations or fusion [13], [14], fourth with involving novel architectures that utilize the optimized radio and digital parts [15], [16], [17], fifth employ on-chip power gating in order to reduce the static power loss [18], [19]."]} +{"46758326|8909218": ["Recent studies show that 80% of IoT communication takes place indoors and 20% outdoors [12], [35]."]} +{"28144422|25929315": ["of these transmissions successfully and hence does not send any response to the corresponding UEs [2], [5].", "MTC has diversified applications such as e-health, power grid, intelligent transport system and Internet of things (IoTs) [1], [2]."]} +{"3494096|3474164": []} +{"3494096|24110634": []} +{"3494096|4427557": []} +{"3494096|2871699": ["M2M communications have been extensively reviewed in the literature [1], [31]\u2013[36].", "Pereira and Aguiar [31] discussed on European Telecommunication Standard Institute (ETSI) standard and application protocols while considering mobile devices such as smartphones to be used as mobile gateways for other connected devices with constrained capabilities and the process of aggregating data from embedded sensors in M2M network architecture."]} +{"3494096|2521001": ["Smart homes are expected to communicate regularly with their environments (internal and external) [17]."]} +{"3494096|121289": []} +{"3419623|4427557": ["In [11], the LPWA standards and proprietary LPWA technologies, as well as the challenges and", ", LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "For LPWA networks, most\nof the existing solutions, e.g., LoRaWAN (Long Range Wide Area Network) [11] only define the PHY and MAC mechanisms and the higher layer protocols are not directly supported.", "The Table also lists the applications (provided in [11] and [89]) that can be supported by each technology."]} +{"3419623|19636511": ["The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14].", "Weightless-N, Weightless-P, and Amber Wireless as mentioned in [14]."]} +{"3419623|25929315": ["M2M communication RA is limited, and the large number of simultaneous network access attempts may result in high collision rate [13].", "The cellular-based M2M solutions are surveyed in [2], [4], [13], and [14]."]} +{"206442285|25929315": ["The above rule (4) of joint ToA and residual CFO estimation is intuitive.", "Note that the estimation rule (4) takes the form of a two-dimensional (2-D) discrete-time Fourier transform that can be implemented by a 2-D FFT."]} +{"46936408|17109970": ["Energy-efficient communication becomes an emerging technology, since most of wireless sensors and actuators in CPIoTS are battery powered and thus are fundamentally constrained by the energy due to the limited battery capacity and charging facilities [12]."]} +{"9651858|16378550": ["Various aspects of D2D communication have been addressed in [76]."]} +{"9651858|10979806": ["For various such approaches, the state-of-the-art has been provided in [30] and [32].", "Extensive surveys for enhancing energy efficiency and driving the ICT towards green communication have been studied in [29]\u2013[32] and [34]."]} +{"9651858|19938676": ["The vision of an intensely connected network has been proposed in [33].", "A detailed survey on 5G networks has been presented in [33]."]} +{"9651858|206576720": []} +{"9651858|14765802": ["Various techniques incorporating the sleep mode in base stations have been surveyed in [45]."]} +{"9651858|12029139": ["The deployment of EH networks needminute examining of the hardware devices required [22]."]} +{"9651858|7644489": ["It plays a critical role in enhancing the energy efficiency and spectral efficiency [75] of the cellular networks."]} +{"9651858|7686677": ["ciency of wireless networks have been presented in [29].", "Extensive surveys for enhancing energy efficiency and driving the ICT towards green communication have been studied in [29]\u2013[32] and [34]."]} +{"9651858|17109970": ["niques have been studied in the literature, which are capable of optimizing the energy efficiency [13]\u2013[17], through optimal energy saving."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"1862633|14650419": []} +{"1862633|2357830": ["Objects in an IoT must be able to communicate and exchange data with each other autonomously (Juels 2006; Mitrokotsa et al. 2013).", "For example, Juels proposed the method of \u201cblock tag\u2019 to prevent the unauthorized tracing (Juels 2006)."]} +{"49191930|4427557": ["In contrast, low power wide area (LPWA) networks are perfectly suitable for the IoT applications that only need to transmit tiny amounts of information in the long range [15] as shown in Fig."]} +{"206491434|6664074": ["Similarly, a number of operating systems (OSs) have gradually been developed to run these tiny sensors [7].", "provided a detailed analysis of various requirements to satisfy low-end IoT devices [7].", ", high-end IoT devices and low-end IoT devices [7]."]} +{"206491434|17713112": ["surveyed wireless sensor network (WSN) deployments and analyzed the collected data to study the design rules for a WSN OS using 40 deployment scenarios [48]."]} +{"206491434|17683338": ["[100] P. Gonizzi, P. Medagliani, G. Ferrari, and J. Leguay, \u2018\u2018RAWMAC: A routing aware wave-based MAC protocol for WSNs,\u2019\u2019 in Proc.", "Another OS called LiveOS was introduced to conserve memory and energy for a WSN [53].", "Available: https://github.com/iot-lab/iot-lab/wiki/Libraries [131] A. Schoofs, M. Aoun, P. van der Stok, J. Catalano, R. S. Oliver, and G. Fohler, \u2018\u2018A framework for time-controlled and portable WSN applications,\u2019\u2019 in Sensor Applications, Experimentation, and Logistics (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).", "Over the years, various OSs have emerged in the WSN community.", "TinyOSOpportunistic Routing Protocol (TORP) forWSNs is designed to conserve energy by implementing an efficient forwarding mechanism [118].", "Dariz et al. compared Contiki and TinyOS with a real-time OS named ChibiOS to study the safety-relevant application in a WSN [52].", "Farooq and Kunz highlighted major challenges for an OS design, and identified the advantages and limitations in an OS for a WSN [51].", "Strazdins et al. surveyed wireless sensor network (WSN) deployments and analyzed the collected data to study the design rules for a WSN OS using 40 deployment scenarios [48].", "Deployments from 2002 to 2011 are reviewed to study different WSN applications, including environmental monitoring, animal monitoring, human-centric applications, infrastructure monitoring, smart buildings, and military applications.", "(EWSN), Trento, Italy, Feb. 2012, pp. 1\u20132."]} +{"14827877|485843": ["IoT can be widely applied in many fields [1] such as logistics [21], healthcare [5], and energy [15] in the wide scopes of home, community, city, and country [12]."]} diff --git a/edge/graph_61809190.jsonl b/edge/graph_61809190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c312f9f492dcc5b26cdb9b31b7b0a21d0144e69d --- /dev/null +++ b/edge/graph_61809190.jsonl @@ -0,0 +1,55 @@ +{"2986694|4631990": ["Home automation systems are focused on improving the interaction with devices and appliances typically found indoors [3\u20135]."]} +{"53304340|49574823": ["\u2026home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security issues can pose risks for human safety\u2026"]} +{"53304340|46973566": ["\u2026are present in numerous environments, such as in agriculture [5], home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in\u2026"]} +{"53304340|4625011": ["\u2026[6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security issues can pose risks for human safety and privacy [21]."]} +{"53304340|3579945": ["Nowadays, IoT devices are present in numerous environments, such as in agriculture [5], home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality\u2026"]} +{"53304340|13991708": ["\u2026such as in agriculture [5], home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security\u2026"]} +{"53304340|3434731": ["\u2026home automation [6,7], transportation [8], telemetry [9,10], Industry 4.0 [11,12], defense and public safety [13], blockchain-based applications [14,15], energy-ef\ufb01ciency applications [16,17], augmented reality [18,19] or in healthcare [20], where security issues can pose risks for human safety\u2026"]} +{"3579945|30518875": ["Satellites are used for both locating trains (aided by Global Navigation Satellite Systems (GNSS) systems [21], like GPS, the European GALILEO, the Russian GLONASS or the Chinese BEIDOU) and communicating with the wayside equipment."]} +{"3579945|13991708": ["\u2026advances in electronics, networking, and robotics, it is feasible to develop advanced sensor systems for different sectors and applications: energy ef\ufb01ciency [32], Industry 4.0 [33,34], home automation [35], public safety and defense [36,37], precision agriculture [38] or transportation [39].", "Furthermore, Wireless Sensor Networks (WSNs) have evolved into an integral part of the protection of mission-critical infrastructures [36]."]} +{"3579945|6878121": ["IEEE 802.11p [15] may be an option if high data rates are not required."]} +{"3579945|22833814": ["Furthermore, in the case of high-speed scenarios, Wang et al. [9] present a survey on channel measurements and models."]} +{"3579945|10744611": ["Two major families of technologies may be considered [19,20]: \u2022 Satellite solutions."]} +{"3579945|17905276": ["WSN-based condition monitoring for the rail industry is the object of the survey presented in [87]."]} +{"3579945|860072": []} +{"49574823|4625011": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|3579945": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|13991708": ["3 billion by 2021), which may be related to a broad spectrum of applications like home automation [3], transportation [4], defense and public safety [5], wearables [6] or augmented reality [7], [8]."]} +{"49574823|25206420": ["Another possible solution for preserving privacy is the use of homomorphic encryption [181], [182]."]} +{"49574823|3434731": ["architecture for supporting blockchain and blockchainless DAG IoT applications [86]."]} +{"115684784|49574823": ["Blockchain can be considered to be still under development in many aspects [52,114], but some of its applications for \ufb01elds where trust is a necessity to interact with third-parties have been already studied [115\u2013119].", "Due to the expected impact of blockchain and smart contracts on future IoT devices [52,54], Figure 3 shows a speci\ufb01c blockchain module associated to the storage subsystem.", "Although it is not essential for the basic functioning of a smart clothing system, it enables different useful features like redundancy, data security and trustworthiness [52].", "\u2022 A communications gateway that exchanges information with the smart garments in order to send it through the Internet or an internal LAN to remote services provided, for instance, by cloud servers or a blockchain [52]."]} +{"115684784|44147498": ["Similarly, Radio-Frequency IDentification (RFID) and Near Field Communication (NFC) tags attached to objects can be read from a certain distance through a reader embedded into a smart garment [73]."]} +{"115684784|46973566": []} +{"115684784|49472839": ["The sensor subsystem may be composed by several types of sensors that can monitor diverse phenomena or events from the surrounding environment [35,51,59,60]."]} +{"115684784|4625011": ["\u2026IoT and wearables, when coupled with advances in 5G communication networks for device-to-device communications [16], virtual/augmented reality [17,18], cyber-physical systems [19], Arti\ufb01cial Intelligence (AI) [20] and smart textiles [21], can bring human-to-human and human-to-machine\u2026"]} +{"115684784|3579945": ["The Internet of Things (IoT) is already unlocking the bene\ufb01ts of the data economy in numerous industries like healthcare [5], agriculture [6], manufacturing [7], home automation [8\u201310], transportation [11], energy [12,13], emergency management or defense and public safety [14,15]."]} +{"115684784|18303304": ["The sensor subsystem may be composed by several types of sensors that can monitor diverse phenomena or events from the surrounding environment [35,51,59,60]."]} +{"115684784|13991708": ["The Internet of Things (IoT) is already unlocking the bene\ufb01ts of the data economy in numerous industries like healthcare [5], agriculture [6], manufacturing [7], home automation [8\u201310], transportation [11], energy [12,13], emergency management or defense and public safety [14,15]."]} +{"115684784|30383344": ["It is also important to note that most architectures divide the previously mentioned components into three layers [55]: \u2022 Body Area Network (BAN)."]} +{"115684784|469744": ["\u2026was actually not developed until the early 1990s: \ufb01rst empirically by Caudell and Mizell [30], from Boeing, who presented a head-up see-through display used to augment the visual \ufb01eld of an operator with information related to the task she/he was carrying out, and then theoretically by Azuma [31]."]} +{"115684784|3494096": []} +{"115684784|206583375": ["There are other technologies that enable positioning a smart garment, like traditional cameras, infrared systems [101], ultrasounds [102], UWB [103] or inertial navigation systems [104]."]} +{"49343495|34643772": []} +{"53099546|9352595": ["Federated Identity Management (FIM) is the most used solution to overcome these issues; especially the cross-domain issues [2], [4], [5].", "This approach simplifies the user experience by using cross-domain Single Sign-On features [5], and reduces the costs of administrating user accounts [4]."]} +{"206717171|1598350": []} +{"46894900|36400013": ["Past studies have suggested different approaches to this problem and concluded that the most efficient solution consists of a distributed network of trusted validators [2]."]} +{"23424265|19938676": ["It is assumed that 5G networks should meet the following six requirements: larger system capacity, higher data rate, lower end-to-end latency, ubiquitous connectivity, reduced energy consumption, and consistent quality of experience [7]."]} +{"23424265|4395259": ["Fortunately, in recent years the concept of physical layer security (PLS) [15], which is agnostic to the system infrastructures and RATs, has shown great potential in providing information-theoretically unbreakable secrecy.", "Up to now, a great number of secure relay transmission strategies based on the concept of PLS have been\nproposed [23]\u2013[27].", "The core idea of PLS is utilizing the inherent randomness and difference of wireless channels to keep the confidential message secure from eavesdroppers, regardless of their computing capabilities.", "Based on the celebrated theoretical analyses of PLS [16], [17], a serial of transmission strategies have been proposed, such as cooperative relay transmission [18], artificial noise [19], secure beamforming [20], and noise aggregation [21]."]} +{"3300016|3579945": []} +{"3300016|13991708": ["Basic Requirements for IoT Devices IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [10,11], smart cities [12], defense [13,14] and high-security applications [15\u201317], precision agriculture [18], transportation [19\u201321] or Industry 4."]} +{"3300016|21386749": ["Basic Requirements for IoT Devices IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [10,11], smart cities [12], defense [13,14] and high-security applications [15\u201317], precision agriculture [18], transportation [19\u201321] or Industry 4."]} +{"13369233|7774517": ["Data outliers are the sensor readings that do not follow the normal pattern of sensor data in IoT systems, namely, deviate dramatically from the ground truth [5]."]} +{"113782375|5822166": []} +{"70119448|49574823": ["Blockchain and smart contracts [15]: Ethereum."]} +{"70119448|13765327": ["For instance, in [13], the impact of physical exercise on blood sugar levels on Type-1 DM patients is reviewed, concluding that even certain daily activities alter the dynamics of glucose and can cause problems with blood glucose regulation during and after exercise."]} +{"10694682|13991708": ["\u2026developments explicitly designed for IoT applications in different areas, like logistics [11], ITS (Intelligent Transportation Systems) [12], smart environments [13], parking systems [14], defense and public safety [15], assisted-living [16], smart power sockets [17] or vehicle tracking [18]."]} +{"10694682|37424351": ["\u2026analysis about possible attacks on RFID in IoT applications for speci\ufb01c \ufb01elds like healthcare [26\u201329], defense and public safety [30,31], energy [32], vehicle access [33,34], retail [27], assisted-living [35,36], smart cities [37], Industry 4.0 [38\u201341], ticketing [42\u201346], or smart farming [47]."]} +{"10694682|1680300": ["There also exists the possibility of using automatic recognition algorithms, which have been used for a long time (mainly in the military field) [80], but, very recently, they have been updated and improved to detect RFID physical layer characteristics [81,82]."]} +{"46935064|46973566": []} +{"46935064|4625011": ["IAR can work together with IIoT to show the information collected from sensors scattered throughout the shipyard [48].", "Both software and hardware are key in IAR applications [48]."]} +{"46935064|31216129": ["0 is aimed at changing the way modern factories operate thanks to the application of some of the latest technologies associated with the Industrial Internet of Things (IIoT) [1], Big Data [2] or robotics [3]."]} +{"46935064|3579945": ["0 is aimed at changing the way modern factories operate thanks to the application of some of the latest technologies associated with the Industrial Internet of Things (IIoT) [1], Big Data [2] or robotics [3]."]} +{"46935064|13991708": []} +{"46935064|469744": ["One of such technologies is Augmented Reality (AR), which, although it is based on different pioneering works performed in the 1960s [10,11], it was not until the late 1990s that it was actually pushed by academia [12] and by the industry (in this latter case, thanks to the support of the German government [13,14])."]} +{"3805855|3579945": ["Today, sectors like transportation [14], Industry 4."]} +{"3805855|13991708": ["0 [15], or even defense [16], [17] are benefiting from such advances."]} diff --git a/edge/graph_61809259.jsonl b/edge/graph_61809259.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae0b9c8684a191f1771db7118e801438e19e5b2b --- /dev/null +++ b/edge/graph_61809259.jsonl @@ -0,0 +1,7 @@ +{"88425425|2746910": ["[43]."]} +{"7529644|14370469": ["It is unclear whether this framework offers any advantage over more standard statistical methods of modelling of the same predictor variables as, in most cases, the conditional probability statements that are implied by the two approaches are equivalen"]} +{"4555526|11471272": []} +{"4555526|11894197": ["of feature selection are given byGuyon [35], and Saeys [36]."]} +{"6220062|11894197": ["In fact, this filter has been frequently used for dealing with genetic data; see [15]."]} +{"14074696|1708582": ["The process is then iterated."]} +{"2581822|14370469": []} diff --git a/edge/graph_61810057.jsonl b/edge/graph_61810057.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61811192.jsonl b/edge/graph_61811192.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6a5899f71771f7fe97ee9c17e8fd62229927d8e --- /dev/null +++ b/edge/graph_61811192.jsonl @@ -0,0 +1,51 @@ +{"49866160|2340740": ["[8] present the formal formulation of Malicious URL Detection as a machine-learning task and"]} +{"49866160|12815020": []} +{"22508556|2332366": ["security concerns are discussed in detail in [64].", "A survey on cloud-assisted IoT-based SCADA systems security has very recently been published in [64]."]} +{"22508556|1442447": ["the overview, principles, vision, applications, challenges and architectures of the IoT [26]\u2013[29]."]} +{"22508556|10440280": ["Other areas which have been surveyed in the domain of SG include energy efficiency [58], power demand forecasting [59], load balancing [60], optimization and pricing methods [61], and renewable energy [62]."]} +{"22508556|29060869": ["[52] 2015 Gao et al."]} +{"22508556|2521001": ["issues, which are important factors to be considered in the SG, are surveyed in [55], [56], and privacy-aware metering is reviewed in [57]."]} +{"22508556|3348390": ["Other groups of surveys on the IoT have focused on software defined networking (SDN) [36], data mining [37], LTE uplink scheduling [38] and context-aware computing [39]."]} +{"22508556|595093": ["issues, which are important factors to be considered in the SG, are surveyed in [55], [56], and privacy-aware metering is reviewed in [57]."]} +{"22508556|5747564": ["Surveys focused on the SG have presented the general overview of the SG concept [4], including challenges and standardization activities [49], [50], as well as applications and architectures [5], [51]\u2013[53].", "An example of such communication architecture is presented in [49], [231], [232]."]} +{"22508556|18037424": ["Surveys focused on the SG have presented the general overview of the SG concept [4], including challenges and standardization activities [49], [50], as well as applications and architectures [5], [51]\u2013[53]."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"11787406|485843": []} +{"113534415|9107727": []} +{"109029366|9020157": []} +{"110341783|3102110": ["015 classified as characterization and discrimination, classification, cluster analysis, association analysis, outlier analysis and evolution analysis [6,12]."]} +{"15194417|595093": []} +{"15240347|19632381": []} +{"109775675|485843": []} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"115794295|8363289": []} +{"61839874|6959212": ["The challenges and opportunities of utilizing power networks with communication networks are described in [1]\u2013[3].", "Transition to smart grids opens enormous research opportunities such as improving the quality of monitoring with utilizing advanced communication infrastructure [1]\u2013[3] and the integration of new types of energy resources such as wind energy and solar energy [4]\u2013[6]."]} +{"345663|121289": []} +{"29482647|5747564": []} +{"23893450|2521001": ["[8] present a survey of smart grid security issues with a strong emphasis on the smart home environment and its interactions with the smart grid environment."]} +{"23893450|595093": ["[4] further suggest the cyber security requirements, vulnerabilities and solutions for Smart Grid communication networks."]} +{"23893450|18411031": ["The work in [92] has surveyed existing works for following data storage security objectives within cloud-based platform: data integrity, data confidentiality, and data availability."]} +{"4111957|14258620": []} +{"5747564|595093": ["Analyzing and implementing smart grid security is a challenging task, especially when considering the scale of the potential damages that could be caused by cyber attacks [46]."]} +{"113734638|485843": []} +{"53696817|17737221": ["The non-flexible appliances are those that are associated with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "These appliances usually present burst loads (Khan et al., 2014; Ullah et al., 2013)."]} +{"53696817|16335158": ["The IoT Cloud (Alamri et al., 2013; Botta et al., 2016) will enable the long-time storage and complex analysis of this data."]} +{"13261658|5605271": []} +{"46970363|8854215": ["Numerous CCD assault detection techniques, which are not based upon ML rules, have been proposed in the literature [4]\u2013[7]."]} +{"46970363|2663804": []} +{"46970363|595093": ["On one hand, the existence of a communications infrastructure is compulsory for realization of efficient monitoring and intelligent control in the framework of an SG, but a communications infrastructure is prone to malicious cyberassaults [1]\u2013[3], owing to certain incentives for the attacker, like fiscal benefits, inserting technical faults resulting in partial or complete power blackouts, or a combination of both."]} +{"46970363|11894197": ["In general, FSmethods can be divided into three categories: filters, wrappers, and embedded/ hybrid methods [14], [39].", "The feature selection-based method does not alter the original representation of the data [14]."]} +{"46970363|6959212": []} +{"73682110|1598350": ["3 identify smart grid, smart homes and smart industries between main contributors to smart products sales market by 2016 [4]."]} +{"73682110|17403085": ["KDD applications to manufacturing processes have been reviewed in some papers such as [37\u201340]."]} +{"54919268|1420935": ["However, non-renewable energy sources are being depleted and becoming more expensive from time to time which indicates that the energy from these sources will not be able to support the increasing demand caused by a growing population [1].", "Several published papers discussed various aspects of P2P DET [1,30\u201333].", "RES cause less pollution and are also more economical than their counter parts as they reduce transmission cost [1].", "The authors in [1] provided a high level overview while not covering most recent research problems.", "Furthermore, energy trading also brings various bene\ufb01ts to utility companies such as increasing the overall ef\ufb01ciency of the grid and reducing operation cost [1]."]} +{"70347005|12083425": ["With the development in power electronic interface and decrease in the cost of photovoltaic (PV) panels [4], [5], this trend is expected to grow."]} +{"6294669|17905276": ["The interfacing layer is formed by a collection of the concentrator, Bluetooth, WiFi and relay node [43].", "Explicitly, each sensor node generally has a radio transceiver, a small microcontroller and an energy source [42,43].", "Bluetooth, wireless fidelity (WiFi) and relay [43].", "To this end, the sensing nodes must efficiently send data over long distances from the DER source to the base station [42,43]."]} +{"110481635|9588126": []} diff --git a/edge/graph_61811265.jsonl b/edge/graph_61811265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89e347b32e11f38d7fd737e9cd376e710b263807 --- /dev/null +++ b/edge/graph_61811265.jsonl @@ -0,0 +1,2 @@ +{"10393627|17323154": ["A recent review of this relatively large body of literature is given in [Carpineto et al. 2009]."]} +{"2273047|12161567": ["More recently, it is used in the SemanticWeb Community to create a \u2018\u2018web of data\u2019\u2019 which is processable and comprehensible by computer programs [13]."]} diff --git a/edge/graph_61832675.jsonl b/edge/graph_61832675.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94ffb7078454a7b13017affe1fea48f7df238c43 --- /dev/null +++ b/edge/graph_61832675.jsonl @@ -0,0 +1,4 @@ +{"2281773|12823034": ["Usability of NL interfaces is not covered in this review so for additional information we refer the reader to (Uren et al., 2007) and (Kauffman and Bernstein, 2007).", "As stated in (Uren et al., 2007) iterative and exploratory search modes are important to the usability of all search systems, to support the user in understanding what is the knowledge of the system and what subset of NL is possible to ask about."]} +{"2281773|16534280": ["As argued in [80] a major difference between open-domain QA and ontologybased QA is the existence of domain-dependent", "ledge sources, in order to answer queries that the original sources alone were unable to handle, are based on two approaches [80]: either all the information from multiple sources is extracted to create a unified database, or the set of databases can be seen as a federated database system with a common API, as in [5].", "NL interfaces are an often-proposed solution in the literature for casual users [51], being particularly appropriate in domains for which there are authoritative and comprehensive databases or resources [80].", "The complexity arises because of its \u201copenness\u201d, as argued in [80], QA systems in restricted domains can attack the answerretrieval problem by means of an internal unambiguous knowledge representation, however, in opendomain scenarios, or when using open-domain ontologies, as is the case of DBpedia or WordNet that map words to concepts, systems face the problem of polysemous words, which are usually unambiguous in restricted domains."]} +{"54934748|10274533": ["Journal of King Saud Uni.1016/j.jksuci.2014.03.009\n2005; Thet et al., 2007), while others have applied OM to the mining of newspapers and websites in an effort to extract public opinion (Liang et al., 2011; Maragoudakis et al., 2011; Stepinski and Mittal, 2007).", ", 2007), while others have applied OM to the mining of newspapers and websites in an effort to extract public opinion (Liang et al., 2011; Maragoudakis et al., 2011; Stepinski and Mittal, 2007)."]} +{"54934748|8310135": ["According to a survey on named entity recognition (Nadeau and Sekine, 2007), the research on this task was relatively slow until 1995, which is evidenced by the fact that only 8 publications were found for the period 1991\u20131995."]} diff --git a/edge/graph_61864377.jsonl b/edge/graph_61864377.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6188160.jsonl b/edge/graph_6188160.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7893014af3f589eec0837da5133b95003e5c8f61 --- /dev/null +++ b/edge/graph_6188160.jsonl @@ -0,0 +1,3 @@ +{"14860288|2762290": ["This property makes these kinds of approaches limited to only static dictionary applications like bank check recognition or for on-line recognition on a personal computer with the recognition algorithm trained for a speci\ufb01c user and on a particular vocabulary [112,113]."]} +{"14860288|6746689": ["Lam and Suen [69] referenced 138 publications in 1992."]} +{"17378006|9176080": ["But it was used mainly for covert and secret communication in different civilizations [1][2].", "It is mainly used for digital watermarking, copyright protection, digital fingerprinting and many other related domains [1].", "Information hiding is mainly advanced for embedding in image [1], video and audio, but the same has not been done for text, although text was one of the oldest mediums used for steganography [2]."]} diff --git a/edge/graph_61887809.jsonl b/edge/graph_61887809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97129ddbe6abb29c7073ec4c407c938256163c3f --- /dev/null +++ b/edge/graph_61887809.jsonl @@ -0,0 +1,2 @@ +{"17856740|14697846": ["Peer-to-Peer (P2P) [3] computing is another emerging internet-scale computing model in which computing nodes share distributed resources via exchanging among the participating nodes."]} +{"8792913|14697846": ["Peer-to-Peer (P2P) systems [ 1 ], [23] have attracted great interest from both the commercial and the academic communities.", "P2P systems [ 1 ], [23] can be categorized as either unstructured or structured."]} diff --git a/edge/graph_6189942.jsonl b/edge/graph_6189942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61932399.jsonl b/edge/graph_61932399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61942594.jsonl b/edge/graph_61942594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61948452.jsonl b/edge/graph_61948452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61949734.jsonl b/edge/graph_61949734.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_61950072.jsonl b/edge/graph_61950072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d2d324b8f66f46abca5d952868d84ab3d453871 --- /dev/null +++ b/edge/graph_61950072.jsonl @@ -0,0 +1 @@ +{"8559476|41035405": ["Cooperative diversity schemes proposed by the information theory community [21, 16] suggest an alternate approach that may yield higher throughput."]} diff --git a/graph_619542.jsonl b/edge/graph_619542.jsonl similarity index 100% rename from graph_619542.jsonl rename to edge/graph_619542.jsonl diff --git a/edge/graph_6197039.jsonl b/edge/graph_6197039.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d6ad6f9b6e1d708d74a8c4d0dbe8a3eeb32ca569 --- /dev/null +++ b/edge/graph_6197039.jsonl @@ -0,0 +1,46 @@ +{"15584649|3453202": ["re sensitive to pilot contamination [1]. For instance, the authors consider security transmission for a downlink massive MIMO system with presence of attackers capable of jamming and eavesdropping in [6,7]. The problem of smart jamming is considered for an uplink massive MIMO system in [8], which shows that a smart jammer can cause pilot contamination that substantially degrades the system performance."]} +{"36121630|15453366": ["W ITH the unrelenting increment of wireless data demands, increasingly more novel concepts and techniques have been introduced into wireless communication techniques to realize ubiquitous flexible wireless access with high power efficiency and spectrum efficiency [1]\u2013[5].", "E (4) where \u03c9e is the unit-norm analog receive beamforming of eavesdropper E, and n([1]) E is the additive noise at E.", "y([1]) e = \u03c9 H e HS1Eu1 \u221a p1s1 + \u03c9 H e HS2Eu2 \u221a p2s2 + \u03c9 H e n [1]"]} +{"14314042|4395259": ["The conventional cryptography-based protocols require secret key generation and management, which will become more and more challenging for large scale and heterogeneous networks."]} +{"11434414|4395259": ["Background Physical layer security has been identified as a promising st rategy that exploits randomness of wireless medium to protect the confidential information fro m wiretapping [13], [14]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"3582661|19938676": ["Massive multiple-input multiple-output (MIMO) [2], which is also known as large MIMO, full-dimension MIMO, or large-scale antenna systems, is one of those green communication technologies [3] that has the potential to significantly alleviate the energy and spectrum consumption crises in the"]} +{"3582661|6779551": ["Along with the framework of wireless communication system evolving from single-input singleoutput (SISO) to point-to-point MIMO, multi-user MIMO, and massive MIMO as the state-of-the-art, different physical layer security techniques [16] have emerged."]} +{"3582661|3453202": ["However, while massive MIMO has attracted extensive attention, relatively few work has been done on the combination of physical layer security and massive MIMO [12].", "In addition to enhancing energy efficiency and spectral efficiency, the much sharper and finer wave beams with better directivity and selectivity, which are sophisticatedly generated by a massive MIMO BS under either line-of-sight or cluttered channel conditions, also benefit the physical layer security during signal transmissions [12], [13]."]} +{"3582661|4395259": ["Physical layer security exploits the inherent characteristics and independent randomness of communication channels and noise to achieve secure transmissions [14]."]} +{"35593885|26667032": []} +{"35593885|4502294": []} +{"35593885|19938676": []} +{"35593885|3453202": ["The advantage can be further enhanced by exploiting massive MIMO and physical layer security together, and the combination of these two technologies benefits both the communication performance and secrecy performance [27]\u2013[29]."]} +{"35593885|4395259": ["Recently, physical layer security [24], [25], which is theoretically based on information theory, offers an alternative and complementary approach to strengthen the secrecy performance of wireless communication from the physical layer."]} +{"16754788|3453202": ["The emerging massive multiple-input multiple-output (MIMO) architecture is known to support more secure transmissions, as the largescale antenna array equipped at the transmitter (Alice) can accurately form directional and narrow information beam pointing at the intended receiver (Bob), such that the signal power level at Bob is several orders of magnitude higher than that of any incoherent passive eavesdropper (Eve) [1]."]} +{"14301768|4395259": []} +{"18458913|4395259": ["The fundamental principle behind the physical layer security is to limit the amount of information that can be extracted by unauthorized user at bit level [1]."]} +{"7896004|3453202": ["Moreover, we restrict our analysis to a single-cell setup to obtain a benchmark on the performance of DAS aided secure MU-Massive-MIMO transmission, and do not consider a multi-cell scenario, since in such a case the so-called pilot contamination may occur [18], which has to be counteracted via various approaches [21], and this hidden danger may also be utilized by Eve for an active attack [30]\u2013[32].", "Moreover, the overview in [30] has covered both the passive and active eavesdropping.", "Note that similar to [27]\u2013[29], we consider a homogeneous system, where all legitimate users and Eve fall into the same usercategory and are equipped with a single-antenna; in contrast to [30]\u2013[32], Eve eavesdrops information only passively in order to hide its presence."]} +{"7896004|4395259": ["if there are problems with access to and/or management of the secret key [2]."]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"5323583|4395259": ["A comprehensive survey on physical-layer security, including the information-theoretic foundations, the evolution of secure transmission strategies, and potential research directions in this area, can be found in [9]."]} +{"16238576|2357830": ["\u2026ratio (SNR) at the reader as A. Backscatter Physical Layer Security One of the most challenging tasks in backscatter systems, such as RFIDs, is the ability to secure the transmission against eavesdropping [1], [12], [13] when con\ufb01dential information needs to be sent from the tag to the reader.", "\u2026challenges, securing backscatter communication systems constitutes a key design issue due to the fact that malicious attacks, such as eaves-dropping, can lead not only to data interception but also to serious privacy breaches such as owner tracking or identity modi\ufb01cation, among others [12]."]} +{"3079466|4395259": ["In recent years, there have been several research contributions that follow an alternative path towards key generation by using an information-theoretic approach to derive secrets from unauthenticated broadcast channels (see [6] for a survey)."]} +{"6050009|4395259": ["For a complete review of the most lately approaches, see [19], [20]."]} +{"2529915|6779551": []} +{"38904|14247248": []} +{"31048368|6779551": []} +{"31048368|3453202": ["In particular, multiple-antenna relaying [24], [25], multipleantenna jamming [26], [27], multiuser downlink or multiple access [28], [29], massive MIMO [30], [31], and multipleantenna directional modulation [32]\u2013[35], are exploited to improve the secrecy performance."]} +{"31048368|12029139": ["Generally speaking, a power receiver is usually closer to the source than the information receiver, since the energy harvesting circuitry is less sensitive than the information decoding circuitry [238], [239]."]} +{"31048368|13178381": []} +{"31048368|4395259": ["[61] gave a primary investigation on multi-antenna techniques in multiuser wireless secrecy net-"]} +{"6863351|12029139": ["INTRODUCTION Wireless powered communication network has arisen as a new s ystem with stable and self-sustainable power supplies in shaping future-generation wireless communicatio ns [1, 2]."]} +{"1457251|3453202": ["Moreover, in [32]\u2013[34], active eavesdropping in massive MIMO systems was considered, whereas the eavesdropper in this paper is assumed to be passive in order to hide its presence."]} +{"1457251|4395259": ["Since secrecy and privacy are critical concerns for the desi gn of future communication systems [5], it is of interest to investigate how the large number of s patial degrees of freedom in massive MIMO systems can be exploited for secrecy enhanceme nt [6], [7]."]} +{"33903239|4395259": ["With decades of development and progress, there have been considerable research efforts in this area [4].", "Therefore, there have been increasing research efforts in this field, for which a comprehensive survey can be found in [4]."]} +{"5918010|4395259": ["Recently, physical layer security, which achieves secure transmissions by exploiting the dynamics in the physical layer, has drawn considerable attention [6], [7]."]} +{"10840378|8909218": ["2416984 Aiming to effectively enhance the spectral and/or energy efficiency of wireless networks, it has been suggested that the deployment density of various network-nodes should increase [2], [3], and smart access-point activation and resource management are essential to utilize the dense network-nodes [4]."]} +{"10449088|6414421": ["In the literature, this is usually referred to as spatial decorrelation [14]."]} +{"15612264|4395259": ["A large number of secrecy transmission techniques and schemes have been proposed for wireless communications (refer to [15] and its references)."]} +{"19724296|4395259": ["Finally, unlike most of the related work [1]\u2013[11], we consider a multi-cell setting where not only the data signals cause inter-cell interference but also the AN, which has to be carefully taken into account for system design.", "However, several new issues arise for physical layer security provisioning in multi-cell massive MIMO systems that are not present for conventional MIMO systems [1]\u2013[11].", "This approach is based on certain assumptions regarding computational complexity, and is thereby potentially vulnerable [1].", "(6) reveals that the achievable ergodic secrecy rate of the kth MT in the local cell has the subtractive form typical for many wiretap channels [1]\u2013[11], i."]} diff --git a/edge/graph_61977301.jsonl b/edge/graph_61977301.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f58d65da02951a4ce84c81bcede432fb027dc7ec --- /dev/null +++ b/edge/graph_61977301.jsonl @@ -0,0 +1,4 @@ +{"8299821|10658846": ["A qualitative survey of system-level DPM techniques is available in [2].", "Digital Object Identifier 10.1109/TCAD.2007.911342\nRecently, a novel approach has been developed for verification and performance analysis of the stochastic DPM policies [11]\u2013[13] that obviates the need for extensive simulation [4]\u2013[10] of these policies.", "The PM monitors\n0278-0070/$25.00 \u00a9 2008 IEEE\nthe states of the SR, SRQ, and SP and issues state-transition commands to the SP, based on a DPM policy.", "The example of the DPM system and one experiment performed on this system are taken from [7].", "We used the probabilistic model checker PRISM to generate and analyze optimal randomized DPM policies for the systems with two different priorities of service request queues.", "Index Terms\u2014Dynamic power management (DPM), probabilistic formal verification, randomized optimization, system-level design.", "In this paper, probabilistic-model checking is applied for the first time on a DPM system with two different request priorities.", "The authors of [11]\u2013[13] applied the probabilistic-model checker PRISM [14] to the analysis of DPM policies for three- and fourstate power-managed systems modeled as continuous-time Markov chains.", "System-level dynamic power management (DPM) [2] is a design methodology that aims at changing power states at run-time by selectively placing idle system components into lower power states while controlling performance.", "We used the methodology proposed in [8] to calculate optimum DPM policies."]} +{"17159052|6392800": []} +{"5367463|10658846": ["Additionally the system components should have a stationary behavior [1], [5], [6], [7]."]} +{"60905573|10658846": []} diff --git a/edge/graph_61986623.jsonl b/edge/graph_61986623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2c5ac6663af05a2fbb443a6b9b21bb8e160e708 --- /dev/null +++ b/edge/graph_61986623.jsonl @@ -0,0 +1 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} diff --git a/edge/graph_6198785.jsonl b/edge/graph_6198785.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d0405cac71a8c899098ac7a79c0f2793c2eebc0 --- /dev/null +++ b/edge/graph_6198785.jsonl @@ -0,0 +1,8 @@ +{"9068658|206764452": ["See [6], [9], [14], [16], [21], and [29] for relevant surveys and benchmark studies."]} +{"9068658|1029120": ["See [6], [9], [14], [16], [21], and [29] for relevant surveys and benchmark studies."]} +{"17231796|4491892": ["In addition, let the lower and upper bound of the interval be denoted by and , respectively, that is ."]} +{"10153021|5755403": ["1) relies on low level motion information contained in tracks [15]."]} +{"206740654|15093118": ["interesting aspect could be to combine traffic sign detection with vehicle detection [31] for a more holistic understanding"]} +{"206740654|206739910": ["For a general overview, as well as a survey of the research up until 2012, we refer the reader to [11].", "Traffic Sign Dataset [11] which allows for detailed testing of traffic sign tracking.", "Given these large differences to Vienna Convention signs, and the size of the car market in the US, it is surprising that in [11], only two studies were concerned with US traffic signs, and as we describe in the previous section on related studies, not many have come out since the publication of the review.", "In [11], the LISA Traffic Sign Data set was introduced.", "Moeslund [11].", "The bulk of the research in TSR systems has laid in European signs, or more specifically signs conforming to the Vienna Convention on Road Signs and Signals [2], [11].", "For a further overview of other data sets, see [11]."]} +{"6260438|6972141": ["Additionally, signi(cid:28)cant research has been motivated by various vehicle platforms for Mars exploration missions [7, 8].", "Obstacles and non-traversable areas are normally identi(cid:28)ed through a probabilistic model which is based on the similarity of each image pixel to the (cid:16)safe window(cid:17) [2, 13, 7]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} diff --git a/graph_619938.jsonl b/edge/graph_619938.jsonl similarity index 100% rename from graph_619938.jsonl rename to edge/graph_619938.jsonl diff --git a/edge/graph_61996813.jsonl b/edge/graph_61996813.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62032300.jsonl b/edge/graph_62032300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62040085.jsonl b/edge/graph_62040085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62042881.jsonl b/edge/graph_62042881.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa83092735452f6bb4a19c00783497c1879e4062 --- /dev/null +++ b/edge/graph_62042881.jsonl @@ -0,0 +1,16 @@ +{"19595908|17774971": []} +{"28148195|17774971": ["These converters have significant advantages when compared with two level converters [1]."]} +{"18537978|17774971": ["TODAY, there is a large variety of converter topologies for medium-voltage drives (MVDs) [1], [31]."]} +{"9479387|17774971": ["switches, good harmonic spectrum (making possible the use of smaller and less expensive filters), and good dynamic response [7]."]} +{"44268|17381415": ["Some control approaches for grid-connected converters applied to distributed power generation can be found in the literature [10]."]} +{"44268|12083425": ["Therefore, back-to-back multilevel converters [15]\u2013[19] are suitable to connect variable-speed wind turbines to the grid."]} +{"5576167|17774971": ["Therefore, this paper describes the DPC with space vector modulation (DPC-SVM) scheme applied for a three-level NPC converter [7], which reduces the mentioned drawbacks and contains the following additional blocks: virtual flux (VF) and filter-capacitor voltage estimators for sensorless operation, active damping (AD) of possible resonances in the LCL filter connecting the converter to the grid, and a PWM modulator with dc-link voltage balancing and reduced switching losses."]} +{"113863|12083425": ["industry [8], grid integration of renewable-energy sources [9]\u2013 [11], reactive-power compensation [12]\u2013[14], and other applications [15], [16]."]} +{"113863|17774971": ["Although ML-VSIs were originally developed to reach higher voltage operation, before being restricted by semiconductor limits, the extra switches and sources (provided by multiple dc-link capacitors) could be used to generate different output-voltage levels, enabling the generation of a stepped waveform with less harmonic distortion, reducing dv/dt\u2019s and common-mode voltages, and enabling operation under fault conditions and converter modularity [21].", "Multilevel-converter technology has experienced a fast growing attention in the last decade, and several topologies have been reported [21]."]} +{"31488309|17774971": []} +{"26708870|17774971": []} +{"26708870|1876323": ["To ensure reaching and sliding mode operation it is necessary to guarantee the stability condition (6), [8], [9]."]} +{"43166150|17774971": ["The PWM signal generator can be a reference carrier modulators [8],[9] , a look-up table of a DPC [12], a space vector modulation [10] or the interpolated look-up-table of an optimized pulse pattern [11].", "Different modulator schemes are discussed in [8],[9],[10],[11],[12]."]} +{"36716757|17758458": []} +{"12967314|17774971": ["Compared to others, the MCVSI topology has been adopted in this study because of its following features [8]: 1) a modular construction, allowing the use of large numbers of identical, mass-produced, high reliability modules and the possibility of a high degree of fault-tolerance; 2) fewer power semiconductor devices compared to the NPC and FC topologies; 3) no clamping diodes compared to the NPC topology; 4) fewer reservoir capacitors compared to the FC topology."]} +{"6136505|17774971": ["The diode-clamped converter (DCC) is the most widely accepted multilevel VSC configuration for the utility power system applications [14], and the VSC-based HVDC converters that have been proposed or implemented, are mainly based on the three-level DCC technology [6], [16], [17].", "Although merits of a n-level (n > 3) DCC for high-voltage applications are well understood [14], its applications, due to its inherent dc-capacitor voltage drift, is not considered."]} diff --git a/edge/graph_6205680.jsonl b/edge/graph_6205680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82777f24bac5531d4953a124a80e895bb5f3f1d4 --- /dev/null +++ b/edge/graph_6205680.jsonl @@ -0,0 +1,5 @@ +{"6420745|14441987": ["Ad-Hoc routing protocols have been categorized [9] as Table-driven and Source-initiated on-demand."]} +{"15986473|14962807": ["By comparison with the routing scheme in Theorem 3 (fixed-port model) and the routing scheme in [4] (designer-port model), the two following lower bounds are optimal.", "In trees, a common strategy consists in setting the addresses via a DepthFirst Search (DFS) traversal of the tree, and then to use the interval routing scheme (IRS) of [11,13] (see [4] for a survey on IRS).", "Actually, if we insist on small memory space, [4] shows that there exists a routing scheme for trees with [1, n]-range addresses, \u03b1 \u221a n bits of memory, where \u03b1 \u2248 3."]} +{"1165796|14441987": []} +{"11661558|1762301": ["I. INTRODUCTION A Mobile Ad hoc Network (MANET) consists in a collection of wireless mobile nodes, which form a temporary network without relying on any existing infrastructure or centralized administration [1]."]} +{"43500308|14441987": ["Most of the on-demand protocols [12] use the shortest path as their route selection metric."]} diff --git a/edge/graph_62062116.jsonl b/edge/graph_62062116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62088676.jsonl b/edge/graph_62088676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d384c45e6d1545e8c041e2dab1aa5c384340a6c4 --- /dev/null +++ b/edge/graph_62088676.jsonl @@ -0,0 +1,6 @@ +{"16998851|16570307": []} +{"166913027|10559330": ["Unfortunately, many of these applications requir e more stringent performance guarantees in terms of bandwidth and end-to-end delay than the current Int erne infrastructure and its best-effort service provide [5, 12].", "Some of these mechanisms, such as class-based queueing [27] and weighted fair q ueueing [5, 12, 14, 28, 29, 57, 60], can be used to accurately implement controlled-load and other s ervice classes defined by the I NTSERV working group."]} +{"207998550|16570307": ["Although a number of survey papers on a variety of congestion con-trol algorithms have appeared in the literature [28, 50.", "The resource power gets to its maximum value at the knee point, where the average queue size is close to one, including the packet in service [28]."]} +{"207998550|15040462": []} +{"1042836|16570307": ["Although this reduces FQ\u2019s design complexity, SFQ still requires around 1000 to 2000 queues in a typical router to approach FQ\u2019s performance [12]."]} +{"42396970|15516254": ["New trends in communication, especially the deployment of multicast and real time audio/ video streaming applications, are likely to increase the percentage of non \u2013TCP traffic in the internet [ 2 ]."]} diff --git a/edge/graph_62089687.jsonl b/edge/graph_62089687.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62095653.jsonl b/edge/graph_62095653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62100674.jsonl b/edge/graph_62100674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ecd5e6da70d9f5cfcc35f81a419e1b1f18d96b4c --- /dev/null +++ b/edge/graph_62100674.jsonl @@ -0,0 +1,4 @@ +{"15621636|2835258": ["Recently, some algorithms for distributed location services have been developed [17].", "Greedy routing strategies [17]. which selects the neighbor closest to the straight line between sender and destination.", "Below we summarize some forwarding strategies proposed in the networking literature [17][14][15] 1) Greedy Packet Forwarding:: Using greedy packet forwarding, the sender of a packet includes the approximate position of the recipient in the packet.", "2) Re-active Routing Protocols:: Contrary to pro-active routing protocols, re-active or on-demand routing protocols determine the route only when required, that is, when a communication needs to take place [17][11][13][7].", "An example of this problem is depicted in Fig.2 [17].", "In traditional geographical or position-based routing [14][15][17], the source node starting the routing has to know the current location of the destination node.", "They can be further divided into proactive, reactive and hybrid approaches [17].", "The rapidly varying topology is taken care of by continuous evaluation of the known routes and at the same time it tries to discover new routes and thereby providing an up-to-date network topology [17][11][13][7].", "These are illustrated in Fig.1 [17], where S and D denote the source and destination nodes of a packet, respectively."]} +{"15621636|14441987": []} +{"26450362|1236072": []} +{"26450362|1230643": []} diff --git a/edge/graph_62103917.jsonl b/edge/graph_62103917.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f50ea9af599dd85c54fc6899de37e73b5bbbf07 --- /dev/null +++ b/edge/graph_62103917.jsonl @@ -0,0 +1,2 @@ +{"7725230|206778272": ["Consequently, the effect of refactoring methods on software quality attribute may vary [4]."]} +{"17090910|206778272": ["S OFTWARE refactoring is used to restructure the internal structure of object-oriented software to improve its quality, especially its maintainability, extensibility, and reusability [1], [2], while preserving its external behavior."]} diff --git a/edge/graph_62109142.jsonl b/edge/graph_62109142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be6007cfd5862c561ab808a39c6a682d0d3b7dba --- /dev/null +++ b/edge/graph_62109142.jsonl @@ -0,0 +1,5 @@ +{"15400354|2685137": ["Object Oriented Data Modeling for Data Warehousing (An Extension of UML approach to study Hajj pilgrim\u2019s private tour as a Case Study)"]} +{"8809427|8125630": ["Further discussion on OLAP, multidimensional analysis, and data warehousing can be found in [4,8, 9, 12].", "For instance, relation schemes corresponding to di erent f-tables over the same levels can be merged, suitable indexes can be de ned, and some views involving aggregation can be materialized [4]."]} +{"2431358|8125630": []} +{"358419|8125630": ["As explained in [ CD97 ], OLAP tools, by means of multidimensional modeling, facilitate complex analysis and visualization of data for decision making processes."]} +{"5561094|8125630": ["From these initial requirements, users can apply a set of operations (usually called OLAP operations [7,18]) to the MD view of data for further data analysis."]} diff --git a/edge/graph_62127157.jsonl b/edge/graph_62127157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af3e096f6039fdfa8ceb84170ada3bce996b380c --- /dev/null +++ b/edge/graph_62127157.jsonl @@ -0,0 +1,2 @@ +{"3147220|7158350": ["A query instance is classified by starting at he root node, testing the attribute specified by this node, and hen moving down the tree branch corresponding to the outome of the test for this attribute."]} +{"18524563|9335771": []} diff --git a/edge/graph_62127479.jsonl b/edge/graph_62127479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f674ac8e26bb562b8a23e24f50959aa8d8d4b39b --- /dev/null +++ b/edge/graph_62127479.jsonl @@ -0,0 +1,2 @@ +{"14012714|9188816": ["Many sequence comparison methods based on k-mer counting have been proposed in the literature; for a review, see [19]."]} +{"15221548|1507400": []} diff --git a/edge/graph_62130054.jsonl b/edge/graph_62130054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62140781.jsonl b/edge/graph_62140781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62148320.jsonl b/edge/graph_62148320.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62150410.jsonl b/edge/graph_62150410.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b549c60c57825409683de5c799145d70601d7a84 --- /dev/null +++ b/edge/graph_62150410.jsonl @@ -0,0 +1,2 @@ +{"155033300|6308019": []} +{"108282|19632381": ["The results are quite encouraging and since all the solutions are feasible, the method can be easily incorporated into an interactive user interface, which can be of major importance when scheduling of patients, and human resources in general, is considered."]} diff --git a/edge/graph_62157060.jsonl b/edge/graph_62157060.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62157401.jsonl b/edge/graph_62157401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62157999.jsonl b/edge/graph_62157999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62159429.jsonl b/edge/graph_62159429.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63c3a174c6ade93008df1aaf194902b5e30d4494 --- /dev/null +++ b/edge/graph_62159429.jsonl @@ -0,0 +1,4 @@ +{"45634698|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"2465022|2835258": []} +{"17401220|1230643": ["The nodes function cooperatively in creation of a network, for example, a sensor network [1], [21], [22], in order to improve the delivery of packets to their destinations."]} +{"6921020|9410318": []} diff --git a/edge/graph_62161573.jsonl b/edge/graph_62161573.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62162715.jsonl b/edge/graph_62162715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62179465.jsonl b/edge/graph_62179465.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68ddc82d6ca4f87b21709d9b82330f5d11d597f2 --- /dev/null +++ b/edge/graph_62179465.jsonl @@ -0,0 +1,2 @@ +{"13994730|13317072": ["\u2026beyond the scope of this paper, including verifi\u00adcation \nof real-time systems [Alur and Henzinger 1992], advanced tech\u00adniques for combinational equivalence [Jain \net al. 1997], and formal synthe\u00adsis [Kumar et al. 1996] (the references provide introductions and surveys \nfor the respective areas)."]} +{"13994730|17718674": ["There are important areas of formal methods in hardware design that are beyond the scope of this paper, including verification of real-time systems [Alur and Henzinger 1992], advanced techniques for combinational equivalence [Jain et al."]} diff --git a/edge/graph_62181229.jsonl b/edge/graph_62181229.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62183611.jsonl b/edge/graph_62183611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..109e043cf697ed36eabc61f9c081731d37e9b93c --- /dev/null +++ b/edge/graph_62183611.jsonl @@ -0,0 +1,4 @@ +{"204175094|8530790": []} +{"123043729|175549": []} +{"17266927|8530790": []} +{"46165993|9141490": []} diff --git a/edge/graph_62185127.jsonl b/edge/graph_62185127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da8e3e24b25623ca4f463deb292150dd9e42168e --- /dev/null +++ b/edge/graph_62185127.jsonl @@ -0,0 +1,13 @@ +{"15451135|15300368": ["Keywords- Wireless sensor networks, Image processing, Digital integrated circuits, Microprocessors, Coprocessors\nI. INTRODUCTION Wireless Sensor Networks (WSNs) have attracted significant research interests in the last few years [1]."]} +{"15451135|15947359": ["During the last few years, several camera node designs have been proposed using Commercial available Off-The-Shelf (COTS) microprocessors [2-8].", "Such Wireless Multimedia Sensor Networks (WMSNs), with the ability to gather multimedia information from the surrounding environment, are providing the impetus for a new vision of extending the capabilities WSNs for many new applications such as advanced environmental monitoring, advanced health care delivery, traffic avoidance, fire prevention and monitoring, and object tracking [2, 3]."]} +{"15451135|387610": []} +{"62131207|387610": []} +{"6461706|15947359": [") on wireless sensor networks is being, these days, a great requirement for the research and industrial community [5]."]} +{"17626745|387610": ["For example, the SPIHT[13], AWIC[14], and JPEG2000[15] image compression algorithms all use the same transform step (DWT) even though their encoding and quantization steps vary greatly."]} +{"9278936|15947359": ["However, digital images are usually represented by a very large amount of bits, and hence WCSNs raise up problems related to energy consumption in the sensor nodes and available bandwidth in the wireless links.", "In addition to these parameters, we have addressed, in this hardware study, the influence of the parameter k on the characteristics of the circuit to conclude about the weight of this parameter in enhancing the performances of the encoder circuit for WCSN.", "The main goal of the hardware study is to point out the circuit characteristics and to check its adequacy for use in the WCSN context.", "Such sensor network is referred to as Wireless Camera Sensor Network (WCSN) [2, 3]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"18148922|16219347": ["[2] [3] [4] [5]."]} +{"18148922|18469839": ["[2] [3] [4] [5]."]} diff --git a/edge/graph_62186427.jsonl b/edge/graph_62186427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62186435.jsonl b/edge/graph_62186435.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68e9346a8bd7e921e3435aaafdf65545bf059c96 --- /dev/null +++ b/edge/graph_62186435.jsonl @@ -0,0 +1 @@ +{"14252748|13926377": []} diff --git a/edge/graph_6218667.jsonl b/edge/graph_6218667.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d3e42f3688f849e63b1b7abc3d51c3e28612a36 --- /dev/null +++ b/edge/graph_6218667.jsonl @@ -0,0 +1,17 @@ +{"995191|12817488": ["A comprehensive survey on data aggregation schemes of WSN was presented in [7]."]} +{"18679327|7774517": []} +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"205287315|1230643": ["A wireless sensor network consists of sensor nodes deployed over a geographical area for monitoring physical phenomena like temperature, humidity, vibrations, seismic events, and so on [5].", "Data are transferred from sensor nodes to the sink through a multi-hop communication paradigm [5]."]} +{"20785815|1230643": ["Sensor nodes have been deployed to play significant roles in traffic control, battlefield, habitat monitoring and intruder tracking in recent years [1]."]} +{"1246494|1230643": ["These sensors can be used in many applications such as event detection, location, monitoring and control [4].", "The most common are compression, aggregation and fusion [1,4].", "The problem is even worse when the number of deployed nodes increases (scalability), because data communication is responsible for most of the energy consumption in WSN [4-6]."]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"1489715|7774517": ["Most of the techniques examined in [27, 28] heavily rely on data mining techniques, but their focus is detection of irregularities in WSNs data rather than information extraction and analysis."]} +{"1489715|13726263": ["For example, frequent pattern mining over data stream is presented in [31, 32]."]} +{"1489715|6275330": ["With the capabilities of pervasive surveillance, sensor networks have attracted significant attention in many applications domains, such as habitat monitoring [1, 2], object tracking [3, 4], environment monitoring [5\u20137], military [8, 9], disaster management [10], as well as smart environments."]} diff --git a/edge/graph_62192555.jsonl b/edge/graph_62192555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5014c8d0f5021b0d7202217d46b5ba957f5c1839 --- /dev/null +++ b/edge/graph_62192555.jsonl @@ -0,0 +1,6 @@ +{"29582141|6592804": []} +{"111274400|6592804": ["Folan and Browne (2005b) presented different PM frameworks specifically designed for the inter-organisational environment.", "The term framework refers to the active employment of particular sets of recommendations (Folan and Browne 2005b ).", "Some researchers (Browne et al., 1997, Morell 1997, Rolstadas 1998, Childe 1998, Stevens 1998, Gunasekaran et al., 2001, 2004, Hudson et al. 2001, Folan and Browne 2005a, b) identified SCM measures/metrics for performance and proposed different frameworks.", "The term framework refers to the active employment of particular sets of recommendations (Folan and Browne 2005b)."]} +{"110346735|6592804": ["2004 , 2005 , Folan and Browne 2005 , Fynes et al .", "There are several metrics in the literature and in business organizations recommended for use in measuring the performance of a SCM system (Gunasekaran et al. 2004, 2005, Folan and Browne 2005, Fynes et al. 2005)."]} +{"110343849|6592804": ["These days the challenge of performance management research more and more lies in an interorganisational context (Folan and Browne, 2005; Beamon, 1999; Van Hoek, 1998)."]} +{"108648402|6592804": ["Folan and Browne (2005) presented different performance measurement frameworks specifically designed for the inter-organisational environment.", "Some researchers (Browne et al. 1997, Rolstadas 1998, Childe 1998, Gunasekaran et al. 2001, Hudson et al. 2001, Gunasekaran et al. 2004, Folan and Browne 2005a, b) identified SCM metrics and proposed a framework to classify them as financial and nonfinancial metrics at different decision levels.", "2004 , Folan and Browne 2005a , b ) identified SCM metrics and proposed a framework to classify them as financial and non-financial metrics at different decision levels.", "Folan and Browne (2005b) suggested that interorganisational performance measurement may be divided into supply chain and extended enterprise performance measurement: the former relying solely on traditional logistics measures, while the latter incorporates the structural aspects of the supply chain\u2026"]} +{"35185108|14038195": ["To guarantee the judgements are consistent a final operation called consistency verification, regarded as one of the most advantages of the AHP, is incorporated (Ho, 2007).", "Kannan et al. (2008) developed an effective and efficient MCDM model for selecting the collecting centre location in the reverse logistics supply chain model (RLSCM) using AHP and fuzzy AHP."]} diff --git a/edge/graph_62195433.jsonl b/edge/graph_62195433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62197391.jsonl b/edge/graph_62197391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62198990.jsonl b/edge/graph_62198990.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62205927.jsonl b/edge/graph_62205927.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62218163.jsonl b/edge/graph_62218163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62223499.jsonl b/edge/graph_62223499.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..317e57362bce309d8394bce99e884fca76ba6cad --- /dev/null +++ b/edge/graph_62223499.jsonl @@ -0,0 +1,5 @@ +{"11215941|14295689": ["The majority of the research endeavors published in the academic literature focuses on the construction of a project baseline schedule within the presence of limited resource constraints (see e.g. a recent survey written by Hartmann and Briskorn [4]).", "a recent survey written by Hartmann and Briskorn [4])."]} +{"14295689|11810221": ["We restrict ourselves to deterministic approaches (for an introduction to stochastic problems, the reader is referred to Neumann [133] and Herroelen and Leus [86])."]} +{"18759896|11810221": ["The purpose is to obtain proactive schedules that hedge for variation (Herroelen and Leus 2005)."]} +{"23781309|14295689": []} +{"55167829|14295689": ["More recently, Kolisch and Hartmann (2006) have given an update on experimental results on project scheduling with heuristics, while Hartmann and Briskorn (2010) have given a survey of variants and extensions on the traditional resource-constrained project scheduling problem."]} diff --git a/edge/graph_62226017.jsonl b/edge/graph_62226017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62227766.jsonl b/edge/graph_62227766.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62228457.jsonl b/edge/graph_62228457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_622308.jsonl b/edge/graph_622308.jsonl similarity index 100% rename from graph_622308.jsonl rename to edge/graph_622308.jsonl diff --git a/edge/graph_62231388.jsonl b/edge/graph_62231388.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62235438.jsonl b/edge/graph_62235438.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62236072.jsonl b/edge/graph_62236072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6224676.jsonl b/edge/graph_6224676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6227038.jsonl b/edge/graph_6227038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6227473.jsonl b/edge/graph_6227473.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62298337.jsonl b/edge/graph_62298337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_623196.jsonl b/edge/graph_623196.jsonl similarity index 100% rename from graph_623196.jsonl rename to edge/graph_623196.jsonl diff --git a/edge/graph_6232430.jsonl b/edge/graph_6232430.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62348563.jsonl b/edge/graph_62348563.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6237367.jsonl b/edge/graph_6237367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b197c005d9e3eb9b5197a5ff20053ae831b2acae --- /dev/null +++ b/edge/graph_6237367.jsonl @@ -0,0 +1,13 @@ +{"9910702|8365617": ["For trend abstractions, we segment and label the series by using the sliding window method (Keogh et al. 2003), which keeps expanding each\nsegment until its error exceeds a user-specified threshold."]} +{"5737194|2809360": ["For relevant reviews on methods in text mining see e.g. ([37,63,64,65]).", "Also see review by Meystre et, al [37]."]} +{"5268383|11009327": ["Such systems have also been developed for other clinical tasks, including monitoring of treatment protocols for infectious diseases and detection of deviations from such protocols [17], detection of growth disorders [18,19], and detection of clinically important events in the management of chronic\u2026"]} +{"3519414|2809360": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"3519414|11009327": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"207113035|1176034": ["The work presented in this article deals with several areas in the field of temporal data mining (TDM) (Lin et al. 2002; Roddick and Spiliopoulou 2002)."]} +{"207113035|8365617": []} +{"7814361|17442795": ["However, in spontaneously reporting systems like the Australian ADR Reporting System [15], medical practitioners significantly underreport ADR cases, typically by a factor of about 20 [12], [16].", "The risk and the odds ratios appeal to domain experts, and are commonly used in effect evaluation [16]."]} +{"7814361|1176034": ["For the four subsequences in Fig."]} +{"19141985|30948085": []} +{"16925771|6923178": ["The Matthews correlation coefficient (MCC) is generally regarded as an accurate performance measure for binary classification problems that is more informative than other measures when the classes are imbalanced [1]."]} +{"4404566|393948": ["The success of predictive algorithms largely depends on feature selection and data representation 12,13 .", "Despite the success of feature learning with text, multimedia, and marketing 12 , as well as the rising popularity of deep learning 17 (i.e., learning based on hierarchies of neural networks), these techniques have not been used broadly with EHR data.", "These challenges have made it difficult for machine learning methods to identify patterns that produce predictive clinical models for real-world applications 12 .", "SDAs are sequences of three-layer neural networks with a central layer to reconstruct high-dimensional input vectors 12,17,18,41 .", "We compared the deep patient representation with other well-known feature learning algorithms having demonstrated utility in various domains including medicine 12 ."]} +{"13304051|12457965": ["In the terminology of the survey articles [4,5] our approach is referred to as \u201cmodel based clustering\u201d, and is similar in spirit to the one taken by Ramoni and collaborators [9,10], which is based on Markov Chains rather than HMMs."]} diff --git a/edge/graph_62388549.jsonl b/edge/graph_62388549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62404072.jsonl b/edge/graph_62404072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2bddcde78facd6cc5a0109ca63275d09cc510e64 --- /dev/null +++ b/edge/graph_62404072.jsonl @@ -0,0 +1,6 @@ +{"62404072|10213552": ["SAMOA is one of few open source tools that is specifically designed for distributed and true real-time streaming (Landset et al., 2015)."]} +{"17336083|5755403": ["Examples of such algorithms have been proposed for video surveillance [3], [6] and maritime surveillance [7], [8] where a probabilistic model is estimated for the momentary location", "Dynamic Time Warping, have been proposed for relaxing alignment constraints [3].", "A significant amount of work related to automated anomaly detection in trajectory data has been published in the video surveillance domain [3]."]} +{"10213552|3750204": ["7.0 Batch Java Mahout \u00d7 \u00d7 \u2713 \u00d7 Spark 1.3.1 Batch, streaming Java, Python, R, Scala MLlib, Mahout, H 2 O \u2713 \u2713 \u2713 \u2713 Flink 0.8.1 Batch, streaming Java, Scala Flink-ML, SAMOA \u2713 \u2713 \u2713 \u00d7 Storm 0.9.4 Streaming Any SAMOA \u2713 \u2713 \u2713 \u00d7 H 2 O 3.0.0.12 Batch Java, Python, R, Scala H 2 O, Mahout, MLlib \u2713 \u2713 \u2713 \u2713 6.", "Mahout is one of the more well-known tools for ML.", "On the other hand, a number of companies have reported success using Mahout in production.", "Additionally, while a lot of documentation exists for Mahout, much of it is outdated and irrelevant to people using the current version .", "In April 2015, Mahout 0.9 was updated to 0.10.0, marking something of a shift in the project's goals [92].", "on Spark\u2019s iterative batch and streaming approaches, as well as its use of in-memory computation, enable jobs to run significantly faster than those using Mahout [88, 127].", "One of Mahout's most commonly cited assets is its extensibility and many have achieved good results by building off of the baseline algorithms [87, 99, 100].", "For machine learning tasks, Spark ships with the MLlib [60] and GraphX [61] libraries and the latest version of the Mahout [62] library offers a number of Spark implementations as well.", "Mahout includes several implementations that are not distributed and therefore not included, but they are discussed in the \" Evaluation of machine learning tools \" section.", "The algorithms included in Mahout focus primarily on classification, clustering and collaborative filtering, and have been shown to scale well as the size of the data increases [98].", "The goal of the Mahout-Samsara project is to help users build their own distributed Fig.", "Usability may be considered in terms of initial setup, ongoing maintenance, programming languages available, user interface available, amount Table 2 Overview of machine learning toolkits a Real-time streaming implementation b Single machine, trained using Stochastic gradient descent Mahout MLlib H", "MapReduce is compatible with the Mahout library for ML, and the programming interfaces discussed in the previous section can be used as well.", "One problem with using Mahout in production is that development has moved very slowly; version 0.10.0 was released nearly seven and a half years after the project was initially introduced.", "Among the more commonly cited complaints about Mahout is that it is difficult to set up on an existing Hadoop cluster [93\u201395]."]} +{"207190974|15782139": []} +{"207319017|8627028": ["In a recent survey of annotation projects for natural language processing tasks (Tomanek and Olsson, 2009), only 20% of the respondents said they had ever decided to use active learning, which is evidence of the community\u2019s skepticism about its usefulness in practice1."]} +{"18559882|8125630": []} diff --git a/edge/graph_624120.jsonl b/edge/graph_624120.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62416047.jsonl b/edge/graph_62416047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6242153.jsonl b/edge/graph_6242153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62435909.jsonl b/edge/graph_62435909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c160e6ec1909065512c7970be0ca9028a4cfdcde --- /dev/null +++ b/edge/graph_62435909.jsonl @@ -0,0 +1,7 @@ +{"1935955|3102110": ["However, as mentioned in [4], mining path traversal patterns is still in its infancy.", "The recent progress and development of data mining and data warehousing has made available powerful data mining and data warehousing systems [6, 4]."]} +{"13473479|1932843": []} +{"13473479|192934": ["The related methods are described in survey articles 29 or textbooks 4, 5 and are not summarized in this paper."]} +{"7385340|5473785": []} +{"7639080|3102110": ["\u2026be best de\ufb01ned as the automated process of extracting useful knowledge and information including, patterns, associations, changes, trends, anomalies and signi\ufb01cant structures from large or complex data sets that are unknown (Han and Kamber, 2001; Two Crows Corporation, 1999; Chen et al. , 1996)."]} +{"18019486|15683881": []} +{"967595|3102110": ["Interested readers should consult references such as [33; 24]."]} diff --git a/edge/graph_62452556.jsonl b/edge/graph_62452556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b30e9cf8795d1ee9e82d388ef3dfffaa06a97cb6 --- /dev/null +++ b/edge/graph_62452556.jsonl @@ -0,0 +1,4 @@ +{"14649691|2835258": ["Vehicular Ad-Hoc networks (V ANet) [1] significantly differs from Mobile ad hoc networks (MANet) [ 2 ], since the vehicle nodes have higher mobility than mobile nodes."]} +{"13110412|2736673": ["This class of routing protocols uses the simple flooding on the network in order to reach the whole vehicles [5], [6].", "In cluster-based routing protocols, the vehicles sharing similar characteristics such as performing in the same direction with more or less the same velocity can form a cluster and elect a cluster-head which manages the cluster and being in charge of inter-clusters communications [5], [6].", "Geocast routing protocols follow the principle of routing data packets from a single source vehicle to all vehicles belonging to the destination area called zone of relevance ZOR [5], [6].", "This, assuming that each vehicle has the mean to know its geographical position (as GNSS -Global Navigation Satellite System) [5], [6], [4]."]} +{"14276212|7971188": ["Other types of information dissemination methods such as geocasting [3], [4], [5], multicasting [6], [7], [8], peer-to-peer content distributing [9], [10], [11], and streaming [12], [13], [14] will not be discussed in this paper."]} +{"14276212|11894335": ["Other types of information dissemination methods such as geocasting [3], [4], [5], multicasting [6], [7], [8], peer-to-peer content distributing [9], [10], [11], and streaming [12], [13], [14] will not be discussed in this paper."]} diff --git a/edge/graph_62453632.jsonl b/edge/graph_62453632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..131d892197fb466998867544f2bde8631a92bbfd --- /dev/null +++ b/edge/graph_62453632.jsonl @@ -0,0 +1,3 @@ +{"14287038|1898434": ["According to the taxonomy presented in [5], the sensor network described above can be classified as: a mix of static and dynamic configurable sensors with full self-awareness; a heterogeneous dynamic ad-hoc network with a large number of nodes; deployed in a high dynamic environment partially observable; and which achieve its goals by collectively coordinated actions with a nonlocal environment dependency."]} +{"86893|1230643": ["We refer to the process of establishing data paths \nbetween sensors and actors as sensor-actor coordination."]} +{"7688800|1898434": ["[1] present a survey of existing sensor network research from the perspective of multiagent systems."]} diff --git a/edge/graph_62478396.jsonl b/edge/graph_62478396.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62480927.jsonl b/edge/graph_62480927.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3a95194256a04ccbd48a827110dde4ecc24024d4 --- /dev/null +++ b/edge/graph_62480927.jsonl @@ -0,0 +1 @@ +{"7716138|25699143": []} diff --git a/edge/graph_62497408.jsonl b/edge/graph_62497408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62526314.jsonl b/edge/graph_62526314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6252662.jsonl b/edge/graph_6252662.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eec552a0e822c7e805978d5cce16ad9287780968 --- /dev/null +++ b/edge/graph_6252662.jsonl @@ -0,0 +1,2 @@ +{"95753364|192934": []} +{"15047031|954543": ["Indeed, these methods are gaining an attention within the Data Mining field, due to their performance in terms of predictive knowledge [8, 16]."]} diff --git a/edge/graph_62532103.jsonl b/edge/graph_62532103.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62533755.jsonl b/edge/graph_62533755.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62556242.jsonl b/edge/graph_62556242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62556961.jsonl b/edge/graph_62556961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62563599.jsonl b/edge/graph_62563599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62568680.jsonl b/edge/graph_62568680.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5503796e81c9111ff98139dec3a3048c7f4f2cd9 --- /dev/null +++ b/edge/graph_62568680.jsonl @@ -0,0 +1 @@ +{"27600932|17857669": ["Furthermore, the long entry box version resulted in different responses than the short entry box version, suggesting that relatively minor formatting changes could have an impact on the responses to a survey question (see also Couper 2000)."]} diff --git a/edge/graph_62571236.jsonl b/edge/graph_62571236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62579375.jsonl b/edge/graph_62579375.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62585238.jsonl b/edge/graph_62585238.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60c2de695c22e14dff57c2bba856471fdf0d5af8 --- /dev/null +++ b/edge/graph_62585238.jsonl @@ -0,0 +1,2 @@ +{"5533282|8530790": []} +{"12136272|2635807": [", [18]\u2013[22], and the references therein)."]} diff --git a/edge/graph_62585398.jsonl b/edge/graph_62585398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a83ed2d22b58eeee772fc8b4bb23a104f76b758 --- /dev/null +++ b/edge/graph_62585398.jsonl @@ -0,0 +1,14 @@ +{"10471701|10233218": ["We assume a fixed Tp throughout the paper as opposed to the adaptive playout schemes where the client buffering delay is varied with respect to the network conditions [3,4]."]} +{"23466119|387610": ["properties: state-of-the-art compression performance, quality scalability, and strong error resilience [8], [9].", "represents an efficient compression of the original image at increased distortion [9]."]} +{"11880825|205286988": []} +{"11880825|1236072": ["Comprehensive surveys of the major routing schemes existing in the literature are presented in [19,23]."]} +{"11880825|206051485": ["One of the most widespread data alignment concepts, image registration [137], is a family of techniques, widely used in areas such as remote sensing, medical imaging, and computer vision, to geometrically align different images (reference and sensed images) of the same scene taken at different times, from different viewpoints, and/or by different sensors:"]} +{"11880825|1230643": ["In traditional WSNs, sensor nodes collect information from the environment within a pre-defined sensing range, i.e., a roughly circular area defined by the type of sensor being used.", "The characteristics of WSNs rule out the possibility of all-IP sensor networks and recommend the use of application level gateways or overlay IP networks as the best approach for integration between WSNs and the Internet [138].", "Particularly, in WMSNs, the following additional considerations are in order to accommodate both the unique characteristics of the WSN paradigm and multimedia transport requirements.", "Wireless sensor networks (WSN) [22] have drawn the attention of the research community in the last few years, driven by a wealth of theoretical and practical challenges.", "Sensor devices are constrained in terms of battery, memory, processing capability, and achievable data rate [22]."]} +{"2720099|13558235": []} +{"17626745|387610": ["For example, the SPIHT[13], AWIC[14], and JPEG2000[15] image compression algorithms all use the same transform step (DWT) even though their encoding and quantization steps vary greatly."]} +{"17578130|141053": ["Before we begin our survey, we briefly note that MAC schemes for wireless ad hoc networks have been surveyed in [113] and that selected MAC schemes for wireless sensor networks have been surveyed in [8]."]} +{"17578130|270804": []} +{"17578130|1230643": ["Multi-hop transmission is a preferred mechanism for routing in a WSN because it appears to be energy efficient and may increase overall network lifetime even in the face of signal attenuation and lossy properties of the wireless medium [6].", "In fact the path loss and channel fading characteristic of the wireless medium make multi-hop communication economical [6].", "Recent advances in embedded systems and wireless communications have led to the creation of wireless sensor networks ( WSNs), consisting of low-cost, low-power, multi-functional sensor nodes ( SNs), that are small in size and communicate over short distances [6]."]} +{"57141220|1230643": ["For those battery-powered sensors, energy efficient transmission of the images collected and transmitted in the sensor network presents the most challenging problem [ 1 ]."]} +{"62131207|387610": []} +{"3165019|10658846": ["\u2026to analyze and model power consumption over long periods of time, and therefore predict the lifetime of a node and change the control policy accordingly, it is useful to consider a number of elementary tasks whose scheduling and execution are controlled by a resource manager [Benini et al. 2000].", "Previous work has provided energy consumption values for other types of simpler sensor network platforms, such as Berkeley\u2019s motes [Woo 2000, Shnayder et al. 2004], or for small granularity tasks involving switching the state of a microprocessor [Benini et al. 2000]."]} diff --git a/edge/graph_62601617.jsonl b/edge/graph_62601617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62610298.jsonl b/edge/graph_62610298.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23b3cb2898ae441b3980e19632ea3fdc5936a8ea --- /dev/null +++ b/edge/graph_62610298.jsonl @@ -0,0 +1,3 @@ +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"206446574|1230643": []} +{"13416245|15300368": []} diff --git a/edge/graph_62612139.jsonl b/edge/graph_62612139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62617427.jsonl b/edge/graph_62617427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7513351e64ee05349aa229e34ff932dea46d541c --- /dev/null +++ b/edge/graph_62617427.jsonl @@ -0,0 +1,10 @@ +{"9095936|44944144": []} +{"16813134|1333339": ["According to [4] trust management systems target the information itself, they allow the detection of malicious data and dishonest peers."]} +{"14366345|10137283": ["overview of general trust management approaches can be found in [2], [3]."]} +{"17170586|1333339": ["Trust establishment is tagged in many existing research works for peer to peer, sensors, and mobile ad hoc networks [1] [2].", "The trust and reputation models [1] are proposed as new approaches to circumvent with this constraint and to filter out inaccurate messages and malicious vehicles."]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"17636287|14441987": ["A detailed review and classification of Routing protocols for Ad Hoc Networks has been given in [7] and [8]."]} +{"17636287|1762301": ["A detailed review and classification of Routing protocols for Ad Hoc Networks has been given in [7] and [8]."]} +{"21373055|763939": []} +{"18474215|11210789": ["Moreover, if the destination node moves to a new location, its information which embedded in the packet header will never be updated [2].", "\u2026ad hoc networks; the most important characteristics are: high mobility, self-organization, distributed communication, road pattern restrictions, and no restrictions of network size [2]-[4], all these characteristics made VANETs environment a challenging for developing efficient routing protocols.", "However, the control packet overhead is increased as well as data delivery delay; due to the increased number of retransmission packets [2].", "This scheme can provide a good scalability for large networks; however it may increase network overhead and delays in highly dynamic network [2], [14].", "However, they have degraded performance in highly mobility and density network that when compare them with the reactive routing protocols, moreover unused routes consume the available bandwidth and increase the network overhead [2].", "Some publications remark geocast routing is actually a multicast position-based routing [2], [7]."]} +{"18474215|1762301": ["Moreover, it is not appropriate for highly dynamic topologies [17].", "However, it causes large delays in a route discovery, also route failure may require a new route discovery which produces additional delays that decrease the data transmission rate and increase the network overhead [17].", "The weakness of ZRP protocol is that it performs like a pure proactive protocol particularly for large size zones; however for small zones it performs similar to a reactive protocol [17].", "Generally, the hybrid routing protocols have a higher scalability than pure proactive and pure reactive protocols; because of reducing the number of rebroadcast messages which achieved by allowing network nodes to work together and the most appropriate nodes are used to setup a route [17].", "After the message reaches the destination node (or to the node which has a route to the destination), this node will send a route reply message back to the source node using unicast communication [17]."]} diff --git a/edge/graph_62624466.jsonl b/edge/graph_62624466.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62633313.jsonl b/edge/graph_62633313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62635091.jsonl b/edge/graph_62635091.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62639737.jsonl b/edge/graph_62639737.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62644329.jsonl b/edge/graph_62644329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62645021.jsonl b/edge/graph_62645021.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82d2bf0061f32bf5db634734abe3e1223daad9ba --- /dev/null +++ b/edge/graph_62645021.jsonl @@ -0,0 +1,4 @@ +{"53605988|3330313": ["Hodge and Austin [14] point out that there is no universally accepted definition of outlier, and that alternative terminologies pervade in the recent literature, e.g., novelty detection, anomaly detection, noise detection, deviation detection or exception mining.", "Finding outliers in batch 1-dimensional static data has a longstanding history within statistical literature [14].", "Hodge and Austin [14] point out that there is no universally accepted definition of outlier, and that alternative terminologies pervade in the recent literature, e."]} +{"1600251|1708582": ["An arduous task, we have begun investigating more principled ways of setting these parameters, such as greedy search and reinforcement learning [34]."]} +{"8255138|16156203": ["Temporal data mining [96] incorporates time dimension into data mining process."]} +{"8255138|1176034": ["Spatio - temporal data mining deals with database models to accommodate temporal aspects [121, 130]."]} diff --git a/edge/graph_62646398.jsonl b/edge/graph_62646398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..98b6f6a69812d73c041269f89afd47211fb4f2ae --- /dev/null +++ b/edge/graph_62646398.jsonl @@ -0,0 +1,7 @@ +{"9290258|14866098": ["Many recent review articles have covered BMI method"]} +{"9290258|16362395": []} +{"12187240|15380857": ["If the stimulus is a pattern, the SSVEP occurs at the reversal rate and at their harmonics [106]."]} +{"12187240|16362395": ["Either regression or classification algorithms can be used to achieve this goal, but using classification algorithms is currently the most popular approach [209]."]} +{"12187240|9270553": ["Before describing the practical usage of BCI applications, it is worth considering the distinction between BCIs and their applications [8].", "The community of BCI researchers has therefore stressed the need to establish a general framework for BCI design [8]."]} +{"12187240|192934": ["training data needed to offer good results increases exponentially with the dimensionality of the feature vector [223]."]} +{"23288279|9270553": []} diff --git a/edge/graph_6265393.jsonl b/edge/graph_6265393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62658284.jsonl b/edge/graph_62658284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e59a841307b602ce78a7a75ecd704136f555c1ed --- /dev/null +++ b/edge/graph_62658284.jsonl @@ -0,0 +1,3 @@ +{"207218990|5171123": ["Many papers are written and many real-world systems are being developed and distributed [1, 12, 19, 22]."]} +{"207218990|6028805": ["Many papers are written and many real-world systems are being developed and distributed [1, 12, 19, 22].", "[12] and [5], yet no available database provides such images."]} +{"20717912|9045232": ["Multi-resolution, multi-scale, sub-templates, and deformable templates have subsequently been proposed to achieve scale and shape invariance [7].", "Chen and Bhanu then developed another shape model-based technique for locating human ears in side face range images [7] where the ear shape model is represented by a set of discrete 3D vertices corresponding to ear helix and anti-helix parts."]} diff --git a/edge/graph_62658395.jsonl b/edge/graph_62658395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afd748e0ddb7ece1c7c19934f7bf5010b4292792 --- /dev/null +++ b/edge/graph_62658395.jsonl @@ -0,0 +1,3 @@ +{"8917447|1230643": ["To provide support to existent sensors in environment we considered aspects of wireless sensor networks (WSN) [7] [8].", "Although we acknowledge that our solution is not a WSN per se, we re-used concepts from this field of research such as:\n\u2022 methods for resource management, including indexing, discovery and monitoring;\n\u2022 methods for ubiquitous communication between mobile computing and stationary computing devices;\n\u2022 methods for implementing security, including confidentiality of the transferred data, authentication, authorization, and;\n\u2022 programming interfaces for mobile computing and stationary computing devices."]} +{"9105219|20905429": ["[14]", "Sensor cloud technology enables the early detection of adverse conditions and diseases [14]."]} +{"16520603|14415030": []} diff --git a/edge/graph_62664885.jsonl b/edge/graph_62664885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62665936.jsonl b/edge/graph_62665936.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53ba86a9990ad28fe8a5ba1fda976e9744121513 --- /dev/null +++ b/edge/graph_62665936.jsonl @@ -0,0 +1 @@ +{"56251573|24817150": ["Subsequently, we select features to examine the corresponding characteristics of each cluster based on a comprehensive review by Chen and Macredie (2010)."]} diff --git a/edge/graph_62667623.jsonl b/edge/graph_62667623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62670670.jsonl b/edge/graph_62670670.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62673250.jsonl b/edge/graph_62673250.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62682417.jsonl b/edge/graph_62682417.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62685592.jsonl b/edge/graph_62685592.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62688333.jsonl b/edge/graph_62688333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71ad7ad475f4d151a8553aa9b9b3145ba15422e4 --- /dev/null +++ b/edge/graph_62688333.jsonl @@ -0,0 +1,2 @@ +{"60903807|17857669": ["This information can be used, for example, to describe and classify response behavior, to detect problematic survey questions or other survey design features (\u201cusability testing\u201d) (e.g., Couper, 2000; Jeavons, 1999), or to relate response behavior to data quality."]} +{"62682353|17857669": ["\u2026surveys conducted by the Georgia Institute of Technology\u2019s Graphics, Visualization and Usability Center in 1997 and 1998 (see http://www.gvu.gatech.edu/user_surveys/; see also Couper, 2000) An apparently minor change in question format between the two years yielded different distributions on age.", "Similarly, Couper (2000; see also Couper & Hansen, 2001) showed that poor design can affect answers in computer-assisted surveys administered by interviewers."]} diff --git a/edge/graph_62693136.jsonl b/edge/graph_62693136.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..571a102072d0713259afc20bc88ffcc78de45287 --- /dev/null +++ b/edge/graph_62693136.jsonl @@ -0,0 +1 @@ +{"15266848|11608263": ["22\u201326 The relation between inter-annotator agreement and automated system performance is not clear."]} diff --git a/edge/graph_62693146.jsonl b/edge/graph_62693146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62697375.jsonl b/edge/graph_62697375.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1cbe551278407f02991dd9a761d8bd32fcbcb2d2 --- /dev/null +++ b/edge/graph_62697375.jsonl @@ -0,0 +1 @@ +{"14110787|9307657": ["In our tests we use the method of assigning each basis vector a number of bits proportional to its standard deviation [ 27 ]."]} diff --git a/edge/graph_62700405.jsonl b/edge/graph_62700405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62700549.jsonl b/edge/graph_62700549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ed2dcb675cbb7c6bf9112586e9d4151e2d973f6 --- /dev/null +++ b/edge/graph_62700549.jsonl @@ -0,0 +1,2 @@ +{"6087911|6809492": ["However, the limits between these two concepts are vanishing since the RISC unit of microcontrollers is\nmore and more powerful and the number and the types of peripherals in DSPs are increasing.", "It consists of a 4-bit LUT, a D-Flip-Flop, a carry chain (for arithmetic operations) and a multiplexer, [39]-[42].", "This feature gives designer an additional degree of freedom compared to software implementations based on microcontrollers and DSPs [42], [43].", "Like microcontrollers and DSPs, FPGAs were born in the eighties and are now a mature technology.", "This development is made according to the design methodology, [42]-[44], overviewed in Fig."]} +{"14961444|6809492": ["Speed performance is considered as an appropriate solution in order to boost the performance of controllers for industrial control systems as an effort to reduce the gap between the analog and digital world [6] [7]."]} diff --git a/edge/graph_62701834.jsonl b/edge/graph_62701834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..849d578b83dbc83d09ea6d4615478a9be312806f --- /dev/null +++ b/edge/graph_62701834.jsonl @@ -0,0 +1,8 @@ +{"11392977|987239": []} +{"14415030|15744805": ["Supervised evaluation methods [5,6], also known as relative evaluation methods [7] or empirical discrepancy methods [4], evaluate segmentation algorithms by comparing the resulting segmented image against a manually-segmented reference image, which is often referred to as a gold standard [8] or ground-truth.", "Analytic methods [4,71] assess segmentation algorithms independently of their output, evaluating them based on certain properties of the segmentation algorithms, such as processing strategy (parallel, sequential, iterative, or mixed), processing complexity, resource efficiency, and segmentation resolution, which are usually not deemed effective for assessing the segmentation quality (e.", "Whereas supervised methods evaluate segmented images against a reference image, unsupervised evaluation methods [45], also known as stand-alone evaluation methods [38] or empirical goodness methods [4] do not require a reference image, but instead evaluate a segmented image based on how well it matches a broad set of characteristics of segmented images as desired by humans."]} +{"17658433|192934": ["Note that the choice to use k-NN (k = 1) for comparison was made because \nit can be conveniently employed as a benchmark for all other classi.ers, and is likely to provide a reasonable \nclas\u00adsi.cation performance in most applications [Jain et al. 2000]."]} +{"691081|192934": []} +{"16903660|192934": ["Images may be segmented or analysed in terms of their constituent areas or regions, before low-level feature extraction takes place ( Idris and Panchanathan 1997 )."]} +{"62713841|12663580": ["For a detailed survey of SVMs for different pattern recognition applications refer to Byun and Lee [ 37 ]."]} +{"62713841|192934": ["The template itself is often learned from the training set [ 47 ]."]} +{"17248708|8197990": ["Many authors have studied the queries and behavior of people looking for textual information on the Web [Goodrum 2000; Goodrum and Spink 1999; Jansen et al. 2000].", "Many au\u00adthors \nhave studied the queries and behav\u00adior of people looking for textual informa\u00adtion on the Web [Goodrum \n2000; Goodrum and Spink 1999; Jansen et al. 2000]."]} diff --git a/edge/graph_62707271.jsonl b/edge/graph_62707271.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62709258.jsonl b/edge/graph_62709258.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..724076f3aa7cfa3f8bcc0d9aa20bd640eb895f51 --- /dev/null +++ b/edge/graph_62709258.jsonl @@ -0,0 +1,4 @@ +{"24855015|28294111": ["Google Scholar is used by many researchers for citation analysis [12, 22, 23]."]} +{"14865813|13385255": ["Though others do not use the name service ecosystem similar phenomena are researched in other areas, for example under the name of service value networks [8, 22, 24, 30]."]} +{"5187003|13385255": ["\u2026similar to service ecosystem have been researched in other areas, for example under the label \u201cService Value Network\u201d, \u201cBusiness Webs\u201d (Steiner 2006; Tapscott et al., 2000), and \u201cInternet of Services\u201d (e.g., Dorn et al., 2007; Zhang/Chen/Zhou, 2005; Janiesch/Ruggaber/Sure, 2008; Schroth, 2007).", "Although the terms used may differ, phenomena similar to service ecosystem have been researched in other areas, for example under the label \u201cService Value Network\u201d, \u201cBusiness Webs\u201d (Steiner 2006; Tapscott et al., 2000), and \u201cInternet of Services\u201d (e.g., Dorn et al., 2007; Zhang/Chen/Zhou, 2005; Janiesch/Ruggaber/Sure, 2008; Schroth, 2007).", "Services to a service repository.", "Inter-organisational relationships of business firms are complex phenomena and as such difficult to conceptualise.", "Barros and Dumas (2006) and later adaptations by Riedl et al. (2008, 2009) propose that the following five actors have stakes in service ecosystems: \u2022 Provider - Services are offered by service providers."]} +{"18883027|1619901": ["The extant NPD research does not have all the answers to the questions of product or service development, but there is a foundation that can be drawn on (see integrative reviews by Krishnan and Ulrich, 2001; Schilling and Hill, 1998; Wind and Mahajan, 1997; Brown and Eisenhardt, 1995).", "We believe that NSD researchers can avoid \u201creinventing the wheel\u201d to some degree as some of the design and development problems and decisions in NPD are common to services (cf. Krishnan and Ulrich, 2001 ).", "This challenge is particularly difficult given the diverse literature reporting NPD research (see Krishnan and Ulrich, 2001; Wind and Mahajan, 1997; Brown and Eisenhardt, 1995)."]} diff --git a/edge/graph_62710859.jsonl b/edge/graph_62710859.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6272829.jsonl b/edge/graph_6272829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4890a11179578fdbd1c6e50d85e3f9fb4dcf402 --- /dev/null +++ b/edge/graph_6272829.jsonl @@ -0,0 +1,2 @@ +{"2327064|16280711": ["AR is a newly emerging technology and can be applied in various aspects, such as assembling plane [1], assembling furniture [2], medical surgery [1][3], medical training [4], archaeology [5], education [6], Military [7], human-robotic system [8], X-ray simulator [9] ,etc.", "Definition of AR is a system which meets the three characteristics [1] [8]\n1) Combining real and virtual information\n2) Being interactive in real time\n3) Being registered in 3-"]} +{"1521677|2532914": ["However, lab experiments are the commonly used method in mobile human-computer interaction research, because they are easier and more manageable than field experiments [19]."]} diff --git a/edge/graph_62737873.jsonl b/edge/graph_62737873.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_627405.jsonl b/edge/graph_627405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62741173.jsonl b/edge/graph_62741173.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62748872.jsonl b/edge/graph_62748872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac71d43aad2539bd5d3318d7d1be085249e43294 --- /dev/null +++ b/edge/graph_62748872.jsonl @@ -0,0 +1,2 @@ +{"13541767|1400872": ["A smaller number of connectionist models have been designed to produce more sustained, complex variations in the form of learned trajectories through activation space, as in certain kinds of simple recurrent networks (Elman, 1990) and continuous-time recurrent networks (Pearlmutter, 1995)."]} +{"9230758|15993259": []} diff --git a/edge/graph_6275330.jsonl b/edge/graph_6275330.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5cbc675f3726c7d98cb9a26e5c8e53d095eece56 --- /dev/null +++ b/edge/graph_6275330.jsonl @@ -0,0 +1,2 @@ +{"1835525|14441987": ["localization services [9] allow computing nodes to acquire their coordinates relative to each other; routing services [10], [11] reliably deliver packets while dynamically adapting to the ever-changing network topology; and tracking services"]} +{"16082707|1230643": ["We propose a system architectur and a set of lightweight collaborative signal processing algorithms that achieve real-time behavior while minimizing inter-node communication to extend the system lifetime."]} diff --git a/graph_627591.jsonl b/edge/graph_627591.jsonl similarity index 100% rename from graph_627591.jsonl rename to edge/graph_627591.jsonl diff --git a/edge/graph_62759963.jsonl b/edge/graph_62759963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62761895.jsonl b/edge/graph_62761895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..384175e2b80cd04b6bf60d0286ea6952b8677b9c --- /dev/null +++ b/edge/graph_62761895.jsonl @@ -0,0 +1,8 @@ +{"154972154|4719202": ["De Koster et al. (2007) give a comprehensive literature review on these topics.", "De Koster et al. (2007) indicated that on the theme of facility layout of a warehouse, the issues needed to address include the amount of storage zones to be set up, whether or not cross aisle should exist, how many cross aisles should be established, the locations of Pickup/Deposit (P/D) point and\u2026", "De Koster et al. (2007) described five frequently used types of storage assignment: random storage, closest open location storage, dedicated storage, full turnover storage and class based storage."]} +{"56790276|4719202": []} +{"17071402|4719202": ["Complete surveys can be found in [11] [17].", "This fact has given rise to extensive research on heuristic methods for batching problems, as can be seen in the early survey by Van den Berg [28] and the more recent studies by Gu et al., [11], and Koster et al., [17]."]} +{"35843188|4719202": []} +{"15944525|4719202": ["It arises because incoming articles are received and stored in (large volume) unit loads while customers tend to order small volumes of different articles (de Koster et al., 2007)."]} +{"153456346|4719202": ["Four operational decision problems influencing the performance of (manual) order picking systems have received attention from researchers (see De Koster et al., 2007 for a comprehensive literature review):\n\u2022 Storage assignment.", "Little research has been done in this area (see de Koster et al, 2007 for references)."]} +{"207641139|4719202": ["In addition to the truck terminals, the company uses a pick-by-voice system, which is not used for guiding the pickers, but only for pick confirmation (De Koster et al., 2007).", "Efficiency losses in the warehouse by not using class-based storage are traded-off against efficiency gains in the stores by faster customer order unloading and shelf replenishment (De Koster et al., 2007).", "The customer orders must be filled in a predefined sequence, primarily due to family grouping in the stores (De Koster et al., 2007)."]} +{"154910553|3102110": []} diff --git a/edge/graph_62790386.jsonl b/edge/graph_62790386.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62800714.jsonl b/edge/graph_62800714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6280485.jsonl b/edge/graph_6280485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89d37521fe37ba57524a5c7c3abf6eba023fe25a --- /dev/null +++ b/edge/graph_6280485.jsonl @@ -0,0 +1,2 @@ +{"16815557|397187": []} +{"37940993|6280485": []} diff --git a/edge/graph_6281674.jsonl b/edge/graph_6281674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6283365.jsonl b/edge/graph_6283365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62840725.jsonl b/edge/graph_62840725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f10fd4a4008e7f71b6340802571c5a61641f6a6c --- /dev/null +++ b/edge/graph_62840725.jsonl @@ -0,0 +1,4 @@ +{"9907341|1289787": []} +{"12734119|1289787": []} +{"35196733|1289787": ["The study presented in this paper and its companion paper on operations, Gu et al. (2007), complements previous surveys on warehouse research, for example, Cormier (2005), Cormier and Gunn (1992), van den Berg (1999) and Rowenhorst et al. (2000)."]} +{"36103604|4719202": []} diff --git a/edge/graph_62841734.jsonl b/edge/graph_62841734.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f330e04164fe9ff8cbc5b2bd25364a640118a87f --- /dev/null +++ b/edge/graph_62841734.jsonl @@ -0,0 +1,26 @@ +{"1033682|174797842": []} +{"50698|393948": ["The idea of learning feature representations in this way goes back at least to autoencoders [6]."]} +{"49865868|393948": ["Self-supervised learning is a novel machine learning paradigm that has been employed in different fields, such as representation learning [3] and natural language processing [31]."]} +{"206594346|7788290": ["Second, dynamic hand gestures generally contain three temporally overlapping phases: preparation, nucleus, and retraction [8, 14], of which the nucleus is most discriminative."]} +{"10054272|393948": ["[4] provide an excellent survey."]} +{"187547|393948": ["There is a rich literature in unsupervised learning of visual representations [5]."]} +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"1637703|393948": ["Another worthwhile direction of future research is to revisit active vision [2]."]} +{"49867520|41559599": ["Passive stereo provides an alternative approach [43, 21]."]} +{"6779105|393948": ["To parametrize f\u03b8, deep neural networks (DNNs) are a natural choice due to their theoretical function approximation properties (Hornik, 1991) and their demonstrated feature learning capabilities (Bengio et al., 2013).", "To parametrize f \u03b8 , deep neural networks (DNNs) are a natu-ral choice due to their theoretical function approximation properties (Hornik, 1991) and their demonstrated feature learning capabilities (Bengio et al., 2013)."]} +{"9348728|1078272": ["As it is beyond the scope of this paper, we refer the reader to [53] for a survey on action recognition, and [54] for a survey on pose estimation."]} +{"3714620|7360895": ["These technologies have wide industrial applications, including autonomous driving platforms [6], interactive collaborative robotics [11], and localization and navigation systems [12], etc."]} +{"4625569|393948": ["[8] for a great survey."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"378410|393948": ["Although we expect a network to learn partially nonlocal representations in interior layers [5], and past experience shows that an emergent concept will often align with a combination of a several hidden units [11, 2], street (scene) flower (object) headboard (part)", "A disentangled representation aligns its variables with a meaningful factorization of the underlying problem structure, and encouraging disentangled representations is a significant area of research [5]."]} +{"1966580|14814753": ["Most of the prior work in action recognition is dedicated to hand-crafted features [18] such as dense trajectory features [15, 21, 41, 42]."]} +{"11863056|15361180": ["In Table 5 we compare our results with supervised and unsupervised multi-modal retrieval methods discussed in [40] and [19]."]} +{"5276358|393948": ["The third class of algorithms and more related to our paper is unsupervised learning of visual representations from the pixels themselves using deep learning approaches [21, 26, 44, 39, 29, 47, 9, 33, 2, 49, 8]."]} +{"53762354|393948": []} +{"20999239|1932843": ["Recently, paradigms such as reinforcement learning [12], learning-by-demonstration [2] and transfer learning [25] are proving a natural means to train various robotics systems."]} +{"5550767|1229096": ["Its most dif\ufb01cult form is navigation in densely populated urban environments [21].", "This architecture is in line with most existing autonomous driving systems [21, 8].", "This is true for classic modular pipelines [21, 8] and even more so for data-hungry deep learning techniques."]} +{"52158437|10175374": ["Simultaneously addressing multiple tasks through multi-task learning [52] has shown advantages over methods that tackle individual ones [70]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"15324087|1634674": ["Human action recognition ( Aggarwal and Ryoo, 2011; Turaga et al., 2008 ) has become an important area in computer vision research , whose aim is to automatically classify the action ongoing in a temporally segmented video."]} +{"206592484|456491": []} +{"4724792|16528630": ["Other methods use face detection and multi-microphone beamforming [40]."]} diff --git a/edge/graph_62841818.jsonl b/edge/graph_62841818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d367117729ef1678203c80de4917276c04f839cb --- /dev/null +++ b/edge/graph_62841818.jsonl @@ -0,0 +1,3 @@ +{"32406313|18567112": []} +{"18012276|18567112": ["An unpacked app has the following structure (several files and folders) [7]: (i) an AndroidManifest . xml file: it contains the settings of the application (meta-data) such as the permissions required to run the application, the name of the application, definition of one or more components such as\u2026", "General overview of the state of security in mobile devices and approaches to deal with malware can be found in [20], and in the work by Suarez-Tangil et al. in [21], as well as in recent surveys by Faruki et al. in [7] and Sufatrio et al. [6]."]} +{"18012276|6670217": ["General overview of the state of security in mobile devices and approaches to deal with malware can be found in [20], and in the work by Suarez-Tangil et al. in [21], as well as in recent surveys by Faruki et al. in [7] and Sufatrio et al. [6]."]} diff --git a/edge/graph_6284587.jsonl b/edge/graph_6284587.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f8a32e533a3be4f9213aa83dfb47afd5f0860cf --- /dev/null +++ b/edge/graph_6284587.jsonl @@ -0,0 +1,4 @@ +{"427517|14920988": ["Note that this paper is not meant to provide a comprehensive survey of symbolic execution techniques; such surveys can be found elsewhere [19, 44, 49]."]} +{"14913575|14920988": ["Path explosion is the main obstacle preventing DSE from being scalable to large programs [11]."]} +{"7259091|14920988": ["For a detailed overview of symbolic execution techniques, we refer the reader to previously published surveys in the area, such as [11, 19, 32, 34]."]} +{"18398565|17292349": ["For example, consider the program from Listing 3, which computes a value (hash) based on its first argument (argv[1]) and outputs \u201cwin\u201don the standard output if this value is equal to 809267.", "[1] are: symbolic/concolic execution, model-based test case generation, combinatorial testing, fuzzing, (adaptive) random testing and search-based testing.", "It has an execution tree with 2 \u00d7 strlen(argv[1]) paths.", "5 argv [1][4] == \u20195\u2019) printf(\"win\\n\");", "The resulting program has 2 paths, because the predicate is executed \u03c4 = strlen(argv[1]) times.", "Each program from the second data set computes a different function fi(argv[1]) and outputs some integer number.", "[1] indicate 3 fundamental issues of symbolic execution: (1) path explosion, (2) path divergence and (3) complex constraints."]} diff --git a/edge/graph_6286717.jsonl b/edge/graph_6286717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfe3c977c4c671d6e731e5f79a564f2fd7816e21 --- /dev/null +++ b/edge/graph_6286717.jsonl @@ -0,0 +1 @@ +{"498161|1708582": ["This approach to solving complex control problems represents an alternative to statistical techniques that attempt to estimate the utility of particular actions in particular states of the world (Kaelbling et al., 1996)."]} diff --git a/edge/graph_6288490.jsonl b/edge/graph_6288490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6288895.jsonl b/edge/graph_6288895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10301438bb9556794b9b9ac09850b79d28f47731 --- /dev/null +++ b/edge/graph_6288895.jsonl @@ -0,0 +1,3 @@ +{"2108306|11650495": ["To render 1 Please refer to [24] for a complete survey on shadowing methods. semi-transparent volumetric objects with shadows, a (cid:2)rst step usually consists of casting rays from the light source into the volume, and storing the light attenuation function (in voxels for instance)."]} +{"36364314|6288895": []} +{"328697|11650495": ["random vertical position, in which case the constant factors for the expected error are and respectively. classic survey is [ 13 ])."]} diff --git a/edge/graph_62902684.jsonl b/edge/graph_62902684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef6fc1a5d2f5a8d9e048ee9c2a635d7a45d6c0d9 --- /dev/null +++ b/edge/graph_62902684.jsonl @@ -0,0 +1,30 @@ +{"1968549|1230643": ["IRELESS Sensor Networks (WSNs) are comprised of spatially distributed sensor nodes, where each node contains units for sensing, processing, and communicating data [1]."]} +{"6391168|12817488": ["Index Terms\u2014Algorithm, compressive sampling, data compression, wireless sensor network (WSN)."]} +{"6391168|1236072": ["In Section IX, the conclusions are given."]} +{"18565489|9862516": ["This multiple access scheme is suitable for the case that an\naccess point (AP) needs to not only receive signals, but also\nidentify active devices when there are a number of devices with\nunique identification sequences (the number of devices can be\neasily more than a million)."]} +{"1559070|9554464": ["These approaches can be classified into three categories, namely hopby-hop encrypted data aggregation [11], end-to-end encrypted data aggregation [12], [13], and secure hierarchical data aggregation [14]."]} +{"40829101|20905429": ["The challenges in such network are mainly (i) the limited bandwidth available, (ii) the low memory and the reduced computational capability of biosensors, and (iii) the limited energy due to the use of small battery [1]."]} +{"18757884|16888186": []} +{"8559476|41035405": ["Cooperative diversity schemes proposed by the information theory community [21, 16] suggest an alternate approach that may yield higher throughput."]} +{"686532|1230643": ["[8] state that power consumption in sensor network nodes is a critical performance issue in many sensor network applications."]} +{"10572035|12817488": ["For example, video sensors deployed at airports, borders, and harbors provide a level of continuous and accurate monitoring and protection that is otherwise unattainable."]} +{"10572035|1230643": ["Index Terms\u2014Wireless sensor networks, multi-core, embedded systems, symmetric multiprocessors, tiled many-core architecture, near-threshold computing, heterogeneous, compressive sensing\n\u00c7"]} +{"11392154|393948": []} +{"5397486|40145772": ["Motivations for increasing imaging speed included the limitations described above and especially the demands of physiological measurements that require higher spatial and/or spectral resolutions.(5) Because for a given sequence structure, the number of segments in k-space is a direct determinant of image acquisition time, methods for accelerating MRI commonly involve reducing their number, i."]} +{"12562649|11047930": ["This may not consist a major issue for several applications (e.g. [2]) but for other mission-critical implementations and in possible life-threatening situations (e.g [3], [4]), prolonging SOs lifetime is of major importance."]} +{"14216093|240747": ["Due to the energy spent in receiving and forwarding data, advanced hardware and software solutions have been proposed recently."]} +{"14216093|12817488": ["From software point of view, algorithms are needed to reduce the amount of data circulating within the network to increase the network lifetime [10], [11]."]} +{"16598795|345263": ["to a different security notion with respect to the standard cryptographic definitions, which is often referred to as perceptual/transparent encryption [23]\u2013[25]."]} +{"9115774|55729907": ["A solution to attain link layer encryption and authentication of the data in biomedical sensor networks is proposed [20]."]} +{"18760318|14986695": ["In this section, we consider a sparse coding-based image decomposition framework proposed in [15], which can be applied to image enhancement, denoising, and inpainting."]} +{"17938313|1230643": ["However, they incur significant computation and control overheads, i.e., the former one relies on communications between neighbor nodes, while the later one requires complicated transforming computation , which are not suitable for WSNs. Compressive sensing theory (CS) [17], [18] exhibits successful application in designing effective data collections [11], [19].", "WSNs are typically composed of hundreds to thousands of sensor nodes generating tremendous amount of sensory readings, as the packet loss problem and the hot spot problem surface, raw-data collection is rather inefficient or problematic [11], [13].", "A crucial operation of WSNs [2] is to perform data collection, where sensor readings are collected from sensor nodes and then transmitted to the sink through multi-hop wireless communications.", "Therefore, the network lifetime of WSNs will be significantly shortened.", "Generally, data collection in WSNs follows two approaches: raw-data collection and aggregated-data collection .", "To be exact, there exists a transform basis V N\u00c2N under which U N\u00c21 can be represented using K ( n nonzero coefficients, i.e., u \u00bc U T V with kuk 0 \u00bc K. Compressive sensing theory [17], [18] claims that, with probability at least 1 \u00c0 n \u00c0g (g is set to be large), U can be reconstructed exactly as the solution to the following ' 1 -minimization problem, i.e., U \u00bc \u00f0 ^ uV \u00c01 \u00de T , where ^ u \u00bc min u X N i\u00bc1 ju i j; s:t: Y L\u00c21 \u00bc A L\u00c2N U N\u00c21 L \u00bc O\u00f0Km 2 \u00f0A;V \u00de logN=K\u00de; m \u00f0A;V \u00de \u00bc max 1 i;j N A T i V j : (6) Existing approaches suggest to densely compress WSNs' data to get random measurements as in [11], [19].", "W IRELESS sensor networks (WSNs) are adopted in many military, civilian and commercial applications recent years [1].", "Nodes' positions in these three WSNs are also provided."]} +{"207240812|3348390": ["IoT can impact various application domains either by enabling new services, or by improving the efficiency of existing ones [12].", "IoT-enabled solutions for automation, control and monitoring may improve industry by lowering operational and maintenance cost, and increasing quality of service [5], for industrial domains such as supply chain management, transportation and logistics, and automotive [12, 18]."]} +{"16564491|1230643": ["Recently, wireless sensor networks (WSNs) [1] are widely adopted to gather various environmental information and then reconstruct them in the cyber worlds [9]."]} +{"810252|12817488": ["Data aggregation [Rajagopalan and Varshney 2006; Alzaid et al. 2008] is the simplest in-network processing technique for data and communications compression in WSNs.", "Generally in hierarchical data aggregation (e.g. cluster-based, chain-based and tree-based), data fusion occurs at special designated nodes, reducing the number of messages transmitted [Rajagopalan and Varshney 2006].", ", cluster-based, chain-based, and tree-based), data fusion occurs at special designated nodes, reducing the number of messages transmitted [Rajagopalan and Varshney 2006].", "Data aggregation [Rajagopalan and Varshney 2006; Alzaid et al. 2008] is the simplest in-network processing technique for data and communication compression in WSNs.", "2008], including some good reviews [Rajagopalan and Varshney 2006; Fasolo et al. 2007; Alzaid et al. 2008; Ozdemir and Xiao 2009], have been published on data aggregation in WSNs.", "N, Month 20YY.\ncluding few good reviews( [Rajagopalan and Varshney 2006; Fasolo et al. 2007; Alzaid et al. 2008; Ozdemir and Xiao 2009]) on data aggregation in WSNs have been published."]} +{"810252|1230643": ["Wireless sensor networks (WSNs) are critically resource constrained by limited power supply, memory, processing performance, and communication bandwidth [Akyildiz et al. 2002].", "Wireless Sensor Networks (WSNs) are critically resource constrained by limited power supply, memory, processing performance and communication bandwidth [Akyildiz et al. 2002]."]} +{"16680220|14650419": ["He is now with the Robarts Research Institute and the Physics and Astronomy Department, University of Western Ontario, London, ON N6A 3KT, Canada (e-mail: ali1111@uwindsor.ca).", "To burn a fuse, a high voltage can be applied to the path connected to the resistive layer to increase the temperature beyond its melting point."]} +{"28858054|41768464": ["As a result, a technique called digital watermarking was introduced a decade ago [4,5]."]} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"18964498|2795037": ["Data sketches [9, 16] in databases provide compressed snapshots of big data."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} diff --git a/edge/graph_6292318.jsonl b/edge/graph_6292318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_62924.jsonl b/edge/graph_62924.jsonl similarity index 100% rename from graph_62924.jsonl rename to edge/graph_62924.jsonl diff --git a/edge/graph_62972101.jsonl b/edge/graph_62972101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_62985653.jsonl b/edge/graph_62985653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2ca844ef1667d7a885c0e5fbff70c592fd51ae7 --- /dev/null +++ b/edge/graph_62985653.jsonl @@ -0,0 +1,5 @@ +{"11472958|9732448": [", [8, 13]) assume certain notions of abstraction, towards the organization of information concerning available services."]} +{"51949262|8914588": []} +{"51949262|9436742": []} +{"39826532|24847": ["Recent work in this area provides a comprehensive classification and description of design patterns for self-organising mechanisms together with a detailed description of their interrelations [74]."]} +{"39826532|9436742": []} diff --git a/edge/graph_62990314.jsonl b/edge/graph_62990314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6301539.jsonl b/edge/graph_6301539.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6302771.jsonl b/edge/graph_6302771.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6302811.jsonl b/edge/graph_6302811.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..974a7963abb471a2a7731a6d8c953aad7e29f348 --- /dev/null +++ b/edge/graph_6302811.jsonl @@ -0,0 +1,5 @@ +{"205344133|7023859": ["Finally, we note that the papers [17,50] are good surveys on RCAs and CAs from different viewpoints."]} +{"18283566|2840997": ["Application domains are, for example, automatic test pattern generation [27], [28], logic synthesis [29], diagnosis [30], and verification [31]\u2013[ 33 ]."]} +{"58820603|1457933": []} +{"58820603|14397836": []} +{"16595181|6302811": ["Another \ufb01rst in our research is the use of register-transfer level (RTL) primitives to optimize reversible circuits, where previous techniques for reversible logic optimization operate at the bit level [17].", "Thus, for constants like 2, 8, 17 and 63, not only we have to implement two multiplications rather than one, but the second one may require a much larger circuit, and the number of ancillae can be signi\ufb01cant.", "Whereas traditional circuit-synthesis algorithms [17] operate at the bit level, we introduce word-level algorithms that perform dramatically better.", "NOT ( N ), CNOT ( ) and To\ufb00oli ( ) \u2014 which can be modeled and optimized entirely in terms of Boolean logic [17].", "Departing from register-level structure of our current mod-mult circuits, bit-level local optimization [17] may reduce gate counts.", "Given our circuits for (not modular) multiplication by (2 k + 1) in Section 3, Formula 8 can be used with C = 5 , 9 , 17 , 33 , . . . . Circuits for multiplication by \u03b4 = C \u2212 M % C are available for \u03b4 of the form 2 k and 2 k + 1."]} diff --git a/edge/graph_6302893.jsonl b/edge/graph_6302893.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63054240.jsonl b/edge/graph_63054240.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6305682.jsonl b/edge/graph_6305682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44318bf66d38dacc5ea6bf2981a2bee209144990 --- /dev/null +++ b/edge/graph_6305682.jsonl @@ -0,0 +1,17 @@ +{"15912705|17205659": ["Besides, the increase of security challenges has to be considered as well, as can be seen in [20,21], including the implementation of outstanding encryption algorithms, like ECC [22,23], which were originally considered unfeasible for constrained WSNs."]} +{"17039175|1230643": ["Wireless Sensor Network is integrated into modern sensors, microelectronics, telecommunication, embedded computing, distributed information processing, many other areas of science and technology, which has aroused extensive attention around the world and been gradually integrated into our daily life and work [1]."]} +{"17285960|15300368": ["In recent years, Wireless Sensor Networks (WSNs) have attracted significant research interests [1-3]."]} +{"17285960|15947359": ["Such Wireless Multimedia Sensor Networks (WMSNs), with the ability to gather multimedia information from the surrounding environment, is providing the impetus for a new vision of extending the capabilities WSNs for many new applications such as advanced environmental monitoring, advanced health care delivery, traffic avoidance, fire prevention and monitoring, object tracking etc [4, 5]."]} +{"17285960|12127129": ["Out of these methods, the Running Gaussian Average appears to have simple calculation, fastest processing speed and lowest memory requirements [16].", "Some of them are: Running Gaussian Average, Temporal Median Filter, Mixture of Gaussians, Kernel Density Estimation and Sequential Kernel Density Approximation [16]."]} +{"14784873|1230643": ["WSNs [1, 2] comprise mainly of a large number of small sensor nodes with limited resources and are based around a battery powered microcontroller.", "A base station is a much more powerful laptop-class node that connects the sensor nodes to the rest of the world [1, 2] using radio interfaces."]} +{"15529492|1236072": ["Based on the RICER (Receiver Initiated CyclEd Receiver) [5] Media Access Control (MAC) protocol, on a simple geographical routing and positioning [6] and on the protothread library [7] from Contiki operating system [8], PowWow software stack requires a lighter hardware system than Zigbee to be processed."]} +{"15308722|1230643": ["I. INTRODUCTION\nWireless Sensor Networks (WSN) have recently attracted great interest due to the diversity of their applications covering numerous areas such as home, health, and environmental monitoring [1]."]} +{"60929349|1188683": []} +{"60929349|10739218": []} +{"6275330|1230643": ["Other applications of wireless sensors to healthcare that have been proposed include tracking and monitoring doctors and patients, or tracking drug usage inside hospitals [36]."]} +{"206575935|1230643": ["Therefore, a sensor node's lifetime, presents a unique dependence on battery lifetime [1].", "Sensor nodes deployed in a sensor field (redrawn from [1])."]} +{"7996610|205286988": ["A survey of recent routing protocols for WSNs and their classification is given in [7].", "Existing proposed routing protocols for WSNs use fixed (crisp) metrics for making energy-aware routing decisions [7][8]."]} +{"13049632|6809492": ["However, processing and functionality needs are continuously increasing due to new application requirements and this includes WSNs applications."]} +{"11840439|1230643": ["However, these results may be interesting for battery limited applications that require moderate level of security such as those of Wireless Sensor Networks (WSN).", "WSNs are ad hoc networks comprised of a large number of low-cost, low-power, and multi-functional sensor nodes and one or more base stations.", "The results, on the other hand, may be interesting for battery limited applications that require moderate level of security such as Wireless Sensor Networks (WSN) [23, 24].", "However, these results, on the other hand, may be interesting for battery limited applications that require moderate level of security such as WSN.", "There exist a wide range of applications for WSN, such as health monitoring, industrial control, environment observation, as well as office and even military operations.", "It is therefore crucial to add security measures to WSNs for protecting its data against threats in a way so integrity, authenticity or confidentiality can be guaranteed.", "A base station is a much more powerful laptop-class node that connects the sensor nodes to the rest of the world [23, 24] using radio interfaces."]} +{"6996827|205286988": []} +{"6996827|1230643": []} diff --git a/edge/graph_63074864.jsonl b/edge/graph_63074864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..228d003cae011d44fdb31172d126f2da6f3fdbf0 --- /dev/null +++ b/edge/graph_63074864.jsonl @@ -0,0 +1,2 @@ +{"146894092|7360895": []} +{"7727423|7360895": ["Fong conducted a survey of socially interactive robots and evaluated them along social interaction principles, categorizing them by the aspects of social interaction (speech, gestures, etc.) they used.", "The term socially interactive robotics (SIR) was first used by Fong [14] to describe robots whose main task was some form of interaction.", "The taxonomy defined by Fong [14] describes the interaction component of a socially interactive robot by the following properties: For a socially assistive robot, additional properties need to be added to the taxonomy definition, as follows:", "used by Fong [14] to describe robots whose main task was some form of interaction.", "While Fong described this feature as \" emotion \" in his survey, in the assistive domain in particular, it is important to treat interactions separately from the robot's personality.", "The taxonomy defined by Fong [14] describes the interaction component of a socially interactive robot by the following properties:"]} diff --git a/edge/graph_6308019.jsonl b/edge/graph_6308019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba256ee9115f8b71174ead4c2e0aa6a074b187b6 --- /dev/null +++ b/edge/graph_6308019.jsonl @@ -0,0 +1 @@ +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} diff --git a/edge/graph_6308240.jsonl b/edge/graph_6308240.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63086559.jsonl b/edge/graph_63086559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b1566c1d7cffb8d6b385401995002bca02ea509 --- /dev/null +++ b/edge/graph_63086559.jsonl @@ -0,0 +1,39 @@ +{"9028834|3053192": []} +{"45602301|32584958": ["Job shop scheduling (JSS) problems have been extensively studied in the academic literature over the past 60 years [7,20], due mainly to the real-world applicability (there are many thousands of job shops world-wide [13]) and the computational complexity of scheduling in such environments (JSS is known to be NP -hard [3])."]} +{"21340561|27488308": []} +{"8705040|27488308": ["In relation to dynamic JSSP problems, Nguyen et al. (2014b) compare surrogate-assisted selection methods in conjunction with GP, and automatic programming via iterated local search (Nguyen et al., 2015).", "A very comprehensive survey of hyper-heuristic approaches to automated design of dispatching rules is provided in Branke et al. (2015).", "A comprehensive recent survey is provided by Branke et al. (2015) who summarize the state of the art, noting that the most common approach has been to use variable-length grammar-based methods (e.g., genetic programming) to generate new dispatching rules.", "The automated design of reusable production scheduling heuristics is currently of great interest to the optimisation community as evidenced in detail by Branke et al. (2015)."]} +{"9701598|13867280": ["However, we mention here some related areas of research: adaptation and self-adaptation of algorithm parameters [2, 21, 32], algorithm configuration [33], racing algorithms [8], reactive search [6, 7], adaptive memetic algorithms [34, 35, 43, 44, 47, 48, 56 ], and algorithm portfolios [26, 31]."]} +{"26938901|3053192": ["Further, it is also worth noting here that, the current study is totally different from hyper-heuristics in the literature, which encompass a set of approaches with the goal of automating the design and turning of heuristic methods to solve computational search problems [31], [32]."]} +{"26938901|13867280": []} +{"3428759|27488308": ["The existing hyper-heuristics for generating scheduling rules and heuristics can be classified based on their: 1) learning methods and 2) representations [1].", "Recently, different automated design approaches have been proposed to generate dispatching rules [1].", "For a comprehensive review of automated design methods for designing production scheduling heuristics can be found in [1].", "3) Processing times (PTs) follow discrete uniform distribution U[1, 99]."]} +{"9491035|27488308": []} +{"9491035|9734434": ["After reviewing related work in Section 2 we describe our application area in Section 3."]} +{"9491035|4474193": ["The data used to learn the surrogate model can come from an experimental design conducted before the EA, but usually is learned and adopted online during the run (Jin, 2005, 2011; Jin and Branke, 2005).", "For a more comprehensive review, the interested reader is referred to, e.g., Jin (2005, 2011); Shi and Rasheed (2010); Jin and Branke (2005)."]} +{"43766401|3053192": []} +{"10426684|27488308": ["A comprehensive survey on related GP-HH research works can be found in [3,4]."]} +{"13767012|8530790": []} +{"9079874|32584958": ["JSS problems have been widely studied in the academic literature over the past 50 years [9, 24], due in part to their real-world applicability combined with the computational challenge of creating a schedule in such environments (JSS is NP -hard [3])."]} +{"28705364|32584958": []} +{"10600325|27488308": ["On the other hand, applying a dispatching rule to a simulation is expensive, and a large training set may not necessarily lead to significantly higher quality heuristics [6].", "rules [6], the benchmark GP-HH approach in this paper evolves single priority-based dispatching rules.", "In addition, GP evolved rules generally perform better than manually designed rules [6].", "In addition, recent approaches have proposed a Genetic Programming based Hyper-heuristic (GP-HH) approaches for dynamic JSS problems [5, 6].", "In addition, long-running discrete-event simulations are commonly used to evaluate rules for dynamic JSS problems [6].", "In most cases, the output heuristic is a dispatching rule [6]."]} +{"10600325|3053192": ["In addition, recent approaches have proposed a Genetic Programming based Hyper-heuristic (GP-HH) approaches for dynamic JSS problems [5, 6]."]} +{"10600325|32584958": ["Heuristic techniques range from simple dispatching rules [2] to complex meta-heuristic techniques [1].", "Job shop scheduling (JSS) problems are combinatorial optimisation problems that have been studied over the past 50 years [1].", "Exact mathematical optimisation techniques have been proposed [1, 2] to find the optimal (best feasible) solution to a static JSS problem instance."]} +{"10600325|12846121": ["On the other hand, in a dynamic JSS problem instance [3] unforeseen events occur and affect the shop floor, e."]} +{"16082255|27488308": ["As discussed by Branke et al. (2015), it is important to select terminals that are as relevant to the scenario as possible, in order to allow the GP to evolve well-performing rules.", "The use of hyper-heuristics to automatically generate dispatching rules is more recent, and a comprehensive review has been compiled by Branke et al. (2015), describing various different learning methods, attributes and representations that can be incorporated into a hyper-heuristic."]} +{"62627356|17403085": []} +{"62627356|15527933": []} +{"20644536|3053192": ["Heuristic selection and heuristic generation are currently the two main research methodologies in HH [24]."]} +{"25875407|27488308": ["A comprehensive survey of automatic design of dispatching rules is given in [8]."]} +{"18702854|1386147": []} +{"18702854|4474193": ["If an expensive optimization is time-varying, evolutionary algorithms for solving dynamic optimization problems must be adopted to track the moving optima or moving Pareto front [97]."]} +{"61706420|27488308": ["For production scheduling alone, various hyper-heuristics have been developed and tested [4].", "Recently, hyper-heuristic [4, 5] approaches have also been developed to deal with OAS.", "To generating dispatching rules, either fixed-length parametric representations or variable-length grammar-based representations can be used [4].", "For a comprehensive review of automated design methods for designing production, scheduling heuristics can be found in Branke et al. [4].", "Branke et al. [4] have classified hyper-heuristics for production scheduling by their (1) learning methods and (2) representations."]} +{"61079522|8530790": ["There have been many survey studies on evolutionary techniques for MO optimization (Fonseca and Fleming, 1995; Coello Coello, 1996; Bentley and Wakerfield, 1997; Horn, 1997; Coello Coello, 1998; Van Veldhuizen and Lamont, 2000)."]} +{"19886739|27488308": []} +{"19886739|3053192": ["Thus, our approach constitutes a hyper-heuristic approach (Burke et al., 2009, 2013)."]} +{"113736675|27488308": []} +{"113736675|3053192": []} +{"3053192|13867280": []} +{"3053192|1708582": ["One of the commonly used methods in hyper-heuristics is reinforcement learning , see Kaelbling et al (1996) and Sutton and Barto (1998) for more details."]} +{"12385361|3053192": ["In the work presented in this paper, GP is used as a hyperheuristic method [25] for the automatic design of SPs that include sequencing/DRs and DDARs for dynamic JSS problems.", "In order to address drawbacks of existing methods, three important aspects are considered in our proposed algorithms: 1) representations of different scheduling rules; 2) evolutionary optimization to evolve the tradeoffs in SPs; and 3) reusability (ability to be reused on new unseen problems [25], [26]) of the evolved SPs."]} +{"12385361|32584958": ["A comprehensive review of these methods is given in Ouelhadj and Petrovic [52] and Potts and Strusevich [53].", "and Petrovic [52] and Potts and Strusevich [53]."]} +{"12385361|12846121": ["A comprehensive review of these methods is given in Ouelhadj and Petrovic [52] and Potts and Strusevich [53].", "and Petrovic [52] and Potts and Strusevich [53]."]} +{"9893195|32584958": ["Some authors also refer to reactive scheduling schemes as online scheduling or dynamic scheduling (Aytug et al. 2005; Potts and Strusevich 2009; Vieira et al. 2003)."]} diff --git a/graph_63137.jsonl b/edge/graph_63137.jsonl similarity index 100% rename from graph_63137.jsonl rename to edge/graph_63137.jsonl diff --git a/edge/graph_63137135.jsonl b/edge/graph_63137135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6314088.jsonl b/edge/graph_6314088.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63142715.jsonl b/edge/graph_63142715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6314276.jsonl b/edge/graph_6314276.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c01eeb85e4005d241887ea063f77ca2be4afd20 --- /dev/null +++ b/edge/graph_6314276.jsonl @@ -0,0 +1,4 @@ +{"12211334|3374322": []} +{"32967418|10996225": ["Malicious code is one of the serious threats on the internet platform that is called malware [1].", "In the other research [1, 34], the authors proposed a data mining approach to analyze the students careers."]} +{"28388920|12692482": []} +{"222181|11632848": ["Recently Wozniak et al. [16] have given a comprehensive study of the advantages of multiple classi \ufb01 er systems and its applications in varied \ufb01 elds like remote sensing, computer security, \ufb01 nancial risk assessment, fraud detection, medical diagnosis and recommender systems."]} diff --git a/edge/graph_6314374.jsonl b/edge/graph_6314374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4bafe904175739786b417a4a2a32df0c03a7f21 --- /dev/null +++ b/edge/graph_6314374.jsonl @@ -0,0 +1 @@ +{"11109668|1097238": []} diff --git a/edge/graph_63173372.jsonl b/edge/graph_63173372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63185850.jsonl b/edge/graph_63185850.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_631999.jsonl b/edge/graph_631999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63219140.jsonl b/edge/graph_63219140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63252080.jsonl b/edge/graph_63252080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63269433.jsonl b/edge/graph_63269433.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6327434.jsonl b/edge/graph_6327434.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6328714.jsonl b/edge/graph_6328714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6329348.jsonl b/edge/graph_6329348.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0acc483a0fa7bedcdfb2a3138640b24def52dc57 --- /dev/null +++ b/edge/graph_6329348.jsonl @@ -0,0 +1 @@ +{"2796000|627405": ["Brerton et al [19] found that, in a large systematic reviewer, having one reviewer score and another verify the decision is more or less as effective in decision quality, yet more efficient in time, than having both reviewers score all articles in detail."]} diff --git a/edge/graph_63298806.jsonl b/edge/graph_63298806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a00500ebdf0a005383bb93068b9ce563c12b81bd --- /dev/null +++ b/edge/graph_63298806.jsonl @@ -0,0 +1 @@ +{"206406536|15164501": []} diff --git a/edge/graph_63305807.jsonl b/edge/graph_63305807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63311471.jsonl b/edge/graph_63311471.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac8c073849f60b67abf569397a92becb224d744f --- /dev/null +++ b/edge/graph_63311471.jsonl @@ -0,0 +1,2 @@ +{"118631173|350515": []} +{"122725027|4491892": []} diff --git a/edge/graph_63317370.jsonl b/edge/graph_63317370.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d771daee55e858894f4361bb001ca4bed7f21533 --- /dev/null +++ b/edge/graph_63317370.jsonl @@ -0,0 +1,15 @@ +{"14389165|2835258": ["To achieve this goal, our\nalgorithm design employs the strategies of localized\nimplementation of Dijkstra\u2019s algorithm and energy criticality\navoidance when making decisions on next hop selections for\npackets forwarding."]} +{"546333|1230643": []} +{"6669587|205286988": ["Geographic routing protocols [ 2 ][3][4] are very attractive choices for routing in wireless sensor networks."]} +{"9212704|14441987": ["The Hybrid protocols take the advantages of both types of routing [1] [2]."]} +{"41064912|205286988": ["Geographic routing has often been seen as a promising forwarding technique which can optimally address key WSN problems [7], [8], [9].", "Wireless sensor network (WSN) technology is indisputably of interest to all branches of the industry, in the military, industrial, home automation and health fields [6], [7], [8], [9]."]} +{"1071507|2835258": []} +{"36010741|205286988": []} +{"36010741|1230643": []} +{"36010741|2835258": []} +{"9995669|14441987": []} +{"36580794|1236072": [") [3, 5, 8, 9] The on-demand routing need not cost to make a routing table."]} +{"14530058|14799853": ["Nodes in such networks communicate with each other via wireless communication devices [1]."]} +{"18852987|205286988": []} +{"2776089|1230643": ["There are many fields where WSN can be used [1] : from forest monitoring for early fire prevention, to enemy troops movement detection."]} +{"6438719|14441987": []} diff --git a/edge/graph_6332923.jsonl b/edge/graph_6332923.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7a2efeb7a4fcfb6770afe1b566d1009ad6e591d --- /dev/null +++ b/edge/graph_6332923.jsonl @@ -0,0 +1,15 @@ +{"43669357|205286988": []} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"206446574|1230643": []} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"6109808|7988320": []} +{"6109808|17205659": ["A brief summary of these attacks is given in Table 1 [8]."]} +{"6109808|1230643": []} +{"8821056|1940388": ["Open research issues include the following [9],[30] and [32]: 1.", "Other security issues include [32] security-energy assessment, data assurance, survivability, Trust, end to end security, Security and Privacy Support for data centric sensor networks (DCS) and node compromise distribution.", "Secure location algorithms for mobile WSNs in different environments need to be investigated [32].", "There are a lot of approaches to ease routing security [32],[38] and [42].", "Open research issues range from cryptography algorithms to hardware design [6],[9] and [29] and the design of key management protocol\u2019s open research [3],[16],[9],[10] and [32] issues are described below: 1."]} +{"8821056|17205659": ["To illustrate this point, the differences between sensor networks and ad hoc networks are given below [9]: 1.", "In [9],[23], following metrics are suggested to evaluate whether a security scheme is appropriate for WSNs .", "To overcome this, Multi path routing can be used in combination with random selection of paths to destination, or braided paths can be used which represent paths which have no common link or which do not have two consecutive common nodes, or use implicit acknowledgments, which ensure that packets are forwarded as they were sent [16],[9] and [7].", "1 Outsider versus insider (Node Compromise) attacks Outside attacks [6], [9] are defined as attacks from nodes, which do not belong to a WSN; insider attacks occur when legitimate nodes of a WSN behave in unintended or unauthorized ways.", "[16],[9] and [7] (d) Selective Forwarding/ Black Hole Attack (Neglect And Greed): WSNs are usually multi-hop networks and hence based on the assumption that the participating nodes will forward the messages faithfully.", "defensive measure against such attacks is the usage of small frames, so that any individual node seizes the channel for a smaller duration only [16], [9].", "(c) Tampering or destruction: Given physical access to a node, an attacker can extract sensitive information such as cryptographic keys or other data on the node [9].", "The lifetime of a sensor node depends to a large extent on the battery lifetime; hence it is extremely important to adopt energy-efficient strategies for information processing [9],[ 7].", "The attacks are [9],[7]: Kavitha and Sridharan 036", "[3],[9],[7] and [23] (c) Node Capture: It is observed and analyzed that even a single node capture is sufficient for an attacker to take over the entire network."]} +{"8821056|1236072": []} +{"8821056|1230643": []} +{"12012646|2685137": []} +{"1940388|17205659": ["Besides implementing the security goal discussed above, the following metrics are also important to evaluate whether a security scheme is appropriate for WSNs [7], [8].", "A few existing surveys on security issues in WSNs can be found [7], [8]."]} +{"1239696|17205659": ["We refer to [32] for the list of attacks that can take place is WSN."]} +{"13620427|1230643": []} diff --git a/edge/graph_633630.jsonl b/edge/graph_633630.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6336539.jsonl b/edge/graph_6336539.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14395a19fe4747c7acc915f86e9885320ebc3d12 --- /dev/null +++ b/edge/graph_6336539.jsonl @@ -0,0 +1 @@ +{"5100126|534755": ["The study of genetic regulatory networks has recently become a fundamental challenge in systems biology as it explains the interactions between genes and proteins to form a complex system that performs complicated biological functions, see for instance Jacob and Monod (1961) and Smolen, Baxter, and Byrne (2000). Genetic networks are biochemically dynamical systems, and it is natural to model genetic networks by using dynamical system models which provide a powerful tool for studying gene regulation processes in living organisms.", "The study of genetic regulatory networks has recently become a fundamental challenge in systems biology as it explains the interactions between genes and proteins to form a complex system that performs complicated biological functions, see for instance Jacob and Monod (1961) and Smolen, Baxter, and Byrne (2000).", "See also Aluru (2005), Bay, Shrager, Pohorille, and Langley (2002), Davidson (2006), De Jong (2002), Kobayashi, Chen, and Aihara (2002), Wang, Zhou, Jing, and Chen (2004) and the references therein for a wider categorization of genetic network models."]} diff --git a/edge/graph_6337591.jsonl b/edge/graph_6337591.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bd61f85181d10a4738091fe8f97fedb11f8bc6e --- /dev/null +++ b/edge/graph_6337591.jsonl @@ -0,0 +1,4 @@ +{"1985491|1708582": []} +{"34479739|9088773": []} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"1708582|17464562": []} diff --git a/edge/graph_63377959.jsonl b/edge/graph_63377959.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..233aa191859c4a67e757bde172c7ecdac1afc34b --- /dev/null +++ b/edge/graph_63377959.jsonl @@ -0,0 +1 @@ +{"26119426|40162482": ["0 as \u2015a term which refers to improved communication and collaboration between people via social networking\u2016 [10]."]} diff --git a/edge/graph_6339062.jsonl b/edge/graph_6339062.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8473cfe593746ffe4e445dccd2579f9740245ad9 --- /dev/null +++ b/edge/graph_6339062.jsonl @@ -0,0 +1 @@ +{"207721637|8530790": ["Also, some state in published reports (Fonseca and Fleming, 1993, 1995b; Zitzler and Thiele, 1998): \" Following the common practice of setting ... \" This may be a common practice, but no background is cited in the literature.", "As space is limited, the reader desiring introductory MOEA material is directed to the following literature: Van Veldhuizen (1999), Coello (1999a), and Fonseca and Fleming (1995a).", "In fact, it has been noted that the use of mating restriction in MOEAs does not appear to be widespread (Fonseca and Fleming, 1995a; Zitzler and Thiele, 1999).", "The reviews by Fonseca and Fleming (1995a) and Horn (1997) quickly examine major MOEA techniques.", "We agree with other MOEA researchers (Horn, 1997; Fonseca and Fleming, 1995a), and indeed have shown (Van Veldhuizen, 1999) that MOEA theory is lagging behind MOEA implementations and applications.", "Thus, as Fonseca and Fleming (1995a) indicate, for most Pareto MOEAs the size of , , , and grows, and Pareto selective pressure decreases."]} diff --git a/edge/graph_6339197.jsonl b/edge/graph_6339197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63396083.jsonl b/edge/graph_63396083.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6340362.jsonl b/edge/graph_6340362.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63428424.jsonl b/edge/graph_63428424.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63441621.jsonl b/edge/graph_63441621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63444957.jsonl b/edge/graph_63444957.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_634470.jsonl b/edge/graph_634470.jsonl similarity index 100% rename from graph_634470.jsonl rename to edge/graph_634470.jsonl diff --git a/edge/graph_6344722.jsonl b/edge/graph_6344722.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eddda147373e6226f6a19cdf8e2ca88b6a66b450 --- /dev/null +++ b/edge/graph_6344722.jsonl @@ -0,0 +1,19 @@ +{"22573491|20905429": ["The aggregated biometric data will then utilize an Internet connection to some higher supervisory level, such as a remote medical center, within the network [1]\u2013[3]."]} +{"6004579|7686677": ["This traffic growth is not only adding more pressure to the network and user device energy drain but also increases network operational expenditures (OPEXs) and negatively impacts the environment [1]."]} +{"1079645|8909218": []} +{"12357259|8363289": []} +{"898501|1805048": ["Su and Khoshgoftaar [36] concentrated more on CF methods, including memory-based, model-based, and hybrid methods.", "Category Algorithms Constant Baseline User Average Item Average User-based [36] Memory User-based w/ Default [5] -based Item-based [31] Item-based w/ Default Regularized SVD [25] Matrix NMF [19] Factorization PMF [30] -based Bayesian PMF [29] Non-linear PMF [17] Slope-One [20] Others NPCA [41] Rank-based CF [37]"]} +{"37925315|12681089": []} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"3386782|14889616": ["E-mail: Partha.Dutta@xerox.com."]} +{"14129863|17428811": ["Scalable video coding (SVC) is one approach to enable flexible video transmission over channels with varying throughput [1], [2]."]} +{"14412285|3540699": ["periodically using a Group of Pictures (GOP) structure as in [ 22 ][23], which lasts a period of T time"]} +{"9347860|7686677": ["UE. objective function and Resource Sharing Factor \u2013 During \u03c4, the BS resource elements can be shared in arbitrary ratios between the users. We define the Therefore, the resource sharing factor \ud835\udc65\ufffd,\ufffd\u2208 [0, 1] as the fraction of time that the BS resources are assigned to user upcomini at each time slot t. The received data rate is then \ud835\udc65\ufffd,\ufffd\ud835\udc5f\ufffd,\ufffd . Lower air-time corresponds to less energy consumption as the", "rain at both the network and end user. Consequently, research and standardization efforts are focusing on devising green mechanisms to save energy across all network elements, as well as user devices [1]. Among the wireless network elements, Base Stations (BSs) account for more than 50 percent of the network energy consumption [2]. Therefore, devising green radio access strategies is vital for overal"]} +{"1838785|64404": ["Note that, in a video stream, the video frames are partitioned in Groups of Pictures (GoPs) and the video data rate can only be adapted at the boundary of GoPs [32], [33]."]} +{"1838785|14889616": ["To address this problem, various video rate-adaptation techniques based on scalable video coding or adaptive bitrate switching have been proposed to match the video data rate to the varying channel capacity [5]\u2013[9]."]} +{"1838785|3540699": ["Note that, in a video stream, the video frames are partitioned in Groups of Pictures (GoPs) and the video data rate can only be adapted at the boundary of GoPs [32], [33].", "Note that, in a video stream, the video frames are partitioned in Groups of Pictures (GoPs) and the video data rate can only be adapted at the boundary of GoPs [29] [30]."]} +{"24813895|7851743": ["SON has been addressed as inevitable solution in different sources [1], [5] for MBN optimization.", "Strategies for optimizing energy consumption in MBNs presented in [1], [6] can be subdivided into physical optimization, e."]} +{"24813895|7686677": ["Strategies for optimizing energy consumption in MBNs presented in [1], [6] can be subdivided into physical optimization, e."]} +{"19754216|11726599": ["admission control [1], dynamic bandwidth allocation [2], and adaptive traffic rate control for the available bit rate (ABR) service [3]."]} +{"10870557|14889616": ["Overview of the scalable \nvideo coding extension of the H.264/AVC standard.", "Cross-layer adaptive H.264/AVC \nstreaming over IEEE 802.11e experimental testbed.", "A cross-layer design to \nimprove the H.264 video stream over IEEE wireless networks is proposed by Mai et al. [2010].", "Several similar preload approaches use (hierarchical, layered) scalable \nvideo codecs like scalable MPEG (SPEG) [Huang et al. 2003; Krasic et al. 2003], Multiple Description \nCoding (MDC) [Goyal 2001] and the Scalable Video Coding (SVC) extension to H.264 [Schwarz et al. 2007] \nto adapt to varying network conditions.", "\u2026approaches use (hierarchical, layered) scalable \nvideo codecs like scalable MPEG (SPEG) [Huang et al. 2003; Krasic et al. 2003], Multiple Description \nCoding (MDC) [Goyal 2001] and the Scalable Video Coding (SVC) extension to H.264 [Schwarz et al. 2007] \nto adapt to varying network conditions.", "Thus, we do not have need for H.264/SVC, which is not available on most mobile \ndevices today anyway."]} diff --git a/edge/graph_63460511.jsonl b/edge/graph_63460511.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..089e61652f59013113647eef870ae927464b7627 --- /dev/null +++ b/edge/graph_63460511.jsonl @@ -0,0 +1 @@ +{"6003797|205286988": []} diff --git a/edge/graph_63460565.jsonl b/edge/graph_63460565.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c83012812cedc06c3654bfbc061dcb64e3f0c48 --- /dev/null +++ b/edge/graph_63460565.jsonl @@ -0,0 +1 @@ +{"8889845|1400872": []} diff --git a/edge/graph_63479045.jsonl b/edge/graph_63479045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_634975.jsonl b/edge/graph_634975.jsonl similarity index 100% rename from graph_634975.jsonl rename to edge/graph_634975.jsonl diff --git a/edge/graph_6353293.jsonl b/edge/graph_6353293.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6355516.jsonl b/edge/graph_6355516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80a35d65777264256634c7b6afce638e9dd4c1ed --- /dev/null +++ b/edge/graph_6355516.jsonl @@ -0,0 +1,7 @@ +{"42633680|206583375": []} +{"1271267|763939": ["Similarly, monitoring user positions for roaming or handover purposes is another open problem encountered in mobile environments that, to date, multiple mobility models have been proposed to address [4].", "Despite these efforts, a complete characterization of user mobility is missing in the current literature, with only a few legacy publications addressing mobility management in the context of conventional cellular technology [4] and effects of mobility on the connectivity of wireless systems [5]."]} +{"2889454|7644489": ["I. INTRODUCTION\nMobile traffic is increasing rapidly, and a 1000-fold increment by 2020 is predicted by the industry and academic experts [1]."]} +{"19535960|16335158": ["Wireless sensor network (WSN) WSNs can provide different suitable data and also may be used in many cases such as healthcare, government and environmental services and seismic sensing [10].", "Involved things in the IoT consist of smart devices including mobile phones and other objects like foodstuff, appliance, landmark, monument, work of art [9, 10] that can cooperate together to provide a common target."]} +{"19535960|1230643": ["Recent developments and improvements in technologies have provided devices with high efficiency and low-cost to employ remote sensing applications in large-scale [55]."]} +{"7091368|763939": ["mobility models [33,37] and for tactical mobile networks [4]."]} +{"19457915|3330461": []} diff --git a/edge/graph_6357481.jsonl b/edge/graph_6357481.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba4156e3e43a5f0e5898a2fe72404b828ec86808 --- /dev/null +++ b/edge/graph_6357481.jsonl @@ -0,0 +1,4 @@ +{"12283340|12860838": []} +{"2477007|13365762": ["MPEG-7 [5] and MPEG-21 [15], in e-learning, like IEEE LOM [11] and SCORM [1], in Digital Libraries, like METS [10], and many others."]} +{"2770173|13365762": ["978-1-4244-8602-1/10/$26.00 \u00a92010 IEEE 76\nvice description, namely the MPEG-7 and the MPEG-21, have been expressed in XML Schema syntax.", "As a consequence, several groups have been working with these standards and a great number of MPEG-7 and MPEG 21 descriptions have been created.", "As already mentioned, the dominant standards for content and service description (MPEG-7 and MPEG-21 respectively) in the multimedia domain have been expressed in XML Schema syntax.", "This is the case in several application domains like, for example, the multimedia domain, where both the MPEG-7 [21] and MPEG-21 [22] standards (used, respectively, for multimedia content and service description) have been expressed using XML Schema syntax."]} +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} diff --git a/edge/graph_63601624.jsonl b/edge/graph_63601624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63641232.jsonl b/edge/graph_63641232.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63689792.jsonl b/edge/graph_63689792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78054fa58f3be77277af5d47466efa48b7b2d0a8 --- /dev/null +++ b/edge/graph_63689792.jsonl @@ -0,0 +1 @@ +{"14759549|14441987": ["Transient loops occur as part of the normal Operation of the routing protocol due to the different delays in [13] the propagation of information to different parts of the network."]} diff --git a/edge/graph_63709314.jsonl b/edge/graph_63709314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6372315.jsonl b/edge/graph_6372315.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63729855.jsonl b/edge/graph_63729855.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..055a271c90fe525223f6cc210a157e19d6818008 --- /dev/null +++ b/edge/graph_63729855.jsonl @@ -0,0 +1 @@ +{"119798548|13985031": []} diff --git a/edge/graph_6375360.jsonl b/edge/graph_6375360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6375373.jsonl b/edge/graph_6375373.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d537628f2633bba20ef6d2be4a2642e2bb8d8804 --- /dev/null +++ b/edge/graph_6375373.jsonl @@ -0,0 +1,6 @@ +{"7183410|393948": ["Deep learning architectures extract high-level features progressively via several layers of feature representations [37]."]} +{"4654785|18093722": ["The study of brain networks, the connectome, is the focus of intense current neuroscience research [100]."]} +{"11478995|7653893": ["\u2026test of functional connectivity (Breakspear et al., 2004; Bullmore et al., 2004), time-series modeling in the wavelet domain (Maxim et al., 2005), inter-subject registration (Suckling et al., 2006) and multiresolution hypothesis testing (Fadili and Bullmore, 2004; Van De Ville et al., 2006).", "Nevertheless, wavelets have advanced to a popular and powerful instrument to analyze biomedical or neuroimaging data (Akay, 1997; Bullmore et al., 2004; Laine, 2000; Sajda et al., 2002; Unser and Aldroubi, 1996; Van De Ville et al., 2006).", "The multiresolution property of the wavelet transform has been used in a variety of applications including functional MRI analysis (for a review see Bullmore et al., 2004 or Van De Ville et al., 2006)."]} +{"47326133|4654785": []} +{"47326133|18093722": ["recently provided a review of popular brain atlases [130]."]} +{"47326133|393948": ["However, learning-based features heavily depend on the training datasets [141]."]} diff --git a/edge/graph_63754743.jsonl b/edge/graph_63754743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_637717.jsonl b/edge/graph_637717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63775891.jsonl b/edge/graph_63775891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41f4156aa6ef0a4779326836e8b7100dd0c77c86 --- /dev/null +++ b/edge/graph_63775891.jsonl @@ -0,0 +1,2 @@ +{"154929850|14269689": []} +{"154929850|13489039": []} diff --git a/edge/graph_63776596.jsonl b/edge/graph_63776596.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4413884846e0f28138c6b228e7fc23912c239e43 --- /dev/null +++ b/edge/graph_63776596.jsonl @@ -0,0 +1,3 @@ +{"40023546|40162482": ["com/) for health education, community outreach, training and simulations purposes [2-18] (see also http://healthcybermap.", "Hansen [4] compared this kind of opposition to introduction of the stethoscope in the 19 century: \u201cWith any innovative technology there are critics who debate its usefulness."]} +{"2953080|16709997": []} +{"33122167|40162482": ["Hansen (2008) described the potential of 3-", "Hansen (2008) argued that there are many gaps, unanswered questions, and potential issues with providing health care education in Second Life because very little empirical research has been conducted to suggest its efficacy [6].", "However, the author felt that medical education in Second Life is something that should be pursued, and that research should be conducted to evaluate the value of the strategy and the effect of the experience of the users [6].", "There are few research articles describing or surveying the range of health-related activities on Second Life [5,6,7,8].", "Hansen (2008) described the potential of 3-D health care learning environments on Second Life in her review of existing literature [6]."]} diff --git a/graph_637800.jsonl b/edge/graph_637800.jsonl similarity index 100% rename from graph_637800.jsonl rename to edge/graph_637800.jsonl diff --git a/edge/graph_6383012.jsonl b/edge/graph_6383012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b7c998854d5440a342dfa583d91581221d799bc --- /dev/null +++ b/edge/graph_6383012.jsonl @@ -0,0 +1,2 @@ +{"122847687|9010313": []} +{"131370925|10859746": ["Although mixed pixels continue to occur at boundaries between features regardless of feature size or sensor resolution (Schowengerdt, 2006), the issue can be alleviated by either using the finest resolution imagery available or employing spectral unmixing classifiers (Boyd and Foody, 2011)."]} diff --git a/edge/graph_6383103.jsonl b/edge/graph_6383103.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6385142.jsonl b/edge/graph_6385142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db8b2112381fb0302dd0fadc6478df069a73a083 --- /dev/null +++ b/edge/graph_6385142.jsonl @@ -0,0 +1,3 @@ +{"5662235|15782139": ["Previous works [ 5 , 4, 1] on signature verification and identification discuss methods for bot h writer dependent and writer independent cases."]} +{"20245496|14580698": [", (a) between-writer variation and within-writer variability [4, 5], and (b) character and word segmentation [7], the automated processing of scanned images of historical documents (Figure 1) is additionally hampered by: (c) variable but low image quality; (d) difficult text-ink vs background separation; (e)"]} +{"7414565|15782139": ["This solution is primarily restricted to machine printed text content because state-of-the-art handwriting recognition is error prone and is limited to applications with a small vocabulary, such as postal address recognition and bank check reading [24]."]} diff --git a/edge/graph_63855717.jsonl b/edge/graph_63855717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63858588.jsonl b/edge/graph_63858588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6387482.jsonl b/edge/graph_6387482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d27a3e8afcdf368c2a32137e38289a5a01feebf --- /dev/null +++ b/edge/graph_6387482.jsonl @@ -0,0 +1,19 @@ +{"952755|14529270": ["As stated in [2], \u201ca balanced interaction between both methods could be a solution to a generic model for video representation\u201d."]} +{"31307637|192934": []} +{"2055896|18050848": []} +{"2055896|6028805": []} +{"2055896|9045232": ["Various approaches have been implemented towards face detection and tracking and facial feature extraction [22], [92]\u2013[96] and will be discussed in more detail in Section IV.", "Static visual features are commonly used for face recognition [18]\u2013[22], [92]\u2013[96], while dynamic visual features for speaker recognition, since they contain additional important temporal information that captures the dynamics of facial feature changes, especially the changes in the mouth region (visual speech).", "It has attracted significant interest in the literature [93]\u2013[96], [104]\u2013[106]."]} +{"13099189|28670512": ["Mathematically this is a partially observed Markov decision problem [44,75] as formulated in the following.", "The above problem is a special case of the \ufb01nite-state, \ufb01nite-observation, partially observed Markov decision problems addressed in [44,75]."]} +{"61914064|192934": []} +{"22924928|18050848": ["It does not address the problem of audiovisual speech recognition nor speaker verification: these two issues are already covered in [2, 3].", "In [3], the authors underline that, though it is widely agreed that an important part of speech information is conveyed dynamically, dynamic features extraction is rarely performed; this observation is also verified for correspondencemeasures."]} +{"58072171|9045232": []} +{"6733201|18050848": ["Audio-visual integration can be divided into three categories: feature fusion, decision fusion and model fusion [3-5].", "Many studies have shown that the integration of audio and visual features leads to more accurate speaker identification even in noisy environments [1-3]."]} +{"18172204|191396": ["Based on the selection criterion for the parameter of the number of clusters [ 42 ], the optimal number of event categories can be determined by minimizing the value of .", "A clustering algorithm should achieve the compactness of intra-cluster and isolation of inter-cluster and consider the comprehensive effects of several factors including the defined squared error, the geometric or statistical properties of the data, number of the input data, the dissimilarity (or similarity), and the number of clusters [ 42 ]."]} +{"162180|9045232": ["Over the years various methods for the detection of faces in images and image sequences are reported, see [95] for a comprehensive and critical survey of current face detection methods.", "Face detection techniques aim to identify all image regions which contain a face, regardless of its three-dimensional position, orientation, and lighting conditions used, and if present return their image location and extents [95]."]} +{"162180|192934": ["According to [37] the four best approaches for pattern recognition are:", "\u2022 Bayes classifier: assigns a pattern to the class which has the maximum estimated posterior probability [37]; \u2022 Decision tree: assigns a pattern to a class based on a hierarchical division of feature space [37]; \u2022 k-Nearest neighbor: assigns a pattern to the majority class among the k patterns with smallest distance in feature space [37]; \u2022 Hidden Markov model (HMM): assigns a pattern to a class based on a sequential model of state and transition probabilities [46, 69];"]} +{"3115119|7788290": ["\u2026practical office-scale sentient systems has largely been restricted to the\ndetection of tagged objects (Ipina and Hopper, 2002), although vision-based systems for gesture recognition and motion analysis have been under development for some time (Gavrila, 1999; Turk, 2004; Cerney and Vance, 2005).", "The role of computer vision in practical office-scale sentient systems has largely been restricted to the detection of tagged objects [21], although vision-based systems for gesture recognition and motion analysis have been under development for some time [ 13 , 37, 4]. Approaches relying on probabilistic integration of different sources of visual evidence such as face detectors and models for motion, shape, and colour have shown particular ..."]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"15512141|18050848": ["Such improvements have been typically demonstrated on databases of small duration, and, in most cases, limited to a very small number of speakers (mostly less than ten, and often singlesubject) and to small vocabulary tasks [18], [ 21 ].", "A number of audio-visual corpora, commonly used in the literature, are listed in Table II. Notice that most are the product of efforts by few university groups or individual researchers with limited resources, and as a result, they suffer from one or more shortcomings [18], [ 21 ], [136]: They contain a single or small number of subjects, affecting the generalizability of developed methods to the wider population; they typically have small ..."]} +{"15512141|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory, an active area of research with many applications [91] [92] [93]."]} +{"10408276|9045232": ["As long as it concerns the video modality, the problems of face detection [16] [17], and face recognition [15] [11] have been approached from multiple perspectives.", "The result of this procedure is a Mutual Information Image (MII) ([17]).", "They select the region with the highest value in the MII.", "In order to get a correlation \nmeasure for each face, we compute the average MI of each column of the MII.", "For each video frame they estimate \nthe MI between each pixel and the audio stream, information that they visualize as an Mutual Information \nImage (MII)."]} diff --git a/edge/graph_63886947.jsonl b/edge/graph_63886947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63888583.jsonl b/edge/graph_63888583.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63890542.jsonl b/edge/graph_63890542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63912002.jsonl b/edge/graph_63912002.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22c21481f985d0f36ceb118e70132a3a1e41e7fe --- /dev/null +++ b/edge/graph_63912002.jsonl @@ -0,0 +1,11 @@ +{"61066084|6707996": ["In k -means clustering, it partitions a collection of data into a k number group of data 11,12 ."]} +{"54210453|9045232": []} +{"14807608|5646762": []} +{"14807608|191396": ["For a review on clustering techniques, please refer to (Jain et al., 1999; Xu & Wunsch, 2005; Hruschka et al., 2009)."]} +{"9812369|530484": ["In [8], review of intensity correction has been categorized in model based methods such as low frequency, hyper surface, and statistical models."]} +{"45422884|15553087": []} +{"45422884|9830350": []} +{"45422884|191396": []} +{"45422884|10947138": []} +{"62584421|15068419": []} +{"15151944|191396": ["Concerning the initialization of the parameter vector , we employ the -means algorithm, but we note that other clustering algorithms [29] can be used also."]} diff --git a/edge/graph_6391339.jsonl b/edge/graph_6391339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23b047860d6ec7205ddae8f2009687a24e66c8d5 --- /dev/null +++ b/edge/graph_6391339.jsonl @@ -0,0 +1 @@ +{"15225614|10500613": []} diff --git a/edge/graph_63927538.jsonl b/edge/graph_63927538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6392800.jsonl b/edge/graph_6392800.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63938493.jsonl b/edge/graph_63938493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a10dadf23d0dba741f61118a5ddde5ac09db8f0a --- /dev/null +++ b/edge/graph_63938493.jsonl @@ -0,0 +1,6 @@ +{"20976947|9240891": ["The emergence of electronic transactions has further stressed the importance of trust for their success [5, 6]."]} +{"38711918|627405": ["In addition, Brereton et al. (2007) provide field tips on reviewer training related to developing the protocol.", "Brereton et al. (2007) give examples from the field that illustrate the value of using a protocol in conducting a review."]} +{"38711918|15164501": ["\u2026on electronic sources and whether they always retrieved papers through computer searches (Alavi & Joachimsthaler, 1992; Alavi & Leidner, 2001; Cotton & Tuttle, 1986; Dub\u00e9 & Par\u00e9, 2003; Griffin et al., 1981; Joseph et al., 2007; Leidner & Kayworth, 2006; Marakas et al., 1998; Petty et al., 1984).", "\u2026criteria (Alavi & Carlson, 1992; Alavi & Joachimsthaler, 1992; Robey et al., 2008; Te\u2019eni, 2001) or in their summing up what research methodology would be included (Cotton & Tuttle, 1986; Dub\u00e9 & Par\u00e9, 2003; Griffin et al., 1981; Leidner & Kayworth, 2006; Petty et al., 1984; Pierce & Dunham, 1976)."]} +{"38711918|35897447": ["Piccoli and Ives (2005) present a shorter protocol than the other reviews but nonetheless confirm that they reviewed 117 relevant papers; however, they do not go into much detail beyond this description.", "\u2026negotiation support systems (Lim & Benbasat, 1992), interorganizational systems (Robey, Im, & Wareham, 2008), technology adoption (Venkatesh, Davis, & Morris, 2007), information technology-dependent strategic initiatives (Piccoli & Ives, 2005), and the resource-based view (Wade & Hulland, 2004).", "Piccoli and Ives (2005) first explain the three principal contributions of their framework and then organize their literature review around this framework.", "Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how they examined and coded the papers in their studies.", "Piccoli and Ives (2005) only briefly mention in the conclusion section that they reviewed abstracts for 648 papers from IS, strategic management, and the marketing literature."]} +{"207721227|9240891": ["Trust is investigated in many fields of science, such as computer science, economics, politics, sociology and philosophy (Deutsch 1958, Grandison and Sloman 2000, J\u00f8sang et al. 2007, Misztal 1996).", "For instance, two entities may have one-to-one, one-to-many, many-to-many or many-to-one trust relationships (Grandison and Sloman 2000)."]} +{"39178456|86629084": []} diff --git a/edge/graph_6394616.jsonl b/edge/graph_6394616.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..967a49c7ce5754fee94a5ad616a672166462355e --- /dev/null +++ b/edge/graph_6394616.jsonl @@ -0,0 +1,3 @@ +{"15211644|1386147": []} +{"12950191|192934": ["exponentially during the last few years [ 1 ].", "For the structural mutations, the number of RBFs that can be added or removed in a structural mutation is within the [\ufffd min ,\ufffd max ]= [ 1 , 2] interval.", "variable in the interval [0, 1 ], T (g) = 1\u2212 A(g) the temperature of the neural net, and \ufffd min and \ufffd max a minimum and maximum number of nodes specified as parameters.", "u is a random uniform variable in the interval [0, 1 ], \ufffd o and \ufffd h are previously defined ratios of number of connections in the hidden and the output layer, and no and nh are the current number of connections in the output and the hidden layers."]} +{"1083700|8530790": ["It consists of a family of non-dominated points, a so-called Pareto front [7], which describes the tradeoff among contradicted objectives.", "Finally, the simple elitism scheme [7] is also applied as the bookkeeping for storing the Pareto individuals obtained in each generation."]} diff --git a/edge/graph_63949981.jsonl b/edge/graph_63949981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6396569.jsonl b/edge/graph_6396569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5061e4907f6096832c08218370aa9268bb6faf1 --- /dev/null +++ b/edge/graph_6396569.jsonl @@ -0,0 +1,7 @@ +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"58337064|13372227": []} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} +{"18015668|14441987": ["Furthermore, some applications only require relative positions of nodes, such as some direction-based routing algorithms [4], [5]."]} +{"14784709|2835258": ["Yet it is common, in these sparse mobile sensor networks, to require up-to-date location information for each node in the network [17][21]."]} +{"5650300|164835": []} diff --git a/edge/graph_63969224.jsonl b/edge/graph_63969224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_63993468.jsonl b/edge/graph_63993468.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c19ac37391941418da856179579804f7a8461e61 --- /dev/null +++ b/edge/graph_63993468.jsonl @@ -0,0 +1 @@ +{"11015288|10137283": ["That said, the issue of IDS alert veri\ufb01cation ( e.g., [18]\u2013[20]) and IDS trust management has received considerable research attention over the years ( e.g., [21]\u2013[24])."]} diff --git a/edge/graph_6400766.jsonl b/edge/graph_6400766.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d9d8e0786266fd4683258a86db3f18d83ee9b4d0 --- /dev/null +++ b/edge/graph_6400766.jsonl @@ -0,0 +1,12 @@ +{"10747348|10290908": ["Next, online spike sorting [38] is performed to isolate single neurons in the vicinity of each electrode."]} +{"1522994|17464562": []} +{"1995121|8363289": []} +{"5928833|1708582": ["have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996).", "\u2026is a self-contained and yet relatively short summary that can help newcomers to the field to develop a good sense of the state of the art, as well as existing researchers to broaden their overview of the field, an article, similar to that of Kaelbling et al. (1996), but with an updated contents.", "In 1996, Kaelbling et al. have written a nice, compact survey about the approaches and algorithms available at the time (Kaelbling et al., 1996)."]} +{"13513684|1708582": []} +{"13508233|1708582": ["Some value-function-based algorithms use a model of the MDP (the functions f and \u03c1 ) [1], [31], while others are model-free and work by only using data [2], [32]."]} +{"13508233|1995121": []} +{"1708582|17464562": []} +{"12340769|1708582": ["For reviews of RL see Sutton and Barto (1998); Bertsekas and Tsitsiklis (1996); Kaelbling et al. (1996).", "In Reinforcement Learning (RL) an agent learns the behavior of the system through trial-and-error with an unknown dynamic environment (see Kaelbling et al., 1996)."]} +{"7503127|1708582": ["The domain which has been chosen for the experiments is a discrete two dimensional maze-world (e.g., Kaelbling et al., 1996).", "The domain which has been chosen for the experiments is a discrete two dimensional maze-world (e.g., Kaelbling, Littman, and Moore, 1996 )."]} +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} +{"724794|1708582": ["\u2026at designing algorithms by which autonomous agents can learn to behave in some appropriate fashion in some environment, from their interaction with this environment or from observations gathered from the environment (see e.g. Kaelbling et al. (1996) or Sutton and Barto (1998) for a broad overview)."]} diff --git a/edge/graph_64026731.jsonl b/edge/graph_64026731.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16b6e92702e25eea61b863e88c3967c452fb481f --- /dev/null +++ b/edge/graph_64026731.jsonl @@ -0,0 +1,2 @@ +{"28307692|15082313": ["Transcriptional networks are frequently modelled as Gaussian graphical models (Markowetz & Spang, 2007)."]} +{"37925315|12681089": []} diff --git a/edge/graph_64051400.jsonl b/edge/graph_64051400.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23e4925c0dfcfc03f9b1f975c64a0ddb4842c95a --- /dev/null +++ b/edge/graph_64051400.jsonl @@ -0,0 +1 @@ +{"206770714|2457428": ["They realize revocation by revoking attribute itself using timed rekeying mechanism, which is implemented by setting expiration time on each attribute."]} diff --git a/edge/graph_64059171.jsonl b/edge/graph_64059171.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6407074.jsonl b/edge/graph_6407074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5664793263cf87ff926eb990ce36e3ae3ffebb55 --- /dev/null +++ b/edge/graph_6407074.jsonl @@ -0,0 +1 @@ +{"706371|18148591": ["Inter-cell interference is treated as noise at the receiver side and is handled by resorting to improved point-to-point communications between the base station (BS) and the mobile station (MS), using efficient coding and/or single-link multiple-antenna techniques [2]."]} diff --git a/edge/graph_64088004.jsonl b/edge/graph_64088004.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6409083.jsonl b/edge/graph_6409083.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25fa0be554e848b970ddf6f9d9778ae2edffa218 --- /dev/null +++ b/edge/graph_6409083.jsonl @@ -0,0 +1,2 @@ +{"16314743|17623572": ["Malicious node is known as blackhole since it consumes data packets forwarded to it and never forwards those [7]."]} +{"16314743|7986140": []} diff --git a/edge/graph_64092824.jsonl b/edge/graph_64092824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6409498.jsonl b/edge/graph_6409498.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da491d801088284133e34795db3c155784710383 --- /dev/null +++ b/edge/graph_6409498.jsonl @@ -0,0 +1 @@ +{"27740454|6409498": []} diff --git a/edge/graph_6413523.jsonl b/edge/graph_6413523.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6414421.jsonl b/edge/graph_6414421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eac454c863274b9062a3373c8a7abffc27cf5520 --- /dev/null +++ b/edge/graph_6414421.jsonl @@ -0,0 +1,9 @@ +{"3079466|4395259": ["In recent years, there have been several research contributions that follow an alternative path towards key generation by using an information-theoretic approach to derive secrets from unauthenticated broadcast channels (see [6] for a survey)."]} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"23919432|6779551": ["Note that in [5], a survey of wireless physical-layer security is provided including authentication, confidential communications, and secretkey generation."]} +{"1386128|4395259": ["Physical layer security (PLS) which aims to achieve perfect secrecy therefore has been received extensive research interest [1]."]} diff --git a/edge/graph_64149568.jsonl b/edge/graph_64149568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7a79b3734366fb1f5fd42b0d00ebb70a276ac535 --- /dev/null +++ b/edge/graph_64149568.jsonl @@ -0,0 +1,2 @@ +{"56168586|1805048": []} +{"13407573|2451860": ["Consequently, there is an increasing interest in performing data analysis tasks [7, 47]."]} diff --git a/edge/graph_6415369.jsonl b/edge/graph_6415369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f902e02550f212687db6e7c58c61dc991399d55 --- /dev/null +++ b/edge/graph_6415369.jsonl @@ -0,0 +1 @@ +{"18697410|6415369": []} diff --git a/edge/graph_64199278.jsonl b/edge/graph_64199278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d5d8797bf7fe5196b5dd9ed79ef7fb191aad8c1 --- /dev/null +++ b/edge/graph_64199278.jsonl @@ -0,0 +1,2 @@ +{"32744042|10559330": []} +{"6373370|17966235": []} diff --git a/edge/graph_64205452.jsonl b/edge/graph_64205452.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fdbf232f688d1fdbc8274a138c9421e515e92b4 --- /dev/null +++ b/edge/graph_64205452.jsonl @@ -0,0 +1,5 @@ +{"120157943|3755658": []} +{"120157943|14132386": ["The clustering approach allows a WSN of high scalability, less consumed energy and thus longer lifetime for the whole network [12].", "We use the radio model adopted in [10-14], which is the first order radio model."]} +{"120157943|1230643": ["management, etc [1,2]."]} +{"14739051|1236072": ["Based on the structure of the network, routing in WSN can\nbe categorized into three types [21]: flat-based routing, Cluster based (hierarchical-based) routing, and location-based routing.", "Hence, a sensor node would not only sense and send its own data but also act as router and propagate the data of its neighbors."]} +{"16324015|1230643": []} diff --git a/edge/graph_64208705.jsonl b/edge/graph_64208705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..771637cdc0b63069be00f1e2979fc57188fa85b0 --- /dev/null +++ b/edge/graph_64208705.jsonl @@ -0,0 +1 @@ +{"64115899|35462776": ["Most systems are hybrids that use components of both geometric and symbolic models to assist in wayfinding (Afyouni et al., 2012). Each system provides cues or prompts that help patrons along their specific pathway. Providing cues with left-right directions has proven quite effective in terms of speed and accuracy. Route descriptions do not need to be extremely accurate and precise, but did need to provide directions from one pathway marker to the next (Hund and Gill, 2014; Hund and Padgitt, 2010; Lorenz et al., 2013). Hund and Padgitt (2010) emphasize that cardinal descriptors were particularly effective as patrons practice their wayfinding abilities while generalizing locations and temporal limits. Focussing on wayfinding factors such as overall speed, environmental obstacles, and processing speed, they reported that the worst user-rated wayfinding descriptions were, in fact, faster than more precise and intricate descriptions. This finding suggests a \u201cgood enough\u201d strategy that gets wayfinders to the next description point. Frankenstein et al. (2012) support this finding as they determined that patrons prefer a longer line of sight in wayfinding activities that helps them to find the next landmark. In addition to increased line of sight, wayfinders also used landmarks and background knowledge to facilitate wayfinding activities. The size of the space and wayfinding materials, such as \u201cYou Are Here\u201d maps with reasonable layouts, and interactions with others help to build wayfinding assistance. In addition to these wayfinding strategies, Kato and Takeuchi (2003) determined that wayfinders often depend on others for directions to compensate for their own poor sense of direction, timid attitudes in a new environment, and poor strategy choice.", "Most systems are hybrids that use components of both geometric and symbolic models to assist in wayfinding (Afyouni et al., 2012). Each system provides cues or prompts that help patrons along their specific pathway. Providing cues with left-right directions has proven quite effective in terms of speed and accuracy. Route descriptions do not need to be extremely accurate and precise, but did need to provide directions from one pathway marker to the next (Hund and Gill, 2014; Hund and Padgitt, 2010; Lorenz et al., 2013). Hund and Padgitt (2010) emphasize that cardinal descriptors were particularly effective as patrons practice their wayfinding abilities while generalizing locations and temporal limits.", "Most systems are hybrids that use components of both geometric and symbolic models to assist in wayfinding (Afyouni et al., 2012).", "Most systems are hybrids that use components of both geometric and symbolic models to assist in wayfinding (Afyouni et al., 2012). Each system provides cues or prompts that help patrons along their specific pathway. Providing cues with left-right directions has proven quite effective in terms of speed and accuracy. Route descriptions do not need to be extremely accurate and precise, but did need to provide directions from one pathway marker to the next (Hund and Gill, 2014; Hund and Padgitt, 2010; Lorenz et al., 2013). Hund and Padgitt (2010) emphasize that cardinal descriptors were particularly effective as patrons practice their wayfinding abilities while generalizing locations and temporal limits. Focussing on wayfinding factors such as overall speed, environmental obstacles, and processing speed, they reported that the worst user-rated wayfinding descriptions were, in fact, faster than more precise and intricate descriptions. This finding suggests a \u201cgood enough\u201d strategy that gets wayfinders to the next description point. Frankenstein et al. (2012) support this finding as they determined that patrons prefer a longer line of sight in wayfinding activities that helps them to find the next landmark.", "Most systems are hybrids that use components of both geometric and symbolic models to assist in wayfinding (Afyouni et al., 2012). Each system provides cues or prompts that help patrons along their specific pathway. Providing cues with left-right directions has proven quite effective in terms of speed and accuracy. Route descriptions do not need to be extremely accurate and precise, but did need to provide directions from one pathway marker to the next (Hund and Gill, 2014; Hund and Padgitt, 2010; Lorenz et al., 2013). Hund and Padgitt (2010) emphasize that cardinal descriptors were particularly effective as patrons practice their wayfinding abilities while generalizing locations and temporal limits. Focussing on wayfinding factors such as overall speed, environmental obstacles, and processing speed, they reported that the worst user-rated wayfinding descriptions were, in fact, faster than more precise and intricate descriptions. This finding suggests a \u201cgood enough\u201d strategy that gets wayfinders to the next description point. Frankenstein et al. (2012) support this finding as they determined that patrons prefer a longer line of sight in wayfinding activities that helps them to find the next landmark. In addition to increased line of sight, wayfinders also used landmarks and background knowledge to facilitate wayfinding activities. The size of the space and wayfinding materials, such as \u201cYou Are Here\u201d maps with reasonable layouts, and interactions with others help to build wayfinding assistance. In addition to these wayfinding strategies, Kato and Takeuchi (2003) determined that wayfinders often depend on others for directions to compensate for their own poor sense of direction, timid attitudes in a new environment, and poor strategy choice. Obtaining directions from others produced a point-to-point pathway that helped wayfinders locate what they were looking for. Bicz\u00f3k et al. (2014) used logic networks to help identify the best pathways to specific people and services."]} diff --git a/edge/graph_64218659.jsonl b/edge/graph_64218659.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6423795.jsonl b/edge/graph_6423795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..460f9e06a31aea53498f105172577d3325be0f18 --- /dev/null +++ b/edge/graph_6423795.jsonl @@ -0,0 +1,8 @@ +{"9503084|17639662": []} +{"9503084|16082889": ["The proposed mosaicing-by-recognition algorithm has been inspired by the segmentation-by-recognition algorithm, which is a classical but still up-to-date strategy for the recognition of cursive words/sentences on a still image [17,18].", "Like other text recognizers based on the segmentation-byrecognition framework, the use of lexicon will be helpful to tackle with the over-segmentation [17,18].", "The mosaicing-by-recognition algorithm for the simple case is closely related to segmentation-by-recognition, or recognition-based segmentation [17,18], which is a well-known technique for recognizing a single line of text in a still image."]} +{"9503084|2762290": ["The proposed mosaicing-by-recognition algorithm has been inspired by the segmentation-by-recognition algorithm, which is a classical but still up-to-date strategy for the recognition of cursive words/sentences on a still image [17,18].", "Like other text recognizers based on the segmentation-byrecognition framework, the use of lexicon will be helpful to tackle with the over-segmentation [17,18].", "The mosaicing-by-recognition algorithm for the simple case is closely related to segmentation-by-recognition, or recognition-based segmentation [17,18], which is a well-known technique for recognizing a single line of text in a still image."]} +{"16963812|2762290": ["Casey and Lecolinet [4] provided a comprehensive literature survey of character segmentation methods for document images."]} +{"5053740|16082889": []} +{"5053740|15782139": []} +{"18680326|16082889": []} +{"18680326|15782139": []} diff --git a/edge/graph_6425690.jsonl b/edge/graph_6425690.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_64292.jsonl b/edge/graph_64292.jsonl similarity index 100% rename from graph_64292.jsonl rename to edge/graph_64292.jsonl diff --git a/edge/graph_6430339.jsonl b/edge/graph_6430339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6430931.jsonl b/edge/graph_6430931.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2bb42421aaca606018fbf8b9e76243b7625e7b4f --- /dev/null +++ b/edge/graph_6430931.jsonl @@ -0,0 +1,6 @@ +{"7847316|18782652": ["Rule pruning is a commonplace technique in data mining [3].", "tually, there are several classification-rule discovery algorithms that were explicitly designed to improve rule set simplicity, even at the expense of reducing the predictive accuracy [1], [3], [4]."]} +{"24098390|38476": ["The function h is usually produced by searching through a space H of candidate classifiers and returning the function h that performs well on the training examples during a learning process [22].", "In structural pattern recognition tasks, there are N training examples where each training example consists of a pattern and a target class (x, y) [22]."]} +{"18184945|192934": ["Detailed descriptions of the back-propagation algorithm can be found in [4][9].", "RBF networks have been proven to be universal approximators and have the properties of fast convergence, easy solution to regularization, and robustness to outliers [4]."]} +{"1501205|14697846": ["P2P systems in general can be classified into three categories: Purely decentralized, partially centralized, and hybrid decentralized [18].", "According to the five Ps [18] Probe, Penetrate, Persist, Propagate and Paralyze, the attacker tries to"]} +{"638368|5473785": ["Although some of these algorithms can give good results on some benchmark data sets, there are still several problems such as node ordering requirement, lack of efficiency and lack of publicly available learning tools (Neapolitan, 1990)."]} +{"5193611|1437067": ["These methods are classified into Pittsburgh or Michigan approaches (Freitas, 2002)."]} diff --git a/edge/graph_6431014.jsonl b/edge/graph_6431014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..608d37725714a0081b4108dfe6fcf06752942795 --- /dev/null +++ b/edge/graph_6431014.jsonl @@ -0,0 +1,3 @@ +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"131030053|2854761": []} +{"131030053|1230643": []} diff --git a/edge/graph_64318689.jsonl b/edge/graph_64318689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64343270.jsonl b/edge/graph_64343270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0da9245bef584cde4a455d2b70151c52a41c153 --- /dev/null +++ b/edge/graph_64343270.jsonl @@ -0,0 +1,4 @@ +{"10256300|2457428": ["In the last few years, a lot of group key management protocols have been conducted in the literature to address the confidentiality issue in group communication [ 15 ].", "There are three categories of group key management protocols: centralized architectures, decentralized (or hierarchical) architectures, and distributed architectures [ 15 ]."]} +{"16751758|2457428": ["Next, the security requirements of multicast are forward secrecy and backward secrecy [2-5].", "An Overview to Structure of Logical Key Tree In LKH based protocols [5-14], the members of multicast group are mapped with the leaves of a logical key tree (Figure 6)."]} +{"7266849|2457428": []} +{"6341101|2457428": ["Previous work [2-4] surveys the group key management protocols for addressing rekeying when dynamic group memberships occurs in wired networks without considering host mobility in wireless environment.", "Work in [2-4] surveys the existing group key management protocols for wired networks."]} diff --git a/edge/graph_64345410.jsonl b/edge/graph_64345410.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac1170e4335c1ff9471501b5b6b530af6d6ef8e3 --- /dev/null +++ b/edge/graph_64345410.jsonl @@ -0,0 +1,2 @@ +{"14161008|17292349": ["Georgiev et al. focus primarily on the incorrect validation\nof hostnames in server certificates at a different level in the software stack\u2014in applications, transport libraries, and Webservices middleware.", "The focus of this paper is on server certificate authentication, which is the most common usage pattern for SSL certificates."]} +{"8160734|13172512": ["Such nuanced policy formulation and enforcement requires a granular view of the network traffic that is clearly beyond the scope of traditional protocol/port/volumetric based classification systems [8, 10, 18]; and their primitive DPI (deep-packet-inspection) counterparts [14].", "Consequently, a number of techniques have been proposed over the years to address this problem; a survey of these may be found in [9, 18]."]} diff --git a/edge/graph_64370241.jsonl b/edge/graph_64370241.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64374836.jsonl b/edge/graph_64374836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64378648.jsonl b/edge/graph_64378648.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64398360.jsonl b/edge/graph_64398360.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_64404.jsonl b/edge/graph_64404.jsonl similarity index 100% rename from graph_64404.jsonl rename to edge/graph_64404.jsonl diff --git a/edge/graph_6442720.jsonl b/edge/graph_6442720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6444031.jsonl b/edge/graph_6444031.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8dcf38c8f7de634f9ecf1bc51fcb67da1ef49fb --- /dev/null +++ b/edge/graph_6444031.jsonl @@ -0,0 +1 @@ +{"1837859|2294541": ["Our evaluation shows that DSybil would continue to provide high-quality recommendations even when a millionnode botnet uses an optimal strategy to launch a sybil attack."]} diff --git a/edge/graph_6444295.jsonl b/edge/graph_6444295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64443997.jsonl b/edge/graph_64443997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69fa78f32d276f75f2480f4ad7891e8c4bc3debd --- /dev/null +++ b/edge/graph_64443997.jsonl @@ -0,0 +1 @@ +{"18523933|10762348": ["The aims of bioinformatics, as conceived by biologists, are outlined in [10]."]} diff --git a/edge/graph_64453134.jsonl b/edge/graph_64453134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64458346.jsonl b/edge/graph_64458346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71358e7add6ef516084428f0e5f3193a5c59b416 --- /dev/null +++ b/edge/graph_64458346.jsonl @@ -0,0 +1,3 @@ +{"7732405|9504064": ["For convenience, we use terminology coming from the Business Process Modeling and Notation (BPMN) standard (see [13])."]} +{"9948540|16378248": ["A classification of transformation approaches is reported in [12, 13], along with a high-level discussion on pros and cons of each type of transformation approaches.", "This is perhaps because in order to support traceability, a mechanism should be proposed to establish and maintain explicit 5 In [12, 13], patterns are considered as one type of transformation rules.", "For rulebased and pattern-based transformation approaches, as indicated in [12, 13], transformation rules(5) should clearly specify, for example, their application domains, parameters, application constraints, and directions.", "A quite exhaustive list of such tools and languages can be found in [13]."]} +{"36183890|9504064": ["[19] it is possible to findmany other surveys comparing BPMN with other notations such as BPEL, EPC, YAWL, XPDL [20\u201324]."]} diff --git a/edge/graph_64472743.jsonl b/edge/graph_64472743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64487699.jsonl b/edge/graph_64487699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6448864.jsonl b/edge/graph_6448864.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64506244.jsonl b/edge/graph_64506244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbd41b21c3287d5b0924e73391b2471ff019dcb7 --- /dev/null +++ b/edge/graph_64506244.jsonl @@ -0,0 +1 @@ +{"110510|1708582": ["trial-and-error with an unknown dynamic environment, see (Kaelbling et al., 1996)."]} diff --git a/edge/graph_64514138.jsonl b/edge/graph_64514138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64517980.jsonl b/edge/graph_64517980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64541012.jsonl b/edge/graph_64541012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64573664.jsonl b/edge/graph_64573664.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23d33c05e515dc4a4a0b0fc6c79c7c23e21ed67a --- /dev/null +++ b/edge/graph_64573664.jsonl @@ -0,0 +1,4 @@ +{"58901801|8365617": ["In [28], three types of algorithms are presented and compared, namely, the sliding window algorithm, the top-down algorithm, and the bottom-up algorithm, and a new approach, that is claimed to overcome the inconveniences of these three algorithms, is introduced.", "In [28,29] the authors focus on the issue of representing time series data in order to effectively and efficiently apply DM."]} +{"58901801|18890": ["Interesting reviews can be found in [30,31]."]} +{"9385544|16362395": []} +{"9385544|8365617": []} diff --git a/edge/graph_64585576.jsonl b/edge/graph_64585576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a5f401452d1ed3634b775c0a75c7ecfa1cec60a --- /dev/null +++ b/edge/graph_64585576.jsonl @@ -0,0 +1,6 @@ +{"168060627|18526204": ["Typical text mining tasks include information extraction, text categorization, text clustering, document summarization, and association analysis (e.g., Pennebaker et al. 2003; Gupta and Lehal 2009; Ramanathan and Meyyappan 2013)."]} +{"22568595|13640443": ["Among the many characteristics of online retail, the most obvious one is the unavailability of physical touch between consumer and product, which is possible in physical stores; so the consumers\u2019 purchase decision relies solely on online product information [1]."]} +{"7344916|206742377": ["A lot of efforts have been invested in information extraction from web [3], opinion mining [4], and in particular review mining [4]\u2013[6]."]} +{"58349574|206742377": ["Chang et al. [8] surveyed major web data extraction approaches and compared them on three dimensions: task domain, the automation degree, and the techniques used."]} +{"5786217|14541573": []} +{"6431585|16575201": ["(2) We used a combination of association mining and probabilistic approach [11] to extract domain specific feature.", "In [14], it tries to extract domain specific feature by using the probabilistic approach [11] at document level."]} diff --git a/edge/graph_6459155.jsonl b/edge/graph_6459155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9645ff5914c5344a98a2bd3ec12b6a9bf217633f --- /dev/null +++ b/edge/graph_6459155.jsonl @@ -0,0 +1 @@ +{"7346949|175549": ["The absence of any recombination strategy makes our ES resemble another class of EA, evolutionary programming(EP), initially conceived to optimize machine intelligence [21] and later accepted as an all-purpose optimization method [ 22 ], [23]."]} diff --git a/edge/graph_6462262.jsonl b/edge/graph_6462262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5274032d341ed1999f7c3dbabbd30e220370574 --- /dev/null +++ b/edge/graph_6462262.jsonl @@ -0,0 +1,4 @@ +{"7057990|3821062": []} +{"32079630|7185733": []} +{"35402964|16944441": []} +{"18904291|1142636": ["Semantic annotation with relations other than hypernymy are surveyed in [21], and again, regular expressions are a commonly used technique.", "Similarly, comparing the performance of our system with those surveyed in [21] is not particularly meaningful."]} diff --git a/edge/graph_64643926.jsonl b/edge/graph_64643926.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bcc8101eaf55d8b76ab52b92f727a66191d7b15e --- /dev/null +++ b/edge/graph_64643926.jsonl @@ -0,0 +1,31 @@ +{"51979761|3348390": ["In [19], context-aware computing for the IoT was comprehensively surveyed, while in [20] the design of a context-aware system for application in an industrial assembly environment was presented; this paper focused on the cognitive model for robot group controls."]} +{"6988770|8815923": ["For grasping [37], grasp stability of finger contacts can be learned from previous grasps on an object [45]."]} +{"17598751|14441987": ["A survey on these work can be found in [18]."]} +{"206584313|41998167": ["A lot of MAC protocols for WSNs have been proposed in the literature, and numerous surveys on WSN MAC protocols can be found in [53], [52], and [51].", "Despite the long history of MAC/Routing protocols, Problems remain and others keep emerging with regard to the rapid growth of M2M applications [52], [53], [51], [54], [55], [56]."]} +{"206584313|1230643": ["services, as they are focused on energy efficiency, wireless networking, and protocols [14]."]} +{"1765387|2835258": ["Different forwarding schemes are compared in [11]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"6021747|5630105": ["A literature review of these scheduling techniques can be found in [91]."]} +{"6021747|37052879": ["paper [25], published in 2010, briefly introduced the differences of technical features among WIA-PA, ISA100."]} +{"6021747|1503157": ["During the past decade, WSNs had found their way into a wide variety of applications [3], such as health monitoring of civil infrastructures [4], personal health monitoring [5], smart grid [6], agriculture [7], habitat monitoring [8], and industrial automation [9]."]} +{"6816078|206583375": []} +{"29040361|7360895": []} +{"20608595|8914588": ["It has been widely used [5-8] for designing self-managed systems that automatically adapt their structure and behavior based on the context changes."]} +{"153435763|634975": []} +{"31381421|16335158": ["Sensor-cloud computing: sensor-cloud computing refers to the on-field WSN applications empowered with cloud computing (Ojha et al., 2014; Alamri et al., 2013; Zhu et al., 2014)."]} +{"31381421|1503157": ["Among all these technologies, the agriculture domain is mostly explored concerning the application of WSNs in improving the traditional methods of farming (ur Rehman et al., 2014; Zhao et al., 2013; Wang et al., 2006; Akyildiz et al., 2002a,b; Akyildiz and Kasimoglu, 2004; Yick et al., 2008; Ruiz-Garcia et al., 2009)."]} +{"31381421|1230643": []} +{"59734518|5401262": []} +{"59734518|7360895": []} +{"31740306|6988770": []} +{"57894595|26071662": ["As for the integration problem of the data [32], we give out the integration on the basis of the decision-level, that is"]} +{"2346072|7360895": ["There are several challenges in recognizing human facial affect during HRI including: lack of control over environmental lighting conditions and working distances [58, 98], real-time computational requirements [58, 99], processing spontaneous dynamic affective expressions and states [100], and physical and technology constraints [101]."]} +{"2346072|14303607": ["In general, categorical models consist of a finite number of discrete states, each representing a specific affect category [37, 38].", "Dimensional models, on the other hand, also known as continuous models, use feature vectors to represent affective expressions in multi-dimensional spaces, allowing for the representation of varying intensities of affect [37, 39].", "The neuroscience and cognitive science fields have identified two leading types of models that describe how people perceive and classify affect: categorical and dimensional [37]."]} +{"8179751|6988770": []} +{"14818826|206583375": ["This set-up provides an unobtrusive localisation and monitoring service that complies with privacy issues [30, 31]."]} +{"21327837|778117": ["is a model based approach widely used in robotics [22].", "has been covered in many publications (see [21],[22] for surveys), generally inspired from the control engineering techniques discussed above."]} +{"7729291|1599458": ["Various heterogeneous sensor devices in IoT environment provide basic information for configuring context information to provide services such as monitoring, deployment, and management [6, 8].", "In recent years, as the IoT technology has become popular in industry fields, context-awareness technology has been emphasized to provide customized services to users [8, 9]."]} +{"7729291|3348390": ["Recently a number of studies to provide customized services to users have been carried out in various perspectives such as sensor devices and robots in IoT environment [1-4]."]} +{"7729291|622308": ["As a typical example, the JDL model [15] expresses the process of dividing and combining data in stages in four levels."]} +{"16771091|6988770": ["For this reason, during the last few years, an important number of research papers and projects are addressing the use of cloud infrastructures in robotics [1]\u2013[4]."]} diff --git a/edge/graph_6464919.jsonl b/edge/graph_6464919.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64649835.jsonl b/edge/graph_64649835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6465226.jsonl b/edge/graph_6465226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64674015.jsonl b/edge/graph_64674015.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c25810cbcbc52b994f8e8b67c8943f6d0a2363a1 --- /dev/null +++ b/edge/graph_64674015.jsonl @@ -0,0 +1,7 @@ +{"10651041|206778272": ["Refactoring the underlying network makes a \u201cco-design\u201d approach possible, whereby the design of the infrastructure and the interface take each other and the user into account, as with the user-centered design approach suggested for creating software infrastructures [34].", "\u2026suggested that the ability to refactor the underlying network infrastructure\u2014changing where function is placed within the modules of an existing system (as is often done with large software systems [34]) can ultimately improve home networking interfaces without crippling existing functions [7]."]} +{"263015|2623404": ["[38] present programable networks in the context of SDN."]} +{"263015|1230643": ["Wireless Sensor Networks (WSNs) [57], [58] differ substantially from WCNs with respect to network and node"]} +{"7114348|2623404": []} +{"7637161|2623404": ["INTRODUCTION Software defined networking (SDN) is an emerging technology which separates the forwarding functions from control functions and enables network-wide programmability [1], [2], [3]."]} +{"37683350|2623404": ["The ability of SDN to directly insert detailed traffic flows on the data plane increases the flexibility to handle the residential network traffic.(6) Similarly, the centralization of the control plane provides an opportunity to leverage the computational resources of the ISP to develop sophisticated applications to control the data plane."]} +{"19199643|2521001": ["As smart home automation products flood the market, they become easy targets for network attackers [7]."]} diff --git a/edge/graph_64682244.jsonl b/edge/graph_64682244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7be2aab61f3122b4e7c713f2f2364abdcc62e803 --- /dev/null +++ b/edge/graph_64682244.jsonl @@ -0,0 +1 @@ +{"39937224|9175918": ["Hence conventional cryptography is more popular than chaosbased cryptography [5]."]} diff --git a/edge/graph_64685656.jsonl b/edge/graph_64685656.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6715a25268aa84ee8a9c123f5b95bdccca93afe6 --- /dev/null +++ b/edge/graph_64685656.jsonl @@ -0,0 +1,6 @@ +{"1615246|9176080": ["Therefore, much work has been done to study hiding data on the digital image [3]."]} +{"15585205|9176080": ["For a detailed survey on steganography in images, interested readers can refer to [7, 17, 21, 75].", "Up till now, adaptive techniques have no known statistical vulnerabilities [17].", "Avoid using videos with smooth homogeneous background [17]: studies shows that the human visual system can easily spot artifacts in areas of homogeneous color [30]."]} +{"16586481|9176080": ["[12] present a steganography technique based on integer wavelet transform and used Munkre\u2019s algorithm."]} +{"17464678|9176080": ["The distortion caused by data embedding is called the embedding distortion [3]."]} +{"29295305|9176080": []} +{"18158441|9176080": ["In traditional steganographic schemes, both embedding efficiency and embedding payload are contradictions [5, 34]."]} diff --git a/edge/graph_64687554.jsonl b/edge/graph_64687554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..95fced3f4b744bd859f5bba691c1674ecb066695 --- /dev/null +++ b/edge/graph_64687554.jsonl @@ -0,0 +1,11 @@ +{"2567879|9104850": ["The World Wide Web (WWW) is one of the most popular applica\u00adtions currently \nrunning on the Internet and has driven the rapid growth of the Internet [Wang 1999]."]} +{"3500624|2906773": []} +{"3500624|18037424": []} +{"880588|192934": []} +{"2549945|9104850": []} +{"30016512|207209718": ["computers, software, hardware, networks, and physical processes [58]."]} +{"3882516|5551880": ["Despite the promising business model and hype surrounding cloud computing, security is the major concern for businesses shifting their applications to clouds [3], [4]."]} +{"15044264|1230643": ["Based on the collaborative efforts of a large number of sensor nodes, WSNs have become good candidates to provide economically viable solutions for a wide range of applications, such as environmental monitoring, scientific data collection, health monitoring, and military operations [ 1 ]."]} +{"42483682|14441987": []} +{"11784536|206584087": []} +{"1367922|206584087": ["The surveys [21,22] have included most of these work."]} diff --git a/edge/graph_64689529.jsonl b/edge/graph_64689529.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64698713.jsonl b/edge/graph_64698713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24f6feb9cc405f3c8463821a5f457c878daaafb3 --- /dev/null +++ b/edge/graph_64698713.jsonl @@ -0,0 +1,3 @@ +{"1178373|16768404": ["Authors of [1] performed a comprehensive study on opinion mining algorithms and applications, reviewing 54 sources, and stated that \u201cthe interest in languages other than English in this field is growing as there is still a lack of resources and researches concerning these languages\u201d."]} +{"53305681|16768404": ["A sentiment lexicon is a collection of known sentiment terms [32]."]} +{"7847519|1805048": ["\u2026memory-based collaborative filtering (CF) approaches (Adomavicius and Tuzhilin 2005; Herlocker et al. 2004; Sarwar et al. 2001; Schafer et al. 2007; Su and Khoshgoftaar 2009): the user-based method uses ratings to associate a user with a group of like-minded users and then recommends to the target\u2026", "There are two common memory-based collaborative filtering (CF) approaches (Adomavicius and Tuzhilin 2005; Herlocker et al. 2004; Sarwar et al. 2001; Schafer et al. 2007; Su and Khoshgoftaar 2009): the user-based method uses ratings to associate a user with a group of like-minded users and then recommends to the target user a set of items that are enjoyed by her/his neighbors; and the item-based method aims to find items that are similar to those that a user has viewed/purchased before.", "Collaborative filtering techniques perform well when there is sufficient rating information (Su and Khoshgoftaar 2009)."]} diff --git a/edge/graph_6472348.jsonl b/edge/graph_6472348.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a93fb0610375a02e9a90b58f7271156a74b4391 --- /dev/null +++ b/edge/graph_6472348.jsonl @@ -0,0 +1,2 @@ +{"62695086|1236072": []} +{"62695086|1230643": []} diff --git a/edge/graph_64733969.jsonl b/edge/graph_64733969.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64737741.jsonl b/edge/graph_64737741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1deff10ae52cf2df8fd35a33129cc1b6fc32602c --- /dev/null +++ b/edge/graph_64737741.jsonl @@ -0,0 +1,5 @@ +{"45043450|16362395": []} +{"15993113|6857179": ["When it comes to associations between AUs and dimensional models of emotion, such as the valence-arousal model, little research is available [25]."]} +{"15993113|6387482": ["Some works have also attempted a combination of both methods in hybrid fusion [32].", "The most common modalities to be merged are combinations of audio, video and text modalities [32]."]} +{"34203593|6387482": []} +{"34814221|6682153": []} diff --git a/edge/graph_64742530.jsonl b/edge/graph_64742530.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3cea919e1b48ecff81138b95fef3e22a6618c9b0 --- /dev/null +++ b/edge/graph_64742530.jsonl @@ -0,0 +1,3 @@ +{"107179214|7494281": []} +{"26170529|184678": []} +{"26170529|11009327": []} diff --git a/edge/graph_64743650.jsonl b/edge/graph_64743650.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6475726.jsonl b/edge/graph_6475726.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6478794.jsonl b/edge/graph_6478794.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6479846.jsonl b/edge/graph_6479846.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b07f6175817e5f341ceba563eb61e7419031125 --- /dev/null +++ b/edge/graph_6479846.jsonl @@ -0,0 +1 @@ +{"26333157|16049649": []} diff --git a/edge/graph_64809647.jsonl b/edge/graph_64809647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6481011.jsonl b/edge/graph_6481011.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af50ae1a94fae4ce81dfc39121cffc8f1fb5f79d --- /dev/null +++ b/edge/graph_6481011.jsonl @@ -0,0 +1,7 @@ +{"25213993|1230643": ["ADVANCES in microelectromechanical systems, embedded microprocessors, wireless communications, and networking technologies have made wireless sensor networks (WSNs) of large scale applicable to a wide range of applications, such as navigation and control of moving vehicles, environmental monitoring, machine condition monitoring and maintenance, disaster recovery, and healthcare [1]."]} +{"15077431|1230643": ["Power consumption of the sensor nodes in WSN can be divided into three domains: sensing, communication, and data processing [1].", "These WSNs usually consist of massively distributed low-cost, low-power and small size sensor nodes, which have sensing, data precessing and communication capabilities [1]."]} +{"9667973|192934": ["However, from the pattern recognition theory [18], it is well-known that the dimension of the feature vector (i."]} +{"5554325|9932808": []} +{"1482668|1230643": ["\u2026homepage: www.elsevier .com/ locate/comnet\nSemi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks\nJiming Chen a,c, Chengqun Wang a,b, Youxian Sun a, Xuemin (Sherman) Shen c,\u21d1 a State Key Lab of Industrial Control Technology, Zhejiang University,\u2026"]} +{"15877540|164835": ["Measurements that can be taken to aid this process include the angle of arrival (AOA) [1], the received signal strength (RSS) [2], [9], or the time difference of arrival (TDOA) at multiple receivers [10]."]} +{"37925315|12681089": []} diff --git a/edge/graph_6481553.jsonl b/edge/graph_6481553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64850755.jsonl b/edge/graph_64850755.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7b248ed2570596473c80609b93a6b62b34ea20d --- /dev/null +++ b/edge/graph_64850755.jsonl @@ -0,0 +1,67 @@ +{"24897962|17410801": ["The routing protocols need to be carefully developed for routing protocols to keep tissues of human body in safe zone from overheating [25]."]} +{"24897962|6539555": ["WBANs have a massive prospective to modernize the health care monitoring by the treatment of several life bullying diseases and provides real-time patient monitoring [16]."]} +{"24897962|15300368": []} +{"42358193|16514036": []} +{"12853466|4395259": ["attention has been devoted to the physical-layer security, which has a great potential in terms of enhancing the security of IWSNs [5], [6]."]} +{"12853466|1236072": ["To this end, energy-aware routing [15] is emerging as an efficient means of prolonging the lifetime of wireless sensor nodes for IWSNs, where the transmission"]} +{"7988320|6539555": []} +{"12767332|11047930": ["Path loss is related to the distance and frequency an d expressed as [20]."]} +{"9280644|16939966": []} +{"9280644|16335158": ["Virtual sensors in the sensor cloud, for example, could be considered a valuable alternative to sensor redundancy [Alamri et al. 2013]."]} +{"9280644|17410801": []} +{"9280644|16084499": []} +{"9280644|7988320": []} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"45911264|10817088": ["The accelerating demand on healthcare services and the exponential cost associated with medical interventions call for innovative solutions for remote health monitoring such as WBANs [7, 22, 39, 51]."]} +{"45911264|10206347": []} +{"45911264|30383344": ["able sensors), on-body (wearable sensors [22]), or surrounding the body for behavioral recognition [60]."]} +{"45911264|7988320": ["Similar to [100] the authors surveyed the \ufb01rst three layers of the protocol stack, discussed cross layer, QoS, and security issues.", "Due to its importance and complication, security in WBAN must be addressed at different layers and levels [100], i.e. MAC, physical, and network layers.", "Ullah et al. [100] reviewed WBAN architecture, topology, and studied the proposed technologies for WBANs at physical, MAC, and network layers and analyzed the behavior of these layers.", "These nodes are distributed either on the human body (i.e. wearable sensor nodes) or implanted inside the body and they are under the control of a coordinator node [100].", "There is a consensus among researchers that there are differences between wireless sensor network (WSNs) and WBANs [18, 55, 60, 61, 100].", "This section brie\ufb02y reviews WBANs architecture and applications, other detailed review on the matter are available in the literature [18, 55, 60, 61, 100].", "Therefore, researchers agreed that 2.4 GHz band is the most attractive spectrum to be used in medical applications in addition to their ability to protect adjacent channel interference [100].", "However, some of the bands are not suitable for WBANs applications as they cannot support video or voice transmission (e.g., HBC) or are only eligible to be used by authorized users (e.g., UWB) [100].", "Security and military applications [80, 100] are also covered by WBAN, especially for battle\ufb01eld surveillance where sensors are deployed in the soldiers uniform to track their ambulation, monitor their health, and detect the presence of toxic materials.", "The Wireless Body Area Networks (WBANs) come to provide an ef\ufb01cient paradigm for e-health and telemedicine applications and requirements [54, 61, 100]."]} +{"45911264|28210515": ["Further, [113] surveyed the studies of coexistence between IEEE 802.11 and IEEE 802.15.4-based networks."]} +{"45911264|7854020": ["This is due to the fact that the low-power WiFi have not modi\ufb01ed the parameters used in the original operation of CSMA/CA mechanism.", "6 WBAN is formed by customizing the node\u2019s module in OPNET according to the specifications described in [59].", "The third mode is non-beacon mode, without superframe boundaries, where the network employs the ordinary CSMA/CA mechanism for medium access, which is the one considered in this analysis.", "This is due to the fact that offset yields time spacing while using the opportunistic contention-based access technique, i.e. CSMA/CA, at the same time.", "Accordingly, only the unslotted CSMA/CA MAC mechanism is considered in the analysis.", "AIIA introduced a new superframe structure which contains two periods: contention-based period during which CSMA/CA is used, and scheduled period during which TDMA is used.", "This is expected since the WBAN nodes are using CSMA/CA [59] in their MAC layer.", "For the medium access we consider the Distributed Coordination Function (DCF) MAC operation that uses CSMA/CA mechanism.", "AIIA tries to reduce mutual interference between WBANs using a hybrid MAC approach that utilizes both Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanism and TDMA.", "On the other hand, the WBAN may be surrounded with other wireless technologies that operate at the same band, using higher transmission energy, different MAC protocols (possibly withoutCSMA/CA),andcoexistwithintheinterferencerange of the WBAN.", "In the unslotted CSMA/CA protocol each node maintains two variables: a backoff exponent (BE) and a counter of the number of occurred backoffs (NB).", "For the MAC layer, IEEE 802.15.6 divides the operation time into superframes which is similar to the slotted CSMA/CA operation in Zigbee."]} +{"3921143|11047930": ["In [10] and [11], path loss in WBANs and its impact on communication is presented, performed for various models of In-Body and On-body communication and certain factors (like frequency, attenuation and distance etc), influencing path loss."]} +{"196191596|17708892": ["There are several possibilities for these type of transmissions, yet the recent development of the Low Power Wide Area Network (LPWAN) protocols present new opportunities with the benefits of a reduced energy consumption and moderate data rate [29,30]."]} +{"196191596|13475127": ["Long-range (LoRa) transmissions require either a previously established infrastructure, such as a ground base station, or satellite connectivity [1].", "which, in many cases, are lost to strong currents or vandalism [1]."]} +{"35565401|7876249": []} +{"35565401|3892600": ["4 standard for WBANs is presented in [16, 17]."]} +{"2275283|16214623": ["The main challenge in designing standards for WBANs is the balance of QoS demands with the low power constraints of limited battery powered nodes [30]."]} +{"2275283|7988320": []} +{"2275283|2295142": ["Results shows that the proposed scheme has a higher node energy efficiency, lower average delay and control overhead than other similar protocols as explained in [78].", "Furthermore, the authors in [78] gave a more detailed survey of multipath efficient routing in wireless sensor networks."]} +{"2275283|7854020": ["Similarly [69] presented a brief overview of the new IEEE 802."]} +{"46798021|303976": ["A WBAN system normally consists of several miniature sensor nodes [2], [3]."]} +{"13697966|11732290": ["Recently, there have been many efforts to develop accurate localization methods for WCE and we refer to [27] for an extended review on this topic."]} +{"13956923|11047930": ["In [13] and [14], path loss in WBASN and its impact on communication is presented with the help of simulations which, were performed for different models of In-Body communication and different factors (such as, attenuation, frequency, distance etc), influencing path loss in On-Body communications."]} +{"13956923|3892600": ["In [40], [41], [42] and [43], authors have discussed about MAC layer for BAN."]} +{"13956923|3894151": ["sources. These sensors can either be in-vivo sensors i.e. implanted inside the body or can Health Care Entertainment Aerospace WSN and Sports Applications Fig. 1: WSN Applications be wearable sensors [1] attached on the body, depending upon the application requirements. In the \ufb01eld of sports, WBASN can be deployed by using a heart rate measuring sensor placed on players body to replace him/her when, "]} +{"31850245|29060869": []} +{"31850245|485843": []} +{"31850245|5747564": []} +{"31850245|6959212": ["\u2022 Security: Wireless nature of WSN also makes the system vulnerable to various external denial of service (DoS) attacks [47,48], physical and cyber threats."]} +{"58938441|10067743": []} +{"10206347|7988320": ["Reference [35] placed emphasis on network communication, discussing the issues of physical layer, MAC layer, network layer and routing protocols in detail.", "Finally, the trade-off between energy efficiency and the complexity of fast routing algorithms also needs to be figured out [35].", "IEEE 802.15.6 has defined many BSN band standards, so developing many upper layer protocols which support a variety of physical layer channel is an inevitable trend [35]."]} +{"10206347|6332923": ["Therefore, QoS and the real-time prosperity of data transmission must be considered [17,18]."]} +{"10206347|1230643": ["Since the memory module and data sending module consume lots of energy [26], data compression can lower power consumption effectively on BSN sensors, by reducing information stored in memory and transmitted by the transceiver.", "As communication consumes more power than local computation, wireless data transmission uses a large amount of power [26].", "In the aspect of data fusion, research mainly includes the design and implementation of denoising [23], feature extraction [24], data classification [25], data compression [26], and other key technologies."]} +{"9253079|1230643": []} +{"18012210|7988320": ["[10, 11], the authors survey the topological and architectural requirements of WBAN in the context of MAC, physical, and routing layer protocols."]} +{"18012210|17205659": ["These constraints and requirements eliminate the use of key agreement schemes in WBAN, which are designed for wireless sensor networks (WSNs) [2\u20134].", "[3 2] Y es R SD + H + M A C + m +n 2| ID |+ |s |+ |N |+ 2| M A C | 2| ID |+ |s |+ |N |+ 2| M A C |+ K G oo d G oo d G oo d Y es"]} +{"12028768|7988320": ["the accurate sensing of the signal from the body, carry out low-level processing of the sensor signal, and wirelessly transmit the processed signal to a local processing unit [1]."]} +{"6275330|1230643": ["Other applications of wireless sensors to healthcare that have been proposed include tracking and monitoring doctors and patients, or tracking drug usage inside hospitals [36]."]} +{"9551174|485843": ["It is evident that these applications have different quality of service (QoS) requirements in terms of bandwidth, reliability and latency as shown in Table I [1].", "Wireless sensor networks (WSNs) have been proposed to effectively monitor, control and operate the power grid [1].", "Table I. QoS Requirements of WSN-based Smart Grid Applications [1,5]\nApplications Bandwidth Reliability Latency\nPrice signalling\n9.6-56 kbit/s\n99%\n2000ms\nSubstation Automation (SA) 9.6-56k kbit/s 99.0-99.99% 15-200ms Overhead Transmission Line Monitoring 9.6-56 kbit/s 99.0-99.99% 15-200ms Automated feeder switching 9.6-56 kbit/s 99% 1000-2000ms Home energy management 9.6-56 kbit/s 99.0-99.99% 300-2000ms Distribution Automation (DA) 9.6-56 kbit/s 99.0-99.99% 20-200ms Distribution Management (DM) 9.6-100 kbit/s 99.0-99.99% 100 ms-2 second Wide-Area Situational Awareness 600-1500 kbit/s 99.0-99.99% 15-200ms\nAdvanced metering infrastructure\n10-100 kbit/s per node, 500 kbit/s for backhaul 99.0-99.99% 2000ms\nDemand Response\n14-100 kbit/s per node 99% 500-ms several\nminutes\nOutage Management 56 kbit/s 99.0% 2000ms Residual energy management 9.6-56 kbit/s 99% 1000ms Asset Management 56 kbit/s 99.0% 2000ms Vehicle to Grid (VG) 9.6-56 kbit/s 99.0-99.99% 2sc-5 min\nTo address these challenges, in this paper, a honey bee mating optimization-based routing and cooperative channel assignment algorithms for WSN-based smart grid applications is proposed.", "QoS Requirements of WSN-based Smart Grid Applications [1,5]", "Recent field tests show that the time varying nature of the smart grid environment due to the variations of spectrum availabilities needs frequent re-channel assignment [1, 4]."]} +{"7854020|7988320": []} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"113996677|1230643": []} +{"44417309|16514036": []} +{"23276381|17905276": ["to name a few [28]."]} +{"12651739|6332923": ["Such medical and safety related body area network (BAN) applications call for a high level of access control and data protection [4\u20137].", "General security and privacy in body area networks is a complex topic that has been covered in a range of overview papers [4\u20136 , 21]."]} +{"12243951|17205659": ["The existing security models and protocols [4], [5] designed for WSNs do not fully suit WBANs for different resource constrictions and application scenario."]} +{"15747466|8690743": ["LPL [5] Received packet carries indicating pending packets and receiver goes back to sleep after receiving data High Low", "Apart from that, TDMA also has a maximum bandwidth utilization, low duty cycle and lower power consumption since it involves no contention, idle listening and overhearing problems [7].", "Out of these three approaches shown in Table 3, TDMA based is chosen as the best energy-efficient in MAC protocol for WBAN.", "Reservation-based Dynamic TDMA (DTDMA) [14] is created for normal (periodic) WBAN traffic where slots are assigned to the nodes which contain buffered packets and release to other node after completion of data transmission or reception.", "Quadsi-Sleep-Preempt-Supported (QS-PS) [24] is a tree structured TDMA based.", "The mechanisms are Low Power Listening (LPL), Scheduled Contention and TDMA.", "Scheduledcontention [5] Performances improve if traffic is increased Good Low", "According to [14], several researches have been done in WBAN using TDMA-based MAC protocols such as H-MAC, DTDMA and QS-PS.", "The DTDMA technique shows more dependability in terms of low packet dropping rate and low energy consumption when compared to IEEE 802.15.4.", "Recently development in Wireless Sensor Network (WSN) technology [5] has bring a great attention to Wireless Body Sensor Network (WBSN) or Wireless Body Area Network (WBAN) [6].", "Generally, most of energy-efficient healthcare monitoring systems use TDMA-based or IEEE 802.15.4 to ensure energy-efficient and make sensor\u2019s lifetime longer.", "MAC mechanisms can be divided into 3 groups which is schedule-based; Carrier Sense Multiple Access (CSMA) or Time Division Multiple Access (TDMA), contention based; CSMA/CA and hybrid based; combination of scheduled and contention based [14].", "TDMA [5] Using time slot for synchronization High Low"]} +{"15747466|6539555": ["\uf0b7 The accurate classification of normal and emergency traffic scenarios are needed in WBAN to avoid any delay which could mislead in diagnosing the diseases and taking appropriate action especially in a real-time health monitoring [12].", "It is also an integration of WBAN which consists of on-body or in-body sensor nodes that are capable to continuously measure and monitor vital body signals of a patient for diagnosis and prescription by medical personnel [12]."]} +{"15747466|20905429": ["Specifically, it is a short range RF based-connectivity between portable and fixed devices [18].", "H-MAC [18] Heartbeat rhythm is used to synchronized the nodes using TDMA-based High Very low", "\uf0b7 Security and data protection in WBAN is one of open issues in WBAN [18].", "There are two types of data transmission [18] in health monitoring system which are communication between sensor nodes (contains collected physiological signals) to the system\u2019s central nodes and sending the measured data to the remote medical station (database)."]} +{"29055700|7988320": ["Wireless Body Area Networks (WBAN) [8] and Body Sensor Networks (BSN) [9] enable the use of signal processing with local communication protocols, right on the body of the individual, and subsequent transmission of the results for evaluation by the physician."]} +{"46747154|16514036": []} +{"303813|20905429": ["However, although several BSN-based research prototypes have been proposed to date [1], [2], almost none of them have reached the market at this time."]} diff --git a/edge/graph_6486398.jsonl b/edge/graph_6486398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64866120.jsonl b/edge/graph_64866120.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74e392c0bb47c36c93322b9ef3ba2a4166a261ba --- /dev/null +++ b/edge/graph_64866120.jsonl @@ -0,0 +1,2 @@ +{"22474823|10975328": []} +{"27559938|1113420": []} diff --git a/edge/graph_64907559.jsonl b/edge/graph_64907559.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d544040f126a18e318c066d782ba8082e9cd54d5 --- /dev/null +++ b/edge/graph_64907559.jsonl @@ -0,0 +1,2 @@ +{"55511143|64907559": []} +{"33849923|15529291": ["As Ferreira et al. (2012) and Smalheiser and Torvik (2009) stated, the two major challenges of the name disambiguation process are that, first, the same author may write different papers under different names (synonyms, errors or name changes due to marriage, religious or gender conversions), and\u2026", "Basically unsupervised methods try to partition unlabelled data and detect groups of authors where there is a maximum (minimum) similarity within (between) groups (Ferreira et al. 2012).", "For example, our main source for this study, Web of Science (WoS) from Clarivate Analytics, indexes the e-mail address and unique author identifier Researcher ID (RID), which assist in correctly identify a unique author (Ferreira et al. 2012).", "The main challenge when employing external data has been the cost of extracting needed information from web sources (Ferreira et al. 2012)."]} diff --git a/edge/graph_6495023.jsonl b/edge/graph_6495023.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_64976549.jsonl b/edge/graph_64976549.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00b7caa52b96f7d999c58f7f48360fd2a49d31be --- /dev/null +++ b/edge/graph_64976549.jsonl @@ -0,0 +1 @@ +{"124814027|11112426": []} diff --git a/edge/graph_6498717.jsonl b/edge/graph_6498717.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89bc54ad4cb57367c8f64c230d3a50d388bef9cf --- /dev/null +++ b/edge/graph_6498717.jsonl @@ -0,0 +1,5 @@ +{"16278351|10529474": ["\u2026models: (1) can be expensive and might increase the code of the agents [Yolum and Singh 2002a]; (2) can be inef\ufb01cient when the system has a large state space [Artikis and Pitt 2009]; and (3) doesn\u2019t guarantee that agents will behave towards the satisfaction of their commitments in open systems."]} +{"14873362|205435103": ["In SE research, elements of the substantive domain are, for instance, open source software [77] and developer motivation [78]."]} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"3874003|2187403": ["In addition to existing context models [1], topology can provide a system with both structural and semantic awareness of important contextual characteristics that can affect security concerns."]} +{"5266515|205435103": ["Motivation is a topic that has received considerable attention in the software engineering research field, given that it is reported to be a major factor in project success [6, 11]."]} diff --git a/edge/graph_65002467.jsonl b/edge/graph_65002467.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65012249.jsonl b/edge/graph_65012249.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..84bbcb0a9eadf0d0faa763cfa27a55da920b6910 --- /dev/null +++ b/edge/graph_65012249.jsonl @@ -0,0 +1,7 @@ +{"3627250|469744": ["AR is an extension of VR, which enhances the perceived effect of integrating virtual information or objects into a real-world environment via computer-generated images, objects, information or scenes and interaction to enhance the perception [5]."]} +{"3627250|17024419": ["VR and AR are increasingly being used in the medical field [6,7] as VR surgical simulation systems that provide trainee or inexperienced surgeons with surgical training when operating a VR surgical simulation system, you can simulate the realism of the actual operation and reduce the incidence of errors during the actual operation in the future."]} +{"64838346|3767252": []} +{"64838346|2829149": ["Many of these papers focus on security more than privacy and some of them consider privacy as part of security [30].", "In general, the manufacturers have cared about their hardware security more than the privacy of user [30, 46]."]} +{"207256898|1230643": ["In IoT, RFID systems, WSNs sensors perceive for the end of the information technology, which protect the integrity and con\ufb01dentiality of information by the password encryption technology [6\u20139]."]} +{"4732823|65012249": []} +{"23507951|65012249": []} diff --git a/edge/graph_65016187.jsonl b/edge/graph_65016187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6502723.jsonl b/edge/graph_6502723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6503826.jsonl b/edge/graph_6503826.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65041751.jsonl b/edge/graph_65041751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08d9d73ee6c73b2e7d910b4c1c4e0f0c75b4a026 --- /dev/null +++ b/edge/graph_65041751.jsonl @@ -0,0 +1,14 @@ +{"13807004|7360895": ["[38] \u2013 trying to seek for an answer to the question: \u201cwhy socially interactive robots?\u201d \u2013 maintained that \u201csocial interaction is desirable in the case robots mediate humanhuman [peer-to-peer] interactions or in the case robots function as a representation of, or representative for, the human 3 \u201d (p."]} +{"141631|7360895": ["Only slight orientation towards a person, for example, can indicate attentiveness and caring [7, 11, 23]."]} +{"7559717|7360895": ["In which case the robot\u2019s appearance would be highly disturbing, or even repulsive [8, 29]."]} +{"10984576|7360895": ["According to the uncanny valley effect suggested by Mashiro Mori (see Fong et al., 2003), the subtle imperfection of a humanlike creature becomes highly disturbing or even repulsive.", "In fact, it is well known among the robotics community that the form and structure of a robot can easily establish some sort of social expectations from its users (Fong et al., 2003).", "Dominant forms of social agents and social robots are assistants, companions, or pets (Fong et al., 2003).", "Social robots are a new type of robot whose major purpose is to interact with humans in socially meaningful ways (Breazeal, 2002; Fong et al., 2003; Lee et al., 2004)."]} +{"18796637|7360895": ["One subarea of robotics, termed social robotics, involves robots that engage in some form of social interaction with humans, through speech, gestures, or other media (18, 19)."]} +{"207178553|7360895": ["In the Human-Robot Interaction (HRI) community it is still under debate what characteristics de\ufb01ne a social robot [9, 12]."]} +{"641747|4361938": ["The interested reader is referred to [22], [23], [127] for eye movement studies and [24] for a breadth-first survey of eye tracking applications."]} +{"7360895|7185733": ["Two excellent overviews of vision-based gesture recognition are [124,166].", "[124] V."]} +{"7360895|7788290": ["A broad survey of human tracking is presented in [ 66 ].", "Passive sensors, such as CCD cameras, are cheap, require minimal infrastructure, and can be used for a wide range of perception tasks [2,36, 66 ,118]."]} +{"26804611|7360895": ["W ITH the rapid advancement of humanlike robots and of related computing methods in robotics, social robots that interact with humans are becoming more integrated into daily life [1]."]} +{"10874394|38476": ["We use a classifier [2], [6]\u2013[8] that learns to map features of the data to high-level behavior, by training on data labeled with the correct high-level behavior."]} +{"10874394|8365617": ["In our method, we automatically extract a large number of features using simple operations on the data, and then use feature selection [9]\u2013[12] to adaptively remove non-informative features, honing in on the most meaningful features (Section III)."]} +{"7748652|27527196": ["Again, a wealth of approaches exist for the problem of optical character recognition and handwriting recognition [204] [205], even for languages such as Arabic [206], the only robotic system that has demonstrated limited OCR capabilities is [177]."]} +{"7748652|15782139": ["Again, a wealth of approaches exist for the problem of optical character recognition and handwriting recognition [204] [205], even for languages such as Arabic [206], the only robotic system that has demonstrated limited OCR capabilities is [177]."]} diff --git a/edge/graph_65051827.jsonl b/edge/graph_65051827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6507312.jsonl b/edge/graph_6507312.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65078229.jsonl b/edge/graph_65078229.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de8cc5f332cc6e063887998de5b910cfe6429552 --- /dev/null +++ b/edge/graph_65078229.jsonl @@ -0,0 +1,3 @@ +{"63667922|192934": ["Jain and Zongker (1997) have written a good overview of experimental feature selection methods as well as an empirical study of their relative performance. Kirby (2001) offers a good resource for those looking for more specialized techniques than those discussed here.", "Jain and Zongker (1997) have written a good overview of experimental feature selection methods as well as an empirical study of their relative performance."]} +{"207178741|14287707": ["Music Information Retrieval:\nRecent Developments and Applications\nMarkus Schedl Johannes Kepler University Linz, Austria\nmarkus.schedl@jku.at\nEmilia G\u00f3mez Universitat Pompeu Fabra, Barcelona, Spain\nemilia.gomez@upf.edu\nJuli\u00e1n Urbano Universitat Pompeu Fabra, Barcelona, Spain\njulian.urbano@upf.edu\nBoston \u2014 Delft", "ISBN: 978-1-60198-807-2 c\u00a9 2014 M. Schedl , E. G\u00f3mez and J. Urbano\nAll rights reserved.", "Knees and Schedl [127], give a survey of music similarity and recommendation methods that exploit contextual data sources.", "+31-6-51115274\nThe preferred citation for this publication is\nM. Schedl , E. G\u00f3mez and J. Urbano."]} +{"18977466|36631020": ["Transcribing the melody of a musical performance into a written notation is a challenging task and requires an in-depth knowledge of the r\u0101ga [21, 29]."]} diff --git a/edge/graph_65095150.jsonl b/edge/graph_65095150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6509733.jsonl b/edge/graph_6509733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77ca088f54106c597d6bb1731ac74ac5233bc237 --- /dev/null +++ b/edge/graph_6509733.jsonl @@ -0,0 +1,4 @@ +{"29139203|25699143": []} +{"14821784|206051485": ["similarity measureareillustrated inFig. 3 .Thefuzzy sets", "information. Imageregistration [1]-[ 3 ] canhelpwiththis task * Combining information, ofthesamepatient, from byfinding thetransformation that bestaligns corresponding multiple imagingmodalities in a clinically objects intwoormoreimages.", "Forinstance, fora two-dimensional rigid registration, there wouldbethree 0 1 2 3 4 5 scaling factors: twofortranslations andoneforrotation.", "intwoormoreimages. Theimages could betwodimensional (2-D) orthree dimensional ( 3 -D), sothetransformation could mappoints froma2-Dspace toa2-Dspace, froma3-Dspace D. Optimization Procedure toa3-Dspace, orbetween a3-Dspace anda2-Dspace."]} +{"17208628|206051485": []} +{"9343480|206051485": ["Thus, there is a need for automated techniques that require little or no operator supervision [5] [6]."]} diff --git a/edge/graph_65097662.jsonl b/edge/graph_65097662.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65099555.jsonl b/edge/graph_65099555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..984720b3343f44d0c937bfcb9201d774d2f1cf14 --- /dev/null +++ b/edge/graph_65099555.jsonl @@ -0,0 +1,2 @@ +{"10003259|386036": ["Such similarity computations can build on a large body of related work on record linkage (Winkler, 2006) and duplicate detection (Elmagarmid et al., 2007) within the database community as well as on ontology matching (Euzenat & Shvaiko, 2007) in the knowledge representation community."]} +{"16991012|913718": ["Ontology matching [4] concentrates on the schema-level but pays less attention to the instance-level issues."]} diff --git a/edge/graph_65104546.jsonl b/edge/graph_65104546.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6511715.jsonl b/edge/graph_6511715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6513045.jsonl b/edge/graph_6513045.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6513230.jsonl b/edge/graph_6513230.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6513913.jsonl b/edge/graph_6513913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6515732.jsonl b/edge/graph_6515732.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2bef4e55d8481240767a2437f293eec7b5848fcc --- /dev/null +++ b/edge/graph_6515732.jsonl @@ -0,0 +1,15 @@ +{"21293513|7919236": ["[2], in order to provide some generic principles and guidelines that a RecSys researcher could use.", ", 2012 [2] RecSys dimension Manouselis & Costopoulou, 2007 [4] Evaluation Method"]} +{"41229860|386036": ["Duplicate detection has mostly been studied as the problem of \u2018record linkage\u2019 in databases [14], with the only"]} +{"3837546|3202525": ["These systems have been identified in previous compilations of educational recommender systems ([65][66][110][85][86][88][68][90]), and have been extended with works shared in the Mendeley group and complemented with a keyword search in Google Scholar.", "As reported in a state-of-the-art review of contextual TEL recommenders [110] contextual information can be of value to enrich the recommendations process and there are many research opportunities in this direction.", "As reported in a recent state-of-the-art review [110] contextual information can be"]} +{"12071965|13365762": ["Each descriptor itself refers to a specific feature or attribute of multimedia content [11, 12]."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"22636916|3202525": ["[7, 39, 40, 41, 42, 43, 44]) show that to date most of the recommendations have focused on finding suitable materials as an alternative to relying solely on others\u2019 opinions, as originally proposed [45]."]} +{"22636916|7919236": ["To the best of our knowledge and from recent literature review [132], TORMES can be considered the first attempt to apply the layered evaluation approach to the development of RS."]} +{"15265521|7919236": []} +{"9434540|3202525": ["In order to deal with this limitation, contextual recommenders in educational scenarios [6] are to be explored, as they are currently integrating physical sensors to collect contextual data from learners, which can include"]} +{"31192810|3102110": ["Combining several recommendation strategies can be expected to provide better results than either strategy alone [24]."]} +{"60353600|3202525": []} +{"8174072|1805048": ["sive survey for CF techniques is presented in [9].", "These include, for example, the cold start, sparsity, scalability, and Gray Sheeps problems [9]."]} +{"31505361|3202525": ["The process was aided from the works of [2] and [3], who have provided a very thorough overview of the RS for TeL landscape.", "They are widely used in many areas, including Technology Enhanced Learning (TeL) [2]."]} +{"16655368|1805048": []} +{"57781187|7919236": ["An extensive survey of evaluation issues in recommender systems was carried out by Pu et al. (2012).", "Pu et al. (2012) have suggested that layered evaluation can be used in RecSys research as a powerful technique in identifying areas of a system that require further improvements. More specifically, the three interaction steps that Pu et al. (2012) have identified are described as such: \u2022 Elicit user preferences: the initial user preference profile can be established by users\u2019 stated preferences (explicit elicitation) or their objective behaviours (implicit elicitation).", "To investigate how this layered framework could be applied to RecSys evaluation, we focus on the interaction steps that Pu et al. (2012) have identified (the initial preference elicitation process, the preference refinement process, and the presentation of the system\u2019s recommendation results).", "This analysis allows us to argue that the application of this layered framework could be possible for the case of recommender systems, since the majority of the interaction components of Pu et al. (2012) are covered by the framework.", "Recent studies have proposed a more systematic approach to RecSys evaluation, separating the interactive from the non-interactive components of a recommender system (del Olmo & Gaudioso, 2008), distinguishing among types of evaluation studies and suggesting appropriate protocols (Shani & Gunawardana, 2011), and emphasizing on the user-perceived criteria to assess the success of a RecSys (Pu et al., 2012; Knijnenburg et al., 2012).", "\u2026of a recommender system (del Olmo & Gaudioso, 2008), distinguishing among types of evaluation studies and suggesting appropriate protocols (Shani & Gunawardana, 2011), and emphasizing on the user-perceived criteria to assess the success of a RecSys (Pu et al., 2012; Knijnenburg et al., 2012).", "Pu et al. (2012) have suggested that layered evaluation can be used in RecSys research as a powerful technique in identifying areas of a system that require further improvements.", "This explains why recent studies on the state-of-art of recommender systems\u2019 evaluation have either explicitly suggested the adoption of layered approaches (Pu et al., 2012) or have developed evaluation frameworks that have a decomposition logic (Knijnenburg et al., 2011; 2012).", "More specifically, the three interaction steps that Pu et al. (2012) have identified are described as such: \u2022 Elicit user preferences: the initial user preference profile can be establi-\nshed by users\u2019 stated preferences (explicit elicitation) or their objective behaviours (implicit elicitation).", "The framework could include specific guidelines and protocols on the way specific experiments should be carried out, adopting and synthesizing suggestions from work such as the one of Shani & Gunawardana (2011) and Pu et al. (2012).", "This explains why recent studies on the state-of-art of recommender systems\u2019 evaluation have either explicitly suggested the adoption of layered approaches (Pu et al., 2012) or have developed evaluation frameworks that have a decomposition logic (Knijnenburg et al."]} diff --git a/edge/graph_6518885.jsonl b/edge/graph_6518885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f9a04a21cef2e8029e91a741582374a6480fd87 --- /dev/null +++ b/edge/graph_6518885.jsonl @@ -0,0 +1 @@ +{"2703985|1230643": ["Despite being similar to micro- and macroscale sensors [2], it should be taken into account that (i) the solutions in the nanoscale are limited not just in terms of existing manufacturing"]} diff --git a/edge/graph_6519244.jsonl b/edge/graph_6519244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6520684.jsonl b/edge/graph_6520684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f8dfd5eb6bb508a86c948fe03eff00b6ffef037 --- /dev/null +++ b/edge/graph_6520684.jsonl @@ -0,0 +1,2 @@ +{"5592782|9975357": ["Hitherto, academic research has concentrated primarily on the adoption of agile methods (e.g., Mahanti, 2006) and the adaptation of these methods to suit specific projects (e.g., Fitzgerald et al., 2006)."]} +{"35116653|1619901": []} diff --git a/edge/graph_6521940.jsonl b/edge/graph_6521940.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65219850.jsonl b/edge/graph_65219850.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..364a1138cef04a5f98efb42655cda2b31a231862 --- /dev/null +++ b/edge/graph_65219850.jsonl @@ -0,0 +1,6 @@ +{"32056052|12526628": ["Therefore, the automatic process of identifying sentiment in text and characterising it in a standardised manner has proven highly significant in several applications ranging from marketing (Jebaseeli and Kirubakaran, 2012), stock market prediction (Bollen and Mao, 2011) and recommender systems (Koukourikos et al."]} +{"2011473|885218": ["Common Logic ( CL ) (Wimalasuriya & Dejing 2010) and Semantic Application Design Language ( SADL ) (Wimalasuriya & Dou 2010) are the popular ontology based languages commonly used for semantic evaluation of data sets available in social networking websites.", "Basic components of ontology include: (a) classes, (b) attributes, (c) relations, (d) function terms, and (e) rules (Wimalasuriya and Dou 2010)."]} +{"2011473|12260867": ["Partitional clusters are also known as non-hierarchal clusters (Kavitha & Punithavalli 2010).", "An agglomerative method uses a bottom up approach by successively combining closest pairs of clusters together until the entire objects form one large cluster (Kavitha & Punithavalli 2010).", "Hierarchical clustering can be performed either by using: (a) agglomerative or (b) divisive methods, which are detailed in the subsequent text (Kavitha & Punithavalli 2010)."]} +{"3428955|2355696": []} +{"13951511|18484924": ["Arabic is a Semitic language that is characterized by its rich morphology and complex syntax [1], [5], [6], [17], [18].", "An advantage of the machine learning-based parsers is that they are adaptable and updatable with minimal time and effort as long as sufficiently large annotated datasets are available [18]."]} +{"153389890|206742377": []} diff --git a/edge/graph_65233965.jsonl b/edge/graph_65233965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2557325888641bc61dc369650519f29d4a1b2d30 --- /dev/null +++ b/edge/graph_65233965.jsonl @@ -0,0 +1,9 @@ +{"110728601|13916820": []} +{"7467177|8914588": ["Therefore, the design of the framework follows the MAPE-K loop [6], which is a well-established concept in autonomic computing.", ", Concept of Utility, Reinforcement Learning, Bayesian Techniques) [6].", "The adaptive framework tackling this challenge on a per-job-basis relies on well-known concepts from autonomic computing [5,6], particularly on the MAPE-K loop containing a monitor, analyzer, planner, executor, and knowledge component."]} +{"18377188|55302051": []} +{"111117794|8253022": ["However, security and privacy concerns are shown to be the primary obstacles to a wide adoption [6]."]} +{"110269465|11810221": ["These uncertainties may stem from a number of possible sources [32, 33]: activities take more or less time than originally estimated, resources unavailable, unpredictable conditions, ill-defined and imprecise data which was used in scheduling, etc. Conflict prevention is a vital way to handle these\u2026", "Although this problem is very similar to the traditional resource-constrained project scheduling problem [32, 54], there are several significant differences between them: (1) All tasks have been scheduled reasonably."]} +{"30146927|13210924": []} +{"30146927|1537404": []} +{"36768212|33829339": []} +{"36768212|14295689": []} diff --git a/edge/graph_65252107.jsonl b/edge/graph_65252107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65312101.jsonl b/edge/graph_65312101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65328210.jsonl b/edge/graph_65328210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b300d5420f3c4357f35987662e9513fee4b8e13c --- /dev/null +++ b/edge/graph_65328210.jsonl @@ -0,0 +1,2 @@ +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} diff --git a/edge/graph_65336464.jsonl b/edge/graph_65336464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bdbe454f6a57185e5954dd0ccd2d55b597dd3aba --- /dev/null +++ b/edge/graph_65336464.jsonl @@ -0,0 +1 @@ +{"42132898|3202525": []} diff --git a/edge/graph_6534843.jsonl b/edge/graph_6534843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6536700.jsonl b/edge/graph_6536700.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6537874.jsonl b/edge/graph_6537874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59784d4001c6a832f7e9f52b48a6bdf824ce1f41 --- /dev/null +++ b/edge/graph_6537874.jsonl @@ -0,0 +1 @@ +{"5553200|16717715": []} diff --git a/edge/graph_6539555.jsonl b/edge/graph_6539555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4e0b4b45edb5aa6c3082acc31817969a4b083dc --- /dev/null +++ b/edge/graph_6539555.jsonl @@ -0,0 +1 @@ +{"1022282|1230643": []} diff --git a/edge/graph_6542879.jsonl b/edge/graph_6542879.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88b8f023bda1d2afb2e6f6337db45f7145432e72 --- /dev/null +++ b/edge/graph_6542879.jsonl @@ -0,0 +1 @@ +{"3939890|15249785": ["The program understanding toolset GUPRO [ 13 ] provides the textual graph querying language GReQL [28]."]} diff --git a/edge/graph_6543150.jsonl b/edge/graph_6543150.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0405993f32d4005f04d69a686ef91a72a27a61a0 --- /dev/null +++ b/edge/graph_6543150.jsonl @@ -0,0 +1,2 @@ +{"17178313|8310135": ["Amit Goyal 2008[10] had developed the system using CRF machine learning model for Hindi language."]} +{"61674660|8627028": []} diff --git a/edge/graph_65434948.jsonl b/edge/graph_65434948.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_65484589.jsonl b/edge/graph_65484589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b3b3b5129b6ea23b3b8860a62d4093bbaec1aa8 --- /dev/null +++ b/edge/graph_65484589.jsonl @@ -0,0 +1,8 @@ +{"3330144|13916820": []} +{"3330144|45478730": ["Typical SLAs include data exchange rates, mean time to repair, jitter and other service properties related with security as well [3].", "Afterward, a user interface with fine-grained configuration capabilities is provided to manage, orchestrate, and monitor the activity of the service usage [3,100].", "Malicious insiders, as are usually called [3,203,306], can overtake the physical security controls and penetrate the facilities.", "The interface, by default, is a gateway into the cloud and makes it an attractive attack target that can compromise the overall service security [3,281], therefore requiring proper security measures.", "User frontend Internet exposure of frontend interfaces [3,100,211,281]", "So far, ten cloud outages of major cloud providers have been reported in various studies [3,17,224].", "Another issue in terms of availability is related with hardware availability [3].", "Ahuja and Komathukattil [3] 2012 Software, perimeter, virtualization, compliance, access, storage \u00d7 \u2013 \u00d7 ++ \u2013 \u00d7", "Ahuja and Komathukattil [3] presented a survey on some common threats and associated risks to clouds."]} +{"3330144|17290408": ["Software Platforms and frameworks Isolation, resource accounting, safe thread termination [232]", "NET and the Java Virtual Machine (JVM) [232].", "RoderoMerino et al. explain the Multitasking Virtual Machine (MVM) [67], isolates-based KaffeOS [22] and I-JVM [91] solutions, and a heap-based protection [263].", "[232] have given a survey on the security state in PaaS cloud environments.", "[232] 2012 PaaS clouds, isolation, resource accounting, and safe thread termination \u00d7 \u00d7 \u00d7 + +", "[232] enlightened of the fact that PaaS providers are twofold.", "[232] provided an in-depth study on PaaS sharing-based cloud development and running platforms.", "[232], are, in their majority, prior to the rise of cloud environments.", "The most straightforward way for guaranteeing isolation is to create one JVM per application.", "[232] emphasized that such a layout can be compromised by malicious tenants in a straightforward way."]} +{"3330144|12815020": []} +{"11477596|3042864": ["The aforementioned limitations served as motivation for a new computing paradigm called MCC that enhances the abilities of mobile devices by moving the storage and compute intensive tasks of mobile to the cloud [56,82]."]} +{"11477596|13210924": ["The resources are provided to the users and released based on demands from the pool of shared resources [4].", "The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]."]} +{"11477596|13916820": []} +{"11477596|12017064": ["The security solutions have also been presented in [71].", "[71] reviewed the security issues at different levels of cloud computing."]} diff --git a/edge/graph_65491327.jsonl b/edge/graph_65491327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6555395.jsonl b/edge/graph_6555395.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6556803.jsonl b/edge/graph_6556803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c829e9f1b4be64cada793fa4fd9aa6b3acec556a --- /dev/null +++ b/edge/graph_6556803.jsonl @@ -0,0 +1,60 @@ +{"8133722|141053": ["[2] survey MAC protocols in wireless ad hoc networks."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"14038062|28670512": ["For more on exact solution methods of POMDPs, see the surveys in [27] and [33]-[36]."]} +{"571457|1230643": ["Networks of a large number of cheap, tiny, wireless sensors embedded in the physical world may be used for applications such as security surveillance, habitat monitoring, vehicle tracking and infrastructure monitoring([1]) etc."]} +{"1989943|18750590": []} +{"1989943|14650419": []} +{"15576441|1230643": ["from the surrounding environment, (ii) processing (and possibly storing) the acquired data, and (iii) transfering them through wireless communications to a data collection point called a sink node or base station [Akyildiz et al. 2002].", "\u2026\n 7:2 M. Di Francesco et al. from the surrounding environment, (ii) processing (and possibly storing) \nthe acquired data, and (iii) transfering them through wireless communications to a data collection point \ncalled a sink node or base station [Akyildiz et al. 2002]."]} +{"15576441|1708582": ["Approaches to ME discovery based on reinforcement learning, a form of unsupervised learning in the field of artificial intelligence [Kaelbling et al. 1996], were considered in Dyo and Mascolo [2008] and Di Francesco et al.", "Approaches to ME discovery based on reinforcement \nlearning, a form of unsuper\u00advised learning in the .eld of arti.cial intelligence [Kaelbling et al. 1996], \nwere consid\u00adered in Dyo and Mascolo [2008] and Di Francesco et al. [2010] for sparse WSNs."]} +{"6949391|1708582": ["The value iteration method requires (|\u039b||\u03a5|2) computations per iteration [11]."]} +{"9494512|12060835": ["Similarly, the harvested energy also varies from di\u21b5erent sources, of which, typical examples are solar, wind energy, thermal power, etc [29, 30]."]} +{"31998150|1230643": []} +{"37272960|16514036": ["Long\u2013term deployment of such networks is hindered by several distinct challenges [1].", "Wireless Body Area Networks (WBANs) constitute the basis for human body monitoring and enable a wealth of applications such as healthcare, sports, military and entertainment [1]."]} +{"35377558|1230643": []} +{"15397183|1230643": []} +{"37183236|205286988": ["As already mentioned in Section 3, the distance between two neighbors is an important consideration, because this distance directly affects the transmission power used in powers of two or more (Akkaya and Younis, 2005), and avoids uneven energy distribution among the nodes.", "The transmission power is directly proportional to the square of the distance between the neighboring nodes \u2013 it is more in the presence of obstacles (Akkaya and Younis, 2005).", "It can be shown that direct communication is much more expensive in terms of energy consumption than multi-hop communication (Akkaya and Younis, 2005)."]} +{"37183236|1230643": ["Power consumption in the nodes in WSN mainly occurs during the following three operations: sensing, communication and information processing (Akyildiz et al., 2002)."]} +{"20743054|3826739": ["Geographic routing protocols [6], [7], [8] focus on delay optimization by forwarding packets towards sensors near the destination, consequently increasing their progress, while activating congestion and holes avoidance mechanisms."]} +{"56035095|1230643": ["A collection of sensing nodes which are connected through wireless channels formed a wireless sensor network (WSN) [3,4]."]} +{"10845514|1230643": ["After deployment, sensor nodes form a WSN in an ad hoc manner and finally, the whole network starts its activity [1]."]} +{"52805691|1932843": ["\u2026of trees or controller nodes ~q while starting at state s is given recursively by:\nV (~q, s) = R(~a~q, s) + \u2211 s\u2032,~o T (s\u2032,~a~q, s)O(~o,~a~q, s\u2032)V (~q~o, s\u2032),\nwhere ~a~q are the actions defined at ~q, while ~q~o are the subtrees or resulting nodes of ~q that are visited after ~o have been seen."]} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} +{"6611238|12060835": ["Various energy sources, such as light, vibration or heat are available to be harvested [5]."]} +{"18979567|1230643": ["The developing trends in Micro-Electro-Mechanical Systems (MEMS) technology provide an opportunity to deploy huge number of small-sized low-cost sensors over large terrains [Akyildiz et al. 2002].", "INTRODUCTION The developing trends in Micro-Electro-Mechanical \nSystems (MEMS) technology pro\u00advide an opportunity to deploy huge number of small-sized low-cost sensors \nover large terrains [Akyildiz et al. 2002]."]} +{"1414296|1708582": ["We note that generally the state transition probability of an MDP can be represented by a \u2223\ud835\udcae\u2223 \u00d7 \u2223\ud835\udc9c\u2223 \u00d7 \u2223\ud835\udcae\u2223 table [22], in which \u2223\ud835\udc9c\u2223 and \u2223\ud835\udcae\u2223 are the numbers of actions and states of the MDP, respectively.", "Then, we can de \ufb01 ne the temporal-difference [22] as: where \ud835\udeff \ud835\udc61 ( s \ud835\udc61 ) is the difference between current and previous estimation of the value function."]} +{"40052877|1236072": ["0-7803-9252-3/05/$20.00 \u00a92005 IEEE 2296 level, power issue has been widely explored and discussed where different routing protocols have different impacts on the power consumption of WSNs [ 11 ]."]} +{"40052877|1230643": []} +{"12611310|1230643": ["battlefield surveillance [26]) in an unattended and distributed manner, they are highly susceptible to physical destruction [27]\u2013[29]."]} +{"12611310|12060835": ["the sensor nodes to replenish energy from ambient sources, such as solar, wind, and vibrations [3], [4].", "For tractability, we assume that the energy harvesting rate hk takes values from the finite set H = {H1, H2, H3} = {4, 8, 12} J/allocation interval [4], and evolves according to the three-state Markov chain with the state"]} +{"11247849|5660618": ["[1], [2]) as the probability of packet drop is now controlled by the selected transmitted power."]} +{"18744572|1230643": ["Wireless Sensor Networks (WSNs) [1] are used for decentralized measurement of real-time data."]} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"57312901|15300368": ["1: Example of recorded time-stamps during two way communication for Clock1 and Clock2: C1 and C2 are the departure/arrival time of the message from/to Node; C3 is the difference between the departure and the arrival of the message; C4 is the difference between the differences of the incoming and outgoing message (C4[1] = C3[1] - C3[3], C4[2] = C3[2] C3[4], .", "WSN can be described as a network consisting of multiple nodes that cooperatively sense the environment and communicate gathered information via wireless link(s) [1, 2]."]} +{"57312901|1230643": ["WSN\u2019s share common characteristics: large number of nodes, changing topology, pre-processing sensed data locally, multi-hop communication [1].", "1: Example of recorded time-stamps during two way communication for Clock1 and Clock2: C1 and C2 are the departure/arrival time of the message from/to Node; C3 is the difference between the departure and the arrival of the message; C4 is the difference between the differences of the incoming and outgoing message (C4[1] = C3[1] - C3[3], C4[2] = C3[2] C3[4], .", "WSN can be described as a network consisting of multiple nodes that cooperatively sense the environment and communicate gathered information via wireless link(s) [1, 2].", "1: Components of a sensor node (adopted from [1]).", "[1] also mention limited power, limited computational capabilities, limited memory as a characteristics of typical WSN.", "As a result the quite periods are needed during which all the nodes are prohibited to transmit so that the energy detection is not compromised [1] after which all nodes sense the spectrum simultaneously [76].", "1, it consists of four basic elements [1]: sensing unit, processing unit, transceiver, and power unit."]} +{"10472917|562065": [", ice melting) monitoring of natural events in potentially large areas [1]."]} +{"29767|205286988": ["In this section we will describe the system model in the context of geographical forwarding, also known as location aware routing, [2], [8], [9]."]} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} +{"8294004|1230643": ["The Honeywell HMC1002 magnetometer sensor [16] consumes on average 15 mW of power and can be sampled in 0.1 ms on the Atmel ATmega128L microprocessor, which results in a maximum sampling frequency of approximately 10 KHz (10,000 samples per second)."]} +{"47284090|1708582": ["This approach combines QMDP with reinforcement learning [14]."]} +{"1470481|2835258": ["Observing the good performance and the ease of implementation of the simple policy, we apply it to our motivating problem, i.e., local geographical routing of sporadic alarm packets in a large WSN."]} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"14757938|1230643": ["In reality, however, the number of nodes could be nearly several millions [39]."]} +{"14703198|1230643": ["Because EPWSN nodes have limited processing capability [15], wakeup scheduling schemes that use complex algorithms may not be suitable.", "Finally, constraints on channel and storage capacities [15] imply that wakeup scheduling schemes must have low communication and storage overhead.", "EPWSNs are highly dynamic in terms of topology, energy supply, and data traf\ufb01c among others [15].", "As enumerated by Akyildiz et al. [15], WSNs pose numerous challenges including highly dynamic network topology due to fail-ure-prone nodes and wireless links, limited memory and processing power and most importantly, limited network lifetime due to battery capacity limitations."]} +{"14703198|12060835": ["Table 1 provides a summary of achievable energy harvesting rates of several stateof-the-art energy harvesting technologies [2,4,11,12].", "Although there are many types of rechargeable batteries available in the market, nickel metal hydride (NiMH) and lithium ion (Li-ion) are considered to be more suitable for sensor nodes [14,4].", "Currently, there are two dominant energy storage technologies that can be utilized in EPWSN [1,6,14,10,4,11]: (i) secondary or rechargeable batteries; and (ii) supercapacitors, also known as ultracapacitors or electrochemical double layer capacitors.", "Because ambient energy is readily available, energy harvesting could enable perpetual operation without the need for battery replacement [3,4]."]} +{"9733280|12060835": []} +{"29285019|1230643": []} +{"7384145|1230643": ["However, since computation is much cheaper than communication [6], [ 7 ], exploiting the on-board computation capabilities of sensor nodes to discover near-optimal time instants is worthwhile."]} +{"6152999|1708582": ["A well-known strategy called e -greedy (Kaelbling et al., 1996) can be utilized to make this trade-off between exploitation and exploration.", "In order to controls the movement of the MA, it exists a learner and decision-maker called agent (Kaelbling, Littman, & Moore, 1996)."]} +{"2210228|1230643": []} +{"52854618|1230643": ["As sensor nodes are generally battery-operated, to design a good MAC protocol for WSNs, the first attribute that has to be considered is energy consumption [1]."]} diff --git a/edge/graph_6558660.jsonl b/edge/graph_6558660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b510b059ceb94dcf36ded0fcd5b273f52832e5b --- /dev/null +++ b/edge/graph_6558660.jsonl @@ -0,0 +1 @@ +{"59484312|18609918": ["Ear morphology exhibits strong variation amongst real humans to the extent that it has been used to identify individuals and in forensic work for over a century (Bertillon, 1893; Pflug and Busch, 2012; Abaza et al., 2013)."]} diff --git a/edge/graph_6562040.jsonl b/edge/graph_6562040.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97486a1b7a2e3f94b30abc3d74c79541538271c2 --- /dev/null +++ b/edge/graph_6562040.jsonl @@ -0,0 +1,2 @@ +{"10580025|1230643": ["A wireless sensor network (WSN) typically consists of a large number of small, multifunctional, and resourceconstrained sensors that are self-organized as an ad hoc network to monitor the physical world [1]."]} +{"57127025|1236072": []} diff --git a/edge/graph_6565161.jsonl b/edge/graph_6565161.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6565563.jsonl b/edge/graph_6565563.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6568167.jsonl b/edge/graph_6568167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..123fb46d37c37ed7755142c3decb76a6c0e3337d --- /dev/null +++ b/edge/graph_6568167.jsonl @@ -0,0 +1,15 @@ +{"7326413|9045232": ["AUTOMATIC face recognition (AFR) has been studied for over 30 years [1]\u2013[3]."]} +{"9696152|5171123": ["Although a lot of effective methods have been proposed [1] [2], robust face recognition under variant illumination conditions is still challenging [3], especially when there is only a single sample per subject [4], which is common in many face recognition applications, e."]} +{"196038672|192934": []} +{"43655761|16620699": []} +{"16840167|6028805": ["1D Hidden Markov Models (HMMs) [35], pseudo-2D HMMs [19, 31] and Gaussian Mixture Models (GMMs) [8, 39, 7]. As an in-depth review of face recognition literature is beyond the scope of this report, the reader is directed to the following review articles: [9, 23, 25 , 48]."]} +{"16840167|9045232": ["For information about face localization the reader is directed to the following publications: [11, 47, 46]."]} +{"5862507|5171123": ["Single sample face recognition approaches can be divided into three classes [12]: holistic methods, local methods and hybrid methods, among which holistic methods play an important role in single sample face recognition."]} +{"18111617|5171123": ["For this purpose, we use human face databases as an example."]} +{"23078027|469744": []} +{"6168092|16620699": ["Surveys on 3D face recognition approaches can be found in [8][9] and [50]."]} +{"6168092|6028805": ["from different persons are significantly different, while those temperature of the object and emissivity of the material[29].", "Those modalities include 3D face information [8] and face images in those spectra other than visible spectra, such as thermal infrared image [29] and near-infrared hyperspectral image [40].", "Various fusion schemes have been proposed [29] [15] [4] [60] and shown to lead to better performance than"]} +{"13164123|6028805": ["However, for the reason of temperature of the environment, physical conditions, psychological conditions and thermal infrared characteristic of being opaque to eyeglasses, various fusion schemes have been proposed to motivate the fusion of thermal infrared image with visible images for face recognition and shown to lead to better performance than the recognition based on either modality alone.(7,8) With the advantages of being invisible and transparent to eyeglasses, active Near-Infrared can be used to obtain face images in consistent illumination condition by regulating its intensity and orientation."]} +{"18941394|62198990": []} +{"2990752|36705207": []} +{"2990752|6028805": ["Illumination Normalization Framework for Large-scale Features\nThe fusion of Thermal-IR and visible sensors is a popular solution to illumination-invariant face recognition (Kong et al., 2005).", "\u2476 a normalized face image is generated by combination of the normalized large-scale feature image and smoothed small-scale feature image.\nwww.intechopen.com\nThe fusion of Thermal-IR and visible sensors is a popular solution to illumination-invariant face recognition (Kong et al., 2005).", "Therefore, the face images captured using Thermal-IR sensors will be nearly invariant to changes in ambient illumination (Kong et al., 2005).", "Illumination Normalization Framework for Large-scale Features The fusion of Thermal-IR and visible sensors is a popular solution to illumination-invariant face recognition (Kong et al., 2005)."]} diff --git a/edge/graph_6569880.jsonl b/edge/graph_6569880.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d70f74c3869c94b2305dba9e01e8d0cfb28e7d2c --- /dev/null +++ b/edge/graph_6569880.jsonl @@ -0,0 +1,3 @@ +{"3117315|10739218": ["In [38], [39], the authors build a network for classi\ufb01cation purposes."]} +{"4643842|191396": []} +{"16644331|6159806": []} diff --git a/edge/graph_6570872.jsonl b/edge/graph_6570872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c930c0bfcbbded9fed7775bc4cff4618dd135ffe --- /dev/null +++ b/edge/graph_6570872.jsonl @@ -0,0 +1,3 @@ +{"14106275|14545307": []} +{"58055334|7360895": ["In the context of human-robot interaction (HRI), (Fong et al., 2003) claim that \u201cdia-logue, regardless of form, is meaningful only if it is grounded, i.e. when the symbols used by each party describe common concepts.\u201d", "\u201d In the context of humanrobot interaction (HRI), (Fong et al., 2003) claim that \u201cdialogue, regardless of form, is meaningful only if it is grounded, i."]} +{"6957672|7788290": ["The problem of locating people is the problem of determining their x\u2013y-location relative to the robot.1 Previous approaches to people tracking in robotics are feature-based: they analyze sensor measurements (images, range scans) for the presence of features [ 15 ,26] as the basis of tracking."]} diff --git a/graph_657210.jsonl b/edge/graph_657210.jsonl similarity index 100% rename from graph_657210.jsonl rename to edge/graph_657210.jsonl diff --git a/edge/graph_6573283.jsonl b/edge/graph_6573283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6575972.jsonl b/edge/graph_6575972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bd18520c099153bfe803edaa8264a279382f73f --- /dev/null +++ b/edge/graph_6575972.jsonl @@ -0,0 +1,18 @@ +{"610347|16323798": ["However, a downside of current NALM approaches for low-rate data (see [7], [8], [9] literature surveys) is their requirement for long training periods and substantial manual effort."]} +{"8647187|16323798": ["These approaches are compute intensive and appliances with similar or overlapping load signatures are typically difficult to discern."]} +{"25232372|16323798": ["Moreover, utility companies can exploit the big data collected by the systems for better load forecasting and policy making, which has been a key motivation to push forward the deployment of smart meters [1].", "A more complete survey of the state-of-the-art NILM techniques can be accessed in [1]."]} +{"7235271|16323798": ["els to new homes and automatically annotating appliance events [2]."]} +{"33810942|16323798": ["Since Hart\u2019s contribution, the problem of NIALM has been extensively studied in the literature (for a review, see [6], [7], [8] and references therein)."]} +{"17695653|16323798": ["\u2026Support Vector Classification, BLUED dataset\nI. INTRODUCTION\nNon-Intrusive Load Monitoring (NILM) is an energy monitoring technique that aims at inferring the energy consumption profiles of individual loads merely from a single or a limited number of aggregate measurement points in a\u2026"]} +{"7728282|16323798": []} +{"5035653|16323798": ["Such probabilistic approaches are usually based on a Hidden Markov Model (HMM) and its variants (see [7], [23], [27]\u2013[29] and references therein).", "For a more detailed review of NILM, see review papers [21], [23].", "power and the sum of the disaggregated loads, deviating from traditional NILM approaches (see [9], [23] and references therein).", "Transient methods require sampling rates in the order of kHz or MHz [23], unlike steady-state methods, which are more sensitive to power level fluctuations and at low sampling rates, require longer monitoring time to capture all operation cycles [24]."]} +{"14213360|16323798": ["A review of different approaches to the disaggregation problem can be found in [13, 12]."]} +{"18120085|16323798": ["Performing a performance evaluation of a NILM algorithm is difficult, because there is no standard evaluation procedure to apply [33].", ", combinatorial or probabilistic), utilize different learning methods, or rely on different data granularities have been proposed in the literature [32, 33].", "NILM algorithms are often evaluated on single, possibly non publicly available data sets and the parameter of the algorithm are tuned to operate on those data sets [32, 33].", "To avoid the need of monitoring individual appliances, non-intrusive load monitoring (NILM) algorithms have been proposed in the literature [32, 33]."]} +{"3330030|9564961": [", a smart microgrid [1] with local energy production that needs to be monitored and coordinated."]} +{"456873|16323798": ["However, so far, there are no widely available efficient solutions for NALM, with high accuracy, at such low sampling rates [3]."]} +{"7018570|16323798": ["In [9] both supervised and unsupervised techniques are discussed, but there is a poor description about performance."]} +{"1926344|16323798": ["\u2026states (e.g., on, off, standby state), such as Hidden Markov Model (HMM) and its variations, have become popular for NALM, because they are good at modelling the combination of stationary processes, with continuous valued data over discrete time (see [5], [7]\u2013[10] and references there in).", "According to [5], state-of-the-art HMM-based methods [8], [10], [11] work of\ufb02ine , can be supervised or unsupervised, and are not scalable.", "However, so far, there are no widely available ef\ufb01cient solutions for NALM, that offer high accuracy and low complexity at low sampling rates [4], [5].", "In the following, we closely follow the notion of [25], which we review next."]} +{"36713766|16323798": ["See [2, 4, 5, 6, 7], for examples of NALM applications.", "SVM-based NALM has shown good performance [5], it is scalable, and is a well established method for classifying noisy data.", "SVM-based algorithms are optimal classifiers in the presence of noise and proven to perform well for NALM applications [5].", "However, so far, there are no widely available efficient solutions for NALM, that offer high accuracy and low complexity at such low sampling rates [4, 5]."]} +{"53304118|9928823": []} +{"53304118|393948": []} +{"206486643|16323798": ["As is common practice [19], [20], the method works on sliding time windows, whose duration can be adjusted.", "As is common practice in NALM [19], [20], [23], each appliance load is estimated using the average appliance power consumption during the identified event time interval, although, some more sophisticated approaches are possible [21]."]} diff --git a/edge/graph_6576361.jsonl b/edge/graph_6576361.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6531047046915f171fe8030de44e2dfa2d284665 --- /dev/null +++ b/edge/graph_6576361.jsonl @@ -0,0 +1 @@ +{"1318877|7788290": ["Predominately, the recognition of individual actions [29], or interaction involving few people [25, 11] has been investigated using visual features [ 12 , 11, 25, 29, 32], although some work on the speech community can also be categorized as interaction recognition [10, 31]."]} diff --git a/edge/graph_6577460.jsonl b/edge/graph_6577460.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6577991.jsonl b/edge/graph_6577991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04df81d76928eda6b151b7eeca4eabc127543655 --- /dev/null +++ b/edge/graph_6577991.jsonl @@ -0,0 +1,6 @@ +{"16300272|175549": []} +{"4799220|16332566": ["It utilizes a hybrid system comprised of a classical computer that searches for the optimal variational protocol using measurements done on a quantum machine that generates the final states corresponding to different variational protocols, via a closed-loop learning method [34]."]} +{"14253494|17300331": []} +{"2233303|16332566": [", the ability to control the system [17].", "This task is complicated by the quantum mechanical nature of the system, which allows non-classical correlations and non-continuous jumps of the system\u2019s state [17].", "Quantum control concerns the application of control procedures to systems whose dynamic are governed by quantum mechanics [17]."]} +{"2233303|1708582": ["Reinforcement learning is an alternative approach to control that does not necessarily have an explicit mathematical model of the underlying physical system, but rather it optimizes system behavior by studying responses given a set of inputs [18, 19].", "Reinforcement learning is a valuable tool for applying control as it provides methods to generate a policy that does not rely on the knowledge of the system [18, 19, 86]."]} +{"64536201|14617477": ["As will be seen throughout the review, there are quantum algorithms for machine learning that exhibit quantum speedups [4, 5, 6, 7]."]} diff --git a/edge/graph_6581557.jsonl b/edge/graph_6581557.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c61cd55b5c8249cc6e506516cc8fe84319b07e54 --- /dev/null +++ b/edge/graph_6581557.jsonl @@ -0,0 +1,4 @@ +{"17012697|17428811": ["The tools of the EvalVid framework are continuously extended to support other video codecs as H.263, H.26L and H.264 and to address additional codec functionalities like fine grained scalability (FGS) [ 13 ] and intra frame resy nchronisation."]} +{"12287779|10559330": []} +{"37682875|17428811": []} +{"37682875|7439310": []} diff --git a/edge/graph_6583734.jsonl b/edge/graph_6583734.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e3d944e9c67e573baad7b9c043c626ebf2700481 --- /dev/null +++ b/edge/graph_6583734.jsonl @@ -0,0 +1,2 @@ +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} diff --git a/edge/graph_658495.jsonl b/edge/graph_658495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6588866.jsonl b/edge/graph_6588866.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3998120a55fbb41e6a981c1ff2e57130c75eb7ea --- /dev/null +++ b/edge/graph_6588866.jsonl @@ -0,0 +1,6 @@ +{"38845542|17003768": ["Because of its relation to frequency assignment in mobile and wireless networks, the vertex coloring problem has been considered in many research papers, (e.g., see the survey papers Galinier et al. [7], Tuza [18] and the source book [10] of coloring problems by Jensen and Toft).", "[7], Tuza [18] and the source book [10] of coloring problems by Jensen and Toft).", "The proof of this result however implies the following statement taken from Tuza et al. [19] that for a planar graph G with outer face F , every pre-coloring of two adjacent vertices v1, v2 of F can be extended to a list coloring of G for every list assignment with |L(v)| = 3 if v \u2208 V (F ) \u2212 {v1, v2} and |L(v)| = 5 if v 6\u2208 V (F ), where V (F ) denotes the vertex set of F ."]} +{"61285373|1230643": ["This thesis studies computational problems motivated by distributed systems, in particular by wireless sensor networks [3, 38, 101, 177]."]} +{"5800967|6588866": []} +{"844993|6588866": []} +{"18825934|14323396": []} +{"28794362|2835258": []} diff --git a/edge/graph_6592804.jsonl b/edge/graph_6592804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_659377.jsonl b/edge/graph_659377.jsonl similarity index 100% rename from graph_659377.jsonl rename to edge/graph_659377.jsonl diff --git a/edge/graph_6598584.jsonl b/edge/graph_6598584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a222122105e640cf53dbf1af38502c42008f0835 --- /dev/null +++ b/edge/graph_6598584.jsonl @@ -0,0 +1,9 @@ +{"7192157|9431428": ["\u2026a suitable classifier can not only answer the question of whether there is information about a variable of interest (pattern discrimination), but can also tell us where the information is (pattern localization) and how that information is encoded (pattern characterization) (Pereira et al., 2009).", "A recent review showed that a suitable classifier can not only answer the question of whether there is information about a variable of interest (pattern discrimination), but can also tell us where the information is (pattern localization) and how that information is encoded (pattern characterization) (Pereira et al., 2009).", "However, in constructing the classifier, feature selection is to reduce the ratio of features to samples, decreasing the chance of overfitting, as well as to get rid of uninformative features to let the classifier focus on informative ones (Pereira et al., 2009).", "In the last few years, a growing number of studies have shown that machine learning is capable of extracting stable structural or functional patterns from neuroimaging data, and may potentially be useful for finding significant neuroimaging-based biomarkers (Pereira et al., 2009)."]} +{"34872970|9431428": []} +{"5861645|7761990": []} +{"9552167|9431428": []} +{"15220943|9431428": []} +{"1305310|9431428": ["This means that training the classifier would no longer be independent of the test data, which violates the independence assumption underlying cross-validation, a situation referred to as peeking [10].", "For conventional fMRI classification procedures, good-practice guidelines have been suggested for avoiding an optimistic bias in assessing classification performance [8,10].", "Unlike mass-univariate encoding models, these methods predict an experimental variable (e.g., a trial-specific condition or subject-specific disease state) from the activity pattern across voxels (see [6\u201310] for reviews).", "Specifically, voxels were selected on the basis of the same \u2018all auditory events\u2019 contrast as above, which is a common approach to defining a voxel-based feature space in subject-by-subject classification [11,12,10]."]} +{"11227964|9431428": ["A \ufb01 nalnote:whilethepaperintroducesthemainideasofalgorithms, we donot attempt afulltreatmentoftheavailableliterature."]} +{"37925315|12681089": []} +{"9775331|9431428": ["The second is voxel selection, using those accuracy values as scores with which to rank voxels; we will not be concerned with this purpose, but see [30] for an overview of this and other approaches to selecting voxels.", "A good basic introduction to these and other machine learning concepts is [22] (and [30] and [25], in the specific context of using classifiers with fMRI data)"]} diff --git a/edge/graph_6604384.jsonl b/edge/graph_6604384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6607209.jsonl b/edge/graph_6607209.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa98e5e2da41a03b66b1a0a40f81cd51ff53d995 --- /dev/null +++ b/edge/graph_6607209.jsonl @@ -0,0 +1,4 @@ +{"7099101|6607209": []} +{"61299428|6607209": []} +{"3287827|6607209": ["Recently, market concepts have been introduced to multirobot systems in the form of market-based coordination approaches and auction-based task allocation schemes [13].", "Recently, market concepts have been introduced to multirobot systems in the form of market-based coordination approaches and auction-based task allocation schemes (Dias et al. 2006).", "Market-based approaches for multirobot coordination have been demonstrated to produce scalable and efficient solutions in applications characterized by dynamic conditions and uncertainty; however, examples of market mechanisms to date all effectively solve simple task allocation problems [13].", "\u2026approaches for multirobot coordination have been demonstrated to produce scalable and efficient solutions in applications characterized by dynamic conditions and uncertainty; however, examples of market mechanisms to date all effectively solve simple task allocation problems (Dias et al. 2006)."]} +{"24477|6607209": ["This paper in particular extends our shorter technical report [19]: it presents more concrete results, more thoroughly explores the topics, and includes new topics of discussion."]} diff --git a/edge/graph_6624342.jsonl b/edge/graph_6624342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8d3e9927f119026d56a82ddf6382301c529bc2c --- /dev/null +++ b/edge/graph_6624342.jsonl @@ -0,0 +1,14 @@ +{"6258204|13558235": ["The superiority of the proposed method in comparison to JPEG, JPEG2000, SPIHT [6], and several of the latest DCT- and DWT-based methods on a set of test images is shown in Section VI."]} +{"122293761|13558235": []} +{"123281725|13558235": []} +{"15628430|13558235": ["Some investigate region-based image coding methods in [5], and some combine fractal with other algorithms such as wavelet in [6], genetic algorithms in [7], discrete cosine transform in [8], [9]."]} +{"21266984|13558235": []} +{"12908643|13558235": []} +{"33620206|710141": ["There are several types of fractal dimensions, such as Hausdoff dimension, box-counting dimension and modified dimension, in which the box-counting dimension (written byDimB) is the most widely accepted for the intrinsic dimension [ 8 ]."]} +{"12126511|13558235": []} +{"9774896|13558235": ["Thus, under the premise of enhancing the compression ratio, how to reduce coding time and how to improve the quality of the reconstructed image has become the important task of the technology ([10]), in some cases, we have to make a tradeoff among them."]} +{"937637|14545307": []} +{"15009748|11262595": ["[20]) it is clear that by suitably partitioning the input and output domains with fuzzy sets one can obtain any of the classical a priori transformations to arbitrary accuracy."]} +{"1488436|13558235": []} +{"45851989|13558235": ["A. Jacquin was the first to propose a practical block based fractal image coding scheme (idea) in 1990, basis of most published fractal image coding schemes, [2, 5, 10, 11].", "Over the past years, many fast searching algorithms have been developed to surmount the \u201cspeed problem\u201d, [5, 10, 11].", "A survey of some really significant advances is represented in [10, 11]."]} +{"33234373|13558235": ["NUMBER of papers on fractal image encoding have been proposed since the original idea of Barnsley and Sloan in 1988 (see [ 1 ] for review)."]} diff --git a/edge/graph_6626346.jsonl b/edge/graph_6626346.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d91d5bc0af057fd631d55c3d4c4b4d6c0ef56af --- /dev/null +++ b/edge/graph_6626346.jsonl @@ -0,0 +1 @@ +{"42396970|15516254": ["New trends in communication, especially the deployment of multicast and real time audio/ video streaming applications, are likely to increase the percentage of non \u2013TCP traffic in the internet [ 2 ]."]} diff --git a/edge/graph_6627566.jsonl b/edge/graph_6627566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3903cb5e4a152df1a6e55c25be765ee1006fcd8a --- /dev/null +++ b/edge/graph_6627566.jsonl @@ -0,0 +1,2 @@ +{"7181876|53531425": ["Although there is no standard production system, there are some unifying themes that embody each implementation (see [5] for an excellent overview).", "A method that could be used to make such a comparison was later introduced by Brousil and Smith [5] ."]} +{"42942745|2036805": []} diff --git a/edge/graph_6628538.jsonl b/edge/graph_6628538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7aa3bde0dda020880bf196c002eea02c4b85679e --- /dev/null +++ b/edge/graph_6628538.jsonl @@ -0,0 +1,4 @@ +{"62684128|1289787": ["Several excellent surveys of the general warehouse design problem are provided in the literature (Matson and White 1982, Ashayeri and Gelders 1985, Cormier and Gunn 1992, Van den Berg 1999, Rouwenhorst et al. 2000)."]} +{"4719202|1289787": []} +{"109580660|1289787": ["\u2026assembly plants, the typical use of an ASRS is efficient warehousing (i.e. put-away, storage, and order picking) and there exists extensive research for this function; see Vandenberg (1999) and Rouwenhorst et al. (2000) for surveys of the literature on warehouse planning, design and control."]} +{"207733745|1289787": ["Readers may also refer to Rowenhorst et al. (2000) for a recent survey on the overall warehouse design and operation problems."]} diff --git a/edge/graph_6632010.jsonl b/edge/graph_6632010.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e72897fd34c724aeb732ee857f9f4d6aab6be8f --- /dev/null +++ b/edge/graph_6632010.jsonl @@ -0,0 +1,10 @@ +{"10026220|12419623": ["The references in this respect are too numerous to list \u2014 see Abbasbandy [2003] , Noor et al. [2007], Noor and Noor [2007b; 2006; 2007a], Homeier [2003], and Darvishi and Barati [2007] for more details and references."]} +{"31094101|13985031": []} +{"31094101|12419623": []} +{"44962334|63137": ["The results presented in this section were obtained in [25,52,67].", "This is done by studying these algorithms under a common algorithmic framework called model-based search (MBS) [67].", "Zlochin et al. [67] have proposed a unifying framework for so-called model-based search (MBS) algorithms.", "The SGA parameter value update that we describe in the following is a generalization of the one that was presented in [67] (which was itself a generalization of the one that was given in [52])."]} +{"11575618|63137": ["Following Zlochin et al. (2004), we classify the solution methods for both continuous and combinatorial problems as being either instance-based or model-based."]} +{"13068209|14843594": ["Therefore, Gaussian process based ef\ufb01cient global optimization 1 (Jones et al., 1998; Shahriari et al., 2015), as a sample-ef\ufb01cient method to solve black-box optimization problems (Xu et al., 2022a), has recently been becoming more and more popular."]} +{"195718377|33452313": ["Details including extensive Monte Carlo experiments, a case study concerning a logistic system in China, and the validation of the MSB assumptions are given in Kleijnen (2015, pp. 159(cid:150)172) and Shi and Kleijnen (2017).", "We base this tutorial on Kleijnen (2017), which is a recent review based on Kleijnen (2015)."]} +{"2125266|12419623": ["Andradottir (1998a) presents a modified simulated annealing algorithm that can be applied \nto discrete-event simulations and provides conditions under which the algorithm converges to a global \noptimum.", "Andradottir (1998a) presents a modified simulated annealing algorithm that can be applied to discrete-event simulations and provides conditions under which the algorithm converges to a global optimum.", "Alrefaei and Andradottir (1998b) present a modified stochastic ruler \nalgorithm and show that it converges almost surely to a global optimum."]} +{"122768749|13985031": []} +{"14450877|13985031": []} diff --git a/edge/graph_6634944.jsonl b/edge/graph_6634944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74e7fe495dfea56fd897f26177f8ece020abb288 --- /dev/null +++ b/edge/graph_6634944.jsonl @@ -0,0 +1 @@ +{"38163521|2357830": []} diff --git a/edge/graph_6644671.jsonl b/edge/graph_6644671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2ba3d837297589ac52581b97f39836cc981d5d2 --- /dev/null +++ b/edge/graph_6644671.jsonl @@ -0,0 +1,6 @@ +{"684873|14065459": ["With the increase in computing power and advances in camera technologies, camera networks are being used in more and more applications like surveillance [17, 18], intelligent environments [29, 30], and traffic monitoring [10, 5, 16]."]} +{"18446469|7788290": ["analysis, we refer the reader to Gavrila [ 44 ], Aggarwal and Cai [45], and the special issue of the"]} +{"9957336|1230643": []} +{"16296326|16525678": []} +{"6208983|164835": ["Various proposals which have been made to determine the distance between nodes in wireless systems include the Signal Strength method, the Angle of Arrival (AOA) method, the Time of Arrival (TOA) and Time Difference of Arrival (TDOA) methods [3]."]} +{"15053215|1230643": []} diff --git a/edge/graph_6658471.jsonl b/edge/graph_6658471.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c2a698ce962f6e4efb5d23e770ca487af940062 --- /dev/null +++ b/edge/graph_6658471.jsonl @@ -0,0 +1,18 @@ +{"19172308|534755": ["Various mathematical formalisms are employed to model gene-regulatory networks (reviewed in de Jong 2002)."]} +{"1364567|534755": []} +{"223938|8125630": []} +{"12790394|7839197": ["It is because they offer the high-level software abstractions needed to manage complex applications and because they were invented to cope with distribution and interoperability [2,9,12,19,24,36]."]} +{"11326425|386036": ["Several works have focused on the important problems of record linkage and record matching [8][11][19]."]} +{"28495795|6159806": ["These approaches range from incrementally assisting the user at each step of the service composition process (known as semi-automatic service composition) to inferring the entirety of the desired workflow with little to no direction from the user (known as automatic service composition, or ASC) [7,8]."]} +{"6391339|10500613": []} +{"1096580|60779308": []} +{"1096580|11894197": []} +{"1096580|206051485": []} +{"15254680|7839197": ["Two well-known taxonomies are Nwana's [53] and Franklin and Graesser's [52]."]} +{"12435554|8125630": ["Chaudhuri and Dayal [31] also have published a survey of data warehousing technology."]} +{"23029266|534755": ["Our goal is to find a solution H\u2217 that satisfies inequality (2).", "Thus only solutions H\u2217 with d(H\u2217, x(t)) \u2265 t (2)", "We can use any given reverse-engineering algorithm A to find a solution H\u2217 that satisfies inequality (2); all it takes is to fabricate some data.", "Prominent examples are lex(icographical) orders generated by a variable order x (1) \u227ax (2) \u227a \u227ax (n) and graded term orders in which < always implies x \u227ax .", ",15 the problem is partially solved by using preprocessing to find a suitable variable order x (1) \u227ax (2) \u227a \u00b7 \u00b7 \u00b7 \u227ax (n), and then running the LS algorithm with a term order \u227a that is consistent with this", "Clearly, the solution H\u2217 returned by this algorithm is also a solution of the reverse-engineering problem for D, and it satisfies (2)."]} +{"15893754|534755": []} +{"26816353|10500613": []} +{"20330066|534755": []} +{"2295963|6658471": ["Beside the globally unique identifiers as described in the LSID section of [1] there is a need for using common controlled vocabularies to enable true data integration [2], data exchange [3], efficient information [4] and text mining [5-7] approaches.", "A general overview about data management approaches was already given in the first part of this paper [1].", "A step towards this direction can be achieved by tools like ISA-TAB [1], provided that they support easy integration of ontology lookup for annotation tasks.", "For instance today the same entities are often referred to by different URI\u2019s in different ontologies, a situation which could be resolved by the introduction of the already mentioned globally unique identifiers (GUID\u2019s) [1]."]} +{"205711787|10500613": ["While it mostly remains a manual, labor-intensive and tedious process, some approaches have been developed to automate it [63]."]} diff --git a/edge/graph_6659901.jsonl b/edge/graph_6659901.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6660049.jsonl b/edge/graph_6660049.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..051e68de608cd3c7322ace872a1a7bad06c1d456 --- /dev/null +++ b/edge/graph_6660049.jsonl @@ -0,0 +1,4 @@ +{"17024419|206986719": ["7a) that show 3D objects, or personal digital assistants/PDAs [161] (Fig."]} +{"17024419|469744": ["Compared to virtual environments, AR tracking devices must have higher accuracy, a wider input variety and band-width, and longer ranges [17].", "Following [17, 19], an AR system: \uf0b7 combines real and virtual objects in a real environment; \uf0b7 registers (aligns) real and virtual objects with each other; and \uf0b7 runs interactively, in three dimensions, and in real time.", "In the meantime, several surveys appeared that give an overview on AR advances, describe its problems, classify and summarise developments [17, 19, 28]."]} +{"207190379|469744": ["While this arrow is overlaid on the video, it is not fully an AR interface as it does not strictly follow the definition of Azuma [3]: it is not registered in 3D with the environment,"]} +{"17337612|469744": ["Several other research projects in this area deal with human interaction factors, AR views and the growing range of divergent positioning techniques [1, 4, 8, 20].", "In 1997, Azuma [1] published a survey of six classes of potential AR applications: medical, maintenance and repair, annotation, robot path planning, entertainment and military aircraft navigation and targeting.", "A major strength of augmented reality (AR) systems is their intuitive depiction of information, where the user perceives virtual and real objects as coexisting in the same space [1]."]} diff --git a/edge/graph_6664074.jsonl b/edge/graph_6664074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6301bdd82b148f73f7b59e9928bde0b1d29b5444 --- /dev/null +++ b/edge/graph_6664074.jsonl @@ -0,0 +1,9 @@ +{"5909595|1940388": []} +{"5909595|12817488": []} +{"5909595|1236072": [", one-to-one, one-to-all, all-toone) [60], [61]."]} +{"5909595|1230643": ["Recently, it has seen an explosive growth in both academia and industry [1], [2]."]} +{"39271366|10162051": ["An excellent overview of the issues involved can be found in [29]."]} +{"11481016|5766836": ["The problem becomes even more complex in the context of open-source development, when hardware-speci\ufb01c tools not publicly available."]} +{"2713324|17683338": ["Because of these design trade-offs, TinyOS and Contiki are thus lacking several key developerfriendly features: standard C and C++ programability, standard multi-threading, and real-time support (see Table I).", "The programming models in Contiki and TinyOS are based on the event driven model, in a way that all tasks are executed\n978-1-4673-5946-7/13/$31.00 \u00a92013 IEEE\n3569\nwithin the same context, although they offer partial multithreading support.", "Contiki uses a subset of the C programing language, where some keywords cannot be used, while TinyOS is written in a C dialect called nesC.", "The scheduling in Contiki is purely event driven, similar to that in TinyOS, where a FIFO strategy is used.", "The dominant WSN OS, Contiki and TinyOS [3], follow an event driven design, which is useful for typical WSN scenarios, but exhibit drawbacks for efficient and functional networking implementations."]} +{"2765859|1236072": []} +{"3157126|10162051": ["Klein [40] provides a comprehensive overview."]} diff --git a/edge/graph_6670217.jsonl b/edge/graph_6670217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50310c442d7ee32780084ac76ba4557c9eb2b998 --- /dev/null +++ b/edge/graph_6670217.jsonl @@ -0,0 +1 @@ +{"15625882|6486398": ["In fact, equation (3) corresponds to the iterative version of the adjusted page rank procedure used by the Google search engine [17]."]} diff --git a/edge/graph_667684.jsonl b/edge/graph_667684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6678771.jsonl b/edge/graph_6678771.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4dfb83190cbdabfea1c37e949176287dc5fbbf28 --- /dev/null +++ b/edge/graph_6678771.jsonl @@ -0,0 +1,3 @@ +{"1858677|27527196": ["Today, the problems of navigating a car and deciphering handwriting are sufficiently well understood that many related tasks can be specified in computer code and automated (Veres et al., 2011; Pl\u00f6tz and Fink, 2009).", "\u201d Today, the problems of navigating a car and deciphering handwriting are sufficiently well understood that many related tasks can be specified in computer code and automated (Veres et al., 2011; Pl\u00f6tz and Fink, 2009).", "Defining such problems is helped by the provision of relevant data: this is highlighted in the case of handwriting recognition by Pl\u00f6tz and Fink (2009)."]} +{"1858677|50458504": ["As such, this task is now almost completely automated (Phua et al., 2010)."]} +{"34152485|16821200": []} diff --git a/edge/graph_6681074.jsonl b/edge/graph_6681074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6682153.jsonl b/edge/graph_6682153.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b204f5e4adc53ff0bd89091d9c9b84b3f3a44a5 --- /dev/null +++ b/edge/graph_6682153.jsonl @@ -0,0 +1,6 @@ +{"1305310|9431428": ["This means that training the classifier would no longer be independent of the test data, which violates the independence assumption underlying cross-validation, a situation referred to as peeking [10].", "For conventional fMRI classification procedures, good-practice guidelines have been suggested for avoiding an optimistic bias in assessing classification performance [8,10].", "Unlike mass-univariate encoding models, these methods predict an experimental variable (e.g., a trial-specific condition or subject-specific disease state) from the activity pattern across voxels (see [6\u201310] for reviews).", "Specifically, voxels were selected on the basis of the same \u2018all auditory events\u2019 contrast as above, which is a common approach to defining a voxel-based feature space in subject-by-subject classification [11,12,10]."]} +{"206100111|16362395": ["In many applications such as image-based digit recognition [23], text classification [24], computer vision [25] and brain\u2013computer interfaces [26] the discriminative approach has been applied with success."]} +{"2425354|17516538": []} +{"2425354|4361938": []} +{"2425354|7185733": []} +{"2425354|9045232": []} diff --git a/edge/graph_6686730.jsonl b/edge/graph_6686730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_66882193.jsonl b/edge/graph_66882193.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ded15e1b6cb6fdb399aa3a658b17ff0c8733912 --- /dev/null +++ b/edge/graph_66882193.jsonl @@ -0,0 +1,11 @@ +{"2370783|16378248": ["Declarative approaches to model transformations offer several benefits like for example implicit source model traversal, automatic traceability management, implicit target object creation, and implicit rule ordering [9, 24].", "cation of relations between source and target types by means of predicates, and intrinsically supports bidirectionality [9] in terms of unification-based matching, searching, and backtracking facilities.", "Each one of those languages is characterized by a set of specific properties pertaining to a particular applicative domain [9]."]} +{"23658100|16378248": ["In previous works, several feature-based surveys have been already published [3,22,32]."]} +{"11915082|16378248": ["Model transformations are mechanisms for establishing\u2014and re-establishing, in the presence of change\u2014the relationships among models and code [26]."]} +{"25722221|2876552": []} +{"25722221|7308363": []} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"14396390|16378248": ["[28]"]} +{"14920149|16378248": ["An informative survey of transformation language features can be found in the paper by Czarnecki [16]."]} +{"16756949|11139156": []} +{"16756949|205435103": []} +{"16756949|7696556": []} diff --git a/edge/graph_66932352.jsonl b/edge/graph_66932352.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6695790.jsonl b/edge/graph_6695790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_66970599.jsonl b/edge/graph_66970599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67039950.jsonl b/edge/graph_67039950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67066837.jsonl b/edge/graph_67066837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c1de7a65a0149d633ab0978c437dd02408d6cc16 --- /dev/null +++ b/edge/graph_67066837.jsonl @@ -0,0 +1,37 @@ +{"8150091|1598350": ["Moreover, IoT marketplaces have emerged and will continue to emerge [2]."]} +{"61487445|2357830": ["passive and reply to readers queries regardless of the desire of their proprietary [29].", "In [29], some solutions about authentication have been proposed, but they all have serious problems and can\u2019t help solve the man-in-the-middle attack problem [5]."]} +{"1235952|1113420": []} +{"1235952|1230643": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"6342690|1940388": ["A review of security threats to WSNs and a survey of defense mechanisms is presented in [26]."]} +{"6342690|12817488": ["A survey of data aggregation algorithms used in WSNs is presented in [22]."]} +{"6342690|1230643": ["This scenario is used in most monitoring applications in agriculture [7], [8], microclimate [4], [5], [9] and habitat surveillance [10]\u2013[12], military operations [13], and disaster relief [14]."]} +{"6342690|1708582": ["RL [41], [42] is a sub-area of machine learning concerned with how an agent should take actions in an environment so as to maximize some notion of a long-term reward."]} +{"6342690|6555395": ["A survey of NN learning methods, their properties and applications is presented in [32]."]} +{"6529370|2357830": []} +{"18574760|1940388": []} +{"10780498|12278223": []} +{"10780498|60455": []} +{"10780498|954543": []} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"20020882|1230643": ["), could seamlessly interoperate in globally integrated communications platforms [1]\u2013[3]."]} +{"18316471|1113420": []} +{"13150813|1207973": ["In this context, we can classify faults as either transient or permanent [7]."]} +{"18306152|7988320": []} +{"18306152|7085121": []} +{"18306152|562065": []} +{"18306152|15300368": []} +{"18306152|1503157": ["This issue can be addressed by integrating RFID with WSN as WSN provides longer reading range as well as other benefits like different network topologies and flexibility, variety of sensors that are already implemented and low power consumption [31]."]} +{"18306152|1236072": ["techniques [7, 13, 14], MAC protocols [15\u201317], congestion control [18, 19], data col-"]} +{"7688956|1230643": ["We present requirements for Immersive CPSs, in which people interact with their local environments, \nand describe a de\u00adsign for distributed data stream creation and sharing."]} +{"10050878|5724477": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"13906012|3348390": ["From now on we will call this reference model the Internet of All (IoA), meaning that it includes not only the (traditional) IoT but also the Human as a fundamental element.", "But then again, why are current IoT and CPSs still unable to integrate the human element into the controlloop?", "We now begin to understand why current IoT-based CPSs have yet to integrate the Human component in order to achieve an Internet of All: humans, things and robots.", "Despite being in their infancy, the IoT and CPSs are already transforming the way our world and society work, at a very fundamental level and at an incredibly fast pace.", "In this survey paper, we have explored the field of HiTL, in particular its applicability in future CPSs and the IoT.", "This need drives us to ask questions such as why do current IoT solutions still leave behind the human?", "We believe that future IoT environments will be mobile, dynamic and reactive, where robots and humans will have to react to stimulus from the environment in real time, to guide their actions [113].", "Several requirements are associated with the advent of the IoT, namely the development of intelligence in devices, interfaces and services, the assurance of security and privacy, systems integration, communication interoperability and data semantization and management [3].", "Thus, the IoT tended to focus more on openness and networking of intelligent devices, with CPSs being more concerned with applicability, modeling of physical processes and problem solving often through closed-looped systems.", "The IoT was initially driven from a computer science perspective, mostly by the European Commission.", "The IoT and CPSs are, therefore, closely related concepts that have been pushed by two different groups.", "The summarized exposition of the previous illustrative research shows us a certain evolution in terms of the IoT and CPSs.", "Their presence, actions, and emotion states strongly affect how IoT things react.", "Thus, we believe the major challenge security and privacy is to define an adaptable and manageable architecture for use in real-time scenarios that combine humans, robots and IoT.", "These ideas have been previously explored as context awareness, for Mobile and Wireless Networking [9] and the IoT [10].", "The goal of this section is to contribute to the establishment of a reference for the classification of the role of a Human in the future IoT as we envision it: using a HiTL paradigm.", "Emerging research in HiTL control systems based on the IoT and in CPSs offers a tremendous range of opportunities.", "There are also remarkable proposals for frameworks that manage and distribute this contextual data [10], [15].", "More than having intelligent IoT and CPS systems that autonomously control our\nenvironment, these systems will, more importantly, adapt to the human will.", "This idea began with a vision of an \u201cInternet of Things (IoT)\u201d, where radio-frequency identification would allow the \u201ctagging\u201d of everyday objects to be read, identified and managed by computers.", "Therefore, most of the current state-of-the art IoT security protocols are purely academic, as they are based on theoretical or simulation results.", "Yet, outside of the area of e-health, whose primary objective is the monitoring of patients [16], there is still scarce scientific work that focuses on the actual effects of this human \u201ccontext\u201d in the control-loop of CPSs powered by the IoT.", "IoA is built from spatially distributed devices that are considered by standard IoT, like laptops, mobile phones, computers, sensors, actuators, \u201cclassical\u201d network elements (we mean all passive elements like routers, switches, access points, etc.), RFID tags, readers, cars, intelligent clothes, wearable devices, furniture and home machines. . . the possibilities are endless."]} diff --git a/edge/graph_67076545.jsonl b/edge/graph_67076545.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb6db9dc4ddea50551d057c2295edfd30b6180cf --- /dev/null +++ b/edge/graph_67076545.jsonl @@ -0,0 +1,11 @@ +{"45156651|18484924": ["The extraction of NEs is important for both the reduction text dimensionality and the semantic analysis of text.", "For dealing with the problem of matching co-referent NEs in text, we manually reshape the manually constructed gazetteer of NEs by grouping the names entities referring to the same entities in clusters.", "\u2026such as person, gender, number, and tense, while the clitics, which in other languages such as English appear as separate words, are concatenated to the words to indicate de\ufb01niteness, conjunction, various prepositions, and possessive forms (Shaalan 2014 \u201d as well as to each other \u201c \ufed3\ufef4\ufeec\ufee2 \u201d.", "We integrated a manually constructed gazetteer of NEs in the preprocessing phase of our proposed system.", "In the manipulated text, all the NEs belonging to the same cluster and referring to the same entity will be replaced by the shortest NE considered the cluster representative.", "The text is scanned to recognize and extract the NEs and to replace each one by a code representing its entry in the gazetteer.", "The second is based on knowledge obtained from linguistic resources, mainly the morphological structure of words, the list of potential synonyms in the language, and the co-referent NEs.", "All the texts\u2019 words except the previously detected NEs are analyzed to extract their stems.", "Unlike in European languages, capitalization is not a distinguishing orthographic feature of Arabic script for recognizing NEs such as proper names, acronyms, and abbreviations, which leads to ambiguities in the interpretation and recognition of NEs (Shaalan 2014)."]} +{"29478777|15430879": []} +{"12166652|60455": ["Web content mining issues in term of Information Retrieval (IR) and Database (DB) view verses data representation, method and application categories is discuss and summarised in [6].", "Modification of typical data mining is used composite associative rule, extraction of traditional sequence discovery algorithm, web usage using graph representation, is discussed in and can referred from [6].", "Some algorithms proposed to model the web topology such as HITS, Page-rank, improved in HITS by outer filtering, web page categorization address in [6]."]} +{"12166652|16766019": ["\u2026includes a multimedia database management system (MM-DBMS), which manages and also provides support for storing, manipulating, and retrieving multimedia data from a multimedia database, a large collection of multimedia objects, such as image, video, audio, and hypertext data, is discuss in [1]."]} +{"36853263|3110415": ["With the extended feature space derived from segmented objects (e.g., extended spectral feature sets per object, shape properties, or textural features) [6,7], object-based classi\ufb01cation may increase the complexity of the classi\ufb01cation and the demand for computing power."]} +{"18172204|191396": ["Based on the selection criterion for the parameter of the number of clusters [ 42 ], the optimal number of event categories can be determined by minimizing the value of .", "A clustering algorithm should achieve the compactness of intra-cluster and isolation of inter-cluster and consider the comprehensive effects of several factors including the defined squared error, the geometric or statistical properties of the data, number of the input data, the dissimilarity (or similarity), and the number of clusters [ 42 ]."]} +{"16175208|191396": ["Clustering documents is an important dimension of data mining and information retrieval [Berkhin 2001; Xu and Wunsch 2005]."]} +{"206555960|5646762": ["GAs have proved to be an effective computational method, especially in situations where the search space is un-characterized (mathematically), not fully understood, or/and highly dimensional [6], such as a clustering problem [11]."]} +{"17814500|10157083": []} +{"60877329|17157304": ["Carmona-Cejudo et al.\u2019s (2011) paper is related to real time email classification and introduced GNUsmail open source for email folder classification.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets. Botnets are groups responsible for spreading spam emails. Methods are evaluated to detect such sources of spam campaigns that share some common features. Spammers however try to change spam emails through some intended mistakes or obfuscations especially in popular filtered keywords. Certain finger prints are defined where all emails that have those finger prints are then clustered together. Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering. The paper discussed several aspects related to spam filtering such as the proposals to change or modify email transmission protocols to include techniques to eliminate or reduce spams. Some methods focused only on content while others combined header or subject with content. Some other email characters such as size, attachments, to, from, etc. were also considered in some cases. Feature extraction methods were also used for both email content, attached and embedded images. Webb et al.\u2019s (2006) paper talked about web spam and how to use email spam detection techniques to detect spam web pages.", "Those papers are: Zhuang et al., 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; Pe\u0301rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets. Botnets are groups responsible for spreading spam emails. Methods are evaluated to detect such sources of spam campaigns that share some common features. Spammers however try to change spam emails through some intended mistakes or obfuscations especially in popular filtered keywords. Certain finger prints are defined where all emails that have those finger prints are then clustered together. Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets.", ", 2008; Blanzieri and Bryl, 2008; Webb et al., 2006; Mishne et al., 2005; Sculley and Wachman, 2007; Zhou et al., 2010; P\u00e9rezD\u0131\u0301az et al., 2012; Xie et al., 2006; Katakis et al. 2007; Bogawar et al. 2012; Ozcaglar 2008. Different papers discussed the using of different algorithms and also applying the algorithms in different places between email senders and receivers. Zhuang et al.\u2019s (2008) paper focused on trying to find Botnets. Botnets are groups responsible for spreading spam emails. Methods are evaluated to detect such sources of spam campaigns that share some common features. Spammers however try to change spam emails through some intended mistakes or obfuscations especially in popular filtered keywords. Certain finger prints are defined where all emails that have those finger prints are then clustered together. Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering. The paper discussed several aspects related to spam filtering such as the proposals to change or modify email transmission protocols to include techniques to eliminate or reduce spams. Some methods focused only on content while others combined header or subject with content. Some other email characters such as size, attachments, to, from, etc. were also considered in some cases. Feature extraction methods were also used for both email content, attached and embedded images. Webb et al.\u2019s (2006) paper talked about web spam and how to use email spam detection techniques to detect spam web pages. Similar to the approaches to detect spam in emails, web pages are scanned for specific features that may classify them as spam pages such as using irrelevant popular words, keywords stuffing, etc. Mishne et al.\u2019s (2005) paper represents another example of web or link spam research paper.", "Blanzieri and Bryl (2008) presented a technical report in 2008 to survey learning algorithms for spam filtering."]} +{"17242305|192934": ["Further theoretical study based on information theory can be found on (Koller & Sahami, 1996) and complete reviews can be found on (Blum & Langley, 1997; Jain et al., 2000; Yang & Pedersen, 1997)."]} diff --git a/edge/graph_67131657.jsonl b/edge/graph_67131657.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb791097d123b24bab7bb80e05a8a41492185072 --- /dev/null +++ b/edge/graph_67131657.jsonl @@ -0,0 +1,12 @@ +{"205281449|206977741": []} +{"11477596|3042864": ["The aforementioned limitations served as motivation for a new computing paradigm called MCC that enhances the abilities of mobile devices by moving the storage and compute intensive tasks of mobile to the cloud [56,82]."]} +{"11477596|13210924": ["The resources are provided to the users and released based on demands from the pool of shared resources [4].", "The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]."]} +{"11477596|13916820": []} +{"11477596|12017064": ["The security solutions have also been presented in [71].", "[71] reviewed the security issues at different levels of cloud computing."]} +{"3330144|13916820": []} +{"3330144|45478730": ["Typical SLAs include data exchange rates, mean time to repair, jitter and other service properties related with security as well [3].", "Afterward, a user interface with fine-grained configuration capabilities is provided to manage, orchestrate, and monitor the activity of the service usage [3,100].", "Malicious insiders, as are usually called [3,203,306], can overtake the physical security controls and penetrate the facilities.", "The interface, by default, is a gateway into the cloud and makes it an attractive attack target that can compromise the overall service security [3,281], therefore requiring proper security measures.", "User frontend Internet exposure of frontend interfaces [3,100,211,281]", "So far, ten cloud outages of major cloud providers have been reported in various studies [3,17,224].", "Another issue in terms of availability is related with hardware availability [3].", "Ahuja and Komathukattil [3] 2012 Software, perimeter, virtualization, compliance, access, storage \u00d7 \u2013 \u00d7 ++ \u2013 \u00d7", "Ahuja and Komathukattil [3] presented a survey on some common threats and associated risks to clouds."]} +{"3330144|17290408": ["Software Platforms and frameworks Isolation, resource accounting, safe thread termination [232]", "NET and the Java Virtual Machine (JVM) [232].", "RoderoMerino et al. explain the Multitasking Virtual Machine (MVM) [67], isolates-based KaffeOS [22] and I-JVM [91] solutions, and a heap-based protection [263].", "[232] have given a survey on the security state in PaaS cloud environments.", "[232] 2012 PaaS clouds, isolation, resource accounting, and safe thread termination \u00d7 \u00d7 \u00d7 + +", "[232] enlightened of the fact that PaaS providers are twofold.", "[232] provided an in-depth study on PaaS sharing-based cloud development and running platforms.", "[232], are, in their majority, prior to the rise of cloud environments.", "The most straightforward way for guaranteeing isolation is to create one JVM per application.", "[232] emphasized that such a layout can be compromised by malicious tenants in a straightforward way."]} +{"3330144|12815020": []} +{"27841585|12017064": []} +{"107636544|30548952": ["After filtering these studies according to inclusion/ exclusion criteria and QAC, 31 publications were identified as a primary study for review [6-37].", "It is the responsibility of cloud customer to find out the techniques used by the provider to segregate the data and must ensure that the encryption schemes are deployed and are effective enough to provide security [29].", "Cloud Provider Risks List of Studies Cloud Customer Risks List of Studies Data Security & Privacy [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [22] Data Security & Privacy [12], [16], [20], [24], [25], [27], [30], [31], [32], [37], Technological [7], [8], [19], [21], [22] Physical Security [25], [26] Technological [10], [22], [33] Organizational [10], [22], [29] Physical Security [22], [35] Compliance and Audit [20], [23], [24] Compliance and Audit [28], [30], [34], [38]"]} +{"37532714|3443381": []} diff --git a/edge/graph_67166741.jsonl b/edge/graph_67166741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..286218dcf930b5ba60db971dbdd404ab8c9431e1 --- /dev/null +++ b/edge/graph_67166741.jsonl @@ -0,0 +1,4 @@ +{"11392154|393948": []} +{"152027686|16830291": ["Seekers must then merge the many submissions for the same micro-task, as well as integrate the results of all the micro-tasks for the main initial task to be completed (Luz et al .", "While the literature contains some empirical evidence on the techniques used in crowdsourcing platforms to aggregate the results of micro-tasks (Luz et al ."]} +{"152027686|3241708": ["These are, generally, tasks that are dif\ufb01cult to be executed through computer programs, while being trivial for human beings, since they involve natural actions such as drawing, coding, interpreting shapes and labelling images (Yuen et al .", "Moreover, the same micro-task is often assigned to several different individuals, as the results can then be of a higher quality (Yuen et al .", "2013; Yuen et al ."]} +{"4972304|3241708": []} diff --git a/edge/graph_67176288.jsonl b/edge/graph_67176288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c3f32f5183b6ef26b913cdba9b3f7cad15b8c8d --- /dev/null +++ b/edge/graph_67176288.jsonl @@ -0,0 +1,8 @@ +{"104028021|926226": ["Among optical sensing methods, hyperspectral and multispectral imaging techniques are 68 among the best candidates, as they have been used in disease and stress monitoring (Hahn, 2009)."]} +{"110555883|926226": []} +{"14050171|15744805": []} +{"21245572|393948": []} +{"21245572|192934": []} +{"104045694|926226": ["62 Spectroscopy and imaging techniques have been used in disease and stress monitoring (Hahn, 2009)."]} +{"2078144|393948": ["classifiers, whereas decision tree or kernel SVMs are believed to have two layers [24].", "The widely used PCA and ICA are singlelayer learning methods [24]."]} +{"3822774|14933256": []} diff --git a/edge/graph_6722007.jsonl b/edge/graph_6722007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7b51f25a12f4359d8da940c0efdf8f0bd20fff7 --- /dev/null +++ b/edge/graph_6722007.jsonl @@ -0,0 +1,6 @@ +{"16043421|16790158": ["For instance, horizontal fragmentation is discussed in (Bellatreche, Karlapalem & Simonet 2000, Ezeife & Barker 1995, Ma 2003, Schewe 2002), and vertical fragmentation in ( Chinchwadkar & Goh 1999, Ezeife & Barker 1998, Malinowski & Chakravarthy 1997, Schewe 2002).", "For instance, horizontal fragmentation is discussed in (Bellatreche, Karlapalem & Simonet 2000, Ezeife & Barker 1995, Ma 2003, Schewe 2002), and vertical fragmentation in (Chinchwadkar & Goh 1999, Ezeife & Barker 1998, Malinowski & Chakravarthy 1997, Schewe 2002)."]} +{"7873942|2374977": ["The proposed XML data partitioning strategies aim at improving workload balance on both static data distribution \nand dynamic data distribution."]} +{"15528937|16790158": []} +{"8861479|16790158": ["For instance, horizontal fragmentation is discussed in [1, 5, 8], and vertical fragmentation in [2, 6, 10]."]} +{"7058203|2374977": ["Due to the large volume of data predominantly stored in XML databases, there is great concern about the performance of query processing and, consequently, several work in this area [Andrade et al. 2006; Gang and Rada 2007; Moro et al. 2009; Kling et al. 2011; Figueiredo et al. 2010]."]} +{"1362728|2795037": ["are also valuable, and we fully expect that such techniques will have similar uses in a complete XML query optimizer [6]."]} diff --git a/edge/graph_67254340.jsonl b/edge/graph_67254340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6728089.jsonl b/edge/graph_6728089.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9261e02b629ae79f1ebfe4bdfd1b88181b8ba9af --- /dev/null +++ b/edge/graph_6728089.jsonl @@ -0,0 +1,8 @@ +{"107590131|1762301": ["The principal reactive protocols are Dynamic Source Routing (DSR) [18] (which is used in our simulations and it is described below), Ad Hoc On Demand Distance Vector (AODV) [1], Adaptive Distance Vector (ADV) [16], Temporally Ordered Routing Algorithm (TORA) [30], Associative Based Routing Algorithm (ABR) [16], Location-Aided Routing (LAR) [22], Signal Stability-Based Adaptive Routing (SSA) [7], and Flow Oriented Routing[36].", "if ( $ll[0] eq \"RChange\"){ if ($ll[4] eq \"21\" && $ll[6] eq \"27\") print RT_CHG \"$ll[1] \"$ll[3] \"$ll[8]\\n\"; } }"]} +{"9514809|14441987": ["The nodes choose a cluster head that is responsible for all routing to nodes outside the cluster [26].", "Reactive protocol can be improved by using promiscuous route discovery [26].", "Maintaining huge routing tables requires storage space, network bandwidth and processing time, all of which are scarce in MANETs [26]."]} +{"1027180|14441987": []} +{"16293323|14441987": ["To combat this DoS attack a proactive [10] scheme is proposed in section 3."]} +{"14398863|14441987": []} +{"62146773|14441987": ["The Ad Hoc On-Demand Distance Vector (AODV) routing protocol is an adaptation of the DSDV protocol for dynamic link conditions [6][12][13]."]} +{"195918573|14441987": ["An example of the routing challenges currently faced by mobile ad hoc networks is outlined in a previous review paper [2].", "Also known as proactive, these protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [2].", "The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth, and high error rates [2]."]} +{"16818166|14441987": []} diff --git a/edge/graph_67282877.jsonl b/edge/graph_67282877.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67284616.jsonl b/edge/graph_67284616.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6731164.jsonl b/edge/graph_6731164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6734705.jsonl b/edge/graph_6734705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6736412.jsonl b/edge/graph_6736412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b7a041d633a110d2f905fb04389be1e0b8421e3 --- /dev/null +++ b/edge/graph_6736412.jsonl @@ -0,0 +1 @@ +{"39934221|17790934": ["A survey on computer aided decision support for the diagnosis of celiac disease can be found in [9]."]} diff --git a/edge/graph_67369081.jsonl b/edge/graph_67369081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e504173cb0d5317807c6451c25463e8206b56150 --- /dev/null +++ b/edge/graph_67369081.jsonl @@ -0,0 +1 @@ +{"108897110|67369081": []} diff --git a/edge/graph_67380876.jsonl b/edge/graph_67380876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9eb6a731e004cc22d8dccc720b59f64b1f343731 --- /dev/null +++ b/edge/graph_67380876.jsonl @@ -0,0 +1 @@ +{"67421933|170825": ["Tracing the data path (data lineage) is important for auditing in cloud computing, especially in the public cloud apart from the above stages [11].", "One of the neglected issues is data-after-delete [11] and this is also called as data remanence."]} diff --git a/edge/graph_67385456.jsonl b/edge/graph_67385456.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67386253.jsonl b/edge/graph_67386253.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6739283.jsonl b/edge/graph_6739283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd7b3cdc7aacf217f1309c297020aed90ab965e4 --- /dev/null +++ b/edge/graph_6739283.jsonl @@ -0,0 +1,2 @@ +{"63594450|6739283": ["Personal innovativeness question items were adapted from Agarwal and Prasad (1998), Cheng (2014), and Liu et al. (2010).", "Question items related to perceived usefulness, perceived ease of use and behavioral intention to use mobile learning were adapted from Davis (1989), Park et al. (2012), and Liu et al. (2010).", "Concerning mobile learning adoption, Liu et al. (2010) found a significant relationship between personal innovativeness and behavioral intention to use mobile learning.", "Before survey distribution, the purpose of study was explained to the students by the experts from DPL. Mobile learning studies by Liu et al. (2010), Tan et al. (2014) and Wang et al. (2009) measured users\u2019 perceptions on the use of mobile learning by explaining the concept."]} +{"146834345|6739283": ["Despite enthusiasm, mobile learning pedagogy in higher education is in an embryonic stage and its theoretical foundations have not yet matured (Cheon et al. 2012; Gikas and Grant 2013; Liu and Han 2010)."]} diff --git a/edge/graph_67393384.jsonl b/edge/graph_67393384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67404322.jsonl b/edge/graph_67404322.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6742930.jsonl b/edge/graph_6742930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc9f92e7d885c3fa33af568b8a21c243d4db05c1 --- /dev/null +++ b/edge/graph_6742930.jsonl @@ -0,0 +1,5 @@ +{"5179978|70923": []} +{"709518|6952653": []} +{"21052213|64292": ["More recently, there has been considerable interest in extending this research from the upper, planning, and scheduling level of control [6], [7] to the physical device level."]} +{"8658590|1497267": []} +{"2318849|70923": ["A very useful survey which classi\ufb01es and reviews these and other methodologies has also appeared [16]."]} diff --git a/edge/graph_67438326.jsonl b/edge/graph_67438326.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5541d15777c2710a93ea23e82258d41e499bc985 --- /dev/null +++ b/edge/graph_67438326.jsonl @@ -0,0 +1 @@ +{"14916041|12083425": ["IN RECENT years, due to the public concern about global warming and climate change, much effort has been focused on the development of environmentally friendly distributed generation (DG) technologies [1]\u2013[4]."]} diff --git a/edge/graph_6746689.jsonl b/edge/graph_6746689.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6747985.jsonl b/edge/graph_6747985.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_674920.jsonl b/edge/graph_674920.jsonl similarity index 100% rename from graph_674920.jsonl rename to edge/graph_674920.jsonl diff --git a/edge/graph_6751108.jsonl b/edge/graph_6751108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6754301.jsonl b/edge/graph_6754301.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6755414.jsonl b/edge/graph_6755414.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6759870.jsonl b/edge/graph_6759870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6764182.jsonl b/edge/graph_6764182.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67717275.jsonl b/edge/graph_67717275.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67718370.jsonl b/edge/graph_67718370.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_677242.jsonl b/edge/graph_677242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6773787.jsonl b/edge/graph_6773787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f9a53451f7bde8d8fedb3a1cd181e7e6355943dc --- /dev/null +++ b/edge/graph_6773787.jsonl @@ -0,0 +1,3 @@ +{"119483123|10907226": ["The issue of long-range independence of random combinatorial objects is addressed in a somewhat different, statistical physics context in Mossel [ 20 ], Kelly [18], Brightwell and Winkler [11], Rozikov and Suhov [21], and Martin [19], where independent sets (hardcore model) are considered on infinite regular trees, weighted by the Gibbs measure."]} +{"44020513|15849973": []} +{"123607620|1289787": ["( 2000 ) for an extensive and updated literature review on the warehouse design and control.", "See Rouwenhorst et al. (2000) for an extensive and updated literature review on the warehouse design and control."]} diff --git a/edge/graph_67769420.jsonl b/edge/graph_67769420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c57d3e97d1e69899d1abc41425e4e75d849f6883 --- /dev/null +++ b/edge/graph_67769420.jsonl @@ -0,0 +1,12 @@ +{"52215843|9060471": ["State of the Art and Limitations: Prior work on \u201ctruth discovery\u201d (see Li et al. (2016) for survey) 1 largely focused on structured facts, typically in the form of subject-predicate-object triples, or on social media platforms like Twitter, Sina Weibo, etc. Recently, methods have been proposed to\u2026"]} +{"207743293|1143625": []} +{"32730475|195881905": []} +{"32730475|181631491": []} +{"207718082|207743293": ["Previous approaches for rumor analysis focus on four subtasks: rumor detection, rumor tracking, stance classification, and veracity classification [102].", "A rumor can usually be defined as \u201ca piece of circulating information whose veracity status is yet to be verified at the time of spreading\u201d [102]."]} +{"207718082|9060471": ["Truth discovery is the problem of detecting true facts from multiple conflicting sources [46]."]} +{"1033682|174797842": []} +{"9164793|207743293": ["Prior work in the area has found the task dif\ufb01cult, compounded by the variety present in language use between different stories (Lukasik et al., 2015; Zubiaga et al., 2017)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"54049995|9060471": ["One possible alternative is to employ truth discovery algorithms (Li et al. 2016), which are proposed to tackle con\ufb02icting information provided by multiple data sources.", "One possible alternative is to employ truth discovery algorithms (Li et al. 2016), which are proposed to tackle conflicting information provided by multiple data sources."]} +{"49320819|207743293": ["While these are important factors to consider, a sentence can be true or false regardless of whether it is a rumor (Zubiaga et al., 2018)."]} +{"30774633|207743293": ["Specific systems have been proposed to detect rumors [66]."]} diff --git a/edge/graph_67770074.jsonl b/edge/graph_67770074.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4383bb6391f7f3a2f6d491fc7788700aadb97021 --- /dev/null +++ b/edge/graph_67770074.jsonl @@ -0,0 +1,18 @@ +{"9362171|7976343": []} +{"115193908|31245252": []} +{"19950818|2387055": ["In the first division, the SDN technology is applied to implement or deploy security solutions to achieve secure networking, for example, applying SDN to perform intrusion/malware detection and unwanted traffic control [11,14,15]."]} +{"4071434|2387055": []} +{"3929072|62617427": ["Routing I V, I, N [9], [30], [31], [32] [15]"]} +{"53285967|58672147": []} +{"53285967|3639306": [") was of the open broadcast nature where any node can easily snoop and intercept all the communication [2]."]} +{"53285967|15895606": ["The focus on the attack classification is out of the scope of this paper and readers are suggested to refer [5], [30]\u2013[32] and many other sources.", "Not only the intra-vehicular but also the inter-vehicular communication has been vulnerable to attacks that anticipate acquiring control of the vehicle\u2019s electronics [5], [6]."]} +{"53285967|3583771": ["tion packet to inform all network nodes to purge the malicious content from their caches [78]\u2013[81], [87], [99]\u2013[104].", ", DoS/DDoS, Cache Pollution, Cache Poisoning, routing, and so forth [99].", "The general NDN-specific attacks are discussed next and properly elaborated in [99], which is recommended for further review."]} +{"53285967|26071662": ["Let, an auto emission monitoring application running on a consumer requests the current CO2 information from all the vehicles within a particular area or road segment, then all the vehicles with produce the emission information (multimodal emission data) [130]."]} +{"53285967|4528002": ["The focus on the attack classification is out of the scope of this paper and readers are suggested to refer [5], [30]\u2013[32] and many other sources."]} +{"53285967|206584087": ["\u2022 DoS and DDoS: similar to DoS and DDoS attack in conventional communication [82], the attacker(s) overload(s) NDVCPS network elements by generating the pull-based traffic to request contents, delegate name prefixes, certificates, and so forth."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"30944280|2181694": ["Thereby, there are new threats to the network security of the Internet of Things, such as attacks on the power systems, replications of the network nodes, interceptions of the data from an Internet device, substitutions of the device and cracking services which process and store data [2-5]."]} diff --git a/edge/graph_67771491.jsonl b/edge/graph_67771491.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67773053.jsonl b/edge/graph_67773053.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..96d3337b854b4a621e2635ba0cc650582c4d2467 --- /dev/null +++ b/edge/graph_67773053.jsonl @@ -0,0 +1,8 @@ +{"56482382|3536399": ["For a systematic review of defenses, we refer the reader to [4] for their work in the subset of attacks on images."]} +{"7228830|17652653": []} +{"4730292|206739910": ["Therefore, we use the LISA dataset [18], a U.", "road signs [18] and has an accuracy of 91%, and the GTSRB*-CNN network that is trained on a modified GTSRB (German Traffic Sign Recognition Benchmark) dataset [27] and has an accuracy of 95% (Section III-A)."]} +{"4956100|17652653": ["Paraphrase generation (Androutsopoulos and Malakasiotis, 2010; Madnani and Dorr, 2010) has been tackled using many different methods, including those based on hand-crafted rules (McKeown, 1983), synonym substitution (Bolshakov and Gelbukh, 2004), machine translation (Quirk et al."]} +{"52269752|4111957": ["Recently, in addition to typical AE construction methods introduced above, a lot of other attack methods have been proposed [48], [49]."]} +{"52269752|3536399": ["Recently, in addition to typical AE constructing methods introduced above, a lot of other attack methods have been proposed [80]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"53075610|3536399": []} diff --git a/edge/graph_6777457.jsonl b/edge/graph_6777457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67789973.jsonl b/edge/graph_67789973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2573f37ff99368c6a8bbc56b331e55692cdb0031 --- /dev/null +++ b/edge/graph_67789973.jsonl @@ -0,0 +1 @@ +{"4461315|8363289": []} diff --git a/edge/graph_67790057.jsonl b/edge/graph_67790057.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63312355cde5ee4dba89c55a8ffe19beda45baa1 --- /dev/null +++ b/edge/graph_67790057.jsonl @@ -0,0 +1,55 @@ +{"206925480|11735843": ["The above problem can be overcome by making WSNs programmable and thus, there has been significant research effort devoted to design programmable WSNs [9]\u2013[11]."]} +{"17655318|10287248": ["1 is proposed by [5].", "Constraint Programming (CP) techniques were initially introduced in the 1960s and 1970s in artificial intelligence and computer graphics."]} +{"8707777|8450611": ["Most previous research in this area (see Taylor [24] for a survey) focuses on static compilation.", "Most previous research in this area (seeTay\u00adlor [24] for a \nsurvey) focuses on static compilation.", "[24] D.Taylor."]} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} +{"6192401|9923206": ["Various works have been proposed for protocol veri\ufb01cation including rigorous speci\ufb01cation and conformance testing techniques for network protocols [212], rigorous treatment of the TCP protocol [165] [196], veri\ufb01cation of ad-hoc routing protocols for wireless sensor networks: [213]."]} +{"6192401|8974063": ["For furt her details, interested readers are referred to the survey pape rs [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occu pancy are reviewed in detail."]} +{"6192401|6507312": []} +{"6192401|12401050": ["It has been posited that for practical purposes of analyzing DSA/ CRNs, a simple two-state semi-Markov ON-OFF model is adequate for modeling spectrum usage [155] (table IV may be referred to see the popularity of this model).", "For further details, interested readers are referred to the survey papers [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occupancy are reviewed in detail."]} +{"6192401|6400766": ["In addition, RL can work with very large number of states when used along with function approximation [67].", "In RL, instead of explicit specification of the tr ansition probabilities, the transition probabilities can be en visioned to be accessed through a simulator that typically is restart ed from a uniformly random initial state many times [67]."]} +{"6192401|17062686": ["Indeed, there has been a lot of work in applying various economics-based approaches to wireless networkin g [40].", "Cooperative spectrum selection : [43]; Game Theory Resource allocation : see references in [40] [41]; Routing games[44] [45] [46]; Spectrum Sharing : [47] [48]; Mitigating selfish routing[49] [50] [51]; Medium Access Control (MAC) : [52]; Modeling routing: see references in [29]."]} +{"6192401|8589228": ["The key insight is to use hypothesis testing with a simulation based approach to deduce from some sample executions if the system under test satisfies the specification [132]."]} +{"6192401|15929566": ["We note here that reinforcement learning is also known by alternate monikers such as neuro-dynamic programming (NDP) [64] and adaptive (or approximate) dynamic programming (ADP) [65] [25].", "Therefore, classical DP techniques are rather ineffective at solving large-scale complex MDPs [25].", "We also discussed in section III-A that classical DP techniques are ineffective at solving large-s cale complex MDPs [25] [66]."]} +{"6192401|17109970": []} +{"6192401|2840997": ["With the preclusion of approximation techniques, this method then becomes unwieldy for large-scale problems complex problems."]} +{"6192401|1708582": []} +{"32711727|2535224": []} +{"30654518|18392886": []} +{"30654518|15035771": ["Furthermore, trade-offs concerning some concepts such as perormance, resiliency, availability, reliability and flexibility have to e taken into account by network designers and managers while esigning a network architecture [29] ."]} +{"22582078|9495329": ["However, an interesting argument of the works covered in [213] is that IoT urban deployments should allow for the same set of sensor nodes to support multiple applications from multiple developers across the same shared physical infrastructure via software only.", "Moreover, substantial research on interconnecting Wireless Sensor Networks (WSNs) into wider IoT frameworks by leveraging SDN and virtualization has already been completed [213], [218].", "We mention this work to provide another aspect of emerging technologies with regard to SDN-IoT infrastructure, and refer the reader to [213], [221], for a more complete overview.", "As a result, anywhere from 20 billion to 50 billion devices are projected to connect to the Internet by 2020 [213], and many network operators are also trying to adapt their networks for what is now being dubbed the Internet of Things (IoT).", "However, work to optimize \ufb02ow scheduling for the backbone network is still not fully developed [213].", "\u2026of application requirements as they relate to QoS and geographical sensor location, inner sensor node con\ufb01gurations, sharing of sensors amongst competing applications, transmitting optimized and QoS-aware data \ufb02ows towards end-servers, and ef\ufb01cient distribution of data for cloud processing [213].", "Additionally, fully centralized SDN controller architectures do not adequately address the different access networks expected to comprise the urban-scale IoT mobile multi-networks, such as LTE, WiFi, or ZigBee [213].", "For instance, the concept of Information-Centric Network (ICN) is combined with virtualization in [213] and [226] to provide network slicing and node caching within a wireless network.", "While we provide a brief description below, we refer the reader to [213] and [221] for further details.", "For instance, a natural application to address the heterogeneous QoS requirements of IoT is to include network slicing [213]."]} +{"22582078|6583734": ["A greater variety of network functions considered for NFV can be found in [2] and [114]."]} +{"22582078|2623404": ["Network operators are also challenged to address new routing protocols aimed at improving efficiency of content delivery and content availability for their clients [2], [58].", "One such architecture is Information-Centric Networking (ICN) or Content-Centric Networking (CCN) where packets are routed based on desired content instead of traditional, location-based, addressing [58]."]} +{"24110634|9495329": ["The surveys in [22] and [27] review SDN application in IoT, furthermore Bizanis and Kuipers [28] review the conjunction of SDN and NFV for IoT."]} +{"24110634|6583734": ["Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|11414835": ["The virtualizer ensures that all information collected is collated to form a virtualisation of the network state to the controller [29], [141]."]} +{"24110634|801245": ["WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization."]} +{"24110634|9040432": ["The survey study below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in\u2026"]} +{"24110634|2535224": ["\u2026below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in IoT [22], [27].", "Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|2623404": ["Large networks also become heterogeneous due to the use of different proprietary protocols, which fundamentally means they consist of different network islands that only cooperate at lower levels of communication [13], [33], [36].", "If no match is found, then appropriate rules are actioned, i.e. drop the packet, pass it to the next \ufb02ow table or send it to the controller for new rules to be made [13].", "The LFB has a speci\ufb01c function (such as routing) to process the packets [43], and enables the CE to control the FE [13].", "Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "If they match, appropriate actions are applied and if more than one entry match is found, prioritization, based on the highest degree of match, applies [13], [40].", "The instruction \ufb01eld determines what action should be taken upon a packet match [13].", "Recent research has focused on the development of both the southbound and northbound API standard-isation, with more focus on the southbound API [13].", "They both conform to the principle of decoupling the control and the data plane, but are fundamentally different [13].", "SDN introduces bene\ufb01ts such as vendor independence, heterogeneous network management, reliability and security not possible in traditional networks [12], [13], [16], [34], [35].", "Traditional networks are also mostly hierarchical, tree based and static, which leads to what most have termed \u2018\u2018ossi\ufb01cation\u2019\u2019 [13]."]} +{"24110634|10693567": ["The two most popular southbound interface speci\ufb01ca-tions are Forwarding and Control element separation (ForCes) [38], [39] and OpenFlow [40]\u2013[42]."]} +{"24110634|11735843": ["Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "The issue of virtualisation and cloud computing services has also necessitated a shift from conventional data storage towards SDN-oriented data storage and management [14].", "Another area which is the crux of this paper, is wireless sensor networks [14], [32], [56], [58]."]} +{"24110634|1230643": ["As Akyildiz et al. [8] and Qin et al. [106] allude, there has been less focus on the NB interface, whereas much attention has been dedicated to SB interfaces.", "WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization.", "Radio communication also consumes a huge chunk of power [8], it involves data transmission and reception."]} +{"24110634|10532321": ["The memory management techniques explored in [180] could be investigated from the SDWSN perspective.", "The rules placement problem is expounded with a comprehensive review of different solutions in [180]."]} +{"31582685|2623404": ["SDN technologies facilitate building network services [16] [17]."]} +{"11265920|2623404": ["The main reason is that we treat the subject without ever clarifying this issue that the SDN routing problems need to be decomposed into intra-domain relationship problems and inter-domain relationship problems."]} +{"15396963|2623404": ["The Open Network Forum (ONF) defined SDN as an emerging network architecture where network control is decoupled from forwarding and is directly programmable [1].", "A multi-domain SDN architecture refers to a network architecture that includes interconnection of some discrete SDN domains; possibly each domain is owned and operated by a separate organization."]} +{"45617842|2535224": []} +{"45617842|36974339": []} +{"2924626|10559330": ["Many approaches to achieve some of these goals have been previously proposed including active networking [45], IntServ networking [7], and distributed reservation protocols such as RSVP [8] and NSIS [33]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"1837434|1236072": ["A large body of research on communication issues in mobile sensor networks has been carried out [Wang et al. 2007; Al-Karaki and Kamal 2004].", "\u2026and Reijers 2003]; time synchronization protocols [Elson and Roemer 2003; Sundararaman et al. 2005]; distributed storage services [Ratnasamy et al. 2002; Luo et al. 2007]; code deployment and reprogramming functionality [Wang et al. 2006]; and routing protocols [Al-Karaki and Kamal 2004].", "2006], and routing protocols [Al-Karaki and Kamal 2004]."]} +{"206650877|205286988": []} +{"32127405|6583734": ["NFV can serve SDN by virtualizing the SDN controller to be rendered in the cloud thus allowing dynamic migration of the controllers to the optimal locations while SDN can serve NFV by providing programmable network connectivity between NFVs to achieve optimized traffic engineering [8]."]} +{"32377418|2623404": ["Control granularity is another issue associated with SDN [45]."]} +{"32377418|3189715": ["I NTRODUCTION N ETWORK programmability was the main objective of two schools of thought that dominated the networking research agenda in the mid-90 s up until the early 2000 s: Active [1] and Programmable Networks [2] (A&PN)."]} +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} diff --git a/edge/graph_67791588.jsonl b/edge/graph_67791588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..243e6d44fd34a3748cb5021acd9859c93fde2f52 --- /dev/null +++ b/edge/graph_67791588.jsonl @@ -0,0 +1,3 @@ +{"13666010|60779308": ["While researchers have developed many specialized filters for feature extraction [64, 65], CNN filters are not specified a priori to extract any specific features."]} +{"128281064|61526720": []} +{"128281064|12135664": []} diff --git a/edge/graph_67794058.jsonl b/edge/graph_67794058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..092aa507604d68d36e0ae96cce60b72aad20b7c2 --- /dev/null +++ b/edge/graph_67794058.jsonl @@ -0,0 +1,37 @@ +{"142532|19938676": ["They operate inside the coverage area of a macro-cell, creating a heterogeneous network (HetNet), and offer great advantages for operators and for users, allowing better coverage and higher data rates [1]\u2013[3]."]} +{"142532|206576720": ["A survey on massive MIMO, also known as large-scale MIMO, including channel modeling, applications scenarios and physical and networking techniques, was provided in [12]."]} +{"678032|8323234": ["Rain attenuation in different frequency bands [35]. needs to increase with the bandwidth if the signal-to-noise ratio (SNR) should remain intact [14].", "[14] is a recent overview paper on signal processing for mmWave MIMO.", "However, since the analog circuit can only partly adjust the signals, it is hard to adjust the beam to the channel conditions and this leads to a considerable performance loss [14], particularly for mobile users.", "However, realizing a fully digital MIMO implementation at mmWave frequencies is a non-trivial task, using current circuit design technology [14].", "The analog circuits of the hybrid architecture can be implemented by different circuit networks, leading to different hardware constraints [14], [115], [116].", "Yet, reference [14] is focused in mmWave MIMO and other topics e.g., recent developments of channel measure/modeling, multiple access, standardization, \ufb01eld test are missing.", "Note that references [7], [12]\u2013[14], [16] gave excellent overviews of some aspects of mmWave mobile networks from different aspects.", "In addition, fully analog architecture can only support single-stream transmission, which cannot achieve the multiplexing gain to improve spectral ef\ufb01ciency [14]."]} +{"13333529|10979806": ["The use of switches at mmWave and massive MIMO has been motivated by the work in [29]\u2013[31]."]} +{"13333529|8323234": ["HYBRID analog/digital architectures are efficient transceivers for millimeter wave (mmWave) systems [1]\u2013[6].", "As mmWave systems will employ large antenna arrays [5], [6], and mmWave channels are expected to be sparse [14], [26], the number of channel paths will likely be less than the number of antennas, i."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"206454765|8909218": []} +{"7177396|15453366": ["\u2026requirement for an uncompressed HD video stream 1920*1080 (frame size) with 24 bits per pixel (colour support) and 60 frames per second (frame rate) is approximately 3 Gbps. Current standards in frame size, colour support and frame rate give a range of HD data rates from 0.5 Gbps to 5.5 Gbps [1].", "This means that the packets dropped in the contention access period can be attributed to collisions alone and are not a result of varying channel conditions."]} +{"1182433|15453366": ["However, up to now, some of the 60 GHz worldwide regulations limit the emitted power at power amplifier output to 10 dBm and equivalent isotropic radiated power (EIRP) to 40 dBm [7]."]} +{"8553815|3054454": []} +{"3180691|13074005": ["Reproduced from [48] with permission.", "[48], [53].", "\u2026SM has recently established itself as a promising transmission concept, which belongs to the single-RF [36] large-scale [41] MIMO wireless systems family, while exploiting the multiple antennas in a novel fashion compared to state-of-the-art high-complexity and power-hungry classic MIMOs [48].", "We conclude this glimpse into the history of SM\u2013 MIMO by mentioning that the first (and only available) survey papers on the SM concept were published in December 2011 and in mid 2012 in [48] and [92], respectively.", "Briefly, this implies that the channel impulse responses of the transmit-to-receive links are sufficiently different from each other [48].", "In SM\u2013MIMO research, this third dimension is termed the \u2018\u2018spatial-constellation diagram\u2019\u2019 [48]."]} +{"3180691|7686677": ["This allows the BSs to turn off the related RF chains with filters and mixers, which saves additional power.", "New infrastructure elements, such as femto/pico BSs, fixed/mobile relays, cognitive radios, unlicensed millimeter-wave radios, and distributed antennas are being deployed, thus making future cellular systems more heterogeneous [293].", "So far, only the baseline point-to-point single-cell cellular network has been studied, where the effect of other-cell interference is neglected and the characteristics of different types of BSs are not taken into account.", "However, in practice, MIMO systems need a multiplicity of associated circuits, such as power amplifiers, RF chains, mixers, synthesizers, filters, etc., which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "For example, the typical RF coaxial cables used in current tower-mounted BSs are more than four centimeters in diameter [42].", "The rationale behind the multi-RF to single-RF paradigm shift in MIMO design originates from the consideration that large numbers of TAs (radiating elements) may be accommodated at the BSs (large-scale MIMO design) [41], [42], especially in the emerging millimeter-wave band [43]\u2013[46], bearing in mind that the complexity and power consumption/dissipation of MIMO communications are mainly determined by the number of simultaneously active TAs, i.e., by the number of active RF chains [40], [47].", "more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "BSs with a variable number of TAs .", "Under the so-called SOTA-2010 power consumption model [31], [32], the EE of various types of BSs (macro, micro, pico, and femto) is investigated by comparing SM to conventional MIMO communications.", "The main idea is to enable the BSs to use only a subset of the available TAs in order to reduce the power consumption.", "Raising dilemmas, such as using a few BSs in combination with large-scale MIMOs, using many small cells illuminated by low-power BSs having a few TA elements each, or whether to combine large-scale MIMOs and small-cell networks, have to be addressed.", "Limiting the number of active RF chains for the sake of reducing the power consumption of BSs has been actively discussed within 3GPP standardization bodies.", ", which substantially increase the circuit power dissipation of the BSs [5], [30]\u2013[32].", "This finding is important because it brings to our attention that constant-envelope modulation may be a suitable choice for SM\u2013MIMO communications since it may offer an improved power efficiency and a reduced complexity, while mitigating the linearity requirements of the power amplifiers [5], without any performance degradation compared to amplitude modulation schemes.", "The cellular network of the future will be: heterogeneous and characterized by a small-cell infrastructure relying on inexpensive and low-power BSs (femtocells) in order to achieve high data rates [3], [8]; green, by evolving from a throughput-optimized scenario toward throughput-and energy-optimized networks [5], [16], [18]; interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Large-scale MIMO is an emerging technology, where BSs with hundreds of antennas serve a few mobile terminals per channel use [41].", "While each BS connected to the electrical grid may cost approximately $3000 per year to operate, off-grid BSs operating in remote areas generally run on diesel power generators and may cost ten times more [5].", "Compared to baseline single-antenna transmissions, MIMO communications obtain higher data rates and improved error performance at the cost of: \u2022 increasing the signal processing complexity at the receiver, which is caused by the need for counteracting the interference imposed by simultaneously transmitting many data streams; \u2022 more stringent synchronization requirements among the TAs to exploit the benefits of spacetime-coded and multiuser MIMO transmissions; \u2022 multiple RF chains at the transmitter to be able to simultaneously transmit many data streams, which do not scale with Moore\u2019s law and make the transmitter bulky [36]; \u2022 independent power amplifiers for each RF chain, which dissipate the majority of the power consumed at the transmitter, since they are power inefficient due to the stringent linearity requirements of state-of-the-art phase/amplitude modulations [5].", "The reduced linearity requirements of constant-envelope modulation increase the efficiency of power amplifiers, which, in turn, reduce the total power consumption of the transmitters [5].", "\u2022 green, by evolving from a throughput-optimized scenario toward throughput- and energy-optimized networks [5], [16], [18]; \u2022 interference aware, by exploiting (instead of tolerating) interference and, thus, realizing the expected benefits of small-cell-based heterogeneous networking [19]; \u2022 characterized by a high level of cooperation among BSs and user terminals, by achieving improved coverage and reduced energy consumption through relay-aided transmission, as well as an improved reliability and reduced packet transmissions/ retransmissions through distributed diversity and NC, respectively [20]\u2013[22]; \u2022 relying upon new air-interface techniques and physical-layer standards for increasing the EE, reducing the implementation and signal processing complexity, while meeting the required SE.", "Consider a relaying-aided MIMO system for application in the downlink of cellular networks relying on fixed RSs, where both BSs and RSs are equipped with multiple antennas [259].", "Furthermore, the employment of low-power BSs has the beneficial effect of reducing the transmission distance between mobile terminals and access points, which results in performance improvements.", "In addition, unlike macro BSs that are usually heavily loaded most of time, the femto BSs are expected to be lightly loaded, which leads to further reduction of the power consumption since they will not be transmitting all the time, hence facilitating sleep-mode-based operation.", "More explicitly, recent studies have clearly shown that the EE gain of MIMO communications increases with the number of antennas, provided that only the transmit power of the BSs is taken into account and their circuit power dissipation is neglected.", "Currently, there are more than 5 million BSs serving mobile users, each consuming an average of 25 MWh per year [5], [6].", "On the other hand, the EE gain of MIMO communications remains modest and decreases with the number of active TAs, if realistic power consumption models are considered for the BSs [33]."]} +{"3180691|12060835": ["An option that is currently gaining momentum in green networking is RF energy harvesting, which can provide additional energy supply for wireless devices [297]."]} +{"25779341|2871699": ["In [9][10], a measurement of different medical sensors has been collected as shown in table I.", "DATA TRAFFIC FOR SOME MEDICAL SENSORS [9][10]"]} +{"25779341|10206347": ["(iii) The third category is \u201cstationary\u201d sensors, which is placed in a medical centre for example, so that these sensors will surround patients, and used to collect information about patient behaviours, such as visual sensors, for more details on body sensors please refer to [11]."]} +{"3893490|10979806": ["The GEE is defined as the ratio between the achievable rate and the overall power consumption, taking into account both the radiated power and the power consumed by the hardware circuitry [27]."]} +{"3893490|8323234": ["and digital domains or where different tradeoffs are made with respect to number of antennas or resolution of data converters [13].", "mmWave-specific MIMO architectures have been proposed, where signal processing is accomplished in a mixture of analog and digital domains (see, for instance, [13] and references therein)."]} +{"6314925|15453366": ["These range from the deployment of highly directional antennas [12], [14]\u2013[16] to the application of multi-beam directional arrays that radiate in multiple directions [17], [18]."]} +{"6237870|8323234": ["INTRODUCTION M ILLIMETER wave (mmWave) communications utilize the spectrum range of 30 GHz to 300 GHz, where a large bandwidth is available, to achieve ultra high data rates [2]."]} +{"18731125|15453366": []} +{"6359201|15453366": ["Aspects including global regulatory and standardization, justification of using 60 GHz bands, 60 GHz propagation and antennas and key system design issues were addressed in [1-2]."]} +{"2920396|8323234": []} +{"13852887|10937383": ["\u2026are with Communication Systems Department, EURECOM, Campus SophiaTech, 06410 Biot, France (e-mail: xiwen.jiang@eurecom.fr; \ufb02orian.kaltenberger@eurecom.fr). system [4], but are clearly suboptimal compared to the case where full channel state information at the transmitter (CSIT) is available [5]."]} +{"5581681|303976": []} +{"5443664|15453366": ["Millimeter wave communication is a promising candidate that can address the challenge of bandwidth shortage for the next generation of wireless cellular communication systems [1]\u2013[4]."]} +{"15109718|16972183": ["It achieves lower throughput and fairness compared to more optimal scheduling algorithms such as proportional fair [17, 20, 21], which are hence more commonly used."]} +{"49184508|8999817": ["While formulated originally for MIMO with arbitrary number of antenna elements, the approach is particularly applicable to massive MIMO, and in that context interest in HDA transceivers has surged over the past years, e.g., [6\u201312] and the references in [13].", "1 exhibits the logic structure of virtual sectorization realized by the proposed beamforming strategy, which is not in con\ufb02ict with typical hybrid beamforming structures, e.g., shared-array structures [13]."]} +{"49184508|12681089": ["Nevertheless, we next show that the iteration between analog precoders and combiners can be avoided if the Kronecker channel model [36] is valid, i.e., the channel covariance K g i can be expressed as where \u03a3 t , g i and \u03a3 r , g i are transmit and receive correlation matrices of UE g i ,\u2026"]} +{"2871699|25929315": ["M2M applications might require very high priority with a detailed level of granularity due to the transmission of critical information, whereas priority for Human-based applications is mainly among applications for each user and not between different users [17].", "[17] mention that M2M and Human-based traf\ufb01c differ further in traf\ufb01c direction, since M2M traf\ufb01c direction will be mainly uplink, while Human-based traf\ufb01c is either balanced or mainly downlink.", "Finally, M2M will have higher number of devices and may be required to operate for years or decades without maintenance, but users can recharge/replace batteries [17].", "Small and infrequent data transmissions will be more common in M2M [17,21], and thus the knowledge developed for Human-based traf\ufb01c, which is mostly bursty (web browsing), bulky (\ufb01le transfer), or constant or variable bit rate streams (VoIP or video) can be dif\ufb01cult to apply directly to M2M.", "Other M2M communications\u2019 surveys focus mainly in home networks [16], 3GPP Long-Term Evolution (LTE) networks [17], service platforms [18], or data mining techniques [19].", "M2M applications will be duty-cycled and should have very short connection delay to guarantee fast access to the network when waken up, while Human-based applications tolerate longer connection delays but are very demanding once connections are established [17]."]} +{"19724296|4395259": ["Finally, unlike most of the related work [1]\u2013[11], we consider a multi-cell setting where not only the data signals cause inter-cell interference but also the AN, which has to be carefully taken into account for system design.", "However, several new issues arise for physical layer security provisioning in multi-cell massive MIMO systems that are not present for conventional MIMO systems [1]\u2013[11].", "This approach is based on certain assumptions regarding computational complexity, and is thereby potentially vulnerable [1].", "(6) reveals that the achievable ergodic secrecy rate of the kth MT in the local cell has the subtractive form typical for many wiretap channels [1]\u2013[11], i."]} +{"23799027|206576720": ["A survey on mMIMO, also known as large-scale MIMO, including channel modeling, applications scenarios and physical and networking techniques was provided in [5]."]} +{"25587399|15453366": []} +{"4312682|2871699": ["References\n1.", "Data traffic for some medical sensors [18,19].", "In References [18,19], a measurement of different medical sensors has been collected as shown in Table 1.", "This has resulted in a dispersion of the technical solutions, which make current M2M markets are much segmented [19].", "Multipoint transmissio coordination of distributed RRUs has been investigated in References [9,10].", "Multipoint transmission coordination of distributed RRUs has been investigated in References [9,10].", "This has resulted in a dispersion f he te nical s lutions, whi h ake current M2M markets are much segmented [19]."]} +{"4312682|10206347": ["References\n1.", "It is generally accepted that the mm-wave communication is better used with\nIn Reference [3] the authors have studied the requirements of real-time fixed smart metres, they have found that data transaction by these smart metres occur every Ts = 120 s, where smart metres transfer data by accessing the network for Ta = 430 ms and transmit their payload at a rate of Rb = 60 kbps.", "The authors in Reference [13] have proposed a mechanism for the traffic engineering of MTC through multi-objective optimization and enhances the performance of both machine traffic and human traffic.", "In References [18,19], a measurement of different medical sensors has been collected as shown in Table 1.", "and be used to collect information about patient behaviours, such as visual sensors\u2014for more details on body sensors please refer to Reference [20].", "In Reference [7], RRUs were used to improve the network coverage in high data rate demands areas, the authors conducted empirical measurements regarding the links connecting the BBUs and RRUs.", "This type of sensor includes temperature, pressure and accelerometer sensors; (ii) The second type is \u201cimplantable\u201d in the patient\u2019s body, such as camera pill and insulin level sensors, which need to be injected into the body; (iii) The third category is \u201cstationary\u201d sensors, which are placed in a medical centre for example, so that these sensors will surround patients\nComputers 2018, 7, 16 4 of 19\nand be used to collect information about patient behaviours, such as visual sensors\u2014for more details on body sensors please refer to Reference [20].", "Also in Reference [17], a 60 GHz channel capacity and bit rate analyses has been presented and compared with the sub 6 GHz links from IoT perspectives\u2014the authors have found that the use of the mmWave band is a viable solution for the provision of a high performance links to support IoT.", "An algorithm was developed in Reference [8] in order to optimise the number of RRUs deployed in a network using game theory.", "In Reference [3] the authors have studied the requirements of real-time fixed smart metres, they have found that data transaction by these smart metres occur every Ts = 120 s, where smart metres transfer data by accessing the network for Ta = 430 ms and transmit their payload at a rate of Rb = 60 kbps.", "While the first investigation on using remote antennas in the mmWave band was introduced in Reference [11], where the author has demonstrated the importance of remote antennas on minimising the shadow fading of wireless networks in the Local Multipoint Distribution Service (LMDS) band.", "In Reference [15], MTC communication has been studied at a 40 GHz carrier frequency with 5 m link distance and the study has been conducted for healthcare sector.", "Multipoint transmissio coordination of distributed RRUs has been investigated in References [9,10].", "Multipoint transmission coordination of distributed RRUs has been investigated in References [9,10].", "The impact of MTC traffic on cellular network has been considered by Reference [14], where the authors have proposed a general framework to evaluate the MTC performance in cellular network.", "In Reference [12], the authors have investigated how to support MTC services through HetNets with relay deployments and Carrier Aggregation (CA) in the Long Term Evolution (LTE) network.", "While the first investigatio on using remote antennas in the mmWav band was introduced in Reference [11], wh re the author has demonstrated the importance of remote antennas on minimising the shadow fading of wireless networks in the Local Multipoint Distribution Service (LMDS) band."]} +{"27962181|26259297": ["Compared to the compressive sensing approaches which try to recover CSI from fewer sub-Nyquist sampling points [8], [9] or the angle-space methods which exploit the intrinsic angle parameters [10]\u2013[12], CCM based channel estimation would offer additional statistical knowledge about the channel variants and therefore achieve much better channel estimation accuracy."]} +{"27962181|8323234": ["1) Initial Angle Estimation: Owing to the narrow AS, namely, \u0394k is small (especially, \u0394k is zero in mmWave scenarios [7]), hk in (1) will exhibit sparsity or low-rank property in the angle domain and thus it could be approximately represented by discretizing the integral of (1) as", ", channel correlation or channel covariance matrix (CCM), and are built on the facts that the finite scattering propagation environments [7] as well as the high correlation between compact antenna elements make highdimensional CCMs sparse or low-rank.", "To proceed, we adopt the following assumptions from many theoretical works [7], [15], [16], [19], [32] and measurement tests [33]\u2013[37]:"]} diff --git a/edge/graph_6779551.jsonl b/edge/graph_6779551.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62e30c7a9456434d32385ddcbc20dbe8a19311ca --- /dev/null +++ b/edge/graph_6779551.jsonl @@ -0,0 +1,9 @@ +{"24252308|1230643": []} +{"206446574|1230643": []} +{"10437714|8280144": ["Furthermore, in [92], the authors showed\n9Alpha-stable distributions generalize Gaussian distributions and have heavier tails [10, Sec."]} +{"7910349|7278743": ["The a im of the IEEE 802.11 standard [ 4 ][5][6][7] is to p rovide wireless connectivity to devices that require a quick installation, such as portable c omputers, PDAs, o r generally mobile devices inside a WLAN (Wireless Local Area Network)."]} +{"1940388|17205659": ["Besides implementing the security goal discussed above, the following metrics are also important to evaluate whether a security scheme is appropriate for WSNs [7], [8].", "A few existing surveys on security issues in WSNs can be found [7], [8]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} diff --git a/edge/graph_67821972.jsonl b/edge/graph_67821972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f8423ba1fb72ab8a4c846b67c7c534b97cc40459 --- /dev/null +++ b/edge/graph_67821972.jsonl @@ -0,0 +1,2 @@ +{"1155103|10390713": ["network, in particular to identify critical points [19], [20]."]} +{"1192275|17381415": ["DG units are considered as power electronics inverter generators or static generators for technologies such as photovoltaic (PV) plants and fuel cells [7], [8]."]} diff --git a/edge/graph_67855323.jsonl b/edge/graph_67855323.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e459e11b25f88f5560fb10529f1de6a3d3d6cd0e --- /dev/null +++ b/edge/graph_67855323.jsonl @@ -0,0 +1,12 @@ +{"3519414|2809360": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"3519414|11009327": ["In particular, the patient data contained in EHR systems has been used for such tasks as medical concept extraction [7], [8], patient trajectory modeling [9], disease inference [10], [11], clinical decision support systems [12], and more (Table I)."]} +{"5842463|393948": ["The number of patients who made at least two visits is 2,695, and the number of unique diagnosis code (3-digit ICD-9 code) is 767, which is a subset of Sutter dataset."]} +{"205715958|393948": []} +{"15943168|8310135": ["In this paper, we presented a system to apply Named Entity Recognition (NER) to microposts.", "In this challenge, we tackled Named Entity Recognition (NER) in microposts.", "Finally, we execute a simple, rulebased post-processing step in which we check the coherence of individual tags within a Named Entity (NE)."]} +{"17891422|393948": []} +{"12863166|3331246": []} +{"12863166|11608263": ["Much work has been carried outside of the healthcare domain on tasks such as image classification (Tsoumakas and Katakis, 2006; Weston et al., 2011), question answering (Choi et al.", "Table 1 provides the ICD9 label cardinality and density as de\ufb01ned by Tsoumakas and Katakis (2006).", "Much work has been carried outside of the healthcare domain on tasks such as image classi\ufb01cation (Tsoumakas and Katakis, 2006; Weston et al., 2011), question answering (Choi et al., 2016), and advertising (Jain et al., 2016)."]} +{"49872719|14434529": []} +{"1595089|6237367": [", ICD-9, ICD-10), they also contain unstructured information such as clinical notes which create challenges for designing effective algorithms to transform data into meaningful representations that can be efficiently interpreted and used in health care applications [4]."]} +{"4404566|393948": ["The success of predictive algorithms largely depends on feature selection and data representation 12,13 .", "Despite the success of feature learning with text, multimedia, and marketing 12 , as well as the rising popularity of deep learning 17 (i.e., learning based on hierarchies of neural networks), these techniques have not been used broadly with EHR data.", "These challenges have made it difficult for machine learning methods to identify patterns that produce predictive clinical models for real-world applications 12 .", "SDAs are sequences of three-layer neural networks with a central layer to reconstruct high-dimensional input vectors 12,17,18,41 .", "We compared the deep patient representation with other well-known feature learning algorithms having demonstrated utility in various domains including medicine 12 ."]} +{"19217401|8310135": []} diff --git a/edge/graph_67855350.jsonl b/edge/graph_67855350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c7568c8f51d9426752bc49f9843a523f2c597a4 --- /dev/null +++ b/edge/graph_67855350.jsonl @@ -0,0 +1,14 @@ +{"64853900|1229096": ["Two recent reviews (29, 30) provide a clear overview of the state of the art in motion planning for autonomous cars."]} +{"64853900|2373140": []} +{"54457648|1229096": ["Finally, there exists a large volume of work on vehicle motion planning outside the machine learning context and Paden et al. (2016) present a notable survey."]} +{"3336030|2736673": []} +{"4562004|4110304": ["Our previous paper [39] provides a comprehensive survey of recent studies in exploring visual interpretability of neural networks, including 1) the visualization and diagnosis of CNN representations, 2) approaches for disentangling CNN representations into graphs or trees, 3) the learning of CNNs with disentangled and interpretable representations, and 4) middle-to-end learning based on model interpretability."]} +{"206852927|18599847": ["are challenging for machine learning [8], but well-studied by the sensor fusion community [9], [10].", "For this, the algorithm uses advanced sensor fusion techniques regarding latency and variance in time domain which are hard to compensate by learning based approaches [8]."]} +{"8687401|6327434": ["An application of the SPRT to the health monitoring of a satellite system has been reported in [87] and [117].", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12],", "The development of the change detection problem was stimulated by Wald in 1947 when \u201cSequential Analysis\u201d was published and a Sequential Probability Ratio Test (SPRT) was introduced.", "something has gone wrong or that everything is fine, and of determining the location as well as nature of the fault [12].", "Page also pointed out that this rule is equivalent to performing a SPRT.", "Given a sequence of observations , the Sequential Probability Ratio Test (SPRT) computes the cumulative sum of the log-likelihood ratio recursively as follows:\n(36)\nwhere\n(37)\nNote that denote the conditional PDF of the observation , which depends on the parameter .", "To overcome this, a multiple-hypothesis test based on the Shiryayev SPRT is used to enhance the robustness of the FDI scheme.", "More sophisticated decision rules may consist of adaptive thresholds, or may be based on statistical decision theories such as generalized likelihood ratio (GLR) test or sequential probability ratio test (SPRT) [12], [25], [26].", "The SPRT has been used to develop a dynamics sensor validation system for a reusable launch vehicle [116].", "Various survey papers on the change detection methods can be found in [12], [23], [25], and [113].", "It has been shown that for a certain criterion of optimality, this generalized Shiryayev SPRT detects and isolates a change in hypothesis in the conditionally independent measurement sequence in minimum time.", "In the rest of this section, we describe the details of the following hypothesis test techniques: the SPRT, the CUMSUM algorithm, the generalized likelihood ratio test, and the local approach.", "The CUSUM algorithm is equivalent to a repeated SPRT in which the test is restarted as long as the decision is taken in\nfavor of .", "The SPRT is used with a multivariate state estimation technique as core elements of a commercial dynamics sensor validation system, which is designed to improve launch vehicle mission safety and system dependability by enabling rapid development and cost effective maintenance of embeddable real-time software to reliably detect process-critical sensor failures.", "The well-known examples of these statistical test techniques are as follows:\na) sequential probability ratio test (SPRT); b) cumulative sum (CUSUM) algorithm; c) generalized likelihood ratio test; d) local approach.", "Malladi and Speyer [114] have derived an online multiple hypothesis Shiryayev SPRT [115] by adopting a dynamic programming approach."]} +{"49240765|14022070": ["such as combinatorial testing [33] or the testing ecosystem that has sprung up around Android testing [7], it\u2019s possible that these techniques could be used in the robotic systems domain by making similar modifications to them as those presented in this paper."]} +{"4667214|4110304": ["[43] made a survey for the interpretability of deep visual models."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"35426171|5538934": ["Due to their increased use in security-critical settings such as malware detection, there has been an explosion of work on the security of machine learning systems; see Barreno et al. (2010), Biggio et al. (2014a), Papernot et al. (2016b), and Gardiner and Nagaraja (2016) for some recent surveys."]} +{"27120739|1440555": ["If more than one microphone is available, as in our system, the waveform of the target signal can be reconstructed for both channels and the relative sound source localised, using one of the methods described in the literature (for a review, see [40])."]} +{"11971675|36510460": ["The development of intelligent planning algorithms is one of the key issues when designing robotic architectures [20], [21].", "In [21] and [95] descriptions, applications and improvements of these algorithms are reviewed.", "The approach consists on randomly sampling the configuration space or state space, looking for connectivity inside it [21]."]} +{"11971675|1029120": []} diff --git a/edge/graph_67855405.jsonl b/edge/graph_67855405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67855516.jsonl b/edge/graph_67855516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b39b7e8d9352b292fa3c53e2f64eaecdeafc0d8d --- /dev/null +++ b/edge/graph_67855516.jsonl @@ -0,0 +1,47 @@ +{"14314927|14077778": ["Efficient algorithms for group scalar multiplication have a long history (see [Knuth] and [Gordon1998]), and optimal scalar multiplication routines typically use a combination of the left-to-right or right-to-left m-ary methods with sliding windows, addition-subtraction chains, signed representations, etc."]} +{"10528416|1535117": ["Smart environment is progressively developing in the areas of smart homes [1,2], smart grids [3], intelligent transportation systems [4], smart healthcare [5], and smart cities [6]."]} +{"96441|3734874": ["This survey is an updated version of a previous report [16], and has been influenced by Avanzi\u2019s report [2], by the books of Blake et al."]} +{"20838736|96441": ["It includes C implementations of finite field arithmetic, ECC, and PBC for different hardware platforms.", "Note that point decompression is an important building block of elliptic curve cryptography (ECC) and part of many standards and schemes.", "A special category of fault attacks on ECC are so-called weak curve attacks.", "Hence, our attack is in principle relevant for standardized ECC protocols like elliptic curve Diffie-Hellman scheme (ECDH) and elliptic curve integrated encryption scheme (ECIES).", "Because fields used in ECC are relatively small, sub-exponential DLOG algorithms are often efficient enough to solve the DLOG problem.", "Therefore, it is part of many ECC schemes and related standards, e.g., IEEE 1363.", "The attack is efficient for supersingular curves (not to be confused with singular curves) and, consequently, these curves are avoided for standard ECC today.", "For an ECC scheme, we define the domain parameters as a tuple D = (Fq, E,G, r, c) with 1) A field Fq of size q = pn with p > 3 defined by a\nproper description.", "This protocol is related to key-agreement and encryption schemes from ECC.", "To deal with attacks on the branch instruction, in [11] another method has been proposed to protect against second order fault attacks on ECC.", "Attacks where the weak curve is obtained by modification of the base point of the ECSM are often called invalid point attacks [4].", "Several countermeasures have been proposed against fault attacks on ECC [4], [5].", "Over the last years many fault attacks on ECC implementations were published.", "Several software countermeasures against attacks on ECC based schemes are known.", "For a general survey we refer to [4], [5].", "The following two definitions are based on [30] and [8]:\nDefinition 2 (ECC Domain parameters).", "Consequently, groups in ECC have an efficient representation due to their relatively small size.", "These curves are popular in ECC and especially pairing based cryptography (PBC) because they have useful properties."]} +{"15077318|3734874": ["III describes the ECDSA signature generation algorithm and also its weak points in the view of power analysis attacks.", "The board was designed especially for the purpose of side channel power attack analyses of the Altera Cyclone III FPGA.", "Among wide variety of power analysis attacks, we may mention the recent attack revealing the encrypted configuration of the Altera Stratix II and III FPGAs [4].", "Secret information can then be extracted by a more complex cryptanalytic attack, such as differential cryptanalysis in case of symmetric block ciphers [5], [6], [7], [8], [9].", "III, we constructed a basic design with 8-bit datapath for the Altera Cyclone III FPGA."]} +{"16648489|3734874": []} +{"16648489|96441": ["The main reasons of this lie in the advantage of providing basic protection against simple power analysis (SPA) [17], the high efficiency of the Montgomery ladder step, namely, only five multiplications and four squarings are required, and a total of seven registers are needed if the Lopez\u2013Dahab algorithm [43] is implemented in a conventional way.", "In the case of hardware implementations, adversaries have much more room for launching attacks that in some cases might be devastating [16,17,32].", "In [17], the authors reported a careful analysis of the known side-channel attacks and countermeasures for elliptic curve implementations on hardware platforms."]} +{"276740|3734874": []} +{"276740|96441": ["For a good survey on securing ECC implementations, see [8, 9]."]} +{"18189153|10780757": []} +{"18189153|17623572": ["A number of mechanisms for detecting black hole attacks were reviewed in [16]."]} +{"18189153|17009788": ["In [14] the authors presented a survey of IDSs in MANETs and wireless mesh networks, mostly from the preceding four years."]} +{"18189153|41768464": []} +{"5725469|3734874": ["Scalar multiplication (SM), the main mathematical operation behind Elliptic Curve Cryptography (ECC) is the target of a broad range of possible PAs and FAs on ECC [11] [15] of both horizontal and vertical nature [7].", "In section II, RNS is introduced and its PA and FA resistance in ECC systems is discussed.", "Unfortunately, RNS in an ECC implementation leads to considerable computational complexity and hardware resources [16].", "For ECC approved ECs defined over GF(p) (ECs on GF (2k) are not discussed in this paper), all GF(p) operations (addition, subtraction, multiplication) are modular operations (modulo p).", "Regarding DPA attacks, countermeasures are based on randomization during the SM process [11] [10] as adopted in Algorithm 1 (base point blinding, Coron second countermeasure).", "The level of security that these approaches can offer, when specific PA and FA attacks are applied to an ECC implementation,\nis evaluated and a roadmap of RNS based countermeasures is described.", "a randomization that can lead to unmasking (un-blinding) the point P in an intermediate SM round), then base point blinding remains a strong DPA countermeasure [11].", "I. INTRODUCTION\nScalar multiplication (SM), the main mathematical operation behind Elliptic Curve Cryptography (ECC) is the target of a broad range of possible PAs and FAs on ECC [11] [15] of both horizontal and vertical nature [7]."]} +{"5725469|96441": ["Extending the work of [16] we argue through a security analysis that a combination of traditional PA/FA countermeasures [10] [15] [12] and RNS based structures can provide strong side-channel resistance.", "The input point V is initially blinded by adding to it a random element R, thus preventing sophisticated, comparative simple PAs [12].", "The periodic change of a base permutation during the modular exponentiation (and consecutively SM) computation flow can introduce enough randomness to thwart PAs.", "I. INTRODUCTION\nScalar multiplication (SM), the main mathematical operation behind Elliptic Curve Cryptography (ECC) is the target of a broad range of possible PAs and FAs on ECC [11] [15] of both horizontal and vertical nature [7].", "Given the description of RNS PA and FA countermeasures, we propose the inclusion of LRA as an add-on countermeasure in an PA resistant SM algorithm in order to provide horizontal (eg. simple PAs) apart from vertical attacks resistance."]} +{"207063673|14077778": ["Input A public key Q xQ yQ associated with valid domain parameters q FR a b G n h Output Acceptance or rejection of the validity of Q\nCheck that Q O Check that xQ and yQ are properly represented elements of Fq i e integers in the interval\np in the case q p and bit strings of length m bits in the case q m Check that Q lies on the elliptic curve de ned by a and b\nCheck that nQ O If any check fails then Q is invalid otherwise Q is valid\nProof of Possession of a Private Key\nIf an entity C is able to certify A s public key Q as its own public key then C can claim that A s signed messages originated from C To avoid this the CA should require all entities A to prove possession of the private keys corresponding to its public keys before the CA certi es the public key as belonging to A This proof of possession can be accomplished by a variety of means for example by requiring A to sign a message of the CA s choice or by using zero knowledge techniques see Chaum Evertse and van de Graaf Note that proof of possession of a private key provides di erent assurances from public key validation The former demonstrates possession of a private key even though it may correspond to an invalid public key while the latter demonstrates validity of a public key but not ownership of the corresponding private key Doing both provides a high level of assurance\nECDSA Signature Generation and Veri cation\nThis section describes the procedures for generating and verifying signatures using the ECDSA\nECDSA Signature Generation To sign a message m an entity A with domain parameters D q FR a b G n h and associated key pair d Q does the following\nSelect a random or pseudorandom integer k k n Compute kG x y and r x mod n If r then go to step\nCompute k mod n\nCompute e SHA m\nCompute s k e dr mod n If s then go to step\nA s signature for the message m is r s\nECDSA Signature Verification To verify A s signature r s on m B obtains an authen tic copy of A s domain parameters D q FR a b G n h and associated public key Q It is recommended that B also validates D and Q see x and x B then does the following Verify that r and s are integers in the interval n Compute e SHA m\nCompute w s mod n\nCompute u ew mod n and u rw mod n\nCompute X u G u Q If X O then reject the signature Otherwise compute v x mod n where X x y\nAccept the signature if and only if v r\nProof that Signature Verification Works If a signature r s on a message m was indeed generated by A then s k e dr mod n Rearranging gives\nk s e dr s e s rd we wrd u u d mod n\nThus u G u Q u u d G kG and so v r as required\nConversion Between Data Types ANSI X speci es a method for converting eld elements to integers This is used to convert the eld element x to an integer in step of signature generation and step of signature veri cation prior to computing x mod n ANSI X also speci es a method for converting bit strings to integers This is used to convert the output e of SHA to an integer prior to its use in the modular computation in step of signature generation and step of signature veri cation\nPublic Key Certificates Before verifying A s signature on a message B needs to obtain an authentic copy of A s domain parameters D and associated public key Q ANSI X does not specify a mechanism for achieving this In practice authentic public keys are most commonly distributed via certi cates A s public key certi cate should include a string of information that uniquely identi es A such as A s name and address her domain parameters D if these are not already known from context her public key Q and a certifying authority s CA s signature over this information B can then use his authentic copy of the CA s public key to verify A s certi cate thereby obtaining an authentic copy of A s static public key\nRationale for Checks on r and s in Signature Verification Step of signature veri cation checks that r and s are integers in the interval n These checks can be performed very e ciently and are prudent measures in light of known attacks on related ElGamal signature schemes which do not perform these checks for example of such attacks see Bleichenbacher The following is a plausible attack on ECDSA if the check r and more generally r mod n is not performed Suppose that A is using the elliptic curve y x ax b over Fp\nwhere b is a quadratic residue modulo p and suppose that A uses a base point G p b of prime order n It is plausible that all entities may select a base point with x coordinate in order\nto minimize the size of domain parameters An adversary can now forge A s signature on any message m of its choice by computing e SHA m It can easily be checked that r s e is a valid signature for m\nComparing DSA and ECDSA Conceptually the ECDSA is simply obtained from the DSA by replacing the subgroup of order q of Z p generated by g with the subgroup of points on an elliptic curve that are generated by G The only signi cant di erence between ECDSA and DSA is in the generation of r The DSA does this by taking the random element X gk mod p and reducing it modulo q thus obtaining an integer in the interval q The ECDSA generates r in the interval n by taking the x coordinate of the random point kG and reducing it modulo n\nSecurity Considerations\nThe security objective of ECDSA is to be existentially unforgeable against a chosen message attack The goal of an adversary who launches such an attack against a legitimate entity A is to obtain a valid signature on a single message m after having obtained A s signature on a collection of messages not including m of the adversary s choice\nECDSA has not been proven to be existentially unforgeable against chosen message attack\nHowever slight variants of DSA and hence also slight variants of ECDSA have been proven secure by Pointcheval and Stern under the assumptions that the discrete logarithm problem is hard and that the hash function employed is a random function\nThe possible attacks on ECDSA can be classi ed as follows\nAttacks on the elliptic curve discrete logarithm problem\nAttacks on the hash function employed\nOther attacks\nThis section summarizes the current knowledge of these attacks and how they can be avoided in practice\nThe Elliptic Curve Discrete Logarithm Problem\nOne way in which an adversary can succeed is to compute A s private key d from A s domain pa rameters q FR a b G n h and public key Q The adversary can subsequently forge A s signature on any message of its choice\nProblem Definition The elliptic curve discrete logarithm problem ECDLP is the following given an elliptic curve E de ned over a nite eld Fq a point P E Fq of order n and a point Q lP where l n determine l\nKnown Attacks\nThis subsection overviews the algorithms known for solving the ECDLP and discusses how they can be avoided in practice\nNaive Exhaustive Search In this method one simply computes successive multiples of P P P P P until Q is obtained This method can take up to n steps in the worst case\nPohlig Hellman Algorithm This algorithm due to Pohlig and Hellman exploits the factorization of n the order of the point P The algorithm reduces the problem of recovering l to the problem of recovering l modulo each of the prime factors of n the desired number l can then be recovered by using the Chinese Remainder Theorem\nThe implications of this algorithm are the following To construct the most di cult instance of the ECDLP one must select an elliptic curve whose order is divisible by a large prime n Preferably this order should be a prime or almost a prime i e a large prime n times a small integer h For the remainder of this section we shall assume that the order n of P is prime\nBaby Step Giant Step Algorithm This algorithm is a time memory trade o of the method of exhaustive search It requires storage for about p n points and its running time is roughly p n steps in the worst case\nPollard s Rho Algorithm This algorithm due to Pollard is a randomized version of the baby step giant step algorithm It has roughly the same expected running time p n steps as the baby step giant step algorithm but is superior in that it requires a negligible amount of storage\nGallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm can be sped up by a factor of p Thus the expected running time of Pollard s rho method with this speedup is p n steps\nParallelized Pollard s Rho Algorithm Van Oorschot and Wiener showed how Pollard s rho algorithm can be parallelized so that when the algorithm is run in parallel on r processors the expected running time of the algorithm is roughly p n r steps That is using r processors results in an r fold speed up\nPollard s lambda method This is another randomized algorithm due to Pollard Like Pollard s rho method the lambda method can also be parallelized with a linear speedup The parallelized lambda method is slightly slower than the parallelized rho method The lambda method is however faster in situations when the logarithm being sought is known to lie in a subinterval b of n where b n Multiple Logarithms R Silverman and Stapleton observed that if a single instance of the ECDLP for a given elliptic curve E and base point P is solved using parallelized Pollard s rho method then the work done in solving this instance can be used to speed up the solution of other instances of the ECDLP for the same curve E and base point P More precisely if the rst instance takes expected time t then the second instance takes expected time p t t Having solved these two instances the third instance takes expected time p p t Having solved these three instances the fourth instance takes expected time p p t And so on Thus subsequent instances of the ECDLP for a particular elliptic curve become progressively easier Another way of looking at this is that\nsolving k instances of the ECDLP for the same curve E and base point P takes only p k as much work as it does to solve one instance of the ECDLP This analysis does not take into account storage requirements\nConcerns that successive logarithms become easier can be addressed by ensuring that the elliptic parameters are chosen so that the rst instance is infeasible to solve\nSupersingular Elliptic Curves Menezes Okamoto and Vanstone and Frey and R uck showed how under mild assumptions the ECDLP in an elliptic curve E de ned over a nite eld Fq can be reduced to the ordinary DLP in the multiplicative group of some extension eld Fqk for some k where the number eld sieve algorithm applies The reduction algorithm is only practical if k is small this is not the case for most elliptic curves as shown by Balasubramanian and Koblitz To ensure that the reduction algorithm does not apply to a particular curve one only needs to check that n the order of the point P does not divide qk for all small k for which the DLP in Fqk is tractable in practice when n then k su ces An elliptic curve E over Fq is said to be supersingular if the trace t of E is divisible by the characteristic p of Fq For this very special class of elliptic curves it is known that k It follows that the reduction algorithm yields a subexponential time algorithm for the ECDLP in supersingular curves For this reason supersingular curves are explicitly excluded from use in the ECDSA by the above divisibility check\nMore generally the divisibility check rules out all elliptic curves for which the ECDLP can be e ciently reduced to the DLP in some small extension of Fq These include the supersingular elliptic curves and elliptic curves of trace elliptic curves E over Fq for which E Fq q Prime Field Anomalous Curves An elliptic curve E over Fp is said to be prime eld anomalous if E Fp p Semaev Smart and Satoh and Araki showed how to e ciently solve the ECDLP for these curves The attack does not extend to any other classes of elliptic curves Consequently by verifying that the number of points on an elliptic curve is not equal to the cardinality of the underlying eld one can easily ensure that the Semaev Smart Satoh Araki attack does not apply\nCurves Defined Over a Small Field Suppose that E is an elliptic curve de ned over the nite eld F e Gallant Lambert and Vanstone and Wiener and Zuccherato showed how Pollard s rho algorithm for computing elliptic curve logarithms in E F ed can be\nfurther sped up by a factor of p d thus the expected running time of Pollard s rho method\nfor these curves is p n d steps For example if E is a Koblitz curve see x then Pollard s rho algorithm for computing elliptic curve logarithms in E F m can be sped up by a factor of p m This speedup should be considered when doing a security analysis of elliptic curves whose coe cients lie in a small sub eld\nCurves Defined Over F m m Composite Galbraith and Smart expanding on earlier work of Frey discuss how the Weil descent might be used to solve the ECDLP for elliptic curves de ned over F m where m is composite such elds are sometimes called composite elds More recently Gaudry Hess and Smart re ned these ideas to provide\nstrong evidence that when m has a small divisor l e g l the ECDLP for elliptic curves de ned over F m can be solved faster than with Pollard s rho algorithm In light of these results it seems prudent to not use elliptic curves over composite elds\nIt should be noted that some ECC standards including the draft ANSI X explicitly exclude the use of elliptic curves over composite elds The ANSI X F committee also agreed in January to exclude the use of such curves in a forthcoming revision of ANSI X\nNon Applicability of Index Calculus Methods Whether or not there exists a general subexponential time algorithm for the ECDLP is an important unsettled question and one of great relevance to the security of ECDSA It is extremely unlikely that anyone will ever be able to prove that no subexponential time algorithm exists for the ECDLP However much work has been done on the DLP over the past years and more speci cally on the ECDLP over the past years and no subexponential time algorithm has been discovered for the ECDLP Miller and J Silverman and Suzuki have given convincing arguments for why the most natural way in which the index calculus algorithms can be applied to the ECDLP is most likely to fail\nXedni Calculus Attacks A very interesting line of attack on the ECDLP called the xedni calculus attack was recently proposed by J Silverman One intriguing aspect of the xedni calculus is that it can be adapted to solve both the ordinary discrete logarithm and the integer factorization problems However it was subsequently shown by a team of researchers including J Silverman see Jacobson et al that the attack is virtually certain to fail in practice\nHyperelliptic Curves Hyperelliptic curves are a family of algebraic curves of arbitrary genus that includes elliptic curves Hence an elliptic curve can be viewed as a hyperelliptic curve of genus Adleman DeMarrais and Huang see also Stein M uller and Thiel presented a subexponential time algorithm for the discrete logarithm problem in the jacobian of a large genus hyperelliptic curve over a nite eld However in the case of elliptic curves the algorithm is worse than naive exhaustive search\nEquivalence to Other Discrete Logarithm Problems Stein and Zuccherato\nshowed that the discrete logarithm problem in real quadratic congruence function elds\nof genus is equivalent to the ECDLP Since no subexponential time algorithm is known for the former problem this may provide further evidence for the hardness of the ECDLP\nExperimental Results\nThe best general purpose algorithm known for the ECDLP is the parallelized version of Pollard s rho algorithm which has an expected running time of p n r steps where n is the prime order of the base point P and r is the number of processors utilized\nCerticom s ECC Challenge Certicom initiated an ECC challenge in November in order to encourage and stimulate research on the ECDLP Their challenges consist of instances of the ECDLP on a selection of elliptic curves The challenge curves are divided into three categories\nlisted below In the following ECCp k denotes a random curve over a eld Fp ECC k denotes a random curve over a eld F m and ECC K k denotes a Koblitz curve see x over F m k is the bitlength of n In all cases the bitsize of the order of the underlying nite eld is equal or slightly greater than k so curves have either prime order or almost prime order\nRandomly generated curves over Fp where p is prime ECCp ECCp ECCp ECCp\nECCp ECCp ECCp ECCp and ECCp\nRandomly generated curves over F m where m is prime ECC ECC ECC ECC ECC ECC ECC ECC and ECC\nKoblitz curves over F m where m is prime ECC K ECC ECC ECC ECC and ECC\nResults of the Challenge Escott et al report on their implementation of the parallelized Pollard s rho algorithm which incorporates some improvements of Teske The hardest instance of the ECDLP they solved was the Certicom ECCp challenge For this task they utilized over machines from at least countries and found the answer in days The total number of steps executed was about elliptic curve additions which is close to the expected time p n where n Escott et al conclude that the running time of Pollard s rho algorithm in practice ts well with the theoretical predictions They estimate that the ECCp challenge could be solved by a network of PentiumPro MHz machines in about months\nHardware Attacks\nVan Oorschot and Wiener examined the feasibility of implementing parallelized Pollard s rho algorithm using special purpose hardware They estimated that if n then a machine with r processors could be built for about US ! million that could compute a single elliptic curve discrete logarithm in about days Since ANSI X mandates that the parameter n should satisfy n such hardware attacks appear to be infeasible with today s technology\nAttacks on the Hash Function\nDefinition A cryptographic hash function H is a function that maps bit strings of arbitrary lengths to bit strings of a xed length t such that\nH can be computed e ciently\npreimage resistance For essentially all y f gt it is computationally infeasible to nd a bit string x such that H x y and\ncollision resistance It is computationally infeasible to nd distinct bit strings x and x such that H x H x\nSHA Security Requirements The following explains how attacks on ECDSA can be suc cessfully launched if SHA is not preimage resistant or not collision resistant\nIf SHA is not preimage resistant then an adversary E may be able to forge A s signatures as follows E selects an arbitrary integer l and computes r as the x coordinate of Q lG reduced modulo n E sets s r and computes e rl mod n If E can nd a message m such that e SHA m then r s is a valid signature for m\nIf SHA is not collision resistant then an entity A may be able to repudiate signatures as follows A rst generate two messages m and m such that SHA m SHA m such a pair of messages is called a collision for SHA She then signs m and later claims to have signed m note that every signature for m is also a signature for m\nIdeal Security A t bit hash function is said to be have ideal security if both i given a hash output producing a preimage requires approximately t operations and ii producing a collision requires approximately t operations SHA is a bit hash function and is believed to have ideal security The fastest method known for attacking ECDSA by exploiting properties of SHA is to nd collisions for SHA Since this is believed to take steps attacking ECDSA in this way is computationally infeasible Note however that this attack imposes an upper bound of\non the security level of ECDSA regardless of the size of the primary security parameter n Of course this is also the case with all present signature schemes with appendix since the only hash functions that are widely accepted as being both secure and practical are SHA and RIPEMD\nsee Dobbertin Bosselaers and Preneel both of which are bit hash functions\nVariable Output Length Hash Functions It is envisioned that SHA will eventually be replaced by a family of hash functions Hl where Hl is an l bit hash function having ideal security If one uses ECDSA with parameter n then one would use Hl where l blog nc as the hash function In this case attacking ECDSA by solving the ECDLP and attacking ECDSA by nding collisions for Hl both take approximately the same amount of time\nOther Attacks\nSecurity Requirements for Per Message Secrets The per message secrets k in ECDSA signature generation have the same security requirements as the private key d This is because if an adversary E learns a single per message secret k which was used by A to generate a signature\nr s on some message m then E can recover A s private key since d r ks e mod n where e SHA m see step of ECDSA signature generation Hence per message secrets must be securely generated securely stored and securely destroyed after they have been used\nRepeated Use of Per Message Secrets The per message secrets k used to sign two or more messages should be generated independently of each other In particular a di erent per message secret k should be generated for each di erent message signed otherwise the private key d can be recovered Note that if a secure random or pseudorandom number generator is used then the chance of generating a repeated k value is negligible To see how private keys can be recovered if per message secrets are repeated suppose that the same per message secret k was used to generate ECDSA signatures r s and r s on two di erent messagesm and m Then s k e dr\nmod n and s k e dr mod n where e SHA m and e SHA m Then ks e dr mod n and ks e dr mod n Subtraction gives k s s e e mod n If s s mod n which occurs with overwhelming probability then k s s e e mod n Thus an adversary can determine k and then use this to recover d\nVaudenay s Attacks Vaudenay demonstrated a theoretical weakness in DSA based on his insight that the actual hash function used in the DSA is SHA modulo q not just SHA where q is a bit prime Since SHA is a bit hash function some of its outputs when converted to integers are larger than q Hence in general SHA m SHA m mod q This weakness allows the selective forgery of one message if the adversary can select the domain parameters This weakness is not present in ECDSA because of the requirement that n the analogous quantity to q in the DSA be greater than\nDuplicate Signature Key Selection A signature scheme S is said to have the duplicate signature key selection DSKS property if given A s public key PA and given A s signature sA on a message M an adversary E is able to select a valid key pair PE SE for S such that sA is also E s signature on M Note that this de nition requires that SE is known to E Blake Wilson and Menezes showed how this property can be exploited to attack a key agreement protocol which employs signatures scheme They also demonstrated that if entities are permitted to select their own domain parameters then ECDSA possesses the DSKS property To see this suppose that A s domain parameters are DA q FR a b G n h A s key pair is QA dA and r s is A s signature on M The adversary E selects an arbitrary integer c c n such that t s e s rc mod n computes X s eG s rQ where e SHA M and G t mod n X E then forms DE q FR a b G n h and QE cG Then it is easily veri ed that DE and QE are valid and that r s is also E s signature on M\nIf one mandates that the generating point G be selected veri ably at random during domain parameter generation using a method akin to those in x for generating elliptic curves veri ably at random then it appears that ECDSA no longer possesses the DSKS property It must be emphasized that possession of the DSKS property does not constitute a weakness of the signature scheme the goal of a signature scheme is to be existentially unforgeable against an adaptive chosen message attack Rather it demonstrates the importance of auditing domain parameter and public key generation\nImplementation Attacks ANSI X does not address attacks that could be launched against implementations of ECDSA such as timing attacks Kocher di erential fault analysis Boneh DeMillo and Lipton di erential power analysis Kocher Ja e and Jun and attacks which exploit weak random or pseudorandom number generators Kelsey et al\nImplementation Considerations\nBefore implementing ECDSA several basic choices have to be made including\nType of underlying nite eld Fq Fp or F m\nField representation e g polynomial or normal basis for F m\nType of elliptic curve E over Fq e g random curve or Koblitz curve\nElliptic curve point representation e g a ne or projective coordinates\nThere are many factors that can in uence the choices made All of these must be considered simultaneously in order to arrive at the best solution for a particular application The factors include\nSecurity considerations Suitability of methods available for optimizing nite eld arithmetic addition multiplication squaring and inversion\nSuitability of methods available for optimizing elliptic curve arithmetic point addition point doubling and scalar multiplication\nApplication platform software hardware or rmware Constraints of a particular computing environment e g processor speed storage code size gate count power consumption\nConstraints of a particular communications environment e g bandwidth response time\nSelected References to the Literature The most detailed and comprehensive reference available on techniques for e cient nite eld and elliptic curve arithmetic is IEEE P See Gordon for a detailed survey of various methods for scalar multiplication For an implemen tation report of elliptic curve operations over Fp and F m see Schroeppel et al De Win et al\nand Hasegawa Nakajima and Matsui\nInteroperability Considerations\nThe goals of cryptographic standards are twofold\nTo facilitate the widespread use of cryptographically sound and well speci ed techniques\nTo promote interoperability between di erent implementations\nFactors Affecting Interoperability Interoperability is encouraged by completely specifying the steps of the cryptographic schemes and the formats for shared data such as domain parameters keys and exchanged messages and by limiting the number of options available to the implemen tor For elliptic curve cryptography and in particular the ECDSA the factors that can impact interoperability include\nThe number and types of allowable nite elds\nThe number of allowable representations for the elements of an allowable nite eld\nThe number of allowable elliptic curves over an allowable nite eld\nThe formats for specifying eld elements elliptic curve points domain parameters public keys and signatures\nECDSA Standards\nAmong the standards and draft standards which specify ECDSA the ones which have been o cially approved by their respective accredited organizations are ANSI X FIPS IEEE P and ISO The salient features of these standards are described rst and then the standards are compared with regards to their compatibility with each other This is followed by a brief overview of some other standards that specify or use ECDSA", "ANSI X Public Key Cryptography for the Financial Services Industry Elliptic Curve Key Agreement and Key Transport Protocols working draft August\nD Ash I Blake and S Vanstone Low complexity normal bases Discrete Applied Mathe matics\nR Balasubramanian and N Koblitz The improbability that an elliptic curve has subexpo nential discrete log problem under the Menezes#Okamoto#Vanstone algorithm Journal of Cryptology\nL Bassham D Johnson and T Polk Representation of Elliptic Curve Digital Signature Algo rithm ECDSA Keys and Signatures in Internet X Public Key Infrastructure Certi cates Internet Draft June Available at http www ietf org\nM Bellare R Canetti and H Krawczyk A modular approach to the design and analysis of authentication and key exchange protocols Proceedings of the th Annual ACM Symposium on the Theory of Computing\nS Blake Wilson and A Menezes Entity authentication and authenticated key transport protocols employing asymmetric techniques Proceedings of the th International Workshop on Security Protocols Lecture Notes in Computer Science\nS Blake Wilson and A Menezes Unknown key share attacks on the station to station STS protocol Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nD Bleichenbacher Generating ElGamal signatures without knowing the secret key Ad vances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nD Boneh R DeMillo and R Lipton On the importance of checking cryptographic protocols for faults Advances in Cryptology Eurocrypt Lecture Notes in Computer Science\nSpringer Verlag\nCerticom ECC Challenge November http www certicom com\nD Chaum J H Evertse and J van de Graaf An improved protocol for demonstrating pos session of discrete logarithms and some generalizations Advances in Cryptology Eurocrypt\nLecture Notes in Computer Science Springer Verlag\nT Dierks and B Anderson ECC Cipher Suites for TLS Internet Draft March Available at http www ietf org\nW Di e P van Oorschot and M Wiener Authentication and authenticated key exchanges Designs Codes and Cryptography\nH Dobbertin A Bosselaers and B Preneel RIPEMD A strengthened version of RIPEMD Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nT ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory\nA Escott J Sager A Selkirk and D Tsapakidis Attacking elliptic curve cryptosystems using the parallel Pollard rho method CryptoBytes The Technical Newsletter of RSA Laborato ries volume number Winter Also available at http www rsasecurity com\nG Frey How to disguise an elliptic curve Weil descent talk at ECC Slides available at http www cacr math uwaterloo ca\nG Frey and H R uck A remark concerning m divisibility and the discrete logarithm in the divisor class group of curves Mathematics of Computation\nS Galbraith and N Smart A cryptographic application of Weil descent Codes and Cryp tography Lecture Notes in Computer Science Springer Verlag\nR Gallant R Lambert and S Vanstone Improving the parallelized Pollard lambda search on binary anomalous curves to appear in Mathematics of Computation\nP Gaudry F Hess and N Smart Constructive and destructive facets of Weil descent on el liptic curves preprint January Available from http www hpl hp com techreports\nHPL html\nS Goldwasser S Micali and R Rivest A digital signature scheme secure against adaptive chosen message attacks SIAM Journal on Computing\nD Gordon Designing and detecting trapdoors for discrete log cryptosystems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nD Gordon Discrete logarithms in GF p using the number eld sieve SIAM Journal on Discrete Mathematics\nD Gordon A survey of fast exponentiation methods Journal of Algorithms\nT Hasegawa J Nakajima and M Matsui A practical implementation of elliptic curve cryp tosystems over GF p on a bit microcomputer Public Key Cryptography Proceedings of PKC Lecture Notes in Computer Science\nIEEE P Standard Speci cations for Public Key Cryptography ballot draft Drafts available at http grouper ieee org groups index html\nISO IEC Information Technology Security Techniques Entity Authentication Mech anisms Part Entity authentication Using a Public Key Algorithm rst edition\nISO IEC Information Technology Security Techniques Key Management Part\nMechanisms Using Asymmetric Techniques\nISO IEC Information Technology Security Techniques Digital Signatures with Appendix Part Certi cate Based Mechanisms\nISO IEC Information Technology Security Techniques Cryptographic Techniques Based on Elliptic Curves Committee Draft CD\nT Izu J Kogure M Noro and K Yokoyama E cient implementation of Schoof s algo rithm Advances in Cryptology Asiacrypt Lecture Notes in Computer Science\nSpringer Verlag\nM Jacobson N Koblitz J Silverman A Stein and E Teske Analysis of the xedni calculus attack Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nD Johnson Key validation Contribution to ANSI X F working group\nB Kaliski and Y Yin Storage e cient nite eld basis conversion Selected Areas in Cryp tography Lecture Notes in Computer Science Springer Verlag\nJ Kelsey B Schneier D Wagner and C Hall Cryptanalytic attacks on pseudorandom number generators Fast Software Encryption FSE Lecture Notes in Computer Science\nSpringer Verlag\nN Koblitz Elliptic curve cryptosystems Mathematics of Computation\nN Koblitz Constructing elliptic curve cryptosystems in characteristic Advances in Cryp tology Crypto Lecture Notes in Computer Science Springer Verlag\nN Koblitz CM curves with good cryptographic properties Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nN Koblitz A Course in Number Theory and Cryptography nd edition Springer Verlag\nP Kocher Timing attacks on implementations of Di e Hellman RSA DSS and other sys tems Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nP Kocher J Ja e and B Jun Di erential power analysis Advances in Cryptology Crypto\nLecture Notes in Computer Science Springer Verlag\nG Lay and H Zimmer Constructing elliptic curves with given group order over large nite\nelds Algorithmic Number Theory Lecture Notes in Computer Science Springer\nVerlag\nR Lercier Computing isogenies in F n in Henri Cohen editor Algorithmic Number Theory Proceedings Second Intern Symp ANTS II Lecture Notes in Computer Science Springer Verlag\nR Lercier Finding good random elliptic curves for cryptosystems de ned F n Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Lercier and F Morain Counting the number of points on elliptic curves over nite elds strategies and performances Advances in Cryptology Eurocrypt Lecture Notes in Com puter Science Springer Verlag\nR Lidl and H Niederreitter Introduction to Finite Fields and their Applications Cambridge University Press\nC Lim and P Lee A key recovery attack on discrete log based schemes using a prime order subgroup Advances in Cryptology Crypto Lecture Notes in Computer Science\nR McEliece Finite Fields for Computer Scientists and Engineers Kluwer Academic Publish ers Boston\nW Meier and O Sta elbach E cient multiplication on certain nonsupersingular elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nA Menezes Elliptic Curve Public Key Cryptosystems Kluwer Academic Publishers Boston\nA Menezes T Okamoto and S Vanstone Reducing elliptic curve logarithms to logarithms in a nite eld IEEE Transactions on Information Theory\nA Menezes P van Oorschot and S Vanstone Handbook of Applied Cryptography CRC Press\nV Miller Uses of elliptic curves in cryptography Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nF Morain Building cyclic elliptic curves modulo large primes Advances in Cryptology Eurocrypt Lecture Notes in Computer Science Springer Verlag\nR Mullin I Onyszchuk S Vanstone and R Wilson Optimal normal bases in GF pn Discrete Applied Mathematics\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nAvailable at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nDecember Available at http csrc nist gov fips\nNational Institute of Standards and Technology Digital Signature Standard FIPS Publication\nFebruary Available at http csrc nist gov fips\nNational Institute of Standards and Technology Secure Hash Standard SHS FIPS Publica tion April Available at http csrc nist gov fips\nNational Institute of Standards and Technology Entity Authentication using Public Key Cryp tography FIPS Publication Available at http csrc nist gov fips\nNational Institute of Standards and Technology Recommended Elliptic Curves for Federal Gov ernment Use May revised July Available at http csrc nist gov encryption\nNational Institute of Standards and Technology Advanced Encryption Standard work in progress Information available at http csrc nist gov encryption aes aes home htm\nNational Security Agency SKIPJACK and KEA algorithm speci cation Version May\nAlso available at http csrc nist gov encryption skipjack kea htm\nK Nyberg and R Rueppel A new signature scheme based on the DSA giving message recovery st ACM Conference on Computer and Communications Security\nK Nyberg and R Rueppel Message recovery for signature schemes based on the discrete logarithm problem Designs Codes and Cryptography\nP van Oorschot and M Wiener Parallel collision search with cryptanalytic applications Journal of Cryptology\nS Pohlig and M Hellman An improved algorithm for computing logarithms over GF p and its cryptographic signi cance IEEE Transactions on Information Theory\nD Pointcheval and J Stern Security proofs for signature schemes Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nJ Pollard Monte Carlo methods for index computation mod p Mathematics of Computa tion\nM Rabin Digitalized signatures and public key functions as intractable as factorization MIT LCS TR MIT Laboratory for Computer Science\nR Rivest A Shamir and L Adleman A method for obtaining digital signatures and public key cryptosystems Communications of the ACM\nR Rueppel A Lenstra M Smid K McCurley Y Desmedt A Odlyzko and P Landrock\nThe Eurocrypt controversial issue # Trapdoor primes and moduli Advances in Cryptology\nEurocrypt Lecture Notes in Computer Science Springer Verlag\nT Satoh and K Araki Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves Commentarii Mathematici Universitatis Sancti Pauli\nO Schirokauer Discrete logarithms and local units Philosophical Transactions of the Royal Society of London A\nC Schnorr E cient signature generation by smart cards Journal of Cryptology\nR Schoof Elliptic curves over nite elds and the computation of square roots mod p Mathematics of Computation\nR Schroeppel H Orman S O Malley and O Spatscheck Fast key exchange with elliptic curve systems Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nI Semaev Evaluation of discrete logarithms in a group of p torsion points of an elliptic curve in characteristic p Mathematics of Computation\nJ Silverman The xedni calculus and the elliptic curve discrete logarithm prob lem Designs Codes and Cryptography to appear Also available at http www cacr math uwaterloo ca\nJ Silverman and J Suzuki Elliptic curve discrete logarithms and the index calculus Ad vances in Cryptology Asiacrypt Lecture Notes in Computer Science Springer Verlag\nR Silverman and J Stapleton Contribution to ANSI X F working group\nN Smart The discrete logarithm problem on elliptic curves of trace one Journal of Cryp tology\nM Smid and D Branstad Response to Comments on the NIST Proposed Digital Signature Standard Advances in Cryptology Crypto Lecture Notes in Computer Science\nSpringer Verlag\nJ Solinas An improved algorithm for arithmetic on a family of elliptic curves Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nJ Solinas Generalized Mersenne numbers Technical report CORR Dept of C$O Uni versity of Waterloo Available from http www cacr math uwaterloo ca\nJ Solinas Improved algorithms for arithmetic on anomalous binary curves Tech nical report CORR Dept of C$O University of Waterloo Available from\nhttp www cacr math uwaterloo ca\nA Stein Equivalences between elliptic curves and real quadratic congruence function elds Journal de Th eorie des Nombres de Bordeaux\nA Stein V M uller and C Thiel Computing discrete logarithms in real quadratic congruence function elds of large genus Mathematics of Computation\nE Teske Speeding up Pollard s rho method for computing discrete logarithms in J P Buh ler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nS Vanstone Responses to NIST s Proposal Communications of the ACM July\ncommunicated by John Anderson\nS Vaudenay Hidden collisions on DSS Advances in Cryptology Crypto Lecture Notes in Computer Science Springer Verlag\nWAP WTLS Wireless Application Protocol Wireless Transport Layer Security Spec i cation Wireless Application Protocol Forum February Drafts available at http www wapforum org\nM Wiener and R Zuccherato Faster attacks on elliptic curve cryptosystems Selected Areas in Cryptography Lecture Notes in Computer Science Springer Verlag\nE De Win S Mister B Preneel and M Wiener On the performance of signature schemes based on elliptic curves in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag\nR Zuccherato The equivalence between elliptic curve and quadratic function eld discrete logarithms in characteristic in J P Buhler editor Algorithmic Number Theory Proceedings Third Intern Symp ANTS III Lecture Notes in Computer Science Springer Verlag", "Introduction\nDigital Signature Schemes\nBackground The Digital Signature Algorithm DSA\nFinite Fields\nThe Finite Field Fp The Finite Field F m\nPolynomial Basis Representations Normal Basis Representations\nElliptic Curves Over Finite Fields\nElliptic Curves Over Fp Elliptic Curves Over F m Basic Facts\nECDSA Domain Parameters\nDomain Parameters Generating an Elliptic Curve Veri ably at Random\nThe Case q p The Case q m\nDomain Parameter Generation Domain Parameter Validation\nECDSA Key Pairs\nKey Pair Generation Public Key Validation Proof of Possession of a Private Key\nECDSA Signature Generation and Veri cation\nSecurity Considerations\nThe Elliptic Curve Discrete Logarithm Problem\nKnown Attacks Experimental Results Hardware Attacks\nAttacks on the Hash Function Other Attacks\nImplementation Considerations\nInteroperability Considerations\nECDSA Standards NIST Recommended Curves\nRandom Elliptic Curves Over Fp Koblitz Elliptic Curves Over F m Random Elliptic Curves Over F m Converting Between Polynomial and Normal Basis Representations\nConclusions\nReferences\nIntroduction\nThe Digital Signature Algorithm DSA was speci ed in a U S Government Federal Information Processing Standard FIPS called the Digital Signature Standard DSS Its security is based on the computational intractability of the discrete logarithm problem DLP in prime order sub groups of Z p\nElliptic curve cryptosystems ECC were invented by Neal Koblitz and Victor Miller\nin They can be viewed as elliptic curve analogues of the older discrete logarithm DL cryptosystems in which the subgroup of Z p is replaced by the group of points on an elliptic curve over a nite eld The mathematical basis for the security of elliptic curve cryptosystems is the computational intractability of the elliptic curve discrete logarithm problem ECDLP\nSince the ECDLP appears to be signi cantly harder than the DLP the strength per key bit\nis substantially greater in elliptic curve systems than in conventional discrete logarithm systems Thus smaller parameters can be used in ECC than with DL systems but with equivalent levels of security The advantages that can be gained from smaller parameters include speed faster computa tions and smaller keys and certi cates These advantages are especially important in environments where processing power storage space bandwidth or power consumption is constrained\nThe Elliptic Curve Digital Signature Algorithm ECDSA is the elliptic curve analogue of the DSA ECDSA was rst proposed in by Scott Vanstone in response to NIST s National Institute of Standards and Technology request for public comments on their rst proposal for DSS It was accepted in as an ISO International Standards Organization standard ISO accepted in as an ANSI American National Standards Institute standard ANSI X and accepted in as an IEEE Institute of Electrical and Electronics Engineers standard IEEE P and a FIPS standard FIPS It is also under consideration for inclusion in some other ISO standards In this paper we describe the ANSI X ECDSA present rationale for some of the design decisions and discuss related security implementation and interoperability issues\nThe remainder of this paper is organized as follows In x we review digital signature schemes and the DSA A brief tutorial on nite elds and elliptic curves is provided in x and x respec tively In x methods for domain parameter generation and validation are considered while x discusses methods for key pair generation and public key validation The ECDSA signature and veri cation algorithms are presented in x The security of ECDSA is studied in x Finally some implementation and interoperability issues are considered in x and x\nDigital Signature Schemes\nBackground\nDigital signature schemes are designed to provide the digital counterpart to handwritten signatures\nand more A digital signature is a number dependent on some secret known only to the signer the signer s private key and additionally on the contents of the message being signed Signatures must be veri able if a dispute arises as to whether an entity signed a document an unbiased third party should be able to resolve the matter equitably without requiring access to the signer s\nprivate key Disputes may arise when a signer tries to repudiate a signature it did create or when a forger makes a fraudulent claim\nThis paper is concerned with asymmetric digital signatures schemes with appendix Asym\nmetric means that each entity selects a key pair consisting of a private key and a related public key The entity maintains the secrecy of the private key which it uses for signing messages and makes authentic copies of its public key available to other entities which use it to verify signatures\nAppendix means that a cryptographic hash function is used to create a message digest of the message and the signing transformation is applied to the message digest rather than to the message itself\nSecurity Ideally a digital signature scheme should be existentially unforgeable under chosen message attack This notion of security was introduced by Goldwasser Micali and Rivest Informally it asserts that an adversary who is able to obtain entity A s signatures for any messages of its choice is unable to successfully forge A s signature on a single other message\nApplications Digital signature schemes can be used to provide the following basic cryptographic services data integrity the assurance that data has not been altered by unauthorized or unknown means data origin authentication the assurance that the source of data is as claimed and non repudiation the assurance that an entity cannot deny previous actions or commitments Digital signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication e g FIPS ISO IEC and Blake Wilson and Menezes authenticated key transport e g Blake Wilson and Menezes ANSI X and ISO IEC and authenticated key agreement e g ISO IEC Di e van Oorschot and Wiener and Bellare Canetti and Krawczyk\nClassification The digital signature schemes in use today can be classi ed according to the hard underlying mathematical problem which provides the basis for their security\nInteger Factorization IF schemes which base their security on the intractability of the inte ger factorization problem Examples of these include the RSA and Rabin signature schemes\nDiscrete Logarithm DL schemes which base their security on the intractability of the or dinary discrete logarithm problem in a nite eld Examples of these include the ElGamal\nSchnorr DSA and Nyberg Rueppel signature schemes\nElliptic Curve EC schemes which base their security on the intractability of the elliptic curve discrete logarithm problem\nThe Digital Signature Algorithm DSA\nThe DSA was proposed in August by the U S National Institute of Standards and Technology\nNIST and was speci ed in a U S Government Federal Information Processing Standard FIPS\ncalled the Digital Signature Standard DSS The DSA can be viewed as a variant of the\nElGamal signature scheme Its security is based on the intractability of the discrete logarithm problem in prime order subgroups of Z p\nDSA Domain Parameter Generation Domain parameters are generated for each entity in a particular security domain See also the note below on secure generation of parameters\nSelect a bit prime q and a bit prime p with the property that q j p Select a generator g of the unique cyclic group of order q in Z p Select an element h Z p and compute g h p q mod p Repeat until g Domain parameters are p q and g\nDSA Key Pair Generation Each entity A in the domain with domain parameters p q g does the following\nSelect a random or pseudorandom integer x such that x q Compute y gx mod p\nA s public key is y A s private key is x\nDSA Signature Generation To sign a message m A does the following\nSelect a random or pseudorandom integer k k q Compute X gk mod p and r X mod q If r then go to step\nCompute k mod q\nCompute e SHA m Compute s k fe xrg mod q If s then go to step A s signature for the message m is r s\nDSA Signature Verification To verify A s signature r s on m B obtains authentic copies of A s domain parameters p q g and public key y and does the following\nVerify that r and s are integers in the interval q Compute e SHA m\nCompute w s mod q\nCompute u ew mod q and u rw mod q\nCompute X gu yu mod p and v X mod q\nAccept the signature if and only if v r\nSecurity Analysis Since r and s are each integers less than q DSA signatures are bits in size The security of the DSA relies on two distinct but related discrete logarithm problems One is the discrete logarithm problem in Z p where the number eld sieve algorithm see Gordon and Schirokauer applies this algorithm has a subexponential running time More precisely the expected running time of the algorithm is\nO exp c o lnp ln ln p\nwhere c and lnn denotes the natural logarithm function If p is a bit prime then the expression represents an infeasible amount of computation thus the DSA using a bit prime p is currently not vulnerable to this attack The second discrete logarithm problem works to the base g given p q g and y nd x such that y gx mod p For large p e g bits the best algorithm known for this problem is Pollard s rho method and takes aboutp\nq\nsteps If q then the expression represents an infeasible amount of computation thus the DSA is not vulnerable to this attack However note that there are two primary security parameters for DSA the size of p and the size of q Increasing one without a corresponding increase in the other will not result in an e ective increase in security Furthermore an advance in algorithms for either one of the two discrete logarithm problems could weaken DSA\nSecure Generation of Parameters In response to some criticisms received on the rst draft\nsee Rueppel et al and Smid and Branstad FIPS speci ed a method for generating primes p and q veri ably at random This feature prevents an entity e g a central authority generating domain parameters to be shared by a network of entities from intentionally constructing\nweak primes p and q for which the discrete logarithm problem is relatively easy For further discussion of this issue see Gordon FIPS also speci es two methods based on DES and SHA for pseudorandomly generating private keys x and per message secrets k FIPS mandates the use of these algorithms or any other FIPS approved security methods\nFinite Fields\nWe provide a brief introduction to nite elds For further information see Chapter of Koblitz\nor the books by McEliece and Lidl and Niederreitter\nA nite eld consists of a nite set of elements F together with two binary operations on F\ncalled addition and multiplication that satisfy certain arithmetic properties The order of a nite\neld is the number of elements in the eld There exists a nite eld of order q if and only if q is a prime power If q is a prime power then there is essentially only one nite eld of order q this\neld is denoted by Fq There are however many ways of representing the elements of Fq Some representations may lead to more e cient implementations of the eld arithmetic in hardware or in software\nIf q pm where p is a prime and m is a positive integer then p is called the characteristic of Fq and m is called the extension degree of Fq Most standards which specify the elliptic curve cryptographic techniques restrict the order of the underlying nite eld to be an odd prime q p or a power of q m In x we describe the elements and the operations of the nite eld Fp In x elements and the operations of the nite eld F m are described together with two methods for representing the eld elements polynomial basis representations and normal basis representations\nThe Finite Field Fp\nLet p be a prime number The nite eld Fp called a prime eld is comprised of the set of integers\nf p g\nwith the following arithmetic operations\nAddition If a b Fp then a b r where r is the remainder when a b is divided by p and r p This is known as addition modulo p\nMultiplication If a b Fp then a b s where s is the remainder when a b is divided by p and s p This is known as multiplication modulo p\nInversion If a is a non zero element in Fp the inverse of a modulo p denoted a is the unique integer c Fp for which a c\nExample The nite eld F The elements of F are f g Examples of the arith metic operations in F are\nThe Finite Field F m\nThe eld F m called a characteristic two nite eld or a binary nite eld can be viewed as a vector space of dimension m over the eld F which consists of the two elements and That is there exist m elements m in F m such that each element F m can be uniquely written in the form\na a am m where ai f g\nSuch a set f m g is called a basis of F m over F Given such a basis a eld element can be represented as the bit string a a am Addition of eld elements is performed by bitwise XOR ing the vector representations The multiplication rule depends on the basis selected\nThere are many di erent bases of F m over F Some bases lead to more e cient software or hardware implementations of the arithmetic in F m than other bases ANSI X permits two kinds of bases polynomial bases discussed in x and normal bases discussed in x\nPolynomial Basis Representations", "See Gordon [36] for a detailed survey of various methods for scalar multiplication."]} +{"12481723|3734874": ["[3], but only introduce point randomization and scalar blinding as an example(2)."]} +{"13605491|180217": ["It is supposed that RFID will play an important role for future ubiquitous society [1], as well as, in the Internet of Every Thing (IoE) era.", "Therefore, RFID related business experiences many significant advantages [1]."]} +{"13605491|1842882": ["Some of these protocols are appropriate for only one specific solution, other protocols are found to be incorrect and afterward corrected, and finally some proposals are insignificant and are later disregarded [5]."]} +{"189868916|206584087": ["In addition to all these properties, indifferentiality property is also taken into consideration [37, 38], to ensure there are no structural defects in F."]} +{"47574310|14077778": ["The density of a such signed expansion is 3/5 (see [7]), and the length of the expansion is half that of NAF.", "Various methods have been devised to this end [7]."]} +{"204915632|12817488": ["In addition, the exigencies on the available resources make it difficult to devise the security protocols for the WSNs that operate with optimum overhead.", "A detailed survey of data aggregation algorithm is presented in [3].", "Most of these applications being ubiquitous in nature necessitate that the appropriate mechanisms to ensure the data security and privacy are in place in the protocols in WSNs.", "Wireless Sensor Networks (WSNs) consist of hundreds or thousands of tiny sensing devices with restricted memory, computational and communication resources [1].", "Hence, novel approaches are used in operational paradigms followed in WSNs \u2013 one of them is using data aggregation of the incoming packets to a sensor node, that aims at reducing the communications cost in the WSNs [3].", "In this research exercise, we attempt to explore further the feasibility of the PKC schemes using privacy homomorphism in WSNs.", "The potential applications of the WSNs typically range from those in defense, military, environmental monitoring, health monitoring, home appliances, civilian societal surveillance applications etc. [1]."]} +{"204915632|1230643": ["Wireless Sensor Networks (WSNs) consist of hundreds or thousands of tiny sensing devices with restricted memory, computational and communication resources [1].", "The potential applications of the WSNs typically range from those in defense, military, environmental monitoring, health monitoring, home appliances, civilian societal surveillance applications etc. [1].", "The algorithms that use homomorphic encryption can be as usually classified in to those based on either symmetric key based algorithms (as in [1], [5]) or asymmetric key based algorithms (as in [6])."]} +{"13500206|17008289": []} +{"27673498|1940388": ["Currently, the security is mostly provided via symmetric encryption due to the speed computation of its operations [2]."]} +{"61184669|17205659": []} +{"61184669|205286988": []} +{"61184669|1230643": []} +{"18047703|14077778": ["Besides, there exist some other technologies, such as sliding window algorithm [9], window NAF algorithm [10], etc., summarized in [9]."]} +{"5100382|9743176": []} +{"9711783|3734874": ["Normally, according to whether the methods used for side-channel information collection will induce and exploit abnormal behavior in the target device or not, the diversity of SCAs can be grouped into two main categories: invasive SCAs and noninvasive SCAs [9]."]} +{"9711783|385243": ["The injection precision of time and location has significant impact on the success rate of FAs [11], and so far, no sophisticated technique directing against public-key cryptographies has been found in literature.", "However, the side-channel leakages still have potential statistical relation with the real-time operating data, based on which an adversary may reveal the secret key by using statistical techniques [11].", "As mentioned before, high-order SCA attacks and FAs are relatively much more difficult to be carried out on ECC, thus this countermeasure makes ECC secure enough against most adversaries."]} +{"18140452|14077778": ["There are many algorithms used for computing elliptic curve point multiplication [19]."]} +{"17973774|3734874": ["The Montgomery Ladder [22, 27, 13] aims to protect from SPA/SEMA attacks.", "An overview on known side-channel attacks on the scalar multiplication and countermeasures can be found in [13, 22].", "Our choice of countermeasures is based on previous state-of-the-art surveys [13, 22] and practical considerations for sensor nodes.", "According to [13] none of them is e\ufb00ective against all known attacks.", "Theoretically, this countermeasure is considered to be highly e\ufb03cient against a broad range of passive and active attacks except for RPA/ZPA [13, 18] ( X, Y, Z ) \u2190 ( \u03bbX, \u03bbY, \u03bbZ ); 5: If d i = 1 then Q \u2190 Q + P ; 7: end for 8: Return Q ; Algorithm 6 is combined with the Double-And-Add al-gorithm of\u2026", "This countermeasure carries out the add operation in each iteration of the Double-And-Add Algorithm in Algorithm 1 in order to make SPA/SEMA attacks more di\ufb03cult [22, 27, 13, 10, 12].", "For side channel countermeasures [13] lists the counter-measures Indistinguishable Point Addition Formulae, Double-And-Add Always, Montgomery Ladder, Randomized Scalar Splitting, Scalar Randomization, Base Point Blinding, Randomized Projective Coordinates, Randomized EC/Field Iso-morphisms.", "A valuable state-of-the-art overview on known attacks and countermeasures is given in [13]."]} +{"3512918|5002530": ["Shakhov et al. [2013] investigate survivability of EH-WSNs nodes under \ufb02ooding-based attacks and discuss counteracting methods against them.", "Security protocols in WSNs make no exception to such a design strategy: they should retain effectiveness while using as little energy as possible.", "We run simulations using GreenCastalia [Benedetti et al. 2013], an open-source extension of the Castalia simulator [Boulis 2007] that we develop for accurate modeling of energy-harvesting WSNs.", "Indeed, despite the extremely rich literature on solutions speci\ufb01cally tailored to WSNs [Ren et al. 2011; Zhou et al. 2008], to date only a handful of works have focused on the possibility offered by energy harvesting to support and improve security schemes.", "Lim and Huie [2015] propose a countermeasure to selective forwarding attack in energy-harvesting WSNs.", "Bianchi et al. [2013] propose a solution for data access control in EH-WSNs deployed for health care and assisted living applications, which combines smart caching and energy intake prediction to make computationally heavy asymmetric cryptography schemes feasible in real WSNs with energy harvesting.", "Through both simulations and real-life experimentations, we perform a thorough assessment of the performance of I-BPV in energy-harvesting WSNs.", "Energy prediction models, such as Cammarano et al. [2016], Recas Piorno et al. [2009], Cammarano et al. [2013], and Kansal et al. [2007], are widely used in energy-harvesting WSNs as a building block of harvesting-aware solutions.", "One of the key enablers to realize the vision of the Internet of Things is Wireless Sensor Networks (WSNs) [Alcaraz et al. 2010; Christin et al. 2009].", "For this reason, solutions speci\ufb01cally tailored to WSNs have been proposed to avoid intensive use of ECDSA [Liu et al. 2012].", "Due to their low cost and pervasive capability, WSNs have gained increasing popularity in the last decade, as they allow for accurate real-time information in a multitude of application scenarios that conventional cabled or wireless networks are unable to handle."]} +{"20936517|2535224": ["which significantly simplifies the routing and connectivity aspects between mobile nodes (both classical [31], [32] and virtualized [33])."]} +{"30269001|96441": []} +{"41343757|14077778": [", [5] or [8]."]} +{"62009646|17683338": ["We implement our scheme on Micaz and TinyOS, and the experimental results show that the new scheme can be used more efficiently in the wireless sensor nodes.", "04, TinyOS 2.1.2, JDK 1.6, using Crossbow's Micaz node to establish a Wireless Sensor Network test environment.", "The improved algorithm can be implemented not only by calling the relevant components and interfaces in TinyOS, but also by utilizing TinyECC.", "78 Copyright \u24d2 2016 SERSC\nIn TinyOS [13], component Main is the entry of all programs.", "What is more, component ECDSA is the core of the program, whose main tasks include: (1) call component Timer to achieve the trigger time, (2) call component Leds to trigger indicator leds, (3) call component GenericComm provided by TinyOS to implement data transmition, (4) call component Random to generate random numbers, (5) call component ECC and component NN for basic computing and rounded operations on elliptic curves.", "In TinyOS [13], component Main is the entry of all programs."]} +{"13035027|9554464": ["[15] classified secure data aggregation schemes into hopby-hop encrypted data aggregation and end-to-end encrypted data aggregation."]} +{"13035027|1230643": ["Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring [1], [2], [17]."]} +{"16091346|14077778": ["The reader is referred to [30,42,33] for details about precomputation and fixed point scalar multiplication.", "A survey about methods for the scalar multiplication can be found in [30]."]} +{"15376134|14077778": ["Left-to-right methods are often used as they lead to many different generalizations, including windowing methods [8].", "Further generalizations of the left-to-right binary method to higher bases, including sliding-window methods, are comprehensively surveyed in [8]."]} +{"9701493|3734874": ["This work can be seen as an alternative point of view and a complement of [21,22] rather than a replacement.", "It is an update of the synthesis given in [21,22]."]} +{"9701493|96441": ["This work can be seen as an alternative point of view and a complement of [21,22] rather than a replacement.", "It is an update of the synthesis given in [21,22]."]} +{"3712332|3734874": ["In [8] Fan et al."]} +{"6683709|96441": ["\u2026multiplication primitive; however, some of them are not applicable to effectively break ECDSA, as they require the repeated execution of the same scalar-point multiplication without changing the value of the scalar, which in turn never happens in standard ECDSA [Fan and Verbauwhede 2012].", "\u2026algorithm variant without the y-coordinate plays also as an effective countermeasure against the so-called sign change attacks [Bl\u00a8omer et al. 2006; Fan and Verbauwhede 2012] aimed at \ufb02ipping the sign of the y-coordinate of an elliptic curve point during the computation of [ k ]G (Algorithm 1,\u2026", "\u2026multiplication, together with checking at each of its iterations that the ladder invariant holds true, also provides protection against the attacks involving the need for a repetition in the value of k [Fan and Verbauwhede 2012], thus protecting also the deterministic version of the ECDSA."]} diff --git a/edge/graph_67855814.jsonl b/edge/graph_67855814.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4db81adbe3ec766922db138948fe19f50cf64fca --- /dev/null +++ b/edge/graph_67855814.jsonl @@ -0,0 +1,9 @@ +{"49688092|18526204": []} +{"49688092|16475344": []} +{"36926794|1805048": []} +{"115525774|3273340": []} +{"115525774|5385031": ["5G technology and mobile smart devices have improved the mobile Internet in acquiring mobile crowd-sensing and transportation (Luong et al., 2016)."]} +{"115525774|18388986": ["4 Data fusion Data Fusion is the process of integrating multiple data sources to produce more consistent, accurate and useful information than that provided by any individual data source (Castanedo 2013).", "Data Fusion is the process of integrating multiple data sources to produce more consistent, accurate, and useful information than that provided by any individual data source (Castanedo 2013).", "\u2026text formats into the numerical formats; As data is collected from multiple data sources, data fusion is applied to produce more consistent data format (Castanedo, 2013); Data visualization is used to present large datasets in order to quickly recognize errors and outliers in datasets (Ware, 2012)."]} +{"16320392|2082499": ["Another related problem is record linkage [34], [35], [36], [37], [38], [39], [40], [41] (also called duplicate detection, entity matching, and reference reconciliation) in the database community."]} +{"16320392|8310135": []} +{"16320392|386036": []} diff --git a/edge/graph_67855913.jsonl b/edge/graph_67855913.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7688715969fa60b870b5be79f587b3b366ccb583 --- /dev/null +++ b/edge/graph_67855913.jsonl @@ -0,0 +1,4 @@ +{"53085960|1896632": ["It is being applied in a range of systems from enterprises to embedded systems to robotics, IoTs and cyber-physical systems [22\u2013 24], thus allowing the heterogeneous integration of many sub-systems to achieve speci\ufb01ed global missions of a much larger system."]} +{"17915277|8589228": []} +{"7565428|8397295": ["Various suggestions for incorporating time into these formalisms have been investigated (see [19] for an overview)."]} +{"5667900|627405": ["UML extensions [12], especially component and class diagrams ((iv) UML specification), are widely adopted by ACSE approaches.", "Although UML has restricted architectural analysis support, its wide adoption is based on its support for different domains and business contexts [12] and its standardization.", "Stage of Evolution Analysis and Design [1,4,6,8,9,13-16,18-20,22,25,26,27,29,30,3336,38,39,42,43,45,47,48,52,57,58]", "Design and maintenance stages were the two stages in which evolution mechanisms were active.", "58 7 xAcme [30,36] 2 UML [1,5,17-21,26,30,31,33, 48,51,53,56,60] 16 31 31 38 Extended UML [2,4,6,7,9,11,25,28,35,39,43] 11 27 55 18 AO-ADL [18] 1 Darwin [37,56] 2 SafArchie [39,54] 2 Aesop, SADL, Koala, xADL, ADML, AO-ADL, UniCon, Weaves, Wright, C2, Rapide, MetaH, AADL 0", "SELECTED PRIMARY STUDIES\nId Study Title, Corresponding Author Year A S1 XSLT-based evolutions and analyses of design patterns, Dong et al. 2009 17 S2 Behavior-preserving refinement relations between dynamic software architectures, Heckel et al. 2005 18 S3 Combining formal methods and aspects for specifying and enforcing architectural invariants, Kallel et al. 2007 18 S4 Evaluating pattern conformance of UML models a divide-and-conquer approach and case studies, Kim et al. 2008 16 S5 Formal analysis of architectural patterns, Caporuscio et al. 2004 20 S6 Modeling and enforcing invariants of dynamic software architectures, Kallel et al. 2010 19 S7 Style-based modeling and refinement of service-oriented architectures, Baresi et al. 2006 16 S8 A case study in re-engineering to enforce architectural control flow and data sharing, Abi-Antoun et al. 2007 16 S9 A catalog of architectural primitives for modeling architectural patterns, Zdun et al. 2008 17 S10 Automated adaptations to dynamic software architectures by using autonomous agents, Wenpin et al. 2004 17 S11 A family of languages for architecture constraint specification, Tibermacine et al. 2010 20 S12 Architecture compliance checking at run-time, Ganesan et al. 2008 17 S13 A type-centric framework for specifying heterogeneous, large-scale, component-oriented, architectures, Jung et al. 2010 12 S14 Analyzing architectural styles, Kim et al. 2010 12 S15 Changing attitudes towards the generation of architectural models, Castro et al. 2011 12 S16 Classifying architectural constraints as a basis for software quality assessment, Giesecke et al. 2007 4 S17 A rule-based method to match software patterns against UML models, Ballis et al. 2007 17 S18 Deriving detailed design models from an aspect-oriented ADL using MDD, Pinto et al. 2011 12 S19 Formal specification of the variants and behavioral features of design patterns, Bayley et al. 2010 12 S20 Model-driven development for early aspects, S\u00e1nchez et al. 2010 14 S21 Pattern-based design evolution using graph transformation, Zhao et al. 2007 16 S22 PS-CoM building correct by design Publish Subscribe architectural styles with safe reconfiguration, Loulou e al.", "83 16 31 50 19 Refactoring [8,41,51] 3 Refinement [2,7,13,22,29,31,43,51,58] 9 Restructuring [8,13,50,53] 4 Adaptation [4,6,10,44,46,56] 6 Reconfiguration [2,3,4,5,6,7,22,24,28,31,32,37,54,59,60] 15 40 47 13 Pattern-based [1,9,17,21,26,34,35,41,42,45,48,49,52] 13 23 46 31 Arch.", "55 4 State [2,5] 2 Sequence [5,7,18,19,20,51] 6 Class [1,4,7,8,9,11,17,19,21,25,26,31,33,35,39,48,51,52,60] 19 26 53 21 Component [2,6,7,8,18,20,28,30,35,43,46,50,51,53,54,57,60] 17 41 35 24 Object [2] 1 Communication [31,33] 2 Transition [2,3] 2", "2010 14 S23 Understanding the relevance of micro-structures for design patterns detection, Arcelli et al. 2011 9 S24 Using aspects for enforcing formal architectural invariants, Kallel et al. 2008 14 S25 Evolution styles to the rescue of architectural evolution knowledge, Le Goaer et al. 2008 16 S26 A model transformation approach for design pattern evolutions, Dong et al. 2006 13 S27 A scalable approach to multi-style architectural modeling and verification, Wong et al. 2008 10 S28 A UML rule-based approach for describing and checking dynamic software architectures, Miladi et al. 2008 14 S29 Correct architecture refinement, Moriconi et al. 1995 12 S30 Preserving Architectural Choices throughout the Component-based Software Development Process, Tibermacine et al. 2005 15 S31 Style-based refinement of dynamic software architectures, Baresi et al. 2004 17 S32 A survey of self-management in dynamic software architecture specifications, Bradbury et al. 2004 20 S33 A contract place where architectural design and code meet together, Ubayashi et al. 2010 14 S34 Design pattern solutions as explicit entities in component-based software development, Stepan et al. 2011 11 S35 Modeling architectural patterns using architectural primitives, Zdun et al. 2005 15 S36 Simplifying transformation of software architecture constraints, Tibermacine et al. 2006 14 S37 A constraint architectural description approach to self-organizing component-based software systems, Waewsawangwong et al. 2004 16 S38 A constraint-oriented approach to software architecture design, Van den Berg et al. 2009 8 S39 A framework to specify incremental software architecture transformations, Barais et al. 2005 17 S40 An approach based on biographical reactive systems to check architectural instance conforming to its style, Chang et al. 2007 16 S41 An automated refactoring approach to design pattern-based program transformations in Java programs, Jeon et al. 2002 14 S42 Analyzing and comparing architectural styles, Levy et al. 1999 14 S43 Architecting as Decision Making with Patterns and Primitives, Zdun et al. 2008 17 S44 Architecture-based runtime software evolution, Oreizy et al. 1998 12 S45 Capturing interactions in architectural patterns, Yadav et al. 2010 14 S46 Describing evolving dependable systems using co-operative software architectures, de Lemos et al. 2001 18 S47 Describing software architecture styles using graph grammars, Le Metayer et al. 1998 15 S48 Design pattern evolution and verification using graph transformation, Zhao et al. 2007 18 S49 Evaluation of accuracy in design pattern occurrence detection, Pettersson et al. 2010 12 S50 Evolution styles foundations and tool support for software architecture evolution, Garlan et al. 2006 17 S51 Focus: a light-weight, incremental approach to software architecture recovery and evolution, Ding et al. 2001 14 S52 Formal specification of design patterns and their instances, Taibi et al. 2006 14 S53 Guiding architectural restructuring through architectural styles, Tamzalit et al. 2010 17 S54 Safe integration of new concerns in a software architecture, Barais et al. 2006 16 S55 Scenario-based architectural design decisions documentation and evolution, Che et al. 2011 13 S56 Self-managed systems an architectural challenge, Kramer et al. 2007 13 S57 Style-based reuse for software architectures, Monroe et al. 1996 11 S58 Synthesizing approach for perspective based architecture design, Liang et al. 2003 10 S59 Towards a formal model for reconfigurable software architectures by bi-graphs, Chang et al. 2008 15 S60 Using UML2.", "Level of Formalism Lightweight [1,8,9,12,13,15,18,20,23,25,26,33-35,36,38,55] 88 17 8 46 46 Formal [2-7,10,11,14,17,19,21,22,24,27-32,37,39-43,45-48,50,52-54,59,60] 36 38 42 20", "A Framework for Classifying and Comparing Architecture-Centric Software Evolution Research\nPooyan Jamshidi 1, Mohammad Ghafari 2, Aakash Ahmad 1, Claus Pahl 1 1 Lero -", "We adopted and tailored an integrated approach [11, 26] to extract a coded schema by which we can systematically review state-of-the-art of ACSE.", "In contrast to a non-structured review process, a systematic review [26, 3] reduces bias and follows a precise and rigorous sequence of methodological steps.", "83 13 38 39 23 Petri-net [3,12,24] 3 Model-based [1,2,4,5,6,7,9,11,13,15,18,19,20,26,28,35,55,56,60] 19 21 32 47 Description logic [29,32,41,52] 4 \u03c0-calculus [10,45] 2 Prog.", "Time of Evolution Design-Time [1,2,4,7,9,11,13,14,15,17,18-23,25-30,33-36,39,41-43,45-55,57,58] 95 43 27 35 37 Run-Time [2,3,5-10,12,24,31,32,37,40,44,54,56,59,60] 19 42 53 5", "Description Aspect Structural [1-4,6-15,17,19-22,24-30,32-34,36,37,39-57,59,60] 93 52 28 42 30 Behavioral [2,3,5,7,9,10,12,19,20,22,24,27,29,31-35,39-42,44-46,49-57] 34 41 32 27 Semantic [43,58] 2 SubCriteria Attributes Approaches P% N Distribution %"]} diff --git a/edge/graph_67856002.jsonl b/edge/graph_67856002.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7525a844c4c75a49191bbb6744ed387c1d234ab1 --- /dev/null +++ b/edge/graph_67856002.jsonl @@ -0,0 +1 @@ +{"2227285|6128186": []} diff --git a/edge/graph_67856151.jsonl b/edge/graph_67856151.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7315a0e2c46dbdb9692b4a784c5615f7dc39830b --- /dev/null +++ b/edge/graph_67856151.jsonl @@ -0,0 +1,57 @@ +{"206925480|11735843": ["The above problem can be overcome by making WSNs programmable and thus, there has been significant research effort devoted to design programmable WSNs [9]\u2013[11]."]} +{"15659301|2387055": []} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"25387336|2387055": []} +{"3552149|18392886": ["to adapt it to large-scale networks with different ASes such as the Internet [79].", "This classification has been recently adopted by [79].", "Moreover, Espresso achieves higher availability (reliability) when compared to existing router-centric Internet protocols.", "Digital Object Identifier 10.1109/COMST.2017.2782482\nthe recent emergence of the Internet of Things (IoT) has allowed for the creation of new advanced services with more stringent communication requirements in order to support its innovative use cases.", "Another different class of solutions has been recently introduced by DISCO which promoted a logically distributed control plane based on existing ASs within the Internet.", "The main advantage of the DISCO solution is the possibility to adapt it to large-scale networks with different ASes such as the Internet [79].", "However, that main feature of logically-centralized control which has been leveraged by most SDN solutions to improve\nnetwork management at the intra-domain level, cannot be fully exploited for controlling heterogeneous networks involving multiple Autonomous Systems (ASes) under different administrative authorities (e.g., the Internet).", "Considered as a large-scale SDN deployment for the public Internet, Espresso, which has been in production for more than two years, routes over 22% of Google\u2019s total\ntraffic to the Internet.", "I. INTRODUCTION\nTHE UNPRECEDENTED growth in demands and datatraffic, the emergence of network virtualization along with the ever-expanding use of mobile equipment in the modern network environment have highlighted major problems that are basically inherent to the Internet\u2019s conventional architecture.", "Finally, another important feature of Espresso is that it provides full interoperability with the rest of the Internet and the traditional heterogeneous peers.", "2) SDX-Based Controllers: Different from DISCO which proposes per-domain SDN controllers with inter-domain functions for allowing autonomous end-to-end flow management across SDN domains, recent trends have considered deploying SDN at Internet eXchange Points (IXPs) thus, giving rise to the concept of Software-Defined eXchanges (SDXes).", "In the same spirit, INRIA\u2019s D-SDN [92] enables a logical distribution of the SDN control plane based on a hierarchy of Main Controllers and Secondary Controllers, matching the organizational and administrative structure of current and future Internet."]} +{"3552149|11414835": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-", "In the case of an underlying physical SDN network, this could be implemented using an SDN network hypervisor that creates multiple logically-isolated virtual network slices (called vSDNs), each is managed by its own vSDN controller [14]."]} +{"3552149|2623404": ["In particular, surveys published in IEEE CST over the last few years elaborated on various topics within the SDN scope such as the concept, benefits and historical roots [9, 10], the architecture elements and", "the design challenges [9, 10, 11, 12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management challenge in SDN [16] and the application of SDN in wireless networks [17]."]} +{"3552149|4269723": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-"]} +{"3494096|3474164": []} +{"3494096|24110634": []} +{"3494096|4427557": []} +{"3494096|2871699": ["M2M communications have been extensively reviewed in the literature [1], [31]\u2013[36].", "Pereira and Aguiar [31] discussed on European Telecommunication Standard Institute (ETSI) standard and application protocols while considering mobile devices such as smartphones to be used as mobile gateways for other connected devices with constrained capabilities and the process of aggregating data from embedded sensors in M2M network architecture."]} +{"3494096|2521001": ["Smart homes are expected to communicate regularly with their environments (internal and external) [17]."]} +{"3494096|121289": []} +{"12511357|1520906": []} +{"12511357|1421946": []} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} +{"4522173|6583734": ["Its core idea is to separate the forwarding and control planes of a network system [14], [15], so that network operators can program packet forwarding behavior to significantly improve the innovation capability of network applications."]} +{"9495329|6583734": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|801245": ["Another recent relevant survey is given in [8], but it is very focused on virtualization for WSNs, and it does not cover more holistic IoT architectures, more complex deployment scenarios and applications, or the way that SDN can be exploited to realize them."]} +{"9495329|2535224": ["Two more relevant surveys can be found in [9] and [10], which study the combination of SDN and virtualization in wireless and mobile networks, but they do not target IoT applications."]} +{"9495329|2623404": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"9495329|10693567": ["In [4] and [5] one can find surveys on SDN, its innovative features, and how it can be used to facilitate future networks, while in [6] the historical path towards programmable networks is examined."]} +{"3330146|2623404": ["The so-called north-bound interactions between applications/service and controller have received much less attention and are not standardized [10]."]} +{"35638190|2623404": []} +{"40892470|485843": ["On large scale, applications such as smart power-grids [1\u20133], smart city management [4], home and building automation [5, 6], wireless sensor networks [7, 8], and the newly proposed concept of Industry-4."]} +{"30654518|18392886": []} +{"30654518|15035771": ["Furthermore, trade-offs concerning some concepts such as perormance, resiliency, availability, reliability and flexibility have to e taken into account by network designers and managers while esigning a network architecture [29] ."]} +{"8871801|2387055": []} +{"17697642|1113420": ["Buildings are developed to be more power efficient, consisting of context-aware [4] smart devices."]} +{"24907835|9495329": []} +{"24907835|2387055": ["That provokes cyber attackers to find better solutions to attack the public network, such as the infrastructure layer DDoS attack [14], controller-switch communication flooding and switch flow table flooding attacks [15]."]} +{"2924626|10559330": ["Many approaches to achieve some of these goals have been previously proposed including active networking [45], IntServ networking [7], and distributed reservation protocols such as RSVP [8] and NSIS [33]."]} +{"29408945|6583734": []} +{"801245|17336376": []} +{"801245|1230643": []} +{"801245|12060835": []} +{"31582685|2623404": ["SDN technologies facilitate building network services [16] [17]."]} +{"32127405|6583734": ["NFV can serve SDN by virtualizing the SDN controller to be rendered in the cloud thus allowing dynamic migration of the controllers to the optimal locations while SDN can serve NFV by providing programmable network connectivity between NFVs to achieve optimized traffic engineering [8]."]} +{"6415983|3055684": []} +{"6415983|12029139": []} +{"27999524|6583734": ["software virtualization technology [22], [23]."]} +{"27999524|44461432": []} +{"27999524|10693567": ["Therefore, the technology standardization for IIoT is a very complex task, the main problems of which include [28]: a) coordination between the various standardization organizations is not sufficient, and there are different versions of standards, which are incompatible with each other; b) the progress of standardization is insufficient to keep up with market changes and the requirements of industry; and c) no unified standardization can be accepted widely, especially accepted and practiced by small and medium-sized enterprises."]} +{"27442330|10693567": ["SDN-based approaches, while very successful in wired network environments [26] [27], have received a limited attention for IoT/M2M applications."]} +{"27442330|3330461": ["Despite D2D communications representing an interesting opportunity to mitigate the risks of encountering performance bottlenecks at the evolved NodeB (eNB) base stations [7] [8], the projected large volume of generated data will still put a significant burden on the network."]} +{"27442330|7644489": ["Despite D2D communications representing an interesting opportunity to mitigate the risks of encountering performance bottlenecks at the evolved NodeB (eNB) base stations [7] [8], the projected large volume of generated data will still put a significant burden on the network."]} +{"27442330|2003896": ["In particular, networks will have to accommodate larger quantities of data as they pave the way to mobile crowdsensing [9] and even anticipatory mobile computing [10] scenarios."]} +{"3856970|34643772": ["Software Defined Networking (SDN) [7][8][9] is a set of innovative technologies applied to enable centralized control of network resources, better programmability and orchestration of these resources as well as virtualization of these resources by dissociating them from the physical elements of the network.", "The main characteristics of this networking paradigm are its ability to separate between control planes and users and its logicallycentralized control plane [7].", "The goal of using SDN is to offer network flexibility and programmability to simplify its management [7].", "Thus, Software Defined Networking (SDN) [7][8][9] is considered crucial as it enables the network architecture continuous improvement."]} +{"3856970|39936276": ["The forwarding strategy component, as one of the most elegant features of NDN, has a significant impact on the overall performance of NDN networks [21][22]."]} +{"3856970|10693567": ["OpenFlow allows the execution of control plane operations in an OpenFlow controller.", "The SDN switch and the SDN controller communicate via the OpenFlow protocol which defines messages, such as sending, receiving and changing packets or changing the routing.", "In [17], OpenFlow is extended by adding new specific operations (related to content, routing and securityrelated operations) to allow ICN nodes to interact with controllers.", "Our tests were conducted using NS-3 [25], ndnSIM [25] and OpenFlow [26].", "Subsequently, the OpenFlow controller sends the appropriate routing rule for this stream to the OpenFlow switch.", "Besides, OpenFlow governs the exchange of information between the controller and the switches.", "It consists of a flow table containing information about processing a packet and a secure channel connecting the switch to the command via an SSL / TLS and OpenFlow connection [14].", "The communication between the switches and the controller was carried out through the openFlow [14] protocol.", "- Nguyen et al. [18] suggested an architecture where an abstraction layer is used between CCN nodes and OpenFlow switches to retrieve the name of the content from a CCN packet, delete that name and encapsulate it in an IP datagram.", "OpenFlow [14] is a communication protocol between the controller and the switch in an SDN network (figure 1).", "The controller communicates with switch nodes by using OpenFlow [14] protocol.", "When an OpenFlow switch receives a new packet that it has not seen before and for which it has no stream entry, it sends it to the controller."]} +{"3856970|4269723": ["Software Defined Networking (SDN) [7][8][9] is a set of innovative technologies applied to enable centralized control of network resources, better programmability and orchestration of these resources as well as virtualization of these resources by dissociating them from the physical elements of the network.", "Thus, Software Defined Networking (SDN) [7][8][9] is considered crucial as it enables the network architecture continuous improvement."]} +{"22582078|9495329": ["However, an interesting argument of the works covered in [213] is that IoT urban deployments should allow for the same set of sensor nodes to support multiple applications from multiple developers across the same shared physical infrastructure via software only.", "Moreover, substantial research on interconnecting Wireless Sensor Networks (WSNs) into wider IoT frameworks by leveraging SDN and virtualization has already been completed [213], [218].", "We mention this work to provide another aspect of emerging technologies with regard to SDN-IoT infrastructure, and refer the reader to [213], [221], for a more complete overview.", "As a result, anywhere from 20 billion to 50 billion devices are projected to connect to the Internet by 2020 [213], and many network operators are also trying to adapt their networks for what is now being dubbed the Internet of Things (IoT).", "However, work to optimize \ufb02ow scheduling for the backbone network is still not fully developed [213].", "\u2026of application requirements as they relate to QoS and geographical sensor location, inner sensor node con\ufb01gurations, sharing of sensors amongst competing applications, transmitting optimized and QoS-aware data \ufb02ows towards end-servers, and ef\ufb01cient distribution of data for cloud processing [213].", "Additionally, fully centralized SDN controller architectures do not adequately address the different access networks expected to comprise the urban-scale IoT mobile multi-networks, such as LTE, WiFi, or ZigBee [213].", "For instance, the concept of Information-Centric Network (ICN) is combined with virtualization in [213] and [226] to provide network slicing and node caching within a wireless network.", "While we provide a brief description below, we refer the reader to [213] and [221] for further details.", "For instance, a natural application to address the heterogeneous QoS requirements of IoT is to include network slicing [213]."]} +{"22582078|6583734": ["A greater variety of network functions considered for NFV can be found in [2] and [114]."]} +{"22582078|2623404": ["Network operators are also challenged to address new routing protocols aimed at improving efficiency of content delivery and content availability for their clients [2], [58].", "One such architecture is Information-Centric Networking (ICN) or Content-Centric Networking (CCN) where packets are routed based on desired content instead of traditional, location-based, addressing [58]."]} diff --git a/edge/graph_67856258.jsonl b/edge/graph_67856258.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4efcc658baa0686564a2af142e14b5d343272cad --- /dev/null +++ b/edge/graph_67856258.jsonl @@ -0,0 +1,27 @@ +{"26193763|27262729": ["This process can be referred as the speed game among the miners with different computing capacities [3], [4]."]} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"67870253|13688847": ["Private blockchain networks are only accessed by a specific, limited organization and cannot be widely adopted in diverse trading activities [1].", "Recruiting more verifiers can avoid centralized block verification and decrease impacts of compromised verifiers leading to more reliable and secure blockchain network [1], [5].", ", proof-of-stake) among a set of pre-selected miners to maintain the distributed ledger, in which the efficient consensus management is achieved [1], [3].", "Blockchain provides immutable ledgers and decentralized platforms for various practical scenarios [1]."]} +{"206456796|27262729": ["This consensus mechanism guarantees the security and dependability of blockchain systems [4], [5].", "The core point to guarantee transaction integrity and validity in blockchain is a computational process defined as mining [4], [5]."]} +{"49343495|34643772": []} +{"13746346|27262729": ["Since permissionless blockchain networks admit no identity con-trol, they can be vulnerable to a series of insider attacks by malicious consensus nodes [6].", "Among different types of attacks, double spending [7] is the most fundamental one and can be executed through various attacks such as gold\ufb01nger attacks, netsplit attacks and brute-force attacks [6]."]} +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"86722298|49574823": ["Some variants [18], such as Delegated PoS (DPoS), Transactions as PoS (TaPoS), PoS-Velocity (PoSV), Delegated Byzantine Fault Tolerance (DBFT) and Bitcoin-NG, select some ones to generate and validate blocks to improve the scalability, throughput and latency."]} +{"86722298|27262729": ["2) Security and Privacy: Despite the original security and privacy issues of blockchain [96], outsourcing services at the edges in the integrated system of blockchain and edge computing presents new security and privacy challenges."]} +{"86722298|206578365": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "With these short propagation distances, edge computing has the potential of realizing tactile-level latency for many latency critical applications that may require tactile speed with latency approaching 1ms [29]."]} +{"86722298|9495329": ["The virtual resources of network virtualization share many common elements in notions and interchangeably terms with SDN [53]."]} +{"86722298|3818445": ["A set of issues, challenges, and future research directions for edge computing are discussed in [5] and [29], for instance, the adaption to the dynamic environments and the large-scale optimization for the collaboration of multiple edge servers.", "Nonetheless, its security and privacy are signi\ufb01cant challenges, due to the interplay of heterogeneous edge nodes and the migration of services across edge nodes [5].", "Nonetheless, its security is a signi\ufb01cant challenge [5], [30], [31].", "These promised gains make it a key technology for realizing various visions for next-generation Internet, such as IoT [5] and Tactile Internet (with millisecond-scale reaction time) [28]."]} +{"86722298|3434731": ["Therefore, the integration of blockchain and edge computing into one system becomes a natural trend [6]\u2013[8].", "The sidechain scheme permits developers to connect new sidechains to the mainchain (e.g., Ethereum) with to-and-from transferring of the ledger assets [6]."]} +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"47011238|18372496": []} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"21707051|102352657": []} +{"1989943|18750590": []} +{"1989943|14650419": []} diff --git a/edge/graph_67856283.jsonl b/edge/graph_67856283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c55ea785c3628c6ee874e8a423a00d284f4287d2 --- /dev/null +++ b/edge/graph_67856283.jsonl @@ -0,0 +1,5 @@ +{"32397018|9010313": []} +{"8731725|18744521": ["Tourism, shipping, urbanization and human intervention are damaging coral colonies, with 19% of the world\u2019s coral reefs having been destroyed by 2011 and 75% threatened [4]."]} +{"21059681|9928823": ["later [24] is an unsupervised probabilistic generative models composed of multiple layers of stochastic, hidden variables."]} +{"21059681|393948": ["An efficient sparse classification for coral species is introduced using most recent machine learning technique \u201cDeep Learning\u201d which is a set of algorithms [15] that attempts to model high-level abstractions in data by using architectures composed of multiple non-linear transformations."]} +{"131370925|10859746": ["Although mixed pixels continue to occur at boundaries between features regardless of feature size or sensor resolution (Schowengerdt, 2006), the issue can be alleviated by either using the finest resolution imagery available or employing spectral unmixing classifiers (Boyd and Foody, 2011)."]} diff --git a/edge/graph_67856381.jsonl b/edge/graph_67856381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7b41f2fc785f72fb2b84c31840620a4e706ceb4 --- /dev/null +++ b/edge/graph_67856381.jsonl @@ -0,0 +1,2 @@ +{"39853518|192934": []} +{"17032375|2762290": ["A survey on character segmentation is reported in [5], [23]."]} diff --git a/edge/graph_67856446.jsonl b/edge/graph_67856446.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00ddac4898dd697c8919ce2796d1b5e3e713cc47 --- /dev/null +++ b/edge/graph_67856446.jsonl @@ -0,0 +1,10 @@ +{"41032711|1850236": ["Many research work have been done for modern vehicle systems to cover the design, control, and automation of vehicles [8,12,20,30,39], or to cover vulnerability issues in a speci\ufb01c system (e.g., control system [31], vehicle to vehicle communication [37], vehicle networks [14], in-car wireless\u2026"]} +{"59601221|3775239": ["One of the key objectives of these features is to assist and protect drivers [7]."]} +{"59601221|207060556": ["The ROI in our method can be either manually selected for subsequent calculations or \ufb01xed by an automatic face detection algorithm applied to identify the facial area [56]."]} +{"59601221|12127373": ["It is widely accepted that drowsiness (i.e., momentary nod-ding off) has become one of the main causes for traf\ufb01c accidents [1]."]} +{"4231967|1582463": ["In [2], a watchdog processor is used for concurrent systemlevel error detection techniques."]} +{"15152008|16209841": ["\u2026of state-of-the-art security mechanisms in the IoT (including symmetric/asymmetric cryptographic algorithms, hashing functions, security protocols at network/transport/application layers), aiming at providing features such as confidentiality, integrity, and authentication, is provided in [9]."]} +{"207250645|206584087": []} +{"207250645|17205659": ["The proposed intrusion detection schemes in IoT environment are mainly for the WSNs nodes.", "The WSN and IP-based WSN [12], which will become the basic data collecting points in most of the IoT structures are always vulnerable and raise a high-level security threat.", "Figure 6 shows the main security issues at different layers of WSN.", "These attacks aim at resource exhaustion, similar to the conditions in WSN scenario.", "The physical layer of WSN is most vulnerable to two attacks: Jamming and Tampering.", "In selective forwarding attack, the adversary controlled node may choose to forward some packets and drop some other [12].", "Since the WSN is very much dependent on the routing and the privacy of data in transmission is of high priority, the adversary targets the vulnerabilities in the network and routing layer to extract important information.", "using the same frequency at the same time, then a collision occurs [12].", "Wireless Sensor Networks (WSN) is an integral part of the IoT network [56].", "In this section, we are analyzing the security issues of WSN based on the layered structure of WSN [57,58].", "All these issues related with WSN have to be addressed in the IoT scenario also.", "The physical layer of WSN has the primary function of modulating and demodulating the digital data.", "Resource exhaustion attacks are always having a high priority in WSN and similar resource con-straineddevices.", "As in any radio communication system, in WSN also physical layer is responsible for frequency selection, generation, and maintenance as well as data encryption.", "The main threats in WSN Data Link Layers are: (a) Collisions When different nodes try to communicate using the same frequency at the same time, then a collision occurs [12].", "Advancements in Wireless Sensor Networks (WSN) and low power, resource constrained devices have increased the type of devices that can be connected to the Internet.", "In WSN, the adversary interferes with the radio frequencies used for the communication purpose [59]."]} +{"205288494|1230643": ["Heterogeneous WSN consists of multiple, simple, low-cost sensor nodes that have limited computational and communicational capabilities and of at least one sink node, also called gateway node (GWN) [28]."]} +{"5731070|16209841": []} diff --git a/edge/graph_67856587.jsonl b/edge/graph_67856587.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..47837c1aaa5086becd621d3083526e0f888fc515 --- /dev/null +++ b/edge/graph_67856587.jsonl @@ -0,0 +1 @@ +{"524723|8363289": []} diff --git a/edge/graph_67856618.jsonl b/edge/graph_67856618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67856638.jsonl b/edge/graph_67856638.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..019f5a3d325df8f87763549a126376ccac604745 --- /dev/null +++ b/edge/graph_67856638.jsonl @@ -0,0 +1,5 @@ +{"4480164|3241708": []} +{"146807694|39860496": ["research (Chakraborty et al., 2017), and we may be able to fit more interpretable models in the future."]} +{"2088679|393948": []} +{"5402935|8575576": ["Over the past decade, computational methods have been developed to enable the application of quantitative methods for the analysis and interpretation of IHC-stained histopathological images 1,2 ."]} +{"205286052|2088679": []} diff --git a/edge/graph_67856741.jsonl b/edge/graph_67856741.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d7aa112db361d98cbe70835d97c7b93f53072bd --- /dev/null +++ b/edge/graph_67856741.jsonl @@ -0,0 +1,5 @@ +{"2018737|7185733": []} +{"1033682|174797842": []} +{"4632519|9976187": ["Latent Tree Models, in particular, are interesting as they are able to represent complex relationships in the data [11] and, furthermore, recent methods for constructing these models ([2, 7]) enable us to learn consistent and minimal latent tree models in a computationally efficient manner."]} +{"8021846|393948": ["Convolutional networks [40,39], a class of representation learning methods [8], began to exhibit performance gains not only in human pose estimation, but various areas of computer vision [37]."]} +{"1213867|60779308": ["ion [27,28] and some of them have been applied to hand posture ecognition."]} diff --git a/edge/graph_67856776.jsonl b/edge/graph_67856776.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4c71dbc93590dffd68e1ba3ff7f27a99cb1541b --- /dev/null +++ b/edge/graph_67856776.jsonl @@ -0,0 +1,7 @@ +{"25517809|17381415": ["THREE-PHASE voltage source inverters (3\u03c6 VSIs) with LC filters play a main role in power conversion systems such as distributed generation systems, energy storage systems, and uninterruptible power supplies [1]."]} +{"25517809|12083425": ["2758723 distortion (THD) under various load conditions such as load step change, unbalance load, and nonlinear load with diode rectifiers [2], [3]."]} +{"1831967|1876323": []} +{"3900863|13427574": ["also the stability may be drastically changed by environmental impedance variations in contact motion; therefore, safety is a very challenging issue in practical applications [1], [8]\u2013[10]."]} +{"3900863|535695": ["robots is adjusted by designing motion control systems, has been widely used in order that robots can perform fine motion tasks [1], [2], [7]."]} +{"3900863|205007974": ["Variable stiffness actuators have been proposed to overcome the fundamental limitation problem of conventional SEAs; however, they mainly suffer from mechanical design complexity, size, and cost [16], [17]."]} +{"62790970|17381415": []} diff --git a/edge/graph_67856795.jsonl b/edge/graph_67856795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b94c27279439b14651a6e99560af0b94d20fe266 --- /dev/null +++ b/edge/graph_67856795.jsonl @@ -0,0 +1,6 @@ +{"2567081|512386": []} +{"2567081|7525856": ["Obviously, transmitting over adjacent bands ([1\u2013324] kHz) yields poor results.", "We consider 4 combinations of transmit subbands with the frequency ranges, in kilohertz, of ([1\u201381], [8\u2013162], [1663\u20131743], [1744\u2013 1824]), ([1\u201381], [582\u2013662], [1663\u20131743], [1744\u20131824]), ([1\u201381], [82\u2013162], [663\u2013743], [1744\u20131824]), and ([1\u201381], [82\u2013162], [163\u2013243], [1744\u20131824])."]} +{"116246858|26583724": ["A summarisation of state-of-the-art JRC systems is given in [15], where a variety of topologies for JRC systems are discussed.", "[15], existing JRC systems could be classified as: (i) joint multiple access channel: monostatic radar and communication system transmit with independent transmitters but share a common receiver."]} +{"3297382|7525856": ["In particular, we examine the analog-to-digital interface of CRs, as opposed to the review in [42], which is concerned with the digital implications of compressive spectrum sensing."]} +{"3297382|2509135": ["Additional issues of security against malicious users and various attacks to the network are discussed in [16], [19], and [20].", "This operation is referred to as a handoff [16], [20].", "Various power control and resource allocation schemes that deal with this issue are reviewed in [16] and [20]."]} +{"3297382|12601073": []} diff --git a/edge/graph_67857428.jsonl b/edge/graph_67857428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7166b75b5df596a0f80451b51755763cd375979f --- /dev/null +++ b/edge/graph_67857428.jsonl @@ -0,0 +1,12 @@ +{"16199272|15299188": []} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"14315321|1598350": ["As surveyed by Perera et al. in [4], there are many existing IoT products and applications available."]} +{"30041218|6950376": []} +{"18230060|13172512": []} +{"18230060|11013798": ["[7] presents an overview of one particular function of network monitoring, fault localization.", "The functions presented in [6,7] are components of the analysis layer, one of the five layers of monitoring, as we discuss in Section 3.", "Some of these surveys are dedicated to sub-topics discussed in this paper [6,7]."]} +{"18865945|1236072": ["Good surveys on routing protocols developed specifically for WSN exist and may be found on [11, 12]."]} +{"18865945|1230643": ["In this paper we surfaced the state-of-the-art on the efforts to bring IP over WSN. Motivation is clearly focused on their connection to the Internet in the most transparent possible way, allowing realistic ubiquitous computing applications."]} +{"14045100|3189715": ["Network programmability was the main objective of the two converged schools of thought that dominated the networking research agenda in the mid-90s up until early-00s: Active [1] and Programmable Networks [2] (A&PN)."]} +{"30480668|17206258": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} diff --git a/edge/graph_67858227.jsonl b/edge/graph_67858227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..02dc9369b2b634cb9015e672a6fdf2535b210fa5 --- /dev/null +++ b/edge/graph_67858227.jsonl @@ -0,0 +1 @@ +{"108773872|9925869": []} diff --git a/edge/graph_67859326.jsonl b/edge/graph_67859326.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f61cd52602eaaa0d8efcea7ab0324fa96ccefaf --- /dev/null +++ b/edge/graph_67859326.jsonl @@ -0,0 +1,32 @@ +{"3357112|13475127": ["Reliable and efficient communication between sensor nodes transmitting important data remains a major challenge in next generation WSNs [2]."]} +{"19036319|8365617": ["ple, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "A time series is a sequence of data points typically measured at regular periods [60], [61].", "For example, extracting Fourier and wavelet features can be implemented on-chip using fast algorithms such as FFT [61].", "Next, statistical and morphological features are extracted from the signal segments, including mean, standard deviation, peak-to-peak amplitude, fast Fourier transform (FFT) coefficients, or wavelet features [62], [63]."]} +{"39547848|46580948": []} +{"303976|6539555": ["As the sensing technology advances, future mHealth applications are expected to emerge [7,8], such as cancer detection (through the monitoring of cancer cells), management of heart condition (through the monitoring of biochemical markers) and vision enhancement (through implanted retina prosthesis chips), to name a few."]} +{"18303304|41505326": ["For vision-based HAR, systems require a two-dimensional (2D) video recorder or a low-cost integrated depth sensor (such as the sensors and cameras in a Kinect\u2122) [15]."]} +{"18303304|17747015": ["However, these technologies also suffer from a similar drawback as the vision-based technologies: radio-based HAR does not work in areas where a base station is unavailable [55]."]} +{"18303304|7834819": ["Indeed, waist-placement of wearable sensors can better represent most human motions because they are then close to the center of mass of the human body [73].", "\u2026in combination. or foot Indeed, waist-placement of wearable sensors can better represent most human motions Other researchers have also investigated the optimal placement of accelerometers for human activity recognition. because they are then close to the center of mass of the human body [73]."]} +{"18303304|206583375": ["Traditionally, indoor positioning systems (IPS) can been considered as systems that function continuously and in real-time to provide the locations of humans or objects in indoor areas [12].", "Moreover, medical care in hospitals also demands IPSs for tracking patients and expensive equipment, preventing theft, and precise positioning for robotic assistants during surgeries [12,20].", "In recent years, indoor positioning technologies have \ufb02ourished [9], including both hardware platforms and localization algorithms [12,20].", "\u2026decades, numerous indoor positioning approaches, such as Bluetooth, WiFi/WLAN, radio frequency identi\ufb01cation (RFID), ultra-wideband (UWB), have been developed; however, these vary greatly in terms of their resolution, coverage, precision, technology, scalability, robustness and security [10\u201312].", "Cost : the cost of IPS\u2014this metric mainly includes infrastructure costs (e.g., reuse existing infrastructure or install new devices), installing and maintenance cost (e.g., smartphone, smartwatch, can be reused to decrease infrastructure cost), energy consumption, space occupied, etc. [12,30]."]} +{"51970488|3348390": ["We can define IoT as a paradigm that \u201callows people and things to be connected Anytime, at Anyplace, with Anything and Anyone, ideally using Any path/network and Any service\u201d [4]."]} +{"42424619|206583375": []} +{"10241935|15589021": ["Gas sensors utilize electrical properties, optic methods, acoustic methods, gas chromatography, or calorimetric methods [3]."]} +{"13134455|627405": ["[16] B.A. Kitchenham, D. Budgen, O. Pearl Brereton, Using mapping studies as the basis for further research\u2013a participant-observer case study, Inf.", "Evaluate the mapping process\nKitchenham and Brereton [8] found that a common request to include in guidelines is a pocket guide for evaluation as support for researchers during the design, and reviewers during the assessment of mapping studies.", "Furthermore, given that many new insights have been gained through the conduct of systematic reviews, which have been synthesized by Kitchenham and Brereton [8], we may use this knowledge to determine the state of quality of mapping studies, taking the differences between SLRs and mapping studies into account.", "[15] B. Kitchenham, P. Brereton, D. Budgen, The educational value of mapping studies of software engineering literature, 2010 ACM/IEEE 32nd International Conference on Software Engineering, vol. 1, IEEE, 2010, pp. 589\u2013598.", "As recommended by Dyba et al. [17] and Kitchenham and Brereton [8] the use if IEEE and ACM as well as two indexing databases (e.g. Inspec/Compendex and Scopus) is sufficient.", "Though, given the trade-off between availability of the results and the reliability of the classification, Kitchenham and Brereton [31] found it useful to have another person check the data extraction.", "[32] J. Bailey, D. Budgen, M. Turner, B. Kitchenham, P. Brereton, S.G. Linkman, Evidence relating to object-oriented software design: a survey, in: ESEM, vol. 7, Citeseer, 2007, pp. 482\u2013484.", "Kitchenham et al. [30] as well as Brereton et al. [31] found it useful to have one researcher extract the data and another reviewing the extraction.", "Research process References\nKitchenham [48]; Kitchenham and Charters [1] Petersen et al. [2] Budgen et al. [56] Arksey and O\u2019Malley [57] Durham template Biolchini et al. [49] Petticrew and Roberts [18] This study Kitchenham and Brereton [8]\nNeed for the map\nMotivate the need and relevance\np p p p\nDefine objectives and questions\np p p p\nConsult with target audience to define questions\np\nStudy ident.", "[31] found it useful to have one researcher extract the data and another reviewing the extraction.", "[31] P. Brereton, B.A. Kitchenham, D. Budgen, M. Turner, M. Khalil, Lessons from applying the systematic literature review process within the software engineering domain, J. Syst.", "[30] B. Kitchenham, O. Pearl Brereton, D. Budgen, M. Turner, J. Bailey, S. Linkman, Systematic literature reviews in software engineering\u2013a systematic literature review, Inf.", "Quality assessment: In a systematic review the focus would now be on assessing the quality of included and excluded studies, following one or more of the approaches identified by Kitchenham and Brereton [8].", "Comparing the identified guidelines for mapping studies with best practices as identified in Kitchenham and Brereton [8].", "[56] D. Budgen, M. Turner, P. Brereton, B. Kitchenham, Using mapping studies in software engineering, in: Proceedings of PPIG, vol. 8, 2008, pp. 195\u2013204."]} +{"24038661|63938493": ["Being an emerging field, the current literature on digital health innovation ecosystems focuses on concepts and descriptions [2] [3] and the need for a digital health innovation ecosystem [1].", "The definition of digital health innovation ecosystems [2] therefore proposes the concepts needed to tackle outstanding health related goals of the Millennium Development Goals.", "0, health and medical platforms, health and wellness apps and self-tracking (the quantified self) [2].", "ICTs could refer to digital health technologies such as m-health, e-health, health and wellness apps and wearable sensors [2].", "To tackle world health challenges such as child mortality and maternal mortality and to \u201ccombat HIV/AIDs, malaria and other diseases\u201d as highlighted in the United Nations (UN) [6] report, countries should adapt the \u201cbest-demonstrated practices\u201d [2], while using the available resources in their reach.", "Digital health innovation ecosystems is an emerging topic in literature [1] [2] [3], which suggests the need to incorporate the components of digital health, innovation and digital ecosystems in administering healthcare services [2] [3]."]} +{"4360481|18986679": ["The Visual Text Mining (VTM) field is an intersection between the fields of Text Mining and Information Visualization [15]."]} +{"16500215|1722293": ["Ballistocardiography (BCG) and Seismocardiography (SCG) are known for their ability to record the vibrations generated from various cardiac mechanical activities, which take place between successive heart beats [15]."]} +{"17397140|30383344": ["Requirements Code Blue [20] MEDiSN [21] MASN [22] KNOWME [23] LOBIN [24]"]} +{"17397140|6332923": ["For these reasons, the WSN infrastructure employs a 128-bit AES encryption algorithm to protect network integrity and security, ensuring that the information is not intercepted by nodes that do not belong to the network [29]."]} +{"17397140|12604503": ["Several authors [17,18] have identified a series of requirements for healthcare applications that are based on wireless technologies, including: 1."]} +{"1349348|3348390": ["Many surveys on popular context modelling techniques have been published like e.g., [17,33].", "Reference [33] defends that the best way to model context is to create a novel technique to integrate the existing context modelling techniques.", "This modelling method is regarded to as the most promising method in [17,33], and it can address the conceptual confusion among people and systems because it shares the common understanding."]} +{"1349348|14205872": ["In general, ontology-based context data visualization can be grouped into six types: Indented list, Node-link and tree, Zoomable, Space-filtering, Focus + context, and 3D information [70]."]} +{"1349348|1113420": ["A holistic view on the latest literature shows that, to organize and evaluate existing context aware middleware, many surveys have been made, e.g., [32,76\u201378].", "Table 2 summarizes different types of classification found in [32\u201335] and gives a brief explanation for each level.", "The work reported in [32] states a close relation between active context awareness and infrastructure-based context awareness because of some common characteristics."]} +{"35986198|21386749": []} +{"8025832|14639620": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|17336376": ["The node virtualization manager and the network virtualization manager are the key modules that interact with the other components such as energy manager, resource manager, service manager to manage all the activities of the virtual sensor network [2,44].", "Due to the owner\u2019s strict control over the WSN domains, conflicting goals, different sensor node and vendors, with no standard in place it is difficult to introduce a large scale federated WSN [2].", "according to the best of our knowledge, there is only one survey paper on virtualization of sensor networks [2] that only covers few of the projects and prominences on the business model and applications supported by virtualization of sensor networks."]} +{"8025832|7889189": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|1077083": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|1819274": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|6275330": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"8025832|1230643": ["There have a been number of noteworthy reviews and surveys in the field of WSN focusing on challenges and characteristics of wireless sensor such as routing protocols [7,8], WSN [9], WSN security [10], devices in WSN [11,12], Major applications [13] and particularly in our field of interest the middleware of sensor networks has been reviewed in context of pervasive computing [14], context aware web services [7], service oriented middleware [15], context aware middleware [16], Internet of Thing (IoT) middleware [17], middleware for robotics [18], etc."]} +{"35216963|10817088": []} +{"35216963|27637541": []} +{"35216963|14397159": []} diff --git a/edge/graph_67859401.jsonl b/edge/graph_67859401.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2409c1e98a274f7be0bde7394c7aa5d473c343f6 --- /dev/null +++ b/edge/graph_67859401.jsonl @@ -0,0 +1,16 @@ +{"4311986|61132": []} +{"4311986|18657007": []} +{"4311986|17206258": []} +{"36594615|15174674": []} +{"51880828|36510460": ["and Elbanhawi et al.(17)), both terms have been used and share the same meaning.", "However, because the difference is relatively minor, in many review papers (such as Tam et al.,15 Campell et al.16 and Elbanhawi et al.17), both terms have been used and share the same meaning."]} +{"67867840|9072047": []} +{"57661774|1177069": []} +{"16132823|15174674": ["Motion control schemes for mechanical systems such as USVs can be treated in a hierarchical scheme consisting of three levels in general [1], [2]."]} +{"22569417|3488022": ["As an active sensor, laser fluorosensor is one of the most useful instruments because of its unique capability to identify oil type and discriminate oil on most backgrounds, such as seaweeds [4, 5]."]} +{"353147|6607209": ["As agents move about the environment, they have a direct influence on other team members from tightly-coupled scenarios [2, 8, 19] where multiple agents are required to complete a task, to loosely-coupled ones where the action of one agent might block the movement of others [6]."]} +{"11905372|15093118": ["Further, we exclude device-level signal processing and highlevel intelligence generation (such as vehicle behavior [49])."]} +{"1043187|12060835": ["Recent implementations use energy harvesting mechanisms to increase the network nodes\u2019 lifetime, reliability, and cost effectiveness [6]."]} +{"7793417|7360895": []} +{"45110181|17133134": ["The development of advanced information and communication technology (ICT)-based technologies and trends in research suggest that future marine observation systems will be constituted of heterogeneous, small, and intelligent platforms [9], based on the concept of hybrid sensor networks [10] in which fixed nodes collaborate with mobile assets (the robots) to accomplish the required tasks."]} +{"83459429|779672": []} +{"83459429|12998110": []} diff --git a/edge/graph_67860393.jsonl b/edge/graph_67860393.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67866155.jsonl b/edge/graph_67866155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9325e3491ef287620a372e66b57e820f0fb38d05 --- /dev/null +++ b/edge/graph_67866155.jsonl @@ -0,0 +1,105 @@ +{"34944561|3504276": []} +{"19246309|1236072": ["Our schemes can be easily incorporated into many existing cluster-based routing protocols such as [17], [18], [20]."]} +{"51918692|10979806": []} +{"51918692|19938676": []} +{"51918692|2623404": []} +{"51918692|3330461": []} +{"51918692|3936425": []} +{"51918692|7686677": []} +{"51918692|1230643": []} +{"65292482|18167210": []} +{"65292482|20612430": ["In fact, RA has been a rather active research topic for various conventional wireless communication systems like the orthogonal frequency division multiple access (OFDMA)-based wireless networks [87]."]} +{"65292482|10979806": ["However, lowering energy consumption simultaneously is still very challenging [68, 80, 84].", "The current trend of radio access techniques deals with the ability to handle with the explosive traffic growth and the continuously rising demands on network capacity [79, 80], and the realisation of the importance of energy Base Band Unit (BBU) Pool"]} +{"65292482|15449163": []} +{"65292482|19938676": ["This new design would provide high ef\ufb01ciency in terms of energy saving almost 10 times the lifetime of a battery, close to 1000 times higher in terms of capacity and spectral ef\ufb01ciency of more than 1000 Gb/s when compared with 4G systems [1, 2]."]} +{"65292482|3055684": ["shown that harvesting both solar and wind energy can be used to operate communication systems [92, 93]."]} +{"65292482|12029139": ["However, one can also harvest energy from the radio signals over the air [94]."]} +{"2391303|12060835": [", batteries), wireless energy harvesting will potentially provide unlimited energy from the surrounding environment [9]."]} +{"11356873|12029139": [", see [2]."]} +{"65206718|22221919": ["NOMA is substantially different from orthogonal multiple access schemes, since its basic principle is that the users can achieve multiple access by exploiting the power domain [80]."]} +{"65206718|3270620": []} +{"65206718|3504276": ["Furthermore, recent advances in electronics and, specifically, in rectifying antennas designing, will further increase the efficiency of EH from RF signals in the near future [14, 15].", "1, hybrid access points (HAPs) can exploit conventional forms of renewable energy, strengthening the green character of WPT technology [15].", "1 A wireless powered communication network with hybrid energy sources [15]."]} +{"65206718|12029139": []} +{"65206718|7686677": ["Some of the involved companies are: \u2022 The idea of EHBSs has already been adopted by many mobile network operators, worldwide [23]."]} +{"65206718|17109970": ["On the other hand, when the aim is to achieve a balance between SINR and harvested energy, a wider FoV setting could be selected.", "Moreover, in most practical scenarios, distributed algorithms are preferred over centralized ones, with their main advantages including the reduction of complexity and scalability [34].", "When the aim is to maximize the SINR, the FoV is tuned up to receive the beam of the dedicated LED only (if possible), in order to reduce the beam overlapping.", "Regarding adjusting reception, the Field-of-view (FoV) adjustment policy is proposed, while according to the coordinated adjustment of transmission and reception strategy, the simultaneous optimization of the former policies at both transmitter and receiver is proposed, in order to maximize the harvested energy, while achieving the required QoS (e.g. data rate and SINR).", "For each user n \u2208 N , where N is the set of all the users, the utility function corresponds to a level of satisfaction that a user obtains [34].", "Considering (5.10), (5.16), and (5.17), it is revealed that both SINR and harvested energy -apart from A1, B1 and T - also depend on the selection of \u03a8FoV, despite the utilized adjusting transmission technique.", "During Phase 1, the aim is to maximize the received SINR.", "36 3.2 Algorithm complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54\nx\nAbbreviations\nAC Alternating Current\nAEHBSs Autonomous Energy Harvesting Base Stations\nAF Amplify-and-Forward\nAP Access Point\nAS Antenna Switching\nATSC Advanced Television Systems Commitee\nAWGN Additive White Gaussian Noise\nBS Base Station\nC Constraint\nCAPEX Capital Expenditures\nCnfP Cascaded Near-Far Problem\nCRAN Cloud Radio Access Network\nD Destination\nDC Direct Current\nDF Decode-and-Forward\nDoF Degrees of Freedom\nECO Economy\nEH Energy Harvesting\nEHBS Energy Harvesting Base Station\nEM Electromagnetic\nFoV Field-of-View\nFSO Free Space Optical\nGNE Generalized Nash Equilibrium\nGNEP Generalized Nash Equilibrium problem\nGSE Generalized Stackelberg Equilibrium\nHAP Hybrid Access Point\nIEEE Institute of Electrical and Electronics Engineers\nIoT Internet-of-Things\nIR Infrared\nIS Interfering Source\nKKT Karush-Kuhn-Tucker\nLED Light Emitting Diode\nxi\nxii Abbreviations\nLM Lagrange Multiplier\nLoS Line of Sight\nLPF Low-Pass Filter\nLTE Long Term Evolution\nLTE-A Long Term Evolution-Advanced\nMIMO Multiple-input multiple-output\nMUST Multi-user superposition transmission\nNOMA Non-Orthogonal Multiple Access\nNOMA-TS Non-Orthogonal Multiple Access with Time-Sharing\nOFDMA Orthogonal Frequency Division Multiple Access\nOPEX Operational Expenses\nOWC Optical Wireless Communication\nOWPT Optical Wireless Power Transfer\nPB Power Beacon\nPD Photodetector\nPV Photovoltaic\nPIN Positive-Intrinsic-Negative\nPS Power Splitting\nQoS Quality-of-Service\nR Relay\nRFID Radio Frequency Identification\nRF Radio Frequency\nRectenna Rectifying Antenna\nSE Stackelberg Equilibrium\nSIC Successive interference cancellation\nSINR Signal-to-Interference-plus-Noise Ratio\nSNR Signal-to-Noise Ratio\nSLIPT Simultaneous Lightwave Information and Power Transfer\nSS Spatial Switching\nSVD Singular Value Decomposition\nSWIPT Simultaneous Wireless Information and Power Transfer\ns.t. Subject to\nTS Time-Sharing\nTSw Time-Switching\nTSp Time-Splitting\nTDMA Time Division Multiple Access\nUAV Unmanned Aerial Vehicle\nUV Ultraviolet\nxiii\nVE Variational Equilibrium\nVI Variational Inequality\nVL Visible Light\nVLC Visible Light Communication\nWD Wireless Device\nWEE Weighted Energy Efficiency\nWi-Fi Wireless Fidelity\nWPN Wireless Powered Network\nWPT Wireless Power Transfer\nw.r.t. with respect to\n3GPP 3rd Generation Partnership Project\n5G Fifth Generation\nList of Symbols\n\u03b1 Weight that corresponds to the downlink rate\n\u03b2 Weight that corresponds to the uplink rate\n\u03b30 Received signal-to-noise plus interference ratio \u03b3n \u03b3n = |hn| 2G0Gn\n\u0393 (\u03ba, \u03b6) Gamma distribution with shape parameters \u03ba, \u03b6 > 0\n\u0393 (\u00b7) Gamma function\n\u03b3\u0303n \u03b3\u0303n = |h\u0303n| 2G\u03030Gn\n\u03b3s,i Signal-to-noise ration of the source-relay link\n\u03b3r,i Signal-to-noise ration of the source-relay link\n\u03b3tot,i End-to-end signal-to-noise ration\n\u03b3\u0303tot,i Approximation of end-to-end signal-to-noise ratio\n\u03b3th Signal-to-noise plus interference ratio threshold\n\u2206i i-th region of a graph \u01eb \u01eb\u2192 0+\n\u03b5 \u03b5 \u2192 0+\n\u03b71 Energy harvesting efficiency\n\u03b72 Efficiency of the amplifier\n\u03b7 \u03b7 = \u03b71\u03b72\n\u03b70 Photo-detector responsivity\n\u03b8n Power fraction used for information by the n-th user\n\u03b8\u0303n \u03b8\u0303n = ln(\u03b8(n))\n\u03b8 Set of values \u03b81, ..., \u03b8n, \u03b8N\n\u03b8\u0303 Set of values ln(\u03b81), ..., ln(\u03b8n), ln(\u03b8N )\n\u03bb LM set with elements \u03bb1, ..., \u03bbn, ..., \u03bbN\n\u03bbi Lagrange multiplier\n\u00b5 Lagrange multiplier\n\u03bb\u0302i Positive step size\n\u03bdn Additive noise at the n-th user\n\u03bd0 Additive noise at the BS\n\u03bdr,i Additive noise at the relay at the i-th channel\n\u03bdd,i Additive added at the destination at the i-th channel\nxv\nxvi List of Symbols\n\u03be Path loss exponent \u03be0 \u03be0 = \u2212 1\nlog2 cos(\u03a61/2)\n\u03c1 refractive index \u03c10 \u03c10 = P0\nN0W\n\u03a61/2 Ssemi-angle at half luminance\n\u03c6i The i-th eigenvalue of the Hessian matrix\n\u03d5 Irradiance angle\n\u03c4m Time-sharing variable, i.e., portion of time that corresponds to\nthe m-th permutation\n\u03c4 Set of values of \u03c41, ..., \u03c4m, ..., \u03c4M\n\u03c8 Incidence angle\n\u03a8 (\u00b7, \u00b7) Digamma function\n\u03a8fov Field-of-view\n\u03a8fov,1 Field-of-view during phase 1 \u03c32 Noise power\n\u2126 Strategic form of game\nA Peak amplitude of electrical signal\nA1 Peak amplitude of electrical signal during phase 1\nA2 Peak amplitude of electrical signal during phase 2 A\u2032n Peak amplitude of electrical signal transmitted by\nthe n-th neighboring LED\nA\u0303n A\u0303n = \u03b7\u03c10gnT\ntn + 1\nA Matrix with elements A(m, jm,n)\nA(m, jm,n) Index of n-th user with decoding order jm,n\nduring the m-th permutation that correspond to\nan Weight that couples the n-th user\u2019s utility\na\u0303n a\u0303n = \u03b7\u03c10gn\nB Direct current bias\nB1 Direct current bias during phase 1 B\u2032n Direct current bias of n-th neighboring LED B2 Direct current bias during phase 2\nb Rate profile set with elements b1, ..., bn, .., bN\nbn Rate profile parameter of the n-th user b\u0303n b\u0303n = \u03b7\u03c10 \u2211N j=n+1 gj B\u0303i B\u0303i = 1 + \u03b7\u03c10 \u2211N n=N+1\u2212i giTi 1\u2212Ti c1 Price per utilized energy unit\nc2 Price per unit of resources (energy/time) CN (\u00b5, s2) Complex Gaussian distribution with mean \u00b5 and variance s2\nxvii\nc\u0303n c\u0303n = \u03b7\u03c1 \u2211N i=n gi cos(x) Cosine of x\nd\u0303n d\u0303n = N + 1\u2212 n\ndn Distance between the n-th user and the BS/AP df(x) dx Derivative of function f with respect to x D0 Distance between the interfering source (IS) and the BS\nDi Distance of the i-th group of users from the BS\ndsr Distance between the source and the relay\ndrd Distance between the relay and the destination\nE Energy efficiency\ngn gn = \u03b3 2 n E[\u00b7] Statistical expectation\ne Base of the natural logarithm\nexp(x) Exponential of x\nE Set of values with elements EBS,1, ..., EBS,n, ..., EBS,N\nE\u2212n Set E excluding EBS,n\nEBS Amount of harvested energy by the BS\nEBS,n The fraction of the energy dedicated for the transmission to\nthe n-th user\nEn Harvested energy by the n-th user\nE\u0303n Energy harvesting rate of the n-th user\nETS Harvested energy when time-splitting is used\nE\u0303TSBO Harvested energy when time-splitting with DC bias\noptimization is used\nE\u0303TSBO Reformulation of E\u0303TSBO\nF Vector defined as (\u2207EBS,1U1,\u2207q1U1, ...,\u2207EBS,NUN ,\u2207qNUN ) f Scalar function\nF0 Fill factor\nG\u03030 Directional antenna gain of the PB\nG0 Directional antenna gain of the BS\nGn Directional antenna gains of the n-th user Gn Normalized channel power gain, given by Gn = Ln|Hn|2\nN0\nGr,i Gain of the relay over the i-th channel\ngf Gain of the optical filter\ngc(\u03c8) Gain of the optical concentrator\nHn(t) Small scale fading coefficient of the channel between the BS and\nthe n-th user\nh\u0303n Coefficient of the channel between the PB and the n-th user\nxviii List of Symbols\nhn Coefficient of the channel between the BS/AP and the n-th user h\u2032n Coefficient of the channel between the n-th neighboring LED\nand the user\u2019s receiver\nH\u0303n Small scale coefficient of the channel between the PB and the\nn-th user\nhr,i Coefficient of the channel between the relay and the destination\nhr,i \u223c CN (0, \u03c32r,i)\nhs,i Coefficient of the channel between the source and the relay\nhs,i \u223c CN (0, \u03c32s,i)\niAC AC component of electrical current\niAC,1 Part of iAC provoked by the dedicated LED\niAC,2 Part of iAC provoked by other interfering\nsources (not the dedicated LED)\ni0 Output current of Schottky diode\nI0 Dark saturation current\nir(t) Electrical current at the output of the photodetector\nIDC(t) Direct current (DC) signal\nIDC,1 Part of iDC provoked by the dedicated LED\nIDC,2 Part of iDC provoked by other interfering\nsources the dedicated (not the dedicated LED)\nIn Interfering signal received by the n-th user\nI Interfering signal received by the BS\nIL Minimum input bias current\nIH Maximum input bias current\nJ Jain\u2019s fairness index\njm,n Decoding order of n-th user during m-th permutation\nK Maximum number of iterations K1 K1 = Rth\nlog2\n(\n1+ e(\u03b70h1PLED(IH\u2212IL))\n2\n8\u03c0(PI (\u03a8\u2217fov,1)+\u03c32)\n)\nK2 K2 = min\n(\nRth log2(1+ e\u03b3th 2\u03c0 ) , 1\n)\nli The sum of the LM, \u03bbi and the price ci\nLn Path loss/shadowing coefficient of the channel between the\nBS and the n-th user\nL\u0303n Path loss/shadowing coefficient of the channel between the\nPB and the n-th user\nLr Physical area of the photo-detector\nlog2(x) Base-2 logarithm of x ln(x) Natural logarithm of x\nxix\nL Lagrangian function\nL\u0303 Simplified Lagrangian function\nM Number of permutations\nmax(\u00b7) Maximum value of a set of elements\nmin(\u00b7) Minimum among of a set of elements\nMk Subset of users, Mi \u2286 N\nms(t) Modulated electrical signal\nN Set of users\nN Number of users\nNc Number of carriers\nNi Number of users of i > 1-th group\nN0 Noise power spectral density\nP0 Maximum transmission power of the BS P dn Transmit power from the BS to the n-th during downlink pdn p d n = P dn N0W P un Transmit power of the n-th user during uplink PI,j Power of received interference by the j-th user\nPI,0 power of the interference received by the BS pI,j pI,j = PI,j N0W PIS Transmit power of the interfering source pIS pIS = PIS N0W pI,0 pI,0 = PI,0 N0W Pro Received optical signal from other sources p\u0303n p\u0303n = ln(p d n) p The set of values pd1, ..., p d n, , ...p d N p\u0303 The set of values ln(pd1), ..., ln(p d 1), ..., ln(p d N) Prt The total harvested power at the relay\nPr0 Available power from other sources (apart from SWIPT)\nand/or other fixed power needs of the relay\nPs,i Transmitted power by the source on the i-th channel\nPr,i Power transmitted by the relay over the i-th channel\nPrm Maximum allowable transmit power by the relay\nPsm Maximum allowable transmit power by the source\nPs Set of values Pr,1, ..., Pr,i, ..., Pr,N\nPs Set of values Ps,1, ..., Ps,i, ..., Ps,N\nPLED LED power\nPt Transmitted optical signal\nq Set of values with elements q1, ..., qn, ...., qN\nxx List of Symbols\nq\u2212n Set q excluding qn\nqn Product of time and bandwidth allocated to the n-th user\nQ Product of total available time and bandwidth\nR Auxiliary variable\nR\u0303 R\u0303 = ln(R)\nRdn Achievable downlink rate of the n-th user Rdt,n Targeted downlink rate of the n-th user Run Achievable uplink rate of the n-th user R\u0303un Achievable uplink rate of the n-th user\nwhen NOMA-TS is used\nReq Equal rate among users\nRmin Minimum achievable throughput among users\nRtot System throughput\nR\u0303tot Simplified system throughput after the end-to-end\nsignal-to-noise ratio approximation\nRsum Sum of individual data rates\nR0 Lambertian radiant intensity Rdn\u2192j Rate at which the j-th user detects the message intended\nfor the n-th user\nRth Information rate threshold\nrc1 Radius of inner circle\nrc2 Radius of outer circle sd0 Baseband signal transmitted by the BS sdn Baseband signal transmitted by the BS to the n-th user sun Baseband signal transmitted by the n-th user Sn(t) Time allocation parameter, Sn(t) \u2208 {0, 1}\nT Duration of the first phase in two-phase protocols\nTi Auxiliary variable\nt Set with elements t1, ..., tn, ...tN\nt\u0303 Set with elements ln(t1), ..., ln(tn), ... ln(tN)\ntin Time instant\ntn Time allocated to the n-th user\nt\u0303n t\u0303 = ln(tn)\nTtot Total duration of a time frame\nUBS Utility function of the base station\nUn Utility function of the n-th user\nVoc Open circuit voltage\nVt thermal voltage\nxxi\nUi Projection operator\nW Total available bandwidth\nWn Bandwidth of the n-th user or the n-th channel\nyn Baseband signal received by the n-th user\nyr,i Baseband received signal by the relay over the i-th channel\nyd,i Baseband received signal by the destination over the i-th\nchannel\nW(x) Lambert W function\nW0(x) Principal branch of Lambert W function X X = \u03b72E\u0303n\u03b3N0W yRF Received RF band signal z\u2217 Solution of z ln(z)\u2212 z \u2212 \u2211N\nn=1 gn + 1 = 0\nz\u2217n Solution of ln(1 + zn)\u2212 zn 1+zn = bn \u03bbn \u2211N n=1 \u03bbngn bn(1+zn) Zn Zn = 1 +W0 (\n\u2212l1+l2Kn el1\n)\nz\u03031 z\u03031 = \u03b1 exp(R\u0303)\nT\nz\u03032 z\u03032 = \u03b1 exp(R\u0303 \u2212 t\u0303n)\n\u2207 Gradient\n| \u00b7 | Absolute value\n|| \u00b7 || Cardinalilty of a set\n(\u00b7)\u2217 Optimality or solution of an equation \u2202f(x1,...,xi,...,xm)\n\u2202xi Partial derivative of function f with respect to xi\n[.]\u03be max(., \u03be) [\u00b7]+ [\u00b7]+ = min(\u00b7, 0)\n(\u00b7)d Value for the downlink phase\n(\u00b7)u Value for the uplink phase\n(\u0304\u00b7) Conjugate of (\u00b7)\n(\u00b7)[i] The value of (\u00b7) during phase i\n\u2286 Subset\nx!", "When the aim is to maximize spectral efficiency and the users utilize different channels, the user\u2019s utility is usually defined as a logarithmic, concave function of the user\u2019s signal-to-interference-plus-noise ratio (SINR) [34].", "Since SINR is an increasing function with respect to A1, then A1 takes its maximum value, which, considering (5.2) is given by A1 = IH\u2212IL 2 and similarly, B1 = IH+IL 2 .", "Regarding the QoS, two different criteria are taken into account, namely SINR and information rate.", "Thus, the received SINR can be written as\n\u03b30 = (\u03b70hPLEDA)\n2\nPI + \u03c32 , (5.10)\nwhere \u03c32 is the noise power and PI is the electrical power of the received interference.", "The corresponding optimization problem can be expressed as\nmax T,\u03a8FoV,1 ETS\ns.t. C1 : R d \u2265 Rth,\nC2 : \u03b30 \u2265 \u03b3th, C3 : 0 \u2264 T \u2264 1, C4 : \u03a8FoV,1 \u2208 {\u03a8 [1] FoV, .., \u03a8 [M ] FoV},\n(5.19)\nwhere Rth and \u03b3th denote the information rate SINR and threshold, respectively.", "We propose the Adjustment of the FoV policy for the adjusting reception strategy, in order to balance the trade-off between harvested energy and SINR."]} +{"65206718|12060835": ["The opportunities arising from the recent adnavces in multimedia, along with the emerging future internet-of-things (IoT) applications, such as smart cities, health monitoring devices, and driverless cars, are limited by the OPEX of the base stations (BSs) [1], as well as the finite battery capacity of the involved wireless communication devices [2, 3].", "Since a node is energy-limited only till the next harvesting opportunity (recharge cycle), it can optimize its energy usage to maximize performance during that interval [2].", "E [2] TS = F0(1\u2212 T )(\u03b70hPLEDIH + IDC,2)Vt ln ( 1 + \u03b70hPLEDIH + IDC,2 I0 ) .", "36 3.2 Algorithm complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54\nx\nAbbreviations\nAC Alternating Current\nAEHBSs Autonomous Energy Harvesting Base Stations\nAF Amplify-and-Forward\nAP Access Point\nAS Antenna Switching\nATSC Advanced Television Systems Commitee\nAWGN Additive White Gaussian Noise\nBS Base Station\nC Constraint\nCAPEX Capital Expenditures\nCnfP Cascaded Near-Far Problem\nCRAN Cloud Radio Access Network\nD Destination\nDC Direct Current\nDF Decode-and-Forward\nDoF Degrees of Freedom\nECO Economy\nEH Energy Harvesting\nEHBS Energy Harvesting Base Station\nEM Electromagnetic\nFoV Field-of-View\nFSO Free Space Optical\nGNE Generalized Nash Equilibrium\nGNEP Generalized Nash Equilibrium problem\nGSE Generalized Stackelberg Equilibrium\nHAP Hybrid Access Point\nIEEE Institute of Electrical and Electronics Engineers\nIoT Internet-of-Things\nIR Infrared\nIS Interfering Source\nKKT Karush-Kuhn-Tucker\nLED Light Emitting Diode\nxi\nxii Abbreviations\nLM Lagrange Multiplier\nLoS Line of Sight\nLPF Low-Pass Filter\nLTE Long Term Evolution\nLTE-A Long Term Evolution-Advanced\nMIMO Multiple-input multiple-output\nMUST Multi-user superposition transmission\nNOMA Non-Orthogonal Multiple Access\nNOMA-TS Non-Orthogonal Multiple Access with Time-Sharing\nOFDMA Orthogonal Frequency Division Multiple Access\nOPEX Operational Expenses\nOWC Optical Wireless Communication\nOWPT Optical Wireless Power Transfer\nPB Power Beacon\nPD Photodetector\nPV Photovoltaic\nPIN Positive-Intrinsic-Negative\nPS Power Splitting\nQoS Quality-of-Service\nR Relay\nRFID Radio Frequency Identification\nRF Radio Frequency\nRectenna Rectifying Antenna\nSE Stackelberg Equilibrium\nSIC Successive interference cancellation\nSINR Signal-to-Interference-plus-Noise Ratio\nSNR Signal-to-Noise Ratio\nSLIPT Simultaneous Lightwave Information and Power Transfer\nSS Spatial Switching\nSVD Singular Value Decomposition\nSWIPT Simultaneous Wireless Information and Power Transfer\ns.t. Subject to\nTS Time-Sharing\nTSw Time-Switching\nTSp Time-Splitting\nTDMA Time Division Multiple Access\nUAV Unmanned Aerial Vehicle\nUV Ultraviolet\nxiii\nVE Variational Equilibrium\nVI Variational Inequality\nVL Visible Light\nVLC Visible Light Communication\nWD Wireless Device\nWEE Weighted Energy Efficiency\nWi-Fi Wireless Fidelity\nWPN Wireless Powered Network\nWPT Wireless Power Transfer\nw.r.t. with respect to\n3GPP 3rd Generation Partnership Project\n5G Fifth Generation\nList of Symbols\n\u03b1 Weight that corresponds to the downlink rate\n\u03b2 Weight that corresponds to the uplink rate\n\u03b30 Received signal-to-noise plus interference ratio \u03b3n \u03b3n = |hn| 2G0Gn\n\u0393 (\u03ba, \u03b6) Gamma distribution with shape parameters \u03ba, \u03b6 > 0\n\u0393 (\u00b7) Gamma function\n\u03b3\u0303n \u03b3\u0303n = |h\u0303n| 2G\u03030Gn\n\u03b3s,i Signal-to-noise ration of the source-relay link\n\u03b3r,i Signal-to-noise ration of the source-relay link\n\u03b3tot,i End-to-end signal-to-noise ration\n\u03b3\u0303tot,i Approximation of end-to-end signal-to-noise ratio\n\u03b3th Signal-to-noise plus interference ratio threshold\n\u2206i i-th region of a graph \u01eb \u01eb\u2192 0+\n\u03b5 \u03b5 \u2192 0+\n\u03b71 Energy harvesting efficiency\n\u03b72 Efficiency of the amplifier\n\u03b7 \u03b7 = \u03b71\u03b72\n\u03b70 Photo-detector responsivity\n\u03b8n Power fraction used for information by the n-th user\n\u03b8\u0303n \u03b8\u0303n = ln(\u03b8(n))\n\u03b8 Set of values \u03b81, ..., \u03b8n, \u03b8N\n\u03b8\u0303 Set of values ln(\u03b81), ..., ln(\u03b8n), ln(\u03b8N )\n\u03bb LM set with elements \u03bb1, ..., \u03bbn, ..., \u03bbN\n\u03bbi Lagrange multiplier\n\u00b5 Lagrange multiplier\n\u03bb\u0302i Positive step size\n\u03bdn Additive noise at the n-th user\n\u03bd0 Additive noise at the BS\n\u03bdr,i Additive noise at the relay at the i-th channel\n\u03bdd,i Additive added at the destination at the i-th channel\nxv\nxvi List of Symbols\n\u03be Path loss exponent \u03be0 \u03be0 = \u2212 1\nlog2 cos(\u03a61/2)\n\u03c1 refractive index \u03c10 \u03c10 = P0\nN0W\n\u03a61/2 Ssemi-angle at half luminance\n\u03c6i The i-th eigenvalue of the Hessian matrix\n\u03d5 Irradiance angle\n\u03c4m Time-sharing variable, i.e., portion of time that corresponds to\nthe m-th permutation\n\u03c4 Set of values of \u03c41, ..., \u03c4m, ..., \u03c4M\n\u03c8 Incidence angle\n\u03a8 (\u00b7, \u00b7) Digamma function\n\u03a8fov Field-of-view\n\u03a8fov,1 Field-of-view during phase 1 \u03c32 Noise power\n\u2126 Strategic form of game\nA Peak amplitude of electrical signal\nA1 Peak amplitude of electrical signal during phase 1\nA2 Peak amplitude of electrical signal during phase 2 A\u2032n Peak amplitude of electrical signal transmitted by\nthe n-th neighboring LED\nA\u0303n A\u0303n = \u03b7\u03c10gnT\ntn + 1\nA Matrix with elements A(m, jm,n)\nA(m, jm,n) Index of n-th user with decoding order jm,n\nduring the m-th permutation that correspond to\nan Weight that couples the n-th user\u2019s utility\na\u0303n a\u0303n = \u03b7\u03c10gn\nB Direct current bias\nB1 Direct current bias during phase 1 B\u2032n Direct current bias of n-th neighboring LED B2 Direct current bias during phase 2\nb Rate profile set with elements b1, ..., bn, .., bN\nbn Rate profile parameter of the n-th user b\u0303n b\u0303n = \u03b7\u03c10 \u2211N j=n+1 gj B\u0303i B\u0303i = 1 + \u03b7\u03c10 \u2211N n=N+1\u2212i giTi 1\u2212Ti c1 Price per utilized energy unit\nc2 Price per unit of resources (energy/time) CN (\u00b5, s2) Complex Gaussian distribution with mean \u00b5 and variance s2\nxvii\nc\u0303n c\u0303n = \u03b7\u03c1 \u2211N i=n gi cos(x) Cosine of x\nd\u0303n d\u0303n = N + 1\u2212 n\ndn Distance between the n-th user and the BS/AP df(x) dx Derivative of function f with respect to x D0 Distance between the interfering source (IS) and the BS\nDi Distance of the i-th group of users from the BS\ndsr Distance between the source and the relay\ndrd Distance between the relay and the destination\nE Energy efficiency\ngn gn = \u03b3 2 n E[\u00b7] Statistical expectation\ne Base of the natural logarithm\nexp(x) Exponential of x\nE Set of values with elements EBS,1, ..., EBS,n, ..., EBS,N\nE\u2212n Set E excluding EBS,n\nEBS Amount of harvested energy by the BS\nEBS,n The fraction of the energy dedicated for the transmission to\nthe n-th user\nEn Harvested energy by the n-th user\nE\u0303n Energy harvesting rate of the n-th user\nETS Harvested energy when time-splitting is used\nE\u0303TSBO Harvested energy when time-splitting with DC bias\noptimization is used\nE\u0303TSBO Reformulation of E\u0303TSBO\nF Vector defined as (\u2207EBS,1U1,\u2207q1U1, ...,\u2207EBS,NUN ,\u2207qNUN ) f Scalar function\nF0 Fill factor\nG\u03030 Directional antenna gain of the PB\nG0 Directional antenna gain of the BS\nGn Directional antenna gains of the n-th user Gn Normalized channel power gain, given by Gn = Ln|Hn|2\nN0\nGr,i Gain of the relay over the i-th channel\ngf Gain of the optical filter\ngc(\u03c8) Gain of the optical concentrator\nHn(t) Small scale fading coefficient of the channel between the BS and\nthe n-th user\nh\u0303n Coefficient of the channel between the PB and the n-th user\nxviii List of Symbols\nhn Coefficient of the channel between the BS/AP and the n-th user h\u2032n Coefficient of the channel between the n-th neighboring LED\nand the user\u2019s receiver\nH\u0303n Small scale coefficient of the channel between the PB and the\nn-th user\nhr,i Coefficient of the channel between the relay and the destination\nhr,i \u223c CN (0, \u03c32r,i)\nhs,i Coefficient of the channel between the source and the relay\nhs,i \u223c CN (0, \u03c32s,i)\niAC AC component of electrical current\niAC,1 Part of iAC provoked by the dedicated LED\niAC,2 Part of iAC provoked by other interfering\nsources (not the dedicated LED)\ni0 Output current of Schottky diode\nI0 Dark saturation current\nir(t) Electrical current at the output of the photodetector\nIDC(t) Direct current (DC) signal\nIDC,1 Part of iDC provoked by the dedicated LED\nIDC,2 Part of iDC provoked by other interfering\nsources the dedicated (not the dedicated LED)\nIn Interfering signal received by the n-th user\nI Interfering signal received by the BS\nIL Minimum input bias current\nIH Maximum input bias current\nJ Jain\u2019s fairness index\njm,n Decoding order of n-th user during m-th permutation\nK Maximum number of iterations K1 K1 = Rth\nlog2\n(\n1+ e(\u03b70h1PLED(IH\u2212IL))\n2\n8\u03c0(PI (\u03a8\u2217fov,1)+\u03c32)\n)\nK2 K2 = min\n(\nRth log2(1+ e\u03b3th 2\u03c0 ) , 1\n)\nli The sum of the LM, \u03bbi and the price ci\nLn Path loss/shadowing coefficient of the channel between the\nBS and the n-th user\nL\u0303n Path loss/shadowing coefficient of the channel between the\nPB and the n-th user\nLr Physical area of the photo-detector\nlog2(x) Base-2 logarithm of x ln(x) Natural logarithm of x\nxix\nL Lagrangian function\nL\u0303 Simplified Lagrangian function\nM Number of permutations\nmax(\u00b7) Maximum value of a set of elements\nmin(\u00b7) Minimum among of a set of elements\nMk Subset of users, Mi \u2286 N\nms(t) Modulated electrical signal\nN Set of users\nN Number of users\nNc Number of carriers\nNi Number of users of i > 1-th group\nN0 Noise power spectral density\nP0 Maximum transmission power of the BS P dn Transmit power from the BS to the n-th during downlink pdn p d n = P dn N0W P un Transmit power of the n-th user during uplink PI,j Power of received interference by the j-th user\nPI,0 power of the interference received by the BS pI,j pI,j = PI,j N0W PIS Transmit power of the interfering source pIS pIS = PIS N0W pI,0 pI,0 = PI,0 N0W Pro Received optical signal from other sources p\u0303n p\u0303n = ln(p d n) p The set of values pd1, ..., p d n, , ...p d N p\u0303 The set of values ln(pd1), ..., ln(p d 1), ..., ln(p d N) Prt The total harvested power at the relay\nPr0 Available power from other sources (apart from SWIPT)\nand/or other fixed power needs of the relay\nPs,i Transmitted power by the source on the i-th channel\nPr,i Power transmitted by the relay over the i-th channel\nPrm Maximum allowable transmit power by the relay\nPsm Maximum allowable transmit power by the source\nPs Set of values Pr,1, ..., Pr,i, ..., Pr,N\nPs Set of values Ps,1, ..., Ps,i, ..., Ps,N\nPLED LED power\nPt Transmitted optical signal\nq Set of values with elements q1, ..., qn, ...., qN\nxx List of Symbols\nq\u2212n Set q excluding qn\nqn Product of time and bandwidth allocated to the n-th user\nQ Product of total available time and bandwidth\nR Auxiliary variable\nR\u0303 R\u0303 = ln(R)\nRdn Achievable downlink rate of the n-th user Rdt,n Targeted downlink rate of the n-th user Run Achievable uplink rate of the n-th user R\u0303un Achievable uplink rate of the n-th user\nwhen NOMA-TS is used\nReq Equal rate among users\nRmin Minimum achievable throughput among users\nRtot System throughput\nR\u0303tot Simplified system throughput after the end-to-end\nsignal-to-noise ratio approximation\nRsum Sum of individual data rates\nR0 Lambertian radiant intensity Rdn\u2192j Rate at which the j-th user detects the message intended\nfor the n-th user\nRth Information rate threshold\nrc1 Radius of inner circle\nrc2 Radius of outer circle sd0 Baseband signal transmitted by the BS sdn Baseband signal transmitted by the BS to the n-th user sun Baseband signal transmitted by the n-th user Sn(t) Time allocation parameter, Sn(t) \u2208 {0, 1}\nT Duration of the first phase in two-phase protocols\nTi Auxiliary variable\nt Set with elements t1, ..., tn, ...tN\nt\u0303 Set with elements ln(t1), ..., ln(tn), ... ln(tN)\ntin Time instant\ntn Time allocated to the n-th user\nt\u0303n t\u0303 = ln(tn)\nTtot Total duration of a time frame\nUBS Utility function of the base station\nUn Utility function of the n-th user\nVoc Open circuit voltage\nVt thermal voltage\nxxi\nUi Projection operator\nW Total available bandwidth\nWn Bandwidth of the n-th user or the n-th channel\nyn Baseband signal received by the n-th user\nyr,i Baseband received signal by the relay over the i-th channel\nyd,i Baseband received signal by the destination over the i-th\nchannel\nW(x) Lambert W function\nW0(x) Principal branch of Lambert W function X X = \u03b72E\u0303n\u03b3N0W yRF Received RF band signal z\u2217 Solution of z ln(z)\u2212 z \u2212 \u2211N\nn=1 gn + 1 = 0\nz\u2217n Solution of ln(1 + zn)\u2212 zn 1+zn = bn \u03bbn \u2211N n=1 \u03bbngn bn(1+zn) Zn Zn = 1 +W0 (\n\u2212l1+l2Kn el1\n)\nz\u03031 z\u03031 = \u03b1 exp(R\u0303)\nT\nz\u03032 z\u03032 = \u03b1 exp(R\u0303 \u2212 t\u0303n)\n\u2207 Gradient\n| \u00b7 | Absolute value\n|| \u00b7 || Cardinalilty of a set\n(\u00b7)\u2217 Optimality or solution of an equation \u2202f(x1,...,xi,...,xm)\n\u2202xi Partial derivative of function f with respect to xi\n[.]\u03be max(., \u03be) [\u00b7]+ [\u00b7]+ = min(\u00b7, 0)\n(\u00b7)d Value for the downlink phase\n(\u00b7)u Value for the uplink phase\n(\u0304\u00b7) Conjugate of (\u00b7)\n(\u00b7)[i] The value of (\u00b7) during phase i\n\u2286 Subset\nx!", "In this context, EH, which refers to harnessing energy from the environment, such as solar, wind, and geothermal heat, or other energy sources, such as finger motion, vibrations, breathing, and blood pressure, and converting to electrical energy, is regarded as a promising solution for energy-sustainability of wireless nodes in communication networks and reduction of the OPEX [2].", "ETSBO = F0T (\u03b70hPLEDB1 + IDC,2) Vt ln ( 1 + \u03b70hPLEDB1 + IDC,2 I0 ) + E [2] TS, (5.", "Note that in both policies, during Phase 2, where the aim is to maximize the harvested energy, the FoV setting that maximizes E [2] TS should be used.", "A feasible solution that can considerably reduce the operational expenses (OPEX) and increase the networks lifetime is energy harvesting (EH).", "The simulation results consider the case Ln = 1, Q = 1 and an chosen randomly and uniformly in the range of [1, 2].", "The power consumption of cellular networks also constitutes a large portion of OPEX for service providers [1, 4].", "2)\nTo my family\nAbstract\nThe opportunities arising from the recent advances in multimedia, along with the emerging future internet-of-things (IoT) applications, such as smart cities, health monitoring devices, and driverless cars, are limited by the operational expenses (OPEX) of the base stations (BSs), as well as the finite battery capacity of the involved wireless communication devices.", "An alternative/complementary approach to reduce the OPEX and increase the networks lifetime is energy harvesting (EH), which refers to harnessing energy from the environment."]} +{"23837516|325004": []} +{"23837516|7988320": []} +{"24700515|12029139": [") [3], RF energy harvesting technology has an abundant of energy supplied by ambient signal sources regarding of the system\u2019s location or time of day [4, 5]."]} +{"1471958|12029139": ["I. INTRODUCTION\nRecently, energy-harvesting communications has attracted a considerable interest as a promising solution to prolong the operational lifetime of energy-constrained wireless networks [1]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"15012079|12060835": []} +{"44020388|12029139": ["It is worthwhile to note that sensitivity of information decoder is higher (i.e -60 dBm) than energy harvesting hardware, therefore, \u03c8 is in the range of -30 dBm to -10 dBm [14].", "We assume that R is wirelessly powered by A and B and follows harvest-then-transmit protocol [14]."]} +{"44020388|7851743": ["Use of Smart-phones and portable devices has been exponentially increased due to the advancements in wireless Technologies such as long term evolution third generation and Wi-Fi systems [1]."]} +{"20459813|3504276": []} +{"2690301|12029139": ["Recently, radio-frequency (RF) signals radiated by transmitters provide self-sustainable and controllable energy source for wireless energy harvesting and thus attracts considerable research interests [2], [3]."]} +{"25917339|12060835": ["Energy harvesting (EH) technique emerges in recent years, which enables wireless nodes in a wireless communication network to harvest energy from ambient environment, including the energy of solar, wind, and radio frequency (RF) signals, and sustain the activity of wireless communication perpetually [1]."]} +{"472354|12029139": ["If the source to relay channel is in outage (for simplicity, we refer to this as relay outage), the relay will alert the source and destination nodes by sending a single bit, and EH will be carried out for that entire block."]} +{"49617083|12884178": []} +{"17135672|15880829": ["Due to working in virtual environment, expensive implementation costs are avoided [9]."]} +{"3461906|6779551": []} +{"3461906|12029139": ["Basically, there are three kinds of methods to achieve wireless EH, including resonant inductive coupling [14], [15], magnetic resonance coupling [16], [17] and RF energy harvesting [8], [18], [19].", "One important part of EH is wireless EH [8], [18], [19], through which the ambient or dedicated radio signals can be received and converted into electricity.", "Nevertheless, the power strength of wireless RF energy harvesting is also attenuated 20dB per decade of distance, and it is not efficient or even not suitable when applied to the scenarios with much longer distance [8].", "These methods have been studied extensively [8], [20]\u2013[23].", "Nevertheless, the role of interference in wireless networks is turning from adversarial to beneficial gradually [6], thanks to the recent research advances in wireless energy harvesting (EH) [7], [8]."]} +{"3461906|12060835": []} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"3504276|12029139": ["Another appealing line of related research is simultaneous wireless information and power transfer (SWIPT), which exp lores a dual use of microwave signals to transfer information jointly with e nergy using the same waveform (see [1], [2] and the reference s therein).", "INTRODUCTION The recent advance of microwave wireless power transfer (WP T) technology enables to build wireless powered communication networks (WPCNs), where wireless de vices (WDs) are powered over the air by dedicated wireless power transmitters for communications [1], [2]."]} +{"20715123|3461906": ["Because interference alignment (IA) is a promising technology for interference management in wireless networks [7], N."]} +{"11438682|11047930": ["\u2026protocols for WSNs and WBANs are proposed by considering different applications and topologies in Javaid, Khan, Shakir, et al. (2013), Tauqir et al. (2013), Javaid, Khan, Ilahi, et al. (2013), Javaid, Yaqoob, et al. (2013), Zhang and Sawchuk (2013), Tahir et al. (2013), and Javaid et al. (2013)."]} +{"3321477|12029139": ["Currently, there are few survey articles on SWIPT available [8], [9], [11]."]} +{"12554310|12029139": ["WPC appears in the literature in three basic architectures that refer to different application scenarios; a rigorous s rvey of WPC is given in [1], [2]."]} +{"3513189|3055684": ["It is interesting to note that such a result is analogous to the power allocation in energy harvesting communications [10]\u2013[12]."]} +{"3613646|18451845": ["additional power beacons need to be settled and deployed, which is not a ready work for nowadays communication systems [5]\u2013[8]. Energy harvesting has become an appealing solution to such problems [9]\u2013[11]. Energy from solar, vibration, thermoelectric effects, and so forth [12], can be harvested and converted to electrical energy February 13, 2018 DRAFT arXiv:1802.03809v1 [cs.IT] 11 Feb 2018 2 to suppo"]} +{"3613646|7686677": ["On one hand, the energy consumption is tremendous [4], which makes energy saving for communication a critical problem to be solved."]} +{"3613646|12060835": ["Energy harvesting has become an appealing solution to such problems [8], [9]."]} +{"2718238|3055684": []} +{"56594506|12029139": ["In particular, it has been shown that relay-assisted SWIPT significantly improves the overall transmission performance [8], [9]."]} +{"7902298|11720829": ["The combination of STBCs with MIMO-OFDM was, for example, considered in [19],"]} +{"7902298|18148591": []} +{"3550281|22221919": ["NOMA is one of the major candidates in the design of radio access techniques for 5G [122]."]} +{"3550281|3461906": ["interference management and some open research challenges have been discussed in [18]."]} +{"3550281|21418": ["million connections per square metre [4]."]} +{"3550281|4122595": ["[90]."]} +{"3550281|3055684": ["[14] have discussed a variety of topics including"]} +{"3550281|12029139": ["If the power of signal processing noise is denoted by \u03c3 2 sp, the maximum ID rate of receiver j decoded from the source [11] i can be written as", "in RF EH, but due to the inverse-square law, RF energy transfer is limited in terms of its coverage range [11].", "In [11], a survey is presented based on current research in radio frequency EH networks (RF-EHNs).", "has attracted significant attention in wireless communication networks [10], [11].", "These works [7], [11], [13] have provided valuable insights into foundational aspects of", "When the same receiver is changed to ID mode, ID rate can be calculated using the following equation [11], where W and \u03c3 2 represent the transmission bandwidth and noise power, respectively.", "Only a few survey and overview articles directly related to SWIPT and EH have been published [3], [7], [11], [13]\u2013[23].", "available spectrum while providing fair and efficient sharing of the available spectrum while protecting the primary user from collision [11]."]} +{"8293621|12029139": ["R ECENTLY, integrating energy harvesting (EH) technologies into communication networks has attracted much attention [1]\u2013[11] as it provides an effective way to implement green communications and to extend the lifetime of energy-constrained systems [5], [6], including wireless sensor networks (WSNs) and wireless body area networks, etc.", ", [1]\u2013[3], energy can also be harvested from the signals transmitted by other nodes with fixed and sufficient energy supply, such as power grid or high-capacity batteries, which is known as wireless power transfer (WPT) [5]."]} +{"6465777|1949002": []} +{"6465777|1230643": ["As discussed in [1], the modulation technique should be simple and low-power, and whose characteristics preferably can be tailored according to the channel conditions."]} +{"51975852|12029139": ["Recent researches [4]\u2013[21] investigated the feasibility of applying the WET methods to traditional communication systems where the role of the RF signals has been confined to wireless information transmission (WIT)."]} +{"49322757|15449163": []} +{"115037109|12029139": []} +{"206768132|3055684": ["Simultaneous wireless information and power transfer (SWIPT) is a promising energy harvesting (EH) technique to prolong the operational time of energy-constrained nodes in wireless networks [1], [2]."]} +{"3225335|25911553": []} +{"3225335|3799929": []} +{"3225335|34643772": []} +{"3225335|7525856": []} +{"3225335|8606364": ["CRN radio resource allocation has been discussed in [59]\u2013[61], and green energy-powered CRNs have been presented in [60] and [62]."]} +{"3225335|512561": ["CRNs, especially cognitive radio sensor networks (CRSNs) [246], can greatly benefit from energy harvesting approaches [247]."]} +{"3225335|1541773": ["Energy conservation is an important research domain in wireless communications [60], [62], [250]."]} +{"3225335|8650651": []} +{"3225335|4122595": ["2) Hardware Imperfections: Hardware imperfections in CRNs [107], such as non-linear distortions, phase noise, non-ideal frequency responses of circuits, power amplifier"]} +{"3225335|11414835": ["Network virtualization allows multiple virtual networks to operate over a given single physical network [267]\u2013[270]."]} +{"3225335|1686572": ["Surveys on MAC protocols for CRNs are provided in [50] and [51], while the security, privacy, and threats of CRNs have been surveyed in [52]\u2013[58].", "However, various CRNs related threats, such as primary user emulation (PUE) attacks [56] and others, as discussed in [58], have not been analyzed for FD-CRNs."]} +{"3225335|8974063": []} +{"3225335|8909218": ["2718618 This exceptional growth has motivated the development of next generation wireless technologies, such as femtocells [2], [3],"]} +{"799455|12029139": ["Generally, in the context of IoT, wireless sensor networks (WSNs) and radio-frequency identification (RFID) tags, wireless energy sources can be classified into two categories [6]: 1) Dedicated source : Dedicated RF sources are deployed to provide a predictable energy supply to the device.", "Relay techniques utilized by 5G can benefit wireless/RF energy harvesting [6]."]} +{"799455|12060835": ["Thus, energy harvesting is a promising approach for the emerging IoT [4]."]} +{"18105252|3055684": ["In particular, energy harvesting (EH) technology has recently emerged as a promising approach to power wireless networks with renewable energy sources [2, 3]."]} +{"18105252|7686677": ["Wireless communications is evolving towards a green paradigm with significantly improved energy efficiency and environmental friendliness [1]."]} +{"18105252|12060835": []} +{"254708|12029139": []} +{"254708|12060835": ["The authors of [2, 5] enumerated the practical challenges that may be encountered during the design and development of EH techniques in typical wireless networks.", "Typically, two general energy harvesting architectures are distinguished [5].", "[5] S."]} +{"7620256|3055684": [", solar radiation and wind energy, w hich is promising to achieve green networking [6], [7]."]} diff --git a/edge/graph_67866804.jsonl b/edge/graph_67866804.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c3d820abf59e81dd076ab2bb069bd86adc7d5f6 --- /dev/null +++ b/edge/graph_67866804.jsonl @@ -0,0 +1,43 @@ +{"8097565|13074005": []} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"3398550|13074005": []} +{"10202746|13074005": ["Owing to the requirement of a single radio frequency (RF) chain, the EE of SM is shown to potentially outperform that of conventional MIMO systems [4], [5]."]} +{"32268531|206488441": ["Since its first proposal in the 1970s, the concept of fasterthan Nyquist signaling (FTN) [20], [21] has been rediscovered as a means of increasing bandwidth and energy efficiencies."]} +{"206576720|7686677": ["Meanwhile, with excessive power consumption in wireless communications networks, both carbon emissions and operator expenditure increase year by year [2], [3]."]} +{"38184490|13074005": []} +{"23090021|1580493": ["16 WiMAX, and Long-Term Evolution (LTE) [1].", "Orthogonal frequency division multiplexing (OFDM) has become a ubiquitous digital communications technique as a bene\ufb01t of its numerous virtues, including its capability of providing high-rate data transmission by splitting the serial data into many low-rate parallel data streams [1]."]} +{"7890464|6779551": ["Furthermore, they may become prone to powerful computing attacks due to emerging powerful computing devices [17]."]} +{"34127088|16050825": ["form is modulated onto the instantaneous power of the optical carrier [270]\u2013[274]."]} +{"34127088|13074005": ["For a comprehensive overview of these studies, interested readers are referred to previous survey papers on SM [61], [65]\u2013[67].", "This is another way of exploiting the SM principle [65] and of encoding the information not only in the impulse response of the channel, but in the interplay between antenna radiation pattern and nearby scatterers.", "For a comprehensive historical overview of the SM concept, interested readers are referred to [65]\u2013[68] and the references therein.", "In light of the above discussion on the concept of SM, MIMO systems employing SM provide attractive advantages over their traditional counterparts [65]\u2013[67], [83].", "Similar to the conventional SM principle [65], the receiver can retrieve the information by solving a hypothesis testing problem based on the four radiation patterns depicted in Fig.", "Our survey article also differs from the existing magazines/survey articles/books in the literature [6], [65]\u2013[69] by several aspects."]} +{"775743|13074005": []} +{"25324246|13074005": []} +{"31503239|13074005": []} +{"33703095|13074005": []} +{"52843855|13074005": ["Spatial modulation (SM), which first applies the IM concept into the space domain, can be considered as a special case of multi-input-multi-output (MIMO) techniques [3]\u2013[6]."]} +{"21482398|4395259": ["order to ensure the ability of the intended user to perform successful data decoding, while preventing eavesdroppers from doing so [2], [4].", "The secrecy outage probability can be further defined as [2]", "To cope with this, key-less physical layer security (PLS) has emerged as a new concept and powerful alternative that can complement and may even replace encryption-based approaches [2], [3]."]} +{"19167180|13074005": ["Recently, a new MIMO scheme has been proposed named Spatial Modulation (SM) [3], [4], [5]."]} +{"44690485|19938676": ["have several performance requirements imposed on them that conflict with each other, in terms of not only the peak data rate but also the latency, reliability, traceability, energy efficiency, and number of connections [39], [40]."]} +{"44690485|13074005": []} +{"44690485|11720829": ["For example, in the spatial multiplexing multiple-input multiple-output (MIMO) arrangement [29]\u2013[32], a transmitter sends independent parallel"]} +{"37999332|13074005": ["The authors of [12]\u2013[14] have provided a comprehensive overview of the design guidelines and analysis techniques and tools for various forms of antenna modulation."]} +{"3277486|13074005": ["A new open-loop MIMO scheme that enjoys a single RF chain configuration at the transmitter and successfully treats the inherent problems of MIMO is Spatial Modulation (SM) [10]\u2013 [12].", "Using a half-duplex DF protocol we propose a scheme that achieves information conveyance using R-SM [19] in the first hop and SM [12] in the second hop."]} +{"19888241|16050825": ["short-range wireless transmission [33], [34]."]} +{"19888241|13074005": ["Generalised Space Shift Keying (GSSK): GSSK is a subset of spatial modulation [146], [147], where spatial domain is exploited to modulate information [148]."]} +{"3493146|13074005": []} +{"3493146|7686677": ["However, when the source employs higher-order square QAM in order to increase the attainable transmission rate, a high Peak-to-Average-Power Ratio (PAPR) [110] is encountered, hence requiring a lowefficiency linear power amplifier [111].", "Recently, the energy consumption issue in wireless communication has attracted increasing attention, especially in MIMOaided LTE and LTE-A networks [111], [157].", "Note that although the above-mentioned research demonstrated that SM constitutes an energy-efficient design [111], [157], the current research results are still preliminary and hence further investigations are required."]} +{"2947859|13074005": []} +{"5719427|13074005": ["However, as mentioned in [1], since the fading channel is the inherent modulation unit in SM, the development of a differential scheme for SM faces significant challenges.", "Spatial modulation (SM) [1]\u2013[6] is a recently developed multipleinput\u2013multiple-output (MIMO) technique, in which the information bits are partitioned into two parts, of which one modulates the symbol and the other activates one out of all transmit antennas."]} +{"23717956|13074005": ["Owing to their above-mentioned advantages, SM/SSK have received a considerable attention from the research community [9]\u2013[13], and references therein."]} +{"12724238|1580493": ["ORTHOGONAL frequency division multiplexing (OFDM) has emerged as a promising technology due to its enormous merits, including the high spectral efficiency and the resistance to the multipath fading [1]."]} +{"3770386|875676": []} +{"3770386|13074005": []} +{"32929442|1580493": ["Orthogonal frequency division multiplexing (OFDM) has been widely employed in wireless communications for its high data rate, simple equalization, and efficient resistance to the inter-symbol interference (ISI) [1], [2].", "Due to the aforementioned merits, OFDM has been incorporated into many broadband wireless standards, including the wireless fidelity (WiFi), the Third-Generation Partnership Project (3GPP), Long-Term Evolution (LTE), the HIPERLAN/2 standard, and Worldwide Interoperability for Microwave Access (WiMAX) [1], [3].", "I. INTRODUCTION\nOrthogonal frequency division multiplexing (OFDM) has been widely employed in wireless communications for its high data rate, simple equalization, and efficient resistance to the inter-symbol interference (ISI) [1], [2].", "To combat the ISI effects, the cyclic prefix (CP) is imposed, and the resultant signals are transmitted by antennas after passing through a parallel-to-serial converter (P/S) and a digital-to-analog converter (D/A), where the AWGN channel and the frequency-selective Rayleigh fading channel are considered in this paper."]} +{"5879463|36610012": []} +{"4966956|13074005": ["Spatial modulation (SM), an attractive modulation scheme for multi-antenna communications [5], [6], can alleviate the requirement of multiple transmit RF chains in MIMO systems."]} +{"1053693|13074005": []} +{"20175511|13074005": ["More recent achievements of SM can be found in [7]\u2013[9] and the references therein.", "For the case employing BMST codes, the basic codes for the spatial layer and the signal layer are the SPC codes [2, 1]1600 and [8, 7]400, respectively.", "75 bits/channel-use using the Cartesian product of the SPC code [2, 1]400 \u00d7 [8, 7]100 as the basic code, i.", "5 bits/channel-use using two BMST encoders with the repetition and single parity-check (RSPC) codes [19] [20, 7]135 and [20, 9]270 as basic codes for the spatial layer and the signal layer, respectively, where L1 = 100, L2 = 97, m1 = 5, m2 = 8, and d = 30.", "75 bits/channel-use using two BMST codes with the Cartesian product of the single parity-check (SPC) codes [2, 1]400 and [8, 7]100 as the basic codes for the spatial layer and the signal layer, respectively."]} +{"7312779|13074005": ["This constitutes the main difference between our PSM/GPSM and the classic SM/GSM [12], [20], [21], although they may be considered as dual pair of each other.", "To elaborate a little further, SM conveys extra information by mapping additional bits to the transmit antenna indices in addition to the classic modulation schemes as detailed in [12], [13].", "As a result, the comparisons between PSM/GPSM and SM/GSM cannot be readily made under identical circumstances, because\n\u2022 the inevitable complexity of pre-processing imposed by PSM/GPSM is not imposed on SM/GSM. \u2022 the channel knowledge requirement of PSM/GPSM is more demanding than that of SM/GSM, since the former suffers further from potential feedback impairments in addition to the channel estimation errors encountered at the receiver, that are common for both schemes.", "Hence, in summary, the PSM/GPSM scheme proposed in this paper constitutes a complement, rather than a competitor of the classic SM/GSM.", "More importantly, they may be used in a hybrid manner in conjunction with SM/GSM."]} +{"2655244|7686677": ["The unprecedented growth not only enlarges the demand for spectrum resource, but also induces environ\u00ad mental problems due to the increasing carbon emissions [1].", "Therefore, green communications has been put forward to cut the energy consumption of the communication networks [1]-[5]."]} diff --git a/edge/graph_67866922.jsonl b/edge/graph_67866922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2917a664d47fc19ca0927adc2cef94e3871f0e5d --- /dev/null +++ b/edge/graph_67866922.jsonl @@ -0,0 +1,4 @@ +{"3462456|162600": ["Finally, the results presented in this work provide additional evidence on the recent discussion in computing education research that has highlighted the importance of replication studies [1, 16] for examining whether results from one context generalize to others"]} +{"58004353|162600": []} +{"58004353|12377645": ["[405] conducted a systematic literature review on the use of robots as tools in introductory programming."]} +{"58004353|10565822": ["[554] provided a comprehensive overview of novice"]} diff --git a/edge/graph_67866982.jsonl b/edge/graph_67866982.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ec1a27d84aaccc9a9ec629b00afbfc6b9191224 --- /dev/null +++ b/edge/graph_67866982.jsonl @@ -0,0 +1,28 @@ +{"206703948|1805048": ["Sim PCC a; b\n\u00bc P\np 2 P ra; p ra\u00f0 \u00de rb; p rb\u00f0 \u00de ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiP\np 2 P ra; p ra\u00f0 \u00de2 q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiP p 2 P rb; p rb\u00f0 \u00de2 q \u00f01\u00de\nAlgorithm 2: Attack prediction Input: attack paths, affected assets, vulnerabilities Output: predicted attacks #Vulnerabilities refers to common vulnerabilities between assets load vulnerabilities apply equation 1 using vulnerabilities as input\nget similarity values #If there are common vulnerabilities, then typically these receive the same score #between assets, thus, resulting in absolute similarities #Then we rearrange the order of the similarity by adding the number of co-rated #items as a constraint #classification refers to predicted attack classification, which is from very high to #very low\nthen #n is the number of co-rated items and x1, x2, x3 and x4 are fixed integers if n>=x1 then classification == very high\nelse if n=x2 then classification == high else if n=x3 then classification == Medium\nelse if n=x4 then classification == Low else classification == very low\nthen get attack paths\nif attack path exists set classification == very high else if attack path does not exist && classification == very high then classification == high else classification == classification\nReturn predicted attacks", "In PCC Sim (a, b) is the similarity of users a and b, ra,p is the rating of user a for product p, rb,p is the rating of user b for product p and ra, rb represent user\u2019s average ratings.", "As explained above a database of ratings and a similarity function such as PCC are the two essential parts of the CF recommendation process.", "However, since the definitions of PCC and WPCC numerous approaches have been proposed with the aim of improving the recommendations.", "In both approaches the user similarities are adjusted either in a positive or a negative way based on the number of co-rated items and the PCC values and are assigned to one of multiple levels based on the final computed value.", "Except for the classical recommendation method, PCC, another similar method found in the literature is weighted\nPCC (WPCC) which extends PCC by setting a statically defined threshold of common rated items.", "The matrix is used as input when a user is requesting recommendations and for a recommendation to be generated the degree of similarity between the user who makes the request and the other users\u2019 needs to be predicted using a similarity function such as the Pearson Correlation Similarity (PCC) [3].", "To do that we initially apply classical collaborative filtering using PCC defined in Eq."]} +{"17211002|6430931": ["\u2013 However, its major difficulty lies in discovering boundaries between normal and abnormal behavior, due to the deficiency of abnormal samples in the training phase [58], i.", "Reference [58] suggested a solution to regularly update the knowledge base, either manually which is time consuming and laborious, or automatically with the help of supervised learning algorithms.", "Audit data is compared with detection models, which describe the patterns of intrusive behavior, so that both successful and unsuccessful intrusion attempts can be identified [58].", "\u2013 Another difficulty is to adapt to constantly changing normal behavior, especially for dynamic anomaly [58].", "1 depicts the organization of an IDS where solid lines indicate data/control flow, while dashed lines indicate responses to intrusive activities [58].", "ANNs have the ability of learning-by-example and generalizion from limited, noisy, and incomplete data [58].", "Characteristics of intrusion detection systems [58].", "Page 2 of 19 Ac ce pt ed M an us cr ip t to realize decision boundaries between normal and abnormal behavior, and a requirement for continuous adaptation to a constantly changing environment [58].", "Anomaly IDS Classifications Generally speaking, anomaly detection can be either [58]: \u2013 Static anomaly detection: This assumes that the behavior of monitored targets never changes, such as system call sequences of an Apache service.", "Organization of a generalized intrusion detection system [58]."]} +{"26503631|6357481": []} +{"26503631|37590153": []} +{"916066|393948": ["Representation-learning algorithms [13-15] can help supervised learning techniques to achieve high classification accuracy with computational efficiency."]} +{"44066253|207209718": ["A large number of intrusion detection approaches have been proposed for ICPSs, as summarized in a recent survey paper [14].", "With the BN model, as well as real-time intrusion detection evidences [14], the probabilities of compromise for sensors and actuators can be inferred."]} +{"8722112|8364569": ["[1, 22] was captured in the University of Twente network by monitoring a honeypot.", "Modern Intrusion Detection Systems (IDSs) analyze the content of network packets to predict attacks; however, inspecting individual packets has become a fairly hard task with today\u2019s high speed Gigabit networks which carry vast volumes of network traffic [1].", "Flow-based intrusion detection process complements the typical packet inspection intrusion detection approach [1].", "[1, 22] were the first who contributed a labeled flow based dataset intended to train and evaluate flow based intrusion detection techniques."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"5206264|3330313": ["Outlier analysis has been reviewed in [1], [2], [3]."]} +{"13751408|1805048": ["Collaborative filtering is the most known and widely used technique for providing fast and accurate enough recommendations to users (Shi et al., 2014; Ekstrand et al., 2011; Konstan & Riedl 2012; Su & Khoshgoftaar 2009 )."]} +{"3971049|448220": ["It is not only faced with the security problems of hardware and software in traditional information system, but encountered other kinds of service quality problems, such as response quality and performance quality [1]."]} +{"108393727|12815020": []} +{"108393727|13785718": []} +{"27888560|16621677": []} +{"52147944|8364569": ["The majority of detectors use flow-based network monitoring [25] and flow-based intrusion detection [26], which can be deployed in campus networks as well as on the backbone."]} +{"207223163|15247126": ["A covert channel tries to hide the very existence of any communication [Lampson 1973; Zander et al. 2007] by using a channel that is usually not intended for communication (e.g., timing information in between packets or unused bits in the IP header).", "Afterward, adversary could use covert channels [Zander et al. 2007] to send sensitive data outside the protected network."]} +{"207223163|14697846": []} +{"18797215|12815020": []} +{"18797215|6430931": []} +{"12412442|8364569": ["(iii) Flow-based abstraction can deal with encrypted attack payload [12], which cannot be dealt with by packet-level analysis."]} +{"63330341|12815020": []} +{"63330341|6430931": []} +{"3359480|2867949": ["In another survey, Bhuyan et al. [20] elaborated on port scans and their detection methodologies.", "This also covers new material after 2010, the year of the latest related survey [20]."]} +{"17427840|55524073": ["One of the main research areas in honeypot technology concerns with utilization of the output data collected by the honeypots [6]."]} +{"13745657|1805048": ["\u2026input when a user is requesting recommendations and for a recommendation to be generated the degree of similarity between the user who makes the request and the other users\u2019 needs to be predicted using a similarity function such as the Pearson Correlation Similarity (PCC) (Su & Khoshgoftaar, 2009).", "As explained above a database of ratings and a similarity function such as PCC are the two essential parts of the CF recommendation process.", "However, since the definitions of PCC and WPCC numerous approaches have been proposed with the aim of improving the recommendations.", "In PCC Sim (a, b) is the similarity of users a and b, r a,p is the rating of user a for product p, r b,p is the rating of user b for product p and , represent user's average ratings.", "In both approaches the user similarities are adjusted either in a positive or a negative way based on the number of co-rated items and the PCC values and are assigned to one of multiple levels based on the final computed value.", "The matrix is used as input when a user is requesting recommendations and for a recommendation to be generated the degree of similarity between the user who makes the request and the other users\u2019 needs to be predicted using a similarity function such as the Pearson Correlation Similarity (PCC) (Su & Khoshgoftaar, 2009).", "To do that we initially apply classical collaborative filtering using PCC defined in equation 1.", "Except for the classical recommendation method, PCC, another similar method found in the literature is weighted PCC (WPCC) which extends PCC by setting a statically defined threshold of common rated items."]} +{"4015727|55524073": []} diff --git a/edge/graph_67867022.jsonl b/edge/graph_67867022.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..45e9d8fe30a5613edc3bc8227d8471340227e137 --- /dev/null +++ b/edge/graph_67867022.jsonl @@ -0,0 +1,72 @@ +{"11735758|8364569": ["Contrary, a detection approach based on an analysis of network flows scales well and is capable of capturing a wide spectrum of attacks [15]."]} +{"7794652|8697076": ["2 DRDoS attack strength in recent years [4].", "Figure 2 shows typical DRDoS attacks in 2013 and 2014 [4].", "The work [4] showed that the bandwidth used in DRDoS attacks is growing."]} +{"30870611|206584087": ["For the first \u2010 level neural network, the number of hidden neurons h is given by a widely used empirical formula \ufb03\ufb03\ufb03\ufb03\ufb03\ufb03\ufb03\ufb03\ufb03\ufb03 p 38 where q is the number of neurons in the input layer, and t is the number of neurons in the output layer, and a \u2208 [1,10]."]} +{"17295778|206584087": ["The performance related anomalies include transient congestion, file sever failure, broadcast storms and so on, and security related network anomalies are often due to DDoS attacks [36\u201339] that flood the network to prevent legitimate users from accessing the services."]} +{"17295778|825893": []} +{"1721913|1333339": ["Trust evaluation and management were also applied to ensure MANET security as a supplement to cryptographic measures for malicious node detection, information assessment and node authentication [Govindan and Mohapatra 2012]."]} +{"1721913|9240891": ["Global and Hybrid Trust Management vs. Distributed Trust Management In our previous work [Yan et al. 2011, 2014b; Shen et al. 2014], a global trust management system was proposed to evaluate the trust of each system entity in order to decide how to control the unwanted traf\ufb01c from a speci\ufb01c source.", "\u2026is the technology to collect information to make a trust decision; evaluate the criteria related to trust; monitor and reevaluate existing trust relationships; thus ensure the dynamically changed trust relationships and automate these processes [Grandison and Sloman 2000; Yan and Prehofer 2011]."]} +{"10311979|206584087": ["Many papers classify DDoS attacks and their detection/prevention mechanisms [49], [50], [51]."]} +{"10311979|6670217": ["Additionally, many attacks that occur in other environments may also appear in ICN environments [19], [20], [21], [22], [23], [24]."]} +{"10311979|7971188": ["ICN has some similarities and differences with other related technologies like distributed database (DDB), data grids, peerto-peer networks (P2P), content distribution networks (CDN), and cloud computing [4], [5]."]} +{"2567879|9104850": ["The World Wide Web (WWW) is one of the most popular applica\u00adtions currently \nrunning on the Internet and has driven the rapid growth of the Internet [Wang 1999]."]} +{"11998909|8364569": ["In several review papers [26\u201332] various network anomaly detection methods have been summarized."]} +{"11998909|3330313": ["In surveys such as [24,25], authors discuss anomaly detection in general and cover the network intrusion detection domain only brie\ufb02y."]} +{"32441310|13172512": ["Machine learning has been extensively used for network traffic classification [78]."]} +{"14729552|206584087": ["There are many researches to detect and mItIgate net\u00ad work layer distributed denial-of-service (DDoS) attacks [2], [3].", "Therefore many conventional DDoS detection or mitigation schemes, e.g., [2], [3], are ineffective against the target link flooding attack."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"44433229|18189153": ["Another survey for intrusion detection and prevention system in MANETs is presented in Nadeem and Howarth (2013).", "Another survey for intrusion detection and prevention system in MANETs is presented in (Nadeem and Howarth, 2013)."]} +{"44433229|8364569": ["However, flow-based intrusion detection is not matured enough to replace the traditional packet-based techniques (Sperotto et al., 2010).", "Sperotto et al. (2010) give detailed survey of flow-based intrusion detection systems.", "An earlier survey of flow-based techniques, conducted by Sperotto et al. (2010), is now seven years old."]} +{"44433229|8793295": ["Traditionally, intrusion\ndetection systems use deep packet inspection (AbuHmed et al., 2008) or stateful protocol analysis to detect attacks in the network traffic.", "Traditionally, intrusion detection systems use deep packet inspection (AbuHmed et al., 2008) or stateful protocol analysis to detect attacks in the network traffic."]} +{"44433229|6430931": ["A survey of intrusion detection systems using computational intelligence techniques is given in Wu and Banzhaf (2010)."]} +{"8697076|206584087": ["[11] classifies DoS defenses into two categories: (i) network/transport-level, and (ii) application-level.", "with many attackers sending packets to a single location [11]."]} +{"206576808|206584087": ["1) Detection Approaches: In this section, we discuss four deployment points for DDoS defense mechanisms, viz., source-end, victim-end, intermediate and distributed [56]."]} +{"206576808|6670217": ["Due to the constraints as stated above, mobile environments are typically less secure and their specific characteristics pose several challenges to mobile botnet and malware detection [47]."]} +{"206576808|8364569": ["2) Detection Methods: Literature survey shows a significant number of publications on anomaly detection systems [59], [60], [61],[62], [63], [64], [65], [66]."]} +{"206576808|13172512": ["Many machine learning algorithms have been used to detect anomalies present in network traf\ufb01c [88]."]} +{"206576808|2906773": ["A large number of hardware-based network infrastructure security mechanisms are presented in [70]."]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"14042725|10693567": ["Being one particular technology for Software-Defined Networking (SDN), it separates the control plane and data plane of networking devices [22]."]} +{"14042725|13456854": ["Since IPFIX is still in its early days and NetFlow deployment is far more mature [3], most literature on flow data artifacts is about NetFlow (especially v9).", "For example, a recent survey among both commercial and research network operators has shown that 70% of the participants have devices that support flow export [3]."]} +{"14042725|8364569": ["The central observation points at which flow export devices are usually deployed make flow export especially useful for the detection of the following attacks and malwares [84]: DDoS attacks, network scans, worm spreading, and botnet communication.", "survey on flow-based intrusion detection provided in [84]."]} +{"6684433|9240891": []} +{"23983780|206584087": ["Several methods have been proposed to mitigate such attacks [4-5]."]} +{"14728946|206584087": ["Low-Rate DoS Attacks Detection Based on Network Multifractal\nZhijun Wu, Liyuan Zhang, and Meng Yue\nAbstract\u2014Low-rate denial of service (LDoS) attacks send periodic pulse sequences with relative low rate to form aggregation flows at the victim end."]} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"207237250|18567112": []} +{"207237250|11585698": []} +{"8793295|8450611": ["TCAM memory stores the data with three logical values (i.e., 0, 1, ? don\u2019t care) and its circuit diagram construct as illustrated in Figure 3(b) [ 41 ].", "However, TCAM has some general disadvantages which are as following [ 41 ]:", "Furthermore, each entry stores the value which is considered to be intruder signature and entries arranged in descending index as illustrated in Figure 3(a) [ 41 ].", "1. Ternary content addressable memory (TCAM) implementation [ 41 ]", "Nowadays, the most popular HW techniques which are used in commercial packet inspection products are content addressable memory (CAM) [ 41 ]."]} +{"20786481|2623404": ["forwarding in ICN is aligned with the decoupling of the data plane and control plane in SDN [18].", "Current Internet is information-driven, yet networking technology is still focused on the idea of location-based addressing and host-to-host communications [18].", "OpenFlow provides optional support for encrypted Transport Layer Security (TLS) communication and a certificate exchange between the switches and the controller(s) [18].", "ONF presents a high-level architecture for SDN that is vertically split into three main functional layers including infrastructure layer, control layer and application layer [9], [11], [18]\u2013[20], as shown in Fig."]} +{"20786481|10693567": ["DDoS defender can monitor the flows of OpenFlow switch and detect the DDoS attack via volume counting [31], [77].", "SDN as follows [10], [11], [31], [70], [71].", "architecture is that if a switch fails, the availability of the network can be maintained [31].", "4) Software-based traffic analysis: Software-based traffic analysis greatly enables innovation, as it is possible to improve the capabilities of a switch using any software-based technique [31]."]} +{"20786481|2387055": ["3) Programmability of the network by external applications: The programmability of SDN supports a process of harvesting intelligence from existing Intrusion Detection Systems (IDSs) [72] and Intrusion Prevention Systems (IPSs) [33].", "Security analysis has showed that the SDN framework suffers many security threats, including [33]:", "The authors of [33] point out that three issues of SDN include trust between all involved layers, SDN\u2019s control plane centralization and limited space in flow-tables.", "Based on the analysis, new or updated security policy can be propagated across the network in the form of flow rules [33]."]} +{"20786481|206584087": ["every packet passing through the router using Bloom Filter, which is a hash structure to reduce the memory requirement to store packet records [35].", "They generally consume less bandwidth and are stealthier in nature compared to volumetric attacks, since they are very similar to benign traffic [35].", "1) Network/transport-level DDoS flooding attacks: These attacks have been mostly launched using TCP, UDP, ICMP and DNS protocol packets and focus on disrupting legitimate user\u2019s connectivity by exhausting victim network\u2019s bandwidth [35].", "HTTP sessions and employs rate-limiting as the primary defense mechanism [35], [63]).", "Since attackers cooperate to perform successful attacks, defenders must also form alliances and collaborate with each other to defeat DDoS attacks [35].", "The authors of [35] focus on DDoS flooding attacks and defense mechanisms in wired network", "Multiple locations defensive is comprised of multiple defense nodes deployed at various locations such as source, destination or networks [35].", "fication to each packet) so that the victim can identify the path of attack traffic and distinguish it from legitimate traffic after the detection [35].", "Several taxonomies of DDoS attacks defense mechanisms have been presented in the literature [35], [37], [54].", "However, application-level DDoS flooding attacks usually have the same impact to the services since they target specific characteristics of applications, such as HTTP, DNS, or Session Initiation Protocol (SIP) [35]."]} +{"11477596|3042864": ["The aforementioned limitations served as motivation for a new computing paradigm called MCC that enhances the abilities of mobile devices by moving the storage and compute intensive tasks of mobile to the cloud [56,82]."]} +{"11477596|13210924": ["The resources are provided to the users and released based on demands from the pool of shared resources [4].", "The consumers (individuals and business organizations) no longer need to invest heavily in the information technology (IT) infrastructure [4]."]} +{"11477596|13916820": []} +{"11477596|12017064": ["The security solutions have also been presented in [71].", "[71] reviewed the security issues at different levels of cloud computing."]} +{"779908|12815020": ["Therefore, the most deployed signature based detection systems are ineffective to detect unknown attacks or variation of known attacks [11]."]} +{"231188|8364569": ["To collect statistical information and build a \u201cbaseline\u201d, the behavior-based NID systems inspect the payloads of every network packet to find known or unknown attacks [23, 26]."]} +{"231188|13172512": ["When a host infected by Storm worm, it receives an initial list of 290 possible \u201cpeer nodes\u201d from the botnet and attempts to contact each peer node to obtain more updated list of \u201cpeer nodes\u201d [19]."]} +{"10726615|8364569": ["s [126] conducted an overview of IP flow-based intrusion detection that focused on flow-based IDS, concept of flows, classification of attacks, and defense technique.", "IDSes can be categorized based on how they identify intrusions: anomaly-based, misused-based (knowledge-based or signature-based), or combination of both anomaly and misuse-based [126]."]} +{"10726615|13172512": ["\u2026to this survey but not specific to NetFlow-like applications can be found in [102] for IP-Flow based intrusion detection, [160] for botnet detection, [98] for internet traffic classification using machine learning, and [123] for discussion of using machine learning for network intrusion detection."]} +{"8892586|206584087": []} +{"1159742|825893": []} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"15757259|18977370": []} +{"11784536|206584087": []} +{"5719031|13172512": ["R) and Chi Square are applied to the selected parameters [5][6]."]} +{"3440098|206584087": ["attacks supported by military or terrorist organizations [6]."]} +{"168620381|1333339": []} +{"168620381|9240891": []} +{"781992|3994942": ["routes on a time scale ranging from tens of minutes to hours and days [15], though more commonly in days and weeks [38, 39, 16].", ", hours and days [15, 16]) whereas online traffic engineering techniques cannot offer strong stability guarantees [17], particularly when multiple ISPs need to coordinate their responses to counter an attack, and hence cannot be deployed in the Internet backbone.", "Even though it is not frequently used by ISPs due to its potential instability problem, online traffic engineering occurs on a smaller time scale, namely from minutes to hours [16, 17].", "2) Traffic engineering: Most commonly, ISPs use offline traffic engineering techniques, whereby network parameters are periodically re-optimized based on the estimated traffic matrix among the ingress/egress points of their networks [16]."]} diff --git a/edge/graph_67867427.jsonl b/edge/graph_67867427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1746c67ae7132d3284bc58c3f187cbb97968a160 --- /dev/null +++ b/edge/graph_67867427.jsonl @@ -0,0 +1,73 @@ +{"33848460|29464310": ["That is why the requirements for the CPRI interface are quite tight, which makes this interface quite rigid (static) and costly.", "Fronthaul links are typically point to point links used exclusively by speci\ufb01c fronthaul protocols, such as Common Public Radio Interface (CPRI) [3].", "Fronthaul links are typically point to point links used exclusively by specific fronthaul protocols, such as Common Public Radio Interface (CPRI) [3].", "The packet switched network is the primary path for the transport of most delay-tolerant traf\ufb01c, the circuit switching path complements the packet switched path for those traf-\ufb01c that is not suited for packet-based transport or has an extremely low delay tolerance (e.g., legacy CPRI), the circuit switching path can also be used to reduce the of\ufb02oad of the XPFE.", "For example, CPRI uses a continuous constant bitrate-like transmission, and it is not packetized.", "Current deployment of OBSAI [12] or CPRI [3] for the fronthaul traf\ufb01c is mainly using dark \ufb01bers to the Remote Radio Heads as other technologies do not meet the stringent requirements of latency (e.g., about 100 (cid:2) s for CPRI) and jitter (2 ppb).", "Current deployment of OBSAI [12] or CPRI [3] for the fronthaul traffic is mainly using dark fibers to the Remote Radio Heads as other technologies do not meet the stringent requirements of latency (e.", "Where necessary, the frame format is mapped to the XCF format for forwarding by the XPFEs (e.g., CPRI over Ethernet)."]} +{"20165779|11414835": ["One of the main component of virtualisation is the hypervisor [12]."]} +{"52059869|206578224": ["[8] focus on how Multi-access Edge Computing", "intelligence and control as advocated by [8] and [93]."]} +{"52059869|206456479": []} +{"52059869|25911553": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|10342730": ["To the best knowledge of the authors, there are no detailed surveys on the topic of network slicing in the literature, except those presented in [6], [7], [9].", "Likewise, in [7], the authors describe how wireless network resources can be adequately allocated to network slices without the resources of one slice negatively impacting the quality of others and with a focus on the Radio Access Net-"]} +{"52059869|6583734": ["Other relevant articles in light of network slicing and its enablers such as Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are also presented in [10], [11], [85] and [12]\u2013[14], respectively."]} +{"52059869|11414835": []} +{"52059869|12017064": ["Security concerns in virtual or cloud platforms are well determined [167], [168]."]} +{"52059869|4269723": ["SDN provides key characteristics such as flexibility, service-oriented adaptation, scalability, and robustness [72], which are essential for"]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"35418901|4502294": ["Linked to this, work in [11] surveys all transport network solutions available for fronthaul and discusses the impact of such technologies in the RAN context."]} +{"52278646|8650651": ["Authors in [67] studied the area of Software Defined Optical Networks (SDONs) focused on the infrastructure layer, the control layer, and the application layer."]} +{"4661452|19938676": []} +{"33522201|29464310": ["The first option to connect a RRH and the BBU consists of transmitting the pure sampled radio signal [10]."]} +{"29961834|29464310": ["Currently, Common Public Radio Interface (CPRI) is the most widely used specification, which transports the digitized wireless-baseband samples over a link.(3) Basic frames (BFs) are exchanged between BBU and RRU at a constant bit rate: 1 basic frame every 260.", "The fronthaul packets are assumed to carry CPRI Option 2 basic frames, which has 40 bytes of IQ samples and control word.(3) Since the minimum Ethernet packet size is 64 bytes, the fronthaul packets are assumed to be of that size."]} +{"2318872|61647869": ["ports the radio frequency signal over an optical fiber link by converting the electrically modulated signal to an optical signal [90]\u2013[92]."]} +{"2318872|4502294": ["Another direction is to examine and improve the interactions of the R-FFT remote nodes and headends (BBUs) with the corresponding metropolitan area networks [119]\u2013[123] and radio backhaul (core) networks [124]\u2013[126]."]} +{"2318872|29464310": []} +{"2318872|8650651": ["wireless and optical network segments that each conduct their own specific physical and medium access control layer processing [94], [96], [97]."]} +{"2318872|14765802": ["Mechanisms to reduce the carbon foot print of access networks have recently been investigated in wireless networks [43]\u2013[49] as well as cable networks [50]\u2013[52]."]} +{"3555847|4502294": ["means is to incorporate innovative wireless technologies for instance mm-wave, in-band links (reuse the radio access spectrum), and FSO communications [211], [212]."]} +{"3555847|29464310": ["is based on the implementation of the digital radio over fiber (D-RoF) concept [25].", "toward RoE, Encapsulations, as well as Mappings and are expected to define a native RoE format [25].", "split defined by the CPRI is given in [25].", "adjustable oscillators or Global Positioning System (GPS) signals are under study for addressing the timing issue [25].", "Additional study on the main design features, transmission of user plane data, implementation, and requirements of CPRI are presented in [25].", "The two types that are defined by radio equipment manufacturers are CPRI and OBSAI specifications [25].", "The resulting connectivity segment is called fronthaul [9], [13], [25], [36], [54].", "OBSAI protocol [4], [25], [214], [217], [222].", "The impact of this can be seen in the inter-cell interference cancellation in the cellular networks based on coordinated multiple point (CoMP) transmission and reception as well as network-MIMO [14], [25], [41].", "port the explosive capacity demand of mobile traffic with relatively minimum TCO [24], [25]."]} +{"3555847|8650651": ["At the ONUs, the required data are filtered by the corresponding ONU [321].", "This aids the SDN controller in modifying the amplifiers adaptively in order to compensate for channel impairments and consequently, minimize the energy consumption [321].", "So, in this subsection, we present different mechanisms that can be employed for regulating PHY layer features of optical communication infrastructures via the SDN [321], [322].", "This also encourages seamless co-existence and multi-tenant network on the shared infrastructure in an optimal and cost-effective way [321], [332].", "In this section, we present software-defined optical network (SDON), which is a means of leveraging the flexibility and scalability of SDN control in order to support different network applications over the optical network infrastructures [321].", "In [320], a testbed for emulating a heterogeneous cloud environment has been presented in order to validate the OpenFlow extensions for the flexible grid DWDM [321].", "This enables the tables to be configured by the OpenFlow information within the circuit switches [321].", "This can be realized by inserting \u201cmodulation_format\u201d field into the OpenFlow cross-connect table entries in order to facilitate SDOTs programmability [321], [338].", "This enables SDN-control of the required subcarrier bitrate, number of subcarriers, and LDPC coding rate of the transponder [321], [331]."]} +{"3555847|19938676": []} +{"20244862|13019489": ["spectrum sharing schemes for licensed spectrum, we refer the reader to [23]."]} +{"20244862|8606364": ["Several different spectrum occupancy models are surveyed in [64] and [65]."]} +{"20244862|3555631": ["A survey of existing literature on the control-/data-plane separation for cellular radio access networks is provided in [159]."]} +{"20244862|19938676": []} +{"20244862|11414835": ["Reference [30] provides a survey of virtualization hypervisors for SDN networks."]} +{"20244862|12206204": ["This paper is not a general survey of 5G: such works already exist in [4]\u2013[7]."]} +{"20244862|2623404": ["In the OpenFlow architecture, flow-entries in the flow table generally consist of three components [26]: \u2022 Matching rules to associate incoming packets with flows.", "A more comprehensive overview of SDN and its implications in terms of programmable networks is provided in [26], in which the authors also provide a comparison between two of the most popular SDN architectures/standards; OpenFlow and ForCES."]} +{"20244862|13074005": ["For more information on SM, we refer the reader to the following articles, [13], [14], [83], [84].", "[13], [14] Spatial modulation Focuses specifically on the area of spa-"]} +{"49184318|29464310": []} +{"52909233|67867427": ["For a complete overview of the options currently researched are referred to in [17]."]} +{"52195679|10342730": ["An extensive survey on network slicing can be found in [20], highlighting the major problems associated with network slicing and isolation between slices."]} +{"23892954|10342730": ["An extensive survey on network slicing can be found in [11]."]} +{"52169298|52059869": ["However, such NFV mechanisms would require hypervisor and control plane management [371]\u2013[375]."]} +{"52169298|206578486": []} +{"52169298|25746527": []} +{"52169298|7942157": ["[34] focuses on waveform designs, wireless protocol optimizations, microwave backhaul architectures, SDN architectures for backhaul and core networks, and content caching mechanism for 5G.", "In particular, we first give a brief overview of the main ULL research directions in the 5G wireless access segment and refer to the extensive 5G wireless access literature for more details [34], [35], [229], [258]\u2013[260]."]} +{"52169298|22221919": ["In particular, we first give a brief overview of the main ULL research directions in the 5G wireless access segment and refer to the extensive 5G wireless access literature for more details [34], [35], [229], [258]\u2013[260]."]} +{"52169298|206578224": ["puting, see [25]\u2013[28]."]} +{"52169298|1119376": ["(ADAS) 100\u2013250 \u03bcs few \u03bcs Power Train, Chassis Control < 10\u03bcs few \u03bcs Traffic Efficiency & Safety < 5 ms few \u03bcs Infotainment [57] Augmented Reality 7\u201320 ms few \u03bcs Prof."]} +{"52169298|6909107": ["puting, see [25]\u2013[28]."]} +{"52169298|37497601": [", time synchronization protocols have been surveyed in [18], [19], routing protocols have been surveyed in [20]\u2013[22], while congestion control protocols have", "Timing differences may arise because of clock errors, synchronization errors, as well as tracking and estimation errors [18].", "The gPTP synchronizes clocks between network devices by passing relevant time event messages [18]."]} +{"52169298|29464310": ["Split options defined by eCPRI the steps above the horizontal dashed line are processed at the BBU and the steps below the dashed line are processed at the RRH: Split E corresponds to the CPRI data, split ID corresponds to the eCPRI downlink data after scrambling, split IID corresponds to the eCPRI downlink data after pre-coding, and split IU corresponds to the eCPRI uplink data after RE-demap [243].", "However, due to time sensitive properties, TSN Ethernet is being considered as a potential candidate L2 protocol for 5G fronthaul applications as an alternative to the Common Public Radio Interface (CPRI) and eCPRI [243] protocols.", "a) Optical Transport Techniques: The Common Public Radio Interface (CPRI) [243], see Section VII-A1, imposes an overall fronthaul link delay limit of 5 ms, excluding the", "a) CPRI: The Common Public Radio Interface (CPRI) [243] is a digital interface for transporting information between Radio Equipment (RE) and Radio Equipment Control (REC)."]} +{"52169298|206576469": ["Thus, in brief, whereas the survey [17] broadly covered all latency sources up to 2014, we comprehensively cover the link and network layer latency reduction standards and studies up to July 2018.", "A survey on general techniques for reducing latencies in Internet Protocol (IP) packet networks has been presented in [17].", "The survey [17] gave a broad overview of the sources of latencies in IP networks and techniques for latency reduction that have appeared in publications up to August 2014."]} +{"52169298|11414835": []} +{"52169298|29060869": ["Also, the impact of wireless protocols on latency has been covered in a few surveys [29]\u2013[35], while smart grid communication has been covered in [36]."]} +{"52169298|2623404": [", based on a design similar to software defined networking (SDN) [81], [82], with message"]} +{"52169298|35906806": ["Additionally, autonomous automotive vehicles [6], augmented and virtual reality (AR/VR), as well as robotic applications, which are essential for Industrial IoT (IIoT), may require both high data rates as well as ULL [7]\u2013[10]."]} +{"51720950|4269723": ["[2] W.", "In order to do so, 5G-Crosshaul embraces software defined networking (SDN) and network functions virtualization (NFV) principles, since traditional network management approaches based on the configuration of proprietary devices are cumbersome, error-prone, and inefficient [2]."]} +{"4632417|8650651": ["technology, a comprehensive survey of SDN is shown in [49], and an SDN-controlled digital signal processor enabled"]} +{"49189947|4502294": ["By 2020, the demanded bandwidth is predicted to increase drastically from today\u2019s typical 300 Mbit/s to likely more than 1 Gbit/s per macro-cell in urban environments, and 10 Gbit/s in the same timeframe will cater for Cell Site Share arrangements and the adoption of Massive MIMO [1]."]} +{"63671113|8323234": []} +{"63671113|4395259": []} +{"32138437|52059869": ["Recently, there has been a lot of work on specific network services, such as mobility management [111], resource management and sharing [112]\u2013[114], CoMP (Coordinated Multi Point) [115], service chaining [116], network slicing [117], [118], service-customized networking [119], energy efficient traffic engineering- e."]} +{"32138437|20991784": ["The survey in [171] looks at the proposals for softwarization and cloudification of cellular networks in terms of optimization and provisions for energy harvesting for sustainable future."]} +{"32138437|25911553": []} +{"32138437|21930333": ["The switching-off strategies are also discussed in [136].", "[136] also discussed the idea in relation to heterogeneous CloudRANs, where macro base-station or RRU can provide signaling to the area and small base-stations or RRUs can only be used on-demand.", "[135], [136] 4- xhaul:backhaul & fronthaul [137]", "Heterogeneous CloudRANs are also studied in literature where small RRUs and macro RRUs are distinguished by their service area [136].", "4- Control/data split in RAN [11], [40], [136] 1- Management and virtualization as control modules [11]"]} +{"32138437|207262843": ["In a recent and most comprehensive survey of SDN and virtualization research for LTE mobile networks [72], the authors have provided a general overview of SDN and virtualization technologies and their respective benefits.", "On the other hand, the open challenges briefly discussed at the end of [72] and the relevant work under each challenge are discussed in detail in the present paper.", "An interesting classification of proposed SDN-based mobile network architectures based on revolutionary or evolutionary migration is done in [72].", "If the readers want better understanding about the material covered in Section IV, they are recommended to read [72]."]} +{"32138437|8650651": ["Security vulnerabilities and scalability issues in centralization of control layer are also needed be explored in further details besides other technical challenges [41].", "The survey in [41] provides a comprehensive account of research in control layer framework, access control, security, QoS monitoring, virtualization mechanisms, etc."]} +{"32138437|2535224": ["The survey in [162], although is relatively recent but, presents a case for SDN by highlighting the issues with the current networks, such as, heterogeneous access networks, network ossification, increase in cost for operator amid dwindling revenues, etc."]} +{"32138437|27633619": ["Another recent survey [169] briefly surveys all technologies"]} diff --git a/edge/graph_67867442.jsonl b/edge/graph_67867442.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5425a1e5774d681e9ce8efbebf91c07b7e1d4a6 --- /dev/null +++ b/edge/graph_67867442.jsonl @@ -0,0 +1 @@ +{"22826340|17858209": []} diff --git a/edge/graph_67867622.jsonl b/edge/graph_67867622.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbcd9d52f377ad8124674fa702fd5f35122da50f --- /dev/null +++ b/edge/graph_67867622.jsonl @@ -0,0 +1,4 @@ +{"6786820|13172512": ["Classi\ufb01ers are de\ufb01ned by two main processes (see [6] and [8] for a more extended description): \u2022 Feature extraction: the process of extracting the subset of information that summarizes a large set of data or samples; \u2022 Decision process: the algorithm that assigns a suitable class to an observed\u2026"]} +{"32917239|191396": ["/01 234 2 ( log ) O n n , 234 2 ( ) O n 5689<=E R_` ([2,5])> E K-means ,FG R_ J , ."]} +{"18990050|191396": []} +{"3639671|9188816": ["Distances between the sequences were calculated based on these spaced-word frequencies and Neighbour-Joining was applied to construct phylogenetic trees from the resulting distance matrices."]} diff --git a/edge/graph_67868093.jsonl b/edge/graph_67868093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5d037ce07a1b23d1a6b1104c05459d4d548f421 --- /dev/null +++ b/edge/graph_67868093.jsonl @@ -0,0 +1 @@ +{"19836574|6604384": []} diff --git a/edge/graph_67870351.jsonl b/edge/graph_67870351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67870385.jsonl b/edge/graph_67870385.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67870388.jsonl b/edge/graph_67870388.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..886517bc817b9de058c704341154967455165ffc --- /dev/null +++ b/edge/graph_67870388.jsonl @@ -0,0 +1 @@ +{"7110130|15790998": ["Such formalisms often give rise to intractable problems, even when propositional versions of such formalisms are considered (see [ 7 ] for a survey)."]} diff --git a/edge/graph_67871634.jsonl b/edge/graph_67871634.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..492bfd4e5a8bbbb83b0f8d7310f87a3f0b0f1dec --- /dev/null +++ b/edge/graph_67871634.jsonl @@ -0,0 +1,2 @@ +{"36301296|206450319": ["Since older adults represent a growing population in the mobile phone market (Berenguer et al., 2017) and the development cycle for mobile phones and applications is fairly short (von Wangenheim et al., 2016), adopting lightweight evaluation techniques can be beneficial for understanding how older\u2026"]} +{"59060369|7706992": ["Maguire (1999) supports this finding\nstating that where possible all menu items should be displayed on the one page.", "The design elements of buttons, such as text, colour and icons, can either help or hinder\nusers and should be considered carefully (Maguire, 1999).", "users and should be considered carefully (Maguire, 1999)."]} diff --git a/edge/graph_67873215.jsonl b/edge/graph_67873215.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40733f19cdf6531aaabbb27f99b9a1e06a1d0de5 --- /dev/null +++ b/edge/graph_67873215.jsonl @@ -0,0 +1,10 @@ +{"28494415|416565": ["Literature of face presentation attack detection [12, 25] has shown state-of-the-art performance using texture features."]} +{"5516136|40596005": ["The same is true for view interpolation in image-based rendering (see survey in [Shum et al. 2003]) and for temporal upsampling of video sequences [e."]} +{"5516136|206051485": []} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"54441199|36705207": ["Some studies and recent evaluation campaigns, focused on the analysis of the effects of such variations on face recognition accuracy (see [4] [5] [6])."]} +{"54444028|44695437": ["TDA application scope is growing fast and it is out of the scope of this paper to discuss it, however, the recent survey by Massimo Ferri [17] contain a detailed up-to-date applications where topology plays a vital role."]} +{"2739084|5313655": []} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"206592484|456491": []} diff --git a/edge/graph_67876995.jsonl b/edge/graph_67876995.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2289fb64b9be0f1e1c28ef4d8344d7d751d83b5 --- /dev/null +++ b/edge/graph_67876995.jsonl @@ -0,0 +1,30 @@ +{"10360686|2835258": ["Sending a message to addressees in a given geographic area is known as geocasting [20]."]} +{"7570331|13372227": ["Jane installs necessary software in her car and is ready to go."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"2975466|10859599": ["Results show the survivability achieved on the routing service under different conditions and attacks."]} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"12036110|2457428": []} +{"206490150|14077778": ["More sophisticated and efficient versions of the binary method have been developed (e.g., [ 10 ])."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"122455537|2736673": []} +{"57764058|10235514": ["Thus, they serve as an indispensable component of wireless heterogeneous networks in 5G era for providing various critical civil and military applications [3], [4]."]} +{"57764058|4395259": []} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"7703219|16335158": ["In the CC, MCC and Sensor-cloud architecture, a physical datacentre unit is in charge of performing the data computation and storage (Hossain, 2013), (Dinh, Lee, 2011)."]} +{"7703219|16654832": ["However, the mobile devices suffer from computing resources limitations, battery restriction and processing time (Shiraz et al., 2012)."]} +{"27353195|2835258": []} +{"52126821|4787452": ["DSRC-related MAC protocols are covered in great detail in [34] and [35], covering both weaknesses of current standards and potential alternative schemes.", "For example, the use of TDMA-based MAC protocols shows significant improvement over the relatively low performance of contention-based CSMA/CA conditions [35]."]} +{"5915108|12060835": ["Energy at rechargeable devices can be harvested from ambient RF signals [3], [4], from simultaneous transmission of data and power [5], [6], or from dedicated power beacons [7], [8], [9]."]} +{"52120577|7942157": []} +{"52120577|4572654": ["An extensive survey of LAA and Wi-Fi coexistence has been carried out in [3].", "the overview provided in [3] by considering different unlicensed LTE versions (including LTE-LAA and others) under development and their impact on the performance of Wi-Fi", "Different countries have their own requirements for unlicensed operations in 5 GHz [3].", "Interested readers can refer to [3] and the references therein for more details on LAA Wi-Fi coexistence and corresponding deployment scenarios."]} +{"108799683|6670217": []} +{"14273842|1230643": ["Environmental monitoring, battlefield intelligence, emergency response support, and real-time data fusion and collection are among their frequently cited applications [2] [12] [14] [8]."]} diff --git a/edge/graph_67877081.jsonl b/edge/graph_67877081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a307f1531867834c99c6a07dc67b0e676695a23d --- /dev/null +++ b/edge/graph_67877081.jsonl @@ -0,0 +1 @@ +{"44962334|63137": ["The results presented in this section were obtained in [25,52,67].", "This is done by studying these algorithms under a common algorithmic framework called model-based search (MBS) [67].", "Zlochin et al. [67] have proposed a unifying framework for so-called model-based search (MBS) algorithms.", "The SGA parameter value update that we describe in the following is a generalization of the one that was presented in [67] (which was itself a generalization of the one that was given in [52])."]} diff --git a/edge/graph_67877127.jsonl b/edge/graph_67877127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..321e1e00858f083c830014e0dc6cac2e045c7c19 --- /dev/null +++ b/edge/graph_67877127.jsonl @@ -0,0 +1,21 @@ +{"31470528|6809492": []} +{"114318428|469744": ["The augmented reality (AR) [11] is a technique in which an image of the real world is manipulated in real-time via software to add to the scene a symbol, a writing, a label or a virtual object [12]."]} +{"15443363|7185733": ["For an overview of hand pose recognition techniques, see [22]."]} +{"109424415|469744": []} +{"45150040|6809492": []} +{"27709137|6809492": []} +{"110515260|17670369": []} +{"110515260|206986719": []} +{"110515260|469744": []} +{"3250521|7185733": ["[30] provide a good survey on the visual interpretation of hand gestures."]} +{"10540067|206986719": []} +{"5048492|7185733": []} +{"2101441|16173969": ["Digital Garment Design Computer-Aided Design (CAD) for the body brings unique challenges in simulation, interaction, and manufacturing [24]."]} +{"10911321|7185733": []} +{"15151418|987239": []} +{"15151418|7185733": ["\u2019s survey provides further information on modeling hands and interpretation of hand gestures [21]."]} +{"109391507|8446711": []} +{"62626678|469744": ["Irrespective of the technology applied, such asmost of virtual environments, users are not required to move in the real world [41].", "Specifically, AR can superimpose 3D virtual models on real-time videos [41].", "All the AR devices and system need to be stable and capable of surviving in the environment [41]."]} +{"933142|17024419": ["In literature, researchers [28] utilized augmented reality technologies with hand-held devices (smart phone, tablet PC, etc."]} +{"21357445|1482463": ["Previous works on matching and aligning 3D models are described in the survey by Tam [16]."]} +{"686620|469744": ["A recent survey on related techniques and applications can be found in [5]."]} diff --git a/edge/graph_67882168.jsonl b/edge/graph_67882168.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67888979.jsonl b/edge/graph_67888979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb7cd0bd85f5d73984bbfc1afd82ce690a7004f0 --- /dev/null +++ b/edge/graph_67888979.jsonl @@ -0,0 +1,8 @@ +{"18514729|2387055": ["From a security and reliability perspective, the initial concern was the centralized controller as a single point of failure in the network [3]."]} +{"3890452|2623404": ["Software Defined Networking (SDN) decouples the control plane and data plane, and moves the control logic into a remote centralized controller [14,18,19,23]."]} +{"3890452|10693567": ["Software Defined Networking (SDN) decouples the control plane and data plane, and moves the control logic into a remote centralized controller [14,18,19,23]."]} +{"17633143|10693567": ["Therefore , the extended architecture is a feasible approach to extend the OpenFlow specification for supporting NFV modules in SDN in the future.", "The evaluation shows that only 0.12 percent of the input traffic is handled by the controller , while 77.23 percent is handled on the controller in conventional SDN. ing packets by matching the entries in the Open- Flow pipeline, which consists of one or multiple flow tables.", "In summary, the extensions involve modifications on the switch, the NFV modules, and the extended OpenFlow to lift the limitations of the conventional SDN architecture.", "We simulated each scenario by adjusting the SDN application design.", "OpenFlow was proposed by McKeown et al. to standardize the communications between the centralized controller and the managed switches in SDN [5].", "OpenFlow followed up, and its success further promoted the wide deployment of SDN. Due to limited space, we refer the readers to [5] for a complete survey of Open- Flow development.", "The SDN application implements the service routing logic via the northbound interfaces.", "We used mininet (mininet.org) and a Ryu controller (osrg.github.io/ryu) to build Open- Flow-based SDN for a network service.", "In conventional software-defined networking (SDN), a controller classifies the traffic redirected from a switch to determine the path to network function virtualization (NFV) modules.", "In the second experiment, we implemented the modules of the extended SDN architecture with a C/C++ program for traffic simulation and analysis.", "We propose an extended SDN architecture to reduce the traffic overhead to the controller for providing NFV.", "Compared with OpenFlow-based SDN, the extended architecture causes little controller overhead for providing NFV modules .", "Overview of the Extended Architecture The extended architecture is intended to map NFV modules to SDN. Compared with deploying NFV modules in an Open- Flow-based SDN, this architecture moves traffic classification from the controller to the data plane, and extends OpenFlow messages with a matched field of network events.", "SDN is the evolutionary consequence toward the desire for a programmable network and the separation of the control plane and the data plane."]} +{"52821206|4269723": []} +{"27466047|37966695": []} +{"27466047|2623404": []} +{"27466047|4269723": []} diff --git a/edge/graph_67897296.jsonl b/edge/graph_67897296.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1fd11a3baa8c787e8fdf27fe8313136060a4189f --- /dev/null +++ b/edge/graph_67897296.jsonl @@ -0,0 +1,38 @@ +{"392872|870434": ["Underwater sensor networks (UWSNs) consists of under\u00ad water sensor nodes deposed in different depths, equipped with a low bandwidth acoustic modem and with various sensors, that acts collaboratively to support applications such as underwater tactical surveillance, undersea exploration, underwater disaster prevention, etc [1], [2]."]} +{"24855577|870434": []} +{"16755687|16490750": ["In spite of the existence of a considerable number of papers about routing protocols in UWSNs presented by [4] [5] [6], we perceived a lack of a specific overview involving the geographic routing protocols."]} +{"16755687|2835258": ["According to how many nodes host the service four possible combinations can be resulted as some-for-some, some-for-all, all-for-some and all-for-all introduced in [12].", "\u2026create and maintain paths from source to the destination; as an alternative, a source node includes the approximate position of the receiver in the data packet and selects the next hop according the optimization process of the protocol; the closest neighbor to the destination for example [12] [13]."]} +{"3026778|1230643": ["\u202603202, Elche (Alicante) Spain Phone: \n+34 96 665 8391 {jllor, esteban.torres, pgarrido, mels}@umh.es ABSTRACT In the last years, wireless \nsensor networks have been proposed for their deployment in underwater environments where a lot of applications \nlike aquiculture, pollution monitoring and\u2026"]} +{"19169559|10817088": []} +{"19169559|2835258": ["Performances comparison between our protocol and GPSR, MFR, and NFP protocols is achieved using J-Sim open source simulator.", "We can see as well that the number of nodes affects success rate obtained with MFR and NFP protocols which proves the necessity of using a recovery mechanism to guarantee packets delivery in WSNs.", "In contrast, other protocols (GPSR, NFP, MFR) forward packets through paths that can be expensive in terms of energy consumption especially when there is a void (recovery mechanism applied by GPSR protocol to get out of voids).", "To evaluate energy ef\ufb01ciency and delivery guarantee of our protocol EGGR, we have chosen GPSR, NFP, and MFR as comparison protocols.", "This choice can be justi\ufb01ed by the fact that NFP and MFR are considered as the basic approaches of geographic routing protocols.", "11, that average latency of packets between the source and the base station varies between 4 and 7,25 m-s for all protocols except NFP protocol that gives high average latency and this can be justi\ufb01ed by the number of hopes in the path between the source and the base station with NFP which delays packets (NFP selects its closest neighbor as next hop and so a lot of nodes in the path).", "Solutions proposed in MFR [25, 26], Compass routing [27], NFP [28, 29], and Greedy routing [30] suppose that each node knows its position, its neighbors positions, and the position of the destination."]} +{"13314107|870434": ["A system with a central controller can use contention-based MAC as well.", "Frequency Division Multiple Access (FDMA) divides the available bandwidth into several sub-bands and assigns one of them to a particular user.", "It is found that the absorption of electromagnetic energy in sea water is about f\u00d745 dB per kilometer, where f is frequency in Hertz; In contrast, the absorption of acoustic signal over most frequencies of interest is about three orders of magnitude lower [31]."]} +{"42347181|16490750": ["In [23], a number of routing protocols are examined and compared with each other in terms of different quality metrics, including successful packet delivery ratio, the average end-to-end delay, and energy consumption."]} +{"42347181|1236072": ["Then, the data packets are sent based on the existing paths in the table [9].", "The founded path is stored in a route table for a specific time to prevent a repeat of this algorithm in this period [9].", "A large number of routing protocols have been proposed for finding a path from source node to sink in the terrestrial wireless sensor networks (TWSNs) [8, 9]."]} +{"42347181|1230643": ["A large number of routing protocols have been proposed for finding a path from source node to sink in the terrestrial wireless sensor networks (TWSNs) [8, 9]."]} +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"902018|870434": ["In summary, node deployment algorithms designed for UASNs need to address the adverse physical channel conditions and water mobility while staying energy-efficient [5]."]} +{"16506639|902018": ["As a promising solution to aquatic environmental monitoring and exploration, UWSNs have attracted significant attention recently from both academia and industry (Han et al., 2012; Partan et al., 2007; Han et al., 2013)."]} +{"16506639|2469117": ["As a promising solution to aquatic environmental monitoring and exploration, UWSNs have attracted significant attention recently from both academia and industry (Han et al., 2012; Partan et al., 2007; Han et al., 2013).", "A source node u acquires the location \u00f0xu; yu; zu\u00de of itself and the location of sink node \u00f0xs; ys; zs\u00de based on range-based or range free localization algorithm (Han et al., 2012)."]} +{"16506639|2295142": ["Many researchers have proposed multipath protocols in TWSNs (Liang et al., 2011; Kulkarni et al., 2011; Radi et al., 2012; Han et al., 2014), while those protocols cannot be directly applied in UWSNs."]} +{"16506639|870434": ["As a promising solution to aquatic environmental monitoring and exploration, UWSNs have attracted significant attention recently from both academia and industry (Han et al., 2012; Partan et al., 2007; Han et al., 2013)."]} +{"11540749|16755687": ["Another paper has been presented by [14] that provides an in-depth discussion of geographical routing protocols."]} +{"11540749|42347181": ["the node may not be able to find the next neighbor towards the sink [13, 34].", "Many survey papers published in UWSNs by [6, 8, 10-13] presented a general review and categorizations for routing protocols.", "The location-based category requires expensive full location information while the beacon-based subcategory is expected to obtain expensive network information by sending beacon messages [13].", "This part contributes to a better delivery ratio than single path under a specific scenario [13, 21] and also consumes more energy as multipath generation results in duplicate packets."]} +{"11540749|16490750": ["Many survey papers published in UWSNs by [6, 8, 10-13] presented a general review and categorizations for routing protocols."]} +{"11540749|2835258": ["Source nodes could have knowledge about their neighbor nodes and can select the next forwarding nodes according to different factors in the protocols such as the nearest neighbor nodes to the destination or sink [31, 32]."]} +{"123310|870434": []} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} +{"14766923|42347181": []} +{"28115800|870434": []} +{"9585967|2835258": ["There is no need to transmit routing messages to update route states either [6].", "This undesirable phenomenon, called a communications void, is often also referred to as local maximum phenomenon [6] or local minimum phenomenon [13].", "Various greedy-forwarding algorithms [6] differ in the optimization criterion that is applied in the selection of a next-hop node.", "Geographic routing [6] usually consists of two main elements: a location service and a geographic forwarding strategy."]} +{"16490750|16514036": []} +{"16490750|870434": ["\u2026environmental conditions as well as some system constraints, an underwater sensor network is usually viewed as an Intermittently Connected Network (ICN) or Delay/disruption Tolerant Network (DTN) which requires specialized routing protocols [Guo et al., 2008; Partan, Kurose, and Levine, 2006]."]} +{"3099865|13475127": ["When deployed under the water, sensor nodes can hardly be replaced or recharged in this harsh environment, and ambient energy harvesting combined with super-capacitors is promising to be applied in UWSNs in the future [9].", "An example is the marine shellfish monitoring application, where water temperature, pH value, salinity, DO, and COD are relevant [9]."]} +{"3099865|57194320": ["Various protocols have been developed for supporting the packet routing in underwater wireless sensor networks (UWSNs) [2], [18], [28]."]} +{"3099865|42347181": ["This means that packets routing in an end-to-end manner may not be energy efficient when the network topology may change frequently and dramatically, while greedy hop-by-hop routing is assumed as a more appropriate strategy [12]."]} +{"3099865|2469117": ["very expensive and error-prone [10], [11]."]} +{"43537553|31355144": ["Whereas [15, 16] and [17, 18] tackle the MAC and application layers, respectively."]} +{"12566043|2469117": ["With the regular static mooring sensing system, it is difficult to observe these dynamic ocean phenomena (Zhang\net al., 2012).", "For more detailed techniques, please refer to more comprehensive surveys (Erol-Kantarciz et al., 2011; Tan et al., 2011; Han et al., 2012).", "Since energy for communications is usually plentiful in AUVs compared with ordinary sensors, they can play more important roles than ordinary ocean sensors in collecting, processing, and managing the desired data."]} +{"59670204|2835258": []} diff --git a/edge/graph_67906836.jsonl b/edge/graph_67906836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea963bcffcce130dbc5bc45aad820b8b3a43adb2 --- /dev/null +++ b/edge/graph_67906836.jsonl @@ -0,0 +1,11 @@ +{"11695907|3330313": ["These abnormal samples strongly contaminate the data set [45] and thus perturb the learnt dictionary."]} +{"16528148|17516538": ["This gave rise to a body of literature, of which surveys can be found in the work of Aggarval and Cai [1], Gavrila [2], Gabriel et al. [3], Hu et al. [4] and Moeslund et al. [5], [6]."]} +{"16528148|14970359": []} +{"16528148|7788290": []} +{"21707180|1929234": ["feature selection [66-71], they are mainly focus on specific research fields in feature selection."]} +{"125371627|206485791": []} +{"4539626|69194991": []} +{"4539626|393948": ["According to [111], representation learning (also named feature engineering) is a way to take advantage of human ingenuity and prior knowledge to extract some useful but far-removed feature representation from the ultimate objective, thus representation is also unsupervised, which is the same with clustering in the sense that does not use label information."]} +{"52984817|13151033": ["These influence factors can further be used to filter a knowledge graph [80] constructed from publicly available"]} +{"52984817|393948": ["Consequently, to reach a level of usable intelligence, we need (1) to learn from prior data, (2) to extract knowledge, (3) to generalize, (4) to fight the curse of dimensionality, (5) to disentangle the underlying explanatory factors of the data [14] and (6) to understand the data in the context of an application domain."]} +{"52984817|14843594": ["The ML community today is concentrating on automatic machine learning (aML) approaches, with the grand goal of bringing humans-out-of-the-loop [28], resulting in fully autonomous solutions."]} diff --git a/edge/graph_67920611.jsonl b/edge/graph_67920611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_67936867.jsonl b/edge/graph_67936867.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_68015283.jsonl b/edge/graph_68015283.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6801870.jsonl b/edge/graph_6801870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6803857.jsonl b/edge/graph_6803857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e3a39e3df4a9dfe1f268406a3adde7b7c08d05d --- /dev/null +++ b/edge/graph_6803857.jsonl @@ -0,0 +1 @@ +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} diff --git a/edge/graph_68050042.jsonl b/edge/graph_68050042.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3aba59d8a56fabeb9a58629f11ee7b772c95322d --- /dev/null +++ b/edge/graph_68050042.jsonl @@ -0,0 +1,4 @@ +{"31340576|7366975": ["Estimating the capacity of channels corrupted by synchronization errors is a very challenging problem, and a recent survey on the subject was written by Mitzenmacher [109].", "The work is mainly of theoretical interest due to the fact that the computational complexity of the decoding algorithm is in nO(1/\n2) log q. Inspired by Mitzenmacher\u2019s approach, Metzner [48] proposed to encode k information packets of size r 2n\u2212 k into a codeword of n packets using an (n, k) linear code with minimum distance d.", "Mitzenmacher [47] developed capacity-approaching lowdensity parity-check codes for deletion channels with q-ary alphabets.", "Liu and Mitzenmacher [71] also used single-deletion-correcting codes in a concatenated fashion so they can correct one deletion error per block."]} +{"9103300|15468128": ["In particular, turbo codes [1]\u2013[4] are capable of facilitating near-capacity transmission throughputs, leading to widespread employment by state-of-the-art mobile telephony standards, such as"]} +{"12966388|1230643": []} +{"17038045|15468128": ["Logarithmic transformations of miscellaneous mathematical equations involved in BCJR algorithm have scaled down the computational complexity as well as simplified its architecture from an implementation perspective [20], and such procedure is referred as logarithmic-BCJR (LBCJR) algorithm.", "In addition, represents channel reliability measure and is approximated as when the value of fading amplitude is [20].", "These architectures of ACSUs are presented for max-log-MAP LBCJR algorithm for high-speed applications [20].", "Assuming that represents trellis transition where and corresponds to start and end states, the a posteriori LLR value for th trellis stage is computed as [20]"]} diff --git a/edge/graph_68087754.jsonl b/edge/graph_68087754.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6809492.jsonl b/edge/graph_6809492.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8b2a639f91b2c2ad59504a5a830e18c0f937a15 --- /dev/null +++ b/edge/graph_6809492.jsonl @@ -0,0 +1,3 @@ +{"38084361|17758458": ["Details of such current sources are beyond the scope of our paper, and interested readers are directed to the thorough APF reviews of [3] and [ 8 ]."]} +{"206698234|1876323": ["Its design must verify two conditions [8] that allow determining the observer corrections."]} +{"1773439|17774971": ["With regard to the converter structure, we can use some topologies such as NPC, cascaded H-bridge, stacked multicell converter, or flying-capacitor converter [1]."]} diff --git a/edge/graph_6809809.jsonl b/edge/graph_6809809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_68116342.jsonl b/edge/graph_68116342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7a6b17802c68d9af3850ebbe65bf303c35b64841 --- /dev/null +++ b/edge/graph_68116342.jsonl @@ -0,0 +1,12 @@ +{"126414185|3110415": []} +{"7069900|17485266": []} +{"7069900|3110415": []} +{"7069900|10213552": []} +{"7069900|9667820": []} +{"7069900|18599847": []} +{"7069900|9928823": []} +{"7069900|8584223": []} +{"7069900|17561208": []} +{"7069900|1626075": []} +{"51884108|20774863": []} +{"51884108|24992843": []} diff --git a/edge/graph_68116705.jsonl b/edge/graph_68116705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07d5469c2b741504412799b792ba2f96f4f40b4f --- /dev/null +++ b/edge/graph_68116705.jsonl @@ -0,0 +1,6 @@ +{"11627662|12083425": ["The current paradigm in the control of wind- or solar-power generators is to extract the maximum power from the power source and inject them all into the power grid (see, for example, [1]\u2013[3])."]} +{"62600561|17381415": ["\u2026for energy storage systems and an increasing share of controllable loads The conventional scheme for such grid connected power converters is based on current controlled Voltage Source Converters (VSCs), which are synchronized to the measured grid voltage through a Phase Locked Loop (PLL) [16]."]} +{"19761731|17381415": ["The most challenging issue with the inverter-based units is to synchronize the inverter with the grid and then to keep it in step with the grid even when disturbances or changes happen [1]\u2013[3]."]} +{"11404587|12083425": []} +{"13889729|17381415": ["To prevent creep age phenomenon in a limited space is a tough issue [25]."]} +{"7088094|17381415": ["This trend has initiated significant research and development efforts on control strategies for grid connected power converters in DG systems [1], [2]."]} diff --git a/edge/graph_68119191.jsonl b/edge/graph_68119191.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_68119623.jsonl b/edge/graph_68119623.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dad82d17841021935601ca25163710699e691a21 --- /dev/null +++ b/edge/graph_68119623.jsonl @@ -0,0 +1 @@ +{"113319951|145081": []} diff --git a/edge/graph_68121347.jsonl b/edge/graph_68121347.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9b81d758cfc9d9c0994557070c2ee47bec74fe1 --- /dev/null +++ b/edge/graph_68121347.jsonl @@ -0,0 +1 @@ +{"5282324|7572837": ["This is why the importance of monitoring newborns' OMB has been acknowledged over the years, and the need for reliable instruments has been recently stressed [10]\u2013[12].", "In recent decades, significant advances occurred in the technology-aided monitoring of nutritive sucking disorders [11], [12] and breathing [13]\u2013[16] in newborns.", "As largely reported in the state of the art [12], the analysis of IP pattern through quantitative features may provide valuable developmental information [18]\u2013[20]; however, the rhythmic alternation of IP and EP characterizes a mature nutritive sucking pattern [21].", "However, the progress on this direction has been limited: literature is scattered and there is no straightforward indication of the most sensitive and reliable measures to evaluate [10], [12].", "The piston was moved in order to generate three bursts of ten cycles (simulating typical bursts of sucks), separated by a pause of 5 s, and with a maximum displacement corresponding to the generation of a negative pressure of 210 mmHg (according to the values reported in [12] for 1 month newborns).", "This method has been largely used before [12], [18], [23] even though, to the best", "Literature reports the use of a closed compressible catheter, lying outside the teat, and in line with the middle of the infant's lips [12], [21].", "The SUMOD has been designed to develop a measuring device suitable for an easy application in both clinical and domestic settings, overcoming the technological challenges emerging from the state of the art and discussed in [12]."]} diff --git a/edge/graph_68145695.jsonl b/edge/graph_68145695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f19c30c5a3842691308b30728ce1908209646f11 --- /dev/null +++ b/edge/graph_68145695.jsonl @@ -0,0 +1 @@ +{"43721809|3141231": []} diff --git a/edge/graph_6815237.jsonl b/edge/graph_6815237.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee049d7b6315707dfa6caef219fcefc311fae02d --- /dev/null +++ b/edge/graph_6815237.jsonl @@ -0,0 +1,2 @@ +{"21833271|6815237": []} +{"21750468|6815237": []} diff --git a/edge/graph_68171500.jsonl b/edge/graph_68171500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6a6bf655c96c2cd3af5716652b406cb44ad9595 --- /dev/null +++ b/edge/graph_68171500.jsonl @@ -0,0 +1,41 @@ +{"206711737|34263386": ["creating a dummy finger from the lifted impression; and (c) placing the dummy finger on the fingerprint sensor [34]."]} +{"17841152|17950466": ["These include for example, online handwriting by waving a hand in air that simulates writing a message [9], keystroke dynamics where the intervals and speed of typing on a keyboard are measured [10], and hand motion recognition [11]."]} +{"2607577|192934": ["Signature subcorpus is further divided into training and test sets in order to give holdout system performance error \ufb01gures [27]."]} +{"2607577|15782139": ["The importance of this biometric characteristic (because of its widespread use and legal and social acceptability) and the inherent variability of the signing process has motivated great research e\ufb00orts in the last decade [4]."]} +{"60599889|9913343": []} +{"8235127|9913343": ["Many graphical password schemes\u2013including DAS [24], Face [9], Story [15], PassPoints [41] and BDAS [18]\u2013have been proposed in the past decade (for more, please refer to [6, 7, 13, 14, 16, 23, 34, 37])."]} +{"2084061|9913343": ["Early surveys of graphical passwords are available [Monrose and Reiter \n2005; Suo et al. 2005].", "Permission to make digital or hard copies of part or all of this work \nfor personal or classroom use is granted without fee provided that copies are not made or distributed \nfor pro.t or commercial advantage and that copies show this notice on the .rst page or initial screen \nof a display along\u2026"]} +{"15482500|5313655": ["A review of biometric cryptosystems can be found in [8], [10], and [14]."]} +{"10057260|17574321": ["In speaker verification, three levels of features can be extracted to represent the speaker identity: a) short-term spectral and voice source features, such as Mel-frequency cepstral coefficients (MFCCs), linear predictive cepstral coefficients (LPCCs) and fundamental frequency (F0); b) spectro-temporal and prosodic features, such as modulation features and intonation patterns; c) high-level linguistic features, such lexical features [26]."]} +{"51966359|207238462": ["Similarly, there is a need for the assessment of biometric template characteristics when enrollment is done without supervision [18], e.g., for mobile device authentication, and rejecting samples that could lead to degradation of performance."]} +{"9852158|9913343": ["An excellent survey of the numerous graphical password schemes that have been developed is [23]."]} +{"17574321|192934": []} +{"7408373|7788290": []} +{"750589|18315586": ["Two recent comprehensive surveys of keystroke dynamics can be found in [37], [38]."]} +{"750589|17950466": ["Two recent comprehensive surveys of keystroke dynamics can be found in [37], [38]."]} +{"559432|469744": ["An overview of early AR work can be found in [2].", "As has been explored by the augmented reality community, there are two ways of achieving a see-through effect: actual optical see-through and closed-view pseudo-transparency [2]."]} +{"16711892|17574321": ["\u2026of speaker veri\ufb01cation su\ufb00ers from those many possible variabilities of the spoken utterance, amongst which lexical content (Boies et al., 2004; He\u00b4bert, 2008) and channel variations (Kinnunen and Li, 2010; Kenny et al., 2007; Wu et al., 2008; Vogt and Sridharan, 2008) are the most detrimental.", "Additionally, they bene\ufb01t from the progress achieved in the \ufb01elds of text-independent speaker veri\ufb01cation (Kinnunen and Li, 2010) and speech recognition (Young, 2008)."]} +{"267586|9913343": ["Recent systems have been developed which use easy to remember passwords, including abstract art pictures like in the \u201cDeja vu\u201d system [2], graphical passwords (see survey in [6]), or memorized motor sequences."]} +{"12588991|17574321": []} +{"27392194|192934": ["[18], the four best-known approaches for pattern recognition are: (1) template matching; (2) statistical classification; (3) syntactic or structural matching; and (4) neural networks.", "One of the simplest and earliest approaches to pattern recognition [18] is based on template matching."]} +{"17782134|495481": []} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"870806|15128855": ["Several heuristics have been developed for detecting eye-blinks [15]."]} +{"6760268|9270553": []} +{"6760268|192934": []} +{"6760268|15782139": []} +{"15057486|9913343": [") instead of the common used text strings [23].", "Shoulder surfing attacks have been identified as one of the main concerns against adopting graphical authentication in real use [23]."]} +{"6334061|9576764": ["Studies [17-19] have shown that smartphones have very different usage patterns from conventional computer systems."]} +{"2222849|9913343": ["Graphical passwords have long been investigated as a means of user authentication (see [2, 22] for reviews)."]} +{"17095570|9913343": ["\u20262005a], and BDAS [Dunphy and Yan 2007]\u2014have been proposed in the past decade (for more, please refer to Dhamija and Perrig [2000], Thorpe and Van Oorschot [2004], Suo et al. [2005], Chiasson et al. [2007], Gao et al. [2008], Bicakci et al. [2009], Biddle et al. [2011], and Chiasson et al. [2012])."]} +{"1094912|9913343": ["Such systems offer fast login times and larger theoretical password spaces than other graphical password systems [1, 17]."]} +{"17873913|36421799": []} +{"29477517|6028805": ["Few studies [87, 88] claimed to achieve better accuracy in terms of face detection, localization and segmentation against the facial images acquired in visible light."]} +{"9269724|17950466": ["Over time, the security field has categorized these into three primary groups [1]:", "These areas include desktop keystroke dynamics using traditional methods [1], mobile phone keypress dynamics using traditional methods [18] and key inference using side-channel sensors [13].", "A wide variety of extracted features, learning algorithms, success metrics and testing environments have been studied [1,14].", "Additionally, studies can either focus on authentication of a single user or identification from among a pool of users [1]."]} +{"16899852|15782139": ["While multiple approaches to recognize digits from handwritten trace have been proposed [3, 4, 5, 6], its application to user authentication by leveraging inherent biometric information has not been studied before."]} +{"4783133|9913343": ["As we tried n in the range of [2, 12], we obtained a set of ROC curves and a set of precision-recall curves, as shown in Figure 10, where performance for each value of n is over 30 rounds and 35 signatures.", "It is also restricted by how much a human can remember\u2014what is hard to guess is often hard to remember [2].", "The length of the video clip may vary for each sample, but typically is in the range of [2, 12] seconds.", "Recognition-based graphical passwords [2,9] require users to choose their preselected images from several random pictures for authentication, and some schemes [10,11] have been designed to cope with the problem of shoulder surfing."]} +{"22843207|17574321": ["We used GMM (Gaussian Mixtures Model) as a classifier as it has been shown to perform better than DTW (Dynamic Time Warping) or supervised learning methods such as SVM for speech recognition classification tasks [33, 51]."]} +{"18981266|14970359": ["Some reviews covering human body pose estimation can be found in [30] [31] [32] [33] [34] [35]."]} +{"18981266|7185733": ["Dating back to late 70s [18], the dominant method pursued in the implementation of CV-based interaction has been appearancebased modeling of hand motion [19] [20]."]} +{"18981266|7788290": []} diff --git a/edge/graph_6819068.jsonl b/edge/graph_6819068.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_68232141.jsonl b/edge/graph_68232141.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_68234354.jsonl b/edge/graph_68234354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c70d89440a807d1689a5098eb530ddecb277650e --- /dev/null +++ b/edge/graph_68234354.jsonl @@ -0,0 +1,34 @@ +{"9510043|5660618": [", see [19]\u2013[23] and references therein)."]} +{"27712414|5660618": ["The problems of control and estimation over unreliable communication networks have received considerable attention over the last decade [18]."]} +{"45302100|5660618": []} +{"16816217|6327434": ["The \u03c7(2) detector is a residue-based detector widely used to reveal system anomalies [30], [31]."]} +{"1027180|14441987": []} +{"13356811|5660618": ["In fact, most of networked control approaches assume that the communication failures follow a given class of probability distributions [3], [4], which is hardly justified in case of a malicious adversary."]} +{"14556520|8363289": ["In the control and verification community there is a significant body of work on networked control [16], stochastic system verification [6,1], robust control [2, 11, 3, 10], and fault-tolerant control [21]."]} +{"206446574|1230643": []} +{"13819219|5660618": []} +{"5006342|15255963": []} +{"5006342|5660618": ["Specifically, it can represent discrete-time versions of the jamming and DoS attack models in [19], [20], and random packet loss models based on Bernoulli and Markov processes [31]\u2013[34]."]} +{"46868404|17623572": []} +{"52272470|5660618": ["It is well known that an insufficient bit rate in the communication channel influences the stability of a networked control system [3], not to mention packet drops [4]."]} +{"58671481|5660618": [", [14]\u2013[17]) for describing nonmalicious issues."]} +{"196025837|5660618": []} +{"64687554|43490812": ["The Trivial File Transfer Protocol (TFTP) can be used in this mechanism.(24) A very well-known worm Ramen worm uses this propagation technique in the attack army creation process."]} +{"64687554|206584087": []} +{"36303634|5660618": ["The proposed problem formulation also addresses the power control issue for wireless sensors which are usually expected to work for a long time without replacements of the onboard batteries (e.g., due to widespread sensors and a possibly dangerous environment [1]).", "With the integration of sensing, control, communication, and computation, a wide application spectrum of CPSs are found, such as smart grid, intelligent transportation, and environmental monitoring [1]."]} +{"27323832|5660618": []} +{"27323832|18319089": []} +{"12450364|6327434": ["In [ 17 ], the author reviews several failure detection algorithm in dynamical systems."]} +{"6494826|7516226": ["The analysis of more accurate models (Schiffer et al., 2016) is left for future research."]} +{"174802175|25746527": ["This speci\ufb01c problem is referred to as the communication and control systems co-design problem [10], [11]."]} +{"174802175|5660618": ["The use of a control theoretic approach provides safety and performance guarantees [2].", "The topic of estimation over lossy networks is widely discussed in control systems literature [2]."]} +{"10149082|5660618": []} +{"36731595|6283365": []} +{"117581565|5660618": ["The effect of packet losses has also been studied in both stabilization problems [7]\u2013[9] and state estimation problems [10]\u2013[12] (see also [13], [14] and the references therein)."]} +{"19278880|5660618": ["Although networked control with probabilistic packet losses was extensively investigated as surveyed in [4], [5], communication failures due to DoS attacks do not have particular probabilistic models."]} +{"2443026|15255963": []} +{"2443026|5660618": []} +{"114526479|5660618": []} +{"11947940|5660618": ["In a CPS, multiple static/mobile sensors and actuators, which communicate with each other, interact with physical processes under the control of an intelligent decision system [1]."]} +{"126644211|3854912": ["Fortunately, physical power dynamics can be captured by each node in graphs and this provides a convenient way to model the cause-effect relationships between the cyber data and the grid state signals [52], [107]."]} +{"126644211|5605271": ["of conventional data management technique [9], etc.", "[2], [8], [9]."]} diff --git a/edge/graph_6823683.jsonl b/edge/graph_6823683.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e272b832d01fcb864c384f60c361b3b2b4a01432 --- /dev/null +++ b/edge/graph_6823683.jsonl @@ -0,0 +1 @@ +{"2695265|14441987": ["communication seamlessly through the network [ RT99 ]."]} diff --git a/edge/graph_6832132.jsonl b/edge/graph_6832132.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af3b252bfc1180faca39e35726a16fcb5bc2fe7e --- /dev/null +++ b/edge/graph_6832132.jsonl @@ -0,0 +1,3 @@ +{"6468377|18782652": []} +{"15247576|1437067": ["More recently, there is a growing interest in applying GP to data mining and knowledge discovery, which is evidenced by a number of publications [2], [11], [12], [14]."]} +{"14423354|18782652": []} diff --git a/edge/graph_6834080.jsonl b/edge/graph_6834080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fef5b2c036c0859e9684e6f6b7c3745c464ec003 --- /dev/null +++ b/edge/graph_6834080.jsonl @@ -0,0 +1,4 @@ +{"7045451|10287248": ["Most recent studies of QoS routing in the Internet [7], [8] presuppose a virtual circuit mode of operation, whereby flows can be pinned to paths using, for example, label-switching techniques [9]."]} +{"11585355|2840997": []} +{"10396236|6834080": ["In , e.g., [22, 30, 44], several methods are described to compute these.", "Furthermore, typically, one is interested in the sum of the cumulated costs of all traces to a bad state [22], as opposed to the minimal cumulated cost associated with a single trace."]} +{"16322562|17718674": []} diff --git a/edge/graph_6834470.jsonl b/edge/graph_6834470.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6835682.jsonl b/edge/graph_6835682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6846004.jsonl b/edge/graph_6846004.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6848297.jsonl b/edge/graph_6848297.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..18f40214e62308e432d4696419f7fdd9b5aa4a18 --- /dev/null +++ b/edge/graph_6848297.jsonl @@ -0,0 +1 @@ +{"6116545|6848297": []} diff --git a/edge/graph_6850735.jsonl b/edge/graph_6850735.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da59fd1329c0036643e4ad52a9ae9b965cf00065 --- /dev/null +++ b/edge/graph_6850735.jsonl @@ -0,0 +1,5 @@ +{"98437664|17772052": []} +{"93696215|17772052": []} +{"35964128|192934": ["The principal component analysis is used for feature extraction (Jain et al., 2000).", "However, this needs to be handled with care since reduction in the number of features may end up in a reduced discriminatory power with lowered accuracy (Jain et al., 2000) in disease distinction."]} +{"110983412|10212336": []} +{"95348457|17772052": []} diff --git a/graph_685353.jsonl b/edge/graph_685353.jsonl similarity index 100% rename from graph_685353.jsonl rename to edge/graph_685353.jsonl diff --git a/edge/graph_6857179.jsonl b/edge/graph_6857179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8aa43b358e212b2b331b9c212b0533fb2447e50 --- /dev/null +++ b/edge/graph_6857179.jsonl @@ -0,0 +1,9 @@ +{"41741618|6857179": ["Dimensional and continuous recognition or prediction of emotions is a relatively unexplored area in the field of affective computing, with the first workshop organized on this topic only recently [15]."]} +{"33864734|16362395": ["Current BCI paradigms (Kronegg et al., 2007; Lotte et al., 2007; Vaughan et al., 2003) aim to detect brain activity that corresponds to complex tasks (mental calculus, imagination of finger taping, etc.) not related to the objective of the user (moving a mouse cursor, choosing a letter, etc.).", "Current BCI paradigms (Kronegg et al., 2007; Lotte et al., 2007; Vaughan et al., 2003) aim to detect brain activity that corresponds to complex tasks (mental calculus, imagination of finger taping, etc.", "The fusion of different EEG features is also known to improve results for EEG signals classification (Blankertz et al., 2003; Lotte et al., 2007)."]} +{"33864734|9270553": []} +{"1721618|8777381": ["It can be expected that finer modifications taking the word, phrase and stress pattern structures into account would improve the results [4, 1, 2].", "However, as explained in [2, 5] it should be noted that human emotion perception is a complex process which involves many other factors.", ", spectral envelope characteristics [4, 3] and the transmission medium [2, 5].", "The emotion characteristics of speech can be partly associated with the changes in the prosody (pitch, duration, and energy) parameters [1, 2] and partly with the spectral characteristics of speech [3, 4]."]} +{"5790082|8777381": ["The important parameters which have been attributed to emotional effect generation are FO, duration and energy [1].", "Duration and FO parameters have been generally paid more attention than energy in the analyses of emotional speech [1].", "It is well known that angry and happy speech possess greater energy than neutral speech and that sad speech usually has the lowest energy [1]."]} +{"753606|14866098": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"753606|16362395": ["Signal processing [126] and classification algorithms [127] for EEG have been developed in the context of building Brain Computer Interfaces (BCIs), and researchers are constantly seeking ways for developing new approaches to recognizing affective states from EEG and other physiological signals."]} +{"621581|192934": ["For classification, various machine learning methods (supervised classification in our case) can be used [33]."]} +{"15814759|16717715": ["For automatic labelling we can use the Festvox EHMM (Black and Lenzo, 2007) or the Sphinx (Huang et al., 1993; Walker et al., 2004) labelling tool."]} diff --git a/edge/graph_6862061.jsonl b/edge/graph_6862061.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86bc188077d522184438ba0c72c0fc09170d50a2 --- /dev/null +++ b/edge/graph_6862061.jsonl @@ -0,0 +1,4 @@ +{"17071586|1230643": ["Typical application areas include environmental, military, and commercial enterprises [1]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} diff --git a/edge/graph_6863252.jsonl b/edge/graph_6863252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cec367f5a38ac8be91d398573b21619c1d231274 --- /dev/null +++ b/edge/graph_6863252.jsonl @@ -0,0 +1,35 @@ +{"11540206|206051485": []} +{"8399740|206051485": ["on registration methods can be found in [9]\u2013[13]."]} +{"6936357|206051485": ["The potential of the hyperelastic registration is demonstrated in a direct comparison with a linear elastic registration on an academical example."]} +{"2790179|206051485": ["A more general survey of image registration, highlighting its uses in synthetic aperture radar and other applications is given in [6]."]} +{"7156710|206051485": ["Groupwise registration is an important tool in medical image analysis for establishing anatomical correspondences among subjects in a population [1, 2]."]} +{"30647493|206051485": ["The elastic image registration is typically achieved by optimizing an appropriate image similarity measurement, or solving a partial different equation (PDE) system that models the image registration as an elastic material deformation driven by the forces derived from image similarity measurements (Zitova and Flusser, 2003)."]} +{"7336006|206051485": ["Keywords: image registration, image matching, image fusion, variational approach, constrained optimization", "In the last two decades, computerized non-rigid image registration has played an increasingly important role in medical imaging, see, e.g. Maintz and Viergever (1998); Peckar et al. (1999); Fitzpatrick et al. (2000); Zitova\u0301 and Flusser (2003); Modersitzki (2004) and references therein."]} +{"11401707|206051485": ["Overviews of the non-rigid image registration methods can be found in [9] [10] [11] [12]."]} +{"11851522|206051485": ["Medical image registration is a well-established \ufb01eld of research upon which a substantial body of literature has been built over the past three decades (Brown, 1992; Maintz and Viergever, 1998; Lester and Arridge, 1999; Hill et al., 2001; Zitov\u00e1 and Flusser, 2003; Pluim et al., 2003)."]} +{"1200745|206051485": ["Shown with the y-axis range of [0\u20135] (above) and the full range of y-axis values [0\u201353] (below).", "Shown with the y-axis range of [0\u20135] (above) and with the full range of y-axis values [0\u201318] (below)."]} +{"16561121|7861381": ["Most image registration algorithms select a similarity term (also called a fidelity term or cost function) that compares information in the two images, and a regularizing term (or statistical prior) that prevents tears, shears, or holes from appearing in the resulting registered image, or encourages deformations with certain properties [38], [54]."]} +{"54466614|7861381": ["\u2026two decades, a large number of deformable (non-rigid) image registration methods have been developed, and several reviews can be found in Maintz and Viergever (1998), Lester and Arridge (1999), Hill et al. (2001), Zitova and Flusser (2003), Pluim et al. (2003), Crum et al. (2004), Holden (2008)."]} +{"9483389|206051485": ["A now common approach is to use a nonrigid registration algorithm (capable of finding the deformation of one image into another) [15], [16], [17] to independently map each image to a chosen reference."]} +{"30389548|7861381": ["In (Holden, 2008; Zagorchev and Goshtasby, 2006) transformations based on RBFs are reviewed but there is little published work on the comparative evaluation of topology preservation properties for different radial basis functions.", "It has been pointed out that transformations using RBFs generally do not preserve topology well (Holden, 2008; Ashburner, 2007), and in another study, Noblet et al. (2006) evaluated the topology preserving B-Spline-based non-rigid registration algorithm and showed that it preserved topology in 3D\u2026", "The weighting coefficient of each basis function is calculated so that the resultant deformation field fits the landmark displacements (Holden, 2008).", "It has been pointed out that transformations using RBFs generally do not preserve topology well (Holden, 2008; Ashburner, 2007), and in another study, Noblet et al."]} +{"2357517|206051485": ["The task of comparing two images might seem trivial when referring to the same modality (Sum of Absolute Differences -SAD-, Sum of Square Differences -SSD- [2]), but it becomes quite challenging when seeking comparisons between different modalities."]} +{"41823768|53680608": ["Interested readers are referred to previous surveys by Aggarwal and Nandhakumar [1], Barron et al. [2], Otte and Nagel [16], Mitiche and Bouthemy [14], and Stiller and Konrad [23]."]} +{"9401029|206051485": ["Different image similarity metrics can be used depending on the modality, like sum of squared differences and mutual information [12]."]} +{"12838780|7861381": ["applied in various areas of medical image analysis (Crum et al 2004, Holden 2008). Of particular interest to this paper is the registration of computed tomography (CT)-derived threedimensional (3D) lung volumes with applications to computational fluid dynamics (CFD) analysis of pulmonary gas flow in an attempt to extend from the rigid airway studies (Lin et al 2007, 2009, Choi et al 2009, 2010, Yin et al 2010, Lambert et al 2011) to breathing lungs with deforming airways and lung parenchyma. With pairs of images obtained at full inspiration and full or partial expiration or multiple images acquired at various time points during a breathing cycle, the registrations are performed to match those lung images to adjust the geometry of airway trees for changes in lung volumes. Since lung motion varies from apex to base and ventral to dorsal, it is desirable to use non-rigid image registration to capture non-uniform expansion and contraction. There are two main approaches to implement non-rigid registration for lung CT images according to similarity measures: feature-based approaches and intensity-based approaches. The featurebased approach uses corresponding anatomical features, mostly landmarks or surfaces, to define the transformation from one lung dataset to the other (Fan et al 2001, Betke et al 2003, Coselmon et al 2004, Kaus et al 2007, Castillo et al 2009). In earlier landmark-based registration (LBR), several anatomical points, such as bifurcation points of airway and/or vascular trees, vertebra and so on, were manually selected by experts. Recent published work has shown the possibilities to generate large numbers of corresponding landmarks (more than 1000) from a pair of lung CT datasets with semi-automatic tools (Murphy et al 2008, Castillo et al 2009). Several LBR algorithms have been proposed based on thin-plate spline (TPS) (Rohr et al 2001, Johnson and Christensen 2002) or elastic-body spline (Davis et al 1997, Worz and Rohr 2008) or moving least squares (Castillo et al 2009). The use of B-spline was also proposed by Lee et al (1996) to compute a C2 continuous and one-to-one mapping to warp two-dimensional (2D) points.", "applied in various areas of medical image analysis (Crum et al 2004, Holden 2008). Of particular interest to this paper is the registration of computed tomography (CT)-derived threedimensional (3D) lung volumes with applications to computational fluid dynamics (CFD) analysis of pulmonary gas flow in an attempt to extend from the rigid airway studies (Lin et al 2007, 2009, Choi et al 2009, 2010, Yin et al 2010, Lambert et al 2011) to breathing lungs with deforming airways and lung parenchyma. With pairs of images obtained at full inspiration and full or partial expiration or multiple images acquired at various time points during a breathing cycle, the registrations are performed to match those lung images to adjust the geometry of airway trees for changes in lung volumes. Since lung motion varies from apex to base and ventral to dorsal, it is desirable to use non-rigid image registration to capture non-uniform expansion and contraction. There are two main approaches to implement non-rigid registration for lung CT images according to similarity measures: feature-based approaches and intensity-based approaches. The featurebased approach uses corresponding anatomical features, mostly landmarks or surfaces, to define the transformation from one lung dataset to the other (Fan et al 2001, Betke et al 2003, Coselmon et al 2004, Kaus et al 2007, Castillo et al 2009). In earlier landmark-based registration (LBR), several anatomical points, such as bifurcation points of airway and/or vascular trees, vertebra and so on, were manually selected by experts. Recent published work has shown the possibilities to generate large numbers of corresponding landmarks (more than 1000) from a pair of lung CT datasets with semi-automatic tools (Murphy et al 2008, Castillo et al 2009). Several LBR algorithms have been proposed based on thin-plate spline (TPS) (Rohr et al 2001, Johnson and Christensen 2002) or elastic-body spline (Davis et al 1997, Worz and Rohr 2008) or moving least squares (Castillo et al 2009). The use of B-spline was also proposed by Lee et al (1996) to compute a C2 continuous and one-to-one mapping to warp two-dimensional (2D) points. Alternatively, intensity-based registration (IBR) matches the intensity patterns of the images by minimizing/maximizing a defined similarity measure. A representative though not exhaustive list of such studies can be found in Sundaram and Gee (2005), Guerrero et al (2006), Sarrut et al (2006), Schreibmann et al (2006), Christensen et al (2007), Staring et al (2007), Reinhardt et al (2008), Yin et al (2009b ) and Ding et al (2010). Although both LBR and IBR have been applied in registering lung images, they each have limitations. IBR matches intensity patterns over the whole image but does not use anatomical knowledge. As a result, it may cause mismatch of important anatomical landmarks, such as airway bifurcations, when a registration falls into local minima. Conversely, LBR uses anatomical landmarks. Those landmarks, however, are usually sparsely distributed throughout the images leading to the mismatch of regions away from the landmarks. Thus, utilization of both anatomical landmark information and intensity patterns in image registration is desirable. In recent years, hybrid landmark- and intensity-based registration (LIBR) has been proposed to register lung images (Li et al 2003, 2008, Paquin et al 2007). In most of these LIBR methods, a TPS model, which minimizes the bending energy of a thin plate for a smooth transformation between designated landmarks is used to match landmarks. However, as pointed out by Holden (2008), the TPS transformation is a globally supported function so that it cannot accurately model localized deformation and it has high computational complexity when a large number of landmarks are used.", "applied in various areas of medical image analysis (Crum et al 2004, Holden 2008). Of particular interest to this paper is the registration of computed tomography (CT)-derived threedimensional (3D) lung volumes with applications to computational fluid dynamics (CFD) analysis of pulmonary gas flow in an attempt to extend from the rigid airway studies (Lin et al 2007, 2009, Choi et al 2009, 2010, Yin et al 2010, Lambert et al 2011) to breathing lungs with deforming airways and lung parenchyma. With pairs of images obtained at full inspiration and full or partial expiration or multiple images acquired at various time points during a breathing cycle, the registrations are performed to match those lung images to adjust the geometry of airway trees for changes in lung volumes. Since lung motion varies from apex to base and ventral to dorsal, it is desirable to use non-rigid image registration to capture non-uniform expansion and contraction. There are two main approaches to implement non-rigid registration for lung CT images according to similarity measures: feature-based approaches and intensity-based approaches. The featurebased approach uses corresponding anatomical features, mostly landmarks or surfaces, to define the transformation from one lung dataset to the other (Fan et al 2001, Betke et al 2003, Coselmon et al 2004, Kaus et al 2007, Castillo et al 2009). In earlier landmark-based registration (LBR), several anatomical points, such as bifurcation points of airway and/or vascular trees, vertebra and so on, were manually selected by experts. Recent published work has shown the possibilities to generate large numbers of corresponding landmarks (more than 1000) from a pair of lung CT datasets with semi-automatic tools (Murphy et al 2008, Castillo et al 2009). Several LBR algorithms have been proposed based on thin-plate spline (TPS) (Rohr et al 2001, Johnson and Christensen 2002) or elastic-body spline (Davis et al 1997, Worz and Rohr 2008) or moving least squares (Castillo et al 2009). The use of B-spline was also proposed by Lee et al (1996) to compute a C2 continuous and one-to-one mapping to warp two-dimensional (2D) points. Alternatively, intensity-based registration (IBR) matches the intensity patterns of the images by minimizing/maximizing a defined similarity measure. A representative though not exhaustive list of such studies can be found in Sundaram and Gee (2005), Guerrero et al (2006), Sarrut et al (2006), Schreibmann et al (2006), Christensen et al (2007), Staring et al (2007), Reinhardt et al (2008), Yin et al (2009b ) and Ding et al (2010).", "applied in various areas of medical image analysis (Crum et al 2004, Holden 2008). Of particular interest to this paper is the registration of computed tomography (CT)-derived threedimensional (3D) lung volumes with applications to computational fluid dynamics (CFD) analysis of pulmonary gas flow in an attempt to extend from the rigid airway studies (Lin et al 2007, 2009, Choi et al 2009, 2010, Yin et al 2010, Lambert et al 2011) to breathing lungs with deforming airways and lung parenchyma. With pairs of images obtained at full inspiration and full or partial expiration or multiple images acquired at various time points during a breathing cycle, the registrations are performed to match those lung images to adjust the geometry of airway trees for changes in lung volumes. Since lung motion varies from apex to base and ventral to dorsal, it is desirable to use non-rigid image registration to capture non-uniform expansion and contraction. There are two main approaches to implement non-rigid registration for lung CT images according to similarity measures: feature-based approaches and intensity-based approaches. The featurebased approach uses corresponding anatomical features, mostly landmarks or surfaces, to define the transformation from one lung dataset to the other (Fan et al 2001, Betke et al 2003, Coselmon et al 2004, Kaus et al 2007, Castillo et al 2009). In earlier landmark-based registration (LBR), several anatomical points, such as bifurcation points of airway and/or vascular trees, vertebra and so on, were manually selected by experts. Recent published work has shown the possibilities to generate large numbers of corresponding landmarks (more than 1000) from a pair of lung CT datasets with semi-automatic tools (Murphy et al 2008, Castillo et al 2009). Several LBR algorithms have been proposed based on thin-plate spline (TPS) (Rohr et al 2001, Johnson and Christensen 2002) or elastic-body spline (Davis et al 1997, Worz and Rohr 2008) or moving least squares (Castillo et al 2009). The use of B-spline was also proposed by Lee et al (1996) to compute a C2 continuous and one-to-one mapping to warp two-dimensional (2D) points. Alternatively, intensity-based registration (IBR) matches the intensity patterns of the images by minimizing/maximizing a defined similarity measure. A representative though not exhaustive list of such studies can be found in Sundaram and Gee (2005), Guerrero et al (2006), Sarrut et al (2006), Schreibmann et al (2006), Christensen et al (2007), Staring et al (2007), Reinhardt et al (2008), Yin et al (2009b ) and Ding et al (2010). Although both LBR and IBR have been applied in registering lung images, they each have limitations.", "It has been extensively\n0031-9155/11/010203+16$33.00 \u00a9 2011 Institute of Physics and Engineering in Medicine Printed in the UK 203\napplied in various areas of medical image analysis (Crum et al 2004, Holden 2008).", "However, as pointed out by Holden (2008), the TPS transformation is a globally supported function so that it cannot accurately model localized deformation and it has high computational complexity when a large number of landmarks are used."]} +{"1125293|206051485": ["Extensive surveys of registration methods can be found in the literature (Maintz and Viergever 1998; Pluim et al. 2003; Zitov\u00e1 and Flusser 2003)."]} +{"12712816|206051485": ["subcortical structures, they often fail to align the folding patterns of the sulcal anatomy [11]."]} +{"12712816|7861381": [", C3(d) corresponding to deformation d [13, 21]: C3(d) = f = \u2212div [ (I + \u2207d) \u015c ] \u015c : \u03a9 \u2192 R(3), (4)"]} +{"34534181|206051485": []} +{"11007193|8983048": ["made a deep study on the accuracy of the IR results in [5] tackling range IR problem instances."]} +{"11007193|206051485": ["In addition, we will follow a feature-based IR approach [3].", "In particular, two search approaches for optimization have been considered in the IR literature [3]:", "There is not a universal design for a hypothetical IR method that could be applicable to every real-world application [3].", "As said in Section 2, a feature-based IR approach is considered [1,3]."]} +{"11007193|6681074": ["2) and it is based on applying IR techniques to achieve the integration of the range images [5,29\u201331].", "Thus, in order to provide a more specific description of the problem, we focused our attention on the particular application we consider in our experiments: the IR of range images for 3D modeling [5,29\u201331]."]} +{"42599122|206051485": []} +{"6273945|206051485": ["Therefore, nonrigid (elastic) registration schemes are required (for a survey see [1])."]} +{"1224379|53680608": ["Optical flow methods A special kind of method is optical flow, which is used to find small deformations in temporal sequences of images (see Horn and Schunck, 1981; Aggarwal and Nandhakumar, 1988; Barron et al., 1994).", "A special kind of method is optical \ufb02ow, which is used to \ufb01nd small deformations in temporal sequences of images (see Horn and Schunck, 1981; Aggarwal and Nandhakumar, 1988; Barron et al ., 1994)."]} +{"38101545|206051485": ["The recent advantages in the development of cardiac imaging modalities have led to an increased need for cardiac registration methods (for recent reviews of cardiac image registration methods see [1] and [2] for a general review of image registration methods)."]} +{"9130407|206051485": ["Ehyb(T ) =Mico(I \u25e6 T \u25e6 Tgeo, J) +Rico(T \u25e6 Tgeo) , (15)", "A complete overview is out of the scope of this article, and we would like to point the reader to the books by Hajnal et al. (12) and Modersitzki (13), the surveys by Maintz and Viergever (14), Zitova and Flusser (15), and the tutorial by Szeliski (16).", "(12) and Modersitzki (13), the surveys by Maintz and Viergever (14), Zitova and Flusser (15), and the tutorial by Szeliski (16).", "Zitova B, Flusser J. 2003."]} +{"3067978|206051485": ["In the last decade, many relevant techniques are proposed [1]."]} +{"6327856|206051485": ["In the past two decades computerized image registration has played an increasingly important role in medical imaging (see, e.g., [2], [14], [7], [23], [15] and references therein)."]} +{"12087237|206051485": []} +{"18143598|206051485": ["In the last two decades, computerized non-rigid image registration has played an increasingly important role in medical imaging; see, e.g., [22] [10] [26] [8] [16] [34] [33] [24] and references therein."]} +{"8783848|206051485": []} diff --git a/edge/graph_6864410.jsonl b/edge/graph_6864410.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d96554bb9cafc6ef184fdb046539fee0d8724eb --- /dev/null +++ b/edge/graph_6864410.jsonl @@ -0,0 +1,2 @@ +{"211177255|6864410": ["For more details about approximability results of social welfare optimization, we refer to the survey [26].", "a factor of 21/22 for all k \u2265 2 (see [26]).", "[26] showed that they cannot be approximated in polynomial time to any factor, unless P = NP, for both the bundle and the k-additive form, where k \u2265 3.", "Known approximability and inapproximability results in multiagent resource allocation have been surveyed recently in [26].", "Utilitarian m\u03b5\u22121/2 [19] (21/22) + \u03b5, k \u2265 2 [26] Egalitarian any factor [24] Any factor, k \u2265 3 [26] (7/8) + \u03b5 Corollary 2 (1/2) + \u03b5, k \u2208 {1, 2} [3] Nash product any factor [24] Any factor, k \u2265 3 [26] (8/9) + \u03b5, k \u2208 {1, 2} Theorem 9 Approximability"]} +{"442666|6864410": ["For more details about approximability results of social welfare optimization, we refer to the survey [26].", "a factor of 21/22 for all k \u2265 2 (see [26]).", "[26] showed that they cannot be approximated in polynomial time to any factor, unless P = NP, for both the bundle and the k-additive form, where k \u2265 3.", "Known approximability and inapproximability results in multiagent resource allocation have been surveyed recently in [26].", "Utilitarian m\u03b5\u22121/2 [19] (21/22) + \u03b5, k \u2265 2 [26] Egalitarian any factor [24] Any factor, k \u2265 3 [26] (7/8) + \u03b5 Corollary 2 (1/2) + \u03b5, k \u2208 {1, 2} [3] Nash product any factor [24] Any factor, k \u2265 3 [26] (8/9) + \u03b5, k \u2208 {1, 2} Theorem 9 Approximability"]} diff --git a/edge/graph_6866374.jsonl b/edge/graph_6866374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6871408.jsonl b/edge/graph_6871408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..abdef48ac75e2476a2d8a92f47a0d4ca1f296962 --- /dev/null +++ b/edge/graph_6871408.jsonl @@ -0,0 +1,2 @@ +{"123579332|6327434": []} +{"123112294|56671641": ["This approach is strongly related to the theory of differential inequalities and cooperative systems, and has been used in the field of stability of uncertain systems (Michel and Miller, 1977; Perruquetti et al., 1995; Smith, 1995 )."]} diff --git a/edge/graph_6875365.jsonl b/edge/graph_6875365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b98a6f91ba1ae5985bd8a599710ebeef3a1782b0 --- /dev/null +++ b/edge/graph_6875365.jsonl @@ -0,0 +1,9 @@ +{"11209846|17381415": []} +{"11209846|12083425": []} +{"14355929|9828770": ["As a result, adaptation, co-evolution and self-organization occur crossing a broad range of scales (see [274] for a recent review on adaptive networks)."]} +{"10988127|8363289": ["It is well-known in the literature [ 27 ], that in the presence of state constraints, this formulation is conservative (we can have infeasibility) and we should consider optimization over feedback laws.", "For guaranteed stability we need to construct a robust positive invariant set and to impose a terminal constraint (see also [ 27 ,17,18])."]} +{"122907607|7064380": []} +{"27025850|56671641": []} +{"799140|6486398": ["is will be the case. (ii) Similar ideas to those used in the de\ufb01nition of eigenvector centrality have recently been applied to develop the Page-Rank algorithm on which the GOOGLE search engine relies [32, 111]. The HITS algorithm for the ranking of web pages, proposed by Kleinberg [105], also relies on similar reasoning. Other Centrality Measures 16 Finally for this subsection, we brie\ufb02y note several less "]} +{"16028707|1400872": ["Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al.", "Examples of techniques include gradient-descent learning algorithms for recurrent neural networks (Pearlmutter, 1995; Prentice, Patla, & Stacey, 1998), learning for vector fields (Okada et al., 2002), and statistical learning algorithms (e.g. locally weighted regression ) for dynamical systems\u2026"]} +{"3174463|9828770": ["We expect that models of this kind will attract much interest in the future, see works of Caldarelli et al. (2006); Ehrhardt et al. (2006); Gil and Zanette (2006); Kozma and Barrat (2007); Zanette (2007); Zimmermann et al. (2004), and the review of Gross and Blasius (2007)."]} diff --git a/edge/graph_6878121.jsonl b/edge/graph_6878121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01eed3a426ed1b645fa49d8a88e02d96da0d4037 --- /dev/null +++ b/edge/graph_6878121.jsonl @@ -0,0 +1,8 @@ +{"54970178|25686668": []} +{"10880119|12601073": ["Zeng et al. in [5] provide a comprehensive review of multiple-antenna-based sensing meth-ods."]} +{"5514633|15255963": ["Although packet-level channel modeling using finite-state Markov chains (FSMC) has been extensively studied [16], e."]} +{"22833814|860072": ["diverse scenarios, and large Doppler spreads [11], [12] besides some challenges inherited from conventional trains such as high penetration losses, limited visibility in tunnels, and the harsh"]} +{"22833814|7482876": ["that have been thoroughly investigated in the literature [2]\u2013[10], a comprehensive study of HST communication channels is still missing."]} +{"12681089|13367219": ["(1)\nHere, \u03c4, \u03c6, and \u03c8 denote the excess delay, the direction of departure (DoD), and the direction of arrival (DoA), respectively.1 Furthermore, L is the total number of MPCs (typically those above the noise level of the system considered)."]} +{"41850355|860072": ["A large number of technologies, including the system architecture [9], [10], [11], [12], signal processing methods at the physical layer [13], [14], [15], [16], novel seamless handover algorithms [17], [18], have been proposed to mitigate impacts due to the high mobility in the literature."]} +{"9184950|12681089": ["In general, there are three fundamental approaches to channel modeling: deterministic, stochastic, and geometry-based stochastic [6], [7]."]} diff --git a/edge/graph_6879093.jsonl b/edge/graph_6879093.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb211b21e611dc40b51a9e9e04d7434fe948695e --- /dev/null +++ b/edge/graph_6879093.jsonl @@ -0,0 +1,2 @@ +{"5727200|31333609": ["They employ hash chains [26] and evolving cryptographic systems [18] as cryptographic techniques to protect of audit trails."]} +{"6307044|3042864": ["We limit our survey to infrastructure based MCC applications where the hardware infrastructure remains static and provides services to the mobile users [9]."]} diff --git a/edge/graph_6891645.jsonl b/edge/graph_6891645.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15fcc8dd89bba08465462683b11c32efa671f8cf --- /dev/null +++ b/edge/graph_6891645.jsonl @@ -0,0 +1,6 @@ +{"1709114|8310135": []} +{"16258461|15222577": ["So, Korayem [20] survey a different techniques and methods for building subjectivity and sentiment analysis systems for Arabic."]} +{"2408543|18484924": ["\u2022 Agglutination: Since Arabic exhibits concatenate morphology, we note the pervasive presence of affixes agglutinating to proper nouns as prefixes and suffixes (Shaalan, 2014).", "\u2026can also represent regular words (e.g. jamilah, gmylp 1 \u201d which means \u2018beautiful\u2019 and can be a proper noun or an ad-jective; \u2022 Agglutination: Since Arabic exhibits concatenate morphology, we note the pervasive presence of af\ufb01xes agglutinating to proper nouns as pre\ufb01xes and suf\ufb01xes (Shaalan, 2014)."]} +{"2408543|8310135": ["Although this approach proved to be successful, but most of the recent research focuses on Statistical Learning techniques for NER (Nadeau and Sekine, 2007).", "Location, Person) in open-domain text (Nadeau and Sekine, 2007).", "Named Entity Recognition (NER) aims to identify prede\ufb01ned set of named entities types (e.g. Location, Person) in open-domain text (Nadeau and Sekine, 2007).", "In (Nadeau and Sekine, 2007), the authors survey the literature of NER and report on the different set of used features such as contextual and morphological."]} +{"7151908|18484924": ["\u2022 Agglutination: Since Arabic exhibits concatenative morphology, we note the pervasive presence of affixes agglutinating to proper nouns as prefixes and suffixes (Shaalan, 2014).", "Another example, jamAl , which means \u2019beauty\u2019, is a noun but can be a common noun or a proper name; \u2022 Agglutination: Since Arabic exhibits concatenative morphology, we note the pervasive presence of af\ufb01xes agglutinating to proper nouns as pre\ufb01xes and suf\ufb01xes (Shaalan, 2014)."]} +{"7151908|8310135": ["In (Nadeau and Sekine, 2007), the authors survey the literature of NER and report on the different sets of used features such as contextual and morphological features.", "Location, Person) in opendomain text (Nadeau and Sekine, 2007).", "Although rule based approaches proved successful to some extent, most recent NER research focuses on Statistical Learning techniques due to the shortcomings of rule based approaches in terms of coverage and robustness (Nadeau and Sekine, 2007).", "Named Entity Recognition (NER) is the task of tagging names with a prede\ufb01ned set of named entity types (e.g. Location, Person) in open-domain text (Nadeau and Sekine, 2007)."]} diff --git a/graph_689442.jsonl b/edge/graph_689442.jsonl similarity index 100% rename from graph_689442.jsonl rename to edge/graph_689442.jsonl diff --git a/edge/graph_6895355.jsonl b/edge/graph_6895355.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6897211.jsonl b/edge/graph_6897211.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37f316c3358e762a4a5c17796954d8eabcaf22b6 --- /dev/null +++ b/edge/graph_6897211.jsonl @@ -0,0 +1,2 @@ +{"9201659|8363289": ["1 by following the standard steps indicated, for example, in the survey [2], we only present the Lyapunov stability proof (which differs from the proof given in [2]) and we refer the reader to [9] for a complete proof.", "For a comprehensive overview on stability of receding horizon control in discrete-time we refer the reader to [2] and the references therein.", "Actually, in the survey [2] it was pointed out that all the concepts and ideas used in MPC should be reconsidered in the hybrid context.", "In these works, either continuous piecewise affine (PWA) systems are considered, [5], [6] which are in fact Lipschitz continuous systems or, in [7], asymptotic stability is established via the results of [2], where continuity of the MPC value function is assumed.", "The recent development of MPC for hybrid systems, which are inherently discontinuous and nonlinear, requires a reconsideration of the stability results, as it was also pointed out in the excellent survey [2].", "We will employ a terminal cost and constraint set method, as the one used for smooth nonlinear systems in [2], to guarantee stability for the closed-loop system (1)\u2013(3)."]} +{"122689489|8363289": []} diff --git a/edge/graph_6905365.jsonl b/edge/graph_6905365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6906699.jsonl b/edge/graph_6906699.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f00acba88ca41e0f9e984d6980a0ab75f52d137 --- /dev/null +++ b/edge/graph_6906699.jsonl @@ -0,0 +1,9 @@ +{"32714436|18315586": []} +{"37618989|15219853": []} +{"18318380|14047190": ["After transforming the data, we investigated the preliminary feasibility of these behavioral biometrics by k-NN classification method that is widely used in data analysis [8] [ 11 ]."]} +{"14339603|18315586": []} +{"2847391|15219853": ["On the other hand behavioral biometrics relates to a specific behavior of a human along time while performing some task, such as signature writing, speaking, typing and others [1]."]} +{"43972964|192934": ["Curse of dimensionality or peak phenomena may well be the other [ 19 ]."]} +{"2886468|15219853": ["All biometric modalities are subject to an intra-class variability (leading to a high False Non Match Rate) due to several facts: acquisition of a reflex for behavioral biometrics [1], use of different sensors for enrollment and verification acquisitions, noise due to the acquisition environment (humidity, lightning, stress."]} +{"14181243|15219853": ["On the other hand, behavioral biometrics [2] relates to a specific behavior of a human (user) along time while performing some task, such as signature writing, speaking, typing etc."]} +{"26717717|14047190": []} diff --git a/edge/graph_6909107.jsonl b/edge/graph_6909107.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ada2a5cda1ecc98059221652e93440c37abe6212 --- /dev/null +++ b/edge/graph_6909107.jsonl @@ -0,0 +1,25 @@ +{"33199975|8909218": ["Deployed closer to mobile users, small cell base stations, known as Small Cell enhanced Node B (SCeNBs), are expected to provide new services at high data rates, reduced energy and low cost, thus improving cellular applications for homes, enterprises, as well as for metropolitan and rural areas [1]."]} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"20287396|12206204": ["To catch up with this trend, next generation mobile network (5G and beyond) has envisioned several new radio techniques, such as ultra dense networks (UDN), device-to-device (D2D), and massive machine communications [1].", "where Rij is a random number selected from a uniform distribution in [0,1]."]} +{"12589478|1236072": ["Of course, mobile network topology does not enable such freedom as conventional WSN but it rather follows hierarchical network structure in WSN where some nodes are selected as gateways (cluster heads), which relay data to a target destination [6].", "Basic routing algorithms for WSN do not consider energy consumption of data delivery or dynamic path update [6]."]} +{"14777050|3055684": ["well as human motion energy [8], and thus it facilitates self - ustainability and perpetual operation [9]."]} +{"14777050|3042864": ["the advent of a mature mobile application market [2]."]} +{"14777050|12060835": []} +{"31055568|1236072": ["Mobile network topology, even with consideration of handover, does not enable such freedom in routing as the conventional WSN but it rather corresponds to a hierarchical network structure in WSN where some nodes are selected as gateways (cluster heads) relaying data to a destination [18] .", "With respect to [18\u201322] where whole network is wireless, backhaul from the serving cell to the operators core network is typically wired.", "Routing protocols designed for WSN [18] provide an inspiration how to treat the path selection in the SCC."]} +{"28026066|1110872": ["In this heterogeneous environment, TCP/IP shows poor performance [5, 6], and the reasons for such performance degradation are different."]} +{"3055684|12060835": []} +{"3042864|14088590": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|2282515": ["Alternatively, Google AppEngine [31] focuses on the traditional web applications with stateless computation and stateful data storage that makes the applications impressively scalable."]} +{"3042864|10859599": ["In the second case, the applications execute in a real cloud, for instance, Amazon EC2 [34], Google App Engine [31], and Microsoft Live Mesh [84]."]} +{"801417|8909218": ["At the same time, an exponential growth in femto deployments is expected [1], [2] due, in part, to the fact that spatial proximity between the handset and the serving femto access point (FAP) enables successful communication with high rates and reduced power."]} +{"27060711|10693567": []} +{"9496996|12815020": []} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"9241421|8909218": ["The deployment of Small Cell enhanced Node B (SCeNBs) closer to mobile users provides new services at high data rates, reduced energy and low cost, thus improving the cellular applications in dense as well as rural areas [3]."]} diff --git a/edge/graph_6913007.jsonl b/edge/graph_6913007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6915923.jsonl b/edge/graph_6915923.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ccaed8bb6984fcd2150e43c56cbf7623bc929df --- /dev/null +++ b/edge/graph_6915923.jsonl @@ -0,0 +1,5 @@ +{"1986757|19788427": ["chip wireless technology is more mature and fully CMOS compatible [11][28].", ", mm-wave wireless and surface-wave interconnects, are more power and cost efficient than on-chip optical links [28]."]} +{"7333079|956843": ["Due to the finite number of samples, PF suffers from degeneracy and impoverishment problems when the highly likely particles replace the less likely ones [Li et al. 2014].", "PF with finite number of samples suffer from degeneracy and impoverishment problems when less likely particles are replaced by highly likely particles [24]."]} +{"1033682|174797842": []} +{"62044054|8575576": ["Histological images are more challenging due to the underlying tissue architecture, but have the benefit of providing a more comprehensive view of a disease.(20)", "5-4 billion pixels of data.(20) Additional challenges for automated methods include the large variability present including cell types, cell densities, stains, and magnification levels.", "The classifier of this data must be able to deal with large, dense datasets.(20) Ensemble schemes,(27) support vector machines,(28) and Adaboost(29) classifiers have been popular choices in automatic cytopathology classification."]} +{"206592484|456491": []} diff --git a/edge/graph_6916267.jsonl b/edge/graph_6916267.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7756ecd0b2188660a5404c21ff545bffedbab6b --- /dev/null +++ b/edge/graph_6916267.jsonl @@ -0,0 +1,3 @@ +{"12542850|8914588": ["The activities share knowledge that typically includes a model of the managed element(s) and \na description of goals [Huebscher and McCann 2008].", "The activities share knowledge that typically includes a model of the managed element(s) and a description of goals [Huebscher and McCann 2008]."]} +{"14584914|8914588": ["Section 4 discusses limitations of our study, compares our findings with related studies, and presents recommendations to move our field forward."]} +{"14584914|627405": ["The goal of RQ4 and RQ5 is to help deriving conclusions from the study."]} diff --git a/edge/graph_69194991.jsonl b/edge/graph_69194991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed173200a9bb058795ef705d5f46e8119ea8d1f4 --- /dev/null +++ b/edge/graph_69194991.jsonl @@ -0,0 +1,12 @@ +{"6419793|7020971": ["Stochastic gradient descent (SGD) is a fundamental and popular optimization method for machine learning problems [1], [2], [3], [4], [5]."]} +{"2276942|18050848": ["Because visual data provides a stream of information that is separate from the audio and invariant to acoustic noise, AVSR has shown noticable improvements over audio-only speech recognition in both clean and noisy conditions [2, 3, 4, 5, 6, 7, 9]."]} +{"20288249|1805048": ["Nevertheless, CF-based methods are often preferred to content-based methods because of their impressive performance (Su and Khoshgoftaar 2009)."]} +{"12063392|1805048": ["A common approach to represent the latent reasons is using clustering techniques [2,3,21] where Vs is modeled by the product of matrix PNs\u00d7C and QC\u00d7K ."]} +{"2403660|1805048": ["Collaborative Filtering (CF), which automatically predicts the interests of a particular user based on the collective rating records of similar users or items, has been extensively studied in the literature (Hu et al., 2008; Salakhutdinov & Mnih, 2008; Su & Khoshgoftaar, 2009).", "There are mainly two types of CF-based approaches (1) memory-based approaches, (2) model-based approaches."]} +{"26071662|43059": ["Relaxing the sum-ofrank-1-terms constraint in PARAFAC leads to more flexible tensor decompositions such as Tucker [6], [7], block term decomposition (BTD) [135], three-way decomposition into directional components (DEDICOM) [136], and others [137]."]} +{"26071662|16528630": ["astrophysics [59], biomedics [60], telecommunications [61], audio-vision [23], chemometrics [62], and more.", "In audio-visual applications, features often correspond to speech spectral coefficients and visual cues such as lip contours or speaker\u2019s presence in the scene [23].", "A sequential approach makes sense when one modality has better quality in terms of the information that it conveys than the others in a certain respect, as in certain audio-visual scenarios [10], [23] (Example II-A."]} +{"26071662|8042572": [", [21], [27], [58] (biomedical imaging) and [10], [11] (HMI).", "Examples include multi-sensor [9], HMI [10] and remote sensing [42] applications.", "A domain that is heavily inspired by natural multimodality is HMI.", "An additional complicating factor that makes multimodal HMI stand out is due to the fact that the human user often plays an active part in the choice of modalities (from the available set) and in the way that they are used in practice.", "The challenge of automatic calibration of audio-visual sensors (and others) in the context of HMI (Example II-A.2) is discussed in [10, Section V.", "Second , sometimes a modality can report only on part of the system w.r.t. the other modalities, as is the case with EEG vs. MEG [12], nuclear magnetic resonance (NMR) vs. liquid chromatography\u2014mass spectrometry (LC-MS) [99], occlusions or partial spatial coverage in remote sensing (Example II-C.1), audio-video (Example II-A.1), meteorological monitoring (Example II-C.2), and HMI (Example II-A.2).", ", gesture detection and user tracking), interpretation of human language commands, and other multisensory functions [10], [11].", "For further discussion on features and choosing the right level of data fusion, see, e.g., [21], [27], [58] (biomedical imaging) and [10], [11] (HMI).", "A sequential approach makes sense when one modality has better quality in terms of the information that it conveys than the others in a certain respect, as in certain audio-visual scenarios [10], [23] (Example II-A.", "Examples include: speech processing , including speech recognition, speech activity detection, speech enhancement, speaker extraction and separation; scene analysis , for example tracking a speaker within a group, biometrics and monitoring, for safety and security applications [24]; human-machine interaction (HMI) [10]; calibration [25] [10, Section V.", "In HMI, an important task is to design modalities that will make HMI as natural, ef\ufb01cient and intuitive as possible [11].", "The principal point that makes HMI stand out among other multimodal applications that we mention is that, in HMI, the modalities are often interactive (as their name implies).", "applications [24]; human-machine interaction (HMI) [10]; calibration [25] [10, Section V."]} +{"207561477|8197990": ["There has been a significant amount of computer science research on content-based image retrieval in which a particular query image (possibly a sketch or primitive graphic) is used to find matching relevant images [5]."]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"21296922|6387482": ["State-of-the-art in multimodal biometrics and multimedia related content analysis and recognition can be found in [2] and [3] respectively."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} diff --git a/edge/graph_69198704.jsonl b/edge/graph_69198704.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2774844adaa1f5ac7534190a1a211352502e040e --- /dev/null +++ b/edge/graph_69198704.jsonl @@ -0,0 +1 @@ +{"197414984|6327434": []} diff --git a/edge/graph_69211952.jsonl b/edge/graph_69211952.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6921810.jsonl b/edge/graph_6921810.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbd323f07485cdf89c5e7253a9293ef325be639c --- /dev/null +++ b/edge/graph_6921810.jsonl @@ -0,0 +1,2 @@ +{"4953567|2616070": ["provements of this approach were proposed in [2]."]} +{"14304049|2616070": []} diff --git a/edge/graph_69220195.jsonl b/edge/graph_69220195.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69224705.jsonl b/edge/graph_69224705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6923178.jsonl b/edge/graph_6923178.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69245407.jsonl b/edge/graph_69245407.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69270827.jsonl b/edge/graph_69270827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..137848e645214c86c104df83ac9cc3838c325d80 --- /dev/null +++ b/edge/graph_69270827.jsonl @@ -0,0 +1,10 @@ +{"110629432|5822166": []} +{"158981940|69270827": ["The above-discussed reasons highlighted the importance of adopting, combining, or integrating various advanced computational techniques, through the interactions between experts and the model/system, to resolve the growing complexity of practical sustainability problems [13].", "This study paid attention to this underexplored issue and proposed a two-stage hybrid multiple rule decision making (MRDM) [3,13,34] approach to analyze this problem."]} +{"158981940|4968608": [", fuzzy set, rough set, and grey set) to accomplish this task [11,12]."]} +{"159014112|4968608": []} +{"207551944|14038195": ["Several studies (Behzadian, Kazemzadeh, Albadvi, & Aghdasi, 2010; Ho, 2008; Vaidya & Kumar, 2006) have demonstrated the vitality of the field and reported several methods proposed in the literature."]} +{"114625753|5822166": []} +{"53742745|5822166": []} +{"804445|5822166": ["[16] extended these reviews by surveying multi-criteria supplier evaluation and improvement/selection approaches through a literature review and a classification of international journal articles from 2000 to 2008."]} +{"114885926|5822166": []} +{"8438558|5822166": ["[7] W."]} diff --git a/edge/graph_69295046.jsonl b/edge/graph_69295046.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69309226.jsonl b/edge/graph_69309226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be7c65138144dc7e31f42fa724c8db42f824d22c --- /dev/null +++ b/edge/graph_69309226.jsonl @@ -0,0 +1,5 @@ +{"14449343|11608263": ["In this work, we use an ensemble based method, RAKEL (Tsoumakas, 2007), for emotion classification.", "Below we provide a brief description of the RAKEL algorithm.", "Experiments with different feature combinations reveal that semantic frame feature combined with polarity based feature performs best in RAKEL framework.", "The P+SF feature combination performs best in emotion classification with RAKEL.", "RAKEL has been selected as the representative of problem transformation method in our study as it is reported to outperform the other problem transformation methods and algorithm adaptation methods.", "An ensemble based multi-label classification technique called random k-label set (RAKEL) has been used in our study.", "Random k-Label sets classifier (RAKEL) (G. Tsoumakas & I. Katakis., 2007) builds an ensemble of a number of LP classifiers trained using a different small random subset of \u03be .", "In this section, we present results of experiments of emotion classification with RAKEL which is an ensemble of a number of base classifiers.", "RAKEL deals with three pre-specified parameters that need to be estimated prior training: i) the number of models, ii) the subset size and iii) the threshold for multi-label output generation.", "Comparisons may only be performed based on the micro-averaged label based measures like accuracy, precision, recall, and F1 (Tsoumakas, 2007)."]} +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} +{"3705596|16768404": []} +{"3867049|12259931": ["The applied methods range from simple approaches, e.g., looking for explicit markers of causal relations [21], such as \u201cbecause\u201d, to complex approaches, e.g., training machine learning (ML) methods on annotated corpora [4]."]} +{"33950375|14688441": ["\u2026share their opinions, experiences and impressions of life by using explicit verbal signals (that is, spoken sentences) and non-verbal signals (for example, by how they deliver the sentences, or by assuming bodily expressions) ( Vinciarelli and Mohammadi, 2014; Vinciarelli and Pentland, 2015 )."]} diff --git a/edge/graph_69310678.jsonl b/edge/graph_69310678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_693197.jsonl b/edge/graph_693197.jsonl similarity index 100% rename from graph_693197.jsonl rename to edge/graph_693197.jsonl diff --git a/edge/graph_69344315.jsonl b/edge/graph_69344315.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e729360ccb8dd2eb87f880951b8dfca7d73667d4 --- /dev/null +++ b/edge/graph_69344315.jsonl @@ -0,0 +1,5 @@ +{"204984093|2357830": ["The content of the chip can be read/written with an RFID reader which is connected to the server [1,2].", "However, interested readers can refer to [1,23] for more details."]} +{"27642026|2357830": ["Security vulnerabilities of RFID technology, such as a lack of cryptographic capability, the ability clone the device, detect duplicates, and data retention either on the device or in a centralized database cause other security concerns, which would affect intention to use [41].", "Juels considered the security vulnerabilities of RFID technology, and focused on obvious issues such as a lack of cryptographic capability as well as less obvious ones, like how data retention either on the device or in a centralized database causes other security concerns, which would affect intention to use [41]."]} +{"29405412|16514036": ["1, the typical patient-aware contexts querying system can include wireless body area networks [22], wireless sensor networks [23\u201326], video surveillance system [27], and positioning system, etc."]} +{"29405412|2357830": ["Following the treatment in [42], RFID tags can be classified according to their computational capabilities which make them a challenging environment for designing and implementing security functions."]} +{"167912377|2357830": []} diff --git a/edge/graph_69363679.jsonl b/edge/graph_69363679.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7dac411279487fad558010f063d739878ab427fb --- /dev/null +++ b/edge/graph_69363679.jsonl @@ -0,0 +1,3 @@ +{"114795861|15459551": []} +{"114795861|17737221": []} +{"4427557|17713112": ["Therefore, they deplete their batteries quickly, limiting overall network lifetime to only a few months to years [20], [21]."]} diff --git a/edge/graph_69366955.jsonl b/edge/graph_69366955.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30cf525cedf2108a53f8f92f1d2c18bd5d6cfb94 --- /dev/null +++ b/edge/graph_69366955.jsonl @@ -0,0 +1,24 @@ +{"13975932|6952653": []} +{"27168750|13215551": ["Problems trying to provide solutions swarm intelligence are mainly related to artificial intelligence (AI), data mining [8] and robotics [4]."]} +{"17471393|1898434": ["The agent features perfectly fit the CSO features [2, 3]:"]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"7017773|3348390": ["In fact, to minimize the impact of such devices on the environment and energy consumption, low-power radios are likely to be used for connection to the Internet."]} +{"3393868|6952653": []} +{"5779237|2469314": ["IoT applications, such as environmental monitoring could incorporate an architecture to capture Big Data [6] from sensors and add value to that data [46] ."]} +{"5779237|14315321": ["\u201d A few framework/middleware approaches have been proposed to support the creation of an SO-based IoT infrastructure [16, 8, 48]."]} +{"31686235|16614482": ["We believe that JADE [1] fulfils such requirements [11, 14 ], and LEAP is designed and implemented as a new kernel for JADE."]} +{"31686235|70923": ["The platform is not responsible for providing any means for implementing service-level interoperability or autonomy [2] and it must be completed with other components to support the concepts of agent-oriented software engineering, such as roles, goals and plans [ 8 , 10]."]} +{"53696817|17737221": ["The non-flexible appliances are those that are associated with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "These appliances usually present burst loads (Khan et al., 2014; Ullah et al., 2013)."]} +{"53696817|16335158": ["The IoT Cloud (Alamri et al., 2013; Botta et al., 2016) will enable the long-time storage and complex analysis of this data."]} +{"4704392|18825272": ["The stakeholders could be supported in their reasoning by simulations of what may emerge in the adapted Iota [46]."]} +{"12597547|1113420": ["The context\nbroker architecture (Baldauf et al., 2007) supported context-aware computing in intelligent spaces (living rooms, vehicles, corporate offices and meeting rooms)."]} +{"13050442|7329149": ["With the rapid development of smart devices and sensing technology, IoT has a promising future and is widely used in many fields, such as supply chain, system monitoring, health care, and so on [1] [24] [19].", "As we indicated, trust can be build through several environments or factors [24] [5] [19]."]} +{"24032591|469744": ["Augmented reality (AR) supplements physical reality by superimposing digital information upon the view of the real world [1]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"14098068|7839197": []} +{"18297049|1898434": []} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"38650290|4232203": []} +{"38650290|562855": []} diff --git a/edge/graph_6937054.jsonl b/edge/graph_6937054.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9433bdc383b453912ac5b69f8db321864814c33 --- /dev/null +++ b/edge/graph_6937054.jsonl @@ -0,0 +1 @@ +{"18282837|18747476": []} diff --git a/edge/graph_69372035.jsonl b/edge/graph_69372035.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50e6723185a3889c9aac62d8113fa42ed50c331a --- /dev/null +++ b/edge/graph_69372035.jsonl @@ -0,0 +1,12 @@ +{"9413021|17623152": []} +{"9413021|2357830": []} +{"9413021|1236072": []} +{"9413021|1230643": ["Multihopping is a common technique to save energy and overcome the scalability issue [123]\u2013[125]."]} +{"9465747|14650419": ["Typically, the optimal frame length is set to the number of tags to achieve maximum throughput in the DFSA algorithms [16]\u2013[20]."]} +{"6502061|7329149": []} +{"6502061|1598350": []} +{"6502061|206901977": ["Regarding greenWSN, the following techniques should be adopted [7], [9], [29], [30]: 1) Make sensor nodes only work when necessary, while spending the rest of their lifetime in a sleep mode to save energy consumption; 2) Energy depletion (e."]} +{"6502061|16335158": ["OVERVIEW OF SENSOR-CLOUD Defined by IntelliSys,1 sensor-cloud is \u2018\u2018an infrastructure that allows truly pervasive computation using sensors as an interface between physical and cyber worlds, the datacompute clusters as the cyber backbone and the internet as the communication medium\u2019\u2019 [13], [14].", "Attracting increasing interest from both academic and industrial communities, sensor-cloud [13], [14], [53] is actually a new paradigm, motivated by complementing 1) the ubiquitous data sensing and data gathering capabilities of WSNs as well as 2) the powerful data storage and data processing abilities of CC.", "With sensor-cloud integration, there are many favorable advantages [13], [14], benefiting the users and the WSN as well as the cloud.", "With that, towards green IoT, we review the latest developments in sensor-cloud [13], [14] which is a novel paradigm in green IoT, and further envision the future sensor-cloud.", "com/system-overview powerful cloud computing technologies to provide excellent data scalability, rapid visualization, and user programmable analysis\u2019\u2019 [13], [14]."]} +{"6502061|14650419": []} +{"6502061|2357830": ["\u2022 RFID (radio-frequency identification) [16]: a small electronic device that consists of a small chip and an antenna, automatically identifying and tracking tags attached to objects."]} +{"5523844|9862516": ["The Time Reversal Technique [45] reduces the power consumption by powering the sensors from the Radio Frequency signals from the surrounding, simplifying the sensor nodes by minimizing the work done at sensor-end."]} diff --git a/edge/graph_69388964.jsonl b/edge/graph_69388964.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd00247d4c1cb3919f8cd15e11f4d4fdb86abba0 --- /dev/null +++ b/edge/graph_69388964.jsonl @@ -0,0 +1,2 @@ +{"29854968|512386": ["Furthermore, as mentioned before, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7].", "In this letter, we consider the more practical scenario that the active user sets can be changed in several continuous time slots, and propose a low-complexity dynamic compressive sensing (DCS)-based MUD [7] for NOMA to jointly realize user activity and data detection.", "In practical scenarios, although users can randomly access or leave the system, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7].", "Specifically, although users can randomly access or leave the system, some users generally transmit their information in adjacent time slots with a high probability, which leads to the temporal correlation of active user sets in several continuous time slots [7]."]} +{"22221919|3270620": ["Non-orthogonal multiple access (NOMA) has become an important principle for the design of radio access techniques for the \ufb01fth generation (5G) wireless networks [1]\u2013[3]."]} diff --git a/edge/graph_6939676.jsonl b/edge/graph_6939676.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d438b90cbc5caa0d4dc556a9348356e7af9db33 --- /dev/null +++ b/edge/graph_6939676.jsonl @@ -0,0 +1,12 @@ +{"15766890|1230643": ["These capabilities are combined with its physical sensing capabilities to support a wide range of applications for monitoring and controlling world [1]."]} +{"14858110|3054454": ["The spatial properties of the wireless channel have signi\ufb01cant impact on the detection of AOA [10]."]} +{"6546013|1230643": ["Recent technological advances have made it possible to deploy large scale sensor networks consisting of a large number of low-cost, low-power, and multi-functional senso r nodes that communicate in short distances through wireless links [1]."]} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"5128321|164835": []} +{"61820315|1230643": []} +{"3212818|1230643": []} +{"60724752|13372227": []} +{"13501984|1230643": ["A Wireless sensor network (WSN) [1] is composed of plenty of sensor nodes."]} +{"17322121|1230643": ["These packets are broadcasted in WSN in the flooding mode.", "In WSN, the position information is crucial.", "With the deep research and wide use, WSN will certainly come into each domain in people\u2019s life.", "Therefore, how to obtain the position information of unknown nodes, which is called localization problem, has become a hot topic in WSN.\nRecently, many localization algorithms for sensor networks have been proposed.", "Due to its powerful function and low energy cost, the WSN has been widely used.", "WSN [1] is composed of plenty of sensor nodes which are deployed in inspecting field, and they form a multi-hop selfconfigured network by wireless communication.", "Accordingly, confirming the position where event happens and the node\u2019s coordinate which capture information is WSN\u2019s the most basic function, and also has the pivotal action for WSN\u2019s validity.", "In various domains, such as national defense and military affair, environment inspection and forecast, traffic management, complex mechanical control, space exploration, remote control of dangerous region, and so on, WSN has shown its significance and capability in application.", "For wireless sensor network, it is too costly, and the energy consumption is pretty high, so these techniques are not practical for WSN.", "Keywords-DV-hop; localization; trilateration; wireless sensor networks\nI. INTRODUCTION WSN [1] is composed of plenty of sensor nodes which are deployed in inspecting field, and they form a multi-hop selfconfigured network by wireless communication.", "Without position information, WSN cannot work properly [2]."]} +{"6010936|1236072": []} diff --git a/edge/graph_69401384.jsonl b/edge/graph_69401384.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6940667.jsonl b/edge/graph_6940667.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1867e4a94e5cad822ce72da5626cf42ebff78c77 --- /dev/null +++ b/edge/graph_6940667.jsonl @@ -0,0 +1 @@ +{"38007825|30948085": []} diff --git a/edge/graph_69410647.jsonl b/edge/graph_69410647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65b063ab520f810d28d469da86644a6049063dd3 --- /dev/null +++ b/edge/graph_69410647.jsonl @@ -0,0 +1,3 @@ +{"693137|38476": ["In proposed solution, we use sliding window models in conjunction with learning and mining algorithms, namely modified version of ADWIN4 (Adaptive Windowing) algorithm that maintains a window of variable size."]} +{"18641022|11050081": []} +{"15061567|191396": ["The second group of algorithms refers to streaming data and applies mining techniques [1]."]} diff --git a/edge/graph_69410709.jsonl b/edge/graph_69410709.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e0eb0dd970ae2ea916e32d22042038ec74876ba --- /dev/null +++ b/edge/graph_69410709.jsonl @@ -0,0 +1 @@ +{"12051216|18440098": ["\u2026annotated test corpus, for sign language investigation, are the Purdue\u2019s RVLSLLL (Martnez, Wilbur, Shay, and Kak 2002) and signstream, one of the most comprehensive collection of annotated videos of American sign language utterances, including images captured from different angles and signers.", "An extensive survey of 156 papers on sign language analysis can be found in (Ong and Ranganath 2005)."]} diff --git a/edge/graph_69421548.jsonl b/edge/graph_69421548.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69458643.jsonl b/edge/graph_69458643.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08211f8a2433fe0d211a82ad5db3eea72d3bfb53 --- /dev/null +++ b/edge/graph_69458643.jsonl @@ -0,0 +1,14 @@ +{"53435560|84832337": ["meet [63]."]} +{"7299864|15252929": []} +{"29198319|4528002": ["Modern cars contain 30\u2013100 ECUs, which are embedded computers that communicate with each other, creating the in-vehicle network [10].", "The implementation of OBD systems has been mandatory in vehicles sold in the United States since 1996, in gasoline-powered vehicles in the European Union (EU) since 2001, and in diesel-powered vehicles in the EU since 2004 [10]."]} +{"15031785|4528002": ["4) As discussed previously and demonstrated repeatedly by many researchers [4]\u2013[6], [32], [33], any successful malware attack to a vehicle can cause significantlymore severe consequences than compromising consumer electronics.", "Once on a vehicle, malware can cause a wide range of disruptions and damages [4]\u2013[6], [32], [33].", "Themost damaging security threats, however, are only emerging as vehicles connect to the Internet, provide onboard Wi-Fi hotspot services, communicate with other vehicles and Intelligent Transportation System (ITS) infrastructures, and support advanced applications such as over-the-air (OTA)ECUfirmware update [4], [6], [32], [33].", "Knownvulnerabilities in thedesignand implementation of onboard communication systems, hardware, software, and applications [6], [33], [37] can be exploited by malware to infect a vehicle."]} +{"15031785|12815020": []} +{"13439544|2736673": ["Although the universal availability of this wireless transmission medium which is one of the great advantages in IVC, becomes the origin of some security issues, related to both the nature of transmission in wireless environment and to the security of communications using an open support.", "In this category we find: VGPR, GPSR and MIBR [38].", "This category refers RAR and SADV [38], which use a static network node as a relay.", "As examples of such routing protocols we cite: DTSG [46], ROVER and DTSG [38].", "In this category we find: CBLR, CBR, HCB and CBDRP [38].", "To share this information, vehicles establish a spontaneous network, known as Vehicular Ad hoc NETworks (VANETs), using a direct mode of communication between vehicles called Inter-Vehicle Communications (IVC) [2].", "Several \u201ctopology based protocols\u201d exist in the literature, such as OLSR [41], TBRPF, FSR [38] and DSDV [42] as proactive protocols.", "The DRiVE project (Dynamic Radio for IP Services in Vehicular Environments) focuses on the exclusive use of existing infrastructure for the implementation of the IVC system, it is the convergence of different cell technologies and high-speed UMTS networks, DVB-T and DAB develop innovative IP services to vehicles [50].", "In this category we cited: EAEP, DV-CAST and SRB [38].", "VANETs routing protocols can be classified into the following six main categories [38,39].", "Basically, all existing MANET\u2019s routing protocols can be optimized to be used for IVC [37,38], taking into account the specific characteristics of vehicular networks."]} +{"206851405|206584087": ["Consequently, location privacy mechanisms for PKI are required [17]."]} +{"32543655|28965631": ["Big Data can help store and process all the generated Beacon information to improve road traf \ufb01 c safety [29] and [31]."]} +{"52197736|36400013": ["Second, in order to prevent the distribution of forged messages, we design a reputation evaluation algorithm using the reputation score to represent the trustworthiness of messages [11]."]} +{"52197736|17934515": ["INTRODUCTION It is estimated that the number of registered vehicles will reach 2 billion within the next 10 to 20 years [1]."]} +{"28925132|2445817": ["However, VANETs, as a special type of network systems, has its own characteristics [22], which are used to distinguish it from other kinds of networks, giving rise to challenges on several levels.", "1, 0 [22] Ververidis, C."]} +{"32950063|84832337": []} +{"32950063|62617427": ["Node impersonation Authentication Integrity Non-repudiation\n[2,37,39,41]\nMasquerading Authentication Non-repudiation Integrity\n[25,47]\nRouting: Authentication [2,9,48] Blackhole, Greyhole,\nWormhole, Tunnelling\nAvailability Confidentiality Integrity\nGPS spoofing/Position faking\nAuthentication Privacy\n[25,35,58]\nTiming attack Availability [9,24,36] Replay Authentication\nIntegrity Non-repudiation\n[2,25,43]\nIllusion attack Authentication Integrity\n[25,35,58]\nJamming Availability [35,57] Key and/or certificate\nreplication (unauthorized access)\nAuthentication Confidentiality\n[3,24,30,33,38,39]\nLoss of event traceability (Repudiation)\nNon-repudiation [9,41,33]\nFor Replay attack: Use time stamping technique for sensitive packets [43] or timestamp all messages by broadcasting time (UTC or GNSS), or digitally sign and include sequence number in each message [25].", "Attacks Compromised services\nSolutions\nTracking Privacy [2,3,12,24\u201332] Traffic analysis Confidentiality [2,12,14,15,23,32] Eavesdropping Information disclosure Authentication\nPrivacy [2]\nDOS Authentication Availability\n[1,2,24,33\u201336]\nSybil attack Authentication Availability\n[3,8,9,37\u201344]\nMalware Availability [41,41] Spamming Confidentiality Man in the middle\nattack Authentication Confidentiality Integrity Non-repudiation\n[9,36,45\u201347]\nBrute force Authentication Confidentiality\n[49,48,49]\nTampering Hardware Confidentiality Privacy\nControl of manufacturer users\u2019 job.", "Security service Architectures\nAuthentication NHTSA authenticates via digital signature and encryption.", "[33] A. Dahiya, V. Sharma, A Survey on Securing User Authentication in Vehicular Ad Hoc Networks, 2009.", "In ARAN, ARIADNE and SEAD routing protocol [2] cryptographic certificate, symmetric cryptography, MAC (Message Authentication Code) and one way hash function are used respectively to solve these issues.", "Routing: Authentication [2,9,48] Blackhole, Greyhole, Wormhole, Tunnelling Availability Confidentiality Integrity GPS spoofing/Position faking Authentication Privacy [25,35,58]", "For the Communications inside the SCMS (entity to entity), the symmetric encryption AES-CCM (Advanced Encryption StandardCounter with CBC-MAC) is used for confidentiality with MAC (Message Authentication Code) for integrity and together they provide authenticity.", "The security requirements include:\n\u2022 Authentication: ensures that the message is generated by a legitimate user using certificate.", "Integrity NHTSA assures the integrity via Message Authentication Code.", "Authentication Authenticate ITS user/network Signed messages.", "VANET communication mode Security requirements\nV2V, V2I Availability Confidentiality Error detection Liability identification Authentication Non-repudiation Privacy and anonymity Flexibility and efficiency Location privacy Integrity Traceability Data verification\nV2I Revocability Access control\nV2V Data verification\n\u2022 Error detection: for detecting malicious and erroneous transmission.", "[48] presents various mechanisms to improve different ad-hoc routing protocols for secure routing process by enhancing the trust among different nodes in VANETs.", "Message tampering/ suppression/ fabrication/alteration\nAuthentication Availability Integrity Non-repudiation\n[26,33,50]\nMessage saturation Authentication [1,25,35,43,47,51,52,55,54,23] (Spoofing and forgery attacks) Availability Integrity Broadcast tampering Availability Integrity\nCryptographic primitives are enabled with non-repudiation mechanism.", "Brute force Authentication Confidentiality [49,48,49]"]} +{"6609457|2457428": ["According to [5][6], there are several GKMP classifications such as Centralized [7][8], Collaborative and Distributed [9]."]} diff --git a/edge/graph_69458861.jsonl b/edge/graph_69458861.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b018da06692fe4dc77ec8b25059038d897949416 --- /dev/null +++ b/edge/graph_69458861.jsonl @@ -0,0 +1,14 @@ +{"17890768|1236072": []} +{"9077942|1819274": ["In terms of middleware support, middleware systems for ad hoc networks, robotics, and wireless sensor networks are surveyed in [5] [6] [7], however, no survey could be found for middleware platforms designed specifically for IoT."]} +{"40217176|3330313": []} +{"40217176|1230643": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"7910349|7278743": ["The a im of the IEEE 802.11 standard [ 4 ][5][6][7] is to p rovide wireless connectivity to devices that require a quick installation, such as portable c omputers, PDAs, o r generally mobile devices inside a WLAN (Wireless Local Area Network)."]} +{"13700967|3423198": ["There are also some surveys and papers that investigated power optimization algorithms for WSN [52\u201356]."]} +{"13700967|2206212": ["The survey [26] exposes different strategies to reduce the consumption of sensor nodes that rely on a limited budget of energy."]} +{"4865015|27410217": ["The middleware is one of the enabling technologies for IoT [3], [10].", "In fact, middleware is one of its enabling technologies [3], [10]."]} +{"4865015|16387640": ["Therefore, binary encodings such as Apache Thrift and Google\u2019s Protocol buffers are better suited for most IoT devices [25]."]} +{"4865015|3348390": ["More information regarding other context modeling techniques, as well as context in general can be found in [80].", "A system is context-aware if it is capable of providing relevant information or services according to the task demanded by the user [80].", "Regarding user interaction, systems are classified into three levels of contextawareness [80]: 1) personalization; 2) passive; and 3) active."]} +{"16262162|2521001": ["Smart homes are required to have regular interaction with their internal and external environments [44].", "Smart grids [44], [59] utilize the IoT to improve and enhance"]} +{"16262162|121289": ["Smart grids [44], [59] utilize the IoT to improve and enhance"]} diff --git a/edge/graph_69459505.jsonl b/edge/graph_69459505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f602e326a8b2cba6603a7b686bac28faebfce245 --- /dev/null +++ b/edge/graph_69459505.jsonl @@ -0,0 +1,63 @@ +{"15969941|17205659": ["Normally, this privacy requirement is met by means of encryption stages securing the transmission channel [2], implemented in the digital domain and following the analog-to-digital conversion of the signal."]} +{"18757884|16888186": []} +{"24141077|595093": ["While smart grid can offer ef\ufb01cient energy management based on sensing and communication technologies, there are various challenging issues including security issues [3], [4]."]} +{"1559070|9554464": ["These approaches can be classified into three categories, namely hopby-hop encrypted data aggregation [11], end-to-end encrypted data aggregation [12], [13], and secure hierarchical data aggregation [14]."]} +{"1480605|17381415": ["\u2026interest in extending carrier tracking techniques to a wide range of innovative and emerging applications, such as distributed power generation [18], real-time motion tracking [19], GNSS precise point positioning (PPP) [20], ionosphere scintillation monitoring [21] or space navigation [22],\u2026"]} +{"7525856|4122595": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"7525856|15116409": ["lenges involved in building sampling hardware that operate s at a sufficiently high rate [104].", "cause unnecessarily high acquisition costs [104]."]} +{"7525856|8974063": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"7525856|2509135": ["ment campaigns [17], spectrum management [18], emerging applications [19], spectrum decision [20], spectrum acces s strategies [21], CR techniques under practical imperfecti ons [22], and CR networks [23], a comprehensive review on the applications of CS in CR communications is missing from the literature."]} +{"686532|1230643": ["[8] state that power consumption in sensor network nodes is a critical performance issue in many sensor network applications."]} +{"568143|12817488": ["Since data communication is the most basic but high energy consuming task in sensor networks, a plethora of research work has been pursued to improve its energy consumption [3] [4] [5] [6]."]} +{"19880981|3443381": ["In practice, a variety of CS-based cryptosystems concerning the security of multimedia, imaging, and smart grid data have been suggested in [24]\u2013[31]."]} +{"2193595|4395259": []} +{"7730479|7988320": ["In particular, continuous long-term health\nAcknowledgments: This work was supported by NSF under Grant no."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"17064367|12601073": ["Then, these local decisions are fused by either taking a majority vote from all CRs [9], or computing the average energy followed by energy detection [10].", "In existing solutions for singlechannel sensing [9], [10], CRs first make individual decisions on their received spectrum, which is supposed to share the same nonzero support as the transmitted spectrum of the PUs."]} +{"12562649|11047930": ["This may not consist a major issue for several applications (e.g. [2]) but for other mission-critical implementations and in possible life-threatening situations (e.g [3], [4]), prolonging SOs lifetime is of major importance."]} +{"15039061|12817488": ["Data aggregation [1] is a key task performed within sensor networks to fuse information from multiple sensors and deliver it to a sink node in a manner that eliminates redundancy and enables energy saving."]} +{"3079466|4395259": ["In recent years, there have been several research contributions that follow an alternative path towards key generation by using an information-theoretic approach to derive secrets from unauthenticated broadcast channels (see [6] for a survey)."]} +{"5995342|16219347": []} +{"5995342|15947359": []} +{"5995342|3540699": ["Below we examine some of the key constraints."]} +{"5217915|7525856": []} +{"5217915|16888186": ["Recently, a few attempts have been made to address the problem of eavesdropping threats on distributed detection networks [26]."]} +{"16598795|345263": ["to a different security notion with respect to the standard cryptographic definitions, which is often referred to as perceptual/transparent encryption [23]\u2013[25]."]} +{"9115774|55729907": ["A solution to attain link layer encryption and authentication of the data in biomedical sensor networks is proposed [20]."]} +{"10628993|4395259": []} +{"21223303|9321930": ["Many kinds of approaches have been proposed to enhance the physical-layer security under cooperative communication framework conditions, such as amplify-and-forward (AF) [6,7], decode-and-forward (DF) [8], compress-and-forward (CF) [8], noise-forwarding (NF) [9], etc."]} +{"1268295|6332923": ["Security is a vital aspect in WSN applications [6]."]} +{"22900479|8323234": ["\u2026features: a) the spatial sparsity of channels due to the high path-loss of NLOS paths, b) the low signal-to-noise-ratio (SNR) experienced before beamforming, and c) the much smaller number of RF chains than that of the antennas due to the hardware constraints in mmWave communications [11], [12].", "(24) in 11], where s is the sparse channel vector in the angular domain, the hybrid precoding and combining matrices as well as the angular domain transform matrix compose \u0398 .", "However, the operation of this CS-based hybrid precoding scheme is limited to narrow-band channels, while practical broadband mmWave channels exhibit frequency-selective fading, which leads to a frequency-dependent hybrid precoding across the bandwidth [11].", "To this end, hybrid analog-digital precoding relying on a much lower number of RF chains than that of the antennas has been proposed, where the phase-shifter network can be used for partial beamforming in the analog RF domain for the sake of an improved spatial multiplexing [11].", "In order to reduce the training overhead required for accurate channel estimation, CS-based estimation schemes have been proposed in [11], [12] by exploiting the sparsity of mmWave channels.", "As another promising candidate, mmWave communications is capable of facilitating high data rates with the aid of its wider bandwidth [1], [11], [12].", "(18) in 11]."]} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"1677216|15093118": ["Meanwhile, Sivaraman and Trivedi [29] present a survey of vision-based vehicle detection, tracking, and behavior analysis.", "tracking has been extensively studied [29]."]} +{"1677216|64404": []} +{"8475881|7774517": ["The major challenge to implement security techniques in WSNs is the limited resource constraints [14].", "For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|12817488": []} +{"8475881|1236072": []} +{"8475881|3330313": ["For instance, [14], [15] addressed the development of efficient outlier detection techniques so that proper actions can be taken, and some of these techniques are based on concepts from machine learning."]} +{"8475881|14047190": []} +{"8227817|4122595": ["Therefore, similar to [16], the conventional approaches are briefly reviewed in this survey in order to prepare for introducing the recent research to tackle the original issues.", "As far as recent surveys are concerned, in [16], the authors provided a comprehensive review of the existing CR approaches considering practical imperfections including noise uncertainty, channel/interference uncertainty, CR transceiver imperfections, noise/channel correlation, signal uncertainty, .", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|15116409": ["The problem of wideband (WB) spectrum sensing [6] consists of observing a wideband and identifying the portions of such band which are occupied by a signal and those which are free.", "The first approach to realize wideband sensing assumes that it is feasible to sample the desired spectrum by the ordinary Nyquist rate [6].", "On the contrary, wideband spectrum sensing [6][35] is based", "Compressive sensing [6] becomes a promising candidate to realize this sub-Nyquist approach.", "In other words, spectrum sensing is the task of obtaining awareness about the spectrum usage [6][14].", "However, it should be emphasized that all results presented by previous research work including [6][181], consider relatively small band (order of 300MHz) which is somehow in the order of a medium-sized band when compared to the practical wideband in the order of GHz.", "On the other hand, an overview for the wideband sensing approaches and challenges have been presented in [6].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|8974063": ["The DSMF proposed in [19] is adopted due to its clear functionality, well-defined interfaces among various blocks, and relevance to our discussion.", "Due to dynamically changing topologies and varying propagation characteristics, spectrum selection techniques [19] can be closely coupled with routing protocols.", "Dynamic Spectrum Management Framework for interweave network model [19], [23].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|2509135": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|12601073": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"31973880|7525856": []} +{"31973880|206485791": ["472 Regarding sparsity, compressive sensing requires signals to be sparse; however, signals can only be 473 approximately sparse in practical scenarios [37, 82, 113, 114].", "follows 109 \u2217 (1) 110 where s is the signal\u2019s projection on the sparse basis \u03c6 N \u2217 N , and \u2016s\u2016 \u226a [36, 37]."]} +{"31973880|15116409": ["Over the last decade, a number of spectrum sensing techniques have been proposed to detect and locate 25 dynamically unused spectrum channels in a band of interest [1-6]."]} +{"31973880|12601073": ["Over the last decade, a number of spectrum sensing techniques have been proposed to detect and locate 25 dynamically unused spectrum channels in a band of interest [1-6]."]} +{"41726504|2521001": ["A number of recent articles survey dsecurity issues in smart grids [12]\u2013[20]."]} +{"41726504|5747564": []} +{"16188361|345263": []} +{"18476913|3443381": ["Readers may refer to [18] for a comprehensive review of CS encryption."]} +{"28307247|16888186": []} +{"28307247|4395259": ["The choice of action depends on where its instantaneous channel fading gain to the LFC falls between a set of publicly known thresholds f 1; 2; 3g, with (2)More rigorous definitions and examples can be found in [79]\u2013[81] and the extensive references within."]} +{"1646714|8909218": ["Existing works [12], [21] have shown that people stay"]} diff --git a/edge/graph_6946183.jsonl b/edge/graph_6946183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6947805.jsonl b/edge/graph_6947805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24eeb944995ef01048c611e36ab898f9b02a3ae9 --- /dev/null +++ b/edge/graph_6947805.jsonl @@ -0,0 +1,14 @@ +{"120880944|207372751": []} +{"55658098|1805048": []} +{"18379594|207372751": ["The problem of link prediction is closely related to recommendation with the task being to identify possible missing or future links in a given network [51]."]} +{"18379594|6486398": ["See an extensive review of eigenvector methods for web information retrieval in [27]."]} +{"207372751|1805048": ["tering 2 framework [30]. 2 Collaborative \ufb01ltering is the process of \ufb01ltering for information or patterns using techniques involving collaboration among multiple agents, viewpoints, data sources, etc. [29] 5 Node similarity can be de\ufb01ned by using the essential attributes of nodes: two nodes are considered to be similar if they have many common features [31]. However, the attributes of nodes are general"]} +{"4876217|14148655": ["\u2026users tend to visit very popular items and select similar items, while old users usuallyhavemorespecificinterests[53,54],andusersbehavemuchdifferentlybetweenlow-risk(e.g.,collectingbookmarks, downloading music, etc.) and high-risk (e.g., buying a computer, renting a house, etc.) activities [55,56]."]} +{"4876217|4859605": ["The tripartite network representation has found its application in collaborative tagging systems (also called folksonomies in the literature) [79, 80, 81, 82], where users assign tags to online resources, such as photographs in flickr.", "In [82], the present tag-aware algorithms are"]} +{"4876217|207372751": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices.", "Some challenges can also be partially solved by hybridization, for example, the link prediction algorithm can be used to generate artifical links that could eventually improve the recommendation in very sparse data [123, 319]."]} +{"4876217|18540015": ["For additional information see the recent review articles [121, 122], and [123] is a nice survey that contains a number of similarity indices."]} +{"4876217|1805048": ["For additional information see the recent review articles [123,124], and [125] is a nice survey that contains a number of similarity indices.", "[15,123]), many hybrid algorithms are proposed to avoid certain weaknesses in each approach and thereby improve the recommendation performance."]} +{"16074854|207372751": ["This allows us to treat the problem within a recommender system framework [12].", "By contrast, we employ here a recommendation approach that is usually applied to e-commerce systems [11,12] in order to predict what an individual country will export in the future."]} +{"159996|207372751": []} +{"122907607|7064380": []} +{"18838414|4859605": ["As a powerful tool, recommender system emerges to help people out of the overloaded information, which therefore attracts great interest of scientists from different disciplines [1], including physicists [2, 3].", "So far, most studies try to solve the cold start problem with the aid of other accessorial information, such as the trust relationship [42], and tags [3, 19, 34, 37], or introducing additional parameter [38]."]} diff --git a/edge/graph_69499936.jsonl b/edge/graph_69499936.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..228ff14537cdc9006eaff3c4d63869464d14d7b3 --- /dev/null +++ b/edge/graph_69499936.jsonl @@ -0,0 +1,36 @@ +{"42886751|13372227": ["To use the triangulation technique, it is required to measure the angle or distance between a reference point and a mobile terminal, and there are several methods to measure for this purpose such as, angle of arrival (AOA), time of arrival (TOA), time difference of arrival (TDOA), and received signal strength intensity (RSSI) [11], [12]."]} +{"37870353|8650651": ["To sum up, in the light of the information and communications technology convergence, the above mentioned network layer functions should be software defined to maximise its full potential [134], [135]."]} +{"206577724|870434": ["They are not economical for large scale UWSNs implementations [25]."]} +{"3500026|17165859": ["(ToA, like in GPS) data of the light signals from various directions, on time difference of arrival (TDoA) data, on angle of arrival (AoA) data, or on received signal strength (RSS) data [39]."]} +{"16277818|9176080": ["\u2026simplest techniques for embedding hidden information in displays is spatial-domain steganography (or watermarking), where a spatial code (e.g., QR code [ISO 2006]) is embedded in the display image [Cheddad et al. 2010; Grundhofer et al. 2007; Yuan et al. 2013; Kamijo et al. 2008; Chan et al. 2010]."]} +{"53716317|3930401": ["OWC technologies such as VLC, LiFi, OCC, and FSOC; and RF technologies such as WiFi, 4G/5G small-small cell [6], [7], macrocell, microwave-link are considered for hybrid systems in this paper.", "The use of this band is strictly regulated [1].", "Optical camera communication [1], [5]: OCC uses LEDs and a camera as the transmitter and receiver, respectively.", "The most promising OWC technologies are visible light communication (VLC), light fidelity (LiFi), optical camera communication (OCC), and free space optical communication (FSOC) [1].", "Optical wireless communication (OWC) networks [1]-[5], the complementary of RF based networks is considering as a promising solution.", "FSO communication (FSOC) [13]: FSOC uses LD and PD as transmitter and receiver, respectively."]} +{"5774890|9176080": ["The setting is also related to the classic watermarking literature, but only some of the work considers camera capture, usually involving ultra-low data rates of a few bits per second [3], [4].", "Video watermarking and steganography also make the embedding into images and videos imperceptible [3] [4].", "HiLight [2] modulates bits through slight pixel translucency changes, which reduces \ufb02icker to unnoticable levels but only Watermarking & Steganography [3, 4] HiLight [2] Our goal Fig.", "Watermarking & Steganography [3, 4] HiLight [2] Our goal InFrame++ [1]"]} +{"8479688|206583375": ["As the rapid increase of data services and multimedia services, the demand of localization and navigation also increase significantly[1-4]."]} +{"34564324|5476476": ["A lot of surveys of IPS can be found [27]\u2013[30]."]} +{"34564324|17165859": []} +{"34564324|8650651": ["Due to the high transmission capacities, optical wireless networks play an important role in our modern information technology [12]."]} +{"34564324|206583375": ["According to a recent survey [5], there are various indoor positioning technologies proposed such as Radio-Frequency Identification (RFID) [6], [7], Ultra-Wideband (UWB) [8], Wi-Fi [9], [10], and fingerprint [11]."]} +{"12678488|9176080": []} +{"6816078|206583375": []} +{"27921309|206583375": []} +{"31799015|870434": ["On the other hand, optical modems have been shown to achieve data rates reaching to Mbit/s with ranges up to 100m, only in very clear water conditions [2].", "In underwater, radio signals attenuate rapidly, hence they can only travel to short distances while optical signals scatter and cannot travel far in adverse conditions, as well [2]."]} +{"3738168|73678081": []} +{"3738168|4502294": ["However, FSO communication focuses more on long-range and high data rate outdoor terrestrial optical wireless communication (TOWC) applications such as wireless X-hauling [117]."]} +{"3738168|8316096": []} +{"3738168|8650651": []} +{"3738168|31355144": ["where the transmission between the surface station and optical sensor nodes is single hop [58].", "The architecture of static one-dimensional UOWNs also follows star topology, where the transmission between the surface station and optical sensor nodes is single hop [58]."]} +{"3738168|13475127": ["A detailed survey on marine life research using underwater sensor networks is presented in [298]."]} +{"3738168|902018": ["\u2022 Stationary two-Dimensional UOWNs: In the stationary two-dimensional architecture of UOWNs, a group of static optical sensor nodes is deployed in underwater environment [59]."]} +{"3738168|870434": ["- Fig. 4: Comparison of acouistic, RF, and optical waves under different performance metrics which are highlighted with green and red colors if they favor for high and low values, respectively. bulky [70]. The cost per acoustic node makes creating a large scale underwater acoustic network economically demanding, energy inef\ufb01cient which may necessitate battery replacement burden that can be quite a pro"]} +{"3738168|12060835": ["As surveyed in [390], ongoing research efforts on terrestrial communications have shown that energy harvesting plays a significant role in enhancing the performance."]} +{"7457777|9176080": ["onditions, the initial expectation was that existing watermarking techniques could be used directly. Certainly the work in this \ufb01eld is extensive and has a long history with numerous surveys compiled [4] [35] [28] [5] [14] [27]. Surprisingly, existing methods are not directly applicable to our problem. In the \ufb01eld of watermarking, a \ufb01xed image or mark is embedded in an image often with the goal of id"]} +{"17165859|6972141": ["When a camera is used as the receiver, VLC based positioning might look similar to the vision based positioning [15\u201318] which has been developed in robot vision or augmented reality applications, for quite long time."]} +{"17165859|206583375": []} +{"25188925|206583375": ["[7] proposes a system that uses RF signals along with ultrasonic signals for synchronization, which makes the approach computationally complex.", "However, there are also other performance metrics (see [7] and [8]) to be considered along with accuracy when comparing different positioning systems.", "Another issue is that some positioning systems can track user positions, which raises security and privacy concerns [7].", "Since this work derives a positioning system based on VLC and accelerometer measurements (for estimating receiver\u2019s acceleration and orientation), we modify the list of performance metrics in [7], [8] for comparing VLC-based positioning systems."]} +{"3619739|18167210": ["SDN has the capability of controlling and maintaining the flow centrally and intelligently through its controller.", "The central cloud server will be maintained by the SDN controller and OpenFlow controller.", "The server is used to store the information and broadcast the information through a centralized controller (e.g., Open Flow controller for software defined networking (SDN) [9]) according to the priority of the information received by OCC system.", ", Open Flow controller for software defined networking (SDN) [9]) according to the priority of the information received by OCC system."]} +{"3930401|10235514": []} +{"3930401|4502294": []} +{"3930401|12206204": ["prise ultra-dense heterogeneous networks for which mobile data volume per area will be 1000 times and the number of connected wireless devices will be 100 times higher compared to those in existing wireless networks [1].", "It will offer new services with ultra-high system capacity, massive device connectivity, ultra-low latency, ultra-high security, ultra-low energy consumption, and extremely high quality of experience [1]\u2013[6].", "Therefore, upcoming networks must have the capability to support high user data rates, low power consumption, and negligible endto-end delays [1]\u2013[6]."]} +{"3930401|16050825": ["There exist few literature reviews [14]\u2013[16], [18], [20], [44]\u2013[48] in different aspects of OWC."]} +{"19145635|5476476": ["As the location of the mobile device is unpredictable; a reliable, dynamic, accurate, and situation-adaptive localization technique is required for LBS [1].", "This LBS approaches will not increase consumer activity without a reliable localization system.", "To move forward with consumerfacing commercial applications, location based services (LBS) for smartphones need to be improved."]} +{"19145635|9498511": []} diff --git a/edge/graph_6950376.jsonl b/edge/graph_6950376.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6a6592e2bf33d17cbb6fa14ace7a5b1e7c67445 --- /dev/null +++ b/edge/graph_6950376.jsonl @@ -0,0 +1,7 @@ +{"6546013|1230643": ["Recent technological advances have made it possible to deploy large scale sensor networks consisting of a large number of low-cost, low-power, and multi-functional senso r nodes that communicate in short distances through wireless links [1]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"5789756|9240891": []} +{"17713610|1230643": ["Due to impressive technological innovations in electronics and communications, small lowcost sensor nodes are available, which can collect and relay environmental data [3]."]} +{"16468092|1230643": ["When a sensor network [3] is deployed in unattended and hostile environments such as battlefield, the adversary may capture and reprogram some sensor nodes, or inject some sensor nodes into the network and make the network accept them as legitimate nodes [4]."]} +{"63715784|9240891": []} +{"99520|14441987": ["Reproduction for academic, not-for profit purposes permitted provided this text is included.\nby Royer and Toh (1999) as Reactive and Proactive.", "The model introduces the notion of belief and provides a dynamic measure of reliability and trustworthiness in an ad hoc network."]} diff --git a/edge/graph_6951208.jsonl b/edge/graph_6951208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e36eeb63655cf0ee94306b99d439c3142c4e8858 --- /dev/null +++ b/edge/graph_6951208.jsonl @@ -0,0 +1 @@ +{"47244177|6972141": ["In conventional autonomous agent navigation algorithms, the angle of travel is determined by capturing multiple images by a conventional camera and using complex image processing algorithms [4], [5]."]} diff --git a/edge/graph_69513576.jsonl b/edge/graph_69513576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5521be0848d4e3df33170aa977c1911f6a4f1ebe --- /dev/null +++ b/edge/graph_69513576.jsonl @@ -0,0 +1,3 @@ +{"1883158|17574321": []} +{"13992382|17516538": ["In last years, great effort has been put into the problem of people identification based on gait recognition [18]."]} +{"9866208|17485266": ["There are several optimizers such as RMSprop and Adam [16].", "In this work, we use an improved version of Adam called Nesterov Adam (Nadam) which is a RMSprop with Nesterov momentum."]} diff --git a/edge/graph_69514474.jsonl b/edge/graph_69514474.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..897fa9c7be210e6055dfb98d62809fa045c2baa5 --- /dev/null +++ b/edge/graph_69514474.jsonl @@ -0,0 +1,4 @@ +{"9431951|17109970": []} +{"6532621|2509135": []} +{"6532621|15300368": []} +{"6532621|12452682": []} diff --git a/edge/graph_6952653.jsonl b/edge/graph_6952653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fd3237732af62236e55a9ca3961ae864e21e7a1 --- /dev/null +++ b/edge/graph_6952653.jsonl @@ -0,0 +1,2 @@ +{"156140483|9232628": ["Properties of attitudes\nBeliefs:\nThe following axiom schemata follows from the FIinnTh characterisation of knowledge (Halpern and Moses 1985).", "Agents correspondingly have the property of knowing what they know and believing what they believe (see M4 above), and knowing what they don't know and believe (see MS above) (Halpern & Moses, 1985).", "Halpern (1986) points out that an essentially identical notion of knowledge as distributed amongst processors and described in terms of the states of each of these, was developed independently by himself and Moses (Halpern & Moses, 1986), and others working in distributed systems.", "Halpern, J. Y. & Moses, Y. O. Reasoning about Knowledge: An Overview.", "While none of these attempts appears as yet to provide the definitive solution, they do suggest that there is sufficient flexibility in the possible-worlds approach to make it worth pursuing\" (Halpern & Moses.", "Halpern and Moses offer a solution to common knowledge and infinite regression which involves the introduction of two separate modal opaato s: common knowledge or c, and knowledge which everyone knows or e. c is the fixed point of e. Evaluating particular instances of the consequences of having\ncommon knowledge generates finite approximations of its infinite potential (Halpern & Moses.", "J. Y. & Moses, Y. O."]} +{"110636907|53531425": []} diff --git a/edge/graph_69537351.jsonl b/edge/graph_69537351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a553427c65139d8f4e13ca6e050b02654133ef2 --- /dev/null +++ b/edge/graph_69537351.jsonl @@ -0,0 +1 @@ +{"2879330|1123458": ["This is related to the so-called S -lemma (or S -procedure) in control (e.g., Boyd et al. [40], P\u00b4olik and Terlaky [119]): The S -lemma essentially gives the boundary between what we can solve exactly, and where solving the subproblem becomes di\ufb03cult."]} diff --git a/edge/graph_6959212.jsonl b/edge/graph_6959212.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10e596731100eed2e8d6cec939532bf45c4fdd3e --- /dev/null +++ b/edge/graph_6959212.jsonl @@ -0,0 +1,3 @@ +{"7541518|1230643": []} +{"26332638|14441987": ["Many of them were inspired by ad-hoc network protocols [6,7,8]."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} diff --git a/edge/graph_69616041.jsonl b/edge/graph_69616041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69658659.jsonl b/edge/graph_69658659.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69666457.jsonl b/edge/graph_69666457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7eaab8d49a29031445a3211432968b788497f38a --- /dev/null +++ b/edge/graph_69666457.jsonl @@ -0,0 +1 @@ +{"1502610|16479005": ["[5] surveyed different techniques like MultiLayer Perceptron Neural Network (MLPNN), Back Propagation Algorithm (BPA), Radial Basis Function Network (RBFN), SOM (Self Organization Map) and SVM (Support Vector Machine).", "A neural network is a massively parallel distributed processor made up of simple processing units, which has a natural tendency for storing experiential knowledge and making it available for use [5]."]} diff --git a/edge/graph_69668640.jsonl b/edge/graph_69668640.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..34fe11cd3babf2675b2b8f557ff9a5b1e90c9c3a --- /dev/null +++ b/edge/graph_69668640.jsonl @@ -0,0 +1 @@ +{"2017985|15453366": ["Hence, the antenna weights at CE field indexes 1,2,3,4 are: At CE 1: w n [1] = 0.", "A 7-GHz of bandwidth at 60 GHz carrier frequency is allocated by most regulatory bodies worldwide for unlicensed uses [1]."]} diff --git a/edge/graph_69674190.jsonl b/edge/graph_69674190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69690765.jsonl b/edge/graph_69690765.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c885d94f0502e91116fed7f6dbd9d836ee3cf174 --- /dev/null +++ b/edge/graph_69690765.jsonl @@ -0,0 +1 @@ +{"207178553|7360895": ["In the Human-Robot Interaction (HRI) community it is still under debate what characteristics de\ufb01ne a social robot [9, 12]."]} diff --git a/edge/graph_6969958.jsonl b/edge/graph_6969958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..933e29d0f69ca0e2c370ea3ef557b455cdc6ff51 --- /dev/null +++ b/edge/graph_6969958.jsonl @@ -0,0 +1 @@ +{"10825052|816774": ["Krauter et al. surveyed a few existing Grid resource management systems in [ 14 ].", "Facing varying situations intelligent Grid environments need different scheduling policies and algorithms to handle different kinds of tasks [ 14 ].", "One interesting implementation method is to build job scheduling services on top of Grid middleware to meet the requirements of specific applications [ 14 ]."]} diff --git a/edge/graph_69701610.jsonl b/edge/graph_69701610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69721381.jsonl b/edge/graph_69721381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6972141.jsonl b/edge/graph_6972141.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..29ac439fe5a4caa683b2cbcfd98572828ff6446d --- /dev/null +++ b/edge/graph_6972141.jsonl @@ -0,0 +1,2 @@ +{"922523|1708582": []} +{"515429|192934": ["To date, systems require large and representative datasets [14], [18]."]} diff --git a/edge/graph_69723655.jsonl b/edge/graph_69723655.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9f0e36ad1edb4180fff53c878a7b96f1b4f9a59 --- /dev/null +++ b/edge/graph_69723655.jsonl @@ -0,0 +1,5 @@ +{"11282887|12017064": ["In [12], Modi et al.", "[12] C."]} +{"1528879|141": []} +{"14168742|1041439": ["The former two are eliminated by partial delegation with warrant [28], which is proved to be more secure and practical, so we also use partial delegation with warrant in our protocol design.", "In our scheme we use the algorithm examples in [27], [28] to grant the group administration privilege to the speci\ufb01c group members."]} +{"60283256|17474643": []} +{"14964187|17474643": []} diff --git a/edge/graph_69734270.jsonl b/edge/graph_69734270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6973845.jsonl b/edge/graph_6973845.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40c0edd722f30eeb1fd0e0b60f8d529fb719949f --- /dev/null +++ b/edge/graph_6973845.jsonl @@ -0,0 +1,6 @@ +{"10546301|206778480": []} +{"207561477|8197990": ["There has been a significant amount of computer science research on content-based image retrieval in which a particular query image (possibly a sketch or primitive graphic) is used to find matching relevant images [5]."]} +{"1612609|60455": []} +{"205714536|2809360": ["We refer readers to [17] for a more comprehensive review of NLP issues in healthcare data."]} +{"51614655|13407903": ["Many methods have been proposed to explore images and the associated text information [9], [12], [13], [14], [15], [16], [17], [18], [19], [20]."]} +{"481381|239537": []} diff --git a/edge/graph_6974127.jsonl b/edge/graph_6974127.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37b9275471e4976d8814ed0c98eebc123d9b331d --- /dev/null +++ b/edge/graph_6974127.jsonl @@ -0,0 +1 @@ +{"2017544|6952653": []} diff --git a/edge/graph_6976187.jsonl b/edge/graph_6976187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69779802.jsonl b/edge/graph_69779802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69780288.jsonl b/edge/graph_69780288.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31ac5481098ef9e2a9c93276560364caedfaba2d --- /dev/null +++ b/edge/graph_69780288.jsonl @@ -0,0 +1,9 @@ +{"4474553|7971188": ["as an efficient content distribution approach [6]."]} +{"16306239|18148591": ["bining (MRC), can further enhance the performance of the OW system, and space-time block coding (STBC) MIMO techniques have proven to be very promising [15].", "MIMO techniques are largely used in radio communications [15], where scattering and interference create channels decorrelated from each another.", "In fact, the behavior of such codes is to present a relationship between SNR and BER (or error probability) that is, in the best case (see [15]), Pr{e} \u221d (c \u00b7 SNR)\u2212div , where c is the so called coding gain, and div is the product of the transmission and receive elements (full diversity)."]} +{"26304576|11720829": ["Depending on the relationship between the signals transmitted from different antennas MIMO schemes can be used to either increase the overall capacity of the system, or to reduce the probability of outage [48], [49]."]} +{"15051092|18148591": ["MIMO is widely used in radio communications [9], where scattering and interference creates channels that are decorrelated from one another.", "The simple matrix inversion and multiplication used to obtain an estimate of the transmitted data is susceptible to noise, and computationally inefficient compared with many of the advanced RF techniques in use [9], and there are likely to be substantial gains to be made with use of some"]} +{"3395389|8650651": ["It would be interesting to consider the SDN and virtualization ideas presented in [24] and [25] for optical networks generally and for protection and failure recovery specifically as a future area of investigation."]} +{"40352008|16050825": ["The most important feature is, compared to the limited spectra of the traditional radio frequency and millimeter wave [4], VLC systems have huge unregulated bandwidth resource available to be the promising complementary for short-range wireless transmission [1, 2].", "To add the value for LED illumination at minimal expense, visible light communication (VLC) using white LEDs have attracted considerable interests in next-generation short-range wireless access because of the advantages of worldwide availability, high security, immunity to radio frequency interference, and spatial reuse of the modulation bandwidth in adjacent communication cells [1-3]."]} +{"113420199|16050825": []} +{"113420199|206583375": []} +{"14986449|16050825": ["Firstly, the standards framed by IrDA and IEEE for typical room sizes in indoor optical wireless systems are of the order of this range [9,29]."]} diff --git a/edge/graph_69788984.jsonl b/edge/graph_69788984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69796094.jsonl b/edge/graph_69796094.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69811327.jsonl b/edge/graph_69811327.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6981610.jsonl b/edge/graph_6981610.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..880dc5e19971ae2c83654b0862a87dcb478fac34 --- /dev/null +++ b/edge/graph_6981610.jsonl @@ -0,0 +1,17 @@ +{"16443264|14749995": ["Most of the published works in iris recognition depict systems which are able to operate only on near infrared images [3]."]} +{"16823944|11042075": ["These gait databases are needed to fairly compare and evaluate the performance of the gait recognition algorithm [19].", "For previous literature review of model free approach as well as model based approach readers can refer paper [19].", "GEI,FDF and GEnI are silhouette region-based gait features and CGI and GFI are silhouette contour based gait features and capture more dynamic components For more information about previous work done on motion based approach readers can refer paper [19]."]} +{"16823944|12127129": ["[23][24] The Institute of Automation Chinese academy of Sciences has provided this dataset."]} +{"8918672|6670217": ["and the recent surveys regarding mobile security [125], malware propagation modeling [166] and evolution [204], [242]."]} +{"8918672|15219853": []} +{"39414012|15219853": []} +{"17500843|15782139": ["Signature recognition can be divided into two main areas depending on the method of data acquisition: on-line and off-line signature recognition [3], [4]."]} +{"11163123|8953108": ["Traditional hand geometry system always uses pegs t o fix the placement of the hand [3,4,5,6]."]} +{"16844900|15219853": []} +{"21794553|18609918": ["The intersection points of the circles and the ear contours are used as feature points [28]."]} +{"14081254|11792588": ["In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features. Yamada and Nakano (1996) explore direction histogram in character image to extract features. A multi-template based strategy with clustering feature is adopted to recognize segmented characters. Likewise, Kimura et al. (1997) evaluate features by calculating local histograms based on chain code information for segmented character classification. Krzyyzak et al. (1990) extract features from inner and outer contours of characters: simple topological features extracted from the inner contours and fifteen Fourier descriptors are extracted from the outer contours. Oh and Suen (1998) extract two feature set based on distance transformation and directional distance distribution (DDD). In the first feature set, distance of each white pixel to the nearest black pixel in the character image is calculated without character skeletonization. The second feature set composes of information encoding both black/white and directional distance distributions. Additionally, a new method of map tiling is introduced and is applied to the DDD feature to improve its discriminative ability. All experiments are carried out on three different sets of characters consisting of numerals, English letters, and Hangul letters. Promising results reported to confirm the best combination of DDD feature and the map tiling. Blumenstein et al. (2004, 2007) and Verma et al. (2004) use directional features extracted from character contours. The technique replaces foreground pixels of character contours with suitable direction values. Finally, image is divided into windows to extract features. Likewise, Mitrpanont and Limkonglap (2007) also analyze contours of Thai characters to capture movement of features for Thai character recognition. Other studies by some researchers have also integrated these complementary features (statistical and structural) to investigate properties of character in order to improve recognition accuracy (Saba et al. 2010b). Camastra and Vinciarelli (2003) propose hybrid feature extraction technique for character recognition.", "In this regard, Arica and Yarman-Vural (2001) also present a comprehensive review on structural features information.", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features. Yamada and Nakano (1996) explore direction histogram in character image to extract features. A multi-template based strategy with clustering feature is adopted to recognize segmented characters. Likewise, Kimura et al. (1997) evaluate features by calculating local histograms based on chain code information for segmented character classification. Krzyyzak et al. (1990) extract features from inner and outer contours of characters: simple topological features extracted from the inner contours and fifteen Fourier descriptors are extracted from the outer contours. Oh and Suen (1998) extract two feature set based on distance transformation and directional distance distribution (DDD). In the first feature set, distance of each white pixel to the nearest black pixel in the character image is calculated without character skeletonization. The second feature set composes of information encoding both black/white and directional distance distributions. Additionally, a new method of map tiling is introduced and is applied to the DDD feature to improve its discriminative ability. All experiments are carried out on three different sets of characters consisting of numerals, English letters, and Hangul letters. Promising results reported to confirm the best combination of DDD feature and the map tiling. Blumenstein et al. (2004, 2007) and Verma et al. (2004) use directional features extracted from character contours.", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features. Yamada and Nakano (1996) explore direction histogram in character image to extract features. A multi-template based strategy with clustering feature is adopted to recognize segmented characters. Likewise, Kimura et al. (1997) evaluate features by calculating local histograms based on chain code information for segmented character classification. Krzyyzak et al. (1990) extract features from inner and outer contours of characters: simple topological features extracted from the inner contours and fifteen Fourier descriptors are extracted from the outer contours. Oh and Suen (1998) extract two feature set based on distance transformation and directional distance distribution (DDD). In the first feature set, distance of each white pixel to the nearest black pixel in the character image is calculated without character skeletonization. The second feature set composes of information encoding both black/white and directional distance distributions. Additionally, a new method of map tiling is introduced and is applied to the DDD feature to improve its discriminative ability. All experiments are carried out on three different sets of characters consisting of numerals, English letters, and Hangul letters. Promising results reported to confirm the best combination of DDD feature and the map tiling. Blumenstein et al. (2004, 2007) and Verma et al. (2004) use directional features extracted from character contours. The technique replaces foreground pixels of character contours with suitable direction values. Finally, image is divided into windows to extract features. Likewise, Mitrpanont and Limkonglap (2007) also analyze contours of Thai characters to capture movement of features for Thai character recognition.", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001).", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features. Yamada and Nakano (1996) explore direction histogram in character image to extract features. A multi-template based strategy with clustering feature is adopted to recognize segmented characters. Likewise, Kimura et al. (1997) evaluate features by calculating local histograms based on chain code information for segmented character classification.", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features. Yamada and Nakano (1996) explore direction histogram in character image to extract features.", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features. Yamada and Nakano (1996) explore direction histogram in character image to extract features. A multi-template based strategy with clustering feature is adopted to recognize segmented characters. Likewise, Kimura et al. (1997) evaluate features by calculating local histograms based on chain code information for segmented character classification. Krzyyzak et al. (1990) extract features from inner and outer contours of characters: simple topological features extracted from the inner contours and fifteen Fourier descriptors are extracted from the outer contours. Oh and Suen (1998) extract two feature set based on distance transformation and directional distance distribution (DDD).", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features. Yamada and Nakano (1996) explore direction histogram in character image to extract features. A multi-template based strategy with clustering feature is adopted to recognize segmented characters. Likewise, Kimura et al. (1997) evaluate features by calculating local histograms based on chain code information for segmented character classification. Krzyyzak et al. (1990) extract features from inner and outer contours of characters: simple topological features extracted from the inner contours and fifteen Fourier descriptors are extracted from the outer contours.", "In the former technique, strokes of the character are mapped in 2D parameter space and in the later, the character is divided into a set of topological fragments such as strokes, loops, cross points etc then these fragments are represented by relational graphs (Arica and Yarman-Vural 2001). Again, there are two types of image representation by graphs. The first explores relationships between strokes and edges and second, uses coordinates of the character shape (Haron et al. 2012). A number of techniques extract features from character\u2019s contours. Kimura and Shridhar (1991) divide contour profile into two halves and discrete function of each half is approximated to extract features."]} +{"15294065|2357830": ["following papers for a detailed overview of specifi c attack scenarios and countermeasures [17][18][19] [20][ 21]."]} +{"6387482|4491892": ["These methods are also known as Sequential Monte Carlo (SMC) methods [33]."]} +{"8308029|2122433": ["Machine translation is difficult mainly because natural language is highly ambiguous and thus, its translation involves a huge amount of human knowledge to be encoded in a machineprocessable form."]} +{"7044689|15782139": ["REFERENCES\n[1] R. Pelamondon, SN. Srihari, \"On-line and off-line handwriting recognition: a comprehensive survey,\" IEEE Trans. on Pattern Analysis, vol. 22, pp. 63-84, 2000.", "These methods have been introduced by Plamondon and Srihari [1]."]} +{"21424448|206485791": []} +{"14345268|206982591": ["Some scientists believed that they are actually the same and each of them is created by another one, this issue is discussed in detail in reference [4]."]} diff --git a/edge/graph_69822108.jsonl b/edge/graph_69822108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69827137.jsonl b/edge/graph_69827137.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69839438.jsonl b/edge/graph_69839438.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccd870a8b48734fb0fb1c666db1b30ce23a06b83 --- /dev/null +++ b/edge/graph_69839438.jsonl @@ -0,0 +1,28 @@ +{"49190877|206578224": []} +{"18032567|7892994": []} +{"2742360|14889616": ["range of devices, the Scalable Video Coding (SVC) mechanism [2] is introduced."]} +{"6758116|6583734": ["However, we emphasize that the virtualization and deployment of network functions do not necessarily rely on SDN technologies, and viceversa [4], [35]."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"16130949|2623404": ["Besides the network virtualization functions, the Soft Defined Networking(SDN) enables interworking of virtualized network functions on different virtual machines in the same data center (DC) or across multiple data centers to obtain a flexible, mobile, and dynamic network, rapidly deployable in the Cloud [5, 6, 7, 8, 9].", "In the Carrier cloud platform, the Mobile Service Core network Cloud intelligently decides where to place the mobile core network functions in the infrastructure or the platform and provide adequate resources (compute and storage) to run these mobile core network functions.", "The architecture of the Carrier Cloud is divided into two parts: (i) as it was already underlined the carrier cloud has a Cloud Computing part, that part is characterized by the presence of a set of data centers (DCs).", "Besides the network virtualization functions, the Soft Defined Networking(SDN) enables interworking of virtualized network functions on different virtual machines in the same data center (DC) or across multiple data centers to obtain a flexible, mobile, and dynamic network, rapidly deployable in the Cloud [5] [6] [7] [8] [9].", "This needs are dynamically and automatically assessed based on the predictions of the users' needs and then are used by the Carrier Cloud platform, which controls the resources to select the optimal network configuration.", "In the case of the Carrier Cloud, the mobile service provider expresses his need to Carrier Cloud provider; for example: Need for adequate resources to serve N1 customers in slot 1, N2 customers in slot 2, etc.", "The overall goal of the Carrier Cloud is to allow building, on demand, a mobile network in the cloud and in an elastic manner.", "The Carrier Cloud comes as an answer to those needs, as it is a combination of two environments that are the cloud computing and the telecommunication.", "In [12] the architecture was composed of a physical infrastructure containing DCs connected through a public network, and a virtual infrastructure made using one or more Cloud infrastructure providers."]} +{"15064150|9104850": ["I. INTRODUCTION\nTHE INTERNET is growing everyday; we see more sitesproviding more content to more users each day."]} +{"15917201|14889616": []} +{"63379727|6583734": ["Beginning with the middlebox concept [16], NFV architecture aims to reduce the operational cost (CapEx and OpEx [17]) by using consolidation methods [4], [18]."]} +{"1079645|8909218": []} +{"44098972|206578224": []} +{"3562902|7074478": ["For SFCs, the optimal deployment of vNFs will change when their users move [14]."]} +{"22204217|13372398": []} +{"3092472|2623404": ["This is a simpli\ufb01ed view of controller operation, a detailed description of controller application functionality is beyond the context of this paper but is described by [14]."]} +{"3092472|8070893": ["\u2026digital media on the Internet is an important step in the delivery of video content to end users; it provides not only a reduction in bitrate, so that more content can be delivered on a given set of links, but also allows the content to be tailored and adapted to the receiving device [3].", "Two main mechanisms for achieving this are transcoders [3] and application layer multicasting [4]."]} +{"207027690|7567339": ["In particular, we investigate the use of the Cognitive Packet Network (CPN) [20], [21] to design and evaluate the scalable routing overlay."]} +{"3546145|21386749": ["[44] reviewed the advances in health care which relies on Internet of Things (IoT) technologies.", "In particular, the work [44] also included security related taxonomies in the context of healthcare."]} +{"19258692|3488022": ["With regard to this, Fingasa and Brownb [7] collected a variety of airborne big data in different seas where oil spills occurred previously.", "[7] M. Fingasa and C. Brownb, \u201cReview of oil spill remote sensing,\u201d Marine Pollution Bull., vol. 83, no. 1, pp. 9\u201323, Jun. 2014."]} +{"44154198|52059869": ["Regarding network slicing, network management and orchestration (MANO), there have been an important amount of research work conducted recently, summarized in [13] and [14]."]} +{"44154198|206578224": ["Regarding network slicing, network management and orchestration (MANO), there have been an important amount of research work conducted recently, summarized in [13] and [14]."]} +{"49188565|52059869": ["Regarding network slicing and MANO, there has been an important amount of research work conducted recently summarized in [6] [7]."]} +{"49188565|206578224": ["Regarding network slicing and MANO, there has been an important amount of research work conducted recently summarized in [6] [7]."]} +{"21063092|14889616": []} +{"21063092|17428811": ["Scalable Video Coding (SVC) SVC [11], [13] is the scalable extension of H.", "On the video coding side, multiple description coding (MDC) and scalable video coding (SVC) have been designed to generate several substreams such that different levels of reconstruction qualities can be achieved with different subsets of them [10], [11]."]} +{"18141241|15209496": ["A detailed list of the 172 resulting articles can be found in [48].", "As identified in [48], there is no existing testbed problem instances for the VMP that can today be used as a world accepted benchmark.", "A detailed list of the 84 resulting articles can be found in [48]."]} +{"6210908|14889616": ["We will not further elaborate on SVC in this paper, and refer the reader to [16] for details.", "However, it has been shown that the overhead can be bounded below 10% [16].", "To this end, we propose to incorporate Scalable Video Coding (SVC) [13], [16], which enables data reuse among different video versions."]} +{"39028145|1222880": ["The documents in [3-5] provide surveys on related research work dealing with resource allocation, VM management and VM placement in cloud environments."]} diff --git a/edge/graph_69840714.jsonl b/edge/graph_69840714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca2bfe7420c5c3f8ade40067f11039a320d1bc9a --- /dev/null +++ b/edge/graph_69840714.jsonl @@ -0,0 +1,4 @@ +{"126088678|206485791": []} +{"134577113|69840714": []} +{"67047568|69840714": []} +{"115447845|69840714": []} diff --git a/edge/graph_6984507.jsonl b/edge/graph_6984507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69875731.jsonl b/edge/graph_69875731.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e2b4d91784eef34d9e155da1fc0da40951069ba --- /dev/null +++ b/edge/graph_69875731.jsonl @@ -0,0 +1,6 @@ +{"1095891|469744": ["By overlaying virtual content onto the real world, Augmented Reality (AR) allows users to perform tasks in the real and virtual environment at the same time [1]."]} +{"1095891|17024419": ["Lee et al. [12] designed gloves with conductive fabric on the fingertips and the palm for gesture recognition and vibration motors for haptic feedback."]} +{"8397645|7788290": ["Gavrila [ 9 ] provides an overview about early work visual analysis of human movement while Wu and Huang [33] specifically reviewed work on vision-based gesture recognition."]} +{"33024853|5401262": []} +{"11182633|14970359": []} +{"4706113|12572872": ["The use of stereoscopy might also improve depth perception, as implied by related research (Renner et al. 2013)."]} diff --git a/edge/graph_6988077.jsonl b/edge/graph_6988077.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_6988770.jsonl b/edge/graph_6988770.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3643ab529dfdd971854be4be6a37b1f426d1461 --- /dev/null +++ b/edge/graph_6988770.jsonl @@ -0,0 +1,18 @@ +{"16117868|6988770": ["This development can alter the automation landscape in many different ways, giving rise to the new field of cloud automation [10], [13], [16]."]} +{"15264780|6607209": ["We choose Weibull distribution because it is a versatile distribution that can represent different kinds of statistical distribution and therefore can take on various characteristics based on the following function:\n(20)\nwhere is the scale parameter, and is the shape parameter."]} +{"15264780|6988770": ["Instead, robots can be relieved from hardware limitations while benefiting from vastly available resources and centralized high computing capability provided by the cloud platform [8]."]} +{"12964914|2082499": ["A recent survey on duplicate detection has argued that the matching phase is typically much more expensive than the blocking phase [13]."]} +{"12964914|386036": ["This problem has been extensively studied for several decades [22]."]} +{"16371730|12715779": ["Some views of human computation are centered on the use of games [74].", "[8,74] \u201c\u2026a technique to let humans solve tasks, which cannot be solved by computers.\u201d"]} +{"16371730|30815820": ["\u2026that facilitate collective action and social interaction online with rich exchange of multimedia information and evolution of aggregate knowledge\u2026\u201d [48] \u201c\u2026 the interplay between persons' social behaviors and their interactions with computing technologies\u201d [15] The key distinction between human\u2026"]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"22537783|12377645": []} +{"22537783|627405": ["Thirdly, due to the known limitations of the search engines [6], we also noticed and confirmed that the automated search missed important studies."]} +{"8815923|118142": ["[1], the authors divide the methodologies into analytic and empirical.", "[1] divide the data-driven methods that are based on whether they employ object features or observation of humans during grasping."]} +{"5240721|8815923": ["This makes the problem of grasping significantly more challenging (Bohg et al., 2014), as the algorithm must use more limited and potentially noisier information to detect a good grasp."]} +{"5240721|118142": ["[53], Bicchi and Kumar [2] and Shimoga [58]."]} +{"18311629|8983048": ["There is a good deal of literature on depth scan registration (Gelfand et al. 2005; Makadia et al. 2006; Salvi et al. 2007), but our problem is somewhat different, as we are attempting to align a partial set of views of one model with the geometry of a different, neighboring model, rather than with\u2026", "There is a good deal of literature on depth scan registration (Gelfand et al. 2005; Makadia et al. 2006; Salvi et al. 2007), but our problem is somewhat different, as we are attempting to align a partial set of views of one model with the geometry of a different, neighboring model, rather than with an overlapping scan of the same model from a different viewpoint."]} +{"18311629|987239": ["details, we refer the reader to surveys by [Campbell and Flynn, 2001; Tangelder and Veltkamp, 2004; Iyer et al., 2005; Bustos et al., 2005; Del Bimbo and Pala, 2006; Yang et al., 2007]."]} +{"18311629|6681074": ["details, we refer the reader to surveys by [Campbell and Flynn, 2001; Tangelder and Veltkamp, 2004; Iyer et al., 2005; Bustos et al., 2005; Del Bimbo and Pala, 2006; Yang et al., 2007]."]} +{"16771091|6988770": ["For this reason, during the last few years, an important number of research papers and projects are addressing the use of cloud infrastructures in robotics [1]\u2013[4]."]} diff --git a/edge/graph_6991357.jsonl b/edge/graph_6991357.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_69943319.jsonl b/edge/graph_69943319.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd47599d163a764eee85e6246d98e85c3299f6dc --- /dev/null +++ b/edge/graph_69943319.jsonl @@ -0,0 +1 @@ +{"33460117|20528549": ["Since Computer-Mediated Communication (CMC) technologies have become widespread, there is a great potential for technology-based tasks to help learners develop their L2 oral performance [3]."]} diff --git a/edge/graph_69949978.jsonl b/edge/graph_69949978.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2abd6e9c651ffef21730e18c654908be9024ac64 --- /dev/null +++ b/edge/graph_69949978.jsonl @@ -0,0 +1,7 @@ +{"10533371|1230643": ["A wide range of potential applications with WSNs have been envisioned, such as temperature and environmental conditions monitoring, wildlife habitat monitoring, security surveillance in military and battle-fields, smart homes and offices, improved health care, industrial diagnosis, etc[1]."]} +{"10096622|12817488": ["PSO algorithms for WSN localization are summarized in Table I."]} +{"902018|870434": ["In summary, node deployment algorithms designed for UASNs need to address the adverse physical channel conditions and water mobility while staying energy-efficient [5]."]} +{"2185957|870434": ["While self-deployment/reconfiguration of terrestrial wireless sensor networks (WSNs) has been studied extensively, such selforganization has just started to receive attention for Underwater Acoustic Sensor Networks (UWSNs)."]} +{"5178260|141053": ["There has been intensive recent research on MAC protocols fo r ad hoc [17] and wireless terrestrial sensor networks [16]."]} +{"5178260|1762301": ["In recent years there has been a great interest to develop new routing protocols for terrestrial ad hoc [1] and wireless se nsor networks [2]."]} +{"37641689|205286988": []} diff --git a/edge/graph_69950625.jsonl b/edge/graph_69950625.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2ef357a8b87ed018ac34dfa601cf3f747468edd --- /dev/null +++ b/edge/graph_69950625.jsonl @@ -0,0 +1,2 @@ +{"22395961|6409498": []} +{"206581278|6409498": []} diff --git a/edge/graph_69964413.jsonl b/edge/graph_69964413.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c14502f28ac48764198232a2f6978336e83868d --- /dev/null +++ b/edge/graph_69964413.jsonl @@ -0,0 +1,22 @@ +{"46877340|17437856": ["Some a reactive fault tolerance strategies are as follows [11] [18].", "It increases the execution time over the expected time because of the repetition of the task [10] [11].", "A transient fault means fault takes some time until all component functionality restored [11].", "The scheduling point [11] is important when there are many tasks need to execute at the same time."]} +{"28028672|448220": []} +{"18111826|3205677": ["approaches have been proposed to enhance cloud service reliability [6], [7]."]} +{"3450996|17787193": ["According to the initiator diversity of the data of\ufb02oad-ing, we classify the data of\ufb02oading techniques into four categories, i.e., data of\ufb02oading through small cell networks (SCNs), WiFi networks, opportunistic mobile networks or heterogeneous networks (HetNets), respectively [4]."]} +{"53007190|8591084": []} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"206902669|2623404": []} +{"3070067|16194727": ["Genetic Algorithm [14]"]} +{"30129780|8591084": ["Based on the above fault tolerance techniques the following fault tolerance models have been proposed [4]"]} +{"14745299|16866891": ["In the last two decades, more than a dozen new algorithms such as particle swarm optimisation, di\ufb00erential evolution, bat algorithm, \ufb01re\ufb02y algorithm and cuckoo search have appeared and they have shown great potential in solving tough engineering optimisation problems [32, 5, 16, 27, 34, 35, 17]."]} +{"9141490|4474193": ["In the following we explain the working principles of these strategies, but for a detailed analysis and complete references, see (Jin and Branke 2005).", "The intuition behind implicit averaging is the following (Jin and Branke 2005, p. 305): because promising areas of the search space are sampled repeatedly by the EC algorithm, and there are usually many similar solutions in the population, when the population is large, the influence of noise in\u2026", "The reader interested in EC applied to optimization with noisy fitness or with time varying information may find references in the surveys by Jin and Branke (2005)."]} +{"9141490|12419623": ["A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; O \u00b4 lafsson and Kim 2002).", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002).", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002). The latest one by \u00d3lafsson and Kim (2002) emphasizes discrete problems and practical approaches, including some references to metaheuristics. Until a few years ago, the literature on Simulation Optimization was especially focussed on theoretical results of convergence of mathematically elegant algorithms. Interestingly, as noted by Fu (2002), the many new commercial software packages for simulation do not take advantage of the theoretical results of the literature.", "\u2019\u2019 A compact picture of the field is given by the reviews of the Winter Simulation Conference (Andrad\u00f3ttir 1998; \u00d3lafsson and Kim 2002). The latest one by \u00d3lafsson and Kim (2002) emphasizes discrete problems and practical approaches, including some references to metaheuristics."]} +{"64995085|4884302": ["The key strength of this approach is the ability to handle large data and therefore enable RL to be extended to problem areas that were previously intractable [96]."]} +{"64995085|26368310": ["Colman-Meixner et al. [91] provide a comprehensive survey of resilient techniques applied at different layers of the cloud architecture."]} +{"15193514|19005250": ["We present the design of a new hardware-based routing algorithm for multicast, that is at the base of our proposal."]} +{"3793686|9766972": ["They are still essential mechanisms for the analysis of software products [12]."]} +{"3793686|14583671": ["Techniques for program slicing have emerged in the seventies as popular mechanisms for program debugging [10][11]."]} +{"8591084|17437856": ["The dependability of some aspects of the QoS provided by the system consists of features such as dependability and availability [9]."]} +{"18635680|393948": []} +{"27557896|206584087": ["Following is the list of numerous measures that can be used to evaluate performance of the DDoS attack detection methods [2, 46].", "Defense mechanisms are classified based on two things [46], first, based on location where defense mechanism is placed or deployed, i.", "The location or the place of defensive system should be closer to the source of the attack so as to minimize the effects of the network downtime [46]."]} +{"2773825|206584087": [", IP traceback using router information [10], management information based traceback [11], or packet marking based tracing [12]."]} diff --git a/edge/graph_69981142.jsonl b/edge/graph_69981142.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57b04371de93f429354f16a81be8dcf7a4f22378 --- /dev/null +++ b/edge/graph_69981142.jsonl @@ -0,0 +1,3 @@ +{"46346063|191396": []} +{"842561|13726263": ["Approaches for frequent itemset mining [10,11,21] and classification [1,15] have been proposed."]} +{"18559882|8125630": []} diff --git a/edge/graph_69984231.jsonl b/edge/graph_69984231.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f2e30eefeb57ea3376406e71ebb2663262c73cb --- /dev/null +++ b/edge/graph_69984231.jsonl @@ -0,0 +1,7 @@ +{"17087365|7358409": ["Recently, [3] adapts SS transforms to strongly modulated components by adding an extra term to the instantaneous frequency estimate function to measure the stronger nonlinearity using some reassignment techniques [1, 2].", "Another idea is to apply the improved SS operator based on time-frequency reassignment in [3], which might lead to a smaller \u03b1 and a smaller \u03b3 in the improved SSSTFT."]} +{"11106318|16760578": ["INTRODUCTION Heart disease is among the main causes of death in most countries of the world [1]."]} +{"5334638|12663580": ["This margin-based approach typically constructs classification models with excellent generalization ability, making it a powerful tool in various applications [33]."]} +{"126149444|46924129": []} +{"21690511|11894197": []} +{"33345863|14755547": ["If the probability of occurrence of the k-th permutation pattern is denoted by Bk, then the Permutation Entropy (PEnt) can be computed as [36,37]: PEnt = \u2212 e! \u2211 k = 1 Bklog(Bk) (1)", "We have used this entropy due to its simplicity and robustness towards noise [37,38]."]} +{"28739715|192934": ["The sequential floating search methods (SFSM) are effective feature selection techniques [43,45,47].", "In literature there are various methods to estimate the error rate such as re-substitution method, hold out method, leave one out method, and bootstrap [47].", "[47] A."]} diff --git a/edge/graph_70000805.jsonl b/edge/graph_70000805.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7000090.jsonl b/edge/graph_7000090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..928156dedc5fbf8adf1562e0a529ede4293e3efe --- /dev/null +++ b/edge/graph_7000090.jsonl @@ -0,0 +1,2 @@ +{"54123103|17233734": []} +{"54123103|14597368": []} diff --git a/edge/graph_700029.jsonl b/edge/graph_700029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_700123.jsonl b/edge/graph_700123.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_70042561.jsonl b/edge/graph_70042561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..83d36ed236091589a5af19775f98d2bbe74ffa4d --- /dev/null +++ b/edge/graph_70042561.jsonl @@ -0,0 +1,4 @@ +{"106423530|2669421": []} +{"12350982|12886544": ["However, some important work has tackled problems for collaborative learning in networked and online learning systems (Magnisalis et al., 2011)."]} +{"24848815|954543": []} +{"7937678|2669421": ["In [20], a recommender system has been proposed to facilitate the MOOC design process."]} diff --git a/edge/graph_70044252.jsonl b/edge/graph_70044252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_70056154.jsonl b/edge/graph_70056154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52aa169113b177e7abed64514fe9183d87fe367a --- /dev/null +++ b/edge/graph_70056154.jsonl @@ -0,0 +1 @@ +{"24832185|2088679": []} diff --git a/edge/graph_7007232.jsonl b/edge/graph_7007232.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af8ac6c4f081112f77ab2a0e90ba68371ed1a330 --- /dev/null +++ b/edge/graph_7007232.jsonl @@ -0,0 +1,35 @@ +{"11730753|14889616": ["In this work, the maximum allowed GOP size is 32, since this size provides enough variation headroom for the GOP size and good coding efficiency [3].", "In general, the GOP structure used in scalable video coding is fixed and regular over time in order to provide a hierarchical coding structure [3].", "However, such approach is highly redundant and does not benefit from the most recent advances in efficient coding techniques, namely scalable video coding [3]."]} +{"11730753|2748484": ["There are two main types of video summaries, namely those based on key frames and those comprised of video skims [2]."]} +{"31581917|14889616": ["This new speci cation is known as SVC[22].", "The SVC standard[22] is built as an extension of H."]} +{"31581917|2748484": ["Several approaches have been used in video skimming, including visual attention[7], image and audio analysis[8, 9] and high level semantics[2]."]} +{"31581917|8070893": ["This approach to adaptation is known as transcoding[20], and it can be computationally very demanding."]} +{"3106971|16403716": ["INTRODUCTION\nShot classification has been researched within a video summarization context in order to provide efficient video indexing, retrieval and browsing mechanisms in sport, news, broadcasting, etc. Video summarization methods [1, 2] initially try to select a set of salient video frames such\u2026"]} +{"3106971|2748484": []} +{"5630518|16403716": ["The derived video summaries can be subsequently exploited in various applications, like interactive browsing and search systems, thereby offering the user the ability to efficiently view, manage and assess video content [2].", "described by low-level image descriptors, such as global color-based, texture-based or shape-based features [2]."]} +{"5630518|10397481": []} +{"16678199|14889616": ["Given the spatial resources of terminal display and generated video summary, the final browsing layout is generated utilising an unsupervised robust spectral clustering technique and a fast discrete optimisation algorithm."]} +{"39982069|10397481": ["In general, the extraction of these semantic primitives is not feasible [2,3].", "Apart from browsing, video summaries can also help users quickly locate a semantically relevant position in a video [3].", "Moreover, for small devices, key frames may provide better browsing capabilities than video skims because they enable users to quickly go through the salient contents of the video in one gaze fixation without watching even a small video [2,3].", "For a detailed review of the existing techniques, the readers are referred to the surveys [2,3]."]} +{"16403716|50041": ["The task of video classification [106], [245] is to find rules or"]} +{"16403716|2748484": ["as a supplement to previous surveys [39], [181] on video summarization.", "Video summarization [39], [156], [157], [181] removes the redundant data in videos and makes an abstract representation"]} +{"4657009|11239740": []} +{"45410804|987239": ["Comprehensive surveys on 3D retrieval can be found in [6, 8, 9, 34, 35, 41]."]} +{"12495944|61451747": []} +{"10397481|2748484": []} +{"41934296|16403716": []} +{"41934296|10397481": []} +{"2748484|192934": ["For this example, the meanshift algorithm [41] was applied to each feature curve to segment the movie into multiple story elements, whose boundaries are marked by vertical lines."]} +{"22860706|987239": []} +{"17035385|16194799": ["Object recognition [46] and event detection techniques [33, 44] can help to guide the summarization of complex videos, by detecting and highlighting objects and events of interest."]} +{"17035385|10397481": ["Video summarization is a challenging field as it involves high level understanding to select representative pieces of the original video, and present them in an effective, intuitive and appealing way [26, 40]."]} +{"17035385|14889616": ["and scalable video coding [1, 29, 36] can deliver bitstreams with different resolutions, bitrates or frame rates, according to the particular requirements."]} +{"17035385|8070893": ["For instance, transcoding [2, 43]"]} +{"1804165|585863": ["concentrated on comparing the computational complexity of various approaches [23].", "With the emergence of numerous SBD approaches, several excellent surveys have been presented [8], [9] [15], [21]\u2013[23]."]} +{"1804165|9835525": ["The related surveys with discussions on thresholding scheme can be found in [8], [9].", "In [8], [9], [15], [21], the performances of various approaches were evaluated.", "In [8], Lienhart identified several core techniques underlying the various SBD schemes and reviewed their roles in detecting CUTs, fades and dissolves.", "The relatively comprehensive surveys can refer to [8] and [9].", "The relatively satisfactory results have been reported in [8].", "With the emergence of numerous SBD approaches, several excellent surveys have been presented [8], [9] [15], [21]\u2013[23].", "The effectiveness of monochrome frame detection has been reported in [8], [36], and [40]."]} +{"1804165|8365617": ["Similar problems exist in the related fields, such as temporal data segmentation [63], signal segmentation [64], and image segmentation [65]."]} +{"45822624|10397481": []} +{"45822624|2748484": ["Comprehensive surveys of past video summarization results can be found in (Li et al., 2006; Truong and Venkatesh, 2007; Money and Agius, 2008)."]} +{"40210464|9835525": []} +{"5787573|9835525": []} +{"14889616|3540699": ["For more detailed information about H.264/AVC, the reader is referred to the standard [6] or corresponding overview papers [23]\u2013[26] While the VCL creates a coded representation of the source content, the NAL formats these data and provides header information in a way that enables simple and\u2026"]} +{"36581971|11239740": ["Ahanger et al. [ 20 ] surveyed the field of video indexing without evaluating or characterizing particular algorithms."]} +{"6412862|987239": ["Three-dimensional (3D) shape matching has been widely investigated (Bustos et al. 2007; Del Bimbo and Pala 2006; Iyer et al. 2005; Tangelder and Veltkamp 2004) as a means of effective and efficient object retrieval."]} diff --git a/edge/graph_70094682.jsonl b/edge/graph_70094682.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc3369c41503aba3be026b22a6cc9965b8394309 --- /dev/null +++ b/edge/graph_70094682.jsonl @@ -0,0 +1 @@ +{"207250096|165863": []} diff --git a/edge/graph_70107542.jsonl b/edge/graph_70107542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7010908.jsonl b/edge/graph_7010908.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_70115445.jsonl b/edge/graph_70115445.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_70121543.jsonl b/edge/graph_70121543.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b313903a0e7c97f0ba8840cd0b30ff79c129a9bd --- /dev/null +++ b/edge/graph_70121543.jsonl @@ -0,0 +1,2 @@ +{"16754036|11792588": ["Using these innovated data acquisition devices, motivated researchers to work on Online handwriting recognition systems [5].", "Later shape recognition techniques were introduced without any semantic information [5].", "[5] focused on preprocessing techniques, line and word segmentations.", "These days, powerful computers with accurate electronic gadgets like electronic tablets, scanners, cameras, there are efficient methods like neural networks, fuzzy sets, hidden markov model being used for character recognition [5].", "Later in the 1990s, combination of image processing and pattern recognition techniques with artificial intelligence methods were exploited [5].", "For online character recognition the x-y coordinates were first introduced in 1950 [5]."]} +{"25026033|2762290": ["XISTING Arabic word recognition systems are mainly based on two traditional approaches which are usually used for Latin scripts: the holistic approach and the analytical one [ 15 ], [31].", "We confirm that the systems which are based on this approach have applied the same work proposed for the other alphabetical languages and in particular for the handwritten word and text in Latin alphabet [ 15 ], [31]."]} diff --git a/edge/graph_7013187.jsonl b/edge/graph_7013187.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..940573b897621faee3582ec2a5d6e47a4dda1e8f --- /dev/null +++ b/edge/graph_7013187.jsonl @@ -0,0 +1,9 @@ +{"8568506|1634674": ["Almost all current methods of crowd analysis [14, 2] assume that it is known that the scene consists of a crowd.", "We used a tracker based on the particle filter algorithm [2, 23] with manual initializations in order to track each objects\u2019 motion trajectory.", "Following the formulation of [1, 2, 3], we use the term Atomic Group Action to refer to", "The term action in Atomic Group Action means an atomic interaction movement of three or more objects in video; a group activity, then, is composed of multiple actions by a group or multiple groups of interacting objects [1, 2, 3].", "Although, as [2] notes, there is no hard boundary between an action and an activity, most researchers [1, 4, 5, 6, 7, 8, 9, 10] refer to three basic motions as being fundamental motions for group-group interaction and two for group-individual interaction."]} +{"8568506|17516538": ["However, in order to examine crowd activities, it is necessary to first understand group activities [1, 4, 5, 6, 7, 8, 9, 10, 11, 12]."]} +{"1103216|393948": ["\u201d The purpose of the workshop, organized by Ian Goodfellow, Dumitru Erhan, and Yoshua Bengio, was to explore the latest developments in representation learning, with a special emphasis on testing the capabilities of current representation learning algorithms (See [1] for a recent review) and pushing the field towards new developments via these contests."]} +{"14658155|17221751": [", corners of the eyes and mouth) [23]; and appearance features represent the facial texture including wrinkles, bulges and furrows [27]."]} +{"14658155|6857179": ["Face and body expressions are widely used non-verbal information for automatic emotion recognition [13]."]} +{"16006760|8777381": ["The main shortcomings of detection of emotions in a crowd is that we have to depend on one sensor such as video cameras; we cannot use delicate and detailed features such as face emotion features [5], activity features [9] and voice features [7].", "such as [6] [7]."]} +{"4236070|4915696": ["[39]"]} +{"8107077|49273945": []} +{"8107077|17221751": []} diff --git a/edge/graph_70161862.jsonl b/edge/graph_70161862.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11c0517787938fbfe33169d6d03bac01b6d08c16 --- /dev/null +++ b/edge/graph_70161862.jsonl @@ -0,0 +1,7 @@ +{"6274083|18986679": ["They are listed in many research publications [1-5].", "To visualize the change of power load over a year, the x-axis can represent the dates of months [1-31] while the y-axis can represent the months in years [1-12]."]} +{"3150908|9907884": ["The results for the hydrogeology data were also evaluated by domain experts."]} +{"204985194|21386749": []} +{"34982665|9907884": ["Radial depiction of information (for a general overview see [341]) was adapted by Li et al. [342], who investigated the challenge of analyzing spatially distributed time series of atmospheric surface observations to discover climate change patterns."]} +{"34982665|16557526": ["Here, examples with relation to meteorology include the drawing of uncertainty bands, fuzzy and random 2D contours [284], [311] and the usage of kernel density estimates [310].", "From the visualization point of view, ensemble visualization is part of uncertainty visualization, a topic that has received signi\ufb01cant attention [35], [36], [282], [283], [284], [285]."]} +{"390409|535786": []} +{"390409|2398835": ["The phenomenon of big data has long been characterized by volume, velocity, and a variety of data types that have been created at everincreasing rates (Khan et al., 2014)."]} diff --git a/edge/graph_7016486.jsonl b/edge/graph_7016486.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_70173482.jsonl b/edge/graph_70173482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e5ae51b437bce739aff74e917d0317a069a6b82 --- /dev/null +++ b/edge/graph_70173482.jsonl @@ -0,0 +1,7 @@ +{"114472287|9736817": []} +{"67761|10212336": ["Healthcare sector Specific application areas References Food contaminations Microbial pathogens or toxins [158-164] Chemical contaminants [165] Genetic testing Presence of genetic anomalies/disorders [166] Immunology Antibody monitoring [167,168] Infections Local and systemic infections [123,169] Ingestion of toxins & poisons Alcohol consumption and abuse [170] Drug use and abuse [171] Potable water contamination Pesticides [172,173] [174] Microbial culture Discrimination of types or cell lines [175] Identification of microbes [176,177] Growth phases [178-180] Monitoring Blood plasma glucose levels [181-184] Hormone levels [185,186] Human tissue activities [187] Progress of dialysis [188] Organ dysfunctions Enterogastric reflux [189] Hearing loss [190] Organ failures or abnormalities [191] Organ transplant success [192] Pathology Cancer detection [193] Clinical disease diagnoses [194,195] Pathogenic microbe detection in tissues [196,197] Specific pathogen identifications [198] Pharmacology Drug purity/contaminations, drug toxicoses [8] Drug-delivery controls, drug effectiveness [199] Physical therapy Prosthetic applications [200] Physiological conditions Electrophysiological measurements [201] Hydration, ketosis, oxidative stress [202,203] Physiological disorders [204] Respiratory conditions Oxygen-sensing measurements [205] Remote health care Telemedicine [206] Waste disposal Medical waste analysis [207] Wound & graft healing Bacterial colonization, secondary infection [208] Progress of healing [209] Skin graft success [210]"]} +{"67761|1119606": []} +{"67761|9770908": []} +{"67761|41104565": []} +{"205319265|192934": []} +{"114505057|17772052": []} diff --git a/edge/graph_70179787.jsonl b/edge/graph_70179787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cea999917cfced80e60893c1cd8efab5ac4c6568 --- /dev/null +++ b/edge/graph_70179787.jsonl @@ -0,0 +1,9 @@ +{"18218031|1188683": ["In the last decade, reconfigurable hardware is becoming a promising alternative to both ASIC and general purpose offthe-shelf processors for embedded applications[2], [4]."]} +{"16804543|8363289": []} +{"10878164|8363289": []} +{"15537066|8363289": ["The benefits of model predictive control (MPC), particularly its capacity to address multivariable systems subject to constraints, have led to widespread interest in the approach Mayne et al. (2000); Qin and Badgwell (2003); Morari and Lee (1999); Maciejowski (2002)."]} +{"28363052|14843594": ["An alternative approach for taking humans out of the design loop is based on systematic optimization [5]."]} +{"67273013|8363289": ["Starting in the late 1970s, model predictive control (MPC) has emerged as a successful symbiosis of numerical optimization and feedback control theory, see e.g. Richalet et al. (1978); Garc\u0301\u0131a et al. (1989); Mayne et al. (2000); Rawlings and Mayne (2009)."]} +{"19068987|6809492": ["for MPC controllers implementation [18]\u2013[20] due to its high performance and cost effectiveness, enabling applications at megahertz rates."]} +{"19068987|6392800": ["ated with a vector-less activity propagation methodology [37], which is an industry-standard probabilistic methodology for"]} +{"19068987|8363289": ["Although theoretical issues of MPC control have been deeply studied [21], there are still many challenges for the fast and economically viable implementation and use of MPC."]} diff --git a/edge/graph_70181768.jsonl b/edge/graph_70181768.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b60600c826082b6e57b04b2884c681acb31239cd --- /dev/null +++ b/edge/graph_70181768.jsonl @@ -0,0 +1 @@ +{"8729672|18044357": ["The main limitation of design diversity lies in the high complexity of creating different versions, which may not justify the benefit [52]."]} diff --git a/edge/graph_70199619.jsonl b/edge/graph_70199619.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d01926264e96c3430a171924cb12f9dc4b468b6f --- /dev/null +++ b/edge/graph_70199619.jsonl @@ -0,0 +1 @@ +{"131502776|16319937": [", 2007; Li et al (2012), Genetic Algorithms proposed byLacomme et al. (2001); Jorgensen and Larsen (2006); Minocha et al.", "In Kumar and Pannerselvam (2012), the main variants of the CVRP and VRPTW problem framed in the supply chain are presented, the contributions of different authors are classified into three categories heuristic, metaheuristic and hybrid methods. Finally Vidal et al. (2013) analyzed in detail 64 successful metaheuristics applied to 15 variants of VRP, primarily identifying the algorithm design and its main characteristics in terms of: the solution space, neighborhood strategies, search paths, mechanisms control memory, hybrid strategies, and parallelism and decomposition problems.", "In Kumar and Pannerselvam (2012), the main variants of the CVRP and VRPTW problem framed in the supply chain are presented, the contributions of different authors are classified into three categories heuristic, metaheuristic and hybrid methods."]} diff --git a/edge/graph_70202744.jsonl b/edge/graph_70202744.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c38f89edab1f70977d31e9080a388d380121fe7 --- /dev/null +++ b/edge/graph_70202744.jsonl @@ -0,0 +1,3 @@ +{"28903195|12884178": ["To avoid interference and collisions among nodes, OFDMA (orthogonal frequency division multiple access) is used as in [20]."]} +{"37925315|12681089": []} +{"17702061|12884178": ["[24] M.", "- To avoid the occurrence of interference and collision between the nodes, the OFDMA (orthogonal frequency division multiple access) method is used in accordance with reference [24]."]} diff --git a/edge/graph_7020971.jsonl b/edge/graph_7020971.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa8bcdc73b3f06b22423c7dbf4f1917cb1216a28 --- /dev/null +++ b/edge/graph_7020971.jsonl @@ -0,0 +1,2 @@ +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} +{"17975552|2796899": []} diff --git a/edge/graph_70213162.jsonl b/edge/graph_70213162.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_70219832.jsonl b/edge/graph_70219832.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b77be73fcd60e57edcabb46d2611348757d9b8f0 --- /dev/null +++ b/edge/graph_70219832.jsonl @@ -0,0 +1,7 @@ +{"13936269|206459491": []} +{"13108162|18740719": ["Cherdantseva et al. used \u2018stage(s) of risk management process addressed\u2019 as a criteria to analyze the identi\ufb01ed cybersecurity risk assessment methods for SCADA systems [12].", "Cherdantseva et al. also highlighted that the majority of the cybersecurity risk assessment methods for SCADA systems concentrates on the risk identi\ufb01cation and risk analysis stages of the risk assessment process [12]."]} +{"13731903|13108162": []} +{"13731903|206990190": []} +{"13780366|13108162": ["A number of methods have been proposed to improve the completeness of system risk assessment by covering the interactions between both unintentional/nonmalicious failures, and intentional/malicious threats [4, 12, 9]."]} +{"25788654|206990190": []} +{"3338596|4528002": ["Researchers found out that neither controller area network (CAN) bus nor FlexRay include sufficient security features to resist security attacks [30, 29, 35].", "As shown in multiple studies and surveys [29, 30, 31] today\u2019s vehicles are vulnerable to security threats which can adversely affect the safety."]} diff --git a/edge/graph_70220495.jsonl b/edge/graph_70220495.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d35ffa5c172a8bc6b89cfad7e4a48f90a611d3e --- /dev/null +++ b/edge/graph_70220495.jsonl @@ -0,0 +1,4 @@ +{"2933853|16378550": []} +{"2933853|7644489": ["LTE D2D direct Device Discovery can work in both incoverage and partial/out-of-coverage scenario.", "However, if the ownship SUAS does not find any nearby SUAS, LTE D2D under Model B will not transmit the surveillance message through direct communication.", "3) Key Feature 2: LTE D2D [21],[22],[23],[24]", "3) Key Feature 2: LTE D2D [21],[22],[23],[24] Another service of LTE that can support the communication of surveillance information for the Vigilant concept is LTE Device-to-Device communication (D2D).", "Additional comparisons between the LTE D2D scheme over other short range wireless technologies can be found in [12][13][14][15].", "LTE D2D is envisioned to support the communication of surveillance information both in-coverage and out-of-coverage of the base station.", "However, LTE D2D will enable direct communication (e.g., vehicle-to-vehicle (V2V) connectivity [12]) at distances up to 500 meters (0.3 NM) with low energy consumption and low latency.", "Exploiting the LTE D2D and eMBMS services are anticipated to provide better performance regarding spectrum utilization, power consumption, and transmission latency."]} +{"52987252|8323234": ["Using this model, we develop a mathematical framework for evaluating rates in a hierarchical network topology where one aircraft, acting as a base station, serves other aircraft via MU-MIMO with a subarray based hybrid beamforming architecture (see, for example [2]).", "While these are typical assumptions (see [2]), it is straightforward to extend our approach to other array geometries.", "MIMO configuration and aerial network topology Due to hardware constraints, mmWave MIMO systems often make use of a hybrid beamforming architecture where the number of antennas exceeds the number of RF chains [2].", "We assume that the analog beamformers can vary both phase and magnitude, relaxing non-convex constraints imposed by other architectures [2]."]} +{"21712422|88513503": ["To this end, we first build a model for f\u0302(x, y, z;h) using the locations of all drone-UEs except one [34]."]} diff --git a/edge/graph_70236101.jsonl b/edge/graph_70236101.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a3a8f37dc05404161c620d0344996d0d363b24f --- /dev/null +++ b/edge/graph_70236101.jsonl @@ -0,0 +1,4 @@ +{"2457146|11003991": []} +{"37836836|11003991": ["There is large number of comprehensive literature reviews in OR/MS applied to surgical care services [20, 34, 57, 104, 107, 108, 161, 167, 190, 244].", "Since surgical care services are the hospital\u2019s largest revenue center [34, 54], the case mix is chosen with the objective to optimize net contribution, costs and profit [104].", "Capacity can be reserved by dedicating one or more operating rooms to emergency cases, or by reserving capacity in elective operating rooms [34, 212].", "Elective cases can be planned in advance, urgent cases require surgery urgently, but can incur a short waiting period, and emergency patients require surgery immediately [25, 34].", "Identification by medical urgency distinguishes elective, urgent and emergent cases [34, 83, 104, 107].", "The latter is preferred in some hospital environments [34, 146].", "Relatively few papers evaluate the effect of surgical care services on ancillary services [161, 20, 34].", "In contributions that model ancillary services, it is often the objective to level bed occupancy in wards or ICU, to decrease the number of cancellations [13, 34, 203, 233, 234], or to minimize delays for inpatients [257].", "Other objectives are to maximize contribution margin per hour [34, 60], maximize the number of patients operated, or minimize staff overtime [111].", "A cyclic block schedule is also termed a Master Surgical Schedule (MSS) [234], but definitions of an MSS vary among OR/MS researchers [34]."]} +{"7166331|207584909": []} +{"20063832|207584909": ["Perhaps one of the reasons why simulation gaming is reportedly prompting higher stakeholder engagements (Jahangirian et al, 2010a) is the intensive interactivity inherent in such simulation techniques.", "\u2026care pathway of end-stage renal disease, shifts from centre dialysis to either home dialysis or cadaver donor transplantation would save $284 million per year (see Jahangirian et al, 2010b for a more detailed account of the economics of modelling and simulation and its implications for healthcare)."]} diff --git a/edge/graph_7023859.jsonl b/edge/graph_7023859.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_70269318.jsonl b/edge/graph_70269318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6fa15c3be4c0bb1c38d0003b5d46b59fc5a00490 --- /dev/null +++ b/edge/graph_70269318.jsonl @@ -0,0 +1,6 @@ +{"25544789|206051485": ["Within CV, image registration (IR) aims to find a geometric transformation that overlays two images taken under different conditions (at different times, from different viewpoints, and/or by different sensors) [26]."]} +{"4876806|70269318": []} +{"49412421|27533715": []} +{"38452102|70269318": []} +{"23628863|8983048": ["Several works reviewing the state of the art on IR methods have been contributed in the last few years [48\u201350]."]} +{"23628863|206051485": ["Thus, the problem of superimposing the 3D face model over the photograph is modeled following an Image Registration (IR) [39] approach.", "The process of finding a geometric transformation that overlays two images taken under different conditions (at different times, from different viewpoints, and/or by different sensors) is called image registration (IR) [39]."]} diff --git a/edge/graph_70271467.jsonl b/edge/graph_70271467.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a82bbc003c7652ae9b34d2e9ee68d384b14525b --- /dev/null +++ b/edge/graph_70271467.jsonl @@ -0,0 +1,4 @@ +{"40868455|3693305": []} +{"40868455|1596835": ["The goal of learning to hash is to learn data-dependent and task-specific hash functions that yield compact binary codes to achieve good search accuracy, where sophisticated machine learning tools and algorithms have been adapted to the procedure of hash function design [54, 55]."]} +{"63963127|1932843": ["Further most notable ML technologies utilized in Robotics include; ML techniques for big data [20], self-supervised learning [16], reinforcement learning [21], and multi-agent learning [22]."]} +{"20733722|1734833": []} diff --git a/edge/graph_70275328.jsonl b/edge/graph_70275328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b5cc911897a95e5cf140f598cb4f4eddd67bb43b --- /dev/null +++ b/edge/graph_70275328.jsonl @@ -0,0 +1,18 @@ +{"3269862|18188725": []} +{"3269862|393948": []} +{"206190211|6923178": ["\u2026TP/(TP + FP) (12)\nNPV = TN/(TN + FN) (13) As a final complementary performance measure, the Matthews correlation coefficient (MCC) (Matthews, 1975; Baldi et al., 2000) was calculated as follows:\nMCC = (T P \u00d7 TN) \u2212 (FP \u00d7 FN)\u221a (TP+FN)(TP+FP)(TN+FP)(TN+FN)\n(14) An MCC score of unity indicates\u2026", "These two measures are defined as:\nPPV = TP/(TP + FP) (12)\nNPV = TN/(TN + FN) (13) As a final complementary performance measure, the Matthews correlation coefficient (MCC) (Matthews, 1975; Baldi et al., 2000) was calculated as follows:\nMCC = (T P \u00d7 TN) \u2212 (FP \u00d7 FN)\u221a (TP+FN)(TP+FP)(TN+FP)(TN+FN)\n(14) An MCC score of unity indicates perfect classification, whereas a score of 0 indicates random guessing.", "As shown by its inferior error and MCC values, this is not desirable.", "As a final complementary performance measure, the Matthews correlation coefficient (MCC) (Matthews, 1975; Baldi et al., 2000) was calculated as follows:", "With the largest MCC value, the superior performance of the TD-ELM is confirmed, while the R2SP is a close second.", "The superior 1-AUC, exclusive loss error scores and MCC of the ESN in comparison to the R2SP are due to its increased specificity.", "Since the TD-ELM has the highest error rate, its MCC is the lowest of the three architectures.", "Further analysis of the performance of all architectures by calculating the sensitivity, specificity, PPV, NPV, and MCC was carried out as shown in Table 2.", "The MCC was used to complement the previous measures and to indicate how well each network was performing (a low MCC value would indicate poor performance and this may be undetectable using some of the other measures)."]} +{"116706338|393948": []} +{"11962339|1097238": ["among its base learners tends to achieve better generalization performance [36].", "Many works [36]\u2013[39] have demonstrated that a single method can seldom perform consistently well across a variety of applications."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"189092755|10137425": []} +{"62242588|1400872": ["This implies that the backpropagated error ( Pearlmutter, 1995 ) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994).", "This implies that the backpropagated error (Pearlmutter, 1995) quickly either vanishes or blows up (Hochreiter & Schmidhuber, 1997; Bengio, Simard, & Frasconi, 1994)."]} +{"125608550|393948": []} +{"115430590|8516210": ["These insights inspired the use of multi-scale techniques for damage detection purposes.(10) Furuta et al."]} +{"41928030|393948": []} diff --git a/edge/graph_70315684.jsonl b/edge/graph_70315684.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5786ad4b60dc1461f5a8e4a3086640a9de276447 --- /dev/null +++ b/edge/graph_70315684.jsonl @@ -0,0 +1 @@ +{"9713973|562065": []} diff --git a/edge/graph_70327049.jsonl b/edge/graph_70327049.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d45801784fb98c54127832cd8ff959fe8fda69db --- /dev/null +++ b/edge/graph_70327049.jsonl @@ -0,0 +1,6 @@ +{"46678265|16502294": ["Many researchers have proposed various methods for defect detection and evaluation from surface images of infrastructures [1][2][3]."]} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"116738023|16502294": []} +{"2088679|393948": []} +{"25040300|15273230": ["However, it has some significant and long acknowledged limitations, particularly in the context of imbalanced datasets [19].", "Methods of dealing with imbalance are well studied for classical machine learning models [19, 17, 20, 18]."]} diff --git a/edge/graph_70330130.jsonl b/edge/graph_70330130.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc49485e26525d162d8322846a2cfe99080d14a5 --- /dev/null +++ b/edge/graph_70330130.jsonl @@ -0,0 +1,44 @@ +{"14385471|15199849": ["Otherwise, if they drop all the messages that is sent to them, then it is a black hole attack [4][5]."]} +{"14385471|1230643": ["Because sensor nodes carry limited and generally irreplaceable power sources, power consumption is the important factor that must be considered in WSN [13].", "Using UAVs in WSNs results in changing topology of the network due to the fast mobility of UAV[13]."]} +{"7465328|1236072": ["To limit the number of communications, because they consume a lot of energy, wireless sensor networks need protocols with effective routes [8]."]} +{"7465328|1230643": ["Wireless sensor networks are specific ad-hoc networks [7] with a larger number of nodes, a limited energy and a lower computing power."]} +{"10283038|31245252": ["For instance, in [8]\u2013[12] the main research challenges and the existing solutions in the field of IoT security are surveyed."]} +{"10283038|6779551": ["This can be solved through the utilization of the automatic code update and recovery process [18]."]} +{"10283038|17205659": []} +{"206256778|3330313": ["Moreover, an anomaly in a dataset is defined as an observation that appears to be inconsistent with the remainder of the dataset (Hodge and Justin, 2004)."]} +{"17666272|1230643": ["INTRODUCTION WSN is a kind of self-organized and self-managed network which is formed by mobile nodes [1][2]."]} +{"67867022|6779551": ["[1] first summarized security requirements of wireless networks and then presented a comprehensive overview of attacks"]} +{"67867022|8697076": ["[104] discussed that the victim-end detection methods may be ineffective."]} +{"67867022|206584087": ["They can be mainly classified into the following categories [6], [68]: (a) HTTP request flooding attacks that"]} +{"67867022|8364569": ["[30] provided a detailed discussion on why flow-based intrusion detection is required and then presented an overview.", "A flow is considered expired when [26], [30]: (i) the flow was idle meaning that no packets have been transmitted for a long time exceeding a given threshold (idle timeout), (ii) the flow reaches the maximum allowed lifetime (active timeout), (iii) the FIN or RST flags have been seen in a TCP flow (natural expiration), (iv) automatic reduction of timeout parameters in case of resource constraints (resource constraints), (v) the flow cache memory becomes full (emergent expiration), (vi) all flow cache entries have to be expired in emergent events (cache flush)."]} +{"67867022|13172512": ["Some detailed discussions about how to employ the machine learning to detect network attacks are presented in [39] and [40].", "The machine learning is mainly divided into three categories [39]\u2013[41]: (i) supervised learning, (ii) unsupervised learning, and (iii)"]} +{"67867022|8793295": ["Deep Packet Inspection (DPI) is a method that uses both packet header and payload information to determine whether a packet is an intrusion or not [25]."]} +{"57289957|1940388": []} +{"11948797|1230643": ["These are self organized ad-hoc networks comprised of a large number of micro-sensors, densely deployed in a sensor field, and are capable of sensing, processing and transmitting data to a small number of sink nodes, within constraints of low power and low cost [1]."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"2809196|1236072": []} +{"19468060|1230643": ["WSNs have been used, in the last decade, in several areas [4]: environment, security, military and many others.", "Notably, wireless sensor networks can be used in a medical context in order to monitor patients[4]."]} +{"62520988|1940388": []} +{"62520988|1331167": ["In order to use WSNs in real world applications, these unique characteristics must be carefully addressed during the protocol design [5,6]."]} +{"15974232|7889189": ["This requirement is especially important when the WSN nodes use sharedkeys for message communication, where a potential adversary can launch a replay attack using the old key as the new key is being refreshed andpropagated to all the nodes in the WSN[20].", "The integrity mechanism should ensure that no adversary can manipulate the communicated data[20].", "An adversary can easily inject the messages in the network, so receiver should ensure that the received message is originated by the correct source[20].", "Different mechanisms have been proposed by the researches to achieve this goal[20].", "While communicating the data in the network, no one can understood except intended recipient[20]."]} +{"15974232|1236072": ["Routing protocols in WSNs mainly classified in two categories[1]: Network Structure and Protocol Operation.", "Unlike LEACH, PEGASIS avoids cluster formation and uses only one node in a chain to transmit to the base-station[1].", "Reservation-based scheduling, collision avoidance, data aggregation by cluster head, uniform energy dissipation, fair allocation of channel and lower latency are some characteristics of hierarchical topology routing protocol[1]."]} +{"86768846|18189153": ["or malicious drops, especially for the nodes with low attack probabilities [24]."]} +{"86768846|1333339": ["We define a standard deviation threshold as dh [31], [32].", "However, since malicious nodes can mutually promote their reputation values or collaboratively degrade the reputation values of normal nodes, the average reputation value should be adjusted against the promotion and demotion attacks [31]."]} +{"289350|1230643": ["WSNs can be deployed in harsh environments to fulfil both military and civil applications [1].", "However, tamper-proof hardware is expensive and energy demanding [2], [1]."]} +{"14332210|12347712": ["These problems stand in the path of the tremendous growth WSNs are forecasted to have in the coming years [2]."]} +{"7972581|2181694": ["In this paper, an effort has been made to propose a collaborative hierarchical model capable of detecting insomnia of sensor nodes [1,10].", "In one of our earlier works, we have presented a survey of recent IDS in sensor networks [1]."]} +{"17301119|7465328": []} +{"34965859|1353379": ["First, security-related data composition [14, 128] plays an important role in measuring the real-time security of MANETs and allowing the networks to react e(cid:14)ciently, but literatures lack investigation on security-related data composition."]} +{"34965859|18189153": ["In addition, although there exist several surveys [4, 5, 6, 7] on attack detection, they mostly focus on the architecture, analysis and performance of detection methods and still neglect trustworthy security-related data collection."]} +{"34965859|17009788": ["In addition, although there exist several surveys [4, 5, 6, 7] on attack detection, they mostly focus on the architecture, analysis and performance of detection methods and still neglect trustworthy security-related data collection."]} +{"5035162|3456635": ["However, few of them are aimed at the security-related data in the era of big data and are not suitable for a large-scale heterogeneous network system [63], [64]."]} +{"11142486|7465328": ["The majority of these applications are deployed to monitor an area and react when a sensitive factor is recorded [9]."]} +{"11142486|3117516": []} +{"67743044|9060471": ["As will be introduced shortly, truth discovery generally requires iterative estimation of the weights and obtains the ground truths until convergence [3], [4].", "of target objects via weighted aggregation, until some convergence criterion is achieved [4].", "[1], [4], the quality of sensory data from mobile users may vary significantly.", "Along this paradigm, truth discovery in mobile crowdsensing has received wide attention recently (see [3], [4], and the references therein), which aims to unearth the genuine information underneath massive data sources, by taking into account the reliability", "Recall that the estimated ground truth in the first iteration is randomly initialized in practice [4].", "randomly initialized by the cloud server in practice [4]."]} +{"28670225|8326114": ["Then, Schaffer et al defined taxonomy of security and reliability for clustering in WSNs [10]."]} +{"33520628|1230643": ["Such networks usually consist of hundreds or even thousands of small-sized, low power, inexpensive sensors to monitor some specific phenomenon cooperatively [ 1 ]."]} +{"62714042|15199849": []} +{"49675440|5035162": []} +{"49675440|3456635": []} +{"49675440|8364569": []} +{"5700265|1230643": ["A WSN can be deployed in harsh environments to fulfill both military and civil applications [1]."]} diff --git a/edge/graph_70333671.jsonl b/edge/graph_70333671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff99310be7a280e85aa94452c1a29be10099e062 --- /dev/null +++ b/edge/graph_70333671.jsonl @@ -0,0 +1,9 @@ +{"9762122|7158350": ["The hybrid approaches with the combination of ANN, SVM and GA are exploited for the data discovery and classi\ufb01cation tasks [14\u201316].", "artificial neural network (ANN) [2,3], support vector machine (SVM) [4\u20136] KNN [7], decision trees [8,9] and genetic algorithm (GA) [10\u201313].", "In literature, supervised learning based classi\ufb01cation are proposed in abundance i.e. arti\ufb01cial neural network (ANN) [2,3], support vector machine (SVM) [4\u20136] KNN [7], decision trees [8,9] and genetic algorithm (GA) [10\u201313]."]} +{"36189524|205286988": ["Due to such differences, many new algorithms have been proosed for the routing problem inWSNs [6,7]."]} +{"36189524|1236072": ["For example, at the network layer, it is highly desirable to find methods for energy-efficient route discovery and relaying of data from the sensor nodes to an external sink or base-station (BS) so that the lifetime of the network is maximized [5]."]} +{"18880288|1236072": ["Wireless Sensor Networks (WSNs) [20] is a paradigm of networks that contains sensing, computation, and wireless communications capabilities with small nodes."]} +{"57480527|1437067": []} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} diff --git a/edge/graph_70334290.jsonl b/edge/graph_70334290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e96b26bb925b6d8862545c5dd0a589fda1f56aa8 --- /dev/null +++ b/edge/graph_70334290.jsonl @@ -0,0 +1,6 @@ +{"114953743|12206204": []} +{"114953743|8909218": []} +{"38842790|8909218": ["As a result, network operators may experience less traffic on their expensive macrocell networks, and can focus their resources on the truly mobile users [5], [6].", "It can communicate with macrocell networks by broadband connections such as digital subscriber line (DSL), cable modem, or a separate wireless backhaul channel [4], [5].", "For example, the study in [5] demonstrates that the transmission power can be saved about 34 and 77 dB in different fading environments.", "Normally, the number of FUs is between two and four, as indicated in [5].", ", two or four [5]; b) the size of the cell coverage is about the house or apartment range, e."]} +{"9271706|14028362": ["\u2022 Handoff mechanism (Tseng et al., 2016; Tseng et al., 2013; Hasan et al., 2009): In general, handoff in the macro-femto heterogeneous network can be classified into horizontal handoff and vertical handoff."]} +{"10235514|10937383": ["All the analog components (phase shifters, low noise power amplifiers, etc) should be tightly packed behind the antenna elements (see Fig, 3(a) of [149])."]} +{"10235514|13367219": ["Turning the measurement results into suitable models has been pursued mainly along three avenues: (i) 3GPP-type spatial channel models (ii) geometry-based stochastic channel models (GSCMs) [16] 1 such as in COST 259/273/2100 [81], [82], and (iii) quasi-deterministic models.", "The appearance/disappearance of clusters as the UE moves through the cell is governed by visibility regions (a cluster is \u201cactive\u201d if the UE is in the visibility region of the associated cluster) [81]."]} diff --git a/edge/graph_7033496.jsonl b/edge/graph_7033496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd3490cc5395b3d36eb058f7c14c7fcb33b80f03 --- /dev/null +++ b/edge/graph_7033496.jsonl @@ -0,0 +1,3 @@ +{"14956028|17718674": []} +{"5211185|17718674": []} +{"1898771|5108469": ["Some examples of attacks against protocols using the equational theories considered in this paper can be found in [8].", "We can yet observe that it has been shown in [8] that decidability of uni(cid:28)cation modulo an equational theory E is a necessary condition for the decidability of the security of a protocol for a bounded number of sessions and in presence of this equational theory E .", "A recent overview of algebraic properties of cryptographic primitives, their use to mount attacks on protocols, and existing results on veri(cid:28)-cation of cryptographic protocols in presence of equational axioms can be found in [8]."]} diff --git a/edge/graph_70342817.jsonl b/edge/graph_70342817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f8154508382208cc3c6da45fb817768f92dd4bc4 --- /dev/null +++ b/edge/graph_70342817.jsonl @@ -0,0 +1,4 @@ +{"16340279|39706822": []} +{"6692067|17474643": []} +{"36879530|2135552": ["\u2026of planning and scheduling models have also been proposed specifically for process applications and very good reviews of scheduling problems in the process industry are provided by Mendez et al. (2006) and Floudas and Lin (2004, 2005), (Grossmann et al., 2008; Lei, 2009; Maravelias and Sung, 2009)."]} +{"17840635|2135552": ["The performance of a schedule is measured with one or more criteria, for example, the overall profit, the operating costs, and the makespan.", "An extensive discussion of discrete-time versus continuoustime models for process scheduling can also be found in Floudas and Lin (2004).", "Readers interested in this class of scheduling problems are directed to a recent review by Floudas and Lin (2004).", "\u2026complicated by a number of other considerations, including intermediate storage, changeovers, batch and continuous operation modes, demand patterns, resource restrictions, and a variety of objectives (for more details of these characteristics, see Pinto and Grossmann, 1998; Floudas and Lin, 2004)."]} diff --git a/edge/graph_70347260.jsonl b/edge/graph_70347260.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ba895ef741a3ef4b4126f50e0e22bdfc0a663a0 --- /dev/null +++ b/edge/graph_70347260.jsonl @@ -0,0 +1,2 @@ +{"145173257|33829339": []} +{"61341157|33829339": []} diff --git a/edge/graph_70349905.jsonl b/edge/graph_70349905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37881b6628c65e264bc831b7fa25cb81ec9ebdc3 --- /dev/null +++ b/edge/graph_70349905.jsonl @@ -0,0 +1,18 @@ +{"34263386|15898213": []} +{"55729907|8690743": ["For instance, in the case of an emergency, authorization to interpret patient\u2019s data could be given on demand to a different physician who is not necessarily listed as having permission [23].", "Consequently, it is imperative that the information not be accessible and altered by a potential adversary by applying authentication protocols [23]."]} +{"55729907|42497499": []} +{"55729907|16084499": ["The operations utilize a counter called, CTR, mode of decryption and encryption [37]."]} +{"55729907|7988320": ["It can be done through Denial of Service (DoS) attack that is meant not only to disrupt, subvert and destroy the network, but also to diminish the network\u2019s capability of providing the necessary emergency services [31,33].", "Jamming (radio frequency interference) can be used by an adversary on a few nodes to block the entire network [31].", "DoS or DDoS attacks are often cited as being at the root of security vulnerabilities in a routing protocol [31,70]."]} +{"12628004|18599847": ["Deep Learning has however comparatively been used poorly to process time series data such as motion sensors [52]."]} +{"9505837|7988320": ["Wireless Body Area Networks (WBAN) have witnessed a surge of resurgence in research and applications in recent years [1, 2, 3, 4]."]} +{"16432746|10271586": ["\u2026time synchronization problem for wireless networks has been extensively studied in literature over the last two decades and yet there is no specific time synchronization scheme capable to guarantee higher order of accuracy with greater scalability, independently from topology and application [4]."]} +{"15822570|206932295": [",N, where S(n) is the signal sampled at time n \u00b7\u2206t and \u2206t is the sampling interval [7]."]} +{"15822570|15782139": ["In contrast, online signature verification methods take the dynamic writing process into account [4].", "One of the main reasons for its widespread use is that the process of collecting handwritten signatures is non-invasive and familiar, given that people routinely use signatures in their daily life [4]."]} +{"15502372|20905429": ["Wearable devices are generally small, portable, low power consumption [2], and worn on the multiple locations on the user for diverse functions such as video recording, pedometer and health monitoring [3, 4].", "As the information stored in the wearablCe devices are almost private, such as personal photo, video and health data measured by the biosensors including heart rate, blood pressure, and electrocardiogram [4], it is important to prohibit the unauthorized persons from accessing the wearable device."]} +{"12594700|1230643": ["We refer readers interested in studies on software and network architectures to any of the many excellent surveys that have recently been published on these topics [26,27]."]} +{"8116061|15898213": ["3, for some \u03b1 value, we computed the \u03b1 value that minimizes their Hellinger distance.", "If the fused score s is below a given acceptance threshold T , the user is classified as an impostor, otherwise it is classified as a genuine user."]} +{"16501892|10464581": []} +{"17058284|6332923": []} +{"17058284|17205659": ["Moreover, the key management protocols for WSNs will not work as efficiently as the protocols specifically designed for WBANs [2,3], e."]} +{"22843225|359842": ["Face recognition is currently highly researched area of computer vision and pattern recognition [9]."]} +{"15240764|416565": ["The third type of static approach includes hybrid schemes that combine more than one attribute [Galbally et al. 2014b; Wen et al. 2015], the use of client identity information [Chingovska and Anjos 2015], the characterization of the defocus property of the captured face image [Kim et al. 2015b;\u2026", "\u2026insight into both the vulnerability of data capture subsystems and presentation attack detection methods in face recognition systems [Hadid 2014; Galbally et al. 2014a], publicly available databases [Tan et al. 2010; Anjos and Marcel 2011; Chingovska et al. 2012; Zhang et al. 2012], dedicated\u2026"]} diff --git a/edge/graph_70349916.jsonl b/edge/graph_70349916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5702f626ab58ab5a7a480c1554cd63014bddc12b --- /dev/null +++ b/edge/graph_70349916.jsonl @@ -0,0 +1,50 @@ +{"38857293|6863252": ["for atlas-based segmentation, motion analysis or monitoring of growth processes, and therefore a variety of non-linear registration approaches have been proposed over the past three decades [15]."]} +{"52290500|4820875": []} +{"52290500|6863252": ["Commonly used image registration approaches include intensity-based methods, and featurebased methods that use handcrafted image features (Sotiras et al., 2013; Viergever et al., 2016).", "Third, borrowed from conventional image registration where regularization often is an integral part in transformation models (Sotiras et al., 2013), we include a bending energy penalty term that encourages smooth displacements."]} +{"18416486|15315731": []} +{"1033682|174797842": []} +{"2088679|393948": []} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"49905162|6863252": ["Furthermore, important properties like symmetry or di\ufb00eormorphisms [9] are still missing in DL-based approaches.", "Traditional registration approaches aim to optimize a local similarity metric between deformed and target image, while being regularized by various energies [9].", "It describes the process of \ufb01nding voxel correspondences in a pair of images [9]."]} +{"20143867|393948": ["Typical gradient-based backpropagation algorithm can be used for training single AE [34], [35].", "Speci\ufb01cally, we introduce a stacked autoencoder (SAE) [34], [37], [38], [42] with convolutional network architecture [41], [43] into our un-supervised learning framework.", "However, since the learned features are found using only a single layer, or a shallow model [34], the selected features may lack high-level perception knowledge (e.g., shape and context information) and may not be suitable for correspondence detection.", "Recently, unsupervised deep learning feature selection techniques have been successfully applied to solve many dif\ufb01cult computer vision problems [30], [34]\u2013[42]."]} +{"20143867|206051485": ["2496253 individual subjects to the reference space [1]\u2013[5]."]} +{"3548164|6863252": ["Multimodal registration is a very challenging problem in medical imaging commonly faced during image-guided interventions and data fusion [13].", "The minimization is commonly solved in a continuous or discrete optimization framework [13], depending on the nature of \u03b8."]} +{"49669598|4820875": ["Manual anatomical feature selection for registration is user-dependent and often costly or even infeasible intraoperatively but arguably remains the most robust method for multimodal image registration for many intra-procedural applications ( Viergever et al., 2016 )."]} +{"49669598|393948": ["Supervised representation learning (Bengio et al., 2013), especially methods using convolutional neural networks (LeCun et al."]} +{"15222451|6863252": ["In these optimization-based methods, the de-formable transformation parameters are iteratively optimized over a scalar valued cost (e.g., SSD) representing the quality of registration [4]."]} +{"69348735|207730550": []} +{"69348735|393948": []} +{"69348735|206051485": ["Image registration is the process of matching and superimposing two or more images at different times, different sensors (such as imaging equipment) or different conditions (such as illumination, position, and angle)[72]."]} +{"52928037|206051485": ["Image registration [1] is the process of aligning different images into the same coordinate frame, enabling comparison or integration of images taken at different times, from different viewpoints, or by different sensors."]} +{"6493854|7861381": ["Many different parametrizations exist [8]."]} +{"52289143|20404279": ["Unstable training: The typical GAN training is unstable because of numerical and conceptual reasons [111]."]} +{"52289143|2088679": ["From the early days of medical image analysis, machine learning (ML) and artificial intelligence (AI) driven systems have been a key component for complex decision making \u2014 a brief history of which can be found in [1].", "The tedious and time-consuming nature of manual segmentation made automatic methods the most active field of Deep-Learning research in medical image analysis [1]."]} +{"53045306|2088679": ["In the literature [6], two different approaches of deep learning"]} +{"206725404|393948": ["While the low-level features can be hand-crafted with great success for some speci\ufb01c data and tasks, designing effective features for new data and tasks usually requires new domain knowledge since most hand-crafted features cannot be simply adopted to new conditions [1], [2].", "Each stage generally comprises of \u201cthree layers\u201d \u2013 a convolutional \ufb01lter bank layer, a nonlinear processing layer, and a feature pooling layer."]} +{"37926181|206051485": ["Deformable image registration is very important in many neuroscience and clinical studies to normalize the individual subjects to the reference space [1, 2]."]} +{"2474460|530484": ["Bias correction is often performed prior to image registration in order to remove global intensity inhomogeneity (Hou, 2006; Sled et al., 1998; Tustison et al., 2010), but this is often not sufficient to remove local changes in the bias field."]} +{"195346852|6863252": ["A major drawback of these methods is that spatial regularization like elastic, fluid or diffusion models are based on prior assumptions and are often sensitive to tunable parameters [9].", "Furthermore, important properties like transformation symmetry or diffeormorphisms[9] are still missing in DL-based approaches.", "Traditional deformable registration approaches aim to optimize a local similarity metric between deformed and target image, being regularized by various energies [9]."]} +{"52281312|6863252": ["Most existing deformable registration algorithms iteratively optimize a transformation based on an energy function [7]."]} +{"35546107|6863252": ["Deformable image registration (DIR) allows image-guided analyses of nonrigid anatomical variations.(12,13) DIR has multiple applications in ART,(14) including dose accumulation and contour propagation."]} +{"52179320|6863252": ["As a fundamental task in medical image analysis, de-formable image registration aims to establish dense, non-linear spatial correspondences between a pair of images (denoted as the source/moving image and the target/\ufb01xed image) [1].", "Most of these methods require iterative optimization algorithms for parameter tuning [1].", "Different algorithms for deformable registration mainly differ in deformable models, similarity criteria, and numerical optimization [1], [18]\u2013[23].", "Typically, these methods iteratively optimize a similarity function for each pair of images to non-linearly align voxels with the similar appearance, while encouraging local smoothness on the registration mapping [1]."]} +{"52179320|206051485": []} +{"52179320|7861381": []} +{"4173387|393948": []} +{"1708582|17464562": []} +{"3680335|3273340": ["AI: Artificial Intelligence, ML, NN, DL, and Spiking Neural Networks (SNN) according to [294].", "There are some surveys that have been conducted recently in this field [294,295]."]} +{"3680335|2088679": []} +{"3680335|17485266": ["Adam has improved overall accuracy and helps for efficient training with better convergence of deep learning algorithms [126].", "The Adam optimization approach is proposed based on the momentum and the magnitude of the gradient for calculating adaptive learning rate similar RMSprop.", "The improved version of the Adam optimization approach has been proposed recently, which is called EVE.", "There are different optimization methods such as SGD, Adagrad, AdaDelta, RMSprop, and Adam [125]."]} +{"3680335|18599847": ["From the application point of view, RNNs can solve different types of problems which need different architectures of RNNs shown in Fig.", "Convolutional RNNs based on multi-language identification system was been proposed in 2017 [153].", "Recently, TimeNet was proposed based on pre-trained deep RNNs for time series classification (TSC) [155].", "In addition, RNNs, such as LSTM and RL, are also used for unsupervised learning in many application domains [243].", "Another example: the RNNs are able to connect previous information to the present task: using previous video frames, understanding the present and trying to generate the future frames as well [142].", "Sections 6 and 7 discuss RNNs and LSTMs in detail.", "Time series data analysis using RNNs [154].", "Early heart failure detection is proposed using RNNs [160].", "The RNNs are unique as they allow operation over a sequence of vectors over time.", "RNNs are applied in tracking and monitoring: data driven traffic forecasting systems are proposed using Graph Convolutional RNN (GCRNN) [161].", "Section V. discusses on RNNs. AEs and RBMs are discussed in Section VI. GANs with applications are discussed in Section VII.", "Sound event prediction using convolutional RNNs [158].", "In most of these cases RNNs or Recursive Neural Networks are used for language understanding [292].", "RNNs are networks with loops in them, allowing information to persist.", "RNNs including LSTM and GRU are applied on Tensor processing [150].", "This idea of RNNs were developed in 1980.", "\ud835\udcb3t + who \u2217 \u210bt\u22121 + who \u2218 \ud835\udc9et + bo (48)\nht = ot \u2218 tanh (Ct) (49)\nE. Variant of architectures of RNN with respective to the applications\nTo incorporate the attention mechanism with RNNs, Word2Vec is used in most of the cases for word or sentence encoding.", "First initiative for RNNs with attention that\n> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <\n21\nautomatically learns to describe the content of images is proposed by Xu, et al. in 2015 [145].", "Different versions of RNNs have been proposed in Jordan and Elman."]} +{"3680335|1932843": []} +{"3680335|393948": ["Learning methods based on representations of data can also be defined as representation learning [3]."]} +{"8732271|7559976": ["EQ-TARGET;temp:intralink-;e009;326;457 1\u20442\u03a6A\u00f0I\u00de \u2248 R1\u20442\u03a6\u00f0Is\u00de \u2248 GT: (9)"]} +{"3294547|6863252": []} +{"21603200|4820875": ["multi-resolution image registration, deep self-supervision, unsupervised learning, deep learning Introduction Medical image registration plays an important role in many medical image processing tasks [1, 2]. The image registration is typically formulated as an optimization problem to seek a spatial transformation that establishes pixel/voxel correspondence between a pair of fixed and moving images by ma", " regularizer can be used [14] \ufffd(\ud835\udc37\ud835\udc63)=\u2211\ud835\udc41\ufffd=1\u2016\u2207\ud835\udc37\ud835\udc63(\ud835\udc5b)\u20161 , (2) where \ud835\udc41 is the number of pixel/voxels in the deformation field. The above optimization problem can be solved by gradient descent based methods [1, 2]. However, such an optimization based image registration task is typically computational expensive and time consuming. (a) (b) Fig. 1. Schematic illustration for image registration based on FCNs. (a) ", "ed image similarity measures. As the image registration problem is an ill-posed problem, regularization techniques are usually used to obtained smooth and physically plausible spatial transformations [1, 2]. In general, the optimization based image registration problem is formulated as min \ud835\udc37\ud835\udc63 \u2212\ufffd(\ud835\udc3c\ud835\udc53(\ud835\udc63),\ud835\udc3c\ufffd(\ud835\udc37\ud835\udc63\u2218\ud835\udc63))+\ud835\udf06\ufffd(\ud835\udc37\ud835\udc63) (1) where \ud835\udc63 is spatial coordinates of pixel/voxels in \ud835\udc3c\ud835\udc53 , \ud835\udc37\ud835\udc63\u2218\ud835\udc63 is deformed spatial co"]} +{"21603200|6863252": ["ed image similarity measures. As the image registration problem is an ill-posed problem, regularization techniques are usually used to obtained smooth and physically plausible spatial transformations [1, 2]. In general, the optimization based image registration problem is formulated as min \ud835\udc37\ud835\udc63 \u2212\ufffd(\ud835\udc3c\ud835\udc53(\ud835\udc63),\ud835\udc3c\ufffd(\ud835\udc37\ud835\udc63\u2218\ud835\udc63))+\ud835\udf06\ufffd(\ud835\udc37\ud835\udc63) (1) where \ud835\udc63 is spatial coordinates of pixel/voxels in \ud835\udc3c\ud835\udc53 , \ud835\udc37\ud835\udc63\u2218\ud835\udc63 is deformed spatial co", "nd bilinear interpolation [7, 13]. Such a network architecture also naturally leads to a multi-resolution image registration that has been widely adopted in conventional image registration algorithms [2]. In this study, normalized cross-correlation is used as the image similarity metric between images, and a total variation based regularizer as formulated by Eq. (2) is adopted to regularize the defor", "multi-resolution image registration, deep self-supervision, unsupervised learning, deep learning Introduction Medical image registration plays an important role in many medical image processing tasks [1, 2]. The image registration is typically formulated as an optimization problem to seek a spatial transformation that establishes pixel/voxel correspondence between a pair of fixed and moving images by ma", " regularizer can be used [14] \ufffd(\ud835\udc37\ud835\udc63)=\u2211\ud835\udc41\ufffd=1\u2016\u2207\ud835\udc37\ud835\udc63(\ud835\udc5b)\u20161 , (2) where \ud835\udc41 is the number of pixel/voxels in the deformation field. The above optimization problem can be solved by gradient descent based methods [1, 2]. However, such an optimization based image registration task is typically computational expensive and time consuming. (a) (b) Fig. 1. Schematic illustration for image registration based on FCNs. (a) ", "ised models. Our deep learning based image registration model is implemented in a multi-resolution image registration framework, similar to conventional multi-resolution image registration algorithms [2]. However, the training for deep learning models with feedforward and backpropagation computation jointly optimizes deformation fields at different resolutions, fundamentally different from convention"]} +{"4599504|2088679": ["A recent survey on deep learning methods in medical image analysis [4] reports two common themes where deep neural networks have been applied to image registration: 1) estimation of similarity measures [1,5,2]; 2) estimation of transformation parameters, between the images [6,7]."]} diff --git a/edge/graph_70349997.jsonl b/edge/graph_70349997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adbd40993671d1ed0ad3902dbd4d2cbe609793d8 --- /dev/null +++ b/edge/graph_70349997.jsonl @@ -0,0 +1,24 @@ +{"53779029|37564067": ["in [115] provide a comprehensive review of economic and pricing approaches for detecting security attacks against wireless networks, such as eavesdropping, jamming and black hole attacks."]} +{"53779029|2142482": ["Likewise, Mitchell and Chen [112] classify existing anomaly, signature based and hybrid IDS techniques according to the type of system they will be deployed to.", "Cheng et al. [24] tested five different IDS evasion techniques against known misuse-based systems like SNORT."]} +{"53779029|8364569": ["On the contrary, a flow-based NIDS inspects only the packet headers and uses input data in the form of NetFlow or IPFIX [16].", "inspects only the packet headers and uses input data in the form of NetFlow or IPFIX [16]."]} +{"53779029|191396": ["The goal of clustering is to separate a finite unlabelled dataset into a finite and discrete set of \u201cnatural\u201d, hidden data structures, rather than providing an accurate characterization of unobserved samples generated from the same probability distribution [40]."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} +{"4937576|2867949": ["Various kinds of port scans, and tools to launch them are discussed in detail in [43]."]} +{"4937576|18654252": ["A good amount of research on outlier detection in statistics is found in several books [13]\u2013[15] as well as survey articles [16]\u2013[18].", "Several outlier-based network anomaly identification techniques are available in [18]."]} +{"4937576|16908400": ["Discussion of network coordinate systems, design and security is found in [27], [28]."]} +{"4937576|8364569": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "[21], who explain the concepts of flow and classified attacks, and provide a detailed discussion of detection techniques for scans, worms, Botnets and DoS attacks."]} +{"4937576|13172512": ["developed in machine learning and statistics has been provided by [8], [9].", "However, unlike [9], [19], we include ideas for developing better IDSs, in addition to providing a list of practical research issues and open challenges.", "\u2022 Unlike [9], [19], our survey is not restricted to only IP traffic classification and analysis."]} +{"4937576|6430931": ["Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey", "Wu and Banzhaf [29] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"35066811|3423198": ["Multi-objective feature selection has been addressed in several fields, such as Quality of Service (QoS) constraints in multimedia content distribution [41], handwritten digit recognition [42], among others [43]; however, for intrusion detection purposes its use remains rare."]} +{"35066811|13172512": ["In studies in the literature, anomaly-based intrusion detection was in general treated as a pattern\u2013recognition problem [16] through machine learning techniques."]} +{"1407948|8364569": ["However, research has shown that flow-based techniques have a number of advantages and are successful at detecting a variety of malicious network behaviors Sperotto et al. (2010)."]} +{"44576610|825893": ["RELATED WORK Early investigation of IDS was carried out by Georgios Loukas and Glay [1], who began their work with the time-line significant DOS.", "Early investigation of IDS was carried out by Georgios Loukas and Glay [1], who began their work with the time-line significant DOS."]} +{"8407788|6430931": ["In particular, Swarm Intelligence techniques [66], Markov Chain [67] based ones as well as other soft computing methods [68] seem to possess desirable characteristics in"]} +{"52824936|2867949": []} +{"52824936|26690303": []} +{"13862112|8364569": ["Although flow data only provides an aggregated view of the network activity, it can be used in various application areas, including network security (see [7] for an overview).", "Flow-based intrusion detection is a very active research topic [7]."]} +{"12253168|8364569": ["Recently, Speratta et al. [28] presented an extensive survey of state of the art flow-based IDS with attack classifications and proposed solutions."]} +{"20606879|13172512": []} +{"20606879|26690303": ["[61] published an overview of similarity measures which are used for anomaly based network intrusion detection."]} diff --git a/edge/graph_704458.jsonl b/edge/graph_704458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7045234.jsonl b/edge/graph_7045234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7045726.jsonl b/edge/graph_7045726.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7046385.jsonl b/edge/graph_7046385.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7053950.jsonl b/edge/graph_7053950.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7055228.jsonl b/edge/graph_7055228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7060462.jsonl b/edge/graph_7060462.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7062181.jsonl b/edge/graph_7062181.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7064380.jsonl b/edge/graph_7064380.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7065220.jsonl b/edge/graph_7065220.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7071316.jsonl b/edge/graph_7071316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7072455.jsonl b/edge/graph_7072455.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07296bc4330d2bd75d2bcf0541c003911efb2444 --- /dev/null +++ b/edge/graph_7072455.jsonl @@ -0,0 +1,3 @@ +{"43348301|530484": ["Two different studies have recently reviewed different ways to overcome this preprocessing step problem [52,105].", "However, as pointed out by Hou [52], none of the methods has been shown to be superior to the others and exclusively applicable."]} +{"23130255|15744805": []} +{"7782082|530484": ["\u2026classes are automatically normalised into the interval 0 to 1 for each subject, which should minimise the influence of MR signal non-uniformities (Hou, 2006) that may hinder the detection of lesion from T1 volumes (e.g. Stamatakis and Tyler 2005); (iii) the analysis was performed on voxels\u2026"]} diff --git a/edge/graph_7073436.jsonl b/edge/graph_7073436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..614779c7fe7d473bc51edf8f521213cd0de7e9d3 --- /dev/null +++ b/edge/graph_7073436.jsonl @@ -0,0 +1,3 @@ +{"206639216|6952653": ["It can refer to something as trivial as a persistent computer program like the Unix \"at\" daemon; or to an independent system with enough knowledge and interactive capabilities to ensure its effectiveness in a wide range of somewhat unforeseen circumstances [ 22 ]."]} +{"5816751|1708582": ["The reader is referred back to (Kaelbling et al. 1996) for more detail."]} +{"5816751|7839197": []} diff --git a/edge/graph_707347.jsonl b/edge/graph_707347.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7074478.jsonl b/edge/graph_7074478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7076154.jsonl b/edge/graph_7076154.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7076261.jsonl b/edge/graph_7076261.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a60f1d542b2198755628f0cab39b493f5f7a2e18 --- /dev/null +++ b/edge/graph_7076261.jsonl @@ -0,0 +1 @@ +{"18750336|7971188": ["Amongst the varied communication techniques, the use of Peer-to-Peer (P2P) overlays [14] is increasingly being pro-\nposed to protect CI\u2019s [12], [4] because of their inherent properties such as robustness and redundancy."]} diff --git a/edge/graph_708095.jsonl b/edge/graph_708095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7085121.jsonl b/edge/graph_7085121.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b016887b763157e90935507a9933a6fda16c1ed --- /dev/null +++ b/edge/graph_7085121.jsonl @@ -0,0 +1,11 @@ +{"15621217|1230643": ["In [5], design and implementation issues for a reliable WSN system using magnetic sensors are presented, which can track available parking spaces in real time and communicate that information to the users.", "In recent years, wireless sensor networks (WSN) [1] have inspired tremendous research interest in diverse application domains such as structural health monitoring [23], underwater marine life monitoring [2], military and security surveillance, health-care, smart homes, automotive industry, etc."]} +{"24848108|1230643": []} +{"24843063|18148591": ["Fortunately, some individual nodes can cooperate in transmission and reception by using MIMO cooperative techniques [3] which allow space time diversity gain [4], reduces the energy consumption [5] and increases the system capacity [6]."]} +{"32399595|205286988": ["for collecting and responding to environmental information by collaborating internal part of network such as data/value fusion [6, 7], routing algorithm [ 4 ], data gathering, and data aggregation."]} +{"32399595|1230643": ["Wireless Sensor Networks (WSN) [ 1 ] comprise a great volume of sensor nodes that are fully autonomous with many inherent characteristics, such as limited computation power and resources, energy constraints, limited reliability, and lower communication capabilities."]} +{"16078330|6275330": ["However wireless sensor networks are also making its way into civilian application areas which includes habitat monitoring [1], healthcare [4] and traffic control [1,4]."]} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} diff --git a/edge/graph_7089409.jsonl b/edge/graph_7089409.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f455c2f81ab749f0de81087e7edc55821b0d3166 --- /dev/null +++ b/edge/graph_7089409.jsonl @@ -0,0 +1,5 @@ +{"10204914|11632848": []} +{"18081491|11894197": ["Then the final item representations are generated via an attention mechanism."]} +{"1441710|3102110": ["\u2026related decision making due to its wide applications in decision support, financial forecasting, fraud detection, marketing strategy, process control, and other related fields (Cabena, Hadjinaian, Stadler, Verhees, & Zanasi, 1997, Chen et al., 1996, Fayyad, Piatetsky-Shapiro, & Smyth, 1996)."]} +{"9496877|7158350": ["\u2026Lee et al., 2002; Morrison, 1990; West, 2000) that is a commonly encountered decision making task in businesses, and it is a typical classification problem to categorize an object into one of predefined groups or classed based on a number of observed attributes related to that object (Zhang, 2000).", "For the empirical evidence, this methodology was applied to current financial data of external audited 1061 manufacturing firms comprising the credit portfolio of one of the largest credit guarantee organizations in Korea."]} +{"300198|7158350": ["In the classification realm, NNs can be successfully applied to construct an approximation of the independent variables into group predictions (Markham & Ragsdale, 1995; Zhang, 2000).", "Categorizing an object into a predefined group or class based on a number of observed attributes related to that object is a typical classification problem (Zhang, 2000).", "The usefulness of these methods relies heavily on the various assumptions or conditions under which the classification models are built (Zhang, 2000)."]} diff --git a/graph_70923.jsonl b/edge/graph_70923.jsonl similarity index 100% rename from graph_70923.jsonl rename to edge/graph_70923.jsonl diff --git a/edge/graph_7097444.jsonl b/edge/graph_7097444.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_710141.jsonl b/edge/graph_710141.jsonl similarity index 100% rename from graph_710141.jsonl rename to edge/graph_710141.jsonl diff --git a/edge/graph_7102404.jsonl b/edge/graph_7102404.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1dec7a7615402cbbe53675fe26bab1f4098902e7 --- /dev/null +++ b/edge/graph_7102404.jsonl @@ -0,0 +1,3 @@ +{"15984113|12068725": []} +{"143550336|2355696": []} +{"143550336|14303607": ["\u2026approaches to examining emotion communication are characterized by increasingly sophisticated methods that combine knowledge and techniques imported from complementary fields (e.g., Chiao & Blizinsky, 2010; Jack, Garrod, Yu, Caldara, & Schyns, 2012; Martinez & Du, 2012; Susskind et al., 2008)."]} diff --git a/edge/graph_7103867.jsonl b/edge/graph_7103867.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7105333.jsonl b/edge/graph_7105333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c4afab3688ae2352a82d368cde929becc56e5af --- /dev/null +++ b/edge/graph_7105333.jsonl @@ -0,0 +1 @@ +{"62229727|1619901": ["Product development is defined as the process through which market opportunity and a set of assumptions about product technology are transformed into a product available for sale (Krishnan & Ulrich, 2001)."]} diff --git a/edge/graph_7105794.jsonl b/edge/graph_7105794.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0ed5f8f5b803af128f87462ed761c4af64b9552 --- /dev/null +++ b/edge/graph_7105794.jsonl @@ -0,0 +1,5 @@ +{"9682696|713082": ["The concepts of saving data at sources and propagating tokens in a network have been proposed in other communities, such as reliable multicast algorithms [25] and ChandyLamport algorithm for consistent snapshots [26]."]} +{"53556|10500613": []} +{"6407934|14140377": ["Temporal query languages [35] are based on a rich model of history, and with their many special-purpose language constructs they dramatically subsume CQL in terms of expressiveness."]} +{"206743327|13034818": ["mance on the same order of magnitude as DRAM, but with persistent writes [202]."]} +{"11002705|2795037": ["In contrast to classical distributed query optimization [5, 24, 12], the problem of optimizing recursive incremental programs is more complex since it has to keep track of data-\ufb02ow dependencies among the program statements that maintain auxiliary views."]} diff --git a/edge/graph_71143686.jsonl b/edge/graph_71143686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c58ef0f650aee39bdafb9ed18a5958ff2ce84aca --- /dev/null +++ b/edge/graph_71143686.jsonl @@ -0,0 +1,18 @@ +{"17627549|192934": []} +{"41577126|26179088": []} +{"206764015|192934": [", [4], [14], [19], [15], [22], [12], [5]) and select features with the minimal redundancy (Min-Redundancy).", ", (see [30], [14], [13] for a detailed comparison.", "The data set HDR [6], [14], [13], [28] contains 649 features for 2,000 handwritten digits.", "In other words, \u201cthem best features are not the bestm features\u201d [4], [3], [14], [30].", ", feature selection (or variable selection, among many other names) [30], [14], [17], [18], [15], [12], [11], [19], [31], [32], [5], is critical to minimize the classification error."]} +{"1138191|9270553": ["Brain-computer interface (BCI) has been proved to be a potential method to link the brain and the outward environment directly [6]."]} +{"18723855|9270553": []} +{"17571592|16362395": ["In their review of the literature on BCI classifiers, Lotte et al. 16 concluded that SVMs are particularly efficient, attributing the efficiency to their regularization property and immunity to the curse of dimensionality.", "While many early BCI studies satisfied this requirement, 24,38 later studies were often based on offline analyses of pre-recorded data 1 ; for example, the Lotte et al. 16 review of studies evaluating BCI signal-classification algorithms found most used offline analyses."]} +{"17571592|9270553": []} +{"17571592|192934": []} +{"9534381|43331360": ["Similar to the robotic-based rehabilitation [1], BCI-based training allows more intensive repetitive motion and delivers the therapy with reasonable cost.", "Motor imagery can even be used for the patients with no residual motor function [1].", "Stroke is one of the leading causes of mortality and disability in industralized countries [1].", "Firstly, it is anticipated that the rhythmic foot or leg movements activates the primary motor cortex, while the movement preparation activates the frontal and associated areas [1, 3]."]} +{"10617937|9270553": ["Three bipolar EEG chanings [1-4].", "tion value for [2]T."]} +{"377868|3102110": ["For the purpose of classification problems, the classifying system has usually been implemented with rules using if-then clauses, which state the conditions of certain attributes and resulting rules [2], [3]."]} +{"12524156|9270553": ["2 ): A := {x \u2208 2 | \u00b5 3 x > \u03a6 2 /2 \u2227 arg(x) > \u03c0/3} B := {x \u2208 2 | \u00b5 2 x > \u03a6 2 /2 \u2227 arg(x) < 0} C l := {x \u2208 2 | ||x|| 2 > \u03a6/ \u221a 3 \u2227 arg(x) \u2208 [0, \u03c0/3]} C u := {x \u2208 2 | ||x|| 2 > \u03a6/2 \u2227 arg(x) \u2208 [0, \u03c0/3]} R := {x \u2208"]} +{"206608942|9270553": ["Current systems can reach no more than 25 bits/min,1 even under optimal conditions [13]."]} +{"1243387|9431428": []} +{"1243387|14866098": []} +{"1243387|16362395": []} +{"10715511|2746910": []} +{"10715511|11894197": ["In [1], univariate nonparametric filter techniques are split in two groups: pure model-free methods and methods based on random permutation associated to parametric tests.", "Different strategies have been proposed over the last years for feature/gene selection: filter, wrapper, embedded [1], and more recently ensemble techniques [5].", "filter methods in an extended taxonomy inspired from [1].", "According to [1], univariate methods for FS can be either parametric or nonparametric.", "1) has many common points with the one presented in [1].", "[1] also stress on the practical advantages of these methods stating that \u201ceven when the subset of features is not optimal, they may be preferable due to their computational and statistical scalability."]} diff --git a/edge/graph_71145886.jsonl b/edge/graph_71145886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d19e6b196ec6bcc04bba16b11d849f6acf77d0e2 --- /dev/null +++ b/edge/graph_71145886.jsonl @@ -0,0 +1,5 @@ +{"35332705|15222577": ["A survey on SA of Arabic was first presented in [10],", "A survey on SA of Arabic was first presented in [10], Author name / Procedia Computer Science 00 (2017) 000\u2013000 3"]} +{"15980568|15222577": ["In particular, there has been little work on sentiment analysis in Arabic (Abbasi et al., 2008; Abdul-Mageed et al., 2011; Abdul-Mageed et al., 2012; Abdul-Mageed and Diab, 2012b; Korayem et al., 2012), and very few, considerably small-sized, datasets to work with (Rushdi-Saleh et al.", "Most of the current research has focused on building sentiment analysis applications for the English language (Pang and Lee, 2008; Liu, 2010; Korayem et al., 2012), with much less work on other languages."]} +{"2404341|6891645": ["We mention here several relevant corpora and refer to other surveys for more details (Al-Sulaiti, 2004; Zaghouani, 2014; Shoufan and Alameri, 2015; Al-Thubaity, 2015)."]} +{"116320200|16768404": []} +{"316794|6891645": []} diff --git a/edge/graph_71147044.jsonl b/edge/graph_71147044.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8727b350ba6a95cec5147628f78cf12f5067faa --- /dev/null +++ b/edge/graph_71147044.jsonl @@ -0,0 +1,2 @@ +{"3633960|9470480": ["However, the BCI modalities only decode the brain signals using active, passive, and reactive tasks (Khan and Hong, 2015; Hong et al., 2017; Liu and Hong, 2017)."]} +{"3633960|5755816": []} diff --git a/edge/graph_71148946.jsonl b/edge/graph_71148946.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8364b8e06bf55df6e7af8323f23c321070a9811c --- /dev/null +++ b/edge/graph_71148946.jsonl @@ -0,0 +1,3 @@ +{"40432467|1722293": ["Different kinds of sensors have been considered in a bed-based BCG acquisition system [4]."]} +{"2703783|20905429": ["Over the past two decades, a type of sensor placement system [7], [8], actigraphy, has become a way to assess acceptable and an accessible tool in sleep research and sleep medicine."]} +{"3821594|18599847": [". [27] and Bulling et al. [28] for more comprehensive reviews of sensor-based human activity recognition literature. Also, Langkvist et al. provided a review of deep learning for time-series modeling [29]. Early adopters of deep learning for wearable sensor data, focus on adapting the raw input signal to the desired deep learning architecture [30]. Inspired from speech recognition, Alsheikh et al. [30"]} diff --git a/edge/graph_71149308.jsonl b/edge/graph_71149308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41fad3d310440afdc76775416c12d6949d7d8733 --- /dev/null +++ b/edge/graph_71149308.jsonl @@ -0,0 +1,14 @@ +{"18760497|35109549": []} +{"156043195|10440280": []} +{"156043195|485843": []} +{"5470697|595093": []} +{"247623|5747564": []} +{"56596142|24855581": ["In the last two decades, the reinforcement learning algorithms [66]\u2013[68] based onMDP as its rigorous mathematical foundation has become a new breakthrough in the field of ML."]} +{"56596142|20404279": ["For this purpose, this paper proposes to build a GAN [54], [97]\u2013[99] to generate massive scenarios for the digital/physical mirrored simulation system, as illustrated in Figure 11."]} +{"158885230|12122055": []} +{"10360918|5747564": ["We assume that the whole operation time in one day is divided into time slots, and let denote the set of operation time slots."]} +{"44255833|10440280": ["It is well known that a large number of DR problems can be formulated as distributed convex optimization problems [5], [6], where the ultimate goal is to minimize the aggregate sum of convex cost functions, each available at a node (consumer), subject to convex and affine constraints that are also distributed across the nodes."]} +{"157739828|10542290": []} +{"12738017|8833120": []} +{"17352237|981659": ["\u2026smart grid is expected to be a promising approach to monitor, predict, and manage real-time energy usage in a cost-e\ufb00ective and e\ufb03cient manner [3], [5], [6]. pe Erol-Kantarci et al. [7] proposed the energy management scheme for residential customers based on the real-time information generated\u2026"]} +{"102492556|485843": []} diff --git a/edge/graph_71150264.jsonl b/edge/graph_71150264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55867be7d98ccae783c35a7a198735a9ad661432 --- /dev/null +++ b/edge/graph_71150264.jsonl @@ -0,0 +1,6 @@ +{"4700321|15705163": ["There is a vast amount of research that attempts to summarise data quality dimensions and their descriptions [13][26][31][38][35][5] in the context of DQ frameworks."]} +{"18452139|15705163": ["Data with high quality not only is appropriate for different applications, but also increase the quality of information that needs for decision support [1] [2]."]} +{"7041308|10500613": ["Schema matching research [Rahm and Bernstein 2001; Doan and Halevy 2005] develops techniques to automatically or semi-automatically match data schemas."]} +{"14609547|8125630": []} +{"16366968|15705163": ["Types: according to [12] and [13] the data is always recorded using a schema providing a wellorganized structure."]} +{"17284553|10500613": ["It offers help to the data modeller using appropriate tools using database schema matching algorithms, which are either schemabased matchers, instance-level matchers or hybrid approaches [22]."]} diff --git a/edge/graph_71150278.jsonl b/edge/graph_71150278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f4fd1b6f34d61f77ecec76c4464f814e7410abe --- /dev/null +++ b/edge/graph_71150278.jsonl @@ -0,0 +1,17 @@ +{"16550469|13034818": []} +{"20612401|13034818": ["These two phases can be repeatedly and rapidly cycled by applying heat to the material [10,2].", "Non-volatile memory (NVM) technologies such as phase-change RAM (PCRAM), magnetic RAM (MRAM) and Memristor promise to enable memory chips that are non-volatile, require low energy and have density and latency closer to current DRAM chips [2].", "Several oxides other than TiO2 are known to present similar bipolar resistive switching, and there are multiple research projects in motion to explore these other materials for similar memory device implementations [2]."]} +{"14732663|14583671": ["Since writes to caches show both inter-set and intra-set variations [6], while those to main memory show only inter-set variation, the wear-leveling techniques proposed for main memory cannot be utilized to mitigate intra-set writevariation in caches.", "[5, 6]) to fully evaluate and highlight the effectiveness of our technique."]} +{"7784044|13034818": ["Several prototypes have demonstrated the multilevel cell (MLC) [Burr et al. 2008; Lee et al. 2009].", "Those data are cited from Qureshi et al. [2009], Mogul et al. [2009], Burr et al. [2008], Dong et al. [2008], Kryder and Kim [2009], and Lewis and Lee [2009]."]} +{"7784044|14583671": ["Mittal et al. [2015] compared different hybrid caches and found that SRAM + PCM caches offer higher area ef\ufb01ciency than SRAM + eDRAM and SRAM + STT-RAM caches."]} +{"14114712|11575230": []} +{"206771165|9452842": ["Also, under normal conditions, they retain data for several years without the need of any standby power."]} +{"206771165|15411200": ["and hence, ECC of lower complexity can be used to protect data which reduces the ECC overhead [138]."]} +{"206771165|165863": ["The final version is available at http://dx.doi.org/10.1109/TPDS.2015.2442980\nA Survey of Software Techniques for Using Non-Volatile Memories for Storage\nand Main Memory Systems Sparsh Mittal, Member, IEEE, and Jeffrey S. Vetter, Senior Member, IEEE\nAbstract\u2014Non-volatile memory (NVM) devices, such\u2026"]} +{"206771165|13268141": ["The property common to all NVMs is that their write latency/energy are significantly higher than that of read latency/energy."]} +{"206771165|14583671": ["For example, the size of a typical SRAM cell is in the range of 125\u2013200F (2), while that of a PCM and Flash cell is in the range of 4\u201312F 2 and 4\u20136F (2), respectively, where F denotes the smallest lithographic dimension in a given technology node [36, 86].", "[86], for example, a 16Gb ReRAM prototype has been recently demonstrated [38] which features an 8-bank concurrent DRAM-like core architecture and 1GB/s DDR interface.", "The cell-size of Flash is 4-6F (2), while that of SRAM is 120-200F 2 [86].", "A few previous papers focus on the device-level properties of Flash memory [97] or review use of SCMs for cache and main memory [83, 86].", "For more details on the device-level properties of memory technologies, we refer the reader to previous works [6, 25, 36, 65, 86, 100, 106]."]} +{"10346597|10658846": []} +{"9624121|627405": ["It also includes details of how different types of studies will be located, appraised, and synthesized [7,8].", "According to Brereton and others [8] a systematic map is used to describe the kinds of research activity that have been undertaken and describes the studies rather than extracting specific details."]} +{"3932089|13034818": ["NP blends show promising data retention times, switching speed, and cycling endurance, but the on-state current is too low to permit scaling to nanometer dimensions [10,14].", "Recently, polymer (plastic memory) and organic memory devices have significant consideration because of their simple processes, fast operating speed, and excellent switching ability [9,10].", "Currently, there are several technologies that show some promise; some of these new emerging technologies are MRAM, FeRAM, PCM, STT-RAM, nano-random-access memory (NRAM), racetrack memory, RRAM and memristor, molecular memory, and many others [10,83]."]} +{"3932089|13268141": ["Memory is divided into two forms: DRRAM and Flash [163,164]."]} +{"42056728|13034818": ["Hence, signi\ufb01cant effort and resources are being spent on developing emerging memory technologies like ReRAM, Ferro-electric RAM (FeRAM), Spin Torque Transfer RAM (STT-MRAM) and Phase Change RAM (PRAM) in recent years [2]."]} +{"3153482|13034818": ["Directory_Create (Filename, parent) (1) If Directory_Lookup(Filename, Parent) = NULL then return Err (2) Allocate first free slot in parent directory and append a new Dentry (3) Allocate the corresponding name hash entry and write CRC(Uppercase(Filename)) value on it (4) Return OK B0 Allocation of 4 coming clusters for a new file", "(4) if rNH = \u201cdeleted\u201d or rNH cNH then goto (2)"]} diff --git a/edge/graph_71151909.jsonl b/edge/graph_71151909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85bac3cfd9793a0702063da831f87d250470f116 --- /dev/null +++ b/edge/graph_71151909.jsonl @@ -0,0 +1,3 @@ +{"6743572|205435103": []} +{"35469486|11139156": ["However, like other researchers of SLR, this is not a systematic omission [72]."]} +{"1750279|15412731": ["This work was supported by Science Foundation Ireland grant 03/CE2/I303_1 to Lero - the Irish Software Engineering Research Centre."]} diff --git a/edge/graph_7117894.jsonl b/edge/graph_7117894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3638b5ac0a435c404e7fe3be876554354b41e068 --- /dev/null +++ b/edge/graph_7117894.jsonl @@ -0,0 +1 @@ +{"13933643|7117894": []} diff --git a/edge/graph_7120308.jsonl b/edge/graph_7120308.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..251480eaa2ebe24f02c4b401332dc60e1088d2ad --- /dev/null +++ b/edge/graph_7120308.jsonl @@ -0,0 +1,9 @@ +{"5180830|3785059": ["The proliferation of standard languages and frameworks for modeling and editing CIGs (Peleg et al. 2003) is well known.", "Therapy planning systems incorporate, on the one hand, a computerized representation of clinical protocols, also called Computer Interpretable Clinical Guidelines (CIGs) (Peleg et al. 2003).", "More concretely, the knowledge representation language as well as the planner is also capable of representing and managing different work\ufb02ow patterns present in any of such protocols (also present, on the other hand, in most CIGs formalisms; Peleg et al. 2003; Leong et al. 2007).", "More concretely, the knowledge representation language as well as the planner is also capable of representing and managing different workflow patterns present in any of such protocols (also present, on the other hand, in most CIGs formalisms; Peleg et al. 2003; Leong et al. 2007).", "Most of the research and development effort on these systems has been focused on the development of languages and frameworks to support modeling, editing, and representing CIGs (Leong, Kaiser, and Miksch, 2007).", "These approaches are mainly focused on the veri\ufb01cation of therapy plans with temporal constraints (apart from providing very expressive CIGs representation formalisms) and we have shown that our temporal representation and reasoning is as expressive as the one used in Asbru or Glare."]} +{"40905653|17827658": ["A survey on CSP techniques used in the context of planning and scheduling is presented in [Bart\u00e1k et al., 2010]."]} +{"40905653|6159806": ["Planning approaches are discussed along with other approaches such as workflow management in [Srivastava and Koehler, 2003; Rao and Su, 2004; Dustdar and Schreiner, 2005; Alamri et al., 2006; Eid et al., 2008]."]} +{"7426414|6607209": ["For instance [10] has proposed a market-based approach where and/or trees of tasks are exchanged between agents."]} +{"6159806|116542": []} +{"907987|9123526": ["The work presented here is cast in terms of FOL, not in terms of one of the typical Semantic Web languages such as OWL [8] nor more specifically in terms of a semantic Web service ontology such as OWL-S [9], WSMO [10] or SWSO [11]."]} +{"15970697|9123526": []} +{"15970697|7839197": ["Suppose you want an automated software agent [60] to solve problems such as the following:"]} +{"12157126|15294520": ["Regarding the automated composition of web services as OWL-S processes, although several techniques may be applied to this problem [12], AI Planning and Scheduling (P&S)[7] seems to be the most promising one since during the last 40 years it has dealt with the development of planning systems capable of interpreting a planning domain as a set of actions schemes (i."]} diff --git a/edge/graph_7128700.jsonl b/edge/graph_7128700.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..187eae98205be32a7597167ab6180c489aad5881 --- /dev/null +++ b/edge/graph_7128700.jsonl @@ -0,0 +1,9 @@ +{"6229019|627405": ["According to [2], an analysis framework with a set of components has to be defined in order to perform a survey in the software engineering field."]} +{"207159067|1975139": ["However, they share the following drawbacks: (1) Portions of the adaptation-speci\ufb01c speci\ufb01cations are entangled with the non-adaptive behavior speci\ufb01cations; (2) They do not support the speci\ufb01cation of state transfer, so that the target behavior must start from the initial state, thus making\u2026"]} +{"359435|206778272": ["[15], where the aim is to propagate changes without altering the behavior of the application."]} +{"4884206|9732448": ["A more recent effort [108] emphasizes the degree of distribution of the service registry and the use of semantic information in the service matchmaking process.", "First, the centralized approach does not scale well with respect to the increasing number of clients that pose service discovery queries [51, 108]."]} +{"4884206|8250043": ["Specifically, it is not clear how to automate the testing of service compositions [26]."]} +{"4884206|2445817": ["Nevertheless, even multicasting is a costly approach that does not scale well [135].", "Further works focus on service discovery protocols for mobile ad hoc environments, which are part of the Future Internet [95, 135].", "curity, privacy, and trust are not completely covered [135].", "As discussed in [135], purely distributed service discovery protocols are more suitable for environments consisting of a small number of devices that are characterized by high physical mobility.", "The aforementioned issues become even more important, in the cases where service discovery is supposed to be handled in mobile computing environments that consist solely of mobile nodes [95, 135]."]} +{"4884206|1300682": ["An interesting classification of privacy attacks along with an approach for dealing with such problems is discussed in [32], while in [47] the authors give a list of requirements that should be provided by service discovery protocols toward achieving security."]} +{"17155782|13385255": ["Publications such as [7] and [15] that analyze the development phases of B2Bi and therefore are suited to identify task factors reveal that choreography technologies typically are used to fill the semantic gap between business process models (BPM) and orchestration models (OM)."]} +{"43314096|1113420": ["Merging these areas should be a promising research topic, since awareness is already being discussed in ubiquitous computing for some time [1]."]} diff --git a/edge/graph_7129138.jsonl b/edge/graph_7129138.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_713082.jsonl b/edge/graph_713082.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7135597.jsonl b/edge/graph_7135597.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6fdd8e16208af5349ecd89f481181e5fa30abbbb --- /dev/null +++ b/edge/graph_7135597.jsonl @@ -0,0 +1 @@ +{"17482778|12894036": []} diff --git a/edge/graph_7139420.jsonl b/edge/graph_7139420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3de35359bb68351b7e79cc312daa4dc9c22c30aa --- /dev/null +++ b/edge/graph_7139420.jsonl @@ -0,0 +1,2 @@ +{"2018607|3102110": []} +{"2018607|954543": []} diff --git a/edge/graph_7139869.jsonl b/edge/graph_7139869.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66dd6a38ee0cb42439969e6ef1f390c9c8fc939c --- /dev/null +++ b/edge/graph_7139869.jsonl @@ -0,0 +1,11 @@ +{"15861348|1230643": []} +{"37651457|27954888": []} +{"1332066|7922155": []} +{"10082302|12860838": ["1], [58]); and (c) integration of information (database schema integration, integration of knowledge base structures, integration of catalogs, merging and integration of ontologies) (e.g., [1], [14], [32], [123], [131], [134], [159]). In the article, many illustrative applied examples are presented. It is necessary to point out fundamentals of the described approaches correspond to practice (e.g., eng"]} +{"10082302|14171067": []} +{"59509186|13726263": []} +{"59509186|40304452": []} +{"59509186|18976841": []} +{"59509186|824249": []} +{"14075768|14659766": ["ior. The approach realizes a joint design of problem formulation and algorithm. 2. Adaptive algorithms/software (e.g., [121]). 3. Usage of generic library of problem solving methods/algorithms (e.g., [86],[139],[143]). 4. Algorithm portfolio (e.g., [55],[58],[135],[177]). 5. Recon\ufb01guration or self-organizing algorithms (e.g., [64],[176]). 6. Cooperative/hybrid metaheuristics for combinatorial optimiza"]} +{"14075768|7922155": []} diff --git a/edge/graph_7140647.jsonl b/edge/graph_7140647.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7142427.jsonl b/edge/graph_7142427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7143269.jsonl b/edge/graph_7143269.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7147372.jsonl b/edge/graph_7147372.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7150007.jsonl b/edge/graph_7150007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7158183.jsonl b/edge/graph_7158183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..187cc183e79c7c0600442edc386400f52d4c5570 --- /dev/null +++ b/edge/graph_7158183.jsonl @@ -0,0 +1,5 @@ +{"5645682|13034818": []} +{"25442966|14678574": ["but it may also make the circuit less reproducible and the uniqueness and reliability of the construction can in turn suffer [15].", "Thus, it is now easy for the tag to authenticate with a probability 1/2 by sending a subsequence which is also all zero [15], [20]."]} +{"25442966|3815882": ["First, public helper data are generated: p 1\u20444 Gen\u00f0r\u00de [16]."]} +{"1355676|14678574": []} +{"1355676|3815882": ["vent helper data manipulation attacks [38]."]} diff --git a/edge/graph_7158350.jsonl b/edge/graph_7158350.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..443ca0e89aa59e1420946b64cc070eccd3cf0734 --- /dev/null +++ b/edge/graph_7158350.jsonl @@ -0,0 +1,3 @@ +{"207575855|7158350": []} +{"7256892|7158350": []} +{"28389458|6327434": []} diff --git a/edge/graph_7165993.jsonl b/edge/graph_7165993.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6cee4893e3268b171821a983e132925661520bc --- /dev/null +++ b/edge/graph_7165993.jsonl @@ -0,0 +1,6 @@ +{"930443|7923260": []} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} +{"8250221|17292349": []} +{"13019512|8296351": ["Catalogues with up to 30 analysis operations on feature models have been reported [5, 44].", "We estimate that this technique could be used to test, at least, 16 out of the 30 analysis operations identified in [5].", "The automated analysis of feature models deals with the computer\u2013aided extraction of information from feature models [5].", "Catalogues with up to 30 analysis operations identified on feature models are reported in the literature [5, 44]."]} +{"14842395|17292349": []} diff --git a/edge/graph_71715536.jsonl b/edge/graph_71715536.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b0fbd417746887ab277b1ec5bb0676cd6cc27f6 --- /dev/null +++ b/edge/graph_71715536.jsonl @@ -0,0 +1,16 @@ +{"17551685|7774517": ["munication overhead, memory, and computational cost low [7].", "For a sensor node, the communication cost is often several orders of magnitude higher than the computation cost [7].", "This requires the construction of an accurate normal profile that represents the normal behavior of sensor data [7].", "[7] solved the Table 1 Node throughput and overall utility Nodes g = 0.", "Thus, the main challenge faced by outlier detection techniques for WSNs is to satisfy the mining accuracy requirements while maintaining the resource consumption of WSNs to a minimum [7].", "In many of these applications, real-time data mining of sensor data to promptly make intelligent decisions is essential [7, 11].", "Furthermore, direct computation of probabilities is difficult [7].", "Furthermore, sensor nodes are vulnerable to malicious attacks such as denial of service attacks, black hole attacks, and eavesdropping [7, 13]."]} +{"3834073|3402363": ["CBP is now turning to be an important issue of contemporary business process management, and attracts lots of attention and efforts from both industry and academia [13]."]} +{"29646201|1598350": ["1 The dimension introduced in the IoT [19] Multimed Tools Appl", "The Internet of Things (IoT) is a global scale network based infra uses many things as the virtual objects or virtual things with attributes, Auto-IDs, and self-configuration receptivity within the standard communication are gathered with information networks [14, 16, 19]."]} +{"3166241|7466096": []} +{"3166241|7854020": []} +{"17114729|3348390": []} +{"17462972|1898434": ["In cooperative multi-object decision of IoT way, agents can be employed in SNs for information-processing tasks [10]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"18370592|1598350": []} +{"2331997|9270553": ["However, relying only on the improvements in sensing and processing are insuf\ufb01cient to completely eliminate errors, since the accuracy depends on emotional state of the user [22], environmental noise [31], and electrode placement and condition [22, 31]."]} +{"2481394|16323798": ["After collecting energy usage data, they perform information disaggregation to isolate single appliances traces [31].", "However, since combinations of capacitive and inductive loads monitoring are more di\ufb03cult to monitor, [31] warns to carefully evaluate such cases."]} +{"44461432|2992477": ["Data mining enables the businesses to understand the patterns hidden inside past purchase transactions, thus helping in planning and launching new marketing campaigns in prompt and cost-effective way [95]."]} +{"44461432|18654252": ["Rough sets based algorithms introduce rough sets or fuzzy rough sets to identify outliers [94]."]} diff --git a/edge/graph_7180589.jsonl b/edge/graph_7180589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7185733.jsonl b/edge/graph_7185733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7186978.jsonl b/edge/graph_7186978.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e16ddca438f740903b7ae8db3fb2ef7e0ac9b71 --- /dev/null +++ b/edge/graph_7186978.jsonl @@ -0,0 +1,4 @@ +{"13975932|6952653": []} +{"6952653|9232628": ["Overviews of formalisms for modelling belief and knowledge may be found in [63, 80, 108, 143]."]} +{"16439596|6952653": []} +{"14643222|6952653": ["Agents are often characterized by their capabilities such as autonomy, reactivity, pro -activity, social ability, reasoning, learning, and mobility, among others (Wooldridge and Jennings, 1995)."]} diff --git a/edge/graph_7188493.jsonl b/edge/graph_7188493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d59041452ad92018509a11270497f3840b3a28dd --- /dev/null +++ b/edge/graph_7188493.jsonl @@ -0,0 +1,82 @@ +{"11955759|3540699": ["264/AVC [1]\u2013[3] have gained popularity for their wide applications in wireless sensor networks (WSNs)."]} +{"57181064|14545307": ["However, the index of the codeword is transmitted instead of the codeword itself in order to achieve a higher compression ratio since the index can be represented with a fewer number of bits [ 26 ].", "Since a large number of vectors are encoded into a finite set of codewords available in the codebook, vector quantization provides a lossy compression [25] [ 26 ].", "Some examples of vector quantization algorithms include the tree-structures vector quantization, product vector quantization, address vector quantization, multistage vector quantization and pyramid vector quantization [25] [ 26 ]."]} +{"18834601|15300368": ["Contents lists available at SciVerse ScienceDirect\nComputer Networks\njournal homepage: www.elsevier .com/ locate/comnet\nObject extraction scheme and protocol for energy efficient image communication over wireless sensor networks q\n1389-1286/$ - see front matter 2013 The Authors."]} +{"18834601|15947359": ["\u2026Aziz School of Engineering, University of South Australia, Mawson Lakes, SA 5095, Australia\na r t i c l e i n f o\nArticle history: Received 13 June 2012 Received in revised form 2 July 2013 Accepted 3 July 2013 Available online xxxx\nKeywords: Wireless sensor networks Image communication\u2026"]} +{"18834601|12127129": ["Out of these methods, the Running Gaussian Average appears to have simple calculation, fastest processing speed and lowest memory requirements [21].", "Some of them are: Running Gaussian Average, Temporal Median Filter, Mixture of Gaussians, Kernel Density Estimation and Sequential Kernel Density Approximation [21]."]} +{"18834601|387610": ["Further reduction can be achieved using multiple levels of DWT processing on the low frequency sub-band (LL1) as per the JPEG2000 standard [26].", "The lifting scheme [26], a JPEG2000 compliant technique, is used to compute DWT, because it leads to less computational complexity and less memory requirements [27]."]} +{"33401232|1940388": []} +{"33401232|17205659": ["[41] propose a survey on the most important solutions, but they can be hardly applied to multimedia data.", "With respect to previous surveys on WSNs and WMSNs, such as [1, 7, 41, 60, 69, 72, 74], which are mainly devoted to the analysis of general security issues and DoS attacks, the attention here will be focused on scientific proposals for authentication, secure node localization, privacy policies, trust management, and data aggregation/compression, which have been explicitly conceived to face with security and privacy, or which can be easily extended to cope with them."]} +{"33401232|1230643": ["As a consequence, WMSNs require tools and methodologies different from the ones proposed for common WSNs [2].", "With respect to previous surveys on WSNs and WMSNs, such as [1, 7, 41, 60, 69, 72, 74], which are mainly devoted to the analysis of general security issues and DoS attacks, the attention here will be focused on scientific proposals for authentication, secure node localization, privacy policies, trust management, and data aggregation/compression, which have been explicitly conceived to face with security and privacy, or which can be easily extended to cope with them.", "Solutions to these problems are typically inherited from WSNs.", "978-0-7695-3834-1/09 $26.00 \u00a9 2009 IEEE DOI 10.1109/UBICOMM.2009.27\n194\nWith respect to classic Wireless Sensor Networks (WSNs), the constraints, imposed by the computational capacity, the memory and energy resources, become more critical."]} +{"12399704|62585398": ["In fact, many optimization mechanisms have addressed different aspects of the communications in wireless visual sensor networks [9,18]."]} +{"12399704|5404353": ["coding (DVC) [9], may also be exploited.", "In order to attain high efficiency, protocols and algorithms of the MAC, network, transport and applications layers can operate in a cooperative way that disrupts the conventional data flow [9].", "In fact, many optimization mechanisms have addressed different aspects of the communications in wireless visual sensor networks [9,18].", "However, again, other techniques, such as distributed video\ncoding (DVC) [9], may also be exploited.", "A common approach to optimize WVSN is to exploit some characteristics of an active transmission flow [9].", "A common approach is to give higher priority to parts of the encoded data that are more relevant for the reconstruction of the original data [9,40].", "Reduction of the source rate is an adaptive approach that allows minimal packet losses, as proposed by some works [9,13], but it adds some complexity to the communications."]} +{"12399704|16120075": ["When performing a 2D modeling, the FoV is commonly approximated to an isosceles triangle for simplicity, but 3D modeling is also possible [5,6].", "In wireless visual sensor networks, the unique view of camera-enabled sensors over the monitored field [6] turns the recovery of lost packets into a required service.", "Actually, the FoV is a sector-like visible region emanating from the camera [5,6], defining a direction of viewing (the camera\u2019s pose).", "The area sensed by camera-enabled sensors is defined as the field of view [5,6], a sector-like area that is defined by a viewing angle, a sensing range and an orientation [19]."]} +{"12399704|7889189": ["Wireless sensor networks have to deal with many security issues, where confidentiality, integrity, authentication and availability are major goals do achieve [36].", "especially when multimedia data is transmitted [36]."]} +{"12399704|1230643": ["Wireless sensor networks (WSN) have been employed as an effective resource for a series of monitoring applications, providing information, such as humidity, pressure, temperature and luminosity, among many others [1,2]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"5172416|270804": ["However, these traditional transport protocols cannot be directly implemented over wireless sensor network [6, 49] because WSN in general and WMSN in particular have their distinctive features, which make them different than typical Internet network, and they have very wide range of applications that need special requirements."]} +{"5172416|1236072": ["The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"5172416|1230643": ["WSNs are becoming more low-cost, low-power, multi-functional, and viable due to the advances in micro-electro-mechanical systems (MEMS), low power and highly integrated digital electronics, and proliferation of wireless communications [1].", "The sensor sends such collected data (called as scalar data), usually via radio transmitter, to a command center (sink) either directly or through multiple wireless hops [1, 3, 4]."]} +{"36067070|15947359": []} +{"36067070|18469839": []} +{"8253100|12127129": ["Only the updated objects\nare transmitted using the proposed protocol,\nproviding energy efficient image transmission in error-\nprone environments."]} +{"15451135|15300368": ["Keywords- Wireless sensor networks, Image processing, Digital integrated circuits, Microprocessors, Coprocessors\nI. INTRODUCTION Wireless Sensor Networks (WSNs) have attracted significant research interests in the last few years [1]."]} +{"15451135|15947359": ["During the last few years, several camera node designs have been proposed using Commercial available Off-The-Shelf (COTS) microprocessors [2-8].", "Such Wireless Multimedia Sensor Networks (WMSNs), with the ability to gather multimedia information from the surrounding environment, are providing the impetus for a new vision of extending the capabilities WSNs for many new applications such as advanced environmental monitoring, advanced health care delivery, traffic avoidance, fire prevention and monitoring, and object tracking [2, 3]."]} +{"15451135|387610": []} +{"6745457|12817488": []} +{"10416337|17769444": [", very low, low [93])."]} +{"10416337|1230643": ["Wireless sensor networks (WSNs) are critically resource constrained by limited power supply, memory, processing performance and communication bandwidth [1]."]} +{"9233616|1230643": ["Sensor networks combine three important components: sensing, data processing and communication [2].", "The field of Wireless Sensor Networks has received significant attention in recent years with the number of applications to cover areas such as surveillance, security, monitoring of natural habitats, eco\u2013systems and medical monitoring [1], [2]."]} +{"45110952|1230643": []} +{"45110952|387610": []} +{"1713028|16219347": ["The opposition between the stringent requirements of visual data transmission and the resource constrained nature of wireless sensors imposes the need for energy efficiency over the network [7]."]} +{"1713028|5404353": ["Other research line is focused on Distributed Video Coding, where the encoders are less complex than the decoders and thus the complexity is shifted to the sink, which is expected to be resource-full [8,62].", "A crucial aspect of energy-efficiency is visual data coding [8].", "From a different perspective, reliable communications may be required for visual monitoring applications, since some packets may be highly necessary for reconstruction of the original data [8].", "In such a context, different optimizations have been proposed aiming at achieving energy efficiency with reduced impact on the monitoring quality [2,8].", "In order to deal with such complex environment, many works have proposed different optimizations for energy efficiency, with different results in terms of energy preservation and visual monitoring quality [1,2,8].", "This tradeoff has fostered the development of optimization mechanisms that discard lower relevant information in order to reduce energy consumption [2,4,8].", "Many works have addressed energy-efficiency in visual data transmission, congestion control, error recovery and packet routing, exploiting different characteristics for higher efficiency [2,3,8]."]} +{"1713028|16120075": ["As a final comment, it should be considered that for areas with high occlusion, many low-resolution visual sensors are a much better solution than a few high-resolution cameras [53\u201355], and increasing the deployment density expands the coverage area, but not in the same proportion [9].", "However, visual data transmitted from different source nodes may be processed by applications as completely different information [9].", "Usually, redundancy may be obtained with massive deployment or deterministic positioning of sensor nodes [9,14].", "Moreover, some visual sensors may retrieve critical information for the application, depending on the application requirements and cameras\u2019 poses [9], also requiring reliable transmissions.", "An additional difficulty is that visual sensors should not land with their cameras directed to the ground or to the sky (unless required by the application), since they would be useless for sensing functions [9], affecting the network availability.", "Figure 1 As visual monitoring depends on the sensors\u2019 poses, resolution and depth of view [9], two camera-enabled sensors can collect visual data from the same object or scene, even when they are many hops away from each other.", "In WVSNs, redundancy depends on the nature of the application, since each camera-enabled sensor probably has a unique view of the monitored field [9,20].", "In fact, visual sensors collect data following a directional sensing model [9], making characteristics such as resolution and orientation relevant parameters when defining redundancy.", "Many works have proposed different algorithms for optimal camera placement [9,14], where it is desired to find the minimal number of nodes that can view a larger area of the monitored field.", "Thus, for visual sensor networks, the concept of vicinity is valid only for communication, which is omnidirectional, since the sensing range in wireless sensor networks is replaced in WVSNs by the Field of View (FoV) [9,20]."]} +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"2184225|1230643": []} +{"13331864|8397295": ["A straightforward generalisation of msg( ) to networks is the following: where get : Val \u2192 2 Msg is de\ufb01ned as follows: Now, everything is in place to formally de\ufb01ne our notion of attacker."]} +{"14211810|5404353": ["To the best of our knowledge, a mechanism for selective retransmission based on DWT coded images has not been proposed by the academic community [10].", "Error Model Packets in WSNs may be discarded for many reasons, as congestion, node failure and optimization mechanisms [10].", "As a result, packets will have different priorities for the applications depending on the carried information, and such priorities may be exploited by cross-layer optimization solutions [10].", "There are different data recovery mechanisms for wireless sensor networks [10].", "There are many coding techniques suitable for wireless image sensor networks, each one bringing advantages and drawbacks [10]."]} +{"14211810|16120075": ["In addition, source nodes need to process multimedia encoding algorithms and reliable communication is required for most VWSNs applications due to the lack of redundancy when video-based sensors are employed [8,9].", "As stated before, the lack of redundancy and the unique view of source sensors over the monitored field [9] turn recovery of lost packets into a required service.", "In wireless image sensor networks, the lack of redundancy and the unique view of source sensors over the monitored field [9] turn the recovery of lost packets into a required service, since the desired view of a target may be only achieved by a unique source node."]} +{"14211810|15947359": ["The use of low-cost, low-power and low-resolution cameras to collect visual information can strongly enhance the monitoring capability of such networks, allowing for the development of Video-based Wireless Sensor Networks (VWSNs) [6,7]."]} +{"14211810|1230643": ["Typically, WSNs are composed of many self-organizing disposable electronic devices equipped with a short-range wireless transceiver, limited energy supply (usually batteries), a sensing unity and processing and memory resources [2,3]."]} +{"16388875|5404353": ["In fact, in this paper we are mainly concerned with the use of the sensing relevancies of the nodes as a global QoS parameter for network optimization procedures [11], instead of how such relevancies are computed.", "In fact, the two presented examples are intended to describe practical uses of the sensing relevance of source nodes, but we envisage that many other optimizations are possible exploiting such concept [11].", "In the aforementioned problem, the relevancies of the packets payloads for the decoding process could be used as a priority level when congested nodes need to discard packets, as already investigated [11]."]} +{"16388875|16120075": ["many researches in the literature showing how such information can be extracted from the network following different approaches [10, 15, 16, 22].", "Visual sensing in wireless sensor networks is a crucial issue of a bigger concept referred as the coverage problem [10, 34].", "In such way, we can not say if a target is viewed by a particular sensor just looking at the current sensor\u2019s position, since the effective monitored area is also a function of the camera\u2019s pose, the viewing angle and the zooming capabilities [10].", "Other question is the use of PTZ cameras, which allow modification of the cameras poses [10]."]} +{"16388875|15947359": ["The use of cameras to collect visual information can strongly enhance the monitoring capability of such networks, allowing the development of Visual Sensor Networks (VSNs) [34, 36]."]} +{"16388875|1230643": []} +{"1940388|17205659": ["Besides implementing the security goal discussed above, the following metrics are also important to evaluate whether a security scheme is appropriate for WSNs [7], [8].", "A few existing surveys on security issues in WSNs can be found [7], [8]."]} +{"18156362|16219347": ["However, they also consume more power [15,82].", "These papers were written on different aspects of VSN such as (challenging issues [8], general overview [11], multimedia streaming [12,14,16\u201318], platform design [15]).", "Table 1 Comparison of WSN platforms [15] Sensor type Microcontroller type Data rate", "Table 2 Compression techniques and targeted applications on VSN platforms [15]"]} +{"18156362|15947359": []} +{"18156362|18469839": ["These are not up-to-date and not practical to be implemented in WSNs [18].", "Because of this fact, the complication of the image compression process becomes very challenging in the VSNs context [8,18,19]."]} +{"18156362|1230643": ["These technological advances enable the production of low cost and low power micro-sensing devices with on-board processing and communication capabilities [1\u20133]."]} +{"16120075|3117516": ["Halawani and Kahn [80] also presented a survey on techniques, algorithms and protocols for network lifetime enhancement.", "and the energy preservation in sleep mode have to be also properly considered [80]."]} +{"16120075|15947359": ["Several papers can be found in the literature surveying wireless sensor networks [2,3,14] and visual sensor networks [6,15] as their main research areas.", "For the resulting Video-based Wireless Sensor Networks (VWSNs), or simply Visual Sensor Networks (VSNs), new researches had to be conducted, since many traditional WSN algorithms, architectures and computational solutions are not feasible or even efficient for that specific communication scenario [5,6].", "In fact, video-based wireless sensor networks may expect more energy consumption in local processing than in data transmission, contrary to traditional wireless sensor networks [6]."]} +{"16120075|1236072": ["A survey on the routing techniques and protocols for wireless sensor networks, including energy aware routing, can be found in [79]."]} +{"16120075|1230643": []} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} +{"3462196|8649087": ["An overview about current requirements and implementations of contents protection systems for digital multimedia data is given in [6]."]} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"7357277|116294": ["\u2022 Denial of Service (DoS): Denial of Service (DoS) [21, 22] is The network layer of WSNs is vulnerable to the different types of attacks such as: spoofed routing information, selective packet forwarding, sinkhole, sybil, wormhole, hello flood, acknowledgment spoofing etc ."]} +{"7357277|7889189": ["Though there is no such standard layered architecture of the communication protocol for WSN, here, we have summarized possible attacks and their security solution approaches in different layers with respect to ISO-OSI layer in the Table-1 [16, 17]."]} +{"7357277|1940388": ["Attacks on the computer system or network can be broadly classified [15] as interruption, interception, modification and fabrication.", "There are a lot of approaches to ensure routing security [14, 15]."]} +{"16292538|15300368": []} +{"16292538|15947359": ["Such Wireless Multimedia Sensor Networks (WMSNs), with the ability to gather multimedia information from the surrounding environment, is providing the impetus for extending the capabilities WSNs for many new applications such as advanced environmental monitoring, advanced health care delivery, traffic avoidance, fire prevention and monitoring, object tracking etc [4], [5]."]} +{"16292538|387610": ["Uncompressed image data can be very expensive to store and transmit over WMSN [13].", "IMAGE COMPRESSION ARCHITECTURE JPEG2000 is the latest standard developed by the ISO/ISE joint technical committee [13], [14]."]} +{"14607107|17205659": ["The features of AES algorithm have been investigated and its effect on energy has been studied well in researches [26] [27]."]} +{"207198621|18469839": ["This interest is driven by theoretical and practical problems in embedded operating systems, network protocols, wireless communications and distributed signal processing [24, 27, 30]."]} +{"207198621|41768464": ["Therefore, watermarking techniques are being investigated to address the issue of some of these attacks, like tempering, ownership etc [20, 22]."]} +{"12853490|15300368": [") make this technology be an ideal candidate for numerous applications [3\u20136]."]} +{"12853490|1230643": [") make this technology be an ideal candidate for numerous applications [3\u20136]."]} +{"627267|7889189": []} +{"627267|15947359": ["VSNs [Soro and Heinzelman 2009] share many properties, techniques, and protocols with wireless sensor networks (WSNs)."]} +{"627267|1940388": ["Security in the related field of WSNs has been studied by many researchers and various reviews [Wang et al. 2006; Zhou et al. 2008; Mpitziopoulos et al. 2009; Chen et al. 2009] have been published.", "Therefore, a number of dedicated and lightweight security techniques and protocols for WSNs have been proposed [Perrig et al. 2002; Karlof et al. 2004; Zhu et al. 2006; Chen et al. 2009] that are also suitable for VSNs.", "Attacks on the MAC and routing layers have been extensively studied in the context of WSNs [Perrig et al. 2002; Chan and Perrig 2003; Perrig\nACM Computing Surveys, Vol. 47, No. 1, Article 2, Publication date: April 2014.\net al. 2004; Wang et al. 2006; Chen et al. 2009; Sen 2010]."]} +{"627267|17205659": ["Security in the related field of WSNs has been studied by many researchers and various reviews [Wang et al. 2006; Zhou et al. 2008; Mpitziopoulos et al. 2009; Chen et al. 2009] have been published.", "Attacks on the MAC and routing layers have been extensively studied in the context of WSNs [Perrig et al. 2002; Chan and Perrig 2003; Perrig\nACM Computing Surveys, Vol. 47, No. 1, Article 2, Publication date: April 2014.\net al. 2004; Wang et al. 2006; Chen et al. 2009; Sen 2010]."]} +{"13641891|16335158": []} +{"13641891|7854020": []} +{"13641891|1940388": []} +{"14636557|17279511": ["Due to these restricted operating conditions (constrained computational and energy resources along with an ad hoc communication environment) of WSNs, most of the security techniques (including intrusion detection techniques) devised for traditional wired/wireless networks are not directly applicable to a WSN environment [8]."]} +{"14636557|15199849": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details."]} +{"14636557|1940388": ["On the other hand, security in WSNs is an important issue, especially if they have mission-critical tasks [2]."]} +{"14636557|17205659": ["Readers who are interested more on security attacks against WSNs, may refer to [4], [5] and [6] for further details.", "more on security in WSNs, may refer to [3], [4] and [5] for further information."]} +{"14636557|12815020": ["\u2022 A survey of IDS in cloud computing is provided in [27], which would be helpful to secure next generation networks."]} diff --git a/edge/graph_7191751.jsonl b/edge/graph_7191751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..799f56b0e9d4460490d8eeb6ca2be7726f3ab0d3 --- /dev/null +++ b/edge/graph_7191751.jsonl @@ -0,0 +1 @@ +{"10748412|7834819": ["The waist was selected as it has been found to be a suitable position for accelerometer-based fall detection [26]."]} diff --git a/edge/graph_7193476.jsonl b/edge/graph_7193476.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85d1405e85fe09141d9db8211c56cea7f7884dc5 --- /dev/null +++ b/edge/graph_7193476.jsonl @@ -0,0 +1 @@ +{"1495854|10500613": ["\u2022 How to build an appropriate global schema, and how to discover inter-schema [31] and mapping assertions (LAV or GAV) in the design of a data integration system (see, for instance, [83])."]} diff --git a/edge/graph_7193801.jsonl b/edge/graph_7193801.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d4b3c47d4682ee6f3598b27ba1fc46324ace99b --- /dev/null +++ b/edge/graph_7193801.jsonl @@ -0,0 +1,144 @@ +{"20332672|54836648": ["However, the huge complexity, high-overhead and low-performance of the IP multicast make network operators reluctant to adopt it [16].", "the Internet because of high architectural complexity and signaling-intense C-Plane, which limits its scalability [16]."]} +{"20332672|2623404": ["Moreover, the multipart IoMT transport service is designed to keep the core nodes optimized by maintaining a reduced number of table entries for scalability perspectives [17]."]} +{"20332672|3348390": [", location and addressing) of typical IoMT environments [21] by applying multihomed multimedia that are gathered from heterogeneous IoMT devices within its network."]} +{"5031313|121289": ["Hence, an appropriate Information and Communication Technology (ICT) infrastructure is required, ensuring reliable transmission of measurement values, statuses and commands in real-time [1]."]} +{"52291407|7193801": ["Thus, to deal with this issue, we consider an SDN-based smart grid network [10]."]} +{"52291407|15895606": ["As a result, cascading failures or blackouts may occur [8], [9]."]} +{"52291407|2521001": ["As a result, cascading failures or blackouts may occur [8], [9]."]} +{"52291407|595093": ["Since smart grid contains critical infrastructure, it is also highly vulnerable to security attacks [5], [6]."]} +{"12699980|121289": ["This leads to larger overall data volumes and a high degree of complexity which needs to be handled by the ICT infrastructure [2]."]} +{"12103882|17774971": []} +{"12103882|192934": []} +{"25235853|15093994": ["active energy distribution [2], [3]."]} +{"6356589|2373572": ["Asmentionedbefore, bothwireless andPLCare twoexamples of technologies used in smart grids [26]."]} +{"3948192|21875534": ["As previously discussed, this requires the application of a fast, reliable, and robust communication system [31], [32]."]} +{"29060869|485843": []} +{"29060869|595093": ["The readers who are interested on a detailed survey on smart grid security are referred to [24], [25]."]} +{"29060869|5747564": []} +{"29060869|7686677": ["Interested readers can refer to [13]\u2013[16] for energy efficient wireless communications, [17], [18] for energy efficient optical commu-", "Furthermore, femtocells and picocells are energy efficient alternatives to macrocells, however when they are densely deployed, they may reduce the efficiency of the macrocell as the primary BS will operate under low traffic [16]."]} +{"29060869|8909218": []} +{"29060869|121289": ["been discussed in detail in [9], [10]."]} +{"29060869|2373572": ["In addition, the technique known as Power Line Communications (PLC) emerges as a strong candidate for the AMI [33], [34]."]} +{"25565715|2387055": []} +{"19353103|7525856": ["Several surveys have specifically focused on spectrum sensing [39], [40], spectrum access techniques [41], spectrum decision [42], and spectrum assignment techniques [43], [44]."]} +{"19353103|8606364": ["Survey papers which focused on spectrum occupancy measurement campaigns in cognitive radio networks are discussed in [45] and [46].", "There has been handsome amount of research on PU activity modelling and spectrum occupancy measurements [45], [46], [211]\u2013[214]."]} +{"19353103|512561": ["Such applications include medical services [77], vehicular communication [78], cognitive radio sensor networks [79], [80], wireless sensor networks [81], emergency and public safety applications [82], military applications [83], unmanned aerial vehicles [84], smart grid [85], [86], Internet of Things (IoT) [87], cognitive cellular networks [88], cognitive radio enabled femtocells [89], green powered cognitive radio networks [90], [91], and broadband access [92]."]} +{"19353103|1686572": ["their intrinsic characteristics, such as dynamic spectrum access and intelligence functionality [27]\u2013[32], [175].", "Reliability, security threats, and detection in cognitive radio networks have been widely surveyed in [27]\u2013[32]."]} +{"19353103|8974063": ["Several surveys have specifically focused on spectrum sensing [39], [40], spectrum access techniques [41], spectrum decision [42], and spectrum assignment techniques [43], [44]."]} +{"19353103|7800459": []} +{"19353103|14552902": ["Bruno and Nurchis [51] provide a detailed survey of network coding in wireless mesh networks."]} +{"19353103|5428176": []} +{"40863564|5747564": ["Smart grid is characterized by two-way flow of power in electrical network, and information in communication network [1]."]} +{"40863564|6959212": ["The other way of data flow is to send the control information from the control center to the smart meters for the purpose of load management and price broadcasting, where the concentrator also works as a relay for the information exchanging between the smart meter and the control center [6, 7]."]} +{"14054458|2387055": ["It is also noteworthy that SDN itself is new and there are security threats that are encountered in this system as surveyed by [25] but still we cannot deny the possibility that this system has to cope with the new challenges that are faced by the smart grid."]} +{"49568988|543643": []} +{"53013005|12537501": []} +{"53013005|121289": ["Subsequently, appropriate Information and Communication Technology (ICT) infrastructures are required to ensure reliable, timely transfer of measurement data and control commands, in particular on transmission grid level [2, 3]."]} +{"46927618|121289": ["Hence, a scalable and pervasive communication infrastructure is crucial in both data analytics and management of SG systems [5]."]} +{"26916273|121289": ["With the ongoing, rapid transition to smart architectures however the need for new approaches to the associated communication infrastructures arises [2].", "robust and flexible communication networks for handling these new information flows [2]."]} +{"3552149|18392886": ["to adapt it to large-scale networks with different ASes such as the Internet [79].", "This classification has been recently adopted by [79].", "Moreover, Espresso achieves higher availability (reliability) when compared to existing router-centric Internet protocols.", "Digital Object Identifier 10.1109/COMST.2017.2782482\nthe recent emergence of the Internet of Things (IoT) has allowed for the creation of new advanced services with more stringent communication requirements in order to support its innovative use cases.", "Another different class of solutions has been recently introduced by DISCO which promoted a logically distributed control plane based on existing ASs within the Internet.", "The main advantage of the DISCO solution is the possibility to adapt it to large-scale networks with different ASes such as the Internet [79].", "However, that main feature of logically-centralized control which has been leveraged by most SDN solutions to improve\nnetwork management at the intra-domain level, cannot be fully exploited for controlling heterogeneous networks involving multiple Autonomous Systems (ASes) under different administrative authorities (e.g., the Internet).", "Considered as a large-scale SDN deployment for the public Internet, Espresso, which has been in production for more than two years, routes over 22% of Google\u2019s total\ntraffic to the Internet.", "I. INTRODUCTION\nTHE UNPRECEDENTED growth in demands and datatraffic, the emergence of network virtualization along with the ever-expanding use of mobile equipment in the modern network environment have highlighted major problems that are basically inherent to the Internet\u2019s conventional architecture.", "Finally, another important feature of Espresso is that it provides full interoperability with the rest of the Internet and the traditional heterogeneous peers.", "2) SDX-Based Controllers: Different from DISCO which proposes per-domain SDN controllers with inter-domain functions for allowing autonomous end-to-end flow management across SDN domains, recent trends have considered deploying SDN at Internet eXchange Points (IXPs) thus, giving rise to the concept of Software-Defined eXchanges (SDXes).", "In the same spirit, INRIA\u2019s D-SDN [92] enables a logical distribution of the SDN control plane based on a hierarchy of Main Controllers and Secondary Controllers, matching the organizational and administrative structure of current and future Internet."]} +{"3552149|11414835": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-", "In the case of an underlying physical SDN network, this could be implemented using an SDN network hypervisor that creates multiple logically-isolated virtual network slices (called vSDNs), each is managed by its own vSDN controller [14]."]} +{"3552149|2623404": ["In particular, surveys published in IEEE CST over the last few years elaborated on various topics within the SDN scope such as the concept, benefits and historical roots [9, 10], the architecture elements and", "the design challenges [9, 10, 11, 12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management challenge in SDN [16] and the application of SDN in wireless networks [17]."]} +{"3552149|4269723": ["lenges [9]\u2013[12], the SDN programming languages [13], the virtualization of SDN networks using hypervisors [14], the security challenge in SDN [15], the fault management chal-"]} +{"17876141|36784649": ["Our NIDS uses One-Class Classi\ufb01cation (OCC) algorithms [11] that enable detecting abnormal traf\ufb01c behavior from a homogeneous training set containing only the signature of traf\ufb01c generated under normal network operation [11]."]} +{"17876141|121289": ["Electric power grids are undergoing a modernization process and evolving into the so-called Smart Grids [1][2], improving the generation, transmission, and distribution of electrical energy."]} +{"1413545|11414835": ["The SDN based schemes can be further divided into: hypervisor based [14] and pure SDN controller based [9], as shown in Fig.", "Enabling Schemes To perform network-wide resource allocation for multiple virtual networks, the enabling schemes can be mainly classified into two categories: scheduling based [6], [13] and software defined paradigm based [9] [14]."]} +{"67872491|206485901": ["communication technology (ICT) and power electronics can prevent risks, unleashing a tremendous potential of evolution of the electric market [9], [10]."]} +{"67872491|31086789": ["communication technology (ICT) and power electronics can prevent risks, unleashing a tremendous potential of evolution of the electric market [9], [10]."]} +{"52197154|2623404": ["Authors in [17], [18] presented various features of SDN such as- network capabilities, interfaces, and programming languages used.", "Moreover, to ease the burden of data flow on the existing network infrastructure, SDN can play an integral role in processing and forwarding the reduced data in an efficient manner over the SG network infrastructure [17], [18], [19], [20], [21], [22], [23], [29], [30]."]} +{"18543133|5747564": []} +{"46747824|485843": ["AMI utilizes the SG communication infrastructure to transfer metering data as well as customer consumption-related information [3], [4]."]} +{"46747824|121289": ["In the large-scale AMI, there are many SMs located in different regions which should transfer metering and related consumption information to the MDMS through some intermediate nodes, such as concentrators or switches [14], [15]."]} +{"46747824|18037424": ["AMI utilizes the SG communication infrastructure to transfer metering data as well as customer consumption-related information [3], [4]."]} +{"25672251|29060869": ["Now, IEC61850 based communication networks that interconnects IEDs, while a significant improvement over the historic serial interconnection, has occurred many new challenges to be overcome ranging from resource allocation to security management [3, 4]."]} +{"25672251|5747564": ["Substations host many intelligent electronic devices (IEDs) that monitor the states of the underlying electricity infrastructure in a fine-grained and multiple dimensional way [2]."]} +{"34643772|2387055": ["Although there are related survey papers [6], [7], [16], [26]\u2013[29] which provide information about the SDN, more up to date activities of rapidly advancing research areas on SDN security and energy efficiency is to be brought to the research community."]} +{"34643772|10837932": ["directly help reduce energy consumption in the SDN-based networks [88], however SDN offers configurations that can help to reduce energy consumption [87], [89].", "For green networking, there have been different approaches considered [87]."]} +{"2616764|35109549": ["However, with consumer control, these devices use a control system that is located in the home, business or on the Internet, but is ultimately managed by the needs of the consumer [26]."]} +{"269169|121289": []} +{"26248180|19938676": ["\u2026extensively deployed in the near future, which will pose a severe stress on current communication networks and will oblige the operators to rethink and adapt the current network management procedures to satisfy the requirements of the new applications and the expectations of the new customers [1]."]} +{"26248180|11414835": []} +{"26248180|29060869": ["On the other side, the need is to make the communication network smart enough to understand how to optimally manage ICT network resources, without the risk of either degrading QoS or resorting to the approach of resource overprovisioning [6]."]} +{"8343053|33247252": ["Finally, the heterogeneity in the connected devices requires device configuration and maintenance to enable system interoperability, which requires significant manual efforts [11]."]} +{"8650651|207262843": ["SDN and virtualization strategies for LTE wireless cellular networks have been surveyed in [50]."]} +{"8650651|6583734": []} +{"8650651|11414835": ["SDN hypervisor can create multiple isolated virtual SDN networks [80], [81]."]} +{"8650651|801245": ["Bitar [39] has surveyed use cases for SDN controlled broad-band access, such as on-demand bandwidth boost, dynamic service re-provisioning, as well as value-added services and service protection."]} +{"8650651|2535224": ["we note that for the field of wireless and mobile networks, SDN based networking mechanisms have been surveyed in [41]\u2013[47] while network virtualization has been surveyed in [48] for general wireless networks and in [49] for wireless sensor networks."]} +{"8650651|15035771": []} +{"8650651|17248887": ["(b) SDN controller utilizes the path computation ability of the PCE [246], [269], [270] and controls network through OpenFlow protocol.", "using an SBI protocol, such as OpenFlow [246], [269], [270]; see illustration b) in Fig.", "devices [33], [34], [242], [244], [246]."]} +{"8650651|2623404": []} +{"8650651|10693567": [", with OpenFlow (OF) switches [7] or network elements (devices) controlled with the NETCONF protocol [8].", "The OpenFlow protocol [2], [7], [56] has been the first protocol for the SouthBound Interface (SBI, also referred to as Data-Controller Plane Interface (D-CPI)) between the con-", ", the OpenFlow protocol [7] for the SBI.", "OpenFlow switching element (data plane) and an OpenFlow controller (control plane) is carried out through the OpenFlow protocol [7], [56].", "The general principles of SDN have been extensively covered in several surveys, see for instance, [2], [6], [7], [10]\u2013[27]."]} +{"8650651|1580493": ["For a \ufb02exi-grid network based on OFDM [31], Zhao et al. [310] have compared a greedy heuristic that maps requests in decreasing order of the required resources with an arbitrary \ufb01rst-\ufb01t benchmark.", "1) [31], [87]\u2013[89] allows the center frequency to be any multiple of 6.", "In a related study on SDN controlled switching in a PON, Yeh et al. [178] have designed an ONU with an optical switch that selects OFDM subchannels in a TWDM-PON.", "For a flexi-grid network based on OFDM [31], Zhao et al.", "The proposed communication is based on carrierless amplitude and phase modulation [215] enhanced with optical Orthogonal frequency Division Multiplexing (OFDM) [150].", "The OFDMA transmissions and receptions are processed in a DSP module that is controlled by a central SDN control module.", "The different OFDM channels are manipulated through DSP \ufb01ltering.", "The FlexPON employs OFDM for adaptive transmissions.", "The survey brie\ufb02y notes how OFDM-based elastic networking can facilitate network virtualization and surveys a few studies on OFDM-based network virtualization in core networks.", "Similar OFDMA based slicing strategies for supporting cloud computing have been examined by Jinno et al. [286].", "Simulation experiments indicate a 40% increase in network bandwidth utilization as a result of the global coordination compared to operating the bandwidth allocation only within the individual PONs [261], [262]. b) Access and Wireless: Bojic et al. [263] expand on the concept of SDN controlled OFDMA enabled VPONs [257] to provide mobile backhaul service.", "Each small-cell site contains an OFDMA-PON ONU that provides the backhaul service through the access network over a VPON.", "[31] have presented a thorough survey on flexible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core (backbone) networks.", "An SDN controller is utilized to assign bandwidth to each small-cell site through OFDMA subcarrier assignment in a VPON to the constituent ONU.", "c) Flexi-grid: The principle of flexi-grid (elastic) optical networking [31], [87]\u2013[92], [226] has been explored in several SDN infrastructure studies.", "Bandwidth allocation is performed at the granularity of OFDMA subcarriers that compose the optical spectrum.", "1) General Multidomain Networks: a) Optical Multitechnologies Across Multiple Domains: Optical nodes are becoming increasingly recon\ufb01gurable (e.g., through variable BVTs and OFDM transceivers, see Section III), adding \ufb02exibility to the switching elements.", "Illustration of DSP recon\ufb01gurable ONU and OLT designs [151]: Each ONU passes the electrical Optical OFDM signal [150] through a Shaping Filter (SF) that is SDN-con\ufb01gured by the DSP controller, followed by a Digital-to-Analog Converter (DAC) and Intensity Modulator (IM) to generate the optical signal.", "Zhang et al. [31] have presented a thorough survey on \ufb02exible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core Fig.", "The virtualization studies on access networks [282]\u2013[284], [286]\u2013[295] have primarily focused on exploiting and manipulating the speci\ufb01c properties of the optical physical layer (e.g., different OFDMA subcarriers) and MAC layer (e.g., polling based MAC protocol) of the optical access networks for virtualization."]} +{"8650651|16972183": ["wireless networks provide Internet access to a wide range of mobile devices [113]\u2013[115]."]} +{"8650651|7686677": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention.", "QoS levels in an energy-efficient manner [465]\u2013[467] is an important future research direction."]} +{"8650651|10837932": ["e) Energy-efficient embedding: Motivated by the growing importance of green networking and information technology [348], a few studies have begun to consider the energy efficiency of the embedded virtual optical networks."]} +{"8650651|8909218": ["For instance, the cell structure of wireless cellular networks [458] has advanced to femtocell networks [459] as well as heterogeneous and multitier cellular structures [460], [461]."]} +{"8650651|10532321": []} +{"8650651|25929315": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention."]} +{"263015|2623404": ["[38] present programable networks in the context of SDN."]} +{"263015|1230643": ["Wireless Sensor Networks (WSNs) [57], [58] differ substantially from WCNs with respect to network and node"]} +{"9120444|121289": ["A crucial factor in creating Smart Grids is the provision of a suitable ICT infrastructure, matching the speci\ufb01c needs of this environment [1], as shown in Figure 1."]} +{"6911987|485843": ["Consulting several research papers [7, 8, 9, 10, 11] permitted the elaboration of Table I below that describes a smart grid data flows taxonomy."]} +{"6911987|121289": ["Consulting several research papers [7, 8, 9, 10, 11] permitted the elaboration of Table I below that describes a smart grid data flows taxonomy."]} +{"3920516|485843": ["Within the communication network associated with the power grid, the Neighbor Area Network (NAN) and Home Area Network (HAN), are faced with substantial communication challenges because of their size and traffic variation [1 \u2013 3]."]} +{"3920516|17336376": []} +{"63482685|2623404": []} +{"63482685|991041": []} +{"24110634|9495329": ["The surveys in [22] and [27] review SDN application in IoT, furthermore Bizanis and Kuipers [28] review the conjunction of SDN and NFV for IoT."]} +{"24110634|6583734": ["Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|11414835": ["The virtualizer ensures that all information collected is collated to form a virtualisation of the network state to the controller [29], [141]."]} +{"24110634|801245": ["WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization."]} +{"24110634|9040432": ["The survey study below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in\u2026"]} +{"24110634|2535224": ["\u2026below provides a state of measure regarding the extent of SDN applications: SDN in traditional networks [12]\u2013[16], [128], SDN in wireless networks [15], [18], [34], SDN in cloud computing [20]\u2013[22], SDN in Fog computing [23], [24], SDN in mobile cloud computing [25], [26], SDN in IoT [22], [27].", "Surveys in [12]\u2013[18] provides a comprehensive review of SDN in enterprise and wireless networks, whereas Li and Chen [19] research pertains to SDN and NFV. Surveys in [20]\u2013[26] review the application of SDN in cloud, fog, mobile cloud, and mobile edge computing."]} +{"24110634|2623404": ["Large networks also become heterogeneous due to the use of different proprietary protocols, which fundamentally means they consist of different network islands that only cooperate at lower levels of communication [13], [33], [36].", "If no match is found, then appropriate rules are actioned, i.e. drop the packet, pass it to the next \ufb02ow table or send it to the controller for new rules to be made [13].", "The LFB has a speci\ufb01c function (such as routing) to process the packets [43], and enables the CE to control the FE [13].", "Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "If they match, appropriate actions are applied and if more than one entry match is found, prioritization, based on the highest degree of match, applies [13], [40].", "The instruction \ufb01eld determines what action should be taken upon a packet match [13].", "Recent research has focused on the development of both the southbound and northbound API standard-isation, with more focus on the southbound API [13].", "They both conform to the principle of decoupling the control and the data plane, but are fundamentally different [13].", "SDN introduces bene\ufb01ts such as vendor independence, heterogeneous network management, reliability and security not possible in traditional networks [12], [13], [16], [34], [35].", "Traditional networks are also mostly hierarchical, tree based and static, which leads to what most have termed \u2018\u2018ossi\ufb01cation\u2019\u2019 [13]."]} +{"24110634|10693567": ["The two most popular southbound interface speci\ufb01ca-tions are Forwarding and Control element separation (ForCes) [38], [39] and OpenFlow [40]\u2013[42]."]} +{"24110634|11735843": ["Some literature even deem OpenFlow the principal [14] and de facto [13] protocol for SDN networks.", "The issue of virtualisation and cloud computing services has also necessitated a shift from conventional data storage towards SDN-oriented data storage and management [14].", "Another area which is the crux of this paper, is wireless sensor networks [14], [32], [56], [58]."]} +{"24110634|1230643": ["As Akyildiz et al. [8] and Qin et al. [106] allude, there has been less focus on the NB interface, whereas much attention has been dedicated to SB interfaces.", "WSN surveys dates a while back and have been improved with time and can be found in [1] and [8]\u2013[10]; more recently Khan et al. [11] reviewed the prospect of WSN virtualization.", "Radio communication also consumes a huge chunk of power [8], it involves data transmission and reception."]} +{"24110634|10532321": ["The memory management techniques explored in [180] could be investigated from the SDWSN perspective.", "The rules placement problem is expounded with a comprehensive review of different solutions in [180]."]} +{"204985341|10440280": []} +{"204985341|485843": []} +{"10556814|10559330": []} +{"52241742|206456479": ["Related work presented in the surveys of [2], [7], [8], [9] and [10] emphasizes the importance of SDN and NFV for network slicing."]} +{"52241742|10342730": ["An analysis of fast slice failover strategies is given in [25], while [26] describes challenges and solutions of Radio Access Network (RAN) slicing via LTE [27] and IEEE 802."]} +{"52241742|121289": ["Traditionally, such Critical Infrastructures (CIs) require dedicated communication networks to meet their specific, diverging requirements [1]."]} +{"8543214|121289": ["Following the recommendations of [3], we have used 128 Bytes SG-DR packets and an initial multicast group size of 5% of total SG-DR customers.", "Existing literature [3], [4], [5] has already pointed out the role of emerging broadband wireless networks (e.", "Recent survey in SG [3] reveals that efficient communication technologies are the key in realizing the vision of SG."]} +{"8590981|512561": ["Thus, to deal with this spectrum congestion challenge, cognitive radio sensor networks can be used in smart grid environments [9], [10]."]} +{"8590981|29060869": ["Both wired and the wireless communication technologies can be used in the smart grid [1]."]} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"69687528|49527603": ["References [26] and [44] contain exhaustive details on all variations of private and public blockchain consensus algorithms.", "While it does provide auditability and lower latency in transaction processing, it is not entirely decentralized or censorship-resistant [26].", "The transaction data is easily verified when Bob compares a hash of the data to the hash in the digital signature [26]."]} +{"69687528|51935081": ["[19] presents recent research efforts by sorting them in different application areas (smart cities, smart grids, etc."]} +{"69687528|49574823": ["Blockchain-based security for the IoT [17], [13], [19] X", "Blockchains for IoT privacy and trust [17] X", "The areas of blockchain-based IoT privacy and security are reviewed in [17].", "consensus [16], [17], [13], [18], [19], [15], [20] X", "blockchains in the IoT [16], [17], [19], [18], [14] X"]} +{"69687528|8523192": ["The IoT edge is steadily being empowered in order to alleviate issues with latency inherent to a centralized IoT [5]."]} +{"69687528|2829149": ["Centralized network architecture for the IoT is faced with the following challenges: \u2022 The entire network infrastructure risks being paralyzed in the event of a failure in the centralized servers [6]."]} +{"69687528|1464669": ["A number of algorithms are proposed in [43], and in use today, that address Byzantine faults, by making varying assumptions on specific use-cases, network performance and"]} +{"69687528|3434731": ["[18] specifically discuss solutions for an edge-centric blockchain-based IoT and the challenges involved, however we present a review of the recent research in a holistic decentralization of the IoT via blockchains."]} +{"3580268|2623404": ["Three recent surveys of SDN [1]\u2013[3] provide extensive discussion of the properties of networks based on SDN features, and on the features of Openflow.", "By exploiting this idea, the concept of Software-Defined Networking (SDN) has evolved over the years [1], [2]."]} +{"3580268|10693567": ["Three recent surveys of SDN [1]\u2013[3] provide extensive discussion of the properties of networks based on SDN features, and on the features of Openflow."]} +{"3580268|713082": ["Several excellent surveys of IP multicast routing exist, focusing on: protocols, functions, and mechanisms [39], algorithms and protocols [40]; and intra- and inter-domain protocols [41]."]} +{"53433031|7193801": ["SDN can be used to simplify network management and therefore simplify the extensive deployment of Smart Grids[17].", "In [15] the fast-failover groups of OpenFlow were used to build a fault-tolerant multicast network for substations using SDN. \u2022 Programmability, automation and easier network management in context of Smart Grids has been examined in [16].", "The goal of project VirtueGrid is to identify the challenges and pitfalls that arise from introducing SDN to Smart Grids in the described scenarios.", "SDN is a promising technology for the use with Smart Grids and while parts of the Smart Grids ICT networks might be migrated to an SDN without many adaptations, a lot of effort is required to adapt current SDN solutions to the needs of the Smart Grid as a whole.", "Standardization and interoperability will therefore need special attention in order to enable the easy adoption of SDN technology to Smart Grids [10],[22].", "The incorporation of new Layer 2 technologies, like for example PLC would benefit the deployment of SDN in Smart Grids.", "Because of its flexibility, SDN can be used as communication infrastructure for Smart Grids to improve efficiency and reliability [8].", "There are open issues in various fields like security, in-band SDN control, virtualization in Smart Grids to name a few [10].", "SDN is highly flexible and has proven to be scalable and resilient but SDN has to be adapted to the special requirements of Smart Grids.", "A detailed overview of the research on SDN based Smart Grids can be found in [10].", "Plenty of research, concerning the use of SDN for Smart Grids has been conducted [10]."]} +{"53433031|24110634": ["in several domains like data centers [4], wide area networks [5], enterprise networks [6] and wireless sensor networks [7] to name a few."]} +{"59619546|485843": ["networks [1], [2].", "2) The RNN reward considers both delay and loss equally, and is formally inR = 1/[norm(\u03c4p) + norm(\u03b5p)], where norm(x) normalize x in [0, 1], \u03c4p is HRRT between the current node and receiver, and \u03b5p is CP loss rate."]} +{"59619546|162478": []} +{"59619546|525062": ["to the reduction of TCP retransmissions, and the enlargement on the TCP congestion window using the additive increase and multiplicative decrease policy [5].", "The intrinsic reason is that the packet loss and out-of-orders in the failures trigger the TCP congestion control and packet retransmissions, which significantly increases the average packet interarrival time (PIAT) [5].", "14 shows that POR and PIAT against the size of the reordering buffer in packets for the two scenarios with 0% and 2% link loss rate.", "Hence, the less memory usage leads to better scalability in flows; and 2) PIAT is linearly increasing against the reordering buffer size, with average and maximum values of (470 \u03bcs, 30481 \u03bcs) and (511 \u03bcs, 19830 \u03bcs) in the\nminimum buffer size for two scenarios, respectively.", "With the OF/SDN, the OPAM can improve the performance of both POR and SRRP, and hence reduce PIAT and HRRT as well as the memory usage for packet reordering at the switches.", "In the data plane, the packet reordering reduces PIAT by 58.63% and increases the TCP throughput by 121.62% than the case without the packet reordering.", "This further decreases the TCP congestion window and significantly deteriorates the TCP reliability and throughput [5].", "In the data plane, PIAT is evaluated in a GP generated by MPSGA using the IEEE 30 bus test network with \u03b3(rs ,GP ) = 99.877%.", "It shows that the average and standard deviation (STD) of PIAT are (3528.1\u03bcs, 9202.3 \u03bcs) and (8173 \u03bcs, 16 083 \u03bcs), respectively.", "12(d) presents PDF in PIATs for the PAFMs (with and without queue).", "congestion control and packet retransmissions, which significantly increases the average packet interarrival time (PIAT) [5].", "In comparison, for the PAFM with queue version, the average and maximum values of PIAT are (472 \u03bcs, 472 \u03bcs) and (473 \u03bcs, 1888 \u03bcs) that are significantly less than the PIAT of CPN in sending IP packets.", "For the electric transmission grid, the proposed OPAM solution aims to ensure the reliable communication through improving on SRRP and PIAT under link failures.", "Accordingly, the states of an extremely unstable network are emulated through frequent link failovers to carry out the performance evaluation of our solution in terms of SRRP and PIAT of end-to-end MMS packet delivery in TCP.", "The latter average PIAT is significantly reduced by 56.83% for the PAFM with the queue due to the reduction of TCP retransmissions, and the enlargement on the TCP congestion window using the additive increase and multiplicative decrease policy [5].", "Compared with CPN, the packet reordering in OPAM uses significantly less memory with smaller PIAT and HRRT, due to the faster routing convergence and higher SRRP of MPSGA.", "With the nondisjoint paths, QSRP can be improved along with the increase of SRRP at the destination node, and hence PIAT can be significantly reduced during link failures due to the avoidance of unnecessary TCP retransmissions.", "The PIAT of all flows can be assumed following the Poisson distribution, as the packets are independently sent with the fixed interval conforming to the ON/OFFmodel in an IEC 61850 MMS network.", "Reordering vrk before c, instead of the TCP window enlargement at receiver, can save the memory in terminal devices and reduce PIAT (see Section V-E)."]} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"3709446|485843": ["Moreover, substantial advances of SG components provide effective means to implement realtime control and optimization algorithms [2]."]} +{"30102381|2521001": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|485843": []} +{"30102381|595093": ["The key challenge is to efficiently exploit communication and information technology infrastructure while ensuring the security by minimizing the susceptibility to cyber-attacks [15]\u2013[18]."]} +{"30102381|5747564": ["Moreover, the advent of smart grid with extensive communication capabilities [11]\u2013[14] yield new security vulnerabilities due to a high dependency on cyber information."]} +{"30102381|121289": []} +{"38126632|24110634": []} +{"5046982|485843": ["It is estimated that the California power grid needs to charge 200000 EVs simultaneously, and its stored power is still sufficient to charge an additional 273000 EVs [2].", "99%)[2], it is challenging to achieve efficient and effective communication."]} +{"22802999|121289": ["Addressing these challenges necessitates precise monitoring and control of the energy system, backed by a reliable and real-time capable ICT infrastructure [2]."]} +{"2253510|485843": ["creation of a new ICT infrastructure which should be able to keep up with the needs of smart grid operators [3]."]} +{"12895606|5747564": ["For more works about security issues for SG communications, the reader may refer to [3] and [19].", "SG communication technologies are anticipated to enable electric distribution systems to incorporate large amounts of distributed energy resources into the grid and to deal with the intermittent nature of renewable energy [3]."]} +{"12895606|6959212": []} +{"17039556|2387055": ["A Denial-of-Service (DoS) type attack [13] can overflow the communication link of the SDN controller-switch [14].", "More specifically, an adversarial smart grid application may attempt to insert new flow rules that may circumvent flow rules imposed by other applications [14]."]} +{"44155756|29060869": ["In an another work, Erol-Kantarci and Mouftah [20] suggested that utilization of RES to power DCs could be an effective solution to cost minimization of DCs while reducing harmful carbon emissions."]} +{"44155756|4269723": ["Table 1 shows the charactersistics of traditional network and SDN [30, 31]."]} +{"17280741|5747564": ["That is, a smart grid not only delivers electricity from suppliers to consumers, but also uses a twoway flow of data communications to exchange information between consumers and suppliers to provide various services, such as integrating renewable distributed energy resources, applying demand side management and dealing with increased energy trade [2, 3]."]} +{"37145840|121289": ["The provision of communication factor to perform the required functions based on this standard is important to create suitable smart grid communication infrastructure [7]."]} +{"32466400|5747564": ["For further reading on the current state of standardization [19]\u2013[22] are suggested."]} +{"15945884|1442447": ["One major building block behind the success of the IoT paradigm is the virtualization [2], in which counterparts in the cyber world are created for any real entity and its functionalities."]} diff --git a/edge/graph_7194930.jsonl b/edge/graph_7194930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_719646.jsonl b/edge/graph_719646.jsonl similarity index 100% rename from graph_719646.jsonl rename to edge/graph_719646.jsonl diff --git a/edge/graph_7199412.jsonl b/edge/graph_7199412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dde3ef9df14414ba91331fceff78ae544030c8da --- /dev/null +++ b/edge/graph_7199412.jsonl @@ -0,0 +1 @@ +{"1178691|205131192": ["Other shape representations, such as Extended Gaussian Images [38], Spherical Attribute Images [27, 28], moments [68, 84], and wavelets [34], require a priori registration into a canonical coordinate system, which is difficult to achieve robustly.", "The simplest approach represents objects with feature vectors [29] in a multidimensional space where the axes encode global geometric properties, such as circularity, eccentricity, or algebraic moments [68, 84].", "Other shape rep\u00adresentations, such as Extended Gaussian Images [Horn 1984], Spherical Attribute \nImages [Delingette et al. 1992, 1993], moments [Prokop and Reeves 1992; Taubin and Cooper 1992], and \nwavelets [Gain and Scott 1999], require a priori registration into a canonical coordinate system,\u2026", "The simplest approach \nrepre\u00adsents objects with feature vectors [Duda et al. 2001] in a multidimensional space where the axes \nencode global geometric properties, such as circularity, eccentricity, or algebraic moments [Prokop and \nReeves 1992; Taubin and Cooper 1992]."]} diff --git a/edge/graph_7202818.jsonl b/edge/graph_7202818.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08cc209ea288c676445ba3281003e98058333588 --- /dev/null +++ b/edge/graph_7202818.jsonl @@ -0,0 +1 @@ +{"2998057|12860838": ["We provide efficient inference and learning techniques for PSL and demonstrate its effectiveness both in common relational tasks and in settings that require reasoning about similarity."]} diff --git a/edge/graph_7212697.jsonl b/edge/graph_7212697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7215096.jsonl b/edge/graph_7215096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7215890.jsonl b/edge/graph_7215890.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7216558.jsonl b/edge/graph_7216558.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..251cc50b9e70b4c309292b199ce46d0e60a251e3 --- /dev/null +++ b/edge/graph_7216558.jsonl @@ -0,0 +1,3 @@ +{"7350034|2034384": ["Gregersen and Jensen [24] call this approach implicit, because the temporal dimension is hidden in the interpretation structure so that entities and relationships are always time-dependent.", "We refer mostly to the temporal extended entity-relationship data model, for which a detailed literature exists [25, 24, 41, 44]."]} +{"7350034|1574374": ["We consider here a simplified case of conceptual schema evolution [38, 20, 35], which can be called a monotonic approach."]} +{"3212998|7216558": ["2For a more thorough survey of the literature on temporalized DLs, see the survey papers [Artale and \nFranconi 2000, 2001; Lutz et al. 2008].", "report accompanying this paper [8] and the survey papers [2, 3, 12]."]} diff --git a/edge/graph_7216886.jsonl b/edge/graph_7216886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0cb330da61bc1d84e36ce7d4d41a65f4efaa3b5 --- /dev/null +++ b/edge/graph_7216886.jsonl @@ -0,0 +1,3 @@ +{"37791768|2294541": []} +{"8951365|13407802": ["Various techniques have been considered in the statistics [34, 35, 28] and data mining [4, 1, 16] communities."]} +{"33065353|13407802": ["Differential privacy is mainly studied in relation to perturbation methods[16,35,14,15] in an interactive setting, although it is applicable to a certain generalization method [18]."]} diff --git a/edge/graph_7218905.jsonl b/edge/graph_7218905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27004c0ba04ee6e9508e8d64e19b6c1e77136a11 --- /dev/null +++ b/edge/graph_7218905.jsonl @@ -0,0 +1,2 @@ +{"14465920|10739218": ["Recently knowledge acquisition from very large databases, including medical databases and DNA sequence databases, called \u2018rule extraction\u2019 or \u2018rule generation\u2019 has been attracting much interest in the arti\ufb01cial intelligence and arti\ufb01cial neural network community [19]."]} +{"19565078|1099309": ["The extraction process of EHD consists of the following stages.", "These normalized and quantized bins constitute the EHD.", "The similarity measure between images is defined as\nsim(q, C)= \u221a \u2211\nt\u2208{H,S,V }\n( \u03bc\u2032qt \u2212 \u03bc\u2032Ct )2+ \u2211 t\u2208{H,S,V } ( \u03c3\u2032qt \u2212 \u03c3\u2032Ct )2\n+ H(BMq, BMC) 3 \u00d7 m + |Eq \u2212 EC | + |EHDq \u2212 EHDC |\n5 \u00d7 80 (10)\nwhere \u03bc \u2032I t and \u03c3 \u2032I t represent the normalized mean value and standard deviation of the image I in t color space, respectively.", "We adopt the edge histogram descriptor (EHD) [27] to describe edge distribution with a histogram based on local edge distribution in an image.", "BM I means the image bitmap feature of the image I; meanwhile, EI and EHDI represent the entropy and the EHD of the image I , respectively."]} diff --git a/edge/graph_7222183.jsonl b/edge/graph_7222183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f856460120e0064953321b98073174f76d93132 --- /dev/null +++ b/edge/graph_7222183.jsonl @@ -0,0 +1 @@ +{"205709972|17858209": []} diff --git a/edge/graph_7228449.jsonl b/edge/graph_7228449.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7239044.jsonl b/edge/graph_7239044.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7246733.jsonl b/edge/graph_7246733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7252389.jsonl b/edge/graph_7252389.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7252621.jsonl b/edge/graph_7252621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d9c65ea83d2f69376baf586d38656d5b2404c81 --- /dev/null +++ b/edge/graph_7252621.jsonl @@ -0,0 +1,6 @@ +{"10693852|6746689": [", the 8-connectivity does not change before and after the thinning process for the road segments) and the 4-connectivity of the background [7]."]} +{"10693852|1805048": []} +{"5685918|17024419": ["cation tracking is increasingly important for transport, ecology, and wearable computing. In particular, long-term tracking of spatially spread assets, such as wildlife [1], augmented reality glasses [2], or bicycles [3] provides high resolution trajectory information for better management and services. For smaller moving entities, such as \ufb02ying foxes [4] or pigeons [5], the size and weight of tracki"]} +{"17379833|1142636": ["Web ontology language (OWL) 1 is a well-known standard that originated from the semantic web and it is a W3C recommendation.", "Improving the users\u2019 interpretation of discovered patterns has been mainly focused in the literature on the semantic annotation for the Web [41,48]."]} +{"7774754|5755403": []} +{"3329660|6746689": ["Second, we obtain the skeleton of the road networks by performing a thinning operation based on the algorithm proposed in [9], as depicted in Figure 3(c)."]} diff --git a/edge/graph_7253688.jsonl b/edge/graph_7253688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ff4ac892ac24e2aa94edabb4239e860b810a8a8f --- /dev/null +++ b/edge/graph_7253688.jsonl @@ -0,0 +1 @@ +{"1717919|239537": []} diff --git a/edge/graph_7257659.jsonl b/edge/graph_7257659.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c222a41864721399127c92defa02a9b5368be3e --- /dev/null +++ b/edge/graph_7257659.jsonl @@ -0,0 +1,3 @@ +{"5683354|14970359": ["(2) Dual Xeon PC w/ RAID array Optical motion capture"]} +{"41559587|56144874": ["The perception of velocity is known to impose costs of increased time delays in the range of 30\u2013200 ms [5, 70, 71].", "Manual Control Considerations Basic observations regarding adaptation and gain compensation by human subjects, as well as preferred optimum gain settings, are reported in [3, 5, 27]."]} +{"10572365|2113024": ["Surveys of pedestrian detection research are presented in [27], [36]."]} diff --git a/edge/graph_7258436.jsonl b/edge/graph_7258436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7260566.jsonl b/edge/graph_7260566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23bc26244f0b8e36d2b57f8f0b29cb8c08b42731 --- /dev/null +++ b/edge/graph_7260566.jsonl @@ -0,0 +1,5 @@ +{"206167145|8150108": []} +{"37082675|10791083": ["The output signal from the acoustic detector may be expressed as [22], [50]", "A normalized NEA (NNEA) measured in cm\u22121W/Hz1/2 can then be defined, which represents the value of NEA normalized to 1 Hz measurement bandwidth and 1 W laser power [50]."]} +{"98591154|15589021": []} +{"56037452|9553820": []} +{"1617334|8150108": ["Fiber Bragg grating (FBG) is one of the most important photonic devices in fiber optic communication and sensing [10\u201312]."]} diff --git a/edge/graph_7271501.jsonl b/edge/graph_7271501.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c36aa941e43e5b6e7ad78f628af57d7adbc15f2 --- /dev/null +++ b/edge/graph_7271501.jsonl @@ -0,0 +1,7 @@ +{"195702013|6607209": ["The proposed scheme, which is based on Petri-Net Plans (PNPs) and Finite State Machines (FSM), can be adapted to various robot domains, optionally in conjunction with other coordination methods, such as marketbased methods [2] and auction-based coordination [5].", "Auction-based coordination [2, 5] borrows methods and techniques from economics (auctions, trading) and applies them to agent problems."]} +{"61299428|6607209": []} +{"3894022|1708582": []} +{"110361521|6607209": ["Dias et al. [14, 15 ] first use the concept of market based for multiple robots that cooperate for achieving a common goal."]} +{"14180135|18357056": ["A survey of the current state-of-the-art patrolling algorithms is provided in [14]."]} +{"14180135|6607209": ["Finally, due to the market-based nature of the developed algorithm, task negotiation can be terminated at any time and still provide a reasonable solution [19]."]} +{"114798163|16525678": ["Example in the literature can be found in [118], [5], [89]."]} diff --git a/edge/graph_7273199.jsonl b/edge/graph_7273199.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af1ceb35901a081f85e173956d3f00a56c6093e2 --- /dev/null +++ b/edge/graph_7273199.jsonl @@ -0,0 +1 @@ +{"14507926|14441987": ["\u2026holes in terms of throughput and packet losses, and (2) our solution proposed in [9] presents good performance in terms of better throughput rate and minimum packet loss percentage over other solutions, and (3) our solution proposed in [9] can accurately prevent the cooperative black hole attacks."]} diff --git a/edge/graph_7278743.jsonl b/edge/graph_7278743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7282632.jsonl b/edge/graph_7282632.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7286919.jsonl b/edge/graph_7286919.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dcbed500c12f669624d7400acf4dea4577fc88cf --- /dev/null +++ b/edge/graph_7286919.jsonl @@ -0,0 +1,5 @@ +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} +{"29617882|15164501": ["We refer to an extensive literature review on culture in IS research in which Leidner and Keyworth (2006) differentiate the following relations between the concepts culture and IT: the impact of culture on IT, the impact of IT on culture, and IT culture.", "Therefore, we analyzed all papers mentioning or elaborating on culture with regard to the following two dimensions derived from extant research on culture and particularly from culture research in the IS discipline (Leidner and Keyworth, 2006).", "In their research on culture in IS, Leidner and Keyworth (2006) recognize the differences between a national, organizational, and subgroup level of culture and suggest a holistic understanding of culture based on its manifestation.", "As we had assumed based on existing research on culture in IS, there are papers that reference a BPM culture."]} +{"61166586|239537": ["The goal of visualization algorithms is to layout nodelink diagrams as fast and effectively as possible (Eick, 1996; Herman et al., 2000)."]} diff --git a/edge/graph_7287857.jsonl b/edge/graph_7287857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7291977.jsonl b/edge/graph_7291977.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c4f0e065d8912a0338874435743bdba6d7c36ff --- /dev/null +++ b/edge/graph_7291977.jsonl @@ -0,0 +1,19 @@ +{"11384913|5184436": ["For correct \nOLAP analysis, multidimensional models should be checked."]} +{"18189491|10500613": []} +{"46536854|2685137": []} +{"665720|10500613": []} +{"14450020|1142636": []} +{"37908259|10500613": ["This is accomplished by combining string matching techniques [32], such as the edit distance or q-gram similarity [7], with structure-based schema matching techniques to exploit the structure of the elements [27]."]} +{"8262693|10500613": []} +{"46651150|8125630": ["[ 10 ]). The star schema consists of a fact table and several dimension tables."]} +{"10137603|8125630": ["The interested reader can find an overview of DWs, OLAP, and multidimensional databases in [38] and [39]."]} +{"15450397|1574374": ["Keywords: Data warehousing; Schema versioning; Cross-version querying; Schema augmentation"]} +{"10470287|386036": ["For the first phase of the KDD process there are some proposals that address the problem of data quality from the point of view of cleaning data: (i) for duplicates detection and elimination [5, 1], entity identification under different labels [14], etc."]} +{"269647|12860838": ["Concerning the ontology mappings, despite the large number of semi-automatic approaches that exist to generate them (see surveys presented in ( Choi et al., 2006, Euzenat, 2007), current precision results are not good enough to make the automatic transformations proposed in this paper reliable."]} +{"10934695|10500613": [", through automatic schema matching techniques [11, 12]) by the administrator through processes ranging from oral communication with the administrators of the corresponding data stores to study of the elements\u2019 comments and/or accompanying documentation.", "Several approaches toward the facilitation of the automatic schema matching have already been proposed [11, 12]."]} +{"10934695|913718": ["Our approach has some commonalities with approaches for semantic schema matching [12, 42], which take as input two graph-like structures and produce a mapping between the nodes of these graphs that correspond semantically to each other.", ", through automatic schema matching techniques [11, 12]) by the administrator through processes ranging from oral communication with the administrators of the corresponding data stores to study of the elements\u2019 comments and/or accompanying documentation.", "Several approaches toward the facilitation of the automatic schema matching have already been proposed [11, 12]."]} +{"14835281|5184436": ["Complete information is especially important for Data Warehousing since it is a prerequisite for correct aggregation results (for an in-depth treatment on summarizability, see [7] and [10])."]} +{"2564186|7216558": ["This de\ufb01ciency has been recognized in the Semantic Web community, and a number of approaches for the representation, reasoning, and querying of validity time were developed [22, 23, 24, 25, 26, 27, 28, 29]; we discuss various aspects of these approaches in Section 7.", "There are numerous proposals in the literature for extending description logics with validity time; Artale and Franconi [26] and Lutz et al. [27] presented comprehensive surveys of the relevant results."]} +{"11978242|1413177": ["For a detailed related work on multidimensional design methods (and the benefits and main contributions of AMDO regarding other approaches) we address the reader to [27, 26].", "However, most of them must be carried out manually since they present a step-by-step guide to be followed by a data warehousing expert (see [27] for further details)."]} +{"16996407|2685137": ["Data structures can roughly be grouped into ROLAP, using relational tables and star or snowflake schemas, and MOLAP, using multidimensional arrays for directly storing and querying of data cubes [23, 2, 10, 15]."]} +{"16996407|8125630": ["Data structures can roughly be grouped into ROLAP, using relational tables and star or snowflake schemas, and MOLAP, using multidimensional arrays for directly storing and querying of data cubes [23, 2, 10, 15].", "Online Analytical Processing (OLAP) operations on data cubes for viewing statistics from different angles and granularities, filtering for specific features, and comparing aggregated measures fulfil this information seeking mantra and provide interfaces for decision-support from statistics [5, 2, 19]."]} diff --git a/edge/graph_7306130.jsonl b/edge/graph_7306130.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0177bbfad950a0fe07cb9eb20c0ead60de88d5ea --- /dev/null +++ b/edge/graph_7306130.jsonl @@ -0,0 +1,7 @@ +{"25035416|7854020": []} +{"1266108|1708582": []} +{"16054546|469744": ["Wearable and ubiquitous computing [7, 41, 43, 44], Internet-of-Things [46, 47, 45], augmented reality [48, 49] and other advanced technologies aim to seamlessly merge the everyday physical world and digital computing."]} +{"40612101|20905429": ["The number of patents, papers, and device proposals during the last years is commensurate with the predicted growth of the domain [3], [4], yet several difficulties remain, especially related to the medical applicability [5-8]."]} +{"7712637|7185733": ["Delays that surpass real-time are considered unacceptable [12]."]} +{"14498546|7185733": []} +{"37496295|20905429": ["Recently, several wearable systems have been proposed for application from health monitoring to human-machine interfaces and wearable computers, for example [1-4].", "Some of the issues reported in [2] and [3] also apply to the system presented in this paper."]} diff --git a/edge/graph_7308363.jsonl b/edge/graph_7308363.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6c63b1072791c9d1deb3bd6d1a8d124a67dc8bb --- /dev/null +++ b/edge/graph_7308363.jsonl @@ -0,0 +1,2 @@ +{"6223213|10500613": ["\u226580% match. Other structural matching techniques for graphs [11, 12 ] can also be applied if precise ranking of partial matching variants is required."]} +{"59645750|8813834": []} diff --git a/edge/graph_7320605.jsonl b/edge/graph_7320605.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71a556255c927c53111036e1f060cc6342d2ad12 --- /dev/null +++ b/edge/graph_7320605.jsonl @@ -0,0 +1,41 @@ +{"18755089|1230643": ["Wireless sensor networks (WSNs) have been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics [1]."]} +{"3245281|1230643": ["They consist of large numbers of autonomous, interconnected sensory nodes (sensors), which continuously sense and store attributes of locally occurring phenomena, [12] and can be deployed on a large scale in resource-limited and harsh environments such as seismic zones, ecological contamination sites, or battlefields [2].", "of transmission is proportional to the distance between sensors [2]."]} +{"30363797|1230643": []} +{"206502845|1230643": []} +{"36834157|1230643": ["As sensor nodes are generally battery-operated, to design a good MAC protocol for WSNs, the first attribute that has to be considered is energy consumption [1]."]} +{"10039259|1230643": ["Since nodes can cooperate to transmit data, multi-hop communication in sensor networks is expected to consume less power than the traditional single-hop communication [1]."]} +{"17589061|1230643": ["As mentioned in [7] , the positioning facility is included in each smart node."]} +{"17433451|1230643": ["Therefore, energy-aware mechanisms are required, so as to ensure a long-lasting operation without the need for battery replacement [2]."]} +{"30219131|1230643": ["ollaboration of large number of tiny sensor nodes, each consists of sensing, data processing, and communicating components [1], have introduced Wireless sensor networks (WSN) as the secure means of gathering and processing information."]} +{"206256778|3330313": ["Moreover, an anomaly in a dataset is defined as an observation that appears to be inconsistent with the remainder of the dataset (Hodge and Justin, 2004)."]} +{"26884963|1236072": ["In such multi-hop networks, where nodes have knowledge of their location relative to one another, even if not exact, greedy geographic routing is an effective technique to autonomously and efficiently route packets through the network [1].", "In WSNs, especially those of larger scale, employing hundreds or thousands of sensors (nodes), information exchange between sensors separated by distances exceeding radio range requires packets to be routed through a chain of relays towards a destination [1]."]} +{"19540320|1230643": []} +{"12382275|1230643": ["However, the main issue for a WSN is so far to minimize the energy consumption rather than to maximize throughput and to minimize delay [1]."]} +{"29904041|1230643": ["Although wireless sensor networks share similarities with ad hoc wireless networks, several important distinctions can be drawn between the two [3], [13]."]} +{"10186907|1230643": ["Moreover, controlling the transmission of sensor nodes has also been investigated in the application layer in terms of topology control [2]."]} +{"38962153|1230643": []} +{"12868435|1230643": ["Since nodes can cooperate with each other to transmit data, multi-hop communication in sensor networks is expected to consume less power than the traditional single-hop communication [1]."]} +{"6438719|14441987": []} +{"15495596|1230643": ["Wireless sensor networks are gaining popularity due to their potential to be useful for a wide range of applications including environmental monitoring, intrusion detection, and various military and civilian applications [1].", "Note that the improvement in network lifetime is more with the proposed algorithm because of the power allocation strategy used in the proposed Algorithm 1.", "We assume that all channel gains follow Rayleigh distributions with all channel coefficients normalized so that \ud835\udd3c { \u210e2 } = 1."]} +{"7981669|1236072": ["Besides the random selection, parent selection can be done based on some criteria [1] such as shortest distance or link quality."]} +{"7594902|1230643": ["The energy cost of transmission is proportional to the distance between sensors [ 1 ] .W e abstract the ij transmission link cost metric by cij40 (cij \u00bc N if si and sj do not belong to the same neighborhood group).", "A good choice of nexthop nodes is critical for energy-efficiency, since nodes consume transmission power proportional to physical distance to the selected next-hop neighbor [ 1 ].", "Equipped with compact energy-efficient operating systems, these devices (self-) organize to form distributed sensor networks that are capable of sensing and in situ processing of spatial as well as temporally dense data over the deployment zone [ 1 ]."]} +{"31732582|17109970": ["In WSNs (Wireless Sensor Networks), since great importance is attached to the resource-constrained feature, power control should be performed in the direction of enhancing power efficiency, i.e., it is more important to maximize the number of bits that can be transmitted per Watt of power consumed rather than to maximize the throughput [ 1 ]."]} +{"18774970|1230643": ["Usually sensor networks consist of large number of communication nodes, do not have global identi\ufb01cation number, and could face easy node failure [4].", "Sensor networks are very limited in local memory and calculation capacity [4], and so security mechanism for sensor networks can not require each sensor node to store long-sized key to run very complex cryptol-ogy protocols."]} +{"1756215|1940388": []} +{"1756215|17205659": []} +{"10288448|1230643": ["Wireless sensor networks can be used in a medical context in order to monitor patients[3]."]} +{"2959391|1230643": ["Another unique feature of sensor networks is the cooperative effort of sensor nodes [1]."]} +{"15800143|1230643": []} +{"7058206|1230643": []} +{"14090213|1236072": ["A Game Theory Approach for Optimal Routing in Wireless Sensor Networks\nBabak Arisian Department of Industrial Engineering\nSharif University of Technology Tehran, Iran\nb_arisian@alum.sharif.edu\nKourosh Eshghi Department of Industrial Engineering\nSharif University of Technology Tehran, Iran\neshghi@sharif.edu\nIn this paper, a \u201cGame Theory\u201d approach for finding an optimal path in a \u201cWireless Sensor Network\u201d is discussed.", "\u2026of Industrial Engineering\nSharif University of Technology Tehran, Iran\nb_arisian@alum.sharif.edu\nKourosh Eshghi Department of Industrial Engineering\nSharif University of Technology Tehran, Iran\neshghi@sharif.edu\nIn this paper, a \u201cGame Theory\u201d approach for finding an optimal path in a \u201cWireless\u2026"]} +{"21717887|16514036": []} +{"5182800|1230643": ["Their application include military, factory instrumentation, climate control, environmental monitoring, and building safety [1, 2]."]} +{"8278159|1230643": [", freight transport, traffic monitoring), or monitoring the state of buildings [1]."]} +{"2527378|1236072": ["While the majority of the existing work [ 2-6 ] adopt a conventional approach to solve the data aggregation and routing problems in WSNs, this paper proposes an interdisciplinary approach where game theory is utilized to tackle these challenges."]} +{"906860|205286988": []} +{"39443922|1230643": ["Sensor networks can be used for variety of applications such as military, emergency sites, smart homes, health and commercial areas [1]."]} +{"8362859|1230643": ["Power specifications for these functions are given in Table II, as derived from various sources, including the Crossbow Inc. MICAz mote, and [ 11 ], [12]."]} +{"5841787|17109970": ["A game consists of three components: a set of players, the strategy set for each player and a payoff (utility) function for each player measuring the degree of satisfaction of the player [10]."]} +{"52854618|1230643": ["As sensor nodes are generally battery-operated, to design a good MAC protocol for WSNs, the first attribute that has to be considered is energy consumption [1]."]} +{"11217133|1230643": ["1 For a survey on sensor network applications see [1].", "A survey of sensor networks can be found in [1]."]} +{"2466265|2835258": ["[13], [14] presents a good survey of such protocols.", "LocalHeur lies within the class of location based routing methods [9], [13] , [14], [7] with particular similarity to the Nearest Forward Progress (NFP) algorithm [7] though from the perspective of game-theoretic reverse multicast routing.", "Location-aware protocols [9] or position based protocols [13] are protocols proposed for mobile ad-hoc networks and sensor networks where location information helps a node in adjusting its transmit power according to the position of its neighbors."]} diff --git a/edge/graph_7329149.jsonl b/edge/graph_7329149.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50da9b12bd5cfebafd20f3d5ed1c21dd1c270ca1 --- /dev/null +++ b/edge/graph_7329149.jsonl @@ -0,0 +1,29 @@ +{"13110346|3348390": ["Additionally, users may need to discover additional context information [2].", "Context-awareness is a critical functionality that needs to be embedded into IoT middleware solutions [2].", "Even today, sensors are used in many domains such as agriculture, environmental monitoring [2]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"11606516|4631990": ["This mainstream idea has been pursued, testing more and more pervasive, noninvasive, and low-cost technologies [6], [32], capable of inferring the user behavior, while avoiding the installation of cameras or microphones."]} +{"11606516|1230643": ["Moreover, it has to be noticed that the most diffused wireless architecture is represented by the wireless sensor network (WSN) technology [42]\u2013[44]."]} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"205287824|7601289": ["\u2026dynamism in the network (as smart objects can move and create ad hoc connections with nearby ones following unpredictable patterns), the quest for inclusion of self-management and autonomic capabilities is expected to become a major driver in the development of a set of enabling solutions [13,14]."]} +{"205287824|1113420": ["A number of research efforts for building self-adaptive situated services have been undertaken in the last few years [37\u201342]."]} +{"205287824|1230643": []} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} +{"13900209|3348390": ["The data may not have much meaningful value unless people find an effective way to analyze and understand it [62]."]} +{"16625679|485843": ["In recent years, due to the growing interest in Smart Grid technologies [6] and in reducing energy consumption via Demand Side Management [7], the MASmodel has been proposed also for grid-based automation systems [8] and building energy management systems (BEMS).", "An agent-based BEMS typically supports active load management techniques [9] and exploits smart metering via energy-efficient network protocols [6], [10]."]} +{"16625679|4631990": ["An agent-based BEMS typically supports active load management techniques [9] and exploits smart metering via energy-efficient network protocols [6], [10]."]} +{"1780949|4631990": ["A comprehensive overview of communication protocols in building automation can be found in [1], which also introduces different BAS products and other discussions on building automation."]} +{"14897482|11720829": ["Recent multiple-input, multiple-output (MIMO) techniques [143], [144] like the upcoming IEEE 802."]} +{"14897482|1387401": ["In realistic environments the wireless channel suffers from phenomena like path loss and shadowing, multipath propagation and thermal noise [132]\u2013[134]."]} +{"14897482|1230643": ["Wireless sensor networks (WSN) [55], [56], [30], [57], [58], [59], [60] consist of a large number of small, energy- and resource-constrained sensor nodes."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"485843|4631990": ["The fundamental task of the HEM system is energy efficiency [11], data measurement, and transmission."]} +{"485843|6959212": ["From a slightly different perspective, a \u201csmart grid\u201d can be considered as a data communication network that achieves, with the support of specific power management hardware devices, flexible, seamless inter-operation abilities among different advanced components of the system for efficient utilization of the energy [12]."]} +{"485843|121289": ["values for power system control signals should not exceed 15 ms [44].", "TABLE I REQUIREMENTS OF SG APPLICATIONS [44], [60]"]} diff --git a/edge/graph_7331265.jsonl b/edge/graph_7331265.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..254c915d3dc8f853baf40e46cacb62569f5abac1 --- /dev/null +++ b/edge/graph_7331265.jsonl @@ -0,0 +1 @@ +{"4700370|14441987": []} diff --git a/edge/graph_7338688.jsonl b/edge/graph_7338688.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73464353.jsonl b/edge/graph_73464353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73470290.jsonl b/edge/graph_73470290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5af07ef334e245bf671078e2733fd78fd99e5894 --- /dev/null +++ b/edge/graph_73470290.jsonl @@ -0,0 +1,38 @@ +{"27587845|3054454": []} +{"3259841|1230643": ["Dramatic advances in RF and MEMS IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [1]\u2013[5]."]} +{"15367223|1230643": ["W IRELESS sensor networks (WSN) have attracted considerable attention due to the large number of applications, such as environmental monitoring, weather forecasts [1]\u2013[3], surveillance, health care, and home automation [3], [4].", "The FC collects these observations and fuses them in order to reconstruct the signal of interest, based on which effective actions are made [4]."]} +{"18761676|3348390": ["Context awareness may provide a great support to process and store the Big Data, and to make their interpretation easier [330]."]} +{"18761676|16209841": ["To ensure security of data, services and entire IoT system, a series of properties, such as confidentiality, integrity, authentication, authorization, non-repudiation, availability, and privacy, must be guaranteed [228,229]."]} +{"18761676|270804": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"18761676|205286988": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"12841589|164835": []} +{"29872125|17325804": ["The substitute method is to estimate the distance of unknown node to reference node from some sets of measuring units using the attenuation of emitted signal strength [3, 12]."]} +{"29872125|206583375": ["ToA is the most accurate technique used in indoor environment which can filter out multi-path effects [4].", "IR signals have some limitations for location determination, like interference from fluorescent light and sunlight [4].", "Unfortunately, GPS does not perform well in urban canyons, close to walls, buildings, trees, indoors, and in underground environments as the signal from the GPS satellites is too weak to come across most buildings thus making GPS ineffective for indoor localization [4]."]} +{"11382317|164835": []} +{"8816293|13372227": []} +{"8816293|3054454": ["Parameter estimation has received a significant amount of attention over the last several decades, because of its widespread applications and the difficulty of obtaining the optimum estimator [20]."]} +{"9177645|1230643": ["TASK [2] is a set of WSN software and tools, designed at Berkeley, that has been used for outdoor deployments, for instance during the Macroscope experiments [3].", "In the next section, we describe the requirements of environmental monitoring and their consequences for WSN design.", "The SensorScope project1 is a collaborative effort of environmental and computer science researchers to build a WSN-based measurement system, with the ability to immediately transmit gathered data to a distant server.", "Various aspects of WSNs have indeed been studied over the past few years (e.g., synchronization, energy efficiency), but most of these studies are of theoretical nature and may not apply, depending of the considered application.", "An autonomous set of such nodes is called a wireless sensor network (WSN) [1]."]} +{"18407461|10817088": ["A recent survey on ambient intelligence in health care [1] illustrates the wide range of applications that could be supported by a cm-accuracy indoor positioning system alone: activity recognition, behavioral pattern discovery, anomaly detection, and decision support methods can all be based on such a sensor modality.", "60 IEEE SIgnal ProcESSIng MagazInE | March 2016 | before/during/after meals) or as an orthotic and rehabilitation tool for individuals suffering from cognitive decline, geofencing for people with dementia, and even as a navigation aid for visually impaired (see [1] and the references therein)."]} +{"52193975|17325804": []} +{"705968|2835258": ["In addition, location-based routing protocols can save significant energy by eliminating the need for route discovery [25, 26, 32] and improve caching behavior for applications where requests may be location dependent [28]."]} +{"19552313|10299098": ["The choice of the right service model is application and environment-depending, and may also depend on the level of context-awareness of the involved devices [33].", "nodes is a still challenging research issue [33]\u2013[35].", "Under this perspective, the FC paradigm differs from the related Mobile Edge Computing (MEC) one [7], [8], [33], [34], in which only edge nodes are employed for the device augmentation."]} +{"19552313|32360363": ["The final goal is the \u2018\u2018smart\u2019\u2019 management of the overall city asset [98]."]} +{"19552313|3330461": ["However, due to the multi-hop nature of the Internet backbone and the short-range capability of the network technologies currently envisioned for the support of inter-device communication [25], [26], guaranteeing reliable network connections is a challenging task in the envisioned IoE realm [27], [28].", "However, these (positive) attributes are counterbalanced by the fact that: (i) FNs are small-size data centers with reduced fault-tolerance capability; and (ii) the Device-Fog communication typically relies on short-range WiFi/UWB/\nVOLUME 5, 2017 9887\nBluetooth-based connections that are intermittent, interferenceaffected and failure-prone [58]\u2013[60].", "11/15 transmission technologies, like WiFi, UWB and Bluetooth [25], [126].", "However, in this case, the resulting perconnection round-trip-time RTT becomes quite sensitive on the corresponding (generally, time-varying) inter-vehicle distance d (m) and tends to scale up/down proportionally to it, that is [25], [137], [135]:", "Since the IoE devices could be randomly distributed over the SG, it is expected that theNetwork layer relies on short/mediumrange wireless transmission technologies, like WiFi, UWB and/or Bluetooth [26];\n(iii) the Fog layer is responsible for the management of the massive volume of metered data.", "However, we note that [25]: (i) due to fading and path-loss, the energy consumption of D2D links increases with the inter-thing distance in an (at least) cubic way; (ii) due to thing mobility, D2D mobile links are intermittent, and their average failure rates typically increase with the average thing speeds [131]; and, (iii) under the D2D model, the initiator thing needs, at first, to discover proximate things, and, then, must perform task distribution, thing synchronization and task retrieval.", "For this purpose, the cooperating devices build up D2D links, that typically rely on short-range wireless communication technology, like UWB, WiFi or Bluetooth [25], [26].", "9 will rely on short/medium-range wireless networking technologies, like WiFi, UWB and/or Bluetooth [26]; (iii) thank to the virtualization of the underlying manufacturing things, it is expected that the Fog layer of Fig.", "It operates under the same vehicular scenario previously described for the V-FoE test-bed, but, according to [25], [137], it utilizes only \u201cad-hoc\u201d D2D IEEE802.", "For this purpose, the cooperating devices build up D2D links, that typically rely on shortrange wireless communication technology, like UWB, WiFi or Bluetooth [25], [26]."]} +{"19552313|18037424": ["The underlying networking infrastructure acts as glue: it allows the SG to perform remote metering by (possibly) exploiting the support of smart Energy Storage Devices [95], [96]."]} +{"21897697|17325804": ["In fact, other ranging techniques like Time of Arrival (ToA) and Angle of Arrival (AoA) [2] or a combination of the two [6] can be significantly more precise: for instance, a ToA approach (\u201ctwo-way ranging\u201d) has been chosen as standard ranging procedure for the Ultra-Wide Band (UWB) PHY in IEEE 802."]} +{"49193836|8323234": ["The M3-MIMO channel model can be derived from standard massive MIMO channel models used in lower frequency bands [26], [27].", "This is because, as will be explained in Section V, numerical simulations have clearly shown that the impact of the quantization error on the performance of proposed algorithms is negligible, and thus the grid quantization error can be conveniently neglected [27], [33]."]} +{"1796185|2835258": ["\u2026\nHeemin Park and Mani B. Srivastava Networked and Embedded Systems Lab Electrical Engineering Department \nUniversity of California, Los Angeles {asavvide,hmpark,mbs}@ee.ucla.edu ABSTRACT The recent advances \nin MEMS, embedded systems and wire\u00adless communication technologies are making the\u2026"]} +{"11281552|11732290": []} +{"34475475|164835": []} +{"14713786|164835": ["Cell phone radio-location services such as E911 commonly employ TDOA and are centralized, absolute, and noncooperative [ 78 ], [79]."]} +{"14457889|164835": ["Here, we propose a network-based localization system similar to [14] (for cellular systems) or [15] (for sensor networks)."]} +{"9411680|26429034": ["These considerations apply to mobile network subscribers and their communication habits as well, as highlighted in a recent, extensive survey of mobile traffic data analyses [2]."]} +{"14460960|206583375": []} +{"3013154|3054454": ["It is worth mentioning that previous published work used intra-cluster subpaths to successfully model the indoor multipath channel [86], [87], [89]."]} +{"16110787|17325804": []} +{"16935329|6396569": []} +{"12475938|2497115": ["Compared to the existing radio positioning approaches, namely enhanced observed time difference (E-OTD) [5], [6], uplink-time difference of arrival (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] or WiFi fingerprinting [9] based solutions in which the accuracy is typically in the order of 3-5 meters at best, the positioning accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10].", "Compared to the existing radi o positioning approaches, namely enhanced observed time dif ference (E-OTD) [5], [6], uplink-time difference of arriva l (UTDoA) [5], observed time difference of arrival (OTDoA) [7], which all yield positioning accuracy in the range of few tens of meters, as well as to global positioning system (GPS) [8] o r WiFi fingerprinting [9] based solutions in which the accurac y is typically in the order of 3-5 meters at best, the positioni ng accuracy of 5G networks is expected to be in the order of one meter or even below [3], [4], [10]."]} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"67865645|8323234": ["At epoch k, the received signal at the UE depends on the mmWave propagation channel [12], of the form Hk(t) = \u2211Lk\u22121 l=0 hl,kaUE(\u03b8l,k)a H BS(\u03c6l,k)\u03b4(t\u2212 \u03c4l,k), where Lk is the number of resolvable propagation paths, hl,k is a complex channel gain, aUE(\u00b7) and aBS(\u00b7) are the antenna response vectors, and \u03c4l,k, \u03b8l,k, and \u03c6l,k denote the TOA, DOA and DOD, respectively.", "From the observation (2), several techniques exist to recover the triplet of TOA, DOA, and DOD, such as based on sparse recovery [6] or subspace methods [12], which achieve a good balance between estimation accuracy and computational complexity."]} diff --git a/edge/graph_73470859.jsonl b/edge/graph_73470859.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e08b7989bb693610195e22ffc06f98f01642cda0 --- /dev/null +++ b/edge/graph_73470859.jsonl @@ -0,0 +1,5 @@ +{"7731650|7185733": ["INTRODUCTION Based on optical cameras and image-processing algorithms, human gesture recognition for advanced human-machine interface has been extensively studied in the area of computer science [1]."]} +{"20712275|15453366": ["propagation channels, antenna technology, transceiver integration, and digital signal processing [17].", "less otherwise specified, the parameters in (1) are dB [17], dB [33], dBm at a standard temperature 17 , GHz, dB (a reasonable assumption based on Table III for Si technologies), dB,"]} +{"111163614|164835": []} +{"12310463|1634674": ["Currently, the approaches employed to sense the activities could be majorly classified into three categories [10], [11], detailed as 1) computer vision-based method: real-time movements of subjects are detected by videos; 2) acoustic and ambient sensor-based method: the frequency component of vibration produced by the fall is processed to detect a fall; 3) wearable sensor-based method: kinematic or electrophysiological signal sensors, such as surface electromyography (SEMG) sensors, are utilized to detect daily activities [6], [12]\u2013[14]."]} +{"18227642|7185733": ["HUMAN hand gesture recognition (HGR) is originally a topic in the area of computer science, aiming at interpreting hand gestures based on cameras and computer vision algorithms [1]\u2013[5]."]} diff --git a/edge/graph_73472318.jsonl b/edge/graph_73472318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73474329.jsonl b/edge/graph_73474329.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24f6a675c1e1dfe184a92606e6323bd8032e97c8 --- /dev/null +++ b/edge/graph_73474329.jsonl @@ -0,0 +1,2 @@ +{"3623649|191396": ["The points in the spectral power map can be gathered using any clustering technique so we selected the k-means iterative algorithm [20] in the following applications since it is arguably one of the most broadly known clustering algorithms."]} +{"49582414|15501047": []} diff --git a/edge/graph_73478387.jsonl b/edge/graph_73478387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9958724d18fb3deab8cf5f5fa95f59373df3c8ae --- /dev/null +++ b/edge/graph_73478387.jsonl @@ -0,0 +1,6 @@ +{"137158060|9770908": []} +{"6451442|13765327": []} +{"26011162|10861421": []} +{"40745502|10861421": ["J Diabetes Sci Technol 2012;6(1):1\u20134 Journal of Diabetes Science and Technology"]} +{"13690141|10921965": []} +{"23632688|10861421": []} diff --git a/edge/graph_73480838.jsonl b/edge/graph_73480838.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1af5d0e8577b838997d586826910a161f47b6956 --- /dev/null +++ b/edge/graph_73480838.jsonl @@ -0,0 +1,3 @@ +{"49189687|6078908": ["Using the covariance matrix and its eigenvalues and eigenvectors, PCA finds the principal components in data which are uncorrelated eigenvectors, each representing some proportion of variance in the data [34]."]} +{"5276358|393948": ["The third class of algorithms and more related to our paper is unsupervised learning of visual representations from the pixels themselves using deep learning approaches [21, 26, 44, 39, 29, 47, 9, 33, 2, 49, 8]."]} +{"60248445|11894197": ["Embedded Models embedding feature selection with classifier construction, have the advantages of (1) wrapper models they include the interaction with the classification model and (2) filter models - they are far less computationally intensive than wrapper methods [40, 57, 46]."]} diff --git a/edge/graph_73483767.jsonl b/edge/graph_73483767.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fb803912646823d99209db945c30011867ea68a --- /dev/null +++ b/edge/graph_73483767.jsonl @@ -0,0 +1,48 @@ +{"52287480|7158183": ["More current research is based on integrated circuit (IC) design as arbiter PUF, SRAM PUF and ring oscillator PUF [6][7]."]} +{"17309844|5747564": ["2260942 control system to one employing open IP networks [3], a variety of threats has been identified in the SG context, e.", "The AMI will likely employ Internet Protocol version 6 (IPv6) technology in a mesh based topology [4].", "attention in Europe, in North America, wireless mesh networks (WMNs) are a more popular and dominant solution for the AMI [3].", "Gharavi et. al [7] proposed a mesh based architecture for the last mile SG, in which the Neighbourhood Area Network (NAN) supports communications between SMs and AMI headend via data aggregation points and mesh-relay-stations if required.", "This work is focussed on authentication and key management over the AMI.", "The Stauxnet worm is another example that can cause a significant impact even on national security [3].", "The customers side of an SG consists of Home Area Networks (HANs) in customer premises where smart appliances and controllers are connected to smart meters (SMs), which form the end-points of the Advanced Metering Infrastructure (AMI) that provides two-way data communications between SMs and the utilitys Meter Data Management Center.", ": Smart Grid Topology for AMI 2) Step II: SAS performs the following steps upon receiving the packet from SM in Step I: \u2022 SAS lookups values ver & salt associated with SN sm .", "Although power line communication (PLC) has gained much attention in Europe, in North America wireless mesh networks (WMN) is a more popular and dominant solution for the AMI [3].", "We concentrate on data communications over the AMI outside of the HAN domain, which includes an SAS that is charged with supporting the required authentication and key management mechanisms."]} +{"28079113|3348390": ["In order to achieve interconnection, intercommunication, and interoperability between heterogeneous information, the future architecture of the IoT needs to be open, layered, and scalable [21]."]} +{"10614697|3348390": ["Furthermore, by integrating the sensing, communication, and computation capabilities [8], [9], IoT can offer diverse intelligent services [10] to form smart home [11], smart grid [12]\u2013[14], smart community [15], and smart city [16], [17], as shown in Fig."]} +{"10614697|20905429": ["One of the most value-added functionalities of IoT is to sense the environments including the living environment [28] and human body [29]\u2013[31], enabling users to interact with the physical world [32]."]} +{"17087076|6332923": [", the patient\u2019s vitals) must be kept secure from unauthorized users and security threats [19\u201328].", "Based on the above attack model and literature survey [19\u201328] and [31\u201339], this sub-section sketches out the paramount security requirements for healthcare application in WMSNs, as follows:"]} +{"11000825|1230643": ["[14] points out that power consumption of wireless sensor network devices could be divided into three domains: sensing, communication, and data processing."]} +{"192638384|15199849": ["Such exposure raises the possibility that an attacker might capture the device, extract cryptographic secrets, modify their programming, or replace them with malicious device under the control of the attacker [33]."]} +{"25442966|14678574": ["but it may also make the circuit less reproducible and the uniqueness and reliability of the construction can in turn suffer [15].", "Thus, it is now easy for the tag to authenticate with a probability 1/2 by sending a subsequence which is also all zero [15], [20]."]} +{"25442966|3815882": ["First, public helper data are generated: p 1\u20444 Gen\u00f0r\u00de [16]."]} +{"15322868|206459491": ["To \nprevent credentials of one dead IoT device from being reused by another device, credentials need to be \ntied to lifetime."]} +{"17315782|3734874": ["Many countermeasures against SCAs have been proposed in the literature [32] and they can be also adopted to successfully protect FPGA implementations of AES algorithm [33]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"19373382|15199849": []} +{"9666028|17205659": ["Assaults in WSNs don't simply include the bundles' adjustment; enemies can likewise infuse extra false parcels [3]."]} +{"7925174|2457428": []} +{"27643630|2829149": ["In particular, authentication of IoT devices has a particular importance given the variety of attacks which might result from its breach [1].", "IoT platform and scope have evolved gradually along time [1]."]} +{"7351687|7357277": []} +{"7351687|2357830": []} +{"54460884|15300368": ["The fundamental impediment focuses are as per the following [3]: 1."]} +{"62520988|1940388": []} +{"62520988|1331167": ["In order to use WSNs in real world applications, these unique characteristics must be carefully addressed during the protocol design [5,6]."]} +{"14094808|7465328": ["An autonomous wireless connection among vehicles imposes serious security threats such as eavesdropping [75], identity spoofing [14, 74], sybil attack [58], wormhole attack [63], replay attack [96], message content tampering [11], impersonation [6], denial of service attack (DoS) [2] and MitM attack [43]."]} +{"14094808|763939": ["In the very near future, vehicles will interact with several other vehicles to coordinate actions [31] and to provide heterogenous media services [107]."]} +{"16205974|206584087": ["There have been various classifications of DDoS attacks in the literature [1-6], however the focus of this paper 2016 Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech) Stellenbosch, South Africa"]} +{"12655150|2457428": ["The group key upgrade of group communication has been widely studied, and it is out of scope for this paper and speci\ufb01c technology can be found in reference [37,38]."]} +{"63750002|1230643": []} +{"205288494|1230643": ["Heterogeneous WSN consists of multiple, simple, low-cost sensor nodes that have limited computational and communicational capabilities and of at least one sink node, also called gateway node (GWN) [28]."]} +{"11053288|2663804": ["(3) Type C [219]: Key-based attacks, data-based attacks, impersonation-based attacks, and physical-based attacks;", "We noted here that we have reviewed some authentication protocols proposed for secure smart grid communications in our survey in [219], namely, the schemes in [236].", "In this subsection, we will review only the works that are not reviewed in the survey [219]."]} +{"11053288|2756896": ["We noted here that we have reviewed some authentication protocols proposed for ad hoc social network (an application of WSN) in our survey in [220].", "(4) Type D [220]: Identity-based attacks, location-based attacks, eavesdropping-based attacks, manipulationbased attack, and service-based attacks.", "In this subsection, we will review only the works that are not reviewed in the survey [220] and the articles published in 2016 related to authentication protocols for IoS."]} +{"11053288|9495329": ["In contrast to previous years, surveys published during 2016 covered new areas, such as SDN and virtualization [91], economic and pricing theory in IoT [80], social Internet of vehicles [125], and data quality [78]."]} +{"11053288|5385031": ["In contrast to previous years, surveys published during 2016 covered new areas, such as SDN and virtualization [91], economic and pricing theory in IoT [80], social Internet of vehicles [125], and data quality [78]."]} +{"11053288|1599458": ["During 2016 over fifteen new survey articles that focused on the IoT concept were published [121, 142, 89, 126, 93, 143, 144, 145, 83, 111, 127, 91, 84, 99, 100, 85, 134, 128].", "Other topics covered from the survey articles were middleware [89], context aware computing [144], applications of IoT in the healthcare industry [91], cognitive radio technology [100], data models [84], mobile crowd sensing strategies [143],the deployment of IoT in smart environments [93] and the main proposed architectures for IoT [111]."]} +{"11053288|1520906": ["Other topics covered from the survey articles were middleware [84], data models [79], mobile crowd sensing strategies [132], the deployment of IoT in smart environments [86], and the main proposed architectures for IoT [103]."]} +{"11053288|44461432": ["Authors in [136] took a step further and based on their survey and analysis proposed a big data mining system for IoT."]} +{"11053288|21386749": ["Two articles focused on IoT-based health care technologies [121, 213], covering new platforms, applications, and security and privacy issues that arise."]} +{"11053288|7329149": [" 102, 103, 104, 105, 106] X [107, 108, 109, 110, 111] X [112] X [113, 114, 102, 96, 115, 97, 116, 117, 118, 119, 120, 121, 122, 13, 123, 124, 125, 126, 127, 128] X [129, 130] X [131, 132, 133, 134] X [6, 101, 102, 107, 135, 5, 97, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145] X [146] X [147, 148] X [108] X Table 3: Year of publication Ref. Year [82] 2009 [6, 113, 114] 2010 [94, 95, 86, 101, 88, 96, 135, 112] 2011 [102, 87, 107, 115, 129, 136, 131] 2012 [103, 5, 97, 104, 1", " the so called Social Internet of Things, a concept that later will raise a lot of attraction and research works. During 2014 and 2015 more than twenty ve new survey articles about IoT were published [146, 108, 117, 147, 109, 118, 92, 110, 119, 137, 106, 138, 120, 122, 133, 139, 140, 13, 141, 123, 90, 124, 125, 148, 130, 98]. Except from articles that discussed general issues regarding IoT [137, 106, 139, 140], e.g. applications, challenges, trends and open issues, other papers focused on specic applications or research"]} +{"11053288|1598350": ["Both articles agree that key management, legislation while authors in [116] take one step further and propose that grouping of the IoT devices and creating the so called intranet of things could help impose security mechanisms more effectively."]} +{"11053288|3348390": [" 115, 97, 116, 117, 118, 119, 120, 121, 122, 13, 123, 124, 125, 126, 127, 128] X [129, 130] X [131, 132, 133, 134] X [6, 101, 102, 107, 135, 5, 97, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145] X [146] X [147, 148] X [108] X Table 3: Year of publication Ref. Year [82] 2009 [6, 113, 114] 2010 [94, 95, 86, 101, 88, 96, 135, 112] 2011 [102, 87, 107, 115, 129, 136, 131] 2012 [103, 5, 97, 104, 116, 105]", " the so called Social Internet of Things, a concept that later will raise a lot of attraction and research works. During 2014 and 2015 more than twenty ve new survey articles about IoT were published [146, 108, 117, 147, 109, 118, 92, 110, 119, 137, 106, 138, 120, 122, 133, 139, 140, 13, 141, 123, 90, 124, 125, 148, 130, 98]. Except from articles that discussed general issues regarding IoT [137, 106, 139, 140], e.g. applications, challenges, trends and open issues, other papers focused on specic applications or research"]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"13223117|20905429": ["They are equipped with medical sensors that are capable of measuring different parameters such as the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels [35]."]} +{"52882934|3628110": []} +{"52882934|7971188": []} +{"3689392|1598350": ["In addition, there are various connectivity mechanisms, ranging from Machine-to-Machine (M2M), Machine-to-Human, and Human-to-Human connectivity [7, 8]."]} +{"3689392|2829149": ["Hackers without any doubt find IoT as an attractive and new promising environment for increasing their unethical actions and developing their network expansion scope [2, 13, 14].", "IoT platform and scope have evolved gradually along time [1,2]."]} +{"28307247|16888186": []} +{"28307247|4395259": ["The choice of action depends on where its instantaneous channel fading gain to the LFC falls between a set of publicly known thresholds f 1; 2; 3g, with (2)More rigorous definitions and examples can be found in [79]\u2013[81] and the extensive references within."]} diff --git a/edge/graph_7349576.jsonl b/edge/graph_7349576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73497737.jsonl b/edge/graph_73497737.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..30894ed835269c3b5dea8625d118fd3f674255a0 --- /dev/null +++ b/edge/graph_73497737.jsonl @@ -0,0 +1,21 @@ +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"14090180|9667820": []} +{"6534170|212644660": ["See Portelas et al. (2020) for a review of other recent curriculum learning methods applied to reinforcement learning scenarios."]} +{"51373|14545307": []} +{"34295603|8760041": []} +{"34295603|7774517": []} +{"34295603|3330313": []} +{"34295603|1452734": ["\u2026learning researchers call \u201cautonomous mental development\u201d (Weng et al. 2001), \u201cepigenetic robotics\u201d (Prince et al. 2001), or \u201cdevelopmental robotics\u201d (Lungarella et al. 2003), approaches aiming to develop analogs of the developmental processes that prepare animals over long time periods for a\u2026", "2001), or \u201cdevelopmental robotics\u201d (Lungarella et al. 2003), approaches aiming to develop analogs of the developmental processes that prepare animals over long time periods for a wide range of later challenges."]} +{"34295603|1708582": []} +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"206596260|393948": ["We interpret the network as a trainable feature extractor, \u03c6 : X \u2192 R, followed by a single classification layer with as many sigmoid output nodes as classes observed so far [3].", "The recent success of (deep) neural networks can in large parts be attributed to their ability to learn not only classifiers but also suitable data representations [3, 21, 25, 36], at least in the standard batch setting."]} +{"49393697|73497737": ["During the past few years we have witnessed a renewed and growing attention to Continuous Learning (CL) [3][24].", "Permuted MNIST [12][20] Rotated MNIST [20] MNIST Split [31] [24] CIFAR-10/100 Split [31] iCIFAR-100 [20] [27] ILSVRC2012 [27] CUB-200 [24] CORe50 [17] In [20], the authors decided to further split the iCIFAR-100 benchmark in 20 different \u201ctasks\u201d containing 5 different classes each."]} +{"3125754|13971270": ["pseudopattern rehearsal (Robins, 1995; French, 1997; Robins, 2004) propose to preserve neural networks\u2019 learnt mappings by arbitrarily sampling random inputs and their corresponding outputs from the neural networks and using them along with new task samples while training.", "Pseudopattern Rehearsal (PPR): A non-generative approach to experience replay (Robins, 2004)."]} +{"19060379|8760041": ["To perform true incremental learning in the aforementioned sense, most approaches perform a local partitioning of the input space and train a separate classification/regression model for each partition [5, 6, 7, 8, 9]."]} +{"53248421|73497737": ["Since real-world data is naturally non-stationary - for example, video may focus on different scenes or objects in adjacent temporal blocks - it is desirable for learning algorithms to operate on non-stationary input distributions without suffering from catastrophic forgetting [2], i."]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"514983|393948": ["\u2026experiences \u2013 in contrast to the relatively dense similarity-based coding scheme thought to operate in the parametric neocortical system (Box 4)[17,38\u201345] \u2013 may be adaptive for some purposes but comes with a cost: it disregards shared structure between experiences, thereby limiting both\u2026"]} +{"707099|1452734": []} +{"8366865|73497737": ["An important open challenge for machine learning in general is the creation of neural systems that can continuously integrate new knowledge and skills without forgetting what they previously learned (Parisi et al., 2018), thus solving the stability-plasticity dilemma."]} +{"8366865|393948": ["Finding appropriate abstractions and representations, just as it was fundamental in the advances in deep learning to represent input spaces and hierarchical features (Bengio et al., 2013; Oquab et al., 2014), can also extend to representations of internal models, learning mechanisms, and genetic encodings, affecting the algorithms\u2019 capabilities of evolving learning abilities.", "Choosing the right level of abstraction and the right representation (Bengio et al., 2013) are themes at the heart of many problems in AI."]} +{"205709668|13093354": ["Similar problems have been considered as Incremental Learning [2], Transfer Learn-\ning [3], and Online Data Mining [4] in the past.", "Similar problems have been considered as Incremental Learning [2], Transfer Learning [3], and Online Data Mining [4] in the past."]} diff --git a/edge/graph_73499144.jsonl b/edge/graph_73499144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab4e37fcdd68d00e02276ed44124be8e57ef9490 --- /dev/null +++ b/edge/graph_73499144.jsonl @@ -0,0 +1,2 @@ +{"3421485|8575576": ["\u2026the workload of the pathologists by \ufb01ltering out obviously benign areas, providing an objective quanti\ufb01cation of the image content to reduce the inter-and intra-observer variations in the diagnoses, and serving as a second reader to provide an additional diagnosis for borderline cases [2]."]} +{"535645|1708582": ["This conundrum is often referred to as the trade-off between exploitation and exploration (e.g., Kaelbling et al. 1996)."]} diff --git a/edge/graph_73499316.jsonl b/edge/graph_73499316.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26b007b4e763150b061d09d03d026b1628abffd1 --- /dev/null +++ b/edge/graph_73499316.jsonl @@ -0,0 +1,2 @@ +{"17231115|28609200": ["Many studies have therefore focused upon these parameters [7], [8]."]} +{"2572825|4061876": ["There are many reported results showing that the complex dielectric constant changes with the presence and fluctuation of blood glucose concentration in the water/glucose system and in humans [7][8]."]} diff --git a/edge/graph_73503740.jsonl b/edge/graph_73503740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24a90bfb0f9a76a6ff809cb09c3d78e2df910933 --- /dev/null +++ b/edge/graph_73503740.jsonl @@ -0,0 +1,44 @@ +{"14691226|12724190": []} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"17051324|14814753": ["Significant advances in understanding human activities in video have been achieved over the past few years [25]."]} +{"46817381|43650377": []} +{"46817381|9959529": ["However, CNN can only exploit limited local temporal information and hence, the researchers have moved towards RNN, which can process temporal data using recurrent connections in hidden layers [148]."]} +{"46817381|10148683": []} +{"46817381|2301292": ["Unimodal systems can be a) vision-based ( e.g. , body movement tracking [5], facial expression recognition [6, 7], gaze detection [8], and gesture recognition [9]), b) audio-based ( e.g. , auditory emotion recognition [10], speaker recognition [11], and speech recognition [12]), or c) based on\u2026"]} +{"46817381|17574321": []} +{"46817381|14970359": ["Granum [36] A survey of vision-based human motion"]} +{"46817381|7185733": ["[34] A survey of hand gesture modelling, analysis,", "geometric features or non-geometric features [34]), (b) texture or pixel value, (c) 3D model-based features [44], and (d) spatial features (e.", "The 3D hand appearance can be approximated using geometric structures like cylinders, spheres, ellipsoids, and hyperrectangles [34].", "A limitation of classical ANN architectures is their inability to handle temporal sequences of features efficiently and effectively [34]."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"18375490|5755403": []} +{"18375490|16525678": ["Valera 05 Intelligent distributed surveillance [187]"]} +{"18375490|17516538": ["Weiming 04 Motion and tracking for surveillance [59]"]} +{"26376251|1634674": []} +{"26376251|14970359": []} +{"26376251|7788290": []} +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"3460479|3540699": ["264 [12], HEVC [44] and etc.", "Motion vector [12] is originally proposed for video coding."]} +{"37413801|14116122": ["\u2026and detection constitute two widely studied problems, mainly due to their numerous applications in domains like gaming [1] , computer vision [2] , animation [3] , surveillance [4] , man-machine interaction [5] , robotics [6] , etc. Till recently, the majority of the relevant research works,\u2026"]} +{"10520659|1634674": []} +{"17565335|5664472": ["[31] 2013 Survey on video-based human activity recognition system in different aspects", "[31] made up an extensive survey on threesome aspects of human activity recognition system, such as core technology (i."]} +{"17565335|16013270": ["[34] 2013 A taxonomy-based survey of video datasets for human action and activity recognition", "[34] discussed about 68 public datasets for video-based activity recognition system."]} +{"17565335|1634674": ["[30] 2008 Machine-based recognition of human activities with consideration of invariance factors", "[30] made a comprehensive survey on machine-based recognition of human activities in real-world environment."]} +{"17565335|7788290": []} +{"18560189|16013270": ["The moving object is detected by taking the difference between two or three consecutive frames and is combined with the figure motion edges [127]. c) Optical flow technique is applied when both camera and humans are in motion, called ego motion [25]."]} +{"18560189|1634674": ["[7] 2008 Higher level of human activity recognition"]} +{"18560189|14415030": ["Evaluation of the segmentation techniques consists of determining whether the regions detected by the algorithms are the actual regions of interest or not according to what is expected in the applications [76]."]} +{"18560189|14970359": ["Silhouette and contour representations are suitable for complex non-rigid shapes [37]."]} +{"18533219|1634674": ["It focuses on identifying a person's action or behavior from a single image."]} +{"18533219|7788290": ["A survey on still image based human action recognition\nGuodong Guo n, Alice Lai Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, United States\na r t i c l e i n f o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become an active research topic in computer vision and pattern recognition.", "\u2026o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become\u2026"]} +{"14602383|8034133": ["tems: mAP increases from 1.7% to 7.4% on MEXaction2 and increases from 15.0% to 19.0% on THUMOS 2014. 1. Introduction Impressive progress has been reported in recent literature for action recognition [42,28,2,3,39,40,24,18,31, 44,13,37]. Besides detecting action in manually trimmed short video, researchers start to develop techniques for detecting actions in untrimmed long videos in the wild. This trend motivates another challenging", " problem and adopt a temporal sliding window approach, where each window is considered as an action candidate subject to classi\ufb01cation [25]. Surveys about action classi\ufb01cation methods can be found in [42,28,2,3]. Recently, two directions lead the state-of-the-art: (1) Wang et al. [39] proposed extracting HOG, HOF, MBH features along dense trajectories, and later on they took camera motion into consideration "]} +{"3993248|12724190": []} +{"3993248|5664472": ["Instead of covering all ideas exhaustively, we direct interested readers to some recent surveys [7], [37], [38], 75"]} +{"3993248|16013270": []} +{"2697895|12358655": ["Therefore, there is a vast literature, including interesting surveys [13 \u2013 19], on human body pose estimation [20 \u2013 24] and activity/action classi \ufb01 cation [25 \u2013 30]."]} +{"2697895|14970359": ["Other systems make use of one or multiple LEDs with software to identify them by their relative positions [13].", "Therefore, there is a vast literature, including interesting surveys [13 \u2013 19], on human body pose estimation [20 \u2013 24] and activity/action classi \ufb01 cation [25 \u2013 30]."]} +{"12627049|18440098": ["Recognizing signs of visual-gestural languages like the American sign language (ASL) is a very active field [145, 146, 147, 148, 149, 150, 151]."]} +{"2654595|12724190": []} +{"14239485|1634674": ["In addition, due to the design of our spherical coordinate system and the robust 3D skeleton estimation from Kinect, our method demonstrates significant view invariance on our 3D action dataset."]} +{"15324087|1634674": ["Human action recognition ( Aggarwal and Ryoo, 2011; Turaga et al., 2008 ) has become an important area in computer vision research , whose aim is to automatically classify the action ongoing in a temporally segmented video."]} +{"4932093|12724190": []} diff --git a/edge/graph_73506084.jsonl b/edge/graph_73506084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f273e9a3f564fbd942b20eb07909d00d3ac3d23 --- /dev/null +++ b/edge/graph_73506084.jsonl @@ -0,0 +1 @@ +{"62356899|15744805": []} diff --git a/edge/graph_73507342.jsonl b/edge/graph_73507342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7350786.jsonl b/edge/graph_7350786.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9302a6f6c7aa54ddc3dcd70a8f85b4006d42972 --- /dev/null +++ b/edge/graph_7350786.jsonl @@ -0,0 +1,9 @@ +{"26432219|16515889": []} +{"4646996|16515889": ["CPSs are typically managed and controlled on multiple levels of their system architecture, leading to a nested multiloop control structure."]} +{"4646996|5747564": ["Standardization and open interfaces are key success factors for the integration of heterogeneous sub-systems into large multi-domain CPSs [27]."]} +{"4523441|16514036": ["Significant progress has been made in many domains, such as machine-to-machine (M2M) communications, wireless sensor networks (WSNs), and wireless body area networks (WBAN) [1, 2]."]} +{"7119799|15181537": ["B. Component-and Model-Based Systems An overview of architecture frameworks and modeling languages is introduced by Paredis et al. [4]."]} +{"7119799|13219647": []} +{"18584756|207209718": []} +{"30166091|5660618": ["framework, in [86] on wireless control network where the entire network itself acts as the controller, in [87], [88] on decentralized control problems, the references in [72] and in [89], [90] for a survey of this field."]} +{"30166091|1236072": ["The protocol itself may be flat, hierarchical or even location-based [202]."]} diff --git a/edge/graph_73509656.jsonl b/edge/graph_73509656.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe53b362f6c13d50fe8530345aae02f8dfef50c6 --- /dev/null +++ b/edge/graph_73509656.jsonl @@ -0,0 +1,14 @@ +{"16417115|14866098": ["The common spatial pattern (CSP) has been proved to be powerful to extract those motor imagery related features [11-13]."]} +{"10388346|5755816": ["\u2026method for measuring the concentration changes of oxygenated hemoglobin (HbO) and deoxygenated hemoglobin (HbR) with near-infrared-range light (650\u20131000 nm) [12], [15], [16]. fNIRS uses multiple emitter-detector pairs operating with near-infrared (NI) light at two or more different wavelengths.", "The exited photons are detected using strategically positioned detectors, and the intensity of the detected light is used to calculate HbO and HbR concentration changes ( (cid:49) HbO and (cid:49) HbR) along the photon path by the Beer-Lambert law [12], [17].", "For these reasons, fNIRS-based BCIs have recently become widely used [12]\u2013[14], [19]\u2013[21].", "The major noninvasive modalities for BCI include electroencephalography (EEG) [4]\u2013[7], magnetoencephalography (MEG) [8], [9], functional magnetic resonance imaging (fMRI) [10], [11], and functional near-infrared spectroscopy (fNIRS) [12]\u2013[14]."]} +{"4714730|9270553": ["Several present-day BCI systems rely on mu (8 \u2013 12 Hz) or beta (18 \u2013 24 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000).", "Several present-day BCI systems rely on mu (8\u201312 Hz) or beta (18\u201324 Hz) rhythms recorded from the scalp over sensorimotor cortices (e.g. Pfurtscheller et al., 2000; Wolpaw et al., 2000; Kostov and Polak, 2000)."]} +{"18121638|7761990": []} +{"18121638|10290908": ["Another example is in single-channel deep brain recordings, where the neuronalspikes are very high noise-to-signal ratio (NSR) signals and are not easy to separate from noise [7], [8]."]} +{"51608520|2644350": []} +{"5174201|7761990": ["Furthermore, principal component analysis (PCA) and ICA have also been widely applied to remove artifacts or\nextract data features and decrease the noise in neural imaging data sets (Calhoun et al., 2001b; Calhoun et al., 2009).", "Furthermore, principal component analysis (PCA) and ICA have also been widely applied to remove artifacts or extract data features and decrease the noise in neural imaging data sets (Calhoun et al., 2001b; Calhoun et al., 2009)."]} +{"11095444|6116761": ["More recently there has been a growing interest in functional integration, which refers to the interplay between functionally segregated brain areas (Friston 2011)."]} +{"41912602|18599847": []} +{"23288279|9270553": []} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"14826330|11540239": ["Va ria tio na l b ay es ; c on ta ct au th or s [4 6]", "w ith in M At lA b or c on ta ct au th or s [3 4] \u2013[ 36 ]", "St ra ig ht fo rw ar d co m bi na tio n [4 7] , [ 48 ]", "o rg /s of tw ar e/ #g ica [1 4]", "m [2 2] \u2013[ 25 ], [4 3] , [ 45 ]", "Concomitantly, there has been increased recognition that information from a single brain mapping modality provides an unacceptably incomplete picture of brain functioning (for a review, see [4]).", "or g/ so ftw ar e/ #f us io n [4 0] \u2013[ 42 ]", "m [4 4]"]} +{"14826330|14429013": []} +{"14826330|7761990": ["A typical choice of dimension reduction is PCA [14], [18], [23].", "Representative methods within this category include group ICA [14], [69], [70], jICA [26], linked ICA [46], MCCA+jICA [47], [48], three-way pICA [49], and independent vector analysis (IVA) [17].", "An additional back-reconstruction also allows for capturing variations in subject-specific spatial maps [14].", "Although this assumption is fairly stringent, jICA has the advantage of providing a parsimonious way to link data sets from multiple modalities, and its utility has been demonstrated in a number of medical applications [14].", "Several Group ICA approaches, each with different assumptions and data grouping strategies, have been developed ( M 2 $ ) [14], [69], [70].", "In recent years, joint JBSS methods have emerged to meaningfully integrate data from different brain monitoring modalities [14], [23].", "\u2026o n s o u r c e s u b s pa c e . t y p i c a l i c a a l g o r i t h m s ; h tt p : / / m i a l ab . m r n . o r g / s o f t w a r e / # g i c a [ 14 ] j i C A M $ 2 , H O S , F i g u r e 2 ( b ) i d e n t i f y c o v a r y i n g m o d u l a t i o n p r o f i l e s a c r o ss s u b j e c t s a m\u2026"]} diff --git a/graph_735156.jsonl b/edge/graph_735156.jsonl similarity index 100% rename from graph_735156.jsonl rename to edge/graph_735156.jsonl diff --git a/edge/graph_73522095.jsonl b/edge/graph_73522095.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7352697.jsonl b/edge/graph_7352697.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73542834.jsonl b/edge/graph_73542834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7354738.jsonl b/edge/graph_7354738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4223ea1d9165b44fec076ce9e730bed4cec9c827 --- /dev/null +++ b/edge/graph_7354738.jsonl @@ -0,0 +1,2 @@ +{"18579379|14890820": []} +{"40488776|14890820": ["Readers are referred to Barrett and Myers (2003) and Lewitt and Matej (2003) for more detailed discussions on different imaging models."]} diff --git a/edge/graph_73560455.jsonl b/edge/graph_73560455.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1da388b3ae281eac0e200d11da08235bce0c3fe3 --- /dev/null +++ b/edge/graph_73560455.jsonl @@ -0,0 +1 @@ +{"38712438|6415369": ["Browning\u2019s [12] 2001 review of the DSM literature (also in these TRANSACTIONS) cited about 100 DSM papers; there have been over 1000 since.", "Besides clustering, since an earlier DSM review [12] suggested the possibility of applying", "Browning\u2019s [12] review laid out the three types of DSM applications\u2014models of products, organizations, and processes.", "adding a row and column to the DSM [22], [43] or by using separate regions above and to the right of an IC-convention DSM [12].", "1[5] and [12] are the second- and third-most cited papers, respectively, out of over 1,900 papers in the 60+ year history of IEEE-TEM, according to the Web of Science, September 14, 2015).", "Relationships with external entities can be modeled by adding a row and column to the DSM [22], [43] or by using separate regions above and to the right of an IC-convention DSM [12].", ", process iterations or rework loops) [12], [14].", "search on a set of prominent DSM papers [4], [5], [12], [15], [16], which identified over 3000 citations (many redundant).", "Because Browning\u2019s review [12] covered developments through", "Using DSM appendages to show external relationships [12], [22], [43], [309], [316]"]} diff --git a/edge/graph_7357277.jsonl b/edge/graph_7357277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75474d6ae6769010d8d39a031685dec813c29e39 --- /dev/null +++ b/edge/graph_7357277.jsonl @@ -0,0 +1,9 @@ +{"11135536|1230643": ["This technology has mainly been made possible by the convergence of micro-electromechanical systems technology, wireless communications, and digital electronics, enabling the construction of low-cost, lowpower, multifunctional sensor nodes that are small in size and communicate untethered in short distances, thus forming the sensor network [93]."]} +{"11135536|14441987": ["Data Dispersal This approach is based on Rabin\u2019s algorithm [11], which takes advantage of the existence of multiple routes from a source to a destination to increase reliability when transmitting packets.", "in [11]; it has been omitted since it requires a rigorous mathematical pre-", "(A survey of the two classes of routing protocols is available in [11]."]} +{"206446574|1230643": []} +{"14351892|1230643": ["works [2],in which a large number of sensor nodes collaborate to monitor certain environment."]} +{"18263597|1236072": ["These attributes consist of identity verification, bi- directionality confirmation, topology structure restriction, base station decentralization and braided and multi-path transmission and are presented as follows:\n1."]} +{"1940388|17205659": ["Besides implementing the security goal discussed above, the following metrics are also important to evaluate whether a security scheme is appropriate for WSNs [7], [8].", "A few existing surveys on security issues in WSNs can be found [7], [8]."]} +{"60512752|7774517": []} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} diff --git a/edge/graph_7358409.jsonl b/edge/graph_7358409.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1c85cae9e3f9e9fb5376bdcf4ea2c9bd8c241c4 --- /dev/null +++ b/edge/graph_7358409.jsonl @@ -0,0 +1 @@ +{"6336685|33286487": []} diff --git a/edge/graph_7360321.jsonl b/edge/graph_7360321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73604840.jsonl b/edge/graph_73604840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..02ff3d9fb794e01a0daaac3f445bfccaa30126d9 --- /dev/null +++ b/edge/graph_73604840.jsonl @@ -0,0 +1,7 @@ +{"6837802|7788290": []} +{"8714546|7185733": []} +{"8714546|7788290": []} +{"206591471|819377": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness.", "We refer to the work of Bouwmans et al. [4] for a comprehensive list.", "This originates from the quick weight up-date of the Gaussian mode, while the Gaussian distribution itself is adapted very slowly (cf. [4])."]} +{"206591471|12127129": ["Over the past years, various BS methods have been developed (cf. surveys [24, 9, 4, 2, 3]), with each of them having its own characteristic, strength and weakness."]} +{"783186|12127129": ["Since its introduction, the model has gained vastly in popularity among the computer vision community [4], [7], [11], [42]\u2013[44], and it is still raising a lot of interest as authors continue to revisit the method and propose enhanced algorithms [45]\u2013[50].", "According to [7], a background subtraction technique must adapt to gradual or fast illumination changes (changing time of"]} +{"111306035|7788290": []} diff --git a/edge/graph_7360895.jsonl b/edge/graph_7360895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d03ec22acb1054803dcd6d05073d49bb03462100 --- /dev/null +++ b/edge/graph_7360895.jsonl @@ -0,0 +1,6 @@ +{"9403432|7360895": ["They need to have more freedom of action and be able to drive the interaction with humans."]} +{"7896306|7360895": ["Many research problems are emerging with regard to how people may interact with a service robot, and how such robots may be designed to be \" socially interactive \" [9]."]} +{"62185766|53680608": []} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} +{"6957672|7788290": ["The problem of locating people is the problem of determining their x\u2013y-location relative to the robot.1 Previous approaches to people tracking in robotics are feature-based: they analyze sensor measurements (images, range scans) for the presence of features [ 15 ,26] as the basis of tracking."]} +{"2857532|53680608": []} diff --git a/edge/graph_7361943.jsonl b/edge/graph_7361943.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07d86d5054be661307556e8e6cfa8288a7d50797 --- /dev/null +++ b/edge/graph_7361943.jsonl @@ -0,0 +1,29 @@ +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"16784027|16525678": ["A review of general surveillance systems is provided in [79] and [139], with a particular focus on distributed surveillance systems."]} +{"2528485|17639662": ["To show that the straightforward paradigm of appearance-based image classification with appropriate models of variability leads to very competitive results in the domain of handwritten character recognition.", "The context of a pixel refers to the values of pixels in a neighborhood of that pixel and quantities derived from these, e.g., gradient values.", "D. Keysers is with the German Research Center for Artificial Intelligence (DFKI GmbH), Image Understanding and Pattern Recognition Group, D-67663 Kaiserslautern, Germany."]} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"1291435|14545307": []} +{"16927066|9045232": ["Index Terms\u2014 Face Detection, Character Recognition, Machine Learning, Features, Image Processing"]} +{"5755403|1029120": ["This type of analysis would be quite popular in the intelligent transportation field, specifically for pedestrian safety [91]."]} +{"5755403|17516538": ["The label of the prototype with minimal distance indicates the best matching path [28], [49], [67].", "Two simple techniques for length normalization are zero padding [36] and track extension [13], [49].", "The threshold can be tuned for each path individually based on its unique characteristics chosen, for neural network implementations, as half the maximum distance between training samples and a winning neuron (path prototype) [9], [49].", "a trajectory while track extension uses the dynamics at the last tracking time to estimate extra trajectory points as if it had been tracked until time [49].", "For further discussion, the interested reader is directed to recent surveys that categorize existing tracking techniques and identifies new trends [48] and the succinct review of tracking techniques specifically for visual surveillance [49]."]} +{"13961480|206764452": ["Despite these challenges, it has attracted lots of interests in the vision community [23, 11].", "To determine whether a local window bounding a human figure, both generative and discriminative approaches have been developed [23].", "Further speedup may be obtained by methods such as cascaded classifiers [23]."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"1811633|17516538": ["[2] in the field of video surveillance."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"1192198|1029120": ["Gandhi and Trivedi [20] focus on the pedestrian protection application in the intelligent vehicle domain."]} +{"1192198|192934": ["multilayer neural networks [33] implement linear discriminant functions in the feature space in which input patterns have been mapped nonlinearly, e.", ", mean squared error [33]."]} +{"1192198|7788290": ["The authors of [ 21 ], [47], [57] cover methods for people detection, body pose estimation, and activity recognition.", "At this point, we omit discussion of complex 3D human shape models [ 21 ] and focus on 2D pedestrian shape models that are commonly learned from shape contour examples."]} +{"30886179|17516538": ["A common characteristic of trajectory-based approaches [7]\u2013[9] is the derivation of nominal classes of object trajectories in a training phase, and the comparison of new test trajectories against the nominal classes in an evaluation phase."]} +{"53125143|1029120": ["Gandhi & Trivedi (2007) give a good overview of statistics in developing countries in their introduction."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"14600711|7788290": []} diff --git a/edge/graph_73635116.jsonl b/edge/graph_73635116.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e8599e1e00942a81878f9b1bc981377b5c7189d --- /dev/null +++ b/edge/graph_73635116.jsonl @@ -0,0 +1,5 @@ +{"109083800|17929320": []} +{"17294232|5806353": ["A survey is presented by Ball [8] for combinatorial optimization problems in general while, more recently, in [6] a survey focused on routing problems can be found."]} +{"31188890|5806353": []} +{"28038952|33829339": []} +{"109775081|207584909": ["Therefore, the last step of the selection process was a reading of abstracts, as proposed by Jahangirian et al. (2010), and irrelevant papers were eliminated from the selection.", "Kov\u00e1cs and Spens (2011b) as well as Seekins (2009) mention the strong impact of politics on humanitarian logistics, and recommend to include this aspect more in future research on humanitarian logistics."]} diff --git a/edge/graph_7365146.jsonl b/edge/graph_7365146.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73654058.jsonl b/edge/graph_73654058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7365537.jsonl b/edge/graph_7365537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14fec5f17fea8663cdec47b16cfedb3ea789ed8a --- /dev/null +++ b/edge/graph_7365537.jsonl @@ -0,0 +1,4 @@ +{"110209927|6972141": []} +{"1606530|11026696": ["Our tracker has applications in fast and reliable object tracking [5], [6], image retrieval [7], mosaicking [8], pose detection [9], multiview 3-D reconstruction [ 10 ], and robot navigation [11]\u2013[13]."]} +{"1606530|6972141": ["Our tracker has applications in fast and reliable object tracking [5], [6], image retrieval [7], mosaicking [8], pose detection [9], multiview 3-D reconstruction [10], and robot navigation [ 11 ]\u2013[13]."]} +{"2265365|6972141": ["Appearance-based, or view-based, approaches [1,5,8,13] have been recently proposed in mobile robotics in opposition to landmark based approaches [4,9,20]."]} diff --git a/edge/graph_7366975.jsonl b/edge/graph_7366975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b696a760f33b2da3029b856321ab8d86c374eab1 --- /dev/null +++ b/edge/graph_7366975.jsonl @@ -0,0 +1 @@ +{"123010239|7366975": []} diff --git a/edge/graph_73678081.jsonl b/edge/graph_73678081.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..526cdcee8ed004cd0429f142106c2238552d54d9 --- /dev/null +++ b/edge/graph_73678081.jsonl @@ -0,0 +1,2 @@ +{"17313334|1230643": ["In case of multi-hop paths, as in terrestrial sensor networks [10], the data produced by a source sensor is relayed by intermediate sensors until it reaches the uw-sink."]} +{"17313334|1762301": ["In the last few years there has been an intensive study in routing protocols for ad hoc wireless networks [7] and sensor networks [9]."]} diff --git a/edge/graph_73685973.jsonl b/edge/graph_73685973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_73701735.jsonl b/edge/graph_73701735.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..207d5b44a30b073fd1b8fed82cc4e74df5cb0f53 --- /dev/null +++ b/edge/graph_73701735.jsonl @@ -0,0 +1 @@ +{"56607749|32210766": ["In the medical sciences, BMA was used mostly for model choice purposes, as in variable selection of factors associated with false positives in diagnostic kits (Ranyimbo and Held; 2006), weight loss (Phelan et al.; 2009), leukemia progression (Oehler et al.; 2009), structure in Bayesian networks for patient-specific models (Visweswaran et al.; 2010) and the combined estimation as in Yin and Yuan (2009). BMA was also used extensively in Ecology, with applications to landscape ecology and geographical information systems (Barber et al.", "The former articles refer to seminal theoretical works like Raftery (1996), that introduced the BIC approximation to the Bayes factor and paved the way for many subsequent works.", "There were also some works in Physics, like the study of dark matter in Liddle et al. (2006) and the revision of BMA methods in astrophysics in Parkinson and Liddle (2013)."]} diff --git a/edge/graph_7370231.jsonl b/edge/graph_7370231.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c55e5eb9faf26b2d50aa7bd9e0af9c0ed2b78ae2 --- /dev/null +++ b/edge/graph_7370231.jsonl @@ -0,0 +1,10 @@ +{"38909620|956843": []} +{"1695607|4962752": ["ACO draws inspiration from the social behavior of ant colonies, and it has been found both robust and versatile in handling a wide range of optimisation problems [89,90]."]} +{"1695607|16866891": ["Swarm Intelligence (SI) has recently emerged as a family of nature-inspired algorithms that are capable of producing low-cost, fast, and reasonably accurate solutions to complex problems [31,87,88]."]} +{"1695607|8113021": ["More recent developments, such as gene expression programming (GEP) [68], cultural algorithm (CA) [69], and differential evolution (DE) [70], obtain some characteristics of the earlier algorithms."]} +{"341755|33286487": ["For this reason discrete, linear TFRs (the STFT, the WT, and the WPT) are preferable to quadratic TFRs and the continuous wavelet transform in real-time applications [16]."]} +{"14117914|10290908": []} +{"3648998|16362395": ["The final class will be that of the majority [63].", "[63] proposed boosting, voting and stacking techniques as classifier combination strategies used in EEG signal analysis."]} +{"3648998|192934": ["The final decision is made based on the outputs of the stacked classifier in conjunction with the outputs of individual classifiers [65]."]} +{"10927576|2528314": ["Del and Park suggested that ANN is a suitable technique for real-time applications of EMG [97]."]} +{"10927576|15932929": ["The JADE algorithm is based on the principle of computing several cumulant tensors, which are a generalization of matrices [77]."]} diff --git a/edge/graph_73729189.jsonl b/edge/graph_73729189.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..512b461092a6d5cc54aafe15adc6356fd6360110 --- /dev/null +++ b/edge/graph_73729189.jsonl @@ -0,0 +1,13 @@ +{"4339049|14617477": []} +{"4339049|17485266": []} +{"51812894|192934": []} +{"51997390|14843594": ["Most machine learning methods, such as neural networks and Bayesian optimization, were developed decades ago but have not found widespread use until recently 27,28 ."]} +{"67731171|14843594": ["cal forms that are easy to evaluate or approximate. An illustration of the Bayesian optimization process is given below. 2.1 Bayesian Optimization 13 Fig. 2.1 A Demonstration of Bayesian Optimization [103]. One might imagine that the range of the machine learning parameter of interest lies on the x-axis and the y-axis represents test set performance. The black-box objective function is shown as the dot", ". . . . . . . . . . . . . . . . . . . .48 References49 List of Figures 1.1 An Illustration of the Automatic Chemical Design Pipeline. . . . . . . . . . .9 2.1 A Demonstration of Bayesian Optimization [103]. . . . . . . . . . . . . . . .13 3.1 Constrained Bayesian optimization of the 2D Branin-Hoo Function. . . . . .32 3.2 Constrained Bayesian Optimization on the 2D Branin-Hoo Function with a Coupled Di", ".com/SheffieldML/GPyOpt/ \u2022Auto-WEKA [120,59].http://www.cs.ubc.ca/labs/beta/Projects/autoweka/ For an in-depth treatment of Bayesian optimization, the reader is referred to the comprehensive works of [68,10,103]. 2.2 Constrained Bayesian Optimization 15 2.2 Constrained Bayesian Optimization An extra dimension of complexity may be added to the formulation of the Bayesian optimization problem if regions of the", "I) [82,51]. 2. Optimistic acquisition functions - \u201cOptimistic in the face of uncertainty\u201d. Members of this class use a fixed probability best case scenario according to the model to decide on a query [103]. One example is the Upper Confidence Bound (UCB) acquisition function [115]. 3. Information-based acquisition functions - These methods work with the posterior distribution over the unknown minimizer"]} +{"88523434|26071662": [" of diversity that could be imposed in the mixing and /or the source matrix are: statistical independence of the sources, sparsity, correlation of sources across datasets, sample-to-sample dependence [52], or sparsity [28,37,67,101]. Independence, in particular [9,12,44,55,79], is a reasonable assumption in many real world applications and its assumption enables source estimation subject to only scali"]} +{"52899210|9316331": []} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} +{"205264340|9316331": ["[29] Each edge ( s, a ) in the search tree stores the action value Q ( s, a ) , the visit count N ( s, a ) and a prior probability P ( s, a ) received from the expansion policy network."]} +{"7648414|19004624": ["Learning arithmetic expressions to \ufb01t data, often called symbolic regression , are generally based on genetic programming (Willis et al., 1997) or other computationally demanding evolutionary algorithms to propose candidate expressions (Schmidt & Lipson, 2009)."]} +{"7648414|14843594": ["For this, we use Bayesian optimization methods, which choose the next point to evaluate by maximizing an acquisition function that quantifies the benefit of evaluating the property at a particular location (Shahriari et al., 2016)."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"24832185|2088679": []} diff --git a/edge/graph_73729237.jsonl b/edge/graph_73729237.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..923117ca5c6b0325b503c4c2bb909f6463e57d12 --- /dev/null +++ b/edge/graph_73729237.jsonl @@ -0,0 +1,4 @@ +{"5978918|15279105": ["In the last years, however, this trend has changed and there is much more interest in gathering this kind of information [3,4].", "A common approach involves considering distance criteria like the shortest path between the candidate entities in a parse tree to unravel associations [3,35]."]} +{"11473206|38476": ["Sequential labeling tasks are also known as sequential supervised learning problems [43] and can be formulated as follows:"]} +{"77797|6923178": ["In the case of classification, the assessment of the prediction quality of statistical models is typically performed on the basis of several parameters [35]."]} +{"3520491|13370607": []} diff --git a/edge/graph_7378268.jsonl b/edge/graph_7378268.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7378534.jsonl b/edge/graph_7378534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7387611.jsonl b/edge/graph_7387611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7388464.jsonl b/edge/graph_7388464.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71e68f45c447e1e10e71e2f4159d2a9a42b84ece --- /dev/null +++ b/edge/graph_7388464.jsonl @@ -0,0 +1,2 @@ +{"14056172|11139156": []} +{"14056172|627405": ["The next section provides further elaboration regarding the research questions defined to perform SLR.", "Based on this SLR, we can conclude that some researchers do agree that XP is compatible with software security engineering.", "Findings in Appendix A The Table \u2018Appendix A\u2019 shows the results of the research sources that have been found during SLR.", "1 Review Process In order to perform a literature review, we decided to use SLR [12], since it helps to identify, classify, assess and understand the entirety of searched contents according to research topics.", "In order to perform a literature review, we decided to use SLR [12], since it helps to identify, classify, assess and understand the entirety of searched contents according to research topics."]} diff --git a/edge/graph_7389705.jsonl b/edge/graph_7389705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07eb0db198afff041c720c53e056b6540def395e --- /dev/null +++ b/edge/graph_7389705.jsonl @@ -0,0 +1,2 @@ +{"4910656|9970562": ["There have been some interesting efforts to extract entities from RDF depositary[20][21][22]."]} +{"16226203|16052126": ["Techniques for MapReduce-based join evaluation are proposed in [5,6,17, 32].", "The interested reader may find in [23] a survey of NoSQL systems, while [32,73] cover MapReduce variations and other massively parallel data management frameworks."]} diff --git a/edge/graph_7399829.jsonl b/edge/graph_7399829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7400701.jsonl b/edge/graph_7400701.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d484d0796b5a9fd00f4943dd695ac75eb8a522c --- /dev/null +++ b/edge/graph_7400701.jsonl @@ -0,0 +1,11 @@ +{"17939111|6281674": ["robust and flexible environmental interactions), the former refers to constitutive autonomy, namely the self-constitution of an identity under precarious conditions [52].", "Since it does not specify the particular domain of the autonomous system, it is also to some extent more amenable to the sciences of the artificial [52].", "This is because we do not even yet know how to identify the existence of an autonomous system in such an abstract dynamical domain [52]."]} +{"17939111|1452734": ["\u2026programs such as, for example, evolutionary robotics (e.g. Harvey et al. 2005; Nolfi & Floreano 2000), epigenetic and developmental robotics (e.g. Berthouze & Ziemke 2003; Lungarella et al. 2003), and the dynamical systems approach to adaptive behavior and minimal cognition (e.g. Beer 2003; 1995).", "[15,79]), and the dynamical systems approach to adaptive behavior and minimal cognition (e.", "[15,79]), and the dynamical approach to cognition (e.", "\u2026a variety of recent AI research programs including, for example, evolutionary robotics (e.g. Harvey et al. 2005; Nolfi & Floreano 2000), epigenetic and developmental robotics (e.g. Berthouze & Ziemke 2003; Lungarella et al. 2003), and the dynamical approach to cognition (e.g. Beer 2003; 1995)."]} +{"5136805|1708582": ["1Mirenowicz and Schultz (1996) 2Aston-Jones and Bloom (1981) 3Ljungberg et al.", "The latter refers to a particular set of machine learning algorithms which utilize a global reinforcement signal to modify an agent's behavior towards attaining a goal (for rewiew see Kaelbling et al., 1996)."]} +{"13906936|1708582": ["In machine learning, models of reinforcement learning go beyond supervised learning by allowing an agent to learn through trial and error and then prefer actions that tend to result in the chance of reward [7], [24]."]} +{"402863|1708582": ["The process is called the k-th order MDP [20], [28], [30] if its conditional state transit ional probabil i ty P(s t | Ht) sat is f ies P(s t | Ht) = P(s t | lt) where lt is the short last k frames of the history lt = (s t\u22121, s t\u22122, .", "Markov Decision Process To facilitate understanding, we start with the MDP, which is a framework originated from mathematics and statistics and that has been studied and used widely in the machine-learning community [20], [28], [30].", "A partially observable MDP or POMDP [20], [30] (or HMM [29]) is one whose state s t is not totally observable to the agent."]} +{"8489933|1452734": ["One possible way out of this dilemma was the idea to let robots develop similar to human infants, leading to the growing field of \u201c developmental robotics \u201d (Weng et al., 2001; Lungarella et al., 2003).", "One possible way out of this dilemmawas the idea to let robots develop similar to human infants, leading to the growing field of \u2018\u2018developmental robotics\u2019\u2019 [58,29]."]} +{"1708582|17464562": []} +{"2136299|1708582": ["Any computational reasoning process that is based on a pre-designed set of symbolic states (e.g., POMDP) seems remote to brainlike reasoning and thinking.", "In the POMDP, there are two layers of probability: the state transition probability P\u00f0s t j x t ; s t\u00c01 \u00de and the state observation probability P\u00f0x t j s t \u00de, while the ODMDP has only one layer of probability: P\u00f0p t j l t \u00de, making a more efficient learning algorithm possible.", "Like the architecture of MDP [28] [14] [34], the presentation of the series of mental architectures is in mathematical terms, which is necessary for a clear and rigorous understanding of the related concepts.", "If the state s t of the world is not totally observable to the agent and, instead, there is an observation x t at time t that depends on the state s t by an observation probability P\u00f0x t j s t \u00de, the process is called partially observable MDP or POMDP [14] [34] (or HMM [28]).", "The states s t of POMDP are hand-specified but the states of ODMDP can be automatically generated (developed) on-the-fly.", "\u2026reinforcement learning, based on the Markov decision Process (MDP) architecture (single-or multi-level), enables a robot (an embodied agent) to learn autonomously while the environment (including humans) provides labels for supervised learning [28] or rewards for reinforcement learning [14] [34].", "Observation-driven Markov decision process MDP and POMDP as formulated above has been widely used to model a process in the external environment.", "The POMDP is world-centered, where each state corresponds to a modeled object or event of the world (e.g., a corner).", "The following are the major differences between a POMDP (or HMM) and an ODMDP: 1.", "If its conditional state transitional probability P\u00f0s t j H t \u00de satisfies P\u00f0s t j H t \u00de \u00bc P\u00f0s t j l t \u00de, where l t is the short last k frames of the history l t \u00bc fs t\u00c01 ; s t\u00c02 ; . . . ; s t\u00c0k ; a t\u00c01 ; a t\u00c02 ; . . . ; a t\u00c0k g, we call it the kth order MDP [27] [14] [34].", "We start with the MDP, which is a framework originated from mathematics and statistics and has been studied and used widely in the machine learning community [27] [14] [34].", "In many engineering models using MDP or POMDP, only the context-relevant actions are evaluated, not the primed (predicted) sensation.", "With the POMDP, the meaning of each state must be specified so that the initial estimates of the three probability distributions (P\u00f0s 0 \u00de, P\u00f0s t j s t\u00c01 \u00de and P\u00f0x t j s t \u00de), can be provided.", "Many of the well known architectures are nonselective by themselves, including POMDP, HMM, Soar, and ACT-R."]} +{"10168773|1452734": ["This is one of the biggest differences from artificial systems [23].", "Here, we briefly review the facets of development in the survey by Lungarella et al. [23] from viewpoints of external observation, internal structure, its infrastructure, and social structure, especially focusing on the underlying mechanisms in different forms."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"12104564|7788290": ["Many examples of people tracking have used cameras as their primary sensor [19, 26], however laser rangefinders have also been used [52]."]} diff --git a/edge/graph_7408390.jsonl b/edge/graph_7408390.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8fedee79af508b3e63101d7a1a61511d3174c410 --- /dev/null +++ b/edge/graph_7408390.jsonl @@ -0,0 +1,6 @@ +{"12959874|7788290": ["The authors in [ 5 ] have reviewed the previous work on activity recognition, most of which involve tracking body parts segmented from the static background."]} +{"7152729|18440098": []} +{"7152729|38476": []} +{"12004269|18440098": ["Additionally, the used databases differ in language, vocabulary size, grammar restriction, and selection of signs (Ong and Ranganath, 2005)."]} +{"15689486|7185733": ["There have been varied approaches to handle gesture recognition [ 2 ], ranging from mathematical models based on hidden Markov chains [3] to tools or approaches based on soft computing [4]."]} +{"15689486|7788290": ["Good review on human motion analysis is available in literature [ 5 ], [6]."]} diff --git a/edge/graph_7414579.jsonl b/edge/graph_7414579.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0aa2f71a6f2d710b928b9239982aaf4fe8e061a --- /dev/null +++ b/edge/graph_7414579.jsonl @@ -0,0 +1,4 @@ +{"2475785|7414579": []} +{"6200135|7414579": ["This paper, covering the early days of TL hardware implementations, is intended to complement [10].", "Many different TLG circuits have been designed [10].", "The exceptions are a chapter [6] and a fresh comprehensive review [10]."]} +{"7941918|7414579": ["The precision of the weights is linked to very practical noise margins and power dissipation [17].", "Still, TLGs (or their variations) have rarely been used in practice (for a review of their VLSI implementations see [17] [18])."]} +{"60887594|1596610": []} diff --git a/edge/graph_741652.jsonl b/edge/graph_741652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7416672.jsonl b/edge/graph_7416672.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7421419.jsonl b/edge/graph_7421419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7423713.jsonl b/edge/graph_7423713.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ade4b327c7a1aeb546fb13160761333e8b0d3585 --- /dev/null +++ b/edge/graph_7423713.jsonl @@ -0,0 +1,9 @@ +{"20680904|9588126": []} +{"33394218|8530790": ["Conventional optimization techniques, such as gradient-based methods, are difficult to extend to multi-objective cases; in practice, multi-objective problems have to be reformulated as single-objective prior to optimization [15]."]} +{"36894071|35990525": []} +{"52182061|8530790": []} +{"44761686|1708582": []} +{"9210266|11608263": ["The LP-ReliefF uses the LPS approach in order to measure the contribution of each feature directly from the multi-class problem generated.", "The MLC-WkNN-EFW method outperforms the MLC-WkNN-BR-ReliefF and MLCWkNN-MReliefF methods in all the measures considered, furthermore it is statistically better than ML-kNN-LPS-ReliefF in the HL, F1Ex and AP measures.", "The DMLkNN-EFW method outperforms the DML-kNNLPS-ReliefF, DML-kNN-MReliefF and DML-kNNBR-ReliefF methods in all the measures considered.", "Several algorithms use the LPS approach, such as the Pruned Problem Transformation method (PPT) [44] and HOMER [62].", "METHODS HL F1Ex RL AP\nMETHODS HL F1Ex RL AP\nBR-kNN-EFW 1.286 1.405 1.405 1.524 MLC-WkNN-EFW 1.333 1.357 1.429 1.333 BR-kNN-BR-ReliefF 2.976 3.238 2.500 2.643 MLC-WkNN-BR-ReliefF 3.167 2.809 3.071 2.762 BR-kNN-LPS-ReliefF 2.881 2.524 2.976 2.762 MLC-WkNN-LPSReliefF 2.786 2.905 2.309 2.929\nBR-kNN-MReliefF 2.857 2.833 3.119 3.071 MLC-WkNN-MReliefF 2.714 2.929 3.190 2.976\nFRIEDMAN TEST p-value\nFRIEDMAN TEST p-value\n0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00", "In the third part, to compare the effectiveness of the EFW algorithm with respect to the most relevant multi-label feature estimation algorithms, a multiple comparison among EWF, BR-ReliefF, LPS-ReliefF and MReliefF algorithms was done.", "The ML-kNN-EFW method outperforms the ML-kNN-LPS-ReliefF and ML-kNN-MReliefF methods in all the measures considered, furthermore it is statistically better than ML-kNN-BR-ReliefF metod in the HL, RL and AP measures.", "The LPS method has a high complexity on multi-label datasets which present a big number of distinct label sets, limiting its scalability and commonly tends to over-fitting the data.", "In [55] the BR-ReliefF and LPS-ReliefF methods were proposed, and a comparison with other approach based in the Information Gain measure was done, demonstrating the superiority of the multilabel ReliefF extensions.", "The BR-ReliefF, LPS-ReliefF and MReliefF feature weighting methods return the weights in the range [-1\u20261], therefore the weights are scaled in [0\u20261] range to be used as feature weights in the distance function of the multi-label lazy algorithms.", "The Label Power Set method (LPS) [61] constructs a new single-label dataset from a multi-label dataset, where each", "The performance of the EFW, GFW, BR-ReliefF, LPS-ReliefF and MReliefF feature weighting methods depend of the number of instances (m) to be selected from the training set for the learning process of the weight vector W.", "The BR-kNN-EFW method is statistically better than BR-kNN-LPS-ReliefF, BR-kNN-MReliefF and BR-kNN-BR-ReliefF methods in all the measures considered.", "The Label Power Set method (LPS) [61] constructs a new single-label dataset from a multi-label dataset, where each unique set of labels is considered as one of the classes of the new dataset.", "LPS takes into account implicitly the correlation among labels and often performs better than the BR approach which assumes independence among labels.", "A comparison among EFW, BR-ReliefF, LPSReliefF and MReliefF feature weighting methods over the multi-label lazy algorithms ML-kNN, DML-kNN, BR-kNN and MLC-WkNN was carried out.", "The authors propose to use the LPS approach to transform the multi-label problem into a multi-class problem, and afterward apply any common single-label feature estimation algorithm.", "wise comparison (RPC) trains a binary classifier by each pair of labels [19, 22, 39, 61]."]} +{"9246066|54962714": [", the physical realization of quantum computers [80,153,162], investigations into quantum error correction and fault tolerance [47,111,258], the design of quantum programming languages [115,250], the development of novel quantum algorithms [51,259], and investigations into the power of quantum computing [139,168,204]."]} +{"9246066|6777457": [", the physical realization of quantum computers [80,153,162], investigations into quantum error correction and fault tolerance [47,111,258], the design of quantum programming languages [115,250], the development of novel quantum algorithms [51,259], and investigations into the power of quantum computing [139,168,204]."]} +{"9246066|13558235": ["However, fractals have several other approaches and applications, among which the main current trends are the use of fractals as function approximators [19,46,200], their applications in economics and finance [163,184,185,189], several technological applications, such as antenna design, data mining and image processing [18,53,179,257,279,282], applications in biology and medical sciences [16,58,130,133,145,290], applications in forecasting, such as weather forecasting [172, 202], and applications in arts and games [164,251]."]} diff --git a/edge/graph_7434318.jsonl b/edge/graph_7434318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..890a2d40e40cb80aa7e46eb46a51db2e3c9f4ebe --- /dev/null +++ b/edge/graph_7434318.jsonl @@ -0,0 +1,10 @@ +{"6638073|8363289": []} +{"12779827|2835258": ["We refer the reader to [3] for a complete description of geographic routing."]} +{"13642241|6078328": []} +{"37134550|14441987": ["Typically, in a self-organizing vehicular ad hoc network (VANET), each vehicle learns about the existence of its neighboring vehicles through the exchanges of the periodic \u201cHELLO\u201d packets [11]."]} +{"15728005|7971188": []} +{"15728005|14697846": []} +{"15728005|2835258": []} +{"11012648|6396569": ["Some researchers acknowledge the problem of communication overhead for CP in vehicular networks [3], but a detailed investigation of this issue seems not to exist in the literature.", "He is currently a Full Professor with the School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia.", "He is currently working toward the Ph.D. degree, specializing in vehicular positioning enhancement with Dedicated Short-Range Communications, with the School of Surveying and Spatial Information Systems, University of New South Wales, Sydney, NSW, Australia.", "N. Alam and A. G. Dempster are with the School of Surveying and Spatial Information Systems, The University of New South Wales, Sydney, NSW 2052, Australia (e-mail: nima.alam@student.unsw.edu.au; a.dempster@ unsw.edu.au).", "Available: http://tools.ietf.org/html/rfc1952\nJun Yao received the B.E. degree from the South China University of Technology, Guangzhou, China, in 2002 and the M.I.T. and Ph.D. degrees from the University of New South Wales, Sydney, NSW, Australia, in 2005 and 2011, respectively.", "J. Yao and M. Hassan are with the School of Computer Science and Engineering, The University of New South Wales, Sydney, NSW 2052, Australia (e-mail: jyao@cse.unsw.edu.au; mahbub@cse.unsw.edu.au).", "Through communications with the reference nodes, a vehicle uses the augmentation information to improve its own position estimate.", "A. T. Balaei is with the School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, NSW 2052, Australia (e-mail: asghart@unsw.edu.au)."]} +{"17673992|7971188": ["Whensuch systems are realized usingVANETs, theywill neces\u00adsarily \nsuffer from the inherent limitations of wireless ad-hoc net\u00adworks: limited network capacity [8, 23], \nresulting in scalability issues, and limited connectivity [12], which impacts the speed of information \npropagationinaVANET."]} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} diff --git a/edge/graph_7436456.jsonl b/edge/graph_7436456.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dc5d17f2b7738c032db6bb92fe940b52957d0a8 --- /dev/null +++ b/edge/graph_7436456.jsonl @@ -0,0 +1 @@ +{"946690|63137": []} diff --git a/edge/graph_7437763.jsonl b/edge/graph_7437763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7439310.jsonl b/edge/graph_7439310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9526b8ba412f2d5aa42337538ca64052a325f827 --- /dev/null +++ b/edge/graph_7439310.jsonl @@ -0,0 +1 @@ +{"46244854|14545307": []} diff --git a/edge/graph_7440843.jsonl b/edge/graph_7440843.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7443412.jsonl b/edge/graph_7443412.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_744441.jsonl b/edge/graph_744441.jsonl similarity index 100% rename from graph_744441.jsonl rename to edge/graph_744441.jsonl diff --git a/graph_744951.jsonl b/edge/graph_744951.jsonl similarity index 100% rename from graph_744951.jsonl rename to edge/graph_744951.jsonl diff --git a/edge/graph_7453720.jsonl b/edge/graph_7453720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7458485.jsonl b/edge/graph_7458485.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7464059.jsonl b/edge/graph_7464059.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85b4e5fb62b774225b77033069c50764f486d57b --- /dev/null +++ b/edge/graph_7464059.jsonl @@ -0,0 +1,53 @@ +{"14839654|14970359": ["Many algorithms [1] have been proposed to deal with these problems."]} +{"3425069|50041": ["In [7], D."]} +{"3425069|20905429": ["The use of body sensors for health monitoring is becoming reality [2] and [3]."]} +{"34042458|10397481": []} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"17375799|192934": ["ward search algorithm [52] to perform the essential analysis."]} +{"17375799|7788290": ["Existing work [27], [ 28 ] has achieved good results on action recognition for medium shot."]} +{"5664472|1634674": ["[92] focus on the recognition of actions and activities and not on the lower-level processing modules such as detection and tracking."]} +{"5664472|5401262": ["Finally, human activity recognition tasks constitute the foundation of human behavior understanding, which requires additional contextual information such as W5+ (who, where, what, when, why, and how) [144]."]} +{"5664472|16525678": ["Valera and Velastin [89] survey the automated visual surveillance systems."]} +{"5664472|12127129": ["The most common method for static camera segmentation is background subtraction due to its simplicity and efficiency [98]."]} +{"5664472|14970359": ["Depending on whether the use or not an explicit a priori body model [90,108], the body modeling can be roughly categorized in three classes [90,108], i."]} +{"5664472|192934": ["ANNs use the concept of biological neuron networks to supply nonlinear capability via more discriminative feature transformation through hidden layers, resulting in more effective classification through multilayer perceptrons (MLPs), which apply the back propagation (BP) supervised learning algorithms to compute suitable connection weights and biases of the network.", "On the other hand, discriminative models learn the conditional (posterior) probability distribution P(Y|X)over an unobserved fixed-length class label Y on a given observed fixed-length feature vector X, such as support vector machines (SVMs) [79,80], relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84].", "Fiaz and Ijaz [83] propose a method to design an ANN-based intelligent human activity monitoring system to detect and track suspicious activity in a surveillance environment.", "On the other hand, discriminative models (static classifiers) such as Support Vector Machine (SVM) [18,19,79,80], Relevant Vector Machine (RVM) [54,81,82] and Artificial Neural Network (ANN) [29,83,84], can also be used in this stage.", "Generative models, that explicitly simulate the generation process of the data sequences as achieved by the hidden Markov model (HMM) [75] and dynamic Bayesian network (DBN) [78], learn the joint probability distribution , relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84].", "The examples of discriminative models are described below, including support vector machines (SVMs) [18,19,79,80], relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84] is one of the most popular margin-based supervised classifier in the pattern recognition.", "With a systematically sequential training procedure, an ANN can train the model to adapt to the input data.", "The examples of discriminative models are described below, including support vector machines (SVMs) [18,19,79,80], relevance vector machines (RVMs) [81,82] and artificial neural networks (ANNs) [84].", "Similarly, Fiaz and Ijaz [83] also perform suspicious activity detection and tracking using ANNs.", "An ANN [84] is a mathematical model to describe the problems in a network of directed graphs, whose nodes are represented as artificial neurons and the weighted directed edges in the graphs are", "Szczodrak et al. [127] use optical flow combined with artificial neural network (ANN) to evaluate the types of crowd behavior.", "Although ANNs have the ability to implicitly describe complex nonlinear relationships between dependent and independent variables, they have higher computation burden during the learning, and are prone to over-fitting of the data.", "The normal behavior (walking), diverging, and abnormal behavior are classified by ANN.", "As mentioned in [84], an ANN enables to learn complex nonlinear input-output relationships with a universal approximation (a black box) model.", "Among classification algorithms for human activities, in addition to DTW, generative models such as HMMs and DBNs, and discriminative models such as SVMs, RVMs and ANNs, there are also many other potential techniques can be adopted, such as Kalman filters [10,86], binary trees [20,87], multidimensional indexing [21], and k nearest neighbors [22] is a set of mathematical equations to minimize the mean square errors (MSEs) and estimate the state of the dynamic process."]} +{"13028371|10355303": ["We refer the readers to a comprehensive review on visual tracking in [33, 22, 26]."]} +{"16838739|16766019": []} +{"1033114|10397481": []} +{"1537015|1634674": []} +{"30411331|13365762": ["The metadata used in this paper is in the MPEG-7 format [14] (http://www."]} +{"7807670|14970359": ["A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "The initial model is then refined using a Bayesian network that imposes human body proportions onto the body part size estimates."]} +{"7807670|7788290": ["55], 100 UAm [1], 200 UAm0 [1], 100 LowerArm [0.", "9], 100 Thm [1], 200 Thm0 [1], 100 Calf [1], 100 Cm [1], 200 Cm0 [1], 100 UpperArm [0.", "A reliable motion capture system would be valuable in many applications [1, 2].", "A reliable motion capture system would be valuable in many applications (Gavrila, 1999; Moeslund and Granum, 2001).", "75], 100 LAm [1], 200 LAm0 [1], 100 Torso (\u03bc, \u03c3) = (500, 300) Height [1, 1, 1], 100 Table 3 The parameters used in the Bayesian network shown in Figure 13."]} +{"206605576|13365762": ["The MPEG-7 [1], [2] has tried to standardize the media access methods based on its contents."]} +{"31172115|16169670": []} +{"18533219|1634674": ["It focuses on identifying a person's action or behavior from a single image."]} +{"18533219|7788290": ["A survey on still image based human action recognition\nGuodong Guo n, Alice Lai Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, United States\na r t i c l e i n f o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become an active research topic in computer vision and pattern recognition.", "\u2026o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become\u2026"]} +{"207059309|192934": ["Thus, a forward searching algorithm [26] is adopted to perform the feature selection task before the features are fed into the classifier."]} +{"12332219|50041": []} +{"24943134|50041": []} +{"16013270|27637541": ["Thus, fall detection is a task where computer vision provides new and promising solutions such as the development of new health-care systems to help elderly people staying at home in a secure environment [37]."]} +{"16013270|1634674": ["\u2026.com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a\u2026"]} +{"16013270|61451747": ["Action recognition is one of the keys of several applications such as visual surveillance [76,80,93,97,169], video retrieval [63] and human\u2013computer interaction [88], among others."]} +{"16013270|5401262": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|17516538": ["\u2026Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La\u2026", "Contents lists available at SciVerse ScienceDirect\nComputer Vision and Image Understanding\njournal homepage: www.elsevier .com/ locate/cviu\nA survey of video datasets for human action and activity recognition q\nJose M. Chaquet a,\u21d1, Enrique J. Carmona a, Antonio Fern\u00e1ndez-Caballero b a Dpto. de Inteligencia Artificial, Escuela T\u00e9cnica Superior de Ingenier\u00eda Inform\u00e1tica, Universidad Nacional de Educaci\u00f3n a Distancia, 28040 Madrid, Spain b Instituto de Investigaci\u00f3n en Inform\u00e1tica de Albacete, Universidad de Castilla-La Mancha, 02071 Albacete, Spain\na r t i c l e i n f o\nArticle history: Received 2 March 2012 Accepted 30 January 2013 Available online 13 February 2013\nKeywords: Human action recognition Human activity recognition Database Dataset Review Survey\n1077-3142/$ - see front matter 2013 Elsevier Inc."]} +{"16013270|14970359": ["A http://dx.doi.org/10.1016/j.cviu.2013.01.013\nq This paper has been recommended for acceptance \u21d1 Corresponding author."]} +{"16013270|7185733": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"16013270|6028805": ["Finally, the pose or gesture recognition is dedicated to actions performed by a specific part of the human body, such as hands, arms or upper body part [48,98,167]."]} +{"18172204|191396": ["Based on the selection criterion for the parameter of the number of clusters [ 42 ], the optimal number of event categories can be determined by minimizing the value of .", "A clustering algorithm should achieve the compactness of intra-cluster and isolation of inter-cluster and consider the comprehensive effects of several factors including the defined squared error, the geometric or statistical properties of the data, number of the input data, the dissimilarity (or similarity), and the number of clusters [ 42 ]."]} +{"17574890|10397481": ["of video frames, object based and event based models in video summarization have been proposed in the domain of sport events [16].", "Key-frame extraction or video abstraction is an important topic and has been treated by a few excellent surveys [16, 27].", "In terms of the application domains of video summarization, it is found in surveys that most of the work focuses on sports video [16]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"14854949|5401262": []} +{"14854949|17516538": []} +{"14854949|14970359": []} +{"14854949|7185733": []} +{"14854949|192934": ["Use (P \u2212 1) subsets for training and the remaining subset for test); and (v) the bootstrap method for partitioning scheme [70]."]} +{"14854949|7788290": []} +{"32431073|9045232": []} +{"10680010|50041": ["In the meantime, other researchers focused on categorizing sports video, as shown in Table 1 [3]."]} +{"8617675|17516538": ["Little University of British Columbia, Department of Computer Science, 2366 Main Mall, Vancouver, BC, Canada V6T 1Z4\na r t i c l e i n f o\nArticle history: Received 20 March 2007 Received in revised form 20 February 2008 Accepted 22 February 2008\nKeywords: Tracking Action recognition Boosted\u2026", "Little University of British Columbia, Department of Computer Science, 2366 Main Mall, Vancouver, BC, Canada V6T 1Z4\na r t i c l e i n f o\nArticle history: Received 20 March 2007 Received in revised form 20 February 2008 Accepted 22 February 2008\nKeywords: Tracking Action recognition Boosted particle filter\n0262-8856/$ - see front matter 2008 Elsevier B.V."]} +{"8617675|7788290": ["For a more complete survey, please refer to the reviews of Gavrila [3] and Hu et al. [4].", "In the past decade, there has been intensive research and giant strides in designing algorithms for tracking humans and recognizing their actions [15, 18].", "For a more complete survey, please refer to the reviews of Gavrila [15] and Hu etal."]} +{"2600817|10817088": ["2391258 health [8]\u2013[11], sports [12], [13], leisure [14]\u2013[16], transportation [17], [18], and so forth."]} +{"10978146|7788290": ["This has given rise to a body of literature, of which surveys can be found in the work of Aggarval and Cai [1], Gavrila [21] and Gabriel et al.", "This has given rise to a body of literature, of which surveys can be found in the work of Aggarval and Cai [1], Gavrila [21] and Gabriel et al. [20]."]} +{"14779543|1634674": ["Here we overview a few related work but refer the reader to [1,2] for a more complete survey."]} +{"2371570|14970359": ["In computer vision research, human motion has been studied intensively [32], and there are a number of works on human gait analysis and recognition."]} diff --git a/edge/graph_7465328.jsonl b/edge/graph_7465328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..deb19dd7cd1eabc20ebcc80eeb257cb51f737581 --- /dev/null +++ b/edge/graph_7465328.jsonl @@ -0,0 +1,5 @@ +{"6546013|1230643": ["Recent technological advances have made it possible to deploy large scale sensor networks consisting of a large number of low-cost, low-power, and multi-functional senso r nodes that communicate in short distances through wireless links [1]."]} +{"6391459|1236072": ["\u2026agent also monitors packets which are addressed directly to the node, although developing a lightweight detection technique for every existent protocol is out of scope of this paper because of large number of protocols and packet formats present in the literature (e.g., routing algorithms [17])."]} +{"6391459|1230643": []} +{"13962444|1230643": ["Key Distribution Mechanisms for Wireless Sensor\nNetworks: a Survey\nSEYIT A. C\u0327AMTEPE and BU\u0308LENT YENER\nRensselaer Polytechnic Institute\nAdvances in technology introduce new application areas for sensor networks.", "Sensors are inexpensive, low-power devices which have limited resources [Akyildiz et al. 2002]."]} +{"12363281|1230643": ["Wireless sensor networks (WSN) are infrastructure-less and self-organizing networks, which can be deployed anywhere, and work without any assistance [1]."]} diff --git a/edge/graph_7466096.jsonl b/edge/graph_7466096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf0bfa5321dc088b79b34441d7a7d3c19395cea1 --- /dev/null +++ b/edge/graph_7466096.jsonl @@ -0,0 +1,7 @@ +{"111163614|164835": []} +{"9936447|17325804": ["For a review of these techniques, see High-tower and Borriello (2004) and Gezici (2008)."]} +{"61167697|33286487": []} +{"13912957|164835": ["\u2026requirement was 125 m and was later tightened to 100 m.) This FCC mandate has motivated considerable research efforts towards developing accurate wireless location algorithms for cellular networks and has led to significant enhancements to the wireless location technology (see, e.g., [12]\u2013[25]).", "The solution that results in the shortest distance from the circle (4) is chosen to be an estimate of the MS location coordinates [12]."]} +{"5654074|1230643": ["Dramatic advances in RF and microelectromechanical (MEMS) IC design have made possible the use of large networks of wireless sensors for a variety of new monitoring and control applications [ 63 ], [64]."]} +{"5654074|164835": ["g, urban places) and much lower in rural environments [30]."]} +{"4093889|2835258": ["A number of location-aware protocols have been proposed for \u201cad hoc\u201d routing and networking [3]."]} diff --git a/edge/graph_7480032.jsonl b/edge/graph_7480032.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db7d30a57daf136f02de7662448a3fcbb94c42a1 --- /dev/null +++ b/edge/graph_7480032.jsonl @@ -0,0 +1,4 @@ +{"17623347|1517662": []} +{"32533252|1517662": []} +{"32533252|6308019": []} +{"17204078|289357": ["From [30] the decision version of every problem in NP can be formulated as follows: Given x, decide whether there exists y so that |y| \u2264 m(x) and R(x, y)."]} diff --git a/edge/graph_7482876.jsonl b/edge/graph_7482876.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e26f4c6fdfadfe25c7073fc9262df51d10e74bdb --- /dev/null +++ b/edge/graph_7482876.jsonl @@ -0,0 +1,2 @@ +{"12681089|13367219": ["(1)\nHere, \u03c4, \u03c6, and \u03c8 denote the excess delay, the direction of departure (DoD), and the direction of arrival (DoA), respectively.1 Furthermore, L is the total number of MPCs (typically those above the noise level of the system considered)."]} +{"9184950|12681089": ["In general, there are three fundamental approaches to channel modeling: deterministic, stochastic, and geometry-based stochastic [6], [7]."]} diff --git a/edge/graph_7487572.jsonl b/edge/graph_7487572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ad628492e93b38f992d931677ee8b4925a6c469 --- /dev/null +++ b/edge/graph_7487572.jsonl @@ -0,0 +1,7 @@ +{"10970210|14415030": ["[27], an objective evaluation", "trasegment homogeneity and intersegment heterogeneity [27]."]} +{"10970210|8953108": ["Sezgin and Sankur [29] categorized thresholding methods into six groups according to the information that they exploit."]} +{"26771400|17054454": ["when large datasets are dealt with (Filippi and Jensen 2006; Xie et al. 2008).", "This is useful especially when there is a need to integrate the environmental variables (e.g. slope, soil type, and rainfall) in the mapping process (Xu et al. 2005; Xie et al. 2008).", "slope, soil type, and rainfall) in the mapping process (Xu et al. 2005; Xie et al. 2008).", "Spectral discrimination between vegetation types in complex environments is a challenging task, because commonly different vegetation types may possess the same spectral signature in remotely sensed images (Sha et al. 2008; Xie et al. 2008).", "One disadvantage of ANN, however, is that ANN can be computationally demanding to train the network when large datasets are dealt with (Filippi and Jensen 2006; Xie et al. 2008).", "\u2026the accuracy of wetland vegetation classification\nSpectral discrimination between vegetation types in complex environments is a challenging task, because commonly different vegetation types may possess the\nsame spectral signature in remotely sensed images (Sha et al. 2008; Xie et al. 2008)."]} +{"28170349|11894197": ["Feature selection in high-dimensional datasets is an important task in many fields such as bioinformatics (Saeys et al., 2007) or hyperspectral remote sensing (e.g. Guo et al., 2008), and typically targets a better performance of the algorithm classifying the data and/ or the investigation of\u2026", "Feature selection in high-dimensional datasets is an important task in many fields such as bioinformatics (Saeys et al., 2007) or hyperspectral remote sensing (e."]} +{"30537967|14415030": []} +{"14283205|16665885": ["This trend seems continuing and more applications areas would benefit from the advancements of the technologies and data sources (Blaschke et al., 2011; Weng, 2011)."]} +{"14283205|10859746": ["The early RS data had limited spatial, spectral and temporal resolutions which were the major cause of the limitation in RS based change detection methodologies (Boyd and Foody, 2011).", "The higher spatial resolution is also linked to the mixed pixel problem, which is considered as one of the largest source of error and uncertainty in land cover CD (Boyd and Foody, 2011)."]} diff --git a/edge/graph_7490636.jsonl b/edge/graph_7490636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69b408984a03eb585382ff904f446dd7163d3261 --- /dev/null +++ b/edge/graph_7490636.jsonl @@ -0,0 +1 @@ +{"122076795|7490636": []} diff --git a/edge/graph_7491882.jsonl b/edge/graph_7491882.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f8f20e639e6388fd5ba2b04751f6fc18fb71065 --- /dev/null +++ b/edge/graph_7491882.jsonl @@ -0,0 +1,5 @@ +{"14525867|469744": ["The reader interested in an in-depth survey should refer to [ 2 ].", "The main body of this research concentrates on the requirements of real-time systems [ 2 ].", "There is a lot of work to be done before this goal can be achieved, much of which is related to hardware, vision, registration and sensing (see [ 2 ] for more detail).", "The core research in this area concentrates on the problems related to registration and calibration for real-time systems (see for example [ 2 , 3])."]} +{"14525867|25699143": []} +{"17642000|11650495": []} +{"2454714|469744": ["These two approaches are presented in detail in the survey of Azuma [2] which also provides extensive references to related literature.", "been on registration and calibration [2]."]} +{"16718621|469744": ["Email: { imarik, ysato, ki } @iis.u-tokyo.ac.jp. 1 For a good survey of augmented reality technologies, see [1]. age of a real scene."]} diff --git a/edge/graph_7492478.jsonl b/edge/graph_7492478.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0afa23f0f98b327109e6fb7a47f5b1f3d471094 --- /dev/null +++ b/edge/graph_7492478.jsonl @@ -0,0 +1 @@ +{"5769709|9743176": []} diff --git a/edge/graph_7494281.jsonl b/edge/graph_7494281.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49316cce230833792d47660f8f57bf0ff6f524b2 --- /dev/null +++ b/edge/graph_7494281.jsonl @@ -0,0 +1,6 @@ +{"16274426|1987550": ["Conversely, a lack of a definitive characterization of the patient's point of view may be responsible in part for the uneven record of patient-directed ICT such as access to EMR"]} +{"26260116|184678": ["All of the above have been reported to be desirable characteristics of DSS [7,24\u201326].", "[26] M."]} +{"17406308|184678": []} +{"5332204|207014621": []} +{"7453444|8436865": ["The increased use of CPOE systems has been reported to enhance legibility, result in faster transmission of orders, support the user's decision-making processes, and reduce errors [11-14]."]} +{"7453444|184678": ["In spite of the enormous investment in HISs such as CPOEs, however, the outcomes of many implementations have not met all the expectations [18,35,36]."]} diff --git a/edge/graph_7495984.jsonl b/edge/graph_7495984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..259095264de8441b308fa736ad139becf440f186 --- /dev/null +++ b/edge/graph_7495984.jsonl @@ -0,0 +1,2 @@ +{"206778457|3083025": ["In addition, Wagner [29] and Runeson et al. [30] provide useful overviews in the form of systematic literature reviews.", "In addition Wagner [29] and Runeson et al."]} +{"12440710|206778480": []} diff --git a/edge/graph_7499451.jsonl b/edge/graph_7499451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f511c70cce515ba3167a09f3f0422f186850b95f --- /dev/null +++ b/edge/graph_7499451.jsonl @@ -0,0 +1 @@ +{"14227962|14077778": ["The binary algorithm and its variants [40], [41] can be used to efficiently compute mD."]} diff --git a/edge/graph_750172.jsonl b/edge/graph_750172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7505270.jsonl b/edge/graph_7505270.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..44295b0e9ff66d87b4e7f0a82d4b1030f811a713 --- /dev/null +++ b/edge/graph_7505270.jsonl @@ -0,0 +1,8 @@ +{"29231023|14561706": ["Given the contact regime, many possible behaviours can be put in place, depending on the meaning associated with the interaction [48]: the robot could retract from the object, move around the object while keeping contact, or exert a given pressure on the object, just to name but few."]} +{"2377574|1230643": ["Sensor networks, which represent one of the most common uses of smart systems, are surveyed in [41] and [42]."]} +{"24212846|1634674": ["A large number of such systems are exclusively based on cameras (Ji and Liu 2010; Turaga et al. 2008), while other systems use different kinds of sensors, like wearable (e.g. accelerometers, Kern et al. 2003; Khan et al. 2010; Zhu and Sheng 2009) or microphones (Ward et al. 2006) or passive ones\u2026", "A large number of such systems are exclusively based on cameras (Ji and Liu 2010; Turaga et al. 2008), while other systems use different kinds of sensors, like wearable (e."]} +{"4943136|192934": ["See [19] for further details on these different validation approaches."]} +{"14117914|10290908": []} +{"32884417|192934": ["Cross-validation is a well-established technique used in pattern recognition experiments to avoid training and testing on the same data when only small data sets are available (13).", "The first approach was n-fold cross validation (n-fold validation) (13)."]} +{"759452|8835588": ["The sort of contextual awareness coming from this knowledge [1] may help improving the performance of healthcare monitoring devices or promoting the development of advanced human-machine interfaces."]} +{"759452|192934": ["A widely used feature extraction method, that is, the principal component analysis (PCA), is also applied to feature vectors [25].", "Feature selection is required to limit the risk of incurring in severe over\ufb01tting [25]."]} diff --git a/edge/graph_7506263.jsonl b/edge/graph_7506263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7508118.jsonl b/edge/graph_7508118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97ded1b65801fb04390925e007dda6fbfe91195a --- /dev/null +++ b/edge/graph_7508118.jsonl @@ -0,0 +1,5 @@ +{"5218107|8296351": ["More details about the AAFM and its mappings, and details about the operations are available in [12].", "Many researchers have focused on the AAFM [11] [12], that currently offers over 30 different analysis operations, each of them solved by means of different declarative approaches such as constraint programming, SAT problems or binary decision diagrams.", "[12] define the AAFM as \u201cthe process of extracting information from FMs using automated mechanisms\u201d.", "In a FM, a product is a set of selected features that satisfies all the relationships and constraints [12].", "In order to obtain the list of available configurations, we use the All Products operation [12]."]} +{"167735615|6159806": ["Business processes and integration layer: Although there are significant advances in service and data integration [19,20] and service composition [21,22] in SOA, problems such as how to automatically discover various Web services (including services with text-based interfaces, people services, etc."]} +{"1227288|16332018": ["Besides the financial and technical benefits stemming from the use of computing, storage and networking resources in public cloud offerings, some improvements arise from the organizational point of view, mainly regarding an increased agility and an enhanced division of labour [1-3]."]} +{"13025|627405": ["To-date, there has not been a systematic literature review (SLR) of research on cloud migration, making it difficult to assess the maturity in general and identifying trends, research gaps, and future dimensions of cloud migration in particular."]} +{"765448|26336776": [", Online Analytical Processing (OLAP)), knowledge discovery, and data mining tools [14] each having an interface subsystem enabling them to communicate with the decision-maker.", "Data mining and other bknowledge discovery in databaseQ (KDD) tools, on the other hand, are specifically designed to identify relationships and brulesQ within the data warehouse [14]."]} diff --git a/graph_750942.jsonl b/edge/graph_750942.jsonl similarity index 100% rename from graph_750942.jsonl rename to edge/graph_750942.jsonl diff --git a/edge/graph_7512184.jsonl b/edge/graph_7512184.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1275fb4ddd86c8542268968d39777e9c9503130b --- /dev/null +++ b/edge/graph_7512184.jsonl @@ -0,0 +1,2 @@ +{"12103882|17774971": []} +{"12103882|192934": []} diff --git a/edge/graph_75135012.jsonl b/edge/graph_75135012.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c651580faa4c935bfbf8082b8c0eabc2d82bf18 --- /dev/null +++ b/edge/graph_75135012.jsonl @@ -0,0 +1,46 @@ +{"10807928|2623404": ["presented a survey on Software-Defined Networking, focusing on OpenFlow [9].", "In SDNs [9], the programmable data plane stops at the switching elements.", "Several manufacturers sell today programmable switches and routers [9], and there are many commercial and educational SDR platforms on the market [10], spanning several frequency bands.", "Authors in [9] also did not discuss the importance of network virtualization or data plane programmability.", "Currently, OpenFlow is also implemented in hardware on several commercial switches and routers [9]."]} +{"10807928|3189715": []} +{"108284773|2623404": ["plane responsible for enforcing forwarding decisions; for comprehensive surveys on software-defined networking, and the intellectual road that led there, see [21, 22, 23, 24]."]} +{"14357813|6913007": ["ATM switches need hard state since a circuit is established once at the beginning of a session, while OpenFlow switches can maintain soft state since they only cache information from the controller , and all packets of a flow are treated in the same way.", "ATM [22] follows a similar pattern where a virtual circuit is established across a network before packets traverse the network.", "OpenFlow uses the link, network, and transport layers to define a flow, while ATM operates on a single layer, namely the link layer."]} +{"6577255|8450611": ["Packet classification has been extensively studied over the past decade [4, 13]."]} +{"14549420|2623404": []} +{"16635530|10559330": ["While many solutions have been proposed for typical networks, such as DiffServ [1] or IntServ [2], vendorspecific hardware and management protocols make more complex their overall integration."]} +{"33118584|2623404": []} +{"33118584|10693567": []} +{"33118584|3189715": []} +{"14142010|2623404": ["In this paper, after arguing the need for more attention to the SDN data plane, we mention a few data plane related SDN work."]} +{"14142010|10693567": ["In this paper, after arguing the need for more attention to the SDN data plane, we mention a few data plane related SDN work."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"6816566|15035771": []} +{"17600697|10559330": ["IntServ allows\n\u2217 Corresponding author.", "Howver, each router in network needs to implement IntServ and each pplication that requires an individual reservation.", "In the case of a arge amount of service flows, IntServ has poor extensibility.", "It may change the existing information flow architecture, which centered at hardware, by granting more privileges to deploy third-party software with more flexible network control and management capabilities.", "Different from DiffServ, IntServ specifies a fine-grained QoS system, which contrasts to DiffServ\u2019s coarse-grained control system.", "DiffServ (Blake et al., 1998) and IntServ (Braden et al., 1994) are two representative QoS models in traditional IP networks."]} +{"26134989|2623404": []} +{"26134989|1956433": ["\u2026well established desirable features, such as \ufb02exibility, scalability, and simplicity [62], it is prone to several DoS and spoo\ufb01ng attacks, such as MAC \ufb02ooding, ARP poisoning, port stealing, and resource exhaustion attacks (for more information please refer to the Ethernet security survey in [33]).", "It monitors the MAC addresses on a switch port so as to limit the maximum number of MAC addresses that can be learned by the same port, and protect the Local Area Network against MAC spoo\ufb01ng and Forwarding Table over\ufb02ow attacks [33], [63].", "\u2026words, the security issues of stateful SDN data plane that we opened in this paper may be considered, to some extent, as a \u201csuperset\u201d of the security challenges that exist in already established networking contexts, such as Ethernet [33] or, more recently, Information-Centric Networking (ICN) [61]."]} +{"26134989|13172512": []} +{"3521666|13172512": ["Machine Learning (ML) tools are widely adopted by the networking community for detecting anomalies and classifying traffic patterns [41]."]} +{"10289379|2623404": ["And the OpenFlow is a representative protocol of SDN currently [27] .", "Its type coincides with OpenFlow that is why SDN controller suitable to place to cloud platform.", "Any OpenFlow switches handle the own area and report to the controller.", "Open Networking Foundation (ONF) proposed a new communications protocol called OpenFlow [26] that any forwarding switches adds the flow table for traffic forwarding.", "In short, the concept of OpenFlow controller is a centralization me approach."]} +{"18042732|3994942": ["Power saving mechanisms based on network and topology control are currently founded on the extension of traffic engineering and routing criteria to use (see [78] for a recent survey"]} +{"15531146|8450611": ["The process of classifying the packet and searching the flow table has been well studied [12], [13] and is known to be a time-consuming and critical stage in the switch pipeline."]} +{"22582078|9495329": ["However, an interesting argument of the works covered in [213] is that IoT urban deployments should allow for the same set of sensor nodes to support multiple applications from multiple developers across the same shared physical infrastructure via software only.", "Moreover, substantial research on interconnecting Wireless Sensor Networks (WSNs) into wider IoT frameworks by leveraging SDN and virtualization has already been completed [213], [218].", "We mention this work to provide another aspect of emerging technologies with regard to SDN-IoT infrastructure, and refer the reader to [213], [221], for a more complete overview.", "As a result, anywhere from 20 billion to 50 billion devices are projected to connect to the Internet by 2020 [213], and many network operators are also trying to adapt their networks for what is now being dubbed the Internet of Things (IoT).", "However, work to optimize \ufb02ow scheduling for the backbone network is still not fully developed [213].", "\u2026of application requirements as they relate to QoS and geographical sensor location, inner sensor node con\ufb01gurations, sharing of sensors amongst competing applications, transmitting optimized and QoS-aware data \ufb02ows towards end-servers, and ef\ufb01cient distribution of data for cloud processing [213].", "Additionally, fully centralized SDN controller architectures do not adequately address the different access networks expected to comprise the urban-scale IoT mobile multi-networks, such as LTE, WiFi, or ZigBee [213].", "For instance, the concept of Information-Centric Network (ICN) is combined with virtualization in [213] and [226] to provide network slicing and node caching within a wireless network.", "While we provide a brief description below, we refer the reader to [213] and [221] for further details.", "For instance, a natural application to address the heterogeneous QoS requirements of IoT is to include network slicing [213]."]} +{"22582078|6583734": ["A greater variety of network functions considered for NFV can be found in [2] and [114]."]} +{"22582078|2623404": ["Network operators are also challenged to address new routing protocols aimed at improving efficiency of content delivery and content availability for their clients [2], [58].", "One such architecture is Information-Centric Networking (ICN) or Content-Centric Networking (CCN) where packets are routed based on desired content instead of traditional, location-based, addressing [58]."]} +{"6799576|62179465": ["\u2026and thereby to bridge the gap between software and hardware programming (which promotes the widespread adoption of FPGAs), a number of projects strive to develop language frameworks that raise the level of abstraction from HDLs (two comprehensive reviews are available in [33], [34])."]} +{"28138182|2623404": ["The power savings could range between 25% and 62% under varying load conditions [82, 91].", "The datacenters networking elements consume about 10-20% of its total power which was around 3 billion kWh in 2006 only in the USA [82, 91]."]} +{"206896175|2257431": ["By contrast, Trie-based solutions are the most widely used ones because of their flexibility and expandability [12]."]} +{"9449343|8793295": ["Compared to traditional routing lookup method ZFilter implements faster, its latency and resource consumption remains unchanged in the case of increasing network traffic and has nothing to do with the number of nodes in the network.", "The NetFPGA-1G-CML is compatible with existing Xilinx design kits entirely."]} +{"2695288|5547019": ["Each thread runs on a separate CPU core attached to one of the Non-Uniform Memory Access (NUMA) [45] nodes on the machine."]} +{"32377418|2623404": ["Control granularity is another issue associated with SDN [45]."]} +{"32377418|3189715": ["I NTRODUCTION N ETWORK programmability was the main objective of two schools of thought that dominated the networking research agenda in the mid-90 s up until the early 2000 s: Active [1] and Programmable Networks [2] (A&PN)."]} +{"18319131|2623404": ["SDN: Network control in SDR is decoupled from forwarding and directly programmable, which enables the underlying infrastructure to be abstracted for applications and network services and treats the network as a logical or virtual entity [8]."]} +{"13561331|2623404": ["the \u201cdata plane\u201d) through a separate software-programmable \u201ccontrol plane\u201d [1]."]} +{"14045100|3189715": ["Network programmability was the main objective of the two converged schools of thought that dominated the networking research agenda in the mid-90s up until early-00s: Active [1] and Programmable Networks [2] (A&PN)."]} +{"68125237|25911553": ["Particular for the core network, the work of [37] surveys different virtualization architectures.", ", [17], [19], [37], and [39]), use-cases"]} +{"68125237|24110634": ["Wireless Sensor Network (WSN): By means of sensors that can measure physical and environmental parameters, a WSN collects data over a certain area and forwards them to a central location for processing [196]."]} +{"68125237|34643772": ["Security of SDN, as an important issue, has been surveyed in several articles, such as [21]\u2013[26]."]} +{"68125237|9495329": ["be connected to the Internet by the year 2020 [198]."]} +{"68125237|207262843": ["Regarding merging SDN with wireless, the work of [29] and [30] surveys general aspects in wireless and the work of [25] and [31]\u2013[33] focuses on SDN"]} +{"68125237|6583734": ["Other Surveys: The general aspects of NFV have been surveyed in [5] and [34]."]} +{"68125237|11414835": [", [4], [21], [38], and [44]), methodologies (e.", "The work of [44] surveys hypervisor implementations and proposes a performance", "In contrast to general surveys on SDN, NFV and NV [4], [5], [17]\u2013[44], we provide a new perspective on those softwarized network technologies focusing on network flexibility as a new metric for classification and as a potentially new quality indicator."]} +{"68125237|2535224": ["introduced to wireless area and thus provides much potentials, which are surveyed in [40], [40], [41]."]} +{"68125237|2623404": ["Other Surveys: References [4] and [17]\u2013[20] cover general aspects of SDN.", "In contrast to general surveys on SDN, NFV and NV [4], [5], [17]\u2013[44], we provide a new perspective on those softwarized network technologies focusing on network flexibility as a new metric for classification and as a potentially new quality indicator.", ", [17], [19], [37], and [39]), use-cases"]} +{"68125237|10693567": ["the reviewed research works performed in SDN, whereas [69] presents a systematic survey of up-to-date OpenFlow-based SDN programming languages and [28] surveys network inno-"]} +{"68125237|4269723": []} diff --git a/edge/graph_75137541.jsonl b/edge/graph_75137541.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4841bb42026aa4b0d90a150a4fe47272fc4d2ec7 --- /dev/null +++ b/edge/graph_75137541.jsonl @@ -0,0 +1,42 @@ +{"10361983|17772052": ["An excellent overview of the E-nose and techniques for processing the sensor responses can be referred to as [32], [33]."]} +{"4936510|7559976": ["How to reduce the difficulty and cost of collecting new training data has also driven enthusiasm for DA [3]."]} +{"2928248|5671282": ["Against this backdrop, hashing has emerged as one of the most popular and effective techniques due to its fast query speed and low memory cost [48]."]} +{"2928248|393948": ["Deep learning systems like deep CNNs learn representations of data that capture underlying factors of variation between different tasks in a multi-task transfer learning setting [3]."]} +{"67856389|85531295": ["Unsupervised and semi-supervised learning for addressing small data challenges play an vital role in big data era [1].", "Qi and Luo [1] contributed a high-rise building survey towards addressing small data challenges in big data era."]} +{"67856389|75137541": ["regression, and more recent advances in transfer learning and domain adaptation methodologies can be referred to as [49]."]} +{"67856389|3693305": []} +{"67856389|1596835": []} +{"1033682|174797842": []} +{"52169381|393948": ["tors of variation underlying data distributions and facilitate knowledge transfer [19], [33].", "Deep learning [33] has the ability to extract distributed representations for natural signals such as images and videos.", "learning methods may be restricted by weak representation power [33], while previous standard deep-learning methods may be restricted by weak adaptation efficacy [8], [13], [35].", "Deep networks can learn abstract representations that disentangle different explanatory factors of variation [33]."]} +{"13841056|393948": []} +{"2683207|4570087": ["This method assigns a uniform label distribution to the unlabeled images, which regularizes the supervised model and improves the baseline."]} +{"6600989|14303607": ["Interested readers may refer to [11, 21, 32] for more complete surveys of AU detection methods."]} +{"3654323|10092092": []} +{"3654323|2899523": [" sharply decreases in higher layers. Therefore, recent work has addressed this problem by deep DA, which combines deep learning and DA. There have been other surveys on TL and DA over the pastfewyears[67, 80,14,68, 109, 13]. Panetal. [67]categorizedTL underthreesubsettings,includinginductiveTL, transductiveTL,andunsupervisedTL,buttheyonlystudied homogeneous feature spaces. Shao et al. [80] categorized TL techniques into", "forth. In this section, we present different application examples using various visual deep DA methods. Because the information of commonly used datasets for evaluating the performance is provided in [109] in detail, we do not introduceit in this paper. 6.1. Image Classi\ufb01cation Because image classi\ufb01cation is a basic task of computervisionapplications,mostof the algorithmsmentioned above were originally", "e transfer. The surveywritten byPatel [68] onlyfocusedon DA, a subtopicof TL. [14] discussed 38 methods for heterogeneous TL that operate under various settings, requirements, and domains. Zhangetal. [109] werethe\ufb01rst to summarizeseveraltransferring criteria in detail from the concept level. These \ufb01ve surveys mentioned above only cover the methodologies on shallow TL or DA. The work presented by Csurka"]} +{"3654323|7559976": ["In one-step DA, the deep approaches can be summarized into three cases, which refers to [23] .", "[23] briefly analyzed the state-of-the-art shallow DA methods and categorized the deep DA methods into three subsettings based on training loss: classification loss, discrepancy loss and adver-", "hose from the survey papers by [18,23] to maintain consistency cross surveys."]} +{"1645469|393948": ["Convolutional Neural Networks (CNNs) are currently the state-of-the-art image classifiers [30, 29, 7, 23]."]} +{"1645469|8601873": ["Moreover, this method can be thought of as a Count-based Multiple Instance (CMI) learning method with two-level learning [49] which is a more general MIL assumption [20] than the Standard Multiple Instance (SMI) assumption."]} +{"252760|7559976": ["2839583 topic of transfer learning and many surveys in the recent years covering transfer learning and domain adaptation methods from different perspectives [1]\u2013[5].", "Domain adaptation (DA) is a specific case of transfer learning where the source and target domains have the same classes or categories [2], [3], [5]."]} +{"59159135|14843594": ["This distribution is then used to construct a surrogate utility function called acquisition function, which is cheap to evaluate and finally optimised to recommend the next function evaluation point while keeping a trade-off between exploitation and exploration [9,22]."]} +{"533239|14814753": ["However, harnessing the attained knowledge into a new application with limited labeled data (or even without having labels) is far beyond clear [33, 37, 19, 8, 51]."]} +{"3767412|43982203": []} +{"3767412|15033413": []} +{"56594323|18188725": ["[19] investigated the application of DL to machine health monitor."]} +{"56594323|15888893": []} +{"56594323|18078738": ["In general, the fault diagnosis methods can be classified into model-based, signal-based, knowledgebased and hybrid/active approaches [14]."]} +{"56594323|393948": ["In traditional machine learning methods, the handcrafted features should be predesigned, and it has been shown that these handcrafted features define the upper-bound performances of machine learning methods [7]."]} +{"46784066|393948": ["Recent studies reveal that deep networks learn more transferable representations that disentangle the explanatory factors of variations behind data (Bengio et al., 2013) and manifest invariant factors underlying different populations (Glorot et al.", "Two key properties prosper the deep learning applications (Bengio et al., 2013): discriminability and transferability.", "Recent studies reveal that deep networks learn more transferable representations that disentangle the explanatory factors of variations behind data (Bengio et al., 2013) and manifest invariant factors underlying different populations (Glorot et al., 2011; Oquab et al., 2013)."]} +{"85499473|7559976": ["Hence, in visual recognition tasks, classifier or model usually does not work well because of data bias between the distributions of the training and test data [1], [2] [3], [4], [5], [6], [7]."]} +{"2078144|393948": ["classifiers, whereas decision tree or kernel SVMs are believed to have two layers [24].", "The widely used PCA and ICA are singlelayer learning methods [24]."]} +{"12757870|393948": ["Recent studies reveal that deep networks (Bengio et al., 2013) can learn more transferable representations than traditional hand-crafted features (Oquab et al.", "Deep networks learn abstract representations that disentangle the explanatory factors of variations behind data (Bengio et al., 2013) and extract transferable factors underlying different populations (Glorot et al."]} +{"12825123|393948": ["Feature learning has been of a great interest in the machine learning community since the emergence of deep learning (see [4] and references therein)."]} +{"3761015|2670121": ["As a reference, the survey paper by Cook [19] covers transfer learning for the application of activity recognition and the survey papers by Patel [89] and Shao [103] address transfer learning in the domain of image recognition.", "Cook [19] and Feuz [36] provide a different variation where the definition of supervised or unsupervised refers to the presence or absence of labeled data in the source domain and informed or uninformed refers to the presence or absence of labeled data in the target domain."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"54035096|14843594": ["Indeed, these are required to compute the acquisition function, which is instrumental to identify the most promising hyperparameters to evaluate (see [1] for a review and possible acquisition functions).", ",x selected according to an explore-exploit trade-off criterion or acquisition function [2, 3, 1].", "Bayesian optimization (BO) is a well-established methodology to optimize expensive black-box functions [1]."]} +{"206592484|456491": []} +{"745350|393948": []} +{"1283257|1634674": ["Interested readers may refer to [45] for a recent survey."]} +{"21011865|2323881": []} +{"21011865|393948": []} +{"23042392|2323881": ["Up to now, the key ability of Pose-Invariant Face Recognition (PIFR) desired by real-world applications is far from solved [4], [5], [6], [7], [8]."]} +{"23042392|393948": ["Representation Learning Designing the appropriate objectives for learning a good representation is an open question [39]."]} diff --git a/edge/graph_75137590.jsonl b/edge/graph_75137590.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b247913fff67010261e793d3b3b2fd63d6ae737 --- /dev/null +++ b/edge/graph_75137590.jsonl @@ -0,0 +1,14 @@ +{"5973835|17397315": ["Security and privacy concerns of MapReduce applications are discussed in [15]."]} +{"20100319|16153186": []} +{"20100319|8690743": []} +{"22269|1442447": ["\u2026objects which have different operating conditions, functionalities, resolutions, etc. [12], providing seamless integration of these devices is a huge challenge, and this issue may hinder object interoperability and slow down the improvement of a unified reference model for the IoT [18].", "We discuss each layer below.", "We will discuss each layer in the general IoT architecture as well as its entities and functionalities."]} +{"22269|206583943": ["Objects could be identified by physically attached tags such as RFID tag [49], or they may be addressed by Internet protocols such as IPv6 [75]."]} +{"8728283|2795037": []} +{"8728283|8125630": []} +{"13952692|1442447": ["In general, all proposed IoT architectures [9, 13, 20, 36, 55] have three layers: object, middleware (with multiple sub-layers) and application layer.", "Further, the issues related to object connectivity, scalability, object and service discovery, security and privacy, quality management, and identification are challenges in any IoT system [55]."]} +{"28953075|1442447": ["Virtual objects are the digital counterparts of real physical devices, or standalone logical entities (applications) in the virtual space [24]."]} +{"14354625|16125167": ["For information on obtaining reprints of this article, please send e-mail to: reprints@ieee.org, and reference the Digital Object Identifier below."]} +{"14354625|9236463": ["The proposed approach is general, platform independent and it can be used with most of the existing relational DBMSs."]} +{"14354625|16378248": ["For the sake of simplicity, in this paper, we describe the enforcement mechanism for queries only."]} +{"13953391|1442447": ["architecture is to integrate Cloud computing and its benefits in IoT, and incorporate the concept of virtual objects (VOs) [24]", "layers of the architecture, have been proposed in the literature [1], [3]\u2013[5], [7], [20], [24]\u2013[27].", "The authors in [6] also discussed different types of VO to physical object association\u2014one(or less)-to-one, manyto-one, one-to-many, and many-to-many associations [24]."]} +{"13953391|21386749": ["[21] discusses the state-of-art of IoT in health care, along with various medical IoT devices, services, applications, and use case scenarios."]} diff --git a/edge/graph_75138750.jsonl b/edge/graph_75138750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..772e80cc2ac2d47b025b4944b465fa28afe0961b --- /dev/null +++ b/edge/graph_75138750.jsonl @@ -0,0 +1,9 @@ +{"20833573|31245252": ["The Internet of Things (IoT) has developed rapidly in recent years, and is considered to be the next frontier in industrial evolution [1], [2], [3], [4]."]} +{"14666485|713082": []} +{"8223549|5313655": ["Biometric template protection schemes [37] are commonly categorized as biometric cryptosystems and cancelable biometrics.", "Resistance to false matches and comparison speed, which is achieved by various existing approaches [40], are vital for any large-scale biometric deployments."]} +{"44747671|5313655": []} +{"46741793|5313655": []} +{"40150313|5313655": []} +{"62143565|17403085": ["Choudhary et al. [34] have discussed the concept of data mining has emerged as an important tool for knowledge acquisition from the large-scale data."]} +{"3761653|9188816": []} +{"25794508|2257431": ["The number of trie accesses is 32 for IPv4 in the worst-case [4].", "The classless inter-domain routing (CIDR) scheme [2] allows prefixes to have arbitrary lengths, and the IP address lookup performs the task of finding the longest matching prefix [1], [3], [4], [5], [6]."]} diff --git a/edge/graph_75138979.jsonl b/edge/graph_75138979.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e9bcc0b3a1c17ab65ec78b2a5a09d97c2854841 --- /dev/null +++ b/edge/graph_75138979.jsonl @@ -0,0 +1,25 @@ +{"1482463|8983048": ["Among all the existing surveys (Table 1), [11]\u2013[15] focus on rigid registration only."]} +{"1482463|7861381": ["We further discuss the problem of over-\ufb01tting and provides up-to-date references beyond those in existing surveys."]} +{"15312782|6681074": ["We begin with a review of the relevant registration algorithms according to the taxonomy in Fig. 1. A survey by Campbell and Flynn provides additional details on these algorithms [ 2 ]."]} +{"6198785|15093118": ["The optical flow was also proposed to analyze road scenes [9], [118].", "The framework of vehicle tracking and behavior analysis [9].", "sure dynamics and motion characteristics and to predict and estimate the upcoming position of vehicles [9].", "Key developments on vehicle detection were summarized in [9] and [101].", "Haar features are sensitive to vertical, horizontal, and symmetric structures [9].", "Compared with Radar and LiDAR, the raw measurement of vision sensor is the light intensity [9].", "The vehicle detection methods can be categorized into appearance-based and motionbased [9]."]} +{"6198785|206739910": ["As the detection step is coupled with the feature extraction step, the choice of detection method depends on the features from the previous stage [63].", "Results for detection with these data sets and tracking are presented in [63] and [64]."]} +{"53082703|16169670": ["IN THE field of computer vision, a myriad of tasks requires finding corresponding features across two or more views, including object recognition [1], image retrieval [2], stereo and motion estimation [3], and camera self-calibration [4], etc."]} +{"20143867|393948": ["Typical gradient-based backpropagation algorithm can be used for training single AE [34], [35].", "Speci\ufb01cally, we introduce a stacked autoencoder (SAE) [34], [37], [38], [42] with convolutional network architecture [41], [43] into our un-supervised learning framework.", "However, since the learned features are found using only a single layer, or a shallow model [34], the selected features may lack high-level perception knowledge (e.g., shape and context information) and may not be suitable for correspondence detection.", "Recently, unsupervised deep learning feature selection techniques have been successfully applied to solve many dif\ufb01cult computer vision problems [30], [34]\u2013[42]."]} +{"20143867|206051485": ["2496253 individual subjects to the reference space [1]\u2013[5]."]} +{"2533992|1482463": []} +{"2533992|8983048": ["Many of those problems have been addressed using graph theory by taking advantage of the structural information available in graphs."]} +{"2533992|7064380": ["In the conclusions section, we will discuss some research directions that we are currently developing in order to address some of the previously mentioned problems."]} +{"116055117|5660618": ["The time stamp represents the time instant at which information was sent [34]."]} +{"13801702|1482463": ["C V ] 13 N ov 2015 techniques [31] for additional background."]} +{"40016795|206051485": []} +{"3327978|2323881": ["W ITH the rapid development of computer vision applications, point set registration technology, widely researched in pattern recognition and computer vision domains, for instance face recognition [1], stereo matching [2], and shape recognition [3]\u2013[6], has received great attention over the last few decades."]} +{"38715207|206051485": ["INTRODUCTION IMAGE registration is the process of aligning two or more images of the same scene taken at different times, from different viewpoints, and/or by different sensors [1]\u2013[4]."]} +{"7695831|8985853": ["image registration methods can be found in the literature [1], [3], [22], [25]."]} +{"7695831|206051485": ["types: correlation-like methods, Fourier methods, and mutual information (MI) methods [1].", "image registration methods can be found in the literature [1], [3], [22], [25].", "We assume that the extracted features are represented by spatial points, which are also called control points in the literature [1].", "[12]\u2013[15], image analysis [16]\u2013[20], and particularly in the field of remote sensing [1], [21]\u2013[24]."]} +{"1860870|206051485": ["In the past decade, ICP has been widely used to solve correspondence problems in image, shape, and surface registration [53], [54] due to its simplicity and low computational complexity."]} +{"3604585|1482463": []} +{"3056143|1482463": []} +{"24290546|1482463": ["It is shown that these probabilistic methods achieve superior performance compared with the ICP algorithm, particularly in the presence of noise and outliers [6].", "Motivated by the limitations of existing algorithms, several probabilistic methods have been developed recently [6], [15], [16].", ", human-assisted, feature-based, and optimization-based algorithms [6]\u2013[8]."]} +{"24290546|8983048": ["Examples include the iterative closest point (ICP) algorithm [11] and its variants [12], [13], and the genetic algorithm [14]."]} +{"3302713|206051485": ["But the intensity-based methods suffer from the flatness of the similarity measure maxima, monotonous textures, and high computational complexity [1].", "Generally speaking, remote sensing image registration methods can be coarsely classified into two categories: intensity-based methods and feature-based methods [1]."]} +{"69656473|36510460": ["Sampling-based planning occurs by randomly sampling in C-space, which was first proposed to overcome the complexity of deterministic planning for multidegree-of-freedom robots [9], and two typical algorithms are probabilistic road", "Sampling-based planning and graph search-based planning are the popular global path planning methods [9]\u2013[13]."]} diff --git a/edge/graph_75139454.jsonl b/edge/graph_75139454.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7514019.jsonl b/edge/graph_7514019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c25611de7ba872b1503684ab423218b92b91b02d --- /dev/null +++ b/edge/graph_7514019.jsonl @@ -0,0 +1,2 @@ +{"12655150|2457428": ["The group key upgrade of group communication has been widely studied, and it is out of scope for this paper and speci\ufb01c technology can be found in reference [37,38]."]} +{"63771785|16209841": ["In this sense, there is another level of security to the system by checking SN/LAI parameters in addition to the public keyin the call setup processes by default [18]."]} diff --git a/edge/graph_7514463.jsonl b/edge/graph_7514463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f10cb874b56aae3cbabe8db753e8843f5c80f3e1 --- /dev/null +++ b/edge/graph_7514463.jsonl @@ -0,0 +1,6 @@ +{"195428750|1230643": []} +{"17872696|205286988": []} +{"18524321|1236072": []} +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"16379937|1230643": ["The two-tiered network architecture is motivated by recent advances in distributed source coding (DSC) [5], [17], [21], which can exploit redundancy in information collected among neighboring sensors without intersensor communications (Slepian\u2013Wolf [23] and Wyner\u2013Ziv [26] theorems)."]} diff --git a/edge/graph_7514821.jsonl b/edge/graph_7514821.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7515516.jsonl b/edge/graph_7515516.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a074311486cb96e24115814016abe85f02ed352b --- /dev/null +++ b/edge/graph_7515516.jsonl @@ -0,0 +1 @@ +{"1777|7515516": ["Current models of text comprehension (Johnson-Laird, 1983; Schmalhofer and Glavanov, 1986; van Dijk and Kintsch, 1983) assume, in addition to the surface form (or verbatim) representation, two distinct, but interacting, levels of cognitive representation: (1) the textbase or propositional\u2026"]} diff --git a/edge/graph_7516226.jsonl b/edge/graph_7516226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20159e72be774155b97c86084148372dc616096d --- /dev/null +++ b/edge/graph_7516226.jsonl @@ -0,0 +1,7 @@ +{"11627662|12083425": ["The current paradigm in the control of wind- or solar-power generators is to extract the maximum power from the power source and inject them all into the power grid (see, for example, [1]\u2013[3])."]} +{"12083425|17774971": ["Moreover, the multilevel converters have the lowest demands for the input filters or alternatively reduced number of commutations [19]."]} +{"59131557|17381415": []} +{"33950406|17381415": ["The majority of distributed resources are interfaced to the utility grid/loads via dc\u2013ac inverter systems [3], [4]."]} +{"7601155|6875365": []} +{"111315392|17381415": []} +{"40691149|17381415": ["working on a \u03b1\u03b2 stationary reference frame [33].", "where kP is the proportional gain, kR is the resonant gain at the grid frequency, kih is the resonant gain at the h-harmonic to be controlled, and \u03c9o is the detected fundamental frequency [33]."]} diff --git a/edge/graph_7518222.jsonl b/edge/graph_7518222.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7520193.jsonl b/edge/graph_7520193.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7525856.jsonl b/edge/graph_7525856.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85f27d8759f021ac3f3cbc4c85cb58f0734820f6 --- /dev/null +++ b/edge/graph_7525856.jsonl @@ -0,0 +1,21 @@ +{"2509135|12452682": []} +{"37925315|12681089": []} +{"14436761|12601073": ["In this context, exploring new sensing techniques that can provide better sensing efficiency in the presence of noise correlation is an important research challenge [33]."]} +{"20886410|15116409": ["In the above context, Compressive Sensing (CS) has emerged as an important technique which can significantly reduce the acquisition cost at the CR node [10, 11].", "However, in compressive wideband systems, the required number of measurements to achieve a successful recovery rate proportionally varies with the sparsity order of wideband signals [11, 23]."]} +{"22699629|2509135": []} +{"8034286|8909218": []} +{"13039460|15116409": ["In the above context, Compressive Sensing (CS) has emerged as an important technique which can significantly reduce the acquisition cost at the CR node [10, 11].", "However, in compressive wideband systems, the required number of measurements to achieve a successful recovery rate proportionally varies with the sparsity order of wideband signals [11, 23]."]} +{"7531600|7525856": ["\u2026or measurements than those required by the conventional non-CS based methods [6\u20138], has recently received important attention in solving various problems in WSNs in addition to its applications in several other areas such as digital image processing, radar imaging, Cognitive Radio (CR) [9\u201311], etc."]} +{"7531600|17325804": ["In addition, determining the physical location of targets such as wireless transmit nodes is a fundamental requirement and a key challenge in WSN applications."]} +{"11218804|15116409": ["An alternative approach is to directly sense a wide frequency range at the same time, the so-called Wideband Spectrum Sensing (WSS) (see [9] and the reference therein)."]} +{"11218804|2509135": []} +{"4122595|15116409": ["of the examples are [11]: (i) Random Filtering, (ii) Com-"]} +{"4122595|8974063": []} +{"4122595|2509135": []} +{"4122595|12601073": ["Several survey papers exist in the literature in the context of CR communications covering a wide range of areas such as spectrum occupancy measurement campaigns [8], Spectrum Sensing (SS) [9]\u2013[13], spectrum management [14], emerging applications [15], spectrum decision [16], spect rum assignment [17], spectrum access strategies [18], resourc e allocation [19], [20], machine-learning techniques [21] a nd"]} +{"53524198|11720829": []} +{"8316997|2509135": ["The basic idea of Cognitive Radio (CR) is spectral reusing or spectrum sharing, which allows the unlicensed users to communicate over licensed spectrum when the licensed holders are not fully utilizing it [2]."]} +{"8974063|8443371": ["For a detailed comparison of different CR platforms see [88], where five different platforms are discussed and compared: the Universal Software Radio Peripheral (USRP) hardware [89] and GNU Radio software [90] platform; the Wireless Open Access Research Platform (WARP); the OpenAirInterface."]} +{"8974063|5621151": ["In the absence of signalling between PUs and SUs, spectrum holes may be identified by performing direct spectrum sensing, using geo-location databases, beaconing techniques, or by combining spectrum sensing with geo-location database information [7], [12].", "TVWS refers to large portions of RF spectrum, in the very high frequency (VHF) and ultra high frequency (UHF) bands, that will become vacant after the switch-over from analogue to digital TV [7].", "22 standard would be in sparsely populated rural areas [7]."]} +{"14427335|33286487": ["Window Fourier transforms and wavelet transforms are examples of time-frequency signal decomposition that have been studied thoroughly [2], [5], [13], [15]."]} +{"24856074|2509135": ["If signal of a primary user is known to a cognitive network, matched filter detection can be used by performing coherence detection of received signal to maximize SNR [38] [39]."]} diff --git a/edge/graph_7529332.jsonl b/edge/graph_7529332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7530272.jsonl b/edge/graph_7530272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78d294392443f88f6056779bcf6adb64d96ac80d --- /dev/null +++ b/edge/graph_7530272.jsonl @@ -0,0 +1 @@ +{"13215643|6923178": ["A \"*\" in the HMM-ModE and HMM-Sub columns indicates that the number of false positive sequences picked up by the HMMER profile from the negative training data were not sufficient to build a false positive profile. tivity, specificity and MCC (Matthews Correlation Coefficient)[22] distributions for 10 sets of each sample were obtained.", "tivity, specificity and MCC (Matthews Correlation Coefficient)[22] distributions for 10 sets of each sample were obtained.", "It is apparent that the MCC distribution is successively broader and has a higher maximum with each method, corresponding to increased discrimination between the positive and negative datasets.", "From different measures of estimating classification accuracy, we choose the mode of the Matthews Correlation Coefficient (MCC) [22] distribution as the optimal threshold (referred henceforth in the A multiple alignment showing the common fold specific signals, along with the group specific sub-family function specific signals Figure 1 A multiple alignment showing the common fold specific signals, along with the group specific sub-family function specific signals .", "We use the mode of the average MCC distribution as the optimal discrimination threshold.", "An average MCC distribution for the 10 sets for a particular sample was plotted as a function of the scores.", "From different measures of estimating classification accuracy, we choose the mode of the Matthews Correlation Coefficient (MCC) [22] distribution as the optimal threshold (referred henceforth in the", "The optimal discrimination threshold was identified as the mid point corresponding to the mode valueof the average MCC distribution.", "Receiver-Operator Characteristic curves (1-specificity v/s sensitivity) [22] show that the discriminating potential of the default HMM profile is inherently high and that the poor specificity of the HMM, generated from positive training sequences, results from the default threshold based on null probabilities (Figure 2)."]} diff --git a/edge/graph_7547341.jsonl b/edge/graph_7547341.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f9363fefac2d3fcc56dd53ab95118d9f41d4cf0 --- /dev/null +++ b/edge/graph_7547341.jsonl @@ -0,0 +1,2 @@ +{"131998|17323154": ["They are usually seen as complementary rather than alternative to the search engine [2]."]} +{"13074517|17323154": ["In the past few years, Web clustering engines (Carpineto et al., 2009) have been proposed as a solution to the lexical ambiguity issue in Web Information Retrieval.", "Approaches to search result clustering can be classi\ufb01ed as data-centric or description-centric (Carpineto et al., 2009).", "Approaches to search result clustering can be classified as data-centric or description-centric (Carpineto et al., 2009)."]} diff --git a/edge/graph_7559976.jsonl b/edge/graph_7559976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..463a5210dcff18dd9091a7be332e5cc667e2c085 --- /dev/null +++ b/edge/graph_7559976.jsonl @@ -0,0 +1,24 @@ +{"17343872|195346070": ["Following recent works [18, 29, 47], MOT approaches can be divided into three main categories: (i) Association-Based Tracking (ABT), (ii) Category-Free Tracking (CFT) and (iii) Category-to-Instance Tracking (CIT)."]} +{"17343872|10355303": [", [19, 21, 27, 50], can be considered as an extension of the categoryfree single target approaches to the MOT setting."]} +{"1033682|174797842": []} +{"1920011|206764452": []} +{"6600989|14303607": ["Interested readers may refer to [11, 21, 32] for more complete surveys of AU detection methods."]} +{"3304692|6627566": ["This approach differs from most work on conventional recognition [33] where images are categorically and strongly annotated - or derived from a heavily curated source such as an eCommerce website selling a catalogued array of products."]} +{"29565270|6028805": ["Midwave-infrared and longwave-infrared (LWIR), also referred to as \u201cthermal infrared\u201d, is suitable for non-intrusive and covert low-light and nighttime acquisition for surveillance [9]."]} +{"1496418|206764452": ["Sets T tr X , X 2 fD; I ;Vg, are of such a type, and passive learning is the most widespread in pedestrian detection [3].", "PEDESTRIAN detection is of paramount interest in fields such as driving assistance, surveillance and media analysis [1], [2], [3], [4]."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"11164391|206764452": ["The lack of publicly available large datasets for pedestrian detection in the ADAS context has been a recurrent problem for years [6, 8, 11].", "Accordingly, research on image-based pedestrian detection for this task has been a very relevant topic for the Computer Vision community [8, 10, 11]."]} +{"11164391|1029120": ["Accordingly, research on image-based pedestrian detection for this task has been a very relevant topic for the Computer Vision community [8, 10, 11]."]} +{"11164391|192934": ["We can hypothesize that larger training sets are likely to have higher variability, which seems to be confirmed by the fact that classification performance tends to increase with the size of the training sets in general [12] and for some pedestrian classifiers [14]."]} +{"9224545|206764452": ["The reader is referred to [2] for a comprehensive review on pedestrian detection, to [1] and [3] for accuracy comparisons of different proposals, and as well as to [4] and [5] where the focus is on reaching real-time processing.", "Vision-based detectors consist of several processing stages [1], [2], namely the generation of image candidate windows, their classi\ufb01cation as pedestrian or background , the re\ufb01nement into a single detection of multiple ones arising from the same pedestrian, and tracking of the detections for\u2026"]} +{"12308197|12161567": []} +{"12308197|393948": []} +{"12308197|12204996": []} +{"12308197|10087812": []} +{"12757870|393948": ["Recent studies reveal that deep networks (Bengio et al., 2013) can learn more transferable representations than traditional hand-crafted features (Oquab et al.", "Deep networks learn abstract representations that disentangle the explanatory factors of variations behind data (Bengio et al., 2013) and extract transferable factors underlying different populations (Glorot et al."]} +{"12825123|393948": ["Feature learning has been of a great interest in the machine learning community since the emergence of deep learning (see [4] and references therein)."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} +{"206592484|456491": []} +{"1283257|1634674": ["Interested readers may refer to [45] for a recent survey."]} +{"7322495|192934": ["We conducted experiments on two types of data, text data and image data, using Amazon product reviews [15] and UCI handwritten digits [11] respectively."]} +{"8056190|15273230": ["A more detailed discussion of classification method developed for imbalanced training data can be found in ref [12].", "Although the issue of imbalanced distributions have been well studied in traditional classification [12,13], yet how to handle imbalanced distributions in source domains is a topic seldom discussed in the literature of transfer learning."]} diff --git a/edge/graph_7560874.jsonl b/edge/graph_7560874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f3a83f23502d3fee50e62af5cced1bbfa382770 --- /dev/null +++ b/edge/graph_7560874.jsonl @@ -0,0 +1,5 @@ +{"7674372|30443041": ["The spectrum sensing problem may be most effectively solved from a pattern recognition perspective; alternatively, the theory of robust detection [8] may prove to be another useful tool."]} +{"38475430|453954": []} +{"20114564|453954": []} +{"51187156|11720829": ["A low-complexity receiver is constituted by the Zero-Forcing (ZF) or the Minimum Mean Square Error (MMSE) technique [67,68]."]} +{"51187156|18148591": ["Soon after its invention, the technology seems to have the potential to be part of large-scale standards-driven commercial wireless products and networks such as broadband wireless access systems, wireless local area networks (WLAN), third-generation (3G) networks and beyond [1]."]} diff --git a/edge/graph_7561567.jsonl b/edge/graph_7561567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4cfc2721672de632bcf3bc7bab29e851f065716e --- /dev/null +++ b/edge/graph_7561567.jsonl @@ -0,0 +1 @@ +{"17855966|14047190": ["Second, as described in [27], \u201cIn spite of the practical importance of this estimate [cross validation], relatively little is known about its theoretical properties\u201d."]} diff --git a/edge/graph_7564503.jsonl b/edge/graph_7564503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7567339.jsonl b/edge/graph_7567339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c08b94b7e5a8dc7990705ac844a914916717027 --- /dev/null +++ b/edge/graph_7567339.jsonl @@ -0,0 +1,8 @@ +{"59022026|14441987": []} +{"8462444|1236072": ["used in [6], tinyCPN is a flat protocol as all motes are given equal routing roles, but incorporates support for QoS goal based routing."]} +{"8462444|1230643": ["The smart message goal function uses values from the set [3, 7, 11, 15, 19, 23, 27, 31] which correspond to each of these levels.", "Wireless sensor networks [3] consist of many such lowcost battery powered devices (or motes), each of which may have one or more on-board sensors."]} +{"6572269|1230643": []} +{"18807489|10287248": ["There has also been much work on schemes for obtaining better QoS through routing (Chen and Nahrstedt 1998; Yin-Dar Lin et al. 2002; Nelakuditi and 2002), on scheduling techniques in routers to achieve desired QoS objectives (Hao et al. 2002), as well as on the analysis of QoS resulting from the\u2026", "There has also been much work on schemes for obtaining better QoS through routing [6, 14, 15], on scheduling techniques in routers to achieve desired QoS objectives [13], as well as on the analysis of QoS resulting from the detailed behavior of protocols such as TCP/IP."]} +{"14347217|14379823": []} +{"18226996|14441987": ["The area of ad hoc routing has been very active in recent years, and there appear to be two welldefined trends in the design of routing protocols for mobile ad hoc networks: table driven protocols (proactive protocols) and source-initiated ondemand driven protocols (reactive protocols) [6]."]} +{"2070338|10559330": ["In IntServ&RSVP [2], [3], [4], a packet is sent out to negotiate resource reservations with the network, so that the QoS of the connection is ensured."]} diff --git a/edge/graph_75696.jsonl b/edge/graph_75696.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7572837.jsonl b/edge/graph_7572837.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7578252.jsonl b/edge/graph_7578252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7583666.jsonl b/edge/graph_7583666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6379eadc6efa37fdb5c13838a869b36151068fda --- /dev/null +++ b/edge/graph_7583666.jsonl @@ -0,0 +1 @@ +{"15407453|12947542": []} diff --git a/edge/graph_7585339.jsonl b/edge/graph_7585339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e3c363f9d875d9d52265dab6adc3e5e75a49ef7 --- /dev/null +++ b/edge/graph_7585339.jsonl @@ -0,0 +1,2 @@ +{"15783159|6923178": ["As a result, we have to perform a cross-validation [21] and a ROC curve to compare true-positive and false-positive results generated with the different MSA methods."]} +{"22626416|1507400": ["Additionally Map-Reduce programming paradigm [1][2][3] introduces a new approach to the development of large-scale, fault-tolerant, data-intensive applications on a cluster of commodity machines."]} diff --git a/edge/graph_7593875.jsonl b/edge/graph_7593875.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a92654fc067dca7bbe0c8521b0bd8bc210633b9 --- /dev/null +++ b/edge/graph_7593875.jsonl @@ -0,0 +1 @@ +{"16293323|14441987": ["To combat this DoS attack a proactive [10] scheme is proposed in section 3."]} diff --git a/edge/graph_7595383.jsonl b/edge/graph_7595383.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c5aab2189bdbea13d252bc404f0fbbf141df4530 --- /dev/null +++ b/edge/graph_7595383.jsonl @@ -0,0 +1,2 @@ +{"11765166|10162051": ["An overview and comparison of these and other related projects is given in [18]."]} +{"4474342|10162051": []} diff --git a/edge/graph_7597857.jsonl b/edge/graph_7597857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c7e2369cd96a8d2bbbcda340b854c60e25151078 --- /dev/null +++ b/edge/graph_7597857.jsonl @@ -0,0 +1 @@ +{"6522238|5473785": ["(See [12]\u2013[14] for textbook treatments on probability or \" belief \" Manuscript received September 27, 1996; revised May 8, 1997 and July 29, 1997."]} diff --git a/edge/graph_7601289.jsonl b/edge/graph_7601289.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8e0306fb7bae9ada4dae29ee0ec436fcd745bf6 --- /dev/null +++ b/edge/graph_7601289.jsonl @@ -0,0 +1,2 @@ +{"6970737|14441987": ["Mobile Ad Hoc Networks (MANETs) [38] are networks in which all nodes are mobile and communicate with each other via wireless connections."]} +{"6970737|1762301": ["In recent years a large number of MANET routing algorithm have been proposed (see [1] for an overview)."]} diff --git a/edge/graph_7607134.jsonl b/edge/graph_7607134.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7608141.jsonl b/edge/graph_7608141.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e9f1c56a744ba3b0f837f98e013ec6faa5a4212 --- /dev/null +++ b/edge/graph_7608141.jsonl @@ -0,0 +1,12 @@ +{"27996|4626023": ["Over 36 corpora have been generated in the biomedical field [12] already.", "In addition to the MyMiner tool, the systems Brat and Knowtator were examined [12]."]} +{"27996|8310135": ["Also the ending or beginning of words (affixes) and the presence of particular terms found in a list (gazetteer) of precompiled names are often exploited by NER systems [10,11] and can help identify a word\u2019s morphology (inflections, gerund, pronouns, etc.", "units including names of persons, organizations or locations [10].", "Although early NER taggers typically relied on hand-crafted rules, the current trend increasingly points towards the use of supervised machine learning techniques for entity recognition [10]."]} +{"15279105|17324444": []} +{"15279105|18090012": ["[40]), the presence of large amounts of fragmented and ungrammatical utterances, including misspellings, an abundance of short forms (such as acronyms or other types of abbreviations), and frequent spelling variation (see the survey by Meystre et al."]} +{"15279105|2809360": ["[5], for approaches dealing with these matters)."]} +{"15279105|15326253": []} +{"8410430|431089": []} +{"16600729|11894197": []} +{"639151|8310135": ["Nadeau and Sekine [19] present a complete survey on features used in general NER solutions."]} +{"10539461|11591301": ["Wiegand et al. (2010) present a survey of the role of negation in sentiment analysis.", "Wiegand et al. (2010) present a survey of the role of negation in sentiment analysis. They indicate that it is necessary to perform fine-grained linguistic analysis in order to extract features for machine learning or rule-based opinion analysis systems. The features allow the incorporation of information about linguistic phenomena such as negation (Wiegand et al. 2010, page 60). Early approaches made use of negation in a bag-of-words model by prefixing a word x with a negation marker if a negation word was detected immediately preceding x (Pang, Lee, and Vaithyanathan 2002). Thus x and NOT x were treated as two completely separate features. Although this model is relatively simple to compute and leads to an improvement over a bag-ofwords model without negation, Pang, Lee, and Vaithyanathan (2002) found that the effect of adding negation was relatively small, possibly because the introduction of additional features corresponding to negated words increases the feature space", "The features allow the incorporation of information about linguistic phenomena such as negation (Wiegand et al. 2010, page 60)."]} +{"21149946|431089": []} +{"5261517|431089": ["Background Due to the ever-increasing amount of scientific articles in the bio-medical domain, Text Mining (TM) has been recognized as one of the key technologies for future bio-medical research [1-8]."]} diff --git a/edge/graph_76085493.jsonl b/edge/graph_76085493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7611714.jsonl b/edge/graph_7611714.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7612918.jsonl b/edge/graph_7612918.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba57d981b8f95bf2a3d7e059233e88b576cbcc1a --- /dev/null +++ b/edge/graph_7612918.jsonl @@ -0,0 +1,13 @@ +{"8379813|2481856": ["Traceability is implemented by explicitly linking in each phase transition the input model (or code) elements with the corresponding output model elements generated by the model transformations executed in that phase[7]."]} +{"4358339|26528956": ["Currently, the migration of traditional Web applications to CMS platforms is not even addressed by any model-driven reengineering method according to the literature review performed in [8]."]} +{"28047871|13867632": ["The majority of these produce in one single step a UML model derived from the source code [22]."]} +{"18627717|16125167": [", the exploitation of dynamic information is still not popular in mainstream tools despite the large amount of research in the dynamic analysis field [35]."]} +{"207643890|26528956": ["The CMS model conforms to the CMS Common Metamodel presented in [37] and introduced at the end of this section.", "After the performance of a literature review [37], we found some methods focused on the development of CMS-based Web applications [33] [36][41], but none of them address the migration of traditional Web applications to these CMS platforms, even though the existing necessity and the advantages provided by these platforms."]} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} +{"32485545|6542879": []} +{"15184767|9504064": ["Note that companies tend to define their business processes using wellknown notations, such as BPMN [13] or similar [14]."]} +{"5173500|13867632": ["Several proposals and tools in that area, e.g., aimed at program comprehension [5], appeared around at that time."]} +{"9489300|469744": ["Augmented reality (AR), in contrast to pure virtual reality, interactively enriches the real world with virtual 3D objects [4]."]} +{"915291|16125167": []} +{"23924542|26528956": []} +{"5748885|2481856": []} diff --git a/edge/graph_7616479.jsonl b/edge/graph_7616479.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9022205499df61a0803195e5aacbc8dbaf80c3f2 --- /dev/null +++ b/edge/graph_7616479.jsonl @@ -0,0 +1,6 @@ +{"14324222|1230643": []} +{"6204569|14441987": ["Future work on this subject will explore how similar rule-based systems can be used in other, related protocols [ 8 ]."]} +{"30987095|6923178": ["a given unknown sequence to be normal or anomalous [3]."]} +{"7309219|2835258": ["Over the past decade, many routing protocols have been proposed in literature [1], [2], [3]."]} +{"28215991|14441987": []} +{"20874121|14441987": ["Based upon their mode of execution, the protocols can be categorized into Reactive and Proactive [1]."]} diff --git a/edge/graph_7624176.jsonl b/edge/graph_7624176.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..637439695bfa6f18f01064f952c6944380b924bd --- /dev/null +++ b/edge/graph_7624176.jsonl @@ -0,0 +1,2 @@ +{"15213375|7624176": []} +{"18227056|7624176": ["Further discussion on these recent techniques can be found in [3]."]} diff --git a/edge/graph_7624447.jsonl b/edge/graph_7624447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_763939.jsonl b/edge/graph_763939.jsonl similarity index 100% rename from graph_763939.jsonl rename to edge/graph_763939.jsonl diff --git a/edge/graph_7644489.jsonl b/edge/graph_7644489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb4215ab71b45de3dac4c9ca2d500c2e88ee6268 --- /dev/null +++ b/edge/graph_7644489.jsonl @@ -0,0 +1 @@ +{"12744510|7644489": ["Due to the proximity, D2D user equipment (UE) may enjoy very high data rates, low delays and improved energy efficiency [4]\u2013[7].", "Note that when cellular network coverage is available, D2D transmissions are under relatively tight network control [4].", ", USA, LTE is supposed to support direct D2D connectivity [4]."]} diff --git a/edge/graph_764622.jsonl b/edge/graph_764622.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7653502.jsonl b/edge/graph_7653502.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7653893.jsonl b/edge/graph_7653893.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b3f54d362cfa4236480526ee0bb987628af89ea --- /dev/null +++ b/edge/graph_7653893.jsonl @@ -0,0 +1,2 @@ +{"14078217|7653893": []} +{"9321887|15369615": ["Some examples include edge detection [58], [59], segmentation, texture analysis [60], modeling of primate\u2019s visual systems [61]\u2013[63], statistical analysis of time-series (e."]} diff --git a/graph_766000.jsonl b/edge/graph_766000.jsonl similarity index 100% rename from graph_766000.jsonl rename to edge/graph_766000.jsonl diff --git a/edge/graph_7660082.jsonl b/edge/graph_7660082.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccc57d5b93eb2bf2260fefd212001de67dd79d3d --- /dev/null +++ b/edge/graph_7660082.jsonl @@ -0,0 +1,31 @@ +{"977486|1452734": ["We adopt a developmental robotics approach [4], [5] to tackle the language acquisition problem."]} +{"18028824|16481413": ["In recent years, this approach has been adapted to the robotics domain [3], e."]} +{"7665100|7360895": []} +{"7665100|7185733": []} +{"7665100|1708582": []} +{"2981653|7983519": ["These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options [20].", "These models assume access to a formal symbolic representation of the object to be referenced and its properties and relations to other options (Krahmer and Deemter 2012).", "\u2026the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \" near \" or \" under \" which may not be directly computed from the robot's perceptual system (Krahmer and Deemter 2012).", "Hard-coded or template-based methods for generating requests do not take into account the ability of a person to understand the request, while existing work in referring expression generation assumes access to a symbolic representation of the environment, including ambiguous spatial relations such as \u201cnear\u201d or \u201cunder\u201d which may not be directly computed from the robot\u2019s perceptual system [20]."]} +{"7896306|7360895": ["Many research problems are emerging with regard to how people may interact with a service robot, and how such robots may be designed to be \" socially interactive \" [9]."]} +{"38157287|7360895": ["Natural language communications, gestures, showing feelings, etc., are some of the important behaviors [3]."]} +{"8098601|206742377": []} +{"28106198|8983048": ["A comprehensive overview and a qualitative evaluation of different approaches for the registration problem can be found in Salvi et al. (2007)."]} +{"16085742|8777381": ["However, this decrease in the recognition rate for speaker-independent systems does not surprise, since even humans could hardly reach emotion recognition rates of 60% from natural language for unknown speakers [6]."]} +{"16085742|7360895": ["A good overview of such socially interactive robots can for instance be found in [1]."]} +{"3924304|7360895": []} +{"11533813|7360895": ["Fong, Nourbakhsh, & Dautenhahn (2003) developed a collaborative control system in which robots asked human partners questions via a PDA interface.", "However, there is not consensus that human-robot interfaces should be built around natural language due to the challenges in building dialog interfaces in changing social contexts (Fong, Nourbakhsh, & Dautenhahn, 2003; Severinson-Eklundh, Green, & H\u00a8uttenrauch, 2003)."]} +{"11970556|7185733": ["Vision-based gesture recognition has long been considered for a variety of tasks, and has proven to be a challenging problem examined for over 20 years with diverse wellestablished applications [12][13]."]} +{"2553026|7360895": ["The role as co-worker and assistant in human environments leads to new challenges in the design process of robot behaviors (Fong et al., 2003).", "Verbally communicating the results of its internal action simulation and monitoring processes greatly facilitates the interaction with naive users since it helps a human to quickly adjust his/her expectations about the capacities the robot might have (Fong et al., 2003)."]} +{"7529010|7360895": ["Having robots to assist people in human-centered environments is a goal that the robotics community has aspired to for many years (Fong et al. 2003)."]} +{"15334151|7788290": ["Although originally most of the research in activity recognition was done using vision sensors [Gavrila, 1999; Pentland, 1996], it has increasingly become dominated by various types of wearable sensors, like accelerometers and audio."]} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"6994739|7360895": ["To copyotherwise, to republish, to post on servers or to redistribute \nto lists, requires prior speci.c permission and/or a fee."]} +{"6994739|14997956": []} +{"14734113|7360895": ["Research into the issues involved with social robotics is important for the creation of robots that will operate alongside people and integrate themselves into human environments [10]."]} +{"27191493|1634674": ["A sequence of the silhouettes for the human figure, Iij = \ued5b Iij[1], Iij[2], .", "A sequence of silhouette images Iij can be converted to a sequence of pose descriptors Fij = \ued5b fij[1], fij[2], .", "A performer\u2019s action is subsequently represented as a sequence of pose descriptors F = {f [1], f [2], .", "Action recognition has been the subject of a significant amount of research [1,2].", "Additionally, the node transition Qij = \ued5b qij[1], qij[2], .", "An action is encoded as a sequence of configurations; more specifically, in this study each action is assumed to be a sequence of positions of markers, \u0398i = (\u03b8i[1], \u03b8i[2], .", "A sequence of the silhouettes for the human figure, Iij = Iij[1], Iij[2], . . . , Iij[T ] , can be consequently obtained."]} +{"7360895|7185733": ["Two excellent overviews of vision-based gesture recognition are [124,166].", "[124] V."]} +{"7360895|7788290": ["A broad survey of human tracking is presented in [ 66 ].", "Passive sensors, such as CCD cameras, are cheap, require minimal infrastructure, and can be used for a wide range of perception tasks [2,36, 66 ,118]."]} +{"7117568|7788290": []} +{"3138852|1932843": ["These quantities can be taken to be finite, but continuous state and action spaces are often valuable for capturing interactions in important reinforcement-learning applications such as robotic control 57 ."]} +{"3138852|1708582": []} +{"4297798|2080630": ["The sensor-based method, which means different types of sensors such as RFID sensors are used to collect surgical data automatically, is usually integrated with surgical systems such as surgical robots to record all the surgeries, with low time/labor costs [31][34-35].", "To reduce the time/labor cost, one strategy is the replacement of the observer-based data collection method with the sensor-based data collection method [31].", "limited targeted surgeries, with high time/labor costs [31-33]."]} diff --git a/graph_76603.jsonl b/edge/graph_76603.jsonl similarity index 100% rename from graph_76603.jsonl rename to edge/graph_76603.jsonl diff --git a/edge/graph_7660436.jsonl b/edge/graph_7660436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7665100.jsonl b/edge/graph_7665100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a96918fe72a7b561a90cd90df5a34fccb2639506 --- /dev/null +++ b/edge/graph_7665100.jsonl @@ -0,0 +1,4 @@ +{"17278270|7360895": []} +{"1708582|17464562": []} +{"6957672|7788290": ["The problem of locating people is the problem of determining their x\u2013y-location relative to the robot.1 Previous approaches to people tracking in robotics are feature-based: they analyze sensor measurements (images, range scans) for the presence of features [ 15 ,26] as the basis of tracking."]} +{"206794521|7360895": ["Although human interactions with robots span almost every robotic endeavor [10], [11], HRI research has been conducted primarily in six application domains: entertainment [12], [13], [14], [15] (see Breazeal in this issue), museum docents [16], [17], [18], [19], [20], personal assistants [21], [22] (see H\u00fcttenrauch, Green, Norman, Oestreicher, and Eklundh and Lisetti in this issue), health care [23], [24], [25], space exploration [26], [27] (see Clancey in this issue), police SWAT teams [28], military robotics [29] (see Endo, MacKenzie, and Arkin and Skubic, Perzanowski, Blisard, Schultz, Adams, Bugajska, and Brock in this issue), and rescue robotics [7], [6], [2], [30]."]} diff --git a/edge/graph_76652300.jsonl b/edge/graph_76652300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_76654498.jsonl b/edge/graph_76654498.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0de178edb99e31085e565865f947e5336e1163a2 --- /dev/null +++ b/edge/graph_76654498.jsonl @@ -0,0 +1 @@ +{"206896175|2257431": ["By contrast, Trie-based solutions are the most widely used ones because of their flexibility and expandability [12]."]} diff --git a/edge/graph_76658911.jsonl b/edge/graph_76658911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_76659781.jsonl b/edge/graph_76659781.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92feb353dffee410378142f32b4a6ad5fca506b4 --- /dev/null +++ b/edge/graph_76659781.jsonl @@ -0,0 +1,5 @@ +{"52148805|14077349": []} +{"62792456|8909218": ["In contrast, femtocells typically have an order of magnitude larger cell radius [43].", "The results of the femtocell network are taken from [43], [45]\u2013[47]."]} +{"1284462|17165859": ["A second generation of methods then started to exploit the unique properties of light, such as the free-space optical propagation property and the limited multi-path [5].", "Several studies have looked into methods to exploit the properties of Lambertian patterns for localization [5, 9, 10].", "During the last ve years, there has been an increasing number of studies exploiting visible light for localization [5]."]} +{"52305212|36400013": ["However, the usage of replicated certificates or private keys concurrently, which is referred as Sybil attack [52], [53], may still make these attacks practically possible."]} +{"192221|38911919": ["Clustering techniques are broadly investigated in [49] [64] [65]."]} diff --git a/edge/graph_76660500.jsonl b/edge/graph_76660500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ca24a44b9fe53024a2b180613767085ae5de28b --- /dev/null +++ b/edge/graph_76660500.jsonl @@ -0,0 +1,8 @@ +{"116014615|24339": []} +{"5660947|27996699": ["A coherent detection technique is necessary to detect the usually very weak counterpropagating Brillouin scattering signal [52].", "c r t t cti t c i is c ss r t t ct t s ll r c t r r ti rill i scattering signal [52]."]} +{"53012085|25113020": []} +{"116293259|3055684": []} +{"116293259|12060835": []} +{"52008442|24339": []} +{"24339|5660947": ["BOTDR is very suitable for long-distance distributed strain sensing with a sensitivity of 5 \u03bc\u03b5 [37]."]} +{"58675489|7329149": []} diff --git a/edge/graph_76660592.jsonl b/edge/graph_76660592.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_76660857.jsonl b/edge/graph_76660857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7df3c0c05b59dbe8d5090e1d915c63ec7a87a126 --- /dev/null +++ b/edge/graph_76660857.jsonl @@ -0,0 +1,8 @@ +{"2079738|11746788": ["A number of new problems in this field have been proposed lately, including visual question answering [54], [55], [70], visual storytelling [58], visually grounded dialog [56], and image synthesis from text description [57], [72]."]} +{"4492210|9091277": ["By \u201ccanonicalization,\u201d we refer to word sense disambiguation (WSD) by mapping the components in our dataset to their respective synsets in the WordNet ontology (Miller, 1995).", "Canonicalization, or WSD (Pal and Saha, 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Schu\u0308tze, 2015, Leacock et al., 1998).", "Related Work Canonicalization, or WSD (Pal and Saha 2015), has been used in numerous applications, including machine translation, information retrieval, and information extraction (Rothe and Sch\u00fctze 2015; Leacock et al."]} +{"49741971|11746788": ["Scene Graph Generation Scene graph generation can serve as the basis for a number of tasks, e.g. visual question answering [52] and image retrieval [53] The proposed Zoom-Net can also perform well on scene graph generation."]} +{"4546146|1223851": ["As mentioned by the previous studies [7], [43], and [44], in the branch of bottom-up SOD, approaches are to detect saliency under free viewing, which is automatically determined by the physical characteristics of the scene, while approaches in the other branch are to detect the task-driven saliency determined by the current goals of the observer."]} +{"5595351|1708582": ["Integrating deep learning methods with reinforcement learning (RL) [11] has recently shown very promising results on decision-making problems."]} +{"2634827|11746788": []} +{"18011736|1770055": []} +{"18011736|12161567": ["TransE offers a simple yet effective linear model for representing the long-tail relations in large knowledge databases [31]."]} diff --git a/edge/graph_76663224.jsonl b/edge/graph_76663224.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6fb64b620c1e9424cb2c1f092fc4ef89faa02150 --- /dev/null +++ b/edge/graph_76663224.jsonl @@ -0,0 +1,5 @@ +{"36424360|27533715": ["To quantify the degree of agreement between the panel of domain experts (inter-rater reliability), we calculate the Krippendorff alpha coefficient (a) (Hallgren, 2012; Krippendorff, 2011)."]} +{"16581593|15273230": []} +{"14840804|3293903": ["In recent years, significant research effort has focussed on evaluation methods for ontologies and terminologies [15, 16], yet no single \u201cbest practice\u201d approach to ontology evaluation has emerged."]} +{"15115864|2082499": ["Another approach for data integration is at the data level, with an aim to match and aggregate records in different databases that refer to the same entity [Christen 2008, 2012]."]} +{"15115864|10500613": ["There are many efforts attempting to automate the process by exploiting knowledge representation, machine learning, and information retrieval techniques [Rahm and Bernstein 2001]."]} diff --git a/edge/graph_76666533.jsonl b/edge/graph_76666533.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9238e3315e43c8a713d2ab77bfdefae513075911 --- /dev/null +++ b/edge/graph_76666533.jsonl @@ -0,0 +1,16 @@ +{"110194988|1708582": []} +{"112342355|1708582": []} +{"49270834|10440280": ["Owing to the modern advanced information and communication technologies in smart grid systems, demand response (DR) has become an effective method for improving grid reliability and reducing energy costs due to the ability to react quickly to supply-demand mismatches by adjusting flexible loads on the demand side [1,2]."]} +{"16736800|1708582": ["During the day, the learning agent uses a Boltzmann exploration strategy [39] and selects an action with the following probability:"]} +{"515925|9316331": ["The previous major breakthrough in computer Go, the introduction of MCTS, led to corresponding advances in many other domains; for example, general game-playing, classical planning, partially observed planning, scheduling, and constraint satisfaction 35,36 ."]} +{"15106781|28670512": ["The prune operator is implemented by solving a linear program (White, 1991)."]} +{"53248138|8363289": []} +{"101806|1708582": ["A Boltzmann exploration strategy [40] is used at each decision step to find the probability of selecting an action: P ( u|x\u0302aug,k ) = eQ \u2217(x\u0302aug,k ,u)/\u03c4d \u03a3u\u2032\u2208Ue \u2217(x\u0302aug,k ,u\u2032)/\u03c4d , (16) where the parameter \u03c4d controls the amount of exploration and Q\u2217 is the Q-function obtained with Algorithm 1."]} +{"37416249|1708582": ["[ 27] This method is described further as p \u00f0 s ; a \u00de \u00bc Simulink\u2019 in real time and stochastic environment.", "[ 27] To solve this new problem, the 1 -soft on-policy method is used which updates action on the basis of the experience gained from executing policy."]} +{"17216004|1708582": ["Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks (Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transfer between RL tasks (see Figure 1) to provide an overview of a new, growing area of research.", "Others have written surveys for reinforcement learning (Kaelbling et al., 1996), and for transfer across machine learning tasks(Thrun and Pratt, 1998), which we will not attempt to duplicate; this article instead focuses on transferbetween RL tasks( ee Figure 1) to provide an overview of a new,\u2026"]} +{"113320335|20178897": []} +{"1799471|1708582": ["where V\u2217(s\u2032) is the optimal state-value function [27], which is defined as"]} +{"70347005|12083425": ["With the development in power electronic interface and decrease in the cost of photovoltaic (PV) panels [4], [5], this trend is expected to grow."]} +{"327425|10440280": ["Therein, both centralized and decentralized solutions exist, but they fail to consider on-line solutions for large-scale, real databases [6]."]} +{"8858354|14478191": []} +{"52805691|1932843": ["\u2026of trees or controller nodes ~q while starting at state s is given recursively by:\nV (~q, s) = R(~a~q, s) + \u2211 s\u2032,~o T (s\u2032,~a~q, s)O(~o,~a~q, s\u2032)V (~q~o, s\u2032),\nwhere ~a~q are the actions defined at ~q, while ~q~o are the subtrees or resulting nodes of ~q that are visited after ~o have been seen."]} diff --git a/edge/graph_76667957.jsonl b/edge/graph_76667957.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c5a0f80467794465bfa94c7cf2eed9304b4c237 --- /dev/null +++ b/edge/graph_76667957.jsonl @@ -0,0 +1,61 @@ +{"61314605|10137283": ["In [2], trust is de\ufb01ned as the extent to which one partner is willing to participate in a given action with another partner considering the risks and incentives involved."]} +{"114393204|15516254": []} +{"3768839|21930333": ["In literature [11] and [12], through vulnerability analysis, the safety and reinforcement of network system is proposed according to the idea of repair set."]} +{"195675993|16209841": ["In particular, one of the basic aspects of security is the bootstrapping of the smart object [8]."]} +{"19132048|10693567": ["OpenFlow [2] have attracted a lot of attention from both the industry and research institutes."]} +{"10528416|1535117": ["Smart environment is progressively developing in the areas of smart homes [1,2], smart grids [3], intelligent transportation systems [4], smart healthcare [5], and smart cities [6]."]} +{"4625968|2357830": []} +{"23651149|4395259": ["One category is preventing the eavesdropper to detect the target communication signal, such as the spread spectrum transmission techniques [2], frequency hopping techniques [3], beam-forming [1] and meteor burst communication techniques [4].", "In order to verify impact caused by the channel depolarization effect, the locations of Alice, Bob and Eve are changed to diversify the channel condition, such locations are denoted as {SiteXi | X \u2208 [A(Alice), B(Bob), E(Eve)]; i \u2208 [1,5]}.", "However, due to the wireless channel\u2019s openness, the unprotected physical layer can be a great security vulnerabilities to the eavesdropping [1]."]} +{"7555555|4718973": []} +{"25387336|2387055": []} +{"15659301|2387055": []} +{"11000825|1230643": ["[14] points out that power consumption of wireless sensor network devices could be divided into three domains: sensing, communication, and data processing."]} +{"15152008|16209841": ["\u2026of state-of-the-art security mechanisms in the IoT (including symmetric/asymmetric cryptographic algorithms, hashing functions, security protocols at network/transport/application layers), aiming at providing features such as confidentiality, integrity, and authentication, is provided in [9]."]} +{"30211221|7988320": ["They provide unprecedented and limitless opportunities for medical and nonmedical applications [1, 2]."]} +{"5736121|16489039": ["For example, news websites or search engines can operate without charging users as they get paid by advertisers who compete for buying dedicated slots on those web pages to display ads [4]\u2013[6]."]} +{"43034616|2756896": []} +{"43034616|205286988": []} +{"11927605|13991708": ["2736446 Through the adaptation of IoT technology, it is expected that the number of connected IoT devices will reach 50 billion by 2020 [1].", "scenarios like evacuation of people from a building [1]."]} +{"17776808|14441987": []} +{"588124|7465328": ["A kind of energy extortion attack is sleep deprivation torture attack that is common for wireless sensor networks [27, 32]."]} +{"41326749|16602037": ["It is possible for the SNs, known as source nodes, to collect information from observing area and pass on the sensing data to the CH corresponding to them [28]."]} +{"41326749|1230643": ["This makes replacement or recharging of dead nodes often and a crucial requirement for continuous observation in the network coverage and lifetime that happen to be of great importance [1]."]} +{"5234832|10206347": ["The main difference between BSNs and Wireless Sensor Networks (WSNs) is the design of topology as the sensors are located on a body which serves as a common Region of Interest (ROI) [7]."]} +{"5234832|7854020": []} +{"2071075|29060869": ["ZigBee and power line communication (PLC) can be used in HAN [2]- [4] and PLC-based technologies [5] are candidates in NAN.", "Electrical appliances and other integrated devices are connected to the SM via a home area network (HAN), building/commercial area network (BAN), or industrial area network (IAN)."]} +{"8026205|2142482": ["such attack is handled by intrusion detection techniques [18], [29], [34], [35] and is not addressed in this paper."]} +{"8871801|2387055": []} +{"28361024|8909218": []} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"23424265|19938676": ["It is assumed that 5G networks should meet the following six requirements: larger system capacity, higher data rate, lower end-to-end latency, ubiquitous connectivity, reduced energy consumption, and consistent quality of experience [7]."]} +{"23424265|4395259": ["Fortunately, in recent years the concept of physical layer security (PLS) [15], which is agnostic to the system infrastructures and RATs, has shown great potential in providing information-theoretically unbreakable secrecy.", "Up to now, a great number of secure relay transmission strategies based on the concept of PLS have been\nproposed [23]\u2013[27].", "The core idea of PLS is utilizing the inherent randomness and difference of wireless channels to keep the confidential message secure from eavesdroppers, regardless of their computing capabilities.", "Based on the celebrated theoretical analyses of PLS [16], [17], a serial of transmission strategies have been proposed, such as cooperative relay transmission [18], artificial noise [19], secure beamforming [20], and noise aggregation [21]."]} +{"30615530|17205659": ["Wang et al. [29] conducted a thorough survey of different security and privacy issues of wireless sensor networks, which are relevant to IoT scenarios."]} +{"22207206|21386749": ["The different phases of patient data transfer are shown in Figure 1 (see [13])."]} +{"4590122|14745481": []} +{"1898852|16209841": ["For instance, [11] provides a sound review of network security and identity management, but does not consider privacy, trust, and resilience; [53] emphasizes privacy and trust, but hardly tackles network security, identity management, and resilience."]} +{"2365492|17962754": []} +{"2365492|1599458": []} +{"3747934|2521001": ["There are three main security requirements that need to be addressed by any security design, namely: Con\ufb01dentiality, Integrity, and Availability, known as CIA [11].", "There are three main security requirements that need to be addressed by any security design, namely: Confidentiality, Integrity, and Availability, known as CIA [11]."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"2134031|4427557": ["More recently, standards specifically dedicated to IoT communications, such as LoRa [107], NB-IoT [108], eMTC or other Low Power Wide Area Network (LPWAN) standards [109], support positioning of the nodes to a certain extent."]} +{"2134031|3348390": ["Within all the context sensing information, the location information plays important roles [5]."]} +{"44162212|18687271": []} +{"206470388|3348390": ["Additional definitions on IoT are also listed in [2].", "\u2026provide sufficient information, aggregated data from number of physical devices and virtual sensors (e.g. social media such as Facebook, Twitter) [2] can provide a wealth of knowledge for important application areas including disaster management, customer sentiment analysis, smart cities, and\u2026", "It is predicted that, by 2020, there will be 50 to 100 billion devices connected to the Internet [2].", "Data collected through smart wearable and smart home devices can be used to generate contextually [2] enriched information.", "The IoT allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/network and Any service [2]."]} +{"5368886|7329149": ["Moreover, recently, wearable technology has also been integrated into enterprise and organizational environments in order to increase business productivity and ef\ufb01ciency levels [Perera et al. 2015].", "The application domains of the IoT are diverse, spanning from smart cities, building and home automation, transportation and logistics, and environmental monitoring, to smart enterprise environments, connected home appliances, and smart wearable devices [Atzori et al. 2010; Gubbi et al. 2013; Perera et al. 2015].", "Moreover, recently, wearable technology has also been integrated into enterprise and organizational environments in order to increase business productivity and efficiency levels [Perera et al. 2015].", "\u2026domains of the IoT are diverse, spanning from smart cities, building and home automation, transportation and logistics, and environmental monitoring, to smart enterprise environments, connected home appliances, and smart wearable devices [Atzori et al. 2010; Gubbi et al. 2013; Perera et al. 2015]."]} +{"2222104|6664074": []} +{"2222104|19938676": []} +{"18062952|17205659": ["\u2026destination), authentication (the identity of the sender is certified and verified at the receiver), non-repudiation (the sender of a message cannot later deny having sent the message) and robustness against various types of attacks (man in the middle, replay attacks, denial-ofservice, etc.) [3]."]} +{"36433983|10837932": ["Based on this concept, we find in the literature two possible ways [8] to save energy in such architectures: switching PoA states (On, Off) or adapting PoA coverage according to MN density."]} +{"2043801|14678574": []} +{"2043801|3815882": []} +{"3284231|2332366": ["Advanced persistent threats (APT) [58] Unauthorized person attempts to gain access to the system Stealing data Bypassing authentication", "DDoS [57, 58] Denial of services, service unavailable Unknown or new attack, exploiting vulnerabilities, overload resources UDP flood, ICMP/PING flood, SYN flood, Ping of Death, etc.", "Replay attack [58, 61, 62] Disguise valid entities or messages Bypassing integrity Valid message containing some valid data is repeated again and again"]} +{"3284231|12815020": []} +{"12423797|3348390": ["With the tremendous deployment of the Internet and mobile communications, the Internet of Things (IoT) emerges as a promising technology to connect billions of everyday objects and the surrounding environments using different kinds of sensors and actuators [1\u20133]."]} +{"12423797|4395259": ["In CIoT networks with low-complexity devices, some issues are raised in upper layer security, such as key distribution for symmetric cryptosystems and the high computational complexity of asymmetric cryptosystems [21]."]} +{"12323572|7644489": ["It is an exciting and innovative feature of the next generation cellular networks allowing traf\ufb01c through any network infrastructure, which provides interconnections between the critical public safety network, the ubiquitous commercial network, and the users [Lin et al. 2014]."]} +{"27887146|15199849": []} +{"27887146|17205659": ["In addition to attacks targeting wireless networks, many specific attacks to WSNs exist [3-6]."]} +{"28307247|16888186": []} +{"28307247|4395259": ["The choice of action depends on where its instantaneous channel fading gain to the LFC falls between a set of publicly known thresholds f 1; 2; 3g, with (2)More rigorous definitions and examples can be found in [79]\u2013[81] and the extensive references within."]} diff --git a/edge/graph_7669555.jsonl b/edge/graph_7669555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7671261.jsonl b/edge/graph_7671261.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7679009.jsonl b/edge/graph_7679009.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c68a17161642271ab7a0a242e50630441aaa0e7f --- /dev/null +++ b/edge/graph_7679009.jsonl @@ -0,0 +1 @@ +{"26749053|18435528": []} diff --git a/edge/graph_7681233.jsonl b/edge/graph_7681233.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1e940b90c857b2cf4545464b71d131acb1deeb8 --- /dev/null +++ b/edge/graph_7681233.jsonl @@ -0,0 +1,4 @@ +{"10751245|5473785": ["Following Neapolitan [ 7 ] and assuming that the reliability of information sources is conditionally independent, probability propagation downward from information sources to q is given by"]} +{"565477|9240891": ["The mechanism of CR has \nsimilarities to trust policy man\u00adagement engines such as PolicyMaker [3] and Trust-Serv [9].", "The mechanism of CR has similarities to trust policy management engines such as PolicyMaker [3] and Trust-Serv [9]."]} +{"1989401|14697846": []} +{"9763864|18194234": ["[6]), trustworthiness is more suitably interpreted as the result from evaluating the various aspects of a web service.", "many researchers have recognized the importance of trust and reputation to the success of the resulting system built by the selected web services [6].", "However, to our best knowledge, few of the existing trust-based web service selection models address this problem [6].", "In our experiments, we focus on three most commonly studied mechanisms of lying on the service provider agent part [6]: 1) Static lying: service provider agents always advertise the QoS of the services they provide to be of a high value (in our case, we set this value to be in the range of 0."]} diff --git a/edge/graph_7681716.jsonl b/edge/graph_7681716.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7686374.jsonl b/edge/graph_7686374.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..909281fa72a5220a9cc1288370ba4728750ab814 --- /dev/null +++ b/edge/graph_7686374.jsonl @@ -0,0 +1,8 @@ +{"14142446|534755": []} +{"2486574|1400872": ["Neural Networks literature [Pea95]."]} +{"14694296|534755": ["Our approach consists of the generation of defined benchmark data, the analysis of these data with the different methods, and the assessment of algorithmic performances by statistical analyses."]} +{"6742026|15082313": []} +{"6742026|534755": []} +{"15082313|534755": ["Further reading There are a number of other reviews and method comparisons available: some focus on applications and biological interpretations [126-128], and some concentrate on methodology [129-137]."]} +{"6113926|534755": ["Thus, the regulation function zj[t] was modeled as the sigmoid function, which is one kind of Hill function, of yj[t] (the protein activity profiles of transcription factor j) [3,16,30-33]"]} +{"12925450|534755": ["Recently, dynamic modeling of gene regulatory networks from time series data has received more and more research interest [10], [35]."]} diff --git a/edge/graph_7686677.jsonl b/edge/graph_7686677.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df0f0cf1f5d11163af211d57798684dd8c8ab296 --- /dev/null +++ b/edge/graph_7686677.jsonl @@ -0,0 +1,10 @@ +{"6765147|12452682": []} +{"14139654|14441987": []} +{"14565499|8909218": ["As a result, an extensive deployment of femtocells is expected in the near future."]} +{"20264807|1940388": ["A detailed elaboration of these threats and attacks is beyond the scope of this document; however, the interested reader is referred to [78], [79]."]} +{"20264807|1236072": ["Numerous variants to this protocol have been developed to improve on the energy efficiency which have either been discussed in [9], [17] or will be discussed subsequently in Section II.", "[17], has commenced with a taxonomy which is truly suitable to WSNs and which breaks with the traditional one advocated by the IETF, but which is simply out of date."]} +{"20264807|1230643": ["BECAUSE of the unprecedented opportunities they offer, wireless sensor networks (WSNs) [1] have witnessed a"]} +{"7964225|8909218": ["Studies indicate that a significant proportion of data traffic originates indoors [3].", "HeNBs aim at extending broadband coverage to authorized UEs located indoors where it is most needed [3]."]} +{"5711721|1113420": ["A detail of the advantages offered by context and context-aware systems is reported in [10]."]} +{"17197561|8909218": []} +{"17958035|14441987": ["network so that messages can be delivered in a timely manner during mobility and changing topology [4]."]} diff --git a/edge/graph_7696381.jsonl b/edge/graph_7696381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7696556.jsonl b/edge/graph_7696556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61844b7ae92b0275afd835695be4d653ea33f300 --- /dev/null +++ b/edge/graph_7696556.jsonl @@ -0,0 +1,2 @@ +{"9400090|7696556": []} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} diff --git a/edge/graph_7697886.jsonl b/edge/graph_7697886.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7698274.jsonl b/edge/graph_7698274.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06586faa7a6e063c9f55621016f4833d6c5c4d1d --- /dev/null +++ b/edge/graph_7698274.jsonl @@ -0,0 +1,6 @@ +{"5002530|1230643": ["Index Terms\u2014 Security; Mobile Wireless Sensor Network; Wireless Sensor Network\nI. INTRODUCTION\nIn recent years, Wireless Sensor Networks (WSNs) have been an extremely popular research area [1]."]} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} +{"961984|9554464": ["Indeed, it is already being actively researched for the related problem of data aggregation within sensor network community [178,179], which further signifies the importance of considering security-related issues while developing modern decentralized fusion systems."]} +{"961984|4491892": ["Probabilistic [32,40,45] Represents sensory data using probability", "Particle filters are a recursive implementation of the SMC algorithm [45]."]} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} diff --git a/edge/graph_7700167.jsonl b/edge/graph_7700167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7702904.jsonl b/edge/graph_7702904.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7704963.jsonl b/edge/graph_7704963.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..518aecb703bde50258ea9b98ea44db160065f91d --- /dev/null +++ b/edge/graph_7704963.jsonl @@ -0,0 +1,4 @@ +{"8035903|10500613": ["These mappings have also been referred to as schema matching in the literature [23]."]} +{"14278698|7704963": ["A survey of different uncertain data algorithms and applications may be found in [4]."]} +{"8430062|8125630": ["The usual approach is thus tocleanthe data by removing inconsistencies before the data is stored in the warehouse [6]."]} +{"15622120|8125630": ["Overviews of several different topics in OLAP aggregation can be found in [10, 27]."]} diff --git a/edge/graph_7706992.jsonl b/edge/graph_7706992.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7713087.jsonl b/edge/graph_7713087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7717618.jsonl b/edge/graph_7717618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7717793.jsonl b/edge/graph_7717793.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41a095f2016f809607d67e6e56aba42ba6988e10 --- /dev/null +++ b/edge/graph_7717793.jsonl @@ -0,0 +1 @@ +{"11149662|2835258": ["While several proposals for location services have recently been made in the literature [12], in this paper we make use of a very simple reactive location service (RLS) described in Section 3."]} diff --git a/edge/graph_771819.jsonl b/edge/graph_771819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7718669.jsonl b/edge/graph_7718669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e218346287f0f724cf8a3708ba9fdf5a6184023b --- /dev/null +++ b/edge/graph_7718669.jsonl @@ -0,0 +1 @@ +{"8135279|6280485": []} diff --git a/edge/graph_7724041.jsonl b/edge/graph_7724041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7725852.jsonl b/edge/graph_7725852.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d7bf600f52da3dd2ef5fa112e890133bb9cd18e --- /dev/null +++ b/edge/graph_7725852.jsonl @@ -0,0 +1 @@ +{"1685647|9240891": ["Some surveys of trust related to computer science have been performed [10], [16], [17], which outline common concepts of trust, clarify the terminology and describe the most popular models.", "From the many existing definitions of trust, those from [17], [18] describe that trust relies on previous interactions and collaboration encounters, which fits best to our environment.", "Context dependent trust was investigated by [10], [15], [16], [17]."]} diff --git a/edge/graph_7733836.jsonl b/edge/graph_7733836.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2b562c5d8648d53dd2186d64fda54afe96fdbca --- /dev/null +++ b/edge/graph_7733836.jsonl @@ -0,0 +1,3 @@ +{"30967360|14697846": []} +{"6548998|10500613": ["First, this paper is not concerned with how semantic mappings are generated: this is an entire field of investigation in itself (see [24] for a recent survey on schema mapping techniques)."]} +{"1258689|14697846": ["This is the effect of mapping a network into a metric space that differentiates nodes and links according to linking characteristics and controlling local information flow with knowing such differences."]} diff --git a/edge/graph_7735275.jsonl b/edge/graph_7735275.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_77387978.jsonl b/edge/graph_77387978.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ceffe9e2cd0ec7ca420a130c6b3f4bc8117516ae --- /dev/null +++ b/edge/graph_77387978.jsonl @@ -0,0 +1,43 @@ +{"23872521|3913780": []} +{"7592602|3913780": ["Many popularity prediction algorithms have been proposed in traditional web caches, from simple linear regression functions to complex frameworks that cross-correlate information from different web sites [11]."]} +{"13172512|191396": ["(More details can be found in [37] [38] [36] [29].", "Therefore, it is important to have effective evaluation standards and criteria to provide the users with a certain level of confidence in results generated by a particular algorithm, or comparisons of different algorithms [38].", "Criteria should help to answer useful questions such as how many clusters are hidden in the data, what are the optimal number of clusters [37], whether the resulted clusters are meaningful or just an artifact of the algorithms [38], how one algorithm performs compared to another: how easy they are to use, how fast it is to be employed [36], what is the intra-cluster quality, how good is inter-cluster separation, what is the cost of labeling the clusters and what are the requirements in terms of computer computation and storage.", "External criteria are based on some prespecified structure, which is known as prior information on the data, and used as a standard to compare and validate the clustering results [38]."]} +{"13172512|10559330": ["On the other hand, the development of other QoS solutions such as IntServ [8] or DiffServ [9] has been stymied in part due to the lack of QoS signaling and of an effective service pricing mechanism (as suggested in [10] and [11]).", "IntServ presumes that routers along a path are able to differentiate between finely grained traffic classes (and historically has presumed the use of packet header inspection to achieve this goal)."]} +{"1541773|24491750": ["In [40], authors have presented an overview of the energy consumption problems of wireless communication networks and described different techniques in general that have been used to improve the energy efficiency of these networks."]} +{"1541773|7686677": ["Survey in [42] presented a brief survey of current efforts for the standardization of the green metrics, the challenges that lay ahead and also considered the energy consumption issue in heterogeneous cognitive networks.", "The important aspects of a green communications include defining green metrics, bringing architectural changes in base stations, network planning, and efficient system design [42]."]} +{"1541773|10837932": ["Authors in [39] provide a survey on green networking research from a system design perspective."]} +{"6911407|3913780": ["Thanks to the availability of the video content and related popular ity data via YouTube platform, where every minute over 100 hours of video is uploaded [21], resear chers were able to investigate other aspects related to the video content distribution, such as p rediction of the peak popularity time of the video [22] or identifying popularity evolution pattern s [23].", "Vi deo content exhibits similar heavytailed distribution, while its popularity is typically mea sured by the number of views [21]."]} +{"18750590|2535224": [", [12], [13], [14], [15], and applications of edge computing [16]."]} +{"18750590|2623404": []} +{"18750590|7320605": ["First, some important terminologies are defined below [68]."]} +{"18750590|7774517": ["(anomaly detection) algorithm [245] to classify the sensing data as an outlier or a non-outlier."]} +{"10795625|64404": []} +{"10795625|3540699": ["264 codec to a few standard versions for streaming [40]."]} +{"24937434|7971188": ["fic they serve, including files, movies, songs, etc, but they are limited in the sense that they use specific protocols for their operation [8], [9]."]} +{"24937434|14697846": []} +{"24937434|9104850": ["Due to this similarity, only a small number of off-path caching mechanisms have been proposed, such as [27], [28], and [40]\u2013[42], complementing the existing literature on optimized distributed caching [43]\u2013[46]."]} +{"3754203|10837932": ["To better cope with the Internet usage shift from a sender-driven end-to-end communication paradigm to a receiver-driven content retrieval one, a handful of innovative information-centric networking (ICN) architectures have been proposed [1].", "That is, today\u2019s Internet is increasingly used for information dissemination rather than pair-wise communications between end hosts [1], and pays more attention to the content itself rather than where it is physically located [2]."]} +{"29777295|192934": ["Feature extraction is an efficient pretreatment for history data pool to reduce the dimensions of LV [12]."]} +{"206578365|206578224": ["The survey of [50]"]} +{"206578365|3757239": ["In [27], emerging techniques of edge computing, caching, and communications (3C) in MEC are surveyed, showing the convergence of 3C.", "caching, edge computation offloading, and connections with IoT and 5G [26], [27], [49]\u2013[55]."]} +{"206578365|6909107": ["The survey in [53] focuses on three critical design problems in computation offloading for MEC, namely, the offloading decision, computational resource allocation, and mobility management."]} +{"206578365|11370991": []} +{"206578365|3767252": []} +{"206578365|3055684": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"206578365|3042864": ["Server hardware Small-scale data centers Large-scale data centers (each contains with moderate resources [5], [21] a large number of highly-capable servers) [22], [23]"]} +{"206578365|3348390": []} +{"206578365|12060835": ["Off-grid renewable energy, such as solar radiation and wind energy, recently, has emerged as a viable and promising power source for various IT systems thanks to the recent advancements of energy harvesting (EH) techniques [195], [196]."]} +{"12187684|8606364": ["References [9] and [10] present two surveys of methodologies and measurement campaigns of spectrum occu-", "In addition, they review the reliability of these types of measurements [9] and they illustrate how to predict the system evolution thanks to available information and regression analysis [10].", "For instance, [9] and [10] provide two independent taxonomies of methodologies, campaigns and models.", "CR networks consist of devices that exploit channels that are unused at specific locations and times [10], but that are usually allocated to primary users (i.", "In particular, [9] proposes a conservative approach to account for measurement uncertainty, while [10] exploits predictors to provide the future channel status."]} +{"12187684|512561": ["Finally, [90] describes how to exploit CR to realize a complete smart grid scenario; [91] describes how to exploit channel bonding to increase the bandwidth and decrease the delay of CR."]} +{"12187684|3330461": ["nication between mobile phones to support the operations of a cellular network [168]."]} +{"12187684|2261490": ["Barakovi\u0107 and Skorin-Kapov [8] provide a thorough survey including various methods for modeling QoE for different applications and also discuss tools for estimating and predicting QoE values by probing network parameters.", "2698 [8] S. Barakovic\u0301 and L. Skorin-Kapov, \u201cSurvey and challenges of QoE 2699 management issues in wireless networks,\u201d Hindawi J. Comput.", "Barakovic\u0301 and Skorin-Kapov [8] provide a thorough 225 survey including various methods for modeling QoE for dif- 226 ferent applications and also discuss tools for estimating and 227 predicting QoE values by probing network parameters."]} +{"12187684|13172512": ["In a similar attempt, [6] reviews real time Internet traffic classification.", "Among other attributes, the prediction of data traffic and throughput has been the subject of [5] and [6]."]} +{"12187684|191396": ["The interested reader is referred to [150] for a complete review."]} +{"13995312|8909218": ["\u2026beyond the scope of this paper, involving research issues at multiple layers, such as the physical layer of a small cell tier architecture [see [4] and references therein)], or the scheduling protocols for video streaming over wireless networks (e.g., see [15], [18], [19]), here we focus on a\u2026", "Such pico-and femtocell networks, which are usually combined with macrocells into a heterogeneous network, are receiving a lot of attention in the recent literature, (e.g., see [4] and references therein).", "A drawback of this approach, though, is the requirement for high-speed backhaul to connect the small cell access points to the core network [4]."]} +{"26854900|8909218": ["However, a drawback of this approach is the huge expenditure to connect all the SBSs to the core network with fast backhaul links [2]."]} +{"26854900|14889616": ["SVC provides temporal, spatial and quality (SNR) scalability in three dimensions, thus each video is encoded into multiple layers consisting of a basic layer and several enhancement layers [11]."]} +{"3974950|13172512": ["the data using internalized heuristics [12]."]} +{"14258620|9928823": []} +{"14258620|393948": ["Representation learning) has emerged as new area of ML research [43\u201345] that exploits multiple layers of information-processing in a hierarchical architecture for pattern classification and or representation learning (e."]} +{"14258620|2746910": ["Recent data-modeling research has shown that ensemble methods have gained much popularity as they often perform better than individual models [28][29]."]} +{"11103675|16839827": ["Given that \u201cMusic\u201d and \u201cEntertainment\u201d are mostly viewed on YouTube [51], these categories are selected for analysis."]} +{"11046812|3913780": ["A wide overview of content popularity prediction is described in [9]."]} diff --git a/edge/graph_77389609.jsonl b/edge/graph_77389609.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df40888d199270749fc61cb749834b7a0bbd606c --- /dev/null +++ b/edge/graph_77389609.jsonl @@ -0,0 +1,11 @@ +{"11578312|30815820": ["In particular, gaining reputation among likeminded people has been shown to motivate sharing in online communities and open-source projects (Parameswaran & Whinston, 2007; Raymond, 1999)."]} +{"3968690|819377": ["3) Popular Category Detection Scheme: To detect the items in a popular category, we apply a Gaussian model based change point detection scheme from background detection in image processing [12]."]} +{"6224277|10157083": ["The two widely used methods are the sentence ranking and graph-based methods [10]."]} +{"18926606|9060471": []} +{"13873978|13392386": ["[19] presented a survey on mobile context-aware recommendation, which introduces"]} +{"1525646|17516538": ["[8] present behavior understanding as a classification of motion patterns produced by the object tracking module."]} +{"8452042|2762484": []} +{"206624560|16768404": []} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} +{"17782167|9060471": ["Recently, truth discovery methods [5, 8,16, 18, 25,34,37] have been proposed to simultaneously estimate the user reliability and infer trustworthy answers from noisy user-generated data."]} diff --git a/edge/graph_77392807.jsonl b/edge/graph_77392807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a04bc4d39827c4c113e04abd3f7feab4c08dda2a --- /dev/null +++ b/edge/graph_77392807.jsonl @@ -0,0 +1,11 @@ +{"111635543|43797685": []} +{"4566846|206764452": ["The PCW system is especially helpful for preventing serious damage and casualties, and as a result, many researchers and developers have tried to improve this system [7]."]} +{"6614444|7278743": ["Despite being one of the earliest modern wireless communication technologies [1], Bluetooth is still essential for a wide range of applications in everyday life."]} +{"4930284|7972041": []} +{"30427741|40725508": []} +{"56594582|26398795": []} +{"56594582|38911919": ["A recent survey on the clustering techniques can be found in [13].", "Other well-known clustering approaches are discussed in [13].", "In recent years, some clustering approaches have been employed to mitigate the hidden node problem and improve the wireless resource utilization efficiency [13]\u2013[19]."]} +{"3624697|7329149": ["The Internet of Things (IoT) idea has piqued much interest from the research and industry community in the last few years [1]."]} +{"24083957|1029120": ["The most important sensorbased non-cooperative VRU safety systems have been categorized and surveyed in [11]."]} +{"1171257|17262196": []} +{"206897318|2835258": ["Each SV attempts to forward its packets to the nearst RSU adopting the well known greedy forwarding (GF) routing lgorithm [47,57] ."]} diff --git a/edge/graph_77393635.jsonl b/edge/graph_77393635.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4dec85f8f4707a3e36fa6568788427b41cd672b1 --- /dev/null +++ b/edge/graph_77393635.jsonl @@ -0,0 +1,19 @@ +{"14992336|192934": ["Thus, in principle any arbitrarily complex pattern can be described by a set of primitives and grammatical rules (Jain et al. 2000).", "After Jain et al. (2000) syntactic pattern recognition adopts a hierarchical perspective where a pattern is viewed as being composed of simple sub-patterns, the primitives."]} +{"2593345|18986679": ["However, overview is becoming increasingly difficult to effectively achieve with the ever-increasing size of real-world datasets."]} +{"40372972|1174262": ["(Andrienko and Andrienko 2013; Andrienko et al. 2013).", "To apply it to larger data, it is necessary to combine the trajectory wall displays with other interactive tools such as temporal animation, clustering, queries etc. (Andrienko and Andrienko 2013; Andrienko et al. 2013)."]} +{"206608231|393948": ["Index Terms\u2014Big Data, cross-domain datamining, data fusion, multi-modality data representation, deep neural networks, multi-view learning, matrix factorization, probabilistic graphical models, transfer learning, urban computing\n\u00c7"]} +{"17496452|239537": []} +{"14971684|18722099": []} +{"14971684|2593345": []} +{"11793826|1174262": ["To the best of our knowledge, this approach of graph construction and weight definition from taxi trajectories has not been used in previous work."]} +{"5737492|1174262": ["As such, these various transformations enable the comprehensive analysis of movement data from multiple complementary perspectives [11].", "Past surveys on visual analytics of movement data have focused heavily on the properties of trajectories and their underlying challenges [2], [11], other surveys have focused on collecting common visualizations used in traffic analysis (http://vizguide."]} +{"4560326|1174262": ["\u2026taxonomies, conceptual models, and design spaces for temporal visualizations mainly categorize visualizations based on analytical tasks or data types (e.g., object movement data [AAH11, AAB \u2217 11, AA12], video data [BCD \u2217 12], or datasets with different temporal and spatial structures [AMM \u2217 07])."]} +{"13861221|1174262": []} +{"19510535|1174262": ["[16], [17] discuss three main classes of techniques: OD matrix [18], flow map [19], and a hybrid of a matrix and a"]} +{"1884205|1174262": ["[10], [11] can be used to explore the locations of significant changes."]} +{"15394144|2875192": ["Medical data informatics is an increasingly important research area in health-care [20]."]} +{"33041066|371337": ["This methodology is particularly common in medical visualisation of sequential scans (CT and MRI data) (Preim et al. 2009, Mu\u00a8hler et al. 2010), to display a cross-section of the patient\u2019s body at a particular horizontal or vertical plane."]} +{"62725786|18986679": ["Visual data mining (VDM) aims at the more complete integration of GVis and DM in the context of exploratory and intelligent data analysis (Ferreira de Oliveira and Levkowitz, 2003)."]} +{"174114|2593345": []} +{"20587832|1174262": ["We believe that there are no universal solutions that can effectively visualize arbitrary aspects of OD \ufb02ows [AA13].", "Visual analytics of movement data has been a hot research topic in the visualization community [AA13].", "However, this is a common problem for methods that visualize arbitrary OD \ufb02ows [AA13].", "For \ufb02ow map layouts and edge bundling methods, they are suitable mainly for presenting OD \ufb02ows from one or two origins, or in some special situations [AA13]."]} +{"862623|1174262": ["Advanced trajectory filtering tools [2] are designed where users can visually operate specific filters such as lens on maps (e.", "The analytical tasks are supported by visualizing the spatialtemporal data [2], where the techniques combine map-based displays and information visualization techniques [23]."]} diff --git a/edge/graph_77393723.jsonl b/edge/graph_77393723.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d9541f8c6ee847279068a5659dc63bdc1c52191 --- /dev/null +++ b/edge/graph_77393723.jsonl @@ -0,0 +1,21 @@ +{"26844665|17205659": []} +{"45011365|1230643": []} +{"3162687|1230643": []} +{"207661762|1940388": ["Thus, symmetric key algorithms were selected as suitable solutions for the establishment of a secret key between two peers [7, 8]."]} +{"3838373|1230643": ["One of these technologies, wireless sensor networks [4], is able to provide an autonomous and intelligent link between the virtual world and the physical world, and in fact it has been thoroughly studied."]} +{"107638562|14441987": []} +{"4643053|9646739": ["Security gateways may also offer the possibility of supporting intrusion detection and attack tolerance mechanisms, and existing works on intrusion detection for sensor networks [86][87][88] may provide useful guidance in developing appropriate mechanisms for 6LoWPAN-based IoT communications."]} +{"4643053|1940388": ["employing Wireless Sensor Networks (WSN) isolated from the Internet and numerous research proposals on security mechanisms [5], the new standardized solutions are being designed to"]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"37321457|17500666": []} +{"10563322|2357830": []} +{"10563322|1230643": []} +{"11000825|1230643": ["[14] points out that power consumption of wireless sensor network devices could be divided into three domains: sensing, communication, and data processing."]} +{"17345588|6275330": ["We also discuss some challenges in the area and future research directions."]} +{"195351955|1598350": ["As more Internet of Things (IoT) devices are deployed and release their data [7], it is important that the data is sent and shared with authorized devices."]} +{"1306415|1940388": []} +{"13641891|16335158": []} +{"13641891|7854020": []} +{"13641891|1940388": []} +{"205288494|1230643": ["Heterogeneous WSN consists of multiple, simple, low-cost sensor nodes that have limited computational and communicational capabilities and of at least one sink node, also called gateway node (GWN) [28]."]} diff --git a/edge/graph_77394448.jsonl b/edge/graph_77394448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c0550b54c3bc633b0baa76f2bccdf237877a5b2 --- /dev/null +++ b/edge/graph_77394448.jsonl @@ -0,0 +1 @@ +{"18642675|393948": ["[8]: (1) deep learning architectures based on probabilistic models, for example, deep belief network (DBN) [4] and deep boltzmann machines", "To remedy the limitation of above hand-crafted methods, the second group, which is well known as deep learning approaches [4-9], has become a very active research field in recent years."]} diff --git a/edge/graph_77394505.jsonl b/edge/graph_77394505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7748652.jsonl b/edge/graph_7748652.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17dda55183e700b1c96b67790f507e5c098f5856 --- /dev/null +++ b/edge/graph_7748652.jsonl @@ -0,0 +1,16 @@ +{"414746|7360895": ["\u2026much research effort has been fo-cused on the development of humanoid robots, and great progress has been made in developing robots with human-like torsi, including legs, arms, head etc., as well as some human-like motoric skills, such as walking, grasping, dancing [3], [4], [29], [33], [41], [46]."]} +{"17343016|8777381": ["In the future, the emotional speech research will primarily be benefited by the on-going availability of large-scale emotional speech data collections, and will focus on the improvement of theoretical models for speech production (Flanagan, 1972) or models related to the vocal communication of emotion (Scherer, 2003).", "Several reviews on emotional speech analysis have already appeared (Van Bezooijen, 1984; Scherer et al., 1991; Cowie et al., 2001; Pantic and Rothkrantz, 2003; Scherer, 2003; Douglas-Cowie et al., 2003).", "Several reviews on emotional speech analysis have already appeared (Van Bezooijen, 1984; Scherer et al., 1991; Cowie et al., 2001, 2003;\nScherer, 2003; Douglas-Cowie et al., 2003).", "Furthermore, there is a need for adopting protocols such as those in (Douglas-Cowie et al., 2003; Scherer, 2003; Schro\u0308der, 2005) that address issues related to data collection.", "\u2026speech research will primarily be benefited by the on-going availability of large-scale emotional speech data collections, and will focus on the improvement of theoretical models for speech production (Flanagan, 1972) or models related to the vocal communication of emotion (Scherer, 2003).", "Finally, the paper is focused on describing the feature extraction methods and the emotion classification techniques, topics that have not been treated in (Scherer, 2003; Pantic and Rothkrantz, 2003).", "\u2026Douglas-Cowie, 1996; Pantic and Rothkrantz, 2003; Gonzalez, 1999; Heuft et al., 1996; Iida et al., 2000; Iriondo et al., 2000; Montero et al., 1999; Mozziconacci and Hermes, 2000; Murray and Arnott, 1996; Pollerman and Archinard, 2002; Scherer, 2003; Ververidis and Kotropoulos, 2004; Yuan, 2002).", "The survey is limited to those acoustic features for which at least two references are found in the literature (Van Bezooijen, 1984; Cowie and Douglas-Cowie, 1996; Pantic and Rothkrantz, 2003; Gonzalez, 1999; Heuft et al., 1996; Iida et al., 2000; Iriondo et al., 2000; Montero et al., 1999; Mozziconacci and Hermes, 2000; Murray and Arnott, 1996; Pollerman and Archinard, 2002; Scherer, 2003; Ververidis and Kotropoulos, 2004b; Yuan, 2002)."]} +{"15782139|2762290": []} +{"15782139|6746689": []} +{"22332092|7360895": ["This work is complementary to research into developing sociable robots that can ultimately possess sophisticated social skills [19, 20]."]} +{"15030471|7360895": ["Results of the \ntrials indicated that most subjects disliked a frontal approach, except for a small minority of females, \nand most subjects preferred to be approached from either the left or right side, with a small overall \npreference for a right approach by the robot."]} +{"16314534|5401262": ["As technology develops in this direction, the interaction between users and machines will shift from a master\u2013slave dyad towards a collaborative, symbiotic relationship that requires the computer to extend awareness of the user in real-time (Klein et al., 2004; Pantic et al., 2007)."]} +{"16314534|9270553": ["The strategy employed by physiological computing technology has been described as 'wiretapping' (Wolpaw et al., 2000).", "The strategy employed by physiological computing technology has been described as \u2018wiretapping\u2019 (Wolpaw et al., 2000)."]} +{"27527196|619938": ["A good overview of algorithms for text-line extraction is given in [72]."]} +{"27527196|16082889": ["Comparable arguments can, for example, also be found in [22,108,115], just to mention some examples."]} +{"27527196|11792588": ["In this respect, Arica and Yaman-Vural in [2] discuss a kind of taxonomy very thoroughly."]} +{"27527196|14580698": ["Comparable arguments can, for example, also be found in [22,108,115], just to mention some examples."]} +{"27527196|15782139": [", [2,22,54,99,115])."]} +{"14597039|7360895": ["For a more comprehensive survey, the reader is referred to [11, 14]."]} +{"6712024|7360895": ["Given the tendency for humans to anthropomorphize machines [3], and their preference for interacting with machines like they do with humans [4], ISAs thus not only pose a problem for HRI, they are actually desirable for HRI.", "[4] argue that the kind of pragmatic understanding we need for understanding request-ISAs is crucial to socially interactive robotics."]} +{"1487749|1708582": []} diff --git a/edge/graph_7760671.jsonl b/edge/graph_7760671.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7761990.jsonl b/edge/graph_7761990.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7763164.jsonl b/edge/graph_7763164.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7773456.jsonl b/edge/graph_7773456.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7774517.jsonl b/edge/graph_7774517.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2a3846f57267cdc773d01514c1be7ae7302a1585 --- /dev/null +++ b/edge/graph_7774517.jsonl @@ -0,0 +1,12 @@ +{"4231967|1582463": ["In [2], a watchdog processor is used for concurrent systemlevel error detection techniques."]} +{"14560938|1230643": ["Several applications for WSNs have been proposed [1] and implemented ranging from habitat monitoring [2] [3] and animal tracking [4] to possible military applications [5]."]} +{"9163899|4474193": []} +{"9163899|1230643": []} +{"14090386|1236072": ["Data are propagated from sensors to a sink through a minimum hop-count path [3].", "The sensing series are routed as before to the sink, using a hop-count based routing algorithm [3]."]} +{"14090386|3330313": ["Hodge and Austin classi\ufb01ed a variety of outlier detection methods into three categories in their survey paper [16]: Unsuper-vised clustering based on distance and density, which determines the outliers with no prior knowledge of the data [17]; supervised classi\ufb01cation that required pre-labelled\u2026"]} +{"2542827|14441987": ["Initially a source floods a route request packet as shown in figure 7. A route reply is generated either by the destination or an intermediate node, which contains an unexpired route to a destination in its route cache [ 13 ]."]} +{"389775|1230643": ["Wireless sensor networks are formed using large numbers of cheap, tiny and compact sensors which have inbuilt wireless radios for communication [1]."]} +{"207172599|3330313": []} +{"5759907|3330313": ["In the detection of outliers, there is a universally accepted assumption that the number of anomalous data is considerably smaller than normal data in a data set.", "Frequent attacks on computer systems may result in systems being disabled, even completely collapsing.", "The task of outlier detection aims at identifying such outliers in order to improve the analysis of data and further discover interesting and useful knowledge about unusual events within numerous applications domains."]} +{"10178899|1230643": ["\u2026for example, random deployment in inaccessible terrains and cooperative effort, offer unprecedented opportunities for a broad spectrum of civilian and military applications, such as industrial automation, military tactical surveillance, national security, and emergency health care [1], [2], [3]."]} +{"18605290|1230643": ["Literature in the area of WSN includes wide range of applications ranging from smart home to battle-field applications, protocols, programming languages and the middleware architectures [1] [6].", "They are developed to be used in a wide variety of applications ranging from smart home systems to battlefield applications [1]."]} diff --git a/graph_778117.jsonl b/edge/graph_778117.jsonl similarity index 100% rename from graph_778117.jsonl rename to edge/graph_778117.jsonl diff --git a/edge/graph_7782275.jsonl b/edge/graph_7782275.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d3d43eb9eb55052ba4a516fe170bbc472b48085 --- /dev/null +++ b/edge/graph_7782275.jsonl @@ -0,0 +1,4 @@ +{"62602293|1097238": ["A theoretical account of why and when ensembles perform better than single individuals was presented in [12], [51].", "For example, using speciation to create and maintain diversity [15] had inspired the development of negative correlation learning for ANN ensembles [33], [34] and an in-depth study of diversity in ensembles [12], [51]."]} +{"62602293|6555395": ["However, other algorithms [7] can also be used."]} +{"37325088|1097238": ["In [ 38 ], there are described four types of diversity generation mechanisms, these are:"]} +{"37325088|15248553": ["The traditional predictive modelling scenario dealing with industrial data deploys a static model after the training phase [ 1 ]."]} diff --git a/edge/graph_778467.jsonl b/edge/graph_778467.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7788290.jsonl b/edge/graph_7788290.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee0756b6d1020e12b04cdba143efa3b8f2dfbf36 --- /dev/null +++ b/edge/graph_7788290.jsonl @@ -0,0 +1,2 @@ +{"61493162|53680608": ["To detect motion from arbitrary many objects and from an arbitrary kind of motion in the image sequences is extremely complicated [ 7 ]."]} +{"129637437|53680608": []} diff --git a/edge/graph_7792508.jsonl b/edge/graph_7792508.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_779672.jsonl b/edge/graph_779672.jsonl similarity index 100% rename from graph_779672.jsonl rename to edge/graph_779672.jsonl diff --git a/edge/graph_7800459.jsonl b/edge/graph_7800459.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af83c0a96d8c43f70ea2efe2d12d6d3d75acba67 --- /dev/null +++ b/edge/graph_7800459.jsonl @@ -0,0 +1 @@ +{"2653567|7800459": ["Thisrepair problem was first raised in [8], and was further studied in several works (e.g. [9]-[14])."]} diff --git a/edge/graph_780365.jsonl b/edge/graph_780365.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_78089535.jsonl b/edge/graph_78089535.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7811809.jsonl b/edge/graph_7811809.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0ed38c0441fd0b945c0ca11c16797bb7677f9f9 --- /dev/null +++ b/edge/graph_7811809.jsonl @@ -0,0 +1,2 @@ +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"206723961|192934": ["The goal of feature extraction is to determine an appropriate subspace of dimensionality m in the original feature space of dimensionality d where m is less than or equal to d [24]."]} diff --git a/edge/graph_7813891.jsonl b/edge/graph_7813891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cfece0cbff69fe23cfb84f12b7fcf1a992e6143c --- /dev/null +++ b/edge/graph_7813891.jsonl @@ -0,0 +1,2 @@ +{"13975932|6952653": []} +{"17637659|70923": []} diff --git a/edge/graph_7828660.jsonl b/edge/graph_7828660.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7834819.jsonl b/edge/graph_7834819.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79324c0e2492d04f11dfc51a62fc0fc30bef573e --- /dev/null +++ b/edge/graph_7834819.jsonl @@ -0,0 +1,3 @@ +{"6721504|8835588": ["The information on the physical activity is also valuable as a source of contextual knowledge [3]."]} +{"6721504|192934": ["The feature extraction approach revolves around the idea that data representations can be constructed in subspaces with reduced dimension, while at the same retaining, if not increasing, the discriminative capability of the new set of feature variables [37].", "A taxonomy of classifiers can be built according to different criteria [37].", "These methods are based on two main approaches: feature selection and feature extraction [37]."]} +{"33501402|7788290": ["Dey defined it as all types of information that characterize beings (persons, places, things, etc,) related to the interaction between users and the system [3]."]} diff --git a/edge/graph_7838983.jsonl b/edge/graph_7838983.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbefeb595aa10acb6e2c985f3d64e4c3e83334ff --- /dev/null +++ b/edge/graph_7838983.jsonl @@ -0,0 +1,10 @@ +{"856451|270804": ["Due to bursty nature of sensor network, this connection establishment phase may result in excessive packet losses."]} +{"163275|10559330": []} +{"6765147|12452682": []} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"14933559|5621151": ["TP-CRAHN [9] is a protocol designed for use within ad hoc CRNs.", "V. RELATED WORK\nResearchers have only recently started to lay down the requirements for CRNs [6], [7] and novel platforms e.g. [8] are being developed for advanced research in software defined cognitive radios.", "TCPE [10] protocol is designed for heterogeneous networks involving CRNs and the wired Internet.", "Researchers have only recently started to lay down the requirements for CRNs [6], [7] and novel platforms e.", "Development of transport layer protocols for CRNs is largely an un-explored area with a few exceptions.", "Majority of the research efforts in CRNs have been directed towards the Physical (PHY) and Medium Access (MAC) layers of the protocol stack while the upper layers, especially the transport layer, have not received that much attention.", "Some typical results from the simulation of our proposed solutions are given in Section IV, Section V presents related work in the transport layer for CRNs and Section VI concludes the paper.", "Our simulation study presented in section IV, clearly\nshows the significant impact of CRN\u2019s fine sensing on the performance of TCP communication."]} +{"6090100|41035405": ["In contrast, cooperative diversity schemes proposed by the information theory community [20, 14] suggest that traditional routing may not be the best approach."]} +{"37362686|2509135": [", physical layer and data link layer) [4]."]} diff --git a/edge/graph_7839197.jsonl b/edge/graph_7839197.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63f956cf4a3af7ea71bc5b93939ca9a70ecb2967 --- /dev/null +++ b/edge/graph_7839197.jsonl @@ -0,0 +1,2 @@ +{"5835111|6611633": []} +{"15944565|7839197": ["Agent based process management systems (APMS) combine the latest distributed computing technology with agent-based techniques [2] [3] providing an intelligent extension and alternative to workflow management systems."]} diff --git a/edge/graph_7842253.jsonl b/edge/graph_7842253.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fad7e8aeabbab665ccad52fdab5d41ecfe8a4e2 --- /dev/null +++ b/edge/graph_7842253.jsonl @@ -0,0 +1,6 @@ +{"13224438|3420321": []} +{"8227705|17474643": ["Interested readers can find a thorough survey and taxonomy of architectures and application brokering mechanisms across multiple clouds in an article by Grozev and Buyya [2012]. Their work is mostly focused on application-specific brokering mechanisms and can be positioned as a part of a broader view of interconnected cloud environments presented in this article."]} +{"23362248|7842253": ["Cloud computing is a rapid developing computing type that groups a mass of resources and uses virtualization technique to provide service over the Internet [1][2]."]} +{"7282618|16335158": ["There are several solutions related to the sensor cloud which are described in [8] for general purposes and IT applications."]} +{"16139259|8022785": ["A recent work introduces the state of cloud computing in healthcare [49]."]} +{"14287242|17464562": ["A learning automaton is an adaptive decision-making unit [25], [26] located in a stochastic environment that learns the optimal action through repeated interactions with environment ."]} diff --git a/edge/graph_7844555.jsonl b/edge/graph_7844555.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb8c43b53a7518d3f1430d4328d9a6a18ec69715 --- /dev/null +++ b/edge/graph_7844555.jsonl @@ -0,0 +1,4 @@ +{"946648|14022070": [", combinations that cause the failures that are detected by CT [2].", "However, it has only one parent tuple in the TRT, which is [2,2,3,1] and has been labeled to be a faulty tuple in the initial step.", "For example, [2,2,3,1]\u2192[2,2,3,-]\u2192[2,-,3,-]\u2192[2,-,-,-] is a path."]} +{"17876924|2511280": ["Replacement is normally used if the number of treatment units exceeds the number of control units; matching with replacement also reduces bias(5) [29] in the causal estimate.", "A property of Mahalanobis-distance matching is that it regards all the components of the covariate vector as equally important [29]."]} +{"15497488|10606961": ["Algorithmic debugging approaches [14, 45, 46] use tester feedback to reduce the search space of a faulty program element."]} +{"9900436|17292349": []} diff --git a/edge/graph_7851743.jsonl b/edge/graph_7851743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..224c0d18944f550f7c0066cc04ac4522c00ffc03 --- /dev/null +++ b/edge/graph_7851743.jsonl @@ -0,0 +1,11 @@ +{"14565499|8909218": ["As a result, an extensive deployment of femtocells is expected in the near future."]} +{"6323003|205286988": ["Using naming methods, interest can be described in the form \"I am looking for all measures of temperature higher than 20 C in the area [10, 10 ,300,200]\".", "Employed mechanisms for routing and data dissemination must be able to identify changes of the environment and to tolerate mobility [ 10 ,11].", "Mobility management and energy control can be incorporated into global state algorithms, nevertheless the state maintenance is clearly too expensive [ 10 ].", "Most ad hoc routing algorithms as well as data centric data dissemination approaches are well-known examples [ 10 ,15].", "Using naming methods, interest can be described in the form \"I am looking for all measures of temperature higher than 20 C in the area [ 10 ,10,300,200]\"."]} +{"6323003|1230643": ["Ad hoc and sensor networks have become a major research domain [3,5].", "Sensor networks introduce special constraints that need to be addressed [5]."]} +{"6323003|2835258": ["For example, the explicit calculation of a route towards a destination can be prevented if the positions of all the nodes are known [30]."]} +{"32690403|13367219": ["The channel model in [18,19] combines various propagation effects including shadowing, path loss, angular and delay spread, scattering and polarization into one general framework.", "To test the performance of phased array antennas on the RS in a multipath environment, a multipath propagation model was implemented according to [18,19].", "sidered [18], so the 6 highest power multi-paths were used (J = 6) in the following experiments."]} +{"8822047|8909218": ["Also, static interference coordination schemes require prior resource planning which makes it difficult for a network to have self organization capability and unsuitable for femto-cell [7] deployment."]} +{"2477878|11013798": ["For a detailed comparison of these techniques the reader is referred to [42] Recently, diagnosis of other aspects of the managed network has also been addressed in the literature.", "In some of these efforts, self-learning has been achieved using various techniques such as the use of expert systems, probability models and Bayesian networks [42]."]} +{"203662896|14441987": []} +{"34929848|13372227": ["Because of the aforementioned reason and Federal Communications Commission, in US, demand for enhanced 911 (E-911) emergency services, there has been a considerable amount of research and development activities dedicated to locating the position of a mobile user and several schemes have been proposed [14]."]} +{"35897463|192934": ["Classification algorithms are widely used in the field of automatic pattern recognition [11]."]} +{"2659463|1230643": [", it belongs to one branch of application layer protocols according to the categories in [9]) and does not address the data communication problem."]} diff --git a/edge/graph_7853444.jsonl b/edge/graph_7853444.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0b195b4edd20c9842fd5a64c3c65ac80172ea9c --- /dev/null +++ b/edge/graph_7853444.jsonl @@ -0,0 +1,36 @@ +{"15486640|14545307": [" cally, hand-crafted features, such as SIFT [32], Histogram of Oriented Gradients [9] and Local Binary sparse interest points and then quantized by different coding schemes, e.g., Vector Quantization [33], Sparse Coding [45] and Gaussian Mixture Models [20]. These encoded features are \ufb01nally pooled by feature aggregation methods, such as Spatial Pyramid Matching (SPM) [25], to form the image-level rep"]} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"14814753|27637541": []} +{"14814753|1634674": ["\u2022 Turaga et al. (2008) de\ufb01ne action as \u201csimple motion patterns usually executed by a single person and typically lasting for a very short duration (Order of tens of seconds).\u201d", "The long list Moeslund and Granum (2006) human motion capture and analysis Yilmaz et al. (2006) object detection and tracking Turaga et al. (2008) human actions, complex activities Zhan et al. (2008) surveillance and crowd analysis Poppe (2010) human action recognition Weinland et al. (2011) action\u2026"]} +{"18375490|5755403": []} +{"18375490|16525678": ["Valera 05 Intelligent distributed surveillance [187]"]} +{"18375490|17516538": ["Weiming 04 Motion and tracking for surveillance [59]"]} +{"10628417|5058720": ["Currently, there are various abnormal detection algorithms proposed in crowded scenes, such as abnormal crowd behavior detection [9, 46, 53], human abnormal action detection [38], traffic incident detection [50], etc."]} +{"206583924|1634674": ["In fact, the recognition of activities and gestures from video sequences has been the focus of extensive research [12]\u2013 [15]."]} +{"26376251|1634674": []} +{"26376251|14970359": []} +{"26376251|7788290": []} +{"17915588|1634674": []} +{"23774449|16013270": []} +{"5902632|6387482": ["Simple concatenation, Adaboost, and Random Forests are widely used in the feature-level fusion [12].", "Popular decision-level fusion methods include minimum, maximum, median, majority voting, weighted sum, and geometric mean [12]."]} +{"10270124|1634674": ["The long history of automatically recognising gestures from visual or kinematic measurements is reviewed in [23] [32] [31] [2].", "The problems of detecting and recognizing gestures from human body movements captured using videos or 3D skeletal data have been extensively studied in the computer vision and machine learning communities [2, 31, 32, 23]."]} +{"18533219|1634674": ["It focuses on identifying a person's action or behavior from a single image."]} +{"18533219|7788290": ["A survey on still image based human action recognition\nGuodong Guo n, Alice Lai Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506, United States\na r t i c l e i n f o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become an active research topic in computer vision and pattern recognition.", "\u2026o\nArticle history: Received 23 July 2013 Received in revised form 16 March 2014 Accepted 13 April 2014 Available online 9 May 2014\nKeywords: Action recognition Still image based Various cues Databases Survey Evaluation\na b s t r a c t\nRecently still image-based human action recognition has become\u2026"]} +{"21379479|206764452": ["Ger\u00f3nimo et al. [6] also presents a survey of people detection but with a clear focus on driver assistance systems and de \ufb01 nes a processing pipe line: pre-processing, foreground segmentation, object classi \ufb01 cation, veri \ufb01 cation or re \ufb01 nement, tracking and application."]} +{"21379479|16525678": ["As de \ufb01 ned for canonical surveillance systems [2, 9], every people detection approach consists mostly of, \ufb01 rst, the design and training (if training is required) of a person model based on characteristic parameters (motion, dimensions, silhouette etc.) and, second, the adjustment of this person\u2026"]} +{"21379479|17516538": ["As de \ufb01 ned for canonical surveillance systems [2, 9], every people detection approach consists mostly of, \ufb01 rst, the design and training (if training is required) of a person model based on characteristic parameters (motion, dimensions, silhouette etc.) and, second, the adjustment of this person\u2026"]} +{"5865347|50458504": ["Finally, due to the wide-range of application domains, fraud detection has attracted many surveys (Edge and Falcone Sampaio 2009; Flegel et al. 2010; Phua et al. 2010).", "For a general survey on various fraud detection techniques, we refer the reader to [Bolton and Hand, 2002] and [Phua et al., 2010].", "Finally, due to the wide-range of application domains, fraud detection has attracted many surveys [Edge and Sampaio, 2009, Flegel et al., 2010, Phua et al., 2010]."]} +{"11513638|1634674": ["In the area of depth imaging system, a depth human body silhouette is extracted, the background is discarded, and its information contents are analyzed for its use in application areas such as human tracking, monitoring, and user recognition systems [7\u20139]."]} +{"46817082|8034133": []} +{"46817082|7788290": []} +{"3131440|6387482": []} +{"28817124|1634674": []} +{"28817124|25699143": []} +{"13266485|4915696": ["This can be noticed by the number of papers that addressed the problem in the last ten years [1], [2].", "In this paper, we focus on trajectory-based and pixel-based approaches for unsupervised abnormal behavior detection [2]."]} +{"8112675|1634674": ["Ryoo, [111] Poppe and [139] Turaga et al."]} +{"8112675|50041": ["Brezeale and Cook [17] surveyed text, video, and audio features for classifying videos into a predefined set of genres, e.g., \" sports \" or \" comedy \" .", "Brezeale and Cook [17] surveyed text, video, and audio features for classifying videos into a predefined set of genres, e."]} +{"9689275|7788290": ["Interpretation of human actions is a well recognized problem in computer vision [2, 3, 1, 6, 9, 10, 16, 17, 19, 20, 22, 25, 26, 27]."]} +{"15324087|1634674": ["Human action recognition ( Aggarwal and Ryoo, 2011; Turaga et al., 2008 ) has become an important area in computer vision research , whose aim is to automatically classify the action ongoing in a temporally segmented video."]} +{"206592484|456491": []} +{"17620275|17516538": ["What\u2019s more, recognizing actions in realistic settings has caught great attention of researchers from real-time video surveillance and security monitoring, automatic video indexing, and human-computer interfaces [10, 16, 37, 55].", "[16, 52] and Murthy [33] applied the leave-one-group-out cross-validation to 25 groups."]} +{"17620275|7185733": ["What\u2019s more, recognizing actions in realistic settings has caught great attention of researchers from real-time video surveillance and security monitoring, automatic video indexing, and human-computer interfaces [10, 16, 37, 55]."]} diff --git a/edge/graph_7854020.jsonl b/edge/graph_7854020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f59eb8c80bfea4357be4cdf4204b842e3f0c347 --- /dev/null +++ b/edge/graph_7854020.jsonl @@ -0,0 +1,4 @@ +{"6109808|7988320": []} +{"6109808|17205659": ["A brief summary of these attacks is given in Table 1 [8]."]} +{"6109808|1230643": []} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} diff --git a/edge/graph_7856784.jsonl b/edge/graph_7856784.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..736a1554ea605c3beba64135e87a3e09dcda6736 --- /dev/null +++ b/edge/graph_7856784.jsonl @@ -0,0 +1,2 @@ +{"10642440|18815111": ["As a result, as new peers access a particular file, the system's capacity to provide that file increases [12].", "A distributed computing system consists of multiple software components that are on multiple computers, but run as a single system [12, 19]."]} +{"10642440|14697846": ["The most general P2P system is the decentralized unstructured system [18]."]} diff --git a/edge/graph_7857223.jsonl b/edge/graph_7857223.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7858542.jsonl b/edge/graph_7858542.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62a92d72ee74bc1be00ec0ae64f007f8243614d7 --- /dev/null +++ b/edge/graph_7858542.jsonl @@ -0,0 +1 @@ +{"7110315|8953108": []} diff --git a/edge/graph_7860973.jsonl b/edge/graph_7860973.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f649045d1501ed24cebd748705fe1e3dc13ccc6 --- /dev/null +++ b/edge/graph_7860973.jsonl @@ -0,0 +1,42 @@ +{"13231519|10355303": ["Many appearance based tracking methods [6, 18, 19, 22, 23, 25, 33, 36, 38] have been developed to tackle challenges due to changes in illumination, occlusion and scale variations."]} +{"9022135|1634674": ["The successful interpretations of higher-level human motions greatly rely on the precision of human detection [45][47]."]} +{"9022135|17516538": ["The camera could be fixed, pure translational or mobile in nature [63]."]} +{"7018628|819377": ["For the depth classifier, the Gaussians have a single dimension; for the color based classifier, Gaussians have three component s that are assumed to be independen t, thus reducing the computa tional cost of the algorithm as widely consid ered in the literature [6,26].", "5 (used for matched component identification in MoG models [26]) as the distance for which CLC is considered a very reliable classifier, reaching the maximum weight Wmax for d\u00f0x\u00de 1\u20444 2."]} +{"15928602|4351505": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|41505326": ["It is worth mentioning, there are more than 40 datasets speci\ufb01cally for 3D human action recognition [47].", "For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|12724190": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15928602|1262156": ["For a more extensive list of current 3D activity analysis datasets and methods, readers are referred to these survey papers [47, 1, 5, 12, 21, 45, 3]."]} +{"15961020|819377": ["As widely proposed in the literature (see the reviews [7,8]), the color components are considered independent, and therefore X is a diagonal matrix containing the variances of the three color components.", "From now on, we will refer to the classifiers built on these models as MoGc and MOGD- The MoG algorithm is a very popular per-pixel background modeling technique (see the comprehensive review presented in [8] for more details), which allows to cope with multi-modal backgrounds, and to adapt the model to gradual changes."]} +{"15310686|7360895": ["Second, studies in the human\u2013robot field reveal that people tend to feel threaten by big robots [12]."]} +{"15310686|9045232": ["It is not in the scope of this paper to develop face detection techniques since there is plenty literature about it [41]."]} +{"15310686|7788290": ["One fundamental aspect in that sense is people detection and tracking, existing an extensive literature about the topic [14,25,36,40].", "Techniques usually employed for that purpose consist in creating a background image (pixel by pixel) using several images of the scene, if possible, without motion elements in them [14,18,25,36]."]} +{"6471474|5755403": ["\u2026al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an object is then treated as\u2026"]} +{"6471474|16525678": ["While some existing reviews Valera and Velastin (2004) and Aghajan and Cavallaro (2009) tried to cover all the aspects of 0167-8655/$ -see front matter \u00d3 2012 Elsevier B.V.", "Many intelligent multi-camera video surveillance systems have been developed (Collins et al., 2001; Aghajan and Cavallaro, 2009; Valera and Velastin, 2004)."]} +{"6471474|12127129": ["Background subtraction (Piccardi, 2004) is widely used for detecting moving objects in video surveillance with static cameras."]} +{"6471474|17516538": ["\u2026and Grimson, 2000; Oliver et al., 2000; Haritaoglu et al., 2000; Brand and Kettnaker, 2000; Medioni et al., 2001; Honggeng and Nevatia, 2001; Hu et al., 2004; Wang et al., 2006; Morris and Trivedi, 2008; Wang et al., 2008, 2011), objects are first detected and tracked and the activity of an\u2026"]} +{"2543083|12127129": []} +{"15356848|10817088": ["Many ambient sensor systems were applied to address different health issues, such as mental health, emotional state, sleep measures, Diabetes and Alzheimer\u2019s Disease [10]."]} +{"15356848|28392119": ["Saito [21] reviewed the home gateway from a broad, practical perspective, and proposed a home gateway architecture suitable for better implementation and management."]} +{"15356848|5664472": ["Systems for daily life assistance have been designed for monitoring people with dementia, measuring sleeping-respiration, and tracking medication habits [16]."]} +{"15356848|15947359": ["Analysis of human motion by way of visual information has been achieved through the use of multi-camera architectures in indoor and outdoor environments [15], by using centralised or distributed platforms predicated on processing requirements and scalability issues."]} +{"206764948|206764452": ["mance is a lower bound for the performance of a full system and that tracking, contextual information, and the use of additional sensors can help reduce false alarms and improve detection rates (see [2]).", ", see [2], [6], [42]), a comparative study of approaches for integrating detector outputs over time has not been carried out.", "[2] performed a comprehensive survey of pedestrian detection for advanced driver assistance systems, with a clear focus on full systems.", "We focus on methods for detecting pedestrians in individual monocular images; for an overview of how detectors are incorporated into full systems we refer readers to [2].", "Just in the US, nearly 5,000 of the 35,000 annual traffic crash fatalities involve pedestrians [1]; hence the considerable interest in building automated vision systems for detecting pedestrians [2].", "[38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"206764948|1029120": ["For an overview of how detectors are incorporated into full automotive systems that utilize stereo, scene geometry, tracking, or other imaging modalities (e.g., [30], [38], [39], [40], [41]), we refer readers to [2], [42], [43]."]} +{"691081|192934": []} +{"1192198|1029120": ["Gandhi and Trivedi [20] focus on the pedestrian protection application in the intelligent vehicle domain."]} +{"1192198|192934": ["multilayer neural networks [33] implement linear discriminant functions in the feature space in which input patterns have been mapped nonlinearly, e.", ", mean squared error [33]."]} +{"1192198|7788290": ["The authors of [ 21 ], [47], [57] cover methods for people detection, body pose estimation, and activity recognition.", "At this point, we omit discussion of complex 3D human shape models [ 21 ] and focus on 2D pedestrian shape models that are commonly learned from shape contour examples."]} +{"206764452|1029120": ["Unlike [11], this paper focuses on the techniques used in PPSs, rather than on general pedestrian safety.", "The same authors recently presented a survey that reviews infrastructure developments, sensors, and pedestrian detection approaches in a general transport safety context, rather than focusing especially on on-board detection [11]."]} +{"206764452|2113024": ["Recently, Krotosky and Trivedi proposed the use of multimodal stereo analysis to generate candidates, i.e., combining two different sensor types, like VS and TIR to perform stereo [60] or a VS stereo pair matched with TIR imaging [57].", "Krotosky and Trivedi [57] evaluate tetra and tri-sensor systems that utilize both the VS and TIR.", "In 2006, Gandhi and Trivedi [10] followed the same approach, but focused on the aspects of collision prediction and pedestrian behavior analysis."]} +{"206764452|9045232": ["Nevertheless , unlike other fields, such as face or vehicle detection, in which in-depth reviews analyzing the algorithms and successful systems have been presented (e.g., [12], [13]), pedestrian detection for ADAS lacks an exhaustive review."]} +{"14397159|1634674": ["1) and uses various computer vision approaches [2, 23, 39, 64, 65].", "Background subtraction is popularly used to separate moving objects (human shape here) in the scene by segmenting into background and foreground [64] and many methods are proposed in the literature [9, 14, 27, 54]."]} +{"41505326|1262156": ["However, available RGB-D-based datasets have insofar only been briefly summarised or enumerated without comprehensive coverage and in-depth analysis in the survey papers, such as [9,10], that mainly focus on the development of RGB-D-based action recognition algorithms.", "[10] summarised the major applications from the algorithm development perspective in [10]."]} +{"41505326|12358655": []} +{"41505326|18803401": ["Review papers categorizing and summarizing their characteristics are available to help researchers in evaluating their algorithms [5, 6, 7]."]} +{"41505326|16013270": ["Review papers categorizing and summarizing their characteristics are available to help researchers in evaluating their algorithms [5, 6, 7]."]} +{"14106275|14545307": []} +{"96548|9045232": ["A recent survey [22] includes a very interesting overview of the use of color for face (and, therefore skin-color) detection."]} +{"96548|7788290": ["Therefore, the type and complexity of the models employed for tracking vary dramatically [4,3], depending heavily on the requirements of the application domain under consideration."]} +{"4915696|5755403": ["Although many algorithms have been developed to track, recognize and understand the behaviors of various objects in video [9], they were mainly designed for common scenes with a low density of population [5], [6], [10]."]} +{"4915696|17516538": ["Motion patterns learning is important in automated visual surveillance [5], [6], [21].", "To fuse information from multi-sensors is always an effective way to reduce the confusion and to improve the accuracy [6].", "Video analysis and scene understanding usually involve object detection, tracking and behavior recognition [5], [6].", "In this work, we use the Horn/Schunk - Lucas/Kanade method proposed by Bruhn et al. [6] which we found to be a good compromise between precision and speed.", "Although many algorithms have been developed to track, recognize and understand the behaviors of various objects in video [9], they were mainly designed for common scenes with a low density of population [5], [6], [10]."]} +{"206357333|17516538": ["[87] advocated that featurebased tracking algorithms consist of three groups, based on the nature of selected features: global feature-based [41,122,137,156], local feature-based [35,128], and dependence-graph-based algorithms [51,62,63,57]."]} +{"206357333|7788290": ["In fact, these approaches attempt to recover 3-D articulated poses over time [60]."]} diff --git a/edge/graph_7861381.jsonl b/edge/graph_7861381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62d9f9f2cd53a306cfa9b3805feb82597748df26 --- /dev/null +++ b/edge/graph_7861381.jsonl @@ -0,0 +1,4 @@ +{"14401366|206051485": ["Generally, nonrigid schemes are required for image registration (for a recent survey see [1])."]} +{"8474108|206051485": ["Putting two images into registration can be restated as finding a function (also called a deformation field) that performs the backward mapping of a target image onto a source image [1], [2]."]} +{"1224379|53680608": ["Optical flow methods A special kind of method is optical flow, which is used to find small deformations in temporal sequences of images (see Horn and Schunck, 1981; Aggarwal and Nandhakumar, 1988; Barron et al., 1994).", "A special kind of method is optical \ufb02ow, which is used to \ufb01nd small deformations in temporal sequences of images (see Horn and Schunck, 1981; Aggarwal and Nandhakumar, 1988; Barron et al ., 1994)."]} +{"18639771|25699143": []} diff --git a/edge/graph_7873063.jsonl b/edge/graph_7873063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7873195.jsonl b/edge/graph_7873195.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7875284.jsonl b/edge/graph_7875284.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7876249.jsonl b/edge/graph_7876249.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67474e08624c1f9682373abdf6774098fe76f176 --- /dev/null +++ b/edge/graph_7876249.jsonl @@ -0,0 +1,34 @@ +{"37546126|7988320": ["Nodes in BANs have a heterogenous structure in terms of available energy and computing power which needs to be considered to minimize interference and avoid tissue heating [2]."]} +{"3096077|7988320": ["[3] provided a comprehensive survey on WBSNs."]} +{"14357918|1236072": ["Also use of greater number of sensors results in sensing ability over larger areas with greater accuracy [ 4-5 ].", "One of the problems of large-scale mass production of cheap sensor motes and their large-scale deployment is that in near future it will not be possible to assign unique hardware identifiers to each mote manufactured [ 5-7 ].", "The innumerable applications of wireless motes include intrusion detection, security and tactical surveillance, disaster management, weather monitoring, habitat monitoring applications and monitoring of different biological parameters inside the human body [ 1-5 ]."]} +{"8423295|6275330": ["Nowadays, WSNs support an ever growing variety of applications including environment and habitat monitoring, surveillance and reconnaissance, home automation, biomedical applications, object tracking, traffic control, fire detection, inventory control, agriculture, machine failure diagnosis and energy management [1\u20137]."]} +{"8423295|205286988": []} +{"8423295|1236072": []} +{"5137547|1236072": ["They deal with various design constraints like load-balancing, energy efficiency and delay constraints [2,3].", "The innumerable applications of wireless sensor motes include intrusion detection, security and tactical surveillance, disaster management, weather forecast, habitat monitoring, air traffic control, traffic surveillance, video surveillance, industrial andmanufacturing automation, distributed robotics and monitoring of different critical biological conditions inside the human body [2,3,4,5,20]."]} +{"15305984|1236072": ["Recently, many routing protocols, such as Cluster-Tree Algorithm [2] and NST-AODV [3], have been proposed for sensor networks [4], [5]."]} +{"15165106|1236072": []} +{"74068280|3892600": ["Body Area Network (BAN) [4] [5] [6], is related to Wireless Body Area Network (WBAN) is a application of wireless network of wearable computing devices."]} +{"1471629|1236072": []} +{"207411758|2295142": ["Wireless sensor network (WSN) is a collection of largely deployed sensor nodes with limited computational, transmission capability and power supply (Radi et al., 2012)."]} +{"207411758|205286988": ["Many routing algorithms have been proposed to improve the performance through the network layer of the protocol stack (Al-Karaki and Kamal, 2004; Akkaya and Younis, 2005), but most of them are based on single-path routing approach."]} +{"207411758|1236072": ["Many routing algorithms have been proposed to improve the performance through the network layer of the protocol stack (Al-Karaki and Kamal, 2004; Akkaya and Younis, 2005), but most of them are based on single-path routing approach."]} +{"57726398|1230643": []} +{"22845636|1236072": ["A number of QoS support routing protocols have been proposed for wireless sensor networks recently [2][3]."]} +{"22845636|1708582": ["Detailed information on reinforcement learning can be found in [9]."]} +{"7988320|6539555": []} +{"8923469|8530790": ["Since Schaf\u00adfer uses proportional fitness assignment [Goldberg 1989], these \nare in turn pro\u00adportional to the objectives themselves [Fonseca and Fleming 1994].", "Fonseca and Fleming [1993] proposed the use of a utility function combined with MOGA [Fonseca and Fleming \n1994; 1995c] to produce a method for the progressive articulation of prefer\u00adences.", "However, the \nuse of tourna\u00adment selection with this approach makes an important difference with re\u00adspect to other \napproaches such as VEGA, since pairwise comparisons of tournament selection make scaling in\u00adformation \nnegligible [Fonseca and Flem\u00ading 1994; 1995c].", "Population sizes considerably larger than usual with other approaches \nare used, so that the noise of the selection method is tol\u00aderated by the emerging niches in the population \n[Fonseca and Fleming 1994]."]} +{"5970928|17669480": ["However satisfying multiple QoS constraints which belong to different categories are modeled to be an NP-Complete problem as discussed in [18].", "They are end-to-end delay, available bandwidth, delay jitter, probability of packet loss [18]."]} +{"5970928|14088590": []} +{"35871405|6275330": []} +{"35871405|205286988": []} +{"35871405|1236072": []} +{"35871405|3540699": []} +{"35871405|1230643": []} +{"38377511|16514036": []} +{"16372481|7988320": ["Similar WBAN settings can be found in [3], [10]."]} +{"12012646|2685137": []} +{"17410801|7988320": ["Additionally, TARA only considers temperature as a metric, has low network lifetime, high end-to-end delay, low reliability, high packet loss ratio and does not consider power efficiency and link probability.", "However, BANs applications have different architectures, technological requirements, constraints and goals.", "In Section IX, we provide a comparison of routing in BANs with WSN and MANET routing.", "On the other hand, energy efficient routing protocols in MANETs consider finding routes to minimize energy consumption in cases with small energy resources.", "Additionally, TARA experiences larger number of hops and higher packet loss compared to LTR and ALTR as it reroutes data from heated regions.", "Routing protocols in WSNs [3] and MANETs [4] have been excessively studied in the past few years.", "Hence, even though the general characteristics of BANs are somehow similar to MANETs and WSNs, the unique differences amongst them with BANs requires novel solutions in their routing protocols.", "As shown in Fig.1, the devices of BANs are scattered all over the body in a centralized network\n\u00a9 2013 ACADEMY PUBLISHER\narchitecture where the precise location of a device is application specific [14].", "However, the stringent requirements of BANs imposes certain constraints on the design of their routing protocol which leads to novel challenges in routing which have not been met through routing protocol in WSNs and MANETs."]} +{"17410801|7854020": ["BANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real-time patient monitoring [7]."]} +{"17410801|1762301": ["memory access, data processing, measurement and also the required energy to receive or transmit data over a wireless link [4].", "Routing protocols in WSNs [3] and MANETs [4] have been excessively studied in the past few years."]} +{"205458526|3540699": []} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} diff --git a/graph_787638.jsonl b/edge/graph_787638.jsonl similarity index 100% rename from graph_787638.jsonl rename to edge/graph_787638.jsonl diff --git a/edge/graph_7876633.jsonl b/edge/graph_7876633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_787899.jsonl b/edge/graph_787899.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7882059.jsonl b/edge/graph_7882059.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d3353d7804b4416cdcebf1c97d9566b569681bc --- /dev/null +++ b/edge/graph_7882059.jsonl @@ -0,0 +1,3 @@ +{"810055|289357": ["2), and the possibility of ever arriving within a polynomial factor of time 2, for example for Chromatic Number, has been a well-known open problem [48]."]} +{"115229097|534755": ["In particular, various extensions have been developed to accommodate continuous values [8,25,29,51,137,144,232]."]} +{"5608353|289357": []} diff --git a/edge/graph_7885409.jsonl b/edge/graph_7885409.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c79d7bf324d58c39c0f719e4f6b5587302c73dd1 --- /dev/null +++ b/edge/graph_7885409.jsonl @@ -0,0 +1,18 @@ +{"3947094|7885409": ["A complete survey about the cross-network research problems and recent works done in heterogeneous information networks is available in [15]."]} +{"2086183|8310135": []} +{"35493|393948": ["We use the LINE model to learn unsupervised embeddings with the word-word network, word-document network or the combination of the two networks."]} +{"809891|12894036": []} +{"3951572|3330313": []} +{"6198178|3330313": ["A good overview of outlier detection techniques can be found in surveys [5, 14].", "Although outlier detection has been studied extensively in data mining and various application fields [5, 14], outlier detection in heterogeneous information networks poses several unique challenges: 1."]} +{"14213246|10500613": []} +{"6155822|8125630": ["As key ingredients in decision support systems (DSS), data warehouses and OLAP have demonstrated competitive advantages for business, and kindled considerable research interest in the study of multidimensional data models and data cubes [7, 4].", "While studies on contemporary networks have been around for decades [20], and a plethora of algorithms and systems have been devised for multidimensional analysis in relational databases [7, 4], none has taken both aspects into account in the multidimensional network scenario.", "Data warehouses are critical in generating summarized views of a business for proper decision support and future planning [4]."]} +{"3961529|7885409": ["PCT is an important research problem and can be the prerequisite for many concrete real-world applications, like network fusion [33, 29, 11, 31, 19], cross-network recommendation [27, 28, 34, 19], mutual community detection [32, 30], and inter-network information diffusion [26].", "give a comprehensive survey about the existing works on heterogeneous information networks in [19], which includes a section talking about network information fusion works and related application problems in detail."]} +{"3939410|17157304": []} +{"1738470|10500613": []} +{"14106304|15529291": ["For a comprehensive survey of the approaches for author name disambiguation, you could refer to the survey paper [8]."]} +{"3749523|3330313": []} +{"8212001|14171067": ["Tree similarity measures for ontologies such as tree edit distance [2] are neither desirable because the edit operations do not apply here, and the computation of them has biquadratic complexity w."]} +{"3906402|15273230": ["However, Accuracy scores of UMA and BIG-ALIGN-PM in Figure 4(d) are both very high (around 100%) with negligible gaps, which may be due to the class imbalance issues [5]."]} +{"14481215|6387482": []} +{"14033945|8125630": ["In computing, OLAP presents us with a means of swiftly answering multi-dimensional analytical queries[3]."]} +{"3897251|207372751": ["Many topological features have been proposed for the homogeneous networks, and see more details in [13]."]} diff --git a/edge/graph_7885451.jsonl b/edge/graph_7885451.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c871d3f644627cb9d2b2b0f4867814ca50799ef --- /dev/null +++ b/edge/graph_7885451.jsonl @@ -0,0 +1,5 @@ +{"18306944|13916820": []} +{"18306944|14420517": ["We have developed some patterns for security web services standards such as WSSecurity, XML Encryption, and XML Signature, most of which are surveyed in [74, 75] and described in [13]."]} +{"18306944|12815020": ["Prolexias products also defend against DoS [40], and a survey of IDS techniques for clouds is given in [41]."]} +{"3057478|14420517": ["There are several security standard specifications [79] such as Security Assertion Markup Language (SAML), WSSecurity, Extensible Access Control Markup (XACML), XML Digital Signature, XML Encryption, Key Management Specification (XKMS), WS-Federation, WS-Secure Conversation, WS-Security Policy and WS-Trust."]} +{"3057478|627405": ["We have carried out a systematic review [13-15] of the existing literature regarding security in Cloud Computing, not only in order to summarize the existing vulnerabilities and threats concerning this topic but also to identify and analyze the current state and the most important security issues for Cloud Computing."]} diff --git a/edge/graph_7888237.jsonl b/edge/graph_7888237.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7889189.jsonl b/edge/graph_7889189.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c92036b4ba9968c0bb8be7b16b7a3742cfffe40 --- /dev/null +++ b/edge/graph_7889189.jsonl @@ -0,0 +1,11 @@ +{"14410720|14441987": []} +{"1459185|14441987": ["An example of the routing challenges currently faced by mobile ad hoc networks is outlined in a previous review paper [2].", "Also known as proactive, these protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [2].", "The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth, and high error rates [2]."]} +{"7570331|13372227": ["Jane installs necessary software in her car and is ready to go."]} +{"286417|1230643": ["Sensor nodes are expected to be deployed densely in a large scale and communicate with each other through wireless links without any infrastructure support [1]."]} +{"206446574|1230643": []} +{"1100811|14441987": ["In the field of ad hoc wireless networking [Broch98, Royer99 ], previous work on secure routing employs public key cryptography to perform authentication ([Kong01, NAI, Papadimitratos02b, Zhou99, Zhang98])."]} +{"14806683|13372227": ["In the United States, widespread deployment of such technologies is encouraged by the Federal Communications Commission since it mandated that locating mobile phones must be possible for emergency purposes [15]."]} +{"3390777|14077778": ["With these primitives is point multiplication also possible [32]."]} +{"6516231|14441987": ["Routing: Two approaches of uni-cast routing algorithms are considered for ad hoc networks [12]: Proactive, table driven algorithms and reactive, source initiated, on-demand routing protocols."]} +{"14351892|1230643": ["works [2],in which a large number of sensor nodes collaborate to monitor certain environment."]} +{"99520|14441987": ["Reproduction for academic, not-for profit purposes permitted provided this text is included.\nby Royer and Toh (1999) as Reactive and Proactive.", "The model introduces the notion of belief and provides a dynamic measure of reliability and trustworthiness in an ad hoc network."]} diff --git a/graph_788975.jsonl b/edge/graph_788975.jsonl similarity index 100% rename from graph_788975.jsonl rename to edge/graph_788975.jsonl diff --git a/edge/graph_7892994.jsonl b/edge/graph_7892994.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7893490.jsonl b/edge/graph_7893490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c67f642fd2793e5db92f9e922c94f848739eb85 --- /dev/null +++ b/edge/graph_7893490.jsonl @@ -0,0 +1 @@ +{"15948595|713082": ["A readable introduction to DIS is provided in DIS Steering Committee (1994). The August 1995 issue of the Proceedings of the IEEE includes several articles concerning DIS, and the March 1997 issue of IEEE Spectrum concerning distributed virtual environments."]} diff --git a/edge/graph_7904975.jsonl b/edge/graph_7904975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7909649.jsonl b/edge/graph_7909649.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a56bfd02aae441b655048473be1553b180d75cf1 --- /dev/null +++ b/edge/graph_7909649.jsonl @@ -0,0 +1,3 @@ +{"17683338|6275330": []} +{"17683338|1236072": []} +{"17683338|1230643": ["Considering the resource constraints of typical sensor nodes in a WSN, a new approach is required for OS design in WSN. Literature exists that surveys the application, transport, network and Medium Access Control (MAC) protocols for WSN and their application area, one such survey is [1]."]} diff --git a/edge/graph_7909810.jsonl b/edge/graph_7909810.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_791261.jsonl b/edge/graph_791261.jsonl similarity index 100% rename from graph_791261.jsonl rename to edge/graph_791261.jsonl diff --git a/graph_791880.jsonl b/edge/graph_791880.jsonl similarity index 100% rename from graph_791880.jsonl rename to edge/graph_791880.jsonl diff --git a/edge/graph_7919236.jsonl b/edge/graph_7919236.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d119d1eb3a3f0b3164a84a69c716c4a8e752fe4 --- /dev/null +++ b/edge/graph_7919236.jsonl @@ -0,0 +1,5 @@ +{"2944283|7919236": ["An integrated view on the user experience of recommender systems can be obtained by means of user-centric development (McNee et al. 2006b) and evaluation (Pu and Chen 2010; Pu et al. 2012).", "Pu and Chen (2010, see also Pu et al. 2012) provide an extensive questionnaire to test several specific experience concepts of recommender systems.", "\u2026the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012).", "However, several researchers have argued that there are other factors that influence the user experience (users\u2019 subjective evaluation of their interaction with the system), and that these factors have not received the amount of attention they deserve (McNee et al. 2006a,b; Cosley et al. 2003; Murray and H\u00e4ubl 2008, 2009; Ozok et al. 2010; Pu et al. 2012; Konstan and Riedl 2012)."]} +{"2944283|14148655": ["\u2026recommenders let users rate items, (e.g. youtube.com, see also McNee et al. 2002; Cena et al. 2010; Gena et al. 2011), critique items (see also Chen and Pu 2012; Viappiani et al. 2006), assign weights to item attributes (see also H\u00e4ubl et al. 2004), or indicate their specific needs (e.g.\u2026", "The research on these different preference elicitation methods shows that they have a substantive impact on the user experience (Chen and Pu 2012).", "\u2026users may indicate their preference by assigning weights to attributes (H\u00e4ubl et al. 2004; Kramer 2007), prioritizing user needs (Felix et al. 2001; Stolze and Nart 2004; Hu and Pu 2009) or critiquing examples (Pu and Chen 2006; Pu et al. 2008; Chen and Pu 2012; Viappiani et al. 2006, 2008).", "Hu and Pu (2011, see also Chen and Pu 2012) show that putting a logical structure on the list of recommendations (specifically, categorizing the recommendations to reflect different trade-offs) leads to a higher perceived categorical diversity of the recommendations, a higher satisfaction and\u2026", "Whereas a substantial amount of research considers the individual qualities of these recommendations, little research has considered the composition of the list (Hu and Pu 2011; Chen and Pu 2012; Ziegler et al. 2005; Cooke et al. 2002)."]} +{"3970|7971188": ["Index Terms\u2014Recommender system, Collaborative filtering, Content-based recommendation\nI. INTRODUCTION\nRecommender systems were originally defined as ones in which \u2019people provide recommendations as inputs, which the system then aggregates and directs to appropriate recipients\u2019 [1].", "Some of the most important systems using this technique are [4] Tapestry and Recommender[11].", "Recommender systems are now an integral part of some e-commerce sites such as Amazon.com and CDNow [2]."]} +{"206742345|8125630": ["One way to support aggregated recommendations is by utilizing the OLAP-based approach [19] to multidimensional recommendations."]} +{"16366856|15683881": ["PREFERENCE-BASED ORGANIZATION \nIn the domain of user modeling and decision aid, different data mining algo\u00adrithms have been investigated \nand employed for different adaptive applica\u00adtions [Frias-Martinez et al. 2006].", "INTRODUCTION \nData mining and machine learning techniques have been broadly applied to capture user decision behavior \nwith the goal of establishing accurate user mod\u00adels and aiding the decision process [Webb et al. 2001; \nZhu et al. 2003; Frias-Martinez et al. 2006]."]} diff --git a/edge/graph_7919981.jsonl b/edge/graph_7919981.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7921492.jsonl b/edge/graph_7921492.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7922155.jsonl b/edge/graph_7922155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2bd08f4fb79dbb8305eb0c74c2b83e817df24cb2 --- /dev/null +++ b/edge/graph_7922155.jsonl @@ -0,0 +1,5 @@ +{"37651457|27954888": []} +{"59509186|13726263": []} +{"59509186|40304452": []} +{"59509186|18976841": []} +{"59509186|824249": []} diff --git a/edge/graph_7923075.jsonl b/edge/graph_7923075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bd803c714cff66acbbb162af478dcd4d1112752 --- /dev/null +++ b/edge/graph_7923075.jsonl @@ -0,0 +1,2 @@ +{"15992154|386036": []} +{"6111745|386036": ["The task of discovering links between knowledge bases is closely related with record linkage [22, 9] and de-duplication [7]."]} diff --git a/edge/graph_7923260.jsonl b/edge/graph_7923260.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7923463.jsonl b/edge/graph_7923463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aeda498d37767e3bae2dc37cc2c4c9eaaba2155d --- /dev/null +++ b/edge/graph_7923463.jsonl @@ -0,0 +1 @@ +{"6674407|192934": []} diff --git a/edge/graph_7937139.jsonl b/edge/graph_7937139.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_793757.jsonl b/edge/graph_793757.jsonl similarity index 100% rename from graph_793757.jsonl rename to edge/graph_793757.jsonl diff --git a/edge/graph_7942157.jsonl b/edge/graph_7942157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0383bad9b03259f409120238be2bc2871a74f292 --- /dev/null +++ b/edge/graph_7942157.jsonl @@ -0,0 +1,114 @@ +{"12123442|2623404": ["SDN is a new networking paradigm in which the control and data planes of the network are decoupled [9]."]} +{"12123442|3994942": []} +{"3754203|10837932": ["To better cope with the Internet usage shift from a sender-driven end-to-end communication paradigm to a receiver-driven content retrieval one, a handful of innovative information-centric networking (ICN) architectures have been proposed [1].", "That is, today\u2019s Internet is increasingly used for information dissemination rather than pair-wise communications between end hosts [1], and pays more attention to the content itself rather than where it is physically located [2]."]} +{"1234760|8323234": ["The sparsity of the ch annel in the angular domain can be exploited for an effective estimation of the AoA and AoD vi a CS techniques [34], [35], [73]."]} +{"1234760|17388653": ["Since the span of impulse noise is short in time and thus can be considered as a sparse vector, we can use the CS technique to mitigate this noise [51], [52]."]} +{"1234760|2509135": ["1) Spectrum Sensing: As a means to improve the overall spectrum efficiency, cognitive radio (CR) has received much attention recently [53]."]} +{"76603|512561": ["WSNs [162], [163] [164]\u2013[167] Summary: Deployment of large-scale WSN into PSN can increase situational awareness of EFR and assist in evading any potential disaster."]} +{"76603|61132": ["ation between UAVs in a multi-UAV network are surveyed in [130]."]} +{"76603|10310014": ["We review the LTE-based FirstNet architecture in the United States, the convergence of LTE-LMR technologies, and support for mission-critical PTT over LTE, which are not addressed in earlier survey articles such as [33] and [34].", "The technological advances has brought LTE to a performance level close to Shannon\u2019s capacity bound [34]."]} +{"19938676|3042864": []} +{"19938676|8909218": ["A general observation of the researchers has shown in [14] that most of the wireless users stay inside for approximately 80 percent of time and outside for approximately 20 percent of the time."]} +{"31512446|21386749": ["The IoT will have applications in multiple areas including health care [2], smart cities [3], smart grids [4], drones [5], and industrial monitoring [6]."]} +{"63692323|5660618": ["In networked control systems, the state observation is impacted by some communication latency which delays feedback loops and ultimately leads to a degradation of the system\u2019s stability (an overview of this domain is given in [3])."]} +{"3198443|8909218": ["Index Terms\u20145G, caching, content delivery, HetNets, optimization\n\u00c7"]} +{"23805463|12206204": ["Not only the mobile Internet devices, from smartphones to tablets, will keep the explosive growth of data traffic over the cellular network, but more things, from industrial machines to vehicles, appliances, lights, buildings, or even places and other intangible real world representations are getting connected [2], [3]."]} +{"19618138|206578224": ["In this paper, we assume that the D2D communication is assisted by the SBSs [34] and the SBSs have the global information to make caching decision for all mobile devices."]} +{"8879990|3330461": ["4b, a 10 ms LTE MAC frame is made up of 10 1-ms sub-frames.", "We have considered social video streams of 5 min consider a set of new QoE metrics, which are considered to experience [15]."]} +{"9656523|8323234": ["Most designs have thus considered using either analog or hybrid beamforming (at RF or IF) prior to the A/D conversion [24], [25], or low-resolution fully digital front-end [26], [27] \u2013 see a summary in [28]."]} +{"33307815|14765802": ["A comprehensive review of energy efficient BSs with sleep-mode techniques in cellular networks is presented in [194]."]} +{"33307815|10440280": []} +{"33307815|29060869": ["SGs use wireless networks for energy data collection, power line monitoring, protection and demand/response management [163]."]} +{"33307815|12206204": ["An overview of various 5G activities is presented in [26]."]} +{"33307815|10693567": ["These software components are responsible for managing the control plane, thereby reducing hardware constraints [43], [44]."]} +{"33307815|3330461": ["24 delineates that unlike local D2D communications, M2M communications connect massive number of devices, like smart metering, sensors and smart grid equipments, along with wide coverage areas [123].", "Device centric nature [27] of 5G wireless is expected to enable the devices in proximity to communicate directly bypassing the cellular BS [123] for sharing relevant contents.", "FlashLinQ) [125], public safety networks [123] and maximum allowable distance estimation for commercial roll out [127].", "A comprehensive review of D2D communications is available in [123]."]} +{"33307815|3348390": ["Six unique challenges [140] of IoT include (i) Automated sensor configuration, (ii) context discovery, (iii) acquisition, modeling and reasoning (iv) selection of sensors in \u2018sensing-as-a-service\u2019 model [140] (v) securityprivacy-trust and (vi) context sharing.", "This results, in a unique challenges of connection and configuration [140]."]} +{"33307815|7851743": ["Self configuration replaces conventional manual configuration process [183].", "growth, with myriad of smart devices and ever increasing broadband demands [183].", "In [183], authors have presented a comprehensive survey of self organisation for"]} +{"33307815|10837932": ["A comprehensive review on green networking is presented in [192].", "Power consumption of core and access network is estimated to be equal [192], [193] by 2017.", "In 2009 Deutsche Telekom forecasted a 12-fold increase in the power consumption by network core within a decade [192]."]} +{"3566651|9495329": ["\u2026of network slices are how to properly slice the network and at what granularity [11], it is not dif\ufb01cult to predict that a number of already existing technologies, such as software de\ufb01ned networking (SDN) [13] and network functions virtualization (NFV) [14], will be taken into consideration."]} +{"3566651|10342730": ["Due to the fact that the key problems of network slices are how to properly slice the network and at what granularity [11], it is not difficult to predict that a", "Significant improvements on data rate and latency performance will be powered by logical network slices [11], [12] in 5G communication environment."]} +{"3566651|26368310": ["3) Recovery Time: The recovery time metric is an indicator of the resilience of the networking-caching-computing integrated system, which refers to the time duration in which the system recovers from a certain type of failure or attack [87]."]} +{"3566651|6583734": ["2) Network Function Virtualization: Network function virtualization (NFV) realizes network functions as pure software on commodity and general hardwares, which can solve the problem of network ossi\ufb01cation, and reduce the CapEx and OpEx [161].", "Recently, there is an increasing trend of integrating NFV with SDN to jointly optimize network functions and resources [161], [162].", "Through the implementation of NFV, SDN is able to create a virtual service environment dynamically for a speci\ufb01c type of service chain [161]."]} +{"3566651|3042864": ["\u2026computing (CC) [54] functionalities begin to incorporate into mobile communication systems, bringing up the concept of mobile cloud computing (MCC) [55], which leverages the rich computation resources in cloud for user computation task execution, by enabling computation of\ufb02oading through wireless\u2026"]} +{"3566651|7971188": ["Each UE can act as a caching server in P2P networks [50], [51]."]} +{"3566651|14697846": ["and Peer-to-Peer (P2P) networks [49] have been proposed in application layer, as first attempts to endow content distribution and retrieval capabilities to the networks"]} +{"4566356|3348390": ["Moreover, the works in [4], [16]\u2013[21], [23], and [24] are agnostic to the human users and their features (e.", "However, despite this surge in literature on context-aware networking [4], [16]\u2013[21], [23], and [24] this prior art is still reliant on device-level features.", "Other context-aware resource allocation algorithms are also studied in [21], [23], and [24]."]} +{"1182433|15453366": ["However, up to now, some of the 60 GHz worldwide regulations limit the emitted power at power amplifier output to 10 dBm and equivalent isotropic radiated power (EIRP) to 40 dBm [7]."]} +{"10979668|10937383": ["Physical layer technologies introduced to this end include high order modulation transmission, carrier aggregation, cell densification via heterogeneous network, and multiple-input multipleoutput (MIMO) transmission.", "Technologies under consideration include full-dimension and massive MIMO [5], millimeter-wave communication [6], and spectrally-localized waveforms [7]."]} +{"3668345|26667032": []} +{"3668345|8650651": ["RMD traffic can be transported by optical Gigabit Ethernet CINs or EPON/GPON CINs [75].", "Thus, RMD traffic can be transported by optical Gigabit Ethernet CINs or EPON/GPON CINs [75]."]} +{"4661452|19938676": []} +{"16436570|2623404": []} +{"19008847|7851743": ["[9] [10].", "The reader is referred to [9] for further details on operation timescales of SON.", "While these projections promise that capacity targets of 5G are theoretically achievable, it is alarming to note that the complexity of operation, OPEX, CAPEX, and shrinking profit margins are already major challenges for operators of state-of-the-art cellular networks [9].", "A detailed review of the state-of-the-art SON functions for legacy cellular networks can be found in [9]."]} +{"206578224|6583734": []} +{"206578224|8650651": ["towards a MEC platform or between MEC edges across a heterogeneous radio [104] and over edge-to-edge diverse transport networks [105], [106]."]} +{"206578224|11414835": ["A survey that brings light into the different network hypervisor architectures is presented in [113] considering various deployment solution options."]} +{"206578224|18687271": ["Distributed Mobility Management (DMM) [138]\u2013[140] is a notable solution towards managing the user mobility, overcoming also the scalability and reliability drawbacks of centralized mobility schemes."]} +{"206578224|2535224": ["A survey that presents the main ideas behind SDN in mobile networks, focusing on network programmability, efficient resource sharing and near real-time network control, is elaborated in [102] and [103]."]} +{"4502294|3555631": ["System information is broadcast over the anchor cell which also manages most of the radio resource control and signalling, while the small cells play an assistant role, having data offload as a main task [48]."]} +{"206576469|10559330": ["In contrast, the integrated services model [164] uses a protocol to signal the resource requirements for each identified flow along the network path, allowing policies to be set up and modified in real-time to reflect the needs of each flow."]} +{"27205073|206578197": ["To address this challenge, the concept of wireless network virtualization has recently emerged [4]."]} +{"27205073|206456479": ["This is due to the fact that, in addition to minimizing power and satisfying the slices\u2019 requirements, which are the main goals of conventional resource allocation problems, maintaining slice isolation in the network is a challenging issue in resource provisioning of the virtual network slices [6]."]} +{"27205073|10235514": ["INTRODUCTION Next-generation 5G cellular networks must support a plethora of bandwidth-intensive applications [1]."]} +{"8650651|207262843": ["SDN and virtualization strategies for LTE wireless cellular networks have been surveyed in [50]."]} +{"8650651|6583734": []} +{"8650651|11414835": ["SDN hypervisor can create multiple isolated virtual SDN networks [80], [81]."]} +{"8650651|801245": ["Bitar [39] has surveyed use cases for SDN controlled broad-band access, such as on-demand bandwidth boost, dynamic service re-provisioning, as well as value-added services and service protection."]} +{"8650651|2535224": ["we note that for the field of wireless and mobile networks, SDN based networking mechanisms have been surveyed in [41]\u2013[47] while network virtualization has been surveyed in [48] for general wireless networks and in [49] for wireless sensor networks."]} +{"8650651|15035771": []} +{"8650651|17248887": ["(b) SDN controller utilizes the path computation ability of the PCE [246], [269], [270] and controls network through OpenFlow protocol.", "using an SBI protocol, such as OpenFlow [246], [269], [270]; see illustration b) in Fig.", "devices [33], [34], [242], [244], [246]."]} +{"8650651|2623404": []} +{"8650651|10693567": [", with OpenFlow (OF) switches [7] or network elements (devices) controlled with the NETCONF protocol [8].", "The OpenFlow protocol [2], [7], [56] has been the first protocol for the SouthBound Interface (SBI, also referred to as Data-Controller Plane Interface (D-CPI)) between the con-", ", the OpenFlow protocol [7] for the SBI.", "OpenFlow switching element (data plane) and an OpenFlow controller (control plane) is carried out through the OpenFlow protocol [7], [56].", "The general principles of SDN have been extensively covered in several surveys, see for instance, [2], [6], [7], [10]\u2013[27]."]} +{"8650651|1580493": ["For a \ufb02exi-grid network based on OFDM [31], Zhao et al. [310] have compared a greedy heuristic that maps requests in decreasing order of the required resources with an arbitrary \ufb01rst-\ufb01t benchmark.", "1) [31], [87]\u2013[89] allows the center frequency to be any multiple of 6.", "In a related study on SDN controlled switching in a PON, Yeh et al. [178] have designed an ONU with an optical switch that selects OFDM subchannels in a TWDM-PON.", "For a flexi-grid network based on OFDM [31], Zhao et al.", "The proposed communication is based on carrierless amplitude and phase modulation [215] enhanced with optical Orthogonal frequency Division Multiplexing (OFDM) [150].", "The OFDMA transmissions and receptions are processed in a DSP module that is controlled by a central SDN control module.", "The different OFDM channels are manipulated through DSP \ufb01ltering.", "The FlexPON employs OFDM for adaptive transmissions.", "The survey brie\ufb02y notes how OFDM-based elastic networking can facilitate network virtualization and surveys a few studies on OFDM-based network virtualization in core networks.", "Similar OFDMA based slicing strategies for supporting cloud computing have been examined by Jinno et al. [286].", "Simulation experiments indicate a 40% increase in network bandwidth utilization as a result of the global coordination compared to operating the bandwidth allocation only within the individual PONs [261], [262]. b) Access and Wireless: Bojic et al. [263] expand on the concept of SDN controlled OFDMA enabled VPONs [257] to provide mobile backhaul service.", "Each small-cell site contains an OFDMA-PON ONU that provides the backhaul service through the access network over a VPON.", "[31] have presented a thorough survey on flexible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core (backbone) networks.", "An SDN controller is utilized to assign bandwidth to each small-cell site through OFDMA subcarrier assignment in a VPON to the constituent ONU.", "c) Flexi-grid: The principle of flexi-grid (elastic) optical networking [31], [87]\u2013[92], [226] has been explored in several SDN infrastructure studies.", "Bandwidth allocation is performed at the granularity of OFDMA subcarriers that compose the optical spectrum.", "1) General Multidomain Networks: a) Optical Multitechnologies Across Multiple Domains: Optical nodes are becoming increasingly recon\ufb01gurable (e.g., through variable BVTs and OFDM transceivers, see Section III), adding \ufb02exibility to the switching elements.", "Illustration of DSP recon\ufb01gurable ONU and OLT designs [151]: Each ONU passes the electrical Optical OFDM signal [150] through a Shaping Filter (SF) that is SDN-con\ufb01gured by the DSP controller, followed by a Digital-to-Analog Converter (DAC) and Intensity Modulator (IM) to generate the optical signal.", "Zhang et al. [31] have presented a thorough survey on \ufb02exible optical networking based on Orthogonal Frequency Division Multiplexing (OFDM) in core Fig.", "The virtualization studies on access networks [282]\u2013[284], [286]\u2013[295] have primarily focused on exploiting and manipulating the speci\ufb01c properties of the optical physical layer (e.g., different OFDMA subcarriers) and MAC layer (e.g., polling based MAC protocol) of the optical access networks for virtualization."]} +{"8650651|16972183": ["wireless networks provide Internet access to a wide range of mobile devices [113]\u2013[115]."]} +{"8650651|7686677": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention.", "QoS levels in an energy-efficient manner [465]\u2013[467] is an important future research direction."]} +{"8650651|10837932": ["e) Energy-efficient embedding: Motivated by the growing importance of green networking and information technology [348], a few studies have begun to consider the energy efficiency of the embedded virtual optical networks."]} +{"8650651|8909218": ["For instance, the cell structure of wireless cellular networks [458] has advanced to femtocell networks [459] as well as heterogeneous and multitier cellular structures [460], [461]."]} +{"8650651|10532321": []} +{"8650651|25929315": ["At the same time, machine-to-machine communication [462], [463] and energy savings [464], [465] have drawn research attention."]} +{"51614136|7942157": []} +{"1325931|2509135": ["IEEE Wireless Communications \u2022 December 2015 35 ed to other underutilized white space [7]."]} +{"18176255|2521001": ["[23]."]} +{"9347297|207262843": []} +{"32911245|2623404": ["Since wireless networks bring more latency and packet loss than the traditional SDNs, some previous works focus on control plane problems in wireless networks [14]."]} +{"21391909|29060869": ["The authors in [153], distinguish their work from previous surveys", "In [153], a comprehensive survey on the smart grid-driven approaches in energy-efficient communications and data cen-", "like in smart grid in order to ensure energy efficiency and reliability [153]."]} +{"21391909|12029139": ["[12] present an extensive literature review on RF energy harvesting networks", "These include much greater spectrum allocations at untapped mmWave frequency spectrum bands [13], [22], highly directional massive beamforming antennae at both the mobile devices and BSs [18], [22], longer battery life sustained by energy harvesting techniques [12], full-duplexing communications (FDCs) [21], lower outage probability, much", "energy is predictable and relatively stable over time due to fixed distance [12].", "Authors in [12] have also discussed an RF-powered CR network whereby the RF energy harvesting capability allows secondary users to harvest and store energy from nearby trans-", "The authors in [12], also add that multi-hop RF-EHNs via cooperative relaying techniques can help to overcome fading and attenuation by using intermediate relay nodes, resulting in improved network performance in terms of efficiency and reliability.", "There are several advantages of the RF energy-harvesting techniques for the 5G RAN systems that has been identified in literature [12].", "energy within the 5G RAN systems [12], [13].", "The authors in [12], assert that one of the key concerns for RF information and energy transfer is the decay in energy transfer efficiency with the increase of transmission distance due to propagation path loss.", ", through innovative energy harvesting), will be a crucial component of the design [2], [12].", "Typically, the macrocells are served by high power base stations (MeNBs) with transmit powers close to 43 dBm and antennae gains close to 12 \u2212 15 dBi [12]."]} +{"21391909|2443013": ["(CCs) dispersed within and across different bands (intra/interband) thereby boosting the user throughput in LTE-Advanced (LTE-A) as well as the future 5G RAN systems [75].", "heavy computational burden and a huge amount of the CSI feedback [75]."]} +{"21391909|8974063": ["[108] and Tsiropoulos et al."]} +{"21391909|5338241": []} +{"21391909|7686677": ["generation wireless networks is a growing concern for operators not only for profitability maintenance but also for the overall adverse environmental effects reduction [124], [142].", "2) Dynamic Power Saving (DPS) Techniques: Several researchers have presented research trends, exposed some research issues and challenges and suggested some techniques for the green cellular networks [124], [143]."]} +{"35418901|4502294": ["Linked to this, work in [11] surveys all transport network solutions available for fronthaul and discusses the impact of such technologies in the RAN context."]} +{"32786517|35906806": []} +{"26572023|207262843": []} +{"1049844|8440916": []} +{"25911553|9495329": ["Bizanis and Kuipers [8] presented a survey about SDN and virtualization for Internet of Things (IoT), which covers proposals adopting these two concepts into MCN and WSNs."]} +{"25911553|37966695": ["There are a large number of solutions proposed to solve this problem in wired SDN research [39], [63], [158] such as horizontally distributed SDN controllers where multiple controllers are organized in a flat control plane (e.", "or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|207262843": ["[12] are the related surveys, which only focus on the MCN architecture, which is typically composed of Radio Access Networks (RANs), mobile backhaul networks, and the MPC network.", "Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the field of mobile and wireless networks [12]."]} +{"25911553|6583734": ["In turn, SDN serves NFV by providing programmable network connectivity between VNFs to achieve optimized traf\ufb01c engineering and steering [49]."]} +{"25911553|11414835": ["Regarding SDN, the network slicing concept has been discussed in several proposals in the context of network hypervisors [148], such as FlowVisor [149], OpenVirteX [150].", "The network slicing can also be done by using the concept of a network hypervisor [148] such as FlowVisor [149] or OpenVirteX [150] in full-SDN MPC architectures."]} +{"25911553|2535224": ["[5] mainly surveyed current efforts applying SDN and virtualization into MCN and", "[5] 2015 WLAN, MCN SDN Year, network type, network position 4"]} +{"25911553|15035771": ["It could be overcome by using multiple controllers or through a hierarchical design of controllers [62], [63], but in the context of mobile network, these designs are still unclear."]} +{"25911553|2623404": ["Nowadays, SDN has gained a lot of attention from both academia and industry in many networking areas, not only wired networks such as campus or data center [37], [38] but has also been expanding quickly in the \ufb01eld of mobile and wireless networks [12].", "Interested readers can \ufb01nd more about SDN and its applications in [37]\u2013[41]."]} +{"25911553|11735843": ["As shown in this figure, most of the related surveys [4]\u2013[9]"]} +{"13995312|8909218": ["\u2026beyond the scope of this paper, involving research issues at multiple layers, such as the physical layer of a small cell tier architecture [see [4] and references therein)], or the scheduling protocols for video streaming over wireless networks (e.g., see [15], [18], [19]), here we focus on a\u2026", "Such pico-and femtocell networks, which are usually combined with macrocells into a heterogeneous network, are receiving a lot of attention in the recent literature, (e.g., see [4] and references therein).", "A drawback of this approach, though, is the requirement for high-speed backhaul to connect the small cell access points to the core network [4]."]} +{"16988055|8650651": ["The flexible transport network can, for instance, be implemented through a Software Defined Elastic Optical Network (SD-EON) [41], [42].\nb) Sm-GW virtualization: The SM-GW can support a variety of virtualization strategies, e.g., to provide independent virtual networks for different operators.", "The flexible transport network can, for instance, be implemented through a Software Defined Elastic Optical Network (SD-EON) [41], [42]."]} +{"16988055|11414835": ["Sm-GWs could then be abstracted by a hypervisor [43]\u2013[46] that intercepts the SBI, as illustrated in Fig."]} +{"9745860|7686677": []} +{"9745860|15255963": []} +{"40496333|1598350": ["Growth in machine-type communications, sometimes referred to as the Internet of Things (IoT), will become an inherent part of many fields such as smart grid transportation, industrial control, healthcare, water resources management and mining [1] [2]."]} +{"21130333|3330461": ["Interference needs to be adequately mitigated through proper resource allocation algorithms [10] that, unlike traditional LTE scheduling, can enforce spatial reuse [11], which allows different transmissions to be allocated in the same RBs by improving the spectrum utilization."]} +{"21130333|17934515": ["This strategy suffers from larger spacing errors between vehicles as the platoon size grows [1].", "Different control strategies (the type of information required by the control algorithm and the consequently provided stability features) may be considered when designing the CAM dissemination policy [1].", "It is a complex system that integrates computing, communication, and control technologies [1].", "c o m / t r a m in o Vehicles in a platoon follow the same path, driving close to each other and keeping a fixed distance between vehicles in the order of 10 m [1]."]} +{"33848460|29464310": ["That is why the requirements for the CPRI interface are quite tight, which makes this interface quite rigid (static) and costly.", "Fronthaul links are typically point to point links used exclusively by speci\ufb01c fronthaul protocols, such as Common Public Radio Interface (CPRI) [3].", "Fronthaul links are typically point to point links used exclusively by specific fronthaul protocols, such as Common Public Radio Interface (CPRI) [3].", "The packet switched network is the primary path for the transport of most delay-tolerant traf\ufb01c, the circuit switching path complements the packet switched path for those traf-\ufb01c that is not suited for packet-based transport or has an extremely low delay tolerance (e.g., legacy CPRI), the circuit switching path can also be used to reduce the of\ufb02oad of the XPFE.", "For example, CPRI uses a continuous constant bitrate-like transmission, and it is not packetized.", "Current deployment of OBSAI [12] or CPRI [3] for the fronthaul traf\ufb01c is mainly using dark \ufb01bers to the Remote Radio Heads as other technologies do not meet the stringent requirements of latency (e.g., about 100 (cid:2) s for CPRI) and jitter (2 ppb).", "Current deployment of OBSAI [12] or CPRI [3] for the fronthaul traffic is mainly using dark fibers to the Remote Radio Heads as other technologies do not meet the stringent requirements of latency (e.", "Where necessary, the frame format is mapped to the XCF format for forwarding by the XPFEs (e.g., CPRI over Ethernet)."]} +{"24937434|7971188": ["fic they serve, including files, movies, songs, etc, but they are limited in the sense that they use specific protocols for their operation [8], [9]."]} +{"24937434|14697846": []} +{"24937434|9104850": ["Due to this similarity, only a small number of off-path caching mechanisms have been proposed, such as [27], [28], and [40]\u2013[42], complementing the existing literature on optimized distributed caching [43]\u2013[46]."]} +{"2318872|61647869": ["ports the radio frequency signal over an optical fiber link by converting the electrically modulated signal to an optical signal [90]\u2013[92]."]} +{"2318872|4502294": ["Another direction is to examine and improve the interactions of the R-FFT remote nodes and headends (BBUs) with the corresponding metropolitan area networks [119]\u2013[123] and radio backhaul (core) networks [124]\u2013[126]."]} +{"2318872|29464310": []} +{"2318872|8650651": ["wireless and optical network segments that each conduct their own specific physical and medium access control layer processing [94], [96], [97]."]} +{"2318872|14765802": ["Mechanisms to reduce the carbon foot print of access networks have recently been investigated in wireless networks [43]\u2013[49] as well as cable networks [50]\u2013[52]."]} +{"14677554|8909218": []} +{"208022430|19938676": []} +{"208022430|14765802": []} +{"32338550|1049844": []} +{"32338550|7942157": ["Long-Term Evolution (LTE) is the standard for the nationwide broadband communications for the past several years [1], [8]."]} diff --git a/edge/graph_7957076.jsonl b/edge/graph_7957076.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7963172.jsonl b/edge/graph_7963172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e6d206acf85a46429c9d052206e08b1a48c34b57 --- /dev/null +++ b/edge/graph_7963172.jsonl @@ -0,0 +1,5 @@ +{"14499417|33829339": []} +{"14499417|12846121": []} +{"111156396|17438822": []} +{"6849168|7773456": ["Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12.0). BrumeUe & Sidney [1982] show that Johnson's [1954] algorithm for F21 I C max also applies to the exponential case.", "Most work has concentrated on flow shops; Pinedo & Weiss [1984] deal with some stochastic variants of the Gonzalez-Sahni [1976] algorithm for 0211 C max (see Section 12."]} +{"60610459|11810221": []} diff --git a/edge/graph_7967884.jsonl b/edge/graph_7967884.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7971188.jsonl b/edge/graph_7971188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..12b17bedfbdd2c667d33413c677530dda1072f78 --- /dev/null +++ b/edge/graph_7971188.jsonl @@ -0,0 +1,4 @@ +{"10165614|239537": ["The heuristics which followed this direction, such as [12], [13], [14], are reviewed in a recent survey [ 15 ]."]} +{"18031585|7971188": []} +{"2338076|7971188": []} +{"7562772|9104850": []} diff --git a/edge/graph_7972041.jsonl b/edge/graph_7972041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e09de57be1d8dc944b40106835a8f6e35828c6a --- /dev/null +++ b/edge/graph_7972041.jsonl @@ -0,0 +1,9 @@ +{"711976|7482876": ["New channel models have been developed and parametrized for vehicular communications based on the two-ray ground reflection model and simple path-loss models, mostly for LOS situations [4]."]} +{"955183|7482876": ["To appreciate the importance of the above, consider the fastfading characteristics of the received power as well as the large root mean square delay and Doppler spreads reported by recent measurement campaigns in actual deployments [23].", "literature in the area of physical layer and channel modeling [23] considers the signal time samples as the basic unit of interest because they allow for precise enough description", "As previous measurement campaigns have shown [23], [32], the vehicle-to-vehicle (V2V) and roadside-to-vehicle (R2V) channel is different from a flat Rayleigh-fading channel."]} +{"6654430|7482876": []} +{"7482876|12681089": ["A complete description of the channel is therefore given by the time-variant channel impulse response [2]."]} +{"14420396|7482876": ["Moreover, it is important to mention that the path-loss exponents less than 2 have also been found in many other studies [9], [20], [21], [26], [27].", "A number of different V2V measurement based studies with their extracted channel parameters are summarized in [9].", "For most of the investigations mentioned in [9], it is assumed that the LOS is available for the majority of the recorded snapshots."]} +{"15634192|7482876": ["Numerous authors have characterized V2V channel dispersion, e.g., [5]-[7], and more extensive reference lists appear in [8], [9]."]} +{"9647051|1029120": ["Solutions based on vehicle embedded sensors (e.g. camera, laser, and radar) and computer vision technologies have been proposed [3], [8].", "Much attention has been put in detecting pedestrians and predicting the possibility of collisions using sensors and computer vision techniques [3].", "An important lesson provided by [5] and [6] is that without denying the possibilities of using both the systems in a combined way, Wi-Fi seems to be the primary choice especially for low-latency direct V2P communications."]} +{"1721313|2835258": []} +{"9184950|12681089": ["In general, there are three fundamental approaches to channel modeling: deterministic, stochastic, and geometry-based stochastic [6], [7]."]} diff --git a/edge/graph_7973425.jsonl b/edge/graph_7973425.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..793c8ecc6686aa7cff52e0b19a7725e3fe7a6635 --- /dev/null +++ b/edge/graph_7973425.jsonl @@ -0,0 +1,2 @@ +{"954543|60455": []} +{"954543|10739218": []} diff --git a/edge/graph_7973554.jsonl b/edge/graph_7973554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7976343.jsonl b/edge/graph_7976343.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5cbc7934e6d92424dc52f57d17edf3f6850db6b0 --- /dev/null +++ b/edge/graph_7976343.jsonl @@ -0,0 +1,7 @@ +{"11476529|2835258": ["Mobile ad hoc routing protocols can be classified into topology\u2013 and position\u2013based or geographic approaches [2, 3]."]} +{"11476529|14441987": ["Mobile ad hoc routing protocols can be classified into topology\u2013 and position\u2013based or geographic approaches [2, 3]."]} +{"6458948|2835258": ["This assumption is the same as GPCR and many other position-based routing protocols [22], [23], [24]."]} +{"14047009|2835258": ["Traditional ad-hoc network routing protocols [9] or position based routing protocols [19, 27] can be used to establish general unicast communication in a vehicular ad-hoc network."]} +{"45370567|763939": ["For example, in [3, 4], the authors discuss the research challenges of routing in VANETs and then summarize and compare the performance of routing protocols; Hartenstein and Laberteaux present an overview on the communication and networking aspects of VANETs and summarize the current state of the art at that time [5]; Raya and Hubaux address the security of VANETs comprehensively and provide a set of security protocols as well [6]; in [7], the authors propose a taxonomy of a large range of mobility models available for vehicular ad hoc networks."]} +{"18474215|11210789": ["Moreover, if the destination node moves to a new location, its information which embedded in the packet header will never be updated [2].", "\u2026ad hoc networks; the most important characteristics are: high mobility, self-organization, distributed communication, road pattern restrictions, and no restrictions of network size [2]-[4], all these characteristics made VANETs environment a challenging for developing efficient routing protocols.", "However, the control packet overhead is increased as well as data delivery delay; due to the increased number of retransmission packets [2].", "This scheme can provide a good scalability for large networks; however it may increase network overhead and delays in highly dynamic network [2], [14].", "However, they have degraded performance in highly mobility and density network that when compare them with the reactive routing protocols, moreover unused routes consume the available bandwidth and increase the network overhead [2].", "Some publications remark geocast routing is actually a multicast position-based routing [2], [7]."]} +{"18474215|1762301": ["Moreover, it is not appropriate for highly dynamic topologies [17].", "However, it causes large delays in a route discovery, also route failure may require a new route discovery which produces additional delays that decrease the data transmission rate and increase the network overhead [17].", "The weakness of ZRP protocol is that it performs like a pure proactive protocol particularly for large size zones; however for small zones it performs similar to a reactive protocol [17].", "Generally, the hybrid routing protocols have a higher scalability than pure proactive and pure reactive protocols; because of reducing the number of rebroadcast messages which achieved by allowing network nodes to work together and the most appropriate nodes are used to setup a route [17].", "After the message reaches the destination node (or to the node which has a route to the destination), this node will send a route reply message back to the source node using unicast communication [17]."]} diff --git a/edge/graph_7978903.jsonl b/edge/graph_7978903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7981750.jsonl b/edge/graph_7981750.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f753ac5b4ae28a3317ccbb935467850755819fb7 --- /dev/null +++ b/edge/graph_7981750.jsonl @@ -0,0 +1,6 @@ +{"116992795|206051485": []} +{"63352914|45775424": []} +{"63352914|206986719": []} +{"63352914|469744": ["In one of the most commonly accepted definitions, researcher Ron Azuma says that Augmented Reality is technology that has three key requirements [Azuma, 1997]:", "As discussed in section 2, for a system to meet Azuma\u2019s definition of Augmented Reality system [Azuma, 1997], it must fulfill three main requirements:"]} +{"63352914|17024419": ["[2001], Van Krevelen and Poelman [2010] and Carmigniani et al. [2011] and the research survey of Zhou et al.", "[2001], Van Krevelen and Poelman [2010] and Carmigniani et al. [2011] and the research survey of Zhou et al. [2008]. In the next section we provide a more formal definition of AR and related taxonomies, then a history of the AR development over the last 50 years."]} +{"8061430|4491892": ["This leads to a crucial property: SIS with resampling can produce reasonable statistics only for systems that \u201cexponentially forget\u2019\u2019 their past [8] (i."]} diff --git a/edge/graph_7983519.jsonl b/edge/graph_7983519.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65d12ab145865d7b02c34ad8f08be19dee00fad4 --- /dev/null +++ b/edge/graph_7983519.jsonl @@ -0,0 +1,4 @@ +{"246931|16295085": []} +{"47525|7983519": ["In this article, we describe and evaluate a new algorithm for referring to people in multi-document news summaries that integrates results from two earlier studies (Nenkova and McKeown 2003; Nenkova, Siddharthan, and McKeown 2005). In the following sections, we first discuss related work (Section 2) and then present a simple model for distinguishing discourse-new and discourse-old references (Section 3, based onNenkova andMcKeown [2003])."]} +{"11708630|1708582": []} +{"11708630|6337591": ["Several statistical user simulation models that model a user\u2019s behaviour in a conversation have been proposed (Georgila et al., 2005; Schatzmann et al., 2006; Schatzmann et al., 2007)."]} diff --git a/edge/graph_7986140.jsonl b/edge/graph_7986140.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..edecb23450f6294d1b61a41d4ac1e8e016d27566 --- /dev/null +++ b/edge/graph_7986140.jsonl @@ -0,0 +1,2 @@ +{"14398863|14441987": []} +{"6438719|14441987": []} diff --git a/edge/graph_7988320.jsonl b/edge/graph_7988320.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e58efbccbba34cd056550985a2b0e2ac73d2c456 --- /dev/null +++ b/edge/graph_7988320.jsonl @@ -0,0 +1,4 @@ +{"62200746|270804": ["For transport protocols, they can be divided into congestion control and reliability guarantee [4], with the last one divided into upstream and downstream."]} +{"62200746|205286988": ["Dedicated routing protocols can be split into three categories\u2014flat, hierarchical, and location-based routing [3]."]} +{"1017582|1230643": ["A wireless sensor network [1] is composed of numerous nodes distributed over an area to collect information."]} +{"15260600|16514036": []} diff --git a/edge/graph_7988731.jsonl b/edge/graph_7988731.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_7995172.jsonl b/edge/graph_7995172.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d0513423d6af9d5d0f5c525ee4061726dc3196a --- /dev/null +++ b/edge/graph_7995172.jsonl @@ -0,0 +1,2 @@ +{"18295960|11762115": []} +{"42855142|6988077": []} diff --git a/edge/graph_7996423.jsonl b/edge/graph_7996423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8000111.jsonl b/edge/graph_8000111.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8004625.jsonl b/edge/graph_8004625.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8006086.jsonl b/edge/graph_8006086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20d2e9a30f5ed04396cf4d8fbfe79fb562a5b0cd --- /dev/null +++ b/edge/graph_8006086.jsonl @@ -0,0 +1,3 @@ +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"14621483|205286988": ["6LoWPAN [ 3 ] is IPv6 based Low-power Wireless Personal", "Routing is always one of the key challenges in wireless networks, and the challenge becomes more difficult when the network size increases and the hardware resources are more restricted [ 3 , 4]. Many routing protocols for 6LoWPAN have been proposed."]} diff --git a/edge/graph_8008208.jsonl b/edge/graph_8008208.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd74a38ab9ba7e5f540328d31a49891c0ce9bb50 --- /dev/null +++ b/edge/graph_8008208.jsonl @@ -0,0 +1,23 @@ +{"140679675|10739218": ["Neuro-fuzzy systems are fuzzy systems that use neural network theory to determine their properties (fuzzy sets and fuzzy rules) by processing data samples (Mitra and Hayashi 2000)."]} +{"19484228|14295689": []} +{"43280493|8530790": ["First, the PSO-ITC needs to guide solutions toward the Pareto-frontier by employing strategies, such as Pareto-ranking or Pareto-sorting (Fonseca and Fleming, 1995).", "Second, some mechanisms, such as sharing or niche methods (Fonseca and Fleming, 1995), need to be incorporated in the PSO-ITC to ensure that a set of welldistributed solutions are generated across the Pareto-frontier."]} +{"13080070|3053192": ["Hyper-heuristics are multi-level/multi-layer algorithms that manage a set of heuristic operators or generate low-level heuristics from existing operators [14].", "Recent reviews of hyper-heuristics and their applications could be found in [16,14]."]} +{"13080070|14295689": ["A detailed presentation and an extensive literature review for the basic RCPSP and its extensions can be found in [23,33,63]."]} +{"15211644|1386147": []} +{"8000655|11112426": []} +{"37212573|15986963": []} +{"123341399|8008208": []} +{"7914231|16362395": ["BCIs that use sensory-motor rhythm (SMR) form one of the examples of spontaneous mental strategy, based on the eventrelated desynchronization/synchronization which are produced by imagining hand, foot, or tongue movements with corresponding EEG electrodes positioned primarily over the motor cortex\u2026"]} +{"110741337|8008208": []} +{"24225828|10096622": ["superiority on many application aspects of WSN [20].", "However, the drawback of traditional heuristic methods is that they may be easily stuck in local optimum and have limited ability for complex problems with high solution space [20].", "constrained WSN due to its simplicity, easy to implement and few parameters to adjust [20]."]} +{"24225828|5798514": ["2290433 through direct or multi-hop communication links [7]."]} +{"18659668|10096622": ["Particle swarm optimization (briefed as PSO) is a kind of bionic evolutionary algorithm which rooted in imitation of behavioral mechanisms in populations such as birds and fish stocks and has been widely used in engineering field as optimization method [1\u20133]."]} +{"46537480|5646762": ["From an optimization perspective, partitional clustering problem can be formally considered as a kind of NP-hard grouping problem (Hruschka et al. 2009).", "Two popular encoding schemes are label-based and centroid-based representation (Hruschka et al. 2009)."]} +{"14265618|12957829": ["It can optimize the reactive power dispatch problem with multiple and competing objectives, real power loss and voltage deviation."]} +{"40492333|41998167": []} +{"40492333|10096622": []} +{"40492333|205286988": []} +{"40492333|1230643": []} +{"121049909|5646762": []} +{"8963435|35990525": []} +{"123330950|12068725": ["A new emerging field termed search-based procedural content generation is also growing rapidly, the aim of which is to use metaheuristics in automatic generation of content for games [36]."]} diff --git a/edge/graph_8011310.jsonl b/edge/graph_8011310.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8f830cc1dad57485490e864f8e473113056b55f --- /dev/null +++ b/edge/graph_8011310.jsonl @@ -0,0 +1,5 @@ +{"108563283|30189749": ["\u2026vehicle control using V2V communication to execute tasks such as cooperative adaptive cruise control (CACC), merging, and safely crossing an intersection (Ploeg et al. (2011); Kianfar et al. (2012); Milanes et al. (2014); Wolterink et al.; Hafner et al. (2013); Rios-Torres and Malikopoulos (2016))."]} +{"59570290|6628538": ["An overview is given by Roodbergen and Vis (2009).", "We refer to Roodbergen and Vis (2009) for an extensive overview of the literature on AS/R systems."]} +{"59570290|6773787": ["Litvak and Vlasiou (2010) give an extensive literature overview on performance evaluation and design of carousel systems.", "Carousels are especially suitable for small and mid-size items such as books, health and beauty products (Litvak and Vlasiou 2010)."]} +{"59570290|4719202": ["Design Optimization Conveyor-based (paired) De Koster et al. (2008) Optimal rack dimensions with random storage policy Probability, optimization", "The overview by De Koster et al. (2007) provides some avenues for research into (semi-)automated picking methods."]} +{"20655164|17929320": []} diff --git a/graph_801245.jsonl b/edge/graph_801245.jsonl similarity index 100% rename from graph_801245.jsonl rename to edge/graph_801245.jsonl diff --git a/edge/graph_8018911.jsonl b/edge/graph_8018911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3487a99cebefea8ce035140a8ac32d78ae7ca242 --- /dev/null +++ b/edge/graph_8018911.jsonl @@ -0,0 +1 @@ +{"18731029|5755403": ["Different terminology has been proposed for levels of understanding discrimination, reviewed in diverse papers, including [1], [2] and [3]."]} diff --git a/edge/graph_8022584.jsonl b/edge/graph_8022584.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8022785.jsonl b/edge/graph_8022785.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8027421.jsonl b/edge/graph_8027421.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8032922.jsonl b/edge/graph_8032922.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8034133.jsonl b/edge/graph_8034133.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be23dee1431f9e15bcd1eb6d44599d194bf99f31 --- /dev/null +++ b/edge/graph_8034133.jsonl @@ -0,0 +1,31 @@ +{"8777811|14970359": ["All of these conditions introduce challenging problems that have been addressed in computer vision in the past (see [1, 11 ] for a review)."]} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"34106895|17516538": ["Human action recognition has been a widely studied topic (for extensive reviews see [1,2]), but the solutions to the problem that have been submitted to date are very premature and still specific to the dataset at hand."]} +{"44771051|7788290": []} +{"12365014|9835525": ["We also eliminate detections due to artifacts at shot boundaries [11]."]} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"15650909|1634674": ["In literature, there are many existing research works on human action recognition and motion analysis."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"16624623|18440098": ["For a detailed survey of gesture recognition you can see [6][7][23]."]} +{"16624623|7185733": ["For a detailed survey of gesture recognition you can see [6][ 7 ][23].", "Users always like the easy and naturalness of technology in HMI and it was more convenient to interpret visual inputs [ 7 ].", "Many researchers [4][ 7 ][16][39][40] have tried with different instruments and equipment to measure hand movements like gloves, sensors or wires, but in these techniques user have to wear the device which doesn\u2019t make sense in practical use."]} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"9054863|7788290": ["Gavrila (1999) or Moeslund et al. (2006) for a survey of the field."]} +{"12299303|14970359": ["A short summary of di\ufb00erent approaches with evaluation and error metrics employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [8] and [19]."]} +{"12299303|7788290": ["A short summary of different approaches with evaluation and error metrics employed (when appropriate) can be seen in Table 1; for a more complete taxonomy, particularly of older work, we refer readers to [ 8 ] and [19]."]} +{"15519261|1634674": []} +{"1956774|7788290": ["Tracking and behavior recognition are closely related problems, and in fact many traditional approaches to behavior recognition are based on tracking models of varying sophistication, from paradigms that use explicit shape models in either 2D or 3D to those that rely on tracked features; for a broad overview see [9]."]} +{"2014969|5401262": ["\u2026cite this article in press as: A. Oikonomo (2009), doi:10.1016/j.imavis.2009.05.010\nThe extraction and quantization of local image and video descriptors for the subsequent creation of visual codebooks is a technique that has proved very effective for image and video retrieval\u2026"]} +{"3119662|17516538": []} +{"4282397|7788290": ["Model based approaches depend on locating and tracking body limbs, which require a 3D or 2D view-based model of the body (Aggarwal and Cai, 1999; Gavrila, 1999)."]} +{"12850037|7788290": ["A large amount of work has been done on the active topic over the past decades, as the reviews (Aggarwal et al., 1999; Wang et al., 2003; Gavrila, 1999; Moeslund et al., 2006; Poppe, 2007) have summarized, nevertheless it is still an open and challenging problem.", "Each of the referred surveys of human motion analysis in computer vision (Aggarwal et al., 1999; Wang et al., 2003; Gavrila, 1999; Moeslund et al., 2006; Poppe, 2007) has its specific focus and taxonomy."]} +{"7757210|14970359": ["We givea brief overview here and refer the reader to [ 13 ] for a more comprehensive survey."]} +{"2171158|1634674": ["In [21], Turaga et al . presented a recent survey of the major approaches pursued over the last two decades."]} +{"2171158|17516538": ["Detailed surveys on this topic can be found in [11] and [12]."]} diff --git a/edge/graph_8038163.jsonl b/edge/graph_8038163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53424200ff12ee5c4de03476e367a56a2840db72 --- /dev/null +++ b/edge/graph_8038163.jsonl @@ -0,0 +1,4 @@ +{"5602058|18137319": ["In all SECRET tries to lend a voice that using this scheme, a more robust Disaster Recovery system would have been implemented as a failover protection system different from the already existing Redundancy and Backup strategies [24], which we may refer to as Threshold Disaster Recovery System."]} +{"5602058|2177212": []} +{"18157405|5482493": []} +{"4058625|2795037": ["Note that since we are interested in minimizing the query evaluation cost, a query optimizer can be used to select the fragment that allows the execution of more selective queries by the server, thus decreasing the workload of the application and maximizing the e\u2010ciency of the execution [ Chaudhuri 1998 ].", "\u2026since we are interested in minimizing the \nquery evaluation cost, a query optimizer can be used to select the fragment that allows the execution \nof more selective queries by the server, thus decreasing the workload of the application and maximizing \nthe ef.ciency of the execution [Chaudhuri 1998]."]} diff --git a/edge/graph_8042219.jsonl b/edge/graph_8042219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8042572.jsonl b/edge/graph_8042572.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c1f7113553fdefd954d6b0e2aa9cf2374cc6e7ad --- /dev/null +++ b/edge/graph_8042572.jsonl @@ -0,0 +1,17 @@ +{"12495280|7788290": ["Various approaches [4] operate at limited rates and handle mostly a single person in a constrained setting (limited occlusions, pre-\ufb01tted body model)."]} +{"414746|7360895": ["\u2026much research effort has been fo-cused on the development of humanoid robots, and great progress has been made in developing robots with human-like torsi, including legs, arms, head etc., as well as some human-like motoric skills, such as walking, grasping, dancing [3], [4], [29], [33], [41], [46]."]} +{"2055896|18050848": []} +{"2055896|6028805": []} +{"2055896|9045232": ["Various approaches have been implemented towards face detection and tracking and facial feature extraction [22], [92]\u2013[96] and will be discussed in more detail in Section IV.", "Static visual features are commonly used for face recognition [18]\u2013[22], [92]\u2013[96], while dynamic visual features for speaker recognition, since they contain additional important temporal information that captures the dynamics of facial feature changes, especially the changes in the mouth region (visual speech).", "It has attracted significant interest in the literature [93]\u2013[96], [104]\u2013[106]."]} +{"2207084|18050848": ["\u2026biometric speaker authentication approaches based on audio-visual features used traditional 2D visual speech features or lip features extracted from mouth region along with audio features (Pan et al., 2000; Chibelushi et al., 2002; Gurbuv et al., 2002; Liu et al., 2002; Eveno and Besacier, 2005).", "The visual information provides complementary clues that can help in the analysis of the acoustic signal (Chibelushi et al., 2002)."]} +{"14827993|7185733": ["Realization of such spaces requires innovations not only in the computer vision [2, 3, 4, 5], but also in audio-speech processing and analysis [6, 7] and in the multimodal interactive systems area [8, 9, 10]."]} +{"14827993|7788290": ["Realization of such spaces requires innovations not only in the computer vision [2, 3, 4, 5], but also in audio-speech processing and analysis [6, 7] and in the multimodal interactive systems area [8, 9, 10]."]} +{"15512141|18050848": ["Such improvements have been typically demonstrated on databases of small duration, and, in most cases, limited to a very small number of speakers (mostly less than ten, and often singlesubject) and to small vocabulary tasks [18], [ 21 ].", "A number of audio-visual corpora, commonly used in the literature, are listed in Table II. Notice that most are the product of efforts by few university groups or individual researchers with limited resources, and as a result, they suffer from one or more shortcomings [18], [ 21 ], [136]: They contain a single or small number of subjects, affecting the generalizability of developed methods to the wider population; they typically have small ..."]} +{"15512141|192934": ["The decision fusion framework, on the other hand, provides a mechanism for capturing these reliabilities, by borrowing from classifier combination theory, an active area of research with many applications [91] [92] [93]."]} +{"7360895|7185733": ["Two excellent overviews of vision-based gesture recognition are [124,166].", "[124] V."]} +{"7360895|7788290": ["A broad survey of human tracking is presented in [ 66 ].", "Passive sensors, such as CCD cameras, are cheap, require minimal infrastructure, and can be used for a wide range of perception tasks [2,36, 66 ,118]."]} +{"5805941|1113420": ["Dynamic Context Model \nas the solution for context-aware computing is described in Section 3.", "[14] Dai, P., Di, H., Dong, L., Tao, L., and Xu, G. Group Interaction \nAnalysis in Dynamic Context.", "2.2 Dynamic Context in Meetings In this paper, we focus on the \nresearch of context-aware computing in group meetings, which are typical multi-party human interaction \nscenarios.", "This paper presents \na novel Dynamic Context Model as our solution strategy for context-aware computing in group meeting analysis \nand assistive services.", "Dynamic Context Model is proposed \nto tackle context aware problems for group meeting analysis and services, which makes our work have the \nadvantage over previous approaches in that it analyzes multi-level context online.", "[7] Trivedi, M. M., Huang, K. S., and Mikic, I. Dynamic Context Capture and Distributed Video \nArrays for Intelligent Spaces.", "Keywords Assistive meeting system, context-aware computing, Dynamic Context \nModel, group meeting analysis.", "Dynamic Context Model \nis comprised of several major parts: context representation, context sensing engine and context guiding \nengine.", "Therefore this paper presents \na Dynamic Context Model to solve the problem of context awareness toward group meeting analysis and services, \nwhich includes multimodal analysis of group interaction scenarios and provision of attentive services \nto the users.", "[12] Dai, P., Tao, L., and Xu, \nG. Dynamic Context Driven Human Detection and Tracking in Meeting Scenarios.", "Dynamic Context Model 3.1 Multimodal Signal \nProcessing To infer the current context, the first significant step is to process the audio-visual \nsensor data so as to extract human locations, speaker directions, and even locations of body parts.", "The structure of our Dynamic Context Model is illustrated in Fig.", "DYNAMIC CONTEXT MODEL In order to achieve human-centered computing objectives \nin assistive meeting environment, we present a Dynamic Context Model as our solution strategy for context-aware \ncomputing."]} +{"5805941|6576361": []} +{"5805941|5401262": []} +{"11962297|14970359": []} +{"11962297|7788290": []} diff --git a/edge/graph_8047599.jsonl b/edge/graph_8047599.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8058317.jsonl b/edge/graph_8058317.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_80623560.jsonl b/edge/graph_80623560.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf46694a7df967969d8d7ccbbe6c83577a30fb69 --- /dev/null +++ b/edge/graph_80623560.jsonl @@ -0,0 +1,9 @@ +{"13083205|31246274": ["Over the last few decades, many sensors have been designed to detect VOCs, such as surface acoustic wave sensors [8,9], polymer composite sensors [10\u201312] carbon nanotubes [13\u201315], CMOS [16], and capacitive sensors [17]."]} +{"3630283|11407374": []} +{"137010645|15589021": []} +{"53106966|11407374": [") [6,7], have been widely used to detect target gases."]} +{"53106966|31246274": []} +{"104271227|15589021": []} +{"104271227|11407374": []} +{"102832823|15867134": []} +{"15770872|31246274": []} diff --git a/edge/graph_8063576.jsonl b/edge/graph_8063576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8064534.jsonl b/edge/graph_8064534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4c4437531efd534f0f433cdbfbbd75b24b850be --- /dev/null +++ b/edge/graph_8064534.jsonl @@ -0,0 +1 @@ +{"6834326|8064534": []} diff --git a/edge/graph_8070893.jsonl b/edge/graph_8070893.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c97e0fa91f8c51459f5231ebc4eb3338170f41eb --- /dev/null +++ b/edge/graph_8070893.jsonl @@ -0,0 +1,4 @@ +{"2050772|13365762": ["the above method, and also consider a set of tools that would support the aggressive transcoding strategy, we consider a new transcoding method which is based on the emerging MPEG-7 standard, formally calledMultimedia Content Description Interface [5].", "To further enhance the quality that can be achieved with the above method, and also consider a set of tools that would support the aggressive transcoding strategy, we consider a new transcoding method which is based on the emerging MPEG-7 standard, formally calledMultimedia Content Description Interface [5].", "[6] Information Technology\u2014Multimedia Content Description Interface, ISO/IEC 15 938-3:CD, Oct. 2000.", "[7] Multimedia Description Schemes, Information Technology\u2014Multimedia Content Description Interface\u201d, ISO/IEC 15 938-5:CD, Oct. 2000."]} +{"35355701|17428811": ["It has been shown in [ 2 ] that FGS coding has a higher coding efficiency than other existing multilayer scalable coding schemes at low and high bit-rate ranges.", "The base layer is coded as a non-scalable bit stream by using the coding tools available in the Advanced Simple Profile, while the residue, the difference between the original video sequence and the video constructed from the base layer, is coded as the enhancement layer by coding the bit planes of the DCT coefficients [ 2 ].", "However, compared with non-scalable coding, which is considered as the upper bound for any scalable coding techniques, FGS coding is about 2-dB inferior at high bit-rate condition [ 2 ]."]} +{"31907538|15261053": ["Many studies [2], [4] reveal that block-based motion estimation does perform poorer, i."]} +{"44023951|17428811": ["After motion compensation, the output bitstream carries the DCT coefficients as, \u2206 + \u2212 = \u2212 )) ( ( 1 * n n Y MC X DCT R (3)"]} diff --git a/edge/graph_8071302.jsonl b/edge/graph_8071302.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8073217.jsonl b/edge/graph_8073217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8abb2d8de1edc6940b028b645df6933577b44559 --- /dev/null +++ b/edge/graph_8073217.jsonl @@ -0,0 +1,2 @@ +{"4328983|1188683": []} +{"17966859|8530790": ["Another interesting experiment revealed that a population can be optimized to a multi-objective target function [19]."]} diff --git a/edge/graph_8077129.jsonl b/edge/graph_8077129.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0514013aa4613ac1e80b6ca1eb6130c6d2525410 --- /dev/null +++ b/edge/graph_8077129.jsonl @@ -0,0 +1,2 @@ +{"12675432|4796356": ["SOF stabilisation, however, is known to be a challenging problem, since even when it was shown to be solvable it is generally non-convex even for time-invariant systems (Syrmos, Abdallah, and Dorato 1997; Geromel, de Souza, and Skelton 1998; Astolfi and Colaneri 2005).", "Keywords: periodic control; optimal control; static output feedback; spacecraft control; attitude control; magnetic control"]} +{"12675432|8077129": ["3.2 Multiple-shooting approach\nMultiple-shooting methods are based on a new algorithmic paradigm (Varga 2007), which, by means of exact discretisations, converts continuous-time periodic problems into equivalent discrete-time periodic\nproblems for which reliable computational algorithms are\u2026"]} diff --git a/edge/graph_8084473.jsonl b/edge/graph_8084473.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..369297ef4d024bbcbf2716bffe4d887d5ea1c967 --- /dev/null +++ b/edge/graph_8084473.jsonl @@ -0,0 +1,4 @@ +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"61820538|508912": []} +{"14441026|4474193": ["Variance has a strong correlation with reducing uncertainty [40] and with improving evolved individuals [19]."]} +{"6206456|4474193": ["In order to avoid premature convergence, several approaches where diversity is re-introduced or maintained throughout the run have been proposed in the literature over recent years (see surveys [5, 15, 22]).", "If the new solution after the change in the problem is, in some sense, related to the previous solution, knowledge obtained during the search for the old solution can be used to find a new solution [15]."]} diff --git a/edge/graph_8090242.jsonl b/edge/graph_8090242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8095798.jsonl b/edge/graph_8095798.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8110286.jsonl b/edge/graph_8110286.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c49c3f3c29fc76a87abde884d8cb20d50c498691 --- /dev/null +++ b/edge/graph_8110286.jsonl @@ -0,0 +1,4 @@ +{"36594314|50458504": []} +{"1570608|1877442": ["This platform could train non-digital forensic investigators skills required in analysis more complex systems, such as Indus-trial Control Systems (van Vliet et al., 2015), cloud computing platforms (Farina et al., 2015; Schut et al., 2015), etc."]} +{"716618|8310135": ["This can be challenging when using tools that have the ability to extract information from within compressed objects, because it is also necessary to document how the data must be decompressed or otherwise decoded."]} +{"11443639|9316331": []} diff --git a/edge/graph_8113021.jsonl b/edge/graph_8113021.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da5924b65f82f803f0ea9b87542b6452c4525d7d --- /dev/null +++ b/edge/graph_8113021.jsonl @@ -0,0 +1,3 @@ +{"12450423|8530790": []} +{"14304473|8530790": ["Fonseca and Fleming (1995) and Horn (1997) have presented overviews of different\nCurrently visiting the Systems Analysis Group, University of Dortmund, Germany\nmulti-objective GA implementations.", "During the year 1994-95, a number of independent GA implementations (Fonseca and Fleming, 1995; Horn, Nafploitis, and Goldberg, 1994; Srinivas and Deb, 1994) emerged.", "As appears in the literature, there are two ways to implement niching\u2014parameter-space based (Srinivas and Deb, 1994) and function-space based (Fonseca and Fleming, 1995) niching.", "The working of a multi-objective GA on this function provides insights into an interesting debate about fitness-space niching (Fonseca and Fleming, 1995) versus parameter-space niching (Srinivas and Deb, 1994).", "Thus, this is no surprise that a number of different multi-objective GA implementations exist in the literature (Fonseca and Fleming, 1995; Horn, Nafploitis, and Goldberg, 1994; Srinivas and Deb, 1994; Zitzler and Thiele, 1998)."]} +{"36482639|8530790": ["nament selection make scaling information negligible (Fonseca and Fleming, 1994; Fonseca and Fleming, 1995d)."]} diff --git a/edge/graph_8113225.jsonl b/edge/graph_8113225.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8119354.jsonl b/edge/graph_8119354.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_812303.jsonl b/edge/graph_812303.jsonl similarity index 100% rename from graph_812303.jsonl rename to edge/graph_812303.jsonl diff --git a/edge/graph_8124666.jsonl b/edge/graph_8124666.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..138f1eb8a04f75a5d41e71072f87c6fc10841ed2 --- /dev/null +++ b/edge/graph_8124666.jsonl @@ -0,0 +1 @@ +{"16680884|53692127": []} diff --git a/edge/graph_8125630.jsonl b/edge/graph_8125630.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8128972.jsonl b/edge/graph_8128972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8132405.jsonl b/edge/graph_8132405.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74594b882a66901342704d2ca53f8a8efce4fdfb --- /dev/null +++ b/edge/graph_8132405.jsonl @@ -0,0 +1,40 @@ +{"31561319|1940388": []} +{"35262036|1230643": []} +{"77330|17205659": ["Some works include [16, 17].", "It is also likely that more powerful motes will need to be designed in order to support the increasing requirements for computation and communication [16]."]} +{"53019255|205286988": ["For sensor networks, wireless communication infrastructure is essential, but it is limited in terms of resources [4]."]} +{"5385970|1230643": ["\u00c7"]} +{"53374808|7889189": ["Interested readers are referred to two survey papers [8, 50]."]} +{"53374808|1940388": ["Interested readers are referred to two survey papers [8, 50]."]} +{"53374808|12817488": ["Data aggregation techniques often assume that all sensor nodes in the WSN are trustworthy [49]."]} +{"53374808|1236072": ["After a sensor node detects a target animal, it generates a report about the animal\u2019s activities and send the report to the base station through a multi-hop routing protocol [2, 3]."]} +{"3300077|8618569": ["ment monitoring, workforce productivity, and plant management [13].", "as there is no apparent physical boundary of the transmission medium [13].", "attack consists of attacking nodes by running malicious code in them [13]."]} +{"3300077|1940388": ["Most symmetric schemes use key predistribution to ease the difficulty of key management [58].", "This way it shows its different identities to nodes in the network and can significantly reduce the effectiveness of fault tolerant schemes such as distributed storage [10], dispersity [11], multipath [31], and topology [32], [33], [58].", "Symmetric key cryptography is difficult for key deployment and management [58]."]} +{"3300077|1230643": ["them an ideal choice for ensuring energy-efficient services and reliable management at hazardous plants, assembly lines, and high-asset protection applications [2], [3]."]} +{"39342737|1940388": ["These characteristics lead tomore challenges in the research of security problems in WSNs [4, 5]."]} +{"39342737|6275330": []} +{"17361168|1230643": ["Wireless\nSensor Networks: A Survey.", "I. Introduction\nWireless sensor networks[1] become prevalent for pervasive computing and widely deployed for various applications such as intrusion detection, earthquake prediction and environment sensing, etc.."]} +{"6938886|1230643": ["In recent years, energy, computational power and resource utilization have been well defined and widely studied [1] for wireless sensor network (WSN)."]} +{"6458781|12970117": ["Both Li et al. [8] and Bista and Chang [9] proposed survey papers of the privacy-preserving techniques for WSN."]} +{"137248994|1940388": ["The broadcast [3] by sensor nodes can be monitored by adversaries in the network who can obtain the time of an event from the communication patterns, location of events and nodes from the message flow and see the unencrypted contents of the messages."]} +{"9064382|6275330": ["Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed."]} +{"9064382|1230643": ["Known as the source anonymity problem, this problem has emerged as an important topic in the security of wireless sensor networks, with variety of techniques based on different adversarial assumptions being proposed."]} +{"11944916|2294541": []} +{"11944916|1236072": []} +{"11944916|1230643": ["\u2026Ioana \nRodhe Department of Information Technology Uppsala University, Uppsala, Sweden {edith.ngai, ioana.rodhe}@it.uu.se \nABSTRACT Wireless sensor networks have attracted increasing atten\u00adtions considering their potentials \nfor being widely adopted in both emerging civil and military applications."]} +{"6025453|1940388": ["The privacy issue is critical for monitoring applications in WSNs [2, 3]."]} +{"6025453|17205659": ["RELATED WORKS Data source and base station are two crucial factors in the protection of location privacy in WSNs [4].", "In general, protecting location privacy in WSNs is hindered by the sheer scale of the networks, the extreme resource constraints, and the powerful tools used by the attackers.", "The example highlights the importance of protecting source\u2013location privacy in WSNs.", "A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants [1, 2].", "The monitoring purpose of WSNs naturally leaves them operating in unattended or sometimes even hostile environments.", "Even though traditional security mechanisms such as encryption and authentication can protect data privacy in WSNs, sensor locations are hard to hide.", "The privacy issue is critical for monitoring applications in WSNs [2, 3].", "Privacy in WSNs can be classi\ufb01ed into data privacy and context privacy [4].", "Furthermore, such a technique will also incur more power consumption in WSN. Summary: Although some of these location privacy techniques provide certain levels of protections for data sources in WSNs, the overall traf\ufb01c pattern throughout the network is still tilted toward the sources, making it easier for the adversary to trace back."]} +{"26982546|2318389": []} +{"9937240|1230643": ["However, this causes a lot of data redundancy and consumes too much energy of the network."]} +{"17204624|1230643": ["During the third stage, when one message reaches its i-th(i [1) intersection node, the intersection node sends Nfake fake packets for it.", "tasks in military and civilian applications such as battlefield surveillance, forest fire detection, patient health monitoring, and smart environment [1]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"23230682|1230643": ["INTRODUCTION Wireless Sensor networks (WSNs) rely on wireless communication, which is a kind of broadcasting media and vulnerable to be eavesdropped [1]\u2013[3].", "While content-based threats are well understood [1], with cryptographic techniques often being used to address these problems [9], cryptographic techniques do not address context based threats and context-based privacy has greater challenge [10]."]} +{"28987262|15300368": ["Thus, it is clear that WSNs have privacy issues [1, 8, 9].", "Some works [8, 9] have focused on providing the core security services such as confidentiality, integrity, and availability."]} +{"15265615|1230643": ["Wireless Sensor Network (WSN) consists of many small sensor nodes [1]."]} +{"7408566|1940388": ["Again, note that data (packet) privacy [23], [64], [65] is out of scope of our paper.", "[23] for a more complete list of active attacks."]} +{"7408566|1230643": ["A WSN can consist of different types of sensors and serve different kind of applications [7]."]} +{"35973705|1230643": []} +{"1504416|1940388": ["Data aggregation is an important primitive that aims to process/combine/summarize data packets, which come from several sensor nodes then forwarding these packets to upper nodes [4,5]."]} +{"1504416|17205659": ["Fortunately, previous researches [35,36] proposed mechanisms to defend against this attack.", "This kind of attack, which is called selective forwarding attack was first described in [35]."]} +{"10845514|1230643": ["After deployment, sensor nodes form a WSN in an ad hoc manner and finally, the whole network starts its activity [1]."]} +{"23421500|1940388": []} diff --git a/edge/graph_8133155.jsonl b/edge/graph_8133155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8137826.jsonl b/edge/graph_8137826.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8142318.jsonl b/edge/graph_8142318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8145268.jsonl b/edge/graph_8145268.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8145715.jsonl b/edge/graph_8145715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..474dcb76927b2bb5892b4529376c623d646176d0 --- /dev/null +++ b/edge/graph_8145715.jsonl @@ -0,0 +1,3 @@ +{"2717018|468992": ["This does not mean that evolutionary robotics is deemed to failure, as the several successful Swarm Intell experiences demonstrate (Trianni and Nolfi 2011; Brambilla et al. 2013).", "\u2026presents several major challenges, among which the difficulty to reward the individual contribution to the global behaviour (i.e., the credit assignment problem), the large size of the state space, and the dynamic and uncertain working conditions\u2014for a discussion, see Brambilla et al. (2013).", "For an extensive review of the swarm robotics literature, we refer the reader to Brambilla et al. (2013).", "The application of the behavior-based approach to swarm robotics is straightforward, and has been the most common choice to date (Brambilla et al. 2013)."]} +{"9695324|1708582": ["Yet because many agents in video games have similar physical characteristics and are evaluated in a similar context, traditional RL techniques, many of which have convergence guarantees [30], risk converging to largely homogeneous solution behaviors.", "Traditional reinforcement learning (RL) techniques such as Q-Learning [28] and Sarsa with a case-based function approximator (SARSA-CABA; [29]) adapt in domains with sparse feedback [28], [30], [31]."]} +{"15416390|1452734": ["This broader area of inquiry includes developmental robotics [108,109], artificial life, and a variety of other non-evolutionary computation-based machine learning specialties applied to fully autonomous systems.", "Developmental robotics [108,109] addresses the problem of environmental-based learning by attempting to endow robotswith environmentally stimulated self-organizing abilities or environmentally stimulated novelty-seeking."]} diff --git a/edge/graph_81474561.jsonl b/edge/graph_81474561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8150108.jsonl b/edge/graph_8150108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ea90992d93fbd5e32bf85bea590a3bb640281de --- /dev/null +++ b/edge/graph_8150108.jsonl @@ -0,0 +1 @@ +{"109413076|31246274": []} diff --git a/edge/graph_8155077.jsonl b/edge/graph_8155077.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca3627f48a40065c7eb26efbf8940afd09a42bce --- /dev/null +++ b/edge/graph_8155077.jsonl @@ -0,0 +1,20 @@ +{"15540847|10500613": ["Our work on semantic graph is related to the vast body of work on schema matching [15, 9]."]} +{"16145727|386036": []} +{"18067284|10500613": ["Additionally, the existence of schemas is imperative when integrating (meta) data through schema matching [44] and in the area of generic model management [7, 34]."]} +{"6682219|3102110": ["\u2026\nmining as\u00adsociation rules in databases has received much attention recently [Aggarawal and Yu 1998; Agrawal \net al. 1993a, 1993b; Bayardo 1998; Brin et al. 1997; Chen et al. 1996; Han et al. 2000; Park et al. 1997; \nShintani and Kitsuregawa 1998; Srikant and Agrawal 1996, 1997; Tsur et al. 1998].", "INTRODUCTION By de.nition [Agrawal et al. 1993b; Chen et al. 1996], an association rule is an implication \nof the form A =B, where A and B are frequent itemsets in a transaction database and A nB =n.", "A frequent itemset (also called large itemset [Chen et al. 1996]) is an item\u00adset that meets the \nuser-speci.ed minimum support.", "By extending the de.nition \nin [Agrawal et al. 1993b and Chen et al. 1996], negative association rule discovery seeks rules of the \nform A =\u00acB with their support and con.dence greater than, or equal to, user-speci.ed minimum sup\u00adport \nand minimum con.dence thresholds respectively, where A and B are\u2026"]} +{"7155737|10500613": ["According to the classi\ufb01cation of Rahm and Bernstein [20], we would classify our approach as a mixture of an instance-based and a schema level matching algorithm."]} +{"8089719|10500613": ["Rahm and Bernstein [15] conducted a survey on schema \nmatching tech\u00adniques.", "Rahm and Bernstein [15] conducted a survey on schema matching techniques.", "[12] J. Madhavan,P.A. Bernstein, andE.", "A. Bernstein."]} +{"5984427|2795037": ["[23]) and distributed query processing (see [24] for a surve y)."]} +{"191396|11038925": []} +{"191396|192934": ["The step is usually combined with the selection of a corresponding proximity measure and the construction of a criterion function.", "Clusteringisubiquitous,andawealthofclusteringalgo-rithmshasbeendevelopedtosolvedifferentproblemsinspeci \ufb01 c \ufb01 elds.", "We offer more detailed discussion on how to identify appropriate number of clusters, which is particularly important in cluster validity, in the last part of the section."]} +{"9907536|17981371": ["Binder is up to 26x faster than Spider and more than 2500x faster than Mind."]} +{"1206069|386036": []} +{"27482354|10500613": ["In the context of schema integration and matching [ 8 ], knowledge of redundancies across sources is essential.", "Rahm and Bernstein [ 8 ] give an overview over some recent schema-integration projects; an earlier survey is [27]."]} +{"8028259|17981371": ["have shown that the complexity of FD discovery is in O(n( 2 )2) where m is the number of attributes and n the number of records [11].", "from an algorithmic and theoretical perspective [11]."]} +{"2804799|386036": ["a variety of algorithms for detecting outliers [4, 10, 12, 33], duplicate records [7], and key violations [13].", "Character-based (Levenshtein distance), token-based (Atomic Strings), and phoneticbased (soundex) distances are useful for detecting inconsistencies in text such as misspellings, different term orderings, and phonetically similar words [7].", "The database and statistics literature includes many taxonomies of anomalous data [5, 7, 10, 19, 24, 33]."]} +{"11636431|10500613": []} +{"6168059|10500613": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]} +{"6168059|386036": ["For example, one web aggregator requires the curation of 80,000 URLs and a second biotech company has the problem of curating 8000 spreadsheets."]} +{"10052039|10500613": ["Using the classification given in [20], such an approach is an example of schema-based matching [4][18].", "Again referring to the classification from [20], this approach is called instancebased matching [6][12][13].", "Most previously proposed work on schema matching has focused on developing interpreted matching techniques (see [20] for survey)."]} +{"207202965|2082499": [", [7, 25])."]} +{"207202965|386036": ["record linkage, entity resolution, and duplicate detection, see [10] for a survey)."]} diff --git a/edge/graph_8164705.jsonl b/edge/graph_8164705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5732edfdd2e2f02642b65e6425615b1fcfc46c56 --- /dev/null +++ b/edge/graph_8164705.jsonl @@ -0,0 +1,3 @@ +{"31392322|8164705": ["In traditional survival analysis, the model is built on such data by labeling the censored instances with a value such as the duration of the study or last known follow up time [5], [6], [7]."]} +{"31392322|393948": ["Another important motivation for proposing a calibrated survival analysis framework for such real-world censored datasets can be obtained from the theory of representation learning [9]."]} +{"268374|16049649": ["Recent technological revolutions have unleashed a torrent of biomedical data with growing scale, diversity, and complexity [24; 27; 77; 86; 101]."]} diff --git a/graph_816774.jsonl b/edge/graph_816774.jsonl similarity index 100% rename from graph_816774.jsonl rename to edge/graph_816774.jsonl diff --git a/edge/graph_8169630.jsonl b/edge/graph_8169630.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba4d8b677a26b8a802f3ed1f4b60b819b29b61f6 --- /dev/null +++ b/edge/graph_8169630.jsonl @@ -0,0 +1,3 @@ +{"14395832|1452734": ["More recently a new strain of research explicitly included developmental aspects and the modeling of development [24, 25], and epigenetic robotics [24]."]} +{"6674407|192934": []} +{"36152|205131192": ["It is impossible to give a complete overview here (for a partial review, see Prokop and Reeves [ 8 ])."]} diff --git a/edge/graph_8183369.jsonl b/edge/graph_8183369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92d6120d775bb7b97b84c62dcedbad974709c90a --- /dev/null +++ b/edge/graph_8183369.jsonl @@ -0,0 +1,19 @@ +{"5128329|175549": []} +{"14213985|15300368": []} +{"14213985|1230643": ["Subsection II-B provides a short overview on BPMN and describes its current capabilities to capture WSNs."]} +{"14884259|16654832": ["Code offloading has re-gained a lot of interest towards the development of mobile cloud applications as it can be implemented by the smartphones as a mechanism to offload resource intensive operations to cloud-based surrogates [30]."]} +{"204982032|9554464": ["Ensuring security is critical as the system is automatically linked to actuators and protecting the systems from intruders becomes very important."]} +{"204982032|2357830": ["The combination of these factors has improved the viability of utilizing a sensor network consisting of a large number of intelligent sensors, enabling the collection, processing, analysis and dissemination of valuable information, gathered in a variety of environments [5]."]} +{"204982032|1236072": ["The transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin-destination (O-D) route choice behavior, queue lengths and air pollutant and noise emissions.", "Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs.", "The scientific challenges that must be overcome in order to realize the enormous potential of WSNs are substantial and multidisciplinary in nature [5].", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [60].", "Node failure being a common characteristic of WSNs, the network topology should have the capability to heal itself.", "Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs [68]."]} +{"204982032|1230643": ["This has the ability to provide ubiquitous sensing capability which is critical in realizing the overall vision of ubicomp as outlined by Weiser [2].", "Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station."]} +{"1639892|12715779": ["That is, they do not account for the fact that users, other than simply consumers or producers of services, are integral components of the overall infrastructure, and contribute to it via human sensing, actuating, and computing capabilities [15]."]} +{"18761676|3348390": ["Context awareness may provide a great support to process and store the Big Data, and to make their interpretation easier [330]."]} +{"18761676|16209841": ["To ensure security of data, services and entire IoT system, a series of properties, such as confidentiality, integrity, authentication, authorization, non-repudiation, availability, and privacy, must be guaranteed [228,229]."]} +{"18761676|270804": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"18761676|205286988": ["In the last ten years, WSNs have triggered intensive research activities which have produced a large body of literature addressing legacy networking such as MAC [53], routing [54] and transport protocols [55], connectivity and topology control [56\u201358]."]} +{"2187977|37025094": ["Index Terms\u2014Ubiquitous business process, business process improvement, ubiquitous computing, uBPMN, time-banking\n\u00c7"]} +{"2187977|1230643": ["As a consequence, our generic definition of ubiquitous business processes would be: A ubiquitous business process is a location-independent business process that turns its business environment into a source of data and/or a target of outcome with the least of human interventions."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"8062855|7360895": ["\u2026home automation and assistive devices (e.g., automatic medication dispenser, smart storage pantry, robotic housekeeping aids, and mobility assistants [1-11]) and service and social robots (e.g., object fetchers and delivery robots, robotic pets, and intelligent physical-therapy companions [12-17])."]} +{"1576211|3348390": ["), people and social analytic, transport and traffic analytic [4]."]} diff --git a/edge/graph_8186802.jsonl b/edge/graph_8186802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc7d7e0049fcff45751a5a3bac4e2e0d9e6f6468 --- /dev/null +++ b/edge/graph_8186802.jsonl @@ -0,0 +1,13 @@ +{"60815429|17683338": ["After evaluating various research contributions specifically devoted to operating systems used for wireless sensor nodes (Fr\u00f6hlich & Wanner, 2008, Reddy et al., 2007; Dwivedi et al., 2009a; Manjunath, 2007) total 39 operating systems are identified: Table 3."]} +{"60815429|17769444": ["In a research paper (Vazquez et al., 2009), an architecture for integrating Wireless Sensor Networks into the Internet of Things called \" Flexeo \" is presented.", "Topologies used for Wireless Sensor Networks Three phases related to topology maintenance and changes has been presented in a research contribution (Akyildiz et al., 2002a): \u2022 Pre-deployment and Deployment phase \u2022 Post-deployment phase \u2022 Redeployment of additional nodes phase", "Wireless Sensor Network is a technology which has capability to change many of the Information Communication aspects in the upcoming era.", "Envision a future of WSNs made up of ultra low power nodes that provide high power computation and can be deployed for decades is possible only with more research effort (Hempstead et al., 2008).", "Wireless Sensor Networks (WSNs) employ a large number of miniature disposable autonomous devices known as sensor nodes to form the network without the aid of any established infrastructure.", "Technical specification for some hardware systems for Wireless Sensor Network (Hempstead et al., 2008) Wireless Sensor Networks we need these things in operating system architectures: Extremely small footprint, extremely low system overhead and extremely low power consumption.", "Technical specification for some hardware systems for Wireless Sensor Network (Hempstead et al., 2008)", "From the last decade Wireless Sensor Networks (WSNs) is gaining magnetic attention by the researchers, academician, industry, military and other ones due to large scope of research, technical growth and nature of applications etc. Wireless Sensor Networks (WSNs) employ a large number of miniature disposable autonomous devices known as sensor nodes to form the network without the aid of any established infrastructure.", "In a research contribution (Hempstead et al., 2008) and in a technical report (Fr\u00f6hlich & Wanner, 2008) three classifications of O. S. architectures are described for wireless sensor nodes: Monolithic, Modular/Micro and Virtual Machine.", "In a research contribution (Hempstead et al., 2008) and in a technical report (Fr\u00f6hlich & Wanner, 2008) three classifications of O.", "In a Wireless Sensor Network, the individual nodes are capable of sensing the environments, processing the information locally, or sending it to one or more collection points through a wireless link.", "In a Wireless Sensor Network, the individual nodes are capable of sensing their environments, processing the information locally, or sending it to one or more collection points through a wireless link."]} +{"60815429|1236072": []} +{"60815429|1230643": ["Topologies used for Wireless Sensor Networks Three phases related to topology maintenance and changes has been presented in a research contribution (Akyildiz et al., 2002a): \u2022 Pre-deployment and Deployment phase \u2022 Post-deployment phase \u2022 Redeployment of additional nodes phase"]} +{"1837434|1236072": ["A large body of research on communication issues in mobile sensor networks has been carried out [Wang et al. 2007; Al-Karaki and Kamal 2004].", "\u2026and Reijers 2003]; time synchronization protocols [Elson and Roemer 2003; Sundararaman et al. 2005]; distributed storage services [Ratnasamy et al. 2002; Luo et al. 2007]; code deployment and reprogramming functionality [Wang et al. 2006]; and routing protocols [Al-Karaki and Kamal 2004].", "2006], and routing protocols [Al-Karaki and Kamal 2004]."]} +{"33345716|1230643": []} +{"10979517|1230643": ["Network coding has been recently introduced to reduce traffic in general networks [1] [2].", "Wireless sensor networks (WSNs) are distributed, selforganizing solution to provide sensing and computing in various environments where conventional networks are impractical [1] [2] [3]."]} +{"18775403|1230643": ["INTRODUCTION WSNs constitute a new form of multi-hop, self-organizing network system where sensors deployed in the environment communicating wirelessly to gather and report information [1]."]} +{"8821056|1940388": ["Open research issues include the following [9],[30] and [32]: 1.", "Other security issues include [32] security-energy assessment, data assurance, survivability, Trust, end to end security, Security and Privacy Support for data centric sensor networks (DCS) and node compromise distribution.", "Secure location algorithms for mobile WSNs in different environments need to be investigated [32].", "There are a lot of approaches to ease routing security [32],[38] and [42].", "Open research issues range from cryptography algorithms to hardware design [6],[9] and [29] and the design of key management protocol\u2019s open research [3],[16],[9],[10] and [32] issues are described below: 1."]} +{"8821056|17205659": ["To illustrate this point, the differences between sensor networks and ad hoc networks are given below [9]: 1.", "In [9],[23], following metrics are suggested to evaluate whether a security scheme is appropriate for WSNs .", "To overcome this, Multi path routing can be used in combination with random selection of paths to destination, or braided paths can be used which represent paths which have no common link or which do not have two consecutive common nodes, or use implicit acknowledgments, which ensure that packets are forwarded as they were sent [16],[9] and [7].", "1 Outsider versus insider (Node Compromise) attacks Outside attacks [6], [9] are defined as attacks from nodes, which do not belong to a WSN; insider attacks occur when legitimate nodes of a WSN behave in unintended or unauthorized ways.", "[16],[9] and [7] (d) Selective Forwarding/ Black Hole Attack (Neglect And Greed): WSNs are usually multi-hop networks and hence based on the assumption that the participating nodes will forward the messages faithfully.", "defensive measure against such attacks is the usage of small frames, so that any individual node seizes the channel for a smaller duration only [16], [9].", "(c) Tampering or destruction: Given physical access to a node, an attacker can extract sensitive information such as cryptographic keys or other data on the node [9].", "The lifetime of a sensor node depends to a large extent on the battery lifetime; hence it is extremely important to adopt energy-efficient strategies for information processing [9],[ 7].", "The attacks are [9],[7]: Kavitha and Sridharan 036", "[3],[9],[7] and [23] (c) Node Capture: It is observed and analyzed that even a single node capture is sufficient for an attacker to take over the entire network."]} +{"8821056|1236072": []} +{"8821056|1230643": []} +{"1151472|1230643": ["Recent advances in microelectronic mechanical systems and wireless communication technologies have fostered the rapid development of networked embedded systems like wireless sensor networks (WSNs) [1]."]} diff --git a/edge/graph_8192312.jsonl b/edge/graph_8192312.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdd46da441e29f35f2c7f09685ea93a2ef22e36d --- /dev/null +++ b/edge/graph_8192312.jsonl @@ -0,0 +1,5 @@ +{"39047444|16332566": []} +{"34564718|4796356": []} +{"23029523|5768126": ["These variations are known to result in a shift in resonance frequencies of the base structure [41], [42]."]} +{"23029523|4796356": ["Therefore, the optimization problem (36) along with its associated LMI constraints can also be interpreted as a generalized pole placement problem via static output feedback, which is difficult to solve, [36]\u2013[39]."]} +{"12039483|16332566": []} diff --git a/graph_819377.jsonl b/edge/graph_819377.jsonl similarity index 100% rename from graph_819377.jsonl rename to edge/graph_819377.jsonl diff --git a/edge/graph_81975842.jsonl b/edge/graph_81975842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e60a69f01592d2f812f33277da33778007844933 --- /dev/null +++ b/edge/graph_81975842.jsonl @@ -0,0 +1,12 @@ +{"43921703|3583771": ["The development of the NDN architecture has guided the creation of a new network security framework and, at the same time, brought new challenges [11]."]} +{"15955456|3189715": ["Then we will introduce a novel ICN deployment framework, which follows these guidelines [28].", "To realize the innovations and coexistence mentioned above, we argue, in this paper, that the programmability and virtualization of the network is required."]} +{"33118584|2623404": []} +{"33118584|10693567": []} +{"33118584|3189715": []} +{"3297262|9436049": ["Furthermore, there is a survey that addresses algorithms [11] for CCDNs.", "Readers interested in the evolution of CDN to CCDN and the interplay between the various actors are referred to [11]."]} +{"52119194|7971188": [", Mobile IP (MIP) [4], peer-to-peer (P2P) networks [5] and content delivery networks (CDNs) [6], which can patch the existing Internet architecture but only superficially bridge the gap between the limited network service capabilities and increasing user needs [1], [7]\u2013[9]."]} +{"18715111|2623404": ["Following the ongoing transformation of network architectures with Software Defined Networks (SDN) [7], CDN are adopting flow-oriented and centralized controllers [8] to manage video traffic especially.", "with Software Defined Networks (SDN) [7], CDN are adopting flow-oriented and centralized controllers [8] to manage video traffic especially."]} +{"16603360|206583943": ["Tunneling has also been extensively employed for IPv4/IPv6 co-existence and achieves heterogeneous traversal, for example, IPv4 traf\ufb01c over an IPv6 network [6]."]} +{"10724558|14889616": ["Instead of SVC-encoded multimedia content, we use AVC-encoded multimedia content since it is the most used video coding standard in conjunction with DASH.", "We further assume that the server provides SVC-encoded multimedia content with the following three layers/bitrates: {L0 = 640 kbps, L0+L1 = 995 kbps, L0+L1+L2 = 1400 kbps}.", "SVC offers the possibility to encode video content into a base layer and several enhancement layers.", "We adopt the adaptation logic described in [18] which uses a deadline-based approach for selecting the appropriate representation and is optimized for SVC content.", "For our experiments we use MPEG-DASH-compliant multimedia content that is encoded using Scalable Video Coding (SVC) [15].", "As test content we use MPEG-DASH-compliant SVC-encoded multimedia content with a segment size of two seconds.", "Lederer et al. [9], [10] investigated the performance of pull-based DAS using multiple links and the benefits of SVC in CCN/NDN (CCN is a concrete implementation of ICN).", "The multimedia content is taken from the SVC dataset [27]."]} +{"6583734|2535224": [", in mobile network, NFV targets at virtualizing mobile core network and the mobile-network base station [104]\u2013[111]."]} +{"6583734|2623404": ["Software-Defined Network (SDN) is an important and recently emerging network architecture to decouple the network control from the data forwarding by directly programming [33]\u2013[36]."]} diff --git a/edge/graph_8197990.jsonl b/edge/graph_8197990.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_81984653.jsonl b/edge/graph_81984653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..747428a6f04718de53c4f28ff6a8c1fcfd06c395 --- /dev/null +++ b/edge/graph_81984653.jsonl @@ -0,0 +1,22 @@ +{"568013|1230643": ["In the field of Sensor Networks, there has been significant research in the last few years, focusing on power-aware routing protocols (for a survey on sensor networks, consult [2]).", "As pointed out in relevant literature ([2]), some of the main factors influencing the design and deployment of a sensor network, include fault-tolerance, scalability, hardware constraints, the network topology, the transmission media, and power consumption (as dictated by communication and data processing requirements)."]} +{"13369233|7774517": ["Data outliers are the sensor readings that do not follow the normal pattern of sensor data in IoT systems, namely, deviate dramatically from the ground truth [5]."]} +{"23424265|19938676": ["It is assumed that 5G networks should meet the following six requirements: larger system capacity, higher data rate, lower end-to-end latency, ubiquitous connectivity, reduced energy consumption, and consistent quality of experience [7]."]} +{"23424265|4395259": ["Fortunately, in recent years the concept of physical layer security (PLS) [15], which is agnostic to the system infrastructures and RATs, has shown great potential in providing information-theoretically unbreakable secrecy.", "Up to now, a great number of secure relay transmission strategies based on the concept of PLS have been\nproposed [23]\u2013[27].", "The core idea of PLS is utilizing the inherent randomness and difference of wireless channels to keep the confidential message secure from eavesdroppers, regardless of their computing capabilities.", "Based on the celebrated theoretical analyses of PLS [16], [17], a serial of transmission strategies have been proposed, such as cooperative relay transmission [18], artificial noise [19], secure beamforming [20], and noise aggregation [21]."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"127321156|3628110": ["As we have already discussed, an adversary can manipulate the timestamp for profit [44]."]} +{"127321156|13756844": ["[56] presented KEVM, an executable formal specification of the EVM bytecode stack-based language built with the K Framework [57], which designed to serve as a solid foundation for further formal analyses."]} +{"127321156|1708582": ["cognitive computing [13], reinforcement learning [14], etc."]} +{"31245252|2769147": []} +{"31245252|4528002": ["These ECUs are organized as an internal network to share the collected data within the vehicle [121]."]} +{"67867402|49527603": ["Blockchain technology has the key characteristics of decentralization, traceability, anonymity and auditability [119]."]} +{"67867402|51935081": ["[73] believed that in the blockchain, the generation, verification, storage and transmission of data do not depend on any centralized organization, and each node has the same rights and obligations in the whole network and has the same status.", "Content References Characteristic description Blockchain technology [6, 12, 14, 46, 50, 51, 69, 71, 73, 75,80,102] [71] put forward the concept of bitcoin and made the blockchain step into peoples horizons; [75] introduced the workflow of blockchain; [73, 102] introduced the characteristics of decentralization and tamper resistance of blockchain Blockchain-based new architecture [13,15,22, 25, 36, 44, 55, 78, 96, 109, 110] [78] presented three possible architectures of blockchain applications for the IoT front-end; [110] proposed a blockchainbased framework for updating IoT firmware devices; [36] proposed a traceability system architecture Blockchainbased resource management [4, 17, 21, 38, 43, 64, 86, 88, 93, 104, 108] [108] convenient, [86,93] the limited resource and lower computation of mobile devices, [104] profit maximize"]} +{"67867402|3932531": ["\u2026blockchain-based key management system using anti-quantum cryptosystem Blockchain-based intrusion detection [2,5,9\u201311, 20, 35, 67, 68, 79, 97, 103] [68] elaborated the possibility of combing blockchain technology and IDS; [79] and [11] focused on the trust computing and vulnerability scanning of\u2026", "Meng et al. [68] elaborated the possibility of combining blockchain and IDS, and discussed the applicability of blockchain technology in solving data sharing and trust computing problems in the collaborative detection, and pointed out the direction of future work.", "\u2026[18] proposed a blockchain-based key management system using anti-quantum cryptosystem Blockchain-based intrusion detection [2,5,9\u201311, 20, 35, 67, 68, 79, 97, 103] [68] elaborated the possibility of combing blockchain technology and IDS; [79] and [11] focused on the trust computing and\u2026", "There are still many problems un-solved with intrusion detection, such as massive false alerts and overhead package with limited handling [68]."]} +{"67867402|31245252": []} +{"67867402|3348390": []} +{"3639079|3628110": ["Despite providing robust approaches for securing IoT, the blockchain systems are also vulnerable [136]."]} +{"3639079|3767252": []} +{"3639079|2142482": ["Similarly, the authors in [12, 13, 14] target a comparative evaluation of intrusion detection systems."]} +{"3639079|16209841": ["The security analyses presented in [9, 10, 11] discuss and compare different key management systems and cyrptographic algorithms."]} +{"3639079|2181694": ["The energy constrained devices in IoT are vulnerable to \u201dsleep deprivation\u201d attacks by causing the sensor nodes to stay awake [36].", "5 Sleep deprivation attack Energy consumption Link layer Low-level Multi-layer based intrusion detection system [36]", "A framework for mitigating sleep deprivation attacks in wireless sensor networks is described in [36]."]} +{"3639079|9646739": []} +{"3639079|925507": ["The authors in [126] have categorized 18 use cases of blockchain, out of which four cases are for IoT."]} diff --git a/edge/graph_81985472.jsonl b/edge/graph_81985472.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c82a025972ab58667408140f323d8e7a6406126f --- /dev/null +++ b/edge/graph_81985472.jsonl @@ -0,0 +1,2 @@ +{"2054748|6972141": ["and outdoor categories, as DeSouza and Kak [28] did, this survey distinguishes between map-based and mapless navigation, since some navigation systems proposed for indoor could also be properly adapted to work in outdoor environments and vice versa.", "Therefore, it is a selection of the most outstanding contributions surveyed in the work by De Souza and Kak, although some references not considered there have also been included.", "De Souza and Kak in [28] structure robot visual navigation in two main subjects: indoor navigation and outdoor navigation.", "(In order to make compatible this section of the survey with the one by De Souza and Kak, the rest of this section is structured in the same way as De Souza and Kak's survey, maintaining thus the same category labels.)", "a map can be in turn subdivided in metric map-using systems, metric map-building systems and topological map-based systems [28].", "in [28]; second, Section 3 reviews new approaches presented after the submission of [28]; finally, Section 4 concludes the paper.", "The progress made in vision-based navigation and localization for mobile robots up to the late 1990s was widely surveyed by DeSouza and Kak in [28]."]} +{"229853|873842": ["Zelinsky [15] increases efficiency by using a quad-tree [ 131 to represent free and obstacle space, thus reducing the number of states to search in the planning space."]} diff --git a/edge/graph_81985475.jsonl b/edge/graph_81985475.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80253ad7c5a4318133799c0dd40af7f4844656aa --- /dev/null +++ b/edge/graph_81985475.jsonl @@ -0,0 +1 @@ +{"24038060|17054454": ["With the advancement of remote sensing techinques, many approaches have shown to estimate the forest biomass using both optical [4] and radar sensors [5]."]} diff --git a/edge/graph_8199857.jsonl b/edge/graph_8199857.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..98f7c92629c0ff8d31f238083ec2ab99ef47d07e --- /dev/null +++ b/edge/graph_8199857.jsonl @@ -0,0 +1,7 @@ +{"31224931|10565822": []} +{"205458848|14749415": ["Most existing studies are focusing either on their operationalisation [26,32,72,80,82,97] or on the objective assessment of learning objectives [3,8,14,54], neglecting the way in which students make sense of this pedagogical exercise or perceive the relationships between various learning outcomes."]} +{"39127992|14749415": ["\u2026learning activities that could be linked with game elements (Erhel and Jamet 2013; Gross, 2007; Gunter 2006), feedback and progress indicators (Cornillie et al., 2012; Gaved et al., 2013) and teacher\u2019s roles in designing and facilitating game play (Hanghoj and Brund 2013; Bellotti et al., 2013)."]} +{"3901023|5801277": []} +{"3901023|15166896": []} +{"3901023|469744": []} +{"61720041|58448375": ["In language learning and teaching, both analog and digital games have been shown to increase student involvement and provide \u201crich, engaging, and purposeful exposure to language in use\u201d (Tomlinson & Masuhara, 2009, p. 645)."]} diff --git a/edge/graph_8206807.jsonl b/edge/graph_8206807.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8207294.jsonl b/edge/graph_8207294.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8207769.jsonl b/edge/graph_8207769.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..380786c8c996f60506934d17874553827c6f2b60 --- /dev/null +++ b/edge/graph_8207769.jsonl @@ -0,0 +1,3 @@ +{"8530796|206051485": ["This estimation problem has been well studied, and several excellent surveys [27]\u2013[30], and software implementations (e.g., the Insight toolkit [31]) are available, so we do not detail registration algorithms here."]} +{"14283205|16665885": ["This trend seems continuing and more applications areas would benefit from the advancements of the technologies and data sources (Blaschke et al., 2011; Weng, 2011)."]} +{"14283205|10859746": ["The early RS data had limited spatial, spectral and temporal resolutions which were the major cause of the limitation in RS based change detection methodologies (Boyd and Foody, 2011).", "The higher spatial resolution is also linked to the mixed pixel problem, which is considered as one of the largest source of error and uncertainty in land cover CD (Boyd and Foody, 2011)."]} diff --git a/edge/graph_8207975.jsonl b/edge/graph_8207975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06f33ea4b2afbacd471d0cf9b2289125c5a010cd --- /dev/null +++ b/edge/graph_8207975.jsonl @@ -0,0 +1 @@ +{"229853|873842": ["Zelinsky [15] increases efficiency by using a quad-tree [ 131 to represent free and obstacle space, thus reducing the number of states to search in the planning space."]} diff --git a/edge/graph_8208694.jsonl b/edge/graph_8208694.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8212226.jsonl b/edge/graph_8212226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a841ec5cdcba2cbd8c61866afca78994934ac0e --- /dev/null +++ b/edge/graph_8212226.jsonl @@ -0,0 +1,11 @@ +{"8246623|206051485": ["Although it has certain drawbacks when applied to the image registration application [32], it is an ideal approach to our similarity transformation estimation step as we will discuss next.", "We refer the readers to the survey [32] for a complete review."]} +{"18110411|14415030": []} +{"14415030|15744805": ["Supervised evaluation methods [5,6], also known as relative evaluation methods [7] or empirical discrepancy methods [4], evaluate segmentation algorithms by comparing the resulting segmented image against a manually-segmented reference image, which is often referred to as a gold standard [8] or ground-truth.", "Analytic methods [4,71] assess segmentation algorithms independently of their output, evaluating them based on certain properties of the segmentation algorithms, such as processing strategy (parallel, sequential, iterative, or mixed), processing complexity, resource efficiency, and segmentation resolution, which are usually not deemed effective for assessing the segmentation quality (e.", "Whereas supervised methods evaluate segmented images against a reference image, unsupervised evaluation methods [45], also known as stand-alone evaluation methods [38] or empirical goodness methods [4] do not require a reference image, but instead evaluate a segmented image based on how well it matches a broad set of characteristics of segmented images as desired by humans."]} +{"2154043|27527196": []} +{"11144685|2762290": ["Traditionally, these two tasks were implemented in a cascade fashion independently and sequentially, where the segmentation module captures low-level features, e.g., color, intensity and edges [1], [2], and groups the features into regions as the inputs of the object recognition module [3]."]} +{"24733308|15744805": []} +{"17014512|9045232": ["It is known that intraframe object detectors exist for faces [17], [18] and pedestrians [19]."]} +{"1017672|1099309": []} +{"1692308|14545307": ["Compression is the reference application area of VQ [10] in two\u2013dimensional (2-D) signal processing [11].", "this paper, so we refer the reader to the vast specific literature on this subject [10], [11]."]} +{"205397264|15744805": ["\u2026Zhang *, Minghong Pi Centre for Intelligent Mining Systems, University of Alberta, Edmonton, Alta., Canada T6G 2E8\na r t i c l e i n f o a b s t r a c t\nArticle history: Received 7 August 2006 Received in revised form 14 July 2008 Accepted 18 September 2008\nKeywords: Image segmentation\u2026"]} +{"8755430|192934": ["Another drawback is that if it is difficult to segment the original object as a single homogeneous region, it may still be equally difficult to segment its lower-level components."]} diff --git a/edge/graph_8212328.jsonl b/edge/graph_8212328.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f10d4241a38a2eac005b70ca2289e75bef7d3f3 --- /dev/null +++ b/edge/graph_8212328.jsonl @@ -0,0 +1,2 @@ +{"9341967|5473785": []} +{"781570|6327434": ["Much previous work on sensor validation and failure detection within aerospace has emphasized airand spacecraft control in a continuous setting [21] [18].", "We also do not rely on computation of residuals [18] or a separate fault detection step [21] [11]."]} diff --git a/edge/graph_8215225.jsonl b/edge/graph_8215225.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a8201f3fe152737ba004fdb87b70b80887bdc91 --- /dev/null +++ b/edge/graph_8215225.jsonl @@ -0,0 +1,11 @@ +{"6136681|9554464": ["Further data aggregation schemes for secure communications are collected in [56]."]} +{"6136681|205286988": ["Classic routing strategies [ 32 , 33] are usually based on a hierarchical organization of the nodes in the network."]} +{"6136681|1236072": ["Classic routing strategies [32], [33] are usually based on a hierarchical organization of the nodes in the network."]} +{"15011273|9554464": []} +{"11909049|2795037": []} +{"9361837|191396": ["It is anticipated that organizations will own more and more large scale data (or big data) from the services, applications, and platforms they provide in the near future [38]."]} +{"9361837|1230643": ["To develop a high-performance data mining module of KDD for IoT, the three key considerations in choosing the applicable mining technologies for the problem to be solved by the KDD technology\u2014the objective, characteristics of data, and mining algorithm\u2014are as given below."]} +{"9361837|18037424": ["This work was supported in part by the National Science Council of Taiwan, ROC, under Contracts NSC102-2221E-041-006, NSC101-2221-E-041-012, NSC102-2221-E-110054, and NSC99-2221-E-110-052."]} +{"207163460|1230643": ["INTRODUCTION A Wireless Sensor Network (WSN) [Pottie and Kaiser 2000; Akyildiz et al. 2002] is a special \ntype of ad hoc network composed of a large number of nodes equipped with different sensor devices.", "Because of resource rationalization needs of WSNs, data processing is \ncommonly implemented as in-network algorithms [Akyildiz et al. 2002; Intanagonwiwat et al. 2003; Madden \net al. 2005]."]} +{"207163460|4491892": ["Particle .lters are recursive implementations of statistical \nsignal processing [Gilks et al. 1996] known as sequential Monte Carlo methods (SMC) [Crisan and Doucet \n2002]."]} +{"12797509|6275330": []} diff --git a/edge/graph_8221659.jsonl b/edge/graph_8221659.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3d0d25dec5b0dee38090c530f424fa9e07bde44 --- /dev/null +++ b/edge/graph_8221659.jsonl @@ -0,0 +1,18 @@ +{"13651720|20416796": ["This standard scenario, however, could lead to serious concerns about reliability [3], [4]."]} +{"13651720|31086789": ["How to integrate all these players so that they are able to work together to maintain the system stability is a great challenge [5]."]} +{"10290022|17381415": [", series/hybrid APFs [6] and DG for distributed system power quality improvement [3]\u2013[5].", "Whether the task is accomplished by active power filters (APFs) that have a long history of practical use [1], [2] or is shouldered by distributed generating (DG) units as recently emerged [3]\u2013[5], harmonic detection always plays a critical role in their control."]} +{"12083425|17774971": ["Moreover, the multilevel converters have the lowest demands for the input filters or alternatively reduced number of commutations [19]."]} +{"7516226|17381415": ["In both aforementioned operation modes, the current and voltage control loops are, in general, designed with the objectives of rejecting high frequency disturbances, enhancing the damping of the output LC(L) filter and providing harmonic compensation [82, 12, 74, 81]."]} +{"7516226|12083425": ["Generally, the standard capacitive elements of an inverter don\u2019t provide sufficient energy storage capacity and an additional storage component, e.g., a battery or flywheel, is required if an inverter is operated in grid-forming mode [101] See [16] for a survey of energy storage technologies in the context of power electronic systems and renewable energy sources.", ", a battery or flywheel, is required if an inverter is operated in grid-forming mode [101] See [16] for a survey of energy storage technologies in the context of power electronic systems and renewable energy sources."]} +{"24711235|17381415": ["Recently, PLL techniques have been used for synchronization between grid-interfaced converters and the utility networks [1]."]} +{"113812249|7516226": []} +{"27397668|17381415": []} +{"19521053|17381415": []} +{"111049099|17381415": ["The estimation of the voltage\u2019s phase at the PCC is possible by using PhaseLocked Loop (PLL) or Frequency-Locked Loop (FLL) [6].", "FLL is more suitable when the control is based on a stationary reference frame with resonant controllers, where the frequency is the most crucial variable [6], [10, Ch. 9].", "This paper focuses on PLL, but very accurate results may also be achieved by using FLL [7]-[8].", "The estimation of\nthe voltage\u2019s phase at the PCC is possible by using PhaseLocked Loop (PLL) or Frequency-Locked Loop (FLL) [6].", "FLL is more suitable when the control is based on a stationary reference frame with resonant controllers, where the frequency is the most crucial variable [6], [10, Ch.", "The controller of the GSC is based on a synchronous reference frame with PI controllers [6], [10, Ch."]} +{"20820939|7516226": ["Similarly to the above works, in [13] the RL topology is considered, but assumption on balanced signals is replaced by a less restrictive assumption, requiring the transmission network to be symmetrically configured."]} +{"26500126|17381415": ["There are many ways to synchronize an inverter with the grid but the most commonly adopted strategies are based on phase-locked loops [1]\u2013[3], of which some examples can be found in the grid connection of renewable energy [4], [5], FACTS devices [6], [7], active power filters [8], UPS applications [9] and power quality control [10]."]} +{"26500126|12083425": []} +{"126206526|7516226": []} +{"9722751|7516226": ["Therefore, when used for control purposes, the measured powers of the individual units are typically passed through a low-pass filter in order to obtain the fundamental component of the powers [5], [7], [21], see also Section III.", ", Va = Vb = Vc, we have that v\u2212 dq0 = 03 and recover the standard dq0-coordinates under balanced conditions, see [20], [25] and [21].", "Under balanced conditions, this can be easily achieved by employing the standard dq0-transformation, see [20], [21]."]} +{"38167586|17381415": ["Different control strategies for DGS running under faulty grid conditions have been studied in [4], [22], and [23]."]} +{"38167586|12083425": ["Taking DGS as an example, transmission operators issue stringent grid codes regarding the interconnection of the DGS to the utility grid to obtain maximal benefits from the distributed resources [20], [21]."]} diff --git a/graph_822236.jsonl b/edge/graph_822236.jsonl similarity index 100% rename from graph_822236.jsonl rename to edge/graph_822236.jsonl diff --git a/edge/graph_822353.jsonl b/edge/graph_822353.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8231062.jsonl b/edge/graph_8231062.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8234786.jsonl b/edge/graph_8234786.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0339a46482ebf0c9ecba5fae265ee538efcc6c05 --- /dev/null +++ b/edge/graph_8234786.jsonl @@ -0,0 +1,5 @@ +{"108827917|17120461": ["Moreover, ERP systems require many organizational changes which could impose high risks if the implementations are not thoroughly planned, executed, and managed, as statistics from literature and practice show high rates of implementation failures [7]; [8]; [9]."]} +{"1878208|1507400": ["The use of MapReduce for data intensive scientific analysis and bioinformatics are well studied in [41, 80]."]} +{"205713288|8281388": ["A categorisation of bioinformatics projects that utilise the Apache Hadoop platform are detailed in Table 1 with a more detailed review recently undertaken by Zou et al [42]."]} +{"205713288|1507400": ["MapReduce is Google\u2019s solution for processing big data [38] and was developed as large Internet search engine providers were the first to truly face the \u2018\u2018big data tsunami\u2019\u2019, indexing billions of webpages in a quick and meaningful way."]} +{"10082337|393948": ["Deep machine learning has become a new research frontier in artificial intelligence [68,21,69,13,200]."]} diff --git a/edge/graph_8238982.jsonl b/edge/graph_8238982.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60f369084adf626b41e1b06577434399992b3a0c --- /dev/null +++ b/edge/graph_8238982.jsonl @@ -0,0 +1,16 @@ +{"15584803|15782139": []} +{"14911813|2762290": ["The survey of [8] identifies incorrect segmentation as one of the major contributors to errors in using conventional OCR on scanned documents."]} +{"14831690|6423795": ["Whereas the difficulties involved in script identification from video frames include low resolu\u00ad tion, blur, complex backgrounds, multiple font types and size and orientation of the text [2], [3]."]} +{"9782044|15782139": ["Online handwritten documents not only provide information obtainable from offline digital documents, but also contain temporal information of the handwriting process [2]."]} +{"26593570|15782139": []} +{"12531971|11792588": []} +{"12531971|15782139": ["Related surveys are found in [12], [13], [ 14 ], [15]."]} +{"2135683|15782139": ["Moreover, there are many works reported on script identification in the literature and they are mainly for European scripts and there is also much progress in multiscript OCR of European languages, it is still to take full pace in Indian subcontinent [2-6]."]} +{"36767509|12663580": []} +{"36767509|15782139": []} +{"7971482|27527196": ["Hidden Markov model (HMM) was used as classifier.", "After training the HMM, the recognition was performed on the test set.", "The use of other classifiers requires the segmentation of cursive text into characters which is error prone and is implicitly done by HMM. HTK tools [20] were used in the experimentation using HMM.", "A left-to-right discrete HMM with Bakis topology is used for handwritten Arabic text recognition with same number of states for every class/model.", "It was shown in [4] that when the number of samples for some Arabic shapes are not enough, recognition rate can be improved by including 50 samples of a minimal text paragraph that covers all shapes of Arabic characters to train HMM.", "The general trend for cursive text recognition is to use HMM [19].", "We had a total of 149 classes modeled in HMM corresponding to all the possible character shapes and the digits."]} +{"10718494|15782139": ["Postal automation is a topic of research over the last few years and many pieces of published work in this area are available in the literature [1,2]."]} +{"58544066|15782139": ["There are many pieces of work towards handwritten recognition of Roman, Japanese, Chinese and Arabic scripts, and various approaches have been proposed by the researchers towards handwritten character recognition [1]."]} +{"7728779|6423795": ["Moreover, script identification in video frames imposes additional challenges such as low resolution, blur, complex backgrounds, multiple font types and size and orientation of the text [2], [3]."]} +{"11389829|6423795": ["Whereas the difficulties involved in script identification from video frames include low resolution, blur, complex backgrounds, multiple font types and size and orientation of the text [2], [3]."]} +{"14305120|15782139": ["[3] In this paper, we propose an approach that relates to the identification of handwritten scripts using the texture features.", "\u2026significance such as in reading handwritten notes in a postal document analysis, postal address on envelopes, amounts in bank checks, etc.,[3] All the proposed methods in the literature can be classified in to three main categories according to the entity used to carry out script\u2026"]} diff --git a/edge/graph_8239213.jsonl b/edge/graph_8239213.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a17ff9dcef5a1412dc0f17b28b1916b4e1e043cb --- /dev/null +++ b/edge/graph_8239213.jsonl @@ -0,0 +1,6 @@ +{"19509995|14849079": []} +{"19509995|207372751": []} +{"9859532|62667623": []} +{"13961767|634975": ["Very recently [328] the attention of the community has been extended to the n-player (n > 2) generalization of the PDG, also called Public Goods Game (PGG) [343]."]} +{"17889756|627405": ["identified several issues of electronic search derived from their experience in conducting SLRs (Brereton et al., 2007).", "Brereton et al. (2007) identified several issues of electronic search derived from their experience in conducting SLRs."]} +{"1920175|9828770": ["This question comes close to the goal of adaptive network studies [162] that model the feedback from network structure (and how it affects dynamics on the network) to the success of the agents forming the network (and how they seek to change their position in it)."]} diff --git a/graph_824249.jsonl b/edge/graph_824249.jsonl similarity index 100% rename from graph_824249.jsonl rename to edge/graph_824249.jsonl diff --git a/graph_824375.jsonl b/edge/graph_824375.jsonl similarity index 100% rename from graph_824375.jsonl rename to edge/graph_824375.jsonl diff --git a/graph_824841.jsonl b/edge/graph_824841.jsonl similarity index 100% rename from graph_824841.jsonl rename to edge/graph_824841.jsonl diff --git a/edge/graph_8249961.jsonl b/edge/graph_8249961.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24d8f89fae5c5a5959ddd32a59aac461c7b37f35 --- /dev/null +++ b/edge/graph_8249961.jsonl @@ -0,0 +1 @@ +{"8413628|17737221": ["Worldwide energy utilization in buildings is approximately 40% of global power consumption [5]."]} diff --git a/edge/graph_8250043.jsonl b/edge/graph_8250043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1cf72c016c7e7f7e2022ac03ab5641be8d00319 --- /dev/null +++ b/edge/graph_8250043.jsonl @@ -0,0 +1 @@ +{"16360644|1582463": ["A suitable preprocessor transforms these annotations into checking functions that can control potential violations in the program[9][ 1 ]."]} diff --git a/edge/graph_8253022.jsonl b/edge/graph_8253022.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0366d2ca8cd40be9265ceeac4e5dbf89bbb82b9d --- /dev/null +++ b/edge/graph_8253022.jsonl @@ -0,0 +1,3 @@ +{"3057478|14420517": ["There are several security standard specifications [79] such as Security Assertion Markup Language (SAML), WSSecurity, Extensible Access Control Markup (XACML), XML Digital Signature, XML Encryption, Key Management Specification (XKMS), WS-Federation, WS-Secure Conversation, WS-Security Policy and WS-Trust."]} +{"3057478|627405": ["We have carried out a systematic review [13-15] of the existing literature regarding security in Cloud Computing, not only in order to summarize the existing vulnerabilities and threats concerning this topic but also to identify and analyze the current state and the most important security issues for Cloud Computing."]} +{"5895805|141053": ["RELATED WORK There has been intensive research on MAC protocols for terrestrial ad hoc [2] and wireless sensor networks [1]."]} diff --git a/edge/graph_8255396.jsonl b/edge/graph_8255396.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a46548f615b646580039192753dc46e20fa2ca3 --- /dev/null +++ b/edge/graph_8255396.jsonl @@ -0,0 +1,2 @@ +{"22394283|30948085": []} +{"22394283|17442795": ["[32] reviewed methodologies for detecting adverse events (or errors) by discussing the advantages and limitations of existing methods."]} diff --git a/graph_825893.jsonl b/edge/graph_825893.jsonl similarity index 100% rename from graph_825893.jsonl rename to edge/graph_825893.jsonl diff --git a/edge/graph_8260186.jsonl b/edge/graph_8260186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_826064.jsonl b/edge/graph_826064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8271118.jsonl b/edge/graph_8271118.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab2465530a3d3c2cad70b49c4d5f18b2c1dded20 --- /dev/null +++ b/edge/graph_8271118.jsonl @@ -0,0 +1,2 @@ +{"2835908|816774": ["A survey of the existing grid scheduling policies is presented in [7]."]} +{"9852180|816774": ["In the past, job scheduling has been primarily suggested for supercomputers, real-time, and parallel computers [22], [ 26 ], [29], [33]."]} diff --git a/edge/graph_8273435.jsonl b/edge/graph_8273435.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42ea8dc1a7341b80177273bf297c3c6e35a81af0 --- /dev/null +++ b/edge/graph_8273435.jsonl @@ -0,0 +1 @@ +{"6228182|8742997": ["The highest attention was found with respect to automation and prediction approaches."]} diff --git a/edge/graph_8274245.jsonl b/edge/graph_8274245.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e72a72184ae2a6aa295bb486045376ea5f24398 --- /dev/null +++ b/edge/graph_8274245.jsonl @@ -0,0 +1 @@ +{"3676491|1110872": []} diff --git a/edge/graph_8280144.jsonl b/edge/graph_8280144.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1df3689771cf409ffec83043dbfd6ac90c13e575 --- /dev/null +++ b/edge/graph_8280144.jsonl @@ -0,0 +1,8 @@ +{"9972221|8280144": []} +{"17419743|14441987": []} +{"598253|8909218": ["The principal arguments in favor of femtocells are summarized in [4].", "A microcell overlay allows the operator to handoff and load balance users between each tier in response to changing traffic conditions[4]."]} +{"1999116|8280144": []} +{"260331|2835258": []} +{"260331|41035405": []} +{"7734495|141053": ["Furthermore, the important issue of how CSI inaccuracy affe cts the throughput of MANETs has not been analyzed in [16]\u2013[27], [34]\u2013[36].", "Most pri or work focuses on designing MAC protocols and relies on simulations for investigating network throug hput [16]\u2013[27]."]} +{"2997950|14441987": ["Traditionally, research has been concentrated on random access [3], [4], [5], [6], [7], [8], [9], transmission scheduling [10], and routing [11], [12]."]} diff --git a/edge/graph_8281388.jsonl b/edge/graph_8281388.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a3c0d1f3387a8ad4c2c0c457aefafe7d9887035 --- /dev/null +++ b/edge/graph_8281388.jsonl @@ -0,0 +1,5 @@ +{"1596697|1507400": []} +{"10364024|1507400": ["Currently four different mappers are embedded in Eoulsan: BWA (Li and Durbin, 2009), Bowtie (Langmead, et al., 2009), SOAP2 (Li, et al., 2009) and GSNAP (Wu and Nacu, 2010)."]} +{"1781592|3420321": ["The pressure for better and faster tools has recently given rise to the development of new alignment algorithms that outperform traditional ones in terms of both speed and accuracy (Li and Homer, 2010).", "However, Crossbow is based on Bowtie (Langmead et al., 2009b), and thus does not currently support gapped alignment, an important feature for many applications (Li and Homer, 2010).", "Contact: luca.pireddu@crs4.it\nReceived on March 7, 2011; revised on May 9, 2011; accepted on May 26, 2011"]} +{"16647880|1507400": ["Usage of MapReduce for bioinformatics applications started in late 2008 [5, 20] and has since continued to increase [30]."]} +{"16647880|3420321": ["Both programs are based on a highly memory-efficient data structure [18]."]} diff --git a/edge/graph_8285851.jsonl b/edge/graph_8285851.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bba177667c7eb0d88431d7e8b39d53aed66c911a --- /dev/null +++ b/edge/graph_8285851.jsonl @@ -0,0 +1,2 @@ +{"18536832|14697846": ["Managing trust is regarded as a key for solve the problem of security in P2P computing [1]."]} +{"209552|9240891": ["A good overview of access trust systems can be found in Grandison & S loman (2000) [22].", "There are only a few computational trust models that explici tly take risk into account [22].", "In order to be more specific about trust semantics, we will dis tinguish between a set of different trust classes according to Grandison & Sloman\u2019 s classification (2000) [22]."]} diff --git a/edge/graph_8292072.jsonl b/edge/graph_8292072.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc84b18e4cb6889c03252cf3fc7f4c37fe78bdd7 --- /dev/null +++ b/edge/graph_8292072.jsonl @@ -0,0 +1 @@ +{"111254|2935788": []} diff --git a/edge/graph_8293100.jsonl b/edge/graph_8293100.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8294975.jsonl b/edge/graph_8294975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8a7b72dd0a3945a4dcaee676cf05cfbae83e04ae --- /dev/null +++ b/edge/graph_8294975.jsonl @@ -0,0 +1,3 @@ +{"6643795|9504064": ["The data and workflow abstraction layers are derived from related works in business process management [23], and data provenance [6, 24, 25] respectively, while the system layer is derived from related works in trusted computing platforms [26, 27] and system logging literature [28, 29]."]} +{"14755515|7971188": ["monitor system components based on decentralized messaging and information indexing infrastructure, called Distributed Hash Tables (DHTs) [ 26 ]."]} +{"61254881|8411887": []} diff --git a/edge/graph_8296351.jsonl b/edge/graph_8296351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0422170b42fc48cdf42f0ee63475322f3c4ebf5 --- /dev/null +++ b/edge/graph_8296351.jsonl @@ -0,0 +1 @@ +{"18526214|14166294": ["Equivalent mutants Previous work demonstrated that equivalent mutants skew the mutation score measurements and thus hinder the effectiveness of the method [44, 4]."]} diff --git a/edge/graph_8302050.jsonl b/edge/graph_8302050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8305806.jsonl b/edge/graph_8305806.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9429fb578e963b66f15f89e13190885a54ed3e03 --- /dev/null +++ b/edge/graph_8305806.jsonl @@ -0,0 +1,2 @@ +{"38237500|713082": []} +{"6265393|17428811": []} diff --git a/edge/graph_8308538.jsonl b/edge/graph_8308538.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8776ad9b4467b7d944dc83fd0e44d93fef18a3b --- /dev/null +++ b/edge/graph_8308538.jsonl @@ -0,0 +1,5 @@ +{"15340505|3348390": ["In addition to sensor data, related context information also has a significant value [21].", "battery level of the sensors, redundant sensors, access to energy sources, accuracy and reliability) as well [21]."]} +{"18156352|12715779": ["The main goal of this experiment is to determine the number of active users in the system as the budget per round is increased from 20 to 200 when the users set their true valuations using a normal distribution with \u03bc = 5 and \u03c3 = 2, an exponential distribution with \u03bc = 5, and a uniform distribution between [0,10].", "Uniform true valuation distribution [0,10] no Normal true valuation distribution \u03bc = 5, \u03c3 = 2 yes Exponential true valuation distribution \u03bc = 5 no Normal true valuation distribution \u03bc1 = 5, \u03bc2 = 10, \u03bc3 = 15, \u03bc4 = 20, \u03c3 = 2 RADP-VPC-RC no yes yes GIA yes yes yes Radius R 1:10 5 5 Budget per round 100 20:200 0:350 Beta (3,7) (3,7) (3,7) Alpha not used 7 not used ROI Threshold 0.", "[10]; and Doan et al."]} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} +{"11671115|2003896": ["[12] V.", "Accordingly, new research trends at the crossroads of MCS, MSNs, and ad hoc sensor networks share with our proposal the goal of facilitating community identification and formation to enable informed scheduling of MCS tasks not only to single volunteers, but also to communities of volunteers [12]."]} diff --git a/edge/graph_8309232.jsonl b/edge/graph_8309232.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8309364.jsonl b/edge/graph_8309364.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8310135.jsonl b/edge/graph_8310135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10a2c81060438a42a949307f1ac0226753b51f8e --- /dev/null +++ b/edge/graph_8310135.jsonl @@ -0,0 +1 @@ +{"17306222|1142636": []} diff --git a/graph_831203.jsonl b/edge/graph_831203.jsonl similarity index 100% rename from graph_831203.jsonl rename to edge/graph_831203.jsonl diff --git a/edge/graph_8313190.jsonl b/edge/graph_8313190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b24fc4db7233cbf7d14399b2fff6710d4ac39c8 --- /dev/null +++ b/edge/graph_8313190.jsonl @@ -0,0 +1 @@ +{"5638435|2294541": []} diff --git a/edge/graph_8316096.jsonl b/edge/graph_8316096.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4bf83b11ec29038f9d1173c6500e6ba66b23578 --- /dev/null +++ b/edge/graph_8316096.jsonl @@ -0,0 +1,39 @@ +{"25033620|870434": ["Recently, much research on underwater wireless sensor networks (UWSNs) has been performed to support practical applications such as underwater tactical surveillance, undersea exploration, underwater disaster prevention, seismic monitoring, etc [1][2][ 3 ]."]} +{"16017629|870434": ["In acoustic networks the power required for transmitting is typically about 100 times more than the power required for receiving [11]."]} +{"123310|870434": []} +{"8553961|870434": [", building underwater sensor networks (UWSNs) [1] [4] [6] [13] [14] [16]."]} +{"62529459|2835258": ["It is worth noting that the latter algorithm lends itself to distributed implementation if the SINR measurement at each receiver is fed back to all transmitters via efficient information dissemination algorithms [ 31 ].", "3) Each node knows the geographical location of all other nodes via location discovery schemes [29]\u2013[ 31 ]."]} +{"6067983|1230643": ["Due to these sensors, sensor networks are widely used in a variety of application areas such as military, health, and security (Akyildiz et al., 2002, 2007).", "S.-H. Kang).\nperformance criteria (Akyildiz et al., 2002, 2004, 2007; Fodor and Vidacs, 2007; Ganesan et al., 2004; Lee et al., 2009; Luo et al., 2006; Park et al., 2009).", "Recent advancement in low-power digital integration and micro-electro-mechanical systems technologies has enabled the development of low-cost, low-power, and multifunctional sensor nodes that are small in size (Akyildiz et al., 2002, 2007)."]} +{"54117150|1762301": []} +{"7159282|870434": ["For example, due to acoustic modem limitations, FDMA was preferred for an initial deployment of SeaWeb [3, 15], one of the first underwater networks experimented at sea.", "For example, due to acoustic modem limitations, FDMA was preferred for an initial deployment of SeaWeb [15,3], one of the first underwater networks experimented at sea."]} +{"11188425|870434": ["As a promising solution to aquatic environmental monitoring and exploration, Underwater Sensor Network (UWSN) has attracted significant attention recently from both academia and industry [1], [2], [3], [4], [5]."]} +{"13961326|14441987": ["Topology of ad-hoc network changes frequently due to mobility, contention on the wireless channel, and limited battery power of nodes [1\u20134]."]} +{"17166573|870434": [", building underwater sensor networks) to enable/enhance applications such as oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications [9], [8], [2], [4], [3], [7]."]} +{"38834550|42347181": []} +{"38834550|870434": []} +{"38834550|1236072": []} +{"16101192|1708582": ["Depending on its behavior, the agent should choose actions that tend to increase the long-term sum of values of the reinforcement signal [4].", "The goal of solving an MDP is to find an optimal policy, \u03c0 : S \udb8e\ude03\u2192 A, that maps states to actions such that the cumulative reward is maximized [4]."]} +{"45529866|1230643": []} +{"18803427|11894335": ["MANET is a non-infrastructure network which does not be affect by the factors such as time, location and environment [1]."]} +{"14924216|18643817": ["AODV is a reactive routing protocol based on the distance vector approach [12]: each node is not aware of the whole network topology, but it associates to each destination one value representing the distance to reach the destination, expressed by a proper metric (e.g., number of hops), and the\u2026", "Routing in MANETs is a widely studied research topic, and the problem has been dealt with by a plethora of approaches (see for instance [11] and [12] and the references therein)."]} +{"9921528|1230643": ["Currently, researches on the basic theories and system models of WSN (Wireless Sensor Networks) are not perfect, especially due to lack of a set of WSN models that can accurately reveal WSN characteristics [1]."]} +{"13611605|1236072": []} +{"40492333|41998167": []} +{"40492333|10096622": []} +{"40492333|205286988": []} +{"40492333|1230643": []} +{"14074696|1708582": ["The process is then iterated."]} +{"2791173|205286988": ["There has been an intensive study in routing protocols for terrestrial ad hoc [2] and wireless sensor networks [3] in the last few years."]} +{"2791173|1762301": []} +{"10901077|870434": ["\u2026Gerla Istanbul Technical University UCLA UCLA Computer Engineering Computer Science \nComputer Science Department Department Department melike.erol@itu.edu.tr luiz.lipe@ucla.edu gerla@cs.ucla.edu \n ABSTRACT In this paper, we address the localization issue in Underwater Sen\u00adsor Networks (UWSNs)."]} +{"36189524|205286988": ["Due to such differences, many new algorithms have been proosed for the routing problem inWSNs [6,7]."]} +{"36189524|1236072": ["For example, at the network layer, it is highly desirable to find methods for energy-efficient route discovery and relaying of data from the sensor nodes to an external sink or base-station (BS) so that the lifetime of the network is maximized [5]."]} +{"19014517|1762301": ["There has been an intensive study in routing protocols for terrestrial ad hoc [4] and sensor networks [5] in the last few years."]} +{"3430581|870434": ["Few major challenges in the development of UWSN routing protocol are high propagation delay, heavy multipath fading, varying network topology due to mobility and frequent losses of connectivity caused by underwater currents and streams [2]."]} +{"14761545|870434": ["Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14761545|1230643": ["009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007).", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options. First, many authors used ns-2 by inserting larger propagation delays and other channel problems in order to produce more realistically accurate results, i.e. nearly or equal to real conditions. Multi InteRfAce Cross Layer Extension (MIRACLE) (Baldo et al., 2007) is another important example of NS-2 extension, which supports multiple wireless interfaces and cross layering features. Further a module for ns-miracle is developed (Underwater Channel) and used in Jan Bauer and Ernst (2010) and Zorzi et al.", "The work done in Akyildiz et al. (2005) is considered as the pioneering effort towards the deployment of sensor nodes for underwater environments.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings. Such tools are very helpful to provide an environment that is similar to the real deployment. Testbed is not only considered an effective option when real deployment is not feasible, but also provides more trusted results than software based tools. However, it may be limited in scope and may fail to offer realistic environment. Most of the routing protocols proposed for UWSNs consider different design philosophies and application requirements. None of them can work efficiently for all the performance parameters like network size, communication overhead, node mobility, etc. The large variations in the performance metrics make it a difficult task to present a comprehensive evaluation for a large number of routing strategies (Kaiser, 2005). Simulation is the most popular and effective approach to design and test any routing scheme in terms of cost and time; it also provides higher level of detail as compared to real implementation. When we talk about underwater environments, evaluation through simulation becomes an ideal choice as because highly sophisticated hardware is required and at the same time difficulty factor is presented in setting up real deployment scenario. However, the appropriate selection of a simulation framework according to problem and network characteristics is a critical task (Stojanovic, 2003). Excluding a few, the performance of all the schemes discussed in this article has been evaluated with the help of different simulation tools. Most commonly used in terrestrial sensor network simulations, open source ns-2 (NS-2) is used in underwater sensor networks as well like Chun-Hao and Kuo-Feng (2008) and Harris and Zorzi (2007). Generally, it does not support acoustic communication characteristics; so it can be used with two options.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al.", "009 design limitations (Akyildiz et al., 2002; Xu, 2002). Even we are able to arrange some suitable hardware, it may still be not practical to experiment in an appropriate environment like deep water. Usually, such experiments require hundreds of sensor nodes; so cost becomes another important issue. In a nutshell, evaluating any scheme proposed for UWSNs through real deployment is not only complex and costly but also time consuming. Among all the techniques discussed in this article, only Wei et al. (2007) evaluated through physical deployment. However this experiment was based on only three sensor nodes, which may not practically reflect the traffic of most of the real life UWSN scenarios. To solve this problem, some underwater acoustic research laboratories like Underwater Sensor Network Lab prefer to analyze protocol performance through physical testbed as presented in Peng et al. (2007) and Shang et al. (2010). Testbed in Shang et al. (2010) provides a set of acoustic communication hardware and software including an emulator with realistic network settings.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al.", "Many others like Akyildiz et al. (2005), Jun-Hong et al. (2006), Partan et al. (2007), and Akyildiz et al. (2006) have addressed the challenges and issues posed by underwater environments, and proposed their solutions as well."]} +{"14177775|14441987": []} +{"14177775|10287248": ["This characteristic could produce a problem related to the quality of service as well as the possibility to guarantee services [25,31].", "Starting with the Routing Information Protocol (RIP) [26] and its modification [27] there is Open Shortest Path First (OSPF) [24,25,28] as an open protocol.", "Some were used many years ago, and had been implemented in wired networks [11,14,17,24,25]."]} +{"3410773|870434": []} +{"18721617|1230643": ["We will calculate the quadratic sum of the distances from each cluster head to its member nodes in the optimal solution."]} +{"15565890|870434": ["A recent survey [2] on underwater networks highlights the importance of sparse and mobile networks due to the immense volume of the underwater domain."]} diff --git a/edge/graph_8322367.jsonl b/edge/graph_8322367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8323090.jsonl b/edge/graph_8323090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c7b19ab366c016943a971adfbbd7776df3203d58 --- /dev/null +++ b/edge/graph_8323090.jsonl @@ -0,0 +1,2 @@ +{"6633258|913718": [") holding between e and e asserted by the correspondence [15]."]} +{"5413839|534755": ["This is in contrast to the approaches where signalling and transformation between various compounds are expressed using differential equations (O. Voit, 2000; Mishra, 2002; Antoniotti et al., 2003; de Jong, 2002)."]} diff --git a/edge/graph_8323234.jsonl b/edge/graph_8323234.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c95c0a9e940e92af2d3e74b64901e20951b6016 --- /dev/null +++ b/edge/graph_8323234.jsonl @@ -0,0 +1,20 @@ +{"12078118|8909218": ["In current wireless networks operating below 5 GHz, two main approaches are being pursued for addressing this challenge: small cells to increase spatial re-use of spectrum [1], [2], and multiantenna multiple-input multiple-output (MIMO) technology for managing interference and increasing spectral efficiency [3], [4]."]} +{"35662686|15453366": ["Millimeter wave (mmWave) communication has enabled high data rates in indoor wireless systems [1], [2] and has been recently proposed for cellular networks [3]."]} +{"19919524|15453366": ["Using large bandwidths (up to 1 GHz) available at the millimeter wave (mmWave) frequencies for communication systems is one proposed solution to combat the exponential rise in the demand for data traffic [1-4]."]} +{"10179100|8280144": []} +{"16336075|12681089": []} +{"16336075|15453366": []} +{"2722298|15453366": []} +{"15814757|15453366": []} +{"7462858|12681089": ["The clustered model is widely used as a MIMO channel model [15], [16], [17] and is also used in mmWave [18], [2]."]} +{"4682791|18148591": ["The aim is to achieve reliable communication close to theoretical limits [2]."]} +{"10412000|3054454": []} +{"2017985|15453366": ["Hence, the antenna weights at CE field indexes 1,2,3,4 are: At CE 1: w n [1] = 0.", "A 7-GHz of bandwidth at 60 GHz carrier frequency is allocated by most regulatory bodies worldwide for unlicensed uses [1]."]} +{"7109015|15453366": ["Regulations in the United States, Japan, Canada, and Australia have already been set for 60-GHz operation, whereas in Korea and Europe, intense efforts are currently underway [1]."]} +{"11603024|12681089": []} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"19605749|15453366": ["INTRODUCTION Due to the ever increasing demands of the applications such as uncompressed high definition (HD) video streaming, fast file download, wireless backhaul transmission, 60 GHz mm-Wave wireless communication is gaining growing interests in industry as well as in academia [1]."]} +{"15731224|8909218": []} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"8063587|8909218": ["In current wireless networks operating below 5 GHz, two main approaches are being pursued for addressing this challenge: the use of small cells to increase spatial re-use of spectrum [1], and the use of multi-antenna multiple-input multipleoutput (MIMO) technology for managing interference and increasing spectral efficiency [2,3]."]} diff --git a/edge/graph_8323376.jsonl b/edge/graph_8323376.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2912dc48c203ae34164692de77dfccdba923eb81 --- /dev/null +++ b/edge/graph_8323376.jsonl @@ -0,0 +1,20 @@ +{"207208835|13392386": ["These context sensors can capture the rich [Sohn et al. 2005], and context-aware recommendation [Bader et al. 2011; Liu et al. 2013; jae Kim et al. 2010; Karatzoglou et al. 2010; Woerndl et al. 2007]."]} +{"1877845|1805048": ["Several techniques are used to target user groups for an advertisement, including rule-based methods [10], collaborative filtering based recommendation methods [18] and graph based methods [8] [14]."]} +{"18973396|7165993": ["5) Oracle Problem: An oracle is typically needed to de- 1200 termine the required output of a program for a given input (Weyuker, 1982; Barr et al., 2015).", "5) Oracle Problem: An oracle is typically needed to determine the required output of a program for a given input [232], [233]."]} +{"18973396|3241708": ["The use of such an undefined workforce inherently1690 raises quality questions for crowdsourcing in general (Ipeirotis et al., 2010; Yuen et al., 2011; Allahbakhsh et al., 2013) as well as Crowdsourced Software Engineering (Stol and Fitzgerald, 2014c; Li et al., 2013; LaToza et al., 2013a;\u2026", "raises quality questions for crowdsourcing in general (Ipeirotis et al., 2010; Yuen et al., 2011; Allahbakhsh et al., 2013) as well as Crowdsourced Software Engineering (Stol and Fitzgerald, 2014c; Li et al."]} +{"18973396|205435103": ["Motivation is viewed as a critical factor for the success of a software project (Sharp et al., 2009; Beecham et al., 2008; 1650 Boehm et al., 1981)."]} +{"62376382|1142636": []} +{"14504768|8323376": ["For an overview of app store analysis literature, we point the reader to our survey on app store analysis for software engineering [26]."]} +{"14504768|10281344": ["Causal Impact Analysis [6] is a form of causal inference [17, 21], which we use in this paper to identify sets of app releases that have caused a statistically significant (p \u2264 0."]} +{"12623142|11608263": []} +{"13712054|9766972": []} +{"2202028|11608263": ["In the comparison, Binary Relevance (BR) [11] performs similar to classifier chaining (CC) method [9] ."]} +{"13873978|13392386": ["[19] presented a survey on mobile context-aware recommendation, which introduces"]} +{"14380622|154032": ["Measuring VMs and containers is quite difficult as resources are not equally shared [43].", "Currently there is some work on attributing energy consumption to virtualized machines [44], [43], but it is just the beginning of such research."]} +{"14287284|8323376": ["App developers are often motivated to adopt high frequency release strategies [3, 6, 7, 8, 10, 12, 16, 17]."]} +{"14287284|10281344": ["Causal inference [11, 13] is a technique used for exploring events of significant impact on time series data."]} +{"18212800|8323376": []} +{"54605252|55795400": []} +{"2556334|17157304": ["The manual labelling processing took approximately 20 working days (7 hours per day)."]} +{"1983609|7165993": ["It uses a standard, simple-but-e\ufb00ective, default test oracle [22] that regards any input that reveals a crash to be a fault-revealing test sequence."]} +{"5447812|11608263": ["In machine learning the classification of documents into one or more categories is referred to as multi-label classification and can be solved via the binary relevance method [13] where a classifier for each category is trained."]} diff --git a/edge/graph_8324725.jsonl b/edge/graph_8324725.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8326114.jsonl b/edge/graph_8326114.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c47c332f76696cdb2db8920eeed3c37c6532d8dd --- /dev/null +++ b/edge/graph_8326114.jsonl @@ -0,0 +1,12 @@ +{"206893348|1230643": ["Such technological development has encouraged practitioners to envision aggregating the limited capabilities of the individual sensors in a large scale network that can operate unattended [1\u20137]."]} +{"17205659|1236072": ["These routing protocols can be divided into three categories according to the network structure: flat-based routing, hierarchical-based routing, and location-based routing [ 78 ]."]} +{"399636|1230643": []} +{"120157943|3755658": []} +{"120157943|14132386": ["The clustering approach allows a WSN of high scalability, less consumed energy and thus longer lifetime for the whole network [12].", "We use the radio model adopted in [10-14], which is the first order radio model."]} +{"120157943|1230643": ["management, etc [1,2]."]} +{"40919045|1236072": ["Wireless sensor networks enable the reliable surveillance of a variety of environment for health, military, home and civil applications [7,8].", "Clustering scheme enabling the efficient utilization of the limited energy resources of the deployed sensor nodes can effectively prolong lifetime of wireless sensor networks [7,12]."]} +{"16232508|1230643": ["The possible fuzzy quantization of the range [1,10] for the number of neighbors is an experimental result [11].", "Wireless sensor networks (WSN) have become a vibrant and exciting research and development area in recent years and can be used in many different applications, including battlefield surveillance, home security, smart spaces, environmental monitoring, target tracking, and so on [1], [2]."]} +{"1097523|12817488": ["In the synchronous case, the sensor readings are sent to the base stations in real-time using multi-hop wireless communications, where the sensor nodes cooperatively forward data packets on behalf of other sensor nodes towards the base stations."]} +{"5733477|1236072": ["To minimize energy consumption, routing techniques for WSNs employ well-known tactics, as well as those particular to WSNs [99].", "However, most routing protocols [99] for WSNs do not consider security in their designs."]} +{"5733477|2457428": ["Usually, group keys can be managed in a centralized or a distributed way [98]."]} +{"5815043|1236072": ["Currently, in the field of routing protocols security of WSN, more focus has been given on key management [2] and multi-path routing protocols [3]."]} diff --git a/edge/graph_8332683.jsonl b/edge/graph_8332683.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8334698.jsonl b/edge/graph_8334698.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..227fd763a9a527e32f5ccd51f46be9e26c5bd2b4 --- /dev/null +++ b/edge/graph_8334698.jsonl @@ -0,0 +1,10 @@ +{"7216656|7158350": ["fication is one of the most successful applications in the ANN approach [23] that can also be adopted for target identification.", "Furthermore, there are several advantages in the proposed approach [23]: An ANN can accommodate self-adaptation, approximate any universal function, capture nonlinear behavior, and compute the associated posterior probabilities."]} +{"6499627|18986679": []} +{"16005309|8334698": ["The standard AIS database we collected is useful and efficient to evaluate the performance of ELM and other AIS data mining algorithms [22]."]} +{"60800181|17516538": ["Modern systems are capable of fusing information from multiple sensors, often using inhomogeneous modalities, into a single, coherent kinematic track picture.", "However, the more limited field of video-based surveillance (surveyed in Hu et al. , 2004a and Liao, 2005) has reported advances using a variety of approaches, including Learning Vector Quantization (LVQ) (Johnson & Hogg, 1996), Self-Organising Maps (SOMs) (Owens & Hunter, 2000), hidden Markov\u2026", "\u2026of approaches, including Learning Vector Quantization (LVQ) (Johnson & Hogg, 1996), Self-Organising Maps (SOMs) (Owens & Hunter, 2000), hidden Markov Models (HMMs) (Alon et al. , 2003), fuzzy neural networks (Hu et al. , 2004b), and batch expectation-maximization (EM) (Makris & Ellis, 2005)."]} +{"8018915|9828770": []} +{"127386002|3330313": []} +{"8809923|5755403": [", [14]) which finds the minimum Euclidean distance when"]} +{"18500464|1517662": []} +{"123289072|4491892": ["It can be shown that this estimator is unbiased and (under weak assumptions) converges to the true expectation as the number of particles N tends to infinity [24]."]} +{"9601525|17516538": ["FA9550-06-C-0018."]} diff --git a/edge/graph_8339029.jsonl b/edge/graph_8339029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8345075.jsonl b/edge/graph_8345075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccd057b4f3306b12fde178d518306edf7f407070 --- /dev/null +++ b/edge/graph_8345075.jsonl @@ -0,0 +1 @@ +{"5683970|6520684": ["Our literature review revealed that in the area of agile RE, relatively few empirical studies address the project realities of large and distributed projects (Barlow et al., 2011; Sarker and Sarker, 2009).", "We also looked at the papers included in the 2010 and 2011 systematic literature reviews that dealt with agile topics in global software engineering (Jalali and Wohlin, 2010), in distributed software development (Prikladnicki and Audy, 2010) and in large projects in general (Barlow et al., 2011).", "A CMM-5 organization cannot really make allowances for alternatives (Barlow et al., 2011).", "This in turn, forces the organizations to adopt standardization and planning as a less expensive form of coordination (Barlow et al., 2011).", "The fact that not much has been published beyond the four highvisibility research papers (Barlow et al., 2011; Sarker and Sarker, 2009; Hanssen et al., 2011; Prikladnicki and Audy, 2010) and anecdotal evidence, motivated us to provide insight into actual agile RE in the large."]} diff --git a/edge/graph_83457761.jsonl b/edge/graph_83457761.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_83458568.jsonl b/edge/graph_83458568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ee6092e76801cd0606e14991052bce41863a9cc --- /dev/null +++ b/edge/graph_83458568.jsonl @@ -0,0 +1,3 @@ +{"207330385|9928823": ["Discriminative deep architecture o \ufb00 ers discriminative power to patterns via characterizing the posterior distributions of classes conditioned on the visible data (Deng, 2014).", "Inspired by (Deng, 2014), we categorize the related work into three categories: generative deep architecture, discriminative deep architecture and hybrid deep architecture.", "Hybrid deep architecture is the combination of discriminative models and generative models (Deng, 2014)."]} +{"207330385|2670121": []} +{"32209337|2008940": ["In the phase variable construct, the progression of a periodic activity is uniquely characterized by a single phase variable (or potentially by a set of phase variables) [14]\u2013[16]."]} diff --git a/edge/graph_83458695.jsonl b/edge/graph_83458695.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a83fa8ccee87b07a65ad5edf2b9b9d07dbb8c1ae --- /dev/null +++ b/edge/graph_83458695.jsonl @@ -0,0 +1,30 @@ +{"18039574|8530790": []} +{"18222090|8530790": ["There are several studies that concerned with GA applied to the multi-objective function (Fonseca and Fleming, 1994; Tamaki, et al., 1995; Coello, 1999).", "Several studies have been concerned with application of GA to multi-objective functions (Fonseca and Fleming, 1994; Tamaki, et al., 1995; Coello, 1999)."]} +{"12450423|8530790": []} +{"414045|8296351": ["Much of the focus of research regarding feature models has been on automated techniques that analyze a feature model [Benavides et al. 2010].", "In this article, we address the so-called optimization analysis operation [Benavides et al. 2010].", "Catalogs with up to 30 analysis operations on feature models have been published [Benavides et al. 2010]."]} +{"11897480|17383371": []} +{"11897480|4474193": []} +{"11897480|8530790": []} +{"9458792|8530790": ["For the individuals that can be differentiated by Pareto dominance, any existing comparison strategy in the EMO area, such as the nondominated sorting [34], nondominated ranking [28], and strength [100], can be used."]} +{"1498573|365692": ["In other branches of machine learning, using EC to design algorithms has been shown to be very effective as an alternative to hand-crafting them, for instance, for inducing decision-trees 35 ."]} +{"9511065|8530790": ["MOEAs such as the Vector Evaluated Genetic Algorithm (VEGA) by Schaffer [34], the approach by Fonseca and Fleming [ 17 ], the Niched Pareto Genetic Algorithm(NPGA) [35] and the Non-dominated Sorting Genetic Algorithm (NSGA) by Srinivas and Deb [36], to perform inferior to more recent MOEAs, is the absence of elitism.", "A straightforward way to obtain selection pressure toward nondominated solutions is to count for each solution in the population the number of times it is dominated by another solution in the population, which is called the domination countof a solution [7], [ 17 ]."]} +{"13168458|8530790": ["[6], Fonseca and Fleming [7], [8], Murata and Ishibuchi [9], and Tamakiet al."]} +{"25519105|205430214": ["Since, an evolutionary algorithm (EA) because of its population based nature, can obtain multiple P-O solutions in a single simulation run, multiobjective EAs (MOEAs) have been very popular in solving MOPs [3], [4]."]} +{"25519105|3053192": ["Hyper-heuristics [92] is a high level methodology for automatic selection and/or generation of heuristics for solving"]} +{"14328746|8530790": ["As a result, it is not used in many EMO algorithms as pointed out in some reviews on EMO algorithms [5], [20], [22]."]} +{"1124323|4474193": ["Due to the close relation with diversity maintenance, density estimation is very important in EAs and is widely applied in various optimization scenarios, such as multimodal optimization [62], dynamic optimization [76], and robustness optimization [45]."]} +{"2711775|59943180": []} +{"29925212|59943180": ["Now the parallel coordinates plot has been dominantly used in many-objective optimization despite the emergence of various visualization techniques [4], [10]\u2013[12].", "An alternative to view data with four or more dimensions is using parallel coordinates [1]\u2013[3] (aka value paths [4])."]} +{"2219488|1386147": []} +{"7324085|10096622": []} +{"8923469|8530790": ["Since Schaf\u00adfer uses proportional fitness assignment [Goldberg 1989], these \nare in turn pro\u00adportional to the objectives themselves [Fonseca and Fleming 1994].", "Fonseca and Fleming [1993] proposed the use of a utility function combined with MOGA [Fonseca and Fleming \n1994; 1995c] to produce a method for the progressive articulation of prefer\u00adences.", "However, the \nuse of tourna\u00adment selection with this approach makes an important difference with re\u00adspect to other \napproaches such as VEGA, since pairwise comparisons of tournament selection make scaling in\u00adformation \nnegligible [Fonseca and Flem\u00ading 1994; 1995c].", "Population sizes considerably larger than usual with other approaches \nare used, so that the noise of the selection method is tol\u00aderated by the emerging niches in the population \n[Fonseca and Fleming 1994]."]} +{"13997318|8530790": []} +{"15630455|8530790": ["A more thorough comparative analysis is the topic of future work, where we intend to make use of the multiobjective assessment techniques put forward by Fonseca and Fleming [ 3 ]."]} +{"11788303|8530790": ["In these algorithms, the convergence of individuals in the population is estimated according to the Pareto dominance relation based fitness strategies, such as the dominance count (Fonseca and Fleming, 1995), strength (Zitzler et al.", "In these algorithms, the convergence of individuals in the population is estimated according to the Pareto dominance relation based \ufb01tness strategies, such as the dominance count (Fonseca and Fleming, 1995), strength (Zitzler et al., 2002), and dominance rank (Deb et al., 2002)."]} +{"9634991|8530790": ["While non-Pareto EA\u2019s are often sensitive to the nonconvexity of Pareto-optimal sets, this is not the case for Pareto-based EA\u2019s [1].", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize 1 The definitions and terms presented in this section correspond to the mathematical formulations most widespread in multiobjective EA literature (e.g., [6], [1]).", "Finally, as stated in [1], a theory of evolutionary multiobjective optimization is still required, examining different fitness assignment methods in combination with different selections schemes.", "Some researchers suggest that multiobjective search and optimization might be a problem area where EA\u2019s do better than other blind search strategies [1], [2].", "For a thorough discussion of other evolutionary approaches, we refer to [1], [25], and [4].", "Popular aggregation methods are the weighted-sum approach, target vector optimization, and the method of goal attainment [1], [6].", "Nevertheless, as mentioned in [1], it does not appear to be widespread in the field of multiobjective EA\u2019s (e.", "In their excellent review of evolutionary approaches to multiobjective optimization, Fonseca and Fleming [1] categorize"]} +{"18357757|8530790": []} +{"3399852|6021680": ["MOPs with four or more objectives are referred to as MaOPs [24, 46]."]} +{"3399852|8296351": ["In practice, the SAT solvers are found to be easy when analyzing FMs [5, 59] and even for large real-world ones [53].", "Figure 1, adapted from Benavides et al. [5], illustrates a simplified FM from the mobile phone industry.", "A simple FM for a mobile phone SPL, which is adapted from Benavides et al. [5]."]} +{"36482639|8530790": ["nament selection make scaling information negligible (Fonseca and Fleming, 1994; Fonseca and Fleming, 1995d)."]} +{"11057538|59943180": ["Then where l is the Euclidean distance between P 1 and P 2 (i.e., Since the polygon is regular, the same property holds for the edge \u2190\u2212\u2212\u2192 A 2 A 3 , with the difference that the angle between \u2190\u2212\u2212\u2192 A 2 A 3 and X axis is 2 \u03c0/m ."]} +{"61079522|8530790": ["There have been many survey studies on evolutionary techniques for MO optimization (Fonseca and Fleming, 1995; Coello Coello, 1996; Bentley and Wakerfield, 1997; Horn, 1997; Coello Coello, 1998; Van Veldhuizen and Lamont, 2000)."]} diff --git a/edge/graph_83458738.jsonl b/edge/graph_83458738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cea87a0f951e5fbc846f8402838dcc5a24a02f0 --- /dev/null +++ b/edge/graph_83458738.jsonl @@ -0,0 +1,19 @@ +{"960776|192934": ["This seems underconstrained, especially when rules of thumb suggest that one needs ten times more examples than features [18]."]} +{"2741260|14077778": []} +{"206578562|988725": ["[39] conducted an indepth study on network timing channels (remote timing side channels) as well as in-system timing channels (focusing on hardware-based timing channels such as cache attacks) on commodity PCs."]} +{"206578562|18567112": ["[33] continued this line of research for the period from 2010 until 2013, and from 2010 until 2014, respectively."]} +{"206578562|6670217": ["[31] surveyed threats and vulnerabilities (i."]} +{"206578562|15247126": ["[38] surveyed covert channels via computer network protocols, and Biswas et al."]} +{"18088395|3734874": []} +{"18088395|96441": []} +{"6759644|1224063": []} +{"53696817|17737221": ["The non-flexible appliances are those that are associated with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "These appliances usually present burst loads (Khan et al., 2014; Ullah et al., 2013)."]} +{"53696817|16335158": ["The IoT Cloud (Alamri et al., 2013; Botta et al., 2016) will enable the long-time storage and complex analysis of this data."]} +{"232720|3734874": ["In particular, physical key-extraction attacks were shown on many ECC implementations on small devices, starting with Coron [24]; see the surveys [25, 26] and the references therein."]} +{"232720|96441": []} +{"55845869|9176080": []} +{"18042903|14176218": ["Within the IR community, much research has been conducted into the extraction of temporal information from unstructured text [Campos et al., 2014]."]} +{"6191922|1680300": ["Algorithms have been developed for detecting modulated signals [14], often in the context of military communications intelligence."]} +{"3333270|2357830": ["In many emerging scenarios, device identities would also have to be protected in order to avoid malicious actions such as unauthorized device tracking [1].", "The deployment of RFID raises various privacy concerns for users, in particular clandestine tracking and inventorying [1]."]} +{"3333270|14757367": ["RFID uniqueness for cloning protection can also be achieved with physical unclonable functions (PUFs) [115\u2013117], certificates of authenticity [118,119] and watermarking schemes [120].", "This type of designs is similar to watermarking schemes which aim at providing unforgeable properties in the device hardware [120, 123, 124]."]} +{"3333270|192934": ["These transformations could be further enhanced statistical analysis and/or feature selection techniques [24]."]} diff --git a/edge/graph_83462186.jsonl b/edge/graph_83462186.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8356163.jsonl b/edge/graph_8356163.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8360612.jsonl b/edge/graph_8360612.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57c666ea7c5628b28980bf742ca01c13c621e70c --- /dev/null +++ b/edge/graph_8360612.jsonl @@ -0,0 +1 @@ +{"32007585|11392986": []} diff --git a/edge/graph_8360759.jsonl b/edge/graph_8360759.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3d6ffac53136d525e06d5efe919345a549dbbb06 --- /dev/null +++ b/edge/graph_8360759.jsonl @@ -0,0 +1,22 @@ +{"1318877|7788290": ["Predominately, the recognition of individual actions [29], or interaction involving few people [25, 11] has been investigated using visual features [ 12 , 11, 25, 29, 32], although some work on the speech community can also be categorized as interaction recognition [10, 31]."]} +{"27637541|1634674": ["[118] distinguish between actions and activities by defining that", "Inside 2D-template-based approaches described in [118], temporal templates are estimated for each action class.", "methods shown in [118]); or based on the extraction of features from each silhouette and model the dynamics of the action explicitly (again, similarly to the aforementioned \u2018holistic\u2019 approaches).", "\u2019s [118] action modelling classification.", "[118], approaches for modelling actions can be categorised into three major classes: nonparametric, volumetric, and parametric time-series approaches (see Fig.", "In volumetric approaches, in contrast, features are not extracted on a frame-by-frame basis, but instead the whole video is considered as a 3D volume of pixel intensities, and standard image features are extended to deal with the 3D case [118]."]} +{"27637541|12127129": []} +{"27637541|17516538": ["[41]; this paper is highly comprehensive, as it starts with motion detection and object classification and tracking, but also deals with HBU; it divides the approaches to this task", "There are handfuls of previous surveys which analyse and describe \u201chuman motion\u201d or \u201chuman behaviour understanding\u201d [41, 88, 43, 87, 121]; earlier works, as is logic, review lower level techniques (e.", "At the motion level, tasks such as movement detection, and background extraction and segmentation are faced [41, 72, 89]."]} +{"27637541|14970359": ["Moeslund et al. [72] defined an action taxonomy which has been adopted in later works and subsequent surveys.", "The work by Moeslund et al. [72], from 2006, can be divided into two major parts: pose and motion capture, and action recognition.", "In the work by Moeslund [71], bigger emphasis is given to the recognition of motion and actions, whereas activities and behaviours are treated to a minor extent.", "Pose estimation techniques are introduced next, and they are classified into three groups as in [71], according to the presence and use of an explicit model: model-free, indirect model use, direct model use.", "An evolution of the works presented under this section of Moeslund\u2019s work, can be seen in the papers by Bandouch, Beetz, et al. [7, 9]; which are commented later on.", "Nevertheless, the techniques revealed in [71] allow a greater understanding of current methods, and thus, both this and [34] can be used to introduce the"]} +{"27637541|7788290": []} +{"205456559|1634674": ["Several technologies could be used to adjust the system to a specific scenario by means of matching user actions and sensor events that trigger such actions, such as RFID [32,28,25] of processed video streams [6,44]."]} +{"205456559|3042022": ["In this work, we use a team of FALA to online learn the temporal action relationship constraints of a human behavior, and a CALA team to learn the parameters of a fuzzy temporal window in which the behavior occurs.", "5(b) and (c) describe the influence of parameters lmin, kCALA and kFALA for adaptation to habit changes.", "6 shows the evolution through the time for adaptation from behavior To leave home (B4) to behavior B 4, for different values of parameters kFALA and kCALA.", "The action probability distribution in a CALA, at the learning iteration k, is defined by a Normal probability distribution N(l(k),r(k)).", "Concretely, we will study three parameters: the minimum membership value for the fuzzy temporal window (lmin), and the learning rates for the FALA (kFALA) and CALA (kCALA) teams.", "Thus, a large value of kCALA results in the increase of the accumulated undetected behaviors over the time, while the small values of this parameter make the undetected behaviors to be almost zero.", "For the sake of brevity, we suggest reference [41] for a complete description of the classic LA schemes.", "High values of D mean a faster adaptation to the user habits, and therefore, a low system\u2013human interaction is obtained.\npij\u00f0k\u00fe 1;1\u00de \u00bc max pij\u00f0k;1\u00de D;0 ; j \u2013 l\n1 PS\u00fe1\nz\u00bc1;i\u2013l piz\u00f0k\u00fe 1;1\u00de; j \u00bc l\n8>< >:\n\u00f03\u00de\nAs far as behavior time is concerned, the adaptation process consists of updating the parameters that define a CALA: lCALA(k) and rCALA(k).", "5 shows the evolution of percentages of correct classified behaviors in the 365 patterns of the recognition and adaptation databases, regarding lmin, kFALA and kCALA parameters.", "On the other hand, we have found out that large values of the CALA learning rate may change drastically the area of the time windows, therefore making the adaptation difficult.", "(4) and (5).\nl\u00f0k\u00fe 1\u00de \u00bc l\u00f0k\u00de \u00fe kCALA\u00f0tmean l\u00f0k\u00de\u00de; if 9= j : lFTW\u00f0tj\u00de < lmin \u00f04\u00de\nr\u00f0k\u00fe 1\u00de \u00bc r\u00f0k\u00de kCALAr\u00f0k\u00de; if 9= j : lFTW\u00f0tj\u00de < lmin r\u00f0k\u00de \u00fe kCALAr\u00f0k\u00de; otherwise\n\u00f05\u00de\nwhere bj = (aj, tj) are the relevant human tasks and the time instant in which they have been carried out respectively, lmin is the minimum membership value allowed for an action to be considered inside the fuzzy temporal window of the behavior, tmean is the average time of the executed actions, and kCALA is the learning rate for the automaton.", "The FTW is learnt and analysed using a team of 2 continuous action-set learning automata (CALA).", "A Finite Action-Set Learning Automaton (FALA) [41] is a LA model with a finite action set, a = {a1,a2, .", "In this work, we include two CALA [41] into a team to learn these values for each behavior.", "In addition, it is shown that a fixed value of kCALA provides similar results independently of the value of lmin.", "In previous sections, we concluded that parameter kCALA is not relevant for the task of behavior recognition, and also that small values of kCALA are more desirable for a better adaptation.", "As happened in the experiments for behavior recognition, larger values of lmin are more restrictive to allow temporal violations and therefore, the adaptation rate is slower and the scores decrease as this parameter increases, independently of the learning rate for the FALA and CALA teams in the behavior models.", "The update of its action probability distribution is executed by updating l(k) and r(k) [33,41].", "The traditional CALA update rule may be found in [41].", "This picture helps to support the previous assumption about the fact that large values of kCALA move the time window too much and then, the behaviors become even undetected.", "Smaller values of kCALA are more desirable for a better adaptation, while larger values may critically change the temporal window to areas in which the behavior cannot be executed.", "On the other hand, Continuous ActionSet Learning Automata (CALA) [41] can be used to handle continuous action spaces."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"5388357|1634674": []} +{"5388357|7788290": []} +{"13251604|38476": ["In the sequential supervised learning problem [23], our task is to construct a hypothesis (or classifier) h from a training set that contains a set of labeled sequences."]} +{"42044687|8169630": ["Most of them stress the impornce of bridging the gap between raw images and symbolic interetation, which is known as the grounding problem (Pinz et al., 08)."]} +{"11186847|16156203": ["[13] do model some temporal information by incorporating", "ery of frequent sequences\u201d [13], [14], \u201csequence mining\u201d [15],"]} +{"11186847|1176034": ["To find frequent and periodic patterns of activity, we will be exploiting a data mining subfield usually referred to as \" discovery of frequent sequences \" [13], [14], \" sequence mining \" [15], or \" activity monitoring \" [16]."]} +{"312675|14022133": ["Since this may cause existing activities to be specialized further, our approach provides for consistent ontology change through ontology evolution [14]."]} +{"18877303|1113420": ["Baldauf[13] provides a comprehensive review and analysis of current context-aware system regarding architecture, context model, and frameworks.", "In our experiment, only virtual sensors which can obtain source context data from software applications or services [13, 21] are considered."]} +{"206357333|17516538": ["[87] advocated that featurebased tracking algorithms consist of three groups, based on the nature of selected features: global feature-based [41,122,137,156], local feature-based [35,128], and dependence-graph-based algorithms [51,62,63,57]."]} +{"206357333|7788290": ["In fact, these approaches attempt to recover 3-D articulated poses over time [60]."]} diff --git a/edge/graph_8363289.jsonl b/edge/graph_8363289.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c21b259fb85521b2925aa56cfb94ebc76ae2130b --- /dev/null +++ b/edge/graph_8363289.jsonl @@ -0,0 +1 @@ +{"19026701|6327434": []} diff --git a/edge/graph_8364569.jsonl b/edge/graph_8364569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8365617.jsonl b/edge/graph_8365617.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8371086.jsonl b/edge/graph_8371086.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8372620.jsonl b/edge/graph_8372620.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_837447.jsonl b/edge/graph_837447.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8378348.jsonl b/edge/graph_8378348.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..af2b8f0e6f08a61e9814345cb616f6263ee1ba7b --- /dev/null +++ b/edge/graph_8378348.jsonl @@ -0,0 +1,2 @@ +{"57224492|10500613": []} +{"59618223|9123526": ["DAML-S [2], WSDL-S [3], WSML [4], OWL-S [5]."]} diff --git a/edge/graph_8383345.jsonl b/edge/graph_8383345.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8397295.jsonl b/edge/graph_8397295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8399392.jsonl b/edge/graph_8399392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56fd7677e6faf93e90613c24fd6eb04b37902074 --- /dev/null +++ b/edge/graph_8399392.jsonl @@ -0,0 +1,7 @@ +{"27929338|8742997": [", [12] reported an integrative review [32] instead of an SLR."]} +{"27929338|627405": ["SE researchers have also provided methodological support by developing guidelines for performing SLRs [20,3] and have reported lessons learned in order to share knowledge and experiences [4,10]."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"2813846|1076078": ["In [12], a survey on flexibility criteria for business process management systems is presented."]} +{"16533005|6513045": []} +{"1076078|14639861": ["There are many definitions of the flexibility in literature [54]."]} +{"676217|627405": ["[14] reviewed a number of existing literature reviews to examine the applicability of SLR practices to SE.", "Although these conclusions, recommendations, and findings are based on our experiences with this comparison study as well as previous secondary studies, they seem to be in alignment with some previous studies [6] and [15], but contradictory with some others [14]."]} diff --git a/graph_840009.jsonl b/edge/graph_840009.jsonl similarity index 100% rename from graph_840009.jsonl rename to edge/graph_840009.jsonl diff --git a/edge/graph_8407242.jsonl b/edge/graph_8407242.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8407263.jsonl b/edge/graph_8407263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d43d05847613215ef315b67ae1596a76d9a8540 --- /dev/null +++ b/edge/graph_8407263.jsonl @@ -0,0 +1,15 @@ +{"10606255|11761017": ["Surveys on perception planning by Chen[1] and Dutta-Roy[2] list the current state of the art."]} +{"7400701|1708582": ["In many symbolic agents, only one of the actions applicable at any time can be issued based on the highest estimated state-action value [107], [112]."]} +{"7400701|25699143": [", Dhond & Aggarwal [54], Weng et al."]} +{"34410304|7117894": ["Chan, Ryan, and Bever (2013) have demonstrated that an anterior corticostriatal loop is involved in linguistic sequencing, and Altmann and Troche (2011) have used fMRI and dMRI to map out distinct cortico-striato-thalamo-cortical circuits in man that could form the anatomical substrate."]} +{"171437|1452734": ["\u2026also known as epigenetic robotics, or autonomous mental development methodology, is a novel approach to the study of cognitive robots that takes direct inspiration from developmental mechanisms and phenomena studied in children (Lungarella et al. 2003; Cangelosi and Riga 2006; Weng et al. 2001).", "These milestones provide a possible set of cognitive robotics goals and test-scenarios, thus acting as a research roadmap for future work on cognitive developmental robotics."]} +{"29066714|11608263": ["Furthermore, since real world objects typically belong to more than one category, it may be desirable to employ a multilabel classification paradigm (see [60] for a review)."]} +{"29066714|3330313": ["In the machine learning literature, this problem is known as outlier detection (see [53] for a review)."]} +{"17689849|10397481": ["Many studies have been proposed for video summarization, and recently, some methods have employed non-video resources, such as acoustic, textual, or other meta-data, re-lated to the video, in order to improve summarization quality[4]."]} +{"17671509|7257659": ["For example, several image-based methods have been proposed for extracting specific driving situation[7][8]."]} +{"12922823|18487363": ["The speech confidence measure is conventionally used as a confidence measure for speech recognition [8]."]} +{"234198|1708582": [", some typically suboptimal RL method [35].", "B) 1991: Traditional RL [35], [114] is used to maximize in-", "[35], [72], like in Section III-A? A hierar-", "Traditional RL algorithms [35], however,"]} +{"21720896|18374428": ["surveyed the trend of body schema in [11]."]} +{"14862572|18454590": ["A variety of different architectures and training algorithms have been proposed in the literature (see the comprehensive survey in [37])."]} +{"10168773|1452734": ["This is one of the biggest differences from artificial systems [23].", "Here, we briefly review the facets of development in the survey by Lungarella et al. [23] from viewpoints of external observation, internal structure, its infrastructure, and social structure, especially focusing on the underlying mechanisms in different forms."]} +{"7360061|16717715": ["It uses the Festival system for speech synthesis (Taylor et al., 1998) and Sphinx II for spoken language recognition (Huang et al., 1993)."]} diff --git a/edge/graph_8409339.jsonl b/edge/graph_8409339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8411887.jsonl b/edge/graph_8411887.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b52c79f7cb546b5fb8bed1f1b5070ce90e978ef --- /dev/null +++ b/edge/graph_8411887.jsonl @@ -0,0 +1 @@ +{"18214919|1975139": []} diff --git a/edge/graph_8417324.jsonl b/edge/graph_8417324.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8417359.jsonl b/edge/graph_8417359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a92577974aa54d9f068825affae965130f3b5e62 --- /dev/null +++ b/edge/graph_8417359.jsonl @@ -0,0 +1,10 @@ +{"15132772|431089": ["search terms or estimating term frequency distributions) to syntactical and semantical sentence analysis (eg syntactical or semantical parsing) using NLP methods.(43) In rule-based approaches a set of additional rules, which for example reflect prior experiences with the considered relation mining task, is added to improve the search."]} +{"8281388|1507400": []} +{"1026081|6923178": ["There is a negligible probability that the learning system will \u2018learn its own input\u2019 (see Baldi et al., 2000 ) on a narrow, highly self-similar set of data examples.", "There is a negligible probability that the learning system will \u2018learn its own input\u2019 (see Baldi et al., 2000) on a narrow, highly self-similar set of data examples."]} +{"1636407|4626023": []} +{"23225629|431089": ["access a demanding task [1, 5, 6]."]} +{"7028068|15231229": ["This paper states the relationship between disease and gene, summarizes the approaches used to recognize disease genes based on network, analyzes the core problems and challenges of the methods, and outlooks future research direction."]} +{"6914206|11894197": ["Compared to those classifiers, such as SVM and Bayesian, an integrated machine learning model called incRNA is developed and can significantly improve the results in the ncRNA identification [53]."]} +{"9299419|8281388": ["The data inHMDDand dbDEMC aremanually collected and archived from publications [10, 21, 22, 35]."]} +{"9299419|15231229": []} +{"11685054|6923178": []} diff --git a/edge/graph_84178359.jsonl b/edge/graph_84178359.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_84185317.jsonl b/edge/graph_84185317.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0f48664b3050d6ce6f99a625fe4c8853cc57beed --- /dev/null +++ b/edge/graph_84185317.jsonl @@ -0,0 +1,27 @@ +{"27227291|206901977": []} +{"21280809|1137487": []} +{"21280809|15947359": []} +{"21280809|1230643": []} +{"38860221|10096622": []} +{"8850053|10096622": ["heuristic) have been proved to be efficient in solving such problems such as [6]\u2013[9].", "[6] proposed the PSO and Voronoi diagram in the sensor placement, the PSO found the optimal positions of the sensors that give the best coverage, whereas the Voronoi diagram is used to evaluate the fitness of the solution.", "WSN issues such as node deployment are often formulated as optimization problems [6].", "The Particle Swarm Optimization (PSO) algorithm has been a well-known method used to solve optimization problems in WSNs due to its simplicity, high quality solution, fast convergence and insignificant computational burden [6].", "The PSO requires large amounts of memory, which may limit its implementation to resource-rich base stations [6]."]} +{"8434723|1236072": ["In Constrained relay node placement, the relay nodes can be placed anywhere in the network, while in Constrained relay node placement, there are physical constraints [3] on where relay nodes are deployed."]} +{"205288619|206583375": ["For example, they can serve for parking space detection [1], security surveillance [2], indoor object tracking [3,4], or monitoring services [5\u20137]."]} +{"3463079|21683864": []} +{"3463079|206901977": ["As a result, great efforts have been devoted to overcome the energy-saving problem and reliability [11,12]."]} +{"418779|41998167": ["Current implementation supports state-of-art MAC protocols to provide MAC layer communication [23]."]} +{"7337025|1230643": ["Introduction Wireless sensor networks (WSNs) are used for target tracking, environmental monitoring, surveillance, and data collection for factors such as humidity, temperature, light, and pressure or the weight, velocity, and movement direction of an object in the area of the interest [1]."]} +{"63493149|205286988": []} +{"63493149|1230643": []} +{"700237|1236072": ["Connectivity scales the adequacy with which the nodes are able to communicate [2].", "Hence, issues such as detecting failures and connectivity management becomes more complex [2].", "These networks have been extensively used for monitoring of various physical or environmental conditions [2]."]} +{"700237|1230643": ["Cooperative transmission and use of directional antennas are two of themost popular techniques for extending the transmission range [1].", "INTRODUCTION Wireless Sensor networks (WSNs) is a collection of sensor nodes whose basic functionality is to monitor the region in which they are deployed [1]."]} +{"206935122|62185127": ["Classification of image compression techniques [12].", "1 can be classified into two main categories, namely; lossy and lossless compression techniques [12]."]} +{"206935122|14988542": ["The implementation of SPIHT [15] in resource constrained WMSN is an excellent choice due to its high compression ratio, small computational complexity, low power consumption and less complex implementation over EZW and discrete cosine transform (DCT)."]} +{"206935122|62585398": ["On the other hand, SPIHT has several coding drawbacks [8] as follows: (1) The use of three lists to store coordinates of individual coefficients will increase amount of storage, (2) The complexity and the implementation cost of the coder due to memory management required for adding or removing nodes from lists during sorting pass, significantly increases along with the processing time.", "Therefore, lossy compression techniques are highly encouraged for WMSN [6,8]."]} +{"12108822|10096622": ["Particle swarm optimization (PSO) algorithm is based on the social behavior of a group of birds [13].", "In general, sensor node deployment can be categorized into two types: random deployment and deterministic deployment [13, 14].", "The Euclidean distance [13, 28] between two points (sensor (x,y) and target (a,b)) within the region R is de\ufb01ned as where sensor coordinate points are denoted by (x,y) and (a,b) denotes target coordinate points."]} +{"12108822|1230643": ["Wireless Sensor Networks (WSN) plays a vital role in many applications such as security, battle\ufb01eld surveillance, air traf\ufb01c control, biological detection, environment monitoring, industrial automation, smart grid etc., [1, 2]."]} +{"7666935|10329355": []} +{"7666935|13475127": ["Nowadays, WSNs are employed in many applications designed for different purposes such as: environment and habitat monitoring [1,2], traffic control [3], health care application [4], home automation [5] etc."]} +{"15566424|1230643": ["In the medium access control layer, collision avoidance, output power control, and minimizing idle listening time of radio receivers are a sample of the proposed schemes [1,4].", "Recent years have witnessed an increased interest in the use of wireless sensor networks (WSNs) in numerous applications such as forest monitoring, disaster management, space exploration, factory automation, secure installation, border protection, and battle\ufb01eld surveillance [1,2]."]} +{"22927730|1236072": ["A few excellent surveys on the present state-of-the-art research on sensor networks can be traced in Al-Karaki and Kamal (2004), Bojkovic and Bakmaz (2008) and Yick et al. (2008)."]} +{"3607677|22380247": ["A recent and comprehensive survey of RPL can be found in [19]."]} +{"12134038|1230643": ["A wireless sensor network typically consists of a large number of low-cost, low-power, and multifunctional sensor nodes that are deployed in a region of interest [1, 2]."]} diff --git a/edge/graph_84185792.jsonl b/edge/graph_84185792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f7da63ceddf2cfd0395d55bb2562a9d2b00a45d5 --- /dev/null +++ b/edge/graph_84185792.jsonl @@ -0,0 +1,6 @@ +{"3628110|49527603": ["In the existing blockchain systems, there are four major consensus mechanisms [21]: PoW (Proof of Work), PoS (Proof of Stake), PBFT (Practical Byzantine Fault Tolerance), and DPoS (Delegated Proof of Stake)."]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"59314746|49527603": []} +{"59314746|3932531": ["Other reviews focus on security issues of the blockchain (Khan and Salah, 2017; Li et al., 2017a; Meng et al., 2018) and on its potential to enable trust and decentralisation in service systems (Seebacher et al."]} +{"59314746|3628110": []} +{"59314746|27262729": []} diff --git a/edge/graph_8424228.jsonl b/edge/graph_8424228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8434895.jsonl b/edge/graph_8434895.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a57ecbda4da1a52c2dfcee202ece7b7d396607df --- /dev/null +++ b/edge/graph_8434895.jsonl @@ -0,0 +1,50 @@ +{"13162844|13022232": ["A survey by Dadzie and Rowe [2] concluded with the fact that many visualization tools are not easy to use by lay users."]} +{"2189441|2593345": []} +{"17594791|239537": ["See [4] for review."]} +{"3152393|13022232": ["Nevertheless, when a user starts exploring in details an unknown LOD dataset, several issues arise: (1) the difficulty in finding documentation and, in particular, a high level description of classes and properties of the dataset; (2) the complexity of understanding the schema of the source, since there are no fixed modeling rules; (3) the effort to explore a source with a high number of instances; (4) the impossibility, for non skilled users, to write specific SPARQL queries in order to explore the content of the dataset."]} +{"2731137|8434895": ["Finally, in the context of the Web of Data, there is a large number of tools that visualize RDF graphs [12]; however, all these tools require the whole graph to be loaded on the UI."]} +{"40550|239537": ["If we want to gain more insight in the hierarchical organization of each of the examples mentioned above, we can visualize the hierarchical structure using one of the many tree visualization methods that have been proposed in the past [2] [7] [15] [18] [24] [27].", "In this layout, nodes are placed on concentric circles according to their depth in the tree [2] [7] [15].", "One of the most well-known tree visualizations is the rooted tree depicted in figure 1 [2] [15] [24].", "Issues with regard to computational complexity and layout stability have also been associated with force-directed methods [15]."]} +{"2593345|18986679": ["However, overview is becoming increasingly difficult to effectively achieve with the ever-increasing size of real-world datasets."]} +{"15579620|13022232": ["The application is primarily meant for those users who are not pro\ufb01cient in semantic web technologies but are interested in learning, researching, or developing applications speci\ufb01cally on DBpedia.", "3 http://lodvisualization.appspot.com/"]} +{"7089924|11894197": ["This can be done by applying \ufb01lter based feature selection techniques [13] to the dataset."]} +{"8451881|239537": ["Graph drawing has a very rich history [9, 18], with early work on interactive computerized visualizations extending back to the 1960s [4]."]} +{"1713883|13022232": ["Data visualisation provides intuitive ways for information analysis, allowing users to infer correlations and causalities that are not always possible with traditional data mining techniques.", "The wide availability of vast amounts of graphstructured data, RDF in the case of the Data Web, demands for user-friendly methods and tools for data exploration and knowledge uptake.", "In the context of the Web of Data [2,7\u20139,16,17,20], there is a large number of tools that visualize RDF graphs (adopting a node-link approach); the most notable ones are ZoomRDF [21], Fenfire [12], LODWheel [18], RelFinder [13] and LODeX [6].", "In the context of the Web of Data [9,17,16,8,20,2,7], there is a large number of tools that visualize RDF graphs (adopting a node-link approach); the most notable ones are ZoomRDF [21], Fenfire [12], LODWheel [18], RelFinder [13] and LODeX [6]."]} +{"15338800|13022232": ["One of the most useful features identified by Dadzie and Rowe is the ability to query for specific instances of data within a dataset.", "[16] provided a comprehensive review of Linked Data visualisation approaches and categorised their design guidelines based on the perspectives of a tech user and a layuser.", "Design guidelines proposed by Dadzie and Rowe[16] visual information presentation catering to two types of users - lay and tech", "Most relevant to Semantic Web research is the recent work by Dadzie and Rowe [16], which presents design guidelines for Linked Data by exploring the literature."]} +{"16037653|13022232": ["Most existing approaches are only usable by a technical audience or limited to certain domains or data representations [4].", "At the same time there is a vast variety of visualization and exploration techniques [4], most of which are limited either in generality [5] or usability for non-technical users [6, 10]."]} +{"15132697|2593345": ["Instead, VDDA complements these existing approaches as a novel, purely spatial option for visual aggregation [13].", "An overview of themany alternative visual aggregations in the literature is provided by Elmqvist and Fekete [13].", "An n overview of the many alternative visual aggregations in the literature is provided by Elmqvist and Fekete [13]. i"]} +{"14323644|13022232": []} +{"14323644|14205872": ["Quite a number of visualizations for ontologies have been presented in the last couple of years [10,15,23]."]} +{"18004196|13022232": ["While our evaluation follows that of Dadzie and Rowe [8], our criteria focus more directly on the levels of user interactivity with LD.", "Recent studies point to considerable research attention on publishing LD [4], using LD [9], searching LD [19], sharing LD across a community [6] and browsing LD [8].", "We follow the classification structure as well as the actual browsers analysed by Dadzie and Rowe [8], as described in Section 2.", "While Dadzie and Rowe [8] provide a comprehensive review of current state-of-the-art semantic browsing tools, their emphasis is on the first two of the three challenges identified above.", "Again following Dadzie and Rowe [8], we include in our evaluation a discussion of the pros and cons of the browsers for interacting with LD.", "Dadzie and Rowe [8] also define the types of LD users and their different requirements for the consumption and production of LD.", "A further finding of our study suggests that the Dadzie and Rowe [8] classification between text and visual semantic browsers can be further distinguished into 4 kinds: RDF model browsers, domainspecific browsers, generic-domain browsers and linksrelationship browsers.", "ma, Uriburner and ODE browsers have shown more capabilities for exploring and manipulating data, and therefore were evaluated more highly in this study than their corresponding evaluation according to the criteria presented by Dadzie and Rowe [8].", "We first propose five criteria to evaluate the facilities of the browsers surveyed by Dadzie and Rowe [8], with a specific emphasis on their data navigation, triage and manipulation capabilities.", "Dadzie and Rowe [8] recently carried out a survey on current approaches to visualising LD."]} +{"5439910|8434895": ["Considering the general problem of exploring big data [95,81,18,54,49,43], most approaches aim at providing appropriate summaries and abstractions over the enormous number of available data objects.", "A large number of works studying issues related to WoD visual exploration and analysis have been proposed in the literature [30,18,80,3]."]} +{"5439910|13022232": ["[30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [20, 21] (l=8, d=2) (a)", "20, 20, 21 23, 24, 24 30, 32, 35 36, 40, 44 46, 50, 51 52, 53, 55 66, 68, 69 90, 94, 100 n h i k l m o p [20, 24] [46, 55] [30, 44] [66, 100]", "In the RAN scenario (lower flow in Figure 5), the user specifies [30, 50] as her range of interest.", "[30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [20, 21] d=2", "[50, 55] [80, 100] [37, 45] [20, 30] [35, 35] a", "20, 20, 21 23, 24, 24 30, 32, 35 36, 40, 44 [30, 35] [23, 24] [36, 44] [20, 21] [20, 44] a [46, 100] [90, 100] [20, 44]", "20, 20, 21 23, 24, 24 30, 32, 35 36, 40, 44 46, 50, 51 52, 53, 55 66, 68, 69 90, 94, 100 [30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [90, 100] [20, 21] e = (35 + l*3 + m*3 + 52)/8 d = ( h*3 + i*3 + 30 + 32)/8", "[53, 100] 20, 20, 21 23, 24, 24 30, 32, 35 36, 40, 44 46, 50, 51 52, 53, 55 66, 68, 69 90, 94, 100 [30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [90, 100] [20, 21] [20, 55]"]} +{"5439910|2593345": ["[68, 84) [84, 100] [52, 68) [20, 36) [36, 52)", "[30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [20, 21] (l=8, d=2) (a)", "[30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [20, 21] d=2", "20, 20, 21 23, 24, 24 30, 32, 35 36, 40, 44 [30, 35] [23, 24] [36, 44] [20, 21] [20, 44] a [46, 100] [90, 100] [20, 44]", "The above challenges can be overcome by adopting hierarchical aggregation approaches (for simplicity we also refer to them as hierarchical) [36].", "20, 20, 21 23, 24, 24 30, 32, 35 36, 40, 44 46, 50, 51 52, 53, 55 66, 68, 69 90, 94, 100 [30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [90, 100] [20, 21] e = (35 + l*3 + m*3 + 52)/8 d = ( h*3 + i*3 + 30 + 32)/8", "[53, 100] 20, 20, 21 23, 24, 24 30, 32, 35 36, 40, 44 46, 50, 51 52, 53, 55 66, 68, 69 90, 94, 100 [30, 35] [36, 44] [23, 24] [66, 69] [52, 55] [46, 51] [90, 100] [20, 21] [20, 55]"]} +{"17079599|14205872": []} +{"6827185|2593345": ["While Elmqvist and Fekete propose variations of visualization techniques that include aggregation as a first-class citizen [11], in this paper we show how to issue queries such that at the screen resolution in which the application is operating, the result is indistinguishable (or close to) from a complete scan through the dataset."]} +{"17929822|14205872": ["Most tree-based visualizations cope with multiple inheritance by duplicating child nodes and placing them under each parent node [12], which introduces an inaccuracy.", "Katifori et al. [12] have provided tax-onomies of visualizations.", "This is also the approach taken by most visualizations [12]."]} +{"34081243|14205872": ["Over the past decade, many ontology visualization tools have been developed to help users understand, create, and manipulate ontologies [8].", "Often, ontologies are visualized as a node-link diagram, which is susceptible to labeling issues and a cluttered display [8]."]} +{"1472930|8125630": ["For on-line analytical processing applications, where query throughput is more important, data cubes can be used to accelerate common queries in a large data warehouse [8] by pre-computing aggregations of measures over a set of dimensions."]} +{"59900058|13022232": []} +{"59900058|14205872": []} +{"2627066|14205872": ["[18] categorized the existing ontology visualization tools that support up to 10,000 nodes."]} +{"15520964|13022232": []} +{"17197227|14205872": ["Inspired by categorization of tasks that should be supported by an information visualization application as defined in [19] (and adapted in [13]) and evaluation criteria classes described in [7], we further identified seventeen relevant features implemented in ontology visualization tools:", "\u201cMethod\u201d lists available visualization methods as defined in [13].", "A subsequent paper by the same group, [13], defines a categorization of visualization methods and tasks, and includes a thorough (but ageing) survey of ontology visualization tools."]} +{"17197227|239537": ["F7 Incremental Exploration: starting by a small part of the ontology and gradually expanding the nodes selected by the user (as detailed in [9])."]} +{"2717120|7624176": ["A common technique in computer graphics is visibility culling [10], which \ufb01lters geometric objects that are hidden behind closer objects."]} +{"14121054|2593345": ["[6] use hierarchical aggregation to reduce the underlying data and reduce the number of elements drawn in the visualization."]} +{"14121054|8125630": ["Another prevalent technique for data reduction in data analytics and visual analysis is building OLAP cubes to summarize data [7]."]} +{"17614804|8125630": ["OLAP datacubes [5] only accelerate queries on the cubes that have been pre-computed.", "The client becomes a bottleneck, and the work of generating the visualization cannot be distributed over multiple nodes."]} +{"1064824|13022232": ["A large number of works studying issues related to RDF or LOD visualization and analysis have been proposed in the literature [2,3,4,5]."]} +{"1064824|2593345": ["Hierarchical browsing can address the problem of information overloading as it provides information abstraction and summarization [1]."]} +{"259636|13022232": ["Finally, there are Linked Data visualizations that are also RDF-focused and usually do not consider and visualize complete ontologies [17]."]} +{"259636|14205872": ["Surveys can be found in [22,53,60], whereas comparative evaluations of selected visualizations are given in [31,36, 54], among others.", "Visualizations can help in this regard by assisting in the development, exploration, veri\ufb01cation, and sense-* making of ontologies [33,53,60]."]} +{"14205872|239537": []} +{"1121658|14205872": ["Most of the available approaches use node-link diagrams to depict the graph structure of ontologies, while some apply other diagram types like treemaps or nested circles [7,9,11]."]} +{"13577057|8125630": ["The user can save computation time on queries by building an OLAP (Online Analytical Processing) cube [1]."]} +{"12257735|239537": []} +{"18877254|239537": ["However, such graphs are often difficult to comprehend and analyse due to their sheer size, but can be useful for abstract overviews of whole networked structures [8].", "[14] and [8] stressed the importance of reducing the visualised graphs into smaller sized sub graphs that users can browse to visualise other parts of the network.", "[8] surveyed a wide range of visualisation techniques and concluded that all existing algorithms have a size limit after which they cannot cope.", "Pan & Zoom [8] describe two useful types of zooming, Geometric, and Semantic.", "Such characteristics have been shown to be vital for visualising large information networks [8] [20].", "how the graph changes each time it is drawn [14][8].", "Unpredictability may cause high interaction difficulties, but dealing with small or sparse graphs may ease this problem [8]."]} +{"11746946|2593345": ["Elmqvist and Fekete [73] provides a comprehensive overview of rendering techniques for displaying aggregated data."]} +{"358467|239537": ["Graph drawing and visualization has been a very active area of research [10], [21], [22]."]} +{"12369360|8125630": ["Tools like OLAP2DataCube [6] and Tables 6 enable users to convert non-RDF statistical datasets to DCV. Compared to Payola mapping process, they have a different input data type (relational data instead of RDF).", "Also Rhizomer [2] offers multi-dimensional data visualizations (maps for spatial data, timeline, charts, etc.) without involving DCV. Payola and CubeViz rely on DCV as well as Olap4ld [5], which is an implementation of the Open Java API for OLAP and while converting OLAP operations to SPARQL, it introduces OLAPto-SPARQL analytical approach.", "Data analysts are accustomed to making projections from multi-dimensional datasets to low-dimensional ones using aggregations, slicing and dicing known from OLAP[3]."]} +{"4246649|13022232": []} +{"4246649|14205872": ["Katifori et al [15] present a survey of these techniques \nand categorize their character\u00adistics.", "Katifori et al [15] present a survey of these techniques and categorize their characteristics."]} +{"4246649|18986679": ["An information visualization technique requires certain data structures \nto be present."]} diff --git a/edge/graph_8436865.jsonl b/edge/graph_8436865.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5501a527ee1000a83ee48d237af0c68415aa3733 --- /dev/null +++ b/edge/graph_8436865.jsonl @@ -0,0 +1 @@ +{"14760140|184678": ["Others advocate using the DeLoneMcLean model to study both system successes and failures [124].", "Nevertheless, evaluations tend to be summative [124].", "Even in studies of patient care information systems, few evaluations focus on impact on care [124].", "They rarely consider social, ethical, political, organizational, or cultural issues; system development processes; or implementation processes [88, 89, 124, 288].", "Study failures, partial successes, and changes in project definition or outcome \u201cSuccess\u201d and \u201cfailure\u201d have different and changing definitions in different projects and among different stakeholders [3, 124].", "\u201csuccess\u201d and when the determination of \u201csuccess\u201d is made [124].", "Address concerns of the many individuals involved in or affected by informatics applications Many evaluations focus on practitioners, primarily physicians [42], and most studies do not clearly identify primary stakeholders [124], yet different groups have different reactions to a system [25, 230].", "A review of evaluations of patient information systems indicated few case studies, the only subjectivist approach the authors found [124], with similar tendency evidenced in evaluations of clinical decision support system [288]."]} diff --git a/edge/graph_8436894.jsonl b/edge/graph_8436894.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8943fe3bf3354c3bb76ef70733dde33c7f7456c --- /dev/null +++ b/edge/graph_8436894.jsonl @@ -0,0 +1,7 @@ +{"61054223|9045232": ["Every template contains values in range [0, 1], and values in the accumulator are usually below 100.", "Face detection is a commonly performed task in our daily communication and it is one of the most investigated areas of computer vision [1].", "There are many different techniques for face detection and localisation which utilise common properties of human faces [1]."]} +{"18186158|2457428": ["Therefore, the allocated communication time of the wireless channel is not sufficient to guarantee the QoS communication for the requesting terminals."]} +{"18186158|9045232": []} +{"50436689|623196": []} +{"50436689|14173838": []} +{"16501892|10464581": []} +{"6765007|15219853": []} diff --git a/edge/graph_8440916.jsonl b/edge/graph_8440916.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7799b7e32e3299fdab8ae75e2759287523bcc4a --- /dev/null +++ b/edge/graph_8440916.jsonl @@ -0,0 +1,44 @@ +{"43522596|485843": ["4The PDB and the data rate for the LTE users can be found in [6] and [16], while the SM characteristics can be found in [15] and [17].", "specifically, since the QCI1 class, which refers to relays, has a higher PDB [1], [14], [15] than the other two classes [6], we introduce the concept of Adaptive Delay (AD) that corresponds to the time that the scheduler may delay the RBs assignation to QCI1 class."]} +{"43522596|121289": ["specifically, since the QCI1 class, which refers to relays, has a higher PDB [1], [14], [15] than the other two classes [6], we introduce the concept of Adaptive Delay (AD) that corresponds to the time that the scheduler may delay the RBs assignation to QCI1 class."]} +{"29095814|25929315": []} +{"29060869|485843": []} +{"29060869|595093": ["The readers who are interested on a detailed survey on smart grid security are referred to [24], [25]."]} +{"29060869|5747564": []} +{"29060869|7686677": ["Interested readers can refer to [13]\u2013[16] for energy efficient wireless communications, [17], [18] for energy efficient optical commu-", "Furthermore, femtocells and picocells are energy efficient alternatives to macrocells, however when they are densely deployed, they may reduce the efficiency of the macrocell as the primary BS will operate under low traffic [16]."]} +{"29060869|8909218": []} +{"29060869|121289": ["been discussed in detail in [9], [10]."]} +{"29060869|2373572": ["In addition, the technique known as Power Line Communications (PLC) emerges as a strong candidate for the AMI [33], [34]."]} +{"15910685|25929315": ["In the estimation phase the number of arrivals is estimated and this information is used to tune the amount of resources allocated in the serving phase."]} +{"1869526|18037424": []} +{"14473412|6959212": [", [3], [8], and [34]) have comprehensively addressed this issue, and the following merely highlights a"]} +{"10596988|25929315": ["The random access (RA) procedure [14] is performed by a device in several cases; for example, upon initial network access, in idle mode, during handover, and for connection re-establishment after a radio link failure."]} +{"3516248|25929315": ["the existing research proposals to solve the RACH congestion problem has been presented in [2].", "The drift di of this Markov chain at time i, is defined, for every given state Mi, as the conditional expectation\ndi( Mi) = E[ Mi+1 \u2212 Mi| Mi = Mi].", "In [2], the authors investigated the energy efficiency of the RACHs through computer simulations.", "The four messages include a Preamble Transmission (or, Message 1 in Long Term Evolution (LTE)/LTE-Advanced (LTE-A) [1]) initiated by an MS; a Random Access Response (RAR) (or, Message 2) replied by the BS; a Connection Request (or, Message 3 (Msg3)) transmitted by the MS; and a Connection Response (or, Message 4 (Msg4)) confirmed by the BS [2].", "To align all the efforts in the same direction, 3GPP [3] defines six key performance metrics and two application scenarios to evaluate the performance of the novel proposals being designed today [2].", "Mi = \u3008Mi[1],Mi[2], \u00b7 \u00b7 \u00b7 ,Mi[NPT max]\u3009, (1)", "(13)\nOur approximation consists in modeling the evolution of the process by means of the deterministic, \u201cmean,\u201d trajectory specified by the discrete time drift equation\nMi+1 = di( Mi)+ Mi = E[ Mi+1| Mi], (14)\nwhere the rightmost expression immediately follows from (13).", "For i \u2265 0, and for a general arrival process Ai, the evolution of such process can be described by the stochastic recursion\u23a7\u23aa\u23aa\u23aa\u23aa\u23aa\u23a8\n\u23aa\u23aa\u23aa\u23aa\u23aa\u23a9 Mi+1[1] = Ai Mi+1[2] = Mi,F [1] \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 Mi+1[n] = Mi,F [n\u22121] \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 Mi+1[NPT max] = Mi,F [NPT max \u22121]\n(2)\nwhere Mi,F [n] is the random variable which represents the number of MSs which experience a collision (their transmission fails) during their n-th transmission attempt in random-access slot i.", "Owing to (2), we can rewrite (14) in expanded form, as a system of NPT max equations:\nMi+1[n] = { E[Ai] n = 1; E [ Mi,F [n\u22121]| Mi ] 2 \u2264 n \u2264 NPT max.", "Even in such overly simplified conditions, a rigorous model requires us to study the transient behavior of the multidimensional discrete-time stochastic process\nMi = \u3008Mi[1],Mi[2], \u00b7 \u00b7 \u00b7 ,Mi[NPT max]\u3009, (1) where Mi[n], with n \u2208 (1,NPT max), represents the number of MSs which are engaged in their n-th transmission at randomaccess slot i.", "its preamble in the first available random-access slot [2].", "(19)\nBy substituting (19) in (15), we obtain the final system of drift equations\nMi+1[n] = { E[Ai] n = 1 Mi[n\u22121] ( 1\u2212 e\u2212 Mi R ) 2 \u2264 n \u2264 NPT max.", "For i \u2265 0, and for a general arrival process Ai, the evolution of such process can be described by the stochastic recursion \u23aa\u23aa\u23aa\u23aa\u23aa\u23a8 \u23aa\u23aa\u23aa\u23aa\u23a9 Mi+1[1] = Ai Mi+1[2] = Mi,F [1] \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 Mi+1[n] = Mi,F [n\u22121] \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 \u00b7 Mi+1[NPT max] = Mi,F [NPT max \u22121] (2)", "Moreover, a considerable amount of M2M applications are characterized by bulk arrivals and require very high energy efficiency to ensure the long lifetime of the network [2]."]} +{"18543133|5747564": []} +{"2750205|7644489": ["rference from D2D to cellular transmissions can be better handled, since the BSs that are more powerful than UEs suffer from D2D interference. Therefore, sharing uplink spectrum is preferable overall [5]. The objective of this paper is to improve the network throughput by allowing D2D communication to share the cellular uplink resources. At the same time, we restrict the access of D2D links to the up", "algorithm implies that the complexity of the proposed scheme O(NDlog 2 ( max=)+N2 DK) is much lower than the complexity of the centralized scheme O(NND x N 2 D ), where K2[4;8] and log 2 ( max=) 2[5;10], while Nx2 generally and thus NND x 210 in our setup. In Fig. 5, we compare the rates of D2D and cellular links using different algorithms. The SPPP and bisection algorithms provide larger D2D and/"]} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"8543214|121289": ["Following the recommendations of [3], we have used 128 Bytes SG-DR packets and an initial multicast group size of 5% of total SG-DR customers.", "Existing literature [3], [4], [5] has already pointed out the role of emerging broadband wireless networks (e.", "Recent survey in SG [3] reveals that efficient communication technologies are the key in realizing the vision of SG."]} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"20034184|6959212": ["The smart grid communication systems must be robust enough to accommodate new media, as they emerge from the communication industries, while preserving interoperable and secured systems [ 3 ].", "Real-time pricing capability of WAMR systems can also be beneficial to the customers by shifting their loads during off-peak times [ 17 ].", "NIST has recognized IEC 61850 standard for substation automation and protection applications in smart grid environment [ 3 ].", "ESI can be a local controller or customer\u2019s EMS [ 3 ].", "[1], [2]. According to [ 3 ], the term \u201cSmart Grid\u201d refers to a modernization of the electricity delivery system so it monitors, protects and automatically optimizes the operation of its interconnected elements \u2013 from the central and distributed generator through the high-voltage transmission network and the distribution system, to industrial users and building automation systems, to energy storage installations and to end-use consumers and ...", "Several activities are going on to address this communication infrastructure related challenges [ 3 ].", "In the recent report on National Institute of Standard and Technology (NIST) framework and roadmap for smart grid interoperability standards [ 3 ], several wired and wireless communication technologies are identified for smart grid.", "Using the conceptual model of smart grid proposed in [ 3 ], the smart grid framework of information exchange among the communication domains (represented as clouds) has been illustrated in Fig. 1. The lower layer domains related to electric power system are generation domain; transmission domain presented as regional Control Center (CC) and"]} +{"206699559|12083425": ["The advancement of power electronics in wind turbine (WT) control [ 4 ] ensures that wind power is a reliable technology that can be part of every modern power system [5], [6]."]} +{"10397518|18037424": ["There has been several proposals for forming the communication infrastructure to be used for AMI [18][8]."]} +{"638024|7644489": []} +{"34958340|10559330": ["The best known QoS architectures are Integrated Services (IntServ) [7] and Differentiated Services (DiffServ) [8]."]} +{"3330461|7644489": [", from D2D receiver to the eNB, and from the eNB to D2D transmitter) [20].", "3GPP recently decided that the focus of D2D in LTE would be on public safety networks [20].", "A brief overview of standardization activities and fundamentals of 3GPP ProSe can be found in [20]."]} +{"4827056|35109549": ["PMU also has an essential role since it provides monitoring for voltage and current.", "Some of the key smart grid components are advance meter infrastructures (AMI) and phasor measure units (PMU) [1, 2]."]} +{"8508945|17966235": []} +{"6002|12083425": ["\u2026a direct pathway to the deployment of multiagent controls on networked embedded control devices, which will pave the way to the industrial adoption of the automation and monitoring devices capable of combining different functions and achieving goals in collaborative effort with other such devices."]} diff --git a/edge/graph_8443371.jsonl b/edge/graph_8443371.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8445223.jsonl b/edge/graph_8445223.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8446711.jsonl b/edge/graph_8446711.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2db89589ddae0d5ddb9aba2f56a613c354ca0853 --- /dev/null +++ b/edge/graph_8446711.jsonl @@ -0,0 +1,11 @@ +{"35836327|6028805": []} +{"8241254|17516538": ["Accurate pedestrian tracking and anomaly detection are important hot topics in surveillance applications in the security area (see the surveys [1,2] and the special issue [3]), where currently the demands on the operator are very high.", "Visual surveillance and crowd analysis in dynamic scenes with humans are very active research topics in computer vision [2,14]."]} +{"6168092|16620699": ["Surveys on 3D face recognition approaches can be found in [8][9] and [50]."]} +{"6168092|6028805": ["from different persons are significantly different, while those temperature of the object and emissivity of the material[29].", "Those modalities include 3D face information [8] and face images in those spectra other than visible spectra, such as thermal infrared image [29] and near-infrared hyperspectral image [40].", "Various fusion schemes have been proposed [29] [15] [4] [60] and shown to lead to better performance than"]} +{"16736617|6028805": ["The extracted faceprint is unique and can be used in infrared face recognition."]} +{"1350072|6028805": []} +{"10781237|14970359": ["Human motion and body part tracking has been an active area of research in the computer vision community in the recent past [3, 9]."]} +{"11637057|14970359": ["In addition, the paper presents a comprehensive, quantitative evaluation of the different methods on a mobile robot in an office environment, for both single and multiple persons."]} +{"18458199|17516538": ["Also reviewing surveillance research (Hu et al., 2004), it is worth to note on future developments in surveillance that surveillance using multiple different sensors seems to be a very interesting subject."]} +{"12125403|6028805": []} +{"18744164|6028805": ["\u00c7"]} diff --git a/edge/graph_8450611.jsonl b/edge/graph_8450611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..562d0df33665acc251154bc9474855e8044d3eeb --- /dev/null +++ b/edge/graph_8450611.jsonl @@ -0,0 +1,3 @@ +{"1891467|2257431": ["Algorithms that implement this LPM search have been a topic of research for quite some time [1], [2]."]} +{"1376904|8450611": ["We also draw from the encoding ideas highlighted in [1] in order to efficiently store the filter set and intermediate search results.", "[1] provides a thorough survey of packet classification techniques using a taxonomy that frames each technique according to its high-level approach."]} +{"16919514|8450611": ["Likewise, the capacity and efficiency of the most prominent packet classification solution, Ternary Content Addressable Memory (TCAM), is also subject to the characteristics of filter sets [1].", "= (32 \u2212 t[0]) + (32 \u2212 t[1]) + (lg t[2]) + (lg t[2]) +", "32] \u2022 t[1], destination address prefix length, [0.", "In response, several algorithmic techniques have been developed which exploit filter set structure to accelerate search time or reduce storage requirements [1]."]} diff --git a/edge/graph_8451678.jsonl b/edge/graph_8451678.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8454235.jsonl b/edge/graph_8454235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70eccf6cb3442e6720db8ae8a345a2abcf2fbefb --- /dev/null +++ b/edge/graph_8454235.jsonl @@ -0,0 +1,14 @@ +{"9928823|393948": ["(2013) extended the recursive neural network to its tensor, in a similar way that the DNN was extended to its tensor version (Yu et al., 2013), and"]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"207217044|9928823": []} +{"14517182|11608263": ["We cope with the multi-label problem using a binary relevance approach [29]."]} +{"13893399|16489039": ["In this work we consider a task of sponsored search advertising [17, 22], a very popular advertising model that targets users with the most relevant ads by considering an immediate query issued by a user."]} +{"52595|16489039": [" part of the\\broad" ad matching pipeline, with regular retraining of vectors based on fresh user search session data. 2. SPONSORED SEARCH USE CASE Sponsored search is a popular advertising model [16] used by web search engines, such as Google, Microsoft, and Yahoo, in which advertisers sponsor the top web search results in order to redirect user\u2019s attention from organic search results to ads that"]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"3261389|14176218": ["Detecting event-related queries is a challenging task [4, 10, 13]."]} diff --git a/graph_845712.jsonl b/edge/graph_845712.jsonl similarity index 100% rename from graph_845712.jsonl rename to edge/graph_845712.jsonl diff --git a/edge/graph_8462498.jsonl b/edge/graph_8462498.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b119459b5625901029290295ca85b7e989f1751b --- /dev/null +++ b/edge/graph_8462498.jsonl @@ -0,0 +1,3 @@ +{"547681|18148591": ["Although long-term channel characteristics can improve performance [5], the optimal feedback is instantaneous, something that has remained an open challenge."]} +{"2926549|18148591": ["Expressed in terms of the eigenvalues, Equation (1) can be written as [1] 2 1 log 1 where \u03bb i represent the nonzero eigenvalues of HH H or H H H for N \u2264 M and M N respectively and m = min( M , N ).", "The capacity of an M \uf0b4 N single-user MIMO (SU-MIMO) system with M transmit and N receive antennas, in terms of the spectral efficiency i.e. bits per second per Hz, is given by [1] 2 log det \uf0ea where H is the N \uf0b4 M MIMO channel matrix and \u03c1 is the signal to noise ratio (SNR) at any receive antenna.", "\u2026multiple-output (MIMO) wireless systems employ multiple transmit and receive antennas to increase the transmission data rate through spatial multiplexing or to improve system reliability in terms of bit error rate (BER) performance using space-time codes (STCs) for diversity maximization [1]."]} +{"1270466|11720829": ["This has the effect of interleaving the symbols forwarded to each modulator; hence, symbols s0; sK ; s2K ; . . . , are applied to the modulator whose carrier frequency is f0.", "\u2026transmission at 100\u2013200 Mbps. \u2022 IEEE 802.16 [42]: Defines wireless services operating in the 2\u201311 GHz band associated with\nwireless metropolitan area networks (WMANs), providing a communication link between a subscriber and a core network, e.g., the public telephone network and the Internet."]} diff --git a/edge/graph_8463928.jsonl b/edge/graph_8463928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8467457.jsonl b/edge/graph_8467457.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_847397.jsonl b/edge/graph_847397.jsonl similarity index 100% rename from graph_847397.jsonl rename to edge/graph_847397.jsonl diff --git a/edge/graph_8475403.jsonl b/edge/graph_8475403.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8475581.jsonl b/edge/graph_8475581.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e72973d7eef652927c63cc1882ab2b79b0a82630 --- /dev/null +++ b/edge/graph_8475581.jsonl @@ -0,0 +1,16 @@ +{"1738470|10500613": []} +{"12291490|206778272": ["Experts define some bad smells first which are indicators of bad design, and then propose certain refactorings to remove the bad smells [ 14 ] [5]."]} +{"16052502|11607029": ["Sequential compositionality is always assured by the sequential independence condition (see [3] for an extended discussion on the topic), i.", "technique capable of an arbitrary accuracy [3] and forces the designer to find a trade-off between false-positive and false-negative occurrences (in a similar way to e-mail spam filters).", "Especially, it copes with interferences which can not be detected by means of syntactic analyses and are usually referred to as semantic conflicts [3].", "In general, this kind of conflicts are called semantic conflicts (according to the terminology in [3]) and demand explicit techniques to support their specification as advocated in [3].", "Conflicts can be distinguished into syntactic and semantic ones [3].", "In general, this kind of conflicts are called syntactic conflict (since the modifications interfere from a syntactical point of view) and there are a number of approaches which are able to detect them [3], even though their resolution generally requires manual interventions."]} +{"14172235|11607029": []} +{"43852498|206778272": []} +{"43852498|11607029": ["The terminology we use leans towards the works of Mens (2002)"]} +{"8278225|10500613": ["The problem of process model similarity search can be related to that of schema matching [47]."]} +{"17420166|206778272": [", [14]), while closely related to our work, usually focus on improving the internal structure and design of a software system rather than on identifying and restructuring the system\u2019s common and variable parts."]} +{"15261929|11607029": ["Since a three-way merge as it is known, can avoid inconsistencies by rearranging changes, as well as reference the common ancestor to resolve the so-called adddelete problem, merge tools make extensive use of it [16]."]} +{"1395137|11607029": ["As noted in (Mens, 2002), empirical evaluations have shown a very high fraction (more than 90%) of successful, non-conflicting merges.", "For a survey of program merging, see (Mens, 2002).", "As noted in (Mens, 2002), empirical evaluations have shown a very high fraction (more than 90"]} +{"899170|11607029": ["Finally, difference models can be composed sequentially and in parallel giving place to more complex modifications.", "Nurturing the detection of differences between models is essential to model development and management practices, which are traditionally not neglected in high-quality software development processes [10]."]} +{"17273758|10500613": ["Many graph- and tree-matching algorithms (see [24] for a survey)."]} +{"15944844|11607029": ["It remains to be investigated if the above mechanism is feasible, or if a merging algorithm is required which would consider more differences in parallel [3] [8]."]} +{"18546579|11607029": ["Although, in the field of programming languages some approaches have been presented [4] providing some \u201cunderstanding\u201d, they typically rely on formal semantics and apply to certain languages, only."]} +{"8798188|15126268": ["The rewriting logic research program has shown good signs of vitality, including three international workshops [46,39,34], over 200 research papers (see the references in [47,49,51,50]), and three language implementation eMorts, namely ELAN [40,8,7] in France, CafeOBJ [23,24,25] in Japan, and Maude."]} +{"18925606|8475581": ["There are many different MC approaches intended for a variety of different purposes (Stephan and Cordy, 2013).", "Using a recent survey on MC (Stephan and Cordy, 2013), we include any approaches that are intended to deal with MTT explicitly, meaning the comparisons are specifically tailored to provide information that can help with transformation testing."]} diff --git a/edge/graph_8482745.jsonl b/edge/graph_8482745.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8483090.jsonl b/edge/graph_8483090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e2c2a33686e73dabf34c4cb133f81f7e05fdb12 --- /dev/null +++ b/edge/graph_8483090.jsonl @@ -0,0 +1,9 @@ +{"46687029|1762301": []} +{"15167180|3540699": []} +{"11278054|14441987": ["Based on this, many researcher propose the use the routing protocols of location information like Location Aided Routing (LAR), Grid Location Service(GLS), Greedy Perimeter Stateless Routing(GPSR) [6] [7]."]} +{"23198864|1775475": []} +{"12687044|2835258": ["Recent surveys on these protocols can be found in [16, 27]."]} +{"18085558|11894335": []} +{"62666718|3182765": []} +{"18627711|141053": ["\u2026schemes (CDMA and TDMA) are more applicable to static and centralized networks and is assumed to be used where topologies do not change very fast [15]; it is difficult to realize such centralized MAC modes in a dynamic wireless environment, which generally use the IEEE 802.11 protocol [16]."]} +{"26957202|713082": []} diff --git a/edge/graph_84832337.jsonl b/edge/graph_84832337.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..617fb00b9cf01f4163c6b71c60cc96deb9334ce0 --- /dev/null +++ b/edge/graph_84832337.jsonl @@ -0,0 +1,3 @@ +{"1027180|14441987": []} +{"1962164|2835258": []} +{"1962164|14441987": []} diff --git a/edge/graph_84838505.jsonl b/edge/graph_84838505.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a94698bf5f327967d7d1a9c557c53fb9f4c49cf1 --- /dev/null +++ b/edge/graph_84838505.jsonl @@ -0,0 +1 @@ +{"16545106|11426077": ["To achieve high recognition performance, the accurate calculation of pupil and iris circle parameters is an important procedure [25]."]} diff --git a/edge/graph_84842391.jsonl b/edge/graph_84842391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb87544d15d4cc96f1422d49f520c0f07eda7248 --- /dev/null +++ b/edge/graph_84842391.jsonl @@ -0,0 +1,13 @@ +{"6907139|13427574": ["for manipulators and mobile platforms [36, 37]."]} +{"6907139|36510460": ["RRT [25, 98], or heuristic search, e."]} +{"567390|11979239": ["presented in [22] and [23], promise to improve scalability as well as capacity of ad hoc networks."]} +{"9480347|8363289": []} +{"34100137|7482876": []} +{"34100137|12452682": []} +{"111660759|17934515": ["One typical application is the so-called platoon-based cooperative driving (Fernandes, 2012, Jia et al., 2016, Jia and Ngoduy, 2015, Ngoduy, 2013b).", "The issues of CDS have been extensively studied in recent years (see Jia et al. (2016) and references there-in)."]} +{"17663769|1230643": []} +{"229853|873842": ["Zelinsky [15] increases efficiency by using a quad-tree [ 131 to represent free and obstacle space, thus reducing the number of states to search in the planning space."]} +{"9803490|8363289": []} +{"207249940|4528002": ["[2, 9, 10] CAN bus signals are indexed by a process ID (PID), specified in the packet header, and are generally associated with a fixed function (running lights, sensors, door locks, etc.) The specific PID-to-function mapping of signals is dependent on the make and model; e.g., signals with PID 3A1\u2026"]} +{"41559587|56144874": ["The perception of velocity is known to impose costs of increased time delays in the range of 30\u2013200 ms [5, 70, 71].", "Manual Control Considerations Basic observations regarding adaptation and gain compensation by human subjects, as well as preferred optimum gain settings, are reported in [3, 5, 27]."]} +{"17534383|8363289": ["We use a nonlinear model of the plant to predict the future evolution of the system [6].", "This will be done in the spirit of Model Predictive Control, MPC [5], [6] along the lines of our ongoing internal research efforts dating from early 2000 [7].", "The main concept of MPC is to use a model of the plant to predict the future evolution of the system [6], [11]\u2013 [15].", "(13) where, as in standard MPC notation [6], [12], \u0394Ut = \u0394ut,t, .", "We assume that the reader is familiar with the basic concept of MPC and its main issues, a treatment of sufficient stability conditions goes beyond the scope of this work and can be found in the survey [6]."]} diff --git a/edge/graph_84843204.jsonl b/edge/graph_84843204.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b73f83f0d456b459285cc71b79557f42067759c8 --- /dev/null +++ b/edge/graph_84843204.jsonl @@ -0,0 +1 @@ +{"7110078|14242212": ["while that of truncated SVD is O(n 1 n 2 r) [23].", "The APA only requires computing truncated SVD and hence the computational cost can be greatly reduced if the rank is much smaller compared to the matrix dimension.", "Note that this q -based method still needs to calculate the full SVD.", "Without loss of generality, assuming n 2 \u2264 n 1 , the computational cost of full SVD is O(n 1 n 2 2 + n 3", "Therefore, the computational cost of the APA is much lower than the nuclear norm minimization based methods that need full SVD.", "Only truncated SVD is required.", "Note that these algorithms have to perform full singular value decomposition (SVD) at each iteration.", "One advantage of the matrix factorization based approaches is that the SVD can be avoided.", "The projection can be computed by a truncated SVD, which takes significantly less time than a full SVD [2].", "Clearly, the APA does not need to perform the full SVD."]} diff --git a/edge/graph_84844841.jsonl b/edge/graph_84844841.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..219cbeeab7ec866c777f79c1bc759f606f960c04 --- /dev/null +++ b/edge/graph_84844841.jsonl @@ -0,0 +1,8 @@ +{"12195226|10310014": []} +{"13073292|206578224": []} +{"27452433|1230643": ["or relocatable [6], [7]."]} +{"33256340|14552902": []} +{"33256340|8909218": ["Abbreviations AAA: authentication, authorization, and accounting; ASN: Access and Service Network; ASN-GW: ASN gateway; BSs: base stations; CN: Core Network; DAB: Digital Audio Broadcasting; DVB-H: Digital Video Broadcasting-Handheld; DMO: Direct Mode Operation; ERCN: Emergency Response Communication Network; GAN: generalized network architecture; HA: Home Agent; ISM: Industrial, Scientific, and Medical; IMSI: International Mobile Subscriber Identity; LMR: Land mobile radio; MANET: mobile ad hoc network; MBMS: Multimedia Broadcast/Multicast Service; MRs: Mesh routers; MRGWs: Mesh routers and gateways; MRAPs: Mesh routers and access points; MCs: mesh clients; MNs: mobile nodes; OINs: Operator Interest Networks; OMRGs: Operator mesh routers and gateways; PINs: Public Interest Networks; PCN: Private Communication Network; PUSs: primary authentication servers; PTT: Push-to-talk; PoC: PTT over cellular; RTT: Real time text messaging; SUSs: secondary authentication servers; SIP: Session Initiation Protocol; TETRA: Terrestrial Trunked Radio; TMO: Trunked Mode Operation; TMNs: TETRA mobile nodes; UMTS: Universal Mobile Telecommunication System; VSAT: very small aperture terminals; Wi-Fi: Wireless Fidelity; WiMAX: World Wide Inter-operability for Microwave Access; WMN: wireless mesh network.", "In TMO mode, TETRA operations rely on a fixed private cellular infrastructure with the use of BSs.", "Of course, redundant OMRGs could be placed in several other places such as between the RNC and the 3 G CN (Figure 4), so if any failures occur in one of the BSs or the RNC, communications will not be severely disrupted, as the redundant OMRGs will handle the traffic through the mesh network.", "However, in several big disasters, cellular network services have become completely unavailable [20] because their centralized infrastructure makes them vulnerable to threats like power outage, physical damages of the base stations (BSs), etc.", "They describe MITOC, an off-the-shelf commercial system that includes several types of nodes and diverse functionalities, such as satellite communication terminals, radio BSs, IP-based radio inter-operability, a VoIP telephone switch, etc.", "BSs provide the air interface, serving a number of mobile nodes (MNs) that are further connected to the outside world through the ASN-GW.", "They are also immune to terrestrial congestion, providing coverage even in sparsely populated areas where no cellular BSs or other means of communication facilities exist.", "We suggest the very tight coupling approach where OMRGs (that belong to the corresponding operators and not to WMN) are \u201cglued\u201d to the backbone that connects the various BSs to their corresponding CN.", "For example, if a big explosion takes place nearby the CN of a 3G operator (Figure 1), and communication between a number of BSs with the CN becomes infeasible, WMN could be triggered and used as a backup path for the data and signalling of the 3G network.", "The Access and Service Network (ASN) contains the BSs and an ASN gateway (ASNGW).", "Furthermore, the use of WiMAX-enabled femtocells (small cellular BSs [32]) is continuously spreading, as their use substantially increases WiMAX coverage and performance."]} +{"12842459|14441987": ["Although a number of techniques have been proposed for the transmission of the data from the source to the destination, due to constant movement of mobile devices, none of the methods guarantee delivery of the information at the destination [12, 13]."]} +{"12842459|10310014": ["Reference [21] reviewed the various methods that are available for communication in public safety and disaster management."]} +{"11909843|14276831": ["A systematic approach on how to build resilient network systems can be found in [5], an overview of algorithms for survivable planning and routing is given in [6], and a survey", "For a survey of work before 2012 we refer the reader to [6]."]} diff --git a/edge/graph_8486754.jsonl b/edge/graph_8486754.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8491217.jsonl b/edge/graph_8491217.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5da1c26c95a5596604bf4afcd44fb43e4d564b33 --- /dev/null +++ b/edge/graph_8491217.jsonl @@ -0,0 +1,2 @@ +{"11926771|14193005": ["A recently published review paper on warranty data analysis can be found in [14], which includes comments on different types of warranty forecasting techniques."]} +{"14193005|8491217": []} diff --git a/graph_849495.jsonl b/edge/graph_849495.jsonl similarity index 100% rename from graph_849495.jsonl rename to edge/graph_849495.jsonl diff --git a/edge/graph_8496692.jsonl b/edge/graph_8496692.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f655b10fc1d16dbbe0455338bee5c8d6661fc7c9 --- /dev/null +++ b/edge/graph_8496692.jsonl @@ -0,0 +1,3 @@ +{"2929933|8496692": []} +{"61021416|713082": ["structs Shortest-Path Trees (SPT) instead of Reverse SPTs as most routing protocols do [6, 7, 9, 23]."]} +{"8820500|10559330": []} diff --git a/edge/graph_8497912.jsonl b/edge/graph_8497912.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd79675ef91267896a688e1c0a4428f805fd9f57 --- /dev/null +++ b/edge/graph_8497912.jsonl @@ -0,0 +1,3 @@ +{"5783729|20905429": ["In addition, the relative complexity of UWB transmitters and receivers must be overcome in a cost-effective way before UWB can compete with standards already established in the market, such as Bluetooth and ZigBee.", "6 Task Group is seeking to address these issues and indications are that the new standard will have the following characteristics [62]:", "The battery life for ZigBee is expected to be months, whereas battery life is limited to days for Bluetooth.", "Another wireless enabling technology is ZigBee, built on the IEEE 802.15.4 standard, used for low power and low data rate communication.", "There is, at present, no single \u2018ideal\u2019 standard available for physiological measurement systems based on wireless body sensor networks (WBSNs) [62].", "With its simple architecture and the low power requirements, ZigBee is more suited to medical applications, compared to Bluetooth.", "The target market for ZigBee is low data-rate, low energy applications.", "Data transmission security is protected by the use of the Advanced Encryption Standard (AES) in ZigBee [62]."]} +{"25766955|20905429": []} +{"3060373|206764452": ["In addition, Geronimo [22] summarized the pedestrian detection for advanced driver assistance systems using image processing."]} diff --git a/edge/graph_8503975.jsonl b/edge/graph_8503975.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_850415.jsonl b/edge/graph_850415.jsonl similarity index 100% rename from graph_850415.jsonl rename to edge/graph_850415.jsonl diff --git a/edge/graph_8507227.jsonl b/edge/graph_8507227.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13b09518d6b8fd0b041a5ea45eca6fa34883bba3 --- /dev/null +++ b/edge/graph_8507227.jsonl @@ -0,0 +1,11 @@ +{"22670935|192934": ["Then, we employ afuzzy c-means algorithm[35] to remove polyp candidates due to noise."]} +{"19389149|6280485": ["11 Many of these features are variations of standard techniques that are found in the image processing literature."]} +{"13349255|17069874": ["titatively using the blurred signal-to-noise ratio (BSNR) and the improvement in signal-to-noise ratio (ISNR) [37], [38]."]} +{"38334900|17069874": []} +{"34104000|192934": ["16 In this procedure, 1 nodule image is left out from the classi\ufb01er design group and a linear discriminant function is formulated using the design group."]} +{"17961280|6280485": []} +{"43724959|2186746": []} +{"8601838|17069874": ["The signal-to-noise ratio of an input image [63], [64] can be defined as"]} +{"8352163|6280485": []} +{"15989190|17069874": []} +{"1778287|6280485": []} diff --git a/graph_851114.jsonl b/edge/graph_851114.jsonl similarity index 100% rename from graph_851114.jsonl rename to edge/graph_851114.jsonl diff --git a/edge/graph_8516210.jsonl b/edge/graph_8516210.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc5d038da6410376b40399edc9d26e863fda186b --- /dev/null +++ b/edge/graph_8516210.jsonl @@ -0,0 +1,2 @@ +{"7386133|6681074": []} +{"206802022|8953108": ["In-depth survey and evaluation of various thresholding methods are given by Sahoo et al. (1988), Lee et al. (1990), Glasbey (1993) and more recently, by Sezgin and Sankur (2004)."]} diff --git a/edge/graph_8520489.jsonl b/edge/graph_8520489.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8523192.jsonl b/edge/graph_8523192.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..071ac5783679f0a559d6d48344c65e25c3bf634c --- /dev/null +++ b/edge/graph_8523192.jsonl @@ -0,0 +1,14 @@ +{"22895451|801245": ["Khan[6] describes benefits of the virtualization of WSN."]} +{"2797500|485843": ["We have referred many literatures for the advances metering infrastructure (AMI) and to the best of our knowledge none of those have discussed about a data aggregation mechanism for PLC [14-16]."]} +{"2797500|8215225": ["[10] has provided the distributed data aggregation algorithm for sensor network nodes."]} +{"18070225|15545863": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"18070225|913718": ["Finally, Section V concludes the paper and provides directions for future work."]} +{"45561163|2535224": []} +{"17046469|17474643": ["Opportunity 1 - Standards, Benchmarks and Marketplace\nEdge computing can be realised in practice and be made accessible publicly if responsibilities, relationships and risks of all parties involved are identified."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"22718673|8909218": ["Classical usage of femto-cells is about an average of 4 mobile users [16]."]} +{"19842741|57048228": ["In addition to that, the VM resources available at cloudlet machines, on which the user applications run, are of heterogeneous capacities [4].", "in [4] provided that the definitions as well as categories of context and contextaware applications are provided so that they can facilitate the building of context-aware applications with proper understanding."]} +{"8751555|16654832": ["Realizing cloud-based augmentation vision is impeded by multi-dimensional overhead of identifying and efficiently partitioning resource intensive components , VM (Virtual Machine) creation and migration, and monitoring the overall outsourcing process [44]."]} +{"8751555|7287857": ["Variations in wireless networks and their related technologies impact the delivery of cloud services and affect mobility, augmentation, and usability of smartphones [38].", "In our previous work [38], smartphone augmentation approaches are reviewed and a taxonomy is defined which is depicted in Figure 1."]} +{"14093686|15545863": ["While Fog nodes provide localization, therefore enabling low latency and context awareness, the Cloud provides global centralization.", "Do, Nguyen H. Tran, Chuan Pham, Md. Golam Rabiul Alam, Jae Hyeok Son and Choong Seon Hong\nDepartment of Computer Enginneering, Kyung Hee University, 446-701, Korea Email: {dtcuong, nguyenth, pchuan, robi, sonjaehyeok, cshong}@khu.ac.kr\nAbstract\u2014Large-scale Internet applications, such as content\u2026", "Fog computing is one potential approach to dealing with the demands of the ever-increasing number of Internet-connected devices sometimes referred to as the Internet of Things."]} diff --git a/graph_852837.jsonl b/edge/graph_852837.jsonl similarity index 100% rename from graph_852837.jsonl rename to edge/graph_852837.jsonl diff --git a/edge/graph_8530790.jsonl b/edge/graph_8530790.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d87c17b421336e42a484665b5a1d7a851144c216 --- /dev/null +++ b/edge/graph_8530790.jsonl @@ -0,0 +1,2 @@ +{"13997318|8530790": []} +{"15048360|8530790": []} diff --git a/edge/graph_8532570.jsonl b/edge/graph_8532570.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e4cb12abaceb041ab97da357c1116d32da6755b --- /dev/null +++ b/edge/graph_8532570.jsonl @@ -0,0 +1 @@ +{"7847316|18782652": ["Rule pruning is a commonplace technique in data mining [3].", "tually, there are several classification-rule discovery algorithms that were explicitly designed to improve rule set simplicity, even at the expense of reducing the predictive accuracy [1], [3], [4]."]} diff --git a/edge/graph_853333.jsonl b/edge/graph_853333.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8533795.jsonl b/edge/graph_8533795.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8538608.jsonl b/edge/graph_8538608.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4796a2f2eae35fc8c88bfa03e5c6aacb8642e205 --- /dev/null +++ b/edge/graph_8538608.jsonl @@ -0,0 +1 @@ +{"52807410|14697846": ["An extensive survey on P2P networks can be found in [6]."]} diff --git a/edge/graph_8540171.jsonl b/edge/graph_8540171.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a82507fa73d6a1921fadabd61968f0c6661ed66b --- /dev/null +++ b/edge/graph_8540171.jsonl @@ -0,0 +1,4 @@ +{"1577073|3732796": ["Some other forgery detection techniques can be found in [6]."]} +{"17778251|18144244": ["Digital watermarking has been raised as one of top solutions to protect a digital document such as Quran\u2019s images [1-20, 25]."]} +{"41129289|9415965": ["However, video forensics still presents many unexplored research issues due to the complexity and diversity of video signals [2].", "Among the available literatures in video forensics [2], source identification [3, 4] is one of the earliest techniques, which aims to identify the acquisition device.", "In video manipulation detection, the forensic techniques can be divided into three classes regarding to the analyzed target: camera-based, coding-based, and contentbased techniques [2]."]} +{"17178652|18144244": ["In the literature, watermarking techniques can be applied on block and pixel based concepts in the spatial domain, wavelet domain or Discrete Cosine Transform (DCT) [1-20]."]} diff --git a/edge/graph_8540351.jsonl b/edge/graph_8540351.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8544264.jsonl b/edge/graph_8544264.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6719cf7bdb2df708c47f7824938d3f5fcf0e2b24 --- /dev/null +++ b/edge/graph_8544264.jsonl @@ -0,0 +1 @@ +{"20885957|192934": ["with an empty feature set and expand the search space by adding one feature at the time according to the outcome of a criterion function, the area under the receiver operator characteristics (ROC) curve [31]."]} diff --git a/edge/graph_8546633.jsonl b/edge/graph_8546633.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_85468291.jsonl b/edge/graph_85468291.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50208acdaf80c71b7beea10f706bf2c7001533b9 --- /dev/null +++ b/edge/graph_85468291.jsonl @@ -0,0 +1,11 @@ +{"3823420|1598350": ["Thus, by 2020, it is estimated that a large number of applications will be required to be processed and served through the technology of IoT [14], [15]."]} +{"29199939|3348390": ["It is therefore important to highlight, as also stated in [22], that the IoT cannot exist without sensor network (SN); SN indeed provides the majority of hardware infrastructure, through providing access to sensors and actuators."]} +{"16157619|18717047": ["The second architectural principle is the use of the REpresentational State Transfer (REST) paradigm [8] for the interactions between the PaaS and the Fog, as it is commonly used for PaaS-IaaS interactions nowadays."]} +{"6548473|14315321": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"8101432|14140377": ["Ourwork is likely to benefit fromand contribute to the considerable research on temporal databases [22], main-memory databases [10], and real-time databases [16,22].", "There has been extensive research on scheduling tasks in real-time and multimedia systems and databases [21,22]."]} +{"24394974|207228303": ["VM allocation in cloud computing environments is receiving a great deal of attention in both academic and industrial communities, and efficient scheduling methods for this issue have been widely investigated [6], [7].", "Although virtual machine (VM) placement in geo-distributed DCs for cost minimization has been widely addressed in the literature [6], [7], [8], [9], [10], [11], and has been successfully applied to batch processing models such as MapReduce, it cannot be applied to streaming workflow because of the followingweaknesses."]} +{"24394974|15209496": ["VM allocation in cloud computing environments is receiving a great deal of attention in both academic and industrial communities, and efficient scheduling methods for this issue have been widely investigated [6], [7].", "Although virtual machine (VM) placement in geo-distributed DCs for cost minimization has been widely addressed in the literature [6], [7], [8], [9], [10], [11], and has been successfully applied to batch processing models such as MapReduce, it cannot be applied to streaming workflow because of the followingweaknesses."]} +{"5746950|13210924": ["The performance of the auto-scaler will depend on the quality of the available metrics, the sampling granularity, and the overheads (and costs) of obtaining the metrics [38]."]} +{"2183290|10559330": ["Various IP-layer architectures have been proposed to maintain Internet QoS including IntServ [9] and DiffServ [8]."]} diff --git a/edge/graph_85497954.jsonl b/edge/graph_85497954.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..deeae6c93d976e8de92f9bc9254734d0ac08769c --- /dev/null +++ b/edge/graph_85497954.jsonl @@ -0,0 +1,47 @@ +{"2240147|1634674": ["Several excellent surveys on the topic of visual recognition are available ([19], [26])."]} +{"6988770|8815923": ["For grasping [37], grasp stability of finger contacts can be learned from previous grasps on an object [45]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"6138957|8815923": ["known objects to models in the database [4, 5, 8, 23, 27].", "performance according to physical models such as the ability to resist external wrenches [45], and empirical (or data-driven) methods [4], which typically use human labels [2] or the ability to lift the object in physical trials [43]."]} +{"15121560|1452734": ["TABLE I LEARNING PHASES OF THE DEVELOPMENTAL APPROACH We adopt a developmental approach [18], [19], where the robot acquires skills of increasing difficulty on top of previous ones."]} +{"13072941|8815923": ["While a complete survey of grasping is outside the scope of this work, we refer the reader to standard surveys on the subject for a more complete treatment (Bohg et al., 2014)."]} +{"14517547|393948": ["\u20262004; Dalal and Triggs 2005), a multi-layer neural network architecture efficiently captures sophisticated hierarchies describing the raw data (Bengio, Courville, and Vincent 2013), which has shown superior performance on standard object recognition benchmarks (Krizhevsky, Sutskever, and\u2026"]} +{"1336603|8815923": ["[6] for a review), robotic learning and training [7] and investigation of human behavior."]} +{"1336603|16013270": ["1) [71], and [72], [73], [74], which are datasets that do not include object manipulation motions, or if they do, the object manipulation motions are sparse, 2) [75], [76], and [3], which are dataset of objects that are typically involved in manipulation, rather than datasets of motion."]} +{"43648144|9316331": ["Despite its simplicity, a similar strategy has been used in Monte Carlo Tree Search with the name \u201cFlat Monte Carlo\u201d (Browne et al. 2012) with good results in computer games."]} +{"43648144|1452734": ["The concept of affordances follows the developmental robotics framework, which proposes acquiring new skills on top of old ones by experimentation and interaction with the environment (Lungarella et al. 2003)."]} +{"7082854|393948": ["regression problem [5] with a uni-modal input."]} +{"4956314|7559976": ["To address this domain adaptation problem [23], [30], [83], a robotic vision system should be able to learn from new training samples of known classes during deployment and adopt its internal representations accordingly."]} +{"3726684|1634674": ["This is a major advantage due to the fact the system can be more adaptable and flexible than classic approaches [5].", "[5], where they suggested the semantics of human activities requires higher level representations and reasoning methods.", "Semantics refer to the study of meaning and several methods have been used to define semantics in the domain of human behavior such as linguistic descriptions [6,17], syntactic approaches [5,10], and graphical models [13,22]."]} +{"3691613|1634674": ["Another interesting de\ufb01nition of semantic representations is given by [35]."]} +{"16433113|1634674": ["A few good surveys of the former can be found in (Moeslund et al., 2006) and (Turaga et al., 2008)."]} +{"536942|7185733": ["The analysis of hand motion is most often applied to gesture recognition for human-computer interfaces or sign language recognition [8].", "The performance of the classifier is quite insensitive to choices of B \u2208 [3, 8] and L \u2208 [2, 4]; in our experiments in Section 5 we use B = 4 and L = 3."]} +{"13398739|1770055": []} +{"1452734|7360895": ["In a recent and broad overview of the \ufb01eld, Fong et al. (2003) tried to understand the reasons behind the growing interest in socially interactive robotics.", "Prominent research areas include shared (or joint) attention, low-level imitation (that is, reproduction of simple and basic movements), language development and social regulation (for an overview and a taxonomy of socially interactive robots, see Fong et al. (2003))."]} +{"207116476|9928823": ["its ability to handle large amounts of unlabeled data, deep l arning techniques have provided powerful tools to deal with big data analysis [31], [122]."]} +{"207116476|393948": ["It is also shown that a DAE with slight corrupting noises can be regarded as a CAE in which the whole reconstruction function is penalized [11]."]} +{"3418002|1634674": ["Many techniques have been developed for recognizing actions and large benchmark datasets have been proposed, with most of them focusing on full-body actions (Mandary et al, 2015; Takano et al, 2015; Schuldt et al, 2004; Li et al, 2010; Moeslund et al, 2006; Turaga et al, 2008)."]} +{"8957353|6988770": ["L. M\u00f6senlechner is with the Technical University of Munich, 85748 Munich, Germany (e-mail: moesenle@cs.tum.edu)."]} +{"15198166|1452734": ["We adopt a developmental robotics approach [18], [10] to tackle the language acquisition problem."]} +{"14236715|8815923": ["Another line of research has focused on synthesizing grasps using statistical models [5] learned from a database of images [27] or point clouds [9], [15], [46] of objects annotated with grasps from human demonstrators [15], [27] or physical execution [15].", "As computing quality metrics can be time consuming, a common grasp planning method is to store a database of 3D objects labelled with grasps and their quality and to transfer the stored grasps to similar objects at runtime [5], [41]."]} +{"14236715|6988770": ["Potential advantages to using the Cloud include Big Data: access to updated libraries of images, maps, and object/product data; and Parallel Computation: access to grid computing for statistical analysis, machine learning, and planning [22]."]} +{"5240721|8815923": ["This makes the problem of grasping significantly more challenging (Bohg et al., 2014), as the algorithm must use more limited and potentially noisier information to detect a good grasp."]} +{"5240721|118142": ["[53], Bicchi and Kumar [2] and Shimoga [58]."]} +{"8407263|393948": ["[69] Bridging representation learning using neural networks and multimodal categorization using generative models represent important elements in this field.[70]"]} +{"8407263|7400701": ["For example, Weng provided a critical survey on symbolic models and emergent models in artificial intelligence.[22] In our terminology, such symbol models are concerned with internal representation systems."]} +{"10168773|1452734": ["This is one of the biggest differences from artificial systems [23].", "Here, we briefly review the facets of development in the survey by Lungarella et al. [23] from viewpoints of external observation, internal structure, its infrastructure, and social structure, especially focusing on the underlying mechanisms in different forms."]} +{"2403108|4019175": ["A good survey on humanoid dual arm manipulation can be found in [8]."]} +{"2403108|1634674": ["Surveys of the former can be found in [9] and [10]."]} +{"14166810|393948": ["This study shows that the grasp type is a powerful symbolic representation for action understanding, and thus opens new avenues for future research."]} +{"12301567|1452734": ["They are in accordance with the robotics developmental framework, which proposes acquiring new skills on top of old ones by experimentation in the environment [7]."]} +{"206592484|456491": []} +{"4385295|3403798": ["For instance, seeing the handle of a cup, our motor schema that is related to grasping such category of handles will be activated subconsciously even before we recognize the cup\u2019s name [13].", "The focus of [13] is to offer a structured and comprehensive affordance work report from these different fields without giving a critical analysis of existing affordance work in robotics or presenting the open issues and future directions in detail.", "\u2019s [13] survey reports on the most significant evidence of affordances from psychology and neuroscience, and reviews the related work on affordances in robotics."]} +{"4385295|1932843": ["Thus, there is no ambiguity about the action choices and environment uncertainty [108]."]} +{"4385295|7660436": ["A multirobot system is necessary in tasks such as rescue and exploration, where the robots could cooperate both passively and actively [150]."]} +{"4385295|1452734": ["Introducing biology-inspired principles is a good way to endow a robot with developmental capabilities [2].", "A truly autonomous infant robot is believed to be a key criterion in the construction of developmental robots [2]."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} diff --git a/edge/graph_85497999.jsonl b/edge/graph_85497999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40ca3ad97193bf42931e6ca1b2dbceb155a2d9d4 --- /dev/null +++ b/edge/graph_85497999.jsonl @@ -0,0 +1 @@ +{"119138129|85497999": []} diff --git a/edge/graph_85499570.jsonl b/edge/graph_85499570.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb52e0bbabd2e66b6a46039b5663f6a902133a97 --- /dev/null +++ b/edge/graph_85499570.jsonl @@ -0,0 +1,2 @@ +{"114146451|8841611": []} +{"55988706|5660618": []} diff --git a/edge/graph_85499937.jsonl b/edge/graph_85499937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d829589dc91d21b760f27c9a177af3f43f96a01b --- /dev/null +++ b/edge/graph_85499937.jsonl @@ -0,0 +1,26 @@ +{"26667759|14889616": ["Another study [7] compares HAS performance to the performance achieved with the Scalable Video Coding (SVC) extension [8] of H."]} +{"52189206|64404": [", AVC/libx264 [5], HEVC/libx265 [6], VP9/libvpx-vp9 [7], AV1 [8]) for largescale HAS services.", "In this paper, we focus on a practical evaluation of state of the art video codecs (i.e., AVC/libx264 [5], HEVC/libx265 [6], VP9/libvpx-vp9 [7], AV1 [8]) for largescale HAS services.", "The successor of AVC is referred to as High Efficiency Video Coding (HEVC) standard in 2013 [6] and HEVC is able to achieve the same visual quality at approximately half of the bitrate compared to AVC."]} +{"52189206|3540699": [", AVC/libx264 [5], HEVC/libx265 [6], VP9/libvpx-vp9 [7], AV1 [8]) for largescale HAS services.", "The development of the first version of the Advanced Video Coding (AVC) standard was finalized in 2003 by the Joint Video Team (JVT) [5].", "In this paper, we focus on a practical evaluation of state of the art video codecs (i.e., AVC/libx264 [5], HEVC/libx265 [6], VP9/libvpx-vp9 [7], AV1 [8]) for largescale HAS services."]} +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} +{"11561317|64404": ["For further details, the reader is referred to the draft HEVC standard [4], the prior standards [5], [8]\u2013[10], and corresponding books [6], [7], [15] and overview articles [3], [11], [12]."]} +{"11561317|3540699": ["\u2013[4], relative to the coding efficiency characteristics of its major predecessors including H.262/MPEG-2 Video [5]\u2013[7], H.263 [8], MPEG-4 Visual [9], and H.264/MPEG-4 Advanced Video Coding (AVC) [10]\u2013[12].", "For further details, the reader is referred to the draft HEVC standard [4], the prior standards [5], [8]\u2013[10], and corresponding books [6], [7], [15] and overview articles [3], [11], [12]."]} +{"15553965|5122855": []} +{"1466973|64404": ["265 codec.(17) We use this independent and challenging subjective database to compare the performance of the VQA algorithms in predicting the perceptual quality."]} +{"22011446|2261490": ["Moreover, the service quality is most of the time degraded by the poor network conditions and occurrence of congestion in the access network of the Internet Service Providers (ISPs) [2]."]} +{"18220375|16748080": []} +{"18220375|15170341": []} +{"2261490|6581557": ["Traffic collection closer to the end user will provide input for a more accurate estimate of QoE, as discussed also in [85]."]} +{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]} +{"31851714|15170341": []} +{"2150855|5122855": []} +{"23627391|399542": ["These QoS\u2013QoE models were mainly built for voice and video services, which means that they are lacking universal applicability for other services [6].", "Research has shown that raw QoS measurements and the associated KPIs are not necessarily a reliable predictor of QoE [6, 13], which is why modern QoE models focusing on perceptual characteristics of the monitored systems can help at providing a user perspective, based on measurements from the network."]} +{"23627391|2261490": ["In the recent years, a shift from traditional technology-centric QoS models to more holistic user-centric QoE models could be observed [8], although QoS\u2013QoE mapping models", "Since probes may just forward captured information, with the quality calculation happening at a central location, we identify two distinct points [8]: 1) the monitoring point, at which information is collected, and 2) the quality estimation point, at which the information is used to calculate a quality indicator."]} +{"64404|14889616": ["A luma CTB covers a rectangular picture area of L\u00d7L samples of the luma component and the corresponding chroma CTBs cover each L/2\u00d7L/2 samples of each of the two chroma components."]} +{"64404|3540699": ["It is, rather, a plurality of smaller improvements that add up to the significant gain."]} +{"566971|16748080": ["The resulting distorted videos usually exhibit the following typical visual distortions [35]: \u2022 Blocking effect ."]} +{"566971|15170341": ["For example, [32], [69] mainly follow the psychophysical/engineering approach classi\ufb01cation method; [31], [70]\u2013[72] mainly adopt the reference-based clas-si\ufb01cation method, and [47] adopts a combination of the two.", "2) Psychophysical Approach: Objective quality models of the psychophysical approach are based on the features of the HVS, which is related to visual perception, for instance, contrast sensitivity, frequency selectivity, spatial and temporal features, masking effects, and color perception [72]."]} +{"566971|10099297": ["[ 11] and [12] consider both network and application QoS support."]} +{"566971|12130888": ["A survey of user behavior in P2P video system is recently given by [154]."]} +{"30663878|3540699": ["264/AVC, every increase of 6 in QP means a double of quantization step size (QS) [9].", "It should be noted that, in video encoding, QP is used to control the quantization [9] and is considered to be a key factor affecting the video quality."]} +{"23775359|5122855": ["Summarizing, although many research questions on QoE of adaptation have been already tackled in previous research, still many of these questions have remained open or not appropriately resolved due to (i) a limited number of tests conducted to address a question, (ii) shortcomings of the reported studies (such as missing information in the respective publication), or evident limitations in the considered set of test conditions, or (iii) contradictory outcomes with respect to identical research questions [21]."]} +{"42463185|5122855": [", comprehensive surveys are found in [1,3]), there is still a need for dedicated and systematic studies to tackle the impact of resolution adaptation."]} diff --git a/edge/graph_85500300.jsonl b/edge/graph_85500300.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c2fa4167f1572264fa1aa8d13a15dbe891cf862 --- /dev/null +++ b/edge/graph_85500300.jsonl @@ -0,0 +1,79 @@ +{"51882956|22221919": ["In order to further increase the spectral efficiency, non-orthogonalmultiple-access (NOMA) [6] [7] has been developed for realising multi-user communications in the same frequency band at the same time."]} +{"861566|12060835": []} +{"52304067|22221919": ["One of the key technologies to increase the per-cell spectral efficiency is non-orthogonal multiple access (NOMA) which has attracted a considerable attention of researchers [1]."]} +{"52290948|4884302": ["The aim of Q-learning is to obtain a policy (a set of actions) that maximizes the observed rewards over the interaction time [15]."]} +{"3995284|3504276": []} +{"3995284|3055684": []} +{"3995284|12029139": ["Though not explicitly stated this way, this is the design philosophy adopted in the early works on SWIPT, WPCN and WPBC, see e.g. [11]\u2013[18], [22]\u2013[40].", "It has since then been used extensively throughout the WIPT literature, with among others [11]\u2013[18], [22]\u2013[40]."]} +{"26090902|6779551": ["[159] gave a survey, which summarized the security requirements and security attacks of wireless networks, followed by security protocols and algorithms in existing wireless network standards."]} +{"26090902|3453202": ["This attack was investigated in [163] and [168], which wants to send jamming signals to minimize secrecy capacities.", "It is worth mentioning that [163] made a con-"]} +{"26090902|4395259": ["The survey in [158] divided PHY-security issues into two categories: i.", "Finally and most importantly, different from the survey in [158], we discuss the newest precoding techniques in signal processing areas, such as transmit precoding and cooperation schemes in MIMO and relay systems, which are emerging technologies in next generation wireless communications.", "Third, the organization on PHY-security in this paper is different with the survey in [158]."]} +{"26090902|18148591": ["The advancement in wireless technologies has improved communication service quality significantly, by exploring spatial diversities and multiplexing gains with the help of multiantennas technologies [152] or using cooperative strategies with the help of relays [153].", "To further enhance the transmission rates with the constraints of PHY-security, many investigators developed multi-antenna technologies [152], [190] to increase secrecy"]} +{"198168997|22221919": ["The performance gains of NOMA over orthogonal multiple-access (OMA) counterpart in terms of the spectral efficiency, latency, and connectivity have been welldocumented [6]\u2013[9]."]} +{"6909107|18750590": []} +{"6909107|3767252": ["[28] extensively surveys security issues for various edge computing concepts."]} +{"6909107|3055684": ["The paper considers the UE applies dynamic voltage and frequency scaling (DVS) [76] and energy harvesting techniques [77] to minimize the energy consumption during the local execution and a power control optimizing data transmission for the computation offloading."]} +{"6909107|3042864": ["[3] survey MCC application models and highlight their advantages and shortcomings.", "The computation offloading, and partial offloading in particular, is a very complex process affected by different factors, such as users preferences, radio and backhaul connection quality, UE capabilities, or cloud capabilities and availability [3].", "Nevertheless, in the conventional MCC, the cloud services are accessed via the Internet connection [3] while in the case of the edge computing, the computing/storage resources are supposed to be in proximity of the UEs (in sense of network topology)."]} +{"5779923|22221919": ["INTRODUCTION RECENTLY non-orthogonal multiple access (NOMA) has received significant attention as a main enabling technique for future wireless networks [2]\u2013[4]."]} +{"3021451|15453366": ["2520912 challenge of bandwidth shortage [1]\u2013[3]."]} +{"59222846|10299098": ["\u2022 Intelligent Computation Offloading: Mobile-edge computing (MEC) is a promising technique of meeting the ever-increasing computational demands of mobile applications by providing computing capabilities at the edge of wireless networks, meanwhile migrating the computationally-intensive tasks to the MEC server [15]."]} +{"150333780|22221919": ["N ON-ORTHOGONAL multiple access (NOMA) is a key enabler for spectrally ef\ufb01cient wireless communications in the \ufb01fth-generation (5G) cellular networks [3]\u2013[5].", "Hence, NOMA has been mainly exploited to improve user fairness [3]\u2013[5], [8]\u2013[11]."]} +{"3476431|8323234": ["In this case, DOA and DOD could be different by a small value, which could nevertheless be compensated for via beaming sweeping method within a small region [46]."]} +{"49190231|3270620": ["Intuitively, compared to the natural broadcast in conventional NOMA schemes considered in microwave frequency bands [5], [6], the proposed multi-beam NOMA scheme generates multiple non-overlapped virtual tunnels in the beam-domain and broadcast within the tunnels for downlink NOMA transmission.", "Specifically, apart from the power domain multiplexing in conventional NOMA schemes [5], [6], the proposed multi-beam NOMA scheme further exploits the beam-domain for efficient multi-user multiplexing.", "Since superposition transmission is utilized within a NOMA group, SIC decoding will be performed at the strong users as commonly adopted in traditional downlink NOMA protocol [6]."]} +{"53280713|22221919": ["This power domain feature provides rich opportunities for NOMA to support massive connectivity and meet the users\u2019 diverse quality of service (QoS) requirements [2]."]} +{"4940005|3504276": ["In contrast, the concept of energy cooperation protocol has been proposed [5], [12] so that the near user directly shares its excessive energy with far users via (orthogonal) out-of-band channels, instead of information forwarding."]} +{"4940005|3055684": []} +{"4940005|12029139": ["To enable reliable and self-sustainable wireless networks for fifth generation (5G) cellular systems, such as the Internet-of-things (IoT), energy harvesting technologies [1]\u2013[3] have recently drawn significant attention in both academia and industry."]} +{"4940005|12060835": ["user has a supercapacitor as an energy storage to accumulate the energy harvested from the environment, but no external power supply [14]."]} +{"86819316|22221919": ["Benefiting from successive interference cancellation (SIC), the signals with different power can be distinguished by receivers, which allows multiple users to share the same non-orthogonal radio resources, such as the frequency band, the time slot and the spreading code [6]."]} +{"86819316|6779551": ["Due to the broadcast nature of radio propagation, wireless communication is vulnerable to be eavesdropped [10]."]} +{"3593591|22221919": ["NOMA has a higher information-theoretic rate region than orthogonal techniques albeit, which is achieved by increasing the receiver\u2019s implementation complexity [4].", "Cognitive radio (CR) and non-orthogonal multiple access (NOMA) constitute promising techniques of achieving high SE [2]\u2013[4]."]} +{"3593591|12029139": ["One of the categories focuses on the techniques that can achieve high energy efficiency (EE) [8], [9], while the other one aims for recycling energy, where both wireless charging as well as simultaneous wireless information and power transfer (SWIPT) [10] fit."]} +{"4952202|3270620": []} +{"67865730|206578365": [", and has attached many research attention from both academia and industry [1]."]} +{"5041734|3270620": ["Apart from the power domain multiplexing in conventional NOMA schemes [11], the proposed multi-beam NOMA scheme further exploit the beam-domain for efficient multi-user multiplexing.", "Recently, NOMA has drawn a significant amount of attention as a promising multiple access technique for 5G [8], [10], [11]."]} +{"19941456|21418": ["2799947 which enables energy harvesting from ambient radio frequency (RF) signals, is envisioned as a promising solution for powering massive IoT devices [2]."]} +{"19941456|3504276": ["The reference distance is 1 meter and the maximum service distance is 5 meters [9].", "We note that the \u201cdoubly near-far phenomenon\u201d [3] can be avoided by using separated PB and AP as in our model [4], [9]."]} +{"9908792|12029139": ["Radio frequency energy harvesting (EH) has been considered as a promising candidate to fulfill the energy demands in the energy constrained networks and to avoid/minimize human intervention for replacing the batteries in traditional networks [1]."]} +{"3055684|12060835": []} +{"49297644|22221919": ["Additional references on the NOMA scheme can be found in [26] and [27]."]} +{"49297644|10979806": ["Hence, several studies in the literature considered energy efficiency as a compelling performance metric to design optimal resource allocation strategies for future wireless networks [17]."]} +{"49297644|3055684": ["In recent years, numerous studies in the literature have provided concrete theoretical frameworks and promising numerical results on wireless power transfer and energy harvesting (see [1]\u2013[3] and references therein)."]} +{"67866649|52954708": []} +{"67866649|20384442": ["INTRODUCTION Non-orthogonal multiple access (NOMA) is an effective solution to accommodate the data traffic in 5G networks due to its spectrum-efficiency [1]\u2013[6] and has stimulated the upsurge of interest from both academia and industry [7]\u2013[16]."]} +{"67866649|22221919": ["Thus, NOMA system is more spectrum-efficient than conventional OMA system especially when one of the NOMA users is far away from the base station (BS) [3]."]} +{"56594534|22221919": ["In contrast to [3]\u2013[8], the joint detrimental effects of intra-cluster pilot contamination, inter-cluster interference, and imperfect SIC are investigated.", "To this end, non-orthogonal multiple-access (NOMA) can be exploited to meet the conflicting demands on high spectral/energy efficiency, massive connectivity with low latency, and high reliability with user-fairness of next-generation wireless standards [3]."]} +{"4403493|26259297": ["Hence, a sophisticated channel tracking method for hybrid mmWave massive MIMO is still waiting for investigation [26]."]} +{"4403493|8323234": ["Nevertheless, the length of the pilot sequence for beam training is equal to BMax, which is much smaller than that required by the conventional beam cycling method [19].", "1) Initialization: In the beginning of the transmission, we use the conventional beam cycling method [19] that trains beams in all directions to derive the prior CSI hk(m) and DOA \u03b8 (0) k (m) of each user.", "However, all these methods transmit signals to the direction of a single selected beam, which brings the power leakage issue [19]\u2013[21].", "For system with limited number of RF chains, a beam training method was provided in [19], which spends significant resources to train the beam in all directions and suffers from large computation complexity."]} +{"52302250|85500300": []} +{"4952402|22221919": ["INTRODUCTION NON-ORTHOGONAL multiple access (NOMA) is viewed as a key enabling technology in next-generation wireless networks due to its superior spectral efficiency [1]."]} +{"4952402|3042864": ["This paper focuses on the coexistence of NOMA and mobile-edge computing (MEC) which is another important communication technique for future wireless networks [13], [14]."]} +{"10742168|12060835": []} +{"21473252|22221919": ["user k\u2019s task-bearing signal with unit power for of\ufb02oading, i.e., E[|xk|2] = 1, and pk > 0 denote the corresponding transmit power, k \u2208K. The received signal y \u2208CN\u00d71 at the BS is then expressed as [25] y = XK k=1 \u221a pkhkxk +z, (3) where hk \u2208CN\u00d71 denotes the uplink channel vector from user k to the BS and z \u2208CN\u00d71 denotes the additive white Gaussian noise at the BS, which is normalized to be of unit p"]} +{"21473252|6909107": []} +{"21473252|206578365": []} +{"199442077|167217274": ["The solutions developed for the MIMOME has appeared to be instrumental in designing transmit strategies that maximize secrecy rate of extensions of this basic channel model to MIMO channels with multiple eavesdroppers [12], secure relaying [17], [18], ergodic secrecy rate [19], finite alphabet signaling [20]\u2013[22], multiple access, broadcast, and interference channels [23]\u2013[26], non-orthogonal multiple access channel [27], cognitive radio [28], visible light communication [29], and simultaneous wireless information and power transfer [30]\u2013[32]"]} +{"199442077|3345556": ["Many solutions developed for the MIMOME has appeared to be instrumental in designing transmit strategies that maximize the secrecy rate of extensions of this basic channel model to MIMO channels with multiple eavesdroppers [16], secure relaying [24], [25], ergodic secrecy rate [26], finite alphabet signaling [27]\u2013[29], artificial noise [30] and cooperative jammer [31], among others."]} +{"3173599|8909218": ["Heterogeneous networks, or HetNets, have been one of the most active research areas in cellular standards bodies in the last five years [45], [48], [67], [68], with the main focus being intercell interference coordination and load balancing."]} +{"54448190|3055684": []} +{"57763941|22221919": ["Then, higher power levels are allocated for the SUs with lower channel strengths yielding \u03b7Sn1 \u2264 \u00b7 \u00b7 \u00b7 \u2264 \u03b7Snk \u2264 \u00b7 \u00b7 \u00b7 \u2264 \u03b7SnK [1].", "INTRODUCTION NON-ORTHOGONAL multiple-access (NOMA) has been identified as a key prospective multiple-access technology [1].", "In order to adopt power-domain NOMA, the SUs in the nth cluster are assumed to be ordered based on the effective channel strengths as follows [1]: |gn1\u0175Sn |(2) \u2265 \u00b7 \u00b7 \u00b7 \u2265 |gnk\u0175Sn |(2) \u2265 \u00b7 \u00b7 \u00b7 \u2265 |gnK\u0175Sn |(2), (18) which can be simplified by using the statistical channel knowledge at the SUs via channel hardening of massive MIMO as \u03b6gn1 \u2265 \u00b7 \u00b7 \u00b7 \u2265 \u03b6gnk \u2265 \u00b7 \u00b7 \u00b7 \u2265 \u03b6gnK .", "(19) Then, higher power levels are allocated for the SUs with lower channel strengths yielding \u03b7Sn1 \u2264 \u00b7 \u00b7 \u00b7 \u2264 \u03b7Snk \u2264 \u00b7 \u00b7 \u00b7 \u2264 \u03b7SnK [1].", "SUnk treats the signals from SUnj for \u2200j < k as interference [1]."]} +{"12373066|3270620": ["Different from orthogonal multiple access (OMA) schemes, NOMA allows multiple users to occupy the same channel, whereas multi-user detection methods, such as successive interference cancellation (SIC) are used to decode users\u2019 messages [9]."]} +{"61808169|22221919": ["The power-domain NOMA (PDNOMA) is a well-known and promising SC-NOMA technique [7], in which multiple users are multiplexed with different transmit power levels in the same frequency RE and successive interference cancelation (SIC) is employed at the receiver ends"]} +{"61808169|3270620": ["The nonorthogonal multiple access (NOMA) technique, which allows multiple users to share the same time-frequency resource element (RE), has been recognized as the potential multiple access technique to achieve higher SE in future fifth generation (5G) and beyond wireless networks [3]."]} +{"61808169|12029139": ["Motivated by the progress in the research on wireless power transfer (WPT) [13] and the fact that the radio frequency (RF) signal is the carrier of both information and energy, an advanced technology namely simultaneous wireless information and power transfer (SWIPT) has been identified to meet the demanding requirements in future wireless networks in [14].", "viewed as a potential energy-efficient solution for 5G and beyond wireless networks [13] and a great deal of research has been carried out on the application of SWIPT technology in different systems, including OFDMA systems [16], multipleinput single-output (MISO) systems [17], [18], multiple-input multiple-output (MIMO) systems [19], heterogenous cellular", "Motivated by the progress in the research on wireless power transfer (WPT) [13] and the fact that the radio frequency (RF) signal is the carrier of both information and energy, an advanced technology namely simultaneous wireless information and power"]} +{"52004272|22221919": []} +{"52004272|6779551": []} +{"52004272|4395259": []} +{"34106103|4395259": ["Physical layer security has attracted widespread attention as a means of augmenting wireless security [2].", ", via beamforming or artificial noise injection [2], to support and supplement existing cryptographic protocols."]} +{"86655956|3270620": ["One can refer to the survey in [11]\u2013[13] for more details.", "multiple users to share the same degree of freedom via power domain multiplexing at transmitter side and utilizing the successive interference cancelation (SIC) technique at receiver side to retrieve the messages of multiple users [11]\u2013[13]."]} +{"70332965|22221919": ["To circumvent this challenge, non-orthogonal multiple access (NOMA) has recently been proposed as a promising multiple access scheme, which can achieve high spectral efficiency and users\u2019 fairness [8]."]} +{"70332965|8909218": ["DUE to the exponentially ever-increasing demand of mobile data service, the radio frequency (RF) wireless networks gradually reach the limit of the spectrum usage [1]."]} +{"202689405|52059869": ["By abstracting all physical base stations (BSs) in a geographical area as a logical big BS, the software-defined networking (SDN) concept provides infrastructure flexibility as well as service-oriented customization [10], [11], and hence simplifies the management of a dense RAN [12]\u2013[14]."]} +{"202689405|206578365": []} +{"202689405|4269723": ["By abstracting all physical base stations (BSs) in a geographical area as a logical big BS, the software-defined networking (SDN) concept provides infrastructure flexibility as well as service-oriented customization [10], [11], and hence simplifies the management of a dense RAN [12]\u2013[14]."]} +{"139100777|22221919": ["In order to meet extremely high data rate requirements, non-orthogonal multiple access (NOMA) has been considered as another promising technology in the next generation of wireless communications, due to its superior spectrum efficiency [2\u20134]."]} +{"139100777|6909107": ["\u03b21 \u2208 [0, 1], \u03b22 \u2208 [0, 1], (18b) 0 \u2264 p1 \u2264 Pmax, 0 \u2264 p2 \u2264 Pmax, (18c) \u03ba1(1\u2212 \u03b21)L1C1(f loc 1 ) 2 + \u03b21L1 + \u03b22L2 log2(1 + |h1| p1 + |h2|p2) p1 \u2264 Emax, (18d) \u03ba2(1\u2212 \u03b22)L2C2(f loc 2 ) 2 + \u03b21L1 + \u03b22L2 log2(1 + |h1| p1 + |h2|p2) p2 \u2264 Emax (18e) (1\u2212 \u03b21)L1C1 f loc 1 = \u03b21L1 + \u03b22L2 log2(1 + |h1| p1 + |h2|p2) (18f) (1\u2212 \u03b22)L2C2 f loc 2 = \u03b21L1 + \u03b22L2 log2(1 + |h1| p1 + |h2|p2) (18g) \u03b21L1 log2(1 + |h1| p1) = \u03b21L1 + \u03b22L2 log2(1 + |h1| p1 + |h2|p2) .", "\u03b2m \u2208 [0, 1], \u2200m, (13b) 0 \u2264 pm \u2264 Pmax, \u2200m, (13c) Em \u2264 Emax, \u2200m.", "INTRODUCTION Driven by the explosive emergence of new compute-intensive applications in the Internet of things (IoT), especially ultra-low-latency applications, such as virtual reality (VR) and augmented reality (AR), mobile edge computing (MEC) was proposed to enhance the computing capability of the mobile devices [1].", "01 W, and the effective capacitance coefficient for each CUP cycle of the local users are \u03bam = 10 \u221228 \u00d7 [10, 1].", "10[10, 1]."]} +{"139100777|206578365": ["Due to the enhancement of computational capacity, MEC has been regarded as a key technology for the next generation of networks [8]."]} +{"49865492|22221919": ["Both non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) have been recognized as important techniques in future wireless networks [1], [2]."]} +{"49865492|3042864": ["Both non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) have been recognized as important techniques in future wireless networks [1], [2]."]} +{"51886568|4884302": ["It is worth noting that the most important property of DL is that it can automatically find compact low-dimensional representations/features of high dimensional data [5, 6], which can be demonstrated by the following two examples."]} diff --git a/edge/graph_85500314.jsonl b/edge/graph_85500314.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79aa475e47f0127b7b1ab226ca182d205db02d44 --- /dev/null +++ b/edge/graph_85500314.jsonl @@ -0,0 +1,3 @@ +{"691081|192934": []} +{"50117070|17516538": ["For surveys on visual tracking of objects, we refer the interested reader to [92, 226]."]} +{"60701039|12127129": []} diff --git a/edge/graph_85501419.jsonl b/edge/graph_85501419.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca9efb13c3add1169c2efa6c8c0ef08c9f55c879 --- /dev/null +++ b/edge/graph_85501419.jsonl @@ -0,0 +1,10 @@ +{"5181758|6337591": []} +{"171437|1452734": ["\u2026also known as epigenetic robotics, or autonomous mental development methodology, is a novel approach to the study of cognitive robots that takes direct inspiration from developmental mechanisms and phenomena studied in children (Lungarella et al. 2003; Cangelosi and Riga 2006; Weng et al. 2001).", "These milestones provide a possible set of cognitive robotics goals and test-scenarios, thus acting as a research roadmap for future work on cognitive developmental robotics."]} +{"34295603|8760041": []} +{"34295603|7774517": []} +{"34295603|3330313": []} +{"34295603|1452734": ["\u2026learning researchers call \u201cautonomous mental development\u201d (Weng et al. 2001), \u201cepigenetic robotics\u201d (Prince et al. 2001), or \u201cdevelopmental robotics\u201d (Lungarella et al. 2003), approaches aiming to develop analogs of the developmental processes that prepare animals over long time periods for a\u2026", "2001), or \u201cdevelopmental robotics\u201d (Lungarella et al. 2003), approaches aiming to develop analogs of the developmental processes that prepare animals over long time periods for a wide range of later challenges."]} +{"34295603|1708582": []} +{"11113103|14997956": []} +{"3039491|1452734": ["[37]) will be in our focus as well as parental behavior with regard to the development of preverbal, early verbal (12\u201323 months) and verbal stage (24\u201330 months) children."]} +{"13363604|1452734": []} diff --git a/edge/graph_85501720.jsonl b/edge/graph_85501720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..68f059e029027e5f150e8e5253880c11e21486f7 --- /dev/null +++ b/edge/graph_85501720.jsonl @@ -0,0 +1,7 @@ +{"125844568|34263386": ["It is cheaper than hardware-based ones and is easy to update for future adaption [3], [9], [10]."]} +{"18632015|192934": ["Here we select three strategies to decide one certain matching is successfully or not: separated rule, product rule and sum rule (Jain et al., 2000)."]} +{"18779850|5313655": ["Biometric cryptosystems and cancelable biometrics are two main categories of biometric template protection [10]."]} +{"18308933|15898213": []} +{"10939870|5313655": []} +{"2739084|5313655": []} +{"45236936|5313655": ["Popular key binding biometric cryptosystems are fuzzy commitment and fuzzy vault [2].", "Biometric systems are compromised in several ways [2], one way is the leakage of biometric template information."]} diff --git a/edge/graph_85517646.jsonl b/edge/graph_85517646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e44560c2c58c2a2965fdc2129d57686e8b2f458 --- /dev/null +++ b/edge/graph_85517646.jsonl @@ -0,0 +1,20 @@ +{"7287448|17516538": ["The majority of methods and databases found in the literature use a single camera positioned with specific orientations with respect to the subject\u2019s walking direction (generally capturing the walk from the lateral view) and a large number of papers for gait recognition have been published [19, 33]."]} +{"13874338|7788290": ["There have been some allied studies such as biomechanics [21], physical medicine studies for therapy [38], psychological studies [37], and approaches aiming to model and track a human through an image sequence, though usually not for recognition [17], [25], [2], [15].", "There has been a rich amount of work on human modeling and tracking [17], [25].", "VISUAL analysis of human motion [17], [25] attempts to detect, track, and identify people, and, more generally, to understand human behaviors from image sequences involving humans."]} +{"13303558|12663580": ["As expected, the RBF kernel produces better results as it normally reigned over Poly kernel [28]."]} +{"14297649|53680608": ["Many of the goals are tracking the moving objects or recovering the 3D objects (Aggarwal and Nandhakumar , 1986) using optical flow or feature correspondence .", "Many of the goals are tracking the moving objects or recovering the 3D objects (Aggarwal and Nandhakumar, 1986) using optical flow or feature correspondence."]} +{"7693282|14970359": ["A more recent, extensive survey [10] looks at more than 130 publications in computer vision-based human motion analysis and classifies them based on the issues addressed: Initialization (eight publications), tracking (48 publications), pose estimation (64 publications), and recognition (16\u2026"]} +{"7693282|7788290": []} +{"1863679|7788290": ["Although there is a rich body of work describing vision systems to deal with human detection, tracking, and action recognition [ 23 ], [51], computer vision researchers have only recently begun to investigate gait as a biometric feature.", "There is a great deal of related studies on gait, including physical medical studies [33]\u2013[35], psychology [29], [42], and approaches aiming to model human body and to track human motion [21], [ 23 ], [39], [51]."]} +{"40344471|11042075": []} +{"4646924|11042075": []} +{"8617062|11042075": []} +{"13374207|17516538": ["Keywords: Gait, silhouette, Fourier descriptor, histogram matching, dynamic time warping, Krawtchouk moments."]} +{"42902871|17516538": ["It has drawn extensive attention in recent years because of the demands of video-based intelligent security surveillance system [1]."]} +{"32645968|5401262": []} +{"32645968|17516538": []} +{"32645968|987239": []} +{"32645968|14970359": []} +{"32645968|7185733": []} +{"32645968|192934": []} +{"32645968|7788290": []} +{"17438403|12127129": ["There are many methods developed to detect moving objects, in which background subtraction techniques [12] are appropriate for integrating into real-time systems.", "The foreground extraction stage is performed using a combination of the Running Gaussian Average [12] and Frame Di\ufb00erence algorithms [6]."]} diff --git a/edge/graph_85521387.jsonl b/edge/graph_85521387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3b4ff83c28cb69d2b56f1078331f945c61e3612 --- /dev/null +++ b/edge/graph_85521387.jsonl @@ -0,0 +1,3 @@ +{"108449635|485843": []} +{"110492850|18037424": []} +{"114422332|26257441": []} diff --git a/edge/graph_85529029.jsonl b/edge/graph_85529029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e8134b7415e3f307cff6c0f94cd32cc51917de6 --- /dev/null +++ b/edge/graph_85529029.jsonl @@ -0,0 +1 @@ +{"88520149|3330313": []} diff --git a/edge/graph_85529387.jsonl b/edge/graph_85529387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5520f8a6d19fc689b2c5821a3b500cd77591eb2a --- /dev/null +++ b/edge/graph_85529387.jsonl @@ -0,0 +1,3 @@ +{"11209846|17381415": []} +{"11209846|12083425": []} +{"10068070|6875365": []} diff --git a/edge/graph_85530022.jsonl b/edge/graph_85530022.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_85530624.jsonl b/edge/graph_85530624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_85531295.jsonl b/edge/graph_85531295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..345bf9345f1684b463a4e258d1f77b52a994c60f --- /dev/null +++ b/edge/graph_85531295.jsonl @@ -0,0 +1,14 @@ +{"49865868|393948": ["Self-supervised learning is a novel machine learning paradigm that has been employed in different fields, such as representation learning [3] and natural language processing [31]."]} +{"1033682|174797842": []} +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} +{"187547|393948": ["There is a rich literature in unsupervised learning of visual representations [5]."]} +{"784912|359842": ["Different Types of Attributes Papers User-defined attributes [32], [9][11][42], [43][18], [33], [34], [35], [36], [37][40][18][38], [39][44] Relative attributes [21][48][24][46], [47][22][45] Data-driven attributes [50][51][12], [17][11], [13][17][52] Video attributes [53][54][53][55][56], [57][58][59]", ", age and gender) [38], [39], product attributes (e."]} +{"16852518|15782139": ["Handwriting recognition has also been widely addressed by both academia and industry [3]."]} +{"1637703|393948": ["Another worthwhile direction of future research is to revisit active vision [2]."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"9348728|1078272": ["As it is beyond the scope of this paper, we refer the reader to [53] for a survey on action recognition, and [54] for a survey on pose estimation."]} +{"14020873|393948": ["[6] have considered this problem by proposing a theoretical framework to learn irreducible representations having both invariances and equiv-ariances, coming up with the best representation for any given task is an open question."]} +{"46798026|393948": ["It has been suggested that learning a disentangled representation of the data generative factors can be useful for a large variety of tasks and domains (Bengio et al., 2013).", "A disentangled representation can be de\ufb01ned as one where single latent units are sensitive to changes in single generative factors, while being relatively invariant to changes in other factors (Bengio et al., 2013).", "Having a representation that is well suited to the particular task and data domain can signi\ufb01cantly improve the learning success and robustness of the chosen model (Bengio et al., 2013).", "Learning a disentangled posterior distribution of the generative factors of the observed unsupervised sensory input is a major challenge in AI research (Bengio et al., 2013; Lake et al., 2016)."]} +{"3380833|393948": ["While there is no canonical definition for this term, we adopt the one due to Bengio et al. (2013): a representation where a change in one dimension corresponds to a change in one factor of variation, while being relatively invariant to changes in other factors.", "While there is no canonical definition for this term, we adopt the following definition: a representation where a change in one dimension corresponds to a change in one factor of variation, while being relatively invariant to change in other factors [3]."]} +{"17868098|7491882": ["the estimation of BRDFs); see [26] for a review."]} +{"556999|393948": ["Deep neural networks learn nonlinear representations that disentangle and hide different explanatory factors of variation behind data samples (Bengio et al., 2013)."]} diff --git a/edge/graph_85538733.jsonl b/edge/graph_85538733.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a77818afd9c1d1d70fe2488e7f0aaf616a4eb8ea --- /dev/null +++ b/edge/graph_85538733.jsonl @@ -0,0 +1,17 @@ +{"2459394|1230643": ["Past decade has been very fruitful in the development and application of several standards for mobile, nomadic and fixed wireless networks related with sensors [5], [6], [7]."]} +{"62133403|11262595": ["Tikk et al. (2003) studied the approximation behavior of soft computing techniques."]} +{"89753727|1230643": []} +{"58891512|8569776": ["The sensitive spectral band of thermography is 3-14 \u03bcm, and the most common wavelengths are 3-5 \u03bcm and 7-14 \u03bcm([13])."]} +{"11299551|1236072": []} +{"11299551|1230643": ["However, it does have several additional deficiencies, including implosion, overlap and resource blindness [6]."]} +{"46935949|8665024": []} +{"46935949|21683864": []} +{"46935949|9588126": ["Secondly, Agents could improve the flexibility of the system, because agents are able to play different roles with their own functions [43-45]."]} +{"35527659|1503157": []} +{"1503157|2762484": ["In the next years, the lowering cost of WST will provide the opportunity to track and trace not only large and expensive products, but small and cheap ones, creating a new generation of intelligence products [92]."]} +{"1503157|6275330": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "strain-gage, and various piezo and capacitive transducers for proximity, position, velocity, acceleration and vibration measurements [20]; and according to several research works, connecting wires to these devices can be more problematic than doing it by means of wireless designs [21,22]."]} +{"1503157|1230643": ["Wireless sensors further decrease wiring needs, providing new opportunities for distributedintelligence architectures [2,10,20].", "A WSN is a system comprised of radio frequency (RF) transceivers, sensors, microcontrollers and power sources [10].", "A general WSN protocol consists of the application layer, transport layer, network layer, data link layer, physical layer, power management plane, mobility management plane and the task management plane [10].", "Normally, these sensor nodes consist of three components: sensing, processing and communicating [10].", "Sensor networks are used for a variety of applications, including wireless data acquisition, machine monitoring and maintenance, smart buildings and highways, environmental monitoring, site security, automated on-site tracking of expensive materials, safety management, and in many other areas [10].", "02 dB/km for a rain rate of 150 mm/hr [10]."]} +{"11599392|1230643": ["A recent survey [1] of the advances in wireless sensor network applications has reviewed a wide range of applications for these networks and identified agriculture as a potential area of deployment together with a review of the factors influencing the design of sensor networks for this application."]} +{"13640569|1708582": ["The agent aims to select actions that maximise its total reward on the way from the initial to the goal state [85].", "Most applications of RL have been in robotics and game playing [85], where RL creates new behaviour rather than modelling existing behaviour."]} +{"13203014|1598350": ["In the survey [7], the author reviewed many IoT solutions from context-aware computing perspective into five different categories: smart wearable, smart home, smart city, smart environment, and smart enterprise."]} +{"15973274|8569776": ["Also modelling and data processing are challenging when working with 3D imaging (Li et al., 2014).", "A range of fully automated systems for high-throughput phenotyping based on non-destructive measurements in greenhouses and growth chambers are now operating at different institutions around the world (Furbank and Tester, 2011; Fiorani and Schurr, 2013; Araus and Cairns, 2014; Chen et al., 2014; Li et al., 2014; Neilson et al., 2015) where large-scale testing of plant genotypes under different controlled environments and treatments is carried out.", "\u2026as X-ray and magnetic resonance imaging (MRI) systems, is a technology under development for plant phenotyping, and is suitable to study internal structures of plants, roots, and soils (Li et\u00a0 al., 2014), and MRI also has great potential for studying dynamics of metabolites (Borisjuk et\u00a0al., 2012).", "What is common for the testing facilities though is that experimental protocols often are limited to rosette plants and the main cereal species (Li et\u00a0 al., 2014; Neilson et\u00a0 al., 2015).", "All technologies listed in Table 1 have the potential for high-resolution sensing and imaging, enabling a multidimensional approach towards non-invasive phenotyping (Li et al., 2014).", "A number of reviews about the status and technique of phenotyping roots and the canopy in greenhouses, semi-field, and field have been published recently (Furbank and Tester, 2011; Fiorani et al., 2012; Fiorani and Schurr, 2013; Araus and Cairns, 2014; Li et al., 2014)."]} diff --git a/edge/graph_85542381.jsonl b/edge/graph_85542381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d6ff5b206d131a49a33e67d28a91faf0c09a324 --- /dev/null +++ b/edge/graph_85542381.jsonl @@ -0,0 +1,2 @@ +{"195702260|10500613": []} +{"195702260|913718": []} diff --git a/edge/graph_85542537.jsonl b/edge/graph_85542537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..802797ea1f37e95414465175afd644a251ed3e75 --- /dev/null +++ b/edge/graph_85542537.jsonl @@ -0,0 +1,6 @@ +{"13264307|62040085": ["The presence of mandatory metadata leads to another drawback of content-based RSs: if items do not contain any metadata initially (music, video), it is necessary to explicitly define it [10].", "Therefore one of the main advantages of content-based RSs is that the user\u2019s unique taste is not smoothed by preferences of people from like-minded groups [10]."]} +{"55314987|1805048": ["Conventional recommendation techniques, contentbased filtering and collaborative filtering [6], fo r instance, are particularly well suited for the recommendation of quality and taste products such as books, movies, or pop music."]} +{"6030672|8777381": ["In contrast with these pragmatic phenomena, which may be relatively contextualised or short-lived, personality is usually considered to be a longer term, more stable, aspect of individuals (Scherer, 2003).", "The model has also been useful in identifying observable cues that mediate convergences between judgments of latent attributes and more direct measures of those attributes (Scherer, 2003; Heinrich & Borkenau, 1998)."]} +{"8202591|4411601": ["about research paper recommender systems, and in 2013 alone, an estimated 30 new articles are expected to appear in this field (Figure 1) [8].", "Research indicates that offline evaluations and user studies sometimes contradict each other [7,8,13].", "Initial comparisons of user studies and offline evaluations, in the field of research paper recommender systems, were mostly not very sound because user studies contained relatively few participants [8].", "However, we found that most approaches are only evaluated with offline evaluations [8], rendering the results one-sided.", "Alternatively, a user study can collect qualitative feedback, but because this approach is rarely used for recommender system evaluations [8], we will not", "Figure 1: Published papers per year about research paper recommender systems [8]"]} +{"7302064|14148655": ["recommender systems are case-based [15, 19, 45]."]} +{"133329139|13392386": ["The fitness between users and items is determined by the similarity in a metric space, which is calculated by extracting features of users and items by using statistical techniques [4]."]} diff --git a/edge/graph_85542892.jsonl b/edge/graph_85542892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67cd5b4984554a7aed8be76808f72cf8dc193be4 --- /dev/null +++ b/edge/graph_85542892.jsonl @@ -0,0 +1,24 @@ +{"2970543|38911919": []} +{"67868067|28965631": ["According to [3], two methods of adjusting the rate of beaconing, including \ufb01xed and dynamic beacon rates, are perceivable.", "Bouk et al. [3] also present a review of hybrid adaptive beaconing."]} +{"67868067|2335874": ["A comprehensive survey of beaconing approach in VANET is proposed in [18]."]} +{"49323039|38911919": []} +{"16640429|12815020": []} +{"206741247|2335874": ["In addition, the MObility model generator for VEhicular network (MOVE) was used to convert the mobility model generated by SUMO to an acceptable scenario for NS2 [65]."]} +{"37965923|1236072": []} +{"52298990|1116024": ["Several recent surveys consider VANETs from the specialized perspectives of routing [9], security [10], new technologies [11], and cloud-based approaches for VANET [12] [13]."]} +{"3558507|16621677": ["on computer system [4], [5] and take advantage of the collaborative nature of the VANETs and design a system architecture of a distributed machine-learning based CIDS over a VANET."]} +{"3433776|206578224": ["A recent survey on the emerging 5G network edge cloud architecture can be found from [17]."]} +{"3433776|38911919": ["A survey on clustering technologies is provided in [3]."]} +{"6774758|1762301": ["Thus, the maintenance and the construction of routing tables in topology based routing algorithms, becomes harder to realize, specially in proactive algorithms that reconstruct periodically the whole routing table [Abolhasan et al. 2004]."]} +{"9227908|205286988": ["It contains seven major steps, and the complete description of every phase is summarized in this subsection [18-19].", "In some existing protocols [19], nodes route message through intermediate nodes instead of direction communication through cluster head."]} +{"13681219|84832337": ["Source Address Destination Address Hop Count Type VM Intermediate Node Address stack Address[1] Address[2] .", "VANETs provide communication services between nearby vehicles and between vehicles and roadside infrastructure, using a dedicated short range communication (DSRC) [1, 2].", "The format of the requestAnt and replyAnt is illustrated below and contains the following fields:\nSource Address Destination Address\nHop Count Type VM Intermediate Node Address stack\nAddress[1] Address[2]\n. . .\nSource address and destination address refer to the addresses of the source and destination nodes, respectively."]} +{"48364286|206578365": ["Thus, MEC has the potential to provide low-latency services, to save energy for mobile users, and to achieve high security [2].", "These services normally require a massive number of size-constrained and low-power mobile devices to perform computation-intensive and latency-sensitive tasks [2].", "Recently, MEC has received an ever-increasing level of attention from industry and academia since it can significantly improve the computation capability of mobile devices in a cost-effective and energy-saving manner [2].", "Mobile edge computing (MEC) and wireless power transfer (WPT) have been deemed two promising technologies to tackle the above mentioned challenges [2]\u2013[4]."]} +{"48364286|22833814": ["Furthermore, UAV-assisted architectures can provide flexible deployment and low operational costs, and are particularly helpful in the situations that the conventional communication systems are destroyed by natural disasters [26]\u2013[32].", "Similar to [27]\u2013[32], it is assumed that the wireless channel between the UAV and each user is dominated by LOS."]} +{"48364286|12029139": ["On the other hand, WPT can provide low-power mobile devices with sustainable and cost-effective energy supply by using radio-frequency (RF) signals [3]."]} +{"49190401|21418": ["Therefore, how to prolong the flying time of energy-constraint UAV while guaranteeing the required quality-of-service (QoS) of SNs is of great meaning, it is also the requirement for sustainable green 5G Networks [6]."]} +{"33940900|11206792": []} +{"12507534|38911919": ["Clustering or Backbone-Based approaches A recent survey on the VANET clustering techniques can be found in [9].", "Different techniques have been proposed to address the V2V routing problem, such as QoS-aware routing [4], opportunistic routing [5], street-centric approach [6], RSU controlled approach [7], geographical routing [8] or clustering [9]\u2013[12]."]} +{"2622715|2758659": ["Routing protocols can be classified into the five categories detailed below [1\u201310]."]} +{"31528031|35867035": ["On the other hand, the LTE Advanced standard is characterized by very relevant and advanced system features, as compared with other systems that meets the requirements of the International Mobile Telecommunications Advanced project for fourth-generation (4G) cellular systems [4]."]} +{"14451080|9104850": ["Depending on user Web access patterns and network topology, the Web caching strategies aim to find the best place for Web proxies on the network and allow the proxies to cache popular contents for reducing user access latency and the amount of Internet access traffic [18]."]} +{"24962838|3775239": ["First, the driving style recognition (DSR) algorithm is used to identify the driver and classify it within a continuous index into calm, normal and aggressive clusters [51], [52]."]} diff --git a/edge/graph_85564408.jsonl b/edge/graph_85564408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..484e17ae927f0375c0676db764c129462d6706ac --- /dev/null +++ b/edge/graph_85564408.jsonl @@ -0,0 +1,2 @@ +{"35690300|5221730": ["Minimisation of variation in gender, age, HbA1c and hypoglycaemia unawareness score is undertaken at randomisation and performed using appropriate software (MinimPy).(20) Minimisation is a method of ensuring excellent balance between groups for known prognostic factors."]} +{"34530352|5221730": ["3) was used to allocate participants (15)."]} diff --git a/graph_85585.jsonl b/edge/graph_85585.jsonl similarity index 100% rename from graph_85585.jsonl rename to edge/graph_85585.jsonl diff --git a/edge/graph_8566933.jsonl b/edge/graph_8566933.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4f67238161512db22e348279ead5f13ec27dfa8 --- /dev/null +++ b/edge/graph_8566933.jsonl @@ -0,0 +1,3 @@ +{"20820768|627405": ["1: Systematic literature review process [17]", "A systematic literature review involves three general phases [17]: planning the review, conducting the review and documenting the review, each of which includes several activities, as Fig."]} +{"17628724|10565822": []} +{"557120|10565822": ["Prior research suggests that FOR loops are problematic for older novice programmers too (Robins et al., 2003) due to the complex \u201c behind-the-scenes \u201d action involved with incre-menting the loop variable.", "Learning to program and construct computational solutions is hard (du Boulay, 1986; Guzdial, 2004; Myers, Ko, & Burnett, 2006; Pea & Kurland, 1984; Reynolds & Caperton, 2011; Robins et al., 2003).", "Introductory computing courses usually include programming, which is a complex problem-solving activity novices \ufb01 nd dif \ufb01 cult (for example, du Boulay, 1986; Pea & Kurland, 1984; Robins, Rountree, & Rountree, 2003)."]} diff --git a/edge/graph_8569776.jsonl b/edge/graph_8569776.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d3a4fc4937d9d47f311fb292e0c7f0b61a8b712 --- /dev/null +++ b/edge/graph_8569776.jsonl @@ -0,0 +1,3 @@ +{"7129758|8953108": ["For a more detailed description on automatic threshold methods, we refer to Otsu (1979), Abr\u00e0moff et al. (2004), and Sezgin and Sankur (2004)."]} +{"16310475|18047585": ["Concerning robot action, planning and learning algorithms for the manipulation of deformable objects [13] are deemed to play an important role in this context."]} +{"86078335|1503157": ["\u2026networks enables continuousmonitoring of the environment and crop properties and will provide valuable information for agricultural management (Ruiz-Garcia et al. 2009).\ne-Infrastructure and phenotyping\nFull potential of the newly developing phenotyping approaches will enfold when\u2026"]} diff --git a/edge/graph_8569943.jsonl b/edge/graph_8569943.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8574504.jsonl b/edge/graph_8574504.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..956808794d6a21740afebd5ac24e2d6e4321c3fe --- /dev/null +++ b/edge/graph_8574504.jsonl @@ -0,0 +1,7 @@ +{"7333079|956843": ["Due to the finite number of samples, PF suffers from degeneracy and impoverishment problems when the highly likely particles replace the less likely ones [Li et al. 2014].", "PF with finite number of samples suffer from degeneracy and impoverishment problems when less likely particles are replaced by highly likely particles [24]."]} +{"207217044|9928823": []} +{"17781204|206764452": ["Vision-based road segmentation aims at the detection of the (free) road surface ahead the ego\u2013vehicle and is an important research topic in different areas of computer vision such as autonomous driving [2] or pedestrian crossing detection [3].", "Segmenting road scenes is an important problem in computer vision [1] for applications such as autonomous driving [2] and pedestrian detection [3]."]} +{"53249650|14415030": []} +{"53249650|15744805": ["\u2026Benchmark [Martin et al. 2001], and other image databases that have built sets of human-generated segmentations and then used them for evaluation of automatic algorithms [Correia and Pereira 2000; Everingham et al. 2002; Huang and Dom 1995; Unnikrishnan et al. 2005; Zhang 1996; Zhang et al. 2008]."]} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"206592484|456491": []} diff --git a/edge/graph_8574829.jsonl b/edge/graph_8574829.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8575576.jsonl b/edge/graph_8575576.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ec586080933fc806ba8af7ccc185b2d4ee9d493 --- /dev/null +++ b/edge/graph_8575576.jsonl @@ -0,0 +1,6 @@ +{"6297600|206051485": ["Metrics commonly used include mean-squared difference, mutual information, and normalized correlation [5, 6]."]} +{"17400352|17572218": ["Another reason for the slow penetration may be the relatively frequent over-optimistic findings from experiments with too limited data sets [110].", "This makes the risk of over-fitting of the discriminating function to the training data substantial, unless the number of cases in the data set is very large [110]."]} +{"22040338|206051485": []} +{"13339553|192934": ["This is known as the curse of dimensionality or in general the bias variance dilemma, which leads to peaking phenomena in classifier design as indicated in [15]."]} +{"765766|192934": ["This is also known as the curse of the dimensionality [18,24].", "We formulate the classification of digitized microscopy images of neuroblastoma as a statistical pattern recognition problem [18]."]} +{"35534293|6280485": []} diff --git a/edge/graph_8575589.jsonl b/edge/graph_8575589.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_858139.jsonl b/edge/graph_858139.jsonl similarity index 100% rename from graph_858139.jsonl rename to edge/graph_858139.jsonl diff --git a/edge/graph_8584223.jsonl b/edge/graph_8584223.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..711c5de5b2939ce30454cdf634259e3fa6b8078e --- /dev/null +++ b/edge/graph_8584223.jsonl @@ -0,0 +1,7 @@ +{"12054931|38476": []} +{"8908785|1097238": ["Static selection schemes select an EoC for all test patterns, and dynamic selection schemes select different classifiers for different test patterns.", "Keywords: Oracle; Combining classifiers; Classifier selection; Ensemble selection; Pattern recognition; Majority voting; Ensemble of learning machines"]} +{"15459188|192934": ["It is now well established that the combination of a set of classifiers designed for a given pattern recognition problem may achieve higher recognition/classification rates than any of the classifiers taken individually [15, 9, 13]."]} +{"22197172|192934": ["For more generic reviews on multiple classifier systems and combining classifiers the reader is referred to, for example, [13], [23] and [ 24 ]."]} +{"2276633|192934": ["It is intuitively accepted that classifiers to be combined should be diverse.", "Keywords Combining classifiers, diversity, dependence."]} +{"29990144|10739218": ["In this regard, we have used a neuro-fuzzy framework which has already been applied successfully to several other real-life problems (Bunke and Kandel, 2000; Jang et al., 1996; Lin and Lee, 1996; Mitra and Hayashi, 2000; Pal and Mitra, 1999).", "The learning procedure operates on local information and causes only local modifications in the underlying fuzzy system (Bunke and Kandel, 2000; Jang et al., 1996; Lin and Lee, 1996; Mitra and Hayashi, 2000; Pal and Mitra, 1999)."]} +{"29990144|192934": ["Improvement in performance due to classifier combination is reviewed and presented by Kittler (1997) and Jain et al. (2000)."]} diff --git a/edge/graph_8589228.jsonl b/edge/graph_8589228.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9740cdd8f10cf529f45421e0650d9afab94fd70e --- /dev/null +++ b/edge/graph_8589228.jsonl @@ -0,0 +1 @@ +{"12264684|17718674": []} diff --git a/edge/graph_8591084.jsonl b/edge/graph_8591084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e1846365b7f5c809fd391648b6281ace631c1a2 --- /dev/null +++ b/edge/graph_8591084.jsonl @@ -0,0 +1,4 @@ +{"3871223|55870404": ["Cloud Computing technology enables users to transfer their operational data and programs to the web then operate the programs without commitment to have any special physical infrastructure [4,5]."]} +{"37924156|3042022": ["Therefore, if the procedure is repeated n \u03b1i is chosen, then the iteration n + 1 are [19-21]:"]} +{"10461346|3042022": ["Therefore, if in repeating an n number of actions i is selected, then for the repetition of n+1 we will have the following [14,15,16]: \uf0b7 For optimal response(\u03b2=0): Figure 1 The Relationship between a learning automata and it's enviroment Learning Automata"]} +{"1519520|3042022": ["Therefore, if in repeating an n number of actions \u03b1i is selected, then for the repetition of n+1 we will have the following [13,14,15]: \uf0b7 For optimal response(\u03b2=0):"]} diff --git a/edge/graph_8596534.jsonl b/edge/graph_8596534.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0c44d8b16c60bcbab43776972c78b89ddfb468a --- /dev/null +++ b/edge/graph_8596534.jsonl @@ -0,0 +1,13 @@ +{"7607428|396631": ["Layered video coding [2] has been widely adopted by the existing video coding standards [3]\u2013[6], which is capable of generating multiple layers of unequal importance."]} +{"7607428|14889616": ["At the receiver, each decoded NALU failing to pass the CRC check process was removed before the SVC video decoding process.", "5) Delay:: Our technique is implemented using the SVC of H.264 as detailed in Section IV, where each video frame can be encoded into a single BL and multiple ELs.", "Another recent layered video coding standard, referred to as scalable video coding (SVC) [4], [5] was designed as an extension of H.264/AVC [5].", "BPSK modulation, an RSC FEC code and the SVC-H.264 video codec were employed in our design example, but our solution may be readily applied for arbitrary transceivers generating near-Gaussian distributed LLRs, for arbitrary non-iteratively decoded channel codes and for arbitrary layered video transmissions.", "1, the video source signal is compressed using the SVC of the H.264 encoder, generating layers and .", "Moreover, each SVC H.264/AVC-compressed bitstream was channel encoded and transmitted on a NALU by NALU [5] basis, which is the smallest unit to be decoded by the SVC decoder.", "Another recent layered video coding standard, referred to as scalable video coding (SVC) [4], [5] was designed as an extension of H.", "In SVC, a video sequence is encoded into a stream containing multiple dependent layers, where a number of subset layers may be extracted and hence the bitrate may be controlled according to the users\u2019 specific requirements in practical video services.", "1, where the SVC mode of H.264 [5] is employed.", "Additionally, only the Medium Grain Scalability (MGS) [4], [48] feature is enabled, when encoding the video sequences into three different-quality ELs, namely into the layers , and using the standardized quantization parameters (QP) of 40, 32 and 24, respectively.", "Finally, the widely employed SVC-H.264 codec will be utilized for the sake of benchmarking our proposed system.", "Moreover, two layers, namely the BL and the EL are assumed to be generated by the SVC encoder, noting that more complex scenarios may be readily applied - we simply use two layers here for ease of explanation.2 The variable node decoder (VND) and check node decoder (CND) [37] used in Fig.", "Given the confidence of the bits and , the boxplus operation of\n[38] may be utilized for deriving the confidence 2In our results in Section IV, we show how our proposed techniques work for\nSVC encoder using three layers.\nand boxplus action, respectively. and represent the input and output LLR, respectively.", "We use the SVC-H.264/AVC scheme in our simulations, but our proposed scheme is not limited to SVC, it can be readily applied in any arbitrary system relying on layered\nvideo coding, such as the partitioned video coding regime of [31].", "A novel UEP method using Reed-Solomon codes was proposed in [20] for SVC video transmission over networks inflicting packet-loss events.", "Specifically, in the SVC of H.264 coded video scenario, a network abstraction layer unit (NALU) is packed into a single packet, but the different NALUs may carry a different number of bits."]} +{"15532968|5660618": ["\u2026have been given in different phases, such as the surveys by Tipsuwan and Chow in 2003 [12] on time-delay problems in NCSs, and Yang in 2006 [13], Hespanha et al. in 2007 [14] on additional types of imperfections in NCSs, such as packet losses, time-varying sampling intervals, and competition of\u2026", "Some summaries have been given in different phases, such as the surveys by Tipsuwan and Chow in 2003 [12] on time-delay problems in NCSs, and Yang in 2006 [13], Hespanha et al. in 2007 [14] on additional types of imperfections in NCSs, such as packet losses, time-varying sampling intervals, and competition of multiple packet transmissions and, more recently Gupta and Chow in 2010 [11] on other issues of NCSs, such as network security and other realistic considerations.", "\u2026via networks; Among the vast literature on NCSs that is available to date, we refer the readers especially to the books [8]\u2013[10], survey papers [11]\u2013[14], special issues [15]\u2013[19], Ph.D. dissertations [20]\u2013[22], and the numerous references therein to enable them to see the state of the art in\u2026", "\u2026phases, such as the surveys by Tipsuwan and Chow in 2003 [12] on time-delay problems in NCSs, and Yang in 2006 [13], Hespanha et al. in 2007 [14] on additional types of imperfections in NCSs, such as packet losses, time-varying sampling intervals, and competition of multiple packet\u2026", "The survey of Hespanha et al. [14] complements this work, by focusing on the advances made from 2003 to 2007, such as the approach of modeling NCSs by delayed differential equations (DDEs), the switched systems approach, etc."]} +{"6342690|1940388": ["A review of security threats to WSNs and a survey of defense mechanisms is presented in [26]."]} +{"6342690|12817488": ["A survey of data aggregation algorithms used in WSNs is presented in [22]."]} +{"6342690|1230643": ["This scenario is used in most monitoring applications in agriculture [7], [8], microclimate [4], [5], [9] and habitat surveillance [10]\u2013[12], military operations [13], and disaster relief [14]."]} +{"6342690|1708582": ["RL [41], [42] is a sub-area of machine learning concerned with how an agent should take actions in an environment so as to maximize some notion of a long-term reward."]} +{"6342690|6555395": ["A survey of NN learning methods, their properties and applications is presented in [32]."]} +{"6988770|8815923": ["For grasping [37], grasp stability of finger contacts can be learned from previous grasps on an object [45]."]} +{"10473322|11720829": []} +{"16279144|2509135": ["Recent surveys on CRs can be found in [41], [54], [55].", "In distributed cooperative spectrum sensing [55], [172], on the other hand, secondary users within a CRN exchange their local sensing results among themselves without requiring a backbone or centralized infrastructure."]} +{"16279144|12452682": []} +{"16279144|2340253": []} diff --git a/graph_860072.jsonl b/edge/graph_860072.jsonl similarity index 100% rename from graph_860072.jsonl rename to edge/graph_860072.jsonl diff --git a/edge/graph_8601873.jsonl b/edge/graph_8601873.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1e123c98eb85dbeb80590c138a3d556260e423a9 --- /dev/null +++ b/edge/graph_8601873.jsonl @@ -0,0 +1 @@ +{"14107141|1708582": ["Reinforcement Learning methods are reviewed in [Sutton and Barto, 1998] and [Kaelbling et al., 1996]."]} diff --git a/edge/graph_8604408.jsonl b/edge/graph_8604408.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2fc7e47eef4af38c7bf4c31b87970154a3599c8f --- /dev/null +++ b/edge/graph_8604408.jsonl @@ -0,0 +1,6 @@ +{"207217022|393948": ["Recent development in deep learning techniques [6] has made such a unified approach possible."]} +{"16129752|393948": ["In the work presented here for the SBN, we utilize label information (when available) in a multi-task learning setting (like in Bengio et al. (2013)), where the top-layer hidden units are generated by multiple sets of bias terms, one for each label, while all the other model parameters and hidden\u2026", "For \u03b3 (0) , \u03b3 (1) : optimizing L over q(\u03b3 (0)"]} +{"3332579|1805048": []} +{"2403660|1805048": ["Collaborative Filtering (CF), which automatically predicts the interests of a particular user based on the collective rating records of similar users or items, has been extensively studied in the literature (Hu et al., 2008; Salakhutdinov & Mnih, 2008; Su & Khoshgoftaar, 2009).", "There are mainly two types of CF-based approaches (1) memory-based approaches, (2) model-based approaches."]} +{"1423201|18540015": ["Existing RS methods can be roughly categorized into three classes [1], [4], [10], [41]: content-based methods, collaborative filtering (CF) based methods, and hybrid methods."]} +{"1423201|1805048": ["Existing RS methods can be roughly categorized into three classes [1], [4], [10], [41]: content-based methods, collaborative filtering (CF) based methods, and hybrid methods."]} diff --git a/edge/graph_8606364.jsonl b/edge/graph_8606364.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8e3a3428c7539e29bc33191517527ba122301c5 --- /dev/null +++ b/edge/graph_8606364.jsonl @@ -0,0 +1,3 @@ +{"18359066|12601073": []} +{"29763692|12401050": []} +{"31417645|8974063": []} diff --git a/edge/graph_8618569.jsonl b/edge/graph_8618569.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1ff78a4148cf1dec9c5d8a2b0e474bb45390543 --- /dev/null +++ b/edge/graph_8618569.jsonl @@ -0,0 +1,10 @@ +{"3172525|205286988": ["Wireless sensor network has received extensive study recently [13, 18, 17, 21, 22, 12 ]."]} +{"11345305|1230643": ["Moreover, its self-configure, self-organizing characteristics make the wireless sensor networks robust and ideal for hazardous plant and high-assets protection applications [2]."]} +{"110077117|1230643": []} +{"8834682|1236072": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"8834682|1230643": ["Several surveys [133,59,61,2], and [3] discussed various aspects on wireless sensor networks."]} +{"2020260|1230643": ["Several mechanisms to conserve energy in protocols and applications have been developed in the context of wireless (sensor) networks [28]\u2013[30]."]} +{"2020260|7278743": ["The computation of any upper bounds requires knowledge of the upper bounds for the medium access delay."]} +{"14897482|11720829": ["Recent multiple-input, multiple-output (MIMO) techniques [143], [144] like the upcoming IEEE 802."]} +{"14897482|1387401": ["In realistic environments the wireless channel suffers from phenomena like path loss and shadowing, multipath propagation and thermal noise [132]\u2013[134]."]} +{"14897482|1230643": ["Wireless sensor networks (WSN) [55], [56], [30], [57], [58], [59], [60] consist of a large number of small, energy- and resource-constrained sensor nodes."]} diff --git a/edge/graph_8618991.jsonl b/edge/graph_8618991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dfddd90de3138c39238ba9983cd5cdd448d08a3 --- /dev/null +++ b/edge/graph_8618991.jsonl @@ -0,0 +1,4 @@ +{"5322364|16654832": ["Among limited studies of the domain, [19] and [56] survey"]} +{"5322364|6670217": []} +{"5322364|7287857": ["fingertip\u2019 [1] and \u2018unrestricted mobile computing\u2019 [2] aroused the need to enhance computing power of mobile devices to meet the insatiable computing demands of mobile users [3]."]} +{"5322364|10837932": ["Moreover, researchers aim at reducing the energy overhead in different aspects of computing, including hardware, OS, application, and networking interface [83], [84]."]} diff --git a/edge/graph_8620250.jsonl b/edge/graph_8620250.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8627028.jsonl b/edge/graph_8627028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86375278.jsonl b/edge/graph_86375278.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e065a5c7fd2a1090e88866aa6a0d39991c13ec57 --- /dev/null +++ b/edge/graph_86375278.jsonl @@ -0,0 +1,21 @@ +{"19821275|2623404": []} +{"23805463|12206204": ["Not only the mobile Internet devices, from smartphones to tablets, will keep the explosive growth of data traffic over the cellular network, but more things, from industrial machines to vehicles, appliances, lights, buildings, or even places and other intangible real world representations are getting connected [2], [3]."]} +{"5279231|1588237": [", [9] and [10], to optimize the robustness of the system and mitigate the effect of interference between neighboring cells."]} +{"550361|11498812": ["Ironically, while mobility models have been routinely used in the evaluation of human-centric communications technologies, such as mobile ad-hoc and legacy cellular networks, the effects of mobility in mobile 5G systems that are targeting the mcMTC market are much less understood [3]."]} +{"76603|512561": ["WSNs [162], [163] [164]\u2013[167] Summary: Deployment of large-scale WSN into PSN can increase situational awareness of EFR and assist in evading any potential disaster."]} +{"76603|61132": ["ation between UAVs in a multi-UAV network are surveyed in [130]."]} +{"76603|10310014": ["We review the LTE-based FirstNet architecture in the United States, the convergence of LTE-LMR technologies, and support for mission-critical PTT over LTE, which are not addressed in earlier survey articles such as [33] and [34].", "The technological advances has brought LTE to a performance level close to Shannon\u2019s capacity bound [34]."]} +{"7942157|1049844": []} +{"7942157|206578224": ["The new core network includes some new entities such as SDN, MEC, and NFV as well as new backhaul techniques [11], [12], [176].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [11], [12], caching [13], [14], backhaul [15], resource management [16] and data centric network [17], [18] are available."]} +{"7942157|25911553": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available."]} +{"7942157|3757239": ["system performance and high latency which can not meet the 5G vision [179].", "BS level caching [179]."]} +{"7942157|4502294": ["In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "5G back-haul requires higher capacity, lower latency, synchronization, security, and resiliency [13]."]} +{"7942157|206576469": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"7942157|3555631": ["Split of control plane (C-plane) and data plane (D-plane) in the architecture and the carrier frequency could be performed in order to have separate provision of capacity and coverage [21]."]} +{"7942157|8650651": []} +{"7942157|76603": ["In mission critical communication (MCC), both the latency and reliability issues need to be addressed [6]."]} +{"7942157|19938676": ["Fifth generation (5G) cellular network is the wireless access solution to ful\ufb01ll the wireless broadband communication speci\ufb01cations of 2020 and beyond [3], [4].", "In the literature, surveys on 5G network including architecture [3], [4], SDN/NFV/MEC based core network [9], [10], 2: A candidate architecture for 5G cellular network [8]. caching [11], [12], backhaul [13], resource management [14] and data centric network [15], [16] are available.", "With an ambition of signi\ufb01cant enhancements over 4G cellular networks, we need drastic changes in the architecture for meeting 5G visions such as 1000 times capacity enhancement, 100 billions connections and close to zero latency [3], [4]."]} +{"7942157|875676": ["The overall comparison among IDMA, SCMA and GFDM is presented in Table V. Filter bank multi carrier (FBMC) has been a strong candidate waveform for 5G [3], [85]."]} +{"7942157|35906806": ["Apart from that, surveys on latency reduction approaches in Internet [17], cloud computing [18] and distributed network applications [19], [20] are also presented; however, to the best of our knowledge, a comprehensive survey on latency reduction approaches in cellular networks towards 5G is not\u2026"]} +{"4866120|10235514": ["ited set of terminals, which are active according to patterns typically speci\ufb01ed by outside events, such as alarms. While there has been a signi\ufb01cant research on how to design each individual service [3]\u2013[5], mechanisms to support more than one service within a 5G wireless systems have only recently started to be addressed, see [6], [7]. In order to understand the scope of the problem, we describe be"]} +{"3414483|10937383": ["Physical layer technologies introduced to this end include high order modulation transmission, carrier aggregation, cell densification via heterogeneous network, and multiple-input multipleoutput (MIMO) transmission.", "Technologies under consideration include full-dimension and massive MIMO [5], millimeter-wave communication [6], and spectrally-localized waveforms [7]."]} diff --git a/edge/graph_86416942.jsonl b/edge/graph_86416942.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..123e05c782b206c6484c300ff702670f15d68f18 --- /dev/null +++ b/edge/graph_86416942.jsonl @@ -0,0 +1,7 @@ +{"2829149|116294": ["Attacks on network availability: The denial of service (DoS) ([16], [17]) attack falls under this category."]} +{"2829149|15199849": []} +{"2829149|7889189": ["This prevention of accessibility of information to legitimate users by unknown third party intruders can take place on different layers of a network [8],[14],[15]:", "Some additional DoS attacks are as follows [7], [14], [15], [36] According to [26], the threats looming over WSN can further be classified as follows: i. External versus internal attacks ii."]} +{"2829149|1940388": ["According to [12], the attacks on WSN can be classified as: i."]} +{"1208330|17756238": ["GPS stalking [81], disclosure of private information such as an illness [82], or generally the uneasy feeling of being watched [83].", "Examples where profiling is leads to a violation of privacy violation are price discrimination [87, 88], unsolicited advertisements [83], social engineering [89], or erroneous automatic decisions [48], e."]} +{"1208330|2906926": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} +{"1208330|2357830": ["RFID privacy issues have been thoroughly researched [27, 28, 29]."]} diff --git a/edge/graph_86419999.jsonl b/edge/graph_86419999.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86429347.jsonl b/edge/graph_86429347.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c0ab184c2b23f9a7e212431022222e64dd70551 --- /dev/null +++ b/edge/graph_86429347.jsonl @@ -0,0 +1,5 @@ +{"53733379|13897660": ["Slonecker et al. (2010) reviewed the literature on remote sensing and overhead imaging in the context of hazardous waste, and discussed future trends with special attention given to multispectral and hyperspectral remote-sensing data."]} +{"53733379|206051485": ["\u2026to be selected as GCPs should be relative to areas which are stable in amplitude (on the SAR map) and easily separable from surrounding regions (Zitov\u00e1 and Flusser 2003), such as road crossings, buildings, boundaries between homogeneous areas, or other dominant features observable in both\u2026"]} +{"32754528|16789883": []} +{"422172|11112426": ["More recently, hyperspectral (HS) imaging acquiring a scene in several hundreds of contiguous spectral bands has opened a new range of relevant applications such as target detection [6] and spectral unmixing [7]."]} +{"422172|16374808": ["FUSION of multisensor images has been explored during recent years and is still a very active research area [2].", "Another motivation for studying the underdetermined problem is that it includes an archetypal fusion task referred to as pansharpening [2].", "Many solutions have been proposed in the literature to solve this problem, which is known as pansharpening [2]\u2013[5]."]} diff --git a/edge/graph_86433885.jsonl b/edge/graph_86433885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b26cf5dd81315aac18c0f580cb707c3d1dea86b --- /dev/null +++ b/edge/graph_86433885.jsonl @@ -0,0 +1,15 @@ +{"1047422|16575201": []} +{"3253074|5358365": ["Existing surveys were either conducted several years ago [47,143] or focus on a specific topic of visualization such as graph visualization [145], software visualization [24], or visualization of network security events [124]."]} +{"10157083|18526204": ["Extractive text summarization process [31] can be divided into two steps: 1) Pre Processing step and 2) Processing step.", "Another keyword extraction method [23][31] is given below, having three modules: 1) Morphological Analysis 2) Noun Phrase (NP) Extraction and Scoring 3) Noun Phrase (NP) Clustering and Scoring Figure1 shows a pictorial representation of the keyword extraction method."]} +{"11630815|8296351": []} +{"31321676|5810468": ["Zhou and Hansen present a comprehensive review of color-map generation techniques, and provide a reference for readers who are faced with color mapping decisions [ZH15]."]} +{"31321676|15480190": []} +{"31321676|5358365": ["The paper de\ufb01nes visualization of the static aspects of software as \u2018 visualizing software as it is coded, and dealing with information that is valid for all possible executions of the software \u2019 [CZ11]."]} +{"31321676|15233735": []} +{"31321676|2593345": []} +{"31321676|9907884": []} +{"31321676|18986679": []} +{"31321676|16557526": []} +{"31321676|239537": []} +{"51614209|5558830": []} +{"51614209|18526204": []} diff --git a/edge/graph_86437335.jsonl b/edge/graph_86437335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86447188.jsonl b/edge/graph_86447188.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86462334.jsonl b/edge/graph_86462334.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c6d2aad36ac3dd5b004cc285293780033929ed9 --- /dev/null +++ b/edge/graph_86462334.jsonl @@ -0,0 +1,3 @@ +{"35022044|17381415": ["Among lowpower DPGS, the number of photovoltaic (PV) plants connected to low-voltage distribution lines has been increasing in the later years [3], [4]."]} +{"55910979|17381415": ["Introduction The distributed power generation system [1,2] has proven to be a very useful way of using renewable sources in small and large-scale energy production."]} +{"62784223|18985591": []} diff --git a/edge/graph_86468554.jsonl b/edge/graph_86468554.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86468947.jsonl b/edge/graph_86468947.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a66f39fa4cc279ddc90e01175d9f5a6551adb5fb --- /dev/null +++ b/edge/graph_86468947.jsonl @@ -0,0 +1,8 @@ +{"5680434|2623404": ["A flow entity consists of match fields, counters, and a set of instructions to match to the incoming packets, collect statistics regarding the current flow, and handle a matched packet.", "\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"5680434|10693567": ["\u2026different levels [3], such as spectrum level slicing, where the spectra is virtualized by multiplexing techniques; infrastructure level slicing, i.e., virtualization of physical network elements; and network level slicing, where all the entities of the network are sliced to form a virtual network."]} +{"18098772|3348390": []} +{"6968084|8523192": ["Fog computing is hence expected to fruitfully extend the Cloud+IoT scenario, enabling Quality-ofService- (QoS) and context-aware application deployments [5].", "The need to provide processing power, storage and networking capabilities to run IoT applications closer to sensors and actuators has been highlighted by various authors, such as [4], [5].", "Indeed, contrarily to the Cloud, Fog nodes often feature limited resources, what makes single node deployments not always feasible [5].", "As highlighted in [5], the availability of tools to simulate Cloud+Fog+IoT scenarios, without implementing testbeds, is still too scarce.", "Metrics to estimate and compare the QoS-assurance and the consumption of Fog resources of alternative eligible deployments [5] can ease the selection of deployments that are more likely to meet all processing and QoS constraints while minimising the consumption of Fog resources when needed."]} +{"22832840|9495329": []} +{"37451636|3007529": ["To name a few application scenarios include intelligent transportation systems (ITS) [11], volunteer information networks [12], Internet of Things (IoT) [13]\u2013[15], smart grids [16], [17] and much more."]} +{"37451636|3348390": []} +{"37451636|9104850": []} diff --git a/edge/graph_86476120.jsonl b/edge/graph_86476120.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c6b16efdf560f8a04c4d7dcac8db12ce9b2aec6 --- /dev/null +++ b/edge/graph_86476120.jsonl @@ -0,0 +1,2 @@ +{"56030843|41170198": ["05 devices will provide more and more data, since it is required [5]."]} +{"45899195|11136930": []} diff --git a/edge/graph_86485018.jsonl b/edge/graph_86485018.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..574a89807667f74bef879fc432b67ed692cb5009 --- /dev/null +++ b/edge/graph_86485018.jsonl @@ -0,0 +1,39 @@ +{"49556436|19694911": []} +{"3068747|1680300": []} +{"4711752|1680300": ["Existing AMC algorithms can be divided into two main categories [3], namely, likelihood-based (LB) methods and feature-based (FB) methods."]} +{"67362337|12601073": []} +{"1680300|192934": ["FEATURE-BASED APPROACH TO AMC The design of a FB algorithm first needs some features for data representation and then decision making [100]."]} +{"34345193|1680300": []} +{"57377476|28210515": ["The interference is usually detrimental for performance in co-located and concurrent operation [2], [3] in unlicensed bands, especially when coexistence\u2014detection, identification and avoidance\u2014 mechanisms are ignored.", "The same is validated by several studies (see [2] and the references therein), which show that a co-located 802."]} +{"34244781|1680300": ["This can be done using two methods: Parameter Signaling and Automatic Modulation Classification (AMC) [2].", "Figure 1 shows a block diagram of a communication system that applies adaptive modulation at the transmitter and AMC at the receiver.", "Two approaches are used for AMC: Likelihood Based schemes (LB) [5] [6] and Feature Based schemes (FB) [7].", "On the other hand, AMC is a blind recognition technique applied by receivers to automatically determine the modulation type of a received signal [3].", "In AMC, selecting the proper classification features is a crucial step for an accurate recognition procedure.", "AMC has applications in software defined radio (SDR), spectrum surveillance and electronic warfare [4]."]} +{"11715509|1185580": []} +{"11715509|393948": ["Ideally, given an ensemble of input patterns, redundancy reduction through a deep NN will create a factorial code (a code with statistically independent components) of the ensemble (Barlow, 1989; Barlow et al., 1989), to disentangle the unknown factors of variation (compare Bengio et al., 2013).", "Deep hierarchical RL (HRL) and subgoal learning with FNNs and RNNs\nMultiple learnable levels of abstraction (Bengio et al., 2013; Deng & Yu, 2014; Fu, 1977; Lenat & Brown, 1984; Ring, 1994) seem as important for RL as for SL. Work on NN-based Hierarchical RL (HRL) has been published since the early\u2026"]} +{"11715509|1895753": ["Many computational models of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014; Izhikevich et al., 2003; Kasabov, 2014; Kempter, Gerstner, & Van Hemmen, 1999; Kistler, Gerstner, & van Hemmen, 1997; Maass, 1996, 1997; Maex & Orban, 1996; Nessler, Pfeiffer, Buesing, & Maass, 2013; Rezende & Gerstner, 2014; Seung, 2003; Song, Miller, & Abbott, 2000; Stemmler, 1996; Stoop, Schindler, & Bunimovich, 2000; Tsodyks, Pawelzik, & Markram, 1998; Tsodyks, Skaggs, Sejnowski, & McNaughton, 1996; Zipser, Kehoe, Littlewort, & Fuster, 1993).", "\u2026of such spiking neurons have been proposed and analyzed (e.g., Amit & Brunel, 1997; Bohte, Kok, & La Poutre, 2002; Brea, Senn, & Pfister, 2013; Brette et al., 2007; Brunel, 2000; Deco & Rolls, 2005; Gerstner & Kistler, 2002; Gerstner & van Hemmen, 1992; Hoerzer, Legenstein, & Maass, 2014;\u2026"]} +{"11715509|1708582": ["This assumption does not hold in the broader fields of Sequential Decision Making and Reinforcement Learning (RL) (Kaelbling et al., 1996; Sutton and Barto, 1998; Hutter, 2005) (Sec.", "Such NNs learn to perceive/encode/predict/ classify patterns or pattern sequences, but they do not learn to act in the more general sense of Reinforcement Learning (RL) in unknown environments (see surveys, e.g., Kaelbling et al., 1996; Sutton & Barto, 1998; Wiering & van Otterlo, 2012)."]} +{"11715509|1400872": ["GPUs excel at the fast matrix and vector multiplications required not only for convincing virtual realities but also for NN training, where they can speed up learning by a factor of 50 and more.", "See generalizations for sequenceprocessing recurrent NNs (e.g., Atiya & Parlos, 2000; Baldi, 1995; Gherrity, 1989; Kremer & Kolen, 2001; Pearlmutter, 1989, 1995; Robinson & Fallside, 1987; Rohwer, 1989; Schmidhuber, 1992a; Werbos, 1988;Williams, 1989;Williams & Peng, 1990;Williams & Zipser, 1988,\u2026"]} +{"11715509|6555395": ["\u2026through training an NN first on shallow problems whose solutions may then generalize to deep problems, or through collapsing sequences of (non)linear operations into a single (non)linear operation (but see an analysis of non-trivial aspects of deep linear networks, Baldi & Hornik, 1995, Section B)."]} +{"11715509|17464562": ["The following decades brought simple NNs trained by SL (e.g., Narendra & Thathatchar, 1974; Rosenblatt, 1958, 1962; Widrow & Hoff, 1962) and UL (e.g., Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Willshaw & von der Malsburg, 1976), as well as closely related associative memories (e.g.,\u2026", ", McCulloch and Pitts, 1943; Hebb, 1949); compare also later work on learning NNs (Rosenblatt, 1958, 1962; Widrow and Hoff, 1962; Grossberg, 1969; Kohonen, 1972; von der Malsburg, 1973; Narendra and Thathatchar, 1974; Willshaw and von der Malsburg, 1976; Palm, 1980; Hopfield, 1982)."]} +{"35746391|1680300": []} +{"25467168|1680300": ["For a discussion of these approaches, which include the average likelihood ratio test (ALRT) and the\ngeneralized likelihood ratio test (GLRT), the reader is referred to [1].", "In this paper, we use the hybrid likelihood ratio test (HLRT), which does not require knowledge of the unknowns\u2019 pdf, as in the ALRT, and it does not fail in uniquely classifying nested constellations (such as 16-QAM and 32-QAM), as in the GLRT [1].", "The significant majority of modulation classification algorithms in the literature were developed for the case in which the additive noise is assumed to be Gaussian distributed [1].", "Furthermore, classifiers typically have no knowledge of the fading experienced by the signal and the distribution of the noise added in the channel [1]-[3].", "In the HLRT, the unknown symbols are averaged out, as in the ALRT, and \ud835\udefc, {\ud835\udf06\ud835\udc5b}\ud835\udc41\ud835\udc5b=1, and {\ud835\udf0e\ud835\udc5b}\ud835\udc41\ud835\udc5b=1 are estimated by using maximum-likelihood estimation, as in the GLRT.", "MODULATION classification can be defined as the process of determining the modulation format of a noisy signal from a given set of possible formats [1].", "In this case, the Total Probability Theorem can be used to show that p (r[1], .", "For a discussion of these approaches, which include the average likelihood ratio test (ALRT) and the generalized likelihood ratio test (GLRT), the reader is referred to [1].", "(Note that the signal constellations of the BPSK, QPSK, and 8-PSK schemes are nested [1], [13]."]} +{"25467168|30443041": ["100184 part, to \u201cthe lack of robustness of linear and quadratic type signal processing procedures to many types of non-Gaussian statistical behavior\u201d [5], [9]."]} +{"51720448|1680300": []} +{"2405012|1680300": ["There are a lot of other techniques used for AMC and a detailed survey is presented in [11].", "A complete survey of different AMC techniques used so far can be found in [11]."]} +{"28229014|1680300": ["In this work all AMC systems are assumed to have a front end, even the ones that fall within the likelihood-based framework [1], in which the front end outputs the received symbols and the", "A recent overview about the subject can be found in [1].", "The decision rule for both cumulant-based classifiers is determined as described in [1], [8]."]} +{"15660601|1680300": ["\u2026finds its use in military and civilian communications applications including signal confirmation, interference identification, spectrum monitoring, signal surveillance, electronic warfare, military threat analysis , electronic counter measure, and software radio system, cognitive radio [1], [2]."]} +{"34753163|2509135": []} +{"9155175|28210515": ["There are two motivations to select Bluetooth as the emulation target: first, the coexistence problem of Wi-Fi and Bluetooth is commonly observed in daily life [11]\u2013[13]; secondly, the Frequency Hopping Spread Spectrum used by Bluetooth is ideal to demonstrate the precise control of the emulated signal in both frequency and time domain.", "For example, the authors of [11] performed a thorough study of the interactions between Wi-Fi and Zigbee, showing that up to 60% packet loss can be introduced in the Wi-Fi network due to Zigbee\u2019s interference, depending on the physical topologies, channel overlapping conditions as well as the traffic load of both technologies."]} +{"12852072|393948": []} +{"12852072|1680300": []} +{"11707706|1680300": ["Various research works have been done in the field of AMC, which can be generally classified into two groups: Likelihood-Based (LB) and Feature-Based (FB) approaches [3].", "Therefore, it is necessary to develop Automated Modulation Classification (AMC) method to realize intelligent receivers in CR systems [3]."]} +{"8227817|4122595": ["Therefore, similar to [16], the conventional approaches are briefly reviewed in this survey in order to prepare for introducing the recent research to tackle the original issues.", "As far as recent surveys are concerned, in [16], the authors provided a comprehensive review of the existing CR approaches considering practical imperfections including noise uncertainty, channel/interference uncertainty, CR transceiver imperfections, noise/channel correlation, signal uncertainty, .", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|15116409": ["The problem of wideband (WB) spectrum sensing [6] consists of observing a wideband and identifying the portions of such band which are occupied by a signal and those which are free.", "The first approach to realize wideband sensing assumes that it is feasible to sample the desired spectrum by the ordinary Nyquist rate [6].", "On the contrary, wideband spectrum sensing [6][35] is based", "Compressive sensing [6] becomes a promising candidate to realize this sub-Nyquist approach.", "In other words, spectrum sensing is the task of obtaining awareness about the spectrum usage [6][14].", "However, it should be emphasized that all results presented by previous research work including [6][181], consider relatively small band (order of 300MHz) which is somehow in the order of a medium-sized band when compared to the practical wideband in the order of GHz.", "On the other hand, an overview for the wideband sensing approaches and challenges have been presented in [6].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|8974063": ["The DSMF proposed in [19] is adopted due to its clear functionality, well-defined interfaces among various blocks, and relevance to our discussion.", "Due to dynamically changing topologies and varying propagation characteristics, spectrum selection techniques [19] can be closely coupled with routing protocols.", "Dynamic Spectrum Management Framework for interweave network model [19], [23].", "In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|2509135": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6], [7], [14], [15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"8227817|12601073": ["In fact, a countable number of survey papers exist in the literature in the context of cognitive radio communications covering a wide range of areas such as spectrum occupancy measurement [13], spectrum sensing [6][7][14][15], cognitive radio under practical imperfections [16], spectrum management [17], emerging applications for cognitive radios [18], spectrum decision [19], spectrum access strategies [20], and CR networks [21]."]} +{"27551692|1680300": ["Hence, a lowcomplexity GCP algorithm is proposed to project the recovered symbol sequence R = [r[1] r[2] .", ", N 1: Form input matrix R = [r[1] r[2] .", "INTRODUCTION Automatic modulation classification (AMC), which is a vital intermediate step between received signals and demodulation, plays an important role in various areas, such as in the cognitive radio, spectrum surveillance and communication intelligence system [1].", ", to obtain the recovered data matrix R (R = [r[1] r[2] ."]} +{"13712401|1680300": ["In general, two classes of AMR algorithms can be crystallised, likelihoodbased (LB) and feature-based (FB) method respectively [1]."]} +{"31667588|1680300": ["Many types of LB algorithms were suggested in the literature, such as the Average Likelihood Ratio Test (ALRT) [8], Generalized Likelihood Ratio Test (GLRT) [8], Hybrid Likelihood Ratio Test (HLRT) [7] and Quasi-Hybrid Likelihood Ratio Test (QHLRT) [7]."]} +{"3397190|10137425": ["We also expect to see more research on multimodal learning [190] as, in the real world, language is often grounded on (or correlated with) other signals."]} +{"54953410|1680300": ["Even for modulation recognition, different deep learning methods such as multilayer perceptron (MLP) [6], convolutional neural network (CNN) [1] and convolutional long short-term deep neural networks (CLDNN) [7] have shown to outperform feature extraction based methods such as [8], [9], and [10]."]} +{"49557615|3761015": ["Transfer learning [14] reduce training time greatly and improve the performance of network effectively by a small amount of training data."]} +{"49557615|1680300": ["The spectrum and electrical level of environment are changeable, and CSNR (channel signal-to-noise ratio) is also poor for signal transmission [1]."]} diff --git a/edge/graph_8649087.jsonl b/edge/graph_8649087.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86492239.jsonl b/edge/graph_86492239.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86496553.jsonl b/edge/graph_86496553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c1c4c4af62936ac008f253d4f2943c394a121d8 --- /dev/null +++ b/edge/graph_86496553.jsonl @@ -0,0 +1,28 @@ +{"18665051|485843": []} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} +{"6189770|38911919": ["lar communications, such as [13], [18], [19], and [20], focusing on the network layer issues in MDVNETs."]} +{"6189770|17934515": ["ategy can not only reduce the energy consumption and exhaust emission by minimizing air drag due to the streamlining of AVs, but also increase the driving safety by cooperative driving among vehicles [84]. Note that, platoon20 based structure can be also considered in MDVNETs [11], where manually driving vehicles may spontaneously form a platoon, that is, one vehicle follows another one for easy drivi"]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"3949590|1762301": ["[25] and [26]."]} +{"21685661|3119314": ["[27] also mathematically approved that its VM live migration system with a linear regression approach from cloud to near fog structure also has been discussed in previous section (see Figure 5).", "[27, 85] to diverse and circulate designed systems.", "[27, 92], respectively, referred to fog computing as a substitute of cloud that can deliver location and requirement based services at mobile devices or end users (e.", "One of migration approaches is VM live migration, in which VM processes migrate from one physical node to another physical node [27].", "It becomes very important in many use cases such as VM migrations, resource allocation, programmable interfaces, application aware control, and traffic monitoring [27].", "However, a theoretical smart live migration approach is offered for VM migration [27]."]} +{"21685661|3767252": ["A common uniqueness associated with fog computing is its hierarchical parallel processing operations at the edge of the core network [22, 23].", "A security model [22] also has been presented with reviewing possibility and nature of attacks.", "Until that time, Denial of Service (DoS) and rogue gateway attacks were known as possible attacks on network transmission, while service data centers can expose to whole privilege escalation, physical damage, privacy leakages, and interruptions for QoS manipulation that has been identified as probable threats belonging to security [22]."]} +{"38427818|28991300": ["In general, the development of any context-aware application consists of the following three main components [21, 28]:", "These applications, which are known as \"context-aware\", form the building blocks of pervasive computing [20, 21]."]} +{"38427818|1113420": ["context, which is provided by sensing the environment contextual information [27]."]} +{"5016388|2457428": ["In addition, two user revocation schemes are proposed respectively by Rafaeli and Boyen [19, 20], but both of them have some shortcomings."]} +{"26801650|18388986": ["Following many studies on data fusion [39], [40], [41], we introduce an approach on how to mix QoS data and edge server data in this section."]} +{"9496996|12815020": []} +{"34702660|6779551": ["Furthermore, different applications usually require different encryption methods [42]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"33621679|3757239": ["As a result, vehicular edge networks is emerged with the development of VEC [2]."]} +{"33621679|36400013": ["Reputation query should be processed promptly to facilitate regular interactions [3]."]} +{"25088296|31860478": ["There are several dimensions in fog architecture in term of the current standard practice [35]."]} +{"3405708|206578224": ["There are other surveys which discuss the architecture of EC in [11]\u2013[13]; however, they address only the standardization and challenges in EC and no survey specifically addresses the performance of EC with other services like cloud or centralized data centers."]} +{"3405708|3757239": ["An overview of mobile edge networks and its computing and communication capabilities is given in [10]."]} +{"3405708|6909107": []} +{"3405708|2623404": ["A survey on software-defined networking in collaboration with EC and its application isdiscussed in [9]."]} +{"16654832|7287857": ["In [27], we study mobile augmentation techniques and devise a taxonomy including three main approaches, namely high-end resource production, native resource conservation, and resource requirement reduction .", "Examples of the augmentations strategies include; screen augmentation, energy augmentation, storage augmentation and application processing augmentation of SMD [27]."]} +{"30863156|15199849": ["A malicious node can also be used by the attacker to inject false data into the system or prevent delivery of true messages [46].", "process, send, or redirect packets [44], [46]."]} +{"30863156|2415608": [", the tag will not be able to transmit any further information after receiving this command [58].", "Note that although the anonymous ID emitted by an RFID tag has no intrinsic valuable information, it can still enable tracking as long as the ID is fixed over time [58].", "These protocols can be used in authenticating tags, but can be broken by a powerful adversary [58]."]} +{"30863156|2357830": []} +{"30863156|206459491": ["have been proposed in the last decade [24], [91], [92].", "PUFs enable unique device identification and authentication [103], [105], and offer Trojan detection mechanisms [24].", "Hardware Trojan is a malicious modification of an integrated circuit (IC), which enables the attacker to use the circuit or to exploit its functionality to obtain access to data or software running on the integrated circuits [24].", "Trojans are generally divided into two categories based on their triggering mechanisms [23], [24]: (i) externally-activated Trojans, which can be triggered by an antenna or a sensor that can interact with the outside world, and (ii) internally-activated Trojans that are activated after a certain condition is met inside the integrated circuit, e.", "Trojan detection: Side-channel signals, including timing [24], [82], [83], power [84]\u2013[86], and spatial temperature [84], [87] can be used for Trojan detection."]} diff --git a/edge/graph_8649905.jsonl b/edge/graph_8649905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8650651.jsonl b/edge/graph_8650651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f72b0d90715ce685b4d0836f9984eb7f5ea77b2 --- /dev/null +++ b/edge/graph_8650651.jsonl @@ -0,0 +1,63 @@ +{"15289072|17336376": ["Readers are referred to [81] for a detailed survey on virtualization of wireless sensor networks."]} +{"18384524|3994942": ["Typically, the objectives of traffic engineering include balancing the load distribution and minimizing the bandwidth consumption in the network, which are similar to ATM-based traffic engineering as discussed above [14].", ", finding efficient routes to achieve the desired network performance [14]."]} +{"14966192|1580493": ["Therefore, by the adoption of the flexible grid paradigm, the optical spectrum can be sliced in a flexible manner, and optical paths can be established with variable bit rates by bandwidth-variable transceivers [11]."]} +{"7607567|7686677": ["to ensure eco-sustainability and to keep low operative costs [70]."]} +{"7607567|12884178": ["Therefore, with this kind of relaying, the RRM module has to cope with the presence of both multi-hop connections and MBSFN frame structure (an overview on RRM schemes for OFDMA-based wireless networks with relay nodes can be found in [84]); this has impact on the end-to-end packet delays."]} +{"17061671|19454977": []} +{"17061671|141053": []} +{"207262843|2535224": []} +{"207262843|2623404": []} +{"207262843|2387055": []} +{"207262843|3330461": []} +{"40232144|1580493": []} +{"124975994|11768278": []} +{"14290280|15064932": ["Dynamic restoration in GMPLS-based WSONs is a well-investigated topic that has been widely covered by theoretical, simulation, and experimental studies [15\u201317]."]} +{"14838118|7800459": [", virtual memory [1], virtual machines [2], virtual storage access network [3] and virtual data centers [4]."]} +{"691027|28126897": ["Other relevant surveys on the theoretic areas of network coding are [3]\u2013[6]."]} +{"691027|1724544": ["If the reader searches surveys more focused on applications then the following are recommended [7], [8]."]} +{"691027|1684367": []} +{"691027|7800459": ["If the reader searches surveys more focused on applications then the following are recommended [7], [8]."]} +{"16210411|1110872": ["In High Performance Computing and Communication \n& 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), June 2012.", "\u2026Area Data Transfer Protocols for 100 Gbps Networks and Beyond Ezra Kissel School of \nInformatics and Martin SwanySchool of Informatics and ComputingIndiana UniversityBloomington, IN 47405ezkissel@indiana.edu \nComputingIndiana UniversityBloomington, IN 47405swany@iu.edu Eric PouyoulLawrence\u2026", "In Proceedings of \nthe 2012 ACM/IEEE international Conference For High Performance Computing, Networking, Storage and Analysis,Nov \n2012.", "In Proceedings of the 14th IEEE International Conference \non High Performance Computing and Communications (HPCC-12),2012.", "3.2 ESnet 100G Testbed Our performance analysis uses resources from ESnet s 100G Testbed5, which includes \na 100 Gbps wave connecting the National Energy Research Scienti.c Computing Center6 (NERSC) in Oakland, \nCA to StarLight7 in Chicago, IL.", "In Proceedings \nof the 2012 ACM/IEEE international Conference For High Performance Computing, Networking, Storage and \nAnalysis, SC Companion,Nov2012.", "Ef.cient Wide Area Data Transfer Protocols for 100 Gbps Networks and Beyond Ezra Kissel School of \nInformatics and Martin SwanySchool of Informatics and ComputingIndiana UniversityBloomington, IN 47405ezkissel@indiana.edu \nComputingIndiana UniversityBloomington, IN 47405swany@iu.edu Eric PouyoulLawrence Berkeley NationalLaboratoryBerkeley, \nCA 94720epouyoul@lbl.gov Brian Tierney Lawrence Berkeley National Laboratory Berkeley, CA 94720 bltierney@lbl.gov \n Due to a number of recent technology developments, now is the right time to re-examine the use of TCP \nfor very large data transfers.", "In IEEE/ACM Annual SuperComputing Conference (SC13), Denver CO, USA, 2013."]} +{"9485158|1230643": ["This type of WMNs includes mesh routers forming an infrastructure for clients that connect to them.", "Thus, protocols proposed for mobile ad hoc networks [34] and wireless sensor networks [8,9] are too cumbersome to achieve satisfactory performance in this application."]} +{"17315939|1580493": ["KEYWORDS | Network planning; optical communications; optical networks"]} +{"206584013|10837932": ["The recent development of green ICT equipment [117] - where the energy consumption depends on the load - can also be subject of future research in energy-aware VNE."]} +{"1521488|2623404": []} +{"1521488|10693567": ["Similarly, in case of new flows, if an OpenFlow switch receives a packet that does not match any forwarding rule, its first 200 bytes are next sent to the controller to initiate path computations, and installation of the respective switching rules (which can be also time-consuming [96]).", "The controller, being a dedicated software program designed to provide manipulation of the flow tables of switches, has a network-wide knowledge of a communication system [96].", "Data plane resilience [96] Explanation of time-consuming communications with the controller to provide forwarding rules of new flows", "The former solution being a single physical entity to manage all forwarding devices is, however, characterized by limited resilience capabilities due to representing a single point of failure, as well as reduced scalability [96]."]} +{"1521488|10559330": ["Behind this consideration, one can draw a parallel with the IntServ [62] / RSVP [63] protocol design: by driving routing decisions out of the network topology alone, RSVP provided no means to prevent the most impacting effect of shortest path routing: hyperaggregation while exacerbating memory scaling limits of \u201cshortest-path\u201d routing.", "To close the loop of our analysis, as IntServ parameters alone were unable to deliver proper routing metrics and decisions, if name spaces (and the entities / objects they relate to) are not associated to proper distance metrics, they will also be unable to provide proper routing decisions.", "One could thus characterize this second generation by its aim to reconcile Webcontent services with IntServ [62] / Resource Reservation Protocol (RSVP) [63] principles."]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"44901675|11414835": ["A comprehensive survey for designing SDN network virtualization can be found in [26]."]} +{"28704715|14776754": ["1, the shaping filter in the transmitter can be treated as a process of an original continuous-time signal being windowed by an up-sampled finite impulse response filter (FIR).", "Similarly, the corresponding matching filter in the receiver can be treated as a process of recovering the original signal symbol by a down-sampled FIR [9]."]} +{"341121|2623404": ["Various open interfaces [3] have been defined to communicate between the control plane and data plane (south bound interface), and OpenFlow [4] is a de-facto standard."]} +{"288949|18148591": []} +{"14967850|1580493": ["OFDM-based EONs have several advantages relative to existing WDM networks, including [7,9]", "recent survey of optical OFDM and related technologies, and how they impact network and control algorithm design, we refer the reader to [9].", ", beyond 100 Gbps) optical transmission [9]."]} +{"1645630|10837932": ["In this context, network virtualization has increasingly been seen as a solution to Internet ossification (the benefits of network virtualization go beyond Internet ossification to other contexts such as green networking [2])."]} +{"2138863|5882203": ["and Management, India\nSteering Committee Chairs\nGuojun Wang Guangzhou University, China Jie Wu Temple University, USA\nPublicity Chairs\nSajal Bhatia Fordham University, USA Yuan-Fang Chen University of Paris VI, France Shahriar Hossain Kennesaw State University, USA Rossi Kamal Kyung Hee University, South Korea William Liu Auckland University of Technology, New Zealand Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Mubashir Husain Rehmani COMSATS Institute of Information Technology, Pakistan Tian Wang Huaqiao University, China\nProgram Committee Members\nMd. Abdur Razzaque University of Dhaka, Bangladesh Mamoun Alazab Macquarie University, Australia A.B.M. Alim Al Islam Bangladesh University of Engineering and Technology, Bangladesh Hamid Ali-Abed-Al-Asadi Basra University, Iraq\nMd. Arafatur Rahman University of Naples Federico II, Italy Mohammad Asad Rehman\nChaudhry University of Toronto, and Soptimizer, Canada\nSaiful Azad University Malaysia Pahang, Malaysia Sajal Bhatia Fordham University, USA Tzung-Shi Chen National University of Tainan, Taiwan Yuan-Fang Chen University of Paris VI, France Phan Cong-Vinh Nguyen Tat Thanh University, Vietnam Salvatore Distefano University of Messina, Italy Yacine Djemaiel University of Carthage, Tunisia Subir Halder B.C. Roy Engineering College, India Mohammad Mehedi Hassan King Saud University, KSA Ragib Hasan University of Alabama at Birmingham, USA Raza Hasan Middle East College, Oman Shahriar Hossain Kennesaw State University, USA Jinkyu Jeong Sungkyunkwan University, Korea Rossi Kamal Kyung Hee University, Korea Joarder Kamruzzaman Monash University, Australia G\u00e1bor Kiss University Obuda, Hungary Ryan Ko University of Waikato, New Zealand Jianxin Li Beihang University, China Shan Lin Stony Brook University, USA Jialin Liu Lawrence Berkeley National Lab, USA William Liu Auckland University of Technology, New Zealand Xiangyong Liu Central South University, China Manuel Mazzara Innopolis University, Russia Subrota Kumar Mondol Hong Kong University of Science and Technology, Hong Kong, SAR China Felix Musau Kenyatta University, Kenya Mahmuda Naznin Bangladesh University of Engineering and Technology, Bangladesh Risat Mahmud Pathan Chalmers University of Technology, Sweden Sancheng Peng Guangdong University of Foreign Studies, China Mohammad Rahman University of Asia Pacific, Bangladesh Md. Obaidur Rahman Dhaka University of Engineering & Technology, Bangladesh Farzana Rahman James Madison University, USA", "Rumor routing [13] also uses the data-centric routing approach, events agent and queries all transmit in random direction, if them visit, the data on the event can be retrieved.", "In [12], Laud used an extremely abstract SMC process called Arithmetic Black Box [13] that utilizes a private index to achieve fast lookup function from private tables.", "Data locality is one of the most important concerns that determine the task execution time [13].", "Li Weigang University of Brasilia, Brazil Sheng Wen Deakin University, Australia Yuan Wu Zhejiang University of Technology, China Qing Yang Montana State University, USA Fengwei Zhang Wayne State University, USA Qingchen Zhang St. Francis Xavier University, Canada Shigeng Zhang Central South University, China Xuyun Zhang University of Auckland, New Zealand Yifan Zhang Binghamton University, USA\nXVI DependSys 2016 Organizing and Program Committees\nBigDataSPT 2016 Organizing and Program Committees\nWorkshop Chairs\nKim-Kwang Raymond Choo\nUniversity of Texas at San Antonio, USA\nZheng Xu Tsinghua University and Shanghai University, China\nProgram Committee Members\nElias Athanasopoulos Vrije Universiteit Amsterdam, The Netherlands Abir Awad Athlone Institute of Technology, Ireland Reza Azarderakhsh Rochester Institute of Technology, USA Aniello Castiglione University of Salerno, Italy Kim-Kwang\nRaymond Choo University of Texas at San Antonio, USA\nAli Dehghantanha University of Salford, UK Huan Du Shanghai University, China Virginia N.L. Franqueira University of Derby, UK Kun Gao Zhejiang Wanli Institute, China Jiankun Hu University of New South Wales at the Australian Defence Force Academy, Australia Joshua I. James Digital Forensic Investigation Research Laboratory, Ireland Thomas Kemmerich Gjovik University College, Norway Mehran Mozaffari Kermani Rochester Institute of Technology, USA Nhien An Le Khac University College Dublin, Ireland Tao Liao Anhui University of Science and Technology, China Lin Liu University of South Australia, Australia Yunhuai Liu Hong Kong University of Science and Technology, Hong Kong, SAR China Xiangfeng Luo Shanghai University, China Andrew Marrington Zayed University, United Arab Emirates Ben Martini University of South Australia, Australia Martin Mulazzani SBA Research, Austria Richard E. Overill King\u2019s College London, UK Carsten Rudolph Monash University, Australia Neetesh Saxena Georgia Institute of Technology, USA Mark Scanlon University College Dublin, Ireland Kathryn Seigfried-Spellar Purdue University, USA Matthew Simon INTERPOL Global Complex for Innovation\nSimon Tjoa St. Poelten University of Applied Sciences, Austria Jeroen van den Bos Netherlands Forensic Institute, The Netherlands Xiao Wei Shainghai University, China Lena Wiese Georg-August Universit\u00e4t G\u00f6ttingen, Germany Zhiguo Yan Fudan University, China Neil Yen Aizu University, Japan Xiaobo Yin Anhui University of Science and Technology, China Shunxiang Zhang Anhui University of Science and Technology, China Guangli Zhu Anhui University of Science and Technology, China\nXVIII BigDataSPT 2016 Organizing and Program Committees\nWCSSC 2016 Organizing and Program Committees\nProgram Chairs\nYupeng Hu Hunan University, China Wenjia Li New York Institute of Technology, USA\nProgram Committee\nHabib Ammari ETH Z\u00fcrich, Switzerland Victor Chen Valdosta State University, USA Daniel Grosu Wayne State University, USA Tahar Kechadi University College Dublin, Ireland Vimal Kumar University of Waikato, New Zealand Rui Li Hunan University, China Xiaolong Li Guilin University of Electronic Technology, China Fang Liu National University of Defense Technology, China Yonghe Liu UT-Arlington, USA Enzo Mingozzi University of Pisa, Italy Fei Peng Hunan University, China Zheng Qin Hunan University, China Danda Rawat Georgia Southern University, USA Xiaojun Ruan West Chester University of Pennsylvania, USA Kewei Sha University of Houston Clear Lake, USA Houbing Song West Virginia University, USA Nong Xiao National University of Defense Technology, China Quan Xu City University London, UK Shu Yin Hunan University, China Jianping Yu Hunan Normal University, China Sherali Zeadally University of Kentucky, USA Jiliang Zhang Northeastern University, China Siwang Zhou Hunan University, China\nSponsors of SpaCCS 2016 Workshops\nXX WCSSC 2016 Organizing and Program Committees\nContents\n7th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2016)\nSecurity and Privacy in Big Data Lifetime: A Review . . . . . . . . . . . . . . . .", "73\nShaobo Zhang, Qin Liu, and Guojun Wang\n6th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-16)\nAppWalker: Efficient and Accurate Dynamic Analysis of Apps via Concolic Walking Along the Event-Dependency Graph . . . . . . . . . . . . . 85\nTianjun Wu and Yuexiang Yang\nCapaDroid: Detecting Capability Leak for Android Applications . . . . . . . . . . 95 Tianjun Wu and Yuexiang Yang\nResearch and Implementation Key Technology of Security Mobile Office . . . 105 Feng Qiu and Xiaoqian Li\nMakespan Minimization for Batch Tasks in Data Centers. . . . . . . . . . . . . . . 115 Xin Li and Cui Tang\nOpportunistic Resource Sharing Based Elastic Resource Allocation in a Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124\nGuoquan Yuan, Songyun Wang, Mingming Zhang, Yefei Li, Xin Li, Tiantian Wang, and Zhuzhong Qian", "For those modeled environment-dependent APIs or fields which cannot be directly injected, such as emulator checkers or timing bombs, we set them with the solution we get from the SMT solver facilitated by Android InstrumentationTestRunner [13].", "Wei Yuan [13] improved the efficiency and accuracy of Nutch by optimizing relevant parameters and models of Nutch.", "In literature [13], the JRM (JPEG Rich Model) feature is proposed to capture the embedding changes to DCT coefficients more comprehensively.", "1 Acteve, benchmark, and corresponding coverage measurement tools are all taken from the AndroidTest [13] project.", "L4Android [13] proposed a general framework for the operation system, and ran the original smartphone operating system in the virtual machine.", "In this work, we examine the malware detection rate on the basis of four classifiers from the Weka [13] i.", "Although some work [13,14,17] have noticed the dynamics nature even raise some deterministic model, the resource change obtained by prediction bear uncertainty and the core idea is to optimize resource deployment to match the demand of applications without consideration of providing info from application layer."]} +{"1580493|11720829": ["Depending on the relationship between the signals transmitted from different antennas, MIMO schemes can be used to either increase the overall capacity of the system, or to reduce the probability of outage [59][61]."]} +{"11414835|207262843": []} +{"11414835|801245": []} +{"11414835|2535224": ["SDN issues specific to cloud computing, optical, as well as mobile and satellite networks have been covered in [109]\u2013[126].", "cost of the network needs to be amortized from the services to a relatively limited subscriber community [248]\u2013[251], virtualizing the installed physical access network is a very promising strategy [126], [252]\u2013[255]."]} +{"11414835|15035771": ["while SDN scalability and resilience has been surveyed in [132]\u2013[134]."]} +{"11414835|2623404": []} +{"11414835|10693567": ["An instrumentation and analytics framework for virtualized networks has been outlined in [48] while convergence mechanisms for networking and cloud computing have been surveyed in [23], [49]."]} +{"11414835|2387055": []} +{"11414835|16219347": []} +{"11414835|16332018": []} +{"11414835|11195746": ["A demonstration of the HyperFlex architecture, which shows control plane isolation, was provided in [167].", "OpenVirteX tackles the so-called flowspace problem: The use of OF header fields to distinguish vSDNs prevents hypervisors from offering the entire OF header fields space to the vSDNs. OpenVirteX provides each tenant with the full header fields space.", "If one vSDN is trying to over-utilize its available bandwidth, no cross-effect should be seen for other vSDNs."]} +{"1530749|14639861": ["There is a large amount of literature regarding flexibility measurement in the context of manufacturing [28\u201330] and embedded systems [31\u201334]."]} +{"18442659|10693567": ["The growth in traffic volumes, changing traffic profiles and types of applications prompted service providers to rethink not only how to optimally engineer their IP and optical backbone networks, but also to ease their operational and management overhead."]} +{"18242131|2854761": ["This property has been widely investigated in EPONs [7], [8], [17] and WiMAX [18] separately, but few work has been done in the integration.", "Previous research efforts on WiMAX scheduling, resource allocation, and admission control in the downstream direction have been extensively reported [18], and the additional consideration of EPON on top of WiMAX has not brought up more issues due to the broadcast-in-nature transmission in both systems."]} +{"10437714|8280144": ["Furthermore, in [92], the authors showed\n9Alpha-stable distributions generalize Gaussian distributions and have heavier tails [10, Sec."]} +{"14329113|14961769": ["Similarly authors in [14] propose taxonomy to categorize existing works based on three main techniques, reducing queue length, prioritizing mice flows, and exploiting multi-path."]} +{"21608033|2623404": ["solutions combined with resource virtualization and distributed cloud computing [12]."]} +{"21608033|10693567": ["SDN-enabled optical network devices, provisioned through protocols like OpenFlow (OF) [13], along"]} +{"18016674|2623404": ["Compared with virtualized IT infrastructures, the current network infrastructures that connect the datacenters present ossification to provide emerging Internet services [1]."]} +{"801245|17336376": []} +{"801245|1230643": []} +{"801245|12060835": []} +{"5969377|1580493": ["BVTs [15] are used to tune the bandwidth by adjusting", "[11] presented a spectrum efficient elastic optical network based on OFDM technology [15], [18].", "optical networks [11]\u2013[15] have been shown to be a promising", "Recent studies [15], [59], [60] on modulation based spectrum allocation claim that this type of spectrum allocation scheme increases the spectral utilization by approximately 9%\u201360% compared to fixed-modulation based spectrum allocation in the elastic optical network."]} +{"16972183|3936425": [", coordinated multi-point transmission and reception (CoMP), to cope with the increased interference between cells [15]."]} +{"2535224|2623404": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16]."]} +{"2535224|10693567": ["Network devices become simple packet forwarding and processing devices (the data plane) that can be programmed via an open interface[14], such as OpenFlow[15,16].", "OpenFlow[15][16][28] is the most recognized realization of SDN."]} +{"52870530|16514036": []} +{"52870530|8836911": []} diff --git a/edge/graph_86509911.jsonl b/edge/graph_86509911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1222d491d874b8728b72071a041fb6cbe5200eec --- /dev/null +++ b/edge/graph_86509911.jsonl @@ -0,0 +1,43 @@ +{"11333803|1113420": ["There are open issues in various aspects of SA, such as selectively propagating\n1http://chopin.isr.uc.pt\n978-1-4799-0880-6/13/$31.00 \u00a92013 IEEE\ninformation to distributed users based on context sharing and information utility assessment."]} +{"37614049|1113420": []} +{"37593975|1236072": ["There have been a good number of state-of-the-art routing protocols proposed (Al-Karaki and Kamal, 2004) for WSN.", "The network and radio models used in the simulation are similar to the model discussed in Al-Karaki and Kamal (2004) Heinzelman et al. (2002)."]} +{"3376258|21738890": ["Yurur et al. [4,5] introduced a clear description of context and a two-level context model (i.e., low-level context and high-level context) where the low-level context is the atomic relevant context and the high-level context is the composition of low-level and/or high-level contexts."]} +{"3376258|3348390": ["Currently, the increasing interest in contextual information has led to considerable research on the higher-level information fusion [6,7]."]} +{"1502317|18194234": ["trust and reputation [45], Goal [46], Domain [47] and etc, which we call other context."]} +{"1502317|9123526": ["DAML-S [19], OWL-S [20], WSDL-S [21], WSML [22] and the like."]} +{"44893094|1113420": ["[15] \u2013 in their survey of context aware systems \u2013 note the common layered approach to context aware system design; also noted by Hong et al.", "There are two broad sensor categories in context aware systems [15, 103]: physical sensors, which supply data about context sources to the system through physical interfaces, e.", "For our overview of mobile context sensors, we use an important distinction between two sensor types \u2013 physical sensors and virtual sensors [15, 103].", "Ground for original contribution lies in \u2018virtual\u2019 sensing [15], e.", "[15] expanded the generality of this distinction and argued that almost anything in a user\u2019s physical or virtual environment \u2013 providing it can transduce a data source into machine readable data \u2013 could be considered as a potential sensor of context.", "We then explain the distinction between \u2018physical\u2019 and \u2018virtual\u2019 sensors \u2013 a distinction which has arisen in the literature [15, 103].", "\u2018virtual\u2019 sensors, which can \u2018sense\u2019 context data from virtual sources such as software applications or network APIs [15, 83, 103]."]} +{"14179932|14745481": ["Consider this simple example to better understand the significance of the problem: suppose one vehicle has a message and it has two neighbors from which it chooses to forward its message."]} +{"3348390|9429730": []} +{"3348390|1113420": ["There are several popular context modelling techniques [10], [122] used in context-aware computing.", "[10]: sensors \u2192 raw data retrieval \u2192 reprocessing \u2192 storage \u2192 application.", "[10] in 2007 on context-aware systems and middleware solutions using different taxonomies."]} +{"10993303|7644489": []} +{"14643183|1113420": ["Context aware systems are able to adapt their operations to the current context without explicit user intervention and to increase usability and effectiveness by taking into account environment context [1]."]} +{"22818333|5660618": []} +{"2075465|2509135": ["The readers may refer to other publications in recent reviews [217], [218] and recent special issues, e."]} +{"2075465|12601073": []} +{"12948905|28487730": ["Different middleware implementations integrate these requirements and provide concepts for an aggregation of communication quality information [6], [7]."]} +{"16797915|2187403": []} +{"16797915|1113420": []} +{"13639132|6442720": ["Sensing is what allows a system to interact with its environment in a flexible and non-deterministic way, as opposed to performing preprogrammed actions based on a set of scheduled functions and/or rule sets [56]."]} +{"13639132|1377349": ["Extensive and very recent reviews can be found in [58], [61], [62], [63], [64], [59] and [65]."]} +{"13639132|1734833": ["Extensive and very recent reviews can be found in [58], [61]\u2013[64], [59], and [65]."]} +{"13639132|7681233": ["However, because many datasets are not specifically collected for the purpose of evaluating trust models, they may lack the ground truth about the user behaviour to facilitate more in-depth analysis of the performance of proposed trust models [18].", "[18] include in their survey of trust models a survey of performance assessment methods for such models.", "A number of existing surveys of computational trust have been made [16], [10], [17], [18]."]} +{"13639132|2383780": ["Sensor fusion [89] is the process of combining the sensory data coming from disparate sources in a way that (1) reduces the uncertainty resulting from separate treatment of the sources and/or (2) unveils properties of the sensed environment that were not obvious when using separate", "The interested reader can find thorough reviews of the general fusion architectures in a number of studies from different historical periods [89], [95]\u2013[97].", "From a project management perspective, in [89], the author describes abstract, generic and rigid architectures."]} +{"16888452|15219853": ["[9])."]} +{"59748381|913718": []} +{"39126216|1708582": ["Warp-5 uses a continuous-learning (cid:4) - greedy mechanism [32] to learn which transmission rate takes the shortest time in dynamically changing noise conditions."]} +{"15463998|7972041": ["\u2022 Due to varying vehicular tra\ufb03c density and mobility, the network topology is highly dynamic and depends on the time of day, type of road and other features [40, 41]."]} +{"4622528|7774517": ["An extensive survey is presented in [21].", "Moreover, multivariate data require the appropriate choice of input parameters and impose an increased computational cost making the neighbor-based approaches to lack scalability [21].", "However, in real scenarios, this could not be the case making the parametric approaches useless [21].", "cation methods are computationally expensive [21]."]} +{"16431339|12452682": []} +{"14070805|17157304": ["For instance, Blanzieri and Bryl [5] present a review on a variety of spam \ufb01ltering methods, and compare them, reaching the conclusion of that they are successful in general, but yet in-su\ufb03cient."]} +{"16035303|1113420": ["Aggregation at the inference level provides application developers with data on a higher level of abstraction [4] and is usually materialized on some kind of semantic aggregation."]} +{"17102876|18315187": ["This indicates that the topology of CRSN is changing un-\npredictably due to PUs\u2019 activities and causes considerable difficulty in guaranteeing stable and efficient communications (Cesana et al., 2011; Akan et al., 2009; Ali et al., 2011)."]} +{"18722494|14745481": ["proposed and studied during the last decade [5]."]} +{"6557804|8250043": ["QoE Loss score is evaluated for SMF in a context aware environment.", "I. INTRODUCTION\nService oriented software architecture (SOA) [1] is based on software components that provide functionality as a service."]} +{"20422764|8835588": ["Context facilitates in defining which knowledge should be considered, what are its conditions of activation and limits of its validity, and when to use it [18].", "[18] considered context as an attribute of the interactions among agents, as opposed to context being a", "situation and to present the minimal number of information pieces and essential functions that are necessary to the task at hand [18]."]} +{"196140820|205286236": []} +{"13927835|24847": ["[2] provide a catalogue of mechanisms for self-organisation in terms of modular and reusable design patterns.", "We have proposed SAPERE [1] as an architecture for orchestrating interactions across such service ecosystems, with data lifecycle and communications regulated by bio-inspired mechanisms with robustness, scalability and adaptability characteristics [2]."]} +{"13927835|17183431": ["Aspects of autonomous adaptation are achieved following the natural inspiration [14] through designing self-organising system rules called eco-laws that \u2013 by executing actions upon a small set of co-located LSAs \u2013 make global properties emerge.", "To this end, several natural metaphors can be exploited, borrowing from physics, chemistry, biology, or social systems [14]."]} +{"5415500|1113420": ["[29] suggest the structure of a context-aware application based on layers."]} +{"41450352|7704963": []} +{"41450352|1113420": []} +{"10826583|1113420": ["Context-aware systems are those systems that are capable of adapting their operations to the current context without user interaction and are thus aimed at augmenting usability and effectiveness by taking into account the environment\u2019s contextual information [28]."]} diff --git a/edge/graph_86511707.jsonl b/edge/graph_86511707.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86512149.jsonl b/edge/graph_86512149.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fc139cd2a6fb9ce525b3b72a7f84a7d670f51cfb --- /dev/null +++ b/edge/graph_86512149.jsonl @@ -0,0 +1,68 @@ +{"13721549|207262843": []} +{"3501584|42420797": ["service delivery models and thus require new security aspects [26], [27]."]} +{"3501584|15449163": ["Some of his previous professional positions include serving as a Senior Member of scientific staff and a Technical Advisor at Nortel Networks, a Senior Systems Engineer and a Technical Advisor at several start-up companies,\nan Assistant Professor at the University of Puerto Rico at Mayag\u00fcez, and a Senior Researcher at the National Institute of Standards and Technology.", "I. INTRODUCTION 5th generation wireless systems, or 5G, are the next generation mobile wireless telecommunications beyond the current 4G/InternationalMobile Telecommunications (IMT)Advanced Systems [1].", "INTRODUCTION 5th generation wireless systems, or 5G, are the next generation mobile wireless telecommunications beyond the current 4G/InternationalMobile Telecommunications (IMT)Advanced Systems [1]."]} +{"3501584|6779551": ["One of the potential security requirements is to minimize the security-related signaling overhead to ensure the efficiency [20], [73]."]} +{"3501584|595093": ["In use cases such as smart meters in smart grid [50], data integrity service needs to be provided against manipulation."]} +{"1262239|12675271": ["In a smart city scenario, resources should be distributed within the network ensuring that the micro-services that make up an application are allocated and instantiated close to the end device that is requesting the IoT application [8]."]} +{"1262239|24110634": ["Fog computing brings computing power, storage and memory capacity closer to wireless gateways, sensors and actuators since these devices are currently lacking in terms of such capacities [4]."]} +{"1262239|19938676": ["In fact, the upcoming 5G networks aim to tackle these new business opportunities by introducing very high carrier frequencies, an enormous number of antennas and new functionalities, such as Device-to-Device communication (D2D) and fog computing [2]."]} +{"3757382|18687271": []} +{"32861557|28209458": []} +{"32861557|16378550": []} +{"32861557|19938676": []} +{"32861557|6779551": []} +{"32861557|2521001": []} +{"32861557|4395259": []} +{"6139108|4395259": ["2505728 been attracted much interest in the research community [1], [2] which is the scop of this paper."]} +{"31559932|595093": ["Incorporation of AMI, however, increases the attack surface and makes the grid more vulnerable to potential cyberattacks from malicious users to sabotage electricity infrastructure, cause blackouts, or incur financial losses for either the consumers or the utilities [10], [11], [12]."]} +{"3568397|4269723": ["At first, it enables the management capabilities and the dynamic network resource allocation required by a fifth-generation (5G) vehicular communication framework [10].", "As discussed in Section 2, this approach is largely adopted in the research domain on SDN, where decoupling the network functionalities from the RAT in use enables high system programmability, and abstracts the network infrastructure from services [10]."]} +{"2014729|25911553": ["Virtualization (NFV) technologies considered as key drivers to paving the way towards the 5G era, as discussed in a recent survey published in 2017 [245]."]} +{"2014729|18167210": ["[50] [25] [15] [52] [51] [39] [18] [43] [35] [53] [40] [8] [55] [57] [19] [34] [30] [54] [46] [58] 2016"]} +{"2014729|2663804": ["Location privacy is one of the most important models for privacy, as discussed in our previous surveys in [9] [187]."]} +{"2014729|2756896": []} +{"2014729|16527268": [" in telecare services [223]). For more details in the \ufb01eld of wearable biometrics and in the security and privacy issues in implantable medical devices, we refer the reader to the both recent surveys [221] and [224]. For security of 4G and 5G networks using Biometric-based identi\ufb01cation, it is required that the client does not learn anything on the database. Therefore, according to Barni et al. [118], ", "e authentication. The protocol [79] is ef\ufb01cient in term of low computation for smart cards 17 compared to three-factor authentication schemes in [219] and [220]. Therefore, according to Blasco et al. [221], the biometric systems can mainly be classi\ufb01ed into three categories: 1) Traditional Biometric Systems (e.g., Windows Hello [222]), 2) Wearable biometric systems (e.g., Using a smartphone), and 3) Hy"]} +{"2014729|3270620": [" 2011 [44] 2012 [12] [42] [29] [32] [23] 2013 [47] [24] [33] [16] [13] [21] [31] 2014 [45] [17] [48] [49] [14] [34] [60] [20] [59] [36] 2015 [50] [25] [15] [52] [51] [39] [18] [43] [35] [53] [40] [8] [55] [57] [19] [34] [30] [54] [46] [58] 2016 [14] [37] [41] [56] 2017 TABLE V COMPARISON OF RELATED SURVEYS IN THE LITERATURE (SURVEY ON SECURITY AND PRIVACY FOR 4G AND 5G CELLULAR NETWORKS) p :indicates ", "] [8] [26] [27] p [38] [39] [40] [41] p [42] [43] p [44] [45] [46] p [29] [30] [31] p [32] p [47] [8] p [33] [34] p [16] [17] [18] [19] [20] [21] p [48] p [49] p [50] [51] p [52] p [35] p [53] [54] p [55] [56] p [57] [20] [36] p [37] p [58] [59] p [60] p [20] p Tracingattack Disclosureattack Privacyviolation Masqueradeattack Chosen-plaintext attack Stalkingattack Adaptivechosen ciphertextattack Spoofi"]} +{"2014729|21930333": []} +{"2014729|16378550": ["\u2026articles, one dealing with scheduling and interference mitigation [11], [12], [13], [14], [15], [8], the other with D2D Communication [16], [17], [18], [19], [20], [21] and the third with security and privacy issues [22], [23], [24], [25], [8], [26], [27], all areas of research that are somehow\u2026"]} +{"2014729|4502294": []} +{"2014729|10979806": ["This increase on the number reveals an increase on the importance that researchers from around the world give on the new technology and the issues that arise regarding standardization [29], [30], [31], mobile internet applications [32], resource and mobility management [33], [34], energy [35], MIMO techniques [34], [20], [36], social perspectives [37] and so on (See Table III for detailed categorization).", "[50] [25] [15] [52] [51] [39] [18] [43] [35] [53] [40] [8] [55] [57] [19] [34] [30] [54] [46] [58] 2016"]} +{"2014729|207262843": ["[50] [25] [15] [52] [51] [39] [18] [43] [35] [53] [40] [8] [55] [57] [19] [34] [30] [54] [46] [58] 2016"]} +{"2014729|7074478": [" [23] 2013 [47] [24] [33] [16] [13] [21] [31] 2014 [45] [17] [48] [49] [14] [34] [60] [20] [59] [36] 2015 [50] [25] [15] [52] [51] [39] [18] [43] [35] [53] [40] [8] [55] [57] [19] [34] [30] [54] [46] [58] 2016 [14] [37] [41] [56] 2017 TABLE V COMPARISON OF RELATED SURVEYS IN THE LITERATURE (SURVEY ON SECURITY AND PRIVACY FOR 4G AND 5G CELLULAR NETWORKS) p :indicates fully supported; X: indicates not s", "] p [42] [43] p [44] [45] [46] p [29] [30] [31] p [32] p [47] [8] p [33] [34] p [16] [17] [18] [19] [20] [21] p [48] p [49] p [50] [51] p [52] p [35] p [53] [54] p [55] [56] p [57] [20] [36] p [37] p [58] [59] p [60] p [20] p Tracingattack Disclosureattack Privacyviolation Masqueradeattack Chosen-plaintext attack Stalkingattack Adaptivechosen ciphertextattack Spoofingattack Messageblocking Tamperingat"]} +{"2014729|15449163": ["Among the aforementioned surveys, the security and privacy issues that are related to the 4G and 5G networks were thoroughly covered and analyzed in previous works [22], [23], [24], [25], [8], [26], [27].", "Based on this categorization it is obvious that except from three big categories of articles, one dealing with scheduling and interference mitigation [11], [12], [13], [14], [15], [8], the other with D2D Communication [16], [17], [18], [19], [20], [21] and the third with security and privacy issues [22], [23], [24], [25], [8], [26], [27], all areas of research that are somehow related to 3G, 4G and 5G networks were surveyed and presented in previous surveys from at least one review article.", "(2016) [8] X X \u221a X X - Presented the challenges in security and privacy in 5G networks.", "findings, it is obvious that guaranteeing a high level of security and privacy will be one of important aspects for the successful deployment of 5G networks [8].", "[50] [25] [15] [52] [51] [39] [18] [43] [35] [53] [40] [8] [55] [57] [19] [34] [30] [54] [46] [58] 2016"]} +{"2014729|19938676": ["\u2026one dealing with scheduling and interference mitigation [11], [12], [13], [14], [15], [8], the other with D2D Communication [16], [17], [18], [19], [20], [21] and the third with security and privacy issues [22], [23], [24], [25], [8], [26], [27], all areas of research that are somehow related to\u2026", "\u2026on the new technology and the issues that arise regarding standardization [29], [30], [31], mobile internet applications [32], resource and mobility management [33], [34], energy [35], MIMO techniques [34], [20], [36], social perspectives [37] and so on (See Table III for detailed categorization)."]} +{"2014729|17787193": []} +{"2014729|14765802": []} +{"2014729|35867035": []} +{"2014729|5313655": ["\u2026to Blasco et al. [221], the biometric systems can mainly be classi\ufb01ed into three categories: 1) Traditional Biometric Systems (e.g., Windows Hello [222]), 2) Wearable biometric systems (e.g., Using a smartphone), and 3) Hybrid biometric systems (e.g., Hybrid systems arises in telecare services\u2026"]} +{"2014729|37069150": []} +{"2014729|25929315": ["RMM D2D DO HM SDN US ENE BN DNMA MIMO Soc CC mmWave Archi [11] [12] [13] [14] [15] [8] p [22] [23] [24] [25] [8] [26] [27] p [38] [39] [40] [41] p [42] [43] p [44] [45] [46] p [29] [30] [31] p [32] p [47] [8] p [33] [34] p [16] [17] [18] [19] [20] [21] p [48] p [49] p [50] [51] p [52] p [35] p [53] [54] p [55] [56] p [57] [20] [36] p [37] p [58] [59] p [60] p [20] p Tracingattack Disclosureattack Priv", "rk to use with arbitrary auxiliary channels in order to detect the MITM attack 5 TABLE IV YEAR OF PUBLICATION Ref. Year [26] 2007 [11] [22] [27] 2010 [38] 2011 [44] 2012 [12] [42] [29] [32] [23] 2013 [47] [24] [33] [16] [13] [21] [31] 2014 [45] [17] [48] [49] [14] [34] [60] [20] [59] [36] 2015 [50] [25] [15] [52] [51] [39] [18] [43] [35] [53] [40] [8] [55] [57] [19] [34] [30] [54] [46] [58] 2016 [14] "]} +{"2014729|7892994": ["\u2026on this categorization it is obvious that except from three big categories of articles, one dealing with scheduling and interference mitigation [11], [12], [13], [14], [15], [8], the other with D2D Communication [16], [17], [18], [19], [20], [21] and the third with security and privacy issues\u2026"]} +{"7306047|26259297": []} +{"46983698|10147053": ["However, the security operation in application layer is insufficient to provide satisfied security options, especially inmobile networks [3]."]} +{"46983698|6779551": ["Encryption is one effective solution to protect security and privacy in social networks [1]."]} +{"46983698|4395259": ["the AES-256 [2]."]} +{"49325121|21629724": ["Al-Qurishi et al. [5] published a survey on the Sybil defense techniques in OSNs."]} +{"49325121|2756896": ["Ferrag et al. [44] gave a survey on the privacy-preserving schemes for ad-hoc social networks."]} +{"49325121|10777439": ["Yu and Chen [179] gave a survey on Point-of-interest (POI) recommendation in location-based social networks."]} +{"49325121|3583771": ["The authorization helps to block the unwanted users from connecting communities or trying to build a relationship with other users [162] [155].", "The access con-trol provides restriction over unwanted information sharing in the public domain over the social media [30] [155]."]} +{"49325121|205488310": ["Bouadjenek et al. [18] presented the survey on the social information retrieval approaches and platforms for OSNs."]} +{"6197039|6779551": []} +{"6197039|4395259": ["tutorial papers for physical layer security research [11]\u2013[14]."]} +{"5035162|3456635": ["However, few of them are aimed at the security-related data in the era of big data and are not suitable for a large-scale heterogeneous network system [63], [64]."]} +{"3694894|206578224": []} +{"28617162|3330461": ["While the literature on D2D communications is abundant [31], the majority of articles focuses on issues such as scheduling, interference management, power allocation, and architectural enhancement."]} +{"15612264|4395259": ["A large number of secrecy transmission techniques and schemes have been proposed for wireless communications (refer to [15] and its references)."]} +{"5054763|2623404": []} +{"44069400|2014729": ["Thirty-five types of cyber attacks have been identified as major threats on privacy, authentication, integrity and availability in 5G network [14],", "attack, tracing attack and tampering attack [14]."]} +{"3412534|2088679": []} +{"3412534|6909107": []} +{"44162212|18687271": []} +{"44192772|4502294": ["The 5G is expected to enhance three major usage scenarios: eMBB (enhanced Mobile Broadband), mMTC (massive Machine Type Communications) and URLLC (Ultra-reliable and Lowlatency Communications) [6]\u2013[8]."]} +{"8207496|5991584": ["Prefix attestation has also been proposed to prevent IP prefix hijacking in inter-domain [9, 19, 20, 28, 31] and intra-domain [25, 29] IP routing.", "We compare our approach with a signature based mechanism adopted in most of the prefix attestation proposals [9, 19, 20, 28, 31, 34]."]} +{"20384442|4735659": [", [96]\u2013[98] and [99]."]} +{"20384442|37564067": ["This is an important property because any resource allocation scheme without holding this property may be vulnerable to market manipulation and reduce the revenue for the seller due to the low valuations [24].", "One common method for proving the existence and uniqueness of the Nash equilibrium is to check if the strategies of the players are non-empty, compact, and convex, and if their utility functions are concave or quasiconcave [24].", "with low computational complexity [24].", "A number of auctions and their descriptions can be found in [24] and [30]."]} +{"20384442|18750590": [" e.g., picocells/femtocells, and user devices, the edge/fog computing pushes the frontier of cloud resources and services away from the remote data 32 centers to the periphery or edges of the network [26]. As a result, the edge/fog computing (i) signi\ufb01cantly reduces the data traf\ufb01c, cost, and latency, (ii) alleviates the major bottleneck and the risk of a potential point of failure, and (iii) provides", "ve to misreport their true demands which can lead to higher utility. 4) Forward, reverse auction, and double auction: Considering the sides of sellers and buyers, auctions can be classi\ufb01ed as follows [26]: Forward and reverse auctions: In the forward auction, multiple buyers compete for commodities by submitting their bids, i.e., bidding prices, to one seller. On the contrary, in the reserve auction", "imal strategies is challenging. C. Auction Auction is an ef\ufb01cient way of allocating resources to buyers which value the resources the most. A number of auctions and their descriptions can be found in [26] and [19]. The following brie\ufb02y presents the major auctions used in this survey. Note that an auction typically consists of three entities: buyers, i.e., bidders, sellers, and an auctioneer. The aucti", "between the utility associated with its resource allocation and the cost that the user pays the MNO for using the resources. To solve the NUM problem, price update schemes can be used as presented in [26]. Brie\ufb02y, by applying the dual decomposition and gradient methods, the MNO iteratively updates resource prices. Also, the users iteratively select their amounts of resources to maximize their own net ", "ned Networking (SDN) NFV and SDN allow 5G to ef\ufb01ciently accommodate a wide range of services over a common network infrastructure. While the SDN decouples the network control and forwarding functions [26], the NFV decomposes network functions from the physical network equipments. Such software-based solutions can provide the programmability, \ufb02exibility, and modularity that are required to create multi"]} +{"20384442|19938676": ["For example, the survey of emerging technologies of 5G was given in [7], the survey of resource management toward 5G was presented in [8], and the survey of user association in 5G was given in [9]."]} +{"20384442|8833120": ["The repeated game allows players to repeat a so-called stage game over multiple periods to achieve their objectives [64]."]} +{"20384442|17062686": []} +{"31022395|2623404": ["However, it suffers from scalability and latency issues [4].", "Nevertheless, the advent of the OpenFlow interface has given a new lease on life to SDN [4].", "[4] B."]} diff --git a/edge/graph_8652282.jsonl b/edge/graph_8652282.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a0e03b872923eb7b365427954b3831664be6973 --- /dev/null +++ b/edge/graph_8652282.jsonl @@ -0,0 +1,44 @@ +{"44686919|205286988": []} +{"44686919|1230643": ["WSN has a wide range of potential applications [10], including military surveillance, disaster prediction, environment monitoring, etc."]} +{"26929195|562065": ["These SNs can be randomly deployed for mon-itoringandprocessingvariousapplications[4,5],suchasmil-itary operations, health care operations, technological operations, forest \ufb01re monitoring, localization based operations [6,7] etc."]} +{"19844568|1230643": ["(28) Construct the BA [S, M[2], Ph, d]; (29) L2: Next-Hop-Selection;", "A sensor network is an infrastructure composed of sensing, computing, and communication elements that give a user or administrator the ability to instrument, observe, and react to events and phenomena in a specific environment [1, 2].", "(16) [dp]\u22c5SPDT \u2190 Pid; (17) } (18) D = Destination ID (sink ID); (19) FA [S, M[2], D] = forward ant [source ID, memory of forward ant, Destination ID]; (20) Ph = amount of Pheromone; (21) C = initial energy; (22)BA [S, M[2], Ph, D] = Backward Ant [Source ID, Memory of backward ant, Pheromone value, Destination ID]; (23) E[] = visibility array; (24) r = Intermediate node ID; Function 2: Decision making (25) //If the intermediate node is equal to the destination node, then calculate the pheromone and construct the backward ant (26) L1: If (r = d)"]} +{"29820714|14441987": ["On the network layer, the traditional non-cooperative routing schemes applied in the wireless ad-hoc networks are reviewed in [22]."]} +{"15066257|763939": ["We first discuss the widely used simulations and then the important but hard-toconduct real-world experiments."]} +{"34938755|1236072": ["The \ufb02at based routing protocol assign the same functionality to all nodes [48].", "Therefore the sensor nodes should be able to survive with a small \ufb01nite source of energy [48, 49].", "They try to save energy through negotiation and elimination of redundant data [48].", "Mobility in tandem with energy ef\ufb01ciency in a wireless sensor network endows with signi\ufb01cant challenges for routing [25, 48, 58, 95]."]} +{"34938755|2835258": ["The main disadvantage is that the cost of position update and queries becomes very high if the quorum sets are large [81]."]} +{"9841064|1236072": ["A key determinant of their effectiveness is their longevity, which is limited by the energy that can be stored in each node [1], [2]."]} +{"1795063|205286988": []} +{"1795063|1230643": ["WSNs have broad application fields such as military surveillance, environment monitoring and forecast, structural monitoring and target tracking, home network and healthcare etc. [1\u20134]."]} +{"14657763|1236072": ["After deployment, once one or more sensor nodes sense the target stimulus in their monitored area, one node (known as the \"source\") immediately reports back the relevant data, such as location and temperature, to the observer (known as the \"sink\") via the wireless channel to a laptop or hand-held mobile device [2]."]} +{"36029380|1236072": ["Moreover, the protocols must be scalable, and performance-efficient, with an ability to keep the network alive for a longer period of time [3]."]} +{"206584302|5002530": ["Although the mobility of the sink is bene\ufb01cial due to the dif\ufb01culty in compromising and snif\ufb01ng, in multiple mobile sink strategy, the probability that a malicious node plays the role of sink node and collects the data is very high [76], [77]."]} +{"206584302|1236072": ["Greedy geographic routing is regarded as highly scalable and energy-ef\ufb01cient; therefore, it is an attractive routing solution for WSNs with position-aware sensors [21], [22]."]} +{"41804858|10096622": ["Therefore, we propose the light-weight PSO due to its simplicity, fast convergence, and not heavy computational burden [18].", "Comparing with the ABC, the PSO needs fewer parameters to adjust, and has been applied in the routing protocols of WSNs [16,18] more frequently."]} +{"51909332|1230643": ["Hence, many energy conservation schemes [1] were proposed to battle the constraint."]} +{"3755658|1236072": ["in [1] presented a comprehensive survey of routing techniques which are classified based on the network structure and protocol operation respectively, and outlined challenges and future research directions in this aspect.", "In general, the application scenarios of a WSN include target field imaging, intrusion detection, weather monitoring, security and tactical surveillance, distributed computing, detecting ambient conditions such as temperature, movement, sound, light, or the presence of certain objects, inventory control, and disaster management [1].", "Normally, according to the underlying network structure, the traditional WSNs routing protocols fall into three classes known as flat, hierarchical and location-based [1]."]} +{"8559476|41035405": ["Cooperative diversity schemes proposed by the information theory community [21, 16] suggest an alternate approach that may yield higher throughput."]} +{"14263058|1236072": ["Once a sensor node senses the existence of objects or the stimulus made from objects in its deployed environment, it immediately reports the interesting data, such as the object\u2019s location, to the observers [2]."]} +{"14263058|2835258": []} +{"3491029|14132386": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|17872696": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|3117516": ["There have been several surveys (Karaki and Kamal, 2004; Villalba et al., 2009; Singh et al., 2010; Baranidharan and Shanti, 2010; Halawani and Khan, 2010; Celik et al., 2010; Saleem et al., 2011; Zungeru et al., 2012) on the routing protocols for WSNs."]} +{"3491029|1236072": []} +{"3491029|1708582": []} +{"17654493|37052879": ["WIP-PA also relies on a security manager to manage the security keys, authentication of field and other (gateway) devices [66].", "Three types of frequency hopping mechanisms are used: Adaptive Frequency Switch, Adaptive Frequency Hopping, and Timeslot hopping [66]."]} +{"17654493|41998167": ["QoS-Aware Protocols aim at providing application specific QoS [49] and network QoS [99]."]} +{"17654493|17960632": ["Fixed Assignment Protocols .", "Real-Time Protocols [28], [29], [94] do fall in the class of QoS-Aware protocols, but are speci\ufb01ed differently since they have now become a separate branch of research.", "QoS-Aware Protocols aim at providing application speci\ufb01c QoS [49] and network QoS [99].", "Real-Time Protocols [28], [29], [94] do fall in", "Energy-ef\ufb01cient Protocols [96] have as their main objective to prolong network life-time and support as much data communication as possible within its life-time.", "Thus main classes of MAC protocols can be de\ufb01ned as Energy-Ef\ufb01cient Proto-cols , QoS-Aware Protocols , and Real-Time Protocols .", "Demand Assignment Protocols .", "application-oriented MAC protocols [28], [29].", "Random Access Protocols .", "Protocols should be event-based both for the transport and routing functions.", "Hybrid Protocols ."]} +{"17654493|8618569": ["On the other end, we have surveys on IWSN [30], [31], [32] focusing on challenges, design principles, technical approaches to build IWSN, their requirements, WSN standards, and QoS."]} +{"17654493|7889189": ["For comprehensive information on security issues and solutions we refer to [73], [74], [75], [76]."]} +{"17654493|1940388": ["For comprehensive information on security issues and solutions we refer to [73], [74], [75], [76]."]} +{"17654493|270804": ["Different protocols use different methods to detect congestion and can use various parameters listed in [19], [27].", "Transport protocols in WSNs are responsible for congestion control and loss recovery [19], with the aim of providing end-to-end packet delivery and hence increase reliability.", "There are other surveys which focus on specific layers or functions like Medium Access Control(MAC) [21], [22], [23], [24], routing [18], [25], [26], and transport functions [19], [27].", "The hop-by-hop method is considered to be more suitable for WSNs than the end-to-end method [19], [134], [135].", "The hop-by-hop retransmission method used in the transport function is preferred over the end-to-end method for WSN in several approaches [19], [134], [135]."]} +{"17654493|17205659": ["For comprehensive information on security issues and solutions we refer to [73], [74],"]} +{"17654493|1236072": ["Other functions like the routing function can considerably affect the energy efficiency [18], latency, and reliability.", "Routing protocols can be classified based on network structure, functions provided, QoS provided and other operational requirements [18], [25].", "There are many design requirements [18], [25] that can be used to select a routing protocol.", "There are other surveys which focus on specific layers or functions like Medium Access Control(MAC) [21], [22], [23], [24], routing [18], [25], [26], and transport functions [19], [27].", "Over the years, various routing protocols have been proposed [26], [18], [25] to satisfy the QoS requirements.", "[18] is more energy efficient than flat-based routing, the results are size dependent."]} +{"17654493|1230643": ["Various other applications for which WSN is used can be found in [3], [4].", "A wide range of applications are served by these systems [4], [43], [44] including environmental monitoring, industrial monitoring, traffic monitoring and also military applications.", "There exists already various surveys on WSN [20], [4] that describe protocols proposed for various layers, key challenges in WSN, hardware, test-beds used, and applications for these WSN.", "Technological advances in the area of wireless communication, sensors, and batteries have opened up many new prospects for applications [3], [4] and research."]} +{"23448755|14441987": ["The time complexity, communication complexity, and other parameters of eight di\ufb00erent ad hoc network protocols are analysed [33].", "Since the \ufb01rst introduction of a quantitative analysis method comparing the performance of a variety of multi-hop ad hoc network routing protocols [1], much related work [26, 27, 30\u201333] has been done."]} +{"19477076|14132386": []} +{"19477076|1236072": ["[13] Good qualitative comparision Heterogeneity not considered while comparision Optimization of cluster size, Selection of proper Communication Mode 2012 Sahoo et al."]} +{"57172353|1236072": ["Al-Karaki and Kamal (2004) addresses different routing techniques for WSN. Ammari and Das (2008) analyzed heterogeneity mobility and mobile sink in homogeneous using veronoi diagram."]} +{"6438719|14441987": []} +{"15975668|18643817": ["The adaptable feature of the ant colony helps to survive both the natural or artificial environmental changes and sustain itself well in managing the complicated situations when one individual fails to complete the task assigned; by synchronizing the members[17, 18, 19]."]} +{"15975668|14088590": []} +{"12060835|12817488": ["While data-aggregation techniques have been proposed [82] to efficiently gather data on the axes of energy, accuracy, reliability, latency etc."]} diff --git a/edge/graph_86564618.jsonl b/edge/graph_86564618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..082692b91b041cbd23efe6511e007d9e7581caa9 --- /dev/null +++ b/edge/graph_86564618.jsonl @@ -0,0 +1,49 @@ +{"21013952|7774517": ["Note that in the statistical reputation, positive and negative readings are identified after running an outlier detection procedure [78], by marking the outliers as negative readings."]} +{"16216661|10096622": ["[29] introduced PSO and discussed its suitability for WSN applications."]} +{"16216661|1230643": ["Sensor nodes have limited, generally irreplaceable, power sources [1].", "Because the failure of some sensor nodes should not affect the overall task of a sensor network, fault tolerance becomes a necessity for sustaining sensor networks functionalities without any interruption due to sensor node failures [1]."]} +{"19355360|14826104": ["Of course Random or ExactThenRandom algorithms are faster but they lose a lot of potentially good participants (see Figures 3, 6, 7, 8).", "found in [8]."]} +{"13809820|7774517": ["runs an outlier detection algorithm [28] to detect possibly altered data so that trustworthiness of the"]} +{"32048008|9060471": ["Existing works [16, 15, 18, 30, 46, 56, 28] often model a worker\u2019s quality in order to enable truth inference."]} +{"769186|9830350": []} +{"769186|1230643": []} +{"6568008|194321": ["After assigning tasks to crowd-workers, those workers need to be incentivized somehow to carry out those tasks (Restuccia et al., 2015).", "Incentive allocation After assigning tasks to crowd-workers, those workers need to be incentivized somehow to carry out those tasks (Restuccia et al., 2015)."]} +{"9171235|763939": ["Themobility models described in [54] and [170] can be exploited in order to study how these models affect both the convergence of the algorithms as well as the lifetime of WSNs. Amplifying or decoding and remodulating the signals before forwarding them is capable of achieving energy savings, as\u2026"]} +{"9171235|1230643": ["Therefore, the NL is constrained by the battery of the individual sensors in the WSN considered [1], [2].", "We note that the sensed information is processed relying on a speci\ufb01c hardware component, which is distinct from the transceiver component of the particular sensor device [1], [2]."]} +{"9171235|12060835": []} +{"36016592|1230643": [", and to transmit the sensed data to a base station cooperatively [6], [27].", "To reduce that energy consumption, multihop communications are always applied to transmit data from sensors to the base station [6]."]} +{"18156352|12715779": ["The main goal of this experiment is to determine the number of active users in the system as the budget per round is increased from 20 to 200 when the users set their true valuations using a normal distribution with \u03bc = 5 and \u03c3 = 2, an exponential distribution with \u03bc = 5, and a uniform distribution between [0,10].", "Uniform true valuation distribution [0,10] no Normal true valuation distribution \u03bc = 5, \u03c3 = 2 yes Exponential true valuation distribution \u03bc = 5 no Normal true valuation distribution \u03bc1 = 5, \u03bc2 = 10, \u03bc3 = 15, \u03bc4 = 20, \u03c3 = 2 RADP-VPC-RC no yes yes GIA yes yes yes Radius R 1:10 5 5 Budget per round 100 20:200 0:350 Beta (3,7) (3,7) (3,7) Alpha not used 7 not used ROI Threshold 0.", "[10]; and Doan et al."]} +{"57756528|9514634": ["The sensing quality metric can be diverse for different applications (e.g., spatial\u2013temporal coverage, quality-of-information, mean error rate, etc.) [20]."]} +{"57756528|14435082": ["Learning participants\u2019 abilities and reputations can help selecting more capable and reliable participants [35], [36], [37], [38], [39]."]} +{"57756528|9060471": ["Recently, a survey has comprehensively summarized this topic [51], where most of the literature [52], [53] use voting-based strategies, such as majority voting, weighted voting, Bayesian voting, etc."]} +{"207649994|1230643": ["[ 1-4 ]. A wireless sensor network consists of tiny sensing devices, deployed in a region of interest.", "On the other hand, protocol designers are seeking an energy efficient communication architecture, which involves all levels from the physical layer to the application layer [ 4 ].", "Our work is dedicated to scheduling nodes by using application knowledge (i.e., it belongs to one branch of application layer protocols according to the categories in [ 4 ]) and does not address the data communication problem."]} +{"14795922|1230643": ["Neighbor Table for node A ID Covered Cell Alive A [1,3] , [1,4] , [2,2] , [2,3] , [2,4] , [2,5] , [3,2] , [3,3] , [3,4] , [3,5] , [4,3] , [4,4] True", "B [2,2] , [2,3] , [3,1] , [3,2] , [3,3] , [3,4] , [4,1] , [4,2] , [4,3] , [4,4] , [5,2] , [5,3] True", "There are so many applications of wireless sensor networks such as Environment Monitoring, Battlefield Surveillance, Target Tracking and Medical Analysis [1][2]."]} +{"2211799|1230643": ["\u2026IEEE Abstract In this paper, we consider the connected target \ncov\u00aderage (CTC) problem with the objective of maximizing the network lifetime by scheduling sensors into \nmultiple sets, each of which can maintain both target coverage and connectivity among all the active \nsensors and the sink."]} +{"9388603|1230643": ["The main advantages of a WSN infrastructure, namely self-organization and healing as well as energetic autonomy of the nodes, for air pollution monitoring is to obtain a finer spatiotemporal granularity of measurements, thanks to the resulting lighter installation and operational costs [5]."]} +{"44966604|1230643": []} +{"19130339|1230643": []} +{"206901977|7320605": ["Game theoretic approaches have been successfully applied for a variety of applications in WSNs, as surveyed in [139,140]."]} +{"206901977|2295142": ["The interested reader can consult [101] for a recent survey of multipath routing protocols for WSNs."]} +{"206901977|12817488": ["Data aggregation techniques dedicated to wireless sensor networks are surveyed in detail by Rajagopalan and Varshney in [3] and by Fasolo et al."]} +{"206901977|1236072": ["For an extensive review of energy-aware routing protocols, survey articles can be found in [4,94,95]."]} +{"206901977|12060835": ["Energy harvesting: New technologies have been developed to enable sensors to harvest energy from their surrounding environment such as solar, wind and kinetic energy [5]."]} +{"9514634|9060471": ["The field of truth discovery has recently attracted enormous attention from the data mining and crowdsourcing communities [102, 175]."]} +{"9514634|3330313": ["Outlier detection can be broadly classified as either model-based or consensus-based techniques [73]."]} +{"3557411|8523192": []} +{"3557411|1541773": ["In the literature, energy efficiency issues of wireless networks have been studied for a long time, and a number of surveys have been published [14]\u2013[24] (as compared with this work in Table I)."]} +{"3557411|12325031": ["1) Cognitive Radio Networks (CRNs): In order to exploit the underexploited spectrum resource (e.g., TV white bands), the cognitive radio (CR) technique allows unlicensed users (i.e., secondary users or SUs) to dynamically access the licensed spectrum when licensed users (i.e., primary users or PUs) are temporally absent.", "In the literature, data analytics have been successfully applied in WSNs [25] and CRNs [199] dealing with issues such as data aggregation, routing, localization, clustering, security, dynamic channel allocation, transmission control and cross-layer resource allocation.", "Basically, technologies such as CRNs, D2D communications and OFDMA networks are primarily designed to improve the SE for higher capacity, and hence providing effective ways for delivering large-volume big data.", "We focus our major attention on studies in recent 5-6 years and cover many emerging technologies such as cognitive radio networks (CRNs), future cellular networks integrated with D2D communications, mobile social networks, crowdsensing networks, cloud networks, and SDNs.", "4) General MR-MC Networks: One mathematical generalization of CRNs, OFDMA networks and WiMAX systems is multi-radio multi-channel (MR-MC) wireless networks, where each node has multiple radios that can operate on multiple channels [134]\u2013[136]."]} +{"3557411|14765802": ["The essence of many energy-efficient technologies is to exploit the network spatio-temporal diversities in order to mitigate interference [14], [15]."]} +{"3557411|3055684": ["For both offline and online algorithms, interested readers are referred to the survey in [13].", "vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"3557411|2535224": ["2: A conceptual architecture of SDWN [31].", "An overview of SDWN is illustrated in Fig.", "Although SDN was firstly defined for Internet systems, many efforts have been devoted toward softwaredefined wireless networks (SDWN) including OpenRadio and OpenRoad systems and SDWN based on various wireless technologies such as LTE cellular networks, WLANs, WPANs and WSNs [28], [29]."]} +{"3557411|16412228": ["The essence of many energy-efficient technologies is to exploit the network spatio-temporal diversities in order to mitigate interference [14], [15].", "In the literature, energy efficiency issues of wireless networks have been studied for a long time, and a number of surveys have been published [14]\u2013[24] (as compared with this work in Table I)."]} +{"3557411|12029139": ["vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"3557411|3330461": ["enhance the network energy efficiency by switching between cellular and D2D modes [125]."]} +{"3557411|4269723": ["proposed in which the network data plane and control plane are decoupled to allow flexible and programmable control such that new protocols and applications can be implemented more easily [27]."]} +{"3557411|12060835": ["vesting wireless devices and networks [12], [13], [69]\u2013[71]."]} +{"8610495|10817088": ["For example, the fact that an object with an RFID tag can be uniquely identi\ufb01ed and tracked back to its user might bring up many privacy issues [Acampora et al. 2013]."]} +{"8610495|3241708": ["Similar to other crowdsourcing systems [Quinn and Bederson 2011; Yuen et al. 2011], broadly two types of incentives can be used in MCSC applications: intrinsic incentives or \ufb01nancial incentives."]} +{"27388536|270804": ["In [4], [19], [91]\u2013[100], authors present surveys for transport layer protocols or congestion control based protocols."]} +{"27388536|1230643": ["A WSN comprises a large set of distributed nodes over a wide geographical (indoor or outdoor) area to monitor a physical or environmental event [1].", "Some typical applications of WSN includes telemedicine monitoring, intelligent transportation, home automation, factory monitoring, energy conservation, target tracking and environmental monitoring, etc [1], [12]\u2013[15]."]} +{"46896639|18973396": ["In recent years, crowdsourcing-based systems are widely used in many domains [12]\u2013[16] (see Fig."]} +{"46896639|13151033": []} +{"46896639|3241708": [", article writing or image classification) [30]."]} +{"8353483|763939": ["Although there are numerous mobility prediction methods [31], we just use the statistical result of a worker\u2019s location records to measure the probability that she will pass by the location of a task."]} diff --git a/edge/graph_8657019.jsonl b/edge/graph_8657019.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb9e7e86db692aec365669478d604fedbd90c971 --- /dev/null +++ b/edge/graph_8657019.jsonl @@ -0,0 +1,3 @@ +{"15262788|15064932": ["[38], an overview of signaling enhancements and recovery"]} +{"15262788|2670373": ["Optical buffers are either single-stage or multistage, where the term stage represents one or more parallel continuous piece of delay line [16].", "Packets traveling on a fiber can experience different delays, depending on factors such as fiber length, temperature variation, and chromatic dispersion [16].", "delay variations described so far can be compensated statically and not dynamically (on a packet-by-packet basis) [16].", "If two or more packets need to use the same output link to achieve minimum distance routing, then only one will be routed along the desired link, while others will be forwarded on paths that may lead to greater than minimum distance routing [16].", "In a slotted network that uses fiber delay lines (FDLs) as optical buffers, a packet can take different paths with unequal lengths within the switch fabric [16].", "In a synchronous network, packets arriving at the input ports must be aligned in phase with a local clock reference [16].", "In addition, optical packet switching offers high-speed, data rate/format transparency, and configurability, which are some of the important characteristics needed in future networks supporting different forms of data [16].", "electronic header processors operating at such high speed as to switch packets on the fly at every node [16]."]} +{"15262788|15471820": ["Current data network architectures do not seem capable of living up to the constantly increasing expectations [33].", "The overlay model [33] hides details of the internal network,", "In order to eliminate the SONET/SDH and ATM layers, their functions must move directly to the routers, OXCs, and DWDMs [33].", "Because there are two distinct architectures (IP and ATM), separate topologies, address spaces, routing and signaling protocols, as well as resource allocation schemes, have to be defined [33].", "To address this issue, several parallel links of similar characteristics can be aggregated to form a single \u201cbundled\u201d link [33].", "[33], edge devices are able to see the topology of the network."]} diff --git a/edge/graph_86581909.jsonl b/edge/graph_86581909.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4b31b40d0bbba752baa75a254a43c9010aed4be6 --- /dev/null +++ b/edge/graph_86581909.jsonl @@ -0,0 +1,6 @@ +{"118420008|9020157": []} +{"118420008|33286487": []} +{"101398791|3330313": []} +{"16290798|6327434": []} +{"13266737|33286487": ["More generally, the whole class of time-frequency energy distributions has been fully described by Cohen [COH66], [ COH89 ]: they can all be seen as smoothed (or, more precisely, correlated) versions of the Wigner-Ville distribution."]} +{"18234083|9020157": ["Once the MaUat algorithm tree has been introduced it is fairly straightforward to explain wavelet packets [27,42-46] (WP) in an intuitive way."]} diff --git a/edge/graph_86590556.jsonl b/edge/graph_86590556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6bb5644286dacded33cfc4e1f4d9ad783f110092 --- /dev/null +++ b/edge/graph_86590556.jsonl @@ -0,0 +1,4 @@ +{"38739327|18144244": []} +{"18205342|18144244": ["Nevertheless everyday new types of attacks were originated other hand, these types of malwares brutally damage the contents like tampering, unauthorized modifications and falsification with digital data [1]."]} +{"14427534|205131192": ["2) The parameters of the ellipse at the basis of the generalized 2-D Gaussian function can be estimated by referring to the image ellipse concept defined by Prokop and Reeves [38].", "D Gaussian function can be estimated by referring to the image ellipse concept defined by Prokop and Reeves [38]."]} +{"16339475|8649087": ["When encryption technologies are used in conjunction with watermarking [7, 22], full protection from unauthorized access of digital content can be achieved."]} diff --git a/edge/graph_86596636.jsonl b/edge/graph_86596636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70755de8d5df842377b9efd8ec5e6341182532d9 --- /dev/null +++ b/edge/graph_86596636.jsonl @@ -0,0 +1,16 @@ +{"3554715|15300368": []} +{"3554715|1230643": []} +{"1711061|3330313": []} +{"15171166|9932808": ["\u2026methods, such as Theil-Sen estimator [20], which chooses the median slope among all lines through pairs of points, total least squares regression [32], which optimizes the sum of squared orthogonal residuals to the regression line, and Deming regression [13], which is the maximum likelihood\u2026"]} +{"13524524|1230643": []} +{"15271081|1230643": []} +{"7909698|206051485": ["information is gained from the combination of various data sources like in image fusion [9]."]} +{"7909698|1230643": ["This development has been encouraged by the dramatic advances in sensor technology, wireless communications, digital electronics and computer networks, enabling the development of low cost, low power, multi-functional sensor nodes that are small in size and can communicate at short distances [2]."]} +{"39930081|17772052": ["Several algorithms have been proposed during the last decade to implement the needed quantitative calibration of the chemical multisensor device but currently no effective comparison have been performed [14, 22, 11]."]} +{"206575935|1230643": ["Therefore, a sensor node's lifetime, presents a unique dependence on battery lifetime [1].", "Sensor nodes deployed in a sensor field (redrawn from [1])."]} +{"25576812|8618569": ["Surveys on WSN technologies for industrial automation are also available in [79], [80]."]} +{"16171449|16219347": []} +{"16171449|1230643": ["Energy efficient mechanisms and cross-layer design (Akyildiz et al, 2002) are a requirement in any efficient design of protocol stack in wireless sensor networks.", "\u2026place and topology that the network will have (sparse network, random network, clustered network, grid network, etc), (iii) the power management of the different types of nodes (batteries, solar panels), (iv) the communication protocols involved in the transfer of data including energy-efficient\u2026"]} +{"15162357|1230643": []} +{"15162357|1582463": ["Concurrent system-level error detection techniques using a watchdog processor are surveyed in [16]."]} +{"15162357|6327434": []} diff --git a/edge/graph_8659730.jsonl b/edge/graph_8659730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a30a7e22b8b94f3505eb73954b6430522c5f825c --- /dev/null +++ b/edge/graph_8659730.jsonl @@ -0,0 +1 @@ +{"349242|1708582": ["The term \" reinforcement learning \" refers to a framework for learning optimal decision making from rewards or punishment (Kaelbling et al., 1996)."]} diff --git a/edge/graph_8661028.jsonl b/edge/graph_8661028.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2d6bcb8d50fcfd624ffdb095f26d87cebfb8d87 --- /dev/null +++ b/edge/graph_8661028.jsonl @@ -0,0 +1,5 @@ +{"15108187|4361938": ["Teleoperation remains a widely addressed challenge in robotic applications and a hot topic in human-robot interaction (HRI)[1]."]} +{"1846400|7360895": [", they outwardly appear to be socially intelligent, even if the internal design does not have a basis in cognitive science) [8].", "This capability can be dynamic and may include a user model that helps the robot recognize human behavior and react appropriately [8]."]} +{"14600327|16709997": []} +{"35498686|4361938": []} +{"35498686|62198990": []} diff --git a/edge/graph_86622219.jsonl b/edge/graph_86622219.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..414748bcfc8da84cda5593d7299ec65a416dc966 --- /dev/null +++ b/edge/graph_86622219.jsonl @@ -0,0 +1,5 @@ +{"31832898|54134680": []} +{"31832898|191396": ["Xu and Wunsch [50, 51] described clustering in the perspective of probability that data objects are drawn from a specific probability distribution and the overall distribution of the data is assumed to be a mixture of several distributions [53].", "Other disadvantages of HC include the tendency to form spherical shapes and reversal phenomenon, in which the normal hierarchical structure is, distorted [50].", "Euclidean distance is highly sensitive to noise and usually not applied to data with hundreds of attributes also features with high values tend to dominate others [50] so it may be applied when translations of non-numeric objects to numeric values are almost nil or minimum.", "Pearson correlation is usually unable to detect the difference between two variables [50].", "Additionally, trained SOFM may be suffering from input space density mis representation [49], where areas of low pattern density may be over represented and areas of high density under represented [50].", "the sensitivity to the selection of initial parameters, the effect of a singular co-variance matrix, the possibility of convergence to a local optimum, and the slow convergence rate [50] [52].", "also a good choice for document clustering, it is invariant to rotation but not to linear transformations [50].", "Xu and Wunsch [50, 51] described clustering in the perspective of probability that data objects are\ndrawn from a specific probability distribution and the overall distribution of the data is assumed to be a mixture of several distributions [53].", "Even if an object is quite far away from the cluster centroid, it is still forced into a cluster and, thus, distorts the cluster shapes [50].", "External indices are based on some pre-specified structure, which is the reflection of prior information on the data, and used as a standard to validate the clustering solutions [50].", "The procedure of fuzzy c-means [50] is similar to that of K-means."]} +{"31832898|7158350": ["There has been a tremendous amount of work in supervised classification and evidently has been reported in the literature widely [2-9]."]} +{"25552182|8365617": ["Change detection has been extensively studied in the context of time-series data, where the objective is to determine time intervals (segments) that exhibit homogeneous properties [Huang et al. 2013; Keogh et al. 2004; Liu et al. 2008; Mithal et al. 2012].", "Change detection has been extensively studied in the context of time-series data, where the objective is to determine time intervals (segments) that exhibit homogeneous properties (Huang et al. 2013; Keogh et al. 1993; Liu et al. 2008; Mithal et al. 2012)."]} +{"385307|3102110": []} diff --git a/edge/graph_86629084.jsonl b/edge/graph_86629084.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86640778.jsonl b/edge/graph_86640778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b99a7b97185fa7e10914af56a558ba2fb400316 --- /dev/null +++ b/edge/graph_86640778.jsonl @@ -0,0 +1,3 @@ +{"543643|485843": ["3) Open and Interoperable Standards: In general, \ufb02 exible and open communication standards and infrastructures suitable to address smart grid speci \ufb01 cs need to be developed [6], [7], [11], [12]."]} +{"543643|9588126": ["One of the most relevant technologies is multiagent systems (MASs) [14], [15]."]} +{"543643|35426346": []} diff --git a/edge/graph_86643711.jsonl b/edge/graph_86643711.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8665024.jsonl b/edge/graph_8665024.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e037d9568af224f83b20b42c1129eb869a357af --- /dev/null +++ b/edge/graph_8665024.jsonl @@ -0,0 +1,10 @@ +{"23410368|28771682": ["moving platform and collects a vertical slice of the data cube at one time [10].", "A snapshot imager collects an entire data cube at one time without scanning [10].", "There are three challenges in lightweight whiskbroom hyperspectral imagers: 1) shorter exposure time is needed for high spatial resolution because a whiskbroom sensor collects only a single column of the data cube at one time [10]; 2) a high-speed attitude and position sensor is needed for geographical registration, especially when the attitude of the platform is unstable; and 3) in general, whiskbroom sensors are large and heavy due to the complicated mechanical equipment for scanning."]} +{"12240632|11112426": []} +{"47128183|3330313": ["Hodge & Austin (2004) have recently introduced a survey of contemporary techniques for outlier (noise) detection."]} +{"47128183|7158350": ["Zhang (2000) provided an overview of existing work in Artificial Neural Networks (ANNs)."]} +{"47128183|18782652": ["Breslow & Aha (1997) survey methods of tree simplification to improve their comprehensibility."]} +{"10913825|11112426": ["6, are the linear model, the bilinear model, and the Hapke model [3], [40].", "JUNE 2013 IEEE GEOSCIENCE AND REMOTE SENSING MAGAZINE 7 and spectral resolution instruments (see [3] and references therein).", ", principal component analysis (PCA) [3], is commonly applied.", ", [55] [3] and references therein): The posterior distribution of the parameters of interest is computed from the linear observation model (1) within a hierarchical Bayesian model, where conjugate prior distributions are chosen for some unknown parameters to account for physical constraints.", "In [146], a modification to the RX algorithm called SubSpace RX (SSRX) was outlined that is based on the PCA of the background covariance matrix.", "Visualization of hyperspectral AVIRIS image, from (a) to (d) using PCA and the methods of [20]\u2013[22], respectively.", "Advanced morphological techniques such as morphological profiles (MPs) [93] have been successfully used for feature\nextraction prior to classification of hyperspectral data by extracting the first few principal components of the data using the PCA [3], and then building so-called extended morphological profiles (EMPs) on the first few components to extract relevant features for classification [94].", "Nevertheless, because the spectral vectors are non-negative, is it always possible to build rescaled versions thereof, belonging to an affine set [41], and thus satisfying the ASC (see [3] for details).", "Traditionally, methods based on PCA are applied that decorrelate bands.", "The segmented PCA [78] reduces the computational load significantly for feature extraction, compared with the conventional PCA.", "We focus mainly on supervised and semi-supervised classification, although techniques for unsupervised classification and/or clustering have also been used in the literature [3].", "In order to address these issues, feature mining [3], subspace-based approaches [58] and semi-supervised learning techniques [1] have been developed.", "A widely used approach has been the generation of features in a new space, like those obtained from the PCA [3] or the minimum noise fraction (MNF) [77].", "This ill-conditioning is typically addressed by a regularization procedure such as PCA-based regularization or adding a scaled identity matrix to the background covariance matrix [147].", "However, it has been demonstrated that the original spectral features contain high redundancy [3].", "Since the spectral correlation is high, the data are likely to reside on a very low-dimensional submanifold of the spectral space, and projection of the data on a subspace of dimension d nb% , using, e.g., principal component analysis (PCA) [3], is commonly applied.", "For variations of these ideas recently introduced, see [3].", "We have, however, discarded those orthogonal directions corresponding to 10 SNR 1 to avoid instability of the endmember identification (see [3] for more details).", "5, four different color visualizations of an AVIRIS hyperspectral image of 224 spectral bands are shown, obtained by PCA and the methods of [20]\u2013[22] respectively."]} +{"117764485|28771682": ["If all bands are simultaneously captured, i.e. within the same exposure and thus, the full image cube is recorded without a scanning process, the cameras are referred to as snapshot cameras (Hagen, 2012)."]} +{"6371610|28771682": ["A whiskbroom sensor collects a single column of the datacube at one time [11].", "slice of the datacube each time it is used [11].", "A snapshot sensor collects an entire datacube at one time without scanning [11].", "current snapshot sensors is the limited number of pixels available in detector arrays [11]."]} +{"118145131|206051485": ["between pixels of the same location [4]."]} +{"132833385|28771682": ["Snapshot imaging spectroscopy\nHyperspectral snapshot cameras (HSCs) record spectral information in two spatial dimensions within a single exposure and therefore without any scanning process (Hagen et al., 2012).", "................................................................. 21\nFigure 2.5 Proportions of the image cube collected during a single detector integration period for scanning (a) and snapshot (b) devices (Hagen et al., 2012).", "While whisk- and pushbroom systems record individual pixels or image lines, hyperspectral snapshot cameras (HSCs) record hyperspectral data in two spatial dimensions within a single integration period (Hagen et al., 2012).", "Hyperspectral snapshot cameras (HSCs) record spectral information in two spatial dimensions within a single exposure and therefore without any scanning process (Hagen et al., 2012).", "5 Proportions of the image cube collected during a single detector integration period for scanning (a) and snapshot (b) devices (Hagen et al., 2012).", "Hagen et al. (2012) identifies this as the \u201csnapshot advantage\u201d."]} diff --git a/edge/graph_86668588.jsonl b/edge/graph_86668588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..234102e86f08fed46dae22c506804830f49bb2ed --- /dev/null +++ b/edge/graph_86668588.jsonl @@ -0,0 +1,47 @@ +{"3543367|15545863": ["Based on this method, Yang et al. [19,20] put forward two multi-authority CP-ABE schemes which support outsourced decryption."]} +{"5690873|1230643": ["At[6] := ur[1] \u2227 At[7] := ur[2] \u2227 At[10] := ur[4]", "The IoT network helps in the information processing and control of these applications [1].", "\u21d2 Idp\u2212 sel \u2212 req = Idp\u2212 sel \u2212 req \u222a {Uc[1],Uc[2],", "\u21d2 Ucr \u2212 h[10] = NULL \u2227 Ucr \u2212 h[11] = Isr[1]", "\u21d2 Cr \u2212 check \u2032 = Cr \u2212 check \u222a {Cc[1],Cc[3]} (14)", "\u21d2 U \u2212 Cr \u2032 = U \u2212 Cr \u222a {Uc[1],Uc[2],Uc[3],Uc[4],", "R(handle\u2212 f ) : \u2200Ucr \u2212 h U \u2212 cr \u2212 handle,\n\u2200Isr Idp\u2212 sel \u2212 req |\n\u21d2 Ucr \u2212 h[10] = NULL \u2227 Ucr \u2212 h[11] = Isr[1]\n\u2227Ucr \u2212 h[1] = Isr[4]Isr[6]\n:= Ucr[6] \u2227 Isr[7] := Ucr[1]\n\u21d2 Idp\u2212 sel \u2212 req\u2032 = Idp\u2212 sel \u2212 req \u222a {Uc[1],Uc[2],\nUc[3],Uc[4],Uc[6],Uc[7],Uc[8]} (10)\nEquation (10) describes the flow in which if the user\u2019s request does not contains the authentication handle the user is redirected towards DS to get itself authenticated from its home domain.", "\u21d2 U \u2212 att \u2032 = U \u2212 att \u222a {UA[1],UA[2],UA[3]} (13)", "Uc[1] := Ucr \u2212 h[1] \u2227 Uc[2] := Ucr \u2212 h[2]", "UA[1] := UC[2] \u2227 UA[2] := UC[6] \u2227 UA[3] := UC[5]"]} +{"207225896|12815020": ["Intrusion detection Intrusion detection techniques have been applied to cloud infrastructures to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM or hypervisor [33]."]} +{"15838845|207424188": ["Anonymization techniques can be classified into following four approaches [48]: 1) clustering, 2) clustering with constraints, 3) modification of graph, and 4) hybrid."]} +{"43327535|1333339": []} +{"3880342|3767252": []} +{"31429854|3767252": ["This section studies security and privacy issues in the context of different architectural elements of MEC [13], [88]\u2013[90].", "There exist a few MEC survey reports in [13] and [14].", "2) Integrity: The MEC ecosystem incorporates multiple actors, such as end-users, service providers, and infrastructure providers [13]."]} +{"31429854|2363064": ["Virtualized servers and their hosted physical servers can be protected through hypervisor hardening, network abstractions, and isolation policies [98]."]} +{"17046469|17474643": ["Opportunity 1 - Standards, Benchmarks and Marketplace\nEdge computing can be realised in practice and be made accessible publicly if responsibilities, relationships and risks of all parties involved are identified."]} +{"5039874|3757239": ["work infrastructure [28]."]} +{"5039874|206578365": ["Therefore, the traditional cloud computing cannot efficiently support the IoE-based application services [10], and the edge computing arises at the historic moment [11], [12] to adapt to the era of IoE."]} +{"5039874|3767252": []} +{"5039874|3042864": ["Previous work such as micro data center, [19], [20], mobile cloud computing [13], [14], fog computing [15], [16], cloudlet [21], and cloud-sea computing [22] have been introduced to reduce the storage and computation load in cloud computing.", "At present, some related paradigms, such as mobile cloud computing [13], [14], fog computing [15]\u2013[18], which is the predecessor or counterparts of edge computing, can provide the efficient solutions for massive data processing, and meanwhile improve the user experience."]} +{"4140014|4962939": ["In this paper, to address the above issues in CDSS, we propose a H ybrid P rivacy-Preserving C linical Decision Support S ystem in fog and cloud computing environment, called HPCS, and regard the challenge issues to be \ufb01ve-fold, namely: \u2022 Balance Real-time and High-accurate Classi\ufb01cation.", "Moreover, Rahu-lamathavan et al. [22] proposed a privacy-preserving CDSS using a Gaussian kernel-based support vector machine (SVM).", "Clinical Decision Support System (CDSS), with various data mining meth-ods being applied to assist physicians in diagnosing, has received great attention due to the prosperity of the new techniques, such as, Internet of Things (IoT) [1] [2], cloud computing [3] [4], and fog computing [5] [6], etc. \u201cThings\u201d, in the IoT sense, can refer to a wide variety of devices to collect the Personal Health Information (PHI).", "[23] gave a privacy-preserving CDSS scheme on Na\u00a8\u0131ve Bayesian classi\ufb01er to predict patient\u2019s disease.", "Recently, Neural Networks (NNs) [10], one of the high decision rate data mining tools, have been widely used to predict various diseases in CDSS [11,12].", "Due to its higher e\ufb03ciency, many privacy-preserving outsourced CDSS are designed.", "Although a number of privacy-preserving outsourced CDSSs are proposed, most of them can only support securely linear operations instead of some complex non-linear operations, such as Sigmoid and Softmax function which are usually contained in the neural networks.", "Recently, Neural Networks (NNs) [10], one of the high decision rate data mining tools, have been widely used to predict various diseases in CDSS [11] [12].", "Rahulamathavan et al. [22] constructed a privacy-preserving CDSS using Gaussian Kernel-Based Classi\ufb01-cation (GKC).", "Recently, Liu et al. [23] proposed a new privacy-preserving patient-centric CDSS on Na\u00a8\u0131ve Bayesian classi\ufb01er to diagnose the risk of patients disease in a privacy-preserving way."]} +{"67867022|6779551": ["[1] first summarized security requirements of wireless networks and then presented a comprehensive overview of attacks"]} +{"67867022|8697076": ["[104] discussed that the victim-end detection methods may be ineffective."]} +{"67867022|206584087": ["They can be mainly classified into the following categories [6], [68]: (a) HTTP request flooding attacks that"]} +{"67867022|8364569": ["[30] provided a detailed discussion on why flow-based intrusion detection is required and then presented an overview.", "A flow is considered expired when [26], [30]: (i) the flow was idle meaning that no packets have been transmitted for a long time exceeding a given threshold (idle timeout), (ii) the flow reaches the maximum allowed lifetime (active timeout), (iii) the FIN or RST flags have been seen in a TCP flow (natural expiration), (iv) automatic reduction of timeout parameters in case of resource constraints (resource constraints), (v) the flow cache memory becomes full (emergent expiration), (vi) all flow cache entries have to be expired in emergent events (cache flush)."]} +{"67867022|13172512": ["Some detailed discussions about how to employ the machine learning to detect network attacks are presented in [39] and [40].", "The machine learning is mainly divided into three categories [39]\u2013[41]: (i) supervised learning, (ii) unsupervised learning, and (iii)"]} +{"67867022|8793295": ["Deep Packet Inspection (DPI) is a method that uses both packet header and payload information to determine whether a packet is an intrusion or not [25]."]} +{"25088296|31860478": ["There are several dimensions in fog architecture in term of the current standard practice [35]."]} +{"206578432|29859741": ["Some articles [25]\u2013[27] exploited the"]} +{"206578432|12675271": ["[22] surveyed the use case scenarios in smart cities and discussed the common"]} +{"206578432|6909107": ["ing data analysis and knowledge discovery at or near the data sources [44], [45]."]} +{"206578432|5385031": ["applications deployment with minimal cost [30]."]} +{"206578432|3767252": ["As a nontrivial extension of cloud computing, it is inevitable that some issues will continue to persist, especially security and privacy issues [12], [13].", "attacks [12] to disrupt the fog computing.", "[12] presented the security threats on network infrastructure, edge data center, virtualization infrastructure and user devices, and reviewed eight security challenges and the existing mechanisms to solve these challenges.", "This centralization of resources implies a large separation between IoT devices and the cloud, which results in the increase of the average network latency and jitter [12].", "local data analysis are performed at fog nodes, and permanent storage and global analysis are executed at the cloud [12].", "the adjacent nodes and the fog nodes at higher levels in the network hierarchy to detect attacks that target large section of services [12].", "In [12], a detailed analysis on the security threats, challenges and mechanisms was presented to explore potential synergies and venues of collaboration on the research", "There is no comprehensive survey to study the security and privacy challenges in detail and review the existing techniques and solutions in fog computing, except [12].", "Security and Privacy Threats in Fog Computing [12].", "Summary and Insights: These intrusion detection systems may be applicable in fog computing to detect malicious activities, but they are not very efficient because of the heterogeneous, decentralized and distributed architecture of fog computing, such that the challenges on designing intrusion detection and prevention mechanisms are still numerous [12]."]} +{"206578432|7681233": ["A large number of trust management mechanisms [115], [116], [119], [120] have been proposed to analyze trust relationship under two trust models [115]: evidence-based trust model and monitoring-based trust model.", "In evidence-based trust model, any witness that proves trust relationship among users is exploited to build the trustworthiness, such as public key, address, identity, or any evidence that an user can generate for itself or other users [116]."]} +{"206578432|14745481": ["evaluate the users\u2019 trustworthiness in mobile ad hoc network (MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124].", "In addition, reputation is an important metric to evaluate the trust level of an entity and many reputation management mechanisms have been proposed to evaluate the users\u2019 trustworthiness in mobile ad hoc network\n(MANET) [121], vehicular ad hoc network (VANET) [122], delay tolerant networks [123] and mobile crowdsensing [124]."]} +{"20563936|3767252": ["Besides, in [38], the authors also analyze the relation between fog-computing and other related areas, e."]} +{"4625285|3119314": []} +{"3119314|3767252": ["Threat model distribution for fog computing component (adapted from [64]).", "[64] presented a threat model by reviewing the scope and nature of potential attacks.", "manipulation and rogue infrastructure have been identified as possible security threats [64].", "Table 2 summarizes the threat model distribution in fog computing component as identified in [64].", "A common characteristics associated with fog computing is its deployment at the \u2018\u2018edge of the network\u2019\u2019 [64], [94], which implies that fog computing has features that make it a nontrivial extension of cloud computing."]} +{"9496996|12815020": []} +{"14849884|1333339": ["Trust Predictions: Trust prediction is a method of predicting potentially unknown trust between nodes using the present and past behavior of nodes and also the recommendations received from other nodes [17].", "The core factor to be considered for trust propagation is cooperation in the network in transporting the trust information [17, 18].", "The chain of nodes that transmits the trust information about target node to the trust requesting node constitutes a trust path [17, 18]."]} +{"14849884|1462862": []} +{"14849884|10137283": []} +{"14849884|9240891": ["The contributions of this paper are: (1) to give a clear definition of trust in the communication and networking field, drawing upon definitions from different disciplines; (2) to extensively survey the existing trust management schemes developed for MANETs and investigate their general trends; and\u2026", "Also, confidence level is used as a weight to evaluate trust of other nodes based on a Bayesian approach."]} +{"3767252|6583734": ["Protocol and Network Security \u2014 \u2014 \u2014 [86][93][94] [95][96][97]", "lenges that need to be solved is the management of the network infrastructure [96, 97]."]} +{"3767252|2363064": ["and VMs, networking abstractions, and many others [68].", "Regarding the hardware used in paradigms such as fog computing, the commodity servers used in smallscale deployments can make use of the same security mechanisms as the commodity servers used in cloud deployments [68]."]} +{"13295488|12815020": ["Intrusion detection techniques are widely deployed in cloud system to mitigate attacks such as insider attack, flooding attack, port scanning, attacks on VM and hypervisor [23], or in smart grid system to monitor power meter measurements and detects abnormal measurements that could have been compromised by attackers [37, 26]."]} +{"44089236|6909107": []} +{"5244110|15545863": []} +{"5244110|12815020": []} +{"10109950|12815020": []} +{"21723803|3119314": []} +{"42475332|15545863": []} +{"42475332|7971188": []} +{"49651818|206578486": ["Fog computing have deployed micro-data centers at the edge of the network, making the edge of the network the ability to calculate, storage, perceive and process, reducing the amount of data transferred [2-4]."]} diff --git a/edge/graph_8667621.jsonl b/edge/graph_8667621.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba256ee9115f8b71174ead4c2e0aa6a074b187b6 --- /dev/null +++ b/edge/graph_8667621.jsonl @@ -0,0 +1 @@ +{"7989664|8363289": ["\u2026rollout approach may also be combined with rolling horizon approaximations, and in some variations is related to model predictive control , and receding horizon control ; see Keerthi and Gilbert (1988), the surveys by Morari and Lee (1999), and Mayne et al. (2000), and the references quoted there."]} diff --git a/edge/graph_86679729.jsonl b/edge/graph_86679729.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa877042136f2cde63e19f50d29b6d858af5bded --- /dev/null +++ b/edge/graph_86679729.jsonl @@ -0,0 +1,6 @@ +{"3396820|10996225": ["Static analysis examines software without executing it, detecting patterns in strings, byte sequences, library calls and operation codes to determine if it is malicious [3].", "Behaviour monitoring tools capture interactions between the software and the underlying system such as process detail, file and registry changes, and network traffic [3]."]} +{"49908612|206990002": ["algorithmsandapproaches,inconjunctionwithdifferentandnovel types of features derived from the data. Many different approaches havebeenproposedandacomprehensivereviewoftheliteratureis provided by both Ucci et al. (2017) and Gandotra et al. (2014). Inthenextsection,wefocusspeci\ufb01callyonapproachesbasedon deeplearning (a type ofmachine learning) as these are most related to our work. However, the types of features used "]} +{"49908612|10996225": ["Published by Elsevier Ltd on behalf of DFRWS.", "r Ltd on behalf of DFRWS. This is a While physical resourcing in terms of hardware, training first responders, and increased numbers of expertly skilled personnel can increase an agency's digital forensic capacity, the digital forensic research community has identified the need for automation and intelligent evidence processing (Sun, 2010). One of the more labor intensive and highly-skilled tasks encountered in digital forensic investigation is malware analysis. A common technique for analyzing malware is to execute the malware in a sandbox/virtual machine to gain insight to the attack vector, payload installation, network communications, and behavioral analysis of the software with multiple snapshots taken throughout the analysis of the malware lifecycle. This is an arduous, time-consuming, manual task that can often span over several days. A survey of digital forensic examiners conducted by Hibshi et al. (2011) found that users are often overwhelmed by the amount of technical background required to use common forensic tools.", "In real world scenarios, malware defense systems that utilize machine learning based malware classification must be able to adapt to new variants and respond to new types of malware. If the approach requires complex, time and resource consuming processes to extract features required for the machine learning model, this will adversely impact the usefulness of the solution. This is a key motivation for our approach and so we focus on using only the static, raw malware bytecode with minimal data preprocessing. Before we describe our methodology in detail in the next section, we will conclude our literature review with two approaches that aremost similar to ourmethodology. Raff et al. (2017) describe a very similar motivation for their deep learning approach for malware classification - the need to remove the requirement for complex, manual feature engineering.", "In this model, the first responders are not trained in the analysis or investigation phase of the case, but can ensure the integrity and court-admissibility of the gathered evidence.\nboydell@ucd.ie (O. Boydell), ucd.ie (M. Scanlon).\nr Ltd on behalf of DFRWS.", "As well as deep learning based malware classification based on features from parsed and disassembled static malware code as summarized above, many approaches also make use of features derived from running the malware in a sandbox environment and analyzing the behavior of the running process. Although the key advantage of our methodology is that it only requires the raw malware byte code as input, we also include the following summary of these alternative approaches. As with more traditional machine learning based malware classification, the use of system API calls logged from running malware processes are a popular source of input features. Dahl et al. trained neural networks of between one and three hidden layers on features generated from system API calls as well as null terminated strings extracted from the process memory (Dahl et al., 2013). A random projection technique was used to reduce the dimensionality of the features to that which was manageable by the neural network. Huang and Stokes (2016) propose an alternative deep learning architecture which uses similar features, however their model addresses multi-task learning in which the same deep learning architecture provides both a binary malware/benign classification as well as a classification of the malware type."]} +{"12767870|192934": ["This seems underconstrained, especially when rules of thumb suggest that one needs ten times more examples than features (Jain et al., 2000)."]} +{"3767481|206990002": ["promising results [51, 52, 53, 54]; however, machine learning algorithms are vulnerable to adversarial samples and also to leak information [55, 56, 57]."]} +{"44055005|2581766": ["Cloud infrastructure has become increasingly prone to novel attacks and malware [1]\u2013[6]."]} diff --git a/edge/graph_86691715.jsonl b/edge/graph_86691715.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..048ceef1fe3930ffd31db8a3d7bb07a3f1efbeb8 --- /dev/null +++ b/edge/graph_86691715.jsonl @@ -0,0 +1,4 @@ +{"24298298|5254998": []} +{"1932517|15300368": ["The new WSNs have assimilated other technologies [16], such as Bluetooth, radio frequency identification (RFID), wireless fidelity (Wi-Fi), mobile data services, etc."]} +{"86732233|1619901": ["The latter is \u2018the transformation of a market opportunity into a product available for sale\u2019 (Krishnan & Ulrich 2001, p. 1)."]} +{"14997527|26257441": ["They have broad application in engineering, architecture, manufacturing, and computing, because of the wide variety of the models they describe (see Frazer 2016; Kelly and Tolvanen 2008; Simpson et al. 2001)."]} diff --git a/edge/graph_8671556.jsonl b/edge/graph_8671556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86719889.jsonl b/edge/graph_86719889.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..386410ee650cbd1a0d58813ff5090f65dfa292fa --- /dev/null +++ b/edge/graph_86719889.jsonl @@ -0,0 +1,20 @@ +{"146118453|3529917": ["Particle filtering has been widely used for object tracking [29] and provides a flexible and effective tool for integrating dynamic facial cue tracking in a Bayesian framework, e."]} +{"146118453|17221751": ["Both issues call for a model-based approach rather than relying on a traditional pattern recognition \u201cpipeline\u201d [3], that characterises endto-end systems: namely, visual feature extraction/reduction followed by classification (discrete emotion recognition) or regression (continuous affect detection)."]} +{"62600805|9045232": ["OVER the last decade, new applications in computer vision and computational photography have arisen due to earlier advances in methods for detecting human faces in images [27], [29]."]} +{"33523771|17221751": ["Face alignment is an important component of many computer vision applications, such as face verification [28], facial emotion recognition [25], humancomputer interaction [6] and facial motion capture [12]."]} +{"15298586|207060556": ["We denote this initial estimate as x, which for face alignment is commonly a mean face aligned to the output of a face detector [60]."]} +{"18038464|207060556": []} +{"18038464|16010181": []} +{"18038464|10148683": []} +{"215721|14303607": ["Accurate object shape computation is key to many visual tasks; for instance, classification of facial expression [17, 30], facial identity [38], action analysis [4], and fine-grained categorization [34, 3, 18, 40] require accurate registration of a (deformable, part-based) model to the image."]} +{"215721|9045232": ["The shape of human bodies and human faces has attracted particular attention [43, 46, 33, 2]."]} +{"17383690|9045232": ["These detectors generally rely on hand-designed filters that aim at segmenting visual features using image properties such as edges, intensity, colour, motion, or generalised measures [16, 15]."]} +{"16010181|393948": ["Another promising way to adaptively learn features is by virtue of deep learning (Bengio et al, 2013) which achieves state-of-the-art performance on many computer vision tasks."]} +{"16010181|9045232": ["CLM-based methods consist of a shape model and a number of local experts, each of which is utilized to detect a facial feature point.", "FFPD usually starts from a rectangular bounding box returned by face detectors (Viola and Jones, 2004; Yang et al, 2002) which implies the location of a face."]} +{"515423|9045232": ["Space does not allow for a full review; we refer the reader to the recent surveys [41, 26, 39]."]} +{"6575064|14970359": []} +{"6575064|9045232": []} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"1427578|16010181": ["The comprehensive survey of other methods for facical landmark detection, e.g, CLM-based methods [14] and AAM-based methods [15] can be found in [16]."]} +{"40776|207060556": ["The interested reader may refer to [67] for recent advances in face detection \u201din-the-wild\u201d."]} +{"40776|17221751": ["\u2026to achieve state-of-the-art results in a series of important computer vision applications, such as face recognition/veri\ufb01cation and facial expression analysis, it is important to provide an enhanced representation of the face that contains the locations of several key facial landmarks [47, 52]."]} diff --git a/edge/graph_86724986.jsonl b/edge/graph_86724986.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d377a24f6cf6e5ef37d8b27a1a5422c82789185c --- /dev/null +++ b/edge/graph_86724986.jsonl @@ -0,0 +1,2 @@ +{"52078372|12815020": []} +{"13269089|11608263": ["noise [14], partially labeled data [15] [16] or multiple classes per object [17], among other scenarios."]} diff --git a/edge/graph_86735340.jsonl b/edge/graph_86735340.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86740190.jsonl b/edge/graph_86740190.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15df3e169044845b888a81e4f480bf8cc496b106 --- /dev/null +++ b/edge/graph_86740190.jsonl @@ -0,0 +1,5 @@ +{"3417202|3402363": []} +{"21347636|30548952": ["The document [9, 10] proposes a para-virtual enterprise logistics mode and analyzes the main logistics relationship of this logistics mode by actual cases."]} +{"4643514|627405": ["Therefore, for the construction of the search string we identified alternative spellings, synonyms and related terms as suggested in [30]."]} +{"3918101|627405": ["The procedure of having one extractor and one checker is not consistent with the medical standards summarized in Kitchenham\u2019s guidelines [22], but is a procedure we had found useful in practice [2]."]} +{"1920128|15875837": ["Nevertheless, many inter-organizational systems are still realized by traditional Electronic Data Interchange (EDI) [12, 7, 16] standards, such as EDIFACT [2] or ANSI X12."]} diff --git a/edge/graph_86749763.jsonl b/edge/graph_86749763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6dd5dc94d7ef5824301b59c9b8a61f3c2f1fbc3e --- /dev/null +++ b/edge/graph_86749763.jsonl @@ -0,0 +1,18 @@ +{"47017225|25374274": []} +{"158714473|27410217": ["In this topic, cloud frameworks and middleware technologies are set as a platform for communication with the cloud layer and among devices with different interfaces, operating systems, and architectures [26,27]."]} +{"158714473|31245252": []} +{"158714473|2680573": ["KNN is one of the most common methods in machine learning systems [50]."]} +{"117241896|21683864": ["It is not easy to recharge or replace the sensors batteries [22]."]} +{"117241896|5630105": []} +{"117232685|10440280": []} +{"110328617|2769379": []} +{"27060711|10693567": []} +{"117689368|21386749": []} +{"115512877|15485264": ["BA is flexible and has the ability to provide the solution for almost all optimization problems [31]."]} +{"57574797|3119314": []} +{"38730704|3330461": ["Multicast D2D transmissions have already been standardized by 3GPP, whereas unicast transmissions so far have only received attention from the scientific community [13], [14]."]} +{"53696817|17737221": ["The non-flexible appliances are those that are associated with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "with baseline loads or non-preemptive tasks (like light, TV, PC, hair drier) and cannot be controlled by the system (Ullah et al., 2013).", "These appliances usually present burst loads (Khan et al., 2014; Ullah et al., 2013)."]} +{"53696817|16335158": ["The IoT Cloud (Alamri et al., 2013; Botta et al., 2016) will enable the long-time storage and complex analysis of this data."]} +{"158191108|3119314": []} +{"116236677|37014812": ["In spite of approximate solutions, optimization algorithms are fair enough to converge faster, reach the desired solution, and applicable in all fields of engineering and computer science [31]."]} +{"116236677|10440280": ["However, it is examined in the literature that researchers considered the DSM and DR are interchangeable [5,6].", "The implementation of CPP during critical event imparts profitable response to the utility [5]."]} diff --git a/edge/graph_86751803.jsonl b/edge/graph_86751803.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63c461ccef8ea02beed3ef07ead65253072d7bae --- /dev/null +++ b/edge/graph_86751803.jsonl @@ -0,0 +1,30 @@ +{"36483560|4528002": ["Several different detectors are proposed in [10] and [11], however their proposals are not experimentally evaluated.", "Several works already proposed the application of anomaly detection algorithms to analyze CAN messages [5], [6], [7], [8], [9], [10], [11] looking for evidences of attacks and other illicit activities, but often with very limited evaluation over real in-vehicle network traffic."]} +{"206446574|1230643": []} +{"59353419|11050081": ["To account for this so-called concept drift [18], the training of the algorithm is continued while classifying data instances."]} +{"4725482|1956433": ["Additionally, researchers in [115] have pointed out that VLAN (Virtual Local Area Network) technology, though primarily used in Ethernet, can similarly be used to add authentication for other networks in principle.", "Therefore, most of the recent efforts are focused on how to prevent the exposed data from being interpreted or manipulated by the adversaries [115]."]} +{"5031506|3330313": []} +{"15895606|31245252": ["[95] comprehensively surveyed security and privacy, among other issues, in the Internet of Things (IoT)."]} +{"15895606|2521001": ["Not only should consumers\u2019 data be encrypted, but anonymization techniques are also desired to prevent inference and other attacks from deducing patterns from the encrypted data to reveal private information [79], [114]."]} +{"15895606|207209718": ["For example, Intrusion Detection Systems (IDS) should be time-critical so that long delays are intolerable [112].", "They also provide a comprehensive survey on IDS solutions in CPS applications [112].", "For further analysis of the current ICS-speci\ufb01c IDS solutions, we refer you to [5], [7], [19], [81], [82], [112], [171]."]} +{"15895606|4528002": ["However, it is more costly and less likely to widespread in the near future [149].", "Steer-, Drive, Brake-, Shift-, and Throttle-by-wire are all examples of this trend [149]."]} +{"15895606|595093": []} +{"67128672|14258620": ["In fact, it is predicted that there will be as much data created as was created in the entire history of planet Earth, with 90% of current data were created in the last couple of years [1]."]} +{"5906437|16156203": ["Anomalies of type II could for example be detected using Hidden Markov models [26]."]} +{"5906437|3330313": ["Other terms used in literature are novelty, outlier [24] and discord [25]."]} +{"18468106|207209718": ["Intrusion detection in cyber-physical systems is a relatively new area of research [8], which tends to focus on industrial control systems, such as programmable logic controllers (PLCs) and supervisory control and data acquisition (SCADA) systems."]} +{"18468106|2523102": ["As real-world and experimental cyber-physical attacks are becoming more prevalent, onboard intrusion detection systems are expected to become particularly important, especially for standalone robotic vehicles, whether manned or unmanned [25] ."]} +{"15031785|4528002": ["4) As discussed previously and demonstrated repeatedly by many researchers [4]\u2013[6], [32], [33], any successful malware attack to a vehicle can cause significantlymore severe consequences than compromising consumer electronics.", "Once on a vehicle, malware can cause a wide range of disruptions and damages [4]\u2013[6], [32], [33].", "Themost damaging security threats, however, are only emerging as vehicles connect to the Internet, provide onboard Wi-Fi hotspot services, communicate with other vehicles and Intelligent Transportation System (ITS) infrastructures, and support advanced applications such as over-the-air (OTA)ECUfirmware update [4], [6], [32], [33].", "Knownvulnerabilities in thedesignand implementation of onboard communication systems, hardware, software, and applications [6], [33], [37] can be exploited by malware to infect a vehicle."]} +{"15031785|12815020": []} +{"10772555|5660618": [", robust networked control systems [21], [22], fault-tolerant control [23], and distributed estimation [24]."]} +{"10772555|3330313": ["in a given dataset is defined as the observation that appears to be inconsistent with the remainder of the dataset [32]."]} +{"8876979|61132": ["ing [123], and thus the associated attacks fall outside the scope of this survey."]} +{"8876979|207209718": ["We discuss why these approaches cannot be generalized to CPS, while the mechanisms we have reviewed show significant potential to be generalized and applied to WSNs.\nZhou et al. [99] describe the WSN setting primarily as defined by resource-constrained sensors that perform both sensing and processing, while having a central authority that establishes the network.", "Ubiquitous access In many CPS, there is either no clear boundary between insiders and outsiders, or this boundary contains so many devices that some of these may be subject to compromise. cITS are a prime example, as such networks are cooperatively formed by vehicles and road-side equipment.", "However, note that this only works for stateful protocols; in CPS, in particular in cITS, most protocols are not stateful.", "There are recent surveys on the security of areas of which cITS canbeconsideredasubset, suchas trust inmobilead-hocnetwork (MANET) [17], opportunistic networking [18], and CPS [3], [19].", "In this survey, we have surveyed misbehavior detection in cITS. cITS are a promising type of networked system that connect vehicles, road-side units and back-end systems in order to achieve a safer, more efficient and more comfortable travel on roads. cITS are an instance of CPS, a type of system where interaction between the physical world and the cyber world is a central aspect.", "The term cyber-physical systems (CPS) has been coined to encompass all kinds of systems that are characterized by a large deployment of networked devices equipped with both sensors and actuators.", "However, in highly constrained environments like CPS, some network nodes may be compromised to obtain key material; in particular, in cITS, an attacker may obtain legitimate key material by manipulating her own vehicle to send arbitrary messages.", "Limited physical security As nodes in CPS are often distributed in a potentially hostile environment, they may be subject to hijacking, analysis, and reprogramming by attackers, even if they are centrally\n2\nmanaged.", "Due to the challenging network topology and applicationspecific networking paradigms applied in cITS, we believe that misbehavior detection mechanisms for these systems offer interesting properties that can be applied to a wide range of use cases, including other CPS.", "Although we have limited the survey of mechanisms to those designed for cITS, we believe that this survey offers a contribution to the wider field of CPS, as the novel aspects of mechanisms developed for cITS can be used to improve the security of other CPS.", "We envision two broad paths for future work; for security in cITS, taking further advantage of the highly orthogonal nature of the four different classes of misbehavior detection we have presented is of vital importance, while the generalization of misbehavior detection mechanisms for cITS to general CPS will allow the field to advance without sacrificing security.", "On the contrary, in CPS, the primary security assets are the sensor values contained within transmitted packets, as well as the actuators controlled based on this data.", "To take a first step towards this goal, we have analyzed the common aspects in Section 5 and discussed their application to other systems from the CPSdomain.", "For CPS, security is not optional: these systems control physical processes, many of which present a critical usage scenario where failure may cause extensive damage or loss of life.", "In addition, due to the time-critical nature of systems like cITS, as well as in many other types of CPS, this detection of attackers must occur in an automated fashion.", "Consequently, the networking patterns in CPS are applicationdependent and built around the semantics of exchanged information, rather than the classical ISO/OSI stack of network layers.", "Potential impact CPS control critical infrastructures in which a large variety of attackers may have an interest.", "Now that we have studied and classified the state of the art misbehavior detection mechanisms for cITS, we address the possible application of the ideas of these mechanisms to other cyber-physical system (CPS).", "In particular, we identify the following key characteristics of CPS, which determine their different security requirements.", "CPS have several unique challenges, including the critical usage scenarios, strong resource and cost constraints, and high scalability requirements.", "However, this survey will also discuss the applicability of techniques from cITS to other notable examples of CPS, such as smart grids and industrial control systems (ICS).", "We have surveyed such misbehavior detection mechanisms in detail, and discussed their generalizability towards other CPS.", "The content transferred in these networks is highly predictable, relating directly to real-world phenomena [3], [4], a fact that enables novel techniques to detect attacks, collectively referred to as misbehavior detection.", "Due to the direct connection with human safety, CPS can be a target for attackers with high financial resources.", "2873088 encompass systems that are characterized by a large deployment of networked devices equipped with both sensors and actuators [3].", "We then generalize this to other CPS in Section 5.3.", "They also identify node compromise as one of the most challenging attacks on WSN, which we have similarly identified as applying to general CPS. Contrary to the cITS use case, WSNs typically also include confidentiality requirements.", "For future work, we believe a primary goal of the CPS research community should be to develop a more systematic approach to this problem.", "Unlike traditional embedded systems, where individual nodes perform interactions with the real world in strongly constrained environments, CPS are highly networked, deployed in large regions, and may contain nodes with high computational power.", "However, a major difference between typical distributed systems and many types of CPS, such as cITS, the amount of nodes N is not known, or only a small subset of these nodes are actually in communication range.", "Out of these security mechanisms, we focus on those relating to our discussions regarding reactive security: integrity and intrusion detection, which are the main issues that we see recurring in CPS.", "This type of detection is not feasible for normal networks, because of the large variety of applications; however, in cyber-physical systems (CPS), the physical aspect allows semantics to be used in a meaningful way.", "this section will be extended after the Dagstuhl meeting Unlike cITS, ICS are a type of CPS that has historically grown out of the field of control systems, and the focus of these systems has primarily been safety, rather than security."]} +{"19396874|4528002": []} +{"107073726|2867949": ["Various kinds of port scans and tools to launch them are discussed in detail in [45].", ", by scanning the network in various modes [45],[211]."]} +{"107073726|18654252": ["Several other applications of RST in network anomaly detection [58, 75, 67, 139] are discussed in Chapter 6.", "There are many approaches to outlier detection [35, 139].", "A good amount of research on outlier detection in statistics is found in several books [317, 35, 163] as well as survey articles [39, 29, 139].", "A detailed discussion on mixed-type proximity measures can be found in [139].", "Outlier detection methods can be classified as [139] distance-based, density-based and soft computing approaches.", "Detailed discussions on various numeric proximity measures are available in [61, 141, 139].", "One can also handle mixed-type data by directly finding proximity [139] between a pair of categorical values using an exact matching approach.", "The mathematical framework of rough set theory enables modeling of relationships with a minimum number of rules [139].", "A detailed discussion on categorical proximity measures is available in [48, 139].", "Our literature survey [139] shows that the existing anomaly classification methods work basically in four modes, as given below."]} +{"107073726|16908400": ["Discussion of network coordinate systems, design and security is found in [102]."]} +{"107073726|8364569": ["[350], who explain the concepts of flows and classified attacks, and"]} +{"107073726|5646762": ["In an ensemble approach, the outputs generated by different clustering techniques are combined in order to provide a consensus output value [176]."]} +{"107073726|3330313": ["An extensive survey of anomaly detection techniques developed in machine learning and statistics has been provided by Hodge and Austin [169]."]} +{"107073726|6430931": ["Wu and Banzhaf [386] present an overview of applications of computational intelligence methods to the problem of intrusion detection."]} +{"207209718|14745481": ["Second, multitrust [Cho et al. 2011] is unexplored in CPS IDS research."]} diff --git a/edge/graph_86774056.jsonl b/edge/graph_86774056.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8677778.jsonl b/edge/graph_8677778.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8677900.jsonl b/edge/graph_8677900.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86798416.jsonl b/edge/graph_86798416.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f00a946eba18add140c7c8d831f038ca8dcad461 --- /dev/null +++ b/edge/graph_86798416.jsonl @@ -0,0 +1 @@ +{"33421176|12904520": ["Many studies have been done to save power consumption by caches and main memories [35]."]} diff --git a/edge/graph_86804038.jsonl b/edge/graph_86804038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0cf69052cc2f0d9f5d4187568bab887980afa37e --- /dev/null +++ b/edge/graph_86804038.jsonl @@ -0,0 +1,114 @@ +{"2838807|595093": ["A general survey on cybersecurity for smart grids can be found in Yan et al. (2012)."]} +{"5435199|7076261": ["(4) smart meters should be equipped with encryption capabilities."]} +{"55054431|6959212": []} +{"3620111|9850103": ["The methods for how to detect non-technical loss (NTL) in power grids based on smart meter data were reviewed in [19], while the NTL challenges were discussed in [20]."]} +{"3620111|485843": ["A power outage is defined as an electricity supply failure, which may be caused by short circuits, station failure, and distribution line damage [169]."]} +{"3620111|595093": ["However, several basic issues about smart meter data should be but have not been addressed: Who owns the smart meter data? How much private information can be mined from these data? Is it possible to disguise data to protect privacy and to not influence the decision making of retailers? 2) Data Security: For data security, the works on cyber physical security (CPS) in the smart grid such as phasor measurement units (PMU) and supervisory control and data acquisition (SCADA) data attack have been widely studied [214]."]} +{"3620111|3330313": ["be divided into probabilistic, statistical, and machine learning methods [73]."]} +{"3620111|14182694": ["It can realize highly efficient parallel computation [192]."]} +{"5546550|595093": ["Security concerns in smart grid can be categorized into three major groups [2], [4], [6]\u2013[8]: the first concern is the network availability."]} +{"5546550|5747564": ["The last network is the wide area network (WAN), which is utilized by NANs to forward the electricity reports to CC [2]\u2013[5]."]} +{"36300569|6959212": []} +{"18293944|5747564": ["Different communication technologies have been proposed for the AMI such as power line communication and wireless communication [14]."]} +{"11787406|485843": []} +{"5924797|18037424": ["and networking in smart grid [65]\u2013[67], security and privacy surveys [13], [48], [75], [76], attacks [68]\u2013[74], non-repudiation and accountability [22], [77]\u2013[79], Vehicle-to-Grid (V2G) security [80], etc."]} +{"26650508|595093": ["Several survey articles (Yan et al. (2012), Boyer et al. (2009), Beasley et al. (2014)) have addressed security challenges for synchrophasors and smart grid in general."]} +{"21605376|858139": []} +{"21605376|2457428": ["need N encryptions and accordingly N transmissions, where N is the number of members of a given group [149], causing a very high communication overhead and rekeying delay.", "3) Symmetric Cryptography With Group Keys: The first works in the literature to handle encryption within a publish/ subscribe service are those described in [113], [115], which have drawn from the literature on secure group communication services [149]."]} +{"67081273|16515889": []} +{"554131|5747564": []} +{"18543133|5747564": []} +{"13044442|2854761": ["Generally, the schedulers at both the BS and CPE devices are composed of two steps: 1) inter-class scheduling and 2) intra-class scheduling methods [29]."]} +{"18091679|4631990": ["This protocol is suitable for home energy management (HEM) [58] and AMI applications."]} +{"18091679|2373572": ["of PLC channel characteristics can be found in [64] and [65]."]} +{"18091679|18037424": []} +{"36186860|35109549": []} +{"20321067|18037424": ["On the other hand, field tests show that SG systems have also harsh and complex environmental conditions, dynamic topology changes, connectivity problems, interference and fading [1], [2]."]} +{"3546145|21386749": ["[44] reviewed the advances in health care which relies on Internet of Things (IoT) technologies.", "In particular, the work [44] also included security related taxonomies in the context of healthcare."]} +{"9211215|121289": ["As a key role in AMI, wireless smart meter is the major communication carrier for the customer and the power company [2], and has become a new evolution direction for the smart power terminals."]} +{"45452343|991041": ["There are some methods described in Kuipers et al. (2002), Li and Zhang (2010), Tuppen (2011), Misra et al. (2012), Zhu et al. (2011), and Jung et al. (2011) that attempt to develop routing algorithm for smart grid environments, but these algorithms are not deficient in meeting the challenges of\u2026", "Figure 5 reveals how LAMCR outperforms OMCR and HWMP in the packet\ndelivery ratio as a consequence of its learning process.", "Here too LAMCR performs better than OMCR and HWMP, even when the number of nodes in the network is large.", "The\nK-approximation algorithm (OMCR) (Kuipers et al., 2002) utilizes cost and delay as constraints.", "The proposed approach is compared with the existing solutions OMCR (Van Mieghem and Kuipers, 2004) and HWMP (Zhu et al., 2011).", "A study is performed for LAMCR by evaluating its performance with two existing methods, namely OMCR (Kuipers et al., 2002) and HWMP (Zhu et al., 2011).", "The instability in route establishment causes the performance decrease in HWMP and OMCR.", "LAMCR is tested and compared with the legacy systems such as OMCR (Kuipers et al., 2002) and HWMP (Zhu et al., 2011).", "Finally, we have compared the results of the proposed algorithm, LAMCR, with OMCR and HWMP.", "Related work\nIn Kuipers et al. (2002), a multi-constrained QoS routing algorithm for smart grids is proposed."]} +{"109077100|5747564": []} +{"12537501|8440916": ["A comparison based analysis is presented in [15] where several contemporary wireless standards have been reviewed."]} +{"12537501|29060869": ["[14] discussed the possibility to reduce operational costs by upgrading SG communication infrastructure to utilize energy efficient communication techniques."]} +{"12537501|485843": ["TABLE II LATENCY AND BANDWIDTH REQUIREMENT FOR DIFFERENT SG APPLICATIONS [8]", "Severe drawbacks are associated with the existing power grids [8], such as: (1) disjointed architectural configuration; (2) bandwidth limitations for bidirectional communication; (3) inter-operability issues between vendor based network components; and (4) inefficient", "Available survey journals [8-12] on SG cover a wide range of topics such as defining the SG communication network architecture, communication requirements, security issues and related standards.", "> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) \n5\nTABLE II LATENCY AND BANDWIDTH REQUIREMENT FOR DIFFERENT SG APPLICATIONS [8]\nApplication Bandwidth Latency Payload\n(bytes)\nReliability\nElectric Vehicles (V2G, EV\ncharging)\n9.6-56kbps 2s \u2013 5 min 255 >98%\nDemand Response 14-100kbps 500ms-1min 100 >99.5%\nMeter reading 10Kbps to\n128Kbps\n2-15s 200 >98%\nOverhead Transmission Line\nMonitoring\n9.6-56kbps 15-200 ms 25 >99.5%\nSubstation Automation 9.6-56kbps 15-200 ms 25 >99.5%\nOutage management 56kbps 2s 25 >98%\nDistribution automation\nPeriodical\n9.6-56kbps 25 _ 100 ms 150-200 >99.5%\nFig."]} +{"12537501|121289": ["Also, applications may require high bandwidth with flexible delay bounds, such as Advance Metering Infrastructure (AMI), EV Charging and Vehicle to Grid (V2G) power transfer [9].", "Available survey journals [8-12] on SG cover a wide range of topics such as defining the SG communication network architecture, communication requirements, security issues and related standards."]} +{"19258692|3488022": ["With regard to this, Fingasa and Brownb [7] collected a variety of airborne big data in different seas where oil spills occurred previously.", "[7] M. Fingasa and C. Brownb, \u201cReview of oil spill remote sensing,\u201d Marine Pollution Bull., vol. 83, no. 1, pp. 9\u201323, Jun. 2014."]} +{"8854215|595093": []} +{"8854215|121289": []} +{"67179184|595093": ["For instance, Yan et al, summarize possible vulnerabilities and cybersecurity requirements in smart grid communication systems and surveyed solutions capable of counteracting related cybersecurity threats [8]."]} +{"67179184|121289": ["Its functional architecture represents an automated two-way communication between a smart utility meter and a utility producer [1].", "By generalizing the structures in [15], [2] and [1], we present functional smart metering architecture as illustrated in figure 1.", "The metering system monitors consumers\u2019 power consumption by collecting information on such consumption and communicating such information back to the utility company for load monitoring and billing [1].", "The functional architecture represents an automated two-way communication between a smart utility meter and a utility producer [1].", "Smart meters identify power consumption by collecting information on such consumption and communicate the information back to the utility company for load monitoring and billing for accounting purposes [1]."]} +{"2689295|18037424": ["1, and defined seven crucial domains as follows: bulk generation, transmission, distribution, customers, operations, markets, and service providers [1]\u2013[4]."]} +{"25768315|595093": ["be found in [18]."]} +{"25374815|8606364": ["Various spectrum occupancy models were reported in [39] and [40]."]} +{"25374815|2521001": ["The SG communication is a heterogeneous amalgamation of wired (e.g., \ufb01ber-optic and copper) and wireless (e.g., WiMAX, microwave, and satellite) technologies working in various standards [9] and different security requirements [10], [11]."]} +{"25374815|595093": ["The SG communication is a heterogeneous amalgamation of wired (e.g., \ufb01ber-optic and copper) and wireless (e.g., WiMAX, microwave, and satellite) technologies working in various standards [9] and different security requirements [10], [11]."]} +{"25374815|5747564": []} +{"206577086|8606364": []} +{"206577086|19938676": ["5G systems are envisioned for very high base station and device densities [140]\u2013[142]."]} +{"206577086|29060869": ["The unique features of 4G cellular networks make them a suitable candidate for NAN and WAN [82], [86].", "In rural areas with low population densities there has been a recent trend to replace cellular communication for SG AMI applications by CR communication to avoid the spectrum license costs [86].", "CR WAN architectures based on IEEE 802.22 WRANs can readily support the WAN data collection [86]."]} +{"206577086|10440280": ["Another group of surveys has focused on SG pricing methods [91], energy efficiency [92], and power demand forecasting [93], [94], as well as the control of renewable energy in the SG [95]."]} +{"206577086|2521001": []} +{"206577086|1588237": []} +{"206577086|8974063": []} +{"206577086|16219347": ["\u2026system based on the IEEE 802.22 CR communication standard have been proposed in [161], [162] Wireless multimedia sensor and actor networks [167]\u2013[170] can assist in the monitoring of energy generation facilities, transmission and distribution equipment, as well as consumer premises through\u2026"]} +{"206577086|595093": []} +{"206577086|5747564": ["of the SG concept [11], [76]\u2013[79] as well as the general com-"]} +{"206577086|7686677": []} +{"206577086|10310014": ["This local access point is further connected to a control center for storage, processing, and management of meter data [108], [109]."]} +{"206577086|121289": []} +{"206577086|2373572": []} +{"206577086|18037424": ["munications needs and applications in the SG [80]\u2013[82] and SG communication architectures [2], [83]\u2013[88]."]} +{"35109549|18037424": ["Modern society demands this system to be more reliable, scalable, and manageable while also being cost effective, secure, and interoperable [1]."]} +{"19820055|23893450": ["[28] present a survey of the recent data driven approaches in smart grid security."]} +{"1515368|12817488": ["Data aggregation has extensively been analyzed in sensor networks to minimize the transmitted data band-width due to the limited sensor power [17]."]} +{"1515368|6959212": ["At transport layer, we can utilize data aggregation mechanisms [9,10] to minimize grid management overhead due to small-sized periodic grid measurement data as in Fig."]} +{"23893450|2521001": ["[8] present a survey of smart grid security issues with a strong emphasis on the smart home environment and its interactions with the smart grid environment."]} +{"23893450|595093": ["[4] further suggest the cyber security requirements, vulnerabilities and solutions for Smart Grid communication networks."]} +{"23893450|18411031": ["The work in [92] has surveyed existing works for following data storage security objectives within cloud-based platform: data integrity, data confidentiality, and data availability."]} +{"17897956|20178897": ["Particularly, Z-Wave [4] and ZigBee [5] are mostly utilized technologies, having low-power wireless communication capability.", "Examples of some popular standards and protocols related to home automation include X10, UPB, INSTEON, Z-Wave, and ZigBee [3]."]} +{"41022148|595093": ["Finally, [26] summarizes the security requirements and possible threats in smart grid communications and surveys the solutions for them regarding privacy, integrity, authentication, and trusted computing."]} +{"116026420|2521001": ["(ii) As a smart meter usually sends consumption usage every 15/30/60 minutes periodically [5], an ill-intention user may eavesdrop wireless communication channels, and may leak consumption data for own purposes [6].", "(iii) Even worse, if vulnerabilities are exploited successfully then an adversary could surprisingly damage the entire home, city, and/or societies to tumble apart [5]."]} +{"96445077|121289": []} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"44091851|3348390": []} +{"44091851|25929315": []} +{"207881413|595093": ["(A more detailed discussion on Smart Grid domains can be found in [14] [15] [16].)"]} +{"207881413|6959212": ["Compared with legacy power systems, the Smart Grid is envisioned to fully integrate high-speed and two-way communication technologies [4] [5] [6] [7] [8] into millions of power equipments to establish a dynamic and interactive infrastructure with new energy management capabilities, such as advanced\u2026"]} +{"207881413|2457428": ["As key management for conventional computer networks has been well categorized and summarized in several survey papers [117,118], in the following, we focus on the new requirements of key management for the Smart Grid, and present an overview of existing key management schemes for power systems."]} +{"18401175|18037424": []} +{"12814166|16219347": []} +{"12814166|7889189": []} +{"12814166|2906926": []} +{"12814166|15947359": []} +{"12814166|1940388": []} +{"12814166|17769444": []} +{"12814166|2357830": []} +{"12814166|17205659": []} +{"8083671|595093": ["It is therefore imperative to have strong security policies in place to ensure that exploitable weaknesses due to weak policies, are nonexistent."]} +{"41726504|2521001": ["A number of recent articles survey dsecurity issues in smart grids [12]\u2013[20]."]} +{"41726504|5747564": []} +{"24480295|2623404": ["Consequently, network management and performance tuning is quite challenging and error-prone [11]."]} +{"24480295|991041": ["Furthermore, restricted shortest path (RSP) problem is a special case of MCOP problems where the goal is to find the path with the least cost among the set of feasible paths that satisfy one constraints; for example, a constraint on T bounds the maximum path delay [9]."]} +{"16865655|18037424": ["With the AMI networks, the utility companies are able to monitor power demands over even short periods to provide both more accurate billing and dynamic pricing ef\ufb01ciently utilizing the decrease in peak demand [2]."]} +{"53746146|15895606": ["1) Comparison With This Work: Some of the surveys discussed above present various interesting security perspectives, models and categorizations for IoT security [23], [25], [28], [39], [41], or for related areas like cyber-physical systems security [17].", "Although security attacks against cyber-physical systems [17] and IoT devices [13] have received considerable attention during the last years, the signi\ufb01cance of IoT-enabled attacks is not always fully assessed.", "Humayed et al. [17] describe a framework to model cyber-physical security.", "Several surveys in the literature exist that address many diverse aspects of security in the IoT ecosystem [2], [17], [23]\u2013[38]."]} +{"53746146|8854215": ["Several surveys [48]\u2013[51] present and categorize cyber-physical attacks on different assets of the smart grid and propose effective security countermeasures.", "As in the previous domain, we do not aim to analyze in depth the security risks of smart grids; too many surveys are available in the literature ( e.g., [48]\u2013[51]).", "The security of smart grids has been studied in various recent surveys, such as [48]\u2013[51].", "In [51] attacks on electricity market systems are also surveyed."]} +{"53746146|18451845": ["It is based on the concept that the batteries of electric vehicles can be utilized to assist the stabilization of the electricity network [101]\u2013[104]."]} +{"53746146|21386749": ["Examples of AMDs are Implantable Medical Devices (IMDs) ( e.g., heart de\ufb01brillators) and Wearable Medical Devices (WMDs) - ( e.g., insulin pumps) [192]."]} +{"53746146|2521001": ["Similar scales have been used in related works, such as the impact assessment of attacks on smart grids [50].", "For example, Komninos et al. [50] survey security challenges and countermeasures in smart grid and smart home and evaluate the security impact of related attacks.", "However, our scope will be much broader than industrial IoT (as in [26] and [33], smart vehicles (as in [29]), smart grid (as in [50]), or any other sector-speci\ufb01c analysis."]} +{"53746146|595093": ["Several surveys [48]\u2013[51] present and categorize cyber-physical attacks on different assets of the smart grid and propose effective security countermeasures.", "As in the previous domain, we do not aim to analyze in depth the security risks of smart grids; too many surveys are available in the literature ( e.g., [48]\u2013[51]).", "The security of smart grids has been studied in various recent surveys, such as [48]\u2013[51]."]} +{"54042391|2457428": ["In Chang and Chung (2003), Jablon (1996), and Rafaeli and Hutchison (2003), KM schemes are proposed to improve the protection and reduce the space required to store the keys."]} +{"54042391|121289": ["So, as in the other networks, the efficiency, reliability, control system and safety are required parameters in the smart grid system (Yan et al., 2013)."]} +{"17603442|1236072": ["Routing protocols for WSNs can be split in three categories based on network structure [10]."]} +{"18941754|1230643": ["It is a distributed system interacting with physical environment [1]."]} +{"3852398|5747564": ["Index Terms\u2014Big data, cloud computing, secure, information management, smart grid\n\u00c7", "The regional cloud computing centers are in turn in charge of managing intelligent devices, which have lower hierarchical level than the regional cloud computing centers in specific regions (e.g., within a city), and processing data of these devices."]} +{"110356720|595093": []} +{"110356720|5747564": []} +{"110356720|121289": []} +{"9951196|154032": ["In [56], the EE of the networking components in cloud-based environments was provided."]} +{"9951196|8215225": ["Interesting readers may also refer to [49] for distributed data aggregation algorithms."]} +{"4931940|8650651": ["Software Defined Optical Networks (SDONs) [53] are another future research direction where optical networks are used for reliable communication in the SG system.", "Possibly, the development of the standard VPP interface can take lessons from the recent development of the OpenFlow interface [53] between controllers and switches in the context of the SDN paradigm for communication networks."]} +{"4931940|11414835": [", the flexible aggregation and slicing of network resources [55]\u2013[57]."]} +{"4931940|14765802": ["BSs based on RERs may also be a good choice for remote (off-grid) areas where traditional energy resources are not available, or for developing countries with missing or unreliable traditional energy resources [50]."]} +{"4931940|29060869": ["A detailed discussion on energy-efficient communications and their interaction with the grid is given in [51]."]} +{"13134945|485843": ["Consequently, real-time smart metering applications require sampling at intervals in the order of 1-s or even sub-second depending on the desired application and its particular latency requirements [11]."]} +{"32466400|5747564": ["For further reading on the current state of standardization [19]\u2013[22] are suggested."]} diff --git a/edge/graph_86808618.jsonl b/edge/graph_86808618.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3416826a2f04f4c324dcc26741ffc9beb06237a4 --- /dev/null +++ b/edge/graph_86808618.jsonl @@ -0,0 +1,7 @@ +{"53046901|27262729": []} +{"53046901|925507": ["In [36], the authors propose a key-based authentication system dedicated to the IoT environments.", "IoT devices have limited memory; hence, they cannot store large private/public keys [43].", "However, the latency and the scalability challenges are not resolved, especially for real-time IoT applications.", "This approach is implemented and testified for a specific IoT use-case.", "The same threat can target the IoT platforms, the smart home environments, or the intelligent transportation systems.", "IoT is witnessing a rapid increase in the number of innovative applications; however, security is still a major concern.", "For example, in IoT applications, the sensor data has to be tracked so that they get to the consumers without any unauthorized modification.", "Such applications include healthcare [6], Internet of Things (IoT) [7], [8], and cloud storage [9].", "Examples of such surveys include the blockchain technology for IoT [8], healthcare [6] and decentralized digital currencies [12].", "The IoT devices are connected to these validators and are assumed to be simple without any computational capability.", "Accordingly, the DMV can add a new IoT node by submitting a transaction containing the node\u2019s public key and address to the blockchain.", "Furthermore, the consumer could be an IoT device which generally lacks the required computational power and might be unable to perform all the required computations.", "Moreover, IoT, healthcare, smart grids, and several other popular networking applications need to process and store a massively large amount of data, generally using cloud computing.", "Such applications include healthcare [5], Internet of Things (IoT) [6] [7], and cloud storage [8].", "In the age of social networking, cloud computing, IoT, and other distributed applications, data is an acute resource that is open and vulnerable to intrusions.", "FairAccess has been utilized to provide a distributed, secured, and adaptive ACL management for the IoT environments [60].", "These properties make the blockchain technology a potential approach for the current distributed applications including IoT, healthcare, and automated supply chains.", "Furthermore, the DMVs can update or revoke their IoT devices\u2019 public keys by submitting transactions.", "Guardtime provides another solution for secure authentications of the IoT devices using the blockchains and physically unclonable functions (PUFs).", "Such services are critical for most of the current applications including IoT and healthcare.", "The DMVs are hosted by the IoT manufacturers and they are required to have the computational capabilities to generate the public/private keys, to perform mining and to maintain the blockchain database.", "IoT Data In [76], the authors propose a blockchain-based data integrity framework that uses the smart contracts to achieve its objectives.", "This framework is dedicated to IoT applications that require a producer-consumer architecture.", "Even though the approach was initially applied to the IoT platforms, the idea can be implemented in any other networking applications including sensor networks, health care, or even micro clouds platforms.", "Examples of such surveys include the blockchain technology for IoT [7], healthcare [5] and decentralized digital currencies [11]."]} +{"56208985|206778480": ["[1] for conducting the review and presenting the results.", "They particularly suggested to report AUC and confusion matrices and presented references for useful means of reporting [1], [67], [68] (for confusion matrices).", "[1] when discussing model performance in relation to certain factors (e.", "To the best of our knowledge, there does not exist any SLRs and formal meta-analysis on CPDP, however, three secondary studies have already been performed on defect prediction [1], [3], [5].", "[1] has investigated how model performance is affected by the context, independent variables and the modelling techniques in defect prediction with a synthesis of existing work from 2000 to 2010.", "[1], we restricted each case to have at least three data points to contribute to the plots.", "Despite its limitations, this is useful to identify general patterns and potential research gaps [1].", "Only the most comprehensive or the most recent version of repeated studies are included [1], i.", "[1] presented alternatives to be used for reporting.", "[1] was used with slight modifications."]} +{"56208985|627405": []} +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} +{"52183530|8589228": ["In this study, results were analyzed using a SMC (Statistical Model Checking) [23] tool, which allowed the authors to reveal scenarios where the smart contract behaviors could be compromised by malicious users."]} +{"37234994|54746333": ["The best type of goodware counterpart for malware applications are portable and standalone benign apps [32]."]} diff --git a/edge/graph_86810469.jsonl b/edge/graph_86810469.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..641a37080ca499ed189b57a4d1a030825cfeccf3 --- /dev/null +++ b/edge/graph_86810469.jsonl @@ -0,0 +1,7 @@ +{"110270515|11990480": []} +{"14603801|11990480": ["Active cell balancing uses different topologies according to the active element for storing the energy such as capacitor and/or inductor component, as well as, the energy converters as [1\u201321].", "Another derivation of the SC topology, the single switched capacitor (SSC) topology [1,2,4,5,17\u201319] makes use of only one capacitor as shown in Figure 4.", "Quite a lot of cell balancing/equalization methods have been proposed in [1\u201321] and reviewed in [1\u20137].", "The switched capacitor (SC) illustrated in [1\u20135,10\u201313,18] is shown in Figure 2."]} +{"6778362|11990480": ["Traditional cell balancing circuits use dissipative resistors, resulting in energy loss [6]."]} +{"12075120|4491892": ["In this case, as the particle number N \u2192 +\u221e, both the state estimate \u03c7\u0302k and parameter estimate \u03b8\u0302 k will converge to the true values [27]."]} +{"44172931|11990480": ["Disadvantages of this cell balancing method include complex magnetics and high parts count due to each secondary's rectifier ([1]).", "Abstract\u2014The two major classifications of active cell balancing methods are charge shuttling and energy converting ([1])."]} +{"24566583|11990480": []} +{"20966445|11990480": []} diff --git a/edge/graph_86815085.jsonl b/edge/graph_86815085.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc438c6a3e0a735119201e05ebbb830e243a7e99 --- /dev/null +++ b/edge/graph_86815085.jsonl @@ -0,0 +1,14 @@ +{"8975329|44944144": ["\u2026middleware for context-aware cooperative application n mobile ad hoc peer-to-peer network\nun-Li Kuo \u2217, Chen-Hua Shih, Cheng-Yuan Ho, Yaw-Chung Chen nformation and Communications Research Laboratories (ICL), Industrial Technology Research Institute (ITRI), Hsinchu, Taiwan\nr t i c l e i n f\u2026", "For example, two famous WLAN proocols, WiFi and WiMax, can support network capability without nfrastructure in the ad hoc mode, which is generally introduced\nobile ad hoc network (MANET) (Sesay et al., 2004).", "J A o\nJ I\na\nA R R 2 A A\nK M C I A R M\n1\nt i n a t i m\nt n a i n s\np t a t a\n0 h\nARTICLE IN PRESSG ModelSS-9234; No. of Pages 12 The Journal of Systems and Software xxx (2013) xxx\u2013xxx\nContents lists available at ScienceDirect\nThe Journal of Systems and Software\nj ourna l ho mepage: www.elsev ier .com/ locate / j ss\ncross-layer middleware for context-aware cooperative application n mobile ad hoc peer-to-peer network\nun-Li Kuo \u2217, Chen-Hua Shih, Cheng-Yuan Ho, Yaw-Chung Chen nformation and Communications Research Laboratories (ICL), Industrial Technology Research Institute (ITRI), Hsinchu, Taiwan\nr t i c l e i n f o\nrticle history: eceived 27 September 2012 eceived in revised form 5 September 2013 ccepted 2 October 2013 vailable online xxx\na b s t r a c t\nMobile ad hoc peer-to-peer (P2P) applications become popular for providing the file sharing, voice communicating, and video streaming services due to entertainments and disaster recovery."]} +{"11017275|1113420": ["Therefore, pervasive system must be context-aware (Baldauf et al., 2007) in order to enhance user-environment interaction."]} +{"11017275|70923": []} +{"6421030|5664472": []} +{"6421030|7834819": ["Besides, since the waist is close to human body\u2019s mass center, waistplacement for motion sensors is commonly used in many studies [30]."]} +{"6421030|15273230": ["If the classification categories are not approximately equally represented, we call the dataset imbalanced [37], which is common across various disciplines, such as anomaly detection and medical diagnosis."]} +{"46428079|4411601": []} +{"14702134|627405": ["In the next section, we explain how we have used the methodology discussed in [1].", "Guidelines on conducting a systematic literature review are thoroughly explained in [1,8].", "According to [1], a systematic review of the literature constitutes the first step of performing evidence-based research.", "Performing a systematic review can be decomposed into three main phases: planning, conducting and documenting the review [1].", "In line with [1] the title and abstract were examined by the first author whereas the full papers which were not rejected at the first three stages were examined by both authors.", "This procedure aims to identify an answerable question that provides information, find evidence that answers the question and evaluate that evidence [1]."]} +{"76306|1634674": ["Learning the rule of the grammar from training data is a promising alternative, but it has proved to be extremely difficult in the general case [39]."]} +{"76306|1400872": ["have discussed well known learning algorithms, including a gradient descent optimisation method [116,117] and resilient backprogagation algorithms [118]."]} +{"1598350|17641462": ["Furthermore, such context discovery modules should be able to combine together to discover more advance contextual information [36]."]} +{"1598350|3348390": ["Therefore, it is ideal to have a tool that is capable of evaluating a given software component (as a self-contained algorithm that may take primary context information as inputs and outputs secondary context information by using any kind of data reasoning technique [2]) against a given computational network architecture, and decide which location is optimal to conduct any kind of reasoning based on user preferences, resource availability, contextual information availability, network communication availability, and so on.", "During the course of these phases, the application of context-aware communication and computing changed significantly [2].", "Several other important surveys are analyzed and listed in [2].", "Primary context refers to any information retrieved without using the existing context, and without performing any kind of sensory data fusion operations [2].", "Since the term was introduced in the late 1990s many solutions have been introduced to the IoT marketplace by different types of organizations, ranging from start-ups, academic institutions, government organizations and large enterprises [2].", "Such technology will help to create \u2018a better world for human beings\u2019, where objects around us know what we like, what we want, and what we need and act accordingly without explicit instructions [2]."]} +{"57048228|1113420": []} +{"41035564|627405": ["In order to achieve this goal, Kitchenham and Charters have adapted guidelines for systematic literature reviews, primarily from medicine, evaluated them [24] and updated them accordingly [96].", "Experience from systematic literature review stresses the importance of a pre-review study to help scoping the research questions, as well as being open to modifying research questions during the protocol development, as the problem under study becomes clearer [24]."]} diff --git a/edge/graph_86817369.jsonl b/edge/graph_86817369.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86829503.jsonl b/edge/graph_86829503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_86846989.jsonl b/edge/graph_86846989.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bbfd3541a25a5316d2a43a90a2cd20fc147341d --- /dev/null +++ b/edge/graph_86846989.jsonl @@ -0,0 +1 @@ +{"70270531|2373140": ["Some of the models combine VAP with other fleet management problems, such as fleet sizing and vehicle routing (Maalouf et al., 2014) or vehicle scheduling (Lobel, 1997; Pillac et al., 2011) within time and capacity constraints."]} diff --git a/edge/graph_86851712.jsonl b/edge/graph_86851712.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e47c1ec27f3b77d24dd2d102dc01d9536709da53 --- /dev/null +++ b/edge/graph_86851712.jsonl @@ -0,0 +1,2 @@ +{"15641792|16907530": ["The same argument is shared by Kotlarsky and Oshri (Kotlarsky and Oshri, 2005) and Nurdiani et al. (Nurdiani et al, 2011)."]} +{"15641792|11139156": ["Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge exchange is found to be one of the critical success factors for o \u21b5 shore software development by Khan et al. (Khan et al, 2009).", "Emam et al. (Hossain et al, 2009) showed that a number of studies have highlighted collaboration issues as a challenging factor in using Scrum in GSD. KT has also been shown as one of the challenges for distributed software project management (da Silva et al, 2010) while e \u21b5 ective knowledge\u2026"]} diff --git a/edge/graph_86859566.jsonl b/edge/graph_86859566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55dccdf03711a47345e47dc48c40348b4c706069 --- /dev/null +++ b/edge/graph_86859566.jsonl @@ -0,0 +1,2 @@ +{"117090460|15142221": []} +{"119154834|86859566": []} diff --git a/edge/graph_86860496.jsonl b/edge/graph_86860496.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8985d4edf9b4242a8a194910b9cd7e060c565e71 --- /dev/null +++ b/edge/graph_86860496.jsonl @@ -0,0 +1,9 @@ +{"67279885|70271467": ["RNN is good at prediction of character in the text and also can learn dependencies and actual evidence which is stored for a long time [23].", "Deep Learning algorithm in a supervised way : Convolutional neural network (CNN) [23] is normally trained in a supervised way.", "These methods have been applied to visual object recognition, object detection, detecting network intrusion and many other domains [23].", "The CNN architecture used to structure 2D images [24] and a most important acknowledgement of CNN is face recognition [23]."]} +{"67279885|11381530": ["IDSs collect data from different systems and network sources and analyse the data for possible threats [10].", "It is resource hungry, demanding computational processing units and memory [10].", "The domain of Machine learning (ML) is dedicated to developing systems that can automatically learn from the data [12] and identify hidden patterns without being explicitly programmed to do so [10].", "IDSs detect anomalous and malicious activities from inside and outside intruders [10].", "Deep learning is capable of automatically finding a correlation in the data, so it is a prospective method for the next generation of intrusion detection techniques [10].", "ML algorithms is categorized by the learning style they employ and by the functional similarity of how they work [10]."]} +{"67279885|2623404": ["It can integrate security devices within the network topology [35], which can lead to increase in accuracy, detecting security incidents and simplify management."]} +{"67279885|25929315": []} +{"4505261|3273340": []} +{"4505261|19034128": ["supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "There are three main types of learning, i.e. supervised learning, unsupervised learning, and semisupervised Learning [23,24].", "One of the representative learning methodologies is Machine Learning, that is related to changes in the systems that perform tasks associated with artificial intelligence such as recognition, diagnosis, prediction, etc. [23]."]} +{"206577177|8364569": ["[5] focus on Network Flow (NetFlow) data and point out that the packet processing may not be possible at the streaming speeds due to the amount of traffic."]} +{"206577177|13172512": ["[3] describe ML techniques for Internet traffic", "[3], this paper presents methods that work on any type of cyber data, not only Internet Protocol (IP) flows."]} +{"206577177|6430931": ["[6] focus on Computational Intelligence methods and their applications to intrusion detection."]} diff --git a/edge/graph_86863020.jsonl b/edge/graph_86863020.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8690743.jsonl b/edge/graph_8690743.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aaad8c0ca76ffe5b06d180501b481d3e692e2b4b --- /dev/null +++ b/edge/graph_8690743.jsonl @@ -0,0 +1,6 @@ +{"52870530|16514036": []} +{"52870530|8836911": []} +{"14350255|17205659": []} +{"16514036|1230643": ["Although many protocols and algorithms have been proposed for traditional wireless sensor networks (WSNs) [1], they are not well suited to the unique features and application requirements of BAN."]} +{"6332923|1940388": ["So far, numerous of routing protocols have been proposed for sensor networks, but none of them have been designed with strong security as a goal [59,86].", "In [86,87] the authors argue that mobility supported secure localization protocols still need to be explored."]} +{"6332923|17205659": ["In forward secrecy, a medical sensor cannot read future messages transmitted after it leaves the network, while in backward secrecy a sensor joining the network cannot read any previously transmitted messages [93].", "In [56,93] the authors did not consider public key authentication."]} diff --git a/edge/graph_8697076.jsonl b/edge/graph_8697076.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b1c315bdc6f61af3d663324bd150a02695c78a6 --- /dev/null +++ b/edge/graph_8697076.jsonl @@ -0,0 +1,4 @@ +{"11735758|8364569": ["Contrary, a detection approach based on an analysis of network flows scales well and is capable of capturing a wide spectrum of attacks [15]."]} +{"8498397|8697076": ["Although blackholing has not been examined to date, other recent measurement studies focus on attack amplification potential [7,20,32,33,38] and on progress towards diminishing their impact [19].", "Indeed, the intensity and the dimension of such attacks is still rising, in particular due to amplification and reflection attacks [7,32,33]."]} +{"8498397|206584087": ["Among the reactive defenses, we distinguish between source-based , destination-based , and network-based [39] mechanisms depending on where they are deployed."]} +{"11372438|1252121": []} diff --git a/graph_870434.jsonl b/edge/graph_870434.jsonl similarity index 100% rename from graph_870434.jsonl rename to edge/graph_870434.jsonl diff --git a/edge/graph_8710114.jsonl b/edge/graph_8710114.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_871285.jsonl b/edge/graph_871285.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8716903.jsonl b/edge/graph_8716903.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8718737.jsonl b/edge/graph_8718737.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..808b46d4beecd2d80aaad8b201f30be97e629c61 --- /dev/null +++ b/edge/graph_8718737.jsonl @@ -0,0 +1,8 @@ +{"23720221|205488310": []} +{"16915526|15563159": []} +{"16463579|207372751": []} +{"13407903|6387482": []} +{"14544742|13093354": []} +{"387449|987239": []} +{"387449|9835525": []} +{"387449|9045232": []} diff --git a/edge/graph_8723075.jsonl b/edge/graph_8723075.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8725221.jsonl b/edge/graph_8725221.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8726991.jsonl b/edge/graph_8726991.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8728131.jsonl b/edge/graph_8728131.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..037068cddf8f5099848fba23467e6fa8db15297d --- /dev/null +++ b/edge/graph_8728131.jsonl @@ -0,0 +1 @@ +{"29325535|6746689": []} diff --git a/edge/graph_8729078.jsonl b/edge/graph_8729078.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9dfd3e2f58eaf4f28b6676daef50818fa81238b --- /dev/null +++ b/edge/graph_8729078.jsonl @@ -0,0 +1,6 @@ +{"15818983|7788290": []} +{"6837802|7788290": []} +{"4581209|14970359": []} +{"7788290|7185733": ["[1], Cedras and Shah [14] and Pavlovic, Sharma and Huang [61], respectively.", "Chang and Huang 15] d e t e c t r i b bons corresponding to the arms and feet.", "Kuch and Huang 46] use a greedy search strategy based on perturbation of individual state parameters.", "See Aizawa and Huang 2] for a good overview."]} +{"2857532|53680608": []} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} diff --git a/edge/graph_8730885.jsonl b/edge/graph_8730885.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8732167.jsonl b/edge/graph_8732167.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74f6f4c60338eb023b50d5bf3dbc7bee5340eacd --- /dev/null +++ b/edge/graph_8732167.jsonl @@ -0,0 +1,3 @@ +{"16679377|764622": []} +{"8210408|8530790": [", genetic algorithms (GA), see [18] and [19] and the references therein, where their flexibility in handling multiobjectives is attractive."]} +{"15519412|10863733": []} diff --git a/edge/graph_8734017.jsonl b/edge/graph_8734017.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8735986.jsonl b/edge/graph_8735986.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..085f82b9d405a5c5807409b71932fb1eae038d8a --- /dev/null +++ b/edge/graph_8735986.jsonl @@ -0,0 +1,2 @@ +{"36613561|9176080": []} +{"17464678|9176080": ["The distortion caused by data embedding is called the embedding distortion [3]."]} diff --git a/edge/graph_873842.jsonl b/edge/graph_873842.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8742997.jsonl b/edge/graph_8742997.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8743168.jsonl b/edge/graph_8743168.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd8ff2cb3f2e5f923d997110b7d11fb43b45ca26 --- /dev/null +++ b/edge/graph_8743168.jsonl @@ -0,0 +1,3 @@ +{"915490|8589228": ["Both, YMER and VESTA do not support steady state probabilities and thus cannot be used for our purpose [24]."]} +{"40518883|1137487": ["The issues in maintaining sensing coverage and connectivity by keeping a minimum number of sensor nodes in the active mode in wireless sensor networks are presented in [15,17]."]} +{"10106091|17567998": ["[Gokhale 2007] provides the state of the art in architecture-based software reliability analysis.", "However, [Gokhale 2007] is not restricted to architectural designs based on UML, they also consider other languages and architectural proposals."]} diff --git a/edge/graph_8743639.jsonl b/edge/graph_8743639.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a573ab5d14771fbaec5fb81d1ecce7027d752c53 --- /dev/null +++ b/edge/graph_8743639.jsonl @@ -0,0 +1,10 @@ +{"16685984|14140377": []} +{"14449510|2451860": ["Keywords: location-based services, nearest-neighbor search, Voronoi Diagram, indexing technique, semantic caching, query scheduling, roaming"]} +{"6792102|1413700": []} +{"4786526|1413700": ["The process during which an MH enters into a new cell is called hand-o\ufb00 ."]} +{"15784275|1413700": ["variable bandwidth, frequent disconnections, limited resources on mobile host etc [6]."]} +{"18825546|2451860": ["In addition, the processing of mobile transaction is more prone to error [3, 4]."]} +{"16094154|1413700": ["The mobile environment for the mobile transaction execution [1] is the combination of fixed and mobile hosts, wired and wireless connectivity."]} +{"122040|2451860": []} +{"7571970|8424228": ["This process is commonly referred to as one-copy equivalence [1] and is the main purpose of any distributed system implementation."]} +{"15557550|8424228": []} diff --git a/edge/graph_8743840.jsonl b/edge/graph_8743840.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8755568.jsonl b/edge/graph_8755568.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c9c286bfba167c8dd1244fa38e954f7fe9969c9e --- /dev/null +++ b/edge/graph_8755568.jsonl @@ -0,0 +1,5 @@ +{"16371788|945077": []} +{"14333665|14441987": ["A good review of ad-hoc routing protocols can be found in [2]."]} +{"1027180|14441987": []} +{"6438719|14441987": []} +{"61610707|2181694": ["In this paper, an effort has been made to propose a collaborative hierarchical model capable of detecting insomnia of sensor nodes [1,10].", "In one of our earlier works, we have presented a survey of recent IDS in sensor networks [1]."]} diff --git a/graph_875676.jsonl b/edge/graph_875676.jsonl similarity index 100% rename from graph_875676.jsonl rename to edge/graph_875676.jsonl diff --git a/edge/graph_8756787.jsonl b/edge/graph_8756787.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8758556.jsonl b/edge/graph_8758556.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8760041.jsonl b/edge/graph_8760041.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc0a603e639e3161e69bc9fed5690ffa4436f17a --- /dev/null +++ b/edge/graph_8760041.jsonl @@ -0,0 +1,4 @@ +{"60129327|1708582": ["We could recast the idea of protecting unevaluated classi ers as an exploration problem: how many trials should we allocate to a given classi er before we consider deleting it? This suggests that existing work in reinforcement learning on exploration (see [14] for a survey) is relevant to optimising deletion in classier systems."]} +{"8157910|1452734": ["D EVELOPMENTAL robotics approaches are studying mechanisms that may allow a robot to continuously discover and learn new skills in unknown environments and in a life long time scale [1], [2]."]} +{"8660085|18374428": [", a sensorimotor representation of the body used for action (Hoffmann et al. 2010)."]} +{"12197212|1708582": []} diff --git a/edge/graph_8761539.jsonl b/edge/graph_8761539.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..79244a091853a97a1e4e793cd27cd1f8f0f1b302 --- /dev/null +++ b/edge/graph_8761539.jsonl @@ -0,0 +1 @@ +{"18394367|9045232": []} diff --git a/edge/graph_8767649.jsonl b/edge/graph_8767649.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e24499ef3d329538148b1f19f59e5111dbefeee --- /dev/null +++ b/edge/graph_8767649.jsonl @@ -0,0 +1,3 @@ +{"7318669|1708582": []} +{"39511635|1708582": []} +{"14318097|1708582": []} diff --git a/edge/graph_8769043.jsonl b/edge/graph_8769043.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11f1f861d6f24e5238dc68a37a032ec8ff78f7d4 --- /dev/null +++ b/edge/graph_8769043.jsonl @@ -0,0 +1 @@ +{"27353195|2835258": []} diff --git a/graph_877056.jsonl b/edge/graph_877056.jsonl similarity index 100% rename from graph_877056.jsonl rename to edge/graph_877056.jsonl diff --git a/edge/graph_8773720.jsonl b/edge/graph_8773720.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04332e6c29e3822961df1480afd8943ae42d4ae8 --- /dev/null +++ b/edge/graph_8773720.jsonl @@ -0,0 +1,6 @@ +{"3060469|10739218": ["Index Terms\u2014Soft computing, knowledge-based fuzzy networks, rough sets, genetic algorithms, pattern recognition, rule extraction/ evaluation, knowledge discovery, data mining.\n\u00e6"]} +{"3060469|954543": []} +{"8494111|11262595": []} +{"8494111|10739218": ["Neuro-fuzzy hybridization is widely termed as fuzzy neural networks (FNNs) or neuro-fuzzy systems (NFSs) in the literature [27]."]} +{"17900793|954543": ["The key requirement is the need for a good measure of similarity between the instances/patterns."]} +{"5665007|15248553": ["In the early 1990s ZADEH proposed the concept of soft computing, which quite rapidly lead to industrial applications in aerospace systems, communication systems, electric power systems, manufacturing automation, robotics, power electronics and transportation [42]."]} diff --git a/edge/graph_8777381.jsonl b/edge/graph_8777381.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8782436.jsonl b/edge/graph_8782436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13e4f3efa4f00a0cf9211869e2b87308d6394a01 --- /dev/null +++ b/edge/graph_8782436.jsonl @@ -0,0 +1,6 @@ +{"2057889|6495023": ["[13] later evolved into [14], a 17-page survey with an abbreviated discussion of distributed computing, but with additional material on complexity considerations, price of anarchy, mediators, and other topics."]} +{"10402012|1420935": ["This behavior creates a competitive market for energy trading in microgrids that can be modeled and analyzed as noncooperative game [21].", "In microgrids, the retailers should supply energy to their geographical areas without reliance on the main grid [3], [21]."]} +{"10402012|485843": []} +{"10402012|12083425": ["There have been numerous studies related to smart-grid technology such as research on distributed generation (DG) [4]\u2013[6], energy storage system (ESS) [7]\u2013[9], electric vehicles (EVs) [10]\u2013[14], advanced energy electronics [15], [16], and modern communication technologies [17], [18]."]} +{"23225559|485843": ["T HE next-generation power grid is envisioned to be a smart grid architecture driven by a growing demand for higher energy ef\ufb01ciency, reduced greenhouse gas emissions, and improved power quality and reliability [1]\u2013[4]."]} +{"23225559|12083425": ["This evolution is enabled by innovations and continuing developments in distributed generation and energy storage [5]\u2013[7], advanced power electronics [8], [9], and modern communication technologies [10], [11]."]} diff --git a/edge/graph_8783262.jsonl b/edge/graph_8783262.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8785789.jsonl b/edge/graph_8785789.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8793149.jsonl b/edge/graph_8793149.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..901e9b0bdf9312ea48747b1b112df8dd1a1e89c6 --- /dev/null +++ b/edge/graph_8793149.jsonl @@ -0,0 +1 @@ +{"3900813|1482463": []} diff --git a/edge/graph_8793295.jsonl b/edge/graph_8793295.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..519478646d600a64b4ca022b36160410250123e9 --- /dev/null +++ b/edge/graph_8793295.jsonl @@ -0,0 +1,3 @@ +{"1694910|2257431": ["While on the surface the problems of IP-lookup and String Matching looks very distinct, as has been noted previously [15], [4] they are very much analogs of one another in that both are longest prefix matching problems."]} +{"7829621|2257431": ["There may also be opportunities to apply our technique to well \nstudied areas of IP lookups [Sanchez et al. 2001] and packet classi.cation [Gupta and McKeown 2001]."]} +{"10754645|8450611": ["We evaluate the algorithms using real-life and random \ndatabases."]} diff --git a/edge/graph_8793980.jsonl b/edge/graph_8793980.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8798109.jsonl b/edge/graph_8798109.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39875a952a3412dd66fb30b9e0e7afadbec102ec --- /dev/null +++ b/edge/graph_8798109.jsonl @@ -0,0 +1,3 @@ +{"18083025|1142636": ["In order to\n(FAST[13])\nontology\nthree principal\nf the\nTo develop a new ontology, the healthcare specialist follows the guide of Noy and McGuiness [14 first important step is to define the domain of the ontology neurological diseases."]} +{"10151593|29395800": ["According to [5], the semantic search approach tries to augment and improve searches on a set of resources that are initially unknown to the user, by using ontologies and semantic annotations of these resources."]} +{"13750365|386036": []} diff --git a/edge/graph_880321.jsonl b/edge/graph_880321.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8806501.jsonl b/edge/graph_8806501.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8808853.jsonl b/edge/graph_8808853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8478c97b905137583c72a29d690dfa50ca3cbb64 --- /dev/null +++ b/edge/graph_8808853.jsonl @@ -0,0 +1,9 @@ +{"1738470|10500613": []} +{"1110051|10500613": ["ontology alignment) has received steady attention in the database and AI communities over the years (see [19] for a recent survey and [17, 2, 3, 5, 8, 9, 12, 27, 24] for work since)."]} +{"499626|10500613": []} +{"1800215|10500613": ["discussed in [13]) are not sufficient."]} +{"6952822|10500613": ["Many diverse solutions of matching have been proposed so far, see [49, 67] for some contributions of the last decades and [14, 46, 64, 68, 73] for recent surveys(2)."]} +{"6952822|913718": ["Many diverse solutions of matching have been proposed so far, see [49, 67] for some contributions of the last decades and [14, 46, 64, 68, 73] for recent surveys(2).", "Once the correspondences between two schemas have been determined, the next step has to generate, for example, query expressions that automatically translate data instances of these schemas under an integrated schema [73]."]} +{"13894739|913718": [", [2, 8, 15, 9] and the Ontology Matching website (http://www."]} +{"7928608|10500613": ["The distinction between the hybrid and composite matching algorithms of [24] is useful from an architectural perspective.", "In particular, for individual matchers, [25] introduces the following criteria which allow for detailing further (with respect to [24]), the element and structure level of matching: syntactic techniques (these interpret their input as a function of their sole structures following some clearly stated algorithms, e.", "A good survey and a classification of matching approaches up to 2001 is provided in [24], while an extension of its schema-based part and a user-centric classification of matching systems is provided in [25]."]} +{"7928608|913718": ["In particular, for individual matchers, [25] introduces the following criteria which allow for detailing further (with respect to [24]), the element and structure level of matching: syntactic techniques (these interpret their input as a function of their sole structures following some clearly stated algorithms, e.", "[25] extends this work by taking into account how the systems can be distinguished in the matter of considering the mappings and the matching task, thus representing the end-user perspective.", "A good survey and a classification of matching approaches up to 2001 is provided in [24], while an extension of its schema-based part and a user-centric classification of matching systems is provided in [25]."]} diff --git a/edge/graph_8813834.jsonl b/edge/graph_8813834.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8815923.jsonl b/edge/graph_8815923.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82821ebde672193ed48a50f6fa3a55bf4e551b85 --- /dev/null +++ b/edge/graph_8815923.jsonl @@ -0,0 +1,13 @@ +{"16118455|10741988": ["and connectivity it has been applied in numerous domains including CAD model simplification [19], tool-path creation in CAM [20], routing in sensor networks [21] and feature extraction in geometric design [22]."]} +{"15622385|987239": ["(See [24], [14], [28] for surveys of techniques in these fields."]} +{"15622385|205131192": ["[24]) or to compare probability distributions of features (e.", "(See [24], [14], [28] for surveys of techniques in these fields."]} +{"7122928|987239": ["In object retrieval and computer graphics, a number of 3D shape descriptors have been proposed [23]."]} +{"9722141|987239": ["They also need to be efficient, pose invariant and capable of partial matching [31]."]} +{"15121560|1452734": ["TABLE I LEARNING PHASES OF THE DEVELOPMENTAL APPROACH We adopt a developmental approach [18], [19], where the robot acquires skills of increasing difficulty on top of previous ones."]} +{"13250628|987239": ["This has been under investigation for a long time in various research fields, such as computer graphics, robotics, and pattern matching, see [2]\u2013[4] for comprehensive reviews."]} +{"721898|118142": []} +{"8259445|1452734": ["Developmental robotics approaches are studying mechanisms that may allow a robot to continuously discover and learn new skills in unknown environments and in a lifelong time scale [1], [2]."]} +{"11810650|987239": ["This has been under investigation for a long time in various research fields, such as computer graphics, robotics, and pattern matching, see [2,7,15] for comprehensive reviews."]} +{"18311629|8983048": ["There is a good deal of literature on depth scan registration (Gelfand et al. 2005; Makadia et al. 2006; Salvi et al. 2007), but our problem is somewhat different, as we are attempting to align a partial set of views of one model with the geometry of a different, neighboring model, rather than with\u2026", "There is a good deal of literature on depth scan registration (Gelfand et al. 2005; Makadia et al. 2006; Salvi et al. 2007), but our problem is somewhat different, as we are attempting to align a partial set of views of one model with the geometry of a different, neighboring model, rather than with an overlapping scan of the same model from a different viewpoint."]} +{"18311629|987239": ["details, we refer the reader to surveys by [Campbell and Flynn, 2001; Tangelder and Veltkamp, 2004; Iyer et al., 2005; Bustos et al., 2005; Del Bimbo and Pala, 2006; Yang et al., 2007]."]} +{"18311629|6681074": ["details, we refer the reader to surveys by [Campbell and Flynn, 2001; Tangelder and Veltkamp, 2004; Iyer et al., 2005; Bustos et al., 2005; Del Bimbo and Pala, 2006; Yang et al., 2007]."]} diff --git a/edge/graph_8822640.jsonl b/edge/graph_8822640.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_882740.jsonl b/edge/graph_882740.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8833120.jsonl b/edge/graph_8833120.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8287393df860e9f93a57d55e7fffea15afbcefb --- /dev/null +++ b/edge/graph_8833120.jsonl @@ -0,0 +1,28 @@ +{"2053052|2509135": ["COOPERATION is one of the most promising enabling techniques to meet the increasing rate demands and quality of service requirements in wireless networks, especially since nowadays many techniques to share the spectrum resources among different networks are envisioned [2]."]} +{"42691525|15255963": ["The probability that the channel is good over a slot time depends on receiver signal-to-interference (SIR) threshold of the user [ 11 ].", "For simplicity, the following assumptions are used: the channel is assumed stationary; it follows a 2-state Markov chain model [ 11 ]; and users\u2019 Rayleigh statistics are independent and identically distributed (iid)."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"61856544|12452682": []} +{"11553741|12452682": []} +{"15694215|141053": ["These characteristics are related to higher throughput, lower delay, lower power consumption, etc [1, 5, 6].", "Currently, the power-aware proposals implement power management or power control mechanisms [13, 1].", "MAC protocols for wireless networks can be classified as contention-free or contention-based, depending on the medium access strategy [1]."]} +{"15694215|1299833": ["Thus, ignoring these specific characteristics of wireless networks can lead to poor TCP performance [52, 53]."]} +{"15694215|2835258": ["A major challenge of wireless ad hoc networks is the design of efficient routing protocols that dynamically find routes between two communicating nodes [34, 35, 36, 37, 38]."]} +{"15694215|14441987": ["A major challenge of wireless ad hoc networks is the design of efficient routing protocols that dynamically find routes between two communicating nodes [34, 35, 36, 37, 38]."]} +{"15694215|1762301": ["A major challenge of wireless ad hoc networks is the design of efficient routing protocols that dynamically find routes between two communicating nodes [34, 35, 36, 37, 38]."]} +{"14698444|2509135": ["As the foundation and premise for cognitive radio networks from theoretical research towards actual deployment, spectrum sensing technology plays an important role in cognitive radio networks technology system [1]."]} +{"11962693|12452682": []} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"15903073|17109970": ["Some work in this area has considered a game theoretic framework to analyze the trade off between an individual source's interest and system performance [3]."]} +{"8756071|973730": []} +{"18774970|1230643": ["Usually sensor networks consist of large number of communication nodes, do not have global identi\ufb01cation number, and could face easy node failure [4].", "Sensor networks are very limited in local memory and calculation capacity [4], and so security mechanism for sensor networks can not require each sensor node to store long-sized key to run very complex cryptol-ogy protocols."]} +{"29029622|12452682": ["Cooperation among SUs has been proved to be beneficial in solving such conflicting interests [23]."]} +{"44944144|14441987": []} +{"17136625|1708582": ["Other possibilities of de\ufb01ning the return exist [58].", "A reinforcement learning (RL) agent learns by interacting with its dynamic environment [58, 106, 120]."]} +{"2871699|25929315": ["M2M applications might require very high priority with a detailed level of granularity due to the transmission of critical information, whereas priority for Human-based applications is mainly among applications for each user and not between different users [17].", "[17] mention that M2M and Human-based traf\ufb01c differ further in traf\ufb01c direction, since M2M traf\ufb01c direction will be mainly uplink, while Human-based traf\ufb01c is either balanced or mainly downlink.", "Finally, M2M will have higher number of devices and may be required to operate for years or decades without maintenance, but users can recharge/replace batteries [17].", "Small and infrequent data transmissions will be more common in M2M [17,21], and thus the knowledge developed for Human-based traf\ufb01c, which is mostly bursty (web browsing), bulky (\ufb01le transfer), or constant or variable bit rate streams (VoIP or video) can be dif\ufb01cult to apply directly to M2M.", "Other M2M communications\u2019 surveys focus mainly in home networks [16], 3GPP Long-Term Evolution (LTE) networks [17], service platforms [18], or data mining techniques [19].", "M2M applications will be duty-cycled and should have very short connection delay to guarantee fast access to the network when waken up, while Human-based applications tolerate longer connection delays but are very demanding once connections are established [17]."]} +{"1932843|1708582": ["As illustrated by Kaelbling et al. (1996), this parameter often qualitatively changes the form of the optimal solution.", "There are different models of optimal behavior (Kaelbling et al., 1996) which result in different definitions of the expected return.", "Such design choices stand in contrast to possibly the bulk of the early research in the machine learning community (Kaelbling et al., 1996; Sutton and Barto, 1998)."]} diff --git a/edge/graph_8835588.jsonl b/edge/graph_8835588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f589de40098935dd3f457485d8f9feb92cacbe3 --- /dev/null +++ b/edge/graph_8835588.jsonl @@ -0,0 +1 @@ +{"3171797|53531425": []} diff --git a/edge/graph_8836911.jsonl b/edge/graph_8836911.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e54f8c279e36f2b46ad2e70ed132d7103145bc3 --- /dev/null +++ b/edge/graph_8836911.jsonl @@ -0,0 +1 @@ +{"5922349|14441987": ["The multi-NIC approach has been discussed in some past work [21] [22], however no distributed channel assignment\nalgorithm has been proposed that can indeed realize the true performance potential of this architecture [28]."]} diff --git a/edge/graph_8838090.jsonl b/edge/graph_8838090.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8839331.jsonl b/edge/graph_8839331.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41971823981bce3c1ec87417f2a0b78d031a02bb --- /dev/null +++ b/edge/graph_8839331.jsonl @@ -0,0 +1,14 @@ +{"2709461|1230643": ["\u2026Peng Ning \nCliff Wang An Liu, Yuzheng Zhou Computer Science Dept. Army Research Of.ce Computer Science Dept. NC \nState University RTP, NC 27709 NC State University Raleigh, NC 27695 Raleigh, NC 27695 cliff.wang@us.army.mil \n{ksun3,pning}@ncsu.edu ABSTRACT Accurate and synchronized time is\u2026"]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"6396569|1236072": ["Traditional WSN routing protocols [21], which describe how to pass messages through the network so they will most likely reach their destination, typically rely on routing tables or recent route histories."]} +{"6396569|1762301": ["Fortunately, there is an active area of research dedicated to routing in mobile ad hoc networks (MANETs), and MWSNs can borrow from this work [22]."]} +{"5968490|1230643": ["Attack-Resistant Location Estimation in Sensor Networks Donggang Liu and Peng Ning Wenliang Kevin Du \nNorth Carolina State University Syracuse University {dliu, pning}@ncsu.edu wedu@ecs.syr.edu Abstract \nMany sensor network applications require sensors locations to function correctly."]} +{"1762301|14441987": ["Light - weight mobile routing ( LMR ) The LMR protocol is another on - demand routing protocol , which uses a flooding technique to determine its routes .", "However , this protocol has a number of advantages over routing protocols such as AODV , LMR [ 7 ] and TORA [ 25 ] , and in small to moderately size networks ( perhaps up to a few hundred nodes ) , this protocol may perform better .", "It uses similar link reversal and route repair procedure as in LMR , and also the creation of a DAGs , which is similar to the query / reply process used in LMR [ 30 ] .", "Temporally ordered routing algorithm ( TORA ) The TORA routing protocol is based on the LMR protocol .", "It uses similar link reversal and route repair procedure as in LMR, and also the creation of a DAGs, which is similar to the query/ reply process used in LMR [30].", "However , LMR may produce temporary invalid routes , which introduces extra delays in determining a correct loop .", "The nodes in LMR main - tain multiple routes to each required destination .", "Therefore , it also has the same benefits as LMR .", "The disadvantage of TORA is that the algorithm may also produce temporary invalid routes as in LMR ."]} +{"15044264|1230643": ["Based on the collaborative efforts of a large number of sensor nodes, WSNs have become good candidates to provide economically viable solutions for a wide range of applications, such as environmental monitoring, scientific data collection, health monitoring, and military operations [ 1 ]."]} +{"208007463|1230643": ["Wireless sensor networks are envisioned to be economic solu tions to many important applications, such as real-time tra ffic monitoring, military surveillance, and homeland security [1] ."]} +{"16733772|1940388": ["They are often deployed in hostile environments in both military and civil applications [ 1 ]."]} +{"9453695|1230643": []} +{"6836305|1230643": [", military, environmental, and health applications [1]."]} +{"15199849|1940388": []} +{"15199849|17205659": ["Attacks in sensor networks do not just involve the alteration of packets; adversaries can also inject additional false packets [14]."]} +{"8566132|17205659": ["For the other security issues, please refer to [16], [21], and [38] for a comprehensive overview."]} diff --git a/edge/graph_8841611.jsonl b/edge/graph_8841611.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_88473594.jsonl b/edge/graph_88473594.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_88479105.jsonl b/edge/graph_88479105.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_88480339.jsonl b/edge/graph_88480339.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d53cf17a1d80a2435d3a85e723bd61bd7846d7aa --- /dev/null +++ b/edge/graph_88480339.jsonl @@ -0,0 +1,15 @@ +{"45727227|1598350": ["The IoT is a technology that interconnects everything daily life objects which were not considered in the past [2]."]} +{"7335028|1230643": ["Our modification uses Hash collision keys to improve the network resilience and connectivity between the nodes."]} +{"22775290|1940388": ["Key management and security features of the sensor networks are analyzed in some surveys in the literature [6, 7]."]} +{"39578521|1940388": []} +{"27023695|1940388": []} +{"32489794|10096622": []} +{"32489794|1230643": ["Wireless sensor networks (WSNs) are poised of recourse constrained tiny devices know as sensor nodes enabled with self organizing and communicating capabilities [1\u20133]."]} +{"10823007|1940388": ["There are several security threats, and security solutions exist in different communication layers [Walters et al. 2007; Chen et al. 2009; Perrig et al. 2002; Eschenauer and Gligor 2002].", "Hence, traditional communication security techniques [Walters et al. 2007; Perrig et al. 2002; Chen et al. 2009] are not suf\ufb01cient to provide end-to-end security."]} +{"17010754|1236072": []} +{"10385329|17205659": ["I. INTRODUCTION"]} +{"7362137|1230643": ["n the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors [1], [2], [3]. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sensing some changes of incidents/parameters and communicating with other devices, over a specific geo"]} +{"57127025|1236072": []} +{"3532651|6332923": []} +{"3532651|1940388": ["Security issues should be considered carefully during the design of WSNs\u2019 protocols to defend against and tolerate attacks [29]."]} +{"16780929|153221": ["In addition to these, a symmetric key-based protocol is unable to support node mobility because it creates such complications that such a protocol is not meant to address [13].", "While studying key revocation schemes [13], we noticed that most of the proposed key revocation protocols are intended to system based on symmetric key cryptography and mostly are dependent on key pre-distribution schemes."]} diff --git a/edge/graph_88484335.jsonl b/edge/graph_88484335.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..283991eb384d697ad28745f79b713c1e89396a2e --- /dev/null +++ b/edge/graph_88484335.jsonl @@ -0,0 +1,3 @@ +{"54435303|17221751": ["version the Multi-PIE database [13]; and the Genki-4K database [14], have been developed (see Table 1) [6], [15]."]} +{"121199517|2301292": ["A number of 2D facial expression databases have become available (e.g., [1] [2] [7] [8] [16]), as well as some with 3D imaging data (e.g., [9] [14] [15] [24] [25] [45])."]} +{"8322669|2355696": ["As automatic analysis of social interactions attracts increasingly more attention in the computing community [3] [ 8 ], publicly available benchmarks become a crucial element for the progress of the domain."]} diff --git a/edge/graph_88485649.jsonl b/edge/graph_88485649.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffa8ad740c067ee6cde82a5de0cf4d648ac23674 --- /dev/null +++ b/edge/graph_88485649.jsonl @@ -0,0 +1,3 @@ +{"1655923|1634674": []} +{"56246960|20310191": ["The review by [14] found increasing publications in process mining in healthcare and addressed validity issues in the previous review."]} +{"44117088|20310191": ["Ghasemi and Amyot [13] conducted a systematised literature survey which provides an overview of the status of PM in healthcare, and provided initial results from the search process of the systematic review.", "[13] M. Ghasemi and D. Amyot, \u2018\u2018Process mining in healthcare: A systematised literature review,\u2019\u2019 Int.", "Several literature reviews have revealed the state of PM applications in the healthcare domain in general [11]\u2013[13] or from specific perspectives, such as clinical pathways [14] and oncology processes [15]."]} diff --git a/edge/graph_88485892.jsonl b/edge/graph_88485892.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9cd42bcaae6c6272c18dcff16609bdd4a8edfdc4 --- /dev/null +++ b/edge/graph_88485892.jsonl @@ -0,0 +1,3 @@ +{"17052702|15164501": ["\u2026& Gallivan,\n2007\nMISQ * * * *\nButler & Gray, 2006 MISQ * * *\nGriffith et al., 2003 MISQ * * * *\nJasperson et al., 2005 MISQ * * *\nLeidner & Kayworth,\n2006 MISQ * * * * *\nLyytinen & Yoo, 2002 ISR * * * * * * *\nMelville, 2010 MISQ * * *\nTilson, Lyytinen,\n& Sorensen,\n2010\nISR \u2026"]} +{"15981023|15164501": ["Thematic analysis is a process used in reviews of the IS literature (Leidner and Kayworth 2006) as well as reviews of absorptive capacity in the organizational literature (Lane et al. 2006)."]} +{"15981023|35897447": []} diff --git a/edge/graph_88487874.jsonl b/edge/graph_88487874.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_88488196.jsonl b/edge/graph_88488196.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62e21366559c330e98355396260fe6c4b335247f --- /dev/null +++ b/edge/graph_88488196.jsonl @@ -0,0 +1,10 @@ +{"110664973|19926117": []} +{"18255235|627405": []} +{"18255235|15164501": ["Piccoli and Ives (2005) and Leidner and Kayworth (1992) briefly address how the articles in their studies were examined and coded.", "Abstract Levy and Ellis (2006) and Webster and Watson (2002) lament the fact that information systems (IS) scholars tend to be unaware of the need for structure in literature reviews."]} +{"18255235|35897447": ["Ridley (2008) and Hart (1999) devote a number of chapters in their books to various writing issues particular to literature reviews, including from pre-writing, being critical, supporting claims with evidence, maintaining legitimacy, verb use, writer\u2019s voice, and many other pertinent issues."]} +{"29617882|15164501": ["We refer to an extensive literature review on culture in IS research in which Leidner and Keyworth (2006) differentiate the following relations between the concepts culture and IT: the impact of culture on IT, the impact of IT on culture, and IT culture.", "Therefore, we analyzed all papers mentioning or elaborating on culture with regard to the following two dimensions derived from extant research on culture and particularly from culture research in the IS discipline (Leidner and Keyworth, 2006).", "In their research on culture in IS, Leidner and Keyworth (2006) recognize the differences between a national, organizational, and subgroup level of culture and suggest a holistic understanding of culture based on its manifestation.", "As we had assumed based on existing research on culture in IS, there are papers that reference a BPM culture."]} +{"156860777|9948664": []} +{"156860777|54878689": []} +{"7603310|5750732": ["Data mining is a process of discovering hidden patterns and information from the existing data (PhridviRaj & GuruRao, 2014)."]} +{"4607759|13902036": []} +{"45408796|417250": []} diff --git a/edge/graph_88489458.jsonl b/edge/graph_88489458.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d471f7610f3fdea7e6aa6e164a6b024bdf99051 --- /dev/null +++ b/edge/graph_88489458.jsonl @@ -0,0 +1,43 @@ +{"15270438|86629084": []} +{"2920396|8323234": []} +{"38282567|2623404": []} +{"31129967|25929315": []} +{"17030383|2220294": ["The systems should be able to use multiple wireless interfaces and include location-aware services [13]."]} +{"15321543|21386749": ["The IoT that employs various sensor and smart medical devices may serve in, for example, tele-auscultation, remote health monitoring, remote diagnostics and possibly treatment as well as elderly care [4]."]} +{"15321543|2220294": []} +{"53046563|3782888": []} +{"3568397|4269723": ["At first, it enables the management capabilities and the dynamic network resource allocation required by a fifth-generation (5G) vehicular communication framework [10].", "As discussed in Section 2, this approach is largely adopted in the research domain on SDN, where decoupling the network functionalities from the RAT in use enables high system programmability, and abstracts the network infrastructure from services [10]."]} +{"13751888|51858916": ["In [6], the authors provide a survey on the measurement campaigns launched for UAV channel modeling using low altitude platforms and discuss various channel characterization efforts."]} +{"13751888|2958701": ["learning solutions in support of SAR operations using UAVs [58].", "economically less expensive [58]; 2) Real-world problems with high number of states can turn the problem intractable with current techniques, severely limiting the development of real applications.", "classification which has been proven very effective [58].", "16: Illustration of How CNNs Work [58].", "Some of challenges are: 1) The design of computing devices with low-power consumption, particularly GPUs, is a challenge and active working field for embedded hardware developers [58]; 2) While a few UAVs can already travel without a UAV operators directing their routes, this technology is still emerging.", "on-board powerful processor devices with low power consumption is an active area for future researches [58].", "An efficient method for coping with these types of problems remains as an unsolved challenge [58].", "In [58], a review of deep learning methods and applications for UAVs were presented."]} +{"13751888|11701828": ["The researchers used UAVs for conducting environmental sampling and ocean surface temperature studies in the Arctic [69].", "The UAV also took a vertical sounding in the eye of the typhoon and measured the strongest winds during the whole flight mission [69]."]} +{"13751888|61132": ["\u2022 There is a need for a seamless mechanism to transfer the users during the handoff process between UAVs, when out of service UAVs are replaced by active ones [2].", "SDN also can help to address the complexity of network management [2].", "\u2022 We need more studies about the topology of UAV wireless networks where this topology remains fluid during: a) Changing the number of UAVs; b) Changing the number of channels; c) The relative placements of the UAVs altering [2].", "it is difficult to construct a simple implementation for proactive or reactive schemes [2].", "FANET communication bands to mitigate this problem [2].", "It only constitutes 10%-20% of the UAV energy capacity [2].", "to the power limitations of UAVs, a decision must be taken on whether UAVs should perform data and image analysis onboard in real-time, or data should be stored for later analysis to reduce the consumed power [2], [50].", "is distributed over all UAV nodes), or hybrid in which the processing control of the forwarded packets can be performed locally on each UAV node and control traffic also exists between the centralized SDN controller and all other SDN elements [2].", "In [2], the authors attempt to focus on research in the areas of routing, seamless handover and energy efficiency.", "Fluid topology and rapid changes of links among UAVs are the main characteristics of multi-UAV networks or FANET [2]."]} +{"13751888|76603": ["\u2022 Utilizing UAVs in public safety communications needs further research, where topology formation, cooperation between UAVs in a multi-UAV network, energy constraints, and mobility model are the challenges that are facing UAVs in public safety communications [9].", "The authors of [9] present an overview of legacy and emerging public safety communications technologies along with the"]} +{"13751888|15517134": ["The authors in [60] presented major categories of collision avoidance methods.", "Therefore, the development of UAV collision avoidance techniques has gained research interest [60], [300].", "These algorithms include: flight route determination, path planning, collision avoidance and swarm coordination [59], [60]."]} +{"13751888|3330461": ["the capacity in ground communications systems [269]."]} +{"13751888|4269723": ["in FANET with high reliability, reachability and fast mobility of UAV nodes [349] \u2022 More research is needed to develope specific security protocols for FANETs based on the SDN paradigm.", "in which the control plane is completely decoupled from data plane and the routing protocols can be executed onboard from SDN switching devices [349]."]} +{"51615396|763939": ["A survey on mobility models in VSNs is proposed in [13], also providing methodologies for the cooperation between mobility models and network simulators."]} +{"5581681|303976": []} +{"6176661|7278743": ["It allows the communication between portable devices at a data rate up to 3 Mb/s, and is highly commercialized for consumer electronics [21]."]} +{"4715757|1029120": []} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"18756355|206764452": ["Based on our evaluation and analysis, this adaptive approach considerably saves electrical energy and thus makes the cellular-based road-safety system practical."]} +{"18756355|1029120": ["Based on our evaluation and analysis, this adaptive approach considerably saves electrical energy and thus makes the cellular-based road-safety system practical."]} +{"7495269|21386749": ["ety of cutting-edge and highly individualized solutions such as remote health monitoring, remote diagnostics, teleauscultation, chronic diseases management, independent care for elderly and much more [17]. Patients compliance with medication and treatment by healthcare providers is another prominent potential application of IoT. In addition, IoT can also be used to authenticate medicine, monitor drugs"]} +{"32610732|10817088": []} +{"28844117|206764452": ["In this review, the authors focus on pedestrian collision avoidance which has drawn signi\ufb01cant attention in the last decade [9]."]} +{"28844117|1029120": []} +{"62116074|763939": ["The main building blocks in designing a mobility model are: visualisation tool, output, platform and a class which GTNets (Georgia Tech Network Simulator) [35] and so on are some of the network simulators used for MANET simulation.", "The mobility model [35] is a model or a set of rules for designing random network topologies by using simulators.", "Tables 3 \u2013 5 are adapted from [35]."]} +{"32280043|3834736": ["[6] S.", "While adaptive beaconing approaches could be used to reduce load and improve latencies [6], the current status of IEEE 802."]} +{"32280043|7644489": ["An important feature of 5G-enabled communications is the proximity service (ProSe) [8].", "[8] X."]} +{"4690848|22221919": ["Studies have revealed that compared to conventional orthogonal multiple access (OMA), NOMA yields the highest performance gain when the channel conditions of the users are most different [13].", "ground-AerIAl nomA Non-orthogonal multiple access (NOMA) is a promising technology to increase the spectrum efficiency in 5G cellular systems [13]."]} +{"28645338|61132": ["116 ||| IEEE VEHICULAR TECHNOLOGY MAGAZINE | SEPTEMBER 2019 connectivity support from backbone communication networks for command and control as well as for payload communications [2]."]} +{"68075087|61132": ["Depending on the application requirements and the coverage area, UAVs are required to maintain their speeds and may eventually go out of service [28]."]} +{"68075087|16514036": []} +{"23313210|18148591": ["Use of antenna arrays with multiple-input-multiple-output (MIMO) signal processing techniques has been known to give tremendous improvements in the performance of point-to-point communication links [3]."]} +{"9147429|10310014": []} +{"42150184|52169284": []} +{"3770698|207262843": []} +{"58981450|49272228": ["[26] introduced various prevalent wireless charging techniques conceived for UAV mission time improvement."]} +{"58981450|51858916": ["While in [25], from a channel modeling viewpoint, Khuwaja et al."]} +{"58981450|22221919": ["NOMA has recently drawn considerable attention as one of the key enabling technologies for 5G communication systems [52], reaping a high spectral efficiency via incorporating superposition coding at the transmitter with SIC at the receivers."]} +{"58981450|61132": ["[20] elaborated many issues encountered in UAV communication networks to provide stable and reli-", "A couple of surveys and tutorials related to UAV communications have been published over the past several years [12], [15], [20]\u2013[27], including the characteristics and"]} diff --git a/edge/graph_88490021.jsonl b/edge/graph_88490021.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1303ec9517d4f96c97429954e29ade9f8ec3d8b2 --- /dev/null +++ b/edge/graph_88490021.jsonl @@ -0,0 +1 @@ +{"16918037|7158350": []} diff --git a/edge/graph_88490282.jsonl b/edge/graph_88490282.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43b04a1f0a07707a5d9f6dbba33a0d52076204c0 --- /dev/null +++ b/edge/graph_88490282.jsonl @@ -0,0 +1,2 @@ +{"53304118|9928823": []} +{"53304118|393948": []} diff --git a/edge/graph_88491427.jsonl b/edge/graph_88491427.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6627b818ef2d92076e3b41ae8d7e53e2675d77a5 --- /dev/null +++ b/edge/graph_88491427.jsonl @@ -0,0 +1,17 @@ +{"31102928|925507": []} +{"28028672|448220": []} +{"51982144|49527603": ["Similar to that in Bitcoin, the transaction confirmation time of traditional blockchains is 60 min, whereas that of our energy blockchain is set to be 10 min as an example [20].", "Although transaction confirmation time in our energy blockchain is shorter than that of Bitcoin (about 60 min) [19], [20], it is still not convenient and practical for IIoT nodes to frequently trade energy."]} +{"6841982|468992": []} +{"6841982|23041951": ["and data origin authentication. In contrast to other \ufb01elds in which security-related research is being actively conducted, swarm robotic systems suffer a lack of practical solutions to these problems [18]. The security topic has been overlooked by state-of-the-art research mainly due to the complex and heterogeneous characteristics of robotic swarm systems \u2014 robot autonomy, decentralized control, a la", "rom academic institutions to the industry [3]. Previous works have emphasized the lack of general methods to tackle topics such as safety analysis, testing mechanisms [49], [40] or security protocols [18] for swarm robotic systems, which hinder the progress to more broader commercial applications. One of the main axioms in the swarm robotics \ufb01eld has been the absence of global knowledge or explicit co"]} +{"49527603|5747564": ["\u2026the logistic management with Radio-Frequency Identi\ufb01cation (RFID) technology (ISO, 2013), smart homes (Dixon et al., 2012), e-health (Habib et al., 2015), smart grids (Fan et al., 2013), Maritime Industry (Wang et al., 2015), etc. Blockchain technologies can potentially improve the IoT sector.", "The typical killer applications of IoT include the logistic management with Radio-Frequency Identification (RFID) technology [4], smart homes [31], e-health [37], smart grids [34], Maritime Industry [83], etc."]} +{"167478663|5822166": ["The quantity and quality of their SMRs are the most important parameters to measure its machining capability.(48) For simplicity, we focus on the similarity of the following two parts to represent the enterprise similarity:"]} +{"8828990|2018781": ["As it is well known, security is important for any type of distributed environments and SOC for WSN is no exception.", "SOA design patterns are design techniques that help overcome common obstacles in achieving the strategic goals and benefits associated with SOC [29].", "Since two interactive parties might communicate through multiple paths, choosing the best connecting path to serve a given interaction is a key issue to deal with, especially in SOC as this significantly affects the QoS [14].", "Furthermore, all SOC applications need to support some levels of reliability, performance, security, and QoS.", "SOC offers a promising way for enabling software vendors to present their software applications as services.", "SOM for WSN is necessary to support several, otherwise hard to incorporate, functionalities in the SOC model.", "SOM provides middleware services for various SOC domains and is useful for different environments such as WSN. Nowadays researchers and practitioners prefer to use the SOM approach over traditional middleware because of its trait of efficiently handling heterogeneous components using loosely coupled services.", "Recently, service-oriented computing (SOC) [9,25] has become a preferred model over the more traditional monolithic and client/server development models."]} +{"8828990|1819274": ["A number of middleware platforms were developed to add new values for different systems such as enterprise systems [11], cluster computing [2], mobile ad hoc networks [10,28], and robotics [37]."]} +{"3639079|3628110": ["Despite providing robust approaches for securing IoT, the blockchain systems are also vulnerable [136]."]} +{"3639079|3767252": []} +{"3639079|2142482": ["Similarly, the authors in [12, 13, 14] target a comparative evaluation of intrusion detection systems."]} +{"3639079|16209841": ["The security analyses presented in [9, 10, 11] discuss and compare different key management systems and cyrptographic algorithms."]} +{"3639079|2181694": ["The energy constrained devices in IoT are vulnerable to \u201dsleep deprivation\u201d attacks by causing the sensor nodes to stay awake [36].", "5 Sleep deprivation attack Energy consumption Link layer Low-level Multi-layer based intrusion detection system [36]", "A framework for mitigating sleep deprivation attacks in wireless sensor networks is described in [36]."]} +{"3639079|9646739": []} +{"3639079|925507": ["The authors in [126] have categorized 18 use cases of blockchain, out of which four cases are for IoT."]} +{"169728171|3932531": []} diff --git a/edge/graph_88492500.jsonl b/edge/graph_88492500.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1233b80637ec678fbc0b3b4ccddfa61cc28ac21f --- /dev/null +++ b/edge/graph_88492500.jsonl @@ -0,0 +1,4 @@ +{"9436861|17779575": ["For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|165863": ["; Mittal and Vetter 2015].", "CPU versus GPU debate [Gregg and Hazelwood 2011; Lee et al. 2010; Mittal and Vetter 2015; Vuduc et al. 2010] toward a CPU and GPU paradigm where the best features of both can be intelligently combined to achieve even further computational gains."]} +{"9436861|13037420": ["However , mobile systems also impose very stringent cost and power budgets [Mittal 2014c].", "For example, GT200 architecture GPU did not have an L2 cache, the Fermi GPU has 768KB LLC, the Kepler GPU has 1536KB LLC, and the Maxwell GPU has 2048KB LLC [Mittal 2014a]. to offset the bandwidth limitation of conventional interconnects."]} +{"9436861|12904520": []} diff --git a/edge/graph_88492544.jsonl b/edge/graph_88492544.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac75993b1e87b9c48b7c872a80bd88d35a2d53f9 --- /dev/null +++ b/edge/graph_88492544.jsonl @@ -0,0 +1,5 @@ +{"8785311|393948": ["\u2022 We demonstrate that unsupervised training results in a latent image representation with disentangled factors of variation (Bengio et al., 2013)."]} +{"51758422|9431428": ["The use of binary classifiers for two-sample testing is increasingly common in neuroscience: see (Pereira et al., 2009; Olivetti et al., 2012) and the references therein.", "The use of binary classi\ufb01ers for two-sample testing is increasingly common in neuroscience: see (Pereira et al., 2009; Olivetti et al., 2012) and the references therein."]} +{"5002792|393948": ["A popular framework for unsupervised learning is that of representation learning [1, 2], whose goal is to use unlabelled data to learn a representation that exposes important semantic features as easily decodable factors."]} +{"3439214|9316331": ["For simplicity, we use the standard LSTM as the generator, while it is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN.", "It is worth noticing that most of the RNN variants, such as the gated recurrent unit (GRU) (Cho et al. 2014) and soft attention mechanism (Bahdanau, Cho, and Bengio 2014), can be used as a generator in SeqGAN."]} +{"3536399|206739910": ["The classifier is trained using LISA dataset for road signs [174]."]} diff --git a/edge/graph_88494014.jsonl b/edge/graph_88494014.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e92a39ab99811bf5c5ac5a9696a6d695efe290d --- /dev/null +++ b/edge/graph_88494014.jsonl @@ -0,0 +1 @@ +{"16322562|17718674": []} diff --git a/edge/graph_88499440.jsonl b/edge/graph_88499440.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e65f70782b7d18eda30d8da7c1122c13dae4129d --- /dev/null +++ b/edge/graph_88499440.jsonl @@ -0,0 +1,12 @@ +{"2934532|8363289": []} +{"872636|8363289": []} +{"51610229|205430214": ["Similar to the research of neural-dynamic optimization, as a branch of population metaheuristic approach, the population-based evolutionary computation methods are developed for global optimization in the recent years [27], [28]."]} +{"10878164|8363289": []} +{"11986969|8363289": []} +{"14792581|8363289": ["in (2) summarizes the infinite horizon cost when no control is applied at state xN [ 10 ]."]} +{"9388468|8363289": []} +{"64333084|8363289": ["For discussion of MPC from the point of view of optimal control, see [21]\u2013[23]; for a survey of stability and optimality results, see [24]."]} +{"110164097|8363289": []} +{"12357259|8363289": []} +{"15537066|8363289": ["The benefits of model predictive control (MPC), particularly its capacity to address multivariable systems subject to constraints, have led to widespread interest in the approach Mayne et al. (2000); Qin and Badgwell (2003); Morari and Lee (1999); Maciejowski (2002)."]} +{"62699643|8363289": ["There are two kinds of schemes for applying stability constraints [1], [3]."]} diff --git a/edge/graph_88500738.jsonl b/edge/graph_88500738.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f9b53b47e578890a0cbaf4e730328f11aec83c5 --- /dev/null +++ b/edge/graph_88500738.jsonl @@ -0,0 +1,14 @@ +{"5219735|7257659": ["A thorough recent review can be found in [14]."]} +{"12187240|15380857": ["If the stimulus is a pattern, the SSVEP occurs at the reversal rate and at their harmonics [106]."]} +{"12187240|16362395": ["Either regression or classification algorithms can be used to achieve this goal, but using classification algorithms is currently the most popular approach [209]."]} +{"12187240|9270553": ["Before describing the practical usage of BCI applications, it is worth considering the distinction between BCIs and their applications [8].", "The community of BCI researchers has therefore stressed the need to establish a general framework for BCI design [8]."]} +{"12187240|192934": ["training data needed to offer good results increases exponentially with the dimensionality of the feature vector [223]."]} +{"37574235|763939": []} +{"9450246|8042572": ["Finally, the CoHMEt framework can be also adapted in other \u201cintelligent environments\u201d with multiple participants [44] and multiple sensory cues [45]."]} +{"3636273|7257659": [", inside, outside and of the vehicle) and understanding of the driving environment, make it possible for occupants to go from point A to point B safely, comfortably and in a timely manner [1], [2]."]} +{"24534597|14471582": []} +{"9228629|7257659": ["Maneuver-based trajectory prediction: Classification of vehicle motion into semantically interpretable maneuver classes has been extensively addressed in both advanced driver assistance systems as well as naturalistic drive studies [13], [14], [16], [19]\u2013[27].", "Many works address these shortcomings of motion models and probabilistic models by defining a set of semantically interpretable maneuvers [19]\u2013[27]."]} +{"142232531|7839197": ["\u201d\u2014Hyacinth Nwana [129]"]} +{"30906961|15093118": []} +{"1915014|1400872": ["However,\n1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does.\nat later training stages, j may suddenly start to cause avoidable errors in situations that already seemed under control by attempting to participate in reducing more difficult\u2026", "1 We do not use the expression \u201ctime constant\u201d in the differential sense, as Pearlmutter (1995) does."]} +{"24962838|3775239": ["First, the driving style recognition (DSR) algorithm is used to identify the driver and classify it within a continuous index into calm, normal and aggressive clusters [51], [52]."]} diff --git a/edge/graph_88501038.jsonl b/edge/graph_88501038.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1038310d1a634640f604452073e9e72ac53222b --- /dev/null +++ b/edge/graph_88501038.jsonl @@ -0,0 +1,27 @@ +{"9350418|4019175": ["HUMANOID robot has recently drawn an a great deal of attention for both domestic and industrial purposes [1]\u2013[7].", "In the domestic applications, as the need for the improvement of living and working conditions increases, so does the demand to carry out the anthropomorphic behaviors [2], [7], [8]."]} +{"52159731|9588126": []} +{"30402381|2332366": ["In addition the security, safety, and trust aspects [18,21,74], not only at the ICPS level but also large-scale systems, are seen as challenging, especially due to the nature of interactions among ICPSs that are no longer a priori known and centrally managed.", "Enterprise Resource Planning (ERP) and business objectives in real time [1,16]\u2013[18]."]} +{"30402381|579475": ["Therefore, CPSs are also ubiquitous embedded cyberphysical applications that are surfacing (emerging) and are now bridging the physical and virtual worlds and share all kinds of collaborative networks [1], [10], [11].", "8 IEEE IndustrIal ElEctronIcs magazInE \u25a0 march 2017 asynchronous manner from time to time [1], [11], [12].", "Considering the key trends identified [9], [11], [22], [52]\u2013[63], including information-driven interaction, distributed business processes, cloud computing and visualization, cooperation, multicore systems and graphics processing unit computing, and SOA-ready devices, the key question that arises is how to take advantage of their benefits to provide the multifaceted ICPSs envisioned that fully cover the industrial requirements.", "Several key challenges in multiple domains have been identified for CPSs [9], [11], [22], [52]\u2013[63]."]} +{"30402381|13922338": ["march 2017 \u25a0 IEEE IndustrIal ElEctronIcs magazInE 13 hardware heterogeneity, new developments in operating systems and programming languages tailored to CPSs may arise, which, however, also may be tackled by significantly extending existing approaches [79]."]} +{"30402381|7350786": ["Based on expert analysis [47] as well as input from advisory and consulting companies [48]\u2013[50] and international industry consortia [28], new smart ICPSs and related technologies [6], [51] and infrastructures are currently driving research, innovation, competition, and disruptive business opportunities in a broad set of sectors such as agriculture, energy and smart grid, transportation, collaborative and networked organizations, smart city, building design, industrial automation, health care, and manufacturing.", "10 IEEE IndustrIal ElEctronIcs magazInE \u25a0 march 2017 larger scope of CPSs [1], [6], IoT [51], and Internet of Services, can play a pivotal role toward enabling enterprises to achieve their goals.", "Similar to the societal changes, the manufacturing domain is also undergoing a significant transition [5], [6]."]} +{"21593831|9588126": []} +{"14266345|485843": ["Nowadays, the distributed generation system becomes a new trend in modern power systems for the smart grid, which protects the electric units from total breakdown by misoperations and natural disasters [1], [2]."]} +{"205767898|5660618": ["Networked control systems (NCSs) have attracted great research interest in the past decade, which have a broad range of applications including autonomous vehicles, environmental monitoring, industrial automation, smart grid, etc., (Hespanha, Naghshtabrizi, and Yonggang (2007))."]} +{"51611680|3854912": ["We refer to survey papers [22]\u2013[25] regarding some recent"]} +{"5033462|23893450": ["Moreover, it is inconvenient to use LS estimators for real-time monitoring of power system that is highly dynamic due to changes in load, power generation, and system topology over time [8]."]} +{"39457785|8363289": []} +{"4853003|8363289": ["In general, the design of conventional or distributed MPC schemes needs a local state feedback law in the terminal set [13], [14].", "Like [1], [13], [14], we also adopt the dual-modeMPC strategy."]} +{"31816181|29060869": ["A distributed control approach is better than centralized counterparts for implementation of monitoring/control robustness in SG application [2]."]} +{"18347246|31086789": []} +{"69370237|3854912": []} +{"15925873|5660618": ["A survey on this topic can be found in [20]."]} +{"14468726|5660618": ["I. INTRODUCTION\nNetworked sensing, estimation, and control systems have attracted much attention over the past decade [1], thanks to the recent advances in sensor and communication technology."]} +{"18270884|8363289": ["In MPC, terminal costs and terminal constraint sets that involve all state variables a r used to show stability of the closed loop system, see [13], [14]."]} +{"3854912|9588126": ["Some related research topics on consensus control problems are surveyed in [28].", "Different from [28] and [62]\u2013[64], this paper aims to provide a state-of-the-art overview on event-triggered consensus control of MASs."]} +{"17905329|6336539": ["Instead of working on general nonlinear systems, one could investigate the corresponding polynomial systems with help from the theories of positive polynomial and sum of squares (SOS) expressions [3]."]} +{"2748696|595093": []} +{"50786228|1230643": ["\u0398\u0303k { \u039b\u0303k ,l = [1]N \u00d7N , 0 \u2264 l \u2264 L \u2212 1 } .", "Over the past decades, wireless sensor networks have attracted increasing research attention due primarily to their potential applications in various realms including seismic sensing, battlefield surveillance, intelligent transportation, and machine health monitoring [1]."]} +{"34920777|9588126": []} +{"51615694|206670318": []} +{"59619981|30714842": ["Plume tracking algorithms [1] are used to estimate and track the dynamic movement of plume fronts, generated by chemical leaking, e."]} +{"49318154|8363289": ["4.7 Construction of Tail Solution\nIt is common in constrained MPC for the \u2018tail solution\u2019, a continuation of the control sequence from the preceding time step, to play a role in proof of feasibility [Mayne et al., 2000].", "This relies on suitable construction of the cost terms in (4) and standard MPC results [Mayne et al., 2000]."]} diff --git a/edge/graph_88513503.jsonl b/edge/graph_88513503.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_88516378.jsonl b/edge/graph_88516378.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a73ddf8811d2fa8b521b7c9648392df08e27fbc --- /dev/null +++ b/edge/graph_88516378.jsonl @@ -0,0 +1,2 @@ +{"88522360|88516378": []} +{"88521226|88516378": []} diff --git a/edge/graph_88516914.jsonl b/edge/graph_88516914.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f1ae2d7f422e009d122ad5e241a3dde705601ca --- /dev/null +++ b/edge/graph_88516914.jsonl @@ -0,0 +1 @@ +{"168170059|88516914": ["It was later suggested in (Arlot, 2019) that the procedure in (Hastie et al.", "It was later suggested in (Arlot, 2019) that the procedure in (Hastie et al., 2001) could overfit, and that using slope heuristic to estimate \u03c32 is likely to provide a better estimator."]} diff --git a/edge/graph_88520141.jsonl b/edge/graph_88520141.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_88520566.jsonl b/edge/graph_88520566.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_885218.jsonl b/edge/graph_885218.jsonl similarity index 100% rename from graph_885218.jsonl rename to edge/graph_885218.jsonl diff --git a/edge/graph_88522996.jsonl b/edge/graph_88522996.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0716946c7c7a459de8d9c374b074ce0d667d1fca --- /dev/null +++ b/edge/graph_88522996.jsonl @@ -0,0 +1 @@ +{"207248129|206743327": ["Many data processing systems are taking advantage of new hardware to boost their performance [47, 51, 21].", "Each storage system may perform differently under different workloads [51]."]} diff --git a/edge/graph_88524155.jsonl b/edge/graph_88524155.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ba058c3c6881dd2fd1c88fde4faef9d97cf4530 --- /dev/null +++ b/edge/graph_88524155.jsonl @@ -0,0 +1,9 @@ +{"45344516|2410132": ["Examples of an attacker that could do this include: anyone temporarily in WiFi range of the target when they are on an unsecured network; similarly anyone capable of temporarily intercepting cellular traffic of the target (an increasingly easy attack [6, 10]); or anyone with temporary access to the WiFi router the target uses."]} +{"36476936|17756238": ["Fourth, the increasing concern about data leakage [3] [4]."]} +{"36476936|207424188": ["There is another more specific classification [3] for privacy disclosure.", "Fourth, the increasing concern about data leakage [3] [4].", "Sharma et al [3] list the threats of privacy disclosure as identity, link and content disclosures."]} +{"69824845|11853471": ["Differential privacy [21], [25], [26] is one of the state-of-"]} +{"10916381|386036": []} +{"9772641|26429034": ["1 reports, for each mobile subscriber, an identi\ufb01er , 1 The actual precision (e.g., in space and time) of the information recorded varies signi\ufb01cantly with the nature of the probes used for data collection [4].", "They have become an important instrument for large-scale analyses in sociology, demography, epidemiology, and computer science: recent surveys are available in [3, 4]."]} +{"6230340|57048228": ["Interested users may refer to [106] and [107] that provide an in-depth study about context awareness in mobile computing."]} +{"6230340|469744": ["As suggested in [129] MAR or AR system usually have the"]} +{"20906400|26429034": ["Additionally, the relevance of massive movement data from mobile subscribers is critical in research disciplines such as physics, sociology or epidemiology [5]."]} diff --git a/edge/graph_8854215.jsonl b/edge/graph_8854215.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea2a30b8f3c5b2927a60a7a59c3a23b099786f54 --- /dev/null +++ b/edge/graph_8854215.jsonl @@ -0,0 +1,25 @@ +{"12103882|17774971": []} +{"12103882|192934": []} +{"109505520|5660618": ["A comprehensive survey of the current results in networked control systems has been carried out in [21]."]} +{"109505520|6327434": ["A lot of literature deals with failure detectors in dynamic systems (Willsky (1976)).", "Several failure-detection schemes in dynamic systems are reviewed in [11]."]} +{"19892329|6327434": ["In [2], the author provides a survey of detection schemes for the class of stochastic linear discrete time systems."]} +{"7588469|18037424": []} +{"5761211|595093": []} +{"5761211|121289": ["The attacker may initiate an attack with fake IP addresses to avoid being traced back."]} +{"13878913|6959212": ["These capabilities enable the application of the renewable energy like wind and solar power, and will achieve the rapidly increasing energy needs around the world such as the application of power efficient devices like plug-in electric vehicles [5], [6]."]} +{"13878913|6430931": ["The instance of the unsupervised learning of the ANN is self-organizing maps (SOM) are single-layer feed forward networks, their outputs can be compressed into a low dimensional grid and they are the most widely used NN for anomaly detection tasks [55].", "AIS are computational algorithms that emulate the mechanisms of human immune systems [55]."]} +{"14664203|10390713": ["By contrast, most of the hybrid approaches which include power flow models and electric-based metrics made use of weighted graphs, but do not analyze the node degree distribution statistics which, however, might be interesting because as recently pointed out in [14], the degree distribution might exhibit differences when compared to that of unweighted approaches.", "This is a similar approach to the one adopted by the useful recent reviews [8,12,14].", "As emphasized in [8,14,78,85,168] the purely topological approach may lead to inaccurate results, since it is not able to capture some of the peculiarities of power networks described by the Kirchoff\u2019s laws.", "The manuscript corroborates [14] and points out that unweighted graphs are by far the most used representation in the bibliography that addresses power grids from the pure topological CN viewpoint, except for a couple of works in this group that have used weighted links (not based on electrical principles but in the distribution of generic node load based on its betweenness).", "numerous than those devoted to transmission high voltage power grids, but in which, however, the CN theory is very useful to propose new structures [64]); (4) a classification of the revised works according to different useful metrics, in a similar approach to [14], including novel criteria that will be explained later; (5) a critical analysis of the feasibility of CN theory to provide insights into real power grids, which is still under debate in the literature [8,11].", "As mentioned before, and following the categorization carried out in recent works [12,14], we have structured our review into two groups of approaches.", "Within this group of works are [8,14,35], which nevertheless take advantage of the tools offered by CN Science and combined them with concepts from Electrical Engineering, leading to the extended topological approach (Subsection 3."]} +{"61839874|6959212": ["The challenges and opportunities of utilizing power networks with communication networks are described in [1]\u2013[3].", "Transition to smart grids opens enormous research opportunities such as improving the quality of monitoring with utilizing advanced communication infrastructure [1]\u2013[3] and the integration of new types of energy resources such as wind energy and solar energy [4]\u2013[6]."]} +{"345663|121289": []} +{"33602997|595093": ["Complete surveys of existing attacks and detection methods for false data injection attacks are given in [20] and [21]."]} +{"33602997|121289": ["The smart grid [2], [3] envisions an interconnected power distribution network that streamlines transmission, distribution, monitoring, and control of electricity by allowing two-way communication and flow of power [4]."]} +{"13680609|4631990": ["This technology is implemented by modern manufacturers in their latest power engineering products like distribution automation nodes/grid measurement and diagnostics devices [13]."]} +{"13680609|6959212": ["To this end, the intelligent monitoring and control enabled by modern information and communication technologies have become essential to realize the envisioned smart grid [1], [14].", "In general, the AMI is a two-way communications network and is the integration of advanced sensors; smart meters, monitoring systems, computer hardware, software and data management systems that enable the collection and distribution of information between meters and utilities [14].", "A communications system is the key component of the smart grid infrastructure [1], [14], [16]."]} +{"595093|6959212": ["In [12], the opportunities and challenges of a hybrid network architecture are discussed for electric system automation."]} +{"18401175|18037424": []} +{"2748696|595093": []} +{"12895606|5747564": ["For more works about security issues for SG communications, the reader may refer to [3] and [19].", "SG communication technologies are anticipated to enable electric distribution systems to incorporate large amounts of distributed energy resources into the grid and to deal with the intermittent nature of renewable energy [3]."]} +{"12895606|6959212": []} +{"18245268|2457428": ["chical group key management methods [26], [27]."]} +{"6062120|595093": []} +{"1593873|6327434": []} diff --git a/edge/graph_8854639.jsonl b/edge/graph_8854639.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0067ab4c19f677dc8cee91bddee1ed9ee8dd966 --- /dev/null +++ b/edge/graph_8854639.jsonl @@ -0,0 +1 @@ +{"110361521|6607209": ["Dias et al. [14, 15 ] first use the concept of market based for multiple robots that cooperate for achieving a common goal."]} diff --git a/edge/graph_8858007.jsonl b/edge/graph_8858007.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15cc6daf49bfa8febad423fe8c01eca53d28436e --- /dev/null +++ b/edge/graph_8858007.jsonl @@ -0,0 +1,2 @@ +{"42392887|206051485": ["Here, we have adapted a robust and highly accurate phase-only correlation (POC) method, which is based on image phase information alone [4].", "The image stabilizer alleviates the shaking of images by using a phase-only correlation technique [4]."]} +{"121775998|12127129": []} diff --git a/edge/graph_88671183.jsonl b/edge/graph_88671183.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_886883.jsonl b/edge/graph_886883.jsonl similarity index 100% rename from graph_886883.jsonl rename to edge/graph_886883.jsonl diff --git a/edge/graph_8874050.jsonl b/edge/graph_8874050.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8876870.jsonl b/edge/graph_8876870.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1745a1a0209944f5335613b51386326ab32fcc28 --- /dev/null +++ b/edge/graph_8876870.jsonl @@ -0,0 +1,2 @@ +{"17054056|3054454": ["Previous work modeled the CIR as a function of time [65], azimuth AOA [66], [67], and both AOD and AOA azimuth/elevation angles [42]."]} +{"6197792|3054454": ["Two popular approaches include parametric models (PMs) and nonparametric models (NPMs), which are widely used to simulate the correlated MIMO channels [35]."]} diff --git a/edge/graph_8878263.jsonl b/edge/graph_8878263.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8880878.jsonl b/edge/graph_8880878.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a94b027dd9d89b0277ea30ce790c86ec6fc299c4 --- /dev/null +++ b/edge/graph_8880878.jsonl @@ -0,0 +1,2 @@ +{"55849529|1236072": ["Generally, routing protocol in WSN can be classified into three different categories; flat, hierarchical and location based routing ([6])."]} +{"33520628|1230643": ["Such networks usually consist of hundreds or even thousands of small-sized, low power, inexpensive sensors to monitor some specific phenomenon cooperatively [ 1 ]."]} diff --git a/edge/graph_8885658.jsonl b/edge/graph_8885658.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77b9ed0b34e2a1eea81238027613a56c09f0b935 --- /dev/null +++ b/edge/graph_8885658.jsonl @@ -0,0 +1,2 @@ +{"51995124|17234703": []} +{"6428107|9176080": ["PSNR COMPARISON BETWEEN STEGANOGRAPHY BASED ON BLOCK-OCT AND HUFFMAN ENCODING [3] AND PROPOSED ALGORITHM", ", civilians may use it for protecting privacy while terrorists may use it for spreading terroristic information [3].", "BASED ON HUFFMAN ENCODING Hiding the secret image/message in the spatial domain can easily be extracted by unauthorized user and in the frequency domain the quality of the extracted secret image deteriorates."]} diff --git a/edge/graph_8887420.jsonl b/edge/graph_8887420.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a4d0e139b9fbc0010f4afdb1a5e783d1abc4c4e --- /dev/null +++ b/edge/graph_8887420.jsonl @@ -0,0 +1,4 @@ +{"3823932|10559330": []} +{"16586816|10559330": []} +{"17232202|10559330": []} +{"153973617|10559330": []} diff --git a/edge/graph_8893301.jsonl b/edge/graph_8893301.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37dad15ef3fdd57187edcc2060201f6e5b849af5 --- /dev/null +++ b/edge/graph_8893301.jsonl @@ -0,0 +1,7 @@ +{"10867548|16654832": ["Diverse objective functions are considered [4]; saving processing power, efficient bandwidth utilization, saving energy consumption [38], user preferences and execution cost [14].", "However, in spite of all the advancements in the recent years, SMDs are still low potential computing devices and mobile applications on the latest generation of smartphones and tablets are constraint by battery power, CPU potentials and memory capacity of the SMDs [4].", "Recently, a number of mobile cloud applications are witnessed which employ cloud computing to mitigate resources constraints of SMDs. Apple\u2019s iCloud [20] provides on demand access automatically to applications such as music, photos, apps, calendars, documents.", "Elastic applications are partitioned at runtime for the establishment of distributed processing platform [4]."]} +{"13860726|2535224": []} +{"13860726|2623404": []} +{"13860726|10693567": ["Furthermore, the OF SDN session is subject to different actions specified in the flow table (Lara et al., 2014; Banjar et al., 2014).", "In reality, OpenFlow represents a part of the entire SDN architecture (Lara et al., 2014).", "Such distinguishing features make SDNs flexible, vendor agnostic, programmable, and cost effective, and create an innovative network environment (Lara et al., 2014; Macedo et al., 2015).", "However, the current OF specification recommends the use of TLS, which provides encrypted secure channels (Lara et al., 2014).", "The data plane, which consists of switches and routers, is responsible only for forwarding traffic, whereas control logic and functionality are moved to an external entity known as the SDN controller (Nunes et al., 2014; Lara et al., 2014)."]} +{"13860726|2387055": ["APIs can be a potential target for attackers (Kreutz et al., 2015; Scott-Hayward et al., 2013).", "Although two survey papers (Scott-Hayward et al., 2013; Ali et al., 2014) were presented in the past, these works lack comprehensive thematic classifications and focus more on utilizing SDNs to secure different networks.", "The communication channel between each layer must be well protected (Scott-Hayward et al., 2013); security measures include secure coding, deployment of integrity checks, and digital signing of the code.", "The integrity and security of the SDN remain untested in the logical centralization of network intelligence (Jarraya et al., 2014; Scott-Hayward et al., 2013).", "The architecture of SDN poses new external and internal threats (Kreutz et al., 2015; Hakiri et al., 2014; Scott-Hayward et al., 2013).", "For example, an input buffer can be used to identify flow rules, and analyzing the packet processing time may determine the forwarding policy (Scott-Hayward et al., 2013).", "The south-bound interface can be targeted by communication flooding attacks, which specifically affect the control layer, the control data interface, and the data layer (Scott-Hayward et al., 2013; Benton et al., 2013)."]} +{"1024448|10824066": ["However, the selections of a number of recommendations [7-9; 20-24] have identified about eight", "[20] has provided an extensive survey on security requirements methods which help to identify security requirements systematically and structure them."]} +{"59116269|191396": ["A great number of clustering algorithms exist in the literature [ 6 ].", "The comparative studies [ 6 ,7] show clearly that 1) no clustering algorithm can be universally used to solve all problems and that 2) attributes selection, extract and normalization are as important as clustering algorithms."]} diff --git a/edge/graph_8897507.jsonl b/edge/graph_8897507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..db1119b1c906743ab29176fe7c335c14e6beadad --- /dev/null +++ b/edge/graph_8897507.jsonl @@ -0,0 +1,3 @@ +{"11960624|469744": ["Azuma described AR by its properties of aligning virtual and real objects, and running interactively and in real-time [9], [10]."]} +{"988484|469744": []} +{"12741546|5801277": []} diff --git a/edge/graph_8909218.jsonl b/edge/graph_8909218.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8914588.jsonl b/edge/graph_8914588.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..add839b49a23af7d5c3d5baff5374217d563a9ff --- /dev/null +++ b/edge/graph_8914588.jsonl @@ -0,0 +1,4 @@ +{"3202133|5473785": ["By adding decision nodes and utility nodes, BN models can also be extended to decision networks for decision analysis [16]."]} +{"11714729|7839197": []} +{"14135060|10559330": ["Integrated Services (IntServ) [1] uses the Resource ReSerVation Protocol (RSVP) [2] to provide per-flow QoS support by dynamically reserving resources on RSVP-enabled routers."]} +{"6499761|7453720": ["Reference [21] proposes a new language, Path-Based Policy Language, which offers improvements to current network policy languages."]} diff --git a/edge/graph_8917593.jsonl b/edge/graph_8917593.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8920058.jsonl b/edge/graph_8920058.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8921624.jsonl b/edge/graph_8921624.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d60b359ca8a634ac240c2b83ba5ffced4aa5b78 --- /dev/null +++ b/edge/graph_8921624.jsonl @@ -0,0 +1 @@ +{"3154557|2840997": ["Due to many recent advances in SAT solvers [22], [23], verification techniques based on SAT have become very popular (see a recent survey [24] for useful pointers)."]} diff --git a/edge/graph_8922493.jsonl b/edge/graph_8922493.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8928686.jsonl b/edge/graph_8928686.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1714e8fc3caa110dd907343fcae757d2976cf43 --- /dev/null +++ b/edge/graph_8928686.jsonl @@ -0,0 +1,3 @@ +{"10748412|7834819": ["The waist was selected as it has been found to be a suitable position for accelerometer-based fall detection [26]."]} +{"2543083|12127129": []} +{"25319150|1634674": ["INTRODUCTION The advancement of technology in recent years led to the development of inexpensive video sensors which can be used in consumer devices, with applications in elderly people health monitoring, security surveillance, sports action recognition, and face recognition systems for smart home [1]-[3]."]} diff --git a/edge/graph_8929646.jsonl b/edge/graph_8929646.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d791f8ed24d90013837037f0730715228ec96ec --- /dev/null +++ b/edge/graph_8929646.jsonl @@ -0,0 +1,4 @@ +{"15182706|2762290": []} +{"85299652|15782139": []} +{"28853405|1666791": []} +{"18537980|15782139": ["Offline handwriting recognition is significantly different from online handwriting recognition, because here, stroke information is not available [1, 2]."]} diff --git a/edge/graph_8950567.jsonl b/edge/graph_8950567.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da00dc01e1f9f478429e3a2fe9cdcb49e4fe8bcc --- /dev/null +++ b/edge/graph_8950567.jsonl @@ -0,0 +1,3 @@ +{"5734965|1188683": ["One means to address this dilemma is reconfigurable computing [6], [13-16] since resources may be utilized in a timemultiplexed manner (i."]} +{"14859111|1188683": ["One of the major continuous concerns of general-purpose processors is performance.", "In our proposal, for a given instruction set architecture, a onetime instruction set extension of eight instructions is sufficient to implement the reconfigurable functionality of the processor."]} +{"11312430|1188683": []} diff --git a/edge/graph_8953108.jsonl b/edge/graph_8953108.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f35f55dc82b63c01e219380d03eef51b366593a --- /dev/null +++ b/edge/graph_8953108.jsonl @@ -0,0 +1,2 @@ +{"2222935|192934": ["PATTERN recognition is the study of how machines can observe the environment, learn to distinguish patterns of interest from their background and make sound and reasonable decisions about the categories of the patterns [1]."]} +{"8398498|15744805": []} diff --git a/edge/graph_89613179.jsonl b/edge/graph_89613179.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8965636.jsonl b/edge/graph_8965636.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64bf62810d136267edc6c5bd41764167c966248f --- /dev/null +++ b/edge/graph_8965636.jsonl @@ -0,0 +1,13 @@ +{"16049261|50458504": ["The lack of publicly available database has been a limiting factor for the publications on financial fraud detection [14], particularly credit card transactions."]} +{"207420153|50458504": ["suggested for labeled fraud training data, it is better to employ hybrid algorithms to output suspicion scores, rules and/or visual anomalies on evaluation data [9]."]} +{"7559016|3330313": ["Once the situation has been handled, the anomalous reading may be separately stored for comparison with any new case but would probably not be stored with the main system data as these techniques tend to model normality and use outliers to detect anomalies (Hodge, 2004).", "A more exhaustive list of applications that exploit outlier detection is provided below (Hodge, 2004): - Fraud detection: fraudulent applications for credit cards, state benefits or fraudulent usage of credit cards or mobile phones.", "This fact limits their applicability and increases the processing time if complex data transformations are necessary before processing (Hodge, 2004)."]} +{"266196|50458504": ["Three different profiles can be identified for external fraudsters: the average offender, criminal offender, and organized crime offender (Phua et al., 2005).", "Wheeler &\nAitken (2000) developed the idea of combining algorithms to maximize the power of prediction."]} +{"3417380|5246835": ["Besides, these networks have also been used to detect anomaly and frauds in disciplines other than power utilities such as credit card or telecommunication networks [2,33,34]."]} +{"29097371|5246835": ["Currently, most of the researchers generate realistic synthetic data using data generator to facilitate the development and testing of data mining tools [ 6 ]."]} +{"2633916|5246835": ["A summary of these is given in [28], which reviews analytic techniques for general fraud detection, including credit card fraud."]} +{"10700320|5246835": []} +{"22587952|50458504": ["Fraud detection generally is an important area of application for artificial intelligence techniques [5]."]} +{"41966176|50458504": ["The other technologies involved in credit card fraud detection are Web Services-Based Collaborative Scheme for Credit Card Fraud Detection in which participant banks can share the knowledge about fraud patterns in a heterogeneous and distributed environment to enhance their fraud detection capability and reduce financial loss [8] [13], Credit Card Fraud Detection with Artificial Immune System [13] [26], CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection [18] which is bases upon data mining approach [17] and neural network models, the Bayesian Belief Networks [25] which is based upon artificial intelligence and reasoning under uncertainty will counter frauds in credit cards and also used in intrusion detection [26], case-based reasoning for credit card fraud detection [29], Adaptive Fraud Detection which is based on Data Mining and Knowledge Discovery [27], Real-time credit card fraud using computational intelligence [28], and Credit card fraud detection using self-organizing maps [30].", "They are artificial neural-network models which are based upon artificial intelligence and machine learning approach [5] [7] [9] [10] [16], distributed data mining systems [17] [19], sequence alignment algorithm which is based upon the spending profile of the cardholder [1] [6],"]} +{"207696944|5246835": []} +{"18992950|5246835": ["\u2026a good fraud detection system are: 1) It should identify the frauds accurately 2) It should detecting the frauds quickly 3) It should not classify a genuine transaction as fraud In this paper, a comprehensive review of various fraud detection methods has been performed [46][8][51][23][33][48,][59]."]} +{"18992950|50458504": []} diff --git a/edge/graph_8968641.jsonl b/edge/graph_8968641.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54e60219f46cd217e9b81ab23c5cb470c7150aa2 --- /dev/null +++ b/edge/graph_8968641.jsonl @@ -0,0 +1,9 @@ +{"691081|192934": []} +{"17837705|2616070": ["According to [36], for posterior probability and likelihood estimation, current methods assume that the pixel values in the object region or the background region are independent [15], [16].", "However, the hypothesis of independence of pixel values for posterior probability and likelihood estimation is too strong, especially when there are local associations between pixels, such as for textured regions or regions with repeated patterns [36].", "The limitation of the current region-based methods is that the pixel values are treated as if they were independent for the posterior probability estimation [36]."]} +{"3248867|12127129": ["Background subtraction methods [7] [8] [9] [10] [11] [12] provide most complete feature information."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"16469744|17516538": ["Visual surveillance has also been implemented on understanding and describing human behaviors [ 1 ]."]} +{"11698030|12127129": ["Recently, there are some surveys and comparative studies examined a wide-range of BGS methods [7], [8], [9], [10].", "Some of them [9] focused only on computational complexity, memory requirement and theo-"]} +{"15619871|7788290": ["BJECT TRACKING is an important task in many computer vision applications such as driver assistance [1], video surveillance [ 2 ], object-based video compression [3], and so on. Various methods have been proposed and improved, from the simple and rigid object tracking under the condition of a static camera, to the complex and nonrigid object tracking under the condition of a moving camera."]} +{"6544518|9045232": ["A recent survey of various techniques can be found in [2]."]} diff --git a/edge/graph_8970815.jsonl b/edge/graph_8970815.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e0c556e993a9bcb98ff05a7bd143f22ba484f69 --- /dev/null +++ b/edge/graph_8970815.jsonl @@ -0,0 +1 @@ +{"811034|2357830": ["According to [14], RFID gives rise to two major privacy concerns: covert tracking and inventorying."]} diff --git a/edge/graph_8974063.jsonl b/edge/graph_8974063.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e926ee5b48a4db87ac0f56f15fd03f2ea041f5c9 --- /dev/null +++ b/edge/graph_8974063.jsonl @@ -0,0 +1,8 @@ +{"7396301|2835258": ["Location-aware routing protocols have been a research topic in mobile ad-hoc networks (MANET) [43], [44] and can be implemented more easily and efficiently in CR wireless networks due to the adaptive structure of these networks.", "mechanisms, readers can refer to [43], [44]."]} +{"10800921|12452682": []} +{"10800921|14088590": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|205286988": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"10800921|2835258": ["Classical ad hoc network routing algorithms can be classified on the basis of their: (i) support for maintaining multiple routes between a given source-destination pair [1], (ii) ability to guarantee specific QoS requirements [31], (iii) knowledge of the geographical location [59], (iv) scalability with respect to network size [34], and (v) consideration of energy conservation [2]."]} +{"13068662|8909218": ["Remark 3 (Femtocells): We can apply the approach for non-circular regions to model the aggregate interference generated by femtocell base stations (FBSs) in the macrocell networks [62]."]} +{"6704594|5621151": ["This was mainly driven by the desire of powerful industry players, such as Microsoft and Google, to get access to the TVWS spectrum [11].", "It is very important for CR devices to know their geographical location with a prescribed accuracy [11].", "The beacon technique allows unlicensed devices to transmit only if they receive a control signal or beacon identifying vacant channels within their service areas [11].", "With a geo-location database approach, the PU may be registered in a database and the CR user will have to first determine its location and then interrogate the databases periodically in order to find the free and available channels [9],[11]."]} +{"561843|12452682": []} diff --git a/edge/graph_8974375.jsonl b/edge/graph_8974375.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f588e656f5a862fb010c6743341b1be0ff40bc3f --- /dev/null +++ b/edge/graph_8974375.jsonl @@ -0,0 +1 @@ +{"26809188|116542": ["Those Web services may be provided by different provider and may be developed seperately, and they may be not consistent in data type presentation, security policy, content, etc [5][ 6 ]."]} diff --git a/edge/graph_8983048.jsonl b/edge/graph_8983048.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d513035bfed64e8c6e880d02c6beb1909616360 --- /dev/null +++ b/edge/graph_8983048.jsonl @@ -0,0 +1 @@ +{"23626794|6681074": ["An excellent survey is given by Campbell and Flynn [2]."]} diff --git a/edge/graph_8983083.jsonl b/edge/graph_8983083.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8985853.jsonl b/edge/graph_8985853.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6540bfc6e23b03f396cde9cc00249a7a29493a9e --- /dev/null +++ b/edge/graph_8985853.jsonl @@ -0,0 +1,23 @@ +{"21496006|206051485": ["This is a standard metric [13] that provides an independent assessment"]} +{"41677633|206051485": [") , ( j i hIJ N 3) Image Warping A registered image is generated by transforming reference image with best parameter vector, this is the backward approach and interpolations are performed [1]."]} +{"9343480|206051485": ["Thus, there is a need for automated techniques that require little or no operator supervision [5] [6]."]} +{"907521|206051485": ["Image registration is widely used in photogrammetry, remote sensing, computer vision, pattern recognition, and medical image processing [6], [31].", "smooth areas (areas without prominent texture); and 3) the methods are sensitive to image intensity changes which are caused by noise, varying illumination, and the use of different sensors [31].", "Feature-based algorithms face the additional problem of the effect of outliers (points with no correspondences) on the results [31].", "Usually, these conditions cannot be satisfied simultaneously, and it is necessary to find an appropriate tradeoff [31].", "Every method must take into account the specific geometric image deformation [31]."]} +{"4533500|206051485": ["A large number of automatic image registration methods have been proposed and surveys can be found in [1], [2]."]} +{"12021260|206051485": ["This technique is used in a variety of applications such as remote sensing, map updating, weather forecasting, and computer vision to provide an integrated view of the image data [17]."]} +{"23446344|206051485": ["chain-code correlation, distance of invariant moments, structural matching, Chamfer matching, dynamic programming, and relaxation algorithms, are used for that purpose [4].", "tures can be represented by their point representatives (centers of gravity of closed boundaries [14], [16], [21] and distinctive points [5]), which are called control points in the literature [4].", "A review of recent as well as classic image registration methods has been surveyed in [4].", "A variety of image segmentation and edge detection techniques have been used for feature extraction [4].", "Several measures have been devised and applied to register images, including correlation, normalized cross-correlation, statistical correlation, matched filters, phase-correlation, sum of absolute differences, root mean square, and masked correlation [3], [4]."]} +{"8190307|206051485": []} +{"30024429|206051485": ["Since, in most application cases, geometric distortions found in remotely sensed images can be modeled by \u201cshape-preserving mapping\u201d [1] (translation, rotation, and scaling only) without large errors, we adopt this simple model to estimate the transformation parameters between the two keypoint sets for better computational performance.", "1) Methods based on pixel intensities: The most representative similarity measures used in these methods are cross correlation (CC) [1] and mutual information [2] (MI).", "Among the four algorithms, CC is implemented according to [1], and the other three are implemented based on the publicly available code with the authors\u2019 help.", "Since remote image pairs often have no local distortions, the \u201cshape-preserving mapping\u201d model [1] is introduced into the registration algorithm in this letter.", "R(\u03c6) = { \u03c6, \u03c6 \u2208 [1, 180] 360 \u2212 \u03c6, \u03c6 \u2208 (180, 360) (1)", "The proposed algorithm is compared to methods including CC [1], ARRSI [12], SIFT [7], and SR-SIFT [11].", "IMAGE registration [1] is a vital step in tasks of remote image analysis, such as remote image fusion, environmental surveillance, change detection, map updating, and so on."]} +{"12638260|206051485": ["Excellent reviews of image registration methods are provided in [6], [17], [45], and [46]."]} +{"15169290|206051485": ["Image registration [1, 2] is the basis of many image processing operations, such as image fusion, image mosaic, and geographic navigator."]} +{"14332863|206051485": ["Image registration techniques are the image processing course different time, different sensors or different from the Perspective of access to the same scene two or multiple images to match, image processing is a fundamental problem [1]."]} +{"33828353|206051485": ["Area-based techniques work with image intensity values and they are limited by the window size as well as the similarity of the image pairs [ 1 , 2]. Typical features, such as regions, lines, points, corners, etc., are usually used in image registration [1, 3]. Point features are defined from region or line features, like line intersections, line terminals, or region centroids.", "Area-based techniques work with image intensity values and they are limited by the window size as well as the similarity of the image pairs [1, 2]. Typical features, such as regions, lines, points, corners, etc., are usually used in image registration [ 1 , 3]. Point features are defined from region or line features, like line intersections, line terminals, or region centroids."]} +{"4910166|206051485": []} +{"4986202|206051485": ["The image registration s objective is the \ndefinition of a mapping that best matches two set of points or images."]} +{"11118797|206051485": ["A more recent one, oriented to computer vision but still applicable here, is found in [8], basically confirming the aforementioned classification of methods."]} +{"33558796|206051485": ["REGISTRATION METHOD Generally speaking, image registration consists of four steps: feature detection, feature matching, transform model estimation and image resampling and transformation [1]."]} +{"32035643|206051485": ["Most of the past literatures were devoted to the gradient-based optimization approaches of the automated image registration system [1-6]."]} +{"9446276|206051485": ["Generally, the number of equations obtained from (4) is larger than N. Thus, P can be estimated using the leastsquares method [ 2 ].", "In this paper, we have no plans to study the definition of c(\u2022) thanks to many previous publications having focused on this problem [ 2 ]."]} +{"7542732|206051485": ["Obtaining poorer results for the joint histogram measures was unexpected given that previous studies have suggested that the correlation coefficient should not work for multi-modal registration [3, 8].", "Mutual Information (MI), is the a commonly used metric based on joint histograms and has been seen by some as the leading metric for multi-modal image registration [3].", "The original study used the correlation coefficient (cc) for identifying matching image regions but previous studies [3, 8] have demonstrated that joint histogram based techniques are potentially more reliable for matching multi-modal datasets.", "The quantitative assessment of the accuracy of image registration has often proved to be a difficult task [3] due to the lack of ground truth data.", "A large number of techniques for automating image-to-image registration have therefore been developed [3], with these generally implementing one of two approaches."]} +{"38031689|206051485": ["According to reference[1], the conceptual workflow of the proposed procedure can be shown in Fig.", "Registration is a fundamental operation in image processing to align images taken at different times, from different sensors or different viewing angles, and up to now, scientists have made a lot of research on it and achieved fruitfully at the same time[1, 2]."]} +{"13876254|206051485": ["Comprehensive surveys of the early and later image registration techniques can be found in [1] and [17]."]} +{"1333861|206051485": ["Image registration methods are customarily categorized into two mainstreams: feature-based and area-based techniques([1]).", "[1] Barbara Zitova and Jan Flusser, \u201cImage Registration methods: A Survey\u201d, Image and Vision Computing, vol.", "This technology can be used in multi resource date fusion, surface reconstruction, change detection, object recognition([1])."]} diff --git a/edge/graph_8994149.jsonl b/edge/graph_8994149.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_8995552.jsonl b/edge/graph_8995552.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..adb8a817a6ec08ea26bcbd8214c7c3d69ed48c2c --- /dev/null +++ b/edge/graph_8995552.jsonl @@ -0,0 +1,19 @@ +{"23453915|8953108": ["There are a variety of methods for finding the optimum local thresholds, a comprehensive survey of which can be found in Sezgin & Sankur (2004)."]} +{"14415030|15744805": ["Supervised evaluation methods [5,6], also known as relative evaluation methods [7] or empirical discrepancy methods [4], evaluate segmentation algorithms by comparing the resulting segmented image against a manually-segmented reference image, which is often referred to as a gold standard [8] or ground-truth.", "Analytic methods [4,71] assess segmentation algorithms independently of their output, evaluating them based on certain properties of the segmentation algorithms, such as processing strategy (parallel, sequential, iterative, or mixed), processing complexity, resource efficiency, and segmentation resolution, which are usually not deemed effective for assessing the segmentation quality (e.", "Whereas supervised methods evaluate segmented images against a reference image, unsupervised evaluation methods [45], also known as stand-alone evaluation methods [38] or empirical goodness methods [4] do not require a reference image, but instead evaluate a segmented image based on how well it matches a broad set of characteristics of segmented images as desired by humans."]} +{"20405476|206051485": []} +{"22142165|2616070": []} +{"22142165|8953108": ["Sezgin and Bulent (Sezgin & Sankur, 2004) present an extensive survey of techniques for automating intensity threshold selection.", "EGT operates on the histogram of the gradient image and thus is a histogram shape-based thresholding method as classified by Sezgin and Bulent."]} +{"1116384|8953108": ["Fig. 5. Comparison of segmentation quality on the test image (a) between our algorithm (b) and a number of commonly used thresholding algorithms: Huang\u2019s (c), Li\u2019s (d), Kapur-Sahoo-Wong\u2019s (Maximum Entropy) (e), Tsai\u2019s (f), Otsu\u2019s (g), and Yen\u2019s (h) [ 58 ]."]} +{"6821025|14415030": []} +{"6821025|15744805": ["For example, the number of missegmented pixels (Ysnoff et al., 1977), or the number of segmented targets (Zhang, 1996) is commonly used as an error measurement.", ", 1977), or the number of segmented targets (Zhang, 1996) is commonly used as an error measurement."]} +{"32652772|2616070": ["The region energy Eregion is based on the Bayesian region-competition framework (Zhu and Yuille, 1996; Cremers et al., 2007): Eregion =\u2212 \u2211"]} +{"5192248|8953108": ["Both belong to Shannon-entropy maximisation-based segmentation methods [46], originating from one-dimensional entropic thresholding introduced by Pun in 1981 [47]."]} +{"21314538|2277438": ["Surface rendering (SR) is a common method of displaying 3D images, which can be divided into two categories: direct surface rendering (DSR) and indirect surface rendering (ISR) (128,129)."]} +{"21314538|14122909": ["The comprehensive reviews of this LSA and their associated numerical techniques were documented in the medical imaging literatures (29,30,33).", "In August 2006, Noble and Boukerroui presented a survey paper on ultrasound image segmentation by clinical applications, where the corresponding segmentation techniques were further classified in terms of use of prior information (33)."]} +{"21314538|8953108": ["Local and global threshold methods, based on target image intensity distribution, have also been widely used in image segmentation (37)."]} +{"5078899|6604384": []} +{"23388628|15744805": ["Previousworkonsegmentationevaluationframeworkshas been reported in several papers (Zhang, 1996; Zhang, 2001; Zou et al. , 2004; Cardoso & Corte-Real, 2005; Fenster & Chiu, 2005; Udupa et al. , 2006; Shah, 2008).", "The evaluation meth-ods are broadly divided into analytical and empirical methods (Zhang, 1996; Cardoso & Corte-Real, 2005).", "Turning our attention to manual inputs and empirical discrepancy methods (Zhang, 1996; Cardoso & Corte-Real, 2005), a segmentation reference would be established ideally by manual contouring each 2D cross section of a z-stack while viewing the z-stack from multiple viewpoints."]} +{"23388628|8953108": ["Although we used two of many published threshold optimization techniques (Sezgin & Sankur, 2004) that had been evaluated, we performed additional experiments to verify the noise robustness of the segmentation sequences.", "Based on the published ranking in Sezgin & Sankur (2004) and our visual performance assessment using our data, we selected minimum error thresholding (T1) and topological stable state thresholding (T2) .", "The accuracy evaluations in Sezgin & Sankur (2004) are based on document images and \u2018nondestructive testing images\u2019 including laser scanning confocal microscopy images.", "We followed the work in Sezgin & Sankur (2004) that includes evaluation and ranking of 40 methods for selecting an intensity threshold."]} +{"31980349|15744805": []} +{"31980349|8953108": ["45 for a comprehensive survey] is a spatially blind technique primarily based on the principle that segments of an image can be identified by delineating peaks, valleys, and/ or shapes in its corresponding intensity histogram."]} +{"1182053|15744805": ["In Zhang [43], empirical discrepancy methods can be decomposed into different classes where the discrepancy is based on\nAuthorized licensed use limited to: Universitetsbiblioteket I Bergen.", "Segmentation evaluation is a frequently debated and usually task-specific topic in computer vision and automated image analysis applications [43], [44].", "In Zhang [43], empirical discrepancy methods can be decomposed into different classes where the discrepancy is based on", "The surveys by Zhang [43], [44] classify the evalua-", "The surveys by Zhang [43], [44] classify the evaluation methods for segmentation into three groups: analytical, empirical goodness, and empirical discrepancy methods."]} diff --git a/edge/graph_8999817.jsonl b/edge/graph_8999817.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0bc829204f1d57547caed0bc7c7f6a59bf8e4e79 --- /dev/null +++ b/edge/graph_8999817.jsonl @@ -0,0 +1,4 @@ +{"17327652|15453366": ["Millimeter wave (mmWave) communication has enabled gigabit per second data rates in indoor wireless systems [1, 2] and has been recently proposed for outdoor cellular deployments [3]."]} +{"3342505|9932808": ["as a sparsity constrained matrix reconstruction problem [38]\u2013 [43]."]} +{"3342505|15453366": ["Millimeter wave (mmWave) communication, for example, has enabled gigabit-per-second data rates in indoor wireless systems [4], [5] and fixed outdoor systems [6]."]} +{"27590748|12681089": ["the Kronecker channel model [12] is valid, i."]} diff --git a/edge/graph_9000342.jsonl b/edge/graph_9000342.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d70e8883ebe59f0a3fb260367e6721090e829ab --- /dev/null +++ b/edge/graph_9000342.jsonl @@ -0,0 +1,6 @@ +{"63414571|27527196": []} +{"14865190|9045232": ["So far, the fourth approach has been the most successful one [ 17 ].", "Computer vision researchers have long been interested in developing automated face detection algorithms. A good survey paper on this topic is [ 17 ]."]} +{"1053619|15782139": ["Plamondon and Srihari [16] provide an extensive survey of this work."]} +{"497690|15782139": ["Madhvanath and Govindaraju [3] have used a holistic approach in handwriting recognition, while Plamondon and Srihari [5] present a survey of holistic and segmented approaches for handwriting recognition."]} +{"17734164|9045232": []} +{"16097875|8197990": ["Machine vision is a hard problem [1, 2, 6, 9]."]} diff --git a/edge/graph_9005398.jsonl b/edge/graph_9005398.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81cf4e87f7c256fbb8c3d993d40f325b9b89864d --- /dev/null +++ b/edge/graph_9005398.jsonl @@ -0,0 +1,12 @@ +{"111246420|1876323": []} +{"15033379|1876323": []} +{"110687574|1876323": []} +{"1951245|1876323": ["Next, the simulation results are discussed in Section VII.", "Because of this, the implementation-oriented control engineering expert is always in pursuit of a design, which provides accurate tracking as well as insensitivity to\nenvironmental disturbances and structural uncertainties."]} +{"109687465|1876323": []} +{"14267693|1876323": []} +{"120516973|1876323": ["However, the innovations in data mining, data fusion, sensor technology, recognition technology and fast microprocessors are ever increasingly encouraging the use of ANN structures, whose operating philosophy is suitable to interaction of an Expert and Machine.", "1"]} +{"43143823|1876323": []} +{"18021459|9005398": ["One of the first experimental investigations that demonstrates the invariance property of a motion control system under a sliding mode is due to Kaynak et al [26].", "\u2022 Chattering elimination through filtering [48,56] \u2022 Design of the parameters of a conventional sliding mode controller [48,57-58] \u2022 Modeling of the uncertainties [48,59-61] \u2022 Generating a complementary control action [48,62-63] \u2022 Generating the equivalent control and corrective control actions separately [48,64]", "A good deal of review is provided in the recent survey of Kaynak et al [48]."]} +{"18021459|1876323": ["Sliding Mode Control (SMC) technique nowadays enjoys a wide variety of application areas; such as in general motion control applications and robotics, in process control, in aerospace applications, and in power converters [16-19].", "A recent comprehensive survey is given in [17].", "Here it is assumed that mentioned loss causes an uncertainty, which enters the system through the control channels, and which is particularly effective during the sliding mode; and this uncertainty can be alleviated if it falls within the limits allowing the maintenance of the invariance during the sliding mode [17].", "Among many alternatives available [17,28,53], a common approach to eliminate the chattering is to smooth the sign function, which corresponds to introduce a boundary layer [28].", "It must be noted that to satisfy the matching conditions, the disturbances and uncertainties are always assumed to enter the system through the control channels [17]."]} +{"39627604|1876323": ["[ 8 ] G. V. Moustakidis, \u201cOptimal stopping times for detecting changes in", "It is well known that the sliding mode control systems [6]\u2010[ 8 ], [10], [16]\u2010[19] have two phases in the controller design."]} +{"39255251|1876323": []} diff --git a/edge/graph_9010313.jsonl b/edge/graph_9010313.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9020157.jsonl b/edge/graph_9020157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb2923567199f2ac356276ad4ceaeb2fc372b75a --- /dev/null +++ b/edge/graph_9020157.jsonl @@ -0,0 +1 @@ +{"13266737|33286487": ["More generally, the whole class of time-frequency energy distributions has been fully described by Cohen [COH66], [ COH89 ]: they can all be seen as smoothed (or, more precisely, correlated) versions of the Wigner-Ville distribution."]} diff --git a/graph_902018.jsonl b/edge/graph_902018.jsonl similarity index 100% rename from graph_902018.jsonl rename to edge/graph_902018.jsonl diff --git a/edge/graph_9022135.jsonl b/edge/graph_9022135.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b67206bd943aff01397cc9c7cdb40f55c8c7038 --- /dev/null +++ b/edge/graph_9022135.jsonl @@ -0,0 +1,40 @@ +{"8950903|16525678": ["Such challenging problems in visual surveillance are of topical research interest in the computer vision community [10,27]."]} +{"8950903|17516538": ["Such challenging problems in visual surveillance are of topical research interest in the computer vision community [10,27]."]} +{"8519378|17516538": ["Recent comprehensive reviews by Wang et al. [25] and Hu et al. [ 43 ] have emphasized the role of gait as a biometrics in behavior analysis."]} +{"8519378|7788290": ["Gavrila and Davis [ 10 ] classified methods for the analysis of human movement into 2-D approaches that do not use explicit models, 2-D approaches that use explicit models, and 3-D approaches."]} +{"77451|206764452": ["Different taxonomies have been proposed and here we adopt the hierarchy used by Moeslund et al. [90]: action primitive, action and activity."]} +{"77451|1634674": []} +{"77451|1029120": []} +{"77451|7788290": []} +{"2006961|53680608": ["The Recognition of Human Movement Using Temporal Templates Aaron F. Bobick, Member, IEEE Computer Society, and\nJames W. Davis, Member, IEEE Computer Society\nAbstract\u00d0A new view-based approach to the representation and recognition of human movement is presented."]} +{"1634674|7788290": ["Gavrila [4] presented a survey focused mainly on tracking of hands and humans via 2D or 3D models and a discussion", "for recognition of action and activities from video and not o n the lower-level modules of detection and tracking which is discussed at length in earlier surveys [2], [3], [4], [5], [6 ]."]} +{"175905|987239": ["Methods for 3D shape analysis and matching have been recently used in computer graphics (see survey in [28])."]} +{"12394287|206764452": []} +{"12394287|17516538": []} +{"2974306|7788290": ["We review vision methods used in detection, tracking and recognition of human movement in general, as they are closely related to gait recognition ([8, 1, 14 ] are good surveys on this topic)."]} +{"1049642|7788290": []} +{"12772003|16525678": ["However, there is not much work reported on the integration of different types of sensors in automated video surveillance systems [5].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123].", "distributed surveillance, see a detailed survey in [5] for more information."]} +{"12772003|17516538": ["Future developments mentioned in the previous survey [4] include multimodal data fusion, robust occlusion handling, usage of 3-D data, and usage of personal identification.", "In fact, optical flow often requires special hardware if a real-time solution is needed [4].", "Human and vehicle behavior recognition has become one of the most active research topics in image processing and pattern recognition [4], [5], [93], [123]."]} +{"12772003|14970359": ["of real time is not clear, although many researchers use it in their systems [7].", "arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35].", "A previous study on capturing human motion, which compares over 130 papers, found algorithms to be heavily constrained to assumptions [7] related to movement, environments, and subjects."]} +{"12772003|7185733": ["arms, torso, and legs [7]; and 2) small-scale body movements like hand gestures and facial expressions [34], [35]."]} +{"12772003|7788290": []} +{"15482841|12127129": ["Piccardi [12] investigated the computational complexity, memory requirements, and theoretical accuracy of seven BGS algorithms."]} +{"9641070|17516538": ["The design of an advanced automatic video surveillance system requires several critical functionalities including, but not limited to, motion detection [13]\u2013[25], classification [26], tracking [27], [28], behavior monitoring [29], activity analysis, and identification [30], [31].", "They are categorized as background subtraction, temporal differencing, and optical flow [13]."]} +{"8729004|7788290": ["We will only mention a few of the more recent works on human detection here \u2013 see Gavrilla\u2019s survey [ 7 ] for older references."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"17946437|17516538": ["To detect and classify moving objects, two alternatives have been presented in [14]: shape based silhouettes and motion based on periodic human movement.", "The aim behind such topic is to develop intelligent surveillance in order to replace the traditional passive video surveillance that has proven ineffective when the number of cameras exceeds the capability of human operators to monitor them [14]."]} +{"6412862|987239": ["Three-dimensional (3D) shape matching has been widely investigated (Bustos et al. 2007; Del Bimbo and Pala 2006; Iyer et al. 2005; Tangelder and Veltkamp 2004) as a means of effective and efficient object retrieval."]} +{"14956420|12127129": ["I. INTRODUCTION\nF OREGROUND detection is fundamental in many systemsrelated to video technology [1], [2]."]} +{"206769463|7788290": []} +{"14775089|12127129": ["Generally the reference frame often call ed the \u201cbackground image\u201d or \u201cbackground model\u201d must be a representation of the scene without moving objects and must be kept regularly updated so as to adapt to the varying luminance conditions and geometry settings [30]."]} +{"14775089|17516538": ["dent on the performance of the human detection [25], [26], [29].", "Motion segmentation is used to detect regions corresponding to moving objects that can be potential targets in natural scenes in order to provide a focus of attention for later processes such as tracking and activity analyses [26]."]} +{"14775089|14970359": []} +{"2685240|17516538": []} +{"16345341|17516538": ["Rapid, simple tools for scene analysis and understanding represent the challenge ahead for the video processing community [2]."]} +{"11962297|14970359": []} +{"11962297|7788290": []} +{"4536769|17516538": ["From the aforementioned examples, we can understand that the correlations between the different gait factors/components are very signi\ufb01cant for human recognition and gender recognition."]} +{"4536769|14970359": ["Some important surveys along with detailed comparisons of different algorithms can be found in [1], [13], [16], and [27]."]} +{"4536769|7788290": ["Some important surveys along with detailed comparisons of different algorithms can be found in [1], [ 13 ], [16], and [27]."]} +{"9432483|14970359": []} +{"9432483|7788290": ["Advances in this domain are driven by a wide range of promising applications in various fields, such as medical diagnostics [1], surveillance [2], smart rooms [5], [6], and video indexing and retrieval [7]."]} diff --git a/edge/graph_902436.jsonl b/edge/graph_902436.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9025758.jsonl b/edge/graph_9025758.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b4ef4c644a7bd6186ab74445ce2b4749dc11c8b --- /dev/null +++ b/edge/graph_9025758.jsonl @@ -0,0 +1,3 @@ +{"36943062|534755": ["Over the past few years, several statistical and artificial intelligence techniques have been proposed to carry out the reverse engineering of GRNs from monitoring and analyzing large-scale gene expression data [3], [4]."]} +{"8085527|60455": ["As a general data structure, graphs have become increasingly important in modeling sophisticated structures and their interactions, with broad applications including chemical informatics, bioinformatics, computer vision, video indexing, text retrieval, and Web analysis.", "and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "Web usage mining is focused on the analysis of users\u2019 activities when they browse and navigate through the Web.", "Web content mining is a knowledge discovery task of \ufb01nding information within web pages, while web structure mining aims to discover knowledge hidden in the structures linking web pages.", "Web mining is the application of data mining techniques to discover patterns and knowledge from the Web (Kosala and Blockeel 2000; Srivastava et al. 2000).", "There are many applications involving sequence data, such as customer shopping sequences, Web clickstreams, and biological sequences.", "Web access patterns via association rule mining in web logs were proposed by (Chen et al. 1996; Pei et al. 2000; Srivastava et al. 2000; Punin and Krishnamoorthy 2001)."]} +{"16520917|3102110": []} diff --git a/edge/graph_90260792.jsonl b/edge/graph_90260792.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_90260954.jsonl b/edge/graph_90260954.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_90262079.jsonl b/edge/graph_90262079.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cbb031e3500fee6775f0213a358616628e778082 --- /dev/null +++ b/edge/graph_90262079.jsonl @@ -0,0 +1,8 @@ +{"9654935|2357830": ["Software runs in medicinal implants [22], digital video recorders, cars [10], mobile devices [21], delay-tolerant networks [4], RFID tags [14], and secure sensors [15, 26]."]} +{"13273923|4528002": ["The work in Studnia et al. (2013) gives also an overview of the protection mechanisms that could be adopted as countermeasures to the threats and attacks the authors defined."]} +{"6779551|6670217": []} +{"6779551|7851743": ["structure and services have been proliferating with the goal of meeting rapidly increasing demands [1], [2]."]} +{"6779551|544688": ["Next, in Section IV, the security protocols and algorithms used in existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX, and LTE standards, are discussed.", "In the following, we will present an overview of the security protocols used in the aforementioned wireless standards (i.e., the Bluetooth, Wi-Fi, WiMAX, and LTE) for protecting the authenticity, confidentiality, integrity, and availability of legitimate transmissions through the wireless propagation medium.", "Moreover, the E-UTRAN includes a base station (also termed as eNodeB in LTE) and several UE.", "An LTE network typically consists of an EPC and an E-UTRAN, as shown in Fig.", "INTEGRATION OF PHYSICAL-LAYER SECURITY INTO EXISTING WIRELESS NETWORKS\nAs discussed earlier, the authentication and encryption constitute a pair of salient techniques adopted in existing wireless security architectures for satisfying the stringent authenticity and integrity requirements of wireless networks (e.g., Wi-Fi, LTE, etc.).", "Then, existing security paradigms and protocols conceived for guarding against the different protocol layers\u2019 attacks have been reviewed in the context of several widely deployed wireless networks, including the Bluetooth, Wi-Fi, WiMAX, and LTE.", "We also provide\na survey of the existing security protocols and algorithms\nthat are adopted in the existing wireless network standards,\nsuch as the Bluetooth, Wi-Fi, WiMAX, and the long-term evo-\nlution (LTE) systems.", "| Proceedings of the IEEE 3\nalgorithms used in the existing wireless networks, such as the Bluetooth, Wi-Fi, WiMAX and LTE standards.", "As a result, the UE checks its received parameter AUTN for authenticating the LTE network.", "Both the CKs and the IKs are used for data encryption and integrity check for enhancing the confidentiality and integrity of LTE transmissions.", "Regarding the MAC layer, there are numerous different protocols adopted by various wireless networks, such as the CSMA/CA used in Wi-Fi networks, the slotted ALOHA employed in tactical satellite networks by military forces, CDMA involved in 3G mobile networks [66] and OFDMA adopted in the LTE and LTE-advanced networks [67].", "Considering that a BS serves multiple users in a cellular network, an orthogonal multiple access mechanism, such as the OFDMA of LTE [140] or CDMA of 3G systems [141], enables the multiple users to communicate with the BS.", "In summary, in Sections IV-A\u2013IV-D, we have discussed the security protocols of Bluetooth, Wi-Fi, WiMAX as well as of LTE and observed that the existing wireless networks tend to rely on security mechanisms deployed at the upper OSI layers of Fig.", "LTE Long-term evolution.", "Upon receiving the request, the HSS responds to the MME by sending back an EPS authentication vector containing the quantities (RAND, XRES, AUTN, KSI ASME), where RAND is an input parameter, while XRES is an output of the authentication algorithm at the LTE network side.", "LTE is the most recent standard developed by the 3G partnership project for next-generation mobile networks designed for providing seamless coverage, high data rate, and low latency [109].", "16 shows this two-way authentication process of the LTE system using the EPS\u2013AKA protocol, where an UE and an LTE network should validate each other\u2019s identity.", "The aforementioned authenticity, confidentiality, integrity, and availability are summarized in Table 1, which are commonly considered and implemented in the existing wireless networks, including the Bluetooth [58], Wi-Fi [59], WiMAX [60], LTE [61] standards, and so on.", "In general, only the PHY and MAC layers are specified in wireless networking standards (e.g., Wi-Fi, Bluetooth, LTE, etc.).", "In order to facilitate secure packet exchange between the UE and EPC, a so-called EPS\u2013AKA protocol was proposed for defending LTE networks against various attacks, including redirection attacks, rogue base station attacks [111], and MITM attacks.", "5, we feature two types of industrial standards for WMAN, namely WiMAX and LTE [89], [90].", "To this end, the LTE system adopts a more secure ciphering technique referred to as SNOW 3G [114] that is a block-based ciphering solution used as the heart of LTE confidentiality and integrity algorithms, which are referred to as the UEA2 and UIA2, respectively [114].", "Although introducing these elements into\n14 Proceedings of the IEEE |\nLTE is capable of improving the network coverage and quality, it has its own new security vulnerabilities and threats."]} +{"6779551|1940388": ["information-theoretic security [33], [49]."]} +{"439930|6670217": []} +{"48361867|4528002": ["This study identified the vulnerabilities on the basis of the studies conducted by Brooks et al. (2009), Checko-way et al. (2011), and Studnia et al. (2013)."]} diff --git a/edge/graph_9035119.jsonl b/edge/graph_9035119.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9036148.jsonl b/edge/graph_9036148.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf753a3da679cad0bb789a6dd747a02d16bcd6f7 --- /dev/null +++ b/edge/graph_9036148.jsonl @@ -0,0 +1,9 @@ +{"22414367|13178381": ["For the secrecy systems with estimated CSI, the secure on-off transmission schemes for single antenna channels were proposed in [16] and [17]."]} +{"13178381|4395259": []} +{"36730393|4395259": ["\u2026to con \ufb01 dentially communicate with the legitimate destination while the eavesdropper cannot interpret the source information, without any assumptions for the eavesdropper nodes (computational power, available information) and without relying on the conventional higher layer encryption [1, 2]."]} +{"3181390|13178381": ["However, a little effort has been dedicated to study the effect of CSI uncertainty on secure wireless communications [10]\u2013[14]."]} +{"124018304|4395259": []} +{"1457251|3453202": ["Moreover, in [32]\u2013[34], active eavesdropping in massive MIMO systems was considered, whereas the eavesdropper in this paper is assumed to be passive in order to hide its presence."]} +{"1457251|4395259": ["Since secrecy and privacy are critical concerns for the desi gn of future communication systems [5], it is of interest to investigate how the large number of s patial degrees of freedom in massive MIMO systems can be exploited for secrecy enhanceme nt [6], [7]."]} +{"23919432|6779551": ["Note that in [5], a survey of wireless physical-layer security is provided including authentication, confidential communications, and secretkey generation."]} +{"19724296|4395259": ["Finally, unlike most of the related work [1]\u2013[11], we consider a multi-cell setting where not only the data signals cause inter-cell interference but also the AN, which has to be carefully taken into account for system design.", "However, several new issues arise for physical layer security provisioning in multi-cell massive MIMO systems that are not present for conventional MIMO systems [1]\u2013[11].", "This approach is based on certain assumptions regarding computational complexity, and is thereby potentially vulnerable [1].", "(6) reveals that the achievable ergodic secrecy rate of the kth MT in the local cell has the subtractive form typical for many wiretap channels [1]\u2013[11], i."]} diff --git a/edge/graph_9036392.jsonl b/edge/graph_9036392.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3ad6cb8e63c075813d2942b81407dccec2bfe25 --- /dev/null +++ b/edge/graph_9036392.jsonl @@ -0,0 +1 @@ +{"3206935|17516538": ["For instance, automatic recognition of human affective states is an important research topic for video surveillance [19]."]} diff --git a/edge/graph_9039515.jsonl b/edge/graph_9039515.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e09dea5168fb97629355d6a6f3b582bda3a32d8 --- /dev/null +++ b/edge/graph_9039515.jsonl @@ -0,0 +1,2 @@ +{"3444088|2795037": []} +{"36828093|2795037": ["Our QM optimizer can employ any of the state-of-the-art techniques [25, 9,26] to locate the single best route for a subset of data based on available statistics for that data partition subset."]} diff --git a/edge/graph_9040432.jsonl b/edge/graph_9040432.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d618b050dc8c8d7c2741e178c31d2e2bd53c06b --- /dev/null +++ b/edge/graph_9040432.jsonl @@ -0,0 +1,61 @@ +{"28283810|17428811": ["Layer coding standard such as Fine Granular Scalability (FGS) [1][2][3] video targets a broad range of multimedia applications such as interactive video communications and video mail applications over IP networks, etc."]} +{"5742536|1230643": ["\u2026communication, microsensor, and micro-processor hardware; small-scale energy supplies in conjunction with the signi\ufb01cant progress in distributed signal processing, ad hoc networks protocols, and pervasive computing have made wireless sensor networks (WSNs) a new technological vision [1][2][3]."]} +{"8692761|7851743": ["In an interference-limited network with full buffers, the signal-to-interference-plus-noise ratio (SINR) is essentially equal to the SIR and, because the SIR distribution remains approximately constant as the network densi\ufb01es, the best case scenario is \u03c1 \u2248 1 ."]} +{"8692761|875676": ["Further tutorial treatment can be found in a recent tutorial [120].", "[120] A."]} +{"8692761|8909218": ["Our view is that the required 1000x will, for the most part, be achieved through combined gains in three categories: a) Extreme densi\ufb01cation and of\ufb02oading to improve the area spectral ef\ufb01ciency."]} +{"8692761|17109970": ["[144] F."]} +{"2544353|7439310": ["Hybrid ARQ schemes, where the rate of the associated FEC is adaptively changed based on the underlying channel conditions, have also been presented by Wang and Zhu in [ 15 ] and by Ma and Zarki in [16]."]} +{"13403320|14441987": ["Basically, there are two approaches in providing ad hoc network connectivity: \u2022 Flat-routed network architecture \u2022 Hierarchical network architectures [1] In the flat-routed network architecture, all the nodes are equal and packet routing is done based on peer-to-peer connections.", "In general, existing routing protocols can be classified as either: \u2022 Table-driven \u2022 On-demand \u2022 Hybrid [1, 2] Table-driven protocols attempt to continuously update the routes within the network so that when a packet needs to be forwarded, the route is already known and can immediately be used."]} +{"105092|10559330": []} +{"24376795|15516254": ["One area focuses on congestion control for multimedia transmission, where the adjustment of the transmission rate either follows the AIMD style of TCP [21, 25] or the rate achieved is TCP friendly [23, 24, 26].", "Both window-based [3, 12] and rate-based [14, 22, 26] congestion control approaches have some mechanisms similar to the Additive Increase Multiplicative Decrease (AIMD) of TCP."]} +{"15809720|3540699": ["Hence, although the concepts proposed in this paper can potentially be deployed with state-of-the-art nonscalable coding with bitstream switching [11], [12] this usually entails higher complexity and smaller granularity for real-time packet prioritization and adaptive retransmissions."]} +{"11254296|14441987": ["Much work on routing in ad hoc networks has focused on finding a shortest path and achieving a high degree of route availability, which mostly deals with the best-effort data traffic [1]\u2013[3]."]} +{"476504|47147736": ["with leaky bucket rate control and scheduled by the weighted fair-queuing service discipline [58], it is possible to achieve strong guarantees on delay. from the receiver [41] or network [ 64 ]."]} +{"476504|10559330": ["The int-serv architecture, which is restricted to the network but also applicable in the end-system, is comprised of four components [62]: Fig.", "Each element is QoS-aware and supports interfaces required by the service definition [62].", "There has been, however, considerable progress in the separate areas of distributed-systems platforms [20\u201328], operating systems [29\u201335], transport systems [36\u201345] and multimedia networking [46\u201366] support for QoS.", "6, the QM, which constitutes a user interface, service agents and dispatcher, presents an abstract management layer designed to isolate applications from underlying details of the specific services provided by a QoS-driven internet [62].", "The group has defined a comprehensive int-serv architecture [62] and a QoS framework [79] used to specify the functionality of internetwork system elements (known as elements) which make multiple, dynamically selectable QoS available to applications.", "The work by the Integrated Services (int-serv) Group [62] of the Internet Engineering Task Force (IETF) is a significant contribution to providing controlled QoS for multimedia applications over an integrated services internetwork.", "XRM [28] EN EN (E)N (E)N N N QoS-A [68] EN E(N) EN E(N) E (E) (E)N E EAD ENRS ISO [67] (E)(N) EN EN EN EN Heidelberg [71] (E)N EN EN E(N) (E) (N) N ED ERS TINA [76] (E) (N) N (N) (N) IETF [62] EN E EN ENR Tenet [84] EN N N N N (E) N ED ERS MASI [77] E(N) E(N) E E E E E OMEGA [70] E,(N) E,(N) E(N) E(N) E E E ER WashU [72] E E E E ER"]} +{"8912694|3345066": ["The key elements that can be involved in a QoS assurance system are QoS-aware routing, traffic policing, admission control, QoS Medium Access Control (MAC) scheduling [6], etc.", "The purpose of AC is to accept new traffic sessions given that the performance of existing admitted sessions are not affected [6].", "To date, there are several surveys proposed for investigating the QoS issues [6], [8], [10]\u2013[12] regarding IEEE 802.", "The AC algorithms for mobile adhoc networks are discussed in [6] and QoS routing schemes are reviewed in [8], [13].", "These issues significantly affect the available channel capacity for a node [6]."]} +{"8912694|18643817": ["The AC algorithms for mobile adhoc networks are discussed in [6] and QoS routing schemes are reviewed in [8], [13]."]} +{"8912694|14088590": ["1) Reliant MAC scheme: Since reservation-based MAC scheme such as TDMA can provide a simple way for quantifying channel capacity, earlier QoS routing RR schemes were proposed based on contention-free MAC schemes [8].", "A proper QoSaware routing scheme can serve the purpose [8].", "To date, there are several surveys proposed for investigating the QoS issues [6], [8], [10]\u2013[12] regarding IEEE 802.", "Further, since applications have distinct QoS requirements that can be reflected by different metrics, a route is able to be computed from the routing table based on any QoS metric as long as the decided QoS states are always up-to-date [8].", "The AC algorithms for mobile adhoc networks are discussed in [6] and QoS routing schemes are reviewed in [8], [13]."]} +{"8912694|141053": ["As a primary layer for providing QoS, the literature survey on the topic of MAC layer is also undertaken in [11], [12]."]} +{"8912694|10559330": ["This issue is originally noticed in IntServ in which each session must make an individual RR via complex signalling [53]."]} +{"1900518|10287248": []} +{"1900518|10559330": []} +{"1900518|991041": []} +{"11154258|2835258": ["The GPSR uses a technique called greedy packet forwarding [4], [13]."]} +{"5922349|14441987": ["The multi-NIC approach has been discussed in some past work [21] [22], however no distributed channel assignment\nalgorithm has been proposed that can indeed realize the true performance potential of this architecture [28]."]} +{"5842782|10287248": ["QoS routing has been receiving increasingly intensive attention in the wireline network domain [10].", "source node or by a distributed computation [10]."]} +{"2655864|141053": []} +{"2655864|3540699": ["The introduction of the most updated error concealment/resilient tools in video coding can be found in [20], and the overview of existing error resilient and error concealment techniques in video coding can be found in [21, 22], respectively."]} +{"2655864|17428811": ["263 andMPEG-4, layered coding techniques can be categorized into three classes: temporal, spatial, and signal-tonoise ratio (SNR) scalability [11].", "The fine granularity scalability (FGS), which adopts a method called bit-plane coding, can overcome this problem, that is, the enhancement layers can be truncated anywhere while maintaining some degree of quality improvement [11]."]} +{"2655864|7439310": ["The introduction of the most updated error concealment/resilient tools in video coding can be found in [20], and the overview of existing error resilient and error concealment techniques in video coding can be found in [21, 22], respectively."]} +{"12132121|7439310": ["Fortunately, the standardization of higher bandwidth networks, such as the universal mobile telecommunications system (UMTS) [1], [2], is well underway, and, together with continued progress in video\nManuscript received January 27, 1998; revised March 11, 1998.", "Nevertheless, residual transmission errors cannot be avoided with a mobile radio channel, even when FEC and ARQ are combined.", "We discuss these measures and the interframe propagation of the remaining picture impairment in this section."]} +{"38624985|14441987": ["Much work has been done on routing in MANETs [1, 2]."]} +{"38624985|10287248": ["The QoS routing has been receiving increasingly intensive attention in the wireline network domain [3, 4]."]} +{"5957637|10559330": ["Copyright 2004 ACM 1-58113-959-4/04/0010...$5.00 A. Nafaa, M. Gueroui \nPRiSM, Universit\u00e9 de Versailles 45, Avenue des Etats-Unis 78035 Versailles +33139254346 {anaf, mogue}@prism.uvsq.fr \ncan support the more demanding applications, while being a serious alternative to wired networks.", "Adaptive Service Differentiation for QoS Provisioning in IEEE 802.11 Wireless Ad Hoc Networks A. Ksentini, \nM. Naimi1 LICP, Universit\u00e9 de Cergy-Pontoise 3, Avenue Adolph Chauvin 95302 Cergy-Pontoise +3313134256607 \n Kad@prism.uvsq.fr ABSTRACT The proposed scheme IEEE 802.11e draft standard defines new MAC protocol \nfor QoS in wireless networks, namely HCF and EDCF."]} +{"3345066|14088590": ["In multi-hop MANETs, as discussed in [5], contention-free MAC schemes such as time division multiple access (TDMA) or code division multiple access (CDMA) are difficult to implement due to the lack of centralised control and the dynamically changing network topology.", "decoupling: as discussed in the context of QoS-aware routing in [5], protocols can benefit from directly accessing MAC layer information.", "Many of the challenges are the same as those posed to QoS-aware routing protocols, which were discussed in [5].", "Many metrics employed for specifying and measuring QoS were explained in [5].", "In [5] we discussed several of the general design trade-offs in MANETs that may also impact QoS-aware protocol design.", "Again, the network resources relevant to QoS have been discussed in [5]."]} +{"3345066|141053": ["higher directional interference, difficulty in maintaining the correct transmission direction in the face of mobility and deafness to certain transmissions [64].", "Some MAC protocols for addressing these issues have been proposed [64], but higherlayer protocols still require attention."]} +{"14649298|9923206": ["Various works have been proposed for protocol veri\ufb01cation including rigorous speci\ufb01cation and conformance testing techniques for network protocols [212], rigorous treatment of the TCP protocol [165] [196], veri\ufb01cation of ad-hoc routing protocols for wireless sensor networks: [213]."]} +{"14649298|8974063": ["For furt her details, interested readers are referred to the survey pape rs [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occu pancy are reviewed in detail."]} +{"14649298|6507312": []} +{"14649298|12401050": ["It has been posited that for practical purposes of analyzing DSA/ CRNs, a simple two-state semi-Markov ON-OFF model is adequate for modeling spectrum usage [155] (table IV may be referred to see the popularity of this model).", "For further details, interested readers are referred to the survey papers [155] [169] in which various statistical models proposed in literature for modeling temporal and spatial spectrum occupancy are reviewed in detail."]} +{"14649298|6400766": ["In addition, RL can work with very large number of states when used along with function approximation [67].", "In RL, instead of explicit specification of the tr ansition probabilities, the transition probabilities can be en visioned to be accessed through a simulator that typically is restart ed from a uniformly random initial state many times [67]."]} +{"14649298|17062686": ["Indeed, there has been a lot of work in applying various economics-based approaches to wireless networkin g [40].", "Cooperative spectrum selection : [43]; Game Theory Resource allocation : see references in [40] [41]; Routing games[44] [45] [46]; Spectrum Sharing : [47] [48]; Mitigating selfish routing[49] [50] [51]; Medium Access Control (MAC) : [52]; Modeling routing: see references in [29]."]} +{"14649298|8589228": ["The key insight is to use hypothesis testing with a simulation based approach to deduce from some sample executions if the system under test satisfies the specification [132]."]} +{"14649298|15929566": ["We note here that reinforcement learning is also known by alternate monikers such as neuro-dynamic programming (NDP) [64] and adaptive (or approximate) dynamic programming (ADP) [65] [25].", "Therefore, classical DP techniques are rather ineffective at solving large-scale complex MDPs [25].", "We also discussed in section III-A that classical DP techniques are ineffective at solving large-s cale complex MDPs [25] [66]."]} +{"14649298|17109970": []} +{"14649298|2840997": ["With the preclusion of approximation techniques, this method then becomes unwieldy for large-scale problems complex problems."]} +{"14649298|1708582": []} +{"38669665|10559330": ["This is because QoS architectures such as IntServ [1]-[3] and Diffserv [4] are built on top of Internet\u2019s completely distributed hop-by-hop routing architecture,", "This is because QoS architectures such as IntServ [1]-[3] and Diffserv [4] are built on top of Internet\u2019s completely distributed hop-by-hop routing architecture, lacking a broader picture of overall network resources.", "Additionally, we will establish a large scale simulation environment in order to investigate the scalability issues and make a comparison to traditional QoS models such as IntServ and DiffServ."]} +{"85562787|41998167": []} +{"85562787|17960632": []} +{"85562787|14441987": []} +{"2380886|10559330": ["It is difficult to guarantee the performance requirements for various services with manual configuration of the Quality-ofService (QoS) knobs on a per-device basis as is prevalent today."]} +{"28587215|17113548": ["Bandwidth can be dynamically renegotiated according to changes in the bit stream level statistics [8]."]} +{"5790546|10559330": []} +{"46159|7439310": []} +{"7200100|17428811": []} +{"7200100|7439310": []} +{"11735843|2623404": ["3 Software-defined networking (SDN) The major insight of \u2018software-defined networking\u2019 (SDNs) is to allow horizontally integrated systems by allowing the separation of the control plane and the data plane [11,107] while providing increasingly sophisticated set of abstractions.", "In particular, it is the culmination of many varied ideas and proposals in the general field of programmable networks [11,18] with many of the initial ideas of programmable networking (of \u2018open interfaces\u2019 and \u2018separation of control and data plane\u2019) espoused by the OpenSig and Active Networking community now maturing in the form of the SDN) architecture.", "Our paper is different from other survey papers [11,18,19] in its focus on wireless programmable networks while the previous papers had focused mainly on generic (wired) programmable networks.", "Applications of programmability include rapid provisioning of services [10], flexible resource management [11], efficient resource sharing [12], and support for new architectures such as cloud computing, Internet of things (IoT) [13], etc."]} +{"11735843|10693567": []} +{"11735843|3189715": ["The lack of programmability of networks has long been recognized, and various approaches have been proposed to address this deficiency [14] [15].", "in 1999 [14], t he impending impact of numerous programming trends is anticipated using surprisingly modern terminology.", "The main reason OpenSig approach could not quite become mainstream was the static nature of the interfaces it defined [14]."]} +{"9124911|141053": ["Several good surveys [ 11 ], [12] have been conducted for QoS support in multihop networks."]} +{"10110794|10559330": []} diff --git a/edge/graph_9041423.jsonl b/edge/graph_9041423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9045114.jsonl b/edge/graph_9045114.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9045232.jsonl b/edge/graph_9045232.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6fceabfa008b2d63251430078939bd9b2e022acb --- /dev/null +++ b/edge/graph_9045232.jsonl @@ -0,0 +1,5 @@ +{"1154755|53680608": []} +{"12209481|9307657": []} +{"16932868|5473785": ["An example illustrating the use of the above equations to propagate evidence in a singly connected network is given in Neapolitan [18].", "An example illustrating the use of the above equations to propagate evidence in a singly connected network is given in Neapolitan 18]."]} +{"62185766|53680608": []} +{"7394271|25699143": ["1 MPC depth map Stereo vision is a passive approach to get 3D depth information using two or more image data by using computer [2]."]} diff --git a/edge/graph_9045705.jsonl b/edge/graph_9045705.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d1c3508ee9b4c6815ea4e20bdd3dc7e18a7bc2f --- /dev/null +++ b/edge/graph_9045705.jsonl @@ -0,0 +1,2 @@ +{"22855969|7653893": ["An overview of wavelet-based techniques for fMRI data analysis can be found in [ 21 ]."]} +{"15471179|9270553": []} diff --git a/edge/graph_9045751.jsonl b/edge/graph_9045751.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42586e3747c2d927e92d91e99c7d9a7646c5e70f --- /dev/null +++ b/edge/graph_9045751.jsonl @@ -0,0 +1,8 @@ +{"8566413|18418184": ["For a general review of audio fingerprinting methods (not applied to video synchronization), please also see [6]."]} +{"1424844|18418184": ["This problem is addressed by a number of prior works in audio fingerprinting [1]; our work"]} +{"10028043|18418184": ["For a review on audio fingerprinting, the reader is referred to [1]."]} +{"10028043|8953108": ["Adaptive thresholding methods adapt the threshold value on each pixel of the image by using some local statistics of the neighborhood [23]."]} +{"14742567|18418184": ["Concerning audio based approaches, audio fingerprinting is naturally considered due to its compactness, its discriminative power, and its robustness to various kinds of distortion [1, 5]."]} +{"39575573|18418184": []} +{"11156835|192934": ["The system's complexity is low enough to allow operation on today's personal computers and other cost-effective computing platforms and the described algorithm is based on well-known feature extraction/pattern recognition concepts [13].", "The audio identification system presented here follows a general pattern recognition paradigm as described in [13]."]} +{"148760|18418184": ["Several approaches already exist for audio fingerprinting (see [1] for a review)."]} diff --git a/edge/graph_905827.jsonl b/edge/graph_905827.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9060471.jsonl b/edge/graph_9060471.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b56330951fa77ef8a6619c7ea0f768b0376404f --- /dev/null +++ b/edge/graph_9060471.jsonl @@ -0,0 +1,11 @@ +{"6916259|9060471": ["To solve this problem, techniques for multi-source aggregation, which consider the estimation of source reliability, have been proposed to derive true answers from a collection of sources [2, 3, 4, 5, 6, 10, 11, 12, 14, 17, 18, 19, 22, 26, 28]."]} +{"14054006|9060471": ["In the light of this challenge, truth discovery [3,5,7\u20139, 14, 17, Most of the existing truth discovery algorithms are proposed to work on static data."]} +{"14122041|386036": ["While the problem of record linkage has been well-studied [7, 15], linking and merging information from multiple sources remains a challenging task [20, 18].", "Record linkage, also known as entity resolution, aims to identify records that refer to the same real world entity [7, 15]."]} +{"18514801|9060471": ["To tackle the challenge of discovering both true information and user reliability, truth discovery methods [26, 27, 28, 44, 47] have been proposed based on the principle that reliable users tend to report true information and truth should be reported by many reliable users."]} +{"1080095|17756238": ["Survey participants answer the questions with their own ideas independently, and the responses are often private [44]."]} +{"11018118|2162062": []} +{"11018118|30815820": []} +{"1928064|18654252": ["provide a survey of outlier detection methods in network anomaly identification [14]."]} +{"1928064|7774517": ["summarized the outlier detection techniques [38] and Gogoi et al."]} +{"14321955|386036": [", misspellings and partial lists) and we can handle this case by considering value similarity as in [8]."]} +{"367128|10500613": ["The names of the attributes can vary from one source to another; we assume that we have already reconciled heterogeneity with schema-matching techniques [22] and query answering starts with query reformulation."]} diff --git a/edge/graph_9072047.jsonl b/edge/graph_9072047.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea74af59e48cf8693a16bab96c5819ca8e4bcf81 --- /dev/null +++ b/edge/graph_9072047.jsonl @@ -0,0 +1,14 @@ +{"7764218|1876323": ["It is known that the variable structure with sliding mode has the intrinsic nature of robustness to the uncertainties [10]."]} +{"1242053|1876323": []} +{"9175934|10739218": ["If the patterns of EMG signals for certain motion are completely unknown, control rules extraction is not required, and preparation time is not limited, a well structured adaptive neuro controller [13] or neuro-fuzzy controller [14] might be one of the most suitable controllers for the control of\u2026"]} +{"6459586|1876323": []} +{"39255251|1876323": []} +{"27690278|1876323": []} +{"32451637|11038925": []} +{"18420521|1876323": ["Comprehensive surveys of variable-structure control can be found in [3], [4].", "Each describes a constituent linear surface (5) The eventual switching surface, , of dimension is the intersection [4] of all component surfaces ( 5) (6) The sliding mode is the constrained motion of states along trajectories on the sliding surface ."]} +{"5362942|10770351": ["[23] S. Stidham Jr. and R. Weber, \u201cA survey of Markov decision models for control of networks of queues,\u201dQueueing Syst., vol. 13, pp. 291\u2013314, 1993.", "[27] R. R. Weber, \u201cOn the optimal assignment of customers to parallel servers,\u201dJ. Appl.", "[4], Stidham [22], and Stidham and Weber [23].", "A comprehensive discussion on optimal service control of queueing systems can be found in the survey papers of Crabill et al. [4], Stidham [22], and Stidham and Weber [23].", "Weber [27] and Ephremidiset al. [8] show that if the system consists of multiple identical M/M/1 queues (single server queues with exponentially distributed interarrival and service times) in which the queue sizes are observable at any time, then the expected discounted cost is minimized by the shortest queuepolicy, which routes a new arrival to the queue with the shortest queue length."]} +{"1981599|10739218": ["A comprehensive survey can be found in [2], with a plethora of references."]} +{"9005398|1876323": []} +{"143721|9005398": []} +{"40213328|9005398": ["Recently, Kaynak et al. [ 6 ] have given a survey about the fusion of computationally intelligent methodologies and sliding-mode control, and show how some intelligent methods such as fuzzy logic and NNs can be incorporated into sliding-mode control to alleviate its well-known problems."]} +{"27860673|1400872": []} diff --git a/edge/graph_9079835.jsonl b/edge/graph_9079835.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_908131.jsonl b/edge/graph_908131.jsonl similarity index 100% rename from graph_908131.jsonl rename to edge/graph_908131.jsonl diff --git a/edge/graph_9091277.jsonl b/edge/graph_9091277.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9092634.jsonl b/edge/graph_9092634.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9099586.jsonl b/edge/graph_9099586.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9104850.jsonl b/edge/graph_9104850.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9107060.jsonl b/edge/graph_9107060.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7985d24ae2acb985275285ef5380ea92197ec45d --- /dev/null +++ b/edge/graph_9107060.jsonl @@ -0,0 +1,3 @@ +{"1989943|18750590": []} +{"1989943|14650419": []} +{"13513101|2509135": ["N RECENT years, cognitive radio technology [1] [2] [3] has been proposed as a promising communication paradigm to solve the conflict between the limited spectrum resources and the increasing demand for wireless services."]} diff --git a/edge/graph_9107727.jsonl b/edge/graph_9107727.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26cb199f85774585af5a88c11560d1ed81d227d4 --- /dev/null +++ b/edge/graph_9107727.jsonl @@ -0,0 +1,4 @@ +{"7218153|192934": ["A data set (zer) of 47 Zernike moments extracted from images of handwriting numerals (as in [26]) are also used; there are 200 images for each digit, 1160 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL."]} +{"49547423|9107727": []} +{"5646161|49842767": []} +{"15538672|192934": []} diff --git a/edge/graph_91175972.jsonl b/edge/graph_91175972.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_91176905.jsonl b/edge/graph_91176905.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_91178132.jsonl b/edge/graph_91178132.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_91184428.jsonl b/edge/graph_91184428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ec97d0e83b307bdf7f4660458640d3a709266c0 --- /dev/null +++ b/edge/graph_91184428.jsonl @@ -0,0 +1,11 @@ +{"115982584|16762549": []} +{"115982584|17783665": []} +{"115982584|21386749": ["The IoT has the potential to be integrated into numerous healthcare services and applications (Dohr et al. 2010; Bui and Zorzi 2011; Islam et al. 2015)."]} +{"115982584|3348390": []} +{"206989863|18740719": ["There has been a lack of validated data against which we can apply established risk models to ICS cyber threats [22, 19]."]} +{"9308964|9436742": ["To address aspects associated with fault-tolerance, topics related to redundancy, coordination and self-stabilization should then be addressed as well [68]."]} +{"207513748|63993468": ["[6] T\u00f8ndel IA, Foros J, Kilskar SS, Hokstad P, Jaatun MG.", "As pointed out in a recent urvey [6] summarising research on interdependencies in power systems or the last 5 years, many studies analyse interdependencies without deailing how these interdependencies were identified in the first place, iving the impression that the interdependencies are all known to the nalyst."]} +{"206989761|207209718": []} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"36206338|28294111": ["It has been reported that Elsevier and the American Chemical Society did not grant access to GS until mid-2007 and 2011, respectively (Burright 2006; Kousha and Thelwall 2008; Neuhaus and Daniel 2008; Vine 2006)."]} diff --git a/edge/graph_91186252.jsonl b/edge/graph_91186252.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63c55a5a0ec901288f35550b34da10797ff0defc --- /dev/null +++ b/edge/graph_91186252.jsonl @@ -0,0 +1,4 @@ +{"4108581|8507227": ["A survey of studies on ML in computer-aided diagnosis has been reported [8], and a collection of studies on ML in computer-aided diagnosis and medical image analysis can be found in books [6, 20]."]} +{"52056226|2088679": ["Medical image classification studies have done in human brain, eye, chest, cancer and other medical effects [11]."]} +{"4767901|3644401": []} +{"52946321|18337976": ["Since the shortest distance between two points is found on the surface (i.e., mandible), it is called geodesic distance [20], [21] as a convention."]} diff --git a/edge/graph_91186399.jsonl b/edge/graph_91186399.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2665b43b2ca5843a8b981acb08846f4b6c136b88 --- /dev/null +++ b/edge/graph_91186399.jsonl @@ -0,0 +1,4 @@ +{"116356375|9736817": []} +{"2087828|42279552": ["For high aspect ratios, the applied force could cause also a reorientation and reshaping of the particles that could induce the destruction of the existing conductive network or a reduction of the conductivity of the filler [70,77]."]} +{"42499562|20905429": []} +{"56304863|7834819": ["Wearable sensors [24] and accelerometers [25] are other techniques used to monitor human movement."]} diff --git a/edge/graph_91188824.jsonl b/edge/graph_91188824.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df9c3f384a1d95bf33f74546876c0d55ffd01a59 --- /dev/null +++ b/edge/graph_91188824.jsonl @@ -0,0 +1,4 @@ +{"140079759|11407374": []} +{"139683773|11407374": []} +{"102947439|15589021": []} +{"103896603|15867134": []} diff --git a/edge/graph_9119983.jsonl b/edge/graph_9119983.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..96fef60ebb4ae2d87bf22deb7b90607d3cb352e2 --- /dev/null +++ b/edge/graph_9119983.jsonl @@ -0,0 +1 @@ +{"9891697|9119983": []} diff --git a/edge/graph_9123526.jsonl b/edge/graph_9123526.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_912956.jsonl b/edge/graph_912956.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_913718.jsonl b/edge/graph_913718.jsonl similarity index 100% rename from graph_913718.jsonl rename to edge/graph_913718.jsonl diff --git a/edge/graph_9141490.jsonl b/edge/graph_9141490.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e3ef8714e8f85b527076b956f3d7ff61db8b880 --- /dev/null +++ b/edge/graph_9141490.jsonl @@ -0,0 +1,3 @@ +{"44962334|63137": ["The results presented in this section were obtained in [25,52,67].", "This is done by studying these algorithms under a common algorithmic framework called model-based search (MBS) [67].", "Zlochin et al. [67] have proposed a unifying framework for so-called model-based search (MBS) algorithms.", "The SGA parameter value update that we describe in the following is a generalization of the one that was presented in [67] (which was itself a generalization of the one that was given in [52])."]} +{"2042712|63137": []} +{"2042712|175549": ["Among those are the ones by [5], by [55], by [149] and by [112]."]} diff --git a/edge/graph_9145937.jsonl b/edge/graph_9145937.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9149125.jsonl b/edge/graph_9149125.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a1cf72c016c7e7f7e2022ac03ab5641be8d00319 --- /dev/null +++ b/edge/graph_9149125.jsonl @@ -0,0 +1 @@ +{"16360644|1582463": ["A suitable preprocessor transforms these annotations into checking functions that can control potential violations in the program[9][ 1 ]."]} diff --git a/edge/graph_9150195.jsonl b/edge/graph_9150195.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9152976.jsonl b/edge/graph_9152976.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9153064.jsonl b/edge/graph_9153064.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7778127b45095ba30ad641d66367709d19521c49 --- /dev/null +++ b/edge/graph_9153064.jsonl @@ -0,0 +1,3 @@ +{"18976516|1142636": ["In particular, according to [6, 7], we can classify semantic annotation approaches according to the schema given"]} +{"10105538|17323154": ["In general, it is common in text retrieval and data mining applications to either cluster the data prior to executing queries or to cluster the results after a query is executed [Carpineto et al. 2009].", "In general, it is common in text retrieval and data mining applications to either cluster the data \nprior to executing queries or to cluster the results after a query is executed [Carpineto et al. 2009]."]} +{"22424455|2656838": ["In this respect, to ensure an effective knowledge management, many works advocate the extraction of concise representations of frequent patterns [15,17,34,35].", "Moreover, from the viewpoint of concise representations of frequent itemsets [15], their ef\ufb01ciency with respect to the extraction task and the offered compactness rates also depends on the sparseness of the data (cf. [34] for details on a recent comparison of the cardinalities of concise\u2026"]} diff --git a/edge/graph_916507.jsonl b/edge/graph_916507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9169029.jsonl b/edge/graph_9169029.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9171235.jsonl b/edge/graph_9171235.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0847b45759d7dc5c46fc1e4bb51043396997e0d1 --- /dev/null +++ b/edge/graph_9171235.jsonl @@ -0,0 +1,30 @@ +{"13542553|205286988": []} +{"13542553|1236072": ["The lifetime of WSNs is a crucial parameter when evaluating performance of routing protocols [4], [6].", "and route data either to other nodes or back to an external base station or stations that may be a fixed or a mobile node capable of connecting the sensor network to an existing communication infrastructure or to the internet [4]."]} +{"37925315|12681089": []} +{"10201381|1230643": ["Pervasive networks of such sensors and actuators open new vistas for many potential applications, such as battlefield surveillance, environment monitoring and biological detection [11], [15], [ 2 ], [20]."]} +{"913511|1230643": ["As energy consumption for data transmission is an exponential function of the communication distance between sender and receptor according to the energy consumption model, multi-hop communication strategy is considered to be efficient in energy conservation for data gathering [1]."]} +{"9682810|205286988": ["In flat networks, sensors route data to the PN through their peer sensors using one of the many routing protocols proposed in the literature [ 4 ].", "On the other hand, clustering has been proven energy efficient in WSN [ 4 ], [5], [6].", "Routing over the overlay network composed of CHs can be performed using one of the energy-efficient routing protocols for WSN proposed in the literature [ 4 ].", "Energy-efficient cluster-based routing algorithms for WSN have been widely addressed in literature [ 4 ].", "Many papers addressed separately energy-efficient routing [ 4 ], clustering [5], [6], and area coverage [2], [12], [13], [14].", "In cluster-based WSN, sensors are organized in clusters each having one sensor promoted as CH. All non-CH nodes transmit their data to their CH, which routes it to the remote PN. Clustering can provide for substantial energy saving [ 4 ], [5], [6], [7] since only CH sensors are involved in routing and relaying data."]} +{"12016401|12060835": ["In this paper, we present a single cluster algorithm for lifetime optimization in homogeneous wireless sensor networks with one solar powered sensor.", "The energy consumption of CH, however, may be much higher since it needs to process and transmit the information for the whole cluster with the BS directly if no relay node is available."]} +{"36016592|1230643": [", and to transmit the sensed data to a base station cooperatively [6], [27].", "To reduce that energy consumption, multihop communications are always applied to transmit data from sensors to the base station [6]."]} +{"9157297|1230643": ["I. INTRODUCTION\nW IRELESS Sensor Networks (WSNs) consist of au-tonomous sensor nodes that can be deployed for monitoring unattainable areas, such as, glaciers, forest fires, deserts, deep oceans etc [1] [2]."]} +{"13217495|1230643": []} +{"13217495|14441987": []} +{"806900|12060835": ["There are two main strategies to prolong the network lifetime: i) by reducing the energy consumption devoted to communications; and ii) by using energy harvesting systems that collect energy from the environment in order to enable perpetual operation [1]."]} +{"17380208|1230643": ["WIRELESS sensor network (WSN) consists of devices equipped with radio transceivers that cooperate to form and maintain a fully connected network of sensor nodes [3]."]} +{"2630520|2357830": ["Public concerns are indeed likely to focus on a certain number of security and privacy issues [21,77].", "From a physical point of view a RFID tag is a small microchip 1 attached to an antenna (that is used for both receiving the reader signal and transmitting the tag ID) in a package which usually is similar to an adhesive sticker [21].", "In the last few years, some solutions have been proposed for RFID systems, however, they all have serious problems as described in [21]."]} +{"2630520|1230643": ["A large scienti\ufb01c literature has been produced on sensor networks in the recent past, addressing several problems at all layers of the protocol stack [22]."]} +{"1860435|1230643": ["During the last decade, wireless sensor networks (WSNs) have attracted intensive attention due to its enormous application potential in battlefield surveillance, environmental monitoring, biomedical observation and other fields [1]\u2013[6]."]} +{"7327669|1230643": ["Indeed, in traditional WSNs, the sensor nodes can be densely deployed with no need to predetermine their positions , and thus, node admission is unnecessary [2]."]} +{"21837364|205286988": ["However, the proportion of energy consumed in the stage of network operation is much more than that in the stage of topology generation [14]."]} +{"10473322|11720829": []} +{"10783352|12029139": ["Although the feasibility of energy harvesting from HAP has not been proven yet through experimentation, recent advances for low-power cellular applications can be found in [17, Table II].", "The receiver sensitivity of the RF energy harvester is reported to be \u2212 10 dBm in the literature [17, Sec.", "\u2026and \u03b7 is the harvesting ef\ufb01ciency of the receiver which depends on the ef\ufb01ciency of the antenna, the accuracy of the impedance matching between the antenna and the voltage multiplier, and the power ef\ufb01ciency of the voltage multiplier that converts the received RF signals to DC voltage [17]."]} +{"21117149|1230643": ["IRELESS sensor networks (WSNs) use a large quantity of sensors in a target area for performing surveillance tasks such as environmental monitoring, military surveillance, animal tracking, and home applications [1]\u2013[ 6 ]."]} +{"21396876|1503157": ["They have wide-ranging applications, some of which include military [1]\u2013[3], environment monitoring [4], [5], agriculture [6], [7], home automation [8], smart transportation [9], [10], and health [11]."]} +{"21396876|1230643": ["They have wide-ranging applications, some of which include military [1]\u2013[3], environment monitoring [4], [5], agriculture [6], [7], home automation [8], smart transportation [9], [10], and health [11]."]} +{"6820964|6959212": []} +{"15892382|1230643": ["Many of the applications include disaster recovery, military surveillance, health administration, environmental & habitat monitoring, targettracking etc [9]."]} +{"2577058|1230643": ["For each link (i, j) and node i, the transmission persistence probabilities pij and Pi should be in the range [0, 1], i.e.,\n0 \u2264 pij \u2264 1, \u2200(i, j) \u2208 L (4) 0 \u2264 Pi \u2264 1, \u2200i \u2208 N (5)"]} +{"33824855|12060835": ["Energy harvesting in WSNs is an active area of research [1], [11], [5], [14], [15]."]} +{"2796087|1230643": ["W IRELESS sensor network (WSN) [1]\u2013[3] is a promising technology that can revolutionize the way we observe and interact with the physical world."]} +{"11848108|12060835": ["For EH-WSNs, we have shown that the same tradeoff\nexists for maximum total remaining and maximum minimum\nremaining energy objectives.", "There have also been several works on routing for energyharvesting WSNs.", "On the other hand, PV technology is a matured field with commercially available PV panels specifically designed for WSNs [3].", "CONCLUSION\nEnergy-harvesting technology enables WSNs to support power-hungry applications that may otherwise be impractical\nwith current battery capacity limits.", "While this cannot be assumed in many practical settings, there are also many cases in which this scenario can become applicable, especially in event monitoring WSNs in which nodes within a given area detect a certain event and simultaneously produce data to be sent to the server.", "In EH-WSNs, the tradeoff also exists between max-total and max-min energy routing objectives [4][8].", "Our work aims to manage energy through harvest-aware routing of multi-commodity traffic in EH-WSNs.", "Several works have investigated heuristic maximum lifetime routing in battery-powered WSNs.", "For EH-WSNs, there is additional energy \u201cconsumption\u201d in the form of energy wastage due to overcharge of finitecapacity energy buffers [4].", "It has been previously shown that there is a tradeoff between these two objectives when maximizing network lifetime of battery-powered WSNs [6].", "Two enabling technologies drive the feasibility of EH-WSNs \u2013 energy harvesting and energy management [2].", "For EH-WSNs, we have done preliminary simulations to confirm this tradeoff as well.", "It has been previously shown that maximizing network lifetime is NPhard for battery-powered WSNs [5] and involves a tradeoff between two objectives \u2013 minimizing the total route consumption and maximizing the minimum residual network battery level."]} +{"34475847|15947359": []} diff --git a/edge/graph_9175763.jsonl b/edge/graph_9175763.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd7373c970e3f418c97f978a79f5216597cdf281 --- /dev/null +++ b/edge/graph_9175763.jsonl @@ -0,0 +1,28 @@ +{"1755507|14970359": []} +{"1033682|174797842": []} +{"1422207|5171123": ["Surveys of the face recognition methods can be found in [1,2]."]} +{"17221751|2301292": ["from naturalistic environments with spontaneous affective behaviour [118] as existing datasets [122], [138], [176] contain exaggeratedly posed affective behaviour.", "the recognition of expressions that might be hardly noticeable using only 2D appearance [118]."]} +{"7684482|11608263": ["To name just a few, if the expected class label for \ud835\udc99 \u2032 is single, then the predicted label could be \ud835\udc66 \u2217 = argmax \ud835\udc66 \ud835\udc5d ( \ud835\udc66 \u2223 \ud835\udc99 \u2032 ) , together with a con\ufb01dence measure \ud835\udc5d ( \ud835\udc66 \u2217 \u2223 \ud835\udc99 \u2032 ) .", "For the problem of exact age estimation, the predicted age could be the one with the maximum description degree.", "After that, the experiments on facial age estimation are reported in Section 4."]} +{"34182760|14674468": []} +{"443511|5171123": ["tion [4,5,15,20,26,28,33\u201335,39], facial expression recognition [6,12,40], facial age estimation [13,14,16,17,24], gender classification [29,30] and ethnicity recognition [19,31], there are very limited attempts on kinship verification from facial images in the literature."]} +{"11844016|7185733": ["Examples for the presented systems are: emotional interpretation of human voices [35], [66], [68], [90], emotion recognition by physiological signals pattern recognition [67], detection and interpretation of hand gestures [ 64 ], recognition of body movements [29], [97], [46], and facial expression analysis (this survey)."]} +{"11724192|393948": ["and temporal and spatial coherence [3]."]} +{"14674468|5238287": []} +{"18600985|14674468": ["[55] which provides a comprehensive study on human and automated analysis of race classification."]} +{"18600985|2301292": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"18600985|5238287": ["To reduce dimensionality (a critical step for obtaining better gender estimation accuracy [177]), often, the human silhouette is extracted and a statistical feature - namely an average silhouette - is computed."]} +{"18600985|14303607": ["Interesting work can be found in related survey papers [212], [273], [274]."]} +{"2323881|16010181": []} +{"2323881|18543658": ["Inspired by Ouyang et al. (2014), we unify the four categories of PIFR approaches in the following formulation.", "To name a few, good surveys exist for illumination-invariant face recognition Zou et al. (2007), 3D face recognition Bowyer et al. (2006), single image-based face recognition Tan et al. (2006), video-based face recognition Barr et al. (2012), and heterogeneous face recognition Ouyang et al. (2014)."]} +{"2323881|5171123": ["To name a few, good surveys exist for illumination-invariant face recognition [Zou et al. 2007], 3D face recognition [Bowyer et al. 2006], single image-based face recognition [Tan et al. 2006], video-based face recognition [Barr et al. 2012], and heterogeneous face recognition [Ouyang et al. 2014].", "Moreover, PIFR approaches that require more than two face images per subject for enrollment are not included in this article, as single-image-based face recognition [Tan et al. 2006] has dominated the research in the past decade.", "Another disadvantage is that the PCA-based texture modelling may hardly represent the fine textures that are particular to individual faces Vetter (1998). To reduce the computational complexity and relieve the non-convexity of 3DMM, multiple constraints are employed to regularize the fitting procedure in Eq."]} +{"206590483|7788290": ["There is an extensive literature on object detection, but here we mention just a few relevant papers on human detection [18,17,22,16,20]. See [ 6 ] for a survey."]} +{"12331515|9045232": ["1997], need accurate locations of key facial features such as eyes, nose, and mouth to normalize the detected face [Martinez 2002; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection \ntechniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial features such as eyes is required to normalize the detected face [Yang et al. 2002; Zhao 1999].", "Extensive research on the subtasks has been carried out and relevant surveys have appeared on, for example, the subtask of face detection [Hjelmas and Low 2001; Yang et al. 2002].", "After candidate face regions are located, still-image-based face detection techniques can be applied to locate the faces [Yang et al. 2002].", "This is true even for holistic matching methods, since accurate location of key facial fea\u00adtures \nsuch as eyes is required to normal\u00adize the detected face [Yang et al. 2002; Zhao 1999].", "It is well known that even holistic matching \nmethods, for example, eigenfaces [Turk and Pentland 1991] and Fisherfaces [Belhumeur et al. 1997], need \naccurate locations of key facial features such as eyes, nose, and mouth to normal\u00adize the detected face \n[Martinez 2002; Yang et al. 2002].", "Extensive research on \nthe subtasks has been carried out and rel\u00adevant surveys have appeared on, for exam\u00adple, the subtask of \nface detection [Hjelmas and Low 2001; Yang et al. 2002]."]} +{"12331515|53680608": []} +{"9616824|14303607": ["To extract more details, active appearance model (AAM) [20] learns both shape and appearance models via principal component analysis (PCA), which becomes one of the most popular features for face-related tasks [21]\u2013[24]."]} +{"16010181|393948": ["Another promising way to adaptively learn features is by virtue of deep learning (Bengio et al, 2013) which achieves state-of-the-art performance on many computer vision tasks."]} +{"16010181|9045232": ["CLM-based methods consist of a shape model and a number of local experts, each of which is utilized to detect a facial feature point.", "FFPD usually starts from a rectangular bounding box returned by face detectors (Viola and Jones, 2004; Yang et al, 2002) which implies the location of a face."]} +{"359842|16620699": ["Comprehensive recent surveys of literature on 3D face recognition can be found in [251] and [252]."]} +{"359842|6028805": ["A comprehensive review of recent advances in face recognition from infra-red imagery may be found in [268]."]} +{"359842|9045232": ["\u2026one or more of the following: low quality images (though image quality may be enhanced by exploiting super-resolution techniques [220-223]); cluttered backgrounds (which complicate face detection [224]); the presence of more than one face in the picture; and a large amount of data to process [71]."]} +{"359842|192934": ["A couple of classifiers described in [211] are then applied to identify the individual in the frame and, finally, a super-classifier based on a voting scheme [212] performs the final classification for the entire video sequence (Figs."]} +{"206592484|456491": []} diff --git a/edge/graph_9175918.jsonl b/edge/graph_9175918.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9176080.jsonl b/edge/graph_9176080.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03502ae52b8bf8e6aa81174e75ddf1819300f44e --- /dev/null +++ b/edge/graph_9176080.jsonl @@ -0,0 +1,3 @@ +{"62450266|15261053": []} +{"14110787|9307657": ["In our tests we use the method of assigning each basis vector a number of bits proportional to its standard deviation [ 27 ]."]} +{"19528801|41768464": ["However DWT has spatial frequency locality, which means if signal is embedded it will affect the image locally [13]."]} diff --git a/edge/graph_9178561.jsonl b/edge/graph_9178561.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ee0d70e39bb3b172a6560a974d01bec49ee0b17 --- /dev/null +++ b/edge/graph_9178561.jsonl @@ -0,0 +1,8 @@ +{"15041001|8909218": ["1, we consider an OFDMA cognitive small cell network where K co-channel cognitive small base stations (CSBSs) are overlaid on a primary macrocell.", "In the simulations, spectrum-sharing CSBSs and primary users are randomly distributed in the range of MBS, and cognitive small cell users are uniformly distributed in the coverage area of their serving small cell; the carrier frequency is 2 GHz, B = 10 MHz, N = 50, M = 50, and \u03c3 2 = B N N 0 , where N 0 = \u2212174 dBm/Hz is the AWGN power spectral density.", "Note that in (1), co-channel interference between small cells is assumed as part of the thermal noise because of the severe wall penetration loss and low power of CSBSs [21]."]} +{"31630702|2509135": ["To serve this purpose, cognitive radio has been proposed due to its ability to agilely sense, enter, and leave radio spectrum without causing harmful interference to primary users [2]\u2013[4]."]} +{"38842790|8909218": ["As a result, network operators may experience less traffic on their expensive macrocell networks, and can focus their resources on the truly mobile users [5], [6].", "It can communicate with macrocell networks by broadband connections such as digital subscriber line (DSL), cable modem, or a separate wireless backhaul channel [4], [5].", "For example, the study in [5] demonstrates that the transmission power can be saved about 34 and 77 dB in different fading environments.", "Normally, the number of FUs is between two and four, as indicated in [5].", ", two or four [5]; b) the size of the cell coverage is about the house or apartment range, e."]} +{"9661193|7892994": ["The problem of determining an effective method for reporting channel-quality indicator (CQI) values in OFDM-based systems is important and has extensively been studied [25]."]} +{"12252655|8909218": ["Femtocell technology, which is a low-power, low-cost cellular base station designed to serve a very small area, has been emerging as a solution to improve indoor coverage and capacity [1]."]} +{"3033246|8909218": ["The noise mitigation characteristic of the femtocell architecture is a result of \u201cmicroization\u201d, a recent network concept in which a large area network is divided into smaller networks, thereby reducing the per base station load [8].", "From this, we can see that the performance of femtocell architectures is limited by the available frequency spectrum [8].", "Femtocell architecture [8, 22, 23] has been used to mitigate the noise in cognitive radio communications.", "On the other hand, FBS installations can also reduce interference in highly dense areas, since private clients do not have to compete for the macrocell network resources [8].", "In addition, we introduce a compensation concept to address the backhaul communication issue for open access femtocells given in [8].", "In addition, we consider an open access femtocell architecture [8].", "Research on femtocells has shown that they are limited by the amount of usable bandwidth in a small area [8, 22]."]} +{"3943624|7686677": ["At the same time, energy ef\ufb01ciency has become an important aspect in evaluating the performance of wireless communication networks due to the rapidly rising energy costs and increasingly rigid environmental standards [18\u201320]."]} +{"3943624|8909218": ["All FBSs are connected to the MBS over a broadband connection, such as cable modem or digital sub-scriber line (DSL) [1].", "Femtocells can play an important role in improving system capacity and quality of service (QoS) in indoor communication environment [1]."]} diff --git a/edge/graph_9180844.jsonl b/edge/graph_9180844.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9188816.jsonl b/edge/graph_9188816.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9190423.jsonl b/edge/graph_9190423.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94c87dc55bee6dc8a020896189b6007bf2ac0828 --- /dev/null +++ b/edge/graph_9190423.jsonl @@ -0,0 +1,5 @@ +{"16493965|15428874": ["Moreover, GPU systems have been widely used in many other evolutionary algorithms and data mining techniques in recent years [15,24,31,33]."]} +{"16493965|8601873": ["More recently, other generalized multiinstance models have been formalized [16,39].", "Multiple instance learning (MIL) is a generalization of traditional supervised learning having growing interest [6,12,16,39]."]} +{"16493965|1437067": []} +{"1965419|18212759": ["These Cloud infrastructures are in turn used to accommodate the VMM, which in turn accommodate the VMs and the grid middleware [5, 43]."]} +{"14295689|11810221": ["We restrict ourselves to deterministic approaches (for an introduction to stochastic problems, the reader is referred to Neumann [133] and Herroelen and Leus [86])."]} diff --git a/edge/graph_9191244.jsonl b/edge/graph_9191244.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9198105.jsonl b/edge/graph_9198105.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46c5486d850819d0c15bfa6e3eaeb85f481b79c0 --- /dev/null +++ b/edge/graph_9198105.jsonl @@ -0,0 +1 @@ +{"56035875|9770908": []} diff --git a/edge/graph_9219367.jsonl b/edge/graph_9219367.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53016303eeddd12408688b8441690f7d7086499c --- /dev/null +++ b/edge/graph_9219367.jsonl @@ -0,0 +1 @@ +{"16560998|15640936": []} diff --git a/edge/graph_9223482.jsonl b/edge/graph_9223482.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9223553.jsonl b/edge/graph_9223553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef0e697fb1b6ed7f7e8f017706490d817217aafe --- /dev/null +++ b/edge/graph_9223553.jsonl @@ -0,0 +1 @@ +{"129147991|9223669": []} diff --git a/edge/graph_9223669.jsonl b/edge/graph_9223669.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9232391.jsonl b/edge/graph_9232391.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00b8bf3da53a8528f25789af150cc7a7801e111a --- /dev/null +++ b/edge/graph_9232391.jsonl @@ -0,0 +1,5 @@ +{"16366895|11608263": ["Compared with the counterpart classification problem\u2014multi-label classification problem (Tsoumakas and Katakis, 2007), the multi-output regression problem remains largely under-studied.", "\u2026online 4 February 2013\nCommunicated by S. Sarkar\nKeywords: Least-squares support vector regression machine (LS-SVR) Multiple task learning (MTL) Multi-output LS-SVR (MLS-SVR) Positive definite matrix\n0167-8655/$ - see front matter 2013 Published by\u2026"]} +{"5776631|11608263": ["Overviews of multi-label classification are given in [65,14,67]."]} +{"4551407|456491": ["Moreover, multi-task methods are expected to work better than single-task methods in cases where there is a lack of training data for some of the tasks (Alvarez et al 2011).", "Days with no target values are excluded from the datasets (i.e. days with labels that are beyond the end of the game are excluded).", "A nice review of such methods as well as their relations to regularization-based multi-task approaches can be found in (Alvarez et al 2011)."]} +{"1008003|11608263": ["Note that there have been some nice reviews on multi-label learning techniques [17], [89], [91]."]} +{"53722003|11608263": ["The binary context as used in ECC usually entails considerable redundancy in the learning space, as also noticed in the case of the multi-label binary approach in Yan et al. (2007). Some other methods have also been used in the literature for reducing the complexity of binary relevance problems by taking advantage of label sparsity using compressive sensing techniques (Tai and Lin 2010; Hsu et al.", "The most common problem transformation method is the binary relevance method (BR) (Tsoumakas and Katakis 2007; Godbole and Sarawagi 2004; Zhang and Zhou 2005).", "Here, Label Cardinality (LCARD) is a standard measure of \u201cmulti-labelled-ness\u201d, introduced in Tsoumakas and Katakis (2007). It is simply the average number of labels associated with each example; defined for N examples as:"]} diff --git a/edge/graph_9236463.jsonl b/edge/graph_9236463.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9240891.jsonl b/edge/graph_9240891.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_924526.jsonl b/edge/graph_924526.jsonl similarity index 100% rename from graph_924526.jsonl rename to edge/graph_924526.jsonl diff --git a/edge/graph_9247098.jsonl b/edge/graph_9247098.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73d45dc924284d64a742dd34b6989965836cf46a --- /dev/null +++ b/edge/graph_9247098.jsonl @@ -0,0 +1,5 @@ +{"1480586|8575576": []} +{"559107|192934": ["Another advantage is the alleviation of the curse of dimensionality of texture features [32], which will decrease the computational time and memory required."]} +{"1929138|2616070": ["mulate an energy term in the form of a negative logarithm [36] Fig."]} +{"10186071|8953108": ["Several approaches have been presented in the literature, and a survey on image thresholding methods can be found in [31]."]} +{"10035420|8575576": ["OR quantitative analysis of histopathological images, such as grading systems of lymphoma diseases, quantification of features is usually carried out on single cells before categorizing them by classification algorithms [ 1 ].", "To overcome these problems, computerized image analysis techniques are introduced to automate the cell analysis in histopathological images [ 1 ]."]} diff --git a/edge/graph_9252802.jsonl b/edge/graph_9252802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_925507.jsonl b/edge/graph_925507.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9256974.jsonl b/edge/graph_9256974.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35278d53d1eb1ade73697f4d27f25cc4c5cabe47 --- /dev/null +++ b/edge/graph_9256974.jsonl @@ -0,0 +1,3 @@ +{"7311180|7439310": ["Clearly, error concealment techniques can be applied to improve the reconstruction quality, by essentially interpolating the missing blocks from surrounding received blocks [17]."]} +{"13119966|387610": ["1070-9908/04$20.00 \u00a9 2004 IEEE\ncompatibility with the standard JPEG2000 decoder in case of single description reception."]} +{"5101683|7439310": ["However, the coded images have fragile visual quality when transmitted across an unreliable link because erroneous data usually causes severe error propagation [ 3 ]."]} diff --git a/graph_925984.jsonl b/edge/graph_925984.jsonl similarity index 100% rename from graph_925984.jsonl rename to edge/graph_925984.jsonl diff --git a/edge/graph_926166.jsonl b/edge/graph_926166.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_926226.jsonl b/edge/graph_926226.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9266071.jsonl b/edge/graph_9266071.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b090c683a192dfbac248d81c8698f63697a28534 --- /dev/null +++ b/edge/graph_9266071.jsonl @@ -0,0 +1 @@ +{"29491192|8125630": []} diff --git a/edge/graph_9268537.jsonl b/edge/graph_9268537.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9270553.jsonl b/edge/graph_9270553.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9270762.jsonl b/edge/graph_9270762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9280644.jsonl b/edge/graph_9280644.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ddc41c7c57a664adfc90f3b6a606ca9c24acc8b --- /dev/null +++ b/edge/graph_9280644.jsonl @@ -0,0 +1,26 @@ +{"7988320|6539555": []} +{"5091414|1230643": ["A Wireless Sensor Network (WSN) [ 1 ] is a collection of tiny devices capable of sensing, computation and wireless communication operating in a certain environment to monitor and control events of interest in a distributed manner and collectively react to critical situations."]} +{"37845804|7988320": ["Communications Magazine, IEEE, 2005, 43(3): S22-S26.", "Based on the path loss given in (2), the onbody channel gain of a signal link in WBAN i can be expressed as (3) For off-body channel, the channel model proposed in [10] is employed."]} +{"7919757|6670217": ["Surveys on solutions to increase WBAN reliability, security and availability is given in [8] and [9]."]} +{"7919757|7988320": ["Finally, particular emphasis is given in [21], [22] to routing protocols and cross-layer approach to improve the performance."]} +{"7919757|1197261": ["WBANs cannot only detect fatal events and anomalies, they can also improve the life style of hearing and visually impaired people by means of earing aid, cochlear implant and artificial retina, respectively [44]\u2013[46]."]} +{"7919757|6539555": ["As one of the most critical aspects to be considered when dealing with WBANs for medical applications, authors in [10], [11] and [24] stress the importance of designing energy-efficient MAC protocols to enhance devices battery-life keeping their size as smaller as possible.", "As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|2220294": ["As for the surveys on applications, a special emphasis on medical ones and healthcare is given in [10]\u2013[13], with [14] specifically focusing on cardiac patients monitoring."]} +{"7919757|12060835": ["A survey on duty cycle mechanisms to keep the energy consumption low in wireless sensor network is given in [25], while [26] is a survey on energy harvesting techniques that can be also applied in WBAN using the human body as source of energy."]} +{"6704714|7854020": ["6 Working Group was formed to develop a dedicated wireless standard for BSNs [2]."]} +{"26611271|20905429": ["In particular, thanks to the rapid growth of low power, wireless, and miniaturized technologies, the Wireless Body Sensor Networks (WBSNs) [1] are emerging as one of the most suitable systems for supporting a broad range of applications aiming at improving the quality of life of human beings by enabling non-invasive, low-cost monitoring of assisted livings."]} +{"42759986|20905429": []} +{"3835757|17410801": ["[96], have provided a detailed comparison amongst the routing protocols proposed thus far for WBANs."]} +{"3835757|7988320": ["However, in order to prevent ambushes, a secure communication channel should exist among the soldiers [16].", "Due to the aforementioned issues and specific WBANs challenges, the routing protocols designed for MANETs and WSNs are not applicable to WBANs [16].", "Also, in order to minimize interference and avoid tissue heating, the transmission power of nodes needs to be extremely low [16]."]} +{"3835757|7854020": ["The beacons are normally sent in each beacon period unless prohibited by regulations in the MICS band or inactive superframes [10].", "WBANs have a huge potential to revolutionize the future of health care monitoring by diagnosing many life threatening diseases and providing real time patient monitoring [10].", "The SFD and preamble are specified data patterns.", "In multicast communication a Group Temporal Key (GTK) is generated that is shared with its corresponding group [10].", "The\nSFD sequence is only transmitted once, whereas the preamble sequence is sent four times to assure packet synchronization.", "The PSDU, which is the last component of PPDU contains a MAC header, a MAC frame body and a Frame Check Sequence (FCS) [10].", "It consists of two subfields: the first subfield is a preamble that is intended for packet detection, timing synchronization, and frequency offset recovery; and the second subfield is the SFD shown in Fig.", "The structure of the Physical Protocol Data Unit (PPDU) is composed of the PLCP preamble, Start Frame Delimiter (SFD), PLCP Header, and PHY Payload (PSDU) as shown in Fig.", "14, wireless networks can be categorized based on their geographical coverage [10].", "It then detects the start of the frame using the SFD [10].", "The SFD sequence is also created by using a 64-bit gold code generator that is spread using an FSC.", "The IEEE 802 working group had a number of success stories in the realization of the international standardization for WBANs [10].", "HBC PHY provides the Electrostatic Field Communication (EFC) requirements that covers modulation, preamble/Start Frame Delimiter (SFD) and packet structure.", "4882 Mbps for the mandatory channel [10].", "1 use the ISM band, there is a high probability for interference [10].", "on-body/in-body nodes for various medical and non-medical applications [10]."]} +{"3835757|6539555": ["TABLE II CHARACTERISTICS OF IN/ON-BODY APPLICATIONS [15]", "TABLE VII ELECTRICAL PROPERTIES OF THE HUMAN BODY [15]"]} +{"3835757|1762301": ["Numerous routing protocols have been designed for Adhoc networks [74] and WSNs [75]."]} +{"16542974|7988320": ["IMPLANT devices are used in many biomedical and clinical applications where the continuous monitoring of a human body biological parameter is crucial [1]."]} +{"45911264|10817088": ["The accelerating demand on healthcare services and the exponential cost associated with medical interventions call for innovative solutions for remote health monitoring such as WBANs [7, 22, 39, 51]."]} +{"45911264|10206347": []} +{"45911264|30383344": ["able sensors), on-body (wearable sensors [22]), or surrounding the body for behavioral recognition [60]."]} +{"45911264|7988320": ["Similar to [100] the authors surveyed the \ufb01rst three layers of the protocol stack, discussed cross layer, QoS, and security issues.", "Due to its importance and complication, security in WBAN must be addressed at different layers and levels [100], i.e. MAC, physical, and network layers.", "Ullah et al. [100] reviewed WBAN architecture, topology, and studied the proposed technologies for WBANs at physical, MAC, and network layers and analyzed the behavior of these layers.", "These nodes are distributed either on the human body (i.e. wearable sensor nodes) or implanted inside the body and they are under the control of a coordinator node [100].", "There is a consensus among researchers that there are differences between wireless sensor network (WSNs) and WBANs [18, 55, 60, 61, 100].", "This section brie\ufb02y reviews WBANs architecture and applications, other detailed review on the matter are available in the literature [18, 55, 60, 61, 100].", "Therefore, researchers agreed that 2.4 GHz band is the most attractive spectrum to be used in medical applications in addition to their ability to protect adjacent channel interference [100].", "However, some of the bands are not suitable for WBANs applications as they cannot support video or voice transmission (e.g., HBC) or are only eligible to be used by authorized users (e.g., UWB) [100].", "Security and military applications [80, 100] are also covered by WBAN, especially for battle\ufb01eld surveillance where sensors are deployed in the soldiers uniform to track their ambulation, monitor their health, and detect the presence of toxic materials.", "The Wireless Body Area Networks (WBANs) come to provide an ef\ufb01cient paradigm for e-health and telemedicine applications and requirements [54, 61, 100]."]} +{"45911264|28210515": ["Further, [113] surveyed the studies of coexistence between IEEE 802.11 and IEEE 802.15.4-based networks."]} +{"45911264|7854020": ["This is due to the fact that the low-power WiFi have not modi\ufb01ed the parameters used in the original operation of CSMA/CA mechanism.", "6 WBAN is formed by customizing the node\u2019s module in OPNET according to the specifications described in [59].", "The third mode is non-beacon mode, without superframe boundaries, where the network employs the ordinary CSMA/CA mechanism for medium access, which is the one considered in this analysis.", "This is due to the fact that offset yields time spacing while using the opportunistic contention-based access technique, i.e. CSMA/CA, at the same time.", "Accordingly, only the unslotted CSMA/CA MAC mechanism is considered in the analysis.", "AIIA introduced a new superframe structure which contains two periods: contention-based period during which CSMA/CA is used, and scheduled period during which TDMA is used.", "This is expected since the WBAN nodes are using CSMA/CA [59] in their MAC layer.", "For the medium access we consider the Distributed Coordination Function (DCF) MAC operation that uses CSMA/CA mechanism.", "AIIA tries to reduce mutual interference between WBANs using a hybrid MAC approach that utilizes both Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) mechanism and TDMA.", "On the other hand, the WBAN may be surrounded with other wireless technologies that operate at the same band, using higher transmission energy, different MAC protocols (possibly withoutCSMA/CA),andcoexistwithintheinterferencerange of the WBAN.", "In the unslotted CSMA/CA protocol each node maintains two variables: a backoff exponent (BE) and a counter of the number of occurred backoffs (NB).", "For the MAC layer, IEEE 802.15.6 divides the operation time into superframes which is similar to the slotted CSMA/CA operation in Zigbee."]} +{"62646787|6539555": []} +{"62646787|1230643": ["Although many protocols and algorithms have been proposed for traditional Wireless Sensor Networks (WSNs) [2], they are not well suited to the unique features and application requirements of WBANs."]} diff --git a/edge/graph_9283615.jsonl b/edge/graph_9283615.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ed30eb913c72434cdd4fb22d94acef93df15f2a --- /dev/null +++ b/edge/graph_9283615.jsonl @@ -0,0 +1 @@ +{"12301667|8520489": ["See the survey of Christensen [2003] and the references therein for an in-depth discussion. Much of the global illumination literature treats the measurement functionals as \u201cimportance.\u201d The adjoint solutions that correspond to the measurement functionals are seldom computed explicitly; rather, most techniques compute the inner products that determine the values of the measurements on a particular lighting solution. Explicit computation of importance solutions is employed in some finite element methods for driving the refinement of transport interactions for regions that are important to the final image [Smits et al. 1992; Christensen et al. 1996], and in some particle tracing methods for guiding the storage and reflection of photons, for example, Peter and Pietrek [1998]. However, the importance solution is in both cases a mere byproduct. In contrast, we will be interested in explicitly computing and storing the adjoint solutions, because knowledge of the adjoint solution allows the computation of the values of measurements with changing illumination (see Equation (7)). Interestingly, the bidirectional radiosity technique of Dutr\u00e9 et al. [1996] computes explicit importance solutions for individial surface patches in the radiosity setting, but the authors do not use them for relighting purposes.", "1994; Sillion 1995]) and the glossy wavelet methods of Christensen et al. [1996, 1997] compute illumination solutions by representing the single-bounce light transport operator as a collection of transport links between hierarchical basis functions,5 and refining these interactions between parts of the scene in a top-down manner only to the level deemed necessary by an oracle function. In the context of wavelets, this means that many entries of the transport matrix will be close to zero. The aim of hierarchical top-down refinement is not to compute insignificant entries of the transport matrix in the first place. The solution of the global illumination problem proceeds by iterating between solving for the equilibrium lighting solution described by the current approximation of the transport operator, and refining the hierarchical representation of the operator according to where significant energy transfers were made. Recently, Kontkanen et al. [2006] presented a precomputed transport algorithm that extends this hierarchical machinery for actually computing a hierarchical representation of the solution operator of the illumination problem.", "See the survey of Christensen [2003] and the references therein for an in-depth discussion.", "1993; Christensen et al. 1996]. The key difference is that the previous techniques use a hierarchical representation of the single-bounce transport operator in an iterative solution scheme with a known emission function, whereas Kontkanen et al. use similar mathematical machinery for precomputing the whole operator. This technique is a special case of our framework in that the emission space E = X, that is, the input to the operator is defined on the same space as the solution. This implies V = I. Note however, that the emission basis can still chosen to be different than the basis on Xh . Furthermore, direct illumination is subtracted from the solution. In terms of our framework, this can be modeled by altering the solution operator Si by subtracting the identity. Lehtinen et al. [2007] describe a similar technique, but unlike Kontkanen et al. [2006], they do not utilize wavelets but define the hierarchical basis through a scattered data approximation procedure instead. Green et al. [2006] describe a precomputed transport technique for distant illumination that is based on direct evaluation of the adjoint solutions that correspond to point measurements of the glossy component of the final reflection.", "1993; Sillion 1995; Christensen et al. 1996; Willmott et al. 1999]. To date, almost no precomputed light transport techniques have utilized comparable machinery for precomputation of the transport operators, with the exception of the direct-to-indirect transport methods of Kontkanen et al. [2006], Ha\u0161an et al. [2006], and Lehtinen et al. [2007]. The further adaptation of such methods for precomputed transport scenarios is a potential source of added efficiency in the precomputation phase (see Section 4.", "1993; Christensen et al. 1996]. The key difference is that the previous techniques use a hierarchical representation of the single-bounce transport operator in an iterative solution scheme with a known emission function, whereas Kontkanen et al. use similar mathematical machinery for precomputing the whole operator. This technique is a special case of our framework in that the emission space E = X, that is, the input to the operator is defined on the same space as the solution. This implies V = I. Note however, that the emission basis can still chosen to be different than the basis on Xh . Furthermore, direct illumination is subtracted from the solution. In terms of our framework, this can be modeled by altering the solution operator Si by subtracting the identity. Lehtinen et al. [2007] describe a similar technique, but unlike Kontkanen et al.", "See the survey of Christensen [2003] and the references therein for an in-depth discussion. Much of the global illumination literature treats the measurement functionals as \u201cimportance.\u201d The adjoint solutions that correspond to the measurement functionals are seldom computed explicitly; rather, most techniques compute the inner products that determine the values of the measurements on a particular lighting solution. Explicit computation of importance solutions is employed in some finite element methods for driving the refinement of transport interactions for regions that are important to the final image [Smits et al. 1992; Christensen et al. 1996], and in some particle tracing methods for guiding the storage and reflection of photons, for example, Peter and Pietrek [1998]. However, the importance solution is in both cases a mere byproduct.", "1993; Sillion 1995; Christensen et al. 1996; Willmott et al. 1999]. To date, almost no precomputed light transport techniques have utilized comparable machinery for precomputation of the transport operators, with the exception of the direct-to-indirect transport methods of Kontkanen et al. [2006], Ha\u0161an et al. [2006], and Lehtinen et al.", "1993; Christensen et al. 1996]. The key difference is that the previous techniques use a hierarchical representation of the single-bounce transport operator in an iterative solution scheme with a known emission function, whereas Kontkanen et al. use similar mathematical machinery for precomputing the whole operator. This technique is a special case of our framework in that the emission space E = X, that is, the input to the operator is defined on the same space as the solution. This implies V = I. Note however, that the emission basis can still chosen to be different than the basis on Xh . Furthermore, direct illumination is subtracted from the solution. In terms of our framework, this can be modeled by altering the solution operator Si by subtracting the identity. Lehtinen et al. [2007] describe a similar technique, but unlike Kontkanen et al. [2006], they do not utilize wavelets but define the hierarchical basis through a scattered data approximation procedure instead."]} diff --git a/edge/graph_9285984.jsonl b/edge/graph_9285984.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9286448.jsonl b/edge/graph_9286448.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..988785a144597cb7d87a6ef8548050b3f94dac17 --- /dev/null +++ b/edge/graph_9286448.jsonl @@ -0,0 +1 @@ +{"110630454|6327434": []} diff --git a/edge/graph_9295132.jsonl b/edge/graph_9295132.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_92990762.jsonl b/edge/graph_92990762.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e9161b6bcbfae9e3eab026d3370e1239b48d52c --- /dev/null +++ b/edge/graph_92990762.jsonl @@ -0,0 +1,2 @@ +{"4173387|393948": []} +{"31976962|3540699": []} diff --git a/edge/graph_92993247.jsonl b/edge/graph_92993247.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_92998157.jsonl b/edge/graph_92998157.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6027aaa1b530aa0a82778cbd57a7bd97bbb8a6c3 --- /dev/null +++ b/edge/graph_92998157.jsonl @@ -0,0 +1,7 @@ +{"13108095|17787193": ["These techniques were originally proposed in the context of cellular networks such as 3G/4G LTE, to use complementary wireless communications such as WiFi to access the Internet [25]."]} +{"19552313|10299098": ["The choice of the right service model is application and environment-depending, and may also depend on the level of context-awareness of the involved devices [33].", "nodes is a still challenging research issue [33]\u2013[35].", "Under this perspective, the FC paradigm differs from the related Mobile Edge Computing (MEC) one [7], [8], [33], [34], in which only edge nodes are employed for the device augmentation."]} +{"19552313|32360363": ["The final goal is the \u2018\u2018smart\u2019\u2019 management of the overall city asset [98]."]} +{"19552313|3330461": ["However, due to the multi-hop nature of the Internet backbone and the short-range capability of the network technologies currently envisioned for the support of inter-device communication [25], [26], guaranteeing reliable network connections is a challenging task in the envisioned IoE realm [27], [28].", "However, these (positive) attributes are counterbalanced by the fact that: (i) FNs are small-size data centers with reduced fault-tolerance capability; and (ii) the Device-Fog communication typically relies on short-range WiFi/UWB/\nVOLUME 5, 2017 9887\nBluetooth-based connections that are intermittent, interferenceaffected and failure-prone [58]\u2013[60].", "11/15 transmission technologies, like WiFi, UWB and Bluetooth [25], [126].", "However, in this case, the resulting perconnection round-trip-time RTT becomes quite sensitive on the corresponding (generally, time-varying) inter-vehicle distance d (m) and tends to scale up/down proportionally to it, that is [25], [137], [135]:", "Since the IoE devices could be randomly distributed over the SG, it is expected that theNetwork layer relies on short/mediumrange wireless transmission technologies, like WiFi, UWB and/or Bluetooth [26];\n(iii) the Fog layer is responsible for the management of the massive volume of metered data.", "However, we note that [25]: (i) due to fading and path-loss, the energy consumption of D2D links increases with the inter-thing distance in an (at least) cubic way; (ii) due to thing mobility, D2D mobile links are intermittent, and their average failure rates typically increase with the average thing speeds [131]; and, (iii) under the D2D model, the initiator thing needs, at first, to discover proximate things, and, then, must perform task distribution, thing synchronization and task retrieval.", "For this purpose, the cooperating devices build up D2D links, that typically rely on short-range wireless communication technology, like UWB, WiFi or Bluetooth [25], [26].", "9 will rely on short/medium-range wireless networking technologies, like WiFi, UWB and/or Bluetooth [26]; (iii) thank to the virtualization of the underlying manufacturing things, it is expected that the Fog layer of Fig.", "It operates under the same vehicular scenario previously described for the V-FoE test-bed, but, according to [25], [137], it utilizes only \u201cad-hoc\u201d D2D IEEE802.", "For this purpose, the cooperating devices build up D2D links, that typically rely on shortrange wireless communication technology, like UWB, WiFi or Bluetooth [25], [26]."]} +{"19552313|18037424": ["The underlying networking infrastructure acts as glue: it allows the SG to perform remote metering by (possibly) exploiting the support of smart Energy Storage Devices [95], [96]."]} +{"22104710|16654832": ["According to the literature, meeting huge computation demands is challenging because individual vehicles have limited computing resources [25]."]} +{"2825553|3330461": ["As shown in [13] and references therein, protocols based on D2D methods have the potential to improve the spectral efficiency as well as the resource utilization for infrastructure-communication schemes, like cellular and WiFi."]} diff --git a/edge/graph_93000954.jsonl b/edge/graph_93000954.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7928a36d503e5da84bd97a4c80c92e8236d7ec6 --- /dev/null +++ b/edge/graph_93000954.jsonl @@ -0,0 +1,6 @@ +{"37997496|12269716": []} +{"16739586|12269716": ["LTSmin already supported the languages mCRL2 [11], DiVinE [3], and Spin \u2019s Promela [26] (through SpinS [4]).", "At the same time, the LTSmin yes yes yes yes yes yes yes any ( Pins ) mCRL2 [11] no no no yes no no yes fixed CADP [22] no yes no yes* no no yes any ( Open/C ) DiVinE [3] yes yes no no yes yes no any (CESMI) Spin yes yes no no yes yes no fixed NuSMV [9] no no yes no yes no no fixed * CADP supports\u2026"]} +{"92997094|93000954": ["The VerifyThis program verification is held in 2019 for the 8 time; earlier editions were held at FoVeOOS 2011 [6], FM 2012 [15,20], Dagstuhl (April 2014) [4], and ETAPS 2015\u20132018 [21,18,16,17], the next event takes place as part of TOOLympics at ETAPS 2019 [2].", "What we would like to emphasise up-front is that VerifyThis is different from most other competitions of formal method tools at TOOLympics(6) at ETAPS 2019, see the TOOLympics proceedings [2] (this volume) for more details on each of them."]} +{"92997094|12269716": ["CBMC [27] 1 CIVL [32] 3 F:1 Dafny [28] 12 ESC/Java [8] 1 F* [34] 1 Frama-C [24] 2 Isabelle [30] 1 O:1 jStar [10] 1 KeY [1] 7 KIV [11] 5 S:3 mCRL2 [9] 2 F:1 MoCHi [26] 1 PAT [33] 1 Spark/Ada/GNATprove [14] 1 F:1 VCC [7] 1 VerCors [5] 5 VeriFast [22] 4 O:2 Viper [29] 2 F:1 Why3 [12] 9 O:2, S:4, F:1", "We have also had several tools used in the competition that fall outside of this classification, such as the bounded model checkers CIVL [32] and CMBC [27], the model checker mCRL2 [9], the interactive theorem prover Isabelle [30], and the termination prover AProVE [13]."]} +{"92997778|93000954": ["This year, SV-COMP is part of TOOLympics [6]."]} +{"11548917|17292349": ["Surveys provide an overview of different test techniques [1] and a detailed web site is available that provides an overview over tools and techniques 6."]} diff --git a/edge/graph_93001387.jsonl b/edge/graph_93001387.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0e7cf647b78f119f39aa12907965c148da631e32 --- /dev/null +++ b/edge/graph_93001387.jsonl @@ -0,0 +1,25 @@ +{"14666667|15170341": ["Objective tests can follow psychophysical approaches and engineering approaches, a detailed description of which is found in [5].", "Metrics can be classified according to the following scheme [5]: Full reference (FR) metrics: Both reference and outcome are available, and allow for detailed subjective and objective comparisons of images, videos, download times (on the application level), packet traces (on the network level), and\u2026", "For instance, QoE on the application level can be described by the hybrid image quality metric (HIQM) [5], and QoS on the network level can be represented by throughput variations and losses [4]."]} +{"32118915|3834736": []} +{"32118915|399542": []} +{"52304629|11381680": ["Moreover, web-based crowdsourcing frameworks, such as Quadrant of Euphoria [21], [22], crowdMOS [34] and QualityCrowd [35], represent a conceptual approach to develop subjective experiments that can be conducted in a web browser [36]."]} +{"52304629|399542": ["Crowdsourcing is an increasingly popular approach for generic subjective QoE assessment methodology [31]\u2013[33].", "The model correlates QoS parameters directly withQoE perceptions by adopting appropriate datamodels such as discriminant analysis approach based on statistics [19], [31], regression analysis [74]\u2013[76], support vector machine [77]\u2013[79], decision tree [20], [78], [80] and rough set [81]."]} +{"52304629|6581557": ["The most widely used FR approaches are Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR) [41], [42], Structural Similarity Index (SSIM) [29], [46]\u2013[48] and Video Quality Metric (VQM) [37], [54].", "The predefined collection context affects the most suitable QoE assessment approach such as FR, RR, NR, and the selection influences the assessment accuracy [37].", "Because VQM has a good correlation with subjective feedback from observers [55], [56], the approach is adopted by the American National Standards Institute as a national standard.", "When gathering information to assess the QoE level, there are three different questions to be answered: (1) Which information should be collected? (2)Where should the information be collected? and (3) How should the collection be performed? [37].", "\u2022 Video Quality Metric (VQM) [37], [54] provides standardized and non-standardized approaches to measure\nVOLUME 6, 2018 48381\nthe perceived video quality by taking into account structural and temporal aspects.", "[55] M. Narwaria, M. P. D. Silva, and P. L. Callet, \u2018\u2018HDR-VQM: An objective quality measure for high dynamic range video,\u2019\u2019 Signal Process., Image Commun., vol. 35, pp. 46\u201360, Jul. 2015 [56] M. Wichtlhuber, G. Wicklein, S. Wilk, W. Effelsberg, and D. Hausheer, \u2018\u2018RT-VQM: Real-time video quality assessment for adaptive video streaming using GPUs,\u2019\u2019 in Proc.", "The implementation of VQM includes three steps: perception-based features extraction, video quality parameters computation (seven in total) and the combination of these parameters to finish the overall model.", "\u2022 Video Quality Metric (VQM) [37], [54] provides standardized and non-standardized approaches to measure"]} +{"70324764|7972041": []} +{"70324764|38911919": []} +{"25575499|5122855": ["[11] summarized the ongoing research topics on QoE-aware HTTP Adaptive Streaming (HAS) where they con-"]} +{"25575499|2261490": ["Barakovi\u0107 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors.", "Barakovic\u0301 and Skorin-Kapov [18] reviewed the QoE assessment and management approaches over wireless networks using system, context and human factors."]} +{"25575499|64404": [", I, P and B frames [53]) on QoE were studied in [54] with different video contents."]} +{"16630618|763939": []} +{"1530631|763939": ["Lane changing No Support MOBIL [90] Supports"]} +{"62116074|763939": ["The main building blocks in designing a mobility model are: visualisation tool, output, platform and a class which GTNets (Georgia Tech Network Simulator) [35] and so on are some of the network simulators used for MANET simulation.", "The mobility model [35] is a model or a set of rules for designing random network topologies by using simulators.", "Tables 3 \u2013 5 are adapted from [35]."]} +{"31851714|6581557": ["E.g., Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The VQM was an improvement over the PSNR and SSIM as it also considered blurring, global noise, and color distortions.", "Traditionally, the quality of video playback for television and broadcasting media services and networked media was measured by using metrics such as Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39].", "The PSNR is computed by calculating the Mean Square Error (MSE) in each pixel, represented in dB by comparing both the original and received frames.", "SSIM extended PSNR to include the effects of luminance, contrast, and structural similarity of the frames.", ", Peak Signal to Noise Ratio (PSNR) [39], Structural Similarity (SSIM) [40], and Video Quality Metric (VQM) [39]."]} +{"31851714|15170341": []} +{"3782888|36280489": ["While this is first survey paper of its kind that primarily focuses on the cooperativeness in vehicular networks, there do exist a number of survey papers that cover cooperative networking [10], [26]\u2013[28] or vehicular communication [29]\u2013[40] in general."]} +{"3782888|3834736": []} +{"3782888|10329355": ["While this is first survey paper of its kind that primarily focuses on the cooperativeness in vehicular networks, there do exist a number of survey papers that cover cooperative networking [10], [26]\u2013[28] or vehicular communication [29]\u2013[40] in general."]} +{"3782888|7434318": []} +{"3782888|2335874": []} +{"3782888|763939": []} +{"399542|10559330": ["Different mechanisms and solutions can be used to form the QoS at the Network Layer, such as, Differentiated Services (DiffServ) [5], Integrated Services [6] and Multi-Protocol Label Switching (MPLS) [7]."]} +{"96447448|64404": []} +{"15343373|1299833": ["Due to frequent disruptions in the routes, traditional transport layer protocols from MANETs [134], [190], [191], [192] are not directly applicable to VANETs."]} diff --git a/edge/graph_93002924.jsonl b/edge/graph_93002924.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78a808a2bb05128a4d580a5e94ff376f91d08aca --- /dev/null +++ b/edge/graph_93002924.jsonl @@ -0,0 +1,3 @@ +{"31914690|1722293": ["Contact Methods: Ballistocardiography (BCG) measures the reactionary forces of the body in response to cardiac ejection of blood into the aorta [99]\u2013[101]."]} +{"67687245|1902238": ["For a recent review of cardiac segmentation methods we refer to [449].", "For a recent review of cardiac segmentation methods we refer to Petitjean and Dacher (2011)."]} +{"8803398|1902238": ["[158]) but the most advanced approach for the automation of this"]} diff --git a/edge/graph_93003596.jsonl b/edge/graph_93003596.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9307657.jsonl b/edge/graph_9307657.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbb78bf54dfb03a0d501a3fab915e3f39dd48d33 --- /dev/null +++ b/edge/graph_9307657.jsonl @@ -0,0 +1,5 @@ +{"22342468|14545307": []} +{"13266737|33286487": ["More generally, the whole class of time-frequency energy distributions has been fully described by Cohen [COH66], [ COH89 ]: they can all be seen as smoothed (or, more precisely, correlated) versions of the Wigner-Ville distribution."]} +{"2369379|14545307": []} +{"2233231|14545307": []} +{"28962030|14545307": []} diff --git a/edge/graph_9312862.jsonl b/edge/graph_9312862.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9315938.jsonl b/edge/graph_9315938.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06eddb9277bb9875050991fe0f5d0e9fa28cbf12 --- /dev/null +++ b/edge/graph_9315938.jsonl @@ -0,0 +1,2 @@ +{"378314|9315938": ["This idea already affected various branches of evolutionary algorithms such as probabilistic model-building genetic algorithms (PMBGAs) [7,8], also called estimation-of-distribution algorithms (EDAs), and topological linkage-based genetic algorithms (TLBGAs) [9]."]} +{"6861023|9315938": ["They are classified into three models: static linkage model, adaptive linkage model, and evolvable linkage model [10].", "In general, multi-dimensional representations are more advantageous than simple one-dimensional representations for highly epistatic problems [10].", "Particularly, the linkage determined by the relative positions of genes in the chromosome is called topological linkage [10]."]} diff --git a/edge/graph_9316331.jsonl b/edge/graph_9316331.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..86c5f6173677662b363e412e871e3d2702a0f027 --- /dev/null +++ b/edge/graph_9316331.jsonl @@ -0,0 +1,6 @@ +{"22187275|1708582": ["However, the offline training is needed to bootstrap the learning process by letting the agent play against itself (selflearning) [7] or other pre-programmed [8] agents which is also restricted by the domain knowledge of the game developers [9]."]} +{"11466358|1859397": ["Kakuro, also known as Cross Sums is a popular NP-complete puzzle [5]."]} +{"13244060|1859397": ["1 Although it is somewhat arbitrary, we will call these one-player games with perfect information for the sake of brevity puzzles [16].", "The traditional approaches to puzzles [16] are applying A* [14] or IDA* [19]."]} +{"13690271|1859397": []} +{"207609497|1708582": ["In this paper we show that simple variants of the popular \"-greedy and Boltzmann heuristics (see [11] [16] for a review of heuristics for the bandit problem ) achieve a regret of the form a + b log T + c log 2 T for all T (where a, b, and c are positive constants) when a lower bound on the\u2026"]} +{"1804716|1859397": ["SameGame is an NP-complete puzzle [Kendall et al., 2008].", "Sudoku is a popular NP-complete puzzle [Kendall et al., 2008] usually played on a 9x9 grid."]} diff --git a/edge/graph_9317928.jsonl b/edge/graph_9317928.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9318802.jsonl b/edge/graph_9318802.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d837db57f2335bd46a3ca60a718cf726fbb52c6a --- /dev/null +++ b/edge/graph_9318802.jsonl @@ -0,0 +1 @@ +{"15645890|33286487": ["The TF dictionary used in this paper is the Gabor dictionary which consists of Gaussian atoms of ), and has shown to offer the best TF localization properties [15].", "Now that MP iteratively selected the collection of TF atoms that accurately model a signal , MP-TFD of the given signal is constructed by summing the TFD of each decomposed TF atom as shown as follows: (3) where is the Wigner\u2013Ville distribution (WVD) [15] of the Gabor atom .", "The work in the area of TFD methods is extensive [12]\u2013[15]."]} diff --git a/edge/graph_9318958.jsonl b/edge/graph_9318958.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9321930.jsonl b/edge/graph_9321930.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f39b5977771454de8fd0b6ac8c0bfd085b673853 --- /dev/null +++ b/edge/graph_9321930.jsonl @@ -0,0 +1,2 @@ +{"11183100|18148591": ["Historically, space-time coding (STC) and space-time block coding (STBC) were initially developed to offer transmit diversity in multiantenna systems [15-16].", "It is now a part of W-CDMA and CDMA-2000 standards [15]."]} +{"14232575|41035405": []} diff --git a/edge/graph_932651.jsonl b/edge/graph_932651.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9335771.jsonl b/edge/graph_9335771.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9338465.jsonl b/edge/graph_9338465.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9340653.jsonl b/edge/graph_9340653.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9340872.jsonl b/edge/graph_9340872.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..250db10d5877c6609ed070d52a6c9d138e1a043e --- /dev/null +++ b/edge/graph_9340872.jsonl @@ -0,0 +1,2 @@ +{"14479894|393948": ["In this paper we employ a transfer learning view, in which the main goal of representation learning is to make subsequent learning fast, i.e. use resulting word embeddings to maximize performance at the lowest sample complexity possible [Bengio et al., 2013, Glorot et al., 2011] 2 ."]} +{"1704893|8372620": ["Feldman et al. [10] distinguish classification algorithms that achieve fairness by modifying the underlying data from those that achieve fairness by modifying the classification algorithm."]} diff --git a/edge/graph_9352272.jsonl b/edge/graph_9352272.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..decbfbdb0ab10cf7c510782b46886ad55fa33e91 --- /dev/null +++ b/edge/graph_9352272.jsonl @@ -0,0 +1,2 @@ +{"37052409|15516254": ["A comprehensive survey of TCP-friendly congestion control protocols can be found in [13]."]} +{"7807765|15516254": ["A survey on TCP-friendly congestion control mechanisms can be referenced in [12] and some further studies on them can be found in [13\u201317]."]} diff --git a/edge/graph_9352595.jsonl b/edge/graph_9352595.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..593b5317dde2d65a65345f9f5813210a8a6fced3 --- /dev/null +++ b/edge/graph_9352595.jsonl @@ -0,0 +1 @@ +{"14811549|28809130": ["The CMA security architecture and the integration with NRL FIM are presented in [8]."]} diff --git a/edge/graph_9367332.jsonl b/edge/graph_9367332.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64595bec2fa6ef06673d8f8b3f2f0a8b96d8e5ba --- /dev/null +++ b/edge/graph_9367332.jsonl @@ -0,0 +1,19 @@ +{"106544360|1230643": ["Sensor Networks face various kinds of issues which normally don\u2019t occur in other sorts of networks [1-4] like power constraints, resource constraints, hardware availability, low communication range, limited processing and storage, cost etc.", "In recent years, tons of new and advanced research has been done and is also picking up in the area of Wireless Sensor Networks [1] and this area is also catching the viral attention of researchers from all parts of the world for developing wide applications and making use of WSN networks in varied fields."]} +{"19799172|1236072": ["Many routing protocols have been specifically designed for the wireless sensor networks where several factors such as energy efficiency, low latency, and success rate are necessary to take into account [2], [4], [5]."]} +{"19799172|1230643": ["Recently, advances in minimization, low-power, low-cost, efficient and multi-functional wireless communication equipment, and improved small-scale energy supplies make a new hi-tech dream achievable: wireless sensor networks [1], [2]."]} +{"19799172|14441987": ["Since the 1970s, wireless networks have been showing huge interest to the computing industry and the research community [3]."]} +{"19799172|1708582": ["However, the Bant uses a reinforcement learning algorithm [18], [19] in order to get a better and more efficient route than the one chosen by the Fant and at the end it updates the routing tables of the reverse-visited sensor nodes."]} +{"14132386|15305793": []} +{"14132386|14122909": []} +{"14132386|1236072": ["Bounded Voronoi Greedy Forwarding [BVGF]: BVGF [24] uses the concept of Voronoi diagram [11] in which the sensors should be aware of their geographical positions.", "WSNs suffer from the limitations of several network resources, for example, energy, bandwidth, central processing unit, and storage [11,13].", "Routing decision in SAR is dependent on three factors: energy resources, QoS on each path, and the priority level of each packet [11, 13, 54].", "The design challenges in sensor networks involve the following main aspects [4,11,13]:"]} +{"14132386|1230643": ["Sequential Assignment Routing (SAR): SAR [53] is one of the first routing protocols for WSNs that introduces the notion of QoS in the routing decisions."]} +{"14132386|14441987": []} +{"205286988|1230643": ["Routing messages from or to moving nodes is more challenging since route stability becomes an important optimization factor, in addition to energy, bandwidth etc.", "Aside from the very few setups that utilize mobile sensors [11], most of the network architectures assume that sensor nodes are stationary.", "Such sensors are generally equipped with data processing and communication capabilities.", "In this section, we will describe these protocols in details and highlight the key ideas."]} +{"37107541|205286988": ["In a WSN, energy efficiency refers to the ratio of the number of data packets received at the sink node by the total consumed energy [ 9 ]."]} +{"37107541|1236072": ["Although some routing schemes for WSNs have been proposed based on the graph theory and the greedy search algorithm in the literature [1, 2 ], the high performance routing is still a research topic.", "With the rapid growth of modern electronic and wireless communication techniques, wireless sensor networks (WSNs) become more and more effective in many fields, such as battlefield surveillance, biological monitor, smart space, intrusion detection and tracking for temperature, object movement, sound and light [1, 2 ,3,4]."]} +{"37107541|1230643": ["For any si ,s j \u2208 V ,i fdij \u2264 r ,a ndsi and sj both are active, that is, si and sj both are working, then there is an undirected edge (si, sj, \u03c8ij(t)) \u2208 E. Here, the weight \u03c8ij(t) \u2208 [0, 1 ] is the cost to deliver a data packet from si to sj at instant t. For any si \u2208 V , the residual energy of si is denoted as ei(t )a t instant t .T raditionally, the set ofsi\u2019s neighbors is defined as follows.", "With the rapid growth of modern electronic and wireless communication techniques, wireless sensor networks (WSNs) become more and more effective in many fields, such as battlefield surveillance, biological monitor, smart space, intrusion detection and tracking for temperature, object movement, sound and light [ 1 ,2,3,4].", "Although some routing schemes for WSNs have been proposed based on the graph theory and the greedy search algorithm in the literature [ 1 ,2], the high performance routing is still a research topic."]} +{"44962334|63137": ["The results presented in this section were obtained in [25,52,67].", "This is done by studying these algorithms under a common algorithmic framework called model-based search (MBS) [67].", "Zlochin et al. [67] have proposed a unifying framework for so-called model-based search (MBS) algorithms.", "The SGA parameter value update that we describe in the following is a generalization of the one that was presented in [67] (which was itself a generalization of the one that was given in [52])."]} +{"318744|14441987": ["wireless mobile ad hoc networks (MANETs) [106].", "In this chapter we are interested in one specific class of wireless mobile networks, the mobile ad hoc networks (MANETs) [106], which during the past few years have become a very active area of research due to their unique characteristics."]} +{"318744|10287248": ["Using a custom simulator, the authors have made a number of simulation experiments to test QColony\u2019s performance versus the previously mentioned ARS, a probing-based reactive algorithm based on selective flooding [18], and QOSPF, which is a reference algorithm in the QoS domain."]} +{"56697121|1137487": []} +{"44761686|1708582": []} diff --git a/edge/graph_9377812.jsonl b/edge/graph_9377812.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9377944.jsonl b/edge/graph_9377944.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_93899.jsonl b/edge/graph_93899.jsonl similarity index 100% rename from graph_93899.jsonl rename to edge/graph_93899.jsonl diff --git a/edge/graph_9395674.jsonl b/edge/graph_9395674.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..067e7a8c9f586f028552e27c28f379cf44d64e2b --- /dev/null +++ b/edge/graph_9395674.jsonl @@ -0,0 +1,5 @@ +{"55948814|14441987": []} +{"126897659|17205659": ["These protocols are such as DSR [14], The secure versions, such as, QoS Guided Route Discovery [15], Securing Quality of Service Route Discovery [16], Ariadne [17] and CONFIDANT [18], AODV [19], CORE [20], SAODV [21], SAR [22], TORA [23], SPREAD [24], and ARAN [25]."]} +{"15132318|14441987": ["In recent years a number of power-aware metrics have been proposed at the network layer (like [2]-[3], [6]-[7],[11][14],[16],[17]).", "Developing routing protocols for MANETs has been an extensive research area in recent years, and many proactive and reactive protocols have been proposed from a variety of perspectives ([3]-[7])."]} +{"16720253|17205659": []} +{"9352420|14441987": ["For a detailed account of some of the representative ad hoc routing protocols proposed, refer [1]."]} diff --git a/graph_940761.jsonl b/edge/graph_940761.jsonl similarity index 100% rename from graph_940761.jsonl rename to edge/graph_940761.jsonl diff --git a/edge/graph_9410318.jsonl b/edge/graph_9410318.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb5498aadb6305c56d47107a32ecdc8af3e63c18 --- /dev/null +++ b/edge/graph_9410318.jsonl @@ -0,0 +1,17 @@ +{"2465022|2835258": []} +{"16217147|2835258": []} +{"60468427|870434": ["Applications of DTNs include large-scale disaster recovery networks, sensor networks for ecological monitoring [36], ocean sensor networks [28, 24], vehicular networks [26, 6], and projects such as TIER [2], Digital Study Hall [15], and One Laptop Per Child [1] to benefit developing nations."]} +{"5659949|14697846": []} +{"16949354|1230643": []} +{"1078542|14441987": ["Numerous routing protocols have been proposed [33]."]} +{"16435081|1236072": ["However, research in routing for wireless sensor networks has extensively investigated this issue [1]."]} +{"16435081|2835258": ["The coordinates can have physical meaning, such as GPS coordinates, as has been studied for mobile adhoc networks [31]."]} +{"16435081|14441987": ["There is a huge body of work on routing protocols [12, 13, 1, 15] and metrics [16, 4, 5] for this environment."]} +{"2892242|870434": ["In underwater acoustic networks [1,26], DTNs are more critical as no \ufb01xed infrastructure exists and less than ten expensive autonomous underwater vehicles may roam an area hundreds of km in diameter carrying acoustics transducers that reach only 2\u20135 km."]} +{"12249432|14441987": ["Most of the work in MANETs, therefore, is targeted at solving the routing problem [9], [10], [13], [6], [15], [14]."]} +{"10974214|14441987": []} +{"15472330|14441987": ["One research area that has received much attention recently and that remedies many of the situations where no infrastructure is available is that of ad hoc networking [14]."]} +{"1174664|1236072": ["However, research in routing for wireless sensor networks has extensively investigated this issue [1]."]} +{"1174664|2835258": ["The coordinates can have physical meaning, such as GPS coordinates, as has been studied for mobile adhoc networks [31]."]} +{"1174664|14441987": ["There is a huge body of work on routing protocols [12, 13, 1, 15] and metrics [16, 4, 5] for this environment."]} +{"6633148|14441987": ["Much of the research on MANETs has focused on routing, introducing various proactive, reactive or hybrid routing protocols that try to find a path from a source to a destination [1],[2],[3],[4],[5],[6].", "Research in the areas of Mobile Ad Hoc Networks (MANETs) [1],[2],[3],[4],[5],[6], disconnected sparse networks [7],[8],[9],[10],[11],[12] and Delay Tolerant Networks (DTNs), [13],[14], has addressed some of these challenges and problems."]} diff --git a/edge/graph_9415965.jsonl b/edge/graph_9415965.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10b3f600a084119288873cfced5f66b5a2269487 --- /dev/null +++ b/edge/graph_9415965.jsonl @@ -0,0 +1,4 @@ +{"8139575|3732796": ["Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org."]} +{"5789620|2877147": ["For interlaced video, we show that the motion between fields of a single frame and across fields of neighboring frames should be equal."]} +{"1054075|9415965": []} +{"1710023|3732796": ["Recent research in digital image and video forensics [19, 25] has shown that the media data has certain characteristics that relate to physical mechanisms and algorithms used in its generation."]} diff --git a/edge/graph_941910.jsonl b/edge/graph_941910.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/edge/graph_9428273.jsonl b/edge/graph_9428273.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..034aa22a2ebbc58c04ae3b9b1e3dca3298a992c6 --- /dev/null +++ b/edge/graph_9428273.jsonl @@ -0,0 +1,10 @@ +{"7228774|14970359": []} +{"7228774|7185733": ["For instance, only a few dozen configurations play a fundamental role in finger spelling, and several researchers have designed classification systems accordingly (see [19] [18] for surveys)."]} +{"2209704|7185733": ["1 Introduction The use of hand gestures has become an important part of human computer interaction in recent years [11]."]} +{"5794231|14970359": []} +{"5794231|7185733": []} +{"3703843|7185733": ["Model-based approach is another alternative for estimating hand articulations [10, 11, 13, 14, 15, 18, 20, 24, 19]."]} +{"37541795|7185733": ["\u2022 estimation of communicative hand poses [1]\u2013[3] \u2022 estimation of manipulative hand poses [4]\u2013[7] The former includes hand-pose recognition systems for sign language and hand-shape recognition systems for virtual reality (VR) interfaces."]} +{"18981266|14970359": ["Some reviews covering human body pose estimation can be found in [30] [31] [32] [33] [34] [35]."]} +{"18981266|7185733": ["Dating back to late 70s [18], the dominant method pursued in the implementation of CV-based interaction has been appearancebased modeling of hand motion [19] [20]."]} +{"18981266|7788290": []} diff --git a/edge/graph_9429730.jsonl b/edge/graph_9429730.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6ca4a6336f1bfb20350f4e37d1d7057ceafd9e8a --- /dev/null +++ b/edge/graph_9429730.jsonl @@ -0,0 +1 @@ +{"10879569|16352922": []} diff --git a/edge/graph_9431428.jsonl b/edge/graph_9431428.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_943159.jsonl b/edge/graph_943159.jsonl similarity index 100% rename from graph_943159.jsonl rename to edge/graph_943159.jsonl diff --git a/edge/graph_9436049.jsonl b/edge/graph_9436049.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b33a2b91b40d40038a71e4b632b7ecaffb56dc5 --- /dev/null +++ b/edge/graph_9436049.jsonl @@ -0,0 +1,6 @@ +{"4269723|2535224": ["At the present, wireless and wired networks uphold diversity and heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional networks.", "\u2026heterogeneity just for devices that have identical network features or protocol which leads to weak Quality of Service and Quality of Experience (Zeng et Al., 2015) It becomes hard for network operators to incorporate most recent technologies due to fixed and rigid nature of conventional\u2026"]} +{"206577001|2623404": ["SDN has the potential to dramatically simplify network management and enable innovation and evolution [57]."]} +{"206577001|10693567": ["This allows network control to become directly programmable via an open interface (e.g., ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "There are two major aspects of SDN that may need to be improved in order to meet the requirements of NFV: the Southbound API (mainly OpenFlow), and controller designs.", "ONF Industry-led consortium forstandardization of OpenFlow SDN Standardizing the OpenFlow protocol and related technologies.", "ONF defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "Therefore, OpenFlow will have to be extended to include layers L5-L7 to be able to support NFV. Basta et al. [66] investigated the current OpenFlow implementation in terms of the basic core operations such as QoS, data classification, tunneling and charging, concluding that there is a need for an enhanced OpenFlow to be able to support some functions in an NFV environment.", "In an implementation of a virtual EPC function [9], [67] extends OpenFlow 1.2 by defining virtual ports to allow encapsulation and to allow flow routing using the GTP Tunnel Endpoint Identifier (TEID).", "We discuss advances in each of these two aspects below.\na) Southbound API: OpenFlow is the de-facto implementation of a southbound API for SDN.", "In the same way, the ONF is standardizing the OpenFlow protocol and related technologies.", "Defines OpenFlow as the first standard communications interface defined between the control and forwarding layers of an SDN architecture.", "5It is worth remarking that OpenFlow is not the only SDN protocol.", "However, before we consider NFV support, even in current SDN environments OpenFlow is by no means a mature solution [64].", "Since OpenFlow targets L2-L4 flow handling, it has no application-layer protocol support and switch-oriented flow control.", ", ForCES [52], OpenFlow [53], etc) and the underlying infrastructure to become simple packet forwarding devices (the data plane) that can be programmed.", "Finally, while OpenFlow assumes a logically centralized controller, which ideally can be physically distributed, most current deployments rely on a single controller."]} +{"10311311|15849973": []} +{"17768602|14697846": ["P2P networks [13, 44] are designed for the direct sharing of computer resources rather than requiring any intermediate and/or central authority."]} +{"206791898|6265393": ["Hua et al. [12], Li and Liu [ 17 ], Ramesh et al. [19], and references therein discuss diverse VOD delivery technologies."]} diff --git a/edge/graph_9436742.jsonl b/edge/graph_9436742.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ada926c8b0a4f9deffab8d6654a3dc7118eeb8d --- /dev/null +++ b/edge/graph_9436742.jsonl @@ -0,0 +1,5 @@ +{"14792209|70923": []} +{"14967570|1582463": ["The use of h artbeats [6] or watchdog timers [69] for software is a reliable complement, because it uses the absence of action t o nfer a failure, rather than waiting for a proactive report f he failure."]} +{"2017544|6952653": []} +{"207171842|8914588": ["2006; Huebscher and McCann 2008].", "point out, trust is not necessarily based on self-adaptive services or its quality [McCann et al. 2006; Huebscher and McCann 2008]."]} +{"207171842|1975139": ["survey several ADLs based on graphs, process algebras, and other formalisms for dynamic software architectures [Bradbury et al. 2004]."]} diff --git a/edge/graph_9436861.jsonl b/edge/graph_9436861.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f197b588685d013d5ce5cb180b0111d025aee701 --- /dev/null +++ b/edge/graph_9436861.jsonl @@ -0,0 +1,2 @@ +{"468726|14583671": []} +{"17779575|13037420": []} diff --git a/edge/graph_9440003.jsonl b/edge/graph_9440003.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/graph_944337.jsonl b/edge/graph_944337.jsonl similarity index 100% rename from graph_944337.jsonl rename to edge/graph_944337.jsonl diff --git a/edge/graph_9450094.jsonl b/edge/graph_9450094.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75b22d8b19051e64c2b0c871632e347e53081c3f --- /dev/null +++ b/edge/graph_9450094.jsonl @@ -0,0 +1,3 @@ +{"9018266|17381415": []} +{"15344629|17381415": ["For the reduction of line current ripple, LCL filters are often used as grid filters [ 2 ]."]} +{"6583534|17381415": ["In the first case, the stability is guaranteed via the control of more system state variables that are measured or estimated [16]\u2013[21]."]} diff --git a/graph_945077.jsonl b/edge/graph_945077.jsonl similarity index 100% rename from graph_945077.jsonl rename to edge/graph_945077.jsonl diff --git a/split_edge/graph_1000416-0.jsonl b/split_edge/graph_1000416-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1000416-3.jsonl b/split_edge/graph_1000416-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1000416-4.jsonl b/split_edge/graph_1000416-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1000416-5.jsonl b/split_edge/graph_1000416-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1000416-6.jsonl b/split_edge/graph_1000416-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1000416-7.jsonl b/split_edge/graph_1000416-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1000416-8.jsonl b/split_edge/graph_1000416-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1000416-9.jsonl b/split_edge/graph_1000416-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10015090-0.jsonl b/split_edge/graph_10015090-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10015090-1.jsonl b/split_edge/graph_10015090-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10015090-10.jsonl b/split_edge/graph_10015090-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10015090-11.jsonl b/split_edge/graph_10015090-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10015090-16.jsonl b/split_edge/graph_10015090-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10015090-17.jsonl b/split_edge/graph_10015090-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10015090-44.jsonl b/split_edge/graph_10015090-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-0.jsonl b/split_edge/graph_10056835-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-1.jsonl b/split_edge/graph_10056835-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-10.jsonl b/split_edge/graph_10056835-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-11.jsonl b/split_edge/graph_10056835-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-12.jsonl b/split_edge/graph_10056835-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-13.jsonl b/split_edge/graph_10056835-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-2.jsonl b/split_edge/graph_10056835-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-3.jsonl b/split_edge/graph_10056835-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-4.jsonl b/split_edge/graph_10056835-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-5.jsonl b/split_edge/graph_10056835-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-6.jsonl b/split_edge/graph_10056835-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-7.jsonl b/split_edge/graph_10056835-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10056835-8.jsonl b/split_edge/graph_10056835-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-0.jsonl b/split_edge/graph_10091442-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-10.jsonl b/split_edge/graph_10091442-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-11.jsonl b/split_edge/graph_10091442-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-12.jsonl b/split_edge/graph_10091442-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-14.jsonl b/split_edge/graph_10091442-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-15.jsonl b/split_edge/graph_10091442-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-16.jsonl b/split_edge/graph_10091442-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-17.jsonl b/split_edge/graph_10091442-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-19.jsonl b/split_edge/graph_10091442-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-2.jsonl b/split_edge/graph_10091442-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-29.jsonl b/split_edge/graph_10091442-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-3.jsonl b/split_edge/graph_10091442-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-4.jsonl b/split_edge/graph_10091442-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-47.jsonl b/split_edge/graph_10091442-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-48.jsonl b/split_edge/graph_10091442-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-49.jsonl b/split_edge/graph_10091442-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-5.jsonl b/split_edge/graph_10091442-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-52.jsonl b/split_edge/graph_10091442-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-53.jsonl b/split_edge/graph_10091442-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-54.jsonl b/split_edge/graph_10091442-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-57.jsonl b/split_edge/graph_10091442-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-59.jsonl b/split_edge/graph_10091442-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-60.jsonl b/split_edge/graph_10091442-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-7.jsonl b/split_edge/graph_10091442-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10091442-9.jsonl b/split_edge/graph_10091442-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-0.jsonl b/split_edge/graph_10148401-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-1.jsonl b/split_edge/graph_10148401-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-10.jsonl b/split_edge/graph_10148401-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-12.jsonl b/split_edge/graph_10148401-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-13.jsonl b/split_edge/graph_10148401-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-14.jsonl b/split_edge/graph_10148401-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-17.jsonl b/split_edge/graph_10148401-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-18.jsonl b/split_edge/graph_10148401-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-2.jsonl b/split_edge/graph_10148401-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-20.jsonl b/split_edge/graph_10148401-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-21.jsonl b/split_edge/graph_10148401-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-22.jsonl b/split_edge/graph_10148401-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-23.jsonl b/split_edge/graph_10148401-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-24.jsonl b/split_edge/graph_10148401-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-26.jsonl b/split_edge/graph_10148401-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-27.jsonl b/split_edge/graph_10148401-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-3.jsonl b/split_edge/graph_10148401-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-30.jsonl b/split_edge/graph_10148401-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-32.jsonl b/split_edge/graph_10148401-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-33.jsonl b/split_edge/graph_10148401-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-34.jsonl b/split_edge/graph_10148401-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-35.jsonl b/split_edge/graph_10148401-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-37.jsonl b/split_edge/graph_10148401-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-38.jsonl b/split_edge/graph_10148401-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-4.jsonl b/split_edge/graph_10148401-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-40.jsonl b/split_edge/graph_10148401-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-41.jsonl b/split_edge/graph_10148401-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-42.jsonl b/split_edge/graph_10148401-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-45.jsonl b/split_edge/graph_10148401-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-46.jsonl b/split_edge/graph_10148401-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-47.jsonl b/split_edge/graph_10148401-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-48.jsonl b/split_edge/graph_10148401-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-5.jsonl b/split_edge/graph_10148401-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-51.jsonl b/split_edge/graph_10148401-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-53.jsonl b/split_edge/graph_10148401-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-6.jsonl b/split_edge/graph_10148401-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10148401-9.jsonl b/split_edge/graph_10148401-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-0.jsonl b/split_edge/graph_10159356-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-10.jsonl b/split_edge/graph_10159356-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-12.jsonl b/split_edge/graph_10159356-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-13.jsonl b/split_edge/graph_10159356-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-14.jsonl b/split_edge/graph_10159356-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-19.jsonl b/split_edge/graph_10159356-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-2.jsonl b/split_edge/graph_10159356-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-23.jsonl b/split_edge/graph_10159356-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-24.jsonl b/split_edge/graph_10159356-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-25.jsonl b/split_edge/graph_10159356-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-3.jsonl b/split_edge/graph_10159356-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-35.jsonl b/split_edge/graph_10159356-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-38.jsonl b/split_edge/graph_10159356-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-39.jsonl b/split_edge/graph_10159356-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-40.jsonl b/split_edge/graph_10159356-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-41.jsonl b/split_edge/graph_10159356-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-5.jsonl b/split_edge/graph_10159356-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-6.jsonl b/split_edge/graph_10159356-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-7.jsonl b/split_edge/graph_10159356-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-8.jsonl b/split_edge/graph_10159356-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10159356-9.jsonl b/split_edge/graph_10159356-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-10.jsonl b/split_edge/graph_10206347-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-11.jsonl b/split_edge/graph_10206347-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-12.jsonl b/split_edge/graph_10206347-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-13.jsonl b/split_edge/graph_10206347-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-14.jsonl b/split_edge/graph_10206347-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-15.jsonl b/split_edge/graph_10206347-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-16.jsonl b/split_edge/graph_10206347-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-18.jsonl b/split_edge/graph_10206347-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-19.jsonl b/split_edge/graph_10206347-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-25.jsonl b/split_edge/graph_10206347-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-26.jsonl b/split_edge/graph_10206347-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-27.jsonl b/split_edge/graph_10206347-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-28.jsonl b/split_edge/graph_10206347-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-3.jsonl b/split_edge/graph_10206347-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-31.jsonl b/split_edge/graph_10206347-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-32.jsonl b/split_edge/graph_10206347-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-33.jsonl b/split_edge/graph_10206347-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-34.jsonl b/split_edge/graph_10206347-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-4.jsonl b/split_edge/graph_10206347-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-5.jsonl b/split_edge/graph_10206347-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-6.jsonl b/split_edge/graph_10206347-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-7.jsonl b/split_edge/graph_10206347-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-8.jsonl b/split_edge/graph_10206347-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10206347-9.jsonl b/split_edge/graph_10206347-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-0.jsonl b/split_edge/graph_102352525-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-1.jsonl b/split_edge/graph_102352525-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-10.jsonl b/split_edge/graph_102352525-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-12.jsonl b/split_edge/graph_102352525-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-13.jsonl b/split_edge/graph_102352525-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-15.jsonl b/split_edge/graph_102352525-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-16.jsonl b/split_edge/graph_102352525-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-17.jsonl b/split_edge/graph_102352525-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-18.jsonl b/split_edge/graph_102352525-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-2.jsonl b/split_edge/graph_102352525-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-3.jsonl b/split_edge/graph_102352525-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-4.jsonl b/split_edge/graph_102352525-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-5.jsonl b/split_edge/graph_102352525-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-6.jsonl b/split_edge/graph_102352525-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-7.jsonl b/split_edge/graph_102352525-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-8.jsonl b/split_edge/graph_102352525-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352525-9.jsonl b/split_edge/graph_102352525-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-1.jsonl b/split_edge/graph_102352575-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-10.jsonl b/split_edge/graph_102352575-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-11.jsonl b/split_edge/graph_102352575-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-12.jsonl b/split_edge/graph_102352575-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-13.jsonl b/split_edge/graph_102352575-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-14.jsonl b/split_edge/graph_102352575-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-15.jsonl b/split_edge/graph_102352575-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-17.jsonl b/split_edge/graph_102352575-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-19.jsonl b/split_edge/graph_102352575-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-2.jsonl b/split_edge/graph_102352575-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-20.jsonl b/split_edge/graph_102352575-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-3.jsonl b/split_edge/graph_102352575-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-4.jsonl b/split_edge/graph_102352575-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-6.jsonl b/split_edge/graph_102352575-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-7.jsonl b/split_edge/graph_102352575-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-8.jsonl b/split_edge/graph_102352575-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_102352575-9.jsonl b/split_edge/graph_102352575-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-14.jsonl b/split_edge/graph_10290908-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-15.jsonl b/split_edge/graph_10290908-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-17.jsonl b/split_edge/graph_10290908-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-18.jsonl b/split_edge/graph_10290908-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-19.jsonl b/split_edge/graph_10290908-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-2.jsonl b/split_edge/graph_10290908-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-20.jsonl b/split_edge/graph_10290908-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-22.jsonl b/split_edge/graph_10290908-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-25.jsonl b/split_edge/graph_10290908-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-26.jsonl b/split_edge/graph_10290908-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-8.jsonl b/split_edge/graph_10290908-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10290908-9.jsonl b/split_edge/graph_10290908-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-1.jsonl b/split_edge/graph_10342730-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-10.jsonl b/split_edge/graph_10342730-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-15.jsonl b/split_edge/graph_10342730-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-19.jsonl b/split_edge/graph_10342730-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-20.jsonl b/split_edge/graph_10342730-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-21.jsonl b/split_edge/graph_10342730-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-24.jsonl b/split_edge/graph_10342730-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-26.jsonl b/split_edge/graph_10342730-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-29.jsonl b/split_edge/graph_10342730-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-3.jsonl b/split_edge/graph_10342730-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-4.jsonl b/split_edge/graph_10342730-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-5.jsonl b/split_edge/graph_10342730-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-7.jsonl b/split_edge/graph_10342730-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10342730-9.jsonl b/split_edge/graph_10342730-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-0.jsonl b/split_edge/graph_10398826-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-1.jsonl b/split_edge/graph_10398826-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-10.jsonl b/split_edge/graph_10398826-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-11.jsonl b/split_edge/graph_10398826-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-12.jsonl b/split_edge/graph_10398826-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-5.jsonl b/split_edge/graph_10398826-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-6.jsonl b/split_edge/graph_10398826-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-8.jsonl b/split_edge/graph_10398826-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10398826-9.jsonl b/split_edge/graph_10398826-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10437489-0.jsonl b/split_edge/graph_10437489-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10437489-1.jsonl b/split_edge/graph_10437489-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10437489-2.jsonl b/split_edge/graph_10437489-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10437489-3.jsonl b/split_edge/graph_10437489-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10437489-4.jsonl b/split_edge/graph_10437489-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10437489-5.jsonl b/split_edge/graph_10437489-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-0.jsonl b/split_edge/graph_10464056-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-1.jsonl b/split_edge/graph_10464056-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-10.jsonl b/split_edge/graph_10464056-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-11.jsonl b/split_edge/graph_10464056-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-15.jsonl b/split_edge/graph_10464056-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-17.jsonl b/split_edge/graph_10464056-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-2.jsonl b/split_edge/graph_10464056-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-23.jsonl b/split_edge/graph_10464056-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10464056-5.jsonl b/split_edge/graph_10464056-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-0.jsonl b/split_edge/graph_10500613-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-14.jsonl b/split_edge/graph_10500613-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-16.jsonl b/split_edge/graph_10500613-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-18.jsonl b/split_edge/graph_10500613-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-19.jsonl b/split_edge/graph_10500613-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-2.jsonl b/split_edge/graph_10500613-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-21.jsonl b/split_edge/graph_10500613-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-22.jsonl b/split_edge/graph_10500613-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-23.jsonl b/split_edge/graph_10500613-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-25.jsonl b/split_edge/graph_10500613-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-26.jsonl b/split_edge/graph_10500613-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-3.jsonl b/split_edge/graph_10500613-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10500613-6.jsonl b/split_edge/graph_10500613-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-1.jsonl b/split_edge/graph_10532321-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-10.jsonl b/split_edge/graph_10532321-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-11.jsonl b/split_edge/graph_10532321-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-12.jsonl b/split_edge/graph_10532321-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-13.jsonl b/split_edge/graph_10532321-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-14.jsonl b/split_edge/graph_10532321-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-16.jsonl b/split_edge/graph_10532321-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-17.jsonl b/split_edge/graph_10532321-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-2.jsonl b/split_edge/graph_10532321-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-20.jsonl b/split_edge/graph_10532321-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-21.jsonl b/split_edge/graph_10532321-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-4.jsonl b/split_edge/graph_10532321-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-5.jsonl b/split_edge/graph_10532321-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-7.jsonl b/split_edge/graph_10532321-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10532321-9.jsonl b/split_edge/graph_10532321-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10652696-6.jsonl b/split_edge/graph_10652696-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-0.jsonl b/split_edge/graph_10685070-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-10.jsonl b/split_edge/graph_10685070-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-11.jsonl b/split_edge/graph_10685070-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-12.jsonl b/split_edge/graph_10685070-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-13.jsonl b/split_edge/graph_10685070-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-15.jsonl b/split_edge/graph_10685070-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-16.jsonl b/split_edge/graph_10685070-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-17.jsonl b/split_edge/graph_10685070-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-19.jsonl b/split_edge/graph_10685070-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-2.jsonl b/split_edge/graph_10685070-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-20.jsonl b/split_edge/graph_10685070-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-22.jsonl b/split_edge/graph_10685070-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-24.jsonl b/split_edge/graph_10685070-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-25.jsonl b/split_edge/graph_10685070-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-4.jsonl b/split_edge/graph_10685070-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-5.jsonl b/split_edge/graph_10685070-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-6.jsonl b/split_edge/graph_10685070-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-7.jsonl b/split_edge/graph_10685070-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10685070-9.jsonl b/split_edge/graph_10685070-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-0.jsonl b/split_edge/graph_10693567-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-1.jsonl b/split_edge/graph_10693567-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-12.jsonl b/split_edge/graph_10693567-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-13.jsonl b/split_edge/graph_10693567-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-14.jsonl b/split_edge/graph_10693567-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-17.jsonl b/split_edge/graph_10693567-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-18.jsonl b/split_edge/graph_10693567-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-19.jsonl b/split_edge/graph_10693567-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-2.jsonl b/split_edge/graph_10693567-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-21.jsonl b/split_edge/graph_10693567-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-22.jsonl b/split_edge/graph_10693567-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-23.jsonl b/split_edge/graph_10693567-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-24.jsonl b/split_edge/graph_10693567-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-25.jsonl b/split_edge/graph_10693567-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-26.jsonl b/split_edge/graph_10693567-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-27.jsonl b/split_edge/graph_10693567-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-29.jsonl b/split_edge/graph_10693567-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-3.jsonl b/split_edge/graph_10693567-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-30.jsonl b/split_edge/graph_10693567-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-34.jsonl b/split_edge/graph_10693567-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-35.jsonl b/split_edge/graph_10693567-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-38.jsonl b/split_edge/graph_10693567-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10693567-8.jsonl b/split_edge/graph_10693567-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-0.jsonl b/split_edge/graph_10734291-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-1.jsonl b/split_edge/graph_10734291-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-10.jsonl b/split_edge/graph_10734291-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-12.jsonl b/split_edge/graph_10734291-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-13.jsonl b/split_edge/graph_10734291-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-14.jsonl b/split_edge/graph_10734291-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-17.jsonl b/split_edge/graph_10734291-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-2.jsonl b/split_edge/graph_10734291-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-4.jsonl b/split_edge/graph_10734291-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-5.jsonl b/split_edge/graph_10734291-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-6.jsonl b/split_edge/graph_10734291-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-7.jsonl b/split_edge/graph_10734291-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-8.jsonl b/split_edge/graph_10734291-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10734291-9.jsonl b/split_edge/graph_10734291-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1075488-0.jsonl b/split_edge/graph_1075488-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1075488-1.jsonl b/split_edge/graph_1075488-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1075488-2.jsonl b/split_edge/graph_1075488-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1075488-22.jsonl b/split_edge/graph_1075488-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1075488-23.jsonl b/split_edge/graph_1075488-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1075488-27.jsonl b/split_edge/graph_1075488-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1075488-4.jsonl b/split_edge/graph_1075488-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-1.jsonl b/split_edge/graph_10762348-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-11.jsonl b/split_edge/graph_10762348-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-12.jsonl b/split_edge/graph_10762348-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-13.jsonl b/split_edge/graph_10762348-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-15.jsonl b/split_edge/graph_10762348-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-16.jsonl b/split_edge/graph_10762348-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-17.jsonl b/split_edge/graph_10762348-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-2.jsonl b/split_edge/graph_10762348-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-4.jsonl b/split_edge/graph_10762348-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-5.jsonl b/split_edge/graph_10762348-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-6.jsonl b/split_edge/graph_10762348-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10762348-7.jsonl b/split_edge/graph_10762348-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-0.jsonl b/split_edge/graph_10777439-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-1.jsonl b/split_edge/graph_10777439-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-11.jsonl b/split_edge/graph_10777439-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-12.jsonl b/split_edge/graph_10777439-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-13.jsonl b/split_edge/graph_10777439-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-14.jsonl b/split_edge/graph_10777439-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-15.jsonl b/split_edge/graph_10777439-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-18.jsonl b/split_edge/graph_10777439-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-19.jsonl b/split_edge/graph_10777439-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-21.jsonl b/split_edge/graph_10777439-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-22.jsonl b/split_edge/graph_10777439-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-4.jsonl b/split_edge/graph_10777439-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-5.jsonl b/split_edge/graph_10777439-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-6.jsonl b/split_edge/graph_10777439-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-7.jsonl b/split_edge/graph_10777439-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10777439-9.jsonl b/split_edge/graph_10777439-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_108379849-0.jsonl b/split_edge/graph_108379849-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_108379849-1.jsonl b/split_edge/graph_108379849-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_108379849-2.jsonl b/split_edge/graph_108379849-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_108379849-4.jsonl b/split_edge/graph_108379849-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_108379849-5.jsonl b/split_edge/graph_108379849-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_108379849-6.jsonl b/split_edge/graph_108379849-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_108379849-7.jsonl b/split_edge/graph_108379849-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863733-0.jsonl b/split_edge/graph_10863733-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863733-10.jsonl b/split_edge/graph_10863733-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863733-9.jsonl b/split_edge/graph_10863733-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863969-0.jsonl b/split_edge/graph_10863969-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863969-3.jsonl b/split_edge/graph_10863969-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863969-4.jsonl b/split_edge/graph_10863969-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863969-7.jsonl b/split_edge/graph_10863969-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863969-8.jsonl b/split_edge/graph_10863969-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10863969-9.jsonl b/split_edge/graph_10863969-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-10.jsonl b/split_edge/graph_10892530-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-11.jsonl b/split_edge/graph_10892530-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-12.jsonl b/split_edge/graph_10892530-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-14.jsonl b/split_edge/graph_10892530-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-15.jsonl b/split_edge/graph_10892530-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-17.jsonl b/split_edge/graph_10892530-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-18.jsonl b/split_edge/graph_10892530-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-3.jsonl b/split_edge/graph_10892530-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-6.jsonl b/split_edge/graph_10892530-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-7.jsonl b/split_edge/graph_10892530-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-8.jsonl b/split_edge/graph_10892530-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10892530-9.jsonl b/split_edge/graph_10892530-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10907786-0.jsonl b/split_edge/graph_10907786-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10907786-1.jsonl b/split_edge/graph_10907786-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10907786-4.jsonl b/split_edge/graph_10907786-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10907786-6.jsonl b/split_edge/graph_10907786-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-0.jsonl b/split_edge/graph_10941697-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-2.jsonl b/split_edge/graph_10941697-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-3.jsonl b/split_edge/graph_10941697-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-4.jsonl b/split_edge/graph_10941697-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-6.jsonl b/split_edge/graph_10941697-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-7.jsonl b/split_edge/graph_10941697-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-8.jsonl b/split_edge/graph_10941697-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10941697-9.jsonl b/split_edge/graph_10941697-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10947138-0.jsonl b/split_edge/graph_10947138-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10947138-1.jsonl b/split_edge/graph_10947138-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_10947138-2.jsonl b/split_edge/graph_10947138-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1098341-0.jsonl b/split_edge/graph_1098341-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1098341-1.jsonl b/split_edge/graph_1098341-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1098341-2.jsonl b/split_edge/graph_1098341-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1098341-3.jsonl b/split_edge/graph_1098341-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1098341-4.jsonl b/split_edge/graph_1098341-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1098341-5.jsonl b/split_edge/graph_1098341-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1098341-6.jsonl b/split_edge/graph_1098341-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-10.jsonl b/split_edge/graph_11050791-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-11.jsonl b/split_edge/graph_11050791-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-12.jsonl b/split_edge/graph_11050791-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-13.jsonl b/split_edge/graph_11050791-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-15.jsonl b/split_edge/graph_11050791-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-16.jsonl b/split_edge/graph_11050791-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-3.jsonl b/split_edge/graph_11050791-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-4.jsonl b/split_edge/graph_11050791-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-5.jsonl b/split_edge/graph_11050791-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-6.jsonl b/split_edge/graph_11050791-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-7.jsonl b/split_edge/graph_11050791-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11050791-8.jsonl b/split_edge/graph_11050791-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-0.jsonl b/split_edge/graph_110995515-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-10.jsonl b/split_edge/graph_110995515-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-2.jsonl b/split_edge/graph_110995515-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-3.jsonl b/split_edge/graph_110995515-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-4.jsonl b/split_edge/graph_110995515-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-5.jsonl b/split_edge/graph_110995515-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-7.jsonl b/split_edge/graph_110995515-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-8.jsonl b/split_edge/graph_110995515-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_110995515-9.jsonl b/split_edge/graph_110995515-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_111279453-11.jsonl b/split_edge/graph_111279453-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_111279453-12.jsonl b/split_edge/graph_111279453-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_111279453-5.jsonl b/split_edge/graph_111279453-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-0.jsonl b/split_edge/graph_11177938-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-1.jsonl b/split_edge/graph_11177938-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-10.jsonl b/split_edge/graph_11177938-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-11.jsonl b/split_edge/graph_11177938-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-13.jsonl b/split_edge/graph_11177938-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-14.jsonl b/split_edge/graph_11177938-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-15.jsonl b/split_edge/graph_11177938-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-16.jsonl b/split_edge/graph_11177938-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-3.jsonl b/split_edge/graph_11177938-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-5.jsonl b/split_edge/graph_11177938-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-6.jsonl b/split_edge/graph_11177938-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-7.jsonl b/split_edge/graph_11177938-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11177938-8.jsonl b/split_edge/graph_11177938-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-1.jsonl b/split_edge/graph_1119606-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-10.jsonl b/split_edge/graph_1119606-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-15.jsonl b/split_edge/graph_1119606-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-16.jsonl b/split_edge/graph_1119606-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-17.jsonl b/split_edge/graph_1119606-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-2.jsonl b/split_edge/graph_1119606-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-4.jsonl b/split_edge/graph_1119606-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-7.jsonl b/split_edge/graph_1119606-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1119606-8.jsonl b/split_edge/graph_1119606-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-0.jsonl b/split_edge/graph_11197428-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-10.jsonl b/split_edge/graph_11197428-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-11.jsonl b/split_edge/graph_11197428-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-12.jsonl b/split_edge/graph_11197428-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-13.jsonl b/split_edge/graph_11197428-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-14.jsonl b/split_edge/graph_11197428-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-16.jsonl b/split_edge/graph_11197428-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-18.jsonl b/split_edge/graph_11197428-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-19.jsonl b/split_edge/graph_11197428-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-2.jsonl b/split_edge/graph_11197428-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-20.jsonl b/split_edge/graph_11197428-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-21.jsonl b/split_edge/graph_11197428-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-22.jsonl b/split_edge/graph_11197428-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-3.jsonl b/split_edge/graph_11197428-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-4.jsonl b/split_edge/graph_11197428-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-5.jsonl b/split_edge/graph_11197428-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-6.jsonl b/split_edge/graph_11197428-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-7.jsonl b/split_edge/graph_11197428-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11197428-9.jsonl b/split_edge/graph_11197428-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11238636-0.jsonl b/split_edge/graph_11238636-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11238636-11.jsonl b/split_edge/graph_11238636-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11238636-12.jsonl b/split_edge/graph_11238636-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11238636-15.jsonl b/split_edge/graph_11238636-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11238636-7.jsonl b/split_edge/graph_11238636-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-0.jsonl b/split_edge/graph_1124694-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-10.jsonl b/split_edge/graph_1124694-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-2.jsonl b/split_edge/graph_1124694-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-3.jsonl b/split_edge/graph_1124694-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-4.jsonl b/split_edge/graph_1124694-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-5.jsonl b/split_edge/graph_1124694-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-7.jsonl b/split_edge/graph_1124694-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-8.jsonl b/split_edge/graph_1124694-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1124694-9.jsonl b/split_edge/graph_1124694-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11266367-0.jsonl b/split_edge/graph_11266367-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11266367-2.jsonl b/split_edge/graph_11266367-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11266367-4.jsonl b/split_edge/graph_11266367-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11266367-6.jsonl b/split_edge/graph_11266367-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11266367-7.jsonl b/split_edge/graph_11266367-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11266367-9.jsonl b/split_edge/graph_11266367-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-0.jsonl b/split_edge/graph_11283051-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-1.jsonl b/split_edge/graph_11283051-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-10.jsonl b/split_edge/graph_11283051-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-11.jsonl b/split_edge/graph_11283051-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-2.jsonl b/split_edge/graph_11283051-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-3.jsonl b/split_edge/graph_11283051-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-4.jsonl b/split_edge/graph_11283051-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-5.jsonl b/split_edge/graph_11283051-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-6.jsonl b/split_edge/graph_11283051-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-7.jsonl b/split_edge/graph_11283051-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-8.jsonl b/split_edge/graph_11283051-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11283051-9.jsonl b/split_edge/graph_11283051-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-0.jsonl b/split_edge/graph_11295746-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-10.jsonl b/split_edge/graph_11295746-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-12.jsonl b/split_edge/graph_11295746-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-13.jsonl b/split_edge/graph_11295746-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-15.jsonl b/split_edge/graph_11295746-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-16.jsonl b/split_edge/graph_11295746-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-17.jsonl b/split_edge/graph_11295746-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-18.jsonl b/split_edge/graph_11295746-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-19.jsonl b/split_edge/graph_11295746-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-2.jsonl b/split_edge/graph_11295746-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-22.jsonl b/split_edge/graph_11295746-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-23.jsonl b/split_edge/graph_11295746-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-25.jsonl b/split_edge/graph_11295746-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-26.jsonl b/split_edge/graph_11295746-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-29.jsonl b/split_edge/graph_11295746-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-30.jsonl b/split_edge/graph_11295746-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-31.jsonl b/split_edge/graph_11295746-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-32.jsonl b/split_edge/graph_11295746-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-35.jsonl b/split_edge/graph_11295746-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-36.jsonl b/split_edge/graph_11295746-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-37.jsonl b/split_edge/graph_11295746-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-38.jsonl b/split_edge/graph_11295746-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-39.jsonl b/split_edge/graph_11295746-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-4.jsonl b/split_edge/graph_11295746-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-40.jsonl b/split_edge/graph_11295746-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11295746-6.jsonl b/split_edge/graph_11295746-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-0.jsonl b/split_edge/graph_11370061-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-1.jsonl b/split_edge/graph_11370061-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-10.jsonl b/split_edge/graph_11370061-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-11.jsonl b/split_edge/graph_11370061-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-12.jsonl b/split_edge/graph_11370061-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-2.jsonl b/split_edge/graph_11370061-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-3.jsonl b/split_edge/graph_11370061-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-4.jsonl b/split_edge/graph_11370061-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-5.jsonl b/split_edge/graph_11370061-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-6.jsonl b/split_edge/graph_11370061-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-7.jsonl b/split_edge/graph_11370061-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11370061-9.jsonl b/split_edge/graph_11370061-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1137487-0.jsonl b/split_edge/graph_1137487-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1137487-2.jsonl b/split_edge/graph_1137487-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1137487-3.jsonl b/split_edge/graph_1137487-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1137487-4.jsonl b/split_edge/graph_1137487-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1137487-5.jsonl b/split_edge/graph_1137487-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-0.jsonl b/split_edge/graph_11400447-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-1.jsonl b/split_edge/graph_11400447-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-2.jsonl b/split_edge/graph_11400447-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-3.jsonl b/split_edge/graph_11400447-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-4.jsonl b/split_edge/graph_11400447-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-5.jsonl b/split_edge/graph_11400447-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-6.jsonl b/split_edge/graph_11400447-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11400447-7.jsonl b/split_edge/graph_11400447-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-0.jsonl b/split_edge/graph_11421382-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-10.jsonl b/split_edge/graph_11421382-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-11.jsonl b/split_edge/graph_11421382-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-15.jsonl b/split_edge/graph_11421382-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-17.jsonl b/split_edge/graph_11421382-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-18.jsonl b/split_edge/graph_11421382-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-19.jsonl b/split_edge/graph_11421382-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-2.jsonl b/split_edge/graph_11421382-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-20.jsonl b/split_edge/graph_11421382-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-3.jsonl b/split_edge/graph_11421382-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-4.jsonl b/split_edge/graph_11421382-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-5.jsonl b/split_edge/graph_11421382-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-6.jsonl b/split_edge/graph_11421382-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-7.jsonl b/split_edge/graph_11421382-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11421382-9.jsonl b/split_edge/graph_11421382-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11459632-0.jsonl b/split_edge/graph_11459632-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-1.jsonl b/split_edge/graph_1146543-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-11.jsonl b/split_edge/graph_1146543-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-12.jsonl b/split_edge/graph_1146543-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-14.jsonl b/split_edge/graph_1146543-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-17.jsonl b/split_edge/graph_1146543-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-19.jsonl b/split_edge/graph_1146543-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-20.jsonl b/split_edge/graph_1146543-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-21.jsonl b/split_edge/graph_1146543-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-3.jsonl b/split_edge/graph_1146543-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-5.jsonl b/split_edge/graph_1146543-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-6.jsonl b/split_edge/graph_1146543-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-7.jsonl b/split_edge/graph_1146543-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-8.jsonl b/split_edge/graph_1146543-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1146543-9.jsonl b/split_edge/graph_1146543-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-0.jsonl b/split_edge/graph_115198485-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-10.jsonl b/split_edge/graph_115198485-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-11.jsonl b/split_edge/graph_115198485-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-12.jsonl b/split_edge/graph_115198485-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-13.jsonl b/split_edge/graph_115198485-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-14.jsonl b/split_edge/graph_115198485-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-15.jsonl b/split_edge/graph_115198485-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-16.jsonl b/split_edge/graph_115198485-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-17.jsonl b/split_edge/graph_115198485-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-18.jsonl b/split_edge/graph_115198485-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-19.jsonl b/split_edge/graph_115198485-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-2.jsonl b/split_edge/graph_115198485-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-20.jsonl b/split_edge/graph_115198485-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-21.jsonl b/split_edge/graph_115198485-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-22.jsonl b/split_edge/graph_115198485-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-24.jsonl b/split_edge/graph_115198485-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-25.jsonl b/split_edge/graph_115198485-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-26.jsonl b/split_edge/graph_115198485-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-27.jsonl b/split_edge/graph_115198485-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-3.jsonl b/split_edge/graph_115198485-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-4.jsonl b/split_edge/graph_115198485-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-5.jsonl b/split_edge/graph_115198485-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-7.jsonl b/split_edge/graph_115198485-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115198485-9.jsonl b/split_edge/graph_115198485-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-0.jsonl b/split_edge/graph_115456-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-1.jsonl b/split_edge/graph_115456-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-10.jsonl b/split_edge/graph_115456-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-11.jsonl b/split_edge/graph_115456-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-12.jsonl b/split_edge/graph_115456-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-14.jsonl b/split_edge/graph_115456-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-15.jsonl b/split_edge/graph_115456-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-17.jsonl b/split_edge/graph_115456-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-18.jsonl b/split_edge/graph_115456-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-19.jsonl b/split_edge/graph_115456-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-2.jsonl b/split_edge/graph_115456-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-20.jsonl b/split_edge/graph_115456-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-21.jsonl b/split_edge/graph_115456-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-22.jsonl b/split_edge/graph_115456-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-23.jsonl b/split_edge/graph_115456-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-24.jsonl b/split_edge/graph_115456-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-25.jsonl b/split_edge/graph_115456-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-26.jsonl b/split_edge/graph_115456-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-27.jsonl b/split_edge/graph_115456-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-28.jsonl b/split_edge/graph_115456-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-29.jsonl b/split_edge/graph_115456-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-3.jsonl b/split_edge/graph_115456-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-32.jsonl b/split_edge/graph_115456-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-37.jsonl b/split_edge/graph_115456-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-38.jsonl b/split_edge/graph_115456-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-39.jsonl b/split_edge/graph_115456-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-4.jsonl b/split_edge/graph_115456-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-5.jsonl b/split_edge/graph_115456-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-6.jsonl b/split_edge/graph_115456-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-7.jsonl b/split_edge/graph_115456-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_115456-8.jsonl b/split_edge/graph_115456-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11567103-11.jsonl b/split_edge/graph_11567103-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11567103-12.jsonl b/split_edge/graph_11567103-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11567103-14.jsonl b/split_edge/graph_11567103-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11567103-15.jsonl b/split_edge/graph_11567103-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11567103-16.jsonl b/split_edge/graph_11567103-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11567103-8.jsonl b/split_edge/graph_11567103-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11567103-9.jsonl b/split_edge/graph_11567103-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-0.jsonl b/split_edge/graph_11591301-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-10.jsonl b/split_edge/graph_11591301-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-11.jsonl b/split_edge/graph_11591301-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-12.jsonl b/split_edge/graph_11591301-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-13.jsonl b/split_edge/graph_11591301-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-14.jsonl b/split_edge/graph_11591301-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-17.jsonl b/split_edge/graph_11591301-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-18.jsonl b/split_edge/graph_11591301-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-19.jsonl b/split_edge/graph_11591301-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-20.jsonl b/split_edge/graph_11591301-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-3.jsonl b/split_edge/graph_11591301-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-5.jsonl b/split_edge/graph_11591301-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-7.jsonl b/split_edge/graph_11591301-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-8.jsonl b/split_edge/graph_11591301-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11591301-9.jsonl b/split_edge/graph_11591301-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11659767-0.jsonl b/split_edge/graph_11659767-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11659767-2.jsonl b/split_edge/graph_11659767-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11659767-3.jsonl b/split_edge/graph_11659767-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11659767-5.jsonl b/split_edge/graph_11659767-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11659767-6.jsonl b/split_edge/graph_11659767-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11659767-7.jsonl b/split_edge/graph_11659767-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11659767-8.jsonl b/split_edge/graph_11659767-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-0.jsonl b/split_edge/graph_116691391-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-10.jsonl b/split_edge/graph_116691391-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-11.jsonl b/split_edge/graph_116691391-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-12.jsonl b/split_edge/graph_116691391-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-3.jsonl b/split_edge/graph_116691391-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-4.jsonl b/split_edge/graph_116691391-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-5.jsonl b/split_edge/graph_116691391-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-6.jsonl b/split_edge/graph_116691391-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-7.jsonl b/split_edge/graph_116691391-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_116691391-9.jsonl b/split_edge/graph_116691391-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-0.jsonl b/split_edge/graph_11735843-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-1.jsonl b/split_edge/graph_11735843-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-10.jsonl b/split_edge/graph_11735843-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-12.jsonl b/split_edge/graph_11735843-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-13.jsonl b/split_edge/graph_11735843-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-14.jsonl b/split_edge/graph_11735843-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-15.jsonl b/split_edge/graph_11735843-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-16.jsonl b/split_edge/graph_11735843-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-17.jsonl b/split_edge/graph_11735843-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-19.jsonl b/split_edge/graph_11735843-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-2.jsonl b/split_edge/graph_11735843-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-20.jsonl b/split_edge/graph_11735843-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-21.jsonl b/split_edge/graph_11735843-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-23.jsonl b/split_edge/graph_11735843-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-24.jsonl b/split_edge/graph_11735843-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-25.jsonl b/split_edge/graph_11735843-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-26.jsonl b/split_edge/graph_11735843-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-28.jsonl b/split_edge/graph_11735843-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-3.jsonl b/split_edge/graph_11735843-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-30.jsonl b/split_edge/graph_11735843-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-31.jsonl b/split_edge/graph_11735843-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-33.jsonl b/split_edge/graph_11735843-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-4.jsonl b/split_edge/graph_11735843-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-5.jsonl b/split_edge/graph_11735843-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-6.jsonl b/split_edge/graph_11735843-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-7.jsonl b/split_edge/graph_11735843-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-8.jsonl b/split_edge/graph_11735843-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11735843-9.jsonl b/split_edge/graph_11735843-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-0.jsonl b/split_edge/graph_11746788-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-1.jsonl b/split_edge/graph_11746788-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-10.jsonl b/split_edge/graph_11746788-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-11.jsonl b/split_edge/graph_11746788-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-12.jsonl b/split_edge/graph_11746788-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-13.jsonl b/split_edge/graph_11746788-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-14.jsonl b/split_edge/graph_11746788-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-15.jsonl b/split_edge/graph_11746788-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-16.jsonl b/split_edge/graph_11746788-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-17.jsonl b/split_edge/graph_11746788-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-18.jsonl b/split_edge/graph_11746788-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-19.jsonl b/split_edge/graph_11746788-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-2.jsonl b/split_edge/graph_11746788-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-20.jsonl b/split_edge/graph_11746788-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-3.jsonl b/split_edge/graph_11746788-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-4.jsonl b/split_edge/graph_11746788-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-5.jsonl b/split_edge/graph_11746788-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-6.jsonl b/split_edge/graph_11746788-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-7.jsonl b/split_edge/graph_11746788-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-8.jsonl b/split_edge/graph_11746788-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11746788-9.jsonl b/split_edge/graph_11746788-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-0.jsonl b/split_edge/graph_117731981-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-10.jsonl b/split_edge/graph_117731981-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-12.jsonl b/split_edge/graph_117731981-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-13.jsonl b/split_edge/graph_117731981-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-14.jsonl b/split_edge/graph_117731981-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-15.jsonl b/split_edge/graph_117731981-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-16.jsonl b/split_edge/graph_117731981-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-17.jsonl b/split_edge/graph_117731981-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-18.jsonl b/split_edge/graph_117731981-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-19.jsonl b/split_edge/graph_117731981-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-2.jsonl b/split_edge/graph_117731981-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-21.jsonl b/split_edge/graph_117731981-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-22.jsonl b/split_edge/graph_117731981-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-27.jsonl b/split_edge/graph_117731981-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-28.jsonl b/split_edge/graph_117731981-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-29.jsonl b/split_edge/graph_117731981-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-3.jsonl b/split_edge/graph_117731981-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-31.jsonl b/split_edge/graph_117731981-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-32.jsonl b/split_edge/graph_117731981-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-33.jsonl b/split_edge/graph_117731981-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-34.jsonl b/split_edge/graph_117731981-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-35.jsonl b/split_edge/graph_117731981-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-36.jsonl b/split_edge/graph_117731981-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-37.jsonl b/split_edge/graph_117731981-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-5.jsonl b/split_edge/graph_117731981-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-6.jsonl b/split_edge/graph_117731981-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-7.jsonl b/split_edge/graph_117731981-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_117731981-8.jsonl b/split_edge/graph_117731981-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-0.jsonl b/split_edge/graph_11794756-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-1.jsonl b/split_edge/graph_11794756-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-2.jsonl b/split_edge/graph_11794756-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-3.jsonl b/split_edge/graph_11794756-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-4.jsonl b/split_edge/graph_11794756-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-5.jsonl b/split_edge/graph_11794756-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-6.jsonl b/split_edge/graph_11794756-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11794756-7.jsonl b/split_edge/graph_11794756-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-0.jsonl b/split_edge/graph_11843485-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-10.jsonl b/split_edge/graph_11843485-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-12.jsonl b/split_edge/graph_11843485-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-13.jsonl b/split_edge/graph_11843485-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-3.jsonl b/split_edge/graph_11843485-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-4.jsonl b/split_edge/graph_11843485-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-8.jsonl b/split_edge/graph_11843485-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11843485-9.jsonl b/split_edge/graph_11843485-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11890281-0.jsonl b/split_edge/graph_11890281-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11890281-1.jsonl b/split_edge/graph_11890281-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11890281-3.jsonl b/split_edge/graph_11890281-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11890281-4.jsonl b/split_edge/graph_11890281-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11890281-6.jsonl b/split_edge/graph_11890281-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-0.jsonl b/split_edge/graph_11894197-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-1.jsonl b/split_edge/graph_11894197-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-10.jsonl b/split_edge/graph_11894197-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-11.jsonl b/split_edge/graph_11894197-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-13.jsonl b/split_edge/graph_11894197-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-14.jsonl b/split_edge/graph_11894197-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-4.jsonl b/split_edge/graph_11894197-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-5.jsonl b/split_edge/graph_11894197-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-6.jsonl b/split_edge/graph_11894197-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-8.jsonl b/split_edge/graph_11894197-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11894197-9.jsonl b/split_edge/graph_11894197-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-0.jsonl b/split_edge/graph_119114298-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-10.jsonl b/split_edge/graph_119114298-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-11.jsonl b/split_edge/graph_119114298-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-12.jsonl b/split_edge/graph_119114298-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-13.jsonl b/split_edge/graph_119114298-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-14.jsonl b/split_edge/graph_119114298-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-15.jsonl b/split_edge/graph_119114298-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-16.jsonl b/split_edge/graph_119114298-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-17.jsonl b/split_edge/graph_119114298-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-19.jsonl b/split_edge/graph_119114298-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-20.jsonl b/split_edge/graph_119114298-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-21.jsonl b/split_edge/graph_119114298-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-22.jsonl b/split_edge/graph_119114298-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-23.jsonl b/split_edge/graph_119114298-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-25.jsonl b/split_edge/graph_119114298-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-27.jsonl b/split_edge/graph_119114298-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-28.jsonl b/split_edge/graph_119114298-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-29.jsonl b/split_edge/graph_119114298-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-3.jsonl b/split_edge/graph_119114298-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-30.jsonl b/split_edge/graph_119114298-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-32.jsonl b/split_edge/graph_119114298-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-33.jsonl b/split_edge/graph_119114298-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-35.jsonl b/split_edge/graph_119114298-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-36.jsonl b/split_edge/graph_119114298-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-37.jsonl b/split_edge/graph_119114298-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-38.jsonl b/split_edge/graph_119114298-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-4.jsonl b/split_edge/graph_119114298-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-40.jsonl b/split_edge/graph_119114298-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-42.jsonl b/split_edge/graph_119114298-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-43.jsonl b/split_edge/graph_119114298-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-7.jsonl b/split_edge/graph_119114298-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-8.jsonl b/split_edge/graph_119114298-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119114298-9.jsonl b/split_edge/graph_119114298-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-0.jsonl b/split_edge/graph_119116017-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-1.jsonl b/split_edge/graph_119116017-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-11.jsonl b/split_edge/graph_119116017-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-12.jsonl b/split_edge/graph_119116017-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-13.jsonl b/split_edge/graph_119116017-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-17.jsonl b/split_edge/graph_119116017-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-18.jsonl b/split_edge/graph_119116017-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-21.jsonl b/split_edge/graph_119116017-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-22.jsonl b/split_edge/graph_119116017-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-23.jsonl b/split_edge/graph_119116017-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-24.jsonl b/split_edge/graph_119116017-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-25.jsonl b/split_edge/graph_119116017-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-27.jsonl b/split_edge/graph_119116017-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-3.jsonl b/split_edge/graph_119116017-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-4.jsonl b/split_edge/graph_119116017-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119116017-5.jsonl b/split_edge/graph_119116017-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-0.jsonl b/split_edge/graph_119304121-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-2.jsonl b/split_edge/graph_119304121-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-3.jsonl b/split_edge/graph_119304121-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-4.jsonl b/split_edge/graph_119304121-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-5.jsonl b/split_edge/graph_119304121-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-6.jsonl b/split_edge/graph_119304121-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-7.jsonl b/split_edge/graph_119304121-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_119304121-8.jsonl b/split_edge/graph_119304121-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11968735-0.jsonl b/split_edge/graph_11968735-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11968735-11.jsonl b/split_edge/graph_11968735-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11968735-18.jsonl b/split_edge/graph_11968735-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11968735-19.jsonl b/split_edge/graph_11968735-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11968735-6.jsonl b/split_edge/graph_11968735-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11968735-7.jsonl b/split_edge/graph_11968735-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11968735-8.jsonl b/split_edge/graph_11968735-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-0.jsonl b/split_edge/graph_11985139-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-3.jsonl b/split_edge/graph_11985139-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-4.jsonl b/split_edge/graph_11985139-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-5.jsonl b/split_edge/graph_11985139-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-6.jsonl b/split_edge/graph_11985139-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-7.jsonl b/split_edge/graph_11985139-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-8.jsonl b/split_edge/graph_11985139-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_11985139-9.jsonl b/split_edge/graph_11985139-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-0.jsonl b/split_edge/graph_12050023-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-1.jsonl b/split_edge/graph_12050023-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-11.jsonl b/split_edge/graph_12050023-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-12.jsonl b/split_edge/graph_12050023-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-13.jsonl b/split_edge/graph_12050023-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-15.jsonl b/split_edge/graph_12050023-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-2.jsonl b/split_edge/graph_12050023-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-5.jsonl b/split_edge/graph_12050023-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-7.jsonl b/split_edge/graph_12050023-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12050023-8.jsonl b/split_edge/graph_12050023-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-0.jsonl b/split_edge/graph_12060835-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-10.jsonl b/split_edge/graph_12060835-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-12.jsonl b/split_edge/graph_12060835-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-13.jsonl b/split_edge/graph_12060835-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-15.jsonl b/split_edge/graph_12060835-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-16.jsonl b/split_edge/graph_12060835-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-17.jsonl b/split_edge/graph_12060835-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-18.jsonl b/split_edge/graph_12060835-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-19.jsonl b/split_edge/graph_12060835-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-2.jsonl b/split_edge/graph_12060835-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-20.jsonl b/split_edge/graph_12060835-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-21.jsonl b/split_edge/graph_12060835-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-22.jsonl b/split_edge/graph_12060835-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-3.jsonl b/split_edge/graph_12060835-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-4.jsonl b/split_edge/graph_12060835-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-5.jsonl b/split_edge/graph_12060835-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-6.jsonl b/split_edge/graph_12060835-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-7.jsonl b/split_edge/graph_12060835-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-8.jsonl b/split_edge/graph_12060835-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12060835-9.jsonl b/split_edge/graph_12060835-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-0.jsonl b/split_edge/graph_12096466-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-10.jsonl b/split_edge/graph_12096466-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-11.jsonl b/split_edge/graph_12096466-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-12.jsonl b/split_edge/graph_12096466-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-13.jsonl b/split_edge/graph_12096466-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-14.jsonl b/split_edge/graph_12096466-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-3.jsonl b/split_edge/graph_12096466-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-4.jsonl b/split_edge/graph_12096466-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-5.jsonl b/split_edge/graph_12096466-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-6.jsonl b/split_edge/graph_12096466-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-8.jsonl b/split_edge/graph_12096466-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12096466-9.jsonl b/split_edge/graph_12096466-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12115866-3.jsonl b/split_edge/graph_12115866-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12159323-0.jsonl b/split_edge/graph_12159323-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12159323-2.jsonl b/split_edge/graph_12159323-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12159323-4.jsonl b/split_edge/graph_12159323-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12159323-5.jsonl b/split_edge/graph_12159323-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12159323-7.jsonl b/split_edge/graph_12159323-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12159323-8.jsonl b/split_edge/graph_12159323-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1219725-0.jsonl b/split_edge/graph_1219725-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1219725-3.jsonl b/split_edge/graph_1219725-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1219725-4.jsonl b/split_edge/graph_1219725-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1219725-5.jsonl b/split_edge/graph_1219725-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12206204-0.jsonl b/split_edge/graph_12206204-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12206204-1.jsonl b/split_edge/graph_12206204-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12206204-3.jsonl b/split_edge/graph_12206204-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12206204-5.jsonl b/split_edge/graph_12206204-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12264500-12.jsonl b/split_edge/graph_12264500-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12264500-15.jsonl b/split_edge/graph_12264500-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12264500-2.jsonl b/split_edge/graph_12264500-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12264500-3.jsonl b/split_edge/graph_12264500-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12264500-4.jsonl b/split_edge/graph_12264500-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12264500-7.jsonl b/split_edge/graph_12264500-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12264500-8.jsonl b/split_edge/graph_12264500-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12266282-11.jsonl b/split_edge/graph_12266282-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12266282-14.jsonl b/split_edge/graph_12266282-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12266282-2.jsonl b/split_edge/graph_12266282-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12266282-5.jsonl b/split_edge/graph_12266282-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12266282-8.jsonl b/split_edge/graph_12266282-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12266282-9.jsonl b/split_edge/graph_12266282-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12356530-10.jsonl b/split_edge/graph_12356530-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12356530-2.jsonl b/split_edge/graph_12356530-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12356530-4.jsonl b/split_edge/graph_12356530-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12356530-5.jsonl b/split_edge/graph_12356530-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12356530-6.jsonl b/split_edge/graph_12356530-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12356530-8.jsonl b/split_edge/graph_12356530-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12420484-3.jsonl b/split_edge/graph_12420484-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12420484-4.jsonl b/split_edge/graph_12420484-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12420484-5.jsonl b/split_edge/graph_12420484-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12420484-6.jsonl b/split_edge/graph_12420484-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12420484-7.jsonl b/split_edge/graph_12420484-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-0.jsonl b/split_edge/graph_12422172-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-11.jsonl b/split_edge/graph_12422172-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-12.jsonl b/split_edge/graph_12422172-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-13.jsonl b/split_edge/graph_12422172-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-14.jsonl b/split_edge/graph_12422172-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-15.jsonl b/split_edge/graph_12422172-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-16.jsonl b/split_edge/graph_12422172-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-17.jsonl b/split_edge/graph_12422172-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-18.jsonl b/split_edge/graph_12422172-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-19.jsonl b/split_edge/graph_12422172-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-2.jsonl b/split_edge/graph_12422172-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-20.jsonl b/split_edge/graph_12422172-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-21.jsonl b/split_edge/graph_12422172-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-22.jsonl b/split_edge/graph_12422172-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-29.jsonl b/split_edge/graph_12422172-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-3.jsonl b/split_edge/graph_12422172-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-30.jsonl b/split_edge/graph_12422172-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-31.jsonl b/split_edge/graph_12422172-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-33.jsonl b/split_edge/graph_12422172-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-34.jsonl b/split_edge/graph_12422172-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-39.jsonl b/split_edge/graph_12422172-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-48.jsonl b/split_edge/graph_12422172-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-7.jsonl b/split_edge/graph_12422172-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12422172-8.jsonl b/split_edge/graph_12422172-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-0.jsonl b/split_edge/graph_12467547-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-1.jsonl b/split_edge/graph_12467547-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-10.jsonl b/split_edge/graph_12467547-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-12.jsonl b/split_edge/graph_12467547-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-13.jsonl b/split_edge/graph_12467547-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-14.jsonl b/split_edge/graph_12467547-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-16.jsonl b/split_edge/graph_12467547-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-17.jsonl b/split_edge/graph_12467547-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-19.jsonl b/split_edge/graph_12467547-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-20.jsonl b/split_edge/graph_12467547-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-21.jsonl b/split_edge/graph_12467547-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-3.jsonl b/split_edge/graph_12467547-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-8.jsonl b/split_edge/graph_12467547-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12467547-9.jsonl b/split_edge/graph_12467547-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12513771-3.jsonl b/split_edge/graph_12513771-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12513771-4.jsonl b/split_edge/graph_12513771-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-0.jsonl b/split_edge/graph_1251893-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-1.jsonl b/split_edge/graph_1251893-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-15.jsonl b/split_edge/graph_1251893-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-16.jsonl b/split_edge/graph_1251893-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-17.jsonl b/split_edge/graph_1251893-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-18.jsonl b/split_edge/graph_1251893-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-19.jsonl b/split_edge/graph_1251893-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-2.jsonl b/split_edge/graph_1251893-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-21.jsonl b/split_edge/graph_1251893-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-22.jsonl b/split_edge/graph_1251893-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-24.jsonl b/split_edge/graph_1251893-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-25.jsonl b/split_edge/graph_1251893-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-26.jsonl b/split_edge/graph_1251893-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-27.jsonl b/split_edge/graph_1251893-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-3.jsonl b/split_edge/graph_1251893-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-30.jsonl b/split_edge/graph_1251893-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-33.jsonl b/split_edge/graph_1251893-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-4.jsonl b/split_edge/graph_1251893-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1251893-6.jsonl b/split_edge/graph_1251893-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-0.jsonl b/split_edge/graph_12572872-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-1.jsonl b/split_edge/graph_12572872-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-10.jsonl b/split_edge/graph_12572872-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-11.jsonl b/split_edge/graph_12572872-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-13.jsonl b/split_edge/graph_12572872-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-14.jsonl b/split_edge/graph_12572872-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-15.jsonl b/split_edge/graph_12572872-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-16.jsonl b/split_edge/graph_12572872-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-18.jsonl b/split_edge/graph_12572872-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-19.jsonl b/split_edge/graph_12572872-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-2.jsonl b/split_edge/graph_12572872-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-20.jsonl b/split_edge/graph_12572872-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-3.jsonl b/split_edge/graph_12572872-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-5.jsonl b/split_edge/graph_12572872-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-6.jsonl b/split_edge/graph_12572872-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-8.jsonl b/split_edge/graph_12572872-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12572872-9.jsonl b/split_edge/graph_12572872-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-0.jsonl b/split_edge/graph_12574246-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-26.jsonl b/split_edge/graph_12574246-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-3.jsonl b/split_edge/graph_12574246-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-34.jsonl b/split_edge/graph_12574246-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-35.jsonl b/split_edge/graph_12574246-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-36.jsonl b/split_edge/graph_12574246-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-38.jsonl b/split_edge/graph_12574246-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-42.jsonl b/split_edge/graph_12574246-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574246-44.jsonl b/split_edge/graph_12574246-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574304-12.jsonl b/split_edge/graph_12574304-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574304-20.jsonl b/split_edge/graph_12574304-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12574304-5.jsonl b/split_edge/graph_12574304-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-0.jsonl b/split_edge/graph_1259855-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-10.jsonl b/split_edge/graph_1259855-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-11.jsonl b/split_edge/graph_1259855-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-14.jsonl b/split_edge/graph_1259855-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-15.jsonl b/split_edge/graph_1259855-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-17.jsonl b/split_edge/graph_1259855-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-18.jsonl b/split_edge/graph_1259855-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-20.jsonl b/split_edge/graph_1259855-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-23.jsonl b/split_edge/graph_1259855-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-24.jsonl b/split_edge/graph_1259855-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-25.jsonl b/split_edge/graph_1259855-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-27.jsonl b/split_edge/graph_1259855-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-28.jsonl b/split_edge/graph_1259855-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-29.jsonl b/split_edge/graph_1259855-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-31.jsonl b/split_edge/graph_1259855-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-32.jsonl b/split_edge/graph_1259855-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-33.jsonl b/split_edge/graph_1259855-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-35.jsonl b/split_edge/graph_1259855-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-36.jsonl b/split_edge/graph_1259855-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-37.jsonl b/split_edge/graph_1259855-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-38.jsonl b/split_edge/graph_1259855-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-4.jsonl b/split_edge/graph_1259855-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-5.jsonl b/split_edge/graph_1259855-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-6.jsonl b/split_edge/graph_1259855-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-7.jsonl b/split_edge/graph_1259855-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1259855-8.jsonl b/split_edge/graph_1259855-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-1.jsonl b/split_edge/graph_12663580-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-11.jsonl b/split_edge/graph_12663580-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-12.jsonl b/split_edge/graph_12663580-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-16.jsonl b/split_edge/graph_12663580-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-17.jsonl b/split_edge/graph_12663580-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-18.jsonl b/split_edge/graph_12663580-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-19.jsonl b/split_edge/graph_12663580-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-20.jsonl b/split_edge/graph_12663580-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-21.jsonl b/split_edge/graph_12663580-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-23.jsonl b/split_edge/graph_12663580-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-25.jsonl b/split_edge/graph_12663580-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-26.jsonl b/split_edge/graph_12663580-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-3.jsonl b/split_edge/graph_12663580-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-4.jsonl b/split_edge/graph_12663580-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-5.jsonl b/split_edge/graph_12663580-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12663580-7.jsonl b/split_edge/graph_12663580-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-0.jsonl b/split_edge/graph_127253155-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-2.jsonl b/split_edge/graph_127253155-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-3.jsonl b/split_edge/graph_127253155-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-5.jsonl b/split_edge/graph_127253155-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-6.jsonl b/split_edge/graph_127253155-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-7.jsonl b/split_edge/graph_127253155-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-8.jsonl b/split_edge/graph_127253155-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_127253155-9.jsonl b/split_edge/graph_127253155-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1284183-0.jsonl b/split_edge/graph_1284183-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1284183-13.jsonl b/split_edge/graph_1284183-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1284183-3.jsonl b/split_edge/graph_1284183-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1284183-5.jsonl b/split_edge/graph_1284183-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1284183-7.jsonl b/split_edge/graph_1284183-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1284183-8.jsonl b/split_edge/graph_1284183-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1284183-9.jsonl b/split_edge/graph_1284183-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12947542-0.jsonl b/split_edge/graph_12947542-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12947542-1.jsonl b/split_edge/graph_12947542-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12947542-3.jsonl b/split_edge/graph_12947542-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12947542-4.jsonl b/split_edge/graph_12947542-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12947542-6.jsonl b/split_edge/graph_12947542-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12947542-7.jsonl b/split_edge/graph_12947542-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12947542-8.jsonl b/split_edge/graph_12947542-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-0.jsonl b/split_edge/graph_12950264-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-1.jsonl b/split_edge/graph_12950264-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-10.jsonl b/split_edge/graph_12950264-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-11.jsonl b/split_edge/graph_12950264-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-12.jsonl b/split_edge/graph_12950264-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-13.jsonl b/split_edge/graph_12950264-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-15.jsonl b/split_edge/graph_12950264-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-16.jsonl b/split_edge/graph_12950264-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-17.jsonl b/split_edge/graph_12950264-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-3.jsonl b/split_edge/graph_12950264-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-4.jsonl b/split_edge/graph_12950264-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-6.jsonl b/split_edge/graph_12950264-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-7.jsonl b/split_edge/graph_12950264-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-8.jsonl b/split_edge/graph_12950264-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_12950264-9.jsonl b/split_edge/graph_12950264-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-0.jsonl b/split_edge/graph_129944338-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-1.jsonl b/split_edge/graph_129944338-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-11.jsonl b/split_edge/graph_129944338-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-12.jsonl b/split_edge/graph_129944338-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-13.jsonl b/split_edge/graph_129944338-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-14.jsonl b/split_edge/graph_129944338-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-15.jsonl b/split_edge/graph_129944338-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-19.jsonl b/split_edge/graph_129944338-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-20.jsonl b/split_edge/graph_129944338-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-3.jsonl b/split_edge/graph_129944338-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-4.jsonl b/split_edge/graph_129944338-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-5.jsonl b/split_edge/graph_129944338-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-6.jsonl b/split_edge/graph_129944338-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-7.jsonl b/split_edge/graph_129944338-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-8.jsonl b/split_edge/graph_129944338-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_129944338-9.jsonl b/split_edge/graph_129944338-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-0.jsonl b/split_edge/graph_13107747-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-13.jsonl b/split_edge/graph_13107747-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-14.jsonl b/split_edge/graph_13107747-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-16.jsonl b/split_edge/graph_13107747-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-19.jsonl b/split_edge/graph_13107747-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-2.jsonl b/split_edge/graph_13107747-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-20.jsonl b/split_edge/graph_13107747-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-21.jsonl b/split_edge/graph_13107747-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-22.jsonl b/split_edge/graph_13107747-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-23.jsonl b/split_edge/graph_13107747-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-24.jsonl b/split_edge/graph_13107747-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-25.jsonl b/split_edge/graph_13107747-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-29.jsonl b/split_edge/graph_13107747-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-3.jsonl b/split_edge/graph_13107747-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-30.jsonl b/split_edge/graph_13107747-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-33.jsonl b/split_edge/graph_13107747-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-34.jsonl b/split_edge/graph_13107747-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-4.jsonl b/split_edge/graph_13107747-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-43.jsonl b/split_edge/graph_13107747-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-45.jsonl b/split_edge/graph_13107747-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-46.jsonl b/split_edge/graph_13107747-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-5.jsonl b/split_edge/graph_13107747-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-51.jsonl b/split_edge/graph_13107747-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-52.jsonl b/split_edge/graph_13107747-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-8.jsonl b/split_edge/graph_13107747-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13107747-9.jsonl b/split_edge/graph_13107747-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-0.jsonl b/split_edge/graph_13115032-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-1.jsonl b/split_edge/graph_13115032-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-10.jsonl b/split_edge/graph_13115032-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-11.jsonl b/split_edge/graph_13115032-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-12.jsonl b/split_edge/graph_13115032-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-14.jsonl b/split_edge/graph_13115032-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-18.jsonl b/split_edge/graph_13115032-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-19.jsonl b/split_edge/graph_13115032-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-2.jsonl b/split_edge/graph_13115032-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-3.jsonl b/split_edge/graph_13115032-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-4.jsonl b/split_edge/graph_13115032-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-5.jsonl b/split_edge/graph_13115032-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-6.jsonl b/split_edge/graph_13115032-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13115032-9.jsonl b/split_edge/graph_13115032-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-0.jsonl b/split_edge/graph_13151033-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-1.jsonl b/split_edge/graph_13151033-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-10.jsonl b/split_edge/graph_13151033-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-11.jsonl b/split_edge/graph_13151033-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-13.jsonl b/split_edge/graph_13151033-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-16.jsonl b/split_edge/graph_13151033-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-18.jsonl b/split_edge/graph_13151033-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-19.jsonl b/split_edge/graph_13151033-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-2.jsonl b/split_edge/graph_13151033-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-24.jsonl b/split_edge/graph_13151033-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-25.jsonl b/split_edge/graph_13151033-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-28.jsonl b/split_edge/graph_13151033-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-29.jsonl b/split_edge/graph_13151033-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-3.jsonl b/split_edge/graph_13151033-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-30.jsonl b/split_edge/graph_13151033-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-31.jsonl b/split_edge/graph_13151033-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-33.jsonl b/split_edge/graph_13151033-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-34.jsonl b/split_edge/graph_13151033-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-4.jsonl b/split_edge/graph_13151033-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-5.jsonl b/split_edge/graph_13151033-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-6.jsonl b/split_edge/graph_13151033-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-7.jsonl b/split_edge/graph_13151033-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-8.jsonl b/split_edge/graph_13151033-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13151033-9.jsonl b/split_edge/graph_13151033-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-0.jsonl b/split_edge/graph_1315930-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-10.jsonl b/split_edge/graph_1315930-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-11.jsonl b/split_edge/graph_1315930-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-3.jsonl b/split_edge/graph_1315930-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-4.jsonl b/split_edge/graph_1315930-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-5.jsonl b/split_edge/graph_1315930-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-6.jsonl b/split_edge/graph_1315930-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-7.jsonl b/split_edge/graph_1315930-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1315930-9.jsonl b/split_edge/graph_1315930-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-0.jsonl b/split_edge/graph_131774042-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-10.jsonl b/split_edge/graph_131774042-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-12.jsonl b/split_edge/graph_131774042-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-4.jsonl b/split_edge/graph_131774042-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-5.jsonl b/split_edge/graph_131774042-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-6.jsonl b/split_edge/graph_131774042-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-7.jsonl b/split_edge/graph_131774042-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131774042-8.jsonl b/split_edge/graph_131774042-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-0.jsonl b/split_edge/graph_131776192-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-1.jsonl b/split_edge/graph_131776192-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-12.jsonl b/split_edge/graph_131776192-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-14.jsonl b/split_edge/graph_131776192-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-15.jsonl b/split_edge/graph_131776192-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-16.jsonl b/split_edge/graph_131776192-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-17.jsonl b/split_edge/graph_131776192-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-18.jsonl b/split_edge/graph_131776192-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-19.jsonl b/split_edge/graph_131776192-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-2.jsonl b/split_edge/graph_131776192-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-20.jsonl b/split_edge/graph_131776192-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-25.jsonl b/split_edge/graph_131776192-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-26.jsonl b/split_edge/graph_131776192-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-27.jsonl b/split_edge/graph_131776192-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-28.jsonl b/split_edge/graph_131776192-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-3.jsonl b/split_edge/graph_131776192-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-4.jsonl b/split_edge/graph_131776192-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-5.jsonl b/split_edge/graph_131776192-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-6.jsonl b/split_edge/graph_131776192-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-8.jsonl b/split_edge/graph_131776192-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131776192-9.jsonl b/split_edge/graph_131776192-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-0.jsonl b/split_edge/graph_131777219-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-10.jsonl b/split_edge/graph_131777219-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-11.jsonl b/split_edge/graph_131777219-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-12.jsonl b/split_edge/graph_131777219-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-14.jsonl b/split_edge/graph_131777219-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-15.jsonl b/split_edge/graph_131777219-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-16.jsonl b/split_edge/graph_131777219-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-17.jsonl b/split_edge/graph_131777219-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-18.jsonl b/split_edge/graph_131777219-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-19.jsonl b/split_edge/graph_131777219-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-2.jsonl b/split_edge/graph_131777219-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-21.jsonl b/split_edge/graph_131777219-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-3.jsonl b/split_edge/graph_131777219-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-6.jsonl b/split_edge/graph_131777219-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131777219-9.jsonl b/split_edge/graph_131777219-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-0.jsonl b/split_edge/graph_13178821-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-1.jsonl b/split_edge/graph_13178821-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-2.jsonl b/split_edge/graph_13178821-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-3.jsonl b/split_edge/graph_13178821-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-4.jsonl b/split_edge/graph_13178821-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-5.jsonl b/split_edge/graph_13178821-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-6.jsonl b/split_edge/graph_13178821-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-7.jsonl b/split_edge/graph_13178821-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-8.jsonl b/split_edge/graph_13178821-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13178821-9.jsonl b/split_edge/graph_13178821-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-1.jsonl b/split_edge/graph_131945630-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-12.jsonl b/split_edge/graph_131945630-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-17.jsonl b/split_edge/graph_131945630-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-19.jsonl b/split_edge/graph_131945630-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-2.jsonl b/split_edge/graph_131945630-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-4.jsonl b/split_edge/graph_131945630-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-5.jsonl b/split_edge/graph_131945630-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_131945630-6.jsonl b/split_edge/graph_131945630-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-0.jsonl b/split_edge/graph_13195667-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-2.jsonl b/split_edge/graph_13195667-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-3.jsonl b/split_edge/graph_13195667-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-4.jsonl b/split_edge/graph_13195667-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-5.jsonl b/split_edge/graph_13195667-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-6.jsonl b/split_edge/graph_13195667-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-7.jsonl b/split_edge/graph_13195667-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-8.jsonl b/split_edge/graph_13195667-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13195667-9.jsonl b/split_edge/graph_13195667-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13229921-2.jsonl b/split_edge/graph_13229921-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13229921-7.jsonl b/split_edge/graph_13229921-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13229921-8.jsonl b/split_edge/graph_13229921-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-17.jsonl b/split_edge/graph_132350371-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-20.jsonl b/split_edge/graph_132350371-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-21.jsonl b/split_edge/graph_132350371-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-24.jsonl b/split_edge/graph_132350371-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-26.jsonl b/split_edge/graph_132350371-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-27.jsonl b/split_edge/graph_132350371-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-32.jsonl b/split_edge/graph_132350371-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-33.jsonl b/split_edge/graph_132350371-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-35.jsonl b/split_edge/graph_132350371-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-37.jsonl b/split_edge/graph_132350371-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-39.jsonl b/split_edge/graph_132350371-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-40.jsonl b/split_edge/graph_132350371-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-41.jsonl b/split_edge/graph_132350371-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-42.jsonl b/split_edge/graph_132350371-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132350371-9.jsonl b/split_edge/graph_132350371-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132529056-2.jsonl b/split_edge/graph_132529056-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_132529056-3.jsonl b/split_edge/graph_132529056-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-1.jsonl b/split_edge/graph_1329644-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-10.jsonl b/split_edge/graph_1329644-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-11.jsonl b/split_edge/graph_1329644-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-12.jsonl b/split_edge/graph_1329644-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-13.jsonl b/split_edge/graph_1329644-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-14.jsonl b/split_edge/graph_1329644-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-15.jsonl b/split_edge/graph_1329644-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-16.jsonl b/split_edge/graph_1329644-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-17.jsonl b/split_edge/graph_1329644-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-18.jsonl b/split_edge/graph_1329644-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-2.jsonl b/split_edge/graph_1329644-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-3.jsonl b/split_edge/graph_1329644-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-4.jsonl b/split_edge/graph_1329644-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1329644-8.jsonl b/split_edge/graph_1329644-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-0.jsonl b/split_edge/graph_13317072-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-1.jsonl b/split_edge/graph_13317072-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-12.jsonl b/split_edge/graph_13317072-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-14.jsonl b/split_edge/graph_13317072-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-15.jsonl b/split_edge/graph_13317072-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-16.jsonl b/split_edge/graph_13317072-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-7.jsonl b/split_edge/graph_13317072-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13317072-9.jsonl b/split_edge/graph_13317072-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-0.jsonl b/split_edge/graph_133609164-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-1.jsonl b/split_edge/graph_133609164-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-15.jsonl b/split_edge/graph_133609164-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-16.jsonl b/split_edge/graph_133609164-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-17.jsonl b/split_edge/graph_133609164-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-18.jsonl b/split_edge/graph_133609164-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-19.jsonl b/split_edge/graph_133609164-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-2.jsonl b/split_edge/graph_133609164-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-20.jsonl b/split_edge/graph_133609164-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-22.jsonl b/split_edge/graph_133609164-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-23.jsonl b/split_edge/graph_133609164-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-24.jsonl b/split_edge/graph_133609164-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-25.jsonl b/split_edge/graph_133609164-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-26.jsonl b/split_edge/graph_133609164-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-28.jsonl b/split_edge/graph_133609164-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-29.jsonl b/split_edge/graph_133609164-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-3.jsonl b/split_edge/graph_133609164-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-4.jsonl b/split_edge/graph_133609164-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-5.jsonl b/split_edge/graph_133609164-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-6.jsonl b/split_edge/graph_133609164-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-8.jsonl b/split_edge/graph_133609164-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133609164-9.jsonl b/split_edge/graph_133609164-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-10.jsonl b/split_edge/graph_13367514-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-12.jsonl b/split_edge/graph_13367514-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-13.jsonl b/split_edge/graph_13367514-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-3.jsonl b/split_edge/graph_13367514-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-4.jsonl b/split_edge/graph_13367514-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-6.jsonl b/split_edge/graph_13367514-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-7.jsonl b/split_edge/graph_13367514-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-8.jsonl b/split_edge/graph_13367514-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13367514-9.jsonl b/split_edge/graph_13367514-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-0.jsonl b/split_edge/graph_13372398-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-1.jsonl b/split_edge/graph_13372398-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-10.jsonl b/split_edge/graph_13372398-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-2.jsonl b/split_edge/graph_13372398-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-3.jsonl b/split_edge/graph_13372398-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-4.jsonl b/split_edge/graph_13372398-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-5.jsonl b/split_edge/graph_13372398-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-6.jsonl b/split_edge/graph_13372398-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-7.jsonl b/split_edge/graph_13372398-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-8.jsonl b/split_edge/graph_13372398-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13372398-9.jsonl b/split_edge/graph_13372398-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133922392-0.jsonl b/split_edge/graph_133922392-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133922392-1.jsonl b/split_edge/graph_133922392-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_133922392-2.jsonl b/split_edge/graph_133922392-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-1.jsonl b/split_edge/graph_13427574-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-2.jsonl b/split_edge/graph_13427574-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-3.jsonl b/split_edge/graph_13427574-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-4.jsonl b/split_edge/graph_13427574-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-5.jsonl b/split_edge/graph_13427574-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-6.jsonl b/split_edge/graph_13427574-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-7.jsonl b/split_edge/graph_13427574-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-8.jsonl b/split_edge/graph_13427574-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13427574-9.jsonl b/split_edge/graph_13427574-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13456854-0.jsonl b/split_edge/graph_13456854-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13456854-5.jsonl b/split_edge/graph_13456854-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13456854-7.jsonl b/split_edge/graph_13456854-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-1.jsonl b/split_edge/graph_13489039-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-13.jsonl b/split_edge/graph_13489039-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-2.jsonl b/split_edge/graph_13489039-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-3.jsonl b/split_edge/graph_13489039-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-4.jsonl b/split_edge/graph_13489039-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-5.jsonl b/split_edge/graph_13489039-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-6.jsonl b/split_edge/graph_13489039-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-8.jsonl b/split_edge/graph_13489039-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13489039-9.jsonl b/split_edge/graph_13489039-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13509391-0.jsonl b/split_edge/graph_13509391-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13509391-1.jsonl b/split_edge/graph_13509391-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-0.jsonl b/split_edge/graph_135371113-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-1.jsonl b/split_edge/graph_135371113-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-10.jsonl b/split_edge/graph_135371113-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-11.jsonl b/split_edge/graph_135371113-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-12.jsonl b/split_edge/graph_135371113-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-13.jsonl b/split_edge/graph_135371113-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-14.jsonl b/split_edge/graph_135371113-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-15.jsonl b/split_edge/graph_135371113-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-16.jsonl b/split_edge/graph_135371113-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-17.jsonl b/split_edge/graph_135371113-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-2.jsonl b/split_edge/graph_135371113-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-3.jsonl b/split_edge/graph_135371113-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-4.jsonl b/split_edge/graph_135371113-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-5.jsonl b/split_edge/graph_135371113-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-6.jsonl b/split_edge/graph_135371113-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-8.jsonl b/split_edge/graph_135371113-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135371113-9.jsonl b/split_edge/graph_135371113-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-0.jsonl b/split_edge/graph_13543356-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-10.jsonl b/split_edge/graph_13543356-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-11.jsonl b/split_edge/graph_13543356-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-12.jsonl b/split_edge/graph_13543356-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-13.jsonl b/split_edge/graph_13543356-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-14.jsonl b/split_edge/graph_13543356-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-15.jsonl b/split_edge/graph_13543356-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-16.jsonl b/split_edge/graph_13543356-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-17.jsonl b/split_edge/graph_13543356-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-18.jsonl b/split_edge/graph_13543356-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-19.jsonl b/split_edge/graph_13543356-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-21.jsonl b/split_edge/graph_13543356-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-22.jsonl b/split_edge/graph_13543356-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-23.jsonl b/split_edge/graph_13543356-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-24.jsonl b/split_edge/graph_13543356-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-25.jsonl b/split_edge/graph_13543356-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-26.jsonl b/split_edge/graph_13543356-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-28.jsonl b/split_edge/graph_13543356-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-3.jsonl b/split_edge/graph_13543356-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-31.jsonl b/split_edge/graph_13543356-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-32.jsonl b/split_edge/graph_13543356-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-4.jsonl b/split_edge/graph_13543356-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-5.jsonl b/split_edge/graph_13543356-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-6.jsonl b/split_edge/graph_13543356-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-7.jsonl b/split_edge/graph_13543356-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-8.jsonl b/split_edge/graph_13543356-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13543356-9.jsonl b/split_edge/graph_13543356-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-0.jsonl b/split_edge/graph_13558235-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-11.jsonl b/split_edge/graph_13558235-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-12.jsonl b/split_edge/graph_13558235-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-13.jsonl b/split_edge/graph_13558235-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-14.jsonl b/split_edge/graph_13558235-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-15.jsonl b/split_edge/graph_13558235-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-16.jsonl b/split_edge/graph_13558235-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-17.jsonl b/split_edge/graph_13558235-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-18.jsonl b/split_edge/graph_13558235-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-19.jsonl b/split_edge/graph_13558235-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-2.jsonl b/split_edge/graph_13558235-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-22.jsonl b/split_edge/graph_13558235-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-23.jsonl b/split_edge/graph_13558235-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-24.jsonl b/split_edge/graph_13558235-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-25.jsonl b/split_edge/graph_13558235-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-26.jsonl b/split_edge/graph_13558235-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-28.jsonl b/split_edge/graph_13558235-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-29.jsonl b/split_edge/graph_13558235-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-3.jsonl b/split_edge/graph_13558235-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-31.jsonl b/split_edge/graph_13558235-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-32.jsonl b/split_edge/graph_13558235-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-33.jsonl b/split_edge/graph_13558235-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-34.jsonl b/split_edge/graph_13558235-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-35.jsonl b/split_edge/graph_13558235-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-36.jsonl b/split_edge/graph_13558235-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-37.jsonl b/split_edge/graph_13558235-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-4.jsonl b/split_edge/graph_13558235-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-40.jsonl b/split_edge/graph_13558235-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-41.jsonl b/split_edge/graph_13558235-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-44.jsonl b/split_edge/graph_13558235-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-45.jsonl b/split_edge/graph_13558235-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-46.jsonl b/split_edge/graph_13558235-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-47.jsonl b/split_edge/graph_13558235-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-48.jsonl b/split_edge/graph_13558235-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-49.jsonl b/split_edge/graph_13558235-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-5.jsonl b/split_edge/graph_13558235-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-50.jsonl b/split_edge/graph_13558235-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-6.jsonl b/split_edge/graph_13558235-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-7.jsonl b/split_edge/graph_13558235-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-8.jsonl b/split_edge/graph_13558235-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13558235-9.jsonl b/split_edge/graph_13558235-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13592072-5.jsonl b/split_edge/graph_13592072-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135984067-4.jsonl b/split_edge/graph_135984067-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_135984067-9.jsonl b/split_edge/graph_135984067-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_136108105-0.jsonl b/split_edge/graph_136108105-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_136108105-1.jsonl b/split_edge/graph_136108105-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_136108105-16.jsonl b/split_edge/graph_136108105-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_136108105-22.jsonl b/split_edge/graph_136108105-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_136108105-4.jsonl b/split_edge/graph_136108105-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_136108105-52.jsonl b/split_edge/graph_136108105-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_136108105-56.jsonl b/split_edge/graph_136108105-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13650919-0.jsonl b/split_edge/graph_13650919-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13650919-10.jsonl b/split_edge/graph_13650919-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13650919-16.jsonl b/split_edge/graph_13650919-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13650919-2.jsonl b/split_edge/graph_13650919-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13650919-4.jsonl b/split_edge/graph_13650919-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13650919-9.jsonl b/split_edge/graph_13650919-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-0.jsonl b/split_edge/graph_13695008-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-11.jsonl b/split_edge/graph_13695008-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-12.jsonl b/split_edge/graph_13695008-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-13.jsonl b/split_edge/graph_13695008-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-15.jsonl b/split_edge/graph_13695008-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-16.jsonl b/split_edge/graph_13695008-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-17.jsonl b/split_edge/graph_13695008-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-18.jsonl b/split_edge/graph_13695008-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-19.jsonl b/split_edge/graph_13695008-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-20.jsonl b/split_edge/graph_13695008-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-21.jsonl b/split_edge/graph_13695008-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-22.jsonl b/split_edge/graph_13695008-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-23.jsonl b/split_edge/graph_13695008-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-24.jsonl b/split_edge/graph_13695008-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-25.jsonl b/split_edge/graph_13695008-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-28.jsonl b/split_edge/graph_13695008-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-29.jsonl b/split_edge/graph_13695008-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-30.jsonl b/split_edge/graph_13695008-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-33.jsonl b/split_edge/graph_13695008-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-34.jsonl b/split_edge/graph_13695008-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13695008-6.jsonl b/split_edge/graph_13695008-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-1.jsonl b/split_edge/graph_13702914-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-10.jsonl b/split_edge/graph_13702914-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-12.jsonl b/split_edge/graph_13702914-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-19.jsonl b/split_edge/graph_13702914-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-2.jsonl b/split_edge/graph_13702914-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-20.jsonl b/split_edge/graph_13702914-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-22.jsonl b/split_edge/graph_13702914-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-24.jsonl b/split_edge/graph_13702914-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-25.jsonl b/split_edge/graph_13702914-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-26.jsonl b/split_edge/graph_13702914-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-27.jsonl b/split_edge/graph_13702914-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-29.jsonl b/split_edge/graph_13702914-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-3.jsonl b/split_edge/graph_13702914-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-30.jsonl b/split_edge/graph_13702914-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-31.jsonl b/split_edge/graph_13702914-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-33.jsonl b/split_edge/graph_13702914-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-34.jsonl b/split_edge/graph_13702914-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-35.jsonl b/split_edge/graph_13702914-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-4.jsonl b/split_edge/graph_13702914-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-6.jsonl b/split_edge/graph_13702914-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-7.jsonl b/split_edge/graph_13702914-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13702914-9.jsonl b/split_edge/graph_13702914-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-0.jsonl b/split_edge/graph_13709273-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-10.jsonl b/split_edge/graph_13709273-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-12.jsonl b/split_edge/graph_13709273-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-13.jsonl b/split_edge/graph_13709273-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-14.jsonl b/split_edge/graph_13709273-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-15.jsonl b/split_edge/graph_13709273-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-16.jsonl b/split_edge/graph_13709273-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-17.jsonl b/split_edge/graph_13709273-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-18.jsonl b/split_edge/graph_13709273-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-19.jsonl b/split_edge/graph_13709273-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-2.jsonl b/split_edge/graph_13709273-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-20.jsonl b/split_edge/graph_13709273-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-21.jsonl b/split_edge/graph_13709273-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-24.jsonl b/split_edge/graph_13709273-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-25.jsonl b/split_edge/graph_13709273-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-26.jsonl b/split_edge/graph_13709273-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-28.jsonl b/split_edge/graph_13709273-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-3.jsonl b/split_edge/graph_13709273-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-30.jsonl b/split_edge/graph_13709273-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-31.jsonl b/split_edge/graph_13709273-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-32.jsonl b/split_edge/graph_13709273-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-33.jsonl b/split_edge/graph_13709273-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-34.jsonl b/split_edge/graph_13709273-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-35.jsonl b/split_edge/graph_13709273-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-4.jsonl b/split_edge/graph_13709273-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-5.jsonl b/split_edge/graph_13709273-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-6.jsonl b/split_edge/graph_13709273-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-7.jsonl b/split_edge/graph_13709273-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-8.jsonl b/split_edge/graph_13709273-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13709273-9.jsonl b/split_edge/graph_13709273-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-0.jsonl b/split_edge/graph_13745783-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-1.jsonl b/split_edge/graph_13745783-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-10.jsonl b/split_edge/graph_13745783-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-2.jsonl b/split_edge/graph_13745783-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-3.jsonl b/split_edge/graph_13745783-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-4.jsonl b/split_edge/graph_13745783-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-6.jsonl b/split_edge/graph_13745783-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-7.jsonl b/split_edge/graph_13745783-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-8.jsonl b/split_edge/graph_13745783-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745783-9.jsonl b/split_edge/graph_13745783-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-0.jsonl b/split_edge/graph_13745820-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-1.jsonl b/split_edge/graph_13745820-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-11.jsonl b/split_edge/graph_13745820-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-12.jsonl b/split_edge/graph_13745820-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-15.jsonl b/split_edge/graph_13745820-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-18.jsonl b/split_edge/graph_13745820-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-19.jsonl b/split_edge/graph_13745820-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-20.jsonl b/split_edge/graph_13745820-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-21.jsonl b/split_edge/graph_13745820-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-23.jsonl b/split_edge/graph_13745820-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-4.jsonl b/split_edge/graph_13745820-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13745820-5.jsonl b/split_edge/graph_13745820-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-0.jsonl b/split_edge/graph_13756560-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-10.jsonl b/split_edge/graph_13756560-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-11.jsonl b/split_edge/graph_13756560-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-12.jsonl b/split_edge/graph_13756560-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-13.jsonl b/split_edge/graph_13756560-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-14.jsonl b/split_edge/graph_13756560-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-15.jsonl b/split_edge/graph_13756560-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-16.jsonl b/split_edge/graph_13756560-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-17.jsonl b/split_edge/graph_13756560-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-18.jsonl b/split_edge/graph_13756560-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-19.jsonl b/split_edge/graph_13756560-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-2.jsonl b/split_edge/graph_13756560-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-20.jsonl b/split_edge/graph_13756560-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-21.jsonl b/split_edge/graph_13756560-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-22.jsonl b/split_edge/graph_13756560-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-24.jsonl b/split_edge/graph_13756560-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-27.jsonl b/split_edge/graph_13756560-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-28.jsonl b/split_edge/graph_13756560-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-3.jsonl b/split_edge/graph_13756560-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-31.jsonl b/split_edge/graph_13756560-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-4.jsonl b/split_edge/graph_13756560-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-5.jsonl b/split_edge/graph_13756560-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-6.jsonl b/split_edge/graph_13756560-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-7.jsonl b/split_edge/graph_13756560-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13756560-9.jsonl b/split_edge/graph_13756560-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-0.jsonl b/split_edge/graph_13768192-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-10.jsonl b/split_edge/graph_13768192-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-11.jsonl b/split_edge/graph_13768192-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-12.jsonl b/split_edge/graph_13768192-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-2.jsonl b/split_edge/graph_13768192-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-3.jsonl b/split_edge/graph_13768192-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-4.jsonl b/split_edge/graph_13768192-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-5.jsonl b/split_edge/graph_13768192-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-6.jsonl b/split_edge/graph_13768192-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-7.jsonl b/split_edge/graph_13768192-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13768192-9.jsonl b/split_edge/graph_13768192-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-0.jsonl b/split_edge/graph_1377349-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-1.jsonl b/split_edge/graph_1377349-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-10.jsonl b/split_edge/graph_1377349-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-11.jsonl b/split_edge/graph_1377349-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-12.jsonl b/split_edge/graph_1377349-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-13.jsonl b/split_edge/graph_1377349-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-2.jsonl b/split_edge/graph_1377349-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-3.jsonl b/split_edge/graph_1377349-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-4.jsonl b/split_edge/graph_1377349-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-5.jsonl b/split_edge/graph_1377349-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-6.jsonl b/split_edge/graph_1377349-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-7.jsonl b/split_edge/graph_1377349-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-8.jsonl b/split_edge/graph_1377349-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1377349-9.jsonl b/split_edge/graph_1377349-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-0.jsonl b/split_edge/graph_13835884-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-12.jsonl b/split_edge/graph_13835884-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-13.jsonl b/split_edge/graph_13835884-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-15.jsonl b/split_edge/graph_13835884-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-17.jsonl b/split_edge/graph_13835884-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-2.jsonl b/split_edge/graph_13835884-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-20.jsonl b/split_edge/graph_13835884-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-23.jsonl b/split_edge/graph_13835884-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-24.jsonl b/split_edge/graph_13835884-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-26.jsonl b/split_edge/graph_13835884-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-27.jsonl b/split_edge/graph_13835884-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-28.jsonl b/split_edge/graph_13835884-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-29.jsonl b/split_edge/graph_13835884-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-3.jsonl b/split_edge/graph_13835884-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-30.jsonl b/split_edge/graph_13835884-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-31.jsonl b/split_edge/graph_13835884-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-32.jsonl b/split_edge/graph_13835884-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-33.jsonl b/split_edge/graph_13835884-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-34.jsonl b/split_edge/graph_13835884-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-4.jsonl b/split_edge/graph_13835884-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-5.jsonl b/split_edge/graph_13835884-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-6.jsonl b/split_edge/graph_13835884-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-8.jsonl b/split_edge/graph_13835884-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13835884-9.jsonl b/split_edge/graph_13835884-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13872322-0.jsonl b/split_edge/graph_13872322-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13872322-3.jsonl b/split_edge/graph_13872322-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-10.jsonl b/split_edge/graph_13897660-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-13.jsonl b/split_edge/graph_13897660-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-14.jsonl b/split_edge/graph_13897660-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-15.jsonl b/split_edge/graph_13897660-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-16.jsonl b/split_edge/graph_13897660-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-17.jsonl b/split_edge/graph_13897660-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-3.jsonl b/split_edge/graph_13897660-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-4.jsonl b/split_edge/graph_13897660-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-5.jsonl b/split_edge/graph_13897660-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-6.jsonl b/split_edge/graph_13897660-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-8.jsonl b/split_edge/graph_13897660-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13897660-9.jsonl b/split_edge/graph_13897660-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-0.jsonl b/split_edge/graph_1389915-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-15.jsonl b/split_edge/graph_1389915-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-16.jsonl b/split_edge/graph_1389915-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-19.jsonl b/split_edge/graph_1389915-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-20.jsonl b/split_edge/graph_1389915-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-3.jsonl b/split_edge/graph_1389915-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-5.jsonl b/split_edge/graph_1389915-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1389915-9.jsonl b/split_edge/graph_1389915-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-0.jsonl b/split_edge/graph_139324200-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-1.jsonl b/split_edge/graph_139324200-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-10.jsonl b/split_edge/graph_139324200-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-12.jsonl b/split_edge/graph_139324200-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-13.jsonl b/split_edge/graph_139324200-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-14.jsonl b/split_edge/graph_139324200-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-16.jsonl b/split_edge/graph_139324200-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-2.jsonl b/split_edge/graph_139324200-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-4.jsonl b/split_edge/graph_139324200-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-6.jsonl b/split_edge/graph_139324200-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-7.jsonl b/split_edge/graph_139324200-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139324200-9.jsonl b/split_edge/graph_139324200-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-10.jsonl b/split_edge/graph_13932708-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-11.jsonl b/split_edge/graph_13932708-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-13.jsonl b/split_edge/graph_13932708-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-14.jsonl b/split_edge/graph_13932708-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-15.jsonl b/split_edge/graph_13932708-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-5.jsonl b/split_edge/graph_13932708-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-6.jsonl b/split_edge/graph_13932708-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13932708-9.jsonl b/split_edge/graph_13932708-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139624690-10.jsonl b/split_edge/graph_139624690-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139624690-6.jsonl b/split_edge/graph_139624690-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139624690-7.jsonl b/split_edge/graph_139624690-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139624690-8.jsonl b/split_edge/graph_139624690-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139624690-9.jsonl b/split_edge/graph_139624690-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-10.jsonl b/split_edge/graph_13975354-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-11.jsonl b/split_edge/graph_13975354-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-12.jsonl b/split_edge/graph_13975354-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-14.jsonl b/split_edge/graph_13975354-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-16.jsonl b/split_edge/graph_13975354-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-2.jsonl b/split_edge/graph_13975354-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-4.jsonl b/split_edge/graph_13975354-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-5.jsonl b/split_edge/graph_13975354-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-6.jsonl b/split_edge/graph_13975354-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-7.jsonl b/split_edge/graph_13975354-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-8.jsonl b/split_edge/graph_13975354-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13975354-9.jsonl b/split_edge/graph_13975354-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-0.jsonl b/split_edge/graph_13991708-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-10.jsonl b/split_edge/graph_13991708-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-13.jsonl b/split_edge/graph_13991708-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-17.jsonl b/split_edge/graph_13991708-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-18.jsonl b/split_edge/graph_13991708-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-19.jsonl b/split_edge/graph_13991708-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-22.jsonl b/split_edge/graph_13991708-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-24.jsonl b/split_edge/graph_13991708-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-25.jsonl b/split_edge/graph_13991708-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-26.jsonl b/split_edge/graph_13991708-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-27.jsonl b/split_edge/graph_13991708-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-28.jsonl b/split_edge/graph_13991708-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-29.jsonl b/split_edge/graph_13991708-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-30.jsonl b/split_edge/graph_13991708-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-31.jsonl b/split_edge/graph_13991708-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-32.jsonl b/split_edge/graph_13991708-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-33.jsonl b/split_edge/graph_13991708-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-36.jsonl b/split_edge/graph_13991708-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-38.jsonl b/split_edge/graph_13991708-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-39.jsonl b/split_edge/graph_13991708-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-4.jsonl b/split_edge/graph_13991708-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-40.jsonl b/split_edge/graph_13991708-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-41.jsonl b/split_edge/graph_13991708-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-44.jsonl b/split_edge/graph_13991708-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-45.jsonl b/split_edge/graph_13991708-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-46.jsonl b/split_edge/graph_13991708-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_13991708-9.jsonl b/split_edge/graph_13991708-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-0.jsonl b/split_edge/graph_139996738-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-10.jsonl b/split_edge/graph_139996738-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-12.jsonl b/split_edge/graph_139996738-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-13.jsonl b/split_edge/graph_139996738-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-15.jsonl b/split_edge/graph_139996738-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-16.jsonl b/split_edge/graph_139996738-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-17.jsonl b/split_edge/graph_139996738-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-18.jsonl b/split_edge/graph_139996738-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-19.jsonl b/split_edge/graph_139996738-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-20.jsonl b/split_edge/graph_139996738-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-21.jsonl b/split_edge/graph_139996738-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-22.jsonl b/split_edge/graph_139996738-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-23.jsonl b/split_edge/graph_139996738-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-24.jsonl b/split_edge/graph_139996738-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-27.jsonl b/split_edge/graph_139996738-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-28.jsonl b/split_edge/graph_139996738-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-3.jsonl b/split_edge/graph_139996738-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-31.jsonl b/split_edge/graph_139996738-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-32.jsonl b/split_edge/graph_139996738-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-34.jsonl b/split_edge/graph_139996738-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-35.jsonl b/split_edge/graph_139996738-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-36.jsonl b/split_edge/graph_139996738-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-38.jsonl b/split_edge/graph_139996738-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-39.jsonl b/split_edge/graph_139996738-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-40.jsonl b/split_edge/graph_139996738-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-41.jsonl b/split_edge/graph_139996738-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-5.jsonl b/split_edge/graph_139996738-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-8.jsonl b/split_edge/graph_139996738-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_139996738-9.jsonl b/split_edge/graph_139996738-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-0.jsonl b/split_edge/graph_14017332-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-13.jsonl b/split_edge/graph_14017332-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-14.jsonl b/split_edge/graph_14017332-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-15.jsonl b/split_edge/graph_14017332-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-16.jsonl b/split_edge/graph_14017332-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-17.jsonl b/split_edge/graph_14017332-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-18.jsonl b/split_edge/graph_14017332-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-19.jsonl b/split_edge/graph_14017332-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-20.jsonl b/split_edge/graph_14017332-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-21.jsonl b/split_edge/graph_14017332-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-22.jsonl b/split_edge/graph_14017332-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-7.jsonl b/split_edge/graph_14017332-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14017332-9.jsonl b/split_edge/graph_14017332-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14039733-1.jsonl b/split_edge/graph_14039733-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14039733-12.jsonl b/split_edge/graph_14039733-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14039733-14.jsonl b/split_edge/graph_14039733-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14039733-15.jsonl b/split_edge/graph_14039733-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14039733-4.jsonl b/split_edge/graph_14039733-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14039733-7.jsonl b/split_edge/graph_14039733-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14039733-9.jsonl b/split_edge/graph_14039733-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14068482-10.jsonl b/split_edge/graph_14068482-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14068482-2.jsonl b/split_edge/graph_14068482-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14068482-5.jsonl b/split_edge/graph_14068482-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14068482-7.jsonl b/split_edge/graph_14068482-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14068482-9.jsonl b/split_edge/graph_14068482-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-0.jsonl b/split_edge/graph_14077778-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-11.jsonl b/split_edge/graph_14077778-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-12.jsonl b/split_edge/graph_14077778-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-13.jsonl b/split_edge/graph_14077778-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-15.jsonl b/split_edge/graph_14077778-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-18.jsonl b/split_edge/graph_14077778-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-19.jsonl b/split_edge/graph_14077778-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-3.jsonl b/split_edge/graph_14077778-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-8.jsonl b/split_edge/graph_14077778-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14077778-9.jsonl b/split_edge/graph_14077778-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-0.jsonl b/split_edge/graph_14078382-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-14.jsonl b/split_edge/graph_14078382-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-15.jsonl b/split_edge/graph_14078382-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-18.jsonl b/split_edge/graph_14078382-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-19.jsonl b/split_edge/graph_14078382-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-22.jsonl b/split_edge/graph_14078382-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-23.jsonl b/split_edge/graph_14078382-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-6.jsonl b/split_edge/graph_14078382-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14078382-9.jsonl b/split_edge/graph_14078382-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-0.jsonl b/split_edge/graph_14102427-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-1.jsonl b/split_edge/graph_14102427-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-10.jsonl b/split_edge/graph_14102427-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-12.jsonl b/split_edge/graph_14102427-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-13.jsonl b/split_edge/graph_14102427-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-14.jsonl b/split_edge/graph_14102427-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-15.jsonl b/split_edge/graph_14102427-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-16.jsonl b/split_edge/graph_14102427-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-17.jsonl b/split_edge/graph_14102427-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-18.jsonl b/split_edge/graph_14102427-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-19.jsonl b/split_edge/graph_14102427-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-2.jsonl b/split_edge/graph_14102427-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-20.jsonl b/split_edge/graph_14102427-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-23.jsonl b/split_edge/graph_14102427-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-25.jsonl b/split_edge/graph_14102427-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-26.jsonl b/split_edge/graph_14102427-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-27.jsonl b/split_edge/graph_14102427-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-29.jsonl b/split_edge/graph_14102427-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-3.jsonl b/split_edge/graph_14102427-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-33.jsonl b/split_edge/graph_14102427-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-35.jsonl b/split_edge/graph_14102427-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-36.jsonl b/split_edge/graph_14102427-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-37.jsonl b/split_edge/graph_14102427-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-4.jsonl b/split_edge/graph_14102427-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-6.jsonl b/split_edge/graph_14102427-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-7.jsonl b/split_edge/graph_14102427-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-8.jsonl b/split_edge/graph_14102427-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14102427-9.jsonl b/split_edge/graph_14102427-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-1.jsonl b/split_edge/graph_14111742-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-12.jsonl b/split_edge/graph_14111742-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-13.jsonl b/split_edge/graph_14111742-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-2.jsonl b/split_edge/graph_14111742-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-21.jsonl b/split_edge/graph_14111742-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-22.jsonl b/split_edge/graph_14111742-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-23.jsonl b/split_edge/graph_14111742-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-25.jsonl b/split_edge/graph_14111742-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-26.jsonl b/split_edge/graph_14111742-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-27.jsonl b/split_edge/graph_14111742-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-29.jsonl b/split_edge/graph_14111742-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-30.jsonl b/split_edge/graph_14111742-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-31.jsonl b/split_edge/graph_14111742-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-32.jsonl b/split_edge/graph_14111742-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-33.jsonl b/split_edge/graph_14111742-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-34.jsonl b/split_edge/graph_14111742-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-35.jsonl b/split_edge/graph_14111742-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-36.jsonl b/split_edge/graph_14111742-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-5.jsonl b/split_edge/graph_14111742-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14111742-7.jsonl b/split_edge/graph_14111742-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-0.jsonl b/split_edge/graph_14173470-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-1.jsonl b/split_edge/graph_14173470-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-10.jsonl b/split_edge/graph_14173470-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-11.jsonl b/split_edge/graph_14173470-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-12.jsonl b/split_edge/graph_14173470-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-2.jsonl b/split_edge/graph_14173470-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-3.jsonl b/split_edge/graph_14173470-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-5.jsonl b/split_edge/graph_14173470-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-6.jsonl b/split_edge/graph_14173470-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-7.jsonl b/split_edge/graph_14173470-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-8.jsonl b/split_edge/graph_14173470-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14173470-9.jsonl b/split_edge/graph_14173470-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-0.jsonl b/split_edge/graph_14193725-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-1.jsonl b/split_edge/graph_14193725-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-10.jsonl b/split_edge/graph_14193725-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-11.jsonl b/split_edge/graph_14193725-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-12.jsonl b/split_edge/graph_14193725-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-13.jsonl b/split_edge/graph_14193725-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-14.jsonl b/split_edge/graph_14193725-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-16.jsonl b/split_edge/graph_14193725-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-17.jsonl b/split_edge/graph_14193725-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-20.jsonl b/split_edge/graph_14193725-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-21.jsonl b/split_edge/graph_14193725-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-23.jsonl b/split_edge/graph_14193725-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-24.jsonl b/split_edge/graph_14193725-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-25.jsonl b/split_edge/graph_14193725-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-4.jsonl b/split_edge/graph_14193725-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-5.jsonl b/split_edge/graph_14193725-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-6.jsonl b/split_edge/graph_14193725-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-7.jsonl b/split_edge/graph_14193725-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14193725-9.jsonl b/split_edge/graph_14193725-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-0.jsonl b/split_edge/graph_14201195-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-1.jsonl b/split_edge/graph_14201195-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-12.jsonl b/split_edge/graph_14201195-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-2.jsonl b/split_edge/graph_14201195-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-4.jsonl b/split_edge/graph_14201195-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-6.jsonl b/split_edge/graph_14201195-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-7.jsonl b/split_edge/graph_14201195-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14201195-8.jsonl b/split_edge/graph_14201195-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14210987-0.jsonl b/split_edge/graph_14210987-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14210987-1.jsonl b/split_edge/graph_14210987-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14210987-2.jsonl b/split_edge/graph_14210987-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14210987-3.jsonl b/split_edge/graph_14210987-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14228694-0.jsonl b/split_edge/graph_14228694-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14228694-11.jsonl b/split_edge/graph_14228694-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14228694-13.jsonl b/split_edge/graph_14228694-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14228694-3.jsonl b/split_edge/graph_14228694-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14228694-4.jsonl b/split_edge/graph_14228694-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-0.jsonl b/split_edge/graph_14229975-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-1.jsonl b/split_edge/graph_14229975-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-12.jsonl b/split_edge/graph_14229975-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-13.jsonl b/split_edge/graph_14229975-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-14.jsonl b/split_edge/graph_14229975-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-19.jsonl b/split_edge/graph_14229975-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-20.jsonl b/split_edge/graph_14229975-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-21.jsonl b/split_edge/graph_14229975-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-3.jsonl b/split_edge/graph_14229975-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14229975-5.jsonl b/split_edge/graph_14229975-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14239944-0.jsonl b/split_edge/graph_14239944-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14239944-1.jsonl b/split_edge/graph_14239944-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14239944-2.jsonl b/split_edge/graph_14239944-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14239944-3.jsonl b/split_edge/graph_14239944-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14239944-4.jsonl b/split_edge/graph_14239944-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14239944-5.jsonl b/split_edge/graph_14239944-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14239944-6.jsonl b/split_edge/graph_14239944-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-0.jsonl b/split_edge/graph_14242763-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-10.jsonl b/split_edge/graph_14242763-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-11.jsonl b/split_edge/graph_14242763-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-12.jsonl b/split_edge/graph_14242763-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-13.jsonl b/split_edge/graph_14242763-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-15.jsonl b/split_edge/graph_14242763-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-16.jsonl b/split_edge/graph_14242763-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-17.jsonl b/split_edge/graph_14242763-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-18.jsonl b/split_edge/graph_14242763-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-19.jsonl b/split_edge/graph_14242763-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-20.jsonl b/split_edge/graph_14242763-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-22.jsonl b/split_edge/graph_14242763-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-24.jsonl b/split_edge/graph_14242763-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-26.jsonl b/split_edge/graph_14242763-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-30.jsonl b/split_edge/graph_14242763-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-36.jsonl b/split_edge/graph_14242763-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-38.jsonl b/split_edge/graph_14242763-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-39.jsonl b/split_edge/graph_14242763-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-8.jsonl b/split_edge/graph_14242763-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14242763-9.jsonl b/split_edge/graph_14242763-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14314911-1.jsonl b/split_edge/graph_14314911-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14314911-3.jsonl b/split_edge/graph_14314911-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14315321-0.jsonl b/split_edge/graph_14315321-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14315321-12.jsonl b/split_edge/graph_14315321-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14340163-0.jsonl b/split_edge/graph_14340163-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14340163-2.jsonl b/split_edge/graph_14340163-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14340163-3.jsonl b/split_edge/graph_14340163-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14340163-4.jsonl b/split_edge/graph_14340163-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14340163-5.jsonl b/split_edge/graph_14340163-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14340163-6.jsonl b/split_edge/graph_14340163-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-10.jsonl b/split_edge/graph_14397159-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-11.jsonl b/split_edge/graph_14397159-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-12.jsonl b/split_edge/graph_14397159-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-13.jsonl b/split_edge/graph_14397159-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-14.jsonl b/split_edge/graph_14397159-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-15.jsonl b/split_edge/graph_14397159-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-16.jsonl b/split_edge/graph_14397159-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-17.jsonl b/split_edge/graph_14397159-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-18.jsonl b/split_edge/graph_14397159-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-20.jsonl b/split_edge/graph_14397159-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-24.jsonl b/split_edge/graph_14397159-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-25.jsonl b/split_edge/graph_14397159-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-27.jsonl b/split_edge/graph_14397159-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-3.jsonl b/split_edge/graph_14397159-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-30.jsonl b/split_edge/graph_14397159-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-4.jsonl b/split_edge/graph_14397159-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-5.jsonl b/split_edge/graph_14397159-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-6.jsonl b/split_edge/graph_14397159-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14397159-8.jsonl b/split_edge/graph_14397159-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-0.jsonl b/split_edge/graph_14409099-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-1.jsonl b/split_edge/graph_14409099-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-10.jsonl b/split_edge/graph_14409099-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-11.jsonl b/split_edge/graph_14409099-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-12.jsonl b/split_edge/graph_14409099-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-14.jsonl b/split_edge/graph_14409099-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-16.jsonl b/split_edge/graph_14409099-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-18.jsonl b/split_edge/graph_14409099-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-19.jsonl b/split_edge/graph_14409099-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-20.jsonl b/split_edge/graph_14409099-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-23.jsonl b/split_edge/graph_14409099-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-24.jsonl b/split_edge/graph_14409099-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-25.jsonl b/split_edge/graph_14409099-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-26.jsonl b/split_edge/graph_14409099-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-27.jsonl b/split_edge/graph_14409099-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-3.jsonl b/split_edge/graph_14409099-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-5.jsonl b/split_edge/graph_14409099-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-6.jsonl b/split_edge/graph_14409099-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14409099-8.jsonl b/split_edge/graph_14409099-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-1.jsonl b/split_edge/graph_14438457-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-11.jsonl b/split_edge/graph_14438457-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-12.jsonl b/split_edge/graph_14438457-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-13.jsonl b/split_edge/graph_14438457-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-14.jsonl b/split_edge/graph_14438457-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-15.jsonl b/split_edge/graph_14438457-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-16.jsonl b/split_edge/graph_14438457-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-17.jsonl b/split_edge/graph_14438457-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-18.jsonl b/split_edge/graph_14438457-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-19.jsonl b/split_edge/graph_14438457-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-2.jsonl b/split_edge/graph_14438457-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-20.jsonl b/split_edge/graph_14438457-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-21.jsonl b/split_edge/graph_14438457-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-22.jsonl b/split_edge/graph_14438457-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-23.jsonl b/split_edge/graph_14438457-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-5.jsonl b/split_edge/graph_14438457-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-6.jsonl b/split_edge/graph_14438457-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-7.jsonl b/split_edge/graph_14438457-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14438457-9.jsonl b/split_edge/graph_14438457-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14441987-0.jsonl b/split_edge/graph_14441987-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14441987-1.jsonl b/split_edge/graph_14441987-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14441987-10.jsonl b/split_edge/graph_14441987-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14441987-2.jsonl b/split_edge/graph_14441987-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14441987-5.jsonl b/split_edge/graph_14441987-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14441987-6.jsonl b/split_edge/graph_14441987-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14441987-8.jsonl b/split_edge/graph_14441987-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-1.jsonl b/split_edge/graph_14472159-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-21.jsonl b/split_edge/graph_14472159-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-23.jsonl b/split_edge/graph_14472159-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-25.jsonl b/split_edge/graph_14472159-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-27.jsonl b/split_edge/graph_14472159-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-5.jsonl b/split_edge/graph_14472159-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-7.jsonl b/split_edge/graph_14472159-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14472159-8.jsonl b/split_edge/graph_14472159-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-0.jsonl b/split_edge/graph_14513433-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-1.jsonl b/split_edge/graph_14513433-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-10.jsonl b/split_edge/graph_14513433-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-11.jsonl b/split_edge/graph_14513433-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-12.jsonl b/split_edge/graph_14513433-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-14.jsonl b/split_edge/graph_14513433-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-15.jsonl b/split_edge/graph_14513433-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-16.jsonl b/split_edge/graph_14513433-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-17.jsonl b/split_edge/graph_14513433-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-18.jsonl b/split_edge/graph_14513433-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-19.jsonl b/split_edge/graph_14513433-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-2.jsonl b/split_edge/graph_14513433-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-20.jsonl b/split_edge/graph_14513433-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-21.jsonl b/split_edge/graph_14513433-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-3.jsonl b/split_edge/graph_14513433-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-4.jsonl b/split_edge/graph_14513433-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-5.jsonl b/split_edge/graph_14513433-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-6.jsonl b/split_edge/graph_14513433-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14513433-9.jsonl b/split_edge/graph_14513433-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14519452-0.jsonl b/split_edge/graph_14519452-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14519452-1.jsonl b/split_edge/graph_14519452-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14519452-10.jsonl b/split_edge/graph_14519452-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14519452-11.jsonl b/split_edge/graph_14519452-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14519452-13.jsonl b/split_edge/graph_14519452-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14519452-14.jsonl b/split_edge/graph_14519452-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14519452-5.jsonl b/split_edge/graph_14519452-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-1.jsonl b/split_edge/graph_14521941-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-12.jsonl b/split_edge/graph_14521941-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-13.jsonl b/split_edge/graph_14521941-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-16.jsonl b/split_edge/graph_14521941-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-17.jsonl b/split_edge/graph_14521941-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-18.jsonl b/split_edge/graph_14521941-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-19.jsonl b/split_edge/graph_14521941-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-20.jsonl b/split_edge/graph_14521941-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-21.jsonl b/split_edge/graph_14521941-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-22.jsonl b/split_edge/graph_14521941-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-23.jsonl b/split_edge/graph_14521941-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-24.jsonl b/split_edge/graph_14521941-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-25.jsonl b/split_edge/graph_14521941-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-26.jsonl b/split_edge/graph_14521941-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-28.jsonl b/split_edge/graph_14521941-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-29.jsonl b/split_edge/graph_14521941-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-3.jsonl b/split_edge/graph_14521941-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-4.jsonl b/split_edge/graph_14521941-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-5.jsonl b/split_edge/graph_14521941-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-6.jsonl b/split_edge/graph_14521941-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-8.jsonl b/split_edge/graph_14521941-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14521941-9.jsonl b/split_edge/graph_14521941-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14541779-11.jsonl b/split_edge/graph_14541779-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14541779-13.jsonl b/split_edge/graph_14541779-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14541779-6.jsonl b/split_edge/graph_14541779-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14541779-7.jsonl b/split_edge/graph_14541779-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-0.jsonl b/split_edge/graph_14596200-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-11.jsonl b/split_edge/graph_14596200-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-13.jsonl b/split_edge/graph_14596200-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-14.jsonl b/split_edge/graph_14596200-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-3.jsonl b/split_edge/graph_14596200-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-4.jsonl b/split_edge/graph_14596200-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-5.jsonl b/split_edge/graph_14596200-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-6.jsonl b/split_edge/graph_14596200-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14596200-8.jsonl b/split_edge/graph_14596200-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-1.jsonl b/split_edge/graph_14599895-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-10.jsonl b/split_edge/graph_14599895-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-11.jsonl b/split_edge/graph_14599895-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-12.jsonl b/split_edge/graph_14599895-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-13.jsonl b/split_edge/graph_14599895-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-14.jsonl b/split_edge/graph_14599895-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-15.jsonl b/split_edge/graph_14599895-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-19.jsonl b/split_edge/graph_14599895-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-2.jsonl b/split_edge/graph_14599895-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-20.jsonl b/split_edge/graph_14599895-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-21.jsonl b/split_edge/graph_14599895-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-22.jsonl b/split_edge/graph_14599895-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-23.jsonl b/split_edge/graph_14599895-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-24.jsonl b/split_edge/graph_14599895-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-26.jsonl b/split_edge/graph_14599895-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-29.jsonl b/split_edge/graph_14599895-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-30.jsonl b/split_edge/graph_14599895-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-32.jsonl b/split_edge/graph_14599895-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-33.jsonl b/split_edge/graph_14599895-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-34.jsonl b/split_edge/graph_14599895-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-36.jsonl b/split_edge/graph_14599895-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-38.jsonl b/split_edge/graph_14599895-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-42.jsonl b/split_edge/graph_14599895-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-43.jsonl b/split_edge/graph_14599895-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-44.jsonl b/split_edge/graph_14599895-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-7.jsonl b/split_edge/graph_14599895-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14599895-9.jsonl b/split_edge/graph_14599895-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146031886-0.jsonl b/split_edge/graph_146031886-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146031886-2.jsonl b/split_edge/graph_146031886-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146031886-3.jsonl b/split_edge/graph_146031886-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146031886-4.jsonl b/split_edge/graph_146031886-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-0.jsonl b/split_edge/graph_146059665-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-1.jsonl b/split_edge/graph_146059665-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-12.jsonl b/split_edge/graph_146059665-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-13.jsonl b/split_edge/graph_146059665-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-14.jsonl b/split_edge/graph_146059665-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-15.jsonl b/split_edge/graph_146059665-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-19.jsonl b/split_edge/graph_146059665-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-22.jsonl b/split_edge/graph_146059665-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-23.jsonl b/split_edge/graph_146059665-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-3.jsonl b/split_edge/graph_146059665-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-4.jsonl b/split_edge/graph_146059665-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-5.jsonl b/split_edge/graph_146059665-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-7.jsonl b/split_edge/graph_146059665-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_146059665-8.jsonl b/split_edge/graph_146059665-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14617547-5.jsonl b/split_edge/graph_14617547-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-0.jsonl b/split_edge/graph_14621045-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-10.jsonl b/split_edge/graph_14621045-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-12.jsonl b/split_edge/graph_14621045-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-13.jsonl b/split_edge/graph_14621045-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-3.jsonl b/split_edge/graph_14621045-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-4.jsonl b/split_edge/graph_14621045-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-5.jsonl b/split_edge/graph_14621045-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-6.jsonl b/split_edge/graph_14621045-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14621045-8.jsonl b/split_edge/graph_14621045-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14638537-0.jsonl b/split_edge/graph_14638537-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14638537-2.jsonl b/split_edge/graph_14638537-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14638537-3.jsonl b/split_edge/graph_14638537-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14638537-4.jsonl b/split_edge/graph_14638537-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14638537-5.jsonl b/split_edge/graph_14638537-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14638537-6.jsonl b/split_edge/graph_14638537-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14644374-1.jsonl b/split_edge/graph_14644374-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14644374-2.jsonl b/split_edge/graph_14644374-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14644374-3.jsonl b/split_edge/graph_14644374-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-0.jsonl b/split_edge/graph_14649057-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-10.jsonl b/split_edge/graph_14649057-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-2.jsonl b/split_edge/graph_14649057-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-3.jsonl b/split_edge/graph_14649057-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-4.jsonl b/split_edge/graph_14649057-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-5.jsonl b/split_edge/graph_14649057-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-6.jsonl b/split_edge/graph_14649057-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-7.jsonl b/split_edge/graph_14649057-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-8.jsonl b/split_edge/graph_14649057-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14649057-9.jsonl b/split_edge/graph_14649057-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14655980-18.jsonl b/split_edge/graph_14655980-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14655980-4.jsonl b/split_edge/graph_14655980-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-10.jsonl b/split_edge/graph_14669932-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-11.jsonl b/split_edge/graph_14669932-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-12.jsonl b/split_edge/graph_14669932-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-16.jsonl b/split_edge/graph_14669932-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-17.jsonl b/split_edge/graph_14669932-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-2.jsonl b/split_edge/graph_14669932-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-20.jsonl b/split_edge/graph_14669932-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-21.jsonl b/split_edge/graph_14669932-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-8.jsonl b/split_edge/graph_14669932-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14669932-9.jsonl b/split_edge/graph_14669932-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14718434-10.jsonl b/split_edge/graph_14718434-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14718434-11.jsonl b/split_edge/graph_14718434-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14718434-12.jsonl b/split_edge/graph_14718434-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14718434-14.jsonl b/split_edge/graph_14718434-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14718434-3.jsonl b/split_edge/graph_14718434-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14718434-4.jsonl b/split_edge/graph_14718434-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14718434-8.jsonl b/split_edge/graph_14718434-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-1.jsonl b/split_edge/graph_14818636-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-13.jsonl b/split_edge/graph_14818636-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-3.jsonl b/split_edge/graph_14818636-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-4.jsonl b/split_edge/graph_14818636-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-5.jsonl b/split_edge/graph_14818636-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-6.jsonl b/split_edge/graph_14818636-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-7.jsonl b/split_edge/graph_14818636-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-8.jsonl b/split_edge/graph_14818636-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14818636-9.jsonl b/split_edge/graph_14818636-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-0.jsonl b/split_edge/graph_14828850-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-1.jsonl b/split_edge/graph_14828850-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-17.jsonl b/split_edge/graph_14828850-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-18.jsonl b/split_edge/graph_14828850-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-19.jsonl b/split_edge/graph_14828850-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-20.jsonl b/split_edge/graph_14828850-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-21.jsonl b/split_edge/graph_14828850-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14828850-22.jsonl b/split_edge/graph_14828850-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1483907-1.jsonl b/split_edge/graph_1483907-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1483907-2.jsonl b/split_edge/graph_1483907-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1483907-23.jsonl b/split_edge/graph_1483907-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14858505-2.jsonl b/split_edge/graph_14858505-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14858505-3.jsonl b/split_edge/graph_14858505-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14858505-4.jsonl b/split_edge/graph_14858505-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14858505-5.jsonl b/split_edge/graph_14858505-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14858505-6.jsonl b/split_edge/graph_14858505-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14858505-8.jsonl b/split_edge/graph_14858505-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14858505-9.jsonl b/split_edge/graph_14858505-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14904483-0.jsonl b/split_edge/graph_14904483-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14904483-1.jsonl b/split_edge/graph_14904483-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14904483-3.jsonl b/split_edge/graph_14904483-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14904483-4.jsonl b/split_edge/graph_14904483-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14904483-5.jsonl b/split_edge/graph_14904483-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14904483-9.jsonl b/split_edge/graph_14904483-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14953934-0.jsonl b/split_edge/graph_14953934-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14953934-1.jsonl b/split_edge/graph_14953934-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14953934-10.jsonl b/split_edge/graph_14953934-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14953934-2.jsonl b/split_edge/graph_14953934-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14953934-3.jsonl b/split_edge/graph_14953934-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_14953934-8.jsonl b/split_edge/graph_14953934-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149699465-0.jsonl b/split_edge/graph_149699465-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149699465-2.jsonl b/split_edge/graph_149699465-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149699465-3.jsonl b/split_edge/graph_149699465-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149699465-4.jsonl b/split_edge/graph_149699465-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149699465-5.jsonl b/split_edge/graph_149699465-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149699465-6.jsonl b/split_edge/graph_149699465-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149699465-7.jsonl b/split_edge/graph_149699465-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149929075-0.jsonl b/split_edge/graph_149929075-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149929075-4.jsonl b/split_edge/graph_149929075-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149929075-5.jsonl b/split_edge/graph_149929075-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_149929075-6.jsonl b/split_edge/graph_149929075-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15003890-0.jsonl b/split_edge/graph_15003890-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15003890-10.jsonl b/split_edge/graph_15003890-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_150368438-1.jsonl b/split_edge/graph_150368438-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_150368438-2.jsonl b/split_edge/graph_150368438-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_150368438-3.jsonl b/split_edge/graph_150368438-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_150368438-4.jsonl b/split_edge/graph_150368438-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_150368438-5.jsonl b/split_edge/graph_150368438-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_150368438-6.jsonl b/split_edge/graph_150368438-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_150368438-7.jsonl b/split_edge/graph_150368438-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-0.jsonl b/split_edge/graph_15079636-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-1.jsonl b/split_edge/graph_15079636-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-10.jsonl b/split_edge/graph_15079636-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-11.jsonl b/split_edge/graph_15079636-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-12.jsonl b/split_edge/graph_15079636-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-13.jsonl b/split_edge/graph_15079636-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-2.jsonl b/split_edge/graph_15079636-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-4.jsonl b/split_edge/graph_15079636-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-5.jsonl b/split_edge/graph_15079636-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-6.jsonl b/split_edge/graph_15079636-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15079636-8.jsonl b/split_edge/graph_15079636-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15098109-0.jsonl b/split_edge/graph_15098109-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-0.jsonl b/split_edge/graph_15128855-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-10.jsonl b/split_edge/graph_15128855-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-11.jsonl b/split_edge/graph_15128855-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-12.jsonl b/split_edge/graph_15128855-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-13.jsonl b/split_edge/graph_15128855-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-2.jsonl b/split_edge/graph_15128855-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-3.jsonl b/split_edge/graph_15128855-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-5.jsonl b/split_edge/graph_15128855-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-6.jsonl b/split_edge/graph_15128855-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-7.jsonl b/split_edge/graph_15128855-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-8.jsonl b/split_edge/graph_15128855-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15128855-9.jsonl b/split_edge/graph_15128855-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-1.jsonl b/split_edge/graph_15136633-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-12.jsonl b/split_edge/graph_15136633-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-13.jsonl b/split_edge/graph_15136633-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-14.jsonl b/split_edge/graph_15136633-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-15.jsonl b/split_edge/graph_15136633-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-16.jsonl b/split_edge/graph_15136633-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-17.jsonl b/split_edge/graph_15136633-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-18.jsonl b/split_edge/graph_15136633-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-19.jsonl b/split_edge/graph_15136633-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15136633-7.jsonl b/split_edge/graph_15136633-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-0.jsonl b/split_edge/graph_15153561-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-10.jsonl b/split_edge/graph_15153561-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-12.jsonl b/split_edge/graph_15153561-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-13.jsonl b/split_edge/graph_15153561-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-14.jsonl b/split_edge/graph_15153561-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-15.jsonl b/split_edge/graph_15153561-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-2.jsonl b/split_edge/graph_15153561-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-20.jsonl b/split_edge/graph_15153561-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-27.jsonl b/split_edge/graph_15153561-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-30.jsonl b/split_edge/graph_15153561-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-4.jsonl b/split_edge/graph_15153561-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15153561-5.jsonl b/split_edge/graph_15153561-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-0.jsonl b/split_edge/graph_15170341-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-10.jsonl b/split_edge/graph_15170341-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-2.jsonl b/split_edge/graph_15170341-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-3.jsonl b/split_edge/graph_15170341-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-4.jsonl b/split_edge/graph_15170341-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-6.jsonl b/split_edge/graph_15170341-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-7.jsonl b/split_edge/graph_15170341-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-8.jsonl b/split_edge/graph_15170341-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15170341-9.jsonl b/split_edge/graph_15170341-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-0.jsonl b/split_edge/graph_15174674-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-1.jsonl b/split_edge/graph_15174674-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-10.jsonl b/split_edge/graph_15174674-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-11.jsonl b/split_edge/graph_15174674-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-12.jsonl b/split_edge/graph_15174674-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-13.jsonl b/split_edge/graph_15174674-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-14.jsonl b/split_edge/graph_15174674-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-15.jsonl b/split_edge/graph_15174674-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-17.jsonl b/split_edge/graph_15174674-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-18.jsonl b/split_edge/graph_15174674-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-19.jsonl b/split_edge/graph_15174674-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-22.jsonl b/split_edge/graph_15174674-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-23.jsonl b/split_edge/graph_15174674-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-25.jsonl b/split_edge/graph_15174674-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-26.jsonl b/split_edge/graph_15174674-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-27.jsonl b/split_edge/graph_15174674-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-28.jsonl b/split_edge/graph_15174674-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-3.jsonl b/split_edge/graph_15174674-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-30.jsonl b/split_edge/graph_15174674-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-31.jsonl b/split_edge/graph_15174674-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-32.jsonl b/split_edge/graph_15174674-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-33.jsonl b/split_edge/graph_15174674-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-34.jsonl b/split_edge/graph_15174674-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-4.jsonl b/split_edge/graph_15174674-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-5.jsonl b/split_edge/graph_15174674-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-6.jsonl b/split_edge/graph_15174674-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-7.jsonl b/split_edge/graph_15174674-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-8.jsonl b/split_edge/graph_15174674-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15174674-9.jsonl b/split_edge/graph_15174674-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-0.jsonl b/split_edge/graph_15178364-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-1.jsonl b/split_edge/graph_15178364-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-10.jsonl b/split_edge/graph_15178364-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-11.jsonl b/split_edge/graph_15178364-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-12.jsonl b/split_edge/graph_15178364-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-13.jsonl b/split_edge/graph_15178364-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-14.jsonl b/split_edge/graph_15178364-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-15.jsonl b/split_edge/graph_15178364-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-3.jsonl b/split_edge/graph_15178364-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-4.jsonl b/split_edge/graph_15178364-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-5.jsonl b/split_edge/graph_15178364-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-6.jsonl b/split_edge/graph_15178364-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-7.jsonl b/split_edge/graph_15178364-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-8.jsonl b/split_edge/graph_15178364-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15178364-9.jsonl b/split_edge/graph_15178364-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-0.jsonl b/split_edge/graph_15252929-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-14.jsonl b/split_edge/graph_15252929-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-15.jsonl b/split_edge/graph_15252929-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-16.jsonl b/split_edge/graph_15252929-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-17.jsonl b/split_edge/graph_15252929-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-20.jsonl b/split_edge/graph_15252929-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-22.jsonl b/split_edge/graph_15252929-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-24.jsonl b/split_edge/graph_15252929-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-25.jsonl b/split_edge/graph_15252929-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-26.jsonl b/split_edge/graph_15252929-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-27.jsonl b/split_edge/graph_15252929-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-28.jsonl b/split_edge/graph_15252929-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-3.jsonl b/split_edge/graph_15252929-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-30.jsonl b/split_edge/graph_15252929-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-31.jsonl b/split_edge/graph_15252929-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-33.jsonl b/split_edge/graph_15252929-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-5.jsonl b/split_edge/graph_15252929-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15252929-8.jsonl b/split_edge/graph_15252929-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-0.jsonl b/split_edge/graph_1525467-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-1.jsonl b/split_edge/graph_1525467-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-10.jsonl b/split_edge/graph_1525467-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-11.jsonl b/split_edge/graph_1525467-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-2.jsonl b/split_edge/graph_1525467-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-3.jsonl b/split_edge/graph_1525467-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-6.jsonl b/split_edge/graph_1525467-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-7.jsonl b/split_edge/graph_1525467-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1525467-9.jsonl b/split_edge/graph_1525467-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-0.jsonl b/split_edge/graph_15295073-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-1.jsonl b/split_edge/graph_15295073-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-10.jsonl b/split_edge/graph_15295073-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-14.jsonl b/split_edge/graph_15295073-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-18.jsonl b/split_edge/graph_15295073-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-19.jsonl b/split_edge/graph_15295073-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-24.jsonl b/split_edge/graph_15295073-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-5.jsonl b/split_edge/graph_15295073-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-8.jsonl b/split_edge/graph_15295073-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15295073-9.jsonl b/split_edge/graph_15295073-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-0.jsonl b/split_edge/graph_15297825-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-2.jsonl b/split_edge/graph_15297825-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-3.jsonl b/split_edge/graph_15297825-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-4.jsonl b/split_edge/graph_15297825-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-5.jsonl b/split_edge/graph_15297825-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-6.jsonl b/split_edge/graph_15297825-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-7.jsonl b/split_edge/graph_15297825-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-8.jsonl b/split_edge/graph_15297825-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15297825-9.jsonl b/split_edge/graph_15297825-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-0.jsonl b/split_edge/graph_15331799-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-1.jsonl b/split_edge/graph_15331799-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-10.jsonl b/split_edge/graph_15331799-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-11.jsonl b/split_edge/graph_15331799-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-12.jsonl b/split_edge/graph_15331799-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-13.jsonl b/split_edge/graph_15331799-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-14.jsonl b/split_edge/graph_15331799-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-16.jsonl b/split_edge/graph_15331799-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-17.jsonl b/split_edge/graph_15331799-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-18.jsonl b/split_edge/graph_15331799-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-19.jsonl b/split_edge/graph_15331799-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-2.jsonl b/split_edge/graph_15331799-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-20.jsonl b/split_edge/graph_15331799-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-22.jsonl b/split_edge/graph_15331799-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-23.jsonl b/split_edge/graph_15331799-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-24.jsonl b/split_edge/graph_15331799-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-3.jsonl b/split_edge/graph_15331799-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-4.jsonl b/split_edge/graph_15331799-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-5.jsonl b/split_edge/graph_15331799-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15331799-6.jsonl b/split_edge/graph_15331799-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-0.jsonl b/split_edge/graph_15428874-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-10.jsonl b/split_edge/graph_15428874-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-12.jsonl b/split_edge/graph_15428874-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-13.jsonl b/split_edge/graph_15428874-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-14.jsonl b/split_edge/graph_15428874-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-16.jsonl b/split_edge/graph_15428874-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-18.jsonl b/split_edge/graph_15428874-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-19.jsonl b/split_edge/graph_15428874-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-2.jsonl b/split_edge/graph_15428874-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-3.jsonl b/split_edge/graph_15428874-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-5.jsonl b/split_edge/graph_15428874-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-6.jsonl b/split_edge/graph_15428874-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-7.jsonl b/split_edge/graph_15428874-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-8.jsonl b/split_edge/graph_15428874-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15428874-9.jsonl b/split_edge/graph_15428874-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_154648-0.jsonl b/split_edge/graph_154648-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_154648-1.jsonl b/split_edge/graph_154648-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_154648-2.jsonl b/split_edge/graph_154648-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_154648-3.jsonl b/split_edge/graph_154648-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_154648-4.jsonl b/split_edge/graph_154648-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-0.jsonl b/split_edge/graph_15494433-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-1.jsonl b/split_edge/graph_15494433-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-10.jsonl b/split_edge/graph_15494433-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-11.jsonl b/split_edge/graph_15494433-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-12.jsonl b/split_edge/graph_15494433-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-4.jsonl b/split_edge/graph_15494433-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-5.jsonl b/split_edge/graph_15494433-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-6.jsonl b/split_edge/graph_15494433-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-7.jsonl b/split_edge/graph_15494433-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-8.jsonl b/split_edge/graph_15494433-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15494433-9.jsonl b/split_edge/graph_15494433-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-0.jsonl b/split_edge/graph_15543876-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-12.jsonl b/split_edge/graph_15543876-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-13.jsonl b/split_edge/graph_15543876-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-14.jsonl b/split_edge/graph_15543876-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-15.jsonl b/split_edge/graph_15543876-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-16.jsonl b/split_edge/graph_15543876-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-17.jsonl b/split_edge/graph_15543876-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-18.jsonl b/split_edge/graph_15543876-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-2.jsonl b/split_edge/graph_15543876-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-3.jsonl b/split_edge/graph_15543876-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-6.jsonl b/split_edge/graph_15543876-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-8.jsonl b/split_edge/graph_15543876-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15543876-9.jsonl b/split_edge/graph_15543876-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-0.jsonl b/split_edge/graph_15545863-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-12.jsonl b/split_edge/graph_15545863-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-15.jsonl b/split_edge/graph_15545863-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-23.jsonl b/split_edge/graph_15545863-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-37.jsonl b/split_edge/graph_15545863-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-38.jsonl b/split_edge/graph_15545863-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-4.jsonl b/split_edge/graph_15545863-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-40.jsonl b/split_edge/graph_15545863-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-45.jsonl b/split_edge/graph_15545863-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15545863-5.jsonl b/split_edge/graph_15545863-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-0.jsonl b/split_edge/graph_155726808-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-1.jsonl b/split_edge/graph_155726808-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-11.jsonl b/split_edge/graph_155726808-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-13.jsonl b/split_edge/graph_155726808-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-14.jsonl b/split_edge/graph_155726808-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-16.jsonl b/split_edge/graph_155726808-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-17.jsonl b/split_edge/graph_155726808-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-18.jsonl b/split_edge/graph_155726808-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-20.jsonl b/split_edge/graph_155726808-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-21.jsonl b/split_edge/graph_155726808-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-22.jsonl b/split_edge/graph_155726808-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-23.jsonl b/split_edge/graph_155726808-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-24.jsonl b/split_edge/graph_155726808-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-25.jsonl b/split_edge/graph_155726808-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-26.jsonl b/split_edge/graph_155726808-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-3.jsonl b/split_edge/graph_155726808-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-30.jsonl b/split_edge/graph_155726808-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-5.jsonl b/split_edge/graph_155726808-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-6.jsonl b/split_edge/graph_155726808-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-7.jsonl b/split_edge/graph_155726808-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_155726808-8.jsonl b/split_edge/graph_155726808-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-0.jsonl b/split_edge/graph_1560135-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-1.jsonl b/split_edge/graph_1560135-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-11.jsonl b/split_edge/graph_1560135-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-12.jsonl b/split_edge/graph_1560135-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-15.jsonl b/split_edge/graph_1560135-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-16.jsonl b/split_edge/graph_1560135-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-18.jsonl b/split_edge/graph_1560135-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-19.jsonl b/split_edge/graph_1560135-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-2.jsonl b/split_edge/graph_1560135-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-20.jsonl b/split_edge/graph_1560135-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-21.jsonl b/split_edge/graph_1560135-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-22.jsonl b/split_edge/graph_1560135-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-24.jsonl b/split_edge/graph_1560135-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-25.jsonl b/split_edge/graph_1560135-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-26.jsonl b/split_edge/graph_1560135-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-28.jsonl b/split_edge/graph_1560135-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-29.jsonl b/split_edge/graph_1560135-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-3.jsonl b/split_edge/graph_1560135-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-32.jsonl b/split_edge/graph_1560135-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-34.jsonl b/split_edge/graph_1560135-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-35.jsonl b/split_edge/graph_1560135-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-37.jsonl b/split_edge/graph_1560135-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-6.jsonl b/split_edge/graph_1560135-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-8.jsonl b/split_edge/graph_1560135-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1560135-9.jsonl b/split_edge/graph_1560135-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15604179-0.jsonl b/split_edge/graph_15604179-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15604179-2.jsonl b/split_edge/graph_15604179-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15604179-4.jsonl b/split_edge/graph_15604179-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15604179-5.jsonl b/split_edge/graph_15604179-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15604179-6.jsonl b/split_edge/graph_15604179-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15604179-7.jsonl b/split_edge/graph_15604179-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_156050749-0.jsonl b/split_edge/graph_156050749-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_156050749-15.jsonl b/split_edge/graph_156050749-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_156050749-2.jsonl b/split_edge/graph_156050749-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_156050749-20.jsonl b/split_edge/graph_156050749-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_156050749-3.jsonl b/split_edge/graph_156050749-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_156050749-5.jsonl b/split_edge/graph_156050749-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_156050749-7.jsonl b/split_edge/graph_156050749-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15692640-0.jsonl b/split_edge/graph_15692640-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15692640-2.jsonl b/split_edge/graph_15692640-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15692640-3.jsonl b/split_edge/graph_15692640-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15692640-4.jsonl b/split_edge/graph_15692640-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15692640-5.jsonl b/split_edge/graph_15692640-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15692640-6.jsonl b/split_edge/graph_15692640-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-1.jsonl b/split_edge/graph_15694215-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-10.jsonl b/split_edge/graph_15694215-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-11.jsonl b/split_edge/graph_15694215-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-12.jsonl b/split_edge/graph_15694215-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-14.jsonl b/split_edge/graph_15694215-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-15.jsonl b/split_edge/graph_15694215-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-16.jsonl b/split_edge/graph_15694215-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-2.jsonl b/split_edge/graph_15694215-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-3.jsonl b/split_edge/graph_15694215-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-4.jsonl b/split_edge/graph_15694215-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15694215-9.jsonl b/split_edge/graph_15694215-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-1.jsonl b/split_edge/graph_15700537-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-10.jsonl b/split_edge/graph_15700537-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-11.jsonl b/split_edge/graph_15700537-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-13.jsonl b/split_edge/graph_15700537-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-14.jsonl b/split_edge/graph_15700537-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-15.jsonl b/split_edge/graph_15700537-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-16.jsonl b/split_edge/graph_15700537-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-19.jsonl b/split_edge/graph_15700537-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-20.jsonl b/split_edge/graph_15700537-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-23.jsonl b/split_edge/graph_15700537-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-24.jsonl b/split_edge/graph_15700537-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-25.jsonl b/split_edge/graph_15700537-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-27.jsonl b/split_edge/graph_15700537-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-28.jsonl b/split_edge/graph_15700537-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-29.jsonl b/split_edge/graph_15700537-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-30.jsonl b/split_edge/graph_15700537-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-32.jsonl b/split_edge/graph_15700537-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-33.jsonl b/split_edge/graph_15700537-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-6.jsonl b/split_edge/graph_15700537-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-8.jsonl b/split_edge/graph_15700537-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15700537-9.jsonl b/split_edge/graph_15700537-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15743724-2.jsonl b/split_edge/graph_15743724-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15743724-3.jsonl b/split_edge/graph_15743724-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15743724-4.jsonl b/split_edge/graph_15743724-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15743724-5.jsonl b/split_edge/graph_15743724-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-0.jsonl b/split_edge/graph_15797536-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-1.jsonl b/split_edge/graph_15797536-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-10.jsonl b/split_edge/graph_15797536-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-11.jsonl b/split_edge/graph_15797536-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-12.jsonl b/split_edge/graph_15797536-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-14.jsonl b/split_edge/graph_15797536-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-15.jsonl b/split_edge/graph_15797536-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-16.jsonl b/split_edge/graph_15797536-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-2.jsonl b/split_edge/graph_15797536-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-4.jsonl b/split_edge/graph_15797536-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-5.jsonl b/split_edge/graph_15797536-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-6.jsonl b/split_edge/graph_15797536-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-7.jsonl b/split_edge/graph_15797536-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-8.jsonl b/split_edge/graph_15797536-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15797536-9.jsonl b/split_edge/graph_15797536-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15826391-0.jsonl b/split_edge/graph_15826391-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15826391-1.jsonl b/split_edge/graph_15826391-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15826391-4.jsonl b/split_edge/graph_15826391-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_158647743-0.jsonl b/split_edge/graph_158647743-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_158647743-1.jsonl b/split_edge/graph_158647743-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_158647743-4.jsonl b/split_edge/graph_158647743-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_158647743-5.jsonl b/split_edge/graph_158647743-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_158647743-6.jsonl b/split_edge/graph_158647743-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_158647743-7.jsonl b/split_edge/graph_158647743-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-0.jsonl b/split_edge/graph_15891636-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-12.jsonl b/split_edge/graph_15891636-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-13.jsonl b/split_edge/graph_15891636-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-14.jsonl b/split_edge/graph_15891636-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-16.jsonl b/split_edge/graph_15891636-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-17.jsonl b/split_edge/graph_15891636-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-23.jsonl b/split_edge/graph_15891636-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-24.jsonl b/split_edge/graph_15891636-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-25.jsonl b/split_edge/graph_15891636-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-26.jsonl b/split_edge/graph_15891636-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-27.jsonl b/split_edge/graph_15891636-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-28.jsonl b/split_edge/graph_15891636-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-29.jsonl b/split_edge/graph_15891636-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-6.jsonl b/split_edge/graph_15891636-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-7.jsonl b/split_edge/graph_15891636-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-8.jsonl b/split_edge/graph_15891636-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15891636-9.jsonl b/split_edge/graph_15891636-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15931066-0.jsonl b/split_edge/graph_15931066-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15931066-15.jsonl b/split_edge/graph_15931066-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15931066-16.jsonl b/split_edge/graph_15931066-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15931066-2.jsonl b/split_edge/graph_15931066-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15931066-4.jsonl b/split_edge/graph_15931066-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15931066-5.jsonl b/split_edge/graph_15931066-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-0.jsonl b/split_edge/graph_15986619-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-10.jsonl b/split_edge/graph_15986619-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-3.jsonl b/split_edge/graph_15986619-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-5.jsonl b/split_edge/graph_15986619-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-6.jsonl b/split_edge/graph_15986619-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-7.jsonl b/split_edge/graph_15986619-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-8.jsonl b/split_edge/graph_15986619-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_15986619-9.jsonl b/split_edge/graph_15986619-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-0.jsonl b/split_edge/graph_16037215-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-12.jsonl b/split_edge/graph_16037215-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-2.jsonl b/split_edge/graph_16037215-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-3.jsonl b/split_edge/graph_16037215-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-4.jsonl b/split_edge/graph_16037215-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-5.jsonl b/split_edge/graph_16037215-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-7.jsonl b/split_edge/graph_16037215-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-8.jsonl b/split_edge/graph_16037215-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16037215-9.jsonl b/split_edge/graph_16037215-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-11.jsonl b/split_edge/graph_16153186-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-12.jsonl b/split_edge/graph_16153186-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-13.jsonl b/split_edge/graph_16153186-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-14.jsonl b/split_edge/graph_16153186-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-15.jsonl b/split_edge/graph_16153186-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-16.jsonl b/split_edge/graph_16153186-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-18.jsonl b/split_edge/graph_16153186-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-2.jsonl b/split_edge/graph_16153186-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-25.jsonl b/split_edge/graph_16153186-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-4.jsonl b/split_edge/graph_16153186-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-5.jsonl b/split_edge/graph_16153186-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-6.jsonl b/split_edge/graph_16153186-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-7.jsonl b/split_edge/graph_16153186-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-8.jsonl b/split_edge/graph_16153186-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16153186-9.jsonl b/split_edge/graph_16153186-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-0.jsonl b/split_edge/graph_16156203-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-1.jsonl b/split_edge/graph_16156203-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-10.jsonl b/split_edge/graph_16156203-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-11.jsonl b/split_edge/graph_16156203-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-12.jsonl b/split_edge/graph_16156203-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-14.jsonl b/split_edge/graph_16156203-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-15.jsonl b/split_edge/graph_16156203-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-16.jsonl b/split_edge/graph_16156203-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-17.jsonl b/split_edge/graph_16156203-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-3.jsonl b/split_edge/graph_16156203-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-4.jsonl b/split_edge/graph_16156203-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-5.jsonl b/split_edge/graph_16156203-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-6.jsonl b/split_edge/graph_16156203-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-7.jsonl b/split_edge/graph_16156203-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16156203-8.jsonl b/split_edge/graph_16156203-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-0.jsonl b/split_edge/graph_1619901-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-1.jsonl b/split_edge/graph_1619901-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-10.jsonl b/split_edge/graph_1619901-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-11.jsonl b/split_edge/graph_1619901-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-15.jsonl b/split_edge/graph_1619901-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-16.jsonl b/split_edge/graph_1619901-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-17.jsonl b/split_edge/graph_1619901-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-3.jsonl b/split_edge/graph_1619901-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-5.jsonl b/split_edge/graph_1619901-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-6.jsonl b/split_edge/graph_1619901-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-7.jsonl b/split_edge/graph_1619901-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-8.jsonl b/split_edge/graph_1619901-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1619901-9.jsonl b/split_edge/graph_1619901-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-0.jsonl b/split_edge/graph_16209841-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-11.jsonl b/split_edge/graph_16209841-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-14.jsonl b/split_edge/graph_16209841-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-15.jsonl b/split_edge/graph_16209841-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-16.jsonl b/split_edge/graph_16209841-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-17.jsonl b/split_edge/graph_16209841-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-18.jsonl b/split_edge/graph_16209841-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-19.jsonl b/split_edge/graph_16209841-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-2.jsonl b/split_edge/graph_16209841-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-21.jsonl b/split_edge/graph_16209841-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-22.jsonl b/split_edge/graph_16209841-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-23.jsonl b/split_edge/graph_16209841-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-24.jsonl b/split_edge/graph_16209841-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-25.jsonl b/split_edge/graph_16209841-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-27.jsonl b/split_edge/graph_16209841-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-3.jsonl b/split_edge/graph_16209841-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-6.jsonl b/split_edge/graph_16209841-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-7.jsonl b/split_edge/graph_16209841-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16209841-8.jsonl b/split_edge/graph_16209841-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_162183399-0.jsonl b/split_edge/graph_162183399-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_162183399-10.jsonl b/split_edge/graph_162183399-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_162183399-2.jsonl b/split_edge/graph_162183399-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_162183399-3.jsonl b/split_edge/graph_162183399-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_162183399-9.jsonl b/split_edge/graph_162183399-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-1.jsonl b/split_edge/graph_16229142-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-10.jsonl b/split_edge/graph_16229142-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-11.jsonl b/split_edge/graph_16229142-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-2.jsonl b/split_edge/graph_16229142-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-3.jsonl b/split_edge/graph_16229142-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-4.jsonl b/split_edge/graph_16229142-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-5.jsonl b/split_edge/graph_16229142-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-6.jsonl b/split_edge/graph_16229142-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-7.jsonl b/split_edge/graph_16229142-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-8.jsonl b/split_edge/graph_16229142-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16229142-9.jsonl b/split_edge/graph_16229142-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-0.jsonl b/split_edge/graph_16242553-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-1.jsonl b/split_edge/graph_16242553-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-12.jsonl b/split_edge/graph_16242553-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-13.jsonl b/split_edge/graph_16242553-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-14.jsonl b/split_edge/graph_16242553-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-16.jsonl b/split_edge/graph_16242553-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-17.jsonl b/split_edge/graph_16242553-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-5.jsonl b/split_edge/graph_16242553-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-6.jsonl b/split_edge/graph_16242553-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-7.jsonl b/split_edge/graph_16242553-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16242553-8.jsonl b/split_edge/graph_16242553-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16333689-3.jsonl b/split_edge/graph_16333689-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16333689-4.jsonl b/split_edge/graph_16333689-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16333689-8.jsonl b/split_edge/graph_16333689-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16333689-9.jsonl b/split_edge/graph_16333689-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-0.jsonl b/split_edge/graph_16346221-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-10.jsonl b/split_edge/graph_16346221-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-11.jsonl b/split_edge/graph_16346221-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-12.jsonl b/split_edge/graph_16346221-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-13.jsonl b/split_edge/graph_16346221-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-14.jsonl b/split_edge/graph_16346221-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-16.jsonl b/split_edge/graph_16346221-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-17.jsonl b/split_edge/graph_16346221-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-2.jsonl b/split_edge/graph_16346221-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-3.jsonl b/split_edge/graph_16346221-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-4.jsonl b/split_edge/graph_16346221-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-5.jsonl b/split_edge/graph_16346221-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-6.jsonl b/split_edge/graph_16346221-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-7.jsonl b/split_edge/graph_16346221-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-8.jsonl b/split_edge/graph_16346221-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16346221-9.jsonl b/split_edge/graph_16346221-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16348520-1.jsonl b/split_edge/graph_16348520-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16348520-2.jsonl b/split_edge/graph_16348520-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16348520-3.jsonl b/split_edge/graph_16348520-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16348520-6.jsonl b/split_edge/graph_16348520-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16348520-7.jsonl b/split_edge/graph_16348520-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16348520-8.jsonl b/split_edge/graph_16348520-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16348520-9.jsonl b/split_edge/graph_16348520-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-0.jsonl b/split_edge/graph_16358643-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-12.jsonl b/split_edge/graph_16358643-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-15.jsonl b/split_edge/graph_16358643-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-19.jsonl b/split_edge/graph_16358643-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-2.jsonl b/split_edge/graph_16358643-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-22.jsonl b/split_edge/graph_16358643-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-25.jsonl b/split_edge/graph_16358643-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-3.jsonl b/split_edge/graph_16358643-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-4.jsonl b/split_edge/graph_16358643-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-5.jsonl b/split_edge/graph_16358643-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-6.jsonl b/split_edge/graph_16358643-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16358643-8.jsonl b/split_edge/graph_16358643-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-0.jsonl b/split_edge/graph_16387640-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-1.jsonl b/split_edge/graph_16387640-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-10.jsonl b/split_edge/graph_16387640-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-11.jsonl b/split_edge/graph_16387640-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-14.jsonl b/split_edge/graph_16387640-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-15.jsonl b/split_edge/graph_16387640-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-16.jsonl b/split_edge/graph_16387640-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-18.jsonl b/split_edge/graph_16387640-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-19.jsonl b/split_edge/graph_16387640-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-20.jsonl b/split_edge/graph_16387640-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-22.jsonl b/split_edge/graph_16387640-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-24.jsonl b/split_edge/graph_16387640-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-27.jsonl b/split_edge/graph_16387640-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-28.jsonl b/split_edge/graph_16387640-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-29.jsonl b/split_edge/graph_16387640-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-30.jsonl b/split_edge/graph_16387640-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-32.jsonl b/split_edge/graph_16387640-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-33.jsonl b/split_edge/graph_16387640-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-35.jsonl b/split_edge/graph_16387640-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-37.jsonl b/split_edge/graph_16387640-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-39.jsonl b/split_edge/graph_16387640-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-4.jsonl b/split_edge/graph_16387640-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-42.jsonl b/split_edge/graph_16387640-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-44.jsonl b/split_edge/graph_16387640-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-45.jsonl b/split_edge/graph_16387640-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-46.jsonl b/split_edge/graph_16387640-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-5.jsonl b/split_edge/graph_16387640-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-7.jsonl b/split_edge/graph_16387640-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16387640-8.jsonl b/split_edge/graph_16387640-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-0.jsonl b/split_edge/graph_16406787-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-17.jsonl b/split_edge/graph_16406787-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-18.jsonl b/split_edge/graph_16406787-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-20.jsonl b/split_edge/graph_16406787-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-22.jsonl b/split_edge/graph_16406787-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-25.jsonl b/split_edge/graph_16406787-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-28.jsonl b/split_edge/graph_16406787-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-30.jsonl b/split_edge/graph_16406787-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16406787-34.jsonl b/split_edge/graph_16406787-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-0.jsonl b/split_edge/graph_16428983-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-10.jsonl b/split_edge/graph_16428983-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-11.jsonl b/split_edge/graph_16428983-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-15.jsonl b/split_edge/graph_16428983-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-16.jsonl b/split_edge/graph_16428983-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-17.jsonl b/split_edge/graph_16428983-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-18.jsonl b/split_edge/graph_16428983-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-19.jsonl b/split_edge/graph_16428983-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-20.jsonl b/split_edge/graph_16428983-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-21.jsonl b/split_edge/graph_16428983-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-23.jsonl b/split_edge/graph_16428983-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-24.jsonl b/split_edge/graph_16428983-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-25.jsonl b/split_edge/graph_16428983-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-26.jsonl b/split_edge/graph_16428983-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-29.jsonl b/split_edge/graph_16428983-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-3.jsonl b/split_edge/graph_16428983-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-30.jsonl b/split_edge/graph_16428983-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-31.jsonl b/split_edge/graph_16428983-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-32.jsonl b/split_edge/graph_16428983-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-33.jsonl b/split_edge/graph_16428983-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-34.jsonl b/split_edge/graph_16428983-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-35.jsonl b/split_edge/graph_16428983-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-36.jsonl b/split_edge/graph_16428983-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-38.jsonl b/split_edge/graph_16428983-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-39.jsonl b/split_edge/graph_16428983-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-4.jsonl b/split_edge/graph_16428983-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-40.jsonl b/split_edge/graph_16428983-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-47.jsonl b/split_edge/graph_16428983-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-8.jsonl b/split_edge/graph_16428983-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16428983-9.jsonl b/split_edge/graph_16428983-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16435854-10.jsonl b/split_edge/graph_16435854-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16435854-2.jsonl b/split_edge/graph_16435854-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16435854-5.jsonl b/split_edge/graph_16435854-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16435854-8.jsonl b/split_edge/graph_16435854-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16435854-9.jsonl b/split_edge/graph_16435854-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_164554550-0.jsonl b/split_edge/graph_164554550-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_164554550-1.jsonl b/split_edge/graph_164554550-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_164554550-2.jsonl b/split_edge/graph_164554550-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_164554550-3.jsonl b/split_edge/graph_164554550-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_164554550-5.jsonl b/split_edge/graph_164554550-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-0.jsonl b/split_edge/graph_16489039-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-1.jsonl b/split_edge/graph_16489039-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-11.jsonl b/split_edge/graph_16489039-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-12.jsonl b/split_edge/graph_16489039-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-13.jsonl b/split_edge/graph_16489039-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-3.jsonl b/split_edge/graph_16489039-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-6.jsonl b/split_edge/graph_16489039-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-7.jsonl b/split_edge/graph_16489039-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-8.jsonl b/split_edge/graph_16489039-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16489039-9.jsonl b/split_edge/graph_16489039-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16502474-1.jsonl b/split_edge/graph_16502474-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16502474-12.jsonl b/split_edge/graph_16502474-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16502474-2.jsonl b/split_edge/graph_16502474-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16502474-3.jsonl b/split_edge/graph_16502474-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16502474-4.jsonl b/split_edge/graph_16502474-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16502474-6.jsonl b/split_edge/graph_16502474-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16502474-8.jsonl b/split_edge/graph_16502474-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-10.jsonl b/split_edge/graph_16525678-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-11.jsonl b/split_edge/graph_16525678-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-12.jsonl b/split_edge/graph_16525678-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-2.jsonl b/split_edge/graph_16525678-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-4.jsonl b/split_edge/graph_16525678-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-5.jsonl b/split_edge/graph_16525678-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-6.jsonl b/split_edge/graph_16525678-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16525678-7.jsonl b/split_edge/graph_16525678-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-0.jsonl b/split_edge/graph_16540884-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-11.jsonl b/split_edge/graph_16540884-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-12.jsonl b/split_edge/graph_16540884-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-13.jsonl b/split_edge/graph_16540884-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-14.jsonl b/split_edge/graph_16540884-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-16.jsonl b/split_edge/graph_16540884-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-18.jsonl b/split_edge/graph_16540884-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-19.jsonl b/split_edge/graph_16540884-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-2.jsonl b/split_edge/graph_16540884-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-21.jsonl b/split_edge/graph_16540884-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-4.jsonl b/split_edge/graph_16540884-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-5.jsonl b/split_edge/graph_16540884-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16540884-6.jsonl b/split_edge/graph_16540884-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-0.jsonl b/split_edge/graph_16587383-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-10.jsonl b/split_edge/graph_16587383-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-11.jsonl b/split_edge/graph_16587383-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-12.jsonl b/split_edge/graph_16587383-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-3.jsonl b/split_edge/graph_16587383-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-4.jsonl b/split_edge/graph_16587383-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-5.jsonl b/split_edge/graph_16587383-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-6.jsonl b/split_edge/graph_16587383-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-7.jsonl b/split_edge/graph_16587383-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-8.jsonl b/split_edge/graph_16587383-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16587383-9.jsonl b/split_edge/graph_16587383-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16614482-15.jsonl b/split_edge/graph_16614482-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16614482-17.jsonl b/split_edge/graph_16614482-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16614482-9.jsonl b/split_edge/graph_16614482-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16650186-0.jsonl b/split_edge/graph_16650186-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16650186-10.jsonl b/split_edge/graph_16650186-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16650186-12.jsonl b/split_edge/graph_16650186-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16650186-5.jsonl b/split_edge/graph_16650186-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16650186-6.jsonl b/split_edge/graph_16650186-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16650186-8.jsonl b/split_edge/graph_16650186-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16650186-9.jsonl b/split_edge/graph_16650186-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-0.jsonl b/split_edge/graph_1669837-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-1.jsonl b/split_edge/graph_1669837-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-12.jsonl b/split_edge/graph_1669837-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-16.jsonl b/split_edge/graph_1669837-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-17.jsonl b/split_edge/graph_1669837-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-2.jsonl b/split_edge/graph_1669837-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-21.jsonl b/split_edge/graph_1669837-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-6.jsonl b/split_edge/graph_1669837-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-7.jsonl b/split_edge/graph_1669837-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1669837-8.jsonl b/split_edge/graph_1669837-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-1.jsonl b/split_edge/graph_16720993-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-11.jsonl b/split_edge/graph_16720993-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-12.jsonl b/split_edge/graph_16720993-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-14.jsonl b/split_edge/graph_16720993-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-16.jsonl b/split_edge/graph_16720993-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-18.jsonl b/split_edge/graph_16720993-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-19.jsonl b/split_edge/graph_16720993-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-23.jsonl b/split_edge/graph_16720993-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-3.jsonl b/split_edge/graph_16720993-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16720993-6.jsonl b/split_edge/graph_16720993-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-0.jsonl b/split_edge/graph_16748080-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-1.jsonl b/split_edge/graph_16748080-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-10.jsonl b/split_edge/graph_16748080-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-11.jsonl b/split_edge/graph_16748080-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-12.jsonl b/split_edge/graph_16748080-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-2.jsonl b/split_edge/graph_16748080-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-4.jsonl b/split_edge/graph_16748080-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-5.jsonl b/split_edge/graph_16748080-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-6.jsonl b/split_edge/graph_16748080-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-7.jsonl b/split_edge/graph_16748080-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16748080-9.jsonl b/split_edge/graph_16748080-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16760578-0.jsonl b/split_edge/graph_16760578-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16760578-1.jsonl b/split_edge/graph_16760578-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-0.jsonl b/split_edge/graph_16793463-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-11.jsonl b/split_edge/graph_16793463-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-12.jsonl b/split_edge/graph_16793463-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-13.jsonl b/split_edge/graph_16793463-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-14.jsonl b/split_edge/graph_16793463-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-16.jsonl b/split_edge/graph_16793463-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-17.jsonl b/split_edge/graph_16793463-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-19.jsonl b/split_edge/graph_16793463-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-20.jsonl b/split_edge/graph_16793463-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-21.jsonl b/split_edge/graph_16793463-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-22.jsonl b/split_edge/graph_16793463-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-7.jsonl b/split_edge/graph_16793463-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16793463-8.jsonl b/split_edge/graph_16793463-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-0.jsonl b/split_edge/graph_16801958-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-13.jsonl b/split_edge/graph_16801958-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-14.jsonl b/split_edge/graph_16801958-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-15.jsonl b/split_edge/graph_16801958-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-17.jsonl b/split_edge/graph_16801958-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-18.jsonl b/split_edge/graph_16801958-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-21.jsonl b/split_edge/graph_16801958-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-3.jsonl b/split_edge/graph_16801958-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-4.jsonl b/split_edge/graph_16801958-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-6.jsonl b/split_edge/graph_16801958-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-7.jsonl b/split_edge/graph_16801958-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-8.jsonl b/split_edge/graph_16801958-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16801958-9.jsonl b/split_edge/graph_16801958-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-0.jsonl b/split_edge/graph_16806429-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-10.jsonl b/split_edge/graph_16806429-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-11.jsonl b/split_edge/graph_16806429-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-12.jsonl b/split_edge/graph_16806429-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-13.jsonl b/split_edge/graph_16806429-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-3.jsonl b/split_edge/graph_16806429-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-4.jsonl b/split_edge/graph_16806429-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-5.jsonl b/split_edge/graph_16806429-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-6.jsonl b/split_edge/graph_16806429-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-7.jsonl b/split_edge/graph_16806429-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16806429-8.jsonl b/split_edge/graph_16806429-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16854146-0.jsonl b/split_edge/graph_16854146-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16854146-2.jsonl b/split_edge/graph_16854146-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16854146-3.jsonl b/split_edge/graph_16854146-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16854146-4.jsonl b/split_edge/graph_16854146-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16854146-5.jsonl b/split_edge/graph_16854146-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-0.jsonl b/split_edge/graph_16908400-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-10.jsonl b/split_edge/graph_16908400-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-11.jsonl b/split_edge/graph_16908400-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-12.jsonl b/split_edge/graph_16908400-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-13.jsonl b/split_edge/graph_16908400-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-15.jsonl b/split_edge/graph_16908400-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-16.jsonl b/split_edge/graph_16908400-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-17.jsonl b/split_edge/graph_16908400-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-3.jsonl b/split_edge/graph_16908400-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-4.jsonl b/split_edge/graph_16908400-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-5.jsonl b/split_edge/graph_16908400-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-7.jsonl b/split_edge/graph_16908400-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-8.jsonl b/split_edge/graph_16908400-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16908400-9.jsonl b/split_edge/graph_16908400-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-0.jsonl b/split_edge/graph_16933085-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-1.jsonl b/split_edge/graph_16933085-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-10.jsonl b/split_edge/graph_16933085-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-12.jsonl b/split_edge/graph_16933085-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-13.jsonl b/split_edge/graph_16933085-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-14.jsonl b/split_edge/graph_16933085-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-15.jsonl b/split_edge/graph_16933085-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-2.jsonl b/split_edge/graph_16933085-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-3.jsonl b/split_edge/graph_16933085-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-4.jsonl b/split_edge/graph_16933085-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-6.jsonl b/split_edge/graph_16933085-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-7.jsonl b/split_edge/graph_16933085-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16933085-9.jsonl b/split_edge/graph_16933085-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16954591-1.jsonl b/split_edge/graph_16954591-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_16954591-6.jsonl b/split_edge/graph_16954591-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-1.jsonl b/split_edge/graph_169570837-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-10.jsonl b/split_edge/graph_169570837-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-11.jsonl b/split_edge/graph_169570837-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-3.jsonl b/split_edge/graph_169570837-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-4.jsonl b/split_edge/graph_169570837-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-5.jsonl b/split_edge/graph_169570837-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-7.jsonl b/split_edge/graph_169570837-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_169570837-9.jsonl b/split_edge/graph_169570837-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-0.jsonl b/split_edge/graph_17024419-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-1.jsonl b/split_edge/graph_17024419-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-10.jsonl b/split_edge/graph_17024419-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-11.jsonl b/split_edge/graph_17024419-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-12.jsonl b/split_edge/graph_17024419-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-14.jsonl b/split_edge/graph_17024419-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-15.jsonl b/split_edge/graph_17024419-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-16.jsonl b/split_edge/graph_17024419-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-17.jsonl b/split_edge/graph_17024419-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-18.jsonl b/split_edge/graph_17024419-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-19.jsonl b/split_edge/graph_17024419-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-2.jsonl b/split_edge/graph_17024419-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-20.jsonl b/split_edge/graph_17024419-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-21.jsonl b/split_edge/graph_17024419-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-22.jsonl b/split_edge/graph_17024419-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-24.jsonl b/split_edge/graph_17024419-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-26.jsonl b/split_edge/graph_17024419-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-27.jsonl b/split_edge/graph_17024419-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-28.jsonl b/split_edge/graph_17024419-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-30.jsonl b/split_edge/graph_17024419-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-32.jsonl b/split_edge/graph_17024419-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-33.jsonl b/split_edge/graph_17024419-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-34.jsonl b/split_edge/graph_17024419-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-35.jsonl b/split_edge/graph_17024419-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-36.jsonl b/split_edge/graph_17024419-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-37.jsonl b/split_edge/graph_17024419-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-39.jsonl b/split_edge/graph_17024419-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-40.jsonl b/split_edge/graph_17024419-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-41.jsonl b/split_edge/graph_17024419-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-42.jsonl b/split_edge/graph_17024419-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-44.jsonl b/split_edge/graph_17024419-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-45.jsonl b/split_edge/graph_17024419-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-46.jsonl b/split_edge/graph_17024419-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-47.jsonl b/split_edge/graph_17024419-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-48.jsonl b/split_edge/graph_17024419-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-5.jsonl b/split_edge/graph_17024419-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-50.jsonl b/split_edge/graph_17024419-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-51.jsonl b/split_edge/graph_17024419-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-52.jsonl b/split_edge/graph_17024419-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-53.jsonl b/split_edge/graph_17024419-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-56.jsonl b/split_edge/graph_17024419-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-57.jsonl b/split_edge/graph_17024419-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-58.jsonl b/split_edge/graph_17024419-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-59.jsonl b/split_edge/graph_17024419-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-6.jsonl b/split_edge/graph_17024419-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-60.jsonl b/split_edge/graph_17024419-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-7.jsonl b/split_edge/graph_17024419-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17024419-8.jsonl b/split_edge/graph_17024419-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-1.jsonl b/split_edge/graph_17067678-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-12.jsonl b/split_edge/graph_17067678-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-13.jsonl b/split_edge/graph_17067678-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-14.jsonl b/split_edge/graph_17067678-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-16.jsonl b/split_edge/graph_17067678-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-17.jsonl b/split_edge/graph_17067678-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-18.jsonl b/split_edge/graph_17067678-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-19.jsonl b/split_edge/graph_17067678-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-20.jsonl b/split_edge/graph_17067678-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-21.jsonl b/split_edge/graph_17067678-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-22.jsonl b/split_edge/graph_17067678-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-4.jsonl b/split_edge/graph_17067678-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-6.jsonl b/split_edge/graph_17067678-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-7.jsonl b/split_edge/graph_17067678-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-8.jsonl b/split_edge/graph_17067678-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17067678-9.jsonl b/split_edge/graph_17067678-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-0.jsonl b/split_edge/graph_17100266-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-1.jsonl b/split_edge/graph_17100266-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-10.jsonl b/split_edge/graph_17100266-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-12.jsonl b/split_edge/graph_17100266-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-13.jsonl b/split_edge/graph_17100266-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-16.jsonl b/split_edge/graph_17100266-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-2.jsonl b/split_edge/graph_17100266-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-3.jsonl b/split_edge/graph_17100266-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-4.jsonl b/split_edge/graph_17100266-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-6.jsonl b/split_edge/graph_17100266-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-7.jsonl b/split_edge/graph_17100266-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-8.jsonl b/split_edge/graph_17100266-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17100266-9.jsonl b/split_edge/graph_17100266-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_171088248-1.jsonl b/split_edge/graph_171088248-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_171088248-10.jsonl b/split_edge/graph_171088248-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_171088248-11.jsonl b/split_edge/graph_171088248-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_171088248-3.jsonl b/split_edge/graph_171088248-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_171088248-5.jsonl b/split_edge/graph_171088248-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_171088248-7.jsonl b/split_edge/graph_171088248-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_171088248-9.jsonl b/split_edge/graph_171088248-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-0.jsonl b/split_edge/graph_17165859-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-10.jsonl b/split_edge/graph_17165859-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-12.jsonl b/split_edge/graph_17165859-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-13.jsonl b/split_edge/graph_17165859-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-14.jsonl b/split_edge/graph_17165859-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-16.jsonl b/split_edge/graph_17165859-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-18.jsonl b/split_edge/graph_17165859-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-19.jsonl b/split_edge/graph_17165859-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-2.jsonl b/split_edge/graph_17165859-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-20.jsonl b/split_edge/graph_17165859-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-21.jsonl b/split_edge/graph_17165859-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-26.jsonl b/split_edge/graph_17165859-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-3.jsonl b/split_edge/graph_17165859-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-30.jsonl b/split_edge/graph_17165859-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-31.jsonl b/split_edge/graph_17165859-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-36.jsonl b/split_edge/graph_17165859-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-38.jsonl b/split_edge/graph_17165859-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-40.jsonl b/split_edge/graph_17165859-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-43.jsonl b/split_edge/graph_17165859-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-6.jsonl b/split_edge/graph_17165859-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-7.jsonl b/split_edge/graph_17165859-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-8.jsonl b/split_edge/graph_17165859-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17165859-9.jsonl b/split_edge/graph_17165859-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-10.jsonl b/split_edge/graph_17252389-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-11.jsonl b/split_edge/graph_17252389-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-12.jsonl b/split_edge/graph_17252389-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-3.jsonl b/split_edge/graph_17252389-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-4.jsonl b/split_edge/graph_17252389-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-5.jsonl b/split_edge/graph_17252389-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-6.jsonl b/split_edge/graph_17252389-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-7.jsonl b/split_edge/graph_17252389-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-8.jsonl b/split_edge/graph_17252389-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17252389-9.jsonl b/split_edge/graph_17252389-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17258048-0.jsonl b/split_edge/graph_17258048-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17258048-10.jsonl b/split_edge/graph_17258048-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17258048-12.jsonl b/split_edge/graph_17258048-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17258048-23.jsonl b/split_edge/graph_17258048-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17258048-24.jsonl b/split_edge/graph_17258048-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-0.jsonl b/split_edge/graph_17320709-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-1.jsonl b/split_edge/graph_17320709-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-11.jsonl b/split_edge/graph_17320709-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-2.jsonl b/split_edge/graph_17320709-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-3.jsonl b/split_edge/graph_17320709-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-5.jsonl b/split_edge/graph_17320709-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-6.jsonl b/split_edge/graph_17320709-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-7.jsonl b/split_edge/graph_17320709-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-8.jsonl b/split_edge/graph_17320709-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17320709-9.jsonl b/split_edge/graph_17320709-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-1.jsonl b/split_edge/graph_17324444-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-10.jsonl b/split_edge/graph_17324444-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-11.jsonl b/split_edge/graph_17324444-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-12.jsonl b/split_edge/graph_17324444-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-13.jsonl b/split_edge/graph_17324444-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-14.jsonl b/split_edge/graph_17324444-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-16.jsonl b/split_edge/graph_17324444-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-2.jsonl b/split_edge/graph_17324444-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-3.jsonl b/split_edge/graph_17324444-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-4.jsonl b/split_edge/graph_17324444-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-5.jsonl b/split_edge/graph_17324444-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-6.jsonl b/split_edge/graph_17324444-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17324444-7.jsonl b/split_edge/graph_17324444-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-0.jsonl b/split_edge/graph_17326575-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-1.jsonl b/split_edge/graph_17326575-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-12.jsonl b/split_edge/graph_17326575-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-3.jsonl b/split_edge/graph_17326575-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-4.jsonl b/split_edge/graph_17326575-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-5.jsonl b/split_edge/graph_17326575-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-6.jsonl b/split_edge/graph_17326575-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-7.jsonl b/split_edge/graph_17326575-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17326575-9.jsonl b/split_edge/graph_17326575-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-0.jsonl b/split_edge/graph_1734833-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-1.jsonl b/split_edge/graph_1734833-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-10.jsonl b/split_edge/graph_1734833-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-11.jsonl b/split_edge/graph_1734833-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-12.jsonl b/split_edge/graph_1734833-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-13.jsonl b/split_edge/graph_1734833-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-15.jsonl b/split_edge/graph_1734833-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-16.jsonl b/split_edge/graph_1734833-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-17.jsonl b/split_edge/graph_1734833-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-18.jsonl b/split_edge/graph_1734833-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-19.jsonl b/split_edge/graph_1734833-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-2.jsonl b/split_edge/graph_1734833-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-20.jsonl b/split_edge/graph_1734833-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-21.jsonl b/split_edge/graph_1734833-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-22.jsonl b/split_edge/graph_1734833-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-23.jsonl b/split_edge/graph_1734833-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-25.jsonl b/split_edge/graph_1734833-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-26.jsonl b/split_edge/graph_1734833-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-27.jsonl b/split_edge/graph_1734833-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-3.jsonl b/split_edge/graph_1734833-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-4.jsonl b/split_edge/graph_1734833-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-5.jsonl b/split_edge/graph_1734833-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-6.jsonl b/split_edge/graph_1734833-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-8.jsonl b/split_edge/graph_1734833-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1734833-9.jsonl b/split_edge/graph_1734833-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-0.jsonl b/split_edge/graph_17366742-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-1.jsonl b/split_edge/graph_17366742-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-12.jsonl b/split_edge/graph_17366742-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-17.jsonl b/split_edge/graph_17366742-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-19.jsonl b/split_edge/graph_17366742-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-25.jsonl b/split_edge/graph_17366742-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-26.jsonl b/split_edge/graph_17366742-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-3.jsonl b/split_edge/graph_17366742-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-30.jsonl b/split_edge/graph_17366742-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-4.jsonl b/split_edge/graph_17366742-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-43.jsonl b/split_edge/graph_17366742-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-48.jsonl b/split_edge/graph_17366742-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-50.jsonl b/split_edge/graph_17366742-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-53.jsonl b/split_edge/graph_17366742-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-57.jsonl b/split_edge/graph_17366742-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-6.jsonl b/split_edge/graph_17366742-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-60.jsonl b/split_edge/graph_17366742-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17366742-8.jsonl b/split_edge/graph_17366742-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-0.jsonl b/split_edge/graph_173991036-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-2.jsonl b/split_edge/graph_173991036-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-3.jsonl b/split_edge/graph_173991036-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-4.jsonl b/split_edge/graph_173991036-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-5.jsonl b/split_edge/graph_173991036-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-6.jsonl b/split_edge/graph_173991036-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-7.jsonl b/split_edge/graph_173991036-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_173991036-8.jsonl b/split_edge/graph_173991036-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-0.jsonl b/split_edge/graph_17455480-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-1.jsonl b/split_edge/graph_17455480-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-10.jsonl b/split_edge/graph_17455480-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-11.jsonl b/split_edge/graph_17455480-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-12.jsonl b/split_edge/graph_17455480-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-13.jsonl b/split_edge/graph_17455480-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-14.jsonl b/split_edge/graph_17455480-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-2.jsonl b/split_edge/graph_17455480-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-3.jsonl b/split_edge/graph_17455480-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-4.jsonl b/split_edge/graph_17455480-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-5.jsonl b/split_edge/graph_17455480-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-6.jsonl b/split_edge/graph_17455480-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-7.jsonl b/split_edge/graph_17455480-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-8.jsonl b/split_edge/graph_17455480-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17455480-9.jsonl b/split_edge/graph_17455480-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-0.jsonl b/split_edge/graph_174801039-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-10.jsonl b/split_edge/graph_174801039-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-11.jsonl b/split_edge/graph_174801039-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-12.jsonl b/split_edge/graph_174801039-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-13.jsonl b/split_edge/graph_174801039-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-14.jsonl b/split_edge/graph_174801039-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-15.jsonl b/split_edge/graph_174801039-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-16.jsonl b/split_edge/graph_174801039-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-17.jsonl b/split_edge/graph_174801039-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-18.jsonl b/split_edge/graph_174801039-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-19.jsonl b/split_edge/graph_174801039-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-2.jsonl b/split_edge/graph_174801039-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-20.jsonl b/split_edge/graph_174801039-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-3.jsonl b/split_edge/graph_174801039-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-4.jsonl b/split_edge/graph_174801039-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-5.jsonl b/split_edge/graph_174801039-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-6.jsonl b/split_edge/graph_174801039-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-8.jsonl b/split_edge/graph_174801039-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174801039-9.jsonl b/split_edge/graph_174801039-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-0.jsonl b/split_edge/graph_174818808-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-1.jsonl b/split_edge/graph_174818808-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-11.jsonl b/split_edge/graph_174818808-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-12.jsonl b/split_edge/graph_174818808-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-13.jsonl b/split_edge/graph_174818808-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-14.jsonl b/split_edge/graph_174818808-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-15.jsonl b/split_edge/graph_174818808-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-2.jsonl b/split_edge/graph_174818808-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-4.jsonl b/split_edge/graph_174818808-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-5.jsonl b/split_edge/graph_174818808-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-6.jsonl b/split_edge/graph_174818808-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-7.jsonl b/split_edge/graph_174818808-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-8.jsonl b/split_edge/graph_174818808-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_174818808-9.jsonl b/split_edge/graph_174818808-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-0.jsonl b/split_edge/graph_17516538-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-10.jsonl b/split_edge/graph_17516538-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-12.jsonl b/split_edge/graph_17516538-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-13.jsonl b/split_edge/graph_17516538-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-14.jsonl b/split_edge/graph_17516538-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-15.jsonl b/split_edge/graph_17516538-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-16.jsonl b/split_edge/graph_17516538-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-17.jsonl b/split_edge/graph_17516538-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-18.jsonl b/split_edge/graph_17516538-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-19.jsonl b/split_edge/graph_17516538-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-2.jsonl b/split_edge/graph_17516538-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-20.jsonl b/split_edge/graph_17516538-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-21.jsonl b/split_edge/graph_17516538-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-22.jsonl b/split_edge/graph_17516538-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-24.jsonl b/split_edge/graph_17516538-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-25.jsonl b/split_edge/graph_17516538-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-26.jsonl b/split_edge/graph_17516538-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-27.jsonl b/split_edge/graph_17516538-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-28.jsonl b/split_edge/graph_17516538-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-29.jsonl b/split_edge/graph_17516538-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-3.jsonl b/split_edge/graph_17516538-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-33.jsonl b/split_edge/graph_17516538-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-34.jsonl b/split_edge/graph_17516538-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-35.jsonl b/split_edge/graph_17516538-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-36.jsonl b/split_edge/graph_17516538-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-4.jsonl b/split_edge/graph_17516538-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-40.jsonl b/split_edge/graph_17516538-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-41.jsonl b/split_edge/graph_17516538-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-6.jsonl b/split_edge/graph_17516538-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-7.jsonl b/split_edge/graph_17516538-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17516538-8.jsonl b/split_edge/graph_17516538-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-0.jsonl b/split_edge/graph_17561208-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-10.jsonl b/split_edge/graph_17561208-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-11.jsonl b/split_edge/graph_17561208-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-12.jsonl b/split_edge/graph_17561208-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-13.jsonl b/split_edge/graph_17561208-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-2.jsonl b/split_edge/graph_17561208-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-3.jsonl b/split_edge/graph_17561208-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-4.jsonl b/split_edge/graph_17561208-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-5.jsonl b/split_edge/graph_17561208-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-6.jsonl b/split_edge/graph_17561208-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-8.jsonl b/split_edge/graph_17561208-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17561208-9.jsonl b/split_edge/graph_17561208-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-0.jsonl b/split_edge/graph_17593458-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-1.jsonl b/split_edge/graph_17593458-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-12.jsonl b/split_edge/graph_17593458-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-13.jsonl b/split_edge/graph_17593458-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-2.jsonl b/split_edge/graph_17593458-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-3.jsonl b/split_edge/graph_17593458-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-4.jsonl b/split_edge/graph_17593458-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17593458-5.jsonl b/split_edge/graph_17593458-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17630359-1.jsonl b/split_edge/graph_17630359-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-0.jsonl b/split_edge/graph_17708892-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-13.jsonl b/split_edge/graph_17708892-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-15.jsonl b/split_edge/graph_17708892-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-17.jsonl b/split_edge/graph_17708892-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-2.jsonl b/split_edge/graph_17708892-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-21.jsonl b/split_edge/graph_17708892-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-23.jsonl b/split_edge/graph_17708892-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-24.jsonl b/split_edge/graph_17708892-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17708892-8.jsonl b/split_edge/graph_17708892-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17718436-0.jsonl b/split_edge/graph_17718436-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17718436-2.jsonl b/split_edge/graph_17718436-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17718436-3.jsonl b/split_edge/graph_17718436-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17718436-4.jsonl b/split_edge/graph_17718436-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17718436-5.jsonl b/split_edge/graph_17718436-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-0.jsonl b/split_edge/graph_17737221-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-12.jsonl b/split_edge/graph_17737221-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-13.jsonl b/split_edge/graph_17737221-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-14.jsonl b/split_edge/graph_17737221-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-15.jsonl b/split_edge/graph_17737221-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-16.jsonl b/split_edge/graph_17737221-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-17.jsonl b/split_edge/graph_17737221-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-2.jsonl b/split_edge/graph_17737221-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-4.jsonl b/split_edge/graph_17737221-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-7.jsonl b/split_edge/graph_17737221-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17737221-9.jsonl b/split_edge/graph_17737221-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-0.jsonl b/split_edge/graph_17864827-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-14.jsonl b/split_edge/graph_17864827-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-18.jsonl b/split_edge/graph_17864827-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-19.jsonl b/split_edge/graph_17864827-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-2.jsonl b/split_edge/graph_17864827-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-22.jsonl b/split_edge/graph_17864827-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-23.jsonl b/split_edge/graph_17864827-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-24.jsonl b/split_edge/graph_17864827-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-26.jsonl b/split_edge/graph_17864827-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-27.jsonl b/split_edge/graph_17864827-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17864827-30.jsonl b/split_edge/graph_17864827-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-0.jsonl b/split_edge/graph_17904357-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-1.jsonl b/split_edge/graph_17904357-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-12.jsonl b/split_edge/graph_17904357-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-15.jsonl b/split_edge/graph_17904357-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-16.jsonl b/split_edge/graph_17904357-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-17.jsonl b/split_edge/graph_17904357-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-18.jsonl b/split_edge/graph_17904357-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-19.jsonl b/split_edge/graph_17904357-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-2.jsonl b/split_edge/graph_17904357-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-3.jsonl b/split_edge/graph_17904357-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-7.jsonl b/split_edge/graph_17904357-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17904357-9.jsonl b/split_edge/graph_17904357-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17917862-0.jsonl b/split_edge/graph_17917862-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17917862-1.jsonl b/split_edge/graph_17917862-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17917862-2.jsonl b/split_edge/graph_17917862-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17917862-3.jsonl b/split_edge/graph_17917862-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17917862-4.jsonl b/split_edge/graph_17917862-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17917862-6.jsonl b/split_edge/graph_17917862-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17917862-7.jsonl b/split_edge/graph_17917862-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-1.jsonl b/split_edge/graph_17929320-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-10.jsonl b/split_edge/graph_17929320-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-11.jsonl b/split_edge/graph_17929320-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-15.jsonl b/split_edge/graph_17929320-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-16.jsonl b/split_edge/graph_17929320-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-17.jsonl b/split_edge/graph_17929320-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-18.jsonl b/split_edge/graph_17929320-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-19.jsonl b/split_edge/graph_17929320-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-20.jsonl b/split_edge/graph_17929320-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-21.jsonl b/split_edge/graph_17929320-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-22.jsonl b/split_edge/graph_17929320-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-23.jsonl b/split_edge/graph_17929320-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-24.jsonl b/split_edge/graph_17929320-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-25.jsonl b/split_edge/graph_17929320-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17929320-28.jsonl b/split_edge/graph_17929320-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17939564-0.jsonl b/split_edge/graph_17939564-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17939564-2.jsonl b/split_edge/graph_17939564-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17939564-3.jsonl b/split_edge/graph_17939564-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17939564-4.jsonl b/split_edge/graph_17939564-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17939564-5.jsonl b/split_edge/graph_17939564-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17939564-7.jsonl b/split_edge/graph_17939564-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1798273-0.jsonl b/split_edge/graph_1798273-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1798273-2.jsonl b/split_edge/graph_1798273-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1798273-3.jsonl b/split_edge/graph_1798273-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1798273-4.jsonl b/split_edge/graph_1798273-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1798273-5.jsonl b/split_edge/graph_1798273-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17992570-10.jsonl b/split_edge/graph_17992570-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17992570-16.jsonl b/split_edge/graph_17992570-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17992570-23.jsonl b/split_edge/graph_17992570-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_17992570-4.jsonl b/split_edge/graph_17992570-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-1.jsonl b/split_edge/graph_18035353-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-10.jsonl b/split_edge/graph_18035353-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-11.jsonl b/split_edge/graph_18035353-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-12.jsonl b/split_edge/graph_18035353-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-14.jsonl b/split_edge/graph_18035353-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-16.jsonl b/split_edge/graph_18035353-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-17.jsonl b/split_edge/graph_18035353-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-18.jsonl b/split_edge/graph_18035353-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-2.jsonl b/split_edge/graph_18035353-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-21.jsonl b/split_edge/graph_18035353-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-22.jsonl b/split_edge/graph_18035353-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-25.jsonl b/split_edge/graph_18035353-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-26.jsonl b/split_edge/graph_18035353-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-27.jsonl b/split_edge/graph_18035353-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-28.jsonl b/split_edge/graph_18035353-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-5.jsonl b/split_edge/graph_18035353-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-8.jsonl b/split_edge/graph_18035353-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18035353-9.jsonl b/split_edge/graph_18035353-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-0.jsonl b/split_edge/graph_18038464-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-1.jsonl b/split_edge/graph_18038464-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-11.jsonl b/split_edge/graph_18038464-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-12.jsonl b/split_edge/graph_18038464-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-13.jsonl b/split_edge/graph_18038464-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-14.jsonl b/split_edge/graph_18038464-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-15.jsonl b/split_edge/graph_18038464-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-16.jsonl b/split_edge/graph_18038464-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-17.jsonl b/split_edge/graph_18038464-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-18.jsonl b/split_edge/graph_18038464-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-2.jsonl b/split_edge/graph_18038464-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-21.jsonl b/split_edge/graph_18038464-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-22.jsonl b/split_edge/graph_18038464-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-23.jsonl b/split_edge/graph_18038464-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-25.jsonl b/split_edge/graph_18038464-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-26.jsonl b/split_edge/graph_18038464-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-28.jsonl b/split_edge/graph_18038464-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-29.jsonl b/split_edge/graph_18038464-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-3.jsonl b/split_edge/graph_18038464-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-30.jsonl b/split_edge/graph_18038464-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-31.jsonl b/split_edge/graph_18038464-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-32.jsonl b/split_edge/graph_18038464-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-33.jsonl b/split_edge/graph_18038464-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-35.jsonl b/split_edge/graph_18038464-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-36.jsonl b/split_edge/graph_18038464-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-37.jsonl b/split_edge/graph_18038464-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-38.jsonl b/split_edge/graph_18038464-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-39.jsonl b/split_edge/graph_18038464-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-4.jsonl b/split_edge/graph_18038464-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-5.jsonl b/split_edge/graph_18038464-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-6.jsonl b/split_edge/graph_18038464-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-7.jsonl b/split_edge/graph_18038464-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-8.jsonl b/split_edge/graph_18038464-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18038464-9.jsonl b/split_edge/graph_18038464-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-0.jsonl b/split_edge/graph_18047585-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-1.jsonl b/split_edge/graph_18047585-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-10.jsonl b/split_edge/graph_18047585-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-11.jsonl b/split_edge/graph_18047585-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-12.jsonl b/split_edge/graph_18047585-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-13.jsonl b/split_edge/graph_18047585-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-14.jsonl b/split_edge/graph_18047585-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-15.jsonl b/split_edge/graph_18047585-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-3.jsonl b/split_edge/graph_18047585-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-4.jsonl b/split_edge/graph_18047585-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-5.jsonl b/split_edge/graph_18047585-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-6.jsonl b/split_edge/graph_18047585-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18047585-9.jsonl b/split_edge/graph_18047585-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-1.jsonl b/split_edge/graph_18050848-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-10.jsonl b/split_edge/graph_18050848-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-11.jsonl b/split_edge/graph_18050848-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-13.jsonl b/split_edge/graph_18050848-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-14.jsonl b/split_edge/graph_18050848-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-15.jsonl b/split_edge/graph_18050848-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-17.jsonl b/split_edge/graph_18050848-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-18.jsonl b/split_edge/graph_18050848-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-19.jsonl b/split_edge/graph_18050848-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-2.jsonl b/split_edge/graph_18050848-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-22.jsonl b/split_edge/graph_18050848-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-23.jsonl b/split_edge/graph_18050848-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-25.jsonl b/split_edge/graph_18050848-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-28.jsonl b/split_edge/graph_18050848-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-3.jsonl b/split_edge/graph_18050848-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-6.jsonl b/split_edge/graph_18050848-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-7.jsonl b/split_edge/graph_18050848-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-8.jsonl b/split_edge/graph_18050848-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18050848-9.jsonl b/split_edge/graph_18050848-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-0.jsonl b/split_edge/graph_18090044-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-10.jsonl b/split_edge/graph_18090044-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-12.jsonl b/split_edge/graph_18090044-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-13.jsonl b/split_edge/graph_18090044-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-14.jsonl b/split_edge/graph_18090044-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-15.jsonl b/split_edge/graph_18090044-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-16.jsonl b/split_edge/graph_18090044-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-17.jsonl b/split_edge/graph_18090044-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-18.jsonl b/split_edge/graph_18090044-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-19.jsonl b/split_edge/graph_18090044-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-2.jsonl b/split_edge/graph_18090044-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-20.jsonl b/split_edge/graph_18090044-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-21.jsonl b/split_edge/graph_18090044-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-23.jsonl b/split_edge/graph_18090044-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-24.jsonl b/split_edge/graph_18090044-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-25.jsonl b/split_edge/graph_18090044-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-26.jsonl b/split_edge/graph_18090044-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-4.jsonl b/split_edge/graph_18090044-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-5.jsonl b/split_edge/graph_18090044-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-6.jsonl b/split_edge/graph_18090044-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-8.jsonl b/split_edge/graph_18090044-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18090044-9.jsonl b/split_edge/graph_18090044-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-0.jsonl b/split_edge/graph_181631491-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-10.jsonl b/split_edge/graph_181631491-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-11.jsonl b/split_edge/graph_181631491-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-13.jsonl b/split_edge/graph_181631491-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-14.jsonl b/split_edge/graph_181631491-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-15.jsonl b/split_edge/graph_181631491-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-17.jsonl b/split_edge/graph_181631491-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-22.jsonl b/split_edge/graph_181631491-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-23.jsonl b/split_edge/graph_181631491-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-24.jsonl b/split_edge/graph_181631491-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-3.jsonl b/split_edge/graph_181631491-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-33.jsonl b/split_edge/graph_181631491-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-35.jsonl b/split_edge/graph_181631491-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-36.jsonl b/split_edge/graph_181631491-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-38.jsonl b/split_edge/graph_181631491-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-39.jsonl b/split_edge/graph_181631491-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-43.jsonl b/split_edge/graph_181631491-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-45.jsonl b/split_edge/graph_181631491-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-46.jsonl b/split_edge/graph_181631491-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-48.jsonl b/split_edge/graph_181631491-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-50.jsonl b/split_edge/graph_181631491-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-51.jsonl b/split_edge/graph_181631491-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-52.jsonl b/split_edge/graph_181631491-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-6.jsonl b/split_edge/graph_181631491-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-7.jsonl b/split_edge/graph_181631491-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_181631491-8.jsonl b/split_edge/graph_181631491-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-1.jsonl b/split_edge/graph_18193930-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-10.jsonl b/split_edge/graph_18193930-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-12.jsonl b/split_edge/graph_18193930-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-14.jsonl b/split_edge/graph_18193930-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-15.jsonl b/split_edge/graph_18193930-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-16.jsonl b/split_edge/graph_18193930-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-17.jsonl b/split_edge/graph_18193930-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-18.jsonl b/split_edge/graph_18193930-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-19.jsonl b/split_edge/graph_18193930-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-2.jsonl b/split_edge/graph_18193930-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-21.jsonl b/split_edge/graph_18193930-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-22.jsonl b/split_edge/graph_18193930-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-23.jsonl b/split_edge/graph_18193930-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-25.jsonl b/split_edge/graph_18193930-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-26.jsonl b/split_edge/graph_18193930-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-27.jsonl b/split_edge/graph_18193930-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-28.jsonl b/split_edge/graph_18193930-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-29.jsonl b/split_edge/graph_18193930-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-31.jsonl b/split_edge/graph_18193930-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-33.jsonl b/split_edge/graph_18193930-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-34.jsonl b/split_edge/graph_18193930-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-35.jsonl b/split_edge/graph_18193930-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-36.jsonl b/split_edge/graph_18193930-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-4.jsonl b/split_edge/graph_18193930-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-5.jsonl b/split_edge/graph_18193930-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-6.jsonl b/split_edge/graph_18193930-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-7.jsonl b/split_edge/graph_18193930-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18193930-9.jsonl b/split_edge/graph_18193930-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1825689-1.jsonl b/split_edge/graph_1825689-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1825689-3.jsonl b/split_edge/graph_1825689-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1825689-6.jsonl b/split_edge/graph_1825689-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1827354-1.jsonl b/split_edge/graph_1827354-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1827354-3.jsonl b/split_edge/graph_1827354-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1827354-4.jsonl b/split_edge/graph_1827354-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1827354-6.jsonl b/split_edge/graph_1827354-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1827354-8.jsonl b/split_edge/graph_1827354-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1827354-9.jsonl b/split_edge/graph_1827354-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-0.jsonl b/split_edge/graph_18341905-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-1.jsonl b/split_edge/graph_18341905-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-10.jsonl b/split_edge/graph_18341905-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-11.jsonl b/split_edge/graph_18341905-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-2.jsonl b/split_edge/graph_18341905-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-3.jsonl b/split_edge/graph_18341905-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-4.jsonl b/split_edge/graph_18341905-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-5.jsonl b/split_edge/graph_18341905-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-6.jsonl b/split_edge/graph_18341905-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-7.jsonl b/split_edge/graph_18341905-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-8.jsonl b/split_edge/graph_18341905-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18341905-9.jsonl b/split_edge/graph_18341905-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-0.jsonl b/split_edge/graph_18363170-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-1.jsonl b/split_edge/graph_18363170-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-10.jsonl b/split_edge/graph_18363170-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-11.jsonl b/split_edge/graph_18363170-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-2.jsonl b/split_edge/graph_18363170-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-3.jsonl b/split_edge/graph_18363170-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-4.jsonl b/split_edge/graph_18363170-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-5.jsonl b/split_edge/graph_18363170-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-6.jsonl b/split_edge/graph_18363170-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-7.jsonl b/split_edge/graph_18363170-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-8.jsonl b/split_edge/graph_18363170-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18363170-9.jsonl b/split_edge/graph_18363170-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-0.jsonl b/split_edge/graph_18378073-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-10.jsonl b/split_edge/graph_18378073-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-11.jsonl b/split_edge/graph_18378073-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-2.jsonl b/split_edge/graph_18378073-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-3.jsonl b/split_edge/graph_18378073-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-4.jsonl b/split_edge/graph_18378073-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-5.jsonl b/split_edge/graph_18378073-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-6.jsonl b/split_edge/graph_18378073-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-7.jsonl b/split_edge/graph_18378073-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-8.jsonl b/split_edge/graph_18378073-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18378073-9.jsonl b/split_edge/graph_18378073-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18385185-0.jsonl b/split_edge/graph_18385185-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18385185-2.jsonl b/split_edge/graph_18385185-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18385185-3.jsonl b/split_edge/graph_18385185-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18385185-4.jsonl b/split_edge/graph_18385185-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18385185-8.jsonl b/split_edge/graph_18385185-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18385185-9.jsonl b/split_edge/graph_18385185-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-0.jsonl b/split_edge/graph_18392886-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-10.jsonl b/split_edge/graph_18392886-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-11.jsonl b/split_edge/graph_18392886-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-12.jsonl b/split_edge/graph_18392886-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-14.jsonl b/split_edge/graph_18392886-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-15.jsonl b/split_edge/graph_18392886-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-16.jsonl b/split_edge/graph_18392886-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-18.jsonl b/split_edge/graph_18392886-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-19.jsonl b/split_edge/graph_18392886-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-20.jsonl b/split_edge/graph_18392886-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-21.jsonl b/split_edge/graph_18392886-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-6.jsonl b/split_edge/graph_18392886-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-7.jsonl b/split_edge/graph_18392886-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18392886-8.jsonl b/split_edge/graph_18392886-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-1.jsonl b/split_edge/graph_18440098-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-10.jsonl b/split_edge/graph_18440098-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-11.jsonl b/split_edge/graph_18440098-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-12.jsonl b/split_edge/graph_18440098-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-13.jsonl b/split_edge/graph_18440098-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-14.jsonl b/split_edge/graph_18440098-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-15.jsonl b/split_edge/graph_18440098-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-16.jsonl b/split_edge/graph_18440098-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-17.jsonl b/split_edge/graph_18440098-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-2.jsonl b/split_edge/graph_18440098-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-3.jsonl b/split_edge/graph_18440098-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-4.jsonl b/split_edge/graph_18440098-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-5.jsonl b/split_edge/graph_18440098-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-6.jsonl b/split_edge/graph_18440098-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-7.jsonl b/split_edge/graph_18440098-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18440098-8.jsonl b/split_edge/graph_18440098-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-0.jsonl b/split_edge/graph_18451845-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-10.jsonl b/split_edge/graph_18451845-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-11.jsonl b/split_edge/graph_18451845-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-14.jsonl b/split_edge/graph_18451845-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-15.jsonl b/split_edge/graph_18451845-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-16.jsonl b/split_edge/graph_18451845-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-17.jsonl b/split_edge/graph_18451845-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-18.jsonl b/split_edge/graph_18451845-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-19.jsonl b/split_edge/graph_18451845-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-2.jsonl b/split_edge/graph_18451845-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-20.jsonl b/split_edge/graph_18451845-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-21.jsonl b/split_edge/graph_18451845-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-22.jsonl b/split_edge/graph_18451845-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-23.jsonl b/split_edge/graph_18451845-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-24.jsonl b/split_edge/graph_18451845-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-3.jsonl b/split_edge/graph_18451845-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-4.jsonl b/split_edge/graph_18451845-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-5.jsonl b/split_edge/graph_18451845-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-6.jsonl b/split_edge/graph_18451845-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-7.jsonl b/split_edge/graph_18451845-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-8.jsonl b/split_edge/graph_18451845-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18451845-9.jsonl b/split_edge/graph_18451845-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-1.jsonl b/split_edge/graph_18468713-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-10.jsonl b/split_edge/graph_18468713-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-13.jsonl b/split_edge/graph_18468713-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-14.jsonl b/split_edge/graph_18468713-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-15.jsonl b/split_edge/graph_18468713-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-18.jsonl b/split_edge/graph_18468713-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-19.jsonl b/split_edge/graph_18468713-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-20.jsonl b/split_edge/graph_18468713-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-22.jsonl b/split_edge/graph_18468713-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-23.jsonl b/split_edge/graph_18468713-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-3.jsonl b/split_edge/graph_18468713-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-4.jsonl b/split_edge/graph_18468713-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-5.jsonl b/split_edge/graph_18468713-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-6.jsonl b/split_edge/graph_18468713-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-7.jsonl b/split_edge/graph_18468713-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-8.jsonl b/split_edge/graph_18468713-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18468713-9.jsonl b/split_edge/graph_18468713-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-10.jsonl b/split_edge/graph_18526204-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-11.jsonl b/split_edge/graph_18526204-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-13.jsonl b/split_edge/graph_18526204-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-14.jsonl b/split_edge/graph_18526204-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-17.jsonl b/split_edge/graph_18526204-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-19.jsonl b/split_edge/graph_18526204-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-2.jsonl b/split_edge/graph_18526204-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-21.jsonl b/split_edge/graph_18526204-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-23.jsonl b/split_edge/graph_18526204-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-3.jsonl b/split_edge/graph_18526204-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-4.jsonl b/split_edge/graph_18526204-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-5.jsonl b/split_edge/graph_18526204-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-6.jsonl b/split_edge/graph_18526204-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18526204-9.jsonl b/split_edge/graph_18526204-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18555534-0.jsonl b/split_edge/graph_18555534-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18555534-1.jsonl b/split_edge/graph_18555534-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18555534-2.jsonl b/split_edge/graph_18555534-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18555534-3.jsonl b/split_edge/graph_18555534-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18565134-11.jsonl b/split_edge/graph_18565134-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18565134-13.jsonl b/split_edge/graph_18565134-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18565134-14.jsonl b/split_edge/graph_18565134-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18565134-16.jsonl b/split_edge/graph_18565134-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18565134-6.jsonl b/split_edge/graph_18565134-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18565134-7.jsonl b/split_edge/graph_18565134-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18565134-8.jsonl b/split_edge/graph_18565134-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-0.jsonl b/split_edge/graph_18611665-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-12.jsonl b/split_edge/graph_18611665-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-16.jsonl b/split_edge/graph_18611665-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-17.jsonl b/split_edge/graph_18611665-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-20.jsonl b/split_edge/graph_18611665-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-22.jsonl b/split_edge/graph_18611665-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-5.jsonl b/split_edge/graph_18611665-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18611665-7.jsonl b/split_edge/graph_18611665-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-0.jsonl b/split_edge/graph_18643817-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-18.jsonl b/split_edge/graph_18643817-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-2.jsonl b/split_edge/graph_18643817-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-20.jsonl b/split_edge/graph_18643817-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-22.jsonl b/split_edge/graph_18643817-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-4.jsonl b/split_edge/graph_18643817-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-6.jsonl b/split_edge/graph_18643817-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-7.jsonl b/split_edge/graph_18643817-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-8.jsonl b/split_edge/graph_18643817-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18643817-9.jsonl b/split_edge/graph_18643817-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-0.jsonl b/split_edge/graph_18706321-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-10.jsonl b/split_edge/graph_18706321-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-11.jsonl b/split_edge/graph_18706321-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-16.jsonl b/split_edge/graph_18706321-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-18.jsonl b/split_edge/graph_18706321-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-2.jsonl b/split_edge/graph_18706321-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-20.jsonl b/split_edge/graph_18706321-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-21.jsonl b/split_edge/graph_18706321-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-22.jsonl b/split_edge/graph_18706321-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-23.jsonl b/split_edge/graph_18706321-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-24.jsonl b/split_edge/graph_18706321-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-25.jsonl b/split_edge/graph_18706321-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-3.jsonl b/split_edge/graph_18706321-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-32.jsonl b/split_edge/graph_18706321-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-33.jsonl b/split_edge/graph_18706321-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-37.jsonl b/split_edge/graph_18706321-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-38.jsonl b/split_edge/graph_18706321-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-4.jsonl b/split_edge/graph_18706321-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-41.jsonl b/split_edge/graph_18706321-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-42.jsonl b/split_edge/graph_18706321-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-44.jsonl b/split_edge/graph_18706321-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-45.jsonl b/split_edge/graph_18706321-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-46.jsonl b/split_edge/graph_18706321-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-48.jsonl b/split_edge/graph_18706321-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-49.jsonl b/split_edge/graph_18706321-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-5.jsonl b/split_edge/graph_18706321-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-50.jsonl b/split_edge/graph_18706321-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-51.jsonl b/split_edge/graph_18706321-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18706321-9.jsonl b/split_edge/graph_18706321-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-0.jsonl b/split_edge/graph_1870730-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-1.jsonl b/split_edge/graph_1870730-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-10.jsonl b/split_edge/graph_1870730-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-12.jsonl b/split_edge/graph_1870730-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-13.jsonl b/split_edge/graph_1870730-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-14.jsonl b/split_edge/graph_1870730-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-15.jsonl b/split_edge/graph_1870730-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-5.jsonl b/split_edge/graph_1870730-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-6.jsonl b/split_edge/graph_1870730-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-7.jsonl b/split_edge/graph_1870730-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-8.jsonl b/split_edge/graph_1870730-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1870730-9.jsonl b/split_edge/graph_1870730-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-0.jsonl b/split_edge/graph_18722099-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-10.jsonl b/split_edge/graph_18722099-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-11.jsonl b/split_edge/graph_18722099-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-12.jsonl b/split_edge/graph_18722099-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-2.jsonl b/split_edge/graph_18722099-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-3.jsonl b/split_edge/graph_18722099-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-4.jsonl b/split_edge/graph_18722099-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-5.jsonl b/split_edge/graph_18722099-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-6.jsonl b/split_edge/graph_18722099-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-7.jsonl b/split_edge/graph_18722099-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-8.jsonl b/split_edge/graph_18722099-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18722099-9.jsonl b/split_edge/graph_18722099-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-1.jsonl b/split_edge/graph_18746083-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-11.jsonl b/split_edge/graph_18746083-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-12.jsonl b/split_edge/graph_18746083-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-13.jsonl b/split_edge/graph_18746083-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-14.jsonl b/split_edge/graph_18746083-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-18.jsonl b/split_edge/graph_18746083-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-3.jsonl b/split_edge/graph_18746083-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-4.jsonl b/split_edge/graph_18746083-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-5.jsonl b/split_edge/graph_18746083-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-6.jsonl b/split_edge/graph_18746083-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-8.jsonl b/split_edge/graph_18746083-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18746083-9.jsonl b/split_edge/graph_18746083-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18747476-0.jsonl b/split_edge/graph_18747476-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18747476-5.jsonl b/split_edge/graph_18747476-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18747476-7.jsonl b/split_edge/graph_18747476-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18747476-8.jsonl b/split_edge/graph_18747476-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-13.jsonl b/split_edge/graph_1876323-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-14.jsonl b/split_edge/graph_1876323-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-18.jsonl b/split_edge/graph_1876323-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-22.jsonl b/split_edge/graph_1876323-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-26.jsonl b/split_edge/graph_1876323-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-27.jsonl b/split_edge/graph_1876323-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-35.jsonl b/split_edge/graph_1876323-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1876323-36.jsonl b/split_edge/graph_1876323-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-1.jsonl b/split_edge/graph_18843181-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-10.jsonl b/split_edge/graph_18843181-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-11.jsonl b/split_edge/graph_18843181-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-12.jsonl b/split_edge/graph_18843181-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-13.jsonl b/split_edge/graph_18843181-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-14.jsonl b/split_edge/graph_18843181-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-2.jsonl b/split_edge/graph_18843181-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-5.jsonl b/split_edge/graph_18843181-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-6.jsonl b/split_edge/graph_18843181-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-7.jsonl b/split_edge/graph_18843181-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-8.jsonl b/split_edge/graph_18843181-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18843181-9.jsonl b/split_edge/graph_18843181-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1885014-0.jsonl b/split_edge/graph_1885014-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1885014-1.jsonl b/split_edge/graph_1885014-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1885014-3.jsonl b/split_edge/graph_1885014-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1885014-5.jsonl b/split_edge/graph_1885014-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-0.jsonl b/split_edge/graph_1888038-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-1.jsonl b/split_edge/graph_1888038-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-10.jsonl b/split_edge/graph_1888038-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-2.jsonl b/split_edge/graph_1888038-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-3.jsonl b/split_edge/graph_1888038-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-4.jsonl b/split_edge/graph_1888038-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-6.jsonl b/split_edge/graph_1888038-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-7.jsonl b/split_edge/graph_1888038-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1888038-8.jsonl b/split_edge/graph_1888038-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-104.jsonl b/split_edge/graph_18936504-104.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-36.jsonl b/split_edge/graph_18936504-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-43.jsonl b/split_edge/graph_18936504-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-48.jsonl b/split_edge/graph_18936504-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-57.jsonl b/split_edge/graph_18936504-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-58.jsonl b/split_edge/graph_18936504-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-6.jsonl b/split_edge/graph_18936504-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-7.jsonl b/split_edge/graph_18936504-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-78.jsonl b/split_edge/graph_18936504-78.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-81.jsonl b/split_edge/graph_18936504-81.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-86.jsonl b/split_edge/graph_18936504-86.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18936504-9.jsonl b/split_edge/graph_18936504-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-0.jsonl b/split_edge/graph_18948342-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-10.jsonl b/split_edge/graph_18948342-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-11.jsonl b/split_edge/graph_18948342-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-12.jsonl b/split_edge/graph_18948342-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-13.jsonl b/split_edge/graph_18948342-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-14.jsonl b/split_edge/graph_18948342-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-15.jsonl b/split_edge/graph_18948342-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-16.jsonl b/split_edge/graph_18948342-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-17.jsonl b/split_edge/graph_18948342-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-18.jsonl b/split_edge/graph_18948342-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-19.jsonl b/split_edge/graph_18948342-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-20.jsonl b/split_edge/graph_18948342-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-21.jsonl b/split_edge/graph_18948342-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-23.jsonl b/split_edge/graph_18948342-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-24.jsonl b/split_edge/graph_18948342-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-25.jsonl b/split_edge/graph_18948342-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-27.jsonl b/split_edge/graph_18948342-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-29.jsonl b/split_edge/graph_18948342-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-3.jsonl b/split_edge/graph_18948342-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-30.jsonl b/split_edge/graph_18948342-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-32.jsonl b/split_edge/graph_18948342-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-34.jsonl b/split_edge/graph_18948342-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-38.jsonl b/split_edge/graph_18948342-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-39.jsonl b/split_edge/graph_18948342-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-40.jsonl b/split_edge/graph_18948342-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-41.jsonl b/split_edge/graph_18948342-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-6.jsonl b/split_edge/graph_18948342-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-8.jsonl b/split_edge/graph_18948342-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18948342-9.jsonl b/split_edge/graph_18948342-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1896632-0.jsonl b/split_edge/graph_1896632-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1896632-1.jsonl b/split_edge/graph_1896632-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1896632-2.jsonl b/split_edge/graph_1896632-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1896632-4.jsonl b/split_edge/graph_1896632-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1896632-5.jsonl b/split_edge/graph_1896632-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18967271-0.jsonl b/split_edge/graph_18967271-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18967271-1.jsonl b/split_edge/graph_18967271-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18967271-9.jsonl b/split_edge/graph_18967271-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18973234-0.jsonl b/split_edge/graph_18973234-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18973234-1.jsonl b/split_edge/graph_18973234-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18973234-3.jsonl b/split_edge/graph_18973234-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18973234-4.jsonl b/split_edge/graph_18973234-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18973234-6.jsonl b/split_edge/graph_18973234-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-0.jsonl b/split_edge/graph_18976841-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-2.jsonl b/split_edge/graph_18976841-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-3.jsonl b/split_edge/graph_18976841-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-5.jsonl b/split_edge/graph_18976841-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-6.jsonl b/split_edge/graph_18976841-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-7.jsonl b/split_edge/graph_18976841-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-8.jsonl b/split_edge/graph_18976841-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_18976841-9.jsonl b/split_edge/graph_18976841-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-0.jsonl b/split_edge/graph_189824166-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-1.jsonl b/split_edge/graph_189824166-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-11.jsonl b/split_edge/graph_189824166-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-12.jsonl b/split_edge/graph_189824166-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-13.jsonl b/split_edge/graph_189824166-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-14.jsonl b/split_edge/graph_189824166-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-15.jsonl b/split_edge/graph_189824166-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-16.jsonl b/split_edge/graph_189824166-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-18.jsonl b/split_edge/graph_189824166-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-19.jsonl b/split_edge/graph_189824166-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-2.jsonl b/split_edge/graph_189824166-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-20.jsonl b/split_edge/graph_189824166-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-21.jsonl b/split_edge/graph_189824166-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-22.jsonl b/split_edge/graph_189824166-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-3.jsonl b/split_edge/graph_189824166-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-4.jsonl b/split_edge/graph_189824166-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-5.jsonl b/split_edge/graph_189824166-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-6.jsonl b/split_edge/graph_189824166-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-7.jsonl b/split_edge/graph_189824166-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-8.jsonl b/split_edge/graph_189824166-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189824166-9.jsonl b/split_edge/graph_189824166-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-0.jsonl b/split_edge/graph_189931013-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-1.jsonl b/split_edge/graph_189931013-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-10.jsonl b/split_edge/graph_189931013-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-11.jsonl b/split_edge/graph_189931013-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-16.jsonl b/split_edge/graph_189931013-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-17.jsonl b/split_edge/graph_189931013-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-2.jsonl b/split_edge/graph_189931013-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-4.jsonl b/split_edge/graph_189931013-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-5.jsonl b/split_edge/graph_189931013-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-6.jsonl b/split_edge/graph_189931013-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_189931013-7.jsonl b/split_edge/graph_189931013-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19005250-0.jsonl b/split_edge/graph_19005250-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19005250-4.jsonl b/split_edge/graph_19005250-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19005250-6.jsonl b/split_edge/graph_19005250-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-0.jsonl b/split_edge/graph_190530901-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-1.jsonl b/split_edge/graph_190530901-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-2.jsonl b/split_edge/graph_190530901-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-3.jsonl b/split_edge/graph_190530901-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-4.jsonl b/split_edge/graph_190530901-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-5.jsonl b/split_edge/graph_190530901-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-6.jsonl b/split_edge/graph_190530901-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-7.jsonl b/split_edge/graph_190530901-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_190530901-8.jsonl b/split_edge/graph_190530901-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-0.jsonl b/split_edge/graph_19209226-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-10.jsonl b/split_edge/graph_19209226-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-11.jsonl b/split_edge/graph_19209226-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-12.jsonl b/split_edge/graph_19209226-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-15.jsonl b/split_edge/graph_19209226-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-16.jsonl b/split_edge/graph_19209226-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-17.jsonl b/split_edge/graph_19209226-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-18.jsonl b/split_edge/graph_19209226-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-19.jsonl b/split_edge/graph_19209226-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-21.jsonl b/split_edge/graph_19209226-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-22.jsonl b/split_edge/graph_19209226-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-24.jsonl b/split_edge/graph_19209226-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-25.jsonl b/split_edge/graph_19209226-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-27.jsonl b/split_edge/graph_19209226-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-28.jsonl b/split_edge/graph_19209226-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-29.jsonl b/split_edge/graph_19209226-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-3.jsonl b/split_edge/graph_19209226-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-30.jsonl b/split_edge/graph_19209226-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-31.jsonl b/split_edge/graph_19209226-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-4.jsonl b/split_edge/graph_19209226-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-5.jsonl b/split_edge/graph_19209226-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-6.jsonl b/split_edge/graph_19209226-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-7.jsonl b/split_edge/graph_19209226-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19209226-9.jsonl b/split_edge/graph_19209226-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-0.jsonl b/split_edge/graph_192635047-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-1.jsonl b/split_edge/graph_192635047-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-10.jsonl b/split_edge/graph_192635047-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-11.jsonl b/split_edge/graph_192635047-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-12.jsonl b/split_edge/graph_192635047-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-16.jsonl b/split_edge/graph_192635047-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-2.jsonl b/split_edge/graph_192635047-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-3.jsonl b/split_edge/graph_192635047-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-4.jsonl b/split_edge/graph_192635047-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-5.jsonl b/split_edge/graph_192635047-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192635047-9.jsonl b/split_edge/graph_192635047-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-0.jsonl b/split_edge/graph_192658173-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-1.jsonl b/split_edge/graph_192658173-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-10.jsonl b/split_edge/graph_192658173-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-11.jsonl b/split_edge/graph_192658173-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-3.jsonl b/split_edge/graph_192658173-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-5.jsonl b/split_edge/graph_192658173-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-6.jsonl b/split_edge/graph_192658173-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-7.jsonl b/split_edge/graph_192658173-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-8.jsonl b/split_edge/graph_192658173-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_192658173-9.jsonl b/split_edge/graph_192658173-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-0.jsonl b/split_edge/graph_1932843-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-1.jsonl b/split_edge/graph_1932843-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-10.jsonl b/split_edge/graph_1932843-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-11.jsonl b/split_edge/graph_1932843-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-13.jsonl b/split_edge/graph_1932843-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-14.jsonl b/split_edge/graph_1932843-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-15.jsonl b/split_edge/graph_1932843-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-16.jsonl b/split_edge/graph_1932843-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-19.jsonl b/split_edge/graph_1932843-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-2.jsonl b/split_edge/graph_1932843-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-20.jsonl b/split_edge/graph_1932843-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-21.jsonl b/split_edge/graph_1932843-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-22.jsonl b/split_edge/graph_1932843-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-24.jsonl b/split_edge/graph_1932843-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-25.jsonl b/split_edge/graph_1932843-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-26.jsonl b/split_edge/graph_1932843-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-27.jsonl b/split_edge/graph_1932843-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-28.jsonl b/split_edge/graph_1932843-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-29.jsonl b/split_edge/graph_1932843-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-3.jsonl b/split_edge/graph_1932843-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-30.jsonl b/split_edge/graph_1932843-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-31.jsonl b/split_edge/graph_1932843-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-32.jsonl b/split_edge/graph_1932843-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-33.jsonl b/split_edge/graph_1932843-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-34.jsonl b/split_edge/graph_1932843-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-35.jsonl b/split_edge/graph_1932843-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-38.jsonl b/split_edge/graph_1932843-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-40.jsonl b/split_edge/graph_1932843-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-41.jsonl b/split_edge/graph_1932843-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-43.jsonl b/split_edge/graph_1932843-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-44.jsonl b/split_edge/graph_1932843-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-45.jsonl b/split_edge/graph_1932843-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-46.jsonl b/split_edge/graph_1932843-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-47.jsonl b/split_edge/graph_1932843-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-48.jsonl b/split_edge/graph_1932843-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-5.jsonl b/split_edge/graph_1932843-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-50.jsonl b/split_edge/graph_1932843-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-51.jsonl b/split_edge/graph_1932843-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-52.jsonl b/split_edge/graph_1932843-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-53.jsonl b/split_edge/graph_1932843-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-54.jsonl b/split_edge/graph_1932843-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-57.jsonl b/split_edge/graph_1932843-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-59.jsonl b/split_edge/graph_1932843-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-61.jsonl b/split_edge/graph_1932843-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-66.jsonl b/split_edge/graph_1932843-66.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-69.jsonl b/split_edge/graph_1932843-69.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-7.jsonl b/split_edge/graph_1932843-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-74.jsonl b/split_edge/graph_1932843-74.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-8.jsonl b/split_edge/graph_1932843-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1932843-9.jsonl b/split_edge/graph_1932843-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-0.jsonl b/split_edge/graph_19334650-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-1.jsonl b/split_edge/graph_19334650-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-11.jsonl b/split_edge/graph_19334650-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-12.jsonl b/split_edge/graph_19334650-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-2.jsonl b/split_edge/graph_19334650-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-3.jsonl b/split_edge/graph_19334650-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-4.jsonl b/split_edge/graph_19334650-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-6.jsonl b/split_edge/graph_19334650-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19334650-9.jsonl b/split_edge/graph_19334650-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-0.jsonl b/split_edge/graph_193574-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-10.jsonl b/split_edge/graph_193574-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-12.jsonl b/split_edge/graph_193574-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-13.jsonl b/split_edge/graph_193574-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-14.jsonl b/split_edge/graph_193574-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-15.jsonl b/split_edge/graph_193574-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-16.jsonl b/split_edge/graph_193574-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-2.jsonl b/split_edge/graph_193574-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-3.jsonl b/split_edge/graph_193574-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-4.jsonl b/split_edge/graph_193574-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-5.jsonl b/split_edge/graph_193574-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-6.jsonl b/split_edge/graph_193574-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-7.jsonl b/split_edge/graph_193574-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_193574-8.jsonl b/split_edge/graph_193574-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19358214-0.jsonl b/split_edge/graph_19358214-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19358214-2.jsonl b/split_edge/graph_19358214-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19358214-5.jsonl b/split_edge/graph_19358214-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19358214-6.jsonl b/split_edge/graph_19358214-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19358214-7.jsonl b/split_edge/graph_19358214-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19358214-9.jsonl b/split_edge/graph_19358214-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19419973-16.jsonl b/split_edge/graph_19419973-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-0.jsonl b/split_edge/graph_194321-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-1.jsonl b/split_edge/graph_194321-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-13.jsonl b/split_edge/graph_194321-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-15.jsonl b/split_edge/graph_194321-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-18.jsonl b/split_edge/graph_194321-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-19.jsonl b/split_edge/graph_194321-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-2.jsonl b/split_edge/graph_194321-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-20.jsonl b/split_edge/graph_194321-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-21.jsonl b/split_edge/graph_194321-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-23.jsonl b/split_edge/graph_194321-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-25.jsonl b/split_edge/graph_194321-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-26.jsonl b/split_edge/graph_194321-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-27.jsonl b/split_edge/graph_194321-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-28.jsonl b/split_edge/graph_194321-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-3.jsonl b/split_edge/graph_194321-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-4.jsonl b/split_edge/graph_194321-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-5.jsonl b/split_edge/graph_194321-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_194321-6.jsonl b/split_edge/graph_194321-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1949367-12.jsonl b/split_edge/graph_1949367-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1949367-2.jsonl b/split_edge/graph_1949367-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1949367-4.jsonl b/split_edge/graph_1949367-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-0.jsonl b/split_edge/graph_1956433-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-12.jsonl b/split_edge/graph_1956433-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-13.jsonl b/split_edge/graph_1956433-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-14.jsonl b/split_edge/graph_1956433-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-27.jsonl b/split_edge/graph_1956433-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-29.jsonl b/split_edge/graph_1956433-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-30.jsonl b/split_edge/graph_1956433-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-33.jsonl b/split_edge/graph_1956433-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-35.jsonl b/split_edge/graph_1956433-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-38.jsonl b/split_edge/graph_1956433-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-5.jsonl b/split_edge/graph_1956433-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1956433-7.jsonl b/split_edge/graph_1956433-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-0.jsonl b/split_edge/graph_195736509-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-1.jsonl b/split_edge/graph_195736509-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-10.jsonl b/split_edge/graph_195736509-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-11.jsonl b/split_edge/graph_195736509-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-18.jsonl b/split_edge/graph_195736509-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-19.jsonl b/split_edge/graph_195736509-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-2.jsonl b/split_edge/graph_195736509-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-20.jsonl b/split_edge/graph_195736509-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-21.jsonl b/split_edge/graph_195736509-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-22.jsonl b/split_edge/graph_195736509-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-23.jsonl b/split_edge/graph_195736509-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-24.jsonl b/split_edge/graph_195736509-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-6.jsonl b/split_edge/graph_195736509-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-7.jsonl b/split_edge/graph_195736509-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-8.jsonl b/split_edge/graph_195736509-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195736509-9.jsonl b/split_edge/graph_195736509-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-0.jsonl b/split_edge/graph_195739852-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-1.jsonl b/split_edge/graph_195739852-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-12.jsonl b/split_edge/graph_195739852-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-13.jsonl b/split_edge/graph_195739852-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-14.jsonl b/split_edge/graph_195739852-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-15.jsonl b/split_edge/graph_195739852-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-18.jsonl b/split_edge/graph_195739852-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-2.jsonl b/split_edge/graph_195739852-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-20.jsonl b/split_edge/graph_195739852-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-21.jsonl b/split_edge/graph_195739852-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-22.jsonl b/split_edge/graph_195739852-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-24.jsonl b/split_edge/graph_195739852-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-25.jsonl b/split_edge/graph_195739852-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-26.jsonl b/split_edge/graph_195739852-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-27.jsonl b/split_edge/graph_195739852-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-28.jsonl b/split_edge/graph_195739852-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-3.jsonl b/split_edge/graph_195739852-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-30.jsonl b/split_edge/graph_195739852-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-31.jsonl b/split_edge/graph_195739852-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-32.jsonl b/split_edge/graph_195739852-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-33.jsonl b/split_edge/graph_195739852-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-35.jsonl b/split_edge/graph_195739852-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-36.jsonl b/split_edge/graph_195739852-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-38.jsonl b/split_edge/graph_195739852-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-39.jsonl b/split_edge/graph_195739852-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-4.jsonl b/split_edge/graph_195739852-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-40.jsonl b/split_edge/graph_195739852-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-41.jsonl b/split_edge/graph_195739852-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-42.jsonl b/split_edge/graph_195739852-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-43.jsonl b/split_edge/graph_195739852-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-44.jsonl b/split_edge/graph_195739852-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-5.jsonl b/split_edge/graph_195739852-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-6.jsonl b/split_edge/graph_195739852-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195739852-7.jsonl b/split_edge/graph_195739852-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-0.jsonl b/split_edge/graph_195765560-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-11.jsonl b/split_edge/graph_195765560-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-12.jsonl b/split_edge/graph_195765560-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-13.jsonl b/split_edge/graph_195765560-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-15.jsonl b/split_edge/graph_195765560-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-16.jsonl b/split_edge/graph_195765560-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-17.jsonl b/split_edge/graph_195765560-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-19.jsonl b/split_edge/graph_195765560-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-2.jsonl b/split_edge/graph_195765560-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-20.jsonl b/split_edge/graph_195765560-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-25.jsonl b/split_edge/graph_195765560-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-3.jsonl b/split_edge/graph_195765560-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-7.jsonl b/split_edge/graph_195765560-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-8.jsonl b/split_edge/graph_195765560-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195765560-9.jsonl b/split_edge/graph_195765560-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-0.jsonl b/split_edge/graph_195833499-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-1.jsonl b/split_edge/graph_195833499-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-10.jsonl b/split_edge/graph_195833499-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-11.jsonl b/split_edge/graph_195833499-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-12.jsonl b/split_edge/graph_195833499-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-14.jsonl b/split_edge/graph_195833499-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-15.jsonl b/split_edge/graph_195833499-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-16.jsonl b/split_edge/graph_195833499-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-17.jsonl b/split_edge/graph_195833499-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-19.jsonl b/split_edge/graph_195833499-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-2.jsonl b/split_edge/graph_195833499-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-20.jsonl b/split_edge/graph_195833499-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-21.jsonl b/split_edge/graph_195833499-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-23.jsonl b/split_edge/graph_195833499-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-24.jsonl b/split_edge/graph_195833499-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-25.jsonl b/split_edge/graph_195833499-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-26.jsonl b/split_edge/graph_195833499-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-27.jsonl b/split_edge/graph_195833499-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-28.jsonl b/split_edge/graph_195833499-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-29.jsonl b/split_edge/graph_195833499-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-30.jsonl b/split_edge/graph_195833499-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-31.jsonl b/split_edge/graph_195833499-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-32.jsonl b/split_edge/graph_195833499-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-33.jsonl b/split_edge/graph_195833499-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-34.jsonl b/split_edge/graph_195833499-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-35.jsonl b/split_edge/graph_195833499-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-37.jsonl b/split_edge/graph_195833499-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-38.jsonl b/split_edge/graph_195833499-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-39.jsonl b/split_edge/graph_195833499-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_195833499-7.jsonl b/split_edge/graph_195833499-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-0.jsonl b/split_edge/graph_19739314-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-1.jsonl b/split_edge/graph_19739314-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-10.jsonl b/split_edge/graph_19739314-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-11.jsonl b/split_edge/graph_19739314-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-12.jsonl b/split_edge/graph_19739314-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-13.jsonl b/split_edge/graph_19739314-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-14.jsonl b/split_edge/graph_19739314-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-15.jsonl b/split_edge/graph_19739314-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-16.jsonl b/split_edge/graph_19739314-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-18.jsonl b/split_edge/graph_19739314-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-20.jsonl b/split_edge/graph_19739314-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-21.jsonl b/split_edge/graph_19739314-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-23.jsonl b/split_edge/graph_19739314-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-24.jsonl b/split_edge/graph_19739314-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-25.jsonl b/split_edge/graph_19739314-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-3.jsonl b/split_edge/graph_19739314-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-4.jsonl b/split_edge/graph_19739314-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-5.jsonl b/split_edge/graph_19739314-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-6.jsonl b/split_edge/graph_19739314-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-8.jsonl b/split_edge/graph_19739314-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_19739314-9.jsonl b/split_edge/graph_19739314-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-1.jsonl b/split_edge/graph_198120381-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-10.jsonl b/split_edge/graph_198120381-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-11.jsonl b/split_edge/graph_198120381-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-12.jsonl b/split_edge/graph_198120381-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-13.jsonl b/split_edge/graph_198120381-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-14.jsonl b/split_edge/graph_198120381-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-15.jsonl b/split_edge/graph_198120381-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-16.jsonl b/split_edge/graph_198120381-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-18.jsonl b/split_edge/graph_198120381-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-19.jsonl b/split_edge/graph_198120381-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-2.jsonl b/split_edge/graph_198120381-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-21.jsonl b/split_edge/graph_198120381-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-22.jsonl b/split_edge/graph_198120381-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-23.jsonl b/split_edge/graph_198120381-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-24.jsonl b/split_edge/graph_198120381-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-25.jsonl b/split_edge/graph_198120381-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-26.jsonl b/split_edge/graph_198120381-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-3.jsonl b/split_edge/graph_198120381-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-4.jsonl b/split_edge/graph_198120381-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-5.jsonl b/split_edge/graph_198120381-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-6.jsonl b/split_edge/graph_198120381-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-8.jsonl b/split_edge/graph_198120381-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198120381-9.jsonl b/split_edge/graph_198120381-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198147132-0.jsonl b/split_edge/graph_198147132-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198147132-1.jsonl b/split_edge/graph_198147132-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198147132-2.jsonl b/split_edge/graph_198147132-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198147132-5.jsonl b/split_edge/graph_198147132-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198147132-6.jsonl b/split_edge/graph_198147132-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198147132-7.jsonl b/split_edge/graph_198147132-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198147132-8.jsonl b/split_edge/graph_198147132-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-0.jsonl b/split_edge/graph_198315528-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-10.jsonl b/split_edge/graph_198315528-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-11.jsonl b/split_edge/graph_198315528-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-12.jsonl b/split_edge/graph_198315528-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-2.jsonl b/split_edge/graph_198315528-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-3.jsonl b/split_edge/graph_198315528-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-4.jsonl b/split_edge/graph_198315528-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-5.jsonl b/split_edge/graph_198315528-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-6.jsonl b/split_edge/graph_198315528-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-7.jsonl b/split_edge/graph_198315528-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-8.jsonl b/split_edge/graph_198315528-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198315528-9.jsonl b/split_edge/graph_198315528-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-0.jsonl b/split_edge/graph_198906012-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-10.jsonl b/split_edge/graph_198906012-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-11.jsonl b/split_edge/graph_198906012-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-2.jsonl b/split_edge/graph_198906012-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-4.jsonl b/split_edge/graph_198906012-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-5.jsonl b/split_edge/graph_198906012-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-6.jsonl b/split_edge/graph_198906012-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-8.jsonl b/split_edge/graph_198906012-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198906012-9.jsonl b/split_edge/graph_198906012-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-1.jsonl b/split_edge/graph_198930499-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-10.jsonl b/split_edge/graph_198930499-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-11.jsonl b/split_edge/graph_198930499-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-13.jsonl b/split_edge/graph_198930499-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-17.jsonl b/split_edge/graph_198930499-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-2.jsonl b/split_edge/graph_198930499-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-22.jsonl b/split_edge/graph_198930499-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-6.jsonl b/split_edge/graph_198930499-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-8.jsonl b/split_edge/graph_198930499-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930499-9.jsonl b/split_edge/graph_198930499-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-0.jsonl b/split_edge/graph_198930899-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-1.jsonl b/split_edge/graph_198930899-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-10.jsonl b/split_edge/graph_198930899-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-11.jsonl b/split_edge/graph_198930899-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-12.jsonl b/split_edge/graph_198930899-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-15.jsonl b/split_edge/graph_198930899-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-16.jsonl b/split_edge/graph_198930899-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-17.jsonl b/split_edge/graph_198930899-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-18.jsonl b/split_edge/graph_198930899-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-19.jsonl b/split_edge/graph_198930899-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-2.jsonl b/split_edge/graph_198930899-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-20.jsonl b/split_edge/graph_198930899-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-21.jsonl b/split_edge/graph_198930899-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-22.jsonl b/split_edge/graph_198930899-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-23.jsonl b/split_edge/graph_198930899-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-24.jsonl b/split_edge/graph_198930899-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-25.jsonl b/split_edge/graph_198930899-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-4.jsonl b/split_edge/graph_198930899-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-5.jsonl b/split_edge/graph_198930899-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-6.jsonl b/split_edge/graph_198930899-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-7.jsonl b/split_edge/graph_198930899-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-8.jsonl b/split_edge/graph_198930899-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198930899-9.jsonl b/split_edge/graph_198930899-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-0.jsonl b/split_edge/graph_198986097-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-1.jsonl b/split_edge/graph_198986097-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-11.jsonl b/split_edge/graph_198986097-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-12.jsonl b/split_edge/graph_198986097-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-13.jsonl b/split_edge/graph_198986097-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-14.jsonl b/split_edge/graph_198986097-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-15.jsonl b/split_edge/graph_198986097-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-17.jsonl b/split_edge/graph_198986097-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-18.jsonl b/split_edge/graph_198986097-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-19.jsonl b/split_edge/graph_198986097-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-2.jsonl b/split_edge/graph_198986097-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-20.jsonl b/split_edge/graph_198986097-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-21.jsonl b/split_edge/graph_198986097-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-22.jsonl b/split_edge/graph_198986097-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-24.jsonl b/split_edge/graph_198986097-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-25.jsonl b/split_edge/graph_198986097-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-26.jsonl b/split_edge/graph_198986097-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-27.jsonl b/split_edge/graph_198986097-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-28.jsonl b/split_edge/graph_198986097-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-29.jsonl b/split_edge/graph_198986097-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-3.jsonl b/split_edge/graph_198986097-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-30.jsonl b/split_edge/graph_198986097-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-32.jsonl b/split_edge/graph_198986097-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-33.jsonl b/split_edge/graph_198986097-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-34.jsonl b/split_edge/graph_198986097-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-35.jsonl b/split_edge/graph_198986097-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-37.jsonl b/split_edge/graph_198986097-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-39.jsonl b/split_edge/graph_198986097-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-4.jsonl b/split_edge/graph_198986097-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-40.jsonl b/split_edge/graph_198986097-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-41.jsonl b/split_edge/graph_198986097-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-5.jsonl b/split_edge/graph_198986097-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-7.jsonl b/split_edge/graph_198986097-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-8.jsonl b/split_edge/graph_198986097-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_198986097-9.jsonl b/split_edge/graph_198986097-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-0.jsonl b/split_edge/graph_199007374-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-10.jsonl b/split_edge/graph_199007374-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-11.jsonl b/split_edge/graph_199007374-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-12.jsonl b/split_edge/graph_199007374-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-13.jsonl b/split_edge/graph_199007374-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-4.jsonl b/split_edge/graph_199007374-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-5.jsonl b/split_edge/graph_199007374-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-6.jsonl b/split_edge/graph_199007374-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-7.jsonl b/split_edge/graph_199007374-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-8.jsonl b/split_edge/graph_199007374-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199007374-9.jsonl b/split_edge/graph_199007374-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-0.jsonl b/split_edge/graph_199010092-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-1.jsonl b/split_edge/graph_199010092-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-2.jsonl b/split_edge/graph_199010092-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-3.jsonl b/split_edge/graph_199010092-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-4.jsonl b/split_edge/graph_199010092-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-5.jsonl b/split_edge/graph_199010092-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-6.jsonl b/split_edge/graph_199010092-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-7.jsonl b/split_edge/graph_199010092-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-8.jsonl b/split_edge/graph_199010092-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199010092-9.jsonl b/split_edge/graph_199010092-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-0.jsonl b/split_edge/graph_199013800-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-10.jsonl b/split_edge/graph_199013800-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-11.jsonl b/split_edge/graph_199013800-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-12.jsonl b/split_edge/graph_199013800-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-13.jsonl b/split_edge/graph_199013800-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-14.jsonl b/split_edge/graph_199013800-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-2.jsonl b/split_edge/graph_199013800-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-3.jsonl b/split_edge/graph_199013800-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-4.jsonl b/split_edge/graph_199013800-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-5.jsonl b/split_edge/graph_199013800-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-6.jsonl b/split_edge/graph_199013800-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-8.jsonl b/split_edge/graph_199013800-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199013800-9.jsonl b/split_edge/graph_199013800-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-0.jsonl b/split_edge/graph_199064201-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-11.jsonl b/split_edge/graph_199064201-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-12.jsonl b/split_edge/graph_199064201-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-13.jsonl b/split_edge/graph_199064201-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-14.jsonl b/split_edge/graph_199064201-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-15.jsonl b/split_edge/graph_199064201-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-19.jsonl b/split_edge/graph_199064201-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-20.jsonl b/split_edge/graph_199064201-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-22.jsonl b/split_edge/graph_199064201-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-23.jsonl b/split_edge/graph_199064201-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-25.jsonl b/split_edge/graph_199064201-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-26.jsonl b/split_edge/graph_199064201-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-27.jsonl b/split_edge/graph_199064201-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-28.jsonl b/split_edge/graph_199064201-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-29.jsonl b/split_edge/graph_199064201-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-30.jsonl b/split_edge/graph_199064201-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-31.jsonl b/split_edge/graph_199064201-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-32.jsonl b/split_edge/graph_199064201-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-33.jsonl b/split_edge/graph_199064201-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-34.jsonl b/split_edge/graph_199064201-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-35.jsonl b/split_edge/graph_199064201-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-36.jsonl b/split_edge/graph_199064201-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-37.jsonl b/split_edge/graph_199064201-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-39.jsonl b/split_edge/graph_199064201-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-4.jsonl b/split_edge/graph_199064201-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-40.jsonl b/split_edge/graph_199064201-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-43.jsonl b/split_edge/graph_199064201-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-44.jsonl b/split_edge/graph_199064201-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-45.jsonl b/split_edge/graph_199064201-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-47.jsonl b/split_edge/graph_199064201-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-48.jsonl b/split_edge/graph_199064201-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-54.jsonl b/split_edge/graph_199064201-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-58.jsonl b/split_edge/graph_199064201-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-7.jsonl b/split_edge/graph_199064201-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-8.jsonl b/split_edge/graph_199064201-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199064201-9.jsonl b/split_edge/graph_199064201-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-10.jsonl b/split_edge/graph_1991786-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-12.jsonl b/split_edge/graph_1991786-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-13.jsonl b/split_edge/graph_1991786-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-14.jsonl b/split_edge/graph_1991786-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-15.jsonl b/split_edge/graph_1991786-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-18.jsonl b/split_edge/graph_1991786-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-2.jsonl b/split_edge/graph_1991786-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-24.jsonl b/split_edge/graph_1991786-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_1991786-4.jsonl b/split_edge/graph_1991786-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-0.jsonl b/split_edge/graph_199438750-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-1.jsonl b/split_edge/graph_199438750-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-2.jsonl b/split_edge/graph_199438750-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-3.jsonl b/split_edge/graph_199438750-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-4.jsonl b/split_edge/graph_199438750-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-5.jsonl b/split_edge/graph_199438750-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-6.jsonl b/split_edge/graph_199438750-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199438750-7.jsonl b/split_edge/graph_199438750-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-0.jsonl b/split_edge/graph_199489469-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-1.jsonl b/split_edge/graph_199489469-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-10.jsonl b/split_edge/graph_199489469-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-12.jsonl b/split_edge/graph_199489469-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-13.jsonl b/split_edge/graph_199489469-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-14.jsonl b/split_edge/graph_199489469-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-16.jsonl b/split_edge/graph_199489469-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-2.jsonl b/split_edge/graph_199489469-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-20.jsonl b/split_edge/graph_199489469-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-29.jsonl b/split_edge/graph_199489469-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-3.jsonl b/split_edge/graph_199489469-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-30.jsonl b/split_edge/graph_199489469-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-31.jsonl b/split_edge/graph_199489469-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-32.jsonl b/split_edge/graph_199489469-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-33.jsonl b/split_edge/graph_199489469-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-34.jsonl b/split_edge/graph_199489469-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-35.jsonl b/split_edge/graph_199489469-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-36.jsonl b/split_edge/graph_199489469-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-37.jsonl b/split_edge/graph_199489469-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-4.jsonl b/split_edge/graph_199489469-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-40.jsonl b/split_edge/graph_199489469-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-41.jsonl b/split_edge/graph_199489469-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-42.jsonl b/split_edge/graph_199489469-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-43.jsonl b/split_edge/graph_199489469-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-44.jsonl b/split_edge/graph_199489469-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-45.jsonl b/split_edge/graph_199489469-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-47.jsonl b/split_edge/graph_199489469-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-49.jsonl b/split_edge/graph_199489469-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-50.jsonl b/split_edge/graph_199489469-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-51.jsonl b/split_edge/graph_199489469-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-54.jsonl b/split_edge/graph_199489469-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-55.jsonl b/split_edge/graph_199489469-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-56.jsonl b/split_edge/graph_199489469-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-57.jsonl b/split_edge/graph_199489469-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-58.jsonl b/split_edge/graph_199489469-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-59.jsonl b/split_edge/graph_199489469-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-60.jsonl b/split_edge/graph_199489469-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-61.jsonl b/split_edge/graph_199489469-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-62.jsonl b/split_edge/graph_199489469-62.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-64.jsonl b/split_edge/graph_199489469-64.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-65.jsonl b/split_edge/graph_199489469-65.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-66.jsonl b/split_edge/graph_199489469-66.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-67.jsonl b/split_edge/graph_199489469-67.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-68.jsonl b/split_edge/graph_199489469-68.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-69.jsonl b/split_edge/graph_199489469-69.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-7.jsonl b/split_edge/graph_199489469-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-70.jsonl b/split_edge/graph_199489469-70.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-71.jsonl b/split_edge/graph_199489469-71.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-72.jsonl b/split_edge/graph_199489469-72.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-73.jsonl b/split_edge/graph_199489469-73.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-74.jsonl b/split_edge/graph_199489469-74.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-77.jsonl b/split_edge/graph_199489469-77.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-78.jsonl b/split_edge/graph_199489469-78.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-79.jsonl b/split_edge/graph_199489469-79.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-8.jsonl b/split_edge/graph_199489469-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-80.jsonl b/split_edge/graph_199489469-80.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-81.jsonl b/split_edge/graph_199489469-81.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-82.jsonl b/split_edge/graph_199489469-82.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-83.jsonl b/split_edge/graph_199489469-83.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-84.jsonl b/split_edge/graph_199489469-84.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-85.jsonl b/split_edge/graph_199489469-85.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-86.jsonl b/split_edge/graph_199489469-86.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-87.jsonl b/split_edge/graph_199489469-87.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-9.jsonl b/split_edge/graph_199489469-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-93.jsonl b/split_edge/graph_199489469-93.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_199489469-97.jsonl b/split_edge/graph_199489469-97.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-0.jsonl b/split_edge/graph_20013373-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-10.jsonl b/split_edge/graph_20013373-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-11.jsonl b/split_edge/graph_20013373-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-14.jsonl b/split_edge/graph_20013373-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-15.jsonl b/split_edge/graph_20013373-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-2.jsonl b/split_edge/graph_20013373-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-20.jsonl b/split_edge/graph_20013373-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-21.jsonl b/split_edge/graph_20013373-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-23.jsonl b/split_edge/graph_20013373-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-24.jsonl b/split_edge/graph_20013373-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-4.jsonl b/split_edge/graph_20013373-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-5.jsonl b/split_edge/graph_20013373-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-6.jsonl b/split_edge/graph_20013373-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-7.jsonl b/split_edge/graph_20013373-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-8.jsonl b/split_edge/graph_20013373-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20013373-9.jsonl b/split_edge/graph_20013373-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-0.jsonl b/split_edge/graph_2003896-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-10.jsonl b/split_edge/graph_2003896-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-11.jsonl b/split_edge/graph_2003896-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-12.jsonl b/split_edge/graph_2003896-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-13.jsonl b/split_edge/graph_2003896-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-14.jsonl b/split_edge/graph_2003896-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-16.jsonl b/split_edge/graph_2003896-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-17.jsonl b/split_edge/graph_2003896-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-19.jsonl b/split_edge/graph_2003896-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-20.jsonl b/split_edge/graph_2003896-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-21.jsonl b/split_edge/graph_2003896-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-22.jsonl b/split_edge/graph_2003896-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-24.jsonl b/split_edge/graph_2003896-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-25.jsonl b/split_edge/graph_2003896-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-26.jsonl b/split_edge/graph_2003896-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-27.jsonl b/split_edge/graph_2003896-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-29.jsonl b/split_edge/graph_2003896-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-3.jsonl b/split_edge/graph_2003896-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-30.jsonl b/split_edge/graph_2003896-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-5.jsonl b/split_edge/graph_2003896-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-6.jsonl b/split_edge/graph_2003896-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-7.jsonl b/split_edge/graph_2003896-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2003896-9.jsonl b/split_edge/graph_2003896-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20056367-1.jsonl b/split_edge/graph_20056367-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20056367-3.jsonl b/split_edge/graph_20056367-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20056367-4.jsonl b/split_edge/graph_20056367-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20077029-0.jsonl b/split_edge/graph_20077029-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20077029-3.jsonl b/split_edge/graph_20077029-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-0.jsonl b/split_edge/graph_201065935-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-12.jsonl b/split_edge/graph_201065935-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-13.jsonl b/split_edge/graph_201065935-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-14.jsonl b/split_edge/graph_201065935-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-16.jsonl b/split_edge/graph_201065935-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-17.jsonl b/split_edge/graph_201065935-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-18.jsonl b/split_edge/graph_201065935-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-19.jsonl b/split_edge/graph_201065935-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-2.jsonl b/split_edge/graph_201065935-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-22.jsonl b/split_edge/graph_201065935-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-23.jsonl b/split_edge/graph_201065935-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-24.jsonl b/split_edge/graph_201065935-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-25.jsonl b/split_edge/graph_201065935-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-27.jsonl b/split_edge/graph_201065935-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-28.jsonl b/split_edge/graph_201065935-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-29.jsonl b/split_edge/graph_201065935-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-3.jsonl b/split_edge/graph_201065935-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-30.jsonl b/split_edge/graph_201065935-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-31.jsonl b/split_edge/graph_201065935-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-34.jsonl b/split_edge/graph_201065935-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-35.jsonl b/split_edge/graph_201065935-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-38.jsonl b/split_edge/graph_201065935-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-39.jsonl b/split_edge/graph_201065935-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-4.jsonl b/split_edge/graph_201065935-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-40.jsonl b/split_edge/graph_201065935-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-42.jsonl b/split_edge/graph_201065935-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-43.jsonl b/split_edge/graph_201065935-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-44.jsonl b/split_edge/graph_201065935-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-45.jsonl b/split_edge/graph_201065935-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-47.jsonl b/split_edge/graph_201065935-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-48.jsonl b/split_edge/graph_201065935-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-49.jsonl b/split_edge/graph_201065935-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-5.jsonl b/split_edge/graph_201065935-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-50.jsonl b/split_edge/graph_201065935-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-51.jsonl b/split_edge/graph_201065935-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-6.jsonl b/split_edge/graph_201065935-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-7.jsonl b/split_edge/graph_201065935-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-8.jsonl b/split_edge/graph_201065935-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201065935-9.jsonl b/split_edge/graph_201065935-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-0.jsonl b/split_edge/graph_201067464-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-10.jsonl b/split_edge/graph_201067464-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-11.jsonl b/split_edge/graph_201067464-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-12.jsonl b/split_edge/graph_201067464-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-13.jsonl b/split_edge/graph_201067464-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-14.jsonl b/split_edge/graph_201067464-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-15.jsonl b/split_edge/graph_201067464-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-16.jsonl b/split_edge/graph_201067464-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-2.jsonl b/split_edge/graph_201067464-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-3.jsonl b/split_edge/graph_201067464-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-4.jsonl b/split_edge/graph_201067464-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-6.jsonl b/split_edge/graph_201067464-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-7.jsonl b/split_edge/graph_201067464-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201067464-9.jsonl b/split_edge/graph_201067464-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-0.jsonl b/split_edge/graph_201095671-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-1.jsonl b/split_edge/graph_201095671-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-11.jsonl b/split_edge/graph_201095671-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-13.jsonl b/split_edge/graph_201095671-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-15.jsonl b/split_edge/graph_201095671-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-2.jsonl b/split_edge/graph_201095671-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-3.jsonl b/split_edge/graph_201095671-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-4.jsonl b/split_edge/graph_201095671-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-5.jsonl b/split_edge/graph_201095671-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-6.jsonl b/split_edge/graph_201095671-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-7.jsonl b/split_edge/graph_201095671-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-8.jsonl b/split_edge/graph_201095671-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201095671-9.jsonl b/split_edge/graph_201095671-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-0.jsonl b/split_edge/graph_201103910-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-10.jsonl b/split_edge/graph_201103910-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-11.jsonl b/split_edge/graph_201103910-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-12.jsonl b/split_edge/graph_201103910-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-13.jsonl b/split_edge/graph_201103910-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-14.jsonl b/split_edge/graph_201103910-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-15.jsonl b/split_edge/graph_201103910-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-17.jsonl b/split_edge/graph_201103910-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-18.jsonl b/split_edge/graph_201103910-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-2.jsonl b/split_edge/graph_201103910-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-20.jsonl b/split_edge/graph_201103910-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-21.jsonl b/split_edge/graph_201103910-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-23.jsonl b/split_edge/graph_201103910-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-24.jsonl b/split_edge/graph_201103910-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-25.jsonl b/split_edge/graph_201103910-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-26.jsonl b/split_edge/graph_201103910-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-27.jsonl b/split_edge/graph_201103910-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-3.jsonl b/split_edge/graph_201103910-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-4.jsonl b/split_edge/graph_201103910-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-5.jsonl b/split_edge/graph_201103910-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-6.jsonl b/split_edge/graph_201103910-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201103910-8.jsonl b/split_edge/graph_201103910-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-0.jsonl b/split_edge/graph_201127793-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-10.jsonl b/split_edge/graph_201127793-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-11.jsonl b/split_edge/graph_201127793-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-12.jsonl b/split_edge/graph_201127793-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-13.jsonl b/split_edge/graph_201127793-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-14.jsonl b/split_edge/graph_201127793-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-15.jsonl b/split_edge/graph_201127793-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-16.jsonl b/split_edge/graph_201127793-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-18.jsonl b/split_edge/graph_201127793-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-19.jsonl b/split_edge/graph_201127793-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-2.jsonl b/split_edge/graph_201127793-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-20.jsonl b/split_edge/graph_201127793-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-21.jsonl b/split_edge/graph_201127793-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-22.jsonl b/split_edge/graph_201127793-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-23.jsonl b/split_edge/graph_201127793-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-24.jsonl b/split_edge/graph_201127793-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-25.jsonl b/split_edge/graph_201127793-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-26.jsonl b/split_edge/graph_201127793-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-27.jsonl b/split_edge/graph_201127793-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-28.jsonl b/split_edge/graph_201127793-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-29.jsonl b/split_edge/graph_201127793-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-3.jsonl b/split_edge/graph_201127793-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-30.jsonl b/split_edge/graph_201127793-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-31.jsonl b/split_edge/graph_201127793-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-34.jsonl b/split_edge/graph_201127793-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-4.jsonl b/split_edge/graph_201127793-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-7.jsonl b/split_edge/graph_201127793-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-8.jsonl b/split_edge/graph_201127793-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201127793-9.jsonl b/split_edge/graph_201127793-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-0.jsonl b/split_edge/graph_2011473-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-1.jsonl b/split_edge/graph_2011473-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-10.jsonl b/split_edge/graph_2011473-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-11.jsonl b/split_edge/graph_2011473-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-12.jsonl b/split_edge/graph_2011473-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-13.jsonl b/split_edge/graph_2011473-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-14.jsonl b/split_edge/graph_2011473-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-15.jsonl b/split_edge/graph_2011473-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-16.jsonl b/split_edge/graph_2011473-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-17.jsonl b/split_edge/graph_2011473-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-2.jsonl b/split_edge/graph_2011473-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-20.jsonl b/split_edge/graph_2011473-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-3.jsonl b/split_edge/graph_2011473-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-4.jsonl b/split_edge/graph_2011473-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-6.jsonl b/split_edge/graph_2011473-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-7.jsonl b/split_edge/graph_2011473-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-8.jsonl b/split_edge/graph_2011473-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2011473-9.jsonl b/split_edge/graph_2011473-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-0.jsonl b/split_edge/graph_201254269-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-1.jsonl b/split_edge/graph_201254269-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-10.jsonl b/split_edge/graph_201254269-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-11.jsonl b/split_edge/graph_201254269-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-12.jsonl b/split_edge/graph_201254269-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-16.jsonl b/split_edge/graph_201254269-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-4.jsonl b/split_edge/graph_201254269-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-5.jsonl b/split_edge/graph_201254269-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-6.jsonl b/split_edge/graph_201254269-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-7.jsonl b/split_edge/graph_201254269-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-8.jsonl b/split_edge/graph_201254269-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201254269-9.jsonl b/split_edge/graph_201254269-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-0.jsonl b/split_edge/graph_20143699-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-10.jsonl b/split_edge/graph_20143699-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-11.jsonl b/split_edge/graph_20143699-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-13.jsonl b/split_edge/graph_20143699-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-14.jsonl b/split_edge/graph_20143699-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-15.jsonl b/split_edge/graph_20143699-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-16.jsonl b/split_edge/graph_20143699-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-18.jsonl b/split_edge/graph_20143699-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-19.jsonl b/split_edge/graph_20143699-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-2.jsonl b/split_edge/graph_20143699-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-20.jsonl b/split_edge/graph_20143699-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-4.jsonl b/split_edge/graph_20143699-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-5.jsonl b/split_edge/graph_20143699-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-6.jsonl b/split_edge/graph_20143699-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-8.jsonl b/split_edge/graph_20143699-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20143699-9.jsonl b/split_edge/graph_20143699-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-0.jsonl b/split_edge/graph_201646231-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-1.jsonl b/split_edge/graph_201646231-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-11.jsonl b/split_edge/graph_201646231-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-12.jsonl b/split_edge/graph_201646231-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-13.jsonl b/split_edge/graph_201646231-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-14.jsonl b/split_edge/graph_201646231-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-15.jsonl b/split_edge/graph_201646231-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-16.jsonl b/split_edge/graph_201646231-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-17.jsonl b/split_edge/graph_201646231-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-18.jsonl b/split_edge/graph_201646231-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-2.jsonl b/split_edge/graph_201646231-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-5.jsonl b/split_edge/graph_201646231-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-6.jsonl b/split_edge/graph_201646231-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-7.jsonl b/split_edge/graph_201646231-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-8.jsonl b/split_edge/graph_201646231-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201646231-9.jsonl b/split_edge/graph_201646231-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-0.jsonl b/split_edge/graph_201666566-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-1.jsonl b/split_edge/graph_201666566-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-10.jsonl b/split_edge/graph_201666566-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-12.jsonl b/split_edge/graph_201666566-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-13.jsonl b/split_edge/graph_201666566-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-14.jsonl b/split_edge/graph_201666566-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-15.jsonl b/split_edge/graph_201666566-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-16.jsonl b/split_edge/graph_201666566-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-17.jsonl b/split_edge/graph_201666566-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-19.jsonl b/split_edge/graph_201666566-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-21.jsonl b/split_edge/graph_201666566-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-22.jsonl b/split_edge/graph_201666566-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-23.jsonl b/split_edge/graph_201666566-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-24.jsonl b/split_edge/graph_201666566-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-25.jsonl b/split_edge/graph_201666566-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-27.jsonl b/split_edge/graph_201666566-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-3.jsonl b/split_edge/graph_201666566-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-32.jsonl b/split_edge/graph_201666566-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-4.jsonl b/split_edge/graph_201666566-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-6.jsonl b/split_edge/graph_201666566-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-7.jsonl b/split_edge/graph_201666566-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-8.jsonl b/split_edge/graph_201666566-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201666566-9.jsonl b/split_edge/graph_201666566-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201710040-0.jsonl b/split_edge/graph_201710040-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201710040-1.jsonl b/split_edge/graph_201710040-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201710040-2.jsonl b/split_edge/graph_201710040-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201710040-3.jsonl b/split_edge/graph_201710040-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201710040-4.jsonl b/split_edge/graph_201710040-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201710040-6.jsonl b/split_edge/graph_201710040-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201710040-7.jsonl b/split_edge/graph_201710040-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201711392-0.jsonl b/split_edge/graph_201711392-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201711392-1.jsonl b/split_edge/graph_201711392-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201711392-2.jsonl b/split_edge/graph_201711392-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201711392-5.jsonl b/split_edge/graph_201711392-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201711392-6.jsonl b/split_edge/graph_201711392-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201711392-7.jsonl b/split_edge/graph_201711392-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-0.jsonl b/split_edge/graph_201833712-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-1.jsonl b/split_edge/graph_201833712-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-10.jsonl b/split_edge/graph_201833712-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-11.jsonl b/split_edge/graph_201833712-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-12.jsonl b/split_edge/graph_201833712-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-13.jsonl b/split_edge/graph_201833712-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-14.jsonl b/split_edge/graph_201833712-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-15.jsonl b/split_edge/graph_201833712-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-2.jsonl b/split_edge/graph_201833712-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-3.jsonl b/split_edge/graph_201833712-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-4.jsonl b/split_edge/graph_201833712-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-5.jsonl b/split_edge/graph_201833712-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-6.jsonl b/split_edge/graph_201833712-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-7.jsonl b/split_edge/graph_201833712-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-8.jsonl b/split_edge/graph_201833712-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201833712-9.jsonl b/split_edge/graph_201833712-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-0.jsonl b/split_edge/graph_201837481-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-1.jsonl b/split_edge/graph_201837481-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-10.jsonl b/split_edge/graph_201837481-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-11.jsonl b/split_edge/graph_201837481-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-12.jsonl b/split_edge/graph_201837481-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-20.jsonl b/split_edge/graph_201837481-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-21.jsonl b/split_edge/graph_201837481-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-23.jsonl b/split_edge/graph_201837481-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-24.jsonl b/split_edge/graph_201837481-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-25.jsonl b/split_edge/graph_201837481-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-26.jsonl b/split_edge/graph_201837481-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-27.jsonl b/split_edge/graph_201837481-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-28.jsonl b/split_edge/graph_201837481-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-29.jsonl b/split_edge/graph_201837481-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-3.jsonl b/split_edge/graph_201837481-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-30.jsonl b/split_edge/graph_201837481-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-31.jsonl b/split_edge/graph_201837481-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-32.jsonl b/split_edge/graph_201837481-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-33.jsonl b/split_edge/graph_201837481-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-35.jsonl b/split_edge/graph_201837481-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-36.jsonl b/split_edge/graph_201837481-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-4.jsonl b/split_edge/graph_201837481-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-43.jsonl b/split_edge/graph_201837481-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-44.jsonl b/split_edge/graph_201837481-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-45.jsonl b/split_edge/graph_201837481-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-46.jsonl b/split_edge/graph_201837481-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-47.jsonl b/split_edge/graph_201837481-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-48.jsonl b/split_edge/graph_201837481-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-49.jsonl b/split_edge/graph_201837481-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-5.jsonl b/split_edge/graph_201837481-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-50.jsonl b/split_edge/graph_201837481-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-51.jsonl b/split_edge/graph_201837481-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-52.jsonl b/split_edge/graph_201837481-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-53.jsonl b/split_edge/graph_201837481-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-6.jsonl b/split_edge/graph_201837481-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-63.jsonl b/split_edge/graph_201837481-63.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-7.jsonl b/split_edge/graph_201837481-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-72.jsonl b/split_edge/graph_201837481-72.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-73.jsonl b/split_edge/graph_201837481-73.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-74.jsonl b/split_edge/graph_201837481-74.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-8.jsonl b/split_edge/graph_201837481-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201837481-9.jsonl b/split_edge/graph_201837481-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-0.jsonl b/split_edge/graph_201846833-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-1.jsonl b/split_edge/graph_201846833-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-10.jsonl b/split_edge/graph_201846833-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-11.jsonl b/split_edge/graph_201846833-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-12.jsonl b/split_edge/graph_201846833-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-13.jsonl b/split_edge/graph_201846833-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-14.jsonl b/split_edge/graph_201846833-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-15.jsonl b/split_edge/graph_201846833-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-16.jsonl b/split_edge/graph_201846833-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-17.jsonl b/split_edge/graph_201846833-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-18.jsonl b/split_edge/graph_201846833-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-19.jsonl b/split_edge/graph_201846833-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-2.jsonl b/split_edge/graph_201846833-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-20.jsonl b/split_edge/graph_201846833-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-3.jsonl b/split_edge/graph_201846833-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-4.jsonl b/split_edge/graph_201846833-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-5.jsonl b/split_edge/graph_201846833-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-6.jsonl b/split_edge/graph_201846833-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-7.jsonl b/split_edge/graph_201846833-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-8.jsonl b/split_edge/graph_201846833-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201846833-9.jsonl b/split_edge/graph_201846833-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201888857-0.jsonl b/split_edge/graph_201888857-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201888857-11.jsonl b/split_edge/graph_201888857-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201888857-15.jsonl b/split_edge/graph_201888857-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201888857-2.jsonl b/split_edge/graph_201888857-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201888857-9.jsonl b/split_edge/graph_201888857-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201889151-0.jsonl b/split_edge/graph_201889151-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201889151-3.jsonl b/split_edge/graph_201889151-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201889151-4.jsonl b/split_edge/graph_201889151-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201889151-5.jsonl b/split_edge/graph_201889151-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201889151-6.jsonl b/split_edge/graph_201889151-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201889151-7.jsonl b/split_edge/graph_201889151-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_201889151-8.jsonl b/split_edge/graph_201889151-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202094040-0.jsonl b/split_edge/graph_202094040-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202094040-1.jsonl b/split_edge/graph_202094040-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202094040-2.jsonl b/split_edge/graph_202094040-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202094040-3.jsonl b/split_edge/graph_202094040-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-0.jsonl b/split_edge/graph_202228067-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-1.jsonl b/split_edge/graph_202228067-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-2.jsonl b/split_edge/graph_202228067-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-3.jsonl b/split_edge/graph_202228067-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-4.jsonl b/split_edge/graph_202228067-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-5.jsonl b/split_edge/graph_202228067-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-6.jsonl b/split_edge/graph_202228067-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-7.jsonl b/split_edge/graph_202228067-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202228067-9.jsonl b/split_edge/graph_202228067-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-0.jsonl b/split_edge/graph_202407276-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-1.jsonl b/split_edge/graph_202407276-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-10.jsonl b/split_edge/graph_202407276-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-11.jsonl b/split_edge/graph_202407276-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-12.jsonl b/split_edge/graph_202407276-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-13.jsonl b/split_edge/graph_202407276-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-14.jsonl b/split_edge/graph_202407276-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-15.jsonl b/split_edge/graph_202407276-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-16.jsonl b/split_edge/graph_202407276-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-17.jsonl b/split_edge/graph_202407276-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-18.jsonl b/split_edge/graph_202407276-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-19.jsonl b/split_edge/graph_202407276-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-2.jsonl b/split_edge/graph_202407276-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-20.jsonl b/split_edge/graph_202407276-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-3.jsonl b/split_edge/graph_202407276-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-4.jsonl b/split_edge/graph_202407276-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-5.jsonl b/split_edge/graph_202407276-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-7.jsonl b/split_edge/graph_202407276-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-8.jsonl b/split_edge/graph_202407276-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202407276-9.jsonl b/split_edge/graph_202407276-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-0.jsonl b/split_edge/graph_202540199-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-1.jsonl b/split_edge/graph_202540199-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-2.jsonl b/split_edge/graph_202540199-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-3.jsonl b/split_edge/graph_202540199-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-5.jsonl b/split_edge/graph_202540199-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-6.jsonl b/split_edge/graph_202540199-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-8.jsonl b/split_edge/graph_202540199-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202540199-9.jsonl b/split_edge/graph_202540199-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-10.jsonl b/split_edge/graph_202583523-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-11.jsonl b/split_edge/graph_202583523-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-12.jsonl b/split_edge/graph_202583523-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-13.jsonl b/split_edge/graph_202583523-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-14.jsonl b/split_edge/graph_202583523-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-15.jsonl b/split_edge/graph_202583523-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-16.jsonl b/split_edge/graph_202583523-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-17.jsonl b/split_edge/graph_202583523-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-18.jsonl b/split_edge/graph_202583523-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-19.jsonl b/split_edge/graph_202583523-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-2.jsonl b/split_edge/graph_202583523-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-20.jsonl b/split_edge/graph_202583523-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-3.jsonl b/split_edge/graph_202583523-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-4.jsonl b/split_edge/graph_202583523-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-5.jsonl b/split_edge/graph_202583523-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-6.jsonl b/split_edge/graph_202583523-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-7.jsonl b/split_edge/graph_202583523-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202583523-8.jsonl b/split_edge/graph_202583523-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202699216-0.jsonl b/split_edge/graph_202699216-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202699216-1.jsonl b/split_edge/graph_202699216-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202699216-2.jsonl b/split_edge/graph_202699216-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202699216-3.jsonl b/split_edge/graph_202699216-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202699216-5.jsonl b/split_edge/graph_202699216-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202699216-6.jsonl b/split_edge/graph_202699216-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-0.jsonl b/split_edge/graph_202750140-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-12.jsonl b/split_edge/graph_202750140-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-13.jsonl b/split_edge/graph_202750140-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-14.jsonl b/split_edge/graph_202750140-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-15.jsonl b/split_edge/graph_202750140-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-16.jsonl b/split_edge/graph_202750140-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-18.jsonl b/split_edge/graph_202750140-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-2.jsonl b/split_edge/graph_202750140-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-20.jsonl b/split_edge/graph_202750140-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-3.jsonl b/split_edge/graph_202750140-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-4.jsonl b/split_edge/graph_202750140-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-5.jsonl b/split_edge/graph_202750140-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-6.jsonl b/split_edge/graph_202750140-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-7.jsonl b/split_edge/graph_202750140-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-8.jsonl b/split_edge/graph_202750140-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202750140-9.jsonl b/split_edge/graph_202750140-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-0.jsonl b/split_edge/graph_202786319-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-12.jsonl b/split_edge/graph_202786319-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-13.jsonl b/split_edge/graph_202786319-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-15.jsonl b/split_edge/graph_202786319-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-16.jsonl b/split_edge/graph_202786319-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-17.jsonl b/split_edge/graph_202786319-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-18.jsonl b/split_edge/graph_202786319-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-23.jsonl b/split_edge/graph_202786319-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-6.jsonl b/split_edge/graph_202786319-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_202786319-8.jsonl b/split_edge/graph_202786319-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203041564-0.jsonl b/split_edge/graph_203041564-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203041564-3.jsonl b/split_edge/graph_203041564-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203041564-4.jsonl b/split_edge/graph_203041564-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203041564-5.jsonl b/split_edge/graph_203041564-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203041564-7.jsonl b/split_edge/graph_203041564-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203041564-8.jsonl b/split_edge/graph_203041564-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-0.jsonl b/split_edge/graph_203593212-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-10.jsonl b/split_edge/graph_203593212-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-11.jsonl b/split_edge/graph_203593212-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-12.jsonl b/split_edge/graph_203593212-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-13.jsonl b/split_edge/graph_203593212-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-14.jsonl b/split_edge/graph_203593212-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-15.jsonl b/split_edge/graph_203593212-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-16.jsonl b/split_edge/graph_203593212-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-18.jsonl b/split_edge/graph_203593212-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-19.jsonl b/split_edge/graph_203593212-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-2.jsonl b/split_edge/graph_203593212-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-20.jsonl b/split_edge/graph_203593212-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-3.jsonl b/split_edge/graph_203593212-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-4.jsonl b/split_edge/graph_203593212-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-5.jsonl b/split_edge/graph_203593212-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-6.jsonl b/split_edge/graph_203593212-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-7.jsonl b/split_edge/graph_203593212-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-8.jsonl b/split_edge/graph_203593212-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203593212-9.jsonl b/split_edge/graph_203593212-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-0.jsonl b/split_edge/graph_203599959-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-1.jsonl b/split_edge/graph_203599959-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-10.jsonl b/split_edge/graph_203599959-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-14.jsonl b/split_edge/graph_203599959-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-15.jsonl b/split_edge/graph_203599959-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-16.jsonl b/split_edge/graph_203599959-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-18.jsonl b/split_edge/graph_203599959-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-19.jsonl b/split_edge/graph_203599959-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-2.jsonl b/split_edge/graph_203599959-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-21.jsonl b/split_edge/graph_203599959-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-22.jsonl b/split_edge/graph_203599959-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-23.jsonl b/split_edge/graph_203599959-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-3.jsonl b/split_edge/graph_203599959-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-4.jsonl b/split_edge/graph_203599959-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-5.jsonl b/split_edge/graph_203599959-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-6.jsonl b/split_edge/graph_203599959-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-7.jsonl b/split_edge/graph_203599959-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-8.jsonl b/split_edge/graph_203599959-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203599959-9.jsonl b/split_edge/graph_203599959-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-0.jsonl b/split_edge/graph_203610143-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-1.jsonl b/split_edge/graph_203610143-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-10.jsonl b/split_edge/graph_203610143-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-11.jsonl b/split_edge/graph_203610143-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-12.jsonl b/split_edge/graph_203610143-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-14.jsonl b/split_edge/graph_203610143-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-5.jsonl b/split_edge/graph_203610143-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-6.jsonl b/split_edge/graph_203610143-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-8.jsonl b/split_edge/graph_203610143-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203610143-9.jsonl b/split_edge/graph_203610143-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-0.jsonl b/split_edge/graph_203706840-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-11.jsonl b/split_edge/graph_203706840-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-14.jsonl b/split_edge/graph_203706840-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-16.jsonl b/split_edge/graph_203706840-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-17.jsonl b/split_edge/graph_203706840-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-18.jsonl b/split_edge/graph_203706840-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-19.jsonl b/split_edge/graph_203706840-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-2.jsonl b/split_edge/graph_203706840-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-3.jsonl b/split_edge/graph_203706840-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-4.jsonl b/split_edge/graph_203706840-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203706840-5.jsonl b/split_edge/graph_203706840-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20381614-1.jsonl b/split_edge/graph_20381614-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20381614-2.jsonl b/split_edge/graph_20381614-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20381614-3.jsonl b/split_edge/graph_20381614-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-0.jsonl b/split_edge/graph_203837078-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-10.jsonl b/split_edge/graph_203837078-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-12.jsonl b/split_edge/graph_203837078-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-13.jsonl b/split_edge/graph_203837078-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-14.jsonl b/split_edge/graph_203837078-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-15.jsonl b/split_edge/graph_203837078-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-16.jsonl b/split_edge/graph_203837078-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-18.jsonl b/split_edge/graph_203837078-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-19.jsonl b/split_edge/graph_203837078-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-20.jsonl b/split_edge/graph_203837078-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-21.jsonl b/split_edge/graph_203837078-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-22.jsonl b/split_edge/graph_203837078-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-4.jsonl b/split_edge/graph_203837078-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-5.jsonl b/split_edge/graph_203837078-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-6.jsonl b/split_edge/graph_203837078-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-7.jsonl b/split_edge/graph_203837078-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203837078-9.jsonl b/split_edge/graph_203837078-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-0.jsonl b/split_edge/graph_203902356-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-18.jsonl b/split_edge/graph_203902356-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-2.jsonl b/split_edge/graph_203902356-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-20.jsonl b/split_edge/graph_203902356-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-21.jsonl b/split_edge/graph_203902356-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-22.jsonl b/split_edge/graph_203902356-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-23.jsonl b/split_edge/graph_203902356-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-24.jsonl b/split_edge/graph_203902356-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-25.jsonl b/split_edge/graph_203902356-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-26.jsonl b/split_edge/graph_203902356-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-27.jsonl b/split_edge/graph_203902356-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-29.jsonl b/split_edge/graph_203902356-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-3.jsonl b/split_edge/graph_203902356-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203902356-7.jsonl b/split_edge/graph_203902356-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-0.jsonl b/split_edge/graph_203951961-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-10.jsonl b/split_edge/graph_203951961-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-11.jsonl b/split_edge/graph_203951961-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-14.jsonl b/split_edge/graph_203951961-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-15.jsonl b/split_edge/graph_203951961-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-17.jsonl b/split_edge/graph_203951961-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-18.jsonl b/split_edge/graph_203951961-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-19.jsonl b/split_edge/graph_203951961-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-2.jsonl b/split_edge/graph_203951961-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-20.jsonl b/split_edge/graph_203951961-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-5.jsonl b/split_edge/graph_203951961-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-8.jsonl b/split_edge/graph_203951961-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_203951961-9.jsonl b/split_edge/graph_203951961-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-0.jsonl b/split_edge/graph_20404279-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-10.jsonl b/split_edge/graph_20404279-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-11.jsonl b/split_edge/graph_20404279-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-13.jsonl b/split_edge/graph_20404279-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-14.jsonl b/split_edge/graph_20404279-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-16.jsonl b/split_edge/graph_20404279-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-17.jsonl b/split_edge/graph_20404279-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-18.jsonl b/split_edge/graph_20404279-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-19.jsonl b/split_edge/graph_20404279-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-2.jsonl b/split_edge/graph_20404279-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-20.jsonl b/split_edge/graph_20404279-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-21.jsonl b/split_edge/graph_20404279-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-22.jsonl b/split_edge/graph_20404279-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-23.jsonl b/split_edge/graph_20404279-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-25.jsonl b/split_edge/graph_20404279-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-5.jsonl b/split_edge/graph_20404279-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-7.jsonl b/split_edge/graph_20404279-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-8.jsonl b/split_edge/graph_20404279-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20404279-9.jsonl b/split_edge/graph_20404279-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-0.jsonl b/split_edge/graph_204509378-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-10.jsonl b/split_edge/graph_204509378-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-11.jsonl b/split_edge/graph_204509378-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-17.jsonl b/split_edge/graph_204509378-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-18.jsonl b/split_edge/graph_204509378-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-19.jsonl b/split_edge/graph_204509378-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-2.jsonl b/split_edge/graph_204509378-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-20.jsonl b/split_edge/graph_204509378-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-21.jsonl b/split_edge/graph_204509378-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-22.jsonl b/split_edge/graph_204509378-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-23.jsonl b/split_edge/graph_204509378-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-24.jsonl b/split_edge/graph_204509378-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-25.jsonl b/split_edge/graph_204509378-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-27.jsonl b/split_edge/graph_204509378-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-29.jsonl b/split_edge/graph_204509378-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-3.jsonl b/split_edge/graph_204509378-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-30.jsonl b/split_edge/graph_204509378-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-31.jsonl b/split_edge/graph_204509378-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-32.jsonl b/split_edge/graph_204509378-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-33.jsonl b/split_edge/graph_204509378-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-34.jsonl b/split_edge/graph_204509378-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-35.jsonl b/split_edge/graph_204509378-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-38.jsonl b/split_edge/graph_204509378-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-39.jsonl b/split_edge/graph_204509378-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-4.jsonl b/split_edge/graph_204509378-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-40.jsonl b/split_edge/graph_204509378-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-42.jsonl b/split_edge/graph_204509378-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-43.jsonl b/split_edge/graph_204509378-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-5.jsonl b/split_edge/graph_204509378-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-7.jsonl b/split_edge/graph_204509378-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204509378-9.jsonl b/split_edge/graph_204509378-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-0.jsonl b/split_edge/graph_204838011-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-1.jsonl b/split_edge/graph_204838011-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-2.jsonl b/split_edge/graph_204838011-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-3.jsonl b/split_edge/graph_204838011-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-4.jsonl b/split_edge/graph_204838011-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-5.jsonl b/split_edge/graph_204838011-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-6.jsonl b/split_edge/graph_204838011-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-7.jsonl b/split_edge/graph_204838011-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204838011-8.jsonl b/split_edge/graph_204838011-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-11.jsonl b/split_edge/graph_204852234-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-12.jsonl b/split_edge/graph_204852234-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-13.jsonl b/split_edge/graph_204852234-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-14.jsonl b/split_edge/graph_204852234-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-15.jsonl b/split_edge/graph_204852234-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-17.jsonl b/split_edge/graph_204852234-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-19.jsonl b/split_edge/graph_204852234-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-2.jsonl b/split_edge/graph_204852234-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-20.jsonl b/split_edge/graph_204852234-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-22.jsonl b/split_edge/graph_204852234-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-24.jsonl b/split_edge/graph_204852234-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-25.jsonl b/split_edge/graph_204852234-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-26.jsonl b/split_edge/graph_204852234-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-28.jsonl b/split_edge/graph_204852234-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-29.jsonl b/split_edge/graph_204852234-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-30.jsonl b/split_edge/graph_204852234-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-31.jsonl b/split_edge/graph_204852234-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-32.jsonl b/split_edge/graph_204852234-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-33.jsonl b/split_edge/graph_204852234-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-34.jsonl b/split_edge/graph_204852234-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-35.jsonl b/split_edge/graph_204852234-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-36.jsonl b/split_edge/graph_204852234-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-37.jsonl b/split_edge/graph_204852234-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-38.jsonl b/split_edge/graph_204852234-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-39.jsonl b/split_edge/graph_204852234-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-4.jsonl b/split_edge/graph_204852234-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-40.jsonl b/split_edge/graph_204852234-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-41.jsonl b/split_edge/graph_204852234-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-42.jsonl b/split_edge/graph_204852234-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-43.jsonl b/split_edge/graph_204852234-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-5.jsonl b/split_edge/graph_204852234-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-6.jsonl b/split_edge/graph_204852234-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-8.jsonl b/split_edge/graph_204852234-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204852234-9.jsonl b/split_edge/graph_204852234-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204895230-0.jsonl b/split_edge/graph_204895230-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204895230-12.jsonl b/split_edge/graph_204895230-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204895230-2.jsonl b/split_edge/graph_204895230-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204895230-6.jsonl b/split_edge/graph_204895230-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204895230-8.jsonl b/split_edge/graph_204895230-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204895230-9.jsonl b/split_edge/graph_204895230-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-0.jsonl b/split_edge/graph_204934851-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-11.jsonl b/split_edge/graph_204934851-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-12.jsonl b/split_edge/graph_204934851-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-13.jsonl b/split_edge/graph_204934851-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-14.jsonl b/split_edge/graph_204934851-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-16.jsonl b/split_edge/graph_204934851-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-17.jsonl b/split_edge/graph_204934851-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-2.jsonl b/split_edge/graph_204934851-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-20.jsonl b/split_edge/graph_204934851-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-21.jsonl b/split_edge/graph_204934851-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-22.jsonl b/split_edge/graph_204934851-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-24.jsonl b/split_edge/graph_204934851-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-26.jsonl b/split_edge/graph_204934851-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-27.jsonl b/split_edge/graph_204934851-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-28.jsonl b/split_edge/graph_204934851-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-3.jsonl b/split_edge/graph_204934851-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-31.jsonl b/split_edge/graph_204934851-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-32.jsonl b/split_edge/graph_204934851-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-35.jsonl b/split_edge/graph_204934851-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-36.jsonl b/split_edge/graph_204934851-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-37.jsonl b/split_edge/graph_204934851-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-39.jsonl b/split_edge/graph_204934851-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-40.jsonl b/split_edge/graph_204934851-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-41.jsonl b/split_edge/graph_204934851-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-5.jsonl b/split_edge/graph_204934851-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-7.jsonl b/split_edge/graph_204934851-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204934851-8.jsonl b/split_edge/graph_204934851-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-0.jsonl b/split_edge/graph_204950617-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-10.jsonl b/split_edge/graph_204950617-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-13.jsonl b/split_edge/graph_204950617-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-14.jsonl b/split_edge/graph_204950617-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-15.jsonl b/split_edge/graph_204950617-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-17.jsonl b/split_edge/graph_204950617-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-18.jsonl b/split_edge/graph_204950617-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-19.jsonl b/split_edge/graph_204950617-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-20.jsonl b/split_edge/graph_204950617-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-21.jsonl b/split_edge/graph_204950617-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-22.jsonl b/split_edge/graph_204950617-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-23.jsonl b/split_edge/graph_204950617-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-24.jsonl b/split_edge/graph_204950617-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-25.jsonl b/split_edge/graph_204950617-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-27.jsonl b/split_edge/graph_204950617-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-29.jsonl b/split_edge/graph_204950617-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-3.jsonl b/split_edge/graph_204950617-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-30.jsonl b/split_edge/graph_204950617-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-31.jsonl b/split_edge/graph_204950617-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-32.jsonl b/split_edge/graph_204950617-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-34.jsonl b/split_edge/graph_204950617-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-35.jsonl b/split_edge/graph_204950617-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-36.jsonl b/split_edge/graph_204950617-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-38.jsonl b/split_edge/graph_204950617-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-4.jsonl b/split_edge/graph_204950617-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-40.jsonl b/split_edge/graph_204950617-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-43.jsonl b/split_edge/graph_204950617-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-44.jsonl b/split_edge/graph_204950617-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-45.jsonl b/split_edge/graph_204950617-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-46.jsonl b/split_edge/graph_204950617-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-47.jsonl b/split_edge/graph_204950617-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-5.jsonl b/split_edge/graph_204950617-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-6.jsonl b/split_edge/graph_204950617-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-7.jsonl b/split_edge/graph_204950617-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-8.jsonl b/split_edge/graph_204950617-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_204950617-9.jsonl b/split_edge/graph_204950617-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-0.jsonl b/split_edge/graph_20531036-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-1.jsonl b/split_edge/graph_20531036-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-10.jsonl b/split_edge/graph_20531036-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-11.jsonl b/split_edge/graph_20531036-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-12.jsonl b/split_edge/graph_20531036-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-13.jsonl b/split_edge/graph_20531036-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-2.jsonl b/split_edge/graph_20531036-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-6.jsonl b/split_edge/graph_20531036-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-7.jsonl b/split_edge/graph_20531036-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-8.jsonl b/split_edge/graph_20531036-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20531036-9.jsonl b/split_edge/graph_20531036-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20600175-0.jsonl b/split_edge/graph_20600175-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20600175-1.jsonl b/split_edge/graph_20600175-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20600175-2.jsonl b/split_edge/graph_20600175-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20600175-3.jsonl b/split_edge/graph_20600175-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20600175-6.jsonl b/split_edge/graph_20600175-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-0.jsonl b/split_edge/graph_206403759-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-13.jsonl b/split_edge/graph_206403759-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-19.jsonl b/split_edge/graph_206403759-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-20.jsonl b/split_edge/graph_206403759-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-21.jsonl b/split_edge/graph_206403759-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-22.jsonl b/split_edge/graph_206403759-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-23.jsonl b/split_edge/graph_206403759-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-24.jsonl b/split_edge/graph_206403759-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-3.jsonl b/split_edge/graph_206403759-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-4.jsonl b/split_edge/graph_206403759-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-5.jsonl b/split_edge/graph_206403759-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-6.jsonl b/split_edge/graph_206403759-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-8.jsonl b/split_edge/graph_206403759-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206403759-9.jsonl b/split_edge/graph_206403759-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-0.jsonl b/split_edge/graph_206578365-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-1.jsonl b/split_edge/graph_206578365-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-12.jsonl b/split_edge/graph_206578365-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-14.jsonl b/split_edge/graph_206578365-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-15.jsonl b/split_edge/graph_206578365-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-17.jsonl b/split_edge/graph_206578365-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-19.jsonl b/split_edge/graph_206578365-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-2.jsonl b/split_edge/graph_206578365-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-20.jsonl b/split_edge/graph_206578365-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-21.jsonl b/split_edge/graph_206578365-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-22.jsonl b/split_edge/graph_206578365-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-23.jsonl b/split_edge/graph_206578365-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-24.jsonl b/split_edge/graph_206578365-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-25.jsonl b/split_edge/graph_206578365-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-3.jsonl b/split_edge/graph_206578365-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-32.jsonl b/split_edge/graph_206578365-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-33.jsonl b/split_edge/graph_206578365-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-5.jsonl b/split_edge/graph_206578365-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-6.jsonl b/split_edge/graph_206578365-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-7.jsonl b/split_edge/graph_206578365-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206578365-8.jsonl b/split_edge/graph_206578365-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-0.jsonl b/split_edge/graph_206583943-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-11.jsonl b/split_edge/graph_206583943-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-12.jsonl b/split_edge/graph_206583943-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-14.jsonl b/split_edge/graph_206583943-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-15.jsonl b/split_edge/graph_206583943-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-17.jsonl b/split_edge/graph_206583943-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-18.jsonl b/split_edge/graph_206583943-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-6.jsonl b/split_edge/graph_206583943-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-8.jsonl b/split_edge/graph_206583943-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206583943-9.jsonl b/split_edge/graph_206583943-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-0.jsonl b/split_edge/graph_206670318-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-10.jsonl b/split_edge/graph_206670318-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-11.jsonl b/split_edge/graph_206670318-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-12.jsonl b/split_edge/graph_206670318-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-13.jsonl b/split_edge/graph_206670318-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-14.jsonl b/split_edge/graph_206670318-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-15.jsonl b/split_edge/graph_206670318-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-17.jsonl b/split_edge/graph_206670318-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-18.jsonl b/split_edge/graph_206670318-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-19.jsonl b/split_edge/graph_206670318-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-2.jsonl b/split_edge/graph_206670318-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-20.jsonl b/split_edge/graph_206670318-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-21.jsonl b/split_edge/graph_206670318-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-22.jsonl b/split_edge/graph_206670318-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-23.jsonl b/split_edge/graph_206670318-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-24.jsonl b/split_edge/graph_206670318-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-3.jsonl b/split_edge/graph_206670318-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-4.jsonl b/split_edge/graph_206670318-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-6.jsonl b/split_edge/graph_206670318-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-7.jsonl b/split_edge/graph_206670318-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-8.jsonl b/split_edge/graph_206670318-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206670318-9.jsonl b/split_edge/graph_206670318-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206725396-0.jsonl b/split_edge/graph_206725396-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206725396-1.jsonl b/split_edge/graph_206725396-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206725396-2.jsonl b/split_edge/graph_206725396-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206725396-3.jsonl b/split_edge/graph_206725396-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206725396-4.jsonl b/split_edge/graph_206725396-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206725396-5.jsonl b/split_edge/graph_206725396-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206725396-6.jsonl b/split_edge/graph_206725396-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-0.jsonl b/split_edge/graph_20697552-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-10.jsonl b/split_edge/graph_20697552-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-11.jsonl b/split_edge/graph_20697552-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-13.jsonl b/split_edge/graph_20697552-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-14.jsonl b/split_edge/graph_20697552-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-15.jsonl b/split_edge/graph_20697552-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-2.jsonl b/split_edge/graph_20697552-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-3.jsonl b/split_edge/graph_20697552-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-5.jsonl b/split_edge/graph_20697552-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-6.jsonl b/split_edge/graph_20697552-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-7.jsonl b/split_edge/graph_20697552-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-8.jsonl b/split_edge/graph_20697552-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20697552-9.jsonl b/split_edge/graph_20697552-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-0.jsonl b/split_edge/graph_206986719-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-1.jsonl b/split_edge/graph_206986719-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-10.jsonl b/split_edge/graph_206986719-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-11.jsonl b/split_edge/graph_206986719-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-12.jsonl b/split_edge/graph_206986719-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-14.jsonl b/split_edge/graph_206986719-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-15.jsonl b/split_edge/graph_206986719-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-16.jsonl b/split_edge/graph_206986719-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-18.jsonl b/split_edge/graph_206986719-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-2.jsonl b/split_edge/graph_206986719-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-3.jsonl b/split_edge/graph_206986719-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-5.jsonl b/split_edge/graph_206986719-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-6.jsonl b/split_edge/graph_206986719-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-7.jsonl b/split_edge/graph_206986719-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-8.jsonl b/split_edge/graph_206986719-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_206986719-9.jsonl b/split_edge/graph_206986719-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-0.jsonl b/split_edge/graph_207205594-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-1.jsonl b/split_edge/graph_207205594-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-10.jsonl b/split_edge/graph_207205594-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-11.jsonl b/split_edge/graph_207205594-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-13.jsonl b/split_edge/graph_207205594-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-14.jsonl b/split_edge/graph_207205594-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-17.jsonl b/split_edge/graph_207205594-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-18.jsonl b/split_edge/graph_207205594-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-19.jsonl b/split_edge/graph_207205594-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-2.jsonl b/split_edge/graph_207205594-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-21.jsonl b/split_edge/graph_207205594-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-22.jsonl b/split_edge/graph_207205594-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-23.jsonl b/split_edge/graph_207205594-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-25.jsonl b/split_edge/graph_207205594-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-26.jsonl b/split_edge/graph_207205594-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-3.jsonl b/split_edge/graph_207205594-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-4.jsonl b/split_edge/graph_207205594-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-5.jsonl b/split_edge/graph_207205594-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-7.jsonl b/split_edge/graph_207205594-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-8.jsonl b/split_edge/graph_207205594-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207205594-9.jsonl b/split_edge/graph_207205594-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-0.jsonl b/split_edge/graph_207250096-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-10.jsonl b/split_edge/graph_207250096-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-11.jsonl b/split_edge/graph_207250096-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-12.jsonl b/split_edge/graph_207250096-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-13.jsonl b/split_edge/graph_207250096-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-15.jsonl b/split_edge/graph_207250096-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-16.jsonl b/split_edge/graph_207250096-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-17.jsonl b/split_edge/graph_207250096-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-18.jsonl b/split_edge/graph_207250096-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-19.jsonl b/split_edge/graph_207250096-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-20.jsonl b/split_edge/graph_207250096-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-21.jsonl b/split_edge/graph_207250096-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-23.jsonl b/split_edge/graph_207250096-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-25.jsonl b/split_edge/graph_207250096-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-3.jsonl b/split_edge/graph_207250096-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-4.jsonl b/split_edge/graph_207250096-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-5.jsonl b/split_edge/graph_207250096-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-6.jsonl b/split_edge/graph_207250096-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-8.jsonl b/split_edge/graph_207250096-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207250096-9.jsonl b/split_edge/graph_207250096-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207531812-0.jsonl b/split_edge/graph_207531812-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207531812-1.jsonl b/split_edge/graph_207531812-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207531812-2.jsonl b/split_edge/graph_207531812-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207531812-6.jsonl b/split_edge/graph_207531812-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207531812-7.jsonl b/split_edge/graph_207531812-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207531812-8.jsonl b/split_edge/graph_207531812-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207531812-9.jsonl b/split_edge/graph_207531812-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207592981-0.jsonl b/split_edge/graph_207592981-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207592981-1.jsonl b/split_edge/graph_207592981-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207592981-3.jsonl b/split_edge/graph_207592981-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207592981-5.jsonl b/split_edge/graph_207592981-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207592981-6.jsonl b/split_edge/graph_207592981-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207592981-7.jsonl b/split_edge/graph_207592981-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-0.jsonl b/split_edge/graph_2076637-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-1.jsonl b/split_edge/graph_2076637-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-10.jsonl b/split_edge/graph_2076637-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-11.jsonl b/split_edge/graph_2076637-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-14.jsonl b/split_edge/graph_2076637-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-15.jsonl b/split_edge/graph_2076637-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-16.jsonl b/split_edge/graph_2076637-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-17.jsonl b/split_edge/graph_2076637-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-18.jsonl b/split_edge/graph_2076637-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-2.jsonl b/split_edge/graph_2076637-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-20.jsonl b/split_edge/graph_2076637-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-3.jsonl b/split_edge/graph_2076637-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-4.jsonl b/split_edge/graph_2076637-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-5.jsonl b/split_edge/graph_2076637-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-6.jsonl b/split_edge/graph_2076637-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-7.jsonl b/split_edge/graph_2076637-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-8.jsonl b/split_edge/graph_2076637-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2076637-9.jsonl b/split_edge/graph_2076637-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-0.jsonl b/split_edge/graph_207694246-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-1.jsonl b/split_edge/graph_207694246-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-10.jsonl b/split_edge/graph_207694246-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-11.jsonl b/split_edge/graph_207694246-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-12.jsonl b/split_edge/graph_207694246-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-13.jsonl b/split_edge/graph_207694246-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-14.jsonl b/split_edge/graph_207694246-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-15.jsonl b/split_edge/graph_207694246-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-16.jsonl b/split_edge/graph_207694246-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-17.jsonl b/split_edge/graph_207694246-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-18.jsonl b/split_edge/graph_207694246-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-19.jsonl b/split_edge/graph_207694246-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-2.jsonl b/split_edge/graph_207694246-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-20.jsonl b/split_edge/graph_207694246-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-21.jsonl b/split_edge/graph_207694246-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-22.jsonl b/split_edge/graph_207694246-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-23.jsonl b/split_edge/graph_207694246-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-24.jsonl b/split_edge/graph_207694246-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-27.jsonl b/split_edge/graph_207694246-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-3.jsonl b/split_edge/graph_207694246-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-31.jsonl b/split_edge/graph_207694246-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-32.jsonl b/split_edge/graph_207694246-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-33.jsonl b/split_edge/graph_207694246-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-36.jsonl b/split_edge/graph_207694246-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-37.jsonl b/split_edge/graph_207694246-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-39.jsonl b/split_edge/graph_207694246-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-4.jsonl b/split_edge/graph_207694246-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-40.jsonl b/split_edge/graph_207694246-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-41.jsonl b/split_edge/graph_207694246-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-42.jsonl b/split_edge/graph_207694246-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-43.jsonl b/split_edge/graph_207694246-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-44.jsonl b/split_edge/graph_207694246-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-45.jsonl b/split_edge/graph_207694246-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-46.jsonl b/split_edge/graph_207694246-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-47.jsonl b/split_edge/graph_207694246-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-7.jsonl b/split_edge/graph_207694246-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-8.jsonl b/split_edge/graph_207694246-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207694246-9.jsonl b/split_edge/graph_207694246-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207704857-0.jsonl b/split_edge/graph_207704857-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207704857-1.jsonl b/split_edge/graph_207704857-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207704857-2.jsonl b/split_edge/graph_207704857-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207704857-3.jsonl b/split_edge/graph_207704857-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207704857-5.jsonl b/split_edge/graph_207704857-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-1.jsonl b/split_edge/graph_207757741-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-10.jsonl b/split_edge/graph_207757741-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-13.jsonl b/split_edge/graph_207757741-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-14.jsonl b/split_edge/graph_207757741-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-15.jsonl b/split_edge/graph_207757741-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-16.jsonl b/split_edge/graph_207757741-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-17.jsonl b/split_edge/graph_207757741-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-18.jsonl b/split_edge/graph_207757741-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-19.jsonl b/split_edge/graph_207757741-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-2.jsonl b/split_edge/graph_207757741-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-20.jsonl b/split_edge/graph_207757741-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-29.jsonl b/split_edge/graph_207757741-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-3.jsonl b/split_edge/graph_207757741-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-30.jsonl b/split_edge/graph_207757741-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-4.jsonl b/split_edge/graph_207757741-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-8.jsonl b/split_edge/graph_207757741-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207757741-9.jsonl b/split_edge/graph_207757741-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-0.jsonl b/split_edge/graph_207888790-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-1.jsonl b/split_edge/graph_207888790-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-10.jsonl b/split_edge/graph_207888790-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-11.jsonl b/split_edge/graph_207888790-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-12.jsonl b/split_edge/graph_207888790-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-13.jsonl b/split_edge/graph_207888790-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-14.jsonl b/split_edge/graph_207888790-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-15.jsonl b/split_edge/graph_207888790-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-18.jsonl b/split_edge/graph_207888790-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-19.jsonl b/split_edge/graph_207888790-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-2.jsonl b/split_edge/graph_207888790-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-20.jsonl b/split_edge/graph_207888790-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-21.jsonl b/split_edge/graph_207888790-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-23.jsonl b/split_edge/graph_207888790-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-24.jsonl b/split_edge/graph_207888790-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-25.jsonl b/split_edge/graph_207888790-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-26.jsonl b/split_edge/graph_207888790-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-27.jsonl b/split_edge/graph_207888790-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-28.jsonl b/split_edge/graph_207888790-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-29.jsonl b/split_edge/graph_207888790-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-3.jsonl b/split_edge/graph_207888790-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-30.jsonl b/split_edge/graph_207888790-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-31.jsonl b/split_edge/graph_207888790-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-4.jsonl b/split_edge/graph_207888790-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-5.jsonl b/split_edge/graph_207888790-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-6.jsonl b/split_edge/graph_207888790-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-7.jsonl b/split_edge/graph_207888790-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-8.jsonl b/split_edge/graph_207888790-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207888790-9.jsonl b/split_edge/graph_207888790-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207930098-13.jsonl b/split_edge/graph_207930098-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207930098-15.jsonl b/split_edge/graph_207930098-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207930098-5.jsonl b/split_edge/graph_207930098-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_207930098-6.jsonl b/split_edge/graph_207930098-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208017129-0.jsonl b/split_edge/graph_208017129-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208017129-2.jsonl b/split_edge/graph_208017129-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208017129-4.jsonl b/split_edge/graph_208017129-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208017129-5.jsonl b/split_edge/graph_208017129-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208017129-6.jsonl b/split_edge/graph_208017129-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-1.jsonl b/split_edge/graph_208036214-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-10.jsonl b/split_edge/graph_208036214-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-11.jsonl b/split_edge/graph_208036214-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-12.jsonl b/split_edge/graph_208036214-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-13.jsonl b/split_edge/graph_208036214-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-14.jsonl b/split_edge/graph_208036214-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-16.jsonl b/split_edge/graph_208036214-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-17.jsonl b/split_edge/graph_208036214-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-18.jsonl b/split_edge/graph_208036214-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-19.jsonl b/split_edge/graph_208036214-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-2.jsonl b/split_edge/graph_208036214-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-20.jsonl b/split_edge/graph_208036214-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-21.jsonl b/split_edge/graph_208036214-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-22.jsonl b/split_edge/graph_208036214-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-23.jsonl b/split_edge/graph_208036214-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-3.jsonl b/split_edge/graph_208036214-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-4.jsonl b/split_edge/graph_208036214-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-5.jsonl b/split_edge/graph_208036214-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-8.jsonl b/split_edge/graph_208036214-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208036214-9.jsonl b/split_edge/graph_208036214-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-0.jsonl b/split_edge/graph_208127944-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-12.jsonl b/split_edge/graph_208127944-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-13.jsonl b/split_edge/graph_208127944-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-15.jsonl b/split_edge/graph_208127944-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-17.jsonl b/split_edge/graph_208127944-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-18.jsonl b/split_edge/graph_208127944-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-2.jsonl b/split_edge/graph_208127944-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-21.jsonl b/split_edge/graph_208127944-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-22.jsonl b/split_edge/graph_208127944-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-23.jsonl b/split_edge/graph_208127944-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-24.jsonl b/split_edge/graph_208127944-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-25.jsonl b/split_edge/graph_208127944-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-26.jsonl b/split_edge/graph_208127944-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-27.jsonl b/split_edge/graph_208127944-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-29.jsonl b/split_edge/graph_208127944-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-3.jsonl b/split_edge/graph_208127944-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-30.jsonl b/split_edge/graph_208127944-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-31.jsonl b/split_edge/graph_208127944-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-32.jsonl b/split_edge/graph_208127944-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-33.jsonl b/split_edge/graph_208127944-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-34.jsonl b/split_edge/graph_208127944-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-35.jsonl b/split_edge/graph_208127944-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-36.jsonl b/split_edge/graph_208127944-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-38.jsonl b/split_edge/graph_208127944-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-39.jsonl b/split_edge/graph_208127944-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-40.jsonl b/split_edge/graph_208127944-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-42.jsonl b/split_edge/graph_208127944-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-43.jsonl b/split_edge/graph_208127944-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-44.jsonl b/split_edge/graph_208127944-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-45.jsonl b/split_edge/graph_208127944-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-47.jsonl b/split_edge/graph_208127944-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-48.jsonl b/split_edge/graph_208127944-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-50.jsonl b/split_edge/graph_208127944-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-51.jsonl b/split_edge/graph_208127944-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-52.jsonl b/split_edge/graph_208127944-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-53.jsonl b/split_edge/graph_208127944-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-54.jsonl b/split_edge/graph_208127944-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-55.jsonl b/split_edge/graph_208127944-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-56.jsonl b/split_edge/graph_208127944-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-57.jsonl b/split_edge/graph_208127944-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-58.jsonl b/split_edge/graph_208127944-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-59.jsonl b/split_edge/graph_208127944-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-61.jsonl b/split_edge/graph_208127944-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-62.jsonl b/split_edge/graph_208127944-62.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-63.jsonl b/split_edge/graph_208127944-63.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208127944-68.jsonl b/split_edge/graph_208127944-68.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-0.jsonl b/split_edge/graph_208139056-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-1.jsonl b/split_edge/graph_208139056-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-10.jsonl b/split_edge/graph_208139056-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-11.jsonl b/split_edge/graph_208139056-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-12.jsonl b/split_edge/graph_208139056-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-13.jsonl b/split_edge/graph_208139056-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-15.jsonl b/split_edge/graph_208139056-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-17.jsonl b/split_edge/graph_208139056-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-2.jsonl b/split_edge/graph_208139056-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-3.jsonl b/split_edge/graph_208139056-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-4.jsonl b/split_edge/graph_208139056-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-5.jsonl b/split_edge/graph_208139056-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-6.jsonl b/split_edge/graph_208139056-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-8.jsonl b/split_edge/graph_208139056-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208139056-9.jsonl b/split_edge/graph_208139056-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-0.jsonl b/split_edge/graph_208157490-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-10.jsonl b/split_edge/graph_208157490-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-11.jsonl b/split_edge/graph_208157490-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-12.jsonl b/split_edge/graph_208157490-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-13.jsonl b/split_edge/graph_208157490-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-2.jsonl b/split_edge/graph_208157490-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-3.jsonl b/split_edge/graph_208157490-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-4.jsonl b/split_edge/graph_208157490-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-5.jsonl b/split_edge/graph_208157490-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-7.jsonl b/split_edge/graph_208157490-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-8.jsonl b/split_edge/graph_208157490-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208157490-9.jsonl b/split_edge/graph_208157490-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208208447-0.jsonl b/split_edge/graph_208208447-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208208447-11.jsonl b/split_edge/graph_208208447-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208208447-13.jsonl b/split_edge/graph_208208447-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-0.jsonl b/split_edge/graph_208278842-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-1.jsonl b/split_edge/graph_208278842-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-11.jsonl b/split_edge/graph_208278842-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-12.jsonl b/split_edge/graph_208278842-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-14.jsonl b/split_edge/graph_208278842-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-2.jsonl b/split_edge/graph_208278842-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-3.jsonl b/split_edge/graph_208278842-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-6.jsonl b/split_edge/graph_208278842-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-8.jsonl b/split_edge/graph_208278842-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208278842-9.jsonl b/split_edge/graph_208278842-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-0.jsonl b/split_edge/graph_208280632-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-1.jsonl b/split_edge/graph_208280632-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-10.jsonl b/split_edge/graph_208280632-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-15.jsonl b/split_edge/graph_208280632-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-19.jsonl b/split_edge/graph_208280632-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-2.jsonl b/split_edge/graph_208280632-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-3.jsonl b/split_edge/graph_208280632-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-4.jsonl b/split_edge/graph_208280632-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-6.jsonl b/split_edge/graph_208280632-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-7.jsonl b/split_edge/graph_208280632-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208280632-8.jsonl b/split_edge/graph_208280632-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-0.jsonl b/split_edge/graph_208527450-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-1.jsonl b/split_edge/graph_208527450-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-10.jsonl b/split_edge/graph_208527450-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-12.jsonl b/split_edge/graph_208527450-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-13.jsonl b/split_edge/graph_208527450-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-14.jsonl b/split_edge/graph_208527450-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-16.jsonl b/split_edge/graph_208527450-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-2.jsonl b/split_edge/graph_208527450-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-3.jsonl b/split_edge/graph_208527450-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-5.jsonl b/split_edge/graph_208527450-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-6.jsonl b/split_edge/graph_208527450-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-8.jsonl b/split_edge/graph_208527450-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208527450-9.jsonl b/split_edge/graph_208527450-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-0.jsonl b/split_edge/graph_208633264-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-1.jsonl b/split_edge/graph_208633264-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-10.jsonl b/split_edge/graph_208633264-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-12.jsonl b/split_edge/graph_208633264-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-13.jsonl b/split_edge/graph_208633264-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-14.jsonl b/split_edge/graph_208633264-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-16.jsonl b/split_edge/graph_208633264-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-17.jsonl b/split_edge/graph_208633264-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-18.jsonl b/split_edge/graph_208633264-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-19.jsonl b/split_edge/graph_208633264-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-20.jsonl b/split_edge/graph_208633264-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-21.jsonl b/split_edge/graph_208633264-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-25.jsonl b/split_edge/graph_208633264-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-26.jsonl b/split_edge/graph_208633264-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-27.jsonl b/split_edge/graph_208633264-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-29.jsonl b/split_edge/graph_208633264-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-32.jsonl b/split_edge/graph_208633264-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-33.jsonl b/split_edge/graph_208633264-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-38.jsonl b/split_edge/graph_208633264-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-39.jsonl b/split_edge/graph_208633264-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-40.jsonl b/split_edge/graph_208633264-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-41.jsonl b/split_edge/graph_208633264-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-42.jsonl b/split_edge/graph_208633264-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-44.jsonl b/split_edge/graph_208633264-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-47.jsonl b/split_edge/graph_208633264-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-48.jsonl b/split_edge/graph_208633264-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-49.jsonl b/split_edge/graph_208633264-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-50.jsonl b/split_edge/graph_208633264-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-51.jsonl b/split_edge/graph_208633264-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-52.jsonl b/split_edge/graph_208633264-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-53.jsonl b/split_edge/graph_208633264-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-54.jsonl b/split_edge/graph_208633264-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-55.jsonl b/split_edge/graph_208633264-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-56.jsonl b/split_edge/graph_208633264-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-57.jsonl b/split_edge/graph_208633264-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-58.jsonl b/split_edge/graph_208633264-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-59.jsonl b/split_edge/graph_208633264-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-6.jsonl b/split_edge/graph_208633264-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-66.jsonl b/split_edge/graph_208633264-66.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-68.jsonl b/split_edge/graph_208633264-68.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-7.jsonl b/split_edge/graph_208633264-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-71.jsonl b/split_edge/graph_208633264-71.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-8.jsonl b/split_edge/graph_208633264-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633264-9.jsonl b/split_edge/graph_208633264-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208633976-6.jsonl b/split_edge/graph_208633976-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-0.jsonl b/split_edge/graph_208857777-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-1.jsonl b/split_edge/graph_208857777-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-10.jsonl b/split_edge/graph_208857777-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-11.jsonl b/split_edge/graph_208857777-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-12.jsonl b/split_edge/graph_208857777-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-13.jsonl b/split_edge/graph_208857777-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-14.jsonl b/split_edge/graph_208857777-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-15.jsonl b/split_edge/graph_208857777-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-2.jsonl b/split_edge/graph_208857777-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-3.jsonl b/split_edge/graph_208857777-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-4.jsonl b/split_edge/graph_208857777-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-5.jsonl b/split_edge/graph_208857777-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-6.jsonl b/split_edge/graph_208857777-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-8.jsonl b/split_edge/graph_208857777-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_208857777-9.jsonl b/split_edge/graph_208857777-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20905429-0.jsonl b/split_edge/graph_20905429-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20905429-11.jsonl b/split_edge/graph_20905429-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20905429-2.jsonl b/split_edge/graph_20905429-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20905429-4.jsonl b/split_edge/graph_20905429-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20905429-5.jsonl b/split_edge/graph_20905429-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20905429-6.jsonl b/split_edge/graph_20905429-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_20905429-9.jsonl b/split_edge/graph_20905429-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209103872-1.jsonl b/split_edge/graph_209103872-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209103872-2.jsonl b/split_edge/graph_209103872-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-0.jsonl b/split_edge/graph_209202777-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-10.jsonl b/split_edge/graph_209202777-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-11.jsonl b/split_edge/graph_209202777-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-2.jsonl b/split_edge/graph_209202777-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-3.jsonl b/split_edge/graph_209202777-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-4.jsonl b/split_edge/graph_209202777-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-5.jsonl b/split_edge/graph_209202777-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-6.jsonl b/split_edge/graph_209202777-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209202777-8.jsonl b/split_edge/graph_209202777-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-0.jsonl b/split_edge/graph_209414738-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-1.jsonl b/split_edge/graph_209414738-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-11.jsonl b/split_edge/graph_209414738-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-12.jsonl b/split_edge/graph_209414738-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-14.jsonl b/split_edge/graph_209414738-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-16.jsonl b/split_edge/graph_209414738-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-17.jsonl b/split_edge/graph_209414738-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-19.jsonl b/split_edge/graph_209414738-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-2.jsonl b/split_edge/graph_209414738-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-20.jsonl b/split_edge/graph_209414738-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-3.jsonl b/split_edge/graph_209414738-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-4.jsonl b/split_edge/graph_209414738-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-5.jsonl b/split_edge/graph_209414738-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-6.jsonl b/split_edge/graph_209414738-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-7.jsonl b/split_edge/graph_209414738-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-8.jsonl b/split_edge/graph_209414738-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209414738-9.jsonl b/split_edge/graph_209414738-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209450009-0.jsonl b/split_edge/graph_209450009-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209450009-3.jsonl b/split_edge/graph_209450009-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209450009-4.jsonl b/split_edge/graph_209450009-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209450009-8.jsonl b/split_edge/graph_209450009-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-0.jsonl b/split_edge/graph_209497298-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-10.jsonl b/split_edge/graph_209497298-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-11.jsonl b/split_edge/graph_209497298-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-12.jsonl b/split_edge/graph_209497298-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-13.jsonl b/split_edge/graph_209497298-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-14.jsonl b/split_edge/graph_209497298-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-15.jsonl b/split_edge/graph_209497298-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-17.jsonl b/split_edge/graph_209497298-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-18.jsonl b/split_edge/graph_209497298-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-19.jsonl b/split_edge/graph_209497298-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-20.jsonl b/split_edge/graph_209497298-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-21.jsonl b/split_edge/graph_209497298-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-22.jsonl b/split_edge/graph_209497298-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-25.jsonl b/split_edge/graph_209497298-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-26.jsonl b/split_edge/graph_209497298-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-28.jsonl b/split_edge/graph_209497298-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-3.jsonl b/split_edge/graph_209497298-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-4.jsonl b/split_edge/graph_209497298-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-6.jsonl b/split_edge/graph_209497298-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-7.jsonl b/split_edge/graph_209497298-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209497298-9.jsonl b/split_edge/graph_209497298-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-0.jsonl b/split_edge/graph_209515914-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-10.jsonl b/split_edge/graph_209515914-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-11.jsonl b/split_edge/graph_209515914-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-15.jsonl b/split_edge/graph_209515914-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-16.jsonl b/split_edge/graph_209515914-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-17.jsonl b/split_edge/graph_209515914-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-18.jsonl b/split_edge/graph_209515914-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-20.jsonl b/split_edge/graph_209515914-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-21.jsonl b/split_edge/graph_209515914-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-22.jsonl b/split_edge/graph_209515914-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-23.jsonl b/split_edge/graph_209515914-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-25.jsonl b/split_edge/graph_209515914-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-26.jsonl b/split_edge/graph_209515914-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-27.jsonl b/split_edge/graph_209515914-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-28.jsonl b/split_edge/graph_209515914-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-29.jsonl b/split_edge/graph_209515914-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-30.jsonl b/split_edge/graph_209515914-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-31.jsonl b/split_edge/graph_209515914-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-32.jsonl b/split_edge/graph_209515914-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-34.jsonl b/split_edge/graph_209515914-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-35.jsonl b/split_edge/graph_209515914-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-36.jsonl b/split_edge/graph_209515914-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-5.jsonl b/split_edge/graph_209515914-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-7.jsonl b/split_edge/graph_209515914-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-8.jsonl b/split_edge/graph_209515914-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209515914-9.jsonl b/split_edge/graph_209515914-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-0.jsonl b/split_edge/graph_209901261-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-13.jsonl b/split_edge/graph_209901261-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-14.jsonl b/split_edge/graph_209901261-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-16.jsonl b/split_edge/graph_209901261-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-17.jsonl b/split_edge/graph_209901261-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-18.jsonl b/split_edge/graph_209901261-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-19.jsonl b/split_edge/graph_209901261-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-20.jsonl b/split_edge/graph_209901261-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-21.jsonl b/split_edge/graph_209901261-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-22.jsonl b/split_edge/graph_209901261-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-3.jsonl b/split_edge/graph_209901261-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-4.jsonl b/split_edge/graph_209901261-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-6.jsonl b/split_edge/graph_209901261-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_209901261-8.jsonl b/split_edge/graph_209901261-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-0.jsonl b/split_edge/graph_210023930-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-1.jsonl b/split_edge/graph_210023930-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-11.jsonl b/split_edge/graph_210023930-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-12.jsonl b/split_edge/graph_210023930-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-14.jsonl b/split_edge/graph_210023930-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-15.jsonl b/split_edge/graph_210023930-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-16.jsonl b/split_edge/graph_210023930-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-17.jsonl b/split_edge/graph_210023930-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-18.jsonl b/split_edge/graph_210023930-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-19.jsonl b/split_edge/graph_210023930-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-2.jsonl b/split_edge/graph_210023930-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-20.jsonl b/split_edge/graph_210023930-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-21.jsonl b/split_edge/graph_210023930-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-22.jsonl b/split_edge/graph_210023930-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-23.jsonl b/split_edge/graph_210023930-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-4.jsonl b/split_edge/graph_210023930-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-5.jsonl b/split_edge/graph_210023930-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-6.jsonl b/split_edge/graph_210023930-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-7.jsonl b/split_edge/graph_210023930-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-8.jsonl b/split_edge/graph_210023930-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210023930-9.jsonl b/split_edge/graph_210023930-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210192227-0.jsonl b/split_edge/graph_210192227-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210192227-10.jsonl b/split_edge/graph_210192227-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-0.jsonl b/split_edge/graph_210473293-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-1.jsonl b/split_edge/graph_210473293-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-10.jsonl b/split_edge/graph_210473293-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-11.jsonl b/split_edge/graph_210473293-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-12.jsonl b/split_edge/graph_210473293-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-13.jsonl b/split_edge/graph_210473293-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-14.jsonl b/split_edge/graph_210473293-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-15.jsonl b/split_edge/graph_210473293-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-16.jsonl b/split_edge/graph_210473293-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-17.jsonl b/split_edge/graph_210473293-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-18.jsonl b/split_edge/graph_210473293-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-19.jsonl b/split_edge/graph_210473293-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-6.jsonl b/split_edge/graph_210473293-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-7.jsonl b/split_edge/graph_210473293-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-8.jsonl b/split_edge/graph_210473293-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210473293-9.jsonl b/split_edge/graph_210473293-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-0.jsonl b/split_edge/graph_210692184-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-1.jsonl b/split_edge/graph_210692184-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-10.jsonl b/split_edge/graph_210692184-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-13.jsonl b/split_edge/graph_210692184-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-14.jsonl b/split_edge/graph_210692184-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-15.jsonl b/split_edge/graph_210692184-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-16.jsonl b/split_edge/graph_210692184-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-17.jsonl b/split_edge/graph_210692184-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-18.jsonl b/split_edge/graph_210692184-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-19.jsonl b/split_edge/graph_210692184-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-2.jsonl b/split_edge/graph_210692184-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-20.jsonl b/split_edge/graph_210692184-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-21.jsonl b/split_edge/graph_210692184-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-22.jsonl b/split_edge/graph_210692184-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-23.jsonl b/split_edge/graph_210692184-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-25.jsonl b/split_edge/graph_210692184-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-26.jsonl b/split_edge/graph_210692184-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-27.jsonl b/split_edge/graph_210692184-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-28.jsonl b/split_edge/graph_210692184-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-29.jsonl b/split_edge/graph_210692184-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-3.jsonl b/split_edge/graph_210692184-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-30.jsonl b/split_edge/graph_210692184-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-31.jsonl b/split_edge/graph_210692184-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-32.jsonl b/split_edge/graph_210692184-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-33.jsonl b/split_edge/graph_210692184-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-37.jsonl b/split_edge/graph_210692184-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-39.jsonl b/split_edge/graph_210692184-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-4.jsonl b/split_edge/graph_210692184-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-40.jsonl b/split_edge/graph_210692184-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-41.jsonl b/split_edge/graph_210692184-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-42.jsonl b/split_edge/graph_210692184-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-44.jsonl b/split_edge/graph_210692184-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-45.jsonl b/split_edge/graph_210692184-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-46.jsonl b/split_edge/graph_210692184-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-48.jsonl b/split_edge/graph_210692184-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-49.jsonl b/split_edge/graph_210692184-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-50.jsonl b/split_edge/graph_210692184-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-51.jsonl b/split_edge/graph_210692184-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-6.jsonl b/split_edge/graph_210692184-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-7.jsonl b/split_edge/graph_210692184-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-8.jsonl b/split_edge/graph_210692184-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210692184-9.jsonl b/split_edge/graph_210692184-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210695152-0.jsonl b/split_edge/graph_210695152-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210695152-3.jsonl b/split_edge/graph_210695152-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210695152-4.jsonl b/split_edge/graph_210695152-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210695152-5.jsonl b/split_edge/graph_210695152-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210695152-6.jsonl b/split_edge/graph_210695152-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210695152-7.jsonl b/split_edge/graph_210695152-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-0.jsonl b/split_edge/graph_210696203-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-1.jsonl b/split_edge/graph_210696203-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-10.jsonl b/split_edge/graph_210696203-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-11.jsonl b/split_edge/graph_210696203-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-12.jsonl b/split_edge/graph_210696203-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-13.jsonl b/split_edge/graph_210696203-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-14.jsonl b/split_edge/graph_210696203-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-15.jsonl b/split_edge/graph_210696203-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-2.jsonl b/split_edge/graph_210696203-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-3.jsonl b/split_edge/graph_210696203-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-4.jsonl b/split_edge/graph_210696203-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-5.jsonl b/split_edge/graph_210696203-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-6.jsonl b/split_edge/graph_210696203-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-7.jsonl b/split_edge/graph_210696203-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210696203-8.jsonl b/split_edge/graph_210696203-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-0.jsonl b/split_edge/graph_210839653-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-1.jsonl b/split_edge/graph_210839653-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-10.jsonl b/split_edge/graph_210839653-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-11.jsonl b/split_edge/graph_210839653-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-12.jsonl b/split_edge/graph_210839653-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-13.jsonl b/split_edge/graph_210839653-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-14.jsonl b/split_edge/graph_210839653-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-15.jsonl b/split_edge/graph_210839653-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-16.jsonl b/split_edge/graph_210839653-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-17.jsonl b/split_edge/graph_210839653-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-18.jsonl b/split_edge/graph_210839653-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-19.jsonl b/split_edge/graph_210839653-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-2.jsonl b/split_edge/graph_210839653-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-20.jsonl b/split_edge/graph_210839653-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-21.jsonl b/split_edge/graph_210839653-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-22.jsonl b/split_edge/graph_210839653-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-23.jsonl b/split_edge/graph_210839653-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-24.jsonl b/split_edge/graph_210839653-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-26.jsonl b/split_edge/graph_210839653-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-27.jsonl b/split_edge/graph_210839653-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-28.jsonl b/split_edge/graph_210839653-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-29.jsonl b/split_edge/graph_210839653-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-30.jsonl b/split_edge/graph_210839653-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-31.jsonl b/split_edge/graph_210839653-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-32.jsonl b/split_edge/graph_210839653-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-33.jsonl b/split_edge/graph_210839653-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-35.jsonl b/split_edge/graph_210839653-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-36.jsonl b/split_edge/graph_210839653-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-37.jsonl b/split_edge/graph_210839653-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-38.jsonl b/split_edge/graph_210839653-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-39.jsonl b/split_edge/graph_210839653-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-4.jsonl b/split_edge/graph_210839653-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-40.jsonl b/split_edge/graph_210839653-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-41.jsonl b/split_edge/graph_210839653-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-43.jsonl b/split_edge/graph_210839653-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-44.jsonl b/split_edge/graph_210839653-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-45.jsonl b/split_edge/graph_210839653-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-47.jsonl b/split_edge/graph_210839653-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-49.jsonl b/split_edge/graph_210839653-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-5.jsonl b/split_edge/graph_210839653-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-50.jsonl b/split_edge/graph_210839653-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-54.jsonl b/split_edge/graph_210839653-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-56.jsonl b/split_edge/graph_210839653-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-57.jsonl b/split_edge/graph_210839653-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-58.jsonl b/split_edge/graph_210839653-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-59.jsonl b/split_edge/graph_210839653-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-6.jsonl b/split_edge/graph_210839653-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-60.jsonl b/split_edge/graph_210839653-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-61.jsonl b/split_edge/graph_210839653-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-62.jsonl b/split_edge/graph_210839653-62.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-7.jsonl b/split_edge/graph_210839653-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210839653-9.jsonl b/split_edge/graph_210839653-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-0.jsonl b/split_edge/graph_210867635-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-1.jsonl b/split_edge/graph_210867635-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-2.jsonl b/split_edge/graph_210867635-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-5.jsonl b/split_edge/graph_210867635-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-6.jsonl b/split_edge/graph_210867635-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-7.jsonl b/split_edge/graph_210867635-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-8.jsonl b/split_edge/graph_210867635-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210867635-9.jsonl b/split_edge/graph_210867635-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-0.jsonl b/split_edge/graph_210873518-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-1.jsonl b/split_edge/graph_210873518-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-11.jsonl b/split_edge/graph_210873518-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-12.jsonl b/split_edge/graph_210873518-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-15.jsonl b/split_edge/graph_210873518-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-16.jsonl b/split_edge/graph_210873518-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-22.jsonl b/split_edge/graph_210873518-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-5.jsonl b/split_edge/graph_210873518-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-7.jsonl b/split_edge/graph_210873518-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-8.jsonl b/split_edge/graph_210873518-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_210873518-9.jsonl b/split_edge/graph_210873518-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-0.jsonl b/split_edge/graph_211020553-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-1.jsonl b/split_edge/graph_211020553-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-10.jsonl b/split_edge/graph_211020553-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-11.jsonl b/split_edge/graph_211020553-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-13.jsonl b/split_edge/graph_211020553-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-14.jsonl b/split_edge/graph_211020553-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-21.jsonl b/split_edge/graph_211020553-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-22.jsonl b/split_edge/graph_211020553-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-27.jsonl b/split_edge/graph_211020553-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-31.jsonl b/split_edge/graph_211020553-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-34.jsonl b/split_edge/graph_211020553-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-35.jsonl b/split_edge/graph_211020553-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-47.jsonl b/split_edge/graph_211020553-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-48.jsonl b/split_edge/graph_211020553-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-7.jsonl b/split_edge/graph_211020553-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211020553-8.jsonl b/split_edge/graph_211020553-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-0.jsonl b/split_edge/graph_211030243-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-1.jsonl b/split_edge/graph_211030243-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-10.jsonl b/split_edge/graph_211030243-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-11.jsonl b/split_edge/graph_211030243-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-13.jsonl b/split_edge/graph_211030243-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-2.jsonl b/split_edge/graph_211030243-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-3.jsonl b/split_edge/graph_211030243-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-4.jsonl b/split_edge/graph_211030243-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-5.jsonl b/split_edge/graph_211030243-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-6.jsonl b/split_edge/graph_211030243-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-7.jsonl b/split_edge/graph_211030243-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-8.jsonl b/split_edge/graph_211030243-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211030243-9.jsonl b/split_edge/graph_211030243-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211082794-0.jsonl b/split_edge/graph_211082794-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211082794-2.jsonl b/split_edge/graph_211082794-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211082794-3.jsonl b/split_edge/graph_211082794-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211082794-5.jsonl b/split_edge/graph_211082794-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211082794-7.jsonl b/split_edge/graph_211082794-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211082794-8.jsonl b/split_edge/graph_211082794-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-0.jsonl b/split_edge/graph_211094582-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-1.jsonl b/split_edge/graph_211094582-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-10.jsonl b/split_edge/graph_211094582-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-2.jsonl b/split_edge/graph_211094582-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-3.jsonl b/split_edge/graph_211094582-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-4.jsonl b/split_edge/graph_211094582-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-7.jsonl b/split_edge/graph_211094582-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-8.jsonl b/split_edge/graph_211094582-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211094582-9.jsonl b/split_edge/graph_211094582-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-0.jsonl b/split_edge/graph_211129042-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-10.jsonl b/split_edge/graph_211129042-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-11.jsonl b/split_edge/graph_211129042-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-12.jsonl b/split_edge/graph_211129042-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-13.jsonl b/split_edge/graph_211129042-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-15.jsonl b/split_edge/graph_211129042-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-16.jsonl b/split_edge/graph_211129042-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-17.jsonl b/split_edge/graph_211129042-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-18.jsonl b/split_edge/graph_211129042-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-19.jsonl b/split_edge/graph_211129042-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-2.jsonl b/split_edge/graph_211129042-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-4.jsonl b/split_edge/graph_211129042-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-5.jsonl b/split_edge/graph_211129042-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-6.jsonl b/split_edge/graph_211129042-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-7.jsonl b/split_edge/graph_211129042-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211129042-8.jsonl b/split_edge/graph_211129042-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-0.jsonl b/split_edge/graph_211724404-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-1.jsonl b/split_edge/graph_211724404-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-10.jsonl b/split_edge/graph_211724404-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-11.jsonl b/split_edge/graph_211724404-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-12.jsonl b/split_edge/graph_211724404-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-13.jsonl b/split_edge/graph_211724404-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-15.jsonl b/split_edge/graph_211724404-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-16.jsonl b/split_edge/graph_211724404-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-19.jsonl b/split_edge/graph_211724404-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-2.jsonl b/split_edge/graph_211724404-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-20.jsonl b/split_edge/graph_211724404-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-5.jsonl b/split_edge/graph_211724404-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-6.jsonl b/split_edge/graph_211724404-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_211724404-8.jsonl b/split_edge/graph_211724404-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-1.jsonl b/split_edge/graph_2122433-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-25.jsonl b/split_edge/graph_2122433-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-29.jsonl b/split_edge/graph_2122433-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-30.jsonl b/split_edge/graph_2122433-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-31.jsonl b/split_edge/graph_2122433-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-32.jsonl b/split_edge/graph_2122433-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-33.jsonl b/split_edge/graph_2122433-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-34.jsonl b/split_edge/graph_2122433-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-35.jsonl b/split_edge/graph_2122433-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-36.jsonl b/split_edge/graph_2122433-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-37.jsonl b/split_edge/graph_2122433-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-38.jsonl b/split_edge/graph_2122433-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-39.jsonl b/split_edge/graph_2122433-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-40.jsonl b/split_edge/graph_2122433-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-41.jsonl b/split_edge/graph_2122433-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-42.jsonl b/split_edge/graph_2122433-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-43.jsonl b/split_edge/graph_2122433-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-44.jsonl b/split_edge/graph_2122433-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-45.jsonl b/split_edge/graph_2122433-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-46.jsonl b/split_edge/graph_2122433-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-47.jsonl b/split_edge/graph_2122433-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-48.jsonl b/split_edge/graph_2122433-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2122433-61.jsonl b/split_edge/graph_2122433-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-0.jsonl b/split_edge/graph_212648321-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-1.jsonl b/split_edge/graph_212648321-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-10.jsonl b/split_edge/graph_212648321-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-11.jsonl b/split_edge/graph_212648321-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-12.jsonl b/split_edge/graph_212648321-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-13.jsonl b/split_edge/graph_212648321-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-14.jsonl b/split_edge/graph_212648321-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-15.jsonl b/split_edge/graph_212648321-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-16.jsonl b/split_edge/graph_212648321-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-17.jsonl b/split_edge/graph_212648321-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-19.jsonl b/split_edge/graph_212648321-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-2.jsonl b/split_edge/graph_212648321-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-22.jsonl b/split_edge/graph_212648321-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-23.jsonl b/split_edge/graph_212648321-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-24.jsonl b/split_edge/graph_212648321-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-26.jsonl b/split_edge/graph_212648321-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-27.jsonl b/split_edge/graph_212648321-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-29.jsonl b/split_edge/graph_212648321-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-3.jsonl b/split_edge/graph_212648321-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-30.jsonl b/split_edge/graph_212648321-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-31.jsonl b/split_edge/graph_212648321-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-32.jsonl b/split_edge/graph_212648321-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-33.jsonl b/split_edge/graph_212648321-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-34.jsonl b/split_edge/graph_212648321-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-35.jsonl b/split_edge/graph_212648321-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-37.jsonl b/split_edge/graph_212648321-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-38.jsonl b/split_edge/graph_212648321-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-4.jsonl b/split_edge/graph_212648321-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-41.jsonl b/split_edge/graph_212648321-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-44.jsonl b/split_edge/graph_212648321-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-45.jsonl b/split_edge/graph_212648321-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-47.jsonl b/split_edge/graph_212648321-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-5.jsonl b/split_edge/graph_212648321-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212648321-9.jsonl b/split_edge/graph_212648321-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-0.jsonl b/split_edge/graph_212719774-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-1.jsonl b/split_edge/graph_212719774-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-10.jsonl b/split_edge/graph_212719774-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-11.jsonl b/split_edge/graph_212719774-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-12.jsonl b/split_edge/graph_212719774-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-13.jsonl b/split_edge/graph_212719774-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-16.jsonl b/split_edge/graph_212719774-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-17.jsonl b/split_edge/graph_212719774-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-18.jsonl b/split_edge/graph_212719774-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-3.jsonl b/split_edge/graph_212719774-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-7.jsonl b/split_edge/graph_212719774-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212719774-8.jsonl b/split_edge/graph_212719774-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212747705-2.jsonl b/split_edge/graph_212747705-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_212747705-6.jsonl b/split_edge/graph_212747705-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-0.jsonl b/split_edge/graph_214172669-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-1.jsonl b/split_edge/graph_214172669-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-11.jsonl b/split_edge/graph_214172669-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-12.jsonl b/split_edge/graph_214172669-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-13.jsonl b/split_edge/graph_214172669-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-14.jsonl b/split_edge/graph_214172669-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-15.jsonl b/split_edge/graph_214172669-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-3.jsonl b/split_edge/graph_214172669-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-4.jsonl b/split_edge/graph_214172669-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-5.jsonl b/split_edge/graph_214172669-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-7.jsonl b/split_edge/graph_214172669-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-8.jsonl b/split_edge/graph_214172669-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214172669-9.jsonl b/split_edge/graph_214172669-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-0.jsonl b/split_edge/graph_214713946-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-10.jsonl b/split_edge/graph_214713946-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-11.jsonl b/split_edge/graph_214713946-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-12.jsonl b/split_edge/graph_214713946-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-13.jsonl b/split_edge/graph_214713946-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-14.jsonl b/split_edge/graph_214713946-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-15.jsonl b/split_edge/graph_214713946-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-2.jsonl b/split_edge/graph_214713946-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-3.jsonl b/split_edge/graph_214713946-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-4.jsonl b/split_edge/graph_214713946-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-5.jsonl b/split_edge/graph_214713946-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-6.jsonl b/split_edge/graph_214713946-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-8.jsonl b/split_edge/graph_214713946-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_214713946-9.jsonl b/split_edge/graph_214713946-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-0.jsonl b/split_edge/graph_215548987-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-10.jsonl b/split_edge/graph_215548987-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-11.jsonl b/split_edge/graph_215548987-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-12.jsonl b/split_edge/graph_215548987-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-13.jsonl b/split_edge/graph_215548987-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-14.jsonl b/split_edge/graph_215548987-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-15.jsonl b/split_edge/graph_215548987-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-16.jsonl b/split_edge/graph_215548987-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-17.jsonl b/split_edge/graph_215548987-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-18.jsonl b/split_edge/graph_215548987-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-19.jsonl b/split_edge/graph_215548987-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-20.jsonl b/split_edge/graph_215548987-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-4.jsonl b/split_edge/graph_215548987-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-8.jsonl b/split_edge/graph_215548987-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_215548987-9.jsonl b/split_edge/graph_215548987-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-0.jsonl b/split_edge/graph_21587628-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-1.jsonl b/split_edge/graph_21587628-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-13.jsonl b/split_edge/graph_21587628-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-14.jsonl b/split_edge/graph_21587628-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-15.jsonl b/split_edge/graph_21587628-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-16.jsonl b/split_edge/graph_21587628-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-17.jsonl b/split_edge/graph_21587628-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-18.jsonl b/split_edge/graph_21587628-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21587628-9.jsonl b/split_edge/graph_21587628-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-0.jsonl b/split_edge/graph_21604950-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-11.jsonl b/split_edge/graph_21604950-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-12.jsonl b/split_edge/graph_21604950-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-13.jsonl b/split_edge/graph_21604950-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-14.jsonl b/split_edge/graph_21604950-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-15.jsonl b/split_edge/graph_21604950-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-16.jsonl b/split_edge/graph_21604950-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-17.jsonl b/split_edge/graph_21604950-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-18.jsonl b/split_edge/graph_21604950-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-19.jsonl b/split_edge/graph_21604950-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-2.jsonl b/split_edge/graph_21604950-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-22.jsonl b/split_edge/graph_21604950-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-23.jsonl b/split_edge/graph_21604950-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-25.jsonl b/split_edge/graph_21604950-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-26.jsonl b/split_edge/graph_21604950-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-27.jsonl b/split_edge/graph_21604950-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-28.jsonl b/split_edge/graph_21604950-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-29.jsonl b/split_edge/graph_21604950-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-3.jsonl b/split_edge/graph_21604950-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-4.jsonl b/split_edge/graph_21604950-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-5.jsonl b/split_edge/graph_21604950-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-6.jsonl b/split_edge/graph_21604950-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-8.jsonl b/split_edge/graph_21604950-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21604950-9.jsonl b/split_edge/graph_21604950-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-0.jsonl b/split_edge/graph_2160968-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-10.jsonl b/split_edge/graph_2160968-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-12.jsonl b/split_edge/graph_2160968-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-13.jsonl b/split_edge/graph_2160968-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-14.jsonl b/split_edge/graph_2160968-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-15.jsonl b/split_edge/graph_2160968-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-16.jsonl b/split_edge/graph_2160968-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-17.jsonl b/split_edge/graph_2160968-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-19.jsonl b/split_edge/graph_2160968-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-20.jsonl b/split_edge/graph_2160968-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2160968-3.jsonl b/split_edge/graph_2160968-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-0.jsonl b/split_edge/graph_2165257-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-1.jsonl b/split_edge/graph_2165257-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-10.jsonl b/split_edge/graph_2165257-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-2.jsonl b/split_edge/graph_2165257-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-3.jsonl b/split_edge/graph_2165257-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-4.jsonl b/split_edge/graph_2165257-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-6.jsonl b/split_edge/graph_2165257-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-7.jsonl b/split_edge/graph_2165257-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-8.jsonl b/split_edge/graph_2165257-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2165257-9.jsonl b/split_edge/graph_2165257-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-0.jsonl b/split_edge/graph_2177212-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-1.jsonl b/split_edge/graph_2177212-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-10.jsonl b/split_edge/graph_2177212-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-11.jsonl b/split_edge/graph_2177212-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-12.jsonl b/split_edge/graph_2177212-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-14.jsonl b/split_edge/graph_2177212-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-16.jsonl b/split_edge/graph_2177212-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-17.jsonl b/split_edge/graph_2177212-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-23.jsonl b/split_edge/graph_2177212-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-24.jsonl b/split_edge/graph_2177212-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-25.jsonl b/split_edge/graph_2177212-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-27.jsonl b/split_edge/graph_2177212-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-3.jsonl b/split_edge/graph_2177212-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-31.jsonl b/split_edge/graph_2177212-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-33.jsonl b/split_edge/graph_2177212-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-37.jsonl b/split_edge/graph_2177212-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-38.jsonl b/split_edge/graph_2177212-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-4.jsonl b/split_edge/graph_2177212-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-40.jsonl b/split_edge/graph_2177212-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-43.jsonl b/split_edge/graph_2177212-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-46.jsonl b/split_edge/graph_2177212-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-47.jsonl b/split_edge/graph_2177212-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-50.jsonl b/split_edge/graph_2177212-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2177212-6.jsonl b/split_edge/graph_2177212-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-0.jsonl b/split_edge/graph_21875534-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-10.jsonl b/split_edge/graph_21875534-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-12.jsonl b/split_edge/graph_21875534-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-13.jsonl b/split_edge/graph_21875534-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-14.jsonl b/split_edge/graph_21875534-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-17.jsonl b/split_edge/graph_21875534-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-18.jsonl b/split_edge/graph_21875534-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-19.jsonl b/split_edge/graph_21875534-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-2.jsonl b/split_edge/graph_21875534-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-21.jsonl b/split_edge/graph_21875534-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-3.jsonl b/split_edge/graph_21875534-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-4.jsonl b/split_edge/graph_21875534-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-5.jsonl b/split_edge/graph_21875534-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-6.jsonl b/split_edge/graph_21875534-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-8.jsonl b/split_edge/graph_21875534-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_21875534-9.jsonl b/split_edge/graph_21875534-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-0.jsonl b/split_edge/graph_22018248-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-10.jsonl b/split_edge/graph_22018248-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-13.jsonl b/split_edge/graph_22018248-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-14.jsonl b/split_edge/graph_22018248-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-15.jsonl b/split_edge/graph_22018248-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-16.jsonl b/split_edge/graph_22018248-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-17.jsonl b/split_edge/graph_22018248-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-2.jsonl b/split_edge/graph_22018248-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-20.jsonl b/split_edge/graph_22018248-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-21.jsonl b/split_edge/graph_22018248-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-22.jsonl b/split_edge/graph_22018248-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-23.jsonl b/split_edge/graph_22018248-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-24.jsonl b/split_edge/graph_22018248-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-26.jsonl b/split_edge/graph_22018248-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-27.jsonl b/split_edge/graph_22018248-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-28.jsonl b/split_edge/graph_22018248-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-29.jsonl b/split_edge/graph_22018248-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-30.jsonl b/split_edge/graph_22018248-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-31.jsonl b/split_edge/graph_22018248-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-32.jsonl b/split_edge/graph_22018248-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-34.jsonl b/split_edge/graph_22018248-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-35.jsonl b/split_edge/graph_22018248-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-36.jsonl b/split_edge/graph_22018248-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-38.jsonl b/split_edge/graph_22018248-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-39.jsonl b/split_edge/graph_22018248-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-4.jsonl b/split_edge/graph_22018248-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-40.jsonl b/split_edge/graph_22018248-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-7.jsonl b/split_edge/graph_22018248-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22018248-9.jsonl b/split_edge/graph_22018248-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-11.jsonl b/split_edge/graph_22045105-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-12.jsonl b/split_edge/graph_22045105-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-14.jsonl b/split_edge/graph_22045105-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-2.jsonl b/split_edge/graph_22045105-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-4.jsonl b/split_edge/graph_22045105-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-5.jsonl b/split_edge/graph_22045105-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-6.jsonl b/split_edge/graph_22045105-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-7.jsonl b/split_edge/graph_22045105-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-8.jsonl b/split_edge/graph_22045105-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22045105-9.jsonl b/split_edge/graph_22045105-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-0.jsonl b/split_edge/graph_2208818-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-10.jsonl b/split_edge/graph_2208818-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-2.jsonl b/split_edge/graph_2208818-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-3.jsonl b/split_edge/graph_2208818-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-4.jsonl b/split_edge/graph_2208818-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-5.jsonl b/split_edge/graph_2208818-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-6.jsonl b/split_edge/graph_2208818-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-7.jsonl b/split_edge/graph_2208818-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-8.jsonl b/split_edge/graph_2208818-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2208818-9.jsonl b/split_edge/graph_2208818-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-1.jsonl b/split_edge/graph_22227042-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-10.jsonl b/split_edge/graph_22227042-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-11.jsonl b/split_edge/graph_22227042-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-14.jsonl b/split_edge/graph_22227042-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-15.jsonl b/split_edge/graph_22227042-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-16.jsonl b/split_edge/graph_22227042-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-17.jsonl b/split_edge/graph_22227042-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-19.jsonl b/split_edge/graph_22227042-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-20.jsonl b/split_edge/graph_22227042-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-22.jsonl b/split_edge/graph_22227042-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-23.jsonl b/split_edge/graph_22227042-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-24.jsonl b/split_edge/graph_22227042-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-25.jsonl b/split_edge/graph_22227042-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-26.jsonl b/split_edge/graph_22227042-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-27.jsonl b/split_edge/graph_22227042-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-36.jsonl b/split_edge/graph_22227042-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-39.jsonl b/split_edge/graph_22227042-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-4.jsonl b/split_edge/graph_22227042-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-40.jsonl b/split_edge/graph_22227042-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-44.jsonl b/split_edge/graph_22227042-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-45.jsonl b/split_edge/graph_22227042-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-47.jsonl b/split_edge/graph_22227042-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-5.jsonl b/split_edge/graph_22227042-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22227042-8.jsonl b/split_edge/graph_22227042-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-1.jsonl b/split_edge/graph_22259070-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-10.jsonl b/split_edge/graph_22259070-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-11.jsonl b/split_edge/graph_22259070-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-4.jsonl b/split_edge/graph_22259070-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-5.jsonl b/split_edge/graph_22259070-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-6.jsonl b/split_edge/graph_22259070-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-7.jsonl b/split_edge/graph_22259070-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-8.jsonl b/split_edge/graph_22259070-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22259070-9.jsonl b/split_edge/graph_22259070-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-0.jsonl b/split_edge/graph_22352825-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-1.jsonl b/split_edge/graph_22352825-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-2.jsonl b/split_edge/graph_22352825-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-3.jsonl b/split_edge/graph_22352825-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-4.jsonl b/split_edge/graph_22352825-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-5.jsonl b/split_edge/graph_22352825-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-7.jsonl b/split_edge/graph_22352825-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22352825-8.jsonl b/split_edge/graph_22352825-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-0.jsonl b/split_edge/graph_2246-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-1.jsonl b/split_edge/graph_2246-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-10.jsonl b/split_edge/graph_2246-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-12.jsonl b/split_edge/graph_2246-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-13.jsonl b/split_edge/graph_2246-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-2.jsonl b/split_edge/graph_2246-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-3.jsonl b/split_edge/graph_2246-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2246-4.jsonl b/split_edge/graph_2246-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-0.jsonl b/split_edge/graph_224701-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-1.jsonl b/split_edge/graph_224701-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-10.jsonl b/split_edge/graph_224701-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-2.jsonl b/split_edge/graph_224701-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-4.jsonl b/split_edge/graph_224701-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-6.jsonl b/split_edge/graph_224701-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-7.jsonl b/split_edge/graph_224701-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-8.jsonl b/split_edge/graph_224701-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_224701-9.jsonl b/split_edge/graph_224701-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2253457-0.jsonl b/split_edge/graph_2253457-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2253457-2.jsonl b/split_edge/graph_2253457-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2253457-3.jsonl b/split_edge/graph_2253457-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2253457-4.jsonl b/split_edge/graph_2253457-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-10.jsonl b/split_edge/graph_2256372-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-13.jsonl b/split_edge/graph_2256372-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-18.jsonl b/split_edge/graph_2256372-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-2.jsonl b/split_edge/graph_2256372-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-22.jsonl b/split_edge/graph_2256372-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-24.jsonl b/split_edge/graph_2256372-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-26.jsonl b/split_edge/graph_2256372-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-27.jsonl b/split_edge/graph_2256372-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-29.jsonl b/split_edge/graph_2256372-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-3.jsonl b/split_edge/graph_2256372-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-4.jsonl b/split_edge/graph_2256372-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-7.jsonl b/split_edge/graph_2256372-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2256372-9.jsonl b/split_edge/graph_2256372-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-0.jsonl b/split_edge/graph_2265977-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-1.jsonl b/split_edge/graph_2265977-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-10.jsonl b/split_edge/graph_2265977-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-11.jsonl b/split_edge/graph_2265977-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-12.jsonl b/split_edge/graph_2265977-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-13.jsonl b/split_edge/graph_2265977-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-14.jsonl b/split_edge/graph_2265977-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-15.jsonl b/split_edge/graph_2265977-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-16.jsonl b/split_edge/graph_2265977-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-17.jsonl b/split_edge/graph_2265977-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-18.jsonl b/split_edge/graph_2265977-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-19.jsonl b/split_edge/graph_2265977-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-2.jsonl b/split_edge/graph_2265977-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-20.jsonl b/split_edge/graph_2265977-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-21.jsonl b/split_edge/graph_2265977-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-4.jsonl b/split_edge/graph_2265977-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-5.jsonl b/split_edge/graph_2265977-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-6.jsonl b/split_edge/graph_2265977-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-7.jsonl b/split_edge/graph_2265977-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2265977-8.jsonl b/split_edge/graph_2265977-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-0.jsonl b/split_edge/graph_22833814-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-1.jsonl b/split_edge/graph_22833814-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-10.jsonl b/split_edge/graph_22833814-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-11.jsonl b/split_edge/graph_22833814-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-13.jsonl b/split_edge/graph_22833814-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-14.jsonl b/split_edge/graph_22833814-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-15.jsonl b/split_edge/graph_22833814-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-2.jsonl b/split_edge/graph_22833814-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-3.jsonl b/split_edge/graph_22833814-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-4.jsonl b/split_edge/graph_22833814-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-5.jsonl b/split_edge/graph_22833814-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-6.jsonl b/split_edge/graph_22833814-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-7.jsonl b/split_edge/graph_22833814-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_22833814-8.jsonl b/split_edge/graph_22833814-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-0.jsonl b/split_edge/graph_2294141-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-10.jsonl b/split_edge/graph_2294141-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-11.jsonl b/split_edge/graph_2294141-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-3.jsonl b/split_edge/graph_2294141-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-4.jsonl b/split_edge/graph_2294141-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-6.jsonl b/split_edge/graph_2294141-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-7.jsonl b/split_edge/graph_2294141-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-8.jsonl b/split_edge/graph_2294141-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2294141-9.jsonl b/split_edge/graph_2294141-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-1.jsonl b/split_edge/graph_2338214-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-11.jsonl b/split_edge/graph_2338214-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-12.jsonl b/split_edge/graph_2338214-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-13.jsonl b/split_edge/graph_2338214-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-14.jsonl b/split_edge/graph_2338214-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-16.jsonl b/split_edge/graph_2338214-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-17.jsonl b/split_edge/graph_2338214-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-18.jsonl b/split_edge/graph_2338214-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-19.jsonl b/split_edge/graph_2338214-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-20.jsonl b/split_edge/graph_2338214-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-21.jsonl b/split_edge/graph_2338214-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-22.jsonl b/split_edge/graph_2338214-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-24.jsonl b/split_edge/graph_2338214-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-25.jsonl b/split_edge/graph_2338214-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-26.jsonl b/split_edge/graph_2338214-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-27.jsonl b/split_edge/graph_2338214-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-34.jsonl b/split_edge/graph_2338214-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-35.jsonl b/split_edge/graph_2338214-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-36.jsonl b/split_edge/graph_2338214-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-37.jsonl b/split_edge/graph_2338214-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-42.jsonl b/split_edge/graph_2338214-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-43.jsonl b/split_edge/graph_2338214-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-45.jsonl b/split_edge/graph_2338214-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-51.jsonl b/split_edge/graph_2338214-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-53.jsonl b/split_edge/graph_2338214-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-67.jsonl b/split_edge/graph_2338214-67.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2338214-9.jsonl b/split_edge/graph_2338214-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23470432-0.jsonl b/split_edge/graph_23470432-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23470432-14.jsonl b/split_edge/graph_23470432-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23470432-15.jsonl b/split_edge/graph_23470432-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23470432-17.jsonl b/split_edge/graph_23470432-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-0.jsonl b/split_edge/graph_23565906-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-1.jsonl b/split_edge/graph_23565906-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-10.jsonl b/split_edge/graph_23565906-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-11.jsonl b/split_edge/graph_23565906-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-12.jsonl b/split_edge/graph_23565906-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-13.jsonl b/split_edge/graph_23565906-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-2.jsonl b/split_edge/graph_23565906-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-4.jsonl b/split_edge/graph_23565906-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-5.jsonl b/split_edge/graph_23565906-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-6.jsonl b/split_edge/graph_23565906-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_23565906-7.jsonl b/split_edge/graph_23565906-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-0.jsonl b/split_edge/graph_2373140-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-10.jsonl b/split_edge/graph_2373140-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-11.jsonl b/split_edge/graph_2373140-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-12.jsonl b/split_edge/graph_2373140-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-13.jsonl b/split_edge/graph_2373140-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-15.jsonl b/split_edge/graph_2373140-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-16.jsonl b/split_edge/graph_2373140-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-18.jsonl b/split_edge/graph_2373140-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-19.jsonl b/split_edge/graph_2373140-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-20.jsonl b/split_edge/graph_2373140-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-21.jsonl b/split_edge/graph_2373140-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-22.jsonl b/split_edge/graph_2373140-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-23.jsonl b/split_edge/graph_2373140-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-4.jsonl b/split_edge/graph_2373140-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-5.jsonl b/split_edge/graph_2373140-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-7.jsonl b/split_edge/graph_2373140-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-8.jsonl b/split_edge/graph_2373140-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2373140-9.jsonl b/split_edge/graph_2373140-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-0.jsonl b/split_edge/graph_24067042-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-1.jsonl b/split_edge/graph_24067042-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-11.jsonl b/split_edge/graph_24067042-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-13.jsonl b/split_edge/graph_24067042-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-14.jsonl b/split_edge/graph_24067042-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-15.jsonl b/split_edge/graph_24067042-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-16.jsonl b/split_edge/graph_24067042-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-17.jsonl b/split_edge/graph_24067042-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-18.jsonl b/split_edge/graph_24067042-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-2.jsonl b/split_edge/graph_24067042-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-20.jsonl b/split_edge/graph_24067042-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-21.jsonl b/split_edge/graph_24067042-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-22.jsonl b/split_edge/graph_24067042-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-23.jsonl b/split_edge/graph_24067042-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-24.jsonl b/split_edge/graph_24067042-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-25.jsonl b/split_edge/graph_24067042-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-3.jsonl b/split_edge/graph_24067042-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24067042-4.jsonl b/split_edge/graph_24067042-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-0.jsonl b/split_edge/graph_24110634-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-1.jsonl b/split_edge/graph_24110634-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-10.jsonl b/split_edge/graph_24110634-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-11.jsonl b/split_edge/graph_24110634-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-12.jsonl b/split_edge/graph_24110634-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-13.jsonl b/split_edge/graph_24110634-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-14.jsonl b/split_edge/graph_24110634-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-16.jsonl b/split_edge/graph_24110634-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-18.jsonl b/split_edge/graph_24110634-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-19.jsonl b/split_edge/graph_24110634-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-2.jsonl b/split_edge/graph_24110634-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-22.jsonl b/split_edge/graph_24110634-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-23.jsonl b/split_edge/graph_24110634-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-24.jsonl b/split_edge/graph_24110634-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-25.jsonl b/split_edge/graph_24110634-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-26.jsonl b/split_edge/graph_24110634-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-27.jsonl b/split_edge/graph_24110634-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-28.jsonl b/split_edge/graph_24110634-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-29.jsonl b/split_edge/graph_24110634-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-3.jsonl b/split_edge/graph_24110634-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-32.jsonl b/split_edge/graph_24110634-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-33.jsonl b/split_edge/graph_24110634-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-34.jsonl b/split_edge/graph_24110634-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-35.jsonl b/split_edge/graph_24110634-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-36.jsonl b/split_edge/graph_24110634-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-4.jsonl b/split_edge/graph_24110634-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-40.jsonl b/split_edge/graph_24110634-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-42.jsonl b/split_edge/graph_24110634-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-43.jsonl b/split_edge/graph_24110634-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-44.jsonl b/split_edge/graph_24110634-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-45.jsonl b/split_edge/graph_24110634-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-48.jsonl b/split_edge/graph_24110634-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-49.jsonl b/split_edge/graph_24110634-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-5.jsonl b/split_edge/graph_24110634-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-50.jsonl b/split_edge/graph_24110634-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-52.jsonl b/split_edge/graph_24110634-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-55.jsonl b/split_edge/graph_24110634-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-56.jsonl b/split_edge/graph_24110634-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-57.jsonl b/split_edge/graph_24110634-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-58.jsonl b/split_edge/graph_24110634-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-59.jsonl b/split_edge/graph_24110634-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-60.jsonl b/split_edge/graph_24110634-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-61.jsonl b/split_edge/graph_24110634-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-7.jsonl b/split_edge/graph_24110634-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-8.jsonl b/split_edge/graph_24110634-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24110634-9.jsonl b/split_edge/graph_24110634-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24142614-0.jsonl b/split_edge/graph_24142614-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24142614-2.jsonl b/split_edge/graph_24142614-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24142614-3.jsonl b/split_edge/graph_24142614-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24142614-4.jsonl b/split_edge/graph_24142614-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24142614-6.jsonl b/split_edge/graph_24142614-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24142614-7.jsonl b/split_edge/graph_24142614-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-0.jsonl b/split_edge/graph_24339-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-10.jsonl b/split_edge/graph_24339-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-11.jsonl b/split_edge/graph_24339-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-13.jsonl b/split_edge/graph_24339-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-14.jsonl b/split_edge/graph_24339-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-15.jsonl b/split_edge/graph_24339-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-16.jsonl b/split_edge/graph_24339-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-17.jsonl b/split_edge/graph_24339-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-18.jsonl b/split_edge/graph_24339-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-19.jsonl b/split_edge/graph_24339-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-2.jsonl b/split_edge/graph_24339-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-20.jsonl b/split_edge/graph_24339-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-21.jsonl b/split_edge/graph_24339-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-3.jsonl b/split_edge/graph_24339-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-4.jsonl b/split_edge/graph_24339-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-5.jsonl b/split_edge/graph_24339-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-7.jsonl b/split_edge/graph_24339-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-8.jsonl b/split_edge/graph_24339-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24339-9.jsonl b/split_edge/graph_24339-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-0.jsonl b/split_edge/graph_2443013-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-1.jsonl b/split_edge/graph_2443013-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-10.jsonl b/split_edge/graph_2443013-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-11.jsonl b/split_edge/graph_2443013-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-12.jsonl b/split_edge/graph_2443013-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-2.jsonl b/split_edge/graph_2443013-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-3.jsonl b/split_edge/graph_2443013-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-4.jsonl b/split_edge/graph_2443013-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-5.jsonl b/split_edge/graph_2443013-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-6.jsonl b/split_edge/graph_2443013-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-7.jsonl b/split_edge/graph_2443013-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-8.jsonl b/split_edge/graph_2443013-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2443013-9.jsonl b/split_edge/graph_2443013-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-0.jsonl b/split_edge/graph_2469117-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-11.jsonl b/split_edge/graph_2469117-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-12.jsonl b/split_edge/graph_2469117-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-13.jsonl b/split_edge/graph_2469117-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-14.jsonl b/split_edge/graph_2469117-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-15.jsonl b/split_edge/graph_2469117-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-16.jsonl b/split_edge/graph_2469117-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-19.jsonl b/split_edge/graph_2469117-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-2.jsonl b/split_edge/graph_2469117-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-20.jsonl b/split_edge/graph_2469117-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-21.jsonl b/split_edge/graph_2469117-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-22.jsonl b/split_edge/graph_2469117-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-24.jsonl b/split_edge/graph_2469117-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-25.jsonl b/split_edge/graph_2469117-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-26.jsonl b/split_edge/graph_2469117-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-27.jsonl b/split_edge/graph_2469117-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-28.jsonl b/split_edge/graph_2469117-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-29.jsonl b/split_edge/graph_2469117-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-3.jsonl b/split_edge/graph_2469117-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-30.jsonl b/split_edge/graph_2469117-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-31.jsonl b/split_edge/graph_2469117-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-32.jsonl b/split_edge/graph_2469117-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-33.jsonl b/split_edge/graph_2469117-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-35.jsonl b/split_edge/graph_2469117-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-36.jsonl b/split_edge/graph_2469117-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-39.jsonl b/split_edge/graph_2469117-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-6.jsonl b/split_edge/graph_2469117-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-7.jsonl b/split_edge/graph_2469117-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-8.jsonl b/split_edge/graph_2469117-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2469117-9.jsonl b/split_edge/graph_2469117-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-10.jsonl b/split_edge/graph_24936482-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-12.jsonl b/split_edge/graph_24936482-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-13.jsonl b/split_edge/graph_24936482-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-15.jsonl b/split_edge/graph_24936482-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-16.jsonl b/split_edge/graph_24936482-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-17.jsonl b/split_edge/graph_24936482-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-18.jsonl b/split_edge/graph_24936482-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-20.jsonl b/split_edge/graph_24936482-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-21.jsonl b/split_edge/graph_24936482-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-22.jsonl b/split_edge/graph_24936482-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-23.jsonl b/split_edge/graph_24936482-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-25.jsonl b/split_edge/graph_24936482-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-27.jsonl b/split_edge/graph_24936482-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-28.jsonl b/split_edge/graph_24936482-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-29.jsonl b/split_edge/graph_24936482-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-30.jsonl b/split_edge/graph_24936482-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-31.jsonl b/split_edge/graph_24936482-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-32.jsonl b/split_edge/graph_24936482-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-34.jsonl b/split_edge/graph_24936482-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-35.jsonl b/split_edge/graph_24936482-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-36.jsonl b/split_edge/graph_24936482-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-37.jsonl b/split_edge/graph_24936482-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-38.jsonl b/split_edge/graph_24936482-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-39.jsonl b/split_edge/graph_24936482-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-6.jsonl b/split_edge/graph_24936482-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-7.jsonl b/split_edge/graph_24936482-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_24936482-8.jsonl b/split_edge/graph_24936482-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-0.jsonl b/split_edge/graph_2507429-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-10.jsonl b/split_edge/graph_2507429-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-12.jsonl b/split_edge/graph_2507429-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-13.jsonl b/split_edge/graph_2507429-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-14.jsonl b/split_edge/graph_2507429-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-19.jsonl b/split_edge/graph_2507429-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-2.jsonl b/split_edge/graph_2507429-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-20.jsonl b/split_edge/graph_2507429-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-21.jsonl b/split_edge/graph_2507429-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-22.jsonl b/split_edge/graph_2507429-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-23.jsonl b/split_edge/graph_2507429-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-24.jsonl b/split_edge/graph_2507429-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-27.jsonl b/split_edge/graph_2507429-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-28.jsonl b/split_edge/graph_2507429-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-3.jsonl b/split_edge/graph_2507429-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-31.jsonl b/split_edge/graph_2507429-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-33.jsonl b/split_edge/graph_2507429-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-6.jsonl b/split_edge/graph_2507429-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-8.jsonl b/split_edge/graph_2507429-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2507429-9.jsonl b/split_edge/graph_2507429-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-0.jsonl b/split_edge/graph_2509135-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-10.jsonl b/split_edge/graph_2509135-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-11.jsonl b/split_edge/graph_2509135-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-12.jsonl b/split_edge/graph_2509135-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-13.jsonl b/split_edge/graph_2509135-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-14.jsonl b/split_edge/graph_2509135-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-15.jsonl b/split_edge/graph_2509135-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-16.jsonl b/split_edge/graph_2509135-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-17.jsonl b/split_edge/graph_2509135-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-18.jsonl b/split_edge/graph_2509135-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-19.jsonl b/split_edge/graph_2509135-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-2.jsonl b/split_edge/graph_2509135-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-20.jsonl b/split_edge/graph_2509135-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-21.jsonl b/split_edge/graph_2509135-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-22.jsonl b/split_edge/graph_2509135-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-23.jsonl b/split_edge/graph_2509135-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-24.jsonl b/split_edge/graph_2509135-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-25.jsonl b/split_edge/graph_2509135-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-3.jsonl b/split_edge/graph_2509135-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-4.jsonl b/split_edge/graph_2509135-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-6.jsonl b/split_edge/graph_2509135-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-7.jsonl b/split_edge/graph_2509135-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-8.jsonl b/split_edge/graph_2509135-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2509135-9.jsonl b/split_edge/graph_2509135-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-0.jsonl b/split_edge/graph_25119529-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-10.jsonl b/split_edge/graph_25119529-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-11.jsonl b/split_edge/graph_25119529-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-12.jsonl b/split_edge/graph_25119529-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-13.jsonl b/split_edge/graph_25119529-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-14.jsonl b/split_edge/graph_25119529-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-2.jsonl b/split_edge/graph_25119529-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-3.jsonl b/split_edge/graph_25119529-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-4.jsonl b/split_edge/graph_25119529-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-5.jsonl b/split_edge/graph_25119529-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-6.jsonl b/split_edge/graph_25119529-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-8.jsonl b/split_edge/graph_25119529-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25119529-9.jsonl b/split_edge/graph_25119529-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-10.jsonl b/split_edge/graph_2548500-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-15.jsonl b/split_edge/graph_2548500-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-16.jsonl b/split_edge/graph_2548500-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-18.jsonl b/split_edge/graph_2548500-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-2.jsonl b/split_edge/graph_2548500-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-3.jsonl b/split_edge/graph_2548500-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-4.jsonl b/split_edge/graph_2548500-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-5.jsonl b/split_edge/graph_2548500-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2548500-6.jsonl b/split_edge/graph_2548500-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2561969-0.jsonl b/split_edge/graph_2561969-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2561969-1.jsonl b/split_edge/graph_2561969-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2561969-3.jsonl b/split_edge/graph_2561969-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2561969-4.jsonl b/split_edge/graph_2561969-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2561969-5.jsonl b/split_edge/graph_2561969-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2561969-6.jsonl b/split_edge/graph_2561969-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2561969-7.jsonl b/split_edge/graph_2561969-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-0.jsonl b/split_edge/graph_25867152-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-2.jsonl b/split_edge/graph_25867152-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-3.jsonl b/split_edge/graph_25867152-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-4.jsonl b/split_edge/graph_25867152-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-6.jsonl b/split_edge/graph_25867152-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-7.jsonl b/split_edge/graph_25867152-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-8.jsonl b/split_edge/graph_25867152-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_25867152-9.jsonl b/split_edge/graph_25867152-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26005580-0.jsonl b/split_edge/graph_26005580-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-0.jsonl b/split_edge/graph_26073421-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-1.jsonl b/split_edge/graph_26073421-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-2.jsonl b/split_edge/graph_26073421-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-3.jsonl b/split_edge/graph_26073421-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-4.jsonl b/split_edge/graph_26073421-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-5.jsonl b/split_edge/graph_26073421-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-6.jsonl b/split_edge/graph_26073421-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26073421-7.jsonl b/split_edge/graph_26073421-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-10.jsonl b/split_edge/graph_2607758-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-12.jsonl b/split_edge/graph_2607758-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-13.jsonl b/split_edge/graph_2607758-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-14.jsonl b/split_edge/graph_2607758-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-15.jsonl b/split_edge/graph_2607758-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-16.jsonl b/split_edge/graph_2607758-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-20.jsonl b/split_edge/graph_2607758-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-21.jsonl b/split_edge/graph_2607758-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-22.jsonl b/split_edge/graph_2607758-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-23.jsonl b/split_edge/graph_2607758-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-7.jsonl b/split_edge/graph_2607758-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-8.jsonl b/split_edge/graph_2607758-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2607758-9.jsonl b/split_edge/graph_2607758-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-1.jsonl b/split_edge/graph_26179088-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-11.jsonl b/split_edge/graph_26179088-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-12.jsonl b/split_edge/graph_26179088-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-14.jsonl b/split_edge/graph_26179088-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-15.jsonl b/split_edge/graph_26179088-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-16.jsonl b/split_edge/graph_26179088-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-2.jsonl b/split_edge/graph_26179088-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-3.jsonl b/split_edge/graph_26179088-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-4.jsonl b/split_edge/graph_26179088-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-5.jsonl b/split_edge/graph_26179088-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-6.jsonl b/split_edge/graph_26179088-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-7.jsonl b/split_edge/graph_26179088-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-8.jsonl b/split_edge/graph_26179088-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26179088-9.jsonl b/split_edge/graph_26179088-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-0.jsonl b/split_edge/graph_26259297-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-1.jsonl b/split_edge/graph_26259297-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-11.jsonl b/split_edge/graph_26259297-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-12.jsonl b/split_edge/graph_26259297-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-13.jsonl b/split_edge/graph_26259297-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-14.jsonl b/split_edge/graph_26259297-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-15.jsonl b/split_edge/graph_26259297-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-16.jsonl b/split_edge/graph_26259297-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-17.jsonl b/split_edge/graph_26259297-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-21.jsonl b/split_edge/graph_26259297-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-24.jsonl b/split_edge/graph_26259297-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-26.jsonl b/split_edge/graph_26259297-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-29.jsonl b/split_edge/graph_26259297-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-5.jsonl b/split_edge/graph_26259297-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-8.jsonl b/split_edge/graph_26259297-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26259297-9.jsonl b/split_edge/graph_26259297-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-1.jsonl b/split_edge/graph_26314206-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-11.jsonl b/split_edge/graph_26314206-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-12.jsonl b/split_edge/graph_26314206-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-13.jsonl b/split_edge/graph_26314206-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-15.jsonl b/split_edge/graph_26314206-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-16.jsonl b/split_edge/graph_26314206-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-17.jsonl b/split_edge/graph_26314206-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-18.jsonl b/split_edge/graph_26314206-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-19.jsonl b/split_edge/graph_26314206-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-20.jsonl b/split_edge/graph_26314206-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-21.jsonl b/split_edge/graph_26314206-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-22.jsonl b/split_edge/graph_26314206-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-23.jsonl b/split_edge/graph_26314206-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-24.jsonl b/split_edge/graph_26314206-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-25.jsonl b/split_edge/graph_26314206-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-26.jsonl b/split_edge/graph_26314206-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-27.jsonl b/split_edge/graph_26314206-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-28.jsonl b/split_edge/graph_26314206-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-30.jsonl b/split_edge/graph_26314206-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-31.jsonl b/split_edge/graph_26314206-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-32.jsonl b/split_edge/graph_26314206-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-33.jsonl b/split_edge/graph_26314206-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-34.jsonl b/split_edge/graph_26314206-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-35.jsonl b/split_edge/graph_26314206-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-36.jsonl b/split_edge/graph_26314206-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-37.jsonl b/split_edge/graph_26314206-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-38.jsonl b/split_edge/graph_26314206-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-39.jsonl b/split_edge/graph_26314206-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-4.jsonl b/split_edge/graph_26314206-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-42.jsonl b/split_edge/graph_26314206-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-44.jsonl b/split_edge/graph_26314206-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-45.jsonl b/split_edge/graph_26314206-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-46.jsonl b/split_edge/graph_26314206-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26314206-5.jsonl b/split_edge/graph_26314206-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-0.jsonl b/split_edge/graph_2635807-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-12.jsonl b/split_edge/graph_2635807-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-16.jsonl b/split_edge/graph_2635807-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-18.jsonl b/split_edge/graph_2635807-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-19.jsonl b/split_edge/graph_2635807-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-2.jsonl b/split_edge/graph_2635807-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-20.jsonl b/split_edge/graph_2635807-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-22.jsonl b/split_edge/graph_2635807-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-4.jsonl b/split_edge/graph_2635807-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2635807-6.jsonl b/split_edge/graph_2635807-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-0.jsonl b/split_edge/graph_2664140-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-11.jsonl b/split_edge/graph_2664140-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-13.jsonl b/split_edge/graph_2664140-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-15.jsonl b/split_edge/graph_2664140-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-18.jsonl b/split_edge/graph_2664140-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-19.jsonl b/split_edge/graph_2664140-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-2.jsonl b/split_edge/graph_2664140-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-21.jsonl b/split_edge/graph_2664140-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-22.jsonl b/split_edge/graph_2664140-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-26.jsonl b/split_edge/graph_2664140-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-27.jsonl b/split_edge/graph_2664140-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-28.jsonl b/split_edge/graph_2664140-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-32.jsonl b/split_edge/graph_2664140-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-4.jsonl b/split_edge/graph_2664140-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-5.jsonl b/split_edge/graph_2664140-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-6.jsonl b/split_edge/graph_2664140-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-7.jsonl b/split_edge/graph_2664140-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-8.jsonl b/split_edge/graph_2664140-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2664140-9.jsonl b/split_edge/graph_2664140-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_266462-1.jsonl b/split_edge/graph_266462-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_266462-2.jsonl b/split_edge/graph_266462-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_266462-4.jsonl b/split_edge/graph_266462-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_266462-5.jsonl b/split_edge/graph_266462-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26717263-1.jsonl b/split_edge/graph_26717263-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26717263-11.jsonl b/split_edge/graph_26717263-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-0.jsonl b/split_edge/graph_26874889-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-10.jsonl b/split_edge/graph_26874889-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-11.jsonl b/split_edge/graph_26874889-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-12.jsonl b/split_edge/graph_26874889-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-13.jsonl b/split_edge/graph_26874889-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-14.jsonl b/split_edge/graph_26874889-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-2.jsonl b/split_edge/graph_26874889-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-3.jsonl b/split_edge/graph_26874889-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-4.jsonl b/split_edge/graph_26874889-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-5.jsonl b/split_edge/graph_26874889-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-7.jsonl b/split_edge/graph_26874889-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-8.jsonl b/split_edge/graph_26874889-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_26874889-9.jsonl b/split_edge/graph_26874889-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27036850-0.jsonl b/split_edge/graph_27036850-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2703920-2.jsonl b/split_edge/graph_2703920-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2703920-4.jsonl b/split_edge/graph_2703920-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2703920-5.jsonl b/split_edge/graph_2703920-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2703920-6.jsonl b/split_edge/graph_2703920-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2703920-7.jsonl b/split_edge/graph_2703920-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2703920-8.jsonl b/split_edge/graph_2703920-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-0.jsonl b/split_edge/graph_27113594-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-10.jsonl b/split_edge/graph_27113594-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-11.jsonl b/split_edge/graph_27113594-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-12.jsonl b/split_edge/graph_27113594-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-13.jsonl b/split_edge/graph_27113594-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-14.jsonl b/split_edge/graph_27113594-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-16.jsonl b/split_edge/graph_27113594-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-17.jsonl b/split_edge/graph_27113594-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-18.jsonl b/split_edge/graph_27113594-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-2.jsonl b/split_edge/graph_27113594-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-3.jsonl b/split_edge/graph_27113594-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-4.jsonl b/split_edge/graph_27113594-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-6.jsonl b/split_edge/graph_27113594-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-8.jsonl b/split_edge/graph_27113594-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27113594-9.jsonl b/split_edge/graph_27113594-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-0.jsonl b/split_edge/graph_2713956-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-12.jsonl b/split_edge/graph_2713956-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-14.jsonl b/split_edge/graph_2713956-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-15.jsonl b/split_edge/graph_2713956-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-16.jsonl b/split_edge/graph_2713956-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-17.jsonl b/split_edge/graph_2713956-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-19.jsonl b/split_edge/graph_2713956-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-21.jsonl b/split_edge/graph_2713956-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-22.jsonl b/split_edge/graph_2713956-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-23.jsonl b/split_edge/graph_2713956-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-24.jsonl b/split_edge/graph_2713956-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-25.jsonl b/split_edge/graph_2713956-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-26.jsonl b/split_edge/graph_2713956-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-27.jsonl b/split_edge/graph_2713956-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-3.jsonl b/split_edge/graph_2713956-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-31.jsonl b/split_edge/graph_2713956-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-4.jsonl b/split_edge/graph_2713956-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-6.jsonl b/split_edge/graph_2713956-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2713956-7.jsonl b/split_edge/graph_2713956-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-0.jsonl b/split_edge/graph_2714078-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-10.jsonl b/split_edge/graph_2714078-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-11.jsonl b/split_edge/graph_2714078-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-13.jsonl b/split_edge/graph_2714078-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-14.jsonl b/split_edge/graph_2714078-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-16.jsonl b/split_edge/graph_2714078-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-2.jsonl b/split_edge/graph_2714078-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-4.jsonl b/split_edge/graph_2714078-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-5.jsonl b/split_edge/graph_2714078-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-6.jsonl b/split_edge/graph_2714078-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-8.jsonl b/split_edge/graph_2714078-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2714078-9.jsonl b/split_edge/graph_2714078-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27292487-12.jsonl b/split_edge/graph_27292487-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-0.jsonl b/split_edge/graph_2762484-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-1.jsonl b/split_edge/graph_2762484-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-10.jsonl b/split_edge/graph_2762484-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-11.jsonl b/split_edge/graph_2762484-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-13.jsonl b/split_edge/graph_2762484-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-17.jsonl b/split_edge/graph_2762484-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-18.jsonl b/split_edge/graph_2762484-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-21.jsonl b/split_edge/graph_2762484-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-23.jsonl b/split_edge/graph_2762484-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-24.jsonl b/split_edge/graph_2762484-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-26.jsonl b/split_edge/graph_2762484-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-27.jsonl b/split_edge/graph_2762484-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-28.jsonl b/split_edge/graph_2762484-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-29.jsonl b/split_edge/graph_2762484-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-3.jsonl b/split_edge/graph_2762484-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-31.jsonl b/split_edge/graph_2762484-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-32.jsonl b/split_edge/graph_2762484-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-4.jsonl b/split_edge/graph_2762484-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2762484-5.jsonl b/split_edge/graph_2762484-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-0.jsonl b/split_edge/graph_27680352-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-11.jsonl b/split_edge/graph_27680352-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-12.jsonl b/split_edge/graph_27680352-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-13.jsonl b/split_edge/graph_27680352-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-14.jsonl b/split_edge/graph_27680352-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-15.jsonl b/split_edge/graph_27680352-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-2.jsonl b/split_edge/graph_27680352-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-20.jsonl b/split_edge/graph_27680352-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-21.jsonl b/split_edge/graph_27680352-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-24.jsonl b/split_edge/graph_27680352-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-25.jsonl b/split_edge/graph_27680352-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-26.jsonl b/split_edge/graph_27680352-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-27.jsonl b/split_edge/graph_27680352-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-3.jsonl b/split_edge/graph_27680352-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-30.jsonl b/split_edge/graph_27680352-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-31.jsonl b/split_edge/graph_27680352-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-32.jsonl b/split_edge/graph_27680352-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-33.jsonl b/split_edge/graph_27680352-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-34.jsonl b/split_edge/graph_27680352-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-35.jsonl b/split_edge/graph_27680352-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-36.jsonl b/split_edge/graph_27680352-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-38.jsonl b/split_edge/graph_27680352-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-39.jsonl b/split_edge/graph_27680352-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-40.jsonl b/split_edge/graph_27680352-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-41.jsonl b/split_edge/graph_27680352-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-42.jsonl b/split_edge/graph_27680352-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-44.jsonl b/split_edge/graph_27680352-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-45.jsonl b/split_edge/graph_27680352-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-47.jsonl b/split_edge/graph_27680352-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-48.jsonl b/split_edge/graph_27680352-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-49.jsonl b/split_edge/graph_27680352-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-50.jsonl b/split_edge/graph_27680352-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-51.jsonl b/split_edge/graph_27680352-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_27680352-8.jsonl b/split_edge/graph_27680352-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2794252-0.jsonl b/split_edge/graph_2794252-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2794252-1.jsonl b/split_edge/graph_2794252-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2794252-3.jsonl b/split_edge/graph_2794252-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2794252-4.jsonl b/split_edge/graph_2794252-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2794252-5.jsonl b/split_edge/graph_2794252-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2802048-3.jsonl b/split_edge/graph_2802048-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2802048-4.jsonl b/split_edge/graph_2802048-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-0.jsonl b/split_edge/graph_2814871-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-11.jsonl b/split_edge/graph_2814871-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-12.jsonl b/split_edge/graph_2814871-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-13.jsonl b/split_edge/graph_2814871-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-14.jsonl b/split_edge/graph_2814871-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-15.jsonl b/split_edge/graph_2814871-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-16.jsonl b/split_edge/graph_2814871-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-17.jsonl b/split_edge/graph_2814871-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-18.jsonl b/split_edge/graph_2814871-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-19.jsonl b/split_edge/graph_2814871-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-2.jsonl b/split_edge/graph_2814871-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-20.jsonl b/split_edge/graph_2814871-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-22.jsonl b/split_edge/graph_2814871-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-23.jsonl b/split_edge/graph_2814871-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-25.jsonl b/split_edge/graph_2814871-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-26.jsonl b/split_edge/graph_2814871-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-27.jsonl b/split_edge/graph_2814871-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-28.jsonl b/split_edge/graph_2814871-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-29.jsonl b/split_edge/graph_2814871-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-3.jsonl b/split_edge/graph_2814871-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-5.jsonl b/split_edge/graph_2814871-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-7.jsonl b/split_edge/graph_2814871-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-8.jsonl b/split_edge/graph_2814871-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2814871-9.jsonl b/split_edge/graph_2814871-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2828886-0.jsonl b/split_edge/graph_2828886-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2828886-1.jsonl b/split_edge/graph_2828886-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2828886-3.jsonl b/split_edge/graph_2828886-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2828886-4.jsonl b/split_edge/graph_2828886-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2828886-5.jsonl b/split_edge/graph_2828886-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2828886-8.jsonl b/split_edge/graph_2828886-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28368285-20.jsonl b/split_edge/graph_28368285-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-0.jsonl b/split_edge/graph_28465771-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-10.jsonl b/split_edge/graph_28465771-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-12.jsonl b/split_edge/graph_28465771-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-13.jsonl b/split_edge/graph_28465771-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-15.jsonl b/split_edge/graph_28465771-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-17.jsonl b/split_edge/graph_28465771-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-2.jsonl b/split_edge/graph_28465771-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-3.jsonl b/split_edge/graph_28465771-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-4.jsonl b/split_edge/graph_28465771-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-5.jsonl b/split_edge/graph_28465771-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28465771-7.jsonl b/split_edge/graph_28465771-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-0.jsonl b/split_edge/graph_28476435-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-1.jsonl b/split_edge/graph_28476435-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-11.jsonl b/split_edge/graph_28476435-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-14.jsonl b/split_edge/graph_28476435-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-15.jsonl b/split_edge/graph_28476435-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-16.jsonl b/split_edge/graph_28476435-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-17.jsonl b/split_edge/graph_28476435-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-2.jsonl b/split_edge/graph_28476435-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-5.jsonl b/split_edge/graph_28476435-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-7.jsonl b/split_edge/graph_28476435-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28476435-9.jsonl b/split_edge/graph_28476435-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-15.jsonl b/split_edge/graph_28518402-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-17.jsonl b/split_edge/graph_28518402-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-18.jsonl b/split_edge/graph_28518402-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-20.jsonl b/split_edge/graph_28518402-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-21.jsonl b/split_edge/graph_28518402-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-22.jsonl b/split_edge/graph_28518402-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-25.jsonl b/split_edge/graph_28518402-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-26.jsonl b/split_edge/graph_28518402-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-27.jsonl b/split_edge/graph_28518402-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28518402-4.jsonl b/split_edge/graph_28518402-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-0.jsonl b/split_edge/graph_2854761-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-1.jsonl b/split_edge/graph_2854761-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-11.jsonl b/split_edge/graph_2854761-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-12.jsonl b/split_edge/graph_2854761-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-13.jsonl b/split_edge/graph_2854761-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-14.jsonl b/split_edge/graph_2854761-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-16.jsonl b/split_edge/graph_2854761-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-17.jsonl b/split_edge/graph_2854761-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-2.jsonl b/split_edge/graph_2854761-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-5.jsonl b/split_edge/graph_2854761-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2854761-8.jsonl b/split_edge/graph_2854761-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-0.jsonl b/split_edge/graph_28670512-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-1.jsonl b/split_edge/graph_28670512-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-10.jsonl b/split_edge/graph_28670512-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-13.jsonl b/split_edge/graph_28670512-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-15.jsonl b/split_edge/graph_28670512-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-18.jsonl b/split_edge/graph_28670512-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-19.jsonl b/split_edge/graph_28670512-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-21.jsonl b/split_edge/graph_28670512-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-22.jsonl b/split_edge/graph_28670512-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-23.jsonl b/split_edge/graph_28670512-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-8.jsonl b/split_edge/graph_28670512-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28670512-9.jsonl b/split_edge/graph_28670512-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2874621-10.jsonl b/split_edge/graph_2874621-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2874621-7.jsonl b/split_edge/graph_2874621-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2874621-8.jsonl b/split_edge/graph_2874621-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2874621-9.jsonl b/split_edge/graph_2874621-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28763840-0.jsonl b/split_edge/graph_28763840-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28763840-1.jsonl b/split_edge/graph_28763840-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28763840-2.jsonl b/split_edge/graph_28763840-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_28763840-3.jsonl b/split_edge/graph_28763840-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-0.jsonl b/split_edge/graph_2895124-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-13.jsonl b/split_edge/graph_2895124-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-2.jsonl b/split_edge/graph_2895124-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-21.jsonl b/split_edge/graph_2895124-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-25.jsonl b/split_edge/graph_2895124-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-26.jsonl b/split_edge/graph_2895124-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-27.jsonl b/split_edge/graph_2895124-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-28.jsonl b/split_edge/graph_2895124-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-29.jsonl b/split_edge/graph_2895124-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-3.jsonl b/split_edge/graph_2895124-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-4.jsonl b/split_edge/graph_2895124-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-5.jsonl b/split_edge/graph_2895124-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2895124-6.jsonl b/split_edge/graph_2895124-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-0.jsonl b/split_edge/graph_2906773-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-11.jsonl b/split_edge/graph_2906773-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-12.jsonl b/split_edge/graph_2906773-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-14.jsonl b/split_edge/graph_2906773-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-15.jsonl b/split_edge/graph_2906773-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-16.jsonl b/split_edge/graph_2906773-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-17.jsonl b/split_edge/graph_2906773-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-18.jsonl b/split_edge/graph_2906773-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-2.jsonl b/split_edge/graph_2906773-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-3.jsonl b/split_edge/graph_2906773-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-5.jsonl b/split_edge/graph_2906773-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-6.jsonl b/split_edge/graph_2906773-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-7.jsonl b/split_edge/graph_2906773-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-8.jsonl b/split_edge/graph_2906773-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2906773-9.jsonl b/split_edge/graph_2906773-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-0.jsonl b/split_edge/graph_2937482-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-1.jsonl b/split_edge/graph_2937482-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-11.jsonl b/split_edge/graph_2937482-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-12.jsonl b/split_edge/graph_2937482-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-13.jsonl b/split_edge/graph_2937482-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-14.jsonl b/split_edge/graph_2937482-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-2.jsonl b/split_edge/graph_2937482-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-3.jsonl b/split_edge/graph_2937482-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-4.jsonl b/split_edge/graph_2937482-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-6.jsonl b/split_edge/graph_2937482-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-7.jsonl b/split_edge/graph_2937482-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2937482-9.jsonl b/split_edge/graph_2937482-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-0.jsonl b/split_edge/graph_29398427-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-10.jsonl b/split_edge/graph_29398427-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-13.jsonl b/split_edge/graph_29398427-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-14.jsonl b/split_edge/graph_29398427-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-15.jsonl b/split_edge/graph_29398427-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-17.jsonl b/split_edge/graph_29398427-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-18.jsonl b/split_edge/graph_29398427-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-19.jsonl b/split_edge/graph_29398427-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-2.jsonl b/split_edge/graph_29398427-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-21.jsonl b/split_edge/graph_29398427-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-22.jsonl b/split_edge/graph_29398427-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-3.jsonl b/split_edge/graph_29398427-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-4.jsonl b/split_edge/graph_29398427-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29398427-8.jsonl b/split_edge/graph_29398427-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-0.jsonl b/split_edge/graph_2951180-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-1.jsonl b/split_edge/graph_2951180-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-2.jsonl b/split_edge/graph_2951180-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-3.jsonl b/split_edge/graph_2951180-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-4.jsonl b/split_edge/graph_2951180-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-5.jsonl b/split_edge/graph_2951180-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-6.jsonl b/split_edge/graph_2951180-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_2951180-8.jsonl b/split_edge/graph_2951180-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-0.jsonl b/split_edge/graph_29654897-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-10.jsonl b/split_edge/graph_29654897-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-2.jsonl b/split_edge/graph_29654897-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-3.jsonl b/split_edge/graph_29654897-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-5.jsonl b/split_edge/graph_29654897-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-6.jsonl b/split_edge/graph_29654897-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-7.jsonl b/split_edge/graph_29654897-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29654897-9.jsonl b/split_edge/graph_29654897-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29689714-1.jsonl b/split_edge/graph_29689714-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29689714-2.jsonl b/split_edge/graph_29689714-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29689714-3.jsonl b/split_edge/graph_29689714-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_29689714-4.jsonl b/split_edge/graph_29689714-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-0.jsonl b/split_edge/graph_297464-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-10.jsonl b/split_edge/graph_297464-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-11.jsonl b/split_edge/graph_297464-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-12.jsonl b/split_edge/graph_297464-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-15.jsonl b/split_edge/graph_297464-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-16.jsonl b/split_edge/graph_297464-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-17.jsonl b/split_edge/graph_297464-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-18.jsonl b/split_edge/graph_297464-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-19.jsonl b/split_edge/graph_297464-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-21.jsonl b/split_edge/graph_297464-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-22.jsonl b/split_edge/graph_297464-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-23.jsonl b/split_edge/graph_297464-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-24.jsonl b/split_edge/graph_297464-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-25.jsonl b/split_edge/graph_297464-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-26.jsonl b/split_edge/graph_297464-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-28.jsonl b/split_edge/graph_297464-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-29.jsonl b/split_edge/graph_297464-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-30.jsonl b/split_edge/graph_297464-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-31.jsonl b/split_edge/graph_297464-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-5.jsonl b/split_edge/graph_297464-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-6.jsonl b/split_edge/graph_297464-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-7.jsonl b/split_edge/graph_297464-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-8.jsonl b/split_edge/graph_297464-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_297464-9.jsonl b/split_edge/graph_297464-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-0.jsonl b/split_edge/graph_30209571-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-1.jsonl b/split_edge/graph_30209571-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-10.jsonl b/split_edge/graph_30209571-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-11.jsonl b/split_edge/graph_30209571-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-13.jsonl b/split_edge/graph_30209571-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-14.jsonl b/split_edge/graph_30209571-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-4.jsonl b/split_edge/graph_30209571-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-5.jsonl b/split_edge/graph_30209571-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-6.jsonl b/split_edge/graph_30209571-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-7.jsonl b/split_edge/graph_30209571-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-8.jsonl b/split_edge/graph_30209571-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30209571-9.jsonl b/split_edge/graph_30209571-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30270627-0.jsonl b/split_edge/graph_30270627-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30270627-1.jsonl b/split_edge/graph_30270627-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30270627-2.jsonl b/split_edge/graph_30270627-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30270627-3.jsonl b/split_edge/graph_30270627-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30270627-4.jsonl b/split_edge/graph_30270627-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-0.jsonl b/split_edge/graph_3042864-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-12.jsonl b/split_edge/graph_3042864-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-13.jsonl b/split_edge/graph_3042864-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-14.jsonl b/split_edge/graph_3042864-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-15.jsonl b/split_edge/graph_3042864-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-17.jsonl b/split_edge/graph_3042864-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-2.jsonl b/split_edge/graph_3042864-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-20.jsonl b/split_edge/graph_3042864-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-22.jsonl b/split_edge/graph_3042864-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-24.jsonl b/split_edge/graph_3042864-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-25.jsonl b/split_edge/graph_3042864-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-26.jsonl b/split_edge/graph_3042864-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-27.jsonl b/split_edge/graph_3042864-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-29.jsonl b/split_edge/graph_3042864-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-3.jsonl b/split_edge/graph_3042864-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3042864-9.jsonl b/split_edge/graph_3042864-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-1.jsonl b/split_edge/graph_30575518-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-10.jsonl b/split_edge/graph_30575518-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-11.jsonl b/split_edge/graph_30575518-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-12.jsonl b/split_edge/graph_30575518-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-13.jsonl b/split_edge/graph_30575518-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-14.jsonl b/split_edge/graph_30575518-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-16.jsonl b/split_edge/graph_30575518-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-18.jsonl b/split_edge/graph_30575518-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-19.jsonl b/split_edge/graph_30575518-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-20.jsonl b/split_edge/graph_30575518-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-21.jsonl b/split_edge/graph_30575518-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-23.jsonl b/split_edge/graph_30575518-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-24.jsonl b/split_edge/graph_30575518-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-25.jsonl b/split_edge/graph_30575518-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-26.jsonl b/split_edge/graph_30575518-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-27.jsonl b/split_edge/graph_30575518-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-28.jsonl b/split_edge/graph_30575518-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-29.jsonl b/split_edge/graph_30575518-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-3.jsonl b/split_edge/graph_30575518-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-30.jsonl b/split_edge/graph_30575518-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-31.jsonl b/split_edge/graph_30575518-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-33.jsonl b/split_edge/graph_30575518-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-34.jsonl b/split_edge/graph_30575518-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-35.jsonl b/split_edge/graph_30575518-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-37.jsonl b/split_edge/graph_30575518-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-38.jsonl b/split_edge/graph_30575518-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-39.jsonl b/split_edge/graph_30575518-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-4.jsonl b/split_edge/graph_30575518-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-40.jsonl b/split_edge/graph_30575518-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-41.jsonl b/split_edge/graph_30575518-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-42.jsonl b/split_edge/graph_30575518-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-43.jsonl b/split_edge/graph_30575518-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-44.jsonl b/split_edge/graph_30575518-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-45.jsonl b/split_edge/graph_30575518-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-46.jsonl b/split_edge/graph_30575518-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-47.jsonl b/split_edge/graph_30575518-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-5.jsonl b/split_edge/graph_30575518-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-6.jsonl b/split_edge/graph_30575518-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-7.jsonl b/split_edge/graph_30575518-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30575518-8.jsonl b/split_edge/graph_30575518-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-0.jsonl b/split_edge/graph_30948085-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-11.jsonl b/split_edge/graph_30948085-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-12.jsonl b/split_edge/graph_30948085-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-14.jsonl b/split_edge/graph_30948085-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-15.jsonl b/split_edge/graph_30948085-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-16.jsonl b/split_edge/graph_30948085-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-3.jsonl b/split_edge/graph_30948085-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-4.jsonl b/split_edge/graph_30948085-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-5.jsonl b/split_edge/graph_30948085-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-6.jsonl b/split_edge/graph_30948085-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-7.jsonl b/split_edge/graph_30948085-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30948085-8.jsonl b/split_edge/graph_30948085-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30952575-0.jsonl b/split_edge/graph_30952575-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30952575-1.jsonl b/split_edge/graph_30952575-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30952575-3.jsonl b/split_edge/graph_30952575-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30952575-4.jsonl b/split_edge/graph_30952575-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30952575-5.jsonl b/split_edge/graph_30952575-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30952575-6.jsonl b/split_edge/graph_30952575-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_30952575-7.jsonl b/split_edge/graph_30952575-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-1.jsonl b/split_edge/graph_31044354-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-10.jsonl b/split_edge/graph_31044354-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-11.jsonl b/split_edge/graph_31044354-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-12.jsonl b/split_edge/graph_31044354-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-13.jsonl b/split_edge/graph_31044354-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-14.jsonl b/split_edge/graph_31044354-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-19.jsonl b/split_edge/graph_31044354-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-2.jsonl b/split_edge/graph_31044354-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-20.jsonl b/split_edge/graph_31044354-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-3.jsonl b/split_edge/graph_31044354-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-4.jsonl b/split_edge/graph_31044354-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-5.jsonl b/split_edge/graph_31044354-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-6.jsonl b/split_edge/graph_31044354-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31044354-7.jsonl b/split_edge/graph_31044354-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-0.jsonl b/split_edge/graph_3105159-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-10.jsonl b/split_edge/graph_3105159-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-11.jsonl b/split_edge/graph_3105159-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-12.jsonl b/split_edge/graph_3105159-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-13.jsonl b/split_edge/graph_3105159-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-15.jsonl b/split_edge/graph_3105159-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-16.jsonl b/split_edge/graph_3105159-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-17.jsonl b/split_edge/graph_3105159-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-18.jsonl b/split_edge/graph_3105159-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-19.jsonl b/split_edge/graph_3105159-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-2.jsonl b/split_edge/graph_3105159-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-20.jsonl b/split_edge/graph_3105159-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-22.jsonl b/split_edge/graph_3105159-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-23.jsonl b/split_edge/graph_3105159-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-24.jsonl b/split_edge/graph_3105159-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-25.jsonl b/split_edge/graph_3105159-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-26.jsonl b/split_edge/graph_3105159-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-27.jsonl b/split_edge/graph_3105159-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-4.jsonl b/split_edge/graph_3105159-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-5.jsonl b/split_edge/graph_3105159-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-7.jsonl b/split_edge/graph_3105159-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-8.jsonl b/split_edge/graph_3105159-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3105159-9.jsonl b/split_edge/graph_3105159-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31954778-10.jsonl b/split_edge/graph_31954778-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31954778-12.jsonl b/split_edge/graph_31954778-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31954778-13.jsonl b/split_edge/graph_31954778-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31954778-2.jsonl b/split_edge/graph_31954778-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31954778-21.jsonl b/split_edge/graph_31954778-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31954778-8.jsonl b/split_edge/graph_31954778-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_31954778-9.jsonl b/split_edge/graph_31954778-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-0.jsonl b/split_edge/graph_3200945-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-1.jsonl b/split_edge/graph_3200945-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-10.jsonl b/split_edge/graph_3200945-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-12.jsonl b/split_edge/graph_3200945-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-13.jsonl b/split_edge/graph_3200945-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-14.jsonl b/split_edge/graph_3200945-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-15.jsonl b/split_edge/graph_3200945-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-16.jsonl b/split_edge/graph_3200945-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-2.jsonl b/split_edge/graph_3200945-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-4.jsonl b/split_edge/graph_3200945-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-5.jsonl b/split_edge/graph_3200945-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-6.jsonl b/split_edge/graph_3200945-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-7.jsonl b/split_edge/graph_3200945-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-8.jsonl b/split_edge/graph_3200945-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3200945-9.jsonl b/split_edge/graph_3200945-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32430104-2.jsonl b/split_edge/graph_32430104-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32430104-7.jsonl b/split_edge/graph_32430104-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32430104-8.jsonl b/split_edge/graph_32430104-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32430104-9.jsonl b/split_edge/graph_32430104-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3244604-0.jsonl b/split_edge/graph_3244604-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3244604-1.jsonl b/split_edge/graph_3244604-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3244604-2.jsonl b/split_edge/graph_3244604-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3244604-3.jsonl b/split_edge/graph_3244604-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3244604-4.jsonl b/split_edge/graph_3244604-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3244604-5.jsonl b/split_edge/graph_3244604-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3244604-6.jsonl b/split_edge/graph_3244604-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-0.jsonl b/split_edge/graph_325004-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-1.jsonl b/split_edge/graph_325004-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-2.jsonl b/split_edge/graph_325004-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-3.jsonl b/split_edge/graph_325004-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-4.jsonl b/split_edge/graph_325004-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-5.jsonl b/split_edge/graph_325004-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-6.jsonl b/split_edge/graph_325004-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-7.jsonl b/split_edge/graph_325004-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-8.jsonl b/split_edge/graph_325004-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_325004-9.jsonl b/split_edge/graph_325004-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-0.jsonl b/split_edge/graph_32526909-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-1.jsonl b/split_edge/graph_32526909-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-10.jsonl b/split_edge/graph_32526909-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-11.jsonl b/split_edge/graph_32526909-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-12.jsonl b/split_edge/graph_32526909-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-13.jsonl b/split_edge/graph_32526909-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-14.jsonl b/split_edge/graph_32526909-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-15.jsonl b/split_edge/graph_32526909-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-16.jsonl b/split_edge/graph_32526909-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-17.jsonl b/split_edge/graph_32526909-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-19.jsonl b/split_edge/graph_32526909-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-4.jsonl b/split_edge/graph_32526909-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32526909-9.jsonl b/split_edge/graph_32526909-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-0.jsonl b/split_edge/graph_3261435-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-1.jsonl b/split_edge/graph_3261435-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-2.jsonl b/split_edge/graph_3261435-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-3.jsonl b/split_edge/graph_3261435-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-5.jsonl b/split_edge/graph_3261435-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-6.jsonl b/split_edge/graph_3261435-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-7.jsonl b/split_edge/graph_3261435-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-8.jsonl b/split_edge/graph_3261435-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3261435-9.jsonl b/split_edge/graph_3261435-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3273576-0.jsonl b/split_edge/graph_3273576-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3273576-12.jsonl b/split_edge/graph_3273576-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3273576-13.jsonl b/split_edge/graph_3273576-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3273576-14.jsonl b/split_edge/graph_3273576-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3273576-6.jsonl b/split_edge/graph_3273576-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3273576-7.jsonl b/split_edge/graph_3273576-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3273576-8.jsonl b/split_edge/graph_3273576-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-0.jsonl b/split_edge/graph_3277310-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-1.jsonl b/split_edge/graph_3277310-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-10.jsonl b/split_edge/graph_3277310-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-11.jsonl b/split_edge/graph_3277310-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-13.jsonl b/split_edge/graph_3277310-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-14.jsonl b/split_edge/graph_3277310-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-15.jsonl b/split_edge/graph_3277310-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-16.jsonl b/split_edge/graph_3277310-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-17.jsonl b/split_edge/graph_3277310-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-18.jsonl b/split_edge/graph_3277310-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-4.jsonl b/split_edge/graph_3277310-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-5.jsonl b/split_edge/graph_3277310-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-6.jsonl b/split_edge/graph_3277310-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-8.jsonl b/split_edge/graph_3277310-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3277310-9.jsonl b/split_edge/graph_3277310-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32781188-0.jsonl b/split_edge/graph_32781188-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32781188-1.jsonl b/split_edge/graph_32781188-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32781188-3.jsonl b/split_edge/graph_32781188-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32781188-6.jsonl b/split_edge/graph_32781188-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32781188-7.jsonl b/split_edge/graph_32781188-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32781188-9.jsonl b/split_edge/graph_32781188-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32856349-0.jsonl b/split_edge/graph_32856349-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32856349-15.jsonl b/split_edge/graph_32856349-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32856349-16.jsonl b/split_edge/graph_32856349-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_32874109-4.jsonl b/split_edge/graph_32874109-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-1.jsonl b/split_edge/graph_3290545-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-10.jsonl b/split_edge/graph_3290545-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-13.jsonl b/split_edge/graph_3290545-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-17.jsonl b/split_edge/graph_3290545-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-18.jsonl b/split_edge/graph_3290545-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-26.jsonl b/split_edge/graph_3290545-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-29.jsonl b/split_edge/graph_3290545-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-30.jsonl b/split_edge/graph_3290545-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-36.jsonl b/split_edge/graph_3290545-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-40.jsonl b/split_edge/graph_3290545-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-41.jsonl b/split_edge/graph_3290545-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-42.jsonl b/split_edge/graph_3290545-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-43.jsonl b/split_edge/graph_3290545-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-45.jsonl b/split_edge/graph_3290545-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-46.jsonl b/split_edge/graph_3290545-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-47.jsonl b/split_edge/graph_3290545-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-48.jsonl b/split_edge/graph_3290545-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-49.jsonl b/split_edge/graph_3290545-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-51.jsonl b/split_edge/graph_3290545-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-52.jsonl b/split_edge/graph_3290545-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-54.jsonl b/split_edge/graph_3290545-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-57.jsonl b/split_edge/graph_3290545-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-58.jsonl b/split_edge/graph_3290545-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-59.jsonl b/split_edge/graph_3290545-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-6.jsonl b/split_edge/graph_3290545-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-61.jsonl b/split_edge/graph_3290545-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-68.jsonl b/split_edge/graph_3290545-68.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-70.jsonl b/split_edge/graph_3290545-70.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3290545-8.jsonl b/split_edge/graph_3290545-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3304959-0.jsonl b/split_edge/graph_3304959-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3304959-2.jsonl b/split_edge/graph_3304959-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3304959-3.jsonl b/split_edge/graph_3304959-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-0.jsonl b/split_edge/graph_33142914-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-1.jsonl b/split_edge/graph_33142914-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-10.jsonl b/split_edge/graph_33142914-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-2.jsonl b/split_edge/graph_33142914-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-3.jsonl b/split_edge/graph_33142914-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-7.jsonl b/split_edge/graph_33142914-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-8.jsonl b/split_edge/graph_33142914-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33142914-9.jsonl b/split_edge/graph_33142914-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-1.jsonl b/split_edge/graph_33208891-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-10.jsonl b/split_edge/graph_33208891-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-11.jsonl b/split_edge/graph_33208891-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-12.jsonl b/split_edge/graph_33208891-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-16.jsonl b/split_edge/graph_33208891-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-4.jsonl b/split_edge/graph_33208891-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-5.jsonl b/split_edge/graph_33208891-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-6.jsonl b/split_edge/graph_33208891-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-8.jsonl b/split_edge/graph_33208891-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33208891-9.jsonl b/split_edge/graph_33208891-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-1.jsonl b/split_edge/graph_33247252-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-11.jsonl b/split_edge/graph_33247252-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-12.jsonl b/split_edge/graph_33247252-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-14.jsonl b/split_edge/graph_33247252-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-15.jsonl b/split_edge/graph_33247252-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-16.jsonl b/split_edge/graph_33247252-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-19.jsonl b/split_edge/graph_33247252-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-20.jsonl b/split_edge/graph_33247252-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-22.jsonl b/split_edge/graph_33247252-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-23.jsonl b/split_edge/graph_33247252-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-26.jsonl b/split_edge/graph_33247252-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-27.jsonl b/split_edge/graph_33247252-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-28.jsonl b/split_edge/graph_33247252-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-29.jsonl b/split_edge/graph_33247252-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-3.jsonl b/split_edge/graph_33247252-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-30.jsonl b/split_edge/graph_33247252-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-32.jsonl b/split_edge/graph_33247252-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-4.jsonl b/split_edge/graph_33247252-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33247252-5.jsonl b/split_edge/graph_33247252-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-0.jsonl b/split_edge/graph_3345066-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-10.jsonl b/split_edge/graph_3345066-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-11.jsonl b/split_edge/graph_3345066-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-14.jsonl b/split_edge/graph_3345066-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-15.jsonl b/split_edge/graph_3345066-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-16.jsonl b/split_edge/graph_3345066-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-2.jsonl b/split_edge/graph_3345066-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-21.jsonl b/split_edge/graph_3345066-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-23.jsonl b/split_edge/graph_3345066-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-24.jsonl b/split_edge/graph_3345066-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-25.jsonl b/split_edge/graph_3345066-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-28.jsonl b/split_edge/graph_3345066-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-29.jsonl b/split_edge/graph_3345066-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-3.jsonl b/split_edge/graph_3345066-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-30.jsonl b/split_edge/graph_3345066-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-31.jsonl b/split_edge/graph_3345066-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-32.jsonl b/split_edge/graph_3345066-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-33.jsonl b/split_edge/graph_3345066-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-34.jsonl b/split_edge/graph_3345066-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-35.jsonl b/split_edge/graph_3345066-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-36.jsonl b/split_edge/graph_3345066-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-37.jsonl b/split_edge/graph_3345066-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-39.jsonl b/split_edge/graph_3345066-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-4.jsonl b/split_edge/graph_3345066-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-40.jsonl b/split_edge/graph_3345066-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-44.jsonl b/split_edge/graph_3345066-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-45.jsonl b/split_edge/graph_3345066-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-46.jsonl b/split_edge/graph_3345066-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-47.jsonl b/split_edge/graph_3345066-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-48.jsonl b/split_edge/graph_3345066-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-49.jsonl b/split_edge/graph_3345066-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-5.jsonl b/split_edge/graph_3345066-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-50.jsonl b/split_edge/graph_3345066-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-51.jsonl b/split_edge/graph_3345066-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-6.jsonl b/split_edge/graph_3345066-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3345066-7.jsonl b/split_edge/graph_3345066-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-0.jsonl b/split_edge/graph_33524607-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-11.jsonl b/split_edge/graph_33524607-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-12.jsonl b/split_edge/graph_33524607-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-13.jsonl b/split_edge/graph_33524607-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-14.jsonl b/split_edge/graph_33524607-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-2.jsonl b/split_edge/graph_33524607-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-4.jsonl b/split_edge/graph_33524607-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-5.jsonl b/split_edge/graph_33524607-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-6.jsonl b/split_edge/graph_33524607-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-8.jsonl b/split_edge/graph_33524607-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33524607-9.jsonl b/split_edge/graph_33524607-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3354212-0.jsonl b/split_edge/graph_3354212-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3354212-1.jsonl b/split_edge/graph_3354212-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3354212-2.jsonl b/split_edge/graph_3354212-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3354212-4.jsonl b/split_edge/graph_3354212-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3354212-5.jsonl b/split_edge/graph_3354212-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-0.jsonl b/split_edge/graph_33750550-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-1.jsonl b/split_edge/graph_33750550-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-10.jsonl b/split_edge/graph_33750550-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-11.jsonl b/split_edge/graph_33750550-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-12.jsonl b/split_edge/graph_33750550-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-13.jsonl b/split_edge/graph_33750550-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-14.jsonl b/split_edge/graph_33750550-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-15.jsonl b/split_edge/graph_33750550-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-16.jsonl b/split_edge/graph_33750550-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-17.jsonl b/split_edge/graph_33750550-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-18.jsonl b/split_edge/graph_33750550-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-20.jsonl b/split_edge/graph_33750550-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-21.jsonl b/split_edge/graph_33750550-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-22.jsonl b/split_edge/graph_33750550-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-23.jsonl b/split_edge/graph_33750550-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-3.jsonl b/split_edge/graph_33750550-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-4.jsonl b/split_edge/graph_33750550-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-5.jsonl b/split_edge/graph_33750550-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-7.jsonl b/split_edge/graph_33750550-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-8.jsonl b/split_edge/graph_33750550-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_33750550-9.jsonl b/split_edge/graph_33750550-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-0.jsonl b/split_edge/graph_3399083-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-10.jsonl b/split_edge/graph_3399083-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-11.jsonl b/split_edge/graph_3399083-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-12.jsonl b/split_edge/graph_3399083-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-13.jsonl b/split_edge/graph_3399083-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-14.jsonl b/split_edge/graph_3399083-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-16.jsonl b/split_edge/graph_3399083-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-17.jsonl b/split_edge/graph_3399083-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-18.jsonl b/split_edge/graph_3399083-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-2.jsonl b/split_edge/graph_3399083-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-21.jsonl b/split_edge/graph_3399083-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-3.jsonl b/split_edge/graph_3399083-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-5.jsonl b/split_edge/graph_3399083-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3399083-9.jsonl b/split_edge/graph_3399083-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-0.jsonl b/split_edge/graph_34013163-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-1.jsonl b/split_edge/graph_34013163-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-12.jsonl b/split_edge/graph_34013163-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-13.jsonl b/split_edge/graph_34013163-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-14.jsonl b/split_edge/graph_34013163-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-15.jsonl b/split_edge/graph_34013163-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-17.jsonl b/split_edge/graph_34013163-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-19.jsonl b/split_edge/graph_34013163-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-2.jsonl b/split_edge/graph_34013163-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-20.jsonl b/split_edge/graph_34013163-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-21.jsonl b/split_edge/graph_34013163-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-23.jsonl b/split_edge/graph_34013163-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-24.jsonl b/split_edge/graph_34013163-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-25.jsonl b/split_edge/graph_34013163-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-26.jsonl b/split_edge/graph_34013163-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-3.jsonl b/split_edge/graph_34013163-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-4.jsonl b/split_edge/graph_34013163-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-6.jsonl b/split_edge/graph_34013163-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-7.jsonl b/split_edge/graph_34013163-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34013163-8.jsonl b/split_edge/graph_34013163-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34120020-0.jsonl b/split_edge/graph_34120020-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34120020-1.jsonl b/split_edge/graph_34120020-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34120020-3.jsonl b/split_edge/graph_34120020-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34120020-6.jsonl b/split_edge/graph_34120020-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34176399-0.jsonl b/split_edge/graph_34176399-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34176399-2.jsonl b/split_edge/graph_34176399-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34176399-3.jsonl b/split_edge/graph_34176399-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34176399-6.jsonl b/split_edge/graph_34176399-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34176399-7.jsonl b/split_edge/graph_34176399-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34453073-0.jsonl b/split_edge/graph_34453073-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34453073-1.jsonl b/split_edge/graph_34453073-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34453073-2.jsonl b/split_edge/graph_34453073-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34453073-9.jsonl b/split_edge/graph_34453073-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-0.jsonl b/split_edge/graph_34469714-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-10.jsonl b/split_edge/graph_34469714-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-11.jsonl b/split_edge/graph_34469714-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-4.jsonl b/split_edge/graph_34469714-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-5.jsonl b/split_edge/graph_34469714-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-6.jsonl b/split_edge/graph_34469714-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-8.jsonl b/split_edge/graph_34469714-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34469714-9.jsonl b/split_edge/graph_34469714-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-10.jsonl b/split_edge/graph_345263-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-12.jsonl b/split_edge/graph_345263-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-14.jsonl b/split_edge/graph_345263-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-15.jsonl b/split_edge/graph_345263-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-16.jsonl b/split_edge/graph_345263-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-17.jsonl b/split_edge/graph_345263-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-18.jsonl b/split_edge/graph_345263-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-2.jsonl b/split_edge/graph_345263-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-20.jsonl b/split_edge/graph_345263-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-23.jsonl b/split_edge/graph_345263-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-29.jsonl b/split_edge/graph_345263-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-3.jsonl b/split_edge/graph_345263-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-30.jsonl b/split_edge/graph_345263-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-32.jsonl b/split_edge/graph_345263-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-35.jsonl b/split_edge/graph_345263-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-36.jsonl b/split_edge/graph_345263-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-37.jsonl b/split_edge/graph_345263-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-38.jsonl b/split_edge/graph_345263-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-4.jsonl b/split_edge/graph_345263-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-5.jsonl b/split_edge/graph_345263-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-6.jsonl b/split_edge/graph_345263-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_345263-9.jsonl b/split_edge/graph_345263-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-0.jsonl b/split_edge/graph_34704358-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-1.jsonl b/split_edge/graph_34704358-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-10.jsonl b/split_edge/graph_34704358-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-11.jsonl b/split_edge/graph_34704358-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-12.jsonl b/split_edge/graph_34704358-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-13.jsonl b/split_edge/graph_34704358-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-14.jsonl b/split_edge/graph_34704358-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-2.jsonl b/split_edge/graph_34704358-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-4.jsonl b/split_edge/graph_34704358-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-5.jsonl b/split_edge/graph_34704358-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-6.jsonl b/split_edge/graph_34704358-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-7.jsonl b/split_edge/graph_34704358-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-8.jsonl b/split_edge/graph_34704358-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34704358-9.jsonl b/split_edge/graph_34704358-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-0.jsonl b/split_edge/graph_3474164-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-1.jsonl b/split_edge/graph_3474164-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-10.jsonl b/split_edge/graph_3474164-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-12.jsonl b/split_edge/graph_3474164-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-13.jsonl b/split_edge/graph_3474164-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-14.jsonl b/split_edge/graph_3474164-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-15.jsonl b/split_edge/graph_3474164-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-16.jsonl b/split_edge/graph_3474164-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-17.jsonl b/split_edge/graph_3474164-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-18.jsonl b/split_edge/graph_3474164-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-19.jsonl b/split_edge/graph_3474164-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-2.jsonl b/split_edge/graph_3474164-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-20.jsonl b/split_edge/graph_3474164-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-26.jsonl b/split_edge/graph_3474164-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-29.jsonl b/split_edge/graph_3474164-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-3.jsonl b/split_edge/graph_3474164-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-30.jsonl b/split_edge/graph_3474164-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-31.jsonl b/split_edge/graph_3474164-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-33.jsonl b/split_edge/graph_3474164-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-34.jsonl b/split_edge/graph_3474164-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-35.jsonl b/split_edge/graph_3474164-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-36.jsonl b/split_edge/graph_3474164-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-37.jsonl b/split_edge/graph_3474164-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-5.jsonl b/split_edge/graph_3474164-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-6.jsonl b/split_edge/graph_3474164-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-7.jsonl b/split_edge/graph_3474164-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3474164-8.jsonl b/split_edge/graph_3474164-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34804199-0.jsonl b/split_edge/graph_34804199-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34804199-1.jsonl b/split_edge/graph_34804199-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34804199-3.jsonl b/split_edge/graph_34804199-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34804199-5.jsonl b/split_edge/graph_34804199-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34862941-24.jsonl b/split_edge/graph_34862941-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34862941-27.jsonl b/split_edge/graph_34862941-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34862941-36.jsonl b/split_edge/graph_34862941-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_34862941-37.jsonl b/split_edge/graph_34862941-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-1.jsonl b/split_edge/graph_35217690-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-10.jsonl b/split_edge/graph_35217690-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-3.jsonl b/split_edge/graph_35217690-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-4.jsonl b/split_edge/graph_35217690-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-5.jsonl b/split_edge/graph_35217690-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-6.jsonl b/split_edge/graph_35217690-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-7.jsonl b/split_edge/graph_35217690-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-8.jsonl b/split_edge/graph_35217690-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35217690-9.jsonl b/split_edge/graph_35217690-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35259012-0.jsonl b/split_edge/graph_35259012-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35259012-1.jsonl b/split_edge/graph_35259012-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35259012-2.jsonl b/split_edge/graph_35259012-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35259012-3.jsonl b/split_edge/graph_35259012-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35259012-5.jsonl b/split_edge/graph_35259012-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35259012-6.jsonl b/split_edge/graph_35259012-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-0.jsonl b/split_edge/graph_35260120-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-11.jsonl b/split_edge/graph_35260120-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-12.jsonl b/split_edge/graph_35260120-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-13.jsonl b/split_edge/graph_35260120-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-14.jsonl b/split_edge/graph_35260120-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-16.jsonl b/split_edge/graph_35260120-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-17.jsonl b/split_edge/graph_35260120-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-18.jsonl b/split_edge/graph_35260120-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-2.jsonl b/split_edge/graph_35260120-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-20.jsonl b/split_edge/graph_35260120-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-21.jsonl b/split_edge/graph_35260120-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-22.jsonl b/split_edge/graph_35260120-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-23.jsonl b/split_edge/graph_35260120-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-24.jsonl b/split_edge/graph_35260120-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-25.jsonl b/split_edge/graph_35260120-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-26.jsonl b/split_edge/graph_35260120-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-28.jsonl b/split_edge/graph_35260120-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-3.jsonl b/split_edge/graph_35260120-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-30.jsonl b/split_edge/graph_35260120-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-31.jsonl b/split_edge/graph_35260120-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-32.jsonl b/split_edge/graph_35260120-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-33.jsonl b/split_edge/graph_35260120-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-34.jsonl b/split_edge/graph_35260120-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-35.jsonl b/split_edge/graph_35260120-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-4.jsonl b/split_edge/graph_35260120-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-5.jsonl b/split_edge/graph_35260120-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-6.jsonl b/split_edge/graph_35260120-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-7.jsonl b/split_edge/graph_35260120-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-8.jsonl b/split_edge/graph_35260120-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_35260120-9.jsonl b/split_edge/graph_35260120-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-0.jsonl b/split_edge/graph_3527510-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-2.jsonl b/split_edge/graph_3527510-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-3.jsonl b/split_edge/graph_3527510-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-4.jsonl b/split_edge/graph_3527510-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-5.jsonl b/split_edge/graph_3527510-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-6.jsonl b/split_edge/graph_3527510-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-7.jsonl b/split_edge/graph_3527510-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3527510-8.jsonl b/split_edge/graph_3527510-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-0.jsonl b/split_edge/graph_3529917-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-10.jsonl b/split_edge/graph_3529917-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-11.jsonl b/split_edge/graph_3529917-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-12.jsonl b/split_edge/graph_3529917-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-13.jsonl b/split_edge/graph_3529917-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-14.jsonl b/split_edge/graph_3529917-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-15.jsonl b/split_edge/graph_3529917-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-16.jsonl b/split_edge/graph_3529917-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-17.jsonl b/split_edge/graph_3529917-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-19.jsonl b/split_edge/graph_3529917-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-2.jsonl b/split_edge/graph_3529917-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-20.jsonl b/split_edge/graph_3529917-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-22.jsonl b/split_edge/graph_3529917-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-23.jsonl b/split_edge/graph_3529917-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-25.jsonl b/split_edge/graph_3529917-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-26.jsonl b/split_edge/graph_3529917-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-27.jsonl b/split_edge/graph_3529917-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-3.jsonl b/split_edge/graph_3529917-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-5.jsonl b/split_edge/graph_3529917-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-6.jsonl b/split_edge/graph_3529917-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-7.jsonl b/split_edge/graph_3529917-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3529917-9.jsonl b/split_edge/graph_3529917-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-0.jsonl b/split_edge/graph_355736-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-1.jsonl b/split_edge/graph_355736-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-10.jsonl b/split_edge/graph_355736-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-11.jsonl b/split_edge/graph_355736-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-12.jsonl b/split_edge/graph_355736-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-13.jsonl b/split_edge/graph_355736-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-14.jsonl b/split_edge/graph_355736-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-15.jsonl b/split_edge/graph_355736-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-17.jsonl b/split_edge/graph_355736-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-19.jsonl b/split_edge/graph_355736-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-3.jsonl b/split_edge/graph_355736-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-4.jsonl b/split_edge/graph_355736-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-5.jsonl b/split_edge/graph_355736-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-6.jsonl b/split_edge/graph_355736-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-7.jsonl b/split_edge/graph_355736-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-8.jsonl b/split_edge/graph_355736-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_355736-9.jsonl b/split_edge/graph_355736-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-0.jsonl b/split_edge/graph_3557411-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-1.jsonl b/split_edge/graph_3557411-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-10.jsonl b/split_edge/graph_3557411-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-12.jsonl b/split_edge/graph_3557411-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-13.jsonl b/split_edge/graph_3557411-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-14.jsonl b/split_edge/graph_3557411-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-15.jsonl b/split_edge/graph_3557411-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-16.jsonl b/split_edge/graph_3557411-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-17.jsonl b/split_edge/graph_3557411-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-19.jsonl b/split_edge/graph_3557411-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-2.jsonl b/split_edge/graph_3557411-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-20.jsonl b/split_edge/graph_3557411-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-22.jsonl b/split_edge/graph_3557411-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-23.jsonl b/split_edge/graph_3557411-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-24.jsonl b/split_edge/graph_3557411-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-25.jsonl b/split_edge/graph_3557411-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-26.jsonl b/split_edge/graph_3557411-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-28.jsonl b/split_edge/graph_3557411-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-3.jsonl b/split_edge/graph_3557411-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-30.jsonl b/split_edge/graph_3557411-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-32.jsonl b/split_edge/graph_3557411-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-34.jsonl b/split_edge/graph_3557411-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-35.jsonl b/split_edge/graph_3557411-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-36.jsonl b/split_edge/graph_3557411-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-37.jsonl b/split_edge/graph_3557411-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-38.jsonl b/split_edge/graph_3557411-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-39.jsonl b/split_edge/graph_3557411-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-4.jsonl b/split_edge/graph_3557411-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-40.jsonl b/split_edge/graph_3557411-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-41.jsonl b/split_edge/graph_3557411-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-44.jsonl b/split_edge/graph_3557411-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-46.jsonl b/split_edge/graph_3557411-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-47.jsonl b/split_edge/graph_3557411-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-7.jsonl b/split_edge/graph_3557411-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-8.jsonl b/split_edge/graph_3557411-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3557411-9.jsonl b/split_edge/graph_3557411-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-0.jsonl b/split_edge/graph_36124856-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-1.jsonl b/split_edge/graph_36124856-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-10.jsonl b/split_edge/graph_36124856-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-11.jsonl b/split_edge/graph_36124856-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-12.jsonl b/split_edge/graph_36124856-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-13.jsonl b/split_edge/graph_36124856-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-14.jsonl b/split_edge/graph_36124856-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-16.jsonl b/split_edge/graph_36124856-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-17.jsonl b/split_edge/graph_36124856-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-18.jsonl b/split_edge/graph_36124856-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-19.jsonl b/split_edge/graph_36124856-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-2.jsonl b/split_edge/graph_36124856-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-20.jsonl b/split_edge/graph_36124856-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-22.jsonl b/split_edge/graph_36124856-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-23.jsonl b/split_edge/graph_36124856-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-24.jsonl b/split_edge/graph_36124856-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-3.jsonl b/split_edge/graph_36124856-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-4.jsonl b/split_edge/graph_36124856-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-5.jsonl b/split_edge/graph_36124856-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-6.jsonl b/split_edge/graph_36124856-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36124856-7.jsonl b/split_edge/graph_36124856-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-0.jsonl b/split_edge/graph_3615017-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-1.jsonl b/split_edge/graph_3615017-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-10.jsonl b/split_edge/graph_3615017-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-11.jsonl b/split_edge/graph_3615017-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-12.jsonl b/split_edge/graph_3615017-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-13.jsonl b/split_edge/graph_3615017-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-2.jsonl b/split_edge/graph_3615017-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-3.jsonl b/split_edge/graph_3615017-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-4.jsonl b/split_edge/graph_3615017-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-5.jsonl b/split_edge/graph_3615017-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-6.jsonl b/split_edge/graph_3615017-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-7.jsonl b/split_edge/graph_3615017-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-8.jsonl b/split_edge/graph_3615017-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3615017-9.jsonl b/split_edge/graph_3615017-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36421799-0.jsonl b/split_edge/graph_36421799-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36421799-1.jsonl b/split_edge/graph_36421799-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36421799-2.jsonl b/split_edge/graph_36421799-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36610012-0.jsonl b/split_edge/graph_36610012-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36610012-11.jsonl b/split_edge/graph_36610012-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36610012-12.jsonl b/split_edge/graph_36610012-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36610012-15.jsonl b/split_edge/graph_36610012-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36610012-3.jsonl b/split_edge/graph_36610012-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36610012-6.jsonl b/split_edge/graph_36610012-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-10.jsonl b/split_edge/graph_36712644-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-11.jsonl b/split_edge/graph_36712644-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-13.jsonl b/split_edge/graph_36712644-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-15.jsonl b/split_edge/graph_36712644-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-16.jsonl b/split_edge/graph_36712644-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-19.jsonl b/split_edge/graph_36712644-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-23.jsonl b/split_edge/graph_36712644-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-24.jsonl b/split_edge/graph_36712644-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-25.jsonl b/split_edge/graph_36712644-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-26.jsonl b/split_edge/graph_36712644-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-31.jsonl b/split_edge/graph_36712644-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-32.jsonl b/split_edge/graph_36712644-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36712644-5.jsonl b/split_edge/graph_36712644-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-1.jsonl b/split_edge/graph_36743943-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-10.jsonl b/split_edge/graph_36743943-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-12.jsonl b/split_edge/graph_36743943-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-13.jsonl b/split_edge/graph_36743943-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-14.jsonl b/split_edge/graph_36743943-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-15.jsonl b/split_edge/graph_36743943-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-16.jsonl b/split_edge/graph_36743943-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-2.jsonl b/split_edge/graph_36743943-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-4.jsonl b/split_edge/graph_36743943-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-5.jsonl b/split_edge/graph_36743943-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-6.jsonl b/split_edge/graph_36743943-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-8.jsonl b/split_edge/graph_36743943-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_36743943-9.jsonl b/split_edge/graph_36743943-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-0.jsonl b/split_edge/graph_3705077-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-10.jsonl b/split_edge/graph_3705077-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-11.jsonl b/split_edge/graph_3705077-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-12.jsonl b/split_edge/graph_3705077-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-13.jsonl b/split_edge/graph_3705077-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-15.jsonl b/split_edge/graph_3705077-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-16.jsonl b/split_edge/graph_3705077-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-17.jsonl b/split_edge/graph_3705077-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-18.jsonl b/split_edge/graph_3705077-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-19.jsonl b/split_edge/graph_3705077-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-20.jsonl b/split_edge/graph_3705077-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-21.jsonl b/split_edge/graph_3705077-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-22.jsonl b/split_edge/graph_3705077-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-23.jsonl b/split_edge/graph_3705077-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-24.jsonl b/split_edge/graph_3705077-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-4.jsonl b/split_edge/graph_3705077-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-5.jsonl b/split_edge/graph_3705077-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-6.jsonl b/split_edge/graph_3705077-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-7.jsonl b/split_edge/graph_3705077-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3705077-9.jsonl b/split_edge/graph_3705077-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-0.jsonl b/split_edge/graph_3706010-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-1.jsonl b/split_edge/graph_3706010-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-10.jsonl b/split_edge/graph_3706010-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-11.jsonl b/split_edge/graph_3706010-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-12.jsonl b/split_edge/graph_3706010-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-13.jsonl b/split_edge/graph_3706010-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-14.jsonl b/split_edge/graph_3706010-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-2.jsonl b/split_edge/graph_3706010-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-3.jsonl b/split_edge/graph_3706010-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-4.jsonl b/split_edge/graph_3706010-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-5.jsonl b/split_edge/graph_3706010-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-6.jsonl b/split_edge/graph_3706010-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-7.jsonl b/split_edge/graph_3706010-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3706010-8.jsonl b/split_edge/graph_3706010-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-0.jsonl b/split_edge/graph_3723052-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-11.jsonl b/split_edge/graph_3723052-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-15.jsonl b/split_edge/graph_3723052-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-16.jsonl b/split_edge/graph_3723052-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-17.jsonl b/split_edge/graph_3723052-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-18.jsonl b/split_edge/graph_3723052-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-19.jsonl b/split_edge/graph_3723052-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-20.jsonl b/split_edge/graph_3723052-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-21.jsonl b/split_edge/graph_3723052-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-22.jsonl b/split_edge/graph_3723052-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-23.jsonl b/split_edge/graph_3723052-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-24.jsonl b/split_edge/graph_3723052-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-25.jsonl b/split_edge/graph_3723052-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-26.jsonl b/split_edge/graph_3723052-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-27.jsonl b/split_edge/graph_3723052-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-28.jsonl b/split_edge/graph_3723052-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-29.jsonl b/split_edge/graph_3723052-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-3.jsonl b/split_edge/graph_3723052-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-30.jsonl b/split_edge/graph_3723052-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-33.jsonl b/split_edge/graph_3723052-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-34.jsonl b/split_edge/graph_3723052-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-35.jsonl b/split_edge/graph_3723052-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-36.jsonl b/split_edge/graph_3723052-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-37.jsonl b/split_edge/graph_3723052-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-4.jsonl b/split_edge/graph_3723052-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3723052-6.jsonl b/split_edge/graph_3723052-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-0.jsonl b/split_edge/graph_37424351-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-10.jsonl b/split_edge/graph_37424351-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-11.jsonl b/split_edge/graph_37424351-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-2.jsonl b/split_edge/graph_37424351-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-4.jsonl b/split_edge/graph_37424351-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-5.jsonl b/split_edge/graph_37424351-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-6.jsonl b/split_edge/graph_37424351-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-8.jsonl b/split_edge/graph_37424351-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37424351-9.jsonl b/split_edge/graph_37424351-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-0.jsonl b/split_edge/graph_3750204-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-11.jsonl b/split_edge/graph_3750204-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-12.jsonl b/split_edge/graph_3750204-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-13.jsonl b/split_edge/graph_3750204-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-14.jsonl b/split_edge/graph_3750204-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-21.jsonl b/split_edge/graph_3750204-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-29.jsonl b/split_edge/graph_3750204-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-3.jsonl b/split_edge/graph_3750204-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-4.jsonl b/split_edge/graph_3750204-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-5.jsonl b/split_edge/graph_3750204-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-6.jsonl b/split_edge/graph_3750204-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-7.jsonl b/split_edge/graph_3750204-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3750204-9.jsonl b/split_edge/graph_3750204-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-1.jsonl b/split_edge/graph_3758974-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-10.jsonl b/split_edge/graph_3758974-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-11.jsonl b/split_edge/graph_3758974-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-14.jsonl b/split_edge/graph_3758974-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-15.jsonl b/split_edge/graph_3758974-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-16.jsonl b/split_edge/graph_3758974-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-17.jsonl b/split_edge/graph_3758974-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-18.jsonl b/split_edge/graph_3758974-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-19.jsonl b/split_edge/graph_3758974-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-2.jsonl b/split_edge/graph_3758974-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-20.jsonl b/split_edge/graph_3758974-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-21.jsonl b/split_edge/graph_3758974-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-3.jsonl b/split_edge/graph_3758974-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-6.jsonl b/split_edge/graph_3758974-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-8.jsonl b/split_edge/graph_3758974-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3758974-9.jsonl b/split_edge/graph_3758974-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-0.jsonl b/split_edge/graph_37664642-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-1.jsonl b/split_edge/graph_37664642-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-10.jsonl b/split_edge/graph_37664642-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-13.jsonl b/split_edge/graph_37664642-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-15.jsonl b/split_edge/graph_37664642-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-16.jsonl b/split_edge/graph_37664642-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-17.jsonl b/split_edge/graph_37664642-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-20.jsonl b/split_edge/graph_37664642-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-21.jsonl b/split_edge/graph_37664642-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-22.jsonl b/split_edge/graph_37664642-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-24.jsonl b/split_edge/graph_37664642-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-26.jsonl b/split_edge/graph_37664642-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-4.jsonl b/split_edge/graph_37664642-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37664642-5.jsonl b/split_edge/graph_37664642-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-0.jsonl b/split_edge/graph_37745102-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-10.jsonl b/split_edge/graph_37745102-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-11.jsonl b/split_edge/graph_37745102-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-12.jsonl b/split_edge/graph_37745102-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-3.jsonl b/split_edge/graph_37745102-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-4.jsonl b/split_edge/graph_37745102-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-7.jsonl b/split_edge/graph_37745102-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-8.jsonl b/split_edge/graph_37745102-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37745102-9.jsonl b/split_edge/graph_37745102-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-0.jsonl b/split_edge/graph_3782888-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-10.jsonl b/split_edge/graph_3782888-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-11.jsonl b/split_edge/graph_3782888-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-12.jsonl b/split_edge/graph_3782888-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-13.jsonl b/split_edge/graph_3782888-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-14.jsonl b/split_edge/graph_3782888-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-16.jsonl b/split_edge/graph_3782888-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-2.jsonl b/split_edge/graph_3782888-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-20.jsonl b/split_edge/graph_3782888-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-22.jsonl b/split_edge/graph_3782888-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-26.jsonl b/split_edge/graph_3782888-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-3.jsonl b/split_edge/graph_3782888-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-30.jsonl b/split_edge/graph_3782888-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-31.jsonl b/split_edge/graph_3782888-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-33.jsonl b/split_edge/graph_3782888-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-4.jsonl b/split_edge/graph_3782888-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-6.jsonl b/split_edge/graph_3782888-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-7.jsonl b/split_edge/graph_3782888-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-8.jsonl b/split_edge/graph_3782888-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3782888-9.jsonl b/split_edge/graph_3782888-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-0.jsonl b/split_edge/graph_3783650-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-1.jsonl b/split_edge/graph_3783650-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-17.jsonl b/split_edge/graph_3783650-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-2.jsonl b/split_edge/graph_3783650-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-20.jsonl b/split_edge/graph_3783650-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-21.jsonl b/split_edge/graph_3783650-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-23.jsonl b/split_edge/graph_3783650-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-24.jsonl b/split_edge/graph_3783650-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-25.jsonl b/split_edge/graph_3783650-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-26.jsonl b/split_edge/graph_3783650-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-27.jsonl b/split_edge/graph_3783650-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-28.jsonl b/split_edge/graph_3783650-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-29.jsonl b/split_edge/graph_3783650-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-3.jsonl b/split_edge/graph_3783650-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-30.jsonl b/split_edge/graph_3783650-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-31.jsonl b/split_edge/graph_3783650-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-33.jsonl b/split_edge/graph_3783650-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-35.jsonl b/split_edge/graph_3783650-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-36.jsonl b/split_edge/graph_3783650-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-37.jsonl b/split_edge/graph_3783650-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-38.jsonl b/split_edge/graph_3783650-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-39.jsonl b/split_edge/graph_3783650-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-4.jsonl b/split_edge/graph_3783650-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-40.jsonl b/split_edge/graph_3783650-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-42.jsonl b/split_edge/graph_3783650-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-43.jsonl b/split_edge/graph_3783650-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-44.jsonl b/split_edge/graph_3783650-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-45.jsonl b/split_edge/graph_3783650-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-46.jsonl b/split_edge/graph_3783650-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-48.jsonl b/split_edge/graph_3783650-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-49.jsonl b/split_edge/graph_3783650-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-50.jsonl b/split_edge/graph_3783650-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-52.jsonl b/split_edge/graph_3783650-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-53.jsonl b/split_edge/graph_3783650-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-54.jsonl b/split_edge/graph_3783650-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-57.jsonl b/split_edge/graph_3783650-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-58.jsonl b/split_edge/graph_3783650-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-6.jsonl b/split_edge/graph_3783650-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-60.jsonl b/split_edge/graph_3783650-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-62.jsonl b/split_edge/graph_3783650-62.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-66.jsonl b/split_edge/graph_3783650-66.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3783650-7.jsonl b/split_edge/graph_3783650-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37852736-0.jsonl b/split_edge/graph_37852736-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37852736-1.jsonl b/split_edge/graph_37852736-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37852736-2.jsonl b/split_edge/graph_37852736-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37852736-23.jsonl b/split_edge/graph_37852736-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37852736-24.jsonl b/split_edge/graph_37852736-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37852736-5.jsonl b/split_edge/graph_37852736-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_37852736-7.jsonl b/split_edge/graph_37852736-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-0.jsonl b/split_edge/graph_38079015-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-1.jsonl b/split_edge/graph_38079015-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-10.jsonl b/split_edge/graph_38079015-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-11.jsonl b/split_edge/graph_38079015-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-2.jsonl b/split_edge/graph_38079015-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-3.jsonl b/split_edge/graph_38079015-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-4.jsonl b/split_edge/graph_38079015-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-5.jsonl b/split_edge/graph_38079015-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-6.jsonl b/split_edge/graph_38079015-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-7.jsonl b/split_edge/graph_38079015-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-8.jsonl b/split_edge/graph_38079015-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38079015-9.jsonl b/split_edge/graph_38079015-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-0.jsonl b/split_edge/graph_3821646-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-10.jsonl b/split_edge/graph_3821646-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-11.jsonl b/split_edge/graph_3821646-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-12.jsonl b/split_edge/graph_3821646-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-2.jsonl b/split_edge/graph_3821646-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-3.jsonl b/split_edge/graph_3821646-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-4.jsonl b/split_edge/graph_3821646-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-5.jsonl b/split_edge/graph_3821646-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-6.jsonl b/split_edge/graph_3821646-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-8.jsonl b/split_edge/graph_3821646-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3821646-9.jsonl b/split_edge/graph_3821646-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-0.jsonl b/split_edge/graph_3826739-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-1.jsonl b/split_edge/graph_3826739-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-10.jsonl b/split_edge/graph_3826739-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-11.jsonl b/split_edge/graph_3826739-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-12.jsonl b/split_edge/graph_3826739-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-14.jsonl b/split_edge/graph_3826739-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-2.jsonl b/split_edge/graph_3826739-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-3.jsonl b/split_edge/graph_3826739-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-5.jsonl b/split_edge/graph_3826739-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-6.jsonl b/split_edge/graph_3826739-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-8.jsonl b/split_edge/graph_3826739-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3826739-9.jsonl b/split_edge/graph_3826739-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38419725-0.jsonl b/split_edge/graph_38419725-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_387610-13.jsonl b/split_edge/graph_387610-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_387610-25.jsonl b/split_edge/graph_387610-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_387610-27.jsonl b/split_edge/graph_387610-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_387610-30.jsonl b/split_edge/graph_387610-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_38845981-2.jsonl b/split_edge/graph_38845981-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-0.jsonl b/split_edge/graph_3893583-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-1.jsonl b/split_edge/graph_3893583-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-10.jsonl b/split_edge/graph_3893583-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-11.jsonl b/split_edge/graph_3893583-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-12.jsonl b/split_edge/graph_3893583-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-13.jsonl b/split_edge/graph_3893583-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-14.jsonl b/split_edge/graph_3893583-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-2.jsonl b/split_edge/graph_3893583-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-3.jsonl b/split_edge/graph_3893583-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-4.jsonl b/split_edge/graph_3893583-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-5.jsonl b/split_edge/graph_3893583-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-6.jsonl b/split_edge/graph_3893583-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-7.jsonl b/split_edge/graph_3893583-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-8.jsonl b/split_edge/graph_3893583-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3893583-9.jsonl b/split_edge/graph_3893583-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-0.jsonl b/split_edge/graph_3908281-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-10.jsonl b/split_edge/graph_3908281-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-11.jsonl b/split_edge/graph_3908281-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-12.jsonl b/split_edge/graph_3908281-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-13.jsonl b/split_edge/graph_3908281-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-14.jsonl b/split_edge/graph_3908281-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-15.jsonl b/split_edge/graph_3908281-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-16.jsonl b/split_edge/graph_3908281-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-18.jsonl b/split_edge/graph_3908281-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-2.jsonl b/split_edge/graph_3908281-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-3.jsonl b/split_edge/graph_3908281-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-4.jsonl b/split_edge/graph_3908281-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-5.jsonl b/split_edge/graph_3908281-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-6.jsonl b/split_edge/graph_3908281-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-7.jsonl b/split_edge/graph_3908281-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-8.jsonl b/split_edge/graph_3908281-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3908281-9.jsonl b/split_edge/graph_3908281-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-0.jsonl b/split_edge/graph_3918777-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-1.jsonl b/split_edge/graph_3918777-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-10.jsonl b/split_edge/graph_3918777-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-4.jsonl b/split_edge/graph_3918777-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-5.jsonl b/split_edge/graph_3918777-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-6.jsonl b/split_edge/graph_3918777-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-7.jsonl b/split_edge/graph_3918777-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-8.jsonl b/split_edge/graph_3918777-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3918777-9.jsonl b/split_edge/graph_3918777-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-0.jsonl b/split_edge/graph_39207-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-10.jsonl b/split_edge/graph_39207-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-12.jsonl b/split_edge/graph_39207-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-13.jsonl b/split_edge/graph_39207-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-15.jsonl b/split_edge/graph_39207-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-16.jsonl b/split_edge/graph_39207-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-18.jsonl b/split_edge/graph_39207-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-2.jsonl b/split_edge/graph_39207-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-22.jsonl b/split_edge/graph_39207-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-27.jsonl b/split_edge/graph_39207-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-3.jsonl b/split_edge/graph_39207-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-4.jsonl b/split_edge/graph_39207-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-5.jsonl b/split_edge/graph_39207-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-6.jsonl b/split_edge/graph_39207-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-8.jsonl b/split_edge/graph_39207-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39207-9.jsonl b/split_edge/graph_39207-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39252948-0.jsonl b/split_edge/graph_39252948-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39252948-11.jsonl b/split_edge/graph_39252948-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39252948-13.jsonl b/split_edge/graph_39252948-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39252948-8.jsonl b/split_edge/graph_39252948-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_39252948-9.jsonl b/split_edge/graph_39252948-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-0.jsonl b/split_edge/graph_3928659-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-1.jsonl b/split_edge/graph_3928659-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-13.jsonl b/split_edge/graph_3928659-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-20.jsonl b/split_edge/graph_3928659-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-21.jsonl b/split_edge/graph_3928659-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-22.jsonl b/split_edge/graph_3928659-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-30.jsonl b/split_edge/graph_3928659-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3928659-32.jsonl b/split_edge/graph_3928659-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3932882-0.jsonl b/split_edge/graph_3932882-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3932882-2.jsonl b/split_edge/graph_3932882-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3932882-3.jsonl b/split_edge/graph_3932882-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3932882-4.jsonl b/split_edge/graph_3932882-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3932882-5.jsonl b/split_edge/graph_3932882-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3932882-6.jsonl b/split_edge/graph_3932882-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3932882-7.jsonl b/split_edge/graph_3932882-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-0.jsonl b/split_edge/graph_3955762-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-10.jsonl b/split_edge/graph_3955762-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-11.jsonl b/split_edge/graph_3955762-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-12.jsonl b/split_edge/graph_3955762-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-13.jsonl b/split_edge/graph_3955762-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-14.jsonl b/split_edge/graph_3955762-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-15.jsonl b/split_edge/graph_3955762-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-17.jsonl b/split_edge/graph_3955762-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-18.jsonl b/split_edge/graph_3955762-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-2.jsonl b/split_edge/graph_3955762-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-3.jsonl b/split_edge/graph_3955762-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-4.jsonl b/split_edge/graph_3955762-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-7.jsonl b/split_edge/graph_3955762-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3955762-8.jsonl b/split_edge/graph_3955762-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-1.jsonl b/split_edge/graph_3980364-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-10.jsonl b/split_edge/graph_3980364-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-11.jsonl b/split_edge/graph_3980364-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-13.jsonl b/split_edge/graph_3980364-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-14.jsonl b/split_edge/graph_3980364-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-16.jsonl b/split_edge/graph_3980364-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-18.jsonl b/split_edge/graph_3980364-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-19.jsonl b/split_edge/graph_3980364-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-2.jsonl b/split_edge/graph_3980364-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-20.jsonl b/split_edge/graph_3980364-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-21.jsonl b/split_edge/graph_3980364-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-22.jsonl b/split_edge/graph_3980364-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-24.jsonl b/split_edge/graph_3980364-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-26.jsonl b/split_edge/graph_3980364-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-3.jsonl b/split_edge/graph_3980364-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-4.jsonl b/split_edge/graph_3980364-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-6.jsonl b/split_edge/graph_3980364-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-7.jsonl b/split_edge/graph_3980364-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_3980364-8.jsonl b/split_edge/graph_3980364-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4009814-10.jsonl b/split_edge/graph_4009814-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4009814-5.jsonl b/split_edge/graph_4009814-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4009814-7.jsonl b/split_edge/graph_4009814-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40162482-0.jsonl b/split_edge/graph_40162482-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40162482-1.jsonl b/split_edge/graph_40162482-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40162482-12.jsonl b/split_edge/graph_40162482-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40162482-2.jsonl b/split_edge/graph_40162482-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40162482-3.jsonl b/split_edge/graph_40162482-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40162482-7.jsonl b/split_edge/graph_40162482-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40162482-9.jsonl b/split_edge/graph_40162482-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-0.jsonl b/split_edge/graph_40315379-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-1.jsonl b/split_edge/graph_40315379-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-10.jsonl b/split_edge/graph_40315379-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-11.jsonl b/split_edge/graph_40315379-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-12.jsonl b/split_edge/graph_40315379-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-13.jsonl b/split_edge/graph_40315379-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-2.jsonl b/split_edge/graph_40315379-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-4.jsonl b/split_edge/graph_40315379-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-6.jsonl b/split_edge/graph_40315379-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-8.jsonl b/split_edge/graph_40315379-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40315379-9.jsonl b/split_edge/graph_40315379-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-0.jsonl b/split_edge/graph_40462024-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-1.jsonl b/split_edge/graph_40462024-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-13.jsonl b/split_edge/graph_40462024-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-15.jsonl b/split_edge/graph_40462024-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-16.jsonl b/split_edge/graph_40462024-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-17.jsonl b/split_edge/graph_40462024-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-18.jsonl b/split_edge/graph_40462024-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-19.jsonl b/split_edge/graph_40462024-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-20.jsonl b/split_edge/graph_40462024-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-21.jsonl b/split_edge/graph_40462024-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-22.jsonl b/split_edge/graph_40462024-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-3.jsonl b/split_edge/graph_40462024-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-4.jsonl b/split_edge/graph_40462024-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-5.jsonl b/split_edge/graph_40462024-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-6.jsonl b/split_edge/graph_40462024-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40462024-7.jsonl b/split_edge/graph_40462024-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-0.jsonl b/split_edge/graph_40537418-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-1.jsonl b/split_edge/graph_40537418-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-2.jsonl b/split_edge/graph_40537418-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-3.jsonl b/split_edge/graph_40537418-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-4.jsonl b/split_edge/graph_40537418-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-5.jsonl b/split_edge/graph_40537418-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-6.jsonl b/split_edge/graph_40537418-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-7.jsonl b/split_edge/graph_40537418-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40537418-8.jsonl b/split_edge/graph_40537418-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-0.jsonl b/split_edge/graph_40571076-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-1.jsonl b/split_edge/graph_40571076-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-10.jsonl b/split_edge/graph_40571076-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-11.jsonl b/split_edge/graph_40571076-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-12.jsonl b/split_edge/graph_40571076-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-13.jsonl b/split_edge/graph_40571076-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-14.jsonl b/split_edge/graph_40571076-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-15.jsonl b/split_edge/graph_40571076-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-16.jsonl b/split_edge/graph_40571076-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-17.jsonl b/split_edge/graph_40571076-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-18.jsonl b/split_edge/graph_40571076-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-2.jsonl b/split_edge/graph_40571076-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-3.jsonl b/split_edge/graph_40571076-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-4.jsonl b/split_edge/graph_40571076-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-5.jsonl b/split_edge/graph_40571076-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-6.jsonl b/split_edge/graph_40571076-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-7.jsonl b/split_edge/graph_40571076-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_40571076-8.jsonl b/split_edge/graph_40571076-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-10.jsonl b/split_edge/graph_41126007-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-11.jsonl b/split_edge/graph_41126007-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-12.jsonl b/split_edge/graph_41126007-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-13.jsonl b/split_edge/graph_41126007-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-14.jsonl b/split_edge/graph_41126007-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-15.jsonl b/split_edge/graph_41126007-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-16.jsonl b/split_edge/graph_41126007-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-17.jsonl b/split_edge/graph_41126007-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-18.jsonl b/split_edge/graph_41126007-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-2.jsonl b/split_edge/graph_41126007-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-3.jsonl b/split_edge/graph_41126007-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-4.jsonl b/split_edge/graph_41126007-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-5.jsonl b/split_edge/graph_41126007-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-7.jsonl b/split_edge/graph_41126007-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41126007-9.jsonl b/split_edge/graph_41126007-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-0.jsonl b/split_edge/graph_41269213-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-12.jsonl b/split_edge/graph_41269213-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-14.jsonl b/split_edge/graph_41269213-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-15.jsonl b/split_edge/graph_41269213-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-16.jsonl b/split_edge/graph_41269213-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-17.jsonl b/split_edge/graph_41269213-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-18.jsonl b/split_edge/graph_41269213-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-19.jsonl b/split_edge/graph_41269213-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-2.jsonl b/split_edge/graph_41269213-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-20.jsonl b/split_edge/graph_41269213-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-21.jsonl b/split_edge/graph_41269213-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-23.jsonl b/split_edge/graph_41269213-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-24.jsonl b/split_edge/graph_41269213-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-25.jsonl b/split_edge/graph_41269213-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-26.jsonl b/split_edge/graph_41269213-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-27.jsonl b/split_edge/graph_41269213-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-29.jsonl b/split_edge/graph_41269213-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-30.jsonl b/split_edge/graph_41269213-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-32.jsonl b/split_edge/graph_41269213-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-34.jsonl b/split_edge/graph_41269213-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-4.jsonl b/split_edge/graph_41269213-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-5.jsonl b/split_edge/graph_41269213-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-7.jsonl b/split_edge/graph_41269213-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-8.jsonl b/split_edge/graph_41269213-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41269213-9.jsonl b/split_edge/graph_41269213-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-0.jsonl b/split_edge/graph_4141324-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-10.jsonl b/split_edge/graph_4141324-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-11.jsonl b/split_edge/graph_4141324-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-13.jsonl b/split_edge/graph_4141324-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-14.jsonl b/split_edge/graph_4141324-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-16.jsonl b/split_edge/graph_4141324-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-17.jsonl b/split_edge/graph_4141324-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-2.jsonl b/split_edge/graph_4141324-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-3.jsonl b/split_edge/graph_4141324-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-4.jsonl b/split_edge/graph_4141324-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-5.jsonl b/split_edge/graph_4141324-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-8.jsonl b/split_edge/graph_4141324-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4141324-9.jsonl b/split_edge/graph_4141324-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41452697-1.jsonl b/split_edge/graph_41452697-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41452697-3.jsonl b/split_edge/graph_41452697-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-0.jsonl b/split_edge/graph_41502497-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-1.jsonl b/split_edge/graph_41502497-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-10.jsonl b/split_edge/graph_41502497-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-11.jsonl b/split_edge/graph_41502497-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-12.jsonl b/split_edge/graph_41502497-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-14.jsonl b/split_edge/graph_41502497-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-15.jsonl b/split_edge/graph_41502497-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-17.jsonl b/split_edge/graph_41502497-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-3.jsonl b/split_edge/graph_41502497-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-4.jsonl b/split_edge/graph_41502497-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-5.jsonl b/split_edge/graph_41502497-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-6.jsonl b/split_edge/graph_41502497-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-7.jsonl b/split_edge/graph_41502497-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-8.jsonl b/split_edge/graph_41502497-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41502497-9.jsonl b/split_edge/graph_41502497-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-0.jsonl b/split_edge/graph_41601035-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-1.jsonl b/split_edge/graph_41601035-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-10.jsonl b/split_edge/graph_41601035-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-11.jsonl b/split_edge/graph_41601035-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-12.jsonl b/split_edge/graph_41601035-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-13.jsonl b/split_edge/graph_41601035-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-15.jsonl b/split_edge/graph_41601035-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-17.jsonl b/split_edge/graph_41601035-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-18.jsonl b/split_edge/graph_41601035-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-20.jsonl b/split_edge/graph_41601035-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-21.jsonl b/split_edge/graph_41601035-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-25.jsonl b/split_edge/graph_41601035-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-3.jsonl b/split_edge/graph_41601035-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_41601035-8.jsonl b/split_edge/graph_41601035-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-0.jsonl b/split_edge/graph_416565-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-1.jsonl b/split_edge/graph_416565-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-10.jsonl b/split_edge/graph_416565-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-11.jsonl b/split_edge/graph_416565-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-12.jsonl b/split_edge/graph_416565-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-13.jsonl b/split_edge/graph_416565-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-14.jsonl b/split_edge/graph_416565-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-15.jsonl b/split_edge/graph_416565-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-16.jsonl b/split_edge/graph_416565-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-17.jsonl b/split_edge/graph_416565-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-18.jsonl b/split_edge/graph_416565-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-19.jsonl b/split_edge/graph_416565-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-2.jsonl b/split_edge/graph_416565-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-3.jsonl b/split_edge/graph_416565-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-4.jsonl b/split_edge/graph_416565-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-5.jsonl b/split_edge/graph_416565-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-6.jsonl b/split_edge/graph_416565-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-7.jsonl b/split_edge/graph_416565-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_416565-8.jsonl b/split_edge/graph_416565-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_42091061-10.jsonl b/split_edge/graph_42091061-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_42234300-0.jsonl b/split_edge/graph_42234300-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_42234300-1.jsonl b/split_edge/graph_42234300-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_42234300-3.jsonl b/split_edge/graph_42234300-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_42234300-5.jsonl b/split_edge/graph_42234300-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_42234300-6.jsonl b/split_edge/graph_42234300-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_42234300-8.jsonl b/split_edge/graph_42234300-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4236971-4.jsonl b/split_edge/graph_4236971-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4236971-5.jsonl b/split_edge/graph_4236971-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-0.jsonl b/split_edge/graph_4382139-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-1.jsonl b/split_edge/graph_4382139-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-12.jsonl b/split_edge/graph_4382139-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-15.jsonl b/split_edge/graph_4382139-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-16.jsonl b/split_edge/graph_4382139-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-17.jsonl b/split_edge/graph_4382139-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-18.jsonl b/split_edge/graph_4382139-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-2.jsonl b/split_edge/graph_4382139-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-20.jsonl b/split_edge/graph_4382139-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-21.jsonl b/split_edge/graph_4382139-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-23.jsonl b/split_edge/graph_4382139-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-25.jsonl b/split_edge/graph_4382139-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-27.jsonl b/split_edge/graph_4382139-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-28.jsonl b/split_edge/graph_4382139-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-29.jsonl b/split_edge/graph_4382139-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-3.jsonl b/split_edge/graph_4382139-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-30.jsonl b/split_edge/graph_4382139-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-32.jsonl b/split_edge/graph_4382139-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-33.jsonl b/split_edge/graph_4382139-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-34.jsonl b/split_edge/graph_4382139-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-36.jsonl b/split_edge/graph_4382139-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-37.jsonl b/split_edge/graph_4382139-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-38.jsonl b/split_edge/graph_4382139-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-41.jsonl b/split_edge/graph_4382139-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-42.jsonl b/split_edge/graph_4382139-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-44.jsonl b/split_edge/graph_4382139-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-45.jsonl b/split_edge/graph_4382139-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-46.jsonl b/split_edge/graph_4382139-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-47.jsonl b/split_edge/graph_4382139-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-48.jsonl b/split_edge/graph_4382139-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-49.jsonl b/split_edge/graph_4382139-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-50.jsonl b/split_edge/graph_4382139-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-51.jsonl b/split_edge/graph_4382139-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-54.jsonl b/split_edge/graph_4382139-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-55.jsonl b/split_edge/graph_4382139-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-56.jsonl b/split_edge/graph_4382139-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-57.jsonl b/split_edge/graph_4382139-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-58.jsonl b/split_edge/graph_4382139-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-59.jsonl b/split_edge/graph_4382139-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-60.jsonl b/split_edge/graph_4382139-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-61.jsonl b/split_edge/graph_4382139-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-62.jsonl b/split_edge/graph_4382139-62.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-64.jsonl b/split_edge/graph_4382139-64.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-65.jsonl b/split_edge/graph_4382139-65.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-66.jsonl b/split_edge/graph_4382139-66.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-67.jsonl b/split_edge/graph_4382139-67.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-68.jsonl b/split_edge/graph_4382139-68.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-69.jsonl b/split_edge/graph_4382139-69.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-7.jsonl b/split_edge/graph_4382139-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-70.jsonl b/split_edge/graph_4382139-70.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-72.jsonl b/split_edge/graph_4382139-72.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-73.jsonl b/split_edge/graph_4382139-73.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-74.jsonl b/split_edge/graph_4382139-74.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-75.jsonl b/split_edge/graph_4382139-75.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-76.jsonl b/split_edge/graph_4382139-76.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-77.jsonl b/split_edge/graph_4382139-77.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-78.jsonl b/split_edge/graph_4382139-78.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-79.jsonl b/split_edge/graph_4382139-79.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-8.jsonl b/split_edge/graph_4382139-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-80.jsonl b/split_edge/graph_4382139-80.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-82.jsonl b/split_edge/graph_4382139-82.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-83.jsonl b/split_edge/graph_4382139-83.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-84.jsonl b/split_edge/graph_4382139-84.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-85.jsonl b/split_edge/graph_4382139-85.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-86.jsonl b/split_edge/graph_4382139-86.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-87.jsonl b/split_edge/graph_4382139-87.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-88.jsonl b/split_edge/graph_4382139-88.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-89.jsonl b/split_edge/graph_4382139-89.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4382139-9.jsonl b/split_edge/graph_4382139-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43895138-1.jsonl b/split_edge/graph_43895138-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43895138-3.jsonl b/split_edge/graph_43895138-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43895138-5.jsonl b/split_edge/graph_43895138-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43937124-14.jsonl b/split_edge/graph_43937124-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43937124-2.jsonl b/split_edge/graph_43937124-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43937124-6.jsonl b/split_edge/graph_43937124-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4394609-12.jsonl b/split_edge/graph_4394609-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4394609-13.jsonl b/split_edge/graph_4394609-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4394609-8.jsonl b/split_edge/graph_4394609-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43994208-0.jsonl b/split_edge/graph_43994208-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43994208-11.jsonl b/split_edge/graph_43994208-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43994208-13.jsonl b/split_edge/graph_43994208-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43994208-14.jsonl b/split_edge/graph_43994208-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_43994208-4.jsonl b/split_edge/graph_43994208-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-0.jsonl b/split_edge/graph_44129379-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-1.jsonl b/split_edge/graph_44129379-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-10.jsonl b/split_edge/graph_44129379-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-11.jsonl b/split_edge/graph_44129379-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-12.jsonl b/split_edge/graph_44129379-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-13.jsonl b/split_edge/graph_44129379-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-14.jsonl b/split_edge/graph_44129379-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-15.jsonl b/split_edge/graph_44129379-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-16.jsonl b/split_edge/graph_44129379-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-17.jsonl b/split_edge/graph_44129379-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-2.jsonl b/split_edge/graph_44129379-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-3.jsonl b/split_edge/graph_44129379-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-5.jsonl b/split_edge/graph_44129379-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-6.jsonl b/split_edge/graph_44129379-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-7.jsonl b/split_edge/graph_44129379-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-8.jsonl b/split_edge/graph_44129379-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44129379-9.jsonl b/split_edge/graph_44129379-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-0.jsonl b/split_edge/graph_44148233-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-11.jsonl b/split_edge/graph_44148233-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-12.jsonl b/split_edge/graph_44148233-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-13.jsonl b/split_edge/graph_44148233-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-14.jsonl b/split_edge/graph_44148233-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-15.jsonl b/split_edge/graph_44148233-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-17.jsonl b/split_edge/graph_44148233-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-2.jsonl b/split_edge/graph_44148233-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-21.jsonl b/split_edge/graph_44148233-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-24.jsonl b/split_edge/graph_44148233-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-25.jsonl b/split_edge/graph_44148233-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-26.jsonl b/split_edge/graph_44148233-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-27.jsonl b/split_edge/graph_44148233-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-29.jsonl b/split_edge/graph_44148233-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-3.jsonl b/split_edge/graph_44148233-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-30.jsonl b/split_edge/graph_44148233-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-32.jsonl b/split_edge/graph_44148233-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-33.jsonl b/split_edge/graph_44148233-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-34.jsonl b/split_edge/graph_44148233-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-36.jsonl b/split_edge/graph_44148233-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-37.jsonl b/split_edge/graph_44148233-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-38.jsonl b/split_edge/graph_44148233-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-39.jsonl b/split_edge/graph_44148233-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-4.jsonl b/split_edge/graph_44148233-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-41.jsonl b/split_edge/graph_44148233-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-42.jsonl b/split_edge/graph_44148233-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-43.jsonl b/split_edge/graph_44148233-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-44.jsonl b/split_edge/graph_44148233-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-45.jsonl b/split_edge/graph_44148233-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-48.jsonl b/split_edge/graph_44148233-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-6.jsonl b/split_edge/graph_44148233-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-7.jsonl b/split_edge/graph_44148233-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44148233-8.jsonl b/split_edge/graph_44148233-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-10.jsonl b/split_edge/graph_44196989-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-11.jsonl b/split_edge/graph_44196989-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-12.jsonl b/split_edge/graph_44196989-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-13.jsonl b/split_edge/graph_44196989-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-14.jsonl b/split_edge/graph_44196989-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-15.jsonl b/split_edge/graph_44196989-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-16.jsonl b/split_edge/graph_44196989-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-18.jsonl b/split_edge/graph_44196989-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-2.jsonl b/split_edge/graph_44196989-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-20.jsonl b/split_edge/graph_44196989-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-3.jsonl b/split_edge/graph_44196989-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-4.jsonl b/split_edge/graph_44196989-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-5.jsonl b/split_edge/graph_44196989-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-6.jsonl b/split_edge/graph_44196989-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-7.jsonl b/split_edge/graph_44196989-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-8.jsonl b/split_edge/graph_44196989-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44196989-9.jsonl b/split_edge/graph_44196989-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-0.jsonl b/split_edge/graph_44263259-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-1.jsonl b/split_edge/graph_44263259-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-10.jsonl b/split_edge/graph_44263259-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-11.jsonl b/split_edge/graph_44263259-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-2.jsonl b/split_edge/graph_44263259-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-3.jsonl b/split_edge/graph_44263259-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-4.jsonl b/split_edge/graph_44263259-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-5.jsonl b/split_edge/graph_44263259-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-7.jsonl b/split_edge/graph_44263259-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44263259-9.jsonl b/split_edge/graph_44263259-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-0.jsonl b/split_edge/graph_44286242-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-10.jsonl b/split_edge/graph_44286242-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-11.jsonl b/split_edge/graph_44286242-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-12.jsonl b/split_edge/graph_44286242-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-13.jsonl b/split_edge/graph_44286242-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-14.jsonl b/split_edge/graph_44286242-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-15.jsonl b/split_edge/graph_44286242-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-16.jsonl b/split_edge/graph_44286242-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-17.jsonl b/split_edge/graph_44286242-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-18.jsonl b/split_edge/graph_44286242-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-19.jsonl b/split_edge/graph_44286242-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-3.jsonl b/split_edge/graph_44286242-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-5.jsonl b/split_edge/graph_44286242-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-6.jsonl b/split_edge/graph_44286242-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-8.jsonl b/split_edge/graph_44286242-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44286242-9.jsonl b/split_edge/graph_44286242-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44705580-0.jsonl b/split_edge/graph_44705580-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_44705580-2.jsonl b/split_edge/graph_44705580-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-0.jsonl b/split_edge/graph_45245066-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-1.jsonl b/split_edge/graph_45245066-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-10.jsonl b/split_edge/graph_45245066-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-12.jsonl b/split_edge/graph_45245066-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-2.jsonl b/split_edge/graph_45245066-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-3.jsonl b/split_edge/graph_45245066-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-4.jsonl b/split_edge/graph_45245066-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-5.jsonl b/split_edge/graph_45245066-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-6.jsonl b/split_edge/graph_45245066-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-7.jsonl b/split_edge/graph_45245066-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_45245066-8.jsonl b/split_edge/graph_45245066-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_453954-11.jsonl b/split_edge/graph_453954-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_453954-3.jsonl b/split_edge/graph_453954-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_453954-4.jsonl b/split_edge/graph_453954-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_453954-5.jsonl b/split_edge/graph_453954-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_453954-9.jsonl b/split_edge/graph_453954-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4551015-0.jsonl b/split_edge/graph_4551015-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4551015-1.jsonl b/split_edge/graph_4551015-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4551015-7.jsonl b/split_edge/graph_4551015-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-0.jsonl b/split_edge/graph_456491-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-1.jsonl b/split_edge/graph_456491-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-10.jsonl b/split_edge/graph_456491-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-11.jsonl b/split_edge/graph_456491-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-13.jsonl b/split_edge/graph_456491-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-14.jsonl b/split_edge/graph_456491-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-15.jsonl b/split_edge/graph_456491-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-16.jsonl b/split_edge/graph_456491-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-17.jsonl b/split_edge/graph_456491-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-19.jsonl b/split_edge/graph_456491-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-2.jsonl b/split_edge/graph_456491-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-20.jsonl b/split_edge/graph_456491-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-22.jsonl b/split_edge/graph_456491-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-23.jsonl b/split_edge/graph_456491-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-24.jsonl b/split_edge/graph_456491-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-26.jsonl b/split_edge/graph_456491-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-28.jsonl b/split_edge/graph_456491-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-29.jsonl b/split_edge/graph_456491-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-3.jsonl b/split_edge/graph_456491-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-30.jsonl b/split_edge/graph_456491-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-4.jsonl b/split_edge/graph_456491-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-6.jsonl b/split_edge/graph_456491-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-7.jsonl b/split_edge/graph_456491-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_456491-8.jsonl b/split_edge/graph_456491-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-0.jsonl b/split_edge/graph_4570087-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-10.jsonl b/split_edge/graph_4570087-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-11.jsonl b/split_edge/graph_4570087-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-12.jsonl b/split_edge/graph_4570087-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-13.jsonl b/split_edge/graph_4570087-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-15.jsonl b/split_edge/graph_4570087-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-16.jsonl b/split_edge/graph_4570087-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-18.jsonl b/split_edge/graph_4570087-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-19.jsonl b/split_edge/graph_4570087-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-2.jsonl b/split_edge/graph_4570087-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-20.jsonl b/split_edge/graph_4570087-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-21.jsonl b/split_edge/graph_4570087-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-24.jsonl b/split_edge/graph_4570087-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-25.jsonl b/split_edge/graph_4570087-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-26.jsonl b/split_edge/graph_4570087-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-28.jsonl b/split_edge/graph_4570087-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-29.jsonl b/split_edge/graph_4570087-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-31.jsonl b/split_edge/graph_4570087-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-33.jsonl b/split_edge/graph_4570087-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-34.jsonl b/split_edge/graph_4570087-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-36.jsonl b/split_edge/graph_4570087-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-39.jsonl b/split_edge/graph_4570087-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-4.jsonl b/split_edge/graph_4570087-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-40.jsonl b/split_edge/graph_4570087-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-41.jsonl b/split_edge/graph_4570087-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-42.jsonl b/split_edge/graph_4570087-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-44.jsonl b/split_edge/graph_4570087-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-45.jsonl b/split_edge/graph_4570087-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-5.jsonl b/split_edge/graph_4570087-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-6.jsonl b/split_edge/graph_4570087-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-7.jsonl b/split_edge/graph_4570087-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-8.jsonl b/split_edge/graph_4570087-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4570087-9.jsonl b/split_edge/graph_4570087-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-0.jsonl b/split_edge/graph_4572654-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-1.jsonl b/split_edge/graph_4572654-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-10.jsonl b/split_edge/graph_4572654-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-13.jsonl b/split_edge/graph_4572654-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-16.jsonl b/split_edge/graph_4572654-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-17.jsonl b/split_edge/graph_4572654-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-18.jsonl b/split_edge/graph_4572654-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-19.jsonl b/split_edge/graph_4572654-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-2.jsonl b/split_edge/graph_4572654-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-20.jsonl b/split_edge/graph_4572654-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-22.jsonl b/split_edge/graph_4572654-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-24.jsonl b/split_edge/graph_4572654-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-29.jsonl b/split_edge/graph_4572654-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-31.jsonl b/split_edge/graph_4572654-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-39.jsonl b/split_edge/graph_4572654-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-4.jsonl b/split_edge/graph_4572654-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-6.jsonl b/split_edge/graph_4572654-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-7.jsonl b/split_edge/graph_4572654-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4572654-9.jsonl b/split_edge/graph_4572654-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4612349-0.jsonl b/split_edge/graph_4612349-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4612349-1.jsonl b/split_edge/graph_4612349-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4612349-2.jsonl b/split_edge/graph_4612349-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4612349-3.jsonl b/split_edge/graph_4612349-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4612349-4.jsonl b/split_edge/graph_4612349-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4612349-5.jsonl b/split_edge/graph_4612349-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4612349-6.jsonl b/split_edge/graph_4612349-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4617110-0.jsonl b/split_edge/graph_4617110-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4617110-3.jsonl b/split_edge/graph_4617110-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4617110-4.jsonl b/split_edge/graph_4617110-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4617110-5.jsonl b/split_edge/graph_4617110-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4617110-6.jsonl b/split_edge/graph_4617110-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4617110-7.jsonl b/split_edge/graph_4617110-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-1.jsonl b/split_edge/graph_4626744-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-10.jsonl b/split_edge/graph_4626744-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-11.jsonl b/split_edge/graph_4626744-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-13.jsonl b/split_edge/graph_4626744-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-14.jsonl b/split_edge/graph_4626744-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-15.jsonl b/split_edge/graph_4626744-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-16.jsonl b/split_edge/graph_4626744-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-17.jsonl b/split_edge/graph_4626744-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-19.jsonl b/split_edge/graph_4626744-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-20.jsonl b/split_edge/graph_4626744-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-21.jsonl b/split_edge/graph_4626744-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-22.jsonl b/split_edge/graph_4626744-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-23.jsonl b/split_edge/graph_4626744-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-26.jsonl b/split_edge/graph_4626744-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-27.jsonl b/split_edge/graph_4626744-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-4.jsonl b/split_edge/graph_4626744-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-5.jsonl b/split_edge/graph_4626744-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-6.jsonl b/split_edge/graph_4626744-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-7.jsonl b/split_edge/graph_4626744-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-8.jsonl b/split_edge/graph_4626744-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4626744-9.jsonl b/split_edge/graph_4626744-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-0.jsonl b/split_edge/graph_4640616-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-1.jsonl b/split_edge/graph_4640616-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-11.jsonl b/split_edge/graph_4640616-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-12.jsonl b/split_edge/graph_4640616-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-13.jsonl b/split_edge/graph_4640616-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-14.jsonl b/split_edge/graph_4640616-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-16.jsonl b/split_edge/graph_4640616-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-17.jsonl b/split_edge/graph_4640616-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-18.jsonl b/split_edge/graph_4640616-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-19.jsonl b/split_edge/graph_4640616-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-2.jsonl b/split_edge/graph_4640616-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-20.jsonl b/split_edge/graph_4640616-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-22.jsonl b/split_edge/graph_4640616-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-23.jsonl b/split_edge/graph_4640616-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-24.jsonl b/split_edge/graph_4640616-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-25.jsonl b/split_edge/graph_4640616-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-26.jsonl b/split_edge/graph_4640616-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-28.jsonl b/split_edge/graph_4640616-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-29.jsonl b/split_edge/graph_4640616-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-3.jsonl b/split_edge/graph_4640616-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-31.jsonl b/split_edge/graph_4640616-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-32.jsonl b/split_edge/graph_4640616-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-5.jsonl b/split_edge/graph_4640616-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-6.jsonl b/split_edge/graph_4640616-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-7.jsonl b/split_edge/graph_4640616-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-8.jsonl b/split_edge/graph_4640616-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4640616-9.jsonl b/split_edge/graph_4640616-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-0.jsonl b/split_edge/graph_4643514-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-1.jsonl b/split_edge/graph_4643514-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-10.jsonl b/split_edge/graph_4643514-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-11.jsonl b/split_edge/graph_4643514-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-12.jsonl b/split_edge/graph_4643514-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-13.jsonl b/split_edge/graph_4643514-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-3.jsonl b/split_edge/graph_4643514-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-5.jsonl b/split_edge/graph_4643514-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-6.jsonl b/split_edge/graph_4643514-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4643514-9.jsonl b/split_edge/graph_4643514-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46656923-0.jsonl b/split_edge/graph_46656923-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46656923-1.jsonl b/split_edge/graph_46656923-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46656923-11.jsonl b/split_edge/graph_46656923-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46656923-29.jsonl b/split_edge/graph_46656923-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46656923-30.jsonl b/split_edge/graph_46656923-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46656923-8.jsonl b/split_edge/graph_46656923-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-0.jsonl b/split_edge/graph_4668902-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-10.jsonl b/split_edge/graph_4668902-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-13.jsonl b/split_edge/graph_4668902-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-19.jsonl b/split_edge/graph_4668902-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-20.jsonl b/split_edge/graph_4668902-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-21.jsonl b/split_edge/graph_4668902-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-22.jsonl b/split_edge/graph_4668902-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-5.jsonl b/split_edge/graph_4668902-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-7.jsonl b/split_edge/graph_4668902-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4668902-8.jsonl b/split_edge/graph_4668902-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46751642-0.jsonl b/split_edge/graph_46751642-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46751642-1.jsonl b/split_edge/graph_46751642-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46751642-4.jsonl b/split_edge/graph_46751642-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46889111-15.jsonl b/split_edge/graph_46889111-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46889111-7.jsonl b/split_edge/graph_46889111-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46889111-8.jsonl b/split_edge/graph_46889111-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46889111-9.jsonl b/split_edge/graph_46889111-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-1.jsonl b/split_edge/graph_46923041-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-10.jsonl b/split_edge/graph_46923041-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-11.jsonl b/split_edge/graph_46923041-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-12.jsonl b/split_edge/graph_46923041-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-13.jsonl b/split_edge/graph_46923041-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-14.jsonl b/split_edge/graph_46923041-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-15.jsonl b/split_edge/graph_46923041-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-17.jsonl b/split_edge/graph_46923041-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-18.jsonl b/split_edge/graph_46923041-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-19.jsonl b/split_edge/graph_46923041-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-2.jsonl b/split_edge/graph_46923041-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-3.jsonl b/split_edge/graph_46923041-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-4.jsonl b/split_edge/graph_46923041-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-6.jsonl b/split_edge/graph_46923041-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-7.jsonl b/split_edge/graph_46923041-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-8.jsonl b/split_edge/graph_46923041-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46923041-9.jsonl b/split_edge/graph_46923041-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-0.jsonl b/split_edge/graph_46943891-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-10.jsonl b/split_edge/graph_46943891-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-11.jsonl b/split_edge/graph_46943891-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-2.jsonl b/split_edge/graph_46943891-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-3.jsonl b/split_edge/graph_46943891-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-4.jsonl b/split_edge/graph_46943891-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-7.jsonl b/split_edge/graph_46943891-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-8.jsonl b/split_edge/graph_46943891-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46943891-9.jsonl b/split_edge/graph_46943891-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-0.jsonl b/split_edge/graph_46974387-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-1.jsonl b/split_edge/graph_46974387-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-3.jsonl b/split_edge/graph_46974387-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-4.jsonl b/split_edge/graph_46974387-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-5.jsonl b/split_edge/graph_46974387-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-6.jsonl b/split_edge/graph_46974387-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-7.jsonl b/split_edge/graph_46974387-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-8.jsonl b/split_edge/graph_46974387-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46974387-9.jsonl b/split_edge/graph_46974387-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-0.jsonl b/split_edge/graph_46976480-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-1.jsonl b/split_edge/graph_46976480-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-11.jsonl b/split_edge/graph_46976480-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-12.jsonl b/split_edge/graph_46976480-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-13.jsonl b/split_edge/graph_46976480-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-14.jsonl b/split_edge/graph_46976480-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-15.jsonl b/split_edge/graph_46976480-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-16.jsonl b/split_edge/graph_46976480-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-17.jsonl b/split_edge/graph_46976480-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-2.jsonl b/split_edge/graph_46976480-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-22.jsonl b/split_edge/graph_46976480-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-23.jsonl b/split_edge/graph_46976480-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-24.jsonl b/split_edge/graph_46976480-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-26.jsonl b/split_edge/graph_46976480-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-27.jsonl b/split_edge/graph_46976480-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-28.jsonl b/split_edge/graph_46976480-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-29.jsonl b/split_edge/graph_46976480-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-31.jsonl b/split_edge/graph_46976480-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-32.jsonl b/split_edge/graph_46976480-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-33.jsonl b/split_edge/graph_46976480-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-34.jsonl b/split_edge/graph_46976480-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-35.jsonl b/split_edge/graph_46976480-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-38.jsonl b/split_edge/graph_46976480-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-39.jsonl b/split_edge/graph_46976480-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-42.jsonl b/split_edge/graph_46976480-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-43.jsonl b/split_edge/graph_46976480-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-44.jsonl b/split_edge/graph_46976480-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-45.jsonl b/split_edge/graph_46976480-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-46.jsonl b/split_edge/graph_46976480-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-47.jsonl b/split_edge/graph_46976480-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-5.jsonl b/split_edge/graph_46976480-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-6.jsonl b/split_edge/graph_46976480-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-8.jsonl b/split_edge/graph_46976480-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_46976480-9.jsonl b/split_edge/graph_46976480-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-0.jsonl b/split_edge/graph_4697961-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-1.jsonl b/split_edge/graph_4697961-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-10.jsonl b/split_edge/graph_4697961-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-11.jsonl b/split_edge/graph_4697961-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-12.jsonl b/split_edge/graph_4697961-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-13.jsonl b/split_edge/graph_4697961-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-2.jsonl b/split_edge/graph_4697961-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-3.jsonl b/split_edge/graph_4697961-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-4.jsonl b/split_edge/graph_4697961-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-5.jsonl b/split_edge/graph_4697961-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-6.jsonl b/split_edge/graph_4697961-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-7.jsonl b/split_edge/graph_4697961-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-8.jsonl b/split_edge/graph_4697961-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4697961-9.jsonl b/split_edge/graph_4697961-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47017778-0.jsonl b/split_edge/graph_47017778-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-13.jsonl b/split_edge/graph_47020167-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-14.jsonl b/split_edge/graph_47020167-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-15.jsonl b/split_edge/graph_47020167-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-16.jsonl b/split_edge/graph_47020167-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-17.jsonl b/split_edge/graph_47020167-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-18.jsonl b/split_edge/graph_47020167-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-19.jsonl b/split_edge/graph_47020167-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-20.jsonl b/split_edge/graph_47020167-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-22.jsonl b/split_edge/graph_47020167-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-24.jsonl b/split_edge/graph_47020167-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-25.jsonl b/split_edge/graph_47020167-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-27.jsonl b/split_edge/graph_47020167-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-29.jsonl b/split_edge/graph_47020167-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-3.jsonl b/split_edge/graph_47020167-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-30.jsonl b/split_edge/graph_47020167-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-31.jsonl b/split_edge/graph_47020167-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-32.jsonl b/split_edge/graph_47020167-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-33.jsonl b/split_edge/graph_47020167-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_47020167-34.jsonl b/split_edge/graph_47020167-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-0.jsonl b/split_edge/graph_4710623-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-10.jsonl b/split_edge/graph_4710623-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-11.jsonl b/split_edge/graph_4710623-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-13.jsonl b/split_edge/graph_4710623-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-14.jsonl b/split_edge/graph_4710623-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-15.jsonl b/split_edge/graph_4710623-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-17.jsonl b/split_edge/graph_4710623-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-18.jsonl b/split_edge/graph_4710623-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-19.jsonl b/split_edge/graph_4710623-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-21.jsonl b/split_edge/graph_4710623-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-22.jsonl b/split_edge/graph_4710623-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-24.jsonl b/split_edge/graph_4710623-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-26.jsonl b/split_edge/graph_4710623-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-27.jsonl b/split_edge/graph_4710623-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-28.jsonl b/split_edge/graph_4710623-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-29.jsonl b/split_edge/graph_4710623-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-3.jsonl b/split_edge/graph_4710623-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-30.jsonl b/split_edge/graph_4710623-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-31.jsonl b/split_edge/graph_4710623-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-32.jsonl b/split_edge/graph_4710623-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-33.jsonl b/split_edge/graph_4710623-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-34.jsonl b/split_edge/graph_4710623-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-36.jsonl b/split_edge/graph_4710623-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-37.jsonl b/split_edge/graph_4710623-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-38.jsonl b/split_edge/graph_4710623-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-39.jsonl b/split_edge/graph_4710623-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-40.jsonl b/split_edge/graph_4710623-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-41.jsonl b/split_edge/graph_4710623-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-42.jsonl b/split_edge/graph_4710623-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-43.jsonl b/split_edge/graph_4710623-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-44.jsonl b/split_edge/graph_4710623-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-45.jsonl b/split_edge/graph_4710623-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-46.jsonl b/split_edge/graph_4710623-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-6.jsonl b/split_edge/graph_4710623-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-7.jsonl b/split_edge/graph_4710623-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-8.jsonl b/split_edge/graph_4710623-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4710623-9.jsonl b/split_edge/graph_4710623-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-0.jsonl b/split_edge/graph_4711681-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-1.jsonl b/split_edge/graph_4711681-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-11.jsonl b/split_edge/graph_4711681-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-13.jsonl b/split_edge/graph_4711681-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-2.jsonl b/split_edge/graph_4711681-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-3.jsonl b/split_edge/graph_4711681-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-4.jsonl b/split_edge/graph_4711681-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-5.jsonl b/split_edge/graph_4711681-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-6.jsonl b/split_edge/graph_4711681-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-7.jsonl b/split_edge/graph_4711681-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-8.jsonl b/split_edge/graph_4711681-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4711681-9.jsonl b/split_edge/graph_4711681-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-0.jsonl b/split_edge/graph_4718973-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-10.jsonl b/split_edge/graph_4718973-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-11.jsonl b/split_edge/graph_4718973-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-12.jsonl b/split_edge/graph_4718973-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-5.jsonl b/split_edge/graph_4718973-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-6.jsonl b/split_edge/graph_4718973-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-7.jsonl b/split_edge/graph_4718973-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-8.jsonl b/split_edge/graph_4718973-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4718973-9.jsonl b/split_edge/graph_4718973-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4776337-0.jsonl b/split_edge/graph_4776337-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4776337-1.jsonl b/split_edge/graph_4776337-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4776337-3.jsonl b/split_edge/graph_4776337-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4776337-4.jsonl b/split_edge/graph_4776337-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-0.jsonl b/split_edge/graph_4780353-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-1.jsonl b/split_edge/graph_4780353-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-10.jsonl b/split_edge/graph_4780353-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-11.jsonl b/split_edge/graph_4780353-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-13.jsonl b/split_edge/graph_4780353-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-14.jsonl b/split_edge/graph_4780353-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-15.jsonl b/split_edge/graph_4780353-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-16.jsonl b/split_edge/graph_4780353-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-17.jsonl b/split_edge/graph_4780353-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-20.jsonl b/split_edge/graph_4780353-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-21.jsonl b/split_edge/graph_4780353-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-22.jsonl b/split_edge/graph_4780353-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-23.jsonl b/split_edge/graph_4780353-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-26.jsonl b/split_edge/graph_4780353-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-27.jsonl b/split_edge/graph_4780353-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-29.jsonl b/split_edge/graph_4780353-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4780353-9.jsonl b/split_edge/graph_4780353-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-0.jsonl b/split_edge/graph_4811079-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-1.jsonl b/split_edge/graph_4811079-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-10.jsonl b/split_edge/graph_4811079-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-13.jsonl b/split_edge/graph_4811079-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-15.jsonl b/split_edge/graph_4811079-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-16.jsonl b/split_edge/graph_4811079-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-18.jsonl b/split_edge/graph_4811079-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-19.jsonl b/split_edge/graph_4811079-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-2.jsonl b/split_edge/graph_4811079-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-20.jsonl b/split_edge/graph_4811079-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-21.jsonl b/split_edge/graph_4811079-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-22.jsonl b/split_edge/graph_4811079-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-23.jsonl b/split_edge/graph_4811079-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-24.jsonl b/split_edge/graph_4811079-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-25.jsonl b/split_edge/graph_4811079-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-26.jsonl b/split_edge/graph_4811079-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-27.jsonl b/split_edge/graph_4811079-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-29.jsonl b/split_edge/graph_4811079-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-3.jsonl b/split_edge/graph_4811079-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-30.jsonl b/split_edge/graph_4811079-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-31.jsonl b/split_edge/graph_4811079-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-32.jsonl b/split_edge/graph_4811079-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-33.jsonl b/split_edge/graph_4811079-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-34.jsonl b/split_edge/graph_4811079-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-35.jsonl b/split_edge/graph_4811079-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-36.jsonl b/split_edge/graph_4811079-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-38.jsonl b/split_edge/graph_4811079-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-39.jsonl b/split_edge/graph_4811079-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-4.jsonl b/split_edge/graph_4811079-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-40.jsonl b/split_edge/graph_4811079-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-41.jsonl b/split_edge/graph_4811079-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-42.jsonl b/split_edge/graph_4811079-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-43.jsonl b/split_edge/graph_4811079-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-44.jsonl b/split_edge/graph_4811079-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-48.jsonl b/split_edge/graph_4811079-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-5.jsonl b/split_edge/graph_4811079-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-51.jsonl b/split_edge/graph_4811079-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-52.jsonl b/split_edge/graph_4811079-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-53.jsonl b/split_edge/graph_4811079-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-54.jsonl b/split_edge/graph_4811079-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-55.jsonl b/split_edge/graph_4811079-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-6.jsonl b/split_edge/graph_4811079-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4811079-7.jsonl b/split_edge/graph_4811079-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-0.jsonl b/split_edge/graph_48272-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-13.jsonl b/split_edge/graph_48272-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-15.jsonl b/split_edge/graph_48272-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-16.jsonl b/split_edge/graph_48272-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-17.jsonl b/split_edge/graph_48272-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-18.jsonl b/split_edge/graph_48272-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-19.jsonl b/split_edge/graph_48272-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-20.jsonl b/split_edge/graph_48272-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-21.jsonl b/split_edge/graph_48272-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-24.jsonl b/split_edge/graph_48272-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-25.jsonl b/split_edge/graph_48272-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-26.jsonl b/split_edge/graph_48272-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-27.jsonl b/split_edge/graph_48272-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-29.jsonl b/split_edge/graph_48272-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-30.jsonl b/split_edge/graph_48272-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-31.jsonl b/split_edge/graph_48272-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-32.jsonl b/split_edge/graph_48272-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-33.jsonl b/split_edge/graph_48272-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-35.jsonl b/split_edge/graph_48272-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-36.jsonl b/split_edge/graph_48272-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-38.jsonl b/split_edge/graph_48272-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-4.jsonl b/split_edge/graph_48272-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-41.jsonl b/split_edge/graph_48272-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-5.jsonl b/split_edge/graph_48272-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-7.jsonl b/split_edge/graph_48272-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_48272-8.jsonl b/split_edge/graph_48272-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4855722-0.jsonl b/split_edge/graph_4855722-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4855722-3.jsonl b/split_edge/graph_4855722-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4855722-4.jsonl b/split_edge/graph_4855722-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4855722-5.jsonl b/split_edge/graph_4855722-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4855722-6.jsonl b/split_edge/graph_4855722-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4855722-8.jsonl b/split_edge/graph_4855722-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-0.jsonl b/split_edge/graph_4915696-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-1.jsonl b/split_edge/graph_4915696-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-10.jsonl b/split_edge/graph_4915696-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-12.jsonl b/split_edge/graph_4915696-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-13.jsonl b/split_edge/graph_4915696-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-15.jsonl b/split_edge/graph_4915696-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-16.jsonl b/split_edge/graph_4915696-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-17.jsonl b/split_edge/graph_4915696-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-18.jsonl b/split_edge/graph_4915696-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-19.jsonl b/split_edge/graph_4915696-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-2.jsonl b/split_edge/graph_4915696-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-20.jsonl b/split_edge/graph_4915696-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-21.jsonl b/split_edge/graph_4915696-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-22.jsonl b/split_edge/graph_4915696-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-23.jsonl b/split_edge/graph_4915696-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-24.jsonl b/split_edge/graph_4915696-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-25.jsonl b/split_edge/graph_4915696-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-26.jsonl b/split_edge/graph_4915696-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-28.jsonl b/split_edge/graph_4915696-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-29.jsonl b/split_edge/graph_4915696-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-3.jsonl b/split_edge/graph_4915696-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-30.jsonl b/split_edge/graph_4915696-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-31.jsonl b/split_edge/graph_4915696-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-5.jsonl b/split_edge/graph_4915696-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-6.jsonl b/split_edge/graph_4915696-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-7.jsonl b/split_edge/graph_4915696-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4915696-9.jsonl b/split_edge/graph_4915696-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-0.jsonl b/split_edge/graph_4929298-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-10.jsonl b/split_edge/graph_4929298-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-11.jsonl b/split_edge/graph_4929298-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-12.jsonl b/split_edge/graph_4929298-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-13.jsonl b/split_edge/graph_4929298-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-14.jsonl b/split_edge/graph_4929298-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-15.jsonl b/split_edge/graph_4929298-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-16.jsonl b/split_edge/graph_4929298-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-18.jsonl b/split_edge/graph_4929298-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-19.jsonl b/split_edge/graph_4929298-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-2.jsonl b/split_edge/graph_4929298-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-27.jsonl b/split_edge/graph_4929298-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-28.jsonl b/split_edge/graph_4929298-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-29.jsonl b/split_edge/graph_4929298-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-3.jsonl b/split_edge/graph_4929298-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-30.jsonl b/split_edge/graph_4929298-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-31.jsonl b/split_edge/graph_4929298-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-32.jsonl b/split_edge/graph_4929298-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-33.jsonl b/split_edge/graph_4929298-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-4.jsonl b/split_edge/graph_4929298-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-6.jsonl b/split_edge/graph_4929298-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-7.jsonl b/split_edge/graph_4929298-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-8.jsonl b/split_edge/graph_4929298-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4929298-9.jsonl b/split_edge/graph_4929298-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-0.jsonl b/split_edge/graph_49391103-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-1.jsonl b/split_edge/graph_49391103-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-2.jsonl b/split_edge/graph_49391103-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-3.jsonl b/split_edge/graph_49391103-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-4.jsonl b/split_edge/graph_49391103-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-5.jsonl b/split_edge/graph_49391103-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-6.jsonl b/split_edge/graph_49391103-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49391103-7.jsonl b/split_edge/graph_49391103-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-0.jsonl b/split_edge/graph_49411802-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-10.jsonl b/split_edge/graph_49411802-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-12.jsonl b/split_edge/graph_49411802-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-13.jsonl b/split_edge/graph_49411802-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-2.jsonl b/split_edge/graph_49411802-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-6.jsonl b/split_edge/graph_49411802-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-7.jsonl b/split_edge/graph_49411802-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-8.jsonl b/split_edge/graph_49411802-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49411802-9.jsonl b/split_edge/graph_49411802-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-1.jsonl b/split_edge/graph_4943134-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-10.jsonl b/split_edge/graph_4943134-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-11.jsonl b/split_edge/graph_4943134-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-12.jsonl b/split_edge/graph_4943134-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-13.jsonl b/split_edge/graph_4943134-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-15.jsonl b/split_edge/graph_4943134-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-16.jsonl b/split_edge/graph_4943134-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-17.jsonl b/split_edge/graph_4943134-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-18.jsonl b/split_edge/graph_4943134-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-19.jsonl b/split_edge/graph_4943134-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-20.jsonl b/split_edge/graph_4943134-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-21.jsonl b/split_edge/graph_4943134-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-22.jsonl b/split_edge/graph_4943134-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-23.jsonl b/split_edge/graph_4943134-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-24.jsonl b/split_edge/graph_4943134-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-25.jsonl b/split_edge/graph_4943134-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-26.jsonl b/split_edge/graph_4943134-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-27.jsonl b/split_edge/graph_4943134-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-29.jsonl b/split_edge/graph_4943134-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-3.jsonl b/split_edge/graph_4943134-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-30.jsonl b/split_edge/graph_4943134-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-31.jsonl b/split_edge/graph_4943134-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-32.jsonl b/split_edge/graph_4943134-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-4.jsonl b/split_edge/graph_4943134-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-5.jsonl b/split_edge/graph_4943134-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-6.jsonl b/split_edge/graph_4943134-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-7.jsonl b/split_edge/graph_4943134-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-8.jsonl b/split_edge/graph_4943134-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_4943134-9.jsonl b/split_edge/graph_4943134-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-11.jsonl b/split_edge/graph_49478096-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-12.jsonl b/split_edge/graph_49478096-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-13.jsonl b/split_edge/graph_49478096-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-14.jsonl b/split_edge/graph_49478096-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-15.jsonl b/split_edge/graph_49478096-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-16.jsonl b/split_edge/graph_49478096-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-17.jsonl b/split_edge/graph_49478096-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-18.jsonl b/split_edge/graph_49478096-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-21.jsonl b/split_edge/graph_49478096-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-22.jsonl b/split_edge/graph_49478096-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-23.jsonl b/split_edge/graph_49478096-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-8.jsonl b/split_edge/graph_49478096-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49478096-9.jsonl b/split_edge/graph_49478096-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49480830-0.jsonl b/split_edge/graph_49480830-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49480830-10.jsonl b/split_edge/graph_49480830-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49480830-3.jsonl b/split_edge/graph_49480830-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49480830-4.jsonl b/split_edge/graph_49480830-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49480830-5.jsonl b/split_edge/graph_49480830-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49480830-6.jsonl b/split_edge/graph_49480830-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49480830-8.jsonl b/split_edge/graph_49480830-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49563935-0.jsonl b/split_edge/graph_49563935-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49563935-11.jsonl b/split_edge/graph_49563935-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49563935-12.jsonl b/split_edge/graph_49563935-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49563935-13.jsonl b/split_edge/graph_49563935-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-0.jsonl b/split_edge/graph_49862415-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-10.jsonl b/split_edge/graph_49862415-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-11.jsonl b/split_edge/graph_49862415-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-12.jsonl b/split_edge/graph_49862415-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-13.jsonl b/split_edge/graph_49862415-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-14.jsonl b/split_edge/graph_49862415-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-15.jsonl b/split_edge/graph_49862415-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-17.jsonl b/split_edge/graph_49862415-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-18.jsonl b/split_edge/graph_49862415-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-19.jsonl b/split_edge/graph_49862415-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-2.jsonl b/split_edge/graph_49862415-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-20.jsonl b/split_edge/graph_49862415-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-21.jsonl b/split_edge/graph_49862415-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-22.jsonl b/split_edge/graph_49862415-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-23.jsonl b/split_edge/graph_49862415-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-24.jsonl b/split_edge/graph_49862415-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-3.jsonl b/split_edge/graph_49862415-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-5.jsonl b/split_edge/graph_49862415-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-6.jsonl b/split_edge/graph_49862415-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-7.jsonl b/split_edge/graph_49862415-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-8.jsonl b/split_edge/graph_49862415-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_49862415-9.jsonl b/split_edge/graph_49862415-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5032773-0.jsonl b/split_edge/graph_5032773-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5032773-2.jsonl b/split_edge/graph_5032773-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5032773-3.jsonl b/split_edge/graph_5032773-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5032773-4.jsonl b/split_edge/graph_5032773-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5032773-6.jsonl b/split_edge/graph_5032773-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5032773-7.jsonl b/split_edge/graph_5032773-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-0.jsonl b/split_edge/graph_505040-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-1.jsonl b/split_edge/graph_505040-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-10.jsonl b/split_edge/graph_505040-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-11.jsonl b/split_edge/graph_505040-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-12.jsonl b/split_edge/graph_505040-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-15.jsonl b/split_edge/graph_505040-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-16.jsonl b/split_edge/graph_505040-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-17.jsonl b/split_edge/graph_505040-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-18.jsonl b/split_edge/graph_505040-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-2.jsonl b/split_edge/graph_505040-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-20.jsonl b/split_edge/graph_505040-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-22.jsonl b/split_edge/graph_505040-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-23.jsonl b/split_edge/graph_505040-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-24.jsonl b/split_edge/graph_505040-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-25.jsonl b/split_edge/graph_505040-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-4.jsonl b/split_edge/graph_505040-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-5.jsonl b/split_edge/graph_505040-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-6.jsonl b/split_edge/graph_505040-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_505040-9.jsonl b/split_edge/graph_505040-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5087831-0.jsonl b/split_edge/graph_5087831-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5087831-2.jsonl b/split_edge/graph_5087831-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5087831-4.jsonl b/split_edge/graph_5087831-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5087831-5.jsonl b/split_edge/graph_5087831-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5087831-6.jsonl b/split_edge/graph_5087831-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5087831-7.jsonl b/split_edge/graph_5087831-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-0.jsonl b/split_edge/graph_51338-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-1.jsonl b/split_edge/graph_51338-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-11.jsonl b/split_edge/graph_51338-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-13.jsonl b/split_edge/graph_51338-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-14.jsonl b/split_edge/graph_51338-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-15.jsonl b/split_edge/graph_51338-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-16.jsonl b/split_edge/graph_51338-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-17.jsonl b/split_edge/graph_51338-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-20.jsonl b/split_edge/graph_51338-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-23.jsonl b/split_edge/graph_51338-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-24.jsonl b/split_edge/graph_51338-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-26.jsonl b/split_edge/graph_51338-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-29.jsonl b/split_edge/graph_51338-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-6.jsonl b/split_edge/graph_51338-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51338-7.jsonl b/split_edge/graph_51338-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51732913-0.jsonl b/split_edge/graph_51732913-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51732913-10.jsonl b/split_edge/graph_51732913-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51732913-11.jsonl b/split_edge/graph_51732913-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51732913-13.jsonl b/split_edge/graph_51732913-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51743013-4.jsonl b/split_edge/graph_51743013-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-0.jsonl b/split_edge/graph_51768512-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-1.jsonl b/split_edge/graph_51768512-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-10.jsonl b/split_edge/graph_51768512-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-12.jsonl b/split_edge/graph_51768512-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-14.jsonl b/split_edge/graph_51768512-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-15.jsonl b/split_edge/graph_51768512-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-16.jsonl b/split_edge/graph_51768512-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-17.jsonl b/split_edge/graph_51768512-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-18.jsonl b/split_edge/graph_51768512-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-2.jsonl b/split_edge/graph_51768512-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-20.jsonl b/split_edge/graph_51768512-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-21.jsonl b/split_edge/graph_51768512-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-22.jsonl b/split_edge/graph_51768512-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-24.jsonl b/split_edge/graph_51768512-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-25.jsonl b/split_edge/graph_51768512-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-26.jsonl b/split_edge/graph_51768512-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-27.jsonl b/split_edge/graph_51768512-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-29.jsonl b/split_edge/graph_51768512-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-3.jsonl b/split_edge/graph_51768512-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-31.jsonl b/split_edge/graph_51768512-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-33.jsonl b/split_edge/graph_51768512-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-37.jsonl b/split_edge/graph_51768512-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-39.jsonl b/split_edge/graph_51768512-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-4.jsonl b/split_edge/graph_51768512-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-40.jsonl b/split_edge/graph_51768512-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-42.jsonl b/split_edge/graph_51768512-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-5.jsonl b/split_edge/graph_51768512-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-6.jsonl b/split_edge/graph_51768512-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-7.jsonl b/split_edge/graph_51768512-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-8.jsonl b/split_edge/graph_51768512-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51768512-9.jsonl b/split_edge/graph_51768512-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51848460-14.jsonl b/split_edge/graph_51848460-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51848460-16.jsonl b/split_edge/graph_51848460-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51848460-2.jsonl b/split_edge/graph_51848460-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51848460-21.jsonl b/split_edge/graph_51848460-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51848460-23.jsonl b/split_edge/graph_51848460-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-0.jsonl b/split_edge/graph_51870144-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-1.jsonl b/split_edge/graph_51870144-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-2.jsonl b/split_edge/graph_51870144-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-3.jsonl b/split_edge/graph_51870144-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-4.jsonl b/split_edge/graph_51870144-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-5.jsonl b/split_edge/graph_51870144-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-6.jsonl b/split_edge/graph_51870144-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-7.jsonl b/split_edge/graph_51870144-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-8.jsonl b/split_edge/graph_51870144-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51870144-9.jsonl b/split_edge/graph_51870144-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-0.jsonl b/split_edge/graph_51878096-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-1.jsonl b/split_edge/graph_51878096-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-10.jsonl b/split_edge/graph_51878096-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-2.jsonl b/split_edge/graph_51878096-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-3.jsonl b/split_edge/graph_51878096-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-4.jsonl b/split_edge/graph_51878096-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-5.jsonl b/split_edge/graph_51878096-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-6.jsonl b/split_edge/graph_51878096-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-7.jsonl b/split_edge/graph_51878096-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-8.jsonl b/split_edge/graph_51878096-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51878096-9.jsonl b/split_edge/graph_51878096-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-1.jsonl b/split_edge/graph_51880828-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-10.jsonl b/split_edge/graph_51880828-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-12.jsonl b/split_edge/graph_51880828-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-13.jsonl b/split_edge/graph_51880828-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-15.jsonl b/split_edge/graph_51880828-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-16.jsonl b/split_edge/graph_51880828-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-17.jsonl b/split_edge/graph_51880828-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-18.jsonl b/split_edge/graph_51880828-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-2.jsonl b/split_edge/graph_51880828-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-3.jsonl b/split_edge/graph_51880828-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-4.jsonl b/split_edge/graph_51880828-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-5.jsonl b/split_edge/graph_51880828-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-6.jsonl b/split_edge/graph_51880828-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-7.jsonl b/split_edge/graph_51880828-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-8.jsonl b/split_edge/graph_51880828-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51880828-9.jsonl b/split_edge/graph_51880828-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51929263-1.jsonl b/split_edge/graph_51929263-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51929263-2.jsonl b/split_edge/graph_51929263-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51929263-3.jsonl b/split_edge/graph_51929263-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51929263-4.jsonl b/split_edge/graph_51929263-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51929263-5.jsonl b/split_edge/graph_51929263-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51929263-6.jsonl b/split_edge/graph_51929263-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-0.jsonl b/split_edge/graph_51965847-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-1.jsonl b/split_edge/graph_51965847-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-11.jsonl b/split_edge/graph_51965847-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-16.jsonl b/split_edge/graph_51965847-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-17.jsonl b/split_edge/graph_51965847-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-18.jsonl b/split_edge/graph_51965847-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-26.jsonl b/split_edge/graph_51965847-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-27.jsonl b/split_edge/graph_51965847-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-29.jsonl b/split_edge/graph_51965847-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-3.jsonl b/split_edge/graph_51965847-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-31.jsonl b/split_edge/graph_51965847-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-32.jsonl b/split_edge/graph_51965847-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-33.jsonl b/split_edge/graph_51965847-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-34.jsonl b/split_edge/graph_51965847-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-36.jsonl b/split_edge/graph_51965847-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-5.jsonl b/split_edge/graph_51965847-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-7.jsonl b/split_edge/graph_51965847-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51965847-9.jsonl b/split_edge/graph_51965847-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51987067-1.jsonl b/split_edge/graph_51987067-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51987067-10.jsonl b/split_edge/graph_51987067-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51987067-11.jsonl b/split_edge/graph_51987067-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51987067-6.jsonl b/split_edge/graph_51987067-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51987067-7.jsonl b/split_edge/graph_51987067-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51987067-8.jsonl b/split_edge/graph_51987067-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_51987067-9.jsonl b/split_edge/graph_51987067-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-1.jsonl b/split_edge/graph_52069634-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-10.jsonl b/split_edge/graph_52069634-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-11.jsonl b/split_edge/graph_52069634-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-12.jsonl b/split_edge/graph_52069634-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-13.jsonl b/split_edge/graph_52069634-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-14.jsonl b/split_edge/graph_52069634-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-16.jsonl b/split_edge/graph_52069634-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-17.jsonl b/split_edge/graph_52069634-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-18.jsonl b/split_edge/graph_52069634-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-20.jsonl b/split_edge/graph_52069634-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-21.jsonl b/split_edge/graph_52069634-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-23.jsonl b/split_edge/graph_52069634-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-27.jsonl b/split_edge/graph_52069634-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-28.jsonl b/split_edge/graph_52069634-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-29.jsonl b/split_edge/graph_52069634-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-3.jsonl b/split_edge/graph_52069634-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-30.jsonl b/split_edge/graph_52069634-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-31.jsonl b/split_edge/graph_52069634-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-32.jsonl b/split_edge/graph_52069634-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-33.jsonl b/split_edge/graph_52069634-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-4.jsonl b/split_edge/graph_52069634-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-5.jsonl b/split_edge/graph_52069634-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-6.jsonl b/split_edge/graph_52069634-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52069634-8.jsonl b/split_edge/graph_52069634-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-0.jsonl b/split_edge/graph_52152458-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-1.jsonl b/split_edge/graph_52152458-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-19.jsonl b/split_edge/graph_52152458-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-21.jsonl b/split_edge/graph_52152458-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-22.jsonl b/split_edge/graph_52152458-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-23.jsonl b/split_edge/graph_52152458-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-24.jsonl b/split_edge/graph_52152458-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-26.jsonl b/split_edge/graph_52152458-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-27.jsonl b/split_edge/graph_52152458-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-29.jsonl b/split_edge/graph_52152458-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-30.jsonl b/split_edge/graph_52152458-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-4.jsonl b/split_edge/graph_52152458-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52152458-5.jsonl b/split_edge/graph_52152458-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52157803-1.jsonl b/split_edge/graph_52157803-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52157803-12.jsonl b/split_edge/graph_52157803-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52157803-13.jsonl b/split_edge/graph_52157803-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52157803-14.jsonl b/split_edge/graph_52157803-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52157803-19.jsonl b/split_edge/graph_52157803-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52157803-2.jsonl b/split_edge/graph_52157803-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-0.jsonl b/split_edge/graph_52226318-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-10.jsonl b/split_edge/graph_52226318-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-12.jsonl b/split_edge/graph_52226318-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-13.jsonl b/split_edge/graph_52226318-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-14.jsonl b/split_edge/graph_52226318-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-15.jsonl b/split_edge/graph_52226318-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-16.jsonl b/split_edge/graph_52226318-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-2.jsonl b/split_edge/graph_52226318-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-5.jsonl b/split_edge/graph_52226318-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-8.jsonl b/split_edge/graph_52226318-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52226318-9.jsonl b/split_edge/graph_52226318-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-0.jsonl b/split_edge/graph_52278595-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-1.jsonl b/split_edge/graph_52278595-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-13.jsonl b/split_edge/graph_52278595-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-14.jsonl b/split_edge/graph_52278595-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-2.jsonl b/split_edge/graph_52278595-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-3.jsonl b/split_edge/graph_52278595-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-4.jsonl b/split_edge/graph_52278595-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-5.jsonl b/split_edge/graph_52278595-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-6.jsonl b/split_edge/graph_52278595-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-8.jsonl b/split_edge/graph_52278595-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52278595-9.jsonl b/split_edge/graph_52278595-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-0.jsonl b/split_edge/graph_52301066-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-1.jsonl b/split_edge/graph_52301066-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-10.jsonl b/split_edge/graph_52301066-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-11.jsonl b/split_edge/graph_52301066-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-12.jsonl b/split_edge/graph_52301066-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-13.jsonl b/split_edge/graph_52301066-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-15.jsonl b/split_edge/graph_52301066-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-16.jsonl b/split_edge/graph_52301066-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-17.jsonl b/split_edge/graph_52301066-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-18.jsonl b/split_edge/graph_52301066-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-19.jsonl b/split_edge/graph_52301066-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-2.jsonl b/split_edge/graph_52301066-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-20.jsonl b/split_edge/graph_52301066-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-21.jsonl b/split_edge/graph_52301066-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-22.jsonl b/split_edge/graph_52301066-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-24.jsonl b/split_edge/graph_52301066-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-25.jsonl b/split_edge/graph_52301066-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-26.jsonl b/split_edge/graph_52301066-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-27.jsonl b/split_edge/graph_52301066-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-28.jsonl b/split_edge/graph_52301066-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-29.jsonl b/split_edge/graph_52301066-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-3.jsonl b/split_edge/graph_52301066-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-30.jsonl b/split_edge/graph_52301066-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-31.jsonl b/split_edge/graph_52301066-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-33.jsonl b/split_edge/graph_52301066-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-34.jsonl b/split_edge/graph_52301066-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-35.jsonl b/split_edge/graph_52301066-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-38.jsonl b/split_edge/graph_52301066-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-39.jsonl b/split_edge/graph_52301066-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-4.jsonl b/split_edge/graph_52301066-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-40.jsonl b/split_edge/graph_52301066-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-41.jsonl b/split_edge/graph_52301066-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-42.jsonl b/split_edge/graph_52301066-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-43.jsonl b/split_edge/graph_52301066-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-44.jsonl b/split_edge/graph_52301066-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-45.jsonl b/split_edge/graph_52301066-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-46.jsonl b/split_edge/graph_52301066-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-47.jsonl b/split_edge/graph_52301066-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-48.jsonl b/split_edge/graph_52301066-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-5.jsonl b/split_edge/graph_52301066-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-6.jsonl b/split_edge/graph_52301066-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-7.jsonl b/split_edge/graph_52301066-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-8.jsonl b/split_edge/graph_52301066-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52301066-9.jsonl b/split_edge/graph_52301066-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-0.jsonl b/split_edge/graph_525062-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-1.jsonl b/split_edge/graph_525062-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-10.jsonl b/split_edge/graph_525062-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-12.jsonl b/split_edge/graph_525062-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-13.jsonl b/split_edge/graph_525062-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-14.jsonl b/split_edge/graph_525062-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-15.jsonl b/split_edge/graph_525062-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-16.jsonl b/split_edge/graph_525062-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-19.jsonl b/split_edge/graph_525062-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-20.jsonl b/split_edge/graph_525062-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-21.jsonl b/split_edge/graph_525062-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-22.jsonl b/split_edge/graph_525062-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-24.jsonl b/split_edge/graph_525062-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-26.jsonl b/split_edge/graph_525062-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-27.jsonl b/split_edge/graph_525062-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-3.jsonl b/split_edge/graph_525062-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-30.jsonl b/split_edge/graph_525062-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-32.jsonl b/split_edge/graph_525062-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-4.jsonl b/split_edge/graph_525062-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-8.jsonl b/split_edge/graph_525062-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_525062-9.jsonl b/split_edge/graph_525062-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-0.jsonl b/split_edge/graph_52844161-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-11.jsonl b/split_edge/graph_52844161-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-12.jsonl b/split_edge/graph_52844161-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-13.jsonl b/split_edge/graph_52844161-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-15.jsonl b/split_edge/graph_52844161-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-17.jsonl b/split_edge/graph_52844161-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-2.jsonl b/split_edge/graph_52844161-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-3.jsonl b/split_edge/graph_52844161-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-6.jsonl b/split_edge/graph_52844161-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-7.jsonl b/split_edge/graph_52844161-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-8.jsonl b/split_edge/graph_52844161-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52844161-9.jsonl b/split_edge/graph_52844161-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-0.jsonl b/split_edge/graph_52879114-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-1.jsonl b/split_edge/graph_52879114-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-10.jsonl b/split_edge/graph_52879114-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-11.jsonl b/split_edge/graph_52879114-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-13.jsonl b/split_edge/graph_52879114-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-15.jsonl b/split_edge/graph_52879114-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-16.jsonl b/split_edge/graph_52879114-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-17.jsonl b/split_edge/graph_52879114-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-3.jsonl b/split_edge/graph_52879114-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-4.jsonl b/split_edge/graph_52879114-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-5.jsonl b/split_edge/graph_52879114-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-6.jsonl b/split_edge/graph_52879114-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-8.jsonl b/split_edge/graph_52879114-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52879114-9.jsonl b/split_edge/graph_52879114-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52894928-0.jsonl b/split_edge/graph_52894928-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52894928-1.jsonl b/split_edge/graph_52894928-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52894928-3.jsonl b/split_edge/graph_52894928-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52894928-4.jsonl b/split_edge/graph_52894928-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52894928-5.jsonl b/split_edge/graph_52894928-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-0.jsonl b/split_edge/graph_52898497-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-2.jsonl b/split_edge/graph_52898497-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-3.jsonl b/split_edge/graph_52898497-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-4.jsonl b/split_edge/graph_52898497-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-5.jsonl b/split_edge/graph_52898497-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-6.jsonl b/split_edge/graph_52898497-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-7.jsonl b/split_edge/graph_52898497-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52898497-8.jsonl b/split_edge/graph_52898497-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-0.jsonl b/split_edge/graph_52904093-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-1.jsonl b/split_edge/graph_52904093-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-10.jsonl b/split_edge/graph_52904093-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-12.jsonl b/split_edge/graph_52904093-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-13.jsonl b/split_edge/graph_52904093-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-14.jsonl b/split_edge/graph_52904093-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-15.jsonl b/split_edge/graph_52904093-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-16.jsonl b/split_edge/graph_52904093-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-17.jsonl b/split_edge/graph_52904093-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-18.jsonl b/split_edge/graph_52904093-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-19.jsonl b/split_edge/graph_52904093-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-2.jsonl b/split_edge/graph_52904093-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-20.jsonl b/split_edge/graph_52904093-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-21.jsonl b/split_edge/graph_52904093-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-22.jsonl b/split_edge/graph_52904093-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-23.jsonl b/split_edge/graph_52904093-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-24.jsonl b/split_edge/graph_52904093-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-25.jsonl b/split_edge/graph_52904093-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-26.jsonl b/split_edge/graph_52904093-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-27.jsonl b/split_edge/graph_52904093-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-3.jsonl b/split_edge/graph_52904093-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-4.jsonl b/split_edge/graph_52904093-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-5.jsonl b/split_edge/graph_52904093-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-6.jsonl b/split_edge/graph_52904093-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-7.jsonl b/split_edge/graph_52904093-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52904093-9.jsonl b/split_edge/graph_52904093-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-0.jsonl b/split_edge/graph_52981002-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-1.jsonl b/split_edge/graph_52981002-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-10.jsonl b/split_edge/graph_52981002-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-11.jsonl b/split_edge/graph_52981002-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-12.jsonl b/split_edge/graph_52981002-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-13.jsonl b/split_edge/graph_52981002-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-14.jsonl b/split_edge/graph_52981002-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-15.jsonl b/split_edge/graph_52981002-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-16.jsonl b/split_edge/graph_52981002-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-17.jsonl b/split_edge/graph_52981002-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-18.jsonl b/split_edge/graph_52981002-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-2.jsonl b/split_edge/graph_52981002-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-3.jsonl b/split_edge/graph_52981002-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-4.jsonl b/split_edge/graph_52981002-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-6.jsonl b/split_edge/graph_52981002-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-7.jsonl b/split_edge/graph_52981002-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-8.jsonl b/split_edge/graph_52981002-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52981002-9.jsonl b/split_edge/graph_52981002-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52986761-0.jsonl b/split_edge/graph_52986761-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52986761-1.jsonl b/split_edge/graph_52986761-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52986761-2.jsonl b/split_edge/graph_52986761-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52986761-3.jsonl b/split_edge/graph_52986761-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52986761-4.jsonl b/split_edge/graph_52986761-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52986761-5.jsonl b/split_edge/graph_52986761-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52999735-1.jsonl b/split_edge/graph_52999735-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_52999735-2.jsonl b/split_edge/graph_52999735-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-0.jsonl b/split_edge/graph_53036262-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-2.jsonl b/split_edge/graph_53036262-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-3.jsonl b/split_edge/graph_53036262-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-4.jsonl b/split_edge/graph_53036262-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-5.jsonl b/split_edge/graph_53036262-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-6.jsonl b/split_edge/graph_53036262-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-7.jsonl b/split_edge/graph_53036262-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036262-8.jsonl b/split_edge/graph_53036262-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-0.jsonl b/split_edge/graph_53036589-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-10.jsonl b/split_edge/graph_53036589-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-11.jsonl b/split_edge/graph_53036589-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-12.jsonl b/split_edge/graph_53036589-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-13.jsonl b/split_edge/graph_53036589-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-14.jsonl b/split_edge/graph_53036589-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-15.jsonl b/split_edge/graph_53036589-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-16.jsonl b/split_edge/graph_53036589-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-17.jsonl b/split_edge/graph_53036589-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-18.jsonl b/split_edge/graph_53036589-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-19.jsonl b/split_edge/graph_53036589-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-2.jsonl b/split_edge/graph_53036589-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-21.jsonl b/split_edge/graph_53036589-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-24.jsonl b/split_edge/graph_53036589-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-25.jsonl b/split_edge/graph_53036589-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-26.jsonl b/split_edge/graph_53036589-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-27.jsonl b/split_edge/graph_53036589-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-3.jsonl b/split_edge/graph_53036589-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-4.jsonl b/split_edge/graph_53036589-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-6.jsonl b/split_edge/graph_53036589-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-7.jsonl b/split_edge/graph_53036589-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53036589-8.jsonl b/split_edge/graph_53036589-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-0.jsonl b/split_edge/graph_53042493-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-1.jsonl b/split_edge/graph_53042493-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-13.jsonl b/split_edge/graph_53042493-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-14.jsonl b/split_edge/graph_53042493-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-16.jsonl b/split_edge/graph_53042493-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-17.jsonl b/split_edge/graph_53042493-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-18.jsonl b/split_edge/graph_53042493-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-19.jsonl b/split_edge/graph_53042493-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-2.jsonl b/split_edge/graph_53042493-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-20.jsonl b/split_edge/graph_53042493-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-21.jsonl b/split_edge/graph_53042493-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-22.jsonl b/split_edge/graph_53042493-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-3.jsonl b/split_edge/graph_53042493-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-4.jsonl b/split_edge/graph_53042493-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-5.jsonl b/split_edge/graph_53042493-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-6.jsonl b/split_edge/graph_53042493-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-7.jsonl b/split_edge/graph_53042493-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-8.jsonl b/split_edge/graph_53042493-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53042493-9.jsonl b/split_edge/graph_53042493-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53068095-0.jsonl b/split_edge/graph_53068095-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53068095-4.jsonl b/split_edge/graph_53068095-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-10.jsonl b/split_edge/graph_5310274-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-11.jsonl b/split_edge/graph_5310274-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-13.jsonl b/split_edge/graph_5310274-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-14.jsonl b/split_edge/graph_5310274-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-15.jsonl b/split_edge/graph_5310274-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-16.jsonl b/split_edge/graph_5310274-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-17.jsonl b/split_edge/graph_5310274-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-18.jsonl b/split_edge/graph_5310274-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-19.jsonl b/split_edge/graph_5310274-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-20.jsonl b/split_edge/graph_5310274-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-21.jsonl b/split_edge/graph_5310274-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-22.jsonl b/split_edge/graph_5310274-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-23.jsonl b/split_edge/graph_5310274-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5310274-9.jsonl b/split_edge/graph_5310274-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-0.jsonl b/split_edge/graph_53106966-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-1.jsonl b/split_edge/graph_53106966-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-10.jsonl b/split_edge/graph_53106966-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-2.jsonl b/split_edge/graph_53106966-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-3.jsonl b/split_edge/graph_53106966-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-4.jsonl b/split_edge/graph_53106966-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-5.jsonl b/split_edge/graph_53106966-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-6.jsonl b/split_edge/graph_53106966-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-7.jsonl b/split_edge/graph_53106966-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-8.jsonl b/split_edge/graph_53106966-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53106966-9.jsonl b/split_edge/graph_53106966-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-0.jsonl b/split_edge/graph_53209415-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-10.jsonl b/split_edge/graph_53209415-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-11.jsonl b/split_edge/graph_53209415-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-12.jsonl b/split_edge/graph_53209415-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-14.jsonl b/split_edge/graph_53209415-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-15.jsonl b/split_edge/graph_53209415-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-16.jsonl b/split_edge/graph_53209415-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-17.jsonl b/split_edge/graph_53209415-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-18.jsonl b/split_edge/graph_53209415-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-20.jsonl b/split_edge/graph_53209415-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-21.jsonl b/split_edge/graph_53209415-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-25.jsonl b/split_edge/graph_53209415-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-28.jsonl b/split_edge/graph_53209415-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-29.jsonl b/split_edge/graph_53209415-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-30.jsonl b/split_edge/graph_53209415-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-31.jsonl b/split_edge/graph_53209415-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-32.jsonl b/split_edge/graph_53209415-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-4.jsonl b/split_edge/graph_53209415-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-6.jsonl b/split_edge/graph_53209415-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-8.jsonl b/split_edge/graph_53209415-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53209415-9.jsonl b/split_edge/graph_53209415-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53213623-0.jsonl b/split_edge/graph_53213623-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53213623-3.jsonl b/split_edge/graph_53213623-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53213623-5.jsonl b/split_edge/graph_53213623-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53213623-6.jsonl b/split_edge/graph_53213623-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53213623-7.jsonl b/split_edge/graph_53213623-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53213623-8.jsonl b/split_edge/graph_53213623-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53213623-9.jsonl b/split_edge/graph_53213623-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-0.jsonl b/split_edge/graph_53569365-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-1.jsonl b/split_edge/graph_53569365-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-10.jsonl b/split_edge/graph_53569365-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-11.jsonl b/split_edge/graph_53569365-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-12.jsonl b/split_edge/graph_53569365-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-13.jsonl b/split_edge/graph_53569365-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-14.jsonl b/split_edge/graph_53569365-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-15.jsonl b/split_edge/graph_53569365-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-16.jsonl b/split_edge/graph_53569365-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-17.jsonl b/split_edge/graph_53569365-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-2.jsonl b/split_edge/graph_53569365-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-3.jsonl b/split_edge/graph_53569365-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-4.jsonl b/split_edge/graph_53569365-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-5.jsonl b/split_edge/graph_53569365-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-6.jsonl b/split_edge/graph_53569365-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-7.jsonl b/split_edge/graph_53569365-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-8.jsonl b/split_edge/graph_53569365-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53569365-9.jsonl b/split_edge/graph_53569365-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-0.jsonl b/split_edge/graph_5366837-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-1.jsonl b/split_edge/graph_5366837-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-10.jsonl b/split_edge/graph_5366837-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-11.jsonl b/split_edge/graph_5366837-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-12.jsonl b/split_edge/graph_5366837-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-14.jsonl b/split_edge/graph_5366837-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-15.jsonl b/split_edge/graph_5366837-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-16.jsonl b/split_edge/graph_5366837-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-17.jsonl b/split_edge/graph_5366837-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-18.jsonl b/split_edge/graph_5366837-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-2.jsonl b/split_edge/graph_5366837-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-3.jsonl b/split_edge/graph_5366837-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-4.jsonl b/split_edge/graph_5366837-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-5.jsonl b/split_edge/graph_5366837-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-6.jsonl b/split_edge/graph_5366837-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-8.jsonl b/split_edge/graph_5366837-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5366837-9.jsonl b/split_edge/graph_5366837-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-0.jsonl b/split_edge/graph_53703591-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-1.jsonl b/split_edge/graph_53703591-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-10.jsonl b/split_edge/graph_53703591-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-11.jsonl b/split_edge/graph_53703591-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-12.jsonl b/split_edge/graph_53703591-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-2.jsonl b/split_edge/graph_53703591-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-4.jsonl b/split_edge/graph_53703591-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53703591-9.jsonl b/split_edge/graph_53703591-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53707723-2.jsonl b/split_edge/graph_53707723-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53707723-3.jsonl b/split_edge/graph_53707723-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53707723-5.jsonl b/split_edge/graph_53707723-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-0.jsonl b/split_edge/graph_53750327-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-1.jsonl b/split_edge/graph_53750327-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-10.jsonl b/split_edge/graph_53750327-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-11.jsonl b/split_edge/graph_53750327-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-12.jsonl b/split_edge/graph_53750327-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-13.jsonl b/split_edge/graph_53750327-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-14.jsonl b/split_edge/graph_53750327-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-15.jsonl b/split_edge/graph_53750327-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-16.jsonl b/split_edge/graph_53750327-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-3.jsonl b/split_edge/graph_53750327-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-4.jsonl b/split_edge/graph_53750327-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-5.jsonl b/split_edge/graph_53750327-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-6.jsonl b/split_edge/graph_53750327-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-7.jsonl b/split_edge/graph_53750327-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53750327-8.jsonl b/split_edge/graph_53750327-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-1.jsonl b/split_edge/graph_53779029-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-13.jsonl b/split_edge/graph_53779029-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-14.jsonl b/split_edge/graph_53779029-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-15.jsonl b/split_edge/graph_53779029-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-16.jsonl b/split_edge/graph_53779029-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-17.jsonl b/split_edge/graph_53779029-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-18.jsonl b/split_edge/graph_53779029-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-19.jsonl b/split_edge/graph_53779029-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-21.jsonl b/split_edge/graph_53779029-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-3.jsonl b/split_edge/graph_53779029-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-4.jsonl b/split_edge/graph_53779029-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-5.jsonl b/split_edge/graph_53779029-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-6.jsonl b/split_edge/graph_53779029-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_53779029-7.jsonl b/split_edge/graph_53779029-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-0.jsonl b/split_edge/graph_5394499-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-1.jsonl b/split_edge/graph_5394499-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-10.jsonl b/split_edge/graph_5394499-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-11.jsonl b/split_edge/graph_5394499-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-12.jsonl b/split_edge/graph_5394499-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-2.jsonl b/split_edge/graph_5394499-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-3.jsonl b/split_edge/graph_5394499-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-4.jsonl b/split_edge/graph_5394499-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-5.jsonl b/split_edge/graph_5394499-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-6.jsonl b/split_edge/graph_5394499-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-7.jsonl b/split_edge/graph_5394499-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5394499-8.jsonl b/split_edge/graph_5394499-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54075113-0.jsonl b/split_edge/graph_54075113-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54075113-1.jsonl b/split_edge/graph_54075113-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54075113-2.jsonl b/split_edge/graph_54075113-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54075113-3.jsonl b/split_edge/graph_54075113-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54075113-4.jsonl b/split_edge/graph_54075113-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54075113-5.jsonl b/split_edge/graph_54075113-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54075113-6.jsonl b/split_edge/graph_54075113-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-1.jsonl b/split_edge/graph_54170745-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-10.jsonl b/split_edge/graph_54170745-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-11.jsonl b/split_edge/graph_54170745-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-12.jsonl b/split_edge/graph_54170745-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-2.jsonl b/split_edge/graph_54170745-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-4.jsonl b/split_edge/graph_54170745-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-5.jsonl b/split_edge/graph_54170745-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-6.jsonl b/split_edge/graph_54170745-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-7.jsonl b/split_edge/graph_54170745-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-8.jsonl b/split_edge/graph_54170745-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54170745-9.jsonl b/split_edge/graph_54170745-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-0.jsonl b/split_edge/graph_54204439-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-1.jsonl b/split_edge/graph_54204439-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-10.jsonl b/split_edge/graph_54204439-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-11.jsonl b/split_edge/graph_54204439-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-2.jsonl b/split_edge/graph_54204439-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-3.jsonl b/split_edge/graph_54204439-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-4.jsonl b/split_edge/graph_54204439-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-5.jsonl b/split_edge/graph_54204439-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-6.jsonl b/split_edge/graph_54204439-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-8.jsonl b/split_edge/graph_54204439-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54204439-9.jsonl b/split_edge/graph_54204439-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5429500-0.jsonl b/split_edge/graph_5429500-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5429500-1.jsonl b/split_edge/graph_5429500-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5429500-2.jsonl b/split_edge/graph_5429500-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5429500-3.jsonl b/split_edge/graph_5429500-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54445451-1.jsonl b/split_edge/graph_54445451-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54445451-2.jsonl b/split_edge/graph_54445451-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54445451-3.jsonl b/split_edge/graph_54445451-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54445451-4.jsonl b/split_edge/graph_54445451-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54445451-5.jsonl b/split_edge/graph_54445451-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54445451-6.jsonl b/split_edge/graph_54445451-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-0.jsonl b/split_edge/graph_54451416-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-10.jsonl b/split_edge/graph_54451416-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-15.jsonl b/split_edge/graph_54451416-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-18.jsonl b/split_edge/graph_54451416-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-19.jsonl b/split_edge/graph_54451416-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-20.jsonl b/split_edge/graph_54451416-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-21.jsonl b/split_edge/graph_54451416-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-22.jsonl b/split_edge/graph_54451416-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-23.jsonl b/split_edge/graph_54451416-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-24.jsonl b/split_edge/graph_54451416-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-25.jsonl b/split_edge/graph_54451416-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-27.jsonl b/split_edge/graph_54451416-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-28.jsonl b/split_edge/graph_54451416-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-3.jsonl b/split_edge/graph_54451416-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-30.jsonl b/split_edge/graph_54451416-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-32.jsonl b/split_edge/graph_54451416-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-36.jsonl b/split_edge/graph_54451416-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-37.jsonl b/split_edge/graph_54451416-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-38.jsonl b/split_edge/graph_54451416-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-39.jsonl b/split_edge/graph_54451416-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-4.jsonl b/split_edge/graph_54451416-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-40.jsonl b/split_edge/graph_54451416-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-5.jsonl b/split_edge/graph_54451416-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-6.jsonl b/split_edge/graph_54451416-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-8.jsonl b/split_edge/graph_54451416-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54451416-9.jsonl b/split_edge/graph_54451416-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-0.jsonl b/split_edge/graph_54458990-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-1.jsonl b/split_edge/graph_54458990-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-10.jsonl b/split_edge/graph_54458990-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-11.jsonl b/split_edge/graph_54458990-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-12.jsonl b/split_edge/graph_54458990-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-13.jsonl b/split_edge/graph_54458990-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-15.jsonl b/split_edge/graph_54458990-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-2.jsonl b/split_edge/graph_54458990-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-3.jsonl b/split_edge/graph_54458990-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-4.jsonl b/split_edge/graph_54458990-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-5.jsonl b/split_edge/graph_54458990-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-7.jsonl b/split_edge/graph_54458990-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-8.jsonl b/split_edge/graph_54458990-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54458990-9.jsonl b/split_edge/graph_54458990-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-0.jsonl b/split_edge/graph_54462270-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-10.jsonl b/split_edge/graph_54462270-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-13.jsonl b/split_edge/graph_54462270-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-14.jsonl b/split_edge/graph_54462270-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-15.jsonl b/split_edge/graph_54462270-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-16.jsonl b/split_edge/graph_54462270-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-17.jsonl b/split_edge/graph_54462270-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-18.jsonl b/split_edge/graph_54462270-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-19.jsonl b/split_edge/graph_54462270-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-22.jsonl b/split_edge/graph_54462270-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-23.jsonl b/split_edge/graph_54462270-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-24.jsonl b/split_edge/graph_54462270-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-25.jsonl b/split_edge/graph_54462270-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-27.jsonl b/split_edge/graph_54462270-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-28.jsonl b/split_edge/graph_54462270-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-29.jsonl b/split_edge/graph_54462270-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-31.jsonl b/split_edge/graph_54462270-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-32.jsonl b/split_edge/graph_54462270-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-34.jsonl b/split_edge/graph_54462270-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-35.jsonl b/split_edge/graph_54462270-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-37.jsonl b/split_edge/graph_54462270-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-38.jsonl b/split_edge/graph_54462270-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-40.jsonl b/split_edge/graph_54462270-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-41.jsonl b/split_edge/graph_54462270-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-42.jsonl b/split_edge/graph_54462270-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-43.jsonl b/split_edge/graph_54462270-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-46.jsonl b/split_edge/graph_54462270-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-48.jsonl b/split_edge/graph_54462270-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-50.jsonl b/split_edge/graph_54462270-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-51.jsonl b/split_edge/graph_54462270-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-52.jsonl b/split_edge/graph_54462270-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-53.jsonl b/split_edge/graph_54462270-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-54.jsonl b/split_edge/graph_54462270-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-55.jsonl b/split_edge/graph_54462270-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-56.jsonl b/split_edge/graph_54462270-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-57.jsonl b/split_edge/graph_54462270-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-59.jsonl b/split_edge/graph_54462270-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-6.jsonl b/split_edge/graph_54462270-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-60.jsonl b/split_edge/graph_54462270-60.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-61.jsonl b/split_edge/graph_54462270-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54462270-8.jsonl b/split_edge/graph_54462270-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54552710-0.jsonl b/split_edge/graph_54552710-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54552710-1.jsonl b/split_edge/graph_54552710-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54552710-3.jsonl b/split_edge/graph_54552710-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54552710-4.jsonl b/split_edge/graph_54552710-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54552710-5.jsonl b/split_edge/graph_54552710-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54552710-6.jsonl b/split_edge/graph_54552710-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54552710-8.jsonl b/split_edge/graph_54552710-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54617183-0.jsonl b/split_edge/graph_54617183-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54617183-2.jsonl b/split_edge/graph_54617183-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54617183-3.jsonl b/split_edge/graph_54617183-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54617183-4.jsonl b/split_edge/graph_54617183-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54617183-5.jsonl b/split_edge/graph_54617183-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54617183-6.jsonl b/split_edge/graph_54617183-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54617183-9.jsonl b/split_edge/graph_54617183-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54644916-0.jsonl b/split_edge/graph_54644916-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54644916-11.jsonl b/split_edge/graph_54644916-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54644916-12.jsonl b/split_edge/graph_54644916-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54644916-2.jsonl b/split_edge/graph_54644916-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54644916-4.jsonl b/split_edge/graph_54644916-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54644916-5.jsonl b/split_edge/graph_54644916-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54644916-7.jsonl b/split_edge/graph_54644916-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-1.jsonl b/split_edge/graph_54746333-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-12.jsonl b/split_edge/graph_54746333-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-14.jsonl b/split_edge/graph_54746333-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-15.jsonl b/split_edge/graph_54746333-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-2.jsonl b/split_edge/graph_54746333-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-22.jsonl b/split_edge/graph_54746333-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-23.jsonl b/split_edge/graph_54746333-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-24.jsonl b/split_edge/graph_54746333-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-25.jsonl b/split_edge/graph_54746333-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-28.jsonl b/split_edge/graph_54746333-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-29.jsonl b/split_edge/graph_54746333-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-34.jsonl b/split_edge/graph_54746333-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-36.jsonl b/split_edge/graph_54746333-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-37.jsonl b/split_edge/graph_54746333-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-38.jsonl b/split_edge/graph_54746333-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-6.jsonl b/split_edge/graph_54746333-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-7.jsonl b/split_edge/graph_54746333-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54746333-9.jsonl b/split_edge/graph_54746333-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-0.jsonl b/split_edge/graph_5476476-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-1.jsonl b/split_edge/graph_5476476-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-10.jsonl b/split_edge/graph_5476476-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-11.jsonl b/split_edge/graph_5476476-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-12.jsonl b/split_edge/graph_5476476-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-13.jsonl b/split_edge/graph_5476476-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-15.jsonl b/split_edge/graph_5476476-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-16.jsonl b/split_edge/graph_5476476-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-17.jsonl b/split_edge/graph_5476476-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-19.jsonl b/split_edge/graph_5476476-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-2.jsonl b/split_edge/graph_5476476-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-20.jsonl b/split_edge/graph_5476476-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-21.jsonl b/split_edge/graph_5476476-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-22.jsonl b/split_edge/graph_5476476-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-23.jsonl b/split_edge/graph_5476476-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-24.jsonl b/split_edge/graph_5476476-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-25.jsonl b/split_edge/graph_5476476-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-27.jsonl b/split_edge/graph_5476476-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-28.jsonl b/split_edge/graph_5476476-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-29.jsonl b/split_edge/graph_5476476-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-3.jsonl b/split_edge/graph_5476476-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-30.jsonl b/split_edge/graph_5476476-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-31.jsonl b/split_edge/graph_5476476-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-32.jsonl b/split_edge/graph_5476476-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-33.jsonl b/split_edge/graph_5476476-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-35.jsonl b/split_edge/graph_5476476-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-41.jsonl b/split_edge/graph_5476476-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-44.jsonl b/split_edge/graph_5476476-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-5.jsonl b/split_edge/graph_5476476-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5476476-7.jsonl b/split_edge/graph_5476476-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-11.jsonl b/split_edge/graph_54765335-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-12.jsonl b/split_edge/graph_54765335-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-13.jsonl b/split_edge/graph_54765335-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-14.jsonl b/split_edge/graph_54765335-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-15.jsonl b/split_edge/graph_54765335-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-26.jsonl b/split_edge/graph_54765335-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-28.jsonl b/split_edge/graph_54765335-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-29.jsonl b/split_edge/graph_54765335-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-30.jsonl b/split_edge/graph_54765335-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-31.jsonl b/split_edge/graph_54765335-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-32.jsonl b/split_edge/graph_54765335-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54765335-4.jsonl b/split_edge/graph_54765335-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54816547-0.jsonl b/split_edge/graph_54816547-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54816547-14.jsonl b/split_edge/graph_54816547-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54816547-4.jsonl b/split_edge/graph_54816547-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-0.jsonl b/split_edge/graph_54826015-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-10.jsonl b/split_edge/graph_54826015-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-11.jsonl b/split_edge/graph_54826015-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-12.jsonl b/split_edge/graph_54826015-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-13.jsonl b/split_edge/graph_54826015-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-14.jsonl b/split_edge/graph_54826015-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-15.jsonl b/split_edge/graph_54826015-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-16.jsonl b/split_edge/graph_54826015-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-17.jsonl b/split_edge/graph_54826015-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-2.jsonl b/split_edge/graph_54826015-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-3.jsonl b/split_edge/graph_54826015-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-4.jsonl b/split_edge/graph_54826015-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-5.jsonl b/split_edge/graph_54826015-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-6.jsonl b/split_edge/graph_54826015-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-7.jsonl b/split_edge/graph_54826015-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54826015-8.jsonl b/split_edge/graph_54826015-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54836648-1.jsonl b/split_edge/graph_54836648-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54836648-2.jsonl b/split_edge/graph_54836648-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54836648-3.jsonl b/split_edge/graph_54836648-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54853072-0.jsonl b/split_edge/graph_54853072-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54853072-2.jsonl b/split_edge/graph_54853072-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54853072-3.jsonl b/split_edge/graph_54853072-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54853072-5.jsonl b/split_edge/graph_54853072-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54853072-6.jsonl b/split_edge/graph_54853072-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-0.jsonl b/split_edge/graph_54857887-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-10.jsonl b/split_edge/graph_54857887-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-11.jsonl b/split_edge/graph_54857887-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-2.jsonl b/split_edge/graph_54857887-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-3.jsonl b/split_edge/graph_54857887-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-4.jsonl b/split_edge/graph_54857887-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-7.jsonl b/split_edge/graph_54857887-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54857887-8.jsonl b/split_edge/graph_54857887-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54895426-9.jsonl b/split_edge/graph_54895426-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54908630-1.jsonl b/split_edge/graph_54908630-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54908630-5.jsonl b/split_edge/graph_54908630-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54908630-6.jsonl b/split_edge/graph_54908630-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54908630-7.jsonl b/split_edge/graph_54908630-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-0.jsonl b/split_edge/graph_54934748-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-1.jsonl b/split_edge/graph_54934748-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-10.jsonl b/split_edge/graph_54934748-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-11.jsonl b/split_edge/graph_54934748-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-12.jsonl b/split_edge/graph_54934748-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-13.jsonl b/split_edge/graph_54934748-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-2.jsonl b/split_edge/graph_54934748-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-3.jsonl b/split_edge/graph_54934748-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-4.jsonl b/split_edge/graph_54934748-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-6.jsonl b/split_edge/graph_54934748-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-8.jsonl b/split_edge/graph_54934748-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54934748-9.jsonl b/split_edge/graph_54934748-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54937186-0.jsonl b/split_edge/graph_54937186-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54937186-2.jsonl b/split_edge/graph_54937186-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54937186-3.jsonl b/split_edge/graph_54937186-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54937186-4.jsonl b/split_edge/graph_54937186-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54937186-5.jsonl b/split_edge/graph_54937186-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54937186-6.jsonl b/split_edge/graph_54937186-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_54940806-5.jsonl b/split_edge/graph_54940806-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55013203-0.jsonl b/split_edge/graph_55013203-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55013203-2.jsonl b/split_edge/graph_55013203-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55013203-3.jsonl b/split_edge/graph_55013203-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55013203-5.jsonl b/split_edge/graph_55013203-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55037157-0.jsonl b/split_edge/graph_55037157-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55037157-3.jsonl b/split_edge/graph_55037157-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55037157-4.jsonl b/split_edge/graph_55037157-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55050212-5.jsonl b/split_edge/graph_55050212-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55050212-6.jsonl b/split_edge/graph_55050212-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-0.jsonl b/split_edge/graph_55065887-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-11.jsonl b/split_edge/graph_55065887-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-12.jsonl b/split_edge/graph_55065887-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-13.jsonl b/split_edge/graph_55065887-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-14.jsonl b/split_edge/graph_55065887-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-16.jsonl b/split_edge/graph_55065887-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-3.jsonl b/split_edge/graph_55065887-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-5.jsonl b/split_edge/graph_55065887-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-6.jsonl b/split_edge/graph_55065887-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-7.jsonl b/split_edge/graph_55065887-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55065887-8.jsonl b/split_edge/graph_55065887-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55211828-0.jsonl b/split_edge/graph_55211828-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55211828-1.jsonl b/split_edge/graph_55211828-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55211828-3.jsonl b/split_edge/graph_55211828-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55211828-4.jsonl b/split_edge/graph_55211828-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55211828-9.jsonl b/split_edge/graph_55211828-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55254760-0.jsonl b/split_edge/graph_55254760-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55254760-2.jsonl b/split_edge/graph_55254760-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55254760-21.jsonl b/split_edge/graph_55254760-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55254760-8.jsonl b/split_edge/graph_55254760-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55329264-0.jsonl b/split_edge/graph_55329264-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55329264-7.jsonl b/split_edge/graph_55329264-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55369097-0.jsonl b/split_edge/graph_55369097-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55369097-1.jsonl b/split_edge/graph_55369097-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55369097-2.jsonl b/split_edge/graph_55369097-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55369097-3.jsonl b/split_edge/graph_55369097-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55369097-5.jsonl b/split_edge/graph_55369097-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55369097-6.jsonl b/split_edge/graph_55369097-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-0.jsonl b/split_edge/graph_55372820-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-11.jsonl b/split_edge/graph_55372820-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-12.jsonl b/split_edge/graph_55372820-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-2.jsonl b/split_edge/graph_55372820-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-3.jsonl b/split_edge/graph_55372820-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-4.jsonl b/split_edge/graph_55372820-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-5.jsonl b/split_edge/graph_55372820-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-6.jsonl b/split_edge/graph_55372820-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-7.jsonl b/split_edge/graph_55372820-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-8.jsonl b/split_edge/graph_55372820-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55372820-9.jsonl b/split_edge/graph_55372820-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5540781-0.jsonl b/split_edge/graph_5540781-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5540781-1.jsonl b/split_edge/graph_5540781-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5540781-2.jsonl b/split_edge/graph_5540781-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5540781-3.jsonl b/split_edge/graph_5540781-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5540781-4.jsonl b/split_edge/graph_5540781-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5540781-5.jsonl b/split_edge/graph_5540781-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5540781-6.jsonl b/split_edge/graph_5540781-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55515322-0.jsonl b/split_edge/graph_55515322-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55515322-5.jsonl b/split_edge/graph_55515322-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55515322-7.jsonl b/split_edge/graph_55515322-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55578265-6.jsonl b/split_edge/graph_55578265-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55578265-8.jsonl b/split_edge/graph_55578265-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55619142-0.jsonl b/split_edge/graph_55619142-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55619142-1.jsonl b/split_edge/graph_55619142-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55619142-3.jsonl b/split_edge/graph_55619142-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55655880-0.jsonl b/split_edge/graph_55655880-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55655880-1.jsonl b/split_edge/graph_55655880-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55655880-2.jsonl b/split_edge/graph_55655880-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55655880-6.jsonl b/split_edge/graph_55655880-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55815085-0.jsonl b/split_edge/graph_55815085-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55815085-3.jsonl b/split_edge/graph_55815085-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55815085-4.jsonl b/split_edge/graph_55815085-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55816727-0.jsonl b/split_edge/graph_55816727-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55816727-1.jsonl b/split_edge/graph_55816727-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55924989-12.jsonl b/split_edge/graph_55924989-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55924989-2.jsonl b/split_edge/graph_55924989-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55924989-3.jsonl b/split_edge/graph_55924989-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55924989-5.jsonl b/split_edge/graph_55924989-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55924989-6.jsonl b/split_edge/graph_55924989-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55924989-7.jsonl b/split_edge/graph_55924989-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55924989-8.jsonl b/split_edge/graph_55924989-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55999689-0.jsonl b/split_edge/graph_55999689-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_55999689-3.jsonl b/split_edge/graph_55999689-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56003001-3.jsonl b/split_edge/graph_56003001-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-0.jsonl b/split_edge/graph_56035937-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-11.jsonl b/split_edge/graph_56035937-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-12.jsonl b/split_edge/graph_56035937-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-13.jsonl b/split_edge/graph_56035937-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-14.jsonl b/split_edge/graph_56035937-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-16.jsonl b/split_edge/graph_56035937-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-17.jsonl b/split_edge/graph_56035937-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-18.jsonl b/split_edge/graph_56035937-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-2.jsonl b/split_edge/graph_56035937-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-23.jsonl b/split_edge/graph_56035937-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-24.jsonl b/split_edge/graph_56035937-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-25.jsonl b/split_edge/graph_56035937-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-26.jsonl b/split_edge/graph_56035937-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-27.jsonl b/split_edge/graph_56035937-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-4.jsonl b/split_edge/graph_56035937-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-6.jsonl b/split_edge/graph_56035937-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-7.jsonl b/split_edge/graph_56035937-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-8.jsonl b/split_edge/graph_56035937-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56035937-9.jsonl b/split_edge/graph_56035937-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56068964-8.jsonl b/split_edge/graph_56068964-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56068964-9.jsonl b/split_edge/graph_56068964-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56095465-3.jsonl b/split_edge/graph_56095465-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56095465-8.jsonl b/split_edge/graph_56095465-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56144874-1.jsonl b/split_edge/graph_56144874-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56144874-2.jsonl b/split_edge/graph_56144874-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56144874-5.jsonl b/split_edge/graph_56144874-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56144874-8.jsonl b/split_edge/graph_56144874-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56174156-0.jsonl b/split_edge/graph_56174156-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56174156-2.jsonl b/split_edge/graph_56174156-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56174156-3.jsonl b/split_edge/graph_56174156-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56174156-4.jsonl b/split_edge/graph_56174156-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56174156-5.jsonl b/split_edge/graph_56174156-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56174156-6.jsonl b/split_edge/graph_56174156-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56174156-7.jsonl b/split_edge/graph_56174156-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-12.jsonl b/split_edge/graph_56178838-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-16.jsonl b/split_edge/graph_56178838-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-17.jsonl b/split_edge/graph_56178838-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-18.jsonl b/split_edge/graph_56178838-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-19.jsonl b/split_edge/graph_56178838-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-2.jsonl b/split_edge/graph_56178838-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-20.jsonl b/split_edge/graph_56178838-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-21.jsonl b/split_edge/graph_56178838-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-24.jsonl b/split_edge/graph_56178838-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-25.jsonl b/split_edge/graph_56178838-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-3.jsonl b/split_edge/graph_56178838-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-32.jsonl b/split_edge/graph_56178838-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-4.jsonl b/split_edge/graph_56178838-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-56.jsonl b/split_edge/graph_56178838-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-57.jsonl b/split_edge/graph_56178838-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-59.jsonl b/split_edge/graph_56178838-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-61.jsonl b/split_edge/graph_56178838-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-63.jsonl b/split_edge/graph_56178838-63.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-64.jsonl b/split_edge/graph_56178838-64.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-65.jsonl b/split_edge/graph_56178838-65.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-67.jsonl b/split_edge/graph_56178838-67.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-69.jsonl b/split_edge/graph_56178838-69.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-70.jsonl b/split_edge/graph_56178838-70.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56178838-9.jsonl b/split_edge/graph_56178838-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-0.jsonl b/split_edge/graph_562855-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-1.jsonl b/split_edge/graph_562855-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-10.jsonl b/split_edge/graph_562855-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-12.jsonl b/split_edge/graph_562855-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-13.jsonl b/split_edge/graph_562855-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-14.jsonl b/split_edge/graph_562855-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-15.jsonl b/split_edge/graph_562855-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-16.jsonl b/split_edge/graph_562855-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-17.jsonl b/split_edge/graph_562855-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-18.jsonl b/split_edge/graph_562855-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-19.jsonl b/split_edge/graph_562855-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-2.jsonl b/split_edge/graph_562855-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-20.jsonl b/split_edge/graph_562855-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-21.jsonl b/split_edge/graph_562855-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-3.jsonl b/split_edge/graph_562855-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-4.jsonl b/split_edge/graph_562855-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-5.jsonl b/split_edge/graph_562855-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-6.jsonl b/split_edge/graph_562855-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-7.jsonl b/split_edge/graph_562855-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-8.jsonl b/split_edge/graph_562855-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_562855-9.jsonl b/split_edge/graph_562855-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-0.jsonl b/split_edge/graph_56343610-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-11.jsonl b/split_edge/graph_56343610-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-2.jsonl b/split_edge/graph_56343610-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-3.jsonl b/split_edge/graph_56343610-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-5.jsonl b/split_edge/graph_56343610-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-6.jsonl b/split_edge/graph_56343610-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-7.jsonl b/split_edge/graph_56343610-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-8.jsonl b/split_edge/graph_56343610-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56343610-9.jsonl b/split_edge/graph_56343610-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-0.jsonl b/split_edge/graph_56475910-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-10.jsonl b/split_edge/graph_56475910-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-11.jsonl b/split_edge/graph_56475910-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-12.jsonl b/split_edge/graph_56475910-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-13.jsonl b/split_edge/graph_56475910-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-14.jsonl b/split_edge/graph_56475910-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-15.jsonl b/split_edge/graph_56475910-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-16.jsonl b/split_edge/graph_56475910-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-17.jsonl b/split_edge/graph_56475910-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-2.jsonl b/split_edge/graph_56475910-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-20.jsonl b/split_edge/graph_56475910-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-21.jsonl b/split_edge/graph_56475910-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-22.jsonl b/split_edge/graph_56475910-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-24.jsonl b/split_edge/graph_56475910-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-25.jsonl b/split_edge/graph_56475910-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-26.jsonl b/split_edge/graph_56475910-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-27.jsonl b/split_edge/graph_56475910-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-28.jsonl b/split_edge/graph_56475910-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-29.jsonl b/split_edge/graph_56475910-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-3.jsonl b/split_edge/graph_56475910-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-6.jsonl b/split_edge/graph_56475910-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56475910-9.jsonl b/split_edge/graph_56475910-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-0.jsonl b/split_edge/graph_5660618-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-1.jsonl b/split_edge/graph_5660618-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-10.jsonl b/split_edge/graph_5660618-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-11.jsonl b/split_edge/graph_5660618-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-13.jsonl b/split_edge/graph_5660618-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-14.jsonl b/split_edge/graph_5660618-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-15.jsonl b/split_edge/graph_5660618-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-17.jsonl b/split_edge/graph_5660618-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-2.jsonl b/split_edge/graph_5660618-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-3.jsonl b/split_edge/graph_5660618-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-4.jsonl b/split_edge/graph_5660618-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-6.jsonl b/split_edge/graph_5660618-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-8.jsonl b/split_edge/graph_5660618-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5660618-9.jsonl b/split_edge/graph_5660618-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-0.jsonl b/split_edge/graph_5686212-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-1.jsonl b/split_edge/graph_5686212-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-10.jsonl b/split_edge/graph_5686212-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-2.jsonl b/split_edge/graph_5686212-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-3.jsonl b/split_edge/graph_5686212-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-4.jsonl b/split_edge/graph_5686212-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-5.jsonl b/split_edge/graph_5686212-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-7.jsonl b/split_edge/graph_5686212-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-8.jsonl b/split_edge/graph_5686212-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5686212-9.jsonl b/split_edge/graph_5686212-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-0.jsonl b/split_edge/graph_56895303-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-10.jsonl b/split_edge/graph_56895303-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-12.jsonl b/split_edge/graph_56895303-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-14.jsonl b/split_edge/graph_56895303-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-15.jsonl b/split_edge/graph_56895303-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-17.jsonl b/split_edge/graph_56895303-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-18.jsonl b/split_edge/graph_56895303-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-21.jsonl b/split_edge/graph_56895303-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-22.jsonl b/split_edge/graph_56895303-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-23.jsonl b/split_edge/graph_56895303-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-25.jsonl b/split_edge/graph_56895303-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-26.jsonl b/split_edge/graph_56895303-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-28.jsonl b/split_edge/graph_56895303-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-29.jsonl b/split_edge/graph_56895303-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-3.jsonl b/split_edge/graph_56895303-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-30.jsonl b/split_edge/graph_56895303-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-33.jsonl b/split_edge/graph_56895303-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-34.jsonl b/split_edge/graph_56895303-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-35.jsonl b/split_edge/graph_56895303-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-4.jsonl b/split_edge/graph_56895303-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-6.jsonl b/split_edge/graph_56895303-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-7.jsonl b/split_edge/graph_56895303-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895303-9.jsonl b/split_edge/graph_56895303-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-0.jsonl b/split_edge/graph_56895374-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-1.jsonl b/split_edge/graph_56895374-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-10.jsonl b/split_edge/graph_56895374-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-11.jsonl b/split_edge/graph_56895374-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-12.jsonl b/split_edge/graph_56895374-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-13.jsonl b/split_edge/graph_56895374-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-14.jsonl b/split_edge/graph_56895374-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-16.jsonl b/split_edge/graph_56895374-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-17.jsonl b/split_edge/graph_56895374-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-18.jsonl b/split_edge/graph_56895374-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-19.jsonl b/split_edge/graph_56895374-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-2.jsonl b/split_edge/graph_56895374-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-20.jsonl b/split_edge/graph_56895374-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-21.jsonl b/split_edge/graph_56895374-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-22.jsonl b/split_edge/graph_56895374-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-3.jsonl b/split_edge/graph_56895374-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-4.jsonl b/split_edge/graph_56895374-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-5.jsonl b/split_edge/graph_56895374-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-6.jsonl b/split_edge/graph_56895374-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-7.jsonl b/split_edge/graph_56895374-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-8.jsonl b/split_edge/graph_56895374-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_56895374-9.jsonl b/split_edge/graph_56895374-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57189241-0.jsonl b/split_edge/graph_57189241-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57189241-13.jsonl b/split_edge/graph_57189241-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57189241-14.jsonl b/split_edge/graph_57189241-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57189241-17.jsonl b/split_edge/graph_57189241-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57189241-3.jsonl b/split_edge/graph_57189241-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57189241-6.jsonl b/split_edge/graph_57189241-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57189241-8.jsonl b/split_edge/graph_57189241-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-0.jsonl b/split_edge/graph_57375795-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-1.jsonl b/split_edge/graph_57375795-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-10.jsonl b/split_edge/graph_57375795-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-11.jsonl b/split_edge/graph_57375795-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-12.jsonl b/split_edge/graph_57375795-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-14.jsonl b/split_edge/graph_57375795-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-16.jsonl b/split_edge/graph_57375795-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-17.jsonl b/split_edge/graph_57375795-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-19.jsonl b/split_edge/graph_57375795-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-2.jsonl b/split_edge/graph_57375795-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-20.jsonl b/split_edge/graph_57375795-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-21.jsonl b/split_edge/graph_57375795-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-22.jsonl b/split_edge/graph_57375795-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-24.jsonl b/split_edge/graph_57375795-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-25.jsonl b/split_edge/graph_57375795-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-26.jsonl b/split_edge/graph_57375795-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-27.jsonl b/split_edge/graph_57375795-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-29.jsonl b/split_edge/graph_57375795-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-3.jsonl b/split_edge/graph_57375795-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-30.jsonl b/split_edge/graph_57375795-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-31.jsonl b/split_edge/graph_57375795-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-32.jsonl b/split_edge/graph_57375795-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-33.jsonl b/split_edge/graph_57375795-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-34.jsonl b/split_edge/graph_57375795-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-35.jsonl b/split_edge/graph_57375795-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-36.jsonl b/split_edge/graph_57375795-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-37.jsonl b/split_edge/graph_57375795-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-38.jsonl b/split_edge/graph_57375795-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-4.jsonl b/split_edge/graph_57375795-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-5.jsonl b/split_edge/graph_57375795-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-6.jsonl b/split_edge/graph_57375795-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-7.jsonl b/split_edge/graph_57375795-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-8.jsonl b/split_edge/graph_57375795-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57375795-9.jsonl b/split_edge/graph_57375795-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-0.jsonl b/split_edge/graph_57428186-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-1.jsonl b/split_edge/graph_57428186-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-10.jsonl b/split_edge/graph_57428186-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-11.jsonl b/split_edge/graph_57428186-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-12.jsonl b/split_edge/graph_57428186-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-13.jsonl b/split_edge/graph_57428186-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-4.jsonl b/split_edge/graph_57428186-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-5.jsonl b/split_edge/graph_57428186-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-6.jsonl b/split_edge/graph_57428186-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57428186-8.jsonl b/split_edge/graph_57428186-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-0.jsonl b/split_edge/graph_575176-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-10.jsonl b/split_edge/graph_575176-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-11.jsonl b/split_edge/graph_575176-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-12.jsonl b/split_edge/graph_575176-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-13.jsonl b/split_edge/graph_575176-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-14.jsonl b/split_edge/graph_575176-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-18.jsonl b/split_edge/graph_575176-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-19.jsonl b/split_edge/graph_575176-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-2.jsonl b/split_edge/graph_575176-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-20.jsonl b/split_edge/graph_575176-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-21.jsonl b/split_edge/graph_575176-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-24.jsonl b/split_edge/graph_575176-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-3.jsonl b/split_edge/graph_575176-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-4.jsonl b/split_edge/graph_575176-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-6.jsonl b/split_edge/graph_575176-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-7.jsonl b/split_edge/graph_575176-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-8.jsonl b/split_edge/graph_575176-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_575176-9.jsonl b/split_edge/graph_575176-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-1.jsonl b/split_edge/graph_5755403-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-10.jsonl b/split_edge/graph_5755403-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-11.jsonl b/split_edge/graph_5755403-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-13.jsonl b/split_edge/graph_5755403-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-14.jsonl b/split_edge/graph_5755403-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-16.jsonl b/split_edge/graph_5755403-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-17.jsonl b/split_edge/graph_5755403-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-18.jsonl b/split_edge/graph_5755403-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-19.jsonl b/split_edge/graph_5755403-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-2.jsonl b/split_edge/graph_5755403-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-21.jsonl b/split_edge/graph_5755403-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-22.jsonl b/split_edge/graph_5755403-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-25.jsonl b/split_edge/graph_5755403-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-26.jsonl b/split_edge/graph_5755403-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-27.jsonl b/split_edge/graph_5755403-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-29.jsonl b/split_edge/graph_5755403-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-3.jsonl b/split_edge/graph_5755403-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-4.jsonl b/split_edge/graph_5755403-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-5.jsonl b/split_edge/graph_5755403-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-6.jsonl b/split_edge/graph_5755403-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5755403-9.jsonl b/split_edge/graph_5755403-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57659423-0.jsonl b/split_edge/graph_57659423-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57659423-1.jsonl b/split_edge/graph_57659423-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57659423-2.jsonl b/split_edge/graph_57659423-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57659423-3.jsonl b/split_edge/graph_57659423-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-1.jsonl b/split_edge/graph_57756528-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-10.jsonl b/split_edge/graph_57756528-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-11.jsonl b/split_edge/graph_57756528-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-14.jsonl b/split_edge/graph_57756528-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-2.jsonl b/split_edge/graph_57756528-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-3.jsonl b/split_edge/graph_57756528-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-4.jsonl b/split_edge/graph_57756528-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-5.jsonl b/split_edge/graph_57756528-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-7.jsonl b/split_edge/graph_57756528-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57756528-9.jsonl b/split_edge/graph_57756528-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-0.jsonl b/split_edge/graph_57762585-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-10.jsonl b/split_edge/graph_57762585-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-11.jsonl b/split_edge/graph_57762585-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-12.jsonl b/split_edge/graph_57762585-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-15.jsonl b/split_edge/graph_57762585-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-16.jsonl b/split_edge/graph_57762585-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-18.jsonl b/split_edge/graph_57762585-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-2.jsonl b/split_edge/graph_57762585-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-20.jsonl b/split_edge/graph_57762585-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-21.jsonl b/split_edge/graph_57762585-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-24.jsonl b/split_edge/graph_57762585-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-4.jsonl b/split_edge/graph_57762585-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-6.jsonl b/split_edge/graph_57762585-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-7.jsonl b/split_edge/graph_57762585-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57762585-8.jsonl b/split_edge/graph_57762585-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-0.jsonl b/split_edge/graph_57846582-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-1.jsonl b/split_edge/graph_57846582-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-10.jsonl b/split_edge/graph_57846582-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-11.jsonl b/split_edge/graph_57846582-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-12.jsonl b/split_edge/graph_57846582-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-13.jsonl b/split_edge/graph_57846582-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-14.jsonl b/split_edge/graph_57846582-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-15.jsonl b/split_edge/graph_57846582-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-16.jsonl b/split_edge/graph_57846582-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-17.jsonl b/split_edge/graph_57846582-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-18.jsonl b/split_edge/graph_57846582-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-19.jsonl b/split_edge/graph_57846582-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-2.jsonl b/split_edge/graph_57846582-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-20.jsonl b/split_edge/graph_57846582-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-21.jsonl b/split_edge/graph_57846582-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-22.jsonl b/split_edge/graph_57846582-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-23.jsonl b/split_edge/graph_57846582-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-24.jsonl b/split_edge/graph_57846582-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-25.jsonl b/split_edge/graph_57846582-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-26.jsonl b/split_edge/graph_57846582-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-27.jsonl b/split_edge/graph_57846582-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-29.jsonl b/split_edge/graph_57846582-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-3.jsonl b/split_edge/graph_57846582-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-30.jsonl b/split_edge/graph_57846582-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-31.jsonl b/split_edge/graph_57846582-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-32.jsonl b/split_edge/graph_57846582-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-33.jsonl b/split_edge/graph_57846582-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-4.jsonl b/split_edge/graph_57846582-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-5.jsonl b/split_edge/graph_57846582-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-6.jsonl b/split_edge/graph_57846582-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-7.jsonl b/split_edge/graph_57846582-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-8.jsonl b/split_edge/graph_57846582-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_57846582-9.jsonl b/split_edge/graph_57846582-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5797907-1.jsonl b/split_edge/graph_5797907-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5797907-3.jsonl b/split_edge/graph_5797907-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-0.jsonl b/split_edge/graph_5807554-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-10.jsonl b/split_edge/graph_5807554-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-11.jsonl b/split_edge/graph_5807554-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-12.jsonl b/split_edge/graph_5807554-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-13.jsonl b/split_edge/graph_5807554-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-14.jsonl b/split_edge/graph_5807554-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-2.jsonl b/split_edge/graph_5807554-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-4.jsonl b/split_edge/graph_5807554-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-5.jsonl b/split_edge/graph_5807554-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-6.jsonl b/split_edge/graph_5807554-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-7.jsonl b/split_edge/graph_5807554-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-8.jsonl b/split_edge/graph_5807554-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5807554-9.jsonl b/split_edge/graph_5807554-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-1.jsonl b/split_edge/graph_5835695-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-10.jsonl b/split_edge/graph_5835695-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-11.jsonl b/split_edge/graph_5835695-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-12.jsonl b/split_edge/graph_5835695-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-13.jsonl b/split_edge/graph_5835695-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-14.jsonl b/split_edge/graph_5835695-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-15.jsonl b/split_edge/graph_5835695-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-16.jsonl b/split_edge/graph_5835695-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-17.jsonl b/split_edge/graph_5835695-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-2.jsonl b/split_edge/graph_5835695-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-20.jsonl b/split_edge/graph_5835695-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-21.jsonl b/split_edge/graph_5835695-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-3.jsonl b/split_edge/graph_5835695-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-4.jsonl b/split_edge/graph_5835695-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-5.jsonl b/split_edge/graph_5835695-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-6.jsonl b/split_edge/graph_5835695-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-7.jsonl b/split_edge/graph_5835695-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-8.jsonl b/split_edge/graph_5835695-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_5835695-9.jsonl b/split_edge/graph_5835695-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-0.jsonl b/split_edge/graph_58387666-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-10.jsonl b/split_edge/graph_58387666-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-13.jsonl b/split_edge/graph_58387666-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-14.jsonl b/split_edge/graph_58387666-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-15.jsonl b/split_edge/graph_58387666-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-17.jsonl b/split_edge/graph_58387666-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-2.jsonl b/split_edge/graph_58387666-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-21.jsonl b/split_edge/graph_58387666-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-23.jsonl b/split_edge/graph_58387666-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-24.jsonl b/split_edge/graph_58387666-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-26.jsonl b/split_edge/graph_58387666-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-27.jsonl b/split_edge/graph_58387666-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-28.jsonl b/split_edge/graph_58387666-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-29.jsonl b/split_edge/graph_58387666-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-3.jsonl b/split_edge/graph_58387666-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-30.jsonl b/split_edge/graph_58387666-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-4.jsonl b/split_edge/graph_58387666-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-7.jsonl b/split_edge/graph_58387666-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58387666-8.jsonl b/split_edge/graph_58387666-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-0.jsonl b/split_edge/graph_585363-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-1.jsonl b/split_edge/graph_585363-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-10.jsonl b/split_edge/graph_585363-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-2.jsonl b/split_edge/graph_585363-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-5.jsonl b/split_edge/graph_585363-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-7.jsonl b/split_edge/graph_585363-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-8.jsonl b/split_edge/graph_585363-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_585363-9.jsonl b/split_edge/graph_585363-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-0.jsonl b/split_edge/graph_58549028-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-1.jsonl b/split_edge/graph_58549028-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-10.jsonl b/split_edge/graph_58549028-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-11.jsonl b/split_edge/graph_58549028-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-13.jsonl b/split_edge/graph_58549028-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-14.jsonl b/split_edge/graph_58549028-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-16.jsonl b/split_edge/graph_58549028-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-17.jsonl b/split_edge/graph_58549028-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-20.jsonl b/split_edge/graph_58549028-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-21.jsonl b/split_edge/graph_58549028-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-22.jsonl b/split_edge/graph_58549028-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-23.jsonl b/split_edge/graph_58549028-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-24.jsonl b/split_edge/graph_58549028-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-25.jsonl b/split_edge/graph_58549028-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-26.jsonl b/split_edge/graph_58549028-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-27.jsonl b/split_edge/graph_58549028-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-28.jsonl b/split_edge/graph_58549028-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-29.jsonl b/split_edge/graph_58549028-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-3.jsonl b/split_edge/graph_58549028-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-4.jsonl b/split_edge/graph_58549028-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-5.jsonl b/split_edge/graph_58549028-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-6.jsonl b/split_edge/graph_58549028-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-7.jsonl b/split_edge/graph_58549028-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58549028-9.jsonl b/split_edge/graph_58549028-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-0.jsonl b/split_edge/graph_58664309-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-11.jsonl b/split_edge/graph_58664309-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-13.jsonl b/split_edge/graph_58664309-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-15.jsonl b/split_edge/graph_58664309-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-17.jsonl b/split_edge/graph_58664309-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-18.jsonl b/split_edge/graph_58664309-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-2.jsonl b/split_edge/graph_58664309-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-21.jsonl b/split_edge/graph_58664309-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-22.jsonl b/split_edge/graph_58664309-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-23.jsonl b/split_edge/graph_58664309-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-24.jsonl b/split_edge/graph_58664309-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-26.jsonl b/split_edge/graph_58664309-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-27.jsonl b/split_edge/graph_58664309-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-29.jsonl b/split_edge/graph_58664309-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-30.jsonl b/split_edge/graph_58664309-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-31.jsonl b/split_edge/graph_58664309-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-33.jsonl b/split_edge/graph_58664309-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-4.jsonl b/split_edge/graph_58664309-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-7.jsonl b/split_edge/graph_58664309-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58664309-8.jsonl b/split_edge/graph_58664309-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58672045-0.jsonl b/split_edge/graph_58672045-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58672045-2.jsonl b/split_edge/graph_58672045-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58672045-3.jsonl b/split_edge/graph_58672045-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58672045-4.jsonl b/split_edge/graph_58672045-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58672045-5.jsonl b/split_edge/graph_58672045-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58672045-6.jsonl b/split_edge/graph_58672045-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58672045-7.jsonl b/split_edge/graph_58672045-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58906038-4.jsonl b/split_edge/graph_58906038-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-0.jsonl b/split_edge/graph_58981453-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-11.jsonl b/split_edge/graph_58981453-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-12.jsonl b/split_edge/graph_58981453-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-13.jsonl b/split_edge/graph_58981453-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-14.jsonl b/split_edge/graph_58981453-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-15.jsonl b/split_edge/graph_58981453-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-16.jsonl b/split_edge/graph_58981453-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-17.jsonl b/split_edge/graph_58981453-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-18.jsonl b/split_edge/graph_58981453-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-19.jsonl b/split_edge/graph_58981453-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-2.jsonl b/split_edge/graph_58981453-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-20.jsonl b/split_edge/graph_58981453-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-4.jsonl b/split_edge/graph_58981453-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-6.jsonl b/split_edge/graph_58981453-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_58981453-9.jsonl b/split_edge/graph_58981453-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-0.jsonl b/split_edge/graph_59263817-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-1.jsonl b/split_edge/graph_59263817-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-10.jsonl b/split_edge/graph_59263817-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-11.jsonl b/split_edge/graph_59263817-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-14.jsonl b/split_edge/graph_59263817-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-15.jsonl b/split_edge/graph_59263817-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-16.jsonl b/split_edge/graph_59263817-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-2.jsonl b/split_edge/graph_59263817-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-3.jsonl b/split_edge/graph_59263817-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-5.jsonl b/split_edge/graph_59263817-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-6.jsonl b/split_edge/graph_59263817-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-7.jsonl b/split_edge/graph_59263817-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-8.jsonl b/split_edge/graph_59263817-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59263817-9.jsonl b/split_edge/graph_59263817-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59270886-1.jsonl b/split_edge/graph_59270886-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59270886-4.jsonl b/split_edge/graph_59270886-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59270886-6.jsonl b/split_edge/graph_59270886-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59270886-8.jsonl b/split_edge/graph_59270886-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-0.jsonl b/split_edge/graph_59316790-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-10.jsonl b/split_edge/graph_59316790-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-11.jsonl b/split_edge/graph_59316790-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-12.jsonl b/split_edge/graph_59316790-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-13.jsonl b/split_edge/graph_59316790-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-16.jsonl b/split_edge/graph_59316790-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-17.jsonl b/split_edge/graph_59316790-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-2.jsonl b/split_edge/graph_59316790-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-20.jsonl b/split_edge/graph_59316790-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-21.jsonl b/split_edge/graph_59316790-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-23.jsonl b/split_edge/graph_59316790-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-24.jsonl b/split_edge/graph_59316790-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-25.jsonl b/split_edge/graph_59316790-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-5.jsonl b/split_edge/graph_59316790-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-8.jsonl b/split_edge/graph_59316790-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316790-9.jsonl b/split_edge/graph_59316790-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-0.jsonl b/split_edge/graph_59316955-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-1.jsonl b/split_edge/graph_59316955-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-13.jsonl b/split_edge/graph_59316955-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-16.jsonl b/split_edge/graph_59316955-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-17.jsonl b/split_edge/graph_59316955-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-20.jsonl b/split_edge/graph_59316955-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-21.jsonl b/split_edge/graph_59316955-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-3.jsonl b/split_edge/graph_59316955-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-4.jsonl b/split_edge/graph_59316955-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-5.jsonl b/split_edge/graph_59316955-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-6.jsonl b/split_edge/graph_59316955-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-8.jsonl b/split_edge/graph_59316955-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59316955-9.jsonl b/split_edge/graph_59316955-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59333092-0.jsonl b/split_edge/graph_59333092-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59333092-1.jsonl b/split_edge/graph_59333092-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59333092-2.jsonl b/split_edge/graph_59333092-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59333092-3.jsonl b/split_edge/graph_59333092-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-0.jsonl b/split_edge/graph_59336584-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-11.jsonl b/split_edge/graph_59336584-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-13.jsonl b/split_edge/graph_59336584-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-14.jsonl b/split_edge/graph_59336584-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-15.jsonl b/split_edge/graph_59336584-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-17.jsonl b/split_edge/graph_59336584-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-18.jsonl b/split_edge/graph_59336584-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-19.jsonl b/split_edge/graph_59336584-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-20.jsonl b/split_edge/graph_59336584-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-23.jsonl b/split_edge/graph_59336584-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-24.jsonl b/split_edge/graph_59336584-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-25.jsonl b/split_edge/graph_59336584-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-27.jsonl b/split_edge/graph_59336584-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-28.jsonl b/split_edge/graph_59336584-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-29.jsonl b/split_edge/graph_59336584-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-31.jsonl b/split_edge/graph_59336584-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-32.jsonl b/split_edge/graph_59336584-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-33.jsonl b/split_edge/graph_59336584-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-34.jsonl b/split_edge/graph_59336584-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-35.jsonl b/split_edge/graph_59336584-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-36.jsonl b/split_edge/graph_59336584-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-37.jsonl b/split_edge/graph_59336584-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-38.jsonl b/split_edge/graph_59336584-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-6.jsonl b/split_edge/graph_59336584-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-8.jsonl b/split_edge/graph_59336584-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59336584-9.jsonl b/split_edge/graph_59336584-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-0.jsonl b/split_edge/graph_59359354-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-1.jsonl b/split_edge/graph_59359354-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-11.jsonl b/split_edge/graph_59359354-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-12.jsonl b/split_edge/graph_59359354-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-13.jsonl b/split_edge/graph_59359354-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-14.jsonl b/split_edge/graph_59359354-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-2.jsonl b/split_edge/graph_59359354-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-4.jsonl b/split_edge/graph_59359354-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-5.jsonl b/split_edge/graph_59359354-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-6.jsonl b/split_edge/graph_59359354-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-7.jsonl b/split_edge/graph_59359354-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-8.jsonl b/split_edge/graph_59359354-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59359354-9.jsonl b/split_edge/graph_59359354-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-1.jsonl b/split_edge/graph_59462550-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-10.jsonl b/split_edge/graph_59462550-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-11.jsonl b/split_edge/graph_59462550-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-13.jsonl b/split_edge/graph_59462550-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-14.jsonl b/split_edge/graph_59462550-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-16.jsonl b/split_edge/graph_59462550-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-17.jsonl b/split_edge/graph_59462550-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-18.jsonl b/split_edge/graph_59462550-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-19.jsonl b/split_edge/graph_59462550-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-3.jsonl b/split_edge/graph_59462550-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-4.jsonl b/split_edge/graph_59462550-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-5.jsonl b/split_edge/graph_59462550-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-6.jsonl b/split_edge/graph_59462550-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-7.jsonl b/split_edge/graph_59462550-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59462550-9.jsonl b/split_edge/graph_59462550-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-0.jsonl b/split_edge/graph_595093-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-1.jsonl b/split_edge/graph_595093-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-15.jsonl b/split_edge/graph_595093-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-17.jsonl b/split_edge/graph_595093-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-18.jsonl b/split_edge/graph_595093-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-19.jsonl b/split_edge/graph_595093-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-2.jsonl b/split_edge/graph_595093-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-20.jsonl b/split_edge/graph_595093-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-22.jsonl b/split_edge/graph_595093-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-24.jsonl b/split_edge/graph_595093-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-25.jsonl b/split_edge/graph_595093-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-26.jsonl b/split_edge/graph_595093-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-27.jsonl b/split_edge/graph_595093-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-28.jsonl b/split_edge/graph_595093-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-29.jsonl b/split_edge/graph_595093-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-3.jsonl b/split_edge/graph_595093-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-4.jsonl b/split_edge/graph_595093-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-5.jsonl b/split_edge/graph_595093-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-6.jsonl b/split_edge/graph_595093-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-7.jsonl b/split_edge/graph_595093-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-8.jsonl b/split_edge/graph_595093-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_595093-9.jsonl b/split_edge/graph_595093-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-1.jsonl b/split_edge/graph_59523928-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-14.jsonl b/split_edge/graph_59523928-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-17.jsonl b/split_edge/graph_59523928-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-18.jsonl b/split_edge/graph_59523928-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-2.jsonl b/split_edge/graph_59523928-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-3.jsonl b/split_edge/graph_59523928-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-4.jsonl b/split_edge/graph_59523928-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-8.jsonl b/split_edge/graph_59523928-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59523928-9.jsonl b/split_edge/graph_59523928-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-0.jsonl b/split_edge/graph_59535224-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-11.jsonl b/split_edge/graph_59535224-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-12.jsonl b/split_edge/graph_59535224-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-14.jsonl b/split_edge/graph_59535224-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-15.jsonl b/split_edge/graph_59535224-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-16.jsonl b/split_edge/graph_59535224-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-18.jsonl b/split_edge/graph_59535224-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-19.jsonl b/split_edge/graph_59535224-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-20.jsonl b/split_edge/graph_59535224-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-21.jsonl b/split_edge/graph_59535224-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-23.jsonl b/split_edge/graph_59535224-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-24.jsonl b/split_edge/graph_59535224-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-25.jsonl b/split_edge/graph_59535224-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-26.jsonl b/split_edge/graph_59535224-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-27.jsonl b/split_edge/graph_59535224-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-3.jsonl b/split_edge/graph_59535224-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-4.jsonl b/split_edge/graph_59535224-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-5.jsonl b/split_edge/graph_59535224-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-6.jsonl b/split_edge/graph_59535224-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-7.jsonl b/split_edge/graph_59535224-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-8.jsonl b/split_edge/graph_59535224-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59535224-9.jsonl b/split_edge/graph_59535224-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-0.jsonl b/split_edge/graph_59616592-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-1.jsonl b/split_edge/graph_59616592-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-10.jsonl b/split_edge/graph_59616592-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-11.jsonl b/split_edge/graph_59616592-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-14.jsonl b/split_edge/graph_59616592-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-18.jsonl b/split_edge/graph_59616592-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-19.jsonl b/split_edge/graph_59616592-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-2.jsonl b/split_edge/graph_59616592-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-20.jsonl b/split_edge/graph_59616592-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-3.jsonl b/split_edge/graph_59616592-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-4.jsonl b/split_edge/graph_59616592-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-5.jsonl b/split_edge/graph_59616592-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-6.jsonl b/split_edge/graph_59616592-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-7.jsonl b/split_edge/graph_59616592-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-8.jsonl b/split_edge/graph_59616592-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59616592-9.jsonl b/split_edge/graph_59616592-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-0.jsonl b/split_edge/graph_59618880-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-1.jsonl b/split_edge/graph_59618880-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-10.jsonl b/split_edge/graph_59618880-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-11.jsonl b/split_edge/graph_59618880-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-12.jsonl b/split_edge/graph_59618880-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-13.jsonl b/split_edge/graph_59618880-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-14.jsonl b/split_edge/graph_59618880-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-15.jsonl b/split_edge/graph_59618880-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-5.jsonl b/split_edge/graph_59618880-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-6.jsonl b/split_edge/graph_59618880-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-7.jsonl b/split_edge/graph_59618880-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_59618880-8.jsonl b/split_edge/graph_59618880-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-0.jsonl b/split_edge/graph_6001064-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-1.jsonl b/split_edge/graph_6001064-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-10.jsonl b/split_edge/graph_6001064-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-12.jsonl b/split_edge/graph_6001064-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-16.jsonl b/split_edge/graph_6001064-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-17.jsonl b/split_edge/graph_6001064-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-19.jsonl b/split_edge/graph_6001064-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-20.jsonl b/split_edge/graph_6001064-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-21.jsonl b/split_edge/graph_6001064-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-26.jsonl b/split_edge/graph_6001064-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-3.jsonl b/split_edge/graph_6001064-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-32.jsonl b/split_edge/graph_6001064-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-6.jsonl b/split_edge/graph_6001064-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6001064-9.jsonl b/split_edge/graph_6001064-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60107890-4.jsonl b/split_edge/graph_60107890-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-0.jsonl b/split_edge/graph_6028805-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-10.jsonl b/split_edge/graph_6028805-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-11.jsonl b/split_edge/graph_6028805-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-12.jsonl b/split_edge/graph_6028805-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-14.jsonl b/split_edge/graph_6028805-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-15.jsonl b/split_edge/graph_6028805-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-16.jsonl b/split_edge/graph_6028805-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-17.jsonl b/split_edge/graph_6028805-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-18.jsonl b/split_edge/graph_6028805-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-2.jsonl b/split_edge/graph_6028805-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-3.jsonl b/split_edge/graph_6028805-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-4.jsonl b/split_edge/graph_6028805-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-5.jsonl b/split_edge/graph_6028805-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-6.jsonl b/split_edge/graph_6028805-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-7.jsonl b/split_edge/graph_6028805-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-8.jsonl b/split_edge/graph_6028805-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6028805-9.jsonl b/split_edge/graph_6028805-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60441309-0.jsonl b/split_edge/graph_60441309-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60441309-2.jsonl b/split_edge/graph_60441309-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60441309-3.jsonl b/split_edge/graph_60441309-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60441309-4.jsonl b/split_edge/graph_60441309-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60442806-0.jsonl b/split_edge/graph_60442806-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60442806-10.jsonl b/split_edge/graph_60442806-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60442806-4.jsonl b/split_edge/graph_60442806-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60442806-5.jsonl b/split_edge/graph_60442806-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60442806-7.jsonl b/split_edge/graph_60442806-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60442806-8.jsonl b/split_edge/graph_60442806-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60442806-9.jsonl b/split_edge/graph_60442806-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-0.jsonl b/split_edge/graph_60469108-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-10.jsonl b/split_edge/graph_60469108-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-11.jsonl b/split_edge/graph_60469108-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-12.jsonl b/split_edge/graph_60469108-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-2.jsonl b/split_edge/graph_60469108-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-4.jsonl b/split_edge/graph_60469108-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-5.jsonl b/split_edge/graph_60469108-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-6.jsonl b/split_edge/graph_60469108-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-7.jsonl b/split_edge/graph_60469108-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60469108-8.jsonl b/split_edge/graph_60469108-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-0.jsonl b/split_edge/graph_60506702-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-1.jsonl b/split_edge/graph_60506702-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-13.jsonl b/split_edge/graph_60506702-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-2.jsonl b/split_edge/graph_60506702-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-3.jsonl b/split_edge/graph_60506702-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-4.jsonl b/split_edge/graph_60506702-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-5.jsonl b/split_edge/graph_60506702-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60506702-7.jsonl b/split_edge/graph_60506702-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60769750-0.jsonl b/split_edge/graph_60769750-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60769750-1.jsonl b/split_edge/graph_60769750-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60769750-13.jsonl b/split_edge/graph_60769750-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60769750-3.jsonl b/split_edge/graph_60769750-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60769750-5.jsonl b/split_edge/graph_60769750-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-0.jsonl b/split_edge/graph_6078908-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-1.jsonl b/split_edge/graph_6078908-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-10.jsonl b/split_edge/graph_6078908-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-11.jsonl b/split_edge/graph_6078908-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-12.jsonl b/split_edge/graph_6078908-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-13.jsonl b/split_edge/graph_6078908-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-3.jsonl b/split_edge/graph_6078908-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-4.jsonl b/split_edge/graph_6078908-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-5.jsonl b/split_edge/graph_6078908-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-6.jsonl b/split_edge/graph_6078908-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-7.jsonl b/split_edge/graph_6078908-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6078908-8.jsonl b/split_edge/graph_6078908-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60864944-18.jsonl b/split_edge/graph_60864944-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60864944-19.jsonl b/split_edge/graph_60864944-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60864944-20.jsonl b/split_edge/graph_60864944-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60864944-21.jsonl b/split_edge/graph_60864944-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60864944-22.jsonl b/split_edge/graph_60864944-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60864944-3.jsonl b/split_edge/graph_60864944-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60864944-9.jsonl b/split_edge/graph_60864944-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60936035-10.jsonl b/split_edge/graph_60936035-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60936035-3.jsonl b/split_edge/graph_60936035-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60936035-5.jsonl b/split_edge/graph_60936035-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60936035-6.jsonl b/split_edge/graph_60936035-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60936035-7.jsonl b/split_edge/graph_60936035-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60936035-8.jsonl b/split_edge/graph_60936035-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60936035-9.jsonl b/split_edge/graph_60936035-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-1.jsonl b/split_edge/graph_60939833-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-11.jsonl b/split_edge/graph_60939833-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-14.jsonl b/split_edge/graph_60939833-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-30.jsonl b/split_edge/graph_60939833-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-33.jsonl b/split_edge/graph_60939833-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-4.jsonl b/split_edge/graph_60939833-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-6.jsonl b/split_edge/graph_60939833-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-7.jsonl b/split_edge/graph_60939833-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_60939833-8.jsonl b/split_edge/graph_60939833-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6110339-1.jsonl b/split_edge/graph_6110339-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6110339-2.jsonl b/split_edge/graph_6110339-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6110339-3.jsonl b/split_edge/graph_6110339-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-10.jsonl b/split_edge/graph_61281996-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-12.jsonl b/split_edge/graph_61281996-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-14.jsonl b/split_edge/graph_61281996-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-15.jsonl b/split_edge/graph_61281996-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-3.jsonl b/split_edge/graph_61281996-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-4.jsonl b/split_edge/graph_61281996-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-7.jsonl b/split_edge/graph_61281996-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-8.jsonl b/split_edge/graph_61281996-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61281996-9.jsonl b/split_edge/graph_61281996-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61373297-0.jsonl b/split_edge/graph_61373297-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61373297-1.jsonl b/split_edge/graph_61373297-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-0.jsonl b/split_edge/graph_61508000-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-1.jsonl b/split_edge/graph_61508000-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-16.jsonl b/split_edge/graph_61508000-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-17.jsonl b/split_edge/graph_61508000-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-19.jsonl b/split_edge/graph_61508000-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-2.jsonl b/split_edge/graph_61508000-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-20.jsonl b/split_edge/graph_61508000-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-21.jsonl b/split_edge/graph_61508000-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-22.jsonl b/split_edge/graph_61508000-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-23.jsonl b/split_edge/graph_61508000-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-24.jsonl b/split_edge/graph_61508000-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-25.jsonl b/split_edge/graph_61508000-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-3.jsonl b/split_edge/graph_61508000-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61508000-7.jsonl b/split_edge/graph_61508000-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6153516-0.jsonl b/split_edge/graph_6153516-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6153516-11.jsonl b/split_edge/graph_6153516-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6153516-12.jsonl b/split_edge/graph_6153516-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6153516-6.jsonl b/split_edge/graph_6153516-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6153516-9.jsonl b/split_edge/graph_6153516-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-1.jsonl b/split_edge/graph_6159806-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-10.jsonl b/split_edge/graph_6159806-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-11.jsonl b/split_edge/graph_6159806-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-12.jsonl b/split_edge/graph_6159806-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-13.jsonl b/split_edge/graph_6159806-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-14.jsonl b/split_edge/graph_6159806-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-15.jsonl b/split_edge/graph_6159806-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-3.jsonl b/split_edge/graph_6159806-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-5.jsonl b/split_edge/graph_6159806-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-6.jsonl b/split_edge/graph_6159806-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-7.jsonl b/split_edge/graph_6159806-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6159806-8.jsonl b/split_edge/graph_6159806-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-1.jsonl b/split_edge/graph_61609486-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-10.jsonl b/split_edge/graph_61609486-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-11.jsonl b/split_edge/graph_61609486-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-12.jsonl b/split_edge/graph_61609486-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-13.jsonl b/split_edge/graph_61609486-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-2.jsonl b/split_edge/graph_61609486-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-3.jsonl b/split_edge/graph_61609486-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-4.jsonl b/split_edge/graph_61609486-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-6.jsonl b/split_edge/graph_61609486-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-8.jsonl b/split_edge/graph_61609486-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61609486-9.jsonl b/split_edge/graph_61609486-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61690198-1.jsonl b/split_edge/graph_61690198-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-0.jsonl b/split_edge/graph_61806265-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-10.jsonl b/split_edge/graph_61806265-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-11.jsonl b/split_edge/graph_61806265-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-14.jsonl b/split_edge/graph_61806265-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-18.jsonl b/split_edge/graph_61806265-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-2.jsonl b/split_edge/graph_61806265-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-20.jsonl b/split_edge/graph_61806265-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-23.jsonl b/split_edge/graph_61806265-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-24.jsonl b/split_edge/graph_61806265-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-25.jsonl b/split_edge/graph_61806265-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-27.jsonl b/split_edge/graph_61806265-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-28.jsonl b/split_edge/graph_61806265-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-29.jsonl b/split_edge/graph_61806265-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-3.jsonl b/split_edge/graph_61806265-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-30.jsonl b/split_edge/graph_61806265-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-31.jsonl b/split_edge/graph_61806265-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-32.jsonl b/split_edge/graph_61806265-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-33.jsonl b/split_edge/graph_61806265-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-34.jsonl b/split_edge/graph_61806265-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-35.jsonl b/split_edge/graph_61806265-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-36.jsonl b/split_edge/graph_61806265-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-4.jsonl b/split_edge/graph_61806265-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-44.jsonl b/split_edge/graph_61806265-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-47.jsonl b/split_edge/graph_61806265-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-5.jsonl b/split_edge/graph_61806265-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-54.jsonl b/split_edge/graph_61806265-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-55.jsonl b/split_edge/graph_61806265-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-56.jsonl b/split_edge/graph_61806265-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-6.jsonl b/split_edge/graph_61806265-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61806265-7.jsonl b/split_edge/graph_61806265-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-0.jsonl b/split_edge/graph_61832675-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-1.jsonl b/split_edge/graph_61832675-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-11.jsonl b/split_edge/graph_61832675-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-12.jsonl b/split_edge/graph_61832675-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-16.jsonl b/split_edge/graph_61832675-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-19.jsonl b/split_edge/graph_61832675-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-21.jsonl b/split_edge/graph_61832675-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-23.jsonl b/split_edge/graph_61832675-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-36.jsonl b/split_edge/graph_61832675-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-40.jsonl b/split_edge/graph_61832675-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-43.jsonl b/split_edge/graph_61832675-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-47.jsonl b/split_edge/graph_61832675-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-5.jsonl b/split_edge/graph_61832675-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-6.jsonl b/split_edge/graph_61832675-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-7.jsonl b/split_edge/graph_61832675-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61832675-8.jsonl b/split_edge/graph_61832675-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_61948452-0.jsonl b/split_edge/graph_61948452-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62095653-0.jsonl b/split_edge/graph_62095653-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62095653-3.jsonl b/split_edge/graph_62095653-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157060-0.jsonl b/split_edge/graph_62157060-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157060-1.jsonl b/split_edge/graph_62157060-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157060-2.jsonl b/split_edge/graph_62157060-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-0.jsonl b/split_edge/graph_62157401-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-1.jsonl b/split_edge/graph_62157401-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-10.jsonl b/split_edge/graph_62157401-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-11.jsonl b/split_edge/graph_62157401-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-12.jsonl b/split_edge/graph_62157401-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-13.jsonl b/split_edge/graph_62157401-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-17.jsonl b/split_edge/graph_62157401-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-4.jsonl b/split_edge/graph_62157401-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-5.jsonl b/split_edge/graph_62157401-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-6.jsonl b/split_edge/graph_62157401-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-7.jsonl b/split_edge/graph_62157401-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-8.jsonl b/split_edge/graph_62157401-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62157401-9.jsonl b/split_edge/graph_62157401-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-0.jsonl b/split_edge/graph_62159429-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-12.jsonl b/split_edge/graph_62159429-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-13.jsonl b/split_edge/graph_62159429-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-16.jsonl b/split_edge/graph_62159429-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-17.jsonl b/split_edge/graph_62159429-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-20.jsonl b/split_edge/graph_62159429-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-22.jsonl b/split_edge/graph_62159429-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-23.jsonl b/split_edge/graph_62159429-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-24.jsonl b/split_edge/graph_62159429-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-25.jsonl b/split_edge/graph_62159429-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-26.jsonl b/split_edge/graph_62159429-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-3.jsonl b/split_edge/graph_62159429-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-4.jsonl b/split_edge/graph_62159429-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-7.jsonl b/split_edge/graph_62159429-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62159429-9.jsonl b/split_edge/graph_62159429-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-0.jsonl b/split_edge/graph_62162715-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-10.jsonl b/split_edge/graph_62162715-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-12.jsonl b/split_edge/graph_62162715-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-13.jsonl b/split_edge/graph_62162715-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-14.jsonl b/split_edge/graph_62162715-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-15.jsonl b/split_edge/graph_62162715-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-16.jsonl b/split_edge/graph_62162715-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-17.jsonl b/split_edge/graph_62162715-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-18.jsonl b/split_edge/graph_62162715-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-2.jsonl b/split_edge/graph_62162715-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-4.jsonl b/split_edge/graph_62162715-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-5.jsonl b/split_edge/graph_62162715-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62162715-6.jsonl b/split_edge/graph_62162715-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62181229-4.jsonl b/split_edge/graph_62181229-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-0.jsonl b/split_edge/graph_62185127-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-11.jsonl b/split_edge/graph_62185127-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-14.jsonl b/split_edge/graph_62185127-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-15.jsonl b/split_edge/graph_62185127-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-4.jsonl b/split_edge/graph_62185127-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-5.jsonl b/split_edge/graph_62185127-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-7.jsonl b/split_edge/graph_62185127-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62185127-8.jsonl b/split_edge/graph_62185127-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-0.jsonl b/split_edge/graph_6218667-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-10.jsonl b/split_edge/graph_6218667-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-11.jsonl b/split_edge/graph_6218667-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-12.jsonl b/split_edge/graph_6218667-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-13.jsonl b/split_edge/graph_6218667-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-14.jsonl b/split_edge/graph_6218667-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-16.jsonl b/split_edge/graph_6218667-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-25.jsonl b/split_edge/graph_6218667-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-28.jsonl b/split_edge/graph_6218667-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-29.jsonl b/split_edge/graph_6218667-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-3.jsonl b/split_edge/graph_6218667-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-31.jsonl b/split_edge/graph_6218667-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-32.jsonl b/split_edge/graph_6218667-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-34.jsonl b/split_edge/graph_6218667-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-36.jsonl b/split_edge/graph_6218667-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-5.jsonl b/split_edge/graph_6218667-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-6.jsonl b/split_edge/graph_6218667-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-7.jsonl b/split_edge/graph_6218667-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-8.jsonl b/split_edge/graph_6218667-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6218667-9.jsonl b/split_edge/graph_6218667-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-0.jsonl b/split_edge/graph_62223499-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-10.jsonl b/split_edge/graph_62223499-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-12.jsonl b/split_edge/graph_62223499-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-13.jsonl b/split_edge/graph_62223499-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-14.jsonl b/split_edge/graph_62223499-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-3.jsonl b/split_edge/graph_62223499-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-4.jsonl b/split_edge/graph_62223499-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-5.jsonl b/split_edge/graph_62223499-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-8.jsonl b/split_edge/graph_62223499-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62223499-9.jsonl b/split_edge/graph_62223499-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62416047-0.jsonl b/split_edge/graph_62416047-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62416047-1.jsonl b/split_edge/graph_62416047-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62416047-2.jsonl b/split_edge/graph_62416047-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-0.jsonl b/split_edge/graph_62435909-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-11.jsonl b/split_edge/graph_62435909-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-12.jsonl b/split_edge/graph_62435909-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-13.jsonl b/split_edge/graph_62435909-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-14.jsonl b/split_edge/graph_62435909-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-15.jsonl b/split_edge/graph_62435909-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-16.jsonl b/split_edge/graph_62435909-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-19.jsonl b/split_edge/graph_62435909-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-20.jsonl b/split_edge/graph_62435909-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-21.jsonl b/split_edge/graph_62435909-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-24.jsonl b/split_edge/graph_62435909-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-4.jsonl b/split_edge/graph_62435909-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-5.jsonl b/split_edge/graph_62435909-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-6.jsonl b/split_edge/graph_62435909-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62435909-9.jsonl b/split_edge/graph_62435909-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-0.jsonl b/split_edge/graph_6252662-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-10.jsonl b/split_edge/graph_6252662-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-11.jsonl b/split_edge/graph_6252662-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-12.jsonl b/split_edge/graph_6252662-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-13.jsonl b/split_edge/graph_6252662-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-15.jsonl b/split_edge/graph_6252662-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-16.jsonl b/split_edge/graph_6252662-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-17.jsonl b/split_edge/graph_6252662-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-18.jsonl b/split_edge/graph_6252662-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-19.jsonl b/split_edge/graph_6252662-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-21.jsonl b/split_edge/graph_6252662-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-22.jsonl b/split_edge/graph_6252662-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-23.jsonl b/split_edge/graph_6252662-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-25.jsonl b/split_edge/graph_6252662-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-26.jsonl b/split_edge/graph_6252662-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-27.jsonl b/split_edge/graph_6252662-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-29.jsonl b/split_edge/graph_6252662-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-3.jsonl b/split_edge/graph_6252662-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-30.jsonl b/split_edge/graph_6252662-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-31.jsonl b/split_edge/graph_6252662-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-32.jsonl b/split_edge/graph_6252662-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-4.jsonl b/split_edge/graph_6252662-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-6.jsonl b/split_edge/graph_6252662-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-7.jsonl b/split_edge/graph_6252662-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6252662-9.jsonl b/split_edge/graph_6252662-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62568680-0.jsonl b/split_edge/graph_62568680-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62568680-3.jsonl b/split_edge/graph_62568680-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-1.jsonl b/split_edge/graph_62585238-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-10.jsonl b/split_edge/graph_62585238-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-11.jsonl b/split_edge/graph_62585238-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-14.jsonl b/split_edge/graph_62585238-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-15.jsonl b/split_edge/graph_62585238-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-16.jsonl b/split_edge/graph_62585238-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-17.jsonl b/split_edge/graph_62585238-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-18.jsonl b/split_edge/graph_62585238-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-4.jsonl b/split_edge/graph_62585238-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-7.jsonl b/split_edge/graph_62585238-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62585238-9.jsonl b/split_edge/graph_62585238-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-0.jsonl b/split_edge/graph_62670670-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-10.jsonl b/split_edge/graph_62670670-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-11.jsonl b/split_edge/graph_62670670-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-12.jsonl b/split_edge/graph_62670670-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-13.jsonl b/split_edge/graph_62670670-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-14.jsonl b/split_edge/graph_62670670-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-3.jsonl b/split_edge/graph_62670670-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-7.jsonl b/split_edge/graph_62670670-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-8.jsonl b/split_edge/graph_62670670-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62670670-9.jsonl b/split_edge/graph_62670670-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-0.jsonl b/split_edge/graph_62701834-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-1.jsonl b/split_edge/graph_62701834-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-10.jsonl b/split_edge/graph_62701834-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-11.jsonl b/split_edge/graph_62701834-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-12.jsonl b/split_edge/graph_62701834-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-13.jsonl b/split_edge/graph_62701834-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-15.jsonl b/split_edge/graph_62701834-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-16.jsonl b/split_edge/graph_62701834-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-17.jsonl b/split_edge/graph_62701834-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-18.jsonl b/split_edge/graph_62701834-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-19.jsonl b/split_edge/graph_62701834-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-20.jsonl b/split_edge/graph_62701834-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-21.jsonl b/split_edge/graph_62701834-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-22.jsonl b/split_edge/graph_62701834-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-23.jsonl b/split_edge/graph_62701834-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-24.jsonl b/split_edge/graph_62701834-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-26.jsonl b/split_edge/graph_62701834-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-27.jsonl b/split_edge/graph_62701834-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-3.jsonl b/split_edge/graph_62701834-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-4.jsonl b/split_edge/graph_62701834-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-5.jsonl b/split_edge/graph_62701834-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-6.jsonl b/split_edge/graph_62701834-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-7.jsonl b/split_edge/graph_62701834-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62701834-8.jsonl b/split_edge/graph_62701834-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_62790386-5.jsonl b/split_edge/graph_62790386-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-0.jsonl b/split_edge/graph_6305682-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-10.jsonl b/split_edge/graph_6305682-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-11.jsonl b/split_edge/graph_6305682-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-12.jsonl b/split_edge/graph_6305682-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-13.jsonl b/split_edge/graph_6305682-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-14.jsonl b/split_edge/graph_6305682-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-15.jsonl b/split_edge/graph_6305682-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-16.jsonl b/split_edge/graph_6305682-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-18.jsonl b/split_edge/graph_6305682-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-19.jsonl b/split_edge/graph_6305682-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-2.jsonl b/split_edge/graph_6305682-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-20.jsonl b/split_edge/graph_6305682-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-21.jsonl b/split_edge/graph_6305682-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-22.jsonl b/split_edge/graph_6305682-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-24.jsonl b/split_edge/graph_6305682-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-25.jsonl b/split_edge/graph_6305682-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-26.jsonl b/split_edge/graph_6305682-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-3.jsonl b/split_edge/graph_6305682-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-7.jsonl b/split_edge/graph_6305682-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-8.jsonl b/split_edge/graph_6305682-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6305682-9.jsonl b/split_edge/graph_6305682-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-0.jsonl b/split_edge/graph_6308240-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-10.jsonl b/split_edge/graph_6308240-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-11.jsonl b/split_edge/graph_6308240-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-13.jsonl b/split_edge/graph_6308240-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-14.jsonl b/split_edge/graph_6308240-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-15.jsonl b/split_edge/graph_6308240-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-16.jsonl b/split_edge/graph_6308240-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-17.jsonl b/split_edge/graph_6308240-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-18.jsonl b/split_edge/graph_6308240-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-20.jsonl b/split_edge/graph_6308240-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-23.jsonl b/split_edge/graph_6308240-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-24.jsonl b/split_edge/graph_6308240-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-25.jsonl b/split_edge/graph_6308240-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-26.jsonl b/split_edge/graph_6308240-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-27.jsonl b/split_edge/graph_6308240-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-28.jsonl b/split_edge/graph_6308240-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-4.jsonl b/split_edge/graph_6308240-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-5.jsonl b/split_edge/graph_6308240-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6308240-7.jsonl b/split_edge/graph_6308240-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63377959-0.jsonl b/split_edge/graph_63377959-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63377959-1.jsonl b/split_edge/graph_63377959-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63377959-10.jsonl b/split_edge/graph_63377959-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63377959-8.jsonl b/split_edge/graph_63377959-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63377959-9.jsonl b/split_edge/graph_63377959-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63441621-0.jsonl b/split_edge/graph_63441621-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-0.jsonl b/split_edge/graph_63776596-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-10.jsonl b/split_edge/graph_63776596-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-11.jsonl b/split_edge/graph_63776596-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-4.jsonl b/split_edge/graph_63776596-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-5.jsonl b/split_edge/graph_63776596-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-6.jsonl b/split_edge/graph_63776596-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-7.jsonl b/split_edge/graph_63776596-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-8.jsonl b/split_edge/graph_63776596-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63776596-9.jsonl b/split_edge/graph_63776596-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63927538-0.jsonl b/split_edge/graph_63927538-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63927538-1.jsonl b/split_edge/graph_63927538-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63927538-13.jsonl b/split_edge/graph_63927538-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_63927538-14.jsonl b/split_edge/graph_63927538-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64059171-0.jsonl b/split_edge/graph_64059171-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64059171-2.jsonl b/split_edge/graph_64059171-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64059171-6.jsonl b/split_edge/graph_64059171-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64059171-7.jsonl b/split_edge/graph_64059171-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64059171-8.jsonl b/split_edge/graph_64059171-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64059171-9.jsonl b/split_edge/graph_64059171-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-0.jsonl b/split_edge/graph_6414421-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-1.jsonl b/split_edge/graph_6414421-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-10.jsonl b/split_edge/graph_6414421-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-11.jsonl b/split_edge/graph_6414421-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-12.jsonl b/split_edge/graph_6414421-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-15.jsonl b/split_edge/graph_6414421-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-16.jsonl b/split_edge/graph_6414421-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-17.jsonl b/split_edge/graph_6414421-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-18.jsonl b/split_edge/graph_6414421-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-19.jsonl b/split_edge/graph_6414421-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-2.jsonl b/split_edge/graph_6414421-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-20.jsonl b/split_edge/graph_6414421-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-22.jsonl b/split_edge/graph_6414421-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-23.jsonl b/split_edge/graph_6414421-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-24.jsonl b/split_edge/graph_6414421-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-25.jsonl b/split_edge/graph_6414421-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-4.jsonl b/split_edge/graph_6414421-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6414421-9.jsonl b/split_edge/graph_6414421-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-0.jsonl b/split_edge/graph_64345410-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-1.jsonl b/split_edge/graph_64345410-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-10.jsonl b/split_edge/graph_64345410-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-12.jsonl b/split_edge/graph_64345410-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-14.jsonl b/split_edge/graph_64345410-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-15.jsonl b/split_edge/graph_64345410-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-16.jsonl b/split_edge/graph_64345410-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-17.jsonl b/split_edge/graph_64345410-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-18.jsonl b/split_edge/graph_64345410-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-19.jsonl b/split_edge/graph_64345410-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-2.jsonl b/split_edge/graph_64345410-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-21.jsonl b/split_edge/graph_64345410-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-22.jsonl b/split_edge/graph_64345410-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-3.jsonl b/split_edge/graph_64345410-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-4.jsonl b/split_edge/graph_64345410-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-5.jsonl b/split_edge/graph_64345410-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-6.jsonl b/split_edge/graph_64345410-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-7.jsonl b/split_edge/graph_64345410-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-8.jsonl b/split_edge/graph_64345410-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64345410-9.jsonl b/split_edge/graph_64345410-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64374836-0.jsonl b/split_edge/graph_64374836-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-0.jsonl b/split_edge/graph_64487699-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-11.jsonl b/split_edge/graph_64487699-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-12.jsonl b/split_edge/graph_64487699-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-2.jsonl b/split_edge/graph_64487699-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-3.jsonl b/split_edge/graph_64487699-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-4.jsonl b/split_edge/graph_64487699-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-5.jsonl b/split_edge/graph_64487699-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-6.jsonl b/split_edge/graph_64487699-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-7.jsonl b/split_edge/graph_64487699-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64487699-9.jsonl b/split_edge/graph_64487699-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64743650-1.jsonl b/split_edge/graph_64743650-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64743650-2.jsonl b/split_edge/graph_64743650-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64743650-3.jsonl b/split_edge/graph_64743650-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64743650-4.jsonl b/split_edge/graph_64743650-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-0.jsonl b/split_edge/graph_6495023-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-1.jsonl b/split_edge/graph_6495023-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-2.jsonl b/split_edge/graph_6495023-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-4.jsonl b/split_edge/graph_6495023-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-5.jsonl b/split_edge/graph_6495023-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-6.jsonl b/split_edge/graph_6495023-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-7.jsonl b/split_edge/graph_6495023-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6495023-8.jsonl b/split_edge/graph_6495023-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64976549-0.jsonl b/split_edge/graph_64976549-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64976549-2.jsonl b/split_edge/graph_64976549-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64976549-4.jsonl b/split_edge/graph_64976549-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64976549-5.jsonl b/split_edge/graph_64976549-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_64976549-6.jsonl b/split_edge/graph_64976549-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65252107-2.jsonl b/split_edge/graph_65252107-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65252107-6.jsonl b/split_edge/graph_65252107-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65252107-7.jsonl b/split_edge/graph_65252107-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65252107-8.jsonl b/split_edge/graph_65252107-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65252107-9.jsonl b/split_edge/graph_65252107-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65312101-0.jsonl b/split_edge/graph_65312101-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65312101-2.jsonl b/split_edge/graph_65312101-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65312101-3.jsonl b/split_edge/graph_65312101-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65312101-4.jsonl b/split_edge/graph_65312101-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65312101-5.jsonl b/split_edge/graph_65312101-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65312101-6.jsonl b/split_edge/graph_65312101-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_65312101-7.jsonl b/split_edge/graph_65312101-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-0.jsonl b/split_edge/graph_6570872-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-1.jsonl b/split_edge/graph_6570872-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-2.jsonl b/split_edge/graph_6570872-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-3.jsonl b/split_edge/graph_6570872-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-4.jsonl b/split_edge/graph_6570872-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-5.jsonl b/split_edge/graph_6570872-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-6.jsonl b/split_edge/graph_6570872-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6570872-7.jsonl b/split_edge/graph_6570872-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6573283-0.jsonl b/split_edge/graph_6573283-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6573283-1.jsonl b/split_edge/graph_6573283-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6573283-2.jsonl b/split_edge/graph_6573283-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6573283-3.jsonl b/split_edge/graph_6573283-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6573283-4.jsonl b/split_edge/graph_6573283-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6573283-5.jsonl b/split_edge/graph_6573283-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6634944-1.jsonl b/split_edge/graph_6634944-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6634944-2.jsonl b/split_edge/graph_6634944-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6634944-3.jsonl b/split_edge/graph_6634944-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6634944-4.jsonl b/split_edge/graph_6634944-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6634944-5.jsonl b/split_edge/graph_6634944-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6634944-6.jsonl b/split_edge/graph_6634944-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6634944-7.jsonl b/split_edge/graph_6634944-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-0.jsonl b/split_edge/graph_66882193-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-1.jsonl b/split_edge/graph_66882193-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-11.jsonl b/split_edge/graph_66882193-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-12.jsonl b/split_edge/graph_66882193-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-14.jsonl b/split_edge/graph_66882193-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-15.jsonl b/split_edge/graph_66882193-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-2.jsonl b/split_edge/graph_66882193-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-20.jsonl b/split_edge/graph_66882193-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-24.jsonl b/split_edge/graph_66882193-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-27.jsonl b/split_edge/graph_66882193-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-3.jsonl b/split_edge/graph_66882193-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-33.jsonl b/split_edge/graph_66882193-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-4.jsonl b/split_edge/graph_66882193-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-47.jsonl b/split_edge/graph_66882193-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-52.jsonl b/split_edge/graph_66882193-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-6.jsonl b/split_edge/graph_66882193-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-7.jsonl b/split_edge/graph_66882193-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-8.jsonl b/split_edge/graph_66882193-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-81.jsonl b/split_edge/graph_66882193-81.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-82.jsonl b/split_edge/graph_66882193-82.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-83.jsonl b/split_edge/graph_66882193-83.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-84.jsonl b/split_edge/graph_66882193-84.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-85.jsonl b/split_edge/graph_66882193-85.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-86.jsonl b/split_edge/graph_66882193-86.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_66882193-9.jsonl b/split_edge/graph_66882193-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-0.jsonl b/split_edge/graph_6722007-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-1.jsonl b/split_edge/graph_6722007-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-10.jsonl b/split_edge/graph_6722007-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-11.jsonl b/split_edge/graph_6722007-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-12.jsonl b/split_edge/graph_6722007-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-13.jsonl b/split_edge/graph_6722007-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-14.jsonl b/split_edge/graph_6722007-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-2.jsonl b/split_edge/graph_6722007-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-3.jsonl b/split_edge/graph_6722007-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-4.jsonl b/split_edge/graph_6722007-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-6.jsonl b/split_edge/graph_6722007-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-7.jsonl b/split_edge/graph_6722007-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6722007-9.jsonl b/split_edge/graph_6722007-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67385456-0.jsonl b/split_edge/graph_67385456-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67385456-1.jsonl b/split_edge/graph_67385456-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67385456-6.jsonl b/split_edge/graph_67385456-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-0.jsonl b/split_edge/graph_674920-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-1.jsonl b/split_edge/graph_674920-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-10.jsonl b/split_edge/graph_674920-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-11.jsonl b/split_edge/graph_674920-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-12.jsonl b/split_edge/graph_674920-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-13.jsonl b/split_edge/graph_674920-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-6.jsonl b/split_edge/graph_674920-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-7.jsonl b/split_edge/graph_674920-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-8.jsonl b/split_edge/graph_674920-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_674920-9.jsonl b/split_edge/graph_674920-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-1.jsonl b/split_edge/graph_6751108-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-10.jsonl b/split_edge/graph_6751108-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-13.jsonl b/split_edge/graph_6751108-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-14.jsonl b/split_edge/graph_6751108-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-15.jsonl b/split_edge/graph_6751108-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-17.jsonl b/split_edge/graph_6751108-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-18.jsonl b/split_edge/graph_6751108-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-19.jsonl b/split_edge/graph_6751108-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-2.jsonl b/split_edge/graph_6751108-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-22.jsonl b/split_edge/graph_6751108-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-23.jsonl b/split_edge/graph_6751108-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-4.jsonl b/split_edge/graph_6751108-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-5.jsonl b/split_edge/graph_6751108-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-6.jsonl b/split_edge/graph_6751108-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-7.jsonl b/split_edge/graph_6751108-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-8.jsonl b/split_edge/graph_6751108-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6751108-9.jsonl b/split_edge/graph_6751108-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-10.jsonl b/split_edge/graph_6754301-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-11.jsonl b/split_edge/graph_6754301-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-14.jsonl b/split_edge/graph_6754301-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-17.jsonl b/split_edge/graph_6754301-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-18.jsonl b/split_edge/graph_6754301-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-19.jsonl b/split_edge/graph_6754301-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-20.jsonl b/split_edge/graph_6754301-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-21.jsonl b/split_edge/graph_6754301-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-22.jsonl b/split_edge/graph_6754301-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-23.jsonl b/split_edge/graph_6754301-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-24.jsonl b/split_edge/graph_6754301-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-26.jsonl b/split_edge/graph_6754301-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-28.jsonl b/split_edge/graph_6754301-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-5.jsonl b/split_edge/graph_6754301-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-6.jsonl b/split_edge/graph_6754301-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6754301-9.jsonl b/split_edge/graph_6754301-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-0.jsonl b/split_edge/graph_67855814-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-1.jsonl b/split_edge/graph_67855814-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-2.jsonl b/split_edge/graph_67855814-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-4.jsonl b/split_edge/graph_67855814-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-5.jsonl b/split_edge/graph_67855814-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-7.jsonl b/split_edge/graph_67855814-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-8.jsonl b/split_edge/graph_67855814-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67855814-9.jsonl b/split_edge/graph_67855814-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-1.jsonl b/split_edge/graph_67856618-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-10.jsonl b/split_edge/graph_67856618-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-11.jsonl b/split_edge/graph_67856618-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-12.jsonl b/split_edge/graph_67856618-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-13.jsonl b/split_edge/graph_67856618-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-14.jsonl b/split_edge/graph_67856618-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-15.jsonl b/split_edge/graph_67856618-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-16.jsonl b/split_edge/graph_67856618-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-17.jsonl b/split_edge/graph_67856618-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-18.jsonl b/split_edge/graph_67856618-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-19.jsonl b/split_edge/graph_67856618-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-2.jsonl b/split_edge/graph_67856618-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-22.jsonl b/split_edge/graph_67856618-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-23.jsonl b/split_edge/graph_67856618-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-24.jsonl b/split_edge/graph_67856618-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-25.jsonl b/split_edge/graph_67856618-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-3.jsonl b/split_edge/graph_67856618-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-4.jsonl b/split_edge/graph_67856618-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-5.jsonl b/split_edge/graph_67856618-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-6.jsonl b/split_edge/graph_67856618-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-8.jsonl b/split_edge/graph_67856618-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67856618-9.jsonl b/split_edge/graph_67856618-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-0.jsonl b/split_edge/graph_67867622-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-1.jsonl b/split_edge/graph_67867622-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-10.jsonl b/split_edge/graph_67867622-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-11.jsonl b/split_edge/graph_67867622-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-12.jsonl b/split_edge/graph_67867622-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-13.jsonl b/split_edge/graph_67867622-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-14.jsonl b/split_edge/graph_67867622-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-17.jsonl b/split_edge/graph_67867622-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-18.jsonl b/split_edge/graph_67867622-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-19.jsonl b/split_edge/graph_67867622-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-2.jsonl b/split_edge/graph_67867622-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-22.jsonl b/split_edge/graph_67867622-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-23.jsonl b/split_edge/graph_67867622-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-25.jsonl b/split_edge/graph_67867622-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-26.jsonl b/split_edge/graph_67867622-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-27.jsonl b/split_edge/graph_67867622-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-28.jsonl b/split_edge/graph_67867622-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-31.jsonl b/split_edge/graph_67867622-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-32.jsonl b/split_edge/graph_67867622-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-33.jsonl b/split_edge/graph_67867622-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-4.jsonl b/split_edge/graph_67867622-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-41.jsonl b/split_edge/graph_67867622-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-42.jsonl b/split_edge/graph_67867622-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-43.jsonl b/split_edge/graph_67867622-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-44.jsonl b/split_edge/graph_67867622-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-45.jsonl b/split_edge/graph_67867622-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-47.jsonl b/split_edge/graph_67867622-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-48.jsonl b/split_edge/graph_67867622-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-5.jsonl b/split_edge/graph_67867622-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-50.jsonl b/split_edge/graph_67867622-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-51.jsonl b/split_edge/graph_67867622-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-55.jsonl b/split_edge/graph_67867622-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-56.jsonl b/split_edge/graph_67867622-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-58.jsonl b/split_edge/graph_67867622-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-6.jsonl b/split_edge/graph_67867622-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-61.jsonl b/split_edge/graph_67867622-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-64.jsonl b/split_edge/graph_67867622-64.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-65.jsonl b/split_edge/graph_67867622-65.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_67867622-8.jsonl b/split_edge/graph_67867622-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-1.jsonl b/split_edge/graph_68050042-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-10.jsonl b/split_edge/graph_68050042-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-11.jsonl b/split_edge/graph_68050042-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-12.jsonl b/split_edge/graph_68050042-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-13.jsonl b/split_edge/graph_68050042-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-14.jsonl b/split_edge/graph_68050042-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-15.jsonl b/split_edge/graph_68050042-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-16.jsonl b/split_edge/graph_68050042-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-17.jsonl b/split_edge/graph_68050042-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-3.jsonl b/split_edge/graph_68050042-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-5.jsonl b/split_edge/graph_68050042-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68050042-9.jsonl b/split_edge/graph_68050042-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68087754-10.jsonl b/split_edge/graph_68087754-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68087754-3.jsonl b/split_edge/graph_68087754-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68087754-4.jsonl b/split_edge/graph_68087754-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68087754-6.jsonl b/split_edge/graph_68087754-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68087754-7.jsonl b/split_edge/graph_68087754-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68087754-8.jsonl b/split_edge/graph_68087754-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68087754-9.jsonl b/split_edge/graph_68087754-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-0.jsonl b/split_edge/graph_68121347-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-1.jsonl b/split_edge/graph_68121347-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-10.jsonl b/split_edge/graph_68121347-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-11.jsonl b/split_edge/graph_68121347-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-12.jsonl b/split_edge/graph_68121347-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-13.jsonl b/split_edge/graph_68121347-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-15.jsonl b/split_edge/graph_68121347-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-16.jsonl b/split_edge/graph_68121347-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-17.jsonl b/split_edge/graph_68121347-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-18.jsonl b/split_edge/graph_68121347-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-19.jsonl b/split_edge/graph_68121347-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-2.jsonl b/split_edge/graph_68121347-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-20.jsonl b/split_edge/graph_68121347-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-21.jsonl b/split_edge/graph_68121347-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-23.jsonl b/split_edge/graph_68121347-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-24.jsonl b/split_edge/graph_68121347-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-25.jsonl b/split_edge/graph_68121347-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-26.jsonl b/split_edge/graph_68121347-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-27.jsonl b/split_edge/graph_68121347-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-28.jsonl b/split_edge/graph_68121347-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-30.jsonl b/split_edge/graph_68121347-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-31.jsonl b/split_edge/graph_68121347-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-32.jsonl b/split_edge/graph_68121347-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-33.jsonl b/split_edge/graph_68121347-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-34.jsonl b/split_edge/graph_68121347-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-35.jsonl b/split_edge/graph_68121347-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-37.jsonl b/split_edge/graph_68121347-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-38.jsonl b/split_edge/graph_68121347-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-39.jsonl b/split_edge/graph_68121347-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-40.jsonl b/split_edge/graph_68121347-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-42.jsonl b/split_edge/graph_68121347-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-43.jsonl b/split_edge/graph_68121347-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-44.jsonl b/split_edge/graph_68121347-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-45.jsonl b/split_edge/graph_68121347-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68121347-46.jsonl b/split_edge/graph_68121347-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-1.jsonl b/split_edge/graph_6815237-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-10.jsonl b/split_edge/graph_6815237-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-18.jsonl b/split_edge/graph_6815237-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-21.jsonl b/split_edge/graph_6815237-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-4.jsonl b/split_edge/graph_6815237-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-5.jsonl b/split_edge/graph_6815237-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-6.jsonl b/split_edge/graph_6815237-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-7.jsonl b/split_edge/graph_6815237-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-8.jsonl b/split_edge/graph_6815237-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6815237-9.jsonl b/split_edge/graph_6815237-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-0.jsonl b/split_edge/graph_68171500-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-10.jsonl b/split_edge/graph_68171500-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-11.jsonl b/split_edge/graph_68171500-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-12.jsonl b/split_edge/graph_68171500-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-13.jsonl b/split_edge/graph_68171500-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-14.jsonl b/split_edge/graph_68171500-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-15.jsonl b/split_edge/graph_68171500-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-17.jsonl b/split_edge/graph_68171500-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-18.jsonl b/split_edge/graph_68171500-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-19.jsonl b/split_edge/graph_68171500-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-2.jsonl b/split_edge/graph_68171500-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-20.jsonl b/split_edge/graph_68171500-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-21.jsonl b/split_edge/graph_68171500-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-22.jsonl b/split_edge/graph_68171500-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-23.jsonl b/split_edge/graph_68171500-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-25.jsonl b/split_edge/graph_68171500-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-26.jsonl b/split_edge/graph_68171500-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-27.jsonl b/split_edge/graph_68171500-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-28.jsonl b/split_edge/graph_68171500-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-29.jsonl b/split_edge/graph_68171500-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-3.jsonl b/split_edge/graph_68171500-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-30.jsonl b/split_edge/graph_68171500-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-31.jsonl b/split_edge/graph_68171500-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-32.jsonl b/split_edge/graph_68171500-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-33.jsonl b/split_edge/graph_68171500-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-34.jsonl b/split_edge/graph_68171500-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-35.jsonl b/split_edge/graph_68171500-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-4.jsonl b/split_edge/graph_68171500-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-7.jsonl b/split_edge/graph_68171500-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_68171500-8.jsonl b/split_edge/graph_68171500-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6866374-0.jsonl b/split_edge/graph_6866374-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6866374-5.jsonl b/split_edge/graph_6866374-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_6866374-6.jsonl b/split_edge/graph_6866374-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69224705-0.jsonl b/split_edge/graph_69224705-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69224705-1.jsonl b/split_edge/graph_69224705-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69224705-2.jsonl b/split_edge/graph_69224705-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69224705-3.jsonl b/split_edge/graph_69224705-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69224705-6.jsonl b/split_edge/graph_69224705-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69224705-7.jsonl b/split_edge/graph_69224705-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69701610-0.jsonl b/split_edge/graph_69701610-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69701610-2.jsonl b/split_edge/graph_69701610-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-0.jsonl b/split_edge/graph_69964413-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-11.jsonl b/split_edge/graph_69964413-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-12.jsonl b/split_edge/graph_69964413-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-13.jsonl b/split_edge/graph_69964413-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-14.jsonl b/split_edge/graph_69964413-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-15.jsonl b/split_edge/graph_69964413-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-16.jsonl b/split_edge/graph_69964413-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-18.jsonl b/split_edge/graph_69964413-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-20.jsonl b/split_edge/graph_69964413-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-21.jsonl b/split_edge/graph_69964413-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-22.jsonl b/split_edge/graph_69964413-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-23.jsonl b/split_edge/graph_69964413-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-25.jsonl b/split_edge/graph_69964413-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-26.jsonl b/split_edge/graph_69964413-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-27.jsonl b/split_edge/graph_69964413-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-28.jsonl b/split_edge/graph_69964413-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-29.jsonl b/split_edge/graph_69964413-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-4.jsonl b/split_edge/graph_69964413-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-5.jsonl b/split_edge/graph_69964413-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-6.jsonl b/split_edge/graph_69964413-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-7.jsonl b/split_edge/graph_69964413-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-8.jsonl b/split_edge/graph_69964413-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69964413-9.jsonl b/split_edge/graph_69964413-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-1.jsonl b/split_edge/graph_69981142-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-10.jsonl b/split_edge/graph_69981142-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-11.jsonl b/split_edge/graph_69981142-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-12.jsonl b/split_edge/graph_69981142-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-13.jsonl b/split_edge/graph_69981142-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-14.jsonl b/split_edge/graph_69981142-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-15.jsonl b/split_edge/graph_69981142-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-16.jsonl b/split_edge/graph_69981142-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-17.jsonl b/split_edge/graph_69981142-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-18.jsonl b/split_edge/graph_69981142-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-19.jsonl b/split_edge/graph_69981142-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-20.jsonl b/split_edge/graph_69981142-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-21.jsonl b/split_edge/graph_69981142-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-22.jsonl b/split_edge/graph_69981142-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-3.jsonl b/split_edge/graph_69981142-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-5.jsonl b/split_edge/graph_69981142-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-6.jsonl b/split_edge/graph_69981142-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-7.jsonl b/split_edge/graph_69981142-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-8.jsonl b/split_edge/graph_69981142-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_69981142-9.jsonl b/split_edge/graph_69981142-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-0.jsonl b/split_edge/graph_70042561-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-10.jsonl b/split_edge/graph_70042561-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-11.jsonl b/split_edge/graph_70042561-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-12.jsonl b/split_edge/graph_70042561-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-13.jsonl b/split_edge/graph_70042561-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-14.jsonl b/split_edge/graph_70042561-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-15.jsonl b/split_edge/graph_70042561-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-16.jsonl b/split_edge/graph_70042561-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-17.jsonl b/split_edge/graph_70042561-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-18.jsonl b/split_edge/graph_70042561-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-19.jsonl b/split_edge/graph_70042561-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-2.jsonl b/split_edge/graph_70042561-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-3.jsonl b/split_edge/graph_70042561-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-4.jsonl b/split_edge/graph_70042561-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-5.jsonl b/split_edge/graph_70042561-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-6.jsonl b/split_edge/graph_70042561-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-8.jsonl b/split_edge/graph_70042561-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70042561-9.jsonl b/split_edge/graph_70042561-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-10.jsonl b/split_edge/graph_70044252-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-3.jsonl b/split_edge/graph_70044252-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-4.jsonl b/split_edge/graph_70044252-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-5.jsonl b/split_edge/graph_70044252-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-6.jsonl b/split_edge/graph_70044252-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-7.jsonl b/split_edge/graph_70044252-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-8.jsonl b/split_edge/graph_70044252-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70044252-9.jsonl b/split_edge/graph_70044252-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-0.jsonl b/split_edge/graph_7033496-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-1.jsonl b/split_edge/graph_7033496-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-11.jsonl b/split_edge/graph_7033496-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-17.jsonl b/split_edge/graph_7033496-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-2.jsonl b/split_edge/graph_7033496-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-20.jsonl b/split_edge/graph_7033496-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-22.jsonl b/split_edge/graph_7033496-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-23.jsonl b/split_edge/graph_7033496-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-26.jsonl b/split_edge/graph_7033496-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-27.jsonl b/split_edge/graph_7033496-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-28.jsonl b/split_edge/graph_7033496-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-34.jsonl b/split_edge/graph_7033496-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-35.jsonl b/split_edge/graph_7033496-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-36.jsonl b/split_edge/graph_7033496-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-37.jsonl b/split_edge/graph_7033496-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-38.jsonl b/split_edge/graph_7033496-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-39.jsonl b/split_edge/graph_7033496-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-5.jsonl b/split_edge/graph_7033496-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7033496-9.jsonl b/split_edge/graph_7033496-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70347260-0.jsonl b/split_edge/graph_70347260-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70347260-1.jsonl b/split_edge/graph_70347260-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70347260-2.jsonl b/split_edge/graph_70347260-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70347260-3.jsonl b/split_edge/graph_70347260-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70347260-4.jsonl b/split_edge/graph_70347260-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70347260-5.jsonl b/split_edge/graph_70347260-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_70347260-7.jsonl b/split_edge/graph_70347260-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-0.jsonl b/split_edge/graph_7071316-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-1.jsonl b/split_edge/graph_7071316-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-10.jsonl b/split_edge/graph_7071316-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-11.jsonl b/split_edge/graph_7071316-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-2.jsonl b/split_edge/graph_7071316-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-4.jsonl b/split_edge/graph_7071316-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-6.jsonl b/split_edge/graph_7071316-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7071316-7.jsonl b/split_edge/graph_7071316-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-0.jsonl b/split_edge/graph_707347-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-1.jsonl b/split_edge/graph_707347-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-10.jsonl b/split_edge/graph_707347-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-11.jsonl b/split_edge/graph_707347-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-12.jsonl b/split_edge/graph_707347-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-14.jsonl b/split_edge/graph_707347-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-15.jsonl b/split_edge/graph_707347-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-16.jsonl b/split_edge/graph_707347-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-2.jsonl b/split_edge/graph_707347-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-3.jsonl b/split_edge/graph_707347-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-4.jsonl b/split_edge/graph_707347-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-6.jsonl b/split_edge/graph_707347-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-7.jsonl b/split_edge/graph_707347-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-8.jsonl b/split_edge/graph_707347-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_707347-9.jsonl b/split_edge/graph_707347-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-1.jsonl b/split_edge/graph_7139869-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-10.jsonl b/split_edge/graph_7139869-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-12.jsonl b/split_edge/graph_7139869-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-13.jsonl b/split_edge/graph_7139869-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-14.jsonl b/split_edge/graph_7139869-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-15.jsonl b/split_edge/graph_7139869-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-17.jsonl b/split_edge/graph_7139869-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-18.jsonl b/split_edge/graph_7139869-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-19.jsonl b/split_edge/graph_7139869-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-20.jsonl b/split_edge/graph_7139869-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-21.jsonl b/split_edge/graph_7139869-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-22.jsonl b/split_edge/graph_7139869-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-3.jsonl b/split_edge/graph_7139869-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-7.jsonl b/split_edge/graph_7139869-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7139869-9.jsonl b/split_edge/graph_7139869-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-0.jsonl b/split_edge/graph_7191751-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-10.jsonl b/split_edge/graph_7191751-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-2.jsonl b/split_edge/graph_7191751-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-4.jsonl b/split_edge/graph_7191751-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-5.jsonl b/split_edge/graph_7191751-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-6.jsonl b/split_edge/graph_7191751-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-7.jsonl b/split_edge/graph_7191751-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-8.jsonl b/split_edge/graph_7191751-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7191751-9.jsonl b/split_edge/graph_7191751-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-0.jsonl b/split_edge/graph_7194930-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-1.jsonl b/split_edge/graph_7194930-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-11.jsonl b/split_edge/graph_7194930-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-13.jsonl b/split_edge/graph_7194930-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-15.jsonl b/split_edge/graph_7194930-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-17.jsonl b/split_edge/graph_7194930-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-2.jsonl b/split_edge/graph_7194930-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-3.jsonl b/split_edge/graph_7194930-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7194930-6.jsonl b/split_edge/graph_7194930-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7239044-0.jsonl b/split_edge/graph_7239044-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7239044-1.jsonl b/split_edge/graph_7239044-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7239044-11.jsonl b/split_edge/graph_7239044-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7239044-13.jsonl b/split_edge/graph_7239044-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7239044-18.jsonl b/split_edge/graph_7239044-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7239044-22.jsonl b/split_edge/graph_7239044-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-0.jsonl b/split_edge/graph_7257659-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-1.jsonl b/split_edge/graph_7257659-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-10.jsonl b/split_edge/graph_7257659-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-3.jsonl b/split_edge/graph_7257659-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-5.jsonl b/split_edge/graph_7257659-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-6.jsonl b/split_edge/graph_7257659-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-7.jsonl b/split_edge/graph_7257659-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7257659-9.jsonl b/split_edge/graph_7257659-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-15.jsonl b/split_edge/graph_7453720-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-17.jsonl b/split_edge/graph_7453720-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-18.jsonl b/split_edge/graph_7453720-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-19.jsonl b/split_edge/graph_7453720-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-22.jsonl b/split_edge/graph_7453720-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-5.jsonl b/split_edge/graph_7453720-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-7.jsonl b/split_edge/graph_7453720-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-8.jsonl b/split_edge/graph_7453720-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7453720-9.jsonl b/split_edge/graph_7453720-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-0.jsonl b/split_edge/graph_7465328-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-1.jsonl b/split_edge/graph_7465328-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-13.jsonl b/split_edge/graph_7465328-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-15.jsonl b/split_edge/graph_7465328-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-16.jsonl b/split_edge/graph_7465328-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-17.jsonl b/split_edge/graph_7465328-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-18.jsonl b/split_edge/graph_7465328-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-19.jsonl b/split_edge/graph_7465328-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-2.jsonl b/split_edge/graph_7465328-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-23.jsonl b/split_edge/graph_7465328-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-25.jsonl b/split_edge/graph_7465328-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-27.jsonl b/split_edge/graph_7465328-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-28.jsonl b/split_edge/graph_7465328-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-30.jsonl b/split_edge/graph_7465328-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-32.jsonl b/split_edge/graph_7465328-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-34.jsonl b/split_edge/graph_7465328-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7465328-6.jsonl b/split_edge/graph_7465328-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7506263-0.jsonl b/split_edge/graph_7506263-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7506263-1.jsonl b/split_edge/graph_7506263-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7506263-10.jsonl b/split_edge/graph_7506263-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7506263-14.jsonl b/split_edge/graph_7506263-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-0.jsonl b/split_edge/graph_7572837-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-10.jsonl b/split_edge/graph_7572837-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-11.jsonl b/split_edge/graph_7572837-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-12.jsonl b/split_edge/graph_7572837-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-13.jsonl b/split_edge/graph_7572837-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-14.jsonl b/split_edge/graph_7572837-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-15.jsonl b/split_edge/graph_7572837-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-2.jsonl b/split_edge/graph_7572837-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-3.jsonl b/split_edge/graph_7572837-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-5.jsonl b/split_edge/graph_7572837-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-6.jsonl b/split_edge/graph_7572837-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-8.jsonl b/split_edge/graph_7572837-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7572837-9.jsonl b/split_edge/graph_7572837-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-0.jsonl b/split_edge/graph_7597857-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-10.jsonl b/split_edge/graph_7597857-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-12.jsonl b/split_edge/graph_7597857-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-14.jsonl b/split_edge/graph_7597857-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-15.jsonl b/split_edge/graph_7597857-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-16.jsonl b/split_edge/graph_7597857-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-17.jsonl b/split_edge/graph_7597857-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-18.jsonl b/split_edge/graph_7597857-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-19.jsonl b/split_edge/graph_7597857-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-2.jsonl b/split_edge/graph_7597857-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-20.jsonl b/split_edge/graph_7597857-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-21.jsonl b/split_edge/graph_7597857-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-22.jsonl b/split_edge/graph_7597857-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-3.jsonl b/split_edge/graph_7597857-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-4.jsonl b/split_edge/graph_7597857-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-5.jsonl b/split_edge/graph_7597857-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-6.jsonl b/split_edge/graph_7597857-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-7.jsonl b/split_edge/graph_7597857-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-8.jsonl b/split_edge/graph_7597857-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7597857-9.jsonl b/split_edge/graph_7597857-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7644489-0.jsonl b/split_edge/graph_7644489-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7644489-3.jsonl b/split_edge/graph_7644489-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_766000-10.jsonl b/split_edge/graph_766000-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_766000-11.jsonl b/split_edge/graph_766000-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_766000-5.jsonl b/split_edge/graph_766000-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_766000-9.jsonl b/split_edge/graph_766000-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-0.jsonl b/split_edge/graph_76660592-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-12.jsonl b/split_edge/graph_76660592-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-13.jsonl b/split_edge/graph_76660592-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-14.jsonl b/split_edge/graph_76660592-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-2.jsonl b/split_edge/graph_76660592-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-3.jsonl b/split_edge/graph_76660592-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-4.jsonl b/split_edge/graph_76660592-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-5.jsonl b/split_edge/graph_76660592-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-6.jsonl b/split_edge/graph_76660592-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-7.jsonl b/split_edge/graph_76660592-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76660592-9.jsonl b/split_edge/graph_76660592-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-0.jsonl b/split_edge/graph_76663224-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-1.jsonl b/split_edge/graph_76663224-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-10.jsonl b/split_edge/graph_76663224-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-11.jsonl b/split_edge/graph_76663224-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-12.jsonl b/split_edge/graph_76663224-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-14.jsonl b/split_edge/graph_76663224-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-15.jsonl b/split_edge/graph_76663224-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-16.jsonl b/split_edge/graph_76663224-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-17.jsonl b/split_edge/graph_76663224-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-18.jsonl b/split_edge/graph_76663224-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-19.jsonl b/split_edge/graph_76663224-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-2.jsonl b/split_edge/graph_76663224-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-20.jsonl b/split_edge/graph_76663224-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-22.jsonl b/split_edge/graph_76663224-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-23.jsonl b/split_edge/graph_76663224-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-24.jsonl b/split_edge/graph_76663224-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-25.jsonl b/split_edge/graph_76663224-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-3.jsonl b/split_edge/graph_76663224-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-4.jsonl b/split_edge/graph_76663224-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-5.jsonl b/split_edge/graph_76663224-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-6.jsonl b/split_edge/graph_76663224-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_76663224-8.jsonl b/split_edge/graph_76663224-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-0.jsonl b/split_edge/graph_7669555-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-1.jsonl b/split_edge/graph_7669555-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-10.jsonl b/split_edge/graph_7669555-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-11.jsonl b/split_edge/graph_7669555-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-12.jsonl b/split_edge/graph_7669555-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-13.jsonl b/split_edge/graph_7669555-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-14.jsonl b/split_edge/graph_7669555-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-15.jsonl b/split_edge/graph_7669555-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-19.jsonl b/split_edge/graph_7669555-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-23.jsonl b/split_edge/graph_7669555-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-3.jsonl b/split_edge/graph_7669555-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-4.jsonl b/split_edge/graph_7669555-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-5.jsonl b/split_edge/graph_7669555-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-6.jsonl b/split_edge/graph_7669555-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-7.jsonl b/split_edge/graph_7669555-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7669555-8.jsonl b/split_edge/graph_7669555-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-10.jsonl b/split_edge/graph_7679009-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-12.jsonl b/split_edge/graph_7679009-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-16.jsonl b/split_edge/graph_7679009-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-17.jsonl b/split_edge/graph_7679009-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-19.jsonl b/split_edge/graph_7679009-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-21.jsonl b/split_edge/graph_7679009-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-22.jsonl b/split_edge/graph_7679009-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-3.jsonl b/split_edge/graph_7679009-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-5.jsonl b/split_edge/graph_7679009-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-6.jsonl b/split_edge/graph_7679009-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-7.jsonl b/split_edge/graph_7679009-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-8.jsonl b/split_edge/graph_7679009-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7679009-9.jsonl b/split_edge/graph_7679009-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-0.jsonl b/split_edge/graph_7698274-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-1.jsonl b/split_edge/graph_7698274-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-15.jsonl b/split_edge/graph_7698274-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-16.jsonl b/split_edge/graph_7698274-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-2.jsonl b/split_edge/graph_7698274-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-3.jsonl b/split_edge/graph_7698274-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-4.jsonl b/split_edge/graph_7698274-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-5.jsonl b/split_edge/graph_7698274-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7698274-6.jsonl b/split_edge/graph_7698274-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-0.jsonl b/split_edge/graph_771819-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-10.jsonl b/split_edge/graph_771819-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-17.jsonl b/split_edge/graph_771819-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-18.jsonl b/split_edge/graph_771819-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-19.jsonl b/split_edge/graph_771819-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-20.jsonl b/split_edge/graph_771819-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-21.jsonl b/split_edge/graph_771819-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-22.jsonl b/split_edge/graph_771819-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-23.jsonl b/split_edge/graph_771819-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-24.jsonl b/split_edge/graph_771819-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-26.jsonl b/split_edge/graph_771819-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-27.jsonl b/split_edge/graph_771819-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-3.jsonl b/split_edge/graph_771819-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-31.jsonl b/split_edge/graph_771819-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-33.jsonl b/split_edge/graph_771819-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-34.jsonl b/split_edge/graph_771819-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-7.jsonl b/split_edge/graph_771819-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-8.jsonl b/split_edge/graph_771819-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_771819-9.jsonl b/split_edge/graph_771819-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-0.jsonl b/split_edge/graph_7733836-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-13.jsonl b/split_edge/graph_7733836-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-15.jsonl b/split_edge/graph_7733836-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-16.jsonl b/split_edge/graph_7733836-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-17.jsonl b/split_edge/graph_7733836-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-3.jsonl b/split_edge/graph_7733836-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-4.jsonl b/split_edge/graph_7733836-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-6.jsonl b/split_edge/graph_7733836-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7733836-9.jsonl b/split_edge/graph_7733836-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-0.jsonl b/split_edge/graph_77387978-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-1.jsonl b/split_edge/graph_77387978-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-11.jsonl b/split_edge/graph_77387978-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-12.jsonl b/split_edge/graph_77387978-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-13.jsonl b/split_edge/graph_77387978-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-14.jsonl b/split_edge/graph_77387978-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-16.jsonl b/split_edge/graph_77387978-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-17.jsonl b/split_edge/graph_77387978-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-18.jsonl b/split_edge/graph_77387978-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-2.jsonl b/split_edge/graph_77387978-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-22.jsonl b/split_edge/graph_77387978-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-23.jsonl b/split_edge/graph_77387978-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-25.jsonl b/split_edge/graph_77387978-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-28.jsonl b/split_edge/graph_77387978-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-29.jsonl b/split_edge/graph_77387978-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-3.jsonl b/split_edge/graph_77387978-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-30.jsonl b/split_edge/graph_77387978-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-31.jsonl b/split_edge/graph_77387978-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-32.jsonl b/split_edge/graph_77387978-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-33.jsonl b/split_edge/graph_77387978-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-35.jsonl b/split_edge/graph_77387978-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-36.jsonl b/split_edge/graph_77387978-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-37.jsonl b/split_edge/graph_77387978-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-38.jsonl b/split_edge/graph_77387978-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-39.jsonl b/split_edge/graph_77387978-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-4.jsonl b/split_edge/graph_77387978-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-40.jsonl b/split_edge/graph_77387978-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-41.jsonl b/split_edge/graph_77387978-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-5.jsonl b/split_edge/graph_77387978-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77387978-8.jsonl b/split_edge/graph_77387978-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-0.jsonl b/split_edge/graph_77394448-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-1.jsonl b/split_edge/graph_77394448-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-10.jsonl b/split_edge/graph_77394448-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-12.jsonl b/split_edge/graph_77394448-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-13.jsonl b/split_edge/graph_77394448-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-14.jsonl b/split_edge/graph_77394448-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-17.jsonl b/split_edge/graph_77394448-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-18.jsonl b/split_edge/graph_77394448-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-2.jsonl b/split_edge/graph_77394448-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-3.jsonl b/split_edge/graph_77394448-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-4.jsonl b/split_edge/graph_77394448-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-5.jsonl b/split_edge/graph_77394448-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-6.jsonl b/split_edge/graph_77394448-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-7.jsonl b/split_edge/graph_77394448-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-8.jsonl b/split_edge/graph_77394448-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_77394448-9.jsonl b/split_edge/graph_77394448-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-0.jsonl b/split_edge/graph_7834819-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-1.jsonl b/split_edge/graph_7834819-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-10.jsonl b/split_edge/graph_7834819-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-11.jsonl b/split_edge/graph_7834819-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-12.jsonl b/split_edge/graph_7834819-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-13.jsonl b/split_edge/graph_7834819-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-14.jsonl b/split_edge/graph_7834819-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-15.jsonl b/split_edge/graph_7834819-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-16.jsonl b/split_edge/graph_7834819-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-17.jsonl b/split_edge/graph_7834819-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-18.jsonl b/split_edge/graph_7834819-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-3.jsonl b/split_edge/graph_7834819-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-7.jsonl b/split_edge/graph_7834819-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7834819-9.jsonl b/split_edge/graph_7834819-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-0.jsonl b/split_edge/graph_7875284-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-10.jsonl b/split_edge/graph_7875284-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-11.jsonl b/split_edge/graph_7875284-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-12.jsonl b/split_edge/graph_7875284-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-13.jsonl b/split_edge/graph_7875284-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-14.jsonl b/split_edge/graph_7875284-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-15.jsonl b/split_edge/graph_7875284-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-16.jsonl b/split_edge/graph_7875284-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-17.jsonl b/split_edge/graph_7875284-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-18.jsonl b/split_edge/graph_7875284-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-19.jsonl b/split_edge/graph_7875284-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-2.jsonl b/split_edge/graph_7875284-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-20.jsonl b/split_edge/graph_7875284-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-3.jsonl b/split_edge/graph_7875284-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-5.jsonl b/split_edge/graph_7875284-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-7.jsonl b/split_edge/graph_7875284-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7875284-8.jsonl b/split_edge/graph_7875284-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-0.jsonl b/split_edge/graph_787899-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-1.jsonl b/split_edge/graph_787899-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-11.jsonl b/split_edge/graph_787899-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-12.jsonl b/split_edge/graph_787899-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-13.jsonl b/split_edge/graph_787899-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-14.jsonl b/split_edge/graph_787899-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-3.jsonl b/split_edge/graph_787899-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-6.jsonl b/split_edge/graph_787899-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_787899-7.jsonl b/split_edge/graph_787899-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-0.jsonl b/split_edge/graph_7976343-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-1.jsonl b/split_edge/graph_7976343-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-10.jsonl b/split_edge/graph_7976343-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-11.jsonl b/split_edge/graph_7976343-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-13.jsonl b/split_edge/graph_7976343-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-14.jsonl b/split_edge/graph_7976343-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-15.jsonl b/split_edge/graph_7976343-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-16.jsonl b/split_edge/graph_7976343-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-17.jsonl b/split_edge/graph_7976343-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-18.jsonl b/split_edge/graph_7976343-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-2.jsonl b/split_edge/graph_7976343-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-3.jsonl b/split_edge/graph_7976343-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-4.jsonl b/split_edge/graph_7976343-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-6.jsonl b/split_edge/graph_7976343-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-7.jsonl b/split_edge/graph_7976343-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-8.jsonl b/split_edge/graph_7976343-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7976343-9.jsonl b/split_edge/graph_7976343-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-1.jsonl b/split_edge/graph_7983519-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-10.jsonl b/split_edge/graph_7983519-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-11.jsonl b/split_edge/graph_7983519-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-12.jsonl b/split_edge/graph_7983519-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-14.jsonl b/split_edge/graph_7983519-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-15.jsonl b/split_edge/graph_7983519-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-16.jsonl b/split_edge/graph_7983519-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-17.jsonl b/split_edge/graph_7983519-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-19.jsonl b/split_edge/graph_7983519-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-20.jsonl b/split_edge/graph_7983519-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-22.jsonl b/split_edge/graph_7983519-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-24.jsonl b/split_edge/graph_7983519-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-25.jsonl b/split_edge/graph_7983519-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-26.jsonl b/split_edge/graph_7983519-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-27.jsonl b/split_edge/graph_7983519-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-28.jsonl b/split_edge/graph_7983519-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-29.jsonl b/split_edge/graph_7983519-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-3.jsonl b/split_edge/graph_7983519-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-30.jsonl b/split_edge/graph_7983519-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-31.jsonl b/split_edge/graph_7983519-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-32.jsonl b/split_edge/graph_7983519-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-4.jsonl b/split_edge/graph_7983519-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-5.jsonl b/split_edge/graph_7983519-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-7.jsonl b/split_edge/graph_7983519-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-8.jsonl b/split_edge/graph_7983519-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_7983519-9.jsonl b/split_edge/graph_7983519-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8006086-0.jsonl b/split_edge/graph_8006086-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8006086-1.jsonl b/split_edge/graph_8006086-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8006086-13.jsonl b/split_edge/graph_8006086-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8006086-16.jsonl b/split_edge/graph_8006086-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8006086-19.jsonl b/split_edge/graph_8006086-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-0.jsonl b/split_edge/graph_801245-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-1.jsonl b/split_edge/graph_801245-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-10.jsonl b/split_edge/graph_801245-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-11.jsonl b/split_edge/graph_801245-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-13.jsonl b/split_edge/graph_801245-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-15.jsonl b/split_edge/graph_801245-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-16.jsonl b/split_edge/graph_801245-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-17.jsonl b/split_edge/graph_801245-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-2.jsonl b/split_edge/graph_801245-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-28.jsonl b/split_edge/graph_801245-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-29.jsonl b/split_edge/graph_801245-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-3.jsonl b/split_edge/graph_801245-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-30.jsonl b/split_edge/graph_801245-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-31.jsonl b/split_edge/graph_801245-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-32.jsonl b/split_edge/graph_801245-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-34.jsonl b/split_edge/graph_801245-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-35.jsonl b/split_edge/graph_801245-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-36.jsonl b/split_edge/graph_801245-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-37.jsonl b/split_edge/graph_801245-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-39.jsonl b/split_edge/graph_801245-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-4.jsonl b/split_edge/graph_801245-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-5.jsonl b/split_edge/graph_801245-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-7.jsonl b/split_edge/graph_801245-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-8.jsonl b/split_edge/graph_801245-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_801245-9.jsonl b/split_edge/graph_801245-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-0.jsonl b/split_edge/graph_8038163-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-1.jsonl b/split_edge/graph_8038163-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-12.jsonl b/split_edge/graph_8038163-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-13.jsonl b/split_edge/graph_8038163-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-14.jsonl b/split_edge/graph_8038163-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-16.jsonl b/split_edge/graph_8038163-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-17.jsonl b/split_edge/graph_8038163-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-18.jsonl b/split_edge/graph_8038163-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-19.jsonl b/split_edge/graph_8038163-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-20.jsonl b/split_edge/graph_8038163-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-21.jsonl b/split_edge/graph_8038163-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-22.jsonl b/split_edge/graph_8038163-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-24.jsonl b/split_edge/graph_8038163-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-25.jsonl b/split_edge/graph_8038163-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-26.jsonl b/split_edge/graph_8038163-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-27.jsonl b/split_edge/graph_8038163-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-29.jsonl b/split_edge/graph_8038163-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-3.jsonl b/split_edge/graph_8038163-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-4.jsonl b/split_edge/graph_8038163-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-5.jsonl b/split_edge/graph_8038163-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-7.jsonl b/split_edge/graph_8038163-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8038163-8.jsonl b/split_edge/graph_8038163-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-0.jsonl b/split_edge/graph_8070893-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-1.jsonl b/split_edge/graph_8070893-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-10.jsonl b/split_edge/graph_8070893-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-11.jsonl b/split_edge/graph_8070893-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-12.jsonl b/split_edge/graph_8070893-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-13.jsonl b/split_edge/graph_8070893-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-14.jsonl b/split_edge/graph_8070893-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-15.jsonl b/split_edge/graph_8070893-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-16.jsonl b/split_edge/graph_8070893-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-17.jsonl b/split_edge/graph_8070893-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-19.jsonl b/split_edge/graph_8070893-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-20.jsonl b/split_edge/graph_8070893-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-21.jsonl b/split_edge/graph_8070893-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-22.jsonl b/split_edge/graph_8070893-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-3.jsonl b/split_edge/graph_8070893-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-4.jsonl b/split_edge/graph_8070893-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-5.jsonl b/split_edge/graph_8070893-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-6.jsonl b/split_edge/graph_8070893-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-8.jsonl b/split_edge/graph_8070893-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8070893-9.jsonl b/split_edge/graph_8070893-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8071302-1.jsonl b/split_edge/graph_8071302-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8071302-2.jsonl b/split_edge/graph_8071302-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8071302-4.jsonl b/split_edge/graph_8071302-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8071302-5.jsonl b/split_edge/graph_8071302-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8071302-6.jsonl b/split_edge/graph_8071302-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8071302-7.jsonl b/split_edge/graph_8071302-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8110286-0.jsonl b/split_edge/graph_8110286-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8110286-1.jsonl b/split_edge/graph_8110286-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8110286-2.jsonl b/split_edge/graph_8110286-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8110286-3.jsonl b/split_edge/graph_8110286-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8110286-5.jsonl b/split_edge/graph_8110286-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8110286-6.jsonl b/split_edge/graph_8110286-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8110286-7.jsonl b/split_edge/graph_8110286-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8142318-0.jsonl b/split_edge/graph_8142318-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8142318-2.jsonl b/split_edge/graph_8142318-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8142318-5.jsonl b/split_edge/graph_8142318-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-0.jsonl b/split_edge/graph_816774-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-1.jsonl b/split_edge/graph_816774-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-12.jsonl b/split_edge/graph_816774-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-14.jsonl b/split_edge/graph_816774-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-15.jsonl b/split_edge/graph_816774-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-19.jsonl b/split_edge/graph_816774-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-2.jsonl b/split_edge/graph_816774-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-20.jsonl b/split_edge/graph_816774-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-21.jsonl b/split_edge/graph_816774-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-22.jsonl b/split_edge/graph_816774-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-23.jsonl b/split_edge/graph_816774-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-24.jsonl b/split_edge/graph_816774-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-25.jsonl b/split_edge/graph_816774-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-27.jsonl b/split_edge/graph_816774-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-28.jsonl b/split_edge/graph_816774-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-29.jsonl b/split_edge/graph_816774-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-3.jsonl b/split_edge/graph_816774-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-30.jsonl b/split_edge/graph_816774-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-31.jsonl b/split_edge/graph_816774-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_816774-33.jsonl b/split_edge/graph_816774-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-0.jsonl b/split_edge/graph_8183369-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-10.jsonl b/split_edge/graph_8183369-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-12.jsonl b/split_edge/graph_8183369-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-13.jsonl b/split_edge/graph_8183369-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-14.jsonl b/split_edge/graph_8183369-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-15.jsonl b/split_edge/graph_8183369-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-18.jsonl b/split_edge/graph_8183369-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-19.jsonl b/split_edge/graph_8183369-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-2.jsonl b/split_edge/graph_8183369-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-21.jsonl b/split_edge/graph_8183369-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-22.jsonl b/split_edge/graph_8183369-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-24.jsonl b/split_edge/graph_8183369-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-27.jsonl b/split_edge/graph_8183369-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-3.jsonl b/split_edge/graph_8183369-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-5.jsonl b/split_edge/graph_8183369-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-6.jsonl b/split_edge/graph_8183369-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-7.jsonl b/split_edge/graph_8183369-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-8.jsonl b/split_edge/graph_8183369-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8183369-9.jsonl b/split_edge/graph_8183369-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-0.jsonl b/split_edge/graph_8186802-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-11.jsonl b/split_edge/graph_8186802-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-12.jsonl b/split_edge/graph_8186802-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-13.jsonl b/split_edge/graph_8186802-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-14.jsonl b/split_edge/graph_8186802-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-15.jsonl b/split_edge/graph_8186802-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-16.jsonl b/split_edge/graph_8186802-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-17.jsonl b/split_edge/graph_8186802-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-18.jsonl b/split_edge/graph_8186802-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-19.jsonl b/split_edge/graph_8186802-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-2.jsonl b/split_edge/graph_8186802-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-22.jsonl b/split_edge/graph_8186802-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-23.jsonl b/split_edge/graph_8186802-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-24.jsonl b/split_edge/graph_8186802-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-25.jsonl b/split_edge/graph_8186802-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-26.jsonl b/split_edge/graph_8186802-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-27.jsonl b/split_edge/graph_8186802-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-28.jsonl b/split_edge/graph_8186802-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-29.jsonl b/split_edge/graph_8186802-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-3.jsonl b/split_edge/graph_8186802-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-30.jsonl b/split_edge/graph_8186802-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-32.jsonl b/split_edge/graph_8186802-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-34.jsonl b/split_edge/graph_8186802-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-37.jsonl b/split_edge/graph_8186802-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-38.jsonl b/split_edge/graph_8186802-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-39.jsonl b/split_edge/graph_8186802-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-41.jsonl b/split_edge/graph_8186802-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-42.jsonl b/split_edge/graph_8186802-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-43.jsonl b/split_edge/graph_8186802-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-44.jsonl b/split_edge/graph_8186802-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-46.jsonl b/split_edge/graph_8186802-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-47.jsonl b/split_edge/graph_8186802-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-48.jsonl b/split_edge/graph_8186802-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-49.jsonl b/split_edge/graph_8186802-49.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-5.jsonl b/split_edge/graph_8186802-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-50.jsonl b/split_edge/graph_8186802-50.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-51.jsonl b/split_edge/graph_8186802-51.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-52.jsonl b/split_edge/graph_8186802-52.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-53.jsonl b/split_edge/graph_8186802-53.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-54.jsonl b/split_edge/graph_8186802-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-55.jsonl b/split_edge/graph_8186802-55.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-56.jsonl b/split_edge/graph_8186802-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-58.jsonl b/split_edge/graph_8186802-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-6.jsonl b/split_edge/graph_8186802-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-62.jsonl b/split_edge/graph_8186802-62.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-7.jsonl b/split_edge/graph_8186802-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-8.jsonl b/split_edge/graph_8186802-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8186802-9.jsonl b/split_edge/graph_8186802-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-1.jsonl b/split_edge/graph_822236-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-10.jsonl b/split_edge/graph_822236-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-12.jsonl b/split_edge/graph_822236-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-13.jsonl b/split_edge/graph_822236-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-14.jsonl b/split_edge/graph_822236-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-15.jsonl b/split_edge/graph_822236-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-3.jsonl b/split_edge/graph_822236-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-4.jsonl b/split_edge/graph_822236-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-5.jsonl b/split_edge/graph_822236-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-6.jsonl b/split_edge/graph_822236-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-7.jsonl b/split_edge/graph_822236-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_822236-8.jsonl b/split_edge/graph_822236-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-0.jsonl b/split_edge/graph_824841-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-10.jsonl b/split_edge/graph_824841-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-11.jsonl b/split_edge/graph_824841-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-12.jsonl b/split_edge/graph_824841-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-13.jsonl b/split_edge/graph_824841-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-4.jsonl b/split_edge/graph_824841-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-5.jsonl b/split_edge/graph_824841-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-6.jsonl b/split_edge/graph_824841-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-7.jsonl b/split_edge/graph_824841-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-8.jsonl b/split_edge/graph_824841-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_824841-9.jsonl b/split_edge/graph_824841-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-0.jsonl b/split_edge/graph_8255396-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-1.jsonl b/split_edge/graph_8255396-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-10.jsonl b/split_edge/graph_8255396-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-12.jsonl b/split_edge/graph_8255396-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-2.jsonl b/split_edge/graph_8255396-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-3.jsonl b/split_edge/graph_8255396-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-4.jsonl b/split_edge/graph_8255396-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-6.jsonl b/split_edge/graph_8255396-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-7.jsonl b/split_edge/graph_8255396-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-8.jsonl b/split_edge/graph_8255396-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8255396-9.jsonl b/split_edge/graph_8255396-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8293100-1.jsonl b/split_edge/graph_8293100-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8293100-2.jsonl b/split_edge/graph_8293100-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8293100-3.jsonl b/split_edge/graph_8293100-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8293100-4.jsonl b/split_edge/graph_8293100-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8293100-6.jsonl b/split_edge/graph_8293100-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8313190-0.jsonl b/split_edge/graph_8313190-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8313190-10.jsonl b/split_edge/graph_8313190-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8313190-11.jsonl b/split_edge/graph_8313190-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8313190-2.jsonl b/split_edge/graph_8313190-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8313190-3.jsonl b/split_edge/graph_8313190-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8313190-5.jsonl b/split_edge/graph_8313190-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8324725-0.jsonl b/split_edge/graph_8324725-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8324725-1.jsonl b/split_edge/graph_8324725-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8324725-2.jsonl b/split_edge/graph_8324725-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8324725-4.jsonl b/split_edge/graph_8324725-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8324725-5.jsonl b/split_edge/graph_8324725-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-0.jsonl b/split_edge/graph_8332683-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-1.jsonl b/split_edge/graph_8332683-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-10.jsonl b/split_edge/graph_8332683-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-11.jsonl b/split_edge/graph_8332683-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-12.jsonl b/split_edge/graph_8332683-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-13.jsonl b/split_edge/graph_8332683-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-14.jsonl b/split_edge/graph_8332683-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-15.jsonl b/split_edge/graph_8332683-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-16.jsonl b/split_edge/graph_8332683-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-17.jsonl b/split_edge/graph_8332683-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-18.jsonl b/split_edge/graph_8332683-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-19.jsonl b/split_edge/graph_8332683-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-2.jsonl b/split_edge/graph_8332683-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-20.jsonl b/split_edge/graph_8332683-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-21.jsonl b/split_edge/graph_8332683-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-22.jsonl b/split_edge/graph_8332683-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-23.jsonl b/split_edge/graph_8332683-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-24.jsonl b/split_edge/graph_8332683-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-25.jsonl b/split_edge/graph_8332683-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-26.jsonl b/split_edge/graph_8332683-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-29.jsonl b/split_edge/graph_8332683-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-7.jsonl b/split_edge/graph_8332683-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-8.jsonl b/split_edge/graph_8332683-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8332683-9.jsonl b/split_edge/graph_8332683-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8417324-0.jsonl b/split_edge/graph_8417324-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8417324-1.jsonl b/split_edge/graph_8417324-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8417324-2.jsonl b/split_edge/graph_8417324-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8417324-3.jsonl b/split_edge/graph_8417324-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8417324-4.jsonl b/split_edge/graph_8417324-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8417324-5.jsonl b/split_edge/graph_8417324-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-0.jsonl b/split_edge/graph_8436894-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-1.jsonl b/split_edge/graph_8436894-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-10.jsonl b/split_edge/graph_8436894-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-11.jsonl b/split_edge/graph_8436894-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-12.jsonl b/split_edge/graph_8436894-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-13.jsonl b/split_edge/graph_8436894-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-14.jsonl b/split_edge/graph_8436894-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-17.jsonl b/split_edge/graph_8436894-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-18.jsonl b/split_edge/graph_8436894-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-19.jsonl b/split_edge/graph_8436894-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-2.jsonl b/split_edge/graph_8436894-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-26.jsonl b/split_edge/graph_8436894-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-27.jsonl b/split_edge/graph_8436894-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-28.jsonl b/split_edge/graph_8436894-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-29.jsonl b/split_edge/graph_8436894-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-3.jsonl b/split_edge/graph_8436894-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-30.jsonl b/split_edge/graph_8436894-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-31.jsonl b/split_edge/graph_8436894-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-32.jsonl b/split_edge/graph_8436894-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-33.jsonl b/split_edge/graph_8436894-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-35.jsonl b/split_edge/graph_8436894-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-37.jsonl b/split_edge/graph_8436894-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-39.jsonl b/split_edge/graph_8436894-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-4.jsonl b/split_edge/graph_8436894-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-5.jsonl b/split_edge/graph_8436894-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-7.jsonl b/split_edge/graph_8436894-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8436894-8.jsonl b/split_edge/graph_8436894-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-1.jsonl b/split_edge/graph_8450611-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-10.jsonl b/split_edge/graph_8450611-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-11.jsonl b/split_edge/graph_8450611-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-14.jsonl b/split_edge/graph_8450611-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-17.jsonl b/split_edge/graph_8450611-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-18.jsonl b/split_edge/graph_8450611-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-20.jsonl b/split_edge/graph_8450611-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-21.jsonl b/split_edge/graph_8450611-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-22.jsonl b/split_edge/graph_8450611-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-23.jsonl b/split_edge/graph_8450611-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-24.jsonl b/split_edge/graph_8450611-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-25.jsonl b/split_edge/graph_8450611-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-26.jsonl b/split_edge/graph_8450611-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-27.jsonl b/split_edge/graph_8450611-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-28.jsonl b/split_edge/graph_8450611-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-3.jsonl b/split_edge/graph_8450611-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-4.jsonl b/split_edge/graph_8450611-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-7.jsonl b/split_edge/graph_8450611-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-8.jsonl b/split_edge/graph_8450611-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8450611-9.jsonl b/split_edge/graph_8450611-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-10.jsonl b/split_edge/graph_8463928-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-11.jsonl b/split_edge/graph_8463928-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-12.jsonl b/split_edge/graph_8463928-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-13.jsonl b/split_edge/graph_8463928-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-14.jsonl b/split_edge/graph_8463928-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-16.jsonl b/split_edge/graph_8463928-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-2.jsonl b/split_edge/graph_8463928-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-3.jsonl b/split_edge/graph_8463928-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-5.jsonl b/split_edge/graph_8463928-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-7.jsonl b/split_edge/graph_8463928-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-8.jsonl b/split_edge/graph_8463928-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8463928-9.jsonl b/split_edge/graph_8463928-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8532570-0.jsonl b/split_edge/graph_8532570-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8532570-2.jsonl b/split_edge/graph_8532570-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8532570-5.jsonl b/split_edge/graph_8532570-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8532570-6.jsonl b/split_edge/graph_8532570-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8532570-7.jsonl b/split_edge/graph_8532570-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8532570-8.jsonl b/split_edge/graph_8532570-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8544264-3.jsonl b/split_edge/graph_8544264-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8544264-4.jsonl b/split_edge/graph_8544264-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8544264-5.jsonl b/split_edge/graph_8544264-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8544264-6.jsonl b/split_edge/graph_8544264-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8544264-7.jsonl b/split_edge/graph_8544264-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8544264-8.jsonl b/split_edge/graph_8544264-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-1.jsonl b/split_edge/graph_85497954-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-11.jsonl b/split_edge/graph_85497954-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-12.jsonl b/split_edge/graph_85497954-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-14.jsonl b/split_edge/graph_85497954-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-15.jsonl b/split_edge/graph_85497954-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-16.jsonl b/split_edge/graph_85497954-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-17.jsonl b/split_edge/graph_85497954-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-19.jsonl b/split_edge/graph_85497954-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-20.jsonl b/split_edge/graph_85497954-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-21.jsonl b/split_edge/graph_85497954-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-22.jsonl b/split_edge/graph_85497954-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-23.jsonl b/split_edge/graph_85497954-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-24.jsonl b/split_edge/graph_85497954-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-25.jsonl b/split_edge/graph_85497954-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-26.jsonl b/split_edge/graph_85497954-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-28.jsonl b/split_edge/graph_85497954-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-29.jsonl b/split_edge/graph_85497954-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-3.jsonl b/split_edge/graph_85497954-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-4.jsonl b/split_edge/graph_85497954-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-5.jsonl b/split_edge/graph_85497954-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-6.jsonl b/split_edge/graph_85497954-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85497954-9.jsonl b/split_edge/graph_85497954-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85529387-0.jsonl b/split_edge/graph_85529387-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85529387-2.jsonl b/split_edge/graph_85529387-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85529387-3.jsonl b/split_edge/graph_85529387-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85529387-4.jsonl b/split_edge/graph_85529387-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85529387-6.jsonl b/split_edge/graph_85529387-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85529387-7.jsonl b/split_edge/graph_85529387-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85529387-8.jsonl b/split_edge/graph_85529387-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-10.jsonl b/split_edge/graph_85542537-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-11.jsonl b/split_edge/graph_85542537-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-2.jsonl b/split_edge/graph_85542537-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-3.jsonl b/split_edge/graph_85542537-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-4.jsonl b/split_edge/graph_85542537-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-5.jsonl b/split_edge/graph_85542537-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-6.jsonl b/split_edge/graph_85542537-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-7.jsonl b/split_edge/graph_85542537-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-8.jsonl b/split_edge/graph_85542537-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_85542537-9.jsonl b/split_edge/graph_85542537-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-0.jsonl b/split_edge/graph_8618569-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-1.jsonl b/split_edge/graph_8618569-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-10.jsonl b/split_edge/graph_8618569-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-11.jsonl b/split_edge/graph_8618569-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-20.jsonl b/split_edge/graph_8618569-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-24.jsonl b/split_edge/graph_8618569-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-25.jsonl b/split_edge/graph_8618569-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-26.jsonl b/split_edge/graph_8618569-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-28.jsonl b/split_edge/graph_8618569-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-3.jsonl b/split_edge/graph_8618569-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-31.jsonl b/split_edge/graph_8618569-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-4.jsonl b/split_edge/graph_8618569-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-5.jsonl b/split_edge/graph_8618569-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-6.jsonl b/split_edge/graph_8618569-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-7.jsonl b/split_edge/graph_8618569-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8618569-8.jsonl b/split_edge/graph_8618569-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-0.jsonl b/split_edge/graph_86433885-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-1.jsonl b/split_edge/graph_86433885-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-10.jsonl b/split_edge/graph_86433885-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-12.jsonl b/split_edge/graph_86433885-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-16.jsonl b/split_edge/graph_86433885-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-17.jsonl b/split_edge/graph_86433885-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-18.jsonl b/split_edge/graph_86433885-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-19.jsonl b/split_edge/graph_86433885-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-3.jsonl b/split_edge/graph_86433885-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-4.jsonl b/split_edge/graph_86433885-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-5.jsonl b/split_edge/graph_86433885-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-7.jsonl b/split_edge/graph_86433885-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-8.jsonl b/split_edge/graph_86433885-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86433885-9.jsonl b/split_edge/graph_86433885-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-0.jsonl b/split_edge/graph_86468554-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-1.jsonl b/split_edge/graph_86468554-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-13.jsonl b/split_edge/graph_86468554-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-14.jsonl b/split_edge/graph_86468554-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-2.jsonl b/split_edge/graph_86468554-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-5.jsonl b/split_edge/graph_86468554-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-7.jsonl b/split_edge/graph_86468554-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468554-8.jsonl b/split_edge/graph_86468554-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-0.jsonl b/split_edge/graph_86468947-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-1.jsonl b/split_edge/graph_86468947-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-2.jsonl b/split_edge/graph_86468947-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-3.jsonl b/split_edge/graph_86468947-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-4.jsonl b/split_edge/graph_86468947-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-5.jsonl b/split_edge/graph_86468947-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-6.jsonl b/split_edge/graph_86468947-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86468947-7.jsonl b/split_edge/graph_86468947-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-0.jsonl b/split_edge/graph_86485018-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-10.jsonl b/split_edge/graph_86485018-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-12.jsonl b/split_edge/graph_86485018-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-13.jsonl b/split_edge/graph_86485018-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-14.jsonl b/split_edge/graph_86485018-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-16.jsonl b/split_edge/graph_86485018-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-17.jsonl b/split_edge/graph_86485018-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-18.jsonl b/split_edge/graph_86485018-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-2.jsonl b/split_edge/graph_86485018-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-20.jsonl b/split_edge/graph_86485018-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-21.jsonl b/split_edge/graph_86485018-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-22.jsonl b/split_edge/graph_86485018-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-23.jsonl b/split_edge/graph_86485018-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-25.jsonl b/split_edge/graph_86485018-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-26.jsonl b/split_edge/graph_86485018-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-27.jsonl b/split_edge/graph_86485018-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-3.jsonl b/split_edge/graph_86485018-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-4.jsonl b/split_edge/graph_86485018-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-5.jsonl b/split_edge/graph_86485018-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-7.jsonl b/split_edge/graph_86485018-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86485018-9.jsonl b/split_edge/graph_86485018-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-0.jsonl b/split_edge/graph_8650651-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-1.jsonl b/split_edge/graph_8650651-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-10.jsonl b/split_edge/graph_8650651-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-11.jsonl b/split_edge/graph_8650651-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-12.jsonl b/split_edge/graph_8650651-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-13.jsonl b/split_edge/graph_8650651-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-15.jsonl b/split_edge/graph_8650651-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-16.jsonl b/split_edge/graph_8650651-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-17.jsonl b/split_edge/graph_8650651-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-18.jsonl b/split_edge/graph_8650651-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-19.jsonl b/split_edge/graph_8650651-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-2.jsonl b/split_edge/graph_8650651-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-20.jsonl b/split_edge/graph_8650651-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-21.jsonl b/split_edge/graph_8650651-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-22.jsonl b/split_edge/graph_8650651-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-23.jsonl b/split_edge/graph_8650651-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-24.jsonl b/split_edge/graph_8650651-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-25.jsonl b/split_edge/graph_8650651-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-26.jsonl b/split_edge/graph_8650651-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-28.jsonl b/split_edge/graph_8650651-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-29.jsonl b/split_edge/graph_8650651-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-3.jsonl b/split_edge/graph_8650651-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-30.jsonl b/split_edge/graph_8650651-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-34.jsonl b/split_edge/graph_8650651-34.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-35.jsonl b/split_edge/graph_8650651-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-36.jsonl b/split_edge/graph_8650651-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-4.jsonl b/split_edge/graph_8650651-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-5.jsonl b/split_edge/graph_8650651-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-6.jsonl b/split_edge/graph_8650651-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-7.jsonl b/split_edge/graph_8650651-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-8.jsonl b/split_edge/graph_8650651-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8650651-9.jsonl b/split_edge/graph_8650651-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-0.jsonl b/split_edge/graph_86590556-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-12.jsonl b/split_edge/graph_86590556-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-15.jsonl b/split_edge/graph_86590556-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-16.jsonl b/split_edge/graph_86590556-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-18.jsonl b/split_edge/graph_86590556-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-23.jsonl b/split_edge/graph_86590556-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-24.jsonl b/split_edge/graph_86590556-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-36.jsonl b/split_edge/graph_86590556-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-38.jsonl b/split_edge/graph_86590556-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-39.jsonl b/split_edge/graph_86590556-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-41.jsonl b/split_edge/graph_86590556-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-56.jsonl b/split_edge/graph_86590556-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-59.jsonl b/split_edge/graph_86590556-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_86590556-61.jsonl b/split_edge/graph_86590556-61.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-0.jsonl b/split_edge/graph_8728131-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-1.jsonl b/split_edge/graph_8728131-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-10.jsonl b/split_edge/graph_8728131-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-11.jsonl b/split_edge/graph_8728131-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-13.jsonl b/split_edge/graph_8728131-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-14.jsonl b/split_edge/graph_8728131-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-15.jsonl b/split_edge/graph_8728131-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-17.jsonl b/split_edge/graph_8728131-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-22.jsonl b/split_edge/graph_8728131-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-23.jsonl b/split_edge/graph_8728131-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-24.jsonl b/split_edge/graph_8728131-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-26.jsonl b/split_edge/graph_8728131-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8728131-3.jsonl b/split_edge/graph_8728131-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-0.jsonl b/split_edge/graph_8732167-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-10.jsonl b/split_edge/graph_8732167-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-3.jsonl b/split_edge/graph_8732167-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-4.jsonl b/split_edge/graph_8732167-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-5.jsonl b/split_edge/graph_8732167-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-6.jsonl b/split_edge/graph_8732167-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-7.jsonl b/split_edge/graph_8732167-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-8.jsonl b/split_edge/graph_8732167-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8732167-9.jsonl b/split_edge/graph_8732167-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-0.jsonl b/split_edge/graph_8838090-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-10.jsonl b/split_edge/graph_8838090-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-11.jsonl b/split_edge/graph_8838090-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-12.jsonl b/split_edge/graph_8838090-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-14.jsonl b/split_edge/graph_8838090-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-15.jsonl b/split_edge/graph_8838090-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-16.jsonl b/split_edge/graph_8838090-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-2.jsonl b/split_edge/graph_8838090-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-3.jsonl b/split_edge/graph_8838090-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-4.jsonl b/split_edge/graph_8838090-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-5.jsonl b/split_edge/graph_8838090-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-6.jsonl b/split_edge/graph_8838090-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-7.jsonl b/split_edge/graph_8838090-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8838090-9.jsonl b/split_edge/graph_8838090-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-0.jsonl b/split_edge/graph_8928686-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-1.jsonl b/split_edge/graph_8928686-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-22.jsonl b/split_edge/graph_8928686-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-23.jsonl b/split_edge/graph_8928686-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-26.jsonl b/split_edge/graph_8928686-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-27.jsonl b/split_edge/graph_8928686-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-28.jsonl b/split_edge/graph_8928686-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-3.jsonl b/split_edge/graph_8928686-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-4.jsonl b/split_edge/graph_8928686-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8928686-5.jsonl b/split_edge/graph_8928686-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8929646-0.jsonl b/split_edge/graph_8929646-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8929646-10.jsonl b/split_edge/graph_8929646-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_8929646-9.jsonl b/split_edge/graph_8929646-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9020157-0.jsonl b/split_edge/graph_9020157-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9035119-0.jsonl b/split_edge/graph_9035119-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9035119-3.jsonl b/split_edge/graph_9035119-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9035119-5.jsonl b/split_edge/graph_9035119-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9035119-6.jsonl b/split_edge/graph_9035119-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9035119-7.jsonl b/split_edge/graph_9035119-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9035119-8.jsonl b/split_edge/graph_9035119-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9035119-9.jsonl b/split_edge/graph_9035119-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-0.jsonl b/split_edge/graph_9036392-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-10.jsonl b/split_edge/graph_9036392-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-11.jsonl b/split_edge/graph_9036392-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-12.jsonl b/split_edge/graph_9036392-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-13.jsonl b/split_edge/graph_9036392-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-14.jsonl b/split_edge/graph_9036392-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-3.jsonl b/split_edge/graph_9036392-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-5.jsonl b/split_edge/graph_9036392-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9036392-9.jsonl b/split_edge/graph_9036392-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-0.jsonl b/split_edge/graph_9045751-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-1.jsonl b/split_edge/graph_9045751-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-10.jsonl b/split_edge/graph_9045751-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-11.jsonl b/split_edge/graph_9045751-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-12.jsonl b/split_edge/graph_9045751-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-3.jsonl b/split_edge/graph_9045751-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-4.jsonl b/split_edge/graph_9045751-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-5.jsonl b/split_edge/graph_9045751-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-6.jsonl b/split_edge/graph_9045751-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-7.jsonl b/split_edge/graph_9045751-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9045751-9.jsonl b/split_edge/graph_9045751-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-0.jsonl b/split_edge/graph_9150195-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-1.jsonl b/split_edge/graph_9150195-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-2.jsonl b/split_edge/graph_9150195-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-3.jsonl b/split_edge/graph_9150195-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-4.jsonl b/split_edge/graph_9150195-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-5.jsonl b/split_edge/graph_9150195-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-6.jsonl b/split_edge/graph_9150195-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-7.jsonl b/split_edge/graph_9150195-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-8.jsonl b/split_edge/graph_9150195-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9150195-9.jsonl b/split_edge/graph_9150195-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-0.jsonl b/split_edge/graph_9175763-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-1.jsonl b/split_edge/graph_9175763-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-10.jsonl b/split_edge/graph_9175763-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-11.jsonl b/split_edge/graph_9175763-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-12.jsonl b/split_edge/graph_9175763-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-13.jsonl b/split_edge/graph_9175763-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-14.jsonl b/split_edge/graph_9175763-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-15.jsonl b/split_edge/graph_9175763-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-16.jsonl b/split_edge/graph_9175763-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-17.jsonl b/split_edge/graph_9175763-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-18.jsonl b/split_edge/graph_9175763-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-19.jsonl b/split_edge/graph_9175763-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-20.jsonl b/split_edge/graph_9175763-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-21.jsonl b/split_edge/graph_9175763-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-22.jsonl b/split_edge/graph_9175763-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-24.jsonl b/split_edge/graph_9175763-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-25.jsonl b/split_edge/graph_9175763-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-26.jsonl b/split_edge/graph_9175763-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-28.jsonl b/split_edge/graph_9175763-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-29.jsonl b/split_edge/graph_9175763-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-30.jsonl b/split_edge/graph_9175763-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-31.jsonl b/split_edge/graph_9175763-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-32.jsonl b/split_edge/graph_9175763-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-33.jsonl b/split_edge/graph_9175763-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-35.jsonl b/split_edge/graph_9175763-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-36.jsonl b/split_edge/graph_9175763-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-37.jsonl b/split_edge/graph_9175763-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-5.jsonl b/split_edge/graph_9175763-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-6.jsonl b/split_edge/graph_9175763-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-7.jsonl b/split_edge/graph_9175763-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-8.jsonl b/split_edge/graph_9175763-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9175763-9.jsonl b/split_edge/graph_9175763-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93000954-0.jsonl b/split_edge/graph_93000954-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93000954-1.jsonl b/split_edge/graph_93000954-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93000954-12.jsonl b/split_edge/graph_93000954-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93000954-14.jsonl b/split_edge/graph_93000954-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93000954-16.jsonl b/split_edge/graph_93000954-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93000954-2.jsonl b/split_edge/graph_93000954-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93000954-7.jsonl b/split_edge/graph_93000954-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-0.jsonl b/split_edge/graph_93003596-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-10.jsonl b/split_edge/graph_93003596-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-11.jsonl b/split_edge/graph_93003596-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-13.jsonl b/split_edge/graph_93003596-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-15.jsonl b/split_edge/graph_93003596-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-16.jsonl b/split_edge/graph_93003596-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-17.jsonl b/split_edge/graph_93003596-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-18.jsonl b/split_edge/graph_93003596-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-19.jsonl b/split_edge/graph_93003596-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-2.jsonl b/split_edge/graph_93003596-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-20.jsonl b/split_edge/graph_93003596-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-4.jsonl b/split_edge/graph_93003596-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-5.jsonl b/split_edge/graph_93003596-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-6.jsonl b/split_edge/graph_93003596-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-8.jsonl b/split_edge/graph_93003596-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_93003596-9.jsonl b/split_edge/graph_93003596-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-0.jsonl b/split_edge/graph_9318958-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-13.jsonl b/split_edge/graph_9318958-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-2.jsonl b/split_edge/graph_9318958-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-21.jsonl b/split_edge/graph_9318958-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-22.jsonl b/split_edge/graph_9318958-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-26.jsonl b/split_edge/graph_9318958-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-27.jsonl b/split_edge/graph_9318958-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-28.jsonl b/split_edge/graph_9318958-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-3.jsonl b/split_edge/graph_9318958-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-4.jsonl b/split_edge/graph_9318958-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9318958-6.jsonl b/split_edge/graph_9318958-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_932651-14.jsonl b/split_edge/graph_932651-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_932651-6.jsonl b/split_edge/graph_932651-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-0.jsonl b/split_edge/graph_940761-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-1.jsonl b/split_edge/graph_940761-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-11.jsonl b/split_edge/graph_940761-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-12.jsonl b/split_edge/graph_940761-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-13.jsonl b/split_edge/graph_940761-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-15.jsonl b/split_edge/graph_940761-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-16.jsonl b/split_edge/graph_940761-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-17.jsonl b/split_edge/graph_940761-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-2.jsonl b/split_edge/graph_940761-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-22.jsonl b/split_edge/graph_940761-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-24.jsonl b/split_edge/graph_940761-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-3.jsonl b/split_edge/graph_940761-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-4.jsonl b/split_edge/graph_940761-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-7.jsonl b/split_edge/graph_940761-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-8.jsonl b/split_edge/graph_940761-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_940761-9.jsonl b/split_edge/graph_940761-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-10.jsonl b/split_edge/graph_9428273-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-11.jsonl b/split_edge/graph_9428273-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-13.jsonl b/split_edge/graph_9428273-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-14.jsonl b/split_edge/graph_9428273-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-15.jsonl b/split_edge/graph_9428273-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-5.jsonl b/split_edge/graph_9428273-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-6.jsonl b/split_edge/graph_9428273-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-7.jsonl b/split_edge/graph_9428273-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-8.jsonl b/split_edge/graph_9428273-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9428273-9.jsonl b/split_edge/graph_9428273-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-0.jsonl b/split_edge/graph_9436861-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-1.jsonl b/split_edge/graph_9436861-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-11.jsonl b/split_edge/graph_9436861-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-14.jsonl b/split_edge/graph_9436861-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-2.jsonl b/split_edge/graph_9436861-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-22.jsonl b/split_edge/graph_9436861-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-23.jsonl b/split_edge/graph_9436861-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-3.jsonl b/split_edge/graph_9436861-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-5.jsonl b/split_edge/graph_9436861-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9436861-6.jsonl b/split_edge/graph_9436861-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-0.jsonl b/split_edge/graph_9470821-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-10.jsonl b/split_edge/graph_9470821-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-11.jsonl b/split_edge/graph_9470821-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-12.jsonl b/split_edge/graph_9470821-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-13.jsonl b/split_edge/graph_9470821-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-14.jsonl b/split_edge/graph_9470821-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-15.jsonl b/split_edge/graph_9470821-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-17.jsonl b/split_edge/graph_9470821-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-18.jsonl b/split_edge/graph_9470821-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-19.jsonl b/split_edge/graph_9470821-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-2.jsonl b/split_edge/graph_9470821-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-21.jsonl b/split_edge/graph_9470821-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-22.jsonl b/split_edge/graph_9470821-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-23.jsonl b/split_edge/graph_9470821-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-24.jsonl b/split_edge/graph_9470821-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-25.jsonl b/split_edge/graph_9470821-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-26.jsonl b/split_edge/graph_9470821-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-28.jsonl b/split_edge/graph_9470821-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-29.jsonl b/split_edge/graph_9470821-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-3.jsonl b/split_edge/graph_9470821-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-30.jsonl b/split_edge/graph_9470821-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-31.jsonl b/split_edge/graph_9470821-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-32.jsonl b/split_edge/graph_9470821-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-4.jsonl b/split_edge/graph_9470821-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-8.jsonl b/split_edge/graph_9470821-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9470821-9.jsonl b/split_edge/graph_9470821-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-0.jsonl b/split_edge/graph_9476507-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-1.jsonl b/split_edge/graph_9476507-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-12.jsonl b/split_edge/graph_9476507-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-15.jsonl b/split_edge/graph_9476507-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-18.jsonl b/split_edge/graph_9476507-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-3.jsonl b/split_edge/graph_9476507-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-32.jsonl b/split_edge/graph_9476507-32.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-5.jsonl b/split_edge/graph_9476507-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-7.jsonl b/split_edge/graph_9476507-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9476507-8.jsonl b/split_edge/graph_9476507-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-0.jsonl b/split_edge/graph_9486870-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-1.jsonl b/split_edge/graph_9486870-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-10.jsonl b/split_edge/graph_9486870-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-11.jsonl b/split_edge/graph_9486870-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-12.jsonl b/split_edge/graph_9486870-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-14.jsonl b/split_edge/graph_9486870-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-18.jsonl b/split_edge/graph_9486870-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-19.jsonl b/split_edge/graph_9486870-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-2.jsonl b/split_edge/graph_9486870-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-20.jsonl b/split_edge/graph_9486870-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-21.jsonl b/split_edge/graph_9486870-21.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-25.jsonl b/split_edge/graph_9486870-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-26.jsonl b/split_edge/graph_9486870-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-27.jsonl b/split_edge/graph_9486870-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-29.jsonl b/split_edge/graph_9486870-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-4.jsonl b/split_edge/graph_9486870-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9486870-6.jsonl b/split_edge/graph_9486870-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-1.jsonl b/split_edge/graph_9574824-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-12.jsonl b/split_edge/graph_9574824-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-13.jsonl b/split_edge/graph_9574824-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-15.jsonl b/split_edge/graph_9574824-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-18.jsonl b/split_edge/graph_9574824-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-20.jsonl b/split_edge/graph_9574824-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-22.jsonl b/split_edge/graph_9574824-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-26.jsonl b/split_edge/graph_9574824-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-27.jsonl b/split_edge/graph_9574824-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-28.jsonl b/split_edge/graph_9574824-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-29.jsonl b/split_edge/graph_9574824-29.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-30.jsonl b/split_edge/graph_9574824-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-31.jsonl b/split_edge/graph_9574824-31.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-35.jsonl b/split_edge/graph_9574824-35.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-37.jsonl b/split_edge/graph_9574824-37.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-38.jsonl b/split_edge/graph_9574824-38.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-39.jsonl b/split_edge/graph_9574824-39.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-4.jsonl b/split_edge/graph_9574824-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-40.jsonl b/split_edge/graph_9574824-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-41.jsonl b/split_edge/graph_9574824-41.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-42.jsonl b/split_edge/graph_9574824-42.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-43.jsonl b/split_edge/graph_9574824-43.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-44.jsonl b/split_edge/graph_9574824-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-45.jsonl b/split_edge/graph_9574824-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-6.jsonl b/split_edge/graph_9574824-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9574824-7.jsonl b/split_edge/graph_9574824-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-0.jsonl b/split_edge/graph_960896-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-10.jsonl b/split_edge/graph_960896-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-2.jsonl b/split_edge/graph_960896-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-3.jsonl b/split_edge/graph_960896-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-5.jsonl b/split_edge/graph_960896-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-7.jsonl b/split_edge/graph_960896-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-8.jsonl b/split_edge/graph_960896-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_960896-9.jsonl b/split_edge/graph_960896-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-0.jsonl b/split_edge/graph_9651737-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-13.jsonl b/split_edge/graph_9651737-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-14.jsonl b/split_edge/graph_9651737-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-16.jsonl b/split_edge/graph_9651737-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-4.jsonl b/split_edge/graph_9651737-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-5.jsonl b/split_edge/graph_9651737-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-6.jsonl b/split_edge/graph_9651737-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-7.jsonl b/split_edge/graph_9651737-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-8.jsonl b/split_edge/graph_9651737-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9651737-9.jsonl b/split_edge/graph_9651737-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-10.jsonl b/split_edge/graph_9667820-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-11.jsonl b/split_edge/graph_9667820-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-14.jsonl b/split_edge/graph_9667820-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-15.jsonl b/split_edge/graph_9667820-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-18.jsonl b/split_edge/graph_9667820-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-19.jsonl b/split_edge/graph_9667820-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-23.jsonl b/split_edge/graph_9667820-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-27.jsonl b/split_edge/graph_9667820-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-28.jsonl b/split_edge/graph_9667820-28.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-3.jsonl b/split_edge/graph_9667820-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-30.jsonl b/split_edge/graph_9667820-30.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-33.jsonl b/split_edge/graph_9667820-33.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-36.jsonl b/split_edge/graph_9667820-36.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-40.jsonl b/split_edge/graph_9667820-40.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-44.jsonl b/split_edge/graph_9667820-44.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-45.jsonl b/split_edge/graph_9667820-45.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-46.jsonl b/split_edge/graph_9667820-46.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-47.jsonl b/split_edge/graph_9667820-47.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-48.jsonl b/split_edge/graph_9667820-48.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-54.jsonl b/split_edge/graph_9667820-54.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-56.jsonl b/split_edge/graph_9667820-56.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-57.jsonl b/split_edge/graph_9667820-57.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-58.jsonl b/split_edge/graph_9667820-58.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-59.jsonl b/split_edge/graph_9667820-59.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9667820-6.jsonl b/split_edge/graph_9667820-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-0.jsonl b/split_edge/graph_9735077-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-1.jsonl b/split_edge/graph_9735077-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-10.jsonl b/split_edge/graph_9735077-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-11.jsonl b/split_edge/graph_9735077-11.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-12.jsonl b/split_edge/graph_9735077-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-13.jsonl b/split_edge/graph_9735077-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-14.jsonl b/split_edge/graph_9735077-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-15.jsonl b/split_edge/graph_9735077-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-16.jsonl b/split_edge/graph_9735077-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-17.jsonl b/split_edge/graph_9735077-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-20.jsonl b/split_edge/graph_9735077-20.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-22.jsonl b/split_edge/graph_9735077-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-23.jsonl b/split_edge/graph_9735077-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-24.jsonl b/split_edge/graph_9735077-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-3.jsonl b/split_edge/graph_9735077-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-4.jsonl b/split_edge/graph_9735077-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-5.jsonl b/split_edge/graph_9735077-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-6.jsonl b/split_edge/graph_9735077-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9735077-9.jsonl b/split_edge/graph_9735077-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-0.jsonl b/split_edge/graph_9746265-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-1.jsonl b/split_edge/graph_9746265-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-10.jsonl b/split_edge/graph_9746265-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-12.jsonl b/split_edge/graph_9746265-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-15.jsonl b/split_edge/graph_9746265-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-17.jsonl b/split_edge/graph_9746265-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-18.jsonl b/split_edge/graph_9746265-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-19.jsonl b/split_edge/graph_9746265-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-2.jsonl b/split_edge/graph_9746265-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-25.jsonl b/split_edge/graph_9746265-25.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-26.jsonl b/split_edge/graph_9746265-26.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-27.jsonl b/split_edge/graph_9746265-27.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-4.jsonl b/split_edge/graph_9746265-4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-5.jsonl b/split_edge/graph_9746265-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-7.jsonl b/split_edge/graph_9746265-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9746265-8.jsonl b/split_edge/graph_9746265-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9765418-0.jsonl b/split_edge/graph_9765418-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9765418-10.jsonl b/split_edge/graph_9765418-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9765418-15.jsonl b/split_edge/graph_9765418-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9765418-3.jsonl b/split_edge/graph_9765418-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9765418-6.jsonl b/split_edge/graph_9765418-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-0.jsonl b/split_edge/graph_9770908-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-1.jsonl b/split_edge/graph_9770908-1.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-10.jsonl b/split_edge/graph_9770908-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-17.jsonl b/split_edge/graph_9770908-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-18.jsonl b/split_edge/graph_9770908-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-19.jsonl b/split_edge/graph_9770908-19.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-2.jsonl b/split_edge/graph_9770908-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-3.jsonl b/split_edge/graph_9770908-3.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-5.jsonl b/split_edge/graph_9770908-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-6.jsonl b/split_edge/graph_9770908-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-7.jsonl b/split_edge/graph_9770908-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-8.jsonl b/split_edge/graph_9770908-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9770908-9.jsonl b/split_edge/graph_9770908-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-0.jsonl b/split_edge/graph_9952955-0.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-10.jsonl b/split_edge/graph_9952955-10.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-12.jsonl b/split_edge/graph_9952955-12.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-13.jsonl b/split_edge/graph_9952955-13.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-14.jsonl b/split_edge/graph_9952955-14.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-15.jsonl b/split_edge/graph_9952955-15.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-16.jsonl b/split_edge/graph_9952955-16.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-17.jsonl b/split_edge/graph_9952955-17.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-18.jsonl b/split_edge/graph_9952955-18.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-2.jsonl b/split_edge/graph_9952955-2.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-22.jsonl b/split_edge/graph_9952955-22.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-23.jsonl b/split_edge/graph_9952955-23.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-24.jsonl b/split_edge/graph_9952955-24.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-5.jsonl b/split_edge/graph_9952955-5.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-6.jsonl b/split_edge/graph_9952955-6.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-7.jsonl b/split_edge/graph_9952955-7.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-8.jsonl b/split_edge/graph_9952955-8.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/split_edge/graph_9952955-9.jsonl b/split_edge/graph_9952955-9.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391